oe-kbuild-all.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
* [stable:linux-5.15.y 8081/9999] mm/vmscan.o: warning: objtool: shrink_lruvec()+0x974: sibling call from callable instruction with modified stack frame
@ 2023-02-13 22:21 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2023-02-13 22:21 UTC (permalink / raw)
  Cc: oe-kbuild-all, llvm

TO: Johannes Weiner <hannes@cmpxchg.org>
CC: "Greg Kroah-Hartman" <gregkh@linuxfoundation.org>
CC: Rik van Riel <riel@surriel.com>
CC: Andrew Morton <akpm@linux-foundation.org>
CC: Linux Memory Management List <linux-mm@kvack.org>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.15.y
head:   85d7786c66b69d3f07cc149ac2f78d8f330c7c11
commit: 7b3c9405b2729ce70ac6826575d1559cb5ac4725 [8081/9999] mm: vmscan: fix extreme overreclaim and swap floods
config: x86_64-randconfig-r005-20230213 (https://download.01.org/0day-ci/archive/20230214/202302140601.dtz0tVIG-lkp@intel.com/config)
compiler: clang version 14.0.6 (https://github.com/llvm/llvm-project f28c006a5895fc0e329fe15fead81e37457cb1d1)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=7b3c9405b2729ce70ac6826575d1559cb5ac4725
        git remote add stable https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
        git fetch --no-tags stable linux-5.15.y
        git checkout 7b3c9405b2729ce70ac6826575d1559cb5ac4725
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 olddefconfig
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@intel.com>
| Link: https://lore.kernel.org/oe-kbuild-all/202302140601.dtz0tVIG-lkp@intel.com/

All warnings (new ones prefixed by >>):

>> mm/vmscan.o: warning: objtool: shrink_lruvec()+0x974: sibling call from callable instruction with modified stack frame


objdump-func vmlinux.o shrink_lruvec:
0000 00000000006dff00 <shrink_lruvec>:
0000   6dff00:	55                   	push   %rbp
0001   6dff01:	48 89 e5             	mov    %rsp,%rbp
0004   6dff04:	41 57                	push   %r15
0006   6dff06:	41 56                	push   %r14
0008   6dff08:	41 55                	push   %r13
000a   6dff0a:	41 54                	push   %r12
000c   6dff0c:	53                   	push   %rbx
000d   6dff0d:	48 83 e4 f0          	and    $0xfffffffffffffff0,%rsp
0011   6dff11:	48 81 ec 20 02 00 00 	sub    $0x220,%rsp
0018   6dff18:	48 89 f3             	mov    %rsi,%rbx
001b   6dff1b:	48 89 7c 24 30       	mov    %rdi,0x30(%rsp)
0020   6dff20:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
002a   6dff2a:	e8 00 00 00 00       	call   6dff2f <shrink_lruvec+0x2f>	6dff2b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
002f   6dff2f:	48 8d bc 24 00 01 00 00 	lea    0x100(%rsp),%rdi
0037   6dff37:	ba 28 00 00 00       	mov    $0x28,%edx
003c   6dff3c:	31 f6                	xor    %esi,%esi
003e   6dff3e:	e8 00 00 00 00       	call   6dff43 <shrink_lruvec+0x43>	6dff3f: R_X86_64_PLT32	memset-0x4
0043   6dff43:	48 8d bc 24 80 01 00 00 	lea    0x180(%rsp),%rdi
004b   6dff4b:	ba 28 00 00 00       	mov    $0x28,%edx
0050   6dff50:	31 f6                	xor    %esi,%esi
0052   6dff52:	e8 00 00 00 00       	call   6dff57 <shrink_lruvec+0x57>	6dff53: R_X86_64_PLT32	memset-0x4
0057   6dff57:	48 89 d8             	mov    %rbx,%rax
005a   6dff5a:	48 c1 e8 03          	shr    $0x3,%rax
005e   6dff5e:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
0063   6dff63:	48 89 5c 24 10       	mov    %rbx,0x10(%rsp)
0068   6dff68:	74 0d                	je     6dff77 <shrink_lruvec+0x77>
006a   6dff6a:	48 89 df             	mov    %rbx,%rdi
006d   6dff6d:	e8 00 00 00 00       	call   6dff72 <shrink_lruvec+0x72>	6dff6e: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0072   6dff72:	48 8b 5c 24 10       	mov    0x10(%rsp),%rbx
0077   6dff77:	48 8b 03             	mov    (%rbx),%rax
007a   6dff7a:	48 89 84 24 b0 01 00 00 	mov    %rax,0x1b0(%rsp)
0082   6dff82:	48 8d bc 24 f0 01 00 00 	lea    0x1f0(%rsp),%rdi
008a   6dff8a:	ba 28 00 00 00       	mov    $0x28,%edx
008f   6dff8f:	31 f6                	xor    %esi,%esi
0091   6dff91:	e8 00 00 00 00       	call   6dff96 <shrink_lruvec+0x96>	6dff92: R_X86_64_PLT32	memset-0x4
0096   6dff96:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6dff99: R_X86_64_32S	memory_cgrp_subsys_enabled_key
009d   6dff9d:	48 c1 e8 03          	shr    $0x3,%rax
00a1   6dffa1:	42 8a 04 30          	mov    (%rax,%r14,1),%al
00a5   6dffa5:	84 c0                	test   %al,%al
00a7   6dffa7:	0f 85 43 29 00 00    	jne    6e28f0 <shrink_lruvec+0x29f0>
00ad   6dffad:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6dffb3 <shrink_lruvec+0xb3>	6dffaf: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
00b3   6dffb3:	bf 01 00 00 00       	mov    $0x1,%edi
00b8   6dffb8:	89 de                	mov    %ebx,%esi
00ba   6dffba:	e8 00 00 00 00       	call   6dffbf <shrink_lruvec+0xbf>	6dffbb: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
00bf   6dffbf:	85 db                	test   %ebx,%ebx
00c1   6dffc1:	7e 2c                	jle    6dffef <shrink_lruvec+0xef>
00c3   6dffc3:	e8 00 00 00 00       	call   6dffc8 <shrink_lruvec+0xc8>	6dffc4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
00c8   6dffc8:	48 8b 44 24 30       	mov    0x30(%rsp),%rax
00cd   6dffcd:	48 8d 98 00 04 00 00 	lea    0x400(%rax),%rbx
00d4   6dffd4:	48 89 d8             	mov    %rbx,%rax
00d7   6dffd7:	48 c1 e8 03          	shr    $0x3,%rax
00db   6dffdb:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
00e0   6dffe0:	74 08                	je     6dffea <shrink_lruvec+0xea>
00e2   6dffe2:	48 89 df             	mov    %rbx,%rdi
00e5   6dffe5:	e8 00 00 00 00       	call   6dffea <shrink_lruvec+0xea>	6dffe6: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
00ea   6dffea:	4c 8b 23             	mov    (%rbx),%r12
00ed   6dffed:	eb 08                	jmp    6dfff7 <shrink_lruvec+0xf7>
00ef   6dffef:	e8 00 00 00 00       	call   6dfff4 <shrink_lruvec+0xf4>	6dfff0: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
00f4   6dfff4:	45 31 e4             	xor    %r12d,%r12d
00f7   6dfff7:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6dfffa: R_X86_64_32S	memory_cgrp_subsys_on_dfl_key
00fe   6dfffe:	48 c1 e8 03          	shr    $0x3,%rax
0102   6e0002:	42 8a 04 30          	mov    (%rax,%r14,1),%al
0106   6e0006:	84 c0                	test   %al,%al
0108   6e0008:	0f 85 08 29 00 00    	jne    6e2916 <shrink_lruvec+0x2a16>
010e   6e000e:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e0014 <shrink_lruvec+0x114>	6e0010: R_X86_64_PC32	memory_cgrp_subsys_on_dfl_key-0x4
0114   6e0014:	31 ff                	xor    %edi,%edi
0116   6e0016:	89 de                	mov    %ebx,%esi
0118   6e0018:	e8 00 00 00 00       	call   6e001d <shrink_lruvec+0x11d>	6e0019: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
011d   6e001d:	85 db                	test   %ebx,%ebx
011f   6e001f:	0f 8e 52 28 00 00    	jle    6e2877 <shrink_lruvec+0x2977>
0125   6e0025:	e8 00 00 00 00       	call   6e002a <shrink_lruvec+0x12a>	6e0026: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
012a   6e002a:	48 c7 c3 00 00 00 00 	mov    $0x0,%rbx	6e002d: R_X86_64_32S	vm_swappiness
0131   6e0031:	48 89 d8             	mov    %rbx,%rax
0134   6e0034:	48 c1 e8 03          	shr    $0x3,%rax
0138   6e0038:	42 8a 04 30          	mov    (%rax,%r14,1),%al
013c   6e003c:	84 c0                	test   %al,%al
013e   6e003e:	4d 89 f7             	mov    %r14,%r15
0141   6e0041:	0f 85 f5 28 00 00    	jne    6e293c <shrink_lruvec+0x2a3c>
0147   6e0047:	4c 63 33             	movslq (%rbx),%r14
014a   6e004a:	48 8d bc 24 90 00 00 00 	lea    0x90(%rsp),%rdi
0152   6e0052:	ba 10 00 00 00       	mov    $0x10,%edx
0157   6e0057:	31 f6                	xor    %esi,%esi
0159   6e0059:	e8 00 00 00 00       	call   6e005e <shrink_lruvec+0x15e>	6e005a: R_X86_64_PLT32	memset-0x4
015e   6e005e:	48 8b 44 24 10       	mov    0x10(%rsp),%rax
0163   6e0063:	4c 8d 68 28          	lea    0x28(%rax),%r13
0167   6e0067:	4c 89 e8             	mov    %r13,%rax
016a   6e006a:	48 c1 e8 03          	shr    $0x3,%rax
016e   6e006e:	48 89 84 24 d8 00 00 00 	mov    %rax,0xd8(%rsp)
0176   6e0076:	42 8a 04 38          	mov    (%rax,%r15,1),%al
017a   6e007a:	84 c0                	test   %al,%al
017c   6e007c:	0f 85 d7 28 00 00    	jne    6e2959 <shrink_lruvec+0x2a59>
0182   6e0082:	41 0f b7 5d 00       	movzwl 0x0(%r13),%ebx
0187   6e0087:	89 de                	mov    %ebx,%esi
0189   6e0089:	83 e6 40             	and    $0x40,%esi
018c   6e008c:	31 ff                	xor    %edi,%edi
018e   6e008e:	e8 00 00 00 00       	call   6e0093 <shrink_lruvec+0x193>	6e008f: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp2-0x4
0193   6e0093:	83 e3 40             	and    $0x40,%ebx
0196   6e0096:	75 0a                	jne    6e00a2 <shrink_lruvec+0x1a2>
0198   6e0098:	e8 00 00 00 00       	call   6e009d <shrink_lruvec+0x19d>	6e0099: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
019d   6e009d:	e9 2f 02 00 00       	jmp    6e02d1 <shrink_lruvec+0x3d1>
01a2   6e00a2:	4d 85 e4             	test   %r12,%r12
01a5   6e00a5:	74 25                	je     6e00cc <shrink_lruvec+0x1cc>
01a7   6e00a7:	4c 89 e7             	mov    %r12,%rdi
01aa   6e00aa:	e8 00 00 00 00       	call   6e00af <shrink_lruvec+0x1af>	6e00ab: R_X86_64_PLT32	mem_cgroup_get_nr_swap_pages-0x4
01af   6e00af:	48 89 c3             	mov    %rax,%rbx
01b2   6e00b2:	31 ff                	xor    %edi,%edi
01b4   6e00b4:	48 89 c6             	mov    %rax,%rsi
01b7   6e00b7:	e8 00 00 00 00       	call   6e00bc <shrink_lruvec+0x1bc>	6e00b8: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
01bc   6e00bc:	48 85 db             	test   %rbx,%rbx
01bf   6e00bf:	0f 8e f6 00 00 00    	jle    6e01bb <shrink_lruvec+0x2bb>
01c5   6e00c5:	e8 00 00 00 00       	call   6e00ca <shrink_lruvec+0x1ca>	6e00c6: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
01ca   6e00ca:	eb 57                	jmp    6e0123 <shrink_lruvec+0x223>
01cc   6e00cc:	48 c7 c3 00 00 00 00 	mov    $0x0,%rbx	6e00cf: R_X86_64_32S	nr_swap_pages
01d3   6e00d3:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e00d6: R_X86_64_32S	nr_swap_pages
01da   6e00da:	be 08 00 00 00       	mov    $0x8,%esi
01df   6e00df:	e8 00 00 00 00       	call   6e00e4 <shrink_lruvec+0x1e4>	6e00e0: R_X86_64_PLT32	__kasan_check_read-0x4
01e4   6e00e4:	48 c1 eb 03          	shr    $0x3,%rbx
01e8   6e00e8:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
01f2   6e00f2:	80 3c 03 00          	cmpb   $0x0,(%rbx,%rax,1)
01f6   6e00f6:	74 0c                	je     6e0104 <shrink_lruvec+0x204>
01f8   6e00f8:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e00fb: R_X86_64_32S	nr_swap_pages
01ff   6e00ff:	e8 00 00 00 00       	call   6e0104 <shrink_lruvec+0x204>	6e0100: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0204   6e0104:	48 8b 1d 00 00 00 00 	mov    0x0(%rip),%rbx        # 6e010b <shrink_lruvec+0x20b>	6e0107: R_X86_64_PC32	nr_swap_pages-0x4
020b   6e010b:	31 ff                	xor    %edi,%edi
020d   6e010d:	48 89 de             	mov    %rbx,%rsi
0210   6e0110:	e8 00 00 00 00       	call   6e0115 <shrink_lruvec+0x215>	6e0111: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
0215   6e0115:	48 85 db             	test   %rbx,%rbx
0218   6e0118:	0f 8e 9b 01 00 00    	jle    6e02b9 <shrink_lruvec+0x3b9>
021e   6e011e:	e8 00 00 00 00       	call   6e0123 <shrink_lruvec+0x223>	6e011f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0223   6e0123:	48 8b 44 24 10       	mov    0x10(%rsp),%rax
0228   6e0128:	48 8d 58 10          	lea    0x10(%rax),%rbx
022c   6e012c:	48 89 d8             	mov    %rbx,%rax
022f   6e012f:	48 c1 e8 03          	shr    $0x3,%rax
0233   6e0133:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
023d   6e013d:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0241   6e0141:	74 08                	je     6e014b <shrink_lruvec+0x24b>
0243   6e0143:	48 89 df             	mov    %rbx,%rdi
0246   6e0146:	e8 00 00 00 00       	call   6e014b <shrink_lruvec+0x24b>	6e0147: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
024b   6e014b:	48 8b 1b             	mov    (%rbx),%rbx
024e   6e014e:	31 ff                	xor    %edi,%edi
0250   6e0150:	44 89 f6             	mov    %r14d,%esi
0253   6e0153:	e8 00 00 00 00       	call   6e0158 <shrink_lruvec+0x258>	6e0154: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
0258   6e0158:	48 85 db             	test   %rbx,%rbx
025b   6e015b:	74 0f                	je     6e016c <shrink_lruvec+0x26c>
025d   6e015d:	45 85 f6             	test   %r14d,%r14d
0260   6e0160:	75 0a                	jne    6e016c <shrink_lruvec+0x26c>
0262   6e0162:	e8 00 00 00 00       	call   6e0167 <shrink_lruvec+0x267>	6e0163: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0267   6e0167:	e9 65 01 00 00       	jmp    6e02d1 <shrink_lruvec+0x3d1>
026c   6e016c:	48 8b 44 24 10       	mov    0x10(%rsp),%rax
0271   6e0171:	48 8d 58 2b          	lea    0x2b(%rax),%rbx
0275   6e0175:	48 89 d8             	mov    %rbx,%rax
0278   6e0178:	48 c1 e8 03          	shr    $0x3,%rax
027c   6e017c:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0286   6e0186:	8a 04 08             	mov    (%rax,%rcx,1),%al
0289   6e0189:	84 c0                	test   %al,%al
028b   6e018b:	0f 85 69 28 00 00    	jne    6e29fa <shrink_lruvec+0x2afa>
0291   6e0191:	0f b6 1b             	movzbl (%rbx),%ebx
0294   6e0194:	31 ff                	xor    %edi,%edi
0296   6e0196:	89 de                	mov    %ebx,%esi
0298   6e0198:	e8 00 00 00 00       	call   6e019d <shrink_lruvec+0x29d>	6e0199: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp1-0x4
029d   6e019d:	85 db                	test   %ebx,%ebx
029f   6e019f:	75 24                	jne    6e01c5 <shrink_lruvec+0x2c5>
02a1   6e01a1:	45 85 f6             	test   %r14d,%r14d
02a4   6e01a4:	74 1f                	je     6e01c5 <shrink_lruvec+0x2c5>
02a6   6e01a6:	e8 00 00 00 00       	call   6e01ab <shrink_lruvec+0x2ab>	6e01a7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
02ab   6e01ab:	31 f6                	xor    %esi,%esi
02ad   6e01ad:	31 c0                	xor    %eax,%eax
02af   6e01af:	48 89 44 24 28       	mov    %rax,0x28(%rsp)
02b4   6e01b4:	31 c0                	xor    %eax,%eax
02b6   6e01b6:	e9 27 01 00 00       	jmp    6e02e2 <shrink_lruvec+0x3e2>
02bb   6e01bb:	e8 00 00 00 00       	call   6e01c0 <shrink_lruvec+0x2c0>	6e01bc: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
02c0   6e01c0:	e9 0c 01 00 00       	jmp    6e02d1 <shrink_lruvec+0x3d1>
02c5   6e01c5:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
02cf   6e01cf:	48 8b 8c 24 d8 00 00 00 	mov    0xd8(%rsp),%rcx
02d7   6e01d7:	8a 04 01             	mov    (%rcx,%rax,1),%al
02da   6e01da:	84 c0                	test   %al,%al
02dc   6e01dc:	0f 85 32 28 00 00    	jne    6e2a14 <shrink_lruvec+0x2b14>
02e2   6e01e2:	41 0f b7 5d 00       	movzwl 0x0(%r13),%ebx
02e7   6e01e7:	89 de                	mov    %ebx,%esi
02e9   6e01e9:	81 e6 00 10 00 00    	and    $0x1000,%esi
02ef   6e01ef:	31 c0                	xor    %eax,%eax
02f1   6e01f1:	48 89 44 24 28       	mov    %rax,0x28(%rsp)
02f6   6e01f6:	31 ff                	xor    %edi,%edi
02f8   6e01f8:	e8 00 00 00 00       	call   6e01fd <shrink_lruvec+0x2fd>	6e01f9: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp2-0x4
02fd   6e01fd:	89 d8                	mov    %ebx,%eax
02ff   6e01ff:	25 00 10 00 00       	and    $0x1000,%eax
0304   6e0204:	0f 85 b6 00 00 00    	jne    6e02c0 <shrink_lruvec+0x3c0>
030a   6e020a:	81 e3 00 08 00 00    	and    $0x800,%ebx
0310   6e0210:	31 ff                	xor    %edi,%edi
0312   6e0212:	89 de                	mov    %ebx,%esi
0314   6e0214:	e8 00 00 00 00       	call   6e0219 <shrink_lruvec+0x319>	6e0215: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp2-0x4
0319   6e0219:	85 db                	test   %ebx,%ebx
031b   6e021b:	0f 85 ab 00 00 00    	jne    6e02cc <shrink_lruvec+0x3cc>
0321   6e0221:	e8 00 00 00 00       	call   6e0226 <shrink_lruvec+0x326>	6e0222: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0326   6e0226:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
032b   6e022b:	48 8d 7a 18          	lea    0x18(%rdx),%rdi
032f   6e022f:	48 89 f8             	mov    %rdi,%rax
0332   6e0232:	48 c1 e8 03          	shr    $0x3,%rax
0336   6e0236:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0340   6e0240:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0344   6e0244:	74 0a                	je     6e0250 <shrink_lruvec+0x350>
0346   6e0246:	e8 00 00 00 00       	call   6e024b <shrink_lruvec+0x34b>	6e0247: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
034b   6e024b:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
0350   6e0250:	4c 8b 7a 18          	mov    0x18(%rdx),%r15
0354   6e0254:	48 8d 5a 20          	lea    0x20(%rdx),%rbx
0358   6e0258:	48 89 d8             	mov    %rbx,%rax
035b   6e025b:	48 c1 e8 03          	shr    $0x3,%rax
035f   6e025f:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0369   6e0269:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
036d   6e026d:	74 08                	je     6e0277 <shrink_lruvec+0x377>
036f   6e026f:	48 89 df             	mov    %rbx,%rdi
0372   6e0272:	e8 00 00 00 00       	call   6e0277 <shrink_lruvec+0x377>	6e0273: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0377   6e0277:	48 8b 03             	mov    (%rbx),%rax
037a   6e027a:	4a 8d 14 38          	lea    (%rax,%r15,1),%rdx
037e   6e027e:	4a 8d 0c 3a          	lea    (%rdx,%r15,1),%rcx
0382   6e0282:	48 8d 34 10          	lea    (%rax,%rdx,1),%rsi
0386   6e0286:	48 83 c6 01          	add    $0x1,%rsi
038a   6e028a:	48 01 f1             	add    %rsi,%rcx
038d   6e028d:	48 89 c8             	mov    %rcx,%rax
0390   6e0290:	49 0f af c6          	imul   %r14,%rax
0394   6e0294:	49 8d 3c 17          	lea    (%r15,%rdx,1),%rdi
0398   6e0298:	48 83 c7 01          	add    $0x1,%rdi
039c   6e029c:	48 89 c2             	mov    %rax,%rdx
039f   6e029f:	48 09 fa             	or     %rdi,%rdx
03a2   6e02a2:	48 c1 ea 20          	shr    $0x20,%rdx
03a6   6e02a6:	0f 84 20 25 00 00    	je     6e27cc <shrink_lruvec+0x28cc>
03ac   6e02ac:	31 d2                	xor    %edx,%edx
03ae   6e02ae:	48 f7 f7             	div    %rdi
03b1   6e02b1:	48 89 c7             	mov    %rax,%rdi
03b4   6e02b4:	e9 19 25 00 00       	jmp    6e27d2 <shrink_lruvec+0x28d2>
03b9   6e02b9:	e8 00 00 00 00       	call   6e02be <shrink_lruvec+0x3be>	6e02ba: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
03be   6e02be:	eb 11                	jmp    6e02d1 <shrink_lruvec+0x3d1>
03c0   6e02c0:	e8 00 00 00 00       	call   6e02c5 <shrink_lruvec+0x3c5>	6e02c1: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
03c5   6e02c5:	b8 02 00 00 00       	mov    $0x2,%eax
03ca   6e02ca:	eb 14                	jmp    6e02e0 <shrink_lruvec+0x3e0>
03cc   6e02cc:	e8 00 00 00 00       	call   6e02d1 <shrink_lruvec+0x3d1>	6e02cd: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
03d1   6e02d1:	b8 03 00 00 00       	mov    $0x3,%eax
03d6   6e02d6:	b9 01 00 00 00       	mov    $0x1,%ecx
03db   6e02db:	48 89 4c 24 28       	mov    %rcx,0x28(%rsp)
03e0   6e02e0:	31 f6                	xor    %esi,%esi
03e2   6e02e2:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
03ec   6e02ec:	48 8b 4c 24 30       	mov    0x30(%rsp),%rcx
03f1   6e02f1:	4c 8d b9 c8 00 00 00 	lea    0xc8(%rcx),%r15
03f8   6e02f8:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
03fd   6e02fd:	48 8d 7a 2c          	lea    0x2c(%rdx),%rdi
0401   6e0301:	48 8d 4a 10          	lea    0x10(%rdx),%rcx
0405   6e0305:	48 89 8c 24 80 00 00 00 	mov    %rcx,0x80(%rsp)
040d   6e030d:	49 8d 8c 24 58 01 00 00 	lea    0x158(%r12),%rcx
0415   6e0315:	48 89 8c 24 c8 00 00 00 	mov    %rcx,0xc8(%rsp)
041d   6e031d:	49 8d 8c 24 70 01 00 00 	lea    0x170(%r12),%rcx
0425   6e0325:	48 89 8c 24 30 01 00 00 	mov    %rcx,0x130(%rsp)
042d   6e032d:	48 8d 4a 2b          	lea    0x2b(%rdx),%rcx
0431   6e0331:	48 89 8c 24 c0 00 00 00 	mov    %rcx,0xc0(%rsp)
0439   6e0339:	49 8d 4c 24 54       	lea    0x54(%r12),%rcx
043e   6e033e:	48 89 4c 24 48       	mov    %rcx,0x48(%rsp)
0443   6e0343:	48 89 b4 24 28 01 00 00 	mov    %rsi,0x128(%rsp)
044b   6e034b:	48 8d 4e ff          	lea    -0x1(%rsi),%rcx
044f   6e034f:	48 89 8c 24 60 01 00 00 	mov    %rcx,0x160(%rsp)
0457   6e0357:	b9 08 06 00 00       	mov    $0x608,%ecx
045c   6e035c:	48 89 4c 24 60       	mov    %rcx,0x60(%rsp)
0461   6e0361:	48 89 f9             	mov    %rdi,%rcx
0464   6e0364:	48 89 7c 24 50       	mov    %rdi,0x50(%rsp)
0469   6e0369:	48 c1 ef 03          	shr    $0x3,%rdi
046d   6e036d:	48 89 bc 24 f0 00 00 00 	mov    %rdi,0xf0(%rsp)
0475   6e0375:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e0378: R_X86_64_32S	memory_cgrp_subsys_enabled_key
047c   6e037c:	48 c1 e9 03          	shr    $0x3,%rcx
0480   6e0380:	48 89 4c 24 38       	mov    %rcx,0x38(%rsp)
0485   6e0385:	89 c0                	mov    %eax,%eax
0487   6e0387:	48 89 84 24 e0 00 00 00 	mov    %rax,0xe0(%rsp)
048f   6e038f:	48 8b 04 c5 00 00 00 00 	mov    0x0(,%rax,8),%rax	6e0393: R_X86_64_32S	.rodata+0x48ff40
0497   6e0397:	48 89 44 24 78       	mov    %rax,0x78(%rsp)
049c   6e039c:	31 db                	xor    %ebx,%ebx
049e   6e039e:	4c 89 6c 24 20       	mov    %r13,0x20(%rsp)
04a3   6e03a3:	4c 89 bc 24 38 01 00 00 	mov    %r15,0x138(%rsp)
04ab   6e03ab:	4c 89 a4 24 d0 00 00 00 	mov    %r12,0xd0(%rsp)
04b3   6e03b3:	48 89 5c 24 18       	mov    %rbx,0x18(%rsp)
04b8   6e03b8:	83 e3 fe             	and    $0xfffffffe,%ebx
04bb   6e03bb:	bf 02 00 00 00       	mov    $0x2,%edi
04c0   6e03c0:	48 89 de             	mov    %rbx,%rsi
04c3   6e03c3:	e8 00 00 00 00       	call   6e03c8 <shrink_lruvec+0x4c8>	6e03c4: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
04c8   6e03c8:	48 89 5c 24 58       	mov    %rbx,0x58(%rsp)
04cd   6e03cd:	48 83 fb 02          	cmp    $0x2,%rbx
04d1   6e03d1:	0f 94 84 24 f8 00 00 00 	sete   0xf8(%rsp)
04d9   6e03d9:	48 8b 84 24 f0 00 00 00 	mov    0xf0(%rsp),%rax
04e1   6e03e1:	42 8a 04 30          	mov    (%rax,%r14,1),%al
04e5   6e03e5:	84 c0                	test   %al,%al
04e7   6e03e7:	0f 85 00 07 00 00    	jne    6e0aed <shrink_lruvec+0xbed>
04ed   6e03ed:	48 8b 44 24 50       	mov    0x50(%rsp),%rax
04f2   6e03f2:	8a 00                	mov    (%rax),%al
04f4   6e03f4:	0f b6 d8             	movzbl %al,%ebx
04f7   6e03f7:	bf ff 00 00 00       	mov    $0xff,%edi
04fc   6e03fc:	89 de                	mov    %ebx,%esi
04fe   6e03fe:	e8 00 00 00 00       	call   6e0403 <shrink_lruvec+0x503>	6e03ff: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp1-0x4
0503   6e0403:	84 db                	test   %bl,%bl
0505   6e0405:	0f 88 f8 01 00 00    	js     6e0603 <shrink_lruvec+0x703>
050b   6e040b:	80 fb 02             	cmp    $0x2,%bl
050e   6e040e:	b8 02 00 00 00       	mov    $0x2,%eax
