Categories
AI for the masses

Understanding Language Models: A Non-Technical Guide to Large Language Models (LLMs)

In the world of artificial intelligence (AI), one term you might have come across is “Large Language Models” or LLMs. But what exactly are these models, and why are they important? This blog post aims to demystify LLMs in a non-technical way.

What are Large Language Models?

Imagine having a conversation with a computer, and it understands and responds to you just like a human would. This is the kind of interaction that Large Language Models make possible. In simple terms, LLMs are computer programs trained to understand and generate human-like text. They are a type of artificial intelligence that can read, write, and even converse in natural language.

How do Large Language Models Work?

LLMs learn from vast amounts of text data. For instance, they might be trained on millions of books, articles, and websites. By analyzing this data, they learn the patterns and structures of the language, such as grammar and common phrases.

When you ask an LLM a question or give it a prompt, it doesn’t search the internet for an answer. Instead, it generates a response based on the patterns it has learned from its training data. It’s like having a conversation with a very well-read friend who has an answer or a story for almost everything!

Why are Large Language Models Important?

LLMs are transforming the way we interact with technology. They power virtual assistants, chatbots, and customer service systems, making these systems more conversational and user-friendly. They can also help with tasks like drafting emails, writing articles, or even creating poetry!

Moreover, LLMs can be a powerful tool for education. They can provide explanations on a wide range of topics, making learning more accessible and engaging.

Conclusion

Large Language Models are an exciting development in the field of artificial intelligence. They are making our interactions with technology more natural and conversational. While the technology behind LLMs might be complex, the concept isn’t: they are computer programs that have learned to understand and generate human-like text. As LLMs continue to improve, we can look forward to even more innovative and helpful applications.

Categories
AI for the masses

Demystifying Machine Learning: A Simple Guide for the Non-Tech Savvy

Machine Learning (ML) is a buzzword that’s been making waves in the tech world and beyond. But what exactly is it? For those of us who aren’t tech experts, machine learning might seem like a complex and intimidating concept. But fear not! This blog post aims to break down machine learning into simple, understandable terms.

Understanding Machine Learning

Imagine teaching a child how to recognize different types of fruits. You show them apples, bananas, oranges, and explain their unique characteristics. Over time, the child learns to identify these fruits on their own. This is, in essence, what machine learning is all about. It’s a type of artificial intelligence (AI) that involves teaching computers how to learn from data to make decisions or predictions.

How Does Machine Learning Work?

Machine learning works by feeding a computer system a lot of data, which it uses to learn patterns and make decisions. For instance, a machine learning system could be trained to recognize spam emails by analyzing thousands of emails, learning from the patterns it sees, and then using this knowledge to identify whether a new email is spam or not.

Types of Machine Learning

There are two main types of machine learning: supervised and unsupervised learning.

  • Supervised Learning: This is like teaching a child with a guidebook. You provide the computer with input data and the correct output. The system then learns the relationship between the input and output. For example, you could train a system to recognize dogs by showing it many pictures of dogs (input) and telling it that these are dogs (output).
  • Unsupervised Learning: This is like letting a child explore and learn on their own. The system is given a lot of data and must find patterns and relationships within the data itself. For example, you could give a system a bunch of news articles, and it might categorize them into different topics based on the words used in the articles.

Why is Machine Learning Important?

Machine learning is transforming the world in many ways. It’s used in healthcare to predict diseases, in finance to detect fraudulent transactions, in retail to recommend products, and much more. It’s making our lives easier, safer, and more personalized.

Conclusion

Machine learning might seem complex, but at its core, it’s about teaching computers to learn from data, just like how we learn from our experiences. It’s a powerful technology that’s changing the world in incredible ways, and it’s something we can all understand and appreciate.

Categories
AI for the masses

Unveiling the Power of Coral AI: A New Era of Machine Learning

Artificial Intelligence (AI) has become an integral part of our lives, influencing everything from our daily routines to business operations. One of the most exciting developments in the field of AI is the emergence of edge computing, which brings computation and data storage closer to the location where it’s needed, improving response times and saving bandwidth. Google’s Coral AI is a prime example of this technology, offering a suite of hardware and software tools that make it possible to develop and run local AI models.

The Power of Coral AI

Coral AI is a platform that allows developers to build intelligent devices with local AI. It’s a part of Google’s initiative to democratize AI and make it accessible to various industries. The platform includes a range of products, from system-on-modules (SOMs) and USB accelerators to development boards and cameras, all designed to facilitate the creation of local AI models.

Coral AI’s Edge TPU (Tensor Processing Unit) is a high-speed machine learning (ML) accelerator specifically designed for edge computing. It’s capable of executing state-of-the-art mobile vision models, such as MobileNet V2, at 100+ frames per second, in a power-efficient manner. This makes it ideal for use in mobile and embedded systems.

Applications of Coral AI

Coral AI devices can be used in a wide range of applications. For instance, in the retail industry, Coral AI can be used to develop smart checkout systems that can identify products without the need for barcodes. In the manufacturing sector, it can be used to monitor equipment and predict maintenance needs, thereby reducing downtime.

In the healthcare industry, Coral AI can be used to develop devices that can monitor patient health in real-time, providing critical insights and alerts when necessary. In agriculture, it can be used to develop systems that monitor crop health and optimize irrigation.

The Future of AI with Coral

Coral AI is not just a product; it’s a vision for the future of AI. By bringing AI closer to the edge, Coral is making it possible to process data locally in real-time, without the need for constant internet connectivity. This opens up a world of possibilities for developers and businesses, enabling them to create intelligent devices that can operate independently and make decisions based on local data.

Moreover, Coral AI is designed with privacy in mind. Since data is processed locally, there’s less need to send sensitive information to the cloud, reducing the risk of data breaches.

Conclusion

Coral AI is a powerful tool that’s pushing the boundaries of what’s possible with AI. By bringing AI to the edge, Coral is not only making AI more accessible but also more efficient, secure, and responsive. Whether you’re a developer looking to build your next AI project or a business looking to leverage the power of AI, Coral offers a versatile and powerful platform to help you achieve your goals. The future of AI is here, and it’s closer to the edge than ever before.

Categories
AI for the masses

The Consequences of Using Model-Generated Content in Training Large Language Models

In a recent study titled “The use of model-generated content in training large language models (LLMs)”, the authors delve into a critical issue that has significant implications for the field of machine learning and artificial intelligence. The paper discusses a phenomenon known as “model collapse,” which refers to the disappearance of the tails of the original content distribution in the resulting models due to the use of model-generated content in training large language models.

This issue is not isolated but is ubiquitous amongst all learned generative models. It is a matter of serious concern, especially considering the benefits derived from training with large-scale data scraped from the web.

The authors emphasize the increasing value of data collected from genuine human interactions with systems, especially in the context of the presence of content generated by large language models in data crawled from the Internet.

The paper suggests that the use of model-generated content in training large language models can lead to irreversible defects. These defects can significantly affect the performance and reliability of these models, making it a crucial area of research and development in the field of AI and machine learning.

The document provides a comprehensive analysis of the issue and offers valuable insights into the challenges and potential solutions associated with training large language models. It is a must-read for researchers, data scientists, and AI enthusiasts who are keen on understanding the intricacies of large language model training and the impact of model-generated content on these processes.

The cause of model collapse is primarily attributed to two types of errors: statistical approximation error and functional approximation error.

Statistical approximation error is the primary type of error, which arises due to the number of samples being finite, and disappears as the number of samples tends to infinity. This occurs due to a non-zero probability that information can get lost at every step of re-sampling. For instance, a single-dimensional Gaussian being approximated from a finite number of samples can still have significant errors, despite using a very large number of points.

Functional approximation error is a secondary type of error, which stems from our function approximators being insufficiently expressive (or sometimes too expressive outside of the original distribution support). For example, a neural network can introduce non-zero likelihood outside of the support of the original distribution. A simple example of this error is if we were to try fitting a mixture of two Gaussians with a single Gaussian. Even if we have perfect information about the data distribution, model errors will be inevitable.

These errors can cause model collapse to get worse or better. Better approximation power can even be a double-edged sword – better expressiveness may counteract statistical noise, resulting in a good approximation of the true distribution, but it can equally compound this noise. More often then not, we get a cascading effect where combined individual inaccuracy causes the overall error to grow. Overfitting the density model will cause the model to extrapolate incorrectly and might give high density to low-density regions not covered in the training set support; these will then be sampled with arbitrary frequency.

It’s also worth mentioning that modern computers also have a further computational error coming from the way floating point numbers are represented. This error is not evenly spread across different floating point ranges, making it hard to estimate the precise value of a given number. Such errors are smaller in magnitude and are fixable with more precise hardware, making them less influential on model collapse.

For more detailed insights, you can access the full paper here.

Categories
AI for the masses

Guidelines that would help regulate AI

Transparency Requirement

AI systems should be designed and operated as transparently as possible. The logic behind the AI’s decision-making process should be understandable by humans. This is particularly important for AI systems used in critical areas like healthcare, finance, or criminal justice.

Data Protection and Privacy

AI systems often rely on large amounts of data, which can include sensitive personal information. Strict data protection measures should be in place to ensure the privacy of individuals. This includes obtaining informed consent before data collection and ensuring data is anonymized and securely stored.

Accountability and Liability

Clear lines of accountability should be established for AI systems. If an AI system causes harm, it should be possible to determine who is legally responsible. This could be the developer of the AI, the operator, or the owner, depending on the circumstances.

Fairness and Non-Discrimination

AI systems should not perpetuate or amplify bias and discrimination. They should be tested for bias and fairness, and measures should be in place to correct any identified bias.

Safety and Robustness

AI systems should be safe to use and robust against manipulation. This includes ensuring the AI behaves as intended, even when faced with unexpected situations or adversarial attacks.

Human Oversight

There should always be a human in the loop when it comes to critical decisions made by AI. This ensures that decisions can be reviewed and, if necessary, overridden by a human.

Public Participation

Stakeholders, including the public, should be involved in decision-making processes about AI regulation. This ensures that a wide range of perspectives are considered and that regulations align with societal values and expectations.

Continuous Monitoring

AI systems should be continuously monitored to ensure they are operating as intended and not causing harm. This includes regular audits and evaluations.

Ethical Considerations

AI systems should adhere to ethical guidelines, respecting human rights and dignity. This includes considerations like respect for autonomy, beneficence, non-maleficence, and justice.

Education and Training

There should be a focus on education and training to ensure that those working with AI understand the ethical, legal, and societal implications. This includes training in ethical AI design and use for developers, operators, and decision-makers.

Categories
AI for the masses

Regulation of AI not just a necessity, but an imperative.

Artificial Intelligence (AI) has become an integral part of our daily lives, influencing sectors ranging from healthcare to finance, and from transportation to entertainment. As AI continues to evolve and become more sophisticated, it brings about significant benefits, including increased efficiency, improved decision-making, and the potential for groundbreaking innovations. However, the rapid advancement of AI also presents a myriad of challenges and risks, making the regulation of AI not just a necessity, but an imperative.

