Deleted Added
full compact
cut.1 (131227) cut.1 (131754)
1.\" Copyright (c) 1989, 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" the Institute of Electrical and Electronics Engineers, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions
9.\" are met:
10.\" 1. Redistributions of source code must retain the above copyright
11.\" notice, this list of conditions and the following disclaimer.
12.\" 2. Redistributions in binary form must reproduce the above copyright
13.\" notice, this list of conditions and the following disclaimer in the
14.\" documentation and/or other materials provided with the distribution.
15.\" 3. All advertising materials mentioning features or use of this software
16.\" must display the following acknowledgement:
17.\" This product includes software developed by the University of
18.\" California, Berkeley and its contributors.
19.\" 4. Neither the name of the University nor the names of its contributors
20.\" may be used to endorse or promote products derived from this software
21.\" without specific prior written permission.
22.\"
23.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" @(#)cut.1 8.1 (Berkeley) 6/6/93
1.\" Copyright (c) 1989, 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" the Institute of Electrical and Electronics Engineers, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions
9.\" are met:
10.\" 1. Redistributions of source code must retain the above copyright
11.\" notice, this list of conditions and the following disclaimer.
12.\" 2. Redistributions in binary form must reproduce the above copyright
13.\" notice, this list of conditions and the following disclaimer in the
14.\" documentation and/or other materials provided with the distribution.
15.\" 3. All advertising materials mentioning features or use of this software
16.\" must display the following acknowledgement:
17.\" This product includes software developed by the University of
18.\" California, Berkeley and its contributors.
19.\" 4. Neither the name of the University nor the names of its contributors
20.\" may be used to endorse or promote products derived from this software
21.\" without specific prior written permission.
22.\"
23.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" @(#)cut.1 8.1 (Berkeley) 6/6/93
36.\" $FreeBSD: head/usr.bin/cut/cut.1 131227 2004-06-28 06:20:28Z tjr $
36.\" $FreeBSD: head/usr.bin/cut/cut.1 131754 2004-07-07 19:57:16Z ru $
37.\"
38.Dd June 28, 2004
39.Dt CUT 1
40.Os
41.Sh NAME
42.Nm cut
43.Nd select portions of each line of a file
44.Sh SYNOPSIS
45.Nm
46.Fl b Ar list
47.Op Fl n
48.Op Ar
49.Nm
50.Fl c Ar list
51.Op Ar
52.Nm
53.Fl f Ar list
54.Op Fl d Ar delim
55.Op Fl s
56.Op Ar
57.Sh DESCRIPTION
58The
59.Nm
60utility selects portions of each line (as specified by
37.\"
38.Dd June 28, 2004
39.Dt CUT 1
40.Os
41.Sh NAME
42.Nm cut
43.Nd select portions of each line of a file
44.Sh SYNOPSIS
45.Nm
46.Fl b Ar list
47.Op Fl n
48.Op Ar
49.Nm
50.Fl c Ar list
51.Op Ar
52.Nm
53.Fl f Ar list
54.Op Fl d Ar delim
55.Op Fl s
56.Op Ar
57.Sh DESCRIPTION
58The
59.Nm
60utility selects portions of each line (as specified by
61.Ar list )
61.Ar list )
62from each
63.Ar file
64and writes them to the standard output.
65If no
66.Ar file
67arguments are specified, or a file argument is a single dash
68.Pq Sq Fl ,
69.Nm
70reads from the standard input.
71The items specified by
72.Ar list
73can be in terms of column position or in terms of fields delimited
74by a special character.
75Column numbering starts from 1.
76.Pp
77The
78.Ar list
79option argument
80is a comma or whitespace separated set of increasing numbers and/or
81number ranges.
82Number ranges consist of a number, a dash
83.Pq Sq \- ,
84and a second number
85and select the fields or columns from the first number to the second,
86inclusive.
87Numbers or number ranges may be preceded by a dash, which selects all
88fields or columns from 1 to the first number.
89Numbers or number ranges may be followed by a dash, which selects all
90fields or columns from the last number to the end of the line.
91Numbers and number ranges may be repeated, overlapping, and in any order.
92It is not an error to select fields or columns not present in the
93input line.
94.Pp
95The options are as follows:
96.Bl -tag -width indent
97.It Fl b Ar list
98The
99.Ar list
100specifies byte positions.
101.It Fl c Ar list
102The
103.Ar list
104specifies character positions.