0513   6e0413:	0f 43 d8             	cmovae %eax,%ebx
0516   6e0416:	80 c3 01             	add    $0x1,%bl
0519   6e0419:	0f b6 c3             	movzbl %bl,%eax
051c   6e041c:	48 69 c0 80 06 00 00 	imul   $0x680,%rax,%rax
0523   6e0423:	48 05 80 f9 ff ff    	add    $0xfffffffffffff980,%rax
0529   6e0429:	48 89 84 24 88 00 00 00 	mov    %rax,0x88(%rsp)
0531   6e0431:	4c 8b 64 24 30       	mov    0x30(%rsp),%r12
0536   6e0436:	4c 89 64 24 08       	mov    %r12,0x8(%rsp)
053b   6e043b:	45 31 ff             	xor    %r15d,%r15d
053e   6e043e:	31 c0                	xor    %eax,%eax
0540   6e0440:	48 89 44 24 40       	mov    %rax,0x40(%rsp)
0545   6e0445:	48 8b 9c 24 38 01 00 00 	mov    0x138(%rsp),%rbx
054d   6e044d:	4c 8b 6c 24 38       	mov    0x38(%rsp),%r13
0552   6e0452:	48 89 d8             	mov    %rbx,%rax
0555   6e0455:	48 c1 e8 03          	shr    $0x3,%rax
0559   6e0459:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
055e   6e045e:	74 08                	je     6e0468 <shrink_lruvec+0x568>
0560   6e0460:	48 89 df             	mov    %rbx,%rdi
0563   6e0463:	e8 00 00 00 00       	call   6e0468 <shrink_lruvec+0x568>	6e0464: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0568   6e0468:	4c 8b 33             	mov    (%rbx),%r14
056b   6e046b:	4b 8d 1c 3e          	lea    (%r14,%r15,1),%rbx
056f   6e046f:	48 83 c3 68          	add    $0x68,%rbx
0573   6e0473:	48 89 df             	mov    %rbx,%rdi
0576   6e0476:	be 08 00 00 00       	mov    $0x8,%esi
057b   6e047b:	e8 00 00 00 00       	call   6e0480 <shrink_lruvec+0x580>	6e047c: R_X86_64_PLT32	__kasan_check_read-0x4
0580   6e0480:	48 89 d8             	mov    %rbx,%rax
0583   6e0483:	48 c1 e8 03          	shr    $0x3,%rax
0587   6e0487:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0591   6e0491:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0595   6e0495:	74 08                	je     6e049f <shrink_lruvec+0x59f>
0597   6e0497:	48 89 df             	mov    %rbx,%rdi
059a   6e049a:	e8 00 00 00 00       	call   6e049f <shrink_lruvec+0x59f>	6e049b: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
059f   6e049f:	4b 8b 5c 3e 68       	mov    0x68(%r14,%r15,1),%rbx
05a4   6e04a4:	31 ff                	xor    %edi,%edi
05a6   6e04a6:	48 89 de             	mov    %rbx,%rsi
05a9   6e04a9:	e8 00 00 00 00       	call   6e04ae <shrink_lruvec+0x5ae>	6e04aa: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
05ae   6e04ae:	48 85 db             	test   %rbx,%rbx
05b1   6e04b1:	74 74                	je     6e0527 <shrink_lruvec+0x627>
05b3   6e04b3:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
05bd   6e04bd:	41 0f b6 44 05 00    	movzbl 0x0(%r13,%rax,1),%eax
05c3   6e04c3:	84 c0                	test   %al,%al
05c5   6e04c5:	0f 85 fe 00 00 00    	jne    6e05c9 <shrink_lruvec+0x6c9>
05cb   6e04cb:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e04d1 <shrink_lruvec+0x5d1>	6e04cd: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
05d1   6e04d1:	bf 01 00 00 00       	mov    $0x1,%edi
05d6   6e04d6:	89 de                	mov    %ebx,%esi
05d8   6e04d8:	e8 00 00 00 00       	call   6e04dd <shrink_lruvec+0x5dd>	6e04d9: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
05dd   6e04dd:	85 db                	test   %ebx,%ebx
05df   6e04df:	7e 57                	jle    6e0538 <shrink_lruvec+0x638>
05e1   6e04e1:	e8 00 00 00 00       	call   6e04e6 <shrink_lruvec+0x5e6>	6e04e2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
05e6   6e04e6:	48 8b 44 24 60       	mov    0x60(%rsp),%rax
05eb   6e04eb:	4a 8d 3c 20          	lea    (%rax,%r12,1),%rdi
05ef   6e04ef:	48 81 c7 40 fd ff ff 	add    $0xfffffffffffffd40,%rdi
05f6   6e04f6:	48 89 f8             	mov    %rdi,%rax
05f9   6e04f9:	48 c1 e8 03          	shr    $0x3,%rax
05fd   6e04fd:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
0607   6e0507:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
060c   6e050c:	74 05                	je     6e0513 <shrink_lruvec+0x613>
060e   6e050e:	e8 00 00 00 00       	call   6e0513 <shrink_lruvec+0x613>	6e050f: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0613   6e0513:	48 8b 44 24 60       	mov    0x60(%rsp),%rax
0618   6e0518:	48 8b 4c 24 08       	mov    0x8(%rsp),%rcx
061d   6e051d:	48 8b 9c 01 40 fd ff ff 	mov    -0x2c0(%rcx,%rax,1),%rbx
0625   6e0525:	eb 70                	jmp    6e0597 <shrink_lruvec+0x697>
0627   6e0527:	e8 00 00 00 00       	call   6e052c <shrink_lruvec+0x62c>	6e0528: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
062c   6e052c:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
0636   6e0536:	eb 64                	jmp    6e059c <shrink_lruvec+0x69c>
0638   6e0538:	e8 00 00 00 00       	call   6e053d <shrink_lruvec+0x63d>	6e0539: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
063d   6e053d:	4c 8b 6c 24 60       	mov    0x60(%rsp),%r13
0642   6e0542:	4b 8d 1c 2e          	lea    (%r14,%r13,1),%rbx
0646   6e0546:	4a 8d 3c 3b          	lea    (%rbx,%r15,1),%rdi
064a   6e054a:	be 08 00 00 00       	mov    $0x8,%esi
064f   6e054f:	e8 00 00 00 00       	call   6e0554 <shrink_lruvec+0x654>	6e0550: R_X86_64_PLT32	__kasan_check_read-0x4
0654   6e0554:	4b 8d 3c 2f          	lea    (%r15,%r13,1),%rdi
0658   6e0558:	4c 01 f7             	add    %r14,%rdi
065b   6e055b:	48 89 f8             	mov    %rdi,%rax
065e   6e055e:	48 c1 e8 03          	shr    $0x3,%rax
0662   6e0562:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
066c   6e056c:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
0671   6e0571:	74 05                	je     6e0578 <shrink_lruvec+0x678>
0673   6e0573:	e8 00 00 00 00       	call   6e0578 <shrink_lruvec+0x678>	6e0574: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0678   6e0578:	4a 8b 1c 3b          	mov    (%rbx,%r15,1),%rbx
067c   6e057c:	31 ff                	xor    %edi,%edi
067e   6e057e:	48 89 de             	mov    %rbx,%rsi
0681   6e0581:	e8 00 00 00 00       	call   6e0586 <shrink_lruvec+0x686>	6e0582: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
0686   6e0586:	48 85 db             	test   %rbx,%rbx
0689   6e0589:	b8 00 00 00 00       	mov    $0x0,%eax
068e   6e058e:	48 0f 48 d8          	cmovs  %rax,%rbx
0692   6e0592:	4c 8b 6c 24 38       	mov    0x38(%rsp),%r13
0697   6e0597:	48 01 5c 24 40       	add    %rbx,0x40(%rsp)
069c   6e059c:	48 8b 9c 24 38 01 00 00 	mov    0x138(%rsp),%rbx
06a4   6e05a4:	4c 39 bc 24 88 00 00 00 	cmp    %r15,0x88(%rsp)
06ac   6e05ac:	74 41                	je     6e05ef <shrink_lruvec+0x6ef>
06ae   6e05ae:	e8 00 00 00 00       	call   6e05b3 <shrink_lruvec+0x6b3>	6e05af: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
06b3   6e05b3:	49 81 c7 80 06 00 00 	add    $0x680,%r15
06ba   6e05ba:	49 83 c4 28          	add    $0x28,%r12
06be   6e05be:	48 83 44 24 08 28    	addq   $0x28,0x8(%rsp)
06c4   6e05c4:	e9 89 fe ff ff       	jmp    6e0452 <shrink_lruvec+0x552>
06c9   6e05c9:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e05cc: R_X86_64_32S	memory_cgrp_subsys_enabled_key
06d0   6e05d0:	80 e1 07             	and    $0x7,%cl
06d3   6e05d3:	80 c1 03             	add    $0x3,%cl
06d6   6e05d6:	38 c1                	cmp    %al,%cl
06d8   6e05d8:	0f 8c ed fe ff ff    	jl     6e04cb <shrink_lruvec+0x5cb>
06de   6e05de:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e05e1: R_X86_64_32S	memory_cgrp_subsys_enabled_key
06e5   6e05e5:	e8 00 00 00 00       	call   6e05ea <shrink_lruvec+0x6ea>	6e05e6: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
06ea   6e05ea:	e9 dc fe ff ff       	jmp    6e04cb <shrink_lruvec+0x5cb>
06ef   6e05ef:	e8 00 00 00 00       	call   6e05f4 <shrink_lruvec+0x6f4>	6e05f0: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
06f4   6e05f4:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
06f9   6e05f9:	4c 8b a4 24 d0 00 00 00 	mov    0xd0(%rsp),%r12
0701   6e0601:	eb 0c                	jmp    6e060f <shrink_lruvec+0x70f>
0703   6e0603:	e8 00 00 00 00       	call   6e0608 <shrink_lruvec+0x708>	6e0604: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0708   6e0608:	31 c0                	xor    %eax,%eax
070a   6e060a:	48 89 44 24 40       	mov    %rax,0x40(%rsp)
070f   6e060f:	48 8b 9c 24 80 00 00 00 	mov    0x80(%rsp),%rbx
0717   6e0617:	48 89 d8             	mov    %rbx,%rax
071a   6e061a:	48 c1 e8 03          	shr    $0x3,%rax
071e   6e061e:	48 89 84 24 e8 00 00 00 	mov    %rax,0xe8(%rsp)
0726   6e0626:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
072b   6e062b:	74 08                	je     6e0635 <shrink_lruvec+0x735>
072d   6e062d:	48 89 df             	mov    %rbx,%rdi
0730   6e0630:	e8 00 00 00 00       	call   6e0635 <shrink_lruvec+0x735>	6e0631: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0735   6e0635:	4c 8b 33             	mov    (%rbx),%r14
0738   6e0638:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0742   6e0642:	48 8b 4c 24 38       	mov    0x38(%rsp),%rcx
0747   6e0647:	8a 04 01             	mov    (%rcx,%rax,1),%al
074a   6e064a:	84 c0                	test   %al,%al
074c   6e064c:	0f 85 ba 04 00 00    	jne    6e0b0c <shrink_lruvec+0xc0c>
0752   6e0652:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e0658 <shrink_lruvec+0x758>	6e0654: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
0758   6e0658:	bf 01 00 00 00       	mov    $0x1,%edi
075d   6e065d:	89 de                	mov    %ebx,%esi
075f   6e065f:	e8 00 00 00 00       	call   6e0664 <shrink_lruvec+0x764>	6e0660: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
0764   6e0664:	4d 39 e6             	cmp    %r12,%r14
0767   6e0667:	0f 84 80 00 00 00    	je     6e06ed <shrink_lruvec+0x7ed>
076d   6e066d:	85 db                	test   %ebx,%ebx
076f   6e066f:	7e 7c                	jle    6e06ed <shrink_lruvec+0x7ed>
0771   6e0671:	4c 8b b4 24 c8 00 00 00 	mov    0xc8(%rsp),%r14
0779   6e0679:	4c 89 f0             	mov    %r14,%rax
077c   6e067c:	48 c1 e8 03          	shr    $0x3,%rax
0780   6e0680:	49 bf 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r15
078a   6e068a:	42 80 3c 38 00       	cmpb   $0x0,(%rax,%r15,1)
078f   6e068f:	74 08                	je     6e0699 <shrink_lruvec+0x799>
0791   6e0691:	4c 89 f7             	mov    %r14,%rdi
0794   6e0694:	e8 00 00 00 00       	call   6e0699 <shrink_lruvec+0x799>	6e0695: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0799   6e0699:	4d 8b 2e             	mov    (%r14),%r13
079c   6e069c:	48 8b 9c 24 30 01 00 00 	mov    0x130(%rsp),%rbx
07a4   6e06a4:	48 89 d8             	mov    %rbx,%rax
07a7   6e06a7:	48 c1 e8 03          	shr    $0x3,%rax
07ab   6e06ab:	42 80 3c 38 00       	cmpb   $0x0,(%rax,%r15,1)
07b0   6e06b0:	74 08                	je     6e06ba <shrink_lruvec+0x7ba>
07b2   6e06b2:	48 89 df             	mov    %rbx,%rdi
07b5   6e06b5:	e8 00 00 00 00       	call   6e06ba <shrink_lruvec+0x7ba>	6e06b6: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
07ba   6e06ba:	48 8b 1b             	mov    (%rbx),%rbx
07bd   6e06bd:	31 ff                	xor    %edi,%edi
07bf   6e06bf:	4c 89 ee             	mov    %r13,%rsi
07c2   6e06c2:	e8 00 00 00 00       	call   6e06c7 <shrink_lruvec+0x7c7>	6e06c3: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
07c7   6e06c7:	31 ff                	xor    %edi,%edi
07c9   6e06c9:	48 89 de             	mov    %rbx,%rsi
07cc   6e06cc:	e8 00 00 00 00       	call   6e06d1 <shrink_lruvec+0x7d1>	6e06cd: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
07d1   6e06d1:	4c 89 e8             	mov    %r13,%rax
07d4   6e06d4:	48 09 d8             	or     %rbx,%rax
07d7   6e06d7:	75 23                	jne    6e06fc <shrink_lruvec+0x7fc>
07d9   6e06d9:	e8 00 00 00 00       	call   6e06de <shrink_lruvec+0x7de>	6e06da: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
07de   6e06de:	4c 8b 74 24 40       	mov    0x40(%rsp),%r14
07e3   6e06e3:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
07e8   6e06e8:	e9 07 01 00 00       	jmp    6e07f4 <shrink_lruvec+0x8f4>
07ed   6e06ed:	e8 00 00 00 00       	call   6e06f2 <shrink_lruvec+0x7f2>	6e06ee: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
07f2   6e06f2:	4c 8b 74 24 40       	mov    0x40(%rsp),%r14
07f7   6e06f7:	e9 f8 00 00 00       	jmp    6e07f4 <shrink_lruvec+0x8f4>
07fc   6e06fc:	4c 89 e7             	mov    %r12,%rdi
07ff   6e06ff:	e8 00 00 00 00       	call   6e0704 <shrink_lruvec+0x804>	6e0700: R_X86_64_PLT32	mem_cgroup_size-0x4
0804   6e0704:	49 89 c6             	mov    %rax,%r14
0807   6e0707:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0811   6e0711:	48 8b 8c 24 d8 00 00 00 	mov    0xd8(%rsp),%rcx
0819   6e0719:	8a 04 01             	mov    (%rcx,%rax,1),%al
081c   6e071c:	84 c0                	test   %al,%al
081e   6e071e:	0f 85 4e 04 00 00    	jne    6e0b72 <shrink_lruvec+0xc72>
0824   6e0724:	48 8b 44 24 20       	mov    0x20(%rsp),%rax
0829   6e0729:	44 0f b7 38          	movzwl (%rax),%r15d
082d   6e072d:	44 89 fe             	mov    %r15d,%esi
0830   6e0730:	81 e6 80 00 00 00    	and    $0x80,%esi
0836   6e0736:	31 ff                	xor    %edi,%edi
0838   6e0738:	e8 00 00 00 00       	call   6e073d <shrink_lruvec+0x83d>	6e0739: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp2-0x4
083d   6e073d:	48 89 df             	mov    %rbx,%rdi
0840   6e0740:	4c 89 ee             	mov    %r13,%rsi
0843   6e0743:	e8 00 00 00 00       	call   6e0748 <shrink_lruvec+0x848>	6e0744: R_X86_64_PLT32	__sanitizer_cov_trace_cmp8-0x4
0848   6e0748:	44 89 f8             	mov    %r15d,%eax
084b   6e074b:	25 80 00 00 00       	and    $0x80,%eax
0850   6e0750:	75 3a                	jne    6e078c <shrink_lruvec+0x88c>
0852   6e0752:	4c 39 eb             	cmp    %r13,%rbx
0855   6e0755:	76 35                	jbe    6e078c <shrink_lruvec+0x88c>
0857   6e0757:	e8 00 00 00 00       	call   6e075c <shrink_lruvec+0x85c>	6e0758: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
085c   6e075c:	41 81 cf 00 01 00 00 	or     $0x100,%r15d
0863   6e0763:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
086d   6e076d:	48 8b 8c 24 d8 00 00 00 	mov    0xd8(%rsp),%rcx
0875   6e0775:	8a 04 01             	mov    (%rcx,%rax,1),%al
0878   6e0778:	84 c0                	test   %al,%al
087a   6e077a:	0f 85 82 04 00 00    	jne    6e0c02 <shrink_lruvec+0xd02>
0880   6e0780:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
0885   6e0785:	66 45 89 7d 00       	mov    %r15w,0x0(%r13)
088a   6e078a:	eb 0d                	jmp    6e0799 <shrink_lruvec+0x899>
088c   6e078c:	e8 00 00 00 00       	call   6e0791 <shrink_lruvec+0x891>	6e078d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0891   6e0791:	4c 89 eb             	mov    %r13,%rbx
0894   6e0794:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
0899   6e0799:	4c 89 f7             	mov    %r14,%rdi
089c   6e079c:	48 89 de             	mov    %rbx,%rsi
089f   6e079f:	e8 00 00 00 00       	call   6e07a4 <shrink_lruvec+0x8a4>	6e07a0: R_X86_64_PLT32	__sanitizer_cov_trace_cmp8-0x4
08a4   6e07a4:	49 39 de             	cmp    %rbx,%r14
08a7   6e07a7:	4c 0f 46 f3          	cmovbe %rbx,%r14
08ab   6e07ab:	48 0f af 5c 24 40    	imul   0x40(%rsp),%rbx
08b1   6e07b1:	49 83 c6 01          	add    $0x1,%r14
08b5   6e07b5:	48 89 d8             	mov    %rbx,%rax
08b8   6e07b8:	4c 09 f0             	or     %r14,%rax
08bb   6e07bb:	48 c1 e8 20          	shr    $0x20,%rax
08bf   6e07bf:	74 0a                	je     6e07cb <shrink_lruvec+0x8cb>
08c1   6e07c1:	48 89 d8             	mov    %rbx,%rax
08c4   6e07c4:	31 d2                	xor    %edx,%edx
08c6   6e07c6:	49 f7 f6             	div    %r14
08c9   6e07c9:	eb 07                	jmp    6e07d2 <shrink_lruvec+0x8d2>
08cb   6e07cb:	89 d8                	mov    %ebx,%eax
08cd   6e07cd:	31 d2                	xor    %edx,%edx
08cf   6e07cf:	41 f7 f6             	div    %r14d
08d2   6e07d2:	4c 8b 74 24 40       	mov    0x40(%rsp),%r14
08d7   6e07d7:	49 29 c6             	sub    %rax,%r14
08da   6e07da:	bf 20 00 00 00       	mov    $0x20,%edi
08df   6e07df:	4c 89 f6             	mov    %r14,%rsi
08e2   6e07e2:	e8 00 00 00 00       	call   6e07e7 <shrink_lruvec+0x8e7>	6e07e3: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
08e7   6e07e7:	49 83 fe 21          	cmp    $0x21,%r14
08eb   6e07eb:	b8 20 00 00 00       	mov    $0x20,%eax
08f0   6e07f0:	4c 0f 42 f0          	cmovb  %rax,%r14
08f4   6e07f4:	48 8b 9c 24 c0 00 00 00 	mov    0xc0(%rsp),%rbx
08fc   6e07fc:	48 89 d9             	mov    %rbx,%rcx
08ff   6e07ff:	48 c1 e9 03          	shr    $0x3,%rcx
0903   6e0803:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
090d   6e080d:	48 89 8c 24 78 01 00 00 	mov    %rcx,0x178(%rsp)
0915   6e0815:	8a 04 01             	mov    (%rcx,%rax,1),%al
0918   6e0818:	84 c0                	test   %al,%al
091a   6e081a:	0f 85 12 03 00 00    	jne    6e0b32 <shrink_lruvec+0xc32>
0920   6e0820:	48 0f be 03          	movsbq (%rbx),%rax
0924   6e0824:	89 c3                	mov    %eax,%ebx
0926   6e0826:	bf 40 00 00 00       	mov    $0x40,%edi
092b   6e082b:	48 89 de             	mov    %rbx,%rsi
092e   6e082e:	e8 00 00 00 00       	call   6e0833 <shrink_lruvec+0x933>	6e082f: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
0933   6e0833:	48 83 fb 3f          	cmp    $0x3f,%rbx
0937   6e0837:	0f 87 e7 03 00 00    	ja     6e0c24 <shrink_lruvec+0xd24>
093d   6e083d:	e8 00 00 00 00       	call   6e0842 <shrink_lruvec+0x942>	6e083e: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0942   6e0842:	89 d9                	mov    %ebx,%ecx
0944   6e0844:	49 d3 ee             	shr    %cl,%r14
0947   6e0847:	31 ff                	xor    %edi,%edi
0949   6e0849:	4c 89 f6             	mov    %r14,%rsi
094c   6e084c:	e8 00 00 00 00       	call   6e0851 <shrink_lruvec+0x951>	6e084d: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
0951   6e0851:	4d 85 f6             	test   %r14,%r14
0954   6e0854:	74 2c                	je     6e0882 <shrink_lruvec+0x982>
0956   6e0856:	e8 00 00 00 00       	call   6e085b <shrink_lruvec+0x95b>	6e0857: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
095b   6e085b:	48 8b 5c 24 18       	mov    0x18(%rsp),%rbx
0960   6e0860:	48 8b bc 24 e0 00 00 00 	mov    0xe0(%rsp),%rdi
0968   6e0868:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi	6e086b: R_X86_64_32S	.data+0x60a040
096f   6e086f:	e8 00 00 00 00       	call   6e0874 <shrink_lruvec+0x974>	6e0870: R_X86_64_PLT32	__sanitizer_cov_trace_switch-0x4
0974   6e0874:	ff 64 24 78          	jmp    *0x78(%rsp)
0978   6e0878:	e8 00 00 00 00       	call   6e087d <shrink_lruvec+0x97d>	6e0879: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
097d   6e087d:	e9 14 02 00 00       	jmp    6e0a96 <shrink_lruvec+0xb96>
0982   6e0882:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
098c   6e088c:	48 8b 44 24 38       	mov    0x38(%rsp),%rax
0991   6e0891:	42 8a 04 30          	mov    (%rax,%r14,1),%al
0995   6e0895:	84 c0                	test   %al,%al
0997   6e0897:	0f 85 af 02 00 00    	jne    6e0b4c <shrink_lruvec+0xc4c>
099d   6e089d:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e08a3 <shrink_lruvec+0x9a3>	6e089f: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
09a3   6e08a3:	bf 01 00 00 00       	mov    $0x1,%edi
09a8   6e08a8:	89 de                	mov    %ebx,%esi
09aa   6e08aa:	e8 00 00 00 00       	call   6e08af <shrink_lruvec+0x9af>	6e08ab: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
09af   6e08af:	85 db                	test   %ebx,%ebx
09b1   6e08b1:	0f 8e 4e 01 00 00    	jle    6e0a05 <shrink_lruvec+0xb05>
09b7   6e08b7:	48 8b 54 24 48       	mov    0x48(%rsp),%rdx
09bc   6e08bc:	48 89 d0             	mov    %rdx,%rax
09bf   6e08bf:	48 c1 e8 03          	shr    $0x3,%rax
09c3   6e08c3:	42 8a 04 30          	mov    (%rax,%r14,1),%al
09c7   6e08c7:	84 c0                	test   %al,%al
09c9   6e08c9:	0f 85 eb 02 00 00    	jne    6e0bba <shrink_lruvec+0xcba>
09cf   6e08cf:	8b 1a                	mov    (%rdx),%ebx
09d1   6e08d1:	89 de                	mov    %ebx,%esi
09d3   6e08d3:	83 e6 02             	and    $0x2,%esi
09d6   6e08d6:	31 ff                	xor    %edi,%edi
09d8   6e08d8:	e8 00 00 00 00       	call   6e08dd <shrink_lruvec+0x9dd>	6e08d9: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
09dd   6e08dd:	83 e3 02             	and    $0x2,%ebx
09e0   6e08e0:	0f 85 2c 01 00 00    	jne    6e0a12 <shrink_lruvec+0xb12>
09e6   6e08e6:	e8 00 00 00 00       	call   6e08eb <shrink_lruvec+0x9eb>	6e08e7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
09eb   6e08eb:	bf 20 00 00 00       	mov    $0x20,%edi
09f0   6e08f0:	4c 8b 74 24 40       	mov    0x40(%rsp),%r14
09f5   6e08f5:	4c 89 f6             	mov    %r14,%rsi
09f8   6e08f8:	e8 00 00 00 00       	call   6e08fd <shrink_lruvec+0x9fd>	6e08f9: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
09fd   6e08fd:	49 83 fe 20          	cmp    $0x20,%r14
0a01   6e0901:	b8 20 00 00 00       	mov    $0x20,%eax
0a06   6e0906:	4c 0f 43 f0          	cmovae %rax,%r14
0a0a   6e090a:	e9 4c ff ff ff       	jmp    6e085b <shrink_lruvec+0x95b>
0a0f   6e090f:	4d 89 e7             	mov    %r12,%r15
0a12   6e0912:	e8 00 00 00 00       	call   6e0917 <shrink_lruvec+0xa17>	6e0913: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0a17   6e0917:	eb 08                	jmp    6e0921 <shrink_lruvec+0xa21>
0a19   6e0919:	4d 89 e7             	mov    %r12,%r15
0a1c   6e091c:	e8 00 00 00 00       	call   6e0921 <shrink_lruvec+0xa21>	6e091d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0a21   6e0921:	45 31 e4             	xor    %r12d,%r12d
0a24   6e0924:	8a 84 24 f8 00 00 00 	mov    0xf8(%rsp),%al
0a2b   6e092b:	41 88 c4             	mov    %al,%r12b
0a2e   6e092e:	48 8b 5c 24 28       	mov    0x28(%rsp),%rbx
0a33   6e0933:	89 df                	mov    %ebx,%edi
0a35   6e0935:	44 89 e6             	mov    %r12d,%esi
0a38   6e0938:	e8 00 00 00 00       	call   6e093d <shrink_lruvec+0xa3d>	6e0939: R_X86_64_PLT32	__sanitizer_cov_trace_cmp4-0x4
0a3d   6e093d:	44 39 e3             	cmp    %r12d,%ebx
0a40   6e0940:	b8 00 00 00 00       	mov    $0x0,%eax
0a45   6e0945:	4c 0f 45 f0          	cmovne %rax,%r14
0a49   6e0949:	48 8b 5c 24 18       	mov    0x18(%rsp),%rbx
0a4e   6e094e:	4d 89 fc             	mov    %r15,%r12
0a51   6e0951:	e9 40 01 00 00       	jmp    6e0a96 <shrink_lruvec+0xb96>
0a56   6e0956:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0a60   6e0960:	48 8b 4c 24 38       	mov    0x38(%rsp),%rcx
0a65   6e0965:	8a 04 01             	mov    (%rcx,%rax,1),%al
0a68   6e0968:	84 c0                	test   %al,%al
0a6a   6e096a:	0f 85 24 02 00 00    	jne    6e0b94 <shrink_lruvec+0xc94>
0a70   6e0970:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e0976 <shrink_lruvec+0xa76>	6e0972: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
0a76   6e0976:	bf 01 00 00 00       	mov    $0x1,%edi
0a7b   6e097b:	89 de                	mov    %ebx,%esi
0a7d   6e097d:	e8 00 00 00 00       	call   6e0982 <shrink_lruvec+0xa82>	6e097e: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