 

Ethical Considerations

AI systems, particularly those employing machine learning, often make decisions based on patterns they identify in the data they have been trained on. If this data is biased, the AI’s decisions may also be biased, leading to unfair outcomes. For instance, an AI system used in hiring might discriminate against certain demographic groups if it was trained on biased hiring data. Regulations can ensure that AI systems are transparent and fair, and that they adhere to ethical standards.

Privacy and Security

AI systems often rely on large amounts of data, which can include sensitive personal information. Without proper regulation, this could lead to privacy infringements. Moreover, as AI becomes more integrated into critical systems like healthcare or transportation, they become attractive targets for cyberattacks. Regulatory standards can help ensure that AI systems have robust security measures in place and handle data in a manner that respects privacy.

Accountability and Transparency in AI Systems

Accountability in AI systems is a critical aspect that needs to be addressed by regulations. As AI systems become more complex, their decision-making processes can become less transparent, often referred to as the “black box” problem. This lack of transparency can make it difficult to determine why an AI system made a particular decision, which becomes problematic when a decision results in harmful consequences.

Regulations can mandate the development and use of explainable AI or XAI. XAI refers to AI systems designed to provide clear, understandable explanations for their decisions. This not only helps users understand and trust the AI’s decisions but also makes it easier to identify and correct errors when they occur.

Furthermore, regulations can establish clear lines of accountability for AI’s actions. This could involve assigning legal responsibility to the organizations that develop or use AI systems. For instance, if an autonomous vehicle causes an accident, the manufacturer of the vehicle could be held responsible. By establishing clear accountability, regulations can ensure that victims of harmful AI decisions have legal recourse.

Economic Impact and the Future of Work

The rise of AI has significant implications for the economy and the future of work. AI systems can automate tasks that were previously performed by humans, leading to increased efficiency and productivity. However, this automation could also lead to job displacement, as workers in certain sectors may find their skills are no longer in demand.

Regulations can play a crucial role in managing this transition. For instance, they could encourage or require companies to retrain workers whose jobs are threatened by automation. This could involve partnerships with educational institutions to provide workers with the skills they need for the jobs of the future.

Moreover, regulations could promote the development and use of AI in a way that creates new jobs. For instance, they could provide incentives for companies to use AI to augment human workers, rather than replace them. This could involve using AI to automate routine tasks, freeing up workers to focus on more complex and creative tasks.

Furthermore, as AI continues to transform the economy, it may be necessary to reconsider traditional economic measures and policies. For instance, if AI leads to significant job displacement, it could fuel calls for policies like universal basic income. Regulations could play a role in facilitating these discussions and implementing these policies.

In conclusion, the economic impact of AI is complex and multifaceted. Regulations can help manage this impact, ensuring that the transition to an AI-driven economy is fair and beneficial for all.

 

The Way Forward: A Comprehensive Approach to AI Regulation

Navigating the path towards effective AI regulation requires a comprehensive, multi-faceted approach. This involves not only the creation of new laws and standards but also the adaptation of existing legal and ethical frameworks to accommodate the unique challenges posed by AI.

Firstly, the development of AI regulations should be a collaborative effort involving a wide range of stakeholders. Policymakers should work closely with AI developers, researchers, ethicists, and representatives from various sectors affected by AI. This would ensure that regulations are grounded in a deep understanding of AI technologies and their potential societal impacts. Public input should also be sought to ensure that regulations align with societal values and expectations.

Secondly, international cooperation is crucial. AI technologies, much like the digital economy in which they operate, do not respect national borders. An AI developed in one country can be used and potentially cause harm in another. As such, international standards and agreements are needed to ensure consistent regulation of AI across borders. This could involve bodies like the United Nations or the International Standards Organization, as well as regional bodies like the European Union.

Thirdly, regulations need to be adaptable and future-proof. The field of AI is evolving at a rapid pace, with new technologies and applications emerging regularly. Regulations that are too specific may quickly become outdated, while those that are too vague may not provide sufficient guidance. One solution could be the use of ‘regulatory sandboxes’, which are controlled environments in which new AI technologies can be tested and monitored before being widely adopted. This allows for the real-world impacts of these technologies to be assessed and for regulations to be updated accordingly.

Lastly, education and awareness-raising are key components of the way forward. As AI becomes more prevalent, it is important for the public to understand how these systems work, how they are used, and what their rights are in relation to these systems. This could involve public education campaigns, as well as requirements for companies to provide clear, understandable information about their AI systems.

In conclusion, the necessity of AI regulation is clear. While AI presents enormous potential, it also brings significant risks and challenges that need to be managed. Through thoughtful, balanced, and adaptable regulation, we can harness the benefits of AI in a manner that is ethical, secure, accountable, and economically fair. The task is complex and challenging, but with international cooperation and a commitment to shared principles, it is within our reach.

Categories
shellinfo tips

Discover Rsync

In the realm of file synchronization and data transfer, ‘rsync’ stands as a powerful and flexible tool. Originally released in 1996, rsync, which stands for “remote synchronization,” is a utility software and network protocol for Unix-like systems that synchronizes files and directories from one location to another while minimizing data transfer using delta encoding when appropriate.

Understanding Rsync

Rsync is commonly used for backups and mirroring and as an improved copy command for everyday use. It offers many options that control every aspect of its behavior and permit very flexible specification of the set of files to be copied. It is famous for its delta-transfer algorithm, which reduces the amount of data sent over the network by sending only the differences between the source files and the existing files in the destination.

Basic Usage of Rsync

The basic syntax of rsync is quite simple:

rsync options source destination

For example, to copy a file from one location to another, you would use:

rsync -zvh backup.tar /tmp/backups/

This command copies the file backup.tar to the directory /tmp/backups/. The options -zvh tell rsync to compress the data (-z), use human-readable sizes (-h), and display verbose output (-v).

Rsync for Remote Files

Rsync can also synchronize files with a remote server. For example:

rsync -avz file.txt username@remote:/path/to/directory/

This command copies file.txt to the /path/to/directory/ directory on the remote server. You would replace username with your username on the remote server and remote with the server’s address.

Rsync for Directory Synchronization

Rsync is also commonly used to synchronize directories:

rsync -avz /path/to/source/directory/ username@remote:/path/to/destination/directory/

This command synchronizes the source directory with the destination directory on the remote server, copying over any files that are different.

Rsync’s flexibility allows for a wide range of uses. Here are some additional examples:

Rsync with Delete Option: If you want rsync to delete files at the destination that no longer exist at the source, you can use the –delete option:

rsync -avz --delete /path/to/source/directory/ username@remote:/path/to/destination/directory/

This command will synchronize the directories and delete any files in the destination directory that are not present in the source directory.

Rsync with Include and Exclude: You can specify patterns to include or exclude files or directories:

rsync -avz --include 'R*' --exclude '*' /path/to/source/directory/ /path/to/destination/directory/

This command will only synchronize files in the source directory that start with ‘R’, excluding all other files.

Rsync with Progress Option: If you want to display the progress during transfer, you can use the –progress option:

rsync -avz --progress /path/to/source/directory/ username@remote:/path/to/destination/directory/

This command will display progress during the rsync execution, showing you how much data has been transferred over time.

Rsync with Compression: If you’re transferring large files or directories, you can use the -z or –compress option to reduce the data size:

rsync -avz --compress /path/to/source/directory/ username@remote:/path/to/destination/directory/

This command will compress the file data as it is sent to the destination machine, which can significantly speed up the transfer.

Rsync over a Specific SSH Port: If your SSH server listens on a different port, you can specify the port with the -e option:

rsync -avz -e 'ssh -p 2222' /path/to/source/directory/ username@remote:/path/to/destination/directory/

This command will connect to the SSH server on port 2222.

Conclusion

Rsync is a powerful tool for file and directory synchronization. Its flexibility and efficiency make it a favorite among system administrators and power users. With a little practice, it can easily become an essential part of your command-line toolkit.

Categories
shellinfo tips

DIG – dnsutils

In the world of networking, understanding how to retrieve information about domain names is crucial. One tool that makes this task easier is ‘dig’, a powerful command-line utility available on Unix-based systems like Linux and macOS.

‘Dig’ stands for ‘Domain Information Groper’. It is a flexible tool for interrogating DNS (Domain Name System) name servers. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried.

How to Use the ‘dig’ Command

The basic syntax of the ‘dig’ command is straightforward:
dig [name] [type]

Here, ‘name’ is the name of the resource record that is to be looked up, and ‘type’ indicates the type of query. If no type argument is supplied, ‘dig’ will perform a lookup for an A record.

For example, to find the IP address associated with a domain, you would use:
dig www.example.com

This command will return a variety of information, including the ‘ANSWER SECTION’, which contains the A record for ‘www.example.com‘ (i.e., its IP address).

Using ‘dig’ with Different Query Types

You can use ‘dig’ to query different types of records.

  1. MX (Mail Exchange) Records: These records are used in routing email. To query MX records, you would use:

dig example.com MX

This command will return the MX records for ‘example.com’, showing you the mail servers that are set up to receive email for that domain.

  1. NS (Name Server) Records: These records indicate which DNS servers are authoritative for a domain. To query NS records, use:

dig example.com NS

This command will return the NS records for ‘example.com’, showing you which name servers are responsible for information about the domain.

  1. TXT (Text) Records: These records are often used to hold machine-readable data, such as SPF data to combat email spoofing or DKIM data for email validation. To query TXT records, use:

dig example.com TXT

This command will return the TXT records for ‘example.com’, which could include various types of information depending on what the domain uses TXT records for.

  1. CNAME (Canonical Name) Records: These records are used to alias one name to another. To query CNAME records, use:

dig www.example.com CNAME

This command will return the CNAME record for ‘www.example.com‘, if one exists, showing you what domain name ‘www.example.com‘ is an alias for.

  1. SOA (Start of Authority) Records: These records provide authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and several timers relating to refreshing the zone. To query SOA records, use:

dig example.com SOA

This command will return the SOA record for ‘example.com’, providing a wealth of information about how the domain is configured.

Conclusion

The ‘dig’ command is a versatile tool for anyone who needs to work with DNS. Whether you’re a system administrator troubleshooting network issues or a web developer setting up a new domain, ‘dig’ offers a quick and reliable way to query DNS records.

Categories
Linux manpage

manpage find

FIND(1) General Commands Manual FIND(1)

NAME

find – search for files in a directory hierarchy

SYNOPSIS

find [-H] [-L] [-P] [-D debugopts] [-Olevel] [starting-point…] [expression]

DESCRIPTION

       This  manual  page documents the GNU version of find.  GNU find searches the directory tree rooted at each given starting-point by evaluating the
       given expression from left to right, according to the rules of precedence (see section OPERATORS), until the outcome is known (the left hand side
       is  false  for  and  operations, true for or), at which point find moves on to the next file name.  If no starting-point is specified, `.' is asâАР
       sumed.

