]> git.ipfire.org Git - thirdparty/man-pages.git/blame - man7/inotify.7
inotify.7: Directory renames may invalidate multiple paths cached by application
[thirdparty/man-pages.git] / man7 / inotify.7
CommitLineData
4d2b74dd 1'\" t
c11b1abf 2.\" Copyright (C) 2006 Michael Kerrisk <mtk.manpages@gmail.com>
4d2b74dd 3.\"
93015253 4.\" %%%LICENSE_START(VERBATIM)
4d2b74dd
MK
5.\" Permission is granted to make and distribute verbatim copies of this
6.\" manual provided the copyright notice and this permission notice are
7.\" preserved on all copies.
8.\"
9.\" Permission is granted to copy and distribute modified versions of this
10.\" manual under the conditions for verbatim copying, provided that the
11.\" entire resulting derived work is distributed under the terms of a
12.\" permission notice identical to this one.
c13182ef 13.\"
4d2b74dd
MK
14.\" Since the Linux kernel and libraries are constantly changing, this
15.\" manual page may be incorrect or out-of-date. The author(s) assume no
16.\" responsibility for errors or omissions, or for damages resulting from
10d76543
MK
17.\" the use of the information contained herein. The author(s) may not
18.\" have taken the same level of care in the production of this manual,
19.\" which is licensed free of charge, as they might when working
20.\" professionally.
c13182ef 21.\"
4d2b74dd
MK
22.\" Formatted or processed versions of this manual, if unaccompanied by
23.\" the source, must acknowledge the copyright and authors of this work.
4b72fb64 24.\" %%%LICENSE_END
4d2b74dd 25.\"
8817c2c8 26.TH INOTIFY 7 2014-03-25 "Linux" "Linux Programmer's Manual"
4d2b74dd 27.SH NAME
9ee4a2b6 28inotify \- monitoring filesystem events
4d2b74dd
MK
29.SH DESCRIPTION
30The
c13182ef 31.I inotify
9ee4a2b6 32API provides a mechanism for monitoring filesystem events.
4d2b74dd
MK
33Inotify can be used to monitor individual files,
34or to monitor directories.
35When a directory is monitored, inotify will return events
36for the directory itself, and for files inside the directory.
37
c13182ef 38The following system calls are used with this API:
43bb5faf 39.BR inotify_init (2)
c5571b61 40(or
43bb5faf 41.BR inotify_init1 (2)),
63f6a20a
MK
42.BR inotify_add_watch (2),
43.BR inotify_rm_watch (2),
44.BR read (2),
c13182ef 45and
63f6a20a 46.BR close (2).
4d2b74dd
MK
47
48.BR inotify_init (2)
c13182ef 49creates an inotify instance and returns a file descriptor
a2cc46ca 50referring to the inotify instance.
43bb5faf
MK
51The more recent
52.BR inotify_init1 (2)
53is like
54.BR inotify_init (2),
55but provides some extra functionality.
4d2b74dd
MK
56
57.BR inotify_add_watch (2)
a2cc46ca 58manipulates the "watch list" associated with an inotify instance.
3a065ac0 59Each item ("watch") in the watch list specifies the pathname of
c13182ef 60a file or directory,
4d2b74dd
MK
61along with some set of events that the kernel should monitor for the
62file referred to by that pathname.
63f6a20a 63.BR inotify_add_watch (2)
4d2b74dd
MK
64either creates a new watch item, or modifies an existing watch.
65Each watch has a unique "watch descriptor", an integer
66returned by
63f6a20a 67.BR inotify_add_watch (2)
4d2b74dd
MK
68when the watch is created.
69
70.BR inotify_rm_watch (2)
71removes an item from an inotify watch list.
72
c13182ef 73When all file descriptors referring to an inotify
a2cc46ca 74instance have been closed,
c13182ef 75the underlying object and its resources are
3b777aff 76freed for reuse by the kernel;
4d2b74dd
MK
77all associated watches are automatically freed.
78
79To determine what events have occurred, an application
80.BR read (2)s
81from the inotify file descriptor.
c13182ef 82If no events have so far occurred, then,
11da88fb 83assuming a blocking file descriptor,
63f6a20a 84.BR read (2)
01538d0d
MK
85will block until at least one event occurs
86(unless interrupted by a signal,
87in which case the call fails with the error
88.BR EINTR ;
89see
90.BR signal (7)).
4d2b74dd
MK
91
92Each successful
63f6a20a 93.BR read (2)
4d2b74dd 94returns a buffer containing one or more of the following structures:
a08ea57c 95.in +4n
4d2b74dd
MK
96.nf
97
98struct inotify_event {
99 int wd; /* Watch descriptor */
24bbe02c
MK
100.\" FIXME . The type of the 'wd' field should probably be "int32_t".
