linux-bash-find

2023-05-16

FIND(1) General Commands Manual FIND(1)

1 NAME

    find - search for files in a directory hierarchy 

2 SYNOPSIS

    find [-H] [-L] [-P] [-D debugopts] [-Olevel] [path...] [expression] 

3 DESCRIPTION

    This manual page documents the GNU version of find. GNU find searches the directory tree rooted at each given file name by evaluating the given expression from left to right, according to the rules of precedence (see section OPERATORS), until the outcome is known (the left hand side is false for and operations, true for or), at which point find moves on to the next file name.  
    If you are using find in an environment where security is important (for example if you are using it to search directories that are writable by other users), you should read the "Security Considerations" chapter of the findu‐ tils documentation, which is called Finding Files and comes with findutils. That document also includes a lot more detail and discussion than this manual page, so you may find it a more useful source of information. 

4 OPTIONS

The -H, -L and -P options control the treatment of symbolic links. Command- line arguments following these are taken to be names of files or directories to be examined, up to the first argument that begins with -', or the argu‐ ment(’ or !'. That argument and any following arguments are taken to be the expression describing what is to be searched for. If no paths are given, the current directory is used. If no expression is given, the expression -print is used (but you should probably consider using -print0 instead, anyway).
This manual page talks about
options’ within the expression list. These options control the behaviour of find but are specified immediately after the last path name. The five real' options -H, -L, -P, -D and -O must appear before the first path name, if at all. A double dash -- can also be used to signal that any remaining arguments are not options (though ensuring that all start points begin with either./’ or `/’ is generally safer if you use wildcards in the list of start points).

4.1 -P

Never follow symbolic links. This is the default behaviour. When find examines or prints information a file, and the file is a sym‐ bolic link, the information used shall be taken from the properties of the symbolic link itself.

4.2 -L

Follow symbolic links. When find examines or prints information about files, the information used shall be taken from the properties of the file to which the link points, not from the link itself (unless it is a broken symbolic link or find is unable to examine the file to which the link points). Use of this option implies -noleaf. If you later use the -P option, -noleaf will still be in effect. If -L is in effect and find discovers a symbolic link to a subdirectory during its search, the subdirectory pointed to by the symbolic link will be searched. When the -L option is in effect, the -type predicate will always match against the type of the file that a symbolic link points to rather than the link itself (unless the symbolic link is broken). Using -L causes the -lname and -ilname predicates always to return false.

4.3 -H

Do not follow symbolic links, except while processing the command line arguments. When find examines or prints information about files, the information used shall be taken from the properties of the symbolic link itself. The only exception to this behaviour is when a file specified on the command line is a symbolic link, and the link can be resolved. For that situation, the information used is taken from whatever the link points to (that is, the link is followed). The information about the link itself is used as a fallback if the file pointed to by the symbolic link cannot be examined. If -H is in effect and one of the paths specified on the command line is a sym‐ bolic link to a directory, the contents of that directory will be examined (though of course -maxdepth 0 would prevent this).
If more than one of -H, -L and -P is specified, each overrides the others; the last one appearing on the command line takes effect. Since it is the default, the -P option should be considered to be in effect unless either -H or -L is specified.
GNU find frequently stats files during the processing of the command line itself, before any searching has begun. These options also affect how those arguments are processed. Specifically, there are a number of tests that compare files listed on the command line against a file we are currently considering. In each case, the file specified on the command line will have been examined and some of its properties will have been saved. If the named file is in fact a symbolic link, and the -P option is in effect (or if nei‐ ther -H nor -L were specified), the information used for the comparison will be taken from the properties of the symbolic link. Otherwise, it will be taken from the properties of the file the link points to. If find cannot follow the link (for example because it has insufficient privileges or the link points to a nonexistent file) the properties of the link itself will be used.
When the -H or -L options are in effect, any symbolic links listed as the argument of -newer will be dereferenced, and the timestamp will be taken from the file to which the symbolic link points. The same consideration applies to -newerXY, -anewer and -cnewer.
The -follow option has a similar effect to -L, though it takes effect at the point where it appears (that is, if -L is not used but -follow is, any sym‐ bolic links appearing after -follow on the command line will be derefer‐ enced, and those before it will not).

4.4 -D debugoptions

Print diagnostic information; this can be helpful to diagnose problems with why find is not doing what you want. The list of debug options should be comma separated. Compatibility of the debug options is not guaranteed between releases of findutils. For a complete list of valid debug options, see the output of find -D help. Valid debug options include

4.4.1 help

Explain the debugging options

4.4.2 tree

Show the expression tree in its original and optimised form.

4.4.3 stat

Print messages as files are examined with the stat and lstat system calls. The find program tries to minimise such calls.

4.4.4 opt

Prints diagnostic information relating to the optimisation of the expression tree; see the -O option.

4.4.5 rates

Prints a summary indicating how often each predicate succeeded or failed.

4.5 -Olevel

        Enables query optimisation. The find program reorders tests to speed up execution while preserving the overall effect; that is, predicates with side effects are not reordered relative to each other. The optimisations performed at each optimisation level are as follows. 

4.5.1 0

Equivalent to optimisation level 1.

4.5.2 1

This is the default optimisation level and corresponds to the traditional behaviour. Expressions are reordered so that tests based only on the names of files (for example -name and -regex) are performed first.

4.5.3 2

Any -type or -xtype tests are performed after any tests based only on the names of files, but before any tests that require information from the inode. On many modern versions of Unix, file types are returned by readdir() and so these predicates are faster to evaluate than predicates which need to stat the file first.

4.5.4 3

At this optimisation level, the full cost-based query opti‐ miser is enabled. The order of tests is modified so that cheap (i.e. fast) tests are performed first and more expensive ones are performed later, if necessary. Within each cost band, predicates are evaluated earlier or later according to whether they are likely to succeed or not. For -o, predicates which are likely to succeed are evaluated earlier, and for -a, predicates which are likely to fail are evaluated earlier.
The cost-based optimiser has a fixed idea of how likely any given test is to succeed. In some cases the probability takes account of the specific nature of the test (for example, -type f is assumed to be more likely to succeed than -type c). The cost-based optimiser is currently being evaluated. If it does not actually improve the per‐ formance of find, it will be removed again. Conversely, optimisa‐ tions that prove to be reliable, robust and effective may be enabled at lower optimisation levels over time. However, the default behav‐ iour (i.e. optimisation level 1) will not be changed in the 4.3.x release series. The findutils test suite runs all the tests on find at each optimisation level and ensures that the result is the same.

5 EXPRESSIONS

The expression is made up of options (which affect overall operation rather than the processing of a specific file, and always return true), tests (which return a true or false value), and actions (which have side effects and return a true or false value), all separated by operators. -and is assumed where the operator is omitted.
If the expression contains no actions other than -prune, -print is performed on all files for which the expression is true.

5.1 OPTIONS

All options always return true. Except for -daystart, -follow and -regex‐ type, the options affect all tests, including tests specified before the option. This is because the options are processed when the command line is parsed, while the tests don’t do anything until files are examined. The -daystart, -follow and -regextype options are different in this respect, and have an effect only on tests which appear later in the command line. There‐ fore, for clarity, it is best to place them at the beginning of the expres‐ sion. A warning is issued if you don’t do this.

5.1.1 -d

A synonym for -depth, for compatibility with FreeBSD, NetBSD, MacOS X and OpenBSD.

5.1.2 -daystart

Measure times (for -amin, -atime, -cmin, -ctime, -mmin, and -mtime) from the beginning of today rather than from 24 hours ago. This option only affects tests which appear later on the command line.

5.1.3 -depth

Process each directory’s contents before the directory itself. The -delete action also implies -depth.