       If you are using find in an environment where security is important (for example if you are using it to search directories that are  writable  by
       other  users), you should read the `Security Considerations' chapter of the findutils documentation, which is called Finding Files and comes with
       findutils.  That document also includes a lot more detail and discussion than this manual page, so you may find it a more useful source of inforâАР
       mation.

OPTIONS

       The  -H, -L and -P options control the treatment of symbolic links.  Command-line arguments following these are taken to be names of files or diâАР
       rectories to be examined, up to the first argument that begins with `-', or the argument `(' or `!'.  That argument and any  following  arguments
       are taken to be the expression describing what is to be searched for.  If no paths are given, the current directory is used.  If no expression is
       given, the expression -print is used (but you should probably consider using -print0 instead, anyway).

       This manual page talks about `options' within the expression list.  These options control the behaviour of find but are specified immediately afâАР
       ter the last path name.  The five `real' options -H, -L, -P, -D and -O must appear before the first path name, if at all.  A double dash -- could
       theoretically be used to signal that any remaining arguments are not options, but this does not really work due to the way  find  determines  the
       end  of  the following path arguments: it does that by reading until an expression argument comes (which also starts with a `-').  Now, if a path
       argument would start with a `-', then find would treat it as expression argument instead.  Thus, to ensure that all start  points  are  taken  as
       such,  and  especially  to prevent that wildcard patterns expanded by the calling shell are not mistakenly treated as expression arguments, it is
       generally safer to prefix wildcards or dubious path names with either `./' or to use absolute path names starting with '/'.

       -P     Never follow symbolic links.  This is the default behaviour.  When find examines or prints information about files, and the file is a symâАР
              bolic link, the information used shall be taken from the properties of the symbolic link itself.

       -L     Follow  symbolic  links.  When find examines or prints information about files, the information used shall be taken from the properties of
              the file to which the link points, not from the link itself (unless it is a broken symbolic link or find is unable to examine the file  to
              which  the  link points).  Use of this option implies -noleaf.  If you later use the -P option, -noleaf will still be in effect.  If -L is
              in effect and find discovers a symbolic link to a subdirectory during its search, the subdirectory pointed to by the symbolic link will be
              searched.

              When  the -L option is in effect, the -type predicate will always match against the type of the file that a symbolic link points to rather
              than the link itself (unless the symbolic link is broken).  Actions that can cause symbolic links to become broken while find is executing
              (for example -delete) can give rise to confusing behaviour.  Using -L causes the -lname and -ilname predicates always to return false.

       -H     Do  not  follow symbolic links, except while processing the command line arguments.  When find examines or prints information about files,
              the information used shall be taken from the properties of the symbolic link itself.  The only exception to this behaviour is when a  file
              specified  on  the  command line is a symbolic link, and the link can be resolved.  For that situation, the information used is taken from
              whatever the link points to (that is, the link is followed).  The information about the link itself is used as  a  fallback  if  the  file
              pointed  to  by the symbolic link cannot be examined.  If -H is in effect and one of the paths specified on the command line is a symbolic
              link to a directory, the contents of that directory will be examined (though of course -maxdepth 0 would prevent this).

       If more than one of -H, -L and -P is specified, each overrides the others; the last one appearing on the command line takes effect.  Since it  is
       the default, the -P option should be considered to be in effect unless either -H or -L is specified.

       GNU  find frequently stats files during the processing of the command line itself, before any searching has begun.  These options also affect how
       those arguments are processed.  Specifically, there are a number of tests that compare files listed on the command line against  a  file  we  are
       currently  considering.   In  each case, the file specified on the command line will have been examined and some of its properties will have been
       saved.  If the named file is in fact a symbolic link, and the -P option is in effect (or if neither -H nor -L were  specified),  the  information
       used  for the comparison will be taken from the properties of the symbolic link.  Otherwise, it will be taken from the properties of the file the
       link points to.  If find cannot follow the link (for example because it has insufficient privileges or the link points to a nonexistent file) the
       properties of the link itself will be used.

       When  the  -H  or  -L  options are in effect, any symbolic links listed as the argument of -newer will be dereferenced, and the timestamp will be
       taken from the file to which the symbolic link points.  The same consideration applies to -newerXY, -anewer and -cnewer.

       The -follow option has a similar effect to -L, though it takes effect at the point where it appears (that is, if -L is not used but  -follow  is,
       any symbolic links appearing after -follow on the command line will be dereferenced, and those before it will not).

       -D debugopts
              Print  diagnostic  information;  this can be helpful to diagnose problems with why find is not doing what you want.  The list of debug opâАР
              tions should be comma separated.  Compatibility of the debug options is not guaranteed between releases of findutils.  For a complete list
              of valid debug options, see the output of find -D help.  Valid debug options include

              exec   Show diagnostic information relating to -exec, -execdir, -ok and -okdir

              opt    Prints diagnostic information relating to the optimisation of the expression tree; see the -O option.

              rates  Prints a summary indicating how often each predicate succeeded or failed.

              search Navigate the directory tree verbosely.

              stat   Print messages as files are examined with the stat and lstat system calls.  The find program tries to minimise such calls.

              tree   Show the expression tree in its original and optimised form.

              all    Enable all of the other debug options (but help).

              help   Explain the debugging options.

       -Olevel
              Enables  query  optimisation.   The find program reorders tests to speed up execution while preserving the overall effect; that is, prediâАР
              cates with side effects are not reordered relative to each other.  The optimisations performed at each optimisation level are as follows.

              0      Equivalent to optimisation level 1.

              1      This is the default optimisation level and corresponds to the traditional behaviour.  Expressions are reordered so that tests based
                     only on the names of files (for example -name and -regex) are performed first.

              2      Any  -type or -xtype tests are performed after any tests based only on the names of files, but before any tests that require inforâАР
                     mation from the inode.  On many modern versions of Unix, file types are returned by readdir() and so these predicates are faster to
                     evaluate than predicates which need to stat the file first.  If you use the -fstype FOO predicate and specify a filesystem type FOO
                     which is not known (that is, present in `/etc/mtab') at the time find starts, that predicate is equivalent to -false.

              3      At this optimisation level, the full cost-based query optimiser is enabled.  The order of tests is modified  so  that  cheap  (i.e.
                     fast)  tests  are performed first and more expensive ones are performed later, if necessary.  Within each cost band, predicates are
                     evaluated earlier or later according to whether they are likely to succeed or not.  For -o, predicates which are likely to  succeed
                     are evaluated earlier, and for -a, predicates which are likely to fail are evaluated earlier.

              The  cost-based optimiser has a fixed idea of how likely any given test is to succeed.  In some cases the probability takes account of the
              specific nature of the test (for example, -type f is assumed to be more likely to succeed than -type c).  The cost-based optimiser is curâАР
              rently  being  evaluated.   If  it does not actually improve the performance of find, it will be removed again.  Conversely, optimisations
              that prove to be reliable, robust and effective may be enabled at lower optimisation levels over time.   However,  the  default  behaviour
              (i.e.  optimisation level 1) will not be changed in the 4.3.x release series.  The findutils test suite runs all the tests on find at each
              optimisation level and ensures that the result is the same.

EXPRESSION

       The part of the command line after the list of starting points is the expression.  This is a kind of query specification describing how we  match
       files and what we do with the files that were matched.  An expression is composed of a sequence of things:

       Tests  Tests  return  a  true or false value, usually on the basis of some property of a file we are considering.  The -empty test for example is
              true only when the current file is empty.

       Actions
              Actions have side effects (such as printing something on the standard output) and return either true or false, usually based on whether or
              not they are successful.  The -print action for example prints the name of the current file on the standard output.

       Global options
              Global  options  affect  the operation of tests and actions specified on any part of the command line.  Global options always return true.
              The -depth option for example makes find traverse the file system in a depth-first order.

       Positional options
              Positional options affect only tests or actions which follow them.  Positional options always return true.  The -regextype option for  exâАР
              ample is positional, specifying the regular expression dialect for regular expressions occurring later on the command line.

       Operators
              Operators  join  together the other items within the expression.  They include for example -o (meaning logical OR) and -a (meaning logical
              AND).  Where an operator is missing, -a is assumed.

       The -print action is performed on all files for which the whole expression is true, unless it contains an action other than -prune or -quit.  AcâАР
       tions which inhibit the default -print are -delete, -exec, -execdir, -ok, -okdir, -fls, -fprint, -fprintf, -ls, -print and -printf.

       The -delete action also acts like an option (since it implies -depth).

POSITIONAL OPTIONS

Positional options always return true. They affect only tests occurring later on the command line.

       -daystart
              Measure  times  (for -amin, -atime, -cmin, -ctime, -mmin, and -mtime) from the beginning of today rather than from 24 hours ago.  This opâАР
              tion only affects tests which appear later on the command line.

       -follow
              Deprecated; use the -L option instead.  Dereference symbolic links.  Implies -noleaf.  The -follow option affects only those  tests  which
              appear after it on the command line.  Unless the -H or -L option has been specified, the position of the -follow option changes the behavâАР
              iour of the -newer predicate; any files listed as the argument of -newer will be dereferenced if they are symbolic links.  The  same  conâАР
              sideration applies to -newerXY, -anewer and -cnewer.  Similarly, the -type predicate will always match against the type of the file that a
              symbolic link points to rather than the link itself.  Using -follow causes the -lname and -ilname predicates always to return false.

       -regextype type
              Changes the regular expression syntax understood by -regex and -iregex tests which occur later on the command line.  To see which  regular
              expression types are known, use -regextype help.  The Texinfo documentation (see SEE ALSO) explains the meaning of and differences between
              the various types of regular expression.

       -warn, -nowarn
              Turn warning messages on or off.  These warnings apply only to the command line usage, not to any conditions  that  find  might  encounter
              when  it  searches  directories.   The  default behaviour corresponds to -warn if standard input is a tty, and to -nowarn otherwise.  If a
              warning message relating to command-line usage is produced, the exit status of find is not affected.  If the  POSIXLY_CORRECT  environment
              variable is set, and -warn is also used, it is not specified which, if any, warnings will be active.

GLOBAL OPTIONS

       Global  options  always  return  true.  Global options take effect even for tests which occur earlier on the command line.  To prevent confusion,
       global options should specified on the command-line after the list of start points, just before the first test, positional option or action.   If
       you specify a global option in some other place, find will issue a warning message explaining that this can be confusing.

       The global options occur after the list of start points, and so are not the same kind of option as -L, for example.

       -d     A synonym for -depth, for compatibility with FreeBSD, NetBSD, MacOS X and OpenBSD.

       -depth Process each directory's contents before the directory itself.  The -delete action also implies -depth.

       -help, --help
              Print a summary of the command-line usage of find and exit.

