1.. SPDX-License-Identifier: GPL-2.0 2 3=========== 4Using KUnit 5=========== 6 7The purpose of this document is to describe what KUnit is, how it works, how it 8is intended to be used, and all the concepts and terminology that are needed to 9understand it. This guide assumes a working knowledge of the Linux kernel and 10some basic knowledge of testing. 11 12For a high level introduction to KUnit, including setting up KUnit for your 13project, see :doc:`start`. 14 15Organization of this document 16============================= 17 18This document is organized into two main sections: Testing and Common Patterns. 19The first covers what unit tests are and how to use KUnit to write them. The 20second covers common testing patterns, e.g. how to isolate code and make it 21possible to unit test code that was otherwise un-unit-testable. 22 23Testing 24======= 25 26What is KUnit? 27-------------- 28 29"K" is short for "kernel" so "KUnit" is the "(Linux) Kernel Unit Testing 30Framework." KUnit is intended first and foremost for writing unit tests; it is 31general enough that it can be used to write integration tests; however, this is 32a secondary goal. KUnit has no ambition of being the only testing framework for 33the kernel; for example, it does not intend to be an end-to-end testing 34framework. 35 36What is Unit Testing? 37--------------------- 38 39A `unit test <https://martinfowler.com/bliki/UnitTest.html>`_ is a test that 40tests code at the smallest possible scope, a *unit* of code. In the C 41programming language that's a function. 42 43Unit tests should be written for all the publicly exposed functions in a 44compilation unit; so that is all the functions that are exported in either a 45*class* (defined below) or all functions which are **not** static. 46 47Writing Tests 48------------- 49 50Test Cases 51~~~~~~~~~~ 52 53The fundamental unit in KUnit is the test case. A test case is a function with 54the signature ``void (*)(struct kunit *test)``. It calls a function to be tested 55and then sets *expectations* for what should happen. For example: 56 57.. code-block:: c 58 59 void example_test_success(struct kunit *test) 60 { 61 } 62 63 void example_test_failure(struct kunit *test) 64 { 65 KUNIT_FAIL(test, "This test never passes."); 66 } 67 68In the above example ``example_test_success`` always passes because it does 69nothing; no expectations are set, so all expectations pass. On the other hand 70``example_test_failure`` always fails because it calls ``KUNIT_FAIL``, which is 71a special expectation that logs a message and causes the test case to fail. 72 73Expectations 74~~~~~~~~~~~~ 75An *expectation* is a way to specify that you expect a piece of code to do 76something in a test. An expectation is called like a function. A test is made 77by setting expectations about the behavior of a piece of code under test; when 78one or more of the expectations fail, the test case fails and information about 79the failure is logged. For example: 80 81.. code-block:: c 82 83 void add_test_basic(struct kunit *test) 84 { 85 KUNIT_EXPECT_EQ(test, 1, add(1, 0)); 86 KUNIT_EXPECT_EQ(test, 2, add(1, 1)); 87 } 88 89In the above example ``add_test_basic`` makes a number of assertions about the 90behavior of a function called ``add``; the first parameter is always of type 91``struct kunit *``, which contains information about the current test context; 92the second parameter, in this case, is what the value is expected to be; the 93last value is what the value actually is. If ``add`` passes all of these 94expectations, the test case, ``add_test_basic`` will pass; if any one of these 95expectations fails, the test case will fail. 96 97It is important to understand that a test case *fails* when any expectation is 98violated; however, the test will continue running, potentially trying other 99expectations until the test case ends or is otherwise terminated. This is as 100opposed to *assertions* which are discussed later. 101 102To learn about more expectations supported by KUnit, see :doc:`api/test`. 103 104.. note:: 105 A single test case should be pretty short, pretty easy to understand, 106 focused on a single behavior. 