1 .. SPDX-License-Identifier: GPL-2.0
7 The purpose of this document is to describe what KUnit is, how it works, how it
8 is intended to be used, and all the concepts and terminology that are needed to
9 understand it. This guide assumes a working knowledge of the Linux kernel and
10 some basic knowledge of testing.
12 For a high level introduction to KUnit, including setting up KUnit for your
13 project, see :doc:`start`.
15 Organization of this document
16 =============================
18 This document is organized into two main sections: Testing and Common Patterns.
19 The first covers what unit tests are and how to use KUnit to write them. The
20 second covers common testing patterns, e.g. how to isolate code and make it
21 possible to unit test code that was otherwise un-unit-testable.
29 "K" is short for "kernel" so "KUnit" is the "(Linux) Kernel Unit Testing
30 Framework." KUnit is intended first and foremost for writing unit tests; it is
31 general enough that it can be used to write integration tests; however, this is
32 a secondary goal. KUnit has no ambition of being the only testing framework for
33 the kernel; for example, it does not intend to be an end-to-end testing
39 A `unit test <https://martinfowler.com/bliki/UnitTest.html>`_ is a test that
40 tests code at the smallest possible scope, a *unit* of code. In the C
41 programming language that's a function.
43 Unit tests should be written for all the publicly exposed functions in a
44 compilation unit; so that is all the functions that are exported in either a
45 *class* (defined below) or all functions which are **not** static.
53 The fundamental unit in KUnit is the test case. A test case is a function with
54 the signature ``void (*)(struct kunit *test)``. It calls a function to be tested
55 and then sets *expectations* for what should happen. For example:
59 void example_test_success(struct kunit *test)
63 void example_test_failure(struct kunit *test)
65 KUNIT_FAIL(test, "This test never passes.");
68 In the above example ``example_test_success`` always passes because it does
69 nothing; no expectations are set, so all expectations pass. On the other hand
70 ``example_test_failure`` always fails because it calls ``KUNIT_FAIL``, which is
71 a special expectation that logs a message and causes the test case to fail.
75 An *expectation* is a way to specify that you expect a piece of code to do
76 something in a test. An expectation is called like a function. A test is made
77 by setting expectations about the behavior of a piece of code under test; when
78 one or more of the expectations fail, the test case fails and information about
79 the failure is logged. For example:
83 void add_test_basic(struct kunit *test)
85 KUNIT_EXPECT_EQ(test, 1, add(1, 0));
86 KUNIT_EXPECT_EQ(test, 2, add(1, 1));
89 In the above example ``add_test_basic`` makes a number of assertions about the
90 behavior of a function called ``add``; the first parameter is always of type
91 ``struct kunit *``, which contains information about the current test context;
92 the second parameter, in this case, is what the value is expected to be; the
93 last value is what the value actually is. If ``add`` passes all of these
94 expectations, the test case, ``add_test_basic`` will pass; if any one of these
95 expectations fails, the test case will fail.
97 It is important to understand that a test case *fails* when any expectation is
98 violated; however, the test will continue running, potentially trying other
99 expectations until the test case ends or is otherwise terminated. This is as
100 opposed to *assertions* which are discussed later.
102 To learn about more expectations supported by KUnit, see :doc:`api/test`.
105 A single test case should be pretty short, pretty easy to understand,
106 focused on a single behavior.
108 For example, if we wanted to properly test the add function above, we would
109 create additional tests cases which would each test a different property that an
110 add function should have like this:
114 void add_test_basic(struct kunit *test)
116 KUNIT_EXPECT_EQ(test, 1, add(1, 0));
117 KUNIT_EXPECT_EQ(test, 2, add(1, 1));
120 void add_test_negative(struct kunit *test)
122 KUNIT_EXPECT_EQ(test, 0, add(-1, 1));
125 void add_test_max(struct kunit *test)
127 KUNIT_EXPECT_EQ(test, INT_MAX, add(0, INT_MAX));
128 KUNIT_EXPECT_EQ(test, -1, add(INT_MAX, INT_MIN));
131 void add_test_overflow(struct kunit *test)
133 KUNIT_EXPECT_EQ(test, INT_MIN, add(INT_MAX, 1));
136 Notice how it is immediately obvious what all the properties that we are testing
142 KUnit also has the concept of an *assertion*. An assertion is just like an
143 expectation except the assertion immediately terminates the test case if it is
150 static void mock_test_do_expect_default_return(struct kunit *test)
152 struct mock_test_context *ctx = test->priv;
153 struct mock *mock = ctx->mock;
154 int param0 = 5, param1 = -5;
155 const char *two_param_types[] = {"int", "int"};
156 const void *two_params[] = {¶m0, ¶m1};
159 ret = mock->do_expect(mock,
160 "test_printk", test_printk,
161 two_param_types, two_params,
162 ARRAY_SIZE(two_params));
163 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ret);
164 KUNIT_EXPECT_EQ(test, -4, *((int *) ret));
167 In this example, the method under test should return a pointer to a value, so
168 if the pointer returned by the method is null or an errno, we don't want to
169 bother continuing the test since the following expectation could crash the test
170 case. `ASSERT_NOT_ERR_OR_NULL(...)` allows us to bail out of the test case if
171 the appropriate conditions have not been satisfied to complete the test.