       -ignore_readdir_race
              Normally,  find  will  emit an error message when it fails to stat a file.  If you give this option and a file is deleted between the time
              find reads the name of the file from the directory and the time it tries to stat the file, no error message will be issued.  This also apâАР
              plies  to  files or directories whose names are given on the command line.  This option takes effect at the time the command line is read,
              which means that you cannot search one part of the filesystem with this option on and part of it with this option off (if you need  to  do
              that, you will need to issue two find commands instead, one with the option and one without it).

              Furthermore, find with the -ignore_readdir_race option will ignore errors of the -delete action in the case the file has disappeared since
              the parent directory was read: it will not output an error diagnostic, and the return code of the -delete action will be true.

       -maxdepth levels
              Descend at most levels (a non-negative integer) levels of directories below the starting-points.  Using -maxdepth 0 means only  apply  the
              tests and actions to the starting-points themselves.

       -mindepth levels
              Do  not  apply any tests or actions at levels less than levels (a non-negative integer).  Using -mindepth 1 means process all files except
              the starting-points.

       -mount Don't descend directories on other filesystems.  An alternate name for -xdev, for compatibility with some other versions of find.

       -noignore_readdir_race
              Turns off the effect of -ignore_readdir_race.

       -noleaf
              Do not optimize by assuming that directories contain 2 fewer subdirectories than their hard  link  count.   This  option  is  needed  when
              searching  filesystems  that  do  not  follow the Unix directory-link convention, such as CD-ROM or MS-DOS filesystems or AFS volume mount
              points.  Each directory on a normal Unix filesystem has at least 2 hard links: its name and its `.' entry.  Additionally, its  subdirectoâАР
              ries (if any) each have a `..' entry linked to that directory.  When find is examining a directory, after it has statted 2 fewer subdirecâАР
              tories than the directory's link count, it knows that the rest of the entries in the directory are non-directories (`leaf'  files  in  the
              directory tree).  If only the files' names need to be examined, there is no need to stat them; this gives a significant increase in search
              speed.

       -version, --version
              Print the find version number and exit.

       -xdev  Don't descend directories on other filesystems.

TESTS

       Some tests, for example -newerXY and -samefile, allow comparison between the file currently being examined and some reference file  specified  on
       the  command line.  When these tests are used, the interpretation of the reference file is determined by the options -H, -L and -P and any previâАР
       ous -follow, but the reference file is only examined once, at the time the command line is parsed.  If the reference file cannot be examined (for
       example, the stat(2) system call fails for it), an error message is issued, and find exits with a nonzero status.

       A numeric argument n can be specified to tests (like -amin, -mtime, -gid, -inum, -links, -size, -uid and -used) as

       +n     for greater than n,

       -n     for less than n,

       n      for exactly n.

       Supported tests:

       -amin n
              File was last accessed less than, more than or exactly n minutes ago.

       -anewer reference
              Time of the last access of the current file is more recent than that of the last data modification of the reference file.  If reference is
              a symbolic link and the -H option or the -L option is in effect, then the time of the last data modification of the file it points  to  is
              always used.

       -atime n
              File  was  last  accessed less than, more than or exactly n*24 hours ago.  When find figures out how many 24-hour periods ago the file was
              last accessed, any fractional part is ignored, so to match -atime +1, a file has to have been accessed at least two days ago.

       -cmin n
              File's status was last changed less than, more than or exactly n minutes ago.

       -cnewer reference
              Time of the last status change of the current file is more recent than that of the last data modification of the reference file.  If  refâАР
              erence  is  a  symbolic  link  and the -H option or the -L option is in effect, then the time of the last data modification of the file it
              points to is always used.

       -ctime n
              File's status was last changed less than, more than or exactly n*24 hours ago.  See the comments for -atime to understand how rounding afâАР
              fects the interpretation of file status change times.

       -empty File is empty and is either a regular file or a directory.

       -executable
              Matches files which are executable and directories which are searchable (in a file name resolution sense) by the current user.  This takes
              into account access control lists and other permissions artefacts which the -perm test ignores.  This test makes use of the access(2) sysâАР
              tem  call,  and  so  can  be fooled by NFS servers which do UID mapping (or root-squashing), since many systems implement access(2) in the
              client's kernel and so cannot make use of the UID mapping information held on the server.  Because this test is based only on  the  result
              of the access(2) system call, there is no guarantee that a file for which this test succeeds can actually be executed.

       -false Always false.

       -fstype type
              File  is on a filesystem of type type.  The valid filesystem types vary among different versions of Unix; an incomplete list of filesystem
              types that are accepted on some version of Unix or another is: ufs, 4.2, 4.3, nfs, tmp, mfs, S51K, S52K.  You can use -printf with the  %F
              directive to see the types of your filesystems.

       -gid n File's numeric group ID is less than, more than or exactly n.

       -group gname
              File belongs to group gname (numeric group ID allowed).

       -ilname pattern
              Like  -lname,  but the match is case insensitive.  If the -L option or the -follow option is in effect, this test returns false unless the
              symbolic link is broken.

       -iname pattern
              Like -name, but the match is case insensitive.  For example, the patterns `fo' and `F??' match the file names `Foo', `FOO', `foo', `fOo',
              etc.  The pattern `foo*` will also match a file called '.foobar'.

       -inum n
              File has inode number smaller than, greater than or exactly n.  It is normally easier to use the -samefile test instead.

       -ipath pattern
              Like -path.  but the match is case insensitive.

       -iregex pattern
              Like -regex, but the match is case insensitive.

       -iwholename pattern
              See -ipath.  This alternative is less portable than -ipath.

       -links n
              File has less than, more than or exactly n hard links.

       -lname pattern
              File  is a symbolic link whose contents match shell pattern pattern.  The metacharacters do not treat `/' or `.' specially.  If the -L opâАР
              tion or the -follow option is in effect, this test returns false unless the symbolic link is broken.

       -mmin n
              File's data was last modified less than, more than or exactly n minutes ago.

       -mtime n
              File's data was last modified less than, more than or exactly n*24 hours ago.  See the comments for -atime to understand how rounding  afâАР
              fects the interpretation of file modification times.

       -name pattern
              Base  of file name (the path with the leading directories removed) matches shell pattern pattern.  Because the leading directories are reâАР
              moved, the file names considered for a match with -name will never include a slash, so `-name a/b' will never match anything (you probably
              need  to  use  -path  instead).   A  warning is issued if you try to do this, unless the environment variable POSIXLY_CORRECT is set.  The
              metacharacters (`*', `?', and `[]') match a `.' at the start of the base name (this is a change in findutils-4.2.2; see section  STANDARDS
              CONFORMANCE  below).  To ignore a directory and the files under it, use -prune rather than checking every file in the tree; see an example
              in the description of that action.  Braces are not recognised as being special, despite the fact that some  shells  including  Bash  imbue
              braces  with  a  special  meaning  in shell patterns.  The filename matching is performed with the use of the fnmatch(3) library function.
              Don't forget to enclose the pattern in quotes in order to protect it from expansion by the shell.

       -newer reference
              Time of the last data modification of the current file is more recent than that of the last data modification of the reference  file.   If
              reference  is  a symbolic link and the -H option or the -L option is in effect, then the time of the last data modification of the file it
              points to is always used.

       -newerXY reference
              Succeeds if timestamp X of the file being considered is newer than timestamp Y of the file reference.  The letters X and Y can be  any  of
              the following letters:

              a   The access time of the file reference
              B   The birth time of the file reference
              c   The inode status change time of reference
              m   The modification time of the file reference
              t   reference is interpreted directly as a time

              Some  combinations are invalid; for example, it is invalid for X to be t.  Some combinations are not implemented on all systems; for examâАР
              ple B is not supported on all systems.  If an invalid or unsupported combination of XY is specified, a fatal error results.  Time specifiâАР
              cations  are  interpreted as for the argument to the -d option of GNU date.  If you try to use the birth time of a reference file, and the
              birth time cannot be determined, a fatal error message results.  If you specify a test which refers to the birth time of files being examâАР
              ined, this test will fail for any files where the birth time is unknown.

       -nogroup
              No group corresponds to file's numeric group ID.

       -nouser
              No user corresponds to file's numeric user ID.

       -path pattern
              File name matches shell pattern pattern.  The metacharacters do not treat `/' or `.' specially; so, for example,
                  find . -path "./sr*sc"
              will  print an entry for a directory called ./src/misc (if one exists).  To ignore a whole directory tree, use -prune rather than checking
              every file in the tree.  Note that the pattern match test applies to the whole file name, starting from one of the start points  named  on
              the  command line.  It would only make sense to use an absolute path name here if the relevant start point is also an absolute path.  This
              means that this command will never match anything:
                  find bar -path /foo/bar/myfile -print
              Find compares the -path argument with the concatenation of a directory name and the base name of the file it's examining.  Since the  conâАР
              catenation  will  never  end with a slash, -path arguments ending in a slash will match nothing (except perhaps a start point specified on
              the command line).  The predicate -path is also supported by HP-UX find and is part of the POSIX 2008 standard.

       -perm mode
              File's permission bits are exactly mode (octal or symbolic).  Since an exact match is required, if you want to use this form for  symbolic
              modes, you may have to specify a rather complex mode string.  For example `-perm g=w' will only match files which have mode 0020 (that is,
              ones for which group write permission is the only permission set).  It is more likely that you will want to use the `/' or `-' forms,  for
              example `-perm -g=w', which matches any file with group write permission.  See the EXAMPLES section for some illustrative examples.

       -perm -mode
              All  of the permission bits mode are set for the file.  Symbolic modes are accepted in this form, and this is usually the way in which you
              would want to use them.  You must specify `u', `g' or `o' if you use a symbolic mode.  See the EXAMPLES section for some illustrative  exâАР
              amples.

       -perm /mode
              Any  of the permission bits mode are set for the file.  Symbolic modes are accepted in this form.  You must specify `u', `g' or `o' if you
              use a symbolic mode.  See the EXAMPLES section for some illustrative examples.  If no permission bits in mode are set, this  test  matches
              any file (the idea here is to be consistent with the behaviour of -perm -000).

       -perm +mode
              This is no longer supported (and has been deprecated since 2005).  Use -perm /mode instead.

       -readable
              Matches  files which are readable by the current user.  This takes into account access control lists and other permissions artefacts which
              the -perm test ignores.  This test makes use of the access(2) system call, and so can be fooled by NFS servers which do  UID  mapping  (or
              root-squashing),  since many systems implement access(2) in the client's kernel and so cannot make use of the UID mapping information held
              on the server.

       -regex pattern
              File name matches regular expression pattern.  This is a match on the whole path, not a search.   For  example,  to  match  a  file  named
              ./fubar3, you can use the regular expression `.bar.' or `.b.3', but not `f.r3'.  The regular expressions understood by find are by deâАР
              fault Emacs Regular Expressions (except that `.' matches newline), but this can be changed with the -regextype option.

       -samefile name
              File refers to the same inode as name.  When -L is in effect, this can include symbolic links.