5.1.4-follow

Deprecated; use the -L option instead. Dereference symbolic links. Implies -noleaf. The -follow option affects only those tests which appear after it on the command line. Unless the -H or -L option has been specified, the position of the -follow option changes the behav‐ iour of the -newer predicate; any files listed as the argument of -newer will be dereferenced if they are symbolic links. The same consideration applies to -newerXY, -anewer and -cnewer. Similarly, the -type predicate will always match against the type of the file that a symbolic link points to rather than the link itself. Using -follow causes the -lname and -ilname predicates always to return false.

5.1.5 -help, –help

        Print a summary of the command-line usage of find and exit. 

5.1.6 -ignore_readdir_race

Normally, find will emit an error message when it fails to stat a file. If you give this option and a file is deleted between the time find reads the name of the file from the directory and the time it tries to stat the file, no error message will be issued. This also applies to files or directories whose names are given on the command line. This option takes effect at the time the command line is read, which means that you cannot search one part of the filesystem with this option on and part of it with this option off (if you need to do that, you will need to issue two find commands instead, one with the option and one without it).

5.1.7 -maxdepth levels

Descend at most levels (a non-negative integer) levels of directories below the command line arguments. -maxdepth 0 means only apply the tests and actions to the command line arguments.

5.1.8 -mindepth levels

Do not apply any tests or actions at levels less than levels (a non- negative integer). -mindepth 1 means process all files except the command line arguments.

5.1.9 -mount

Don’t descend directories on other filesystems. An alternate name for -xdev, for compatibility with some other versions of find.

5.1.10 -noignore_readdir_race

        Turns off the effect of -ignore_readdir_race. 

5.1.11 -noleaf

Do not optimize by assuming that directories contain 2 fewer subdirectories than their hard link count. This option is needed when searching filesystems that do not follow the Unix directory-link con‐ vention, such as CD-ROM or MS-DOS filesystems or AFS volume mount points. Each directory on a normal Unix filesystem has at least 2 hard links: its name and its .' entry. Additionally, its subdirec‐ tories (if any) each have a..’ entry linked to that directory. When find is examining a directory, after it has statted 2 fewer subdirectories than the directory’s link count, it knows that the rest of the entries in the directory are non-directories (`leaf’ files in the directory tree). If only the files’ names need to be examined, there is no need to stat them; this gives a significant increase in search speed.

5.1.12 -regextype type

Changes the regular expression syntax understood by -regex and -iregex tests which occur later on the command line. Currently- implemented types are emacs (this is the default), posix-awk, posix- basic, posix-egrep and posix-extended.

5.1.13 -version, –version

        Print the find version number and exit. 

5.1.14 -warn, -nowarn

Turn warning messages on or off. These warnings apply only to the command line usage, not to any conditions that find might encounter when it searches directories. The default behaviour corresponds to -warn if standard input is a tty, and to -nowarn otherwise.

5.1.15 -xdev

        Don't descend directories on other filesystems. 

5.2 TESTS

Some tests, for example -newerXY and -samefile, allow comparison between the file currently being examined and some reference file specified on the com‐ mand line. When these tests are used, the interpretation of the reference file is determined by the options -H, -L and -P and any previous -follow, but the reference file is only examined once, at the time the command line is parsed. If the reference file cannot be examined (for example, the stat(2) system call fails for it), an error message is issued, and find exits with a nonzero status.
Numeric arguments can be specified as

5.2.1 +n

for greater than n,

5.2.2 -n

for less than n,

5.2.3 n

for exactly n.

5.2.4 -amin n

        File was last accessed n minutes ago. 

5.2.5 -anewer file

File was last accessed more recently than file was modified. If file is a symbolic link and the -H option or the -L option is in effect, the access time of the file it points to is always used.

5.2.6 -atime n

File was last accessed n*24 hours ago. When find figures out how many 24-hour periods ago the file was last accessed, any fractional part is ignored, so to match -atime +1, a file has to have been accessed at least two days ago.

5.2.7 -cmin n

File’s status was last changed n minutes ago. -cnewer file File’s status was last changed more recently than file was modified. If file is a symbolic link and the -H option or the -L option is in effect, the status-change time of the file it points to is always used.

5.2.8 -ctime n

File’s status was last changed n*24 hours ago. See the comments for -atime to understand how rounding affects the interpretation of file status change times.

5.2.9 -empty

        File is empty and is either a regular file or a directory. 

5.2.10-executable

Matches files which are executable and directories which are search‐ able (in a file name resolution sense). This takes into account access control lists and other permissions artefacts which the -perm test ignores. This test makes use of the access(2) system call, and so can be fooled by NFS servers which do UID mapping (or root-squashing), since many systems implement access(2) in the client’s kernel and so cannot make use of the UID mapping information held on the server. Because this test is based only on the result of the access(2) system call, there is no guarantee that a file for which this test succeeds can actually be executed.

5.2.11 -false

        Always false. 

5.2.12 -fstype type

File is on a filesystem of type type. The valid filesystem types vary among different versions of Unix; an incomplete list of filesys‐ tem types that are accepted on some version of Unix or another is: ufs, 4.2, 4.3, nfs, tmp, mfs, S51K, S52K. You can use -printf with the %F directive to see the types of your filesystems.

5.2.13-gid n

File’s numeric group ID is n. -group gname File belongs to group gname (numeric group ID allowed).

5.2.14 -ilname pattern

Like -lname, but the match is case insensitive. If the -L option or the -follow option is in effect, this test returns false unless the symbolic link is broken. -iname pattern Like -name, but the match is case insensitive. For example, the patterns fo*' andF??’ match the file names Foo',FOO’, foo',fOo’, etc. In these patterns, unlike filename expansion by the shell, an initial ‘.’ can be matched by *'. That is, find -name *bar will match the file.foobar’. Please note that you should quote patterns as a matter of course, otherwise the shell will expand any wildcard characters in them.

5.2.15 -inum n

        File has inode number n. It is normally easier to use the -samefile test instead. 

5.2.16 -ipath pattern

Behaves in the same way as -iwholename. This option is deprecated, so please do not use it.

5.2.17 -iregex pattern

        Like -regex, but the match is case insensitive. 

5.2.18 -iwholename pattern

        Like -wholename, but the match is case insensitive. 

5.2.19 -links n

File has n links. -lname pattern File is a symbolic link whose contents match shell pattern pattern. The metacharacters do not treat /' or.’ specially. If the -L option or the -follow option is in effect, this test returns false unless the symbolic link is broken.

5.2.20-mmin n

        File's data was last modified n minutes ago. 

5.2.21 -mtime n

File’s data was last modified n*24 hours ago. See the comments for -atime to understand how rounding affects the interpretation of file modification times.

5.2.22 -name pattern

Base of file name (the path with the leading directories removed) matches shell pattern pattern. The metacharacters (*',?’, and []') match a.’ at the start of the base name (this is a change in findutils-4.2.2; see section STANDARDS CONFORMANCE below). To ignore a directory and the files under it, use -prune; see an example in the description of -path. Braces are not recognised as being special, despite the fact that some shells including Bash imbue braces with a special meaning in shell patterns. The filename matching is performed with the use of the fnmatch(3) library function. Don’t forget to enclose the pattern in quotes in order to protect it from expansion by the shell.

5.2.23 -newer file

File was modified more recently than file. If file is a symbolic link and the -H option or the -L option is in effect, the modifica‐ tion time of the file it points to is always used.

5.2.24 -newerXY reference

Compares the timestamp of the current file with reference. The ref‐ erence argument is normally the name of a file (and one of its timestamps is used for the comparison) but it may also be a string describing an absolute time. X and Y are placeholders for other letters, and these letters select which time belonging to how reference is used for the comparison.