176 Now obviously one unit test isn't very helpful; the power comes from having
177 many test cases covering all of a unit's behaviors. Consequently it is common
178 to have many *similar* tests; in order to reduce duplication in these closely
179 related tests most unit testing frameworks - including KUnit - provide the
180 concept of a *test suite*. A *test suite* is just a collection of test cases
181 for a unit of code with a set up function that gets invoked before every test
182 case and then a tear down function that gets invoked after every test case
189 static struct kunit_case example_test_cases[] = {
190 KUNIT_CASE(example_test_foo),
191 KUNIT_CASE(example_test_bar),
192 KUNIT_CASE(example_test_baz),
196 static struct kunit_suite example_test_suite = {
198 .init = example_test_init,
199 .exit = example_test_exit,
200 .test_cases = example_test_cases,
202 kunit_test_suite(example_test_suite);
204 In the above example the test suite, ``example_test_suite``, would run the test
205 cases ``example_test_foo``, ``example_test_bar``, and ``example_test_baz``;
206 each would have ``example_test_init`` called immediately before it and would
207 have ``example_test_exit`` called immediately after it.
208 ``kunit_test_suite(example_test_suite)`` registers the test suite with the
209 KUnit test framework.
212 A test case will only be run if it is associated with a test suite.
214 ``kunit_test_suite(...)`` is a macro which tells the linker to put the specified
215 test suite in a special linker section so that it can be run by KUnit either
216 after late_init, or when the test module is loaded (depending on whether the
217 test was built in or not).
219 For more information on these types of things see the :doc:`api/test`.
227 The most important aspect of unit testing that other forms of testing do not
228 provide is the ability to limit the amount of code under test to a single unit.
229 In practice, this is only possible by being able to control what code gets run
230 when the unit under test calls a function and this is usually accomplished
231 through some sort of indirection where a function is exposed as part of an API
232 such that the definition of that function can be changed without affecting the
233 rest of the code base. In the kernel this primarily comes from two constructs,
234 classes, structs that contain function pointers that are provided by the
235 implementer, and architecture-specific functions which have definitions selected
241 Classes are not a construct that is built into the C programming language;
242 however, it is an easily derived concept. Accordingly, pretty much every project
243 that does not use a standardized object oriented library (like GNOME's GObject)
244 has their own slightly different way of doing object oriented programming; the
245 Linux kernel is no exception.
247 The central concept in kernel object oriented programming is the class. In the
248 kernel, a *class* is a struct that contains function pointers. This creates a
249 contract between *implementers* and *users* since it forces them to use the
250 same function signature without having to call the function directly. In order
251 for it to truly be a class, the function pointers must specify that a pointer
252 to the class, known as a *class handle*, be one of the parameters; this makes
253 it possible for the member functions (also known as *methods*) to have access
254 to member variables (more commonly known as *fields*) allowing the same
255 implementation to have multiple *instances*.
257 Typically a class can be *overridden* by *child classes* by embedding the
258 *parent class* in the child class. Then when a method provided by the child
259 class is called, the child implementation knows that the pointer passed to it is
260 of a parent contained within the child; because of this, the child can compute
261 the pointer to itself because the pointer to the parent is always a fixed offset
262 from the pointer to the child; this offset is the offset of the parent contained
263 in the child struct. For example:
268 int (*area)(struct shape *this);
277 int rectangle_area(struct shape *this)
279 struct rectangle *self = container_of(this, struct shape, parent);
281 return self->length * self->width;
284 void rectangle_new(struct rectangle *self, int length, int width)
286 self->parent.area = rectangle_area;
287 self->length = length;
291 In this example (as in most kernel code) the operation of computing the pointer
292 to the child from the pointer to the parent is done by ``container_of``.
