search

tty in Linux is the abbreviation of "Teletype", which is a terminal device composed of virtual console, serial port and pseudo terminal device; tty is also a Unix command, used to give the name of the current terminal device, or Use tty to refer to various types of terminal devices.

What does tty mean in linux

#The operating environment of this tutorial: linux7.3 system, Dell G3 computer.

What does tty mean in linux

The terminal is a character-type device. It has many types. tty is usually used to refer to each one for short. types of terminal equipment. tty is the abbreviation of Teletype. Teletype is one of the earliest terminal devices that appeared, much like a teletypewriter (or ), and was produced by Teletype Company. The device name is placed in the special file directory /dev/. The terminal special device files generally include the following:

1. Serial port terminal (/dev/ttySn)

Serial Port Terminal is a terminal device connected using a computer serial port. The computer treats each serial port as a character device. For a time these serial port devices were often called terminal devices because their primary use at that time was for connecting to terminals. The device names corresponding to these serial ports are /dev/tts/0 (or /dev/ttyS0), /dev/tts/1 (or /dev /ttyS1), etc., and the device numbers are (4,0), ( 4,1), etc., respectively corresponding to COM1, COM2, etc. under the DOS system. To send data to a port, you can redirect standard output to these special file names on the command line. For example, typing at the command line prompt: echo test > /dev/ttyS1 will send the word "test" to the device connected to the ttyS1 (COM2) port.

2. Pseudo terminal (/dev/pty/)

Pseudo Terminal (Pseudo Terminal) is a pair of logical terminal devices, such as /dev/ptyp3 and / dev/ttyp3 (or /dev/pty/m3 and /dev/pty/s3 respectively in the device file system). They are not directly related to actual physical devices. If a program sees ttyp3 as a serial port device, its read/write operations on that port will be reflected on the other logical terminal device pair (ttyp3). ttyp3 is a logical device used by another program for read and write operations. In this way, two programs can communicate with each other through this logical device, and one of the programs using ttyp3 thinks it is communicating with a serial port. This is much like a pipe operation between pairs of logical devices.

For ttyp3 (s3), any program designed to use a serial port device can use this logical device. But for programs that use ptyp3, they need to be specially designed to use ptyp3 (m3) logical devices.

For example, if someone uses the telnet program to connect to your computer on the Internet, the telnet program may start connecting to the device ptyp2 (m2) (a pseudo terminal port). At this time, a getty program should be running on the corresponding ttyp2 (s2) port. When telnet obtains a character from the remote end, the character will be passed to the getty program through m2 and s2, and the getty program will return the "login:" string information to the network through s2, m2 and the telnet program. In this way, the login program and the telnet program communicate through the "pseudo terminal". By using appropriate software, it is possible to connect two or even more pseudo-terminal devices to the same physical serial port.

Before using the device file system, in order to obtain a large number of special files for pseudo-terminal devices, HP-UX AIX and others used a more complex file naming method.

3. Control terminal (/dev/tty)

If the current process has a controlling terminal (Controlling Terminal), then /dev/tty is the control of the current process Device special files for the terminal. You can use the command "ps -ax" to see which control terminal the process is connected to. For the shell you log in to, /dev/tty is the terminal you use, and the device number is (5,0). Use the command "tty" to see which actual terminal device it corresponds to. /dev/tty is somewhat similar to a connection to the actual terminal device used.

4. Console terminal (/dev/ttyn, /dev/console)

In UNIX systems, the computer monitor is usually called the console terminal (Console ). It emulates a terminal of type Linux (TERM=Linux), and has some device special files associated with it: tty0, tty1, tty2, etc. When you log in at the console, tty1 is used. When using the Alt [F1-F6] key combination, we can switch to tty2, tty3, etc. tty1-tty6 and so on are called virtual terminals, and tty0 is an alias of the currently used virtual terminal, and the information generated by the system will be sent to this terminal. Therefore, system information will be sent to the console terminal regardless of which virtual terminal is currently in use.

You can log in to different virtual terminals, so the system can have several different sessions at the same time. Only the system or super user root can write to /dev/tty0,

5. Other types

There are also many other types of terminal device special files for many different character devices. For example, /dev/ttyIn terminal device for ISDN equipment, etc. I won’t go into details here.

