},
},
{
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "orig.raw.pktlen",
.ipfix = {
},
},
{
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "orig.raw.pktcount",
.ipfix = {
},
},
{
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "reply.raw.pktlen",
.ipfix = {
},
},
{
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "reply.raw.pktcount",
.ipfix = {
htons(nfct_get_attr_u16(ct, ATTR_REPL_PORT_DST)));
}
- okey_set_u32(&ret[NFCT_ORIG_RAW_PKTLEN],
- nfct_get_attr_u32(ct, ATTR_ORIG_COUNTER_BYTES));
- okey_set_u32(&ret[NFCT_ORIG_RAW_PKTCOUNT],
- nfct_get_attr_u32(ct, ATTR_ORIG_COUNTER_PACKETS));
- okey_set_u32(&ret[NFCT_REPLY_RAW_PKTLEN],
- nfct_get_attr_u32(ct, ATTR_REPL_COUNTER_BYTES));
- okey_set_u32(&ret[NFCT_REPLY_RAW_PKTCOUNT],
- nfct_get_attr_u32(ct, ATTR_REPL_COUNTER_PACKETS));
+ okey_set_u64(&ret[NFCT_ORIG_RAW_PKTLEN],
+ nfct_get_attr_u64(ct, ATTR_ORIG_COUNTER_BYTES));
+ okey_set_u64(&ret[NFCT_ORIG_RAW_PKTCOUNT],
+ nfct_get_attr_u64(ct, ATTR_ORIG_COUNTER_PACKETS));
+ okey_set_u64(&ret[NFCT_REPLY_RAW_PKTLEN],
+ nfct_get_attr_u64(ct, ATTR_REPL_COUNTER_BYTES));
+ okey_set_u64(&ret[NFCT_REPLY_RAW_PKTCOUNT],
+ nfct_get_attr_u64(ct, ATTR_REPL_COUNTER_PACKETS));
okey_set_u32(&ret[NFCT_CT_MARK], nfct_get_attr_u32(ct, ATTR_MARK));
okey_set_u32(&ret[NFCT_CT_ID], nfct_get_attr_u32(ct, ATTR_ID));
},
/* Assume we're interested more in download than upload */
[KEY_RAW_PKTLEN] = {
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "reply.raw.pktlen",
},
[KEY_RAW_PKTCNT] = {
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "reply.raw.pktcount",
},
'timestamp' value use 'flow.end.sec' */
if (ikey_get_u8(&inp[KEY_IP_PROTO]) == IPPROTO_ICMP) {
snprintf(buf, sizeof(buf),
- "%u\t%u\t%s\t%u\t%s\t%u\t%u\t%u",
+ "%u\t%u\t%s\t%u\t%s\t%u\t%llu\t%llu",
ikey_get_u32(&inp[KEY_FLOW_END]),
ikey_get_u8(&inp[KEY_IP_PROTO]),
(char *) ikey_get_ptr(&inp[KEY_IP_SADDR]),
ikey_get_u8(&inp[KEY_ICMP_TYPE]),
(char *) ikey_get_ptr(&inp[KEY_IP_DADDR]),
ikey_get_u8(&inp[KEY_ICMP_CODE]),
- ikey_get_u32(&inp[KEY_RAW_PKTCNT]),
- ikey_get_u32(&inp[KEY_RAW_PKTLEN]));
+ ikey_get_u64(&inp[KEY_RAW_PKTCNT]),
+ ikey_get_u64(&inp[KEY_RAW_PKTLEN]));
} else {
snprintf(buf, sizeof(buf),
- "%u\t%u\t%s\t%u\t%s\t%u\t%u\t%u",
+ "%u\t%u\t%s\t%u\t%s\t%u\t%llu\t%llu",
ikey_get_u32(&inp[KEY_FLOW_END]),
ikey_get_u8(&inp[KEY_IP_PROTO]),
(char *) ikey_get_ptr(&inp[KEY_IP_SADDR]),
ikey_get_u16(&inp[KEY_L4_SPORT]),
(char *) ikey_get_ptr(&inp[KEY_IP_DADDR]),
ikey_get_u16(&inp[KEY_L4_DPORT]),
- ikey_get_u32(&inp[KEY_RAW_PKTCNT]),
- ikey_get_u32(&inp[KEY_RAW_PKTLEN]));
+ ikey_get_u64(&inp[KEY_RAW_PKTCNT]),
+ ikey_get_u64(&inp[KEY_RAW_PKTLEN]));
}
fprintf(priv->of, "%s\n", buf);
.name = "orig.l4.dport",
},
{
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "orig.raw.pktlen",
},
{
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "orig.raw.pktcount",
},
.name = "reply.l4.dport",
},
{
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "reply.raw.pktlen",
},
{
- .type = ULOGD_RET_UINT32,
+ .type = ULOGD_RET_UINT64,
.flags = ULOGD_RETF_NONE,
.name = "reply.raw.pktcount",
},
}
orig_out:
- pp_print(buf_cur, "PKTS", res, PRINTFLOW_ORIG_RAW_PKTCOUNT, u32);
- pp_print(buf_cur, "BYTES", res, PRINTFLOW_ORIG_RAW_PKTLEN, u32);
+ pp_print(buf_cur, "PKTS", res, PRINTFLOW_ORIG_RAW_PKTCOUNT, u64);
+ pp_print(buf_cur, "BYTES", res, PRINTFLOW_ORIG_RAW_PKTLEN, u64);
buf_cur += sprintf(buf_cur, ", REPLY: ");
}
reply_out:
- pp_print(buf_cur, "PKTS", res, PRINTFLOW_REPLY_RAW_PKTCOUNT, u32);
- pp_print(buf_cur, "BYTES", res, PRINTFLOW_REPLY_RAW_PKTLEN, u32);
+ pp_print(buf_cur, "PKTS", res, PRINTFLOW_REPLY_RAW_PKTCOUNT, u64);
+ pp_print(buf_cur, "BYTES", res, PRINTFLOW_REPLY_RAW_PKTLEN, u64);
strcat(buf_cur, "\n");
return 0;