selinux-policy-devel-3.13.1-192.el7_5.4> H HtxHF[2K ?*}}2e@e ]mw[˟Y9_j>Cd8bd0e265c4af8996467f4e4967545b197eadd8d[^s{hѠ@F[2K ?*}}c'W1j66ؿC46 VճE3l^>: d? Td * ?pt  XI|I !I +I @I MI II)II (  (68@W9W:W>gGpIH II IX Y \ I] 4@I^ } b d 0e 5f 8l :t TIu xIv w Ix ,I PCselinux-policy-devel3.13.1192.el7_5.4SELinux policy develSELinux policy development and man page package[2sl7-kojislave01.fnal.goviScientific LinuxScientific LinuxGPLv2+Scientific LinuxSystem Environment/Basehttp://oss.tresys.com/repos/refpolicy/linuxnoarchselinuxenabled && /usr/bin/sepolgen-ifgen 2>/dev/null exit 0p Q1m!,$#}"3,l2M*Y)H/*6#~! .' >"m2G)!n%ZJG'd([N5<(=%/;%-.2<.86+$E+B&26,"2=LJ/b=J/8V 3$27{)55@23'T&;bP+,-M-1,1,2}%@ ($P#!d?!38w44(,h9CO8B.)F4->(}=+0410z4:#=-_?vB-:;/o(]*c) )%$ (.&R$A 0Hn.p]9d)c?$4:G-+*#)p6`3x6/N436!/;5m4A;16-cc0BE*/'n4:>" Q:5dk*26E?$3105-LGr#-v<}46f<5+G05/4J4"3k>4&P"?R7Q#E/T5'U3!5=2!,v%<5;5MK4*G+;",{'/\6Z5*Q357Bf8R4$2҆%$ ,':O&,%$`7v+Z)5,@w:AiG&5q+0B!x3(.43O8=5-% 46a43*0Q%3-X2s6?y,&*fB$/-,h3=u558+5-/F!t<*J#9DN)LE3)6.W/I=6?(3$O//.(i,L7-%/-78=:&5'9 /c*'MA!-%(0-?<5>+ ^,_-HG8R3v6gFA)gHP.1{%o O1d%%-Y)-K!'#o"U,`2)(E1)l@X0775)7; 17A.;1{5&'\"?2,-934R*-t%w*8S 2+O/?:02w08#([/w/202O///0Qr;G+3*:x0+3s,.413/59X8Bcu$Al%Bi'!O#5($E'8'2**$4(3(*,'])$0-2qQ<H48&E .,.\3U3'4|7i:4K0v,+>06_ 5Q'24!-'G"'4-R04@ 4Fz4/2**9C,602r0AR(,.>K25M+Jb,.4:F-e>u%E#<0=)&%`51-|&/o&1V1!1(91(:0%*,U<6--)</KG$-.-&/D<.,%j&+--(9//+#.6< DM1bJ(A&u'55<[5Y6605&5QX&&;2 J(%/<M1 ZW0].''($#C$-A$47Zf&R" F!A.,),@/7/'A Q'"$#W$-.H3*51E-W+2`-f1t,/,t>234r-04|,6-06=#'4<5p+38D+++,)*<D/~;163 ->Q=)@4>.{.,7"$/<&1I')x'Q() *w''*$#/$AA*"& > -#9/[33"8"r!gL-2'pEL1b5v&9+EA<&]7.v&I,M2OV<~AY#2G5(g5r,2-F1m]'(D/G/.,5E3+433.7363?LW$#9?t d| @ 0U oV 2 H:3 v* ']  O<&K fD M1  x h  Kk  6h|-! Y.N~Pr& -U*pR5a }# @ C!6q ; V*c[ . sGN  l /e*1.; p )  B*p6k N+F4 "jaco d  bN ;+ (t  + ;Q$jY)M N19(f x'" c   ;Y  Y =/+.B#  P' g[= T"\+Z f^\gj  *P  8 !(D+ n Q8&xF ` 3 auV;F C[ $ 8-  1 Q "r PQ: %K EX$& `  *L1 # 8 , EcIn8W " a #e-'<Zĭy;V NMDeYWBbY$5u-\ ҦI 1] Vi-q)II =s + h*/|FjUD'"3^S+ Fq5vA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤[29[2 [2 [2 [2 [2:[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[25[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[25[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[26[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[28[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[26[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[26[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[26[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [27[2 [2 [2[2[2[2[2[2[2[2[28[2[2[2[2[2[2[2[2[2[2[2[2[27[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2[2#[2#[2$[2$[2$[2$[2$[2%[2%[2%[2%[2%[2&[2&[2&[2&[2&[2'[2'[2'[2'[2([2([2([2([2[2[2[2[27[2[2[2[2[2 [2 [2 [2 [2 [2![2![27[2![2![2![2![2"[2"[2"[2"[2"[2#[2#[2#[2#[2*[2+[2+[2+[2+[2+[2,[2,[2,[2,[2,[2-[2-[2-[2-[2-[2.[2.[2.[2.[2.[2([2)[2)[2)[28[2)[2)[2)[2*[2*[2*[2*[20[21[21[21[21[21[28[22[22[22[2/[20[20[20[22[22[23[23[23[23[24[24[24[24[24[25[25[25[2 [2 [2 [2[2 [2 [2 [2 [2 [2 [2 [2 [2[2 [2 [2 [2[2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2[2[2 [2[2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2[2 [2 [2 [2 [2 [2 [2 [2 [2 [2[2 [2 [2 [2B[2 [2[2[2[2[2[2[2[2[2[2[2B[2B[2[2 [2[2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [2 [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@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.13.1-192.el7_5.4.src.rpmselinux-policy-devel       /bin/sh/usr/bin/makecheckpolicym4policycoreutils-develrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)selinux-policyrpmlib(PayloadIsXz)2.52.5-183.0.4-14.6.0-14.0.4-14.0-13.13.1-192.el7_5.45.2-14.11.3[@ZZZI@ZH@Z@ZZz@Zz@ZyZ_:ZWQZV@Z.s@Z)-@Z%8ZZ @ZZNZNYYA@YYW@YW@YYY@Y@Ycl@YP@YJ_YI@YBvY9<@Y6@Y5GY1S@Y0Y.@Y-^Y, @Y, @Y%uYYY@Y@Y@Y.YXQ@XXX@X@X@XXX@XۡXP@XXg@Xg@X~@X@XƉXCXCXX @XXXBXXXs{@XY@XWXRXRXOXJXAb@X@X)@X#X!@XWWSW_@W_@Wv@W;W@WίWW:WQW@WW@W@WW~W@WW~D@W{@Ws@WrfWj}WbW^@WYZ@WYZ@WUeWM|WBW9@W9@W1@W(W V@V@V@V޾V2V@V_VVCV@VZV @VqV }@V }@VBUUU@U@UpUUUUoUoU5@UUȒ@UĝUUWUU@UUK@UUU'Ua@U~@UzUv@UT@U@Tr@T@T@T7TTTC@T@TTT}Tto@TsTk4T`T[bTWn@T?@T>aT6xT6xT@S@SSDSg}@SB@S>S;S:@S9XS5d@S4S2@S0@S,)S*@S)S)S&S&S"@S!S L@SSS@SSc@SSnS @S SK@RRR@RRJ@Ra@RRR&R&RRR=RʚRR@R@R@Rv@Rv@R@RR@R R@R@R|@Rz/@Rz/@RsRpRnQRi RfhR_@R_@R[R[RSRNRNRL RIgRB@RB@R:@R1R-@R-@R(r@R' R%@R7RRNRR@Q@QQdQQ@QQޞ@Q@QکQکQ@QzQQ4Q@@Q@QKQQ@Q@Q@Q@QQ@QQQQ@Q@QQQ@Qzl@Qw@QvwQo@Qo@QnQm=@QkQfQb@Q`@Q^QZ@QQQIQGQ@j@Q9Q8@Q4Q0@Q-@Q& @Q$QQ@QQ@Q @Qh@QsPP@P@PP@P[PP!@P8@PO@P @Pf@PPqP @PP7@P@PPPYP@P@PPPM@PPd@P@PoP{@P{@P@PP5@P@P~P}L@Px@PvPvPuc@Puc@Pr@Pmz@Pmz@Pmz@Pj@Pd?Pd?Pb@PaPaP[@PXb@PWPS@PQPO'PM@PIP@@P>@P8@P7lP2&P2&P,P,P*=P(@P#@P#@P!@P!@P@PkPw@Pw@PP

@NNU@NNl@N@N@NåN@NNNN@NNN@N@NGNGNGN@N@NNS@NS@N^N^N @N @NNj@Nj@NN$@NN@N/N@N@NFNFN@NNN@N@N@N]Ni@Ni@Ni@N|tNyNx@Ns:@NoENoENiNf @N^"@N\N[@NTNS@NS@NC@NBrN:N98@N7N6@N2N.@N*N)f@N(N%qN$ @N@N7@N e@NpNpM@M@Md@Md@MM{@M@M۝M@M@M‘@M@M@M@My@My@M3@M@M@MMM@MMMMTMx@Mx@Mv@MlMbSM[@MRMQ0@MQ0@MJMGMGMA^@M>@M9u@M6@M5M4/@M4/@M0:M,F@M$]@M@M9MMMMM\@M M M@L!L!L@LL@L@L@LOLOL[@L@L@Lr@L L,@L,@Lډ@L7LLLNL@LΫLeL|L@LB@LB@LB@L@LMLL@LdLL{L*@L@L5LLA@LLLL@LcL@L@L@LzL)@L|L|L|L{@LvW@LvW@Ls@Ls@LrbLrbLmLk@LjyLe3Lc@La?@LZLYV@LXLN@LN@LMxLMxLI@LH2LF@LEL=L=L=L;L7@L LT@L@LL@L@L0LLGL@K^K^KKKj@K$@KKK@K@KK@K]K޺K@KtK#@KKՀ@K:@KK͗@KŮ@K\K\K @KKKKK9@KK@KK@K@KKKKrKK~@K,K,K,K@KK8@KKK@KK@KqKqK}+K{@K{@KuBKs@KqN@KjKie@Kf@Ka|@K`*K]KXAKTM@KPXKEKEKEKD{@KC)KA@K;@K2@K0K/c@K+nK*@K(K"4@KK>K>K>JJęJH@JH@JJJ_@J@JjJjJ@Jv@Jv@Jv@Jv@J$J@JJ0@J@J@JG@JG@J@JJ@J@J@JJJ#J@JJJ@J:J@JJQJ@J J J|@JzJyt@Jyt@Jx"JrJrJq@Jn@Jn@JmJhPJeJ\s@JW-@JT@JS8JKOJI@JCfJCfJB@J@J@J?r@J<@J;}J:,@J7@J67J2C@J0J/@J,@J%@JJB@JJMJ J dJ@J@JJ@J*@J*@II@IIA@IIII@I@IIIX@IX@IX@II@I@IcIIo@Io@IzI)@I@IܑI@@II@I@I@IԨIд@I̿In@I3I3I@II@I@IV@IIaIIm@I@I'@II2III@IIIIIIII@III@I1I@III~@I}Iy@Ix_Iw@IuItk@Itk@Io%@Ik0IeIcGIa@I`IVIO@IJ;@IHIAI>]I= @I7@I6tI3I-I@III9@I9@II IP@I@IIg@Ig@HHH@HrH~@H,H@HCHHH @H @Hf@Hf@H@H+H@H׈H׈H7@HBH@HǶH@HH|@HHH@H{@H)HHL@H@H@H@HnH}H|@Ht@HsVHr@Hl@HkmHgy@HcH`H_@H^>HRa@HQHQHO@HFHFH$@DX@DU@DN@DN@DLDH@DGwDGwDDD@@D?D?D;@D;@D:HD:HD2_D1@D1@D-D+@D+@D'D!<@D!<@D!<@DDD@D@D@DDDDDD@D@D@D@D uD $@D D @D @DDDFC@C@C@C@CCCCCR@CCCCC@Ci@CC@C@CtC@C@CC:@CECCC @C @CعCعCعCعCC@C-C-C-C@C@CCǖ@C@CáCáCP@CP@C[C @C @CCg@Cg@CCC!@C~@C,C@CCCCC@CC@C@C@CZCZC @C @CCCf@Cf@Cf@CC@CqCqC @C @C @CCC}@C7@C7@C7@CBCBCYC@C@CC}@CqCqLukas Vrabec - 3.13.1-192.4Lukas Vrabec - 3.13.1-192.3Lukas Vrabec - 3.13.1-192.2Lukas Vrabec - 3.13.1-192.1Lukas Vrabec - 3.13.1-192Lukas Vrabec - 3.13.1-191Lukas Vrabec - 3.13.1-190Lukas Vrabec - 3.13.1-189Lukas Vrabec - 3.13.1-188Lukas Vrabec - 3.13.1-187Lukas Vrabec - 3.13.1-186Lukas Vrabec - 3.13.1-185Lukas Vrabec - 3.13.1-184Lukas Vrabec - 3.13.1-183Lukas Vrabec - 3.13.1-182Lukas Vrabec - 3.13.1-181Lukas Vrabec - 3.13.1-180Lukas Vrabec - 3.13.1-179Lukas Vrabec - 3.13.1-178Lukas Vrabec - 3.13.1-177Lukas Vrabec - 3.13.1-176Lukas Vrabec - 3.13.1-175Lukas Vrabec - 3.13.1-174Lukas Vrabec - 3.13.1-173Lukas Vrabec - 3.13.1-172Lukas Vrabec - 3.13.1-171Lukas Vrabec - 3.13.1-170Lukas Vrabec - 3.13.1-169Lukas Vrabec - 3.13.1-168Lukas Vrabec - 3.13.1-167Lukas Vrabec - 3.13.1-166Lukas Vrabec - 3.13.1-165Lukas Vrabec - 3.13.1-164Lukas Vrabec - 3.13.1-163Lukas Vrabec - 3.13.1-162Lukas Vrabec - 3.13.1-161Lukas Vrabec - 3.13.1-160Lukas Vrabec - 3.13.1-159Lukas Vrabec - 3.13.1-158Lukas Vrabec - 3.13.1-157Lukas Vrabec - 3.13.1-156Lukas Vrabec - 3.13.1-155Lukas Vrabec - 3.13.1-154Lukas Vrabec - 3.13.1-153Lukas Vrabec - 3.13.1-152Lukas Vrabec - 3.13.1-151Lukas Vrabec - 3.13.1-150Lukas Vrabec - 3.13.1-149Lukas Vrabec - 3.13.1-148Lukas Vrabec - 3.13.1-147Lukas Vrabec - 3.13.1-146Lukas Vrabec - 3.13.1-145Lukas Vrabec - 3.13.1-144Lukas Vrabec - 3.13.1-143Lukas Vrabec - 3.13.1-142Lukas Vrabec - 3.13.1-141Lukas Vrabec - 3.13.1-140Lukas Vrabec - 3.13.1-139Lukas Vrabec - 3.13.1-138Lukas Vrabec - 3.13.1-137Lukas Vrabec - 3.13.1-136Lukas Vrabec - 3.13.1-135Lukas Vrabec - 3.13.1-134Lukas Vrabec - 3.13.1-133Lukas Vrabec - 3.13.1-132Lukas Vrabec - 3.13.1-131Lukas Vrabec - 3.13.1-130Lukas Vrabec - 3.13.1-129Lukas Vrabec - 3.13.1-128Lukas Vrabec - 3.13.1-127Lukas Vrabec - 3.13.1-126Lukas Vrabec - 3.13.1-125Lukas Vrabec - 3.13.1-124Lukas Vrabec - 3.13.1-123Lukas Vrabec - 3.13.1-122Lukas Vrabec - 3.13.1-120Lukas Vrabec - 3.13.1-119Lukas Vrabec - 3.13.1-118Lukas Vrabec - 3.13.1-117Lukas Vrabec - 3.13.1-116Lukas Vrabec - 3.13.1-115Lukas Vrabec - 3.13.1-114Lukas Vrabec - 3.13.1-113Lukas Vrabec - 3.13.1-112Lukas Vrabec - 3.13.1-111Lukas Vrabec - 3.13.1-110Lukas Vrabec - 3.13.1-109Lukas Vrabec - 3.13.1-108Lukas Vrabec - 3.13.1-107Lukas Vrabec - 3.13.1-106Miroslav Grepl - 3.13.1-105Lukas Vrabec - 3.13.1-104Lukas Vrabec - 3.13.1-103Dan Walsh - 3.13.1-102Lukas Vrabec - 3.13.1-101Lukas Vrabec - 3.13.1-100Lukas Vrabec - 3.13.1-99Lukas Vrabec - 3.13.1-98Lukas Vrabec - 3.13.1-97Lukas Vrabec - 3.13.1-96Lukas Vrabec - 3.13.1-95Lukas Vrabec - 3.13.1-94Lukas Vrabec - 3.13.1-93Lukas Vrabec - 3.13.1-92Lukas Vrabec - 3.13.1-91Lukas Vrabec - 3.13.1-90Lukas Vrabec - 3.13.1-89Lukas Vrabec - 3.13.1-88Lukas Vrabec - 3.13.1-87Lukas Vrabec - 3.13.1-86Lukas Vrabec - 3.13.1-85Lukas Vrabec - 3.13.1-84Lukas Vrabec - 3.13.1-83Lukas Vrabec - 3.13.1-82Lukas Vrabec - 3.13.1-81Lukas Vrabec - 3.13.1-80Petr Lautrbach - 3.13.1-79Lukas Vrabec - 3.13.1-78Lukas Vrabec - 3.13.1-77Lukas Vrabec - 3.13.1-76Lukas Vrabec - 3.13.1-75Lukas Vrabec - 3.13.1-74Lukas Vrabec - 3.13.1-73Lukas Vrabec - 3.13.1-72Lukas Vrabec - 3.13.1-71Lukas Vrabec - 3.13.1-70Lukas Vrabec - 3.13.1-69Lukas Vrabec - 3.13.1-68Lukas Vrabec - 3.13.1-67Petr Lautrbach - 3.13.1-66Lukas Vrabec 3.13.1-65Lukas Vrabec 3.13.1-64Lukas Vrabec 3.13.1-63Lukas Vrabec 3.13.1-62Lukas Vrabec 3.13.1-61Miroslav Grepl 3.13.1-60Miroslav Grepl 3.13.1-59Lukas Vrabec 3.13.1-58Lukas Vrabec 3.13.1-57Miroslav Grepl 3.13.1-56Lukas Vrabec 3.13.1-55Lukas Vrabec 3.13.1-54Lukas Vrabec 3.13.1-53Lukas Vrabec 3.13.1-52Miroslav Grepl 3.13.1-51Lukas Vrabec 3.13.1-50Lukas Vrabec 3.13.1-49Lukas Vrabec 3.13.1-48Lukas Vrabec 3.13.1-47Lukas Vrabec 3.13.1-46Lukas Vrabec 3.13.1-45Lukas Vrabec 3.13.1-44Lukas Vrabec 3.13.1-43Lukas Vrabec 3.13.1-42Lukas Vrabec 3.13.1-41Lukas Vrabec 3.13.1-40Miroslav Grepl 3.13.1-39Lukas Vrabec 3.13.1-38Lukas Vrabec 3.13.1-37Lukas Vrabec 3.13.1-36Lukas Vrabec 3.13.1-35Lukas Vrabec 3.13.1-34Lukas Vrabec 3.13.1-33Lukas Vrabec 3.13.1-32Miroslav Grepl 3.13.1-31Miroslav Grepl 3.13.1-30Miroslav Grepl 3.13.1-29Miroslav Grepl 3.13.1-28Miroslav Grepl 3.13.1-27Miroslav Grepl 3.13.1-26Miroslav Grepl 3.13.1-25Miroslav Grepl 3.13.1-24Miroslav Grepl 3.13.1-23Miroslav Grepl 3.13.1-22Miroslav Grepl 3.13.1-21Miroslav Grepl 3.13.1-20Miroslav Grepl 3.13.1-19Miroslav Grepl 3.13.1-18Miroslav Grepl 3.13.1-17Miroslav Grepl 3.13.1-16Miroslav Grepl 3.13.1-15Miroslav Grepl 3.13.1-14Miroslav Grepl 3.13.1-13Miroslav Grepl 3.13.1-12Miroslav Grepl 3.13.1-11Miroslav Grepl 3.13.1-10Miroslav Grepl 3.13.1-9Miroslav Grepl 3.13.1-8Miroslav Grepl 3.13.1-7Miroslav Grepl 3.13.1-6Miroslav Grepl 3.13.1-5Miroslav Grepl 3.13.1-4Miroslav Grepl 3.13.1-3Miroslav Grepl 3.13.1-2Miroslav Grepl 3.13.1-1Miroslav Grepl 3.12.1-156Miroslav Grepl 3.12.1-155Miroslav Grepl 3.12.1-154Miroslav Grepl 3.12.1-153Miroslav Grepl 3.12.1-152Miroslav Grepl 3.12.1-151Miroslav Grepl 3.12.1-149Miroslav Grepl 3.12.1-149Miroslav Grepl 3.12.1-148Miroslav Grepl 3.12.1-147Miroslav Grepl 3.12.1-146Miroslav Grepl 3.12.1-145Miroslav Grepl 3.12.1-144Lukas Vrabec 3.12.1-143Miroslav Grepl 3.12.1-142Miroslav Grepl 3.12.1-141Miroslav Grepl 3.12.1-140Miroslav Grepl 3.12.1-139Lukas Vrabec 3.12.1-138Miroslav Grepl 3.12.1-137Miroslav Grepl 3.12.1-136Miroslav Grepl 3.12.1-135Miroslav Grepl 3.12.1-134Miroslav Grepl 3.12.1-133Miroslav Grepl 3.12.1-132Miroslav Grepl 3.12.1-131Miroslav Grepl 3.12.1-130Miroslav Grepl 3.12.1-129Miroslav Grepl 3.12.1-128Miroslav Grepl 3.12.1-127Miroslav Grepl 3.12.1-126Miroslav Grepl 3.12.1-125Miroslav Grepl 3.12.1-124Miroslav Grepl 3.12.1-123Miroslav Grepl 3.12.1-122Miroslav Grepl 3.12.1-121Miroslav Grepl 3.12.1-120Miroslav Grepl 3.12.1-119Miroslav Grepl 3.12.1-118Miroslav Grepl 3.12.1-117Miroslav Grepl 3.12.1-116Miroslav Grepl 3.12.1-115Miroslav Grepl 3.12.1-114Miroslav Grepl 3.12.1-113Miroslav Grepl 3.12.1-112Miroslav Grepl 3.12.1-111Miroslav Grepl 3.12.1-110Miroslav Grepl 3.12.1-109Miroslav Grepl 3.12.1-108Miroslav Grepl 3.12.1-107Dan Walsh 3.12.1-106Miroslav Grepl 3.12.1-105Miroslav Grepl 3.12.1-104Miroslav Grepl 3.12.1-103Miroslav Grepl 3.12.1-102Miroslav Grepl 3.12.1-101Miroslav Grepl 3.12.1-100Miroslav Grepl 3.12.1-99Miroslav Grepl 3.12.1-98Miroslav Grepl 3.12.1-97Miroslav Grepl 3.12.1-96Miroslav Grepl 3.12.1-95Miroslav Grepl 3.12.1-94Miroslav Grepl 3.12.1-94Miroslav Grepl 3.12.1-93Miroslav Grepl 3.12.1-92Miroslav Grepl 3.12.1-91Miroslav Grepl 3.12.1-90Miroslav Grepl 3.12.1-89Miroslav Grepl 3.12.1-88Miroslav Grepl 3.12.1-87Miroslav Grepl 3.12.1-86Miroslav Grepl 3.12.1-85Miroslav Grepl 3.12.1-84Miroslav Grepl 3.12.1-83Miroslav Grepl 3.12.1-82Miroslav Grepl 3.12.1-81Miroslav Grepl 3.12.1-80Miroslav Grepl 3.12.1-79Miroslav Grepl 3.12.1-78Miroslav Grepl 3.12.1-77Miroslav Grepl 3.12.1-76Miroslav Grepl 3.12.1-75Miroslav Grepl 3.12.1-74Miroslav Grepl 3.12.1-73Miroslav Grepl 3.12.1-72Miroslav Grepl 3.12.1-71Miroslav Grepl 3.12.1-70Miroslav Grepl 3.12.1-69Miroslav Grepl 3.12.1-68Miroslav Grepl 3.12.1-67Miroslav Grepl 3.12.1-66Miroslav Grepl 3.12.1-65Miroslav Grepl 3.12.1-64Miroslav Grepl 3.12.1-63Miroslav Grepl 3.12.1-62Miroslav Grepl 3.12.1-61Miroslav Grepl 3.12.1-60Miroslav Grepl 3.12.1-59Miroslav Grepl 3.12.1-58Miroslav Grepl 3.12.1-57Miroslav Grepl 3.12.1-56Miroslav Grepl 3.12.1-55Miroslav Grepl 3.12.1-54Miroslav Grepl 3.12.1-53Miroslav Grepl 3.12.1-52Miroslav Grepl 3.12.1-51Miroslav Grepl 3.12.1-50Miroslav Grepl 3.12.1-49Miroslav Grepl 3.12.1-48Miroslav Grepl 3.12.1-47Miroslav Grepl 3.12.1-46Miroslav Grepl 3.12.1-45Miroslav Grepl 3.12.1-44Miroslav Grepl 3.12.1-43Miroslav Grepl 3.12.1-42Miroslav Grepl 3.12.1-41Miroslav Grepl 3.12.1-40Miroslav Grepl 3.12.1-39Miroslav Grepl 3.12.1-38Miroslav Grepl 3.12.1-37Miroslav Grepl 3.12.1-36Miroslav Grepl 3.12.1-35Miroslav Grepl 3.12.1-34Miroslav Grepl 3.12.1-33Miroslav Grepl 3.12.1-32Miroslav Grepl 3.12.1-31Miroslav Grepl 3.12.1-30Miroslav Grepl 3.12.1-29Dan Walsh 3.12.1-28Dan Walsh 3.12.1-27Miroslav Grepl 3.12.1-26Miroslav Grepl 3.12.1-25Miroslav Grepl 3.12.1-24Miroslav Grepl 3.12.1-23Miroslav Grepl 3.12.1-22Miroslav Grepl 3.12.1-21Miroslav Grepl 3.12.1-20Miroslav Grepl 3.12.1-19Miroslav Grepl 3.12.1-18Miroslav Grepl 3.12.1-17Miroslav Grepl 3.12.1-16Miroslav Grepl 3.12.1-15Miroslav Grepl 3.12.1-14Miroslav Grepl 3.12.1-13Miroslav Grepl 3.12.1-12Miroslav Grepl 3.12.1-11Miroslav Grepl 3.12.1-10Miroslav Grepl 3.12.1-9Miroslav Grepl 3.12.1-8Miroslav Grepl 3.12.1-7Miroslav Grepl 3.12.1-6Miroslav Grepl 3.12.1-5Miroslav Grepl 3.12.1-4Miroslav Grepl 3.12.1-3Miroslav Grepl 3.12.1-2Miroslav Grepl 3.12.1-1Dan Walsh 3.11.1-69.1Miroslav Grepl 3.11.1-69Miroslav Grepl 3.11.1-68Miroslav Grepl 3.11.1-67Miroslav Grepl 3.11.1-66Miroslav Grepl 3.11.1-65Miroslav Grepl 3.11.1-64Miroslav Grepl 3.11.1-63Miroslav Grepl 3.11.1-62Miroslav Grepl 3.11.1-61Miroslav Grepl 3.11.1-60Miroslav Grepl 3.11.1-59Miroslav Grepl 3.11.1-58Miroslav Grepl 3.11.1-57Miroslav Grepl 3.11.1-56Miroslav Grepl 3.11.1-55Miroslav Grepl 3.11.1-54Miroslav Grepl 3.11.1-53Miroslav Grepl 3.11.1-52Miroslav Grepl 3.11.1-51Miroslav Grepl 3.11.1-50Miroslav Grepl 3.11.1-49Miroslav Grepl 3.11.1-48Miroslav Grepl 3.11.1-47Miroslav Grepl 3.11.1-46Miroslav Grepl 3.11.1-45Miroslav Grepl 3.11.1-44Miroslav Grepl 3.11.1-43Miroslav Grepl 3.11.1-42Miroslav Grepl 3.11.1-41Miroslav Grepl 3.11.1-40Miroslav Grepl 3.11.1-39Miroslav Grepl 3.11.1-38Miroslav Grepl 3.11.1-37Miroslav Grepl 3.11.1-36Miroslav Grepl 3.11.1-35Miroslav Grepl 3.11.1-34Miroslav Grepl 3.11.1-33Miroslav Grepl 3.11.1-32Miroslav Grepl 3.11.1-31Miroslav Grepl 3.11.1-30Miroslav Grepl 3.11.1-29Miroslav Grepl 3.11.1-28Miroslav Grepl 3.11.1-27Miroslav Grepl 3.11.1-26Miroslav Grepl 3.11.1-25Miroslav Grepl 3.11.1-24Miroslav Grepl 3.11.1-23Miroslav Grepl 3.11.1-22Miroslav Grepl 3.11.1-21Miroslav Grepl 3.11.1-20Miroslav Grepl 3.11.1-19Miroslav Grepl 3.11.1-18Miroslav Grepl 3.11.1-17Miroslav Grepl 3.11.1-16Dan Walsh 3.11.1-15Miroslav Grepl 3.11.1-14Dan Walsh 3.11.1-13Miroslav Grepl 3.11.1-12Miroslav Grepl 3.11.1-11Miroslav Grepl 3.11.1-10Dan Walsh 3.11.1-9Dan Walsh 3.11.1-8Dan Walsh 3.11.1-7Dan Walsh 3.11.1-6Miroslav Grepl 3.11.1-5Miroslav Grepl 3.11.1-4Miroslav Grepl 3.11.1-3Miroslav Grepl 3.11.1-2Miroslav Grepl 3.11.1-1Miroslav Grepl 3.11.1-0Miroslav Grepl 3.11.0-15Miroslav Grepl 3.11.0-14Miroslav Grepl 3.11.0-13Miroslav Grepl 3.11.0-12Fedora Release Engineering - 3.11.0-11Miroslav Grepl 3.11.0-10Miroslav Grepl 3.11.0-9Miroslav Grepl 3.11.0-8Miroslav Grepl 3.11.0-7Miroslav Grepl 3.11.0-6Miroslav Grepl 3.11.0-5Miroslav Grepl 3.11.0-4Miroslav Grepl 3.11.0-3Miroslav Grepl 3.11.0-2Miroslav Grepl 3.11.0-1Miroslav Grepl 3.10.0-128Miroslav Grepl 3.10.0-127Miroslav Grepl 3.10.0-126Miroslav Grepl 3.10.0-125Miroslav Grepl 3.10.0-124Miroslav Grepl 3.10.0-123Miroslav Grepl 3.10.0-122Miroslav Grepl 3.10.0-121Miroslav Grepl 3.10.0-120Miroslav Grepl 3.10.0-119Miroslav Grepl 3.10.0-118Miroslav Grepl 3.10.0-117Miroslav Grepl 3.10.0-116Miroslav Grepl 3.10.0-115Miroslav Grepl 3.10.0-114Miroslav Grepl 3.10.0-113Miroslav Grepl 3.10.0-112Miroslav Grepl 3.10.0-111Miroslav Grepl 3.10.0-110Miroslav Grepl 3.10.0-109Miroslav Grepl 3.10.0-108Miroslav Grepl 3.10.0-107Miroslav Grepl 3.10.0-106Miroslav Grepl 3.10.0-105Miroslav Grepl 3.10.0-104Miroslav Grepl 3.10.0-103Miroslav Grepl 3.10.0-102Miroslav Grepl 3.10.0-101Miroslav Grepl 3.10.0-100Miroslav Grepl 3.10.0-99Miroslav Grepl 3.10.0-98Miroslav Grepl 3.10.0-97Miroslav Grepl 3.10.0-96Miroslav Grepl 3.10.0-95Miroslav Grepl 3.10.0-94Miroslav Grepl 3.10.0-93Miroslav Grepl 3.10.0-92Miroslav Grepl 3.10.0-91Miroslav Grepl 3.10.0-90Miroslav Grepl 3.10.0-89Miroslav Grepl 3.10.0-88Miroslav Grepl 3.10.0-87Miroslav Grepl 3.10.0-86Miroslav Grepl 3.10.0-85Miroslav Grepl 3.10.0-84Miroslav Grepl 3.10.0-83Miroslav Grepl 3.10.0-82Dan Walsh 3.10.0-81.2Miroslav Grepl 3.10.0-81Miroslav Grepl 3.10.0-80Miroslav Grepl 3.10.0-79Miroslav Grepl 3.10.0-78Miroslav Grepl 3.10.0-77Miroslav Grepl 3.10.0-76Miroslav Grepl 3.10.0-75Dan Walsh 3.10.0-74.2Miroslav Grepl 3.10.0-74Miroslav Grepl 3.10.0-73Miroslav Grepl 3.10.0-72Miroslav Grepl 3.10.0-71Miroslav Grepl 3.10.0-70Miroslav Grepl 3.10.0-69Miroslav Grepl 3.10.0-68Miroslav Grepl 3.10.0-67Miroslav Grepl 3.10.0-66Miroslav Grepl 3.10.0-65Miroslav Grepl 3.10.0-64Miroslav Grepl 3.10.0-63Miroslav Grepl 3.10.0-59Miroslav Grepl 3.10.0-58Dan Walsh 3.10.0-57Dan Walsh 3.10.0-56Dan Walsh 3.10.0-55.2Dan Walsh 3.10.0-55.1Miroslav Grepl 3.10.0-55Dan Walsh 3.10.0-54.1Miroslav Grepl 3.10.0-54Dan Walsh 3.10.0-53.1Miroslav Grepl 3.10.0-53Miroslav Grepl 3.10.0-52Miroslav Grepl 3.10.0-51Dan Walsh 3.10.0-50.2Dan Walsh 3.10.0-50.1Miroslav Grepl 3.10.0-50Miroslav Grepl 3.10.0-49Miroslav Grepl 3.10.0-48Miroslav Grepl 3.10.0-47Dan Walsh 3.10.0-46.1Miroslav Grepl 3.10.0-46Dan Walsh 3.10.0-45.1Miroslav Grepl 3.10.0-45Miroslav Grepl 3.10.0-43Miroslav Grepl 3.10.0-42Miroslav Grepl 3.10.0-41Dan Walsh 3.10.0-40.2Miroslav Grepl 3.10.0-40Dan Walsh 3.10.0-39.3Dan Walsh 3.10.0-39.2Dan Walsh 3.10.0-39.1Miroslav Grepl 3.10.0-39Dan Walsh 3.10.0-38.1Miroslav Grepl 3.10.0-38Miroslav Grepl 3.10.0-37Dan Walsh 3.10.0-36.1Miroslav Grepl 3.10.0-36Dan Walsh 3.10.0-35Dan Walsh 3.10.0-34.7Dan Walsh 3.10.0-34.6Dan Walsh 3.10.0-34.4Miroslav Grepl 3.10.0-34.3Dan Walsh 3.10.0-34.2Dan Walsh 3.10.0-34.1Miroslav Grepl 3.10.0-34Miroslav Grepl 3.10.0-33Dan Walsh 3.10.0-31.1Miroslav Grepl 3.10.0-31Miroslav Grepl 3.10.0-29Miroslav Grepl 3.10.0-28Miroslav Grepl 3.10.0-27Miroslav Grepl 3.10.0-26Miroslav Grepl 3.10.0-25Miroslav Grepl 3.10.0-24Miroslav Grepl 3.10.0-23Miroslav Grepl 3.10.0-22Miroslav Grepl 3.10.0-21Dan Walsh 3.10.0-20Miroslav Grepl 3.10.0-19Miroslav Grepl 3.10.0-18Miroslav Grepl 3.10.0-17Miroslav Grepl 3.10.0-16Miroslav Grepl 3.10.0-14Miroslav Grepl 3.10.0-13Miroslav Grepl 3.10.0-12Miroslav Grepl 3.10.0-11Miroslav Grepl 3.10.0-10Miroslav Grepl 3.10.0-9Miroslav Grepl 3.10.0-8Miroslav Grepl 3.10.0-7Miroslav Grepl 3.10.0-6Miroslav Grepl 3.10.0-5Miroslav Grepl 3.10.0-4Miroslav Grepl 3.10.0-3Miroslav Grepl 3.10.0-2Miroslav Grepl 3.10.0-1Miroslav Grepl 3.9.16-30Dan Walsh 3.9.16-29.1Miroslav Grepl 3.9.16-29Dan Walsh 3.9.16-28.1Miroslav Grepl 3.9.16-27Miroslav Grepl 3.9.16-26Miroslav Grepl 3.9.16-25Miroslav Grepl 3.9.16-24Miroslav Grepl 3.9.16-23Miroslav Grepl 3.9.16-22Miroslav Grepl 3.9.16-21Miroslav Grepl 3.9.16-20Miroslav Grepl 3.9.16-19Miroslav Grepl 3.9.16-18Miroslav Grepl 3.9.16-17Dan Walsh 3.9.16-16.1Miroslav Grepl 3.9.16-16Miroslav Grepl 3.9.16-15Miroslav Grepl 3.9.16-14Miroslav Grepl 3.9.16-13Miroslav Grepl 3.9.16-12Miroslav Grepl 3.9.16-11Miroslav Grepl 3.9.16-10Miroslav Grepl 3.9.16-7Miroslav Grepl 3.9.16-6Miroslav Grepl 3.9.16-5Miroslav Grepl 3.9.16-4Miroslav Grepl 3.9.16-3Miroslav Grepl 3.9.16-2Miroslav Grepl 3.9.16-1Miroslav Grepl 3.9.15-5Miroslav Grepl 3.9.15-2Miroslav Grepl 3.9.15-1Fedora Release Engineering - 3.9.14-2Dan Walsh 3.9.14-1Miroslav Grepl 3.9.13-10Miroslav Grepl 3.9.13-9Dan Walsh 3.9.13-8Miroslav Grepl 3.9.13-7Miroslav Grepl 3.9.13-6Miroslav Grepl 3.9.13-5Miroslav Grepl 3.9.13-4Miroslav Grepl 3.9.13-3Miroslav Grepl 3.9.13-2Miroslav Grepl 3.9.13-1Miroslav Grepl 3.9.12-8Miroslav Grepl 3.9.12-7Miroslav Grepl 3.9.12-6Miroslav Grepl 3.9.12-5Dan Walsh 3.9.12-4Dan Walsh 3.9.12-3Dan Walsh 3.9.12-2Miroslav Grepl 3.9.12-1Dan Walsh 3.9.11-2Miroslav Grepl 3.9.11-1Miroslav Grepl 3.9.10-13Dan Walsh 3.9.10-12Miroslav Grepl 3.9.10-11Miroslav Grepl 3.9.10-10Miroslav Grepl 3.9.10-9Miroslav Grepl 3.9.10-8Miroslav Grepl 3.9.10-7Miroslav Grepl 3.9.10-6Miroslav Grepl 3.9.10-5Dan Walsh 3.9.10-4Miroslav Grepl 3.9.10-3Miroslav Grepl 3.9.10-2Miroslav Grepl 3.9.10-1Miroslav Grepl 3.9.9-4Dan Walsh 3.9.9-3Miroslav Grepl 3.9.9-2Miroslav Grepl 3.9.9-1Miroslav Grepl 3.9.8-7Dan Walsh 3.9.8-6Miroslav Grepl 3.9.8-5Miroslav Grepl 3.9.8-4Dan Walsh 3.9.8-3Dan Walsh 3.9.8-2Dan Walsh 3.9.8-1Dan Walsh 3.9.7-10Dan Walsh 3.9.7-9Dan Walsh 3.9.7-8Dan Walsh 3.9.7-7Dan Walsh 3.9.7-6Dan Walsh 3.9.7-5Dan Walsh 3.9.7-4Dan Walsh 3.9.7-3Dan Walsh 3.9.7-2Dan Walsh 3.9.7-1Dan Walsh 3.9.6-3Dan Walsh 3.9.6-2Dan Walsh 3.9.6-1Dan Walsh 3.9.5-11Dan Walsh 3.9.5-10Dan Walsh 3.9.5-9Dan Walsh 3.9.5-8Dan Walsh 3.9.5-7Dan Walsh 3.9.5-6Dan Walsh 3.9.5-5Dan Walsh 3.9.5-4Dan Walsh 3.9.5-3Dan Walsh 3.9.5-2Dan Walsh 3.9.5-1Dan Walsh 3.9.4-3Dan Walsh 3.9.4-2Dan Walsh 3.9.4-1Dan Walsh 3.9.3-4Dan Walsh 3.9.3-3Dan Walsh 3.9.3-2Dan Walsh 3.9.3-1Dan Walsh 3.9.2-1Dan Walsh 3.9.1-3Dan Walsh 3.9.1-2Dan Walsh 3.9.1-1Dan Walsh 3.9.0-2Dan Walsh 3.9.0-1Dan Walsh 3.8.8-21Dan Walsh 3.8.8-20Dan Walsh 3.8.8-19Dan Walsh 3.8.8-18Dan Walsh 3.8.8-17Dan Walsh 3.8.8-16Dan Walsh 3.8.8-15Dan Walsh 3.8.8-14Dan Walsh 3.8.8-13Dan Walsh 3.8.8-12Dan Walsh 3.8.8-11Dan Walsh 3.8.8-10Dan Walsh 3.8.8-9Dan Walsh 3.8.8-8Dan Walsh 3.8.8-7Dan Walsh 3.8.8-6Dan Walsh 3.8.8-5Dan Walsh 3.8.8-4Dan Walsh 3.8.8-3Dan Walsh 3.8.8-2Dan Walsh 3.8.8-1Dan Walsh 3.8.7-3Dan Walsh 3.8.7-2Dan Walsh 3.8.7-1Dan Walsh 3.8.6-3Miroslav Grepl 3.8.6-2Dan Walsh 3.8.6-1Dan Walsh 3.8.5-1Dan Walsh 3.8.4-1Dan Walsh 3.8.3-4Dan Walsh 3.8.3-3Dan Walsh 3.8.3-2Dan Walsh 3.8.3-1Dan Walsh 3.8.2-1Dan Walsh 3.8.1-5Dan Walsh 3.8.1-4Dan Walsh 3.8.1-3Dan Walsh 3.8.1-2Dan Walsh 3.8.1-1Dan Walsh 3.7.19-22Dan Walsh 3.7.19-21Dan Walsh 3.7.19-20Dan Walsh 3.7.19-19Dan Walsh 3.7.19-17Dan Walsh 3.7.19-16Dan Walsh 3.7.19-15Dan Walsh 3.7.19-14Dan Walsh 3.7.19-13Dan Walsh 3.7.19-12Dan Walsh 3.7.19-11Dan Walsh 3.7.19-10Dan Walsh 3.7.19-9Dan Walsh 3.7.19-8Dan Walsh 3.7.19-7Dan Walsh 3.7.19-6Dan Walsh 3.7.19-5Dan Walsh 3.7.19-4Dan Walsh 3.7.19-3Dan Walsh 3.7.19-2Dan Walsh 3.7.19-1Dan Walsh 3.7.18-3Dan Walsh 3.7.18-2Dan Walsh 3.7.18-1Dan Walsh 3.7.17-6Dan Walsh 3.7.17-5Dan Walsh 3.7.17-4Dan Walsh 3.7.17-3Dan Walsh 3.7.17-2Dan Walsh 3.7.17-1Dan Walsh 3.7.16-2Dan Walsh 3.7.16-1Dan Walsh 3.7.15-4Dan Walsh 3.7.15-3Dan Walsh 3.7.15-2Dan Walsh 3.7.15-1Dan Walsh 3.7.14-5Dan Walsh 3.7.14-4Dan Walsh 3.7.14-3Dan Walsh 3.7.14-2Dan Walsh 3.7.14-1Dan Walsh 3.7.13-4Dan Walsh 3.7.13-3Dan Walsh 3.7.13-2Dan Walsh 3.7.13-1Dan Walsh 3.7.12-1Dan Walsh 3.7.11-1Dan Walsh 3.7.10-5Dan Walsh 3.7.10-4Dan Walsh 3.7.10-3Dan Walsh 3.7.10-2Dan Walsh 3.7.10-1Dan Walsh 3.7.9-4Dan Walsh 3.7.9-3Dan Walsh 3.7.9-2Dan Walsh 3.7.9-1Dan Walsh 3.7.8-11Dan Walsh 3.7.8-9Dan Walsh 3.7.8-8Dan Walsh 3.7.8-7Dan Walsh 3.7.8-6Dan Walsh 3.7.8-5Dan Walsh 3.7.8-4Dan Walsh 3.7.8-3Dan Walsh 3.7.8-2Dan Walsh 3.7.8-1Dan Walsh 3.7.7-3Dan Walsh 3.7.7-2Dan Walsh 3.7.7-1Dan Walsh 3.7.6-1Dan Walsh 3.7.5-8Dan Walsh 3.7.5-7Dan Walsh 3.7.5-6Dan Walsh 3.7.5-5Dan Walsh 3.7.5-4Dan Walsh 3.7.5-3Dan Walsh 3.7.5-2Dan Walsh 3.7.5-1Dan Walsh 3.7.4-4Dan Walsh 3.7.4-3Dan Walsh 3.7.4-2Dan Walsh 3.7.4-1Dan Walsh 3.7.3-1Dan Walsh 3.7.1-1Dan Walsh 3.6.33-2Dan Walsh 3.6.33-1Dan Walsh 3.6.32-17Dan Walsh 3.6.32-16Dan Walsh 3.6.32-15Dan Walsh 3.6.32-13Dan Walsh 3.6.32-12Dan Walsh 3.6.32-11Dan Walsh 3.6.32-10Dan Walsh 3.6.32-9Dan Walsh 3.6.32-8Dan Walsh 3.6.32-7Dan Walsh 3.6.32-6Dan Walsh 3.6.32-5Dan Walsh 3.6.32-4Dan Walsh 3.6.32-3Dan Walsh 3.6.32-2Dan Walsh 3.6.32-1Dan Walsh 3.6.31-5Dan Walsh 3.6.31-4Dan Walsh 3.6.31-3Dan Walsh 3.6.31-2Dan Walsh 3.6.30-6Dan Walsh 3.6.30-5Dan Walsh 3.6.30-4Dan Walsh 3.6.30-3Dan Walsh 3.6.30-2Dan Walsh 3.6.30-1Dan Walsh 3.6.29-2Dan Walsh 3.6.29-1Dan Walsh 3.6.28-9Dan Walsh 3.6.28-8Dan Walsh 3.6.28-7Dan Walsh 3.6.28-6Dan Walsh 3.6.28-5Dan Walsh 3.6.28-4Dan Walsh 3.6.28-3Dan Walsh 3.6.28-2Dan Walsh 3.6.28-1Dan Walsh 3.6.27-1Dan Walsh 3.6.26-11Dan Walsh 3.6.26-10Dan Walsh 3.6.26-9Bill Nottingham 3.6.26-8Dan Walsh 3.6.26-7Dan Walsh 3.6.26-6Dan Walsh 3.6.26-5Dan Walsh 3.6.26-4Dan Walsh 3.6.26-3Dan Walsh 3.6.26-2Dan Walsh 3.6.26-1Dan Walsh 3.6.25-1Dan Walsh 3.6.24-1Dan Walsh 3.6.23-2Dan Walsh 3.6.23-1Dan Walsh 3.6.22-3Dan Walsh 3.6.22-1Dan Walsh 3.6.21-4Dan Walsh 3.6.21-3Tom "spot" Callaway 3.6.21-2Dan Walsh 3.6.21-1Dan Walsh 3.6.20-2Dan Walsh 3.6.20-1Dan Walsh 3.6.19-5Dan Walsh 3.6.19-4Dan Walsh 3.6.19-3Dan Walsh 3.6.19-2Dan Walsh 3.6.19-1Dan Walsh 3.6.18-1Dan Walsh 3.6.17-1Dan Walsh 3.6.16-4Dan Walsh 3.6.16-3Dan Walsh 3.6.16-2Dan Walsh 3.6.16-1Dan Walsh 3.6.14-3Dan Walsh 3.6.14-2Dan Walsh 3.6.14-1Dan Walsh 3.6.13-3Dan Walsh 3.6.13-2Dan Walsh 3.6.13-1Dan Walsh 3.6.12-39Dan Walsh 3.6.12-38Dan Walsh 3.6.12-37Dan Walsh 3.6.12-36Dan Walsh 3.6.12-35Dan Walsh 3.6.12-34Dan Walsh 3.6.12-33Dan Walsh 3.6.12-31Dan Walsh 3.6.12-30Dan Walsh 3.6.12-29Dan Walsh 3.6.12-28Dan Walsh 3.6.12-27Dan Walsh 3.6.12-26Dan Walsh 3.6.12-25Dan Walsh 3.6.12-24Dan Walsh 3.6.12-23Dan Walsh 3.6.12-22Dan Walsh 3.6.12-21Dan Walsh 3.6.12-20Dan Walsh 3.6.12-19Dan Walsh 3.6.12-16Dan Walsh 3.6.12-15Dan Walsh 3.6.12-14Dan Walsh 3.6.12-13Dan Walsh 3.6.12-12Dan Walsh 3.6.12-11Dan Walsh 3.6.12-10Dan Walsh 3.6.12-9Dan Walsh 3.6.12-8Dan Walsh 3.6.12-7Dan Walsh 3.6.12-6Dan Walsh 3.6.12-5Dan Walsh 3.6.12-4Dan Walsh 3.6.12-3Dan Walsh 3.6.12-2Dan Walsh 3.6.12-1Dan Walsh 3.6.11-1Dan Walsh 3.6.10-9Dan Walsh 3.6.10-8Dan Walsh 3.6.10-7Dan Walsh 3.6.10-6Dan Walsh 3.6.10-5Dan Walsh 3.6.10-4Dan Walsh 3.6.10-3Dan Walsh 3.6.10-2Dan Walsh 3.6.10-1Dan Walsh 3.6.9-4Dan Walsh 3.6.9-3Dan Walsh 3.6.9-2Dan Walsh 3.6.9-1Dan Walsh 3.6.8-4Dan Walsh 3.6.8-3Dan Walsh 3.6.8-2Dan Walsh 3.6.8-1Dan Walsh 3.6.7-2Dan Walsh 3.6.7-1Dan Walsh 3.6.6-9Dan Walsh 3.6.6-8Fedora Release Engineering - 3.6.6-7Dan Walsh 3.6.6-6Dan Walsh 3.6.6-5Dan Walsh 3.6.6-4Dan Walsh 3.6.6-3Dan Walsh 3.6.6-2Dan Walsh 3.6.6-1Dan Walsh 3.6.5-3Dan Walsh 3.6.5-1Dan Walsh 3.6.4-6Dan Walsh 3.6.4-5Dan Walsh 3.6.4-4Dan Walsh 3.6.4-3Dan Walsh 3.6.4-2Dan Walsh 3.6.4-1Dan Walsh 3.6.3-13Dan Walsh 3.6.3-12Dan Walsh 3.6.3-11Dan Walsh 3.6.3-10Dan Walsh 3.6.3-9Dan Walsh 3.6.3-8Dan Walsh 3.6.3-7Dan Walsh 3.6.3-6Dan Walsh 3.6.3-3Dan Walsh 3.6.3-2Dan Walsh 3.6.3-1Dan Walsh 3.6.2-5Dan Walsh 3.6.2-4Dan Walsh 3.6.2-3Dan Walsh 3.6.2-2Dan Walsh 3.6.2-1Dan Walsh 3.6.1-15Dan Walsh 3.6.1-14Dan Walsh 3.6.1-13Dan Walsh 3.6.1-12Dan Walsh 3.6.1-11Dan Walsh 3.6.1-10Dan Walsh 3.6.1-9Dan Walsh 3.6.1-8Dan Walsh 3.6.1-7Dan Walsh 3.6.1-4Ignacio Vazquez-Abrams - 3.6.1-2Dan Walsh 3.5.13-19Dan Walsh 3.5.13-18Dan Walsh 3.5.13-17Dan Walsh 3.5.13-16Dan Walsh 3.5.13-15Dan Walsh 3.5.13-14Dan Walsh 3.5.13-13Dan Walsh 3.5.13-12Dan Walsh 3.5.13-11Dan Walsh 3.5.13-9Dan Walsh 3.5.13-8Dan Walsh 3.5.13-7Dan Walsh 3.5.13-6Dan Walsh 3.5.13-5Dan Walsh 3.5.13-4Dan Walsh 3.5.13-3Dan Walsh 3.5.13-2Dan Walsh 3.5.13-1Dan Walsh 3.5.12-3Dan Walsh 3.5.12-2Dan Walsh 3.5.12-1Dan Walsh 3.5.11-1Dan Walsh 3.5.10-3Dan Walsh 3.5.10-2Dan Walsh 3.5.10-1Dan Walsh 3.5.9-4Dan Walsh 3.5.9-3Dan Walsh 3.5.9-2Dan Walsh 3.5.9-1Dan Walsh 3.5.8-7Dan Walsh 3.5.8-6Dan Walsh 3.5.8-5Dan Walsh 3.5.8-4Dan Walsh 3.5.8-3Dan Walsh 3.5.8-1Dan Walsh 3.5.7-2Dan Walsh 3.5.7-1Dan Walsh 3.5.6-2Dan Walsh 3.5.6-1Dan Walsh 3.5.5-4Dan Walsh 3.5.5-3Dan Walsh 3.5.5-2Dan Walsh 3.5.4-2Dan Walsh 3.5.4-1Dan Walsh 3.5.3-1Dan Walsh 3.5.2-2Dan Walsh 3.5.1-5Dan Walsh 3.5.1-4Dan Walsh 3.5.1-3Dan Walsh 3.5.1-2Dan Walsh 3.5.1-1Dan Walsh 3.5.0-1Dan Walsh 3.4.2-14Dan Walsh 3.4.2-13Dan Walsh 3.4.2-12Dan Walsh 3.4.2-11Dan Walsh 3.4.2-10Dan Walsh 3.4.2-9Dan Walsh 3.4.2-8Dan Walsh 3.4.2-7Dan Walsh 3.4.2-6Dan Walsh 3.4.2-5Dan Walsh 3.4.2-4Dan Walsh 3.4.2-3Dan Walsh 3.4.2-2Dan Walsh 3.4.2-1Dan Walsh 3.4.1-5Dan Walsh 3.4.1-3Dan Walsh 3.4.1-2Dan Walsh 3.4.1-1Dan Walsh 3.3.1-48Dan Walsh 3.3.1-47Dan Walsh 3.3.1-46Dan Walsh 3.3.1-45Dan Walsh 3.3.1-44Dan Walsh 3.3.1-43Dan Walsh 3.3.1-42Dan Walsh 3.3.1-41Dan Walsh 3.3.1-39Dan Walsh 3.3.1-37Dan Walsh 3.3.1-36Dan Walsh 3.3.1-33Dan Walsh 3.3.1-32Dan Walsh 3.3.1-31Dan Walsh 3.3.1-30Dan Walsh 3.3.1-29Dan Walsh 3.3.1-28Dan Walsh 3.3.1-27Dan Walsh 3.3.1-26Dan Walsh 3.3.1-25Dan Walsh 3.3.1-24Dan Walsh 3.3.1-23Dan Walsh 3.3.1-22Dan Walsh 3.3.1-21Dan Walsh 3.3.1-20Dan Walsh 3.3.1-19Dan Walsh 3.3.1-18Dan Walsh 3.3.1-17Dan Walsh 3.3.1-16Dan Walsh 3.3.1-15Bill Nottingham 3.3.1-14Dan Walsh 3.3.1-13Dan Walsh 3.3.1-12Dan Walsh 3.3.1-11Dan Walsh 3.3.1-10Dan Walsh 3.3.1-9Dan Walsh 3.3.1-8Dan Walsh 3.3.1-6Dan Walsh 3.3.1-5Dan Walsh 3.3.1-4Dan Walsh 3.3.1-2Dan Walsh 3.3.1-1Dan Walsh 3.3.0-2Dan Walsh 3.3.0-1Dan Walsh 3.2.9-2Dan Walsh 3.2.9-1Dan Walsh 3.2.8-2Dan Walsh 3.2.8-1Dan Walsh 3.2.7-6Dan Walsh 3.2.7-5Dan Walsh 3.2.7-3Dan Walsh 3.2.7-2Dan Walsh 3.2.7-1Dan Walsh 3.2.6-7Dan Walsh 3.2.6-6Dan Walsh 3.2.6-5Dan Walsh 3.2.6-4Dan Walsh 3.2.6-3Dan Walsh 3.2.6-2Dan Walsh 3.2.6-1Dan Walsh 3.2.5-25Dan Walsh 3.2.5-24Dan Walsh 3.2.5-22Dan Walsh 3.2.5-21Dan Walsh 3.2.5-20Dan Walsh 3.2.5-19Dan Walsh 3.2.5-18Dan Walsh 3.2.5-17Dan Walsh 3.2.5-16Dan Walsh 3.2.5-15Dan Walsh 3.2.5-14Dan Walsh 3.2.5-13Dan Walsh 3.2.5-12Dan Walsh 3.2.5-11Dan Walsh 3.2.5-10Dan Walsh 3.2.5-9Dan Walsh 3.2.5-8Dan Walsh 3.2.5-7Dan Walsh 3.2.5-6Dan Walsh 3.2.5-5Dan Walsh 3.2.5-4Dan Walsh 3.2.5-3Dan Walsh 3.2.5-2Dan Walsh 3.2.5-1Dan Walsh 3.2.4-5Dan Walsh 3.2.4-4Dan Walsh 3.2.4-3Dan Walsh 3.2.4-1Dan Walsh 3.2.4-1Dan Walsh 3.2.3-2Dan Walsh 3.2.3-1Dan Walsh 3.2.2-1Dan Walsh 3.2.1-3Dan Walsh 3.2.1-1Dan Walsh 3.1.2-2Dan Walsh 3.1.2-1Dan Walsh 3.1.1-1Dan Walsh 3.1.0-1Dan Walsh 3.0.8-30Dan Walsh 3.0.8-28Dan Walsh 3.0.8-27Dan Walsh 3.0.8-26Dan Walsh 3.0.8-25Dan Walsh 3.0.8-24Dan Walsh 3.0.8-23Dan Walsh 3.0.8-22Dan Walsh 3.0.8-21Dan Walsh 3.0.8-20Dan Walsh 3.0.8-19Dan Walsh 3.0.8-18Dan Walsh 3.0.8-17Dan Walsh 3.0.8-16Dan Walsh 3.0.8-15Dan Walsh 3.0.8-14Dan Walsh 3.0.8-13Dan Walsh 3.0.8-12Dan Walsh 3.0.8-11Dan Walsh 3.0.8-10Dan Walsh 3.0.8-9Dan Walsh 3.0.8-8Dan Walsh 3.0.8-7Dan Walsh 3.0.8-5Dan Walsh 3.0.8-4Dan Walsh 3.0.8-3Dan Walsh 3.0.8-2Dan Walsh 3.0.8-1Dan Walsh 3.0.7-10Dan Walsh 3.0.7-9Dan Walsh 3.0.7-8Dan Walsh 3.0.7-7Dan Walsh 3.0.7-6Dan Walsh 3.0.7-5Dan Walsh 3.0.7-4Dan Walsh 3.0.7-3Dan Walsh 3.0.7-2Dan Walsh 3.0.7-1Dan Walsh 3.0.6-3Dan Walsh 3.0.6-2Dan Walsh 3.0.6-1Dan Walsh 3.0.5-11Dan Walsh 3.0.5-10Dan Walsh 3.0.5-9Dan Walsh 3.0.5-8Dan Walsh 3.0.5-7Dan Walsh 3.0.5-6Dan Walsh 3.0.5-5Dan Walsh 3.0.5-4Dan Walsh 3.0.5-3Dan Walsh 3.0.5-2Dan Walsh 3.0.5-1Dan Walsh 3.0.4-6Dan Walsh 3.0.4-5Dan Walsh 3.0.4-4Dan Walsh 3.0.4-3Dan Walsh 3.0.4-2Dan Walsh 3.0.4-1Dan Walsh 3.0.3-6Dan Walsh 3.0.3-5Dan Walsh 3.0.3-4Dan Walsh 3.0.3-3Dan Walsh 3.0.3-2Dan Walsh 3.0.3-1Dan Walsh 3.0.2-9Dan Walsh 3.0.2-8Dan Walsh 3.0.2-7Dan Walsh 3.0.2-5Dan Walsh 3.0.2-4Dan Walsh 3.0.2-3Dan Walsh 3.0.2-2Dan Walsh 3.0.1-5Dan Walsh 3.0.1-4Dan Walsh 3.0.1-3Dan Walsh 3.0.1-2Dan Walsh 3.0.1-1Dan Walsh 2.6.5-3Dan Walsh 2.6.5-2Dan Walsh 2.6.4-7Dan Walsh 2.6.4-6Dan Walsh 2.6.4-5Dan Walsh 2.6.4-2Dan Walsh 2.6.4-1Dan Walsh 2.6.3-1Dan Walsh 2.6.2-1Dan Walsh 2.6.1-4Dan Walsh 2.6.1-2Dan Walsh 2.6.1-1Dan Walsh 2.5.12-12Dan Walsh 2.5.12-11Dan Walsh 2.5.12-10Dan Walsh 2.5.12-8Dan Walsh 2.5.12-5Dan Walsh 2.5.12-4Dan Walsh 2.5.12-3Dan Walsh 2.5.12-2Dan Walsh 2.5.12-1Dan Walsh 2.5.11-8Dan Walsh 2.5.11-7Dan Walsh 2.5.11-6Dan Walsh 2.5.11-5Dan Walsh 2.5.11-4Dan Walsh 2.5.11-3Dan Walsh 2.5.11-2Dan Walsh 2.5.11-1Dan Walsh 2.5.10-2Dan Walsh 2.5.10-1Dan Walsh 2.5.9-6Dan Walsh 2.5.9-5Dan Walsh 2.5.9-4Dan Walsh 2.5.9-3Dan Walsh 2.5.9-2Dan Walsh 2.5.8-8Dan Walsh 2.5.8-7Dan Walsh 2.5.8-6Dan Walsh 2.5.8-5Dan Walsh 2.5.8-4Dan Walsh 2.5.8-3Dan Walsh 2.5.8-2Dan Walsh 2.5.8-1Dan Walsh 2.5.7-1Dan Walsh 2.5.6-1Dan Walsh 2.5.5-2Dan Walsh 2.5.5-1Dan Walsh 2.5.4-2Dan Walsh 2.5.4-1Dan Walsh 2.5.3-3Dan Walsh 2.5.3-2Dan Walsh 2.5.3-1Dan Walsh 2.5.2-6Dan Walsh 2.5.2-5Dan Walsh 2.5.2-4Dan Walsh 2.5.2-3Dan Walsh 2.5.2-2Dan Walsh 2.5.2-1Dan Walsh 2.5.1-5Dan Walsh 2.5.1-4Dan Walsh 2.5.1-2Dan Walsh 2.5.1-1Dan Walsh 2.4.6-20Dan Walsh 2.4.6-19Dan Walsh 2.4.6-18Dan Walsh 2.4.6-17Dan Walsh 2.4.6-16Dan Walsh 2.4.6-15Dan Walsh 2.4.6-14Dan Walsh 2.4.6-13Dan Walsh 2.4.6-12Dan Walsh 2.4.6-11Dan Walsh 2.4.6-10Dan Walsh 2.4.6-9Dan Walsh 2.4.6-8Dan Walsh 2.4.6-7Dan Walsh 2.4.6-6Dan Walsh 2.4.6-5Dan Walsh 2.4.6-4Dan Walsh 2.4.6-3Dan Walsh 2.4.6-1Dan Walsh 2.4.5-4Dan Walsh 2.4.5-3Dan Walsh 2.4.5-2Dan Walsh 2.4.5-1Dan Walsh 2.4.4-2Dan Walsh 2.4.4-2Dan Walsh 2.4.4-1Dan Walsh 2.4.3-13Dan Walsh 2.4.3-12Dan Walsh 2.4.3-11Dan Walsh 2.4.3-10Dan Walsh 2.4.3-9Dan Walsh 2.4.3-8Dan Walsh 2.4.3-7Dan Walsh 2.4.3-6Dan Walsh 2.4.3-5Dan Walsh 2.4.3-4Dan Walsh 2.4.3-3Dan Walsh 2.4.3-2Dan Walsh 2.4.3-1Dan Walsh 2.4.2-8Dan Walsh 2.4.2-7James Antill 2.4.2-6Dan Walsh 2.4.2-5Dan Walsh 2.4.2-4Dan Walsh 2.4.2-3Dan Walsh 2.4.2-2Dan Walsh 2.4.2-1Dan Walsh 2.4.1-5Dan Walsh 2.4.1-4Dan Walsh 2.4.1-3Dan Walsh 2.4.1-2Dan Walsh 2.4-4Dan Walsh 2.4-3Dan Walsh 2.4-2Dan Walsh 2.4-1Dan Walsh 2.3.19-4Dan Walsh 2.3.19-3Dan Walsh 2.3.19-2Dan Walsh 2.3.19-1James Antill 2.3.18-10James Antill 2.3.18-9Dan Walsh 2.3.18-8Dan Walsh 2.3.18-7Dan Walsh 2.3.18-6Dan Walsh 2.3.18-5Dan Walsh 2.3.18-4Dan Walsh 2.3.18-3Dan Walsh 2.3.18-2Dan Walsh 2.3.18-1Dan Walsh 2.3.17-2Dan Walsh 2.3.17-1Dan Walsh 2.3.16-9Dan Walsh 2.3.16-8Dan Walsh 2.3.16-7Dan Walsh 2.3.16-6Dan Walsh 2.3.16-5Dan Walsh 2.3.16-4Dan Walsh 2.3.16-2Dan Walsh 2.3.16-1Dan Walsh 2.3.15-2Dan Walsh 2.3.15-1Dan Walsh 2.3.14-8Dan Walsh 2.3.14-7Dan Walsh 2.3.14-6Dan Walsh 2.3.14-4Dan Walsh 2.3.14-3Dan Walsh 2.3.14-2Dan Walsh 2.3.14-1Dan Walsh 2.3.13-6Dan Walsh 2.3.13-5Dan Walsh 2.3.13-4Dan Walsh 2.3.13-3Dan Walsh 2.3.13-2Dan Walsh 2.3.13-1Dan Walsh 2.3.12-2Dan Walsh 2.3.12-1Dan Walsh 2.3.11-1Dan Walsh 2.3.10-7Dan Walsh 2.3.10-6Dan Walsh 2.3.10-3Dan Walsh 2.3.10-1Dan Walsh 2.3.9-6Dan Walsh 2.3.9-5Dan Walsh 2.3.9-4Dan Walsh 2.3.9-3Dan Walsh 2.3.9-2Dan Walsh 2.3.9-1Dan Walsh 2.3.8-2Dan Walsh 2.3.7-1Dan Walsh 2.3.6-4Dan Walsh 2.3.6-3Dan Walsh 2.3.6-2Dan Walsh 2.3.6-1Dan Walsh 2.3.5-1Dan Walsh 2.3.4-1Dan Walsh 2.3.3-20Dan Walsh 2.3.3-19Dan Walsh 2.3.3-18Dan Walsh 2.3.3-17Dan Walsh 2.3.3-16Dan Walsh 2.3.3-15Dan Walsh 2.3.3-14Dan Walsh 2.3.3-13Dan Walsh 2.3.3-12Dan Walsh 2.3.3-11Dan Walsh 2.3.3-10Dan Walsh 2.3.3-9Dan Walsh 2.3.3-8Dan Walsh 2.3.3-7Dan Walsh 2.3.3-6Dan Walsh 2.3.3-5Dan Walsh 2.3.3-4Dan Walsh 2.3.3-3Dan Walsh 2.3.3-2Dan Walsh 2.3.3-1Dan Walsh 2.3.2-4Dan Walsh 2.3.2-3Dan Walsh 2.3.2-2Dan Walsh 2.3.2-1Dan Walsh 2.3.1-1Dan Walsh 2.2.49-1Dan Walsh 2.2.48-1Dan Walsh 2.2.47-5Dan Walsh 2.2.47-4Dan Walsh 2.2.47-3Dan Walsh 2.2.47-1Dan Walsh 2.2.46-2Dan Walsh 2.2.46-1Dan Walsh 2.2.45-3Dan Walsh 2.2.45-2Dan Walsh 2.2.45-1Dan Walsh 2.2.44-1Dan Walsh 2.2.43-4Dan Walsh 2.2.43-3Dan Walsh 2.2.43-2Dan Walsh 2.2.43-1Dan Walsh 2.2.42-4Dan Walsh 2.2.42-3Dan Walsh 2.2.42-2Dan Walsh 2.2.42-1Dan Walsh 2.2.41-1Dan Walsh 2.2.40-2Dan Walsh 2.2.40-1Dan Walsh 2.2.39-2Dan Walsh 2.2.39-1Dan Walsh 2.2.38-6Dan Walsh 2.2.38-5Dan Walsh 2.2.38-4Dan Walsh 2.2.38-3Dan Walsh 2.2.38-2Dan Walsh 2.2.38-1Dan Walsh 2.2.37-1Dan Walsh 2.2.36-2Dan Walsh 2.2.36-1James Antill 2.2.35-2Dan Walsh 2.2.35-1Dan Walsh 2.2.34-3Dan Walsh 2.2.34-2Dan Walsh 2.2.34-1Dan Walsh 2.2.33-1Dan Walsh 2.2.32-2Dan Walsh 2.2.32-1Dan Walsh 2.2.31-1Dan Walsh 2.2.30-2Dan Walsh 2.2.30-1Dan Walsh 2.2.29-6Russell Coker 2.2.29-5Dan Walsh 2.2.29-4Dan Walsh 2.2.29-3Dan Walsh 2.2.29-2Dan Walsh 2.2.29-1Dan Walsh 2.2.28-3Dan Walsh 2.2.28-2Dan Walsh 2.2.28-1Dan Walsh 2.2.27-1Dan Walsh 2.2.25-3Dan Walsh 2.2.25-2Dan Walsh 2.2.24-1Dan Walsh 2.2.23-19Dan Walsh 2.2.23-18Dan Walsh 2.2.23-17Karsten Hopp 2.2.23-16Dan Walsh 2.2.23-15Dan Walsh 2.2.23-14Dan Walsh 2.2.23-13Dan Walsh 2.2.23-12Jeremy Katz - 2.2.23-11Jeremy Katz - 2.2.23-10Dan Walsh 2.2.23-9Dan Walsh 2.2.23-8Dan Walsh 2.2.23-7Dan Walsh 2.2.23-5Dan Walsh 2.2.23-4Dan Walsh 2.2.23-3Dan Walsh 2.2.23-2Dan Walsh 2.2.23-1Dan Walsh 2.2.22-2Dan Walsh 2.2.22-1Dan Walsh 2.2.21-9Dan Walsh 2.2.21-8Dan Walsh 2.2.21-7Dan Walsh 2.2.21-6Dan Walsh 2.2.21-5Dan Walsh 2.2.21-4Dan Walsh 2.2.21-3Dan Walsh 2.2.21-2Dan Walsh 2.2.21-1Dan Walsh 2.2.20-1Dan Walsh 2.2.19-2Dan Walsh 2.2.19-1Dan Walsh 2.2.18-2Dan Walsh 2.2.18-1Dan Walsh 2.2.17-2Dan Walsh 2.2.16-1Dan Walsh 2.2.15-4Dan Walsh 2.2.15-3Dan Walsh 2.2.15-1Dan Walsh 2.2.14-2Dan Walsh 2.2.14-1Dan Walsh 2.2.13-1Dan Walsh 2.2.12-1Dan Walsh 2.2.11-2Dan Walsh 2.2.11-1Dan Walsh 2.2.10-1Dan Walsh 2.2.9-2Dan Walsh 2.2.9-1Dan Walsh 2.2.8-2Dan Walsh 2.2.7-1Dan Walsh 2.2.6-3Dan Walsh 2.2.6-2Dan Walsh 2.2.6-1Dan Walsh 2.2.5-1Dan Walsh 2.2.4-1Dan Walsh 2.2.3-1Dan Walsh 2.2.2-1Dan Walsh 2.2.1-1Dan Walsh 2.1.13-1Dan Walsh 2.1.12-3Dan Walsh 2.1.11-1Dan Walsh 2.1.10-1Jeremy Katz - 2.1.9-2Dan Walsh 2.1.9-1Dan Walsh 2.1.8-3Dan Walsh 2.1.8-2Dan Walsh 2.1.8-1Dan Walsh 2.1.7-4Dan Walsh 2.1.7-3Dan Walsh 2.1.7-2Dan Walsh 2.1.7-1Dan Walsh 2.1.6-24Dan Walsh 2.1.6-23Dan Walsh 2.1.6-22Dan Walsh 2.1.6-21Dan Walsh 2.1.6-20Dan Walsh 2.1.6-18Dan Walsh 2.1.6-17Dan Walsh 2.1.6-16Dan Walsh 2.1.6-15Dan Walsh 2.1.6-14Dan Walsh 2.1.6-13Dan Walsh 2.1.6-11Dan Walsh 2.1.6-10Dan Walsh 2.1.6-9Dan Walsh 2.1.6-8Dan Walsh 2.1.6-5Dan Walsh 2.1.6-4Dan Walsh 2.1.6-3Dan Walsh 2.1.6-2Dan Walsh 2.1.6-1Dan Walsh 2.1.4-2Dan Walsh 2.1.4-1Dan Walsh 2.1.3-1Jeremy Katz - 2.1.2-3Dan Walsh 2.1.2-2Dan Walsh 2.1.2-1Dan Walsh 2.1.1-3Dan Walsh 2.1.1-2Dan Walsh 2.1.1-1Dan Walsh 2.1.0-3Dan Walsh 2.1.0-2.Dan Walsh 2.1.0-1.Dan Walsh 2.0.11-2.Dan Walsh 2.0.11-1.Dan Walsh 2.0.9-1.Dan Walsh 2.0.8-1.Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.6-2Dan Walsh 2.0.5-4Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1- Allow certmonger to sends emails Resolves: rhbz#1588363- Allow snapperd_t domain to unmount fs_t filesystems Resolves: rhbz#1561424- Allow snapperd_t to set priority for kernel processes Resolves: rhbz#1558656- Backport several changes for snapperdfrom Fedora Rawhide Resolves: rhbz#1558656- Label /usr/libexec/dbus-1/dbus-daemon-launch-helper as dbusd_exec_t to have systemd dbus services running in the correct domain instead of unconfined_service_t if unconfined.pp module is enabled. Resolves: rhbz#1546721- Allow openvswitch_t stream connect svirt_t Resolves: rhbz#1540702- Allow openvswitch domain to manage svirt_tmp_t sock files Resolves: rhbz#1540702 - Fix broken systemd_tmpfiles_run() interface- Allow dirsrv_t domain to create tmp link files Resolves: rhbz#1536011 - Label /usr/sbin/ldap-agent as dirsrv_snmp_exec_t Resolves: rhbz#1428568 - Allow ipsec_mgmt_t execute ifconfig_exec_t binaries - Allow ipsec_mgmt_t nnp domain transition to ifconfig_t Resolves: rhbz#1539416- Allow svirt_domain to create socket files in /tmp with label svirt_tmp_t Resolves: rhbz#1540702 - Allow keepalived_t domain getattr proc filesystem Resolves: rhbz#1477542 - Rename svirt_sandbox_file_t to container_file_t and svirt_lxc_net_t to container_t Resolves: rhbz#1538544 - Allow ipsec_t nnp transistions to domains ipsec_mgmt_t and ifconfig_t Resolves: rhbz:#1539416 - Allow systemd_logind_t domain to bind on dhcpd_port_t,pki_ca_port_t,flash_port_t Resolves: rhbz#1479350- Allow openvswitch_t domain to read cpuid, write to sysfs files and creating openvswitch_tmp_t sockets Resolves: rhbz#1535196 - Add new interface ppp_filetrans_named_content() Resolves: rhbz#1530601 - Allow keepalived_t read sysctl_net_t files Resolves: rhbz#1477542 - Allow puppetmaster_t domtran to puppetagent_t Resolves: rhbz#1376893 - Allow kdump_t domain to read kernel ring buffer Resolves: rhbz#1540004 - Allow ipsec_t domain to exec ifconfig_exec_t binaries. Resolves: rhbz#1539416 - Allow unconfined_domain_typ to create pppd_lock_t directory in /var/lock Resolves: rhbz#1530601 - Allow updpwd_t domain to create files in /etc with shadow_t label Resolves: rhbz#1412838 - Allow iptables sysctl load list support with SELinux enforced Resolves: rhbz#1535572- Allow virt_domains to acces infiniband pkeys. Resolves: rhbz#1533183 - Label /usr/libexec/ipsec/addconn as ipsec_exec_t to run this script as ipsec_t instead of init_t Resolves: rhbz#1535133 - Allow audisp_remote_t domain write to files on all levels Resolves: rhbz#1534924- Allow vmtools_t domain creating vmware_log_t files Resolves: rhbz#1507048 - Allow openvswitch_t domain to acces infiniband devices Resolves: rhbz#1532705- Allow chronyc_t domain to manage chronyd_keys_t files. Resolves: rhbz#1530525 - Make virtlog_t domain system dbus client Resolves: rhbz#1481109 - Update openvswitch SELinux module Resolves: rhbz#1482682 - Allow virtd_t to create also sock_files with label virt_var_run_t Resolves: rhbz#1484075- Allow domains that manage logfiles to man logdirs Resolves: rhbz#1523811- Label /dev/drm_dp_aux* as xserver_misc_device_t Resolves: rhbz#1520897 - Allow sysadm_t to run puppet_exec_t binaries as puppet_t Resolves: rhbz#1255745- Allow tomcat_t to manage pki_tomcat pid files Resolves: rhbz#1478371 - networkmanager: allow talking to openvswitch Resolves: rhbz#1517247 - Allow networkmanager_t and opensm_t to manage subned endports for IPoIB VLANs Resolves: rhbz#1517895 - Allow domains networkmanager_t and opensm_t to control IPoIB VLANs Resolves: rhbz#1517744 - Fix typo in guest interface file Resolves: rhbz#1468254 - Allow isnsd_t domain to accept tcp connections. Resolves: rhbz#1390208- Allow getty to use usbttys Resolves: rhbz#1514235- Allow ldap_t domain to manage also slapd_tmp_t lnk files Resolves: rhbz#1510883 - Allow cluster_t domain creating bundles directory with label var_log_t instead of cluster_var_log_t Resolves: rhbz:#1508360 - Add dac_read_search and dac_override capabilities to ganesha Resolves: rhbz#1483451- Add dependency for policycoreutils-2.5.18 becuase of new cgroup_seclabel policy capability Resolves: rhbz#1510145- Allow jabber domains to connect to postgresql ports Resolves: rhbz#1438489 - Dontaudit accountsd domain creating dirs in /root Resolves: rhbz#1456760 - Dontaudit slapd_t to block suspend system Resolves: rhbz: #1479759 - Allow spamc_t to stream connect to cyrus. Resolves: rhbz#1382955 - allow imapd to read /proc/net/unix file Resolves: rhbz#1393030 - Allow passenger to connect to mysqld_port_t Resolves: rhbz#1433464- Allow chronyc_t domain to use user_ptys Resolves: rhbz#1470150 - allow ptp4l to read /proc/net/unix file - Allow conmand to use usb ttys. Resolves: rhbz#1505121 - Label all files /var/log/opensm.* as opensm_log_t because opensm creating new log files with name opensm-subnet.lst Resolves: rhbz#1505845 - Allow chronyd daemon to execute chronyc. Resolves: rhbz#1508486 - Allow firewalld exec ldconfig. Resolves: rhbz#1375576 - Allow mozilla_plugin_t domain to dbus chat with devicekit Resolves: rhbz#1460477 - Dontaudit leaked logwatch pipes Resolves: rhbz#1450119 - Label /usr/bin/VGAuthService as vmtools_exec_t to confine this daemon. Resolves: rhbz#1507048 - Allow httpd_t domain to execute hugetlbfs_t files Resolves: rhbz#1507682 - Allow nfsd_t domain to read configfs_t files/dirs Resolves: rhbz#1439442 - Hide all allow rules with ptrace inside deny_ptrace boolean Resolves: rhbz#1421075 - Allow tgtd_t domain to read generic certs Resolves: rhbz#1438532 - Allow ptp4l to send msgs via dgram socket to unprivileged user domains Resolves: rhbz#1429853 - Allow dirsrv_snmp_t to use inherited user ptys and read system state Resolves: rhbz#1428568 - Allow glusterd_t domain to create own tmpfs dirs/files Resolves: rhbz#1411310 - Allow keepalived stream connect to snmp Resolves: rhbz#1401556 - After fix in kernel where LSM hooks for dac_override and dac_search_read capability was swaped we need to fix it also in policy Resolves: rhbz#1507089- Allow pegasus_openlmi_services_t to read generic certs Resolves: rhbz#1462292 - Allow ganesha_t domain to read random device Resolves: rhbz#1494382 - Allow zabbix_t domain to change its resource limits Resolves: rhbz:#1504074 - Add new boolean nagios_use_nfs Resolves: rhbz#1504826 - Allow system_mail_t to search network sysctls Resolves: rhbz#1505779 - Add samba_manage_var_dirs() interface - Fix typo bug in virt filecontext file - Allow nagios_script_t to read nagios_spool_t files Resolves: rhbz#1426824 - Allow samba to manage var dirs/files Resolves: rhbz#1415088 - Allow sbd_t to create own sbd_tmpfs_t dirs/files Resolves: rhbz#1380795 - Allow firewalld and networkmanager to chat with hypervkvp via dbus Resolves: rhbz#1377276 - Allow dmidecode to read rhsmcert_log_t files Resolves: rhbz#1300799 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow pegasus_openlmi_services_t to read generic certs Resolves: rhbz#1462292 - Allow ganesha_t domain to read random device Resolves: rhbz#1494382 - Allow zabbix_t domain to change its resource limits Resolves: rhbz:#1504074 - Add new boolean nagios_use_nfs Resolves: rhbz#1504826 - Allow system_mail_t to search network sysctls Resolves: rhbz#1505779 - Add samba_manage_var_dirs() interface - Fix typo bug in virt filecontext file - Allow nagios_script_t to read nagios_spool_t files Resolves: rhbz#1426824 - Allow samba to manage var dirs/files Resolves: rhbz#1415088 - Allow sbd_t to create own sbd_tmpfs_t dirs/files Resolves: rhbz#1380795 - Allow firewalld and networkmanager to chat with hypervkvp via dbus Resolves: rhbz#1377276 - Allow dmidecode to read rhsmcert_log_t files Resolves: rhbz#1300799 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow chronyd_t do request kernel module and block_suspend capability Resolves: rhbz#1350765 - Allow system_cronjob_t to create /var/lib/letsencrypt dir with right label Resolves: rhbz#1447278 - Allow httpd_t also read httpd_user_content_type dirs when httpd_enable_homedirs is enables Resolves: rhbz#1491994 - Allow svnserve to use kerberos Resolves: rhbz#1475271 - Allow conman to use ptmx. Add conman_use_nfs boolean Resolves: rhbz#1377915 - Add nnp transition for services using: NoNewPrivileges systemd security feature Resolves: rhbz#1311430 - Add SELinux support for chronyc Resolves: rhbz#1470150 - Add dac_read_search capability to openvswitch_t domain Resolves: rhbz#1501336 - Allow svnserve to manage own svnserve_log_t files/dirs Resolves: rhbz#1480741 - Allow keepalived_t to search network sysctls Resolves: rhbz#1477542 - Allow puppetagent_t domain dbus chat with rhsmcertd_t domain Resolves: rhbz#1446777 - Add dccp_socket into socker_class_set subset Resolves: rhbz#1459941 - Allow iptables_t to run setfiles to restore context on system Resolves: rhbz#1489118 - Label 20514 tcp/udp ports as syslogd_port_t Label 10514 tcp/udp portas as syslog_tls_port_t Resolves: rhbz:#1411400 - Make nnp transition Active Resolves: rhbz#1480518 - Label tcp 51954 as isns_port_t Resolves: rhbz#1390208 - Add dac_read_search capability chkpwd_t Resolves: rhbz#1376991 - Add support for running certbot(letsencrypt) in crontab Resolves: rhbz#1447278 - Add init_nnp_daemon_domain interface - Allow xdm_t to gettattr /dev/loop-control device Resolves: rhbz#1462925 - Allow nnp trasintion for unconfined_service_t Resolves: rhbz#1311430 - Allow unpriv user domains and unconfined_service_t to use chronyc Resolves: rhbz#1470150 - Allow iptables to exec plymouth. Resolves: rhbz#1480374 - Fix typo in fs_unmount_tracefs interface. Resolves: rhbz#1371057 - Label postgresql-check-db-dir as postgresql_exec_t Resolves: rhbz#1490956- We should not ship selinux-policy with permissivedomains enabled. Resolves: rhbz#1494172 - Fix order of installing selinux-policy-sandbox, because of depedencied in sandbox module, selinux-policy-targeted needs to be installed before selinux-policy-sandbox Resolves: rhbz#1492606- Allow tomcat to setsched Resolves: rhbz#1492730 - Fix rules blocking ipa-server upgrade process Resolves: rhbz#1478371 - Add new boolean tomcat_read_rpm_db() Resolves: rhbz#1477887 - Allow tomcat to connect on mysqld tcp ports - Add ctdbd_t domain sys_source capability and allow setrlimit Resolves: rhbz#1491235 - Fix keepalived SELinux module - Allow automount domain to manage mount pid files Resolves: rhbz#1482381 - Allow stunnel_t domain setsched Resolves: rhbz#1479383 - Add keepalived domain setpgid capability Resolves: rhbz#1486638 - Allow tomcat domain to connect to mssql port Resolves: rhbz#1484572 - Remove snapperd_t from unconfined domaines Resolves: rhbz#1365555 - Fix typo bug in apache module Resolves: rhbz#1397311 - Dontaudit that system_mail_t is trying to read /root/ files Resolves: rhbz#1147945 - Make working webadm_t userdomain Resolves: rhbz#1323792 - Allow redis domain to execute shell scripts. Resolves: rhbz#1421326 - Allow system_cronjob_t to create redhat-access-insights.log with var_log_t Resolves: rhbz#1473303 - Add couple capabilities to keepalived domain and allow get attributes of all domains Resolves: rhbz#1429327 - Allow dmidecode read rhsmcertd lock files Resolves: rhbz#1300799 - Add new interface rhsmcertd_rw_lock_files() Resolves: rhbz#1300799 - Label all plymouthd archives as plymouthd_var_log_t Resolves: rhbz#1478323 - Allow cloud_init_t to dbus chat with systemd_timedated_t Resolves: rhbz#1440730 - Allow logrotate_t to write to kmsg Resolves: rhbz#1397744 - Add capability kill to rhsmcertd_t Resolves: rhbz#1398338 - Disable mysqld_safe_t secure mode environment cleansing. Resolves: rhbz#1464063 - Allow winbind to manage smbd_tmp_t files Resolves: rhbz#1475566 - Dontaudit that system_mail_t is trying to read /root/ files Resolves: rhbz#1147945 - Make working webadm_t userdomain Resolves: rhbz#1323792 - Allow redis domain to execute shell scripts. Resolves: rhbz#1421326 - Allow system_cronjob_t to create redhat-access-insights.log with var_log_t Resolves: rhbz#1473303 - Add couple capabilities to keepalived domain and allow get attributes of all domains Resolves: rhbz#1429327 - Allow dmidecode read rhsmcertd lock files Resolves: rhbz#1300799 - Add new interface rhsmcertd_rw_lock_files() Resolves: rhbz#1300799 - Label all plymouthd archives as plymouthd_var_log_t Resolves: rhbz#1478323 - Allow cloud_init_t to dbus chat with systemd_timedated_t Resolves: rhbz#1440730 - Allow logrotate_t to write to kmsg Resolves: rhbz#1397744 - Add capability kill to rhsmcertd_t Resolves: rhbz#1398338 - Disable mysqld_safe_t secure mode environment cleansing. Resolves: rhbz#1464063 - Allow winbind to manage smbd_tmp_t files Resolves: rhbz#1475566 - Add interface systemd_tmpfiles_run - End of file cannot be in comment - Allow systemd-logind to use ypbind Resolves: rhbz#1479350 - Add creating opasswd file with shadow_t SELinux label in auth_manage_shadow() interface Resolves: rhbz#1412838 - Allow sysctl_irq_t assciate with proc_t Resolves: rhbz#1485909 - Enable cgourp sec labeling Resolves: rhbz#1485947 - Add cgroup_seclabel policycap. Resolves: rhbz#1485947 - Allow sshd_t domain to send signull to xdm_t processes Resolves: rhbz#1448959 - Allow updpwd_t domain auth file name trans Resolves: rhbz#1412838 - Allow sysadm user to run systemd-tmpfiles Resolves: rbhz#1325364 - Add support labeling for vmci and vsock device Resolves: rhbz#1451358 - Add userdom_dontaudit_manage_admin_files() interface Resolves: rhbz#1323792 - Allow iptables_t domain to read files with modules_conf_t label Resolves: rhbz#1373220 - init: Add NoNewPerms support for systemd. Resolves: rhbz#1480518 - Add nnp_nosuid_transition policycap and related class/perm definitions. Resolves: rhbz#1480518 - refpolicy: Infiniband pkeys and endports Resolves: rhbz#1464484- Allow certmonger using systemctl on pki_tomcat unit files Resolves: rhbz#1481388- Allow targetd_t to create own tmp files. - Dontaudit targetd_t to exec rpm binary file. Resolves: rhbz#1373860 Resolves: rhbz#1424621- Add few rules to make working targetd daemon with SELinux Resolves: rhbz#1373860 - Allow ipmievd_t domain to load kernel modules Resolves: rhbz#1441081 - Allow logrotate to reload transient systemd unit Resolves: rhbz#1440515 - Add certwatch_t domain dac_override and dac_read_search capabilities Resolves: rhbz#1422000 - Allow postgrey to execute bin_t files and add postgrey into nsswitch_domain Resolves: rhbz#1412072 - Allow nscd_t domain to search network sysctls Resolves: rhbz#1432361 - Allow iscsid_t domain to read mount pid files Resolves: rhbz#1482097 - Allow ksmtuned_t domain manage sysfs_t files/dirs Resolves: rhbz#1413865 - Allow keepalived_t domain domtrans into iptables_t Resolves: rhbz#1477719 - Allow rshd_t domain reads net sysctls Resolves: rhbz#1477908 - Add interface seutil_dontaudit_read_module_store() - Update interface lvm_rw_pipes() by adding also open permission - Label /dev/clp device as vfio_device_t Resolves: rhbz#1477624 - Allow ifconfig_t domain unmount fs_t Resolves: rhbz#1477445 - Label /dev/gpiochip* devices as gpio_device_t Resolves: rhbz#1477618 - Add interface dev_manage_sysfs() Resolves: rhbz#1474989- Label /usr/libexec/sudo/sesh as shell_exec_t Resolves: rhbz#1480791- Allow tomcat_t domain couple capabilities to make working tomcat-jsvc Resolves: rhbz#1470735- Allow llpdad send dgram to libvirt Resolves: rhbz#1472722- Add new boolean gluster_use_execmem Resolves: rhbz#1469027 - Allow cluster_t and glusterd_t domains to dbus chat with ganesha service Resolves: rhbz#1468581- Dontaudit staff_t user read admin_home_t files. Resolves: rhbz#1290633- Allow couple rules needed to start targetd daemon with SELinux in enforcing mode Resolves: rhbz#1424621 - Add interface lvm_manage_metadata Resolves: rhbz#1424621- Allow sssd_t to read realmd lib files. Resolves: rhbz#1436689 - Add permission open to files_read_inherited_tmp_files() interface Resolves: rhbz#1290633 Resolves: rhbz#1457106- Allow unconfined_t user all user namespace capabilties. Resolves: rhbz#1461488- Allow httpd_t to read realmd_var_lib_t files Resolves: rhbz#1436689- Allow named_t to bind on udp 4321 port Resolves: rhbz#1312972 - Allow systemd-sysctl cap. sys_ptrace Resolves: rhbz#1458999- Allow pki_tomcat_t execute ldconfig. Resolves: rhbz#1436689- Allow iscsi domain load kernel module. Resolves: rhbz#1457874 - Allow keepalived domain connect to squid tcp port Resolves: rhbz#1457455 - Allow krb5kdc_t domain read realmd lib files. Resolves: rhbz#1436689 - xdm_t should view kernel keys Resolves: rhbz#1432645- Allow tomcat to connect on all unreserved ports - Allow ganesha to connect to all rpc ports Resolves: rhbz#1448090 - Update ganesha with another fixes. Resolves: rhbz#1448090 - Update rpc_read_nfs_state_data() interface to allow read also lnk_files. Resolves: rhbz#1448090 - virt_use_glusterd boolean should be in optional block Update ganesha module to allow create tmp files Resolves: rhbz#1448090 - Hide broken symptoms when machine is configured with network bounding.- Add new boolean virt_use_glusterd Resolves: rhbz#1455994 - Add capability sys_boot for sbd_t domain - Allow sbd_t domain to create rpc sysctls. Resolves: rhbz#1455631 - Allow ganesha_t domain to manage glusterd_var_run_t pid files. Resolves: rhbz#1448090- Create new interface: glusterd_read_lib_files() - Allow ganesha read glusterd lib files. - Allow ganesha read network sysctls Resolves: rhbz#1448090- Add few allow rules to ganesha module Resolves: rhbz#1448090 - Allow condor_master_t to read sysctls. Resolves: rhbz#1277506 - Add dac_override cap to ctdbd_t domain Resolves: rhbz#1435708 - Label 8750 tcp/udp port as dey_keyneg_port_t Resolves: rhbz#1448090- Add ganesha_use_fusefs boolean. Resolves: rhbz#1448090- Allow httpd_t reading kerberos kdc config files Resolves: rhbz#1452215 - Allow tomcat_t domain connect to ibm_dt_2 tcp port. Resolves: rhbz#1447436 - Allow stream connect to initrc_t domains Resolves: rhbz#1447436 - Allow dnsmasq_t domain to read systemd-resolved pid files. Resolves: rhbz#1453114 - Allow tomcat domain name_bind on tcp bctp_port_t Resolves: rhbz#1451757 - Allow smbd_t domain generate debugging files under /var/run/gluster. These files are created through the libgfapi.so library that provides integration of a GlusterFS client in the Samba (vfs_glusterfs) process. Resolves: rhbz#1447669 - Allow condor_master_t write to sysctl_net_t Resolves: rhbz#1277506 - Allow nagios check disk plugin read /sys/kernel/config/ Resolves: rhbz#1277718 - Allow pcp_pmie_t domain execute systemctl binary Resolves: rhbz#1271998 - Allow nagios to connect to stream sockets. Allow nagios start httpd via systemctl Resolves: rhbz#1247635 - Label tcp/udp port 1792 as ibm_dt_2_port_t Resolves: rhbz#1447436 - Add interface fs_read_configfs_dirs() - Add interface fs_read_configfs_files() - Fix systemd_resolved_read_pid interface - Add interface systemd_resolved_read_pid() Resolves: rhbz#1453114 - Allow sshd_net_t domain read/write into crypto devices Resolves: rhbz#1452759 - Label 8999 tcp/udp as bctp_port_t Resolves: rhbz#1451757- nmbd_t needs net_admin capability like smbd Resolves: rhbz#1431859 - Dontaudit net_admin capability for domains postfix_master_t and postfix_qmgr_t Resolves: rhbz#1431859 - Allow rngd domain read sysfs_t Resolves: rhbz#1451735 - Add interface pki_manage_common_files() Resolves: rhbz#1447436 - Allow tomcat_t domain to manage pki_common_t files and dirs Resolves: rhbz#1447436 - Use stricter fc rules for sssd sockets in /var/run Resolves: rhbz#1448060 - Allow certmonger reads httpd_config_t files Resolves: rhbz#1436689 - Allow keepalived_t domain creating netlink_netfilter_socket. Resolves: rhbz#1451684 - Allow tomcat domain read rpm_var_lib_t files Allow tomcat domain exec rpm_exec_t files Allow tomcat domain name connect on oracle_port_t Allow tomcat domain read cobbler_var_lib_t files. Resolves: rhbz#1451318 - Make able deply overcloud via neutron_t to label nsfs as fs_t Resolves: rhbz#1373321- Allow tomcat domain read rpm_var_lib_t files Allow tomcat domain exec rpm_exec_t files Allow tomcat domain name connect on oracle_port_t Allow tomcat domain read cobbler_var_lib_t files. Resolves: rhbz#1451318 - Allow sssd_t domain creating sock files labeled as sssd_var_run_t in /var/run/ Resolves: rhbz#1448056 Resolves: rhbz#1448060 - Allow tomcat_domain connect to * postgresql_port_t * amqp_port_t Allow tomcat_domain read network sysctls Resolves: rhbz#1450819 - Make able deply overcloud via neutron_t to label nsfs as fs_t Resolves: rhbz#1373321 - Allow netutils setpcap capability Resolves:1444438- Update targetd policy to accommodate changes in the service Resolves: rhbz#1424621 - Allow tomcat_domain connect to * postgresql_port_t * amqp_port_t Allow tomcat_domain read network sysctls Resolves: rhbz#1450819 - Update virt_rw_stream_sockets_svirt() interface to allow confined users set socket options. Resolves: rhbz#1415841 - Allow radius domain stream connec to postgresql Resolves: rhbz#1446145 - Allow virt_domain to read raw fixed_disk_device_t to make working blockcommit Resolves: rhbz#1449977 - Allow glusterd_t domain start ganesha service Resolves: rhbz#1448090 - Made few cosmetic changes in sssd SELinux module Resolves: rhbz#1448060 - sssd-kcm should not run as unconfined_service_t BZ(1447411) Resolves: rhbz#1448060 - Add sssd_secrets labeling Also add named_filetrans interface to make sure all labels are correct Resolves: rhbz#1448056 - Allow keepalived_t domain read usermodehelper_t Resolves: rhbz#1449769 - Allow tomcat_t domain read pki_common_t files Resolves: rhbz#1447436 - Add interface pki_read_common_files() Resolves: rhbz#1447436- Allow hypervkvp_t domain execute hostname Resolves: rhbz#1449064 - Dontaudit sssd_selinux_manager_t use of net_admin capability Resolves: rhbz#1444955 - Allow tomcat_t stream connect to pki_common_t Resolves: rhbz#1447436 - Dontaudit xguest_t's attempts to listen to its tcp_socket - Allow sssd_selinux_manager_t to ioctl init_t sockets Resolves: rhbz#1436689 - Allow _su_t to create netlink_selinux_socket Resolves rhbz#1146987 - Allow unconfined_t to module_load any file Resolves rhbz#1442994- Improve ipa_cert_filetrans_named_content() interface to also allow caller domain manage ipa_cert_t type. Resolves: rhbz#1436689- Allow pki_tomcat_t domain read /etc/passwd. Resolves: rhbz#1436689 - Allow tomcat_t domain read ipa_tmp_t files Resolves: rhbz#1436689 - Label new path for ipa-otpd Resolves: rhbz#1446353 - Allow radiusd_t domain stream connect to postgresql_t Resolves: rhbz#1446145 - Allow rhsmcertd_t to execute hostname_exec_t binaries. Resolves: rhbz#1445494 - Allow virtlogd to append nfs_t files when virt_use_nfs=1 Resolves: rhbz#1402561- Update tomcat policy to adjust for removing unconfined_domain attr. Resolves: rhbz#1432083 - Allow httpd_t domain read also httpd_user_content_type lnk_files. Resolves: rhbz#1383621 - Allow httpd_t domain create /etc/httpd/alias/ipaseesion.key with label ipa_cert_t Resolves: rhbz#1436689 - Dontaudit _gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Label /var/www/html/nextcloud/data as httpd_sys_rw_content_t Resolves: rhbz#1425530 - Add interface ipa_filetrans_named_content() Resolves: rhbz#1432115 - Allow tomcat use nsswitch Resolves: rhbz#1436689 - Allow certmonger_t start/status generic services Resolves: rhbz#1436689 - Allow dirsrv read cgroup files. Resolves: rhbz#1436689 - Allow ganesha_t domain read/write infiniband devices. Resolves: rhbz#1383784 - Allow sendmail_t domain sysctl_net_t files Resolves: rhbz#1369376 - Allow targetd_t domain read network state and getattr on loop_control_device_t Resolves: rhbz#1373860 - Allow condor_schedd_t domain send mails. Resolves: rhbz#1277506 - Alow certmonger to create own systemd unit files. Resolves: rhbz#1436689 - Allow staff to systemctl virt server when staff_use_svirt=1 Resolves: rhbz#1415841 - Allow unconfined_t create /tmp/ca.p12 file with ipa_tmp_t context Resolves: rhbz#1432115 - Label /sysroot/ostree/deploy/rhel-atomic-host/* as root_t Resolves: rhbz#1428112- Alow certmonger to create own systemd unit files. Resolves: rhbz#1436689- Hide broken symptoms when using kernel 3.10.0-514+ with network bonding. Postfix_picup_t domain requires NET_ADMIN capability which is not really needed. Resolves: rhbz#1431859 - Fix policy to reflect all changes in new IPA release Resolves: rhbz#1432115 Resolves: rhbz#1436689- Allow sbd_t to read/write fixed disk devices Resolves: rhbz#1440165 - Add sys_ptrace capability to radiusd_t domain Resolves: rhbz#1426641 - Allow cockpit_session_t domain connects to ssh tcp ports. Resolves: rhbz#1413509- Update tomcat policy to make working ipa install process Resolves: rhbz#1436689- Allow pcp_pmcd_t net_admin capability. - Allow pcp_pmcd_t read net sysctls - Allow system_cronjob_t create /var/run/pcp with pcp_var_run_t Resolves: rhbz#1336211- Fix all AVC denials during pkispawn of CA Resolves: rhbz#1436383 - Update pki interfaces and tomcat module Resolves: rhbz#1436689- Update pki interfaces and tomcat module Resolves: rhbz#1436689- Dontaudit firewalld wants write to /root Resolves: rhbz#1438708 - Dontaudit firewalld to create dirs in /root/ Resolves: rhbz#1438708 - Allow sendmail to search network sysctls Resolves: rhbz#1369376 - Add interface gssd_noatsecure() Resolves: rhbz#1438036 - Add interface gssproxy_noatsecure() Resolves: rhbz#1438036 - Dontaudit pcp_pmlogger_t search for xserver logs. Allow pcp_pmlogger_t to send signals to unconfined doamins Allow pcp_pmlogger_t to send logs to journals Resolves: rhbz#1379371 - Allow chronyd_t net_admin capability to allow support HW timestamping. Resolves: rhbz#1416015 - Update tomcat policy Resolves: rhbz#1436689 Resolves: rhbz#1436383 - Allow certmonger to start haproxy service Resolves: rhbz#1349394 - Allow init noatsecure for gssd and gssproxy Resolves: rhbz#1438036- geoclue wants to dbus chat with avahi Resolves: rhbz#1434286 - Allow iptables get list of kernel modules Resolves: rhbz#1367520 - Allow unconfined_domain_type to enable/disable transient unit Resolves: rhbz#1337041 - Add interfaces init_enable_transient_unit() and init_disable_transient_unit - Revert "Allow sshd setcap capability. This is needed due to latest changes in sshd" Resolves: rhbz#1435264 - Label sysroot dir under ostree as root_t Resolves: rhbz#1428112- Remove ganesha_t domain from permissive domains. Resolves: rhbz#1436988- Allow named_t domain bind on several udp ports Resolves: rhbz#1312972 - Update nscd_use() interface Resolves: rhbz#1281716 - Allow radius_t domain ptrace Resolves: rhbz#1426641 - Update nagios to allos exec systemctl Resolves: rhbz#1247635 - Update pcp SELinux module to reflect all pcp changes Resolves: rhbz#1271998 - Label /var/lib/ssl_db as squid_cache_t Label /etc/squid/ssl_db as squid_cache_t Resolves: rhbz#1325527 - Allow pcp_pmcd_t domain search for network sysctl Allow pcp_pmcd_t domain sys_ptrace capability Resolves: rhbz#1336211- Allow drbd load modules Resolves: rhbz#1134883 - Revert "Add sys_module capability for drbd Resolves: rhbz#1134883" - Allow stapserver list kernel modules Resolves: rhbz#1325976 - Update targetd policy Resolves: rhbz#1373860 - Add sys_admin capability to amanda Resolves: rhbz#1371561 - Allow hypervvssd_t to read all dirs. Resolves: rhbz#1331309 - Label /run/haproxy.sock socket as haproxy_var_run_t Resolves: rhbz#1386233 - Allow oddjob_mkhomedir_t to mamange autofs_t dirs. Resolves: rhbz#1408819 - Allow tomcat to connect on http_cache_port_t Resolves: rhbz#1432083 - Allow geoclue to send msgs to syslog. Resolves: rhbz#1434286 - Allow condor_master_t domain capability chown. Resolves: rhbz#1277506 - Update mta_filetrans_named_content() interface to allow calling domain create files labeled as etc_aliases_t in dir labeled as etc_mail_t. Resolves: rhbz#1167468 - Allow nova domain search for httpd configuration. Resolves: rhbz#1190761 - Add sys_module capability for drbd Resolves: rhbz#1134883 - Allow user_u users stream connect to dirsrv, Allow sysadm_u and staff_u users to manage dirsrv files Resolves: rhbz#1286474 - Allow systemd_networkd_t communicate with systemd_networkd_t via dbus Resolves: rhbz#1278010- Add haproxy_t domain fowner capability Resolves: rhbz#1386233 - Allow domain transition from ntpd_t to hwclock_t domains Resolves: rhbz#1375624 - Allow cockpit_session_t setrlimit and sys_resource Resolves: rhbz#1402316 - Dontaudit svirt_t read state of libvirtd domain Resolves: rhbz#1426106 - Update httpd and gssproxy modules to reflects latest changes in freeipa Resolves: rhbz#1432115 - Allow iptables read modules_conf_t Resolves: rhbz#1367520- Remove tomcat_t domain from unconfined domains Resolves: rhbz#1432083 - Create new boolean: sanlock_enable_home_dirs() Resolves: rhbz#1432783 - Allow mdadm_t domain to read/write nvme_device_t Resolves: rhbz#1431617 - Remove httpd_user_*_content_t domains from user_home_type attribute. This tighten httpd policy and acces to user data will be more strinct, and also fix mutual influente between httpd_enable_homedirs and httpd_read_user_content Resolves: rhbz#1383621 - Dontaudit domain to create any file in /proc. This is kernel bug. Resolves: rhbz#1412679 - Add interface dev_rw_nvme Resolves: rhbz#1431617- Allow gssproxy to get attributes on all filesystem object types. Resolves: rhbz#1430295 - Allow ganesha to chat with unconfined domains via dbus Resolves: rhbz#1426554 - add the policy required for nextcloud Resolves: rhbz#1425530 - Add nmbd_t capability2 block_suspend Resolves: rhbz#1425357 - Label /var/run/chrony as chronyd_var_run_t Resolves: rhbz#1416015 - Add domain transition from sosreport_t to iptables_t Resolves: rhbz#1359789 - Fix path to /usr/lib64/erlang/erts-5.10.4/bin/epmd Resolves: rhbz:#1332803- Update rpm macros Resolves: rhbz#1380854- Add handling booleans via selinux-policy macros in custom policy spec files. Resolves: rhbz#1380854- Allow openvswitch to load kernel modules Resolves: rhbz#1405479- Allow openvswitch read script state. Resolves: rhbz#1405479- Update ganesha policy Resolves: rhbz#1426554 Resolves: rhbz#1383784 - Allow chronyd to read adjtime Resolves: rhbz#1416015 - Fixes for chrony version 2.2 Resolves: rhbz#1416015 - Add interface virt_rw_stream_sockets_svirt() Resolves: rhbz#1415841 - Label /dev/ss0 as gpfs_device_t Resolves: rhbz#1383784 - Allow staff to rw svirt unix stream sockets. Resolves: rhbz#1415841 - Label /rhev/data-center/mnt as mnt_t Resolves: rhbz#1408275 - Associate sysctl_rpc_t with proc filesystems Resolves: rhbz#1350927 - Add new boolean: domain_can_write_kmsg Resolves: rhbz#1415715- Allow rhsmcertd_t dbus chat with system_cronjob_t Resolves: rhbz#1405341 - Allow openvswitch exec hostname and readinitrc_t files Resolves: rhbz#1405479 - Improve SELinux context for mysql_db_t objects. Resolves: rhbz#1391521 - Allow postfix_postdrop to communicate with postfix_master via pipe. Resolves: rhbz#1379736 - Add radius_use_jit boolean Resolves: rhbz#1426205 - Label /var/lock/subsys/iptables as iptables_lock_t Resolves: rhbz#1405441 - Label /usr/lib64/erlang/erts-5.10.4/bin/epmd as lib_t Resolves: rhbz#1332803 - Allow can_load_kernmodule to load kernel modules. Resolves: rhbz#1423427 Resolves: rhbz#1424621- Allow nfsd_t domain to create sysctls_rpc_t files Resolves: rhbz#1405304 - Allow openvswitch to create netlink generic sockets. Resolves: rhbz#1397974 - Create kernel_create_rpc_sysctls() interface Resolves: rhbz#1405304- Allow nfsd_t domain rw sysctl_rpc_t dirs Resolves: rhbz#1405304 - Allow cgdcbxd_t to manage cgroup files. Resolves: rhbz#1358493 - Allow cmirrord_t domain to create netlink_connector sockets Resolves: rhbz#1412670 - Allow fcoemon to create netlink scsitransport sockets Resolves: rhbz#1362496 - Allow quota_nld_t create netlink_generic sockets Resolves: rhbz#1358679 - Allow cgred_t create netlink_connector sockets Resolves: rhbz#1376357 - Add dhcpd_t domain fowner capability Resolves: rhbz#1358485 - Allow acpid to attempt to connect to the Linux kernel via generic netlink socket. Resolves: rhbz#1358478 - Rename docker module to container module Resolves: rhbz#1386916 - Allow setflies to mount tracefs Resolves: rhbz#1376357 - Allow iptables to read nsfs files. Resolves: rhbz#1411316 - Allow systemd_bootchart_t domain create dgram sockets. Resolves: rhbz#1365953 - Rename docker interfaces to container Resolves: rhbz#1386916- Allow initrc_t domain to run rhel-autorelabel script properly during boot process Resolves: rhbz#1379722 - Allow systemd_initctl_t to create and connect unix_dgram sockets Resolves: rhbz#1365947 - Allow ifconfig_t to mount/unmount nsfs_t filesystem Resolves: rhbz#1349814 - Add interfaces allowing mount/unmount nsfs_t filesystem Resolves: rhbz#1349814- Add interface init_stream_connectto() Resolves:rhbz#1365947 - Allow rhsmcertd domain signull kernel. Resolves: rhbz#1379781 - Allow kdumpgui domain to read nvme device - Allow insmod_t to load kernel modules Resolves: rhbz#1421598 - Add interface files_load_kernel_modules() Resolves: rhbz#1421598 - Add SELinux support for systemd-initctl daemon Resolves:rhbz#1365947 - Add SELinux support for systemd-bootchart Resolves: rhbz#1365953- Allow firewalld to getattr open search read modules_object_t:dir Resolves: rhbz#1418391 - Fix label for nagios plugins in nagios file conxtext file Resolves: rhbz#1277718 - Add sys_ptrace capability to pegasus domain Resolves: rhbz#1381238 - Allow sssd_t domain setpgid Resolves:rhbz#1416780 - After the latest changes in nfsd. We should allow nfsd_t to read raw fixed disk. Resolves: rhbz#1350927 - Allow kdumpgui domain to read nvme device Resolves: rhbz#1415084 - su using libselinux and creating netlink_selinux socket is needed to allow libselinux initialization. Resolves: rhbz#1146987 - Add user namespace capability object classes. Resolves: rhbz#1368057 - Add module_load permission to class system Resolves:rhbz#1368057 - Add the validate_trans access vector to the security class Resolves: rhbz#1368057 - Add "binder" security class and access vectors Resolves: rhbz#1368057 - Allow ifconfig_t domain read nsfs_t Resolves: rhbz#1349814 - Allow ping_t domain to load kernel modules. Resolves: rhbz#1388363- Allow systemd container to read/write usermodehelperstate Resolves: rhbz#1403254 - Label udp ports in range 24007-24027 as gluster_port_t Resolves: rhbz#1404152- Allow glusterd_t to bind on glusterd_port_t udp ports. Resolves: rhbz#1404152 - Revert: Allow glusterd_t to bind on med_tlp port.- Allow glusterd_t to bind on med_tlp port. Resolves: rhbz#1404152 - Update ctdbd_t policy to reflect all changes. Resolves: rhbz#1402451 - Label tcp port 24009 as med_tlp_port_t Resolves: rhbz#1404152 - Issue appears during update directly from RHEL-7.0 to RHEL-7.3 or above. Modules pkcsslotd and vbetools missing in selinux-policy package for RHEL-7.3 which causing warnings during SELinux policy store migration process. Following patch fixes issue by skipping pkcsslotd and vbetools modules migration.