doc: mention that the login tty is reused

This commit is contained in:
Earnestly 2017-12-11 16:47:46 +00:00
parent a488db27fa
commit 8d21a607bf
1 changed files with 10 additions and 9 deletions

17
README
View File

@ -6,22 +6,23 @@ INTRODUCTION
an Xorg server. an Xorg server.
It started life as a proof of concept while attempting to learn how both It started life as a proof of concept while attempting to learn how both
xinit(1) and startx(1) worked. xinit and startx worked.
It is not a direct replacement however as it provides a different, more It is not a direct replacement however as it provides a different, more
limited, interface. limited, interface.
Some of these differences are as follows: Some of these major differences are listed here:
* The Xorg server's command-line is hard coded and not exposed to the * The server's command-line is hard coded and not exposed to the
user. user.
* The server starts on the same tty the user logged in on.
* The server doesn't listen on anything except unix domain sockets. * The server doesn't listen on anything except unix domain sockets.
* The first DISPLAY is 1 instead of 0 contrary to what X(7) suggests. * The first DISPLAY is 1 instead of 0 contrary to what X(7) suggests.
* xauth entries are overwritten if the displayname is identical. * xauth entries are overwritten if the displayname is identical.
* Corresponding xauth entries are unconditionally removed when the Xorg * Corresponding xauth entries are unconditionally removed when the server
server is terminated. exits.
* The Xorg server uses the -noreset flag. * The server uses the -noreset flag.
* /usr/lib/xorg-server/Xorg is used directly, bypassing Xorg.wrap. * /usr/lib/xorg-server/Xorg is used directly to bypass Xorg.wrap.
* While XAUTHORITY is still honoured, $XDG_CONFIG_HOME/sx/xauthfile is * While XAUTHORITY is still honoured, $XDG_CONFIG_HOME/sx/xauthfile is
used instead of $HOME/.Xauthority used instead of $HOME/.Xauthority
* Very little proxy error checking is used preferring instead to let each * Very little proxy error checking is used preferring instead to let each
@ -32,7 +33,7 @@ INTRODUCTION
required to be executable. required to be executable.
For a rational on why this exists, the author invites the reader to look For a rational on why this exists, the author invites the reader to look
over the source code for both xinit(1) and startx(1). over the source code for both xinit and startx.
REQUIRES REQUIRES