@@ -3104,7 +3104,15 @@ ENUM!{enum PROCESS_MITIGATION_POLICY {
3104
3104
ProcessSignaturePolicy ,
3105
3105
ProcessFontDisablePolicy ,
3106
3106
ProcessImageLoadPolicy ,
3107
- MaxProcessMitigationPolicy ,
3107
+ ProcessSystemCallFilterPolicy ,
3108
+ ProcessPayloadRestrictionPolicy ,
3109
+ ProcessChildProcessPolicy ,
3110
+ ProcessSideChannelIsolationPolicy ,
3111
+ ProcessUserShadowStackPolicy ,
3112
+ ProcessRedirectionTrustPolicy ,
3113
+ ProcessUserPointerAuthPolicy ,
3114
+ ProcessSEHOPPolicy ,
3115
+ MaxProcessMitigationPolicy
3108
3116
} }
3109
3117
pub type PPROCESS_MITIGATION_POLICY = * mut PROCESS_MITIGATION_POLICY ;
3110
3118
STRUCT ! { struct PROCESS_MITIGATION_ASLR_POLICY {
@@ -3138,12 +3146,20 @@ BITFIELD!{PROCESS_MITIGATION_STRICT_HANDLE_CHECK_POLICY Flags: DWORD [
3138
3146
] }
3139
3147
pub type PPROCESS_MITIGATION_STRICT_HANDLE_CHECK_POLICY
3140
3148
= * mut PROCESS_MITIGATION_STRICT_HANDLE_CHECK_POLICY ;
3149
+ STRUCT ! { struct PROCESS_MITIGATION_SEHOP_POLICY {
3150
+ Flags : DWORD ,
3151
+ } }
3152
+ BITFIELD ! { PROCESS_MITIGATION_SEHOP_POLICY Flags : DWORD [
3153
+ EnableSehop set_EnableSehop[ 0 ..1 ] ,
3154
+ ReservedFlags set_ReservedFlags[ 1 ..32 ] ,
3155
+ ] }
3141
3156
STRUCT ! { struct PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY {
3142
3157
Flags : DWORD ,
3143
3158
} }
3144
3159
BITFIELD ! { PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY Flags : DWORD [
3145
3160
DisallowWin32kSystemCalls set_DisallowWin32kSystemCalls[ 0 ..1 ] ,
3146
- ReservedFlags set_ReservedFlags[ 1 ..32 ] ,
3161
+ AuditDisallowWin32kSystemCalls set_AuditDisallowWin32kSystemCalls[ 1 ..2 ] ,
3162
+ ReservedFlags set_ReservedFlags[ 2 ..32 ] ,
3147
3163
] }
3148
3164
pub type PPROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY
3149
3165
= * mut PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY ;
@@ -3163,7 +3179,8 @@ BITFIELD!{PROCESS_MITIGATION_DYNAMIC_CODE_POLICY Flags: DWORD [
3163
3179
ProhibitDynamicCode set_ProhibitDynamicCode[ 0 ..1 ] ,
3164
3180
AllowThreadOptOut set_AllowThreadOptOut[ 1 ..2 ] ,
3165
3181
AllowRemoteDowngrade set_AllowRemoteDowngrade[ 2 ..3 ] ,
3166
- ReservedFlags set_ReservedFlags[ 3 ..32 ] ,
3182
+ AuditProhibitDynamicCode set_AuditProhibitDynamicCode[ 3 ..4 ] ,
3183
+ ReservedFlags set_ReservedFlags[ 4 ..32 ] ,
3167
3184
] }
3168
3185
pub type PPROCESS_MITIGATION_DYNAMIC_CODE_POLICY = * mut PROCESS_MITIGATION_DYNAMIC_CODE_POLICY ;
3169
3186
STRUCT ! { struct PROCESS_MITIGATION_CONTROL_FLOW_GUARD_POLICY {
@@ -3173,7 +3190,9 @@ BITFIELD!{PROCESS_MITIGATION_CONTROL_FLOW_GUARD_POLICY Flags: DWORD [