297 In order to unit test a piece of code that calls a method in a class, the
298 behavior of the method must be controllable, otherwise the test ceases to be a
299 unit test and becomes an integration test.
301 A fake just provides an implementation of a piece of code that is different than
302 what runs in a production instance, but behaves identically from the standpoint
303 of the callers; this is usually done to replace a dependency that is hard to
304 deal with, or is slow.
306 A good example for this might be implementing a fake EEPROM that just stores the
307 "contents" in an internal buffer. For example, let's assume we have a class that
308 represents an EEPROM:
313 ssize_t (*read)(struct eeprom *this, size_t offset, char *buffer, size_t count);
314 ssize_t (*write)(struct eeprom *this, size_t offset, const char *buffer, size_t count);
317 And we want to test some code that buffers writes to the EEPROM:
321 struct eeprom_buffer {
322 ssize_t (*write)(struct eeprom_buffer *this, const char *buffer, size_t count);
323 int flush(struct eeprom_buffer *this);
324 size_t flush_count; /* Flushes when buffer exceeds flush_count. */
327 struct eeprom_buffer *new_eeprom_buffer(struct eeprom *eeprom);
328 void destroy_eeprom_buffer(struct eeprom *eeprom);
330 We can easily test this code by *faking out* the underlying EEPROM:
335 struct eeprom parent;
336 char contents[FAKE_EEPROM_CONTENTS_SIZE];
339 ssize_t fake_eeprom_read(struct eeprom *parent, size_t offset, char *buffer, size_t count)
341 struct fake_eeprom *this = container_of(parent, struct fake_eeprom, parent);
343 count = min(count, FAKE_EEPROM_CONTENTS_SIZE - offset);
344 memcpy(buffer, this->contents + offset, count);
349 ssize_t fake_eeprom_write(struct eeprom *parent, size_t offset, const char *buffer, size_t count)
351 struct fake_eeprom *this = container_of(parent, struct fake_eeprom, parent);
353 count = min(count, FAKE_EEPROM_CONTENTS_SIZE - offset);
354 memcpy(this->contents + offset, buffer, count);
359 void fake_eeprom_init(struct fake_eeprom *this)
361 this->parent.read = fake_eeprom_read;
362 this->parent.write = fake_eeprom_write;
363 memset(this->contents, 0, FAKE_EEPROM_CONTENTS_SIZE);
366 We can now use it to test ``struct eeprom_buffer``:
370 struct eeprom_buffer_test {
371 struct fake_eeprom *fake_eeprom;
372 struct eeprom_buffer *eeprom_buffer;
375 static void eeprom_buffer_test_does_not_write_until_flush(struct kunit *test)
377 struct eeprom_buffer_test *ctx = test->priv;
378 struct eeprom_buffer *eeprom_buffer = ctx->eeprom_buffer;
379 struct fake_eeprom *fake_eeprom = ctx->fake_eeprom;
380 char buffer[] = {0xff};
382 eeprom_buffer->flush_count = SIZE_MAX;
384 eeprom_buffer->write(eeprom_buffer, buffer, 1);
385 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0);
387 eeprom_buffer->write(eeprom_buffer, buffer, 1);
388 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0);
390 eeprom_buffer->flush(eeprom_buffer);
391 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0xff);
392 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0xff);
395 static void eeprom_buffer_test_flushes_after_flush_count_met(struct kunit *test)
397 struct eeprom_buffer_test *ctx = test->priv;
398 struct eeprom_buffer *eeprom_buffer = ctx->eeprom_buffer;
399 struct fake_eeprom *fake_eeprom = ctx->fake_eeprom;
400 char buffer[] = {0xff};
402 eeprom_buffer->flush_count = 2;
404 eeprom_buffer->write(eeprom_buffer, buffer, 1);
405 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0);
407 eeprom_buffer->write(eeprom_buffer, buffer, 1);
408 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0xff);
409 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0xff);
412 static void eeprom_buffer_test_flushes_increments_of_flush_count(struct kunit *test)
414 struct eeprom_buffer_test *ctx = test->priv;
415 struct eeprom_buffer *eeprom_buffer = ctx->eeprom_buffer;
416 struct fake_eeprom *fake_eeprom = ctx->fake_eeprom;
417 char buffer[] = {0xff, 0xff};
419 eeprom_buffer->flush_count = 2;
421 eeprom_buffer->write(eeprom_buffer, buffer, 1);
422 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0);
424 eeprom_buffer->write(eeprom_buffer, buffer, 2);