- Allow ctdbd_t domain transition to rpcd_t Resolves:rhbz#1402451- Fixes for containers Allow containers to attempt to write to unix_sysctls. Allow cotainers to use the FD's leaked to them from parent processes. Resolves: rhbz#1403254- Allow glusterd_t send signals to userdomain. Label new glusterd binaries as glusterd_exec_t Resolves: rhbz#1404152 - Allow systemd to stop glusterd_t domains. Resolves: rhbz#1400493- Make working CTDB:NFS: CTDB failover from selinux-policy POV Resolves: rhbz#1402451- Add kdump_t domain sys_admin capability Resolves: rhbz#1375963- Allow puppetagent_t to access timedated dbus. Use the systemd_dbus_chat_timedated interface to allow puppetagent_t the access. Resolves: rhbz#1399250- Update systemd on RHEL-7.2 box to version from RHEL-7.3 and then as a separate yum command update the selinux policy systemd will start generating USER_AVC denials and will start returning "Access Denied" errors to DBus clients Resolves: rhbz#1393505- Allow cluster_t communicate to fprintd_t via dbus Resolves: rhbz#1349798- Fix error message during update from RHEL-7.2 to RHEL-7.3, when /usr/sbin/semanage command is not installed and selinux-policy-migrate-local-changes.sh script is executed in %post install phase of selinux-policy package Resolves: rhbz#1392010- Allow GlusterFS with RDMA transport to be started correctly. It requires ipc_lock capability together with rw permission on rdma_cm device. Resolves: rhbz#1384488 - Allow glusterd to get attributes on /sys/kernel/config directory. Resolves: rhbz#1384483- Use selinux-policy-migrate-local-changes.sh instead of migrateStore* macros - Add selinux-policy-migrate-local-changes service Resolves: rhbz#1381588- Allow sssd_selinux_manager_t to manage also dir class. Resolves: rhbz#1368097 - Add interface seutil_manage_default_contexts_dirs() Resolves: rhbz#1368097- Add virt_sandbox_use_nfs -> virt_use_nfs boolean substitution. Resolves: rhbz#1355783- Allow pcp_pmcd_t domain transition to lvm_t Add capability kill and sys_ptrace to pcp_pmlogger_t Resolves: rhbz#1309883- Allow ftp daemon to manage apache_user_content Resolves: rhbz#1097775 - Label /etc/sysconfig/oracleasm as oracleasm_conf_t Resolves: rhbz#1331383 - Allow oracleasm to rw inherited fixed disk device Resolves: rhbz#1331383 - Allow collectd to connect on unix_stream_socket Resolves: rhbz#1377259- Allow iscsid create netlink iscsid sockets. Resolves: rhbz#1358266 - Improve regexp for power_unit_file_t files. To catch just systemd power unit files. Resolves: rhbz#1375462- Update oracleasm SELinux module that can manage oracleasmfs_t blk files. Add dac_override cap to oracleasm_t domain. Resolves: rhbz#1331383 - Add few rules to pcp SELinux module to make ti able to start pcp_pmlogger service Resolves: rhbz#1206525- Add oracleasm_conf_t type and allow oracleasm_t to create /dev/oracleasm Resolves: rhbz#1331383 - Label /usr/share/pcp/lib/pmie as pmie_exec_t and /usr/share/pcp/lib/pmlogger as pmlogger_exec_t Resolves: rhbz#1206525 - Allow mdadm_t to getattr all device nodes Resolves: rhbz#1365171 - Add interface dbus_dontaudit_stream_connect_system_dbusd() Resolves:rhbz#1052880 - Add virt_stub_* interfaces for docker policy which is no longer a part of our base policy. Resolves: rhbz#1372705 - Allow guest-set-user-passwd to set users password. Resolves: rhbz#1369693 - Allow samdbox domains to use msg class Resolves: rhbz#1372677 - Allow domains using kerberos to read also kerberos config dirs Resolves: rhbz#1368492 - Allow svirt_sandbox_domains to r/w onload sockets Resolves: rhbz#1342930 - Add interface fs_manage_oracleasm() Resolves: rhbz#1331383 - Label /dev/kfd as hsa_device_t Resolves: rhbz#1373488 - Update seutil_manage_file_contexts() interface that caller domain can also manage file_context_t dirs Resolves: rhbz#1368097 - Add interface to write to nsfs inodes Resolves: rhbz#1372705 - Allow systemd services to use PrivateNetwork feature Resolves: rhbz#1372705 - Add a type and genfscon for nsfs. Resolves: rhbz#1372705 - Allow run sulogin_t in range mls_systemlow-mls_systemhigh. Resolves: rhbz#1290400- Allow arpwatch to create netlink netfilter sockets. Resolves: rhbz#1358261 - Fix file context for /etc/pki/pki-tomcat/ca/ - new interface oddjob_mkhomedir_entrypoint() - Move label for /var/lib/docker/vfs/ to proper SELinux module - Allow mdadm to get attributes from all devices. - Label /etc/puppetlabs as puppet_etc_t. - Allow systemd-machined to communicate to lxc container using dbus - Allow systemd_resolved to send dbus msgs to userdomains Resolves: rhbz#1236579 - Allow systemd-resolved to read network sysctls Resolves: rhbz#1236579 - Allow systemd_resolved to connect on system bus. Resolves: rhbz#1236579 - Make entrypoint oddjob_mkhomedir_exec_t for unconfined_t - Label all files in /dev/oracleasmfs/ as oracleasmfs_t Resolves: rhbz#1331383- Label /etc/pki/pki-tomcat/ca/ as pki_tomcat_cert_t Resolves:rhbz#1366915 - Allow certmonger to manage all systemd unit files Resolves:rhbz#1366915 - Grant certmonger "chown" capability Resolves:rhbz#1366915 - Allow ipa_helper_t stream connect to dirsrv_t domain Resolves: rhbz#1368418 - Update oracleasm SELinux module Resolves: rhbz#1331383 - label /var/lib/kubelet as svirt_sandbox_file_t Resolves: rhbz#1369159 - Add few interfaces to cloudform.if file Resolves: rhbz#1367834 - Label /var/run/corosync-qnetd and /var/run/corosync-qdevice as cluster_var_run_t. Note: corosync policy is now par of rhcs module Resolves: rhbz#1347514 - Allow krb5kdc_t to read krb4kdc_conf_t dirs. Resolves: rhbz#1368492 - Update networkmanager_filetrans_named_content() interface to allow source domain to create also temad dir in /var/run. Resolves: rhbz#1365653 - Allow teamd running as NetworkManager_t to access netlink_generic_socket to allow multiple network interfaces to be teamed together. Resolves: rhbz#1365653 - Label /dev/oracleasmfs as oracleasmfs_t. Add few interfaces related to oracleasmfs_t type Resolves: rhbz#1331383 - A new version of cloud-init that supports the effort to provision RHEL Atomic on Microsoft Azure requires some a new rules that allows dhclient/dhclient hooks to call cloud-init. Resolves: rhbz#1367834 - Allow iptables to creating netlink generic sockets. Resolves: rhbz#1364359- Allow ipmievd domain to create lock files in /var/lock/subsys/ Resolves:rhbz#1349058 - Update policy for ipmievd daemon. Resolves:rhbz#1349058 - Dontaudit hyperkvp to getattr on non security files. Resolves: rhbz#1349356 - Label /run/corosync-qdevice and /run/corosync-qnetd as corosync_var_run_t Resolves: rhbz#1347514 - Fixed lsm SELinux module - Add sys_admin capability to sbd domain Resolves: rhbz#1322725 - Allow vdagent to comunnicate with systemd-logind via dbus Resolves: rhbz#1366731 - Allow lsmd_plugin_t domain to create fixed_disk device. Resolves: rhbz#1238066 - Allow opendnssec domain to create and manage own tmp dirs/files Resolves: rhbz#1366649 - Allow opendnssec domain to read system state Resolves: rhbz#1366649 - Update opendnssec_manage_config() interface to allow caller domain also manage opendnssec_conf_t dirs Resolves: rhbz#1366649 - Allow rasdaemon to mount/unmount tracefs filesystem. Resolves: rhbz#1364380 - Label /usr/libexec/iptables/iptables.init as iptables_exec_t Allow iptables creating lock file in /var/lock/subsys/ Resolves: rhbz#1367520 - Modify interface den_read_nvme() to allow also read nvme_device_t block files. Resolves: rhbz#1362564 - Label /var/run/storaged as lvm_var_run_t. Resolves: rhbz#1264390 - Allow unconfineduser to run ipa_helper_t. Resolves: rhbz#1361636- Dontaudit mock to write to generic certs. Resolves: rhbz#1271209 - Add labeling for corosync-qdevice and corosync-qnetd daemons, to run as cluster_t Resolves: rhbz#1347514 - Revert "Label corosync-qnetd and corosync-qdevice as corosync_t domain" - Allow modemmanager to write to systemd inhibit pipes Resolves: rhbz#1365214 - Label corosync-qnetd and corosync-qdevice as corosync_t domain Resolves: rhbz#1347514 - Allow ipa_helper to read network state Resolves: rhbz#1361636 - Label oddjob_reqiest as oddjob_exec_t Resolves: rhbz#1361636 - Add interface oddjob_run() Resolves: rhbz#1361636 - Allow modemmanager chat with systemd_logind via dbus Resolves: rhbz#1362273 - Allow NetworkManager chat with puppetagent via dbus Resolves: rhbz#1363989 - Allow NetworkManager chat with kdumpctl via dbus Resolves: rhbz#1363977 - Allow sbd send msgs to syslog Allow sbd create dgram sockets. Allow sbd to communicate with kernel via dgram socket Allow sbd r/w kernel sysctls. Resolves: rhbz#1322725 - Allow ipmievd_t domain to re-create ipmi devices Label /usr/libexec/openipmi-helper as ipmievd_exec_t Resolves: rhbz#1349058 - Allow rasdaemon to use tracefs filesystem. Resolves: rhbz#1364380 - Fix typo bug in dirsrv policy - Some logrotate scripts run su and then su runs unix_chkpwd. Allow logrotate_t domain to check passwd. Resolves: rhbz#1283134 - Add ipc_lock capability to sssd domain. Allow sssd connect to http_cache_t Resolves: rhbz#1362688 - Allow dirsrv to read dirsrv_share_t content Resolves: rhbz#1363662 - Allow virtlogd_t to append svirt_image_t files. Resolves: rhbz#1358140 - Allow hypervkvp domain to read hugetlbfs dir/files. Resolves: rhbz#1349356 - Allow mdadm daemon to read nvme_device_t blk files Resolves: rhbz#1362564 - Allow selinuxusers and unconfineduser to run oddjob_request Resolves: rhbz#1361636 - Allow sshd server to acces to Crypto Express 4 (CEX4) devices. Resolves: rhbz#1362539 - Fix labeling issue in init.fc file. Path /usr/lib/systemd/fedora-* changed to /usr/lib/systemd/rhel-*. Resolves: rhbz#1363769 - Fix typo in device interfaces Resolves: rhbz#1349058 - Add interfaces for managing ipmi devices Resolves: rhbz#1349058 - Add interfaces to allow mounting/umounting tracefs filesystem Resolves: rhbz#1364380 - Add interfaces to allow rw tracefs filesystem Resolves: rhbz#1364380 - Add interface dev_read_nvme() to allow reading Non-Volatile Memory Host Controller devices. Resolves: rhbz#1362564 - Label /sys/kernel/debug/tracing filesystem Resolves: rhbz#1364380 - Allow sshd setcap capability. This is needed due to latest changes in sshd Resolves: rhbz#1357857- Dontaudit mock_build_t can list all ptys. Resolves: rhbz#1271209 - Allow ftpd_t to mamange userhome data without any boolean. Resolves: rhbz#1097775 - Add logrotate permissions for creating netlink selinux sockets. Resolves: rhbz#1283134 - Allow lsmd_plugin_t to exec ldconfig. Resolves: rhbz#1238066 - Allow vnstatd domain to read /sys/class/net/ files Resolves: rhbz#1358243 - Remove duplicate allow rules in spamassassin SELinux module Resolves:rhbz#1358175 - Allow spamc_t and spamd_t domains create .spamassassin file in user homedirs Resolves:rhbz#1358175 - Allow sshd setcap capability. This is needed due to latest changes in sshd Resolves: rhbz#1357857 - Add new MLS attribute to allow relabeling objects higher than system low. This exception is needed for package managers when processing sensitive data. Resolves: rhbz#1330464 - Allow gnome-keyring also manage user_tmp_t sockets. Resolves: rhbz#1257057 - corecmd: Remove fcontext for /etc/sysconfig/libvirtd Resolves:rhbz#1351382- Allow ipa_dnskey domain to search cache dirs Resolves: rhbz#1350957- Allow ipa-dnskey read system state. Reasolves: rhbz#1350957 - Allow dogtag-ipa-ca-renew-agent-submit labeled as certmonger_t to create /var/log/ipa/renew.log file Resolves: rhbz#1350957- Allow firewalld to manage net_conf_t files. Resolves:rhbz#1304723 - Allow logrotate read logs inside containers. Resolves: rhbz#1303514 - Allow sssd to getattr on fs_t Resolves: rhbz#1356082 - Allow opendnssec domain to manage bind chace files Resolves: rhbz#1350957 - Fix typo in rhsmcertd policy module Resolves: rhbz#1329475 - Allow systemd to get status of systemd-logind daemon Resolves: rhbz#1356141 - Label more ndctl devices not just ndctl0 Resolves: rhbz#1355809- Allow rhsmcertd to copy certs into /etc/docker/cert.d - Add interface docker_rw_config() Resolves: rhbz#1344500 - Fix logrotate fc file to label also /var/lib/logrotate/ dir as logrotate_var_lib_t Resolves: rhbz#1355632 - Allow rhsmcertd to read network sysctls Resolves: rhbz#1329475 - Label /var/log/graphite-web dir as httpd_log_t Resolves: rhbz#1310898 - Allow mock to use generic ptys Resolves: rhbz#1271209 - Allow adcli running as sssd_t to write krb5.keytab file. Resolves: rhbz#1356082 - Allow openvswitch connect to openvswitch_port_t type. Resolves: rhbz#1335024 - Add SELinux policy for opendnssec service. Resolves: rhbz#1350957 - Create new SELinux type for /usr/libexec/ipa/ipa-dnskeysyncd Resolves: rhbz#1350957 - label /dev/ndctl0 device as nvram_device_t Resolves: rhbz#1355809- Allow lttng tools to block suspending Resolves: rhbz#1256374 - Allow creation of vpnaas in openstack Resolves: rhbz#1352710 - virt: add strict policy for virtlogd daemon Resolves:rhbz#1311606 - Update makefile to support snapperd_contexts file Resolves: rhbz#1352681- Allow udev to manage systemd-hwdb files - Add interface systemd_hwdb_manage_config() Resolves: rhbz#1350756 - Fix paths to infiniband devices. This allows use more then two infiniband interfaces. Resolves: rhbz#1210263- Allow virtual machines to rw infiniband devices. Resolves: rhbz#1210263 - Allow opensm daemon to rw infiniband_mgmt_device_t Resolves: rhbz#1210263 - Allow systemd_hwdb_t to relabel /etc/udev/hwdb.bin file. Resolves: rhbz#1350756 - Make label for new infiniband_mgmt deivices Resolves: rhbz#1210263- Fix typo in brltty SELinux module - Add new SELinux module sbd Resolves: rhbz#1322725 - Allow pcp dmcache metrics collection Resolves: rhbz#1309883 - Allow pkcs_slotd_t to create dir in /var/lock Add label pkcs_slotd_log_t Resolves: rhbz#1350782 - Allow openvpn to create sock files labeled as openvpn_var_run_t Resolves: rhbz#1328246 - Allow hypervkvp daemon to getattr on all filesystem types. Resolves: rhbz#1349356 - Allow firewalld to create net_conf_t files Resolves: rhbz#1304723 - Allow mock to use lvm Resolves: rhbz#1271209 - Allow keepalived to create netlink generic sockets. Resolves: rhbz#1349809 - Allow mirromanager creating log files in /tmp Resolves:rhbz#1328818 - Rename few modules to make it consistent with source files Resolves: rhbz#1351445 - Allow vmtools_t to transition to rpm_script domain Resolves: rhbz#1342119 - Allow nsd daemon to manage nsd_conf_t dirs and files Resolves: rhbz#1349791 - Allow cluster to create dirs in /var/run labeled as cluster_var_run_t Resolves: rhbz#1346900 - Allow sssd read also sssd_conf_t dirs Resolves: rhbz#1350535 - Dontaudit su_role_template interface to getattr /proc/kcore Dontaudit su_role_template interface to getattr /dev/initctl Resolves: rhbz#1086240 - Add interface lvm_getattr_exec_files() Resolves: rhbz#1271209 - Fix typo Compliling vs. Compiling Resolves: rhbz#1351445- Allow krb5kdc_t to communicate with sssd Resolves: rhbz#1319933 - Allow prosody to bind on prosody ports Resolves: rhbz#1304664 - Add dac_override caps for fail2ban-client Resolves: rhbz#1316678 - dontaudit read access for svirt_t on the file /var/db/nscd/group Resolves: rhbz#1301637 - Allow inetd child process to communicate via dbus with systemd-logind Resolves: rhbz#1333726 - Add label for brltty log file Resolves: rhbz#1328818 - Allow dspam to read the passwd file Resolves: rhbz#1286020 - Allow snort_t to communicate with sssd Resolves: rhbz#1284908 - svirt_sandbox_domains need to be able to execmod for badly built libraries. Resolves: rhbz#1206339 - Add policy for lttng-tools package. Resolves: rhbz#1256374 - Make mirrormanager as application domain. Resolves: rhbz#1328234 - Add support for the default lttng-sessiond port - tcp/5345. This port is used by LTTng 2.x central tracing registry session daemon. - Add prosody ports Resolves: rhbz#1304664 - Allow sssd read also sssd_conf_t dirs Resolves: rhbz#1350535- Label /var/lib/softhsm as named_cache_t. Allow named_t to manage named_cache_t dirs. Resolves:rhbz#1331315 - Label named-pkcs11 binary as named_exec_t. Resolves: rhbz#1331315 - Allow glusterd daemon to get systemd status Resolves: rhbz#1321785 - Allow logrotate dbus-chat with system_logind daemon Resolves: rhbz#1283134 - Allow pcp_pmlogger to read kernel network state Allow pcp_pmcd to read cron pid files Resolves: rhbz#1336211 - Add interface cron_read_pid_files() Resolves: rhbz#1336211 - Allow pcp_pmlogger to create unix dgram sockets Resolves: rhbz#1336211 - Add hwloc-dump-hwdata SELinux policy Resolves: rhbz#1344054 - Remove non-existing jabberd_spool_t() interface and add new jabbertd_var_spool_t. Resolves: rhbz#1121171 - Remove non-existing interface salk_resetd_systemctl() and replace it with sanlock_systemctl_sanlk_resetd() Resolves: rhbz#1259764 - Create label for openhpid log files. esolves: rhbz#1259764 - Label /var/lib/ganglia as httpd_var_lib_t Resolves: rhbz#1260536 - Allow firewalld_t to create entries in net_conf_t dirs. Resolves: rhbz#1304723 - Allow journalctl to read syslogd_var_run_t files. This allows to staff_t and sysadm_t to read journals Resolves: rhbz#1288255 - Include patch from distgit repo: policy-RHEL-7.1-flask.patch. Resolves: rhbz#1329560 - Update refpolicy to handle hwloc Resolves: rhbz#1344054 - Label /etc/dhcp/scripts dir as bin_t - Allow sysadm_role to run journalctl_t domain. This allows sysadm user to read journals. Resolves: rhbz#1288255- Allow firewalld_t to create entries in net_conf_t dirs. Resolves: rhbz#1304723 - Allow journalctl to read syslogd_var_run_t files. This allows to staff_t and sysadm_t to read journals Resolves: rhbz#1288255 - Allow mongod log to syslog. Resolves: rhbz#1306995 - Allow rhsmcertd connect to port tcp 9090 Resolves: rhbz#1337319 - Label for /bin/mail(x) was removed but /usr/bin/mail(x) not. This path is also needed to remove. Resolves: rhbz#1262483 Resolves: rhbz#1277506 - Label /usr/libexec/mimedefang-wrapper as spamd_exec_t. Resolves: rhbz#1301516 - Add new boolean spamd_update_can_network. Resolves: rhbz#1305469 - Allow rhsmcertd connect to tcp netport_port_t Resolves: rhbz#1329475 - Fix SELinux context for /usr/share/mirrormanager/server/mirrormanager to Label all binaries under dir as mirrormanager_exec_t. Resolves: rhbz#1328234 - Allow prosody to bind to fac_restore tcp port. Resolves: rhbz#1321787 - Allow ninfod to read raw packets Resolves: rhbz#1317964 - Allow pegasus get attributes from qemu binary files. Resolves: rhbz#1260835 - Allow pegasus get attributes from qemu binary files. Resolves: rhbz#1271159 - Allow tuned to use policykit. This change is required by cockpit. Resolves: rhbz#1346464 - Allow conman_t to read dir with conman_unconfined_script_t binary files. Resolves: rhbz#1297323 - Allow pegasus to read /proc/sysinfo. Resolves: rhbz#1265883 - Allow sysadm_role to run journalctl_t domain. This allows sysadm user to read journals. Resolves: rhbz#1288255 - Label tcp ports:16379, 26379 as redis_port_t Resolves: rhbz#1348471 - Allow systemd to relabel /var and /var/lib directories during boot. - Add files_relabel_var_dirs() and files_relabel_var_dirs() interfaces. - Add files_relabelto_var_lib_dirs() interface. - Label tcp port 2004 as mailbox_port_t. Resolves: rhbz#1332843 - Label tcp and udp port 5582 as fac_restore_port_t Resolves: rhbz#1321787 - Allow sysadm_t user to run postgresql-setup. Resolves: rhbz#1282543 - Allow sysadm_t user to dbus chat with oddjob_t. This allows confined admin run oddjob mkhomedirfor script. Resolves: rhbz#1297480 - Update netlink socket classes.- Allow conman to kill conman_unconfined_script. Resolves: rhbz#1297323 - Make conman_unconfined_script_t as init_system_domain. Resolves:rhbz#1297323 - Allow init dbus chat with apmd. Resolves:rhbz#995898 - Patch /var/lib/rpm is symlink to /usr/share/rpm on Atomic, due to this change we need to label also /usr/share/rpm as rpm_var_lib_t. Resolves: rhbz#1233252 - Dontaudit xguest_gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Add mediawiki rules to proper scope Resolves: rhbz#1301186 - Dontaudit xguest_gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Allow mysqld_safe to inherit rlimit information from mysqld Resolves: rhbz#1323673 - Allow collectd_t to stream connect to postgresql. Resolves: rhbz#1344056 - Allow mediawiki-script to read /etc/passwd file. Resolves: rhbz#1301186 - Add filetrans rule that NetworkManager_t can create net_conf_t files in /etc. Resolves: rhbz#1344505 - Add labels for mediawiki123 Resolves: rhbz#1293872 - Fix label for all fence_scsi_check scripts - Allow ip netns to mounton root fs and unmount proc_t fs. Resolves: rhbz#1343776 Resolves: rhbz#1286851 - Allow sysadm_t to run newaliases command. Resolves: rhbz#1344828 - Add interface sysnet_filetrans_named_net_conf() Resolves: rhbz#1344505- Fix several issues related to the SELinux Userspace changes- Allow glusterd domain read krb5_keytab_t files. Resolves: rhbz#1343929 - Fix typo in files_setattr_non_security_dirs. Resolves: rhbz#1115987- Allow tmpreaper_t to read/setattr all non_security_file_type dirs Resolves: rhbz#1115987 - Allow firewalld to create firewalld_var_run_t directory. Resolves: rhbz#1304723 - Add interface firewalld_read_pid_files() Resolves: rhbz#1304723 - Label /usr/libexec/rpm-ostreed as rpm_exec_t. Resolves: rhbz#1340542 - Allow sanlock service to read/write cephfs_t files. Resolves: rhbz#1315332 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added missing docker interfaces: - docker_typebounds - docker_entrypoint Resolves: rhbz#1236580 - Add interface files_setattr_non_security_dirs() Resolves: rhbz#1115987 - Add support for onloadfs - Allow iptables to read firewalld pid files. Resolves: rhbz#1304723 - Add SELinux support for ceph filesystem. Resolves: rhbz#1315332 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) Resolves: rhbz#1236580- Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added missing docker interfaces: - docker_typebounds - docker_entrypoint Resolves: rhbz#1236580 - New interfaces needed for systemd-machinectl Resolves: rhbz#1236580 - New interfaces needed by systemd-machine Resolves: rhbz#1236580 - Add interface allowing sending and receiving messages from virt over dbus. Resolves: rhbz#1236580 - Backport docker policy from Fedora. Related: #1303123 Resolves: #1341257 - Allow NetworkManager_t and policykit_t read access to systemd-machined pid files. Resolves: rhbz#1236580 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added interfaces needed by new docker policy. Related: rhbz#1303123 - Add support for systemd-machined daemon Resolves: rhbz#1236580 - Allow rpm-ostree domain transition to install_t domain from init_t. Resolves: rhbz#1340542- dnsmasq: allow NetworkManager to control dnsmasq via D-Bus Resolves: rhbz#1336722 - Directory Server (389-ds-base) has been updated to use systemd-ask-password. In order to function correctly we need the following added to dirsrv.te Resolves: rhbz#1333198 - sftpd_* booleans are functionless these days. Resolves: rhbz#1335656 - Label /var/log/ganesha.log as gluster_log_t Allow glusterd_t domain to create glusterd_log_t files. Label /var/run/ganesha.pid as gluster_var_run_t. Resolves: rhbz#1335828 - Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus. Resolves: rhbz#1336760 - Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t. Resolves: rhbz#1336737 - Label /usr/libexec/storaged/storaged as lvm_exec_t to run storaged daemon in lvm_t SELinux domain. Resolves: rhbz#1264390 - Allow systemd_hostanmed_t to read /proc/sysinfo labeled as sysctl_t. Resolves: rhbz#1337061 - Revert "Allow all domains some process flags." Resolves: rhbz#1303644 - Revert "Remove setrlimit to all domains." Resolves: rhbz#1303644 - Label /usr/sbin/xrdp* files as bin_t Resolves: rhbz#1276777 - Add mls support for some db classes Resolves: rhbz#1303651 - Allow systemd_resolved_t to check if ipv6 is disabled. Resolves: rhbz#1236579 - Allow systemd_resolved to read systemd_networkd run files. Resolves: rhbz#1236579- Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus. Resolves: rhbz#1336760 - Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t. Resolves: rhbz#1336737- Allow logwatch to domtrans to postqueue Resolves: rhbz#1331542 - Label /var/log/ganesha.log as gluster_log_t - Allow glusterd_t domain to create glusterd_log_t files. - Label /var/run/ganesha.pid as gluster_var_run_t. Resolves: rhbz#1335828 - Allow zabbix to connect to postgresql port Resolves: rhbz#1330479 - Add userdom_destroy_unpriv_user_shared_mem() interface. Related: rhbz#1306403 - systemd-logind remove all IPC objects owned by a user on a logout. This covers also SysV memory. This change allows to destroy unpriviledged user SysV shared memory segments. Resolves: rhbz#1306403- We need to restore contexts on /etc/passwd*,/etc/group*,/etc/*shadow* during install phase to get proper labeling for these files until selinux-policy pkgs are installed. Resolves: rhbz#1333952- Add interface glusterd_dontaudit_read_lib_dirs() Resolves: rhbz#1295680 - Dontaudit Occasionally observing AVC's while running geo-rep automation Resolves: rhbz#1295680 - Allow glusterd to manage socket files labeled as glusterd_brick_t. Resolves: rhbz#1331561 - Create new apache content template for files stored in user homedir. This change is needed to make working booleans: - httpd_enable_homedirs - httpd_read_user_content Resolves: rhbz#1246522 - Allow stunnel create log files. Resolves: rhbz#1296851 - Label tcp port 8181 as intermapper_port_t. Resolves: rhbz#1334783 - Label tcp/udp port 2024 as xinuexpansion4_port_t Resolves: rhbz#1334783 - Label tcp port 7002 as afs_pt_port_t Label tcp/udp port 2023 as xinuexpansion3_port_t Resolves: rhbz#1334783 - Dontaudit ldconfig read gluster lib files. Resolves: rhbz#1295680 - Add interface auth_use_nsswitch() to systemd_domain_template. Resolves: rhbz#1236579- Label /usr/bin/ganesha.nfsd as glusterd_exec_t to run ganesha as glusterd_t. Allow glusterd_t stream connect to rpbind_t. Allow cluster_t to create symlink /var/lib/nfs labeled as var_lib_nfs_t. Add interface rpc_filetrans_var_lib_nfs_content() Add new boolean: rpcd_use_fusefs to allow rpcd daemon use fusefs. Resolves: rhbz#1312809 Resolves: rhbz#1323947 - Allow dbus chat between httpd_t and oddjob_t. Resolves: rhbz#1324144 - Label /usr/libexec/ipa/oddjob/org.freeipa.server.conncheck as ipa_helper_exec_t. Resolves: rhbz#1324144 - Label /var/log/ipareplica-conncheck.log file as ipa_log_t Allow ipa_helper_t domain to manage logs labeledas ipa_log_t Allow ipa_helper_t to connect on http and kerberos_passwd ports. Resolves: rhbz#1324144 - Allow prosody to listen on port 5000 for mod_proxy65. Resolves: rhbz#1316918 - Allow pcp_pmcd_t domain to manage docker lib files. This rule is needed to allow pcp to collect container information when SELinux is enabled. Resolves: rhbz#1309454- Allow runnig php7 in fpm mode. From selinux-policy side, we need to allow httpd to read/write hugetlbfs. Resolves: rhbz#1319442 - Allow openvswitch daemons to run under openvswitch Linux user instead of root. This change needs allow set capabilities: chwon, setgid, setuid, setpcap. Resolves: rhbz#1296640 - Remove ftpd_home_dir() boolean from distro policy. Reason is that we cannot make this working due to m4 macro language limits. Resolves: rhbz#1097775 - /bin/mailx is labeled sendmail_exec_t, and enters the sendmail_t domain on execution. If /usr/sbin/sendmail does not have its own domain to transition to, and is not one of several products whose behavior is allowed by the sendmail_t policy, execution will fail. In this case we need to label /bin/mailx as bin_t. Resolves: rhbz#1262483 - Allow nsd daemon to create log file in /var/log as nsd_log_t Resolves: rhbz#1293140 - Sanlock policy update. - New sub-domain for sanlk-reset daemon Resolves: rhbz#1212324 - Label all run tgtd files, not just socket files Resolves: rhbz#1280280 - Label all run tgtd files, not just socket files. Resolves: rhbz#1280280 - Allow prosody to stream connect to sasl. This will allow using cyrus authentication in prosody. Resolves: rhbz#1321049 - unbound wants to use ephemeral ports as a default configuration. Allow to use also udp sockets. Resolves: rhbz#1318224 - Allow prosody to listen on port 5000 for mod_proxy65. Resolves: rhbz#1316918 - Allow targetd to read/write to /dev/mapper/control device. Resolves: rhbz#1063714 - Allow KDM to get status about power services. This change allow kdm to be able do shutdown. Resolves: rhbz#1316724 - Allow systemd-resolved daemon creating netlink_route sockets. Resolves:rhbz#1236579 - Allow systemd_resolved_t to read /etc/passwd file. Allow systemd_resolved_t to write to kmsg_device_t when 'systemd.log_target=kmsg' option is used Resolves: rhbz#1065362 - Label /etc/selinux/(minimum|mls|targeted)/active/ as semanage_store_t Resolves: rhbz#1321943 - Label all nvidia binaries as xserver_exec_t Resolves: rhbz#1322283- Create new permissivedomains CIL module and make it active. Resolves: rhbz#1320451 - Add support for new mock location - /usr/libexec/mock/mock. Resolves: rhbz#1271209 - Allow bitlee to create bitlee_var_t dirs. Resolves: rhbz#1268651 - Allow CIM provider to read sssd public files. Resolves: rhbz#1263339 - Fix some broken interfaces in distro policy. Resolves: rhbz#1121171 - Allow power button to shutdown the laptop. Resolves: rhbz#995898 - Allow lsm plugins to create named fixed disks. Resolves: rhbz#1238066 - Add default labeling for /etc/Pegasus/cimserver_current.conf. It is a correct patch instead of the current /etc/Pegasus/pegasus_current.confResolves: rhbz#1278777 - Allow hyperv domains to rw hyperv devices. Resolves: rhbz#1309361 - Label /var/www/html(/.*)?/wp_backups(/.*)? as httpd_sys_rw_content_t.Resolves: rhbz#1246780 - Create conman_unconfined_script_t type for conman script stored in /use/share/conman/exec/ Resolves: rhbz#1297323 - Fix rule definitions for httpd_can_sendmail boolean. We need to distinguish between base and contrib. - Add support for /dev/mptctl device used to check RAID status. Resolves: rhbz#1258029 - Create hyperv* devices and create rw interfaces for this devices. Resolves: rhbz#1309361 - Add fixes for selinux userspace moving the policy store to /var/lib/selinux. - Remove optional else block for dhcp ping- Allow rsync_export_all_ro boolean to read also non_auth_dirs/files/symlinks. Resolves: rhbz#1263770 - Fix context of "/usr/share/nginx/html". Resolves: rhbz#1261857 - Allow pmdaapache labeled as pcp_pmcd_t access to port 80 for apache diagnostics Resolves: rhbz#1270344 - Allow pmlogger to create pmlogger.primary.socket link file. Resolves: rhbz#1270344 - Label nagios scripts as httpd_sys_script_exec_t. Resolves: rhbz#1260306 - Add dontaudit interface for kdumpctl_tmp_t Resolves: rhbz#1156442 - Allow mdadm read files in EFI partition. Resolves: rhbz#1291801 - Allow nsd_t to bind on nsf_control tcp port. Allow nsd_crond_t to read nsd pid. Resolves: rhbz#1293140 - Label some new nsd binaries as nsd_exec_t Allow nsd domain net_admin cap. Create label nsd_tmp_t for nsd tmp files/dirs Resolves: rhbz#1293140 - Add filename transition that /etc/princap will be created with cupsd_rw_etc_t label in cups_filetrans_named_content() interface. Resolves: rhbz#1265102 - Add missing labeling for /usr/libexec/abrt-hook-ccpp. Resolves: rhbz#1213409 - Allow pcp_pmie and pcp_pmlogger to read all domains state. Resolves: rhbz#1206525 - Label /etc/redis-sentinel.conf as redis_conf_t. Allow redis_t write to redis_conf_t. Allow redis_t to connect on redis tcp port. Resolves: rhbz#1275246 - cockpit has grown content in /var/run directory Resolves: rhbz#1279429 - Allow collectd setgid capability Resolves:#1310898 - Remove declaration of empty booleans in virt policy. Resolves: rhbz#1103153 - Fix typo in drbd policy - Add new drbd file type: drbd_var_run_t. Allow drbd_t to manage drbd_var_run_t files/dirs. Allow drbd_t create drbd_tmp_t files in /tmp. Resolves: rhbz#1134883 - Label /etc/ctdb/events.d/* as ctdb_exec_t. Allow ctdbd_t to setattr on ctdbd_exec_t files. Resolves: rhbz#1293788 - Allow abrt-hook-ccpp to get attributes of all processes because of core_pattern. Resolves: rhbz#1254188 - Allow abrt_t to read sysctl_net_t files. Resolves: rhbz#1254188 - The ABRT coredump handler has code to emulate default core file creation The handler runs in a separate process with abrt_dump_oops_t SELinux process type. abrt-hook-ccpp also saves the core dump file in the very same way as kernel does and a user can specify CWD location for a coredump. abrt-hook-ccpp has been made as a SELinux aware apps to create this coredumps with correct labeling and with this commit the policy rules have been updated to allow access all non security files on a system. - Allow abrt-hook-ccpp to getattr on all executables. - Allow setuid/setgid capabilities for abrt-hook-ccpp. Resolves: rhbz#1254188 - abrt-hook-ccpp needs to have setfscreate access because it is SELinux aware and compute a target labeling. Resolves: rhbz#1254188 - Allow abrt-hook-ccpp to change SELinux user identity for created objects. Resolves: rhbz#1254188 - Dontaudit write access to inherited kdumpctl tmp files. Resolves: rbhz#1156442 - Add interface to allow reading files in efivarfs - contains Linux Kernel configuration options for UEFI systems (UEFI Runtime Variables) Resolves: rhbz#1291801 - Label 8952 tcp port as nsd_control. Resolves: rhbz#1293140 - Allow ipsec to use pam. Resolves: rhbz#1315700 - Allow to log out to gdm after screen was resized in session via vdagent. Resolves: rhbz#1249020 - Allow setrans daemon to read /proc/meminfo. Resolves: rhbz#1316804 - Allow systemd_networkd_t to write kmsg, when kernel was started with following params: systemd.debug systemd.log_level=debug systemd.log_target=kmsg Resolves: rhbz#1298151 - Label tcp port 5355 as llmnr-> Link-Local Multicast Name Resolution Resolves: rhbz#1236579 - Add new selinux policy for systemd-resolved dawmon. Resolves: rhbz#1236579 - Add interface ssh_getattr_server_keys() interface. Resolves: rhbz#1306197 - Allow run sshd-keygen on second boot if first boot fails after some reason and content is not syncedon the disk. These changes are reflecting this commit in sshd. http://pkgs.fedoraproject.org/cgit/rpms/openssh.git/commit/?id=af94f46861844cbd6ba4162115039bebcc8f78ba rhbz#1299106 Resolves: rhbz#1306197 - Allow systemd_notify_t to write to kmsg_device_t when 'systemd.log_target=kmsg' option is used. Resolves: rhbz#1309417 - Remove bin_t label for /etc/ctdb/events.d/. We need to label this scripts as ctdb_exec_t. Resolves: rhbz#1293788- Prepare selinux-policy package for userspace release 2016-02-23. Resolves: rhbz#1305982- Allow sending dbus msgs between firewalld and system_cronjob domains. Resolves: rhbz#1284902 - Allow zabbix-agentd to connect to following tcp sockets. One of zabbix-agentd functions is get service status of ftp,http,innd,pop,smtp protocols. Resolves: rhbz#1242506 - Add new boolean tmpreaper_use_cifs() to allow tmpreaper to run on local directories being shared with Samba. Resolves: rhbz#1284972 - Add support for systemd-hwdb daemon. Resolves: rhbz#1257940 - Add interface fs_setattr_cifs_dirs(). Resolves: rhbz#1284972- Add new SELinux policy fo targetd daemon. Resolves: rhbz#1063714 - Add new SELinux policy fo ipmievd daemon. Resolves: rhbz#1083031 - Add new SELinux policy fo hsqldb daemon. Resolves: rhbz#1083171 - Add new SELinux policy for blkmapd daemon. Resolves: rhbz#1072997 - Allow p11-child to connect to apache ports. - Label /usr/sbin/lvmlockd binary file as lvm_exec_t. Resolves: rhbz#1278028 - Add interface "lvm_manage_lock" to lvm policy. Resolves: rhbz#1063714- Allow openvswitch domain capability sys_rawio. Resolves: rhbz#1278495- Allow openvswitch to manage hugetlfs files and dirs. Resolves: rhbz#1278495 - Add fs_manage_hugetlbfs_files() interface. Resolves: rhbz#1278495- Allow smbcontrol domain to send sigchld to ctdbd domain. Resolves: #1293784 - Allow openvswitch read/write hugetlb filesystem. Resolves: #1278495Allow hypervvssd to list all mountpoints to have VSS live backup working correctly. Resolves:#1247880- Revert Add missing labeling for /usr/libexec/abrt-hook-ccpp patch Resolves: #1254188- Allow search dirs in sysfs types in kernel_read_security_state. Resolves: #1254188 - Fix kernel_read_security_state interface that source domain of this interface can search sysctl_fs_t dirs. Resolves: #1254188- Add missing labeling for /usr/libexec/abrt-hook-ccpp as a part of #1245477 and #1242467 bugs Resolves: #1254188 - We need allow connect to xserver for all sandbox_x domain because we have one type for all sandbox processes. Resolves:#1261938- Remove labeling for modules_dep_t file contexts to have labeled them as modules_object_t. - Update files_read_kernel_modules() to contain modutils_read_module_deps_files() calling because module deps labeling could remain and it allows to avoid regressions. Resolves:#1266928- We need to require sandbox_web_type attribute in sandbox_x_domain_template(). Resolves: #1261938 - ipsec: The NM helper needs to read the SAs Resolves: #1259786 - ipsec: Allow ipsec management to create ptys Resolves: #1259786- Add temporary fixes for sandbox related to #1103622. It allows to run everything under one sandbox type. Resolves:#1261938 - Allow abrt_t domain to write to kernel msg device. Resolves: #1257828 - Allow rpcbind_t domain to change file owner and group Resolves: #1265266- Allow smbcontrol to create a socket in /var/samba which uses for a communication with smbd, nmbd and winbind. Resolves: #1256459- Allow dirsrv-admin script to read passwd file. Allow dirsrv-admin script to read httpd pid files. Label dirsrv-admin unit file and allow dirsrv-admin domains to use it. Resolves: #1230300 - Allow qpid daemon to connect on amqp tcp port. Resolves: #1261805- Label /etc/ipa/nssdb dir as cert_t Resolves:#1262718 - Do not provide docker policy files which is shipped by docker-selinux.rpm Resolves:#1262812- Add labels for afs binaries: dafileserver, davolserver, salvageserver, dasalvager Resolves: #1192338 - Add lsmd_plugin_t sys_admin capability, Allow lsmd_plugin_t getattr from sysfs filesystem. Resolves: #1238079 - Allow rhsmcertd_t send signull to unconfined_service_t domains. Resolves: #1176078 - Remove file transition from snmp_manage_var_lib_dirs() interface which created snmp_var_lib_t dirs in var_lib_t. - Allow openhpid_t daemon to manage snmp files and dirs. Resolves: #1243902 - Allow mdadm_t domain read/write to general ptys and unallocated ttys. Resolves: #1073314 - Add interface unconfined_server_signull() to allow domains send signull to unconfined_service_t Resolves: #1176078- Allow systemd-udevd to access netlink_route_socket to change names for network interfaces without unconfined.pp module. It affects also MLS. Resolves:#1250456- Fix labeling for fence_scsi_check script Resolves: #1255020 - Allow openhpid to read system state Allow openhpid to connect to tcp http port. Resolves: #1244248 - Allow openhpid to read snmp var lib files. Resolves: #1243902 - Allow openvswitch_t domains read kernel dependencies due to openvswitch run modprobe - Allow unconfined_t domains to create /var/run/xtables.lock with iptables_var_run_t Resolves: #1243403 - Remove bin_t label for /usr/share/cluster/fence_scsi_check\.pl Resolves: #1255020- Fix regexp in chronyd.fc file Resolves: #1243764 - Allow passenger to getattr filesystem xattr Resolves: #1196555 - Label mdadm.conf.anackbak as mdadm_conf_t file. Resolves: #1088904 - Revert "Allow pegasus_openlmi_storage_t create mdadm.conf.anacbak file in /etc." - Allow watchdog execute fenced python script. Resolves: #1255020 - Added inferface watchdog_unconfined_exec_read_lnk_files() - Remove labeling for /var/db/.*\.db as etc_t to label db files as system_db_t. Resolves: #1230877- Allow watchdog execute fenced python script. Resolves: #1255020 - Added inferface watchdog_unconfined_exec_read_lnk_files() - Label /var/run/chrony-helper dir as chronyd_var_run_t. Resolves: #1243764 - Allow dhcpc_t domain transition to chronyd_t Resolves: #1243764- Fix postfix_spool_maildrop_t,postfix_spool_flush_t contexts in postfix.fc file. Resolves: #1252442- Allow exec pidof under hypervkvp domain. Resolves: #1254870 - Allow hypervkvp daemon create connection to the system DBUS Resolves: #1254870- Allow openhpid_t to read system state. Resolves: #1244248 - Added labels for files provided by rh-nginx18 collection Resolves: #1249945 - Dontaudit block_suspend capability for ipa_helper_t, this is kernel bug. Allow ipa_helper_t capability net_admin. Allow ipa_helper_t to list /tmp. Allow ipa_helper_t to read rpm db. Resolves: #1252968 - Allow rhsmcertd exec rhsmcertd_var_run_t files and rhsmcerd_tmp_t files. This rules are in hide_broken_sympthons until we find better solution. Resolves: #1243431 - Allow abrt_dump_oops_t to read proc_security_t files. - Allow abrt_dump_oops to signull all domains Allow abrt_dump_oops to read all domains state Allow abrt_dump_oops to ptrace all domains - Add interface abrt_dump_oops_domtrans() - Add mountpoint dontaudit access check in rhsmcertd policy. Resolves: #1243431 - Allow samba_net_t to manage samba_var_t sock files. Resolves: #1252937 - Allow chrome setcap to itself. Resolves: #1251996 - Allow httpd daemon to manage httpd_var_lib_t lnk_files. Resolves: #1253706 - Allow chronyd exec systemctl Resolves: #1243764 - Add inteface chronyd_signal Allow timemaster_t send generic signals to chronyd_t. Resolves: #1243764 - Added interface fs_dontaudit_write_configfs_dirs - Add label for kernel module dep files in /usr/lib/modules Resolves:#916635 - Allow kernel_t domtrans to abrt_dump_oops_t - Added to files_dontaudit_write_all_mountpoints intefface new dontaudit rule, that domain included this interface dontaudit capability dac_override. - Allow systemd-networkd to send logs to systemd-journald. Resolves: #1236616- Fix label on /var/tmp/kiprop_0 Resolves:#1220763 - Allow lldpad_t to getattr tmpfs_t. Resolves: #1246220 - Label /dev/shm/lldpad.* as lldapd_tmpfs_t Resolves: #1246220 - Allow audisp client to read system state.- Allow pcp_domain to manage pcp_var_lib_t lnk_files. Resolves: #1252341 - Label /var/run/xtables.* as iptables_var_run_t Resolves: #1243403- Add interface to read/write watchdog device - Add labels for /dev/memory_bandwith and /dev/vhci. Thanks ssekidde Resolves:#1210237 - Allow apcupsd_t to read /sys/devices Resolves:#1189185 - Allow logrotate to reload services. Resolves: #1242453 - Allow openhpid use libwatchdog plugin. (Allow openhpid_t rw watchdog device) Resolves: #1244260 - Allow openhpid liboa_soap plugin to read generic certs. Resolves: #1244248 - Allow openhpid liboa_soap plugin to read resolv.conf file. Resolves: #1244248 - Label /usr/libexec/chrony-helper as chronyd_exec_t - Allow chronyd_t to read dhcpc state. - Allow chronyd to execute mkdir command.- Allow mdadm to access /dev/random and add support to create own files/dirs as mdadm_tmpfs_t. Resolves:#1073314 - Allow udev, lvm and fsadm to access systemd-cat in /var/tmp/dracut if 'dracut -fv' is executed in MLS. - Allow admin SELinu users to communicate with kernel_t. It is needed to access /run/systemd/journal/stdout if 'dracut -vf' is executed. We allow it for other SELinux users. - Allow sysadm to execute systemd-sysctl in the sysadm_t domain. It is needed for ifup command in MLS mode. - Add fstools_filetrans_named_content_fsadm() and call it for named_filetrans_domain domains. We need to be sure that /run/blkid is created with correct labeling. Resolves:#1183503 - Add support for /etc/sanlock which is writable by sanlock daemon. Resolves:#1231377 - Allow useradd add homedir located in /var/lib/kdcproxy in ipa-server RPM scriplet. Resolves:#1243775 - Allow snapperd to pass data (one way only) via pipe negotiated over dbus Resolves:#1250550 - Allow lsmd also setuid capability. Some commands need to executed under root privs. Other commands are executed under unprivileged user.- Allow openhpid to use libsnmp_bc plugin (allow read snmp lib files). Resolves: #1243902 - Allow lsm_plugin_t to read sysfs, read hwdata, rw to scsi_generic_device Resolves: #1238079 - Allow lsm_plugin_t to rw raw_fixed_disk. Resolves:#1238079 - Allow rhsmcertd to send signull to unconfined_service.- Allow httpd_suexec_t to read and write Apache stream sockets Resolves: #1243569 - Allow qpid to create lnk_files in qpid_var_lib_t Resolves: #1247279- Allow drbd to get attributes from filesystems. - Allow redis to read kernel parameters. Resolves: #1209518 - Allow virt_qemu_ga_t domtrans to passwd_t - Allow audisp_remote_t to start power unit files domain to allow halt system. Resolves: #1186780 - Allow audisp_remote_t to read/write user domain pty. Resolves: #1186780 - Label /usr/sbin/chpasswd as passwd_exec_t. - Allow sysadm to administrate ldap environment and allow to bind ldap port to allow to setup an LDAP server (389ds). Resolves:#1221121- gnome_dontaudit_search_config() needs to be a part of optinal_policy in pegasus.te - Allow pcp_pmcd daemon to read postfix config files. - Allow pcp_pmcd daemon to search postfix spool dirs. Resolves: #1213740 - Added Booleans: pcp_read_generic_logs. Resolves: #1213740 - Allow drbd to read configuration options used when loading modules. Resolves: #1134883 - Allow glusterd to manage nfsd and rpcd services. - Allow glusterd to communicate with cluster domains over stream socket. - glusterd call pcs utility which calls find for cib.* files and runs pstree under glusterd. Dontaudit access to security files and update gluster boolean to reflect these changes.- Allow glusterd to manage nfsd and rpcd services. - Allow networkmanager to communicate via dbus with systemd_hostanmed. Resolves: #1234954 - Allow stream connect logrotate to prosody. - Add prosody_stream_connect() interface. - httpd should be able to send signal/signull to httpd_suexec_t, instead of httpd_suexec_exec_t. - Allow prosody to create own tmp files/dirs. Resolves:#1212498- Allow networkmanager read rfcomm port. Resolves:#1212498 - Remove non exists label. - Fix *_admin intefaces where body is not consistent with header. - Label /usr/afs/ as afs_files_t, Allow afs_bosserver_t create afs_config_t and afs_dbdir_t dirs under afs_files_t, Allow afs_bosserver_t read kerberos config - Remove non exits nfsd_ro_t label. - Make all interfaces related to openshift_cache_t as deprecated. - Add rpm_var_run_t label to rpm_admin header - Add jabberd_lock_t label to jabberd_admin header. - Add samba_unconfined_script_exec_t to samba_admin header. - inn daemon should create innd_log_t objects in var_log_t instead of innd_var_run_t - Fix ctdb policy - Add samba_signull_winbind() - Add samba_signull_unconfined_net() - Allow ctdbd_t send signull to samba_unconfined_net_t. - Allow openshift_initrc_t to communicate with firewalld over dbus Resolves:#1221326- Allow gluster to connect to all ports. It is required by random services executed by gluster. - Add interfaces winbind_signull(), samba_unconfined_net_signull(). - Dontaudit smbd_t block_suspend capability. This is kernel bug. - Allow ctdbd sending signull to process winbind, samba_unconfined_net, to checking if processes exists. - Add tmpreaper booleans to use nfs_t and samba_share_t. - Fix path from /usr/sbin/redis-server to /usr/bin/redis-server - Allow connect ypserv to portmap_port_t - Fix paths in inn policy, Allow innd read innd_log_t dirs, Allow innd execute innd_etc_t files - Add support for openstack-nova-* packages - Allow NetworkManager_t send signull to dnssec_trigger_t. - Allow glusterd to execute showmount in the showmount domain. - Label swift-container-reconciler binary as swift_t. - Allow dnssec_trigger_t relabelfrom dnssec_trigger_var_run_t files. - Add cobbler_var_lib_t to "/var/lib/tftpboot/boot(/.*)?" Resolves:#1213540 - Merge all nova_* labels under one nova_t.- Add logging_syslogd_run_nagios_plugins boolean for rsyslog to allow transition to nagios unconfined plugins Resolves:#1233550 - Allow dnssec_trigger_t create dnssec_trigger_tmp_t files in /var/tmp/ - Add support for oddjob based helper in FreeIPA. - Add new boolean - httpd_run_ipa to allow httpd process to run IPA helper and dbus chat with oddjob. - Add nagios_domtrans_unconfined_plugins() interface. - Update mta_filetrans_named_content() interface to cover more db files. Resolves:#1167468 - Add back ftpd_use_passive_mode boolean with fixed description. - Allow pmcd daemon stream connect to mysqld. - Allow pcp domains to connect to own process using unix_stream_socket. Resolves:#1213709 - Allow abrt-upload-watch service to dbus chat with ABRT daemon and fsetid capability to allow run reporter-upload correctly. - Add new boolean - httpd_run_ipa to allow httpd process to run IPA helper and dbus chat with oddjob. - Add support for oddjob based helper in FreeIPA. - Allow dnssec_trigger_t create dnssec_trigger_tmp_t files in /var/tmp/- Allow iptables to read ctdbd lib files. Resolves:#1224879 - Add systemd_networkd_t to nsswitch domains. - Allow drbd_t write to fixed_disk_device. Reason: drbdmeta needs write to fixed_disk_device during initialization. Resolves:#1130675 - Allow NetworkManager write to sysfs. - Fix cron_system_cronjob_use_shares boolean to call fs interfaces which contain only entrypoint permission. - Add cron_system_cronjob_use_shares boolean to allow system cronjob to be executed from shares - NFS, CIFS, FUSE. It requires "entrypoint" permissios on nfs_t, cifs_t and fusefs_t SELinux types. - Allow NetworkManager write to sysfs. - Allow ctdb_t sending signull to smbd_t, for checking if smbd process exists. - Dontaudit apache to manage snmpd_var_lib_t files/dirs. - Add interface snmp_dontaudit_manage_snmp_var_lib_files(). - Dontaudit mozilla_plugin_t cap. sys_ptrace. - Rename xodbc-connect port to xodbc_connect - Allow ovsdb-server to connect on xodbc-connect and ovsdb tcp ports. - Allow iscsid write to fifo file kdumpctl_tmp_t. Appears when kdump generates the initramfs during the kernel boot. - Dontaudit chrome to read passwd file. - nrpe needs kill capability to make gluster moniterd nodes working. Resolves:#1235587- We allow can_exec() on ssh_keygen on gluster. But there is a transition defined by init_initrc_domain() because we need to allow execute unconfined services by glusterd. So ssh-keygen ends up with ssh_keygen_t and we need to allow to manage /var/lib/glusterd/geo-replication/secret.pem. - Allow sshd to execute gnome-keyring if there is configured pam_gnome_keyring.so. - Allow gnome-keyring executed by passwd to access /run/user/UID/keyring to change a password. - Label gluster python hooks also as bin_t. - Allow glusterd to interact with gluster tools running in a user domain - Add glusterd_manage_lib_files() interface. - ntop reads /var/lib/ntop/macPrefix.db and it needs dac_override. It has setuid/setgid. - Allow samba_t net_admin capability to make CIFS mount working. - S30samba-start gluster hooks wants to search audit logs. Dontaudit it. Resolves:#1224879- Allow glusterd to send generic signals to systemd_passwd_agent processes. - Allow glusterd to access init scripts/units without defined policy - Allow glusterd to run init scripts. - Allow glusterd to execute /usr/sbin/xfs_dbin glusterd_t domain. Resolves:#1224879- Calling cron_system_entry() in pcp_domain_template needs to be a part of optional_policy block. - Allow samba-net to access /var/lib/ctdbd dirs/files. - Allow glusterd to send a signal to smbd. - Make ctdbd as home manager to access also FUSE. - Allow glusterd to use geo-replication gluster tool. - Allow glusterd to execute ssh-keygen. - Allow glusterd to interact with cluster services. - Allow glusterd to connect to the system DBUS for service (acquire_svc). - Label /dev/log correctly. Resolves:#1230932- Back port the latest F22 changes to RHEL7. It should fix most of RHEL7.2 bugs - Add cgdcbxd policy Resolves:#1072493 - Fix ftp_homedir boolean Resolve:#1097775 - Dontaudit ifconfig writing inhertited /var/log/pluto.log. - Allow cluster domain to dbus chat with systemd-logind. Resolves:#1145215 - Dontaudit write access to inherited kdumpctl tmp files Resolves:#1156442 - Allow isnsd_t to communicate with sssd Resolves:#1167702 - Allow rwho_t to communicate with sssd Resolves:#1167718 - Allow sblim_gatherd_t to communicate with sssd Resolves:#1167732 - Allow pkcs_slotd_t to communicate with sssd Resolves:#1167737 - Allow openvswitch_t to communicate with sssd Resolves:#1167816 - Allow mysqld_safe_t to communicate with sssd Resolves:#1167832 - Allow sshd_keygen_t to communicate with sssd Resolves:#1167840 - Add support for iprdbg logging files in /var/log. Resolves:#1174363 - Allow tmpreaper_t to manage ntp log content Resolves:#1176965 - Allow gssd_t to manage ssh keyring Resolves:#1184791 - Allow httpd_sys_script_t to send system log messages Resolves:#1185231 - Allow apcupsd_t to read /sys/devices Resolves:#1189185 - Allow dovecot_t sys_resource capability Resolves:#1191143 - Add support for mongod/mongos systemd unit files. Resolves:#1197038 - Add bacula fixes - Added label mysqld_etc_t for /etc/my.cnf.d/ dir. Resolves:#1203991- Label /usr/libexec/postgresql-ctl as postgresql_exec_t. - Add more restriction on entrypoint for unconfined domains. - Only allow semanage_t to be able to setenforce 0, no all domains that use selinux_semanage interface - Allow all domains to read /dev/urandom. It is needed by all apps/services linked to libgcrypt. There is no harm to allow it by default. - Update policy/mls for sockets related to access perm. Rules were contradictory. - Add nagios_run_pnp4nagios and nagios_run_sudo booleans to allow r un sudo from NRPE utils scripts and allow run nagios in conjunction w ith PNP4Nagios. Resolves:#1201054 - Don't use deprecated userdom_manage_tmpfs_role() interface calliing and use userdom_manage_tmp_role() instead. - Update virt_read_pid_files() interface to allow read also symlinks with virt_var_run_t type - Label /var/lib/tftpboot/aarch64(/.*)? and /var/lib/tftpboot/images2(/.*)? - Add support for iprdbg logging files in /var/log. - Add fixes to rhsmcertd_t - Allow puppetagent_t to transfer firewalld messages over dbus - Add support for /usr/libexec/mongodb-scl-helper RHSCL helper script. - Added label mysqld_etc_t for /etc/my.cnf.d/ dir. - Add support for mongod/mongos systemd unit files. - cloudinit and rhsmcertd need to communicate with dbus - Allow dovecot_t sys_resource capability- ALlow mongod execmem by default. - Update policy/mls for sockets. Rules were contradictory. Resolves:#1207133 - Allow a user to login with different security level via ssh.- Update seutil_manage_config() interface. Resolves:#1185962 - Allow pki-tomcat relabel pki_tomcat_etc_rw_t. - Turn on docker_transition_unconfined by default- Allow virtd to list all mountpoints. Resolves:#1180713- pkcsslotd_lock_t should be an alias for pkcs_slotd_lock_t. - Allow fowner capability for sssd because of selinux_child handling. - ALlow bind to read/write inherited ipsec pipes - Allow hypervkvp to read /dev/urandom and read addition states/config files. - Allow gluster rpm scripletto create glusterd socket with correct labeling. This is a workaround until we get fix in glusterd. - Add glusterd_filetrans_named_pid() interface - Allow radiusd to connect to radsec ports. - Allow setuid/setgid for selinux_child - Allow lsmd plugin to connect to tcp/5988 by default. - Allow lsmd plugin to connect to tcp/5989 by default. - Update ipsec_manage_pid() interface. Resolves:#1184978- Update ipsec_manage_pid() interface. Resolves:#1184978- Allow ntlm_auth running in winbind_helper_t to access /dev/urandom.- Add auditing support for ipsec. Resolves:#1182524 - Label /ostree/deploy/rhel-atomic-host/deploy directory as system_conf_t - Allow netutils chown capability to make tcpdump working with -w- Allow ipsec to execute _updown.netkey script to run unbound-control. - Allow neutron to read rpm DB. - Add additional fixes for hyperkvp * creates new ifcfg-{name} file * Runs hv_set_ifconfig.sh, which does the following * Copies ifcfg-{name} to /etc/sysconfig/network-scripts - Allow svirt to read symbolic links in /sys/fs/cgroups labeled as tmpfs_t - Add labeling for pacemaker.log. - Allow radius to connect/bind radsec ports. - Allow pm-suspend running as virt_qemu_ga to read /var/log/pm-suspend.log - Allow virt_qemu_ga to dbus chat with rpm. - Update virt_read_content() interface to allow read also char devices. - Allow glance-registry to connect to keystone port. Resolves:#1181818- Allow sssd to send dbus all user domains. Resolves:#1172291 - Allow lsm plugin to read certificates. - Fix labeling for keystone CGI scripts. - Make snapperd back as unconfined domain.- Fix bugs in interfaces discovered by sepolicy. - Allow slapd to read /usr/share/cracklib/pw_dict.hwm. - Allow lsm plugins to connect to tcp/18700 by default. - Allow brltty mknod capability to allow create /var/run/brltty/vcsa. - Fix pcp_domain_template() interface. - Fix conman.te. - Allow mon_fsstatd to read /proc/sys/fs/binfmt_misc - Allow glance-scrubber to connect tcp/9191. - Add missing setuid capability for sblim-sfcbd. - Allow pegasus ioctl() on providers. - Add conman_can_network. - Allow chronyd to read chrony conf files located in /run/timemaster/. - Allow radius to bind on tcp/1813 port. - dontaudit block suspend access for openvpn_t - Allow conman to create files/dirs in /tmp. - Update xserver_rw_xdm_keys() interface to have 'setattr'. Resolves:#1172291 - Allow sulogin to read /dev/urandom and /dev/random. - Update radius port definition to have also tcp/18121 - Label prandom as random_device_t. - Allow charon to manage files in /etc/strongimcv labeled as ipsec_conf_t.- Allow virt_qemu_ga_t to execute kmod. - Add missing files_dontaudit_list_security_dirs() for smbd_t in samba_export_all_ro boolean. - Add additionnal MLS attribute for oddjob_mkhomedir to create homedirs. Resolves:#1113725 - Enable OpenStack cinder policy - Add support for /usr/share/vdsm/daemonAdapter - Add support for /var/run/gluster- Remove old pkcsslotd.pp from minimum package - Allow rlogind to use also rlogin ports. - Add support for /usr/libexec/ntpdate-wrapper. Label it as ntpdate_exec_t. - Allow bacula to connect also to postgresql. - Label /usr/libexec/tomcat/server as tomcat_exec_t - Add support for /usr/sbin/ctdbd_wrapper - Add support for /usr/libexec/ppc64-diag/rtas_errd - Allow rpm_script_roles to access system_mail_t - Allow brltty to create /var/run/brltty - Allow lsmd plugin to access netlink_route_socket - Allow smbcontrol to read passwd - Add support for /usr/libexec/sssd/selinux_child and create sssd_selinux_manager_t domain for it Resolves:#1140106 - Allow osad to execute rhn_check - Allow load_policy to rw inherited sssd pipes because of selinux_child - Allow admin SELinux users mounting / as private within a new mount namespace as root in MLS - Add additional fixes for su_restricted_domain_template to make moving to sysadm_r and trying to su working correctly - Add additional booleans substitions- Add seutil_dontaudit_access_check_semanage_module_store() interface Resolves:#1140106 - Update to have all _systemctl() interface also init_reload_services(). - Dontaudit access check on SELinux module store for sssd. - Add labeling for /sbin/iw. - Allow named_filetrans_domain to create ibus directory with correct labeling.- Allow radius to bind tcp/1812 radius port. - Dontaudit list user_tmp files for system_mail_t. - Label virt-who as virtd_exec_t. - Allow rhsmcertd to send a null signal to virt-who running as virtd_t. - Add missing alias for _content_rw_t. Resolves:#1089177 - Allow spamd to access razor-agent.log. - Add fixes for sfcb from libvirt-cim TestOnly bug. - Allow NetworkManager stream connect on openvpn. - Make /usr/bin/vncserver running as unconfined_service_t. - getty_t should be ranged in MLS. Then also local_login_t runs as ranged domain. - Label /etc/docker/certs.d as cert_t.- Label /etc/strongimcv as ipsec_conf_file_t. - Add support for /usr/bin/start-puppet-ca helper script Resolves:#1160727 - Allow rpm scripts to enable/disable transient systemd units. Resolves:#1154613 - Make kpropdas nsswitch domain Resolves:#1153561 - Make all glance domain as nsswitch domains Resolves:#1113281 - Allow selinux_child running as sssd access check on /etc/selinux/targeted/modules/active - Allow access checks on setfiles/load_policy/semanage_lock for selinux_child running as sssd_t Resolves:#1140106- Dontaudit access check on setfiles/load_policy for sssd_t. Resolves:#1140106 - Add kdump_rw_inherited_kdumpctl_tmp_pipes() Resolves:#1156442 - Make linuxptp services as unconfined. - Added new policy linuxptp. Resolves:#1149693 - Label keystone cgi files as keystone_cgi_script_exec_t. Resolves:#1138424 - Make tuned as unconfined domain- Allow guest to connect to libvirt using unix_stream_socket. - Allow all bus client domains to dbus chat with unconfined_service_t. - Allow inetd service without own policy to run in inetd_child_t which is unconfined domain. - Make opensm as nsswitch domain to make it working with sssd. - Allow brctl to read meminfo. - Allow winbind-helper to execute ntlm_auth in the caller domain. Resolves:#1160339 - Make plymouthd as nsswitch domain to make it working with sssd. Resolves:#1160196 - Make drbd as nsswitch domain to make it working with sssd. - Make conman as nsswitch domain to make ipmitool.exp runing as conman_t working. - Add support for /var/lib/sntp directory. - Add fixes to allow docker to create more content in tmpfs ,and donaudit reading /proc - Allow winbind to read usermodehelper - Allow telepathy domains to execute shells and bin_t - Allow gpgdomains to create netlink_kobject_uevent_sockets - Allow mongodb to bind to the mongo port and mongos to run as mongod_t - Allow abrt to read software raid state. - Allow nslcd to execute netstat. - Allow dovecot to create user's home directory when they log into IMAP. - Allow login domains to create kernel keyring with different level.- Allow modemmanger to connectto itself Resolves:#1120152 - Allow pki_tomcat to create link files in /var/lib/pki-ca. Resolves:#1121744 - varnishd needs to have fsetid capability Resolves:#1125165 - Allow snapperd to dbus chat with system cron jobs. Resolves:#1152447 - Allow dovecot to create user's home directory when they log into IMAP Resolves:#1152773 - Add labeling for /usr/sbin/haproxy-systemd-wrapper wrapper to make haproxy running haproxy_t. - ALlow listen and accept on tcp socket for init_t in MLS. Previously it was for xinetd_t. - Allow nslcd to execute netstat. - Add suppor for keepalived unconfined scripts and allow keepalived to read all domain state and kill capability. - Allow nslcd to read /dev/urandom.- Add back kill permisiion for system class Resolves:#1150011- Add back kill permisiion for service class Resolves:#1150011 - Make rhsmcertd_t also as dbus domain. - Allow named to create DNS_25 with correct labeling. - Add cloudform_dontaudit_write_cloud_log() - Call auth_use_nsswitch to apache to read/write cloud-init keys. - Allow cloud-init to dbus chat with certmonger. - Fix path to mon_statd_initrc_t script. - Allow all RHCS services to read system state. - Allow dnssec_trigger_t to execute unbound-control in own domain. - kernel_read_system_state needs to be called with type. Moved it to antivirus.if. - Added policy for mon_statd and mon_procd services. BZ (1077821) - Allow opensm_t to read/write /dev/infiniband/umad1. - Allow mongodb to manage own log files. - Allow neutron connections to system dbus. - Add support for /var/lib/swiftdirectory. - Allow nova-scheduler to read certs. - Allow openvpn to access /sys/fs/cgroup dir. - Allow openvpn to execute systemd-passwd-agent in systemd_passwd_agent_t to make openvpn working with systemd. - Fix samba_export_all_ro/samba_export_all_rw booleans to dontaudit search/read security files. - Add auth_use_nsswitch for portreserve to make it working with sssd. - automount policy is non-base module so it needs to be called in optional block. - ALlow sensord to getattr on sysfs. - Label /usr/share/corosync/corosync as cluster_exec_t. - Allow lmsd_plugin to read passwd file. BZ(1093733) - Allow read antivirus domain all kernel sysctls. - Allow mandb to getattr on file systems - Allow nova-console to connect to mem_cache port. - Make sosreport as unconfined domain. - Allow mondogdb to 'accept' accesses on the tcp_socket port. - ALlow sanlock to send a signal to virtd_t.- Build also MLS policy Resolves:#1138424- Add back kill permisiion for system class - Allow iptables read fail2ban logs. - Fix radius labeled ports - Add userdom_manage_user_tmpfs_files interface - Allow libreswan to connect to VPN via NM-libreswan. - Label 4101 tcp port as brlp port - fix dev_getattr_generic_usb_dev interface - Allow all domains to read fonts - Make sure /run/systemd/generator and system is labeled correctly on creation. - Dontaudit aicuu to search home config dir. - Make keystone_cgi_script_t domain. Resolves:#1138424 - Fix bug in drbd policy, - Added support for cpuplug. - ALlow sanlock_t to read sysfs_t. - Added sendmail_domtrans_unconfined interface - Fix broken interfaces - radiusd wants to write own log files. - Label /usr/libexec/rhsmd as rhsmcertd_exec_t - Allow rhsmcertd send signull to setroubleshoot. - Allow rhsmcertd manage rpm db. - Added policy for blrtty. - Fix keepalived policy - Allow rhev-agentd dbus chat with systemd-logind. - Allow keepalived manage snmp var lib sock files. - Add support for /var/lib/graphite-web - Allow NetworkManager to create Bluetooth SDP sockets - It's going to do the the discovery for DUN service for modems with Bluez 5. - Allow swift to connect to all ephemeral ports by default. - Allow sssd to read selinux config to add SELinux user mapping. - Allow lsmd to search own plguins. - Allow abrt to read /dev/memto generate an unique machine_id and uses sosuploader's algorithm based off dmidecode[1] fields. - ALlow zebra for user/group look-ups. - Allow nova domains to getattr on all filesystems. - Allow collectd sys_ptrace and dac_override caps because of reading of /proc/%i/io for several processes. - Allow pppd to connect to /run/sstpc/sstpc-nm-sstp-service-28025 over unix stream socket. - Allow rhnsd_t to manage also rhnsd config symlinks. - ALlow user mail domains to create dead.letter. - Allow rabbitmq_t read rabbitmq_var_lib_t lnk files. - Allow pki-tomcat to change SELinux object identity. - Allow radious to connect to apache ports to do OCSP check - Allow git cgi scripts to create content in /tmp - Allow cockpit-session to do GSSAPI logins. - Allow sensord read in /proc - Additional access required by usbmuxd- Allow locate to look at files/directories without labels, and chr_file and blk_file on non dev file systems - Label /usr/lib/erlang/erts.*/bin files as bin_t - Add files_dontaudit_access_check_home_dir() inteface. - Allow udev_t mounton udev_var_run_t dirs #(1128618) - Add systemd_networkd_var_run_t labeling for /var/run/systemd/netif and allow systemd-networkd to manage it. - Add init_dontaudit_read_state() interface. - Add label for ~/.local/share/fonts - Allow unconfined_r to access unconfined_service_t. - Allow init to read all config files - Add new interface to allow creation of file with lib_t type - Assign rabbitmq port. - Allow unconfined_service_t to dbus chat with all dbus domains - Add new interfaces to access users keys. - Allow domains to are allowed to mounton proc to mount on files as well as dirs - Fix labeling for HOME_DIR/tmp and HOME_DIR/.tmp directories. - Add a port definition for shellinaboxd - Label ~/tmp and ~/.tmp directories in user tmp dirs as user_tmp_t - Allow userdomains to stream connect to pcscd for smart cards - Allow programs to use pam to search through user_tmp_t dires (/tmp/.X11-unix) - Update to rawhide-contrib changes Resolves:#1123844- Rebase to 3.13.1 which we have in Fedora21 Resolves:#1128284- Back port fixes from Fedora. Mainly OpenStack and Docker fixes- Add policy-rhel-7.1-{base,contrib} patches- Add support for us_cli ports - Fix labeling for /var/run/user//gvfs - add support for tcp/9697 - Additional rules required by openstack, needs backport to F20 and RHEL7 - Additional access required by docker - ALlow motion to use tcp/8082 port - Allow init_t to setattr/relabelfrom dhcp state files - Dontaudit antivirus domains read access on all security files by default - Add missing alias for old amavis_etc_t type - Allow block_suspend cap for haproxy - Additional fixes for instack overcloud - Allow OpenStack to read mysqld_db links and connect to MySQL - Remove dup filename rules in gnome.te - Allow sys_chroot cap for httpd_t and setattr on httpd_log_t - Allow iscsid to handle own unit files - Add iscsi_systemctl() - Allow mongod to create also sock_files in /run with correct labeling - Allow httpd to send signull to apache script domains and don't audit leaks - Allow rabbitmq_beam to connect to httpd port - Allow aiccu stream connect to pcscd - Allow dmesg to read hwdata and memory dev - Allow all freeipmi domains to read/write ipmi devices - Allow sblim_sfcbd to use also pegasus-https port - Allow rabbitmq_epmd to manage rabbit_var_log_t files - Allow chronyd to read /sys/class/hwmon/hwmon1/device/temp2_input - Allow docker to status any unit file and allow it to start generic unit files- Change hsperfdata_root to have as user_tmp_t Resolves:#1076523- Fix Multiple same specifications for /var/named/chroot/dev/zero - Add labels for /var/named/chroot_sdb/dev devices - Add support for strongimcv - Use kerberos_keytab_domains in auth_use_nsswitch - Update auth_use_nsswitch to make all these types as kerberos_keytab_domain to - Allow net_raw cap for neutron_t and send sigkill to dnsmasq - Fix ntp_filetrans_named_content for sntp-kod file - Add httpd_dbus_sssd boolean - Dontaudit exec insmod in boinc policy - Rename kerberos_keytab_domain to kerberos_keytab_domains - Add kerberos_keytab_domain() - Fix kerberos_keytab_template() - Make all domains which use kerberos as kerberos_keytab_domain Resolves:#1083670 - Allow kill capability to winbind_t- varnishd wants chown capability - update ntp_filetrans_named_content() interface - Add additional fixes for neutron_t. #1083335 - Dontaudit getattr on proc_kcore_t - Allow pki_tomcat_t to read ipa lib files - Allow named_filetrans_domain to create /var/cache/ibus with correct labelign - Allow init_t run /sbin/augenrules - Add dev_unmount_sysfs_fs and sysnet_manage_ifconfig_run interfaces - Allow unpriv SELinux user to use sandbox - Add default label for /tmp/hsperfdata_root- Add file subs also for /var/home- Allow xauth_t to read user_home_dir_t lnk_file - Add labeling for lightdm-data - Allow certmonger to manage ipa lib files - Add support for /var/lib/ipa - Allow pegasus to getattr virt_content - Added some new rules to pcp policy - Allow chrome_sandbox to execute config_home_t - Add support for ABRT FAF- Allow kdm to send signull to remote_login_t process - Add gear policy - Turn on gear_port_t - Allow cgit to read gitosis lib files by default - Allow vdagent to read xdm state - Allow NM and fcoeadm to talk together over unix_dgram_socket- Back port fixes for pegasus_openlmi_admin_t from rawhide Resolves:#1080973 - Add labels for ostree - Add SELinux awareness for NM - Label /usr/sbin/pwhistory_helper as updpwd_exec_t- add gnome_append_home_config() - Allow thumb to append GNOME config home files - Allow rasdaemon to rw /dev/cpu//msr - fix /var/log/pki file spec - make bacula_t as auth_nsswitch domain - Identify pki_tomcat_cert_t as a cert_type - Define speech-dispater_exec_t as an application executable - Add a new file context for /var/named/chroot/run directory - update storage_filetrans_all_named_dev for sg* devices - Allow auditctl_t to getattr on all removeable devices - Allow nsswitch_domains to stream connect to nmbd - Allow unprivusers to connect to memcached - label /var/lib/dirsrv/scripts-INSTANCE as bin_t- Allow also unpriv user to run vmtools - Allow secadm to read /dev/urandom and meminfo Resolves:#1079250 - Add booleans to allow docker processes to use nfs and samba - Add mdadm_tmpfs support - Dontaudit net_amdin for /usr/lib/jvm/java-1.7.0-openjdk-1.7.0.51-2.4.5.1.el7.x86_64/jre-abrt/bin/java running as pki_tomcat_t - Allow vmware-user-sui to use user ttys - Allow talk 2 users logged via console too - Allow ftp services to manage xferlog_t - Make all pcp domanis as unconfined for RHEL7.0 beucause of new policies - allow anaconda to dbus chat with systemd-localed- allow anaconda to dbus chat with systemd-localed - Add fixes for haproxy based on bperkins@redhat.com - Allow cmirrord to make dmsetup working - Allow NM to execute arping - Allow users to send messages through talk - Add userdom_tmp_role for secadm_t- Add additional fixes for rtas_errd - Fix transitions for tmp/tmpfs in rtas.te - Allow rtas_errd to readl all sysctls- Add support for /var/spool/rhsm/debug - Make virt_sandbox_use_audit as True by default - Allow svirt_sandbox_domains to ptrace themselves- Allow docker containers to manage /var/lib/docker content- Allow docker to read tmpfs_t symlinks - Allow sandbox svirt_lxc_net_t to talk to syslog and to sssd over stream sockets- Allow collectd to talk to libvirt - Allow chrome_sandbox to use leaked unix_stream_sockets - Dontaudit leaks of sockets into chrome_sandbox_t - If you create a cups directory in /var/cache then it should be labeled cups_rw_etc_t - Run vmtools as unconfined domains - Allow snort to manage its log files - Allow systemd_cronjob_t to be entered via bin_t - Allow procman to list doveconf_etc_t - allow keyring daemon to create content in tmpfs directories - Add proper labelling for icedtea-web - vpnc is creating content in networkmanager var run directory - Label sddm as xdm_exec_t to make KDE working again - Allow postgresql to read network state - Allow java running as pki_tomcat to read network sysctls - Fix cgroup.te to allow cgred to read cgconfig_etc_t - Allow beam.smp to use ephemeral ports - Allow winbind to use the nis to authenticate passwords- Make rtas_errd_t as unconfined domain for F20.It needs additional fixes. It runs rpm at least. - Allow net_admin cap for fence_virtd running as fenced_t - Make abrt-java-connector working - Make cimtest script 03_defineVS.py of ComputerSystem group working - Fix git_system_enable_homedirs boolean - Allow munin mail plugins to read network systcl- Allow vmtools_helper_t to execute bin_t - Add support for /usr/share/joomla - /var/lib/containers should be labeled as openshift content for now - Allow docker domains to talk to the login programs, to allow a process to login into the container - Allow install_t do dbus chat with NM - Fix interface names in anaconda.if - Add install_t for anaconda. A new type is a part of anaconda policy - sshd to read network sysctls- Allow zabbix to send system log msgs - Allow init_t to stream connect to ipsec Resolves:#1060775- Add docker_connect_any boolean- Allow unpriv SELinux users to dbus chat with firewalld - Add lvm_write_metadata() - Label /etc/yum.reposd dir as system_conf_t. Should be safe because system_conf_t is base_ro_file_type - Allow pegasus_openlmi_storage_t to write lvm metadata - Add hide_broken_symptoms for kdumpgui because of systemd bug - Make kdumpgui_t as unconfined domain Resolves:#1044299 - Allow docker to connect to tcp/5000- Allow numad to write scan_sleep_millisecs - Turn on entropyd_use_audio boolean by default - Allow cgred to read /etc/cgconfig.conf because it contains templates used together with rules from /etc/cgrules.conf. - Allow lscpu running as rhsmcertd_t to read /proc/sysinfo - Fix label on irclogs in the homedir - Allow kerberos_keytab_domain domains to manage keys until we get sssd fix - Allow postgresql to use ldap - Add missing syslog-conn port - Add support for /dev/vmcp and /dev/sclp Resolves:#1069310- Modify xdm_write_home to allow create files/links in /root with xdm_home_ - Allow virt domains to read network state Resolves:#1072019- Added pcp rules - dontaudit openshift_cron_t searching random directories, should be back ported to RHEL6 - clean up ctdb.te - Allow ctdbd to connect own ports - Fix samba_export_all_rw booleanto cover also non security dirs - Allow swift to exec rpm in swift_t and allow to create tmp files/dirs - Allow neutron to create /run/netns with correct labeling - Allow certmonger to list home dirs- Change userdom_use_user_inherited_ttys to userdom_use_user_ttys for systemd-tty-ask - Add sysnet_filetrans_named_content_ifconfig() interface - Allow ctdbd to connect own ports - Fix samba_export_all_rw booleanto cover also non security dirs - Allow swift to exec rpm in swift_t and allow to create tmp files/dirs - Allow neutron to create /run/netns with correct labeling - Allow kerberos keytab domains to manage sssd/userdomain keys" - Allow to run ip cmd in neutron_t domain- Allow block_suspend cap2 for systemd-logind and rw dri device - Add labeling for /usr/libexec/nm-libreswan-service - Allow locallogin to rw xdm key to make Virtual Terminal login providing smartcard pin working - Add xserver_rw_xdm_keys() - Allow rpm_script_t to dbus chat also with systemd-located - Fix ipa_stream_connect_otpd() - update lpd_manage_spool() interface - Allow krb5kdc to stream connect to ipa-otpd - Add ipa_stream_connect_otpd() interface - Allow vpnc to unlink NM pids - Add networkmanager_delete_pid_files() - Allow munin plugins to access unconfined plugins - update abrt_filetrans_named_content to cover /var/spool/debug - Label /var/spool/debug as abrt_var_cache_t - Allow rhsmcertd to connect to squid port - Make docker_transition_unconfined as optional boolean - Allow certmonger to list home dirs- Make snapperd as unconfined domain and add additional fixes for it - Remove nsplugin.pp module on upgrade- Add snapperd_home_t for HOME_DIR/.snapshots directory - Make sosreport as unconfined domain - Allow sosreport to execute grub2-probe - Allow NM to manage hostname config file - Allow systemd_timedated_t to dbus chat with rpm_script_t - Allow lsmd plugins to connect to http/ssh/http_cache ports by default - Add lsmd_plugin_connect_any boolean - Allow mozilla_plugin to attempt to set capabilities - Allow lsdm_plugins to use tcp_socket - Dontaudit mozilla plugin from getattr on /proc or /sys - Dontaudit use of the keyring by the services in a sandbox - Dontaudit attempts to sys_ptrace caused by running ps for mysqld_safe_t - Allow rabbitmq_beam to connect to jabber_interserver_port - Allow logwatch_mail_t to transition to qmail_inject and queueu - Added new rules to pcp policy - Allow vmtools_helper_t to change role to system_r - Allow NM to dbus chat with vmtools - Fix couchdb_manage_files() to allow manage couchdb conf files - Add support for /var/run/redis.sock - dontaudit gpg trying to use audit - Allow consolekit to create log directories and files - Fix vmtools policy to allow user roles to access vmtools_helper_t - Allow block_suspend cap2 for ipa-otpd - Allow pkcsslotd to read users state - Add ioctl to init_dontaudit_rw_stream_socket - Add systemd_hostnamed_manage_config() interface - Remove transition for temp dirs created by init_t - gdm-simple-slave uses use setsockopt - sddm-greater is a xdm type program- Add lvm_read_metadata() - Allow auditadm to search /var/log/audit dir - Add lvm_read_metadata() interface - Allow confined users to run vmtools helpers - Fix userdom_common_user_template() - Generic systemd unit scripts do write check on / - Allow init_t to create init_tmp_t in /tmp.This is for temporary content created by generic unit files - Add additional fixes needed for init_t and setup script running in generic unit files - Allow general users to create packet_sockets - added connlcli port - Add init_manage_transient_unit() interface - Allow init_t (generic unit files) to manage rpc state date as we had it for initrc_t - Fix userdomain.te to require passwd class - devicekit_power sends out a signal to all processes on the message bus when power is going down - Dontaudit rendom domains listing /proc and hittping system_map_t - Dontauit leaks of var_t into ifconfig_t - Allow domains that transition to ssh_t to manipulate its keyring - Define oracleasm_t as a device node - Change to handle /root as a symbolic link for os-tree - Allow sysadm_t to create packet_socket, also move some rules to attributes - Add label for openvswitch port - Remove general transition for files/dirs created in /etc/mail which got etc_aliases_t label. - Allow postfix_local to read .forward in pcp lib files - Allow pegasus_openlmi_storage_t to read lvm metadata - Add additional fixes for pegasus_openlmi_storage_t - Allow bumblebee to manage debugfs - Make bumblebee as unconfined domain - Allow snmp to read etc_aliases_t - Allow lscpu running in pegasus_openlmi_storage_t