=> 0xb751d97c <__mempcpy_ia32+28>: rep movsl %ds:(%esi),%es:(%edi) 0xb751d97e <__mempcpy_ia32+30>: xchg %eax,%edi 0xb751d97f <__mempcpy_ia32+31>: mov %edx,%esi 0xb751d981 <__mempcpy_ia32+33>: ret 0xb751d982: xchg %ax,%ax 0xb751d984: xchg %ax,%ax 0xb751d986: xchg %ax,%ax 0xb751d988: xchg %ax,%ax 0xb751d98a: xchg %ax,%ax 0xb751d98c: xchg %ax,%ax 0xb751d98e: xchg %ax,%ax 0xb751d990 : push %ebx 0xb751d991 : call 0xb75cb653 <__x86.get_pc_thunk.bx> 0xb751d996 : add $0x12f66a,%ebx 0xb751d99c : cmpl $0x0,0x36c0(%ebx) 0xb751d9a3 : jne 0xb751d9aa