5.2.24.1 a

The access time of the file reference

5.2.24.2 B

The birth time of the file reference

5.2.24.3 c

The inode status change time of reference

5.2.24.4 m

The modification time of the file reference

5.2.24.5 t

reference is interpreted directly as a time
Some combinations are invalid; for example, it is invalid for X to be t. Some combinations are not implemented on all systems; for example B is not supported on all systems. If an invalid or unsupported com‐ bination of XY is specified, a fatal error results. Time specifications are interpreted as for the argument to the -d option of GNU date. If you try to use the birth time of a reference file, and the birth time cannot be determined, a fatal error message results. If you specify a test which refers to the birth time of files being examined, this test will fail for any files where the birth time is unknown.

5.2.25 -nogroup

        No group corresponds to file's numeric group ID. 

5.2.26 -nouser

        No user corresponds to file's numeric user ID. 

5.2.27 -path pattern

File name matches shell pattern pattern. The metacharacters do not treat /' or.’ specially; so, for example,
find . -path “./sr*sc”
will print an entry for a directory called ./src/misc' (if one exists). To ignore a whole directory tree, use -prune rather than checking every file in the tree. For example, to skip the directorysrc/emacs’ and all files and directories under it, and print the names of the other files found, do something like this:
find . -path ./src/emacs -prune -o -print
Note that the pattern match test applies to the whole file name, starting from one of the start points named on the command line. It would only make sense to use an absolute path name here if the rele‐ vant start point is also an absolute path. This means that this com‐ mand will never match anything:
find bar -path /foo/bar/myfile -print
The predicate -path is also supported by HP-UX find and will be in a forthcoming version of the POSIX standard.

5.2.28 -perm mode

File’s permission bits are exactly mode (octal or symbolic). Since an exact match is required, if you want to use this form for symbolic modes, you may have to specify a rather complex mode string. For example -perm g=w will only match files which have mode 0020 (that is, ones for which group write permission is the only permission set). It is more likely that you will want to use the /' or-’ forms, for example -perm -g=w, which matches any file with group write permission. See the EXAMPLES section for some illustrative examples.

5.2.29 -perm -mode

All of the permission bits mode are set for the file. Symbolic modes are accepted in this form, and this is usually the way in which would want to use them. You must specify u',g’ or `o’ if you use a sym‐ bolic mode. See the EXAMPLES section for some illustrative exam‐ ples.

5.2.30 -perm /mode

Any of the permission bits mode are set for the file. Symbolic modes are accepted in this form. You must specify u',g’ or `o’ if you use a symbolic mode. See the EXAMPLES section for some illustrative examples. If no permission bits in mode are set, this test matches any file (the idea here is to be consistent with the behaviour of -perm -000).

5.2.31 -perm +mode

Deprecated, old way of searching for files with any of the permission bits in mode set. You should use -perm /mode instead. Trying to use the +' syntax with symbolic modes will yield surprising results. For example,+u+x’ is a valid symbolic mode (equivalent to +u,+x, i.e. 0111) and will therefore not be evaluated as -perm +mode but instead as the exact mode specifier -perm mode and so it matches files with exact permissions 0111 instead of files with any execute bit set. If you found this paragraph confusing, you’re not alone - just use -perm /mode. This form of the -perm test is deprecated because the POSIX specification requires the interpretation of a leading +' as being part of a symbolic mode, and so we switched to using/’ instead.

5.2.32 -readable

Matches files which are readable. This takes into account access control lists and other permissions artefacts which the -perm test ignores. This test makes use of the access(2) system call, and so can be fooled by NFS servers which do UID mapping (or root-squash‐ ing), since many systems implement access(2) in the client’s kernel and so cannot make use of the UID mapping information held on the server.

5.2.33 -regex pattern

File name matches regular expression pattern. This is a match on the whole path, not a search. For example, to match a file named ./fubar3', you can use the regular expression.*bar.’ or .*b.*3', but notf.*r3’. The regular expressions understood by find are by default Emacs Regular Expressions, but this can be changed with the -regextype option.

5.2.34 -samefile name

File refers to the same inode as name. When -L is in effect, this can include symbolic links.

5.2.35 -size n[cwbkMG]

        File uses n units of space. The following suffixes can be used: 

5.2.35.1 `b’

for 512-byte blocks (this is the default if no suffix is used)

5.2.35.2 `c’

for bytes

5.2.35.3 `w’

for two-byte words

5.2.35.4 `k’

for Kilobytes (units of 1024 bytes)

5.2.35.5 `M’

for Megabytes (units of 1048576 bytes)

5.2.35.6 `G’

for Gigabytes (units of 1073741824 bytes)
The size does not count indirect blocks, but it does count blocks in sparse files that are not actually allocated. Bear in mind that the %k' and%b’ format specifiers of -printf handle sparse files differently. The `b’ suffix always denotes 512-byte blocks and never 1 Kilobyte blocks, which is different to the behaviour of -ls.

5.2.36 -true

        Always true. 

5.2.37 -type c

        File is of type c: 

5.2.37.1 b

block (buffered) special

5.2.37.2 c

character (unbuffered) special

5.2.37.3 d

directory

5.2.37.4 p

named pipe (FIFO)

5.2.37.5 f

regular file

5.2.37.6 l

symbolic link; this is never true if the -L option or the -follow option is in effect, unless the symbolic link is broken. If you want to search for symbolic links when -L is in effect, use -xtype.

5.2.37.7 s

socket

5.2.37.8 D

door (Solaris)

5.2.38 -uid n

        File's numeric user ID is n. 

5.2.39 -used n

        File was last accessed n days after its status was last changed. 

5.2.40 -user uname

        File is owned by user uname (numeric user ID allowed). 

5.2.41 -wholename pattern

        See -path. This alternative is less portable than -path. 

5.2.42 -writable

Matches files which are writable. This takes into account access control lists and other permissions artefacts which the -perm test ignores. This test makes use of the access(2) system call, and so can be fooled by NFS servers which do UID mapping (or root-squash‐ ing), since many systems implement access(2) in the client’s kernel and so cannot make use of the UID mapping information held on the server.

5.2.43 -xtype c

The same as -type unless the file is a symbolic link. For symbolic links: if the -H or -P option was specified, true if the file is a link to a file of type c; if the -L option has been given, true if c is `l’. In other words, for symbolic links, -xtype checks the type of the file that -type does not check.

6 ACTIONS

6.1 -delete

Delete files; true if removal succeeded. If the removal failed, an error message is issued. If -delete fails, find’s exit status will be nonzero (when it eventually exits). Use of -delete automatically turns on the -depth option.
Warnings: Don’t forget that the find command line is evaluated as an expression, so putting -delete first will make find try to delete everything below the starting points you specified. When testing a find command line that you later intend to use with -delete, you should explicitly specify -depth in order to avoid later surprises. Because -delete implies -depth, you cannot usefully use -prune and -delete together.

6.2 -exec command ;

Execute command; true if 0 status is returned. All following argu‐ ments to find are taken to be arguments to the command until an argu‐ ment consisting of ;' is encountered. The string{}’ is replaced by the current file name being processed everywhere it occurs in the arguments to the command, not just in arguments where it is alone, as in some versions of find. Both of these constructions might need to be escaped (with a `\’) or quoted to protect them from expansion by the shell. See the EXAMPLES section for examples of the use of the -exec option. The specified command is run once for each matched file. The command is executed in the starting directory. There are unavoidable security problems surrounding use of the -exec action; you should use the -execdir option instead.

