úÎŽâ#      !"4#$%&':These are the events which the kernel reports back to us. () /The kernel can also report one of these alerts watch was implicitly removed @When registering a watch, you can also give a number of options (Only watch if the target is a directory Monitor for one event only BAdd events to a watch if that given path is already being watched don't dereference target if it's a symbolic link +These are the events which can be observed the watch directory/file was deleted subfile was deleted the watched directory/file was moved non writable file was closed writable file was closed $A list containing all change events * Convert a  to the kernel's ABI value for that event +,-Convert a list of s to a mask for those events .Convert a list of s to a mask for those events /&Convert a mask into events and alerts GCreate a new Inotify object. Each inotify object has its own stream of " events which can be read and it'$s own Watch namespace (so n.b. that   objects from different Inotify's can compare equal). !#Add a watch on a file or directory 0Extract an Event from a buffer 1GReturn the length of the event object, pointed to by the given pointer 23"Read the next event from an  #  !"#   !"#    !"4      !"#$%&'( )*+,-./0123system-inotify-0.1System.InotifyEventevwatcheveventsevalertsevcookieevnameInotifyWatchAlert UnmountedQueueOverflowedIgnoredOptionOnlyDirOneshotMaskAdd DontFollow ChangeEvent SelfDeletedDeletedCreated SelfMovedMovedTo MovedFromOpenedClosedWritableClosedAttributeModifiedModifiedAccessedallChangeEventsinotifyaddWatchnext_read_close _rm_watch _add_watch_init eventValue optionValue alertValue eventsToMask optionsToMask decodeMaskeventFromBuffer eventLengthunfoldrM unfoldEvents