0a82   6e0982:	85 db                	test   %ebx,%ebx
0a84   6e0984:	0f 8e 95 00 00 00    	jle    6e0a1f <shrink_lruvec+0xb1f>
0a8a   6e098a:	48 8b 54 24 48       	mov    0x48(%rsp),%rdx
0a8f   6e098f:	48 89 d0             	mov    %rdx,%rax
0a92   6e0992:	48 c1 e8 03          	shr    $0x3,%rax
0a96   6e0996:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0aa0   6e09a0:	8a 04 08             	mov    (%rax,%rcx,1),%al
0aa3   6e09a3:	84 c0                	test   %al,%al
0aa5   6e09a5:	0f 85 33 02 00 00    	jne    6e0bde <shrink_lruvec+0xcde>
0aab   6e09ab:	8b 1a                	mov    (%rdx),%ebx
0aad   6e09ad:	89 de                	mov    %ebx,%esi
0aaf   6e09af:	83 e6 02             	and    $0x2,%esi
0ab2   6e09b2:	31 ff                	xor    %edi,%edi
0ab4   6e09b4:	e8 00 00 00 00       	call   6e09b9 <shrink_lruvec+0xab9>	6e09b5: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
0ab9   6e09b9:	83 e3 02             	and    $0x2,%ebx
0abc   6e09bc:	75 68                	jne    6e0a26 <shrink_lruvec+0xb26>
0abe   6e09be:	31 db                	xor    %ebx,%ebx
0ac0   6e09c0:	83 7c 24 58 02       	cmpl   $0x2,0x58(%rsp)
0ac5   6e09c5:	0f 94 c3             	sete   %bl
0ac8   6e09c8:	e8 00 00 00 00       	call   6e09cd <shrink_lruvec+0xacd>	6e09c9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0acd   6e09cd:	48 8d 1c dc          	lea    (%rsp,%rbx,8),%rbx
0ad1   6e09d1:	48 81 c3 90 00 00 00 	add    $0x90,%rbx
0ad8   6e09d8:	48 89 d8             	mov    %rbx,%rax
0adb   6e09db:	48 c1 e8 03          	shr    $0x3,%rax
0adf   6e09df:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0ae9   6e09e9:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0aed   6e09ed:	74 08                	je     6e09f7 <shrink_lruvec+0xaf7>
0aef   6e09ef:	48 89 df             	mov    %rbx,%rdi
0af2   6e09f2:	e8 00 00 00 00       	call   6e09f7 <shrink_lruvec+0xaf7>	6e09f3: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0af7   6e09f7:	4c 0f af 33          	imul   (%rbx),%r14
0afb   6e09fb:	4c 03 b4 24 60 01 00 00 	add    0x160(%rsp),%r14
0b03   6e0a03:	eb 61                	jmp    6e0a66 <shrink_lruvec+0xb66>
0b05   6e0a05:	e8 00 00 00 00       	call   6e0a0a <shrink_lruvec+0xb0a>	6e0a06: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0b0a   6e0a0a:	45 31 f6             	xor    %r14d,%r14d
0b0d   6e0a0d:	e9 49 fe ff ff       	jmp    6e085b <shrink_lruvec+0x95b>
0b12   6e0a12:	e8 00 00 00 00       	call   6e0a17 <shrink_lruvec+0xb17>	6e0a13: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0b17   6e0a17:	45 31 f6             	xor    %r14d,%r14d
0b1a   6e0a1a:	e9 3c fe ff ff       	jmp    6e085b <shrink_lruvec+0x95b>
0b1f   6e0a1f:	e8 00 00 00 00       	call   6e0a24 <shrink_lruvec+0xb24>	6e0a20: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0b24   6e0a24:	eb 05                	jmp    6e0a2b <shrink_lruvec+0xb2b>
0b26   6e0a26:	e8 00 00 00 00       	call   6e0a2b <shrink_lruvec+0xb2b>	6e0a27: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0b2b   6e0a2b:	48 8b 4c 24 58       	mov    0x58(%rsp),%rcx
0b30   6e0a30:	31 c0                	xor    %eax,%eax
0b32   6e0a32:	83 f9 02             	cmp    $0x2,%ecx
0b35   6e0a35:	0f 94 c0             	sete   %al
0b38   6e0a38:	48 8d 1c c4          	lea    (%rsp,%rax,8),%rbx
0b3c   6e0a3c:	48 81 c3 90 00 00 00 	add    $0x90,%rbx
0b43   6e0a43:	48 89 d8             	mov    %rbx,%rax
0b46   6e0a46:	48 c1 e8 03          	shr    $0x3,%rax
0b4a   6e0a4a:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0b54   6e0a54:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0b58   6e0a58:	74 08                	je     6e0a62 <shrink_lruvec+0xb62>
0b5a   6e0a5a:	48 89 df             	mov    %rbx,%rdi
0b5d   6e0a5d:	e8 00 00 00 00       	call   6e0a62 <shrink_lruvec+0xb62>	6e0a5e: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0b62   6e0a62:	4c 0f af 33          	imul   (%rbx),%r14
0b66   6e0a66:	4c 89 f0             	mov    %r14,%rax
0b69   6e0a69:	48 8b 8c 24 28 01 00 00 	mov    0x128(%rsp),%rcx
0b71   6e0a71:	48 09 c8             	or     %rcx,%rax
0b74   6e0a74:	48 c1 e8 20          	shr    $0x20,%rax
0b78   6e0a78:	74 0d                	je     6e0a87 <shrink_lruvec+0xb87>
0b7a   6e0a7a:	4c 89 f0             	mov    %r14,%rax
0b7d   6e0a7d:	31 d2                	xor    %edx,%edx
0b7f   6e0a7f:	48 f7 f1             	div    %rcx
0b82   6e0a82:	49 89 c6             	mov    %rax,%r14
0b85   6e0a85:	eb 0a                	jmp    6e0a91 <shrink_lruvec+0xb91>
0b87   6e0a87:	44 89 f0             	mov    %r14d,%eax
0b8a   6e0a8a:	31 d2                	xor    %edx,%edx
0b8c   6e0a8c:	f7 f1                	div    %ecx
0b8e   6e0a8e:	41 89 c6             	mov    %eax,%r14d
0b91   6e0a91:	48 8b 5c 24 18       	mov    0x18(%rsp),%rbx
0b96   6e0a96:	48 8d 3c dc          	lea    (%rsp,%rbx,8),%rdi
0b9a   6e0a9a:	48 81 c7 00 01 00 00 	add    $0x100,%rdi
0ba1   6e0aa1:	48 89 f8             	mov    %rdi,%rax
0ba4   6e0aa4:	48 c1 e8 03          	shr    $0x3,%rax
0ba8   6e0aa8:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0bb2   6e0ab2:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0bb6   6e0ab6:	74 05                	je     6e0abd <shrink_lruvec+0xbbd>
0bb8   6e0ab8:	e8 00 00 00 00       	call   6e0abd <shrink_lruvec+0xbbd>	6e0ab9: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
0bbd   6e0abd:	4c 89 b4 dc 00 01 00 00 	mov    %r14,0x100(%rsp,%rbx,8)
0bc5   6e0ac5:	48 83 c3 01          	add    $0x1,%rbx
0bc9   6e0ac9:	48 83 fb 04          	cmp    $0x4,%rbx
0bcd   6e0acd:	0f 84 6d 01 00 00    	je     6e0c40 <shrink_lruvec+0xd40>
0bd3   6e0ad3:	e8 00 00 00 00       	call   6e0ad8 <shrink_lruvec+0xbd8>	6e0ad4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0bd8   6e0ad8:	48 83 44 24 60 08    	addq   $0x8,0x60(%rsp)
0bde   6e0ade:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
0be8   6e0ae8:	e9 c6 f8 ff ff       	jmp    6e03b3 <shrink_lruvec+0x4b3>
0bed   6e0aed:	48 8b 4c 24 50       	mov    0x50(%rsp),%rcx
0bf2   6e0af2:	80 e1 07             	and    $0x7,%cl
0bf5   6e0af5:	38 c1                	cmp    %al,%cl
0bf7   6e0af7:	0f 8c f0 f8 ff ff    	jl     6e03ed <shrink_lruvec+0x4ed>
0bfd   6e0afd:	48 8b 7c 24 50       	mov    0x50(%rsp),%rdi
0c02   6e0b02:	e8 00 00 00 00       	call   6e0b07 <shrink_lruvec+0xc07>	6e0b03: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
0c07   6e0b07:	e9 e1 f8 ff ff       	jmp    6e03ed <shrink_lruvec+0x4ed>
0c0c   6e0b0c:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e0b0f: R_X86_64_32S	memory_cgrp_subsys_enabled_key
0c13   6e0b13:	80 e1 07             	and    $0x7,%cl
0c16   6e0b16:	80 c1 03             	add    $0x3,%cl
0c19   6e0b19:	38 c1                	cmp    %al,%cl
0c1b   6e0b1b:	0f 8c 31 fb ff ff    	jl     6e0652 <shrink_lruvec+0x752>
0c21   6e0b21:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e0b24: R_X86_64_32S	memory_cgrp_subsys_enabled_key
0c28   6e0b28:	e8 00 00 00 00       	call   6e0b2d <shrink_lruvec+0xc2d>	6e0b29: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0c2d   6e0b2d:	e9 20 fb ff ff       	jmp    6e0652 <shrink_lruvec+0x752>
0c32   6e0b32:	89 d9                	mov    %ebx,%ecx
0c34   6e0b34:	80 e1 07             	and    $0x7,%cl
0c37   6e0b37:	38 c1                	cmp    %al,%cl
0c39   6e0b39:	0f 8c e1 fc ff ff    	jl     6e0820 <shrink_lruvec+0x920>
0c3f   6e0b3f:	48 89 df             	mov    %rbx,%rdi
0c42   6e0b42:	e8 00 00 00 00       	call   6e0b47 <shrink_lruvec+0xc47>	6e0b43: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
0c47   6e0b47:	e9 d4 fc ff ff       	jmp    6e0820 <shrink_lruvec+0x920>
0c4c   6e0b4c:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e0b4f: R_X86_64_32S	memory_cgrp_subsys_enabled_key
0c53   6e0b53:	80 e1 07             	and    $0x7,%cl
0c56   6e0b56:	80 c1 03             	add    $0x3,%cl
0c59   6e0b59:	38 c1                	cmp    %al,%cl
0c5b   6e0b5b:	0f 8c 3c fd ff ff    	jl     6e089d <shrink_lruvec+0x99d>
0c61   6e0b61:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e0b64: R_X86_64_32S	memory_cgrp_subsys_enabled_key
0c68   6e0b68:	e8 00 00 00 00       	call   6e0b6d <shrink_lruvec+0xc6d>	6e0b69: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0c6d   6e0b6d:	e9 2b fd ff ff       	jmp    6e089d <shrink_lruvec+0x99d>
0c72   6e0b72:	48 8b 4c 24 20       	mov    0x20(%rsp),%rcx
0c77   6e0b77:	80 e1 07             	and    $0x7,%cl
0c7a   6e0b7a:	80 c1 01             	add    $0x1,%cl
0c7d   6e0b7d:	38 c1                	cmp    %al,%cl
0c7f   6e0b7f:	0f 8c 9f fb ff ff    	jl     6e0724 <shrink_lruvec+0x824>
0c85   6e0b85:	48 8b 7c 24 20       	mov    0x20(%rsp),%rdi
0c8a   6e0b8a:	e8 00 00 00 00       	call   6e0b8f <shrink_lruvec+0xc8f>	6e0b8b: R_X86_64_PLT32	__asan_report_load2_noabort-0x4
0c8f   6e0b8f:	e9 90 fb ff ff       	jmp    6e0724 <shrink_lruvec+0x824>
0c94   6e0b94:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e0b97: R_X86_64_32S	memory_cgrp_subsys_enabled_key
0c9b   6e0b9b:	80 e1 07             	and    $0x7,%cl
0c9e   6e0b9e:	80 c1 03             	add    $0x3,%cl
0ca1   6e0ba1:	38 c1                	cmp    %al,%cl
0ca3   6e0ba3:	0f 8c c7 fd ff ff    	jl     6e0970 <shrink_lruvec+0xa70>
0ca9   6e0ba9:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e0bac: R_X86_64_32S	memory_cgrp_subsys_enabled_key
0cb0   6e0bb0:	e8 00 00 00 00       	call   6e0bb5 <shrink_lruvec+0xcb5>	6e0bb1: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0cb5   6e0bb5:	e9 b6 fd ff ff       	jmp    6e0970 <shrink_lruvec+0xa70>
0cba   6e0bba:	89 d1                	mov    %edx,%ecx
0cbc   6e0bbc:	80 e1 07             	and    $0x7,%cl
0cbf   6e0bbf:	80 c1 03             	add    $0x3,%cl
0cc2   6e0bc2:	38 c1                	cmp    %al,%cl
0cc4   6e0bc4:	0f 8c 05 fd ff ff    	jl     6e08cf <shrink_lruvec+0x9cf>
0cca   6e0bca:	48 8b 7c 24 48       	mov    0x48(%rsp),%rdi
0ccf   6e0bcf:	e8 00 00 00 00       	call   6e0bd4 <shrink_lruvec+0xcd4>	6e0bd0: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0cd4   6e0bd4:	48 8b 54 24 48       	mov    0x48(%rsp),%rdx
0cd9   6e0bd9:	e9 f1 fc ff ff       	jmp    6e08cf <shrink_lruvec+0x9cf>
0cde   6e0bde:	89 d1                	mov    %edx,%ecx
0ce0   6e0be0:	80 e1 07             	and    $0x7,%cl
0ce3   6e0be3:	80 c1 03             	add    $0x3,%cl
0ce6   6e0be6:	38 c1                	cmp    %al,%cl
0ce8   6e0be8:	0f 8c bd fd ff ff    	jl     6e09ab <shrink_lruvec+0xaab>
0cee   6e0bee:	48 8b 7c 24 48       	mov    0x48(%rsp),%rdi
0cf3   6e0bf3:	e8 00 00 00 00       	call   6e0bf8 <shrink_lruvec+0xcf8>	6e0bf4: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0cf8   6e0bf8:	48 8b 54 24 48       	mov    0x48(%rsp),%rdx
0cfd   6e0bfd:	e9 a9 fd ff ff       	jmp    6e09ab <shrink_lruvec+0xaab>
0d02   6e0c02:	48 8b 4c 24 20       	mov    0x20(%rsp),%rcx
0d07   6e0c07:	80 e1 07             	and    $0x7,%cl
0d0a   6e0c0a:	80 c1 01             	add    $0x1,%cl
0d0d   6e0c0d:	38 c1                	cmp    %al,%cl
0d0f   6e0c0f:	0f 8c 6b fb ff ff    	jl     6e0780 <shrink_lruvec+0x880>
0d15   6e0c15:	48 8b 7c 24 20       	mov    0x20(%rsp),%rdi
0d1a   6e0c1a:	e8 00 00 00 00       	call   6e0c1f <shrink_lruvec+0xd1f>	6e0c1b: R_X86_64_PLT32	__asan_report_store2_noabort-0x4
0d1f   6e0c1f:	e9 5c fb ff ff       	jmp    6e0780 <shrink_lruvec+0x880>
0d24   6e0c24:	e8 00 00 00 00       	call   6e0c29 <shrink_lruvec+0xd29>	6e0c25: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0d29   6e0c29:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e0c2c: R_X86_64_32S	.data+0x609ea0
0d30   6e0c30:	4c 89 f6             	mov    %r14,%rsi
0d33   6e0c33:	48 89 da             	mov    %rbx,%rdx
0d36   6e0c36:	e8 00 00 00 00       	call   6e0c3b <shrink_lruvec+0xd3b>	6e0c37: R_X86_64_PLT32	__ubsan_handle_shift_out_of_bounds-0x4
0d3b   6e0c3b:	e9 02 fc ff ff       	jmp    6e0842 <shrink_lruvec+0x942>
0d40   6e0c40:	48 8d bc 24 80 01 00 00 	lea    0x180(%rsp),%rdi
0d48   6e0c48:	48 8d b4 24 00 01 00 00 	lea    0x100(%rsp),%rsi
0d50   6e0c50:	ba 28 00 00 00       	mov    $0x28,%edx
0d55   6e0c55:	e8 00 00 00 00       	call   6e0c5a <shrink_lruvec+0xd5a>	6e0c56: R_X86_64_PLT32	memcpy-0x4
0d5a   6e0c5a:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
0d64   6e0c64:	48 8b 84 24 e8 00 00 00 	mov    0xe8(%rsp),%rax
0d6c   6e0c6c:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
0d71   6e0c71:	48 8b 9c 24 80 00 00 00 	mov    0x80(%rsp),%rbx
0d79   6e0c79:	74 08                	je     6e0c83 <shrink_lruvec+0xd83>
0d7b   6e0c7b:	48 89 df             	mov    %rbx,%rdi
0d7e   6e0c7e:	e8 00 00 00 00       	call   6e0c83 <shrink_lruvec+0xd83>	6e0c7f: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0d83   6e0c83:	48 83 3b 00          	cmpq   $0x0,(%rbx)
0d87   6e0c87:	74 12                	je     6e0c9b <shrink_lruvec+0xd9b>
0d89   6e0c89:	e8 00 00 00 00       	call   6e0c8e <shrink_lruvec+0xd8e>	6e0c8a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0d8e   6e0c8e:	c7 44 24 74 00 00 00 00 	movl   $0x0,0x74(%rsp)
0d96   6e0c96:	e9 97 00 00 00       	jmp    6e0d32 <shrink_lruvec+0xe32>
0d9b   6e0c9b:	65 48 8b 1c 25 00 00 00 00 	mov    %gs:0x0,%rbx	6e0ca0: R_X86_64_32S	current_task
0da4   6e0ca4:	48 83 c3 2c          	add    $0x2c,%rbx
0da8   6e0ca8:	48 89 d8             	mov    %rbx,%rax
0dab   6e0cab:	48 c1 e8 03          	shr    $0x3,%rax
0daf   6e0caf:	42 8a 04 30          	mov    (%rax,%r14,1),%al
0db3   6e0cb3:	84 c0                	test   %al,%al
0db5   6e0cb5:	0f 85 08 1d 00 00    	jne    6e29c3 <shrink_lruvec+0x2ac3>
0dbb   6e0cbb:	44 8b 33             	mov    (%rbx),%r14d
0dbe   6e0cbe:	bb 00 00 02 00       	mov    $0x20000,%ebx
0dc3   6e0cc3:	be 00 00 02 00       	mov    $0x20000,%esi
0dc8   6e0cc8:	44 21 f6             	and    %r14d,%esi
0dcb   6e0ccb:	31 ff                	xor    %edi,%edi
0dcd   6e0ccd:	e8 00 00 00 00       	call   6e0cd2 <shrink_lruvec+0xdd2>	6e0cce: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
0dd2   6e0cd2:	44 21 f3             	and    %r14d,%ebx
0dd5   6e0cd5:	75 44                	jne    6e0d1b <shrink_lruvec+0xe1b>
0dd7   6e0cd7:	e8 00 00 00 00       	call   6e0cdc <shrink_lruvec+0xddc>	6e0cd8: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0ddc   6e0cdc:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
0de6   6e0ce6:	48 8b 84 24 78 01 00 00 	mov    0x178(%rsp),%rax
0dee   6e0cee:	42 8a 04 30          	mov    (%rax,%r14,1),%al
0df2   6e0cf2:	84 c0                	test   %al,%al
0df4   6e0cf4:	48 8b 9c 24 c0 00 00 00 	mov    0xc0(%rsp),%rbx
0dfc   6e0cfc:	0f 85 de 1c 00 00    	jne    6e29e0 <shrink_lruvec+0x2ae0>
0e02   6e0d02:	0f b6 33             	movzbl (%rbx),%esi
0e05   6e0d05:	83 fe 0c             	cmp    $0xc,%esi
0e08   6e0d08:	0f 94 c0             	sete   %al
0e0b   6e0d0b:	89 44 24 74          	mov    %eax,0x74(%rsp)
0e0f   6e0d0f:	bf 0c 00 00 00       	mov    $0xc,%edi
0e14   6e0d14:	e8 00 00 00 00       	call   6e0d19 <shrink_lruvec+0xe19>	6e0d15: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp1-0x4
0e19   6e0d19:	eb 17                	jmp    6e0d32 <shrink_lruvec+0xe32>
0e1b   6e0d1b:	e8 00 00 00 00       	call   6e0d20 <shrink_lruvec+0xe20>	6e0d1c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0e20   6e0d20:	c7 44 24 74 00 00 00 00 	movl   $0x0,0x74(%rsp)
0e28   6e0d28:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
0e32   6e0d32:	48 8d bc 24 f0 01 00 00 	lea    0x1f0(%rsp),%rdi
0e3a   6e0d3a:	e8 00 00 00 00       	call   6e0d3f <shrink_lruvec+0xe3f>	6e0d3b: R_X86_64_PLT32	blk_start_plug-0x4
0e3f   6e0d3f:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
0e44   6e0d44:	48 8d 42 30          	lea    0x30(%rdx),%rax
0e48   6e0d48:	48 89 84 24 58 01 00 00 	mov    %rax,0x158(%rsp)
0e50   6e0d50:	48 8b 44 24 30       	mov    0x30(%rsp),%rax
0e55   6e0d55:	48 8d 48 50          	lea    0x50(%rax),%rcx
0e59   6e0d59:	48 89 4c 24 18       	mov    %rcx,0x18(%rsp)
0e5e   6e0d5e:	48 8d 8c 24 00 01 00 00 	lea    0x100(%rsp),%rcx
0e66   6e0d66:	48 c1 e9 03          	shr    $0x3,%rcx
0e6a   6e0d6a:	48 89 8c 24 68 01 00 00 	mov    %rcx,0x168(%rsp)
0e72   6e0d72:	48 8d 8c 24 80 01 00 00 	lea    0x180(%rsp),%rcx
0e7a   6e0d7a:	48 c1 e9 03          	shr    $0x3,%rcx
0e7e   6e0d7e:	48 89 8c 24 a8 01 00 00 	mov    %rcx,0x1a8(%rsp)
0e86   6e0d86:	48 8d 8c 24 40 01 00 00 	lea    0x140(%rsp),%rcx
0e8e   6e0d8e:	48 c1 e9 03          	shr    $0x3,%rcx
0e92   6e0d92:	48 89 4c 24 48       	mov    %rcx,0x48(%rsp)
0e97   6e0d97:	48 8d 4c 24 68       	lea    0x68(%rsp),%rcx
0e9c   6e0d9c:	48 c1 e9 03          	shr    $0x3,%rcx
0ea0   6e0da0:	48 89 4c 24 50       	mov    %rcx,0x50(%rsp)
0ea5   6e0da5:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e0da8: R_X86_64_32S	memory_cgrp_subsys_on_dfl_key
0eac   6e0dac:	48 c1 e9 03          	shr    $0x3,%rcx
0eb0   6e0db0:	48 89 8c 24 70 01 00 00 	mov    %rcx,0x170(%rsp)
0eb8   6e0db8:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e0dbb: R_X86_64_32S	memory_cgrp_subsys_enabled_key
0ebf   6e0dbf:	48 c1 e9 03          	shr    $0x3,%rcx
0ec3   6e0dc3:	48 89 8c 24 f0 00 00 00 	mov    %rcx,0xf0(%rsp)
0ecb   6e0dcb:	48 05 00 04 00 00    	add    $0x400,%rax
0ed1   6e0dd1:	48 89 84 24 30 01 00 00 	mov    %rax,0x130(%rsp)
0ed9   6e0dd9:	48 8d 42 48          	lea    0x48(%rdx),%rax
0edd   6e0ddd:	48 89 84 24 28 01 00 00 	mov    %rax,0x128(%rsp)
0ee5   6e0de5:	48 8d 42 50          	lea    0x50(%rdx),%rax
0ee9   6e0de9:	48 89 84 24 60 01 00 00 	mov    %rax,0x160(%rsp)
0ef1   6e0df1:	48 8d 42 4c          	lea    0x4c(%rdx),%rax
0ef5   6e0df5:	48 89 84 24 e8 01 00 00 	mov    %rax,0x1e8(%rsp)
0efd   6e0dfd:	48 8d 42 54          	lea    0x54(%rdx),%rax
0f01   6e0e01:	48 89 84 24 e0 01 00 00 	mov    %rax,0x1e0(%rsp)
0f09   6e0e09:	48 8d 42 58          	lea    0x58(%rdx),%rax
0f0d   6e0e0d:	48 89 84 24 d8 01 00 00 	mov    %rax,0x1d8(%rsp)
0f15   6e0e15:	48 8d 42 60          	lea    0x60(%rdx),%rax
0f19   6e0e19:	48 89 84 24 d0 01 00 00 	mov    %rax,0x1d0(%rsp)
0f21   6e0e21:	48 8d 42 5c          	lea    0x5c(%rdx),%rax
0f25   6e0e25:	48 89 84 24 50 01 00 00 	mov    %rax,0x150(%rsp)
0f2d   6e0e2d:	31 c0                	xor    %eax,%eax
0f2f   6e0e2f:	48 89 84 24 e0 00 00 00 	mov    %rax,0xe0(%rsp)
0f37   6e0e37:	eb 0f                	jmp    6e0e48 <shrink_lruvec+0xf48>
0f39   6e0e39:	e8 00 00 00 00       	call   6e0e3e <shrink_lruvec+0xf3e>	6e0e3a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0f3e   6e0e3e:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
0f48   6e0e48:	48 8b 84 24 68 01 00 00 	mov    0x168(%rsp),%rax
0f50   6e0e50:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
0f55   6e0e55:	74 0d                	je     6e0e64 <shrink_lruvec+0xf64>
0f57   6e0e57:	48 8d bc 24 00 01 00 00 	lea    0x100(%rsp),%rdi
0f5f   6e0e5f:	e8 00 00 00 00       	call   6e0e64 <shrink_lruvec+0xf64>	6e0e60: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0f64   6e0e64:	48 8b 9c 24 00 01 00 00 	mov    0x100(%rsp),%rbx
0f6c   6e0e6c:	31 ff                	xor    %edi,%edi
0f6e   6e0e6e:	48 89 de             	mov    %rbx,%rsi
0f71   6e0e71:	e8 00 00 00 00       	call   6e0e76 <shrink_lruvec+0xf76>	6e0e72: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
0f76   6e0e76:	48 85 db             	test   %rbx,%rbx
0f79   6e0e79:	74 07                	je     6e0e82 <shrink_lruvec+0xf82>
0f7b   6e0e7b:	e8 00 00 00 00       	call   6e0e80 <shrink_lruvec+0xf80>	6e0e7c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0f80   6e0e80:	eb 74                	jmp    6e0ef6 <shrink_lruvec+0xff6>
0f82   6e0e82:	48 8d bc 24 18 01 00 00 	lea    0x118(%rsp),%rdi
0f8a   6e0e8a:	48 89 f8             	mov    %rdi,%rax
0f8d   6e0e8d:	48 c1 e8 03          	shr    $0x3,%rax
0f91   6e0e91:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
0f96   6e0e96:	74 05                	je     6e0e9d <shrink_lruvec+0xf9d>
0f98   6e0e98:	e8 00 00 00 00       	call   6e0e9d <shrink_lruvec+0xf9d>	6e0e99: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0f9d   6e0e9d:	48 8b 9c 24 18 01 00 00 	mov    0x118(%rsp),%rbx
0fa5   6e0ea5:	31 ff                	xor    %edi,%edi
0fa7   6e0ea7:	48 89 de             	mov    %rbx,%rsi
0faa   6e0eaa:	e8 00 00 00 00       	call   6e0eaf <shrink_lruvec+0xfaf>	6e0eab: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
0faf   6e0eaf:	48 85 db             	test   %rbx,%rbx
0fb2   6e0eb2:	74 07                	je     6e0ebb <shrink_lruvec+0xfbb>
0fb4   6e0eb4:	e8 00 00 00 00       	call   6e0eb9 <shrink_lruvec+0xfb9>	6e0eb5: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0fb9   6e0eb9:	eb 3b                	jmp    6e0ef6 <shrink_lruvec+0xff6>
0fbb   6e0ebb:	48 8d bc 24 10 01 00 00 	lea    0x110(%rsp),%rdi
0fc3   6e0ec3:	48 89 f8             	mov    %rdi,%rax
0fc6   6e0ec6:	48 c1 e8 03          	shr    $0x3,%rax
0fca   6e0eca:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
0fcf   6e0ecf:	74 05                	je     6e0ed6 <shrink_lruvec+0xfd6>
0fd1   6e0ed1:	e8 00 00 00 00       	call   6e0ed6 <shrink_lruvec+0xfd6>	6e0ed2: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0fd6   6e0ed6:	48 8b 9c 24 10 01 00 00 	mov    0x110(%rsp),%rbx
0fde   6e0ede:	31 ff                	xor    %edi,%edi
0fe0   6e0ee0:	48 89 de             	mov    %rbx,%rsi
0fe3   6e0ee3:	e8 00 00 00 00       	call   6e0ee8 <shrink_lruvec+0xfe8>	6e0ee4: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
0fe8   6e0ee8:	48 85 db             	test   %rbx,%rbx
0feb   6e0eeb:	0f 84 c6 16 00 00    	je     6e25b7 <shrink_lruvec+0x26b7>
0ff1   6e0ef1:	e8 00 00 00 00       	call   6e0ef6 <shrink_lruvec+0xff6>	6e0ef2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0ff6   6e0ef6:	4c 8d bc 24 00 01 00 00 	lea    0x100(%rsp),%r15
0ffe   6e0efe:	45 31 e4             	xor    %r12d,%r12d
1001   6e0f01:	eb 41                	jmp    6e0f44 <shrink_lruvec+0x1044>
1003   6e0f03:	e8 00 00 00 00       	call   6e0f08 <shrink_lruvec+0x1008>	6e0f04: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1008   6e0f08:	4c 89 ff             	mov    %r15,%rdi
100b   6e0f0b:	48 8b 74 24 30       	mov    0x30(%rsp),%rsi
1010   6e0f10:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
1015   6e0f15:	44 89 e1             	mov    %r12d,%ecx
1018   6e0f18:	e8 e3 93 00 00       	call   6ea300 <shrink_active_list>
101d   6e0f1d:	45 31 ff             	xor    %r15d,%r15d
1020   6e0f20:	4c 01 bc 24 e0 00 00 00 	add    %r15,0xe0(%rsp)
1028   6e0f28:	4c 8b 7c 24 60       	mov    0x60(%rsp),%r15
102d   6e0f2d:	49 83 fc 03          	cmp    $0x3,%r12
1031   6e0f31:	0f 84 8b 12 00 00    	je     6e21c2 <shrink_lruvec+0x22c2>
1037   6e0f37:	e8 00 00 00 00       	call   6e0f3c <shrink_lruvec+0x103c>	6e0f38: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
103c   6e0f3c:	49 83 c7 08          	add    $0x8,%r15
1040   6e0f40:	49 83 c4 01          	add    $0x1,%r12
1044   6e0f44:	4d 89 fe             	mov    %r15,%r14
