1XSERVER(1)                  General Commands Manual                 XSERVER(1)
2
3
4

NAME

6       Xserver - X Window System display server
7

SYNOPSIS

9       X [option ...]
10

DESCRIPTION

12       X  is  the  generic name for the X Window System display server.  It is
13       frequently a link or a copy of the appropriate server binary for  driv‐
14       ing the most frequently used server on a given machine.
15

STARTING THE SERVER

17       The  X  server  is  usually  started from the X Display Manager program
18       xdm(1) or a similar display manager program.  This utility is run  from
19       the  system  boot  files  and takes care of keeping the server running,
20       prompting for usernames and passwords, and starting up  the  user  ses‐
21       sions.
22
23       Installations  that run more than one window system may need to use the
24       xinit(1) utility instead of a display manager.  However, xinit is to be
25       considered  a tool for building startup scripts and is not intended for
26       use by end users.  Site administrators are strongly urged to use a dis‐
27       play manager, or build other interfaces for novice users.
28
29       The  X  server  may  also  be started directly by the user, though this
30       method is usually reserved for testing and is not recommended for  nor‐
31       mal  operation.   On some platforms, the user must have special permis‐
32       sion to start the X server, often because  access  to  certain  devices
33       (e.g. /dev/mouse) is restricted.
34
35       When  the  X server starts up, it typically takes over the display.  If
36       you are running on a workstation whose console is the display, you  may
37       not be able to log into the console while the server is running.
38

