]> git.ipfire.org Git - thirdparty/man-pages.git/blame - man7/inotify.7
inotify.7: wfix
[thirdparty/man-pages.git] / man7 / inotify.7
CommitLineData
4d2b74dd 1'\" t
415f63be 2.\" Copyright (C) 2006, 2014 Michael Kerrisk <mtk.manpages@gmail.com>
ecd96f7c 3.\" Copyright (C) 2014 Heinrich Schuchardt <xypron.glpk@gmx.de>
4d2b74dd 4.\"
93015253 5.\" %%%LICENSE_START(VERBATIM)
4d2b74dd
MK
6.\" Permission is granted to make and distribute verbatim copies of this
7.\" manual provided the copyright notice and this permission notice are
8.\" preserved on all copies.
9.\"
10.\" Permission is granted to copy and distribute modified versions of this
11.\" manual under the conditions for verbatim copying, provided that the
12.\" entire resulting derived work is distributed under the terms of a
13.\" permission notice identical to this one.
c13182ef 14.\"
4d2b74dd
MK
15.\" Since the Linux kernel and libraries are constantly changing, this
16.\" manual page may be incorrect or out-of-date. The author(s) assume no
17.\" responsibility for errors or omissions, or for damages resulting from
10d76543
MK
18.\" the use of the information contained herein. The author(s) may not
19.\" have taken the same level of care in the production of this manual,
20.\" which is licensed free of charge, as they might when working
21.\" professionally.
c13182ef 22.\"
4d2b74dd
MK
23.\" Formatted or processed versions of this manual, if unaccompanied by
24.\" the source, must acknowledge the copyright and authors of this work.
4b72fb64 25.\" %%%LICENSE_END
4d2b74dd 26.\"
ecd96f7c 27.TH INOTIFY 7 2014-05-23 "Linux" "Linux Programmer's Manual"
4d2b74dd 28.SH NAME
9ee4a2b6 29inotify \- monitoring filesystem events
4d2b74dd
MK
30.SH DESCRIPTION
31The
c13182ef 32.I inotify
9ee4a2b6 33API provides a mechanism for monitoring filesystem events.
4d2b74dd
MK
34Inotify can be used to monitor individual files,
35or to monitor directories.
36When a directory is monitored, inotify will return events
37for the directory itself, and for files inside the directory.
38
c13182ef 39The following system calls are used with this API:
356911f6 40.IP * 3
4d2b74dd 41.BR inotify_init (2)
c13182ef 42creates an inotify instance and returns a file descriptor
a2cc46ca 43referring to the inotify instance.
43bb5faf
MK
44The more recent
45.BR inotify_init1 (2)
46is like
47.BR inotify_init (2),
356911f6
MK
48but has a
49.IR flags
50argument that provides access to some extra functionality.
51.IP *
4d2b74dd 52.BR inotify_add_watch (2)
a2cc46ca 53manipulates the "watch list" associated with an inotify instance.
3a065ac0 54Each item ("watch") in the watch list specifies the pathname of
c13182ef 55a file or directory,
4d2b74dd
MK
56along with some set of events that the kernel should monitor for the
57file referred to by that pathname.
63f6a20a 58.BR inotify_add_watch (2)
4d2b74dd
MK
59either creates a new watch item, or modifies an existing watch.
60Each watch has a unique "watch descriptor", an integer
61returned by
63f6a20a 62.BR inotify_add_watch (2)
4d2b74dd 63when the watch is created.
356911f6
MK
64.IP *
65When events occur for monitored files and directories,
66those events are made available to the application as structured data that
67can be read from the inotify file descriptor using
68.BR read (2)
69(see below).
70.IP *
4d2b74dd
MK
71.BR inotify_rm_watch (2)
72removes an item from an inotify watch list.
356911f6 73.IP *
c13182ef 74When all file descriptors referring to an inotify
356911f6
MK
75instance have been closed (using
76.BR close (2)),
c13182ef 77the underlying object and its resources are
3b777aff 78freed for reuse by the kernel;
4d2b74dd 79all associated watches are automatically freed.
6b1cc2c9
MK
80
81With careful programming,
82an application can use inotify to efficiently monitor and cache
83the state of a set of filesystem objects.
84However, robust applications should allow for the fact that bugs
85in the monitoring logic or races of the kind described below
86may leave the cache inconsistent with the filesystem state.
