
vmlinux.o:     file format elf64-x86-64


Disassembly of section .text.internal_move_pointers_items:

0000000000000000 <internal_move_pointers_items>:
   0:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
			1: R_X86_64_NONE	__fentry__-0x4
   5:	55                   	push   %rbp
   6:	41 57                	push   %r15
   8:	41 56                	push   %r14
   a:	41 55                	push   %r13
   c:	41 54                	push   %r12
   e:	53                   	push   %rbx
   f:	48 83 ec 68          	sub    $0x68,%rsp
  13:	4c 89 44 24 30       	mov    %r8,0x30(%rsp)
  18:	41 89 cc             	mov    %ecx,%r12d
  1b:	89 54 24 04          	mov    %edx,0x4(%rsp)
  1f:	49 89 f6             	mov    %rsi,%r14
  22:	49 89 fd             	mov    %rdi,%r13
  25:	e8 00 00 00 00       	callq  2a <internal_move_pointers_items+0x2a>
			26: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  2a:	bf 1f 00 00 00       	mov    $0x1f,%edi
  2f:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
  36:	e8 00 00 00 00       	callq  3b <internal_move_pointers_items+0x3b>
			37: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
  3b:	e8 00 00 00 00       	callq  40 <internal_move_pointers_items+0x40>
			3c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  40:	bf 07 00 00 00       	mov    $0x7,%edi
  45:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
  4c:	e8 00 00 00 00       	callq  51 <internal_move_pointers_items+0x51>
			4d: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
  51:	e8 00 00 00 00       	callq  56 <internal_move_pointers_items+0x56>
			52: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  56:	49 8b 6e 08          	mov    0x8(%r14),%rbp
  5a:	bf 1f 00 00 00       	mov    $0x1f,%edi
  5f:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
  66:	e8 00 00 00 00       	callq  6b <internal_move_pointers_items+0x6b>
			67: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
  6b:	e8 00 00 00 00       	callq  70 <internal_move_pointers_items+0x70>
			6c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  70:	bf 07 00 00 00       	mov    $0x7,%edi
  75:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
  7c:	e8 00 00 00 00       	callq  81 <internal_move_pointers_items+0x81>
			7d: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
  81:	e8 00 00 00 00       	callq  86 <internal_move_pointers_items+0x86>
			82: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  86:	4d 8b 7d 08          	mov    0x8(%r13),%r15
  8a:	bf af 00 00 00       	mov    $0xaf,%edi
  8f:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
  96:	e8 00 00 00 00       	callq  9b <internal_move_pointers_items+0x9b>
			97: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
  9b:	e8 00 00 00 00       	callq  a0 <internal_move_pointers_items+0xa0>
			9c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  a0:	bf 07 00 00 00       	mov    $0x7,%edi
  a5:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
  ac:	e8 00 00 00 00       	callq  b1 <internal_move_pointers_items+0xb1>
			ad: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
  b1:	e8 00 00 00 00       	callq  b6 <internal_move_pointers_items+0xb6>
			b2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  b6:	48 8b 5d 28          	mov    0x28(%rbp),%rbx
  ba:	bf 17 00 00 00       	mov    $0x17,%edi
  bf:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
  c6:	e8 00 00 00 00       	callq  cb <internal_move_pointers_items+0xcb>
			c7: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
  cb:	e8 00 00 00 00       	callq  d0 <internal_move_pointers_items+0xd0>
			cc: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  d0:	bf 01 00 00 00       	mov    $0x1,%edi
  d5:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
  dc:	e8 00 00 00 00       	callq  e1 <internal_move_pointers_items+0xe1>
			dd: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
  e1:	e8 00 00 00 00       	callq  e6 <internal_move_pointers_items+0xe6>
			e2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
  e6:	48 89 6c 24 18       	mov    %rbp,0x18(%rsp)
  eb:	48 85 ed             	test   %rbp,%rbp
  ee:	0f 84 d2 09 00 00    	je     ac6 <internal_move_pointers_items+0xac6>
  f4:	4d 85 ff             	test   %r15,%r15
  f7:	0f 84 c9 09 00 00    	je     ac6 <internal_move_pointers_items+0xac6>
  fd:	4c 89 7c 24 08       	mov    %r15,0x8(%rsp)
 102:	44 0f b7 7b 02       	movzwl 0x2(%rbx),%r15d
 107:	bf 02 00 00 00       	mov    $0x2,%edi
 10c:	8b 74 24 04          	mov    0x4(%rsp),%esi
 110:	e8 00 00 00 00       	callq  115 <internal_move_pointers_items+0x115>
			111: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
 115:	41 8d 5c 24 ff       	lea    -0x1(%r12),%ebx
 11a:	89 df                	mov    %ebx,%edi
 11c:	44 89 fe             	mov    %r15d,%esi
 11f:	e8 00 00 00 00       	callq  124 <internal_move_pointers_items+0x124>
			120: R_X86_64_PLT32	__sanitizer_cov_trace_cmp4-0x4
 124:	89 1c 24             	mov    %ebx,(%rsp)
 127:	44 39 fb             	cmp    %r15d,%ebx
 12a:	0f 8f cf 09 00 00    	jg     aff <internal_move_pointers_items+0xaff>
 130:	4c 89 6c 24 38       	mov    %r13,0x38(%rsp)
 135:	4c 89 74 24 50       	mov    %r14,0x50(%rsp)
 13a:	31 ff                	xor    %edi,%edi
 13c:	44 89 e6             	mov    %r12d,%esi
 13f:	e8 00 00 00 00       	callq  144 <internal_move_pointers_items+0x144>
			140: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
 144:	45 85 e4             	test   %r12d,%r12d
 147:	0f 88 e5 09 00 00    	js     b32 <internal_move_pointers_items+0xb32>
 14d:	bf af 00 00 00       	mov    $0xaf,%edi
 152:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 159:	e8 00 00 00 00       	callq  15e <internal_move_pointers_items+0x15e>
			15a: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 15e:	e8 00 00 00 00       	callq  163 <internal_move_pointers_items+0x163>
			15f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 163:	bf 07 00 00 00       	mov    $0x7,%edi
 168:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 16f:	e8 00 00 00 00       	callq  174 <internal_move_pointers_items+0x174>
			170: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 174:	e8 00 00 00 00       	callq  179 <internal_move_pointers_items+0x179>
			175: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 179:	48 8b 5c 24 08       	mov    0x8(%rsp),%rbx
 17e:	48 8b 6b 28          	mov    0x28(%rbx),%rbp
 182:	bf 17 00 00 00       	mov    $0x17,%edi
 187:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 18e:	e8 00 00 00 00       	callq  193 <internal_move_pointers_items+0x193>
			18f: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 193:	e8 00 00 00 00       	callq  198 <internal_move_pointers_items+0x198>
			194: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 198:	bf 01 00 00 00       	mov    $0x1,%edi