OPTIONS

40       Many X servers have device-specific command line options.  See the man‐
41       ual pages for the individual  servers  for  more  details;  a  list  of
42       server-specific manual pages is provided in the SEE ALSO section below.
43
44       All  of  the X servers accept the command line options described below.
45       Some X servers may have alternative ways of  providing  the  parameters
46       described  here,  but  the values provided via the command line options
47       should override values specified via other mechanisms.
48
49       :displaynumber
50               The X server runs as the given displaynumber, which by  default
51               is  0.   If  multiple  X servers are to run simultaneously on a
52               host, each must have a unique display number.  See the  DISPLAY
53               NAMES  section  of the X(7) manual page to learn how to specify
54               which display number clients should try to use.
55
56       -a number
57               sets pointer acceleration  (i.e.  the  ratio  of  how  much  is
58               reported to how much the user actually moved the pointer).
59
60       -ac     disables  host-based access control mechanisms.  Enables access
61               by any host, and permits any host to modify the access  control
62               list.   Use with extreme caution.  This option exists primarily
63               for running test suites remotely.
64
65       -audit level
66               sets the audit trail level.  The default level  is  1,  meaning
67               only  connection rejections are reported.  Level 2 additionally
68               reports all successful connections and  disconnects.   Level  4
69               enables  messages  from  the  SECURITY  extension,  if present,
70               including generation and revocation of authorizations and  vio‐
71               lations  of  the  security policy.  Level 0 turns off the audit
72               trail.  Audit lines are sent as standard error output.
73
74       -auth authorization-file
75               specifies a file which contains a collection  of  authorization
76               records  used  to authenticate access.  See also the xdm(1) and
77               Xsecurity(7) manual pages.
78
79       -bs     disables backing store support on all screens.
80
81       -br     sets the default root window to  solid  black  instead  of  the
82               standard root weave pattern.
83
84       -c      turns off key-click.
85
86       c volume
87               sets key-click volume (allowable range: 0-100).
88
89       -cc class
90               sets  the  visual  class  for the root window of color screens.
91               The class numbers are as specified  in  the  X  protocol.   Not
92               obeyed by all servers.
93
94       -co filename
95               sets   name   of   RGB   color   database.    The   default  is
96               /usr/share/X11/rgb.
97
98       -core   causes the server to generate a core dump on fatal errors.
99
100       -deferglyphs whichfonts
101               specifies the types  of  fonts  for  which  the  server  should
102               attempt  to  use deferred glyph loading.  whichfonts can be all
103               (all fonts), none (no fonts), or 16 (16 bit fonts only).
104
105       -dpi resolution
106               sets the resolution for all screens, in dots per inch.   To  be
107               used  when  the server cannot determine the screen size(s) from
108               the hardware.
109
110       dpms    enables DPMS (display power management  services),  where  sup‐
111               ported.   The  default state is platform and configuration spe‐
112               cific.
113
114       -dpms   disables DPMS (display power management services).  The default
115               state is platform and configuration specific.
116
117       -extensionextensionName
118               disables  named  extension.    If  an unknown extension name is
119               specified, a list of accepted extension names is printed.
120
121       +extensionextensionName
122               enables named extension.   If  an  unknown  extension  name  is
123               specified, a list of accepted extension names is printed.
124
125       -f volume
126               sets feep (bell) volume (allowable range: 0-100).
127
128       -fc cursorFont
129               sets default cursor font.
130
131       -fn font
132               sets the default font.
133
134       -fp fontPath
135               sets the search path for fonts.  This path is a comma separated
136               list of directories which the X server searches for font  data‐
137               bases.   See  the  FONTS  section  of this manual page for more
138               information and the default list.
139
140       -help   prints a usage message.
141
142       -I      causes all remaining command line arguments to be ignored.
143
144       -maxbigreqsize size
145               sets the maximum big request to size MB.
146
147       -nolisten trans-type
148               disables a transport type.  For example, TCP/IP connections can
149               be disabled with -nolisten tcp.  This option may be issued mul‐
150               tiple times to disable listening to different transport types.
151
152       -noreset
153               prevents a server reset when  the  last  client  connection  is
154               closed.   This  overrides  a  previous  -terminate command line
155               option.
156
157       -p minutes
158               sets screen-saver pattern cycle time in minutes.
159
160       -pn     permits the server to continue running if it fails to establish
161               all  of its well-known sockets (connection points for clients),
162               but establishes at least one.  This option is set by default.
163
164       -nopn   causes the server to exit if it fails to establish all  of  its
165               well-known sockets (connection points for clients).
166
167       -r      turns off auto-repeat.
168
169       r       turns on auto-repeat.
170
171       -s minutes
172               sets screen-saver timeout time in minutes.
173
174       -su     disables save under support on all screens.
175
176       -t number
177               sets  pointer  acceleration threshold in pixels (i.e. after how
178               many pixels pointer acceleration should take effect).
179
180       -terminate
181               causes the server to terminate at server reset, instead of con‐
182               tinuing  to  run.   This  overrides a previous -noreset command
183               line option.
184
185       -to seconds
186               sets default connection timeout in seconds.
187
188       -tst    disables all testing extensions (e.g., XTEST,  XTrap,  XTestEx‐
189               tension1, RECORD).
190
191       ttyxx   ignored, for servers started the ancient way (from init).
192
193       v       sets video-off screen-saver preference.
194
195       -v      sets video-on screen-saver preference.
196
197       -wm     forces  the  default  backing-store  of all windows to be When‐
198               Mapped.  This is a backdoor way  of  getting  backing-store  to
199               apply  to  all  windows.  Although all mapped windows will have
200               backing store, the backing store attribute  value  reported  by
201               the server for a window will be the last value established by a
202               client.  If it has never been set by a client, the server  will
203               report the default value, NotUseful.  This behavior is required
204               by the X protocol,  which  allows  the  server  to  exceed  the
205               client's  backing store expectations but does not provide a way
206               to tell the client that it is doing so.
207
208       -wr     sets the default root window to  solid  white  instead  of  the
209               standard root weave pattern.
210
211       -x extension
212               loads  the  specified  extension  at init.  This is a no-op for
213               most implementations.
214
215       [+-]xinerama
216               enables(+) or disables(-) the XINERAMA extension.  The  default
217               state is platform and configuration specific.
218

