]> git.ipfire.org Git - thirdparty/man-pages.git/blame - man7/inotify.7
Changes: Ready for 3.68
[thirdparty/man-pages.git] / man7 / inotify.7
CommitLineData
4d2b74dd 1'\" t
415f63be 2.\" Copyright (C) 2006, 2014 Michael Kerrisk <mtk.manpages@gmail.com>
ecd96f7c 3.\" Copyright (C) 2014 Heinrich Schuchardt <xypron.glpk@gmx.de>
4d2b74dd 4.\"
93015253 5.\" %%%LICENSE_START(VERBATIM)
4d2b74dd
MK
6.\" Permission is granted to make and distribute verbatim copies of this
7.\" manual provided the copyright notice and this permission notice are
8.\" preserved on all copies.
9.\"
10.\" Permission is granted to copy and distribute modified versions of this
11.\" manual under the conditions for verbatim copying, provided that the
12.\" entire resulting derived work is distributed under the terms of a
13.\" permission notice identical to this one.
c13182ef 14.\"
4d2b74dd
MK
15.\" Since the Linux kernel and libraries are constantly changing, this
16.\" manual page may be incorrect or out-of-date. The author(s) assume no
17.\" responsibility for errors or omissions, or for damages resulting from
10d76543
MK
18.\" the use of the information contained herein. The author(s) may not
19.\" have taken the same level of care in the production of this manual,
20.\" which is licensed free of charge, as they might when working
21.\" professionally.
c13182ef 22.\"
4d2b74dd
MK
23.\" Formatted or processed versions of this manual, if unaccompanied by
24.\" the source, must acknowledge the copyright and authors of this work.
4b72fb64 25.\" %%%LICENSE_END
4d2b74dd 26.\"
ecd96f7c 27.TH INOTIFY 7 2014-05-23 "Linux" "Linux Programmer's Manual"
4d2b74dd 28.SH NAME
9ee4a2b6 29inotify \- monitoring filesystem events
4d2b74dd
MK
30.SH DESCRIPTION
31The
c13182ef 32.I inotify
9ee4a2b6 33API provides a mechanism for monitoring filesystem events.
4d2b74dd
MK
34Inotify can be used to monitor individual files,
35or to monitor directories.
36When a directory is monitored, inotify will return events
37for the directory itself, and for files inside the directory.
38
c13182ef 39The following system calls are used with this API:
356911f6 40.IP * 3
4d2b74dd 41.BR inotify_init (2)
c13182ef 42creates an inotify instance and returns a file descriptor
a2cc46ca 43referring to the inotify instance.
43bb5faf
MK
44The more recent
45.BR inotify_init1 (2)
46is like
47.BR inotify_init (2),
356911f6
MK
48but has a
49.IR flags
50argument that provides access to some extra functionality.
51.IP *
4d2b74dd 52.BR inotify_add_watch (2)
a2cc46ca 53manipulates the "watch list" associated with an inotify instance.
3a065ac0 54Each item ("watch") in the watch list specifies the pathname of
c13182ef 55a file or directory,
4d2b74dd
MK
56along with some set of events that the kernel should monitor for the
57file referred to by that pathname.
63f6a20a 58.BR inotify_add_watch (2)
4d2b74dd
MK
59either creates a new watch item, or modifies an existing watch.
60Each watch has a unique "watch descriptor", an integer
61returned by
63f6a20a 62.BR inotify_add_watch (2)
4d2b74dd 63when the watch is created.
356911f6
MK
64.IP *
65When events occur for monitored files and directories,
66those events are made available to the application as structured data that
67can be read from the inotify file descriptor using
68.BR read (2)
69(see below).
70.IP *
4d2b74dd
MK
71.BR inotify_rm_watch (2)
72removes an item from an inotify watch list.
356911f6 73.IP *
c13182ef 74When all file descriptors referring to an inotify
356911f6
MK
75instance have been closed (using
76.BR close (2)),
c13182ef 77the underlying object and its resources are
3b777aff 78freed for reuse by the kernel;
4d2b74dd 79all associated watches are automatically freed.
6b1cc2c9
MK
80
81With careful programming,
82an application can use inotify to efficiently monitor and cache
83the state of a set of filesystem objects.
84However, robust applications should allow for the fact that bugs
85in the monitoring logic or races of the kind described below
86may leave the cache inconsistent with the filesystem state.