3173
3190
EnableControlFlowGuard set_EnableControlFlowGuard[ 0 ..1 ] ,
3174
3191
EnableExportSuppression set_EnableExportSuppression[ 1 ..2 ] ,
3175
3192
StrictMode set_StrictMode[ 2 ..3 ] ,
3176
- ReservedFlags set_ReservedFlags[ 3 ..32 ] ,
3193
+ EnableXfg set_EnableXfg[ 3 ..4 ] ,
3194
+ EnableXfgAuditMode set_EnableXfgAuditMode[ 4 ..5 ] ,
3195
+ ReservedFlags set_ReservedFlags[ 5 ..32 ] ,
3177
3196
] }
3178
3197
pub type PPROCESS_MITIGATION_CONTROL_FLOW_GUARD_POLICY
3179
3198
= * mut PROCESS_MITIGATION_CONTROL_FLOW_GUARD_POLICY ;
@@ -3184,7 +3203,9 @@ BITFIELD!{PROCESS_MITIGATION_BINARY_SIGNATURE_POLICY Flags: DWORD [
3184
3203
MicrosoftSignedOnly set_MicrosoftSignedOnly[ 0 ..1 ] ,
3185
3204
StoreSignedOnly set_StoreSignedOnly[ 1 ..2 ] ,
3186
3205
MitigationOptIn set_MitigationOptIn[ 2 ..3 ] ,
3187
- ReservedFlags set_ReservedFlags[ 3 ..32 ] ,
3206
+ AuditMicrosoftSignedOnly set_AuditMicrosoftSignedOnly[ 3 ..4 ] ,
3207
+ AuditStoreSignedOnly set_AuditStoreSignedOnly[ 4 ..5 ] ,
3208
+ ReservedFlags set_ReservedFlags[ 5 ..32 ] ,
3188
3209
] }
3189
3210
pub type PPROCESS_MITIGATION_BINARY_SIGNATURE_POLICY
3190
3211
= * mut PROCESS_MITIGATION_BINARY_SIGNATURE_POLICY ;
@@ -3204,7 +3225,9 @@ BITFIELD!{PROCESS_MITIGATION_IMAGE_LOAD_POLICY Flags: DWORD [
3204
3225
NoRemoteImages set_NoRemoteImages[ 0 ..1 ] ,
3205
3226
NoLowMandatoryLabelImages set_NoLowMandatoryLabelImages[ 1 ..2 ] ,
3206
3227
PreferSystem32Images set_PreferSystem32Images[ 2 ..3 ] ,
3207
- ReservedFlags set_ReservedFlags[ 3 ..32 ] ,
3228
+ AuditNoRemoteImages set_AuditNoRemoteImages[ 3 ..4 ] ,
3229
+ AuditNoLowMandatoryLabelImages set_AuditNoLowMandatoryLabelImages[ 4 ..5 ] ,
3230
+ ReservedFlags set_ReservedFlags[ 5 ..32 ] ,
3208
3231
] }
3209
3232
pub type PPROCESS_MITIGATION_IMAGE_LOAD_POLICY = * mut PROCESS_MITIGATION_IMAGE_LOAD_POLICY ;
3210
3233
STRUCT ! { struct PROCESS_MITIGATION_SYSTEM_CALL_FILTER_POLICY {
@@ -3246,6 +3269,52 @@ BITFIELD!{PROCESS_MITIGATION_CHILD_PROCESS_POLICY Flags: DWORD [
3246
3269
AllowSecureProcessCreation set_AllowSecureProcessCreation[ 2 ..3 ] ,
3247
3270
ReservedFlags set_ReservedFlags[ 3 ..32 ] ,
3248
3271
] }
3272
+ STRUCT ! { struct PROCESS_MITIGATION_USER_SHADOW_STACK_POLICY {
3273
+ Flags : DWORD ,
3274
+ } }
3275
+ pub type PPROCESS_MITIGATION_USER_SHADOW_STACK_POLICY = * mut PROCESS_MITIGATION_USER_SHADOW_STACK_POLICY ;
3276
+ BITFIELD ! { PROCESS_MITIGATION_USER_SHADOW_STACK_POLICY Flags : DWORD [
3277
+ EnableUserShadowStack set_EnableUserShadowStack[ 0 ..1 ] ,
3278