SERVER DEPENDENT OPTIONS

220       Some X servers accept the following options:
221
222       -ld kilobytes
223               sets the data space limit of the server to the specified number
224               of kilobytes.  A value of zero makes the data size as large  as
225               possible.   The default value of -1 leaves the data space limit
226               unchanged.
227
228       -lf files
229               sets the number-of-open-files limit of the server to the speci‐
230               fied  number.  A value of zero makes the limit as large as pos‐
231               sible.  The default value of -1 leaves the limit unchanged.
232
233       -ls kilobytes
234               sets the stack space limit of the server to the specified  num‐
235               ber  of  kilobytes.   A  value  of zero makes the stack size as
236               large as possible.  The default value of -1  leaves  the  stack
237               space limit unchanged.
238
239       -logo   turns  on the X Window System logo display in the screen-saver.
240               There is currently no way to change this from a client.
241
242       nologo  turns off the X Window System logo display in the screen-saver.
243               There is currently no way to change this from a client.
244
245       -render default|mono|gray|color  sets  the color allocation policy that
246               will be used by the render extension.
247
248               default selects the default  policy  defined  for  the  display
249                       depth of the X server.
250
251               mono    don't use any color cell.
252
253               gray    use  a  gray  map  of  13  color cells for the X render
254                       extension.
255
256               color   use a color cube of at most 4*4*4 colors  (that  is  64
257                       color cells).
258
259       -dumbSched
260               disables  smart  scheduling on platforms that support the smart
261               scheduler.
262
263       -schedInterval interval
264               sets the smart scheduler's scheduling interval to interval mil‐
265               liseconds.
266

XDMCP OPTIONS

268       X  servers  that  support  XDMCP have the following options.  See the X
269       Display Manager Control Protocol specification for more information.
270
271       -query hostname
272               enables XDMCP and sends Query packets to  the  specified  host‐
273               name.
274
275       -broadcast
276               enable  XDMCP and broadcasts BroadcastQuery packets to the net‐
277               work.  The first responding display manager will be chosen  for
278               the session.
279
280       -multicast [address [hop count]]
281               Enable  XDMCP and multicast BroadcastQuery packets to the  net‐
282               work.  The first responding display manager is chosen  for  the
283               session.   If an address is specified, the multicast is sent to
284               that address.  If no address is  specified,  the  multicast  is
285               sent to the default XDMCP IPv6 multicast group.  If a hop count
286               is specified, it is used as the maximum hop count for the  mul‐
287               ticast.   If no hop count is specified, the multicast is set to
288               a maximum of 1 hop, to prevent the multicast from being  routed
289               beyond the local network.
290
291       -indirect hostname
292               enables  XDMCP  and send IndirectQuery packets to the specified
293               hostname.
294
295       -port port-number
296               uses the specified port-number for XDMCP  packets,  instead  of
297               the  default.  This option must be specified before any -query,
298               -broadcast, -multicast, or -indirect options.
299
300       -from local-address
301               specifies the local address to connect from (useful if the con‐
302               necting  host  has  multiple  network  interfaces).  The local-
303               address may be expressed in any form  acceptable  to  the  host
304               platform's gethostbyname(3) implementation.
305
306       -once   causes  the  server  to  terminate (rather than reset) when the
307               XDMCP session ends.
308
309       -class display-class
310               XDMCP has an additional  display  qualifier  used  in  resource
311               lookup  for  display-specific  options.   This option sets that
312               value, by default it is "MIT-Unspecified" (not  a  very  useful
313               value).
314
315       -cookie xdm-auth-bits
316               When  testing  XDM-AUTHENTICATION-1,  a  private  key is shared
317               between the server and the manager.  This option sets the value
318               of that private data (not that it is very private, being on the
319               command line!).
320
321       -displayID display-id
322               Yet another XDMCP specific value, this one allows  the  display
323               manager  to  identify  each  display  so that it can locate the
324               shared key.
325

XKEYBOARD OPTIONS

327       X servers that support the XKEYBOARD (a.k.a.  "XKB")  extension  accept
328       the  following options.  All layout files specified on the command line
329       must be located in the XKB base directory or a subdirectory, and speci‐
330       fied as the relative path from the XKB base directory.  The default XKB
331       base directory is /usr/lib/X11/xkb.
332
333       [+-]kb  enables(+) or disables(-) the XKEYBOARD extension.
334
335       [+-]accessx [ timeout [ timeout_mask [ feedback [ options_mask ] ] ] ]
336               enables(+) or disables(-) AccessX key sequences.
337
338       -xkbdir directory
339               base directory for keyboard layout files.  This option  is  not
340               available  for setuid X servers (i.e., when the X server's real
341               and effective uids are different).
342
343       -ardelay milliseconds
344               sets the autorepeat delay (length of time in milliseconds  that
345               a key must be depressed before autorepeat starts).
346
347       -arinterval milliseconds
348               sets  the  autorepeat  interval (length of time in milliseconds
349               that should elapse between autorepeat-generated keystrokes).
350
351       -xkbmap filename
352               loads keyboard description in filename on server startup.
353