101.\" I submitted a patch to fix this. See the LKML thread
102.\" "[patch] Fix type errors in inotify interfaces", 18 Nov 2008
6e6231c1 103.\" Glibc bug filed: http://sources.redhat.com/bugzilla/show_bug.cgi?id=7040
4d2b74dd 104 uint32_t mask; /* Mask of events */
c13182ef 105 uint32_t cookie; /* Unique cookie associating related
4d2b74dd 106 events (for rename(2)) */
84c517a4 107 uint32_t len; /* Size of \fIname\fP field */
4d2b74dd
MK
108 char name[]; /* Optional null-terminated name */
109};
110.fi
a08ea57c 111.in
4d2b74dd
MK
112
113.I wd
114identifies the watch for which this event occurs.
c13182ef 115It is one of the watch descriptors returned by a previous call to
63f6a20a 116.BR inotify_add_watch (2).
4d2b74dd
MK
117
118.I mask
119contains bits that describe the event that occurred (see below).
120
121.I cookie
122is a unique integer that connects related events.
33a0ccb2 123Currently this is used only for rename events, and
4d2b74dd 124allows the resulting pair of
bc636d8a 125.B IN_MOVED_FROM
c13182ef 126and
bc636d8a 127.B IN_MOVED_TO
4d2b74dd 128events to be connected by the application.
591b7a5f
MK
129For all other event types,
130.I cookie
131is set to 0.
4d2b74dd 132
c13182ef 133The
4d2b74dd 134.I name
33a0ccb2 135field is present only when an event is returned
c13182ef 136for a file inside a watched directory;
4d2b74dd 137it identifies the file pathname relative to the watched directory.
c13182ef 138This pathname is null-terminated,
1aff5804 139and may include further null bytes (\(aq\\0\(aq) to align subsequent reads to a
4d2b74dd
MK
140suitable address boundary.
141
142The
143.I len
c13182ef 144field counts all of the bytes in
4d2b74dd 145.IR name ,
c13182ef 146including the null bytes;
4d2b74dd
MK
147the length of each
148.I inotify_event
149structure is thus
655684a9 150.IR "sizeof(struct inotify_event)+len" .
c7e3ee6f 151
988db661 152The behavior when the buffer given to
c7e3ee6f 153.BR read (2)
988db661 154is too small to return information about the next event depends
c7e3ee6f
MK
155on the kernel version: in kernels before 2.6.21,
156.BR read (2)
157returns 0; since kernel 2.6.21,
158.BR read (2)
159fails with the error
160.BR EINVAL .
4ba272b3
MK
161Specifying a buffer of size
162
163 sizeof(struct inotify_event) + NAME_MAX + 1
164
165will be sufficient to read at least one event.
4d2b74dd 166.SS inotify events
c13182ef 167The
4d2b74dd
MK
168.BR inotify_add_watch (2)
169.I mask
c13182ef 170argument and the
4d2b74dd
MK
171.I mask
172field of the
173.I inotify_event
174structure returned when
175.BR read (2)ing
176an inotify file descriptor are both bit masks identifying
177inotify events.
178The following bits can be specified in
179.I mask
180when calling
63f6a20a 181.BR inotify_add_watch (2)
c13182ef 182and may be returned in the
4d2b74dd
MK
183.I mask
184field returned by
63f6a20a 185.BR read (2):
3f174f7d
MK
186.RS 4
187.sp
188.PD 0
189.TP 18
190.B IN_ACCESS
8817c2c8
MK
191File was accessed (read,
192.BR execve (2)) (*).
3f174f7d
MK
193.TP
194.B IN_ATTRIB
10850212
MK
195Metadata changed\(emfor example, permissions, timestamps, extended attributes,
196link count (since Linux 2.6.25), UID, or GID. (*).
3f174f7d
MK
197.TP
198.B IN_CLOSE_WRITE
199File opened for writing was closed (*).
200.TP
201.B IN_CLOSE_NOWRITE
202File not opened for writing was closed (*).
203.TP
204.B IN_CREATE
205File/directory created in watched directory (*).
206.TP
207.B IN_DELETE
208File/directory deleted from watched directory (*).
209.TP
210.B IN_DELETE_SELF
211Watched file/directory was itself deleted.
212.TP
213.B IN_MODIFY
214File was modified (*).
215.TP
216.B IN_MOVE_SELF
217Watched file/directory was itself moved.
218.TP
219.B IN_MOVED_FROM
107375cf
MK
220Generated for the directory containing the old filename
221when a file is renamed (*).
3f174f7d
MK
222.TP
223.B IN_MOVED_TO
107375cf
MK
224Generated for the directory containing the new filename
225when a file is renamed (*).
3f174f7d
MK
226.TP
227.B IN_OPEN
228File was opened (*).