107 108For example, if we wanted to properly test the add function above, we would 109create additional tests cases which would each test a different property that an 110add function should have like this: 111 112.. code-block:: c 113 114 void add_test_basic(struct kunit *test) 115 { 116 KUNIT_EXPECT_EQ(test, 1, add(1, 0)); 117 KUNIT_EXPECT_EQ(test, 2, add(1, 1)); 118 } 119 120 void add_test_negative(struct kunit *test) 121 { 122 KUNIT_EXPECT_EQ(test, 0, add(-1, 1)); 123 } 124 125 void add_test_max(struct kunit *test) 126 { 127 KUNIT_EXPECT_EQ(test, INT_MAX, add(0, INT_MAX)); 128 KUNIT_EXPECT_EQ(test, -1, add(INT_MAX, INT_MIN)); 129 } 130 131 void add_test_overflow(struct kunit *test) 132 { 133 KUNIT_EXPECT_EQ(test, INT_MIN, add(INT_MAX, 1)); 134 } 135 136Notice how it is immediately obvious what all the properties that we are testing 137for are. 138 139Assertions 140~~~~~~~~~~ 141 142KUnit also has the concept of an *assertion*. An assertion is just like an 143expectation except the assertion immediately terminates the test case if it is 144not satisfied. 145 146For example: 147 148.. code-block:: c 149 150 static void mock_test_do_expect_default_return(struct kunit *test) 151 { 152 struct mock_test_context *ctx = test->priv; 153 struct mock *mock = ctx->mock; 154 int param0 = 5, param1 = -5; 155 const char *two_param_types[] = {"int", "int"}; 156 const void *two_params[] = {¶m0, ¶m1}; 157 const void *ret; 158 159 ret = mock->do_expect(mock, 160 "test_printk", test_printk, 161 two_param_types, two_params, 162 ARRAY_SIZE(two_params)); 163 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ret); 164 KUNIT_EXPECT_EQ(test, -4, *((int *) ret)); 165 } 166 167In this example, the method under test should return a pointer to a value, so 168if the pointer returned by the method is null or an errno, we don't want to 169bother continuing the test since the following expectation could crash the test 170case. `ASSERT_NOT_ERR_OR_NULL(...)` allows us to bail out of the test case if 171the appropriate conditions have not been satisfied to complete the test. 172 173Test Suites 174~~~~~~~~~~~ 175 176Now obviously one unit test isn't very helpful; the power comes from having 177many test cases covering all of a unit's behaviors. Consequently it is common 178to have many *similar* tests; in order to reduce duplication in these closely 179related tests most unit testing frameworks - including KUnit - provide the 180concept of a *test suite*. A *test suite* is just a collection of test cases 181for a unit of code with a set up function that gets invoked before every test 182case and then a tear down function that gets invoked after every test case 183completes. 184 185Example: 186 187.. code-block:: c 188 189 static struct kunit_case example_test_cases[] = { 190 KUNIT_CASE(example_test_foo), 191 KUNIT_CASE(example_test_bar), 192 KUNIT_CASE(example_test_baz), 193 {} 194 }; 195 196 static struct kunit_suite example_test_suite = { 197 .name = "example", 198 .init = example_test_init, 199 .exit = example_test_exit, 200 .test_cases = example_test_cases, 201 }; 202 kunit_test_suite(example_test_suite); 203 204In the above example the test suite, ``example_test_suite``, would run the test 205cases ``example_test_foo``, ``example_test_bar``, and ``example_test_baz``; 206each would have ``example_test_init`` called immediately before it and would 207have ``example_test_exit`` called immediately after it. 208``kunit_test_suite(example_test_suite)`` registers the test suite with the 209KUnit test framework. 210 211.. note:: 212 A test case will only be run if it is associated with a test suite. 213 214``kunit_test_suite(...)`` is a macro which tells the linker to put the specified 215test suite in a special linker section so that it can be run by KUnit either 216after late_init, or when the test module is loaded (depending on whether the 217test was built in or not). 218 219For more information on these types of things see the :doc:`api/test`. 