87It is probably wise to to do some consistency checking,
88and rebuild the cache when inconsistencies are detected.
ff6e2397 89.SS Reading events from an inotify file descriptor
4d2b74dd
MK
90To determine what events have occurred, an application
91.BR read (2)s
92from the inotify file descriptor.
c13182ef 93If no events have so far occurred, then,
11da88fb 94assuming a blocking file descriptor,
63f6a20a 95.BR read (2)
01538d0d
MK
96will block until at least one event occurs
97(unless interrupted by a signal,
98in which case the call fails with the error
99.BR EINTR ;
100see
101.BR signal (7)).
4d2b74dd
MK
102
103Each successful
63f6a20a 104.BR read (2)
4d2b74dd 105returns a buffer containing one or more of the following structures:
a08ea57c 106.in +4n
4d2b74dd
MK
107.nf
108
109struct inotify_event {
110 int wd; /* Watch descriptor */
24bbe02c
MK
111.\" FIXME . The type of the 'wd' field should probably be "int32_t".
112.\" I submitted a patch to fix this. See the LKML thread
113.\" "[patch] Fix type errors in inotify interfaces", 18 Nov 2008
6e6231c1 114.\" Glibc bug filed: http://sources.redhat.com/bugzilla/show_bug.cgi?id=7040
425ad621 115 uint32_t mask; /* Mask describing event */
c13182ef 116 uint32_t cookie; /* Unique cookie associating related
4d2b74dd 117 events (for rename(2)) */
84c517a4 118 uint32_t len; /* Size of \fIname\fP field */
4d2b74dd
MK
119 char name[]; /* Optional null-terminated name */
120};
121.fi
a08ea57c 122.in
4d2b74dd
MK
123
124.I wd
125identifies the watch for which this event occurs.
c13182ef 126It is one of the watch descriptors returned by a previous call to
63f6a20a 127.BR inotify_add_watch (2).
4d2b74dd
MK
128
129.I mask
130contains bits that describe the event that occurred (see below).
131
132.I cookie
133is a unique integer that connects related events.
33a0ccb2 134Currently this is used only for rename events, and
4d2b74dd 135allows the resulting pair of
bc636d8a 136.B IN_MOVED_FROM
c13182ef 137and
bc636d8a 138.B IN_MOVED_TO
4d2b74dd 139events to be connected by the application.
591b7a5f
MK
140For all other event types,
141.I cookie
142is set to 0.
4d2b74dd 143
c13182ef 144The
4d2b74dd 145.I name
33a0ccb2 146field is present only when an event is returned
c13182ef 147for a file inside a watched directory;
4d2b74dd 148it identifies the file pathname relative to the watched directory.
c13182ef 149This pathname is null-terminated,
1aff5804 150and may include further null bytes (\(aq\\0\(aq) to align subsequent reads to a
4d2b74dd
MK
151suitable address boundary.
152
153The
154.I len
c13182ef 155field counts all of the bytes in
4d2b74dd 156.IR name ,
c13182ef 157including the null bytes;
4d2b74dd
MK
158the length of each
159.I inotify_event
160structure is thus
655684a9 161.IR "sizeof(struct inotify_event)+len" .
c7e3ee6f 162
988db661 163The behavior when the buffer given to
c7e3ee6f 164.BR read (2)
988db661 165is too small to return information about the next event depends
c7e3ee6f
MK
166on the kernel version: in kernels before 2.6.21,
167.BR read (2)
168returns 0; since kernel 2.6.21,
169.BR read (2)
170fails with the error
171.BR EINVAL .
4ba272b3
MK
172Specifying a buffer of size
173
174 sizeof(struct inotify_event) + NAME_MAX + 1
175
176will be sufficient to read at least one event.
4d2b74dd 177.SS inotify events
c13182ef 178The
4d2b74dd
MK
179.BR inotify_add_watch (2)
180.I mask
c13182ef 181argument and the
4d2b74dd
MK
182.I mask
183field of the
184.I inotify_event
185structure returned when
186.BR read (2)ing
187an inotify file descriptor are both bit masks identifying
188inotify events.
189The following bits can be specified in
190.I mask
191when calling
63f6a20a 192.BR inotify_add_watch (2)
c13182ef 193and may be returned in the
4d2b74dd
MK
194.I mask
195field returned by
63f6a20a 196.BR read (2):
64aa9bcb 197.RS 4
c577b95c 198.TP
f23fc716 199.BR IN_ACCESS " (*)"
70f70c9d
MK
200File was accessed (e.g.,
201.BR read (2),
f23fc716 202.BR execve (2)).
3f174f7d 203.TP
f23fc716 204.BR IN_ATTRIB " (*)"
b0e1ac43
MK
205Metadata changed\(emfor example, permissions (e.g.,
206.BR chmod (2)),
207timestamps (e.g.,
208.BR utimensat (2)),
209extended attributes
210.RB ( setxattr (2)),
211link count (since Linux 2.6.25; e.g.,
212for the target of
213.BR link (2)
214and for
215.BR unlink (2)),
216and user/group ID (e.g.,
217.BR chown (2)).