 19d:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 1a4:	e8 00 00 00 00       	callq  1a9 <internal_move_pointers_items+0x1a9>
			1a5: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 1a9:	e8 00 00 00 00       	callq  1ae <internal_move_pointers_items+0x1ae>
			1aa: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 1ae:	0f b7 6d 02          	movzwl 0x2(%rbp),%ebp
 1b2:	e8 00 00 00 00       	callq  1b7 <internal_move_pointers_items+0x1b7>
			1b3: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 1b7:	bf 07 00 00 00       	mov    $0x7,%edi
 1bc:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 1c3:	e8 00 00 00 00       	callq  1c8 <internal_move_pointers_items+0x1c8>
			1c4: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 1c8:	e8 00 00 00 00       	callq  1cd <internal_move_pointers_items+0x1cd>
			1c9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 1cd:	4c 8b 73 20          	mov    0x20(%rbx),%r14
 1d1:	4c 89 f3             	mov    %r14,%rbx
 1d4:	48 83 eb 18          	sub    $0x18,%rbx
 1d8:	0f 82 8c 06 00 00    	jb     86a <internal_move_pointers_items+0x86a>
 1de:	e8 00 00 00 00       	callq  1e3 <internal_move_pointers_items+0x1e3>
			1df: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 1e3:	03 2c 24             	add    (%rsp),%ebp
 1e6:	4c 63 f3             	movslq %ebx,%r14
 1e9:	4c 89 f3             	mov    %r14,%rbx
 1ec:	48 83 eb 08          	sub    $0x8,%rbx
 1f0:	0f 82 9c 06 00 00    	jb     892 <internal_move_pointers_items+0x892>
 1f6:	e8 00 00 00 00       	callq  1fb <internal_move_pointers_items+0x1fb>
			1f7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 1fb:	49 be ab aa aa aa aa 	movabs $0xaaaaaaaaaaaaaaab,%r14
 202:	aa aa aa 
 205:	48 89 d8             	mov    %rbx,%rax
 208:	49 f7 e6             	mul    %r14
 20b:	48 89 d3             	mov    %rdx,%rbx
 20e:	48 c1 eb 04          	shr    $0x4,%rbx
 212:	89 ef                	mov    %ebp,%edi
 214:	89 de                	mov    %ebx,%esi
 216:	e8 00 00 00 00       	callq  21b <internal_move_pointers_items+0x21b>
			217: R_X86_64_PLT32	__sanitizer_cov_trace_cmp4-0x4
 21b:	39 dd                	cmp    %ebx,%ebp
 21d:	0f 8f 45 09 00 00    	jg     b68 <internal_move_pointers_items+0xb68>
 223:	31 ff                	xor    %edi,%edi
 225:	44 89 e6             	mov    %r12d,%esi
 228:	e8 00 00 00 00       	callq  22d <internal_move_pointers_items+0x22d>
			229: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
 22d:	45 85 e4             	test   %r12d,%r12d
 230:	0f 84 3e 05 00 00    	je     774 <internal_move_pointers_items+0x774>
 236:	e8 00 00 00 00       	callq  23b <internal_move_pointers_items+0x23b>
			237: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 23b:	e8 00 00 00 00       	callq  240 <internal_move_pointers_items+0x240>
			23c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 240:	48 8b 6c 24 08       	mov    0x8(%rsp),%rbp
 245:	48 8b 5d 28          	mov    0x28(%rbp),%rbx
 249:	bf 17 00 00 00       	mov    $0x17,%edi
 24e:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 255:	e8 00 00 00 00       	callq  25a <internal_move_pointers_items+0x25a>
			256: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 25a:	e8 00 00 00 00       	callq  25f <internal_move_pointers_items+0x25f>
			25b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 25f:	bf 01 00 00 00       	mov    $0x1,%edi
 264:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 26b:	e8 00 00 00 00       	callq  270 <internal_move_pointers_items+0x270>
			26c: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 270:	e8 00 00 00 00       	callq  275 <internal_move_pointers_items+0x275>
			271: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 275:	48 89 5c 24 20       	mov    %rbx,0x20(%rsp)
 27a:	44 0f b7 73 02       	movzwl 0x2(%rbx),%r14d
 27f:	bf 01 00 00 00       	mov    $0x1,%edi
 284:	8b 5c 24 04          	mov    0x4(%rsp),%ebx
 288:	89 de                	mov    %ebx,%esi
 28a:	e8 00 00 00 00       	callq  28f <internal_move_pointers_items+0x28f>
			28b: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
 28f:	45 29 e7             	sub    %r12d,%r15d
 292:	41 83 c7 01          	add    $0x1,%r15d
 296:	83 fb 01             	cmp    $0x1,%ebx
 299:	45 89 f5             	mov    %r14d,%r13d
 29c:	b8 00 00 00 00       	mov    $0x0,%eax
 2a1:	44 0f 44 e8          	cmove  %eax,%r13d
 2a5:	44 0f 45 f8          	cmovne %eax,%r15d
 2a9:	e8 00 00 00 00       	callq  2ae <internal_move_pointers_items+0x2ae>
			2aa: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 2ae:	e8 00 00 00 00       	callq  2b3 <internal_move_pointers_items+0x2b3>
			2af: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 2b3:	48 8b 5d 28          	mov    0x28(%rbp),%rbx
 2b7:	e8 00 00 00 00       	callq  2bc <internal_move_pointers_items+0x2bc>
			2b8: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 2bc:	e8 00 00 00 00       	callq  2c1 <internal_move_pointers_items+0x2c1>
			2bd: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 2c1:	48 8b 6d 28          	mov    0x28(%rbp),%rbp
 2c5:	bf 17 00 00 00       	mov    $0x17,%edi
 2ca:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 2d1:	e8 00 00 00 00       	callq  2d6 <internal_move_pointers_items+0x2d6>
			2d2: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 2d6:	e8 00 00 00 00       	callq  2db <internal_move_pointers_items+0x2db>
			2d7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 2db:	bf 01 00 00 00       	mov    $0x1,%edi
 2e0:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 2e7:	e8 00 00 00 00       	callq  2ec <internal_move_pointers_items+0x2ec>
			2e8: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 2ec:	e8 00 00 00 00       	callq  2f1 <internal_move_pointers_items+0x2f1>
			2ed: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 2f1:	0f b7 45 02          	movzwl 0x2(%rbp),%eax
 2f5:	48 c1 e0 04          	shl    $0x4,%rax
 2f9:	48 01 d8             	add    %rbx,%rax
 2fc:	4a 8d 0c e8          	lea    (%rax,%r13,8),%rcx
 300:	4a 8d 04 e8          	lea    (%rax,%r13,8),%rax
 304:	48 83 c0 18          	add    $0x18,%rax
 308:	48 89 44 24 10       	mov    %rax,0x10(%rsp)
 30d:	4c 89 64 24 28       	mov    %r12,0x28(%rsp)
 312:	44 89 e0             	mov    %r12d,%eax
 315:	48 89 44 24 60       	mov    %rax,0x60(%rsp)
 31a:	48 8d 2c c1          	lea    (%rcx,%rax,8),%rbp
 31e:	48 83 c5 18          	add    $0x18,%rbp
 322:	4c 89 74 24 48       	mov    %r14,0x48(%rsp)
 327:	4d 89 f4             	mov    %r14,%r12
 32a:	4d 29 ec             	sub    %r13,%r12
 32d:	b9 08 00 00 00       	mov    $0x8,%ecx
 332:	4c 89 e0             	mov    %r12,%rax
 335:	48 f7 e1             	mul    %rcx
 338:	48 89 c3             	mov    %rax,%rbx
 33b:	0f 80 79 05 00 00    	jo     8ba <internal_move_pointers_items+0x8ba>
 341:	e8 00 00 00 00       	callq  346 <internal_move_pointers_items+0x346>
