Analyzer lj-no-pcre-jit-lua-fgraph

Name

lj-no-pcre-jit-lua-fgraph - Lua Land Flame Graph for function path that PCRE jit is disabled

This analyzer profiles Lua execution paths where PCRE JIT compilation is disabled in applications such as OpenResty and Kong. It captures stack traces during regular expression operations that fall back to interpreted PCRE execution instead of using JIT-compiled patterns. The analyzer generates flame graph visualizations showing the Lua-level call stacks associated with non-JIT PCRE operations, helping developers identify regex patterns that cannot be JIT-compiled and optimize pattern matching performance by enabling PCRE JIT or refactoring problematic patterns.

Resource Category

CPU.

Application Type & Technical Stack

  • OpenResty
  • Kong
  • APISIX

Command Line Syntax

The analyzer can be invoked directly on the command-line via the orxray utility from the openresty-xray-cli software package.

Alternatively, the analyzer can also be invoked manually or automatically on the web console UI of OpenResty XRay (like on the Advanced web page).

# PID is the target process PID.
orxray analyzer run lj-no-pcre-jit-lua-fgraph -p PID

# trace a shell command directly
orxray analyzer run lj-no-pcre-jit-lua-fgraph -c SHELL_CMD

# PGID is the process group ID or any process's PID within the target process
# group.
orxray analyzer run lj-no-pcre-jit-lua-fgraph -p -PGID

# trace any processes started from the specified executable path.
orxray analyzer run lj-no-pcre-jit-lua-fgraph --exe /path/to/exe/file

Tracing Multiple Processes

Supported.

Output Formats

  • Flame Graphs

Author

The OpenResty Inc. Team.

Copyright (C) by OpenResty Inc. All rights reserved.