3f174f7d 218.TP
f23fc716
MK
219.BR IN_CLOSE_WRITE " (*)"
220File opened for writing was closed.
3f174f7d 221.TP
f23fc716
MK
222.BR IN_CLOSE_NOWRITE " (*)"
223File not opened for writing was closed.
3f174f7d 224.TP
f23fc716 225.BR IN_CREATE " (*)"
7a64793b
MK
226File/directory created in watched directory (e.g.,
227.BR open (2)
228.BR O_CREAT ,
229.BR mkdir (2),
230.BR link (2),
1a737afd 231.BR symlink (2),
7a64793b
MK
232.BR bind (2)
233on a UNIX domain socket).
3f174f7d 234.TP
f23fc716
MK
235.BR IN_DELETE " (*)"
236File/directory deleted from watched directory.
3f174f7d
MK
237.TP
238.B IN_DELETE_SELF
239Watched file/directory was itself deleted.
4a1e4cca
MK
240(This event also occurs if an object is moved to another filesystem,
241since
242.BR mv (1)
243in effect copies the file to the other filesystem and
49b07b8f 244then deletes it from the original filesystem.)
39f43968
MK
245In addition, an
246.B IN_IGNORED
247event will subsequently be generated for the watch descriptor.
3f174f7d 248.TP
f23fc716 249.BR IN_MODIFY " (*)"
f54a1255
MK
250File was modified (e.g.,
251.BR write (2),
252.BR truncate (2)).
3f174f7d
MK
253.TP
254.B IN_MOVE_SELF
255Watched file/directory was itself moved.
256.TP
f23fc716 257.BR IN_MOVED_FROM " (*)"
107375cf 258Generated for the directory containing the old filename
f23fc716 259when a file is renamed.
3f174f7d 260.TP
f23fc716 261.BR IN_MOVED_TO " (*)"
107375cf 262Generated for the directory containing the new filename
f23fc716 263when a file is renamed.
3f174f7d 264.TP
f23fc716
MK
265.BR IN_OPEN " (*)"
266File was opened.
64aa9bcb 267.RE
4d2b74dd 268.PP
c13182ef
MK
269When monitoring a directory,
270the events marked with an asterisk (*) above can occur for
4d2b74dd
MK
271files in the directory, in which case the
272.I name
273field in the returned
274.I inotify_event
275structure identifies the name of the file within the directory.
276.PP
277The
278.B IN_ALL_EVENTS
279macro is defined as a bit mask of all of the above events.
280This macro can be used as the
281.I mask
282argument when calling
63f6a20a 283.BR inotify_add_watch (2).
4d2b74dd 284
dede00fe 285Two additional convenience macros are defined:
64aa9bcb 286.RS 4
dede00fe
MK
287.TP
288.BR IN_MOVE
289Equates to
290.BR "IN_MOVED_FROM | IN_MOVED_TO" .
291.TP
292.BR IN_CLOSE
293Equates to
294.BR "IN_CLOSE_WRITE | IN_CLOSE_NOWRITE" .
64aa9bcb 295.RE
4d2b74dd 296.PP
c13182ef 297The following further bits can be specified in
4d2b74dd
MK
298.I mask
299when calling
63f6a20a 300.BR inotify_add_watch (2):
64aa9bcb 301.RS 4
c577b95c 302.TP
31daf529 303.BR IN_DONT_FOLLOW " (since Linux 2.6.15)"
aeb9b6a6
MK
304Don't dereference
305.I pathname
306if it is a symbolic link.
dda869a4 307.TP
0ff2cc88 308.BR IN_EXCL_UNLINK " (since Linux 2.6.36)"
b3ad7609
MK
309.\" commit 8c1934c8d70b22ca8333b216aec6c7d09fdbd6a6
310By default, when watching events on the children of a directory,
311events are generated for children even after they have been unlinked
312from the directory.
313This can result in large numbers of uninteresting events for
314some applications (e.g., if watching
315.IR /tmp ,
316in which many applications create temporary files whose
317names are immediately unlinked).
318Specifying
319.B IN_EXCL_UNLINK
320changes the default behavior,
321so that events are not generated for children after
322they have been unlinked from the watched directory.
323.TP
dda869a4 324.B IN_MASK_ADD
264545c6 325Add (OR) events to the watch mask for this pathname if
dda869a4
MK
326it already exists (instead of replacing mask).