			342: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 346:	48 89 ef             	mov    %rbp,%rdi
 349:	48 8b 74 24 10       	mov    0x10(%rsp),%rsi
 34e:	48 89 da             	mov    %rbx,%rdx
 351:	e8 00 00 00 00       	callq  356 <internal_move_pointers_items+0x356>
			352: R_X86_64_PLT32	memmove-0x4
 356:	e8 00 00 00 00       	callq  35b <internal_move_pointers_items+0x35b>
			357: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 35b:	e8 00 00 00 00       	callq  360 <internal_move_pointers_items+0x360>
			35c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 360:	48 8b 6c 24 18       	mov    0x18(%rsp),%rbp
 365:	48 8b 5d 28          	mov    0x28(%rbp),%rbx
 369:	e8 00 00 00 00       	callq  36e <internal_move_pointers_items+0x36e>
			36a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 36e:	e8 00 00 00 00       	callq  373 <internal_move_pointers_items+0x373>
			36f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 373:	48 8b 6d 28          	mov    0x28(%rbp),%rbp
 377:	bf 17 00 00 00       	mov    $0x17,%edi
 37c:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 383:	e8 00 00 00 00       	callq  388 <internal_move_pointers_items+0x388>
			384: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 388:	e8 00 00 00 00       	callq  38d <internal_move_pointers_items+0x38d>
			389: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 38d:	bf 01 00 00 00       	mov    $0x1,%edi
 392:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 399:	e8 00 00 00 00       	callq  39e <internal_move_pointers_items+0x39e>
			39a: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 39e:	e8 00 00 00 00       	callq  3a3 <internal_move_pointers_items+0x3a3>
			39f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 3a3:	0f b7 45 02          	movzwl 0x2(%rbp),%eax
 3a7:	48 c1 e0 04          	shl    $0x4,%rax
 3ab:	48 8d 2c 03          	lea    (%rbx,%rax,1),%rbp
 3af:	48 83 c5 18          	add    $0x18,%rbp
 3b3:	49 63 df             	movslq %r15d,%rbx
 3b6:	b9 08 00 00 00       	mov    $0x8,%ecx
 3bb:	48 89 d8             	mov    %rbx,%rax
 3be:	48 f7 e1             	mul    %rcx
 3c1:	49 89 c6             	mov    %rax,%r14
 3c4:	48 89 5c 24 40       	mov    %rbx,0x40(%rsp)
 3c9:	0f 80 13 05 00 00    	jo     8e2 <internal_move_pointers_items+0x8e2>
 3cf:	e8 00 00 00 00       	callq  3d4 <internal_move_pointers_items+0x3d4>
			3d0: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 3d4:	4c 01 f5             	add    %r14,%rbp
 3d7:	48 8b 5c 24 60       	mov    0x60(%rsp),%rbx
 3dc:	48 8d 14 dd 00 00 00 	lea    0x0(,%rbx,8),%rdx
 3e3:	00 
 3e4:	48 8b 7c 24 10       	mov    0x10(%rsp),%rdi
 3e9:	48 89 ee             	mov    %rbp,%rsi
 3ec:	48 89 54 24 10       	mov    %rdx,0x10(%rsp)
 3f1:	e8 00 00 00 00       	callq  3f6 <internal_move_pointers_items+0x3f6>
			3f2: R_X86_64_PLT32	memcpy-0x4
 3f6:	e8 00 00 00 00       	callq  3fb <internal_move_pointers_items+0x3fb>
			3f7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 3fb:	e8 00 00 00 00       	callq  400 <internal_move_pointers_items+0x400>
			3fc: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 400:	48 8b 44 24 08       	mov    0x8(%rsp),%rax
 405:	4c 8b 78 28          	mov    0x28(%rax),%r15
 409:	44 89 ed             	mov    %r13d,%ebp
 40c:	48 c1 e5 04          	shl    $0x4,%rbp
 410:	b9 10 00 00 00       	mov    $0x10,%ecx
 415:	4c 89 e0             	mov    %r12,%rax
 418:	48 f7 e1             	mul    %rcx
 41b:	48 89 44 24 58       	mov    %rax,0x58(%rsp)
 420:	0f 80 e4 04 00 00    	jo     90a <internal_move_pointers_items+0x90a>
 426:	e8 00 00 00 00       	callq  42b <internal_move_pointers_items+0x42b>
			427: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 42b:	48 8b 44 24 48       	mov    0x48(%rsp),%rax
 430:	4d 8d 34 2f          	lea    (%r15,%rbp,1),%r14
 434:	48 c1 e3 04          	shl    $0x4,%rbx
 438:	49 89 dd             	mov    %rbx,%r13
 43b:	03 44 24 28          	add    0x28(%rsp),%eax
 43f:	48 63 d8             	movslq %eax,%rbx
 442:	b9 08 00 00 00       	mov    $0x8,%ecx
 447:	48 89 d8             	mov    %rbx,%rax
 44a:	48 f7 e1             	mul    %rcx
 44d:	49 89 c4             	mov    %rax,%r12
 450:	0f 80 dc 04 00 00    	jo     932 <internal_move_pointers_items+0x932>
 456:	e8 00 00 00 00       	callq  45b <internal_move_pointers_items+0x45b>
			457: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 45b:	49 01 ef             	add    %rbp,%r15
 45e:	49 83 c7 18          	add    $0x18,%r15
 462:	4d 01 ee             	add    %r13,%r14
 465:	49 83 c6 08          	add    $0x8,%r14
 469:	48 8b 6c 24 58       	mov    0x58(%rsp),%rbp
 46e:	48 89 eb             	mov    %rbp,%rbx
 471:	4c 01 e3             	add    %r12,%rbx
 474:	0f 82 e0 04 00 00    	jb     95a <internal_move_pointers_items+0x95a>
 47a:	e8 00 00 00 00       	callq  47f <internal_move_pointers_items+0x47f>
			47b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 47f:	48 8b 6c 24 40       	mov    0x40(%rsp),%rbp
 484:	4c 89 f7             	mov    %r14,%rdi
 487:	4c 89 fe             	mov    %r15,%rsi
 48a:	48 89 da             	mov    %rbx,%rdx
 48d:	e8 00 00 00 00       	callq  492 <internal_move_pointers_items+0x492>
			48e: R_X86_64_PLT32	memmove-0x4
 492:	e8 00 00 00 00       	callq  497 <internal_move_pointers_items+0x497>
			493: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 497:	e8 00 00 00 00       	callq  49c <internal_move_pointers_items+0x49c>
			498: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 49c:	48 8b 44 24 18       	mov    0x18(%rsp),%rax
 4a1:	48 8b 40 28          	mov    0x28(%rax),%rax
 4a5:	48 c1 e5 04          	shl    $0x4,%rbp
 4a9:	48 8d 1c 28          	lea    (%rax,%rbp,1),%rbx
 4ad:	48 83 c3 18          	add    $0x18,%rbx
 4b1:	4c 63 24 24          	movslq (%rsp),%r12
 4b5:	b9 10 00 00 00       	mov    $0x10,%ecx
 4ba:	4c 89 e0             	mov    %r12,%rax
 4bd:	48 f7 e1             	mul    %rcx
 4c0:	48 89 c5             	mov    %rax,%rbp
 4c3:	41 0f 90 c5          	seto   %r13b
 4c7:	0f 80 b3 04 00 00    	jo     980 <internal_move_pointers_items+0x980>
 4cd:	e8 00 00 00 00       	callq  4d2 <internal_move_pointers_items+0x4d2>
			4ce: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 4d2:	4c 8b 74 24 38       	mov    0x38(%rsp),%r14
 4d7:	4c 89 ff             	mov    %r15,%rdi
 4da:	48 89 de             	mov    %rbx,%rsi
 4dd:	49 89 ef             	mov    %rbp,%r15
 4e0:	48 89 ea             	mov    %rbp,%rdx
 4e3:	e8 00 00 00 00       	callq  4e8 <internal_move_pointers_items+0x4e8>
			4e4: R_X86_64_PLT32	memcpy-0x4
 4e8:	e8 00 00 00 00       	callq  4ed <internal_move_pointers_items+0x4ed>
			4e9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 4ed:	e8 00 00 00 00       	callq  4f2 <internal_move_pointers_items+0x4f2>
			4ee: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 4f2:	8b 1c 24             	mov    (%rsp),%ebx
