CONS(3) CONS(3)
NAME
cons - console device
SYNOPSIS
bind #c /dev
/dev/cons
/dev/consctl
/dev/drivers
/dev/jit
/dev/keyboard
/dev/klog
/dev/kprint
/dev/memory
/dev/msec
/dev/null
/dev/notquiterandom
/dev/pointer
/dev/random
/dev/scancode
/dev/sysctl
/dev/sysname
/dev/time
/dev/user
DESCRIPTION
The console device serves a one-level directory giving
access to the console and miscellaneous information.
Reading the cons file returns characters typed on the key-
board. Normally, characters are buffered to enable erase
and kill processing. A control-U, `^U', typed at the key-
board kills the current input line (removes all characters
from the buffer of characters not yet read via cons), and a
backspace erases the previous non-kill, non-erase character
from the input buffer. Killing and erasing only delete
characters back to, but not including, the last newline.
Typed keystrokes produce 21-bit runes that are translated
into the variable-length UTF encoding (see utf(6)) before
putting them into the buffer. A read of length greater than
zero causes the process to wait until a newline or a `^D'
ends the buffer, and then returns as much of the buffer as
the argument to read allows, but only up to one complete
line. A terminating `^D' is not put into the buffer. If
part of the line remains, the next read will return bytes
from that remainder and not part of any new line that has
been typed since. A single line containing a `^D' can be
used as an end of file indication to programs that take
interactive input.
Page 1 Plan 9 (printed 10/25/25)
CONS(3) CONS(3)
If the string rawon has been written to the consctl file and
the file is still open, cons is in raw mode: characters are
not echoed as they are typed, backspace, `^U' and `^D' are
not treated specially, and characters are available to read
as soon as they are typed. Ordinary mode is reentered when
rawoff is written to consctl or this file is closed.
A write to cons causes the characters to be printed on the
console screen.
The keyboard file returns the underlying tokens produced by
the keyboard hardware as they are produced; in the emulation
environment, it is like an always-raw cons file.
The null file throws away anything written to it and always
returns zero bytes when read.
The klog file returns the tail of messages written by the
native kernel debugging function kprint (mainly used when
debugging interrupt handlers in device drivers). It is
available only in native kernel implementations.
The kprint file returns console output: messages written by
kernel print statements and messages written by processes to
this driver's cons file. Until kprint is opened, system
console output is handled normally. Once kprint has been
opened, if the machine's console is a serial line, the data
is sent both to the serial console and to kprint; if the
console is a graphics screen, the data is sent only to
kprint.
A read of the pointer file returns the status of the mouse
or other pointing device: its position and button state.
The read blocks until the state has changed since the last
read. The read returns 49 bytes: the letter m followed by
four fields containing decimal integers, each 11 characters
wide followed by a blank. The integers are: x and y, coor-
dinates of the pointer on the screen; a bit mask with the 1,
2, and 4 bits when the pointer's left, middle, and right
buttons, respectively, are down; and a time stamp in units
of milliseconds.
Writing to the pointer file, using the same format, causes
the pointer to move to the specified x, y position (the but-
ton and millisecond fields are ignored, and optional). If
there is a visible image representing the pointer's posi-
tion, that will move too.
The random device returns as many bytes of random data as
are requested in the read.
The notquiterandom device returns as many bytes of pseudo-
Page 2 Plan 9 (printed 10/25/25)
CONS(3) CONS(3)
random data as are requested in the read; this is typically
faster than random but the results are more predictable.
The scancode device provides access to the raw scan codes of
the primary keyboard . While it is open, key strokes are
diverted from cons and keyboard . The first read(2) after
opening returns an identifier string which defines the for-
mat of data delivered by subsequent reads. Known ones are
defined in scancode(6). The most common format is a single
byte per scan code, where the top bit is 1 for up and 0 for
down, and the bottom 7 bits are the scan code. Some input
devices have a larger scan code space; in this case scan
codes are often delivered as two byte little endian quanti-
ties, where the top bit is the up/down signifier, and the
bottom 15 bits are the scan code. In all cases the meaning
of the individual scan codes is device specific.
The rest of the files contain (mostly) read-only strings.
Each string has a fixed length: a read (see sys-read(2)) of
more than that gives a result of that fixed length (the
result does not include a terminating zero byte); a read of
less than that length leaves the file offset so the rest of
the string (but no more) will be read the next time. To
reread the file without closing it, seek must be used to
reset the offset. When the file contains numeric data, each
number is formatted in decimal as an 11-digit number with
leading blanks and one trailing blank: twelve bytes total.
The sysctl file can be read to return the current Inferno
version. Writing the string reboot to it attempts to reboot
the system, writing halt attempts to halt the system. Writ-
ing nobroken ensures that broken processes have all associ-
ated memory freed before being destroyed, writing broken
ensures that they are left in this state to allow debugging
(the default). Only the privileged user is allowed to write
to this file.
The sysname file holds the textual name of the machine. It
can only be written by the privileged user.
The user file contains the name of the user associated with
the current process. It can only be written by the privi-
leged user. In the emulation environment, writing to this
file also attempts to set the user id in the host operating
system to the specified value.
The memory file returns a formatted presentation of the
state of the memory allocation pools in the system. Each
line of output returned reports, for a single pool, the
amount of memory in use, the upper size limit, the high
water mark, the number of allocations done, the number of
frees done, the number of extensions done, the largest chunk
Page 3 Plan 9 (printed 10/25/25)
CONS(3) CONS(3)
available and the name of the pool.
The drivers file returns a list of the device drivers loaded
in the system. Each line gives the name of the device for
bind(1), such as #c, followed by the name of the driver as
used in the system configuration file.
The other files served by the cons device are all single
numbers:
jit non-zero if `just in time' compilation is configured
(can be written to change the state). Writing 0 turns
off JIT compilation, 1 turns it on and larger values
give increasingly detailed traces of the compilation
for debugging purposes.
msec the value of a millisecond counter
time number of microseconds since the epoch 00:00:00 GMT,
Jan. 1, 1970. (Can be written once by the privileged
user, to set at boot time.)
SOURCE
/emu/port/devcons.c
/os/port/devcons.c
SEE ALSO
draw(3), keyboard(6), utf(6), eve(10.2)
BUGS
For debugging, on native systems only, two control-T's fol-
lowed by a letter generate console output: `^T^Tp' prints
data about kernel processes, `^T^Ts' prints the kernel
stack, `^T^Tx' prints data about memory allocation.
The system can be rebooted by typing `^T^Tr'.
Page 4 Plan 9 (printed 10/25/25)