All the assembly before the offending instruction is useless, because it doesn't align with the start of the instructions properly (remember that IA32 instructions are variable length, so you can get any amount of crap disassembly from starting at a random address).
0x83b6fe5: add %dl,(%eax)
is the instruction causing the SEGV, so %eax contains an invalid address (info regs will reveal which one).
/ Marcus Comstedt (ACROSS) (Hail Ilpalazzo!)
Previous text:
2002-10-08 18:10: Subject: more debug?
disassemble 0x083b6fd0 0x083b6ff0
Henrik, I'm a newbie in that, and so where you found such values 0x083b6fd0 0x083b6ff0 ?
The values are a reasonable context around the address where it went wrong:
Program received signal SIGSEGV, Segmentation fault. 0x083b6fe5 in ?? () (gdb) bt #0 0x083b6fe5 in ?? ()
And here is a disass:
Somebody who knows IA32 assembler will have to look at it.
/ Henrik Grubbström (Lysator)