SECURITY EXTENSION OPTIONS

355       X servers that support the  SECURITY  extension  accept  the  following
356       option:
357
358       -sp filename
359               causes  the server to attempt to read and interpret filename as
360               a security policy file with the format  described  below.   The
361               file is read at server startup and reread at each server reset.
362
363       The  syntax  of  the security policy file is as follows.  Notation: "*"
364       means zero or more occurrences of the preceding element, and "+"  means
365       one or more occurrences.  To interpret <foo/bar>, ignore the text after
366       the /; it is used to distinguish between instances of <foo> in the next
367       section.
368
369       <policy file> ::= <version line> <other line>*
370
371       <version line> ::= <string/v> '\n'
372
373       <other line > ::= <comment> | <access rule> | <site policy> | <blank line>
374
375       <comment> ::= # <not newline>* '\n'
376
377       <blank line> ::= <space> '\n'
378
379       <site policy> ::= sitepolicy <string/sp> '\n'
380
381       <access rule> ::= property <property/ar> <window> <perms> '\n'
382
383       <property> ::= <string>
384
385       <window> ::= any | root | <required property>
386
387       <required property> ::= <property/rp> | <property with value>
388
389       <property with value> ::= <property/rpv> = <string/rv>
390
391       <perms> ::= [ <operation> | <action> | <space> ]*
392
393       <operation> ::= r | w | d
394
395       <action> ::= a | i | e
396
397       <string> ::= <dbl quoted string> | <single quoted string> | <unquoted string>
398
399       <dbl quoted string> ::= <space> " <not dqoute>* " <space>
400
401       <single quoted string> ::= <space> ' <not squote>* ' <space>
402
403       <unquoted string> ::= <space> <not space>+ <space>
404
405       <space> ::= [ ' ' | '\t' ]*
406
407       Character sets:
408
409       <not newline> ::= any character except '\n'
410       <not dqoute>  ::= any character except "
411       <not squote>  ::= any character except '
412       <not space>   ::= any character except those in <space>
413
414       The semantics associated with the above syntax are as follows.
415
416       <version  line>,  the first line in the file, specifies the file format
417       version.  If the server does not recognize the version  <string/v>,  it
418       ignores  the  rest of the file.  The version string for the file format
419       described here is "version-1" .
420
421       Once past the <version line>, lines that do not match the above  syntax
422       are ignored.
423
424       <comment> lines are ignored.
425
426       <sitepolicy> lines are currently ignored.  They are intended to specify
427       the site policies used by the XC-QUERY-SECURITY-1 authorization method.
428
429       <access rule> lines specify how the server should  react  to  untrusted
430       client  requests that affect the X Window property named <property/ar>.
431       The rest of this section describes the  interpretation  of  an  <access
432       rule>.
433
434       For  an  <access  rule>  to apply to a given instance of <property/ar>,
435       <property/ar> must be on a window that is in the set of windows  speci‐
436       fied  by  <window>.   If  <window>  is  any, the rule applies to <prop‐
437       erty/ar> on any window.  If <window>  is  root,  the  rule  applies  to
438       <property/ar> only on root windows.
439
440       If  <window> is <required property>, the following apply.  If <required
441       property> is a <property/rp>, the rule applies when the window also has
442       that <property/rp>, regardless of its value.  If <required property> is
443       a <property with value>, <property/rpv> must also have the value speci‐
444       fied  by <string/rv>.  In this case, the property must have type STRING
445       and format 8, and should contain one or more  null-terminated  strings.
446       If any of the strings match <string/rv>, the rule applies.
447
448       The  definition of string matching is simple case-sensitive string com‐
449       parison with one elaboration: the occurrence of the  character  '*'  in
450       <string/rv> is a wildcard meaning "any string."  A <string/rv> can con‐
451       tain multiple wildcards anywhere in  the  string.   For  example,  "x*"
452       matches  strings  that begin with x, "*x" matches strings that end with
453       x, "*x*" matches strings containing x, and "x*y*" matches strings  that
454       start with x and subsequently contain y.
455
456       There  may  be  multiple <access rule> lines for a given <property/ar>.
457       The rules are tested in the order that they appear in  the  file.   The
458       first rule that applies is used.
459
460       <perms>  specify operations that untrusted clients may attempt, and the
461       actions that the server should take in response to those operations.
462
463       <operation> can be r (read), w (write), or d (delete).   The  following
464       table shows how X Protocol property requests map to these operations in
465       The Open Group server implementation.
466
