% $Xorg: sync.tex,v 1.3 2000/08/17 19:42:37 cpqbld Exp $ % $XdotOrg: xc/doc/specs/Xext/sync.tex,v 1.2 2004/04/23 18:42:18 eich Exp $ % % Copyright 1991 by Olivetti Research Limited, Cambridge, England and % Digital Equipment Corporation, Maynard, Massachusetts. % % All Rights Reserved % % Permission to use, copy, modify, and distribute this software and its % documentation for any purpose and without fee is hereby granted, % provided that the above copyright notice appear in all copies and that % both that copyright notice and this permission notice appear in % supporting documentation, and that the names of Digital or Olivetti % not be used in advertising or publicity pertaining to distribution of the % software without specific, written prior permission. % % DIGITAL AND OLIVETTI DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, % INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT % SHALL THEY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR % ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER % IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT % OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. % % $XFree86$ %\documentstyle[a4]{article} \documentstyle{article} \setlength{\parindent}{0 pt} \setlength{\parskip}{6pt} % Protocol Section % For the DP book, these four should be assigned the font for global symbols. \newcommand{\request}[1]{{\bf #1}} \newcommand{\event}[1]{{\bf #1}} \newcommand{\error}[1]{{\bf #1}} \newcommand{\enum}[1]{{\bf #1}} % The following fonts are not reassigned for the DP book. \newcommand{\system}[1]{{\sc #1}} \newcommand{\param}[1]{{\it #1}} \newcommand{\eventdef}[1]{\item {\bf#1}} \newcommand{\requestdef}[1]{\item {\bf#1}} \newcommand{\errordef}[1]{\item {\bf#1}} \newcommand{\defn}[1]{{\bf #1}} \newcommand{\tabstopsA}{\hspace*{4cm}\=\hspace*{1cm}\=\hspace*{7cm}\=\kill} \newcommand{\tabstopsB}{\hspace*{1cm}\=\hspace*{1cm}\=\hspace*{3cm}\=\kill} \newcommand{\tabstopsC}{\hspace*{1cm}\=\hspace*{1cm}\=\hspace*{5cm}\=\kill} % commands for formatting the API % For the DP book, these three should be assigned the font for global symbols. \newcommand{\cfunctionname}[1]{\mbox{\tt#1}} \newcommand{\ctypename}[1]{\mbox{\tt#1}} \newcommand{\cconst}[1]{\mbox{\tt#1}} % For the DP book, within function definitions, the type and name are in % the ordinary font; therefore, ctypenamedef and cfunctionnamedef are used % and defined below. \newcommand{\ctypenamedef}[1]{\mbox{#1}} \newcommand{\cfunctionnamedef}[1]{\mbox{#1}} \newcommand{\cargname}[1]{\mbox{\it#1}} \newcommand{\cstartfunction}[2]{\begin{sloppypar}\begin{samepage}\ctypenamedef{#1}\\ \cfunctionnamedef{#2}\ (} \newcommand{\cargdecl}[2]{\penalty -1\ctypenamedef{#1} \cargname{#2}} \newcommand{\cendfunctiondecl}{){\hangafter=2 \hangindent=20pt \raggedright\par}} \newcommand{\cendfuncdescription}{\end{samepage}\end{sloppypar}} \newcommand{\cstartmacro}[2]{\begin{sloppypar}\begin{samepage}\ctypenamedef{#1}\\ \cfunctionnamedef{#2}\ (} \newcommand{\cendmacrodecl}{)\par} \newcommand{\cendmacrodescription}{\end{samepage}\end{sloppypar}} % make things easier with all the long names \spaceskip .3333em plus 5em \tolerance=2000 \begin{document} \begin{center} {\large X Synchronization Extension Protocol}\\[10pt] {\large Version 3.0}\\[15pt] {\large X Consortium Standard}\\[15pt] {\large X Version 11, Release 6.8}\\[15pt] {\it Tim Glauert}\\[0pt] {\tt thg@cam-orl.co.uk}\\[0pt] {\bf Olivetti Research / MultiWorks}\\[5pt] {\it Dave Carver}\\[0pt] {\tt dcc@athena.mit.edu}\\[0pt] {\bf Digital Equipment Corporation,}\\[0pt] {\bf MIT / Project Athena}\\[5pt] {\it Jim Gettys}\\[0pt] {\tt jg@crl.dec.com}\\[0pt] {\bf Digital Equipment Corporation,}\\[0pt] {\bf Cambridge Research Laboratory}\\[5pt] {\it David P. Wiggins}\\[0pt] {\tt dpw@x.org}\\[0pt] {\bf X Consortium, Inc.}\\[0pt] \end {center} Copyright 1991 by Olivetti Research Limited, Cambridge, England and Digital Equipment Corporation, Maynard, Massachusetts. {\small Permission to use, copy, modify, and distribute this documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies. Olivetti, Digital, MIT, and the X Consortium make no representations about the suitability for any purpose of the information in this document. This documentation is provided as is without express or implied warranty.