327.TP
328.B IN_ONESHOT
aeb9b6a6
MK
329Monitor
330.I pathname
331for one event, then remove from
dda869a4
MK
332watch list.
333.TP
31daf529 334.BR IN_ONLYDIR " (since Linux 2.6.15)"
aeb9b6a6
MK
335Only watch
336.I pathname
337if it is a directory.
64aa9bcb 338.RE
4d2b74dd
MK
339.PP
340The following bits may be set in the
341.I mask
342field returned by
63f6a20a 343.BR read (2):
64aa9bcb 344.RS 4
c577b95c 345.TP
dda869a4 346.B IN_IGNORED
aeb9b6a6
MK
347Watch was removed explicitly
348.RB ( inotify_rm_watch (2))
9ee4a2b6 349or automatically (file was deleted, or filesystem was unmounted).
7b5151b7 350See also BUGS.
dda869a4
MK
351.TP
352.B IN_ISDIR
353Subject of this event is a directory.
354.TP
355.B IN_Q_OVERFLOW
aeb9b6a6
MK
356Event queue overflowed
357.RI ( wd
358is \-1 for this event).
dda869a4
MK
359.TP
360.B IN_UNMOUNT
9ee4a2b6 361Filesystem containing watched object was unmounted.
b01c936e
MK
362In addition, an
363.B IN_IGNORED
364event will subsequently be generated for the watch descriptor.
64aa9bcb 365.RE
415f63be
MK
366.SS Examples
367Suppose an application is watching the directory
368.I dir
369and the file
370.IR dir/myfile
371for all events.
372The examples below show some events that will be generated
373for these two objects.
374.RS 4
375.TP
376fd = open("dir/myfile", O_RDWR);
377Generates
378.B IN_OPEN
379events for both
380.I dir
381and
382.IR dir/myfile .
383.TP
384read(fd, buf, count);
385Generates
386.B IN_ACCESS
387events for both
388.I dir
389and
390.IR dir/myfile .
391.TP
392write(fd, buf, count);
393Generates
394.B IN_MODIFY
395events for both
396.I dir
397and
398.IR dir/myfile .
399.TP
400fchmod(fd, mode);
401Generates
402.B IN_ATTRIB
403events for both
404.I dir
405and
406.IR dir/myfile .
407.TP
408close(fd);
409Generates
410.B IN_CLOSE_WRITE
411events for both
412.I dir
413and
414.IR dir/myfile .
415.RE
416.PP
417Suppose an application is watching the directories
418.I dir1
419and
d2c3d8a8 420.IR dir2 ,
415f63be
MK
421and the file
422.IR dir1/myfile .
423The following examples show some events that may be generated.
424.RS 4
425.TP
d2c3d8a8 426link("dir1/myfile", "dir2/new");
415f63be
MK
427Generates an
428.B IN_ATTRIB
429event for
430.IR myfile
431and an
432.B IN_CREATE
433event for
434.IR dir2 .
435.TP
436rename("dir1/myfile", "dir2/myfile");
437Generates an
438.B IN_MOVED_FROM
439event for
440.IR dir1 ,
441an
442.B IN_MOVED_TO
443event for
444.IR dir2 ,
445and an
446.B IN_MOVE_SELF
447event for
448.IR myfile .
449The
450.B IN_MOVED_FROM
451and
452.B IN_MOVED_TO
453events will have the same
454.I cookie
455value.
456.RE
457.PP
458Suppose that
459.IR dir1/xx
460and
461.IR dir2/yy
462are (the only) links to the same file, and an application is watching
463.IR dir1 ,
464.IR dir2 ,
465.IR dir1/xx ,
466and
467.IR dir2/yy .
468Executing the following calls in the order given below will generate
469the following events:
470.RS 4
471.TP
472unlink("dir2/yy");
d2c3d8a8 473Generates an
415f63be
MK
474.BR IN_ATTRIB
475event for
476.IR xx
477(because its link count changes)
478and an
479.B IN_DELETE
480event for
481.IR dir2 .
482.TP
483unlink("dir1/xx");
484Generates
485.BR IN_ATTRIB ,
486.BR IN_DELETE_SELF ,
487and
488.BR IN_IGNORED
489events for
490.IR xx ,
491and an
492.BR IN_DELETE
d2c3d8a8 493event for
415f63be
MK
494.IR dir1 .
495.RE
496.PP
497Suppose an application is watching the directory
498.IR dir
499and (the empty) directory
500.IR dir/subdir .
501The following examples show some events that may be generated.
502.RS 4
503.TP
504mkdir("dir/new", mode);
505Generates an
506.B "IN_CREATE | IN_ISDIR"
507event for
508.IR dir .
