<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugs.webkit.org/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4.1"
          urlbase="https://bugs.webkit.org/"
          
          maintainer="admin@webkit.org"
>

    <bug>
          <bug_id>124683</bug_id>
          
          <creation_ts>2013-11-20 15:15:07 -0800</creation_ts>
          <short_desc>New crashing tests following r159427</short_desc>
          <delta_ts>2013-11-20 15:29:56 -0800</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>WebKit</product>
          <component>JavaScriptCore</component>
          <version>528+ (Nightly build)</version>
          <rep_platform>PC</rep_platform>
          <op_sys>Windows 7</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>DUPLICATE</resolution>
          <dup_id>124675</dup_id>
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P2</priority>
          <bug_severity>Normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Roger Fong">roger_fong</reporter>
          <assigned_to name="Nobody">webkit-unassigned</assigned_to>
          <cc>bfulgham</cc>
    
    <cc>msaboff</cc>
          

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>952801</commentid>
    <comment_count>0</comment_count>
    <who name="Roger Fong">roger_fong</who>
    <bug_when>2013-11-20 15:15:07 -0800</bug_when>
    <thetext>+jquery/offset.html
+jquery/css.html
+jquery/data.html
+jquery/event.html
+jquery/core.html
+jquery/manipulation.html
+jquery/traversing.html
+cssom/cssvalue-comparison.html
+js/mozilla/strict/B.1.2.html
+js/mozilla/strict/13.1.html
+js/mozilla/strict/12.14.1.html
+js/mozilla/strict/15.10.7.html

They crash on JUTStubsX86.h (A wonderfully description access violation).
Happesn on line 225 after being called from JITCode::execute

Looks like:
add esp, 0x1c</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>952808</commentid>
    <comment_count>1</comment_count>
    <who name="Roger Fong">roger_fong</who>
    <bug_when>2013-11-20 15:27:40 -0800</bug_when>
    <thetext>0BCB303E  mov         ecx,dword ptr [ebp]  
0BCB3041  jmp         0BCB3048  
0BCB3046  mov         ecx,ebp  
0BCB3048  mov         dword ptr [esp],ecx  
0BCB304B  call        lookupExceptionHandler (22F8360h)  
0BCB3050  mov         eax,0B080048h  
0BCB3055  mov         edx,dword ptr [eax+5FD4h]  
0BCB305B  mov         eax,dword ptr [eax+5FD0h]  
0BCB3061  jmp         edx  
0BCB3063  add         byte ptr [eax],al  
0BCB3065  add         byte ptr [eax],al  
0BCB3067  add         byte ptr [eax],al  
0BCB3069  add         byte ptr [eax],al  
0BCB306B  add         byte ptr [eax],al  
0BCB306D  add         byte ptr [eax],al  
0BCB306F  add         byte ptr [eax],al  
0BCB3071  add         byte ptr [eax],al  
0BCB3073  add         byte ptr [eax],al  
0BCB3075  add         byte ptr [eax],al  
0BCB3077  add         byte ptr [eax],al  
0BCB3079  add         byte ptr [eax],al  
0BCB307B  add         byte ptr [eax],al  
0BCB307D  add         byte ptr [eax],al  
0BCB307F  add         byte ptr [ebx-7AF00406h],al  
0BCB3085  cmp         al,0  
0BCB3087  add         byte ptr [eax],al  
0BCB3089  mov         ebx,dword ptr [eax]  &lt;== CRASHING HERE, EAX contains FFFFFFFB 
0BCB308B  cmp         dword ptr [ebx+20h],362C598h  
0BCB3092  jne         0BCB30C5</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>952810</commentid>
    <comment_count>2</comment_count>
    <who name="Michael Saboff">msaboff</who>
    <bug_when>2013-11-20 15:29:56 -0800</bug_when>
    <thetext>this looks like a dup of https://bugs.webkit.org/show_bug.cgi?id=124675.  Dereferencing eax which contains a tag of 0xfffffffb.

*** This bug has been marked as a duplicate of bug 124675 ***</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>