6.3 -exec command {} +

This variant of the -exec action runs the specified command on the selected files, but the command line is built by appending each selected file name at the end; the total number of invocations of the command will be much less than the number of matched files. The command line is built in much the same way that xargs builds its command lines. Only one instance of `{}’ is allowed within the command. The command is executed in the starting directory.

6.4 -execdir command ;

6.5 -execdir command {} +

Like -exec, but the specified command is run from the subdirectory containing the matched file, which is not normally the directory in which you started find. This a much more secure method for invoking commands, as it avoids race conditions during resolution of the paths to the matched files. As with the -exec action, the +' form of -execdir will build a command line to process more than one matched file, but any given invocation of command will only list files that exist in the same subdirectory. If you use this option, you must ensure that your $PATH environment variable does not reference.’; otherwise, an attacker can run any commands they like by leaving an appropriately-named file in a directory in which you will run -execdir. The same applies to having entries in $PATH which are empty or which are not absolute directory names.

6.6 -fls file

True; like -ls but write to file like -fprint. The output file is always created, even if the predicate is never matched. See the UNUSUAL FILENAMES section for information about how unusual charac‐ ters in filenames are handled.

6.7 -fprint file

True; print the full file name into file file. If file does not exist when find is run, it is created; if it does exist, it is truncated. The file names /dev/stdout'' and/dev/stderr” are handled specially; they refer to the standard output and standard error output, respectively. The output file is always created, even if the predicate is never matched. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled.

6.8 -fprint0 file

True; like -print0 but write to file like -fprint. The output file is always created, even if the predicate is never matched. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled.

6.9 -fprintf file format

True; like -printf but write to file like -fprint. The output file is always created, even if the predicate is never matched. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled. -ls True; list current file in ls -dils format on standard output. The block counts are of 1K blocks, unless the environment variable POSIXLY_CORRECT is set, in which case 512-byte blocks are used. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled.

6.10 -ok command ;

Like -exec but ask the user first. If the user agrees, run the command. Otherwise just return false. If the command is run, its stan‐ dard input is redirected from /dev/null. The response to the prompt is matched against a pair of regular expressions to determine if it is an affirmative or negative response. This regular expression is obtained from the system if the `POSIXLY_CORRECT’ environment variable is set, or otherwise from find’s message translations. If the system has no suitable defini‐ tion, find’s own definition will be used. In either case, the interpretation of the regular expression itself will be affected by the environment variables ‘LC_CTYPE’ (character classes) and ‘LC_COL‐ LATE’ (character ranges and equivalence classes).

6.11 -okdir command ;

Like -execdir but ask the user first in the same way as for -ok. If the user does not agree, just return false. If the command is run, its standard input is redirected from /dev/null.

6.12 -print

True; print the full file name on the standard output, followed by a newline. If you are piping the output of find into another program and there is the faintest possibility that the files which you are searching for might contain a newline, then you should seriously con‐ sider using the -print0 option instead of -print. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled.

6.13 -print0

True; print the full file name on the standard output, followed by a null character (instead of the newline character that -print uses). This allows file names that contain newlines or other types of white space to be correctly interpreted by programs that process the find output. This option corresponds to the -0 option of xargs.

6.14 -printf format

True; print format on the standard output, interpreting \' escapes and%’ directives. Field widths and precisions can be specified as with the printf' C function. Please note that many of the fields are printed as %s rather than %d, and this may mean that flags don't work as you might expect. This also means that the-’ flag does work (it forces fields to be left-aligned). Unlike -print, -printf does not add a newline at the end of the string. The escapes and directives are:

6.14.1 \a

Alarm bell.

6.14.2 \b

Backspace.

6.14.3 \c

Stop printing from this format immediately and flush the out‐ put.

6.14.4 \f

Form feed.

6.14.5 \n

Newline.

6.14.6 \r

Carriage return.

6.14.7 \t

Horizontal tab.

6.14. 8 \v

Vertical tab.

6.14.9 \0

ASCII NUL.

6.14.10 \ A

literal backslash (`\’).

6.14.11 \NNN

The character whose ASCII code is NNN (octal).
A `\’ character followed by any other character is treated as an ordinary character, so they both are printed.

6.14.12 %%

A literal percent sign.

6.14.13 %a

File’s last access time in the format returned by the C `ctime’ function.

6.14.14 %Ak

File’s last access time in the format specified by k, which is either @' or a directive for the Cstrftime’ function. The possible values for k are listed below; some of them might not be available on all systems, due to differences in strftime' between systems.
@ seconds since Jan. 1, 1970, 00:00 GMT, with fractional part.
Time fields:
H hour (00..23)
I hour (01..12)
k hour ( 0..23)
l hour ( 1..12)
M minute (00..59)
p locale's AM or PM
r time, 12-hour (hh:mm:ss [AP]M)
S Second (00.00 .. 61.00). There is a fractional part.
T time, 24-hour (hh:mm:ss)
+ Date and time, separated by
+’, for example `2004-04-28+22:22:05.0’. This is a GNU extension. The time is given in the current timezone (which may be affected by setting the TZ environment variable). The seconds field includes a fractional part.
X locale’s time representation (H:M:S)
Z time zone (e.g., EDT), or nothing if no time zone is determinable
Date fields:
a locale’s abbreviated weekday name (Sun..Sat) A locale’s full weekday name, variable length (Sun‐ day..Saturday)
b locale’s abbreviated month name (Jan..Dec) B locale’s full month name, variable length (Janu‐ ary..December)
c locale’s date and time (Sat Nov 04 12:02:33 EST 1989). The format is the same as for ctime(3) and so to pre‐ serve compatibility with that format, there is no frac‐ tional part in the seconds field.
d day of month (01..31)
D date (mm/dd/yy)
h same as b
j day of year (001..366)
m month (01..12)
U week number of year with Sunday as first day of week (00..53)
w day of week (0..6)
W week number of year with Monday as first day of week (00..53)
x locale’s date representation (mm/dd/yy)
y last two digits of year (00..99)
Y year (1970…)

6.14.15%b

The amount of disk space used for this file in 512-byte blocks. Since disk space is allocated in multiples of the filesystem block size this is usually greater than %s/512, but it can also be smaller if the file is a sparse file.

6.14.16 %c

File’s last status change time in the format returned by the C `ctime’ function.

6.14.17 %Ck

File’s last status change time in the format specified by k, which is the same as for %A.

6.14.18 %d

File’s depth in the directory tree; 0 means the file is a com‐ mand line argument.

6.14.19 %D

The device number on which the file exists (the st_dev field of struct stat), in decimal.

6.14.20 %f

File’s name with any leading directories removed (only the last element).

6.14.21%F

Type of the filesystem the file is on; this value can be used for -fstype.

6.14.22 %g

File’s group name, or numeric group ID if the group has no name.

6.14.23 %G

File’s numeric group ID.

6.14.24 %h

Leading directories of file’s name (all but the last element). If the file name contains no slashes (since it is in the cur‐ rent directory) the %h specifier expands to “.”.

6.14.25 %H

Command line argument under which file was found.

6.14.26 %i

File’s inode number (in decimal).

6.14.27 %k

The amount of disk space used for this file in 1K blocks. Since disk space is allocated in multiples of the filesystem block size this is usually greater than %s/1024, but it can also be smaller if the file is a sparse file.

6.14.28 %l

Object of symbolic link (empty string if file is not a symbolic link).

6.14.29 %m

File’s permission bits (in octal). This option uses the traditional' numbers which most Unix implementations use, but if your particular implementation uses an unusual ordering of octal permissions bits, you will see a difference between the actual value of the file's mode and the output of %m. Nor‐ mally you will want to have a leading zero on this number, and to do this, you should use the # flag (as in, for example,%#m’).

6.14.30 %M

File’s permissions (in symbolic form, as for ls). This direc‐ tive is supported in findutils 4.2.5 and later.