467       GetProperty    r, or r and d if delete = True
468       ChangeProperty w
469       RotateProperties    r and w
470       DeleteProperty d
471       ListProperties none, untrusted clients can always list all properties
472
473       <action> can be a (allow), i (ignore), or e (error).  Allow means  exe‐
474       cute  the request as if it had been issued by a trusted client.  Ignore
475       means treat the request as a no-op.  In the case of GetProperty, ignore
476       means return an empty property value if the property exists, regardless
477       of its actual value.  Error means do not execute the request and return
478       a  BadAtom  error with the atom set to the property name.  Error is the
479       default action for all properties, including those not  listed  in  the
480       security policy file.
481
482       An  <action> applies to all <operation>s that follow it, until the next
483       <action> is encountered.  Thus, irwad  means  ignore  read  and  write,
484       allow delete.
485
486       GetProperty  and  RotateProperties may do multiple operations (r and d,
487       or r and w).  If different actions apply to the  operations,  the  most
488       severe  action  is  applied  to  the whole request; there is no partial
489       request execution.  The severity ordering is: allow < ignore  <  error.
490       Thus,  if  the  <perms>  for  a  property  are ired (ignore read, error
491       delete), and an untrusted client attempts GetProperty on that  property
492       with  delete  =  True,  an error is returned, but the property value is
493       not.  Similarly, if any of the properties in a RotateProperties do  not
494       allow  both  read  and write, an error is returned without changing any
495       property values.
496
497       Here is an example security policy file.
498
499       version-1
500
501       # Allow reading of application resources, but not writing.
502       property RESOURCE_MANAGER     root      ar iw
503       property SCREEN_RESOURCES     root      ar iw
504
505       # Ignore attempts to use cut buffers.  Giving errors causes apps to crash,
506       # and allowing access may give away too much information.
507       property CUT_BUFFER0          root      irw
508       property CUT_BUFFER1          root      irw
509       property CUT_BUFFER2          root      irw
510       property CUT_BUFFER3          root      irw
511       property CUT_BUFFER4          root      irw
512       property CUT_BUFFER5          root      irw
513       property CUT_BUFFER6          root      irw
514       property CUT_BUFFER7          root      irw
515
516       # If you are using Motif, you probably want these.
517       property _MOTIF_DEFAULT_BINDINGS        rootar iw
518       property _MOTIF_DRAG_WINDOW   root      ar iw
519       property _MOTIF_DRAG_TARGETS  any       ar iw
520       property _MOTIF_DRAG_ATOMS    any       ar iw
521       property _MOTIF_DRAG_ATOM_PAIRS         any ar iw
522
523       # The next two rules let xwininfo -tree work when untrusted.
524       property WM_NAME              any       ar
525
526       # Allow read of WM_CLASS, but only for windows with WM_NAME.
527       # This might be more restrictive than necessary, but demonstrates
528       # the <required property> facility, and is also an attempt to
529       # say "top level windows only."
530       property WM_CLASS             WM_NAME   ar
531
532       # These next three let xlsclients work untrusted.  Think carefully
533       # before including these; giving away the client machine name and command
534       # may be exposing too much.
535       property WM_STATE             WM_NAME   ar
536       property WM_CLIENT_MACHINE    WM_NAME   ar
537       property WM_COMMAND           WM_NAME   ar
538
539       # To let untrusted clients use the standard colormaps created by
540       # xstdcmap, include these lines.
541       property RGB_DEFAULT_MAP      root      ar
542       property RGB_BEST_MAP         root      ar
543       property RGB_RED_MAP          root      ar
544       property RGB_GREEN_MAP        root      ar
545       property RGB_BLUE_MAP         root      ar
546       property RGB_GRAY_MAP         root      ar
547
548       # To let untrusted clients use the color management database created
549       # by xcmsdb, include these lines.
550       property XDCCC_LINEAR_RGB_CORRECTION    rootar
551       property XDCCC_LINEAR_RGB_MATRICES      rootar
552       property XDCCC_GRAY_SCREENWHITEPOINT    rootar
553       property XDCCC_GRAY_CORRECTION          rootar
554
555       # To let untrusted clients use the overlay visuals that many vendors
556       # support, include this line.
557       property SERVER_OVERLAY_VISUALS         rootar
558
559       # Dumb examples to show other capabilities.
560
561       # oddball property names and explicit specification of error conditions
562       property "property with spaces"         'property with "'aw er ed
563
564       # Allow deletion of Woo-Hoo if window also has property OhBoy with value
565       # ending in "son".  Reads and writes will cause an error.
566       property Woo-Hoo              OhBoy = "*son"ad
567
568