425 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0xff);
426 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0xff);
427 /* Should have only flushed the first two bytes. */
428 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[2], 0);
431 static int eeprom_buffer_test_init(struct kunit *test)
433 struct eeprom_buffer_test *ctx;
435 ctx = kunit_kzalloc(test, sizeof(*ctx), GFP_KERNEL);
436 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ctx);
438 ctx->fake_eeprom = kunit_kzalloc(test, sizeof(*ctx->fake_eeprom), GFP_KERNEL);
439 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ctx->fake_eeprom);
440 fake_eeprom_init(ctx->fake_eeprom);
442 ctx->eeprom_buffer = new_eeprom_buffer(&ctx->fake_eeprom->parent);
443 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ctx->eeprom_buffer);
450 static void eeprom_buffer_test_exit(struct kunit *test)
452 struct eeprom_buffer_test *ctx = test->priv;
454 destroy_eeprom_buffer(ctx->eeprom_buffer);
457 Testing against multiple inputs
458 -------------------------------
460 Testing just a few inputs might not be enough to have confidence that the code
461 works correctly, e.g. for a hash function.
463 In such cases, it can be helpful to have a helper macro or function, e.g. this
464 fictitious example for ``sha1sum(1)``
468 /* Note: the cast is to satisfy overly strict type-checking. */
469 #define TEST_SHA1(in, want) \
471 KUNIT_EXPECT_STREQ_MSG(test, (char *)out, want, "sha1sum(%s)", in);
474 TEST_SHA1("hello world", "2aae6c35c94fcfb415dbe95f408b9ce91ee846ed");
475 TEST_SHA1("hello world!", "430ce34d020724ed75a196dfc2ad67c77772d169");
478 Note the use of ``KUNIT_EXPECT_STREQ_MSG`` to give more context when it fails
479 and make it easier to track down. (Yes, in this example, ``want`` is likely
480 going to be unique enough on its own).
482 The ``_MSG`` variants are even more useful when the same expectation is called
483 multiple times (in a loop or helper function) and thus the line number isn't
484 enough to identify what failed, like below.
486 In some cases, it can be helpful to write a *table-driven test* instead, e.g.
493 struct sha1_test_case {
498 struct sha1_test_case cases[] = {
500 .str = "hello world",
501 .sha1 = "2aae6c35c94fcfb415dbe95f408b9ce91ee846ed",
504 .str = "hello world!",
505 .sha1 = "430ce34d020724ed75a196dfc2ad67c77772d169",
508 for (i = 0; i < ARRAY_SIZE(cases); ++i) {
509 sha1sum(cases[i].str, out);
510 KUNIT_EXPECT_STREQ_MSG(test, (char *)out, cases[i].sha1,
511 "sha1sum(%s)", cases[i].str);
515 There's more boilerplate involved, but it can:
517 * be more readable when there are multiple inputs/outputs thanks to field names,
519 * E.g. see ``fs/ext4/inode-test.c`` for an example of both.
520 * reduce duplication if test cases can be shared across multiple tests.
522 * E.g. if we wanted to also test ``sha256sum``, we could add a ``sha256``
523 field and reuse ``cases``.
525 .. _kunit-on-non-uml:
527 KUnit on non-UML architectures
528 ==============================
530 By default KUnit uses UML as a way to provide dependencies for code under test.
531 Under most circumstances KUnit's usage of UML should be treated as an
532 implementation detail of how KUnit works under the hood. Nevertheless, there
533 are instances where being able to run architecture-specific code or test
534 against real hardware is desirable. For these reasons KUnit supports running on
537 Running existing KUnit tests on non-UML architectures
538 -----------------------------------------------------
540 There are some special considerations when running existing KUnit tests on
541 non-UML architectures:
543 * Hardware may not be deterministic, so a test that always passes or fails
544 when run under UML may not always do so on real hardware.
545 * Hardware and VM environments may not be hermetic. KUnit tries its best to
546 provide a hermetic environment to run tests; however, it cannot manage state
547 that it doesn't know about outside of the kernel. Consequently, tests that
548 may be hermetic on UML may not be hermetic on other architectures.
549 * Some features and tooling may not be supported outside of UML.
550 * Hardware and VMs are slower than UML.