87It is probably wise to to do some consistency checking,
88and rebuild the cache when inconsistencies are detected.
ff6e2397 89.SS Reading events from an inotify file descriptor
4d2b74dd
MK
90To determine what events have occurred, an application
91.BR read (2)s
92from the inotify file descriptor.
c13182ef 93If no events have so far occurred, then,
11da88fb 94assuming a blocking file descriptor,
63f6a20a 95.BR read (2)
01538d0d
MK
96will block until at least one event occurs
97(unless interrupted by a signal,
98in which case the call fails with the error
99.BR EINTR ;
100see
101.BR signal (7)).
4d2b74dd
MK
102
103Each successful
63f6a20a 104.BR read (2)
4d2b74dd 105returns a buffer containing one or more of the following structures:
a08ea57c 106.in +4n
4d2b74dd
MK
107.nf
108
109struct inotify_event {
110 int wd; /* Watch descriptor */
24bbe02c
MK
111.\" FIXME . The type of the 'wd' field should probably be "int32_t".
112.\" I submitted a patch to fix this. See the LKML thread
113.\" "[patch] Fix type errors in inotify interfaces", 18 Nov 2008
6e6231c1 114.\" Glibc bug filed: http://sources.redhat.com/bugzilla/show_bug.cgi?id=7040
4d2b74dd 115 uint32_t mask; /* Mask of events */
c13182ef 116 uint32_t cookie; /* Unique cookie associating related
4d2b74dd 117 events (for rename(2)) */
84c517a4 118 uint32_t len; /* Size of \fIname\fP field */
4d2b74dd
MK
119 char name[]; /* Optional null-terminated name */
120};
121.fi
a08ea57c 122.in
4d2b74dd
MK
123
124.I wd
125identifies the watch for which this event occurs.
c13182ef 126It is one of the watch descriptors returned by a previous call to
63f6a20a 127.BR inotify_add_watch (2).
4d2b74dd
MK
128
129.I mask
130contains bits that describe the event that occurred (see below).
131
132.I cookie
133is a unique integer that connects related events.
33a0ccb2 134Currently this is used only for rename events, and
4d2b74dd 135allows the resulting pair of
bc636d8a 136.B IN_MOVED_FROM
c13182ef 137and
bc636d8a 138.B IN_MOVED_TO
4d2b74dd 139events to be connected by the application.
591b7a5f
MK
140For all other event types,
141.I cookie
142is set to 0.
4d2b74dd 143
c13182ef 144The
4d2b74dd 145.I name
33a0ccb2 146field is present only when an event is returned
c13182ef 147for a file inside a watched directory;
4d2b74dd 148it identifies the file pathname relative to the watched directory.
c13182ef 149This pathname is null-terminated,
1aff5804 150and may include further null bytes (\(aq\\0\(aq) to align subsequent reads to a
4d2b74dd
MK
151suitable address boundary.
152
153The
154.I len
c13182ef 155field counts all of the bytes in
4d2b74dd 156.IR name ,
c13182ef 157including the null bytes;
4d2b74dd
MK
158the length of each
159.I inotify_event
160structure is thus
655684a9 161.IR "sizeof(struct inotify_event)+len" .
c7e3ee6f 162
988db661 163The behavior when the buffer given to
c7e3ee6f 164.BR read (2)
988db661 165is too small to return information about the next event depends
c7e3ee6f
MK
166on the kernel version: in kernels before 2.6.21,
167.BR read (2)
168returns 0; since kernel 2.6.21,
169.BR read (2)
170fails with the error
171.BR EINVAL .
4ba272b3
MK
172Specifying a buffer of size
173
174 sizeof(struct inotify_event) + NAME_MAX + 1
175
176will be sufficient to read at least one event.
4d2b74dd 177.SS inotify events
c13182ef 178The
4d2b74dd
MK
179.BR inotify_add_watch (2)
180.I mask
c13182ef 181argument and the
4d2b74dd
MK
182.I mask
183field of the
184.I inotify_event
185structure returned when
186.BR read (2)ing
187an inotify file descriptor are both bit masks identifying
188inotify events.
189The following bits can be specified in
190.I mask
191when calling
63f6a20a 192.BR inotify_add_watch (2)
c13182ef 193and may be returned in the
4d2b74dd
MK
194.I mask
195field returned by
63f6a20a 196.BR read (2):
64aa9bcb 197.RS 4
c577b95c 198.TP
f23fc716 199.BR IN_ACCESS " (*)"
70f70c9d
MK
200File was accessed (e.g.,
201.BR read (2),
f23fc716 202.BR execve (2)).