1047   6e0f47:	49 c1 ee 03          	shr    $0x3,%r14
104b   6e0f4b:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
1055   6e0f55:	41 80 3c 06 00       	cmpb   $0x0,(%r14,%rax,1)
105a   6e0f5a:	74 08                	je     6e0f64 <shrink_lruvec+0x1064>
105c   6e0f5c:	4c 89 ff             	mov    %r15,%rdi
105f   6e0f5f:	e8 00 00 00 00       	call   6e0f64 <shrink_lruvec+0x1064>	6e0f60: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1064   6e0f64:	4c 89 64 24 08       	mov    %r12,0x8(%rsp)
1069   6e0f69:	4a 8b 9c e4 00 01 00 00 	mov    0x100(%rsp,%r12,8),%rbx
1071   6e0f71:	31 ff                	xor    %edi,%edi
1073   6e0f73:	48 89 de             	mov    %rbx,%rsi
1076   6e0f76:	e8 00 00 00 00       	call   6e0f7b <shrink_lruvec+0x107b>	6e0f77: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
107b   6e0f7b:	48 85 db             	test   %rbx,%rbx
107e   6e0f7e:	0f 84 fa 00 00 00    	je     6e107e <shrink_lruvec+0x117e>
1084   6e0f84:	4c 89 7c 24 60       	mov    %r15,0x60(%rsp)
1089   6e0f89:	bf 20 00 00 00       	mov    $0x20,%edi
108e   6e0f8e:	48 89 de             	mov    %rbx,%rsi
1091   6e0f91:	e8 00 00 00 00       	call   6e0f96 <shrink_lruvec+0x1096>	6e0f92: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
1096   6e0f96:	48 83 fb 20          	cmp    $0x20,%rbx
109a   6e0f9a:	41 bf 20 00 00 00    	mov    $0x20,%r15d
10a0   6e0fa0:	4c 0f 42 fb          	cmovb  %rbx,%r15
10a4   6e0fa4:	4c 29 fb             	sub    %r15,%rbx
10a7   6e0fa7:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
10b1   6e0fb1:	41 80 3c 06 00       	cmpb   $0x0,(%r14,%rax,1)
10b6   6e0fb6:	49 89 c6             	mov    %rax,%r14
10b9   6e0fb9:	74 0a                	je     6e0fc5 <shrink_lruvec+0x10c5>
10bb   6e0fbb:	48 8b 7c 24 60       	mov    0x60(%rsp),%rdi
10c0   6e0fc0:	e8 00 00 00 00       	call   6e0fc5 <shrink_lruvec+0x10c5>	6e0fc1: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
10c5   6e0fc5:	48 8b 44 24 08       	mov    0x8(%rsp),%rax
10ca   6e0fca:	48 89 9c c4 00 01 00 00 	mov    %rbx,0x100(%rsp,%rax,8)
10d2   6e0fd2:	89 c3                	mov    %eax,%ebx
10d4   6e0fd4:	81 e3 fd ff ff 7f    	and    $0x7ffffffd,%ebx
10da   6e0fda:	bf 01 00 00 00       	mov    $0x1,%edi
10df   6e0fdf:	89 de                	mov    %ebx,%esi
10e1   6e0fe1:	e8 00 00 00 00       	call   6e0fe6 <shrink_lruvec+0x10e6>	6e0fe2: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
10e6   6e0fe6:	83 fb 01             	cmp    $0x1,%ebx
10e9   6e0fe9:	0f 85 a8 00 00 00    	jne    6e1097 <shrink_lruvec+0x1197>
10ef   6e0fef:	48 8b 84 24 d8 00 00 00 	mov    0xd8(%rsp),%rax
10f7   6e0ff7:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
10fc   6e0ffc:	84 c0                	test   %al,%al
10fe   6e0ffe:	0f 85 f0 0d 00 00    	jne    6e1df4 <shrink_lruvec+0x1ef4>
1104   6e1004:	45 0f b7 75 00       	movzwl 0x0(%r13),%r14d
1109   6e1009:	4c 8b 64 24 08       	mov    0x8(%rsp),%r12
110e   6e100e:	44 89 e3             	mov    %r12d,%ebx
1111   6e1011:	81 e3 fe ff ff 7f    	and    $0x7ffffffe,%ebx
1117   6e1017:	bf 02 00 00 00       	mov    $0x2,%edi
111c   6e101c:	89 de                	mov    %ebx,%esi
111e   6e101e:	e8 00 00 00 00       	call   6e1023 <shrink_lruvec+0x1123>	6e101f: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1123   6e1023:	83 fb 02             	cmp    $0x2,%ebx
1126   6e1026:	0f 94 c1             	sete   %cl
1129   6e1029:	bb 01 00 00 00       	mov    $0x1,%ebx
112e   6e102e:	d3 e3                	shl    %cl,%ebx
1130   6e1030:	44 89 f6             	mov    %r14d,%esi
1133   6e1033:	21 de                	and    %ebx,%esi
1135   6e1035:	31 ff                	xor    %edi,%edi
1137   6e1037:	e8 00 00 00 00       	call   6e103c <shrink_lruvec+0x113c>	6e1038: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
113c   6e103c:	44 21 f3             	and    %r14d,%ebx
113f   6e103f:	0f 85 be fe ff ff    	jne    6e0f03 <shrink_lruvec+0x1003>
1145   6e1045:	e8 00 00 00 00       	call   6e104a <shrink_lruvec+0x114a>	6e1046: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
114a   6e104a:	41 83 ce 08          	or     $0x8,%r14d
114e   6e104e:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
1158   6e1058:	48 8b 8c 24 d8 00 00 00 	mov    0xd8(%rsp),%rcx
1160   6e1060:	0f b6 04 01          	movzbl (%rcx,%rax,1),%eax
1164   6e1064:	84 c0                	test   %al,%al
1166   6e1066:	0f 85 7d 10 00 00    	jne    6e20e9 <shrink_lruvec+0x21e9>
116c   6e106c:	66 45 89 75 00       	mov    %r14w,0x0(%r13)
1171   6e1071:	45 31 ff             	xor    %r15d,%r15d
1174   6e1074:	4c 8b 64 24 08       	mov    0x8(%rsp),%r12
1179   6e1079:	e9 a2 fe ff ff       	jmp    6e0f20 <shrink_lruvec+0x1020>
117e   6e107e:	e8 00 00 00 00       	call   6e1083 <shrink_lruvec+0x1183>	6e107f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1183   6e1083:	4c 8b 64 24 08       	mov    0x8(%rsp),%r12
1188   6e1088:	49 83 fc 03          	cmp    $0x3,%r12
118c   6e108c:	0f 85 a5 fe ff ff    	jne    6e0f37 <shrink_lruvec+0x1037>
1192   6e1092:	e9 2b 11 00 00       	jmp    6e21c2 <shrink_lruvec+0x22c2>
1197   6e1097:	4c 89 7c 24 38       	mov    %r15,0x38(%rsp)
119c   6e109c:	48 8b 44 24 48       	mov    0x48(%rsp),%rax
11a1   6e10a1:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
11a6   6e10a6:	48 8b 9c 24 38 01 00 00 	mov    0x138(%rsp),%rbx
11ae   6e10ae:	4c 8d ac 24 40 01 00 00 	lea    0x140(%rsp),%r13
11b6   6e10b6:	74 08                	je     6e10c0 <shrink_lruvec+0x11c0>
11b8   6e10b8:	4c 89 ef             	mov    %r13,%rdi
11bb   6e10bb:	e8 00 00 00 00       	call   6e10c0 <shrink_lruvec+0x11c0>	6e10bc: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
11c0   6e10c0:	4c 89 ac 24 40 01 00 00 	mov    %r13,0x140(%rsp)
11c8   6e10c8:	48 8d bc 24 48 01 00 00 	lea    0x148(%rsp),%rdi
11d0   6e10d0:	48 89 f8             	mov    %rdi,%rax
11d3   6e10d3:	48 c1 e8 03          	shr    $0x3,%rax
11d7   6e10d7:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
11dc   6e10dc:	4c 8b 7c 24 18       	mov    0x18(%rsp),%r15
11e1   6e10e1:	74 05                	je     6e10e8 <shrink_lruvec+0x11e8>
11e3   6e10e3:	e8 00 00 00 00       	call   6e10e8 <shrink_lruvec+0x11e8>	6e10e4: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
11e8   6e10e8:	48 8d 84 24 40 01 00 00 	lea    0x140(%rsp),%rax
11f0   6e10f0:	48 89 84 24 48 01 00 00 	mov    %rax,0x148(%rsp)
11f8   6e10f8:	48 8b 44 24 50       	mov    0x50(%rsp),%rax
11fd   6e10fd:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
1202   6e1102:	74 0a                	je     6e110e <shrink_lruvec+0x120e>
1204   6e1104:	48 8d 7c 24 68       	lea    0x68(%rsp),%rdi
1209   6e1109:	e8 00 00 00 00       	call   6e110e <shrink_lruvec+0x120e>	6e110a: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
120e   6e110e:	48 c7 44 24 68 00 00 00 00 	movq   $0x0,0x68(%rsp)
1217   6e1117:	ba 2c 00 00 00       	mov    $0x2c,%edx
121c   6e111c:	48 8d bc 24 90 00 00 00 	lea    0x90(%rsp),%rdi
1224   6e1124:	31 f6                	xor    %esi,%esi
1226   6e1126:	e8 00 00 00 00       	call   6e112b <shrink_lruvec+0x122b>	6e1127: R_X86_64_PLT32	memset-0x4
122b   6e112b:	48 8b 44 24 08       	mov    0x8(%rsp),%rax
1230   6e1130:	41 89 c4             	mov    %eax,%r12d
1233   6e1133:	41 81 e4 fe ff ff 7f 	and    $0x7ffffffe,%r12d
123a   6e113a:	bf 02 00 00 00       	mov    $0x2,%edi
123f   6e113f:	44 89 e6             	mov    %r12d,%esi
1242   6e1142:	e8 00 00 00 00       	call   6e1147 <shrink_lruvec+0x1247>	6e1143: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1247   6e1147:	48 89 d8             	mov    %rbx,%rax
124a   6e114a:	48 c1 e8 03          	shr    $0x3,%rax
124e   6e114e:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
1253   6e1153:	74 08                	je     6e115d <shrink_lruvec+0x125d>
1255   6e1155:	48 89 df             	mov    %rbx,%rdi
1258   6e1158:	e8 00 00 00 00       	call   6e115d <shrink_lruvec+0x125d>	6e1159: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
125d   6e115d:	48 8b 03             	mov    (%rbx),%rax
1260   6e1160:	48 89 44 24 40       	mov    %rax,0x40(%rsp)
1265   6e1165:	65 4c 8b 2c 25 00 00 00 00 	mov    %gs:0x0,%r13	6e116a: R_X86_64_32S	current_task
126e   6e116e:	49 8d 5d 2c          	lea    0x2c(%r13),%rbx
1272   6e1172:	48 89 d8             	mov    %rbx,%rax
1275   6e1175:	48 c1 e8 03          	shr    $0x3,%rax
1279   6e1179:	48 89 44 24 58       	mov    %rax,0x58(%rsp)
127e   6e117e:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1283   6e1183:	84 c0                	test   %al,%al
1285   6e1185:	0f 85 87 0c 00 00    	jne    6e1e12 <shrink_lruvec+0x1f12>
128b   6e118b:	48 89 9c 24 f8 00 00 00 	mov    %rbx,0xf8(%rsp)
1293   6e1193:	8b 1b                	mov    (%rbx),%ebx
1295   6e1195:	be 00 00 02 00       	mov    $0x20000,%esi
129a   6e119a:	21 de                	and    %ebx,%esi
129c   6e119c:	31 ff                	xor    %edi,%edi
129e   6e119e:	e8 00 00 00 00       	call   6e11a3 <shrink_lruvec+0x12a3>	6e119f: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
12a3   6e11a3:	b8 00 00 02 00       	mov    $0x20000,%eax
12a8   6e11a8:	21 c3                	and    %eax,%ebx
12aa   6e11aa:	44 89 a4 24 88 00 00 00 	mov    %r12d,0x88(%rsp)
12b2   6e11b2:	75 5d                	jne    6e1211 <shrink_lruvec+0x1311>
12b4   6e11b4:	48 8b 84 24 e8 00 00 00 	mov    0xe8(%rsp),%rax
12bc   6e11bc:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
12c1   6e11c1:	48 8b 9c 24 80 00 00 00 	mov    0x80(%rsp),%rbx
12c9   6e11c9:	74 08                	je     6e11d3 <shrink_lruvec+0x12d3>
12cb   6e11cb:	48 89 df             	mov    %rbx,%rdi
12ce   6e11ce:	e8 00 00 00 00       	call   6e11d3 <shrink_lruvec+0x12d3>	6e11cf: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
12d3   6e11d3:	48 83 3b 00          	cmpq   $0x0,(%rbx)
12d7   6e11d7:	74 4c                	je     6e1225 <shrink_lruvec+0x1325>
12d9   6e11d9:	48 8b 84 24 70 01 00 00 	mov    0x170(%rsp),%rax
12e1   6e11e1:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
12e6   6e11e6:	84 c0                	test   %al,%al
12e8   6e11e8:	0f 85 19 0f 00 00    	jne    6e2107 <shrink_lruvec+0x2207>
12ee   6e11ee:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e11f4 <shrink_lruvec+0x12f4>	6e11f0: R_X86_64_PC32	memory_cgrp_subsys_on_dfl_key-0x4
12f4   6e11f4:	31 ff                	xor    %edi,%edi
12f6   6e11f6:	89 de                	mov    %ebx,%esi
12f8   6e11f8:	e8 00 00 00 00       	call   6e11fd <shrink_lruvec+0x12fd>	6e11f9: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
12fd   6e11fd:	85 db                	test   %ebx,%ebx
12ff   6e11ff:	0f 8e 8f 08 00 00    	jle    6e1a94 <shrink_lruvec+0x1b94>
1305   6e1205:	4c 89 6c 24 78       	mov    %r13,0x78(%rsp)
130a   6e120a:	e8 00 00 00 00       	call   6e120f <shrink_lruvec+0x130f>	6e120b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
130f   6e120f:	eb 1e                	jmp    6e122f <shrink_lruvec+0x132f>
1311   6e1211:	e8 00 00 00 00       	call   6e1216 <shrink_lruvec+0x1316>	6e1212: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1316   6e1216:	48 8b 5c 24 08       	mov    0x8(%rsp),%rbx
131b   6e121b:	4c 8b 64 24 10       	mov    0x10(%rsp),%r12
1320   6e1220:	e9 73 01 00 00       	jmp    6e1398 <shrink_lruvec+0x1498>
1325   6e1225:	4c 89 6c 24 78       	mov    %r13,0x78(%rsp)
132a   6e122a:	e8 00 00 00 00       	call   6e122f <shrink_lruvec+0x132f>	6e122b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
132f   6e122f:	45 31 ed             	xor    %r13d,%r13d
1332   6e1232:	41 83 fc 02          	cmp    $0x2,%r12d
1336   6e1236:	48 c7 c3 00 00 00 00 	mov    $0x0,%rbx	6e1239: R_X86_64_32S	vm_node_stat
133d   6e123d:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6e1240: R_X86_64_32S	vm_node_stat+0x10
1344   6e1244:	48 0f 44 d8          	cmove  %rax,%rbx
1348   6e1248:	41 0f 94 c7          	sete   %r15b
134c   6e124c:	49 c7 c4 00 00 00 00 	mov    $0x0,%r12	6e124f: R_X86_64_32S	vm_node_stat+0x38
1353   6e1253:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6e1256: R_X86_64_32S	vm_node_stat+0x40
135a   6e125a:	4c 0f 44 e0          	cmove  %rax,%r12
135e   6e125e:	48 89 df             	mov    %rbx,%rdi
1361   6e1261:	be 08 00 00 00       	mov    $0x8,%esi
1366   6e1266:	e8 00 00 00 00       	call   6e126b <shrink_lruvec+0x136b>	6e1267: R_X86_64_PLT32	__kasan_check_read-0x4
136b   6e126b:	48 89 d8             	mov    %rbx,%rax
136e   6e126e:	48 c1 e8 03          	shr    $0x3,%rax
1372   6e1272:	48 89 84 24 c8 00 00 00 	mov    %rax,0xc8(%rsp)
137a   6e127a:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
137f   6e127f:	74 08                	je     6e1289 <shrink_lruvec+0x1389>
1381   6e1281:	48 89 df             	mov    %rbx,%rdi
1384   6e1284:	e8 00 00 00 00       	call   6e1289 <shrink_lruvec+0x1389>	6e1285: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1389   6e1289:	48 89 5c 24 28       	mov    %rbx,0x28(%rsp)
138e   6e128e:	4c 8b 33             	mov    (%rbx),%r14
1391   6e1291:	31 ff                	xor    %edi,%edi
1393   6e1293:	4c 89 f6             	mov    %r14,%rsi
1396   6e1296:	e8 00 00 00 00       	call   6e129b <shrink_lruvec+0x139b>	6e1297: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
139b   6e129b:	4d 85 f6             	test   %r14,%r14
139e   6e129e:	b8 00 00 00 00       	mov    $0x0,%eax
13a3   6e12a3:	4c 0f 48 f0          	cmovs  %rax,%r14
13a7   6e12a7:	4c 89 e7             	mov    %r12,%rdi
13aa   6e12aa:	be 08 00 00 00       	mov    $0x8,%esi
13af   6e12af:	e8 00 00 00 00       	call   6e12b4 <shrink_lruvec+0x13b4>	6e12b0: R_X86_64_PLT32	__kasan_check_read-0x4
13b4   6e12b4:	4c 89 e1             	mov    %r12,%rcx
13b7   6e12b7:	48 c1 e9 03          	shr    $0x3,%rcx
13bb   6e12bb:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
13c5   6e12c5:	48 89 8c 24 c8 01 00 00 	mov    %rcx,0x1c8(%rsp)
13cd   6e12cd:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
13d1   6e12d1:	74 08                	je     6e12db <shrink_lruvec+0x13db>
13d3   6e12d3:	4c 89 e7             	mov    %r12,%rdi
13d6   6e12d6:	e8 00 00 00 00       	call   6e12db <shrink_lruvec+0x13db>	6e12d7: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
13db   6e12db:	4c 89 a4 24 d0 00 00 00 	mov    %r12,0xd0(%rsp)
13e3   6e12e3:	45 88 fd             	mov    %r15b,%r13b
13e6   6e12e6:	4a 8d 04 ed 38 00 00 00 	lea    0x38(,%r13,8),%rax
13ee   6e12ee:	48 89 84 24 c0 01 00 00 	mov    %rax,0x1c0(%rsp)
13f6   6e12f6:	4c 8b a8 00 00 00 00 	mov    0x0(%rax),%r13	6e12f9: R_X86_64_32S	vm_node_stat
13fd   6e12fd:	31 ff                	xor    %edi,%edi
13ff   6e12ff:	4c 89 ee             	mov    %r13,%rsi
1402   6e1302:	e8 00 00 00 00       	call   6e1307 <shrink_lruvec+0x1407>	6e1303: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
1407   6e1307:	4d 85 ed             	test   %r13,%r13
140a   6e130a:	b8 00 00 00 00       	mov    $0x0,%eax
140f   6e130f:	4c 0f 48 e8          	cmovs  %rax,%r13
1413   6e1313:	48 8b 9c 24 58 01 00 00 	mov    0x158(%rsp),%rbx
141b   6e131b:	48 89 d9             	mov    %rbx,%rcx
141e   6e131e:	48 c1 e9 03          	shr    $0x3,%rcx
1422   6e1322:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
142c   6e132c:	48 89 8c 24 b8 01 00 00 	mov    %rcx,0x1b8(%rsp)
1434   6e1334:	0f b6 04 01          	movzbl (%rcx,%rax,1),%eax
1438   6e1338:	84 c0                	test   %al,%al
143a   6e133a:	0f 85 8c 0d 00 00    	jne    6e20cc <shrink_lruvec+0x21cc>
1440   6e1340:	8b 1b                	mov    (%rbx),%ebx
1442   6e1342:	b8 c0 00 00 00       	mov    $0xc0,%eax
1447   6e1347:	21 c3                	and    %eax,%ebx
1449   6e1349:	bf c0 00 00 00       	mov    $0xc0,%edi
144e   6e134e:	89 de                	mov    %ebx,%esi
1450   6e1350:	e8 00 00 00 00       	call   6e1355 <shrink_lruvec+0x1455>	6e1351: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1455   6e1355:	4d 89 f4             	mov    %r14,%r12
1458   6e1358:	49 c1 ec 03          	shr    $0x3,%r12
145c   6e135c:	81 fb c0 00 00 00    	cmp    $0xc0,%ebx
1462   6e1362:	4d 0f 45 e6          	cmovne %r14,%r12
1466   6e1366:	4c 89 ef             	mov    %r13,%rdi
1469   6e1369:	4c 89 e6             	mov    %r12,%rsi
146c   6e136c:	e8 00 00 00 00       	call   6e1371 <shrink_lruvec+0x1471>	6e136d: R_X86_64_PLT32	__sanitizer_cov_trace_cmp8-0x4
1471   6e1371:	4d 39 e5             	cmp    %r12,%r13
1474   6e1374:	0f 87 0e 08 00 00    	ja     6e1b88 <shrink_lruvec+0x1c88>
147a   6e137a:	e8 00 00 00 00       	call   6e137f <shrink_lruvec+0x147f>	6e137b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
147f   6e137f:	4c 8b 64 24 10       	mov    0x10(%rsp),%r12
1484   6e1384:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
148e   6e138e:	4c 8b 7c 24 18       	mov    0x18(%rsp),%r15
1493   6e1393:	48 8b 5c 24 08       	mov    0x8(%rsp),%rbx
1498   6e1398:	45 31 ed             	xor    %r13d,%r13d
149b   6e139b:	83 bc 24 88 00 00 00 02 	cmpl   $0x2,0x88(%rsp)
14a3   6e13a3:	41 0f 94 c5          	sete   %r13b
14a7   6e13a7:	e8 00 00 00 00       	call   6e13ac <shrink_lruvec+0x14ac>	6e13a8: R_X86_64_PLT32	lru_add_drain-0x4
14ac   6e13ac:	4c 89 ff             	mov    %r15,%rdi
14af   6e13af:	e8 00 00 00 00       	call   6e13b4 <shrink_lruvec+0x14b4>	6e13b0: R_X86_64_PLT32	_raw_spin_lock_irq-0x4
14b4   6e13b4:	48 8b 7c 24 38       	mov    0x38(%rsp),%rdi
14b9   6e13b9:	48 8b 74 24 30       	mov    0x30(%rsp),%rsi
14be   6e13be:	48 8d 94 24 40 01 00 00 	lea    0x140(%rsp),%rdx
14c6   6e13c6:	48 8d 4c 24 68       	lea    0x68(%rsp),%rcx
14cb   6e13cb:	4d 89 e0             	mov    %r12,%r8
14ce   6e13ce:	41 89 d9             	mov    %ebx,%r9d
14d1   6e13d1:	e8 2a 9e 00 00       	call   6eb200 <isolate_lru_pages>
14d6   6e13d6:	4c 89 6c 24 28       	mov    %r13,0x28(%rsp)
14db   6e13db:	41 8d 75 07          	lea    0x7(%r13),%esi
14df   6e13df:	48 8b 7c 24 40       	mov    0x40(%rsp),%rdi
14e4   6e13e4:	89 74 24 78          	mov    %esi,0x78(%rsp)
14e8   6e13e8:	48 89 44 24 38       	mov    %rax,0x38(%rsp)
14ed   6e13ed:	48 89 c2             	mov    %rax,%rdx
14f0   6e13f0:	e8 00 00 00 00       	call   6e13f5 <shrink_lruvec+0x14f5>	6e13f1: R_X86_64_PLT32	__mod_node_page_state-0x4
14f5   6e13f5:	48 8b 44 24 58       	mov    0x58(%rsp),%rax
14fa   6e13fa:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
14ff   6e13ff:	84 c0                	test   %al,%al
1501   6e1401:	4d 89 f4             	mov    %r14,%r12
1504   6e1404:	48 8b 9c 24 f8 00 00 00 	mov    0xf8(%rsp),%rbx
150c   6e140c:	0f 85 1d 0a 00 00    	jne    6e1e2f <shrink_lruvec+0x1f2f>
1512   6e1412:	45 31 f6             	xor    %r14d,%r14d
1515   6e1415:	8b 33                	mov    (%rbx),%esi
1517   6e1417:	b8 00 00 02 00       	mov    $0x20000,%eax
151c   6e141c:	21 c6                	and    %eax,%esi
151e   6e141e:	41 0f 94 c5          	sete   %r13b
1522   6e1422:	31 ff                	xor    %edi,%edi
1524   6e1424:	e8 00 00 00 00       	call   6e1429 <shrink_lruvec+0x1529>	6e1425: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1529   6e1429:	48 8b 84 24 e8 00 00 00 	mov    0xe8(%rsp),%rax
1531   6e1431:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
1536   6e1436:	48 8b 9c 24 80 00 00 00 	mov    0x80(%rsp),%rbx
153e   6e143e:	74 08                	je     6e1448 <shrink_lruvec+0x1548>
1540   6e1440:	48 89 df             	mov    %rbx,%rdi
1543   6e1443:	e8 00 00 00 00       	call   6e1448 <shrink_lruvec+0x1548>	6e1444: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1548   6e1448:	45 88 ee             	mov    %r13b,%r14b
154b   6e144b:	41 83 ce 1a          	or     $0x1a,%r14d
154f   6e144f:	48 83 3b 00          	cmpq   $0x0,(%rbx)
1553   6e1453:	74 0c                	je     6e1461 <shrink_lruvec+0x1561>
1555   6e1455:	e8 00 00 00 00       	call   6e145a <shrink_lruvec+0x155a>	6e1456: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
155a   6e145a:	4c 8b 6c 24 18       	mov    0x18(%rsp),%r13
155f   6e145f:	eb 3a                	jmp    6e149b <shrink_lruvec+0x159b>
1561   6e1461:	e8 00 00 00 00       	call   6e1466 <shrink_lruvec+0x1566>	6e1462: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1566   6e1466:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
1570   6e1470:	48 8b 4c 24 50       	mov    0x50(%rsp),%rcx
1575   6e1475:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
1579   6e1479:	4c 8b 6c 24 18       	mov    0x18(%rsp),%r13
157e   6e147e:	74 0a                	je     6e148a <shrink_lruvec+0x158a>
1580   6e1480:	48 8d 7c 24 68       	lea    0x68(%rsp),%rdi
1585   6e1485:	e8 00 00 00 00       	call   6e148a <shrink_lruvec+0x158a>	6e1486: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
158a   6e148a:	48 8b 44 24 68       	mov    0x68(%rsp),%rax
158f   6e148f:	44 89 f1             	mov    %r14d,%ecx
1592   6e1492:	65 48 01 04 cd 00 00 00 00 	add    %rax,%gs:0x0(,%rcx,8)	6e1497: R_X86_64_32S	vm_event_states
159b   6e149b:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
15a5   6e14a5:	48 8b 8c 24 f0 00 00 00 	mov    0xf0(%rsp),%rcx
15ad   6e14ad:	0f b6 04 01          	movzbl (%rcx,%rax,1),%eax
15b1   6e14b1:	84 c0                	test   %al,%al
15b3   6e14b3:	0f 85 93 09 00 00    	jne    6e1e4c <shrink_lruvec+0x1f4c>
15b9   6e14b9:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e14bf <shrink_lruvec+0x15bf>	6e14bb: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
15bf   6e14bf:	bf 01 00 00 00       	mov    $0x1,%edi
15c4   6e14c4:	89 de                	mov    %ebx,%esi
15c6   6e14c6:	e8 00 00 00 00       	call   6e14cb <shrink_lruvec+0x15cb>	6e14c7: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
15cb   6e14cb:	85 db                	test   %ebx,%ebx
15cd   6e14cd:	7e 31                	jle    6e1500 <shrink_lruvec+0x1600>
15cf   6e14cf:	e8 00 00 00 00       	call   6e14d4 <shrink_lruvec+0x15d4>	6e14d0: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
15d4   6e14d4:	48 8b 9c 24 30 01 00 00 	mov    0x130(%rsp),%rbx
15dc   6e14dc:	48 89 d8             	mov    %rbx,%rax
15df   6e14df:	48 c1 e8 03          	shr    $0x3,%rax
15e3   6e14e3:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
15ed   6e14ed:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
15f1   6e14f1:	74 08                	je     6e14fb <shrink_lruvec+0x15fb>
15f3   6e14f3:	48 89 df             	mov    %rbx,%rdi
15f6   6e14f6:	e8 00 00 00 00       	call   6e14fb <shrink_lruvec+0x15fb>	6e14f7: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
15fb   6e14fb:	4c 8b 23             	mov    (%rbx),%r12
15fe   6e14fe:	eb 08                	jmp    6e1508 <shrink_lruvec+0x1608>
1600   6e1500:	e8 00 00 00 00       	call   6e1505 <shrink_lruvec+0x1605>	6e1501: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1605   6e1505:	45 31 e4             	xor    %r12d,%r12d
1608   6e1508:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
1612   6e1512:	48 8b 4c 24 50       	mov    0x50(%rsp),%rcx
1617   6e1517:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