to read /dev/mem - Allow pegasus_openlmi_storage_t to read /proc/1/environ - Dontaudit read gconf files for cupsd_config_t - make vmtools as unconfined domain - Add vmtools_helper_t for helper scripts. Allow vmtools shutdonw a host and run ifconfig. - Allow collectd_t to use a mysql database - Allow ipa-otpd to perform DNS name resolution - Added new policy for keepalived - Allow openlmi-service provider to manage transitient units and allow stream connect to sssd - Add additional fixes new pscs-lite+polkit support - Add labeling for /run/krb5kdc - Change w3c_validator_tmp_t to httpd_w3c_validator_tmp_t in F20 - Allow pcscd to read users proc info - Dontaudit smbd_t sending out random signuls - Add boolean to allow openshift domains to use nfs - Allow w3c_validator to create content in /tmp - zabbix_agent uses nsswitch - Allow procmail and dovecot to work together to deliver mail - Allow spamd to execute files in homedir if boolean turned on - Allow openvswitch to listen on port 6634 - Add net_admin capability in collectd policy - Fixed snapperd policy - Fixed bugsfor pcp policy - Allow dbus_system_domains to be started by init - Fixed some interfaces - Add kerberos_keytab_domain attribute - Fix snapperd_conf_t def- Addopt corenet rules for unbound-anchor to rpm_script_t - Allow runuser to send send audit messages. - Allow postfix-local to search .forward in munin lib dirs - Allow udisks to connect to D-Bus - Allow spamd to connect to spamd port - Fix syntax error in snapper.te - Dontaudit osad to search gconf home files - Allow rhsmcertd to manage /etc/sysconf/rhn director - Fix pcp labeling to accept /usr/bin for all daemon binaries - Fix mcelog_read_log() interface - Allow iscsid to manage iscsi lib files - Allow snapper domtrans to lvm_t. Add support for /etc/snapper and allow snapperd to manage it. - Make tuned_t as unconfined domain for RHEL7.0 - Allow ABRT to read puppet certs - Add sys_time capability for virt-ga - Allow gemu-ga to domtrans to hwclock_t - Allow additional access for virt_qemu_ga_t processes to read system clock and send audit messages - Fix some AVCs in pcp policy - Add to bacula capability setgid and setuid and allow to bind to bacula ports - Changed label from rhnsd_rw_conf_t to rhnsd_conf_t - Add access rhnsd and osad to /etc/sysconfig/rhn - drbdadm executes drbdmeta - Fixes needed for docker - Allow epmd to manage /var/log/rabbitmq/startup_err file - Allow beam.smp connect to amqp port - Modify xdm_write_home to allow create also links as xdm_home_t if the boolean is on true - Allow init_t to manage pluto.ctl because of init_t instead of initrc_t - Allow systemd_tmpfiles_t to manage all non security files on the system - Added labels for bacula ports - Fix label on /dev/vfio/vfio - Add kernel_mounton_messages() interface - init wants to manage lock files for iscsi- Added osad policy - Allow postfix to deliver to procmail - Allow bumblebee to seng kill signal to xserver - Allow vmtools to execute /usr/bin/lsb_release - Allow docker to write system net ctrls - Add support for rhnsd unit file - Add dbus_chat_session_bus() interface - Add dbus_stream_connect_session_bus() interface - Fix pcp.te - Fix logrotate_use_nfs boolean - Add lot of pcp fixes found in RHEL7 - fix labeling for pmie for pcp pkg - Change thumb_t to be allowed to chat/connect with session bus type - Allow call renice in mlocate - Add logrotate_use_nfs boolean - Allow setroubleshootd to read rpc sysctl- Turn on bacula, rhnsd policy - Add support for rhnsd unit file - Add dbus_chat_session_bus() interface - Add dbus_stream_connect_session_bus() interface - Fix logrotate_use_nfs boolean - Add lot of pcp fixes found in RHEL7 - fix labeling for pmie for pcp pkg - Change thumb_t to be allowed to chat/connect with session bus type - Allow call renice in mlocate - Add logrotate_use_nfs boolean - Allow setroubleshootd to read rpc sysctl - Fixes for *_admin interfaces - Add pegasus_openlmi_storage_var_run_t type def - Add support for /var/run/openlmi-storage - Allow tuned to create syslog.conf with correct labeling - Add httpd_dontaudit_search_dirs boolean - Add support for winbind.service - ALlow also fail2ban-client to read apache logs - Allow vmtools to getattr on all fs - Add support for dey_sapi port - Add logging_filetrans_named_conf() - Allow passwd_t to use ipc_lock, so that it can change the password in gnome-keyring- Update snapper policy - Allow domains to append rkhunter lib files - Allow snapperd to getattr on all fs - Allow xdm to create /var/gdm with correct labeling - Add label for snapper.log - Allow fail2ban-client to read apache log files - Allow thumb_t to execute dbus-daemon in thumb_t- Allow gdm to create /var/gdm with correct labeling - Allow domains to append rkhunterl lib files. #1057982 - Allow systemd_tmpfiles_t net_admin to communicate with journald - Add interface to getattr on an isid_type for any type of file - Update libs_filetrans_named_content() to have support for /usr/lib/debug directory - Allow initrc_t domtrans to authconfig if unconfined is enabled - Allow docker and mount on devpts chr_file - Allow docker to transition to unconfined_t if boolean set - init calling needs to be optional in domain.te - Allow uncofined domain types to handle transient unit files - Fix labeling for vfio devices - Allow net_admin capability and send system log msgs - Allow lldpad send dgram to NM - Add networkmanager_dgram_send() - rkhunter_var_lib_t is correct type - Back port pcp policy from rawhide - Allow openlmi-storage to read removable devices - Allow system cron jobs to manage rkhunter lib files - Add rkhunter_manage_lib_files() - Fix ftpd_use_fusefs boolean to allow manage also symlinks - Allow smbcontrob block_suspend cap2 - Allow slpd to read network and system state info - Allow NM domtrans to iscsid_t if iscsiadm is executed - Allow slapd to send a signal itself - Allow sslget running as pki_ra_t to contact port 8443, the secure port of the CA. - Fix plymouthd_create_log() interface - Add rkhunter policy with files type definition for /var/lib/rkhunter until it is fixed in rkhunter package - Add mozilla_plugin_exec_t for /usr/lib/firefox/plugin-container - Allow postfix and cyrus-imapd to work out of box - Allow fcoemon to talk with unpriv user domain using unix_stream_socket - Dontaudit domains that are calling into journald to net_admin - Add rules to allow vmtools to do what it does - snapperd is D-Bus service - Allow OpenLMI PowerManagement to call 'systemctl --force reboot' - Add haproxy_connect_any boolean - Allow haproxy also to use http cache port by default Resolves:#1058248- Allow apache to write to the owncloud data directory in /var/www/html... - Allow consolekit to create log dir - Add support for icinga CGI scripts - Add support for icinga - Allow kdumpctl_t to create kdump lock file Resolves:#1055634 - Allow kdump to create lnk lock file - Allow nscd_t block_suspen capability - Allow unconfined domain types to manage own transient unit file - Allow systemd domains to handle transient init unit files - Add interfaces to handle transient- Add cron unconfined role support for uncofined SELinux user - Call corenet_udp_bind_all_ports() in milter.te - Allow fence_virtd to connect to zented port - Fix header for mirrormanager_admin() - Allow dkim-milter to bind udp ports - Allow milter domains to send signull itself - Allow block_suspend for yum running as mock_t - Allow beam.smp to manage couchdb files - Add couchdb_manage_files() - Add labeling for /var/log/php_errors.log - Allow bumblebee to stream connect to xserver - Allow bumblebee to send a signal to xserver - gnome-thumbnail to stream connect to bumblebee - Allow xkbcomp running as bumblebee_t to execute bin_t - Allow logrotate to read squid.conf - Additional rules to get docker and lxc to play well with SELinux - Allow bumbleed to connect to xserver port - Allow pegasus_openlmi_storage_t to read hwdata- Allow init_t to work on transitient and snapshot unit files - Add logging_manage_syslog_config() - Update sysnet_dns_name_resolve() to allow connect to dnssec por - Allow pegasus_openlmi_storage_t to read hwdata Resolves:#1031721 - Fix rhcs_rw_cluster_tmpfs() - Allow fenced_t to bind on zented udp port - Added policy for vmtools - Fix mirrormanager_read_lib_files() - Allow mirromanager scripts running as httpd_t to manage mirrormanager pid files - Allow ctdb to create sock files in /var/run/ctdb - Add sblim_filetrans_named_content() interface - Allow rpm scritplets to create /run/gather with correct labeling - Allow gnome keyring domains to create gnome config dirs - Dontaudit read/write to init stream socket for lsmd_plugin_t - Allow automount to read nfs link files - Allow lsm plugins to read/write lsmd stream socket - Allow certmonger to connect ldap port to make IPA CA certificate renewal working. - Add also labeling for /var/run/ctdb - Add missing labeling for /var/lib/ctdb - ALlow tuned to manage syslog.conf. Should be fixed in tuned. #1030446 - Dontaudit hypervkvp to search homedirs - Dontaudit hypervkvp to search admin homedirs - Allow hypervkvp to execute bin_t and ifconfig in the caller domain - Dontaudit xguest_t to read ABRT conf files - Add abrt_dontaudit_read_config() - Allow namespace-init to getattr on fs - Add thumb_role() also for xguest - Add filename transitions to create .spamassassin with correct labeling - Allow apache domain to read mirrormanager pid files - Allow domains to read/write shm and sem owned by mozilla_plugin_t - Allow alsactl to send a generic signal to kernel_t- Add back rpm_run() for unconfined user- Add missing files_create_var_lib_dirs() - Fix typo in ipsec.te - Allow passwd to create directory in /var/lib - Add filename trans also for event21 - Allow iptables command to read /dev/rand - Add sigkill capabilityfor ipsec_t - Add filename transitions for bcache devices - Add additional rules to create /var/log/cron by syslogd_t with correct labeling - Add give everyone full access to all key rings - Add default lvm_var_run_t label for /var/run/multipathd - Fix log labeling to have correct default label for them after logrotate - Labeled ~/.nv/GLCache as being gstreamer output - Allow nagios_system_plugin to read mrtg lib files - Add mrtg_read_lib_files() - Call rhcs_rw_cluster_tmpfs for dlm_controld - Make authconfing as named_filetrans domain - Allow virsh to connect to user process using stream socket - Allow rtas_errd to read rand/urand devices and add chown capability - Fix labeling from /var/run/net-snmpd to correct /var/run/net-snmp Resolves:#1051497 - Add also chown cap for abrt_upload_watch_t. It already has dac_override - Allow sosreport to manage rhsmcertd pid files - Add rhsmcertd_manage_pid_files() - Allow also setgid cap for rpc.gssd - Dontaudit access check for abrt on cert_t - Allow pegasus_openlmi_system providers to dbus chat with systemd-logind- Fix semanage import handling in spec file- Add default lvm_var_run_t label for /var/run/multipathd Resolves:#1051430 - Fix log labeling to have correct default label for them after logrotate - Add files_write_root_dirs - Add new openflow port label for 6653/tcp and 6633/tcp - Add xserver_manage_xkb_libs() - Label tcp/8891 as milter por - Allow gnome_manage_generic_cache_files also create cache_home_t files - Fix aide.log labeling - Fix log labeling to have correct default label for them after logrotate - Allow mysqld-safe write access on /root to make mysqld working - Allow sosreport domtrans to prelikn - Allow OpenvSwitch to connec to openflow ports - Allow NM send dgram to lldpad - Allow hyperv domains to execute shell - Allow lsmd plugins stream connect to lsmd/init - Allow sblim domains to create /run/gather with correct labeling - Allow httpd to read ldap certs - Allow cupsd to send dbus msgs to process with different MLS level - Allow bumblebee to stream connect to apmd - Allow bumblebee to run xkbcomp - Additional allow rules to get libvirt-lxc containers working with docker - Additional allow rules to get libvirt-lxc containers working with docker - Allow docker to getattr on itself - Additional rules needed for sandbox apps - Allow mozilla_plugin to set attributes on usb device if use_spice boolean enabled - httpd should be able to send signal/signull to httpd_suexec_t - Add more fixes for neturon. Domtrans to dnsmasq, iptables. Make neutron as filenamtrans domain.- Add neutron fixes- Allow sshd to write to all process levels in order to change passwd when running at a level - Allow updpwd_t to downgrade /etc/passwd file to s0, if it is not running with this range - Allow apcuspd_t to status and start the power unit file - Allow udev to manage kdump unit file - Added new interface modutils_dontaudit_exec_insmod - Allow cobbler to search dhcp_etc_t directory - systemd_systemctl needs sys_admin capability - Allow sytemd_tmpfiles_t to delete all directories - passwd to create gnome-keyring passwd socket - Add missing zabbix_var_lib_t type - Fix filename trans for zabbixsrv in zabbix.te - Allow fprintd_t to send syslog messages - Add zabbix_var_lib_t for /var/lib/zabbixsrv, also allow zabix to connect to smtp port - Allow mozilla plugin to chat with policykit, needed for spice - Allow gssprozy to change user and gid, as well as read user keyrings - Label upgrades directory under /var/www as httpd_sys_rw_content_t, add other filetrans rules to label content correctly - Allow polipo to connect to http_cache_ports - Allow cron jobs to manage apache var lib content - Allow yppassword to manage the passwd_file_t - Allow showall_t to send itself signals - Allow cobbler to restart dhcpc, dnsmasq and bind services - Allow certmonger to manage home cert files - Add userdom filename trans for user mail domains - Allow apcuspd_t to status and start the power unit file - Allow cgroupdrulesengd to create content in cgoups directories - Allow smbd_t to signull cluster - Allow gluster daemon to create fifo files in glusterd_brick_t and sock_file in glusterd_var_lib_t - Add label for /var/spool/cron.aquota.user - Allow sandbox_x domains to use work with the mozilla plugin semaphore - Added new policy for speech-dispatcher - Added dontaudit rule for insmod_exec_t in rasdaemon policy - Updated rasdaemon policy - Allow system_mail_t to transition to postfix_postdrop_t - Clean up mirrormanager policy - Allow virt_domains to read cert files, needs backport to RHEL7 - Allow sssd to read systemd_login_var_run_t - Allow irc_t to execute shell and bin-t files: - Add new access for mythtv - Allow rsync_t to manage all non auth files - allow modemmanger to read /dev/urand - Allow sandbox apps to attempt to set and get capabilties- Add labeling for /var/lib/servicelog/servicelog.db-journal - Add support for freeipmi port - Add sysadm_u_default_contexts - Make new type to texlive files in homedir - Allow subscription-manager running as sosreport_t to manage rhsmcertd - Additional fixes for docker.te - Remove ability to do mount/sys_admin by default in virt_sandbox domains - New rules required to run docker images within libivrt - Add label for ~/.cvsignore - Change mirrormanager to be run by cron - Add mirrormanager policy - Fixed bumblebee_admin() and mip6d_admin() - Add log support for sensord - Fix typo in docker.te - Allow amanda to do backups over UDP - Allow bumblebee to read /etc/group and clean up bumblebee.te - type transitions with a filename not allowed inside conditionals - Don't allow virt-sandbox tools to use netlink out of the box, needs back port to RHEL7 - Make new type to texlive files in homedir- Allow freeipmi_ipmidetectd_t to use freeipmi port - Update freeipmi_domain_template() - Allow journalctl running as ABRT to read /run/log/journal - Allow NM to read dispatcher.d directory - Update freeipmi policy - Type transitions with a filename not allowed inside conditionals - Allow tor to bind to hplip port - Make new type to texlive files in homedir - Allow zabbix_agent to transition to dmidecode - Add rules for docker - Allow sosreport to send signull to unconfined_t - Add virt_noatsecure and virt_rlimitinh interfaces - Fix labeling in thumb.fc to add support for /usr/lib64/tumbler-1/tumblerddd support for freeipmi port - Add sysadm_u_default_contexts - Add logging_read_syslog_pid() - Fix userdom_manage_home_texlive() interface - Make new type to texlive files in homedir - Add filename transitions for /run and /lock links - Allow virtd to inherit rlimit information Resolves:#975358- Change labeling for /usr/libexec/nm-dispatcher.action to NetworkManager_exec_t Resolves:#1039879 - Add labeling for /usr/lib/systemd/system/mariadb.service - Allow hyperv_domain to read sysfs - Fix ldap_read_certs() interface to allow acess also link files - Add support for /usr/libexec/pegasus/cmpiLMI_Journald-cimprovagt - Allow tuned to run modprobe - Allow portreserve to search /var/lib/sss dir - Add SELinux support for the teamd package contains team network device control daemon. - Dontaudit access check on /proc for bumblebee - Bumblebee wants to load nvidia modules - Fix rpm_named_filetrans_log_files and wine.te - Add conman policy for rawhide - DRM master and input event devices are used by the TakeDevice API - Clean up bumblebee policy - Update pegasus_openlmi_storage_t policy - Add freeipmi_stream_connect() interface - Allow logwatch read madm.conf to support RAID setup - Add raid_read_conf_files() interface - Allow up2date running as rpm_t create up2date log file with rpm_log_t labeling - add rpm_named_filetrans_log_files() interface - Allow dkim-milter to create files/dirs in /tmp - update freeipmi policy - Add policy for freeipmi services - Added rdisc_admin and rdisc_systemctl interfaces - opensm policy clean up - openwsman policy clean up - ninfod policy clean up - Added new policy for ninfod - Added new policy for openwsman - Added rdisc_admin and rdisc_systemctl interfaces - Fix kernel_dontaudit_access_check_proc() - Add support for /dev/uhid - Allow sulogin to get the attributes of initctl and sys_admin cap - Add kernel_dontaudit_access_check_proc() - Fix dev_rw_ipmi_dev() - Fix new interface in devices.if - DRM master and input event devices are used by the TakeDevice API - add dev_rw_inherited_dri() and dev_rw_inherited_input_dev() - Added support for default conman port - Add interfaces for ipmi devices- Allow sosreport to send a signal to ABRT - Add proper aliases for pegasus_openlmi_service_exec_t and pegasus_openlmi_service_t - Label /usr/sbin/htcacheclean as httpd_exec_t Resolves:#1037529 - Added support for rdisc unit file - Add antivirus_db_t labeling for /var/lib/clamav-unofficial-sigs - Allow runuser running as logrotate connections to system DBUS - Label bcache devices as fixed_disk_device_t - Allow systemctl running in ipsec_mgmt_t to access /usr/lib/systemd/system/ipsec.service - Label /usr/lib/systemd/system/ipsec.service as ipsec_mgmt_unit_file_t- Add back setpgid/setsched for sosreport_t- Added fix for clout_init to transition to rpm_script_t (dwalsh@redhat.com)- Dontaudit openshift domains trying to use rawip_sockets, this is caused by a bad check in the kernel. - Allow git_system_t to read git_user_content if the git_system_enable_homedirs boolean is turned on - Add lsmd_plugin_t for lsm plugins - Allow dovecot-deliver to search mountpoints - Add labeling for /etc/mdadm.conf - Allow opelmi admin providers to dbus chat with init_t - Allow sblim domain to read /dev/urandom and /dev/random - Allow apmd to request the kernel load modules - Add glusterd_brick_t type - label mate-keyring-daemon with gkeyringd_exec_t - Add plymouthd_create_log() - Dontaudit leaks from openshift domains into mail domains, needs back port to RHEL6 - Allow sssd to request the kernel loads modules - Allow gpg_agent to use ssh-add - Allow gpg_agent to use ssh-add - Dontaudit access check on /root for myslqd_safe_t - Allow ctdb to getattr on al filesystems - Allow abrt to stream connect to syslog - Allow dnsmasq to list dnsmasq.d directory - Watchdog opens the raw socket - Allow watchdog to read network state info - Dontaudit access check on lvm lock dir - Allow sosreport to send signull to setroubleshootd - Add setroubleshoot_signull() interface - Fix ldap_read_certs() interface - Allow sosreport all signal perms - Allow sosreport to run systemctl - Allow sosreport to dbus chat with rpm - Add glusterd_brick_t files type - Allow zabbix_agentd to read all domain state - Clean up rtas.if - Allow smoltclient to execute ldconfig - Allow sosreport to request the kernel to load a module - Fix userdom_confined_admin_template() - Add back exec_content boolean for secadm, logadm, auditadm - Fix files_filetrans_system_db_named_files() interface - Allow sulogin to getattr on /proc/kcore - Add filename transition also for servicelog.db-journal - Add files_dontaudit_access_check_root() - Add lvm_dontaudit_access_check_lock() interface- Allow watchdog to read /etc/passwd - Allow browser plugins to connect to bumblebee - New policy for bumblebee and freqset - Add new policy for mip6d daemon - Add new policy for opensm daemon - Allow condor domains to read/write condor_master udp_socket - Allow openshift_cron_t to append to openshift log files, label /var/log/openshift - Add back file_pid_filetrans for /var/run/dlm_controld - Allow smbd_t to use inherited tmpfs content - Allow mcelog to use the /dev/cpu device - sosreport runs rpcinfo - sosreport runs subscription-manager - Allow staff_t to run frequency command - Allow systemd_tmpfiles to relabel log directories - Allow staff_t to read xserver_log file - Label hsperfdata_root as tmp_t- More sosreport fixes to make ABRT working- Fix files_dontaudit_unmount_all_mountpoints() - Add support for 2608-2609 tcp/udp ports - Should allow domains to lock the terminal device - More fixes for user config files to make crond_t running in userdomain - Add back disable/reload/enable permissions for system class - Fix manage_service_perms macro - We need to require passwd rootok - Fix zebra.fc - Fix dnsmasq_filetrans_named_content() interface - Allow all sandbox domains create content in svirt_home_t - Allow zebra domains also create zebra_tmp_t files in /tmp - Add support for new zebra services:isisd,babeld. Add systemd support for zebra services. - Fix labeling on neutron and remove transition to iconfig_t - abrt needs to read mcelog log file - Fix labeling on dnsmasq content - Fix labeling on /etc/dnsmasq.d - Allow glusterd to relabel own lib files - Allow sandbox domains to use pam_rootok, and dontaudit attempts to unmount file systems, this is caused by a bug in systemd - Allow ipc_lock for abrt to run journalctl- Fix config.tgz- Fix passenger_stream_connect interface - setroubleshoot_fixit wants to read network state - Allow procmail_t to connect to dovecot stream sockets - Allow cimprovagt service providers to read network states - Add labeling for /var/run/mariadb - pwauth uses lastlog() to update system's lastlog - Allow account provider to read login records - Add support for texlive2013 - More fixes for user config files to make crond_t running in userdomain - Add back disable/reload/enable permissions for system class - Fix manage_service_perms macro - Allow passwd_t to connect to gnome keyring to change password - Update mls config files to have cronjobs in the user domains - Remove access checks that systemd does not actually do- Add support for yubikey in homedir - Add support for upd/3052 port - Allow apcupsd to use PowerChute Network Shutdown - Allow lsmd to execute various lsmplugins - Add labeling also for /etc/watchdog\.d where are watchdog scripts located too - Update gluster_export_all_rw boolean to allow relabel all base file types - Allow x86_energy_perf tool to modify the MSR - Fix /var/lib/dspam/data labeling- Add files_relabel_base_file_types() interface - Allow netlabel-config to read passwd - update gluster_export_all_rw boolean to allow relabel all base file types caused by lsetxattr() - Allow x86_energy_perf tool to modify the MSR - Fix /var/lib/dspam/data labeling - Allow pegasus to domtrans to mount_t - Add labeling for unconfined scripts in /usr/libexec/watchdog/scripts - Add support for unconfined watchdog scripts - Allow watchdog to manage own log files- Add label only for redhat.repo instead of /etc/yum.repos.d. But probably we will need to switch for the directory. - Label /etc/yum.repos.d as system_conf_t - Use sysnet_filetrans_named_content in udev.te instead of generic transition for net_conf_t - Allow dac_override for sysadm_screen_t - Allow init_t to read ipsec_conf_t as we had it for initrc_t. Needed by ipsec unit file. - Allow netlabel-config to read meminfo - Add interface to allow docker to mounton file_t - Add new interface to exec unlabeled files - Allow lvm to use docker semaphores - Setup transitons for .xsessions-errors.old - Change labels of files in /var/lib/*/.ssh to transition properly - Allow staff_t and user_t to look at logs using journalctl - pluto wants to manage own log file - Allow pluto running as ipsec_t to create pluto.log - Fix alias decl in corenetwork.te.in - Add support for fuse.glusterfs - Allow dmidecode to read/write /run/lock/subsys/rhsmcertd - Allow rhsmcertd to manage redhat.repo which is now labeled as system.conf. Allow rhsmcertd to manage all log files. - Additional access for docker - Added more rules to sblim policy - Fix kdumpgui_run_bootloader boolean - Allow dspam to connect to lmtp port - Included sfcbd service into sblim policy - rhsmcertd wants to manaage /etc/pki/consumer dir - Add kdumpgui_run_bootloader boolean - Add support for /var/cache/watchdog - Remove virt_domain attribute for virt_qemu_ga_unconfined_t - Fixes for handling libvirt containes - Dontaudit attempts by mysql_safe to write content into / - Dontaudit attempts by system_mail to modify network config - Allow dspam to bind to lmtp ports - Add new policy to allow staff_t and user_t to look at logs using journalctl - Allow apache cgi scripts to list sysfs - Dontaudit attempts to write/delete user_tmp_t files - Allow all antivirus domains to manage also own log dirs - Allow pegasus_openlmi_services_t to stream connect to sssd_t- Add missing permission checks for nscd- Fix alias decl in corenetwork.te.in - Add support for fuse.glusterfs - Add file transition rules for content created by f5link - Rename quantum_port information to neutron - Allow all antivirus domains to manage also own log dirs - Rename quantum_port information to neutron - Allow pegasus_openlmi_services_t to stream connect to sssd_t- Allow sysadm_t to read login information - Allow systemd_tmpfiles to setattr on var_log_t directories - Udpdate Makefile to include systemd_contexts - Add systemd_contexts - Add fs_exec_hugetlbfs_files() interface - Add daemons_enable_cluster_mode boolean - Fix rsync_filetrans_named_content() - Add rhcs_read_cluster_pid_files() interface - Update rhcs.if with additional interfaces from RHEL6 - Fix rhcs_domain_template() to not create run dirs with cluster_var_run_t - Allow glusterd_t to mounton glusterd_tmp_t - Allow glusterd to unmout al filesystems - Allow xenstored to read virt config - Add label for swift_server.lock and make add filetrans_named_content to make sure content gets created with the correct label - Allow mozilla_plugin_t to mmap hugepages as an executable- Add back userdom_security_admin_template() interface and use it for sysadm_t if sysadm_secadm.pp- Allow sshd_t to read openshift content, needs backport to RHEL6.5 - Label /usr/lib64/sasl2/libsasldb.so.3.0.0 as textrel_shlib_t - Make sur kdump lock is created with correct label if kdumpctl is executed - gnome interface calls should always be made within an optional_block - Allow syslogd_t to connect to the syslog_tls port - Add labeling for /var/run/charon.ctl socket - Add kdump_filetrans_named_content() - Allo setpgid for fenced_t - Allow setpgid and r/w cluster tmpfs for fenced_t - gnome calls should always be within optional blocks - wicd.pid should be labeled as networkmanager_var_run_t - Allow sys_resource for lldpad- Add rtas policy- Allow mailserver_domains to manage and transition to mailman data - Dontaudit attempts by mozilla plugin to relabel content, caused by using mv and cp commands - Allow mailserver_domains to manage and transition to mailman data - Allow svirt_domains to read sysctl_net_t - Allow thumb_t to use tmpfs inherited from the user - Allow mozilla_plugin to bind to the vnc port if running with spice - Add new attribute to discover confined_admins and assign confined admin to it - Fix zabbix to handle attributes in interfaces - Fix zabbix to read system states for all zabbix domains - Fix piranha_domain_template() - Allow ctdbd to create udp_socket. Allow ndmbd to access ctdbd var files. - Allow lldpad sys_rouserce cap due to #986870 - Allow dovecot-auth to read nologin - Allow openlmi-networking to read /proc/net/dev - Allow smsd_t to execute scripts created on the fly labeled as smsd_spool_t - Add zabbix_domain attribute for zabbix domains to treat them together - Add labels for zabbix-poxy-* (#1018221) - Update openlmi-storage policy to reflect #1015067 - Back port piranha tmpfs fixes from RHEL6 - Update httpd_can_sendmail boolean to allow read/write postfix spool maildrop - Add postfix_rw_spool_maildrop_files interface - Call new userdom_admin_user_templat() also for sysadm_secadm.pp - Fix typo in userdom_admin_user_template() - Allow SELinux users to create coolkeypk11sE-Gate in /var/cache/coolkey - Add new attribute to discover confined_admins - Fix labeling for /etc/strongswan/ipsec.d - systemd_logind seems to pass fd to anyone who dbus communicates with it - Dontaudit leaked write descriptor to dmesg- Activate motion policy- Fix gnome_read_generic_data_home_files() - allow openshift_cgroup_t to read/write inherited openshift file types - Remove httpd_cobbler_content * from cobbler_admin interface - Allow svirt sandbox domains to setattr on chr_file and blk_file svirt_sandbox_file_t, so sshd will work within a container - Allow httpd_t to read also git sys content symlinks - Allow init_t to read gnome home data - Dontaudit setroubleshoot_fixit_t execmem, since it does not seem to really need it. - Allow virsh to execute systemctl - Fix for nagios_services plugins - add type defintion for ctdbd_var_t - Add support for /var/ctdb. Allow ctdb block_suspend and read /etc/passwd file - Allow net_admin/netlink_socket all hyperv_domain domains - Add labeling for zarafa-search.log and zarafa-search.pid - Fix hypervkvp.te - Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type - Fix logging policy - Allow syslog to bind to tls ports - Update labeling for /dev/cdc-wdm - Allow to su_domain to read init states - Allow init_t to read gnome home data - Make sure if systemd_logind creates nologin file with the correct label - Clean up ipsec.te- Add auth_exec_chkpwd interface - Fix port definition for ctdb ports - Allow systemd domains to read /dev/urand - Dontaudit attempts for mozilla_plugin to append to /dev/random - Add label for /var/run/charon.* - Add labeling for /usr/lib/systemd/system/lvm2.*dd policy for motion service - Fix for nagios_services plugins - Fix some bugs in zoneminder policy - add type defintion for ctdbd_var_t - Add support for /var/ctdb. Allow ctdb block_suspend and read /etc/passwd file - Allow net_admin/netlink_socket all hyperv_domain domains - Add labeling for zarafa-search.log and zarafa-search.pid - glusterd binds to random unreserved ports - Additional allow rules found by testing glusterfs - apcupsd needs to send a message to all users on the system so needs to look them up - Fix the label on ~/.juniper_networks - Dontaudit attempts for mozilla_plugin to append to /dev/random - Allow polipo_daemon to connect to flash ports - Allow gssproxy_t to create replay caches - Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type- init reload from systemd_localed_t - Allow domains that communicate with systemd_logind_sessions to use systemd_logind_t fd - Allow systemd_localed_t to ask systemd to reload the locale. - Add systemd_runtime_unit_file_t type for unit files that systemd creates in memory - Allow readahead to read /dev/urand - Fix lots of avcs about tuned - Any file names xenstored in /var/log should be treated as xenstored_var_log_t - Allow tuned to inderact with hugepages - Allow condor domains to list etc rw dirs- Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type - Add additional fixes forpegasus_openlmi_account_t - Allow mdadm to read /dev/urand - Allow pegasus_openlmi_storage_t to create mdadm.conf and write it - Add label/rules for /etc/mdadm.conf - Allow pegasus_openlmi_storage_t to transition to fsadm_t - Fixes for interface definition problems - Dontaudit dovecot-deliver to gettatr on all fs dirs - Allow domains to search data_home_t directories - Allow cobblerd to connect to mysql - Allow mdadm to r/w kdump lock files - Add support for kdump lock files - Label zarafa-search as zarafa-indexer - Openshift cgroup wants to read /etc/passwd - Add new sandbox domains for kvm - Allow mpd to interact with pulseaudio if mpd_enable_homedirs is turned on - Fix labeling for /usr/lib/systemd/system/lvm2.* - Add labeling for /usr/lib/systemd/system/lvm2.* - Fix typos to get a new build. We should not cover filename trans rules to prevent duplicate rules - Add sshd_keygen_t policy for sshd-keygen - Fix alsa_home_filetrans interface name and definition - Allow chown for ssh_keygen_t - Add fs_dontaudit_getattr_all_dirs() - Allow init_t to manage etc_aliases_t and read xserver_var_lib_t and chrony keys - Fix up patch to allow systemd to manage home content - Allow domains to send/recv unlabeled traffic if unlabelednet.pp is enabled - Allow getty to exec hostname to get info - Add systemd_home_t for ~/.local/share/systemd directory- Fix lxc labels in config.tgz- Fix labeling for /usr/libexec/kde4/kcmdatetimehelper - Allow tuned to search all file system directories - Allow alsa_t to sys_nice, to get top performance for sound management - Add support for MySQL/PostgreSQL for amavis - Allow openvpn_t to manage openvpn_var_log_t files. - Allow dirsrv_t to create tmpfs_t directories - Allow dirsrv to create dirs in /dev/shm with dirsrv_tmpfs label - Dontaudit leaked unix_stream_sockets into gnome keyring - Allow telepathy domains to inhibit pipes on telepathy domains - Allow cloud-init to domtrans to rpm - Allow abrt daemon to manage abrt-watch tmp files - Allow abrt-upload-watcher to search /var/spool directory - Allow nsswitch domains to manage own process key - Fix labeling for mgetty.* logs - Allow systemd to dbus chat with upower - Allow ipsec to send signull to itself - Allow setgid cap for ipsec_t - Match upstream labeling- Do not build sanbox pkg on MLS- wine_tmp is no longer needed - Allow setroubleshoot to look at /proc - Allow telepathy domains to dbus with systemd logind - Fix handling of fifo files of rpm - Allow mozilla_plugin to transition to itself - Allow certwatch to write to cert_t directories - New abrt application - Allow NetworkManager to set the kernel scheduler - Make wine_domain shared by all wine domains - Allow mdadm_t to read images labeled svirt_image_t - Allow amanda to read /dev/urand - ALlow my_print_default to read /dev/urand - Allow mdadm to write to kdumpctl fifo files - Allow nslcd to send signull to itself - Allow yppasswd to read /dev/urandom - Fix zarafa_setrlimit - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add additional alias for user_tmp_t because wine_tmp_t is no longer used - More handling of ther kernel keyring required by kerberos - New privs needed for init_t when running without transition to initrc_t over bin_t, and without unconfined domain installed- Dontaudit attempts by sosreport to read shadow_t - Allow browser sandbox plugins to connect to cups to print - Add new label mpd_home_t - Label /srv/www/logs as httpd_log_t - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add labels for apache logs under miq package - Allow irc_t to use tcp sockets - fix labels in puppet.if - Allow tcsd to read utmp file - Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to access host keys - Define svirt_socket_t as a domain_type - Take away transition from init_t to initrc_t when executing bin_t, allow init_t to run chk_passwd_t - Fix label on pam_krb5 helper apps- Allow ldconfig to write to kdumpctl fifo files - allow neutron to connect to amqp ports - Allow kdump_manage_crash to list the kdump_crash_t directory - Allow glance-api to connect to amqp port - Allow virt_qemu_ga_t to read meminfo - Add antivirus_home_t type for antivirus date in HOMEDIRS - Allow mpd setcap which is needed by pulseaudio - Allow smbcontrol to create content in /var/lib/samba - Allow mozilla_exec_t to be used as a entrypoint to mozilla_domtrans_spec - Add additional labeling for qemu-ga/fsfreeze-hook.d scripts - amanda_exec_t needs to be executable file - Allow block_suspend cap for samba-net - Allow apps that read ipsec_mgmt_var_run_t to search ipsec_var_run_t - Allow init_t to run crash utility - Treat usr_t just like bin_t for transitions and executions - Add port definition of pka_ca to port 829 for openshift - Allow selinux_store to use symlinks- Allow block_suspend cap for samba-net - Allow t-mission-control to manage gabble cache files - Allow nslcd to read /sys/devices/system/cpu - Allow selinux_store to use symlinks- Allow xdm_t to transition to itself - Call neutron interfaces instead of quantum - Allow init to change targed role to make uncofined services (xrdp which now has own systemd unit file) working. We want them to have in unconfined_t - Make sure directories in /run get created with the correct label - Make sure /root/.pki gets created with the right label - try to remove labeling for motion from zoneminder_exec_t to bin_t - Allow inetd_t to execute shell scripts - Allow cloud-init to read all domainstate - Fix to use quantum port - Add interface netowrkmanager_initrc_domtrans - Fix boinc_execmem - Allow t-mission-control to read gabble cache home - Add labeling for ~/.cache/telepathy/avatars/gabble - Allow memcache to read sysfs data - Cleanup antivirus policy and add additional fixes - Add boolean boinc_enable_execstack - Add support for couchdb in rabbitmq policy - Add interface couchdb_search_pid_dirs - Allow firewalld to read NM state - Allow systemd running as git_systemd to bind git port - Fix mozilla_plugin_rw_tmpfs_files()- Split out rlogin ports from inetd - Treat files labeld as usr_t like bin_t when it comes to transitions - Allow staff_t to read login config - Allow ipsec_t to read .google authenticator data - Allow systemd running as git_systemd to bind git port - Fix mozilla_plugin_rw_tmpfs_files() - Call the correct interface - corenet_udp_bind_ktalkd_port() - Allow all domains that can read gnome_config to read kde config - Allow sandbox domain to read/write mozilla_plugin_tmpfs_t so pulseaudio will work - Allow mdadm to getattr any file system - Allow a confined domain to executes mozilla_exec_t via dbus - Allow cupsd_lpd_t to bind to the printer port - Dontaudit attempts to bind to ports < 1024 when nis is turned on - Allow apache domain to connect to gssproxy socket - Allow rlogind to bind to the rlogin_port - Allow telnetd to bind to the telnetd_port - Allow ktalkd to bind to the ktalkd_port - Allow cvs to bind to the cvs_port- Cleanup related to init_domain()+inetd_domain fixes - Use just init_domain instead of init_daemon_domain in inetd_core_service_domain - svirt domains neeed to create kobject_uevint_sockets - Lots of new access required for sosreport - Allow tgtd_t to connect to isns ports - Allow init_t to transition to all inetd domains: - openct needs to be able to create netlink_object_uevent_sockets - Dontaudit leaks into ldconfig_t - Dontaudit su domains getattr on /dev devices, move su domains to attribute based calls - Move kernel_stream_connect into all Xwindow using users - Dontaudit inherited lock files in ifconfig o dhcpc_t- Also sock_file trans rule is needed in lsm - Fix labeling for fetchmail pid files/dirs - Add additional fixes for abrt-upload-watch - Fix polipo.te - Fix transition rules in asterisk policy - Add fowner capability to networkmanager policy - Allow polipo to connect to tor ports - Cleanup lsmd.if - Cleanup openhpid policy - Fix kdump_read_crash() interface - Make more domains as init domain - Fix cupsd.te - Fix requires in rpm_rw_script_inherited_pipes - Fix interfaces in lsm.if - Allow munin service plugins to manage own tmpfs files/dirs - Allow virtd_t also relabel unix stream sockets for virt_image_type - Make ktalk as init domain - Fix to define ktalkd_unit_file_t correctly - Fix ktalk.fc - Add systemd support for talk-server - Allow glusterd to create sock_file in /run - Allow xdm_t to delete gkeyringd_tmp_t files on logout - Add fixes for hypervkvp policy - Add logwatch_can_sendmail boolean - Allow mysqld_safe_t to handle also symlinks in /var/log/mariadb - Allow xdm_t to delete gkeyringd_tmp_t files on logout- Add selinux-policy-sandbox pkg0 - Allow rhsmcertd to read init state - Allow fsetid for pkcsslotd - Fix labeling for /usr/lib/systemd/system/pkcsslotd.service - Allow fetchmail to create own pid with correct labeling - Fix rhcs_domain_template() - Allow roles which can run mock to read mock lib files to view results - Allow rpcbind to use nsswitch - Fix lsm.if summary - Fix collectd_t can read /etc/passwd file - Label systemd unit files under dracut correctly - Add support for pam_mount to mount user's encrypted home When a user logs in and logs out using ssh - Add support for .Xauthority-n - Label umount.crypt as lvm_exec_t - Allow syslogd to search psad lib files - Allow ssh_t to use /dev/ptmx - Make sure /run/pluto dir is created with correct labeling - Allow syslog to run shell and bin_t commands - Allow ip to relabel tun_sockets - Allow mount to create directories in files under /run - Allow processes to use inherited fifo files- Add policy for lsmd - Add support for /var/log/mariadb dir and allow mysqld_safe to list this directory - Update condor_master rules to allow read system state info and allow logging - Add labeling for /etc/condor and allow condor domain to write it (bug) - Allow condor domains to manage own logs - Allow glusterd to read domains state - Fix initial hypervkvp policy - Add policy for hypervkvpd - Fix redis.if summary- Allow boinc to connect to @/tmp/.X11-unix/X0 - Allow beam.smp to connect to tcp/5984 - Allow named to manage own log files - Add label for /usr/libexec/dcc/start-dccifd and domtrans to dccifd_t - Add virt_transition_userdomain boolean decl - Allow httpd_t to sendto unix_dgram sockets on its children - Allow nova domains to execute ifconfig - bluetooth wants to create fifo_files in /tmp - exim needs to be able to manage mailman data - Allow sysstat to getattr on all file systems - Looks like bluetoothd has moved - Allow collectd to send ping packets - Allow svirt_lxc domains to getpgid - Remove virt-sandbox-service labeling as virsh_exec_t, since it no longer does virsh_t stuff - Allow frpintd_t to read /dev/urandom - Allow asterisk_t to create sock_file in /var/run - Allow usbmuxd to use netlink_kobject - sosreport needs to getattr on lots of devices, and needs access to netlink_kobject_uevent_socket - More cleanup of svirt_lxc policy - virtd_lxc_t now talks to dbus - Dontaudit leaked ptmx_t - Allow processes to use inherited fifo files - Allow openvpn_t to connect to squid ports - Allow prelink_cron_system_t to ask systemd to reloaddd miscfiles_dontaudit_access_check_cert() - Allow ssh_t to use /dev/ptmx - Make sure /run/pluto dir is created with correct labeling - Allow syslog to run shell and bin_t commands - Allow ip to relabel tun_sockets - Allow mount to create directories in files under /run - Allow processes to use inherited fifo files - Allow user roles to connect to the journal socket- selinux_set_enforce_mode needs to be used with type - Add append to the dontaudit for unix_stream_socket of xdm_t leak - Allow xdm_t to create symlinks in log direcotries - Allow login programs to read afs config - Label 10933 as a pop port, for dovecot - New policy to allow selinux_server.py to run as semanage_t as a dbus service - Add fixes to make netlabelctl working on MLS - AVCs required for running sepolicy gui as staff_t - Dontaudit attempts to read symlinks, sepolicy gui is likely to cause this type of AVC - New dbus server to be used with new gui - After modifying some files in /etc/mail, I saw this needed on the next boot - Loading a vm from /usr/tmp with virt-manager - Clean up oracleasm policy for Fedora - Add oracleasm policy written by rlopez@redhat.com - Make postfix_postdrop_t as mta_agent to allow domtrans to system mail if it is executed by apache - Add label for /var/crash - Allow fenced to domtrans to sanclok_t - Allow nagios to manage nagios spool files - Make tfptd as home_manager - Allow kdump to read kcore on MLS system - Allow mysqld-safe sys_nice/sys_resource caps - Allow apache to search automount tmp dirs if http_use_nfs is enabled - Allow crond to transition to named_t, for use with unbound - Allow crond to look at named_conf_t, for unbound - Allow mozilla_plugin_t to transition its home content - Allow dovecot_domain to read all system and network state - Allow httpd_user_script_t to call getpw - Allow semanage to read pid files - Dontaudit leaked file descriptors from user domain into thumb - Make PAM authentication working if it is enabled in ejabberd - Add fixes for rabbit to fix ##992920,#992931 - Allow glusterd to mount filesystems - Loading a vm from /usr/tmp with virt-manager - Trying to load a VM I got an AVC from devicekit_disk for loopcontrol device - Add fix for pand service - shorewall touches own log - Allow nrpe to list /var - Mozilla_plugin_roles can not be passed into lpd_run_lpr - Allow afs domains to read afs_config files - Allow login programs to read afs config - Allow virt_domain to read virt_var_run_t symlinks - Allow smokeping to send its process signals - Allow fetchmail to setuid - Add kdump_manage_crash() interface - Allow abrt domain to write abrt.socket- Add more aliases in pegasus.te - Add more fixes for *_admin interfaces - Add interface fixes - Allow nscd to stream connect to nmbd - Allow gnupg apps to write to pcscd socket - Add more fixes for openlmi provides. Fix naming and support for additionals - Allow fetchmail to resolve host names - Allow firewalld to interact also with lnk files labeled as firewalld_etc_rw_t - Add labeling for cmpiLMI_Fan-cimprovagt - Allow net_admin for glusterd - Allow telepathy domain to create dconf with correct labeling in /home/userX/.cache/ - Add pegasus_openlmi_system_t - Fix puppet_domtrans_master() to make all puppet calling working in passenger.te - Fix corecmd_exec_chroot() - Fix logging_relabel_syslog_pid_socket interface - Fix typo in unconfineduser.te - Allow system_r to access unconfined_dbusd_t to run hp_chec- Allow xdm_t to act as a dbus client to itsel - Allow fetchmail to resolve host names - Allow gnupg apps to write to pcscd socket - Add labeling for cmpiLMI_Fan-cimprovagt - Allow net_admin for glusterd - Allow telepathy domain to create dconf with correct labeling in /home/userX/.cache/ - Add pegasus_openlmi_system_t - Fix puppet_domtrans_master() to make all puppet calling working in passenger.te -httpd_t does access_check on certs- Add support for cmpiLMI_Service-cimprovagt - Allow pegasus domtrans to rpm_t to make pycmpiLMI_Software-cimprovagt running as rpm_t - Label pycmpiLMI_Software-cimprovagt as rpm_exec_t - Add support for pycmpiLMI_Storage-cimprovagt - Add support for cmpiLMI_Networking-cimprovagt - Allow system_cronjob_t to create user_tmpfs_t to make pulseaudio working - Allow virtual machines and containers to run as user doains, needed for virt-sandbox - Allow buglist.cgi to read cpu info- Allow systemd-tmpfile to handle tmp content in print spool dir - Allow systemd-sysctl to send system log messages - Add support for RTP media ports and fmpro-internal - Make auditd working if audit is configured to perform SINGLE action on disk error - Add interfaces to handle systemd units - Make systemd-notify working if pcsd is used - Add support for netlabel and label /usr/sbin/netlabelctl as iptables_exec_t - Instead of having all unconfined domains get all of the named transition rules, - Only allow unconfined_t, init_t, initrc_t and rpm_script_t by default. - Add definition for the salt ports - Allow xdm_t to create link files in xdm_var_run_t - Dontaudit reads of blk files or chr files leaked into ldconfig_t - Allow sys_chroot for useradd_t - Allow net_raw cap for ipsec_t - Allow sysadm_t to reload services - Add additional fixes to make strongswan working with a simple conf - Allow sysadm_t to enable/disable init_t services - Add additional glusterd perms - Allow apache to read lnk files in the /mnt directory - Allow glusterd to ask the kernel to load a module - Fix description of ftpd_use_fusefs boolean - Allow svirt_lxc_net_t to sys_chroot, modify policy to tighten up svirt_lxc_domain capabilties and process controls, but add them to svirt_lxc_net_t - Allow glusterds to request load a kernel module - Allow boinc to stream connect to xserver_t - Allow sblim domains to read /etc/passwd - Allow mdadm to read usb devices - Allow collectd to use ping plugin - Make foghorn working with SNMP - Allow sssd to read ldap certs - Allow haproxy to connect to RTP media ports - Add additional trans rules for aide_db - Add labeling for /usr/lib/pcsd/pcsd - Add labeling for /var/log/pcsd - Add support for pcs which is a corosync and pacemaker configuration tool- Label /var/lib/ipa/pki-ca/publish as pki_tomcat_cert_t - Add labeling for /usr/libexec/kde4/polkit-kde-authentication-agent-1 - Allow all domains that can domtrans to shutdown, to start the power services script to shutdown - consolekit needs to be able to shut down system - Move around interfaces - Remove nfsd_rw_t and nfsd_ro_t, they don't do anything - Add additional fixes for rabbitmq_beam to allow getattr on mountpoints - Allow gconf-defaults-m to read /etc/passwd - Fix pki_rw_tomcat_cert() interface to support lnk_files- Add support for gluster ports - Make sure that all keys located in /etc/ssh/ are labeled correctly - Make sure apcuspd lock files get created with the correct label - Use getcap in gluster.te - Fix gluster policy - add additional fixes to allow beam.smp to interact with couchdb files - Additional fix for #974149 - Allow gluster to user gluster ports - Allow glusterd to transition to rpcd_t and add additional fixes for #980683 - Allow tgtd working when accessing to the passthrough device - Fix labeling for mdadm unit files- Add mdadm fixes- Fix definition of sandbox.disabled to sandbox.pp.disabled- Allow mdamd to execute systemctl - Allow mdadm to read /dev/kvm - Allow ipsec_mgmt_t to read l2tpd pid content- Allow nsd_t to read /dev/urand - Allow mdadm_t to read framebuffer - Allow rabbitmq_beam_t to read process info on rabbitmq_epmd_t - Allow mozilla_plugin_config_t to create tmp files - Cleanup openvswitch policy - Allow mozilla plugin to getattr on all executables - Allow l2tpd_t to create fifo_files in /var/run - Allow samba to touch/manage fifo_files or sock_files in a samba_share_t directory - Allow mdadm to connecto its own unix_stream_socket - FIXME: nagios changed locations to /log/nagios which is wrong. But we need to have this workaround for now. - Allow apache to access smokeping pid files - Allow rabbitmq_beam_t to getattr on all filesystems - Add systemd support for iodined - Allow nup_upsdrvctl_t to execute its entrypoint - Allow fail2ban_client to write to fail2ban_var_run_t, Also allow it to use nsswitch - add labeling for ~/.cache/libvirt-sandbox - Add interface to allow domains transitioned to by confined users to send sigchld to screen program - Allow sysadm_t to check the system status of files labeled etc_t, /etc/fstab - Allow systemd_localed to start /usr/lib/systemd/system/systemd-vconsole-setup.service - Allow an domain that has an entrypoint from a type to be allowed to execute the entrypoint without a transition, I can see no case where this is a bad thing, and elminiates a whole class of AVCs. - Allow staff to getsched all domains, required to run htop - Add port definition for redis port - fix selinuxuser_use_ssh_chroot boolean- Add prosody policy written by Michael Scherer - Allow nagios plugins to read /sys info - ntpd needs to manage own log files - Add support for HOME_DIR/.IBMERS - Allow iptables commands to read firewalld config - Allow consolekit_t to read utmp - Fix filename transitions on .razor directory - Add additional fixes to make DSPAM with LDA working - Allow snort to read /etc/passwd - Allow fail2ban to communicate with firewalld over dbus - Dontaudit openshift_cgreoup_file_t read/write leaked dev - Allow nfsd to use mountd port - Call th proper interface - Allow openvswitch to read sys and execute plymouth - Allow tmpwatch to read /var/spool/cups/tmp - Add support for /usr/libexec/telepathy-rakia - Add systemd support for zoneminder - Allow mysql to create files/directories under /var/log/mysql - Allow zoneminder apache scripts to rw zoneminder tmpfs - Allow httpd to manage zoneminder lib files - Add zoneminder_run_sudo boolean to allow to start zoneminder - Allow zoneminder to send mails - gssproxy_t sock_file can be under /var/lib - Allow web domains to connect to whois port. - Allow sandbox_web_type to connect to the same ports as mozilla_plugin_t. - We really need to add an interface to corenet to define what a web_client_domain is and - then define chrome_sandbox_t, mozilla_plugin_t and sandbox_web_type to that domain. - Add labeling for cmpiLMI_LogicalFile-cimprovagt - Also make pegasus_openlmi_logicalfile_t as unconfined to have unconfined_domain attribute for filename trans rules - Update policy rules for pegasus_openlmi_logicalfile_t - Add initial types for logicalfile/unconfined OpenLMI providers - mailmanctl needs to read own log - Allow logwatch manage own lock files - Allow nrpe to read meminfo - Allow httpd to read certs located in pki-ca - Add pki_read_tomcat_cert() interface - Add support for nagios openshift plugins - Add port definition for redis port - fix selinuxuser_use_ssh_chroot boolean- Shrink the size of policy by moving to attributes, also add dridomain so that mozilla_plugin can follow selinuxuse_dri boolean. - Allow bootloader to manage generic log files - Allow ftp to bind to port 989 - Fix label of new gear directory - Add support for new directory /var/lib/openshift/gears/ - Add openshift_manage_lib_dirs() - allow virtd domains to manage setrans_var_run_t - Allow useradd to manage all openshift content - Add support so that mozilla_plugin_t can use dri devices - Allow chronyd to change the scheduler - Allow apmd to shut downthe system - Devicekit_disk_t needs to manage /etc/fstab- Make DSPAM to act as a LDA working - Allow ntop to create netlink socket - Allow policykit to send a signal to policykit-auth - Allow stapserver to dbus chat with avahi/systemd-logind - Fix labeling on haproxy unit file - Clean up haproxy policy - A new policy for haproxy and placed it to rhcs.te - Add support for ldirectord and treat it with cluster_t - Make sure anaconda log dir is created with var_log_t- Allow lvm_t to create default targets for filesystem handling - Fix labeling for razor-lightdm binaries - Allow insmod_t to read any file labeled var_lib_t - Add policy for pesign - Activate policy for cmpiLMI_Account-cimprovagt - Allow isnsd syscall=listen - /usr/libexec/pegasus/cimprovagt needs setsched caused by sched_setscheduler - Allow ctdbd to use udp/4379 - gatherd wants sys_nice and setsched - Add support for texlive2012 - Allow NM to read file_t (usb stick with no labels used to transfer keys for example) - Allow cobbler to execute apache with domain transition- condor_collector uses tcp/9000 - Label /usr/sbin/virtlockd as virtd_exec_t for now - Allow cobbler to execute ldconfig - Allow NM to execute ssh - Allow mdadm to read /dev/crash - Allow antivirus domains to connect to snmp port - Make amavisd-snmp working correctly - Allow nfsd_t to mounton nfsd_fs_t - Add initial snapper policy - We still need to have consolekit policy - Dontaudit firefox attempting to connect to the xserver_port_t if run within sandbox_web_t - Dontaudit sandbox apps attempting to open user_devpts_t - Allow dirsrv to read network state - Fix pki_read_tomcat_lib_files - Add labeling for /usr/libexec/nm-ssh-service - Add label cert_t for /var/lib/ipa/pki-ca/publish - Lets label /sys/fs/cgroup as cgroup_t for now, to keep labels consistant - Allow nfsd_t to mounton nfsd_fs_t - Dontaudit sandbox apps attempting to open user_devpts_t - Allow passwd_t to change role to system_r from unconfined_r- Don't audit access checks by sandbox xserver on xdb var_lib - Allow ntop to read usbmon devices - Add labeling for new polcykit authorizor - Dontaudit access checks from fail2ban_client - Don't audit access checks by sandbox xserver on xdb var_lib - Allow apps that connect to xdm stream to conenct to xdm_dbusd_t stream - Fix labeling for all /usr/bim/razor-lightdm-* binaries - Add filename trans for /dev/md126p1- Make vdagent able to request loading kernel module - Add support for cloud-init make it as unconfined domain - Allow snmpd to run smartctl in fsadm_t domain - remove duplicate openshift_search_lib() interface - Allow mysqld to search openshift lib files - Allow openshift cgroup to interact with passedin file descriptors - Allow colord to list directories inthe users homedir - aide executes prelink to check files - Make sure cupsd_t creates content in /etc/cups with the correct label - Lest dontaudit apache read all domains, so passenger will not cause this avc - Allow gssd to connect to gssproxy - systemd-tmpfiles needs to be able to raise the level to fix labeling on /run/setrans in MLS - Allow systemd-tmpfiles to relabel also lock files - Allow useradd to add homdir in /var/lib/openshift - Allow setfiles and semanage to write output to /run/files- Add labeling for /dev/tgt - Dontaudit leak fd from firewalld for modprobe - Allow runuser running as rpm_script_t to create netlink_audit socket - Allow mdadm to read BIOS non-volatile RAM- accountservice watches when accounts come and go in wtmp - /usr/java/jre1.7.0_21/bin/java needs to create netlink socket - Add httpd_use_sasl boolean - Allow net_admin for tuned_t - iscsid needs sys_module to auto-load kernel modules - Allow blueman to read bluetooth conf - Add nova_manage_lib_files() interface - Fix mplayer_filetrans_home_content() - Add mplayer_filetrans_home_content() - mozilla_plugin_config_roles need to be able to access mozilla_plugin_config_t - Revert "Allow thumb_t to append inherited xdm stream socket" - Add iscsi_filetrans_named_content() interface - Allow to create .mplayer with the correct labeling for unconfined - Allow iscsiadmin to create lock file with the correct labeling- Allow wine to manage wine home content - Make amanda working with socket actiovation - Add labeling for /usr/sbin/iscsiadm - Add support for /var/run/gssproxy.sock - dnsmasq_t needs to read sysctl_net_t- Fix courier_domain_template() interface - Allow blueman to write ip_forward - Allow mongodb to connect to mongodb port - Allow mongodb to connect to mongodb port - Allow java to bind jobss_debug port - Fixes for *_admin interfaces - Allow iscsid auto-load kernel modules needed for proper iSCSI functionality - Need to assign attribute for courier_domain to all courier_domains - Fail2ban reads /etc/passwd - postfix_virtual will create new files in postfix_spool_t - abrt triggers sys_ptrace by running pidof - Label ~/abc as mozilla_home_t, since java apps as plugin want to create it - Add passenger fixes needed by foreman - Remove dup interfaces - Add additional interfaces for quantum - Add new interfaces for dnsmasq - Allow passenger to read localization and send signull to itself - Allow dnsmasq to stream connect to quantum - Add quantum_stream_connect() - Make sure that mcollective starts the service with the correct labeling - Add labels for ~/.manpath - Dontaudit attempts by svirt_t to getpw* calls - sandbox domains are trying to look at parent process data - Allow courior auth to create its pid file in /var/spool/courier subdir - Add fixes for beam to have it working with couchdb - Add labeling for /run/nm-xl2tpd.con - Allow apache to stream connect to thin - Add systemd support for amand - Make public types usable for fs mount points - Call correct mandb interface in domain.te - Allow iptables to r/w quantum inherited pipes and send sigchld - Allow ifconfig domtrans to iptables and execute ldconfig - Add labels for ~/.manpath - Allow systemd to read iscsi lib files - seunshare is trying to look at parent process data- Fix openshift_search_lib - Add support for abrt-uefioops-oops - Allow colord to getattr any file system - Allow chrome processes to look at each other - Allow sys_ptrace for abrt_t - Add new policy for gssproxy - Dontaudit leaked file descriptor writes from firewalld - openshift_net_type is interface not template - Dontaudit pppd to search gnome config - Update openshift_search_lib() interface - Add fs_list_pstorefs() - Fix label on libbcm_host.so since it is built incorrectly on raspberry pi, needs back port to F18 - Better labels for raspberry pi devices - Allow init to create devpts_t directory - Temporarily label rasbery pi devices as memory_device_t, needs back port to f18 - Allow sysadm_t to build kernels - Make sure mount creates /var/run/blkid with the correct label, needs back port to F18 - Allow userdomains to stream connect to gssproxy - Dontaudit leaked file descriptor writes from firewalld - Allow xserver to read /dev/urandom - Add additional fixes for ipsec-mgmt - Make SSHing into an Openshift Enterprise Node working- Add transition rules to unconfined domains and to sysadm_t to create /etc/adjtime - with the proper label. - Update files_filetrans_named_content() interface to get right labeling for pam.d conf files - Allow systemd-timedated to create adjtime - Add clock_create_adjtime() - Additional fix ifconfing for #966106 - Allow kernel_t to create boot.log with correct labeling - Remove unconfined_mplayer for which we don't have rules - Rename interfaces - Add userdom_manage_user_home_files/dirs interfaces - Fix files_dontaudit_read_all_non_security_files - Fix ipsec_manage_key_file() - Fix ipsec_filetrans_key_file() - Label /usr/bin/razor-lightdm-greeter as xdm_exec_t instead of spamc_exec_t - Fix labeling for ipse.secrets - Add interfaces for ipsec and labeling for ipsec.info and ipsec_setup.pid - Add files_dontaudit_read_all_non_security_files() interface - /var/log/syslog-ng should be labeled var_log_t - Make ifconfig_var_run_t a mountpoint - Add transition from ifconfig to dnsmasq - Allow ifconfig to execute bin_t/shell_exec_t - We want to have hwdb.bin labeled as etc_t - update logging_filetrans_named_content() interface - Allow systemd_timedate_t to manage /etc/adjtime - Allow NM to send signals to l2tpd - Update antivirus_can_scan_system boolean - Allow devicekit_disk_t to sys_config_tty - Run abrt-harvest programs as abrt_t, and allow abrt_t to list all filesystem directories - Make printing from vmware working - Allow php-cgi from php54 collection to access /var/lib/net-snmp/mib_indexes - Add virt_qemu_ga_data_t for qemu-ga - Make chrome and mozilla able to connect to same ports, add jboss_management_port_t to both - Fix typo in virt.te - Add virt_qemu_ga_unconfined_t for hook scripts - Make sure NetworkManager files get created with the correct label - Add mozilla_plugin_use_gps boolean - Fix cyrus to have support for net-snmp - Additional fixes for dnsmasq and quantum for #966106 - Add plymouthd_create_log() - remove httpd_use_oddjob for which we don't have rules - Add missing rules for httpd_can_network_connect_cobbler - Add missing cluster_use_execmem boolean - Call userdom_manage_all_user_home_type_files/dirs - Additional fix for ftp_home_dir - Fix ftp_home_dir boolean - Allow squit to recv/send client squid packet - Fix nut.te to have nut_domain attribute - Add support for ejabberd; TODO: revisit jabberd and rabbit policy - Fix amanda policy - Add more fixes for domains which use libusb - Make domains which use libusb working correctly - Allow l2tpd to create ipsec key files with correct labeling and manage them - Fix cobbler_manage_lib_files/cobbler_read_lib_files to cover also lnk files - Allow rabbitmq-beam to bind generic node - Allow l2tpd to read ipse-mgmt pid files - more fixes for l2tpd, NM and pppd from #967072- Dontaudit to getattr on dirs for dovecot-deliver - Allow raiudusd server connect to postgresql socket - Add kerberos support for radiusd - Allow saslauthd to connect to ldap port - Allow postfix to manage postfix_private_t files - Add chronyd support for #965457 - Fix labeling for HOME_DIR/\.icedtea - CHange squid and snmpd to be allowed also write own logs - Fix labeling for /usr/libexec/qemu-ga - Allow virtd_t to use virt_lock_t - Allow also sealert to read the policy from the kernel - qemu-ga needs to execute scripts in /usr/libexec/qemu-ga and to use /tmp content - Dontaudit listing of users homedir by sendmail Seems like a leak - Allow passenger to transition to puppet master - Allow apache to connect to mythtv - Add definition for mythtv ports- Add additional fixes for #948073 bug - Allow sge_execd_t to also connect to sge ports - Allow openshift_cron_t to manage openshift_var_lib_t sym links - Allow openshift_cron_t to manage openshift_var_lib_t sym links - Allow sge_execd to bind sge ports. Allow kill capability and reads cgroup files - Remove pulseaudio filetrans pulseaudio_manage_home_dirs which is a part of pulseaudio_manage_home_files - Add networkmanager_stream_connect() - Make gnome-abrt wokring with staff_t - Fix openshift_manage_lib_files() interface - mdadm runs ps command which seems to getattr on random log files - Allow mozilla_plugin_t to create pulseaudit_home_t directories - Allow qemu-ga to shutdown virtual hosts - Add labelling for cupsd-browsed - Add web browser plugins to connect to aol ports - Allow nm-dhcp-helper to stream connect to NM - Add port definition for sge ports- Make sure users and unconfined domains create .hushlogin with the correct label - Allow pegaus to chat with realmd over DBus - Allow cobblerd to read network state - Allow boicn-client to stat on /dev/input/mice - Allow certwatch to read net_config_t when it executes apache - Allow readahead to create /run/systemd and then create its own directory with the correct label- Transition directories and files when in a user_tmp_t directory - Change certwatch to domtrans to apache instead of just execute - Allow virsh_t to read xen lib files - update policy rules for pegasus_openlmi_account_t - Add support for svnserve_tmp_t - Activate account openlmi policy - pegasus_openlmi_domain_template needs also require pegasus_t - One more fix for policykit.te - Call fs_list_cgroups_dirs() in policykit.te - Allow nagios service plugin to read mysql config files - Add labeling for /var/svn - Fix chrome.te - Fix pegasus_openlmi_domain_template() interfaces - Fix dev_rw_vfio_dev definiton, allow virtd_t to read tmpfs_t symlinks - Fix location of google-chrome data - Add support for chome_sandbox to store content in the homedir - Allow policykit to watch for changes in cgroups file system - Add boolean to allow mozilla_plugin_t to use spice - Allow collectd to bind to udp port - Allow collected_t to read all of /proc - Should use netlink socket_perms - Should use netlink socket_perms - Allow glance domains to connect to apache ports - Allow apcupsd_t to manage its log files - Allow chrome objects to rw_inherited unix_stream_socket from callers - Allow staff_t to execute virtd_exec_t for running vms - nfsd_t needs to bind mountd port to make nfs-mountd.service working - Allow unbound net_admin capability because of setsockopt syscall - Fix fs_list_cgroup_dirs() - Label /usr/lib/nagios/plugins/utils.pm as bin_t - Remove uplicate definition of fs_read_cgroup_files() - Remove duplicate definition of fs_read_cgroup_files() - Add files_mountpoint_filetrans interface to be used by quotadb_t and snapperd - Additional interfaces needed to list and read cgroups config - Add port definition for collectd port - Add labels for /dev/ptp* - Allow staff_t to execute virtd_exec_t for running vms- Allow samba-net to also read realmd tmp files - Allow NUT to use serial ports - realmd can be started by systemctl now- Remove userdom_home_manager for xdm_t and move all rules to xserver.te directly - Add new xdm_write_home boolean to allow xdm_t to create files in HOME dirs with xdm_home_t - Allow postfix-showq to read/write unix.showq in /var/spool/postfix/pid - Allow virsh to read xen lock file - Allow qemu-ga to create files in /run with proper labeling - Allow glusterd to connect to own socket in /tmp - Allow glance-api to connect to http port to make glance image-create working - Allow keystonte_t to execute rpm- Fix realmd cache interfaces- Allow tcpd to execute leafnode - Allow samba-net to read realmd cache files - Dontaudit sys_tty_config for alsactl - Fix allow rules for postfix_var_run - Allow cobblerd to read /etc/passwd - Allow pegasus to read exports - Allow systemd-timedate to read xdm state - Allow mout to stream connect to rpcbind - Add labeling just for /usr/share/pki/ca-trust-source instead of /usr/share/pki- Allow thumbnails to share memory with apps which run thumbnails - Allow postfix-postqueue block_suspend - Add lib interfaces for smsd - Add support for nginx - Allow s2s running as jabberd_t to connect to jabber_interserver_port_t - Allow pki apache domain to create own tmp files and execute httpd_suexec - Allow procmail to manger user tmp files/dirs/lnk_files - Add virt_stream_connect_svirt() interface - Allow dovecot-auth to execute bin_t - Allow iscsid to request that kernel load a kernel module - Add labeling support for /var/lib/mod_security - Allow iw running as tuned_t to create netlink socket - Dontaudit sys_tty_config for thumb_t - Add labeling for nm-l2tp-service - Allow httpd running as certwatch_t to open tcp socket - Allow useradd to manager smsd lib files - Allow useradd_t to add homedirs in /var/lib - Fix typo in userdomain.te - Cleanup userdom_read_home_certs - Implement userdom_home_reader_certs_type to allow read certs also on encrypt /home with ecryptfs_t - Allow staff to stream connect to svirt_t to make gnome-boxes working- Allow lvm to create its own unit files - Label /var/lib/sepolgen as selinux_config_t - Add filetrans rules for tw devices - Add transition from cupsd_config_t to cupsd_t- Add filetrans rules for tw devices - Cleanup bad transition lines- Fix lockdev_manage_files() - Allow setroubleshootd to read var_lib_t to make email_alert working - Add lockdev_manage_files() - Call proper interface in virt.te - Allow gkeyring_domain to create /var/run/UID/config/dbus file - system dbus seems to be blocking suspend - Dontaudit attemps to sys_ptrace, which I believe gpsd does not need - When you enter a container from root, you generate avcs with a leaked file descriptor - Allow mpd getattr on file system directories - Make sure realmd creates content with the correct label - Allow systemd-tty-ask to write kmsg - Allow mgetty to use lockdev library for device locking - Fix selinuxuser_user_share_music boolean name to selinuxuser_share_music - When you enter a container from root, you generate avcs with a leaked file descriptor - Make sure init.fc files are labeled correctly at creation - File name trans vconsole.conf - Fix labeling for nagios plugins - label shared libraries in /opt/google/chrome as testrel_shlib_t- Allow certmonger to dbus communicate with realmd - Make realmd working- Fix mozilla specification of homedir content - Allow certmonger to read network state - Allow tmpwatch to read tmp in /var/spool/{cups,lpd} - Label all nagios plugin as unconfined by default - Add httpd_serve_cobbler_files() - Allow mdadm to read /dev/sr0 and create tmp files - Allow certwatch to send mails - Fix labeling for nagios plugins - label shared libraries in /opt/google/chrome as testrel_shlib_t- Allow realmd to run ipa, really needs to be an unconfined_domain - Allow sandbox domains to use inherted terminals - Allow pscd to use devices labeled svirt_image_t in order to use cat cards. - Add label for new alsa pid - Alsa now uses a pid file and needs to setsched - Fix oracleasmfs_t definition - Add support for sshd_unit_file_t - Add oracleasmfs_t - Allow unlabeled_t files to be stored on unlabeled_t filesystems- Fix description of deny_ptrace boolean - Remove allow for execmod lib_t for now - Allow quantum to connect to keystone port - Allow nova-console to talk with mysql over unix stream socket - Allow dirsrv to stream connect to uuidd - thumb_t needs to be able to create ~/.cache if it does not exist - virtd needs to be able to sys_ptrace when starting and stoping containers- Allow alsa_t signal_perms, we probaly should search for any app that can execute something without transition and give it signal_perms... - Add dontaudit for mozilla_plugin_t looking at the xdm_t sockets - Fix deny_ptrace boolean, certain ptrace leaked into the system - Allow winbind to manage kerberos_rcache_host - Allow spamd to create spamd_var_lib_t directories - Remove transition to mozilla_tmp_t by mozilla_t, to allow it to manage the users tmp dirs - Add mising nslcd_dontaudit_write_sock_file() interface - one more fix - Fix pki_read_tomcat_lib_files() interface - Allow certmonger to read pki-tomcat lib files - Allow certwatch to execute bin_t - Allow snmp to manage /var/lib/net-snmp files - Call snmp_manage_var_lib_files(fogorn_t) instead of snmp_manage_var_dirs - Fix vmware_role() interface - Fix cobbler_manage_lib_files() interface - Allow nagios check disk plugins to execute bin_t - Allow quantum to transition to openvswitch_t - Allow postdrop to stream connect to postfix-master - Allow quantum to stream connect to openvswitch - Add xserver_dontaudit_xdm_rw_stream_sockets() interface - Allow daemon to send dgrams to initrc_t - Allow kdm to start the power service to initiate a reboot or poweroff- Add mising nslcd_dontaudit_write_sock_file() interface - one more fix - Fix pki_read_tomcat_lib_files() interface - Allow certmonger to read pki-tomcat lib files - Allow certwatch to execute bin_t - Allow snmp to manage /var/lib/net-snmp files - Don't audit attempts to write to stream socket of nscld by thumbnailers - Allow git_system_t to read network state - Allow pegasas to execute mount command - Fix desc for drdb_admin - Fix condor_amin() - Interface fixes for uptime, vdagent, vnstatd - Fix labeling for moodle in /var/www/moodle/data - Add interface fixes - Allow bugzilla to read certs - /var/www/moodle needs to be writable by apache - Add interface to dontaudit attempts to send dbus messages to systemd domains, for xguest - Fix namespace_init_t to create content with proper labels, and allow it to manage all user content - Allow httpd_t to connect to osapi_compute port using httpd_use_openstack bolean - Fixes for dlm_controld - Fix apache_read_sys_content_rw_dirs() interface - Allow logrotate to read /var/log/z-push dir - Fix sys_nice for cups_domain - Allow postfix_postdrop to acces postfix_public socket - Allow sched_setscheduler for cupsd_t - Add missing context for /usr/sbin/snmpd - Kernel_t needs mac_admin in order to support labeled NFS - Fix systemd_dontaudit_dbus_chat() interface - Add interface to dontaudit attempts to send dbus messages to systemd domains, for xguest - Allow consolehelper domain to write Xauth files in /root - Add port definition for osapi_compute port - Allow unconfined to create /etc/hostname with correct labeling - Add systemd_filetrans_named_hostname() interface- Allow httpd_t to connect to osapi_compute port using httpd_use_openstack bolean - Fixes for dlm_controld - Fix apache_read_sys_content_rw_dirs() interface - Allow logrotate to read /var/log/z-push dir - Allow postfix_postdrop to acces postfix_public socket - Allow sched_setscheduler for cupsd_t - Add missing context for /usr/sbin/snmpd - Allow consolehelper more access discovered by Tom London - Allow fsdaemon to send signull to all domain - Add port definition for osapi_compute port - Allow unconfined to create /etc/hostname with correct labeling - Add systemd_filetrans_named_hostname() interface- Fix file_contexts.subs to label /run/lock correctly- Try to label on controlC devices up to 30 correctly - Add mount_rw_pid_files() interface - Add additional mount/umount interfaces needed by mock - fsadm_t sends audit messages in reads kernel_ipc_info when doing livecd-iso-to-disk - Fix tabs - Allow initrc_domain to search rgmanager lib files - Add more fixes which make mock working together with confined users * Allow mock_t to manage rpm files * Allow mock_t to read rpm log files * Allow mock to setattr on tmpfs, devpts * Allow mount/umount filesystems - Add rpm_read_log() interface - yum-cron runs rpm from within it. - Allow tuned to transition to dmidecode - Allow firewalld to do net_admin - Allow mock to unmont tmpfs_t - Fix virt_sigkill() interface - Add additional fixes for mock. Mainly caused by mount running in mock_t - Allow mock to write sysfs_t and mount pid files - Add mailman_domain to mailman_template() - Allow openvswitch to execute shell - Allow qpidd to use kerberos - Allow mailman to use fusefs, needs back port to RHEL6 - Allow apache and its scripts to use anon_inodefs - Add alias for git_user_content_t and git_sys_content_t so that RHEL6 will update to RHEL7 - Realmd needs to connect to samba ports, needs back port to F18 also - Allow colord to read /run/initial-setup- - Allow sanlock-helper to send sigkill to virtd which is registred to sanlock - Add virt_kill() interface - Add rgmanager_search_lib() interface - Allow wdmd to getattr on all filesystems. Back ported from RHEL6- Allow realmd to create tmp files - FIx ircssi_home_t type to irssi_home_t - Allow adcli running as realmd_t to connect to ldap port - Allow NetworkManager to transition to ipsec_t, for running strongswan - Make openshift_initrc_t an lxc_domain - Allow gssd to manage user_tmp_t files - Fix handling of irclogs in users homedir - Fix labeling for drupal an wp-content in subdirs of /var/www/html - Allow abrt to read utmp_t file - Fix openshift policy to transition lnk_file, sock-file an fifo_file when created in a tmpfs_t, needs back port to RHEL6 - fix labeling for (oo|rhc)-restorer-wrapper.sh - firewalld needs to be able to write to network sysctls - Fix mozilla_plugin_dontaudit_rw_sem() interface - Dontaudit generic ipc read/write to a mozilla_plugin for sandbox_x domains - Add mozilla_plugin_dontaudit_rw_sem() interface - Allow svirt_lxc_t to transition to openshift domains - Allow condor domains block_suspend and dac_override caps - Allow condor_master to read passd - Allow condor_master to read system state - Allow NetworkManager to transition to ipsec_t, for running strongswan - Lots of access required by lvm_t to created encrypted usb device - Allow xdm_t to dbus communicate with systemd_localed_t - Label strongswan content as ipsec_exec_mgmt_t for now - Allow users to dbus chat with systemd_localed - Fix handling of .xsession-errors in xserver.if, so kde will work - Might be a bug but we are seeing avc's about people status on init_t:service - Make sure we label content under /var/run/lock as <> - Allow daemon and systemprocesses to search init_var_run_t directory - Add boolean to allow xdm to write xauth data to the home directory - Allow mount to write keys for the unconfined domain - Add unconfined_write_keys() interface- Add labeling for /usr/share/pki - Allow programs that read var_run_t symlinks also read var_t symlinks - Add additional ports as mongod_port_t for 27018, 27019, 28017, 28018 and 28019 ports - Fix labeling for /etc/dhcp directory - add missing systemd_stub_unit_file() interface - Add files_stub_var() interface - Add lables for cert_t directories - Make localectl set-x11-keymap working at all - Allow abrt to manage mock build environments to catch build problems. - Allow virt_domains to setsched for running gdb on itself - Allow thumb_t to execute user home content - Allow pulseaudio running as mozilla_plugin_t to read /run/systemd/users/1000 - Allow certwatch to execut /usr/bin/httpd - Allow cgred to send signal perms to itself, needs back port to RHEL6 - Allow openshift_cron_t to look at quota - Allow cups_t to read inhered tmpfs_t from the kernel - Allow yppasswdd to use NIS - Tuned wants sys_rawio capability - Add ftpd_use_fusefs boolean - Allow dirsrvadmin_t to signal itself- Allow localectl to read /etc/X11/xorg.conf.d directory - Revert "Revert "Fix filetrans rules for kdm creates .xsession-errors"" - Allow mount to transition to systemd_passwd_agent - Make sure abrt directories are labeled correctly - Allow commands that are going to read mount pid files to search mount_var_run_t - label /usr/bin/repoquery as rpm_exec_t - Allow automount to block suspend - Add abrt_filetrans_named_content so that abrt directories get labeled correctly - Allow virt domains to setrlimit and read file_context- Allow nagios to manage nagios spool files - /var/spool/snmptt is a directory which snmdp needs to write to, needs back port to RHEL6 - Add swift_alias.