 4f5:	48 8b 6c 24 20       	mov    0x20(%rsp),%rbp
 4fa:	66 03 5d 02          	add    0x2(%rbp),%bx
 4fe:	e8 00 00 00 00       	callq  503 <internal_move_pointers_items+0x503>
			4ff: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 503:	e8 00 00 00 00       	callq  508 <internal_move_pointers_items+0x508>
			504: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 508:	66 89 5d 02          	mov    %bx,0x2(%rbp)
 50c:	e8 00 00 00 00       	callq  511 <internal_move_pointers_items+0x511>
			50d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 511:	bf 01 00 00 00       	mov    $0x1,%edi
 516:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 51d:	e8 00 00 00 00       	callq  522 <internal_move_pointers_items+0x522>
			51e: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 522:	e8 00 00 00 00       	callq  527 <internal_move_pointers_items+0x527>
			523: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 527:	0f b7 5d 04          	movzwl 0x4(%rbp),%ebx
 52b:	45 84 ed             	test   %r13b,%r13b
 52e:	4c 89 64 24 18       	mov    %r12,0x18(%rsp)
 533:	0f 85 6f 04 00 00    	jne    9a8 <internal_move_pointers_items+0x9a8>
 539:	e8 00 00 00 00       	callq  53e <internal_move_pointers_items+0x53e>
			53a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 53e:	4d 89 fc             	mov    %r15,%r12
 541:	4c 03 64 24 10       	add    0x10(%rsp),%r12
 546:	0f 92 04 24          	setb   (%rsp)
 54a:	0f 82 80 04 00 00    	jb     9d0 <internal_move_pointers_items+0x9d0>
 550:	e8 00 00 00 00       	callq  555 <internal_move_pointers_items+0x555>
			551: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 555:	48 89 dd             	mov    %rbx,%rbp
 558:	4c 29 e5             	sub    %r12,%rbp
 55b:	0f 82 9a 04 00 00    	jb     9fb <internal_move_pointers_items+0x9fb>
 561:	e8 00 00 00 00       	callq  566 <internal_move_pointers_items+0x566>
			562: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 566:	e8 00 00 00 00       	callq  56b <internal_move_pointers_items+0x56b>
			567: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 56b:	e8 00 00 00 00       	callq  570 <internal_move_pointers_items+0x570>
			56c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 570:	48 8b 44 24 20       	mov    0x20(%rsp),%rax
 575:	66 89 68 04          	mov    %bp,0x4(%rax)
 579:	e8 00 00 00 00       	callq  57e <internal_move_pointers_items+0x57e>
			57a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 57e:	49 8b 3e             	mov    (%r14),%rdi
 581:	48 8b 5c 24 08       	mov    0x8(%rsp),%rbx
 586:	48 89 de             	mov    %rbx,%rsi
 589:	31 d2                	xor    %edx,%edx
 58b:	e8 00 00 00 00       	callq  590 <internal_move_pointers_items+0x590>
			58c: R_X86_64_PLT32	do_balance_mark_leaf_dirty-0x4
 590:	48 89 df             	mov    %rbx,%rdi
 593:	e8 00 00 00 00       	callq  598 <internal_move_pointers_items+0x598>
			594: R_X86_64_PLT32	check_internal-0x4
 598:	e8 00 00 00 00       	callq  59d <internal_move_pointers_items+0x59d>
			599: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 59d:	bf 07 00 00 00       	mov    $0x7,%edi
 5a2:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 5a9:	e8 00 00 00 00       	callq  5ae <internal_move_pointers_items+0x5ae>
			5aa: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 5ae:	e8 00 00 00 00       	callq  5b3 <internal_move_pointers_items+0x5b3>
			5af: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 5b3:	49 83 7e 10 00       	cmpq   $0x0,0x10(%r14)
 5b8:	0f 84 bd 01 00 00    	je     77b <internal_move_pointers_items+0x77b>
 5be:	44 88 6c 24 08       	mov    %r13b,0x8(%rsp)
 5c3:	4c 89 7c 24 20       	mov    %r15,0x20(%rsp)
 5c8:	e8 00 00 00 00       	callq  5cd <internal_move_pointers_items+0x5cd>
			5c9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 5cd:	e8 00 00 00 00       	callq  5d2 <internal_move_pointers_items+0x5d2>
			5ce: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 5d2:	49 8b 5e 10          	mov    0x10(%r14),%rbx
 5d6:	bf af 00 00 00       	mov    $0xaf,%edi
 5db:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 5e2:	e8 00 00 00 00       	callq  5e7 <internal_move_pointers_items+0x5e7>
			5e3: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 5e7:	e8 00 00 00 00       	callq  5ec <internal_move_pointers_items+0x5ec>
			5e8: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 5ec:	bf 07 00 00 00       	mov    $0x7,%edi
 5f1:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 5f8:	e8 00 00 00 00       	callq  5fd <internal_move_pointers_items+0x5fd>
			5f9: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 5fd:	e8 00 00 00 00       	callq  602 <internal_move_pointers_items+0x602>
			5fe: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 602:	48 8b 6b 28          	mov    0x28(%rbx),%rbp
 606:	e8 00 00 00 00       	callq  60b <internal_move_pointers_items+0x60b>
			607: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 60b:	e8 00 00 00 00       	callq  610 <internal_move_pointers_items+0x610>
			60c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 610:	49 8b 5e 10          	mov    0x10(%r14),%rbx
 614:	bf af 00 00 00       	mov    $0xaf,%edi
 619:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 620:	e8 00 00 00 00       	callq  625 <internal_move_pointers_items+0x625>
			621: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 625:	e8 00 00 00 00       	callq  62a <internal_move_pointers_items+0x62a>
			626: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 62a:	bf 07 00 00 00       	mov    $0x7,%edi
 62f:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 636:	e8 00 00 00 00       	callq  63b <internal_move_pointers_items+0x63b>
			637: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 63b:	e8 00 00 00 00       	callq  640 <internal_move_pointers_items+0x640>
			63c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 640:	48 8b 5b 28          	mov    0x28(%rbx),%rbx
 644:	bf 17 00 00 00       	mov    $0x17,%edi
 649:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 650:	e8 00 00 00 00       	callq  655 <internal_move_pointers_items+0x655>
			651: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 655:	e8 00 00 00 00       	callq  65a <internal_move_pointers_items+0x65a>
			656: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 65a:	bf 01 00 00 00       	mov    $0x1,%edi
 65f:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 666:	e8 00 00 00 00       	callq  66b <internal_move_pointers_items+0x66b>
			667: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 66b:	e8 00 00 00 00       	callq  670 <internal_move_pointers_items+0x670>
			66c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 670:	0f b7 43 02          	movzwl 0x2(%rbx),%eax
 674:	48 c1 e0 04          	shl    $0x4,%rax
 678:	4c 8d 2c 28          	lea    (%rax,%rbp,1),%r13