NETWORK CONNECTIONS

570       The X server supports client connections via a platform-dependent  sub‐
571       set  of the following transport types: TCPIP, Unix Domain sockets, DEC‐
572       net, and several varieties of SVR4 local connections.  See the  DISPLAY
573       NAMES  section  of  the  X(7) manual page to learn how to specify which
574       transport type clients should try to use.
575

GRANTING ACCESS

577       The X server implements a platform-dependent subset  of  the  following
578       authorization  protocols: MIT-MAGIC-COOKIE-1, XDM-AUTHORIZATION-1, XDM-
579       AUTHORIZATION-2, SUN-DES-1, and MIT-KERBEROS-5.  See  the  Xsecurity(7)
580       manual page for information on the operation of these protocols.
581
582       Authorization  data  required  by  the above protocols is passed to the
583       server in a private file named with  the  -auth  command  line  option.
584       Each  time  the  server is about to accept the first connection after a
585       reset (or when the server is starting), it reads this  file.   If  this
586       file contains any authorization records, the local host is not automat‐
587       ically allowed access to the server, and only clients which send one of
588       the authorization records contained in the file in the connection setup
589       information will be allowed access.  See the  Xau  manual  page  for  a
590       description  of the binary format of this file.  See xauth(1) for main‐
591       tenance of this file, and distribution of its contents to remote hosts.
592
593       The X server also uses a host-based access control  list  for  deciding
594       whether  or  not  to  accept  connections  from clients on a particular
595       machine.  If no other authorization mechanism is being used, this  list
596       initially  consists  of the host on which the server is running as well
597       as any machines listed in the file /etc/Xn.hosts, where n is  the  dis‐
598       play number of the server.  Each line of the file should contain either
599       an Internet hostname (e.g. expo.lcs.mit.edu) or a  DECnet  hostname  in
600       double  colon  format  (e.g.  hydra::) or a complete name in the format
601       family:name as described in the xhost(1) manual page.  There should  be
602       no leading or trailing spaces on any lines.  For example:
603
604               joesworkstation
605               corporate.company.com
606               star::
607               inet:bigcpu
608               local:
609
610       Users  can  add  or  remove  hosts from this list and enable or disable
611       access control using the xhost command from the  same  machine  as  the
612       server.
613
614       If  the  X  FireWall  Proxy  (xfwp) is being used without a sitepolicy,
615       host-based authorization must be turned on for clients to  be  able  to
616       connect to the X server via the xfwp.  If xfwp is run without a config‐
617       uration file and thus no sitepolicy is defined, if xfwp is using  an  X
618       server  where xhost + has been run to turn off host-based authorization
619       checks, when a client tries to connect to this X server via xfwp, the X
620       server  will  deny  the  connection.   See xfwp(1) for more information
621       about this proxy.
622
623       The X protocol intrinsically does not have any notion of window  opera‐
624       tion  permissions or place any restrictions on what a client can do; if
625       a program can connect to a display, it has full run of the  screen.   X
626       servers that support the SECURITY extension fare better because clients
627       can be designated untrusted via the authorization they use to  connect;
628       see  the xauth(1) manual page for details.  Restrictions are imposed on
629       untrusted clients that curtail the mischief they can do.  See the SECU‐
630       RITY extension specification for a complete list of these restrictions.
631
632       Sites  that  have better authentication and authorization systems might
633       wish to make use of the hooks in the libraries and the server  to  pro‐
634       vide additional security models.
635