* policy files which contain typealiases for swift types - Add support for /run/lock/opencryptoki - Allow pkcsslotd chown capability - Allow pkcsslotd to read passwd - Add rsync_stub() interface - Allow systemd_timedate also manage gnome config homedirs - Label /usr/lib64/security/pam_krb5/pam_krb5_cchelper as bin_t - Fix filetrans rules for kdm creates .xsession-errors - Allow sytemd_tmpfiles to create wtmp file - Really should not label content under /var/lock, since it could have labels on it different from var_lock_t - Allow systemd to list all file system directories - Add some basic stub interfaces which will be used in PRODUCT policies- Fix log transition rule for cluster domains - Start to group all cluster log together - Dont use filename transition for POkemon Advanced Adventure until a new checkpolicy update - cups uses usbtty_device_t devices - These fixes were all required to build a MLS virtual Machine with single level desktops - Allow domains to transiton using httpd_exec_t - Allow svirt domains to manage kernel key rings - Allow setroubleshoot to execute ldconfig - Allow firewalld to read generate gnome data - Allow bluetooth to read machine-info - Allow boinc domain to send signal to itself - Fix gnome_filetrans_home_content() interface - Allow mozilla_plugins to list apache modules, for use with gxine - Fix labels for POkemon in the users homedir - Allow xguest to read mdstat - Dontaudit virt_domains getattr on /dev/* - These fixes were all required to build a MLS virtual Machine with single level desktops - Need to back port this to RHEL6 for openshift - Add tcp/8891 as milter port - Allow nsswitch domains to read sssd_var_lib_t files - Allow ping to read network state. - Fix typo - Add labels to /etc/X11/xorg.d and allow systemd-timestampd_t to manage them- Adopt swift changes from lhh@redhat.com - Add rhcs_manage_cluster_pid_files() interface - Allow screen domains to configure tty and setup sock_file in ~/.screen directory - ALlow setroubleshoot to read default_context_t, needed to backport to F18 - Label /etc/owncloud as being an apache writable directory - Allow sshd to stream connect to an lxc domain- Allow postgresql to manage rgmanager pid files - Allow postgresql to read ccs data - Allow systemd_domain to send dbus messages to policykit - Add labels for /etc/hostname and /etc/machine-info and allow systemd-hostnamed to create them - All systemd domains that create content are reading the file_context file and setfscreate - Systemd domains need to search through init_var_run_t - Allow sshd to communicate with libvirt to set containers labels - Add interface to manage pid files - Allow NetworkManger_t to read /etc/hostname - Dontaudit leaked locked files into openshift_domains - Add fixes for oo-cgroup-read - it nows creates tmp files - Allow gluster to manage all directories as well as files - Dontaudit chrome_sandbox_nacl_t using user terminals - Allow sysstat to manage its own log files - Allow virtual machines to setrlimit and send itself signals. - Add labeling for /var/run/hplip- Fix POSTIN scriptlet- Merge rgmanger, corosync,pacemaker,aisexec policies to cluster_t in rhcs.pp- Fix authconfig.py labeling - Make any domains that write homedir content do it correctly - Allow glusterd to read/write anyhwere on the file system by default - Be a little more liberal with the rsync log files - Fix iscsi_admin interface - Allow iscsid_t to read /dev/urand - Fix up iscsi domain for use with unit files - Add filename transition support for spamassassin policy - Allow web plugins to use badly formated libraries - Allow nmbd_t to create samba_var_t directories - Add filename transition support for spamassassin policy - Add filename transition support for tvtime - Fix alsa_home_filetrans_alsa_home() interface - Move all userdom_filetrans_home_content() calling out of booleans - Allow logrotote to getattr on all file sytems - Remove duplicate userdom_filetrans_home_content() calling - Allow kadmind to read /etc/passwd - Dontaudit append .xsession-errors file on ecryptfs for policykit-auth - Allow antivirus domain to manage antivirus db links - Allow logrotate to read /sys - Allow mandb to setattr on man dirs - Remove mozilla_plugin_enable_homedirs boolean - Fix ftp_home_dir boolean - homedir mozilla filetrans has been moved to userdom_home_manager - homedir telepathy filetrans has been moved to userdom_home_manager - Remove gnome_home_dir_filetrans() from gnome_role_gkeyringd() - Might want to eventually write a daemon on fusefsd. - Add policy fixes for sshd [net] child from plautrba@redhat.com - Tor uses a new port - Remove bin_t for authconfig.py - Fix so only one call to userdom_home_file_trans - Allow home_manager_types to create content with the correctl label - Fix all domains that write data into the homedir to do it with the correct label - Change the postgresql to use proper boolean names, which is causing httpd_t to - not get access to postgresql_var_run_t - Hostname needs to send syslog messages - Localectl needs to be able to send dbus signals to users - Make sure userdom_filetrans_type will create files/dirs with user_home_t labeling by default - Allow user_home_manger domains to create spam* homedir content with correct labeling - Allow user_home_manger domains to create HOMEDIR/.tvtime with correct labeling - Add missing miscfiles_setattr_man_pages() interface and for now comment some rules for userdom_filetrans_type to make build process working - Declare userdom_filetrans_type attribute - userdom_manage_home_role() needs to be called withoout usertype attribute because of userdom_filetrans_type attribute - fusefsd is mounding a fuse file system on /run/user/UID/gvfs- Man pages are now generated in the build process - Allow cgred to list inotifyfs filesystem- Allow gluster to get attrs on all fs - New access required for virt-sandbox - Allow dnsmasq to execute bin_t - Allow dnsmasq to create content in /var/run/NetworkManager - Fix openshift_initrc_signal() interface - Dontaudit openshift domains doing getattr on other domains - Allow consolehelper domain to communicate with session bus - Mock should not be transitioning to any other domains, we should keep mock_t as mock_t - Update virt_qemu_ga_t policy - Allow authconfig running from realmd to restart oddjob service - Add systemd support for oddjob - Add initial policy for realmd_consolehelper_t which if for authconfig executed by realmd - Add labeling for gnashpluginrc - Allow chrome_nacl to execute /dev/zero - Allow condor domains to read /proc - mozilla_plugin_t will getattr on /core if firefox crashes - Allow condor domains to read /etc/passwd - Allow dnsmasq to execute shell scripts, openstack requires this access - Fix glusterd labeling - Allow virtd_t to interact with the socket type - Allow nmbd_t to override dac if you turned on sharing all files - Allow tuned to created kobject_uevent socket - Allow guest user to run fusermount - Allow openshift to read /proc and locale - Allow realmd to dbus chat with rpm - Add new interface for virt - Remove depracated interfaces - Allow systemd_domains read access on etc, etc_runtime and usr files, also allow them to connect stream to syslog socket - /usr/share/munin/plugins/plugin.sh should be labeled as bin_t - Remove some more unconfined_t process transitions, that I don't believe are necessary - Stop transitioning uncofnined_t to checkpc - dmraid creates /var/lock/dmraid - Allow systemd_localed to creatre unix_dgram_sockets - Allow systemd_localed to write kernel messages. - Also cleanup systemd definition a little. - Fix userdom_restricted_xwindows_user_template() interface - Label any block devices or char devices under /dev/infiniband as fixed_disk_device_t - User accounts need to dbus chat with accountsd daemon - Gnome requires all users to be able to read /proc/1/- virsh now does a setexeccon call - Additional rules required by openshift domains - Allow svirt_lxc_domains to use inherited terminals, needed to make virt-sandbox-service execute work - Allow spamd_update_t to search spamc_home_t - Avcs discovered by mounting an isci device under /mnt - Allow lspci running as logrotate to read pci.ids - Additional fix for networkmanager_read_pid_files() - Fix networkmanager_read_pid_files() interface - Allow all svirt domains to connect to svirt_socket_t - Allow virsh to set SELinux context for a process. - Allow tuned to create netlink_kobject_uevent_socket - Allow systemd-timestamp to set SELinux context - Add support for /var/lib/systemd/linger - Fix ssh_sysadm_login to be working on MLS as expected- Rename files_rw_inherited_tmp_files to files_rw_inherited_tmp_file - Add missing files_rw_inherited_tmp_files interface - Add additional interface for ecryptfs - ALlow nova-cert to connect to postgresql - Allow keystone to connect to postgresql - Allow all cups domains to getattr on filesystems - Allow pppd to send signull - Allow tuned to execute ldconfig - Allow gpg to read fips_enabled - Add additional fixes for ecryptfs - Allow httpd to work with posgresql - Allow keystone getsched and setsched- Allow gpg to read fips_enabled - Add support for /var/cache/realmd - Add support for /usr/sbin/blazer_usb and systemd support for nut - Add labeling for fenced_sanlock and allow sanclok transition to fenced_t - bitlbee wants to read own log file - Allow glance domain to send a signal itself - Allow xend_t to request that the kernel load a kernel module - Allow pacemaker to execute heartbeat lib files - cleanup new swift policy- Fix smartmontools - Fix userdom_restricted_xwindows_user_template() interface - Add xserver_xdm_ioctl_log() interface - Allow Xusers to ioctl lxdm.log to make lxdm working - Add MLS fixes to make MLS boot/log-in working - Add mls_socket_write_all_levels() also for syslogd - fsck.xfs needs to read passwd - Fix ntp_filetrans_named_content calling in init.te - Allow postgresql to create pg_log dir - Allow sshd to read rsync_data_t to make rsync working - Change ntp.conf to be labeled net_conf_t - Allow useradd to create homedirs in /run. ircd-ratbox does this and we should just allow it - Allow xdm_t to execute gstreamer home content - Allod initrc_t and unconfined domains, and sysadm_t to manage ntp - New policy for openstack swift domains - More access required for openshift_cron_t - Use cupsd_log_t instead of cupsd_var_log_t - rpm_script_roles should be used in rpm_run - Fix rpm_run() interface - Fix openshift_initrc_run() - Fix sssd_dontaudit_stream_connect() interface - Fix sssd_dontaudit_stream_connect() interface - Allow LDA's job to deliver mail to the mailbox - dontaudit block_suspend for mozilla_plugin_t - Allow l2tpd_t to all signal perms - Allow uuidgen to read /dev/random - Allow mozilla-plugin-config to read power_supply info - Implement cups_domain attribute for cups domains - We now need access to user terminals since we start by executing a command outside the tty - We now need access to user terminals since we start by executing a command outside the tty - svirt lxc containers want to execute userhelper apps, need these changes to allow this to happen - Add containment of openshift cron jobs - Allow system cron jobs to create tmp directories - Make userhelp_conf_t a config file - Change rpm to use rpm_script_roles - More fixes for rsync to make rsync wokring - Allow logwatch to domtrans to mdadm - Allow pacemaker to domtrans to ifconfig - Allow pacemaker to setattr on corosync.log - Add pacemaker_use_execmem for memcheck-amd64 command - Allow block_suspend capability - Allow create fifo_file in /tmp with pacemaker_tmp_t - Allow systat to getattr on fixed disk - Relabel /etc/ntp.conf to be net_conf_t - ntp_admin should create files in /etc with the correct label - Add interface to create ntp_conf_t files in /etc - Add additional labeling for quantum - Allow quantum to execute dnsmasq with transition- boinc_cliean wants also execmem as boinc projecs have - Allow sa-update to search admin home for /root/.spamassassin - Allow sa-update to search admin home for /root/.spamassassin - Allow antivirus domain to read net sysctl - Dontaudit attempts from thumb_t to connect to ssd - Dontaudit attempts by readahead to read sock_files - Dontaudit attempts by readahead to read sock_files - Create tmpfs file while running as wine as user_tmpfs_t - Dontaudit attempts by readahead to read sock_files - libmpg ships badly created librarie- Change ssh_use_pts to use macro and only inherited sshd_devpts_t - Allow confined users to read systemd_logind seat information - libmpg ships badly created libraries - Add support for strongswan.service - Add labeling for strongswan - Allow l2tpd_t to read network manager content in /run directory - Allow rsync to getattr any file in rsync_data_t - Add labeling and filename transition for .grl-podcasts- mount.glusterfs executes glusterfsd binary - Allow systemd_hostnamed_t to stream connect to systemd - Dontaudit any user doing a access check - Allow obex-data-server to request the kernel to load a module - Allow gpg-agent to manage gnome content (~/.cache/gpg-agent-info) - Allow gpg-agent to read /proc/sys/crypto/fips_enabled - Add new types for antivirus.pp policy module - Allow gnomesystemmm_t caps because of ioprio_set - Make sure if mozilla_plugin creates files while in permissive mode, they get created with the correct label, user_home_t - Allow gnomesystemmm_t caps because of ioprio_set - Allow NM rawip socket - files_relabel_non_security_files can not be used with boolean - Add interface to thumb_t dbus_chat to allow it to read remote process state - ALlow logrotate to domtrans to mdadm_t - kde gnomeclock wants to write content to /tmp- kde gnomeclock wants to write content to /tmp - /usr/libexec/kde4/kcmdatetimehelper attempts to create /root/.kde - Allow blueman_t to rwx zero_device_t, for some kind of jre - Allow mozilla_plugin_t to rwx zero_device_t, for some kind of jre - Ftp full access should be allowed to create directories as well as files - Add boolean to allow rsync_full_acces, so that an rsync server can write all - over the local machine - logrotate needs to rotate logs in openshift directories, needs back port to RHEL6 - Add missing vpnc_roles type line - Allow stapserver to write content in /tmp - Allow gnome keyring to create keyrings dir in ~/.local/share - Dontaudit thumb drives trying to bind to udp sockets if nis_enabled is turned on - Add interface to colord_t dbus_chat to allow it to read remote process state - Allow colord_t to read cupsd_t state - Add mate-thumbnail-font as thumnailer - Allow sectoolm to sys_ptrace since it is looking at other proceses /proc data. - Allow qpidd to list /tmp. Needed by ssl - Only allow init_t to transition to rsync_t domain, not initrc_t. This should be back ported to F17, F18 - - Added systemd support for ksmtuned - Added booleans ksmtuned_use_nfs ksmtuned_use_cifs - firewalld seems to be creating mmap files which it needs to execute in /run /tmp and /dev/shm. Would like to clean this up but for now we will allow - Looks like qpidd_t needs to read /dev/random - Lots of probing avc's caused by execugting gpg from staff_t - Dontaudit senmail triggering a net_admin avc - Change thumb_role to use thumb_run, not sure why we have a thumb_role, needs back port - Logwatch does access check on mdadm binary - Add raid_access_check_mdadm() iterface- Fix systemd_manage_unit_symlinks() interface - Call systemd_manage_unit_symlinks(() which is correct interface - Add filename transition for opasswd - Switch gnomeclock_dbus_chat to systemd_dbus_chat_timedated since we have switched the name of gnomeclock - Allow sytstemd-timedated to get status of init_t - Add new systemd policies for hostnamed and rename gnomeclock_t to systemd_timedate_t - colord needs to communicate with systemd and systemd_logind, also remove duplicate rules - Switch gnomeclock_dbus_chat to systemd_dbus_chat_timedated since we have switched the name of gnomeclock - Allow gpg_t to manage all gnome files - Stop using pcscd_read_pub_files - New rules for xguest, dontaudit attempts to dbus chat - Allow firewalld to create its mmap files in tmpfs and tmp directories - Allow firewalld to create its mmap files in tmpfs and tmp directories - run unbound-chkconf as named_t, so it can read dnssec - Colord is reading xdm process state, probably reads state of any apps that sends dbus message - Allow mdadm_t to change the kernel scheduler - mythtv policy - Update mandb_admin() interface - Allow dsspam to listen on own tpc_socket - seutil_filetrans_named_content needs to be optional - Allow sysadm_t to execute content in his homedir - Add attach_queue to tun_socket, new patch from Paul Moore - Change most of selinux configuration types to security_file_type. - Add filename transition rules for selinux configuration - ssh into a box with -X -Y requires ssh_use_ptys - Dontaudit thumb drives trying to bind to udp sockets if nis_enabled is turned on - Allow all unpriv userdomains to send dbus messages to hostnamed and timedated - New allow rules found by Tom London for systemd_hostnamed- Allow systemd-tmpfiles to relabel lpd spool files - Ad labeling for texlive bash scripts - Add xserver_filetrans_fonts_cache_home_content() interface - Remove duplicate rules from *.te - Add support for /var/lock/man-db.lock - Add support for /var/tmp/abrt(/.*)? - Add additional labeling for munin cgi scripts - Allow httpd_t to read munin conf files - Allow certwatch to read meminfo - Fix nscd_dontaudit_write_sock_file() interfac - Fix gnome_filetrans_home_content() to include also "fontconfig" dir as cache_home_t - llow mozilla_plugin_t to create HOMEDIR/.fontconfig with the proper labeling- Allow gnomeclock to talk to puppet over dbus - Allow numad access discovered by Dominic - Add support for HOME_DIR/.maildir - Fix attribute_role for mozilla_plugin_t domain to allow staff_r to access this domain - Allow udev to relabel udev_var_run_t lnk_files - New bin_t file in mcelog- Remove all mcs overrides and replace with t1 != mcs_constrained_types - Add attribute_role for iptables - mcs_process_set_categories needs to be called for type - Implement additional role_attribute statements - Sodo domain is attempting to get the additributes of proc_kcore_t - Unbound uses port 8953 - Allow svirt_t images to compromise_kernel when using pci-passthrough - Add label for dns lib files - Bluetooth aquires a dbus name - Remove redundant files_read_usr_file calling - Remove redundant files_read_etc_file calling - Fix mozilla_run_plugin() - Add role_attribute support for more domains- Mass merge with upstream- Bump the policy version to 28 to match selinux userspace - Rebuild versus latest libsepol- Add systemd_status_all_unit_files() interface - Add support for nshadow - Allow sysadm_t to administrate the postfix domains - Add interface to setattr on isid directories for use by tmpreaper - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Add systemd_status_all_unit_files() interface - Add support for nshadow - Allow sysadm_t to administrate the postfix domains - Add interface to setattr on isid directories for use by tmpreaper - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Allow sshd_t sys_admin for use with afs logins - Add labeling for /var/named/chroot/etc/localtim- Allow setroubleshoot_fixit to execute rpm - zoneminder needs to connect to httpd ports where remote cameras are listening - Allow firewalld to execute content created in /run directory - Allow svirt_t to read generic certs - Dontaudit leaked ps content to mozilla plugin - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - init scripts are creating systemd_unit_file_t directories- systemd_logind_t is looking at all files under /run/user/apache - Allow systemd to manage all user tmp files - Add labeling for /var/named/chroot/etc/localtime - Allow netlabel_peer_t type to flow over netif_t and node_t, and only be hindered by MLS, need back port to RHEL6 - Keystone is now using a differnt port - Allow xdm_t to use usbmuxd daemon to control sound - Allow passwd daemon to execute gnome_exec_keyringd - Fix chrome_sandbox policy - Add labeling for /var/run/checkquorum-timer - More fixes for the dspam domain, needs back port to RHEL6 - More fixes for the dspam domain, needs back port to RHEL6 - sssd needs to connect to kerberos password port if a user changes his password - Lots of fixes from RHEL testing of dspam web - Allow chrome and mozilla_plugin to create msgq and semaphores - Fixes for dspam cgi scripts - Fixes for dspam cgi scripts - Allow confine users to ptrace screen - Backport virt_qemu_ga_t changes from RHEL - Fix labeling for dspam.cgi needed for RHEL6 - We need to back port this policy to RHEL6, for lxc domains - Dontaudit attempts to set sys_resource of logrotate - Allow corosync to read/write wdmd's tmpfs files - I see a ptrace of mozilla_plugin_t by staff_t, will allow without deny_ptrace being set - Allow cron jobs to read bind config for unbound - libvirt needs to inhibit systemd - kdumpctl needs to delete boot_t files - Fix duplicate gnome_config_filetrans - virtd_lxc_t is using /dev/fuse - Passenger needs to create a directory in /var/log, needs a backport to RHEL6 for openshift - apcupsd can be setup to listen to snmp trafic - Allow transition from kdumpgui to kdumpctl - Add fixes for munin CGI scripts - Allow deltacloud to connect to openstack at the keystone port - Allow domains that transition to svirt domains to be able to signal them - Fix file context of gstreamer in .cache directory - libvirt is communicating with logind - NetworkManager writes to the systemd inhibit pipe- Allow munin disk plugins to get attributes of all directories - Allow munin disk plugins to get attributes of all directorie - Allow logwatch to get attributes of all directories - Fix networkmanager_manage_lib() interface - Fix gnome_manage_config() to allow to manage sock_file - Fix virtual_domain_context - Add support for dynamic DNS for DHCPv6- Allow svirt to use netlink_route_socket which was a part of auth_use_nsswitch - Add additional labeling for /var/www/openshift/broker - Fix rhev policy - Allow openshift_initrc domain to dbus chat with systemd_logind - Allow httpd to getattr passenger log file if run_stickshift - Allow consolehelper-gtk to connect to xserver - Add labeling for the tmp-inst directory defined in pam_namespace.conf - Add lvm_metadata_t labeling for /etc/multipath- consoletype is no longer used- Add label for efivarfs - Allow certmonger to send signal to itself - Allow plugin-config to read own process status - Add more fixes for pacemaker - apache/drupal can run clamscan on uploaded content - Allow chrome_sandbox_nacl_t to read pid 1 content- Fix MCS Constraints to control ingres and egres controls on the network. - Change name of svirt_nokvm_t to svirt_tcg_t - Allow tuned to request the kernel to load kernel modules- Label /var/lib/pgsql/.ssh as ssh_home_t - Add labeling for /usr/bin/pg_ctl - Allow systemd-logind to manage keyring user tmp dirs - Add support for 7389/tcp port - gems seems to be placed in lots of places - Since xdm is running a full session, it seems to be trying to execute lots of executables via dbus - Add back tcp/8123 port as http_cache port - Add ovirt-guest-agent\.pid labeling - Allow xend to run scsi_id - Allow rhsmcertd-worker to read "physical_package_id" - Allow pki_tomcat to connect to ldap port - Allow lpr to read /usr/share/fonts - Allow open file from CD/DVD drive on domU - Allow munin services plugins to talk to SSSD - Allow all samba domains to create samba directory in var_t directories - Take away svirt_t ability to use nsswitch - Dontaudit attempts by openshift to read apache logs - Allow apache to create as well as append _ra_content_t - Dontaudit sendmail_t reading a leaked file descriptor - Add interface to have admin transition /etc/prelink.cache to the proper label - Add sntp support to ntp policy - Allow firewalld to dbus chat with devicekit_power - Allow tuned to call lsblk - Allow tor to read /proc/sys/kernel/random/uuid - Add tor_can_network_relay boolean- Add openshift_initrc_signal() interface - Fix typos - dspam port is treat as spamd_port_t - Allow setroubleshoot to getattr on all executables - Allow tuned to execute profiles scripts in /etc/tuned - Allow apache to create directories to store its log files - Allow all directories/files in /var/log starting with passenger to be labeled passenger_log_t - Looks like apache is sending sinal to openshift_initrc_t now,needs back port to RHEL6 - Allow Postfix to be configured to listen on TCP port 10026 for email from DSPAM - Add filename transition for /etc/tuned/active_profile - Allow condor_master to send mails - Allow condor_master to read submit.cf - Allow condor_master to create /tmp files/dirs - Allow condor_mater to send sigkill to other condor domains - Allow condor_procd sigkill capability - tuned-adm wants to talk with tuned daemon - Allow kadmind and krb5kdc to also list sssd_public_t - Allow accountsd to dbus chat with init - Fix git_read_generic_system_content_files() interface - pppd wants sys_nice by nmcli because of "syscall=sched_setscheduler" - Fix mozilla_plugin_can_network_connect to allow to connect to all ports - Label all munin plugins which are not covered by munin plugins policy as unconfined_munin_plugin_exec_t - dspam wants to search /var/spool for opendkim data - Revert "Add support for tcp/10026 port as dspam_port_t" - Turning on labeled networking requires additional access for netlabel_peer_t; these allow rules need to be back ported to RHEL6 - Allow all application domains to use fifo_files passed in from userdomains, also allow them to write to tmp_files inherited from userdomain - Allow systemd_tmpfiles_t to setattr on mandb_cache_t- consolekit.pp was not removed from the postinstall script- Add back consolekit policy - Silence bootloader trying to use inherited tty - Silence xdm_dbusd_t trying to execute telepathy apps - Fix shutdown avcs when machine has unconfined.pp disabled - The host and a virtual machine can share the same printer on a usb device - Change oddjob to transition to a ranged openshift_initr_exec_t when run from oddjob - Allow abrt_watch_log_t to execute bin_t - Allow chrome sandbox to write content in ~/.config/chromium - Dontaudit setattr on fontconfig dir for thumb_t - Allow lircd to request the kernel to load module - Make rsync as userdom_home_manager - Allow rsync to search automount filesystem - Add fixes for pacemaker- Add support for 4567/tcp port - Random fixes from Tuomo Soini - xdm wants to get init status - Allow programs to run in fips_mode - Add interface to allow the reading of all blk device nodes - Allow init to relabel rpcbind sock_file - Fix labeling for lastlog and faillog related to logrotate - ALlow aeolus_configserver to use TRAM port - Add fixes for aeolus_configserver - Allow snmpd to connect to snmp port - Allow spamd_update to create spamd_var_lib_t directories - Allow domains that can read sssd_public_t files to also list the directory - Remove miscfiles_read_localization, this is defined for all domains- Allow syslogd to request the kernel to load a module - Allow syslogd_t to read the network state information - Allow xdm_dbusd_t connect to the system DBUS - Add support for 7389/tcp port - Allow domains to read/write all inherited sockets - Allow staff_t to read kmsg - Add awstats_purge_apache_log boolean - Allow ksysguardproces to read /.config/Trolltech.conf - Allow passenger to create and append puppet log files - Add puppet_append_log and puppet_create_log interfaces - Add puppet_manage_log() interface - Allow tomcat domain to search tomcat_var_lib_t - Allow pki_tomcat_t to connect to pki_ca ports - Allow pegasus_t to have net_admin capability - Allow pegasus_t to write /sys/class/net//flags - Allow mailserver_delivery to manage mail_home_rw_t lnk_files - Allow fetchmail to create log files - Allow gnomeclock to manage home config in .kde - Allow bittlebee to read kernel sysctls - Allow logrotate to list /root- Fix userhelper_console_role_template() - Allow enabling Network Access Point service using blueman - Make vmware_host_t as unconfined domain - Allow authenticate users in webaccess via squid, using mysql as backend - Allow gathers to get various metrics on mounted file systems - Allow firewalld to read /etc/hosts - Fix cron_admin_role() to make sysadm cronjobs running in the sysadm_t instead of cronjob_t - Allow kdumpgui to read/write to zipl.conf - Commands needed to get mock to build from staff_t in enforcing mode - Allow mdadm_t to manage cgroup files - Allow all daemons and systemprocesses to use inherited initrc_tmp_t files - dontaudit ifconfig_t looking at fifo_files that are leaked to it - Add lableing for Quest Authentication System- Fix filetrans interface definitions - Dontaudit xdm_t to getattr on BOINC lib files - Add systemd_reload_all_services() interface - Dontaudit write access on /var/lib/net-snmp/mib_indexes - Only stop mcsuntrustedproc from relableing files - Allow accountsd to dbus chat with gdm - Allow realmd to getattr on all fs - Allow logrotate to reload all services - Add systemd unit file for radiusd - Allow winbind to create samba pid dir - Add labeling for /var/nmbd/unexpected - Allow chrome and mozilla plugin to connect to msnp ports- Fix storage_rw_inherited_fixed_disk_dev() to cover also blk_file - Dontaudit setfiles reading /dev/random - On initial boot gnomeclock is going to need to be set buy gdm - Fix tftp_read_content() interface - Random apps looking at kernel file systems - Testing virt with lxc requiers additional access for virsh_t - New allow rules requied for latest libvirt, libvirt talks directly to journald,lxc setup tool needs compromize_kernel,and we need ipc_lock in the container - Allow MPD to read /dev/radnom - Allow sandbox_web_type to read logind files which needs to read pulseaudio - Allow mozilla plugins to read /dev/hpet - Add labeling for /var/lib/zarafa-webap - Allow BOINC client to use an HTTP proxy for all connections - Allow rhsmertd to domain transition to dmidecod - Allow setroubleshootd to send D-Bus msg to ABRT- Define usbtty_device_t as a term_tty - Allow svnserve to accept a connection - Allow xend manage default virt_image_t type - Allow prelink_cron_system_t to overide user componant when executing cp - Add labeling for z-push - Gnomeclock sets the realtime clock - Openshift seems to be storing apache logs in /var/lib/openshift/.log/httpd - Allow lxc domains to use /dev/random and /dev/urandom- Add port defintion for tcp/9000 - Fix labeling for /usr/share/cluster/checkquorum to label also checkquorum.wdmd - Add rules and labeling for $HOME/cache/\.gstreamer-.* directory - Add support for CIM provider openlmi-networking which uses NetworkManager dbus API - Allow shorewall_t to create netlink_socket - Allow krb5admind to block suspend - Fix labels on /var/run/dlm_controld /var/log/dlm_controld - Allow krb5kdc to block suspend - gnomessytemmm_t needs to read /etc/passwd - Allow cgred to read all sysctls- Allow all domains to read /proc/sys/vm/overcommit_memory - Make proc_numa_t an MLS Trusted Object - Add /proc/numactl support for confined users - Allow ssh_t to connect to any port > 1023 - Add openvswitch domain - Pulseaudio tries to create directories in gnome_home_t directories - New ypbind pkg wants to search /var/run which is caused by sd_notify - Allow NM to read certs on NFS/CIFS using use_nfs_*, use_samba_* booleans - Allow sanlock to read /dev/random - Treat php-fpm with httpd_t - Allow domains that can read named_conf_t to be able to list the directories - Allow winbind to create sock files in /var/run/samba- Add smsd policy - Add support for OpenShift sbin labelin - Add boolean to allow virt to use rawip - Allow mozilla_plugin to read all file systems with noxattrs support - Allow kerberos to write on anon_inodefs fs - Additional access required by fenced - Add filename transitions for passwd.lock/group.lock - UPdate man pages - Create coolkey directory in /var/cache with the correct label- Fix label on /etc/group.lock - Allow gnomeclock to create lnk_file in /etc - label /root/.pki as a home_cert_t - Add interface to make sure rpcbind.sock is created with the correct label - Add definition for new directory /var/lib/os-probe and bootloader wants to read udev rules - opendkim should be a part of milter - Allow libvirt to set the kernel sched algorythm - Allow mongod to read sysfs_t - Add authconfig policy - Remove calls to miscfiles_read_localization all domains get this - Allow virsh_t to read /root/.pki/ content - Add label for log directory under /var/www/stickshift- Allow getty to setattr on usb ttys - Allow sshd to search all directories for sshd_home_t content - Allow staff domains to send dbus messages to kdumpgui - Fix labels on /etc/.pwd.lock and friends to be passwd_file_t - Dontaudit setfiles reading urand - Add files_dontaudit_list_tmp() for domains to which we added sys_nice/setsched - Allow staff_gkeyringd_t to read /home/$USER/.local/share/keyrings dir - Allow systemd-timedated to read /dev/urandom - Allow entropyd_t to read proc_t (meminfo) - Add unconfined munin plugin - Fix networkmanager_read_conf() interface - Allow blueman to list /tmp which is needed by sys_nic/setsched - Fix label of /etc/mail/aliasesdb-stamp - numad is searching cgroups - realmd is communicating with networkmanager using dbus - Lots of fixes to try to get kdump to work- Allow loging programs to dbus chat with realmd - Make apache_content_template calling as optional - realmd is using policy kit- Add new selinuxuser_use_ssh_chroot boolean - dbus needs to be able to read/write inherited fixed disk device_t passed through it - Cleanup netutils process allow rule - Dontaudit leaked fifo files from openshift to ping - sanlock needs to read mnt_t lnk files - Fail2ban needs to setsched and sys_nice- Change default label of all files in /var/run/rpcbind - Allow sandbox domains (java) to read hugetlbfs_t - Allow awstats cgi content to create tmp files and read apache log files - Allow setuid/setgid for cupsd-config - Allow setsched/sys_nice pro cupsd-config - Fix /etc/localtime sym link to be labeled locale_t - Allow sshd to search postgresql db t since this is a homedir - Allow xwindows users to chat with realmd - Allow unconfined domains to configure all files and null_device_t service- Adopt pki-selinux policy- pki is leaking which we dontaudit until a pki code fix - Allow setcap for arping - Update man pages - Add labeling for /usr/sbin/mcollectived - pki fixes - Allow smokeping to execute fping in the netutils_t domain- Allow mount to relabelfrom unlabeled file systems - systemd_logind wants to send and receive messages from devicekit disk over dbus to make connected mouse working - Add label to get bin files under libreoffice labeled correctly - Fix interface to allow executing of base_ro_file_type - Add fixes for realmd - Update pki policy - Add tftp_homedir boolean - Allow blueman sched_setscheduler - openshift user domains wants to r/w ssh tcp sockets- Additional requirements for disable unconfined module when booting - Fix label of systemd script files - semanage can use -F /dev/stdin to get input - syslog now uses kerberos keytabs - Allow xserver to compromise_kernel access - Allow nfsd to write to mount_var_run_t when running the mount command - Add filename transition rule for bin_t directories - Allow files to read usr_t lnk_files - dhcpc wants chown - Add support for new openshift labeling - Clean up for tunable+optional statements - Add labeling for /usr/sbin/mkhomedir_helper - Allow antivirus domain to managa amavis spool files - Allow rpcbind_t to read passwd - Allow pyzor running as spamc to manage amavis spool- Add interfaces to read kernel_t proc info - Missed this version of exec_all - Allow anyone who can load a kernel module to compromise kernel - Add oddjob_dbus_chat to openshift apache policy - Allow chrome_sandbox_nacl_t to send signals to itself - Add unit file support to usbmuxd_t - Allow all openshift domains to read sysfs info - Allow openshift domains to getattr on all domains- MLS fixes from Dan - Fix name of capability2 secure_firmware->compromise_kerne- Allow xdm to search all file systems - Add interface to allow the config of all files - Add rngd policy - Remove kgpg as a gpg_exec_t type - Allow plymouthd to block suspend - Allow systemd_dbus to config any file - Allow system_dbus_t to configure all services - Allow freshclam_t to read usr_files - varnishd requires execmem to load modules- Allow semanage to verify types - Allow sudo domain to execute user home files - Allow session_bus_type to transition to user_tmpfs_t - Add dontaudit caused by yum updates - Implement pki policy but not activated- tuned wants to getattr on all filesystems - tuned needs also setsched. The build is needed for test day- Add policy for qemu-qa - Allow razor to write own config files - Add an initial antivirus policy to collect all antivirus program - Allow qdisk to read usr_t - Add additional caps for vmware_host - Allow tmpfiles_t to setattr on mandb_cache_t - Dontaudit leaked files into mozilla_plugin_config_t - Allow wdmd to getattr on tmpfs - Allow realmd to use /dev/random - allow containers to send audit messages - Allow root mount any file via loop device with enforcing mls policy - Allow tmpfiles_t to setattr on mandb_cache_t - Allow tmpfiles_t to setattr on mandb_cache_t - Make userdom_dontaudit_write_all_ not allow open - Allow init scripts to read all unit files - Add support for saphostctrl ports- Add kernel_read_system_state to sandbox_client_t - Add some of the missing access to kdumpgui - Allow systemd_dbusd_t to status the init system - Allow vmnet-natd to request the kernel to load a module - Allow gsf-office-thum to append .cache/gdm/session.log - realmd wants to read .config/dconf/user - Firewalld wants sys_nice/setsched - Allow tmpreaper to delete mandb cache files - Firewalld wants sys_nice/setsched - Allow firewalld to perform a DNS name resolution - Allown winbind to read /usr/share/samba/codepages/lowcase.dat - Add support for HTTPProxy* in /etc/freshclam.conf - Fix authlogin_yubike boolean - Extend smbd_selinux man page to include samba booleans - Allow dhcpc to execute consoletype - Allow ping to use inherited tmp files created in init scripts - On full relabel with unconfined domain disabled, initrc was running some chcon's - Allow people who delete man pages to delete mandb cache files- Add missing permissive domains- Add new mandb policy - ALlow systemd-tmpfiles_t to relabel mandb_cache_t - Allow logrotate to start all unit files- Add fixes for ctbd - Allow nmbd to stream connect to ctbd - Make cglear_t as nsswitch_domain - Fix bogus in interfaces - Allow openshift to read/write postfix public pipe - Add postfix_manage_spool_maildrop_files() interface - stickshift paths have been renamed to openshift - gnome-settings-daemon wants to write to /run/systemd/inhibit/ pipes - Update man pages, adding ENTRYPOINTS- Add mei_device_t - Make sure gpg content in homedir created with correct label - Allow dmesg to write to abrt cache files - automount wants to search virtual memory sysctls - Add support for hplip logs stored in /var/log/hp/tmp - Add labeling for /etc/owncloud/config.php - Allow setroubleshoot to send analysys to syslogd-journal - Allow virsh_t to interact with new fenced daemon - Allow gpg to write to /etc/mail/spamassassiin directories - Make dovecot_deliver_t a mail server delivery type - Add label for /var/tmp/DNS25- Fixes for tomcat_domain template interface- Remove init_systemd and init_upstart boolean, Move init_daemon_domain and init_system_domain to use attributes - Add attribute to all base os types. Allow all domains to read all ro base OS types- Additional unit files to be defined as power unit files - Fix more boolean names- Fix boolean name so subs will continue to work- dbus needs to start getty unit files - Add interface to allow system_dbusd_t to start the poweroff service - xdm wants to exec telepathy apps - Allow users to send messages to systemdlogind - Additional rules needed for systemd and other boot apps - systemd wants to list /home and /boot - Allow gkeyringd to write dbus/conf file - realmd needs to read /dev/urand - Allow readahead to delete /.readahead if labeled root_t, might get created before policy is loaded- Fixes to safe more rules - Re-write tomcat_domain_template() - Fix passenger labeling - Allow all domains to read man pages - Add ephemeral_port_t to the 'generic' port interfaces - Fix the names of postgresql booleans- Stop using attributes form netlabel_peer and syslog, auth_use_nsswitch setsup netlabel_peer - Move netlable_peer check out of booleans - Remove call to recvfrom_netlabel for kerberos call - Remove use of attributes when calling syslog call - Move -miscfiles_read_localization to domain.te to save hundreds of allow rules - Allow all domains to read locale files. This eliminates around 1500 allow rules- Cleanup nis_use_ypbind_uncond interface - Allow rndc to block suspend - tuned needs to modify the schedule of the kernel - Allow svirt_t domains to read alsa configuration files - ighten security on irc domains and make sure they label content in homedir correctly - Add filetrans_home_content for irc files - Dontaudit all getattr access for devices and filesystems for sandbox domains - Allow stapserver to search cgroups directories - Allow all postfix domains to talk to spamd- Add interfaces to ignore setattr until kernel fixes this to be checked after the DAC check - Change pam_t to pam_timestamp_t - Add dovecot_domain attribute and allow this attribute block_suspend capability2 - Add sanlock_use_fusefs boolean - numad wants send/recieve msg - Allow rhnsd to send syslog msgs - Make piranha-pulse as initrc domain - Update openshift instances to dontaudit setattr until the kernel is fixed.- Fix auth_login_pgm_domain() interface to allow domains also managed user tmp dirs because of #856880 related to pam_systemd - Remove pam_selinux.8 which conflicts with man page owned by the pam package - Allow glance-api to talk to mysql - ABRT wants to read Xorg.0.log if if it detects problem with Xorg - Fix gstreamer filename trans. interface- Man page fixes by Dan Walsh- Allow postalias to read postfix config files - Allow man2html to read man pages - Allow rhev-agentd to search all mountpoints - Allow rhsmcertd to read /dev/random - Add tgtd_stream_connect() interface - Add cyrus_write_data() interface - Dontaudit attempts by sandboxX clients connectiing to the xserver_port_t - Add port definition for tcp/81 as http_port_t - Fix /dev/twa labeling - Allow systemd to read modules config- Merge openshift policy - Allow xauth to read /dev/urandom - systemd needs to relabel content in /run/systemd directories - Files unconfined should be able to perform all services on all files - Puppet tmp file can be leaked to all domains - Dontaudit rhsmcertd-worker to search /root/.local - Allow chown capability for zarafa domains - Allow system cronjobs to runcon into openshift domains - Allow virt_bridgehelper_t to manage content in the svirt_home_t labeled directories- nmbd wants to create /var/nmbd - Stop transitioning out of anaconda and firstboot, just causes AVC messages - Allow clamscan to read /etc files - Allow bcfg2 to bind cyphesis port - heartbeat should be run as rgmanager_t instead of corosync_t - Add labeling for /etc/openldap/certs - Add labeling for /opt/sartest directory - Make crontab_t as userdom home reader - Allow tmpreaper to list admin_home dir - Add defition for imap_0 replay cache file - Add support for gitolite3 - Allow virsh_t to send syslog messages - allow domains that can read samba content to be able to list the directories also - Add realmd_dbus_chat to allow all apps that use nsswitch to talk to realmd - Separate out sandbox from sandboxX policy so we can disable it by default - Run dmeventd as lvm_t - Mounting on any directory requires setattr and write permissions - Fix use_nfs_home_dirs() boolean - New labels for pam_krb5 - Allow init and initrc domains to sys_ptrace since this is needed to look at processes not owned by uid 0 - Add realmd_dbus_chat to allow all apps that use nsswitch to talk to realmd- Separate sandbox policy into sandbox and sandboxX, and disable sandbox by default on fresh installs - Allow domains that can read etc_t to read etc_runtime_t - Allow all domains to use inherited tmpfiles- Allow realmd to read resolv.conf - Add pegasus_cache_t type - Label /usr/sbin/fence_virtd as virsh_exec_t - Add policy for pkcsslotd - Add support for cpglockd - Allow polkit-agent-helper to read system-auth-ac - telepathy-idle wants to read gschemas.compiled - Allow plymouthd to getattr on fs_t - Add slpd policy - Allow ksysguardproces to read/write config_usr_t- Fix labeling substitution so rpm will label /lib/systemd content correctly- Add file name transitions for ttyACM0 - spice-vdagent(d)'s are going to log over to syslog - Add sensord policy - Add more fixes for passenger policy related to puppet - Allow wdmd to create wdmd_tmpfs_t - Fix labeling for /var/run/cachefilesd\.pid - Add thumb_tmpfs_t files type- Allow svirt domains to manage the network since this is containerized - Allow svirt_lxc_net_t to send audit messages- Make "snmpwalk -mREDHAT-CLUSTER-MIB ...." working - Allow dlm_controld to execute dlm_stonith labeled as bin_t - Allow GFS2 working on F17 - Abrt needs to execute dmesg - Allow jockey to list the contents of modeprobe.d - Add policy for lightsquid as squid_cron_t - Mailscanner is creating files and directories in /tmp - dmesg is now reading /dev/kmsg - Allow xserver to communicate with secure_firmware - Allow fsadm tools (fsck) to read /run/mount contnet - Allow sysadm types to read /dev/kmsg -- Allow postfix, sssd, rpcd to block_suspend - udev seems to need secure_firmware capability - Allow virtd to send dbus messages to firewalld so it can configure the firewall- Fix labeling of content in /run created by virsh_t - Allow condor domains to read kernel sysctls - Allow condor_master to connect to amqp - Allow thumb drives to create shared memory and semaphores - Allow abrt to read mozilla_plugin config files - Add labels for lightsquid - Default files in /opt and /usr that end in .cgi as httpd_sys_script_t, allow - dovecot_auth_t uses ldap for user auth - Allow domains that can read dhcp_etc_t to read lnk_files - Add more then one watchdog device - Allow useradd_t to manage etc_t files so it can rename it and edit them - Fix invalid class dir should be fifo_file - Move /run/blkid to fsadm and make sure labeling is correct- Fix bogus regex found by eparis - Fix manage run interface since lvm needs more access - syslogd is searching cgroups directory - Fixes to allow virt-sandbox-service to manage lxc var run content- Fix Boolean settings - Add new libjavascriptcoregtk as textrel_shlib_t - Allow xdm_t to create xdm_home_t directories - Additional access required for systemd - Dontaudit mozilla_plugin attempts to ipc_lock - Allow tmpreaper to delete unlabeled files - Eliminate screen_tmp_t and allow it to manage user_tmp_t - Dontaudit mozilla_plugin_config_t to append to leaked file descriptors - Allow web plugins to connect to the asterisk ports - Condor will recreate the lock directory if it does not exist - Oddjob mkhomedir needs to connectto user processes - Make oddjob_mkhomedir_t a userdom home manager- Put placeholder back in place for proper numbering of capabilities - Systemd also configures init scripts- Fix ecryptfs interfaces - Bootloader seems to be trolling around /dev/shm and /dev - init wants to create /etc/systemd/system-update.target.wants - Fix systemd_filetrans call to move it out of tunable - Fix up policy to work with systemd userspace manager - Add secure_firmware capability and remove bogus epolwakeup - Call seutil_*_login_config interfaces where should be needed - Allow rhsmcertd to send signal to itself - Allow thin domains to send signal to itself - Allow Chrome_ChildIO to read dosfs_t- Add role rules for realmd, sambagui- Add new type selinux_login_config_t for /etc/selinux//logins/ - Additional fixes for seutil_manage_module_store() - dbus_system_domain() should be used with optional_policy - Fix svirt to be allowed to use fusefs file system - Allow login programs to read /run/ data created by systemd_login - sssd wants to write /etc/selinux//logins/ for SELinux PAM module - Fix svirt to be allowed to use fusefs file system - Allow piranha domain to use nsswitch - Sanlock needs to send Kill Signals to non root processes - Pulseaudio wants to execute /run/user/PID/.orc- Fix saslauthd when it tries to read /etc/shadow - Label gnome-boxes as a virt homedir - Need to allow svirt_t ability to getattr on nfs_t file systems - Update sanlock policy to solve all AVC's - Change confined users can optionally manage virt content - Handle new directories under ~/.cache - Add block suspend to appropriate domains - More rules required for containers - Allow login programs to read /run/ data created by systemd_logind - Allow staff users to run svirt_t processes- Update to upstream- More fixes for systemd to make rawhide booting from Dan Walsh- Add systemd fixes to make rawhide booting- Add systemd_logind_inhibit_var_run_t attribute - Remove corenet_all_recvfrom_unlabeled() for non-contrib policies because we moved it to domain.if for all domain_type - Add interface for mysqld to dontaudit signull to all processes - Label new /var/run/journal directory correctly - Allow users to inhibit suspend via systemd - Add new type for the /var/run/inhibit directory - Add interface to send signull to systemd_login so avahi can send them - Allow systemd_passwd to send syslog messages - Remove corenet_all_recvfrom_unlabeled() calling fro policy files - Allow editparams.cgi running as httpd_bugzilla_script_t to read /etc/group - Allow smbd to read cluster config - Add additional labeling for passenger - Allow dbus to inhibit suspend via systemd - Allow avahi to send signull to systemd_login- Add interface to dontaudit getattr access on sysctls - Allow sshd to execute /bin/login - Looks like xdm is recreating the xdm directory in ~/.cache/ on login - Allow syslog to use the leaked kernel_t unix_dgram_socket from system-jounald - Fix semanage to work with unconfined domain disabled on F18 - Dontaudit attempts by mozilla plugins to getattr on all kernel sysctls - Virt seems to be using lock files - Dovecot seems to be searching directories of every mountpoint - Allow jockey to read random/urandom, execute shell and install third-party drivers - Add aditional params to allow cachedfiles to manage its content - gpg agent needs to read /dev/random - The kernel hands an svirt domains /SYSxxxxx which is a tmpfs that httpd wants to read and write - Add a bunch of dontaudit rules to quiet svirt_lxc domains - Additional perms needed to run svirt_lxc domains - Allow cgclear to read cgconfig - Allow sys_ptrace capability for snmp - Allow freshclam to read /proc - Allow procmail to manage /home/user/Maildir content - Allow NM to execute wpa_cli - Allow amavis to read clamd system state - Regenerate man pages- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Add realmd and stapserver policies - Allow useradd to manage stap-server lib files - Tighten up capabilities for confined users - Label /etc/security/opasswd as shadow_t - Add label for /dev/ecryptfs - Allow condor_startd_t to start sshd with the ranged - Allow lpstat.cups to read fips_enabled file - Allow pyzor running as spamc_t to create /root/.pyzor directory - Add labelinf for amavisd-snmp init script - Add support for amavisd-snmp - Allow fprintd sigkill self - Allow xend (w/o libvirt) to start virtual machines - Allow aiccu to read /etc/passwd - Allow condor_startd to Make specified domain MCS trusted for setting any category set for the processes it executes - Add condor_startd_ranged_domtrans_to() interface - Add ssd_conf_t for /etc/sssd - accountsd needs to fchown some files/directories - Add ICACLient and zibrauserdata as mozilla_filetrans_home_content - SELinux reports afs_t needs dac_override to read /etc/mtab, even though everything works, adding dontaudit - Allow xend_t to read the /etc/passwd file- Until we figure out how to fix systemd issues, allow all apps that send syslog messages to send them to kernel_t - Add init_access_check() interface - Fix label on /usr/bin/pingus to not be labeled as ping_exec_t - Allow tcpdump to create a netlink_socket - Label newusers like useradd - Change xdm log files to be labeled xdm_log_t - Allow sshd_t with privsep to work in MLS - Allow freshclam to update databases thru HTTP proxy - Allow s-m-config to access check on systemd - Allow abrt to read public files by default - Fix amavis_create_pid_files() interface - Add labeling and filename transition for dbomatic.log - Allow system_dbusd_t to stream connect to bluetooth, and use its socket - Allow amavisd to execute fsav - Allow tuned to use sys_admin and sys_nice capabilities - Add php-fpm policy from Bryan - Add labeling for aeolus-configserver-thinwrapper - Allow thin domains to execute shell - Fix gnome_role_gkeyringd() interface description - Lot of interface fixes - Allow OpenMPI job running as condor_startd_ssh_t to manage condor lib files - Allow OpenMPI job to use kerberos - Make deltacloudd_t as nsswitch_domain - Allow xend_t to run lsscsi - Allow qemu-dm running as xend_t to create tun_socket - Add labeling for /opt/brother/Printers(.*/)?inf - Allow jockey-backend to read pyconfig-64.h labeled as usr_t - Fix clamscan_can_scan_system boolean - Allow lpr to connectto to /run/user/$USER/keyring-22uREb/pkcs11- initrc is calling exportfs which is not confined so it attempts to read nfsd_files - Fixes for passenger running within openshift. - Add labeling for all tomcat6 dirs - Add support for tomcat6 - Allow cobblerd to read /etc/passwd - Allow jockey to read sysfs and and execute binaries with bin_t - Allow thum to use user terminals - Allow cgclear to read cgconfig config files - Fix bcf2g.fc - Remove sysnet_dns_name_resolve() from policies where auth_use_nsswitch() is used for other domains - Allow dbomatic to execute ruby - abrt_watch_log should be abrt_domain - Allow mozilla_plugin to connect to gatekeeper port- add ptrace_child access to process - remove files_read_etc_files() calling from all policies which have auth_use_nsswith() - Allow boinc domains to manage boinc_lib_t lnk_files - Add support for boinc-client.service unit file - Add support for boinc.log - Allow mozilla_plugin execmod on mozilla home files if allow_ex - Allow dovecot_deliver_t to read dovecot_var_run_t - Allow ldconfig and insmod to manage kdumpctl tmp files - Move thin policy out from cloudform.pp and add a new thin poli - pacemaker needs to communicate with corosync streams - abrt is now started on demand by dbus - Allow certmonger to talk directly to Dogtag servers - Change labeling for /var/lib/cobbler/webui_sessions to httpd_c - Allow mozila_plugin to execute gstreamer home files - Allow useradd to delete all file types stored in the users hom - rhsmcertd reads the rpm database - Add support for lightdm- Add tomcat policy - Remove pyzor/razor policy - rhsmcertd reads the rpm database - Dontaudit thumb to setattr on xdm_tmp dir - Allow wicd to execute ldconfig in the networkmanager_t domain - Add /var/run/cherokee\.pid labeling - Allow mozilla_plugin to create mozilla_plugin_tmp_t lnk files too - Allow postfix-master to r/w pipes other postfix domains - Allow snort to create netlink_socket - Add kdumpctl policy - Allow firstboot to create tmp_t files/directories - /usr/bin/paster should not be labeled as piranha_exec_t - remove initrc_domain from tomcat - Allow ddclient to read /etc/passwd - Allow useradd to delete all file types stored in the users homedir - Allow ldconfig and insmod to manage kdumpctl tmp files - Firstboot should be just creating tmp_t dirs and xauth should be allowed to write to those - Transition xauth files within firstboot_tmp_t - Fix labeling of /run/media to match /media - Label all lxdm.log as xserver_log_t - Add port definition for mxi port - Allow local_login_t to execute tmux- apcupsd needs to read /etc/passwd - Sanlock allso sends sigkill - Allow glance_registry to connect to the mysqld port - Dontaudit mozilla_plugin trying to getattr on /dev/gpmctl - Allow firefox plugins/flash to connect to port 1234 - Allow mozilla plugins to delete user_tmp_t files - Add transition name rule for printers.conf.O - Allow virt_lxc_t to read urand - Allow systemd_loigind to list gstreamer_home_dirs - Fix labeling for /usr/bin - Fixes for cloudform services * support FIPS - Allow polipo to work as web caching - Allow chfn to execute tmux- Add support for ecryptfs * ecryptfs does not support xattr * we need labeling for HOMEDIR - Add policy for (u)mount.ecryptfs* - Fix labeling of kerbero host cache files, allow rpc.svcgssd to manage host cache - Allow dovecot to manage Maildir content, fix transitions to Maildir - Allow postfix_local to transition to dovecot_deliver - Dontaudit attempts to setattr on xdm_tmp_t, looks like bogus code - Cleanup interface definitions - Allow apmd to change with the logind daemon - Changes required for sanlock in rhel6 - Label /run/user/apache as httpd_tmp_t - Allow thumb to use lib_t as execmod if boolean turned on - Allow squid to create the squid directory in /var with the correct labe - Add a new policy for glusterd from Bryan Bickford (bbickfor@redhat.com) - Allow virtd to exec xend_exec_t without transition - Allow virtd_lxc_t to unmount all file systems- PolicyKit path has changed - Allow httpd connect to dirsrv socket - Allow tuned to write generic kernel sysctls - Dontaudit logwatch to gettr on /dev/dm-2 - Allow policykit-auth to manage kerberos files - Make condor_startd and rgmanager as initrc domain - Allow virsh to read /etc/passwd - Allow mount to mount on user_tmp_t for /run/user/dwalsh/gvfs - xdm now needs to execute xsession_exec_t - Need labels for /var/lib/gdm - Fix files_filetrans_named_content() interface - Add new attribute - initrc_domain - Allow systemd_logind_t to signal, signull, sigkill all processes - Add filetrans rules for etc_runtime files- Rename boolean names to remove allow_- Mass merge with upstream * new policy topology to include contrib policy modules * we have now two base policy patches- Fix description of authlogin_nsswitch_use_ldap - Fix transition rule for rhsmcertd_t needed for RHEL7 - Allow useradd to list nfs state data - Allow openvpn to manage its log file and directory - We want vdsm to transition to mount_t when executing mount command to make sure /etc/mtab remains labeled correctly - Allow thumb to use nvidia devices - Allow local_login to create user_tmp_t files for kerberos - Pulseaudio needs to read systemd_login /var/run content - virt should only transition named system_conf_t config files - Allow munin to execute its plugins - Allow nagios system plugin to read /etc/passwd - Allow plugin to connect to soundd port - Fix httpd_passwd to be able to ask passwords - Radius servers can use ldap for backing store - Seems to need to mount on /var/lib for xguest polyinstatiation to work. - Allow systemd_logind to list the contents of gnome keyring - VirtualGL need xdm to be able to manage content in /etc/opt/VirtualGL - Add policy for isns-utils- Add policy for subversion daemon - Allow boinc to read passwd - Allow pads to read kernel network state - Fix man2html interface for sepolgen-ifgen - Remove extra /usr/lib/systemd/system/smb - Remove all /lib/systemd and replace with /usr/lib/systemd - Add policy for man2html - Fix the label of kerberos_home_t to krb5_home_t - Allow mozilla plugins to use Citrix - Allow tuned to read /proc/sys/kernel/nmi_watchdog - Allow tune /sys options via systemd's tmpfiles.d "w" type- Dontaudit lpr_t to read/write leaked mozilla tmp files - Add file name transition for .grl-podcasts directory - Allow corosync to read user tmp files - Allow fenced to create snmp lib dirs/files - More fixes for sge policy - Allow mozilla_plugin_t to execute any application - Allow dbus to read/write any open file descriptors to any non security file on the system that it inherits to that it can pass them to another domain - Allow mongod to read system state information - Fix wrong type, we should dontaudit sys_admin for xdm_t not xserver_t - Allow polipo to manage polipo_cache dirs - Add jabbar_client port to mozilla_plugin_t - Cleanup procmail policy - system bus will pass around open file descriptors on files that do not have labels on them - Allow l2tpd_t to read system state - Allow tuned to run ls /dev - Allow sudo domains to read usr_t files - Add label to machine-id - Fix corecmd_read_bin_symlinks cut and paste error- Fix pulseaudio port definition - Add labeling for condor_starter - Allow chfn_t to creat user_tmp_files - Allow chfn_t to execute bin_t - Allow prelink_cron_system_t to getpw calls - Allow sudo domains to manage kerberos rcache files - Allow user_mail_domains to work with courie - Port definitions necessary for running jboss apps within openshift - Add support for openstack-nova-metadata-api - Add support for nova-console* - Add support for openstack-nova-xvpvncproxy - Fixes to make privsep+SELinux working if we try to use chage to change passwd - Fix auth_role() interface - Allow numad to read sysfs - Allow matahari-rpcd to execute shell - Add label for ~/.spicec - xdm is executing lspci as root which is requesting a sys_admin priv but seems to succeed without it - Devicekit_disk wants to read the logind sessions file when writing a cd - Add fixes for condor to make condor jobs working correctly - Change label of /var/log/rpmpkgs to cron_log_t - Access requires to allow systemd-tmpfiles --create to work. - Fix obex to be a user application started by the session bus. - Add additional filename trans rules for kerberos - Fix /var/run/heartbeat labeling - Allow apps that are managing rcache to file trans correctly - Allow openvpn to authenticate against ldap server - Containers need to listen to network starting and stopping events- Make systemd unit files less specific- Fix zarafa labeling - Allow guest_t to fix labeling - corenet_tcp_bind_all_unreserved_ports(ssh_t) should be called with the user_tcp_server boolean - add lxc_contexts - Allow accountsd to read /proc - Allow restorecond to getattr on all file sytems - tmpwatch now calls getpw - Allow apache daemon to transition to pwauth domain - Label content under /var/run/user/NAME/keyring* as gkeyringd_tmp_t - The obex socket seems to be a stream socket - dd label for /var/run/nologin- Allow jetty running as httpd_t to read hugetlbfs files - Allow sys_nice and setsched for rhsmcertd - Dontaudit attempts by mozilla_plugin_t to bind to ssdp ports - Allow setfiles to append to xdm_tmp_t - Add labeling for /export as a usr_t directory - Add labels for .grl files created by gstreamer- Add labeling for /usr/share/jetty/bin/jetty.sh - Add jetty policy which contains file type definitios - Allow jockey to use its own fifo_file and make this the default for all domains - Allow mozilla_plugins to use spice (vnc_port/couchdb) - asterisk wants to read the network state - Blueman now uses /var/lib/blueman- Add label for nodejs_debug - Allow mozilla_plugin_t to create ~/.pki directory and content- Add clamscan_can_scan_system boolean - Allow mysqld to read kernel network state - Allow sshd to read/write condor lib files - Allow sshd to read/write condor-startd tcp socket - Fix description on httpd_graceful_shutdown - Allow glance_registry to communicate with mysql - dbus_system_domain is using systemd to lauch applications - add interfaces to allow domains to send kill signals to user mail agents - Remove unnessary access for svirt_lxc domains, add privs for virtd_lxc_t - Lots of new access required for secure containers - Corosync needs sys_admin capability - ALlow colord to create shm - .orc should be allowed to be created by any app that can create gstream home content, thumb_t to be specific - Add boolean to control whether or not mozilla plugins can create random content in the users homedir - Add new interface to allow domains to list msyql_db directories, needed for libra - shutdown has to be allowed to delete etc_runtime_t - Fail2ban needs to read /etc/passwd - Allow ldconfig to create /var/cache/ldconfig - Allow tgtd to read hardware state information - Allow collectd to create packet socket - Allow chronyd to send signal to itself - Allow collectd to read /dev/random - Allow collectd to send signal to itself - firewalld needs to execute restorecon - Allow restorecon and other login domains to execute restorecon- Allow logrotate to getattr on systemd unit files - Add support for tor systemd unit file - Allow apmd to create /var/run/pm-utils with the correct label - Allow l2tpd to send sigkill to pppd - Allow pppd to stream connect to l2tpd - Add label for scripts in /etc/gdm/ - Allow systemd_logind_t to ignore mcs constraints on sigkill - Fix files_filetrans_system_conf_named_files() interface - Add labels for /usr/share/wordpress/wp-includes/*.php - Allow cobbler to get SELinux mode and booleans- Add unconfined_execmem_exec_t as an alias to bin_t - Allow fenced to read snmp var lib files, also allow it to read usr_t - ontaudit access checks on all executables from mozilla_plugin - Allow all user domains to setexec, so that sshd will work properly if it call setexec(NULL) while running withing a user mode - Allow systemd_tmpfiles_t to getattr all pipes and sockets - Allow glance-registry to send system log messages - semanage needs to manage mock lib files/dirs- Add policy for abrt-watch-log - Add definitions for jboss_messaging ports - Allow systemd_tmpfiles to manage printer devices - Allow oddjob to use nsswitch - Fix labeling of log files for postgresql - Allow mozilla_plugin_t to execmem and execstack by default - Allow firewalld to execute shell - Fix /etc/wicd content files to get created with the correct label - Allow mcelog to exec shell - Add ~/.orc as a gstreamer_home_t - /var/spool/postfix/lib64 should be labeled lib_t - mpreaper should be able to list all file system labeled directories - Add support for apache to use openstack - Add labeling for /etc/zipl.conf and zipl binary - Turn on allow_execstack and turn off telepathy transition for final release- More access required for virt_qmf_t - Additional assess required for systemd-logind to support multi-seat - Allow mozilla_plugin to setrlimit - Revert changes to fuse file system to stop deadlock- Allow condor domains to connect to ephemeral ports - More fixes for condor policy - Allow keystone to stream connect to mysqld - Allow mozilla_plugin_t to read generic USB device to support GPS devices - Allow thum to file name transition gstreamer home content - Allow thum to read all non security files - Allow glance_api_t to connect to ephemeral ports - Allow nagios plugins to read /dev/urandom - Allow syslogd to search postfix spool to support postfix chroot env - Fix labeling for /var/spool/postfix/dev - Allow wdmd chown - Label .esd_auth as pulseaudio_home_t - Have no idea why keyring tries to write to /run/user/dwalsh/dconf/user, but we can dontaudit for now- Add support for clamd+systemd - Allow fresclam to execute systemctl to handle clamd - Change labeling for /usr/sbin/rpc.ypasswd.env - Allow yppaswd_t to execute yppaswd_exec_t - Allow yppaswd_t to read /etc/passwd - Gnomekeyring socket has been moved to /run/user/USER/ - Allow samba-net to connect to ldap port - Allow signal for vhostmd - allow mozilla_plugin_t to read user_home_t socket - New access required for secure Linux Containers - zfs now supports xattrs - Allow quantum to execute sudo and list sysfs - Allow init to dbus chat with the firewalld - Allow zebra to read /etc/passwd- Allow svirt_t to create content in the users homedir under ~/.libvirt - Fix label on /var/lib/heartbeat - Allow systemd_logind_t to send kill signals to all processes started by a user - Fuse now supports Xattr Support- upowered needs to setsched on the kernel - Allow mpd_t to manage log files - Allow xdm_t to create /var/run/systemd/multi-session-x - Add rules for missedfont.log to be used by thumb.fc - Additional access required for virt_qmf_t - Allow dhclient to dbus chat with the firewalld - Add label for lvmetad - Allow systemd_logind_t to remove userdomain sock_files - Allow cups to execute usr_t files - Fix labeling on nvidia shared libraries - wdmd_t needs access to sssd and /etc/passwd - Add boolean to allow ftp servers to run in passive mode - Allow namepspace_init_t to relabelto/from a different user system_u from the user the namespace_init running with - Fix using httpd_use_fusefs - Allow chrome_sandbox_nacl to write inherited user tmp files as we allow it for chrome_sandbox- Rename rdate port to time port, and allow gnomeclock to connect to it - We no longer need to transition to ldconfig from rpm, rpm_script, or anaconda - /etc/auto.* should be labeled bin_t - Add httpd_use_fusefs boolean - Add fixes for heartbeat - Allow sshd_t to signal processes that it transitions to - Add condor policy - Allow svirt to create monitors in ~/.libvirt - Allow dovecot to domtrans sendmail to handle sieve scripts - Lot of fixes for cfengine- /var/run/postmaster.* labeling is no longer needed - Alllow drbdadmin to read /dev/urandom - l2tpd_t seems to use ptmx - group+ and passwd+ should be labeled as /etc/passwd - Zarafa-indexer is a socket- Ensure lastlog is labeled correctly - Allow accountsd to read /proc data about gdm - Add fixes for tuned - Add bcfg2 fixes which were discovered during RHEL6 testing - More fixes for gnome-keyring socket being moved - Run semanage as a unconfined domain, and allow initrc_t to create tmpfs_t sym links on shutdown - Fix description for files_dontaudit_read_security_files() interface- Add new policy and man page for bcfg2 - cgconfig needs to use getpw calls - Allow domains that communicate with the keyring to use cache_home_t instead of gkeyringd_tmpt - gnome-keyring wants to create a directory in cache_home_t - sanlock calls getpw- Add numad policy and numad man page - Add fixes for interface bugs discovered by SEWatch - Add /tmp support for squid - Add fix for #799102 * change default labeling for /var/run/slapd.