       -size n[cwbkMG]
              File uses less than, more than or exactly n units of space, rounding up.  The following suffixes can be used:

              `b'    for 512-byte blocks (this is the default if no suffix is used)

              `c'    for bytes

              `w'    for two-byte words

              `k'    for kibibytes (KiB, units of 1024 bytes)

              `M'    for mebibytes (MiB, units of 1024 * 1024 = 1048576 bytes)

              `G'    for gibibytes (GiB, units of 1024 * 1024 * 1024 = 1073741824 bytes)

              The size is simply the st_size member of the struct stat populated by the lstat (or stat) system call, rounded  up  as  shown  above.   In
              other  words,  it's consistent with the result you get for ls -l.  Bear in mind that the `%k' and `%b' format specifiers of -printf handle
              sparse files differently.  The `b' suffix always denotes 512-byte blocks and never 1024-byte blocks, which is different to  the  behaviour
              of -ls.

              The  +  and - prefixes signify greater than and less than, as usual; i.e., an exact size of n units does not match.  Bear in mind that the
              size is rounded up to the next unit.  Therefore -size -1M is not equivalent to -size -1048576c.  The former only matches empty files,  the
              latter matches files from 0 to 1,048,575 bytes.

       -true  Always true.

       -type c
              File is of type c:

              b      block (buffered) special

              c      character (unbuffered) special

              d      directory

              p      named pipe (FIFO)

              f      regular file

              l      symbolic  link; this is never true if the -L option or the -follow option is in effect, unless the symbolic link is broken.  If you
                     want to search for symbolic links when -L is in effect, use -xtype.

              s      socket

              D      door (Solaris)

              To search for more than one type at once, you can supply the combined list of type letters separated by a comma `,' (GNU extension).

       -uid n File's numeric user ID is less than, more than or exactly n.

       -used n
              File was last accessed less than, more than or exactly n days after its status was last changed.

       -user uname
              File is owned by user uname (numeric user ID allowed).

       -wholename pattern
              See -path.  This alternative is less portable than -path.

       -writable
              Matches files which are writable by the current user.  This takes into account access control lists and other permissions artefacts  which
              the  -perm  test  ignores.  This test makes use of the access(2) system call, and so can be fooled by NFS servers which do UID mapping (or
              root-squashing), since many systems implement access(2) in the client's kernel and so cannot make use of the UID mapping information  held
              on the server.

       -xtype c
              The  same  as  -type  unless the file is a symbolic link.  For symbolic links: if the -H or -P option was specified, true if the file is a
              link to a file of type c; if the -L option has been given, true if c is `l'.  In other words, for symbolic links, -xtype checks  the  type
              of the file that -type does not check.

       -context pattern
              (SELinux only) Security context of the file matches glob pattern.

ACTIONS

       -delete
              Delete files; true if removal succeeded.  If the removal failed, an error message is issued.  If -delete fails, find's exit status will be
              nonzero (when it eventually exits).  Use of -delete automatically turns on the `-depth' option.

              Warnings: Don't forget that the find command line is evaluated as an expression, so putting -delete first will make find try to delete evâАР
              erything  below the starting points you specified.  When testing a find command line that you later intend to use with -delete, you should
              explicitly specify -depth in order to avoid later surprises.  Because -delete implies -depth, you cannot usefully use -prune  and  -delete
              together.

              Together  with  the  -ignore_readdir_race option, find will ignore errors of the -delete action in the case the file has disappeared since
              the parent directory was read: it will not output an error diagnostic, and the return code of the -delete action will be true.

       -exec command ;
              Execute command; true if 0 status is returned.  All following arguments to find are taken to be arguments to the command until an argument
              consisting  of `;' is encountered.  The string `{}' is replaced by the current file name being processed everywhere it occurs in the arguâАР
              ments to the command, not just in arguments where it is alone, as in some versions of find.  Both of these constructions might need to  be
              escaped (with a `\') or quoted to protect them from expansion by the shell.  See the EXAMPLES section for examples of the use of the -exec
              option.  The specified command is run once for each matched file.  The command is executed in the starting directory.  There are  unavoidâАР
              able security problems surrounding use of the -exec action; you should use the -execdir option instead.

       -exec command {} +
              This  variant  of  the  -exec action runs the specified command on the selected files, but the command line is built by appending each seâАР
              lected file name at the end; the total number of invocations of the command will be much less than the number of matched files.  The  comâАР
              mand line is built in much the same way that xargs builds its command lines.  Only one instance of `{}' is allowed within the command, and
              it must appear at the end, immediately before the `+'; it needs to be escaped (with a `\') or quoted to protect it from interpretation  by
              the  shell.  The command is executed in the starting directory.  If any invocation with the `+' form returns a non-zero value as exit staâАР
              tus, then find returns a non-zero exit status.  If find encounters an error, this can sometimes cause an immediate exit, so  some  pending
              commands  may  not  be run at all.  For this reason -exec my-command ... {} + -quit may not result in my-command actually being run.  This
              variant of -exec always returns true.

       -execdir command ;

       -execdir command {} +
              Like -exec, but the specified command is run from the subdirectory containing the matched file, which is not  normally  the  directory  in
              which you started find.  As with -exec, the {} should be quoted if find is being invoked from a shell.  This a much more secure method for
              invoking commands, as it avoids race conditions during resolution of the paths to the matched files.  As with the -exec  action,  the  `+'
              form of -execdir will build a command line to process more than one matched file, but any given invocation of command will only list files
              that exist in the same subdirectory.  If you use this option, you must ensure that your $PATH environment variable does not reference `.';
              otherwise,  an  attacker  can  run any commands they like by leaving an appropriately-named file in a directory in which you will run -exâАР
              ecdir.  The same applies to having entries in $PATH which are empty or which are not absolute directory names.  If any invocation with the
              `+'  form  returns a non-zero value as exit status, then find returns a non-zero exit status.  If find encounters an error, this can someâАР
              times cause an immediate exit, so some pending commands may not be run at all.  The result of the action depends on whether the + or the ;
              variant is being used; -execdir command {} + always returns true, while -execdir command {} ; returns true only if command returns 0.

       -fls file
              True;  like  -ls  but write to file like -fprint.  The output file is always created, even if the predicate is never matched.  See the UNâАР
              USUAL FILENAMES section for information about how unusual characters in filenames are handled.

       -fprint file
              True; print the full file name into file file.  If file does not exist when find is run, it is created; if it does exist, it is truncated.
              The  file  names  /dev/stdout  and /dev/stderr are handled specially; they refer to the standard output and standard error output, respecâАР
              tively.  The output file is always created, even if the predicate is never matched.  See the UNUSUAL  FILENAMES  section  for  information
              about how unusual characters in filenames are handled.

       -fprint0 file
              True;  like  -print0  but write to file like -fprint.  The output file is always created, even if the predicate is never matched.  See the
              UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled.

       -fprintf file format
              True; like -printf but write to file like -fprint.  The output file is always created, even if the predicate is never  matched.   See  the
              UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled.

       -ls    True;  list  current  file  in  ls  -dils format on standard output.  The block counts are of 1 KB blocks, unless the environment variable
              POSIXLY_CORRECT is set, in which case 512-byte blocks are used.  See the UNUSUAL FILENAMES section for information about how unusual charâАР
              acters in filenames are handled.

       -ok command ;
              Like  -exec  but ask the user first.  If the user agrees, run the command.  Otherwise just return false.  If the command is run, its stanâАР
              dard input is redirected from /dev/null.

              The response to the prompt is matched against a pair of regular expressions to determine if it is an  affirmative  or  negative  response.
              This regular expression is obtained from the system if the `POSIXLY_CORRECT' environment variable is set, or otherwise from find's message
              translations.  If the system has no suitable definition, find's own definition will be used.  In either case, the  interpretation  of  the
              regular  expression itself will be affected by the environment variables 'LC_CTYPE' (character classes) and 'LC_COLLATE' (character ranges
              and equivalence classes).

       -okdir command ;
              Like -execdir but ask the user first in the same way as for -ok.  If the user does not agree, just return false.  If the command  is  run,
              its standard input is redirected from /dev/null.

       -print True;  print  the full file name on the standard output, followed by a newline.  If you are piping the output of find into another program
              and there is the faintest possibility that the files which you are searching for might contain a newline, then you should  seriously  conâАР
              sider using the -print0 option instead of -print.  See the UNUSUAL FILENAMES section for information about how unusual characters in fileâАР
              names are handled.

       -print0
              True; print the full file name on the standard output, followed by a null character (instead of the newline character that  -print  uses).
              This  allows  file names that contain newlines or other types of white space to be correctly interpreted by programs that process the find
              output.  This option corresponds to the -0 option of xargs.

       -printf format
              True; print format on the standard output, interpreting `\' escapes and `%' directives.  Field widths and precisions can be  specified  as
              with  the  printf(3) C function.  Please note that many of the fields are printed as %s rather than %d, and this may mean that flags don't
              work as you might expect.  This also means that the `-' flag does work (it forces fields to be left-aligned).  Unlike -print, -printf does
              not add a newline at the end of the string.  The escapes and directives are:

              \a     Alarm bell.

              \b     Backspace.

              \c     Stop printing from this format immediately and flush the output.

              \f     Form feed.

              \n     Newline.

              \r     Carriage return.

              \t     Horizontal tab.

              \v     Vertical tab.

              \0     ASCII NUL.

              \\     A literal backslash (`\').

              \NNN   The character whose ASCII code is NNN (octal).

              A `\' character followed by any other character is treated as an ordinary character, so they both are printed.

              %%     A literal percent sign.

              %a     File's last access time in the format returned by the C ctime(3) function.

              %Ak    File's  last access time in the format specified by k, which is either `@' or a directive for the C strftime(3) function.  The folâАР
                     lowing shows an incomplete list of possible values for k.  Please refer to the documentation of  strftime(3)  for  the  full  list.
                     Some  of the conversion specification characters might not be available on all systems, due to differences in the implementation of
                     the strftime(3) library function.

                     @      seconds since Jan. 1, 1970, 00:00 GMT, with fractional part.

                     Time fields:

                     H      hour (00..23)

                     I      hour (01..12)

                     k      hour ( 0..23)

                     l      hour ( 1..12)

                     M      minute (00..59)

                     p      locale's AM or PM

                     r      time, 12-hour (hh:mm:ss [AP]M)

                     S      Second (00.00 .. 61.00).  There is a fractional part.

                     T      time, 24-hour (hh:mm:ss.xxxxxxxxxx)

                     +      Date and time, separated by `+', for example `2004-04-28+22:22:05.0'.  This is a GNU extension.  The time is  given  in  the
                            current  timezone  (which  may be affected by setting the TZ environment variable).  The seconds field includes a fractional
                            part.

                     X      locale's time representation (H:M:S).  The seconds field includes a fractional part.

