1 Description: Man page fixes as of mmv 1.01b-15
2 This patch contains the man-page fixes as of mmv 1.01b-15 when it has
3 been converted to the source format "3.0 (quilt)"
4 Author: Multiple Authors. See changelog for details.
5 Reviewed-By: Axel Beckert <abe@debian.org>
6 Last-Update: 2012-12-29
8 --- mmv-1.01b.orig/mmv.1
11 .\" To print the MS-DOS version, use option -rO2.
12 .\" Under System V, take out the '.\" ' from the next line.
14 -.TH MMV 1 "November 20, 1989 (v1.0)"
15 +.TH MMV 1 "November 20, 2001 (v1.0lfs)"
18 mmv \- move/copy/append/link multiple files by wildcard patterns
19 @@ -21,13 +21,14 @@ mmv \- move/copy/append multiple files b
23 -.if '\nO'2' [\fB-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBz\fP]
24 -.if '\nO'0' [\fB-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBl\fP|\fBs\fP]
25 -.if '\nO'1' [\fB-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBl\fP]
30 +.if '\nO'2' [\fB\-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBz\fP]
31 +.if '\nO'0' [\fB\-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBl\fP|\fBs\fP]
32 +.if '\nO'1' [\fB\-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBl\fP]
41 @@ -56,6 +57,9 @@ from the entire set of actions specified
42 and gives the user the choice of either
43 proceeding by avoiding the offending parts
46 +does support large files (LFS) but it does *NOT* support
47 +sparse files (i.e. it explodes them).
51 @@ -71,7 +75,7 @@ If none of these are specified,
53 a default (patchable by
60 @@ -81,18 +85,18 @@ was invoked (argv[0]):
62 command name default task
77 The task option choices are:
81 move source file to target name.
82 Both must be on the same device.
83 Will not move directories.
84 @@ -102,8 +106,8 @@ moves the link without checking if the l
85 directory is different than the old.
89 -same as -m, except cross-device moves are done
91 +same as \-m, except cross-device moves are done
92 by copying, then deleting source.
93 When copying, sets the
94 .ie !'\nO'2' permission bits
95 @@ -111,7 +115,7 @@ When copying, sets the
96 and file modification time
97 of the target file to that of the source file.
101 rename source file or directory to target name.
102 The target name must not include a path:
103 the file remains in the same directory in all cases.
104 @@ -119,7 +123,7 @@ This option is the only way of renaming
106 .if '\nO'2' It is only available under DOS version 3.0 or higher.
110 copy source file to target name.
111 Sets the file modification time and
112 .ie !'\nO'2' permission bits
113 @@ -128,7 +132,7 @@ of the target file to that of the source
114 regardless of whether the target file already exists.
115 Chains and cycles (to be explained below) are not allowed.
119 overwrite target name with source file.
121 If target file exists, its attributes are left unchanged.
122 @@ -146,38 +150,38 @@ and the execute permission bits copied f
123 In either case, the file modification time is set to the current time.
128 append contents of source file to target name.
129 Target file modification time is set to the current time.
130 If target file does not exist,
132 .ie '\nO'2' attributes
135 -Unlike all other options, -a allows multiple source files to have the
136 -same target name, e.g. "mmv -a
138 +Unlike all other options, \-a allows multiple source files to have the
139 +same target name, e.g. "mmv \-a
142 big" will append all ".c" files to "big".
143 -Chains and cycles are also allowed, so "mmv -a f f" will double up "f".
144 +Chains and cycles are also allowed, so "mmv \-a f f" will double up "f".
148 -same as -a, but if the target file exists, and its last character is a ^Z,
150 +same as \-a, but if the target file exists, and its last character is a ^Z,
151 and the source file is not empty,
152 this ^Z is truncated before doing the append.
158 link target name to source file.
159 Both must be on the same device,
160 and the source must not be a directory.
161 Chains and cycles are not allowed.
165 -same as -l, but use symbolic links instead of hard links.
167 +same as \-l, but use symbolic links instead of hard links.
168 For the resulting link to aim back at the source,
169 either the source name must begin with a '/',
170 or the target must reside in either the current or the source directory.
171 @@ -190,7 +194,7 @@ and the source can be a directory.
172 Only one of these option may be given,
173 and it applies to all matching files.
174 Remaining options need not be given separately,
175 -i.e. "mmv -mk" is allowed.
176 +i.e. "mmv \-mk" is allowed.
179 Multiple Pattern Pairs
180 @@ -232,7 +236,7 @@ a b
184 -would give the error message "a -> c : no match" because file "a"
185 +would give the error message "a \-> c : no match" because file "a"
187 was already matched by the first pattern pair.
189 @@ -255,10 +259,10 @@ matching any single character,
190 and matching any one of a set of characters.
192 Between the '[' and ']', a range from character 'a' through character 'z'
193 -is specified with "a-z".
194 +is specified with "a\-z".
195 The set of matching characters can be negated by inserting
198 +Thus, "[^b\-e2\-5_]"
199 will match any character but 'b' through 'e', '2' through '5', and '_'.
202 @@ -305,13 +309,13 @@ However, the '~' is not treated as a wil
203 in the sense that it is not assigned a wildcard index (see below).