* sockets - Make thumb_t as userdom_home_reader - label /var/lib/sss/mc same as pubconf, so getpw domains can read it - Allow smbspool running as cups_t to stream connect to nmbd - accounts needs to be able to execute passwd on behalf of users - Allow systemd_tmpfiles_t to delete boot flags - Allow dnssec_trigger to connect to apache ports - Allow gnome keyring to create sock_files in ~/.cache - google_authenticator is using .google_authenticator - sandbox running from within firefox is exposing more leaks - Dontaudit thumb to read/write /dev/card0 - Dontaudit getattr on init_exec_t for gnomeclock_t - Allow certmonger to do a transition to certmonger_unconfined_t - Allow dhcpc setsched which is caused by nmcli - Add rpm_exec_t for /usr/sbin/bcfg2 - system cronjobs are sending dbus messages to systemd_logind - Thumnailers read /dev/urand- Allow auditctl getcap - Allow vdagent to use libsystemd-login - Allow abrt-dump-oops to search /etc/abrt - Got these avc's while trying to print a boarding pass from firefox - Devicekit is now putting the media directory under /run/media - Allow thumbnailers to create content in ~/.thumbails directory - Add support for proL2TPd by Dominick Grift - Allow all domains to call getcap - wdmd seems to get a random chown capability check that it does not need - Allow vhostmd to read kernel sysctls- Allow chronyd to read unix - Allow hpfax to read /etc/passwd - Add support matahari vios-proxy-* apps and add virtd_exec_t label for them - Allow rpcd to read quota_db_t - Update to man pages to match latest policy - Fix bug in jockey interface for sepolgen-ifgen - Add initial svirt_prot_exec_t policy- More fixes for systemd from Dan Walsh- Add a new type for /etc/firewalld and allow firewalld to write to this directory - Add definition for ~/Maildir, and allow mail deliver domains to write there - Allow polipo to run from a cron job - Allow rtkit to schedule wine processes - Allow mozilla_plugin_t to acquire a bug, and allow it to transition gnome content in the home dir to the proper label - Allow users domains to send signals to consolehelper domains- More fixes for boinc policy - Allow polipo domain to create its own cache dir and pid file - Add systemctl support to httpd domain - Add systemctl support to polipo, allow NetworkManager to manage the service - Add policy for jockey-backend - Add support for motion daemon which is now covered by zoneminder policy - Allow colord to read/write motion tmpfs - Allow vnstat to search through var_lib_t directories - Stop transitioning to quota_t, from init an sysadm_t- Add svirt_lxc_file_t as a customizable type- Add additional fixes for icmp nagios plugin - Allow cron jobs to open fifo_files from cron, since service script opens /dev/stdin - Add certmonger_unconfined_exec_t - Make sure tap22 device is created with the correct label - Allow staff users to read systemd unit files - Merge in previously built policy - Arpwatch needs to be able to start netlink sockets in order to start - Allow cgred_t to sys_ptrace to look at other DAC Processes- Back port some of the access that was allowed in nsplugin_t - Add definitiona for couchdb ports - Allow nagios to use inherited users ttys - Add git support for mock - Allow inetd to use rdate port - Add own type for rdate port - Allow samba to act as a portmapper - Dontaudit chrome_sandbox attempts to getattr on chr_files in /dev - New fixes needed for samba4 - Allow apps that use lib_t to read lib_t symlinks- Add policy for nove-cert - Add labeling for nova-openstack systemd unit files - Add policy for keystoke- Fix man pages fro domains - Add man pages for SELinux users and roles - Add storage_dev_filetrans_named_fixed_disk() and use it for smartmon - Add policy for matahari-rpcd - nfsd executes mount command on restart - Matahari domains execute renice and setsched - Dontaudit leaked tty in mozilla_plugin_config - mailman is changing to a per instance naming - Add 7600 and 4447 as jboss_management ports - Add fixes for nagios event handlers - Label httpd.event as httpd_exec_t, it is an apache daemon- Add labeling for /var/spool/postfix/dev/log - NM reads sysctl.conf - Iscsi log file context specification fix - Allow mozilla plugins to send dbus messages to user domains that transition to it - Allow mysql to read the passwd file - Allow mozilla_plugin_t to create mozilla home dirs in user homedir - Allow deltacloud to read kernel sysctl - Allow postgresql_t to connectto itselfAllow postgresql_t to connectto itself - Allow postgresql_t to connectto itself - Add login_userdomain attribute for users which can log in using terminal- Allow sysadm_u to reach system_r by default #784011 - Allow nagios plugins to use inherited user terminals - Razor labeling is not used no longer - Add systemd support for matahari - Add port_types to man page, move booleans to the top, fix some english - Add support for matahari-sysconfig-console - Clean up matahari.fc - Fix matahari_admin() interfac - Add labels for/etc/ssh/ssh_host_*.pub keys- Allow ksysguardproces to send system log msgs - Allow boinc setpgid and signull - Allow xdm_t to sys_ptrace to run pidof command - Allow smtpd_t to manage spool files/directories and symbolic links - Add labeling for jetty - Needed changes to get unbound/dnssec to work with openswan- Add user_fonts_t alias xfs_tmp_t - Since depmod now runs as insmod_t we need to write to kernel_object_t - Allow firewalld to dbus chat with networkmanager - Allow qpidd to connect to matahari ports - policykit needs to read /proc for uses not owned by it - Allow systemctl apps to connecto the init stream- Turn on deny_ptrace boolean- Remove pam_selinux.8 man page. There was a conflict.- Add proxy class and read access for gssd_proxy - Separate out the sharing public content booleans - Allow certmonger to execute a script and send signals to apache and dirsrv to reload the certificate - Add label transition for gstream-0.10 and 12 - Add booleans to allow rsync to share nfs and cifs file sytems - chrome_sandbox wants to read the /proc/PID/exe file of the program that executed it - Fix filename transitions for cups files - Allow denyhosts to read "unix" - Add file name transition for locale.conf.new - Allow boinc projects to gconf config files - sssd needs to be able to increase the socket limit under certain loads - sge_execd needs to read /etc/passwd - Allow denyhost to check network state - NetworkManager needs to read sessions data - Allow denyhost to check network state - Allow xen to search virt images directories - Add label for /dev/megaraid_sas_ioctl_node - Add autogenerated man pages- Allow boinc project to getattr on fs - Allow init to execute initrc_state_t - rhev-agent package was rename to ovirt-guest-agent - If initrc_t creates /etc/local.conf then we need to make sure it is labeled correctly - sytemd writes content to /run/initramfs and executes it on shutdown - kdump_t needs to read /etc/mtab, should be back ported to F16 - udev needs to load kernel modules in early system boot- Need to add sys_ptrace back in since reading any content in /proc can cause these accesses - Add additional systemd interfaces which are needed fro *_admin interfaces - Fix bind_admin() interface- Allow firewalld to read urand - Alias java, execmem_mono to bin_t to allow third parties - Add label for kmod - /etc/redhat-lsb contains binaries - Add boolean to allow gitosis to send mail - Add filename transition also for "event20" - Allow systemd_tmpfiles_t to delete all file types - Allow collectd to ipc_lock- make consoletype_exec optional, so we can remove consoletype policy - remove unconfined_permisive.patch - Allow openvpn_t to inherit user home content and tmp content - Fix dnssec-trigger labeling - Turn on obex policy for staff_t - Pem files should not be secret - Add lots of rules to fix AVC's when playing with containers - Fix policy for dnssec - Label ask-passwd directories correctly for systemd- sshd fixes seem to be causing unconfined domains to dyntrans to themselves - fuse file system is now being mounted in /run/user - systemd_logind is sending signals to processes that are dbus messaging with it - Add support for winshadow port and allow iscsid to connect to this port - httpd should be allowed to bind to the http_port_t udp socket - zarafa_var_lib_t can be a lnk_file - A couple of new .xsession-errors files - Seems like user space and login programs need to read logind_sessions_files - Devicekit disk seems to be being launched by systemd - Cleanup handling of setfiles so most of rules in te file - Correct port number for dnssec - logcheck has the home dir set to its cache- Add policy for grindengine MPI jobs- Add new sysadm_secadm.pp module * contains secadm definition for sysadm_t - Move user_mail_domain access out of the interface into the te file - Allow httpd_t to create httpd_var_lib_t directories as well as files - Allow snmpd to connect to the ricci_modcluster stream - Allow firewalld to read /etc/passwd - Add auth_use_nsswitch for colord - Allow smartd to read network state - smartdnotify needs to read /etc/group- Allow gpg and gpg_agent to store sock_file in gpg_secret_t directory - lxdm startup scripts should be labeled bin_t, so confined users will work - mcstransd now creates a pid, needs back port to F16 - qpidd should be allowed to connect to the amqp port - Label devices 010-029 as usb devices - ypserv packager says ypserv does not use tmp_t so removing selinux policy types - Remove all ptrace commands that I believe are caused by the kernel/ps avcs - Add initial Obex policy - Add logging_syslogd_use_tty boolean - Add polipo_connect_all_unreserved bolean - Allow zabbix to connect to ftp port - Allow systemd-logind to be able to switch VTs - Allow apache to communicate with memcached through a sock_file- Fix file_context.subs_dist for now to work with pre usrmove- More /usr move fixes- Add zabbix_can_network boolean - Add httpd_can_connect_zabbix boolean - Prepare file context labeling for usrmove functions - Allow system cronjobs to read kernel network state - Add support for selinux_avcstat munin plugin - Treat hearbeat with corosync policy - Allow corosync to read and write to qpidd shared mem - mozilla_plugin is trying to run pulseaudio - Fixes for new sshd patch for running priv sep domains as the users context - Turn off dontaudit rules when turning on allow_ypbind - udev now reads /etc/modules.d directory- Turn on deny_ptrace boolean for the Rawhide run, so we can test this out - Cups exchanges dbus messages with init - udisk2 needs to send syslog messages - certwatch needs to read /etc/passwd- Add labeling for udisks2 - Allow fsadmin to communicate with the systemd process- Treat Bip with bitlbee policy * Bip is an IRC proxy - Add port definition for interwise port - Add support for ipa_memcached socket - systemd_jounald needs to getattr on all processes - mdadmin fixes * uses getpw - amavisd calls getpwnam() - denyhosts calls getpwall()- Setup labeling of /var/rsa and /var/lib/rsa to allow login programs to write there - bluetooth says they do not use /tmp and want to remove the type - Allow init to transition to colord - Mongod needs to read /proc/sys/vm/zone_reclaim_mode - Allow postfix_smtpd_t to connect to spamd - Add boolean to allow ftp to connect to all ports > 1023 - Allow sendmain to write to inherited dovecot tmp files - setroubleshoot needs to be able to execute rpm to see what version of packages- Merge systemd patch - systemd-tmpfiles wants to relabel /sys/devices/system/cpu/online - Allow deltacloudd dac_override, setuid, setgid caps - Allow aisexec to execute shell - Add use_nfs_home_dirs boolean for ssh-keygen- Fixes to make rawhide boot in enforcing mode with latest systemd changes- Add labeling for /var/run/systemd/journal/syslog - libvirt sends signals to ifconfig - Allow domains that read logind session files to list them- Fixed destined form libvirt-sandbox - Allow apps that list sysfs to also read sympolicy links in this filesystem - Add ubac_constrained rules for chrome_sandbox - Need interface to allow domains to use tmpfs_t files created by the kernel, used by libra - Allow postgresql to be executed by the caller - Standardize interfaces of daemons - Add new labeling for mm-handler - Allow all matahari domains to read network state and etc_runtime_t files- New fix for seunshare, requires seunshare_domains to be able to mounton / - Allow systemctl running as logrotate_t to connect to private systemd socket - Allow tmpwatch to read meminfo - Allow rpc.svcgssd to read supported_krb5_enctype - Allow zarafa domains to read /dev/random and /dev/urandom - Allow snmpd to read dev_snmp6 - Allow procmail to talk with cyrus - Add fixes for check_disk and check_nagios plugins- default trans rules for Rawhide policy - Make sure sound_devices controlC* are labeled correctly on creation - sssd now needs sys_admin - Allow snmp to read all proc_type - Allow to setup users homedir with quota.group- Add httpd_can_connect_ldap() interface - apcupsd_t needs to use seriel ports connected to usb devices - Kde puts procmail mail directory under ~/.local/share - nfsd_t can trigger sys_rawio on tests that involve too many mountpoints, dontaudit for now - Add labeling for /sbin/iscsiuio- Add label for /var/lib/iscan/interpreter - Dont audit writes to leaked file descriptors or redirected output for nacl - NetworkManager needs to write to /sys/class/net/ib*/mode- Allow abrt to request the kernel to load a module - Make sure mozilla content is labeled correctly - Allow tgtd to read system state - More fixes for boinc * allow to resolve dns name * re-write boinc policy to use boinc_domain attribute - Allow munin services plugins to use NSCD services- Allow mozilla_plugin_t to manage mozilla_home_t - Allow ssh derived domain to execute ssh-keygen in the ssh_keygen_t domain - Add label for tumblerd- Fixes for xguest package- Fixes related to /bin, /sbin - Allow abrt to getattr on blk files - Add type for rhev-agent log file - Fix labeling for /dev/dmfm - Dontaudit wicd leaking - Allow systemd_logind_t to look at process info of apps that exchange dbus messages with it - Label /etc/locale.conf correctly - Allow user_mail_t to read /dev/random - Allow postfix-smtpd to read MIMEDefang - Add label for /var/log/suphp.log - Allow swat_t to connect and read/write nmbd_t sock_file - Allow systemd-tmpfiles to setattr for /run/user/gdm/dconf - Allow systemd-tmpfiles to change user identity in object contexts - More fixes for rhev_agentd_t consolehelper policy- Use fs_use_xattr for squashf - Fix procs_type interface - Dovecot has a new fifo_file /var/run/dovecot/stats-mail - Dovecot has a new fifo_file /var/run/stats-mail - Colord does not need to connect to network - Allow system_cronjob to dbus chat with NetworkManager - Puppet manages content, want to make sure it labels everything correctly- Change port 9050 to tor_socks_port_t and then allow openvpn to connect to it - Allow all postfix domains to use the fifo_file - Allow sshd_t to getattr on all file systems in order to generate avc on nfs_t - Allow apmd_t to read grub.cfg - Let firewallgui read the selinux config - Allow systemd-tmpfiles to delete content in /root that has been moved to /tmp - Fix devicekit_manage_pid_files() interface - Allow squid to check the network state - Dontaudit colord getattr on file systems - Allow ping domains to read zabbix_tmp_t files- Allow mcelog_t to create dir and file in /var/run and label it correctly - Allow dbus to manage fusefs - Mount needs to read process state when mounting gluster file systems - Allow collectd-web to read collectd lib files - Allow daemons and system processes started by init to read/write the unix_stream_socket passed in from as stdin/stdout/stderr - Allow colord to get the attributes of tmpfs filesystem - Add sanlock_use_nfs and sanlock_use_samba booleans - Add bin_t label for /usr/lib/virtualbox/VBoxManage- Add ssh_dontaudit_search_home_dir - Changes to allow namespace_init_t to work - Add interface to allow exec of mongod, add port definition for mongod port, 27017 - Label .kde/share/apps/networkmanagement/certificates/ as home_cert_t - Allow spamd and clamd to steam connect to each other - Add policy label for passwd.OLD - More fixes for postfix and postfix maildro - Add ftp support for mozilla plugins - Useradd now needs to manage policy since it calls libsemanage - Fix devicekit_manage_log_files() interface - Allow colord to execute ifconfig - Allow accountsd to read /sys - Allow mysqld-safe to execute shell - Allow openct to stream connect to pcscd - Add label for /var/run/nm-dns-dnsmasq\.conf - Allow networkmanager to chat with virtd_t- Pulseaudio changes - Merge patches- Merge patches back into git repository.- Remove allow_execmem boolean and replace with deny_execmem boolean- Turn back on allow_execmem boolean- Add more MCS fixes to make sandbox working - Make faillog MLS trusted to make sudo_$1_t working - Allow sandbox_web_client_t to read passwd_file_t - Add .mailrc file context - Remove execheap from openoffice domain - Allow chrome_sandbox_nacl_t to read cpu_info - Allow virtd to relabel generic usb which is need if USB device - Fixes for virt.if interfaces to consider chr_file as image file type- Remove Open Office policy - Remove execmem policy- MCS fixes - quota fixes- Remove transitions to consoletype- Make nvidia* to be labeled correctly - Fix abrt_manage_cache() interface - Make filetrans rules optional so base policy will build - Dontaudit chkpwd_t access to inherited TTYS - Make sure postfix content gets created with the correct label - Allow gnomeclock to read cgroup - Fixes for cloudform policy- Check in fixed for Chrome nacl support- Begin removing qemu_t domain, we really no longer need this domain. - systemd_passwd needs dac_overide to communicate with users TTY's - Allow svirt_lxc domains to send kill signals within their container- Remove qemu.pp again without causing a crash- Remove qemu.pp, everything should use svirt_t or stay in its current domain- Allow policykit to talk to the systemd via dbus - Move chrome_sandbox_nacl_t to permissive domains - Additional rules for chrome_sandbox_nacl- Change bootstrap name to nacl - Chrome still needs execmem - Missing role for chrome_sandbox_bootstrap - Add boolean to remove execmem and execstack from virtual machines - Dontaudit xdm_t doing an access_check on etc_t directories- Allow named to connect to dirsrv by default - add ldapmap1_0 as a krb5_host_rcache_t file - Google chrome developers asked me to add bootstrap policy for nacl stuff - Allow rhev_agentd_t to getattr on mountpoints - Postfix_smtpd_t needs access to milters and cleanup seems to read/write postfix_smtpd_t unix_stream_sockets- Fixes for cloudform policies which need to connect to random ports - Make sure if an admin creates modules content it creates them with the correct label - Add port 8953 as a dns port used by unbound - Fix file name transition for alsa and confined users- Turn on mock_t and thumb_t for unconfined domains- Policy update should not modify local contexts- Remove ada policy- Remove tzdata policy - Add labeling for udev - Add cloudform policy - Fixes for bootloader policy- Add policies for nova openstack- Add fixes for nova-stack policy- Allow svirt_lxc_domain to chr_file and blk_file devices if they are in the domain - Allow init process to setrlimit on itself - Take away transition rules for users executing ssh-keygen - Allow setroubleshoot_fixit_t to read /dev/urand - Allow sshd to relbale tunnel sockets - Allow fail2ban domtrans to shorewall in the same way as with iptables - Add support for lnk files in the /var/lib/sssd directory - Allow system mail to connect to courier-authdaemon over an unix stream socket- Add passwd_file_t for /etc/ptmptmp- Dontaudit access checks for all executables, gnome-shell is doing access(EXEC, X_OK) - Make corosync to be able to relabelto cluster lib fies - Allow samba domains to search /var/run/nmbd - Allow dirsrv to use pam - Allow thumb to call getuid - chrome less likely to get mmap_zero bug so removing dontaudit - gimp help-browser has built in javascript - Best guess is that devices named /dev/bsr4096 should be labeled as cpu_device_t - Re-write glance policy- Move dontaudit sys_ptrace line from permissive.te to domain.te - Remove policy for hal, it no longer exists- Don't check md5 size or mtime on certain config files- Remove allow_ptrace and replace it with deny_ptrace, which will remove all ptrace from the system - Remove 2000 dontaudit rules between confined domains on transition and replace with single dontaudit domain domain:process { noatsecure siginh rlimitinh } ;- Fixes for bootloader policy - $1_gkeyringd_t needs to read $HOME/%USER/.local/share/keystore - Allow nsplugin to read /usr/share/config - Allow sa-update to update rules - Add use_fusefs_home_dirs for chroot ssh option - Fixes for grub2 - Update systemd_exec_systemctl() interface - Allow gpg to read the mail spool - More fixes for sa-update running out of cron job - Allow ipsec_mgmt_t to read hardware state information - Allow pptp_t to connect to unreserved_port_t - Dontaudit getattr on initctl in /dev from chfn - Dontaudit getattr on kernel_core from chfn - Add systemd_list_unit_dirs to systemd_exec_systemctl call - Fixes for collectd policy - CHange sysadm_t to create content as user_tmp_t under /tmp- Shrink size of policy through use of attributes for userdomain and apache- Allow virsh to read xenstored pid file - Backport corenetwork fixes from upstream - Do not audit attempts by thumb to search config_home_t dirs (~/.config) - label ~/.cache/telepathy/logger telepathy_logger_cache_home_t - allow thumb to read generic data home files (mime.type)- Allow nmbd to manage sock file in /var/run/nmbd - ricci_modservice send syslog msgs - Stop transitioning from unconfined_t to ldconfig_t, but make sure /etc/ld.so.cache is labeled correctly - Allow systemd_logind_t to manage /run/USER/dconf/user- Fix missing patch from F16- Allow logrotate setuid and setgid since logrotate is supposed to do it - Fixes for thumb policy by grift - Add new nfsd ports - Added fix to allow confined apps to execmod on chrome - Add labeling for additional vdsm directories - Allow Exim and Dovecot SASL - Add label for /var/run/nmbd - Add fixes to make virsh and xen working together - Colord executes ls - /var/spool/cron is now labeled as user_cron_spool_t- Stop complaining about leaked file descriptors during install- Remove java and mono module and merge into execmem- Fixes for thumb policy and passwd_file_t- Fixes caused by the labeling of /etc/passwd - Add thumb.patch to transition unconfined_t to thumb_t for Rawhide- Add support for Clustered Samba commands - Allow ricci_modrpm_t to send log msgs - move permissive virt_qmf_t from virt.te to permissivedomains.te - Allow ssh_t to use kernel keyrings - Add policy for libvirt-qmf and more fixes for linux containers - Initial Polipo - Sanlock needs to run ranged in order to kill svirt processes - Allow smbcontrol to stream connect to ctdbd- Add label for /etc/passwd- Change unconfined_domains to permissive for Rawhide - Add definition for the ephemeral_ports- Make mta_role() active - Allow asterisk to connect to jabber client port - Allow procmail to read utmp - Add NIS support for systemd_logind_t - Allow systemd_logind_t to manage /run/user/$USER/dconf dir which is labeled as config_home_t - Fix systemd_manage_unit_dirs() interface - Allow ssh_t to manage directories passed into it - init needs to be able to create and delete unit file directories - Fix typo in apache_exec_sys_script - Add ability for logrotate to transition to awstat domain- Change screen to use screen_domain attribute and allow screen_domains to read all process domain state - Add SELinux support for ssh pre-auth net process in F17 - Add logging_syslogd_can_sendmail boolean- Add definition for ephemeral ports - Define user_tty_device_t as a customizable_type- Needs to require a new version of checkpolicy - Interface fixes- Allow sanlock to manage virt lib files - Add virt_use_sanlock booelan - ksmtuned is trying to resolve uids - Make sure .gvfs is labeled user_home_t in the users home directory - Sanlock sends kill signals and needs the kill capability - Allow mockbuild to work on nfs homedirs - Fix kerberos_manage_host_rcache() interface - Allow exim to read system state- Allow systemd-tmpfiles to set the correct labels on /var/run, /tmp and other files - We want any file type that is created in /tmp by a process running as initrc_t to be labeled initrc_tmp_t- Allow collectd to read hardware state information - Add loop_control_device_t - Allow mdadm to request kernel to load module - Allow domains that start other domains via systemctl to search unit dir - systemd_tmpfilses, needs to list any file systems mounted on /tmp - No one can explain why radius is listing the contents of /tmp, so we will dontaudit - If I can manage etc_runtime files, I should be able to read the links - Dontaudit hostname writing to mock library chr_files - Have gdm_t setup labeling correctly in users home dir - Label content unde /var/run/user/NAME/dconf as config_home_t - Allow sa-update to execute shell - Make ssh-keygen working with fips_enabled - Make mock work for staff_t user - Tighten security on mock_t- removing unconfined_notrans_t no longer necessary - Clean up handling of secure_mode_insmod and secure_mode_policyload - Remove unconfined_mount_t- Add exim_exec_t label for /usr/sbin/exim_tidydb - Call init_dontaudit_rw_stream_socket() interface in mta policy - sssd need to search /var/cache/krb5rcache directory - Allow corosync to relabel own tmp files - Allow zarafa domains to send system log messages - Allow ssh to do tunneling - Allow initrc scripts to sendto init_t unix_stream_socket - Changes to make sure dmsmasq and virt directories are labeled correctly - Changes needed to allow sysadm_t to manage systemd unit files - init is passing file descriptors to dbus and on to system daemons - Allow sulogin additional access Reported by dgrift and Jeremy Miller - Steve Grubb believes that wireshark does not need this access - Fix /var/run/initramfs to stop restorecon from looking at - pki needs another port - Add more labels for cluster scripts - Allow apps that manage cgroup_files to manage cgroup link files - Fix label on nfs-utils scripts directories - Allow gatherd to read /dev/rand and /dev/urand- pki needs another port - Add more labels for cluster scripts - Fix label on nfs-utils scripts directories - Fixes for cluster - Allow gatherd to read /dev/rand and /dev/urand - abrt leaks fifo files- Add glance policy - Allow mdadm setsched - /var/run/initramfs should not be relabeled with a restorecon run - memcache can be setup to override sys_resource - Allow httpd_t to read tetex data - Allow systemd_tmpfiles to delete kernel modules left in /tmp directory.- Allow Postfix to deliver to Dovecot LMTP socket - Ignore bogus sys_module for lldpad - Allow chrony and gpsd to send dgrams, gpsd needs to write to the real time clock - systemd_logind_t sets the attributes on usb devices - Allow hddtemp_t to read etc_t files - Add permissivedomains module - Move all permissive domains calls to permissivedomain.te - Allow pegasis to send kill signals to other UIDs- Allow insmod_t to use fds leaked from devicekit - dontaudit getattr between insmod_t and init_t unix_stream_sockets - Change sysctl unit file interfaces to use systemctl - Add support for chronyd unit file - Allow mozilla_plugin to read gnome_usr_config - Add policy for new gpsd - Allow cups to create kerberos rhost cache files - Add authlogin_filetrans_named_content, to unconfined_t to make sure shadow and other log files get labeled correctly- Make users_extra and seusers.final into config(noreplace) so semanage users and login does not get overwritten- Add policy for sa-update being run out of cron jobs - Add create perms to postgresql_manage_db - ntpd using a gps has to be able to read/write generic tty_device_t - If you disable unconfined and unconfineduser, rpm needs more privs to manage /dev - fix spec file - Remove qemu_domtrans_unconfined() interface - Make passenger working together with puppet - Add init_dontaudit_rw_stream_socket interface - Fixes for wordpress- Turn on allow_domain_fd_use boolean on F16 - Allow syslog to manage all log files - Add use_fusefs_home_dirs boolean for chrome - Make vdagent working with confined users - Add abrt_handle_event_t domain for ABRT event scripts - Labeled /usr/sbin/rhnreg_ks as rpm_exec_t and added changes related to this change - Allow httpd_git_script_t to read passwd data - Allow openvpn to set its process priority when the nice parameter is used- livecd fixes - spec file fixes- fetchmail can use kerberos - ksmtuned reads in shell programs - gnome_systemctl_t reads the process state of ntp - dnsmasq_t asks the kernel to load multiple kernel modules - Add rules for domains executing systemctl - Bogus text within fc file- Add cfengine policy- Add abrt_domain attribute - Allow corosync to manage cluster lib files - Allow corosync to connect to the system DBUS- Add sblim, uuidd policies - Allow kernel_t dyntrasition to init_t- init_t need setexec - More fixes of rules which cause an explosion in rules by Dan Walsh- Allow rcsmcertd to perform DNS name resolution - Add dirsrvadmin_unconfined_script_t domain type for 389-ds admin scripts - Allow tmux to run as screen - New policy for collectd - Allow gkeyring_t to interact with all user apps - Add rules to allow firstboot to run on machines with the unconfined.pp module removed- Allow systemd_logind to send dbus messages with users - allow accountsd to read wtmp file - Allow dhcpd to get and set capabilities- Fix oracledb_port definition - Allow mount to mounton the selinux file system - Allow users to list /var directories- systemd fixes- Add initial policy for abrt_dump_oops_t - xtables-multi wants to getattr of the proc fs - Smoltclient is connecting to abrt - Dontaudit leaked file descriptors to postdrop - Allow abrt_dump_oops to look at kernel sysctls - Abrt_dump_oops_t reads kernel ring buffer - Allow mysqld to request the kernel to load modules - systemd-login needs fowner - Allow postfix_cleanup_t to searh maildrop- Initial systemd_logind policy - Add policy for systemd_logger and additional proivs for systemd_logind - More fixes for systemd policies- Allow setsched for virsh - Systemd needs to impersonate cups, which means it needs to create tcp_sockets in cups_t domain, as well as manage spool directories - iptables: the various /sbin/ip6?tables.* are now symlinks for /sbin/xtables-multi- A lot of users are running yum -y update while in /root which is causing ldconfig to list the contents, adding dontaudit - Allow colord to interact with the users through the tmpfs file system - Since we changed the label on deferred, we need to allow postfix_qmgr_t to be able to create maildrop_t files - Add label for /var/log/mcelog - Allow asterisk to read /dev/random if it uses TLS - Allow colord to read ini files which are labeled as bin_t - Allow dirsrvadmin sys_resource and setrlimit to use ulimit - Systemd needs to be able to create sock_files for every label in /var/run directory, cupsd being the first. - Also lists /var and /var/spool directories - Add openl2tpd to l2tpd policy - qpidd is reading the sysfs file- Change usbmuxd_t to dontaudit attempts to read chr_file - Add mysld_safe_exec_t for libra domains to be able to start private mysql domains - Allow pppd to search /var/lock dir - Add rhsmcertd policy- Update to upstream- More fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git- Fix spec file to not report Verify errors- Add dspam policy - Add lldpad policy - dovecot auth wants to search statfs #713555 - Allow systemd passwd apps to read init fifo_file - Allow prelink to use inherited terminals - Run cherokee in the httpd_t domain - Allow mcs constraints on node connections - Implement pyicqt policy - Fixes for zarafa policy - Allow cobblerd to send syslog messages- Add policy.26 to the payload - Remove olpc stuff - Remove policygentool- Fixes for zabbix - init script needs to be able to manage sanlock_var_run_... - Allow sandlock and wdmd to create /var/run directories... - mixclip.so has been compiled correctly - Fix passenger policy module name- Add mailscanner policy from dgrift - Allow chrome to optionally be transitioned to - Zabbix needs these rules when starting the zabbix_server_mysql - Implement a type for freedesktop openicc standard (~/.local/share/icc) - Allow system_dbusd_t to read inherited icc_data_home_t files. - Allow colord_t to read icc_data_home_t content. #706975 - Label stuff under /usr/lib/debug as if it was labeled under /- Fixes for sanlock policy - Fixes for colord policy - Other fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log- Add rhev policy module to modules-targeted.conf- Lot of fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log- Allow logrotate to execute systemctl - Allow nsplugin_t to getattr on gpmctl - Fix dev_getattr_all_chr_files() interface - Allow shorewall to use inherited terms - Allow userhelper to getattr all chr_file devices - sandbox domains should be able to getattr and dontaudit search of sysctl_kernel_t - Fix labeling for ABRT Retrace Server- Dontaudit sys_module for ifconfig - Make telepathy and gkeyringd daemon working with confined users - colord wants to read files in users homedir - Remote login should be creating user_tmp_t not its own tmp files- Fix label for /usr/share/munin/plugins/munin_* plugins - Add support for zarafa-indexer - Fix boolean description - Allow colord to getattr on /proc/scsi/scsi - Add label for /lib/upstart/init - Colord needs to list /mnt- Forard port changes from F15 for telepathy - NetworkManager should be allowed to use /dev/rfkill - Fix dontaudit messages to say Domain to not audit - Allow telepathy domains to read/write gnome_cache files - Allow telepathy domains to call getpw - Fixes for colord and vnstatd policy- Allow init_t getcap and setcap - Allow namespace_init_t to use nsswitch - aisexec will execute corosync - colord tries to read files off noxattr file systems - Allow init_t getcap and setcap- Add support for ABRT retrace server - Allow user_t and staff_t access to generic scsi to handle locally plugged in scanners - Allow telepath_msn_t to read /proc/PARENT/cmdline - ftpd needs kill capability - Allow telepath_msn_t to connect to sip port - keyring daemon does not work on nfs homedirs - Allow $1_sudo_t to read default SELinux context - Add label for tgtd sock file in /var/run/ - Add apache_exec_rotatelogs interface - allow all zaraha domains to signal themselves, server writes to /tmp - Allow syslog to read the process state - Add label for /usr/lib/chromium-browser/chrome - Remove the telepathy transition from unconfined_t - Dontaudit sandbox domains trying to mounton sandbox_file_t, this is caused by fuse mounts - Allow initrc_t domain to manage abrt pid files - Add support for AEOLUS project - Virt_admin should be allowed to manage images and processes - Allow plymountd to send signals to init - Change labeling of fping6- Add filename transitions- Fixes for zarafa policy - Add support for AEOLUS project - Change labeling of fping6 - Allow plymountd to send signals to init - Allow initrc_t domain to manage abrt pid files - Virt_admin should be allowed to manage images and processes- xdm_t needs getsession for switch user - Every app that used to exec init is now execing systemdctl - Allow squid to manage krb5_host_rcache_t files - Allow foghorn to connect to agentx port - Fixes for colord policy- Add Dan's patch to remove 64 bit variants - Allow colord to use unix_dgram_socket - Allow apps that search pids to read /var/run if it is a lnk_file - iscsid_t creates its own directory - Allow init to list var_lock_t dir - apm needs to verify user accounts auth_use_nsswitch - Add labeling for systemd unit files - Allow gnomeclok to enable ntpd service using systemctl - systemd_systemctl_t domain was added - Add label for matahari-broker.pid file - We want to remove untrustedmcsprocess from ability to read /proc/pid - Fixes for matahari policy - Allow system_tmpfiles_t to delete user_home_t files in the /tmp dir - Allow sshd to transition to sysadm_t if ssh_sysadm_login is turned on- Fix typo- Add /var/run/lock /var/lock definition to file_contexts.subs - nslcd_t is looking for kerberos cc files - SSH_USE_STRONG_RNG is 1 which requires /dev/random - Fix auth_rw_faillog definition - Allow sysadm_t to set attributes on fixed disks - allow user domains to execute lsof and look at application sockets - prelink_cron job calls telinit -u if init is rewritten - Fixes to run qemu_t from staff_t- Fix label for /var/run/udev to udev_var_run_t - Mock needs to be able to read network state- Add file_contexts.subs to handle /run and /run/lock - Add other fixes relating to /run changes from F15 policy- Allow $1_sudo_t and $1_su_t open access to user terminals - Allow initrc_t to use generic terminals - Make Makefile/Rules.modular run sepolgen-ifgen during build to check if files for bugs -systemd is going to be useing /run and /run/lock for early bootup files. - Fix some comments in rlogin.if - Add policy for KDE backlighthelper - sssd needs to read ~/.k5login in nfs, cifs or fusefs file systems - sssd wants to read .k5login file in users homedir - setroubleshoot reads executables to see if they have TEXTREL - Add /var/spool/audit support for new version of audit - Remove kerberos_connect_524() interface calling - Combine kerberos_master_port_t and kerberos_port_t - systemd has setup /dev/kmsg as stderr for apps it executes - Need these access so that init can impersonate sockets on unix_dgram_socket- Remove some unconfined domains - Remove permissive domains - Add policy-term.patch from Dan- Fix multiple specification for boot.log - devicekit leaks file descriptors to setfiles_t - Change all all_nodes to generic_node and all_if to generic_if - Should not use deprecated interface - Switch from using all_nodes to generic_node and from all_if to generic_if - Add support for xfce4-notifyd - Fix file context to show several labels as SystemHigh - seunshare needs to be able to mounton nfs/cifs/fusefs homedirs - Add etc_runtime_t label for /etc/securetty - Fixes to allow xdm_t to start gkeyringd_USERTYPE_t directly - login.krb needs to be able to write user_tmp_t - dirsrv needs to bind to port 7390 for dogtag - Fix a bug in gpg policy - gpg sends audit messages - Allow qpid to manage matahari files- Initial policy for matahari - Add dev_read_watchdog - Allow clamd to connect clamd port - Add support for kcmdatetimehelper - Allow shutdown to setrlimit and sys_nice - Allow systemd_passwd to talk to /dev/log before udev or syslog is running - Purge chr_file and blk files on /tmp - Fixes for pads - Fixes for piranha-pulse - gpg_t needs to be able to encyprt anything owned by the user- mozilla_plugin_tmp_t needs to be treated as user tmp files - More dontaudits of writes from readahead - Dontaudit readahead_t file_type:dir write, to cover up kernel bug - systemd_tmpfiles needs to relabel faillog directory as well as the file - Allow hostname and consoletype to r/w inherited initrc_tmp_t files handline hostname >> /tmp/myhost- Add policykit fixes from Tim Waugh - dontaudit sandbox domains sandbox_file_t:dir mounton - Add new dontaudit rules for sysadm_dbusd_t - Change label for /var/run/faillock * other fixes which relate with this change- Update to upstream - Fixes for telepathy - Add port defition for ssdp port - add policy for /bin/systemd-notify from Dan - Mount command requires users read mount_var_run_t - colord needs to read konject_uevent_socket - User domains connect to the gkeyring socket - Add colord policy and allow user_t and staff_t to dbus chat with it - Add lvm_exec_t label for kpartx - Dontaudit reading the mail_spool_t link from sandbox -X - systemd is creating sockets in avahi_var_run and system_dbusd_var_run- gpg_t needs to talk to gnome-keyring - nscd wants to read /usr/tmp->/var/tmp to generate randomziation in unixchkpwd - enforce MCS labeling on nodes - Allow arpwatch to read meminfo - Allow gnomeclock to send itself signals - init relabels /dev/.udev files on boot - gkeyringd has to transition back to staff_t when it runs commands in bin_t or shell_exec_t - nautilus checks access on /media directory before mounting usb sticks, dontaudit access_check on mnt_t - dnsmasq can run as a dbus service, needs acquire service - mysql_admin should be allowed to connect to mysql service - virt creates monitor sockets in the users home dir- Allow usbhid-ups to read hardware state information - systemd-tmpfiles has moved - Allo cgroup to sys_tty_config - For some reason prelink is attempting to read gconf settings - Add allow_daemons_use_tcp_wrapper boolean - Add label for ~/.cache/wocky to make telepathy work in enforcing mode - Add label for char devices /dev/dasd* - Fix for apache_role - Allow amavis to talk to nslcd - allow all sandbox to read selinux poilcy config files - Allow cluster domains to use the system bus and send each other dbus messages- Update to upstream- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Update to ref policy - cgred needs chown capability - Add /dev/crash crash_dev_t - systemd-readahead wants to use fanotify which means readahead_t needs sys_admin capability- New labeling for postfmulti #675654 - dontaudit xdm_t listing noxattr file systems - dovecot-auth needs to be able to connect to mysqld via the network as well as locally - shutdown is passed stdout to a xdm_log_t file - smartd creates a fixed disk device - dovecot_etc_t contains a lnk_file that domains need to read - mount needs to be able to read etc_runtim_t:lnk_file since in rawhide this is a link created at boot- syslog_t needs syslog capability - dirsrv needs to be able to create /var/lib/snmp - Fix labeling for dirsrv - Fix for dirsrv policy missing manage_dirs_pattern - corosync needs to delete clvm_tmpfs_t files - qdiskd needs to list hugetlbfs - Move setsched to sandbox_x_domain, so firefox can run without network access - Allow hddtemp to read removable devices - Adding syslog and read_policy permissions to policy * syslog Allow unconfined, sysadm_t, secadm_t, logadm_t * read_policy allow unconfined, sysadm_t, secadm_t, staff_t on Targeted allow sysadm_t (optionally), secadm_t on MLS - mdadm application will write into /sys/.../uevent whenever arrays are assembled or disassembled.- Add tcsd policy- ricci_modclusterd_t needs to bind to rpc ports 500-1023 - Allow dbus to use setrlimit to increase resoueces - Mozilla_plugin is leaking to sandbox - Allow confined users to connect to lircd over unix domain stream socket which allow to use remote control - Allow awstats to read squid logs - seunshare needs to manage tmp_t - apcupsd cgi scripts have a new directory- Fix xserver_dontaudit_read_xdm_pid - Change oracle_port_t to oracledb_port_t to prevent conflict with satellite - Allow dovecot_deliver_t to read/write postfix_master_t:fifo_file. * These fifo_file is passed from postfix_master_t to postfix_local_t to dovecot_deliver_t - Allow readahead to manage readahead pid dirs - Allow readahead to read all mcs levels - Allow mozilla_plugin_t to use nfs or samba homedirs- Allow nagios plugin to read /proc/meminfo - Fix for mozilla_plugin - Allow samba_net_t to create /etc/keytab - pppd_t setting up vpns needs to run unix_chkpwd, setsched its process and write wtmp_t - nslcd can read user credentials - Allow nsplugin to delete mozilla_plugin_tmpfs_t - abrt tries to create dir in rpm_var_lib_t - virt relabels fifo_files - sshd needs to manage content in fusefs homedir - mock manages link files in cache dir- nslcd needs setsched and to read /usr/tmp - Invalid call in likewise policy ends up creating a bogus role - Cannon puts content into /var/lib/bjlib that cups needs to be able to write - Allow screen to create screen_home_t in /root - dirsrv sends syslog messages - pinentry reads stuff in .kde directory - Add labels for .kde directory in homedir - Treat irpinit, iprupdate, iprdump services with raid policy- NetworkManager wants to read consolekit_var_run_t - Allow readahead to create /dev/.systemd/readahead - Remove permissive domains - Allow newrole to run namespace_init- Add sepgsql_contexts file- Update to upstream- Add oracle ports and allow apache to connect to them if the connect_db boolean is turned on - Add puppetmaster_use_db boolean - Fixes for zarafa policy - Fixes for gnomeclock poliy - Fix systemd-tmpfiles to use auth_use_nsswitch- gnomeclock executes a shell - Update for screen policy to handle pipe in homedir - Fixes for polyinstatiated homedir - Fixes for namespace policy and other fixes related to polyinstantiation - Add namespace policy - Allow dovecot-deliver transition to sendmail which is needed by sieve scripts - Fixes for init, psad policy which relate with confined users - Do not audit bootloader attempts to read devicekit pid files - Allow nagios service plugins to read /proc- Add firewalld policy - Allow vmware_host to read samba config - Kernel wants to read /proc Fix duplicate grub def in cobbler - Chrony sends mail, executes shell, uses fifo_file and reads /proc - devicekitdisk getattr all file systems - sambd daemon writes wtmp file - libvirt transitions to dmidecode- Add initial policy for system-setup-keyboard which is now daemon - Label /var/lock/subsys/shorewall as shorewall_lock_t - Allow users to communicate with the gpg_agent_t - Dontaudit mozilla_plugin_t using the inherited terminal - Allow sambagui to read files in /usr - webalizer manages squid log files - Allow unconfined domains to bind ports to raw_ip_sockets - Allow abrt to manage rpm logs when running yum - Need labels for /var/run/bittlebee - Label .ssh under amanda - Remove unused genrequires for virt_domain_template - Allow virt_domain to use fd inherited from virtd_t - Allow iptables to read shorewall config- Gnome apps list config_home_t - mpd creates lnk files in homedir - apache leaks write to mail apps on tmp files - /var/stockmaniac/templates_cache contains log files - Abrt list the connects of mount_tmp_t dirs - passwd agent reads files under /dev and reads utmp file - squid apache script connects to the squid port - fix name of plymouth log file - teamviewer is a wine app - allow dmesg to read system state - Stop labeling files under /var/lib/mock so restorecon will not go into this - nsplugin needs to read network state for google talk- Allow xdm and syslog to use /var/log/boot.log - Allow users to communicate with mozilla_plugin and kill it - Add labeling for ipv6 and dhcp- New labels for ghc http content - nsplugin_config needs to read urand, lvm now calls setfscreate to create dev - pm-suspend now creates log file for append access so we remove devicekit_wri - Change authlogin_use_sssd to authlogin_nsswitch_use_ldap - Fixes for greylist_milter policy- Update to upstream - Fixes for systemd policy - Fixes for passenger policy - Allow staff users to run mysqld in the staff_t domain, akonadi needs this - Add bin_t label for /usr/share/kde4/apps/kajongg/kajongg.py - auth_use_nsswitch does not need avahi to read passwords,needed for resolving data - Dontaudit (xdm_t) gok attempting to list contents of /var/account - Telepathy domains need to read urand - Need interface to getattr all file classes in a mock library for setroubleshoot- Update selinux policy to handle new /usr/share/sandbox/start script- Update to upstream - Fix version of policy in spec file- Allow sandbox to run on nfs partitions, fixes for systemd_tmpfs - remove per sandbox domains devpts types - Allow dkim-milter sending signal to itself- Allow domains that transition to ping or traceroute, kill them - Allow user_t to conditionally transition to ping_t and traceroute_t - Add fixes to systemd- tools, including new labeling for systemd-fsck, systemd-cryptsetup- Turn on systemd policy - mozilla_plugin needs to read certs in the homedir. - Dontaudit leaked file descriptors from devicekit - Fix ircssi to use auth_use_nsswitch - Change to use interface without param in corenet to disable unlabelednet packets - Allow init to relabel sockets and fifo files in /dev - certmonger needs dac* capabilities to manage cert files not owned by root - dovecot needs fsetid to change group membership on mail - plymouthd removes /var/log/boot.log - systemd is creating symlinks in /dev - Change label on /etc/httpd/alias to be all cert_t- Fixes for clamscan and boinc policy - Add boinc_project_t setpgid - Allow alsa to create tmp files in /tmp- Push fixes to allow disabling of unlabeled_t packet access - Enable unlabelednet policy- Fixes for lvm to work with systemd- Fix the label for wicd log - plymouthd creates force-display-on-active-vt file - Allow avahi to request the kernel to load a module - Dontaudit hal leaks - Fix gnome_manage_data interface - Add new interface corenet_packet to define a type as being an packet_type. - Removed general access to packet_type from icecast and squid. - Allow mpd to read alsa config - Fix the label for wicd log - Add systemd policy- Fix gnome_manage_data interface - Dontaudit sys_ptrace capability for iscsid - Fixes for nagios plugin policy- Fix cron to run ranged when started by init - Fix devicekit to use log files - Dontaudit use of devicekit_var_run_t for fstools - Allow init to setattr on logfile directories - Allow hald to manage files in /var/run/pm-utils/ dir which is now labeled as devicekit_var_run_t- Fix up handling of dnsmasq_t creating /var/run/libvirt/network - Turn on sshd_forward_ports boolean by default - Allow sysadmin to dbus chat with rpm - Add interface for rw_tpm_dev - Allow cron to execute bin - fsadm needs to write sysfs - Dontaudit consoletype reading /var/run/pm-utils - Lots of new privs fro mozilla_plugin_t running java app, make mozilla_plugin - certmonger needs to manage dirsrv data - /var/run/pm-utils should be labeled as devicekit_var_run_t- fixes to allow /var/run and /var/lock as tmpfs - Allow chrome sandbox to connect to web ports - Allow dovecot to listem on lmtp and sieve ports - Allov ddclient to search sysctl_net_t - Transition back to original domain if you execute the shell- Remove duplicate declaration- Update to upstream - Cleanup for sandbox - Add attribute to be able to select sandbox types- Allow ddclient to fix file mode bits of ddclient conf file - init leaks file descriptors to daemons - Add labels for /etc/lirc/ and - Allow amavis_t to exec shell - Add label for gssd_tmp_t for /var/tmp/nfs_0- Put back in lircd_etc_t so policy will install- Turn on allow_postfix_local_write_mail_spool - Allow initrc_t to transition to shutdown_t - Allow logwatch and cron to mls_read_to_clearance for MLS boxes - Allow wm to send signull to all applications and receive them from users - lircd patch from field - Login programs have to read /etc/samba - New programs under /lib/systemd - Abrt needs to read config files- Update to upstream - Dontaudit leaked sockets from userdomains to user domains - Fixes for mcelog to handle scripts - Apply patch from Ruben Kerkhof - Allow syslog to search spool dirs- Allow nagios plugins to read usr files - Allow mysqld-safe to send system log messages - Fixes fpr ddclient policy - Fix sasl_admin interface - Allow apache to search zarafa config - Allow munin plugins to search /var/lib directory - Allow gpsd to read sysfs_t - Fix labels on /etc/mcelog/triggers to bin_t- Remove saslauthd_tmp_t and transition tmp files to krb5_host_rcache_t - Allow saslauthd_t to create krb5_host_rcache_t files in /tmp - Fix xserver interface - Fix definition of /var/run/lxdm- Turn on mediawiki policy - kdump leaks kdump_etc_t to ifconfig, add dontaudit - uux needs to transition to uucpd_t - More init fixes relabels man,faillog - Remove maxima defs in libraries.fc - insmod needs to be able to create tmpfs_t files - ping needs setcap- Allow groupd transition to fenced domain when executes fence_node - Fixes for rchs policy - Allow mpd to be able to read samba/nfs files- Fix up corecommands.fc to match upstream - Make sure /lib/systemd/* is labeled init_exec_t - mount wants to setattr on all mountpoints - dovecot auth wants to read dovecot etc files - nscd daemon looks at the exe file of the comunicating daemon - openvpn wants to read utmp file - postfix apps now set sys_nice and lower limits - remote_login (telnetd/login) wants to use telnetd_devpts_t and user_devpts_t to work correctly - Also resolves nsswitch - Fix labels on /etc/hosts.* - Cleanup to make upsteam patch work - allow abrt to read etc_runtime_t- Add conflicts for dirsrv package- Update to upstream - Add vlock policy- Fix sandbox to work on nfs homedirs - Allow cdrecord to setrlimit - Allow mozilla_plugin to read xauth - Change label on systemd-logger to syslogd_exec_t - Install dirsrv policy from dirsrv package- Add virt_home_t, allow init to setattr on xserver_tmp_t and relabel it - Udev needs to stream connect to init and kernel - Add xdm_exec_bootloader boolean, which allows xdm to execute /sbin/grub and read files in /boot directory- Allow NetworkManager to read openvpn_etc_t - Dontaudit hplip to write of /usr dirs - Allow system_mail_t to create /root/dead.letter as mail_home_t - Add vdagent policy for spice agent daemon- Dontaudit sandbox sending sigkill to all user domains - Add policy for rssh_chroot_helper - Add missing flask definitions - Allow udev to relabelto removable_t - Fix label on /var/log/wicd.log - Transition to initrc_t from init when executing bin_t - Add audit_access permissions to file - Make removable_t a device_node - Fix label on /lib/systemd/*- Fixes for systemd to manage /var/run - Dontaudit leaks by firstboot- Allow chome to create netlink_route_socket - Add additional MATHLAB file context - Define nsplugin as an application_domain - Dontaudit sending signals from sandboxed domains to other domains - systemd requires init to build /tmp /var/auth and /var/lock dirs - mount wants to read devicekit_power /proc/ entries - mpd wants to connect to soundd port - Openoffice causes a setattr on a lib_t file for normal users, add dontaudit - Treat lib_t and textrel_shlib_t directories the same - Allow mount read access on virtual images- Allow sandbox_x_domains to work with nfs/cifs/fusefs home dirs. - Allow devicekit_power to domtrans to mount - Allow dhcp to bind to udp ports > 1024 to do named stuff - Allow ssh_t to exec ssh_exec_t - Remove telepathy_butterfly_rw_tmp_files(), dev_read_printk() interfaces which are nolonger used - Fix clamav_append_log() intefaces - Fix 'psad_rw_fifo_file' interface- Allow cobblerd to list cobler appache content- Fixup for the latest version of upowed - Dontaudit sandbox sending SIGNULL to desktop apps- Update to upstream-Mount command from a confined user generates setattr on /etc/mtab file, need to dontaudit this access - dovecot-auth_t needs ipc_lock - gpm needs to use the user terminal - Allow system_mail_t to append ~/dead.letter - Allow NetworkManager to edit /etc/NetworkManager/NetworkManager.conf - Add pid file to vnstatd - Allow mount to communicate with gfs_controld - Dontaudit hal leaks in setfiles- Lots of fixes for systemd - systemd now executes readahead and tmpwatch type scripts - Needs to manage random seed- Allow smbd to use sys_admin - Remove duplicate file context for tcfmgr - Update to upstream- Fix fusefs handling - Do not allow sandbox to manage nsplugin_rw_t - Allow mozilla_plugin_t to connecto its parent - Allow init_t to connect to plymouthd running as kernel_t - Add mediawiki policy - dontaudit sandbox sending signals to itself. This can happen when they are running at different mcs. - Disable transition from dbus_session_domain to telepathy for F14 - Allow boinc_project to use shm - Allow certmonger to search through directories that contain certs - Allow fail2ban the DAC Override so it can read log files owned by non root users- Start adding support for use_fusefs_home_dirs - Add /var/lib/syslog directory file context - Add /etc/localtime as locale file context- Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn off iptables from unconfined user - Allow sudo to send signals to any domains the user could have transitioned to. - Passwd in single user mode needs to talk to console_device_t - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio - locate tried to read a symbolic link, will dontaudit - New labels for telepathy-sunshine content in homedir - Google is storing other binaries under /opt/google/talkplugin - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15 - modemmanger and bluetooth send dbus messages to devicekit_power - Samba needs to getquota on filesystems labeld samba_share_t- Dontaudit attempts by xdm_t to write to bin_t for kdm - Allow initrc_t to manage system_conf_t- Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory. - Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets - Allow confined users to read xdm_etc_t files - Allow xdm_t to transition to xauth_t for lxdm program- Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home - Allow clamd to send signals to itself - Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm. - Allow haze to connect to yahoo chat and messenger port tcp:5050. Bz #637339 - Allow guest to run ps command on its processes by allowing it to read /proc - Allow firewallgui to sys_rawio which seems to be required to setup masqerading - Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba. - Add label for /var/log/slim.log- Pull in cleanups from dgrift - Allow mozilla_plugin_t to execute mozilla_home_t - Allow rpc.quota to do quotamod- Cleanup policy via dgrift - Allow dovecot_deliver to append to inherited log files - Lots of fixes for consolehelper- Fix up Xguest policy- Add vnstat policy - allow libvirt to send audit messages - Allow chrome-sandbox to search nfs_t- Update to upstream- Add the ability to send audit messages to confined admin policies - Remove permissive domain from cmirrord and dontaudit sys_tty_config - Split out unconfined_domain() calls from other unconfined_ calls so we can d - virt needs to be able to read processes to clearance for MLS- Allow all domains that can use cgroups to search tmpfs_t directory - Allow init to send audit messages- Update to upstream- Allow mdadm_t to create files and sock files in /dev/md/- Add policy for ajaxterm- Handle /var/db/sudo - Allow pulseaudio to read alsa config - Allow init to send initrc_t dbus messagesAllow iptables to read shorewall tmp files Change chfn and passwd to use auth_use_pam so they can send dbus messages to fpr intd label vlc as an execmem_exec_t Lots of fixes for mozilla_plugin to run google vidio chat Allow telepath_msn to execute ldconfig and its own tmp files Fix labels on hugepages Allow mdadm to read files on /dev Remove permissive domains and change back to unconfined Allow freshclam to execute shell and bin_t Allow devicekit_power to transition to dhcpc Add boolean to allow icecast to connect to any port- Merge upstream fix of mmap_zero - Allow mount to write files in debugfs_t - Allow corosync to communicate with clvmd via tmpfs - Allow certmaster to read usr_t files - Allow dbus system services to search cgroup_t - Define rlogind_t as a login pgm- Allow mdadm_t to read/write hugetlbfs- Dominic Grift Cleanup - Miroslav Grepl policy for jabberd - Various fixes for mount/livecd and prelink- Merge with upstream- More access needed for devicekit - Add dbadm policy- Merge with upstream- Allow seunshare to fowner- Allow cron to look at user_cron_spool links - Lots of fixes for mozilla_plugin_t - Add sysv file system - Turn unconfined domains to permissive to find additional avcs- Update policy for mozilla_plugin_t- Allow clamscan to read proc_t - Allow mount_t to write to debufs_t dir - Dontaudit mount_t trying to write to security_t dir- Allow clamscan_t execmem if clamd_use_jit set - Add policy for firefox plugin-container- Fix /root/.forward definition- label dead.letter as mail_home_t- Allow login programs to search /cgroups- Fix cert handling- Fix devicekit_power bug - Allow policykit_auth_t more access.- Fix nis calls to allow bind to ports 512-1024 - Fix smartmon- Allow pcscd to read sysfs - systemd fixes - Fix wine_mmap_zero_ignore boolean- Apply Miroslav munin patch - Turn back on allow_execmem and allow_execmod booleans- Merge in fixes from dgrift repository- Update boinc policy - Fix sysstat policy to allow sys_admin - Change failsafe_context to unconfined_r:unconfined_t:s0- New paths for upstart- New permissions for syslog - New labels for /lib/upstart- Add mojomojo policy- Allow systemd to setsockcon on sockets to immitate other services- Remove debugfs label- Update to latest policy- Fix eclipse labeling from IBMSupportAssasstant packageing- Make boot with systemd in enforcing mode- Update to upstream- Add boolean to turn off port forwarding in sshd.- Add support for ebtables - Fixes for rhcs and corosync policy-Update to upstream-Update to upstream-Update to upstream- Add Zarafa policy- Cleanup of aiccu policy - initial mock policy- Lots of random fixes- Update to upstream- Update to upstream - Allow prelink script to signal itself - Cobbler fixes- Add xdm_var_run_t to xserver_stream_connect_xdm - Add cmorrord and mpd policy from Miroslav Grepl- Fix sshd creation of krb cc files for users to be user_tmp_t- Fixes for accountsdialog - Fixes for boinc- Fix label on /var/lib/dokwiki - Change permissive domains to enforcing - Fix libvirt policy to allow it to run on mls- Update to upstream- Allow procmail to execute scripts in the users home dir that are labeled home_bin_t - Fix /var/run/abrtd.lock label- Allow login programs to read krb5_home_t Resolves: 594833 - Add obsoletes for cachefilesfd-selinux package Resolves: #575084- Allow mount to r/w abrt fifo file - Allow svirt_t to getattr on hugetlbfs - Allow abrt to create a directory under /var/spool- Add labels for /sys - Allow sshd to getattr on shutdown - Fixes for munin - Allow sssd to use the kernel key ring - Allow tor to send syslog messages - Allow iptabels to read usr files - allow policykit to read all domains state- Fix path for /var/spool/abrt - Allow nfs_t as an entrypoint for http_sys_script_t - Add policy for piranha - Lots of fixes for sosreport- Allow xm_t to read network state and get and set capabilities - Allow policykit to getattr all processes - Allow denyhosts to connect to tcp port 9911 - Allow pyranha to use raw ip sockets and ptrace itself - Allow unconfined_execmem_t and gconfsd mechanism to dbus - Allow staff to kill ping process - Add additional MLS rules- Allow gdm to edit ~/.gconf dir Resolves: #590677 - Allow dovecot to create directories in /var/lib/dovecot Partially resolves 590224 - Allow avahi to dbus chat with NetworkManager - Fix cobbler labels - Dontaudit iceauth_t leaks - fix /var/lib/lxdm file context - Allow aiccu to use tun tap devices - Dontaudit shutdown using xserver.log- Fixes for sandbox_x_net_t to match access for sandbox_web_t ++ - Add xdm_etc_t for /etc/gdm directory, allow accountsd to manage this directory - Add dontaudit interface for bluetooth dbus - Add chronyd_read_keys, append_keys for initrc_t - Add log support for ksmtuned Resolves: #586663- Allow boinc to send mail- Allow initrc_t to remove dhcpc_state_t - Fix label on sa-update.cron - Allow dhcpc to restart chrony initrc - Don't allow sandbox to send signals to its parent processes - Fix transition from unconfined_t -> unconfined_mount_t -> rpcd_t Resolves: #589136- Fix location of oddjob_mkhomedir Resolves: #587385 - fix labeling on /root/.shosts and ~/.shosts - Allow ipsec_mgmt_t to manage net_conf_t Resolves: #586760- Dontaudit sandbox trying to connect to netlink sockets Resolves: #587609 - Add policy for piranha- Fixups for xguest policy - Fixes for running sandbox firefox- Allow ksmtuned to use terminals Resolves: #586663 - Allow lircd to write to generic usb devices- Allow sandbox_xserver to connectto unconfined stream Resolves: #585171- Allow initrc_t to read slapd_db_t Resolves: #585476 - Allow ipsec_mgmt to use unallocated devpts and to create /etc/resolv.conf Resolves: #585963- Allow rlogind_t to search /root for .rhosts Resolves: #582760 - Fix path for cached_var_t - Fix prelink paths /var/lib/prelink - Allow confined users to direct_dri - Allow mls lvm/cryptosetup to work- Allow virtd_t to manage firewall/iptables config Resolves: #573585- Fix label on /root/.rhosts Resolves: #582760 - Add labels for Picasa - Allow openvpn to read home certs - Allow plymouthd_t to use tty_device_t - Run ncftool as iptables_t - Allow mount to unmount unlabeled_t - Dontaudit hal leaks- Allow livecd to transition to mount- Update to upstream - Allow abrt to delete sosreport Resolves: #579998 - Allow snmp to setuid and gid Resolves: #582155 - Allow smartd to use generic scsi devices Resolves: #582145- Allow ipsec_t to create /etc/resolv.conf with the correct label - Fix reserved port destination - Allow autofs to transition to showmount - Stop crashing tuned- Add telepathysofiasip policy- Update to upstream - Fix label for /opt/google/chrome/chrome-sandbox - Allow modemmanager to dbus with policykit- Fix allow_httpd_mod_auth_pam to use auth_use_pam(httpd_t) - Allow accountsd to read shadow file - Allow apache to send audit messages when using pam - Allow asterisk to bind and connect to sip tcp ports - Fixes for dovecot 2.0 - Allow initrc_t to setattr on milter directories - Add procmail_home_t for .procmailrc file- Fixes for labels during install from livecd- Fix /cgroup file context - Fix broken afs use of unlabled_t - Allow getty to use the console for s390- Fix cgroup handling adding policy for /cgroup - Allow confined users to write to generic usb devices, if user_rw_noexattrfile boolean set- Merge patches from dgrift- Update upstream - Allow abrt to write to the /proc under any process- Fix ~/.fontconfig label - Add /root/.cert label - Allow reading of the fixed_file_disk_t:lnk_file if you can read file - Allow qemu_exec_t as an entrypoint to svirt_t- Update to upstream - Allow tmpreaper to delete sandbox sock files - Allow chrome-sandbox_t to use /dev/zero, and dontaudit getattr file systems - Fixes for gitosis - No transition on livecd to passwd or chfn - Fixes for denyhosts- Add label for /var/lib/upower - Allow logrotate to run sssd - dontaudit readahead on tmpfs blk files - Allow tmpreaper to setattr on sandbox files - Allow confined users to execute dos files - Allow sysadm_t to kill processes running within its clearance - Add accountsd policy - Fixes for corosync policy - Fixes from crontab policy - Allow svirt to manage svirt_image_t chr files - Fixes for qdisk policy - Fixes for sssd policy - Fixes for newrole policy- make libvirt work on an MLS platform- Add qpidd policy- Update to upstream- Allow boinc to read kernel sysctl - Fix snmp port definitions - Allow apache to read anon_inodefs- Allow shutdown dac_override- Add device_t as a file system - Fix sysfs association- Dontaudit ipsec_mgmt sys_ptrace - Allow at to mail its spool files - Allow nsplugin to search in .pulse directory- Update to upstream- Allow users to dbus chat with xdm - Allow users to r/w wireless_device_t - Dontaudit reading of process states by ipsec_mgmt- Fix openoffice from unconfined_t- Add shutdown policy so consolekit can shutdown system- Update to upstream- Update to upstream- Update to upstream - These are merges of my patches - Remove 389 labeling conflicts - Add MLS fixes found in RHEL6 testing - Allow pulseaudio to run as a service - Add label for mssql and allow apache to connect to this database port if boolean set - Dontaudit searches of debugfs mount point - Allow policykit_auth to send signals to itself - Allow modcluster to call getpwnam - Allow swat to signal winbind - Allow usbmux to run as a system role - Allow svirt to create and use devpts- Add MLS fixes found in RHEL6 testing - Allow domains to append to rpm_tmp_t - Add cachefilesfd policy - Dontaudit leaks when transitioning- Change allow_execstack and allow_execmem booleans to on - dontaudit acct using console - Add label for fping - Allow tmpreaper to delete sandbox_file_t - Fix wine dontaudit mmap_zero - Allow abrt to read var_t symlinks- Additional policy for rgmanager- Allow sshd to setattr on pseudo terms- Update to upstream- Allow policykit to send itself signals- Fix duplicate cobbler definition- Fix file context of /var/lib/avahi-autoipd- Merge with upstream- Allow sandbox to work with MLS- Make Chrome work with staff user- Add icecast policy - Cleanup spec file- Add mcelog policy- Lots of fixes found in F12- Fix rpm_dontaudit_leaks- Add getsched to hald_t - Add file context for Fedora/Redhat Directory Server- Allow abrt_helper to getattr on all filesystems - Add label for /opt/real/RealPlayer/plugins/oggfformat\.so- Add gstreamer_home_t for ~/.gstreamer- Update to upstream- Fix git- Turn on puppet policy - Update to dgrift git policy- Move users file to selection by spec file. - Allow vncserver to run as unconfined_u:unconfined_r:unconfined_t- Update to upstream- Remove most of the permissive domains from F12.- Add cobbler policy from dgrift- add usbmon device - Add allow rulse for devicekit_disk- Lots of fixes found in F12, fixes from Tom London- Cleanups from dgrift- Add back xserver_manage_home_fonts- Dontaudit sandbox trying to read nscd and sssd- Update to upstream- Rename udisks-daemon back to devicekit_disk_t policy- Fixes for abrt calls- Add tgtd policy- Update to upstream release- Add asterisk policy back in - Update to upstream release 2.20091117- Update to upstream release 2.20091117- Fixup nut policy- Update to upstream- Allow vpnc request the kernel to load modules- Fix minimum policy installs - Allow udev and rpcbind to request the kernel to load modules- Add plymouth policy - Allow local_login to sys_admin- Allow cupsd_config to read user tmp - Allow snmpd_t to signal itself - Allow sysstat_t to makedir in sysstat_log_t- Update rhcs policy- Allow users to exec restorecond- Allow sendmail to request kernel modules load- Fix all kernel_request_load_module domains- Fix all kernel_request_load_module domains- Remove allow_exec* booleans for confined users. Only available for unconfined_t- More fixes for sandbox_web_t- Allow sshd to create .ssh directory and content- Fix request_module line to module_request- Fix sandbox policy to allow it to run under firefox. - Dont audit leaks.- Fixes for sandbox- Update to upstream - Dontaudit nsplugin search /root - Dontaudit nsplugin sys_nice- Fix label on /usr/bin/notepad, /usr/sbin/vboxadd-service - Remove policycoreutils-python requirement except for minimum- Fix devicekit_disk_t to getattr on all domains sockets and fifo_files - Conflicts seedit (You can not use selinux-policy-targeted and seedit at the same time.)- Add wordpress/wp-content/uploads label - Fixes for sandbox when run from staff_t- Update to upstream - Fixes for devicekit_disk- More fixes- Lots of fixes for initrc and other unconfined domains- Allow xserver to use netlink_kobject_uevent_socket- Fixes for sandbox- Dontaudit setroubleshootfix looking at /root directory- Update to upsteam- Allow gssd to send signals to users - Fix duplicate label for apache content- Update to upstream- Remove polkit_auth on upgrades- Add back in unconfined.pp and unconfineduser.pp - Add Sandbox unshare- Fixes for cdrecord, mdadm, and others- Add capability setting to dhcpc and gpm- Allow cronjobs to read exim_spool_t- Add ABRT policy- Fix system-config-services policy- Allow libvirt to change user componant of virt_domain- Allow cupsd_config_t to be started by dbus - Add smoltclient policy- Add policycoreutils-python to pre install- Make all unconfined_domains permissive so we can see what AVC's happen- Add pt_chown policy- Add kdump policy for Miroslav Grepl - Turn off execstack boolean- Turn on execstack on a temporary basis (#512845)- Allow nsplugin to connecto the session bus - Allow samba_net to write to coolkey data- Allow devicekit_disk to list inotify- Allow svirt images to create sock_file in svirt_var_run_t- Allow exim to getattr on mountpoints - Fixes for pulseaudio- Allow svirt_t to stream_connect to virtd_t- Allod hald_dccm_t to create sock_files in /tmp- More fixes from upstream- Fix polkit label - Remove hidebrokensymptoms for nss_ldap fix - Add modemmanager policy - Lots of merges from upstream - Begin removing textrel_shlib_t labels, from fixed libraries- Update to upstream- Allow certmaster to override dac permissions- Update to upstream- Fix context for VirtualBox- Update to upstream- Allow clamscan read amavis spool files- Fixes for xguest- fix multiple directory ownership of mandirs- Update to upstream- Add rules for rtkit-daemon- Update to upstream - Fix nlscd_stream_connect- Add rtkit policy- Allow rpcd_t to stream connect to rpcbind- Allow kpropd to create tmp files- Fix last duplicate /var/log/rpmpkgs- Update to upstream * add sssd- Update to upstream * cleanup- Update to upstream - Additional mail ports - Add virt_use_usb boolean for svirt- Fix mcs rules to include chr_file and blk_file- Add label for udev-acl- Additional rules for consolekit/udev, privoxy and various other fixes- New version for upstream- Allow NetworkManager to read inotifyfs- Allow setroubleshoot to run mlocate- Update to upstream- Add fish as a shell - Allow fprintd to list usbfs_t - Allow consolekit to search mountpoints - Add proper labeling for shorewall- New log file for vmware - Allow xdm to setattr on user_tmp_t- Upgrade to upstream- Allow fprintd to access sys_ptrace - Add sandbox policy- Add varnishd policy- Fixes for kpropd- Allow brctl to r/w tun_tap_device_t- Add /usr/share/selinux/packages- Allow rpcd_t to send signals to kernel threads- Fix upgrade for F10 to F11- Add policy for /var/lib/fprint-Remove duplicate line- Allow svirt to manage pci and other sysfs device data- Fix package selection handling- Fix /sbin/ip6tables-save context - Allod udev to transition to mount - Fix loading of mls policy file- Add shorewall policy- Additional rules for fprintd and sssd- Allow nsplugin to unix_read unix_write sem for unconfined_java- Fix uml files to be owned by users- Fix Upgrade path to install unconfineduser.pp when unocnfined package is 3.0.0 or less- Allow confined users to manage virt_content_t, since this is home dir content - Allow all domains to read rpm_script_tmp_t which is what shell creates on redirection- Fix labeling on /var/lib/misc/prelink* - Allow xserver to rw_shm_perms with all x_clients - Allow prelink to execute files in the users home directory- Allow initrc_t to delete dev_null - Allow readahead to configure auditing - Fix milter policy - Add /var/lib/readahead- Update to latest milter code from Paul Howarth- Additional perms for readahead- Allow pulseaudio to acquire_svc on session bus - Fix readahead labeling- Allow sysadm_t to run rpm directly - libvirt needs fowner- Allow sshd to read var_lib symlinks for freenx- Allow nsplugin unix_read and write on users shm and sem - Allow sysadm_t to execute su- Dontaudit attempts to getattr user_tmpfs_t by lvm - Allow nfs to share removable media- Add ability to run postdrop from confined users- Fixes for podsleuth- Turn off nsplugin transition - Remove Konsole leaked file descriptors for release- Allow cupsd_t to create link files in print_spool_t - Fix iscsi_stream_connect typo - Fix labeling on /etc/acpi/actions - Don't reinstall unconfine and unconfineuser on upgrade if they are not installed- Allow audioentroy to read etc files- Add fail2ban_var_lib_t - Fixes for devicekit_power_t- Separate out the ucnonfined user from the unconfined.pp package- Make sure unconfined_java_t and unconfined_mono_t create user_tmpfs_t.- Upgrade to latest upstream - Allow devicekit_disk sys_rawio- Dontaudit binds to ports < 1024 for named - Upgrade to latest upstream- Allow podsleuth to use tmpfs files- Add customizable_types for svirt- Allow setroubelshoot exec* privs to prevent crash from bad libraries - add cpufreqselector- Dontaudit listing of /root directory for cron system jobs- Fix missing ld.so.cache label- Add label for ~/.forward and /root/.forward- Fixes for svirt- Fixes to allow svirt read iso files in homedir- Add xenner and wine fixes from mgrepl- Allow mdadm to read/write mls override- Change to svirt to only access svirt_image_t- Fix libvirt policy- Upgrade to latest upstream- Fixes for iscsid and sssd - More cleanups for upgrade from F10 to Rawhide.- Add pulseaudio, sssd policy - Allow networkmanager to exec udevadm- Add pulseaudio context- Upgrade to latest patches- Fixes for libvirt- Update to Latest upstream- Fix setrans.conf to show SystemLow for s0- Further confinement of qemu images via svirt- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Allow NetworkManager to manage /etc/NetworkManager/system-connections- add virtual_image_context and virtual_domain_context files- Allow rpcd_t to send signal to mount_t - Allow libvirtd to run ranged- Fix sysnet/net_conf_t- Fix squidGuard labeling- Re-add corenet_in_generic_if(unlabeled_t)* Tue Feb 10 2009 Dan Walsh 3.6.5-2 - Add git web policy- Add setrans contains from upstream- Do transitions outside of the booleans- Allow xdm to create user_tmp_t sockets for switch user to work- Fix staff_t domain- Grab remainder of network_peer_controls patch- More fixes for devicekit- Upgrade to latest upstream- Add boolean to disallow unconfined_t login- Add back transition from xguest to mozilla- Add virt_content_ro_t and labeling for isos directory- Fixes for wicd daemon- More mls/rpm fixes- Add policy to make dbus/nm-applet work- Remove polgen-ifgen from post and add trigger to policycoreutils-python- Add wm policy - Make mls work in graphics mode- Fixed for DeviceKit- Add devicekit policy- Update to upstream- Define openoffice as an x_domain- Fixes for reading xserver_tmp_t- Allow cups_pdf_t write to nfs_t- Remove audio_entropy policy- Update to upstream- Allow hal_acl_t to getattr/setattr fixed_disk- Change userdom_read_all_users_state to include reading symbolic links in /proc- Fix dbus reading /proc information- Add missing alias for home directory content- Fixes for IBM java location- Allow unconfined_r unconfined_java_t- Add cron_role back to user domains- Fix sudo setting of user keys- Allow iptables to talk to terminals - Fixes for policy kit - lots of fixes for booting.- Cleanup policy- Rebuild for Python 2.6- Fix labeling on /var/spool/rsyslog- Allow postgresl to bind to udp nodes- Allow lvm to dbus chat with hal - Allow rlogind to read nfs_t- Fix cyphesis file context- Allow hal/pm-utils to look at /var/run/video.rom - Add ulogd policy- Additional fixes for cyphesis - Fix certmaster file context - Add policy for system-config-samba - Allow hal to read /var/run/video.rom- Allow dhcpc to restart ypbind - Fixup labeling in /var/run- Add certmaster policy- Fix confined users - Allow xguest to read/write xguest_dbusd_t- Allow openoffice execstack/execmem privs- Allow mozilla to run with unconfined_execmem_t- Dontaudit domains trying to write to .xsession-errors- Allow nsplugin to look at autofs_t directory- Allow kerneloops to create tmp files- More alias for fastcgi- Remove mod_fcgid-selinux package- Fix dovecot access- Policy cleanup- Remove Multiple spec - Add include - Fix makefile to not call per_role_expansion- Fix labeling of libGL- Update to upstream- Update to upstream policy- Fixes for confined xwindows and xdm_t- Allow confined users and xdm to exec wm - Allow nsplugin to talk to fifo files on nfs- Allow NetworkManager to transition to avahi and iptables - Allow domains to search other domains keys, coverup kernel bug- Fix labeling for oracle- Allow nsplugin to comminicate with xdm_tmp_t sock_file- Change all user tmpfs_t files to be labeled user_tmpfs_t - Allow radiusd to create sock_files- Upgrade to upstream- Allow confined users to login with dbus- Fix transition to nsplugin- Add file context for /dev/mspblk.