6.14.31 %n

Number of hard links to file.

6.14.32 %p

File’s name. %P File’s name with the name of the command line argument under which it was found removed. %s File’s size in bytes.

6.14.33 %S

File’s sparseness. This is calculated as (BLOCKSIZE*st_blocks / st_size). The exact value you will get for an ordinary file of a certain length is system-dependent. However, normally sparse files will have values less than 1.0, and files which use indirect blocks may have a value which is greater than 1.0. The value used for BLOCKSIZE is system-dependent, but is usually 512 bytes. If the file size is zero, the value printed is undefined. On systems which lack support for st_blocks, a file’s sparseness is assumed to be 1.0.

6.14.34 %t

File’s last modification time in the format returned by the C `ctime’ function.

6.14.35 %Tk

File’s last modification time in the format specified by k, which is the same as for %A.

6.14.36 %u

File’s user name, or numeric user ID if the user has no name.

6.14.37 %U

File’s numeric user ID.

6.14.38 %y

File’s type (like in ls -l), U=unknown type (shouldn’t happen)

6.14.39 %Y

File’s type (like %y), plus follow symlinks: L=loop, N=nonex‐ istent A %' character followed by any other character is discarded, but the other character is printed (don't rely on this, as further format characters may be introduced).
A
%’ at the end of the format argument causes undefined behaviour since there is no following charactr. In some locales, it may hide your door keys, while in others it may remove the final page from the novel you are reading.
The %m and %d directives support the # , 0 and + flags, but the other directives do not, even if they print numbers. Numeric directives that do not support these flags include G, U, b, D, k and n. The `-’ format flag is supported and changes the alignment of a field from right-justified (which is the default) to left-justified.
See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled.

6.15 -rune

True; if the file is a directory, do not descend into it. If -depth is given, false; no effect. Because -delete implies -depth, you can‐ not usefully use -prune and -delete together.

6.16 -quit

Exit immediately. No child processes will be left running, but no more paths specified on the command line will be processed. For example, find /tmp/foo /tmp/bar -print -quit will print only /tmp/foo. Any command lines which have been built up with -execdir … {} + will be invoked before find exits. The exit status may or may not be zero, depending on whether an error has already occurred.

7 UNUSUAL FILENAMES

    Many of the actions of find result in the printing of data which is under the control of other users. This includes file names, sizes, modification times and so forth. File names are a potential problem since they can con‐ tain any character except `\0' and `/'. Unusual characters in file names can do unexpected and often undesirable things to your terminal (for exam‐ ple, changing the settings of your function keys on some terminals). Unusual characters are handled differently by various actions, as described below. 

7.1 -print0, -fprint0

        Always print the exact filename, unchanged, even if the output is going to a terminal. 

7.2 -ls, -fls

        Unusual characters are always escaped. White space, backslash, and double quote characters are printed using C-style escaping (for exam‐ ple `\f', `\"'). Other unusual characters are printed using an octal escape. Other printable characters (for -ls and -fls these are the characters between octal 041 and 0176) are printed as-is. 

7.3 -printf, -fprintf

        If the output is not going to a terminal, it is printed as-is. Oth‐ erwise, the result depends on which directive is in use. The directives %D, %F, %g, %G, %H, %Y, and %y expand to values which are not under control of files' owners, and so are printed as-is. The direc‐ tives %a, %b, %c, %d, %i, %k, %m, %M, %n, %s, %t, %u and %U have values which are under the control of files' owners but which cannot be used to send arbitrary data to the terminal, and so these are printed as-is. The directives %f, %h, %l, %p and %P are quoted. This quot‐ ing is performed in the same way as for GNU ls. This is not the same quoting mechanism as the one used for -ls and -fls. If you are able to decide what format to use for the output of find then it is nor‐ mally better to use `\0' as a terminator than to use newline, as file names can contain white space and newline characters. The setting of the `LC_CTYPE' environment variable is used to determine which char‐ acters need to be quoted. 

7.4 -print, -fprint

        Quoting is handled in the same way as for -printf and -fprintf. If you are using find in a script or in a situation where the matched files might have arbitrary names, you should consider using -print0 instead of -print. 
    The -ok and -okdir actions print the current filename as-is. This may change in a future release. 

8 OPERATORS

    Listed in order of decreasing precedence: 

8.1 ( expr )

        Force precedence. Since parentheses are special to the shell, you will normally need to quote them. Many of the examples in this man‐ ual page use backslashes for this purpose: `\(...\)' instead of `(...)'. 

8.2 ! expr

        True if expr is false. This character will also usually need protec‐ tion from interpretation by the shell. 

8.3 -not expr

        Same as ! expr, but not POSIX compliant. 

8.4 expr1 expr2

        Two expressions in a row are taken to be joined with an implied "and"; expr2 is not evaluated if expr1 is false. 

8.5 expr1 -a expr2

        Same as expr1 expr2. 

8.6 expr1 -and expr2

        Same as expr1 expr2, but not POSIX compliant. 

8.7 expr1 -o expr2

        Or; expr2 is not evaluated if expr1 is true. 

8.8 expr1 -or expr2

        Same as expr1 -o expr2, but not POSIX compliant. 

8.9 expr1 , expr2

        List; both expr1 and expr2 are always evaluated. The value of expr1 is discarded; the value of the list is the value of expr2. The comma operator can be useful for searching for several different types of thing, but traversing the filesystem hierarchy only once. The -fprintf action can be used to list the various matched items into several different output files. 

9 STANDARDS CONFORMANCE

    For closest compliance to the POSIX standard, you should set the POSIXLY_CORRECT environment variable. The following options are specified in the POSIX standard (IEEE Std 1003.1, 2003 Edition): 

9.1 -H

This option is supported.

9.2 -L

This option is supported.

9.3 -name

This option is supported, but POSIX conformance depends on the POSIX conformance of the system’s fnmatch(3) library function. As of findutils-4.2.2, shell metacharacters (*',?’ or []' for example) will match a leading.’, because IEEE PASC interpretation 126 requires this. This is a change from previous versions of findutils.

9.4 -type

Supported. POSIX specifies b',c’, d',l’, p',f’ and s'. GNU find also supportsD’, representing a Door, where the OS provides these.

9.5 -ok

Supported. Interpretation of the response is according to the “yes” and “no” patterns selected by setting the LC_MESSAGES' environment variable. When thePOSIXLY_CORRECT’ environment variable is set, these patterns are taken system’s definition of a positive (yes) or negative (no) response. See the system’s documentation for nl_lang‐ info(3), in particular YESEXPR and NOEXPR. When `POSIXLY_CORRECT’ is not set, the patterns are instead taken from find’s own message catalogue.

9.6 -newer

Supported. If the file specified is a symbolic link, it is always dereferenced. This is a change from previous behaviour, which used to take the relevant time from the symbolic link; see the HISTORY section below.

9.7 -perm

Supported. If the POSIXLY_CORRECT environment variable is not set, some mode arguments (for example +a+x) which are not valid in POSIX are supported for backward-compatibility.

