1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
|
.ig \"-*- nroff -*-
Copyright (C) 1989-1999 Free Software Foundation, Inc.
Permission is granted to make and distribute verbatim copies of
this manual provided the copyright notice and this permission notice
are preserved on all copies.
Permission is granted to copy and distribute modified versions of this
manual under the conditions for verbatim copying, provided that the
entire resulting derived work is distributed under the terms of a
permission notice identical to this one.
Permission is granted to copy and distribute translations of this
manual into another language, under the above conditions for modified
versions, except that this permission notice may be included in
translations approved by the Free Software Foundation instead of in
the original English.
..
.TH GROFF_MSAFER @MAN7EXT@ "@MDATE@" "Groff Version @VERSION@"
.SH NAME
groff_msafer \- groff -msafer macros
.SH SYNOPSIS
.B groff
.B \-msafer
[
.IR options .\|.\|.
]
[
.IR files .\|.\|.
]
.SH DESCRIPTION
The -msafer macros remove the
.BR open ,
.BR opena ,
.BR pso ,
.BR sy ,
and
.B pi
requests.
These macros should be used when processing input from
an untrustworthy source.
For maximum safety,
they should be the first -m option on the command-line.
Normally they are invoked using the
.B \-S
option of groff, which will also pass
.B @g@pic
the
.B \-S
flag.
This is now the default; to get the old behaviour, use the
.B \-U
flag.
.SH FILES
.B @MACRODIR@/tmac.safer
.SH "SEE ALSO"
.BR groff (@MAN1EXT@),
.BR @g@troff (@MAN1EXT@),
.BR @g@pic (@MAN1EXT@)
|