Skip to content

Commit 27e8b1d

Browse files
author
Colin Robertson
authored
Merge pull request #3871 from laurenprinn/patch-2
Update dynamicbase.md
2 parents eb9ff6b + 9596bd0 commit 27e8b1d

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

docs/build/reference/dynamicbase.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,26 @@
11
---
22
description: "Learn more about: /DYNAMICBASE"
33
title: "/DYNAMICBASE"
4-
ms.date: "06/12/2018"
4+
ms.date: "05/05/2022"
55
f1_keywords: ["/dynamicbase"]
66
helpviewer_keywords: ["-DYNAMICBASE editbin option", "DYNAMICBASE editbin option", "/DYNAMICBASE editbin option"]
77
ms.assetid: edb3df90-7b07-42fb-a94a-f5a4c1d325d6
88
---
9-
# /DYNAMICBASE
9+
# `/DYNAMICBASE`
1010

1111
Specifies whether to generate an executable image that can be randomly rebased at load time by using the address space layout randomization (ASLR) feature of Windows that was first available in Windows Vista.
1212

1313
## Syntax
1414

15-
> **/DYNAMICBASE**[**:NO**]
15+
> **`/DYNAMICBASE`**[**`:NO`**]
1616
1717
## Remarks
1818

19-
The **/DYNAMICBASE** option modifies the header of an *executable image*, a .dll or .exe file, to indicate whether the application should be randomly rebased at load time, and enables virtual address allocation randomization, which affects the virtual memory location of heaps, stacks, and other operating system allocations. The **/DYNAMICBASE** option applies to both 32-bit and 64-bit images. ASLR is supported on Windows Vista and later operating systems. The option is ignored by earlier operating systems.
19+
The **`/DYNAMICBASE`** option modifies the header of an *executable image*, a .dll or .exe file, to indicate whether the application should be randomly rebased at load time, and enables virtual address allocation randomization, which affects the virtual memory location of heaps, stacks, and other operating system allocations. The **`/DYNAMICBASE`** option applies to both 32-bit and 64-bit images. ASLR is supported on Windows Vista and later operating systems. The option is ignored by earlier operating systems.
2020

21-
By default, **/DYNAMICBASE** is enabled. To disable this option, use **/DYNAMICBASE:NO**. The **/DYNAMICBASE** option is required for the [/HIGHENTROPYVA](highentropyva-support-64-bit-aslr.md) option to have an effect.
21+
By default, **`/DYNAMICBASE`** is enabled. To disable this option, use **`/DYNAMICBASE:NO`**. The **`/DYNAMICBASE`** option is required for the [`/HIGHENTROPYVA`](highentropyva-support-64-bit-aslr.md) option to have an effect.
22+
23+
Because ASLR can't be disabled on ARM, ARM64, or ARM64EC architectures, **`/DYNAMICBASE:NO`** isn't supported for these targets.
2224

2325
## See also
2426

0 commit comments

Comments
 (0)