If I understand the question... You're stepping through machine instructions, 
and you want to figure out which bytecode handler the code is associated with?

A way to find this in lldb: `e _v8_internal_Print_Code((void*)$pc)/`, which 
will dump information about the code (ever since v8         5.1.146 / 
https://codereview.chromium.org/1806883002) --- something similar should work 
in gdb or msvc's debugger.

> On Jun 14, 2018, at 4:33 PM, Thomson Tan <lilo...@gmail.com> wrote:
> 
> I saw some JIT instructions under debugger which seems for the templated 
> interpreter code. How could I find out which bytecode the binaries 
> instructions are associated with under debugger? There seems a table with 
> mapping for each bytecode to JIT code address in isolate. What's the easy way 
> for doing this?
> 
> -- 
> -- 
> v8-users mailing list
> v8-users@googlegroups.com
> http://groups.google.com/group/v8-users
> --- 
> You received this message because you are subscribed to the Google Groups 
> "v8-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to v8-users+unsubscr...@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.

-- 
-- 
v8-users mailing list
v8-users@googlegroups.com
http://groups.google.com/group/v8-users
--- 
You received this message because you are subscribed to the Google Groups 
"v8-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to v8-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to