220 221Common Patterns 222=============== 223 224Isolating Behavior 225------------------ 226 227The most important aspect of unit testing that other forms of testing do not 228provide is the ability to limit the amount of code under test to a single unit. 229In practice, this is only possible by being able to control what code gets run 230when the unit under test calls a function and this is usually accomplished 231through some sort of indirection where a function is exposed as part of an API 232such that the definition of that function can be changed without affecting the 233rest of the code base. In the kernel this primarily comes from two constructs, 234classes, structs that contain function pointers that are provided by the 235implementer, and architecture-specific functions which have definitions selected 236at compile time. 237 238Classes 239~~~~~~~ 240 241Classes are not a construct that is built into the C programming language; 242however, it is an easily derived concept. Accordingly, pretty much every project 243that does not use a standardized object oriented library (like GNOME's GObject) 244has their own slightly different way of doing object oriented programming; the 245Linux kernel is no exception. 246 247The central concept in kernel object oriented programming is the class. In the 248kernel, a *class* is a struct that contains function pointers. This creates a 249contract between *implementers* and *users* since it forces them to use the 250same function signature without having to call the function directly. In order 251for it to truly be a class, the function pointers must specify that a pointer 252to the class, known as a *class handle*, be one of the parameters; this makes 253it possible for the member functions (also known as *methods*) to have access 254to member variables (more commonly known as *fields*) allowing the same 255implementation to have multiple *instances*. 256 257Typically a class can be *overridden* by *child classes* by embedding the 258*parent class* in the child class. Then when a method provided by the child 259class is called, the child implementation knows that the pointer passed to it is 260of a parent contained within the child; because of this, the child can compute 261the pointer to itself because the pointer to the parent is always a fixed offset 262from the pointer to the child; this offset is the offset of the parent contained 263in the child struct. For example: 264 265.. code-block:: c 266 267 struct shape { 268 int (*area)(struct shape *this); 269 }; 270 271 struct rectangle { 272 struct shape parent; 273 int length; 274 int width; 275 }; 276 277 int rectangle_area(struct shape *this) 278 { 279 struct rectangle *self = container_of(this, struct shape, parent); 280 281 return self->length * self->width; 282 }; 283 284 void rectangle_new(struct rectangle *self, int length, int width) 285 { 286 self->parent.area = rectangle_area; 287 self->length = length; 288 self->width = width; 289 } 290 291In this example (as in most kernel code) the operation of computing the pointer 292to the child from the pointer to the parent is done by ``container_of``. 293 294Faking Classes 295~~~~~~~~~~~~~~ 296 297In order to unit test a piece of code that calls a method in a class, the 298behavior of the method must be controllable, otherwise the test ceases to be a 299unit test and becomes an integration test. 300 301A fake just provides an implementation of a piece of code that is different than 302what runs in a production instance, but behaves identically from the standpoint 303of the callers; this is usually done to replace a dependency that is hard to 304deal with, or is slow. 305 306A good example for this might be implementing a fake EEPROM that just stores the 307"contents" in an internal buffer. For example, let's assume we have a class that 308represents an EEPROM: 309 310.. code-block:: c 311 312 struct eeprom { 313 ssize_t (*read)(struct eeprom *this, size_t offset, char *buffer, size_t count); 314 ssize_t (*write)(struct eeprom *this, size_t offset, const char *buffer, size_t count); 315 }; 316 317And we want to test some code that buffers writes to the EEPROM: 318 319.. code-block:: c 320 321 struct eeprom_buffer { 322 ssize_t (*write)(struct eeprom_buffer *this, const char *buffer, size_t count); 323 int flush(struct eeprom_buffer *this); 324 size_t flush_count; /* Flushes when buffer exceeds flush_count. */ 325 }; 326 327 struct eeprom_buffer *new_eeprom_buffer(struct eeprom *eeprom); 328 void destroy_eeprom_buffer(struct eeprom *eeprom); 329 330We can easily test this code by *faking out* the underlying EEPROM: 331 332.. code-block:: c 333 334 struct fake_eeprom { 335 struct eeprom parent; 336 char contents[FAKE_EEPROM_CONTENTS_SIZE]; 337 }; 338 339 ssize_t fake_eeprom_read(struct eeprom *parent, size_t offset, char *buffer, size_t count) 340 { 341 struct fake_eeprom *this = container_of(parent, struct fake_eeprom, parent); 342 343 count = min(count, FAKE_EEPROM_CONTENTS_SIZE - offset); 344 memcpy(buffer, this->contents + offset, count); 345 346 return count; 347 } 348 349 ssize_t fake_eeprom_write(struct eeprom *parent, size_t offset, const char *buffer, size_t count) 350 { 351 struct fake_eeprom *this = container_of(parent, struct fake_eeprom, parent); 352 353 count = min(count, FAKE_EEPROM_CONTENTS_SIZE - offset); 354 memcpy(this->contents + offset, buffer, count); 355 356 return count; 357 } 358 359 void fake_eeprom_init(struct fake_eeprom *this) 360 { 361 this->parent.read = fake_eeprom_read; 362 this->parent.write = fake_eeprom_write; 363 memset(this->contents, 0, FAKE_EEPROM_CONTENTS_SIZE); 364 } 365 366We can now use it to test ``struct eeprom_buffer``: 367 368.. code-block:: c 369 370 struct eeprom_buffer_test { 371 struct fake_eeprom *fake_eeprom; 372 struct eeprom_buffer *eeprom_buffer; 373 }; 374 375 static void eeprom_buffer_test_does_not_write_until_flush(struct kunit *test) 376 { 377 struct eeprom_buffer_test *ctx = test->priv; 378 struct eeprom_buffer *eeprom_buffer = ctx->eeprom_buffer; 379 struct fake_eeprom *fake_eeprom = ctx->fake_eeprom; 380 char buffer[] = {0xff}; 381 382 eeprom_buffer->flush_count = SIZE_MAX; 383 384 eeprom_buffer->write(eeprom_buffer, buffer, 1); 385 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0); 386 387 eeprom_buffer->write(eeprom_buffer, buffer, 1); 388 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0); 389 390 eeprom_buffer->flush(eeprom_buffer); 391 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0xff); 392 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0xff); 393 } 394 395 static void eeprom_buffer_test_flushes_after_flush_count_met(struct kunit *test) 396 { 397 struct eeprom_buffer_test *ctx = test->priv; 398 struct eeprom_buffer *eeprom_buffer = ctx->eeprom_buffer; 399 struct fake_eeprom *fake_eeprom = ctx->fake_eeprom; 400 char buffer[] = {0xff}; 401 402 eeprom_buffer->flush_count = 2; 403 404 eeprom_buffer->write(eeprom_buffer, buffer, 1); 405 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0); 406 407 eeprom_buffer->write(eeprom_buffer, buffer, 1); 408 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0xff); 409 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0xff); 410 } 411 412 static void eeprom_buffer_test_flushes_increments_of_flush_count(struct kunit *test) 413 { 414 struct eeprom_buffer_test *ctx = test->priv; 415 struct eeprom_buffer *eeprom_buffer = ctx->eeprom_buffer; 416 struct fake_eeprom *fake_eeprom = ctx->fake_eeprom; 417 char buffer[] = {0xff, 0xff}; 418 419 eeprom_buffer->flush_count = 2; 420 421 eeprom_buffer->write(eeprom_buffer, buffer, 1); 422 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0); 423 424 eeprom_buffer->write(eeprom_buffer, buffer, 2); 425 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0xff); 426 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0xff); 427 /* Should have only flushed the first two bytes. */ 428 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[2], 0); 429 } 430 431 static int eeprom_buffer_test_init(struct kunit *test) 432 { 433 struct eeprom_buffer_test *ctx; 434 435 ctx = kunit_kzalloc(test, sizeof(*ctx), GFP_KERNEL); 436 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ctx); 437 438 ctx->fake_eeprom = kunit_kzalloc(test, sizeof(*ctx->fake_eeprom), GFP_KERNEL); 439 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ctx->fake_eeprom); 440 fake_eeprom_init(ctx->fake_eeprom); 441 442 ctx->eeprom_buffer = new_eeprom_buffer(&ctx->fake_eeprom->parent); 443 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ctx->eeprom_buffer); 444 445 test->priv = ctx; 446 447 return 0; 448 } 449 450 static void eeprom_buffer_test_exit(struct kunit *test) 451 { 452 struct eeprom_buffer_test *ctx = test->priv; 453 454 destroy_eeprom_buffer(ctx->eeprom_buffer); 455 } 456 457Testing against multiple inputs 458------------------------------- 459 460Testing just a few inputs might not be enough to have confidence that the code 461works correctly, e.g. for a hash function. 