3f174f7d 203.TP
f23fc716 204.BR IN_ATTRIB " (*)"
b0e1ac43
MK
205Metadata changed\(emfor example, permissions (e.g.,
206.BR chmod (2)),
207timestamps (e.g.,
208.BR utimensat (2)),
209extended attributes
210.RB ( setxattr (2)),
211link count (since Linux 2.6.25; e.g.,
212for the target of
213.BR link (2)
214and for
215.BR unlink (2)),
216and user/group ID (e.g.,
217.BR chown (2)).
3f174f7d 218.TP
f23fc716
MK
219.BR IN_CLOSE_WRITE " (*)"
220File opened for writing was closed.
3f174f7d 221.TP
f23fc716
MK
222.BR IN_CLOSE_NOWRITE " (*)"
223File not opened for writing was closed.
3f174f7d 224.TP
f23fc716 225.BR IN_CREATE " (*)"
7a64793b
MK
226File/directory created in watched directory (e.g.,
227.BR open (2)
228.BR O_CREAT ,
229.BR mkdir (2),
230.BR link (2),
1a737afd 231.BR symlink (2),
7a64793b
MK
232.BR bind (2)
233on a UNIX domain socket).
3f174f7d 234.TP
f23fc716
MK
235.BR IN_DELETE " (*)"
236File/directory deleted from watched directory.
3f174f7d
MK
237.TP
238.B IN_DELETE_SELF
239Watched file/directory was itself deleted.
4a1e4cca
MK
240(This event also occurs if an object is moved to another filesystem,
241since
242.BR mv (1)
243in effect copies the file to the other filesystem and
49b07b8f 244then deletes it from the original filesystem.)
39f43968
MK
245In addition, an
246.B IN_IGNORED
247event will subsequently be generated for the watch descriptor.
3f174f7d 248.TP
f23fc716 249.BR IN_MODIFY " (*)"
f54a1255
MK
250File was modified (e.g.,
251.BR write (2),
252.BR truncate (2)).
3f174f7d
MK
253.TP
254.B IN_MOVE_SELF
255Watched file/directory was itself moved.
256.TP
f23fc716 257.BR IN_MOVED_FROM " (*)"
107375cf 258Generated for the directory containing the old filename
f23fc716 259when a file is renamed.
3f174f7d 260.TP
f23fc716 261.BR IN_MOVED_TO " (*)"
107375cf 262Generated for the directory containing the new filename
f23fc716 263when a file is renamed.
3f174f7d 264.TP
f23fc716
MK
265.BR IN_OPEN " (*)"
266File was opened.
64aa9bcb 267.RE
4d2b74dd 268.PP
c13182ef
MK
269When monitoring a directory,
270the events marked with an asterisk (*) above can occur for
4d2b74dd
MK
271files in the directory, in which case the
272.I name
273field in the returned
274.I inotify_event
275structure identifies the name of the file within the directory.
276.PP
277The
278.B IN_ALL_EVENTS
279macro is defined as a bit mask of all of the above events.
280This macro can be used as the
281.I mask
282argument when calling
63f6a20a 283.BR inotify_add_watch (2).
4d2b74dd 284
dede00fe 285Two additional convenience macros are defined:
64aa9bcb 286.RS 4
dede00fe
MK
287.TP
288.BR IN_MOVE
289Equates to
290.BR "IN_MOVED_FROM | IN_MOVED_TO" .
291.TP
292.BR IN_CLOSE
293Equates to
294.BR "IN_CLOSE_WRITE | IN_CLOSE_NOWRITE" .
64aa9bcb 295.RE
4d2b74dd 296.PP
c13182ef 297The following further bits can be specified in
4d2b74dd
MK
298.I mask
299when calling
63f6a20a 300.BR inotify_add_watch (2):
64aa9bcb 301.RS 4
c577b95c 302.TP
31daf529 303.BR IN_DONT_FOLLOW " (since Linux 2.6.15)"
aeb9b6a6
MK
304Don't dereference
305.I pathname
306if it is a symbolic link.
dda869a4 307.TP
0ff2cc88 308.BR IN_EXCL_UNLINK " (since Linux 2.6.36)"
b3ad7609
MK
309.\" commit 8c1934c8d70b22ca8333b216aec6c7d09fdbd6a6
310By default, when watching events on the children of a directory,
311events are generated for children even after they have been unlinked
312from the directory.