 67c:	49 83 c5 18          	add    $0x18,%r13
 680:	e8 00 00 00 00       	callq  685 <internal_move_pointers_items+0x685>
			681: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 685:	bf 03 00 00 00       	mov    $0x3,%edi
 68a:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 691:	e8 00 00 00 00       	callq  696 <internal_move_pointers_items+0x696>
			692: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 696:	e8 00 00 00 00       	callq  69b <internal_move_pointers_items+0x69b>
			697: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 69b:	49 63 6e 18          	movslq 0x18(%r14),%rbp
 69f:	b9 08 00 00 00       	mov    $0x8,%ecx
 6a4:	48 89 e8             	mov    %rbp,%rax
 6a7:	48 f7 e1             	mul    %rcx
 6aa:	49 89 c6             	mov    %rax,%r14
 6ad:	0f 80 6e 03 00 00    	jo     a21 <internal_move_pointers_items+0xa21>
 6b3:	e8 00 00 00 00       	callq  6b8 <internal_move_pointers_items+0x6b8>
			6b4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 6b8:	8a 1c 24             	mov    (%rsp),%bl
 6bb:	bf 07 00 00 00       	mov    $0x7,%edi
 6c0:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 6c7:	e8 00 00 00 00       	callq  6cc <internal_move_pointers_items+0x6cc>
			6c8: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 6cc:	e8 00 00 00 00       	callq  6d1 <internal_move_pointers_items+0x6d1>
			6cd: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 6d1:	bf 01 00 00 00       	mov    $0x1,%edi
 6d6:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 6dd:	e8 00 00 00 00       	callq  6e2 <internal_move_pointers_items+0x6e2>
			6de: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 6e2:	e8 00 00 00 00       	callq  6e7 <internal_move_pointers_items+0x6e7>
			6e3: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 6e7:	43 0f b7 6c 35 04    	movzwl 0x4(%r13,%r14,1),%ebp
 6ed:	80 7c 24 08 00       	cmpb   $0x0,0x8(%rsp)
 6f2:	0f 85 51 03 00 00    	jne    a49 <internal_move_pointers_items+0xa49>
 6f8:	e8 00 00 00 00       	callq  6fd <internal_move_pointers_items+0x6fd>
			6f9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 6fd:	84 db                	test   %bl,%bl
 6ff:	0f 85 71 03 00 00    	jne    a76 <internal_move_pointers_items+0xa76>
 705:	e8 00 00 00 00       	callq  70a <internal_move_pointers_items+0x70a>
			706: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 70a:	48 89 eb             	mov    %rbp,%rbx
 70d:	4c 01 e3             	add    %r12,%rbx
 710:	0f 82 8a 03 00 00    	jb     aa0 <internal_move_pointers_items+0xaa0>
 716:	e8 00 00 00 00       	callq  71b <internal_move_pointers_items+0x71b>
			717: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 71b:	4c 8b 64 24 28       	mov    0x28(%rsp),%r12
 720:	48 8b 6c 24 30       	mov    0x30(%rsp),%rbp
 725:	e8 00 00 00 00       	callq  72a <internal_move_pointers_items+0x72a>
			726: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 72a:	e8 00 00 00 00       	callq  72f <internal_move_pointers_items+0x72f>
			72b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 72f:	66 43 89 5c 35 04    	mov    %bx,0x4(%r13,%r14,1)
 735:	e8 00 00 00 00       	callq  73a <internal_move_pointers_items+0x73a>
			736: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 73a:	e8 00 00 00 00       	callq  73f <internal_move_pointers_items+0x73f>
			73b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 73f:	48 8b 5c 24 38       	mov    0x38(%rsp),%rbx
 744:	4c 8b 33             	mov    (%rbx),%r14
 747:	e8 00 00 00 00       	callq  74c <internal_move_pointers_items+0x74c>
			748: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 74c:	e8 00 00 00 00       	callq  751 <internal_move_pointers_items+0x751>
			74d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 751:	48 8b 73 10          	mov    0x10(%rbx),%rsi
 755:	4c 89 f7             	mov    %r14,%rdi
 758:	31 d2                	xor    %edx,%edx
 75a:	e8 00 00 00 00       	callq  75f <internal_move_pointers_items+0x75f>
			75b: R_X86_64_PLT32	do_balance_mark_leaf_dirty-0x4
 75f:	e8 00 00 00 00       	callq  764 <internal_move_pointers_items+0x764>
			760: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 764:	e8 00 00 00 00       	callq  769 <internal_move_pointers_items+0x769>
			765: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 769:	48 8b 7b 10          	mov    0x10(%rbx),%rdi
 76d:	e8 00 00 00 00       	callq  772 <internal_move_pointers_items+0x772>
			76e: R_X86_64_PLT32	check_internal-0x4
 772:	eb 16                	jmp    78a <internal_move_pointers_items+0x78a>
 774:	e8 00 00 00 00       	callq  779 <internal_move_pointers_items+0x779>
			775: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 779:	eb 0a                	jmp    785 <internal_move_pointers_items+0x785>
 77b:	e8 00 00 00 00       	callq  780 <internal_move_pointers_items+0x780>
			77c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 780:	4c 8b 64 24 28       	mov    0x28(%rsp),%r12
 785:	48 8b 6c 24 30       	mov    0x30(%rsp),%rbp
 78a:	8b 5c 24 04          	mov    0x4(%rsp),%ebx
 78e:	31 ff                	xor    %edi,%edi
 790:	89 de                	mov    %ebx,%esi
 792:	e8 00 00 00 00       	callq  797 <internal_move_pointers_items+0x797>
			793: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp4-0x4
 797:	45 89 e7             	mov    %r12d,%r15d
 79a:	41 29 ef             	sub    %ebp,%r15d
 79d:	85 db                	test   %ebx,%ebx
 79f:	0f 84 a1 00 00 00    	je     846 <internal_move_pointers_items+0x846>
 7a5:	e8 00 00 00 00       	callq  7aa <internal_move_pointers_items+0x7aa>
			7a6: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 7aa:	e8 00 00 00 00       	callq  7af <internal_move_pointers_items+0x7af>
			7ab: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 7af:	4c 8b 6c 24 50       	mov    0x50(%rsp),%r13
 7b4:	49 89 ee             	mov    %rbp,%r14
 7b7:	49 8b 6d 08          	mov    0x8(%r13),%rbp
 7bb:	bf af 00 00 00       	mov    $0xaf,%edi
 7c0:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 7c7:	e8 00 00 00 00       	callq  7cc <internal_move_pointers_items+0x7cc>
			7c8: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 7cc:	e8 00 00 00 00       	callq  7d1 <internal_move_pointers_items+0x7d1>
			7cd: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 7d1:	bf 07 00 00 00       	mov    $0x7,%edi
 7d6:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 7dd:	e8 00 00 00 00       	callq  7e2 <internal_move_pointers_items+0x7e2>
			7de: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 7e2:	e8 00 00 00 00       	callq  7e7 <internal_move_pointers_items+0x7e7>
			7e3: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 7e7:	48 8b 6d 28          	mov    0x28(%rbp),%rbp
 7eb:	bf 17 00 00 00       	mov    $0x17,%edi
 7f0:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 7f7:	e8 00 00 00 00       	callq  7fc <internal_move_pointers_items+0x7fc>