*- Fix transition to nsplugin '- Fix labeling on new pm*log - Allow ssh to bind to all nodes- Merge upstream changes - Add Xavier Toth patches- Add qemu_cache_t for /var/cache/libvirt- Remove gamin policy- Add tinyxs-max file system support- Update to upstream - New handling of init scripts- Allow pcsd to dbus - Add memcache policy- Allow audit dispatcher to kill his children- Update to upstream - Fix crontab use by unconfined user- Allow ifconfig_t to read dhcpc_state_t- Update to upstream- Update to upstream- Allow system-config-selinux to work with policykit- Fix novel labeling- Consolodate pyzor,spamassassin, razor into one security domain - Fix xdm requiring additional perms.- Fixes for logrotate, alsa- Eliminate vbetool duplicate entry- Fix xguest -> xguest_mozilla_t -> xguest_openiffice_t - Change dhclient to be able to red networkmanager_var_run- Update to latest refpolicy - Fix libsemanage initial install bug- Add inotify support to nscd- Allow unconfined_t to setfcap- Allow amanda to read tape - Allow prewikka cgi to use syslog, allow audisp_t to signal cgi - Add support for netware file systems- Allow ypbind apps to net_bind_service- Allow all system domains and application domains to append to any log file- Allow gdm to read rpm database - Allow nsplugin to read mplayer config files- Allow vpnc to run ifconfig- Allow confined users to use postgres - Allow system_mail_t to exec other mail clients - Label mogrel_rails as an apache server- Apply unconfined_execmem_exec_t to haskell programs- Fix prelude file context- allow hplip to talk dbus - Fix context on ~/.local dir- Prevent applications from reading x_device- Add /var/lib/selinux context- Update to upstream- Add livecd policy- Dontaudit search of admin_home for init_system_domain - Rewrite of xace interfaces - Lots of new fs_list_inotify - Allow livecd to transition to setfiles_mac- Begin XAce integration- Merge Upstream- Allow amanada to create data files- Fix initial install, semanage setup- Allow system_r for httpd_unconfined_script_t- Remove dmesg boolean - Allow user domains to read/write game data- Change unconfined_t to transition to unconfined_mono_t when running mono - Change XXX_mono_t to transition to XXX_t when executing bin_t files, so gnome-do will work- Remove old booleans from targeted-booleans.conf file- Add boolean to mmap_zero - allow tor setgid - Allow gnomeclock to set clock- Don't run crontab from unconfined_t- Change etc files to config files to allow users to read them- Lots of fixes for confined domains on NFS_t homedir- dontaudit mrtg reading /proc - Allow iscsi to signal itself - Allow gnomeclock sys_ptrace- Allow dhcpd to read kernel network state- Label /var/run/gdm correctly - Fix unconfined_u user creation- Allow transition from initrc_t to getty_t- Allow passwd to communicate with user sockets to change gnome-keyring- Fix initial install- Allow radvd to use fifo_file - dontaudit setfiles reading links - allow semanage sys_resource - add allow_httpd_mod_auth_ntlm_winbind boolean - Allow privhome apps including dovecot read on nfs and cifs home dirs if the boolean is set- Allow nsplugin to read /etc/mozpluggerrc, user_fonts - Allow syslog to manage innd logs. - Allow procmail to ioctl spamd_exec_t- Allow initrc_t to dbus chat with consolekit.- Additional access for nsplugin - Allow xdm setcap/getcap until pulseaudio is fixed- Allow mount to mkdir on tmpfs - Allow ifconfig to search debugfs- Fix file context for MATLAB - Fixes for xace- Allow stunnel to transition to inetd children domains - Make unconfined_dbusd_t an unconfined domain- Fixes for qemu/virtd- Fix bug in mozilla policy to allow xguest transition - This will fix the libsemanage.dbase_llist_query: could not find record value libsemanage.dbase_llist_query: could not query record value (No such file or directory) bug in xguest- Allow nsplugin to run acroread- Add cups_pdf policy - Add openoffice policy to run in xguest- prewika needs to contact mysql - Allow syslog to read system_map files- Change init_t to an unconfined_domain- Allow init to transition to initrc_t on shell exec. - Fix init to be able to sendto init_t. - Allow syslog to connect to mysql - Allow lvm to manage its own fifo_files - Allow bugzilla to use ldap - More mls fixes- fixes for init policy (#436988) - fix build- Additional changes for MLS policy- Fix initrc_context generation for MLS- Fixes for libvirt- Allow bitlebee to read locale_t- More xselinux rules- Change httpd_$1_script_r*_t to httpd_$1_content_r*_t- Prepare policy for beta release - Change some of the system domains back to unconfined - Turn on some of the booleans- Allow nsplugin_config execstack/execmem - Allow nsplugin_t to read alsa config - Change apache to use user content- Add cyphesis policy- Fix Makefile.devel to build mls modules - Fix qemu to be more specific on labeling- Update to upstream fixes- Allow staff to mounton user_home_t- Add xace support- Add fusectl file system- Fixes from yum-cron - Update to latest upstream- Fix userdom_list_user_files- Merge with upstream- Allow udev to send audit messages- Add additional login users interfaces - userdom_admin_login_user_template(staff)- More fixes for polkit- Eliminate transition from unconfined_t to qemu by default - Fixes for gpg- Update to upstream- Fixes for staff_t- Add policy for kerneloops - Add policy for gnomeclock- Fixes for libvirt- Fixes for nsplugin- More fixes for qemu- Additional ports for vnc and allow qemu and libvirt to search all directories- Update to upstream - Add libvirt policy - add qemu policy- Allow fail2ban to create a socket in /var/run- Allow allow_httpd_mod_auth_pam to work- Add audisp policy and prelude- Allow all user roles to executae samba net command- Allow usertypes to read/write noxattr file systems- Fix nsplugin to allow flashplugin to work in enforcing mode- Allow pam_selinux_permit to kill all processes- Allow ptrace or user processes by users of same type - Add boolean for transition to nsplugin- Allow nsplugin sys_nice, getsched, setsched- Allow login programs to talk dbus to oddjob- Add procmail_log support - Lots of fixes for munin- Allow setroubleshoot to read policy config and send audit messages- Allow users to execute all files in homedir, if boolean set - Allow mount to read samba config- Fixes for xguest to run java plugin- dontaudit pam_t and dbusd writing to user_home_t- Update gpg to allow reading of inotify- Change user and staff roles to work correctly with varied perms- Fix munin log, - Eliminate duplicate mozilla file context - fix wpa_supplicant spec- Fix role transition from unconfined_r to system_r when running rpm - Allow unconfined_domains to communicate with user dbus instances- Fixes for xguest- Let all uncofined domains communicate with dbus unconfined- Run rpm in system_r- Zero out customizable types- Fix definiton of admin_home_t- Fix munin file context- Allow cron to run unconfined apps- Modify default login to unconfined_u- Dontaudit dbus user client search of /root- Update to upstream- Fixes for polkit - Allow xserver to ptrace- Add polkit policy - Symplify userdom context, remove automatic per_role changes- Update to upstream - Allow httpd_sys_script_t to search users homedirs- Allow rpm_script to transition to unconfined_execmem_t- Remove user based home directory separation- Remove user specific crond_t- Merge with upstream - Allow xsever to read hwdata_t - Allow login programs to setkeycreate- Update to upstream- Update to upstream- Allow XServer to read /proc/self/cmdline - Fix unconfined cron jobs - Allow fetchmail to transition to procmail - Fixes for hald_mac - Allow system_mail to transition to exim - Allow tftpd to upload files - Allow xdm to manage unconfined_tmp - Allow udef to read alsa config - Fix xguest to be able to connect to sound port- Fixes for hald_mac - Treat unconfined_home_dir_t as a home dir - dontaudit rhgb writes to fonts and root- Fix dnsmasq - Allow rshd full login privs- Allow rshd to connect to ports > 1023- Fix vpn to bind to port 4500 - Allow ssh to create shm - Add Kismet policy- Allow rpm to chat with networkmanager- Fixes for ipsec and exim mail - Change default to unconfined user- Pass the UNK_PERMS param to makefile - Fix gdm location- Make alsa work- Fixes for consolekit and startx sessions- Dontaudit consoletype talking to unconfined_t- Remove homedir_template- Check asound.state- Fix exim policy- Allow tmpreadper to read man_t - Allow racoon to bind to all nodes - Fixes for finger print reader- Allow xdm to talk to input device (fingerprint reader) - Allow octave to run as java- Allow login programs to set ioctl on /proc- Allow nsswitch apps to read samba_var_t- Fix maxima- Eliminate rpm_t:fifo_file avcs - Fix dbus path for helper app- Fix service start stop terminal avc's- Allow also to search var_lib - New context for dbus launcher- Allow cupsd_config_t to read/write usb_device_t - Support for finger print reader, - Many fixes for clvmd - dbus starting networkmanager- Fix java and mono to run in xguest account- Fix to add xguest account when inititial install - Allow mono, java, wine to run in userdomains- Allow xserver to search devpts_t - Dontaudit ldconfig output to homedir- Remove hplip_etc_t change back to etc_t.- Allow cron to search nfs and samba homedirs- Allow NetworkManager to dbus chat with yum-updated- Allow xfs to bind to port 7100- Allow newalias/sendmail dac_override - Allow bind to bind to all udp ports- Turn off direct transition- Allow wine to run in system role- Fix java labeling- Define user_home_type as home_type- Allow sendmail to create etc_aliases_t- Allow login programs to read symlinks on homedirs- Update an readd modules- Cleanup spec file- Allow xserver to be started by unconfined process and talk to tty- Upgrade to upstream to grab postgressql changes- Add setransd for mls policy- Add ldconfig_cache_t- Allow sshd to write to proc_t for afs login- Allow xserver access to urand- allow dovecot to search mountpoints- Fix Makefile for building policy modules- Fix dhcpc startup of service- Fix dbus chat to not happen for xguest and guest users- Fix nagios cgi - allow squid to communicate with winbind- Fixes for ldconfig- Update from upstream- Add nasd support- Fix new usb devices and dmfm- Eliminate mount_ntfs_t policy, merge into mount_t- Allow xserver to write to ramfs mounted by rhgb- Add context for dbus machine id- Update with latest changes from upstream- Fix prelink to handle execmod- Add ntpd_key_t to handle secret data- Add anon_inodefs - Allow unpriv user exec pam_exec_t - Fix trigger- Allow cups to use generic usb - fix inetd to be able to run random apps (git)- Add proper contexts for rsyslogd- Fixes for xguest policy- Allow execution of gconf- Fix moilscanner update problem- Begin adding policy to separate setsebool from semanage - Fix xserver.if definition to not break sepolgen.if- Add new devices- Add brctl policy- Fix root login to include system_r- Allow prelink to read kernel sysctls- Default to user_u:system_r:unconfined_t- fix squid - Fix rpm running as uid- Fix syslog declaration- Allow avahi to access inotify - Remove a lot of bogus security_t:filesystem avcs- Remove ifdef strict policy from upstream- Remove ifdef strict to allow user_u to login- Fix for amands - Allow semanage to read pp files - Allow rhgb to read xdm_xserver_tmp- Allow kerberos servers to use ldap for backing store- allow alsactl to read kernel state- More fixes for alsactl - Transition from hal and modutils - Fixes for suspend resume. - insmod domtrans to alsactl - insmod writes to hal log- Allow unconfined_t to transition to NetworkManager_t - Fix netlabel policy- Update to latest from upstream- Update to latest from upstream- Update to latest from upstream- Allow pcscd_t to send itself signals- Fixes for unix_update - Fix logwatch to be able to search all dirs- Upstream bumped the version- Allow consolekit to syslog - Allow ntfs to work with hal- Allow iptables to read etc_runtime_t- MLS Fixes- Fix path of /etc/lvm/cache directory - Fixes for alsactl and pppd_t - Fixes for consolekit- Allow insmod_t to mount kvmfs_t filesystems- Rwho policy - Fixes for consolekit- fixes for fusefs- Fix samba_net to allow it to view samba_var_t- Update to upstream- Fix Sonypic backlight - Allow snmp to look at squid_conf_t- Fixes for pyzor, cyrus, consoletype on everything installs- Fix hald_acl_t to be able to getattr/setattr on usb devices - Dontaudit write to unconfined_pipes for load_policy- Allow bluetooth to read inotifyfs- Fixes for samba domain controller. - Allow ConsoleKit to look at ttys- Fix interface call- Allow syslog-ng to read /var - Allow locate to getattr on all filesystems - nscd needs setcap- Update to upstream- Allow samba to run groupadd- Update to upstream- Allow mdadm to access generic scsi devices- Fix labeling on udev.tbl dirs- Fixes for logwatch- Add fusermount and mount_ntfs policy- Update to upstream - Allow saslauthd to use kerberos keytabs- Fixes for samba_var_t- Allow networkmanager to setpgid - Fixes for hal_acl_t- Remove disable_trans booleans - hald_acl_t needs to talk to nscd- Fix prelink to be able to manage usr dirs.- Allow insmod to launch init scripts- Remove setsebool policy- Fix handling of unlabled_t packets- More of my patches from upstream- Update to latest from upstream - Add fail2ban policy- Update to remove security_t:filesystem getattr problems- Policy for consolekit- Update to latest from upstream- Revert Nemiver change - Set sudo as a corecmd so prelink will work, remove sudoedit mapping, since this will not work, it does not transition. - Allow samba to execute useradd- Upgrade to the latest from upstream- Add sepolgen support - Add bugzilla policy- Fix file context for nemiver- Remove include sym link- Allow mozilla, evolution and thunderbird to read dev_random. Resolves: #227002 - Allow spamd to connect to smtp port Resolves: #227184 - Fixes to make ypxfr work Resolves: #227237- Fix ssh_agent to be marked as an executable - Allow Hal to rw sound device- Fix spamassisin so crond can update spam files - Fixes to allow kpasswd to work - Fixes for bluetooth- Remove some targeted diffs in file context file- Fix squid cachemgr labeling- Add ability to generate webadm_t policy - Lots of new interfaces for httpd - Allow sshd to login as unconfined_t- Continue fixing, additional user domains- Begin adding user confinement to targeted policy- Fixes for prelink, ktalkd, netlabel- Allow prelink when run from rpm to create tmp files Resolves: #221865 - Remove file_context for exportfs Resolves: #221181 - Allow spamassassin to create ~/.spamassissin Resolves: #203290 - Allow ssh access to the krb tickets - Allow sshd to change passwd - Stop newrole -l from working on non securetty Resolves: #200110 - Fixes to run prelink in MLS machine Resolves: #221233 - Allow spamassassin to read var_lib_t dir Resolves: #219234- fix mplayer to work under strict policy - Allow iptables to use nscd Resolves: #220794- Add gconf policy and make it work with strict- Many fixes for strict policy and by extension mls.- Fix to allow ftp to bind to ports > 1024 Resolves: #219349- Allow semanage to exec it self. Label genhomedircon as semanage_exec_t Resolves: #219421 - Allow sysadm_lpr_t to manage other print spool jobs Resolves: #220080- allow automount to setgid Resolves: #219999- Allow cron to polyinstatiate - Fix creation of boot flags Resolves: #207433- Fixes for irqbalance Resolves: #219606- Fix vixie-cron to work on mls Resolves: #207433Resolves: #218978- Allow initrc to create files in /var directories Resolves: #219227- More fixes for MLS Resolves: #181566- More Fixes polyinstatiation Resolves: #216184- More Fixes polyinstatiation - Fix handling of keyrings Resolves: #216184- Fix polyinstatiation - Fix pcscd handling of terminal Resolves: #218149 Resolves: #218350- More fixes for quota Resolves: #212957- ncsd needs to use avahi sockets Resolves: #217640 Resolves: #218014- Allow login programs to polyinstatiate homedirs Resolves: #216184 - Allow quotacheck to create database files Resolves: #212957- Dontaudit appending hal_var_lib files Resolves: #217452 Resolves: #217571 Resolves: #217611 Resolves: #217640 Resolves: #217725- Fix context for helix players file_context #216942- Fix load_policy to be able to mls_write_down so it can talk to the terminal- Fixes for hwclock, clamav, ftp- Move to upstream version which accepted my patches- Fixes for nvidia driver- Allow semanage to signal mcstrans- Update to upstream- Allow modstorage to edit /etc/fstab file- Fix for qemu, /dev/- Fix path to realplayer.bin- Allow xen to connect to xen port- Allow cups to search samba_etc_t directory - Allow xend_t to list auto_mountpoints- Allow xen to search automount- Fix spec of jre files- Fix unconfined access to shadow file- Allow xend to create files in xen_image_t directories- Fixes for /var/lib/hal- Remove ability for sysadm_t to look at audit.log- Fix rpc_port_types - Add aide policy for mls- Merge with upstream- Lots of fixes for ricci- Allow xen to read/write fixed devices with a boolean - Allow apache to search /var/log- Fix policygentool specfile problem. - Allow apache to send signals to it's logging helpers. - Resolves: rhbz#212731- Add perms for swat- Add perms for swat- Allow daemons to dump core files to /- Fixes for ricci- Allow mount.nfs to work- Allow ricci-modstorage to look at lvm_etc_t- Fixes for ricci using saslauthd- Allow mountpoint on home_dir_t and home_t- Update xen to read nfs files- Allow noxattrfs to associate with other noxattrfs- Allow hal to use power_device_t- Allow procemail to look at autofs_t - Allow xen_image_t to work as a fixed device- Refupdate from upstream- Add lots of fixes for mls cups- Lots of fixes for ricci- Fix number of cats- Update to upstream- More iSCSI changes for #209854- Test ISCSI fixes for #209854- allow semodule to rmdir selinux_config_t dir- Fix boot_runtime_t problem on ppc. Should not be creating these files.- Fix context mounts on reboot - Fix ccs creation of directory in /var/log- Update for tallylog- Allow xend to rewrite dhcp conf files - Allow mgetty sys_admin capability- Make xentapctrl work- Don't transition unconfined_t to bootloader_t - Fix label in /dev/xen/blktap- Patch for labeled networking- Fix crond handling for mls- Update to upstream- Remove bluetooth-helper transition - Add selinux_validate for semanage - Require new version of libsemanage- Fix prelink- Fix rhgb- Fix setrans handling on MLS and useradd- Support for fuse - fix vigr- Fix dovecot, amanda - Fix mls- Allow java execheap for itanium- Update with upstream- mls fixes- Update from upstream- More fixes for mls - Revert change on automount transition to mount- Fix cron jobs to run under the correct context- Fixes to make pppd work- Multiple policy fixes - Change max categories to 1023- Fix transition on mcstransd- Add /dev/em8300 defs- Upgrade to upstream- Fix ppp connections from network manager- Add tty access to all domains boolean - Fix gnome-pty-helper context for ia64- Fixed typealias of firstboot_rw_t- Fix location of xel log files - Fix handling of sysadm_r -> rpm_exec_t- Fixes for autofs, lp- Update from upstream- Fixup for test6- Update to upstream- Update to upstream- Fix suspend to disk problems- Lots of fixes for restarting daemons at the console.- Fix audit line - Fix requires line- Upgrade to upstream- Fix install problems- Allow setroubleshoot to getattr on all dirs to gather RPM data- Set /usr/lib/ia32el/ia32x_loader to unconfined_execmem_exec_t for ia32 platform - Fix spec for /dev/adsp- Fix xen tty devices- Fixes for setroubleshoot- Update to upstream- Fixes for stunnel and postgresql - Update from upstream- Update from upstream - More java fixes- Change allow_execstack to default to on, for RHEL5 Beta. This is required because of a Java compiler problem. Hope to turn off for next beta- Misc fixes- More fixes for strict policy- Quiet down anaconda audit messages- Fix setroubleshootd- Update to the latest from upstream- More fixes for xen- Fix anaconda transitions- yet more xen rules- more xen rules- Fixes for Samba- Fixes for xen- Allow setroubleshootd to send mail- Add nagios policy- fixes for setroubleshoot- Added Paul Howarth patch to only load policy packages shipped with this package - Allow pidof from initrc to ptrace higher level domains - Allow firstboot to communicate with hal via dbus- Add policy for /var/run/ldapi- Fix setroubleshoot policy- Fixes for mls use of ssh - named has a new conf file- Fixes to make setroubleshoot work- Cups needs to be able to read domain state off of printer client- add boolean to allow zebra to write config files- setroubleshootd fixes- Allow prelink to read bin_t symlink - allow xfs to read random devices - Change gfs to support xattr- Remove spamassassin_can_network boolean- Update to upstream - Fix lpr domain for mls- Add setroubleshoot policy- Turn off auditallow on setting booleans- Multiple fixes- Update to upstream- Update to upstream - Add new class for kernel key ring- Update to upstream- Update to upstream- Break out selinux-devel package- Add ibmasmfs- Fix policygentool gen_requires- Update from Upstream- Fix spec of realplay- Update to upstream- Fix semanage- Allow useradd to create_home_dir in MLS environment- Update from upstream- Update from upstream- Add oprofilefs- Fix for hplip and Picasus- Update to upstream- Update to upstream- fixes for spamd- fixes for java, openldap and webalizer- Xen fixes- Upgrade to upstream- allow hal to read boot_t files - Upgrade to upstream- allow hal to read boot_t files- Update from upstream- Fixes for amavis- Update from upstream- Allow auditctl to search all directories- Add acquire service for mono.- Turn off allow_execmem boolean - Allow ftp dac_override when allowed to access users homedirs- Clean up spec file - Transition from unconfined_t to prelink_t- Allow execution of cvs command- Update to upstream- Update to upstream- Fix libjvm spec- Update to upstream- Add xm policy - Fix policygentool- Update to upstream - Fix postun to only disable selinux on full removal of the packages- Allow mono to chat with unconfined- Allow procmail to sendmail - Allow nfs to share dosfs- Update to latest from upstream - Allow selinux-policy to be removed and kernel not to crash- Update to latest from upstream - Add James Antill patch for xen - Many fixes for pegasus- Add unconfined_mount_t - Allow privoxy to connect to httpd_cache - fix cups labeleing on /var/cache/cups- Update to latest from upstream- Update to latest from upstream - Allow mono and unconfined to talk to initrc_t dbus objects- Change libraries.fc to stop shlib_t form overriding texrel_shlib_t- Fix samba creating dirs in homedir - Fix NFS so its booleans would work- Allow secadm_t ability to relabel all files - Allow ftp to search xferlog_t directories - Allow mysql to communicate with ldap - Allow rsync to bind to rsync_port_t- Fixed mailman with Postfix #183928 - Allowed semanage to create file_context files. - Allowed amanda_t to access inetd_t TCP sockets and allowed amanda_recover_t to bind to reserved ports. #149030 - Don't allow devpts_t to be associated with tmp_t. - Allow hald_t to stat all mountpoints. - Added boolean samba_share_nfs to allow smbd_t full access to NFS mounts. - Make mount run in mount_t domain from unconfined_t to prevent mislabeling of /etc/mtab. - Changed the file_contexts to not have a regex before the first ^/[a-z]/ whenever possible, makes restorecon slightly faster. - Correct the label of /etc/named.caching-nameserver.conf - Now label /usr/src/kernels/.+/lib(/.*)? as usr_t instead of /usr/src(/.*)?/lib(/.*)? - I don't think we need anything else under /usr/src hit by this. - Granted xen access to /boot, allowed mounting on xend_var_lib_t, and allowed xenstored_t rw access to the xen device node.- More textrel_shlib_t file path fixes - Add ada support- Get auditctl working in MLS policy- Add mono dbus support - Lots of file_context fixes for textrel_shlib_t in FC5 - Turn off execmem auditallow since they are filling log files- Update to upstream- Allow automount and dbus to read cert files- Fix ftp policy - Fix secadm running of auditctl- Update to upstream- Update to upstream- Fix policyhelp- Fix pam_console handling of usb_device - dontaudit logwatch reading /mnt dir- Update to upstream- Get transition rules to create policy.20 at SystemHigh- Allow secadmin to shutdown system - Allow sendmail to exec newalias- MLS Fixes dmidecode needs mls_file_read_up - add ypxfr_t - run init needs access to nscd - udev needs setuid - another xen log file - Dontaudit mount getattr proc_kcore_t- fix buildroot usage (#185391)- Get rid of mount/fsdisk scan of /dev messages - Additional fixes for suspend/resume- Fake make to rebuild enableaudit.pp- Get xen networking running.- Fixes for Xen - enableaudit should not be the same as base.pp - Allow ps to work for all process- more xen policy fixups- more xen fixage (#184393)- Fix blkid specification - Allow postfix to execute mailman_que- Blkid changes - Allow udev access to usb_device_t - Fix post script to create targeted policy config file- Allow lvm tools to create drevice dir- Add Xen support- Fixes for cups - Make cryptosetup work with hal- Load Policy needs translock- Fix cups html interface- Add hal changes suggested by Jeremy - add policyhelp to point at policy html pages- Additional fixes for nvidia and cups- Update to upstream - Merged my latest fixes - Fix cups policy to handle unix domain sockets- NSCD socket is in nscd_var_run_t needs to be able to search dir- Fixes Apache interface file- Fixes for new version of cups- Turn off polyinstatiate util after FC5- Fix problem with privoxy talking to Tor- Turn on polyinstatiation- Don't transition from unconfined_t to fsadm_t- Fix policy update model.- Update to upstream- Fix load_policy to work on MLS - Fix cron_rw_system_pipes for postfix_postdrop_t - Allow audotmount to run showmount- Fix swapon - allow httpd_sys_script_t to be entered via a shell - Allow httpd_sys_script_t to read eventpolfs- Update from upstream- allow cron to read apache files- Fix vpnc policy to work from NetworkManager- Update to upstream - Fix semoudle polcy- Update to upstream - fix sysconfig/selinux link- Add router port for zebra - Add imaze port for spamd - Fixes for amanda and java- Fix bluetooth handling of usb devices - Fix spamd reading of ~/ - fix nvidia spec- Update to upsteam- Add users_extra files- Update to upstream- Add semodule policy- Update from upstream- Fix for spamd to use razor port- Fixes for mcs - Turn on mount and fsadm for unconfined_t- Fixes for the -devel package- Fix for spamd to use ldap- Update to upstream- Update to upstream - Fix rhgb, and other Xorg startups- Update to upstream- Separate out role of secadm for mls- Add inotifyfs handling- Update to upstream - Put back in changes for pup/zen- Many changes for MLS - Turn on strict policy- Update to upstream- Update to upstream - Fixes for booting and logging in on MLS machine- Update to upstream - Turn off execheap execstack for unconfined users - Add mono/wine policy to allow execheap and execstack for them - Add execheap for Xdm policy- Update to upstream - Fixes to fetchmail,- Update to upstream- Fix for procmail/spamassasin - Update to upstream - Add rules to allow rpcd to work with unlabeled_networks.- Update to upstream - Fix ftp Man page- Update to upstream- fix pup transitions (#177262) - fix xen disks (#177599)- Update to upstream- More Fixes for hal and readahead- Fixes for hal and readahead- Update to upstream - Apply- Add wine and fix hal problems- Handle new location of hal scripts- Allow su to read /etc/mtab- Update to upstream- Fix "libsemanage.parse_module_headers: Data did not represent a module." problem- Allow load_policy to read /etc/mtab- Fix dovecot to allow dovecot_auth to look at /tmp- Allow restorecon to read unlabeled_t directories in order to fix labeling.- Add Logwatch policy- Fix /dev/ub[a-z] file context- Fix library specification - Give kudzu execmem privs- Fix hostname in targeted policy- Fix passwd command on mls- Lots of fixes to make mls policy work- Add dri libs to textrel_shlib_t - Add system_r role for java - Add unconfined_exec_t for vncserver - Allow slapd to use kerberos- Add man pages- Add enableaudit.pp- Fix mls policy- Update mls file from old version- Add sids back in - Rebuild with update checkpolicy- Fixes to allow automount to use portmap - Fixes to start kernel in s0-s15:c0.c255- Add java unconfined/execmem policy- Add file context for /var/cvs - Dontaudit webalizer search of homedir- Update from upstream- Clean up spec - range_transition crond to SystemHigh- Fixes for hal - Update to upstream- Turn back on execmem since we need it for java, firefox, ooffice - Allow gpm to stream socket to itself- fix requirements to be on the actual packages so that policy can get created properly at install time- Allow unconfined_t to execmod texrel_shlib_t- Update to upstream - Turn off allow_execmem and allow_execmod booleans - Add tcpd and automount policies- Add two new httpd booleans, turned off by default * httpd_can_network_relay * httpd_can_network_connect_db- Add ghost for policy.20- Update to upstream - Turn off boolean allow_execstack- Change setrans-mls to use new libsetrans - Add default_context rule for xdm- Change Requires to PreReg for requiring of policycoreutils on install- New upstream releaseAdd xdm policyUpdate from upstreamUpdate from upstreamUpdate from upstream- Also trigger to rebuild policy for versions up to 2.0.7.- No longer installing policy.20 file, anaconda handles the building of the app.- Fixes for dovecot and saslauthd- Cleanup pegasus and named - Fix spec file - Fix up passwd changing applications-Update to latest from upstream- Add rules for pegasus and avahi- Start building MLS Policy- Update to upstream- Turn on bash- Initial version/bin/sh  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'())+,-./0123456789:;<=>?@ABCDEFGHI3.13.1-192.el7_5.4    develMakefileexample.fcexample.ifexample.tehtmlNetworkManager.htmlabrt.htmlabrt_dump_oops.htmlabrt_handle_event.htmlabrt_helper.htmlabrt_retrace_coredump.htmlabrt_retrace_worker.htmlabrt_upload_watch.htmlabrt_watch_log.htmlaccountsd.htmlacct.htmladmin_crontab.htmlafs.htmlafs_bosserver.htmlafs_fsserver.htmlafs_kaserver.htmlafs_ptserver.htmlafs_vlserver.htmlaiccu.htmlaide.htmlajaxterm.htmlajaxterm_ssh.htmlalsa.htmlamanda.htmlamanda_recover.htmlamtu.htmlanaconda.htmlanon_sftpd.htmlantivirus.htmlapcupsd.htmlapcupsd_cgi_script.htmlapm.htmlapmd.htmlarpwatch.htmlasterisk.htmlaudisp.htmlaudisp_remote.htmlauditadm.htmlauditadm_screen.htmlauditadm_su.htmlauditadm_sudo.htmlauditctl.htmlauditd.htmlauthconfig.htmlautomount.htmlavahi.htmlawstats.htmlawstats_script.htmlbacula.htmlbacula_admin.htmlbacula_unconfined_script.htmlbcfg2.htmlbitlbee.htmlblkmapd.htmlblktap.htmlblueman.htmlbluetooth.htmlbluetooth_helper.htmlboinc.htmlboinc_project.htmlbootloader.htmlbrctl.htmlbrltty.htmlbugzilla_script.htmlbumblebee.htmlcachefiles_kernel.htmlcachefilesd.htmlcalamaris.htmlcallweaver.htmlcanna.htmlcardmgr.htmlccs.htmlcdcc.htmlcdrecord.htmlcertmaster.htmlcertmonger.htmlcertmonger_unconfined.htmlcertwatch.htmlcfengine_execd.htmlcfengine_monitord.htmlcfengine_serverd.htmlcgclear.htmlcgconfig.htmlcgdcbxd.htmlcgred.htmlcheckpc.htmlcheckpolicy.htmlchfn.htmlchkpwd.htmlchrome_sandbox.htmlchrome_sandbox_nacl.htmlchronyc.htmlchronyd.htmlchroot_user.htmlcinder_api.htmlcinder_backup.htmlcinder_scheduler.htmlcinder_volume.htmlciped.htmlclogd.htmlcloud_init.htmlcluster.htmlclvmd.htmlcmirrord.htmlcobblerd.htmlcockpit_session.htmlcockpit_ws.htmlcollectd.htmlcollectd_script.htmlcolord.htmlcomsat.htmlcondor_collector.htmlcondor_master.htmlcondor_negotiator.htmlcondor_procd.htmlcondor_schedd.htmlcondor_startd.htmlcondor_startd_ssh.htmlconman.htmlconman_unconfined_script.htmlconsolekit.htmlcontainer.htmlcontainer_auth.htmlcontainer_runtime.htmlcouchdb.htmlcourier_authdaemon.htmlcourier_pcp.htmlcourier_pop.htmlcourier_sqwebmail.htmlcourier_tcpd.htmlcpucontrol.htmlcpufreqselector.htmlcpuplug.htmlcpuspeed.htmlcrack.htmlcrond.htmlcronjob.htmlcrontab.htmlctdbd.htmlcups_pdf.htmlcupsd.htmlcupsd_config.htmlcupsd_lpd.htmlcvs.htmlcvs_script.htmlcyphesis.htmlcyrus.htmldbadm.htmldbadm_sudo.htmldbskkd.htmldcc_client.htmldcc_dbclean.htmldccd.htmldccifd.htmldccm.htmldcerpcd.htmlddclient.htmldeltacloudd.htmldenyhosts.htmldepmod.htmldevicekit.htmldevicekit_disk.htmldevicekit_power.htmldhcpc.htmldhcpd.htmldictd.htmldirsrv.htmldirsrv_snmp.htmldirsrvadmin.htmldirsrvadmin_script.htmldirsrvadmin_unconfined_script.htmldisk_munin_plugin.htmldkim_milter.htmldlm_controld.htmldmesg.htmldmidecode.htmldnsmasq.htmldnssec_trigger.htmldovecot.htmldovecot_auth.htmldovecot_deliver.htmldrbd.htmldspam.htmldspam_script.htmlentropyd.htmleventlogd.htmlevtchnd.htmlexim.htmlfail2ban.htmlfail2ban_client.htmlfcoemon.htmlfenced.htmlfetchmail.htmlfingerd.htmlfirewalld.htmlfirewallgui.htmlfirstboot.htmlfoghorn.htmlfprintd.htmlfreeipmi_bmc_watchdog.htmlfreeipmi_ipmidetectd.htmlfreeipmi_ipmiseld.htmlfreqset.htmlfsadm.htmlfsdaemon.htmlftpd.htmlftpdctl.htmlgames.htmlgames_srv.htmlganesha.htmlgconfd.htmlgconfdefaultsm.htmlgdomap.htmlgeoclue.htmlgetty.htmlgfs_controld.htmlgit_script.htmlgit_session.htmlgit_system.htmlgitosis.htmlglance_api.htmlglance_registry.htmlglance_scrubber.htmlglusterd.htmlgnomesystemmm.htmlgpg.htmlgpg_agent.htmlgpg_helper.htmlgpg_pinentry.htmlgpg_web.htmlgpm.htmlgpsd.htmlgreylist_milter.htmlgroupadd.htmlgroupd.htmlgssd.htmlgssproxy.htmlguest.htmlhaproxy.htmlhddtemp.htmlhostname.htmlhsqldb.htmlhttpd.htmlhttpd_helper.htmlhttpd_passwd.htmlhttpd_php.htmlhttpd_rotatelogs.htmlhttpd_suexec.htmlhttpd_sys_script.htmlhttpd_unconfined_script.htmlhttpd_user_script.htmlhwclock.htmlhwloc_dhwd.htmlhypervkvp.htmlhypervvssd.htmliceauth.htmlicecast.htmlifconfig.htmlindex.htmlinetd.htmlinetd_child.htmlinit.htmlinitrc.htmlinnd.htmlinsmod.htmlinstall.htmliodined.htmliotop.htmlipa_dnskey.htmlipa_helper.htmlipa_otpd.htmlipmievd.htmlipsec.htmlipsec_mgmt.htmliptables.htmlirc.htmlirqbalance.htmlirssi.htmliscsid.htmlisnsd.htmliwhd.htmljabberd.htmljabberd_router.htmljockey.htmljournalctl.htmlkadmind.htmlkdump.htmlkdumpctl.htmlkdumpgui.htmlkeepalived.htmlkeepalived_unconfined_script.htmlkernel.htmlkeyboardd.htmlkeystone.htmlkeystone_cgi_script.htmlkismet.htmlklogd.htmlkmscon.htmlkpropd.htmlkrb5kdc.htmlksmtuned.htmlktalkd.htmll2tpd.htmlldconfig.htmllircd.htmllivecd.htmllldpad.htmlload_policy.htmlloadkeys.htmllocal_login.htmllocate.htmllockdev.htmllogadm.htmllogrotate.htmllogrotate_mail.htmllogwatch.htmllogwatch_mail.htmllpd.htmllpr.htmllsassd.htmllsmd.htmllsmd_plugin.htmllttng_sessiond.htmllvm.htmllwiod.htmllwregd.htmllwsmd.htmlmail_munin_plugin.htmlmailman_cgi.htmlmailman_mail.htmlmailman_queue.htmlman2html_script.htmlmandb.htmlmcelog.htmlmdadm.htmlmediawiki_script.htmlmemcached.htmlmencoder.htmlminidlna.htmlminissdpd.htmlmip6d.htmlmirrormanager.htmlmock.htmlmock_build.htmlmodemmanager.htmlmojomojo_script.htmlmon_procd.htmlmon_statd.htmlmongod.htmlmotion.htmlmount.htmlmount_ecryptfs.htmlmozilla.htmlmozilla_plugin.htmlmozilla_plugin_config.htmlmpd.htmlmplayer.htmlmrtg.htmlmscan.htmlmunin.htmlmunin_script.htmlmysqld.htmlmysqld_safe.htmlmysqlmanagerd.htmlmythtv_script.htmlnagios.htmlnagios_admin_plugin.htmlnagios_checkdisk_plugin.htmlnagios_eventhandler_plugin.htmlnagios_mail_plugin.htmlnagios_openshift_plugin.htmlnagios_script.htmlnagios_services_plugin.htmlnagios_system_plugin.htmlnagios_unconfined_plugin.htmlnamed.htmlnamespace_init.htmlncftool.htmlndc.htmlnetlabel_mgmt.htmlnetlogond.htmlnetutils.htmlneutron.htmlnewrole.htmlnfsd.htmlninfod.htmlnmbd.htmlnova.htmlnrpe.htmlnscd.htmlnsd.htmlnsd_crond.htmlnslcd.htmlntop.htmlntpd.htmlnumad.htmlnut_upsd.htmlnut_upsdrvctl.htmlnut_upsmon.htmlnutups_cgi_script.htmlnx_server.htmlnx_server_ssh.htmlobex.htmloddjob.htmloddjob_mkhomedir.htmlopenct.htmlopendnssec.htmlopenhpid.htmlopenshift.htmlopenshift_app.htmlopenshift_cgroup_read.htmlopenshift_cron.htmlopenshift_initrc.htmlopenshift_net_read.htmlopenshift_script.htmlopensm.htmlopenvpn.htmlopenvpn_unconfined_script.htmlopenvswitch.htmlopenwsman.htmloracleasm.htmlosad.htmlpads.htmlpam_console.htmlpam_timestamp.htmlpassenger.htmlpasswd.htmlpcp_pmcd.htmlpcp_pmie.htmlpcp_pmlogger.htmlpcp_pmmgr.htmlpcp_pmproxy.htmlpcp_pmwebd.htmlpcscd.htmlpegasus.htmlpegasus_openlmi_account.htmlpegasus_openlmi_admin.htmlpegasus_openlmi_logicalfile.htmlpegasus_openlmi_services.htmlpegasus_openlmi_storage.htmlpegasus_openlmi_system.htmlpegasus_openlmi_unconfined.htmlpesign.htmlphc2sys.htmlping.htmlpingd.htmlpiranha_fos.htmlpiranha_lvs.htmlpiranha_pulse.htmlpiranha_web.htmlpkcs_slotd.htmlpki_ra.htmlpki_tomcat.htmlpki_tomcat_script.htmlpki_tps.htmlplymouth.htmlplymouthd.htmlpodsleuth.htmlpolicykit.htmlpolicykit_auth.htmlpolicykit_grant.htmlpolicykit_resolve.htmlpolipo.htmlpolipo_session.htmlportmap.htmlportmap_helper.htmlportreserve.htmlpostfix_bounce.htmlpostfix_cleanup.htmlpostfix_local.htmlpostfix_map.htmlpostfix_master.htmlpostfix_pickup.htmlpostfix_pipe.htmlpostfix_postdrop.htmlpostfix_postqueue.htmlpostfix_qmgr.htmlpostfix_showq.htmlpostfix_smtp.htmlpostfix_smtpd.htmlpostfix_virtual.htmlpostgresql.htmlpostgrey.htmlpppd.htmlpptp.htmlprelink.htmlprelink_cron_system.htmlprelude.htmlprelude_audisp.htmlprelude_correlator.htmlprelude_lml.htmlpreupgrade.htmlprewikka_script.htmlprivoxy.htmlprocmail.htmlprosody.htmlpsad.htmlptal.htmlptchown.htmlptp4l.htmlpublicfile.htmlpulseaudio.htmlpuppetagent.htmlpuppetca.htmlpuppetmaster.htmlpwauth.htmlpyicqt.htmlqdiskd.htmlqemu_dm.htmlqmail_clean.htmlqmail_inject.htmlqmail_local.htmlqmail_lspawn.htmlqmail_queue.htmlqmail_remote.htmlqmail_rspawn.htmlqmail_send.htmlqmail_smtpd.htmlqmail_splogger.htmlqmail_start.htmlqmail_tcp_env.htmlqpidd.htmlquota.htmlquota_nld.htmlrabbitmq.htmlracoon.htmlradiusd.htmlradvd.htmlrasdaemon.htmlrdisc.htmlreadahead.htmlrealmd.htmlrealmd_consolehelper.htmlredis.htmlregex_milter.htmlremote_login.htmlrestorecond.htmlrhev_agentd.htmlrhev_agentd_consolehelper.htmlrhgb.htmlrhnsd.htmlrhsmcertd.htmlricci.htmlricci_modcluster.htmlricci_modclusterd.htmlricci_modlog.htmlricci_modrpm.htmlricci_modservice.htmlricci_modstorage.htmlrlogind.htmlrngd.htmlroundup.htmlrpcbind.htmlrpcd.htmlrpm.htmlrpm_script.htmlrshd.htmlrssh.htmlrssh_chroot_helper.htmlrsync.htmlrtas_errd.htmlrtkit_daemon.htmlrun_init.htmlrwho.htmlsamba_net.htmlsamba_unconfined_net.htmlsamba_unconfined_script.htmlsambagui.htmlsandbox.htmlsandbox_min.htmlsandbox_min_client.htmlsandbox_net.htmlsandbox_net_client.htmlsandbox_web.htmlsandbox_web_client.htmlsandbox_x.htmlsandbox_x_client.htmlsandbox_xserver.htmlsanlk_resetd.htmlsanlock.htmlsaslauthd.htmlsbd.htmlsblim_gatherd.htmlsblim_reposd.htmlsblim_sfcbd.htmlsecadm.htmlsecadm_screen.htmlsecadm_su.htmlsecadm_sudo.htmlsectoolm.htmlselinux_munin_plugin.htmlsemanage.htmlsendmail.htmlsensord.htmlsepgsql_ranged_proc.htmlsepgsql_trusted_proc.htmlservices_munin_plugin.htmlsetfiles.htmlsetfiles_mac.htmlsetkey.htmlsetrans.htmlsetroubleshoot_fixit.htmlsetroubleshootd.htmlsetsebool.htmlsftpd.htmlsge_execd.htmlsge_job.htmlsge_job_ssh.htmlsge_shepherd.htmlshorewall.htmlshowmount.htmlslapd.htmlslpd.htmlsmbcontrol.htmlsmbd.htmlsmbmount.htmlsmokeping.htmlsmokeping_cgi_script.htmlsmoltclient.htmlsmsd.htmlsnapperd.htmlsnmpd.htmlsnort.htmlsosreport.htmlsoundd.htmlspamass_milter.htmlspamc.htmlspamd.htmlspamd_update.htmlspc.htmlspeech-dispatcher.htmlsquid.htmlsquid_cron.htmlsquid_script.htmlsrvsvcd.htmlssh.htmlssh_keygen.htmlssh_keysign.htmlsshd.htmlsshd_keygen.htmlsshd_net.htmlsshd_sandbox.htmlsssd.htmlsssd_selinux_manager.htmlstaff.htmlstaff_consolehelper.htmlstaff_dbusd.htmlstaff_gkeyringd.htmlstaff_screen.htmlstaff_seunshare.htmlstaff_ssh_agent.htmlstaff_sudo.htmlstaff_wine.htmlstapserver.htmlstunnel.htmlstyle.csssulogin.htmlsvc_multilog.htmlsvc_run.htmlsvc_start.htmlsvirt.htmlsvirt_kvm_net.htmlsvirt_qemu_net.htmlsvirt_socket.htmlsvirt_tcg.htmlsvnserve.htmlswat.htmlswift.htmlsysadm.htmlsysadm_dbusd.htmlsysadm_passwd.htmlsysadm_screen.htmlsysadm_seunshare.htmlsysadm_ssh_agent.htmlsysadm_su.htmlsysadm_sudo.htmlsyslogd.htmlsysstat.htmlsystem_cronjob.htmlsystem_dbusd.htmlsystem_mail.htmlsystem_munin_plugin.htmlsystemd_bootchart.htmlsystemd_hostnamed.htmlsystemd_hwdb.htmlsystemd_initctl.htmlsystemd_localed.htmlsystemd_logger.htmlsystemd_logind.htmlsystemd_machined.htmlsystemd_networkd.htmlsystemd_notify.htmlsystemd_passwd_agent.htmlsystemd_resolved.htmlsystemd_sysctl.htmlsystemd_timedated.htmlsystemd_tmpfiles.htmltargetd.htmltcpd.htmltcsd.htmltelepathy_gabble.htmltelepathy_idle.htmltelepathy_logger.htmltelepathy_mission_control.htmltelepathy_msn.htmltelepathy_salut.htmltelepathy_sofiasip.htmltelepathy_stream_engine.htmltelepathy_sunshine.htmltelnetd.htmltftpd.htmltgtd.htmlthin.htmlthin_aeolus_configserver.htmlthumb.htmltimemaster.htmltmpreaper.htmltomcat.htmltor.htmltraceroute.htmltuned.htmltvtime.htmludev.htmlulogd.htmluml.htmluml_switch.htmlunconfined.htmlunconfined_cronjob.htmlunconfined_dbusd.htmlunconfined_mount.htmlunconfined_munin_plugin.htmlunconfined_sendmail.htmlunconfined_service.htmlupdate_modules.htmlupdfstab.htmlupdpwd.htmlusbmodules.htmlusbmuxd.htmluser.htmluser_dbusd.htmluser_gkeyringd.htmluser_mail.htmluser_screen.htmluser_seunshare.htmluser_ssh_agent.htmluser_wine.htmluseradd.htmlusernetctl.htmlutempter.htmluucpd.htmluuidd.htmluux.htmlvarnishd.htmlvarnishlog.htmlvdagent.htmlvhostmd.htmlvirsh.htmlvirsh_ssh.htmlvirt_bridgehelper.htmlvirt_qemu_ga.htmlvirt_qemu_ga_unconfined.htmlvirt_qmf.htmlvirtd.htmlvirtd_lxc.htmlvirtlogd.htmlvlock.htmlvmtools.htmlvmtools_helper.htmlvmware.htmlvmware_host.htmlvnstat.htmlvnstatd.htmlvpnc.htmlw3c_validator_script.htmlwatchdog.htmlwatchdog_unconfined.htmlwdmd.htmlwebadm.htmlwebalizer.htmlwebalizer_script.htmlwinbind.htmlwinbind_helper.htmlwine.htmlwireshark.htmlwpa_cli.htmlxauth.htmlxdm.htmlxdm_unconfined.htmlxenconsoled.htmlxend.htmlxenstored.htmlxguest.htmlxguest_dbusd.htmlxguest_gkeyringd.htmlxserver.htmlypbind.htmlyppasswdd.htmlypserv.htmlypxfr.htmlzabbix.htmlzabbix_agent.htmlzabbix_script.htmlzarafa_deliver.htmlzarafa_gateway.htmlzarafa_ical.htmlzarafa_indexer.htmlzarafa_monitor.htmlzarafa_server.htmlzarafa_spooler.htmlzebra.htmlzoneminder.htmlzoneminder_script.htmlzos_remote.htmlincludeMakefileadminadmin.xmlbootloader.ifconsoletype.ifdmesg.ifnetutils.ifsu.ifsudo.ifusermanage.ifappsapps.xmlseunshare.ifbuild.confcontribcontrib.xmlabrt.ifaccountsd.ifacct.ifada.ifafs.ifaiccu.ifaide.ifaisexec.ifajaxterm.ifalsa.ifamanda.ifamavis.ifamtu.ifanaconda.ifantivirus.ifapache.ifapcupsd.ifapm.ifapt.ifarpwatch.ifasterisk.ifauthbind.ifauthconfig.ifautomount.ifavahi.ifawstats.ifbackup.ifbacula.ifbcfg2.ifbind.ifbird.ifbitlbee.ifblkmapd.ifblueman.ifbluetooth.ifboinc.ifbrctl.ifbrltty.ifbugzilla.ifbumblebee.ifcachefilesd.ifcalamaris.ifcallweaver.ifcanna.ifccs.ifcdrecord.ifcertmaster.ifcertmonger.ifcertwatch.ifcfengine.ifcgdcbxd.ifcgroup.ifchrome.ifchronyd.ifcinder.ifcipe.ifclamav.ifclockspeed.ifclogd.ifcloudform.ifcmirrord.ifcobbler.ifcockpit.ifcollectd.ifcolord.ifcomsat.ifcondor.ifconman.ifconsolekit.ifcontainer.ifcorosync.ifcouchdb.ifcourier.ifcpucontrol.ifcpufreqselector.ifcpuplug.ifcron.ifctdb.ifcups.ifcvs.ifcyphesis.ifcyrus.ifdaemontools.ifdante.ifdbadm.ifdbskk.ifdbus.ifdcc.ifddclient.ifddcprobe.ifdenyhosts.ifdevicekit.ifdhcp.ifdictd.ifdirmngr.ifdirsrv-admin.ifdirsrv.ifdistcc.ifdjbdns.ifdkim.ifdmidecode.ifdnsmasq.ifdnssec.ifdnssectrigger.ifdovecot.ifdpkg.ifdrbd.ifdspam.ifentropyd.ifetcd.ifevolution.ifexim.iffail2ban.iffcoe.iffetchmail.iffinger.iffirewalld.iffirewallgui.iffirstboot.iffprintd.iffreeipmi.iffreqset.ifftp.ifgames.ifganesha.ifgatekeeper.ifgdomap.ifgear.ifgeoclue.ifgift.ifgit.ifgitosis.ifglance.ifglusterd.ifgnome.ifgnomeclock.ifgpg.ifgpm.ifgpsd.ifgssproxy.ifguest.ifhadoop.ifhal.ifhddtemp.ifhostapd.ifhowl.ifhsqldb.ifhwloc.ifhypervkvp.ifi18n_input.ificecast.ififplugd.ifimaze.ifinetd.ifinn.ifiodine.ifiotop.ifipa.ifipmievd.ifirc.ifircd.ifirqbalance.ifiscsi.ifisns.ifjabber.ifjava.ifjetty.ifjockey.ifjournalctl.ifkde.ifkdump.ifkdumpgui.ifkeepalived.ifkerberos.ifkerneloops.ifkeyboardd.ifkeystone.ifkismet.ifkmscon.ifksmtuned.ifktalk.ifkudzu.ifl2tp.ifldap.iflightsquid.iflikewise.iflinuxptp.iflircd.iflivecd.iflldpad.ifloadkeys.iflockdev.iflogrotate.iflogwatch.iflpd.iflsm.iflttng-tools.ifmailman.ifmailscanner.ifman2html.ifmandb.ifmcelog.ifmcollective.ifmediawiki.ifmemcached.ifmilter.ifminidlna.ifminissdpd.ifmip6d.ifmirrormanager.ifmock.ifmodemmanager.ifmojomojo.ifmon_statd.ifmongodb.ifmono.ifmonop.ifmotion.ifmozilla.ifmpd.ifmplayer.ifmrtg.ifmta.ifmunin.ifmysql.ifmythtv.ifnaemon.ifnagios.ifnamespace.ifncftool.ifnessus.ifnetworkmanager.ifninfod.ifnis.ifnova.ifnscd.ifnsd.ifnslcd.ifnsplugin.ifntop.ifntp.ifnumad.ifnut.ifnx.ifoav.ifobex.ifoddjob.ifoident.ifopenca.ifopenct.ifopendnssec.ifopenhpi.ifopenhpid.ifopenshift-origin.ifopenshift.ifopensm.ifopenvpn.ifopenvswitch.ifopenwsman.iforacleasm.ifosad.ifpacemaker.ifpads.ifpassenger.ifpcmcia.ifpcp.ifpcscd.ifpegasus.ifperdition.ifpesign.ifpingd.ifpiranha.ifpkcs.ifpki.ifplymouthd.ifpodsleuth.ifpolicykit.ifpolipo.ifportage.ifportmap.ifportreserve.ifportslave.ifpostfix.ifpostfixpolicyd.ifpostgrey.ifppp.ifprelink.ifprelude.ifprivoxy.ifprocmail.ifprosody.ifpsad.ifptchown.ifpublicfile.ifpulseaudio.ifpuppet.ifpwauth.ifpxe.ifpyzor.ifqemu.ifqmail.ifqpid.ifquantum.ifquota.ifrabbitmq.ifradius.ifradvd.ifraid.ifrasdaemon.ifrazor.ifrdisc.ifreadahead.ifrealmd.ifredis.ifremotelogin.ifresmgr.ifrgmanager.ifrhcs.ifrhev.ifrhgb.ifrhnsd.ifrhsmcertd.ifricci.ifrkhunter.ifrlogin.ifrngd.ifrolekit.ifroundup.ifrpc.ifrpcbind.ifrpm.ifrshd.ifrssh.ifrsync.ifrtas.ifrtkit.ifrwho.ifsamba.ifsambagui.ifsamhain.ifsandbox.ifsandboxX.ifsanlock.ifsasl.ifsbd.ifsblim.ifscreen.ifsectoolm.ifsendmail.ifsensord.ifsetroubleshoot.ifsge.ifshorewall.ifshutdown.ifslocate.ifslpd.ifslrnpull.ifsmartmon.ifsmokeping.ifsmoltclient.ifsmsd.ifsmstools.ifsnapper.ifsnmp.ifsnort.ifsosreport.ifsoundserver.ifspamassassin.ifspeech-dispatcher.ifspeedtouch.ifsquid.ifsssd.ifstapserver.ifstunnel.ifsvnserve.ifswift.ifswift_alias.ifsxid.ifsysstat.iftargetd.iftcpd.iftcsd.iftelepathy.iftelnet.iftftp.iftgtd.ifthin.ifthumb.ifthunderbird.iftimidity.iftmpreaper.iftomcat.iftor.iftransproxy.iftripwire.iftuned.iftvtime.iftzdata.ifucspitcp.ifulogd.ifuml.ifupdfstab.ifuptime.ifusbmodules.ifusbmuxd.ifuserhelper.ifusernetctl.ifuucp.ifuuidd.ifuwimap.ifvarnishd.ifvbetool.ifvdagent.ifvhostmd.ifvirt.ifvlock.ifvmtools.ifvmware.ifvnstatd.ifvpn.ifw3c.ifwatchdog.ifwdmd.ifwebadm.ifwebalizer.ifwine.ifwireshark.ifwm.ifxen.ifxfs.ifxguest.ifxprint.ifxscreensaver.ifyam.ifzabbix.ifzarafa.ifzebra.ifzoneminder.ifzosremote.ifglobal_booleans.xmlglobal_tunables.xmlkernelkernel.xmlcorecommands.ifcorenetwork.ifdevices.ifdomain.iffiles.iffilesystem.ifkernel.ifmcs.ifmls.ifselinux.ifstorage.ifterminal.ifubac.ifunlabelednet.ifrolesroles.xmlauditadm.iflogadm.ifsecadm.ifstaff.ifsysadm.ifsysadm_secadm.ifunconfineduser.ifunprivuser.ifservicesservices.xmlpostgresql.ifssh.ifxserver.ifsupportall_perms.sptdivert.m4file_patterns.sptipc_patterns.sptloadable_module.sptmisc_macros.sptmisc_patterns.sptmls_mcs_macros.sptobj_perm_sets.sptpolicy.dtdsegenxml.pysegenxml.pycsegenxml.pyoundivert.m4systemsystem.xmlapplication.ifauthlogin.ifclock.iffstools.ifgetty.ifhostname.ifhotplug.ifinit.ifipsec.ifiptables.iflibraries.iflocallogin.iflogging.iflvm.ifmiscfiles.ifmodutils.ifmount.ifnetlabel.ifselinuxutil.ifsetrans.ifsysnetwork.ifsystemd.ifudev.ifunconfined.ifuserdomain.ifpolicy.dtdpolicy.xmlinterface_info/usr/share/selinux//usr/share/selinux/devel//usr/share/selinux/devel/html//usr/share/selinux/devel/include//usr/share/selinux/devel/include/admin//usr/share/selinux/devel/include/apps//usr/share/selinux/devel/include/contrib//usr/share/selinux/devel/include/kernel//usr/share/selinux/devel/include/roles//usr/share/selinux/devel/include/services//usr/share/selinux/devel/include/support//usr/share/selinux/devel/include/system//var/lib/sepolgen/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=genericcpioxz9noarch-redhat-linux-gnu  directoryASCII textSE Linux policy interface sourceSE Linux policy module sourceHTML document, ASCII textmakefile script, ASCII textC++ source, ASCII textASCII text, with very long linesASCII text, with no line terminatorsPython script, ASCII text executablepython 2.7 byte-compiledXML 1.0 document, ASCII textcannot open (No such file or directory)?`7zXZ !X] crt:bLLlٵi.u;AN%Ti9'}k9$i0Aeî=ȱo^ǐ@ jt)g^9$DQhNOi߄]'VϞ6"k\tW'>%{tBR-?__Dڍl3!o1Z@Ew{KUĺd$۷06nC5WjV,.ZOt 4a޳)qŧ͕QA`5_C^Tw:3VAb&*7٢"۞ z+G_¤;?=^~Ix:z|H1ї}o_aRDlڨ:D *`kj[Ypohl&.K] Ë𶾵FcľSq2ufLRWV(BU|Qxϲ$Gqk''j#)I7"h;pgkE\napɝ#J]a$z@#b(=jI;Oh̢x厠PWPEn͏y?閉)Rw75n3 >苄ac\y^v>[3-UZ@XåH2i=z*)>Th$yS(9u9 4:ɘE@y毃| ah e`>-VAhBZVMu&Ӈ2d\Di}LtC^qx,xX[-g~i:C| 1xƣVv`Z2d4 $Lz#(#uch .H U蕔Qҩ $êƂ.UnV4]r׸u^Stb)JAdp4P ,w1hd(*X/=KP"Án@,Zv[թ:0wkk{B9F!ֆx6|39L4obS\!"R6eS}O,=7SLkZJd̍m-aa_}o9~p f]gDBS@n{תU >.)0X|U@Oۯ|-AEq=8 ׽2AS[\^5@xx\RwVǼS%lAK %\&_4y+Pkx%g3XXnA>{H0} e2t*Z9UdE$1g>٢o:Wm3/6GgSJhڸπհjIK1sAwۆ]@98N^%$Wd;%rjSuRs狼\Xtufa(Z Di3P@=p^K*H@TΗ^8{؏V[)U(b?LTIг<357s$h; YX~jIإ%XtvsAyɮþ#*Q5o( BFĠ Hٙ'qqãBb$Ŀft.3y6C5jrsCiTi`.g8E^~W]Smv)B%//)YĂT[5FdR hUn@"Jx&UnʭV:P|T\mGʋ|FV:}:/W>SYVShH:߅.p$hxhZ7{L?ErՒ~5Uc3gRR 909|y\>!aNG݊ธ^qZjmx "T)"t,ɂ|)n7KX]H_7-\XG9PXIvDh􁉫5 { ~/1֘'N)ZG=h^tzdTǷq!d@ev^!ҍ^ӽ1 hf-@Rw؍RCyMw+_[m* QU%m[Z.O5bRT"FgՃօ`Z~f%L|J푿ZbbԄ#;lL) dq#9sG'eYT4:\hεڌfI  &%~$FlZǖ:ҵ@#k]^awn%])?a/ĥw{2d2ӧ)Y[K  W13xS֐yESuS> {6@<( cXf*%R&+Ӻc~ d_-V9 g")'I{r"4¦x1”Z s)ZNs%[4wUZ=f⚵z$Jʚ%%ex^HQ(BTȁ}ph9k,MZ]]Pt,@#U oU~{.-am:!+T7t |h JV%u O0glٞ?s0<[춢_RIEgձFH1U)IΊ _5>L00%92qo-8ͦX`AR'0\w'>be@+[rq`Ҡ/xCC yD,(j~)!-JG!$rvX 7<炟5{ +(途YѶzK&T ˁ Hji̍'JU1 o:,*.GG3't?~\R8OV4lTU>W|UU؛~.kh^w*<8-㏥rVxlF}Ji5@,yZez\Td5dO?|S#lBr 6$ڗ=dz=`4ik)Z3*WXǖ”1A|-f@UkrL63'3c|^{1]NUB)"Mx3qY |׎0v=\_1;n/KҧjBR{U9 CSF\y,1=Nnugq)y0=D)@]ćTʎo%_ޚ[3M3P:z1ńQ?6/щVr.:\_/bN7cC ZN%6 ZQ>s%WˍjnW)d"wdq:0eQp̸^GH!RA^Q^Kq4nFDrK_֝3cq ._`[;cRg?:`ޏ77;5˱DWor@gWN=7NqM9$:vN َo@"fW-},6D"x'Ib1h `mI=nܨ^cܚ尢мs]7u|Ѻ-wHbʱKmNuV;%-QJe2Zp?n0"?VZxϸ1>=1KsiC35be]ؕ G~{tT9|"0melltO̓Tq|å #F(4eb} k#L4@hEb1=K2gom9RE3_*;iVbAQ.Q9_q8'XC0lZ`uTD `"4w .K򋬽&\vʧZMsv̏smkx~8Ֆ℅k 'JmXpT V{ix1g͔Q-x ,q]E*(N6Ů3;b X{I`&,zzУ; #<v-NGwgbnA,)2s5r^D5ĎCZps"G;_mc5[tiBar 0.4bU=FG 2>L3/z4_)\ŊawOD*I^2۵k W;dz*KґoMN$?W9[,ͩxsZ⪼|3/ti`kQy@eh!g]*;yz.X{\en/뫌cX{ r/2 `: hG-`Phbl9jΔN(#yyS榜0T6  c~PkGZ8d7oqVZLjNKZz*k 1]J"C&1,zxcJd5NQ$qrl"&gr$K2YGm%{Zt8Y56P сC:kq4tó|\g }4hm%-GwA>0~(pLqǶ^-h.3WX&` yaVLє0%+ϩ0Sod9ٹTB_3";6u6 NFcpJ1'x˝o``@=KٰlP0k]NJ F"ǔZ`2+|8j6[elkBoZ,^Pj"~o|RŚI|ߡ<+wg>QA{(!щY"D)Ɉ+`ȷԵ 4XVPj~$Yy2m.bqfW!C){yc^cdE N CZz}*N }?$`pnMzRow?/.:Jgc0 į32YsYFd\Y f9^s9E@7J]?N00;_;l!7J^)k>DA\w]٨?k r dx$GkNAkVH@[>QR7W5-;:Cj1m8+j 'tv@jW #WZY7UdS~RZǕ+ 5jΤگXWkz!35jX]V1=:ѲJzk91kу) |h1c&\-|݉b% Iڀa/O3emCe}4f> $ b.sU:\ .NE7a9!KvQ1JQW7j͆i<[ m;22uJD`!{>- *0"?4"#v ?M_K80>fZ[i1'lΟղ/?N9lVyVM0t=Wfs!-qR&@֫.=ac)C-`HND&<f7oCM{n.q;!!T'lЁ 9 btՊ,|S?R*mV{(wL~ˁnYk灱dVoVP0uݘMnx52dgiyPf* 8M#󰛹K(Y|Y DF2`=}/mw A#MTPU/ui ^~'!xkHcڱJ@c|NCD 3";vgHGY }'۰4ͤp^㕞~2bB=6 02{ 95j/%N^gbVxq^G΂4^jY^JrgS+l)\#%#j]:L &n Ob6V= UZkqqI)S.bסoYںBnz;QB M:`'`Uŵ+! Go\J3z 9[4՟ônmv*uGb,ul[#W(OObRZ멠qך+_ƻp~$ `j^'󋇈~nzX3AD,$kDZjTKD6Ƣ v  8ozz XsY\e"jLn=0f?-s鰢 =._NV%**Bo=O?#Z,”Fu%s(So_<,;)m9@ BߓkriJ/m%i"J+2I C$*KqliLurй \I13Od Ϭ {W0,*S }4EO.0s+4WAk,U}1NVj=~Ԯ mC~A^]6 ò2C-Z$Z+K _u+01 ,7z HIkz*L8o%(<:`'7F絨,x.kT /N3kE1(;ȸ:mfQD6(Nծ> 4x{GKEoDCRX3\&yo T_+;ll4mQy_$sSqs!$)cAj&95C]m 8|)AҝO%O^'NyהUfOaZhJXBDlGr58|/ꄫV&,GOe-[oDHOyr ƹxCgysXxsS .ER %+ɯ [&àO{'2Lp-U[S]Q6jd%Gy"v:я?ao2ug[0yw3C& 腜JefS!jɳέNZЊ oB9lpH)vM 'HKKdVAXJ1L&{):NS qhS9H,k;%ο"qSH̸#^r4%dH\(WlB*JH=XMW9倐)7 n VF=ᔸM$Kz)f[-J`ؖ]b+D4v%G@-L*o,M /)qJn?DJǑ=wD&=Hl /lqA;N,16qtPŚ,{% 9H~ %ӯ^k:mWO5Ntt 7sJJN;Z#PJ\<~x-g<7 AӎdTt9ЗA}eSIj*FVFLEϜvrCH,x'Q>[&V{-M@Yjr[kkoh' bFi?go?G*μiu6Vme[> :rT* /wwܼ$? .]N^wGJ~1o&X[LYf',pK})YJͺ@{XkǏR3~Ar!D)T- 6|Z<%!;K7 4ls>{؋/d@Z)qfuZUir?k](+[[sƽL:x.6i|膘_-ܲf7C hj.U@$MF4P3T9]։3?T|!ʤS0-_/X 2,5mu_Kc|Si"n qbB,~ܬ=W[uo?P=FUU=ȸ$Qy)VNUA@O jOjlYa:ҏA}I{iJ}%3PGv*gP':}442 JHԳRb&KL4oA3([7?p\aY;pcx(`Co3'A9R^%q'UiUeq5`:y\/k:6m[Hi90T!sf8Gɢfϗ &'w" /c0R3jr_D#Jp]&|4U3g_ް/"CL7Pxڣ}Wt6M#++҉f=b$bI\\& NN'V2C[휩 H6 w-E*f$YeW+f+#N}{ SB2wmmjx.LI ve!u^1+~m{NT';|ENK0nNmҏgB0WH9D5#}d ;r%d$.;S % u4Ph D|57G"Rx`@ĶQ-yqN;tf;y_lsm p,.ɨUr2&m=vE0yEM̏óB-le)dC _) ~oy,YYVfm/brdi |5pPur:Yt7Rg4{EP Z󯵆̪'  ԿQ!~KA3xL d!im7g_NL ~P|oъ3u9P,Y,h߯bNB$ @_TT3Ƙ@݊U9m j57eCZMD),#q˄:dtX"Fj~*?B&S%Y:?yވqu.jF'I1Pl 8)ֱpB5zRvՌ>&/u38E'lLR ͷX;6kS_5k,ݷGcyũ94q鯸ӭr9- '湥gw]yC#.lдe?.'yO#Y8Ƃ @e;_i?<Ǩ;k8D(YQ /IDܴxX`@u#$,G^AP BD+^N`6T3$DžREm݈ !U҈vVx.S#bv[3S“=HIt<:M濒`N^ 2!U[z*xȁW$ƞ iǰlS=Xڦ2(VY%Gqm#\|]ݞZbWhހ49DY:8Xj#spv`@wc_/qr>yYȄv_@63>s[NS qӑ 'ϡYj&[qbreݯ ȗJYeMjPqsgĜY3((bָ;w#AE17KoXO]o1{H_&ok`- H.!YS q9 Wlo(d$%n&ŭ<ӷv ?͈|SXl E7D Ϗ%a>67b#qY*tCѩ7!t!q)9d$@` k؆7ڪn9OY 9ZSRS]=p~eT:+CVB¢lApA0ΕӜ(Ncْqe~N2ɚVW@ jZX9;\x' enk R%d]Myg;8Cw5k]*xI^᝞|P@Iqi^*)b)tBIBLe"D̬M(Vr΅r9I>p )xaw3[.{icoDZV7O̠x^#(op,¬#W?"ե>ikfyj<^ m ݬm[94BɦZݮoսDw'kD&-8LFm7+Ղ4mG vMQGrUq뚯5P/5F"V$[$㜠=>?+kga:];ChWFs_UqeĄhmvl93fk% Ƒ!'닭wQ ݒ򄁣b]e#>lg|eeD\xXWGpKΡHz #Ta*$ӈ^'ym;C8Iq_+{{w˵+(LI_761 9 vLlr2=;(G*V7ͮB#DBB${ދ˥s\# 3 !dV6orK!?CZֈtHŨ{'Q:d|T2bY3uc)>(Bߦk-Beҧ nU`f+CU7U2[Ҡ 0*8z|Q%8 B~pk k^B36ăt!0 p vE*`ݖ'?9J[#.Bt{Wm𨯐`'B*T*#x%ۗ1&Yjos8?_T?Fc^ů=gO#Uz&5fG;@|,X 8}%Ӊd* .<%+\QbٯPF D'220H/(7ӻj{Ge/]B([SeF1$Y'CK+-w2_ QKV)U3%炤OMu&^Mt_7-Q$a*hMҎa-ե >pGIzL,_t#5> I rS:Ow=?4Xz R+'RoO/M~NݻH/r3+rK͛;{Gos^;[1O{X~{h'+WW<TpL,gPZN (æ +z$j_ =<צ 9(>aaoZ!V6 D'Hf-!]Jʈ^hΉiUm6~+k;nK^4 ĕ?IdT0OP.$$h OOI ]]2>/>c փYNfb/)*A%N!_Y4K?&3[?BP#Vk9 CBFk#,n GQxJ8ʤ͞9qHBV# ^@>S=TWǑV~>1,\Tc9[)Nc.$~ 6j[5Tv0p -Uconi#lr,qIg䚆._Ch A*Bj+M_qZjX(+Qc4kT/#]m hқ19Q9lݖ (ز}CcC{Bz:ex[xqKps,ge;K쥧dEo`;{#O[V2.<+(_Ob>*ǵ28sgd6@ۻH:܌Vް2=1akC2=9Y[hFhT:ݰ!4!>^e; MaP)5 FgrV;i 2wAͯ5 9C)g؛i)ITxm+Y(UfcxuҠ̱50k I,b7yOGףD|ߩ .\Xv]ȰQMb X▼}ED0=.DdI*<DZ٧qPe4| M[EiuWNhuàMUM6}XWRg}W{1"0toB z vB윲 L۔Ers0s8[D8֡`7|%O'+%0ámXqÒӶp}G^Y#Eր\?5K6i"M(G4h\,4 [nQ2{J=={p'sXb$f 4&2.fc\m ]s!W+7cQ{裔FW|#XE-hҡIDa1l6 fh,Z?!$8 LNw> ^IćkѯDrP-TdJ,Leh}X VCېQٛWM||Gf9[ae`gv$J̠Ãpjl{%$panT#6W{`=ȧЍ&a!CQ8(lFR'dL &Ǯ#Nz XyJ'T"w̆^g.Hۧ 97/vDia7.-8 /jtC}N7 )_MKt:UTI6\ '0/Iev{ ؅ö72j2H]={1n Lm* tfIgz{) 0Wm HYo"eWM] hQj1qy:B1 L&X}-g;pDyRxD'XP|jD8h)ߋwm1=!sw]6'(UB;3!KyZ׌Xb4 _7dҐ<%_/ ̀/!ΰ B!h>Z2i)#^aAHNF!JOe^/-(2lߴ̀8Tg .9|g#CJGc)Cv)ϋ}cIyY%tޗ*5r ٴmjd,W*Hkde^ 0o iY P"UQ 3gw2up=&τdž}:`"8gK"Z, qdL2y#3QMxνrET^] ? πhjѢPGSK[J _nyiB?s45s"k^$DNͧ. .YS跎y߱W))Q"jklsd[{Wjj FRD[P3;mԅRC3n o/qq~lO0'XKsXEE"S6]H|mUe-oPO i=0ÿAp*:cT [wf?rEpNCwF'n Dxgp+6JB3I-GUcPuD%'&ys+T>pX;L jZ.suoc,>ݬ€8Tu [TT ohLJj^p$AI:)")7[ Aٴ~>1Y퀢fuփW&Dwԑ0 sdgpR/2:] SΧ<-> Lҙ^K>0tLeZ;nGh{P`SݲVb'F' yE4q ye:`͠E&MKaMB~3$ w܅qZ̏r;Ueո?- wڋ%KQqϟ᳂3}W˧a֘K+.hLZw8:UgBRZrLjNZV%虴u.CIw"WȜԝHc}2tќj =GLQE<QdYgpM)|> yÚsL('3Ǫ]8Ԩ=M@'Ejy #1X+ժ?kQlzGpUl )E&ģ7*=xl^&)ٕ|X>EwrLVl j`#hJ*T#%2jJi/k*U$Y^B9 ڝۙB|z1դߚLr6 IRqxbָzb,d,UH1-ϴSF^^M\oQQPtFg{tpttaYU1G781UWdIH쑛Rs3 42!$ѽ_LIٱMWԑlW1.oɥݨvQ9ΒjމZ>UJ_dșV dd'e͒d*^ Nl*,1/JVwv#1bEy=7͔^o^e 6*1b6냑Pi 9[=co8`\{/?O`+K$TPĸaLq`Mx<_67Bm Uw>;!~d NQD2yYRӌM?zlL` -^yb=HF}M7;ya(loRj"GGEGdu|yfqn! ~nfwO+|zGpv{^Ł4xb,3b PDg\o i B0IY %m?y32_7]ƻƦd)s4F z;|rH='FíYgj;ѧB.ECvQ#7c{aD߅_^ŧr0=D^z7 Q re~ӺghxۼͲ?wo d (|xh8^Ғ|.:)8)k-K!#N{d7b]w CoKrOȳ L}Dʇ+oYe)}pj$DיZ-.wEJre3AP' Nc U TMmzԛJAHد=1dߟ AδݧJƻ_GdeF5W4~rm IbbMƻzԚmH>bYwLS(oR:C̈X:*  UxxOuޚcH|׬I Dp~W[hXmI17~M[`.Jp0GWnkܕ`-C*0yۣ|4,xˍ#b( U %W&\㴀kK73'kʺJ K/9a 6uIn9edɎ心A ;++wQZ{. r9!~Z.:jg. OGcwoٙi4X_s Dy[oo:f΄",)[`KкcYnд'e2+9x5 yYZ^7Y,t{W\7ߴ*e-$I-s\Qy+TA.I>G|-N"`+U/bQzzF4P~W6ԕ|ΌYzbTԃ,w~Ҟ/I {8WMDR00kFUvmqZ~`w| P ֋[QN&,W[SE--d'in766vk׃Ū@dTRɑ%^Mٜ>9#d2X|$+U=DtpIKz.QC=WQ!{le*9g'nՎk<c9>oay?̒dF nt<%RQ?%,jJ!7AY-WDDVg+!nfj˫VIގ:-ȯWwZҡ9T7 Utf#֗}) fBق.4)sKÆ>[NͭQ}؃kA ^G8z _e6d<%T1 CAgצ1mx#(4Dt͸M!S?u3=Lѱp^a"7;qNdqGSnqe2<ܾC%t"d(H@ڴQ]g]1ˀtȨ?+Hp܂w%/2 Jj aCы_[zW#X`XZ֑#6ojec0Wj^e^ O~P'+L>2Ų{܁ϦbJW eLV/VdԞƉLJ~񣝖hޢÀtU\}He,|1Zu' o*n&3IF?_>'QȠ#RyuEIIY 4x, C <94ukhџnyd^5 K~џi ˂e=4> oiT*XMQtB-}S DӒR""eZByvk5}+Ťv؁oeCST?ԓ{H RN >sQ͑VYH*0%Fc25HOV3хh4;^2 C(l^CNkf*>gG'FD3m`CqB)Y <j"gp`"Q:tZ+Mn6ڬ#@t @Bd4L.=g|HAj +=''B54Vn&AzH Hf[$L;;sڸHiUmDhʾNvr,"~>#!OfgM$ OqZAQhÛ^Vp\7iIZgmf-hd_TYf*N*b]ze(v $"S"8>F/aBkk߫tEk"hڃk0˞jʿJM R[Gİ'g7AJ2=$W/vM} 3QK`$ý 8Zj[J.y+r` 4܎ ̜‹丕\(E9 wz [~L-@fx܏FrBW/6vD 2oY0[EUq2JgI-Т6{)<ﺆ%RӸ5 kq@PK%M,##|?i'FɲGJ=R\ Зfв WnŵLs'j 0OlZjdVr 㨷OkWjRr W?u,i5O\{8r.=y܊T0*94j딖8C)&'~ӓ#\jWtfuU8܄4ǡmP'ɅIDZ,4jP6W-KmRgQ 9zB#]INDF߷cf hr$ 4)%{#d,,y >(_͈rJ< X7X p$񡔲L+2麜 dSV3Lo{|=H؟ UU9ϩPHa.W$"-tqDۚ/^ۛM?"1v3h*ݬ98C 9Q#[h* } ZrQw!d^th}r'S Tf }22h !8T"t=8kAʼn6 R_ozimP,9\5{%0Z/#m\_Zؙegc7KK\.d>`Ŝ|~@=Զdq|ndtP>Ot*&t}s':+}uyh&yM8zj{ݚhNj5>uXl\8>oi7H$9aB#lz%3vyIs[olktJ>- Gp?岩q2 3Hة | 4%qqK(FM:7N9RJΞyRk$(/6 Scbhcy2]x+҈w6)o?^S})F DBă-/zKyɠkc@^ "hxN콬hl)A4%)`51τY ^ԓ:}Y%r XӰx-#NE #f@11uiyC؊m[pbWل~=;pJ,hGjyC"}$71 F6upV$ؑ}D3U"fB0!ySwXvq)1j :ހ!;nVJ򓲈)P痢UJ*WK EBPHr7Y qmԻ\@A .Gbch`?@P c bޠs~E|a9TnS+4O9P/=Rr}9'A]3>!c˟P> 5c4/*PA1j\(2jq1ۀa!egQڴ"rנ)}/cvV y.5 zH HE<_m7NUn$Ͽ`md+IPxr^?56oW[X!;Rccx%pȥB:0-ΰ?ţs-OɷX q3t}2f H]2 |1gvl_iβ3 Il@|u`e*}Y;&oy(ހt U9($Es1s &GJQ *?pB/e6A26bEbg΍C?Ks UOfh`mdnS5@ g %c> kt55GU HA^*=(6ԯP썫{ꆂSp IOgW7Ox)*3͠?č2UOv,R/Ъ§, OK*OEA B91A2x!kQFGb]*9r7ϧǗ#b@Տ$Q˿⋥0OtsNB$y_ESChuqbá8aW܂v@MHFߌho*LǎnwEm3vq|)= Ox5J%\|Y1~QMBm&Wg۾Y> PU0wTJ:0%߂F Dd@qVݮQo!=>@TAXC]B1R`.v_Sua>J.l_(0V \`Ǣ..ΪЀߺ^GōiO 802QܡØ>'XJ:vd}~/v@~}vX51iRW5~hƖQtpMiaY\dN+ U&mWגAylM1=:9 Ei&zVU8m5{=R>6SB`  whгP%GС{as =hC7[(4>s+'N)k"e9dU ~FCU˺(ա6bצ2HosPLW H[Q#̃/ad‚-,xNwѮ/uvҺijGNi4 1RhepRu* _er]Z}IQ$4eS\%],J1|@ qGEiwĀ:@n;cd YúErrycL%pŏ0D*93H Z ]~HH05F"W}wGF~xE96dKXkSq:%G WfbDn&J!?u-aIs`v J[Vyo5=gX!\;)<~BqENOFg9>,=6Av!96 t3 b,N/n : U+,?m|׳jv E@INۜ'X p5@t_6?&8,z=B(C^j ?-~vq>ܻP+Ҟ8Yx-#9< B{RxgMա[<1W Ɔ²K Z+oEqCXmj5}M]0$+Ka EK'qLi te+D2Jb!=cƉ 5j+Y~$ACk'!\|/cMeˮKoV|j6YЭCDU-ڦS&QH n.)te'9 |(ӌI5;‹pҮzfwq@x6a9UgATQn6nvͣ#qbcqӚ Yx\̾CMn0C }M, fn~f**=d;5 ph~?Z5rGjɗׯD#5{ 칖f>_ Fsr.b$ae=Eyyr1S9d t.D=\y>J% ݚqORUiW{ByL9SrsWknA ƃ^eė"(foS1ޯhNtI8*\?puC#DAu`.+no?ЫR!YtG_ڲ.cvF0;gUY)N<7BX&7L)90Փq2(XAqw ˘KOVD(֯Ta0D9B2~2Ά[?ѳ.۝L6cw3-Ap:ڥ"\H?h>8`UObX$>ϒQu=&CH]vʔ/DʂBC`r=Y$;v0~ܨyx4( 1 8h}>@tn uεn:D84#$ncM{*X 8ͱ&FX.2&cOx@׬x\l+1E 1x5#%H꨿>xf.OE_r2T3r4[:6 0@{bd*bL[COxDL/Z1%wtQ;UTJ0`E΀՟um0-؜6J+IJd T >ώjbmwiY|1gcC/R=S}Y^OQDأ.= ƶdp%;WWڰ^'a󎴦 %|Hޠd胻s$-^d?zUfiV,T+D)%kr\/a&Бo[W R~\ J'hxISe j@.:o`l^4;O28KGH`UL2 O-C\2 fp𣏕uc"ٝ (Z{ӱ6tCԞFi8Emt{2Vh q,+p!oč̀/.DF8>OL%%$+ʔ6\r7}^$Q$B`/dߧxQYB43o.w 4;!%\zVCWNWcXts)CZRH|-Jw`kπ:^;Vt;^r?t_j&0)uwIvg\Do^1xKpz"7;#bU4p]V[#| O*#氭i9#I$5p)scHis6 8}4x ؃.,g(9$kz# %4ጠscI;T$`Ģaofd fhZ>k]fKn'HwRUm |QM;O߀ғ Q9@_5 !(y?]>ŦpH^r hd\l#ۋ΋m_O\ϳA5v΀]dd +pa7\I0rŦϻ- )I~OT68࿌x;#Ik ? I6+/GW(*kc[YE(vu靬҉|(chyj-~z$?'1۬u4]^ruURK#:ө;Lfm9AZD% n>+l!Rˠǣ+YyC j]fC \&\jITȣ(F6uo\7^5,JB { :{2vI4qC{~Ijd{ȏ+ z+8+sl`VR| \ff$͈DlKn8vD2[> $26Tӥ "5̶d|KR~?g/h $;Uǿ; !+ͰC?t͊S5A"sظsb۹HGRp+ Owww+gL{J "(qB1a$.H`'4;`B, z(0%a[ Nf@Ҋ\~aٲՋޗ29Y< @$>^ӑwFҜy*t|.nFeÊq0bCQJ038Ol·&2c2n157uAEڍ?Crgpwf9Ĕc`{6΀"fI.6ӊm%J\!g4AX:£N楷6KcVK٫0u5@#ORL@}kT#*C3Nq^2!MKI7@?E'Tc=gV<|;m>j@Z[i$&H]"SNZF`|A>p {o( \ Cʠm9չ O~Q9@qQMi^̐Ajr椣FLD4$ǚof^> W Q+*'w(xEH+/>awGq %~VcKv7A\'=^bChnE:w ii[ ̆zcpL?{pF$/h_z;k}X5aBI&.2oӶnаyVA#>όx~{59Y# Yq7ҜgKzA)-<^@(^c ._f OFIt"~*%J *ϓ5y(>hp~ y d900*r4Vܙȵ km&MkizN_r& 5i2=m+1^8y)=U~K0Ici/`N3%əCPzc^T)вSL?JLQa1@fE4~6dOln5<;;Z!Jh\JN̬Q%SJ?ȵʴ3w:tZO'΋S We~j?΢@!T;"Hh:i7$e' 'daˍx;Ɨ)qAKߐ@\"Mqq[ y27ώŜEE"aFs;v"cD9Y1^q9U[68KAO8ń[[e]gmUWy!T: g|d}!gͯ WeA~ס=k,'ܽ^Ï,K;d:8G7vR""P)Mbg4\;,!>sFPfU޼ Wm% 4=j'v'Z<= & kxHcc`ݭ%7n KΔD:5罃u!T5Aa0'`Hp,AƃaD~/Z}Z%lcӦ9U9?4͕ \Ѵ ,.SiH D:-V'ڈ!&mvE`o:1]Oa*_UҌtv6#%70Q)J6Nx A׮ot7ٓ;I5C$!`Aa貿C= 7B$'H0@,h܈.xcoam:dm:n_)\v tsm[2q2H+QI6\uoOJ_u&'yk|DG/0dBj Ih~l>Ic5=_.|A; DsN%7r9X`z#{. #7"³dM$s)]ZqϽDI8RηOeЉSOniۉ7n{y&QrO% kj=#Hv kM0tgt`+ K gq(-:M Q^?3)Wv&g@e2k<=?-̭k~tyonSjgU=݀&uF R[_eQWt|P[xOx C9!fBS[l21ĖBc20;^ɾJ5ZpF5 ߄hI '3yveȯk!x;VG 4j;e}S!ZNp̓z(B.Udڠej|F5bV߄+{.8`tԫ9@I7f"N__bḬ @W;wiK:O=&8ZJOp:pЗZURE(FEPLRsWӡCGr+Li$9X"lBDөC G*.'k.&U0$A'2}Tu;P]gmq;AMO:(cmڒ%y'LA[TUh/-ϐn,0EAaTߨrHxH0 +raK)/aqeϗ).,L]ypXFgLGd)0vpl+>:&au|f}@ ,,\:j>Ar,пXnypEz˹Č TВmTKײv3gDˏ.o qHBA{ [m+yS+h <ӳǍ1~X?Xb{G5?^QJ`F͚:%&!x1̪@8?:?jG&OR~zbPoʝL=;sx9d xBG[fGPKUz6 O4ɃShYU4{`ؚ",0lœn΃F`Y _VPaJJ̛L-qS5J9d=N¿WWl.s@f<ۦ!履kL_5Em0Uuٮ9E-cP I oYX*& 6ǔ"փyω.cpH%7llB%|m @ɋ;&]Hvۇ B>#\KwOb4#!@Iq2ΌJХoߐ>dٍ(j%pq˲#(&]at†/qt'> MmΑ_*;ՏFd;oM&w`8C/3-ddW!`c5Pi2d,c詑5bY`gqbƒ9AtD@2j$6 |7P aJ06_բzLԴ!HZ{.'Gt6cZG r3& f*B`38ѹKWG@+W`?R(2_ɤE@ sSO+ 72$Oy^̂ h0"hDM!iGxxXUH쓥p&;o| %/A1 25GXLU掓 3DV`64[u%2,|=4KG~H;Dt>- 2 ȃS m'갫wǂ$ʷOt$, rMX.AqsPWSUYs0ӱlM頻r㨿Rm'W+ gY珝qVtU zxO$) Ea)& V3vFg$5'R- 1`{5[?! '5.>̐a-UmN }[G1P 8=lL両jJ%V_/ Q%gUt4Rs㪌| {fnR̩.͍ff}HWߖxv'b93,+K.L>]~=;!3"d&~% fjXť_q Z<1YR} kuVcmG^̲/: 'ٶ'G"9y ˊ>?4%ՔV0q86?J, ",٣2VE6?š2Jhy+:NU9h1:SՉ4JxO=,: 7F'ͺ /3rDU~r f2>:O}9n.j}ÜM$.mh ~07IT 7TQHߗ{vf݄y!n.L{A̩)AU-)e<*S <$T{uiDX,yb6ߠ#R[=o laғ[|H:^0wQ9Y˺w]Ll`or^hUu+@8@m<Φ:?_[D΍揙W`B1C>9(k%8J!S'nºMb'd=P }ڳarh;IOmꄯ=,!9*OyB /h; O=Ґ1[y9sv9з1qImj9}' 9UZM5rUng47DFCZ "q{;)=40I! '[vJ>kd8&.ZSvG>!6΢QS2;n-@F oI Q[sw@_*or@N9͠+Bs؃/v#EAFn%bK\A<| HDhZO;Bc- ZZd@17`BXXSeP#!fnM^"$IqO&{+7돗K]şijAYRCy07$i+ޯT MzI{_W>'`催L16zal@BӜE? DOg?5%x>*KdSa˾uj[;sgħBzB&~ꁄl KbmAY.8^v}I n`2#䢚1?j݂ANjnT+ivPVv\5צ)ۄln,opI0V |Hk5ƦwzNkd=j6eH橍J'2_m4)Ҫ;5=8L+$hOVN$?Zb~I[ͫF010IeM 'pTF*~|Qx1(Fz^uPs;{M 5/0O] y1VėcLd=o-ot˞P(6ȗ%>j&w+(Ƴt#l,yYȒMbͦ.ݼ\A_SjZ7RC#6iȈ/6YF er2$c~8l-㴇D8Wu2@ CfW9xn6h_(1sćt[>Ԃ@1jp1FQb"5|Hb!HA"zw P[PݼT.Fb\Rvb5 hN2 :N}\*\b3Tr8|),g 'QPVmS̟xpR}SP>&B -(8*` (qϣ#έ -ss@N7z`iY̔CA%Tdq&Uv VsNgpE\s8>! $Ob GcQp:{To M`/v!wk?+9 >GN|DL^&?k" l$?**J(/"@_}Xaҋx`'|L6憶cC`DOվպSM겄\{3u񽸙j?1l3[.ή>B˩! X3>Q1<ۣX*=pT5A/-9$딴%~O=~3%񷮃ޓtd 4l7.̪WN=I& eѴ9>|lݭvH|$=V. &Gukg^ LGwST0mC`l#M PDB+v8[/Xw5Zd2YQh# }1lsbQ ]oH+x b cLl4SZ&HL[_m@hԥH! AԶcfq)7`d9,/]9ۡr[_?(P<CJPF~0I=H&_-ҏHDR =‡8٬ M͘+vK?k ?J 79&A:n*c6 f+rf!CGMe橜l?+ >⫛NDl]HlGwM3U#hp0mWvF]#)X6m=JMym[Zeú:!~"5(!гsu8íd8訐DzrCh^/ћĆҸxa\Lʌjtb`j;aV=!Dz 1Ӓ|@_Mbq lIH-"Gj?|+`SuRcޒ#dlBAW(o>CuTx 1^ə !TߴƐ~׊L4t\:X G߼_J5*G;IQCU('rJLy٩ =UpL]|H`W-t4F%bBPkZ]>q&'c6n͍ՖA0F9+1&"v`ҤȔd३ʅ-3.$l pR]dFߗMyL|묺E~he 7;#= {ק+ԨF6I U )R 8H!l5-hkjgh~\s}˚ ~j umQIh1v~7N Ocf {v4H6UTTVuлUIra"ˢ!f\X|MFGjYxb,2RJ,QBflKzUR٫4Ƈ8 ֜YQVgr5'X|M~s1Yފ`꾩Lp~bJDwn.}Ld3@unD<~1MZSD2X0C9@=b\Ņ#1T_ԉpzMq/K(f@򚉗'Qx},GNWZ%6/Hp)47!v݀ 22@#<\| BӴR2 #NoVs׎[wѦv1Qp)9x]n^1`9滘ko 2}.ƮTjXaAykWȿA.$ qmǸ_7:wjSo ^*\^*Κ0v< s) $o<Dž{e*U-3mOp,tu\os3nA\ w Yٝp^IN`9\#tixv찙B̄WvTU:=4*QuAll6slĽ7f,ͦDM.\[2Xץ=#6\W$lB_|NBxl>xurIP-AI{ю%Ka5eMF{HIۑzFoѠ+g,ڠUO t*.ct>$I>s Jߕvt-ޯ,ϣ& O۫0As0:a_ O&PI=%FˉYf,7sRTe23yre z;Ib ֲcQQ4 l),Jw)kޱ7[vSGv9 S;WAGX9 y rD2ؤ`F*ײ:Ov6v=+=bg嫩E:O,]<#23JoJz`O\,6~s/ۀos+GjtGpihBA҅(#_DʒYY2M?VN>[¡>S?i,Eq.POKQyuiDRvFN25L oC-Lu<"uXRyyq/&7;7D= 9}mlMqn#&]HU'aa60S[}|>#0=F- ' L 虗?H߿EӔrS;ϧ_ %%n0F z]G9Q&sS.jK=m44bĿy<{-ƸVeԼӏW;3|?isGpoKb r4\=Uzf8䦰DC`DwhBjkk+5dGZO(_EB01FPTr 3߿j"CT\~ڐ]݉OFHT ʵqR sgR&El4%;k~-\|=C%zA> W,Iz lj⸧I&VC=-԰ / h8RUu\qI /dpyg+n\ ucn$ӆ+8؏f$g|T'jC2qr~޲/mgf f J8_p+Kۚq j*K3Ԗ1{Io]+-%4,B!dIIv83R0xȅfjZ[SxE#,` }yf2h*i*CL%,0= \9Z]L;y.\V\U!%kJ@<5MKŅ▹ܯPut]uſK}K Np:0HHP"c`kE;7 6s`0?y/1:'Z}†/*Wx(XIT7iU<͡)s%8zAqsْ%PHC}'xN&t3od[yXaUUU`-ӎPr̫"ϥD$/sڿG)Oү5ŸT:gG0#O TCJC;r1RaM( >zi{P=V(v=fA@n[fWҖq^fb+v=& *DsOT[=S5nH]G^*Cf9k?;G%-c(bo橪{`욬Γ/j\u\\%  c^6DX`CYj43r!I2߯.~>>-z?Yu)xJ`+~ֆM)_A80t@XGtVudEq%utjo?db`tl%rE2B+YoʹpxfDPR[Z^YtQSׅjrK׽^i=fC9~X@V{ =bCFB/ NAKeg"je^cL+WpƓfHhf)Qf[݌h7D$Xf!O(Om]=+A҆c2qs07$4oË.Ȕ(Ft9cCo+]zUN#ΪH{AG<|jy# )h7ªBNRRZZi\"ο@;Ng;hS"ɶO}D% ~%P{_wd-*?eҧ3s?!fCI)t_ygMm&sx ]L?B\h ՁӏAk|_+޷53d*UJQi{ 339B I)JTd=3 NB1 ԴlCCT+em܂> Y! g-˞ Ls [..UfQ"Fבt+˕A$+|;:A _Ťdflwls냲V__xzc%P&;^wv_^ec8%ʘ\-3;o R*z K+z8*.kVVsN@/v`Z&J*f:㹉"[($.5^¸ٙoCWfN* k$.:kF4_]NhnRkӤ@x213,ԾQęFcL4MxcF j Rd(Ïҏ/ 6jH4/p`~=ۇ2 A޵^+(_ĭY(+xn9v{aT~`%Wp3X7 fOTЏ+(P jkpZ?MϿwJܾs@Ux_X~UO]}Yiˈj'pJ{HAB3~v55TH30叨OoIo. lބk[[}/֝f|ڳᣯsy G9֟@FI?)r^Kz[$2br.f/FMdV^C/qMU"G:=}Pz"LzW۪s?g93W8nb?"|Ő3u[> |򰬫>wR1Y+}[AĻy" YIGn@T]ᡌ$/$jZ z7Nȼ!eP-N7%B]#ĵbJ*ʽ#iH ,ٍcE@[}&b]EA>t?̆dh7 &Ih2o2&G+xs[ "MvOLBd/GW5mpۄqNviEC5'!I qImм"H*KLm돎+}滯d;1byalJ EB&EBNcĿZjJpP>gِ] vF'Nz&FgA7zEѪutF R-SdkE' %C,t :IX!-8lB[~xl;?cnxU?r[:Tㇲ?U2 qBd]X!'z;Ѱ9 7q#DB}y:/ 9ؾ]Jzn!RYOi]~yPk2+~UU$JҀ*fTzFIL :¼^g͌fU[MJpUc(r}7p%8jg |+U7"D[g~GGWĬ5x]]0-2Y֡ L`7]Ye*.(tV;Pɨ~p"Bq'rZWRJXju$Sڞw|Qi%eaZ{#+#ѝk Qy(8ZE0 ⡯95C=N+nP 2-y</B<:6/)?Cat7LT?vC!\ͷ\ _YI"$ӿ\<pTldd74lM0H9ucub.Xc @n›qx +:йǶVVBA~pf 9^~l9ndLte5j| ya% ]=u)G94CЈbzAhV}} 6r <-hվ;x*cE]T2:Qggq:KJ5giG1*GLͥ`VnL}~_g޿l-hn,r2AM-hGW0E%^xW@ӿ޴AOoki&tO lZ6{)LXg8.غ}T$,qzW$F3QEt\̞={m a4}xԁ9#rQ "CY=p5dٲ`dB@Pz80d'=o9/%`/u.։ݺ#?lkW H̜G.iX[x ֭'3(WF7C>pXRʂrlҬt@q9]ZC7u%lĤNz4/Bnaȝs3F75yW^RPlh^zkkkNYb{\Jc{63//sP1^Q^^oԽ+sBʮnwO pjJ+ $02+f [XhDu Ǎ=sKHOP~ڕe1hׯAc(AL<=Pp {0 ӡZ΀QF7+BP$f' "R'@wI.WtF~5x7G&9uɍ!jLIM*{UNOyowuPt~@~A6g# %µjSu~bXj9Vrmw T;"BhOv#@g#zFMOx@C8VMeԦk nFg)Sνw4$ҩ-]R{P!nч 0<붰a w1Ƌ3&jYׂ30FtoOfHL"B]X~mԗ ~b\}$pޙ,U̇ɐyι^(5{{$LU&loho"BBCtg{Jq`ehxr;^9ġHIq^MVHwțHzׂSmpqdN9+FW;s3mtreDrgҪf0UmT…W-wKۉ'ţK2VM-^D-Z 0JZ}SZ8=UKضEdr.6}3t}X {qJ?[`GuOIs'3v}PvΏ#s~ -hny>ڛ{#u'7@3nO+>@,ÞԆTvݧM0WܒDA_tj5ڶTPUDGQ^-'2|'$8i)877;mP&,5*byX#QmV璗_zʍ)y6b&$y#@hS  S~Uͳ G J =jEњ? W>֘ly$ Pw)0Gkh!ZjYf;j?u V*jRM[i Wc0/$BV9xx[vxQV볌n,Se ʫj)$}Ox󱨯9ïӘ|,K(>v0 MZG{ -]qLr@Wa8E|bLLnlp1*AȬpԧ.=. FA .&?ESJmEF+N!٨VD^ zլj^JQh3T0pk.iK&@aoAP!{zS V2Ły,J0|T:8gRlAw-0KlG8~27LN,܂҂ޫCL߰غ /lmJZ˔$VLs_qJwMxg#QwЗNF<™j9zQ ҭp!$87W|WKX.@QUf8ѫE~P# L7Y`m[t?(_;`g3v^gfagpK$р tIյC,Iɓz[͌f"AWP_PAOs/s=  @@Rm,}g* D–u\O\/h~\[$ PsC3xŮP/v,{^IS aɆ*;^1ȳQu#^*BsFtڴ9{DP:'{NU SMSQ%֒_J_}9#7z$%;k-ADO %̓wA;;Os dؿVVNBB[;Ybұney8trBwܷeVu4fbgIL?W`PFQ]NTlpAFη=inJ_qMG4ѯ[yS7c*pc u{?mh W#]Q伹 i8sB hzxaS|p0%~ȟʼnt6wt" D;7wSm)c )&{+'>ZhGC72{ihm- *⡑5p6d/T@X ,-kəX[y9U`u6ߓ,є5ٺ_Etg H)!(m~?1iGk<J? -k3<=֒J(RNoV)hfUut٢NSsM!UB}?m-^SlM2UMƂ5p[ ЀY:c˜ wԇ`Բ^,G1?CfQz[lBppLD8"8kǟ ESnܼ>a'6 8E_tp5yQZG[G 1/ƻHE~ww;Q3&<:6v"zmwScA; 00!Zb ƶ[BXQ#r3:u&_&xk3O+Ƨ(,/Ecm"j6Z-MY'DTLR\bZA WKx@̮$/Gu+75K vp OgJ.灑Z'_Q)gm1.# DP3Q;S `M66lx7]\?o a =Dg÷%1h[2a +` 05qcYӭ;]˅{|DيyQ&Ec/J*+jm kCZOF;T<~:]PWg?}6mpxiQ<&0Wu{#q% ̛OAΗc$}' q0v8 {n4)NA3Uܒ`)B1|ɲV{JdC֜^|GdjvKl=aL=J(flN`=î 8@sq7TsS̏3V`kWpueƓؑ:+"1UcOWeTTsG&4!4njTYͨ2ˠwu( O|Baŗ87K$Wr]AGdg bL"@*LӪ{䎒é5X~LuMF2r{p(qn?~hXaF dC<+TpjaSFpm$R}[~iF^W N@l8yJfZKR[N%uU>j}s_ c(E=|6z{T æ%[jo]%wn2q}13Oy7IchzZmSZaeXh NĶ#M[M$ .xMw\җuO`:eN[6FBQA@W92='L'3Ba&"ytzz }.À‰xy I8x/ Z UY6ɹqGf^|bd|n\mZU0]Y?ϮR4*XJn- .7ɦkmӡP +:N)˩υ7 3yz4 D;ҖxS[Yߔ+dařE)1t yFY7g~\9&۲Q U&P#\-UHg>ìvyTl28EI$\L&dTzЪʪC3D߸BG}jT]CSM猳u,IǚUk_Z˛(JoGdt+-KFrwz/2f>3&þrhA/$wM+IdTr/ZM!d$;yA)뺓6˕ݫ^ J^\u,}_~bnAY3ԊAg^žf߀FH[ڷI'~ #*<:P-EuoUshSG' R||BWaP3p5,9aqI qZ3$cSѯe][g.Ǿ;[*Bc\8;e/}o5[AH[fצ!.ˈ(S5qXtWjh[N1\HL˓.lS[3dAEՇu w$[0()h1DžVQ$𰉱ῑD ];Ytj ;yfXh6̂} RNA@sI7Q1ذ#a> [UjT~רz6٬$vW< 9vƚws7QK5^{.P0oثAV|X:~p6主t-:f2?f7TfZ4>Mx9d ȰjȬ+@/Rh^Wm_\4=Ո=SW  DV:%+O)hIMKy#|эzd$l!sqr~$` ]4s|QG|pp׌9џYEMFIr$8|DEaoq0u>M yK(v{ή]|o2ѓFl~JѬgsU؉,[]qѡ'U=ybUVnY엺lGC\"DcM*_B2؂d}{ƹZgc1E[wD& С/Q*jMݾT@VgWX#RWg+2ߕ÷A"c#o@Zc8-'|#f`?z,/|G& ׈k[^VN$畨5'<)+PR:}^ sݎAZvQψYE+h#x,)uy.}R߄]}}]Ho-edSE5}o&.>݀U n$uŽDD^ސs>䋩m7iR(Sr$?ni~*@$@ºȶhIs{˕dbgEze*|j:N?~~ R?zӿ_6b:wHTҒL+Bw0bSypBl^$w-= ՝2 .O?MUC`O!PVP&17 LJNiʓgu&Zj*z[<({HgфxW}ۜt%(;9΁#)RV`_h`g$ɏQsF%m]NtCp  |LA:QJ,C-8QWBފdY;fi 0g^]fH<$ԇ+X*>%HX {4I%%#bAg,* 37 %SF[J胀W31}` ՔϫެE9e(.r:HN{Jed9$Kh8 aWRP!ȶq$i;{n f OTU3v!^` vM s{#Bkfu[ѝKB%Ύ:ht APVTu> _Z>zԫ֥" 6kuD+"⯢$5Ljp,dns H!-1ڜf!bwῢDX*^=B_ev3f1.7c_4d b4re|rb9qW6Y 'w{099*0Iq1Aj([::!;z^{\@EkJw;tʳ&y(eAeg_@EOI')΃i&HT DضVJ5 HCeN)hmIBd& 3cc׷x¶?-]7߀Q\M2l @x91~'X~gEVObd}_) r% XPC= &g(/! Q9V I: pq$'|hYf騛zkVE"2Tb 𲠉=]Kda-k&Sg~ԿN%(G+KO%UCSظ}r1Q4#I;8;+FVDJ8:H, NEu#Qy Wxy^>_}gO2ޙP(•lkl$-G.'bu;?ġxxOەH ݊c=91O6CSDdyeZ+ ji$UC'U]ՄÛLPv)ُ'*ɿErh4*mӚY3l_`RK@HneH]-CR̄\?[;W gٸf6 ֧|::C v&g]#Z mL-337ui&b$$T]g> vMi$FL7zjXJVBe Xw/!9[8U5^o &kuç糐xMF%-(ךQ-PUHV;!!j{3kif[rpO7u9BP|: >JLĘEp\#LjMq1ms!`1C;O `)0>,ZrLRiesThU@lE>N/8IG!lF&?8#hh'?]\UeV~ZUxŧq%+L_?+t0@Y;`G[aRѦ\D|t f`"Ău ?ʽY3>,a$=0RDẊm󽽴zB` =ł*)]} K,W.A 8+ɝ&q (OR7ڽB{ 2mx-?\ ZMﴠhI蒲4ް?-Қٟd||~je@iuS-* ^&J ϛFˁ('8է*vE݂7UGertuڟ&\l-QBҁ'K ҤԜ$h:!Iiz)З3=r؃Jԉ|Ȓ*>}E7Q H8C7`UlbR0y[\ S׫.Eׄ-6OOHW%R05/*gʫsYAc|ۺVP'r%)3K~nԖd:c?ǟZ"#ԜkH3~R5Z$J̿wj`' H%Įy[4*B› p2Bua  H%TхR>nI s?EݍqX:p"0"u*=KB!j cZ]%dC:rI( %hE7^R P/s}k5;x7R!ϼVDzKauvh;q+fK6$f59*-B)ln;ܲ?x˜3]jrp>kEXBPK ܗ dE)ŤjFy9CRfH&9h`ϒ5l('iJ17oLYcq+,iT}eOQcZO 8o9W6we q$Moi W'^v\ g@Aj ʔ+hؿ98;ǘmS&{`0vPpurJ {7@`ԲJDPW0JnGW( CȚJql.DnbDҽZr GI[Dmcy_ Lu[} 3NօZT|-~'~5'?oWu㙅Qj!00gǚ׍k[Fq禊OpˠbU?Nѱ,6|T.,蔧0zVbGaxoϿn\,laȊba-ey-P[yƛ"H%ݱ@A7,5C[r $T+ZϜ$WsBw\D$j,;dzYq=9Y-‘m:PMy|Is5OwpU,gɾSh`h!GJw3)$07Kגve[gC8}4sTuNj߾Enj7eh?'T((0.6D EcXpHTC9Ai+eĵò~fUJ€!].$(Id$PHbţk"V$T?:`yH1*Zt|҅s1G鎀z$> ?Ö 5h6\G0٪<@ ecO::ʽyQTyڢًu5" VԋnmmEre,}_- |vO&Ouj h_<Ԯɠ#O)zVw }q-zso_#&{L#i_9j#eS_N]C\ -Iul].ʚ}CGw#6h4ֽO=]R5/@jؤTw 0H}ֶ+,HZhƣImwqMm}Alzt9UkU4 h4%r-,p OYe;,jio! oGPëX@}>?/߬Dpt vY˪s#3%<:2 _ a >ylS9J0-?,=,j)؈FIu֤-eD8ڎ #jzqum_YAHRAo{]ޥQnsn!;WKx7 VI`z7>=b]D"eU, 3kkltc/%CT'O=i0߯'MkS^ijS_N9ND AEysmcrt3Pbu\[({=8hl{m'O1^Һ; d9Ϯ[K{8Qbfzde{m|s>#4$!5W!:nCjYdd8=$zxnc/~jBYFRhf_rկ[[RB' U̼z1&805K(\3^mzX&xuoIeWiC>ɢKsRL=`X{8A\ЌJbX ۑ6>tOw!!JWf\`M* QI^kmkj޴=)~ \@mղ5 YHMi'brHpDg;}IvYz/*}}:vy7!)M8lcrQpT @ cz#Oyo(]udG5&%6W,2jUψj(q *(B\_~aGI3beyCo]2#7t8};\E2F㰪q/wP1d)΃#Wg2-3dgBz?1` 2h|ajNkbkfA=~\rYnߔR8/zTsE`3t>$4k^;a@ ŁyDZ,9^^c`I҂s=au|9rV$Sɜ9"M7;H1r- i`c$6>:%BX&*\*2d[I[jՐ[@&bW7پegT=i\tF>J~>jZ;q' &|ZM7j%xf)^Wo&zO:Utdڥƺhkpv(nHM) .G?sw1C ߡ́7;Y*-gQCvV)?,솿~gh <  < 3#GY(t |s2OFH~8yu:>X{qqreNý| .%QY-G[zӏCJ<6AAUW2'!M/!JkQB!mzJ 3 S3ϒUԑmaِ1G%ퟀ2Ow&58r fR_WnBPʢ0Ic+]7%Լ63K'㓙W3tnE ۓlkgiЖI3UMb(0l}%|&Ks/퉥z:|Dj4f yv[$M,a& E(/)AQ\?s\ulU"^y// |O;rl$ɸ׵nT1mz7>:UIjtv Q :c.otd;.iOtst~Q0SIL^Onn'e8X4uXt~3:> (dؒܤHR%g{:SGNg?MWG7%kWNvz7 {f7\aK?:0xx}E߹d88QSA0vOpq|6'Uѹsښo!^ g)Ÿ7q jZ>^q0us7OnC:i\Б퉶Q{Ydw:H2NOzc"fwg}hog:\Zw[xl*!mQ"@'BWn&&OUB:&P. K7o[%/jmhwÉ6(njk 275E,l9 xa)܈M`[#Bj[iKU ބ([hn[C-yM9)9SF!/J!AF,=;GUWi5ȏmJM 2Ly]N>)-x?"i Qd"_!?vT2G6<~rM0? !MyMq ^+&րOjČOՄH1 (=ì&dlp_|JlywD\ hf/4PEIZvH_5 ~M'6:4bca֎PSFe79_QֱqS#wNwU1dxc΅׉~VXXI3@l A-:~Fa'㇢+靔iސX[Q 2E 7J!z3Ozqueb=P +5zhb'7Rżר0vkKVkBg6FxsklZӧFD(+_){DkHUzyVޏ8ս]++e}ccRgaL?cS5͡pcI@cp1yz+AdsDuJ}q7h}62dji+`q|B_yAb:y~II^0&" 2CHuRGEC|Ա9ّ&sƑc,{ׁOPܰnr0uKI Ut &v({WKCJ80]w=fNfH~N?OۻB8{*L+on[ FU`i5 (kՃ˶WzuQ1cG pQAE!t&>{drՕf!#4"cS[_ѯJ&k&E H"VZ.@£Lvd c;Ic 6 z$pe 鯩/T Rȡ#*})(}7NVg"Shcs/jJCS1!avVq'{|;pW- 8@Wba"7/mqw>Oߎ0/-`'FyIIXD"CZ=+}d#71 >%z Ϯ>XGr4nD*Y2U8.uxv8mі5XgގHlKHߧFF4Աj>vJAm:XS`/SΙS 6{NlkKFZpF,uh-9 gl Z/8ж&ӳ"eF~M7epĨދho7B|g#d81`#2/Ho6kOQhhaB ޫb$єp${,hƥpUgR=0 !Ï\;S:qV$ *<~S I6%\`"0)dfy=|!/E~HT[IVr4  u|w*0󐽤PUׂczkLKD3 Fݗ-R5 lLJ;XX&d"./;<2g5HA{j(TmP[( #op#EY~ou{.Rw+! &[ܪ 0r h`J&f5??&tُ!`dF. OcFS|Lyt6i^仵/-Ei >ye m$zr _u:30l3$ ~7}A -lJ^;|8ZG#N3tվaYO=Y|7#]Y!ϑzSBxRxVgZkÈ X >uoi͹`>&Q[Qrp'v ) {;~t31AgŏpeF0x0d1nF N`:[kUWbJV|'ͺ-F*"brK+s=<Ʉ\`T$h\)fq9Xغc[&&m%{S ;+W;-bf&1f8R |z)`)a_O[UTMP!+uxzD=6 : ľWqC0_s_qR8AC7 Ī"Bx ^wûgSL::1lp4XɛUcyFKuNwxUҡؼIǯWQ&d*$u|$W1N/? 2|/k.X%r>C.HEA\Eg.\o3PS׃Z8:37cJy~"aY_`XԖR[ԡ 587h-"q l$y)\("IGP"2ŰkKZ{swUF{J+[usKwdFGpikӮG8mGe ;tQ $Um :Qմ+68,`RLHtL5=wy5> &g04vpwX;sk=Z@]e##)ݛvhM#U7CN)+rז[ݖ@9}=Yc-pà;0Eu?;qN,]")Z ~Ši- ?a $v#av+mqOsH\F"GIҸ;tc-Ydna̚PNl"$HB J>ٷd/UYd,_xڢ;~md_Hȵrbgbm(Cy8Gd G8ck&Dw}BYS=!O[; (OU{$5{٪P1䳁^qOsn5n U},y8mPov*HRPIT$@5V[ COɕ ǤVGהhod<.ȝے k`ÊOq@Z% "4w݄:%V4ŸwH{RI߅5ȂUb|:'3= yP8sj!][ gCj݄`!V=\?|*Tg@N&2Z7Q0ca̓:R^qe;'mzhK'F${2G:"CNNQmŅI_n^Q}-[ ꋢ.YURo\9wu5z8w^1;Br&]݌|i0ڗ?nbþݸYw״1]l#!ҍk}稐qܥ#Z>ecT%3_6fz=*|!ǚ<{ ;X.?.A6rESOBX*"I!.v"$E7pyP!1-Ȯ儑uJʟpp^"F_0Q, %U۽ʚL4+t%9whf`{WS*tׅ^Qk^ޑ$=uTwɠɋ!b~41.+u(q@䪑R9R)ӎy[جùJA@ᯕv +\<_C* y,LͶE-|1EXݫԯ8jSa f_[N03:"1duNCވ~?M/FVZ5DQUL-)Mڨe)亾+mn%R=4O>ҭ\00#(}Qα:Y)i4DN0Kf|*aTQDֈ:\H[ċ썮Mik9RDŽvŰRdn ;9=rtu kO@QWf;aL7bdvψfn@1TǷ5]nF#xMIPQO(TgZ#=D=x 8Dn~K12E?0/JДD%%#B$w !+7gyXy'v`'Hw^@Uo86.x4SIP=RcHK߼, NKCqcqFO Q,Ҟm¯:ޑg9?Rv8s?i6EÀ|uk'YMǍls6ǭ ŊSĖ7m+Ax\ia>`0|aJD ⓇՖ{ҝPaQ'U>z x*=x0̵t ] YvH-|RJ vL| /%#(]dg29@ޢDr n@k׍D|iTJ8ɨd+e&B'/}*Ļ44(>~iRj.vQeaض#KٴA3h`l+I{W8ZZ귶LtC3ާc/lH6`Y7sq~%A\F)UqÒR v)~ 0$Q&bE+G%X蚤/wvXҭ T1Ќ" $~)mW5?:BP y/Jh;#XD?Df_P5Vb/;q kf|٠e2]sQxj"FbԬ(;eziGo,'WةAkRN VT}K"IÁuoMXQsH{ kdq$dAkBI K} : J[8|^9I:Qh[m5g熜ET'5]`mӕx`;S +"˵9r _HQ/99]K ߎM{xEj 9N<6<%U//{09&;EBF kG43b\SQ]&=5L)J{W]4Hd`=Ya&Ic>.L=nNi&oHEFHG` ҵBjv]L?Mga_-n'^;kօ)RQCK~?<_ 84Dd3R.>LɛWh|l-oI4a׊SflXBȆ|ljq~(Ƅ~cY4J?`/e{E:Mϳ8Ыs/ veZIp!)*XHˀu:Y*ZsJU[Oۑ4Tm|rq:Am |&~p!7:lr%c]Ԃ*v3}pw$5*0ɾʡ. M1buҙIŸ!0ƒ꽃c0FA| ߆a;[|p241hpEHГyVgOslf2b/F2yFIFܯTVay"\YjYd?G)j,d" !*łt[ڊ;Lp,ݞW21tuG)^?aQ}K :UD-|d9^4CN :ݸdXg,hO5gsow[9 @=Kb./OcR5h+g%G3ZNCn Cnoh 6DP94Ws[DT _0^q4pk\i390ա097=P8Kp ]Z,ww(;ߍ_xIxkV(M78@)66`v<{:Lrb4RYbB~pkLth!@90&`؄+VXLUo2o+̘E vftXl%P N}VUT"}>l"o:I\7r>6z '<8!C7֫ӏh/L16 )yBDZS^Î[a˫xLv޾3Ah4T0htī{)$)cʃ 9.F- Nhy(-Sp[aH]v<%Z!l?R7[բ@;Vqhu_|(ΆP 9 b6,ݶi;)1-ha4LATڐD'4XH"cݧZ.c]UJW_.ͱi} x~ȣ&nCU(m< <z;F.*߬O?HVXLr(ءt#MO0_F7γJ@mul:@Wů˕)Ǹ:ӂ5Ot?ۼ-C0pˆ|f7?ڱ:/Y\ z5Ix*;ն0VkXHqᎬNULH7ON<%XP'ou%0L#yGѻz׼J~\1`-.![ƾvEl01F݆ A_7趲.Gi )9h/տjlog(mF(q +6Ķ nF"k9*||tt3$K(Z:i"O .4+Zk+SiV` :G#QA3āA(~Z$_iH@㧚_:v cџЋgvWR(?yE9HJgm0 GDHvYAv?Lx;A:d{o<4˃pkO̽6qksEO0N}kbzi3 0%_g#G\ "y.JђkyRVP7D{C!/=1ma+ ئ};z9tḪjpn4񌧋jRS LvE5ΡDSÏjN\/E++`v! fmѡ! 4KK3}jw9Z=hk,P Ġ.}:#v& , uUb̶zv9Njrx? m%*[,/` TN[vxa ՞V>EjLy0lJD2Wg_Eu_P֦fW8c@\ZH8pk9Znx.~ MP>`ۥ-*6Vl_CfYs1o y}2KX^,+a'LPU9<bHIJq\s7E$)<@xZ+"=<ko:G,~u)p"E)j׆Om}܂. i֝( 68.nj]*W4is.uLGSq,F;s'2f=9ipn--y䨶$Ư4ko ]:aJ(%pht7 ,)W,kM ꔿOfP3 e=exFɕk@1 F&TD *|<.NSl*KOQmk*Cԙd.ZM>jJD~ΩqkX] h:?kքs[&* !\_dNKh/D@-uPUm ܭ: \9Rjl5<탗gKk)-Z^Glㅐ>(ځ O Ӈs.%>o> Xl1Xޖ;IH|v R: y$:J˒HsMBZ;@1Q,m?ޫ8kjvƋy/L[qNvJ5his) (3.ZOO+1]DtU^Q۝ݯ}%a=G"K|b< ڶteb(jI<&6'qYtpm'M:ِ-4Cn̰Fy21Y̷ŵKq{(<$qA`cs Ȓ hISx1/;̡SN=dSq3?[G*DvhN$ ofxmv9+)߂&5ק~?`!ZëHVXIbS8=gyk5.sfjGN1IxP0hrLoa>ɬRTټ;,*[U >fj9ivM,ŬH4\>e@}A!~*=~2.uˆX}"݋]Ac?ʕFKn>skԞ-?IaRXԐ=L ǡ;tGDM*1:Ҭ7}Nyr^{6BgUl|~t KS.7՛b=I`H^\|iAm $X'Y+w89[( _D KO53MCzg?hyHLu2*eUR{.AvyD%N _>GX . [XYpEsβRڦPlKsaoBcػ}Os( WNrpi姵~JznE1c5"pVXZ( AōchWy~o:~ }ǣ e`\nL!*?5H8-]F[՘Qwgc/p8 _۾3,JXcԖoJR?SF27 #03qZ6"R<*qc2)ծU)_0,C.?hu5dmg)Ny:H䙼ni@tZ_VSഡl$e sCv2Tk|ޢ݁$v+Ob6l6ǔcU&X׵KW1톒T~8E:T"es\S?AKpOE@p~^2c^K[ewsKIq cc`7,n#ŇEWyfBM#NH\<7 F&AY?N!UƄ8TlrK`N&ͫjy Ǡ@E MFuJ,TFN"Yk[u:0нJ,S3]}1| WŮ01 p Tj1KDY= ַʌ|I͂`eig >:s΅B؁rȸvԳ(3_Ǥ%b/zoϹ;cW\X3ۉI%KY sA\+_F2 e} 0"jKT ~)1[ Vڏ?gr9NyUp/\>_F]L`{J,vWxqeiKԅ h9XJdM6N|] 󴤎>lc`hˇ'>?NhZQ7 JE@BgqMCˏk WgT,?-&-RLxTSTePtS<:Ν.Sw(409X4Ca!E_Ýh y 7|N+QZK8HQ>/RL^ ^Ƥ'tn&Bs 3ô .}{>\yD2'T2`޿? [͑XjӠ/!~)zR;e("Dd>a}{%.֍QIxnɛkֿ%V1%h&|꼑<)x{|ss46Ei\92EX{4ai VmxS8a?wyQj|5rcehGFB RA ,n OH8hpL7y a.:,|.U1ɧ = Z 鎑a"$j~fmV+iMC?}&cէ;b =Ƕ3Ϩsl3!kiΪ;/0]/J?s*،>bR=?Cq!/_qFrgg::Hƴ\Qb?ek)Y;|LoO՜ zGf _F= GCvnJ7 34V}c$&u ,"hS8.@0Fg.} vt/ik=)̓am3Z6mBWSm[b_u=xѼD@̆bC8owW7?7[=* {j#^2"诰z ^"_N'mB( u`kv$qSb9%#}\ϧQ`H܏Y}ƂƬjG%K'4p<1~x 3k\jc2ve0g~:%4 Ov,\`G`70 甙Hn"4C JX!E^v_/ĢPm%ū=`gG)Z 9GqRp~Ŭ&An?k3agAՂ _;y`䬜25Z"W_v]=Y Oٯ+x3Yg<.Yb%L$ :R-Jg6oQ+-?5#_c]IFuۑ]2Z!nOh*;9Orvh}%au`/`}05pwJ8yeEip"0$o^:5%Yw|||cNe2!bvxņnkO7Nj[C[R:|ξ͂\2KxT@^`~ 3r!Y߸*ؗE`};pFuelq\&8-\ͩƴ,@do!LE [Q`Kwv0}o,2D! 4Kb2AE9{e0EW`j@$j Hhdgy OYEŴ(-vVlɉT7υI9+ف1t'KyJ*9?=S mYm<^\- {)F:w/ OiDs#şG5H'n ounwea?rPyӉ-)z/ %BuL?25FJeH3}WjC +2ѓ74t"W">y9g-#_VcӖ1[XBT_Mfe:\;UY@DaU+rog䘨^°3DI;NVak% $}+{ڳ(/7댆|<)Y+@Hjl 炅H̳ыV^$SFnZK7ɧ)uBIce]Xd*QbSBFE3~bԧ!v|*|`a@ͦh;Tkm 0]|RP5^ |awGGዦghUx?$ cKZEޔі /U7  Wal/o}iB嫗a # --*0F ŁW %XzHJ]=rMt魡[T4+w-À ʠ늤"8 ,/iOrB37+u~- u~p%iA*kd=6&BLV";ܥt5qUȷY.Fh4d؞H'GJ讽%xPe)WO^m/\n4 ⽼\j@ uب{krGRko\yBwU_ j>aWTݧ@SW'f] >,v-ɻ_>: VҒ2Z wvby^$|[:RV.B)uvPtyIZô*Q 8/oCL=Zy9VYB9<ǒ?Xc!cuX賂o dOJj,}a!-27SՌJq1e4>w|C%{/Zb4Oc&3w〗E> >G=>d-,)wMVs~2g h;=*K$;ǜtlޡ!~\"(Aq$Q"5ԟϿzRBĤi 7'BUDfxw8XLZ}TkY!pQ5>P;SG*fD߿04Jd¼5cޱggejނS^v[Hf3\ž C2GuzSJe(J2W"?/\ɷU&^$Z?w33 ;E>zqJcUVF_}AƸP1|p W],6 ," $?YA'rIbM:PdTĻ}hV\I4ߠkɲem8} '3QR<@˶Y&㽪&ޛ TipH !WϮkk=}ĿI0ٻ$xJ4lx 6X_Sz<ǸIdRJ e= ,uA|As{.cSVOi&0G|T .n2f^I58_ X.uq$8;t469ܤdy4{lP\PΉ1vWJP~GJ1^l[N+'wDRYdeJR'^6糼/&`tԨN||= 0Yl|~ʖ{wp1u})N!^J #/Yu q/qku1OoF-IM)z 6[7"&7:thLT5Fcr ޞL3|(xB1^\޳Uq$)K+l>gfYBOU=t 1MOU#?ЋꒇRr眃Ծi,;F|$#{!<;Y.N?R@~?k0C41ᡡz3QQ6TtaewꌃG?-^f9FSGO=_k&N/7ohjא{8A2ȠN^L]Vm>v#!vR9 O,h MevT;byB'ffEoeY^5Y|y]?JZv@&{qG-Vr6"C֤NIQ r0vJCZ![B/Js2Qĥ_j͗iLFG   ]钪A%ؾy$iQ.?Bg<w4iS-b75c[\|B1j =0P]CFA54V_ϓ?%­:Ф ¾}U"1ęz9|6Y3Tg4eV>5`# U0?xP* Dσq53ftd5it 3}# M2q1Ipe.bxꉕ3_[Og1e@??SҪj-j3oRߵ1>|Ĩ_Dkdt6o?/QDE0sJz_SP7EAqӠA$.m5vzn+uA8Ӽ-ib PO wcׇ-SSdFR5UC5OQ׊q۪hNz_8?p Fs_O6PmyCcs;RFD!V.L$N'a7uu ~<r$Ew̕&-u؆{|ue# [R-?kfu;-VY š)@":r ~ m)aB݋ՀJl%{aEUMfD}+Ư?DbE ~8XvX@@S&a (.~ehJp9EU5`cӘJbV, OR{f,=Wp8xj0Νw~E/{lV ->g%ܽ2\RdNBY.v6FWQ}c`4N-mA!aR T!/B JpD~u, w齭>:|bDt[0۷ˮǃgq,Md![ ZQu}Tx C3bsrku l[lxKt״dhfݞη-}qBCӡ[ )h}r|B'A-E]?Jǔ ~<sgqaT&‰v-28k1Y,_ɍJz:լ7xa:s4n֭σKX&NیK:O[>U)isj?fhaf(pS3z[euRvksx GTbH1d F)͒swV'-{kO:;ϡ0gs@sp>L٩ RzKk!U.ϔ5x`:<ʍhY**LxCXJG<=ӤJi櫭g:m2|w*79Fn]dU_)fOG)O!)enEI5trB H[¯ī~JӈOYtA;{hfcێM{u{~]ѵͣN2?+;aP/_*$$"Z*8QX{*pDɌFҳt[sȜoJ1ւ,VT; Ew#lOxeFyumcy.{6w`|00ۉ|-]/([ȩ5ױD.ve_^f.MZ_R-K,ݔΌ8\ہ5;_z@E?{JJi^z!܉EwjJw6%Lx`ĀI D/g_zc&g/mޠGhzؔ#[0rMK$m!|ɢpWPA"DY⺪_P_}KTsQ搟?PFʰ' 0OӍEg @SRK8k oyYH<_[ə-z Kse>p_iZdJ_a..3֒U\XE֬6YGcό CG׹{U=)B~Y9=h"10H1ozz]Ksd"|:CǒbLb'GIAa3^p& Ch|qZ]CIYj\<"c=}Y+s4t8_܊HCLjg3GƖxxI/fަg- 'CMH^~ir6$_NN)'Y#kL _j5Э2SO9B0 QY H&o:{T~Q۔tr<2tx 4;x.7fG1+TK7?ys C˸-9/`NN̏7s:fU\LqFYS׽(5\迮wp獺8D?&v q`Q\"%1*rX\u|:r g@^ҋs_f)J"S-309'e;0dܻ Jqis'\^JijTQ ml;M^}4mAҡaۓ<(Rdbt@I.q;(! CÌ}9Vd)=Ʌq4TN)^2=ެ22/DŽun嘘ҥE\t"X_A*t/|~ֳkn>u&ȗ5}?7o*4.]!#  ">Ðq͉d&r5 ״Z92ͮ~rwjmU)Sjj,ɱ )Og,jSQ/Ka<=?ʙZ9 S甗$5eӽž«vfJWrTc ,i6^\FR+0bevLsJaSIDXd b~p4D@ vs$Yy<~$eߛLz }r7đ<$HKy;B|8|i@]H{f&?S 5:@n#Rj% Y봽 #Q^kHsx 0e16Ӹƛ aQ3K}<8R[#0uҁO`Y<)?ݿhp+ N=n )/ Fu q}_lMV3'{6. u^%Uf@`(GLJ'z5Nʥ&lL@70"BРNo4rD,%ZĮoH.~C(*,@jEGCTIU I}ơ96<벦sɀ:DT791 .~S^ӗ,suvIhYE,=@*Q 6@y|fݐjo>]萻Yr " #0:p+3x(UBX8iu8Iֹo |=>G:KJ顶}ڀ@ۛ</T&R 0h:ل^#n쨎Nd7WQU`DFݸcԫ-2+-~' HxC R9JHG\95MwoUTsv y-7 Zt+X=^iϝ;% 7`MuQv}6~PJ*<ɫgN1gcAKI8Xa`:&A؟Y0kwd;BǼk1N9b LsavM[4Yv׊%mCغR +.9U#CD5QA)CB)!H0_R,Xfϣx颜K ]| _9VJE(M||mIx%轞{< V4z)cLPg` {eΚ6%P=[Mϒj/޺/`8 ܝw~{+?$,Rst\Ҙ8bʱ>R^ƻDf޹)4$ukC -Y 5mՕ٘EH=ӋnxkI>/?{ RA]b^MB8s')W/3D:YNJ\HmBb! I PWY\r~e*B,깐r5 3YϦԪ-8fEϗHIzG?f{kܬ'P7u/R{Վ^!E̻"xi$6)Rʍl[\AmJxi1[` (e.z"jo#NhTXc귉},"X)cMd5+%R󵇣ItGt|GloKvc~z׺#RDD0m \u ou O n4*f5ל~Y_LǤveO%afcQnѝ$qREAA# ,NI qFT2y(6ښjXp]Û5v diQqt+ r|JBlŇ8Iy H ϖp#}e!8hՇDq-rYPܺ@9Go74+-Լ_ %FĬD Nl ;M+g򵼺PHd3玙G+̡<EwNgpW0ZzqDv Kgqe;I:|! `/ 4 ד~ 5a>>O Pz4dI[DsY+BRhT2]ƪ YR:l]ihYE0u'gKiMKag6bu|\T63:}x[6HA W|Uc})f< eƂmh`RDmDoҩ &Ji¹Q'RFia6y:C1OYe$6/Mp.?p_!^$$NL\ gnzj;=M4Qki}3 `!k|t^ fj.{f)MN}BYljK:6\uR׌2d[ ܙG:p682Ѓa@,GWӥfB|e/m#?*[X2k33kXoi>dή!@a)o1;)3-ufnk,S7˅ ;z.[sNj?ki )T!<-JIXtA/}kc"&W@*hKCdZYosm"r!Oނk↕`ay c- r^M|'6Yʀې<u8ݻ"F~s,4wJ8aAxѦ䣮ӗN-< py` ~Ny ӑqmqk|0_#Cx3[>2}}/W-ZLX%UXW#ﺋ1Rj4%X1M^8U$b|:+3*X]M MڪE%:`I> l57+vefU/K&98(K}3 Q]8H Qi9g#q-^9/_<歋ilO/ΫU(4;9@eU44C~O:#ÖvDh՛ôKՏxI~ 7HRACjfva̗:aXmԙiBoA;,+Qh4#Tʀc.