313This can result in large numbers of uninteresting events for
314some applications (e.g., if watching
315.IR /tmp ,
316in which many applications create temporary files whose
317names are immediately unlinked).
318Specifying
319.B IN_EXCL_UNLINK
320changes the default behavior,
321so that events are not generated for children after
322they have been unlinked from the watched directory.
323.TP
dda869a4
MK
324.B IN_MASK_ADD
325Add (OR) events to watch mask for this pathname if
326it already exists (instead of replacing mask).
327.TP
328.B IN_ONESHOT
aeb9b6a6
MK
329Monitor
330.I pathname
331for one event, then remove from
dda869a4
MK
332watch list.
333.TP
31daf529 334.BR IN_ONLYDIR " (since Linux 2.6.15)"
aeb9b6a6
MK
335Only watch
336.I pathname
337if it is a directory.
64aa9bcb 338.RE
4d2b74dd
MK
339.PP
340The following bits may be set in the
341.I mask
342field returned by
63f6a20a 343.BR read (2):
64aa9bcb 344.RS 4
c577b95c 345.TP
dda869a4 346.B IN_IGNORED
aeb9b6a6
MK
347Watch was removed explicitly
348.RB ( inotify_rm_watch (2))
9ee4a2b6 349or automatically (file was deleted, or filesystem was unmounted).
7b5151b7 350See also BUGS.
dda869a4
MK
351.TP
352.B IN_ISDIR
353Subject of this event is a directory.
354.TP
355.B IN_Q_OVERFLOW
aeb9b6a6
MK
356Event queue overflowed
357.RI ( wd
358is \-1 for this event).
dda869a4
MK
359.TP
360.B IN_UNMOUNT
9ee4a2b6 361Filesystem containing watched object was unmounted.
b01c936e
MK
362In addition, an
363.B IN_IGNORED
364event will subsequently be generated for the watch descriptor.
64aa9bcb 365.RE
415f63be
MK
366.SS Examples
367Suppose an application is watching the directory
368.I dir
369and the file
370.IR dir/myfile
371for all events.
372The examples below show some events that will be generated
373for these two objects.
374.RS 4
375.TP
376fd = open("dir/myfile", O_RDWR);
377Generates
378.B IN_OPEN
379events for both
380.I dir
381and
382.IR dir/myfile .
383.TP
384read(fd, buf, count);
385Generates
386.B IN_ACCESS
387events for both
388.I dir
389and
390.IR dir/myfile .
391.TP
392write(fd, buf, count);
393Generates
394.B IN_MODIFY
395events for both
396.I dir
397and
398.IR dir/myfile .
399.TP
400fchmod(fd, mode);
401Generates
402.B IN_ATTRIB
403events for both
404.I dir
405and
406.IR dir/myfile .
407.TP
408close(fd);
409Generates
410.B IN_CLOSE_WRITE
411events for both
412.I dir
413and
414.IR dir/myfile .
415.RE
416.PP
417Suppose an application is watching the directories
418.I dir1
419and
d2c3d8a8 420.IR dir2 ,
415f63be
MK
421and the file
422.IR dir1/myfile .
423The following examples show some events that may be generated.
424.RS 4
425.TP
d2c3d8a8 426link("dir1/myfile", "dir2/new");
415f63be
MK
427Generates an
428.B IN_ATTRIB
429event for
430.IR myfile
431and an
432.B IN_CREATE
433event for
434.IR dir2 .
435.TP
436rename("dir1/myfile", "dir2/myfile");
437Generates an
438.B IN_MOVED_FROM
439event for
440.IR dir1 ,
441an
442.B IN_MOVED_TO
443event for
444.IR dir2 ,
445and an
446.B IN_MOVE_SELF
447event for
448.IR myfile .
449The
450.B IN_MOVED_FROM
451and
452.B IN_MOVED_TO
453events will have the same
454.I cookie
455value.
456.RE
457.PP
458Suppose that
459.IR dir1/xx
460and
461.IR dir2/yy
462are (the only) links to the same file, and an application is watching
463.IR dir1 ,
464.IR dir2 ,
465.IR dir1/xx ,
466and
467.IR dir2/yy .
468Executing the following calls in the order given below will generate
469the following events:
470.RS 4
471.TP
472unlink("dir2/yy");
d2c3d8a8 473Generates an
415f63be
MK
474.BR IN_ATTRIB
475event for
476.IR xx
477(because its link count changes)
478and an
479.B IN_DELETE
480event for
481.IR dir2 .
