Set TCP_NODELAY on the socket used for intercept IPC to reduce latency.

On some systems, Nagle's algorithm was delaying receipt of the data,
causing commands with intercept or log_subcmds to run slowly.
Related to Bug #1034.
This commit is contained in:
Todd C. Miller
2022-06-20 16:22:29 -06:00
parent b10201bdc4
commit 332a6afe77
2 changed files with 10 additions and 1 deletions

View File

@@ -25,6 +25,7 @@
#include <sys/socket.h>
#include <netinet/in.h>
#include <netinet/tcp.h>
#if defined(HAVE_STDINT_H)
# include <stdint.h>
@@ -946,7 +947,7 @@ intercept_accept_cb(int fd, int what, void *v)
struct sudo_event_base *evbase = sudo_ev_get_base(&closure->ev);
struct sockaddr_in sin;
socklen_t sin_len = sizeof(sin);
int client_sock, flags;
int client_sock, flags, on = 1;
debug_decl(intercept_accept_cb, SUDO_DEBUG_EXEC);
if (closure->state != RECV_CONNECTION) {
@@ -967,6 +968,9 @@ intercept_accept_cb(int fd, int what, void *v)
if (flags != -1)
(void)fcntl(client_sock, F_SETFL, flags | O_NONBLOCK);
/* Send data immediately, we need low latency IPC. */
(void)setsockopt(client_sock, IPPROTO_TCP, TCP_NODELAY, &on, sizeof(on));
/*
* Create a new intercept closure and register an event for client_sock.
*/