Warning: Permanently added '10.128.1.33' (ECDSA) to the list of known hosts. 2019/06/04 04:35:28 fuzzer started syzkaller login: [ 51.870055] kauditd_printk_skb: 5 callbacks suppressed [ 51.870072] audit: type=1400 audit(1559622928.889:36): avc: denied { map } for pid=7838 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/04 04:35:31 dialing manager at 10.128.0.105:38735 2019/06/04 04:35:31 syscalls: 2460 2019/06/04 04:35:31 code coverage: enabled 2019/06/04 04:35:31 comparison tracing: enabled 2019/06/04 04:35:31 extra coverage: extra coverage is not supported by the kernel 2019/06/04 04:35:31 setuid sandbox: enabled 2019/06/04 04:35:31 namespace sandbox: enabled 2019/06/04 04:35:31 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/04 04:35:31 fault injection: enabled 2019/06/04 04:35:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/04 04:35:31 net packet injection: enabled 2019/06/04 04:35:31 net device setup: enabled 04:35:34 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) bind$llc(r0, 0x0, 0x0) [ 57.423106] audit: type=1400 audit(1559622934.439:37): avc: denied { map } for pid=7856 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15002 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 57.541693] IPVS: ftp: loaded support on port[0] = 21 [ 57.551785] NET: Registered protocol family 30 [ 57.556386] Failed to register TIPC socket type 04:35:34 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x2e, 0x0, &(0x7f0000000080)) [ 57.729419] IPVS: ftp: loaded support on port[0] = 21 [ 57.739005] NET: Registered protocol family 30 [ 57.743605] Failed to register TIPC socket type 04:35:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82\x8a\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\xbf\x03\xaa\xac\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') [ 58.212002] IPVS: ftp: loaded support on port[0] = 21 [ 58.241074] NET: Registered protocol family 30 [ 58.245713] Failed to register TIPC socket type 04:35:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000340)={[{0x0, 'memory'}]}, 0x8) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd', 0x60}]}, 0xf) [ 58.712279] IPVS: ftp: loaded support on port[0] = 21 [ 58.741058] NET: Registered protocol family 30 [ 58.745673] Failed to register TIPC socket type 04:35:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x233}, 0x8}) [ 59.312505] IPVS: ftp: loaded support on port[0] = 21 [ 59.340973] NET: Registered protocol family 30 [ 59.345613] Failed to register TIPC socket type 04:35:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x21, 0x0, &(0x7f00000000c0)) [ 60.004842] IPVS: ftp: loaded support on port[0] = 21 [ 60.030749] NET: Registered protocol family 30 [ 60.035393] Failed to register TIPC socket type [ 60.509798] chnl_net:caif_netlink_parms(): no params data found [ 61.121800] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.266812] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.383928] device bridge_slave_0 entered promiscuous mode [ 61.460301] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.567690] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.652985] device bridge_slave_1 entered promiscuous mode [ 62.092662] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.439022] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.057753] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.225513] team0: Port device team_slave_0 added [ 63.555520] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.727417] team0: Port device team_slave_1 added [ 63.927714] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.148042] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.685374] device hsr_slave_0 entered promiscuous mode [ 64.929981] device hsr_slave_1 entered promiscuous mode [ 65.241629] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 65.418538] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 65.723263] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.571580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.791924] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.058739] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 67.065002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.094348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.328057] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 67.334199] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.614647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 67.755804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.774600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.936085] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.942701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.305160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 68.556103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.587099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.595036] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.894272] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.900743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.158472] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 69.176660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.315645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 69.382383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.413582] IPVS: ftp: loaded support on port[0] = 21 [ 69.479595] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 69.490799] NET: Registered protocol family 30 [ 69.495399] Failed to register TIPC socket type [ 69.564131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.584310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.676334] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 69.758476] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.765770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.845229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.924422] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 69.983499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.021843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.099332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 