482.TP
483unlink("dir1/xx");
484Generates
485.BR IN_ATTRIB ,
486.BR IN_DELETE_SELF ,
487and
488.BR IN_IGNORED
489events for
490.IR xx ,
491and an
492.BR IN_DELETE
d2c3d8a8 493event for
415f63be
MK
494.IR dir1 .
495.RE
496.PP
497Suppose an application is watching the directory
498.IR dir
499and (the empty) directory
500.IR dir/subdir .
501The following examples show some events that may be generated.
502.RS 4
503.TP
504mkdir("dir/new", mode);
505Generates an
506.B "IN_CREATE | IN_ISDIR"
507event for
508.IR dir .
509.TP
d2c3d8a8 510rmdir("dir/subdir");
415f63be
MK
511Generates
512.B IN_DELETE_SELF
513and
514.B IN_IGNORED
515events for
516.IR subdir ,
517and an
518.B "IN_DELETE | IN_ISDIR"
519event for
520.IR dir .
521.RE
4d2b74dd 522.SS /proc interfaces
c13182ef 523The following interfaces can be used to limit the amount of
4d2b74dd
MK
524kernel memory consumed by inotify:
525.TP
0daa9e92 526.I /proc/sys/fs/inotify/max_queued_events
4d2b74dd
MK
527The value in this file is used when an application calls
528.BR inotify_init (2)
c13182ef 529to set an upper limit on the number of events that can be
4d2b74dd
MK
530queued to the corresponding inotify instance.
531Events in excess of this limit are dropped, but an
532.B IN_Q_OVERFLOW
533event is always generated.
534.TP
0daa9e92 535.I /proc/sys/fs/inotify/max_user_instances
c13182ef 536This specifies an upper limit on the number of inotify instances
4d2b74dd
MK
537that can be created per real user ID.
538.TP
0daa9e92 539.I /proc/sys/fs/inotify/max_user_watches
31546b46
VN
540This specifies an upper limit on the number of watches
541that can be created per real user ID.
47297adb 542.SH VERSIONS
2b2581ee
MK
543Inotify was merged into the 2.6.13 Linux kernel.
544The required library interfaces were added to glibc in version 2.4.
545.RB ( IN_DONT_FOLLOW ,
546.BR IN_MASK_ADD ,
547and
548.B IN_ONLYDIR
64aa9bcb 549were added in glibc version 2.5.)
47297adb 550.SH CONFORMING TO
8382f16d 551The inotify API is Linux-specific.
47297adb 552.SH NOTES
4d2b74dd
MK
553Inotify file descriptors can be monitored using
554.BR select (2),
555.BR poll (2),
c13182ef 556and
2315114c 557.BR epoll (7).
0000daa5
MK
558When an event is available, the file descriptor indicates as readable.
559
560Since Linux 2.6.25,
561signal-driven I/O notification is available for inotify file descriptors;
562see the discussion of
563.B F_SETFL
564(for setting the
565.B O_ASYNC
566flag),
567.BR F_SETOWN ,
568and
569.B F_SETSIG
570in
571.BR fcntl (2).
572The
573.I siginfo_t
574structure (described in
575.BR sigaction (2))
576that is passed to the signal handler has the following fields set:
577.IR si_fd
578is set to the inotify file descriptor number;
579.IR si_signo
580is set to the signal number;
581.IR si_code
582is set to
583.BR POLL_IN ;
584and
585.B POLLIN
586is set in
587.IR si_band .
4d2b74dd 588
c13182ef
MK
589If successive output inotify events produced on the
590inotify file descriptor are identical (same
591.IR wd ,
592.IR mask ,
4d2b74dd
MK
593.IR cookie ,
594and
3f3698d8 595.IR name ),
6f0ab035
MK
596then they are coalesced into a single event if the
597older event has not yet been read (but see BUGS).
8856aab8
MK
598This reduces the amount of kernel memory required for the event queue,
599but also means that an application can't use inotify to reliably count
600file events.
4d2b74dd 601
c13182ef
MK
602The events returned by reading from an inotify file descriptor
603form an ordered queue.
604Thus, for example, it is guaranteed that when renaming from
605one directory to another, events will be produced in the
4d2b74dd
MK
606correct order on the inotify file descriptor.
