@@ -1893,7 +1893,8 @@ void CConnman::DisconnectNodes()
1893
1893
// Add to reconnection list if appropriate. We don't reconnect right here, because
1894
1894
// the creation of a connection is a blocking operation (up to several seconds),
1895
1895
// and we don't want to hold up the socket handler thread for that long.
1896
- if (pnode->m_transport ->ShouldReconnectV1 () && !DisableV1OnClearnet (pnode->addr .GetNetClass ())) {
1896
+ std::string str = " ### DisableV1OnClearnet() called from DisconnectNodes() with addr= " + pnode->addr .ToStringAddrPort ();
1897
+ if (pnode->m_transport ->ShouldReconnectV1 () && !DisableV1OnClearnet (pnode->addr .GetNetClass (), str)) {
1897
1898
reconnections_to_add.push_back ({
1898
1899
.addr_connect = pnode->addr ,
1899
1900
.grant = std::move (pnode->grantOutbound ),
@@ -1903,6 +1904,10 @@ void CConnman::DisconnectNodes()
1903
1904
LogPrint (BCLog::NET, " retrying with v1 transport protocol for peer=%d\n " , pnode->GetId ());
1904
1905
}
1905
1906
1907
+ if (pnode->m_transport ->ShouldReconnectV1 () && DisableV1OnClearnet (pnode->addr .GetNetClass (), str)) {
1908
+ LogPrintf (" ### 2. DisconnectNodes(): NOT RETRYING WITH V1 FOR %s\n " , pnode->addr .ToStringAddrPort ());
1909
+ }
1910
+
1906
1911
// release outbound grant (if any)
1907
1912
pnode->grantOutbound .Release ();
1908
1913
@@ -2436,8 +2441,9 @@ bool CConnman::MultipleManualOrFullOutboundConns(Network net) const
2436
2441
return m_network_conn_counts[net] > 1 ;
2437
2442
}
2438
2443
2439
- bool CConnman::DisableV1OnClearnet (Network net) const
2444
+ bool CConnman::DisableV1OnClearnet (Network net, std::string str ) const
2440
2445
{
2446
+ LogPrintf (" %s\n " , str);
2441
2447
return disable_v1conn_clearnet && (net == NET_IPV4 || net == NET_IPV6);
2442
2448
}
2443
2449
@@ -2742,7 +2748,9 @@ void CConnman::ThreadOpenConnections(const std::vector<std::string> connect)
2742
2748
}
2743
2749
2744
2750
bool use_v2transport (addr.nServices & GetLocalServices () & NODE_P2P_V2);
2745
- if (DisableV1OnClearnet (addr.GetNetClass ()) && !use_v2transport) {
2751
+ std::string str = " ### DisableV1OnClearnet() called from ThreadOpenConnections() with addr= " + addr.ToStringAddrPort ();
2752
+ if (DisableV1OnClearnet (addr.GetNetClass (), str) && !use_v2transport) {
2753
+ LogPrintf (" ### 3. ThreadOpenConnections(): %s selected from addrman for making BLOCK + FEELER + OUTBOUND is NOT V2 - WE LOOP AGAIN FOR V2\n " , addr.ToStringAddrPort ());
2746
2754
continue ;
2747
2755
}
2748
2756
@@ -2929,15 +2937,20 @@ void CConnman::OpenNetworkConnection(const CAddress& addrConnect, bool fCountFai
2929
2937
return ;
2930
2938
2931
2939
enum Network netclass;
2940
+ std::string str;
2941
+ std::string host;
2932
2942
if (pszDest) {
2933
- std::string host ;
2943
+ LogPrintf ( " pszDest = %s \n " , std::string (pszDest)) ;
2934
2944
uint16_t port;
2935
2945
SplitHostPort (std::string (pszDest), port, host);
2936
2946
netclass = LookupHost (host, false ).value ().GetNetClass ();
2947
+ str = " ### DisableV1OnClearnet() called from OpenNetworkConnection() with addr= " + host;
2937
2948
} else {
2938
2949
netclass = addrConnect.GetNetClass ();
2950
+ str = " ### DisableV1OnClearnet() called from OpenNetworkConnection() with addr= " + addrConnect.ToStringAddrPort ();
2939
2951
}
2940
- if (DisableV1OnClearnet (netclass) && !use_v2transport) {
2952
+ if (DisableV1OnClearnet (netclass, str) && !use_v2transport) {
2953
+ LogPrintf (" ### 4. OpenNetworkConnection(): %s does NOT look like a potential V2 PEER\n " , pszDest ? host : addrConnect.ToStringAddrPort ());
2941
2954
return ;
2942
2955
}
2943
2956
0 commit comments