161b   6e151b:	74 0a                	je     6e1527 <shrink_lruvec+0x1627>
161d   6e151d:	48 8d 7c 24 68       	lea    0x68(%rsp),%rdi
1622   6e1522:	e8 00 00 00 00       	call   6e1527 <shrink_lruvec+0x1627>	6e1523: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1627   6e1527:	31 db                	xor    %ebx,%ebx
1629   6e1529:	83 bc 24 88 00 00 00 02 	cmpl   $0x2,0x88(%rsp)
1631   6e1531:	0f 94 c3             	sete   %bl
1634   6e1534:	4c 8b 7c 24 68       	mov    0x68(%rsp),%r15
1639   6e1539:	4c 89 e7             	mov    %r12,%rdi
163c   6e153c:	44 89 f6             	mov    %r14d,%esi
163f   6e153f:	4c 89 fa             	mov    %r15,%rdx
1642   6e1542:	e8 00 00 00 00       	call   6e1547 <shrink_lruvec+0x1647>	6e1543: R_X86_64_PLT32	__count_memcg_events-0x4
1647   6e1547:	4c 89 bc 24 c8 00 00 00 	mov    %r15,0xc8(%rsp)
164f   6e154f:	65 4c 01 3c dd 00 00 00 00 	add    %r15,%gs:0x0(,%rbx,8)	6e1554: R_X86_64_32S	vm_event_states+0xe8
1658   6e1558:	4c 89 ef             	mov    %r13,%rdi
165b   6e155b:	e8 00 00 00 00       	call   6e1560 <shrink_lruvec+0x1660>	6e155c: R_X86_64_PLT32	_raw_spin_unlock_irq-0x4
1660   6e1560:	31 ff                	xor    %edi,%edi
1662   6e1562:	4c 8b 64 24 38       	mov    0x38(%rsp),%r12
1667   6e1567:	4c 89 e6             	mov    %r12,%rsi
166a   6e156a:	e8 00 00 00 00       	call   6e156f <shrink_lruvec+0x166f>	6e156b: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
166f   6e156f:	4d 85 e4             	test   %r12,%r12
1672   6e1572:	0f 84 cc 00 00 00    	je     6e1644 <shrink_lruvec+0x1744>
1678   6e1578:	4c 8d b4 24 40 01 00 00 	lea    0x140(%rsp),%r14
1680   6e1580:	4c 89 f7             	mov    %r14,%rdi
1683   6e1583:	48 8b 5c 24 40       	mov    0x40(%rsp),%rbx
1688   6e1588:	48 89 de             	mov    %rbx,%rsi
168b   6e158b:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
1690   6e1590:	48 8d 8c 24 90 00 00 00 	lea    0x90(%rsp),%rcx
1698   6e1598:	45 31 c0             	xor    %r8d,%r8d
169b   6e159b:	e8 60 69 ff ff       	call   6d7f00 <shrink_page_list>
16a0   6e15a0:	89 84 24 d0 00 00 00 	mov    %eax,0xd0(%rsp)
16a7   6e15a7:	4c 89 ef             	mov    %r13,%rdi
16aa   6e15aa:	e8 00 00 00 00       	call   6e15af <shrink_lruvec+0x16af>	6e15ab: R_X86_64_PLT32	_raw_spin_lock_irq-0x4
16af   6e15af:	48 8b 7c 24 30       	mov    0x30(%rsp),%rdi
16b4   6e15b4:	4c 89 f6             	mov    %r14,%rsi
16b7   6e15b7:	e8 c4 af 00 00       	call   6ec580 <move_pages_to_lru>
16bc   6e15bc:	49 f7 dc             	neg    %r12
16bf   6e15bf:	48 89 df             	mov    %rbx,%rdi
16c2   6e15c2:	8b 74 24 78          	mov    0x78(%rsp),%esi
16c6   6e15c6:	4c 89 e2             	mov    %r12,%rdx
16c9   6e15c9:	e8 00 00 00 00       	call   6e15ce <shrink_lruvec+0x16ce>	6e15ca: R_X86_64_PLT32	__mod_node_page_state-0x4
16ce   6e15ce:	49 bf 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r15
16d8   6e15d8:	48 8b 44 24 58       	mov    0x58(%rsp),%rax
16dd   6e15dd:	42 0f b6 04 38       	movzbl (%rax,%r15,1),%eax
16e2   6e15e2:	84 c0                	test   %al,%al
16e4   6e15e4:	48 8b 9c 24 f8 00 00 00 	mov    0xf8(%rsp),%rbx
16ec   6e15ec:	0f 85 80 08 00 00    	jne    6e1e72 <shrink_lruvec+0x1f72>
16f2   6e15f2:	45 31 f6             	xor    %r14d,%r14d
16f5   6e15f5:	8b 33                	mov    (%rbx),%esi
16f7   6e15f7:	b8 00 00 02 00       	mov    $0x20000,%eax
16fc   6e15fc:	21 c6                	and    %eax,%esi
16fe   6e15fe:	41 0f 94 c5          	sete   %r13b
1702   6e1602:	31 ff                	xor    %edi,%edi
1704   6e1604:	e8 00 00 00 00       	call   6e1609 <shrink_lruvec+0x1709>	6e1605: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1709   6e1609:	48 8b 84 24 e8 00 00 00 	mov    0xe8(%rsp),%rax
1711   6e1611:	42 80 3c 38 00       	cmpb   $0x0,(%rax,%r15,1)
1716   6e1616:	48 8b 9c 24 80 00 00 00 	mov    0x80(%rsp),%rbx
171e   6e161e:	74 08                	je     6e1628 <shrink_lruvec+0x1728>
1720   6e1620:	48 89 df             	mov    %rbx,%rdi
1723   6e1623:	e8 00 00 00 00       	call   6e1628 <shrink_lruvec+0x1728>	6e1624: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1728   6e1628:	45 88 ee             	mov    %r13b,%r14b
172b   6e162b:	41 83 ce 16          	or     $0x16,%r14d
172f   6e162f:	48 83 3b 00          	cmpq   $0x0,(%rbx)
1733   6e1633:	44 8b ac 24 d0 00 00 00 	mov    0xd0(%rsp),%r13d
173b   6e163b:	74 14                	je     6e1651 <shrink_lruvec+0x1751>
173d   6e163d:	e8 00 00 00 00       	call   6e1642 <shrink_lruvec+0x1742>	6e163e: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1742   6e1642:	eb 1e                	jmp    6e1662 <shrink_lruvec+0x1762>
1744   6e1644:	e8 00 00 00 00       	call   6e1649 <shrink_lruvec+0x1749>	6e1645: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1749   6e1649:	45 31 ff             	xor    %r15d,%r15d
174c   6e164c:	e9 d0 03 00 00       	jmp    6e1a21 <shrink_lruvec+0x1b21>
1751   6e1651:	e8 00 00 00 00       	call   6e1656 <shrink_lruvec+0x1756>	6e1652: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1756   6e1656:	44 89 f0             	mov    %r14d,%eax
1759   6e1659:	65 4c 01 2c c5 00 00 00 00 	add    %r13,%gs:0x0(,%rax,8)	6e165e: R_X86_64_32S	vm_event_states
1762   6e1662:	4c 8b 64 24 18       	mov    0x18(%rsp),%r12
1767   6e1667:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
1771   6e1671:	48 8b 8c 24 f0 00 00 00 	mov    0xf0(%rsp),%rcx
1779   6e1679:	0f b6 04 01          	movzbl (%rcx,%rax,1),%eax
177d   6e167d:	84 c0                	test   %al,%al
177f   6e167f:	0f 85 0a 08 00 00    	jne    6e1e8f <shrink_lruvec+0x1f8f>
1785   6e1685:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e168b <shrink_lruvec+0x178b>	6e1687: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
178b   6e168b:	bf 01 00 00 00       	mov    $0x1,%edi
1790   6e1690:	89 de                	mov    %ebx,%esi
1792   6e1692:	e8 00 00 00 00       	call   6e1697 <shrink_lruvec+0x1797>	6e1693: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1797   6e1697:	85 db                	test   %ebx,%ebx
1799   6e1699:	7e 31                	jle    6e16cc <shrink_lruvec+0x17cc>
179b   6e169b:	e8 00 00 00 00       	call   6e16a0 <shrink_lruvec+0x17a0>	6e169c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
17a0   6e16a0:	48 8b 9c 24 30 01 00 00 	mov    0x130(%rsp),%rbx
17a8   6e16a8:	48 89 d8             	mov    %rbx,%rax
17ab   6e16ab:	48 c1 e8 03          	shr    $0x3,%rax
17af   6e16af:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
17b9   6e16b9:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
17bd   6e16bd:	74 08                	je     6e16c7 <shrink_lruvec+0x17c7>
17bf   6e16bf:	48 89 df             	mov    %rbx,%rdi
17c2   6e16c2:	e8 00 00 00 00       	call   6e16c7 <shrink_lruvec+0x17c7>	6e16c3: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
17c7   6e16c7:	48 8b 3b             	mov    (%rbx),%rdi
17ca   6e16ca:	eb 07                	jmp    6e16d3 <shrink_lruvec+0x17d3>
17cc   6e16cc:	e8 00 00 00 00       	call   6e16d1 <shrink_lruvec+0x17d1>	6e16cd: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
17d1   6e16d1:	31 ff                	xor    %edi,%edi
17d3   6e16d3:	31 db                	xor    %ebx,%ebx
17d5   6e16d5:	44 8b bc 24 88 00 00 00 	mov    0x88(%rsp),%r15d
17dd   6e16dd:	41 83 ff 02          	cmp    $0x2,%r15d
17e1   6e16e1:	0f 94 c3             	sete   %bl
17e4   6e16e4:	44 89 f6             	mov    %r14d,%esi
17e7   6e16e7:	4d 89 ee             	mov    %r13,%r14
17ea   6e16ea:	4c 89 ea             	mov    %r13,%rdx
17ed   6e16ed:	e8 00 00 00 00       	call   6e16f2 <shrink_lruvec+0x17f2>	6e16ee: R_X86_64_PLT32	__count_memcg_events-0x4
17f2   6e16f2:	65 4c 01 2c dd 00 00 00 00 	add    %r13,%gs:0x0(,%rbx,8)	6e16f7: R_X86_64_32S	vm_event_states+0xf8
17fb   6e16fb:	4c 89 e7             	mov    %r12,%rdi
17fe   6e16fe:	e8 00 00 00 00       	call   6e1703 <shrink_lruvec+0x1803>	6e16ff: R_X86_64_PLT32	_raw_spin_unlock_irq-0x4
1803   6e1703:	48 8d 84 24 a4 00 00 00 	lea    0xa4(%rsp),%rax
180b   6e170b:	48 c1 e8 03          	shr    $0x3,%rax
180f   6e170f:	48 bb 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rbx
1819   6e1719:	0f b6 04 18          	movzbl (%rax,%rbx,1),%eax
181d   6e171d:	84 c0                	test   %al,%al
181f   6e171f:	0f 85 90 07 00 00    	jne    6e1eb5 <shrink_lruvec+0x1fb5>
1825   6e1725:	31 f6                	xor    %esi,%esi
1827   6e1727:	41 83 ff 02          	cmp    $0x2,%r15d
182b   6e172b:	40 0f 94 c6          	sete   %sil
182f   6e172f:	8b 94 24 a4 00 00 00 	mov    0xa4(%rsp),%edx
1836   6e1736:	48 8b 7c 24 30       	mov    0x30(%rsp),%rdi
183b   6e173b:	e8 00 00 00 00       	call   6e1740 <shrink_lruvec+0x1840>	6e173c: R_X86_64_PLT32	lru_note_cost-0x4
1840   6e1740:	48 8b 84 24 f0 00 00 00 	mov    0xf0(%rsp),%rax
1848   6e1748:	0f b6 04 18          	movzbl (%rax,%rbx,1),%eax
184c   6e174c:	84 c0                	test   %al,%al
184e   6e174e:	4c 8b 64 24 38       	mov    0x38(%rsp),%r12
1853   6e1753:	0f 85 84 07 00 00    	jne    6e1edd <shrink_lruvec+0x1fdd>
1859   6e1759:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e175f <shrink_lruvec+0x185f>	6e175b: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
185f   6e175f:	bf 01 00 00 00       	mov    $0x1,%edi
1864   6e1764:	89 de                	mov    %ebx,%esi
1866   6e1766:	e8 00 00 00 00       	call   6e176b <shrink_lruvec+0x186b>	6e1767: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
186b   6e176b:	85 db                	test   %ebx,%ebx
186d   6e176d:	4d 89 ef             	mov    %r13,%r15
1870   6e1770:	7e 17                	jle    6e1789 <shrink_lruvec+0x1889>
1872   6e1772:	e8 00 00 00 00       	call   6e1777 <shrink_lruvec+0x1877>	6e1773: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1877   6e1777:	48 8d 9c 24 40 01 00 00 	lea    0x140(%rsp),%rbx
187f   6e177f:	48 89 df             	mov    %rbx,%rdi
1882   6e1782:	e8 00 00 00 00       	call   6e1787 <shrink_lruvec+0x1887>	6e1783: R_X86_64_PLT32	__mem_cgroup_uncharge_list-0x4
1887   6e1787:	eb 0d                	jmp    6e1796 <shrink_lruvec+0x1896>
1889   6e1789:	e8 00 00 00 00       	call   6e178e <shrink_lruvec+0x188e>	6e178a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
188e   6e178e:	48 8d 9c 24 40 01 00 00 	lea    0x140(%rsp),%rbx
1896   6e1796:	48 89 df             	mov    %rbx,%rdi
1899   6e1799:	e8 00 00 00 00       	call   6e179e <shrink_lruvec+0x189e>	6e179a: R_X86_64_PLT32	free_unref_page_list-0x4
189e   6e179e:	4c 8d b4 24 94 00 00 00 	lea    0x94(%rsp),%r14
18a6   6e17a6:	49 c1 ee 03          	shr    $0x3,%r14
18aa   6e17aa:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
18b4   6e17b4:	41 0f b6 04 06       	movzbl (%r14,%rax,1),%eax
18b9   6e17b9:	84 c0                	test   %al,%al
18bb   6e17bb:	0f 85 42 07 00 00    	jne    6e1f03 <shrink_lruvec+0x2003>
18c1   6e17c1:	8b 9c 24 94 00 00 00 	mov    0x94(%rsp),%ebx
18c8   6e17c8:	4c 89 e7             	mov    %r12,%rdi
18cb   6e17cb:	48 89 de             	mov    %rbx,%rsi
18ce   6e17ce:	e8 00 00 00 00       	call   6e17d3 <shrink_lruvec+0x18d3>	6e17cf: R_X86_64_PLT32	__sanitizer_cov_trace_cmp8-0x4
18d3   6e17d3:	49 39 dc             	cmp    %rbx,%r12
18d6   6e17d6:	4c 8b ac 24 28 01 00 00 	mov    0x128(%rsp),%r13
18de   6e17de:	75 11                	jne    6e17f1 <shrink_lruvec+0x18f1>
18e0   6e17e0:	e8 00 00 00 00       	call   6e17e5 <shrink_lruvec+0x18e5>	6e17e1: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
18e5   6e17e5:	bf 01 00 00 00       	mov    $0x1,%edi
18ea   6e17ea:	e8 00 00 00 00       	call   6e17ef <shrink_lruvec+0x18ef>	6e17eb: R_X86_64_PLT32	wakeup_flusher_threads-0x4
18ef   6e17ef:	eb 05                	jmp    6e17f6 <shrink_lruvec+0x18f6>
18f1   6e17f1:	e8 00 00 00 00       	call   6e17f6 <shrink_lruvec+0x18f6>	6e17f2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
18f6   6e17f6:	48 8d 84 24 90 00 00 00 	lea    0x90(%rsp),%rax
18fe   6e17fe:	48 c1 e8 03          	shr    $0x3,%rax
1902   6e1802:	49 bc 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r12
190c   6e180c:	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax
1911   6e1811:	84 c0                	test   %al,%al
1913   6e1813:	0f 85 12 07 00 00    	jne    6e1f2b <shrink_lruvec+0x202b>
1919   6e1819:	8b 9c 24 90 00 00 00 	mov    0x90(%rsp),%ebx
1920   6e1820:	4c 89 e8             	mov    %r13,%rax
1923   6e1823:	48 c1 e8 03          	shr    $0x3,%rax
1927   6e1827:	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax
192c   6e182c:	84 c0                	test   %al,%al
192e   6e182e:	0f 85 11 07 00 00    	jne    6e1f45 <shrink_lruvec+0x2045>
1934   6e1834:	41 01 5d 00          	add    %ebx,0x0(%r13)
1938   6e1838:	48 8d 84 24 98 00 00 00 	lea    0x98(%rsp),%rax
1940   6e1840:	48 c1 e8 03          	shr    $0x3,%rax
1944   6e1844:	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax
1949   6e1849:	84 c0                	test   %al,%al
194b   6e184b:	0f 85 12 07 00 00    	jne    6e1f63 <shrink_lruvec+0x2063>
1951   6e1851:	44 8b ac 24 98 00 00 00 	mov    0x98(%rsp),%r13d
1959   6e1859:	48 8b 9c 24 60 01 00 00 	mov    0x160(%rsp),%rbx
1961   6e1861:	48 89 d8             	mov    %rbx,%rax
1964   6e1864:	48 c1 e8 03          	shr    $0x3,%rax
1968   6e1868:	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax
196d   6e186d:	84 c0                	test   %al,%al
196f   6e186f:	0f 85 16 07 00 00    	jne    6e1f8b <shrink_lruvec+0x208b>
1975   6e1875:	44 01 2b             	add    %r13d,(%rbx)
1978   6e1878:	43 0f b6 04 26       	movzbl (%r14,%r12,1),%eax
197d   6e187d:	84 c0                	test   %al,%al
197f   6e187f:	4d 89 e6             	mov    %r12,%r14
1982   6e1882:	0f 85 20 07 00 00    	jne    6e1fa8 <shrink_lruvec+0x20a8>
1988   6e1888:	44 8b a4 24 94 00 00 00 	mov    0x94(%rsp),%r12d
1990   6e1890:	48 8b 9c 24 e8 01 00 00 	mov    0x1e8(%rsp),%rbx
1998   6e1898:	48 89 d8             	mov    %rbx,%rax
199b   6e189b:	48 c1 e8 03          	shr    $0x3,%rax
199f   6e189f:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
19a4   6e18a4:	84 c0                	test   %al,%al
19a6   6e18a6:	0f 85 24 07 00 00    	jne    6e1fd0 <shrink_lruvec+0x20d0>
19ac   6e18ac:	44 01 23             	add    %r12d,(%rbx)
19af   6e18af:	48 8d 84 24 9c 00 00 00 	lea    0x9c(%rsp),%rax
19b7   6e18b7:	48 c1 e8 03          	shr    $0x3,%rax
19bb   6e18bb:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
19c0   6e18c0:	84 c0                	test   %al,%al
19c2   6e18c2:	0f 85 25 07 00 00    	jne    6e1fed <shrink_lruvec+0x20ed>
19c8   6e18c8:	44 8b a4 24 9c 00 00 00 	mov    0x9c(%rsp),%r12d
19d0   6e18d0:	48 8b 9c 24 e0 01 00 00 	mov    0x1e0(%rsp),%rbx
19d8   6e18d8:	48 89 d8             	mov    %rbx,%rax
19db   6e18db:	48 c1 e8 03          	shr    $0x3,%rax
19df   6e18df:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
19e4   6e18e4:	84 c0                	test   %al,%al
19e6   6e18e6:	0f 85 29 07 00 00    	jne    6e2015 <shrink_lruvec+0x2115>
19ec   6e18ec:	44 01 23             	add    %r12d,(%rbx)
19ef   6e18ef:	48 8d 84 24 a0 00 00 00 	lea    0xa0(%rsp),%rax
19f7   6e18f7:	48 c1 e8 03          	shr    $0x3,%rax
19fb   6e18fb:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1a00   6e1900:	84 c0                	test   %al,%al
1a02   6e1902:	0f 85 2a 07 00 00    	jne    6e2032 <shrink_lruvec+0x2132>
1a08   6e1908:	44 8b a4 24 a0 00 00 00 	mov    0xa0(%rsp),%r12d
1a10   6e1910:	48 8b 9c 24 d8 01 00 00 	mov    0x1d8(%rsp),%rbx
1a18   6e1918:	48 89 d8             	mov    %rbx,%rax
1a1b   6e191b:	48 c1 e8 03          	shr    $0x3,%rax
1a1f   6e191f:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1a24   6e1924:	84 c0                	test   %al,%al
1a26   6e1926:	0f 85 2e 07 00 00    	jne    6e205a <shrink_lruvec+0x215a>
1a2c   6e192c:	44 01 23             	add    %r12d,(%rbx)
1a2f   6e192f:	48 8b 9c 24 d0 01 00 00 	mov    0x1d0(%rsp),%rbx
1a37   6e1937:	48 89 d8             	mov    %rbx,%rax
1a3a   6e193a:	48 c1 e8 03          	shr    $0x3,%rax
1a3e   6e193e:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1a43   6e1943:	84 c0                	test   %al,%al
1a45   6e1945:	0f 85 2c 07 00 00    	jne    6e2077 <shrink_lruvec+0x2177>
1a4b   6e194b:	4c 8b 64 24 38       	mov    0x38(%rsp),%r12
1a50   6e1950:	44 01 23             	add    %r12d,(%rbx)
1a53   6e1953:	83 bc 24 88 00 00 00 02 	cmpl   $0x2,0x88(%rsp)
1a5b   6e195b:	48 8b 9c 24 c0 00 00 00 	mov    0xc0(%rsp),%rbx
1a63   6e1963:	75 26                	jne    6e198b <shrink_lruvec+0x1a8b>
1a65   6e1965:	e8 00 00 00 00       	call   6e196a <shrink_lruvec+0x1a6a>	6e1966: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1a6a   6e196a:	48 8b 94 24 50 01 00 00 	mov    0x150(%rsp),%rdx
1a72   6e1972:	48 89 d0             	mov    %rdx,%rax
1a75   6e1975:	48 c1 e8 03          	shr    $0x3,%rax
1a79   6e1979:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1a7e   6e197e:	84 c0                	test   %al,%al
1a80   6e1980:	0f 85 a7 07 00 00    	jne    6e212d <shrink_lruvec+0x222d>
1a86   6e1986:	44 01 22             	add    %r12d,(%rdx)
1a89   6e1989:	eb 05                	jmp    6e1990 <shrink_lruvec+0x1a90>
1a8b   6e198b:	e8 00 00 00 00       	call   6e1990 <shrink_lruvec+0x1a90>	6e198c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1a90   6e1990:	4c 8b 64 24 40       	mov    0x40(%rsp),%r12
1a95   6e1995:	49 81 c4 e0 13 00 00 	add    $0x13e0,%r12
1a9c   6e199c:	4c 89 e0             	mov    %r12,%rax
1a9f   6e199f:	48 c1 e8 03          	shr    $0x3,%rax
1aa3   6e19a3:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1aa8   6e19a8:	84 c0                	test   %al,%al
1aaa   6e19aa:	0f 85 e4 06 00 00    	jne    6e2094 <shrink_lruvec+0x2194>
1ab0   6e19b0:	45 8b 24 24          	mov    (%r12),%r12d
1ab4   6e19b4:	48 8b 84 24 78 01 00 00 	mov    0x178(%rsp),%rax
1abc   6e19bc:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1ac1   6e19c1:	84 c0                	test   %al,%al
1ac3   6e19c3:	0f 85 e9 06 00 00    	jne    6e20b2 <shrink_lruvec+0x21b2>
1ac9   6e19c9:	44 0f be 2b          	movsbl (%rbx),%r13d
1acd   6e19cd:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e19d3 <shrink_lruvec+0x1ad3>	6e19cf: R_X86_64_PC32	__tracepoint_mm_vmscan_lru_shrink_inactive+0x4
1ad3   6e19d3:	31 ff                	xor    %edi,%edi
1ad5   6e19d5:	89 de                	mov    %ebx,%esi
1ad7   6e19d7:	e8 00 00 00 00       	call   6e19dc <shrink_lruvec+0x1adc>	6e19d8: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1adc   6e19dc:	85 db                	test   %ebx,%ebx
1ade   6e19de:	7e 50                	jle    6e1a30 <shrink_lruvec+0x1b30>
1ae0   6e19e0:	65 8b 1d 00 00 00 00 	mov    %gs:0x0(%rip),%ebx        # 6e19e7 <shrink_lruvec+0x1ae7>	6e19e3: R_X86_64_PC32	cpu_number-0x4
1ae7   6e19e7:	89 d8                	mov    %ebx,%eax
1ae9   6e19e9:	c1 e8 06             	shr    $0x6,%eax
1aec   6e19ec:	48 8d 3c c5 00 00 00 00 	lea    0x0(,%rax,8),%rdi	6e19f0: R_X86_64_32S	__cpu_online_mask
1af4   6e19f4:	be 08 00 00 00       	mov    $0x8,%esi
1af9   6e19f9:	e8 00 00 00 00       	call   6e19fe <shrink_lruvec+0x1afe>	6e19fa: R_X86_64_PLT32	__kasan_check_read-0x4
1afe   6e19fe:	89 d8                	mov    %ebx,%eax
1b00   6e1a00:	31 f6                	xor    %esi,%esi
1b02   6e1a02:	48 0f a3 05 00 00 00 00 	bt     %rax,0x0(%rip)        # 6e1a0a <shrink_lruvec+0x1b0a>	6e1a06: R_X86_64_PC32	__cpu_online_mask-0x4
1b0a   6e1a0a:	0f 92 c3             	setb   %bl
1b0d   6e1a0d:	40 0f 92 c6          	setb   %sil
1b11   6e1a11:	31 ff                	xor    %edi,%edi
1b13   6e1a13:	e8 00 00 00 00       	call   6e1a18 <shrink_lruvec+0x1b18>	6e1a14: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp1-0x4
1b18   6e1a18:	84 db                	test   %bl,%bl
1b1a   6e1a1a:	75 1b                	jne    6e1a37 <shrink_lruvec+0x1b37>
1b1c   6e1a1c:	e8 00 00 00 00       	call   6e1a21 <shrink_lruvec+0x1b21>	6e1a1d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1b21   6e1a21:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
1b26   6e1a26:	4c 8b 64 24 08       	mov    0x8(%rsp),%r12
1b2b   6e1a2b:	e9 f0 f4 ff ff       	jmp    6e0f20 <shrink_lruvec+0x1020>
1b30   6e1a30:	e8 00 00 00 00       	call   6e1a35 <shrink_lruvec+0x1b35>	6e1a31: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1b35   6e1a35:	eb 73                	jmp    6e1aaa <shrink_lruvec+0x1baa>
1b37   6e1a37:	65 ff 05 00 00 00 00 	incl   %gs:0x0(%rip)        # 6e1a3e <shrink_lruvec+0x1b3e>	6e1a3a: R_X86_64_PC32	__preempt_count-0x4
1b3e   6e1a3e:	48 8b 1d 00 00 00 00 	mov    0x0(%rip),%rbx        # 6e1a45 <shrink_lruvec+0x1b45>	6e1a41: R_X86_64_PC32	__tracepoint_mm_vmscan_lru_shrink_inactive+0x34
1b45   6e1a45:	48 85 db             	test   %rbx,%rbx
1b48   6e1a48:	74 54                	je     6e1a9e <shrink_lruvec+0x1b9e>
1b4a   6e1a4a:	e8 00 00 00 00       	call   6e1a4f <shrink_lruvec+0x1b4f>	6e1a4b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1b4f   6e1a4f:	48 83 c3 08          	add    $0x8,%rbx
1b53   6e1a53:	48 89 d8             	mov    %rbx,%rax
1b56   6e1a56:	48 c1 e8 03          	shr    $0x3,%rax
1b5a   6e1a5a:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
1b5f   6e1a5f:	74 08                	je     6e1a69 <shrink_lruvec+0x1b69>
1b61   6e1a61:	48 89 df             	mov    %rbx,%rdi
1b64   6e1a64:	e8 00 00 00 00       	call   6e1a69 <shrink_lruvec+0x1b69>	6e1a65: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1b69   6e1a69:	48 8b 3b             	mov    (%rbx),%rdi
1b6c   6e1a6c:	44 89 e6             	mov    %r12d,%esi
1b6f   6e1a6f:	48 8b 94 24 c8 00 00 00 	mov    0xc8(%rsp),%rdx
1b77   6e1a77:	4c 89 f9             	mov    %r15,%rcx
1b7a   6e1a7a:	4c 8d 84 24 90 00 00 00 	lea    0x90(%rsp),%r8
1b82   6e1a82:	45 89 e9             	mov    %r13d,%r9d
1b85   6e1a85:	ff 74 24 28          	push   0x28(%rsp)
1b89   6e1a89:	e8 00 00 00 00       	call   6e1a8e <shrink_lruvec+0x1b8e>	6e1a8a: R_X86_64_PLT32	__SCT__tp_func_mm_vmscan_lru_shrink_inactive-0x4
1b8e   6e1a8e:	48 83 c4 08          	add    $0x8,%rsp
1b92   6e1a92:	eb 0f                	jmp    6e1aa3 <shrink_lruvec+0x1ba3>
1b94   6e1a94:	e8 00 00 00 00       	call   6e1a99 <shrink_lruvec+0x1b99>	6e1a95: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1b99   6e1a99:	e9 78 f7 ff ff       	jmp    6e1216 <shrink_lruvec+0x1316>
1b9e   6e1a9e:	e8 00 00 00 00       	call   6e1aa3 <shrink_lruvec+0x1ba3>	6e1a9f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1ba3   6e1aa3:	65 ff 0d 00 00 00 00 	decl   %gs:0x0(%rip)        # 6e1aaa <shrink_lruvec+0x1baa>	6e1aa6: R_X86_64_PC32	__preempt_count-0x4
1baa   6e1aaa:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
1baf   6e1aaf:	65 8b 1d 00 00 00 00 	mov    %gs:0x0(%rip),%ebx        # 6e1ab6 <shrink_lruvec+0x1bb6>	6e1ab2: R_X86_64_PC32	cpu_number-0x4
1bb6   6e1ab6:	89 d8                	mov    %ebx,%eax
1bb8   6e1ab8:	c1 e8 06             	shr    $0x6,%eax
