Analyzer lj-no-pcre-jit-lua-fgraph
Name
lj-no-pcre-jit-lua-fgraph - Lua Land Flame Graph for function path that PCRE jit is disabled
This analyzer profiles Lua execution paths where PCRE JIT compilation is disabled in applications such as OpenResty and Kong. It captures stack traces during regular expression operations that fall back to interpreted PCRE execution instead of using JIT-compiled patterns. The analyzer generates flame graph visualizations showing the Lua-level call stacks associated with non-JIT PCRE operations, helping developers identify regex patterns that cannot be JIT-compiled and optimize pattern matching performance by enabling PCRE JIT or refactoring problematic patterns.
Resource Category
CPU.
Application Type & Technical Stack
- OpenResty
- Kong
- APISIX
Command Line Syntax
The analyzer can be invoked directly on the command-line via the orxray
utility from the openresty-xray-cli software package.
Alternatively, the analyzer can also be invoked manually or automatically on the web console UI of OpenResty XRay (like on the Advanced web page).
# PID is the target process PID.
orxray analyzer run lj-no-pcre-jit-lua-fgraph -p PID
# trace a shell command directly
orxray analyzer run lj-no-pcre-jit-lua-fgraph -c SHELL_CMD
# PGID is the process group ID or any process's PID within the target process
# group.
orxray analyzer run lj-no-pcre-jit-lua-fgraph -p -PGID
# trace any processes started from the specified executable path.
orxray analyzer run lj-no-pcre-jit-lua-fgraph --exe /path/to/exe/file
Tracing Multiple Processes
Supported.
Output Formats
- Flame Graphs
Author
The OpenResty Inc. Team.
Copyright
Copyright (C) by OpenResty Inc. All rights reserved.