<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, Jan 26, 2024 at 6:41 PM Brad House via c-ares <<a href="mailto:c-ares@lists.haxx.se">c-ares@lists.haxx.se</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hello!<br>
<br>
c-ares version 1.26.0 is out. Get it as always from <a href="https://c-ares.org/" rel="noreferrer" target="_blank">https://c-ares.org/</a><br>
<br>
This is a feature and bugfix release.<br>
<br>
Features:<br>
o Event Thread support. Integrators are no longer required to monitor the<br>
file descriptors registered by c-ares for events and call ares_process()<br>
when enabling the event thread feature via ARES_OPT_EVENT_THREAD passed<br>
to ares_init_options(). [1]<br>
o Added flags to are_dns_parse() to force RAW packet parsing. [2]<br>
<br>
Changes:<br>
o Mark ares_fds() as deprecated. [3]<br></blockquote><div><br></div><div>Thanks, little step towards removing special cases.. processes are still started with a soft limit of 1024 fd by systemd just to cover applications like this that in a fortify_source=3</div><div>world are aborted by the C library before flying unicorns take over the planet.</div><div>This limit is unreasonable low for todays use.</div><div><br></div><div>Would you take a patch that triggers warnings when this functions are used ? i.e __attribute__((deprecated)) them?</div><div><br></div></div></div>