552 None of these are reasons not to run your KUnit tests on real hardware; they are
553 only things to be aware of when doing so.
555 The biggest impediment will likely be that certain KUnit features and
556 infrastructure may not support your target environment. For example, at this
557 time the KUnit Wrapper (``tools/testing/kunit/kunit.py``) does not work outside
558 of UML. Unfortunately, there is no way around this. Using UML (or even just a
559 particular architecture) allows us to make a lot of assumptions that make it
560 possible to do things which might otherwise be impossible.
562 Nevertheless, all core KUnit framework features are fully supported on all
563 architectures, and using them is straightforward: all you need to do is to take
564 your kunitconfig, your Kconfig options for the tests you would like to run, and
565 merge them into whatever config your are using for your platform. That's it!
567 For example, let's say you have the following kunitconfig:
572 CONFIG_KUNIT_EXAMPLE_TEST=y
574 If you wanted to run this test on an x86 VM, you might add the following config
575 options to your ``.config``:
580 CONFIG_KUNIT_EXAMPLE_TEST=y
582 CONFIG_SERIAL_8250_CONSOLE=y
584 All these new options do is enable support for a common serial console needed
587 Next, you could build a kernel with these tests as follows:
592 make ARCH=x86 olddefconfig
595 Once you have built a kernel, you could run it on QEMU as follows:
599 qemu-system-x86_64 -enable-kvm \
601 -kernel arch/x86_64/boot/bzImage \
602 -append 'console=ttyS0' \
605 Interspersed in the kernel logs you might see the following:
612 # example_simple_test: initializing
613 ok 1 - example_simple_test
616 Congratulations, you just ran a KUnit test on the x86 architecture!
618 In a similar manner, kunit and kunit tests can also be built as modules,
619 so if you wanted to run tests in this way you might add the following config
620 options to your ``.config``:
625 CONFIG_KUNIT_EXAMPLE_TEST=m
627 Once the kernel is built and installed, a simple
631 modprobe example-test
633 ...will run the tests.
636 Note that you should make sure your test depends on ``KUNIT=y`` in Kconfig
637 if the test does not support module build. Otherwise, it will trigger
638 compile errors if ``CONFIG_KUNIT`` is ``m``.
640 Writing new tests for other architectures
641 -----------------------------------------
643 The first thing you must do is ask yourself whether it is necessary to write a
644 KUnit test for a specific architecture, and then whether it is necessary to
645 write that test for a particular piece of hardware. In general, writing a test
646 that depends on having access to a particular piece of hardware or software (not
647 included in the Linux source repo) should be avoided at all costs.
649 Even if you only ever plan on running your KUnit test on your hardware
650 configuration, other people may want to run your tests and may not have access
651 to your hardware. If you write your test to run on UML, then anyone can run your
652 tests without knowing anything about your particular setup, and you can still
653 run your tests on your hardware setup just by compiling for your architecture.
656 Always prefer tests that run on UML to tests that only run under a particular
657 architecture, and always prefer tests that run under QEMU or another easy
658 (and monetarily free) to obtain software environment to a specific piece of
661 Nevertheless, there are still valid reasons to write an architecture or hardware
662 specific test: for example, you might want to test some code that really belongs
663 in ``arch/some-arch/*``. Even so, try your best to write the test so that it
664 does not depend on physical hardware: if some of your test cases don't need the
665 hardware, only require the hardware for tests that actually need it.
667 Now that you have narrowed down exactly what bits are hardware specific, the
668 actual procedure for writing and running the tests is pretty much the same as
669 writing normal KUnit tests. One special caveat is that you have to reset
670 hardware state in between test cases; if this is not possible, you may only be
671 able to run one test case per invocation.
673 .. TODO(brendanhiggins@google.com): Add an actual example of an architecture-
674 dependent KUnit test.
676 KUnit debugfs representation
677 ============================
678 When kunit test suites are initialized, they create an associated directory
679 in ``/sys/kernel/debug/kunit/<test-suite>``. The directory contains one file
681 - results: "cat results" displays results of each test case and the results
682 of the entire suite for the last test run.
684 The debugfs representation is primarily of use when kunit test suites are
685 run in a native environment, either as modules or builtin. Having a way
686 to display results like this is valuable as otherwise results can be
687 intermixed with other events in dmesg output. The maximum size of each
688 results file is KUNIT_LOG_SIZE bytes (defined in ``include/kunit/test.h``).