.\" To print the MS-DOS version, use option -rO2.
.\" Under System V, take out the '.\" ' from the next line.
.\" .nr O 1
.\" To print the MS-DOS version, use option -rO2.
.\" Under System V, take out the '.\" ' from the next line.
.\" .nr O 1
-.if '\nO'2' [\fB\-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBz\fP]
-.if '\nO'0' [\fB\-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBl\fP|\fBs\fP]
-.if '\nO'1' [\fB\-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBl\fP]
-[\fB\-h\fP]
-[\fB\-d\fP|\fBp\fP]
-[\fB\-g\fP|\fBt\fP]
-[\fB\-v\fP|\fBn\fP]
-[\fB\-\-\fP]
+.if '\nO'2' [\fB-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBz\fP]
+.if '\nO'0' [\fB-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBl\fP|\fBs\fP]
+.if '\nO'1' [\fB-m\fP|\fBx\fP|\fBr\fP|\fBc\fP|\fBo\fP|\fBa\fP|\fBl\fP]
+[\fB-h\fP]
+[\fB-d\fP|\fBp\fP]
+[\fB-g\fP|\fBt\fP]
+[\fB-v\fP|\fBn\fP]
move source file to target name.
Both must be on the same device.
Will not move directories.
move source file to target name.
Both must be on the same device.
Will not move directories.
by copying, then deleting source.
When copying, sets the
.ie !'\nO'2' permission bits
by copying, then deleting source.
When copying, sets the
.ie !'\nO'2' permission bits
rename source file or directory to target name.
The target name must not include a path:
the file remains in the same directory in all cases.
rename source file or directory to target name.
The target name must not include a path:
the file remains in the same directory in all cases.
copy source file to target name.
Sets the file modification time and
.ie !'\nO'2' permission bits
copy source file to target name.
Sets the file modification time and
.ie !'\nO'2' permission bits
regardless of whether the target file already exists.
Chains and cycles (to be explained below) are not allowed.
.TP
regardless of whether the target file already exists.
Chains and cycles (to be explained below) are not allowed.
.TP
overwrite target name with source file.
.ie '\nO'2' \{\
If target file exists, its attributes are left unchanged.
overwrite target name with source file.
.ie '\nO'2' \{\
If target file exists, its attributes are left unchanged.
append contents of source file to target name.
Target file modification time is set to the current time.
If target file does not exist,
it is created with
.ie '\nO'2' attributes
.el permission bits
append contents of source file to target name.
Target file modification time is set to the current time.
If target file does not exist,
it is created with
.ie '\nO'2' attributes
.el permission bits
-set as under \-o.
-Unlike all other options, \-a allows multiple source files to have the
-same target name, e.g. "mmv \-a
+set as under -o.
+Unlike all other options, -a allows multiple source files to have the
+same target name, e.g. "mmv -a
-\-z :
-same as \-a, but if the target file exists, and its last character is a ^Z,
+-z :
+same as -a, but if the target file exists, and its last character is a ^Z,
and the source file is not empty,
this ^Z is truncated before doing the append.
\}
.el \{\
.TP
and the source file is not empty,
this ^Z is truncated before doing the append.
\}
.el \{\
.TP
link target name to source file.
Both must be on the same device,
and the source must not be a directory.
Chains and cycles are not allowed.
.if '\nO'0' \{\
.TP
link target name to source file.
Both must be on the same device,
and the source must not be a directory.
Chains and cycles are not allowed.
.if '\nO'0' \{\
.TP
For the resulting link to aim back at the source,
either the source name must begin with a '/',
or the target must reside in either the current or the source directory.
For the resulting link to aim back at the source,
either the source name must begin with a '/',
or the target must reside in either the current or the source directory.
Only one of these option may be given,
and it applies to all matching files.
Remaining options need not be given separately,
Only one of these option may be given,
and it applies to all matching files.
Remaining options need not be given separately,
and matching any one of a set of characters.
.PP
Between the '[' and ']', a range from character 'a' through character 'z'
and matching any one of a set of characters.
.PP
Between the '[' and ']', a range from character 'a' through character 'z'
pattern is "xyz#2.#1",
then "abc.txt" is targeted to "xyztxt.".
(The first '*' matched "", and the second matched "txt".)
pattern is "xyz#2.#1",
then "abc.txt" is targeted to "xyztxt.".
(The first '*' matched "", and the second matched "txt".)
"foo1\*(SLfoo2\*(SLprog.c" is targeted to "foo1\*(SLfoo2\*(SLc\*(SLprog".
Note that there is no '\*(SL' following the "#1" in the
.I to
"foo1\*(SLfoo2\*(SLprog.c" is targeted to "foo1\*(SLfoo2\*(SLc\*(SLprog".
Note that there is no '\*(SL' following the "#1" in the
.I to
A cycle is a chain where the last target name
refers back to the first source file,
e.g. "mmv a a".
A cycle is a chain where the last target name
refers back to the first source file,
e.g. "mmv a a".
(except those specified with "(*)" on the standard input, see below)
are treated as errors.
And if neither option is specified,
(except those specified with "(*)" on the standard input, see below)
are treated as errors.
And if neither option is specified,
queries the user whether he wishes
to continue by avoiding the erroneous actions or to abort altogether.
This and all other queries may be avoided by specifying either the
queries the user whether he wishes
to continue by avoiding the erroneous actions or to abort altogether.
This and all other queries may be avoided by specifying either the
The former will resolve all difficulties by avoiding the erroneous actions;
the latter will abort
.I mmv
if any errors are detected.
Specifying either of them defaults
.I mmv
The former will resolve all difficulties by avoiding the erroneous actions;
the latter will abort
.I mmv
if any errors are detected.
Specifying either of them defaults
.I mmv
Here, "a" and "b" would be replaced by the source and target names,
respectively.
If the action deletes the old target,
a "(*)" is inserted after the the target name.
Here, "a" and "b" would be replaced by the source and target names,
respectively.
If the action deletes the old target,
a "(*)" is inserted after the the target name.
the '>' is changed to a '^' on the action prior to which the old target
is renamed to a temporary,
the '>' is changed to a '^' on the action prior to which the old target
is renamed to a temporary,
ignores lines on the standard input that look
like its own error and "done" messages,
as well as all lines beginning with white space,
ignores lines on the standard input that look
like its own error and "done" messages,
as well as all lines beginning with white space,
-and will accept pattern pairs with or without the intervening "\->"
-(or "\-^", "=>", or "=^").
-Lines with "(*)" after the target pattern have the effect of enabling \-d
+and will accept pattern pairs with or without the intervening "->"
+(or "-^", "=>", or "=^").
+Lines with "(*)" after the target pattern have the effect of enabling -d
for the files matching this pattern only,
so that such deletions are done silently.
When feeding
for the files matching this pattern only,
so that such deletions are done silently.
When feeding