<html>
<head>
<base href="https://bugs.freedesktop.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_ASSIGNED "
title="ASSIGNED --- - Static pointers leaks"
href="https://bugs.freedesktop.org/show_bug.cgi?id=83770#c2">Comment # 2</a>
on <a class="bz_bug_link
bz_status_ASSIGNED "
title="ASSIGNED --- - Static pointers leaks"
href="https://bugs.freedesktop.org/show_bug.cgi?id=83770">bug 83770</a>
from <span class="vcard"><a class="email" href="mailto:xauoyero@gmail.com" title="Jia Wang <xauoyero@gmail.com>"> <span class="fn">Jia Wang</span></a>
</span></b>
<pre>Created <span class=""><a href="attachment.cgi?id=106863" name="attach_106863" title="MT-safe version">attachment 106863</a> <a href="attachment.cgi?id=106863&action=edit" title="MT-safe version">[details]</a></span> <a href='page.cgi?id=splinter.html&bug=83770&attachment=106863'>[review]</a>
MT-safe version
The new patch is the MT-safe version of the first workaround. And next_id is
protected by lock and also updated in FcObjectOtherTypeFini. It seemed that
there are still other non MT-safe codes. These other codes are not part of this
bug and aren't changed in this patch.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>