1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010
|
% $Xorg: sync.tex,v 1.3 2000/08/17 19:42:37 cpqbld Exp $
% $XdotOrg: xc/doc/specs/Xext/sync.tex,v 1.2 2004/04/23 18:42:18 eich Exp $
%
% Copyright 1991 by Olivetti Research Limited, Cambridge, England and
% Digital Equipment Corporation, Maynard, Massachusetts.
%
% All Rights Reserved
%
% Permission to use, copy, modify, and distribute this software and its
% documentation for any purpose and without fee is hereby granted,
% provided that the above copyright notice appear in all copies and that
% both that copyright notice and this permission notice appear in
% supporting documentation, and that the names of Digital or Olivetti
% not be used in advertising or publicity pertaining to distribution of the
% software without specific, written prior permission.
%
% DIGITAL AND OLIVETTI DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
% INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT
% SHALL THEY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
% ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER
% IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
% OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
%
% $XFree86$
%\documentstyle[a4]{article}
\documentstyle{article}
\setlength{\parindent}{0 pt}
\setlength{\parskip}{6pt}
% Protocol Section
% For the DP book, these four should be assigned the font for global symbols.
\newcommand{\request}[1]{{\bf #1}}
\newcommand{\event}[1]{{\bf #1}}
\newcommand{\error}[1]{{\bf #1}}
\newcommand{\enum}[1]{{\bf #1}}
% The following fonts are not reassigned for the DP book.
\newcommand{\system}[1]{{\sc #1}}
\newcommand{\param}[1]{{\it #1}}
\newcommand{\eventdef}[1]{\item {\bf#1}}
\newcommand{\requestdef}[1]{\item {\bf#1}}
\newcommand{\errordef}[1]{\item {\bf#1}}
\newcommand{\defn}[1]{{\bf #1}}
\newcommand{\tabstopsA}{\hspace*{4cm}\=\hspace*{1cm}\=\hspace*{7cm}\=\kill}
\newcommand{\tabstopsB}{\hspace*{1cm}\=\hspace*{1cm}\=\hspace*{3cm}\=\kill}
\newcommand{\tabstopsC}{\hspace*{1cm}\=\hspace*{1cm}\=\hspace*{5cm}\=\kill}
% commands for formatting the API
% For the DP book, these three should be assigned the font for global symbols.
\newcommand{\cfunctionname}[1]{\mbox{\tt#1}}
\newcommand{\ctypename}[1]{\mbox{\tt#1}}
\newcommand{\cconst}[1]{\mbox{\tt#1}}
% For the DP book, within function definitions, the type and name are in
% the ordinary font; therefore, ctypenamedef and cfunctionnamedef are used
% and defined below.
\newcommand{\ctypenamedef}[1]{\mbox{#1}}
\newcommand{\cfunctionnamedef}[1]{\mbox{#1}}
\newcommand{\cargname}[1]{\mbox{\it#1}}
\newcommand{\cstartfunction}[2]{\begin{sloppypar}\begin{samepage}\ctypenamedef{#1}\\ \cfunctionnamedef{#2}\ (}
\newcommand{\cargdecl}[2]{\penalty -1\ctypenamedef{#1} \cargname{#2}}
\newcommand{\cendfunctiondecl}{){\hangafter=2 \hangindent=20pt \raggedright\par}}
\newcommand{\cendfuncdescription}{\end{samepage}\end{sloppypar}}
\newcommand{\cstartmacro}[2]{\begin{sloppypar}\begin{samepage}\ctypenamedef{#1}\\ \cfunctionnamedef{#2}\ (}
\newcommand{\cendmacrodecl}{)\par}
\newcommand{\cendmacrodescription}{\end{samepage}\end{sloppypar}}
% make things easier with all the long names
\spaceskip .3333em plus 5em
\tolerance=2000
\begin{document}
\begin{center}
{\large X Synchronization Extension Protocol}\\[10pt]
{\large Version 3.0}\\[15pt]
{\large X Consortium Standard}\\[15pt]
{\large X Version 11, Release 6.8}\\[15pt]
{\it Tim Glauert}\\[0pt]
{\tt thg@cam-orl.co.uk}\\[0pt]
{\bf Olivetti Research / MultiWorks}\\[5pt]
{\it Dave Carver}\\[0pt]
{\tt dcc@athena.mit.edu}\\[0pt]
{\bf Digital Equipment Corporation,}\\[0pt]
{\bf MIT / Project Athena}\\[5pt]
{\it Jim Gettys}\\[0pt]
{\tt jg@crl.dec.com}\\[0pt]
{\bf Digital Equipment Corporation,}\\[0pt]
{\bf Cambridge Research Laboratory}\\[5pt]
{\it David P. Wiggins}\\[0pt]
{\tt dpw@x.org}\\[0pt]
{\bf X Consortium, Inc.}\\[0pt]
\end {center}
Copyright 1991 by Olivetti Research Limited, Cambridge, England and
Digital Equipment Corporation, Maynard, Massachusetts.