SIGNALS

637       The X server attaches special meaning to the following signals:
638
639       SIGHUP  This  signal  causes  the  server to close all existing connec‐
640               tions, free all resources, and restore  all  defaults.   It  is
641               sent  by  the  display  manager  whenever  the main user's main
642               application (usually an xterm or window manager) exits to force
643               the server to clean up and prepare for the next user.
644
645       SIGTERM This signal causes the server to exit cleanly.
646
647       SIGUSR1 This signal is used quite differently from either of the above.
648               When the server starts, it checks to see if  it  has  inherited
649               SIGUSR1 as SIG_IGN instead of the usual SIG_DFL.  In this case,
650               the server sends a SIGUSR1 to its parent process after  it  has
651               set  up  the various connection schemes.  Xdm uses this feature
652               to recognize when connecting to the server is possible.
653

FONTS

655       The X server  can  obtain  fonts  from  directories  and/or  from  font
656       servers.   The  list  of directories and font servers the X server uses
657       when trying to open a font is controlled by the font path.
658
659       The default font  path  is  unix/:7100,  catalogue:/etc/X11/fontpath.d,
660       built-ins .
661
662       The  font  path  can be set with the -fp option or by xset(1) after the
663       server has started.
664

FILES

666       /etc/Xn.hosts                 Initial access control list  for  display
667                                     number n
668
669       /usr/lib/X11/fonts/misc,/usr/lib/X11/fonts/75dpi,/usr/lib/X11/fonts/100dpi
670                                     Bitmap font directories
671
672       /usr/lib/X11/fonts/TTF,/usr/lib/X11/fonts/Type1
673                                     Outline font directories
674
675       /usr/share/X11/rgb.txt        Color database
676
677       /tmp/.X11-unix/Xn             Unix domain socket for display number n
678
679       /tmp/rcXn                     Kerberos 5 replay cache for display  num‐
680                                     ber n
681
682       /usr/adm/Xnmsgs               Error  log  file  for display number n if
683                                     run from init(8)
684
685       /usr/lib/X11/xdm/xdm-errors   Default error log file if the  server  is
686                                     run from xdm(1)
687

SEE ALSO

689       General information: X(7)
690
691       Protocols:  X  Window  System  Protocol, The X Font Service Protocol, X
692       Display Manager Control Protocol
693
694       Fonts: bdftopcf(1), mkfontdir(1), mkfontscale(1), xfs(1),  xlsfonts(1),
695       xfontsel(1), xfd(1), X Logical Font Description Conventions
696
697       Security:  Xsecurity(7),  xauth(1),  Xau(1), xdm(1), xhost(1), xfwp(1),
698       Security Extension Specification
699
700       Starting the server: xdm(1), xinit(1)
701
702       Controlling the server once started: xset(1), xsetroot(1), xhost(1)
703
704       Server-specific man pages: Xorg(1), Xdmx(1), Xnest(1),  Xvfb(1),  XDar‐
705       win(1), XWin(1).
706
707       Server  internal documentation: Definition of the Porting Layer for the
708       X v11 Sample Server
709

AUTHORS

711       The sample server was originally written by Susan Angebranndt,  Raymond
712       Drewry,  Philip Karlton, and Todd Newman, from Digital Equipment Corpo‐
713       ration, with support from a large cast.  It has since been  extensively
714       rewritten  by  Keith Packard and Bob Scheifler, from MIT.  Dave Wiggins
715       took over post-R5 and made substantial improvements.
716
717
718
719X Version 11                  xorg-server 1.3.0.0                   XSERVER(1)
Impressum