1 .\" Copyright (c) 1993 Luigi P. Bai (lpb@softint.com) July 28, 1993
2 .\" and Copyright 1993 Giorgio Ciucci <giorgio@crcc.it>
3 .\" and Copyright 2004, 2005 Michael Kerrisk <mtk.manpages@gmail.com>
5 .\" %%%LICENSE_START(VERBATIM)
6 .\" Permission is granted to make and distribute verbatim copies of this
7 .\" manual provided the copyright notice and this permission notice are
8 .\" preserved on all copies.
10 .\" Permission is granted to copy and distribute modified versions of this
11 .\" manual under the conditions for verbatim copying, provided that the
12 .\" entire resulting derived work is distributed under the terms of a
13 .\" permission notice identical to this one.
15 .\" Since the Linux kernel and libraries are constantly changing, this
16 .\" manual page may be incorrect or out-of-date. The author(s) assume no
17 .\" responsibility for errors or omissions, or for damages resulting from
18 .\" the use of the information contained herein. The author(s) may not
19 .\" have taken the same level of care in the production of this manual,
20 .\" which is licensed free of charge, as they might when working
23 .\" Formatted or processed versions of this manual, if unaccompanied by
24 .\" the source, must acknowledge the copyright and authors of this work.
27 .\" Modified 1993-07-28, Rik Faith <faith@cs.unc.edu>
28 .\" Modified 1993-11-28, Giorgio Ciucci <giorgio@crcc.it>
29 .\" Modified 1997-01-31, Eric S. Raymond <esr@thyrsus.com>
30 .\" Modified 2001-02-18, Andries Brouwer <aeb@cwi.nl>
31 .\" Modified 2002-01-05, 2004-05-27, 2004-06-17,
32 .\" Michael Kerrisk <mtk.manpages@gmail.com>
33 .\" Modified 2004-10-11, aeb
34 .\" Modified, Nov 2004, Michael Kerrisk <mtk.manpages@gmail.com>
35 .\" Language and formatting clean-ups
36 .\" Updated shmid_ds structure definitions
37 .\" Added information on SHM_DEST and SHM_LOCKED flags
38 .\" Noted that CAP_IPC_LOCK is not required for SHM_UNLOCK
39 .\" since kernel 2.6.9
40 .\" Modified, 2004-11-25, mtk, notes on 2.6.9 RLIMIT_MEMLOCK changes
41 .\" 2005-04-25, mtk -- noted aberrant Linux behavior w.r.t. new
42 .\" attaches to a segment that has already been marked for deletion.
43 .\" 2005-08-02, mtk: Added IPC_INFO, SHM_INFO, SHM_STAT descriptions.
44 .\" 2018-03-20, dbueso: Added SHM_STAT_ANY description.
46 .TH SHMCTL 2 2021-03-22 "Linux" "Linux Programmer's Manual"
48 shmctl \- System V shared memory control
52 .B #include <sys/ipc.h>
53 .B #include <sys/shm.h>
55 .BI "int shmctl(int " shmid ", int " cmd ", struct shmid_ds *" buf );
60 performs the control operation specified by
62 on the System\ V shared memory segment whose identifier is given in
67 argument is a pointer to a \fIshmid_ds\fP structure,
68 defined in \fI<sys/shm.h>\fP as follows:
73 struct ipc_perm shm_perm; /* Ownership and permissions */
74 size_t shm_segsz; /* Size of segment (bytes) */
75 time_t shm_atime; /* Last attach time */
76 time_t shm_dtime; /* Last detach time */
77 time_t shm_ctime; /* Creation time/time of last
78 modification via shmctl() */
79 pid_t shm_cpid; /* PID of creator */
80 pid_t shm_lpid; /* PID of last shmat(2)/shmdt(2) */
81 shmatt_t shm_nattch; /* No. of current attaches */
89 structure are as follows:
94 structure (see below) that specifies the access permissions
95 on the shared memory segment.