{\small Permission to use, copy, modify, and distribute this documentation
for any purpose and without fee is hereby granted, provided that the above
copyright notice appear in all copies. Olivetti, Digital, MIT, and the
X Consortium
make no representations about the suitability for any purpose of the
information in this document. This documentation is provided as is without
express or implied warranty.}
Copyright (c) 1991 X Consortium, Inc.
{\small Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the ``Software''), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED ``AS IS'', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
X CONSORTIUM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of the X Consortium shall not be
used in advertising or otherwise to promote the sale, use or other dealings
in this Software without prior written authorization from the X Consortium.}
\eject
\section{Synchronization Protocol}
The core X protocol makes no guarantees about the relative order of execution
of requests for different clients. This means that any synchronization between
clients must be done at the client level in an operating system-dependent and
network-dependent manner. Even if there was an accepted standard for such
synchronization, the use of a network introduces unpredictable delays between
the synchronization of the clients and the delivery of the resulting requests
to the X server.
The core X protocol also makes no guarantees about the time at which requests
are executed, which means that all clients with real-time constraints must
implement their timing on the host computer. Any such timings are subject to
error introduced by delays within the operating system and network and are
inefficient because of the need for round-trip requests that keep the client and
server synchronized.
The synchronization extension provides primitives that allow synchronization
between clients to take place entirely within the X server. This removes any
error introduced by the network and makes it possible to synchronize clients
on different hosts running different operating systems. This is important for
multimedia applications, where audio, video, and graphics data streams are
being synchronized. The extension also provides internal timers within the X
server to which client requests can be synchronized. This allows simple
animation applications to be implemented without any round-trip requests and
makes best use of buffering within the client, network, and server.
\subsection{Description}
The mechanism used by this extension for synchronization within the X server
is to block the processing of requests from a client until a specific
synchronization condition occurs. When the condition occurs, the client is
released and processing of requests continues. Multiple clients may block on
the same condition to give inter-client synchronization. Alternatively, a
single client may block on a condition such as an animation frame marker.
The extension adds \defn{Counter} and \defn{Alarm} to the set of resources
managed by the server. A counter has a 64-bit integer value that may be
increased or decreased by client requests or by the server internally. A
client can block by sending an \request{Await} request that waits until
one of a set of synchronization conditions, called TRIGGERs, becomes TRUE.
The \request{CreateCounter} request allows a client to create a
\defn{Counter} that can be changed by explicit \request{SetCounter} and
\request{ChangeCounter} requests. These can be used to implement
synchronization between different clients.
There are some counters, called \defn{System Counters}, that are changed by
the server internally rather than by client requests. The effect of any change
to a system counter is not visible until the server has finished processing the
current request. In other words, system counters are apparently updated in the
gaps between the execution of requests rather than during the actual execution
of a request. The extension provides a system counter that advances with the
server time as defined by the core protocol, and it may also provide counters
that advance with the real-world time or that change each time the CRT
screen is refreshed. Other extensions may provide their own
extension-specific system counters.
The extension provides an \defn{Alarm} mechanism that allows clients to
receive an event on a regular basis when a particular counter is changed.
\subsection{Types}
Please refer to the X11 Protocol specification as this document uses
syntactic conventions established there and references types defined there.
The following new types are used by the extension.
\begin{tabbing}{l}
SYSTEMCOUNTER: \=\kill
INT64: \>64-bit signed integer\\
COUNTER:\>XID\\
VALUETYPE:\> \{\enum{Absolute},\enum{Relative}\}\\
TESTTYPE:\> \{\enum{PositiveTransition},\enum{NegativeTransition},\\
\>\enum{PositiveComparison},\enum{NegativeComparison}\}\\
TRIGGER:\>[\\
\>counter:COUNTER,\\
\>value-type:VALUETYPE,\\
\>wait-value:INT64,\\
\>test-type:TESTTYPE\\
\>]\\
WAITCONDITION:\>[\\
\>trigger:TRIGGER,\\
\>event-threshold:INT64\\
\>]\\
SYSTEMCOUNTER:\>[\\
\>name:STRING8,\\
\>counter:COUNTER,\\
\>resolution:INT64\\
\>]\\
ALARM: \>XID\\
ALARMSTATE:\> \{\enum{Active},\enum{Inactive},\enum{Destroyed}\}\\
\end{tabbing}
The COUNTER type defines the client-side handle on a server \defn{Counter}.