			7f8: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 7fc:	e8 00 00 00 00       	callq  801 <internal_move_pointers_items+0x801>
			7fd: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 801:	bf 01 00 00 00       	mov    $0x1,%edi
 806:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 80d:	e8 00 00 00 00       	callq  812 <internal_move_pointers_items+0x812>
			80e: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 812:	e8 00 00 00 00       	callq  817 <internal_move_pointers_items+0x817>
			813: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 817:	0f b7 5d 02          	movzwl 0x2(%rbp),%ebx
 81b:	8d 6b 01             	lea    0x1(%rbx),%ebp
 81e:	44 89 ff             	mov    %r15d,%edi
 821:	89 ee                	mov    %ebp,%esi
 823:	e8 00 00 00 00       	callq  828 <internal_move_pointers_items+0x828>
			824: R_X86_64_PLT32	__sanitizer_cov_trace_cmp4-0x4
 828:	45 29 e6             	sub    %r12d,%r14d
 82b:	41 8d 14 1e          	lea    (%r14,%rbx,1),%edx
 82f:	41 39 ef             	cmp    %ebp,%r15d
 832:	b8 00 00 00 00       	mov    $0x0,%eax
 837:	0f 44 d0             	cmove  %eax,%edx
 83a:	42 8d 34 33          	lea    (%rbx,%r14,1),%esi
 83e:	83 c6 01             	add    $0x1,%esi
 841:	4c 89 ef             	mov    %r13,%rdi
 844:	eb 0e                	jmp    854 <internal_move_pointers_items+0x854>
 846:	e8 00 00 00 00       	callq  84b <internal_move_pointers_items+0x84b>
			847: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 84b:	48 8b 7c 24 50       	mov    0x50(%rsp),%rdi
 850:	31 f6                	xor    %esi,%esi
 852:	31 d2                	xor    %edx,%edx
 854:	44 89 f9             	mov    %r15d,%ecx
 857:	48 83 c4 68          	add    $0x68,%rsp
 85b:	5b                   	pop    %rbx
 85c:	41 5c                	pop    %r12
 85e:	41 5d                	pop    %r13
 860:	41 5e                	pop    %r14
 862:	41 5f                	pop    %r15
 864:	5d                   	pop    %rbp
 865:	e9 00 00 00 00       	jmpq   86a <internal_move_pointers_items+0x86a>
			866: R_X86_64_PLT32	.text.internal_delete_pointers_items-0x4
 86a:	e8 00 00 00 00       	callq  86f <internal_move_pointers_items+0x86f>
			86b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 86f:	e8 00 00 00 00       	callq  874 <internal_move_pointers_items+0x874>
			870: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 874:	ba 18 00 00 00       	mov    $0x18,%edx
 879:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			87c: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1209
 880:	4c 89 f6             	mov    %r14,%rsi
 883:	b9 2d 00 00 00       	mov    $0x2d,%ecx
 888:	e8 00 00 00 00       	callq  88d <internal_move_pointers_items+0x88d>
			889: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 88d:	e9 51 f9 ff ff       	jmpq   1e3 <internal_move_pointers_items+0x1e3>
 892:	e8 00 00 00 00       	callq  897 <internal_move_pointers_items+0x897>
			893: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 897:	e8 00 00 00 00       	callq  89c <internal_move_pointers_items+0x89c>
			898: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 89c:	ba 08 00 00 00       	mov    $0x8,%edx
 8a1:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			8a4: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1210
 8a8:	4c 89 f6             	mov    %r14,%rsi
 8ab:	b9 2d 00 00 00       	mov    $0x2d,%ecx
 8b0:	e8 00 00 00 00       	callq  8b5 <internal_move_pointers_items+0x8b5>
			8b1: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 8b5:	e9 41 f9 ff ff       	jmpq   1fb <internal_move_pointers_items+0x1fb>
 8ba:	e8 00 00 00 00       	callq  8bf <internal_move_pointers_items+0x8bf>
			8bb: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 8bf:	e8 00 00 00 00       	callq  8c4 <internal_move_pointers_items+0x8c4>
			8c0: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 8c4:	ba 08 00 00 00       	mov    $0x8,%edx
 8c9:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			8cc: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1229
 8d0:	4c 89 e6             	mov    %r12,%rsi
 8d3:	b9 2a 00 00 00       	mov    $0x2a,%ecx
 8d8:	e8 00 00 00 00       	callq  8dd <internal_move_pointers_items+0x8dd>
			8d9: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 8dd:	e9 64 fa ff ff       	jmpq   346 <internal_move_pointers_items+0x346>
 8e2:	e8 00 00 00 00       	callq  8e7 <internal_move_pointers_items+0x8e7>
			8e3: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 8e7:	e8 00 00 00 00       	callq  8ec <internal_move_pointers_items+0x8ec>
			8e8: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 8ec:	be 08 00 00 00       	mov    $0x8,%esi
 8f1:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			8f4: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1236
 8f8:	48 89 da             	mov    %rbx,%rdx
 8fb:	b9 2a 00 00 00       	mov    $0x2a,%ecx
 900:	e8 00 00 00 00       	callq  905 <internal_move_pointers_items+0x905>
			901: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 905:	e9 ca fa ff ff       	jmpq   3d4 <internal_move_pointers_items+0x3d4>
 90a:	e8 00 00 00 00       	callq  90f <internal_move_pointers_items+0x90f>
			90b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 90f:	e8 00 00 00 00       	callq  914 <internal_move_pointers_items+0x914>
			910: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 914:	be 10 00 00 00       	mov    $0x10,%esi
 919:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			91c: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1237
 920:	4c 89 e2             	mov    %r12,%rdx
 923:	b9 2a 00 00 00       	mov    $0x2a,%ecx
 928:	e8 00 00 00 00       	callq  92d <internal_move_pointers_items+0x92d>
			929: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 92d:	e9 f9 fa ff ff       	jmpq   42b <internal_move_pointers_items+0x42b>
 932:	e8 00 00 00 00       	callq  937 <internal_move_pointers_items+0x937>
			933: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 937:	e8 00 00 00 00       	callq  93c <internal_move_pointers_items+0x93c>
			938: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 93c:	be 08 00 00 00       	mov    $0x8,%esi
 941:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			944: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1238
 948:	48 89 da             	mov    %rbx,%rdx
 94b:	b9 2a 00 00 00       	mov    $0x2a,%ecx
 950:	e8 00 00 00 00       	callq  955 <internal_move_pointers_items+0x955>
			951: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 955:	e9 01 fb ff ff       	jmpq   45b <internal_move_pointers_items+0x45b>
 95a:	e8 00 00 00 00       	callq  95f <internal_move_pointers_items+0x95f>
			95b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 95f:	e8 00 00 00 00       	callq  964 <internal_move_pointers_items+0x964>