462 463In such cases, it can be helpful to have a helper macro or function, e.g. this 464fictitious example for ``sha1sum(1)`` 465 466.. code-block:: c 467 468 /* Note: the cast is to satisfy overly strict type-checking. */ 469 #define TEST_SHA1(in, want) \ 470 sha1sum(in, out); \ 471 KUNIT_EXPECT_STREQ_MSG(test, (char *)out, want, "sha1sum(%s)", in); 472 473 char out[40]; 474 TEST_SHA1("hello world", "2aae6c35c94fcfb415dbe95f408b9ce91ee846ed"); 475 TEST_SHA1("hello world!", "430ce34d020724ed75a196dfc2ad67c77772d169"); 476 477 478Note the use of ``KUNIT_EXPECT_STREQ_MSG`` to give more context when it fails 479and make it easier to track down. (Yes, in this example, ``want`` is likely 480going to be unique enough on its own). 481 482The ``_MSG`` variants are even more useful when the same expectation is called 483multiple times (in a loop or helper function) and thus the line number isn't 484enough to identify what failed, like below. 485 486In some cases, it can be helpful to write a *table-driven test* instead, e.g. 487 488.. code-block:: c 489 490 int i; 491 char out[40]; 492 493 struct sha1_test_case { 494 const char *str; 495 const char *sha1; 496 }; 497 498 struct sha1_test_case cases[] = { 499 { 500 .str = "hello world", 501 .sha1 = "2aae6c35c94fcfb415dbe95f408b9ce91ee846ed", 502 }, 503 { 504 .str = "hello world!", 505 .sha1 = "430ce34d020724ed75a196dfc2ad67c77772d169", 506 }, 507 }; 508 for (i = 0; i < ARRAY_SIZE(cases); ++i) { 509 sha1sum(cases[i].str, out); 510 KUNIT_EXPECT_STREQ_MSG(test, (char *)out, cases[i].sha1, 511 "sha1sum(%s)", cases[i].str); 512 } 513 514 515There's more boilerplate involved, but it can: 516 517* be more readable when there are multiple inputs/outputs thanks to field names, 518 519 * E.g. see ``fs/ext4/inode-test.c`` for an example of both. 520* reduce duplication if test cases can be shared across multiple tests. 521 522 * E.g. if we wanted to also test ``sha256sum``, we could add a ``sha256`` 523 field and reuse ``cases``. 524 525.. _kunit-on-non-uml: 526 527KUnit on non-UML architectures 528============================== 529 530By default KUnit uses UML as a way to provide dependencies for code under test. 531Under most circumstances KUnit's usage of UML should be treated as an 532implementation detail of how KUnit works under the hood. Nevertheless, there 533are instances where being able to run architecture-specific code or test 534against real hardware is desirable. For these reasons KUnit supports running on 535other architectures. 536 537Running existing KUnit tests on non-UML architectures 538----------------------------------------------------- 539 540There are some special considerations when running existing KUnit tests on 541non-UML architectures: 542 543* Hardware may not be deterministic, so a test that always passes or fails 544 when run under UML may not always do so on real hardware. 545* Hardware and VM environments may not be hermetic. KUnit tries its best to 546 provide a hermetic environment to run tests; however, it cannot manage state 547 that it doesn't know about outside of the kernel. Consequently, tests that 548 may be hermetic on UML may not be hermetic on other architectures. 549* Some features and tooling may not be supported outside of UML. 550* Hardware and VMs are slower than UML. 551 552None of these are reasons not to run your KUnit tests on real hardware; they are 553only things to be aware of when doing so. 554 555The biggest impediment will likely be that certain KUnit features and 556infrastructure may not support your target environment. For example, at this 557time the KUnit Wrapper (``tools/testing/kunit/kunit.py``) does not work outside 558of UML. Unfortunately, there is no way around this. Using UML (or even just a 559particular architecture) allows us to make a lot of assumptions that make it 560possible to do things which might otherwise be impossible. 561 562Nevertheless, all core KUnit framework features are fully supported on all 563architectures, and using them is straightforward: all you need to do is to take 564your kunitconfig, your Kconfig options for the tests you would like to run, and 565merge them into whatever config your are using for your platform. That's it! 566 567For example, let's say you have the following kunitconfig: 568 569.. code-block:: none 570 571 CONFIG_KUNIT=y 572 CONFIG_KUNIT_EXAMPLE_TEST=y 573 574If you wanted to run this test on an x86 VM, you might add the following config 575options to your ``.config``: 576 577.. code-block:: none 578 579 CONFIG_KUNIT=y 580 CONFIG_KUNIT_EXAMPLE_TEST=y 581 CONFIG_SERIAL_8250=y 582 CONFIG_SERIAL_8250_CONSOLE=y 583 584All these new options do is enable support for a common serial console needed 585for logging. 