The value of a counter is an INT64.
The TRIGGER type defines a test on a counter that is either TRUE or FALSE.
The value of the test is determined by the combination of a test value, the
value of the counter, and the specified test-type.
The test value for a trigger is calculated using the value-type and
wait-value fields when the trigger is initialized.
If the value-type field is not one of the
named VALUETYPE constants, the request that initialized the trigger
will return a \error{Value} error. If the
value-type field is \enum{Absolute}, the test value is given by the
wait-value field. If the value-type field is
\enum{Relative}, the test value is obtained by adding the
wait-value field to the value of the counter. If the
resulting test value would lie outside the range for an INT64, the
request that initialized the trigger will return a
\error{Value} error. If counter is \enum{None} and the
value-type is \enum{Relative}, the request that initialized the
trigger will return a \error{Match} error.
If counter is not \enum{None} and does not name a valid
counter, a \error{Counter} error is generated.
If the test-type is \enum{PositiveTransition}, the trigger is
initialized to FALSE, and it will become TRUE when the counter changes
from a value less than the test value to a value greater than or equal to the
test value. If the test-type is \enum{NegativeTransition}, the
trigger is initialize to FALSE, and it will become TRUE when the
counter changes from a value greater than the test value to a value
less than or equal to the test value. If the test-type is
\enum{PositiveComparison}, the trigger is TRUE if the counter is greater than or
equal to the test value and FALSE otherwise. If the test-type is
\enum{NegativeComparison}, the trigger is TRUE if the counter is less than or
equal to the test value and FALSE otherwise. If the test-type
is not one of the named TESTTYPE constants, the request that
initialized the trigger will return a \error{Value} error. A trigger
with a counter value of \enum{None} and a valid test-type
is always TRUE.
The WAITCONDITION type is simply a trigger with an associated
event-threshold. The event threshold is used by the \request{Await}
request to decide whether or not to generate an event to the client after the
trigger has become TRUE. By setting the event-threshold to an
appropriate value, it is possible to detect the situation where an
\request{Await} request was processed after the TRIGGER became TRUE,
which usually indicates that the server is not processing requests as fast as
the client expects.
The SYSTEMCOUNTER type provides the client with information about a
\defn{System Counter}. The name field is the textual name of the
counter that identifies the counter to the client. The counter field
is the client-side handle that should be used in requests that require a
counter. The resolution field gives the approximate step size of the
system counter. This is a hint to the client that the extension may not be
able to resolve two wait conditions with test values that differ by less than
this step size. A microsecond clock, for example, may advance in steps of 64
microseconds, so a counter based on this clock would have a resolution
of 64.
The only system counter that is guaranteed to be present is called
\system{SERVERTIME}, which counts milliseconds from some arbitrary starting
point. The least significant 32 bits of this counter track the value of Time
used by the server in Events and Requests. Other system counters may be
provided by different implementations of the extension. The X Consortium will
maintain a registry of system counter names to avoid collisions in the
name space.
An ALARM is the client-side handle on an \defn{Alarm} resource.
\subsection{Errors}
\begin{description}
\errordef{Counter}
This error is generated if the value for a COUNTER argument in a request does
not name a defined COUNTER.
\errordef{Alarm}
This error is generated if the value for an ALARM argument in a request does
not name a defined ALARM.
\end{description}
\subsection{Requests}
\begin{description}
% start marker
\requestdef{Initialize}
\begin{tabular}{l}
\param{version-major},\param{version-minor}: CARD8
\end{tabular}\\
$\Rightarrow$\\
\begin{tabular}{l}
version-major,version-minor: CARD8
\end{tabular}
%end marker
This request must be executed before any other requests for this
extension. If a client violates this rule, the results of all SYNC
requests that it issues are undefined. The request takes the version
number of the extension that the client wishes to use and returns the
actual version number being implemented by the extension for this
client. The extension may return different version numbers to a client
depending of the version number supplied by that client. This request
should be executed only once for each client connection.