105.It Fl d Ar delim
106Use
107.Ar delim
108as the field delimiter character instead of the tab character.
109.It Fl f Ar list
110The
111.Ar list
112specifies fields, separated in the input by the field delimiter character
113(see the
114.Fl d
115option.)
116Output fields are separated by a single occurrence of the field delimiter
117character.
118.It Fl n
119Do not split multi-byte characters.
120Characters will only be output if at least one byte is selected, and,
121after a prefix of zero or more unselected bytes, the rest of the bytes
122that form the character are selected.
123.It Fl s
124Suppress lines with no field delimiter characters.
125Unless specified, lines with no delimiters are passed through unmodified.
126.El
127.Sh ENVIRONMENT
128The
129.Ev LANG , LC_ALL
130and
131.Ev LC_CTYPE
132environment variables affect the execution of the
133.Nm
134utility.
135Their effect is described in
136.Xr environ 7 .
137.Sh EXAMPLES
138Extract users' login names and shells from the system
139.Xr passwd 5
140file as
141.Dq name:shell
142pairs:
143.Pp
144.Dl "cut -d : -f 1,7 /etc/passwd"
145.Pp
146Show the names and login times of the currently logged in users:
147.Pp
148.Dl "who | cut -c 1-16,26-38"
149.Sh DIAGNOSTICS
150.Ex -std
151.Sh SEE ALSO
152.Xr colrm 1 ,
153.Xr paste 1
154.Sh STANDARDS
155The
156.Nm
157utility conforms to
158.St -p1003.2-92 .
159.Sh HISTORY
160A
161.Nm
162command appeared in
163.Tn AT&T
164System III
165.Ux .
62from each
63.Ar file
64and writes them to the standard output.
65If no
66.Ar file
67arguments are specified, or a file argument is a single dash
68.Pq Sq Fl ,
69.Nm
70reads from the standard input.
71The items specified by
72.Ar list
73can be in terms of column position or in terms of fields delimited
74by a special character.
75Column numbering starts from 1.
76.Pp
77The
78.Ar list
79option argument
80is a comma or whitespace separated set of increasing numbers and/or
81number ranges.
82Number ranges consist of a number, a dash
83.Pq Sq \- ,
84and a second number
85and select the fields or columns from the first number to the second,
86inclusive.
87Numbers or number ranges may be preceded by a dash, which selects all
88fields or columns from 1 to the first number.
89Numbers or number ranges may be followed by a dash, which selects all
90fields or columns from the last number to the end of the line.
91Numbers and number ranges may be repeated, overlapping, and in any order.
92It is not an error to select fields or columns not present in the
93input line.
94.Pp
95The options are as follows:
96.Bl -tag -width indent
97.It Fl b Ar list
98The
99.Ar list
100specifies byte positions.
101.It Fl c Ar list
102The
103.Ar list
104specifies character positions.
105.It Fl d Ar delim
106Use
107.Ar delim
108as the field delimiter character instead of the tab character.
109.It Fl f Ar list
110The
111.Ar list
112specifies fields, separated in the input by the field delimiter character
113(see the
114.Fl d
115option.)
116Output fields are separated by a single occurrence of the field delimiter
117character.
118.It Fl n
119Do not split multi-byte characters.
120Characters will only be output if at least one byte is selected, and,
121after a prefix of zero or more unselected bytes, the rest of the bytes
122that form the character are selected.
123.It Fl s
124Suppress lines with no field delimiter characters.
125Unless specified, lines with no delimiters are passed through unmodified.
126.El
127.Sh ENVIRONMENT
128The
129.Ev LANG , LC_ALL
130and
131.Ev LC_CTYPE
132environment variables affect the execution of the
133.Nm
134utility.
135Their effect is described in
136.Xr environ 7 .
137.Sh EXAMPLES
138Extract users' login names and shells from the system
139.Xr passwd 5
140file as
141.Dq name:shell
142pairs:
143.Pp
144.Dl "cut -d : -f 1,7 /etc/passwd"
145.Pp
146Show the names and login times of the currently logged in users:
147.Pp
148.Dl "who | cut -c 1-16,26-38"
149.Sh DIAGNOSTICS
150.Ex -std
151.Sh SEE ALSO
152.Xr colrm 1 ,
153.Xr paste 1
154.Sh STANDARDS
155The
156.Nm
157utility conforms to
158.St -p1003.2-92 .
159.Sh HISTORY
160A
161.Nm
162command appeared in
163.Tn AT&T
164System III
165.Ux .