229.PD
230.RE
4d2b74dd 231.PP
c13182ef
MK
232When monitoring a directory,
233the events marked with an asterisk (*) above can occur for
4d2b74dd
MK
234files in the directory, in which case the
235.I name
236field in the returned
237.I inotify_event
238structure identifies the name of the file within the directory.
239.PP
240The
241.B IN_ALL_EVENTS
242macro is defined as a bit mask of all of the above events.
243This macro can be used as the
244.I mask
245argument when calling
63f6a20a 246.BR inotify_add_watch (2).
4d2b74dd
MK
247
248Two additional convenience macros are
249.BR IN_MOVE ,
250which equates to
251IN_MOVED_FROM|IN_MOVED_TO,
252and
fe252985 253.BR IN_CLOSE ,
4d2b74dd
MK
254which equates to
255IN_CLOSE_WRITE|IN_CLOSE_NOWRITE.
256.PP
c13182ef 257The following further bits can be specified in
4d2b74dd
MK
258.I mask
259when calling
63f6a20a 260.BR inotify_add_watch (2):
3f174f7d
MK
261.RS 4
262.sp
263.PD 0
264.TP 18
31daf529 265.BR IN_DONT_FOLLOW " (since Linux 2.6.15)"
aeb9b6a6
MK
266Don't dereference
267.I pathname
268if it is a symbolic link.
dda869a4 269.TP
0ff2cc88 270.BR IN_EXCL_UNLINK " (since Linux 2.6.36)"
b3ad7609
MK
271.\" commit 8c1934c8d70b22ca8333b216aec6c7d09fdbd6a6
272By default, when watching events on the children of a directory,
273events are generated for children even after they have been unlinked
274from the directory.
275This can result in large numbers of uninteresting events for
276some applications (e.g., if watching
277.IR /tmp ,
278in which many applications create temporary files whose
279names are immediately unlinked).
280Specifying
281.B IN_EXCL_UNLINK
282changes the default behavior,
283so that events are not generated for children after
284they have been unlinked from the watched directory.
285.TP
dda869a4
MK
286.B IN_MASK_ADD
287Add (OR) events to watch mask for this pathname if
288it already exists (instead of replacing mask).
289.TP
290.B IN_ONESHOT
aeb9b6a6
MK
291Monitor
292.I pathname
293for one event, then remove from
dda869a4
MK
294watch list.
295.TP
31daf529 296.BR IN_ONLYDIR " (since Linux 2.6.15)"
aeb9b6a6
MK
297Only watch
298.I pathname
299if it is a directory.
3f174f7d
MK
300.PD
301.RE
4d2b74dd
MK
302.PP
303The following bits may be set in the
304.I mask
305field returned by
63f6a20a 306.BR read (2):
3f174f7d
MK
307.RS 4
308.sp
309.PD 0
310.TP 18
dda869a4 311.B IN_IGNORED
aeb9b6a6
MK
312Watch was removed explicitly
313.RB ( inotify_rm_watch (2))
9ee4a2b6 314or automatically (file was deleted, or filesystem was unmounted).
dda869a4
MK
315.TP
316.B IN_ISDIR
317Subject of this event is a directory.
318.TP
319.B IN_Q_OVERFLOW
aeb9b6a6
MK
320Event queue overflowed
321.RI ( wd
322is \-1 for this event).
dda869a4
MK
323.TP
324.B IN_UNMOUNT
9ee4a2b6 325Filesystem containing watched object was unmounted.
3f174f7d
MK
326.PD
327.RE
4d2b74dd 328.SS /proc interfaces
c13182ef 329The following interfaces can be used to limit the amount of
4d2b74dd
MK
330kernel memory consumed by inotify:
331.TP
0daa9e92 332.I /proc/sys/fs/inotify/max_queued_events
4d2b74dd
MK
333The value in this file is used when an application calls
334.BR inotify_init (2)
c13182ef 335to set an upper limit on the number of events that can be
4d2b74dd
MK
336queued to the corresponding inotify instance.
337Events in excess of this limit are dropped, but an
338.B IN_Q_OVERFLOW
339event is always generated.
340.TP
0daa9e92 341.I /proc/sys/fs/inotify/max_user_instances
c13182ef 342This specifies an upper limit on the number of inotify instances
4d2b74dd
MK
343that can be created per real user ID.
344.TP
0daa9e92 345.I /proc/sys/fs/inotify/max_user_watches
31546b46
VN
346This specifies an upper limit on the number of watches
347that can be created per real user ID.
47297adb 348.SH VERSIONS
2b2581ee
MK
349Inotify was merged into the 2.6.13 Linux kernel.
350The required library interfaces were added to glibc in version 2.4.
351.RB ( IN_DONT_FOLLOW ,
352.BR IN_MASK_ADD ,
353and
354.B IN_ONLYDIR
33a0ccb2 355were added in version 2.5.)