} Copyright (c) 1991 X Consortium, Inc. {\small Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the ``Software''), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED ``AS IS'', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE X CONSORTIUM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of the X Consortium shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from the X Consortium.} \eject \section{Synchronization Protocol} The core X protocol makes no guarantees about the relative order of execution of requests for different clients. This means that any synchronization between clients must be done at the client level in an operating system-dependent and network-dependent manner. Even if there was an accepted standard for such synchronization, the use of a network introduces unpredictable delays between the synchronization of the clients and the delivery of the resulting requests to the X server. The core X protocol also makes no guarantees about the time at which requests are executed, which means that all clients with real-time constraints must implement their timing on the host computer. Any such timings are subject to error introduced by delays within the operating system and network and are inefficient because of the need for round-trip requests that keep the client and server synchronized. The synchronization extension provides primitives that allow synchronization between clients to take place entirely within the X server. This removes any error introduced by the network and makes it possible to synchronize clients on different hosts running different operating systems. This is important for multimedia applications, where audio, video, and graphics data streams are being synchronized. The extension also provides internal timers within the X server to which client requests can be synchronized. This allows simple animation applications to be implemented without any round-trip requests and makes best use of buffering within the client, network, and server. \subsection{Description} The mechanism used by this extension for synchronization within the X server is to block the processing of requests from a client until a specific synchronization condition occurs. When the condition occurs, the client is released and processing of requests continues. Multiple clients may block on the same condition to give inter-client synchronization. Alternatively, a single client may block on a condition such as an animation frame marker. The extension adds \defn{Counter} and \defn{Alarm} to the set of resources managed by the server. A counter has a 64-bit integer value that may be increased or decreased by client requests or by the server internally. A client can block by sending an \request{Await} request that waits until one of a set of synchronization conditions, called TRIGGERs, becomes TRUE. The \request{CreateCounter} request allows a client to create a \defn{Counter} that can be changed by explicit \request{SetCounter} and \request{ChangeCounter} requests. These can be used to implement synchronization between different clients. There are some counters, called \defn{System Counters}, that are changed by the server internally rather than by client requests. The effect of any change to a system counter is not visible until the server has finished processing the current request. In other words, system counters are apparently updated in the gaps between the execution of requests rather than during the actual execution of a request. The extension provides a system counter that advances with the server time as defined by the core protocol, and it may also provide counters that advance with the real-world time or that change each time the CRT screen is refreshed. Other extensions may provide their own extension-specific system counters. The extension provides an \defn{Alarm} mechanism that allows clients to receive an event on a regular basis when a particular counter is changed. \subsection{Types} Please refer to the X11 Protocol specification as this document uses syntactic conventions established there and references types defined there. The following new types are used by the extension. \begin{tabbing}{l} SYSTEMCOUNTER: \=\kill INT64: \>64-bit signed integer\\ COUNTER:\>XID\\ VALUETYPE:\> \{\enum{Absolute},\enum{Relative}\}\\ TESTTYPE:\> \{\enum{PositiveTransition},\enum{NegativeTransition},\\ \>\enum{PositiveComparison},\enum{NegativeComparison}\}\\ TRIGGER:\>[\\ \>counter:COUNTER,\\ \>value-type:VALUETYPE,\\ \>wait-value:INT64,\\ \>test-type:TESTTYPE\\ \>]\\ WAITCONDITION:\>[\\ \>trigger:TRIGGER,\\ \>event-threshold:INT64\\ \>]\\ SYSTEMCOUNTER:\>[\\ \>name:STRING8,\\ \>counter:COUNTER,\\ \>resolution:INT64\\ \>]\\ ALARM: \>XID\\ ALARMSTATE:\> \{\enum{Active},\enum{Inactive},\enum{Destroyed}\}\\ \end{tabbing} The COUNTER type defines the client-side handle on a server \defn{Counter}. The value of a counter is an INT64. The TRIGGER type defines a test on a counter that is either TRUE or FALSE. The value of the test is determined by the combination of a test value, the value of the counter, and the specified test-type. The test value for a trigger is calculated using the value-type and wait-value fields when the trigger is initialized. If the value-type field is not one of the named VALUETYPE constants, the request that initialized the trigger will return a \error{Value} error. If the value-type field is \enum{Absolute}, the test value is given by the wait-value field. If the value-type field is \enum{Relative}, the test value is obtained by adding the wait-value field to the value of the counter. If the resulting test value would lie outside the range for an INT64, the request that initialized the trigger will return a \error{Value} error. If counter is \enum{None} and the value-type is \enum{Relative}, the request that initialized the trigger will return a \error{Match} error. If counter is not \enum{None} and does not name a valid counter, a \error{Counter} error is generated. If the test-type is \enum{PositiveTransition}, the trigger is initialized to FALSE, and it will become TRUE when the counter changes from a value less than the test value to a value greater than or equal to the test value. If the test-type is \enum{NegativeTransition}, the trigger is initialize to FALSE, and it will become TRUE when the counter changes from a value greater than the test value to a value less than or equal to the test value. If the test-type is \enum{PositiveComparison}, the trigger is TRUE if the counter is greater than or equal to the test value and FALSE otherwise. If the test-type is \enum{NegativeComparison}, the trigger is TRUE if the counter is less than or equal to the test value and FALSE otherwise. If the test-type is not one of the named TESTTYPE constants, the request that initialized the trigger will return a \error{Value} error. A trigger with a counter value of \enum{None} and a valid test-type is always TRUE. The WAITCONDITION type is simply a trigger with an associated event-threshold. The event threshold is used by the \request{Await} request to decide whether or not to generate an event to the client after the trigger has become TRUE. By setting the event-threshold to an appropriate value, it is possible to detect the situation where an \request{Await} request was processed after the TRIGGER became TRUE, which usually indicates that the server is not processing requests as fast as the client expects. The SYSTEMCOUNTER type provides the client with information about a \defn{System Counter}. The name field is the textual name of the counter that identifies the counter to the client. The counter field is the client-side handle that should be used in requests that require a counter. The resolution field gives the approximate step size of the system counter. This is a hint to the client that the extension may not be able to resolve two wait conditions with test values that differ by less than this step size. A microsecond clock, for example, may advance in steps of 64 microseconds, so a counter based on this clock would have a resolution of 64. The only system counter that is guaranteed to be present is called \system{SERVERTIME}, which counts milliseconds from some arbitrary starting point. The least significant 32 bits of this counter track the value of Time used by the server in Events and Requests. Other system counters may be provided by different implementations of the extension. The X Consortium will maintain a registry of system counter names to avoid collisions in the name space. An ALARM is the client-side handle on an \defn{Alarm} resource. \subsection{Errors} \begin{description} \errordef{Counter} This error is generated if the value for a COUNTER argument in a request does not name a defined COUNTER. \errordef{Alarm} This error is generated if the value for an ALARM argument in a request does not name a defined