* find/find.1 (EXAMPLES): Do it. Before and after, using DWB 3.3 troff (Plan 9 and Solaris 10 troffs are similar):
$ diff -U0 find.1.dwb-[12].txt|head -n 19 --- find.1.dwb-1.txt 2025-10-13 10:09:17.024054824 -0500 +++ find.1.dwb-2.txt 2025-10-13 10:09:24.764012282 -0500 @@ -2039 +2039 @@ - [bu] + o Find files named core in or below the directory /tmp and @@ -2054 +2053,0 @@ - Find files named core in or below the directory /tmp and @@ -2064,2 +2063 @@ - [bu] - Find files named core in or below the directory /tmp and + o Find files named core in or below the directory /tmp and @@ -2080,2 +2078 @@ - [bu] - Given that another program proggy pre-filters and cre- + o Given that another program proggy pre-filters and cre- @@ -2097,2 +2094 @@ - [bu] - Run file on every file in or below the current direc- + o Run file on every file in or below the current direc- Further changes in the diff appear because the document now paginates differently with these troffs. That's because a one-en-wide mark 'o' (the ASCII representation of a bullet) fits within the 4n space allotted by the document's `IP` calls, whereas "[bu]" does not. Fixes warnings from "nroff -C -ww -man" in the forthcoming groff 1.24: troff:./find/find.1:2260: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2277: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2305: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2326: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2349: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2372: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2392: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2402: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2415: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2431: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2442: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2459: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2471: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2498: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2542: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2597: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2618: warning: an escaped '[' is not portable to AT&T troff troff:./find/find.1:2630: warning: an escaped '[' is not portable to AT&T troff --- find/find.1 | 38 +++++++++++++++++++------------------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/find/find.1 b/find/find.1 index c527dff9..7c0eeaf8 100644 --- a/find/find.1 +++ b/find/find.1 @@ -2248,14 +2248,14 @@ .SH ENVIRONMENT VARIABLES .BR \-fprintf . . .SH EXAMPLES -.\" A bulleted \[bu] list of examples. +.\" A bulleted \(bu list of examples. .SS Simple `find|xargs` approach .\".nr margin_n \n[an-margin]u/1n .\"an-margin is \n[margin_n]n .\".nr prev-indent_n \n[an-prevailing-indent]u/1n .\"an-prevailing-indent] is \n[prev-indent_n]n .\".br -.IP \[bu] 4n +.IP \(bu 4n Find files named .I core in or below the directory @@ -2272,7 +2272,7 @@ .SS Simple `find|xargs` approach any filenames containing newlines, single or double quotes, or spaces. . .SS Safer `find \-print0 | xargs \-0` approach -.IP \[bu] 4n +.IP \(bu 4n Find files named \fIcore\fP in or below the directory \fI/tmp\fP and delete them, processing filenames in such a way that file or directory names containing single or double quotes, spaces or newlines @@ -2300,7 +2300,7 @@ .SS Safer `find \-print0 | xargs \-0` approach works with that file. . .SS Processing arbitrary starting points -.IP \[bu] 4n +.IP \(bu 4n Given that another program \fIproggy\fR pre-filters and creates a huge NUL-separated list of files, process those as starting points, and find all regular, empty files among them: @@ -2321,7 +2321,7 @@ .SS Processing arbitrary starting points . .SS Executing a command for each file -.IP \[bu] 4n +.IP \(bu 4n Run .I file on every file in or below the current directory. @@ -2344,7 +2344,7 @@ .SS Processing arbitrary starting points syntax for performance and security reasons. . .SS Traversing the filesystem just once \(en for 2 different actions -.IP \[bu] 4n +.IP \(bu 4n Traverse the filesystem just once, listing set-user-ID files and directories into .I /root/suid.txt @@ -2367,7 +2367,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions . .SS Searching files by age -.IP \[bu] 4n +.IP \(bu 4n Search for files in your home directory which have been modified in the last twenty-four hours. .nf @@ -2387,7 +2387,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions . .SS Searching files by permissions -.IP \[bu] 4n +.IP \(bu 4n Search for files which are executable but not readable. .nf \& @@ -2396,7 +2396,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions .in .fi . -.IP \[bu] 4n +.IP \(bu 4n Search for files which have read and write permission for their owner, and group, but which other users can read but not write to. .nf @@ -2409,7 +2409,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions Files which meet these criteria but have other permissions bits set (for example if someone can execute the file) will not be matched. . -.IP \[bu] +.IP \(bu Search for files which have read and write permission for their owner and group, and which other users can read, without regard to the presence of any extra permission bits (for example the executable @@ -2425,7 +2425,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions .IR 0777 , for example. . -.IP \[bu] +.IP \(bu Search for files which are writable by somebody (their owner, or their group, or anybody else). .nf @@ -2435,7 +2435,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions .in .fi . -.IP \[bu] +.IP \(bu Search for files which are writable by either their owner or their group. .nf \& @@ -2452,7 +2452,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions The files don't have to be writable by both the owner and group to be matched; either will do. . -.IP \[bu] +.IP \(bu Search for files which are writable by both their owner and their group. .nf \& @@ -2464,7 +2464,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions .fi Both these commands do the same thing. . -.IP \[bu] +.IP \(bu A more elaborate search on permissions. .nf \& @@ -2491,7 +2491,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions . .SS Pruning \(en omitting files and subdirectories -.IP \[bu] 4n +.IP \(bu 4n Copy the contents of .I /source-dir to @@ -2535,7 +2535,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions this is the default anyway, but the parentheses help to show what is going on. . -.IP \[bu] 4n +.IP \(bu 4n Given the following directory of projects and their associated SCM administrative directories, perform an efficient search for the projects' roots: @@ -2590,7 +2590,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions . .SS Other useful examples -.IP \[bu] 4n +.IP \(bu 4n Search for several file types. .nf \& @@ -2610,7 +2610,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions .in .fi . -.IP \[bu] 4n +.IP \(bu 4n Search for files with the particular name .I needle and stop immediately when we find the first one. @@ -2621,7 +2621,7 @@ .SS Traversing the filesystem just once \(en for 2 different actions .in .fi . -.IP \[bu] 4n +.IP \(bu 4n Demonstrate the interpretation of the .B %f and -- 2.30.2
signature.asc
Description: PGP signature