47297adb 356.SH CONFORMING TO
8382f16d 357The inotify API is Linux-specific.
47297adb 358.SH NOTES
4d2b74dd
MK
359Inotify file descriptors can be monitored using
360.BR select (2),
361.BR poll (2),
c13182ef 362and
2315114c 363.BR epoll (7).
0000daa5
MK
364When an event is available, the file descriptor indicates as readable.
365
366Since Linux 2.6.25,
367signal-driven I/O notification is available for inotify file descriptors;
368see the discussion of
369.B F_SETFL
370(for setting the
371.B O_ASYNC
372flag),
373.BR F_SETOWN ,
374and
375.B F_SETSIG
376in
377.BR fcntl (2).
378The
379.I siginfo_t
380structure (described in
381.BR sigaction (2))
382that is passed to the signal handler has the following fields set:
383.IR si_fd
384is set to the inotify file descriptor number;
385.IR si_signo
386is set to the signal number;
387.IR si_code
388is set to
389.BR POLL_IN ;
390and
391.B POLLIN
392is set in
393.IR si_band .
4d2b74dd 394
c13182ef
MK
395If successive output inotify events produced on the
396inotify file descriptor are identical (same
397.IR wd ,
398.IR mask ,
4d2b74dd
MK
399.IR cookie ,
400and
3f3698d8 401.IR name ),
6f0ab035
MK
402then they are coalesced into a single event if the
403older event has not yet been read (but see BUGS).
8856aab8
MK
404This reduces the amount of kernel memory required for the event queue,
405but also means that an application can't use inotify to reliably count
406file events.
4d2b74dd 407
c13182ef
MK
408The events returned by reading from an inotify file descriptor
409form an ordered queue.
410Thus, for example, it is guaranteed that when renaming from
411one directory to another, events will be produced in the
4d2b74dd
MK
412correct order on the inotify file descriptor.
413
414The
415.B FIONREAD
63f6a20a 416.BR ioctl (2)
c13182ef 417returns the number of bytes available to read from an
4d2b74dd 418inotify file descriptor.
613836aa 419.SS Limitations and caveats
4d2b74dd
MK
420Inotify monitoring of directories is not recursive:
421to monitor subdirectories under a directory,
422additional watches must be created.
613836aa
MK
423This can take a significant amount time for large directory trees.
424
4d2ddb4e
MK
425The inotify API provides no information about the user or process that
426triggered the inotify event.
99e603bd
MK
427In particular, there is no easy
428way for a process that is monitoring events via inotify
429to distinguish events that it triggers
430itself from those that are triggered by other processes.
4d2ddb4e 431
613836aa
MK
432Note that the event queue can overflow.
433In this case, events are lost.
09fa72fa 434Robust applications should handle the possibility of
613836aa
MK
435lost events gracefully.
436
437The inotify API identifies affected files by filename.
438However, by the time an application processes an inotify event,
439the filename may already have been deleted or renamed.
440
441If monitoring an entire directory subtree,
031de152
MK
442and a new subdirectory is created in that tree or an existing directory
443is renamed into that tree,
613836aa 444be aware that by the time you create a watch for the new subdirectory,
031de152 445new files (and subdirectories) may already exist inside the subdirectory.
613836aa 446Therefore, you may want to scan the contents of the subdirectory
031de152
MK
447immediately after adding the watch (and, if desired,
448recursively add watches for any subdirectories that it contains).
2f482041
MK
449
450The inotify applications identifies events via watch descriptors.
451It is the application's responsibility to cache a mapping
452(if one is needed) between watch descriptors and pathnames.
453Be aware that directory renamings may affect multiple cached pathnames.
47297adb 454.SH BUGS
ed7b0235
MK
455In kernels before 2.6.16, the
456.B IN_ONESHOT
c13182ef 457.I mask
ed7b0235 458flag does not work.
6f0ab035
MK
459
460Before kernel 2.6.25,
9ed6b517 461the kernel code that was intended to coalesce successive identical events
6f0ab035
MK
462(i.e., the two most recent events could potentially be coalesced
463if the older had not yet been read)
464instead checked if the most recent event could be coalesced with the
465.I oldest
466unread event.
47297adb 467.SH SEE ALSO
f0afb16a
MK
468.BR inotifywait (1),
469.BR inotifywatch (1),
4d2b74dd
MK
470.BR inotify_add_watch (2),
471.BR inotify_init (2),
43bb5faf 472.BR inotify_init1 (2),
4d2b74dd
MK
473.BR inotify_rm_watch (2),
474.BR read (2),
173fe7e7
DP
475.BR stat (2)
476
477.IR Documentation/filesystems/inotify.txt
478in the Linux kernel source tree