* find/find.1 (EXAMPLES): Do it.

Before and after, using DWB 3.3 troff (Plan 9 and Solaris 10 troffs are
similar):

$ diff -U0 find.1.dwb-[12].txt|head -n 19
--- find.1.dwb-1.txt    2025-10-13 10:09:17.024054824 -0500
+++ find.1.dwb-2.txt    2025-10-13 10:09:24.764012282 -0500
@@ -2039 +2039 @@
-            [bu]
+            o   Find files named core in or below the directory /tmp and
@@ -2054 +2053,0 @@
-                Find files named core in or below the directory /tmp and
@@ -2064,2 +2063 @@
-            [bu]
-                Find files named core in or below the directory /tmp and
+            o   Find files named core in or below the directory /tmp and
@@ -2080,2 +2078 @@
-            [bu]
-                Given that another program proggy pre-filters and cre-
+            o   Given that another program proggy pre-filters and cre-
@@ -2097,2 +2094 @@
-            [bu]
-                Run file on every file in or below the current direc-
+            o   Run file on every file in or below the current direc-

Further changes in the diff appear because the document now paginates
differently with these troffs.  That's because a one-en-wide mark 'o'
(the ASCII representation of a bullet) fits within the 4n space allotted
by the document's `IP` calls, whereas "[bu]" does not.

Fixes warnings from "nroff -C -ww -man" in the forthcoming groff 1.24:
troff:./find/find.1:2260: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2277: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2305: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2326: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2349: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2372: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2392: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2402: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2415: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2431: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2442: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2459: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2471: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2498: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2542: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2597: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2618: warning: an escaped '[' is not portable to AT&T troff
troff:./find/find.1:2630: warning: an escaped '[' is not portable to AT&T troff
---
 find/find.1 | 38 +++++++++++++++++++-------------------
 1 file changed, 19 insertions(+), 19 deletions(-)

diff --git a/find/find.1 b/find/find.1
index c527dff9..7c0eeaf8 100644
--- a/find/find.1
+++ b/find/find.1
@@ -2248,14 +2248,14 @@ .SH ENVIRONMENT VARIABLES
 .BR \-fprintf .
 .
 .SH EXAMPLES
-.\" A bulleted \[bu] list of examples.
+.\" A bulleted \(bu list of examples.
 .SS Simple `find|xargs` approach
 .\".nr margin_n \n[an-margin]u/1n
 .\"an-margin is \n[margin_n]n
 .\".nr prev-indent_n \n[an-prevailing-indent]u/1n
 .\"an-prevailing-indent] is \n[prev-indent_n]n
 .\".br
-.IP \[bu] 4n
+.IP \(bu 4n
 Find files named
 .I core
 in or below the directory
@@ -2272,7 +2272,7 @@ .SS Simple `find|xargs` approach
 any filenames containing newlines, single or double quotes, or spaces.
 .
 .SS Safer `find \-print0 | xargs \-0` approach
-.IP \[bu] 4n
+.IP \(bu 4n
 Find files named \fIcore\fP in or below the directory \fI/tmp\fP
 and delete them, processing filenames in such a way that file or
 directory names containing single or double quotes, spaces or newlines
@@ -2300,7 +2300,7 @@ .SS Safer `find \-print0 | xargs \-0` approach
 works with that file.
 .
 .SS Processing arbitrary starting points
-.IP \[bu] 4n
+.IP \(bu 4n
 Given that another program \fIproggy\fR pre-filters and creates a huge
 NUL-separated list of files, process those as starting points, and find
 all regular, empty files among them:
@@ -2321,7 +2321,7 @@ .SS Processing arbitrary starting points
 .
 .SS
 Executing a command for each file
-.IP \[bu] 4n
+.IP \(bu 4n
 Run
 .I file
 on every file in or below the current directory.
@@ -2344,7 +2344,7 @@ .SS Processing arbitrary starting points
 syntax for performance and security reasons.
 .
 .SS Traversing the filesystem just once \(en for 2 different actions
-.IP \[bu] 4n
+.IP \(bu 4n
 Traverse the filesystem just once, listing set-user-ID files and
 directories into
 .I /root/suid.txt
@@ -2367,7 +2367,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .
 .SS
 Searching files by age
-.IP \[bu] 4n
+.IP \(bu 4n
 Search for files in your home directory which have been modified in
 the last twenty-four hours.
 .nf
@@ -2387,7 +2387,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .
 .SS
 Searching files by permissions
-.IP \[bu] 4n
+.IP \(bu 4n
 Search for files which are executable but not readable.
 .nf
 \&
@@ -2396,7 +2396,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .in
 .fi
 .
-.IP \[bu] 4n
+.IP \(bu 4n
 Search for files which have read and write permission for their owner,
 and group, but which other users can read but not write to.
 .nf
@@ -2409,7 +2409,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 Files which meet these criteria but have other permissions bits set
 (for example if someone can execute the file) will not be matched.
 .
-.IP \[bu]
+.IP \(bu
 Search for files which have read and write permission for their owner
 and group, and which other users can read, without regard to the
 presence of any extra permission bits (for example the executable
@@ -2425,7 +2425,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .IR 0777 ,
 for example.
 .
-.IP \[bu]
+.IP \(bu
 Search for files which are writable by somebody (their owner, or
 their group, or anybody else).
 .nf
@@ -2435,7 +2435,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .in
 .fi
 .
-.IP \[bu]
+.IP \(bu
 Search for files which are writable by either their owner or their group.
 .nf
 \&
@@ -2452,7 +2452,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 The files don't have to be writable by both the owner and group to be matched;
 either will do.
 .
-.IP \[bu]
+.IP \(bu
 Search for files which are writable by both their owner and their group.
 .nf
 \&
@@ -2464,7 +2464,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .fi
 Both these commands do the same thing.
 .
-.IP \[bu]
+.IP \(bu
 A more elaborate search on permissions.
 .nf
 \&
@@ -2491,7 +2491,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .
 .SS
 Pruning \(en omitting files and subdirectories
-.IP \[bu] 4n
+.IP \(bu 4n
 Copy the contents of
 .I /source-dir
 to
@@ -2535,7 +2535,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 this is the default anyway, but the parentheses help to show
 what is going on.
 .
-.IP \[bu] 4n
+.IP \(bu 4n
 Given the following directory of projects and their associated SCM
 administrative directories, perform an efficient search for the
 projects' roots:
@@ -2590,7 +2590,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .
 .SS
 Other useful examples
-.IP \[bu] 4n
+.IP \(bu 4n
 Search for several file types.
 .nf
 \&
@@ -2610,7 +2610,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .in
 .fi
 .
-.IP \[bu] 4n
+.IP \(bu 4n
 Search for files with the particular name
 .I needle
 and stop immediately when we find the first one.
@@ -2621,7 +2621,7 @@ .SS Traversing the filesystem just once \(en for 2 
different actions
 .in
 .fi
 .
-.IP \[bu] 4n
+.IP \(bu 4n
 Demonstrate the interpretation of the
 .B %f
 and
-- 
2.30.2

Attachment: signature.asc
Description: PGP signature

Reply via email to