Intentar ORO - Gratis
An Introduction to Inodes
Open Source For You
|May 2025
Understanding inodes can be invaluable for troubleshooting disk-space issues, optimising filesystem performance, and recovering deleted files.
-
An inode (short for 'index node') is the link between a file name and its physical location on a storage device. In the UNIX and Linux operating systems, inodes are data structures used to hold metadata about files and directories. A filesystem is how an operating system organises and stores files on a storage device. Each filesystem on the computer has its own separate set of inodes. In short, each filesystem mounted on a computer has its inodes, which are stored in a common table. An inode number can be used more than once but not by the same filesystem. The filesystem ID is paired with the inode number to create a unique identification label.
When a filesystem is created, a fixed number of inodes is created. Typically, approximately 1% of the filesystem disk space is allocated to the inode table. Each file and directory in a filesystem is assigned a unique inode, which is identifiable by an integer known as the inode number. A filesystem is typically separated into inodes and data blocks.
The directory is implemented as a table that maps the filenames to inode numbers. Every file in a directory table is an entry with a filename and inode numbers. All other information about the file is obtained by referencing the inode number in the inode table. When a file is opened, the operating system uses the inode’s pointers to navigate through the disk and retrieve the file content from its physical location. This process is seamless for users but relies heavily on these ‘directions’ stored in the inodes.
File size: This is the size of the file in bytes.
Ownership: The file owner and the group are determined by their user ID (UID) and group ID (GID).
Permissions: Read, write, and execute permissions for the file define access control.
Timestamps: Inodes record timestamps that provide modification (mtime), last access (atime), and inode change times (ctime).
Esta historia es de la edición May 2025 de Open Source For You.
Suscríbete a Magzter GOLD para acceder a miles de historias premium seleccionadas y a más de 9000 revistas y periódicos.
¿Ya eres suscriptor? Iniciar sesión
MÁS HISTORIAS DE Open Source For You
Open Source For You
Top 10 Open Source Tools for System and IT Administrators
All reputed online services have committed system and IT administrators working behind the scenes. Here are ten open source tools they should be aware of, as these can help them monitor, automate, as well as manage complex infrastructure with relative ease.
6 mins
February 2026
Open Source For You
Google opens access to its Gemini Deep Research Agent
Google has opened access to its Gemini Deep Research Agent for the first time, allowing developers to integrate advanced autonomous research capabilities directly into their applications.
1 min
February 2026
Open Source For You
NVIDIA buys SchedMD, keeps Slurm open source and vendor neutral
NVIDIA has acquired AI software company SchedMD, signalling a deeper commitment to open source technologies as competition intensifies across the artificial intelligence ecosystem.
1 min
February 2026
Open Source For You
How Open Source Tools Power Modern IT Operations
Open source tools have not replaced enterprise IT platforms; they have become the connective layer that makes modern operations possible.
6 mins
February 2026
Open Source For You
Mandiant's Auralnspector enhances Salesforce security
Google-owned cybersecurity firm Mandiant has released AuraInspector, a free, open source command-line tool designed to identify dangerous access control misconfigurations in Salesforce environments, marking a significant move to democratise enterprise-grade security testing.
1 min
February 2026
Open Source For You
Google launches Universal Commerce Protocol to power agentic AI commerce
Google has introduced the Universal Commerce Protocol (UCP), a new open standard that enables AI agents to autonomously perform end-to-end commerce activities, spanning product discovery, purchasing, checkout, payments, and postpurchase experiences.
1 min
February 2026
Open Source For You
Zero Trust CI/CD: The Death of Static Secrets
In an era where data breach costs continue to hit record highs, shifting to a secretless CI/CD pipeline is the most effective step to safeguard digital infrastructure.
7 mins
February 2026
Open Source For You
Quantum Algorithms: The Future of Computing
Explore the essence of quantum algorithms, their groundbreaking applications, recent innovations, and the challenges that remain.
8 mins
February 2026
Open Source For You
Bringing Clarity to the Chaos in AI
AI feels powerful, yet most teams struggle because they cannot define what intelligence they really need. But there are ways to address this challenge.
5 mins
February 2026
Open Source For You
Top researchers return to OpenAI
OpenAI has welcomed back three high-profile researchers, Barret Zoph, Luke Metz, and Sam Schoenholz, following their brief tenure at former OpenAI CTO Mira Murati's AI startup, Thinking Machines.
1 min
February 2026
Listen
Translate
Change font size