ALARM. \end{description} \subsection{Requests} \begin{description} % start marker \requestdef{Initialize} \begin{tabular}{l} \param{version-major},\param{version-minor}: CARD8 \end{tabular}\\ $\Rightarrow$\\ \begin{tabular}{l} version-major,version-minor: CARD8 \end{tabular} %end marker This request must be executed before any other requests for this extension. If a client violates this rule, the results of all SYNC requests that it issues are undefined. The request takes the version number of the extension that the client wishes to use and returns the actual version number being implemented by the extension for this client. The extension may return different version numbers to a client depending of the version number supplied by that client. This request should be executed only once for each client connection. Given two different versions of the SYNC protocol, v1 and v2, v1 is compatible with v2 if and only if $v1.version\_major = v2.version\_major$ and $v1.version\_minor \leq v2.version\_minor$. Compatible means that the functionality is fully supported in an identical fashion in the two versions. This document describes major version 3, minor version 0 of the SYNC protocol. % start marker \requestdef{ListSystemCounters} $\Rightarrow$\\ \begin{tabular}{l} system-counters: LISTofSYSTEMCOUNTER\\[5pt] Errors: \error{Alloc} \end{tabular} % end marker This request returns a list of all the system counters that are available at the time the request is executed, which includes the system counters that are maintained by other extensions. The list returned by this request may change as counters are created and destroyed by other extensions. % start marker \requestdef{CreateCounter} \begin{tabular}{l} \param{id}: COUNTER\\ \param{initial-value}: INT64\\[5pt] Errors: \error{IDChoice},\error{Alloc} \end{tabular} % end marker This request creates a counter and assigns the specified id to it. The counter value is initialized to the specified initial-value and there are no clients waiting on the counter. % start marker \requestdef{DestroyCounter} \begin{tabular}{l} \param{counter}: COUNTER\\[5pt] Errors: \error{Counter},\error{Access} \end{tabular} % end marker This request destroys the given counter and sets the counter fields for all triggers that specify this counter to \enum{None}. All clients waiting on the counter are released and a \event{CounterNotify} event with the destroyed field set to TRUE is sent to each waiting client, regardless of the event-threshold. All alarms specifying the counter become \enum{Inactive} and an \event{AlarmNotify} event with a state field of \enum{Inactive} is generated. A counter is destroyed automatically when the connection to the creating client is closed down if the close-down mode is {\bf Destroy}. An \error{Access} error is generated if counter is a system counter. A \error{Counter} error is generated if counter does not name a valid counter. % start marker \requestdef{QueryCounter} \begin{tabular}{l} \param{counter}: COUNTER\\ \end{tabular}\\ $\Rightarrow$\\ \begin{tabular}{l} value: INT64\\[5pt] Errors: \error{Counter} \end{tabular} % end marker This request returns the current value of the given counter or a generates \error{Counter} error if counter does not name a valid counter. % start marker \requestdef{Await} \begin{tabular}{l} \param{wait-list}: LISTofWAITCONDITION\\[5pt] Errors: \error{Counter},\error{Alloc},\error{Value} \end{tabular} % end marker When this request is executed, the triggers in the wait-list are initialized using the wait-value and value-type fields, as described in the definition of TRIGGER above. The processing of further requests for the client is blocked until one or more of the triggers becomes TRUE. This may happen immediately, as a result of the initialization, or at some later time, as a result of a subsequent \request{SetCounter}, \request{ChangeCounter} or \request{DestroyCounter} request. A \error{Value} error is generated if wait-list is empty. When the client becomes unblocked, each trigger is checked to determine whether a \event{CounterNotify} event should be generated. The difference between the counter and the test value is calculated by subtracting the test value from the value of the counter. If the test-type is \enum{PositiveTransition} or \enum{PositiveComparison}, a \event{CounterNotify} event is generated if the difference is at least event-threshold. If the test-type is \enum{NegativeTransition} or \enum{NegativeComparison}, a \event{CounterNotify} event is generated if the difference is at most event-threshold. If the difference lies outside the range for an INT64, an event is not generated. This threshold check is made for each trigger in the list and a \event{CounterNotify} event is generated for every trigger for which the check succeeds. The check for \enum{CounterNotify} events is performed even if one of the triggers is TRUE when the request is first executed. Note that a \event{CounterNotify} event may be generated for a trigger that is FALSE if there are multiple triggers in the request. A \event{CounterNotify} event with the destroyed flag set to TRUE is always generated if the counter for one of the triggers is destroyed. % start marker \requestdef{ChangeCounter} \begin{tabular}{l} \param{counter}: COUNTER\\ \param{amount}: INT64\\[5pt] Errors: \error{Counter},\error{Access},\error{Value} \end{tabular} % end marker This request changes the given counter by adding amount to the current counter value. If the change to this counter satisfies a trigger for which a client is waiting, that client is unblocked and one or more \event{CounterNotify} events may be generated. If the change to the counter satisfies the trigger for an alarm, an \event{AlarmNotify} event is generated and the alarm is updated. An \error{Access} error is generated if counter is a system counter. A \error{Counter} error is generated if counter does not name a valid counter. If the resulting value for the counter would be outside the range for an INT64, a \error{Value} error is generated and the counter is not changed. It should be noted that all the clients whose triggers are satisfied by this change are unblocked, so this request cannot be used to implement mutual exclusion. % start marker \requestdef{SetCounter} \begin{tabular}{l} \param{counter}: COUNTER\\ \param{value}: INT64\\[5pt] Errors: \error{Counter},\error{Access} \end{tabular} % end marker This request sets the value of the given counter to value. The effect is equivalent to executing the appropriate \request{ChangeCounter} request to change the counter value to value. An \error{Access} error is generated if counter names a system counter. A \error{Counter} error is generated if counter does not name a valid counter. % start marker \requestdef{CreateAlarm} \begin{tabular}{l} \param{id}: ALARM\\ \param{values-mask}: CARD32\\ \param{values-list}: LISTofVALUE\\[5pt] Errors: \error{IDChoice},\error{Counter},\error{Match},\error{Value},\error{Alloc} \end{tabular} % end marker This request creates an alarm and assigns the identifier id to it. The values-mask and values-list specify the attributes that are to be explicitly initialized. The attributes for an Alarm and their defaults are: \begin{center} \begin{tabular}{l|l|ll} Attribute & Type & Default \\ \hline trigger & TRIGGER & counter & \enum{None}\\ & & value-type & \enum{Absolute}\\ & & value & 0\\ & & test-type & \enum{PositiveComparison}\\ delta & INT64 & 1 \\ events & BOOL & TRUE \end{tabular} \end{center} The trigger is initialized as described in the definition of TRIGGER, with an error being generated if necessary. If the counter is \enum{None}, the state of the alarm is set to \enum{Inactive}, else it is set to \enum{Active}. Whenever the trigger becomes TRUE, either as a result of this request or as the result of a \request{SetCounter}, \request{ChangeCounter}, \request{DestroyCounter}, or \request{ChangeAlarm} request, an \event{AlarmNotify} event is generated and the alarm is updated. The alarm is updated by repeatedly adding delta to the value of the trigger and reinitializing it until it becomes FALSE. If this update would cause value to fall outside the range for an INT64, or if the counter value is \enum{None}, or if the delta is 0 and test-type is \enum{PositiveComparison} or \enum{NegativeComparison}, no change is made to value and the alarm state is changed to \enum{Inactive} before the event is generated. No further events are generated by an \enum{Inactive} alarm until a \request{ChangeAlarm} or \request{DestroyAlarm} request is executed. If the test-type is \enum{PositiveComparison} or \enum{PositiveTransition} and delta is less than zero, or if the test-type is \enum{NegativeComparison} or \enum{NegativeTransition} and delta is greater than zero, a \error{Match} error is generated. The