509.TP
d2c3d8a8 510rmdir("dir/subdir");
415f63be
MK
511Generates
512.B IN_DELETE_SELF
513and
514.B IN_IGNORED
515events for
516.IR subdir ,
517and an
518.B "IN_DELETE | IN_ISDIR"
519event for
520.IR dir .
521.RE
4d2b74dd 522.SS /proc interfaces
c13182ef 523The following interfaces can be used to limit the amount of
4d2b74dd
MK
524kernel memory consumed by inotify:
525.TP
0daa9e92 526.I /proc/sys/fs/inotify/max_queued_events
4d2b74dd
MK
527The value in this file is used when an application calls
528.BR inotify_init (2)
c13182ef 529to set an upper limit on the number of events that can be
4d2b74dd
MK
530queued to the corresponding inotify instance.
531Events in excess of this limit are dropped, but an
532.B IN_Q_OVERFLOW
533event is always generated.
534.TP
0daa9e92 535.I /proc/sys/fs/inotify/max_user_instances
c13182ef 536This specifies an upper limit on the number of inotify instances
4d2b74dd
MK
537that can be created per real user ID.
538.TP
0daa9e92 539.I /proc/sys/fs/inotify/max_user_watches
31546b46
VN
540This specifies an upper limit on the number of watches
541that can be created per real user ID.
47297adb 542.SH VERSIONS
2b2581ee
MK
543Inotify was merged into the 2.6.13 Linux kernel.
544The required library interfaces were added to glibc in version 2.4.
545.RB ( IN_DONT_FOLLOW ,
546.BR IN_MASK_ADD ,
547and
548.B IN_ONLYDIR
64aa9bcb 549were added in glibc version 2.5.)
47297adb 550.SH CONFORMING TO
8382f16d 551The inotify API is Linux-specific.
47297adb 552.SH NOTES
4d2b74dd
MK
553Inotify file descriptors can be monitored using
554.BR select (2),
555.BR poll (2),
c13182ef 556and
2315114c 557.BR epoll (7).
0000daa5
MK
558When an event is available, the file descriptor indicates as readable.
559
560Since Linux 2.6.25,
561signal-driven I/O notification is available for inotify file descriptors;
562see the discussion of
563.B F_SETFL
564(for setting the
565.B O_ASYNC
566flag),
567.BR F_SETOWN ,
568and
569.B F_SETSIG
570in
571.BR fcntl (2).
572The
573.I siginfo_t
574structure (described in
575.BR sigaction (2))
576that is passed to the signal handler has the following fields set:
577.IR si_fd
578is set to the inotify file descriptor number;
579.IR si_signo
580is set to the signal number;
581.IR si_code
582is set to
583.BR POLL_IN ;
584and
585.B POLLIN
586is set in
587.IR si_band .
4d2b74dd 588
c13182ef
MK
589If successive output inotify events produced on the
590inotify file descriptor are identical (same
591.IR wd ,
592.IR mask ,
4d2b74dd
MK
593.IR cookie ,
594and
3f3698d8 595.IR name ),
6f0ab035
MK
596then they are coalesced into a single event if the
597older event has not yet been read (but see BUGS).
8856aab8
MK
598This reduces the amount of kernel memory required for the event queue,
599but also means that an application can't use inotify to reliably count
600file events.
4d2b74dd 601
c13182ef
MK
602The events returned by reading from an inotify file descriptor
603form an ordered queue.
604Thus, for example, it is guaranteed that when renaming from
605one directory to another, events will be produced in the
4d2b74dd
MK
606correct order on the inotify file descriptor.
607
608The
609.B FIONREAD
63f6a20a 610.BR ioctl (2)
c13182ef 611returns the number of bytes available to read from an
4d2b74dd 612inotify file descriptor.
613836aa 613.SS Limitations and caveats
67898fdf
MK
614The inotify API provides no information about the user or process that
615triggered the inotify event.
616In particular, there is no easy
617way for a process that is monitoring events via inotify
618to distinguish events that it triggers
619itself from those that are triggered by other processes.
620
e226bed7
MK
621Inotify reports only events that a user-space program triggers through
622the filesystem API.
623As a result, it does not catch remote events that occur
624on network filesystems.
625(Applications must fall back to polling the filesystem
626to catch such events.)
fa1d49a6 627Furthermore, various pseudo-filesystems such as
e226bed7
MK
628.IR /proc ,
629.IR /sys ,
630and
631.IR /dev/pts
632are not monitorable with inotify.
