Updated: October 28, 2024 |
Sealing a shared memory object is a way for the creator of the object to prevent other processes from changing the object's physical layout, even if they're allowed to change the memory contents.
The layout includes the size of the object, backing memory, and anything else that can be modified via shm_ctl(). To do this, the creator of the object specifies the SHMCTL_SEAL flag when calling shm_ctl(). Once the object is sealed, no process (including the object's creator) can use shm_ctl() to modify the object's layout or flags, and attempts to do so fail with an error of EPERM.
You can call shm_ctl() with the SHMCTL_GET_FLAGS flag to get a shared memory object's flags, whether or not the object is sealed. One use for this is to determine if the object has been sealed; for example, the recipient could decide that it doesn't want to work with an unsealed object.