`umow "zuU8KZ 0>@fmG4^>R1F-a: '2scM 05&>Q]Tai 2FNUklIй\~KmS}7Y!RUzMk8 :#a7y7' J%: L¾\d6 9}yz "Bjs׻?5z L}lB? gjj=u!qr jI{i\dt4`@gx[јRꮹSR`Mj aus35ƿflZ=~ѣV0lnA00A ?$H.yL 8VRS<| R {HZ|Hֺ\.y-w4b'4q)'~,^؝',Qx(rH17Z!wFTuYz [e xIigC8$<FyJRxm/0ҁOCU&%om?Ntszȇl=΍U#?gxm '5tpق[d'kg&f+ ŕ(͸LXH!Ve~ؽ1iWr,~|Jq3=a2+16)? QVۜpM<n^{?!JeQ8YX }ծ.zPvX];mϘd%a/ZHWawyV.~S+4Umr>PW}nUQ!VJlZ W],K,lKD1"׬#tVn.|%{` HD(z{5阣knruv]wأn{X*A3>^Qe-B K,! 0;j֨Eq[??Ld hccY /bxɖ_JkՖ1;"1~p')}/A '{ @$}4w ^=(\pNMqDyaa2IMᘆPI窒PҖ &j,1X|hevN@pP~۷K-ֲ\sMUP^c` IٙF8JaLRe˭G-ݽ_d7Y 4()"1u_r\'sp}FG"m~xtW_ Ik3 -9(R{ٵpiض"&90cYz0A[*k?sB(My;*b12Z77DC{ngb[!asj3O2 eZDGE{!D W>gWGciٿ;T \',.J+`3цĀ*3kp ͥ4S\oH#'vPNCOkWI .Õd/vxI O`q8ie5dqw\FIưt)g(R%D6fز0}nMWެͿw*/]`bc:tDONPH4k6o{tX%܇ջ$>@\u8SVH̑Of[k[w%z[}!@p3<5JU|1Kaof/=X2SM|l(< \ovƲ7Kҷ_O8Bg*oۿ;-@ a@ʗ)/ paqhRg % 4R_Nnס#ſ74suF%ETvT.Q'1Dl:r:d:{*~̚|('G8* s)D#"nOo,斊'b.8kER#gJ{pAR,W:" /vubύ~4Xk;0j +z ܛUi]TnYE݀cyӦdW=n4 ɗOR1Y<ǾG%M0hw$ #mۃdCD2m1;^i22`g$G^8}l|Rv[8g)2桼0Rx5ȱNq$ 1@59 Ct3B b4]~Efk 2h|pa o+1eJ]סuNznjt+7s^_7>Cٕ@ !L\q;M+jf+u-i5`T05G>EjΫ }1$۔gU-].h]wy߆81#IbA_FڣCG~ w~1ٻ[%N{yLpV(H6H>ez.?)P`nvٺEUv .ƿ-bqQ%Z(Y2wՁ)" ^i`(IĪ8yEMvguYa8Ǹc)ХlD#4P-`r,s,"Au){l&rd k/d`čQ@|pUOQLVKci$j>ڟK`y0 ua'Rg{FShrS"/*x)]vz~W g B/½ζr+(m,DbcyX^ D[e@:H{>'uC2nnɧ_lZJe6>J;30ъ2,{ve)L%Ye#EMߏ Dɦql+ۄ&W8zۓ ąsA'[d7u>.\Բ-ϿO{0eaT+q-(x@@N|aTo-- ~V@tђbAq1 X8T?Ԋ3Hμ4$_7 WdBLyIȖL 34o6F=X%Z;e(Õ/_d:*2!sITvGS*z.Nxu<7}OQ%a)f2fУi-Of:ʛ1H2/J5-:^;,.'yrbq u)65ἳK&-̼ B-_nh[ε-+:1.})44Z {>h[/^{ j+frҤsZo:'Y[$ =:hrl>O \UsxHg DM![< pQoC#|0sv%'Dц+)f4$y'jqfNR4y^tzQhվ_-xoXrUުlӑ`| nz< ?գ*/8T7w,C%Q5O*f|1r=s_O35_;= h?9[!}R9- F 7zGjĩK B mWdKY4.j/ZUT`^渫}%,F_.aDqqZJ1~ᢠKa~#/G6l"˄AǷ*rg&zda]n8S`:YJ(B#ܽv7DsH%vQrj&j;+|ν"5*`?⛙i5߶P, ]opL%qDo)s ^))HDLCB_;ѐ}s>&OP;!wmSژ3&(m}^Ŭ%}~o7͟ܚ{UQ p4ЭD{~c^ʽ&\G{ ? ]~p[scp[LKԎq ?жP')T9:m>lHe3,gC5N;>=ڡ2c3%n;P`-W`%I3l (ZUo}E2h>ݲF:`%k5Nj{lO9{V.x \dL)Zp;F9 ?@Uqsqm@v!T6#8):Ճ͊'aZ1|!8Tx; }.Ra/ZcW\(0F >D<Ai?Y^BT'p\KS[Ȑ#l d`%-wW>п ,]-(7+Q5|rQY[mZ͖Uf#(۠.3,WM)b5A&ϯz)Юl<EP|_׶-̵~QO'v5xZ;^b'Y:(`FwgϯH9|0HC& :"@@J:'}?e#*"o S»!]Z g.  ьTwV.|[H\!?%v)^Mۼ+[Fɟaw_,`1lu< 4hv]ze"FUo_7 ab+#ҽ^GO/֔ACUn"}-{T Jdc}@(]e5dIɷ$hK)=TR-&/6[ #(w'f+yp֞7 ]VxRx9駮^Dp(q+GigO*(~jhRݡuyޜ^ 3\!d"w#8ٻ H7GEݜ 1-!g) ,T -p6P龏7~JGU%LxY`tWO?QQfg(Y[sC!93Waxi0mz%(3MRȟf'(ǕOv5zER6 w1/ڽ~;۟m+5^iC"3:8oZ_A{MeU.Ms&^Oa_ޔռ|O6g&d0 &y\߀ʼnIJ"syia6un$+TF7w_u;DW-CA\ jvS+հ6ڿF˸0H/ ~MP3^e?nQݿ2{]m8ԛckc"wkz`PMpdi\y.u6-5trTfJRyFr6_ߪmJ#\EzwsBT3FWA`[ vSL4{_o˛t T]``;5$UtWA_(aW׮wm8gy?Es}"?&C90a;J+r?#CvblWp 78"-ec2+?/<ﯾQf11x= #v0 u>8|٠}UuU^, cg Ō듑qV?efdcͿa MCWA$w|=@Rmq/gHWkg } xo\{Ѣa-ɉ8!}?]>c.Jj!dGn>zkZ!Kx+so^lxg]}!v~ Q]UǮ͜uVbXHߚebC+,h_C@^ec 4XMSJ?2)Bk]m(6UӤ'Q|[EjeBriѧ(^)H/hc|%{kP=c\{;% xk1‡ 7>V]5; %0#WW\\"V$,!ahuGb6#arL!̔9a x = ׹M'`qls) %6ƀM M &BG~oCe/Kޑuv|Ȧ %܇,Q̡)J)%"2ׂFtZw:=кݥh͘AnM+g L0 Ki#ă ML&Yz3ՄU:c$/&bi_rEV֑A7N!A DYID9SG1,Ė;iQ C+:;y\HA^]FAgF:(i  7iΫ"JˈdN(UHS!Ή TpB:-xbC/ne-XaQb~wWu &iMf%yѕݶ{c2LVՉ#"VR%|^ݚgRϲՓߵUgoS(6A"F:]103sI|7Њܩ1NXz?r;ڠX:u~^Ӵ %b~Ħ5 njy]ōE|bsa,b|g'V5HlqyNCKȡs*mNà!$$ɩrbf'ILFG=A.ZnGgIMaJ9W催&Kfɢoݗ LYz)@RqZ^D@P y7Yxo ւ) j s]?kks7^5Ʊ?c2W!y-ːl{ׇ2ӗĿ7m*%0J?ң-QXS1[ yˉf.0*%FIR[, lh`+Rfj,t;umɈ#  \+Fѯ)N4EŏF "M$ a8_DWv_[hej1%8Z ȃeB󫋟jE?xz].3`xX2!=y1M^oHr^j^͍=[K+ 1RW}(Ԩ"VO +<.n#4NN>XleZZ{n!(,1eA/>᨞82[.(slE?W-V+hhM8kfɹKVqJJW3O+ 1H\\!ٝ|UZ|BXwӃE9/,"K>tV537DJ(K94Bk!x϶S\.0=TPHok4:[ +E9EPk69~x 0ИM-d@ Ufw8Sa; S硫HV:KQxqH|Oђ0HDƀSP]O"bR7q2$ is@keԦFx5YV-5f* 0.QQSzE+.ɖ0[],/z)`EOqy$WAyfG{~T =kǯtevP&3ǤrS׌pUA)p@:MqR5- ۪m'bKBZ4znswx}np"O68#8:@Mkp)G,znu(t!)w4bʀ68cfTh F?1 uQ֫_ض_< `n Qs?u!HZg:3Ӕw%}epɱJQaU|s8yN'\o) 3R(ؠ&TϚlN$=T簼րy5E= wLYwH?VxCoGR4_˪U}sbfnR@CW?M5~9 MҿεaE]+nQB|$U4g&澹̬ -C0.6"uKJ>d=5#ӟp_L卟[="ُZ?"~@(rCBf2퉍 -7ij#jq}Z3*Ӻ0jf?zxy! 3[?j  ]`[;VqHչVpE2Q?/p~$鼱 p DHGv[ݔw/ʎ'$r{LxozZl kP_&HFaӾץ,}}ڴ77ߕNDsR,8=.`IWQy8+t}=\ p_UѪfſA1vInem f Rt%Z_Wƨ-J򷯯QBC?fFE,dz! =GBdc2 WGg>w94hFb,m< U\^lE}RG9У%,\jE)֬s6䣃 Ґ0g&^Kq󅤖HlK˒2>l/[okx6c)(r8mљߚI'| ZA5`H-`& c_2#$n1LMXU %R>h󰂏"9k8 FRmn䅠hZ3V Pe? r*\ D*Q< .E-KJo#25טCz՞-Bʀ‘UPVO8=47qUo3V52dטt:[2`6g-j$ kK=#΋$?y \.LBOEY\% q?n؞ى(bXXJ]kyY-I{@C8Uy/A)ޣTz&}CyK+$x>F$NBUAmY~$e,+e3&>[):d3ǵ{*lq| ʦ1>t2ͻaRu),Aoz,M v<'&INƕ4٦=` R5ͫ sl5֫;\bM6oQ 0sk,g w%r 6BϊO3VO9UDVWs|kܰeGt!6"ct 9kp+gQciw>;lkcׅߊMs0H 6Xn%xȼ%o(diN*̄s]KլAvtrO^PֿPBhu(A/P GReN@MN:˻" 8&y!фJZN3 #Ug@|4*=raDa3p(%oWJHA$@g #,uj'11ME4.eCylt~NMM]<*NVc>JR oB Zƛ |VFidfɐǐr]AIK_0GYk|@7D #"33H)ɥ&ځCD VN'ōSݕ3+8h3GRP: :bK;rϧ>/"r{"W/uJc&:6[NO7HiJA)y0\ܨ <זWb'Qy^e!}כ0+6/VkylzZٳE:ՀѼe_/3y;-w@$K SZx9\d2>8s-@F  #ͭjJ'8?.0Pf'T{>H dL"]VJ]g?X@_mM-Nai(ޱE !WN2=Ubtau dX96PZEDSmك޻7Z7̖섶!yEd$;~':;)]8'[խi]:"gm.Tg[?N[tLr'vwuôڑV{;wUfmswB .ףg)`KR=ms!h!,ЇsCەm:$,%VlDYreHZ _\(ٷ;f[0)5?{&‰Oks*@m 7wN:YwYj[#N׆hX ѷDP 8{gRFǂ%k>^@N J댳O^^nrG-<ț`Rp"܏ל])0C@D!!Ex.#!>?Kةu=s&5**U2;bONg06VC4ҵޱaJȥ^>>Q?CHЭZkNsU)`]Mbirf-m^)И$ CZߔ)]Ro?6TRmPa{{9}9Sc7߆2 x_1ݓRdʚHgՉ7M8No£œg^3!*zܶ7drYx]w2;` qJn.FpLX1⼤˃CϿ7HP'/tF'@Dʊ͔Fd++H%AYfUf$Xfv~JyyG$X{{,|ĩ0]/e'lGT N rtSW=)zLG"AseAf!։mu)LɊNXctC]\mipV -%y ۝=z.!b-S֫O=*ϕMɕy͞9rkj?]#/'nUF@-1A@AT^)pH##0_NAo(e9Dmu>Tw#7&m1 ;ss#3V?[5~`O&rB5Om~Ԧ9<_#J5fl "Cb|>L2Β${(j?0 {攔~ѐ)gץl}ikuvלןVj{+.̓qqjaKᙟ%S.BZf}`13zlh|@UEܣp5 =VRڏaF|d$C Pפ_4[^`(nx}zUPzDfGT"bJX[j|6~r݋؏w,R[JKLWq7uuH<2_k(}C ÞqB"YI*砫>dIEptyf<{e }^a#f %O~CW 7j(EQ\(iY"G[:!!ג+=Wql5Opsz݁_e@^]}C3Ҡ꧱JSGdB _>xOVw?E>\/ڗl, ϓet$x q*WBWNx8;de*Fle{u9Q:@mbc?(@RW?[QÁ굖U\l\Pq!,FaD.f#԰,a]1 H?ZEE$doB).\ ΅\`Fݻ ;ewb'S д"Wgu;r$RD%dm_ c '`?ƼEWUTn,291W Ts'hpm RUhGJ4&> \>rÉO$茇vk"c:k=P[:ݹҦ 'm(δ 51Or PN@wLr(o(M )78pkkʖ]iaaQpp7KPtikAgK_4ښ-0F jwЈKFXddq6 ہ95e= 0vO.kw"I$.G?8KpP$]*(O.*Jrg~v\|ՊpnYD] 7y!݄KWT\t$ 0iso(/vlRʦ\ho#s1!(1jQĵnQ". 9ƻjP{W6ӵ>܁?~zQl;vSHAfPÿ7Ƒdma3s5Qe#S6E)oP3ppŮ>ªYrA{[KVJp!唙 YX5, rn0 WPj'gݠg)Id?[".#9;0K=rU=j!o?-Q;ɀVQb@ }؊ctX5LLS~EV T72da߂6knPh`_͡ɴT|/+/ \uizS=] |R@7)a$𨾳؞^b2o<"'G}֌$kn|3mhXPñ O6tTI^u!eWO>g[ogˏ-0P/_̐21B?cl[:~K] uWq D KZmMa: @:>652%.98f@PM{?P#KiljzThSJ:Z:Smȸ~.U,EPSOj`jW!>Zep=6eZ߳# /rÒc3BNHT-/v:hg\ ݛ[?RQ"֥Q2.Su2m&=5DlQC ;F**H b) RHO!{`7˂QuFRDŵuQڙ낃VP;^U= piCM{deL[I+4/"5gÆ̣z9VnG':} _氤EڣbHYkpp=I=ҵ9cHv7jqi/|pȩB?r r@C6eeK[}zK/_wuNgRdiR߼)TB jyqufp9 ~nkRՒo٭0JQsn>GΜC?d#Ggn<@ol0},!L:hrPZcmibJ.=qKȌBckT:z$Av !k6Aa;b+^LEK@?x=ș5Bcz[Wp17/TMeRZ6NYۃ'`AR=?Vu~(' _2XkNKyxռM>ko8IFK`9,e#D-цozIR?WJ#v9@5֯c|yGSD@CGN}Zv%b(.>~2~ ƽ}k`RS:39#WHD:Dbhu)ǖ !Y{ /`^5bzdGtIA@ڱ qRTtyԝ6J63Sevi2"hBGt 5w8Я1ǁC$.mA [x҄pM@'ʂ4ДP,]0W?;A3"yAa;([sQZ#K("g0GןmWmYqF >g d0*3/;1}.RxRȤ)-:3g#8#0p|%,)^n0Kp΍cDA7Pl3M7h=r A pq!;"8hօ >8M(uBDɍp6l?E0HX9@l 9z/y"RB)?7ȬtyM͂܎[||㇌l+bsrMњ贠}()5hYz¼t6<.*#YȆ/}E_6x vy fIǟO$Y5%F/䓂'h EAHyJ}?!) ?UAW ܅C9orvSᨲhMNQfQۺ`7rd}#" 8N1} ˳̵<)m"fM4ͮ =&c1S<^whX9^)8|o)U=~]$Ov˄pa$%1{Y۸\6g,.)Hp?]oia(a5  C4%rymXbT#X+hz]Ew5H*MA;$6+Ry#[UILқ>'z7P:t6b$ZSGŹ_^1n-MMm"?0ɸXr9@ wl)_ J)UR+dۭ:KrZ[0+_ ꍠ7Ԙ1Rr41|\"xY]v-abɮ%>: &sd( 飶 _D{a+L/{>s%_Y~ uP?%S-̫Vpd) K `bfq%EF7 U[Lh ͉/`|c9Қ9/`^j.S\,: f9ĭ&VBE3]?& ,NBRAL(p-MϏ&LόP u8`kU?E&>S v8Pf3l (ǹs&l]{g KUP^2Sj~eO:3xz_D:/^z4 -%;`ض%Ua_Zx#cb6NĂ'wideZL7u*O ]ov]!NgTTVH+& %uƎ06yt" 1`A+30VsjXz xmbR~\#:{8 O,Ⱥz tsYJ#xV*6(+G. :\!"-)"Ҏy_T18|c ` 3v*t}Bsфf[R E WNipšF:q̒|[Ř ~ x[!J)XqyuEQYBu<=D;D)2 ddpB6tr䗥rd¨+JF=ަ=lh+v9Z3Iz@EUaB],yCDƨ`0l`Q^/L4]RM QjK2ыaFA=%Læ&~z28NjMS4[LߛVX8ţlq?:)1v-5%٧(K tN?]߶^huDx?\~=Ym qy/_j䷘4$Ϸ ŹdȈ”sg8hI,H.oU4_%OON56sk0<Kg"Mn7\h5sWn]𝙚M"-*TkL#Zd:*`}FS_35?O"۰nb9lӨ=7*ަ5Of{5>XlPK\Ug|LTv.7|PC;lSd!( +j|+е!B uvŗHdޱ"@{ZQ4:vfb{^4;w 㷐DT)@>W!F<-ZxR ҂z/@ޫ`~򙡥8֢;+j-MG4"I?0JrCC0I3&YpyۓKT[-3և<5xh? Qύ2vVN>f=hՠo"8z`DQvWp0rw儔['o@a:ڵ:5|Gd;_K>8DmH(I H"1kuT- G ~?ܒl灵CxL3>3.BtU :kš٬Ǖ3rT.3e*Bۆ1[ٗT KԧvHFU35YɌp} J ȵZT)GnФ[EpϨ8yx>\W޽ZAHCLd#C3`kP*RQBxOɜN [='8#8ش oѥ.т uH\S޴6A 偖R9ڼFof΀#ΘH*Uv}g,َk{O$DuʲFQ>9\Dh\^M8L7偺4 w Sc1j/~nu˫٢O2n- L{, w`ptCc@lAxasb2FͿ9PgUv~R!/xԐ0   FGh!2\nAȬ^ATjn9cxOg?WS>T@ rgF8^w:w9$^8 Qջ6g.LVEg")Jxxu)k#D:h/̓B5).#")(-]G1\^cP6/YFÀ+V`ڄL 8j`bv,Qlz< MdC-lGvKWKN91YgLVG՟Ea`(!?;DO_-]-‚RSS!=KCVх4ǪKf خ)ORHh/Yo^}ɢ tCd.@1m+C,>&0bu/xրO3f蠿Z>}_ӝJRWғxArJ=Nڙ(ܚ̚;ǘ^7}` IZ"+ˤ!d==~ñx5`\kyLFKUգD|/?/Yyaj0YFJ  M 9\G}fzDydT/rIy % ټ0/g_&7-͋v6ベdA࣑f`%r8+Joy^PEȒfQ `vF@;F}fJjkKPτCEj@\RKEۜMc_ ׃ (10{=Xc%[z{9E!WwTVs/oC6(⒏܌>iYš!5"+G#0 k~jeB٫Ԧ&7K5NvջOݎ/0C+9YcԷp= ;e2WZg'CK \NO]Z4ЪMr1 &>v?|oՄ{^{Ȟh?KIWubcdºL/]e,[{f?A-H|\Ez)oxDi/\,yJ5;Ԋee<#Yy xY2m<l Ñ5dMKA|trL?IX<שGv3 (ǿUߋEk3Z8e]IbCחi?\I9:.VV?4 wOٲC*GvdSݠ8_< tfWwdX6\y `hBZn㾦FJ=NLYgICJyzNud^̥YqAA2$iup+`Æ FeIZ 4j4K>HB5 ?KRi \X)M  ʯ?FT寨|Glj)H)9@ iY#!j= (i!,de+;6lK5I {94 q; bYG\?D1v`*|wڬU>Y}e7V` <}O>f_m85U姙QJNx4y O?+ 5ҟѢv *D)L\]_*qu+OB#̏gOPW+LfL+:lXqՒg8BJ @ D|-Q=4f)kƱjP7Ʀ͔n:uR~crp0}q(CP v\DODK^ w$gCe ˨0hqٌ1@AWuBR5wmNx !/l! ^?WCGm6͛1c`9yD?7ox$qr୓dq$}l}yR}#jZ@w2k1QJBL^Xm8=k!yjx꽟;VmX-P'eXI*'ρm}Zӵb/&{\q klr0*'ncs6k6SOż[_z80S1TZ2-lAcn )*6 N :8z n SnI*a7F k-=:˶#fUvWK:˜`ӎ4qKCaNN(=V%+q踌? !(& g'Uǻ b6,=C@tN_Sm4?Q(aY )" yQdN/9BV0N&L#NdI=dA&UT1?v,H1н;{Ek=)86=mT m %ӳXp|s0%Q0Y99z=ӛ+mn8yL/D}JV%OS;Y4ח@W/-سh3)S'_*K{Tm]r?,G1l@hHNRIv?u^DVN<ֵCyNS9| Nn! HbD!Y+vVKB4.qU3p ɩ,>֌ 6wkrEZ%p:PyEJEHL-Wg8xK0 )L:jX [MO3. j[}'W乞?t-™̂4p&DF4Kq, |2f5XOՖZXZYF'(%"3 ;g4b8 "q{ZF895u"AT$Z߶j! M8S(QB8=ځ+kP9 @)n--^/{3wެeߴSJ&j|5ꎙZ_tbFqU|NGnj 뀿wȽ0<к+DR3 aiL(>pJT EPLjPm4Q8]` & O}MFԴ]2ґ08UʾV+H52&1ՎM. @{uXJ6aF 4cS yb#&{~씹LcVUe.`s.|]&BɥݰM Jl|+Hj%bH(1_ ihDRc#%#>$H)}i$cp]O&j</7grɩ<}D"?EL"0I-"p5ƪ;h^c<GfpPl{qL 3pl fGlA4˳k2m7oyf5 5>߰>i\Uw]Ɓ ZG|zp}>'kIyR5p.@D-]*ä#&Ǟv; $Bf$D. eI#E^ߛun _a: Ctv3ܔ)7r#_5Ab\!U-P˩~a?Z[y ymm!߉U4-PjHV-1)zY"[VA / r;&^qRH"%1g{'kJ>r6&KtX.)l"ĭAb':Ӳ(tjDq090n }ny"Ay"T*lUS3qh~+ 0Rʰ6W@ׄEϏ+W@4E,jpimWWFzc: `;*GnN~F9pޥ-ZyRٹl>rg?O>|rZB^7~燊 ܾ~ɜu=S\:طsiզ^=6-Ӫ}x#OZZr@51¬{XnyzGf:B٤ uˏ9M C6T(>e ք8,v8h8I5c 숀h]r8Rz޺B M9a@Ґn^Ҷe(~G^(]?3wEF^ ('16)J*~yk~pO9 2gT{ձ;fÅN񪢵<+T&ߒnM\1N(>**Bɡ|P]!F0%biOpfV G;r(bרk`Cp&3R8~(i%Z;^|ٯr F ,{AbP,{mwfFWs5N3h[/v/ay'n=yVOQ7BFo_W+)=/Y<'RI ;Qb#dd|[쿧5b؉x7 Vqfd!a4sX]]nVEAyd&)AV<BH6 )'Ba#w 5Ze\Ѝ^_z1";%ikC>>c5 agh}ȚM9ܱfz^:hLcygT5qG4X_ۙ t:oRD *~ㇷd{ɑv @WrLxޚuWPPXjHFwrTtAaIQ!;\vRyPvT ;#Gt4Z5s\p+~_/{S@X=A&\`֡h]^>(. V*)% ZTYM{??Qh<%cen{]XJuD;jXo֑_sDz Y`,{X ̪sT|{e̒N ŮeHvBD\=ޚ3mgQX ?trH v{92_Bz|Wv/ ݅F3g < ZYYX%p%n@#b |r4" \IO DμhIEZJ1J"4KᆔP ϞMˌ^{QbdwҰ*ivs'9k;` .Qy{64+3b9/,~RM1pj-NvUJ Ucx}4WI=$ה5}ԈE]:q7Z9wØ%mP']5e2ȣ\RM]슔[8A8_քDD5VXPV,{_o^/w<`%[%%}V1q L" P wY{4]d0*d|@P΋TƽR%X (/~}bQR`Q&$PL2dTs^d" CQf4# n} +e'VjƌcUg2` \g3:!3SdPAl1TAV1uq_8b&ƪ_T]qFS9ƽZ+ О.)0 ( I.<6;tȖJD} ,#w / «&r*>GEI~}tw{vQlhԦX~gw4-ԧXץG9WW%sITr5jJ9) VM{D-Ns):S G"_` ߴ!{]F:b|U4*v.',] "SEJ"bY˸5H ZWFU.!dgSWm*$oRuK1Ja;!bɄk`?2a CIfQk QMϥ7 GBb$!HnJd2 s3M7Ω+b֩ѣq챌s<\D#gXH2GAzP1;th ]H w㥴.p_Z<ijH1ڻ?WzoGhv[>UF[Y{STL=y0isÃljdؚYoedeTKK]Ddr}fSSo4;+R,=vHԽ}&զ+Gss|?($j~|JCr$J|vިlQ%0HYo OZ+ !@uu'uhm )vKҘH[~VYo=NApTaR=O=45s7 Y:R+T,NG lp[5 OkVfܳ<XW*qGAnO rױ`Ǝ2gI-D<B*8 ĦIVQB} /]^ϛSa6U.P"؂Ը#6S"[ ;mV>)Hz}?CE $,Mjۡ \"gnjNU`_:!4=zr/ˡ E v])_5 6F:{bʂ_E|RU;qz_tc.qAVd]uGPv^z[U}L9 Àz>jOy,~A|-k[WG '00צ,'S*sUݣX7_OD}*dSGumX$z_mK ~6[ r, K!xтD Y \PdQ9 آzò(eJ 0=ԋhFM@2wAw7QA[fsAZe0oqWR/ZMZYWy3rv *go|n(\jN'Lv%rSNe!Eg$ZE]akJ\ߋցK@$u!1gbs &ty#7VΔ܌38'4a7 ]mc_tꘊЪr512,$X}NfTt;_[\/7df;d:h`p[޷Hy C˽1c3e Q >?N;^:I0@CA dF,utg{E.HN t}J6~ͯ"% b'L"(G 浭z >0:xa4!QeH) *ku&!Yd TU#ljI2kYbo w -P(OXpORIhJ$ޣ2VzXZwLaʪ3#;zܖ(zH<}sa8+DE ~;`) m֧3] `yT1Fѷ?>Jֿpo12Y?^gЇ;ud\h>oI"U;M)LouW%yڷqe3F=xx{>CΧ#`b(#_e8N֏T`M 3+oUA͌&;rŬ Gn)UͫKLV4ti5=ˢ /f2!A@l+բpl؆H#a+ }l̲̺8JJFye+g2P郵R  q|Ж]"-(󽶂zkJ_̈}Tݧ áJeClsf0P# gԇy-GbCvu:Ox32ݥVϪ;e,*-T9=!u]n}%NW~;tqQ BS">H gp4bI|S5Kzᗾ:e\5HJLq3aiiV1uX>ݿiǩn x?T lz>t3@=xЪ2"oôB%H5ӉfIxL5Iο%#Y d|i9KbRibt0$э835aViʓs<}'7aFɢ8#&gpBwh,o_5w>pt [58,I|NN?)$$ @,[QVMkJ"H>C$TE3 i}ul9WUbisXSI%{!S!e&O՟g5{GZ!&QH=@Ho}8 ^ 7$ްڞbzp8V.mщ/u~_Nծ9Z/ЕSBLD$ui%XÿdXi;.( djEmftICyz@Z]h 2pR7ވfvt@l V3= z94:[յĆ f rvL띔 /VZݜuX由);y2=f3``4/V"^4`}RKsXaocqH_ 7W?7 `ՈZky`>'T0YDq/׼m|-!&F * wr:7:g@E"f-?gKV;PWQ R耞tzn/ "^`quk€T+{5CFWiL϶*a9ul9 M D |sQ\8b L<jO~Mm.\L|tc7L8{90 \ün* ᳓Lfvޠ"dWU6b.Cc>)\E#fv|]]] eѭuL;g+T r>~U#B`a2NwD zR 6X>r |C| }({i.wecIp >*kIƗd/r޽WmE(Nd ɝPj-T\?3IbYoӽ0KS@G< }ͺΌKZ\!)Ch5&a^YyIz^+d^cM!t1LLTF44{EygK㠐4qՊC sFPm 7vPBT118^t?!9,:(E]80.9Lˍ4wꋡ~j{ݳ~ON˒SϫX}uNJwnDAȿ{;Y牓 U} @,"ES"5u?K\rq;;ci9[J/]OgFvb+Lf߱C[F/d&Z$PȠ6j419O6hJDgs7Sy)@5 Hha*]~6a+"~`#]]ӌC7pqAN j:[T")W}nN! Ր$xq5.|֩lԔ8-EEZvH&v(E[((EͫƕC!_)pp!PD?(%7YV7 ; U=lA2"30ﶆa%!6 Jn^ 7>oBs$RꄅUȇf*3$~>b^<)Հ~mR5:#3hkUh[ %f(KU1]$뺆lp<[Sպ]2ܮ}D*jLbap^d%?PόIqRVjs8 "ry%hAWLa~E\Bt:ܔBP l `-"6H)Ĉg=O DfRxnblDn@tERB{ PqQ à ϏdߨTLOt41d<#\i [SȅQ[3k^"$wqV#k1A4L)w(4jG3f*GFWAʆ"T=+ѷ7؍eolE]~ɓ;G~$P"㕥WV[,$Jrh=͑717@=pr9U]R!v}O/&fc݆QF/r6xY~~~E1Li-} k('ޤ_Emvor&ټ)4av|}]}\ U.Z" :cLo]g$+1΁E- 'w8E?_$_boy|u-Qbʫ ? fj-!-4Ɲ&jMFE(*ƴkBt35?JdӦFk2nEɯn^T 7ʟwrΥ?8Ѱ0(69PH#cmh|{Gv3$5SRܡ>I94 ?h`}?𨹣?fWrO – .+^7LqR丕yV?eG $8v/+vZj]%j4lġ6AS9?\q0\' 4> f(kГB:ͻ:ֶWZ 4m'izQ ^ڔ1%qJz/D-k!BXCDs.ovT[pdlP#&dk .0C:ȖkT4EWZ9! K:D@0? =A#/2zdW{LB'ʳ_UɷVԾ_1G$u.$Y ?I\Xtխ>y[J$^Y7m+5mAv͙>+CI!/4\dqS6j-,78HRK뼾)cϯ~F])IЫ-Q9Qq>\0E& G۟ ydĆ$/0 oȞE/(Cl Q,:r*H[,t  d2Iޓ|-,}457v<٬6`{fà[x4d7!V)g.}KT_=Gu"pc X0/- ޻ 2 `VΥØZըщtGˡ"^F.$={%VGv[RkxF%k=m.ţeU.̴n2 bHv 1"1>]M1Ii {-v'˧˓$O%/iu\A%1-t؊vUs%TV@ 2c3Wy*8@~{6n>C+sq7!k8J'ïFyw-9LAC-eQRs&8T4.xDۍAf{dOFf+u`SMF^x..Z~LzB7V;2Wr!{mV]5@ X9 tL7v/_,!Nz. ,}ysrI^'r-ν;-C*DY cƣʗf&Cd?Gm ۍ][J+-(P]zN.A`)-0s5".~צ{(r 0^1R6\CYFo#ik P`5h.r tkMq6gMUo]RT"Bq 4f?ǶPzwpSc?)U YEj%rp,sd,'DJU)QBR?L1B㐵GDėiofkf^4F0&Ex1Lr-ڈ7UK +Hzr[B4HmͧJϤR'PBӲ_+z9_\ԃ <שfoZ=Y%@3v6 6z|vٙ_[,I3IMB SW؎O2מ&-V4'Nyt {hwa5FS[ We3p^͒KJŇmDt Ns\2~P6jlW>/;]E$23OjȊEfqކehTʏ)‘E`wwһPئ=*flOg4R]:{l'\1FKp G9-% y{ZL=EaZNÄ&qMXƞ _evrCA߰":n%ˡ5}W2gac;p6.QL "31;' &KC>Ȅ9!E7gXTe99 ~ͦTP 1,Ԑͥ?_u&Xո✬)4KUHh+-<-n Lj&l$rX23Ic!b Kۡ1(6  japN/D_%ex]n|v 4AMj $Tt1ޜw+w!Se-|asAHm1X/5ӂ 0uߧ١tyH0]Mlp& L5pR/T!^09.xvIiLhc!6Y}Dz+J/Լ0N?0# |2K_Lb^D83<`p407Ӳ((`:!?pA黷tAFcvm%mĈ Lh-uу w1D{ok[V>!A<9Am7ږo}lHٶY9 f3S:1Դ 4˙$mV jS u pArk3yaHiI @uMGWB'86F$oPLa9x) K7k,DŽГٶLÄ-3'!xP:j1I?t;oR?29sKq?gƄBZ4}W,QוԮoOO1gJ CKGnC-v~2x~D^ӛ2(;mMʡpd% yp^ K^Onzt4CnX~aP0[ʡP̃oYLo*۰;&$ -` +mgotZIMP*]=>$>6sJZq;pR0A7o% O&Lף{4m2I9햪`XGVlXufo#7jvXo,%us޶qpk[:u>y,U7<'/4=]Q<k _}B^!^ uZ;V\M/nsIէ2͘lS_'dg\  47 ӇZ5sJG:|6Q9wEUFmK#dvceuTA"0d!1ۻ*yvH;^1? G{M  _ )377Q) eg8Xxҷy&iwmgO|t]w[^HNb`kxm6Ld)H`ՏeMS7? f?V+{ES6 Q |Jt[V{de1<1vN+B^&aM0hquԲ+ڃv47͞%o%DaIXDJdgɫ'1%M HzY͏ax ˍJM%:Z)'~Vr2z" O=iL`~-%= OZ`lSf"Z?(["O2aRlڶDъr泳J f$_{KgwceOK =q;{{-.'ݥ/neظ}CKY$4{#u*+p8H"^dG[PK#M,46阯$GگbC@k_8윗X>QNv3LJSHv; Қ*=\tznCdL\T7yh#K2e" 0Z-L9tT&tFhft+T i3713m)SweJeD!u!x}bJ6 N9ѱeuT.xh&;e&h^VV>>)uՅ WF ^$:E p)ղԤ4|/AD!tTTg-`Ɲ *ss V@wD\f.;ѭF0 vB)j @횾YR?5\-/}%3lcR; ~dq ])Օ3Эqˈ8&TZx rna8+ dvҿDR1+QFe4a_1;aA_Ũǔ%:"e@E #Xu2a _R*&O:&caˍ)``rdb,ιS!Ǫj^Q_wAO`Pg]x9 'xtD/JuwPQ #U74R ?F RY4_t; *o>1ssV!r)ȵ&R1 .ykMDڇEdi<3n>aHu,Wālԍ 煇IgM5 2PrWU7{opZ~\r`p(iC[ZH ?|mWlib7\ \,:x؞O2FWfBől2 bԭe9_e)'UA]tSW1B ldө}='u& sUȁs V[t Ǹp0&T\SS(,[u 9W-bQ@Q@o@ʤ ~lvO?^x1l>@V^@)::8b٤PC r;cм*ĠdWOg֩lxAZ*q;ӥ34&p(% C 9BXd$##-aq Ŗ`g q2"Wfǜ.[y?A(~yh[*Mʻ:&픡8Zn^NugƵ{%OF+X|eQG&αݰ}Be.giPI4ڢ@- v` -z[ƒ9Y4G=LX[(~Co郏ORou_G쫗8Nj~%'H`-+tڒۧ,l}>+ۢ2i R=8>wJwbtFOc BБcCM9[>rŚFU!')5ϵ +F@M.KKp; qv%l y( 2Ll>P6c5 ZTq7f zlAWdkǬ+:I|E0Őo˺Ǎu$-5Δ>;Q!MUI3٣e1䛧. XZŚ 7#3tu-B6?b:jJ|OI=C"6hSp*9ܺL -F`jS1F4a[8k:DjbN2ب^O W .bݬbaYpԪދɰL~ ʲ. A-_E6Bʢ Hm2DXL\=GDP'`ya 1a AS?&ZՄ?6?cs'ƫ+$RP{`=jC ?j*sUr_92YeB•V2Nc侦Ԝ2 kB^u]ʁc@3lN=8Wtҕr7d]6,Vp N'OkYۜ&$$J[KR&HG*f>S\'Ë3MwXh*. !r-ܲ2Ex`׸$~>w_CdaI \ؒ0в%_&hC1%-Jѷ$CYU\j{vLk+}rDq!\/F q:T0-zgd緄0|yd&G#&W)I*9pX=9ESk> 5]GZ<_q3j=@jl6> _C F\`9z̗'D]ҥEi*% S$wJVR{M#+*uU]睷#S`flǜNdw ;&5ۼZ2zajо}݆ { 6Jm4\`z\?Mr)w`נyQCYOv~oOiLfG-F#%u6և ZGOZ%ڥ>G`D=:~x lvo٠c;y8n 2ꇚq 6]Kt, hV"(O~^E)vmQu0kW|#J15>竜`7rbCY'uiآy} f_X-_kf}}kD綷Ԣc)ݼ0eji1_q< w"5HLq63yEfnY]!%ǻk(#șͰu踬gb ,;j6G%a5>(U3j`^h1n (.maVo Y3b$(Z:#x# n$o58v{ 4Y%zR5?i9VzyO]W >pS5oEĐϹDq}S"Ao.;38KnsijgARE )ʩ3o gƭ 'Qhu8mL|&6K ._kj;%)yҜ]Y.%84n/EWkbm'n_g?YDJO-NȧH$.ݑN9r5_nowˇ'XaROx k(k?snv' ح-Ԏj{DЁ{_.-ع${cS 9[jbi9AP3ͦhU+;R-wȬE)Djs!YܐGZ ݓʃŽ{WjS+;#gabjz"Y&)V{s6Ѥ(K =]&RSYK X~]5j]pΉx YWtlbh$t8u S,ҋq XKfY.DdIR"4gb2k\=@DK9Mʗ5Ilr)zͿ[8@[Qock[ymgH^dLi8w8hkorYw3cW<JalFu'F.k,tn7: AdY-o$ᝀnc$PA]s~7WLj¨cZNf VK42io@}Ȩ7^vZa/+gt|rD6*,6$Kfd^UԦGGC[a"{0.Lz3 i$ߟmJPg4317 5۾GeJ cIH2|I4K&X[60nOhbխ^p]6/W?8lx2_ &f)6WB38#"'8DJ[ flL иTvZ2_c~-|!ѫM8=61+_ =2c|Uwpj *euSN}2fE"Tт!3=`r " IB0mr`DyKutn]+!Z5}0u3'DMSwKfbv1W @PմN- ˋL/-dƻͥ#mS:jay@ +ۇt-LB vn W\1/ lvҍVQngx:0 +MпAǨ3ki`jr"G.e •,}'딝=eGx%{ pA4Z:q T<OՌC־X] ߕvC&}E 1KqQVIĄez_&hn nQ)іD$Ny1 @/0o7:WKԭ ߲m;Ѫ|Ie$jlErsz*/7r{G/^.Hcu֥*#0nɖG^/ETɗ"`2"6r 8 sBr'؀g)Ԯ1`{i>YRET_se KoQ򽓅xtR}0ʄy@#;>Wj~nbns"GQD/.o "|$2lGѥI9]^Ud܆<$,$-iFl74r b4 5K==aPP/މO .vb8B0R^_4 /[q\>P؁ERF<8jȯ|k-U ?gHn,h,* Φux[cnZUCxKª0QZo$OV]eJ :V.(th9nj|ʩ螆5{\uC6Cַ^{+ g x3Ҙ5XnOO@o*2wby)i)[ԭk=l<& dlf-%^zYǜȎ@;W0bލнI-ПC~b{q`;:{ Heܱ37٫&_˫y4!/' 3 p4HSV O=Gi 'In:H=LھRRqZs <&qpV؝V.pk4 cq:Nr}~Mݹ2R-P9$Uy֘84|V ޜWu)xחItaCMCyp?UpR]3Gȝb0;HAI.eYb?끸IQ <7,=; 69+t+ktxGJ.gI0+ SSZv{SCgd A1봗mkuƒAxuTɚ\ ;?ngP7A[#rߊsLp6_LpHad)dziz`-ZrdUzt\w`me QFz rtLjdl->jZI=ir5vYՅEJ Ls$:R1f+~ߔsUO&nIk~FtJX\`80->nźY±|Μ HLXw0{u1bۜh>+9֒svnvOX{ 7Ud{/ 6 H,NgaSԎq^ $;^T"Vre8(&CGw{I}KLS@Aop Yg(+}N։*uC {3M/Pkz)HT&M^subOlw*sf&GۭT""Ǭtw$SskP6U#v5htxᗓB>tLĆx#%멗 l'qD)M lD<'ΔD/m*oᖃgcfdEخfX֞cBuO.)u,)o'C<fAх*. ;1ݐpH$~םάt HPIa#. UV+#&,(GGmL 1;u7-t;Nn,$6OseRNq3*e}naڊsr]L®..`YyQU;;[ Pf= {h;bE[ Ui;/+DM-B%VFHz<B'ANt"`AW+ RJ_ L֗ 7CKq,1 v䑡E/rYV8x*Di@CDJIg\jK[p`PK(dAbpQ />&\y2Jw=p+D5)Gf|uq1WzkLu\ {meE,oD,иi8nLNiJִ>v;$'~9H9IW4W4 =ٔJ{7)=C )@<+5/־ScKWe#BkC;ۯW-с- 1P%%cFvaؙ\4X߾eh Z8{unsh(fcYB % %~ywlzr,ކ8X e!Ϲms;fgz=U֯"uk)i"ĝJ,hn ur&Rup0J(ݽ`jz0͔~H˸39@F&`i ]+4ҹ!$iHؘh0oga 3-ϫn]f!&؈_"n(s);p嬦%锯@N.PNG*aMQYXQx0(# 8Y| oNG{,,^3dD@h7(uVa/* +LJa|O7c)qk4(d>b7"!Hn }|ʮ7b rC kvYjegM Y\=/Ad(Ʈ/?D蜤͜L@j,W$R\N` j֘c2wQo:缼3\M')&I>曃O }MGcq|ڦ}`CPF 4\h("u[bCܕ=4EL%}L /WViz1P?ox*5? SwE3z5KV ܳ`wj& )emΈCvצ9Ocι( @sĒ}){E-Fv+wkCKc(E;BqEaE pnԋZƏkZW_U%yXI|tI4ޒ0B.2WXonTK_IGnyfƫ5 ` u!i8|I+A3'KD}(=br0@dΈ$fV1Dw%@uG0yoBV)̀gEx*At_X x@b)hdl t 5 QMA ǟ|ˠ ct;7Vvm| q %(kQ;nn\ fkyRD ~mw;2I>ȶY|&I+(ŏ\^3wپH"<'y| ij3|:UMg;2E(Ͼ2kHRNj[a&ߧVj+O_w8E`JID$dB0}{}cҗ@eWEJسO ;gy&tVOnA.#ϴ٭b7Lb{_=xs)Ov|%ЌΞ\%vOY|WR3O$p"Ay}!6R)qBtś ?\絛Vě4Fg0)yGYTb_29c 4)}_y]atp*9'vTϐU ]*E1u7C9szvb*LHu=W3Ƀ@ ՚n\ΞThӓ/)>% 4-ћt&> g)SfÏ1[<dMZ2}2ʚ q9aT ̏#OfUfS$Fwe\``M/XwUXe/ꈓ: Bs58*JnG&wVJ_D;nm-J^ݠo &낊^&edRaQ)S%1`D+م?*į)!xXgK6R(+8J6sH2 DBY%l(s',+Ix*{ԁ C~$(D[4+x&0:ʼ1ZAզg\{wAn"wԼ:];0`9ل#mcXk(qJ$*V_ye(w}~Wsň(T>1#ѩOcu@,w_evs,o !AcͬZto8+j3٩;e* W:WvaSIIWHCH(R1&Zz((j(C{F?$ad}k'bWJm [c)w1#{A6{ ֟ Zey$pM(:݇V :!+o@5n;XtNvGw|ӥ+#BqqI|%({g]N y|1mO0qAy̼%-@f=&)mt_tJ+Qs%haFHwYncZ@0G21†-7B)WNJ~}v_Lo%. ?$2&Jz;;QOC3P 缈4T}IS fB J>hxoz>)+4N 26 X=l41 Aㅲeel8xVP_WCJ#|8oz!&BmJ{1aQ!#se}.`L2a>% Q93N< s5@@ 9Lժv&OЭn_q(%J[*_ȑ45SJ2cq)m`v!A,pJ^=? /֦?9}ƕ|5:y!N$4t@HRI%-ʱDiw BjfP E0x5NHž7-S:Iɦ8MC|s( 2i/UZYXmҶCPzzqEF*@*OF0_4mkK4!@džJDi?FxA!NZ{H܈`if"TO&|gs*c Z]>95B^ (]>9^4>+E G>xp3"M5N[ݰF_AP!j#Awz%̯M w;~y-}bx'Rp=ߎ> [b`b }f%0'XFg 􇘘\0tB{盨rsYpNkv F4ri[vLXTN^欮êWx{s5:UO{S}kLjNlO3P%`:Y3RW(ι-GHI܌-7p\5ՌApm>$nɪYUHbC)W^|fzZ9B .Ub;1fTJl]u8e@UĒUc=d ma_\=E@M=OUvY&"Uc*>sQ1zr6'T)\Tg@nV: @Y4| ([aRϔ()R/vk#wG~lM PxBrA"g\=GBu-* wNϠ4 +]21Z6@K.rҮo㇐C8g&NEhV߻Ӄzٽ+V NVK;)1Ʃd3Yp{4p#GZ~Μ2'.BTv4\HC0`cgcDsw7\٦>9E_*HD5`A E複ON@Llp>mL̲ |JW)QvJB<$딾:_/ɉ`3$l˼윀1Y-> HF26⃺pNM}NLp^ X4F~wOpp:`Jqy71'IL ?I;"Uևd}sT4?)cKLtym.yr7oӰU<Ϗ^ I.$:A %EYU,!DEt,D(KhﴃT3*e&NT_\ۯyámioy.p6 %94dۅff3HoHB"@LUhc觅R2]@2jjr7ŀ7VdY]!h9r!b?(EC'Ǥo8^ 5YIOn;DAHV\(}Vu-yԲ =g5J;3l=h'v,혌`UEy@C@~T9_ѷ%SEXNqHG6u!&؋kx'8)\3-LnU=v\&Y\y 6` RMvQijmnjWj q3+\% }ޣYV4ZoF MPUx!f~I\Fesa(vGD5¶ZVSq@B`60@O|N%߄g}ՒTo! ̴X" €""Wt ˌ%S4*{T:xIXߍoגu~=COh]#j1;e$ĸKt umoVC-™7&mre.Բ|佶tqڞֻ1K|FEWiZvd`jdP|<4Ԉotg,u*6gЛo^#`)pG`&gswFT,0xLRȠa6=G܋c%\gTWie"csn$Ddm"u.68 V }7˷9 Cs_8pLp_$9"Ei'% _=3]4NiM*,k>NҐ^#\;C&UӣG]# <qCٍ) _ fgѥI,iߟ"+KBqJO}XLชn~2ܶ+m>Ek$/po0.^&DZ+0(w׳jy @̇t >TτrVɕH9AdaD3:b_ '"g&:.o'8[Շv{{|'m2MYl2zITM^EM9nl&% KBhUi b:0K@d،ԙdSu*wޖU,xQ&I0J m, *l.E}oec 5]anE2b Ռ'fgep'C>3^cU7Snīgs@~ Z E2Nq gabN6̭r/1gecuFfggG QeVQdٿ(p66q؅_ 0&&bx26dr/w~nIY^s. :bT^}B]sLx"~q]l0wrE"~Л\2weXRI{uF,=i,ێU{b9 GD3?ρoиK]ʑB*SΌ޸ Ê\DE(')2tG!`L0aZPe5{ހr"ϝ3ęy"̱1Y,sR#fO `5n4]>yaLs^[nV_L*6Qd‡b߲wK[X{mB:+?_qp 9ih:G9U aPZE8':1wД HMQUU8k̯srmqaPT+xOuQA⠵f #1j\AQ3_ vlưN5O54;'Th.⤅X%jۣ 0b IDmK-nX32Pٔ7aM4UZNp_WsUCrKq*uʆ㢎w1F7i--zfn>g:=<D+BNI@j~=<jeD1Y*9EXHxxwDw\]k-χ| B,B0fD<^1ӵ"i:d7{%pًlcu6iv $m܁{[ u2a(<1 yǸ>xQ Á bpDIu*D޸!$qF`TB]hx%Zn^G=:8y&$XVLSR`򏺊ac%];t)xj%ueEhSro:JJ0IG}o"745zqbuf#ck֫F/&$5O Ҙ -$͚lo7$[3-#f}|./U%b~ kub} ;9eIM!(@<> B}xFyh~ opzP/C7-Gh[H0TŴ&[NJ6ȱEw<x*x`"ׄ#,5Z_;3'?اd # u&Hmt~ l\lXrȈqc./zE"&=X"nT9nwfFQ)^J@򑗟)?nS/ӹ XMf1jD1,o.=)l/(wH_Ўl ߟJC<×oeˇt3-NJIF|#L- }v}oLMژ|XcKXItz>LF?Ĉ?WP:[,-> 0i1M ~D>z#')3)-k1c>:Gewǃ` jF#ךVy:8A~q< ;ov)aR[G[EMoLJF{hO5^B UZ/; ZޙS9wGX,~X dLҋZ#wF菱`jI# &̳n/|YdsPok"f\@%c8MCBuzQ/fC՗Hz5/N8)n!S[8M9ڕ04XfѬkvP$8i03Nx)#>ھ ,/@)ڪ<(ߥ8; aeP*TNęvl \]U`v#V4,~>G4s)%[s:_WL|̎Ko)8'|Ra^MCM^Oy>`oo[-rqJK fL&ڿi@ Qzp`^GC[!(X<:{~A䀃?Wr 2t} `zcŁz%ڕe/L31$}chY2Xof̂AY2 ?bdz~ERXڻUoҎnʳS>KIɭbnf+֔?͂.Os-i5xlA+mI8_;NA 'Ʃ:ɆٝkP>.CZZѸj~О5 3J[9xWJ^ify9_(OC Ӑ\IgRޒ~" NyN7]j6|O x2db 7shWqcDũ^|88&ַ0 BXfaaP,eO04⾒6 ՇOR}›܀U~O)D4XT1" :ATDy ²{+Sz ޫ?iѵrcZZ70Wz3Qc0k6( -찙ꂱՀR#l$Bx_:EqIӅ 4>݃VU*bi^{\w/5<)xwC1-HJUVCqJ1&%sbbW-(ƹzΙ[d:: Q*u/oS첽Tp?w `$ww`Y^=#- bw]#s6 4nw V;n黨4 ߳OTk{L{ ,W!<TYܚy.O) ók YT5lc*Ј}2٪c-J:‰G DQ&%XmqX{uY|(C_L@x%af/}\KI艴Nֲb%R%Rgj/o ;ZmQ3n#lGGb2cңSy?uf8|U+ɺ׊bߓPیJ7>ݏ& *3^ 7B؁~y64DY@AEWj? +d:s"kMD- ^#pJy=e%Bzư 97]fo&uE#d]I?9ʈA%m+[ձ( /}ց5<wS H{;Z@ ;,_޿r.Km'dPzz$ 2U<+[̫$OWhАs^֏w+NA2rQZCibe?*QIsΦ8\mLl-P"^孓P).$6r6YOtRd%Y(,nMU=tW S=j@Z]b&wpTewWR!,I ޔNV$f %Pj>(#O}y[CgWNwO`mo5< x3V/MUtǬfr90Ǫ9Bux,.n/'Wݠ} mZ%x1\j,cФH-jc*GU-~{#kG·\הL>t̘@Z!2Zg%tϯcwm͎?T\vUYfEeR9ؘ~|-eDGnaĄZZI}Q՚?1Qu8㈍e[7? l7sjQ3U3kV w M򭦣-"t>Xj_l }$_w Ιq@;ܵ <$[ڎ`x}7bx,6y;ޥH7Ϸo PS)Cb_ ^ئ)kV4mS3*'g*b"NBmx_[#Cg3FTx(rD@@o ,+ K,,csB6dhBjrZg~e{'usa?POj]e,9+I1T+Qvp-5i%ᢗjqsrh)Ng`m$"g%A {D8X%ZО:W@,ϩ7a!/%.#w}3v%d[Vޝ`Ns=E F xhU"|TZ _5Sr.^أ`g&oKY XPת]GIEm.p" `ÉOۅDf %][3#Y٩= nXjY`RAxJh]!P6ړ,  2SL9Hd/؂Qh{| #e)ﻢb`lT*ץ߰>Mz-Q@=ڠy>E\<ȁz}+>gm \+hI!|B뢋=ibJQr{XjeprY")}_u${ B }-0mݦT݄t;ΥԮFmeqRz՘fCv@5$},h*"R0g0T:pG 9l&=wjqjIC= s!H(;'59$8h(cP -$`bUD,5v"~'}ė!~J2>‚#K H!^=$Tt5b$b(bE,W،hZҁbN'2&'j̡&;V{2} `^rQ!S\4VWN낑[ƈ}X ;HT 6jnϑ=x:L2dΞ~Z8gi"|@r.\e*| qDö6[g*7ERߞVN'>VU~^ tÞ`U[n1mXxbr!2F|X MWH[ {egK,"#ZMwBTV9HsrV6ñ$CV ;QP/=r)Q^.=ï7'҃a aI(.F"__W"f|`"U<{"*-?bYnO)ۆ J.5Orw0ZyO|0n̾2oSG{0 &Quޘ4Mvc$krW7) ]2ֹ p3=t|\ XI}6 &6=Q' S"IWwڮfm>k̋x׎juFF9w=$C-ZA f?er1XWe ٓqChe=92^IV<dPfcIsb룣-}%߈qr ^LjCLF[S@yL-X4W$IO$aG"ﵤ'_6[rS>qRo>Y)ǁ3@Kښk$h ?=mŒ ~1bL2A8;Ţ5J7lҸL[3 ۩l"|Z?kQFa{W׌ d,3N?<[~NaX$-~RGծ3 ¿_%V*FmE>T~Ưf y3e\qHr-Z: nQ=]2_$:Ϫ54!hႃ~6W>]QsFH4 Ġ f]'A@Ѓ2u%;0Yn k}w M_Z, \ Tċ=XtU*ӛVB%Vz=YEW5+G,4f/Bl/05e.YӪKs;e>^$>sb)ɚ^!͟(Szx 'e}FoRhO.Ok=? !"9"R_=kce21l?SK}>qP:*}N%%XG$z%R. `wf"Czjm_-yEu"9Gw!5K-pB[T:br}FE'ՄâC7ʧʞA~cw-1W:*\i C)VAF %>WDjURZd>WG*<Ub.RDoS NҚ]N,=zW6[ >5pxQ_XݘN|㥨gB_A3H-ъM4Ty]uqglmo9eou+ǥ`b,W`@ָV; \{5i&77+Z +J,fB2%q~& 1tSg,w ?X[Hx1_ s;OC9$橢nxG[{P82B4vQ@l8U6-b8 {#(k{M*R~AtdPZZNWUġ1l/&1qyl)WDӤFc$S@PSDθ_ti0UhW%UIYww"LݭY!0_;4|bzS=y*5Ws{(/Va"j6Ѩ!^-˖;3CV̌AtZ(}2ӷ &u5GIˬsC1$̂L~vρo* Vf%(q['%vB}Y6͠ҖK$o\jbTgb?>W0p[U.,WڅEN(qq{IBAԓDF9~ 0jmHkyퟡ9UWUS΂:[(Sa"r?ϖeЉx1n|*(8K.@[V8G J}[QԚZѺe?zR0(BhAvzKj_J6a( C OOt#x"=J}7X""O`7Ӡrdx71< Qx dawBI&e ѐ6 -˚U6 bߚaA);K}"u~JCSgй?PUEH}b;Uk 1]=-= ;c91cDƣm_ b ͸yڏ?ׁC`Wnͺ:nt6{G'jzhۛ,:|I`ھ(TReϤcb4'6tp_KI;(^ ;N C\ب@HS\^ÿ}Ͷ-bÂsqhSu盷TQ4<^dKP0:]47s]VE8*P+k=sd ©q!G?KPs-f['H=`"TJg;8l*_!^5t{޽uƫ]8ؼ\%ϨPS\vܮyVeu S_tȔښϣ Π19@۶ [%kՂYtFr6$cR_ Џx ]9=- GDJnNvcA*l՝+uFTRFVk*Kx \2/XBTx[]fn{m~Tyo2e_CCLy0`)YmA]ZvH]!4l, Ǹz\;X} '!.dWxZjn9˘_T؁CDC^]!%a!2ٴ u8H|ErTIH43q@}랭Q}ڻ ]UOuXvLɯiT ]84'!3|Ԯq&xp;U95^ JO2GC(IOuv&'h& 0uYf z<]{#"6; (eP -v #8}9xkQ * ?N#ϼh~TJk)&6GiP,p|22\ESt( C.ѳjפr$ /? 'Oǘ%){y Sd@4󣆲xk|r׹DYbA1ˑ$z1Ę1@?.ŸWw #29o|h5FidAh[n0h7rSIdqAi$ i`5Aa|~M7lH@Aq#Ӛ[ϟDVOiZؽ1b9Y3챔^_蠿(e 2AM]Ym~>"EpmfLaX;.5%A&, kK+B5%堄 +U:ܚ?]uΧrmVbxx!$M@?iR ^Rh N朷ܴ&]S矮d2Dň>K`H 3qWhsTD Ęݖu6N =*Cَ}M "fe-eUs\S"/FMpˑk!;H) +90俑=ьlmaj~V&3S ^w,]BEmJ5,G/$> 1Zpq.O0>WDS$ iMrqxR1wujsX,av)c~*ܶ,N[79p_r "o ,fbRfS6j0%,95TR VPϵnaQ.DQ48E<m9]-śBpdzwMRx ',p_&;Y3S(NxsDyBwv-aGy}3fZe٧Gh4CiF|Y9I>8:EJo6,ՈK' <h!gWb9Qzɺǀ^ #嫽 Vw iǠ tN;z)F6"agx(/lDJ=wS" 'iRt7ɒ~c k&+ 1,( ^YVJ$6d OӂcZ\uiOGMnw1d~wOhva"ʣG !1IZtnB;#mvev=9ޝd?m$'8@-7\T|u\F fDAq7&n~j Wf<u̠stoYs؃Y|,$.i/жn#.tRWQl%Su$fCx YBPh@Vsk.rO ?#^6 \fvsgr?I\.CdZ6ם⁶D{;YZc3zl"*bWSamo܇e–βV` ,bcl|âKӍwG;13KɵQF-T x~B8KrUcbJ@*6W ^\6p""O8 Z!MF8^lu7h<@N{W/j#Bɋ31L]dC`]ΊraT\ur]=ٺHUàNڲvQj~=S|t6F2(_msrx St~ۥ~u v`Q*23jӣm'(0Mr >C'q^ iWf+^Uŋ ƆOXw $(#5ޣSR:g zCW(5 [PRkfLz"M".6mw 9~'KvcVj S0PÝ]s5u5) K^hgːE.=M/;\wm[gƛ3$cmQk!ʮ1c{)rD 2` Yӗav`AlB·UϸwJ۠x[tq8mzhM6rmUc.}V,my+T/ ~Z)BR!`wkV{Tp4;Eꋳ᷂<ċ U?5(y%B“(i"̑-y<}HR2p0rϣ^c!I*+Y5kQcxnS BK~Ўoi2-0ƹ=qXCͣʄ6Cza83Qrzьj j1T]5DUT'ȑ[֪E5ENf!!.=͒H>Dj>/ 6_HjN!QF-e0sHW0`YoiH\f ?=2IuVtL3r'K"%(&EptFhcuR*+qvabgMƌG"ˍO3ekR/z`=;&C= -=3 تՍ71–/ͥQB%?V@שz(9} 81"[K-_(Qv&7oEk&=\PjDr.UQï#t:>r~/\nYS.sذs&DY;&,a4ݏ@JcK0xnׁlJiKįTeqJ w?pxIJV _!%J/^Jj;D])Q٬=aK)sf9 d&Z~jB{lnx 1?Kې!V"$_ 1>^lgu-{ON5"C;C,E#N9.%g7̮Oh+=FR+O_N uKMP7B]j LrHMx ^SjHTyVn2.$b Y QFxk%p6zpNwup>l'Q R fDQ=oθ՟uz>I|o*v|"qP}AfUT%ip^X o_ĸ_DE<2f`<@۬}l?$(Kǥ%ޝ "Mt(hej`Ը8m~zUuyBtϧ<别aZ_QR\}S r \:UL{C_ѣA??@ y,B_г!0S 3g=8fZ Iat2aYϯ?[eF x=V ~}ٛVDMy3aoQ2+a?MƢY"3Ӂ8[W*p5׭)V C&i虣˕kEH<);Ja23X,Z@; ;*CTSyUxՑ0,4Xg\G* ۄʋƇkV/!e󤾚1l ԭ9*#DT ? #.=BkwKB @E|3χchf|򞍊@;ؘV@N!{WDPJ<uM[F;OO'<)ྫFDy?_m# xTktlC"8G{ L 93x+"y3Em } J  1<'̹-ɼagqlDTVI/e,YZűq45T`Oeލ-ٍp"UTCouh(^V䃘lͥݏ`3lzNDQVti (5 ŗs qxDMxۈ<(k(wQx:$iء.IdNʉ2x: L|&(ݥc 7;_xCqe6t\.dGEH? %cuNZ+ W-vxdX' pS[&dH#//34D_ jvnki&Tb gL]Xolڥx t4}AWӑfʐ tdh&ObYI V-WWg} @]qgkdFpn5R>Fd9[_/m[jJ(aّTJ$nՖuDȇ%'Pa NQØ!ͼaO #)fvmh6L r MBK&oq<V) z5ۙj鿡,O%4R8um;nʷ MF(fj#˔T9|ߊ ,3ܲ>fPM8B,HL16[2zmj>I {c58$[Q'\& vx qAj@N 5N<*웾Rp\ko#Q躡{*eyY/SZ]s7ˮqW 摤gCtԞi` DI'ȥ(CAw?Z@^j#;`wJÖ)e1=K_ȓtA nR^}~ymx\Z~i\a¯TM;5"C嚞f'&eⴠ *d.Ҡ-C:%Kj͗q۾JDmB}=țj$XHkLbSQ+1*j_au.ؑ(h:5`KPELM|̤|NnzNJcsv12XZ=F'hމf(0ouMPzݘ=J@2g|Qa$o^T|=/ [р$)MڛW,FGpU;z7Wga|;m&f@D;Qq"&ƈ]9&Ւ[jIq#0{K㡚ëHjS\Խ$T]-O+"ic*aa:4}eH"խ-׾xi)y_HMy6od M'3 X_ѥB!>Kt?&+ '5H?SyQ0?-Id̙& iwkePIb io#4,)h_9>1ۼ,$ݐʔL inHH|ʦ.&d 4Js"3<(0-nMK\(p寁AiO{%C uڇIjRNH qS|,{yyY qx薕?Vb|Ik'$aD ANH2IDՂWbV*:IyB{uۧj/4"[8;hQN^ 40[smMLy.ʦQ9v- gus& aRzb[I9Z6_#փq|y }p+C NDO4n# :bМPf`03*etue;$V|` .`M"P9klTgcfIDY_h8q:Cɒ |u\}ai#8}-L3lAP" c ^{j-+_ ?^E2V0>NKܯaEyB08]aq湤) uT%pܵ<2+ Xr" u 5<=zI(rFT1SO5z%{7Og=sY*)o.%oNϞ q# ZXH&_>zH.ъ"ő&vrb9?XnjVmc&D 2pT7hLn4X[ouv$ntGCϝ=3Smnܓ+t @FJEDFؖY!tŸr(;rRON 4PK㊧Ar.~5k Ǡ`p`Erkwۄ͋}b5h[7 N,?磹f s"_9Ĭ Ztog,Uh96A! ȌrK̼zŲ'`'Ѵ 5"ec0t@t؁{sC19ݼ{b?MաdoV}7*6 mH*fSPQ>uuG9d+ߚLbEn$rstٱehA&$c?kI,vc@yޛa a2M<ݍ?qI_X=~IP&2i.7͌, !LqeʴKW7473}oĘwѡR4F 8 ZAy|6[ob;*6-,u8󸬁r-e+>G ^hQY_ *yQ=R^3,%Yxk " 2׸h6#>ѱw(2}t\Jm]y)X)i1 T&c3%6I>$>_㫖Au*"] }Xtbi>g@!oz!Ƿ_[`dG.Ybv/K4lg>M\f`R\;=(wwVZg<xVѰNnV\9D1^&4jS UL͘M]M*}:}o¾>,?(鸗K"^z+ ]̶POH-isV##xjY|Sǐ8ӧ6._1]쳵?w e(|^b7eIH/2xf$!2,| =؁\vNDWUp 7u> ¬7jeWP;o(,)XkÀ(Ij)~b=J8J&W N*8Oݭi[ &Aj:PoC9+F;!} ^JooM8ƔIK3  6>bpѩ^T& FqhT׮gf\"Q1xɰ"F3,$8`~:M^H+UA C>؝B1 6"h⫺RgoTp1A8L)o_Z;P' DY؀-|b&23i]fe91a >0ESW (GŸ*˘AB(<:ZyL%28Hlj:w4]P =Mmi Y}4s??JL0Ǭ^^( Ȅ[k| 1k3[Eg(i5jGO"n^Uvb?C]u+-1#PhKQ oNE}52=녋C:^͆#$ E Y}22j9@R9~8q"s^u6L2&0j{rrUbM[O9?cx`uoΈh8kc'7#Fi7N"sopd\4+lt.m(fY&Y͵q`'l4it3u`i콌h7uэKZjibuK6mp8s0X kHfb+-%ƥ:Xs0 jL Ȓ7Ê$@"/nv85{:~a\b]fX?+ґ}(x^=8n5tX `ir +!B q\M@Z=Pџ j!"H)RL6 %مPg_=r_J{+--}X]*;)Y:УitDԵ{Xέ"di%ulEc"=ib`w K94bSU<r_X=6*{ RI9>c*4!<[SqVT\Xrs @u{2L(Z4kC6m^Ʋ@J+$Өn hJt7 3<pе AyF,9YWsk8Qi`U{,4>|jƎ ;-]SدslY;)qbf5:"aG4A3i (kLw".AdlZRE/]|O d39 y_SAh^[EKeahb~qM3=dO#h;~*J`bh"cƢG כqtxN8!Lu%GoG:ze"[M~Ii6n ɑSmRa/cz$@iẅ́Bc[` L<o"4.6@5>Ni7Op w[BK%[#""S!nC;ernzqdɪ-dïGTYEaZ__UiSކ.YwHCzR 훕Nݾo%GAv1~с~rOSIpұIއ3@:>F=gAg[IcR( 4- x6jTKR[C4 q;$QȭaML-;şTn љRdzrY-Z~DYe, ieR%S&^l/N^(S\Ԯ'ʲl7 DF ڎf38!NI'W$BDgmsv@P(͊#۠/SZ6** c: =0 X8[\Qפip?iSoRSaup 1Z^ntc L1 S"| T3xM}Y+a7c x7!xї!+Ì6=4ACPAy3,x7og@_z\ūb;ySTռdD6ӹ35KxUK03lݧC@DPJE+ իPl?g,`"_4c_sCj\܀y jSAh R@rfl`?`4&ڈCz X5Y֪J pR] xK!LS/ G=LIK;ˀ^[H ifPDv]`?G8F Lv}e9ʇw ï>Woj"DmDvMi2r5ӛ&.|TIg>4jNtjb;ŝʭ@>YEqY麍JeX죥؎nf S*|):~ őZ8tESv_g+23#DԝI!9w/)UwT@f0,;=#w=K"DYh9:;]^FϨĩYX҉H~xU&E߭=9+G <| ĂgS.ͯn;J (>6KW#!>jRG*D6Ki%yP(Q6ML-̖6h2М3Ctl.!Ũ.ļy>eN"lx$_NѺsҮޯ@10!p_bԼ~UU<ĸ8x? GŅڟ' i[@R{F|Ò$;hb~g%njا^%K [@w l@iu$I?u773ɦPmCh{Ng俞x Q P5E"nx!>\5?ByR˷vZHpRGcm_O缈ga9hsjSkgemD}߽T[yVaQ>,l[AKixPJ{nYb)Z94!z?{p 5əH @hŠT!3q]b/|ᜈNE@;iȇjJ*w)qV~J"5DT'18$JLA¿>%͗U7؎4&șj>Bt_TP+-bsW̻'NC<΍ 1tqMvr}VۗV}D _6Kr)q&`mw^$t[uUx8[iߺڍA]+낫X|>͎N[}gr`%:1B[E eç搓DO_3eYaG9yf`)^/q$h̠ &Iњ`?mo+nſiqZ -07kU=)LHК߶Nnf:ʹ d8zj個g3_^De-n S>Ph2i^W+Pu`VS {ޗp7Czpy5Pb\,A=CTN,3 hMaJ[sgJLȺs$WI+~yC^)y;R?Tah2.CT[fE>+! pPO,D"'$m9fE$iu X $@NiU73}ܑzf|PVk9t6ɛ S#8 w,/ɾJ;AU5eGILVe҇KtNzњ_I,n.CLĽ `삻gI",l"Z\H*](R"ah70W>k=?7!ե%r,cJ89&KY?w0t2 N:"W3lX6]k >  6<禷woA\U!y.G\b[^.)ho@ߵfk AǸ,)eJ pG9XhsSJV+dپ}~!M=25C-ruvT~HJ5x^dCYUmEb1=KvB1׺OôgMUQP-M6m>e*0i'HqҎۆ3/E֬Sv#/FƢn7Ves qwVQixTV1=m}I 7g '&F7-Z5ԧLKwJ#ڝDQ8H|^2٣[߿]+2ާOh;&}~/tPOHB*޸b:c0ݗRooX&-@OR zZU)Ol7V 6d=BDWfi9pZ;(w*UޞD>tw !^,c8|%1lTXzS[3ZJ/m.Cْ ®҂Fb Skl'j^1לC"D7`vImO5q\J9OnVmewùH:Zh6z& "߈;=ӥIXQq3\0l(jՁ@J+lmR+{Lm0Jz jx EpR?5tRNxC&c~39οnN$MkM%+bϑ3Į{/Zht098_^NibY`fWd.nb=,:/u`E6ݕF^]oSFtVEۓZ5dDCg $b5I! ]J*γ _tNUc1ΧVFj92ь wJ+wdoɖBwg>sdGXAߎB] q܉+%%n-3ܤ=pI̛ ` dtĶ=4@g}fe-T.c/.as6SR/>sRXef&Y&8!SwJF3֠3`YHZVd? 9U/${ Q3g8rvA='(KSQwp`%& AH&)~ZXd$Z,ݨI}JX<_bK Y>_VYS@ʡA8%=6,Ц저9a  "wBab|%"03LAmɈ)[Q] =rs8j9֎*exbjvF:>|r;0OFKޥ+Ac|tڰizOvu59B6z"Dd쾶㴧g^G¥`dR{Rq.tc__CJQ(G(#6AQJ(O;H_ML챟5z|镾<5]*HD@B,{#wbނ h@ñ\+6*/I֎ h].̎8w'm v3-c\0lpћaZ[@!涾2&@:bDs-0tU6k 9{+cZ|гe2(IjTMI6$8^ʂMn6** b׼IiȁX}VD͝uaZ3 Ls&L{ø5LUP57+lZndBd;7 },0嵖ϒ0Hj\Ln"iľAsbE;`4R0(n4a.?sc-g Yud\~_:s! 񱝋%IUMiòxVjm=1J /f/<ʄ7$Λt[\yLaDZyE3!|X2Eݮ[![c9E7&${.bwM =gĽ쩐Ё6c4uFd$G fOa8kSHxK|h0qi78Ѵ1Tb+P9H-XC"vS7 slߨ"zG>GZi)W̩؜3e í[abZ?RGH#AgGo˜өzH),3ɾ`L~W#LI*9!uO}༃֨h)GITvL('|lߔBRzp6gSBIa^A#'@LP`1x/IaGis|Yk5£o&ٞIZ>FUKm͟ougHA+(.Di[-tCq&6O[ٳ-e~֕s7I3 Aِ_[OL%ŋC#C>HF h&bǖczx\"i| }xהa/b1\gGt?=ׂ)-^Dvy!~%qW><~txk7QSNMc4T%T54{|An"% B좎ws7(o$= :ۛklϖt#$B0B6(`G  -㊣-/떸pc߁N!tHאD}焅1d:CF 9U)LU>86xjzp*3ڽiMF1Srg) %_a˥Lj9\7>BBfS}ka.ЫkCR!a8t1op(p/[׍_߳ak,}!$]J5HiO,}wتue_jD݉f3h.f({K_b &Y}Wռ)V0F|.w|%QS惄EBC5Ĵ4FɉwZ5z\Q-^ZU:xNBJf<ɢ=ɛ`Wzx0+?Eѭ^Ƨ=fg)xTL3F7:ԃl4r e^̰Dr6zF+6S] DM$? f\s^)2vu2RB%IGZ9*{32Yq@!K)T.> >||* l2.xODkfovy:8R#H%/̾i뼄>Sk[cX<+ԲY\G}{-y,u.@46Rl2(Qe1!AUhحywӾE?[b/eu{q{d$wYEXcac{RIY" *ޮ`D-130C$c7pt k*YN0Beaæ?;z6,D?8(jHEFUړ.KO,l&-܃z>qsw~E$qMl|:*w!bԼlH??eٵT*Jz-m\;*4ѹ񅪚VHX!bF&xd2;JRj24N.Hfu'x2.p=sD7h4WqS}VxjËB0Zk4es8Z#hXm,ZS6\JoG߫`9 ,"$5?63R;j6wD m3->CC +t{Mŀ%!@v8,#KN6Q~`ٱ$g-O>X} eiI xjއwf~_V%R`U}YIr*ܢ5)U d @7 \ОǞ贜o@ŀ`qVTSP,./ԏ2nCcPcB>?FSz<NjDr!x 9OԒF1w%Mۻ)=C;Yr9퍔J!%*esS G"F(?ɶ?֜0] NM:[19|pyw/gcb^ C;M: F!'Tn R#a@H aN]kL%l.*?'s 0z,0{2FoO C5 4 #SʐZ^0I2 wڗ4/ȑX"#VSoKMX-!_yX&0< yˡR}.%Q%TWaGQIp:? z`x+ϫjԲ JFz\QGST=<6Oؖ>n-`kw_01Afg9?@F&8`U&`tDe$({?K*Z~D-dXj״}\vmR=ԖF2hk0A6p}.)^k؎;( g lwE`.w ԛs=^ [bBK!Xmw lnY~Xyzn~]R=VBpO8n\!vN3uDaN)Ŵ:k\ YǝW\ D}hLKm]5;L!yvN;Aե6|3cZ_EO4[ N?"ia0p7NfAG(&ק<ù"Ͳ+-Hcq?!_v΋8HgU/CzP@N]9+*Pey?-j-4}\Ã9-yxO} |tnc` ku5m4v)b.fW${cfdĄ?\jSF`kʁ~0ݩ *VA;qtREyGo#+jUHAc)Ha)3 =WK?5#iyD`yH|MO:txd6Q/5]*kN%BDLXpe;`anL1*N^kD#TzXMŖ刄Հ]CQ? ;?ז 7#1(RdLT=\컍n8\7smKwƒN6 " IK`7YMt:?bM+l#o^S*6H~T}Hx\^oѣ'5ngnr'}j ƣڏ|B/R9qFRc9Fh| H|"k%9 ?QcyKNpmښ߱3am(-|W\'`4>'5O0N0V%\[@uز0Z!̤k|?=8$ ߈ ڼϺLkQ'2TLO@d>kA O*vwT%5Up5̪C ;!i\QZq |ԬG^,<-M7ԝͻ"y` =cv.iJգgkFI{:Y?PKtbv{xuDkgKak|qg8 ˞]fjuGb2Bօ0!P2=0{HIA:EU]y`G$2%}Ru ^į3V5nk̝U*.#VѻPi]S ק^l f\yreF+r+[\3>Y^WL/dFחcP~d$pR—Hu٫yw0xl.I޾(gqΨh٘T/9>Kˆ1ZZslpċbyBA͙ۓJʆU2X=a UV{s| RwfwCaR޹mNFoy< Q;_C_Ky07Lb.zR|YyA\Y:@IGe Zɒl1q~}p:"b) \B8; bɬzťc^Z9$rP$%a giٺ7*IU/4p./V_Y}jK_䇕Hq$w$};%9m53un*fWZBOG2'|V@d,>9؜}R̰/O *}~+cZ ީzbۄ$JҺ3U8ԅZ3B_jC0Pv{2|ZQj/ڏ쭁$s/FOy&ܯ燍ۢp$tC !GqA9 e's8̑yӏRSl;`śGRUh.jlG4nR4ܾygL@a#62Qf>3fDgƸߡn2[~ٽ&15Y7K0_Fفt' #J:3,%0u9 21l[K,8.$1$g|~EA( %Y׬gi9#tq" V?+#H Smt+F[KE7]Ϟ_fc޳}Xʙ%2찛 EC}H<}7g I &%qҩbkz}fP {;" OdB' œ4G^h_P{xOR46G4HbvR- : -oik $7,"wZ;WwҟuΌ0ԹX-C81?"2~(^۬[PG%V>2RQz-_TG%iwߐ,KpJ߹^\|Ǯr< ӓ)KҚ,MB Oڐ ̘maJGKdCB9@.^$ NP@= lI pᑼ`" IWc,0jB`xp. XOuDyP36nqL u"-DP(9!D)g://$hBލ#}`Lc!uan47BZbҕv&1QJz#?Nq"\ YcZ^{~3 ښVK@qCBkkɢUм(2!,B*=-(zhBč=`T﵏w%o= bB?pwDA1s5mv/u=eZ2{Z ʚHxvӁoZXǘ0RCE|6Ѵ Ip5Jj葦̓s%#PT(͕A]*1eŰdF_3qT_uB:7+z5l0K!ەyyjqnAh++ԓ*¤QxMc˻TL56u>ĐpT;1gle4\$ێ|gI#}߳IO.zp;[m[gl) 6 A]' i @1z]k}zҕ :J R Vom V+iHN_7d~ߣEl΃,,㢲!1iJeSH^" ؒ?]Xyϋxq(=%%;ID2Y<-KjV~]1AP'qT5/q:*g GAud 9:+m5mzvdcI;G.̖ӵkԽI1b6-J}u ?lyi7ipkcm}y,~ e\| >QpKd7e) ;cf iJJD“谳WU{ GЪB>L2`gFS FGWC.۪~D64$SQ_pxXV,z'WV 'FOҜU ߰^2;] "Y4Q+ '!V3QN;,ψ*ƖQW+Ӝ! <ܝ @2i}JxHs6DH1~Z ͓[f6:Y,grZ>F?5v bd|pOv V&7>wT9'!5W#ȹhAkQ?RY4lC+v^!^g1i{BQ&X XұvbߊՁR I\(ٜ \/NAeBWDk,; u~x`rgGf%͛bg!оBTyy4s'Ȏf'pyhwP@{vy9Sۆ!S0[u։{'X57V0Ɯr?̖`*㌀b}[s͘`9yۋ_{Iܓ5=Z1h4˰C}꛷< ekNX& Y  Ȫ-a qOtfc5- +#(_g_@AM-gUq2R0J C30T?szre!~QIuiIc}g Wyez?"0`jRqV!AFUg. akX1vPB֋ЂC/Bciz4ttKղZ=̹ O p ϴN6%(tkSY] Tםj؟x/WY6T`\-\>ٓ *ug &ɞmrG1_|o3b UI#4wϧ. 𲂁şnJ:c^a⊪wom]%~=f.g2+((@#=VIZ{xX2ۥ_#I:mcn9hw\o|7urlJLR0aRay4KЄϵ4Hz"= lΤEY4XJcb{]?֙Fs2paK=(%]mAFɖ4}́MNʵї l.T$TZ TR6 b\D/=4R|֤] z*T峲}JDaXjj ϕ܈v,/N⽱ekX?:O+]yBC]qHc>-%LjmIGPs\3p4r⹠4]m]Rۖ#ۀa gvv!6&}#z8 lґp‡C^ޒsC9]61BS.4nf #h\ QUXc?|;}}A:js7OL@ql腦}d4aAܭ"Z_w`Z\,lsueUřy@xTט{GR:Q+d2vEAt WS m]UNA|ZNc9Ӵ9Pd8?%d"r3>I$eXV,6`= `$~ zᶚ1nPou jQHɷ.t9" vƨA i>;iA“J|+riLR⤠"hGH,2O$V$xEpޢztO"XA(Hb!CTkNDɯN \=GFSET8d TG3 T +x]'$ [u_bË90^#C%i&n)b[vnV٦9 עKIҬ׸]/Kѩqz[y Ƀd/r?ĭ}mב!iE臷/x-{g3ֳr$l-SG#A+bɡ;"4Tgj0כڛ{KڒK@ǭU;UMykjzJϟ]⼮;׽.V) CO݁mp)  "UQ8zvo-Wz#A~?@6M[Kx0R+Bm^Tn 5|ƞޫZ ~t`V~%FaNRsߐxHYд$9`wH*GWA] : + "MX]&{ۥh4_8S%W~ruk0c %n{Di1n~ =5B`w0"ۗ{ "֟R6lˉ`4 J~sb ){+E+q&"RNnlÑdIwg,[EY-. 2'^%a z1E.6oɜ)='v[ӷfrtqs_1eC @}M; )Dy^v aԨ/-*-JوPKOlm6zL!3q :Cח)̉ gSx YFE-SulK= %! E2N;34o|R K90v%EH԰)RZXQKک&8i!B2 o[|0_o'ܛE9Բ;߳wJK1, 39:<= 70)P¡9Ӌv]V2Eu% ?Y^?ySLX9ސT51m(|ZPm6տoN~웶 4[}7A;E}#vށRPK8qCiVw9rzkp<۵ !gwn[#^,ǝ.-.8تgQ dP3"@SPB@;ا*  =Rsn?[NDA|@؁6-NCf8/KDվ۫ O.%-ʑz_JFLa>`[a5{;Z$eEvۥ@ I8s^7< s(q% TO$fhU l6Gxt&YzpU8K,[uStVD|0)vH< Qn%-zH%Mtam'U?շJ`* sqfk Jq1NiYWGŀNPH]q"Oǫ=QʕN NCQgӞg`NjG Έ_+i)'tR@'^/w$*zfg?ZyGzp#>]`H_sC'yF,kTwKx *pӜ;K% V> Yb 8=% rLIqnGjɆC7-Ź !UV'9Iݡd$ \O}qRJGI1PXQ(֌Tp".©LA[\:?=n7Es˱H(CtizPW_p\u TV9?YNӞZj.'ҡgK!Kj9?&JP=G7sâm{Kݏ9 |rGU8nz uD5+i[꫘t3p;T R& A%[_fNj"ΧW֐" RiBx\`#ncJ'_M Bt"_tCк}b-%~s51L7%Li4W|c"fjTSNS, +Ҹ ^0k` 'C,ŗk2ţͲ6, We00=[P`>[\ Os`ɊW z&ڒT{c7[oBsC^QLɯWEW#{7[]%,3@+u?V#i]:!ǗtI,;9o'В-VNwIG)Q.sWX@{K?Nb9Kp_)ӠSFjA&r vkrt_T;"'I%\ <K0 dfZBj9HUjI?ŴC*|}hYevVKȀ.@("Xӥ6UX*$xeJ%"ŵsDA  l祐f`i{_= oST6(Y#y4E+UCޒsNǗqM1 zd HF6 =cl88cmMA]R>.$|RA b1@JÂwy3sZb:P*c(%$+6%-<@Pk]Ĭv?̺ <8'H׎/a@F`R~GxeQJ/q]ɒ/"kD كqqNh΍Xu;\GPCj i;c`@:aб{hn, ZbBkn{$ r1~Tϔ 8-00ZD l_/ڕҟ:M=on0ȽOx1E͟6ńy*~rֳ1m^6l2E071 ;}:M).n Hj ϔEyCq5'=Rs*]ПSN-eaL=ubpav!e/) ›:r$gj N ջm.>p=̈́` 6@a܄aI]ڊ!X9mӼǔϠ0`'AH5ZmST"18i[,53EJVc- t'r,~&Qg2zɯu+U1CBsu8|Y[]r"+O wi?G[p;SG7Pdc?~UtLsi8C#t !\N [J5W X6C{ixg$`˾^ q.^|`ɥBD޶68-p} mEq1 )s[?Ԥ(h){/9i.PĞ(*6_^g$2B*j5:ڞc';{>}qZ/5CU2Hmyޕ 9nۆ\=Z0FgۖQ)zI+ZiҼK|re=ZB哤E_.[q51X;+a{d[`uFE[T4v҇ wv/:R>iX)X:߰D]O)5r;@ IQ, kYv5% Z< ?Tx,,xBQ 7Ps6Xrlսj'`P.=9ulP̈g%D,z·h<޾HfoybʓM~L$dwGB=2PCև7Q> &j}j8yL7Ȼ"Ic;z$o"!JMB}&J_AN<]./8s-$[Q /uQE={%?e -'jBXgV2M-"W0ՑNXo7EY=1>ZzcYä8]=mW^ښMqH |3R;:j9r}i GM"DY4D"[lC_}k`8 %cHފ]H(eOl>7A~"0' >Ժ.ﷵ[L5+x館z.U%+B!$4#q+# $8 Mk(MuU[%7S,gSn3!\ZD8,zq_h A%nHmT,6T7DYGQ8Gm*n@,]fLZYm:mEnc4#쮍K$_Y!E8\z$(pfL(gPWOOK Y@ѝҖQyO/*Id)~3OyM](| WPnY1HkGݽCq@46'XC`Dq"dEh;Z*+>{mH h~e ѱ OWI3Ed KO 3"߱0njtr758y*wJq\>4G܃ X=R  ?|B; ]|qű>~$0GMP$&/(3c̍" a\ uZbNpβwqopȚ\ h*=XY+ѥJ/jK!րb96¬n̘1k^zt$c[MPa6ݰ$+$?LJ>W|cL">\$__£+G@ՓS&-nk9 RGQO:bwª6/ǙRiS"~BI{V|5J۪1 6)դ &Kl7il'"~A R<6T(D1qe)#~AO>BuR߁ ?>B(A|{ٲߒ~,`"z>/_#6ԊEX mߣJͨ/;61MzԵd_^zx-k\H/3tR?nU.ryѠ/F|9$>}9gE"X/3g1@~mNYW)$$yN3 ['m|!2n/V<sfȋxAt-fįklyBY;o+ub!1t5&!j 8rS^A7wO\0S$U2oAJ /ʼ5}+6Ԁb%e]"P:G0&0̷˳Y(XVGY !/DYH~bvi}OjL{}y5)%F"Ox~s3NVnX,NfM]r,jbYcakqPs1Lv?P/SH;WoiljŲ7hrfb`@He/T@z|sqis` -S*;G16e;~6JP51j0@,NTĭH{QWJH hAsCX%?c0|CMuz1޹o[pkIoǵg E,3UIHpU9%@9sSo_. 6䰥nhDh#z'_B1w1 cQ^55ILY[_Q[ ` dgxw\ܸv"n③+]PZX,DY]X5 2Y!hZpU]7sȹ60}HQ/e݋ z_tVQSҝ7v|SacDEA[R> , /o5 %.o˽4=xn hn' hr gs ͚5mOuLVA@r+1{ٵ $Hv)t?Y0[ SK5:(놁t1qe \1o[Gjʒ`7c%BnziUg-50H/J7oNdBGn"vĭ$2si̴; Sq8 (+7-Ǿ Wg.LfI&7.(I]D՚=̆oeSYv0-ؙM/+:Ya{2_ݘ-k /WTR`z=Ka4;e?^Z4+;1Bd|K갔jjo>ȃ1S* ʒ0r4L Ê/u"ncۘW5N=bBYeIe$VG%pbVt2N!٠'H2deK' !v1_C[ϕӝfL8817J×aQ}Ӗad2ZǁFVzlQ ۦocsbg[PumZuJ. 6XYNoPw@EDutȭ:M2Jc~U^`:ExT(*Jg[2w׷؈lc7 ܈P쥜?ײa^3Hnw_ݨ O#96 A8@Wn k V(켈^nTȀ^B㷇aq1S\HH2o4Nnhc6aMen* G1v8C D8ަzE][XGlf.Qbb龳a;Yߒ6ژCM:T}4-T;R5zO:7(!wu,<!C83<ҩ-kZO/`-RAӉ \2x}>C򿲑b0L2:q~ Zڗ%tXu}E ջwB"W1BK[@B&QE]ʄ?*(c# NplҟJDSM8,A.ډ$qU޺ ?aUu*e,2!۹s7S'Enq%^r 9{zEݣ":M7A8eҋ+GH 0D{C|R).>3,I0ɠF{p$$4="M#m'83܅,a<h"6?o[Q,-P ԬXCvgS7RHcPa$gKTPr!D\urMeg2M&_]Y6ݾ[Jzd`=i9ȉ_KxBΊu4 I6:6{yG.ҧW;Qv8V<4{a1#t]6t{G:L;g<Wgci$ou\5M}VL(ngETb8QWI润=Wh MU7tdΠ{KӪ]$q/˥BCR֚[fcF؂E|dvMEEփmZNaq4D:q0*;T3^e(Jn۾)ԅzl{OZ# U"IAΩ|F<ɗ )dXG~סĞ$ nLeGW&,kU5FGBR} Fy-$;¸6\~I=XHBߌզ*WfZ/;]!)b,łHVx>ol ui$cPEW dmBک"PU3x/ȸ f }Ho`ZhmG>=sQe0B(69Meɖ<[@Ip!쉄Ibl"o9C+C$i< wxO^ەmɺ~ I}y{gKgZ*o_i*HoIwd`!SZ8zQѵGf&PY*LB(ǚfr&B 6vWCo.aCc~;)2 U Q\YY3A"K_EC96?]twUuqHeڅ7fRj=YR!/jJ=Pd./=-|v~zU3 k)˨ Q❯R8N7>)G}诡 "CWEιFRays-;P̸-A\ge rp<8p73Wvo҆P7v uvsTתs˄̪} {MN g"@Rx"](,- wqc`/G>Egh;iͺQ(x=7:AdO5rqmb$ ?EB( \{t[Ǥjť!Ked_iou`-I8g4&euRSJ ޻ }0 (/V+T50ajȥ4`NX>5@m' &d *`ox3^Z$YK"'̲([o-JfnKtHyN1TGEEhV-&{]BIiIC8K%1WajO&&^{xaJb,)؋*AD]Y0g:)lҧrǼaɽuSs5mf~^!0ɭX.FC|V\n7Ig{<F"+iȏ;AV ͑96oLpEE\߅~YB貰X'ubÀz@ QOvo\6,CÄCXUv 0l,>̀™5e`2c_(kbQB t ./,)^Bd κ]-?΂c?+i@:fX& vL ѹU`W^;dBrѬlȈ L Q|ACg{@KȔҩD2={yWWEYcezYۍd%uLUo:Rc Ǥ":h[b;@B"T҂l^e@]L*77ƿ#r2ߡ(ݴ}C/Ȕ`wclc?÷CW3%,d?j 'yۦXB{tRE;dŐWN*sF~P`%1_3VzݓẠ!3 ;W._cc"vgE;#MM*9gYjɧ̟ĐXShS.I j.D^֬c`Y{oUY|:B* fw7pD_(siO,Sَ/}Pۋ!vf_jm\~a(sx<َ(rϛy`T<+ ,bK.&UsTʧ.`[6i9=#C A9Ek]~kqo\,}&dklcL &ԣr#HO˜'' Z GVt7\~+6tRni+BB!B,YY D9~ 3K& ?u\wޘ)~H1Y!{Y.:NN?yu1{KO  Ǝu)'ӘyC |UɒfC&>hV&z-^8+sG8+{O3T[sI@+转gۦ^kit묽`Ӓ ·\3D6r%qM`Zg*TtP -?~)fKhW7D[ϛךՕuMFаX@G[xaĔR"F6OFLj*egk6qZs𦞎Q7ʈs*7t.&:ҫ^<\+dz sA J7hshI"-i_:(ZMnMu}Q|HnMDLyiC3ĵ$s^NQVFY!Lx-~ǿu$~`[a ̀z$_cDu JCRvLxY xbQDŦ0 %D [ ё+%ΘǞ2O场tyM)fK?0Bw-? N$ x#DH4V=+w- َ#F䕎;_| $q'gq?K;|VV7IqD DT"h:m2xA**Ahc6  Ba+ E%];js)]_C~7 @\P$RWE x´XWt! 6<s")95@%J8gL(@;-3R2S忊 qL&>bTպG~Z-QÞuZv[Eb"ZyQŒF.H1qe1r핑yK Kkn:rg6:"e}o8])#um#UG|r pγ |흯٭3 8O.v|U4C+_+W=z_[H4M-ɨ M[L ȯ| Q Qk`_OߐRgWb oc@yR#Fon跹֚p~Rrh=dqm@S`f̠R r<fgMT`jXK,άkhPX( 5 U;T/Cf'[fUo% xnq` DQQE"'>]\nvzDZs˗7RZynԺDf; l ,24/H0 U>:ZB@HB80'w&E; k*̩m'Om~1.vscKRvM Q&'\_T]߼VfJxܺ=dOS2+\#v}q!`94fcB0Qkްy'>.J $} (rd`:9(l(lWoWط2'8UĨuO aޤ[XmgnHyUZWS'~(n^3}KPz.snq=PU){o6x"R ?g3d l ߌvM]y!*Q.= SJ!kA4Nb?p. a*O!)7_?lϿkh*6x(%(6ȕ[dv8 O,H_7ZTCCVnX"<4fquφS^j [ybchHs+I#Z@lru֍>"ˍŷ׻6k T72P4<[6,(赽#,ya2p鍪& |{7Mٯ,-  X; *UGweE>;Ū*h3-2FRYˉ"FϟYU ^d!ufԏ݄&YrT|AHlعe]ʰ T)YCD&U{hd w}I9V/z_7Y}!TS6`TK/1۸bqy{/`K3P#\}J@`Q~mw%7u+}m #'_n}#$}b8n#DBmGm2KH xOV]6z%*߾t3.s>_T7!kK~RrG*|qWo`D%Pj*TuȌw!7 Z^Ũ)6'o {9X!%*7SCm6anrM-S|lozd\ePg.?7jaq6Q A zD8iвEOY61ʀS)&HM-=V(:~4O C繐K^#(19ڿg&Ԙ ϐ2{ 2B r{ dg6C`TQ1kaѕ Bt^)ڶ@>4{R?9Ze0Pӓ ʘvE?-ҎBowpD7Fo73:9zw6-DXYI/D\]F6[^&'cz'-g{0yGU~餟@o'= %^>=^czUw:AM*ɕ%~43sSjkٚ#ˠ<ք3w@ 09yN#69avXOf”nSu/FwJ PLUJ]VtX'^zpq>sk)lz$tey|t ^jxo@D+* ~Μw42} JpV͏XQCT_F 5fMናvF$ DG r;<߾)߬Iڊz|^G\#G~r(@§U|mT:yUfv%0]3FtV pj"u+'fLi:}JהŊrezqdi\ \={ Mc{4݀w&[zOEMObM-U.ۂN9ѱT4t'0IV-0 )pm##h&f; RWi,ʀuPh&'>ך>z.1 d|:FٞWX\`c5Ibuc:UxD1&"e}!ەZi>50UTZ:LYk-9#kV僋jM#/fjfvz=r/hz ¡)n׋QBuH3:v(pT\Y28xg:[΢/懳@* uH7uZ҈d᠂[ح:-UcG08u.ʔvTO8%-!fCa 1?xN6q.͈5Yyp咅lG"l*N9tLc? _20V1S3aL{ӗՀnC(-MUK!(,F{D{yh%^h 6B`x+pE&Jmn:LH[fg4=ar ;fYzO#"jKg;'ixZC)V_2 6 ꬖ&}:^q+%]v!tT0@9(enO0*cl=y6&+`KBؗtWS5Uc2`Svr7Lqqa% pL-=4]^2qm **h kR9;xu^%00ǟA(' :»fb &sËj_P\H3l]7ϥ5Z64CuK߭Sq>|Y2MVWO4;YzF4ͥKӐ,9? ;]Ae0DPIgZ6Y|..U9HUI<9 U=[jӭeK`N? `\eHn>hES8le{&`m{VCخFdO OB7rQp:GVP`(;\~sn=\E澊A0[wol?NH1R=?ՀV#8tR~`ڟ"TT ΂_`Uo-OEGNMgR(sBF p{ZTutKeng kOW~hٌ,\)c7e+0#<էhG,Fm=tn3]Lt웫n;h鷺, _n5 &zBN(l\_;L_V?`TiBD7YJYϯaP`ۦᐫK`%XF,2w9psezg0* /J\0〗ͺ2AtRaT6i'5@.9_|$! Im=*By'_\>*;BZ:%Z}ܥŸg؄Qb4NrPZ]m@q / |PmOmY$Vr3p}%zdC51AY"J{b2vbLWԯXղ/1%0߶+ 18:[^S#=y].,wh{DI+(ӍkV$m°YbB; ]2笅h!i ]1TdAa+Xgq.xwHzC`Dc{PWP\nM' 7\u* @eĂ~4Lps~6a.ޠ[9ԧKD)HP@b(H;2uр ݃{l J;uT|oT >4.I=a;Gpӹoszȑl=2~F"¥F/.H̎nG'+ed 5>>jM/ɻDԔ[1>PE$e1v#!_u.U2kǐzm&{3O;6/wRTh@ةY7 Г& CT}@ז*DpɤqIÜi,Js4pzhe@IsDV#V/%b2q~{p~>6j羫(UiS:*^\(©D*i˶NCE3޷m8U. 盜g!x.  .CiQs3"ӸMn&7B:}*Q ߋΣX1F(f"̂߹H6 $o !M8\TqIqMΗuAIH=fF~z _ÐsXsM~D(K瑩n=1e=ij3u1NVH`NG _ƕp[pW07P }_)h浽G!ׄG-0AIC~fYw@_\:gR)yS {Kq {gaqTo\DQ.x>쮓\-`̣䜊-` ^zْc~MkT)`֕HC)ʋTKi3}j+2ȀbOWҺM?S uH#3[Zp CUijꞲWb0 b"nL22 R\K2BU@jJ%whӅgĵN٥˹<Q ;/t?7Np=)}p+ ?j)I-Q0oCwlSCCd?caqBh WLkR2K8 QJɚSLvsoo>#!8Egȶߨr!1t;uo@NSxE"\Kg-ړ(jIL9;)qQ{,9CCʶ6l?k~_I7hb9yPTEv. ߪOD%WhG2{ ;T, jHGLȀ O,[qM:>70rc5!x}H'1F >0iɅrJ:a/R3Χ7M詤/]4\fG k17EθY=qUMg/_l!pPʰy[YsEj_ R7Tsd]u4Z8HMNOo6^`Y[%ie87nbi-pfxtuΐ '@uRjMsePFhɩf-zU6 V⫖t>3E|3jwhقQhcRoA0 $h?&C9 =x 0w픃8pp,^UH+>/[U -mg){& IJ#*gJ1p.LD&!g]ѩyws?qs˴.i"pyK. "Jy OXV5<z^U'& pH A(߮DKFbZRp6y+ = }'M~3 4۾Mgj:ZdZ?؄X#c*(d>VyBukHAt.—itE Wmi \r86i10XTaG/GEB޴j I{&wKI #Q_6nq2+W57-￷-M3^]I(S h+~ A{Oob - )oKK^MDπ2>ZlU^9ڍY9߭K61MOy |)V\.D&͵ⷝ \HRMŵ8ضr߈Ms~覱Mz~0x*GO3)40W5s A=V8ҙu h{fLXMñ]l -]|wu]E& .2tq%QB۩h6E_o}`jTq|6o AU«Wk5@2HE,a` hą_[ʶ=M!>V7g~HL-l뛘dUVWhmM wl*6Nˮ́{H6YX}p 9T81LayΓrʃ1<~%&>ggO% (JE XԲ}T_v)ߍ-1ʁu\ .ţ4E84V,g Fu#j6 #`I=sQU+rG_` !E(bo71wR[:nޣQHZ2&aij$iH Z?CwM4 RZ,ٚYU`)K@͇E+K'a3QŽ6,"(K i&wѕRT:KFyK BAL҆_~1p<]L΍B'XZLr0 ৹W4ck/mquS!Y  |iQ$[&$W䧛i,t@_Il0)!S={$K@ͅ>1wb6lH ;fg\yBzt)ftp;چ"q fkXM\~Ѹ7#|,]0xؾ#9+wv+Y`XG_~cr8kR ]WLoDPAq `nlJABggVH蠘R+[ V.JVQv*lkfbL;oІ^f;DL *\OeR2u]p(dX8dX~vwE7=υt#H3۴oc 5 wuŁkZ(]*:ZHMn&TJ{V>Ń P Hi`ΐ;I Zeg3 Њ:|9΢>E9)gI52TN0#fmu `{mSՅĽEit4j4 ^sܴC2" 9fss GlѩLnR g܇wj]slYm¨=_ZmIĭ,`9]o #2ijS֕! ?e*@ETn0Tʗ"f 2Ul*<'+WξQq"Pyg`1OW2RTx.H>Zi3{! h|N-viH9<<#]ErP%cv^o`GUP9yG]+`n?qZPY_Yx -M& Lw8mnTHxޔi_`Ȍ<ա\|5-Geԃ?wBMGN&=ϔ?}ءhU!Zؕ 8^SwDlPGi $)jT%GVٮ64DF# ˧ΐAAEaII* cӜ0H]ƦK_QCH 절Qw:FtB 1Nd/5lk2n,RC.kmÑָf,Ĩ2 SZB!y, dl+3a 04nk:15ǥِbwO0WtL%eu*j).$y^3A2Jۂt%OOz]ݱӚ;[ qv@JB:w2(s}g!l&Qņ08&[ *=`ץE"y3Y5e L x5tOЗ7A%zle7щ5f3AցVJϒb^{c҄U%d<#)\XV a˥x]O$uߒ̝Iy5 ]W@mӧ:RJNWq/)? ]ܨZp [9)BSUP::_h7F&e [MQĉ~q^Ag5Fh<KPr XG`=vG.j0?RtmGP eٵߏ`ϓF)LwmÙi#ɴL)ѹش$i:w_L ~uvlƌ"s-k 'gn}E^av A7( IGl*}O;< X&>gH dy4NaR$NWgЍ ZqQ{Upkp!Ki拌RqwU&Yr[/uؙGdqp>+VZ:H`fuN5$94-4BI|\} a췼k^~tj#^ƕ=HO2Xβ&Ջn - j \[4m7ש77k{:}fPMǦ* rny47cb~D%C!^[1]䃒pz,\Pa:uC+|))>Lkqr)͋W!1xlA"ԮyB]d`rP(vo6a>yGtNk =Z?>Ƣ6.> M9T+;+":kOg<8*EVBuË,}ڃ'SF)S6SaAHǜ/-5tgOx53PBjUVQ]FuTĀM\\[/RK~,:|xce0j̀f7aXqm%C]&9SJ/xκ.nƫFO!X1ʿ/,gQRx" 2pJAf$2\wYvd ܜInqjX!j/ubv⑔@B|l]4JMRzhCZ45=O#\?sNo>2U 19Z@(8 \zKg쮙Epfi/)ǐBsK{t@>B.11 .c%%:''S8NF WV` rxnF=XL>pX&qcߓ9y *kardpx1ۢZ%|]i<$c Y4Lo .wZT/(3',3BZ7x6rO M ulo@"erKAR][ J'ymkdk"Љ(t#FU}%^O%@}$0bF?9W1sl(  !` ]L1',$ t1;~LRaOL.A²s;smҦ[@%5Ď`1CW̸` :c܇'q}bȁ#UXpI\$FOJGOǫ{d7}pm !_{qZCmn_Ma \kk3`~[ϡ3G<柸r:M7Rt⤆2T7E\ VP`=b%(.jz֕B'ԟ4sj͝<^KOtR$" dDVⅎa Herk @9;TǛUlԤ = ثQ^ R@:A4}:w1$ă|]"9OEi&?*S3x wy UwV4zbwDgߜ#D@L0,>U}S=k\rr=*KۧϦw⧍f݁bH d%CAvTQvI$B+NdzJG@ڵSw:|rNYMA/3E Ip2M>SX26 GM6{',#Y0ơ}VF*Ҿn+3 l sy&b)ZT\8'm}*A]}dAͧ "JL߮颟@Z#q3Cm*]X{S~j&n4Ku׈B%s6S: B}t'׵9DF3:LTD')3tt4م?^@cH/QJeŖV7vPM]F/ʽ`->2b! ={|ظJ2&T*㻉& v !}٩VlrІ 9^*8|Dځ ~5u\d/`9?w|rIVcd uD2jحnS[ 6 D#X¬`O{=O& .[" WY&[ewC '[&V|bor9ǼTGMaPy;p~+zP@Oz>qH;@0}EE'+)m2>K~&=mbn/^;/MhmWZ?Dr-ӫ,*$BlpA&C%>Y$|{hs (XE;ϳ%P[f6|E'` !Z Q՜vU<+&-[b_|HhMoNMS ƒu{LH~~l}hbv[sH 5gR#3zX5B~<V:Ic,riM\r7Zq͠N6W*XߦEXK'ض/_8\)'%=KF :CCMpCFŊw4'w;"j|0x%#$(oHWjtbbm& 'j-k|9 Vb7m?vCdVG/,qQލ 5w@' <_/+]—.r%UDbq@^5Bh3ЦN_ddSk "rJ)2eBU$SJrスz ƭ9ene|jKft?*CoZ$vn7MT0'K0p$;'Ax[y\tP3Xr=NUEf?m^{NQШ{^~үK9f90#h"C9BNaXuQ bWYǛy%a5`5n—^A$:o<`(BFwXWFޯ`$O "Tp pUQ |Y><0)):G6DaREe1"WXpU[/ܖ*U]9_{B›C2MZ) ZU&US06*q DQQ mS:*Z;`KԊߛ\ѥ ' ohs'v+ OUw:B"̼^D <)ؔq?>/wk'*@=Qhh#>,b$r3VgL3'92C9sHGw{I2M*;ö֕5E]pG0y[}#5xsB* 1>_UٳqYjrpCb+$8(, ,/F=Ҽy|[z!`ŭk O2 (㡔*TBlYo+äp7V ɍ[7QƵ7 ՏIuZ/A?>RoBorTq$5'8d-rξ?F>Mҗ)7''rEӕ/6 7pbԝK%Z\ΊIql3}á~|X6,Hb QLZag j#>4-%W4eyikbR0.<@7EL5UP!%PPiOC;6=֡e3H*A3XՏ1L;/Eg\R[Ln75DVsxt(J4:&mgܔJ4$A7CRz ~^PfGAxƞNvdZF笯x? >ʖ QZrZI<9hAH+A64flˡ/!h 7 &صf,1kDHo&ó:!s4q:eXHy 7p1f=|Ael?O6)x@`#K=ì_@5z.Yt>~APPݦJ/95k!0 FtJN'c3 ـ/'1|+*H"v09 . ʦ䄫)@^Uonz5ЇFhߌ޸g0*]p!Հdm=(eLa\mgƍGRK۰M\1YQGLpNC'a*@ "!l6(.lVB= άQyq `*ͮmObNj! vI+1zc pC P-S#YxS yvnVhrJ>W+p~s60#,SѾboc\Wz#8<[%ñkrKWJϋ߸3jH=rC}N.CIg/;Qw UL3@W7fʎ]]Z׎ yAi>l֣xx}֋֐eWS\>D/UNDeW(AQ8ἸE 鹕Ϧѯlp H= QyVH(|T,HZd׭VхqTNJz/y]#Yd yjLt}Y V yߎLȿ!5-@xʭat;س3i toݜ\@ YT: bs fZNAPpxDDlP9Y"~9: dsjw}-$ƺdllՊaĵwдOdֳq|lM`$-76aph_lB;<ٳ$2e9 6&2ĝڇj9UcVsʳ aks:_F|Pb Kt~◦]ڿȆE=w輦Li aԍI'(.*Dl} j?jt}J`}5"ZHT-JmakL{'d_0OV?Ii.Ĉgf2]6Ǒ|>M+(hb.Bb _ &]^ 6(3V(doX2E'A(zUԽ5gqj*29vij_)u?m~ h>}OmH&>*qjbnNܵ闻Je > Nb[qSXjeԋ[\ wp >؞AD9d^KKJI$Æ@^䗀cb{LB,[8qɩe3\I[mC_oQtn U{W ?s8,5:3@Hb}tZy #Stʵ~2Oe#NISY'mQ]AL ݶ`JYR6jcGfu40<:!JU[mo ? 2TUp-Rufy~ SGgTG TEx`5du^W$3Jnx2[k~窔 +M9cʺfjBZ On.\-c^OI,laU\e<AɑC=".3ü I9{4-G<-t,bJ \9@y`p(o2f04lx+CFM:h_#$f'3D0e#IS0 [_(^BS5 ⰼն{X?ql)/I0ov¨5˴oR۝*rkmf^x!> 7xQPэ6N XYvrV}agboTY}>.15d穾Bԉy.s#v}bo577Jv|ra}@ɧt̟w1$-L W^#JW\cs0?[>a8!r-A-vj'^L`(*=BĸVrPhUYB8?w[T4$mEvn'*kL!ϓ]uR&2CikZs8\~-4T94ރ6<QȻҫ@D3d"ߖWW}ifaE|R˄&*|a7`fOcM` _7#5NC`(F٣QVkW$2d2RCg;hψDQl( 3"uDqj3rbbHzx13zi0aOHUzDӧΞtg7 OmΓ.Qޚ5x7҅V)l"CY%Y=Y!*"rnSGf5 IH k8 OB9\RCl෢fwB9yim͛@Cm7a. vK ^(+؀g̓>NY;HQva+:-?PDick}CYxwnLhC< E?_^Ms`6'Ҁ(gMYyyWbD!$O@xaF6$l%/x#X>)|pe?Z_/!>h3φԐ0<ؕbT[0* =wf,}1_1C'DiuPV&jфjT+[O?BA60n ֎Ā*.ߜcGKP3y)/D2uReH2&p>*,4glL&B# +Ț[њVg>6zO0+im 96_fqd|X~Yz<8Zn깮gjpZ>+ޫ͵.ӑ )j`ؽ_pcw0ȧ}*")/E`61J7C@=ZƬ}tNY9#W/rވfNkdAyA`'@H5ݸ M`F#w RZug05] (D3KP K[ȗ)A2VIªmj6$6 ̶Ub5a5,wX*q,dL,?#(ʄ~ U)ࡵAB@NB}q85ZYNa~MCA(y5˧ (cK,;7$xcth̆_;Gwѧ*a:JjS-Ggl gBӿIJ'13-28?Amzi:LKi*\/߸S(` +w>:ZzZ{*(PLXG:tw[l jwgy| žf}d:%Vn-߿J}k5U {;ȯik'Xm7=MqrL9͍r{4 QɦÇ0WY|7lќRe\eF{^ SU|2>Bpy׉7SriQr@*Ƈ8Kt 9=ߕypy?c@Fॖq9?.!a9d 9$tF(Gqu .T4pYS˗](]._.7 w+t&fF#ۂ|x^yY0ra'X# uJͦ#E|eT=iP{8p(H?ECTbY_~H{cIRiJžĒg`?v崧J6R3u'hh[ϑbFnО@"XZXo?p Cք.&Pۮ)&o+c8äB4c0$yL|V;zŊBHGiuee$PtL67YgD`e-|] :oNieA~f!_O!>]z Lj60)r5º 7 ~ $^+z⧡Wg@z҉D"Z5؋JǷm|;=Ɇu{Zok-ǡh$WxheC0qmr1Xx [VQ72ӫbهEȌ&]z=4Fۊ_r~H/} M l:Fv:j$mnQˡ d3K)Y' { 7~^2H`nhGc~;n `ȲimImoR/Ě-@}>-3Lae9he&A̕ݠzWZd h󍓸Q44Eqa1"PD2S~Ԉh(i JYIws^K]#h>Kd|>S~,8A 2u^!KݵU&;xQxL0Ra<ϬڝAĚ5?V8!%Dx|ZCiNfrjY )Ydl:BقJK^軫;2m4uйᙊq0`uM 45Rz2³I1씳I(Ͳ.yk.]Lv W(وOAZGN~ޢYs{Ok4.erlO&oe27i>|r NC(*O`pV ?&,i. "@_ޔBfE@ġaHK 4!xՓ yИsB>9L2;D9x@O20ad?>ʺt3YpbRSC>&EXCn<>lhGif;إw>|א?X7Ml-Zy%DbbZw9b#và=u&MlfSlٗL(Ft8rp>cX~z?2s$T~D+q Q}5:V\ٮH>#'k4Ijo 4JNʀ2̙]yHVF˜Ck2oO~rS$]+U626a>)ωu1j=?C Ⱦ*pekܭ%TTzCM얜HdfB=B|%B.apQ`5*FG˃sQ~yԭ+ m&hy#J !w yr # ^B%b˯(OA~˻D4+No~c R3Ju`mi{_K 'ػZ35q)GTrC~T\ٮv3lmAOj@<{@'Y+tI_!%?_Idu2ǽygI^-UmaUpy C/0~.m4\Gm l#.:r…,Ef%\?)t R0sAkpuY=J?!< Xp#*_ H=9Rw2*5.u5ltXXƆT'Rԅ#%Zp%80QD, HnӲ PE|c$Km7512s銳WvpoVAql/̜#kW+No;^nmL*DUx [C늬)SkRXH ,D6=IcS٧F󦀡ڥ MX[K:ϣ誨dn Ta@Фaa51BܳZ D*OxnJJ~ym"aI\'qr\NƊ5x_صNrk$Fޛe >b(آfrCV 5,XUhn+Om<3w{%`d)=0FB&oO([(z`F "^ą*qjj*ʩ$Ӎޝ:@π7r` %Ї8gEJYi83Lp!.|@ vvd@Ir7}74:4~ ,6ȟ~dEL%lⴲ"6Kړm KctGKŦc}jm xЌD}cTxf@uZC!iKHN_o`Φjof DzE~1r} i/l}::Һm"DSs]/ Ddե9[5&UR({hDԘ:VP`-&2Kz~4di~1mzBȋ_^'gSw%VzEϓ'쁁j8l0KpҾ3|{w@ŭwv(`|np4G=pbBwd++azd8an|:S{Zėh?qA n#~HuNL"3rr6B_?d22d2,BBU~t!l?* iLP("EdB:A(~AS|$xFwH >вeǃ:9j"R4H鿏Vr}Ad U"tn*O/ !Lbk~@r6q&Տ2 :'<֧gzeΘkFVPo:wi69MY۞ұЎԖq:(R&a)ԋڱZSrxN0#~5!jdURD`'"J C-8UXÉt_~"G4\D.l NS[&) "3' nEʹžkaUn ~ͮlim]h%grs~KW2\D:r`Ue4ŭ\G es \U5Es K2!ȄJTVv`~yb8펹t `PI4=j'6H~?9Z-gy~K]{b93R_M͓Ry_2#bB[gUn4 mקlJsRڏ/҇Ԗ5iaQR mU5d/_Q\cT港l7Y"_ݬl/is~4ot͕gʭY KbE@TAˇ9~(\gem5'8[AicO$b qFs~Л9mX|~9MeGEc Ļ^B瘮AUx)ows]e MRg`HvGN] G$r^>٧N'=>MIXX#zcd:?i W Db:1< gA(HG923VY忠)L]c?pE(֙D!AJ8Τ*6j-^_kcUm^)yR葳f&+mMR"-]1l-ɀ:AY73 Ɯ`{pM4TLN%!o[#1ՇK;R}~H6~.)rs៰8p1'*,x5A=wAjrXK uvf?L]q2߭Q,nb+)׳'h7Vjz_S炾(·4gX\or%$.,ߢ[zw8HP%gVS1B$RJ3V¤; ~N3r+$`7^e=:  ,]_Moq;u Ҕ#^6SY<>gP׺v*)|HS\|ԏJf7EÉ\&|`|,WlSB{@VsŊmh$P1!c.~+L?a1A%YS S!݈NDO-Z߀GKO! ̻5zs#om ^%PPCC(Io7E$؞s2q´:Rfd7%z N2DQIXC$GV3/ۏ&G zK4g,5d-crsP'(v|68`|&O[:AL3J+iz_V'aH eGڃyJo9Dr *3.>d9gjYHc}V #sHóB,)fT0`@2-K0mBQZƩpfa)=]R^VTL`m< ȿ& Rdg|w2gW=*p=luQ 8DeXl;I9)FZ_hi#yT Iz7.?\ƌpU@,Z<DԵn\/4p vs}Bċ o=d8dHR<֗*BAߥ!fHޢ0A >2aKSa[B/pIX;f*6:m`9D^r.HUܭ lg[t񦺦5Oc#.DI*#`SީcPobM K"7w]+l?A1K NUѾK Sq lUq-z@ ׭^(H]ɡA,p,+[nfH<>{5R{{C5Y2wrY^A,2<%Tr$u%/ÂPHUbinH >\Ëd\멅؝iMmks| NIFon- #)s꫗o_"_7EΖV/mT#?Z1dF_hdʜҌck6-kƻ[(~jaaȠcvyA?u e SZ]>ZN؂?k)1c"1/;"o&Wb~,o f;&;)Ÿx:%"?!,a Y4ތ=9 ݒU`<Q¹>(Pcy*XG7?5Z6ux6;fd!'ѣ A'Njb!()!Q{{nlihAe$9A85969/oh}Ǎ;.흵Kl͢?,vz{E&0YtW1`:9iÏezmxuC|1.xS_5wMhy7%z&7[akhR{VxYRƉj bǰS3ۇ\ iFH K"MSߦA|wYp=DZ<:'̛fZUc^CȟwhdF(Ni I #84$ \}lT6#PEQۯî S_f1E tԈǑ$dM9O()SUmZ\Pp1BVӹFfŁBNȖ .=u 6  sNnތ 7&"sBew7lU31" }?q[1E]׆ij cO] Ib mN5`QB4!> tӋLf(Δ7Qm5 gRHMj|Z[D1%zY'9d1L|FMvDA|҅ԱI%I]u){=W hW+wů0(2#UF,Ys? TJ0I8tL?Լȁ; Q-sqtuey*[(WXW$xH{h#ɷhX0+۲ЌBnor{X%RaITZ34E\R*1O]V7DӕJ7b nr֏IP R?q HD]a)EMWBI.deJ)lA4.zZd/8a5[@KC">nN68W2QF$FޘW9%UUEޱFےtfaVorɥsP:ޯ AVCqbq?ORu~<иmqsQ*Ca 2VSÁNfDм! xDz$֝:>5 q#ݲ:!%+޽;^:Bp?2됇/y]`LLTR5GEʮKmѯE^c16fap HQQm5 Fq(%rZFʋgy8k`7p30}W'NfC j9 [Vl}Ɓv*zyk$9ތvk>G?Ozh/JDKܔE?˂ \p<\%w6H/5i.b}UGB ngYQCWG'$s5HSt_J}G.V1b$oU5_ժ'j4՗\ K Zhҗ56];;l`=2>:-JO B~ 6Qn:._?O ZB 3Mcuj`_g8 ڋ&jGLs=$Wgz&5<:W.O]64fql蠣%\g>7`ל5KʎVђ@"?@#ؙaYf5}ILƂ9HJDXL!aϽ,ϒ}ЉP^aٺPs.Zh`Ց˂ k6M(mU%BD{Ⱥ)%RHWjlz%XflqyJKr.4M)~Z*<$juw= >NN8L U4xDͧsz*5jLҿUzӣM),h9͊Hd_&ZHdP+s\*jL٧$ԥZSZ#􎌳.҃q,W1}[LaM 334|S@&mG$ וh~kǪ̷94!ft}ex_>xzb~\gK,C=`|w^52C3SL$w1 PFYH*?@M,!O<1|PۖUKćw<% πգլ(1;VzM9hKo ]6YɞhClGijno'չ |]4K? 0TT%bf(9}?4a8b'PI Wz#<(]syh |B|'8|3F(3A 2޲z9c^H(iO@zV)h,=2ofø¿Fv+1 G RK* {O9uZlxf-i;rWbLu_˞I#[.h+DyovMǑ%_qز9Gb pi{2 a\SZac#t}HeyMtW g\@OTEJDisXTjܐĮNPMo `k;lOpи D!es3`H1QraS"kRž69֞/cË-S+n U[/7.G,N/~'-Nj _ PGY ŃN4@zz幃-#{ B7<ŘC0Ƞ3KoJSz X;e಄!K7lxơ1Z: +qr䞶 HĂ.7} )w~c Av Ÿ~NE~I ")P'YtBU̪+I8xl_]"6䌶-MĂ.e N`+] 0&K }[ۃUpB&z_9 K7J2UҰO} {Y|بQ:"R v$U چ FR=oX<{puOY7/0i}5▛#w~xU&'.Z)i1脾Kts#Od y  ԤYM@?].SXh ,5e1 ]s{ T-r|:"'J]i*v?޴/mcH= lԙ9-/W] Hp(:kͩe,WoX_S>a]D__/H75VeFổ`*[=ơM K!/{^K`:x9/ٱb* sh'X 5K h+r4:s|< V:酰`gź0#*§cb+!=4Ds[{HKnsV_$uT ir$áeQvDZ<{}>`,E*wvwћt@9몀HgvSnH 6U@ G`7_Y.5PyBw(9ɢ@'&QWp:;R6eoR37^K teҸfN4gKbR }HVWh<#f"sؤoE.0BʢE]>VC ,39pϹPuTP#&qo*D/Р*Q/(~#qȚ^.;YȢ/ }lmߋc2;|їd3PcŽܛ4dC t-\5 g⋊6S=NݩKu)Ȧ j8oEAH %O̷(6M(9v&_",sq`Jp=]]b71 $^U\|Ϩ}u~cU 8@ ?"E`v`p+ =L^V-H,L0|V"- No]zkd4w _jVv9 CwȊxWR_$Uv"ܛ.B0(KkG|>V&bZ4ܪ;->¬4F.Jt0c& j~ʋS:̴D6)mKL^8SJڝψ\A=xQ Rd{#zk_R,3 vpoOPP zQ-$ɹQW6F@hc"֮ND"ƒnk ]~Pr[iIa/P`aoǀQp=0:eW^Z@-k[xWCp8;$ w=؝R42PyRdjc#u emr >N:ǝSg>0tQ?gw}Þ8>nPW5 4ڴ/O,AZGq&4AIS@Um)W./՝na!Luw*w&@YKR|-VSΧQ 3B4Ҳ!z2<գg`47 Wa<[ #C)6Uzl[ !g )k \Bd@+hrpbx2-:+v7>9sk:5U 8p91aϷ3f{j4̙s~i;-hԋܓq˛fB\uB |1.< ͙@ `T[NIi|$"&FzAQV7+GWP&,% n 4ZYG߲6¸$&CRٴ.( 6 W'fyr'jo3jJčFNsib]KdG۷z%w |i9~n>6ߊyX^bٚ6'~ +*,v,\'|mGcׯ56UayK Ʉs1 >5(sb WRIΡ \OŲ`iުnLMZ6 F&F㗫אּv@[?G#}C)ȁ(O$is.&I1ɲYbvDu;{$G/{)4Kxi<C^zOdY6OeS!"G`7keKљp )- ,SjiETe+?`v>!3C8v3}ip wN/)x=g`*YWY \ֽL.2&=?a{3d;$G*@X4c?)]ln%؇(K8bߐMҴ8:OwuKSֺ)}(Ԅ.|%K5d-jw` (e*ac5`x0(8"RŋS!#rtUgB,o5ٓ2e 1#K}?5SC!> a LCPpXŌG>i$bǕV cؒ4+;@2y5: s%gO472bUt:@I6$>k^6Uݗ|%> e" Ty\`ٝ|%BL52O ` MOG_+\0  5Ù%ĝ4ׁI\vq53 Qr^DnnUΒ]I{$UGH;5m35 ǑdP .`f\)Lht*Q-RjFp;q\\vɬaLmD&pMG9˩0`:MsE B܅r:lxZv[ޥ%5G+;!,+{뢧>Zq=GOY,!΋ݮ)p`ysq^E\':ADP_-<_g<\}eU-c.GÒyk"2SaíKƩWf~?QDNۏQBu Agԫ@`lY_Ѯrߠ}Hcs7MNӿlmD*XL{M+VR鍽1Is" ztv[§AAH` D6*AacpB^G:zP+& .ع?8~{辕P7 W/ x$ֱ<()P$Nhlb"rMN| 'ri{e@?c UT>!u϶*7oŹ!,zT9Y8:*#|! 8s)bm3͆l!7[ \D'P>'5$UrjC~THN7d0d) cdJ\d:IgēnQ~JhMb0CG%W ~lE"G ^0 4MvւAr52`*POcJWQ wzD R&G}12#WU3]`8Ұhw12Ysϸe!Ya<1ab)e%=uDTIJYƃxײ*z:doY Gö=(K<ש[۞}:Mv3`wt @z?K]C=ߊB"Y1-v~0憈d"*{m6;cuf4L;[;J$Iӡ.312a%ɲ| uwг x?eaY9&qz8b7I:YpNv,ôj$+so3Qa uVUq{sLY 9+7:]~+4bM#|Lm/,/xx]4K"h9QKPrJGBW|_۰(B Xw| _Y/ʻlPye^vB{ץiq)5ڳeʶ^._ 9U+zwP T/KFCMHR:ذnrnaˢu#q tD79:yCr Iv7^N I UY <,.YkLb+ɈcqUwa>7@{L$ #sнbz_̕~v_t2GԩTMmr7M߇y:`*/ gc\ ;:MU&c6s&܁(b<h lŤQЖa*s&|7z{ ~7 {$( KP~iIKWv<1(.o>g!pՂ\R]KV]FI 3vÖV._Cfƶ[o'eC繓^x55*͐IiNZǡ<܇ɱI.{Z!S<[k]c`hq՘g5{/ߙN0G~`jGdFΓ.5Ec?ACSCiyLp-9RG~͕3AYr0+x?^Fʃ;P&w8p,>=-AXWf@Z(Cn7s\CHG'vx+c,。XVb=>pƸ%;8JU-۟C*; [j\-+nxysπp Z/8k4[+u$.Z(1.1I8`-vIgNI~L5 O@>LlsB\Ҙ,%ӔҾ--H%~ \ǰM(+Ao| /{y`a7 YȧU{RߙBH mjʑ Q#cg6)o(RS/DeBhFnEh/1@^$7Ahꉹ\QɪfOzR~&j6IMF |/Ecuq9ǎ Hz`ldz&ts}>ersPcWB?v.DBGl)b f;6z[wlCgJv;Ldo)һ7 4?N|`Lt-FUޞm,r37i 5\lYa3pGk݁asd[N3~ F {kX[7דV1|Π>g"mAzZ],Z*M[]NP.&⌉ @YAKd쨟%&Fu,iՒMwԹӼ2IC>(Xp>M`RVy/! 6Frf ʜC-!Cs!.)B?IY0UOccCNXϨޖԝ!/g?FނXz-]ֆMlҳ< Ut{Ϗ)kch0?{q_SU)n -ЇSzX] EG2-hX"|%=~pe`j4*uO=H< píS|$:p0p'̝f=nr>’x4ϷlPϡWЍv}=q DΗVҗ-VAu1ʼ.yϵ V}Z$oB1QZ_cH)-GCj5O d{Ng|{QMY_Q L'ѐm=z$q4 cD*b-Y}"mqh 2PprCݠqNocz@0fl8Bm<+QC?NX>*<>QȤJԭ )M!/W=FISϋ(:¹Pk\Yx ɑ ./Hq'4sGlbCV|;n8,zBVLʴ=4__T4R2J7")(EBNvB;Թ,>z?-.{f0tGc K!">'pmY}_f#L^YY`M 3Ǖ>aXβLrc*P+GlnרL˿9*$8K ?.E1Wgbb?Z-mX )o&P )%͉ڞK]w#!8Sb֏m.hjɳ ǵE-0 9, Lġ!^oW Z-t ˘mC c4)~௹l̟Y:5KYkf,=p)!uPp3՛x͈b$2?cDT2VO`G`6؈v< #~YG><4^0+sED>LD'U.);OSѡAc+x[!HbSܨUC=f &;n I_ےZ c6W~`ەD,]JLrqY5.RVQ]?_SmJ1r~OK 5mVb,"rVɐK5:<̢'l'v۔kA#>8~ek7׃5_)k<Dž@QݧӪI4؜Sw͚p M,R\$ }t ^E ăJgs`PI.&S3Zv>5+ǚR >̃/_h$^jB/+&)#X;.R9k5P5{ຯ)weϔ11.¦2^nq^eVouyTUB/Ωk {ViVғk/z+eEpL+ O\f}>>Y/V?3`R (Bhy':حscؗopTD;G(11*J!O(_Ͻg+Z-8#( 0<#G?:f`:%؎r&QdB$yl*J);^¼{Cg/anw t\OzNsNT8Bn<\c-|Yl";}2 _50X]9H}K>5+jG'HPT0UOUľNu5zTcZ\&< n*_+M-H~("? $%rxe Ӕf:kۦn i2}=WN*ΖLê׌m뀋_?@3:Ќٛ]K;U:?ŎL &ꑪĵtΟê2%_/BF g;es(L]Ƚ>q^S{\8lJDIh kk5iՒo_ՋmoV-ܵ?eOBc˽~;i,O?:rAMxmPgx2 `#0"MzHhҕYB@H"dV7,zwY*1(K21}0 0)h ,6C1(M`LR-r48%w,湉M&hNuxg@BNT븼Yyk Y ]6Z50Rwg%#HJK.qM19LI^:ȷTjѼJ@ːSF -m -0A Izq4 vZ'fEyS2snX<>{]NnYm ?rhdЦpCZb}FXtV̖S,\~ω%+Os&Ǿnʃԭ}B#7:|v{*QIkSZ 8w]@l%CY^( !È\2):;xe,Ce'|m~u(5$ǶvZ8VM?cA|tՄmt2 NUPj%krOy* I/%bG4nfnP-V#^WvIs L@mSԆهﶓsj@K\ vk.k}je ;?ɨJC 1{ش;9-a>;l |zFU>诵Yw/rB~a (&mI z!ٰ ki][kJF\3qeܰQ|v5؈ B $nȳE?U gu,M]1Nrn#=%$Skq&wS; Hpڔ@I%Dy,}^a/ 'C>m8(pBb$+~֣DяHxUïs"8>u8SѭJIz;e3!5gN[f,&r@~Vx^g|Nk!ȋc&jKrq<2yKckb'%qqs22m i˪gaq62\4p̅PqZ X)2@kX?BYX8ڙWK { `A[[^6*y&hz>E0o:ܚQqrǙUe%4K'Wyk'xɶ;S_BU4)2=2\PTyQr-ΐg-|#uS%LĝS :xaXq$eO:9b{ `yySMC-(>RV??L)(L cN3q"mPI+rȦǍl!:Jf&j#5Uf#ɫAJ-UWySR(]P%obdԽ7r Okƃ+iN|ύZ -y#qlDzB`{)|'yW;ځLvLABjjR7ZB-"vCpe-{؀$dg-'~C fH 8K5Q7'./\2ǠW Rq)K,d &biGd5ޔ"[!Nږ6b(wqNuS]@˖.4Wc;) J8y ;iXPJ2uİϣC'ct[-֐4`+)L#Aox»)Z9K-@waE!/ t55lXBujO6 п~ou0ez0 'K t%G9%C {î 4ߕnT" L_[8}v\?V:R3_?UVo=M.:6wF~BFn|I6B 'AYR#w''o4=tcL[Dm_]yγuI9Tlffvv EXĜ\4%.\4; ȏ[>]mU~HZ%[*o-{f- ln3-ߜ Zb"bTw}v|uz2(쮲N9`^@v aRa@M0\>.$qZZ&iR֕ )' 2|!tQA6 j3%-glya܏^B:rޫݿeA?T;Z|>:Y&|ɪ0,7MKwӌM/+q'`-ܶ~>05UqUEJ  T"WtGJ{!}2sbe{j]ܰn-04g92^C/|?bZx Cx˘-@*QEq"r%{(ٶ^Ґ vi?ۈeLaT8P-bnS? ફh/,_j+pdv~e\vzNSy#0+߮Ouy'FڪIWX- XDho5ڰRo!o[V>n*?gbuP,$`0r@&c4/= eYʳ֟LOIƇh`ʌ].SrBf7hL,ke8?a}K.N/ed f7)$"-΂N#B{0OJ8kd40A:Z.;B\mPc/v'cIpS]έQ˂G$i8KsEzxI4lӚ9Al)  ԷLȦ"$0Ԑ*T.?pWg+ ?l`DG=0GMg:zgt,(m0󳀚!Aµ JwqCܷn~}` v^"T69@ Iv Nh偍 s,a-4u:GU9u!F@^MğزhtʕT_Noc .nOPj)LxN)Sd$P-jjˍ1gB^y>*ŞXۼM~kmg &zޓ\۷TW;r?-28j( دV+ M# !*rJDkz Z qU㚵xwTNL,N2RнnXi>Qߏő!RPXJ7 &IF -w)_d\+{f-yϑQd84oĞO-FӭHET ΰ \m5Tz4EC&Ȏ3n*9 3Vm7`73얧t2pGRGKq1ZB}myQ3rtw:Q%6 Xi-4sE fWPcA~:@ߡeKP +:G5,5iנ{S`׿, JZhA 3ZbY2@.b6(J&u@$50~4;8ën9˜10U~Eϖg{<0"xΘ(b'X7MsڎE02j&anOa2IxbNI^[-ARYB;e%Mgp73P-6P"k!VJ'q1cl-|,_\ӷcˊّBTxd#ӖE~(h%$ec/lN!Q S)m?mg({*MgڰiZhOؖxd܄Ǝ"?{q6W3=5CXO#aLGcA$5B8N C[^_~6; i؈up/l ;BܞMnuaxy;z6,Z?G~uijYBMIߠ Y&MR!TjAɱ{#bR\8\0XPm@JM_hHdE w0X Z?y4 {@ewQğؔE&Ge`lublI܊2,?iܤ:ԵoM2xB9>R>5Eֲ\Ci8dƊ@a*8Jt8,N9IH.][ߧv8F저ȨQ2K\0Ա,} ܕ` LECe٤Tnǩk&t஦8A;`0 ]WoéF3J!>Vg+kKaO1jA,܁"ޤ ǤI.=MPe$ (KMk ZL=#G[{R /iXYȔS@27us籪$fE(EK^IJqBһc]\f[\:uW 8L.W8[fT]yW#H[A 0եMv nߨıeyma2{\1+۪C'K󠔴l^yX)-*G8hk"7j0!_cCH79/WN{Jr, _:ln\[`7'ҟq!b>+&}չ:z REmgǍĩvnBi> "=Hmt@ƞcek> VZ|oSaEv;%i$!A/5jUdMz1ԑOR[ZUd;bȴ&on?.IM-%#٠ +}.vh+O;j1B/x7;vzyЯ5?ÌЫ6}"fdCy\»zP֧^_Ѵ#TCn^tAC9,R~l6^v1Y':沷)sJ~C!t|q!,5#)tt]>xۊ$`jV wQ W|"_mɮxn?Ciy6FK:94D;㩯ɘl Q6(=?WIvpYC2y#!(:/~Dj[O>奞HvZ EPԋ7HChir,e]$MC[Ksa>wNڃD!z Biaɮ{6[zZnY"jD-R_05;zѫG0aޚ% IeTJI_fyFz6A(+nq?ĉbfd(|'!sAi4O˱B# j vml{I6=O̶2>^ lxyәli<[PBg@ (93g$at\1\qA8I/ebݒ>g)*?QN_CU1v&\ɹBP':5] Kn֔Ɖ/Kd ͠" ]z)Yy'W;-gwgSv]^d7N<4 a;@4 4ZR}l^#!_K7SàElU`!0bPwرxJӖWd}]0SWX/C*_!ןcDN Q튽;f*\g)s=rg;Iql'Z*.vJf- g.긤x>O x. ua!k>ϼ9 ?wC T=DX˃_#ۜ\8"ߩaղM2 wJaT^pOMY+S!C]G}wחK >ݞ!dk z)A8UkANn~9~UA”*;K2=̆G< I5"J?&v6@=/rM: L-@?GR]l,,@z!Fɋ:J+U?쏺)SM,KJˣ$Ӟ0qx+Ve8%4D~M{~UZ&7& pZ|ti|+%g<~uu*\эUiKBOj;)ْh0l2vL{De:k* m'9Zؚ|l.U19n$|*Yh>ĥ,8Q/~+c QIvU;W$+[<:#}si}pD5p\J5$jj eЃ &I mcjFX'[Py^{ď >~< %XO3+Vq/fjgk[L1hMM$h.n5iOa ]JD(Wl^"ŌE|/u\>WJpCkeIC~^b%-YU@S:+,Rְf MOAsz3STYk<13 [TJ #gnϹWe} 䅘a(96].NL 7[FC+}j*՟!m $TtT&Quq{nр%!hbM`یiK# o;vYz+6ؚ,D#x YwkfG~?A?N ʏP T)Qy9*CO jćfmyNM w] ˜LtEK /Ԡghen ])4"Aw.b08>@~ݴfBTL(η-x +ռ~p?;ryZ[K:=}lL/<躺"D Gtx!HST(=Z܍^4@B%ŕm5'5RΏ_Vn4"aFZ4:'>ͶkCH)vت''?mioظ?4Rpš͋/Q<6nIi'-^d=$:*q.zi$&|^Zޑџ(cJyԫQ/;uw^Yf7A>|>5?!d3!%%;BC2 7u*VݲWhY& 㰨4CתzRȨ;f9An-'dOó]EQb ڿ`*P@E)Sq,ց|.L^%hxP+cW۟WN ԞxHS&XˢiX:24έz0,ڮ@Zk.;`+ 9U#80a`ߨLyc%)@ݱL9a(I! /qXq.eDFKIđkdٙD^,L*s-|8k,'u}&NPp  ;ƓY0;d {Ɔ=S_ mS+Ύc!}HLenbªPbHF>R;>S_?LǰK ~~Ysd<^ExҺ.CO/,:O=U|o+f.;ǷIA~U, 2QO!w2#1N=Γ\9"p$710RdOsVw%Å[g9\FH?\$?{b@(1eu#E>XNhc%|JB )o#i0+PvGBI)]Ԧ NGe%,7ߦ`ڏ]4(=myN7u&MA3B^o<3ͫ45e xzUv6ͧSNn6G~m Lc1zGm8+i.q 4f%х,h 74`@S4GLwy?VJNfsˆYzZ7WJbGRͷ T1&#Ą*[^s]3 ךO!;{OvwdE?2;vl}:Y0=2}I z/cKޘ%fkT Qrѷ% f!`ӉpCm<{*j(:¸;OC08S쮵AךGIS:QX@)j=ba v:Dij[BkIa;Wϋ8p_d,r钦pU>PpܟRiQЧ{EcSw9"ǰ!?QT Yv_֔|^,C)|/@♰q۽m]&_@!lJi@*MOk,ʊ[AzSZtWvjç_]s([]d 'h{͈=k4 ݖ)2AKbC-4E 2?{ܞE+Xms JOHH^h͕#?)=Βe@ھfa~ +ofUMG.Kmv[5[e]CQ|GH=*k%jsE;K3Hɾ3C eR0c P^=`uiPŪ_(9&mfƇs>!`zU) p0hqTS X댶tLea i~l0:8|( WQV&IF9=P4lBu!u$gʐFCВ$s4N;Gfu!&*Ԅw+լ➏YnL2tgx Gr@JQ2uYCR+ݓ֑SS o<$D} ֻzE%Q TUI8snO|`ѧ22a[L%N֘3Q,nk=yaBV~"3{Dv׍yb;bbhϾA0D/nQA3L뮦9zv^LVmR>L4+NADq A,ȹWOr41D+ 7ē$<}YIKnlH'M \#*P)}A@<%o0TV⥈Zo8'V5aPv4H.k3j+?Q6 =A&Rj ߦ91oPj}DᥔkwkuSSOECƕc*cxAt4+~x"aMw-#,qnˤaav}7"n[#whB"f @1_X>SyVquPCovlF(Z_)o݈<}Zo{2kL_KxlGZ.L|0)3{{ ˔qhw_@ټ;SwŁ3aF*+zଅc TZ{iP/OCԙm G8&K=,P9:S)_U xjs T'>VB#Ԧ>bi(N~$%ئ)KifaB[-.z2 jϧ Q03ֿeMϐھ}W-ew}6)(̜[e0~P#'N^[f++)Rʍ~.VR*8A:L dNb)J,L%0 28dN^yџv3>U; Ykth] o7&,aFD>Auq|&,~Wl Au1#Zlr.lxNT@Ԣ*/Iwqy  R˭-?n'<;Ǯ [QuR* jhh&KS$s Ut@I8B ([j[lv bܼTIx": Q1r8C+U fӃڳ90 8M0|.]sV3-/+D'bgU|R,Hqmx,7AX<71vCs hTۢw5@u|$`cd6 j9y~mZm]<[Lu5Wl99H( dI2ez] Q[5F[|?EDm:k > V衅[]2B4Z~Bj&л[W*樯l$rUFo Gc$jGHUk׭c9[,:vڴ! $>=+kOA\:SHO'|):=I4@#qW 37T³l 1~~g~I&?E(f^ _ON2N҂P =??=Lh!9x Ѣm%Hhꐼ?ORh3# <6 M m&c9bgTr:!g4QTkCtKc^qf\[W+Fc1r aV_9φS.Xo|ڻkm0fTW)]-Q>w#SD8c:sJ5ʓH\G4HX^A9j<T !e25VOҟuUA0ۨ&~skJKѿ@[V &&z|"M{_w3#nd9J mG6@F+:m;sO!2Sz12FZ[sՕJOc~L-h3V'WpKn6U>?SD25 q^s˫^ c˩v"jxb0݆! C/uF ;g_k0]•3;yRj v'x?d^GtΩPIah~$~o~HoM}hK"!˩t7V?J`^{0MPTzBY*nipK, GV?%Sd܀q'ٵ /–*1?ɣ{KQ\u!UZ9<049/P<Z!$DB!c|ogVh(Eg{yM=wy _^mx\IU_5[eBfV; :;CV]_]'._w >!@ehd%xŮ_ptiG£*Xwԏ}ArPO/0vx ۈ i]4W;n)YI˰q3=&hF$B,@NrV5K+[8L?.XMB/[ZZnT}t~G !L?%S<߭ - U.\mv<(:n dd]c6c۾[FfKuO73 K ,u ᄺxfs Kn*]5{LOf'|t]zތVT5R7>zᩭXu1.~͕ ISQ4OԱctKMNYt1d?eEp' >A]y|\v}z?WqD {(IcƗS@o۟2lɵ_X~X=J+'lz lTؠ+1vGON/%Vqb 9aX,{N9hJhp}d\ t#Ǽ8vM-AsCNSQQ8\WPϟt._[hY﯌WixObBsO?Jx݌4 R:K4c u.YЇY0*A)InLKE/1>HbVL5mw"爄{wެј ۯ!|Sv0e4bNg Y7dp(OH EHʸfek|KilJTdز8FM)t$|Eq5܉؍; U ǾxjeZ@0?zZx PN6sz2 &buKqk'A`l Levcg>zp.9S!-$YC t h^$8$x ;(nB&)q0+/.Uf{ch>p!l ԔgM6jR)l"b׾;H1TEoC-5U 8 򩹚s&8,P.8okvUKЀ&EJ HyۄI&wLZh'3'lrF8+>ՎN/(8<`Q2"Xsd 1IVHj1vLnhH萻ڃ rr @&P0任Md7c8_}1)eיw$'Fc)*c^w2Loanc1t:=)ƪ{Js{\lӱ|¨pu'IȨd=vFQY-ivbDEh;"/V$ o׾:Ev lr~ҽy:KNFxTѪ 'Njra`tA5QRF3>?% |bCCJ:%^0^gkX^2+fV%iƀa;'y5~U? dESRټhOէx>+wM0[=: e-~å 1 R8MO嶤ŦH3OypuJL2%$`fr1GvlSf:xKO?xJOpGBq$m'ь>-:Y?Fuf$N]?bQ%PY/ZOO':'2\^5]?g6} M)o^ ą-`YaVZ~C}czppOd9lkwJyջ[e+#rG$?jTMпM$|>p?2Ξ--VXn'̤F`fON!t lƇtRû3e%;ՒyоBl11>GɐC"KU(VӞ{Qm&`c^o@>}2WFAu1'#*qRyĬqocvp^rs}{VNPIvc}oB('!(u#U[w z ҏǓS$C2$w0Y#Kx= BjUcI >>he;;UK0a5w=բ>ĺ.)H4G3zztW 6GVa9a]ilhH r-:ʑ Hӑ/+ AWrn(^9Fk\u/R+,4)#ޱg{N)MXKĻ~OI寪=pGOuQ#@i73ۀ8=n\YzZawUF 474YNXzgcv\옚Ar !5YsOAj0%\io5$`iޣՄXSuf#]oܩ!2&CR߇.pZ"र=eG2&[>zRnOf>ngƁ:?_ {~Ǩw3̫RGܑIدȖ!ݿrݿRZgR9wm,vs+lchyRY?p`$t0?iExf$0{#o /y{*p{O%^˸H+(.09)c4z 숬JO~Z+0_)M"Bo.@u"E* `8z6c0zPIȧ(r֎#65fs*&Ԏ;:qϢGPBAV?x;e,Ao8iS`Z.OY'<pPn]eoZ^5ѐ@RAK3 q{@O\=+,6^w*[#_7%rũ!!eHiI,Y/9eh~kwV @,Y!_^gS!5phsp1Py \ԑD!DDF.V.@\p:mELi4]tZF? ?sf,)C#4?fjC :8Dfկ%brl޺QuBaJ]渢W3wY7Fˤcr"] 4׫a?$bT弝yL K(Z._Uyzؘ\o08$MQ tuRtc^#A O߬+KYjNK7r@B6.nx)-gkYvk2Y]z|;B\zMdٯ6m5A *qaۮq:JˮXux"C(/M-a$4< _3P_ݱֹF {.By M'/1H;vRj{C$yO6aRf ѯq_!ibw ʡ\4zɔ\.%JE;;t$MԼ̸?ڠPU, ص_/!!5c!l3gPOK>>;Wf=6G6΃EQU 9K^gY՚AesK"Kux<:ȥFygB"q`WUFvf\@ 6P//ƒ>BJ~t+j &ɥ Bzؙ#\d X9/:χoIPѫ@(F9v,ZKS/~h LpSYS '++>ړNW)@"ɞyrCσxl-bl(X7ݓO y K0bkO/$ }19|2C8Dp=cLŝ 8` @|"}e'ʏ O=oF_zjxNdIZoUkpz0|MU#r<9܈J@_J-yvC#FFD[n#iB>SbWK"( d'YTM/a]D:6ozCy|-~@Os/du&e6UPd3W?6LYۘG;oG*3buU'*mU;6MѨ.񏴳eX}䢔K&~f=0P|:WQiGX>ֿZ] bXMwn&NJpfUc0ݞZr[ #@(^D/}+@Y<:-ꘘ 0U tpV׊ )BwlҙM߂4 >'CMt@|W`cRBln4`Wb|#yia !$P<^Eit"S.&B&]t6iCPJPPU_=f4z7WDEwpDME FCN( 9~E(Dt?$ ӟ4L[Z7b~n{N^!@! X&JdԷP!Ь($iyϑpXs4BIВ|1 IÊNA9D!G3u^ 4 Bx7E-=j224[ʶj^Pߺ|LxM@YZbF(@oD&{Q!>LlV/w]'J0 {[6)imIk+BuA,E"99,؂~P81׉JVxmi#C7: c5ƔO.J3kAR4JTaYF~ ?,$a2h<+vI7øOoD)N?[㛜$/Wo7hhp >Ufzj9HMn"7ǫ|KY::v-].vs-*[n޵8 i<=Q YMTBZMa?q00Eh9|$up:+0P.Ѝh~_{(E#ct]rLnpy. ^fFY#LX\=kj|נDžFƎh_GϤc5PD"}'F XݚJ-c>Ir锛|dIde̴kwA{cGmsEs.ýO&Ⱦ%<2y&2)K.ʒvC2S3Y; 1|ȌXXX y.՞3_mϷWU h?<Qs%"JF6xMi'v>.ç`{EKx)/#.J;kZAaC[g 2:EP")>77Sp8AsxCkIO,qIĀt,$RߢTbiD O;d`@]+_D2szs)zCR)2OVe#_'dTSt42gdlԊ*۫5 ^qL CL`}Bon]'$ Pa^5V&whi辥xL4|d 05gmg^YFBS?J &e+tkS{JOHUe@#aQA݊Ա&흤f?PUe[u8bkȏYmv7CW//K!)$[\?:O02Q'D#XVM*C(WybyM:5fx wQo2H^݈5}A0cՍO{ ':[@cG[i FE2C |} ?` O$kg$FA:- k]d͍Ӂ9L eŠkJA°)]?@\k茼8D7% ̀۫dlBDQihd+QنFӕ)Qdid)V5Sk\0U9 9sQ4[} Gvb!;u}wRZ3ET.pu/M)Vj/ZF:lȥͶBkiۛ3H醔,٧k8(mYjj ('cjJ buPDRF;d =H3c5 S R47Q'#\A60z>i:SfogF϶AXDWDM;j: Ҫ&IČtGQYC̎x ~?Dh;~#2 6lT d71Ego >HI~>˃SQx][QpoUjv w<_d()빀{% MĚ[7 ü@;&@Hm)-TXdmi-窋T-!30SsxH BtAd}O/s.SKs:O)`^@W%_#h[Be5ȁ{a 9nFOw7v-'dkQte񃓶Q+?3YwI>lӠ ` Q})2GsJ~2 :MJ{(fˍy2!S=s>?w 2iޫ.Xcn[dE%/zd=KZM"7&PkcV zW G~J6sJ\őCA,2]Egd"GZje:Ĉ*}\V3_p2V~ Ԗ)fsM ! ,(% ,e o5q% sTrtf$u26 ;ĢA%C e0pdV  ,|J+HXnQԳY5@ amRpSJEm 4Hl_ 0 ޯgzm4IAl޽!FR-Lג XF&0? BSޟk J=@namĭRj/0:]?kRdTnFDޱCe\WEhR#k3ӬC=M4yYsV.& $R1ѡ3BBYSBG*k =V`2cBW&"dDLrLڐ|yfL"e_Ɔ /_2{hADV,zf}p{p}TXڍ, 09s*ƣj@47rmh5R[l;e(KF.rDJE.LMv >FêϿ9N菧Ql&/kl c){4h'* !-ޯ@c.^>SrͮWy]bL7amJZwKXG)3jUɨN\TpqX3{lCMf3:e:z|1}v/hI/B fX7YN幊zJvT=|]\CK"Xti|e]qA%VsBނ@0Y0pH̘jDͳkpSpgT73e|&Tiw Z}_@|9o3 *3k"ؗj6"J𪬜Hn#z-;:{Ih{͕Er!&@#OwQe-D.qyHKqŜFԶ$YzvkE!l$~_e$DyJqr{Kġ@l 7 R $Ԣ9&,ZLa͜fBL].1KfQK[ ]'a׮ 3?a8FGj%kusq Q_%9$xxEQgcQ= [`?TY9}X%½xA҆9ݥ<]aفɜ+E }|&UFKI?9 FS:)=Ӟ 6<̿H-`4 Ն\/k0F `?PD͉s | r/E a& $~I5;_뛹446Gy8~/d&Ҿ#ɜ&ږ9Cq)*;C\sxB˟*-@ћO +ܨ' Yٷz>V02$ߊzh(omqj.۷I:nb d!Q4Gċ[ImU0Byzy4s;j 2\)~Y ͯ"Cdf4CKVk"k'FxP$툗<ɽ<0jpz Z+J HZS,-#0J2ԝ=X6M0#KQ̵Ξ6ICfR>壿LjPq3 xpWaj\j2. KMa] $C7޽HSAp1sSc FoӳWĄUC˜B7;j e# v ,rB2n!'rƌw3~pl7-Fꕆpo4X.Dd65s^D(6K|^^-pd.ŰşZxB`[U+3dUB}h,sYǣЎ)NT#]Ճ^ufǂ 6l:a {%vXnL, Nۅ E3zbaw7B w"nm0.!IW1~fs#=!" {ſyՖfSezŤג9U#yg2+FNEIy{yIyVF᭘SeqD{Z8 Ld&sWZo/(f+=v5zl(›,HZ(ltNalX*?6E(9sob5`]Y0JJRC@@l#Y5p\,&?%gQ)MjKr2{鰀}|Nq/^:%nJy440'Z*,\NzWw7\'hT\E4ݽXlzDrgW-!@{{݇]#ޕ~C&"F&[)mfeٗ 䬠"qȚP/Y0)kׄO~tac&Ur1YN1J("+ 3ټN$\W^x cK>k@U~嚓sţa KHZ/n%ؗ _ -)MD6vveBxXI =9P;|n<F*1H衞[] >'ەW yP1jE,f}6J;erZ pk޸.l+̉_CAD9|!6_wXp B7"z& U  vV٩WL´|nu Mp _58 XH:h㲅 ĤKQD}Xj_ח!h6˓JW*LQ>0HeILH"ga&{:hv/? y eHhay{L*s  |+X +l$8`Isg‹?=XN;7 |nk3qj4a*Bʍ8tem[[8,: ]<](N JWn`ҹAګfm-x n䨅G'ȟYY'/T0,dQ!(3cft.]yjU徦wԨ KďI UߠTHa|h]z|uE4J`[UIl(@j5:ۅ8RH3O߃xe_ga45yiT13HBhyyJy.gպsZfnLM-U!$ugTF~GXKHxLx "P6'mSzc ,Z[][N<"Qňp]:PLV'8E@N-#:bE`4#@_}3kҦr^x*b*ͮ1 {i4?P%yIU#G:$PsEmgu:rTy=&ӱʕQk`0w. d֙CQu"b]>)wui(5#@7[ A^\#ZD?S?3㙗N[4JYg*g7/7VwF$i$-cz"0__ XMw9H V;́KZjQQJ r,Les9q*iTMC D {QXI˼%ʀ8L["PڣBג)ǏQ +᳖=PHt .?^W}zpOeQT@4ёrg@Mpۚ- N}ǚW) X quǬK=Ʃo:L k u4]UKg'*K(2sXe 1==i8n|lQ8ZQQc?Dw4 A{IM9\![%Yj M^ݻOKgJ1()0`<2#DXt~f!p( WKxr̃aՐ$p d* ">Ibe8xFpyljgh6@ }p"BvtDŽ6a(鎄CS Sdk}Bo>%JRDMpk g=ݑs0&{lsK..ISLOr|Jnnq[i_G04a+O? XIe"$c5-G |〹XNyŐzoy@qr#!G HghdKj$J )f6{4]͗_+{|_1ZF2ipةYq!ORwC+*yiP-NpDx>2D|kYP&-; n'rRkLd~$w/N5bbYcJUz?Q$ŗK|f !6?~$@.+crQ]vz׼͖:Jt(i:Y<'흔DCC8  /6eQTc&"0yItpNK8E {蹐1/ ׮r-@m?$D H7i=1_[F1jA >QWd0찚N>lCaܦڌh %&Eۑ>tPSyT2"Uz]%D,D19e\)?8ڠDX\xTk Pm]doIe$hrp&ΐ{pk}'j6MXe$.?hxN<|( O٧GXZq8?xgx5t3d[#vmqϵ,uT@wfM}5L@).un`p_x5"sIBN؏Ks8P4*:?^gbM[-!Wje 0cPo;.rZӳ?HY^bC1]Zr ,[[L?!R+؊2*2pv.MԣQy)\55eC,űmd9q6֮lu695K:UWfOsƌM&]pw6 ݳ#fahsBۢLn+7$ey%SF(2{M(בU\d@uM*̖okxܫNŃ"P|8ӚX CpַFWI;揈񩗍B8z p0rVVZ}^ JRD$@~n=z.M@^]N/"%Be)Q䆪slRgwg!hU=-W. Wd'F<|D6|tlBF_6Rc(A-FFzd1E0I8W (Gx& r B^5F OL{<{u6j%*u#`'h8J1ZJM ΃KmTפ* q t >zioİ9OzGB*iR #6+ڀ~DZ&.% tiw֜;e 2qŅ=?g* %^Lze|!"t.%eTCIśf2˲^^rHOXaEuhRgph6kM!h!7Ԥtʒ(I<1WEI r^c +0ҳ([<|A&tB H>`}~o/^yR "4`N"`ZQ*@,snbb}̝vj A!mC褋Kx֘V?gҐp2wyCcuMcFDk(h %9$ 4`a~K@cj',|oQϋi@b Jwltu* .z&f`SWsJ:8cVԳQH17^iza | +pBxLf9Ոtךx< NgU MzFm8LEOĶ 31: aW"xuLl|a6q*6dA%WrzֹI"8ď L? KtPOz edmT'T&ג{2`7_@ =OI@ V<iY%:+=Aq{ C l_띗WIAs }ʑ|e !XctFR.qJ3g}C8;B2=e3x*6C%:4T4(+2ٝ9іݜo[:`*U\uM#-'D&= SouLb8_c`#5z4:mC04J;//~]nƢiRw5ljЦ"V?`:826ƈ^F:e/U4+P 5,,d_-6@j#$TcqG梒 q5(Dž7b(6UЊڝi<ҚDlJ} 7zO,a;%Ciz$ pHjZ 0+.^ Q#ِTHfxc1au˖LQTJ![kh?#5;\s)%X# T/4u) GC8ЌgP:UzQI:7t&6 U1iн% r2 h)͒} }fn4 nU%nu,mϊ 8=aHc,3G|G-rKi)}d }0nψ3LK _$LR]cNm95jn{Fb XD@ D'5Z Ś nGs?/u.ޫWl F $!&sפT<_7?rhom)A]Ab)I&c7M3˟q8BѶMw1nTewěbqGS#{~SiI_NE^8HIڸSpǩSy䭫>Opeϸta׾5źљ^Nh,zP"ԗc8 w ]ܴzČF 88]jiWqp up~EӾxR2IeUtGtP!Jka lҦ\P7\ @W!ZV&3l˞whq`2m(Ϫ =υk EAMbinQ޽XmS l UZah;D~l߿@BF'HFcY::yQƻNyҚ8~Wi=| P=/Y;_yMԮe3P|dጸO`t͋_g*GHYt7O y75۟I`$Cc{*  :bJ䩨{)Nd?ᪿӟ!b+GB!4Oxyz"GnMԱ,UwH&ِS%= 3a;Hロ9QD9EН}>Nʗq| %&j4qQ` CͮQV [Vh?GƶƞIIlv,7X(2>E|jzEBmvkP\ C|[}g\/^+%7϶vq95i0j2fW="X綺,[9oc:D:-~Owp/ݹzVd`^ǪҾjǵ"[Ũw/MH' ?`2#mOY(MK'="kd}?>EsGHo5*f\ 됀B V}8gr{Fɿ6f}M3LØuA+~}>WgEEr8vu7To{ʩ+!Z9mԗP_zL]e+c~ƱgU} =92DRpCQC{k-fjqyy߫c!Dz I#ʺ` ƎF~1S-ϡkfpŪ+f?-ߴs2uHnjne8=>t!7T%' 11+>VIJ0'~{~Ͱ Wnc̦@N6*Ǖ֟2BMLEy[v$JۙO}x1T y |#M|:-v`zW/yd͆X(]w:- ]mQ*V 4zGвkɖ{]6ztB3hrP)\a4247{3sĆC£:[mwΚDJfٳ]}V/TV mo磁Qw p3eTWq rJP_5d@p3AkL]<ӧ?qx7@b[`q[V^5uSE`%# DEqyݴs߼M(dPhjBFcцXdK٫=? +~MN?:y_5řE,e A.JXo>#6ɏ)kчbWPK4qgt'ޑV/ fpRD)&FXz 5P vr3CKE)-tր 3*Gи+Ho̍/vU~? h #=Sk蔩\Ǿũ`)THhaVKL!ߖLQ^ s)MALw-*XPm-{nWz^Nt Ur>ܓuY]z_:G8>/%N 2RA_1-&H؍}*J򮻷ώ[b%R5~'zѧN,[uoTqQ.x~) 2EGs]4p^®lH/x.8 qHE޴i)b;FrZ(Yq|V[XdLFFf<ο`j iuKmdD.ʸ9`]eprjoR M+F'Q2W9gе 'HU !ց('w*@10n_&O)Snu6y':􉨕Pً0I{^e7"?#•MꍺY^B5R.m.yri;JDE! (\@B:àcy D;͋ϙKAԭco^_\"ߢsfd7[`PәR  BdD-;Oު"Rt M,*HFe4R}y+!5vk)q,ViSWQa1V}$m-> XT"nJVG?;CJmE:П&(Ht߽@^~IG8|5$+bdMEş\ RV)I=[kA4 6dLԫ#T\h5[hy MZ(] )'fCt2RkM.fW jziۿ3(׌j+:@Y3|V|Zn%eg֓kCÈ|սRgZv,‡=7" ʰ8w:C9%7] Zx2k ~䅡Ng.^|S0IKY`2 :MQD$"o$pێ s/1I{3LeUK/a;aQa!bXQE^Jqt ~Ç ^(4dr 3,7e/墵ɏ,@!{%cq^oO^6WF&B /bFõoV"5Gz(1}Zs7]eu'ºX ?'xÛԻ+fmk'2M~7W_1 f(wvǩ2W^7Cm7O?4_̝c"oQWqI[S{zhiXR)T\q{ѣf~4魼9T_޾5Ʉ YǬ^W0,-|V\SK5wx' T2ăotf0Hy]w}kzuc;0 َ6T &b*pUu,.x8M%M} qF8;mhQ?13Q}@ɚD>=2/@僜I38HH@Pߋ6.c MQB|& 1$ ՠaJn9mgpԴk<`6URɣ)ŇSUS[N?cw_luaZsxw)(Wڷ7?ңz3:WC)?fD2*Lo=^a4!pG돳`[`A#4yCIc+'#Nr*hPOMB{^n=-텰1=(2S-{غP|:n?գWDr mZ# DT40hҗ5 b B"ϧP )qaY/ry l4ݨcF,2-DqЊ*u4ʸ+Kt9&~D ތhfz҄ou/gmR I-!Y @ZC >Ts4O>y_,:RN9$_ob9~&,.6T/VNGu֝UN`$^j>57U͖}ګc9AD*oKxbLyenZ/? P[cbpmxrR̜' k%Q^eZ%@{-[^sNI:NmG-L0_k/okFO@i)gO#b|Gڤ}{E$tyb|+@#ؚO:O<q&X'v f%I5aD^;k14SE S_cJf.эwјø\.h0K=)8;Br 4OɷF`:gp-v3pGץs!~y5_e` .*&%aEt._lA7}َs7J¹T?M!f6~sDHZѥ΄z1sw9%`kKW>0$:P8YAFEۀ7vwn{jPGE~sp^c+eխ*pkeg/m1x fGٵf>KiΗlfVXFeZ~85^3x݋~P9Sƞ{&|J!/' [LKd<%0~` ;9 a#G!,B  | ;_<%b]LGNڲ0̞5i'  _b&׳( *W|gf,Qہ圮0K#o1 Jaa!e s7Q =)- ,R?x6]ׅ!E):">(D{jۖđaJ_Fo5ߩ^w b'gl̠|DK73X[lEvE??{GhKm9JK-n_;臾;+*t&PexCldEyf(M|/".:]`+׾ FO\ *ȅr%$Tb[o;~ V{Ԝk[\ KHT?5#G/G ^IE(9\xo$-ŴQ *wC Sn*_ VcV_Tz?@op{g؍tvU/F!#3>[S&wp֮էv'ߣHIJ!;wpar6SoxM?p Jg.[9F3Y x1zSyjbG 䮶c=S#eB"cѪ9EaS^ nl͹:[ N}Zѩ&٨ֿūl!fWTڄo.e36ݑ zZmnm&箁adk2W_%daO}X/s<'p<GeHl FSdo WrT 1 i9NM˜1eiz&(ڄVix*mq$^ڬn 5uoGV}-;(W$≧6!ǞԢO1 <ْn=^N]Ev7PaE`-  uu\Ѩ9]ؔlQƬ4i{#9vxhC6k]xɩeF5ov7I5^85**8=.lh|gSԎ⹸*^|#ic~eDbgْ ltlh@n}\0 r'|1R${'4`pFw 5 TN_+(Gm%ŤNG@'=m~w((F&JdVDeSDO{#w#މ-3 "*Jdx,Bm܊t}nP^g]X52EmEqW'r(t'}(~pLO?TCXr+<y% 8 "yIۉ,9S !5ֵм{^_BZ"pk(µjawQ8~`0Bqn'}U@S`pXYkP@0::5H%W]X=mA)rO`^l,赻$(sO* As$1ۅ}hALdl֢ٞikJkfoMg;3g㍖(~&䶎x0'{5n9D^\*v^NP݄6R 6q˼+ggrO)sХpw5VNmrM⅖#E+`XOrK}4\(Fv}9*Meu5PE lv1)Mׂi YJ,yo%Bn,Jۼ; I2цa'2iv (UD+/7[~mo*cgM4O$\vVY67yv#IB !Q2$Xs k95p_bA„'8:ȸSUœʁŽ95?xu_np4Pe|"ȥ^k#عLX΄1 9y2!IgC CsԲL=Y3ƐPkU{Plviijn 6(WpC4:cn t^Pfu4+;m N/, mvLY9>{݊qci CvJ g w]tK3z]\v)$+ L(hLݹuݜY9i:; yP%.]xO VBA 9~y1 wx3Aqe^p#H*~9>,9nZa*"L&dR_)ZbnW^P_IQ;rJ.ȍ^3!G\DW sT -2%3)~YՀKIE3)wYt@^I-t7|BH `]8wTܚcjz/߈U9ئBiE I߹ j#<߼jԎ;5z %Ov*u+U[\/Ŧ XCt @onsC3MU;/@;3ܦ#Qku/g?XQdm<=|WIgDvi_X'k.QINάqKC *򅦳pgRs#nrC ZiW$!Pf5fzz|p.uo.=rLkRX#">$H }E]E m-阁Jn0vr.Pj"49ⓠmc;A2##A5ߛOF67ЬVc,!H*7 0ɏՑ>ZLy%! M*_ .D8KĮGNJ`t6RmiLܪUq>DԾëCFj >Vl{>TK^`H . {gK^w<+˪/r-1 Ƒgތ^%Vrx+% zg@k`f˭d0rc޳r޸ 7 >k&{v\JF3 aE:ER8$IoG>6hAܠkxG@De$ϜG8%Uz/+"bІR@< 6N, eT֡iwao(u1 j2"ϲ[Oo-^otu7НxҼkoκuoĸ켃-0*dťMt&aU-A|'*o+]"aXy zV2Y QpH9C{M~/TnLێŬ)Z EECF%Pg%$^UJ[xj66tSf[fe`_UY;V{Jik` 묏\⻪izs>\% FRTΎ6ws\ӎq*;@]Ozue J5r/HRR9A0) |h_[1<т:9iSjyYh,hC^'} \ R "#R3{HfvpI䅾"z=X0,p 6m`򝽴gYuf]Ҫ djFpۿ0 =;I_䴥2{}cP$֚$]6!2R7=CRkvl6/Wfz]Uʻ^e$:dlh;Y\pF'- Q nkE!{jv H\!$>%I$t7zkFh+>&zp0mͰ/-@ϗ|AaN(H)'Vդ~2ZJHi2E3z0uǖIN+wz!!ǡlegk5Č&?~\62mc%Howo?Yá<_#26׼ (V, !BHDxxe0^/=% '.j{W8Y52Ai Ӊ2nG'|pi 3ZIE>=o@:T? @}hmo!g˅u(dGK ႑b9{h! 9{'E ǻoÃefSq?o\8Rb7h(D֔ vyӭ,MKv ZZZ UiLƛ/yշ?^uRGh #:Qo2l}끨y&cX)m8Vࣗ"6Z7tqPE)?qA|j%0ލ:[,3]+ f R`I!Zۊ[_ٛ67ptţ>s7a4o.IG;.^'6.`QxG<l-ѩ/1pD숽$S3g,t^ZQ{2Pqsdn*vtB֫G{)` ٿo}iiGp{hWSOFE]L|7КrXJ9G3~M."42# q9X']㶐));]Bx{Hǘi>_UrA;-߯W7*k&r]:]!{@)PpƍM[<<",! :57dfnyA}WʤǾ7PvBPzk7~kKWaPZh*Ba#_+NT-9[G_zuHӫebs`T5@UqLϓY& d LчeE<{^䣢0(8bqJ^('Kȉu~t/+A2kL4qzʎJ6j߽'N6D!hx# {܄o ^88*51參h\l>#q] ~Vo+ʡ&$ D޷*`PkdQ&p3K\i~*BR[0;yXXLZI_w= xU3A[yae1jf-v݂X/ >b#1BJ䘢 6L#P-ɟ`G뙼)6H]Fibݟ=fdpX!O&U͊`)'G2o Ҵm|ߜE!!t~,\dLyLdͯ)u@TZ x̌(`փ@NP5p^:M3#1tdIYs1n]]+(ghQwIN;XJMGb%ЗJ^ĚeMxvZȡCLa@&0 Ȉ 5PFfM^bH<:EUw-ЭםOcN3z?&vR0ֶ5/:v[3 < *.XmO:koeTN\"t>Sqn4\WFù2+d.'xW*گQ @+' Aɂ"q\a{,kQ84EX?CZsv>q璓ĕ8Ge:q]icVgVvckz߫9g gGHbhVY7TjOA.Wy/dN'@ av73wYI??|uN "Ç0qVe;@Z9&{$9iuz5,caB-;bfQ{qNX9&:*gE4!?eJtC`5xv-i;͈0cppBE.c&8l%1%d|1Bv86"$؆Ku;z5N92b Y,۶săs&k@Bk丱 KK#*3f3cٶX D"%>`,P 9{ht3iM$HZK>yYy4&b#m^jm ;oslHNJBPڡ]y ?**zsc)n%G~3ӕ*Y*7(|@A>T? zD{/;?H׭s1R+j 29 xsO=2[wX<oh9洜40&+̠:[ ,x*w0ϱEoNw3h̙Lߚ~O\)b9;2<ɕp{naIVagPpr|Pli*PAEJFr4E_ί#+#6xЕq.XKns+I2L碪tOBۂVI lǸ;:ӗoBL;uox@yAgT `ǰ UMÚA jSpFUU²5Uu8`fTXaa`9 ( Bђe+LmKKrj\! Q: 6߱wtH5EQօӍz>s  "M9}Dr$ͥ2(u.IVRϩ OE4XlJUs H-8z֛<>'`u:/C3; 0S<ݮ/(ر`f~m1hxf+xv%hN|g\sƈs*l3 >e-M]Q_D `swґ.}''- .ƈI 9U +qp@}i%۴t|0-e5iݢH̻9w.I#?KpP0]Xf#֘s{0ɓ}V(bUl$@}`;n|CX o (O t6WڶX^q-ZV xCTλ5@An7 W;l5dYf׈<+K;vКn@JlBm`IܬMA7<5.b6eK7NSLo@lm}M9;qs&'}Yq~Ka3R]GHDdFhq#Ui&9"]3}=[9SZ<<T8Ɋ_$ۥdqi*"=R":O;Y4 T``I\<-.cgOk""),TN޿9%6k*8W}K= > *8xyjP4E ~Z|iUh{|VvbkzڭdjipZ> #[4w{+@{ȽF=LY> y chI}/=5'{vgbǽ<)@> { @l!T@7-_xaCMp5AHI- y4ݍ,ږeyf.Uh7 -b}*A L˅Ċغhzm3w㤽z+O^7Gݖ!.MB7= YE=C`w:^oBFNzTsB8`f`~|sR8?!2"XZ [\49u3f~gaӬ FXnzSf5@-ݲEBjz`Y%Jofs/z`ʒO%:N,OD<"ŷY`Ri{I9,'H*xUόD$J_|h4 /o2ڰvޠkY7dGTjP ~U 9=$Y{̒{[qh`a վ*Go$^qZ_oL9m~0u-訶 h <\G`1QQ]qĖb-|/6V1(i;mNCg]XIMUM,$c5 )^+/S1pTlxdP I@2XvV^v ŽiQH}}BVQ&ٞqDi_ υ,qob7տyڂ<v4rFc>jm)JT+OW07"GD WgRO^BSQ%Ye^rgzp}:oWһ^S<"0In%*T`=WlEd+ <%TW $6׈=pЕjds.e}@'tGZQ\c͊IO8ܖZHkqñߚ@/ڪ4n$0l;=hO4W^2r~Q@&sb#mPs:7_֌6Ny* f(7%J9P"4"l4 en1 }8ݍ"Ցb5msE?*$t֢p<M)Z+g!!Ψd.@96yw]ФG08X9-M~2C$pIQDvkYG&[ SCLjcv**ث<4C/\1'.DixlkВ-țI.&}l?E|ЪI'֒P,݂ uO!8fZc#RiO~"5N>㿉޾ 58˽F_s/ \dD\WDOψ7J՜֟~E.%H_7<"v[Q ZrݍM8$u s^JP_ ʓ^f9¶;[;f &ў;˸uխs*ZVy쓖˅46_fl_7q"R֟6=Ϭ m1 otKdo FG߶Ξ`#E×!H'Hke|^4s+ћN QrVKo\Uȃ+EuJ00lwq %V^ VN5-'A; J1&YJGoPm s#(PՋ.#+ n֑!eZ6 I/"Y7ͽ|=bM̲T TSՂ)4A:ه9֏pN& dEY$cTf2"h[.ȋwb\ڜ~kA@&N`(EzuKA&p'y~xr}2Dć,| p*]FIܫ@A|hUuM fRLrÈq]~mEnz%Cڄ0ݖ@MT8Sd`C+ ({zUw|[oXTB)Ձl{\ɉ?gSl+4j)߾8y Xte*:!wDlmLAm65 fqtt"<Yv'i~#ik 0߃P_ !W Qd͝;q]ZDhrJةi* ل2AAE~Xf-Ɣ97@s-E䆵a"rIgL,Нq)<@j $nF@H{H'5ZבU C;O"PA6Dz6!nnr ~dcˢTȢAl'_Y{KTo3iR ̞ 25c c>PE :{R;»]Ade똔ԉN(d~N'̋+U{EID vxV||7<[tLPu=obZ㻮St;l^HmXZ *7U68GBAIƉ?WB&n qX.Ծך['4{i[..x`SPBϧdbc!,=snJ! [&B0cReh[F}Vj5'łzS5 CjV;j!r+KcPNٮ-Q^th *A$Q4}|P  &1,eJ2ZUҏ~u[2ir 3Ϫ6^~SH`UJ0nїkrbwMa`1&Πz8 "=~20R,+JkN?s8!_\oLS# o3UHxu@#gQu@DI0tPa[+lk2EdAQ/DhXb32ĚZ]gdij=P(6lA-#LTIjb?g;5g; vVEGIo 5m4;k+ѧwdц8[Nuol.MI T<kZ%gD%8#nC\iA”Ɇg15,+xw%x :8s~Rq 185:T!Vl(Hrc!2 #Gzld#GZ8 ޢCժ' bS>LZ8惱1MMA($(pG.nҤ^({۔LߐWkGi+ڟ&̣+lQᕉ@4x&a:Ԯ S&ml#'g!/ RԎx;w˰ 9y0h( {Bv虹q5,`_:p230w>nTE4Y7/O9nbOS7tv7cnI8SS#-$,/QՒ V׫0(A@V>idVWÝE]Kfft6Gk3BJpj(JSZp!QAEzt{2J5aۊi(@azOέgշxzvMC_+~g|3=;+ؾϦ0/Lד#5s1by'jzHS݊z؇c=b3dPMJ]z5pC/s9e&hKʎimb6bE*{"|{ 7 4 CK!7|FKcZw`˵nDW0T 5P[?UAusT+5eӌg.h-?GD'švUxX 2i Px&Cr-3 4>#G^ǎ!M]Ic!nk`u)i}.;!@.u2v θ,w[Q} lTz4*K| D0k]W6@vⅦt6( lY;t#'EhӢ,]͙ir"@Ny롣/<%*uױ 1KW- 㐊9]m͜?_ck@tiTkWZVJ؄d Cx},RU`-Rދ#cb0s;%w׍B53#hwUx@G`JQg3+:mU%~Kx:?&qD#m\Yo_>VDڙz)Q?g z3o h >uA<ՄY#mv!(f!RC$Ư}pSֶ=?3*a& HЏd[:6 ь5+MGcM<}(;A Fig hlB\)PʡjZ/9^ w~XnN.HrL:S`g+CZ{-mLAh,}F܎]s4IVȫKT&雓s֝Qu4OdAw7 )j;2SRW"YˤFpqmu}*/(4I_oA66DȮ0ctgQH2n; YeYE6%pXP 7ÂF/2oMjw湥&Ò$jU'lz6fE_#lrfz TzPf6Cx"֕ Nr< dF6:}]@"袢 3]G+ 䓇Q:C6}-7vٶ耘v'SQ0**?ubJ~0 Sr =\&\X!P=75 vD5b`熲7Зr8tK figrPWfu'U?ac- Lm6j `czs(䥑7˂4 kT7%LZFW_TB{D{'UbHdbbd, .z!}(ڥD(y*{9, }s<2nDx=Rvk 7 }Ff9l'N(=g=%/&h\oz0be>.Ev\u mn^BY&5`W N\YR|GXpO{\cܮM( ~r3Y^d5IL4OZV 'q fd_RMT-:Ώc><؀> {-_=!tv!B"/tmg'r*Vp fRB!VI3޹”D5d&e`Sg]4KH_krWGs{R*&s3'_F8eQKs,ZYzm)Q:(zpq*g'f‚r "ȆS$HVŽMkWqL/ 셀Cj1)R]Z)+6s#/i'.rX&$i`yuj .Eqe}r~zqTa)YEsmBy?\ y5"`C1\ g&Ӓ[^lcG;i.k)֥H^y@Y!KWP|m ?73ֺ OVpS[_{}@#$5JЦt!Q #j2?d7 ?$[Mqe =جiHo]nk-V yyEP'r6#eBp=[+[lifS8پ*.ȧ(v`^Ll1| ϓw K'ཇ{QXlu!KxF'Ts7`Җ_sR߻/hϋKBPF8 ̛~&ͪ "m<RibEU#.L ci2AJsQ O6cJu˅ 7SIRH)MqzZ}qu]X,]$VFT$HuU|ӵ*+ɋОtuZ3Ý"oϼGF\5Ƕ10TIItEAw=7EGF>KVcx-/FZo_/VEkÈLLYֳ7ju{CCu7BkB,e.3[Icjh-סVt=(Xe[T|,ؕ•t}\B0/} ɱj[/-X7:f#-ffdEpN} UP ֽmௌV!/]l07ԭxΝ$fǑ^$6=ύ̬1(n"H:0h͂Ԧb_DU~4_QsE"a}Ӑ2t^SZ;…~ 0~,6H'wAs-fWf>mZκ%ylS8u@cTRH󩲪(3Eqn:8 $)s%J;Ji%as4v2S1OŚ\I9OiΨ0[<Г2I=ꉅ!׉Jy+ h6pɦkJ3jO.NS-<^B᜻MR2QhsNDIԣ)EĊH&F Ga&R&Ш2B7p2D^d¸d4.4Pu:JVY4eWK-O0G )BhZ\vL{41`(ϭp8sBp4KC)IGgQ>LaoXPA>*[qf}=נW[8{\Vd2b6w:8~TY(L°#8=&:ӯ_bF#`U}׌ v8h~5:xu?C{I,7tr3ض#JuQꮹ '6Nk2bZª i|(a;C|x^PIyCfr7rY-?4 )ngq/zwuٓn"s~09*rBKa ij{yx^m@GkΨ*J]AGNs;ږFP~Pog3R]>}*h5븿/8K_QRH=)HpFb`f +]+@}v+\RI\OrHjGE0=׊Y-7FE-ĥGtb?fW+4Z@~(_=Ye:B hp&ōX >?p܄Xu|Lzbmݝ C\Bps,[_vY1"'ck8ϊ(r+- áE%=%v4!s'2T='N݂i>0TƍCqpl]MuZuq Wvs.uyͪF-™vkBpqG9>/,i:SBXIYvͭak:W!&xNȀRܖU]¤ g+E*ˌ300]ְ*wY {:CRd!{/T詞w̷pѤ2j ?Sf 28-In;B8ꋴ-B8qO@rUtBe )ó}#J[||5~OȤ_C27UL;tee6oAe*͜ڃhȫɥC24W}5d?:K' NJw6.q?sȻՈMsfhѮ?Fڂ1>=1ސp, /q5֗ZnW)EZd56Dbc Y:9B!K˺lq!>"X+cCqPo5+h Jf:Bͺq/BWa+!bCiL0,wQS;Ԑ3 \h [Y*:d(S2Eͅ =6K9;8$-FU}WRf~/ Pl[L1ʺ"ܢ;v tzo|DGf<SMmw әfpV (%9.BU&n;"i6 s"s/ -+G7oGg|7T6;I%D]^.FeРjUk_0>֪T5G5ڼeTp:I|ך:0^;[퓱.E[*"״Cc%vK֘zC}*w,DI|?+ ƢB+}g5yGp{-D9J#mn}}-lO.sSܔV}pPW^^K.}uT,Zז`6.q۶mi[Ab9U=Zxm%Tnv(\URO~9Moh&|՞|j)o=J$oT6=e8u8@p"Yާ݆lpbm^u5Ѫ9XY'&Hh @[k'l55Ch|0qk`\Hα"+/d^<g;deCЎ%}0/VY j6e?xHv{W9491'x3wM$svE9q$.4VDrO?#på/2{L5ԗdX?pO Vx\0~B]O^"系_;:01&nT+"S?TL{3P}+|Ӿ˦XL!TN^ooVcfD#C=x`8O؋M5oO6XeL1=IHER3F̾&'ԫ.iP0A^/l'uDŽ8Lߢ_-5M XHV0B@ o(SVCT}>f]Ξ`_GX@3S> Śҧg4ܰx<)]2ո6}[Wb7?3(.ﺋ/6Ӿۃ;J7pfӦPiJba4ki`zwHݛF}`Sf=+"3sddN 5X]< }k`BlGJ\_* *{FFVbcx#K&6_JCD"\''B r͈^Ѣ]Ѱ8'E_6mΑ;Qv_Ѐ\arf5'`84p.۶Qķ(?FOb !0xgN͜kJVN[1zz-n9J8I(kR?=66?ϧç.MԢ} X0ԽO$Kyij%re.%vIh*bX[˄@Yg@De L`+7}TPGO|:Ÿ3k@Y{\I9؇ ݆8DhBP/,>{B(sAcAOP,,;}̷d/lizX3(Ln}Fq`Yː_b׫וΟtY>K9 ŊO( Dcnyq v!}9)6ѠJR J?a*;sfYeYN1qܬ7G81> T(KC {pC>J*6%]lJ}<M$B{ u\Ku<۴媒zXʪ{q T26t8UBryb>e\]P<)H9twXwPȆLц9V>`nSa^f\6CBpjqQPEkOb fƁY@C(7nJ]7iUF}W~=&ofi0IV*C>!(.wt*Han4o+*mT$N|W?ֵ?Ta >FuM P8훭t(uMo }B-P[噙炍kLsY|TMOn#|щ̞5/|=m>nA>ri]g~+E94ڡR$fK͑95%=E@|n~;mFe2F`L ҕ/T]<=UA]RCWJ.'g).G'IU@ CX(2iR*ZJ<2ʭ駓329ޜOC^j(Dn`E|hX`,VAK| dW㪕yI/9LռIS᲏|Ԑb4w'#pq\]/q8O4X`[P(oȦ^NUtټ)I̕F'Q>] y U;43+W~IϛPQ <$>9jfʉ:l ˶")9o b7"SU ߺ~77Ȱ[ij|S"E LxQ޷ČKH{h`j[,Ȁ1`C3c<р!Z5,D Pc;+ 溂;4aG⋙B^6GB+0VM8WI#↳卍,RAgʲ,B%9;ތ 2ID9:-T"AȧOտ#K4uaE<|̰h Z,Ă!,v}75] D;b@+em)-Ă B͌Bښ DQ[nΧ܇J&= ct7jH*NlD.5z/4)H:?ϭRNRxŬxTr:!V^Xd?+Ւ`#jLқʹn*ESɢxNgo&iՌjWtD}/SԂt'GUEjlGhC nDA4%2~i7vMkᘉCPZ;ۯl|<s38,iEAD\ Rb_ˋW߀!ULGnhV%*M{g tU=JTOk= ,26@0N(bxȲqj$`u"*꯻#a](u%K7B !>N &̝ݢ:tN f _1^H%k\aVJrƢe!(:شWcyv7keLT}Eif'LҀ%RQvZeCh^'"Nl|UF8Tec?Wf- Ab?e:6Q{l;*pMchgHdqaC Y!Eȿ |NcDs{oN8& Z n,U.9zDWag@ 25a ^mj 92~5Uqq Td)Ž03Wל _b2`hwQŽFGbP崔XGtŽ+^eb=ݖ~\+l#Tlr,k /-6E-% #JH{mqʖ#4paD&jƲpi_>Zo:1p _dhE\)腕#hjJ(#1멲fJф<`maz'> JlۯdܼşcalX=[ ߚ>Om,D֍/b4d =0-Mא|4_f͌z>nlɕ#<,>,÷Le}) T'XS2j5=fbbZb3I|vۭ g,y\[њjxF/B PGK5gu`Uxv0M6"X"t7 +I; VF5MXp46pHDذUڧfm϶btXX "3K휃%-< T W1ipM)YuP\OtfymtAKD'!PwoBW1 %Xl a>Z9c5[)C%|v*_Ml3! %Ι٠eZ.%'0`_@6ro) o j]gnWci^k v`+5ucYg@^ei uf2!d3d)US*.})[*u,9۩i  0ܱr>hЫIYm2g(W9V,G}X9h#ʆf>_jRu]ZJ oGHт>n _'&3O^8F=L׳Sk[̎iwI.64':)qK8Z(ZMaFfn!OWyv?Nvnf+@PTb#l=3c :42tRh*yQ| @4iķEELВ;Sx"LX667IZ)f:k2KLXM9\̱# _OzwmO>q`]Ǭ9("CUvY;*Zyvl | y2适(V=x ln8N|JKg9 w:X]*W4n˽2w݆BZ4fS!كd7q٢sʿdk!~H2KwFڨ˜ P2+ E.Z05IԅрO7$Sq_nޅހ5 ?9XhL j8 ̀N\\=`e0Zt_qE6ЉAד'~NU۟5}y}hKMWIq~PP 9fՐ&]4/5ڎDȬVMڧ~2WF CxfmkWmټe0\6Yr=FܼX'O3ܛI> 5&˭~h}"$.}}KZy2E?VtM{0ht 3\X‚csUbpljnye J+<>zIEX7iWcw`Jhcr<&2 }rHw"(돲}O IpsWR: ZSRdnJ)16ϼ ,'mi@WfqBYd5/0ߝ]xc>>n$D y[V"ɋ$JmL[rulzY>q=@ BvVjZEHf652:{b9Cb.F5j`o>[[EThX%Ayuld2rvR;Kr4oR ˝4"CqMBî}BB=A82Ȭ`3>%ʕp~J4"")B(W _UV\lzdtO5\ZzkpǁMPen{$j{(JuE:al3`'Jb"yx@SA ?lD.wdgZ)  LLslWE\9QiM8;!4!ptm̙7 6fyL!(aoH!k;-[Ϥ\ Ն( \xO9P{]^* O6{t|"Pg'Î˂75Ӥ^c\/qjkrAE6<cf3|6 8 TrD" gx:a B|BOr!ev8?jԓC/48Tle.g\ ]⩜X@b\e&6t9nyX:|(QV^0A+,d,X{f _Pnglu*u 9e4f$Dʦ䂆M/ 8ƚi9 /ߞ>Z IsqT.]+x. ?wpu%5 .na&ЫŠR ry2dm;t#}j5}9o'd?@jcr%,MZ#=5g2gCgZJ@޳%=ʾ1uu<5|VGBڹŧd)]Yw3V`K%\ pV.}T觽5lve 'b_;ǴgF4ӱ1[TrQ v`/+@hXwSa6pT#\[a ЫF\LĺvӶ'k\tl8T;q5XxQh2Sتn0Ie*%u& "Wyy69CecR.|Z*odΥk&b65taT֗F,F3"D> J HPIq!22(nslA-+ɮw%v$]J|*'mM(*$z _zPZWpKHtν2~Wfۅ(þ9Xa^YV8Ljq&g"_@Ȧ)ajN :fA .!Dxlrkm  cJoc]m!4xkjrwbV>#22$DDOgF\e,d#ym@..uo(H݈DljIQt 0M5p/02c A֗36nX|Y,Z{(3]8H6/!š"`4U-U,T<6XJ1aɽ%Vt%~\P蟂o1|;fc,Fdm%*ɠV:BnUdh,ȫ'x狲eZs$Z\G%Jx&e w!pq)F|2ФmJcfK4W|ͮrU bOc,+V\ LoLRwCԫ#Uq(GB3cLIBMsz y墹ȶZ!QHVoR7 ʲJJY{E3kŃ^#[A@^sH[tD/Q6A-^pC=p k1Vtټ]zf=z}%h:]XgOzzT/07-˭&߿C=iB :\!{BnkY%8#*g iU>d0zX#h)M"d51~vg2rvy>iBkb{Ҽ3y&"qV.yϳ\CSWH*Bkt8W"|Hu:RWb)Ȉ/,E7ti!=Ir5&xeMdi|bjf( ̎O(8+h%22$Ej61LAk>4tBDHwa%Ԩ|Ix: m30`떣wq:O d{[1XCxq(j>K.JH5" (L a0lĸGjYZK&Q?:&S 1v6/ ](4og*SAT]ܩW:ݮlC7>V݄%2`I _ V -2Zޚzzb;j~{VkuyXvQ$\6:g;ߒ_,1>W7Ûa:.䤟C鿺tyMQdU;y4%au~/2Ɇk߻i3Q!3cPoIBt5fUqΠyd{(L# *Ns9]R!˒'yd ŕ}<`J˂p|:압_B3.eP>3ܬ\)lQ4'N/Ql[4EJEۧ4!]9CV"A.։|B_+Xp[\3B"_bn,e 8J'A_w1c`M (J3uvZ&@ ԪcrэkbpBBgUUwP( S9Kxb(k!TUWFY &LL!,"Z qF4DG$L9e²8 1 bgϼKe w b 0:.DCZ[3OR_1‰VC76@SEMqx?1{d;77f쉚p,_|oY'bSf/𴷭. `yxT%AzPVQENRβY=%znv׊=\ pX̤Jhsb&n"ѐgI8NM"08-Jcþ%VD7Uj:Z PDd^!6UvB7x_g!B -^8j*q`zns},stBܔO7`V 4lĆ;:}f(S9.o1nT3'a2pGyզ^K/=X@jʠ&c{e=V-U_;qHÑxٯ30v%M [! 1#4ʈ=MKr0Z|=s٤z&dC+bK!;z麻SpIڡ ~z_Nm!†<i/@LFYJ M*= ov28ì g}cDvOD$:4/a%?%Fg.?Ui8]*QzŪE}\ Yj9@vm͜BaU1Rt8tiS^OboߊtQuB!I]Hҥ8v %xM4v&.L j^W>){vTqd+mfB{Y1Kg?66!UmTY?1q꥚ B#PJ?ҡvu1rx=5k3濓 O~f+^6pV@Y5@0H[I`v_!]캱M:CQq|T|e^nI%Z _#WnUqSgq0hmt 6~7, I p2 {Ti /&t*Q.4lY}U,R ӸCzCQznIM_U\EVkN¤4/1e,=K*_&%ƀٗ!*$QFO}~TQa*A .[g(4j: (ߤ1Zc| w  pNEmDnov0$k;}(΄w}gTCbw>Qn'R!"KyEڈ;[iسJL8 joiSoLbzE :J"iIr >zgIm+weSVLٺ&+|6"]ijSt^n+huazoRY^F UFƤtH\\% Dh%xaiKlQV 1toËvY$]2d)|>DwQlߊ/i)p]|KLrU |qv$U"lK}}[~ժVx ɱ_im{s)%vh'WjI|+2e䀋냽R={ͿWj{'3\giZpAЛf"da3_i4Z#򷻜':FR2F̏J#3B̥ؖ> 0M08aفsiq D+d,λ]R!kqt䴝ۭ_rϼ, 14i,&v6Q:(oG>>ak#Vs;v_{T>-( Cv.L~]0jj!:й;\pF8T(hAz2n]sB ԤnsIXt}͛iTE\C7ʼn{6H4EB Vm]&0piQ\Vȱx RD㉈V \A Ng]HUtXĖjZ _|Jhם X&_ɰhၻa ^k^\֑H 7)tBdxd#zݺ{ib2?|19ĭXyB6@7E#]laEGl1]X)AglA, k|_xӗ1yV܌@N5aQxCI{\>G⣙r>觾.9pNA_MX*/~Ǝ4a]D"{WkNCӐ22@'D:KIсҩͭD3S>Q{TDN)4C0"RBt ϝB5F$(`:TdγL9Gf#iԜG7Ω4(VȚN*YciX 6*Xl^>aGxCU 0/nj,Mh k߿4)&cnK|pz'ut7BlLUG85xLc]-Wik&$CWOK ZcjcpҾ}řUlw2.X4Jə|O` cɋ]aNP6\15h̝oA/euq=#~PZOϫӆ{ÈZAČFO- }pQy$EB)U_ݜeC(N"s־o8xØ ˉ[^5_bB-%- ~ݞSd_\ܼhRV~cR5(xN0r[6I=g`)…-"75j)[I7A͠O㘟a)沱Y0T2v#! =y(ia~R:'pqV|=;E[!^%Fг fȾ`b(\z0{o,yll) C/)IA},cVq'1^ycdַ`4dn^)ԗ0͑%^#,k:<9:k `WY`ܘ[ݼMSA2encSճ/'ej, r iȆruеb*ԣre͗E"Sl Q֋E.xq!ZͯI6"D{ ( 5oF*&OmPHe-ARcui`,Gqžv;,I ARl}fjĶn'%QfUr9"jHRTޞeW$=MMstcq)-9MBE91?}ɦj3=zYȞDjSOqÓK0DA$zOtN-"\ ʅsۂ|F2 gBwwھ%S3"6?jgm=v55[]Cx a7nG^$貵Hk_`4A2f 0bK,y@$ nqg$G݄*$CoEbKi>ݹqvPi~D]N**/[q eh3ƷI ve՜h¤c-zvoN،$Giuј˄>FwRU#sA&&Pa<85-xdoOcNvs݅s>-AwxՑ"ͦ16:ꄪq_EXr+̹E \ow-Xkop $ץ ̍p#=B\J;fZzG xi~"K%snLxRi3]K1lP)"4XzVUR>l[# ]~ᨾ.[JtlVц7́:ɦ^faK&ӬQeD5egMһIV1Z|D84']Bdcdν̾L*VzsQj}3P4-m-gu#o4z_JJAwΆHցUuU*;? i^#2c}̿´ym8l1rS4O%IfiWbgMi~| rWx0)sqƖjFz[5z>gr3QmӁm򕿯AI!FzVtt*Q1kmJBOn@q:ͨSGV^tS_׷a3Zn^T faˁw K!hHKȬm,x3ŴS@n1>EN勀D'Wx"c:iV4f(WB`p|/Bm?#.c[n`ՃR\ZH54W|ЈygdD#8*#Ï[U&FYe}sH-ݡ*`G[sӳEu P8Ti8hL_ Tuha6&[ :פ@!f/M .</ bd5AFrU`Eצ!u2[`fkzIuKc^E1 Oe30yT;?_ ﶌ7/.V[rof;^MN6vg7`T>a BLUAz5QiT6U} 5oW/>wD:SKA #6*HsTNqVڱ{Ċ3XYuӦ3a68p4R@u9RP*)3φˈ,cϫ@֍}?VYNv~Lzh0rZ㼀)"!tUQ1:VjADuu@g3GJŽ3ٽ/[)b =2aˏ)ӸJGRg>:;|VmsͰ:XQT';0;8kiMKXƉqJ>liii5b!4 V %}H`_l&r6W7u9ʣ+X5_ڽ^YI3B4kU2JL:4с M,L?AΥ##92=1BWlmtSSc,ˤ$>t+ҠMpa|PլZ :.a}Sv|+62+mQ(ĸWO{orcihf˼ v*t8ߊ$]ﱞYIT@ a@rf_#dsdV+fJ+el5Sr 7 )qdcqTjr贰^Wݓ;5:nΠ~6:Ql^ջ\"hI=8G8O 0÷miZhѥeߴ'vBq@ӛݱ/ktKTWf6okܐ$q3z1*2.)= ;GhK9@^Q:(f[b,76M9߲Q*OttV}Vނ|IE%Pz>7 uӵjl!#ogޥl` lkPv*Ft9y&#\IJ-s$S涰Uv!} 0;TV;ŗ. ؛~]q[uOH$Y\a3WrK؟U"Mjإu]9笿Q>,9_mMt(n|1m>USg=X\W5(UGgp*HVAE(weR,Z<8v^S<@Yҩ (^B,z/eet8VUjvA5@eϢ06MI3YrѧS?k#or^U:_Vi's 0‡o PӚπ`12x=s&8Tt`ru_` & ×(ڍB[|-)q⏳:J;DJ|ZU=2|T(8Tk z'%_Ztv. ; sQp>y##D:z) - oh/nx4;X.g4~РC6FTj dx!L׫|--YOShA[S"wV.)*QgI(JqÄr.0]̙uIƦt%zf4< FMn! |0|YOwHtLTB.  :,R3qWi$ȥ͑U9NLVW3u¹#6{}ES8#sL`@4ݰoQ9J+iEOz]Ưdq_I^Ny`NJmv0[LEYM#-hIIϼ#NPpzSCY/ ./)d1Wek*%RT~ {\gM 2@FkCd;5{i/` Zbrcs6& u!a13? .Td&A>zw!DYrӍ0Z# 7Hc~BL&@̖MRЛ6H+r!C2H3&Og/q8s.TSM LcL_Xod\u$U{lHˇA0_9F\aTN̓!oXѓݤXg%*m0Gy-21][N`<^4_S*(YjMU<#gJ7F uj R&ɼF 0s* b-gcGqR +܆Ѣ\oc6줚t ) Z+VۤnC:I$ xQ-P-v~s4;ts}m`'CN )o4>S<Me5,+w ? +M&[vW/#o9:VQF/yAH!aCpaͽT"JK LCbSaLsZ|)9r>|I W/l gɑ~71Gy<:YJ3fa<BCQ؍gxk;=j|犈+Eˊ:{ D !h6 Y%#cjpmcalQyҲ,CIL3z耓$m"iMSZM]7?`j|lmRa0Eʵ5nI?cdQ6s(Rj:F{l&H!y̲\: h-Dn;ijpPcz0l2WSV93G'Fڞ<+(d*- ܶ+chtdq p%c s>F_^@N]JQY )Cp Y((Hߞqb Em O-^}$rGY_fN$ a%lmON!.VDsYQ浼!UK!AkIm.{ B*도_j*N.]M6W(xrzs9l/ZY%UT(KUw*|nϤK^E$j7T)o[& 3E4Q+*JpJFJxxNml:U ʫ<bCZ VJpfl<lkK!ʟ_I z & Mmͮr%7'Ü-I;yy` u[e!e]I)kZ9R);m3wXhKk2Re&SzZwCF8caTf A'J]q9=;O/Dѐ DzwAƞ-5a1[>M{F{L{4lݶqNma9k=Bd 1K55y+BnλVQhvKf-FS3ni3}CH}aH 74㖠%q}>CY,/7hHA40dqJS'ƻu\A.aq"i/ie]^G*Z:KJ! qS7حv\+D+эlu +hyC sEY:O@yM =(RƵɷ'_ ' (oZZ1vPr&89Pȡ z2yuniq$RjNJm>j kxb!M :0.zP݊aUߏݹ$ybG10]0N68儨?sNj>~^,Ϳ{툹4CDTgU_G'-`4UKV~_ɽ 2e~n0BOqY0}&8mM|d!B4zoUxHtH<0ݥѢ}=ERF fL?h"n ΛUG&2!ATPA|?3B6NT:Uې HRi)|M&\0bv'Yj뎼c^ N&oc3 y8+3 tz(2s9:R9z{/c^2Q̪mnz*f]t;Htj6OܲLӄlAj(lм].^O߬M$ELIAhi;ѡR4fp9!?al=?ULFV.M߽s^6elCcU|)^V|kv:!\KM+D lxssNW; yUUO=ݿ'/ԐQQ,m5YRMOD@w>8">'+|:Ai޾Tc%cA] L҃͏ט n6ʁ&XbzIT⎜ԍ,hP6ސ)H˟0_:]X4MhP זWo;G@,93P*ڀ8|~B蘽Q0,<)fT+(Z -KVCsqP3;^ydy8`cy__} D;ȗZArөlO4xPD╝5A]X[=8>xy:^vFuМ"بɤVH]QyNZHH !Z[xzm'< et+ O2$h<]Pj^5&w/hQ/ oB/BFjT.)Fˆx!JrR)5pKI)w>274y׼XDPF/WY1;iΦFHRxYڮA'c8Tw=0ažKZ \O͜s^d  ':+-1MHB@څdxȒ.idaY`рxTS֏H{uվm'{FE%QhXYGL~YN=2 H!y^'6 &~vTC{q1iRʍĠ(R;Ÿ zvPhW \h+gK-읕$ܱSon/$ijd\S]bAjO+*aƓB ԗCފo(`Eh=„ӿ )]kM~Eckn)+p&hqq+|>Gw;(5T'Éw-S`QQՖ +$Lib |i;:J@UIK0e-:^7CF? ltdW ykU,/H`j:l֬ڍڟ.Vo2Wr9>IυBQn$9-R2  n/[4o(5wn×-3^+`eo@O>2sKrA͞&#v}4\YSFv{bةLŖ_ I|xZ@`| Ny 4D lZ*-v䆍{U-9朋LZB9HJ f _ELU%̵l z5[z[46XppsųV:r61_en6xXo1_mXysX/tnE;iЮچaVA<+HRt*N-F?.ܵPBh䃆݌ 5$˷с?OGzHd.oZ ŶĆD`J]96(tsP (8B:y|i<փTt,1qbtg,B 7 9nR&S9%]qbxɭ` Пөu8Z /C2UE m҃1RwI?>#׮4l՘[.k`8w@)Iw&Y&%8:yҊ}_Ʒ}<ٔNo<;G'Z<&߫(?'"r|aXI;V: ݏ:`ӊwW`XAKP"[Y-s\.0[g~bBs-GXb=UO>9 $1T̠/rq[VkcGk!/a=:Gɜ(c? 3&CEi4n )‰x)zrDafo:ٲ{;%<Zoե~~ݶMJCP8 :@ƚ]_%},uB4V vxV ?,^SDO)g:fWy5z?7 {%Jj/W [KVCTsUgBYNQ˕s[@JpF^jBdy=\oF8*g$m &!̱ n \hШjN" 6Ri{K%F Eb+w=51vv ZCJ=9Yn$ydYSXrGisBˡI/`JlPٗJt*ci3B d!+$T-xsyuQL~U$oG\ACjRrN0Zt!VWGc>H2C7?Ϛ#ܶE6'Ar5M䩆 AY&ƯBnD]ZYK|XwxsʀzAC1\NU% ԋ-4~0$Kv6Atb 9Ar%軍v,j8W|gHCNlQ',fzd,rZ)ШbAQ ?Jc&RF_~Sk3囫lZkCκFK ,,IG/|wJ'vA@Fm<zK HRrИ/7"#? S& C(Yas>%_IMеj=۵bfvO ٰa~!@ㆦ0K %A`<'~DWkUݒ@~hen׋g2n<hr)J);k)|*&R Tmk)x1b8 vC9HH}Iq/5yqR8( pk zuoz{GW x8r;!u8aXxpM& }"q-ozi55 (ry#;MKgĐfLF~F ץCcGBtUtF6j+$lzhxB ( +Pށ}T=FSwx$m9 26aENw`f݌Ȇhcck+VǺcI%vW22m<w<;"UUY`5נ. #,US r  ێa4bW|7U);G)*!^;LdP&@̌>!I!$6U6 '~Vod3E7<6i܀q;v7*Aꫝk?` W7}?:7 F3LgqR[^j`bU-bhG]&gi&k#rM 1kڗ){ůG2\hGj|9ϚȬ&r/s({H R'M2 ہW8ù2v|O{)Q(v=r)7cI[ )XT7uBxi&RʇLg9½mhtFw^I{-ȲZ\ \}2R=/bpd,׏Cm;4z {* WKkQ9jymeK .~x=[2R>ț6gfz8mll6j+`Fs\N7Io:Sɤ =(Nۨs]}&@wSJWq~3 ='IGr?`ˍ՞(.[hRR+bߞk#;@ -VϞ-qa44ģ|(?Jblcc<.y/nQ1Fd?Mg'80V|ЗUܭoLLt Emy>`H0rTC41fPҒQnFe`U ~_bhڳ~;/38ߋd34H]d0G] L3}[|x:WȝS4{+;MZxj^}jMk631 IMe3ׄȴ%@J;L2PcnJ2'XBpPK5YG3尻[[Kneb}I7jF2`?=qesHj;yp57>xdÿɬnOZlTDl%WyʔUVxv>Co2Rߒ^01S8SnԼ7x1l&xz/.W 7;wZk+kb99WƉ9QڜFwv?>ge&_F ch#R\_l4UOri:Kc%pt25IٻޕW7I~$A{r3\M)o[%]z#(=z۝5#sy`b?Tzb+㴴udeթN1X[ʚP%CJ{B!Nd{xixDk0#>ޕF"Pm39DӲA~$G Onp1~kEEZi@?Lؗ$%O a@)g8sWG%$'?Y($[t/cL>WF6%lNsX3 MBe2 yVwfI i U%lUqɎ?exY}-w|6(Cn`zQix6ͰDRPhn3iu0>Ҡ!`l@*$OkkYC8|!lE 4 .#O}#} ->& T5f&h HwI[^XX F`WS?eHK;I䲠x\sөd)pnV N?[L9>1OEf3WG+p~qHS+}H^yұ^€CBwF2{DHh!61S\?u.PX6*u:o,V'NJ*X08)~BK'(ąKu֨<@P1o^;?S3ʜ p,I#=R4үʂ(HUTg xOV¶~.7[VLATMߛpy)~IgmaN7=^pwˏ…Np@ dA~kRc-,bT |[ .Mwkwhq:2;y;Ӭ/p`6=`WAܽ6?F_̦3~fU܈AX@.щaZ#L'K2a ṛ_H&%͒#—ڳs yĬK7OA oCV0{LPv6.y2 Efe! T݅KDߖ~I3L<ܩwd#˱x l% |1LHķWs*w#9Mxf /.k"3 U[ o t)uOAӏwE RJ'V0 u+SVuzۛd! "iiWvBʃ]jz]z8NX2~*:6C= [,׭R!yR cc5KE|o5 7s$Ɛ%{a'ޘ ]0צ:'E;K4K-*hGM{xUw<3Օu+ij3(ӞW0s ;:HwTgTQ- Vx/~pn6?*VXq,H5p-S甂[ cj%TȠU%o9sUJ^oK?ۧZsv>)!䀦ˈ}ك9d_3wԫ@asINb2u[+n،wd-vF>~+I޻#}:l4B@; TQiՈ?MDRTGr+lcTz6A|VjaaƯnPZ[>J&׻op%FT(EMfD2|լXZ) rL `BUKvH*hQguz}| ? pht隇 LEe)?ZVJ'CZ?)%g\k0bba_ք\5F 1`ZFF 뷵rLm>eWt)&T<YA~5yvJ@GRnx .g2V-W>b!%炻Fѻ9 i+S((P2~s XM߃1+ca]92u|S77 b맠|x/L*QIN4HCuHI:]zcR }*ia4d\ E!{0Nӷe,FCL/Nyx.2N#S{p!h4.PTܾ>ײ?YRay8B1DC9e{gicx^Ϸ|}sh%+o q|<՛G _R9m @-n6b0$6`Q$s7lro٨$D+mS7>f@> sJLM=H羴=aQ<\*6Rc&\;GDƋ23r ʑׅ`ݢ Z^Hboy:c̞rD "~XHbESA>%}GTaěծ)mӃ%=BKqey;I@5SLMa(G[4h0O%`]k6Cv S;l"lF, *"_l?T '?}NH胑 r}꘯.egc "Dzno}vp'"=R|Ovm\+4­ȣHS vׯ XIdl\\77)8k N㏱VWbCFP@Bĸ.fmNC * `ywn/f1SGfڂ#!io#6+^skoղyF_CLپ*#z&O N\!:x2HM~%ۢNc='bԚ|TU=D$3Y+[Gj>@z.m XPpH _}8Cdi^XQ /@60.O-SsIqӮ!0)0L T wU`1VFc-*VzF1n^CQ+v^;-|}Щ0i[)ZTo,69)~ A[5l_E6tU:p^h%&`:MQ4v|qCvz,Iǘb56YV5*Ԩn W >&ЭxJ*mn)#i+Dk`?`;CCr_(Σ"/:u4N0ba#ᖖذ8?8jG̬t*rژ ׬4WqTݥ+QOm;D4%j#u2u%i$Ӎe?USTM%M%eb:DT)uyM2D*Q hw};A/Yw`Z8!@a>36F~]q[vT*Cg?ݨh84m5GO ƺM{ez`!-m;XtoC/Ųq42}?O 5G|HI /.>}# skTR]4PBZsAf^+_u˩$sțq/Uc(G y FPO[H,}"-Khg9l\m.RF0P,7+y 5]o=gU/(9^ZQvy]{.Z*vK!"ϊm[Z0ꊶQ׉ýQhm i=qz|jSrDȱ%qp/;# DB< ΀ÿ< ]Mֳ2,]YYZ Ym70.&z"Hѱ6?%xf>At۫@A`E=H_ZbB 6M 䏈.(d#fӧ/j{@Jh6:Cf6)q'(afSC37 `4@$50 ;,juPr T(IVFp"a%BϘLό>Iz`Ƥ~j9 (ao7XъYƠxC";ֈ+qW5*j [eP#T P㶋i:6aMNS $B@\ c<"Π.Sߏ 4̿43Ia9O4"=ڧ P{.FU W^70Uq"kO=交.2l\ pR]> cI8KC\7%lm# N<@a8X[G|Uv}BOw@@z-g}̳+IvF}P /" 4@q+%"fb"0!ƼIp'ųӬ`XnQŹ 7 c(;0h&DЄcfeԜ5t { )o圕JAW҈oMH丘 r1QcĢF{o'cs ;>R[لo œ=Tc `ǿ\#jD(A6ĐvH, ,h:٧S*T1?~M?Oi:";FD-3Ihݵ2F9/. 84{t$?M{Gm1#tU!];%" MOAuʺG_^‹U0\=\zlIӐWL\rELrV֫g]s[W];vw4| .΀4j Lwǯ9nA1-_[&#kue\|)cwei ]r/spMK"EŠYI6z`-QשUm8|߷9 pH~Y=9hEВfY;lw@/WH=.;(5 lJ:=9ϖC6XL)>W=>ʽ: Y,˔ .W=bVaW ic!tW=V ׉ΖVIEk,gV0RͥC& G+XP;|+wW7!ؖvمշ6{+V[L|׉k_kŅѨٕ'1T5\KM/c}?nʢetXQ>=JaU!dxm_YԀTS Vxݺ]ξ,+ackD.6,c᠄o1N˭RӵUmE" 5.L 3/utVϋK)k=Ox蔤Z* ی8sȔm?u(5V =!G$\ѥvq/6GQ\S8BKbʊ~@fOj^^iQw6iaP~i04uc1wΞ6xc"_eimȀ]8MaբTN9P?{7v*i)ŧL}V`CDnMV&9 >n BHeG9Hg/gݹ= <&Zm.QZTa] 5/M/Ļ.BM{\ p5.;2VE+ \akcM asS(LG Au \@&3!}֫7yн|7&G ߺ>JL"A?"Ǭle8C)D_F 5 0l*&;,1 ?_@n(>jLԨ\O%I w&iYMitZsL'~6N ~>>\⍼5qh3+lYu0me7qV39Hvܧ"edyC3CM&!|R[gIh}ag=R6i>DR-Fl^șXs$BR"D&tscΥ0& @/~Qϵf 'hn?Qn>*Dfu1F{LFbc>i<7'_W46Kh9ǝB"<Nmak0.5PsMaNZ׫~)E#TNޠ8E/O{pJ=+\W܋c%A>3*Ū4,z޵Mj5^1\:3MuؕGTSEB\d07>~"E/1"J"x Tn`]+<9tg5g3 fſoD:(.x]z~>|_~PoE2NY&x'w׶,}3}ǡV.˵IwDB1YŠ#]x w]LOnmce>&LJg+/ x\,j<뱆Flա ~q':ɛVPViW?鸈?Jemܧw9߻