633
e449e5f1
MK
634The inotify API does not report file accesses and modifications that
635may occur because of
7a8110f6
HS
636.BR mmap (2),
637.BR msync (2),
e449e5f1 638and
7a8110f6 639.BR munmap (2).
e449e5f1 640
67898fdf
MK
641The inotify API identifies affected files by filename.
642However, by the time an application processes an inotify event,
643the filename may already have been deleted or renamed.
644
da977073 645The inotify API identifies events via watch descriptors.
264276c6
MK
646It is the application's responsibility to cache a mapping
647(if one is needed) between watch descriptors and pathnames.
648Be aware that directory renamings may affect multiple cached pathnames.
649
4d2b74dd
MK
650Inotify monitoring of directories is not recursive:
651to monitor subdirectories under a directory,
652additional watches must be created.
613836aa
MK
653This can take a significant amount time for large directory trees.
654
a79d28b2
MK
655If monitoring an entire directory subtree,
656and a new subdirectory is created in that tree or an existing directory
657is renamed into that tree,
658be aware that by the time you create a watch for the new subdirectory,
659new files (and subdirectories) may already exist inside the subdirectory.
660Therefore, you may want to scan the contents of the subdirectory
661immediately after adding the watch (and, if desired,
662recursively add watches for any subdirectories that it contains).
663
613836aa
MK
664Note that the event queue can overflow.
665In this case, events are lost.
09fa72fa 666Robust applications should handle the possibility of
613836aa 667lost events gracefully.
94d52c15
MK
668For example, it may be necessary to rebuild part or all of
669the application cache.
670(One simple, but possibly expensive,
671approach is to close the inotify file descriptor, empty the cache,
85e179c5 672create a new inotify file descriptor,
94d52c15
MK
673and then re-create watches and cache entries
674for the objects to be monitored.)
85e179c5 675.SS Dealing with rename() events
fa51f4d9 676As noted above, the
85e179c5
MK
677.B IN_MOVED_FROM
678and
679.B IN_MOVED_TO
fa51f4d9 680event pair that is generated by
85e179c5 681.BR rename (2)
fa51f4d9
MK
682can be matched up via their shared cookie value.
683However, the task of matching has some challenges.
684
685These two events are usually consecutive in the event stream available
686when reading from the inotify file descriptor.
85e179c5
MK
687However, this is not guaranteed.
688If multiple processes are triggering events for monitored objects,
689then (on rare occasions) an arbitrary number of
690other events may appear between the
691.B IN_MOVED_FROM
692and
693.B IN_MOVED_TO
694events.
695
696Matching up the
697.B IN_MOVED_FROM
698and
699.B IN_MOVED_TO
700event pair generated by
701.BR rename (2)
702is thus inherently racy.
703(Don't forget that if an object is renamed outside of a monitored directory,
704there may not even be an
705.BR IN_MOVED_TO
706event.)
707Heuristic approaches (e.g., assume the events are always consecutive)
708can be used to ensure a match in most cases,
709but will inevitably miss some cases,
710causing the application to perceive the
711.B IN_MOVED_FROM
712and
713.B IN_MOVED_TO
714events as being unrelated.
715If watch descriptors are destroyed and re-created as a result,
716then those watch descriptors will be inconsistent with
717the watch descriptors in any pending events.
6f1a4954 718(Re-creating the inotify file descriptor and rebuilding the cache may
85e179c5
MK
719be useful to deal with this scenario.)
720
721Applications should also allow for the possibility that the
722.B IN_MOVED_FROM
723event was the last event that could fit in the buffer
724returned by the current call to
725.BR read (2),
726and the accompanying
727.B IN_MOVED_TO
728event might be fetched only on the next
729.BR read (2).
47297adb 730.SH BUGS
a15ead5e
MK
731.\" FIXME kernel commit 611da04f7a31b2208e838be55a42c7a1310ae321
732.\" implies that unmount events were buggy 2.6.11 to 2.6.36
733.\"
ed7b0235
MK
734In kernels before 2.6.16, the
735.B IN_ONESHOT
c13182ef 736.I mask
ed7b0235 737flag does not work.
6f0ab035 738
7b5151b7
MK
739As originally designed and implemented, the
740.B IN_ONESHOT
741flag did not cause an
742.B IN_IGNORED
743event to be generated when the watch was dropped after one event.
744However, as an unintended effect of other changes,
745since Linux 2.6.36, an
746.B IN_IGNORED
747event is generated in this case.