Related recommendations: "Linux Video Tutorial"

The above is the detailed content of What does tty mean in linux. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
The 5 Core Components of the Linux Operating SystemThe 5 Core Components of the Linux Operating SystemMay 08, 2025 am 12:08 AM

The five core components of the Linux operating system are: 1. Kernel, 2. System libraries, 3. System tools, 4. System services, 5. File system. These components work together to ensure the stable and efficient operation of the system, and together form a powerful and flexible operating system.

The 5 Essential Elements of Linux: ExplainedThe 5 Essential Elements of Linux: ExplainedMay 07, 2025 am 12:14 AM

The five core elements of Linux are: 1. Kernel, 2. Command line interface, 3. File system, 4. Package management, 5. Community and open source. Together, these elements define the nature and functionality of Linux.

Linux Operations: Security and User ManagementLinux Operations: Security and User ManagementMay 06, 2025 am 12:04 AM

Linux user management and security can be achieved through the following steps: 1. Create users and groups, using commands such as sudouseradd-m-gdevelopers-s/bin/bashjohn. 2. Bulkly create users and set password policies, using the for loop and chpasswd commands. 3. Check and fix common errors, home directory and shell settings. 4. Implement best practices such as strong cryptographic policies, regular audits and the principle of minimum authority. 5. Optimize performance, use sudo and adjust PAM module configuration. Through these methods, users can be effectively managed and system security can be improved.

Linux Operations: File System, Processes, and MoreLinux Operations: File System, Processes, and MoreMay 05, 2025 am 12:16 AM

The core operations of Linux file system and process management include file system management and process control. 1) File system operations include creating, deleting, copying and moving files or directories, using commands such as mkdir, rmdir, cp and mv. 2) Process management involves starting, monitoring and killing processes, using commands such as ./my_script.sh&, top and kill.

Linux Operations: Shell Scripting and AutomationLinux Operations: Shell Scripting and AutomationMay 04, 2025 am 12:15 AM

Shell scripts are powerful tools for automated execution of commands in Linux systems. 1) The shell script executes commands line by line through the interpreter to process variable substitution and conditional judgment. 2) The basic usage includes backup operations, such as using the tar command to back up the directory. 3) Advanced usage involves the use of functions and case statements to manage services. 4) Debugging skills include using set-x to enable debugging mode and set-e to exit when the command fails. 5) Performance optimization is recommended to avoid subshells, use arrays and optimization loops.

Linux Operations: Understanding the Core FunctionalityLinux Operations: Understanding the Core FunctionalityMay 03, 2025 am 12:09 AM

Linux is a Unix-based multi-user, multi-tasking operating system that emphasizes simplicity, modularity and openness. Its core functions include: file system: organized in a tree structure, supports multiple file systems such as ext4, XFS, Btrfs, and use df-T to view file system types. Process management: View the process through the ps command, manage the process using PID, involving priority settings and signal processing. Network configuration: Flexible setting of IP addresses and managing network services, and use sudoipaddradd to configure IP. These features are applied in real-life operations through basic commands and advanced script automation, improving efficiency and reducing errors.

Linux: Entering and Exiting Maintenance ModeLinux: Entering and Exiting Maintenance ModeMay 02, 2025 am 12:01 AM

The methods to enter Linux maintenance mode include: 1. Edit the GRUB configuration file, add "single" or "1" parameters and update the GRUB configuration; 2. Edit the startup parameters in the GRUB menu, add "single" or "1". Exit maintenance mode only requires restarting the system. With these steps, you can quickly enter maintenance mode when needed and exit safely, ensuring system stability and security.

Understanding Linux: The Core Components DefinedUnderstanding Linux: The Core Components DefinedMay 01, 2025 am 12:19 AM

The core components of Linux include kernel, shell, file system, process management and memory management. 1) Kernel management system resources, 2) shell provides user interaction interface, 3) file system supports multiple formats, 4) Process management is implemented through system calls such as fork, and 5) memory management uses virtual memory technology.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools