CONS(3)                                                   CONS(3)

     NAME
          cons - console, clocks, process/process group ids, user,
          null, klog, stats, lights, noise, sysstat, hz, swap, crypt,
          chal, key

     SYNOPSIS
          bind #c /dev

          /dev/chal
          /dev/clock
          /dev/cons
          /dev/consctl
          /dev/cputime
          /dev/crypt
          /dev/hz
          /dev/key
          /dev/klog
          /dev/lights
          /dev/msec
          /dev/noise
          /dev/null
          /dev/pgrpid
          /dev/pid
          /dev/ppid
          /dev/swap
          /dev/sysname
          /dev/sysstat
          /dev/time
          /dev/user

     DESCRIPTION
          The console device serves a one-level directory giving
          access to the console and miscellaneous information.

          Reading the cons file returns characters typed on the key-
          board.  Normally, characters are buffered to enable erase
          and kill processing.  A control-U, `^U', typed at the key-
          board kills the current input line (removes all characters
          from the buffer of characters not yet read via cons), and a
          backspace erases the previous non-kill, non-erase character
          from the input buffer.  Killing and erasing only delete
          characters back to, but not including, the last newline.
          Characters typed at the keyboard actually produce 16-bit
          runes (see utf(6)), but the runes are translated into the
          variable-length UTF encoding (see utf(6)) before putting
          them into the buffer.  A read(2) of length greater than zero
          causes the process to wait until a newline or a `^D' ends
          the buffer, and then returns as much of the buffer as the
          argument to read allows, but only up to one complete line.
          A terminating `^D' is not put into the buffer.  If part of

     Page 1                       Plan 9            (printed 12/22/24)

     CONS(3)                                                   CONS(3)

          the line remains, the next read will return characters from
          that remainder and not part of any new line that has been
          typed since.

          If the string rawon has been written to the consctl file and
          the file is still open, cons is in raw mode: characters are
          not echoed as they are typed, backspace and `^D' are not
          treated specially, and characters are available to read as
          soon as they are typed.  Ordinary mode is reentered when
          rawoff is written to consctl or this file is closed.

          A write (see read(2)) to cons causes the characters to be
          printed on the console screen.

          The null file throws away anything written to it and always
          returns zero bytes when read.

          The klog file contains the tail of messages written by ker-
          nel logging statements.

          Writing a number (as plain text) to the lights device
          directs any lights that are available to turn on and off.
          The bits of the number are mapped to the lights in a
          processor-dependent way.

          Writing two blank- or tab- separated numbers to the noise
          device causes the machine to make a tone, if possible.  The
          first number is the frequency, in Hertz, and the second is
          the duration, in milliseconds.

          The crypt file performs DES encryption. To encrypt data,
          first a character `E' (0x45) is written to the file, and
          then the data, which must be at least 8 bytes long.  Data
          longer that 127 bytes is truncated.  Data is encrypted with
          the same algorithm used in encrypt(2). The encrypted data
          can then be read from the file.  A similar procedure is used
          to decrypt data, except an ASCII `D' (0x44) is written to
          the file before the data.

          The key file is used to set the DES key used for encryption;
          the key is shared within a process group (see auth(6)).

          The chal file is used for authenticated setting of the user
          name.  When read, it returns an encrypted challenge string
          to be used for authenticating the user's identity.  When
          written with the appropriate string, the user name and
          encryption key are set.  The format of the strings is docu-
          mented in auth(6).

          The rest of the files contain (mostly) read-only strings.
          Each string has a fixed length: a read(2) of more than that
          gives a result of that fixed length (the result does not

     Page 2                       Plan 9            (printed 12/22/24)

     CONS(3)                                                   CONS(3)

          include a terminating zero byte); a read of less than that
          length leaves the file offset so the rest of the string (but
          no more) will be read the next time.  To reread the file
          without closing it, seek must be used to reset the offset.
          When the file contains numeric data, each number is format-
          ted in decimal as an 11-digit number with leading blanks and
          one trailing blank: twelve bytes total.

          The user file contains the name of the user associated with
          the current process.

          The cputime file holds 6 numbers, containing the time in
          milliseconds that the current process has spent in user
          mode, system calls, real elapsed time, and then the time
          spent, by exited children and their descendants, in user
          mode, system calls, and real elapsed time.

          The clock file holds two numbers: the number of clock ticks
          since booting followed by the number of clock ticks in a
          second.

          The sysname file holds the textual name of the machine, e.g.
          kremvax, if known.

          The sysstat file holds 8 numbers: processor number, context
          switches, interrupts, system calls, page faults, tlb faults,
          tlb purges, and load average.  If the machine is a multipro-
          cessor, sysstat holds one line per processor.  Writing any-
          thing to sysstat resets all of the counts on all processors.

          The swap device holds a string of the form

               m1/m2 memory s1/s2 swap

          These give, for each of internal memory and the swapping
          area, the number of pages used and the total available.
          These numbers are not blank padded.  To turn on swapping,
          write to swap the textual file descriptor number of a file
          or device on which to swap.  See swap(8).

          The other files served by the cons device are all single
          numbers:

          hz        frequency of the system clock

          msec      number of milliseconds since booting

          pgrpid    process group number

          pid       process number

          ppid      parent's process number

     Page 3                       Plan 9            (printed 12/22/24)

     CONS(3)                                                   CONS(3)

          time      number of seconds since the epoch 00:00:00 GMT,
                    Jan. 1, 1970.  (Can be written once, to set at
                    boot time.)

     SEE ALSO
          bit(3), keyboard(6), auth(6), utf(6)

     BUGS
          For debugging, two control-T's followed by a letter generate
          console output: `^T^Tp' prints data about processes, `^T^Tq'
          prints data about streams, `^T^Tm' prints data about the
          mount device, `^T^Tb' prints data about the bitblt device,
          and `^T^Tx' prints date about kernel memory allocation.

          The system can be rebooted by typing `^T^Tr.'

     Page 4                       Plan 9            (printed 12/22/24)