748
6f0ab035 749Before kernel 2.6.25,
22129aa9 750.\" commit 1c17d18e3775485bf1e0ce79575eb637a94494a2
9ed6b517 751the kernel code that was intended to coalesce successive identical events
6f0ab035
MK
752(i.e., the two most recent events could potentially be coalesced
753if the older had not yet been read)
754instead checked if the most recent event could be coalesced with the
755.I oldest
756unread event.
ec976a53 757
ec976a53 758When a watch descriptor is removed by calling
e530e367
MK
759.BR inotify_rm_watch (2)
760(or because a watch file is deleted or the filesystem
761that contains it is unmounted),
ec976a53
HS
762any pending unread events for that watch descriptor remain available to read.
763As watch descriptors are subsequently allocated with
764.BR inotify_add_watch (2),
765the kernel cycles through the range of possible watch descriptors (0 to
766.BR INT_MAX )
767incrementally.
768When allocating a free watch descriptor, no check is made to see whether that
769watch descriptor number has any pending unread events in the inotify queue.
770Thus, it can happen that a watch descriptor is reallocated even
771when pending unread events exist for a previous incarnation of
772that watch descriptor number, with the result that the application
773might then read those events and interpret them as belonging to
774the file associated with the newly recycled watch descriptor.
2bbf2299
MK
775In practice, the likelihood of hitting this bug may be extremely low,
776since it requires that an application cycle through
777.B INT_MAX
778watch descriptors,
779release a watch descriptor while leaving unread events for that
780watch descriptor in the queue in the queue,
781and then recycle that watch descriptor.
782For this reason, and because there have been no reports
783of the bug occurring in real-world applications,
784as of Linux 3.15,
785.\" FIXME https://bugzilla.kernel.org/show_bug.cgi?id=77111
786no kernel changes have yet been made to eliminate this possible bug.
ecd96f7c
HS
787.SH EXAMPLE
788The following program demonstrates the usage of the inotify API.
789It marks the directories passed as a command-line arguments
790and waits for events of type
791.BR IN_OPEN ,
2ef6778b 792.BR IN_CLOSE_NOWRITE
ecd96f7c
HS
793and
794.BR IN_CLOSE_WRITE .
795.PP
796The following output was recorded while editing the file
797.I /home/user/temp/foo
798and listing directory
799.IR /tmp .
800Before the file and the directory were opened,
801.B IN_OPEN
802events occurred.
803After the file was closed, an
804.B IN_CLOSE_WRITE
805event occurred.
806After the directory was closed, an
807.B IN_CLOSE_NOWRITE
808event occurred.
809Execution of the program ended when the user pressed the ENTER key.
810.SS Example output
811.in +4n
812.nf
2483209a 813$ \fB./a.out /tmp /home/user/temp\fP
ecd96f7c
HS
814Press enter key to terminate.
815Listening for events.
816IN_OPEN: /home/user/temp/foo [file]
817IN_CLOSE_WRITE: /home/user/temp/foo [file]
818IN_OPEN: /tmp/ [directory]
819IN_CLOSE_NOWRITE: /tmp/ [directory]
820
821Listening for events stopped.
822.fi
823.in
824.SS Program source
825.nf
826#include <errno.h>
827#include <poll.h>
828#include <stdio.h>
829#include <stdlib.h>
830#include <sys/inotify.h>
831#include <unistd.h>
832
833/* Read all available inotify events from the file descriptor 'fd'.
834 wd is the table of watch descriptors for the directories in argv.
835 argc is the length of wd and argv.
836 argv is the list of watched directories.