Given two different versions of the SYNC protocol, v1 and v2, v1 is
compatible with v2 if and only if $v1.version\_major = v2.version\_major$
and $v1.version\_minor \leq v2.version\_minor$. Compatible means that the
functionality is fully supported in an identical fashion in the two
versions.
This document describes major version 3, minor version 0 of the SYNC
protocol.
% start marker
\requestdef{ListSystemCounters}
$\Rightarrow$\\
\begin{tabular}{l}
system-counters: LISTofSYSTEMCOUNTER\\[5pt]
Errors: \error{Alloc}
\end{tabular}
% end marker
This request returns a list of all the system counters that are available at
the time the request is executed, which includes the system counters that are
maintained by other extensions. The list returned by this request may change
as counters are created and destroyed by other extensions.
% start marker
\requestdef{CreateCounter}
\begin{tabular}{l}
\param{id}: COUNTER\\
\param{initial-value}: INT64\\[5pt]
Errors: \error{IDChoice},\error{Alloc}
\end{tabular}
% end marker
This request creates a counter and assigns the specified id to it.
The counter value is initialized to the specified initial-value
and there are no clients waiting on the counter.
% start marker
\requestdef{DestroyCounter}
\begin{tabular}{l}
\param{counter}: COUNTER\\[5pt]
Errors: \error{Counter},\error{Access}
\end{tabular}
% end marker
This request destroys the given counter and sets the counter fields
for all triggers that specify this counter to \enum{None}. All clients
waiting on the counter are released and a \event{CounterNotify} event with the
destroyed field set to TRUE is sent to each waiting client,
regardless of the event-threshold. All alarms specifying the counter
become \enum{Inactive} and an \event{AlarmNotify} event with a state
field of \enum{Inactive} is generated. A counter is destroyed automatically
when the connection to the creating client is closed down if the close-down
mode is {\bf Destroy}. An \error{Access} error is generated if counter
is a system counter. A \error{Counter} error is generated if counter
does not name a valid counter.
% start marker
\requestdef{QueryCounter}
\begin{tabular}{l}
\param{counter}: COUNTER\\
\end{tabular}\\
$\Rightarrow$\\
\begin{tabular}{l}
value: INT64\\[5pt]
Errors: \error{Counter}
\end{tabular}
% end marker
This request returns the current value of the given counter or a generates
\error{Counter} error if counter does not name a valid counter.
% start marker
\requestdef{Await}
\begin{tabular}{l}
\param{wait-list}: LISTofWAITCONDITION\\[5pt]
Errors: \error{Counter},\error{Alloc},\error{Value}
\end{tabular}
% end marker
When this request is executed, the triggers in the wait-list are
initialized using the wait-value and value-type fields, as
described in the definition of TRIGGER above. The processing of further
requests for the client is blocked until one or more of the triggers becomes
TRUE. This may happen immediately, as a result of the initialization, or at
some later time, as a result of a subsequent \request{SetCounter},
\request{ChangeCounter} or \request{DestroyCounter} request.
A \error{Value} error is generated if wait-list is empty.
When the client becomes unblocked, each trigger is checked to determine
whether a \event{CounterNotify} event should be generated. The difference
between the counter and the test value is calculated by
subtracting the test value from the value of the counter. If the
test-type is \enum{PositiveTransition} or \enum{PositiveComparison}, a \event{CounterNotify} event is generated if the
difference is at least event-threshold. If the test-type is
\enum{NegativeTransition} or \enum{NegativeComparison}, a
\event{CounterNotify} event is generated if the difference is at most
event-threshold. If the difference lies outside the range for an
INT64, an event is not generated.
This threshold check is made for each trigger in the list and a
\event{CounterNotify} event is generated for every trigger for which
the check succeeds. The check for \enum{CounterNotify} events is performed
even if one of the triggers is TRUE when the request is first executed. Note
that a \event{CounterNotify} event may be generated for a trigger that
is FALSE if there are multiple triggers in the request. A
\event{CounterNotify} event with the destroyed flag set to TRUE is
always generated if the counter for one of the triggers is destroyed.
% start marker
\requestdef{ChangeCounter}
\begin{tabular}{l}
\param{counter}: COUNTER\\
\param{amount}: INT64\\[5pt]
Errors: \error{Counter},\error{Access},\error{Value}
\end{tabular}
% end marker
This request changes the given counter by adding amount to the current
counter value. If the change to this counter satisfies a trigger for which a
client is waiting, that client is unblocked and one or more
\event{CounterNotify} events may be generated. If the change to the counter
satisfies the trigger for an alarm, an \event{AlarmNotify} event is generated
and the alarm is updated. An \error{Access} error is generated if
counter is a system counter. A \error{Counter} error is generated if
counter does not name a valid counter. If the resulting value for the
counter would be outside the range for an INT64, a \error{Value} error is
generated and the counter is not changed.