9.8 Other predicates

The predicates -atime, -ctime, -depth, -group, -links, -mtime, -nogroup, -nouser, -print, -prune, -size, -user and -xdev are all supported.
The POSIX standard specifies parentheses (',)’, negation !' and theand’ and `or’ operators ( -a, -o).
All other options, predicates, expressions and so forth are extensions beyond the POSIX standard. Many of these extensions are not unique to GNU find, however.
The POSIX standard requires that find detects loops:
The find utility shall detect infinite loops; that is, entering a previously visited directory that is an ancestor of the last file encountered. When it detects an infinite loop, find shall write a diagnostic message to standard error and shall either recover its position in the hierarchy or terminate.
GNU find complies with these requirements. The link count of directories which contain entries which are hard links to an ancestor will often be lower than they otherwise should be. This can mean that GNU find will sometimes optimise away the visiting of a subdirectory which is actually a link to an ancestor. Since find does not actually enter such a subdirectory, it is allowed to avoid emitting a diagnostic message. Although this behaviour may be somewhat confusing, it is unlikely that anybody actually depends on this behaviour. If the leaf optimisation has been turned off with -noleaf, the directory entry will always be examined and the diagnostic message will be issued where it is appropriate. Symbolic links cannot be used to create filesystem cycles as such, but if the -L option or the -follow option is in use, a diagnostic message is issued when find encounters a loop of symbolic links. As with loops containing hard links, the leaf optimisation will often mean that find knows that it doesn’t need to call stat() or chdir() on the symbolic link, so this diagnostic is frequently not necessary.
The -d option is supported for compatibility with various BSD systems, but you should use the POSIX-compliant option -depth instead.
The POSIXLY_CORRECT environment variable does not affect the behaviour of the -regex or -iregex tests because those tests aren’t specified in the POSIX standard.

10 ENVIRONMENT VARIABLES

10.1 LANG

Provides a default value for the internationalization variables that are unset or null.

10.2 LC_ALL

If set to a non-empty string value, override the values of all the other internationalization variables.

10.3 LC_COLLATE

The POSIX standard specifies that this variable affects the pattern matching to be used for the -name option. GNU find uses the fnmatch(3) library function, and so support for LC_COLLATE' depends on the system library. This variable also affects the interpreta‐ tion of the response to -ok; while theLC_MESSAGES’ variable selects the actual pattern used to interpret the response to -ok, the inter‐ pretation of any bracket expressions in the pattern will be affected by `LC_COLLATE’.

10.4 LC_CTYPE

This variable affects the treatment of character classes used in regular expressions and also with the -name test, if the system’s fnmatch(3) library function supports this. This variable also affects the interpretation of any character classes in the regular expressions used to interpret the response to the prompt issued by -ok. The `LC_CTYPE’ environment variable will also affect which characters are considered to be unprintable when filenames are printed; see the section UNUSUAL FILENAMES.

10.5 LC_MESSAGES

Determines the locale to be used for internationalised messages. If the `POSIXLY_CORRECT’ environment variable is set, this also deter‐ mines the interpretation of the response to the prompt made by the -ok action.

10.6 NLSPATH

Determines the location of the internationalisation message cata‐ logues.

10.7 PATH

Affects the directories which are searched to find the executables invoked by -exec, -execdir, -ok and -okdir.

10.8 POSIXLY_CORRECT

Determines the block size used by -ls and -fls. If POSIXLY_CORRECT is set, blocks are units of 512 bytes. Otherwise they are units of 1024 bytes.
Setting this variable also turns off warning messages (that is, implies -nowarn) by default, because POSIX requires that apart from the output for -ok, all messages printed on stderr are diagnostics and must result in a non-zero exit status.
When POSIXLY_CORRECT is not set, -perm +zzz is treated just like -perm /zzz if +zzz is not a valid symbolic mode.
When POSIXLY_CORRECT is set, such constructs are treated as an error. When POSIXLY_CORRECT is set, the response to the prompt made by the -ok action is interpreted according to the system’s message catalogue, as opposed to according to find’s own message translations.

10.9 TZ

Affects the time zone used for some of the time-related format direc‐ tives of -printf and -fprintf.

11 EXAMPLES

11.1 find /tmp -name core -type f -print | xargs /bin/rm -f

Find files named core in or below the directory /tmp and delete them. Note that this will work incorrectly if there are any filenames containing new‐ lines, single or double quotes, or spaces.

11.2 find /tmp -name core -type f -print0 | xargs -0 /bin/rm -f

Find files named core in or below the directory /tmp and delete them, pro‐ cessing filenames in such a way that file or directory names containing sin‐ gle or double quotes, spaces or newlines are correctly handled. The -name test comes before the -type test in order to avoid having to call stat(2) on every file.

11.3 find . -type f -exec file ‘{}’ \;

Runs `file’ on every file in or below the current directory. Notice that the braces are enclosed in single quote marks to protect them from interpre‐ tation as shell script punctuation. The semicolon is similarly protected by the use of a backslash, though single quotes could have been used in that case also.

11.4 find / \ ( -perm -4000 -fprintf /root/suid.txt %#m %u %p\n ) , \ ( -size +100M -fprintf /root/big.txt %-10s %p\n )

Traverse the filesystem just once, listing setuid files and directories into /root/suid.txt and large files into /root/big.txt.

11.5 find $HOME -mtime 0

Search for files in your home directory which have been modified in the last twenty-four hours. This command works this way because the time since each file was last modified is divided by 24 hours and any remainder is dis‐ carded. That means that to match -mtime 0, a file will have to have a modi‐ fication in the past which is less than 24 hours ago.

11.6 find /sbin /usr/sbin -executable ! -readable -print

Search for files which are executable but not readable.

11.7 find . -perm 664

Search for files which have read and write permission for their owner, and group, but which other users can read but not write to. Files which meet these criteria but have other permissions bits set (for example if someone can execute the file) will not be matched.

11.8 find . -perm -664

Search for files which have read and write permission for their owner and group, and which other users can read, without regard to the presence of any extra permission bits (for example the executable bit). This will match a file which has mode 0777, for example.

11.9 find . -perm /222

Search for files which are writable by somebody (their owner, or their group, or anybody else).

11.10 find . -perm /220

11.12 find . -perm /u+w,g+w

11.13 find . -perm /u=w,g=w

All three of these commands do the same thing, but the first one uses the octal representation of the file mode, and the other two use the symbolic form. These commands all search for files which are writable by either their owner or their group. The files don’t have to be writable by both the owner and group to be matched; either will do.

11.14 find . -perm -220

11.15 find . -perm -g+w,u+w

Both these commands do the same thing; search for files which are writable by both their owner and their group.

11.16 find . -perm -444 -perm /222 ! -perm /111

11.17 find . -perm -a+r -perm /a+w ! -perm /a+x

These two commands both search for files that are readable for everybody ( -perm -444 or -perm -a+r), have at least one write bit set ( -perm /222 or -perm /a+w) but are not executable for anybody ( ! -perm /111 and ! -perm /a+x respectively).
cd /source-dir

11.18 find . -name .snapshot -prune -o ( ! -name *~ -print0 )| cpio -pmd0 /dest-dir

This command copies the contents of /source-dir to /dest-dir, but omits files and directories named .snapshot (and anything in them). It also omits files or directories whose name ends in ~, but not their contents. The con‐ struct -prune -o ( … -print0 ) is quite common. The idea here is that the expression before -prune matches things which are to be pruned. How‐ ever, the -prune action itself returns true, so the following -o ensures that the right hand side is evaluated only for those directories which didn’t get pruned (the contents of the pruned directories are not even vis‐ ited, so their contents are irrelevant). The expression on the right hand side of the -o is in parentheses only for clarity. It emphasises that the -print0 action takes place only for things that didn’t have -prune applied to them. Because the default `and’ condition between tests binds more tightly than -o, this is the default anyway, but the parentheses help to show what is going on.

11.19 find repo/ -exec test -d {}/.svn -o -d {}/.git -o -d {}/CVS ; \ -print -prune

Given the following directory of projects and their associated SCM administrative directories, perform an efficient search for the projects’ roots:
repo/project1/CVS
repo/gnu/project2/.svn
repo/gnu/project3/.svn
repo/gnu/project3/src/.svn
repo/project4/.git
In this example, -prune prevents unnecessary descent into directories that have already been discovered (for example we do not search project3/src because we already found project3/.svn), but ensures sibling directories (project2 and project3) are found.