837 Entry 0 of wd and argv is unused. */
838
839static void
840handle_events(int fd, int *wd, int argc, char* argv[])
841{
2483209a
MK
842 /* Some systems cannot read integer variables if they are not
843 properly aligned. On other systems, incorrect alignment may
844 decrease performance. Hence, the buffer used for reading from
845 the inotify file descriptor should have the same alignment as
ecd96f7c 846 struct inotify_event. */
2483209a 847
ecd96f7c 848 char buf[4096]
2483209a 849 __attribute__ ((aligned(__alignof__(struct inotify_event))));
ecd96f7c
HS
850 const struct inotify_event *event;
851 int i;
852 ssize_t len;
853 char *ptr;
854
855 /* Loop while events can be read from inotify file descriptor. */
856
857 for (;;) {
858
859 /* Read some events. */
860
861 len = read(fd, buf, sizeof buf);
862 if (len == \-1 && errno != EAGAIN) {
863 perror("read");
864 exit(EXIT_FAILURE);
865 }
866
867 /* If the nonblocking read() found no events to read, then
868 it returns \-1 with errno set to EAGAIN. In that case,
869 we exit the loop. */
870
871 if (len <= 0)
872 break;
873
874 /* Loop over all events in the buffer */
875
876 for (ptr = buf; ptr < buf + len;
2483209a 877 ptr += sizeof(struct inotify_event) + event\->len) {
ecd96f7c
HS
878
879 event = (const struct inotify_event *) ptr;
880
881 /* Print event type */
882
883 if (event\->mask & IN_OPEN)
884 printf("IN_OPEN: ");
885 if (event\->mask & IN_CLOSE_NOWRITE)
886 printf("IN_CLOSE_NOWRITE: ");
887 if (event\->mask & IN_CLOSE_WRITE)
888 printf("IN_CLOSE_WRITE: ");
889
890 /* Print the name of the watched directory */
891
892 for (i = 1; i < argc; ++i) {
893 if (wd[i] == event\->wd) {
894 printf("%s/", argv[i]);
895 break;
896 }
897 }
898
899 /* Print the name of the file */
900
901 if (event\->len)
902 printf("%s", event\->name);
903
904 /* Print type of filesystem object */
905
906 if (event\->mask & IN_ISDIR)
907 printf(" [directory]\\n");
908 else
909 printf(" [file]\\n");
ecd96f7c
HS
910 }
911 }
912}
913
914int
915main(int argc, char* argv[])
916{
917 char buf;
918 int fd, i, poll_num;
919 int *wd;
920 nfds_t nfds;
921 struct pollfd fds[2];
922
923 if (argc < 2) {
924 printf("Usage: %s PATH [PATH ...]\\n", argv[0]);
925 exit(EXIT_FAILURE);
926 }
927
928 printf("Press ENTER key to terminate.\\n");
929
930 /* Create the file descriptor for accessing the inotify API */
931
932 fd = inotify_init1(IN_NONBLOCK);
933 if (fd == \-1) {
934 perror("inotify_init1");
935 exit(EXIT_FAILURE);
936 }
937
938 /* Allocate memory for watch descriptors */
939
940 wd = calloc(argc, sizeof(int));
941 if (wd == NULL) {
942 perror("calloc");
943 exit(EXIT_FAILURE);
944 }
945
946 /* Mark directories for events
947 \- file was opened
948 \- file was closed */
949
950 for (i = 1; i < argc; i++) {
951 wd[i] = inotify_add_watch(fd, argv[i],
952 IN_OPEN | IN_CLOSE);
953 if (wd[i] == \-1) {
954 fprintf(stderr, "Cannot watch '%s'\\n", argv[i]);
955 perror("inotify_add_watch");
956 exit(EXIT_FAILURE);
957 }
958 }
959
960 /* Prepare for polling */
961
962 nfds = 2;
963
964 /* Console input */
965
966 fds[0].fd = STDIN_FILENO;
967 fds[0].events = POLLIN;
968
969 /* Inotify input */
970
971 fds[1].fd = fd;
972 fds[1].events = POLLIN;
973
974 /* Wait for events and/or terminal input */
975
976 printf("Listening for events.\\n");
977 while (1) {
978 poll_num = poll(fds, nfds, \-1);
979 if (poll_num == \-1) {
980 if (errno == EINTR)
981 continue;
982 perror("poll");
983 exit(EXIT_FAILURE);
984 }
2483209a 985
ecd96f7c
HS
986 if (poll_num > 0) {
987
988 if (fds[0].revents & POLLIN) {
989
990 /* Console input is available. Empty stdin and quit */
991
992 while (read(STDIN_FILENO, &buf, 1) > 0 && buf != '\\n')
993 continue;
994 break;
995 }
2483209a 996
ecd96f7c
HS
997 if (fds[1].revents & POLLIN) {
998
999 /* Inotify events are available */
2483209a 1000
ecd96f7c
HS
1001 handle_events(fd, wd, argc, argv);
1002 }
1003 }
1004 }
1005
2483209a
MK
1006 printf("Listening for events stopped.\\n");
1007
ecd96f7c
HS
1008 /* Close inotify file descriptor */
1009
1010 close(fd);
2483209a 1011
ecd96f7c 1012 free(wd);
ecd96f7c
HS
1013 exit(EXIT_SUCCESS);
1014}
1015.fi
47297adb 1016.SH SEE ALSO
f0afb16a
MK
1017.BR inotifywait (1),
1018.BR inotifywatch (1),
4d2b74dd
MK
1019.BR inotify_add_watch (2),
1020.BR inotify_init (2),
43bb5faf 1021.BR inotify_init1 (2),
4d2b74dd
MK
1022.BR inotify_rm_watch (2),
1023.BR read (2),
f75d27e6
HS
1024.BR stat (2),
1025.BR fanotify (7)
173fe7e7
DP
1026
1027.IR Documentation/filesystems/inotify.txt
1028in the Linux kernel source tree