586 587Next, you could build a kernel with these tests as follows: 588 589 590.. code-block:: bash 591 592 make ARCH=x86 olddefconfig 593 make ARCH=x86 594 595Once you have built a kernel, you could run it on QEMU as follows: 596 597.. code-block:: bash 598 599 qemu-system-x86_64 -enable-kvm \ 600 -m 1024 \ 601 -kernel arch/x86_64/boot/bzImage \ 602 -append 'console=ttyS0' \ 603 --nographic 604 605Interspersed in the kernel logs you might see the following: 606 607.. code-block:: none 608 609 TAP version 14 610 # Subtest: example 611 1..1 612 # example_simple_test: initializing 613 ok 1 - example_simple_test 614 ok 1 - example 615 616Congratulations, you just ran a KUnit test on the x86 architecture! 617 618In a similar manner, kunit and kunit tests can also be built as modules, 619so if you wanted to run tests in this way you might add the following config 620options to your ``.config``: 621 622.. code-block:: none 623 624 CONFIG_KUNIT=m 625 CONFIG_KUNIT_EXAMPLE_TEST=m 626 627Once the kernel is built and installed, a simple 628 629.. code-block:: bash 630 631 modprobe example-test 632 633...will run the tests. 634 635.. note:: 636 Note that you should make sure your test depends on ``KUNIT=y`` in Kconfig 637 if the test does not support module build. Otherwise, it will trigger 638 compile errors if ``CONFIG_KUNIT`` is ``m``. 639 640Writing new tests for other architectures 641----------------------------------------- 642 643The first thing you must do is ask yourself whether it is necessary to write a 644KUnit test for a specific architecture, and then whether it is necessary to 645write that test for a particular piece of hardware. In general, writing a test 646that depends on having access to a particular piece of hardware or software (not 647included in the Linux source repo) should be avoided at all costs. 648 649Even if you only ever plan on running your KUnit test on your hardware 650configuration, other people may want to run your tests and may not have access 651to your hardware. If you write your test to run on UML, then anyone can run your 652tests without knowing anything about your particular setup, and you can still 653run your tests on your hardware setup just by compiling for your architecture. 654 655.. important:: 656 Always prefer tests that run on UML to tests that only run under a particular 657 architecture, and always prefer tests that run under QEMU or another easy 658 (and monetarily free) to obtain software environment to a specific piece of 659 hardware. 660 661Nevertheless, there are still valid reasons to write an architecture or hardware 662specific test: for example, you might want to test some code that really belongs 663in ``arch/some-arch/*``. Even so, try your best to write the test so that it 664does not depend on physical hardware: if some of your test cases don't need the 665hardware, only require the hardware for tests that actually need it. 666 667Now that you have narrowed down exactly what bits are hardware specific, the 668actual procedure for writing and running the tests is pretty much the same as 669writing normal KUnit tests. One special caveat is that you have to reset 670hardware state in between test cases; if this is not possible, you may only be 671able to run one test case per invocation. 672 673.. TODO(brendanhiggins@google.com): Add an actual example of an architecture- 674 dependent KUnit test. 675 676KUnit debugfs representation 677============================ 678When kunit test suites are initialized, they create an associated directory 679in ``/sys/kernel/debug/kunit/<test-suite>``. The directory contains one file 680 681- results: "cat results" displays results of each test case and the results 682 of the entire suite for the last test run. 683 684The debugfs representation is primarily of use when kunit test suites are 685run in a native environment, either as modules or builtin. Having a way 686to display results like this is valuable as otherwise results can be 687intermixed with other events in dmesg output. The maximum size of each 688results file is KUNIT_LOG_SIZE bytes (defined in ``include/kunit/test.h``). 689