It should be noted that all the clients whose triggers are satisfied by
this change are unblocked, so this request cannot be used to implement mutual
exclusion.
% start marker
\requestdef{SetCounter}
\begin{tabular}{l}
\param{counter}: COUNTER\\
\param{value}: INT64\\[5pt]
Errors: \error{Counter},\error{Access}
\end{tabular}
% end marker
This request sets the value of the given counter to value. The effect
is equivalent to executing the appropriate \request{ChangeCounter} request to
change the counter value to value. An \error{Access} error is
generated if counter names a system counter. A \error{Counter} error
is generated if counter does not name a valid counter.
% start marker
\requestdef{CreateAlarm}
\begin{tabular}{l}
\param{id}: ALARM\\
\param{values-mask}: CARD32\\
\param{values-list}: LISTofVALUE\\[5pt]
Errors: \error{IDChoice},\error{Counter},\error{Match},\error{Value},\error{Alloc}
\end{tabular}
% end marker
This request creates an alarm and assigns the identifier id to it. The
values-mask and values-list specify the attributes that are
to be explicitly initialized. The attributes for an Alarm and their defaults
are:
\begin{center}
\begin{tabular}{l|l|ll}
Attribute & Type & Default \\
\hline
trigger & TRIGGER & counter & \enum{None}\\
& & value-type & \enum{Absolute}\\
& & value & 0\\
& & test-type & \enum{PositiveComparison}\\
delta & INT64 & 1 \\
events & BOOL & TRUE
\end{tabular}
\end{center}
The trigger is initialized as described in the definition of TRIGGER,
with an error being generated if necessary.
If the counter is \enum{None}, the state of the alarm is set to
\enum{Inactive}, else it is set to \enum{Active}.
Whenever the trigger becomes TRUE, either as a result of this request
or as the result of a \request{SetCounter}, \request{ChangeCounter},
\request{DestroyCounter}, or \request{ChangeAlarm} request, an
\event{AlarmNotify} event is generated and the alarm is updated. The alarm is
updated by repeatedly adding delta to the value of the
trigger and reinitializing it until it becomes FALSE. If this update
would cause value to fall outside the range for an INT64, or if the
counter value is \enum{None}, or if the
delta is 0 and test-type is \enum{PositiveComparison} or
\enum{NegativeComparison}, no change is made to value and the alarm
state is changed to \enum{Inactive} before the event is generated. No further
events are generated by an \enum{Inactive} alarm until a \request{ChangeAlarm}
or \request{DestroyAlarm} request is executed.
If the test-type is \enum{PositiveComparison} or
\enum{PositiveTransition} and delta is less than zero, or
if the test-type is \enum{NegativeComparison} or
\enum{NegativeTransition} and delta is greater than zero,
a \error{Match} error is generated.
The events value enables or disables delivery of \event{AlarmNotify}
events to the requesting client. The alarm keeps a separate event flag for
each client so that other clients may select to receive events from this
alarm.
An \event{AlarmNotify} event is always generated at some time after the
execution of a \request{CreateAlarm} request. This will happen immediately if
the trigger is TRUE, or it will happen later when the
trigger becomes TRUE or the Alarm is destroyed.
% start marker
\requestdef{ChangeAlarm}
\begin{tabular}{l}
\param{id}: ALARM\\
\param{values-mask}: CARD32\\
\param{values-list}: LISTofVALUE\\[5pt]
Errors: \error{Alarm},\error{Counter},\error{Value},\error{Match}
\end{tabular}
% end marker
This request changes the parameters of an Alarm. All of the parameters
specified for the \request{CreateAlarm} request may be changed using this
request. The trigger is reinitialized and an \event{AlarmNotify}
event is generated if appropriate, as explained in the description of the
\request{CreateAlarm} request.
Changes to the events flag affect the event delivery to the requesting
client only and may be used by a client to select or deselect event delivery
from an alarm created by another client.
The order in which attributes are verified and altered is
server-dependent. If an error is generated, a subset of the
attributes may have been altered.