+ AuditUserShadowStack set_AuditUserShadowStack[ 1 ..2 ] ,
3279
+ SetContextIpValidation set_SetContextIpValidation[ 2 ..3 ] ,
3280
+ AuditSetContextIpValidation set_AuditSetContextIpValidation[ 3 ..4 ] ,
3281
+ EnableUserShadowStackStrictMode set_EnableUserShadowStackStrictMode[ 4 ..5 ] ,
3282
+ BlockNonCetBinaries set_BlockNonCetBinaries[ 5 ..6 ] ,
3283
+ BlockNonCetBinariesNonEhcont set_BlockNonCetBinariesNonEhcont[ 6 ..7 ] ,
3284
+ AuditBlockNonCetBinaries set_AuditBlockNonCetBinaries[ 7 ..8 ] ,
3285
+ CetDynamicApisOutOfProcOnly set_CetDynamicApisOutOfProcOnly[ 8 ..9 ] ,
3286
+ SetContextIpValidationRelaxedMode set_SetContextIpValidationRelaxedMode[ 9 ..10 ] ,
3287
+ ReservedFlags set_ReservedFlags[ 10 ..32 ] ,
3288
+ ] }
3289
+ STRUCT ! { struct PROCESS_MITIGATION_SIDE_CHANNEL_ISOLATION_POLICY {
3290
+ Flags : DWORD ,
3291
+ } }
3292
+ pub type PPROCESS_MITIGATION_SIDE_CHANNEL_ISOLATION_POLICY = * mut PROCESS_MITIGATION_SIDE_CHANNEL_ISOLATION_POLICY ;
3293
+ BITFIELD ! { PROCESS_MITIGATION_SIDE_CHANNEL_ISOLATION_POLICY Flags : DWORD [
3294
+ SmtBranchTargetIsolation set_SmtBranchTargetIsolation[ 0 ..1 ] ,
3295
+ IsolateSecurityDomain set_IsolateSecurityDomain[ 1 ..2 ] ,
3296
+ DisablePageCombine set_DisablePageCombine[ 2 ..3 ] ,
3297
+ SpeculativeStoreBypassDisable set_SpeculativeStoreBypassDisable[ 3 ..4 ] ,
3298
+ RestrictCoreSharing set_RestrictCoreSharing[ 4 ..5 ] ,
3299
+ ReservedFlags set_ReservedFlags[ 5 ..32 ] ,
3300
+ ] }
3301
+ STRUCT ! { struct PROCESS_MITIGATION_USER_POINTER_AUTH_POLICY {
3302
+ Flags : DWORD ,
3303
+ } }
3304
+ pub type PPROCESS_MITIGATION_USER_POINTER_AUTH_POLICY = * mut PROCESS_MITIGATION_USER_POINTER_AUTH_POLICY ;
3305
+ BITFIELD ! { PROCESS_MITIGATION_USER_POINTER_AUTH_POLICY Flags : DWORD [
3306
+ EnablePointerAuthUserIp set_EnablePointerAuthUserIp[ 0 ..1 ] ,
3307
+ ReservedFlags set_ReservedFlags[ 1 ..32 ] ,
3308
+ ] }
3309
+ STRUCT ! { struct PROCESS_MITIGATION_REDIRECTION_TRUST_POLICY {
3310
+ Flags : DWORD ,
3311
+ } }
3312
+ pub type PPROCESS_MITIGATION_REDIRECTION_TRUST_POLICY = * mut PROCESS_MITIGATION_REDIRECTION_TRUST_POLICY ;
3313
+ BITFIELD ! { PROCESS_MITIGATION_REDIRECTION_TRUST_POLICY Flags : DWORD [
3314
+ EnforceRedirectionTrust set_EnforceRedirectionTrust[ 0 ..1 ] ,
3315
+ AuditRedirectionTrust set_AuditRedirectionTrust[ 1 ..2 ] ,
3316
+ ReservedFlags set_ReservedFlags[ 2 ..32 ] ,
3317
+ ] }
3249
3318
STRUCT ! { struct JOBOBJECT_BASIC_ACCOUNTING_INFORMATION {
3250
3319
TotalUserTime : LARGE_INTEGER ,
3251
3320
TotalKernelTime : LARGE_INTEGER ,
0 commit comments