			960: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 964:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			967: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1239
 96b:	48 89 ee             	mov    %rbp,%rsi
 96e:	4c 89 e2             	mov    %r12,%rdx
 971:	b9 2b 00 00 00       	mov    $0x2b,%ecx
 976:	e8 00 00 00 00       	callq  97b <internal_move_pointers_items+0x97b>
			977: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 97b:	e9 ff fa ff ff       	jmpq   47f <internal_move_pointers_items+0x47f>
 980:	e8 00 00 00 00       	callq  985 <internal_move_pointers_items+0x985>
			981: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 985:	e8 00 00 00 00       	callq  98a <internal_move_pointers_items+0x98a>
			986: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 98a:	be 10 00 00 00       	mov    $0x10,%esi
 98f:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			992: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1240
 996:	4c 89 e2             	mov    %r12,%rdx
 999:	b9 2a 00 00 00       	mov    $0x2a,%ecx
 99e:	e8 00 00 00 00       	callq  9a3 <internal_move_pointers_items+0x9a3>
			99f: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 9a3:	e9 2a fb ff ff       	jmpq   4d2 <internal_move_pointers_items+0x4d2>
 9a8:	e8 00 00 00 00       	callq  9ad <internal_move_pointers_items+0x9ad>
			9a9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 9ad:	e8 00 00 00 00       	callq  9b2 <internal_move_pointers_items+0x9b2>
			9ae: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 9b2:	be 10 00 00 00       	mov    $0x10,%esi
 9b7:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			9ba: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1247
 9be:	4c 89 e2             	mov    %r12,%rdx
 9c1:	b9 2a 00 00 00       	mov    $0x2a,%ecx
 9c6:	e8 00 00 00 00       	callq  9cb <internal_move_pointers_items+0x9cb>
			9c7: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 9cb:	e9 6e fb ff ff       	jmpq   53e <internal_move_pointers_items+0x53e>
 9d0:	4c 89 fd             	mov    %r15,%rbp
 9d3:	e8 00 00 00 00       	callq  9d8 <internal_move_pointers_items+0x9d8>
			9d4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 9d8:	e8 00 00 00 00       	callq  9dd <internal_move_pointers_items+0x9dd>
			9d9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 9dd:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			9e0: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1248
 9e4:	4c 89 fe             	mov    %r15,%rsi
 9e7:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
 9ec:	b9 2b 00 00 00       	mov    $0x2b,%ecx
 9f1:	e8 00 00 00 00       	callq  9f6 <internal_move_pointers_items+0x9f6>
			9f2: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 9f6:	e9 5a fb ff ff       	jmpq   555 <internal_move_pointers_items+0x555>
 9fb:	e8 00 00 00 00       	callq  a00 <internal_move_pointers_items+0xa00>
			9fc: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 a00:	e8 00 00 00 00       	callq  a05 <internal_move_pointers_items+0xa05>
			a01: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 a05:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			a08: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1249
 a0c:	48 89 de             	mov    %rbx,%rsi
 a0f:	4c 89 e2             	mov    %r12,%rdx
 a12:	b9 2d 00 00 00       	mov    $0x2d,%ecx
 a17:	e8 00 00 00 00       	callq  a1c <internal_move_pointers_items+0xa1c>
			a18: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 a1c:	e9 45 fb ff ff       	jmpq   566 <internal_move_pointers_items+0x566>
 a21:	e8 00 00 00 00       	callq  a26 <internal_move_pointers_items+0xa26>
			a22: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 a26:	e8 00 00 00 00       	callq  a2b <internal_move_pointers_items+0xa2b>
			a27: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 a2b:	be 08 00 00 00       	mov    $0x8,%esi
 a30:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			a33: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1268
 a37:	48 89 ea             	mov    %rbp,%rdx
 a3a:	b9 2a 00 00 00       	mov    $0x2a,%ecx
 a3f:	e8 00 00 00 00       	callq  a44 <internal_move_pointers_items+0xa44>
			a40: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 a44:	e9 6f fc ff ff       	jmpq   6b8 <internal_move_pointers_items+0x6b8>
 a49:	e8 00 00 00 00       	callq  a4e <internal_move_pointers_items+0xa4e>
			a4a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 a4e:	e8 00 00 00 00       	callq  a53 <internal_move_pointers_items+0xa53>
			a4f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 a53:	be 10 00 00 00       	mov    $0x10,%esi
 a58:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			a5b: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1271
 a5f:	48 8b 54 24 18       	mov    0x18(%rsp),%rdx
 a64:	b9 2a 00 00 00       	mov    $0x2a,%ecx
 a69:	e8 00 00 00 00       	callq  a6e <internal_move_pointers_items+0xa6e>
			a6a: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 a6e:	84 db                	test   %bl,%bl
 a70:	0f 84 8f fc ff ff    	je     705 <internal_move_pointers_items+0x705>
 a76:	e8 00 00 00 00       	callq  a7b <internal_move_pointers_items+0xa7b>
			a77: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 a7b:	e8 00 00 00 00       	callq  a80 <internal_move_pointers_items+0xa80>
			a7c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 a80:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			a83: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1272
 a87:	48 8b 74 24 20       	mov    0x20(%rsp),%rsi
 a8c:	48 8b 54 24 10       	mov    0x10(%rsp),%rdx
 a91:	b9 2b 00 00 00       	mov    $0x2b,%ecx
 a96:	e8 00 00 00 00       	callq  a9b <internal_move_pointers_items+0xa9b>
			a97: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 a9b:	e9 6a fc ff ff       	jmpq   70a <internal_move_pointers_items+0x70a>
 aa0:	e8 00 00 00 00       	callq  aa5 <internal_move_pointers_items+0xaa5>
			aa1: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 aa5:	e8 00 00 00 00       	callq  aaa <internal_move_pointers_items+0xaaa>
			aa6: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 aaa:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			aad: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1273
 ab1:	48 89 ee             	mov    %rbp,%rsi
 ab4:	4c 89 e2             	mov    %r12,%rdx
 ab7:	b9 2b 00 00 00       	mov    $0x2b,%ecx
 abc:	e8 00 00 00 00       	callq  ac1 <internal_move_pointers_items+0xac1>
			abd: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 ac1:	e9 55 fc ff ff       	jmpq   71b <internal_move_pointers_items+0x71b>
 ac6:	e8 00 00 00 00       	callq  acb <internal_move_pointers_items+0xacb>
			ac7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 acb:	31 ff                	xor    %edi,%edi
 acd:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi
			ad0: R_X86_64_32S	.rodata.str1.1+0x18e530
 ad4:	48 c7 c2 00 00 00 00 	mov    $0x0,%rdx
			ad7: R_X86_64_32S	.rodata.str1.1+0x49f967
 adb:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx
			ade: R_X86_64_32S	.rodata.str1.1+0x625b28
 ae2:	41 b8 3d 01 00 00    	mov    $0x13d,%r8d
 ae8:	49 c7 c1 00 00 00 00 	mov    $0x0,%r9
			aeb: R_X86_64_32S	.rodata.str1.1+0x49f967
 aef:	b8 00 00 00 00       	mov    $0x0,%eax
 af4:	41 57                	push   %r15
 af6:	ff 74 24 20          	pushq  0x20(%rsp)
 afa:	e8 00 00 00 00       	callq  aff <internal_move_pointers_items+0xaff>
			afb: R_X86_64_PLT32	__reiserfs_panic-0x4
 aff:	e8 00 00 00 00       	callq  b04 <internal_move_pointers_items+0xb04>
			b00: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 b04:	31 ff                	xor    %edi,%edi
 b06:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi
			b09: R_X86_64_32S	.rodata.str1.1+0x18e530
 b0d:	48 c7 c2 00 00 00 00 	mov    $0x0,%rdx
			b10: R_X86_64_32S	.rodata.str1.1+0x49f967
 b14:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx
			b17: R_X86_64_32S	.rodata.str1.1+0x8124e9
 b1b:	41 b8 41 01 00 00    	mov    $0x141,%r8d
 b21:	49 c7 c1 00 00 00 00 	mov    $0x0,%r9
			b24: R_X86_64_32S	.rodata.str1.1+0x49f967
 b28:	b8 00 00 00 00       	mov    $0x0,%eax
 b2d:	e9 2c 01 00 00       	jmpq   c5e <internal_move_pointers_items+0xc5e>
 b32:	e8 00 00 00 00       	callq  b37 <internal_move_pointers_items+0xb37>
			b33: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 b37:	48 83 ec 08          	sub    $0x8,%rsp
 b3b:	31 ff                	xor    %edi,%edi
 b3d:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi
			b40: R_X86_64_32S	.rodata.str1.1+0x18e530
 b44:	48 c7 c2 00 00 00 00 	mov    $0x0,%rdx
			b47: R_X86_64_32S	.rodata.str1.1+0x49f967
 b4b:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx
			b4e: R_X86_64_32S	.rodata.str1.1+0x8744b6
 b52:	41 b8 42 01 00 00    	mov    $0x142,%r8d
 b58:	49 c7 c1 00 00 00 00 	mov    $0x0,%r9
			b5b: R_X86_64_32S	.rodata.str1.1+0x49f967
 b5f:	31 c0                	xor    %eax,%eax
 b61:	41 54                	push   %r12
 b63:	e8 00 00 00 00       	callq  b68 <internal_move_pointers_items+0xb68>
			b64: R_X86_64_PLT32	__reiserfs_panic-0x4
 b68:	e8 00 00 00 00       	callq  b6d <internal_move_pointers_items+0xb6d>
			b69: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 b6d:	e8 00 00 00 00       	callq  b72 <internal_move_pointers_items+0xb72>
			b6e: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 b72:	48 8b 6c 24 08       	mov    0x8(%rsp),%rbp
 b77:	48 8b 5d 28          	mov    0x28(%rbp),%rbx
 b7b:	bf 17 00 00 00       	mov    $0x17,%edi
 b80:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 b87:	e8 00 00 00 00       	callq  b8c <internal_move_pointers_items+0xb8c>
			b88: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 b8c:	e8 00 00 00 00       	callq  b91 <internal_move_pointers_items+0xb91>
			b8d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 b91:	bf 01 00 00 00       	mov    $0x1,%edi
 b96:	48 c7 c6 ff ff ff ff 	mov    $0xffffffffffffffff,%rsi
 b9d:	e8 00 00 00 00       	callq  ba2 <internal_move_pointers_items+0xba2>
			b9e: R_X86_64_PLT32	__sanitizer_cov_trace_const_cmp8-0x4
 ba2:	e8 00 00 00 00       	callq  ba7 <internal_move_pointers_items+0xba7>
			ba3: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 ba7:	44 0f b7 7b 02       	movzwl 0x2(%rbx),%r15d
 bac:	e8 00 00 00 00       	callq  bb1 <internal_move_pointers_items+0xbb1>
			bad: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 bb1:	e8 00 00 00 00       	callq  bb6 <internal_move_pointers_items+0xbb6>
			bb2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 bb6:	48 8b 6d 20          	mov    0x20(%rbp),%rbp
 bba:	48 89 eb             	mov    %rbp,%rbx
 bbd:	48 83 eb 18          	sub    $0x18,%rbx
 bc1:	73 25                	jae    be8 <internal_move_pointers_items+0xbe8>
 bc3:	e8 00 00 00 00       	callq  bc8 <internal_move_pointers_items+0xbc8>
			bc4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 bc8:	e8 00 00 00 00       	callq  bcd <internal_move_pointers_items+0xbcd>
			bc9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 bcd:	ba 18 00 00 00       	mov    $0x18,%edx
 bd2:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			bd5: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1217
 bd9:	48 89 ee             	mov    %rbp,%rsi
 bdc:	b9 2d 00 00 00       	mov    $0x2d,%ecx
 be1:	e8 00 00 00 00       	callq  be6 <internal_move_pointers_items+0xbe6>
			be2: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 be6:	eb 05                	jmp    bed <internal_move_pointers_items+0xbed>
 be8:	e8 00 00 00 00       	callq  bed <internal_move_pointers_items+0xbed>
			be9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 bed:	48 63 eb             	movslq %ebx,%rbp
 bf0:	48 89 eb             	mov    %rbp,%rbx
 bf3:	48 83 eb 08          	sub    $0x8,%rbx
 bf7:	73 25                	jae    c1e <internal_move_pointers_items+0xc1e>
 bf9:	e8 00 00 00 00       	callq  bfe <internal_move_pointers_items+0xbfe>
			bfa: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 bfe:	e8 00 00 00 00       	callq  c03 <internal_move_pointers_items+0xc03>
			bff: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 c03:	ba 08 00 00 00       	mov    $0x8,%edx
 c08:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi
			c0b: R_X86_64_32S	.data..Lanon.097988b9c8071cd26e237de4de6f5c04.1218
 c0f:	48 89 ee             	mov    %rbp,%rsi
 c12:	b9 2d 00 00 00       	mov    $0x2d,%ecx
 c17:	e8 00 00 00 00       	callq  c1c <internal_move_pointers_items+0xc1c>
			c18: R_X86_64_PLT32	handle_overflow.llvm.3442549309786426566-0x4
 c1c:	eb 05                	jmp    c23 <internal_move_pointers_items+0xc23>
 c1e:	e8 00 00 00 00       	callq  c23 <internal_move_pointers_items+0xc23>
			c1f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
 c23:	48 89 d8             	mov    %rbx,%rax
 c26:	49 f7 e6             	mul    %r14
 c29:	48 89 d5             	mov    %rdx,%rbp
 c2c:	48 c1 ed 04          	shr    $0x4,%rbp
 c30:	48 83 ec 08          	sub    $0x8,%rsp
 c34:	31 ff                	xor    %edi,%edi
 c36:	48 c7 c6 00 00 00 00 	mov    $0x0,%rsi
			c39: R_X86_64_32S	.rodata.str1.1+0x18e530
 c3d:	48 c7 c2 00 00 00 00 	mov    $0x0,%rdx
			c40: R_X86_64_32S	.rodata.str1.1+0x49f967
 c44:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx
			c47: R_X86_64_32S	.rodata.str1.1+0x5c3670
 c4b:	41 b8 45 01 00 00    	mov    $0x145,%r8d
 c51:	49 c7 c1 00 00 00 00 	mov    $0x0,%r9
			c54: R_X86_64_32S	.rodata.str1.1+0x49f967
 c58:	b8 00 00 00 00       	mov    $0x0,%eax
 c5d:	55                   	push   %rbp
 c5e:	41 57                	push   %r15
 c60:	41 54                	push   %r12
 c62:	e8 00 00 00 00       	callq  c67 <trace_ocfs2_write_zero_page.__warned>
			c63: R_X86_64_PLT32	__reiserfs_panic-0x4