% start marker
\requestdef{DestroyAlarm}
\begin{tabular}{l}
\param{alarm}: ALARM\\[5pt] Errors: \error{Alarm}
\end{tabular}
% end marker
This request destroys an alarm. An alarm is automatically destroyed
when the creating client is closed down if the close-down mode is {\bf
Destroy}. When an alarm is destroyed, an \event{AlarmNotify} event is
generated with a state value of \enum{Destroyed}.
% start marker
\requestdef{QueryAlarm}
\begin{tabular}{l}
\param{alarm}: ALARM\\
\end{tabular}\\
$\Rightarrow$\\
\begin{tabular}{l}
trigger: TRIGGER\\
delta: INT64\\
events: ALARMEVENTMASK\\
state: ALARMSTATE\\[5pt]
Errors: \error{Alarm}
\end{tabular}
% end marker
This request retrieves the current parameters for an Alarm.
% start marker
\requestdef{SetPriority}
\begin{tabular}{l}
\param{client-resource}: XID\\
\param{priority}: INT32\\[5pt]
Errors: \error{Match}
\end{tabular}
% end marker
This request changes the scheduling priority of the client that created
client-resource. If client-resource is \enum{None}, then the
priority for the client making the request is changed. A \error{Match} error
is generated if client-resource is not \enum{None} and does not name
an existing resource in the server. For any two priority values,
{\tt A} and {\tt B}, {\tt A} is higher priority if and only if {\tt A} is
greater than {\tt B}.
The priority of a client is set to 0 when the initial client connection is
made.
The effect of different client priorities depends on the particular
implementation of the extension, and in some cases it may have no effect at
all. However, the intention is that higher priority clients will have their
requests executed before those of lower priority clients.
For most animation applications, it is desirable that animation clients be
given priority over nonrealtime clients. This improves the smoothness of the
animation on a loaded server. Because a server is free to implement very strict
priorities, processing requests for the highest priority client to the
exclusion of all others, it is important that a client that may potentially
monopolize the whole server, such as an animation that produces continuous
output as fast as it can with no rate control, is run at low rather than high
priority.
% start marker
\requestdef{GetPriority}
\begin{tabular}{l}
\param{client-resource}: XID\\
\end{tabular}\\
$\Rightarrow$\\
\begin{tabular}{l}
priority: INT32\\[5pt]
Errors: \error{Match}
\end{tabular}
% end marker
This request returns the scheduling priority of the client that created
client-resource. If client-resource is \enum{None}, then the
priority for the client making the request is returned. A \error{Match} error
is generated if client-resource is not \enum{None} and does not name
an existing resource in the server.
\end{description}
\subsection{Events}
\begin{description}
% start marker
\eventdef{CounterNotify}
\begin{tabular}{l}
\param{counter}: COUNTER \\
\param{wait-value}: INT64 \\
\param{counter-value}: INT64 \\
\param{time}: TIME \\
\param{count}: CARD16 \\
\param{destroyed}: BOOL
\end{tabular}
% end marker
\event{CounterNotify} events may be generated when a client becomes unblocked
after an \request{Await} request has been processed.
The wait-value is the value being waited for, and
counter-value is the actual value of the counter at the time
the event was generated. The
destroyed flag is TRUE if this request was generated as the
result of the destruction of the counter and FALSE otherwise.
The time is the server time at which the event was generated.
When a client is unblocked, all the \event{CounterNotify} events for the
\request{Await} request are generated contiguously. If
count is 0, there are no more events to follow for this request. If
count is $n$, there are at least $n$ more events to follow.
% start marker
\eventdef{AlarmNotify}
\begin{tabular}{l}
\param{alarm}: ALARM \\
\param{counter-value}: INT64 \\
\param{alarm-value}: INT64 \\
\param{state}: ALARMSTATE \\
\param{time}: TIME
\end{tabular}
% end marker
An \event{AlarmNotify} event is generated when an alarm is triggered.
alarm-value is the test value of the trigger in the alarm when it was
triggered, counter-value is the value of the counter that triggered
the alarm, and time is the server time at which the event was
generated. The state is the new state of the alarm. If state is
\enum{Inactive}, no more events will be generated by this alarm until a
\request{ChangeAlarm} request is executed, the alarm is destroyed, or the
counter for the alarm is destroyed.
\end{description}
\section{Encoding}
Please refer to the X11 Protocol Encoding document as this section uses
syntactic conventions established there and references types defined there.
The name of this extension is ``SYNC''.