12 EXIT STATUS

find exits with status 0 if all files are processed successfully, greater than 0 if errors occur. This is deliberately a very broad description, but if the return value is non-zero, you should not rely on the correctness of the results of find.

13 SEE ALSO

locate(1), locatedb(5), updatedb(1), xargs(1), chmod(1), fnmatch(3), regex(7), stat(2), lstat(2), ls(1), printf(3), strftime(3), ctime(3), Find‐ ing Files (on-line in Info, or printed).

14 HISTORY

As of findutils-4.2.2, shell metacharacters (*',?’ or []' for example) used in filename patterns will match a leading.’, because IEEE POSIX interpretation 126 requires this.
The syntax -perm +MODE was deprecated in findutils-4.2.21, in favour of -perm /MODE. As of findutils-4.3.3, -perm /000 now matches all files instead of none.
Nanosecond-resolution timestamps were implemented in findutils-4.3.3.
As of findutils-4.3.11, the -delete action sets find’s exit status to a nonzero value when it fails. However, find will not exit immediately. Previously, find’s exit status was unaffected by the failure of -delete.
Feature Added in Also occurs in
-newerXY 4.3.3 BSD
-D 4.3.1
-O 4.3.1
-readable 4.3.0
-writable 4.3.0
-executable 4.3.0
-regextype 4.2.24
-exec … + 4.2.12 POSIX
-execdir 4.2.12 BSD
-okdir 4.2.12
-samefile 4.2.11
-H 4.2.5 POSIX
-L 4.2.5 POSIX
-P 4.2.5 BSD
-delete 4.2.3
-quit 4.2.3
-d 4.2.3 BSD
-wholename 4.2.0
-iwholename 4.2.0
-ignore_readdir_race 4.2.0
-fls 4.0
-ilname 3.8
-iname 3.8
-ipath 3.8
-iregex 3.8
15 NON-BUGS
find.name.cprintfind:pathsmustprecedeexpressionUsage:find[H][L][P][Olevel][Dhelp|tree|search|stat|rates|opt|exec][path][expression]Thishappensbecause.chasbeenexpandedbytheshellresultinginfindactuallyreceivingacommandlinelikethis:find.namebigram.ccode.cfrcode.clocate.cprintThatcommandisofcoursenotgoingtowork.Insteadofdoingthingsthisway,youshouldenclosethepatterninquotesorescapethewildcard: find . -name *.c -print

16 BUGS

There are security problems inherent in the behaviour that the POSIX stan‐ dard specifies for find, which therefore cannot be fixed. For example, the -exec action is inherently insecure, and -execdir should be used instead. Please see Finding Files for more information.
The environment variable LC_COLLATE has no effect on the -ok action.
The best way to report a bug is to use the form at http://savan‐ nah.gnu.org/bugs/?group=findutils. The reason for this is that you will then be able to track progress in fixing the problem. Other comments about find(1) and about the findutils package in general can be sent to the bug-findutils mailing list. To join the list, send email to bug-findu‐ tils-request@gnu.org.
FIND(1)

本文内容由网友自发贡献,版权归原作者所有,本站不承担相应法律责任。如您发现有涉嫌抄袭侵权的内容,请联系:hwhale#tublm.com(使用前将#替换为@)

linux-bash-find 的相关文章

  • Linux:在文件保存时触发 Shell 命令

    我想在修改文件时自动触发 shell 命令 我认为这可以通过注册 inotify 挂钩并调用来在代码中完成system 但是是否有更高级别的 bash 命令可以完成此任务 尝试 inotify 工具 我在复制链接时遇到问题 抱歉 但 Git
  • Linux:如何从特定端口发送TCP数据包?

    如何打开原始套接字以从特定 TCP 端口发送 我希望所有连接始终来自临时端口以下的一系列端口 如果您正在使用raw套接字 然后只需在数据包标头中填写正确的 TCP 源端口即可 相反 如果您使用 TCP 套接字接口 socket connec
  • 有谁知道在哪里定义硬件、版本和序列号。 /proc/cpuinfo 的字段?

    我想确保我的 proc cpuinfo 是准确的 目前它输出 Hardware am335xevm Revision 0000 Serial 0000000000000000 我可以在代码中的哪里更改它以给出实际值 这取决于 Linux 的
  • C语言中如何通过内存地址映射函数名和行号?

    如何用 GCC 中的内存地址映射回函数名称和行号 即假设一个 C 语言原型 void func Get the address of caller maybe this could be avoided MemoryAddress get
  • 协助 awk/bash 捕获内存差异

    我正在尝试从以下文件中提取以下输出 xr lab show clock Thu Sep 19 14 38 02 812 WIB 14 38 02 893 WIB Thu Sep 19 2019 xr lab xr lab xr lab sh
  • SSE:跨页边界的未对齐加载和存储

    我在页面边界旁边执行未对齐加载或存储之前读过某处 例如使用 mm loadu si128 mm storeu si128内在函数 代码应首先检查整个向量 在本例中为 16 个字节 是否属于同一页 如果不属于同一页 则切换到非向量指令 我知道
  • 多处理:仅使用物理核心?

    我有一个函数foo它消耗大量内存 我想并行运行多个实例 假设我有一个有 4 个物理核心的 CPU 每个核心有两个逻辑核心 我的系统有足够的内存来容纳 4 个实例foo并行但不是 8 个 此外 由于这 8 个核心中的 4 个是逻辑核心 我也不
  • 分叉/多线程进程|重击

    我想让我的代码的一部分更加高效 我正在考虑让它分叉成多个进程 并让它们一次执行 50 100 次 而不是只执行一次 例如 伪 for line in file do foo foo2 foo3 done 我希望这个 for 循环运行多次 我
  • 在脚本内使用不带密码的 sudo

    由于某种原因 我需要作为用户在没有 sudo 的情况下运行脚本 script sh 该脚本需要 root 权限才能工作 我认为将 sudo 放入 script sh 中是唯一的解决方案 让我们举个例子 script sh bin sh su
  • 为什么 $((true == false)) 在 bash 中计算结果为 1?

    为什么 bash 有以下行为 echo true false 1 我本以为这会打印0 但它打印1 以下事实使情况变得更加复杂 gt echo true 0 gt echo false 0 gt echo true true 1 gt ech
  • Linux 上有关 getBounds() 和 setBounds() 的 bug_id=4806603 的解决方法?

    在 Linux 平台上 Frame getBounds 和 Frame setBounds 的工作方式不一致 这在 2003 年就已经有报道了 请参见此处 http bugs java com bugdatabase view bug do
  • 如何使用 GOPATH 的 Samba 服务器位置?

    我正在尝试将 GOPATH 设置为共享网络文件夹 当我进入 export GOPATH smb path to shared folder I get go GOPATH entry is relative must be absolute
  • 内核模式下的线程(和进程)与用户模式下的线程(和进程)有什么区别?