events value enables or disables delivery of \event{AlarmNotify} events to the requesting client. The alarm keeps a separate event flag for each client so that other clients may select to receive events from this alarm. An \event{AlarmNotify} event is always generated at some time after the execution of a \request{CreateAlarm} request. This will happen immediately if the trigger is TRUE, or it will happen later when the trigger becomes TRUE or the Alarm is destroyed. % start marker \requestdef{ChangeAlarm} \begin{tabular}{l} \param{id}: ALARM\\ \param{values-mask}: CARD32\\ \param{values-list}: LISTofVALUE\\[5pt] Errors: \error{Alarm},\error{Counter},\error{Value},\error{Match} \end{tabular} % end marker This request changes the parameters of an Alarm. All of the parameters specified for the \request{CreateAlarm} request may be changed using this request. The trigger is reinitialized and an \event{AlarmNotify} event is generated if appropriate, as explained in the description of the \request{CreateAlarm} request. Changes to the events flag affect the event delivery to the requesting client only and may be used by a client to select or deselect event delivery from an alarm created by another client. The order in which attributes are verified and altered is server-dependent. If an error is generated, a subset of the attributes may have been altered. % start marker \requestdef{DestroyAlarm} \begin{tabular}{l} \param{alarm}: ALARM\\[5pt] Errors: \error{Alarm} \end{tabular} % end marker This request destroys an alarm. An alarm is automatically destroyed when the creating client is closed down if the close-down mode is {\bf Destroy}. When an alarm is destroyed, an \event{AlarmNotify} event is generated with a state value of \enum{Destroyed}. % start marker \requestdef{QueryAlarm} \begin{tabular}{l} \param{alarm}: ALARM\\ \end{tabular}\\ $\Rightarrow$\\ \begin{tabular}{l} trigger: TRIGGER\\ delta: INT64\\ events: ALARMEVENTMASK\\ state: ALARMSTATE\\[5pt] Errors: \error{Alarm} \end{tabular} % end marker This request retrieves the current parameters for an Alarm. % start marker \requestdef{SetPriority} \begin{tabular}{l} \param{client-resource}: XID\\ \param{priority}: INT32\\[5pt] Errors: \error{Match} \end{tabular} % end marker This request changes the scheduling priority of the client that created client-resource. If client-resource is \enum{None}, then the priority for the client making the request is changed. A \error{Match} error is generated if client-resource is not \enum{None} and does not name an existing resource in the server. For any two priority values, {\tt A} and {\tt B}, {\tt A} is higher priority if and only if {\tt A} is greater than {\tt B}. The priority of a client is set to 0 when the initial client connection is made. The effect of different client priorities depends on the particular implementation of the extension, and in some cases it may have no effect at all. However, the intention is that higher priority clients will have their requests executed before those of lower priority clients. For most animation applications, it is desirable that animation clients be given priority over nonrealtime clients. This improves the smoothness of the animation on a loaded server. Because a server is free to implement very strict priorities, processing requests for the highest priority client to the exclusion of all others, it is important that a client that may potentially monopolize the whole server, such as an animation that produces continuous output as fast as it can with no rate control, is run at low rather than high priority. % start marker \requestdef{GetPriority} \begin{tabular}{l} \param{client-resource}: XID\\ \end{tabular}\\ $\Rightarrow$\\ \begin{tabular}{l} priority: INT32\\[5pt] Errors: \error{Match} \end{tabular} % end marker This request returns the scheduling priority of the client that created client-resource. If client-resource is \enum{None}, then the priority for the client making the request is returned. A \error{Match} error is generated if client-resource is not \enum{None} and does not name an existing resource in the server. \end{description} \subsection{Events} \begin{description} % start marker \eventdef{CounterNotify} \begin{tabular}{l} \param{counter}: COUNTER \\ \param{wait-value}: INT64 \\ \param{counter-value}: INT64 \\ \param{time}: TIME \\ \param{count}: CARD16 \\ \param{destroyed}: BOOL \end{tabular} % end marker \event{CounterNotify} events may be generated when a client becomes unblocked after an \request{Await} request has been processed. The wait-value is the value being waited for, and counter-value is the actual value of the counter at the time the event was generated. The destroyed flag is TRUE if this request was generated as the result of the destruction of the counter and FALSE otherwise. The time is the server time at which the event was generated. When a client is unblocked, all the \event{CounterNotify} events for the \request{Await} request are generated contiguously. If count is 0, there are no more events to follow for this request. If count is $n$, there are at least $n$ more events to follow. % start marker \eventdef{AlarmNotify} \begin{tabular}{l} \param{alarm}: ALARM \\ \param{counter-value}: INT64 \\ \param{alarm-value}: INT64 \\ \param{state}: ALARMSTATE \\ \param{time}: TIME \end{tabular} % end marker An \event{AlarmNotify} event is generated when an alarm is triggered. alarm-value is the test value of the trigger in the alarm when it was triggered, counter-value is the value of the counter that triggered the alarm, and time is the server time at which the event was generated. The state is the new state of the alarm. If state is \enum{Inactive}, no more events will be generated by this alarm until a \request{ChangeAlarm} request is executed, the alarm is destroyed, or the counter for the alarm is destroyed. \end{description} \section{Encoding} Please refer to the X11 Protocol Encoding document as this section uses syntactic conventions established there and references types defined there. The name of this extension is ``SYNC''. \subsection{New Types} The following new types are used by the extension. \begin{tabbing} \tabstopsC ALARM: CARD32\\ ALARMSTATE:\\ \tabstopsB \> 0 \> Active \\ \> 1 \> Inactive \\ \> 2 \> Destroyed\\ \tabstopsC COUNTER: CARD32\\ INT64: 64-bit signed integer\\ SYSTEMCOUNTER:\\ \> 4 \> COUNTER \> counter \\ \> 8 \> INT64 \> resolution\\ \> 2 \> n \> length of name in bytes\\ \> n \> STRING8 \> name \\ \> p \> \> pad,p=pad(n+2)\\ TESTTYPE:\\ \tabstopsB \> 0 \> PositiveTransition \\ \> 1 \> NegativeTransition \\ \> 2 \> PositiveComparison \\ \> 3 \> NegativeComparison \\ \tabstopsC TRIGGER:\\ \> 4 \> COUNTER \> counter \\ \> 4 \> VALUETYPE \> wait-type \\ \> 8 \> INT64 \> wait-value \\ \> 4 \> TESTTYPE \> test-type \\ VALUETYPE:\\ \tabstopsB \> 0 \> Absolute \\ \> 1 \> Relative \\ \tabstopsC WAITCONDITION:\\ \> 20 \> TRIGGER \> trigger \\ \> 8 \> INT64 \> event threshold\\ \end{tabbing} An INT64 is encoded in 8 bytes with the most significant 4 bytes first followed by the least significant 4 bytes. Within these 4-byte groups, the byte ordering determined during connection setup is used. \subsection{Errors} \begin{tabbing} \tabstopsC {\bf Counter}\\ \> 1 \> 0 \> Error \\ \> 1 \> Base + 0 \> code \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> CARD32 \> bad counter \\ \> 2 \> CARD16 \> minor opcode \\ \> 1 \> CARD8 \> major opcode \\ \> 21 \> \> unused \\ {\bf Alarm}\\ \> 1 \> 0 \> Error \\ \> 1 \> Base + 1 \> code \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> CARD32 \> bad alarm \\ \> 2 \> CARD16 \> minor opcode \\ \> 1 \> CARD8 \> major opcode \\ \> 21 \> \> unused \\ \end{tabbing} \subsection{Requests} \renewcommand{\thefootnote}{\fnsymbol{footnote}} \setcounter{footnote}{1} \setlength{\topsep}{0pt} %vertical space before and after tabbing \begin{tabbing} \tabstopsC {\bf Initialize}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 0 \> minor opcode \\ \> 2 \> 2 \> request length \\ \> 1 \> CARD8 \> major version \\ \> 1 \> CARD8 \> minor version \\ \> 2 \> \> unused \\ $\Rightarrow$\\ \> 1 \> 1 \> Reply \\ \> 1 \> \> unused \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> 0 \> reply length \\ \> 1 \> CARD8 \> major version \\ \> 1 \> CARD8 \> minor version \\ \> 2 \> \> unused \\ \> 20 \> \> unused \\ \\ {\bf ListSystemCounters}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 1 \> minor opcode \\ \> 2 \> 1 \> request length \\ $\Rightarrow$\\ \> 1 \> 1 \> Reply \\ \> 1 \> \> unused \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> {\it variable} \> reply length \\ \> 4 \> INT32 \> list length \\ \> 20 \> \> unused \\ \> 4n \> list of SYSTEMCOUNTER \> system counters \\ \\ {\bf CreateCounter}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 2 \> minor opcode \\ \> 2 \> 4 \> request length \\ \> 4 \> COUNTER \> id\\ \> 8 \> INT64 \> initial value\\ \\ {\bf DestroyCounter}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 6 \> minor opcode\footnotemark[1] \\ \> 2 \> 2 \> request length \\ \> 4 \> COUNTER \> counter \end{tabbing} \footnotetext{A previous version of this document gave an incorrect minor opcode.