\subsection{New Types}
The following new types are used by the extension.
\begin{tabbing}
\tabstopsC
ALARM: CARD32\\
ALARMSTATE:\\
\tabstopsB
\> 0 \> Active \\
\> 1 \> Inactive \\
\> 2 \> Destroyed\\
\tabstopsC
COUNTER: CARD32\\
INT64: 64-bit signed integer\\
SYSTEMCOUNTER:\\
\> 4 \> COUNTER \> counter \\
\> 8 \> INT64 \> resolution\\
\> 2 \> n \> length of name in bytes\\
\> n \> STRING8 \> name \\
\> p \> \> pad,p=pad(n+2)\\
TESTTYPE:\\
\tabstopsB
\> 0 \> PositiveTransition \\
\> 1 \> NegativeTransition \\
\> 2 \> PositiveComparison \\
\> 3 \> NegativeComparison \\
\tabstopsC
TRIGGER:\\
\> 4 \> COUNTER \> counter \\
\> 4 \> VALUETYPE \> wait-type \\
\> 8 \> INT64 \> wait-value \\
\> 4 \> TESTTYPE \> test-type \\
VALUETYPE:\\
\tabstopsB
\> 0 \> Absolute \\
\> 1 \> Relative \\
\tabstopsC
WAITCONDITION:\\
\> 20 \> TRIGGER \> trigger \\
\> 8 \> INT64 \> event threshold\\
\end{tabbing}
An INT64 is encoded in 8 bytes with the most significant 4 bytes
first followed by the least significant 4 bytes. Within these
4-byte groups, the byte ordering determined during connection setup
is used.
\subsection{Errors}
\begin{tabbing}
\tabstopsC
{\bf Counter}\\
\> 1 \> 0 \> Error \\
\> 1 \> Base + 0 \> code \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> CARD32 \> bad counter \\
\> 2 \> CARD16 \> minor opcode \\
\> 1 \> CARD8 \> major opcode \\
\> 21 \> \> unused \\
{\bf Alarm}\\
\> 1 \> 0 \> Error \\
\> 1 \> Base + 1 \> code \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> CARD32 \> bad alarm \\
\> 2 \> CARD16 \> minor opcode \\
\> 1 \> CARD8 \> major opcode \\
\> 21 \> \> unused \\
\end{tabbing}
\subsection{Requests}
\renewcommand{\thefootnote}{\fnsymbol{footnote}}
\setcounter{footnote}{1}
\setlength{\topsep}{0pt} %vertical space before and after tabbing
\begin{tabbing}
\tabstopsC
{\bf Initialize}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 0 \> minor opcode \\
\> 2 \> 2 \> request length \\
\> 1 \> CARD8 \> major version \\
\> 1 \> CARD8 \> minor version \\
\> 2 \> \> unused \\
$\Rightarrow$\\
\> 1 \> 1 \> Reply \\
\> 1 \> \> unused \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> 0 \> reply length \\
\> 1 \> CARD8 \> major version \\
\> 1 \> CARD8 \> minor version \\
\> 2 \> \> unused \\
\> 20 \> \> unused \\
\\
{\bf ListSystemCounters}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 1 \> minor opcode \\
\> 2 \> 1 \> request length \\
$\Rightarrow$\\
\> 1 \> 1 \> Reply \\
\> 1 \> \> unused \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> {\it variable} \> reply length \\
\> 4 \> INT32 \> list length \\
\> 20 \> \> unused \\
\> 4n \> list of SYSTEMCOUNTER \> system counters \\
\\
{\bf CreateCounter}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 2 \> minor opcode \\
\> 2 \> 4 \> request length \\
\> 4 \> COUNTER \> id\\
\> 8 \> INT64 \> initial value\\
\\
{\bf DestroyCounter}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 6 \> minor opcode\footnotemark[1] \\
\> 2 \> 2 \> request length \\
\> 4 \> COUNTER \> counter
\end{tabbing}
\footnotetext{A previous version of this document gave an incorrect
minor opcode.}
\begin{tabbing}
\tabstopsC
{\bf QueryCounter}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 5 \> minor opcode\footnotemark[1] \\
\> 2 \> 2 \> request length \\
\> 4 \> COUNTER \> counter \\
$\Rightarrow$\\
\> 1 \> 1 \> Reply \\
\> 1 \> \> unused \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> 0 \> reply length \\
\> 8 \> INT64 \> counter value \\
\> 16 \> \> unused\\
\\
{\bf Await}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 7 \> minor opcode\footnotemark[1] \\