                     Z      time zone (e.g., EDT), or nothing if no time zone is determinable

                     Date fields:

                     a      locale's abbreviated weekday name (Sun..Sat)

                     A      locale's full weekday name, variable length (Sunday..Saturday)

                     b      locale's abbreviated month name (Jan..Dec)

                     B      locale's full month name, variable length (January..December)

                     c      locale's date and time (Sat Nov 04 12:02:33 EST 1989).  The format is the same as for ctime(3) and so to  preserve  compatiâАР
                            bility with that format, there is no fractional part in the seconds field.

                     d      day of month (01..31)

                     D      date (mm/dd/yy)

                     F      date (yyyy-mm-dd)

                     h      same as b

                     j      day of year (001..366)

                     m      month (01..12)

                     U      week number of year with Sunday as first day of week (00..53)

                     w      day of week (0..6)

                     W      week number of year with Monday as first day of week (00..53)

                     x      locale's date representation (mm/dd/yy)

                     y      last two digits of year (00..99)

                     Y      year (1970...)

              %b     The amount of disk space used for this file in 512-byte blocks.  Since disk space is allocated in multiples of the filesystem block
                     size this is usually greater than %s/512, but it can also be smaller if the file is a sparse file.

              %c     File's last status change time in the format returned by the C ctime(3) function.

              %Ck    File's last status change time in the format specified by k, which is the same as for %A.

              %d     File's depth in the directory tree; 0 means the file is a starting-point.

              %D     The device number on which the file exists (the st_dev field of struct stat), in decimal.

              %f     Print the basename; the file's name with any leading directories removed (only the last element).  For /, the result is  `/'.   See
                     the EXAMPLES section for an example.

              %F     Type of the filesystem the file is on; this value can be used for -fstype.

              %g     File's group name, or numeric group ID if the group has no name.

              %G     File's numeric group ID.

              %h     Dirname;  the Leading directories of the file's name (all but the last element).  If the file name contains no slashes (since it is
                     in the current directory) the %h specifier expands to `.'.  For files which are themselves directories and contain a slash (includâАР
                     ing /), %h expands to the empty string.  See the EXAMPLES section for an example.

              %H     Starting-point under which file was found.

              %i     File's inode number (in decimal).

              %k     The  amount  of  disk  space used for this file in 1 KB blocks.  Since disk space is allocated in multiples of the filesystem block
                     size this is usually greater than %s/1024, but it can also be smaller if the file is a sparse file.

              %l     Object of symbolic link (empty string if file is not a symbolic link).

              %m     File's permission bits (in octal).  This option uses the `traditional' numbers which most Unix implementations  use,  but  if  your
                     particular implementation uses an unusual ordering of octal permissions bits, you will see a difference between the actual value of
                     the file's mode and the output of %m.  Normally you will want to have a leading zero on this number, and to do this, you should use
                     the  flag (as in, for example, `%m').

              %M     File's permissions (in symbolic form, as for ls).  This directive is supported in findutils 4.2.5 and later.

              %n     Number of hard links to file.

              %p     File's name.

              %P     File's name with the name of the starting-point under which it was found removed.

              %s     File's size in bytes.

              %S     File's  sparseness.  This is calculated as (BLOCKSIZE*st_blocks / st_size).  The exact value you will get for an ordinary file of a
                     certain length is system-dependent.  However, normally sparse files will have values less than 1.0, and files  which  use  indirect
                     blocks  may  have a value which is greater than 1.0.  In general the number of blocks used by a file is file system dependent.  The
                     value used for BLOCKSIZE is system-dependent, but is usually 512 bytes.  If the file size is zero, the value printed is  undefined.
                     On systems which lack support for st_blocks, a file's sparseness is assumed to be 1.0.

              %t     File's last modification time in the format returned by the C ctime(3) function.

              %Tk    File's last modification time in the format specified by k, which is the same as for %A.

              %u     File's user name, or numeric user ID if the user has no name.

              %U     File's numeric user ID.

              %y     File's type (like in ls -l), U=unknown type (shouldn't happen)

              %Y     File's  type (like %y), plus follow symbolic links: `L'=loop, `N'=nonexistent, `?' for any other error when determining the type of
                     the target of a symbolic link.

              %Z     (SELinux only) file's security context.

              %{ %[ %(
                     Reserved for future use.

              A `%' character followed by any other character is discarded, but the other character is printed (don't rely on this,  as  further  format
              characters  may be introduced).  A `%' at the end of the format argument causes undefined behaviour since there is no following character.
              In some locales, it may hide your door keys, while in others it may remove the final page from the novel you are reading.

              The %m and %d directives support the #, 0 and + flags, but the other directives do not, even if they print  numbers.   Numeric  directives
              that  do  not support these flags include G, U, b, D, k and n.  The `-' format flag is supported and changes the alignment of a field from
              right-justified (which is the default) to left-justified.

              See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled.

       -prune True; if the file is a directory, do not descend into it.  If -depth is given, then -prune has no effect.  Because -delete implies -depth,
              you cannot usefully use -prune and -delete together.  For example, to skip the directory src/emacs and all files and directories under it,
              and print the names of the other files found, do something like this:
                  find . -path ./src/emacs -prune -o -print

       -quit  Exit immediately (with return value zero if no errors have occurred).  This is different to -prune because -prune only applies to the conâАР
              tents  of pruned directories, while -quit simply makes find stop immediately.  No child processes will be left running.  Any command lines
              which have been built by -exec ... + or -execdir ... + are invoked before the program is exited.  After -quit is executed, no  more  files
              specified on the command line will be processed.  For example, `find /tmp/foo /tmp/bar -print -quit` will print only `/tmp/foo`.
              One common use of -quit is to stop searching the file system once we have found what we want.  For example, if we want to find just a sinâАР
              gle file we can do this:
                  find / -name needle -print -quit

OPERATORS

Listed in order of decreasing precedence:

       ( expr )
              Force precedence.  Since parentheses are special to the shell, you will normally need to quote them.  Many of the examples in this  manual
              page use backslashes for this purpose: `\(...\)' instead of `(...)'.

       ! expr True if expr is false.  This character will also usually need protection from interpretation by the shell.

       -not expr
              Same as ! expr, but not POSIX compliant.

       expr1 expr2
              Two expressions in a row are taken to be joined with an implied -a; expr2 is not evaluated if expr1 is false.

       expr1 -a expr2
              Same as expr1 expr2.

       expr1 -and expr2
              Same as expr1 expr2, but not POSIX compliant.

       expr1 -o expr2
              Or; expr2 is not evaluated if expr1 is true.

       expr1 -or expr2
              Same as expr1 -o expr2, but not POSIX compliant.

       expr1 , expr2
              List; both expr1 and expr2 are always evaluated.  The value of expr1 is discarded; the value of the list is the value of expr2.  The comma
              operator can be useful for searching for several different types of thing,  but  traversing  the  filesystem  hierarchy  only  once.   The
              -fprintf action can be used to list the various matched items into several different output files.

       Please  note  that  -a when specified implicitly (for example by two tests appearing without an explicit operator between them) or explicitly has
       higher precedence than -o.  This means that find . -name afile -o -name bfile -print will never print afile.

UNUSUAL FILENAMES

       Many of the actions of find result in the printing of data which is under the control of other users.  This includes file names, sizes, modificaâАР
       tion  times  and  so  forth.  File names are a potential problem since they can contain any character except `\0' and `/'.  Unusual characters in
       file names can do unexpected and often undesirable things to your terminal (for example, changing the settings of your function keys on some terâАР
       minals).  Unusual characters are handled differently by various actions, as described below.

       -print0, -fprint0
              Always print the exact filename, unchanged, even if the output is going to a terminal.

       -ls, -fls
              Unusual  characters are always escaped.  White space, backslash, and double quote characters are printed using C-style escaping (for examâАР
              ple `\f', `\"').  Other unusual characters are printed using an octal escape.  Other printable characters (for -ls and -fls these are  the
              characters between octal 041 and 0176) are printed as-is.

       -printf, -fprintf
              If  the  output  is not going to a terminal, it is printed as-is.  Otherwise, the result depends on which directive is in use.  The direcâАР
              tives %D, %F, %g, %G, %H, %Y, and %y expand to values which are not under control of files' owners, and so are printed as-is.  The  direcâАР
              tives  %a,  %b, %c, %d, %i, %k, %m, %M, %n, %s, %t, %u and %U have values which are under the control of files' owners but which cannot be
              used to send arbitrary data to the terminal, and so these are printed as-is.  The directives %f, %h, %l, %p and %P are quoted.  This quotâАР
              ing is performed in the same way as for GNU ls.  This is not the same quoting mechanism as the one used for -ls and -fls.  If you are able
              to decide what format to use for the output of find then it is normally better to use `\0' as a terminator than to use  newline,  as  file
              names can contain white space and newline characters.  The setting of the `LC_CTYPE' environment variable is used to determine which charâАР
              acters need to be quoted.

       -print, -fprint
              Quoting is handled in the same way as for -printf and -fprintf.  If you are using find in a script or in a  situation  where  the  matched
              files might have arbitrary names, you should consider using -print0 instead of -print.

       The -ok and -okdir actions print the current filename as-is.  This may change in a future release.

STANDARDS CONFORMANCE

       For  closest  compliance  to the POSIX standard, you should set the POSIXLY_CORRECT environment variable.  The following options are specified in
       the POSIX standard (IEEE Std 1003.1-2008, 2016 Edition):

       -H     This option is supported.

       -L     This option is supported.

       -name  This option is supported, but POSIX conformance depends on the POSIX conformance of the system's fnmatch(3) library function.  As of findâАР
              utils-4.2.2,  shell metacharacters (`*', `?' or `[]' for example) match a leading `.', because IEEE PASC interpretation 126 requires this.
              This is a change from previous versions of findutils.

       -type  Supported.  POSIX specifies `b', `c', `d', `l', `p', `f' and `s'.  GNU find also supports `D', representing a Door, where the OS  provides
              these.  Furthermore, GNU find allows multiple types to be specified at once in a comma-separated list.

       -ok    Supported.   Interpretation  of the response is according to the `yes' and `no' patterns selected by setting the `LC_MESSAGES' environment
              variable.  When the `POSIXLY_CORRECT' environment variable is set, these patterns are taken system's definition of  a  positive  (yes)  or
              negative  (no)  response.  See the system's documentation for nl_langinfo(3), in particular YESEXPR and NOEXPR.  When `POSIXLY_CORRECT' is
              not set, the patterns are instead taken from find's own message catalogue.

       -newer Supported.  If the file specified is a symbolic link, it is always dereferenced.  This is a change from previous behaviour, which used  to
              take the relevant time from the symbolic link; see the HISTORY section below.

       -perm  Supported.   If  the  POSIXLY_CORRECT environment variable is not set, some mode arguments (for example +a+x) which are not valid in POSIX
              are supported for backward-compatibility.

       Other primaries
              The primaries -atime, -ctime, -depth, -exec, -group, -links, -mtime, -nogroup, -nouser, -ok, -path, -print, -prune, -size, -user and -xdev
              are all supported.