607
608The
609.B FIONREAD
63f6a20a 610.BR ioctl (2)
c13182ef 611returns the number of bytes available to read from an
4d2b74dd 612inotify file descriptor.
613836aa 613.SS Limitations and caveats
67898fdf
MK
614The inotify API provides no information about the user or process that
615triggered the inotify event.
616In particular, there is no easy
617way for a process that is monitoring events via inotify
618to distinguish events that it triggers
619itself from those that are triggered by other processes.
620
e226bed7
MK
621Inotify reports only events that a user-space program triggers through
622the filesystem API.
623As a result, it does not catch remote events that occur
624on network filesystems.
625(Applications must fall back to polling the filesystem
626to catch such events.)
fa1d49a6 627Furthermore, various pseudo-filesystems such as
e226bed7
MK
628.IR /proc ,
629.IR /sys ,
630and
631.IR /dev/pts
632are not monitorable with inotify.
633
e449e5f1
MK
634The inotify API does not report file accesses and modifications that
635may occur because of
7a8110f6
HS
636.BR mmap (2),
637.BR msync (2),
e449e5f1 638and
7a8110f6 639.BR munmap (2).
e449e5f1 640
67898fdf
MK
641The inotify API identifies affected files by filename.
642However, by the time an application processes an inotify event,
643the filename may already have been deleted or renamed.
644
da977073 645The inotify API identifies events via watch descriptors.
264276c6
MK
646It is the application's responsibility to cache a mapping
647(if one is needed) between watch descriptors and pathnames.
648Be aware that directory renamings may affect multiple cached pathnames.
649
4d2b74dd
MK
650Inotify monitoring of directories is not recursive:
651to monitor subdirectories under a directory,
652additional watches must be created.
613836aa
MK
653This can take a significant amount time for large directory trees.
654
a79d28b2
MK
655If monitoring an entire directory subtree,
656and a new subdirectory is created in that tree or an existing directory
657is renamed into that tree,
658be aware that by the time you create a watch for the new subdirectory,
659new files (and subdirectories) may already exist inside the subdirectory.
660Therefore, you may want to scan the contents of the subdirectory
661immediately after adding the watch (and, if desired,
662recursively add watches for any subdirectories that it contains).
663
613836aa
MK
664Note that the event queue can overflow.
665In this case, events are lost.
09fa72fa 666Robust applications should handle the possibility of
613836aa 667lost events gracefully.
94d52c15
MK
668For example, it may be necessary to rebuild part or all of
669the application cache.
670(One simple, but possibly expensive,
671approach is to close the inotify file descriptor, empty the cache,
85e179c5 672create a new inotify file descriptor,
94d52c15
MK
673and then re-create watches and cache entries
674for the objects to be monitored.)
85e179c5 675.SS Dealing with rename() events
fa51f4d9 676As noted above, the
85e179c5
MK
677.B IN_MOVED_FROM
678and
679.B IN_MOVED_TO
fa51f4d9 680event pair that is generated by
85e179c5 681.BR rename (2)
fa51f4d9
MK
682can be matched up via their shared cookie value.
683However, the task of matching has some challenges.
684
685These two events are usually consecutive in the event stream available
686when reading from the inotify file descriptor.
85e179c5
MK
687However, this is not guaranteed.
688If multiple processes are triggering events for monitored objects,
689then (on rare occasions) an arbitrary number of
690other events may appear between the
691.B IN_MOVED_FROM
692and
693.B IN_MOVED_TO
694events.
695
696Matching up the
697.B IN_MOVED_FROM
698and
699.B IN_MOVED_TO
700event pair generated by
701.BR rename (2)
702is thus inherently racy.
703(Don't forget that if an object is renamed outside of a monitored directory,
704there may not even be an
705.BR IN_MOVED_TO
706event.)
707Heuristic approaches (e.g., assume the events are always consecutive)
708can be used to ensure a match in most cases,
709but will inevitably miss some cases,
710causing the application to perceive the
711.B IN_MOVED_FROM
712and
713.B IN_MOVED_TO
714events as being unrelated.
715If watch descriptors are destroyed and re-created as a result,
716then those watch descriptors will be inconsistent with
717the watch descriptors in any pending events.
6f1a4954 718(Re-creating the inotify file descriptor and rebuilding the cache may
85e179c5
MK
719be useful to deal with this scenario.)
720
721Applications should also allow for the possibility that the
722.B IN_MOVED_FROM
723event was the last event that could fit in the buffer
724returned by the current call to
725.BR read (2),
726and the accompanying
727.B IN_MOVED_TO
728event might be fetched only on the next
729.BR read (2).