\> 2 \> 1 + 7*n \> request length \\
\> 28n \> LISTofWAITCONDITION \> wait conditions
\end{tabbing}
\footnotetext{A previous version of this document gave an incorrect
minor opcode.}
\setlength{\topsep}{0pt} %vertical space before and after tabbing
\begin{tabbing}
\tabstopsC
{\bf ChangeCounter}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 4 \> minor opcode\footnotemark[1] \\
\> 2 \> 4 \> request length \\
\> 4 \> COUNTER \> counter \\
\> 8 \> INT64 \> amount \\
\\
{\bf SetCounter}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 3 \> minor opcode\footnotemark[1] \\
\> 2 \> 4 \> request length \\
\> 4 \> COUNTER \> counter \\
\> 8 \> INT64 \> value \\
\\
{\bf CreateAlarm}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 8 \> minor opcode \\
\> 2 \> 3+n \> request length \\
\> 4 \> ALARM \> id \\
\> 4 \> BITMASK \> values mask\\
\tabstopsB
\> \> \#x00000001 \> counter \\
\> \> \#x00000002 \> value-type \\
\> \> \#x00000004 \> value \\
\> \> \#x00000008 \> test-type \\
\> \> \#x00000010 \> delta \\
\> \> \#x00000020 \> events \\
\tabstopsC
\> 4n \> LISTofVALUE \> values\\
\tabstopsB
VALUES\\
\> 4 \> COUNTER \> counter\\
\> 4 \> VALUETYPE \> value-type \\
\> 8 \> INT64 \> value \\
\> 4 \> TESTTYPE \> test-type \\
\> 8 \> INT64 \> delta \\
\> 4 \> BOOL \> events\\
\tabstopsC
\\
{\bf ChangeAlarm}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 9 \> minor opcode \\
\> 2 \> 3+n \> request length \\
\> 4 \> ALARM \> id \\
\> 4 \> BITMASK \> values mask \\
\> \> encodings as for {\bf CreateAlarm}\\
\> 4n \> LISTofVALUE \> values\\
\> \> encodings as for {\bf CreateAlarm}\\
\\
{\bf DestroyAlarm}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 11 \> minor opcode\footnotemark[1] \\
\> 2 \> 2 \> request length \\
\> 4 \> ALARM \> alarm
\end{tabbing}
\footnotetext{A previous version of this document gave an incorrect
minor opcode.}
\begin{tabbing}
\tabstopsC
{\bf QueryAlarm}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 10 \> minor opcode\footnotemark[1] \\
\> 2 \> 2 \> request length \\
\> 4 \> ALARM \> alarm \\
$\Rightarrow$\\
\> 1 \> 1 \> Reply \\
\> 1 \> \> unused \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> 2 \> reply length \\
\> 20 \> TRIGGER \> trigger \\
\> 8 \> INT64 \> delta \\
\> 1 \> BOOL \> events \\
\> 1 \> ALARMSTATE \> state \\
\> 2 \> \> unused \\
\\
{\bf SetPriority}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 12 \> minor opcode \\
\> 2 \> 3 \> request length \\
\> 4 \> CARD32 \> id \\
\> 4 \> INT32 \> priority \\
\\
{\bf GetPriority}\\
\> 1 \> CARD8 \> major opcode \\
\> 1 \> 13 \> minor opcode \\
\> 2 \> 1 \> request length \\
\> 4 \> CARD32 \> id \\
$\Rightarrow$\\
\> 1 \> 1 \> Reply \\
\> 1 \> \> unused \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> 0 \> reply length \\
\> 4 \> INT32 \> priority \\
\> 20 \> \> unused\\
\end{tabbing}
\subsection{Events}
\begin{tabbing}
\tabstopsC
{\bf CounterNotify}\\
\> 1 \> Base + 0 \> code \\
\> 1 \> 0 \> kind \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> COUNTER \> counter \\
\> 8 \> INT64 \> wait value \\
\> 8 \> INT64 \> counter value \\
\> 4 \> TIME \> timestamp \\
\> 2 \> CARD16 \> count \\
\> 1 \> BOOL \> destroyed \\
\> 1 \> \> unused \\
\\
{\bf AlarmNotify}\\
\> 1 \> Base + 1 \> code \\
\> 1 \> 1 \> kind \\
\> 2 \> CARD16 \> sequence number \\
\> 4 \> ALARM \> alarm \\
\> 8 \> INT64 \> counter value \\
\> 8 \> INT64 \> alarm value \\
\> 4 \> TIME \> timestamp \\
\> 1 \> ALARMSTATE \> state \\
\> 3 \> \> unused\\
\end{tabbing}
\end{document}
|