       The POSIX standard specifies parentheses `(', `)', negation `!' and the logical AND/OR operators -a and -o.

       All other options, predicates, expressions and so forth are extensions beyond the POSIX standard.  Many of these extensions are not unique to GNU
       find, however.

       The POSIX standard requires that find detects loops:

              The find utility shall detect infinite loops; that is, entering a previously visited directory that is an ancestor of the  last  file  enâАР
              countered.   When  it detects an infinite loop, find shall write a diagnostic message to standard error and shall either recover its posiâАР
              tion in the hierarchy or terminate.

       GNU find complies with these requirements.  The link count of directories which contain entries which are hard links to an ancestor will often be
       lower than they otherwise should be.  This can mean that GNU find will sometimes optimise away the visiting of a subdirectory which is actually a
       link to an ancestor.  Since find does not actually enter such a subdirectory, it is allowed to avoid emitting  a  diagnostic  message.   Although
       this  behaviour  may  be  somewhat  confusing, it is unlikely that anybody actually depends on this behaviour.  If the leaf optimisation has been
       turned off with -noleaf, the directory entry will always be examined and the diagnostic message will be issued where it is appropriate.  Symbolic
       links  cannot  be  used to create filesystem cycles as such, but if the -L option or the -follow option is in use, a diagnostic message is issued
       when find encounters a loop of symbolic links.  As with loops containing hard links, the leaf optimisation will often mean that find  knows  that
       it doesn't need to call stat() or chdir() on the symbolic link, so this diagnostic is frequently not necessary.

       The -d option is supported for compatibility with various BSD systems, but you should use the POSIX-compliant option -depth instead.

       The POSIXLY_CORRECT environment variable does not affect the behaviour of the -regex or -iregex tests because those tests aren't specified in the
       POSIX standard.

ENVIRONMENT VARIABLES

LANG Provides a default value for the internationalization variables that are unset or null.

LC_ALL If set to a non-empty string value, override the values of all the other internationalization variables.

       LC_COLLATE
              The POSIX standard specifies that this variable affects the pattern matching to be used for the -name  option.   GNU  find  uses  the  fnâАР
              match(3)  library  function, and so support for `LC_COLLATE' depends on the system library.  This variable also affects the interpretation
              of the response to -ok; while the `LC_MESSAGES' variable selects the actual pattern used to interpret the response to -ok, the interpretaâАР
              tion of any bracket expressions in the pattern will be affected by `LC_COLLATE'.

       LC_CTYPE
              This  variable  affects  the  treatment of character classes used in regular expressions and also with the -name test, if the system's fnâАР
              match(3) library function supports this.  This variable also affects the interpretation of any character classes in  the  regular  expresâАР
              sions  used  to interpret the response to the prompt issued by -ok.  The `LC_CTYPE' environment variable will also affect which characters
              are considered to be unprintable when filenames are printed; see the section UNUSUAL FILENAMES.

       LC_MESSAGES
              Determines the locale to be used for internationalised messages.  If the `POSIXLY_CORRECT' environment variable is set, this  also  deterâАР
              mines the interpretation of the response to the prompt made by the -ok action.

       NLSPATH
              Determines the location of the internationalisation message catalogues.

       PATH   Affects the directories which are searched to find the executables invoked by -exec, -execdir, -ok and -okdir.

       POSIXLY_CORRECT
              Determines  the  block  size used by -ls and -fls.  If POSIXLY_CORRECT is set, blocks are units of 512 bytes.  Otherwise they are units of
              1024 bytes.

              Setting this variable also turns off warning messages (that is, implies -nowarn) by default, because POSIX requires that  apart  from  the
              output for -ok, all messages printed on stderr are diagnostics and must result in a non-zero exit status.

              When POSIXLY_CORRECT is not set, -perm +zzz is treated just like -perm /zzz if +zzz is not a valid symbolic mode.  When POSIXLY_CORRECT is
              set, such constructs are treated as an error.

              When POSIXLY_CORRECT is set, the response to the prompt made by the -ok action is interpreted according to the system's message catalogue,
              as opposed to according to find's own message translations.

       TZ     Affects the time zone used for some of the time-related format directives of -printf and -fprintf.

EXAMPLES

Simple `find|xargs` approach

âА¢ Find files named core in or below the directory /tmp and delete them.

$ find /tmp -name core -type f -print | xargs /bin/rm -f

Note that this will work incorrectly if there are any filenames containing newlines, single or double quotes, or spaces.

Safer `find -print0 | xargs -0` approach

       âА¢      Find files named core in or below the directory /tmp and delete them, processing filenames in such a way that file or directory names conâАР
              taining single or double quotes, spaces or newlines are correctly handled.

                  $ find /tmp -name core -type f -print0 | xargs -0 /bin/rm -f

              The -name test comes before the -type test in order to avoid having to call stat(2) on every file.

       Note that there is still a race between the time find traverses the hierarchy printing the matching filenames, and the time the process  executed
       by xargs works with that file.

Executing a command for each file

âА¢ Run file on every file in or below the current directory.

$ find . -type f -exec file ‘{}’ \;

              Notice  that the braces are enclosed in single quote marks to protect them from interpretation as shell script punctuation.  The semicolon
              is similarly protected by the use of a backslash, though single quotes could have been used in that case also.

       In many cases, one might prefer the `-exec ... +` or better the `-execdir ... +` syntax for performance and security reasons.

Traversing the filesystem just once – for 2 different actions

âА¢ Traverse the filesystem just once, listing set-user-ID files and directories into /root/suid.txt and large files into /root/big.txt.

                  $ find / \
                      \( -perm -4000 -fprintf /root/suid.txt '%#m %u %p\n' \) , \
                      \( -size +100M -fprintf /root/big.txt '%-10s %p\n' \)

              This example uses the line-continuation character '\' on the first two lines to instruct the shell to continue reading the command on  the
              next line.

Searching files by age

âА¢ Search for files in your home directory which have been modified in the last twenty-four hours.

$ find $HOME -mtime 0

              This  command  works  this  way  because the time since each file was last modified is divided by 24 hours and any remainder is discarded.
              That means that to match -mtime 0, a file will have to have a modification in the past which is less than 24 hours ago.

Searching files by permissions

âА¢ Search for files which are executable but not readable.

$ find /sbin /usr/sbin -executable \! -readable -print

âА¢ Search for files which have read and write permission for their owner, and group, but which other users can read but not write to.

$ find . -perm 664

Files which meet these criteria but have other permissions bits set (for example if someone can execute the file) will not be matched.

       âА¢      Search for files which have read and write permission for their owner and group, and which other users can read,  without  regard  to  the
              presence of any extra permission bits (for example the executable bit).

                  $ find . -perm -664

              This will match a file which has mode 0777, for example.

       âА¢      Search for files which are writable by somebody (their owner, or their group, or anybody else).

                  $ find . -perm /222

       âА¢      Search for files which are writable by either their owner or their group.

                  $ find . -perm /220
                  $ find . -perm /u+w,g+w
                  $ find . -perm /u=w,g=w

              All three of these commands do the same thing, but the first one uses the octal representation of the file mode, and the other two use the
              symbolic form.  The files don't have to be writable by both the owner and group to be matched; either will do.

       âА¢      Search for files which are writable by both their owner and their group.

                  $ find . -perm -220
                  $ find . -perm -g+w,u+w

              Both these commands do the same thing.

       âА¢      A more elaborate search on permissions.

                  $ find . -perm -444 -perm /222 \! -perm /111
                  $ find . -perm -a+r -perm /a+w \! -perm /a+x

              These two commands both search for files that are readable for everybody (-perm -444 or -perm -a+r), have  at  least  one  write  bit  set
              (-perm /222 or -perm /a+w) but are not executable for anybody (! -perm /111 or ! -perm /a+x respectively).

Pruning – omitting files and subdirectories

       âА¢      Copy the contents of /source-dir to /dest-dir, but omit files and directories named .snapshot (and anything in them).  It also omits files
              or directories whose name ends in '~', but not their contents.

                  $ cd /source-dir
                  $ find . -name .snapshot -prune -o \( \! -name '*~' -print0 \) \
                      | cpio -pmd0 /dest-dir

              The construct -prune -o \( ... -print0 \) is quite common.  The idea here is that the expression before -prune matches things which are to
              be  pruned.   However,  the  -prune action itself returns true, so the following -o ensures that the right hand side is evaluated only for
              those directories which didn't get pruned (the contents of the pruned directories are not even visited, so their contents are irrelevant).
              The  expression  on  the  right hand side of the -o is in parentheses only for clarity.  It emphasises that the -print0 action takes place
              only for things that didn't have -prune applied to them.  Because the default `and' condition between tests binds more  tightly  than  -o,
              this is the default anyway, but the parentheses help to show what is going on.

       âА¢      Given  the  following  directory  of  projects  and  their  associated SCM administrative directories, perform an efficient search for the
              projects' roots:

                  $ find repo/ \
                      \( -exec test -d '{}/.svn' \; \
                      -or -exec test -d '{}/.git' \; \
                      -or -exec test -d '{}/CVS' \; \
                      \) -print -prune

              Sample output:

                  repo/project1/CVS
                  repo/gnu/project2/.svn
                  repo/gnu/project3/.svn
                  repo/gnu/project3/src/.svn
                  repo/project4/.git

              In this example, -prune prevents unnecessary descent into directories that have already been discovered (for  example  we  do  not  search
              project3/src because we already found project3/.svn), but ensures sibling directories (project2 and project3) are found.

Other useful examples

âА¢ Search for several file types.

$ find /tmp -type f,d,l

              Search  for  files,  directories,  and symbolic links in the directory /tmp passing these types as a comma-separated list (GNU extension),
              which is otherwise equivalent to the longer, yet more portable:

                  $ find /tmp \( -type f -o -type d -o -type l \)

       âА¢      Search for files with the particular name needle and stop immediately when we find the first one.

                  $ find / -name needle -print -quit

       âА¢      Demonstrate the interpretation of the %f and %h format directives of the -printf action for some corner-cases.  Here is an example includâАР
              ing some output.

                  $ find . .. / /tmp /tmp/TRACE compile compile/64/tests/find -maxdepth 0 -printf '[%h][%f]\n'
                  [.][.]
                  [.][..]
                  [][/]
                  [][tmp]
                  [/tmp][TRACE]
                  [.][compile]
                  [compile/64/tests][find]

EXIT STATUS

       find exits with status 0 if all files are processed successfully, greater than 0 if errors occur.  This is deliberately a very broad description,
       but if the return value is non-zero, you should not rely on the correctness of the results of find.

       When some error occurs, find may stop immediately, without completing all the actions specified.  For example, some starting points may not  have
       been examined or some pending program invocations for -exec ... {} + or -execdir ... {} + may not have been performed.