1bbb   6e1abb:	48 8d 3c c5 00 00 00 00 	lea    0x0(,%rax,8),%rdi	6e1abf: R_X86_64_32S	__cpu_online_mask
1bc3   6e1ac3:	be 08 00 00 00       	mov    $0x8,%esi
1bc8   6e1ac8:	e8 00 00 00 00       	call   6e1acd <shrink_lruvec+0x1bcd>	6e1ac9: R_X86_64_PLT32	__kasan_check_read-0x4
1bcd   6e1acd:	89 d8                	mov    %ebx,%eax
1bcf   6e1acf:	31 f6                	xor    %esi,%esi
1bd1   6e1ad1:	48 0f a3 05 00 00 00 00 	bt     %rax,0x0(%rip)        # 6e1ad9 <shrink_lruvec+0x1bd9>	6e1ad5: R_X86_64_PC32	__cpu_online_mask-0x4
1bd9   6e1ad9:	0f 92 c3             	setb   %bl
1bdc   6e1adc:	40 0f 92 c6          	setb   %sil
1be0   6e1ae0:	31 ff                	xor    %edi,%edi
1be2   6e1ae2:	e8 00 00 00 00       	call   6e1ae7 <shrink_lruvec+0x1be7>	6e1ae3: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp1-0x4
1be7   6e1ae7:	84 db                	test   %bl,%bl
1be9   6e1ae9:	75 0f                	jne    6e1afa <shrink_lruvec+0x1bfa>
1beb   6e1aeb:	e8 00 00 00 00       	call   6e1af0 <shrink_lruvec+0x1bf0>	6e1aec: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1bf0   6e1af0:	4c 8b 64 24 08       	mov    0x8(%rsp),%r12
1bf5   6e1af5:	e9 26 f4 ff ff       	jmp    6e0f20 <shrink_lruvec+0x1020>
1bfa   6e1afa:	65 ff 05 00 00 00 00 	incl   %gs:0x0(%rip)        # 6e1b01 <shrink_lruvec+0x1c01>	6e1afd: R_X86_64_PC32	__preempt_count-0x4
1c01   6e1b01:	48 8b 05 00 00 00 00 	mov    0x0(%rip),%rax        # 6e1b08 <shrink_lruvec+0x1c08>	6e1b04: R_X86_64_PC32	__tracepoint_mm_vmscan_lru_shrink_inactive+0x34
1c08   6e1b08:	e8 00 00 00 00       	call   6e1b0d <shrink_lruvec+0x1c0d>	6e1b09: R_X86_64_PLT32	rcu_read_lock_sched_held-0x4
1c0d   6e1b0d:	89 c3                	mov    %eax,%ebx
1c0f   6e1b0f:	31 ff                	xor    %edi,%edi
1c11   6e1b11:	89 c6                	mov    %eax,%esi
1c13   6e1b13:	e8 00 00 00 00       	call   6e1b18 <shrink_lruvec+0x1c18>	6e1b14: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1c18   6e1b18:	85 db                	test   %ebx,%ebx
1c1a   6e1b1a:	74 16                	je     6e1b32 <shrink_lruvec+0x1c32>
1c1c   6e1b1c:	e8 00 00 00 00       	call   6e1b21 <shrink_lruvec+0x1c21>	6e1b1d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1c21   6e1b21:	4c 8b 64 24 08       	mov    0x8(%rsp),%r12
1c26   6e1b26:	65 ff 0d 00 00 00 00 	decl   %gs:0x0(%rip)        # 6e1b2d <shrink_lruvec+0x1c2d>	6e1b29: R_X86_64_PC32	__preempt_count-0x4
1c2d   6e1b2d:	e9 ee f3 ff ff       	jmp    6e0f20 <shrink_lruvec+0x1020>
1c32   6e1b32:	e8 00 00 00 00       	call   6e1b37 <shrink_lruvec+0x1c37>	6e1b33: R_X86_64_PLT32	debug_lockdep_rcu_enabled-0x4
1c37   6e1b37:	89 c3                	mov    %eax,%ebx
1c39   6e1b39:	31 ff                	xor    %edi,%edi
1c3b   6e1b3b:	89 c6                	mov    %eax,%esi
1c3d   6e1b3d:	e8 00 00 00 00       	call   6e1b42 <shrink_lruvec+0x1c42>	6e1b3e: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1c42   6e1b42:	85 db                	test   %ebx,%ebx
1c44   6e1b44:	74 15                	je     6e1b5b <shrink_lruvec+0x1c5b>
1c46   6e1b46:	80 3d 00 00 00 00 01 	cmpb   $0x1,0x0(%rip)        # 6e1b4d <shrink_lruvec+0x1c4d>	6e1b48: R_X86_64_PC32	.data.unlikely+0x2df
1c4d   6e1b4d:	4c 8b 64 24 08       	mov    0x8(%rsp),%r12
1c52   6e1b52:	75 0e                	jne    6e1b62 <shrink_lruvec+0x1c62>
1c54   6e1b54:	e8 00 00 00 00       	call   6e1b59 <shrink_lruvec+0x1c59>	6e1b55: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1c59   6e1b59:	eb cb                	jmp    6e1b26 <shrink_lruvec+0x1c26>
1c5b   6e1b5b:	e8 00 00 00 00       	call   6e1b60 <shrink_lruvec+0x1c60>	6e1b5c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1c60   6e1b60:	eb bf                	jmp    6e1b21 <shrink_lruvec+0x1c21>
1c62   6e1b62:	e8 00 00 00 00       	call   6e1b67 <shrink_lruvec+0x1c67>	6e1b63: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1c67   6e1b67:	c6 05 00 00 00 00 01 	movb   $0x1,0x0(%rip)        # 6e1b6e <shrink_lruvec+0x1c6e>	6e1b69: R_X86_64_PC32	.data.unlikely+0x2df
1c6e   6e1b6e:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e1b71: R_X86_64_32S	.rodata+0x492480
1c75   6e1b75:	be 84 01 00 00       	mov    $0x184,%esi
1c7a   6e1b7a:	48 c7 c2 00 00 00 00 	mov    $0x0,%rdx	6e1b7d: R_X86_64_32S	.rodata+0x4900e0
1c81   6e1b81:	e8 00 00 00 00       	call   6e1b86 <shrink_lruvec+0x1c86>	6e1b82: R_X86_64_PLT32	lockdep_rcu_suspicious-0x4
1c86   6e1b86:	eb 9e                	jmp    6e1b26 <shrink_lruvec+0x1c26>
1c88   6e1b88:	bf 64 00 00 00       	mov    $0x64,%edi
1c8d   6e1b8d:	e8 00 00 00 00       	call   6e1b92 <shrink_lruvec+0x1c92>	6e1b8e: R_X86_64_PLT32	msleep-0x4
1c92   6e1b92:	4c 8b 64 24 78       	mov    0x78(%rsp),%r12
1c97   6e1b97:	4c 89 e7             	mov    %r12,%rdi
1c9a   6e1b9a:	be 08 00 00 00       	mov    $0x8,%esi
1c9f   6e1b9f:	e8 00 00 00 00       	call   6e1ba4 <shrink_lruvec+0x1ca4>	6e1ba0: R_X86_64_PLT32	__kasan_check_read-0x4
1ca4   6e1ba4:	4c 89 e0             	mov    %r12,%rax
1ca7   6e1ba7:	48 c1 e8 03          	shr    $0x3,%rax
1cab   6e1bab:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
1cb5   6e1bb5:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
1cba   6e1bba:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
1cbf   6e1bbf:	74 08                	je     6e1bc9 <shrink_lruvec+0x1cc9>
1cc1   6e1bc1:	4c 89 e7             	mov    %r12,%rdi
1cc4   6e1bc4:	e8 00 00 00 00       	call   6e1bc9 <shrink_lruvec+0x1cc9>	6e1bc5: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1cc9   6e1bc9:	49 8b 1c 24          	mov    (%r12),%rbx
1ccd   6e1bcd:	48 89 de             	mov    %rbx,%rsi
1cd0   6e1bd0:	48 83 e6 04          	and    $0x4,%rsi
1cd4   6e1bd4:	31 ff                	xor    %edi,%edi
1cd6   6e1bd6:	e8 00 00 00 00       	call   6e1bdb <shrink_lruvec+0x1cdb>	6e1bd7: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
1cdb   6e1bdb:	48 83 e3 04          	and    $0x4,%rbx
1cdf   6e1bdf:	75 07                	jne    6e1be8 <shrink_lruvec+0x1ce8>
1ce1   6e1be1:	e8 00 00 00 00       	call   6e1be6 <shrink_lruvec+0x1ce6>	6e1be2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1ce6   6e1be6:	eb 43                	jmp    6e1c2b <shrink_lruvec+0x1d2b>
1ce8   6e1be8:	49 81 c4 30 0c 00 00 	add    $0xc30,%r12
1cef   6e1bef:	4c 89 e0             	mov    %r12,%rax
1cf2   6e1bf2:	48 c1 e8 03          	shr    $0x3,%rax
1cf6   6e1bf6:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
1cfb   6e1bfb:	74 08                	je     6e1c05 <shrink_lruvec+0x1d05>
1cfd   6e1bfd:	4c 89 e7             	mov    %r12,%rdi
1d00   6e1c00:	e8 00 00 00 00       	call   6e1c05 <shrink_lruvec+0x1d05>	6e1c01: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1d05   6e1c05:	49 8b 1c 24          	mov    (%r12),%rbx
1d09   6e1c09:	be 00 01 00 00       	mov    $0x100,%esi
1d0e   6e1c0e:	48 21 de             	and    %rbx,%rsi
1d11   6e1c11:	31 ff                	xor    %edi,%edi
1d13   6e1c13:	e8 00 00 00 00       	call   6e1c18 <shrink_lruvec+0x1d18>	6e1c14: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
1d18   6e1c18:	b8 00 01 00 00       	mov    $0x100,%eax
1d1d   6e1c1d:	48 21 c3             	and    %rax,%rbx
1d20   6e1c20:	0f 85 a7 00 00 00    	jne    6e1ccd <shrink_lruvec+0x1dcd>
1d26   6e1c26:	e8 00 00 00 00       	call   6e1c2b <shrink_lruvec+0x1d2b>	6e1c27: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1d2b   6e1c2b:	48 8b 44 24 58       	mov    0x58(%rsp),%rax
1d30   6e1c30:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1d35   6e1c35:	84 c0                	test   %al,%al
1d37   6e1c37:	4c 8b 7c 24 18       	mov    0x18(%rsp),%r15
1d3c   6e1c3c:	48 8b 9c 24 f8 00 00 00 	mov    0xf8(%rsp),%rbx
1d44   6e1c44:	4c 8b a4 24 d0 00 00 00 	mov    0xd0(%rsp),%r12
1d4c   6e1c4c:	0f 85 0f 05 00 00    	jne    6e2161 <shrink_lruvec+0x2261>
1d52   6e1c52:	8b 1b                	mov    (%rbx),%ebx
1d54   6e1c54:	be 00 00 02 00       	mov    $0x20000,%esi
1d59   6e1c59:	21 de                	and    %ebx,%esi
1d5b   6e1c5b:	31 ff                	xor    %edi,%edi
1d5d   6e1c5d:	e8 00 00 00 00       	call   6e1c62 <shrink_lruvec+0x1d62>	6e1c5e: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1d62   6e1c62:	b8 00 00 02 00       	mov    $0x20000,%eax
1d67   6e1c67:	21 c3                	and    %eax,%ebx
1d69   6e1c69:	75 58                	jne    6e1cc3 <shrink_lruvec+0x1dc3>
1d6b   6e1c6b:	48 8b 84 24 e8 00 00 00 	mov    0xe8(%rsp),%rax
1d73   6e1c73:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
1d78   6e1c78:	48 8b 9c 24 80 00 00 00 	mov    0x80(%rsp),%rbx
1d80   6e1c80:	74 08                	je     6e1c8a <shrink_lruvec+0x1d8a>
1d82   6e1c82:	48 89 df             	mov    %rbx,%rdi
1d85   6e1c85:	e8 00 00 00 00       	call   6e1c8a <shrink_lruvec+0x1d8a>	6e1c86: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1d8a   6e1c8a:	48 83 3b 00          	cmpq   $0x0,(%rbx)
1d8e   6e1c8e:	74 52                	je     6e1ce2 <shrink_lruvec+0x1de2>
1d90   6e1c90:	48 8b 84 24 70 01 00 00 	mov    0x170(%rsp),%rax
1d98   6e1c98:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax
1d9d   6e1c9d:	84 c0                	test   %al,%al
1d9f   6e1c9f:	0f 85 f7 04 00 00    	jne    6e219c <shrink_lruvec+0x229c>
1da5   6e1ca5:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e1cab <shrink_lruvec+0x1dab>	6e1ca7: R_X86_64_PC32	memory_cgrp_subsys_on_dfl_key-0x4
1dab   6e1cab:	31 ff                	xor    %edi,%edi
1dad   6e1cad:	89 de                	mov    %ebx,%esi
1daf   6e1caf:	e8 00 00 00 00       	call   6e1cb4 <shrink_lruvec+0x1db4>	6e1cb0: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1db4   6e1cb4:	85 db                	test   %ebx,%ebx
1db6   6e1cb6:	0f 8e 2e 01 00 00    	jle    6e1dea <shrink_lruvec+0x1eea>
1dbc   6e1cbc:	e8 00 00 00 00       	call   6e1cc1 <shrink_lruvec+0x1dc1>	6e1cbd: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1dc1   6e1cc1:	eb 24                	jmp    6e1ce7 <shrink_lruvec+0x1de7>
1dc3   6e1cc3:	e8 00 00 00 00       	call   6e1cc8 <shrink_lruvec+0x1dc8>	6e1cc4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1dc8   6e1cc8:	e9 49 f5 ff ff       	jmp    6e1216 <shrink_lruvec+0x1316>
1dcd   6e1ccd:	e8 00 00 00 00       	call   6e1cd2 <shrink_lruvec+0x1dd2>	6e1cce: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1dd2   6e1cd2:	41 bf 20 00 00 00    	mov    $0x20,%r15d
1dd8   6e1cd8:	4c 8b 64 24 08       	mov    0x8(%rsp),%r12
1ddd   6e1cdd:	e9 3e f2 ff ff       	jmp    6e0f20 <shrink_lruvec+0x1020>
1de2   6e1ce2:	e8 00 00 00 00       	call   6e1ce7 <shrink_lruvec+0x1de7>	6e1ce3: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1de7   6e1ce7:	4c 8b ac 24 58 01 00 00 	mov    0x158(%rsp),%r13
1def   6e1cef:	48 8b 5c 24 28       	mov    0x28(%rsp),%rbx
1df4   6e1cf4:	48 89 df             	mov    %rbx,%rdi
1df7   6e1cf7:	be 08 00 00 00       	mov    $0x8,%esi
1dfc   6e1cfc:	e8 00 00 00 00       	call   6e1d01 <shrink_lruvec+0x1e01>	6e1cfd: R_X86_64_PLT32	__kasan_check_read-0x4
1e01   6e1d01:	48 8b 84 24 c8 00 00 00 	mov    0xc8(%rsp),%rax
1e09   6e1d09:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
1e0e   6e1d0e:	74 08                	je     6e1d18 <shrink_lruvec+0x1e18>
1e10   6e1d10:	48 89 df             	mov    %rbx,%rdi
1e13   6e1d13:	e8 00 00 00 00       	call   6e1d18 <shrink_lruvec+0x1e18>	6e1d14: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1e18   6e1d18:	4c 8b 33             	mov    (%rbx),%r14
1e1b   6e1d1b:	31 ff                	xor    %edi,%edi
1e1d   6e1d1d:	4c 89 f6             	mov    %r14,%rsi
1e20   6e1d20:	e8 00 00 00 00       	call   6e1d25 <shrink_lruvec+0x1e25>	6e1d21: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
1e25   6e1d25:	4d 85 f6             	test   %r14,%r14
1e28   6e1d28:	b8 00 00 00 00       	mov    $0x0,%eax
1e2d   6e1d2d:	4c 0f 48 f0          	cmovs  %rax,%r14
1e31   6e1d31:	4c 89 e7             	mov    %r12,%rdi
1e34   6e1d34:	be 08 00 00 00       	mov    $0x8,%esi
1e39   6e1d39:	e8 00 00 00 00       	call   6e1d3e <shrink_lruvec+0x1e3e>	6e1d3a: R_X86_64_PLT32	__kasan_check_read-0x4
1e3e   6e1d3e:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
1e48   6e1d48:	48 8b 8c 24 c8 01 00 00 	mov    0x1c8(%rsp),%rcx
1e50   6e1d50:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
1e54   6e1d54:	74 08                	je     6e1d5e <shrink_lruvec+0x1e5e>
1e56   6e1d56:	4c 89 e7             	mov    %r12,%rdi
1e59   6e1d59:	e8 00 00 00 00       	call   6e1d5e <shrink_lruvec+0x1e5e>	6e1d5a: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
1e5e   6e1d5e:	48 8b 84 24 c0 01 00 00 	mov    0x1c0(%rsp),%rax
1e66   6e1d66:	4c 8b a0 00 00 00 00 	mov    0x0(%rax),%r12	6e1d69: R_X86_64_32S	vm_node_stat
1e6d   6e1d6d:	31 ff                	xor    %edi,%edi
1e6f   6e1d6f:	4c 89 e6             	mov    %r12,%rsi
1e72   6e1d72:	e8 00 00 00 00       	call   6e1d77 <shrink_lruvec+0x1e77>	6e1d73: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
1e77   6e1d77:	4d 85 e4             	test   %r12,%r12
1e7a   6e1d7a:	b8 00 00 00 00       	mov    $0x0,%eax
1e7f   6e1d7f:	4c 0f 48 e0          	cmovs  %rax,%r12
1e83   6e1d83:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
1e8d   6e1d8d:	48 8b 8c 24 b8 01 00 00 	mov    0x1b8(%rsp),%rcx
1e95   6e1d95:	0f b6 04 01          	movzbl (%rcx,%rax,1),%eax
1e99   6e1d99:	84 c0                	test   %al,%al
1e9b   6e1d9b:	0f 85 dd 03 00 00    	jne    6e217e <shrink_lruvec+0x227e>
1ea1   6e1da1:	45 8b 6d 00          	mov    0x0(%r13),%r13d
1ea5   6e1da5:	b8 c0 00 00 00       	mov    $0xc0,%eax
1eaa   6e1daa:	41 21 c5             	and    %eax,%r13d
1ead   6e1dad:	bf c0 00 00 00       	mov    $0xc0,%edi
1eb2   6e1db2:	44 89 ee             	mov    %r13d,%esi
1eb5   6e1db5:	e8 00 00 00 00       	call   6e1dba <shrink_lruvec+0x1eba>	6e1db6: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
1eba   6e1dba:	4c 89 f3             	mov    %r14,%rbx
1ebd   6e1dbd:	48 c1 eb 03          	shr    $0x3,%rbx
1ec1   6e1dc1:	41 81 fd c0 00 00 00 	cmp    $0xc0,%r13d
1ec8   6e1dc8:	49 0f 45 de          	cmovne %r14,%rbx
1ecc   6e1dcc:	4c 89 e7             	mov    %r12,%rdi
1ecf   6e1dcf:	48 89 de             	mov    %rbx,%rsi
1ed2   6e1dd2:	e8 00 00 00 00       	call   6e1dd7 <shrink_lruvec+0x1ed7>	6e1dd3: R_X86_64_PLT32	__sanitizer_cov_trace_cmp8-0x4
1ed7   6e1dd7:	49 39 dc             	cmp    %rbx,%r12
1eda   6e1dda:	0f 87 77 03 00 00    	ja     6e2157 <shrink_lruvec+0x2257>
1ee0   6e1de0:	e8 00 00 00 00       	call   6e1de5 <shrink_lruvec+0x1ee5>	6e1de1: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1ee5   6e1de5:	e9 95 f5 ff ff       	jmp    6e137f <shrink_lruvec+0x147f>
1eea   6e1dea:	e8 00 00 00 00       	call   6e1def <shrink_lruvec+0x1eef>	6e1deb: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
1eef   6e1def:	e9 22 f4 ff ff       	jmp    6e1216 <shrink_lruvec+0x1316>
1ef4   6e1df4:	44 89 e9             	mov    %r13d,%ecx
1ef7   6e1df7:	80 e1 07             	and    $0x7,%cl
1efa   6e1dfa:	80 c1 01             	add    $0x1,%cl
1efd   6e1dfd:	38 c1                	cmp    %al,%cl
1eff   6e1dff:	0f 8c ff f1 ff ff    	jl     6e1004 <shrink_lruvec+0x1104>
1f05   6e1e05:	4c 89 ef             	mov    %r13,%rdi
1f08   6e1e08:	e8 00 00 00 00       	call   6e1e0d <shrink_lruvec+0x1f0d>	6e1e09: R_X86_64_PLT32	__asan_report_load2_noabort-0x4
1f0d   6e1e0d:	e9 f2 f1 ff ff       	jmp    6e1004 <shrink_lruvec+0x1104>
1f12   6e1e12:	89 d9                	mov    %ebx,%ecx
1f14   6e1e14:	80 e1 07             	and    $0x7,%cl
1f17   6e1e17:	80 c1 03             	add    $0x3,%cl
1f1a   6e1e1a:	38 c1                	cmp    %al,%cl
1f1c   6e1e1c:	0f 8c 69 f3 ff ff    	jl     6e118b <shrink_lruvec+0x128b>
1f22   6e1e22:	48 89 df             	mov    %rbx,%rdi
1f25   6e1e25:	e8 00 00 00 00       	call   6e1e2a <shrink_lruvec+0x1f2a>	6e1e26: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
1f2a   6e1e2a:	e9 5c f3 ff ff       	jmp    6e118b <shrink_lruvec+0x128b>
1f2f   6e1e2f:	89 d9                	mov    %ebx,%ecx
1f31   6e1e31:	80 e1 07             	and    $0x7,%cl
1f34   6e1e34:	80 c1 03             	add    $0x3,%cl
1f37   6e1e37:	38 c1                	cmp    %al,%cl
1f39   6e1e39:	0f 8c d3 f5 ff ff    	jl     6e1412 <shrink_lruvec+0x1512>
1f3f   6e1e3f:	48 89 df             	mov    %rbx,%rdi
1f42   6e1e42:	e8 00 00 00 00       	call   6e1e47 <shrink_lruvec+0x1f47>	6e1e43: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
1f47   6e1e47:	e9 c6 f5 ff ff       	jmp    6e1412 <shrink_lruvec+0x1512>
1f4c   6e1e4c:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e1e4f: R_X86_64_32S	memory_cgrp_subsys_enabled_key
1f53   6e1e53:	80 e1 07             	and    $0x7,%cl
1f56   6e1e56:	80 c1 03             	add    $0x3,%cl
1f59   6e1e59:	38 c1                	cmp    %al,%cl
1f5b   6e1e5b:	0f 8c 58 f6 ff ff    	jl     6e14b9 <shrink_lruvec+0x15b9>
1f61   6e1e61:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e1e64: R_X86_64_32S	memory_cgrp_subsys_enabled_key
1f68   6e1e68:	e8 00 00 00 00       	call   6e1e6d <shrink_lruvec+0x1f6d>	6e1e69: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
1f6d   6e1e6d:	e9 47 f6 ff ff       	jmp    6e14b9 <shrink_lruvec+0x15b9>
1f72   6e1e72:	89 d9                	mov    %ebx,%ecx
1f74   6e1e74:	80 e1 07             	and    $0x7,%cl
1f77   6e1e77:	80 c1 03             	add    $0x3,%cl
1f7a   6e1e7a:	38 c1                	cmp    %al,%cl
1f7c   6e1e7c:	0f 8c 70 f7 ff ff    	jl     6e15f2 <shrink_lruvec+0x16f2>
1f82   6e1e82:	48 89 df             	mov    %rbx,%rdi
1f85   6e1e85:	e8 00 00 00 00       	call   6e1e8a <shrink_lruvec+0x1f8a>	6e1e86: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
1f8a   6e1e8a:	e9 63 f7 ff ff       	jmp    6e15f2 <shrink_lruvec+0x16f2>
1f8f   6e1e8f:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e1e92: R_X86_64_32S	memory_cgrp_subsys_enabled_key
1f96   6e1e96:	80 e1 07             	and    $0x7,%cl
1f99   6e1e99:	80 c1 03             	add    $0x3,%cl
1f9c   6e1e9c:	38 c1                	cmp    %al,%cl
1f9e   6e1e9e:	0f 8c e1 f7 ff ff    	jl     6e1685 <shrink_lruvec+0x1785>
1fa4   6e1ea4:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e1ea7: R_X86_64_32S	memory_cgrp_subsys_enabled_key
1fab   6e1eab:	e8 00 00 00 00       	call   6e1eb0 <shrink_lruvec+0x1fb0>	6e1eac: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
1fb0   6e1eb0:	e9 d0 f7 ff ff       	jmp    6e1685 <shrink_lruvec+0x1785>
1fb5   6e1eb5:	48 8d 8c 24 a4 00 00 00 	lea    0xa4(%rsp),%rcx
1fbd   6e1ebd:	80 e1 07             	and    $0x7,%cl
1fc0   6e1ec0:	80 c1 03             	add    $0x3,%cl
1fc3   6e1ec3:	38 c1                	cmp    %al,%cl
1fc5   6e1ec5:	0f 8c 5a f8 ff ff    	jl     6e1725 <shrink_lruvec+0x1825>
1fcb   6e1ecb:	48 8d bc 24 a4 00 00 00 	lea    0xa4(%rsp),%rdi
1fd3   6e1ed3:	e8 00 00 00 00       	call   6e1ed8 <shrink_lruvec+0x1fd8>	6e1ed4: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
1fd8   6e1ed8:	e9 48 f8 ff ff       	jmp    6e1725 <shrink_lruvec+0x1825>
1fdd   6e1edd:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e1ee0: R_X86_64_32S	memory_cgrp_subsys_enabled_key
1fe4   6e1ee4:	80 e1 07             	and    $0x7,%cl
1fe7   6e1ee7:	80 c1 03             	add    $0x3,%cl
1fea   6e1eea:	38 c1                	cmp    %al,%cl
1fec   6e1eec:	0f 8c 67 f8 ff ff    	jl     6e1759 <shrink_lruvec+0x1859>
1ff2   6e1ef2:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e1ef5: R_X86_64_32S	memory_cgrp_subsys_enabled_key
1ff9   6e1ef9:	e8 00 00 00 00       	call   6e1efe <shrink_lruvec+0x1ffe>	6e1efa: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
1ffe   6e1efe:	e9 56 f8 ff ff       	jmp    6e1759 <shrink_lruvec+0x1859>
2003   6e1f03:	48 8d 8c 24 94 00 00 00 	lea    0x94(%rsp),%rcx
200b   6e1f0b:	80 e1 07             	and    $0x7,%cl
200e   6e1f0e:	80 c1 03             	add    $0x3,%cl
2011   6e1f11:	38 c1                	cmp    %al,%cl
2013   6e1f13:	0f 8c a8 f8 ff ff    	jl     6e17c1 <shrink_lruvec+0x18c1>
2019   6e1f19:	48 8d bc 24 94 00 00 00 	lea    0x94(%rsp),%rdi
2021   6e1f21:	e8 00 00 00 00       	call   6e1f26 <shrink_lruvec+0x2026>	6e1f22: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2026   6e1f26:	e9 96 f8 ff ff       	jmp    6e17c1 <shrink_lruvec+0x18c1>
202b   6e1f2b:	3c 03                	cmp    $0x3,%al
202d   6e1f2d:	0f 8f e6 f8 ff ff    	jg     6e1819 <shrink_lruvec+0x1919>
2033   6e1f33:	48 8d bc 24 90 00 00 00 	lea    0x90(%rsp),%rdi
203b   6e1f3b:	e8 00 00 00 00       	call   6e1f40 <shrink_lruvec+0x2040>	6e1f3c: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2040   6e1f40:	e9 d4 f8 ff ff       	jmp    6e1819 <shrink_lruvec+0x1919>
2045   6e1f45:	44 89 e9             	mov    %r13d,%ecx
2048   6e1f48:	80 e1 07             	and    $0x7,%cl
204b   6e1f4b:	80 c1 03             	add    $0x3,%cl
204e   6e1f4e:	38 c1                	cmp    %al,%cl
2050   6e1f50:	0f 8c de f8 ff ff    	jl     6e1834 <shrink_lruvec+0x1934>
2056   6e1f56:	4c 89 ef             	mov    %r13,%rdi
2059   6e1f59:	e8 00 00 00 00       	call   6e1f5e <shrink_lruvec+0x205e>	6e1f5a: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
205e   6e1f5e:	e9 d1 f8 ff ff       	jmp    6e1834 <shrink_lruvec+0x1934>
2063   6e1f63:	48 8d 8c 24 98 00 00 00 	lea    0x98(%rsp),%rcx
206b   6e1f6b:	80 e1 07             	and    $0x7,%cl
206e   6e1f6e:	80 c1 03             	add    $0x3,%cl
2071   6e1f71:	38 c1                	cmp    %al,%cl
2073   6e1f73:	0f 8c d8 f8 ff ff    	jl     6e1851 <shrink_lruvec+0x1951>
2079   6e1f79:	48 8d bc 24 98 00 00 00 	lea    0x98(%rsp),%rdi
2081   6e1f81:	e8 00 00 00 00       	call   6e1f86 <shrink_lruvec+0x2086>	6e1f82: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2086   6e1f86:	e9 c6 f8 ff ff       	jmp    6e1851 <shrink_lruvec+0x1951>
208b   6e1f8b:	89 d9                	mov    %ebx,%ecx
208d   6e1f8d:	80 e1 07             	and    $0x7,%cl
2090   6e1f90:	80 c1 03             	add    $0x3,%cl
2093   6e1f93:	38 c1                	cmp    %al,%cl
2095   6e1f95:	0f 8c da f8 ff ff    	jl     6e1875 <shrink_lruvec+0x1975>
209b   6e1f9b:	48 89 df             	mov    %rbx,%rdi
209e   6e1f9e:	e8 00 00 00 00       	call   6e1fa3 <shrink_lruvec+0x20a3>	6e1f9f: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
20a3   6e1fa3:	e9 cd f8 ff ff       	jmp    6e1875 <shrink_lruvec+0x1975>
20a8   6e1fa8:	48 8d 8c 24 94 00 00 00 	lea    0x94(%rsp),%rcx
20b0   6e1fb0:	80 e1 07             	and    $0x7,%cl
20b3   6e1fb3:	80 c1 03             	add    $0x3,%cl
20b6   6e1fb6:	38 c1                	cmp    %al,%cl
20b8   6e1fb8:	0f 8c ca f8 ff ff    	jl     6e1888 <shrink_lruvec+0x1988>
20be   6e1fbe:	48 8d bc 24 94 00 00 00 	lea    0x94(%rsp),%rdi
20c6   6e1fc6:	e8 00 00 00 00       	call   6e1fcb <shrink_lruvec+0x20cb>	6e1fc7: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
20cb   6e1fcb:	e9 b8 f8 ff ff       	jmp    6e1888 <shrink_lruvec+0x1988>
20d0   6e1fd0:	89 d9                	mov    %ebx,%ecx
20d2   6e1fd2:	80 e1 07             	and    $0x7,%cl