206 -Since matching a directory under a task option other than -r or -s
207 +Since matching a directory under a task option other than \-r or \-s
208 would result in an error,
209 -tasks other than -r and -s
210 +tasks other than \-r and \-s
211 match directories only against completely explicit
213 patterns (i.e. not containing wildcards).
214 -Under -r and -s, this applies only to "." and "..".
215 +Under \-r and \-s, this applies only to "." and "..".
218 Hidden and system files are also only matched
219 @@ -324,7 +328,7 @@ Files beginning with '.' are only matche
221 patterns that begin with an explicit '.'.
223 -However, if -h is specified, they are matched normally.
224 +However, if \-h is specified, they are matched normally.
227 Warning: since the shell normally expands wildcards
228 @@ -332,8 +336,9 @@ before passing the command-line argument
230 it is usually necessary to enclose the command-line
240 @@ -363,7 +368,7 @@ pattern is "abc*.*" and the
241 pattern is "xyz#2.#1",
242 then "abc.txt" is targeted to "xyztxt.".
243 (The first '*' matched "", and the second matched "txt".)
244 -Similarly, for the pattern pair ";*.[clp]" -> "#1#3\*(SL#2",
245 +Similarly, for the pattern pair ";*.[clp]" \-> "#1#3\*(SL#2",
246 "foo1\*(SLfoo2\*(SLprog.c" is targeted to "foo1\*(SLfoo2\*(SLc\*(SLprog".
247 Note that there is no '\*(SL' following the "#1" in the
249 @@ -397,7 +402,7 @@ expands the '~' in the exact same manner
250 does not expand it at all).
253 -For all task options other than -r, if the target name is a directory,
254 +For all task options other than \-r, if the target name is a directory,
255 the real target name is formed by appending
256 a '\*(SL' followed by the last component
257 of the source file name.
258 @@ -434,7 +439,7 @@ a b
262 -specifies the chain "a" -> "b" -> "c".
263 +specifies the chain "a" \-> "b" \-> "c".
264 A cycle is a chain where the last target name
265 refers back to the first source file,
267 @@ -461,9 +466,9 @@ Furthermore,
269 checks if any of its actions will result
270 in the destruction of existing files.
271 -If the -d (delete) option is specified,
272 +If the \-d (delete) option is specified,
273 all file deletions or overwrites are done silently.
274 -Under -p (protect), all deletions or overwrites
275 +Under \-p (protect), all deletions or overwrites
276 (except those specified with "(*)" on the standard input, see below)
277 are treated as errors.
278 And if neither option is specified,
279 @@ -487,16 +492,16 @@ Once all errors are detected,
280 queries the user whether he wishes
281 to continue by avoiding the erroneous actions or to abort altogether.
282 This and all other queries may be avoided by specifying either the
283 --g (go) or -t (terminate) option.
284 +\-g (go) or \-t (terminate) option.
285 The former will resolve all difficulties by avoiding the erroneous actions;
286 the latter will abort
288 if any errors are detected.
289 Specifying either of them defaults
291 -to -p, unless -d is specified
292 +to \-p, unless \-d is specified
294 -Thus, -g and -t are most useful when running
295 +Thus, \-g and \-t are most useful when running
297 in the background or in
299 @@ -508,28 +513,28 @@ Reports
300 Once the actions to be performed are determined,
302 performs them silently,
303 -unless either the -v (verbose) or -n (no-execute) option is specified.
304 +unless either the \-v (verbose) or \-n (no-execute) option is specified.
307 to report each performed action
308 on the standard output as
313 Here, "a" and "b" would be replaced by the source and target names,
315 If the action deletes the old target,
316 a "(*)" is inserted after the the target name.
317 -Also, the "->" symbol is modified when a cycle has to be broken:
318 +Also, the "\->" symbol is modified when a cycle has to be broken:
319 the '>' is changed to a '^' on the action prior to which the old target
320 is renamed to a temporary,
321 -and the '-' is changed to a '=' on the action where the temporary is used.
322 +and the '\-' is changed to a '=' on the action where the temporary is used.
324 -Under -n, none of the actions are performed,
325 +Under \-n, none of the actions are performed,
326 but messages like the above are printed on the standard output
327 with the ": done." omitted.
329 -The output generated by -n can (after editing, if desired)
330 +The output generated by \-n can (after editing, if desired)
333 on the standard input
334 @@ -545,9 +550,9 @@ To facilitate this,
335 ignores lines on the standard input that look
336 like its own error and "done" messages,
337 as well as all lines beginning with white space,
338 -and will accept pattern pairs with or without the intervening "->"
339 -(or "-^", "=>", or "=^").
340 -Lines with "(*)" after the target pattern have the effect of enabling -d
341 +and will accept pattern pairs with or without the intervening "\->"
342 +(or "\-^", "=>", or "=^").
343 +Lines with "(*)" after the target pattern have the effect of enabling \-d
344 for the files matching this pattern only,
345 so that such deletions are done silently.
347 @@ -596,11 +601,11 @@ on a copy of
352 + \-x, \-m, \-r mmv.exe
361 also determines the best way to uniquely identify directories.