47297adb 730.SH BUGS
a15ead5e
MK
731.\" FIXME kernel commit 611da04f7a31b2208e838be55a42c7a1310ae321
732.\" implies that unmount events were buggy 2.6.11 to 2.6.36
733.\"
ed7b0235
MK
734In kernels before 2.6.16, the
735.B IN_ONESHOT
c13182ef 736.I mask
ed7b0235 737flag does not work.
6f0ab035 738
7b5151b7
MK
739As originally designed and implemented, the
740.B IN_ONESHOT
741flag did not cause an
742.B IN_IGNORED
743event to be generated when the watch was dropped after one event.
744However, as an unintended effect of other changes,
745since Linux 2.6.36, an
746.B IN_IGNORED
747event is generated in this case.
748
6f0ab035 749Before kernel 2.6.25,
22129aa9 750.\" commit 1c17d18e3775485bf1e0ce79575eb637a94494a2
9ed6b517 751the kernel code that was intended to coalesce successive identical events
6f0ab035
MK
752(i.e., the two most recent events could potentially be coalesced
753if the older had not yet been read)
754instead checked if the most recent event could be coalesced with the
755.I oldest
756unread event.
ecd96f7c
HS
757.SH EXAMPLE
758The following program demonstrates the usage of the inotify API.
759It marks the directories passed as a command-line arguments
760and waits for events of type
761.BR IN_OPEN ,
762.BR IN_CLOSE_NOWRITE
763and
764.BR IN_CLOSE_WRITE .
765.PP
766The following output was recorded while editing the file
767.I /home/user/temp/foo
768and listing directory
769.IR /tmp .
770Before the file and the directory were opened,
771.B IN_OPEN
772events occurred.
773After the file was closed, an
774.B IN_CLOSE_WRITE
775event occurred.
776After the directory was closed, an
777.B IN_CLOSE_NOWRITE
778event occurred.
779Execution of the program ended when the user pressed the ENTER key.
780.SS Example output
781.in +4n
782.nf
2483209a 783$ \fB./a.out /tmp /home/user/temp\fP
ecd96f7c
HS
784Press enter key to terminate.
785Listening for events.
786IN_OPEN: /home/user/temp/foo [file]
787IN_CLOSE_WRITE: /home/user/temp/foo [file]
788IN_OPEN: /tmp/ [directory]
789IN_CLOSE_NOWRITE: /tmp/ [directory]
790
791Listening for events stopped.
792.fi
793.in
794.SS Program source
795.nf
796#include <errno.h>
797#include <poll.h>
798#include <stdio.h>
799#include <stdlib.h>
800#include <sys/inotify.h>
801#include <unistd.h>
802
803/* Read all available inotify events from the file descriptor 'fd'.
804 wd is the table of watch descriptors for the directories in argv.
805 argc is the length of wd and argv.
806 argv is the list of watched directories.
807 Entry 0 of wd and argv is unused. */
808
809static void
810handle_events(int fd, int *wd, int argc, char* argv[])
811{
2483209a
MK
812 /* Some systems cannot read integer variables if they are not
813 properly aligned. On other systems, incorrect alignment may
814 decrease performance. Hence, the buffer used for reading from
815 the inotify file descriptor should have the same alignment as
ecd96f7c 816 struct inotify_event. */
2483209a 817
ecd96f7c 818 char buf[4096]
2483209a 819 __attribute__ ((aligned(__alignof__(struct inotify_event))));
ecd96f7c
HS
820 const struct inotify_event *event;
821 int i;
822 ssize_t len;
823 char *ptr;
824
825 /* Loop while events can be read from inotify file descriptor. */
826
827 for (;;) {
828
829 /* Read some events. */
830
831 len = read(fd, buf, sizeof buf);
832 if (len == \-1 && errno != EAGAIN) {
833 perror("read");
834 exit(EXIT_FAILURE);
835 }
836
837 /* If the nonblocking read() found no events to read, then
838 it returns \-1 with errno set to EAGAIN. In that case,