20d5   6e1fd5:	80 c1 03             	add    $0x3,%cl
20d8   6e1fd8:	38 c1                	cmp    %al,%cl
20da   6e1fda:	0f 8c cc f8 ff ff    	jl     6e18ac <shrink_lruvec+0x19ac>
20e0   6e1fe0:	48 89 df             	mov    %rbx,%rdi
20e3   6e1fe3:	e8 00 00 00 00       	call   6e1fe8 <shrink_lruvec+0x20e8>	6e1fe4: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
20e8   6e1fe8:	e9 bf f8 ff ff       	jmp    6e18ac <shrink_lruvec+0x19ac>
20ed   6e1fed:	48 8d 8c 24 9c 00 00 00 	lea    0x9c(%rsp),%rcx
20f5   6e1ff5:	80 e1 07             	and    $0x7,%cl
20f8   6e1ff8:	80 c1 03             	add    $0x3,%cl
20fb   6e1ffb:	38 c1                	cmp    %al,%cl
20fd   6e1ffd:	0f 8c c5 f8 ff ff    	jl     6e18c8 <shrink_lruvec+0x19c8>
2103   6e2003:	48 8d bc 24 9c 00 00 00 	lea    0x9c(%rsp),%rdi
210b   6e200b:	e8 00 00 00 00       	call   6e2010 <shrink_lruvec+0x2110>	6e200c: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2110   6e2010:	e9 b3 f8 ff ff       	jmp    6e18c8 <shrink_lruvec+0x19c8>
2115   6e2015:	89 d9                	mov    %ebx,%ecx
2117   6e2017:	80 e1 07             	and    $0x7,%cl
211a   6e201a:	80 c1 03             	add    $0x3,%cl
211d   6e201d:	38 c1                	cmp    %al,%cl
211f   6e201f:	0f 8c c7 f8 ff ff    	jl     6e18ec <shrink_lruvec+0x19ec>
2125   6e2025:	48 89 df             	mov    %rbx,%rdi
2128   6e2028:	e8 00 00 00 00       	call   6e202d <shrink_lruvec+0x212d>	6e2029: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
212d   6e202d:	e9 ba f8 ff ff       	jmp    6e18ec <shrink_lruvec+0x19ec>
2132   6e2032:	48 8d 8c 24 a0 00 00 00 	lea    0xa0(%rsp),%rcx
213a   6e203a:	80 e1 07             	and    $0x7,%cl
213d   6e203d:	80 c1 03             	add    $0x3,%cl
2140   6e2040:	38 c1                	cmp    %al,%cl
2142   6e2042:	0f 8c c0 f8 ff ff    	jl     6e1908 <shrink_lruvec+0x1a08>
2148   6e2048:	48 8d bc 24 a0 00 00 00 	lea    0xa0(%rsp),%rdi
2150   6e2050:	e8 00 00 00 00       	call   6e2055 <shrink_lruvec+0x2155>	6e2051: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2155   6e2055:	e9 ae f8 ff ff       	jmp    6e1908 <shrink_lruvec+0x1a08>
215a   6e205a:	89 d9                	mov    %ebx,%ecx
215c   6e205c:	80 e1 07             	and    $0x7,%cl
215f   6e205f:	80 c1 03             	add    $0x3,%cl
2162   6e2062:	38 c1                	cmp    %al,%cl
2164   6e2064:	0f 8c c2 f8 ff ff    	jl     6e192c <shrink_lruvec+0x1a2c>
216a   6e206a:	48 89 df             	mov    %rbx,%rdi
216d   6e206d:	e8 00 00 00 00       	call   6e2072 <shrink_lruvec+0x2172>	6e206e: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2172   6e2072:	e9 b5 f8 ff ff       	jmp    6e192c <shrink_lruvec+0x1a2c>
2177   6e2077:	89 d9                	mov    %ebx,%ecx
2179   6e2079:	80 e1 07             	and    $0x7,%cl
217c   6e207c:	80 c1 03             	add    $0x3,%cl
217f   6e207f:	38 c1                	cmp    %al,%cl
2181   6e2081:	0f 8c c4 f8 ff ff    	jl     6e194b <shrink_lruvec+0x1a4b>
2187   6e2087:	48 89 df             	mov    %rbx,%rdi
218a   6e208a:	e8 00 00 00 00       	call   6e208f <shrink_lruvec+0x218f>	6e208b: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
218f   6e208f:	e9 b7 f8 ff ff       	jmp    6e194b <shrink_lruvec+0x1a4b>
2194   6e2094:	44 89 e1             	mov    %r12d,%ecx
2197   6e2097:	80 e1 07             	and    $0x7,%cl
219a   6e209a:	80 c1 03             	add    $0x3,%cl
219d   6e209d:	38 c1                	cmp    %al,%cl
219f   6e209f:	0f 8c 0b f9 ff ff    	jl     6e19b0 <shrink_lruvec+0x1ab0>
21a5   6e20a5:	4c 89 e7             	mov    %r12,%rdi
21a8   6e20a8:	e8 00 00 00 00       	call   6e20ad <shrink_lruvec+0x21ad>	6e20a9: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
21ad   6e20ad:	e9 fe f8 ff ff       	jmp    6e19b0 <shrink_lruvec+0x1ab0>
21b2   6e20b2:	89 d9                	mov    %ebx,%ecx
21b4   6e20b4:	80 e1 07             	and    $0x7,%cl
21b7   6e20b7:	38 c1                	cmp    %al,%cl
21b9   6e20b9:	0f 8c 0a f9 ff ff    	jl     6e19c9 <shrink_lruvec+0x1ac9>
21bf   6e20bf:	48 89 df             	mov    %rbx,%rdi
21c2   6e20c2:	e8 00 00 00 00       	call   6e20c7 <shrink_lruvec+0x21c7>	6e20c3: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
21c7   6e20c7:	e9 fd f8 ff ff       	jmp    6e19c9 <shrink_lruvec+0x1ac9>
21cc   6e20cc:	89 d9                	mov    %ebx,%ecx
21ce   6e20ce:	80 e1 07             	and    $0x7,%cl
21d1   6e20d1:	80 c1 03             	add    $0x3,%cl
21d4   6e20d4:	38 c1                	cmp    %al,%cl
21d6   6e20d6:	0f 8c 64 f2 ff ff    	jl     6e1340 <shrink_lruvec+0x1440>
21dc   6e20dc:	48 89 df             	mov    %rbx,%rdi
21df   6e20df:	e8 00 00 00 00       	call   6e20e4 <shrink_lruvec+0x21e4>	6e20e0: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
21e4   6e20e4:	e9 57 f2 ff ff       	jmp    6e1340 <shrink_lruvec+0x1440>
21e9   6e20e9:	44 89 e9             	mov    %r13d,%ecx
21ec   6e20ec:	80 e1 07             	and    $0x7,%cl
21ef   6e20ef:	80 c1 01             	add    $0x1,%cl
21f2   6e20f2:	38 c1                	cmp    %al,%cl
21f4   6e20f4:	0f 8c 72 ef ff ff    	jl     6e106c <shrink_lruvec+0x116c>
21fa   6e20fa:	4c 89 ef             	mov    %r13,%rdi
21fd   6e20fd:	e8 00 00 00 00       	call   6e2102 <shrink_lruvec+0x2202>	6e20fe: R_X86_64_PLT32	__asan_report_store2_noabort-0x4
2202   6e2102:	e9 65 ef ff ff       	jmp    6e106c <shrink_lruvec+0x116c>
2207   6e2107:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e210a: R_X86_64_32S	memory_cgrp_subsys_on_dfl_key
220e   6e210e:	80 e1 07             	and    $0x7,%cl
2211   6e2111:	80 c1 03             	add    $0x3,%cl
2214   6e2114:	38 c1                	cmp    %al,%cl
2216   6e2116:	0f 8c d2 f0 ff ff    	jl     6e11ee <shrink_lruvec+0x12ee>
221c   6e211c:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e211f: R_X86_64_32S	memory_cgrp_subsys_on_dfl_key
2223   6e2123:	e8 00 00 00 00       	call   6e2128 <shrink_lruvec+0x2228>	6e2124: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2228   6e2128:	e9 c1 f0 ff ff       	jmp    6e11ee <shrink_lruvec+0x12ee>
222d   6e212d:	89 d1                	mov    %edx,%ecx
222f   6e212f:	80 e1 07             	and    $0x7,%cl
2232   6e2132:	80 c1 03             	add    $0x3,%cl
2235   6e2135:	38 c1                	cmp    %al,%cl
2237   6e2137:	0f 8c 49 f8 ff ff    	jl     6e1986 <shrink_lruvec+0x1a86>
223d   6e213d:	48 8b bc 24 50 01 00 00 	mov    0x150(%rsp),%rdi
2245   6e2145:	e8 00 00 00 00       	call   6e214a <shrink_lruvec+0x224a>	6e2146: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
224a   6e214a:	48 8b 94 24 50 01 00 00 	mov    0x150(%rsp),%rdx
2252   6e2152:	e9 2f f8 ff ff       	jmp    6e1986 <shrink_lruvec+0x1a86>
2257   6e2157:	e8 00 00 00 00       	call   6e215c <shrink_lruvec+0x225c>	6e2158: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
225c   6e215c:	e9 e8 f4 ff ff       	jmp    6e1649 <shrink_lruvec+0x1749>
2261   6e2161:	89 d9                	mov    %ebx,%ecx
2263   6e2163:	80 e1 07             	and    $0x7,%cl
2266   6e2166:	80 c1 03             	add    $0x3,%cl
2269   6e2169:	38 c1                	cmp    %al,%cl
226b   6e216b:	0f 8c e1 fa ff ff    	jl     6e1c52 <shrink_lruvec+0x1d52>
2271   6e2171:	48 89 df             	mov    %rbx,%rdi
2274   6e2174:	e8 00 00 00 00       	call   6e2179 <shrink_lruvec+0x2279>	6e2175: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2279   6e2179:	e9 d4 fa ff ff       	jmp    6e1c52 <shrink_lruvec+0x1d52>
227e   6e217e:	44 89 e9             	mov    %r13d,%ecx
2281   6e2181:	80 e1 07             	and    $0x7,%cl
2284   6e2184:	80 c1 03             	add    $0x3,%cl
2287   6e2187:	38 c1                	cmp    %al,%cl
2289   6e2189:	0f 8c 12 fc ff ff    	jl     6e1da1 <shrink_lruvec+0x1ea1>
228f   6e218f:	4c 89 ef             	mov    %r13,%rdi
2292   6e2192:	e8 00 00 00 00       	call   6e2197 <shrink_lruvec+0x2297>	6e2193: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2297   6e2197:	e9 05 fc ff ff       	jmp    6e1da1 <shrink_lruvec+0x1ea1>
229c   6e219c:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e219f: R_X86_64_32S	memory_cgrp_subsys_on_dfl_key
22a3   6e21a3:	80 e1 07             	and    $0x7,%cl
22a6   6e21a6:	80 c1 03             	add    $0x3,%cl
22a9   6e21a9:	38 c1                	cmp    %al,%cl
22ab   6e21ab:	0f 8c f4 fa ff ff    	jl     6e1ca5 <shrink_lruvec+0x1da5>
22b1   6e21b1:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e21b4: R_X86_64_32S	memory_cgrp_subsys_on_dfl_key
22b8   6e21b8:	e8 00 00 00 00       	call   6e21bd <shrink_lruvec+0x22bd>	6e21b9: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
22bd   6e21bd:	e9 e3 fa ff ff       	jmp    6e1ca5 <shrink_lruvec+0x1da5>
22c2   6e21c2:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e21c5: R_X86_64_32S	.rodata+0x4900c0
22c9   6e21c9:	be 10 0b 00 00       	mov    $0xb10,%esi
22ce   6e21ce:	31 d2                	xor    %edx,%edx
22d0   6e21d0:	e8 00 00 00 00       	call   6e21d5 <shrink_lruvec+0x22d5>	6e21d1: R_X86_64_PLT32	___might_sleep-0x4
22d5   6e21d5:	e8 00 00 00 00       	call   6e21da <shrink_lruvec+0x22da>	6e21d6: R_X86_64_PLT32	__cond_resched-0x4
22da   6e21da:	4c 8b b4 24 e0 00 00 00 	mov    0xe0(%rsp),%r14
22e2   6e21e2:	4c 89 f7             	mov    %r14,%rdi
22e5   6e21e5:	48 8b 9c 24 b0 01 00 00 	mov    0x1b0(%rsp),%rbx
22ed   6e21ed:	48 89 de             	mov    %rbx,%rsi
22f0   6e21f0:	e8 00 00 00 00       	call   6e21f5 <shrink_lruvec+0x22f5>	6e21f1: R_X86_64_PLT32	__sanitizer_cov_trace_cmp8-0x4
22f5   6e21f5:	49 39 de             	cmp    %rbx,%r14
22f8   6e21f8:	0f 92 c0             	setb   %al
22fb   6e21fb:	0a 44 24 74          	or     0x74(%rsp),%al
22ff   6e21ff:	3c 01                	cmp    $0x1,%al
2301   6e2201:	0f 84 32 ec ff ff    	je     6e0e39 <shrink_lruvec+0xf39>
2307   6e2207:	48 8d bc 24 10 01 00 00 	lea    0x110(%rsp),%rdi
230f   6e220f:	48 89 f8             	mov    %rdi,%rax
2312   6e2212:	48 c1 e8 03          	shr    $0x3,%rax
2316   6e2216:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
2320   6e2220:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
2324   6e2224:	48 8d 9c 24 18 01 00 00 	lea    0x118(%rsp),%rbx
232c   6e222c:	74 05                	je     6e2233 <shrink_lruvec+0x2333>
232e   6e222e:	e8 00 00 00 00       	call   6e2233 <shrink_lruvec+0x2333>	6e222f: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
2333   6e2233:	4c 8b b4 24 10 01 00 00 	mov    0x110(%rsp),%r14
233b   6e223b:	48 89 d8             	mov    %rbx,%rax
233e   6e223e:	48 c1 e8 03          	shr    $0x3,%rax
2342   6e2242:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
234c   6e224c:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
2350   6e2250:	4c 8d bc 24 08 01 00 00 	lea    0x108(%rsp),%r15
2358   6e2258:	74 08                	je     6e2262 <shrink_lruvec+0x2362>
235a   6e225a:	48 89 df             	mov    %rbx,%rdi
235d   6e225d:	e8 00 00 00 00       	call   6e2262 <shrink_lruvec+0x2362>	6e225e: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
2362   6e2262:	4c 03 b4 24 18 01 00 00 	add    0x118(%rsp),%r14
236a   6e226a:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
2374   6e2274:	48 8b 8c 24 68 01 00 00 	mov    0x168(%rsp),%rcx
237c   6e227c:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
2380   6e2280:	74 0d                	je     6e228f <shrink_lruvec+0x238f>
2382   6e2282:	48 8d bc 24 00 01 00 00 	lea    0x100(%rsp),%rdi
238a   6e228a:	e8 00 00 00 00       	call   6e228f <shrink_lruvec+0x238f>	6e228b: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
238f   6e228f:	48 8b 9c 24 00 01 00 00 	mov    0x100(%rsp),%rbx
2397   6e2297:	4c 89 f8             	mov    %r15,%rax
239a   6e229a:	48 c1 e8 03          	shr    $0x3,%rax
239e   6e229e:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
23a8   6e22a8:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
23ac   6e22ac:	74 08                	je     6e22b6 <shrink_lruvec+0x23b6>
23ae   6e22ae:	4c 89 ff             	mov    %r15,%rdi
23b1   6e22b1:	e8 00 00 00 00       	call   6e22b6 <shrink_lruvec+0x23b6>	6e22b2: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
23b6   6e22b6:	48 03 9c 24 08 01 00 00 	add    0x108(%rsp),%rbx
23be   6e22be:	31 ff                	xor    %edi,%edi
23c0   6e22c0:	4c 89 f6             	mov    %r14,%rsi
23c3   6e22c3:	e8 00 00 00 00       	call   6e22c8 <shrink_lruvec+0x23c8>	6e22c4: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
23c8   6e22c8:	31 ff                	xor    %edi,%edi
23ca   6e22ca:	48 89 de             	mov    %rbx,%rsi
23cd   6e22cd:	e8 00 00 00 00       	call   6e22d2 <shrink_lruvec+0x23d2>	6e22ce: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
23d2   6e22d2:	4d 85 f6             	test   %r14,%r14
23d5   6e22d5:	0f 84 cb 02 00 00    	je     6e25a6 <shrink_lruvec+0x26a6>
23db   6e22db:	48 85 db             	test   %rbx,%rbx
23de   6e22de:	0f 84 c2 02 00 00    	je     6e25a6 <shrink_lruvec+0x26a6>
23e4   6e22e4:	4c 89 f7             	mov    %r14,%rdi
23e7   6e22e7:	48 89 de             	mov    %rbx,%rsi
23ea   6e22ea:	e8 00 00 00 00       	call   6e22ef <shrink_lruvec+0x23ef>	6e22eb: R_X86_64_PLT32	__sanitizer_cov_trace_cmp8-0x4
23ef   6e22ef:	49 39 de             	cmp    %rbx,%r14
23f2   6e22f2:	76 46                	jbe    6e233a <shrink_lruvec+0x243a>
23f4   6e22f4:	e8 00 00 00 00       	call   6e22f9 <shrink_lruvec+0x23f9>	6e22f5: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
23f9   6e22f9:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
2403   6e2303:	48 8b 84 24 a8 01 00 00 	mov    0x1a8(%rsp),%rax
240b   6e230b:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
2410   6e2310:	74 0d                	je     6e231f <shrink_lruvec+0x241f>
2412   6e2312:	48 8d bc 24 80 01 00 00 	lea    0x180(%rsp),%rdi
241a   6e231a:	e8 00 00 00 00       	call   6e231f <shrink_lruvec+0x241f>	6e231b: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
241f   6e231f:	45 31 e4             	xor    %r12d,%r12d
2422   6e2322:	41 bd 02 00 00 00    	mov    $0x2,%r13d
2428   6e2328:	48 8b 8c 24 80 01 00 00 	mov    0x180(%rsp),%rcx
2430   6e2330:	4c 8d bc 24 88 01 00 00 	lea    0x188(%rsp),%r15
2438   6e2338:	eb 4f                	jmp    6e2389 <shrink_lruvec+0x2489>
243a   6e233a:	e8 00 00 00 00       	call   6e233f <shrink_lruvec+0x243f>	6e233b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
243f   6e233f:	48 8d bc 24 90 01 00 00 	lea    0x190(%rsp),%rdi
2447   6e2347:	48 89 f8             	mov    %rdi,%rax
244a   6e234a:	48 c1 e8 03          	shr    $0x3,%rax
244e   6e234e:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
2458   6e2358:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
245c   6e235c:	74 05                	je     6e2363 <shrink_lruvec+0x2463>
245e   6e235e:	e8 00 00 00 00       	call   6e2363 <shrink_lruvec+0x2463>	6e235f: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
2463   6e2363:	41 bc 02 00 00 00    	mov    $0x2,%r12d
2469   6e2369:	45 31 ed             	xor    %r13d,%r13d
246c   6e236c:	48 8b 8c 24 90 01 00 00 	mov    0x190(%rsp),%rcx
2474   6e2374:	4c 8d bc 24 98 01 00 00 	lea    0x198(%rsp),%r15
247c   6e237c:	4c 89 f3             	mov    %r14,%rbx
247f   6e237f:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
2489   6e2389:	4c 89 f8             	mov    %r15,%rax
248c   6e238c:	48 c1 e8 03          	shr    $0x3,%rax
2490   6e2390:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
2495   6e2395:	74 1e                	je     6e23b5 <shrink_lruvec+0x24b5>
2497   6e2397:	4c 89 ff             	mov    %r15,%rdi
249a   6e239a:	4d 89 ee             	mov    %r13,%r14
249d   6e239d:	49 89 cd             	mov    %rcx,%r13
24a0   6e23a0:	e8 00 00 00 00       	call   6e23a5 <shrink_lruvec+0x24a5>	6e23a1: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
24a5   6e23a5:	4c 89 e9             	mov    %r13,%rcx
24a8   6e23a8:	4d 89 f5             	mov    %r14,%r13
24ab   6e23ab:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
24b5   6e23b5:	49 8b 07             	mov    (%r15),%rax
24b8   6e23b8:	48 01 c1             	add    %rax,%rcx
24bb   6e23bb:	48 83 c1 01          	add    $0x1,%rcx
24bf   6e23bf:	48 6b c3 64          	imul   $0x64,%rbx,%rax
24c3   6e23c3:	48 89 c2             	mov    %rax,%rdx
24c6   6e23c6:	48 09 ca             	or     %rcx,%rdx
24c9   6e23c9:	48 c1 ea 20          	shr    $0x20,%rdx
24cd   6e23cd:	74 07                	je     6e23d6 <shrink_lruvec+0x24d6>
24cf   6e23cf:	31 d2                	xor    %edx,%edx
24d1   6e23d1:	48 f7 f1             	div    %rcx
24d4   6e23d4:	eb 04                	jmp    6e23da <shrink_lruvec+0x24da>
24d6   6e23d6:	31 d2                	xor    %edx,%edx
24d8   6e23d8:	f7 f1                	div    %ecx
24da   6e23da:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
24df   6e23df:	44 89 e0             	mov    %r12d,%eax
24e2   6e23e2:	48 8d 1c c4          	lea    (%rsp,%rax,8),%rbx
24e6   6e23e6:	48 81 c3 00 01 00 00 	add    $0x100,%rbx
24ed   6e23ed:	48 89 d8             	mov    %rbx,%rax
24f0   6e23f0:	48 c1 e8 03          	shr    $0x3,%rax
24f4   6e23f4:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
24f9   6e23f9:	74 08                	je     6e2403 <shrink_lruvec+0x2503>
24fb   6e23fb:	48 89 df             	mov    %rbx,%rdi
24fe   6e23fe:	e8 00 00 00 00       	call   6e2403 <shrink_lruvec+0x2503>	6e23ff: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
2503   6e2403:	48 c7 03 00 00 00 00 	movq   $0x0,(%rbx)
250a   6e240a:	41 83 cc 01          	or     $0x1,%r12d
250e   6e240e:	4a 8d 1c e4          	lea    (%rsp,%r12,8),%rbx
2512   6e2412:	48 81 c3 00 01 00 00 	add    $0x100,%rbx
2519   6e2419:	48 89 d8             	mov    %rbx,%rax
251c   6e241c:	48 c1 e8 03          	shr    $0x3,%rax
2520   6e2420:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
2525   6e2425:	74 08                	je     6e242f <shrink_lruvec+0x252f>
2527   6e2427:	48 89 df             	mov    %rbx,%rdi
252a   6e242a:	e8 00 00 00 00       	call   6e242f <shrink_lruvec+0x252f>	6e242b: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
252f   6e242f:	48 c7 03 00 00 00 00 	movq   $0x0,(%rbx)
2536   6e2436:	45 89 ee             	mov    %r13d,%r14d
2539   6e2439:	4a 8d 3c f4          	lea    (%rsp,%r14,8),%rdi
253d   6e243d:	48 81 c7 80 01 00 00 	add    $0x180,%rdi
2544   6e2444:	48 89 f8             	mov    %rdi,%rax
2547   6e2447:	48 c1 e8 03          	shr    $0x3,%rax
254b   6e244b:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
2555   6e2455:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
2559   6e2459:	74 05                	je     6e2460 <shrink_lruvec+0x2560>
255b   6e245b:	e8 00 00 00 00       	call   6e2460 <shrink_lruvec+0x2560>	6e245c: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
2560   6e2460:	4a 8b 9c f4 80 01 00 00 	mov    0x180(%rsp,%r14,8),%rbx
2568   6e2468:	4e 8d 34 f4          	lea    (%rsp,%r14,8),%r14
256c   6e246c:	49 81 c6 00 01 00 00 	add    $0x100,%r14
2573   6e2473:	4d 89 f7             	mov    %r14,%r15
2576   6e2476:	49 c1 ef 03          	shr    $0x3,%r15
257a   6e247a:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
2584   6e2484:	41 80 3c 07 00       	cmpb   $0x0,(%r15,%rax,1)
2589   6e2489:	74 08                	je     6e2493 <shrink_lruvec+0x2593>
258b   6e248b:	4c 89 f7             	mov    %r14,%rdi
258e   6e248e:	e8 00 00 00 00       	call   6e2493 <shrink_lruvec+0x2593>	6e248f: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
2593   6e2493:	48 89 d9             	mov    %rbx,%rcx
2596   6e2496:	49 2b 0e             	sub    (%r14),%rcx
2599   6e2499:	41 bc 64 00 00 00    	mov    $0x64,%r12d
259f   6e249f:	4c 2b 64 24 08       	sub    0x8(%rsp),%r12
25a4   6e24a4:	49 0f af dc          	imul   %r12,%rbx
25a8   6e24a8:	48 c1 eb 02          	shr    $0x2,%rbx
25ac   6e24ac:	48 89 d8             	mov    %rbx,%rax
25af   6e24af:	48 ba c3 f5 28 5c 8f c2 f5 28 	movabs $0x28f5c28f5c28f5c3,%rdx
25b9   6e24b9:	48 f7 e2             	mul    %rdx
25bc   6e24bc:	48 c1 ea 02          	shr    $0x2,%rdx
25c0   6e24c0:	48 29 ca             	sub    %rcx,%rdx
25c3   6e24c3:	bb 00 00 00 00       	mov    $0x0,%ebx
25c8   6e24c8:	48 0f 43 da          	cmovae %rdx,%rbx
25cc   6e24cc:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
25d6   6e24d6:	41 80 3c 07 00       	cmpb   $0x0,(%r15,%rax,1)
25db   6e24db:	74 08                	je     6e24e5 <shrink_lruvec+0x25e5>
25dd   6e24dd:	4c 89 f7             	mov    %r14,%rdi
25e0   6e24e0:	e8 00 00 00 00       	call   6e24e5 <shrink_lruvec+0x25e5>	6e24e1: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
25e5   6e24e5:	49 89 1e             	mov    %rbx,(%r14)
25e8   6e24e8:	41 83 cd 01          	or     $0x1,%r13d
25ec   6e24ec:	4a 8d 3c ec          	lea    (%rsp,%r13,8),%rdi
25f0   6e24f0:	48 81 c7 80 01 00 00 	add    $0x180,%rdi
25f7   6e24f7:	48 89 f8             	mov    %rdi,%rax
25fa   6e24fa:	48 c1 e8 03          	shr    $0x3,%rax
25fe   6e24fe:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
2608   6e2508:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
260c   6e250c:	74 05                	je     6e2513 <shrink_lruvec+0x2613>
260e   6e250e:	e8 00 00 00 00       	call   6e2513 <shrink_lruvec+0x2613>	6e250f: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
2613   6e2513:	4e 8b bc ec 80 01 00 00 	mov    0x180(%rsp,%r13,8),%r15
261b   6e251b:	4e 8d 34 ec          	lea    (%rsp,%r13,8),%r14
261f   6e251f:	49 81 c6 00 01 00 00 	add    $0x100,%r14
2626   6e2526:	4d 89 f5             	mov    %r14,%r13
2629   6e2529:	49 c1 ed 03          	shr    $0x3,%r13
262d   6e252d:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
2637   6e2537:	41 80 7c 05 00 00    	cmpb   $0x0,0x0(%r13,%rax,1)
263d   6e253d:	74 08                	je     6e2547 <shrink_lruvec+0x2647>
263f   6e253f:	4c 89 f7             	mov    %r14,%rdi
2642   6e2542:	e8 00 00 00 00       	call   6e2547 <shrink_lruvec+0x2647>	6e2543: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
2647   6e2547:	4c 89 f9             	mov    %r15,%rcx
264a   6e254a:	49 2b 0e             	sub    (%r14),%rcx
264d   6e254d:	4d 0f af e7          	imul   %r15,%r12
2651   6e2551:	49 c1 ec 02          	shr    $0x2,%r12
2655   6e2555:	4c 89 e0             	mov    %r12,%rax
2658   6e2558:	48 ba c3 f5 28 5c 8f c2 f5 28 	movabs $0x28f5c28f5c28f5c3,%rdx
2662   6e2562:	48 f7 e2             	mul    %rdx
2665   6e2565:	48 c1 ea 02          	shr    $0x2,%rdx
2669   6e2569:	48 29 ca             	sub    %rcx,%rdx
266c   6e256c:	bb 00 00 00 00       	mov    $0x0,%ebx
2671   6e2571:	48 0f 43 da          	cmovae %rdx,%rbx
2675   6e2575:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
267f   6e257f:	41 80 7c 05 00 00    	cmpb   $0x0,0x0(%r13,%rax,1)
2685   6e2585:	74 08                	je     6e258f <shrink_lruvec+0x268f>
2687   6e2587:	4c 89 f7             	mov    %r14,%rdi
268a   6e258a:	e8 00 00 00 00       	call   6e258f <shrink_lruvec+0x268f>	6e258b: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