} \begin{tabbing} \tabstopsC {\bf QueryCounter}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 5 \> minor opcode\footnotemark[1] \\ \> 2 \> 2 \> request length \\ \> 4 \> COUNTER \> counter \\ $\Rightarrow$\\ \> 1 \> 1 \> Reply \\ \> 1 \> \> unused \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> 0 \> reply length \\ \> 8 \> INT64 \> counter value \\ \> 16 \> \> unused\\ \\ {\bf Await}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 7 \> minor opcode\footnotemark[1] \\ \> 2 \> 1 + 7*n \> request length \\ \> 28n \> LISTofWAITCONDITION \> wait conditions \end{tabbing} \footnotetext{A previous version of this document gave an incorrect minor opcode.} \setlength{\topsep}{0pt} %vertical space before and after tabbing \begin{tabbing} \tabstopsC {\bf ChangeCounter}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 4 \> minor opcode\footnotemark[1] \\ \> 2 \> 4 \> request length \\ \> 4 \> COUNTER \> counter \\ \> 8 \> INT64 \> amount \\ \\ {\bf SetCounter}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 3 \> minor opcode\footnotemark[1] \\ \> 2 \> 4 \> request length \\ \> 4 \> COUNTER \> counter \\ \> 8 \> INT64 \> value \\ \\ {\bf CreateAlarm}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 8 \> minor opcode \\ \> 2 \> 3+n \> request length \\ \> 4 \> ALARM \> id \\ \> 4 \> BITMASK \> values mask\\ \tabstopsB \> \> \#x00000001 \> counter \\ \> \> \#x00000002 \> value-type \\ \> \> \#x00000004 \> value \\ \> \> \#x00000008 \> test-type \\ \> \> \#x00000010 \> delta \\ \> \> \#x00000020 \> events \\ \tabstopsC \> 4n \> LISTofVALUE \> values\\ \tabstopsB VALUES\\ \> 4 \> COUNTER \> counter\\ \> 4 \> VALUETYPE \> value-type \\ \> 8 \> INT64 \> value \\ \> 4 \> TESTTYPE \> test-type \\ \> 8 \> INT64 \> delta \\ \> 4 \> BOOL \> events\\ \tabstopsC \\ {\bf ChangeAlarm}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 9 \> minor opcode \\ \> 2 \> 3+n \> request length \\ \> 4 \> ALARM \> id \\ \> 4 \> BITMASK \> values mask \\ \> \> encodings as for {\bf CreateAlarm}\\ \> 4n \> LISTofVALUE \> values\\ \> \> encodings as for {\bf CreateAlarm}\\ \\ {\bf DestroyAlarm}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 11 \> minor opcode\footnotemark[1] \\ \> 2 \> 2 \> request length \\ \> 4 \> ALARM \> alarm \end{tabbing} \footnotetext{A previous version of this document gave an incorrect minor opcode.} \begin{tabbing} \tabstopsC {\bf QueryAlarm}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 10 \> minor opcode\footnotemark[1] \\ \> 2 \> 2 \> request length \\ \> 4 \> ALARM \> alarm \\ $\Rightarrow$\\ \> 1 \> 1 \> Reply \\ \> 1 \> \> unused \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> 2 \> reply length \\ \> 20 \> TRIGGER \> trigger \\ \> 8 \> INT64 \> delta \\ \> 1 \> BOOL \> events \\ \> 1 \> ALARMSTATE \> state \\ \> 2 \> \> unused \\ \\ {\bf SetPriority}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 12 \> minor opcode \\ \> 2 \> 3 \> request length \\ \> 4 \> CARD32 \> id \\ \> 4 \> INT32 \> priority \\ \\ {\bf GetPriority}\\ \> 1 \> CARD8 \> major opcode \\ \> 1 \> 13 \> minor opcode \\ \> 2 \> 1 \> request length \\ \> 4 \> CARD32 \> id \\ $\Rightarrow$\\ \> 1 \> 1 \> Reply \\ \> 1 \> \> unused \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> 0 \> reply length \\ \> 4 \> INT32 \> priority \\ \> 20 \> \> unused\\ \end{tabbing} \subsection{Events} \begin{tabbing} \tabstopsC {\bf CounterNotify}\\ \> 1 \> Base + 0 \> code \\ \> 1 \> 0 \> kind \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> COUNTER \> counter \\ \> 8 \> INT64 \> wait value \\ \> 8 \> INT64 \> counter value \\ \> 4 \> TIME \> timestamp \\ \> 2 \> CARD16 \> count \\ \> 1 \> BOOL \> destroyed \\ \> 1 \> \> unused \\ \\ {\bf AlarmNotify}\\ \> 1 \> Base + 1 \> code \\ \> 1 \> 1 \> kind \\ \> 2 \> CARD16 \> sequence number \\ \> 4 \> ALARM \> alarm \\ \> 8 \> INT64 \> counter value \\ \> 8 \> INT64 \> alarm value \\ \> 4 \> TIME \> timestamp \\ \> 1 \> ALARMSTATE \> state \\ \> 3 \> \> unused\\ \end{tabbing} \end{document}