Coming soon in Red Hat Enterprise Linux 9.3 and 8.9—and already in CentOS Stream 9 and 8—we're updating the rust-toolset package to Rust 1.71.1. This comes with many upstream features, like the new OnceLock API and Cargo's new "sparse" protocol, but an additional change we're making to our packaging is to include the profiler runtime with the Rust standard library. This has no impact on the default Rust compilation workflow, but it does enable two new capabilities: source-based code coverage and profile-guided optimization.
In this blog, I'll explain how to use code coverage and profile-guided optimization with Rust code on Red Hat Enterprise Linux.
Setup
If you've already been using rust-toolset on RHEL, then simply upgrading to the new version will include the necessary runtime library. In addition, the llvm package will be needed for a few additional tools to process the instrumented data. On a new system, you can get it all by running:
$ sudo yum install rust-toolset llvm
If your project also includes C or C++ code, you may want the full llvm-toolset
package to include the Clang compiler as well.
Source-based code coverage
Code coverage is usually part of the dev/test cycle, checking that execution (usually of tests) reaches as much of the code as possible. This way, the developer can increase confidence that all parts of the code are operating correctly. The newly enabled code coverage option in Rust instruments precise annotations based on the original code, so all of the branches and regions of code are represented precisely, rather than just line-based annotations of some older coverage tools.
The rustc
option -Cinstrument-coverage
is best applied in a Cargo build by setting the RUSTFLAGS
environment variable during development builds.
$ env RUSTFLAGS="-Cinstrument-coverage" cargo build
You can also enable this while building and running your entire test suite:
$ env RUSTFLAGS="-Cinstrument-coverage" cargo test
When each application runs, it will output a *.profraw
file in the current directory. LLVM tools can then process and report code coverage from that data.
$ llvm-profdata merge -sparse *.profraw -o coverage.profdata $ llvm-cov show -instr-profile=coverage.profdata \ ./target/debug/hello-world 1| 1|fn main() { 2| 1| println!("Hello, world!"); 3| 1|}
Additional options like -show-line-counts-or-regions
can be added to show more detailed region information when the code is more complicated than line counts alone can represent.
For more information, see the Code Coverage section of the rustc book, as well as the similar section from Clang if you're also using C or C++, and the documentation for llvm-profdata and llvm-cov for more options in reporting.
Profile-guided optimization
A lot of compiler optimizations rely on inferring (and sometimes guessing) which code paths are likely to be taken most often so it can generate the fastest outcome for those paths. This especially matters when an unlikely path might place a heavy cost on code generation that the likely path would do better to avoid. Profile-guided optimization (PGO) is a way to avoid guessing and inform the compiler using real workloads running your program.
The process for building with PGO works in two phases: instrumentation with -Cprofile-generate
, and application with -Cprofile-use
. These are options to the rustc
compiler, and in a normal Cargo-driven build they are easiest to apply using the RUSTFLAGS
environment variable.
To instrument your application, set the option with a directory path to store the raw profiling data. It's also good practice to explicitly set the --target
, as that separates the RUSTFLAGS
from build scripts and procedural macros during the build process. Since we're also focusing on optimization, it's a good idea to use a --release build for this.
$ PROFDIR=$(mktemp -d) $ env RUSTFLAGS="-Cprofile-generate=$PROFDIR" \ cargo build --release --target x86_64-unknown-linux-gnu
The instrumented binary will be ./target/x86_64-unknown-linux-gnu/release/
. Run it a few times with representative workloads for your program, and each run will create a raw profile in the PROFDIR
we specified at build time. Then this data can be merged and used in a new build:
$ llvm-profdata merge "$PROFDIR" -o "$PROFDIR/merged.profdata" $ env RUSTFLAGS="-Cprofile-use=$PROFDIR/merged.profdata" \ cargo build --release --target x86_64-unknown-linux-gnu
The new binary will no longer be instrumented, but it will be optimized using the data from your training workloads, and this should be more performant than a non-PGO build.
For more information, see the Profile-guided Optimization section of the rustc book, as well as the similar section from Clang if you're also using C or C++.
Summary
With the inclusion of the profiler runtime in rust-toolset
in RHEL 9.3 and 8.9, Rust is ready to enhance your workflow with code coverage during development and profile-guided optimization for deployment. We hope you find these features useful!
About the author
Josh Stone is a part of the Platform Tools Team, where he is responsible for the Rust toolchain.
Browse by channel
Automation
The latest on IT automation for tech, teams, and environments
Artificial intelligence
Updates on the platforms that free customers to run AI workloads anywhere
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
The latest on how we reduce risks across environments and technologies
Edge computing
Updates on the platforms that simplify operations at the edge
Infrastructure
The latest on the world’s leading enterprise Linux platform
Applications
Inside our solutions to the toughest application challenges
Original shows
Entertaining stories from the makers and leaders in enterprise tech
Products
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud services
- See all products
Tools
- Training and certification
- My account
- Customer support
- Developer resources
- Find a partner
- Red Hat Ecosystem Catalog
- Red Hat value calculator
- Documentation
Try, buy, & sell
Communicate
About Red Hat
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Select a language
Red Hat legal and privacy links
- About Red Hat
- Jobs
- Events
- Locations
- Contact Red Hat
- Red Hat Blog
- Diversity, equity, and inclusion
- Cool Stuff Store
- Red Hat Summit