268f   6e258f:	49 89 1e             	mov    %rbx,(%r14)
2692   6e2592:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
269c   6e259c:	4c 8b 6c 24 20       	mov    0x20(%rsp),%r13
26a1   6e25a1:	e9 a2 e8 ff ff       	jmp    6e0e48 <shrink_lruvec+0xf48>
26a6   6e25a6:	e8 00 00 00 00       	call   6e25ab <shrink_lruvec+0x26ab>	6e25a7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
26ab   6e25ab:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
26b5   6e25b5:	eb 05                	jmp    6e25bc <shrink_lruvec+0x26bc>
26b7   6e25b7:	e8 00 00 00 00       	call   6e25bc <shrink_lruvec+0x26bc>	6e25b8: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
26bc   6e25bc:	48 8d bc 24 f0 01 00 00 	lea    0x1f0(%rsp),%rdi
26c4   6e25c4:	e8 00 00 00 00       	call   6e25c9 <shrink_lruvec+0x26c9>	6e25c5: R_X86_64_PLT32	blk_finish_plug-0x4
26c9   6e25c9:	48 8b 44 24 10       	mov    0x10(%rsp),%rax
26ce   6e25ce:	48 8d 58 40          	lea    0x40(%rax),%rbx
26d2   6e25d2:	48 89 d8             	mov    %rbx,%rax
26d5   6e25d5:	48 c1 e8 03          	shr    $0x3,%rax
26d9   6e25d9:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
26de   6e25de:	74 08                	je     6e25e8 <shrink_lruvec+0x26e8>
26e0   6e25e0:	48 89 df             	mov    %rbx,%rdi
26e3   6e25e3:	e8 00 00 00 00       	call   6e25e8 <shrink_lruvec+0x26e8>	6e25e4: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
26e8   6e25e8:	48 8b 84 24 e0 00 00 00 	mov    0xe0(%rsp),%rax
26f0   6e25f0:	48 01 03             	add    %rax,(%rbx)
26f3   6e25f3:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6e25f6: R_X86_64_32S	total_swap_pages
26fa   6e25fa:	48 c1 e8 03          	shr    $0x3,%rax
26fe   6e25fe:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
2703   6e2603:	74 0c                	je     6e2611 <shrink_lruvec+0x2711>
2705   6e2605:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e2608: R_X86_64_32S	total_swap_pages
270c   6e260c:	e8 00 00 00 00       	call   6e2611 <shrink_lruvec+0x2711>	6e260d: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
2711   6e2611:	48 8b 1d 00 00 00 00 	mov    0x0(%rip),%rbx        # 6e2618 <shrink_lruvec+0x2718>	6e2614: R_X86_64_PC32	total_swap_pages-0x4
2718   6e2618:	31 ff                	xor    %edi,%edi
271a   6e261a:	48 89 de             	mov    %rbx,%rsi
271d   6e261d:	e8 00 00 00 00       	call   6e2622 <shrink_lruvec+0x2722>	6e261e: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
2722   6e2622:	48 85 db             	test   %rbx,%rbx
2725   6e2625:	7e 40                	jle    6e2667 <shrink_lruvec+0x2767>
2727   6e2627:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6e262a: R_X86_64_32S	memory_cgrp_subsys_enabled_key
272e   6e262e:	48 c1 e8 03          	shr    $0x3,%rax
2732   6e2632:	42 8a 04 30          	mov    (%rax,%r14,1),%al
2736   6e2636:	84 c0                	test   %al,%al
2738   6e2638:	0f 85 39 03 00 00    	jne    6e2977 <shrink_lruvec+0x2a77>
273e   6e263e:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e2644 <shrink_lruvec+0x2744>	6e2640: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
2744   6e2644:	bf 01 00 00 00       	mov    $0x1,%edi
2749   6e2649:	89 de                	mov    %ebx,%esi
274b   6e264b:	e8 00 00 00 00       	call   6e2650 <shrink_lruvec+0x2750>	6e264c: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
2750   6e2650:	85 db                	test   %ebx,%ebx
2752   6e2652:	7e 1d                	jle    6e2671 <shrink_lruvec+0x2771>
2754   6e2654:	e8 00 00 00 00       	call   6e2659 <shrink_lruvec+0x2759>	6e2655: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
2759   6e2659:	48 8b 44 24 30       	mov    0x30(%rsp),%rax
275e   6e265e:	48 8d 98 d8 00 00 00 	lea    0xd8(%rax),%rbx
2765   6e2665:	eb 27                	jmp    6e268e <shrink_lruvec+0x278e>
2767   6e2667:	e8 00 00 00 00       	call   6e266c <shrink_lruvec+0x276c>	6e2668: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
276c   6e266c:	e9 4c 01 00 00       	jmp    6e27bd <shrink_lruvec+0x28bd>
2771   6e2671:	e8 00 00 00 00       	call   6e2676 <shrink_lruvec+0x2776>	6e2672: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
2776   6e2676:	48 c7 c3 00 00 00 00 	mov    $0x0,%rbx	6e2679: R_X86_64_32S	vm_node_stat
277d   6e267d:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e2680: R_X86_64_32S	vm_node_stat
2784   6e2684:	be 08 00 00 00       	mov    $0x8,%esi
2789   6e2689:	e8 00 00 00 00       	call   6e268e <shrink_lruvec+0x278e>	6e268a: R_X86_64_PLT32	__kasan_check_read-0x4
278e   6e268e:	48 89 d8             	mov    %rbx,%rax
2791   6e2691:	48 c1 e8 03          	shr    $0x3,%rax
2795   6e2695:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
279a   6e269a:	74 08                	je     6e26a4 <shrink_lruvec+0x27a4>
279c   6e269c:	48 89 df             	mov    %rbx,%rdi
279f   6e269f:	e8 00 00 00 00       	call   6e26a4 <shrink_lruvec+0x27a4>	6e26a0: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
27a4   6e26a4:	48 8b 1b             	mov    (%rbx),%rbx
27a7   6e26a7:	45 31 ff             	xor    %r15d,%r15d
27aa   6e26aa:	31 ff                	xor    %edi,%edi
27ac   6e26ac:	48 89 de             	mov    %rbx,%rsi
27af   6e26af:	e8 00 00 00 00       	call   6e26b4 <shrink_lruvec+0x27b4>	6e26b0: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
27b4   6e26b4:	48 85 db             	test   %rbx,%rbx
27b7   6e26b7:	4c 0f 49 fb          	cmovns %rbx,%r15
27bb   6e26bb:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6e26be: R_X86_64_32S	memory_cgrp_subsys_enabled_key
27c2   6e26c2:	48 c1 e8 03          	shr    $0x3,%rax
27c6   6e26c6:	42 8a 04 30          	mov    (%rax,%r14,1),%al
27ca   6e26ca:	84 c0                	test   %al,%al
27cc   6e26cc:	0f 85 cb 02 00 00    	jne    6e299d <shrink_lruvec+0x2a9d>
27d2   6e26d2:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e26d8 <shrink_lruvec+0x27d8>	6e26d4: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
27d8   6e26d8:	bf 01 00 00 00       	mov    $0x1,%edi
27dd   6e26dd:	89 de                	mov    %ebx,%esi
27df   6e26df:	e8 00 00 00 00       	call   6e26e4 <shrink_lruvec+0x27e4>	6e26e0: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
27e4   6e26e4:	85 db                	test   %ebx,%ebx
27e6   6e26e6:	7e 13                	jle    6e26fb <shrink_lruvec+0x27fb>
27e8   6e26e8:	e8 00 00 00 00       	call   6e26ed <shrink_lruvec+0x27ed>	6e26e9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
27ed   6e26ed:	48 8b 44 24 30       	mov    0x30(%rsp),%rax
27f2   6e26f2:	48 8d 98 e0 00 00 00 	lea    0xe0(%rax),%rbx
27f9   6e26f9:	eb 1d                	jmp    6e2718 <shrink_lruvec+0x2818>
27fb   6e26fb:	e8 00 00 00 00       	call   6e2700 <shrink_lruvec+0x2800>	6e26fc: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
2800   6e2700:	48 c7 c3 00 00 00 00 	mov    $0x0,%rbx	6e2703: R_X86_64_32S	vm_node_stat+0x8
2807   6e2707:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e270a: R_X86_64_32S	vm_node_stat+0x8
280e   6e270e:	be 08 00 00 00       	mov    $0x8,%esi
2813   6e2713:	e8 00 00 00 00       	call   6e2718 <shrink_lruvec+0x2818>	6e2714: R_X86_64_PLT32	__kasan_check_read-0x4
2818   6e2718:	48 89 d8             	mov    %rbx,%rax
281b   6e271b:	48 c1 e8 03          	shr    $0x3,%rax
281f   6e271f:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
2824   6e2724:	74 08                	je     6e272e <shrink_lruvec+0x282e>
2826   6e2726:	48 89 df             	mov    %rbx,%rdi
2829   6e2729:	e8 00 00 00 00       	call   6e272e <shrink_lruvec+0x282e>	6e272a: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
282e   6e272e:	48 8b 1b             	mov    (%rbx),%rbx
2831   6e2731:	45 31 f6             	xor    %r14d,%r14d
2834   6e2734:	31 ff                	xor    %edi,%edi
2836   6e2736:	48 89 de             	mov    %rbx,%rsi
2839   6e2739:	e8 00 00 00 00       	call   6e273e <shrink_lruvec+0x283e>	6e273a: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
283e   6e273e:	48 85 db             	test   %rbx,%rbx
2841   6e2741:	4c 0f 49 f3          	cmovns %rbx,%r14
2845   6e2745:	4b 8d 1c 3e          	lea    (%r14,%r15,1),%rbx
2849   6e2749:	bf 00 00 04 00       	mov    $0x40000,%edi
284e   6e274e:	48 89 de             	mov    %rbx,%rsi
2851   6e2751:	e8 00 00 00 00       	call   6e2756 <shrink_lruvec+0x2856>	6e2752: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
2856   6e2756:	48 81 fb ff ff 03 00 	cmp    $0x3ffff,%rbx
285d   6e275d:	77 0c                	ja     6e276b <shrink_lruvec+0x286b>
285f   6e275f:	e8 00 00 00 00       	call   6e2764 <shrink_lruvec+0x2864>	6e2760: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
2864   6e2764:	bb 01 00 00 00       	mov    $0x1,%ebx
2869   6e2769:	eb 19                	jmp    6e2784 <shrink_lruvec+0x2884>
286b   6e276b:	e8 00 00 00 00       	call   6e2770 <shrink_lruvec+0x2870>	6e276c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
2870   6e2770:	48 c1 eb 11          	shr    $0x11,%rbx
2874   6e2774:	48 83 e3 fe          	and    $0xfffffffffffffffe,%rbx
2878   6e2778:	48 8d 3c 9b          	lea    (%rbx,%rbx,4),%rdi
287c   6e277c:	e8 00 00 00 00       	call   6e2781 <shrink_lruvec+0x2881>	6e277d: R_X86_64_PLT32	int_sqrt-0x4
2881   6e2781:	48 89 c3             	mov    %rax,%rbx
2884   6e2784:	49 0f af df          	imul   %r15,%rbx
2888   6e2788:	48 89 df             	mov    %rbx,%rdi
288b   6e278b:	4c 89 f6             	mov    %r14,%rsi
288e   6e278e:	e8 00 00 00 00       	call   6e2793 <shrink_lruvec+0x2893>	6e278f: R_X86_64_PLT32	__sanitizer_cov_trace_cmp8-0x4
2893   6e2793:	4c 39 f3             	cmp    %r14,%rbx
2896   6e2796:	73 20                	jae    6e27b8 <shrink_lruvec+0x28b8>
2898   6e2798:	e8 00 00 00 00       	call   6e279d <shrink_lruvec+0x289d>	6e2799: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
289d   6e279d:	bf 20 00 00 00       	mov    $0x20,%edi
28a2   6e27a2:	48 8b 74 24 30       	mov    0x30(%rsp),%rsi
28a7   6e27a7:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
28ac   6e27ac:	b9 01 00 00 00       	mov    $0x1,%ecx
28b1   6e27b1:	e8 4a 7b 00 00       	call   6ea300 <shrink_active_list>
28b6   6e27b6:	eb 05                	jmp    6e27bd <shrink_lruvec+0x28bd>
28b8   6e27b8:	e8 00 00 00 00       	call   6e27bd <shrink_lruvec+0x28bd>	6e27b9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
28bd   6e27bd:	48 8d 65 d8          	lea    -0x28(%rbp),%rsp
28c1   6e27c1:	5b                   	pop    %rbx
28c2   6e27c2:	41 5c                	pop    %r12
28c4   6e27c4:	41 5d                	pop    %r13
28c6   6e27c6:	41 5e                	pop    %r14
28c8   6e27c8:	41 5f                	pop    %r15
28ca   6e27ca:	5d                   	pop    %rbp
28cb   6e27cb:	c3                   	ret
28cc   6e27cc:	31 d2                	xor    %edx,%edx
28ce   6e27ce:	f7 f7                	div    %edi
28d0   6e27d0:	89 c7                	mov    %eax,%edi
28d2   6e27d2:	b8 c8 00 00 00       	mov    $0xc8,%eax
28d7   6e27d7:	44 29 f0             	sub    %r14d,%eax
28da   6e27da:	48 98                	cltq
28dc   6e27dc:	48 0f af c8          	imul   %rax,%rcx
28e0   6e27e0:	48 89 c8             	mov    %rcx,%rax
28e3   6e27e3:	48 09 f0             	or     %rsi,%rax
28e6   6e27e6:	48 c1 e8 20          	shr    $0x20,%rax
28ea   6e27ea:	74 0d                	je     6e27f9 <shrink_lruvec+0x28f9>
28ec   6e27ec:	48 89 c8             	mov    %rcx,%rax
28ef   6e27ef:	31 d2                	xor    %edx,%edx
28f1   6e27f1:	48 f7 f6             	div    %rsi
28f4   6e27f4:	49 89 c7             	mov    %rax,%r15
28f7   6e27f7:	eb 09                	jmp    6e2802 <shrink_lruvec+0x2902>
28f9   6e27f9:	89 c8                	mov    %ecx,%eax
28fb   6e27fb:	31 d2                	xor    %edx,%edx
28fd   6e27fd:	f7 f6                	div    %esi
28ff   6e27ff:	41 89 c7             	mov    %eax,%r15d
2902   6e2802:	49 be 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r14
290c   6e280c:	48 8d 84 24 90 00 00 00 	lea    0x90(%rsp),%rax
2914   6e2814:	48 c1 e8 03          	shr    $0x3,%rax
2918   6e2818:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
291d   6e281d:	74 13                	je     6e2832 <shrink_lruvec+0x2932>
291f   6e281f:	48 89 fb             	mov    %rdi,%rbx
2922   6e2822:	48 8d bc 24 90 00 00 00 	lea    0x90(%rsp),%rdi
292a   6e282a:	e8 00 00 00 00       	call   6e282f <shrink_lruvec+0x292f>	6e282b: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
292f   6e282f:	48 89 df             	mov    %rbx,%rdi
2932   6e2832:	48 89 fb             	mov    %rdi,%rbx
2935   6e2835:	48 89 bc 24 90 00 00 00 	mov    %rdi,0x90(%rsp)
293d   6e283d:	48 8d bc 24 98 00 00 00 	lea    0x98(%rsp),%rdi
2945   6e2845:	48 89 f8             	mov    %rdi,%rax
2948   6e2848:	48 c1 e8 03          	shr    $0x3,%rax
294c   6e284c:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
2951   6e2851:	74 05                	je     6e2858 <shrink_lruvec+0x2958>
2953   6e2853:	e8 00 00 00 00       	call   6e2858 <shrink_lruvec+0x2958>	6e2854: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
2958   6e2858:	4c 89 bc 24 98 00 00 00 	mov    %r15,0x98(%rsp)
2960   6e2860:	48 89 de             	mov    %rbx,%rsi
2963   6e2863:	4c 01 fe             	add    %r15,%rsi
2966   6e2866:	b8 01 00 00 00       	mov    $0x1,%eax
296b   6e286b:	31 c9                	xor    %ecx,%ecx
296d   6e286d:	48 89 4c 24 28       	mov    %rcx,0x28(%rsp)
2972   6e2872:	e9 75 da ff ff       	jmp    6e02ec <shrink_lruvec+0x3ec>
2977   6e2877:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6e287a: R_X86_64_32S	memory_cgrp_subsys_enabled_key
297e   6e287e:	48 c1 e8 03          	shr    $0x3,%rax
2982   6e2882:	42 8a 04 30          	mov    (%rax,%r14,1),%al
2986   6e2886:	84 c0                	test   %al,%al
2988   6e2888:	0f 85 a4 01 00 00    	jne    6e2a32 <shrink_lruvec+0x2b32>
298e   6e288e:	8b 1d 00 00 00 00    	mov    0x0(%rip),%ebx        # 6e2894 <shrink_lruvec+0x2994>	6e2890: R_X86_64_PC32	memory_cgrp_subsys_enabled_key-0x4
2994   6e2894:	bf 01 00 00 00       	mov    $0x1,%edi
2999   6e2899:	89 de                	mov    %ebx,%esi
299b   6e289b:	e8 00 00 00 00       	call   6e28a0 <shrink_lruvec+0x29a0>	6e289c: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
29a0   6e28a0:	85 db                	test   %ebx,%ebx
29a2   6e28a2:	7e 42                	jle    6e28e6 <shrink_lruvec+0x29e6>
29a4   6e28a4:	e8 00 00 00 00       	call   6e28a9 <shrink_lruvec+0x29a9>	6e28a5: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
29a9   6e28a9:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	6e28ac: R_X86_64_32S	root_mem_cgroup
29b0   6e28b0:	48 c1 e8 03          	shr    $0x3,%rax
29b4   6e28b4:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
29b9   6e28b9:	74 0c                	je     6e28c7 <shrink_lruvec+0x29c7>
29bb   6e28bb:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e28be: R_X86_64_32S	root_mem_cgroup
29c2   6e28c2:	e8 00 00 00 00       	call   6e28c7 <shrink_lruvec+0x29c7>	6e28c3: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
29c7   6e28c7:	4c 39 25 00 00 00 00 	cmp    %r12,0x0(%rip)        # 6e28ce <shrink_lruvec+0x29ce>	6e28ca: R_X86_64_PC32	root_mem_cgroup-0x4
29ce   6e28ce:	49 8d 84 24 b8 04 00 00 	lea    0x4b8(%r12),%rax
29d6   6e28d6:	48 c7 c3 00 00 00 00 	mov    $0x0,%rbx	6e28d9: R_X86_64_32S	vm_swappiness
29dd   6e28dd:	48 0f 45 d8          	cmovne %rax,%rbx
29e1   6e28e1:	e9 4b d7 ff ff       	jmp    6e0031 <shrink_lruvec+0x131>
29e6   6e28e6:	e8 00 00 00 00       	call   6e28eb <shrink_lruvec+0x29eb>	6e28e7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
29eb   6e28eb:	e9 3a d7 ff ff       	jmp    6e002a <shrink_lruvec+0x12a>
29f0   6e28f0:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e28f3: R_X86_64_32S	memory_cgrp_subsys_enabled_key
29f7   6e28f7:	80 e1 07             	and    $0x7,%cl
29fa   6e28fa:	80 c1 03             	add    $0x3,%cl
29fd   6e28fd:	38 c1                	cmp    %al,%cl
29ff   6e28ff:	0f 8c a8 d6 ff ff    	jl     6dffad <shrink_lruvec+0xad>
2a05   6e2905:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e2908: R_X86_64_32S	memory_cgrp_subsys_enabled_key
2a0c   6e290c:	e8 00 00 00 00       	call   6e2911 <shrink_lruvec+0x2a11>	6e290d: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2a11   6e2911:	e9 97 d6 ff ff       	jmp    6dffad <shrink_lruvec+0xad>
2a16   6e2916:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e2919: R_X86_64_32S	memory_cgrp_subsys_on_dfl_key
2a1d   6e291d:	80 e1 07             	and    $0x7,%cl
2a20   6e2920:	80 c1 03             	add    $0x3,%cl
2a23   6e2923:	38 c1                	cmp    %al,%cl
2a25   6e2925:	0f 8c e3 d6 ff ff    	jl     6e000e <shrink_lruvec+0x10e>
2a2b   6e292b:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e292e: R_X86_64_32S	memory_cgrp_subsys_on_dfl_key
2a32   6e2932:	e8 00 00 00 00       	call   6e2937 <shrink_lruvec+0x2a37>	6e2933: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2a37   6e2937:	e9 d2 d6 ff ff       	jmp    6e000e <shrink_lruvec+0x10e>
2a3c   6e293c:	89 d9                	mov    %ebx,%ecx
2a3e   6e293e:	80 e1 07             	and    $0x7,%cl
2a41   6e2941:	80 c1 03             	add    $0x3,%cl
2a44   6e2944:	38 c1                	cmp    %al,%cl
2a46   6e2946:	0f 8c fb d6 ff ff    	jl     6e0047 <shrink_lruvec+0x147>
2a4c   6e294c:	48 89 df             	mov    %rbx,%rdi
2a4f   6e294f:	e8 00 00 00 00       	call   6e2954 <shrink_lruvec+0x2a54>	6e2950: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2a54   6e2954:	e9 ee d6 ff ff       	jmp    6e0047 <shrink_lruvec+0x147>
2a59   6e2959:	44 89 e9             	mov    %r13d,%ecx
2a5c   6e295c:	80 e1 07             	and    $0x7,%cl
2a5f   6e295f:	80 c1 01             	add    $0x1,%cl
2a62   6e2962:	38 c1                	cmp    %al,%cl
2a64   6e2964:	0f 8c 18 d7 ff ff    	jl     6e0082 <shrink_lruvec+0x182>
2a6a   6e296a:	4c 89 ef             	mov    %r13,%rdi
2a6d   6e296d:	e8 00 00 00 00       	call   6e2972 <shrink_lruvec+0x2a72>	6e296e: R_X86_64_PLT32	__asan_report_load2_noabort-0x4
2a72   6e2972:	e9 0b d7 ff ff       	jmp    6e0082 <shrink_lruvec+0x182>
2a77   6e2977:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e297a: R_X86_64_32S	memory_cgrp_subsys_enabled_key
2a7e   6e297e:	80 e1 07             	and    $0x7,%cl
2a81   6e2981:	80 c1 03             	add    $0x3,%cl
2a84   6e2984:	38 c1                	cmp    %al,%cl
2a86   6e2986:	0f 8c b2 fc ff ff    	jl     6e263e <shrink_lruvec+0x273e>
2a8c   6e298c:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e298f: R_X86_64_32S	memory_cgrp_subsys_enabled_key
2a93   6e2993:	e8 00 00 00 00       	call   6e2998 <shrink_lruvec+0x2a98>	6e2994: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2a98   6e2998:	e9 a1 fc ff ff       	jmp    6e263e <shrink_lruvec+0x273e>
2a9d   6e299d:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e29a0: R_X86_64_32S	memory_cgrp_subsys_enabled_key
2aa4   6e29a4:	80 e1 07             	and    $0x7,%cl
2aa7   6e29a7:	80 c1 03             	add    $0x3,%cl
2aaa   6e29aa:	38 c1                	cmp    %al,%cl
2aac   6e29ac:	0f 8c 20 fd ff ff    	jl     6e26d2 <shrink_lruvec+0x27d2>
2ab2   6e29b2:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e29b5: R_X86_64_32S	memory_cgrp_subsys_enabled_key
2ab9   6e29b9:	e8 00 00 00 00       	call   6e29be <shrink_lruvec+0x2abe>	6e29ba: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2abe   6e29be:	e9 0f fd ff ff       	jmp    6e26d2 <shrink_lruvec+0x27d2>
2ac3   6e29c3:	89 d9                	mov    %ebx,%ecx
2ac5   6e29c5:	80 e1 07             	and    $0x7,%cl
2ac8   6e29c8:	80 c1 03             	add    $0x3,%cl
2acb   6e29cb:	38 c1                	cmp    %al,%cl
2acd   6e29cd:	0f 8c e8 e2 ff ff    	jl     6e0cbb <shrink_lruvec+0xdbb>
2ad3   6e29d3:	48 89 df             	mov    %rbx,%rdi
2ad6   6e29d6:	e8 00 00 00 00       	call   6e29db <shrink_lruvec+0x2adb>	6e29d7: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2adb   6e29db:	e9 db e2 ff ff       	jmp    6e0cbb <shrink_lruvec+0xdbb>
2ae0   6e29e0:	89 d9                	mov    %ebx,%ecx
2ae2   6e29e2:	80 e1 07             	and    $0x7,%cl
2ae5   6e29e5:	38 c1                	cmp    %al,%cl
2ae7   6e29e7:	0f 8c 15 e3 ff ff    	jl     6e0d02 <shrink_lruvec+0xe02>
2aed   6e29ed:	48 89 df             	mov    %rbx,%rdi
2af0   6e29f0:	e8 00 00 00 00       	call   6e29f5 <shrink_lruvec+0x2af5>	6e29f1: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
2af5   6e29f5:	e9 08 e3 ff ff       	jmp    6e0d02 <shrink_lruvec+0xe02>
2afa   6e29fa:	89 d9                	mov    %ebx,%ecx
2afc   6e29fc:	80 e1 07             	and    $0x7,%cl
2aff   6e29ff:	38 c1                	cmp    %al,%cl
2b01   6e2a01:	0f 8c 8a d7 ff ff    	jl     6e0191 <shrink_lruvec+0x291>
2b07   6e2a07:	48 89 df             	mov    %rbx,%rdi
2b0a   6e2a0a:	e8 00 00 00 00       	call   6e2a0f <shrink_lruvec+0x2b0f>	6e2a0b: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
2b0f   6e2a0f:	e9 7d d7 ff ff       	jmp    6e0191 <shrink_lruvec+0x291>
2b14   6e2a14:	44 89 e9             	mov    %r13d,%ecx
2b17   6e2a17:	80 e1 07             	and    $0x7,%cl
2b1a   6e2a1a:	80 c1 01             	add    $0x1,%cl
2b1d   6e2a1d:	38 c1                	cmp    %al,%cl
2b1f   6e2a1f:	0f 8c bd d7 ff ff    	jl     6e01e2 <shrink_lruvec+0x2e2>
2b25   6e2a25:	4c 89 ef             	mov    %r13,%rdi
2b28   6e2a28:	e8 00 00 00 00       	call   6e2a2d <shrink_lruvec+0x2b2d>	6e2a29: R_X86_64_PLT32	__asan_report_load2_noabort-0x4
2b2d   6e2a2d:	e9 b0 d7 ff ff       	jmp    6e01e2 <shrink_lruvec+0x2e2>
2b32   6e2a32:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	6e2a35: R_X86_64_32S	memory_cgrp_subsys_enabled_key
2b39   6e2a39:	80 e1 07             	and    $0x7,%cl
2b3c   6e2a3c:	80 c1 03             	add    $0x3,%cl
2b3f   6e2a3f:	38 c1                	cmp    %al,%cl
2b41   6e2a41:	0f 8c 47 fe ff ff    	jl     6e288e <shrink_lruvec+0x298e>
2b47   6e2a47:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	6e2a4a: R_X86_64_32S	memory_cgrp_subsys_enabled_key
2b4e   6e2a4e:	e8 00 00 00 00       	call   6e2a53 <shrink_lruvec+0x2b53>	6e2a4f: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
2b53   6e2a53:	e9 36 fe ff ff       	jmp    6e288e <shrink_lruvec+0x298e>
2b58   6e2a58:	66 2e 0f 1f 84 00 00 00 00 00 	cs nopw 0x0(%rax,%rax,1)
2b62   6e2a62:	66 2e 0f 1f 84 00 00 00 00 00 	cs nopw 0x0(%rax,%rax,1)
2b6c   6e2a6c:	66 2e 0f 1f 84 00 00 00 00 00 	cs nopw 0x0(%rax,%rax,1)
2b76   6e2a76:	66 2e 0f 1f 84 00 00 00 00 00 	cs nopw 0x0(%rax,%rax,1)

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2023-02-13 22:21 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-02-13 22:21 [stable:linux-5.15.y 8081/9999] mm/vmscan.o: warning: objtool: shrink_lruvec()+0x974: sibling call from callable instruction with modified stack frame kernel test robot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).