table of contents
other versions
- buster 0.8.0-4
- buster-backports 0.17.0-7~bpo10+2
- testing 0.18.0+ds-2
- unstable 0.18.0+ds-2
- experimental 0.21.0+ds-1
inject(8) | System Manager's Manual | inject(8) |
NAME¶
inject - injects appropriate error into function if input call chain and predicates are satisfied. Uses Linux eBPF/bcc.SYNOPSIS¶
inject -h [-I header] [-P probability] [-v] [-C count] mode specDESCRIPTION¶
inject injects errors into specified kernel functionality when a given call chain and associated predicates are satsified.WARNING: This tool injects failures into key kernel functions and may crash the kernel. You should know what you're doing if you're using this tool.
This makes use of a Linux 4.16 feature (bpf_override_return())
Since this uses BPF, only the root user can use this tool.
REQUIREMENTS¶
CONFIG_BPF, CONFIG_BPF_KPROBE_OVERRIDE, bccOPTIONS¶
- -h
- Print usage message.
- -v
- Display the generated BPF program, for debugging or modification.
- -I header
- Necessary headers to be included.
- -P probability
- Optional probability of failure, default 1.
- -C count
- Number of errors to inject before stopping, default never stops.
EXAMPLES¶
Please see inject_example.txtSOURCE¶
This is from bcc.Also look in the bcc distribution for a companion _examples.txt file containing example usage, output, and commentary for this tool.
OS¶
LinuxSTABILITY¶
Unstable - in development.AUTHOR¶
Howard McLauchlan2018-03-16 | USER COMMANDS |