839 we exit the loop. */
840
841 if (len <= 0)
842 break;
843
844 /* Loop over all events in the buffer */
845
846 for (ptr = buf; ptr < buf + len;
2483209a 847 ptr += sizeof(struct inotify_event) + event\->len) {
ecd96f7c
HS
848
849 event = (const struct inotify_event *) ptr;
850
851 /* Print event type */
852
853 if (event\->mask & IN_OPEN)
854 printf("IN_OPEN: ");
855 if (event\->mask & IN_CLOSE_NOWRITE)
856 printf("IN_CLOSE_NOWRITE: ");
857 if (event\->mask & IN_CLOSE_WRITE)
858 printf("IN_CLOSE_WRITE: ");
859
860 /* Print the name of the watched directory */
861
862 for (i = 1; i < argc; ++i) {
863 if (wd[i] == event\->wd) {
864 printf("%s/", argv[i]);
865 break;
866 }
867 }
868
869 /* Print the name of the file */
870
871 if (event\->len)
872 printf("%s", event\->name);
873
874 /* Print type of filesystem object */
875
876 if (event\->mask & IN_ISDIR)
877 printf(" [directory]\\n");
878 else
879 printf(" [file]\\n");
ecd96f7c
HS
880 }
881 }
882}
883
884int
885main(int argc, char* argv[])
886{
887 char buf;
888 int fd, i, poll_num;
889 int *wd;
890 nfds_t nfds;
891 struct pollfd fds[2];
892
893 if (argc < 2) {
894 printf("Usage: %s PATH [PATH ...]\\n", argv[0]);
895 exit(EXIT_FAILURE);
896 }
897
898 printf("Press ENTER key to terminate.\\n");
899
900 /* Create the file descriptor for accessing the inotify API */
901
902 fd = inotify_init1(IN_NONBLOCK);
903 if (fd == \-1) {
904 perror("inotify_init1");
905 exit(EXIT_FAILURE);
906 }
907
908 /* Allocate memory for watch descriptors */
909
910 wd = calloc(argc, sizeof(int));
911 if (wd == NULL) {
912 perror("calloc");
913 exit(EXIT_FAILURE);
914 }
915
916 /* Mark directories for events
917 \- file was opened
918 \- file was closed */
919
920 for (i = 1; i < argc; i++) {
921 wd[i] = inotify_add_watch(fd, argv[i],
922 IN_OPEN | IN_CLOSE);
923 if (wd[i] == \-1) {
924 fprintf(stderr, "Cannot watch '%s'\\n", argv[i]);
925 perror("inotify_add_watch");
926 exit(EXIT_FAILURE);
927 }
928 }
929
930 /* Prepare for polling */
931
932 nfds = 2;
933
934 /* Console input */
935
936 fds[0].fd = STDIN_FILENO;
937 fds[0].events = POLLIN;
938
939 /* Inotify input */
940
941 fds[1].fd = fd;
942 fds[1].events = POLLIN;
943
944 /* Wait for events and/or terminal input */
945
946 printf("Listening for events.\\n");
947 while (1) {
948 poll_num = poll(fds, nfds, \-1);
949 if (poll_num == \-1) {
950 if (errno == EINTR)
951 continue;
952 perror("poll");
953 exit(EXIT_FAILURE);
954 }
2483209a 955
ecd96f7c
HS
956 if (poll_num > 0) {
957
958 if (fds[0].revents & POLLIN) {
959
960 /* Console input is available. Empty stdin and quit */
961
962 while (read(STDIN_FILENO, &buf, 1) > 0 && buf != '\\n')
963 continue;
964 break;
965 }
2483209a 966
ecd96f7c
HS
967 if (fds[1].revents & POLLIN) {
968
969 /* Inotify events are available */
2483209a 970
ecd96f7c
HS
971 handle_events(fd, wd, argc, argv);
972 }
973 }
974 }
975
2483209a
MK
976 printf("Listening for events stopped.\\n");
977
ecd96f7c
HS
978 /* Close inotify file descriptor */
979
980 close(fd);
2483209a 981
ecd96f7c 982 free(wd);
ecd96f7c
HS
983 exit(EXIT_SUCCESS);
984}
985.fi
47297adb 986.SH SEE ALSO
f0afb16a
MK
987.BR inotifywait (1),
988.BR inotifywatch (1),
4d2b74dd
MK
989.BR inotify_add_watch (2),
990.BR inotify_init (2),
43bb5faf 991.BR inotify_init1 (2),
4d2b74dd
MK
992.BR inotify_rm_watch (2),
993.BR read (2),
f75d27e6
HS
994.BR stat (2),
995.BR fanotify (7)
173fe7e7
DP
996
997.IR Documentation/filesystems/inotify.txt
998in the Linux kernel source tree