PROCESS_MITIGATION_ASLR_POLICY structure
Contains process mitigation policy settings for Address Space Randomization Layout (ASLR). The GetProcessMitigationPolicy and SetProcessMitigationPolicy functions use this structure.
Syntax
typedef struct _PROCESS_MITIGATION_ASLR_POLICY { union { DWORD Flags; struct { DWORD EnableBottomUpRandomization : 1; DWORD EnableForceRelocateImages : 1; DWORD EnableHighEntropy : 1; DWORD DisallowStrippedImages : 1; DWORD ReservedFlags : 28; }; }; } PROCESS_MITIGATION_ASLR_POLICY, *PPROCESS_MITIGATION_ASLR_POLICY;
Members
- Flags
-
This member is reserved for system use.
- EnableBottomUpRandomization : 1
-
Thread stacks and other bottom-up allocations are subject to randomization by ASLR if this flag is set. This flag is read-only and cannot be modified after a process has been created.
- EnableForceRelocateImages : 1
-
Images that have not been built with /DYNAMICBASE are forcibly relocated on load if this flag is set.
- EnableHighEntropy : 1
-
Bottom-up allocations are subject to higher degrees of entropy when randomized by ASLR if this flag is set. This flag only applies to 64-bit processes and is read-only.
- DisallowStrippedImages : 1
-
Images that have not been built with /DYNAMICBASE and do not have relocation information will fail to load if this flag and EnableForceRelocateImages are set.
- ReservedFlags : 28
-
This member is reserved for system use.
Requirements
|
Minimum supported client |
Windows 8 [desktop apps only] |
|---|---|
|
Minimum supported server |
Windows Server 2012 [desktop apps only] |
|
Header |
|