AT&T UNIX™PC Unix System V Users Manual - tenox
AT&T UNIX™PC Unix System V Users Manual - tenox AT&T UNIX™PC Unix System V Users Manual - tenox
(� ·. , '(Y � . ' :J
BFS (I) BFS(I) NAME bfs - big file scanner SYNOPSIS bfs [ - ] name DESCRIPTION Bfs is (almost) like ed(1) except that it is read-only and processes much larger files. Files can be up to 1024K bytes (the maximum possible size) and 32K lines, with up to 255 characters per line. Bfs is usually more efficient than ed for scanning a file, since the file is not copied to a buffer. It is most useful for identifying sections of a large file where csplit(1) can be used to divide it into more manageable pieces for editing. Normally, the size of the file being scanned is printed, as is the size of any file written with the w command. The optional - suppresses printing of sizes. Input is prompted with * if P and a carriage return are typed as in ed. Prompting can be turned off again by inputting another P and carriage return. Note that messages are given in response to errors if prompting is turned on. All address expressions described under ed are supported. In addition, regular expressions may be surrounded with two symbols besides / and ?: > indicates downward search without wraparound, and < indicates upward search without wrap-around. Since bfs uses a different regular expression-matching routine from ed, the regular expressions accepted are slightly wider in scope (see regcmp (3X)). There is a slight difference in mark names: only the letters a through z may be used, and all 26 marks are remembered. The e, g, v, k, n, p, q, w, =, ! and null commands operate as described under ed. Commands such as ---, +++-, +++=, -12, and +4p are accepted. Note that 1,10p and 1,10 will both print the first ten lines. The f command only prints the name of the file being scanned; there is no remembered file name. The w command is independent of output diversion, truncation, or crunching (see the xo, xt and xc commands, below). The following additional commands are available: xf file Further commands are taken from the named file . When an end-of-file is reached, an interrupt signal is received or an error occurs, reading resumes with the file containing the xf. Xf commands may be nested to a depth of 10. XO [file ] Further output from the p and null commands is diverted to the named file , which, if necessary, is created mode 666. If file is missing, output is diverted to the standard output. Note that each diversion causes truncation or creation of the file. - 1 -
- Page 153 and 154: generate e program cross reference.
- Page 155 and 156: stream. setbuf: assign buffering to
- Page 157 and 158: � Permuted Index /strcmp, strncmp
- Page 159 and 160: tsort: topologica.l sort. • . .
- Page 161 and 162: display editor based on/ vi, view:
- Page 163: INTRO ( 1) INTRO ( l ) NAME intro -
- Page 166 and 167: 300 ( 1 ) 300 ( 1 ) for C programs,
- Page 168 and 169: \�
- Page 170 and 171: I I I I I I I I I I I I I I I I I I
- Page 172 and 173: ADB ( 1 ) ADB (l) sr, and usp. symb
- Page 174 and 175: ADB ( 1} ADB (l} " ••• " 0 Pr
- Page 176 and 177: ADB ( 1) ADDRESSES b d e m 8 t The
- Page 178 and 179: ADMIN ( 1) -t[name] -fflag b ADMIN(
- Page 180 and 181: ADMIN(l) ADMIN(l) make deltas (chan
- Page 182 and 183: ( � � . · � .
- Page 184 and 185: AR(l) AR (I) X Extract the named fi
- Page 186 and 187: AS (l) (AT&T UNIX PC Only ) AS (I)
- Page 188 and 189: ·� · ·. rl · (1
- Page 191 and 192: AWK (l) AWK (l) NAME awk - pattern
- Page 193: AWK (l) AWK(l) Add up first column,
- Page 196 and 197: f) .. .... ._ __ . ·
- Page 198 and 199: I� �� I J
- Page 200 and 201: BC(l) BC (l) l(x) log a(x) arctange
- Page 203: BDIFF(l) BDIFF ( 1 ) NAME bdiff - b
- Page 207 and 208: BFS (l) BFS (l) could be used to ma
- Page 209: CAL ( 1) CAL(l) NAME cal - print ca
- Page 212 and 213: ' ..
- Page 215 and 216: ;� CC ( l ) cc (1) NAME cc - C co
- Page 217: CC(l) /lib/crts.o /lib/mcrto.o /lib
- Page 221 and 222: CDC ( 1 ) CDC { 1) NAME cdc - chang
- Page 223: CDC (l) CDC (l) SEE ALSO admin( l),
- Page 226 and 227: CFLOW ( 1) CFLOW ( 1) produces the
- Page 228 and 229: CFONT(l) (AT&T UNIX PC only ) CFONT
- Page 231: CHOWN (l) CHOWN ( 1) NAME chown, ch
- Page 234 and 235: .'�
- Page 236 and 237: I I I I I I I I I I I I I I I I I I
- Page 238 and 239: COL(l) COL(l) BUGS Cannot back up m
- Page 240 and 241: COMB(l) COMB(l) FIT..ES s.COMB The
- Page 243 and 244: CP ( 1) CP ( 1) NAME cp, In, mv - c
- Page 245 and 246: CPIO ( 1 ) CPIO ( 1) NAME cpio - co
- Page 247: CPIO ( 1) CPIO ( 1) track of them a
- Page 250 and 251: CPP ( 1) CPP (1) Two special names
- Page 253 and 254: CRYPT { l ) ( Domestic Version Only
(� ·.<br />
, '(Y<br />
� .<br />
' :J