HISTORY

       As  of findutils-4.2.2, shell metacharacters (`*', `?' or `[]' for example) used in filename patterns match a leading `.', because IEEE POSIX inâАР
       terpretation 126 requires this.

       As of findutils-4.3.3, -perm /000 now matches all files instead of none.

       Nanosecond-resolution timestamps were implemented in findutils-4.3.3.

       As of findutils-4.3.11, the -delete action sets find's exit status to a nonzero value when it fails.  However, find will  not  exit  immediately.
       Previously, find's exit status was unaffected by the failure of -delete.

       Feature                Added in   Also occurs in
       -newerXY               4.3.3      BSD
       -D                     4.3.1
       -O                     4.3.1
       -readable              4.3.0
       -writable              4.3.0
       -executable            4.3.0
       -regextype             4.2.24
       -exec ... +            4.2.12     POSIX
       -execdir               4.2.12     BSD
       -okdir                 4.2.12
       -samefile              4.2.11
       -H                     4.2.5      POSIX
       -L                     4.2.5      POSIX
       -P                     4.2.5      BSD
       -delete                4.2.3
       -quit                  4.2.3
       -d                     4.2.3      BSD
       -wholename             4.2.0
       -iwholename            4.2.0
       -ignore_readdir_race   4.2.0
       -fls                   4.0
       -ilname                3.8
       -iname                 3.8
       -ipath                 3.8
       -iregex                3.8

       The  syntax  -perm  +MODE was removed in findutils-4.5.12, in favour of -perm /MODE.  The +MODE syntax had been deprecated since findutils-4.2.21
       which was released in 2005.

NON-BUGS

Operator precedence surprises

       The command find . -name afile -o -name bfile -print will never print afile because this is actually equivalent to find . -name afile -o \( -name
       bfile  -a  -print  \).  Remember that the precedence of -a is higher than that of -o and when there is no operator specified between tests, -a is
       assumed.

âАЬpaths must precede expressionâАЭ error message

       $ find . -name *.c -print
       find: paths must precede expression
       find: possible unquoted pattern after predicate `-name'?

       This happens when the shell could expand the pattern .c to more than one file name existing in the current directory, and passing the  resulting
       file names in the command line to find like this:
       find . -name frcode.c locate.c word_io.c -print
       That  command  is  of course not going to work, because the -name predicate allows exactly only one pattern as argument.  Instead of doing things
       this way, you should enclose the pattern in quotes or escape the wildcard, thus allowing find to use the pattern with  the  wildcard  during  the
       search for file name matching instead of file names expanded by the parent shell:
       $ find . -name '.c' -print
       $ find . -name \*.c -print

BUGS

       There  are security problems inherent in the behaviour that the POSIX standard specifies for find, which therefore cannot be fixed.  For example,
       the -exec action is inherently insecure, and -execdir should be used instead.

       The environment variable LC_COLLATE has no effect on the -ok action.

REPORTING BUGS

       GNU findutils online help: <https://www.gnu.org/software/findutils/#get-help>
       Report any translation bugs to <https://translationproject.org/team/>

       Report any other issue via the form at the GNU Savannah bug tracker:
              <https://savannah.gnu.org/bugs/?group=findutils>
       General topics about the GNU findutils package are discussed at the bug-findutils mailing list:
              <https://lists.gnu.org/mailman/listinfo/bug-findutils>

COPYRIGHT

       Copyright © 1990-2021 Free Software Foundation, Inc.  License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>.
       This is free software: you are free to change and redistribute it.  There is NO WARRANTY, to the extent permitted by law.

SEE ALSO

chmod(1), locate(1), ls(1), updatedb(1), xargs(1), lstat(2), stat(2), ctime(3) fnmatch(3), printf(3), strftime(3), locatedb(5), regex(7)

       Full documentation <https://www.gnu.org/software/findutils/find>
       or available locally via: info find

                                                                                                                                                 FIND(1)
Categories
Linux manpage

manpage ifconfig

IFCONFIG(8) Linux System Administrator’s Manual IFCONFIG(8)

NAME

ifconfig – configure a network interface

SYNOPSIS

       ifconfig [-v] [-a] [-s] [interface]
       ifconfig [-v] interface [aftype] options | address ...

DESCRIPTION

       Ifconfig is used to configure the kernel-resident network interfaces.  It is used at boot time to set up interfaces as necessary.  After that, it
       is usually only needed when debugging or when system tuning is needed.

       If no arguments are given, ifconfig displays the status of the currently active interfaces.  If a single interface argument is given, it displays
       the  status  of  the  given interface only; if a single -a argument is given, it displays the status of all interfaces, even those that are down.
       Otherwise, it configures an interface.

Address Families

       If the first argument after the interface name is recognized as the name of a supported address family, that address family is used for  decoding
       and  displaying all protocol addresses.  Currently supported address families include inet (TCP/IP, default), inet6 (IPv6), ax25 (AMPR Packet RaâАР
       dio), ddp (Appletalk Phase 2), ipx (Novell IPX) and netrom (AMPR Packet radio).  All numbers supplied as parts in IPv4  dotted  decimal  notation
       may  be decimal, octal, or hexadecimal, as specified in the ISO C standard (that is, a leading 0x or 0X implies hexadecimal; otherwise, a leading
       '0' implies octal; otherwise, the number is interpreted as decimal). Use of hexadecimal and octal numbers is not RFC-compliant and therefore  its
       use is discouraged.

OPTIONS

-a display all interfaces which are currently available, even if down

-s display a short list (like netstat -i)

-v be more verbose for some error conditions

       interface
              The name of the interface.  This is usually a driver name followed by a unit number, for example eth0 for the first Ethernet interface. If
              your kernel supports alias interfaces, you can specify them with syntax like eth0:0 for the first alias of eth0. You can use them  to  asâАР
              sign  more  addresses.  To  delete an alias interface use ifconfig eth0:0 down.  Note: for every scope (i.e. same net with address/netmask
              combination) all aliases are deleted, if you delete the first (primary).

       up     This flag causes the interface to be activated.  It is implicitly specified if an address is assigned to the interface; you  can  suppress
              this  behavior  when  using  an alias interface by appending an - to the alias (e.g.  eth0:0-).  It is also suppressed when using the IPv4
              0.0.0.0 address as the kernel will use this to implicitly delete alias interfaces.

       down   This flag causes the driver for this interface to be shut down.

       [-]arp Enable or disable the use of the ARP protocol on this interface.

       [-]promisc
              Enable or disable the promiscuous mode of the interface.  If selected, all packets on the network will be received by the interface.

       [-]allmulti
              Enable or disable all-multicast mode.  If selected, all multicast packets on the network will be received by the interface.

       mtu N  This parameter sets the Maximum Transfer Unit (MTU) of an interface.

       dstaddr addr
              Set the remote IP address for a point-to-point link (such as PPP).  This keyword is now obsolete; use the pointopoint keyword instead.

       netmask addr
              Set the IP network mask for this interface.  This value defaults to the usual class A, B or C network mask (as derived from the  interface
              IP address), but it can be set to any value.

       add addr/prefixlen
              Add an IPv6 address to an interface.

       del addr/prefixlen
              Remove an IPv6 address from an interface.

       tunnel ::aa.bb.cc.dd
              Create a new SIT (IPv6-in-IPv4) device, tunnelling to the given destination.

       irq addr
              Set the interrupt line used by this device.  Not all devices can dynamically change their IRQ setting.

       io_addr addr
              Set the start address in I/O space for this device.

       mem_start addr
              Set the start address for shared memory used by this device.  Only a few devices need this.

       media type
              Set  the  physical port or medium type to be used by the device.  Not all devices can change this setting, and those that can vary in what
              values they support.  Typical values for type are 10base2 (thin Ethernet), 10baseT (twisted-pair 10Mbps Ethernet),  AUI  (external  transâАР
              ceiver) and so on.  The special medium type of auto can be used to tell the driver to auto-sense the media.  Again, not all drivers can do
              this.

       [-]broadcast [addr]
              If the address argument is given, set the protocol broadcast address for this interface.  Otherwise, set (or clear) the IFF_BROADCAST flag
              for the interface.

       [-]pointopoint [addr]
              This  keyword enables the point-to-point mode of an interface, meaning that it is a direct link between two machines with nobody else lisâАР
              tening on it.
              If the address argument is also given, set the protocol address of the other side of the link, just  like  the  obsolete  dstaddr  keyword
              does.  Otherwise, set or clear the IFF_POINTOPOINT flag for the interface.

       hw class address
              Set the hardware address of this interface, if the device driver supports this operation.  The keyword must be followed by the name of the
              hardware class and the printable ASCII equivalent of the hardware address.  Hardware classes currently supported include ether (Ethernet),
              ax25 (AMPR AX.25), ARCnet and netrom (AMPR NET/ROM).

       multicast
              Set the multicast flag on the interface. This should not normally be needed as the drivers set the flag correctly themselves.

       address
              The IP address to be assigned to this interface.

       txqueuelen length
              Set the length of the transmit queue of the device. It is useful to set this to small values for slower devices with a high latency (modem
              links, ISDN) to prevent fast bulk transfers from disturbing interactive traffic like telnet too much.

NOTES

       Since kernel release 2.2 there are no explicit interface statistics for alias interfaces anymore. The statistics printed for the original address
       are  shared  with all alias addresses on the same device. If you want per-address statistics you should add explicit accounting rules for the adâАР
       dress using the iptables(8) command.

       Since net-tools 1.60-4 ifconfig is printing byte counters and human readable counters with IEC 60027-2 units. So 1 KiB are 2^10 byte.  Note,  the
       numbers are truncated to one decimal (which can by quite a large error if you consider 0.1 PiB is 112.589.990.684.262 bytes :)

       Interrupt  problems  with Ethernet device drivers fail with EAGAIN (SIOCSIIFLAGS: Resource temporarily unavailable) it is most likely a interrupt
       conflict. See http://www.scyld.com/expert/irq-conflict.html for more information.

FILES

       /proc/net/dev
       /proc/net/if_inet6

BUGS

       Ifconfig uses the ioctl access method to get the full address information, which limits hardware addresses to 8 bytes.  Because Infiniband  hardâАР
       ware  address  has  20  bytes,  only the first 8 bytes are displayed correctly.  Please use ip link command from iproute2 package to display link
       layer informations including the hardware address.

       While appletalk DDP and IPX addresses will be displayed they cannot be altered by this command.

SEE ALSO

       route(8), netstat(8), arp(8), rarp(8), iptables(8), ifup(8), interfaces(5).
       http://physics.nist.gov/cuu/Units/binary.html - Prefixes for binary multiples

AUTHORS

       Fred N. van Kempen, <waltje@uwalt.nl.mugnet.org>
       Alan Cox, <Alan.Cox@linux.org>
       Phil Blundell, <Philip.Blundell@pobox.com>
       Andi Kleen
       Bernd Eckenfels, <net-tools@lina.inka.de>

net-tools                                                              2008-10-03                                                            IFCONFIG(8)