    我的问题 1 书中现代操作系统 它说线程和进程可以处于内核模式或用户模式 但没有明确说明它们之间有什么区别 2 为什么内核态线程和进程的切换比用户态线程和进程的切换花费更多 3 现在 我正在学习Linux 我想知道如何在LINUX系统中分别
  • 将二进制输出从文件输出重定向到 stdout

    我有一个专有的二进制文件 它顽固地接受两个文件作为参数 第一个作为输入 第二个作为输出 我想 构建第一个参数 不创建临时文件 使二进制写入标准输出而不是输出文件 第二个参数 我解决了第一个问题 lt 但不确定第二个参数 我编写了以下脚本 看
  • Gtk-ERROR **:检测到 GTK+ 2.x 符号

    我正在使用 gcc 编译我的 c 应用程序 并使用以下标志 gcc evis c pkg config cflags libs gtk 2 0 libs clutter gtk 1 0 libs gthread 2 0 Wall o evi
  • “make install”将库安装在 /usr/lib 而不是 /usr/lib64

    我正在尝试在 64 位 CentOS 7 2 上构建并安装一个库 为了这个目的我正在跑步 cmake DCMAKE BUILD TYPE Release DCMAKE INSTALL PREFIX usr DCMAKE C COMPILER
  • MySQL 中的创建/写入权限

    我的设备遇到一些权限问题SELECT INTO OUTFILE陈述 当我登录数据库并执行简单的导出命令时 例如 mysql gt select from XYZ into outfile home mropa Photos Desktop
  • 需要一些建议来开始在 ARM(使用 Linux)平台上编程

    我 也许 很快就会在托管 Linux 发行版的 ARM 平台上工作 我不知道哪个发行版 我知道该项目涉及视频流 但我无法告诉你更多信息 其实我只收到通知 还没见到任何人 我从来没有在这样的平台上工作过 所以我的想法是在项目开始之前进行测试
  • Linux - 从第二个选项卡获取文本

    假设我们有这样的文件 一些文本11 一些文本12 一些文本13 一些文本21 一些文本22 一些文本23 文本由制表符分隔 我们知道第 1 列中的一些文本 但希望从第 2 列中获取文本 我知道我可以通过以下方式获取线路 grep somet
  • 确定我可以向文件句柄写入多少内容;将数据从一个 FH 复制到另一个 FH

    如何确定是否可以将给定数量的字节写入文件句柄 实际上是套接字 或者 如何 取消读取 我从其他文件句柄读取的数据 我想要类似的东西 n how much can I write w handle n read r handle buf n a

随机推荐

  • 黑苹果台式机免驱独显购买推荐

    文章目录 隐藏 macOS big sur 11 4 免驱动独显macOS Mojave macOS Catalina big sur Monterey系统下AMD免驱动独显 xff1a macOS Mojave macOS Catalin
  • 数组中删数(只删一个)

    Description 在给定的数组中删除一个数 Input 多组测试 xff0c 每组第一行输入1个整数n xff08 n lt 20 然后是n个整数 第二行输入1个整数m Output 删除在第一行的n个整数中第一次出现数字m并删除 x
  • 在java中 随机产生10个范围在1~100的随机数放置到数组中,重复的数去掉,使用原生的冒泡排序,然后遍历打印排序后的结果

    在java中 随机产生10个范围在1 100的随机数放置到数组中 xff0c 重复的数去掉 xff0c 使用原生的冒泡排序 xff0c 然后遍历打印排序后的结果 随机范围1 100的随机数 10个 放置到数组中 xff0c 重复的数组去掉
  • java.lang.ClassCastException: class org.apache.logging.slf4j.SLF4JLoggerContext cannot be cast

    spring boot 3 0 0 使用gradle7 6整和myabtis plus 3 5 3 1 出现如下报错 java lang ClassCastException class org apache logging slf4j S
  • java上传图片或者文件到nginx服务器

    红线部分就是Nginx上的路径 注解 64 requiresPermissions这个是权限的问题 可以去掉 千万不要忘了红线部分 这是上传图片 其实上传文件跟这个也是一样的 当然这里面少了一些判断 比如限制文件的大小等 当你完成之后访问你
  • jsp页面的onclick事件

    lt input nclick 61 34 document all WebBrowser ExecWB 1 1 34 type 61 34 button 34 value 61 34 打开 34 name 61 34 Button1 34
  • 位运算abc

    位运算 xff0c 针对单个位进行的运算方式 xff0c 不涉及阶 常见的位运算包括位与 amp 位或 异或 位非 移位 左移 lt lt 和右移 gt gt 等运算 位运算常见的用处有 xff1a 对二进制数指定位置0 xff0c 1取出
  • c混合运算和数据类型转换

    C语言表达式进行混合运算时 xff0c 运算规则 xff1a 运算符相应的数据先做类型统一根据运算变量决定运算精度根据结果变量决定结果精度 其中 xff0c 类型统一时的默认的数据类型转换规则如下图 xff1a
  • oracle-plsql初步使用

    之前使用Oracle数据库都是通过jdbc接口调用oracle 最近由于工作的关系需要通过tns操作Oracle数据库 xff0c 于是把最近学习和收集的一点内容记录下来 xff0c 以便以后再次使用时参考 概念先行概念落地登陆常用sql利
  • ubuntu on win10

    开启大门 设置 安全和更新 针对开发人员 使用开发人员功能 开发人员模式控制面板 程序和功能 启用和关闭windows功能 适用于Linux的windows子系统 xff08 beta xff09 进入cmd命令窗口 xff0c 输入bas
  • Lamp环境搭建和ucenter/ucenterhome

    环境 xff1a Centos 7 3 1611 步骤 xff1a 安装apache php软件 xff1a yum install httpd php php mysql安装mysql mariadb xff0c 以Centos系统为例
  • win10安装系统自带应用

    以管理员身份启动系统自带的Windows Powershell组件 xff0c 接着输入Get AppxPackage allusers Select Name PackageFullName xff0c 通过该命令获取当前系统安装的所有应
  • SQL DDL从MySQL到Oracle

    最新一个项目的sql ddl为MySQL准备的 xff0c 我想在Oracle中使用 之前不太了解两者的区别 xff0c 结果报错一坨 于是顶着头皮开始看什么问题 xff0c 以下是我陷过的坑 xff0c 让大家看看 废话少说 xff0c
  • 7 MySQL安全概述

    1 常见因素 密码 常见的密码要求 xff1a 包含大小写 数字 特殊字符限制 长度 不要保存密码明文 为防止彩虹表 xff0c 也不要简单的使用hash方法 xff0c 可以采用hash hash password 43 salt 的方式
  • 关于SIFT和SURF介绍

    SIFT xff08 尺度不变特征变换 xff09 关于一些角点检测技术 xff0c 比如 Harris 等 它们具有旋转不变特性 xff0c 即使图片发生了旋转 xff0c 我们也能找到同样的角点 xff0c 但如果进行图像缩放 xff0
  • 7.2 MySQL权限系统原理

    MySQL权限系统的用户接口由SQL语句组成 xff0c 比如create user xff0c grant xff0c revoke 在数据库内部 xff0c MySQL把权限信息保存在MySQL database的赋权表中 MySQL服
  • 7.2.1 MySQL提供的权限

    MySQL提供的权限应用于不同的上下文和不同的操作级别 xff1a 管理权限使用户可以管理MySQL服务器的操作 这些权限是全局性的 xff0c 因为它们不是局限于某个特定的数据库 数据库权限应用于数据库和数据库的组成对象 这些权限可以被赋
  • 7.3 MySQL用户账号管理

    7 3 1用户名称和密码 MySQL把账号存储在mysql系统数据库的user表中 一个账号被定义成一个用户名称和能够连接到服务器的客户端主机 xff08 群 xff09 账号都有一个密码 MySQL支持授权插件 xff0c 也就是说一个账
  • 7 Oracle 管理用户和安全

    用户和安全概览 用户账号由一个用户名确认 xff0c 定义了用户的属性包括 xff1a 鉴权方式 数据库鉴权密码 永久存储和临时存储的默认表空间 表空间配额 账号状态 xff08 是否锁定 xff09 密码状态 xff08 是否过期 xff
  • linux-bash-find

    FIND 1 General Commands Manual FIND 1 1 NAME find search for files in a directory hierarchy 2 SYNOPSIS find H L P D debu