70.186870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.195111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.303607] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 70.372457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.541265] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 70.700634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.891249] audit: type=1400 audit(1559622947.909:38): avc: denied { associate } for pid=7857 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 04:35:49 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) bind$llc(r0, 0x0, 0x0) 04:35:50 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) bind$llc(r0, 0x0, 0x0) 04:35:50 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) bind$llc(r0, 0x0, 0x0) [ 73.292671] IPVS: ftp: loaded support on port[0] = 21 [ 73.312478] IPVS: ftp: loaded support on port[0] = 21 [ 73.312503] IPVS: ftp: loaded support on port[0] = 21 [ 73.330102] NET: Registered protocol family 30 [ 73.334930] Failed to register TIPC socket type [ 73.349273] NET: Registered protocol family 30 [ 73.354255] Failed to register TIPC socket type [ 73.372306] list_add double add: new=ffffffff892e7630, prev=ffffffff890f3140, next=ffffffff892e7630. [ 73.398177] ------------[ cut here ]------------ [ 73.403086] kernel BUG at lib/list_debug.c:29! [ 73.418772] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 73.424858] CPU: 1 PID: 8499 Comm: syz-executor.2 Not tainted 4.19.47 #19 [ 73.433019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.445410] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 73.452499] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 a0 ae 81 87 e8 d0 f3 30 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 e0 af 81 87 e8 b9 f3 30 fe <0f> 0b 48 89 f1 48 c7 c7 60 af 81 87 4c 89 e6 e8 a5 f3 30 fe 0f 0b [ 73.468609] kobject: 'loop0' (00000000835affa8): kobject_uevent_env [ 73.472216] RSP: 0018:ffff888073f77b88 EFLAGS: 00010282 [ 73.484434] RAX: 0000000000000058 RBX: ffffffff892e74a0 RCX: 0000000000000000 [ 73.489874] kobject: 'loop0' (00000000835affa8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 73.492617] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed100e7eef63 [ 73.509828] RBP: ffff888073f77ba0 R08: 0000000000000058 R09: ffffed1015d23ee3 [ 73.517216] R10: ffffed1015d23ee2 R11: ffff8880ae91f717 R12: ffffffff892e7630 [ 73.524678] R13: ffffffff892e7630 R14: ffffffff892e7630 R15: ffffffff892e75d0 [ 73.532504] FS: 0000000001959940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 73.541176] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 73.547462] CR2: 0000000000960004 CR3: 0000000073f3e000 CR4: 00000000001406e0 [ 73.555207] Call Trace: [ 73.557817] ? mutex_lock_nested+0x16/0x20 [ 73.562076] proto_register+0x459/0x8e0 [ 73.566250] tipc_socket_init+0x1c/0x70 [ 73.570334] tipc_init_net+0x2ed/0x570 [ 73.574324] ? tipc_exit_net+0x40/0x40 [ 73.578253] ops_init+0xb3/0x410 [ 73.581725] setup_net+0x2d3/0x740 [ 73.585505] ? lock_acquire+0x16f/0x3f0 [ 73.589617] ? ops_init+0x410/0x410 [ 73.593357] copy_net_ns+0x1df/0x340 [ 73.597092] create_new_namespaces+0x400/0x7b0 [ 73.601695] unshare_nsproxy_namespaces+0xc2/0x200 [ 73.607177] ksys_unshare+0x440/0x980 [ 73.610996] ? walk_process_tree+0x2c0/0x2c0 [ 73.615597] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 73.620372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 73.626043] ? do_syscall_64+0x26/0x620 [ 73.630124] ? lockdep_hardirqs_on+0x415/0x5d0 [ 73.638006] __x64_sys_unshare+0x31/0x40 [ 73.642241] do_syscall_64+0xfd/0x620 [ 73.646523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 73.651731] RIP: 0033:0x45bd47 [ 73.655229] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 73.675220] RSP: 002b:00007fff90b6f8f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 73.683093] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47 [ 73.690964] RDX: 0000000000000000 RSI: 00007fff90b6f8a0 RDI: 0000000040000000 04:35:50 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) bind$llc(r0, 0x0, 0x0) [ 73.698443] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 73.706954] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000075c9a8 [ 73.714905] R13: 00007fff90b6fb68 R14: 0000000000000000 R15: 0000000000000000 [ 73.722489] Modules linked in: 04:35:50 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) bind$llc(r0, 0x0, 0x0) [ 73.816908] ---[ end trace ceb4eebc53f73ed5 ]--- [ 73.820909] kobject: 'loop0' (00000000835affa8): kobject_uevent_env [ 73.823321] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 73.835722] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 a0 ae 81 87 e8 d0 f3 30 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 e0 af 81 87 e8 b9 f3 30 fe <0f> 0b 48 89 f1 48 c7 c7 60 af 81 87 4c 89 e6 e8 a5 f3 30 fe 0f 0b [ 73.835742] kobject: 'loop0' (00000000835affa8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 73.866559] RSP: 0018:ffff888073f77b88 EFLAGS: 00010282 [ 73.893604] RAX: 0000000000000058 RBX: ffffffff892e74a0 RCX: 0000000000000000 [ 73.903021] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed100e7eef63 04:35:50 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) bind$llc(r0, 0x0, 0x0) [ 73.911799] RBP: ffff888073f77ba0 R08: 0000000000000058 R09: ffffed1015d23ee3 [ 73.927159] R10: ffffed1015d23ee2 R11: ffff8880ae91f717 R12: ffffffff892e7630 [ 73.934568] R13: ffffffff892e7630 R14: ffffffff892e7630 R15: ffffffff892e75d0 [ 73.947871] FS: 0000000001959940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 73.966584] kobject: 'loop0' (00000000835affa8): kobject_uevent_env [ 73.973349] kobject: 'loop0' (00000000835affa8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 73.983672] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 73.991001] CR2: 0000000001893df8 CR3: 0000000073f3e000 CR4: 00000000001406f0 [ 74.003709] Kernel panic - not syncing: Fatal exception [ 74.010878] Kernel Offset: disabled [ 74.018745] Rebooting in 86400 seconds..