98 Size in bytes of the shared memory segment.
103 system call that attached this segment.
108 system call that detached tgis segment.
111 Time of creation of segment or time of the last
117 ID of the process that created the shared memory segment.
120 ID of the last process that executed a
124 system call on this segment.
127 Number of processes that have this segment attached.
131 structure is defined as follows
132 (the highlighted fields are settable using
138 key_t __key; /* Key supplied to shmget(2) */
139 uid_t \fBuid\fP; /* Effective UID of owner */
140 gid_t \fBgid\fP; /* Effective GID of owner */
141 uid_t cuid; /* Effective UID of creator */
142 gid_t cgid; /* Effective GID of creator */
143 unsigned short \fBmode\fP; /* \fBPermissions\fP + SHM_DEST and
145 unsigned short __seq; /* Sequence number */
150 The least significant 9 bits of the
154 structure define the access permissions for the shared memory segment.
155 The permission bits are as follows:
166 Bits 0100, 0010, and 0001 (the execute bits) are unused by the system.
167 (It is not necessary to have execute permission on a segment
168 in order to perform a
179 Copy information from the kernel data structure associated with
183 structure pointed to by \fIbuf\fP.
184 The caller must have read permission on the
185 shared memory segment.
188 Write the values of some members of the
190 structure pointed to by
192 to the kernel data structure associated with this shared memory segment,
197 The following fields are updated:
198 \fIshm_perm.uid\fP, \fIshm_perm.gid\fP,
199 and (the least significant 9 bits of) \fIshm_perm.mode\fP.
201 The effective UID of the calling process must match the owner
204 .RI ( shm_perm.cuid )
205 of the shared memory segment, or the caller must be privileged.
208 Mark the segment to be destroyed.
209 The segment will actually be destroyed
210 only after the last process detaches it (i.e., when the
212 member of the associated structure
215 The caller must be the owner or creator of the segment, or be privileged.
220 If a segment has been marked for destruction, then the (nonstandard)
224 field in the associated data structure retrieved by
228 The caller \fImust\fP ensure that a segment is eventually destroyed;
229 otherwise its pages that were faulted in will remain in memory or swap.
231 See also the description of
232 .I /proc/sys/kernel/shm_rmid_forced
236 .BR IPC_INFO " (Linux-specific)"
237 Return information about system-wide shared memory limits and
238 parameters in the structure pointed to by
240 This structure is of type
242 (thus, a cast is required),
247 feature test macro is defined:
252 unsigned long shmmax; /* Maximum segment size */
253 unsigned long shmmin; /* Minimum segment size;
255 unsigned long shmmni; /* Maximum number of segments */
256 unsigned long shmseg; /* Maximum number of segments
257 that a process can attach;
258 unused within kernel */
259 unsigned long shmall; /* Maximum number of pages of
260 shared memory, system\-wide */
270 settings can be changed via
272 files of the same name; see
276 .BR SHM_INFO " (Linux-specific)"
279 structure whose fields contain information
280 about system resources consumed by shared memory.
281 This structure is defined in
285 feature test macro is defined:
290 int used_ids; /* # of currently existing
292 unsigned long shm_tot; /* Total number of shared
294 unsigned long shm_rss; /* # of resident shared
296 unsigned long shm_swp; /* # of swapped shared
298 unsigned long swap_attempts;
299 /* Unused since Linux 2.4 */
300 unsigned long swap_successes;
301 /* Unused since Linux 2.4 */
306 .BR SHM_STAT " (Linux-specific)"
313 argument is not a segment identifier, but instead an index into
314 the kernel's internal array that maintains information about
315 all shared memory segments on the system.
317 .BR SHM_STAT_ANY " (Linux-specific, since Linux 4.17)"
324 is not checked for read access for
326 meaning that any user can employ this operation (just as any user may read
327 .IR /proc/sysvipc/shm
328 to obtain the same information).
