diff --git a/p2p/client/basic_port_allocator.cc b/p2p/client/basic_port_allocator.cc index e36f266f15..2815b93476 100644 --- a/p2p/client/basic_port_allocator.cc +++ b/p2p/client/basic_port_allocator.cc @@ -768,6 +768,10 @@ std::vector BasicPortAllocatorSession::GetNetworks() { networks.insert(networks.end(), any_address_networks.begin(), any_address_networks.end()); } + RTC_LOG(LS_INFO) << "Count of networks: " << networks.size(); + for (const rtc::Network* network : networks) { + RTC_LOG(LS_INFO) << network->ToString(); + } } // Filter out link-local networks if needed. if (flags() & PORTALLOCATOR_DISABLE_LINK_LOCAL_NETWORKS) { diff --git a/rtc_base/network.cc b/rtc_base/network.cc index bbcf690915..602ce1742d 100644 --- a/rtc_base/network.cc +++ b/rtc_base/network.cc @@ -154,16 +154,19 @@ bool IsIgnoredIPv6(bool allow_mac_based_ipv6, const InterfaceAddress& ip) { // However, our IPAddress structure doesn't carry that so the // information is lost and causes binding failure. if (IPIsLinkLocal(ip)) { + RTC_LOG(LS_INFO) << "Ignore link local IP:" << ip.ToSensitiveString(); return true; } // Any MAC based IPv6 should be avoided to prevent the MAC tracking. if (IPIsMacBased(ip) && !allow_mac_based_ipv6) { + RTC_LOG(LS_INFO) << "Ignore Mac based IP:" << ip.ToSensitiveString(); return true; } // Ignore deprecated IPv6. if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED) { + RTC_LOG(LS_INFO) << "Ignore deprecated IP:" << ip.ToSensitiveString(); return true; }