330 The caller can prevent or allow swapping of a shared
331 memory segment with the following \fIcmd\fP values:
333 .BR SHM_LOCK " (Linux-specific)"
334 Prevent swapping of the shared memory segment.
335 The caller must fault in
336 any pages that are required to be present after locking is enabled.
337 If a segment has been locked, then the (nonstandard)
341 field in the associated data structure retrieved by
345 .BR SHM_UNLOCK " (Linux-specific)"
346 Unlock the segment, allowing it to be swapped out.
348 In kernels before 2.6.10, only a privileged process
353 Since kernel 2.6.10, an unprivileged process can employ these operations
354 if its effective UID matches the owner or creator UID of the segment, and
357 the amount of memory to be locked falls within the
361 .\" There was some weirdness in 2.6.9: SHM_LOCK and SHM_UNLOCK could
362 .\" be applied to a segment, regardless of ownership of the segment.
363 .\" This was a botch-up in the move to RLIMIT_MEMLOCK, and was fixed
364 .\" in 2.6.10. MTK, May 2005
370 operation returns the index of the highest used entry in the
371 kernel's internal array recording information about all
372 shared memory segments.
373 (This information can be used with repeated
377 operations to obtain information about all shared memory segments
381 operation returns the identifier of the shared memory segment
382 whose index was given in
384 Other operations return 0 on success.
386 On error, \-1 is returned, and
388 is set to indicate the error.
392 \fBIPC_STAT\fP or \fBSHM_STAT\fP is requested and
393 \fIshm_perm.mode\fP does not allow read access for
395 and the calling process does not have the
397 capability in the user namespace that governs its IPC namespace.
406 but the address pointed to by
411 \fIshmid\fP points to a removed identifier.
414 \fIshmid\fP is not a valid identifier, or \fIcmd\fP
415 is not a valid command.
420 operation, the index value specified in
422 referred to an array slot that is currently unused.
425 (In kernels since 2.6.9),
427 was specified and the size of the to-be-locked segment would mean
428 that the total bytes in locked shared memory segments would exceed
429 the limit for the real user ID of the calling process.
430 This limit is defined by the
432 soft resource limit (see
436 \fBIPC_STAT\fP is attempted, and the GID or UID value
437 is too large to be stored in the structure pointed to by
441 \fBIPC_SET\fP or \fBIPC_RMID\fP is attempted, and the
442 effective user ID of the calling process is not that of the creator
448 and the process was not privileged (Linux: did not have the
452 Or (in kernels before 2.6.9),
456 was specified, but the process was not privileged
457 (Linux: did not have the
460 (Since Linux 2.6.9, this error can also occur if the
462 is 0 and the caller is not privileged.)
464 POSIX.1-2001, POSIX.1-2008, SVr4.
465 .\" SVr4 documents additional error conditions EINVAL,
466 .\" ENOENT, ENOSPC, ENOMEM, EEXIST. Neither SVr4 nor SVID documents
467 .\" an EIDRM error condition.
471 isn't required on Linux or by any version of POSIX.
473 some old implementations required the inclusion of this header file,
474 and the SVID also documented its inclusion.
475 Applications intended to be portable to such old systems may need
476 to include this header file.
477 .\" Like Linux, the FreeBSD man pages still document
478 .\" the inclusion of this header file.
485 operations are used by the
487 program to provide information on allocated resources.
488 In the future, these may modified or moved to a
490 filesystem interface.
492 Linux permits a process to attach
494 a shared memory segment that has already been marked for deletion
496 .IR shmctl(IPC_RMID) .
497 This feature is not available on other UNIX implementations;
498 portable applications should avoid relying on it.
500 Various fields in a \fIstruct shmid_ds\fP were typed as
506 To take advantage of this,
507 a recompilation under glibc-2.1.91 or later should suffice.
508 (The kernel distinguishes old and new calls by an
517 .BR capabilities (7),