3O*1x+B+1j{ro^Քw2&+mҋxN^,'Ԇ} V"\+򷳬3rCIr0ks%:|M^JNTКmV~d:wthFnWqIAw^aJܑsoHMdnإGVhĞKr]V1FD+槫46``Sv+tNJ񙻝GU0[|MAXcd吹9)j^8pyɵ̯G3PUAKsYӇGVRv2a&4&Iz/g3c2~O2llhA`q 1|$K/wcnZ_Dj6L_(PԷ8=EL^XM< <>FƸ+3 nDj [Ñl+nzrϳbr)7ԯi=ea4 C7-I0'X VuPwPtKw qiK%Ҙ6+¡0Hbtۺndj[AlQ^C9,&+Ut)/ T$1n$% b6|ɲOn1 i*Hj{JAi%2D5ށ-cYr[ ;وK4$X2l$eͱL axd)y\/y$=-(A8j(]^,uYgm/SLz&5['6btf+D;R%xuQ2z8m1<̚7,TI9&摆˜ aBF&l2|_dבL1*{ʔ`FH- )v^,S ^[PMbmHz YnB~K{yK`˲9.CCt" Ss~ݪzژP<:|@dn*r+R(Ffk`}vb7{&D0!)qs E͙p4]'y&45!Ugv9 /LO#G$1L zlF9 A{AV׷&qW;2tvL^^vŵfSDPhFx y\ A4Za]40G.(kl,*#\L9 ,0i6?mE\($kVgf3Eo36$aJTȵM"KhS,H<1btHBطG̷!בeH2kƒ<;q?]2;fm=+ xdļ/T"hWps4r&KoL'&? _֙{w{8j?0aɗK&7jYZR /Pi7JkjAk )n@fCILH+.죊oD8tg1S"j< ]!TReh6ٗ <ՠ #[$շtyg[,=a !#Ef(Kn\?-b!5xU^mwApDl;BAw t,uReMKdZwL$P{%L\= 0i%``J.<ܶA`"~%"OZ h  UsUGC&u/dx.c~x탽R>RkMdUMd8D3H'R 8^BkDie_={7I̞{zmQ5 69ߚ9>٠n}P"w,^u΅;?83J*]2`yM;:j,~dɪ]c*prA<Y&> 8N8x]7y"2zN {HG+єm$w_%#@~KBjiY7C%cŷBu0=:8-JK F,8/>Ak:mg2(ؓWY܉c{cx?[^O) ُ@4j=\H9 C>?깐&~Kc;v$zQ.C+$'y6 ޺.ׯg6R>H$»RsS)MMZ:;6-"x9䑑T E+qe{`4Xyf,Pt"x`o(S"TdPQjSbxLdJ nqS"` -3 #ݦ~AG˔ҙnl+GefB=ʎm>#s 7:×jpLsڷgOF?;`~'kā\LtVntQV/&zJȀ4M]AƤP 6@t$ׇ~XCoJѬ?Do˦G>yMQ\eî M{J"uNB:WĩQ9[0`csJyl bjN؞ڲ^? r9lM_&ܡۢ?/LZ2*} 淺9FQ8=Z MH8dv֓S*?x,'/>m"LlAual ZkfJ:.t&4g2eqܷP& " ̒P)͒9)vf&nvX>3BlS16ij3iQi^Öj9U>nWo^L]`*ҎegŤIj`L>v&0hL L/ٻ[l1A]C~NzS6Z;# Cv\i< s?Xh-K݈ql.a}Fw-4/5KX֊a 歨aӳK1m&ZG~/eXe)@Srv<͍e ĪF6+|Isْ`2ɩ.I#B&c#n}'҈5EَG c`dcKVp#}%,ʬr#3p[ci#bJ~;U_(p"4%oO $Lr?rI\8_LlpbcXh"ǖ^ nMPeà 0s ;WJYjY}~t" 3@KBrP׃vtk7erG_3i!ha9!Mr::*7#z/xA]/B߱u+tƁ]wHZFyB6EdBNLVVͯN(}MH. 4}0k bMgbn3CR1 )hoq,5{P!aP̹+M1g7~fk@(1 Iv""r^jc$d鰱d?r$tO݌|z! ܏riR!2?>4rA bGlLJz+=G󏽇vkן\6Y,GU.Kbdce8r~4CtZ5@{ *$%3J@u4p]]wO\3bfN'~͍R3N0)w(Uaa"G{,|1}yc'^=G'עT5DU*森z;۫%(Rk$FH|WLjg| { a~3D+8jǗ=rr31"UnkUl*Cx!9 ޥS'ZՇp#!X$.F8 ஆ( ؝ Mfw}`2XCm[_iAb7w| "i'En]b߸oa*lOE>8W$u!Q7ϣQ!NsBi{dMrƣ-tr\>\ uՙ8k?^Eta M:~{~?v&Q!0 ݳd^!ш+W+xܭaGx{+u%YܵV:+gox.N,^F<Ι'r]\ xƋS#BHQBaCxA0 %17g5PJv?,'/*ڳTbE'`}),qJM[]7ra%$U[! ug G>=~S2!*bw1^FDjͿ 0(Eʿ0W?\tRŒ7WZx{eT'} ~) 2Q!JqI \쬮w?\`8".Z{NᩆωG"s K֒)^١r_V [\_¼#oNHY8ePH˛h(o!N 2<ٍKSu.ڠW>sh<>PhWDIDeO*y Ptg:sU JVR~ ]C!GÈn]@c U}WYYbLL78|߄K…bWZ(Łb݂nK0h&wƗSy byt/|bnb:?ARٴ7@Cdj{3;Vi3WudLqr%daBʖj&;>Y?eo(r)2|KA? :K1yI.``&e])Zr$p}T'e8 auPNBD~,V [rBm5E> 4JwP5:\;9.wU: h--FMȫ֒VY. ު~Q3kO ,Jz} &da-ڟ!UPg)LuzW}$|φ,GB28 W,Ӿ7بA6&ǠB1'uX=`iu:>ܥy%z7$JyS=:ISs'#tصVJn=3>kxWܥ Q?<]Cyco6]Px:xu= ;miEFüS؋No` >l_6}tYAQJݶZMyo8P&gy)?VVE P&!\2+a >E8Ez`zmgzi̖'H|e&ªb!zڎ9i!EnsƉ0 {tʨ !VǪGJA‡nՑe#wJĦMskwUUk뽎˪;& e8g PĄG2 bj%hQl? li>E$bnZmNe=u W/jߺULjT1 l;c9]r uT*hHۛ=i<Rm U_sMqf )K'$vԬ:kъHp. |׫U8jINe@7M'T,X8@Ф0thy{M>S63ycMQaM9W9YٰQj?kA :(kxL3!j{[(BAbc>wuS82;Na rh}K9o?ҸQʇDPˏSZ w=FӱȓaGH$#+1$N4$;B|)Z˲K~Yݿ?`>K:AYg7 n[M(ӭ #4\Bv7v7vR"CIZ,3c2*Z0T_-(!ì x(vD- Wl77ݠN6]"IPv:KIޗ1m d{4CSJZ(6? >r|.YxԩrL]h`VĚD#^:#uu|p+<#% ψñI%0k9$!vM)m=;!]Q죤:5ZS wqGIkN_O >aZ9Yqѳ_[&gvƶxZd-탉}1Jh贫5>BEZZ/4Um`{F]j í~|;"ǹ_Ϋec$pjpxA3`.-=[vD*O!PWvsF"9bWLP$LáVMQa>ip~RMoΧp@Q87C|4,8lieo:{sy?V; X4sG*dA[|9*d Y. 㜻W(QΠ{q2%<f$4՝|J{elJ?6J%ҿ[c/vF>@{tJӽ.wO:ɜPidMsŎsnL#"_N{ĉ9E\=)/uj'5Fa#Y7'h3Zp@}A |Y oc; ! #͎~X+qN gP1G]8;nx 4Je"&C{ecYMmE04c;̏ldM;DR@v$eV+MJш ?fuEszƿQ<9JF#&P+,9[tqߗw?ɓ:7?u}Y)tNN-<4 A-#l@R7a3xP\GO0LqjLR5{(Z>c$m* It |)鼀+j@^ @{4YZ;aZ?_\i1kp[NSL%gy aBsn VTitjލ/ɛ;%I6CxaxM6WU&?J䰱 BZ0iae?FUg*(AD|v'{$dty1F+@YEZ?ەQ@v30!>Ĩ*>e3}\1K8"|]Rp }. 43O~tn.^xks3,ksϊ @% f@)<>!F#2e*bS MkY-"\DeGXo.|ׂũϽFW<ۉ@{d{q>Prs) K7F>| nB#qB^Ƙ(>m>FzB(U /xǙd%x =NaFZm`gr-!wX_u qSyY;g^X9rCAU*R#B_'YWKv K<VP )C ,rݔ_\!륅M# }oӷ@&O]$ǖOl}*IF̟|ŠR XNEp,UmH$>'f!G] 9Վݑ\6q%`v`FZE©]cA{PwW)>P C 8AL_ |ai+tH&Tq+=ڧ`;"' M_Hj66öLNAs8mwOm~*4"YEeStի>o:5ʀ7d `Ì\wwAhFeM1T,1u+'Ș23%yrՕsHVS)&W#N0cdeEO-u(cw SnzkNykIV/nZ%n_ 0P 驫qq/nVګ_oى B?8JcWr+$+îs X{c {6j)sYCHQ$rY/`cp|JRP ,'yoK(zh7$A5ҐU+n[1^1>nO+wnC/}P-9sяyB1iډ|TABPܸ]ۃ i zq)WNSF9|&u辨i<` KZ=lUڣ2"T ֩ZZ`2d﫳#[*4c}H_tW%'AQpxS, Qo?KL݈Q6Ld 9ef'Z{\ҊqB|- #}Fy3jPKN,$ 3y2f:aWfIƷgT޽QHAS_N$ЯezB}Ȗ ` oT\NTWیl+$OKԺt>#5錡yEB|p{:K-bl:^EH/ģTUK"d ëo"RC[Ur׺;2wnx4R^xXnHxi F*x!WZN_k՟nmMf9d$m:{IKwQ/(ki/5SBsJwv#|BExXφ2!m|f R,o bMݮ"w$dRAFoe̫Um_`a4ERc gg&退XCé ip`y G@R{]o彀ثϚ٣}E3F 9PW4`0(ppbٞ$ ]p:Er:zH^T%UTo1/BkXȞ!%ܢj>U3OfIؽq,N)J=?W9čg'U;>=Ijg7  O6.RFrwVE'&!W2Ϸo%曲kDV9c~y';4ݓ#GoYj P2?*@Pc6  *%Wɂąk}US.jqCfJ2T-K^˕gM,G& ?} -Ƿi 6[[Q#sS;*cY>DsL%-C`;*dtN+[_Z">4fCp~(mKx8ׂ`äzԁ["1P^_햛֛fE""`fV t3ѵ ;J#1*rG2A\A/TWwnV Uې;x Ȩ õ2#Kދg&pg Ib 41 [QR07}+>v=(OK;b4&D7=&?0zy*/k[߭'_ˋ!{A{ʘ1Odی!e;׈[kqHNH. ہ8{ɆrF)<+w̳jm2`8ꟍ#OFΞ/vǝK"<` m](x9y`'^8_#5=FK!‰{/['yKJY:a#GK߅*?9 Rŵ_H U 29ʼgS[s{#ދƐ?Ecrp-w,sQh)rL@nMZV!(xUU)MjU|r=LP|̏K`NJ_,6y t&*&՝qq=AͿZYsD%#Vrxw/!U#^A{/`o[ e(_kLB}I;DlPŪ>U+ڵ=Q#M8=:A(@YU|:J )5ݏEVbTOd$5VP%c*ˊރۿK$IMSnOnhZnrF*H>Tfnd&BA=g=0.FыFdy/pS*S`VQb FI#h U wP{&zԕvڒZiƌyf9(ﴜܻ. TЕ"e𕠄8?~.KŒh,qu#[A QGݜl[L e|l*bXGV ׾D^Θ@%vf~Bb*Ls-mIɏlU2x#^ ûo*E6{s!B҇/E^0WT.ʆ9B4F~,791Zw0ypBW:9#d#%YX g4xYk WFu%#?ȏAUvMmF۳+.ۢҒ$@& EZj):ٙ7;%aʿc` żo41vOBbMRK@#s殚J fE94ޅ!Dž᱈,u&W1 qiqa~۾(M`a1 2 6+$E <.YȦlh)jg|;;2:(7ςS+!X|jbaQ!dc7ŔY,˽!ZPLB+@_hZ$Ia u=4?j){j>԰7*M0-ԫ1vGzAQ#8mS_,:*;C45ݠ15E`8>8 ׫O'D{6px0\`' 8QUD3ɺ@ew3DxD%Gao?9mP-qp,]}ӱLwsO&V{~/sCd([[M_wfTZ :?pähxx:xpKULV籗X2RO Ū Ga#{K_ȍ!hiǸbJf/CxXƌt %+5/v=]V_EhZ ϰ\BX^">Nd(7ԑ|~djޞt%ub4D1n7Cnlƀ( у2藣U%{L~o,{=)>zqK"^g̨~,%{L/eA_O`<jԎRk`a;p<Ht6q7 sucz$#wS$V@2G*ros#fu۟0\(8 dV?%B(*x\8l'e (28HGpjN tfra' SҩU׀)Ym[(wyt93Y+=FٿAlb7IY `վzX4J"U=J<)_E䴣QIR.lWAMvu攄'.>oNPu<|NK+K.R͌ l]1l xBtMcv_YG|&F+Fi3! 4<l.1ӥEXVYΨ~Qk&B!zi{6\\]9|*Eh 4v܊vp*g (>Xk%*ST~vTn| ojY }F +_5{k\YD6ͦ% E\=LĽN͒=5\2L{1Ilɕ;=-nvxƸH]C( dG`6J%zo7I2LQl>% prgEf i+ 0fH XFc|?wos쑇0v{x 9^6x",|99 ]PVz6B/z;JD .\zi0I;Oؤ5?*m^微[f+ w8::#q]Ny+&gy6}J)K?g)p2i:]ȧ,kCc4[gg P io%ڙZ痢[TL=i c3`޲ q$E[jq>'cԺq3<[/-JRU̟Y\l(MKgޒXk0m!oi)EQʦ2hNIi}駱FX Z^cY&N1P0AZ"Ba ( G7c eK4"]Kg2!dF2'{]"zi1sO~\.']q~\2 +v[B6zoߩ ˸`ºܨ j_v"f.>gZmk6J[4u H"H4K+iAu%}+m'. 1Ou|I$pOrAjbF j?#d,i|/<W2 r!dq3ZDޫ/so(Y*R=AA7IF}oYEe͌ukk A;`: R\ʟF+ b W1gn$l~ݕ,/p\ n뎘_?I3+ @vzFTl~ȀTF1؁NiA=, ~8@S/sy峜Ru'Қ`{0u?"܁fRʱMV1k\HN% skB1/ayBGci rȲ# =p_T($w̛~l3?/t=U]u:1JRʱ:]hV?ݶ^P7Ejgjk2Hxfn\:n jPѿUsMȺO[a7˹?AL!Z5f9'#S/iyJANPE)[>T,9pC^ x>ai[8nOF-cG'9z\Ɲ'g(4ʤq7)VMABR}m{$AӠq=gەC dfK%̘h 撃_ϳƳVJ=7(mf@Cu7Z0+'A7(+ew<1jпfs`c^4%jlҟ4\ŧ$jUSJ;ڃ$bLUbE0!$zdJ{J^eArݻBik3"bv4f#~i俛[Ku錻{fFzŒ7XtxֵAT>+_{MpG>kU7J>Jy*S(hόܽ?ZS#DAQ9]r.;Ka2?Ё@_\8ȥt%cy|zClr:q8TlT4 E<3qDvY;7xK jx #Ll ?y%|-7rDdistu%S4CupDJ,p+iRv;vy%r.&T¦en7q=ݙ1V&}.辇aS?$>8dHUo|~L|*T<Ylv̶g \EHt.4S̥ZǤ/Ch75D t \ gK>) ΖwgZkmY/'BHĿ¡Ht2i\PCv^0"Qtk$k9M+@-kvz,̯O)cބBkQ AdΕ?TOfg_(E94#6 9?{[H"³<1ydNp)下 r^dXA~} O ͅ/܉ޞ H7"n{e"T.px#渶M{SP )ѡ/]0\w?%Tq/<9Op\SK>R@A]\8**Ɗ !_A"a6L}Ÿ&%xc(gG;̀O`l\R@1L1Vu 30"uYupN)/:y(^C/_;,k_lUZT!)i;Fk L^u}VmAw}w6Sym ~D^Dmw|(T9(*/ƒnIY65ӹT>qU@tݕvW%Mk=بW6\lcs-Aqݨp쐆nx@<vuNo4Bvn虅V g_FVIbWݚtكyFxXd1:XM2u'7 P+|<|4}̔^XB75 TV:ץهh=il|o=;d-"E{WM/܀#U3]<81^jJÂ-y&@+k)kA ܡb%gD5F W43\aoefGvN3>O5U5>f(}}\ uķhvI5Tm,VGwTSҨpO/7sVB)v4g1]OۑJͽc]TɨŌ4D>Rkc(̏Zmefs'9hIW3ԗ"`l@:]z+`($֖ E,QK"NjKi3}PBn0뭇@7Z=@1xN- (8uX<YnZ0zxZR}Q2[i[xЉM|e]XZ}2G /nc+ÆUjp$ʾ@1(H.)5_3-rldK )W0iPz/,#]Ȗ:4f^lA y˥e6|E:t/Y *3mSq"`h#iq@ݲ(\&4e1p+UHmd`m@#ckD)3*O\sԘ$UB9!aD~PAgE:ś3VZ±VH]yrOm}ymָ޻#}m7>aTy'&~Ǣ7֮QE%$M#$#ƚX )z P{^L_wga>'~Qxrj6at.?F A+sxp&u< Tpp ^V`}~PɤڈHkcq.il7dZ%~"8Kp_o T6>H,<C}.R4@aTsY>q%v~bx_ۍR=qV?5~惵]4Ip&b]2G3گ/Oa^2ʭEV+2*/a6+wP-_Cax{ʋngf5˪?j%'tZ0a 3 cMN 3Y'~O!?&̗n0K#C>b'ګogB C*]_Pe;xwHH!Dm7J^dbI<5?t^&wUd Hu7Q1 6TWHn?!$)د{4r3GB1S7shw"v5? $.TE ^ WnJ֓VY&r̟PiȀ? Hcق C2T9 ˎ >Il'#pכ6f[̩wvaecS#=>0J5QV͏i<ن?8fo=8_ #,!l'wԨ KR!@+yMN}˜~o7ZyCҿS)fZ{D3rnit&"ג-- h8 U03[,$$I5X5*2Q ^-HSTv"ȕR,umַD],]) @]T-*G6zKa:ݏ<Y ==3"_7D<8.ܒZߪ#u?cLOH{oiiI9Zlp Gۋ"9@tBG@X6D \{繭> Pbyar U-,N޹ګD8JI4XE+y=bA|c8i1+گd:d ?WmX;0ڡzE {v:!KZ(7,S(''sk7,Jװl9\(s`tsnPkP<| ;,(a99DU!t%e q|rfR-Ӕ֭O>1u\wԛ _$*OyVѴ]CQ'QA)Nt2Z1{ X>3yl[K y~)Ei]RSe~LM mRL+ȴaO㡕}̌r,dԍuPbBu&7hT, Qw;(qZU%*B[p쯒- 8Y/b f` N b1Dxw 8e@$C֤4R7 PTq-ZIAz&}6)9#~]G3`i]Hq02^8z ^D^fk@'eAfH*FgFbչhҦuy,'g IEn[nXWPI/@ XڒޖϑSQ`\ 3̓ċt"}%q_\/,g>37/c0X(rmVY`Q9jUƜ/AK w4zU>D)ʛ ]F_"),$4L?{J؎0PI{!ݿ]k\. &ukD77Xx>242if^_钤wHբS!E wN ' }l rc܀$$3 *(*.c%NH2OoyAiv]shFMHhg πYs,U:"\W%3$.{D]e<QU.!~M\ ?*Mg5n[D^o-ryb%4!b 8~$4+^{ʨyR48:X% Y{K g8:\RO'GQU 0ayݲr`ݩy<A*Og"DoG#Y4ǭej] iΊ+37feڃh--+JPXO7|ƨ>?`5s3VlvL8G8t94&DKtZm =īDomcò>(`WAcB`R8&v-eM|vwE&cYlw#'oP5Rr1ϙE["|_-G7RՒ6Qj-g |~56?scΝjY1PzcoKJ$Q43'a)!I; d6Dw֥ ) 6}VT(3,!^eSܨsMxA % >k!r|9 v,IN5 9]i]beo(0ӧMDQ IsL;-t#@ԫjl|q`mrQPEe>r^tt)Jпcд m>A{l8Z Ow \~%)1_ ҥ겹>iS闵ī!(wn"ږ)ڱ ,߽J]K{.? x3Hvl;a쭳s$2ӿba8OrndO9XZEōF-CEGe b=)0Yϗ g2e(ASmX}6++g)3I@A[UKGbjER! 2/_ј"RM@ ^ՋhF=Yd{UY /vBKnpRLV}?h*xd$'(_aSyYWyg3شZI٪IJ1-sS`JuwpN6w%MrǝawyTzm]? ߶٤|EE |s$D~L&< q_W /m}-Om)oMs~gSo89ATs$: ]<vk=8tQ[vxnDEVsT>7@6A8@k^qx+bKQ ~3f8کj?&d إnS2S Ҥ4GMM} wkm>jqf7m؊2sF& vL-`6vy֑ LʉwB>ޥ7®Vt<o^bXM1zLRf,dwgXD~KU]uހ݁=:)5(鬽IMɺ+C[$aGK?OO*p 6SQd_t ku^AvXo)t{VX|wB7ABm2a\CFld93X_\ Q wCfn[WU! C9C=:7smInZJYg 4{+'dj3crDŽ# VIwnbN|= nUXvvJYsb^ṩBJAfMV{}放 u­x&|84}OQ`?DsjTP3䖒5C*{|Q 9q|~gF:B ȭܛsRJYjLEڎ}# z/Gw|iy{d$_6ũJޏ*}b J Tjq4šEbFT!z%߀;S NA<0*弊_'uI%5e#!I9Z2`'Ӫ#׍yd` M9CwT+VDo$xrqP-'I Zг#}hђHtd0i΍!=!gnx@`50N2A6mGE0] DŀyÝhB@=?T̓r%(h>A(E,⨻Y!GXuH! $ymyWXxLކTFU?uC7jaznFqt5/`&Ud7!ܨ{$|$/a bQlq9(%NFQ5MP,=i{Q@j)a@~|h[W.TɑENV4yvb}:?CXDBz]p 'ٱc;AvO}|.J?7ܸ8ksR Tqz/ ⃳OviÖBK o#O8K])izE䒢ģG쟯2>˂O) B{5K}^fA 'A"իks#clyw=kV8@,nGk$Y?02V!ӹLoWNa3 74F9y֓h -W`6b^%E cEJ| jN>vjK[)^m`ry'#pwCG鵹댋rʽ[l(f%6)mK?]ߏ3 HAxrY;o 1Ӟ®4rKBdz^h)^_mBRRdJ\ep=l:,OHvݰ2ac-K({0*^7= w^:H7Eے'T/|lnH9}c<^"^~B%ng~767r#p@k0¤issAGDo8E$TAqF:- 9Iީ:%s.i\ 5 rkyM'prgj(@gxh -2E4tIFi85}Z@f c38Jq5v`cbV( ޢsj6 (Zae/("j&7z‚]V3ЈI<" u%A@|y{-JϷ&ɾ jacNAqHv y=?E܋*\ATΏ  {L4'-S^<" Zt}`hud O3w W KG}Jtwᇞ1,7{0[gaKm$w6rs< ȆץaEeXmAzh;x-;Bu떑 ]&1П 2ëmlf齣ǃ w3Da3`-KiRz5/1@9Z:үuLJMl j7f6[I9#Q'DﲇrXbf7{U@UYҎFL7EqQe6 (88}2:tv7)(< 9Ezhܨyބms=F3WPХ+,h!J{ LJ{6-ڰm1H=i?sOW|9EHAݣ[Huizd]&  `;?!Mȕ"[X #dwDu' ,xX"o NPEXyXSJ싍%!d0bݰ"Xd&"/9s ~mOU0ޒϩu1-=>I}]6ǮD,\.pZ|]~ hۅV:Qx3SkX?ZgRLc!68m¨+sAy`!cV@WzH}no8EQz9B~c!O]t[?`{I8='whP&"ʤqv< jfA6 5kw&QyO B[@56-C .c?^j=6ZMÓdr nm %Ji2;q.`ӓ"' ksGuܮn|r0Ad(6=mloDR_%&UWZчcGt-.U*uΤkGP)[)5z}zCPKR Ytx,RAj7Io)[tf n7M ?2%i?OAaK8BAiΫ Q?FAp[|Ԭď9(ղ΀?]B3-mkt Z;$1XPxfdw}}TEY#ۛ9m:ۄ?w ,>%ry \Zfy eldtFg #@gЅ;i&XRq̍@t:N~)g,ׅܛ۷MBTL?ܧgnPXB!;*`CCaOkLbnab]74dA79k}K sC_:@~9IƈX"wfsU\5qH vu"p4 ]ɧ`@Z^BvZ{[%2ss\BS< ppqvן~< ݐ1/9֟.FRL 97x H[/tѢq+ 𡈓> F~30qb D QTl0`Qa Z̲q<.yb?vdF(MEԯ>)C>Y;&iR~5f%–."ьPZe 7/6Dx ,yPi^ Fc|,S tXp<aȊ>98@]03$mS,0AQ ?{\:''V*vOIvѣi[o:/@;5dGOq$C1 >eP gn !]4Uf~Ȍ#}@jkᾳf ԥ1Wdi24]4 x3;Og_[l'EkcloGy4#O= ڜ@=P+WAOiP%v cU9ulMݶ$ZROW%HlkOxm>sB@Vo 6{$ׄրa1w] )(x-lY_̧@}t`mOKv vsED WTwM .fa}k5.]'LΥ̥!oT1A4ct3eԖ6URj)_jaS )5.@ e8,n(y5OHHMYς[RDm"")1b-J>FY֕9kWJMj v7sx/UY9#IIAһp_D:۵ɏk(80"~I 8'5E)Kn `DDw`'_"N\bZ-~l^tDZ 8i[Psdk-Up=>rT` W1 J1_;͗9.Wc[63kk=G@ɚ?~%jSw~iZJ!J0 PkчQfXe'[c`fy,x磸E8+|Rٱ 5R 4Ǩq##ӯP(/+1,iAhfsHx%wWa1cHOdE A)^LÆ|y~3ok ]WcY+ut,Qc)hރm.yOkSYP ڃC^7^ۚӜUէLjGVZz 3k@ -' KFI Ҋ0X`djX"Nz3\g[fݣ3^:FhZ=Юd=Pw# ]lӯ̶ i( 62` h=J/6E-|5<6'Y3gy6qH̊+ًwcyOUNֿ z[4NJkW.;HOb"_~aiu.H7ẙe@'<;q}Z/) eX$kau0J:#Q]Gd8?xWt6ŏq§/P3(MA(E7ХrM7 r橖0@WH+3[حYE\%|;7s+I7SK ÖbZ7Z #݈=ee(al)_ӓP̮bGbh吊/zGm-1 Q-Iʢ@AyBٳORL2 `.ӯè>G˽ p^Z h+OsdYMnv4jP>r迆o0SxEp ]DjYPЫf\k rKP >L)[ &(/vo۬l$6C^x ^5ujRP/hON %X$,id(}/KI=)W ,b(c q 3k0 ƵH=FJo Oˇ$_X2vdߘ|Dl\'T/iC#X# wE1@lxj%hf㷿z:č2,~tgrZm)ΜfOQNAEvTIB8mǵ峜N3g\`HY*~F%FA+wl%{qhИG[={UE߼+C4(PPyl.[^Ej ҡI`.[dsu:/cgg`M@H- 1J( Vl/bc Y0/O-\f*4_镂[o*APH7vJd9ѣlaύMuP5~ӳdޕUT.ՙuwYӗ}҆1U%lpyD넾u>dXfBEg,$810SbwΗZkYe;D@AdI Sb+^,^/6Zul\ ϗG$y8.mSAڃK`7ºC q  2D-dx=D¨ FT8eI%5O)&E`O^O3iߑS| Hkr螨\;4Z1H%ʿ+U_q/'.)w|]My] Fv fس{0:(׊}ᵥzQ3yC¬&z!6_zZ9 ;Hd[.[) բ]/ް@6u)Q Zz Ⱥw z=8W^@ DHn'PT=:LyhjPBո-ދ}Ԫ.;|8Bq)s~:uV'-@T|H{}m$3: . G4,C X:S~73w(t$?Fl%=L0)ڞ#TZɓ3BX9N V#O55 h5_yM!ڥ5x$2T0e2y0ǭj].]KM b6p vR'ՉΏ~;g$ <_rr. {<)7@:ߪ.0S&>gˉY'T1'kT^yku$TI 5)0 aI/#"G-TI/M N{G' )[3`b͌v/p52> H7g7;9_p)KM[!ۜCD'M^B}cͲlOtA{6rgȝ5G/1Ȋxisj(Ĭ럎U**V/Ÿ͔vR Jyٌ-Ed: ԫ 58=)SFC @$EmCӁh$I6ѻQu~~^h+ǝjP#!bۚU_9Ϭ Ni ؒfbUHK䨉7YOEwIhڢKQz[|v6mw/JW]-)(@[DY3_FIdC~ @ShT~lr@#}CǎBt Usej!1xD)PsKD\c|7r/ߚR=e }`rKU!Rj0Ze;-u0CY!&đwyPk#؀Q pn[g߾=ƃz*y~LgUО4c|ZK"ahBZ䆩&DowZK'9g__P՚2\&xAҪ[6\+mxJ2 09d^#/ELN֔gT {*G0yA/O;ce+P9x&Ҁ5]&jI sbإI2JT qqK+"_uOS;*Y؆+Fe?V۸ʽ,/|l[0%c;T=M2㟸E?/hnȲmlʊRr̵-")T ͻWO]9vwe%,f`V+1,9O<XG$Y _`\C\& C62ؿ MydР Wf|і±:Mt@_aRV;JrF\P壤Ka1LTc)F)9LΈ;;{ :K_Spσ )aQ"{5=تb#A͟6H/i`pK] EƄr.w' "$ !1d~;m.N-Q;p2d[=xKE<=%!՘z;?S|$H&?9q%YjİFYF\DF_CvQq=/ pM^ w:UNbI:Z U K amAh eNd8<?a4t%-TI4^ۏH(]E뽧)#uTFwgBa 9إ66 ( {Mu#/hC V/֛ !dٮI4?KpC(2dCuH< rDu1=1_W9:sqLTX%8miee-Ŕi5([zQVjJNJIl> -]Lmۃvm1W(V)'da fuj1J1QPi ^b(f ЗT_Vx-KVSYQග(p]WƒN'MQ"[!`\{[fUbE\,$S{Tf5a-tn" @)kz=@.j#.f)BBmcp=,<N#2\͟f~&uamw6ms 3l7݉]Xܕ}n.8 OE ~̈́1R_g"s)ʷ. ixoLmj3Re'UCիYs8}l9z҈+z ϯH8`K>6x5@Yjrxh3TޢFcK#&Sb(^D |#HVyyQyĒb0W%˔GWu_:6hL3Zuwˌ*`> x&I([5WNbdZ Y!Bv`b~r~w9%pK=#}5('OgXЎ" z?O&\?\#ΌJ u~>`YM;xfJy|YiнE1D6a5k_U8^ n38FN'}Ꞵu{P"BUэ=r#.#=]q{ȡeO3,.#n4=ԑEvvHrE5[l JfO~Au)x\6e9-!(tq< Wx<&I5ۓþZR+hՕNsG}gd(k-,B*,qh,xJ:SYTݧK;؊CČ$ɿ݉l !%p Xᴑs~ń1~x~U%!2t._pB\c9hyɑ:SW+{yz)IKyD8c&eGqn39UeUۮtÀ_WIva (}1܆IF.[7!R+JLu Et6!&B܅I?R!g(Sƹ ˆgz 2|~NvXY!x.͹ wo_睩ʉ D g< |63CMM8́C IGtFf֌?0}'é2Y bTsʏ C4:nŽ!zv;mh6P 2uʀ+@uN>ٕhß6Q@R`}^I-].Hv餡א ۟/4 "`(8WjXsdg҉'f7:"E zhMOyUzk|8civn#[rr! HRr3@~+HshV}QUeF`Y}?WVxdP:N_& -I bQd7B Kv.|ў/sԦQ{ 0)g4h T#@CuEQ9{4q s8EᗥU螟2Q88Z^k͙!G"nZew&2r:2aF_;XWH x`A$dzqg[Y,WSG?y+ pϗ22F@}mCYo2yz͆!)#qgRdu~e F%Z~e8ܙv oC#& YnY8`Gdo냚7T?8>ǹvvUeWh8c|bS#4ϕr^7CU-Qɧgl\%C Иn_"XLa?j{ W]@{đ^ufލM']^ 5U+~}+Xi)29<8TΓi%;GPЂBL@I?mpN34ӯjR%MB_&J+KN&T=ŕ( Z+0n*I_ vTz-`c}7,#j!;e@+pC׹BɁIWI 1ŗCK @-k4Su)TU (Zh]dZ7)Tv1~PpJm+Rgpjh=,݄K"4|0NB9T ? &zZQauQ=If[MJ.9ZϘXEB:W Ę~sj2zljXu:ZeڹaD*A^_~LH6RV]/{(BT/nVS5֚݇\zZr=AOVKR[4EqO*աί&8=GY"n|g/ lu׍і&z 61r_d'[7zpdDת]_AsYb{D̩zI|ątm5@m!H *H/D߇ M.Jr]w>lJ // ?_&B l #o48>P02rgv^b1[&ULZ);j ,|IPE֌P%HVF31'<zqKn#Nǧm'FeS_J Fͮ]dLEkZ #y+c=ǵ d-rX*C  {`+Vfzd*jRd2.F} H_Ib-XqDچ=Oŏq?-ӎP]H%^6qk*- |"},TƹbDs-$et;ubuz4gegCFQ5]7:4Mj} ARX%I 'n&@a/R0VP u&/O\eRHvSVE?6Y(.tz-z^|UpqOgܿ-d:Cv9?]es|?Ӷ)sW⩹GmW{d(QAr2=ZNq7מELI_j6B#4߫ 42[Ngm'Q"Fnl9\^8hY@.[s"I_(Kb-n}Ȉœv,c \dС&Q#oyΕ>ȥ!UH$ioں#elyT-!%7AQO XDi}$Pd#,TVKKմ19{6~BKU(y|uv><[ұWkwH&FTsvw6Q0|Pe(Ɔ񱕮-RjRFR:ra*-"''XݷEG 5Y=՗ܔ0%.I0#p ,r#S~ҎQܠ✠psKŬϻ~K %Ϧl7xG{o[ i\=XM繴X>ⱞ8Ӥ%;p5CP^,8XֺwrOO@3CgPL]yNG] (v '87\K&1*Ps1o%7' X+;on).~3WUs~CQdjE h?tVC@U)@WiiD6ݢ(ar[Fpg $n91\2Ujaiʀv@cĢ,LЇo2*VNs jt>79+$t;gceS|G:D%5924$AEBo5HgS+^Q82y-1 Kj8TkK)-`zmSxhR[MZB; ]km9[*Zқ삧 B~rr m5+g7g ^.[PRbPVUj VHdYk@X3+C ky'bx0> _#6v*ʧqǞzP.8pZl؅KEm8ŏHUpzR!S' ÂD"v$;쎃O1_fb(D"n>*Ja)R[`aWA]K?}^O SP5t oUHg4b}$_(+L!g)[,Q>9 NK&>@>uTUC)%ZX<ż#EV*g7za Hs,?iBRD.[8V^/e,*= +%B' _L2}QMM&+-+ѼoOg/N/줇> aW<0J06EJdv˟-8zf|v{yU6bQIhW#Ԟ\#:';00_vf$0W9?CFp꥿G7^jC$΀+cЈHk\7?2@**ro1|vR\|6U[N߂Iؼ fϔS_U)s#)@X>r*cXc\[)ʻ/v q W$LZ HCb#D+TbS:vvm豿|,<ʚef f\:0*f_.jX )_JdhpT篫ZYJR}Dbqc$=xgBƅH|6 SxvG)t pWUxY6+_Д)黛cF(D3E$˞s{6sǐΥ|&Ξ|p!,pvץ/O uI*IwU+T1y]1kV>`5 ,1=y[ӄ\Q&Sl6ӞA‰W &)ʯY|wCNA1ChI  3 GDw'gɅpk\CŬ?hx(Ia%whRt%qkh VH0;[=mNߴbg7HJLa+ ٱe~ wΪgQ*|OX%.et:g0VbQeT5:+ z$C⣤njn`{ mmޥ'y5Mbn9gib\?Z2=?NSe΅D3kGNgd&D?A:T8ȥ~)^5Ր2u f*`Tt6"`g2_I<ޝֺ XGF%ܢSFLF`ToS(q'P T \q|1\x+vx0;NL[pä$\83ZEr Bc4 afh7\Y he&]ʊcnq:j@3֟5cⷮ6*'?VGL,qK?%׸4y ы׭Iw?x"\Bdg2۫x6!..I9N蠩( 48uV1۰*"A]U1fWOfY5c?hS"#8s&B1zڞR;3r 7jt[`-P3N#;>T>Mkc@rwҾIS?"vL2:?7?y,$kD{ƙhGa3M(G9gѕV0I3ҼuxwlA'e6B'N?:0vJNZN?K8 ^M VKlZ9^mI*&nͷPj>0q˩ y?/@&Pv)E,_a2Z^ԏBtgaQ@k e=<3c)^̱#vP鳰&ys\lW.qI.:z0dJ'gt*`#}Cn9X;J  FGjfNԋX=GD D>bMIPraJS-`sQͫ '@k1miQX}G 7ӱ# [*q,_`$ʉ_> dTG= Vw桷`Ҧ"Yo,K˜sc+`c'Y1{qL&SMaJ-Sj&v^$j@YUf1dp-6Ʃ7 "|O2aCaҮG 2 AXqKK5~۳&AwJ6<5 wI6R(uG=*\<_yH"m{;o"hbx/UZ$WC~l^RLA̳k\Y؝I5!crdg"pMC9Wx8qUVz/}h mu;ʭ܆UޭEͺ_ڧuEw'hQg翣l0d;*GK8Ԯ?Է BE=Hmhn?*D2ːfJ{?({i3[TAKeypƭžj51b̧ơnAЯ__&jcpiCW_%W^N/fOuԅ&qt)X7}1wr+L]7Ң[^67\M 0H7!Zd_^N\I̖~kiC[Ls) Bw N€95:_9=R?K^ ?av3!g<0|8orDE#Mޏ`7?L㤪Sު%'v4d[־/uJ}n٤z@nX͍Ok]!aISc_yWYQP"1n Zn 2T#H7wɯl?4, > @̓-y#`! s/݅!(շLU7cQDB :g|7;\oSl&D6 zV$X(`9:HG؛7}ebj 1kqhK(>Ւ$U:U]0.BӈRЄ*ʆ:p!H]5Z%mi:roMBl^Zp\;r7׸%6s u R^nx`jBrilRxJ xh >=9ImyM˅ fyT9jXAl *EҩރO8jL]o, s(4 lJ0GDN](0"Ňth% #yC-D?Y70!ƨ@IJnh;ȤKcS1?jYnU]5 Alrc(u?T(C"qj^GbB)dF/a(o3.J1+wfDtRa)l19ERc~0,b<|(aFk_cʞ,ͷ :V>UfÉxʩDwV.;A11?f(EWA VwBHi!}瞦pRC8 O"KY"u > n`AdS@_RA)Bo"'x QM6b)S%;7skQP?D" H:+5nd⡲Jsa!^-yaXp)^%w\I]XOJ  o(_8뢦`^H 4 A`m4.!g<2ctt!xӻ N*&$KVMN1o"m*Glj*K!)|`dTr ݒRC6'7\}')aV}??#VX`(ONA }1|c 8d77֬ar4/˙5&^i|0 v~\bcJX?\r d_վkhMO|k/ =O )RyZeBpBGa[!1??*50@ƤNdcMih >Hraa`Mc~f\Ĺcj x Cl>PK}W\'&c-jd/3B٘̕"a׫R3*Đ9[~p#%DkH_fn"pmBqS9T$Ȥ_::ܪl"Zv$##&*V[f6p߼N %5抸~ g& % hMi6^4s-jJWW k&<{ngX6rxu\n0&3 ^z3w6#nqwhZzuBOrnSyIg]su4O#Td{%ц~X9FkØWfqߑX[oh& Gc@^*71]b] !ӭ&Q`Ra ⨞d=a6PeyȹL]5:٥c(S4^"r >(NQ<9tqFݯWw$DFw\hrf1٧S)S}5)J]1뉃>o4r&JG2 f B)Hܱ*0$mG f[HfmЪ"yt pՒw(F ;kx.=bJ4F7z+^dalSI|7"% Ђ:y_ZSrJ4E܌bXm|VG'oM/~(11EvnZ?/ESG3=F(#cTiPϸLt,=mDcbaWͽbdTs$w9C}V;1"ͳ.(?#9OBL`GZ|Xi J8X $2marlw9çor+wc9J>)wBeƐ@C3}geԢ%yioGQ.7EB\|jANT-.qs}D!?k Xkvxqu' 1#-YbYܞ}~/)ΓTŭ (T`1o1T#-L)jqʓh'*݊t} oax8w['[V?#/ 3XĊ\dO2N$7G/qP;,vWGj9hW 쐜`MLsfwSLDF]Ub (_ PCv^;CZܜsi]&NJLnE>~'ܙ beqc:ѢX[”Pcms/c,Knݟk@G%A8~ Y!8,/ E)sLD{@:z^"[jXp|noЉ}&ZXiQ縲"iRvL"i#^3Ux~BsTےpjSc<6qdM`Z+>j/9!xe 7(+b|ku j^ @("4 8h[AN$8+j~ơ壭,n9)T6j@IJhWx U,W$-{"jhB2:WEO@i۪<It,/.l}vlC4:;lYX &֬#FւD2L@9q~`:^T揊yt"+í9C)R+I OU%ymf$/{%rN>sB}#[\8WC ^) Dv99>Kx1<ֻΔJ nIĝH-[|2\[})DAsuFMYR oގy}3aߓLbC~ ^#g:1}񽸘^F%hϟW4Z A=e- Q / *024a5AM¿Lj[h`y]^g~HːVw}J4 x8M[,4ܐfKƮ{[dbM+v6Kwō9JT ) Рu.PSWz9q9nV83Be̸}c5֚Ҧ'`T"Av`@>gz2g G&\,خI^tR@*" )\i\d 54#WMlȓIsQjY/"jo*9r۹TͅMls|Dt+4q{O>ԜIѰH N02E0hb#D;>X?(BJFgwǤMIIg42ܡ1ld^҃kUR?Ьoتoo aSH Jn (x;|Z[i&!k)?Գ3DJ$<_Q=?!\"4!i<3=: ;9jMdY&S x,GN7<ëVM-cM<2 v?F!`@r 8[b=)dЙm Q`kH0`hoH5Zo_5HYzzhzٕpdf ̖|p['XϴZt!;ݖH18c!3}y־d*>":E\q%{< e 9<ٿ-FW}B3'+U)|PIGONGV$%A81ļ8$+Zj.C\š)ҭ;C2@;FۿT(E4SFiK.39plgUNsZ\B/Bf9;۔20?lQB "78bEąh$OLJ4Z(vS`E%\-6@(eݾDvM#Φ2ga`2`m@?B(!g~(6R(-$儺Ȅ* Z~ ] 4۬-٠@Oeq GZ;B&+p~b w/0a5 XEz fbuqXL^}pϰM/.{PFbz7zjE`zmԂAPA7^wq$?ڒf\9|Eiv`U@7EIb9S%υ1\B+_V+]͸aҞM3 rŅ0CZ`5\䖵+3r9y-,f&C.vgL)9u4Dl/^"%f mP$^wyxΫR+rdI6iCNqUe3lMSɪXwe ÒdnnS.-0~B8(~*`A/7pߓpnDUU q;-)-yoyvqۤhizaajj`ǭ:Ɲa7zTU#i;=ol[pT_빑u"Z4kfA= #ҞZL^q_{d[qZȚܑ%h `>3B hB`Ud5hr:0*ә6?`Mt!2yxa񡶡%>exsA`u&6uFbyK n~NWP?TRkAHqT M%1`½/vֻcx=>3RYeQJtMUDTw|%]ɨV"7,ᠮ0:|$y|.)>PIJ <CW'ka@q A7:|Ӿa֯39PkgC֫G&G4i`rcÓY+˓<X[c +T6ZY|@o`Fe@9hYy׾aE ΖPE+ p!.W:q5{J)_oa<G|*]O/nxlxP$\3g8\mR짚H!-/N[T>Q`p\#U{כwzr?D%l# c*JWq  Jpάa0M%)ȡ8ݥ,xB_g?= z=UCL3Ep˚ȣuI,(L yɀ>Ql_VHNk68$jlnɐS49oUg^Ĉ+!#ld)IkXM0%=h~cVU9W17]ڊ:Ò0D-Y1 a*z*?rLȆ e^I>ƟLb"^H Wa?֫c/+h_} #Z47J2Q>tq٠JH.z8-fAM풆^@yulDSAeh 7I: G׳R-6&ryޒ'b$W(8*xp't,\V-@(ƹ%hqYP\Fz3UƐ<@{L58(H̏>[m5{76@+ v7L @*"tljT6o74H˄R>[F]B}0gCx sYUgr\o)3;arٕCUPNs挲\5ߗ%]˷QZ4GSbƘl%}re$ϒǮDS|$^t6Vs|lG}`E( v+f'{8R{]"m@-ߊxnf̺VILq+TT`q%ܼDy6R U>6̧GY[1T"Iz#e9à`8lžMl-0 ޏod(DB(VQ!q?:>}s_Υ!$b}"iQ\Qv Ş1"v á,5pcsrC.JM yx~6o减˛I!V@S 21Z4)ZxZ6 0[{my3\Z lT]ߴVC8 T0X"/^iOGX\H+ \?2C8fvgRtOI(*U=YڨV3q-'?-`ؖFs+jɺw/̥I@-|d~lj󽃬eBIRQ}4Wq9i%u`<;ڸ.q+cfST!̋V=mഐ*O&M}^_/i| |w= ! β6Da|^߆Ng~*Y"n"J^-V}!SL'Jk;Y>w+S cvZ{(w7% OPOV+B=ϭc-v$HmF©&}`Km$Zhj5QYKɏg!.yfb˅/}1>XX/ 'ء7A4 +E>j)b|jfp2q40w0+ZKa % V >Uw@`jvnT@ V<XksSEjlC+,E Wczel&rxPOM  S\]mOGPG5H%4]f5?cEKe0~zd1zUx*'vsE5YC gU`:ɠBw⮪,_+%x6]-_a*q垿uۖS Lr*\^v-:놴I--w$i7ѬJ*Q/"B .]=Kr9 =F;oN0ȌY,-818ߥk@ʧlN斥9" ="Ap1ErvxǥXμf!rܭ/M7ET{|hzݩ=z翯EaǀPHLFa7~A~}*l7%aWg< Yq& #ѥh4یD K@ڨ@]%W?tDߙZj]jp0ɝbz %4p-R=\z2t%-fT e=+ArJ4)= дpJݐ/ca[9=2Ʋv / pHE>ȳFs w 7';rp;w~ CPAGg>;A0lzxDrz/4\0e5؉-mYb\td±`= q!\NCr >m-5,[4_)dmi܅m:Q)~$N¡W=`7QN-FxOL|$[cؒhyF$+5VP0\>hFLی!" ;l0d 9pNLwGθ~IhNN1rKMs?(k2ҞRM-8i% | \4\edzUB:(g")26 x^6 w۶~nb=a𛌌4*MrrCO@>Qgy!BŌW1H}YsƋm{ S,]_]h ҟbޘ69۞|X`f<nNe69~ ~;WlBʇ_:O vo-8 b po8ֺOVTA#u:7-O1dqH6 8~=Tw8=cGI")$Yv~æH!dM2T2cU~wks4i&/K: Tw1ɣqvX %N>k8b =Q{kZNJ[h.B =Y$py%Ӄ6^s9 EOrkZrkrHqh Ad"3>܏f3\:jItCylIhZ㳻UhDR޳hS\i'-(w?.lUά _<Ҩ1. rA;t␏C%qQyRU\LbSs&Y4OBl}޸c#.^ 8m,: 0 nEa1-'ߐ2 Ps ~f! kO3~ԂvoӶXBn:ck ݠ,8[CD`f7Q0*oB۟*` f\*wEhǙ̲p嵍3uC  yjgf$w A\ϼkeGNښ4DT ;VFdb'ʃxJ`}gH^u8fΓ0{3J(Dg~;`KbCknm,l:)(d4]tAW(@m/SEУ~y<Xczy,%9oV;3>aO(e -)7 PHQ,#36!$`Κc#}51|SYz2=ZofaƎ%Wd y:9q1Y L3q ڣxXo\!Ԭ'6VY <62N;g_2)#3'DX-~DlJnFQufI 1La% Y #]Z-)k< ? DOSM眊 6걳sS01&ʇ>V0vϜ5 &GjC%wvfvԀdnr7'먚oBhc,OK, ¹m^+UϬOKgO?yJX'˺V_dby =[`$1~rLdHda< x-mq'ESs|n aK% cD19qO>#a18 5z)q$ءN}/6r9eV)B5AJnB8p4 c΋ /ņ 4huˉ8rBl^ tu^ߐf晴E}@#fӺ{ vNNM$9@!sJSrGTۉO.DQ( y>kH:ZWɜ֬U%5`j/FP8nl A0wgR5['OgtDr1 Q8/w^p\ G}ƼY^O_g  È :v63E$o=}r͔u1LVڕ$(vuŖϺ/kvOb;tf'lp/e1c٫kE_ UH88{7}nH:U!׶JB8hZ&f} ?(R]mב0ͩ9/SI;3N|-1핯?9+.-]̾O2trh"؎}{;Nv*C>_p$VwYdsKTa_pȚϪXZ# Pz/> HD1<?EojEJ4 @sS&("tFon>H 5f^?[&Ӊ. oh4}BKif҈:ӡFQC*f;9Ф!)˿3^g۩&k%Rv[ (pC`wb&:d0'WU X[' 9Zr_KnePKʹT dBb!>7֘+ AW 'BTN%g:`6U4".T@P`2wCg(rvax-]ӺHBY9˜iNKR~99 8EeN`)7v؉LLf!_oPJ\=#u=.؈̐rPjĘG 0<>؋i#=oOhoogi}soEːMD b 3:dDZP5ktDRC0-ŝ%dت|65z_\+2LϻF넑0Xw;Ü,IJi@laA{q'k%.Ґ-!K&K;KW؟8=X}<8~wwyD K@( ișAu] W0AKڭ1OM2i!f *CuSP7el'"!oj, o+4y- N5@iѳ& "-ۿUʬSk zwi8:OB=/VXo=iQ΃M[(a-2[#7*HG f4i'GwS,-fL.=XN.j 0ф?-hry5Bj1 :|qPj5FhyzFWtĖ>Qn|V`> !Cx%P5,fJFZ!Kx=6=Xi:+5YX~ZOQ&v '`%Sߕʔ=jѰ dan(3l@ֈ!|x.a :y*nGUVbxSNU|>%PؓcqMX\m;,(Ap,cޝK@+m[7U O5k 0uG{<6*\ *>-!}nh7Lά'raU0A# *>sjcZrjEMaOIL>FeH3=2E]H |pvGһC v!a:3աX:=6=VTbu0W Y%"/Z$C-%fg{?`H7vx<PJ3xNچ1QP?|i>Y.C$L:]^&qS6|*5v>{LPP NGR ƘiME{VHbLkcp }ǔN @+`9WXt ]-\-R8x<ߗѱkyjpt}Z\%_s\C 3_ ADg[Qeг<+%Ov0Q+=MN.V<ט;RBO InxZT8 P$Əzn-Iq[~cDMɾQ{ܸv-D`T;HN[2Y#6t;Gju:}3c-~3Iex7ӔG;G)5jjģE?t4^+PnR+nIw 4>SF'G_l->0=bW%9]ZjPqycUZF[BZXLQ!$$S]%U5i!絞a_Dm`y<2CbkoYw}spAt8$"e V7_GLB%lښ<}\ʶɪǰ:ɿ{V%=pJ[̢}~N7߼q-bt=K؅B Ww*>Hbžu0/$B|!ϼޕ;lף)MeE(CɿLc*zTeËzc&^"3qfhCs>Xf}KKQɠsN ehµd""J3孝K$Jjl?E(''sk98|Qu] -nbeKfAczQwq߇YΩ*S9EcA{_ld !%R{! l΢TP΁Eb{8pFKJ_yw~p+B/g{`ZBE_P&wq&ʽ JK0؆ͺ7UTpzb9I`j\^Tr##.~q;dTK,@H^h5.J>sy)Zۧ6S-< _GIFAX .7nu/SKVvʨg&^ȺX/v<-ǿ6'iU-ޙMꙈ/Cǀ!i.Zy';;TT<k55+Y9K G>c< ‘B Cdr,\cF*T dށA5̪]rWuZKorx+ݕ1e RzF(w}-O'1M9M Q!(gʛ5[] BOxyN,D,irxBE66>]PGCPQ',j)3 J݊Ho[P'#7(8Myqɤ(#s?d~6Q +n)K _H< q].C%o,d[A؍75 C͍*5ve)r30ZT$ٺJx2|=Q(X(2=e̴uAz/@䅾XxH@'}(ΙGBeXuS܆5mΊDl5ې_VbB,ᩅ|qetj1Øɫ}^`[.RK$Omx~fl]Sԭ]G~iorpCLfk7 .n* C@>iQGRL2Ͽ軌N+O:sP=)*ف;*g\@>e)UdT,2/cUFfu@"N-lї|ԿWtcyd̽u>| W1N_1 ~.c ĝw~ }."vQ:}gKJ26,0WAh5<.S6TM!.qrZic?N9 -v'2mN'LCc8PQjgvvЩTfO: `mHQLeh(8q纘|uiV K09Pb7_,|/o8tN ϡg=13Z=j AyJu@0]GIҷUӲvDS>$ k==eD _O$" ! 1CFO?;]g ԇ+37S ;A3:jދlE [1G&z:"]yw onA,:[>"Է[Y-~ .uM,Z㬩RJ˴>1&7J+7RhFHS)rv EzM,X?*&<?yK:`<]6~rd@cJǣl.hD6T:Bw߀ :<-Qi]>ւ=)E"E3:xhi[ŠS4d_Ԩa_`Jj?ЖfM_M̼C6t,[}7[Bf*m(zX7&לkQ`@6ύ+ ?(>=f4t#̣ ^T_)c2齜d15atޓ Y1Q9NӄLfVcL.wQ2WN$g)B XkٵI' U-vSI TU5=ʔH `!"3z->~OpU'vrvo[NrT?>fM,YvA*7Ekc%sz]κDS uU$Mz8*jd"Oû h0BBe= a/ͅh,%v"NTA^R[y".#41Yғ~(Pu$vo"8"pV+]|[\-H c0U+3Rۙ}@}X혯0;i0 awD+Mğ t^Eޙ)fc[bt|#Bp/׸sdA5 jXD'8uf^|.̀7=SB{$[VttZ|`$)T;dиQ] ȁ :kB,+YصwVZf12_PHuTS/e[(Ņmp1%x ϶a ##~MrXtѶlrKQsvlhoqۏ[,jCnIngٍ 2*s54j$Z s]$[+(H;-wzt@x^AqXVx"EY|ޏՁ>44.7~>Pҧ# ~#Zm7K¢KNϿ絰z /los_=wA*:B_>r>̑7VиUjP3! Up IOjԨV]DdBZI%s2>v3Ǭ+@j5,tI7 PD!ix ;=ktM5O[0=Jߺ|*/9/ϸY8lxe j?6䒇2;FTBesct-peU. uwv[c߃B^MM1kNT^yfu"X .' ,vqЅl5=̭Qê1]sy$zsao/I=X1x1άagjs1x-@4KgqNwy*2M >`WPH /*DA B9r97\rvl*p"DcǺ nfx kU#mbEjGې 6th@}mzXIв$4AX=F߂,菏 b@0Vd[8 r:U<4wk%QJH޺ap~:#޿w Xl>oFd`>=>wZJ,{bZ%iE`-~c`@˳9px⽗crAG쫣E7/2>â7|˲*~o:>ogu;vU 읎6|)2c ^ϺPl 22~iGR+iM%^^ωE[ТC<Ξ5ÔۙJݎ_^jUKB3R'a$=-J 2S3bfq]FUyᙏ쿽/W*tpqK߂t"Wa!EV8MaW10-,<}cQeKOя Ttw18nW%RM/{ JG?^o |nP*M{V;m HïED-PmD ^BrQXؓ+Q%3`i9U 8 O@*̱{CA[(R-nnKѶ6ؙ4YzܴaWWj4acHKH~Q;e-)U1.A'NpzdžP$mNavDb膚 D`W 9[s,˫ʼnReMS6$[ca l&wg^v̙kH 0:^nZ O=ia[*#i-YH^*e,zY` $hIzhVϒAHCWj$5ogzB-(=EMtS&}Wu_j6nS`'%C5hD8(|ہR?8aC}XR€.+b!;X{}T2}g} ж q{߷V@+N]$KI)Px#:p E3\ēM#a"ih^%S-ZQm\j0`F *o|Dl/Z"ȉG~YxL_z[+fлC/Ĝuޫ=+ B]|#!i 5Y.UO;@kB\fbÇxЕ}Bb' e zr-|0fb%b?YW}O]ggjk[{?]X[WҺtC8 ^֢+qW\ G/uQ|J,\UQ.'A*gLgYҍjS>=̡Nv5WKDb@mb6qݥo0_3&_&]eKsluRC @b igz ^Ƃ7KRM\)\MXY傜MJBlkvZI*vJy(r0{ʶf(-N'DR񉮳8hO5J!xaӅ^cy2)݂h:n4x%gLm}[rV+ezBǃ}a!c%$#%20dBW-&Of)͜ոf,VƱv&9D9q}@xHF]24'a)}מGE1$fN SVn?ubm l : εM`.* V-!d2U)9ϯ 9{&BC=$"z:Liue6KV+̼ {l95K*.`z{鴣v% e(bX$tC]¡)-䥴0(R KQbԖ,f5 |O̐5i \u%0tq,ANg"r*" l>!Zi,1%\ikXI z4oE HN?Aќvi͠Ou%n44YSO 2ˑlYfG*领ۡy'dt&u[J3g9ʿ |$-H9_鵷FusjmVg-A3/3c 7OGYch 1 /!!jn*'98'CHQv84&톨eע c ә3 re>Ƹ?mQmyPt;z) QfYXdnx_k%5r~zWt9ze:\rOZ ƖRB |>h-/r"Ƈ1/b25{rqh:1_"Sj X#KIo?ӂqZM&Mz|)(^-w3?^rVc܆Jp `(Em6@i- Mu2TO?> ?U^2X]:BV%4lk+2b) jL]D)=PɛeՌ2?)pP{ZX"=Gs8p ݲG Z!GWbow{^ܭDlҔvo mX 'K8sP7FW^ˆ?†Mf`NrPI bMrTGa93eIId߷\L^1c'Ăw?lDi^V:<cu8Mu]=xȂ&TbC54*4IQ\`xߐ >6C&T9pG5 |p^}z̹1+Q5;A]G]z6\*sNge oi%K7ňҪd]q 3g&n ݠy.8%nI3??M]{'?M^8#WE-^qE#𙥶| Wp\&)q.%_rdMJ U/:nV}M3=QT e"4hg:NA.ddSi ehq̓)q2~#_ցaqkdA樿!odBbe' uy&3L*>ONQc5jVyV@O !TÈSqwkrWb\#x;\Xy;)].jaAS*R6Cb2"l |!9l0Qt-x~gU 7Twƣ&̶'лRJM8 (7JvD mhHMD1[ ϗg; w\C(y1{7)"l7wQe>]Pʫ7RS hKai3#G+Ќݜ&gc?pq~Ο8+z_e=A bNujF1O~ 0GkYI'M6e%'/ S7Qj+vhJ2+=0`7m;֮ j aN58`\I [Gi(-}o[GAa7%mf+)֗~w 7]VRޣз AJYY`I>Q&]"S2'6|4X8HAȑ 50F*^Oړ}mS aP0=祄]=g/RwA;~`O]r.FxLJA Ewɒe"D K[{D{ R1NCu_,Ϝ#uݜͫdМ/`HI? _Z@?ku5רi@C,I_L(elLGx!rO}9[z?)ɶ<(![[0*5m=f+W૬7TΕ{rſџJuD:Z{ȩFO)62O*?/`Dpt ѤFM݊:&aZhT9oϔS0ϋLjΗvY`ذfgvŮI9p7ʏCLS{9 keIyojiWU¨O {(Cٲa$!KP~J}穋7+ (:n\})G3W!Mx1Z2 $t9{!GȚr}iǿb>Q88IeՂ`* HAhhGOATy&h&.jq KM@r @[f(;e.[[9I߳O?1E*`邝umP!U+oUĉxr(o>B#"D:-rKRX})U ero-~*q] 'tA",RQzr FVRNÂk:s1f;ʳ[rFz=l;}QT vU[JyɚIj`|U }-* Arz4橼7oŨ|9v}zAN"KƖٳ?k&E{-EXnϧ^Ns8? ɷK c> 녇w1K1BT:bIy5RS"=ĤbqV#h>I9%[¥]@]+G}<ིewRoI^\#jڇg ˳@w4XM348n, *׀ٖ~\r:( ' lƂ꜐caS~ާvcO+ ծSԢ:Uȧ/@z=&/Ճ@R~/Teyh̭#Pu[-CjZ|䅹awh$޻W#aں\bԤ6.s'mxvmkgEnT h1*gSWi8R~˷wMQpGdiO˯>̾pkW_ERUӈ/xMv;?:dEPA |x TC}Hk9`(4kvZ\jr` ,[n3Mzf&qxEg+vzvX/4WEmY =?K(ՙ[F)OԔ6Kg.qIpnjGҰ-cxYeSA%xS}?>#VwnmrDri6_2 Re@SNB=繮dOi9{<FCrƢiG3nHU55}rSHʺ[]K\wRbQn)*AᝎߘE hfN:~Y]oZe7yy X>2k$wiY}#!_PYt3` 7"ne҂7_)'נR—XFfH] jgFDbE~ҲGV4$#qտǒ@U˩|k0׎٬jlLbo .U:xUNQ͠rG̿6otܿVNiY4KCB;6H@ـ*J2RyZyߘyVO&C(@[*jjD@]48 r9iNOAY=xfHFJ3@J3` ڼN # Kr4!m~0ojY GLe(}IQ48ueNKg!Wπf"h  \7FK[heo!+~KЖbr9E}{4<e@f2MPcxFШ ߴmqP=:9.ݨF0{һ;tܿTLBaSŀF(iQNמ1GX-m䢁h'~ ZzǏ`Zѡc~(P=n 1-'l"2y*6z)a?`=slS\3c*/>'}.K< 3+߹bDz//#}J}?>o@4vލ&'61{ZF<T0$ ΐM+4:~L3ƈ<PSPQ:ʥȉ7gϞq@3!D l |^Uܭ _/:RgiAf [nbI?oC8k-B*)26 {fEB︐\59 B+vSJ};bZxLWisb|c8Bp}% np5}LzF^r\b}O$+j'!ӭf7|<)ͻ} @m}KWTζ=Z;ڐy`Qtdk@34HxR{ |G,| ں={g,/C<Wgk}<>j5V?1<ԐDGƚa@ T{D] ޛ$BdfUQI+\DX%Po^ Wf#3X-gOS;tG6;TN5$@OVXˤY4==t> yDžslpŠrzott )&x99E1JbH\-NJ9s:熷6½hFhULTFk7r*%l~PK:e>QdNFQܭtTB'Xe|L}::TVy=<wIM ":\. ME!{>j7 Qܪ{䫰`VMamZ+\:dL A;`7fFY'?5G`_zb^Xa^ؼC8[37ڷ&ȭ%vZH 9H/[Woer@!'0>+=o}y{CDuv@(o"{<Ɍ33BhE9H([WK]L L4XUa?E31gvig0#M?73@0@kqu[##ud%">(V+dEVW%a &H GB҉U{C*&;4pNE[lD-{Ց/BNEL% jiӣ-#Ț܆kq/uݱQK͐bQRҐuAߪ(Mv5"ȡP"_D 6QHi2jWnE(iS&<pYR&ޝM= ևͼ+w 6BG_oscy2c;N-fߔ>N' 6H VѨʦ˾&A֢/Y-5 PBj?^_wn881`HJUjߵ"i `B<#]Pw2ͅC.` wLz(։meE--#ʘ!  JIC*}/0[ RAT)"<KAiZg1)1.9C&O9`dq8[;xnZX DFZ`cR 4@dDw 5 cG2uR-ɻjIVMjlг^QoW&X8xǛњĴlNO`.ePM*WiUyg(nNvr nKkg*kIun2lQהo?O_QAwQqvSjJ}];tvR='Sv[֯ו Ei3vr?[w 1h]6\e?i3b*}:?O$ Jrb~, +7wGU̒~bbu}|9L=rp+NMvv$3.jF$d8fj@a1b( {ąRMbw;HAHװidA!g YD{q.{x3),zb24#r P9AS~ֳ"gc -[VXtF5zbqPQ2p#҈rf@'dvID9٣]Ow.TSrͶ00(Cv0Yȼ1,/VZd6T{Q܄a GJr2) *Jl*ZL]+LŨۢhEBE4si5]| B(g0++nvDr>Ӆy&N4<|{7HE5gɹa;T~^>_I pHӑ2pc\w_:f1υd8BP5[B; ~k)[;2E,& bTrIx 5߳բF4WqeFW)o f|`B\qvB/)զൈgoB` VЖ&vϊ덊s<YG&yuKi=ۨ\muM,U.Pa&<|qtluD-.VNi` "] ڡK㄀͜s@EI<`}6چjSvr'?bHTqj.l !dVЕG}ˆ\cPC[w3_Qc8r\g:YG:(,?3Url?1،7=edʶD+ï)+1T /íI&tnE1*Gڹvs`TJ;J_ʆ.P};\/QXl cv{P%gڿgU_-n=.ExR'wn^QMJ{6 r2 ~ݬ}y?J):)HrfY)?L ڽ"z5R&M'á~PG/#u%,);{]z Em ,^"۶ Bsajʹ [n.A1vTLwim'-@ƂUZ=sRa+f/Iiz[ *pNh8s!x/֨]GAƢ-/< l"JRuW;vՀЗOt h7L_Mۻp5TOlbz}rk8[i=c%t"?COǪ~IV?e8ԹV|QS/<ʃ"Ov=Ih[>E:P_loedgMΪ(^(OKfY!F{Q %uԥ)kjjPddR?-B'\>d/#rMyvH2 5tHȻs o5f}'pYax+eՉ*Q9.nꀪ5 ռ3P z"X-nս\+n`!xnY{y+B-ESޟH'j,>)}rꭎfh@{IY wo?U“Zu.ʯ2zc#Dv۩,g)Mu*BcP]S#z phpWxOH (pƖy^d=/õ5]u}-aqPSۉlnN pGt9ʋiEQpaſ@h s`8#K|%ke= Jn1j(wr:]G,b jLD{& <0𪯻mS~5O}u^N|Yok48Xd0>)4:Gp jP'kw,?42VmnjK yT%By7ni`ೈ6Oi,4nRa@$V/VhCv;biW7h5PX|ÊW;ÜH9QU(A9KuD1Łu$__L!4_p0f,\m;WuMKMF5=YKSWn]]D)cQAq>ËP~.Hi2LFdң|$1֍2<{?Eʂ D;Yނ@MXғ:PP1CPtm9t%."Lxc˰Lc4hߌVt m@4Fsr=@ՏC [GPɫDnh61QN_gE-Yd>z79g#  nɼ Al@*wL2< lT"$hݰ21Fq褲=I5B]^=EpDg=jq:ʩx(0/rI%/=xǶfa6ؠoQ}qg%YW3cmj9=(Ug)"|$^l3PZ Ǿ'%󢢦8P3j 'P{ a4&eu-*-Bd%]b4.x,=!gg$8&+"[g_~0xI|(2E c& ΚABنv=:5FO,!>{pSeX 9/k=8QH*Vk( n#byyXXbH |bża%PuZY027 y^`·s}LB y~o^U4)‰Y|ӄ`p5ItǠ"v$T)qLAޜ-40WL{xУ)Ոj>A@6q5\Hٖ(5J#}fKliyݕ/FußGԾP`sDO(o{ b'U:Sf-qU61Rr-4^t9cpNZ.1&*nT5;ՈC1Mf/4~ןGt8#am"!)tu&8B:a bΤyH4s~;~&PMpPFIh OI_ۜӠ iGP|m,q}gvMڹ)\2: |=F>ZQ\9 ҟq >٠_,c.jH?!qߍX8C@^]֋-49SyO(SЮf -՚ɏ4-8XA}YIO ^rISL]?Zb^!u{b1Uz٤$Wwi/9\x{VUT -t2M]B޶,aڈr3W`t],`ۻ^74 \#Bođr h=e; 0$AO=ln1GsfRwܗcIOg. 2) ٥ɔHB"yeԫLQ1uN^XZ/7(ę^34p Cf|l\IG ⏱!ԄZ:aZ0;ڙyBZĊTnu0L,D *g>Aߧgrtݢ+L"pŮ %E&F'--< 3CaexEr౓}ٷWDLa>_sعQ(Bo| *䨾[KŢ $CY3̰L ^+aBy^K,"̙k6pKskJ֟tϸX^ QRcPim5}+E)V*9bi+3bEB+S3EK}B."ӐqZDxW =Ptυl&K1jYX`X)&?5Wښ4N\+RrLΚ,b{;l&RAs 耱t7/M;<6"J^6CH/##KF) }Ԋ褑klNZ5ͱ#œ9&=8q_VM*To]+c:Zp0[`ΩգJ&yPړ:F-E^LRoԀ.A[TDşPYb" !NMZl+S郷};*jӨvJ-ACVz7rHp>&q2Rkc>xʉ3Ыn7jGu < /F68X@$*w>ٜ3Tsl"Zl y ¯%OWQcOq)I:RnqZN~*s듉EIlUN9y̙429&K[š%*T 0+bfQjTj.oqӓ"6=ȇ~jtC3}q$h${ ,w.RwbD'Tvujdmeн$0#Օ>i HJBU k2X1 .a"mZ0ٮ9>Dӏw7\lKOD;6Jf-U&AaE+ׅƢ4ihk9+*}QjvI5buMpsRE3>P+Hr=ZH35Ug\w%bpq\#,xFj8Srwcv)V /Q_o !E '*E.c?lI'ޅkߊ-;u@f > TD~"|lk+>M7*Rw\L; 7t6tJQhq eG=; -@n&8'>r=Z|&/#4 Va#tǀ-)fܔaORzg;_cY{>OpS EHRNL0;*>y?/yƚݲ)2v)LsXD,M*H(v80,Ij#^ u;=F=Xy`1y6U"]PBpfKlE*iF 0|:4“1Uʊq@~ۣ'EZ!N*KF;)N+S6>|("G(_c_Y m=]{fsJhe 5g;'"Á  |ۉRr3]j̫ؓe|,Fr/1n`9s6-'{AO}G ۬qq̵ߟvKu .]sUvS[ 6N`Rf!g1R\mKiV:^_A{aQUoǢ`ƆCL$ڲ,YU[+wFSC:˒rj ې*ahH~w&GzVw>7KܴA6)gDs6J^RE JbL({̋*8|n<`l0/&$l!ޝ$ƉQ'Y{0 x\~PVyqmNg^LjIu)aqoK67`M{jOfu lMǚZwUHJ}Q}p{\b__GuBՃ$橋W(k=jƚ)#'C2U Qk(.]CJ)ӵ',oNAZ^B)T5&;-,Bs5m j$r-(ף Y88\=\ܚaܤϨKTӒǕ9BzηT|!̩ړcH:d6 ;36-Ȍ+Gޡ^_9E\̘'O٠%`مsl0>#CgaRDٵ"BCZHD 䳎ujSf:y ~]PFY n>iǐ:}DY~Ŗ>=c-L[z_VMT.q'jϙ [ΥW-~̀\jdϒ(m4 U?%9g9h"ũ84"=HleY+8qHcwqdsXZ~߭[fc3D‡)FpSޓ ?Gom궼~@c5AMMx8|L$᧤γ`{ݡ[0f4`=~imCay#ϵ^uQqGԜ¬jZn l0[s +67<>-Vr6m\h}ãڴs}pb-Dg~ka2;XGp&%ed2 6HKS/5ݠ #읫qڝեSіf)8<-/nre*F/m;2E*uIӑ$.1mw8S"¬>1yn3djJ1KC[8(8kE'{Y ~:·a/yȑ`£\>E\,Z EFhSfbm̌,W5D}nD7##ָrSvV"_ ڍA&^wGׅ,V!3q/ >Ƞ2DӁO+/AVEpK܉  ]q 53ݪS)mJ@s%=Z ą8%s ];s ':GnۭUHAԌؑ- q}M?Dˮ*J^}klٍ#8. 2qNܜq̦qI}q/F[Q!_9MD pAP&ސk q 2Gf,OPtTw֝sHq.WpY,?XC՘NH-? -BO[rgq;vgTIbLΣ^NėRx G>!"0HF"MnzH$ UfНMpXa5~;TPe޻wMhpBi`cgGM\"wܱvHA쒌V ә*~輲0[JeUg&.Y)r7(gc?o4`Bٻ^EWbٟ(ۘ/H\Az}}hÁ[G>5)<m?A*,Io"DAuD5H`E8«s/r%)20Ӌ-y{LmCJW?q)Yx?wbߴ)(#F) \ "c!D.ID ֋>F֑1˼OzF/*< ,{kt?f菐)ulyQ2-"y2z|Sf2(gVHFX\1`{NE(SS0P73&f"9 F?5v@2|y3j-{ 7nIy}Ͼf(R^{ )'~[>lHf:r:U(@ d4.or0=%0Y P$}'  r|~Ws6c;f mc} NQ{]BDҐ!/ (߅i> lom"U+Oݯѓ(i<ݟU525XQ ;Ct)`$ Iw Sٌwkt-EenJ1#47iӵ5A֟U!B˛''7gZ\E1[m,!KNQcO^, ?.Ptq_-/>aг\¸c+H?$QT_\&Bws$t4Utߊle{L 5EIo""4<n!(+Ox'KӀӢӢ́V8lv k̙<4 KR8C|^*)𿩺O'㴎7?XFwmhnr3) >Nu|ҩ3:*$z:Mȗ册A&¢W|#,CJQ<5E1nFIi_@yG40`$i w{i⡏N~K (O"R @/x+p&te@^}2N,T9`yk}^מLy ro_a2zfg.F>XR? T 2KnQ^`tH3,C9o!KluHa*f䠨ʟ$ n1[: 73jj&V6m>:˵z5J +†ҚӬްl+Aߋ-(`9zU!+u<(]+ʘeģ̢O +Je:M^qd&bz.`Y;̔zmw. 8ƭM4cS<=ol!CzX_ogsm "}"]ݓixKU\GOpi4ar_h& C͔?c 9&Hp;Wng./\O=cq$-N58#vq`@(w9KA.4z7]QЁ)h"/Sk޷X8 PLc1z❯wg7ԍ| zX9"&vr4~V1QםZv}hOVrߑZH0-:{t_,@*BzNy8m I%؂F0g3O#frC$lNJ~RٷNO0޲d6c3yE5ęk`UD"\BLAp4z~!ׇ/3b#`|7?- V+!siJ >!<#Hz HT` ƔQe )H0g Rܻ=Y(R-Ba!P3wX:nm`2096/rp_Zo4 Q 3ܪhBL9Y/3uٟ"5[U#πz©zKE#_Ba%&^wpx$.E$= /r"aoJb 8znjקQBUBFZ4?AP6<.FBjX~M&5OY *'0fw$ŤG0]vZ rۮ9Z"f+Le4J{2?a8&J^~T F:wW~(pmdc1(_#/{.T&N8Kc$*}AH,I?]>\/LTQnKy2X¥I[+e{eWry]e%|Kb>cELZ||p! JO? Mxow(&ۊ4B?YW4N[zcǁf)mr! H0 Nyu5Mx(rzL@ɲve [/*XS=}`_|ֻ8Tn[P=s[dG& fp |g|a[hN .UFȭߑjb: [N8(;\5@z`qEʡ=̷p@XG$_t_:;ik/,nYXv@9,ME!(qUI"$BE⁾tEyE.TTB/5g!P@5ܕS#O`'⇪ӧ.<;(4f,ufMfVa'F- 'ہ$ aӸUƶx}i)O ("A16U}L)Jcgvhu?rq@wz55ke[6 W:٥f"Vء';]G# Ac,!fRX#!|$`iA".̓ Bq_y؇alfKb|3tdsdlV"1s#[,P~eL)@l`brVoSPr7/×>6B0pӭ-Xg%#h;TƩLRr4K^U {[12>hr*Ζmˉ￸o 72I5Z"-<-%'[BܼeuP"]we`P>r[֦_lDDkw &$z6t8[yis]8^-‚J仃 NuXowxOZ7ڠE} qMg=|n{3 硗EC]_3뀓s\K;M31$VvqiXfS[[AcOTZx?~l[eC9DMRb#u@ &qy]}QfӒU,nw"m7F^RPU+ݒ7A| 3 mRE\Ih% nq_:o/XU:BriBRM*u\=‚G J_1/sd*,19׹"Pbv\+i;OR I`^O _yh]g:L~w6Ǝav4=^q;)n9 2t1B ~!d-# t߾뾻=ɶ\sOޖEp F[1RLlD:z l>` 6j޺ Kz.uC{EQ(&%Lb^r&u30vZ۽K}6Dx~egr,Ǣ۵,crx \>PsnFTuc땄*=N|NE/ )r]yb=Ph)R]_oG,pJݵǸk;rXᢈ){L`>J$đ{lF>_4tKnH'rlz=.b֩3_kfMaWfBLƒyӞvC'l?Ea])&bOwT&M?FP笁U8ez\ CнGK qHp[]Jz;n2MBpӗ }"3%yqjӄ֎(n/PfGnk4Fߟ,Ӈ_nBBD|u;'$`y<bK-?n*,B-nms%IzVf^K^\N#|YKP ƲgfK7~t^YQ\$sa\?UM!4;R qS?GAiGjRĦZ"OA6[5N>B ޔr;CdI\q R1Y!EF@s6]%' ;?;SĎ43S覊86_{Ʒ7G!u͖Rq8IK$5G cᥫ QPn6zB!1aR (ӫYG%/츕j)p'-0S4D>L'lJ Xx2Uvfxh9"yWj }}}aga}d?o&pMAb % O #&fN &8%50PxmZ8`f?&g/3lp-v'C S<9hIcPM GM!䶾 p H5 (9b+4U*u Bm5o zjC,Gw=ߟRHfX5μO49yY+m=JCꠤ,<U:^I:;J٭;lW pWuFƋbr]j C3:I&n{9g+AtjJ;&=?pBo~\&(̠A1>-𽽝րt@%~5Ԗ+|͒Ed*eiE⪒H)I+B칌tNlؠ"q-1W  'hS}ByWiͼ_F6 Cb;!%%؆~翳`} qʾc㑄 #B]Kx?&ϼaUFf<\g#F6cکLc돷Ƴ WtV<`$r ~[D[KIA6^,t79ڌڴ>NSߦkL(e]{8YA@j6:"=)#ֳC+KZӝW-^^>F>ӑڦe(^9bD%)H8iITQ Svs? 3ҁ)0)c r?aPB7mQƲ ah׊J霦Ӏ}V}bjnDY|~:Oz+E`K mO1io2ˬϑO ;kԳi?訾goyF'g?R ټ p$f_7 oWNE>wu#XC{qåFf¹4(h#I#aO|*g#mhz) |љʻ7>*x?tM (&$HnZ4;$ Jr +&zn'e[ xӽc)xC `ZQ,joW+Ԫy6Iu^Vf! LRon5@9\Q#şQX]n"YD_b1.Zefԕ?m{4Ә+dm" >7m;ĝ/gog6Ywiځ"Vj@ʥ[4,D "jP:dG;jzK&`z/c~s %b^~>r UGn+g/pXؿd8ȉ',wYzŷƖS0o -jp|`Vi,O%{Op'+d , (G?<_ؐRBpVBbwgcVWuzHQLpI@%v9& V_?Woڿ.B@ h"_BѸBlУf 9::^ZBl5ohIAdb?8 M j&U]=D'][O!u+R"-tu0RwK}J6$8ꄏ5J*g&?3vRZ |GM2e_ݯ &, 5~t[^ȻpvzvFM|GVh:/CۛppāhG ÛG-0a0+;SrJ@Vx-J&tЪ *.Ѡb\\/8c8YՆ&`!Ӹw4a Y[J0u 4*K39yyv(ԑoŪa׍){_aaunb㕿_d$os&˫:.6,:BR0KXg>ȕ]q\J֤V|;vfA8ѺN:$sף]5`hڍS5Ovˊ=`PB.![v P"{}Xԥn~VMƹ-C10ĮwB>xO92l q=50m_qp&>*1DQ%{"뮉LŒy $X\Fmx8 ;n;=>`mǺ#5ΗfA)2וS̛jKy;ÇP ->!d0ג0u#E:g#o[Lh 2]҅mG  ÀO,}#۫b f~A8_nS>1wy6U^ ĻFLE%DщET͖'J4q1҉,tyNOD =r(Zȶ̧ٝd#%T~-:G i]>FIk'03GgIekehSO#%}%jzQBI!Sհj^@_-mg4 ›EHԄbfؘb0)h%7'ӓ&V2-Xl!f^vA\d>VٲvF\OӛX㑃ݾM'a td /:g/.wg)|w:$v DX,Xq8\c`ݣ ^WDžH(R<͛:ȿY5C[Hc f#ѩA3[kmwt,a p\dlNW6V, tV*.6Vɯ,-UiNxb`/r'8D$"]!Ѡ *etYN۸%spRtnsNx@`$d5n`kɮ #a b.>@G/4$ݤ̇XV<Ӈܶ8Xf>Q0Q̊ǀ{ \*89-:S ^Iv%J6߱^=/-!Z}EZvj8I9:?P^wLtЂ0vD]:~;(›G9HK@ځ0q=ۜ T)d!й ZVsAFb4qݽǠzR"Qنś8[hJH_|b`Y/x5ۘ2[qO9!(f%)]SO;}TEłF^Ѐn/R.W)l1Tϒ}^9$NJ{zw4g2wS M.'|aդyxҡe TB+U.i$ŕxh=7Xj)!Gp-z Uxp4819b9ìI$}~?l䩝=ŗp4|\U 4H܆VQ73`U!2Gx6?s- rΘ|MnT)yEEo0_R^q+b vL=+V 1 .$Xw"#"kb(q-׊ܫX Ef[?Q =q֩tUzLJҊHu1i.Mev 5B5 kwWeƲH 6}F]iO ` agLȏ)2VPx+|̻d|r e=TjR2[Bpj-C6VeBۘ.^Bۼ*I~S_Rű vtTosj|Q ~EުY&x Vu3mā ( 3 =1Ro5 r h^aJPGak:yFa}1IQ8.@!FJ@ Ip6yS|Gb/C`M~4!EG86{ QYpbRTĞwf]#2|$уXY8rOrO:rP'Xg 6\UFKJ4en'b 3rQc^H?>r9{"z=pwXSoۯ6 K?/G~+'TV XWPt#1Epz7d##F/`2uk'\C |;Ye-l0 9vlY\ v&yBMg7XQ Ԝ:*{K@~[t`*t+oT!̝RT"uCƱ 2q&0G]{Fu-1t| I YJ&ȢԘg]dÊ}iɨ_eN&UE피qw x`Cx#qX!G 21#9ʶt̕!p|Y_ZƗU"v, 2ĿqK5d8ן踎w%m䆽=;0ω|'h2V, \`o]Mk ^ )n#O]*!WG5"[}wa4hF шմoG 1KPYs$ mZ0i-Z} Mvü! JɩR›Pq?Drڋ- !$ sg 'h#'3LyA9+ ͖7)Fb<9 [1'#Kd T}ɅNb#*x{-!}v95Dܪ'K N <2IsNi黕00wptixXiZV?hQ*YM֔ x,9#'mپË+QqCg۟5[Z͉bs6-[0ŷZ|]N_1rõ0ɦD =/ g I_nW0Iz]ֶH;l1B[ͭDo^3 %I7jALvv:y`kxo%RBVؚ>QT+U8"kq/KÃѹ0nr!W*bN4ImFs2[OiC̔jLYCBYcHW1MȰ" /bn[ps K",hk6fE3y2h}R / s ^MG+@5vm.Wޖ% gj`krVjv ᔏSIRLҚw(ަ&"A'.g>B| vz}Uu 'eo[jC`:E=du};AtzA!ЩRty*u'Q6oySd@x?ނi)7x]$lXtOug\Qu#"W#6mcoA*b<(؟ PƽӂLQzcHLao)c>vdc2W2x`).iƑ$GE /QfD8qbS0O5q4-8Ǿ|}1FUN5LKS7 8^猶(Z8'nhq/Nӽxb#7 k`fmcǒcD6(|wٗ7]\Nw$ Ãlmx!mf5UQ,/|{w0% K?O@Ɔ}-؛%TFK(GzoT޺G|%JG!]:w yZ .Jڜ5uj%Mxtr!Og<7O6MfC m)p =ސF ;ه=7ja}tj_l+y9Saʽ gI{3yJ+4_ÅX>v\oLL%ϖ-dTbjQ]PvP!oBE;2E^1̚|&}?ORIs\)ݖqL9Ў~~^ZwQ953QC޲vFg({laFC,A3Gyeb1 "|9'he>|:Ez!4k<#8ipf{ZcuЯ;&=)B:闽0ޤF@;\c9P.>x&BHVWS!̵z0&D&Ʊ¼3b&e d:ak@h]Ċ )**EڛS`: ${Etƒ˪GOcJiܮq!Q"$hjxEFWO_h|⻭dX?Y)cu~S%S82i 1qY_šW-p:?1%6Mny='ͤe>XLK~φ:0tᰧX f xսEᐢx*15-ҙҋص|! 3 kɑ\Ξ%ͳbkҒ닕*µ^q}l@aÞXYUgkF+*KXUjan<&6w"'vX: ~b(|6dsn3ݢl."}ޥ5f\ę2cY9ɑux?kLZO0D @ȍySl7g>^Q5G>~vJRzk uydvrf4'6yb6O^K)!ߢn^21ĸ#vĞ΅Ȫ M2Oy9-S %RJ5na~ L.B|Ř{67Kuu]*>Fx.\5E`i׻efet;"Ns=*e%d{_h(a;ޑŊWEOкXžA:Mgi^}.S`\.%05csXF9ҫM[>+O\]ƕC^ߗ(*R)-iw|,vS acy E%|*Ni>8/`4]Y5l%3ߦm%(7R9IwŊ, R y*Y5*ZI?|2NȂ^ee,ز2 X>EsIS8YC8ݒE2fL85yUKnnEh7>̛V˱bѹ  # AwS19ͯ$5l4e&vj>c'F+Z\4tQQu MrX\t ~K-ݗFZ}6~CN9ωU% g?^$@ kwM#ֆ(9l2N-TOcRcxqN#ꥱ~gߢX*9☁(mR:Hv(;?F]"TsE\@ ɯȫq[jɉxP+Ĭz5X$k[]xb[Do81gMAkX^m)} Tx,G ")xaӶpS~{c[ r raUU!&P/PzuiHPы8gg$j{}ab?@2訫i\!gwdf !BT=sH+xq i)Fr)7Շ 6/4枝@h2K^|,U* DNd# +.^?N]4=7<]Cd .n0OzʧlQɝS(I{4ሑM X8 }IH(9_|ԯ1aGtWioL"w| ZQ-#b,<~cj)7h(S0?_QV 0 `¬3 |BR ڨUUC)]RIUfq˫c2qECqLq}V̿n, v~#"6g ~y|i9nc-^R{qwGSO "TAԠ&pv+=q IEg 5M,om;f{Y9 FR-{,FgL,%$G.0s=%v{` :pI c&蘭 {I'E+d ,Y at/K5yB[6Jb}j81+4Iķ"K~F#st-NVzʜѪcEg^5m.V*֔5 Ԧ-WUilƽø>(XNEwwM['!Ic!ai D/Y_yy)k,a@ avyg^FvJr2yyDSҌ邘jtzclmEw@5뫘!_鵺. Ň7Gy| .ue kVb..VmqiC CV'#PUۖCE֖]q41*sh pOuM--G ]G@3!ts^CJuyx?GoG, əs`v p(* PjHFZ&-U$Jhb oRB2. ӾJUeVXf06DXoVh]?]fdY0TSqtݽB!ٶgkIW30>ۧgowc/!8 <:Jxtx< zl< )@<+ 4`k"1i5 c {'_5+ybo m ĩ'ak5yJrWԻCD2CQ2! \l7n5oRs~D,5OLtvE/6֣L2Ō7fp&NePwBrw$ԂRk}tT69UԴVP7FB]c8W4)TLg&ɾ{SiB Bf g48(A#O5gv̜6Ϝ]t:-^0(Ԧ^YXT7E:0-U-.MsԼ+blY*#Vm-O ^ Ϩ,tMBa ռ FeV˩-ltezm܀(vƺ!Asb]x.皊U5 .T{!1 ٩s&B = pȶ%Latm,*gNGiI*M%0.#ѓi5> R"K ,f,\@*+=p^%ܛ:VJ_,~\ýw9~L0s _{9W)ɊU{"؎D1sЍ X_]ŝN崘KH|VwhmؔVz 6S"0h늸|yq0J /'vȓGFZ(uf@̋yZ㢬/ی*bxT;+vey [&:mA[HE 8B=]/s/ 1 sqpO\RE @āݿnsi;t7c' 4#mVd[ ֮e+X` ynf0nbV^'kR}Hz.ql뭙vfpEĞ^_|% c4W1xxL&X="x֩$`{0 9W<;ZáS8CK2i׼&ZcMg7Dz"Eo+%G+Q@o@X~o`DϢ- lU@b ɭb+,gǤ3 Bþ;>iN]<@Xa35 .E:~p^)/g U$ r"Z(a:(a$b0(P VSSʐB~/}2gUTDzǝ}5z6?j}ih\΀Q&]_^eb\Q4/>nR|r.C`(O,.Ppt*aj+Z9Qh-*J7e;\ -Tƒ"߬DlxGt~6Z[Wp:F/ jexB<ۃm=hz-La,ϻ Z3FNYa5 -;#K1x%QR!')Nαޞp<Vq/:hÀ•R #uDjJt9$v%!{>=܄Xa~gj+S3/"Uӕa'=6O*ILS{aX@D-6+Wc1Ԁy>h[Q2| N [1k$8dfEb\Rw 63dF,WvpAw6v-g6 S_E <1";yKD^K-ΞC`A/>.)}ylFvyk7%gB䣐}PPOW_K>!3K)lWP%%Y 7IPݬl;;0eWiY:Jt|{ZKHc$40{s=GIm*uKQxdq(Up瓷rKNp) ^n7QbPwx3t3;Rz;f Fk>_- z}t爁-5#TVʤwz,`?eerxnj`P]N`]8uD[I4 m k:kԤ>pq 4lѝ̪߱UeĂ_u-SXpp6?{jj[q .dba"8wwTN;Hܢ36v}&dF ˎ,UdZHpA"]~SD3XHGE L# J,BI,L β̠α8poݤk-Z'  Yg ^!-_"f*+\[%:<,E~ ˶-yuDc{ p¯CH=e9yts?3VooiEOvZUv. Eu3OVk{ ceȜ-S^) ^|rQc[/0ʴyu}X {A^n>(=eWi)ukrv >|`l-dž_3 Ah"6qR̔gP?S?עr [CUFZo*ҖLvRs냈n/|L{dVv{072]=@^@)<4B”<5K* X_QiBNMCN5PdUaVH L4ٰwʳkRhk/ϒd|/3߾;Hɳv0w⩅0-uìp Ɲh'ۓ `9E]4~i$^LZ$YnAfH*C*Ejw܃N7M`_.:!PPH8?,3w@rH4Ѝ*¦mڲ*y:^όw5}(Zɳ0z-!Dʺ&žRpװq야b3.n+%~qHͨjS[EXE v3WBOw^>X)i1Lٲ /X%)s=j[2hd;{3VRhO=D*u96ʒmاnaB=03ucR}A4H !VSؤȤ:(Gx-nO}HIjlq.<7)Jt|X QwiCs+Ohj?5V Ĺ#2ðQn#s&m%M{p^| g# +lLf(VB)-6#' !Fty\C̓2!+꩞ fI /1JVW ;:Nm]Zd% k='fTu oE_Q?Juu@hۭ;*xCXPfsO=*8vt`E&MMsĨl b\ۻTm2L⦄$ͷh;>]554ɋ/H|S2qLވ$ƜYMYÞɰf$xv)#~1U!8|b{:k0h↑h/rZKz혾GR}fk!P,'Eހ3yZiCہdv/lsnY_ynPHn> *ů YGYigt&j&EkS,ڜQ0*/#׏ǬkPp2-J:éRuRlN*&j,ܺpܚQgw~vQiyaQTf$,^T3I#@knyygG玝Ѡ;Βv/lM}"U-f9⥐Z݀K k{CÌIc]>ڱEٻxF+n@y0W4mI:)'!ڶs)&¶oLɤ,WR,Œr#nQb.EYi! G /ggB͑- tI*s+Đ$a>wfwczMqfaзإY0LJ茛ApP v$YaPLߏ)WWO\wT a>H1ܦſy{RYːejtEOf`Śxea,cYdx>[E/ߛ}eMLEDd{B[󕤩ȩ.[ܬ2{ 84F骉m^xl= +JRk}R4aڕY8;TPncsNȘݦ^Br bp!C.}@ix"sz-%lbjO.MB7ǜjKaFq(DbkD̐=~dPFpE.nHEC ;|xjR&t'işTQOB?*6q xfPןtߵv(%y&%_7&qWsN!IERjyFɱ>(xkAaаי6EuyOUUmNo6Q&|Eȴ]7/7u> uŏ{+]t .F7H2Yuo"NU$7Hǻ qiЙRwzVІʺxӊDE!o`ɢwg6Nd̄Ǝ$M NP\ NTP]6a~2Yؿ'uZ|[F`Šj`P O $g=ٔiցQ/7#VU_5N 9'ᗭ{rCh=l7\ܝqd6Cxq}q31D;.@s[^3dIOxZI@MH]`⁏hJ ق 1Cթ'm F//ox/QAMux~^~۞?%[saB;"fQ-]ؚ)(uqZX[G\; qmZHqв9mzhG {Un%Ps c|fZ*O2 T҂[q OUpУ4nCxvƹ !+mz9^v,jۀ*k\>PD7o^ц`m‘!mL"7Q 'EKk8gk{8=g//Iز.N|ktD,P"Blk|Sb&X?g_Ү(/xX&ӥǐ2 OLm澶BS$!9J:A~6xJ==h߮8a廦F> sk0w9 -x1p֜ju'{ˉ>Aj&ķ"Sѓe*=^ͻpsM9˙*HUzn JGpb؆-6Ni`?\NTH0w_!s:c;YCllẌ́ oXC+Q*q1p5p6{~L([)욵T/ }_0  ѽwL=YJL*es.6^YyD_!p(^>]c8_MroLjy&z -`Cվۮ ?vҠt<O/^u}F Z}v߄Lbj)t&~ l;y ߧvd yiH%OvM [淬WМ-յ 28O9ܡ1 wuc>JM0S&*g`ÕS/N`Ɲbr\(ׄtݺMQo^2& U "\Bz.N[=TAhf~;}B{@\Hؤuj:!KDJZ@mFP"Nv5e!P6Q`ёDyYEJ^# HVd'?H]g8s[n 47E F1Tޠ@[99[H8=2u)+OEwØiZyե&ukxqftAֿMɛ\[j!E&jt+UE%v@upq6^3↺0w)^Q<.;~S u'ScPT5 }̥9`isL#2h}m,FVf.\WEī` ^?7lt;Պ_6Gp x&" ΥN#]ThC׀vˣC6č1uǻQ0~/PYTT[|Ƨ.GZ0vQ)ich[g@X'~N[0ps(|Nsf$xi y훂jUs VE\{f`,f'(L d | c2 ",?9_t$*_I鈲;Bi1ڎ: b.$FIm3oА9KB9]M%/ʳ\_t8h/%>ՂJ]DnR\I7buVe#,(^W5w<cie[_;\yCWXLg:/5m!t#*lQ)!EB;~,z/ Y//vk_ S;"9ɽ ykL1t}2<`c= k^po'JR mڤp588e+ [800շHeB ,TlݑD\Ȉ%v9Oz/U*z:8&gw{ߩl OK5vRI@TGҳf@݋\뛼~ΝZ2š9A>_'pɭhua}>kf`lPDyzqV~r&$2VhZCC4 2m@,P.yP˧ݥH#6c&KX3-Ϧ1-e'~SXNh͜G>n#ԙ9'("y}Eֵp|xu vz\Sv]xOTP*5"FBj+'鿂xPcN>*֓b~P!l9$i9K9 07#DD]_| Le|<,_J7]}N/$pDrN.H{.ֽ0,>ܿ4MrZBs(2ͻv_AV>]AX|C )0v?8Z+M:/3؃ SL-{vrb 7dWmGϑ+!q'OqMf.78V'y'#wEmso^ Q* lWϪ>bcj)[f"yAU3Zs2H-QE j@inQHD~=kQ s3,4[Ώb}osM+5h%~U`jnʁkha&FzW -~v[vq^6{ F {ljRk;7ҶD4պ;bj,'" rYq }!VL3il21U\ǖ $S^Lgum12nZīmi|8 xϢ ]y'P;ο۰7K#=WfNKЪ<9Gv0 95OɬMVu?KU9y4&Aq#U4>|a0e/,kl1CML|~h$U&Q}yiy^GaD()pۄ.wng3aGm٭[ 9NKyxv_'UׄO-:Hh=:v(Y..֏sqb}Svzp^oy'TP\ZKxnnp+.%Uj(“O9R PC|ڙwM[ycO#j]I7`"H( g_Aә;8Yu&Ȧ>+ Ù@;m~<֌*:w S$P*H@?9/X`m#6łA62^EfbH-nbԛgG~sAPkX0{1hzjbY"3ơ*ę(3A%u;ϞjVZJ]\0`,Xn,?a^/ZjH "^'m!'s׷os')4?7L [蘀ʭ\gND%=濗mgZn=h}Au$&EH":`/d-$= ͽͳ~{>g@D-{ILW.8RKd n3/4za:֠OxA!ƚ;]GHD+:ޓ U_=4Vnlxv"hÈCe[3ˌ`OZ%n:V&,xŌDombBP-T"&rtx0#<܉ G[-~S 1󋸶(9ƀ=O<j)/)8 vonc{yZeK4g&L ׶B5×^#$ ~`wKZN\yb+ Ƣ/^T Yco=CށAp *=&>D~8/1#pY%aj*Lc"}?:tN`fO!!^MQ`5>:ڶKj.ݿ~mop* @Ī6Wi$:k{8&p(AI^Khr^RqըZw ^VvZ7;YZ/aO'kEso|žAC$dPpnaSoIFa}drHΘ?,b5Fͨ "G80';ĵ=?(Y.j&T Z@r_`"azHӣIy1BFx\up&gwl=* `!u٢|QiNN(1S(/V0"eOUB\b{lzJ)#ϴ'I)tZ_VեSnc,$# q5sP6W^RȰ cN[Wq3v W~oDOC`2YarYz2g4炓xbq88U=F|RjEAq8^vр BJpkG"dmxDᓜЉp()q`<'!g$2 ' Sd$K?a.k1 A{%Nx h"p^*h?|ºZMn+bk3dGe&Mح(Di}2X쁆Ic[K K1k9.X PsIO^rk_t4y t @Vȋ0^RϏH3ӱOsa=k7ɬ<љJiZ sVy;cj'MZ`mչ_'cFr 󘓨;Dx94IyuI莄7%[ey7:c:q#:2^ĭ3=$g+r|S q; %;@ntj˯w/GSKX`夲$}򸽤 ݜkP3h38:{'6_MmܓkxZs l.u,,Ga:Tfl _=UrIB:S,P񃘞4WB,ZP 5~l7 SWȠSџcPm_>&㢵bR9=d7_ kku& "9hoA)t rAIr? \ޠ'08WZ[k+ZLqM?1L_`i`n&ڠK}Y}*H}\>@8@yej” Z-WoobyJB|;>7k$)&I|z*Ӻ`.e{9Cy3GuRц+9%$,h qƐȡ{-pboqC!f3[ʼ&lwZ-$ǮX|V1GD((ĭڑxAgiֻ}@ϙq}ؤcĴlJn;hBŖ ? ZrcYa _GFRAHrҒ[=H"hʄ S|+j湷*tmt2w'VYhnT1 Z~-wX!|)|}ޮ`'d"@33wԌ(bP~ԡvaN[a\7aINss=pY( 7f7"^ƥJj |?:lK͋\'W+y؀%Z0eݱ%Oݔ&Nj~j# ARtxNΏ`q\ըU<=zoVm=GZ[ސ#BjTzc&rwp[k |T (z`HOmi,@KVQ4;ԯGGK\b#4ႍ߸f-,ˍ9ڶR#Kp uQbl3`r? ⠞ )>J΅4/bQz !}ȩPAw}$lOi.)|IPS uM"T\H-!^*51 nF,D(Q׵M(/ ̵ '5KF\ԿHe+!UfjWa犥UopzQv=T.\RsoG+q83"7idscaJܡ!C>'0X4GQԤ34 \-'zuHmQ z+"wdd27T.ٟ;F[4B1QG}網NZN*f3Z Mҫ KЖ H`4mW@v|dwVodumͻh/y(Ά%OTn5t; R]A+#j @SY%'AlU?BY!>Vk>ϐ@I r ^P 7GdāE%aJ_Т$ps<+U;adf˷ 6ioT] ;־ ȷf=]EnXbNVK2G{՝Gv8)U'Qhob=Nf m.+if"lYC]a$7q>ŗjp0Y_V{_Ӿ5琢M{h0d *=/갞Q$wveH"aV[2q#q5oҼItYtF 3祅ԥ]bead2Q2+5*A־Є3FG YRPX"n]〄:mP8v8owؿ tey%ܿ0y[Cz7#T6 j]=)ML2/rƽ.Ȣ-U& P3r4?355k?boÿ`6e']GZxt$2qt+AG,zI~Gla%3HSjrC-+=ď^?bI4, =ŷy]g FsNpK>U@x TB@bLoՍV1#&oy}6CxqjWsb--ޮGl6i{ܼfW]cXH;,k;8v 1P7"uSˇf,2bU#VzJv[~wanm3yx0Q@a2UJln'(yWCdr*nz][Qb¢mOM-wQ[|"%B/YPOS-lZkq%x)AXif?jPRcUP(O]s0^%(W*ydNW57&uaFGNY<;eIg~T M91U':|(RXJ.InC@DM"jޣ.XNgEךe#Iwo}gEMjqe/kPuGtAzjk* &}Ac|jYu>2 ejлpP% ݷ"ځMKp9Ɏs=d摯TlA (juj\oON/VX0sl?u$xγy Q/~k17҆b7A,oj8{hcҩ#= R"Iq2/3S=SV.R|MDK j D3rzJ&t7eN ozÀG'(1N1 ;kGW_ 7쬓0 Pc74)Hrnl<Dga&6l-}j!2 mpp7 ]Â)}IʲW}.^U<g~X<׸GD&׉Մ ݶv,)tq6j͙x8=X}iv=xu/,SH i|JdCt}Գ&iϨ˄+`R3 Ғ<]IU8{$bnsĽka 3N>d+S:Mw`hJ`unbDN`)Yr8ψ!JTER,9Rz|uMA! ּT9N9e[w'`ٵȷFИp)ak2k  Bޣ䕳mgh^1{Uvׅ$Ydk[Vyfl;ɇCГ @j q`T)ENb\lㆠ樱gtUr˧|U@2O\?іO ^oU ~ksW0FNcyw.ݨ)uolוVѯ~ 7devkmQZasbHwU|c]J(<-ioa lI_R)(F #7O> Pmf\:Y>O6%+M0|cTU45VwVP2CrMP_Z:Y]=}9P0$Sfgkaf6 3/2J\hZ #0`YFiu' о'Cq]w&ʊM,2ʴ+@f8(pd-v!lpWDG2( Y|$hCuYV-@7 [rŽPm_CVsg!wUp Z94L^F"7EkѲ4Bx2VM][FVf6~+s,8;ErY0H@>WUrdJX{D"k:dq+BƁj$Z2nuh:gZe_$-r!ŋ sb 3YLfoNW{gdwp%X8>k]:,#Q6~lnwЕc>@6ȼ%tq)")Zx)bp(w㠬!k6He Δ; &G9|b0@ld#C^_Um,p=w]=l7-QWkR̼)up<%)wDeo$YmwR;`4DN5Z_.=Mz±ʚ4)Cfn{RˠַyK!ւYqV sC'})]( S3?6#X/qʂ}Hugߘ5ڠ oŎB$u윖W(Iv~-rIUC/W=X^T]֮Z5c6>/ېA20h54EgIϝVy]C^\EdZ-B.$nx~%;3N5CXV$W%L赌 "b ,+{h873!SwAs`O,tvE6]=?U1zH Cߑ9sy&F$+K1o٘fd|^jTcߌ8}ppW/{tcRlD (gj*K9IaxƝK|\F(_ܦ%\@iGS/(*[Yl=At-(7F懒pNgfavJ;c*Ϟ1Km% 1,|5U/hf!ͱN&ɹvNh0/ \h|PyF3j|bK-)2@A*WΙcN0 sA,程WCb4m"X.e$5OM|<7Y\crM~ I!FQNB%x=ў`4+u>3z1Ua`SES:6^*L^yɧBr%3;P +S3Zg5{"5tӶZzzz+yOF®& =*7F(yRqkyϽHEFb38o 8k'> Dr1756eTN}\J8P 0}߀3LD[ kiy> ^!KV'?_yKy*M\$\^a{pT(_ϿDXt 5ķfgZ;IU2>vm"tފ]c!#fWB0IWkdZD$UT)@{*,꾬"u:i+dk%▾-Y3HfdNҷ*8Zs{M_F-|уʙATeu0tm(rsS#XUJπ}DO%44O:gP.>"KH%sѢ7\#MdTm_Kkpk=3eB( 5/`;C;DT&Jc>J/K;«ΖjX9DzZxYuc”'s/!Ƶށ=u/%xT;:vs!yIW[&g|ZBU>!Z=kBt!M/6l/wګ3vKd8H+OR_s]t: ,G +qz7!MRt1hg1n+ #2vhqfBv}.KCNqDq!_~GNy5M?u8"#w +n͒ @d{B⯈ýƛX@xi-rm>Ezҝ.Z'rp馫m *Β~1-e;8kӝ6E(̤ EauhVv-L-¶^2H6뻅xo%m ǒ}_(=UHyȮ"9n3b:+pLUl\۽*&xy?lNl%Q>y|_ x@n<\'1-JHiHK"sl" ըWЍf=]'4TWD&h*9m!+$nw+zc=sɝje_X.WN9Ѿ\`;vF#|qC6!ÜI\*JT;j\SXR5oeEfJ Rא̘o:H?Nl-wZ \yxBڦ$׌j"d~мiYzty%Akac Pl>Ł Zˮ9^ 8Bb$ 20:-k5MwkRB?$D@?qܶoqTn:U*nB䪳*qb:"2RB$q1#CMвwZ>%cs/[FN 3s3;ÔROnўIorP4DcxJ]zgB4-:F8[RByeg/:(‰o 8wc5NfVzzYWNY fAKAqQ"ʗU:OWg|b O3JC54[3CyR{jN˪,92L߫ }xRvw{`\ Fn"Ǖ e4a蚓ǟ_Ov9 /ɤoMŪpدS?`O Z;hv}Ll?Ҫ&gS8[XOa$ ]*)q=IJ6ҺSni<0ԝZKm.)bY4=󇍷k?<ӲbS5vAf!ge9S~T~B_g:Z$0 i=IFKfpk>kd2|̦})b<tDwQf$LЭ6E;Pܕ/fjH൴fGPΜ3#nJXH٦=5'M_F}RX. CXUC\4_np|R/f~zi} v.M_(`K.> BM( >~t 9/Vv5izζϿrҽ|4@۵/x{z5ؕF+%ԫۘR z'[]X(ٖa  \fM h MbBtg7 927T=;сyӳtflI*[ckI%*u\T;*oHǪA-eCQd<(ncPb˕U@HJ S§CL2h@[ޙ~?W˼YO/MS]\#X智9S?d'8 ֢ :gP7eYЮ6::79 ]^ !jI)?V82Ѫ\NX1{pSvnHf+zgJ`9 c_%r[L9Aw^m7 w"t]PD7 7/pʮ+fihd;O Y |C"R$ a't@:XY޷d[8q!sͿq%^˲?Բ.~0eԳFuCxo 74ؖcC{:["HgzQ"͗yJyFo_-9<*;Elץ>6"US9jZRQ `/A:;Q],XbTXCxlţI4fAjsbqYڰF#0A&ugm` C^?71.򔬂!i.& 2oxw"ݐOZмqͪ>Qkr׼ ˦P܆u kg,cpH S{DȌZ #F5һ;9BP3Q!m#͂=*Td$WŦ#$ -ao eZg G07H] Zfh1LAx~K #lY{1wbp~ Q/*P;2FGFDbvf>jt8 G5ugD79Rx3 ,^ tFs,BzG01&?޶ۊTm;O-P'a[2A_ } &=g8D hlAw6)=q#PxA<)8zQ-90!yDZhֵQ!"?,L| 4/]Y8ԴJNR7֜ǟ=Yq?%{J܎׶/ثTpvD+5"tl- 4)-6 4 KoSFP4ɨR'q0 7D:9 ̻JLJ/\*!5ծ!*i#D5.-jÌKłyFbrt<̗rĄ D{˝50Q583oepYE΄:Ζ iϺyRҭ!'H]$5)'$U3 _ipjsR4ɛ@_Jl;cmkZp{m ֍ ,Vc Jd= xԴ_+:gz {Tok[F q:T|MWT[L:BӬғb8- :ԅ]b|yaW>(:.V2kGDSni LB=Tm`䋊zh;iE+y ^#{jx}˹te + E(N@klS%߸۰<[pv.(Ҳ'k Q?YY`X|/ B5]t kƠ k2/)`.]cוYฝi$O)wMrWOJt+?s w* g)yjآfPN7.Bë`rKN}4 %! "!((_;Vk#S&50Y@8[H9U5>cgehLub&EM5۪v<؍[>x/ ~~+Wz)3f ‹|[D^LPˢsCx"tA SeIU+,:fd~Pz6RmԗcVpW uf.)pBiyo}WuV9Y8?irakW}n@pэ EUR½MRҜq`َZ6 Fy L( mx;`J,xhO}HpS嫲2)8x 4sx}rWl]5rP Er{=f}iC$|@x,u}">?Jώ@{xşK4EYk4S?*Ȟr"8| 368cNjJg#0RM`ז-4<QM{|P.dtD ${ag\fln`O'""ƸfԺc-ƟdS$|"Ԛqw~iJ#܆d12^x =t3/@r 2 AMDE~#+v/3RV*\F v&9 z*"ns2$>?e|J:bhjv0QϔGyxHJ-q P]Z~xJPAb /ma/:+!޷$RysّA103ONt`y|9e旝sè1XN(CKkq=e""J?+ԹSP?r2 p3aID[N~ Kt\ ]y+$Pᯅ ʔ !0adX4FjNGN5a6l`'L/[ MQl&4]Ew#7Hp٠$``fzrM"ib^]Yizۮ hgC4r}!V=[P P6*;6";1\~gHR !ӻ7h?^Ib,jH&+nigZ}=^zr6N"\3YaS}JQc>I$*W:Fk43 v&8mԩd%1o-% OU0|[+ԯ ~%yһs t r=v6z5hVpUuMqjyZ7̄ABKiye2eMI&qހ@PHbc 9/ ĖM=pI Kה8*_OgdGK:cs?K sE`y6Pv }x 19K˛.'ߧY7D3hřf?*0Y q y&XK_XHxEcea];LR9}8ڠJ$WN׃۳bA/\xK޻^ieGr;եGo3?L}[ vN@Ɵ{CFF9+EF섽a~{g;eE^UߔDRzɫ pk Y,y=ڦv$-$;&UBXq;W=G6%*JHx;},}uN*>Ѷ˗S#}&zs52f."z@O|T>(0u֡xzEtA*Ӥ_P8Ǩ~nHy"RrR-k[yxIzK_E044nʹ ~# J쵂PCh5!a r P}\%K2 쭋[R^&<~k -K-LًB2rƁ T#ނm`QP%s%G_k?XG7k|;#r+rDF)  2 8 0r?vqnQ03P[YF|Gi[ކ PgƗU ")d$!S k賲sC 71\C1Cm)&,-z}Wu*h9}g 7HѬo{YPx!>w_fHJz] lr(01Dʹd'.ʴX\0^Y@'OIlӆjpY,{>%^p!綾ٱYH* XC WYy7+/8-uY@DqCq,~ 43iawYLY_JO0[& CS,nef"e3UբYb ךyheK +<ҵ9wed+_wN\gߔBGbmfqG5AN."VQ#&^8OD6[H"~ {ش_9!\@\g?DU,U:6kwg&v7ҵX1 >Fk:98>ʑ5I{)o_ Y.UT4wtR%&${=O.ݭhs;xTCWi "EyE$"cWvyn"_:n@nVnؤI__Ds'NWd&eŴrZȆ]Hq3rpg0/\HPQ BI2Vb,3A;Ԭ[>=_}/ّ2{L'Ut&9cS(AAP/eee 矟 c.H   B0wd׋w^G"%BJn=HT= :H'"*6L7ߛ}l:>&pڄNm)6 !#_ե`xG4\3zI6w\,ެ o&Zs>ޚ?׹dQʐF'Pw:)>Eie^sټ*[hǸFڱ>,F䉋37y79AvEL.MylCx/V[k1'MQb]щ̚-tr"1oK[ LS6@~|F'p?a_mH^&RBK_ldo{H#a!UgBl8曆cm> `ee]i&DYuy]q){dښZn C@i PJXAxm+f͍c\]s='EpXSGs.wZ e`-v|=jQC`iK L݁|:säB㩅Iq śvvHy-~wP3~=2r 4-Vv Ԛx6'YaWZu ýoL+iG]$ N(9̷+^!OtLÑqqXTvdw-5U~UTN+ǥ DjSN8rq_8Ժ<8. k:DM&6R :SIPA~+ 1>]+'dݯ@iϟuH\Yktʶ;TJ7~vXeo,ob\O^#ul!:|" Éu+_QIaᄔ ov*?2MXc썵o D3os ܽN \J&ˑO:Jx*@#֐ zq% 9M|yGS\PP7ޟ̼\ ]6eajͨliBxW u~?-oN:ʦ)UI1"!<%0˴yDh$슒gIqh~KFMܔNݴhIvZ8gU/ uE;Xԉa^=Ur^]湮. Ls&m1]cr/ǜ}h 5@ڪ(6oU%^дٕwP&QAJhO ~?zJ̴ N~sOҏwᠫNe҉@_}66Ƽ tC/oHy*W66\4n?wbZIǼt+ؤMy7Y0߲@@&Tp\ە1H)&e:T;l-Ttk" xg97@m~uؔ8l' Ww#n7M]jcEۯHJI{غFNɏFQ@sv90cc %7(|Wg: vI?:IH&`c j87(RH*n0qq7Y O#4ԝ$٠ ^"P5Kq+?|gk:dKr[2TFea " qAVC eg,waHz9uI@v|kxUcW:IaT <+3ǡd Se_qxL~Qk5qH Cg-1g*13/)^~^,Z)oǼAFX@R4؂_WTY4aw ^2*~E-Si8(_g ^*h.*k*zFۉJH (י[r[u +*\ u1"اQ~^[fWMtcp$T:.Z'=-`Aοc -#lmZ&QH^c9(&l孂X:;FPQn#%15 r緦5T?J2̓oy,Y1'z 7ϊa!*R,9CGhg)#cgܖPԧ7: X,[-fY8R \-nQA1OO ?h38X iWqUWNJ<E;̋M1U<*Dv(["6 0oyS")/r',GXeJ`j/䦤Q?ԗ²"FX-kow`2QS cA򁁉_q*Ʋ҉{'X_=;,.ZrSm]3J uEY^L;`K =;*29Y%~ۭ:>0n7R u\ w70βHUWLu$=L9EGH(}6/muRgj9_1_TsYR1"W<(`um*Xj#އ6X-mAP@ZN"zՁ# U0ʹD <&GW+iI$>=#Ht5d?x+LR~ { guk=΃+}PD}<'̃Mh(Ikmx]TI2:ǀ]/6(-3|>>HOy̲۔Q) %!c@y+6h7= ;:DܸPy~C1B֭9(.O# 0?"FzRD2BB oh?S&eHnbz.=HxE=8DלW>z ҂8!"1-oi/]\,|ci}2l1PLMCz[fޅ9Ą X*3${ofmTօh%! E)#9߀c[*<kJ3xK Ҕ ݄;谑UqwiF' a@fl+O$c aMWKUh2 JgT-l9 h{(A}a滃C^,\tP_]D@^dUL'5&8^4mEB꾭I6tJ:>d޶sf{7h!Mϲ]L 9#;S5YSx6%E68AoeZiW$)ϢՔ 85H2%TOpݭXnW4zdш32$3e7n;._1^aڷx^؇F.] >σatHD`^hSAhytj5TR_:35{#.qof." ^hrR o>=ƞ` J'nXedj  н[Mxh9F_$1p@5g6Rf. -x3\m%kV*Om'À,rV^D&UZ=< D9W{Ӑ-FGl/ɂ|8REL)}YK/\GϘ ݶS;AYa;+-W<<G3X! 0%l"~V_ӉcƦw-۴ݨ*g \*qڋU 0":ZbX7,[>#stTzzUC@GzE+t ʚ ҴhݶyCp/TD**}~BGa8_ي(* H]`0ʼn~>ZZ,[SlX``8{j׫`;M< 73G^7QH\K[0ΠH0xs"Ŭi7U{g~?Ug[!rBI/n6!XnRRey9 wS~}Y «!X%OȚp6W[#-mo.i(%{0"(!fN̂ [fl.1㤋5z ב: y1)݇f|5]cA\O\mCC-YKzD]יO[Qbpj#uW(188&r\ztazԶ`meLS}[5#5\A|YSdEʽǁ-Ohmlct&idGe۞:Bc=j0FVV\19ɂrQs7`mVi-f==($5k繏n颰< oAGzQ>F*Gw~Nb=R`;?rwƝ>< +gPߌd%u@Yx}8 /d C$TY?Ǜœ|:3|Qߪa O ^| i%#w&rAi&`6ϲ+L;=]aX C^/ɯ'MBbHҍvOOۚxܹKlٴx8MgJ+Ay'Rk̼!brAkv<JuaTjoU!^(UkrۂY$~RJKfLܪ~ħF<*g^ D/D3ZIGR f ^n;1hK [e qlApH}}/fH,!Kp&b>a(/F/&Pr`й柈k)fݙz9׈MDx03)qaӓ'|>4CozCF ~YhAB1r.M; mjD9eYyVXVKd t'?~o,G~I1X #_haLl8[NA cձWW?jmh.s VN!ʑq{oswҵ1tY),&H8Tpաƹҧ6ApxJ\!uqv' ݦŠk`R'+0cċ$NM4c C4oOGjd'|'u9*z-d?nY&-eٸ.JoMCG{!AFrhC8m芢O.4l[򊗄- >C&KR^%Sʝ샼B λ/XP=tc n41G͢r_tP n%ajwX^LpUi먱&`l7PP*LtZL!Sd̓O;Ik] ߐWġjdb* \ e&Y]$4f-m}qHgs C%UE Ψ?ŅkT&פd^A^X2CEqgrW2jIńW]l1ꛬh."ya] t)M[,kYDZ іw CO0܎:BzR@uAe$#6 b~Řw[}GJ+ʕ&Q%N.1<9U`ٖ*^+\͸};z`6i m(\FL\@j=Y ƇV2^WS(mLdiHOe0= dCt6sP!흂nFuЛS^9yw%sdEZUjyaNoJДöiܜcQld2hRSԭ:\/}=#ٔ5S;81M o'f~s0Nя/;N=;B]vh`:E^Q{W^Na3T/'EHL Wua v>An刔>Nhh=EpֿMCa_Ǹa]\(Nʬ?n*ۘ,l2BIO-#Щc%YHB=^ qҥbU9$H׏"Z&<{#3*5{eVN䑀M>shj000%e'CjmY+w tvMϲbuyʚ([imIBKxzL^nsOͮ|4Qt+ITeU6,oM?\lK!nlv)p56ao }v1KzM-wF{鶪"'%BN22~3r@JQM|XfvHKeJi 4,~dzJ (Zl~Wr{JظAqfjrOce!\nfZc޾[znKHL&2")A Qald^`EyY.AmEebYlL\K{ֺO$?boG|vosE0edͿo?~?qOr!elr"lf3s}Y7/w,S'*m}?}bT1ʤ2!mԩ' M3N] cF2̸}}ck~]cxtq ޱ^])9 xliK q b*\^،5UoLSJT>q<¬HaKF(E%݆N4KȅI"2t{- m[KHU뮨ܖg0t25EX]}$n*ZҸ ~wi7\`oQTBi( J3vZ" =ydsr ~R/fpe5YҿW).Ms Ί8!OϙA^3W;XgݷMeBx wN2؅KԵ13,dx,!DBxhb^e.f'%7љ K&3kP oE47m.T\7&~J@/F Kĥe[}Jë~|]=ο=m~ UT3ďkYϨvJTC48velgؘYs!-&݉G:h>̧U T8G賆-i wQ9)w$Ir%M4dov؍Sp^eJ2A: 4Bѧ܃ Gz&\3Y‚=ʅ|]d د Չ8 ^}D}880%4!9X~wFf~tjhyNu}\<^Tp%v33.7!rz$&"@ ZC϶Y@I`bY&{RiT?sl!ÄDH4c<Ğ̒lVS>wHM0 V{@;0;V0=<!\#~8m1 #K{ޡ_J,vcA8x܈3o JZHJ;}_Юhgxӯ݌R!/_h;/~`ֺscLؕ]g*綇sTȎ & .Ll^Gh(ceZI-:L3G]T-j#3bmDo&}AnO!L%l^Gc@%ZK ۙK͎qbzq e_K߻.lPb!bV*Ѣ}'ǒ;!"@F. Ii^5 F;o`s4/6(7%{N6w}fPrp*8N &#@PP#FϧI^:R^ 'Zh}?K0hJ =zD\)l\3 Ⱥa$nѣ) vOb4|[vS`ǐ6|!9F^E`$ [wf%q ..}u9G, TY("n&jFK]h2AyqP;bمI^d|ko&8Ka=[ߒvsZW0n׍# ʨ䐣,{xeH#W)HP+q5F"uFxdP* x &7ȘD!kyՈj&Rɰ2fC/o}.sZ2]r[v%%s謲#" 6+?k',x* ~B֧H'RCE&^Jۈ'kD@qKTmTɽ6+&VC'sq3u~7S[m0ńB#.Q|e|w<2mQ_F@']>$1m~޴}a{mt%L'4@Q~ "͈)o兀 J}0Be*}T]馷$ȣָ\Z$i/˓\}~$@]*'KaO5"_d9ؗe k!_ܭf`nEĆO>'s#i!>츢8"yk,"˼C9i J: 3ȷ}:>o+EvcHu w'bl yBQV,,BOd-}ċ^V\.S\ ^ԫMlԘG^%زqu$\ .f]5@<;i[^܀6!tDF߀ g=+ }2Z3<:{n;Ďp8,zbbv[O.njD%M- 4/{ԹLTv9Z Ϳr<#1˖-vHxW[lB`aPmvmre|.d: Lc SzލyNwBWp#bOv2V)/:›pi,]KO4%cegH1q?;kBDvp( /*`61[>][>"QP`{ UGJ2*;L=S| .\2/e{hOJVpSЅ;zA-_D_S/T=/AXfUN#*8.`g)OhÍ4w3ɫ# FCb&8~pZ|GA0fۥ ly]aiE4Se7OsWjׁTr yIO/mqv1'8>Ivu^ ҍ%fGR3O$'oh"DpY d3Q TTtb%;QHn(կJW(of*͹@C.df8ilj!u$<]hudfžO x^Ӝ9E6W>n  Љr"~EATu7rv9<ȯ_ta %QA9ɽgc.qOOX"j !+|_rBT$Wi퉸}t[dpprh@_؍iq-KQERP 2aMt G?1kmW]0V;+3g017xM3 b/7 l=pBV'f܅0ˈ~ :_UՂۦWa,!r"D{1z\ K 6n=MP*+%$v~wJVq3%alqWhi=*#'Y#*%e$}1k21a* ^iӉEU^=: [c zT.Zb{iNL0z0DއI6Ӝ41)"<.1ẅ́BZT9['nNlTj:IB0A2< oyv{^O-!qxӗ Ms[cbWN$O񡬱7J'(R7w"`d"^k(JtY+N읁)8&%b54nE[LtheZ^LsciLWFd}wv: \"X5Lv\!x{D˨&Sق};t&,-I) #BGdjAWчygf͟rjo-Yyu,[xu#$0^O8Vq vVP~)I{B#q "olj1_^bgۚe I54i{׍WY/}Z8Ŧp5>Mh.0ԇF΢;O$56E3A&˶YzoT<:ӑ"W?+d~[sW+Td4NuwM!¹RfX@ov_/,oS[0?2 XCMLp4+HC+ j@ EiP. 1n:7nYaydNXBMts :݋0 H"> L"á.YrBxe`d./70}p7FG9"F> f|y\+a$=͹ ~,j3Fm9أ"Btjf^T9E0mi/?]h8dBVkK|-sZpOBK䢺ȯŞn-W5EAӟu#]5?0[y2d ~_,3R%7}65g(eOl֋YrsH\oZ<ĽdanFV@>9qA/3ؽH32O˃in<$ϙ -}VVH߉ڊ}s t~yGvT:QABb#<բMG= W90D!h##Tjr !Bљg>4Ҡ)[>%F?$?ڠJoA&UVACAuw섥.nc>1%{)G9J$*>:Uq<`d)J&a" k*JKd %j\1h&b/:+_:7G%BBg5+,4Z,[tkA/<`u+2Yy}')\2 oFN(2_M ʀd1( mgO}4 0a H#(&M;ͬߜ7xwwsNUѠ4U_a\|5ٶ h=L5DQTE[Iaro0[TʮD~G-C',VjTy{/͕2*ڴ!^ݸG2ΰKa9o67᜚w|f:13V"̞2m׍6(Y5_L]s7^IBw\~Ti=d6\'}ϲSnR]\ٹ'jsԱr?ڄl:0;*B&Ɏ8VK:=>/6MVU )R,ګr%]y踚nWtca>l|WԪzoǤb>W SD jD[ʒU=yIz"ԨS < 0ƖVs)BB$7Vh[XgG_ ^1#@e]A![䢢(}ous|"D4B ŸlPȟ{w;]2dzuRX& fJ\tkz䡰ۑ~iXüxܕWqI"y0(E=MW7Lst|E/BKmI'T0+4c'72kU ?f頵?K6"H8`DL)W&nRϊG+r2 'Nrr\]8¡ q :>4GH$7a5س:ߓLɑ1D|G>%YZ65MhӧU3c:idO˷)J=N>ҕ.(#w{)OU9]`;v^8M\u*6Tq߇@5\oȡȰPKLcsW8 ܓ;aWx-%:aP|5+OB~u,"Fd~U<|7zu);oѴ7%A==ߨ&}E[2C5XJB ̝sH~ u16r '_bN)>ЇɃ<=)kA[k!@58JLHq6/*͙+HN=y6TX`ޥP D; .%Mj0ӺPN>MЈK,<\UX^r<-~` Gpɨ=l qbDbb@pJۓۧiqKk\.jAȆSKbY)14wZ܀EՂoxbg\Eý\bgT/t¸h%e$jlW=P"#8W߻vC3g}٬udhѤ3h{CKtmy[2̨̗ 곤P 0՗y<y.VY[= FZpQP0)_Hc, kPw q{5W,wp^7T&TXҏqwmp?x5Z9L4ݗ:1']Jˑ(4ǃ(2^w{KV6mg 4gDekƶFkA]$ݐV;_ȻA!y /AfF_5'<14Y L>, '\f4AË%^eN[2닳7Hc|j9M Oǎ l0v H*qmgp5d*N4.B%4ߑZ{ePm70q7a 8,P6ÅAA.)K'䊛ЫwEYVic;"B_]QϷZC}m,9UAlp.. #]UV''?HҹIYr!˜#U%0`Yv9!Z&V,?s!nWbE:]ctıNY ٙ=`fH+gZuM}FªOe&^ }U7!)󐬥|,-de HNXl,g?aQnI/=uL|9{1~;ÚA% |r6zh|}1~q ^b.J!g HI%/s:VU-&tԣW%$IԺw&Y"oNe?hp*;M{PZ2f7KB9[[þJv4"bS:w)u#ҧĞ'm^FςXGɝ* {AY HTSF[)g2ɈgGs3^G-uSrc,L!䞥"5 rNJ-\H6/GFA'ïU:50aXXh<>=g,.E [.ILɔ)YGn\7zA*kۛT-Im&}70MlI[Qew]s7MDRLb Oc.=C.mZcusCH~# kiuF7~OAWF{ܱ.@Рg-DՈu$RCg}hs'nkw Gh8'Ҷx:}+`\vmw}mRGY gy4p7a'`c UϿ-_,0 Zn)9W\vئ bx屮˰VG6zMT&4!HymU!R$| Ԝ,{ȁ.qBuWOH a93JI-u~.ΣB}z%QL*HX|D,m,H:^YX1Y^mOIm(# yQy[1)SmHX"%KbjpYWtXArG:0%?x#pT_QaH18ðJTqjܧjFS6X.nFCPR8x\I [sdPu%#lWEm{$y]ҟ6t~!_ 6|]}H?eN:"^ڞWyWP#*[M×E"V4L5>P+qbP/M@5'sNL)Θ1:{Bt1$H[=lzΝT C9<@ UO:sSNx- ‘uy˯!&gR79{䴅-KqB\CM m.FFh_%)n^ioȊPV;rv 8RqW|ׅ ^;hL TIE+ Bu/517#nwϗ_ u#hxq1QLW$,p<93gA,#`,u4*8'ѭV?XԘPqgL}iB.=눜`->\`n$Eyj39wmwϾy7UP-]Jrp&`FWF=y/sV%m~OG_XJ#XV\.mGYr7D*)edތ7Ϩ,dA+<)CD*dA&*@Yդi!҃suelW$E Q,\y%}B^}k>@CTeJ:lA%%{ʨ08 EQ ˫T0Ȩ%md|gD3=w$򮜛9vڀc65 YE<]:b\?[AOWn" 'Q!WeTG ]/&0B b*^ˍFٺY|k .m7~;\YCQG!ӇPQlpjquk7|ȴFR16 ] LmMLCr GF^25׌/̣:z v7KyKz#fgCF{꘏wj<å`Ft uPW:8EBLK'/`Jb6NEu 2{ȡkz9jeF 6Op`OA⫠{DjJޠ,#dyCzL͕=D빎O&Uðt>ѽ 9K6z h@MH AuB4"*CKYgCq*jEDgE@Ip=fd3݂r)3h:0B]'-cidP8a  i lE}zjAE÷,u&K)I""{p]Vf=7왮IuIJ,bQnQJtYiJݔ4r]K;YEz̈́3єmh;E, P3  G$ILo1#G G`DK.u2ء΃}*B_ͩ =}`L6ugycfŜUQ2$ב&GJ{9D+g@85w UWAq̞ir,fR8+]4'm'*^bgvw3j&: ]GmQT)R,u(\~)@爄cnpwPu>}Q0 *8`Cl;>`ƼMĕs-c/$Naat.tS%ߑ.MRxZ گ{(N zh"wceYIU=dÈXA44hTmjKS +w<~@*e}ȉQb2Br0Vԁ-Fg-,iZ4~O (2mOFJ35SBi$ (h<F#a2JjnHK{RDjBo ݆ X~@}J0bLN`3`Pm $uP͊Pңjuehw|IӾTTm'ސG}𧡸Pxؒ@Ge ep.(LOt  rѲJV\fհ#zrN<;h;劸R)R9й,BL0qWtW>x[BYS74Jj8Q_Yx so CIgQ/5-<16Tf C4FASQ.6v8!% v0=jB0bv(%K͍.C6NSBW>*P#jToMlQh~ދk(`7zk ϣ&΋‘țUN(F&*Ȗ]Zwud8kNj^B .5 !$V9,G0yP\H;Ϲ 9 VP!a( ^V,pm)JN\T8viD\!;bBd_CZlwɲ7HQοۢQ>@$!@g fDe_#ІEw0< +N{șb۹W$=U֐U C鸘Fׅm%tb $ퟦ ZgJ;3@w.ş t%>!"_:Qo"Gk—7+%*C4i$yZ,\O2 + Nkd.#ЉAk5wW~tPc.㇇X՛Q5y%pe _CM1qur~򿯴ccDzj_q@3X [ \bz$1a ľ,դ Y6 Ec(FE0?gH x08J81 i^D}78"[QI"9SC8cAsT|EnO΂TJ$vt4z];u!ZXʸsovlۤvd|LCYW]vgi%$m pcʃcc2CEs)R6LfҊ(E{^^nu,Egh=9.jp6 @.Bm!ܹ7l~p9g#JdrsAĬ3kmz-.LmET zlvT~oqWI(rFBG6, {y 9!b9k &MS"\yWW]n.͵\^ $Tκ V+y +j=!y/ *O4U0\B;䔪>^L]wVI Ӝ?nd.U1e}l e5?!Me&PM(jS'~ݏ)Qv lx\W$pϖBpʪBtfV3~JsWY%N\&wKf$(!iĮՙX̟p.@Qj)g T_@5"I} AX DbR:Kٌe+8*+7Zȁ9%a٤^}YXXݲXBk<-a*%#m3`̽%aDv7{20&"!k`qN?a1m4+VfLw:i b s(RSVt?'p%ev8dh ׭Nt>9ja!._Y:\t;lB \Uٖ1S!⨺ >o|6bD/'G#r=]Ljכ XdRetS&dHgauN0< qppKtN޿'f (׏K t]+cE$pD3 kk˹ +-QMQ93g3r4;s8+/L%D6yr?3afaai@%P~2&-X:l' @T?w?p6.j 8I3)祈\ʡa D< ֠bbEofOz1 JbVKAPwd#f+MT~dd_PdPB@/涇:@@*v=Cp6C'۱XYZ]۫D9"#Sc > -DĖW>ݶa}7L7>kXmpĒB2%P50λ7pc ;"S9 gGta}ͽ%鍓:56FJiK(?@CWLY|yf.5ɇj",:^0l/nA3̚'n.IJfRmOUt,ze9> 5"SIe@1Z/+ ɉ#2˿ca.LVޅPVocDFu C5z%mL<MzIM;W?WXA}PH! Ss^ ܃xxMlJj}0&u7x7PۂJ.Ϡ f}@8`-A_v wN ʊp#ERE] U?9kEQx;t؆!Hk+2BN{;4^Ɔdbc}I}-]N`h+j/y[A79]3$" *{",O"3y]HngTľ7s';f['lJ5j0 im2%:&q"7m&WAȂg 'Tj{Z3XYDj[.hԂKr܀w<)wT=() De PRx˹ p3E>68q jF^zv0oa+c-/lfz-B|o&jLFIu xkhd 3^:{EWBнK6od&\45ũPu,c\߈W/^)]Z+d{< 5zǗ8/P0VIHbf.SoqQߟ[`8?Z5Q;0ΥE ɧ` `"7FxGNxmFE lճʗ48UQdl|E_)ApFFX&rQu@%|cuũ^럤\Fܲ&CBP+ ~FzhRs;'ڔ- 57(.&eL˥rrUͦg(]⋩OFYpCƈ쨯h4DAT.edW~r-iqoǬVu;cFqn L>0aǴ7<>l#.=ku֧ƫx]=[~@U#̆},s|QZ0Lxf=@{v#L W\/? ͞g^>9Ɋ/~M9޺>-w=N`-[gb#'U&LM+(Y"q ZIHbVzXE9X}{{i>])#*lv9k3/I zd|*~f{/jOBėh$̜OI?ẁ%)`CD]*lK ı? "5ңco,T#䈁fgݐ8eљGfzuZO_XޟYt_wŞ@7~GE?|F <6Ad}lkE? Fg }J) Ѓbxqz pu>y-,Dߎk%̰?'.˭Cح;PB'oZmh3zB1h FRO_, & Sc!5~?m2X׻77Z%%OU-Rv.RQ?[_nSݣ8leU NÉϯբ"$ ѡnx鰲PpwW]r1I41u{FTC6Ɣug.9L;u*P{24p˽g?&I_`2@7z"TG0>p6QYgtkZqNBզB;&RdHמgkK*,)6TubNbjT^i-5d:셬E%|9K0BP3\sFmq/Rjvz6P(F 0"`x p!4bhMrH{2V#?ŗ N XJ,e8nїfƗQ[JniY'ft#RgW!?Ͻ߮zۚd=VWⲫR |2)P[PϿU5uH:_HNeʚ`M0OQ||q_(K@w:!F9H1 ׯbUi0ͧ_(b ɝ`34֫a2=!;>;6-w7 61Dq v6rҿw(d*4ΫTeώ0 r:esF HL)99O]sgr q>-[y}X3+ 9B \AF= qʫ`V6f:`+jun!JH>:A*G캄|DG3JO{81 ЫNMkY0 WV> 4"Nw4*{r~`]ľx)lO7`:!6ߧlxΚF}ވ >TPKgbHrV# U+Y]B:0Ĕ#8&  ׭eTHHE'Rz 7qPFl`7J[35NGK\ճݱ3/gFظDx!{ljHd Q+[{O@Fhnv9-<99L84k:URm֬o鹇'̀&?#Jcc)cJ,E[^o$+ [-f!U'C`T6%~il ,']yܙ#8{9 "Jۥ@{P4(-:o8|;MHzZ3q5 stRyzRu; bW X'O>,3g: n3,eܦk6s<ӳl lmۣZ0KCs$-C% JdDن8=-I>MK-L$UIED3yĂ+&٦WESGiRP] ;3ȫ2xL}CE-=blv}PE?,hqpq]2s+WY&d#2._=݈ǧ;]JX&|QzVjO*M~R| RJŅI5o%ޮ2c)$L]- *shsKxMaD.fkVt!;\o:SOZYtc]Iْb+F;lT,ʀE69zs9l1.@J]1m-.rg (@ݔǮ.xrSㄙC/7E(Kocm2DY+9$S=aICXf3^чV}j-@\Po.:qu'Ƞ\8{U?eqX@sQtki-EO^&^d jx룬R7_›&M߀hL"|ݜ{)s"-tH+1*EPX%Qr49rz 0.r )h5hYDIt}};Ȉ1,yH?eG+t/$4B]OY8}0pOq>XuHےzEˡBe"l*zS{Q[݋-{آ`.YIM5E_uJ Ŋ&l)L7sԵ};Հ7+OPj 6ʢCҷF˼⋰P4vпbݝ[9K7.]I9a9]Q |yYks@ I=G=i(kе|qqԘ-]WL$9(vrj6eNk([@~{Y< x1PlqhŇaptT] 5rІny!|G[ ` xJm8ax<&h/n^`a\ 哃4;4CkA!|ȍ9ג! *ÙɆtЈĵ9;Cp5)YrS %`۶.>,Sf2z@̽h25Dk>X֧o<>)Ňb1 XBn6x]A!aNBIe撊I(:/<㔩-\*$w€Xփyz|p$LF0H&Kkf[[6^M\NQ5ANPƒ;Ŭqf_bBd3~~fyg`f"8FOe(mt aE 8&H cG[VpϲHP 4Y0$Mhq6JbPeHx ,:5/OTNBӫFެQ*}1Y<c=2.J%p! Inn[tqEϸjOwBѤ Xcq B)?~Es4LU:u+ub"42w%R+kk&Am^u^5ͬ^ ?<Mm_ 0 Q<LsXs3/ >%[p2EY(Af1`0b|XY>3v`v>raL4 tTV{+ ҋͰy<~D ".n o=F~:9-RM ׸RVTzT `Z]c`71lς,M%PK ڿfyWP !Kߥ=؎:dh]cG$[yea?q끵Wt'7\%2I"EyE^t=Rc(θX`} wM-hѭϚ%rt7=Cm ^R 2Rcn5#Wk!`du ,xtÉa)YӮ~wW,t'kU{ݮǃbj*jr /= ^An`!M*;/:L!cnyX RbZ4կU ꉝם E-m| b=1{]N.*􁗐9昵DŻ>LX%U`O"6glxt=k_){pAF7GE\G$G݋I.=+,хZ$thTC8X }A.)* xmDXn2/i`OuտICHStث{K"ȴ,`j{4Vd n3qT2b|wU;-Z{$l{֨v^ZοkLI?0Gh 7WPP"r*$T&nm-)8 p[cđL (hYm+xp?N`:! 5dIpl[iǵ*:HocyR!-ܽk. h7s>jPoaKiu%~v&~OgCAA2"g S᳿̕R}K[QF H lP#Ȑ*]ʪ4+p=3i?z ']Dwm02.r8oQj] n_EGiû+?#EcShbBe!4MoqX^8SZDh(Hi'$&;C\@l$H4+&"՞Aveo[2֦wD f,dz]ζ>cye>:.A80GFޓ+G^2 %Nܧ7f bC=TB6 5Ӕ7*r6tts羑d vGL JS_k/d{]u_X! w/-I3/W;+gSO1ޜo @2X$= rTx6j Genqt 4G6csR+}<,ͣ6fLhY5T1[ 14]?m5: (ZZxzyZ>M1v Itutf:#8^d?r1r轎@hVLA0}J1GG6h=%q9G4~C3 67Z:\A|ۇ[fCko{V\ ݊Ϲʍ3yjYRCTV^8vy6 kR _3+RB_"^zEH b-/C9YH/8>$%q=@u-uHFEpoM'6 uBAj,ÒQ: ;U l[~Ũks|e[!S|<KD;Y LЗLcnOgxoEphBǻ>y5kN:;l"%M@Ә,q\"Uć߆*p sDNĂ IKRU51N-ԃf;[H)W1!%xZ[4yG}^oũ5#(* f[ۉX'Tg4 [}ۻeZ걁5Y+3457ElޡU nULtumYe;l=v=˵InFSgHXSi1](:PA`TQw| .nJh2%h &HވQ%%rf'{偒?o/FI/TW\w?_IS෧z,%Kr }2INeCLIcjo!PV.^J4g`=;y7/ K+yFم`%:TI)l g[ccs4|W9=hvR EًmV_zVnk4boDAY i'.]lz9gG4X4U/!T5Rkca>ƒְ@r0( 4v߀փV=k1ݏ3kKS$5Nie=e:j _V^ׁ=;ԊY{qd^F##(%YX9L\q-' []K-Cs#c!=t '#]'ͭ:{3 «VJ$e}8Hk3-ZMĖJ h<0u!Z-:K~ O%#fĿ XA/Oު . ,"*;WR7AT;DĆLT'|*|^9Aǥ.nDt^vfBˢ&O+6ZRPpRMbR^ ڬ]ܽFʡ,:|}uT:@p+ԜG*c*,ǯm=w| }dQS##~L49ܶ0,:1ohr`Q *?޶%/ƲHυ^,++<{e`'k(|Pγm"e7 'SʒU&Z}o]VuP;(Lr^[`x)t,z:zQg6Ȭ% ZGΎneE8q;X#ľKk0@*c|٭9ٵ^b>=lG9W _Q'=ilJfz=aawg1q(RnaqRSd!k@BWF]?G݀{ME$ 6ކÊf3%{aw4*A7ozZwy{קivV4c±/ӷ~'&̿m7s(+ 9D\x}"oԝU)Zf9p*(7*KK5қ:+SQQ}J +^^5L*jѺ]q{Xb 75$AEHrm`?ug8kXEVg{!\^Y/ ,^"m!5dPPns>,tdHb%{]qhk12|f;@k~Y=3Ycj.RRJԠ%y4ĕ!SwYjC/k3t+>GHyO&uy;<ŶoSى,dIDve>+J/_j:[W*$G6 U+ܞ%(8ǿǥ+SNJp٧lVu򀴱MqYM]&F_o iBQ1bI S-5[]=6qw \/ Sz4 DhdK#KY~S^E50\:$kGrz3#c6L^]C!vv&AaM`3^o'.I]&8quO%_@{5 =aa vkQhM=O4\wdž(-?.A_^kZĢACs (!M^ Ou~u\WW[2M#fX]6? CИv,Ç~V+)(6Mדj0U? Wj,%W.c@v!It{a(o&ϹL!|z)Vc7 q V'~uַ(L=}"-FW-Sv~n(|s`Z`DPW}b_Bͮ%.ұD)|oav 5D WF{Se6jf8˙Ԉ`sL'OGȓI_~5iN4EPd:dw 2GɳI%`BgUi% ս}0~vmτnlj4SW,#Eo7RPjxI*[)3s{GI/eHX[Lů)}X#?V*iVP37sAuq2`^;rgk[)騙t87noY߱GIC:w-6a=AM @ 'E`mt[<^9^ʄ!P.E|đGop̯]4-=GޖLsAG3$u.ԭlLoQAh.P%a ^}˗cYڢbvOÃf `~vvPϳSy̮ݗ"4hna\( n,EC_''AHuEhu02)yeˆ53?wт(]CJA|WP)+1m{=N[Bnr-9]ٓ3cC ufݢgcU'i[[Bfl?S8~PI@L{pf>F( /ahň.r{D2͆ذo4Z|{a]Uae:9kuIX\\6DieKXzDJCحj¢5Le*cy/yPI <SB*}A-ݘf|;(/sDh0|`G;wJxu@_!8m]g~N%?uOR`f]IdM߹W|-֚Tiu{;$Gl2} DZDŽA3XN`=zrD!B; Բ8^4c_٦!Sx4+zLyxJUQ7:g[TY(gS-{[(k5+K=}ַ6Do3_[:7u j%0O#ƏTm2 %<`K;ldCKyaMj/F>/rm9# [,Α!q5"k6Rp.IvśttI=W}C/ef GH>h6s) cC&L6?i훜ސ='D(hJ a(0뒊:Eu qQX/~!hHWXGGJ4)Ona7M'=l̺Kȍd톈pӿG#3h.,\_9/> RB^W!AC\VFt[4O Px|_T#OTvv(85TKt}0 9F# RgD<)eʡ̹OQ~%);QObiXAPg2E,+zH Hɦ;h44*S^Xv)CV놆RtCY,j m5KUV L%j+ *ɾڹ #\DZ|L26|2魋rcxsJ~Y>""6Jaꓳ8]Mz+4?&墵Hf>=sXek&/Kv0V1y(pHH ,1dY{y懗B5L1K\4u[fa5p#藃mҲ"֎ZrHvmTӛeq\?x @`xG3^V kcqXU*ˏL_&#((+u<?){^ΖM;|D)~|J ]!crVb'd cu+Nv~WhC)-7NwEWYGvR97֩b ,u٣w6 sVBjGtn޹0j< H3r<%ލ ʺ$tc{7GES:Qڛ߈RqD¬ų}P5r=\NtAߝ*{'Y沨S:9y6.4> F(湜<. j8:LP=Lhy&V0a ?ߌӏO=*gGS8pq}fVD7O094/dɀ{Q.xQjVC[+jfB+gТ!$2]ic򩇶y< {?RfO}y?/ Ig1/>Z*3v}Q 5tǑ<'+ ylKRIP5dH.b\̃SiDoav2 6=M=>B[5@tZ"B$S[7Sw7 [ }_ )M4(lW:yr_؃5M7 &?73E{* c^7D㏘qE&{C̯k&Z+b=ANv@^_Ҏ҃<0K×~O-q7mєrp)ȍjH9E1=JytS*mw!Ĝ翓U,NRjnj2ߌ8DM)f]ntd=uplwqWݢ#Z|.~i-G|1@JrBXMMJ \gw4J;x /)V1rݻx=zÖUӑpTpqZ `0'kNED5M@qۅHsz 'PbI'"8OgyM0kM^\r^ʽYo 8*`p&790٠fۃ_o2nʓ> mUS]r 7!Ai[XihmKinLKǶ;<#G77]dɕzfs z@~{ j3$6HA9PG^  v9;*2R dg2uj: rCw@&!J% $Ûه9hr/%r6Fo|Ţ]ٞ;'i=V;[vd^$duP_=O05GI{bGdx%N[ +c70A뒩]QmdUnۤE'qdÜTYyWiȉG:Ed/?aE _Z7_[qzE"di?T:ӘSϡgmrfA4WkT09K}}++cD Yo\ ݮ?1t=@g8plGb\:J'XX["mV7ȡ0Q?}E(^F'g)x2u|o6ODj#5Xxp94fd^+~&9Q>nMS_7CZߑUuxK$ ܉xƷH -,yVǐeQTYeKKOIZk'LP\..yRY^q !-?y}D"vS 6)cKO%wgw\&qd e1MJņ GS*mY@ jJ3~E>CT&7Nt0bM0Y Fď.7DJ ^u6~eWai<,-'7mYl7,؋-*f멣nшAgeIWV|X)*C);Fk>v ںe5@&/7ŨҳJ7} 5;c$bHX‹ާPb ILh)Yb:=Q2&`tCS\T#.5HV'Xz\PrB]_s݁hV<[\W] I:`Vӳ+򯗨T>;C%r\.+ iCa)l+B1NhĘgdv lGP=$B$vɛ8Pnjd S俐k 86K/V1 ^ ^l]!+F0["̚3TtO~C/ZAhc̒7v0}`㧊۳\--{ a`'#[#?c1;7iG`|\9=yP$Ly%Kjz2KqD7v4uɎ٤ \¾N6mưy;-Tθ;)-3J$7*w&魡 h@9=t /%V{bttgnRV6 kVoN7-Aʌu (Xiy~U.r,Ԛz􈎐O@ڷОaG sPtUCY}’Q F\0>X [8u{1Ǎ^pS[ӛmqOC̿hQacC^ MopK5bJp3 jv9oY>IXK8iD0y% ң)ǛgSe k^K};S㜞ư *ihӶ)a@9.@7 Q|lLi|x5͹J5| 1Qǹ?J[r򆐜[z7|Ԛ]4GϸiUGHTDC®yWq> (hH>Jc?NeqmY랫:E#Zf'?abΟ8FQAZ: RȜJTxqF> ᏺL;̋~ ?ι8_.y”WkUAP$`DЉviIb 8H;dQwy D4-G|aR2;v.x_+6׷hL"ez1?JH$oT(:yf{CTx̛6pz}s'[PQo!ӝ\)pJxWJڰ@ ulA.S|2 ""jhy_2 F򾠵J%OC{({W>uρs!t`oI#r;Oy\Hj9a1̪́)DŽ UZsV=w4t6)tԉ&=RfX]'9(Q3SpRG|cW{&8!;zȳ$\ZAhkh9i$/t9kj7frf0v xE쯄J?Ye tv:HLVY(>>h vD.R&> el|W'EuMUhUVFkq ލjaU$ZBxΙny:̇J}˲f.cGv?5 yE ԋ]Fr(g3/q.ʘ}-3V6cȗh y lv"k̄>#GQ~Ȇ6bw{&ijK$j,4Y{(PFQHa#֌UŃA`k KHEjbQ|\iv#x0l=SIz>*1''^cϋrmdyi:D=o%a}Sc e"m@gxcmQNO+Tsp{݆Sz$+:'ueQ~fQtw_[0?V)-nz[c! ƾ؞1Σ.w c{OPiRa(ϸ *:DxHZӕJc҆-#uqXxz0Z`K1ՇJÏ{|Fic(.2^T#U/r kYFV x"ʒC'@K7),xJC:ϯ\M|+{,X?KV5؄Ml=d 0 }F2+ia(l -+]~ⅻr& b3TèujK 3P!aF#g6𧠊ENIϬj`oՓziM(D/8A# R҄ԣX O75, aGh=4:4D z*S<'Ma.i]e;4~rݽS->n'M^􁈶P/HNF4I@<ն~~$βK攭, x6HDCŝ#En Xvq*᏶ZE/5aqF|^x8A/H|,֊9Dsw(ؽ&cμ| 8\$~tZpWǛ7<۲Bzr,V]κS|;?:j}}yaȭEhM7*]^=32AU_4-UvNlg2\xЗKȢ@:ȮkoQ+ c;LZL?BDh\Dcٲs2EY,[KʙٞDI#@DE^ycGSbRjP-|CuavԗI&DjI&g' 'UMe|U{g| 5Nytccxz-WVy @OG@)! ut9H feĺ۪ٞWi;PN9$wT;3Og!$͌-,H}Y:>rxR!e VDSCKlSeq4u[;!kGP!mgTC1IAj  !`/0[yFyvh摕m]a><Ly,#~ ˘ٹ<*y/;w3;hu ӡ˔6 {Dǚ{&A_!O(GTeboqvݾ#C} aA4H?^7'U.Ͱ&7F!z{bd"YkFy̐V""ø ùwzjr./b+U:@'jhT(T8`AsF`MdH fbJc$:.۩_;ϕ? YN@ǘ=_"ţУ䈗n "j?`c2\c <-&ޠ= 8RSC?Ot`7,z"lAp.ZC{f4X&`CX{zW+!^VF s2qk8XoxBL[ϕ(<o*9%Xe|V802V7aЈ-$V., n`Pn~ۿ땐0lov5ͽzHy V"K辉[tcÊuK߷p IC;&,CMɘNs_c\B&;%G6Kp* .)K\?WERz܉T ٿ_XkM*oor}}O $7t;QkSZIܻu_:ҝF`*x L%st޵ ځ_TkY^ȝ_M5mX-) v*eFI|]\XBwB0hH75o7-;E(׻]m,j im{))Jm J9~=|آRIwHϛ)%K?L+rzj3;ADT:@崥S* M*2ĉqL=:ZnPWmQ!At.MJz1_E06u5X6wP t_ڧpJt -pQ.#'p*qz4PTQåU >.h%x~M8GqM, P4'Cfjc!qꗹ? 540 HDǒo%O4Bٰ"o̿3խش`̃P+T"g"Qx7ݐv J£8!! NqFds !F3[xRIe9kvVm_ON [ t#i:R؇P~c9L~'I2N) S_k!nkqU4D=ge_e!e[Zo_nB@ %F޸A}{ i'GS&CGYG|Âj%#V)jƶ6.(ieH*=yH7/0YFֶ{ 66w a)a[c1,Opy4//\1 Qhjn5rwC滦u%g̯eRkZTnl~bOvwS+6,uc5I-Կ +Qv;m'/\Vu`mZցsܨv 'ꊀgU{E>bXj;Ѭj,'@[9 8&֬iӞv-4 M/%ʵ U]%yVL=Qi;$:={ĥT_'͂. 2:΄r:qY?' ZR&B\kf?TOy y!ydyj=\!Gs)j2C{(PϲAIe2e>b GXfH!詵AYBTz[/.a_Clt:'MٍMp!S+mԀљ![\e0N~0u|6gHELX [W<$Qfe5!5bW0_Ӫl2SN^V+.0c7o? | }T8mzMOghu{X<us xqB~l69A$Yu,Z"s=Bn6xL;}ؙGoЫlK(dRp}i]y)Q+pHhnwշѓ "9le,c)aBEs< 1Qsnli)$!oP0Qʨ6YJ\e?pXS7ʊ]"U_& T~2Y۳,krv\/gŎE)8GCPν}-vg GOa+ tmHUUZ*r4ceJ9+DžS o aNۯ?' TPS-D^K^%P^~ȵՈm[aBU4IFC5#/sFU\̳WB`WaX맋`a'dUj 8 $>HE}%rIc:̐e4YJP}DphF*ԇV[CMlLQYH}_mɁ ^ Yc|۝?DP؍ԩq)s ӯ߾(֓ !zhoDFW u7ڕL)Mz% 7vd;A]кY4Μ^)";k!p:}iMp$-Wڤ$ Ɇ KLIظ@޾LVfXۅ3A%mrQEG0=au"1Mx[ݢV1!sy8h &ɽE^Y%՚aUHqw%bIOȗ|M0}9Pu/-~)#+L3V/~7)zBDiR6)bn0w'?4Ż`h`p(FMl̏쳤G!lVQJfڻ.(rU֞6%43 7) t\rjt O<^߄?.EvMRf$9: ж>k2;XȭPz9ی6(e #\UaNSlGqPQ+N| U|n~'|oh6SA{'=[M2,t+?ֿ,FۥLz~lf1yy]2Sj!wbB|XhZޑ2UezJ Zfa&rZjܭ`&F3fZTo=SVcǕkv/]Z)ѕUrHLZ*g7Ӫ%)z~+w1Jkn "/̆|} ܊MUɼ wvلvIM\M%C\Zi ,6Xm& K"rF k0-}/7o}ް]JՐ˒6>O|+DZu1a/7/o{ z;9M̱OVX]KqIR%pUdVf Ss";{cKyw B݅ Q#".J~#+w G3u޼9Ҹ)g2-wэmrlnzbĐb#~#n,`$'i 3m{4{> D}YD7c2eNp݂Q\[@ Kmo3CՕ)Z 6>aN-Hg'qKsƴ[09X%jRrw)j[J Ξ8';iOR[ʓ.87J1`HiquԈ)FïyMh0Mΰk ``kO Q@KI(5W)KĊ4'$7>S%¢ݟO#ޤ ѡꮿvPVcuQz0)"ٸcft]1qthMٝ>y. h%E^8#_74@ds)a*D ie4k-b ޏUEozƕ@xGÿ ~>^ߝg7A{R, %ES]FoY=qsslLU/<OjrCx#bw/ÀBD-h"W.wsyfwU ,SP=vT(Vь?shx GǣDH)xGR{ *7+p3g;R isX\(%1N+9cŇ K(1p-()[BnSG9a\ u/?ɯʹ |trH5˳ J%:I!K Br_QХ1ie׹}5lBgm+q ԧf2_L :-}88b"8(9Wʘi@N=@JGg ,{RG9@'%n!ԋ tFmJ|`)^ O7(h|ͮ6Sl=~?o *#cŭR C1lYIIKpj}\1_Ǜa<PvrQa?kpdeEF-AAgaJnJ8H 3܊$߲/+cZp y_C X[Y&h5hv$py SAD4ϩ&2ю8F Ӯ JB5U7gF)dtNt!2]"(d٭u4/&cftTn6xzT}t!BP(`H:=m7&镉< 0b~C+PBU0%a6fbrhfAGvK q4W.Sɡ ~Vh&H1daZ5c8I_x& 1I"s+FY '?%c{c,#6hBvJKT_: ?ħln Fי2W֏o ,W&+P+PYml9v@ Aʧ-O}N^ٍR@l?(Rˠ -{xwQvF3 o0/*U+c|¯NJ} e~b "BX ݌WwE JnU`)w?fval `x ZRVM%bzNfO7z8N"*2pktOƫ>~ʎGwֿT c\aަA-{p!R~01Ŵ%@>SH2r3xіLTTOqT&i->ᨼl?/ctRc'zƠeW(,'3&O/r #].u,U LzW)V'[Ik,gA7QƖ7* ԄoWhv2JϔZ *pf, ۷91f`y,-3Zo}ƍbG@YFYO \*IZJ&^Nae P5<MOE< ny o3@w|k;3MÚ(/ޔZvghp+8;_$>?#l. 4mۓ85Wq&bi79/R  E?a ,TvO9d*)IU a(+5V3\JX/'m/Y; _ y @cn}'h as|cն:oO ݐ&jTRuў D6Ýb@cE! l!C=^)L+"g]&-J-(InnS<_բsRg}XM (#g]aNLw tjO[Iew(wHЎp9d 6Tj|&x{N3cXl[|QJ݅$H "Kg|}SWsn)&v!٭k&pD3̊]mq`zz%˝-v8)i]*Nr}C3G)&C/,cm|ZH*炯Z#05/^oA SR,&`mX R:!-%YŜ}"/MؒtuPӨf_>VAk|AUЛ^Nxi5R9)̥-ECr#hgbqb׳bcoI1x݇2>V+C3R:?t ٪yHpFN7 Kƿ@nh t]j\%qY$*ʃ/S2kxU.K.˰Ob|㮯kCznA~F.]LJsR$*ږʾ+_?pwЉyD(وʳu3-5iN_Ų*KCfр_@=6{[׼D$1wK݂P,U;j!0<ʒ|++?ћ]B~ce*{ S=;qXd}kFa*Riv٣UGY=z모;GaZYP՞U9|?ij`[:cgLc0pڭK|G-{ 6v:^b6$lS !aa<[Q8Ԓ.FC,qP'%BH#[NCx5jtiwqG!\:5+*{q}=Ιr=#n%о FkQ;$4 (s+R2@Rci xVSd]78 X^) &ף!K5-_l=Q@MԮ2`{{&m+tM؅-=Gx#MY■>_̚B]N:񍬨x5߻RM 70&Jn̆"BR/1} G8 ESg*7R$/Do,9tu:shoB u[ٽ17nP߷'u.Pi4wZSt_v=tqem+8yD p afi±A62[ ptvTH N" z8p ftUoG$ 7.57Ud1CZk "(nמ/I-_])Z1P 2)dd>e9~ ηHȜG$D'9 wfǕ|)&> *K6712xYiҟtǧq[7m`$ݸ79ƞg񹞄4K^e~lcN͎#@:[4E""KsY%)ۑ{7?vwdY$T't TTSQVZ̆g_jiwF͇rDyQc!4L2:$pDW6P41B׬Ԧ9]BYEpFԹ+ rF%')3A}:# bl?[u*,tCoGgE!E&*-N ;Skf\cJh5}CӒSMCG: E27ǶHETp=-,P˥y TZE$ ,zlוc˽9;]]HW.COP@ia1zq0&~ȍ' Fdzs >U S>@D6`n M68wYŽs4\4)ag+;'=O er7jO !e7fGݝzJg/}WDX!L@ߡ ¹rXT Ld.F(!)jt|KTFiWԷ$SwG6}.H9.?zJ&2:LR1ENMgLsd!Kĩ?#ȟ"*[ny!~<a#5I!s1ʓ>RPaOTts*w, yGb9ҩ"u'9izyov!0+t nC Z2TYkzA: dՖl,X;tϢ#I 1}n;qAmTܕ.cRgmiJn$:YfoK1!¨6_L5뫌RsКDCL"\ibeW>pk6ŐuKb 5 [/ͩ&%5t6}H{a9c3?QVuGg`+yo%N7?h 7y.GMGG{yK1:#lv{V+-e4ƭ:S.-ȐT-T4 /bεt:N/Zd~b(Jcx5;m}*dDz ih霢oa]"Ai@uG'WOlES O/2STGޟCOߟ-DPqޣQjIw=b`m*FS`&x=z@Pֱ V{*>#>#3YaM[ UF=s8Q?b;Ew^~phEv{XX%W3hw=Cj4a|Iny_5A\O}[AKM/lYc^)X# /MK~T*xO4/<>%eRX  ;h'ςL9}ǒnٻz,,IsksxN8쬮!ERh{a8w@4MJkU ρ1M}{؂Ò4_XD2ۍ*o==0vacq?l/l:[&=ZJ XY-tၼ~$# "|٪?c*'o )mr`S/2SHmyshQ{}[zdI@~U ?ϻ#\ϱFIY B׸p=7%i;@ޯ#ݸL)_;Y.؀ag/tIy%X; EK0lMle.]-[W0zLKcg,u +$Q@E>4 b w2T,ʄAh\k\!*!z"r*̸Iεвr7X@[ˈǡsU4I<,}玓~`݆үpO\S <=ƒZ ';zG |̡鬤l6g!2`pY4 ͽyAdP\>kv7CixJ=5[ ?D/^C iѷ"B Yi]ߛiI>I![ e͒6tXʅS;ƒ%lӖ;3S\E)&V0t@#!>֚dEG+{#Yеe BobNhҨsGԨA']k@Ո-0eC%ZS)ok&K=_ȞP yۀY'e?hpZ8ԞH_(u[_^E 4_'G*u&DjT1R޶i4/;bIsK?O}4 pdݽ6 O|Zoqeǎ@n~ Dy, kZQ9tR.:,5F/h^V@&HG"觙Ȏ.vke4Iy$c7BցMj/ux. λ?J^ٲf;F̅'mHr4zv1(U+rń@B+ S[ܚVa?<ȵAFb{g`vyjXF\rҋ5Olh:#)Q$vE0 (lkb})hL}-~oA::XO"3kwȅmDm NE* zo]%?@="(&~JqMK 95"/ چq5,ȞfAPP>J]UY Rzky #oHQm >fzNE UjU'bBrɖP6߃3$r=F\\*pE'8p.il\fT%}m 7'&}K\6퐽5`.ƭEA<0L6/rDaT!Z˾;Rf?/O撉@עRZi`ψo|OxV+'"yk;:1Ds(0D= ^k@nj\!$X8ppM8IWBXwwMYFƕ8p1Ϧyzfū2p1w\rEE߂&reˆ"ߥg9cTv\tT!Mj ~5-.$rV r-<)V5N^1]WWA}`T^K|U6\mhJDKeZ WXYFpey<|+*j( ƬV|p:"V2w-JZFs(Ģ]^&:w8w|1g\Bt!Qg=[qzkֹB}l$1]F Ladi{&;)8aoUCPj:;p ~ 3_3uFb_;Ф}A5Qfa(xyq"s)I&;- g \`2&F7I%`!2A3N4l[,F@Q\VuUJ1MIKUzSЌ0$8vp~BzWU^vCtO HM# χKS/\;~rhߌP (jJS}<w(FRRKr$ɯfT[o?ьGK*{؁`aMg{ҔslBm}(w%w\*ӛ>%h z;!HEڐݿ"%N{b +ḝMZ_MBt@r;S MwQKwΎA6O&? D0-;;**:r*Dm $<6ʖI{pڂ?E5:cUHz] ~%wyR,9 P D%G(8}6Tyd+(}/Wϙ(c;#Rf.nqP8n!lAe[ȒWqxnw4zNЎd%}(,"Wu_G qsOSdն4F?2 8wüQ~C -jN벮jl)& U@wK6[7O؋J) ++K{qI| 9m Lh^᭞ |^7娕[ax\:޽;::w/K.AeX x  lLM%@Lw!Wn"bF5{&ȸд`5{Ş![u|"-X7#.| %uyXbo6 pjoV=Ԁ{UDIN}%5XojERڥ%LVp m|I.ETՁ1$:63?_y8xtTJ91~ R#nJl}* @boHi.oE09VR7ל{qQȌRc8F(n_ZF@M ,o3˃tSY%n>ms:^̒<zz͐g}T1kg2kS<©56rg'ފzr];dYfDNi g*h*!{X[-x$د/Kf[̂τ>nF< "9aN|jK_cX\D$ﱈBۻk=_z,TY5Oaize=F"UcP< m[%Y?wCь>PG񀎔Dayf6VĈ_^^PDl3/23/L|Lܢ7| mnCeXߌ8hK޶94b+uﳯ>ov(7x)zTh7,UQ ~YD˵٠ZQ}MlȱȍYt/DP8Bx#Mx(A J57R/oI峡:.W+y9ap DRo,&> @%,g+o4;sX.xAzL+鷯ٻEdcyԹ&@=1e.MZ;_UkcB[sX7 %9?$_anus(#s(KhP'+U}H~Q gBDfEf3R'HĶMF1[ @@W.x_:O#m'HIt\8dmlGPi-ia>9|kvaܒ0 hgGPSa9E+y*WM|[+Q$.ʪaq-O s \^#Q+An ]Kd0Rl4u3e\ޚqȩ)[wO2ㆨ5D^:\[mtQ:!rM:V)J]TҴ g2&]g>1o֞Ee}c!}ng6F߲r䂂$Jc=="mg6.۾RO!.S{9!0-vV2x#Ix;Z[M? .+۵#p1Ƶ{" lZrd>d ƌS}hS'JET҃ۨN^tum/ߙxZLJvQ; Wc3'}]<3yN(z k_ُ?h;l$芰KBlQɋo<-x٢T\7"K6F=f!Y]TLѢwX/xg:/!~ZbJ I<Y5to5SLP#Ydn?[sYGaj`0۟CJn| TBE>F\H]Wuo3pP^cӓ(~qT˨ׄ[AnFR%Jͯ2Toe_=#؂%bZ)(X{wz袶))0pqMuW8fΉf} Q:QGIP!;j9^5 08Ϡ,\[өIkKC}g%k#v;6MՌ@"C{5rZmVu[qN76*%Cs98]YqvQ܁W 9 GyIQ( Qô"xt:bu.SoIBP+is Ƀt8QR#pG /Ҷl~^4yַϦq#2%&M f³KlJ<`s"|xX[NJE' @㵔2'W-"dK,O<+4z#rEN43–J!4W>؎tI3E BɭF&ȢњS =BTJ5]gӢWrU/+ gHj,oFr)_2r> !cw~N)&aq{6b=HfWڊ焅D;#=)]?cdG}Un36\^/ y}(Dc!'Srg5? >ݪ4ڸGe:&F&!@"!EWS, ePϻW6&]` s"[LiّbGZ fRx1zJDkXgNQݷWyex4t)Wu=HM..RK3^խ9=v;+QReFp9M]g_l0,vi*H1Ê ;XGi]jNm y5}]!- /@oGZxQH`C|CZ)>3HU%]VF\n^=fۥWRs4CeWf$h<`s޷ݍ܋ܞ:M( ƽ$Et0鲴)G2~=:޺*Cp? ɨlަ){ ? N:;0Mu-@m(Gz9;;lJHpLe߭ȇLwIWe_J}txCAO}d-8Cl08I‡8׺K b MxO !5Vw$}kE"0v`v}gFp|jjX: XJe@W ZS6d$mR҄^vJk v7Bji3L|~-J٤CAJʻˆ`}63.*‚[LdxbTo3Ź 2&We|g;DYo8]ZRӍ)ƻhj;Y풿Jy ߉+/(BFW q[a+ׇSԀлA]/Ya7Í^c(tɮ_˙;x< F#<,XbS[9]өnx`ٕტ+ `'[6rqMBrVS?rrI^ط*YFDs4 N"$ɫF;˘IyҲU{XDNj1*U@1*G#MWt>S` ǼQx36PkC% C[_ND:8rBU!*jUЬ763&&M< #0g;_)*P) !Tqþ,Rmc:U</׉dϞik(ܐ`]j\ۋ*(ʙGl&7=4eoʝv4Rzd69=IQ[[=&8rd4lJ>OȁF@L$k;I;m)Z,8޿';S8\0AI5CeU-d\ʬ*LV?oV󚰟K3eQWۊٱ/JiH|iR%¸q>Ww3svDdO;馬cj%Qry LNꎭ:{d@)a8 N@bg}mo*scQVŕ5򡬼AC sY.H!'a QZٚ5I 'fR$[iJA.KH~18PiZZj?XCkT^y=/R\Oe>t˿oH/1W%:b6a_(tBjR ]L5 &*ʋ%ZxLE۔z.U&b/AѺSX52=g#؅# ]x)\CCB‹ݘ\*nLx!ٵ`GNFcdi4ZͭY6DIY$9Ʒ}0?`S|o0:|0~,`?U,:̭:o= _(H&ê"-tZx|\Ofo'(Y?ݍߠs5/lȅaWsf1'M7nGar軷>?Ӧ*U/mS;i*8&V>b6p{xjiUPcH 0!0՛M |@rӏ9Bt _{4O0)Ǯ9IQ>P~jRY$)7&Aޤ18h3AV<P{= ŪOpˤ dGO˨9.K,l7; L$=yR(ܒ=E 3c-GA- sOZg'8TwCt~j@[etck{d佋xY8MS$ӛUsWRRu;9OrǪ7K&\4+xh*Ral0^2g 0ǭWql DDýh` |%L,&]%y5ipE H-xsv(]B)1HethG-JH}{zFHFx@_FJ91Olɏ-RʄOAEcavC8/,BN'AP]]z{5DvPsGHoM'4Χ ۠|ݫO{^Isr}1|4f3On΅-ozA붑\`nE%6>AdBQdUxT|="ҽ,!gaa?Lu7~NxI=]]6)y$?VKb4NCƦw' ju /ʔKBijzKNz0*qd׷ $ #K)ͫH(nw˜ FjŬEBz(rv#MO͍Jm~k 480u$AT|oҁ\@Lٛm,<aڰ6,(~#d5h8XR'ٱFTyo&uIrnL 0##ͩdw޳`q@&ANZu~ҙ2z|ꬫb(k:?#ikXt`Bd4*;muM3 9gtC#k,fvh\Q2L'{u3]v\f;$3J \>0q:|W¯CZY=ԁ0??]F`uZ0$F] 5*xu>Z [*e?z$x䩉B\ |-7Ozk:C&>=P cx#wm"2'w>t@mݦoYԃ߲8oȌ}QRzǍMiTM-=T|!Pak 3[;JRF#T#5}oD Y+ ݯT>z!SU6{H.,"DYj:nj;.V|Vgks8?U RZ>,C-;"d)(׺ci/1^Lf/kpp#{íQizJ:̿K.qb= Qڄr9E͖~mU7C.!iu_0Ѫ ,=&]d|ƕ25fk$CI' 󪜥mb9_X9M\:W7`ZSt̋fKzw+׋$ZC~v#5lSYPk$ Ioi߱iTrݐPYHo?vɞԌꝲSr\`}:B;TL3*'a>0L`l%#P 4[Y7'#i Oݏjr5#W(c[!OI_5@J<$f8͌#q+y~b ghċΘ)nKָa!k0h1ܳ)ed= 0nT M 6o֠P*|;t(#W}y \jd"780ky~Erȑm7+m<,Y wNd%,aYYKNDMM 9Ôʶ%IPٳC O,2&)4!s,j d2-pJ9Lk+aؤKQe"20cCuow.|(Ρ,)t`dZWؠ uNJ!_x=~vNGVa.w;7ti*  YY;$d`Є;1(o68xy8@ChD]W.)IE!W0PT[V%_%#땹&4̭ݟ&Q)m2WL?49#׻e/ycR\w)yHB0*nLэ\GFU*瀡/^AN yH4pH)ErL?BFp1 &0kV'`X\sP%[\N /ffO4{A|&䷂h$}h5FjU#ed&iܬ ʭ:y \z2^Ǧڗ{h7}D ̠ gx(ֱ燳O]01A鏑S*j*!MSe0i/\ aɉZ"rϓm^mYӀQ.hNQ7"Za Xz~V&d"(xxܩj+$uV٫_&C*}` ::K5fTT:UaxS ͬd[Ag(ZQXiAWK+1]$),`ౢP&1`EЇ"J*mFL z;kN&*~LZ &W ^S2(~.#/ Cz_B}[Js3̠6:(ۓ7*.v38vY-S_ k'J)0dy/`X/pއVct,&jjr^k|eZ\r3ytf~W|V~.pӗ BV_ɮϧa8]J}H6Mq̉m׎D"K3\W+١@P! ld}ЀQ |YPo.\u%yeC :$ *8 _' Sm!79Sq vP c{Hȹ|mGφUcÈO >Iqepٯgͯp|%fj&#B\leB%9^ 3Pdž!NT"?r9=ߴQDAEik8ӕ@]dV9[ovp\fM^dF(4EJ@NE!źC<(pvO}ML`jl>cR A.cSه7o ~3ʧ˓cՄOX#bTAybT/C{|n"{˙AURyojqH[ц,(MP. ۅoнtpGkLCE_۾`&Q\4E[)t~~yACSpLLo.|}A]בx $fBd g' vXiaqLT`{G,e;P U "˹ߡO&5rt%5?+p:"MU\ϯ.H Q&""GWq%Ocaр[b7!%h$AU.'/L^OʎKX6VXkZZL i_E# >kԫgpIt{}X,飜&۞U;Ϩn $#P#d1 F%t`i%YV޺aPXPqw4)kZU-!h:I:^vZˋVO#&nFܠdF+\P5˘~g|P@VOV ,u(Pѩk6m 'k Y?S&|ޓwl6 ޵= ӌEBn=>07~-q8Atn骔?=+&R,Ob dU.K{DL4!oZ5<$^Vv ƇU#(~ U8@AizRP"KY);vNYe0ڶ|ퟳk &1Wp.%B͇I_I$"G$iĐˠ/1>C^&|ZwZVISJwp^1Ol7!Sg@G=-b}gIDop]Dg<_{hw Sd ~)ZLE.y/.aI>8m8!~9$KFO3]ԋ=T=(ns5t-8h"#ll8k.@O|(< 8%@c|/8@&SwObхU7{Ɔb"z"~˅"qvpįL..iO*pۜQj|H?s! f%Z_(s4w)kWh쥶M.eqUטjwK:VC y{̳.@,wwρVA6 XſhbHw. ]֕}٣t꾏${̖ލ BށGL԰JEˬG<%~>K*yB_Dr~OY[[(韍q#d26FiZ.P(ft40jGtuU35\ڮVvg/9u%nʗPdI.if΍'`E._RNT'7Qe23WReWuߴ{be6WdkLj-;"<`и6 _eGڟ4;HF/ӱ0ZNZHӧ3+ #fjEMvYjy=C};rVJr'ԑbgk-w nyF?4[z `t~$rFmo$[⋧g)LR]nǒ%n]l*NQ.&]rg5cŐ3Hƒ+dwzIx`"-r͵`XmA5 L2*/SȺ!l#7;|-`/y@J?zKԬ)/2ZSf҆V5qIC%|tϚ;EGKܵ#_L5[\x Fa[t>[3ҢjcdsAβMװ^ݾo7 N=US=igxR!Y7;~Pd\AG8J|mGÚ ZPʟ<:8+Y̴G93z3GC9I yFn8FqL&aԏtHht97A V0-ĥXS+sD?3=qPo !/jjl5EEo#`F6G57o,a -&s\OPW$sV:waNH*&V !@7 dq9oi k7?Q`ȿVtkJD?QXwEdsID[ 7*X'n[ľ p!82nPJj3R Zq3c Q,'U2xw%BlH<DZrY'#p L[![E`sSG,ą~C9[]Ҟh{Ĥ?C-䯽j~Հ (ucaf^ E: sRѵpUo_0̪Gh2bL_8MSE%c{R"Ъݣh Ff ֙di2z챎xvt&DZUm}ZQSGTLB;1t{f}SKiH9҄MX> S-ݵfmS%.>9K(k N`ƪ|>CT^A ~/(CQ7ˋQBZW7vS$aR5(02 XmP0I|gVkٙ{4P#,90_/T0/dLxm)%L05N?ngm;'Q`"xK>KӸٜ=[=V[dDL$4ʊ%oOG ++Nh`3 Pj#vgJ+s1TH:{O^qT "H%x< U#=҄×#'EA%t:G:v׍7w'yqj}O&'5 }8ʵ?UcJژLȦA*absE2c<IA?̨bӽI9/(!{=y? ho frIefVz(=7u3Tyrt_H~/g<|}R&:b#7_!hﻫEkgEIcDYu+$8cL* K## OQٸz.ps&z S%c9T<)F/",Wl3r8=7ݱu8&t]qsx<5YQX|}ћ[']̽2#|6"?MGez$F/@ࢠjLyYv)ή77GK>jC]=HbBCIoktK~;Wʅ ".n/ÉoE'rDNێ_CE";4OBjR:=_ڰxO7`?~۾^4yf"8,n n?OBw+dw {e<#GkxΡtD?"b_uE P_oO {j`-i%2erUqe %K Q|jmT)J/MM&L=}`W[[!d@E PP_X(uWN>o G=GN%!f@ ꢓeðSmt'Zhv-B%`\1TRSu,ÐԞ>x:H44_jͯ _ifGߞtCwh!ve\Tll7}_~!m@&'_ ju5@Qԯz4{1Z`rHfi|ݏ0ތ4}иzClg te< F:X^d)py vhi\N~P4h V5ƃh,};} .nԬ"Ã,mv p2 @Nf%lM%Zrق\܁!"u9=rS_Rb1G0Hc*:w?'C~naW`쥫K~aTc'f}}›8X$@,i_%1N銣MV rG⡛'sf b{1:L:͛Y ^ 祚Lȿդ+TX!9ێFۚ=R=E{ZKd7ҋȶK]d }C;Y_SMNt <]E>OTPJgvLvҢj| HT3WNdGagjʛx6$a;UMv,= Peއwe/Rss&Iȗ [Y7CjxĄYFJ|K-Rș]f\ }heHu hgc<X촂?1=L1)ayY7y1aUŖ<-*m_"Qkd$a^_Pïf3mPİ%_nIaRf5qӔ2bU~&hl@֚Y/Dվ^81(=uO=- $ܗ%S4]xQ%}\U¹H߹!ӔJx $N0jR夁Hd'9^Іk[,^Oo֬8de%^m/Kb`RɎ6(oLWi&P 2;f%r-TJYLQZ',2΀¿t-saҷ7 *0%ꕓјA0w ~˃c/}?Pԁ`C$Pי%ɧ/w < ^yǐHE6ܘg%Ek\0_gpw}O sO5bRqZCv=SԊ_\ -vX]$c `5J"_Bh&|]LP&ݨJ-t4KO < ϸo3Vdіry|d (bmYV)*Nlbw)-JP6bE%wUHNR:Oxx*_e78jt/];%y'A i:u/ 1x# D#[B~Ak$ZF-{I@װ@߲< riQ祽P,Tv aOό0:Sp5ŕdi ߆S+v1ʘU%Pm0`WhN:mݪ-ϖ OU#xjk2rHKZ<:&@P tOKgjJ9ݩwlv0|̿z5d+xʼ)N7 Җx &Fײ1;Ul9OG^};'!7g?Ɋ}b{Z̵vygOd0 O=00D͎H}=q7Yl횗ԛmMb' PՠTAQ _axwM+4E6@ʣQrOj(hADϏ{w"'M;Fٚ>#[dH)2_T&ʉtS32Ó'jRb6oSߠlQ۲r`:$D8g@Ut PmԈ{5U+hX$O]Jhj .yި^Tm]/j"t[iVGӽߑSuuLra֞P$8yUFb!*e/X(6hj03+~YglH[e&ֺ )vTf vI)[!!a\W#ӏM9~x zZFo $;x=Y!h.[=AYv*ʶ|X˷m9Nq#h- y`[ΜU|Rzip)`ov5 j|>gQ={3oW}[GgQEBc-7 kgZVࠏXT9)W*Llg o ^񣆇TìF"sOw1B !1Gqy ^K5X|A+8q>Aڲ(zW?T|PR׻r89o@s@u˜[W8)*c)ō] L$"Rpk'<}O;I|鐯jUt4OX&pg9OkanCCJ1w\=MԱ6Z{ 8ڈW7OgÂ3 k{Gɧ~0[R͢\keսO~BnȕM/B{{gX1&P-EUDG}Tu*>Bg٢xm ̟(;PVmqTvoe:uձfɹouFB\{~ΚnMkM[ ۙjD hi퇓/Y!9/ Қ']WH/ᯍ/z޽iRϹ N{!寽$Dl C#c2.Tu\qFϙws5<|}!_ ^,>7l Zm{`x9F<7OKޫ*xX(PJ><YC@MXqY/+ @BrgW|}3r9&JШ9p;`ƪ[0i+?%TtEiQROy3kD/Gٺ)ޢG__4 dJj%jo Rz C<",51<ivUXW͔!=PXvu{qF`L1_cCA e[1<_q=xtlpOMy9搸5!`Ja K ?s/UNaD>7TpD\]֬e؀attnwMBҀ@zJҰ|.* Xed2γ*x,T3Q)*BTx9*&6㜑2LG@ ؟:~~q UFHGYfRk`T#4 &9C]_%aN1aX>G1ڧjۯ iG!\=yHb aAkGPtvB^qV%Ep{x'x&#*P,G\F4,m3[m(V!8}ŷV2H>8G5ENi#8]=0<=8?2f~^Ց3AYx9#da8߉aaIV>?NhL]h9Mt*FF [y!0Ѭ!+:ȱaצT^a+NdeMڴ%g9otqcޱ\(YI_4g8lIL *٣Mto br4h@NާxJ\MC~ؿ>mdkJ۷{3Bzeѭ,"r d\#}"avcf㧗iV!g6.+̉<~[,wHV^m[5Y婋h# FVa勇eÇxgJHʿ`^{G@v bl/o7@@ikr(6ѳt(w6V_ϑlXnI_ ;#lCs-}W B½UD.'h:ʚ+66s=XxJ.[*2h 몬1>lEYLl ZJٻC!G2_wqkTa͍dc(vccU r.\0WO`Qfq V&B e뷺ډ>ѷnuh/hiGuρTo2y BLJ6ӎ@ޢvKpO^`V.K)hs5d~Bl 7Ub,`"pfkLd ٭tH- XGO-2샦E\e{mQV[:uCЄiG,`(TvֱGB;֫'o?:^x]ͺr^w%c&(?lܐ4iU2(wO վ9cXtO1ҪtFH?>e/ kO0r*j{[|e+R_h rm2ݠw:v/䘩[!F?  wGME}+R]FAӎlP$SPmsmX /$Z9bC+-kܛNo; 0^>49W8mP6deT0;|7MJA!+癍TV%9h8eV>c5?%&v@&wSÈ=mR @.5k3@]}8X+2/,yeŔxRjulԟdɆnTd0Fd7Q=XҺì GE"N!FZxI54~Oq4*#F;W+u[bd.v`%AӉ۳}e?!vh(N"lFRcPT1f76v5VW^JN3DU7MOq,0i3N.o2 'T}ub1,|G R_rx{܇)j yuhkh!09ӛs2ᄽ>̓@_k5]%j_S:am+~CJnJcɘb*E)U$*Pڞ/069L'C:hrϢOYE|U7п,R}l_?iN&Q;%IıVKt՛hnqP񵒴IDrz$@QF'C^7sbQNA蚧~f,h ]$fX+v翡[gR("3FX IO"e$of׌K_^IO9T!NBxo)"f _f_놈;Lr0}ޠ"o⺧ Co搂gQ1.j׋i~kDy.rռRUgݡYHg먶Y+)u옽pJoh24@C4{7ZZ9)Ui+p(@)Es 65] H=A">o{O5doZf\*}Yi7ҩϭz\H/:I')4Iڀ\[v n3CnbajX"n,ƓYI`IRzrVFȇ^}'h=D=hS>{ QW2-Fq>'`(s1T!y2H{ I-m=mB^Ŷ/Jz ϏI<mrC@y@zY-P{yDMēO PkšO :,"˽zW\ jL;nF'tK ti% ]IchSxICĜ8%9@Y _̐2C ~D:6% VTm59Ș䵰ny W. ^wTi$\8W=?_'±VFbpKBzH3'>)8?(~19Mpɧ<?- ؉Foֹ\zI0ZepDlhsT[#*ȐaQ к3ee/9HTSh^͘Gi{cGl#ƏǍ;j3@.k},DKN{S0|%/T_I`743gCUn%x| Y"S._槗9ds-[|8u»8J;P4rIMNv񇍹*V u7DF[C/Xg%T&F;7F;DSjNxeMx:yvV#یYVG'|㦓rtkr?^(x6w+8+,bmV{]O[rR~~(-aCY6W;6$݊XH=Z[tKӍ)m=}ewIG.Wx.`VnT4!Mm+r:'4e,x#ðAhH~x7ۖ_\ݳD nB5+F &'~:.e.Ւ~`dNO7bRp );:;ViAb/1^Zt$"dä-5^5 <9f-"㗋lšeQvi~ YA@@H{ap0z2l0'l1,[0w&a$EeOrSB4OP@m`R>\55."&dR}vL]3i# @ UUJ%ݡc/"[؜ꧻ~lΈQ?l`L"DڄZ嚽IM|zUxv%$&|LZK{y^ºȁ{{NH*,?Vwӯ*FFRuB+RQWPX' tv$G`Ɏ};UǍXēuN{Fwp6?N{ Al1xMwnǗF*6[TW(U= 9"sIk_ohA^ t:uM!NJj. p#8/Xjо oކgymdm )_:jM9g%lQ/j-*ģ|s,U+璮#uG7?.8`>_Q_Rj4͚97P[TE WgoT߭Z'PUsF]HHt,pI/~._9VJ^Q7yA;JdH <,'qo8#9M(lb[!W\UkxZ!BKpt/o7Tf$O)5>/P)WS3;9j vJ0WB[@)717AXؘ8HyԶ5`X^x ADũD!wDUtMs[;쟍1# S ʓn}*L=(7W8rwUdzB#~(9BVJ[75jQpqV*Ѹ@͔Fgc`i_O#?ѴX ϡi*06dC]z6}s#\ɲx %)PB\}M-ٺΩzXNuޚT8W@- th\1]+(ZT [ĴG(Ц-SD!0̅%p)0ηvtC D3+:,8g]x΍3ui٣jVG!zh_v]u;YTmm^mlH q]RBJC8-:(ڣNt+9cQwW]./:+i*(;O[tWQN3Rɨn|R:m0=|5Z5PH Y$Pć39'.L÷S{ L2\XzQEa%!Fl眏wx?}>5<K.,h=v|WJd8My wS{Hf>I+) M9^o*/hQPr.Kˇ-WDX%#E|dC_qq0Vp@veR6'/:d; iS(C:2G* 6rm2r4BǬUgؿ,Cick@*NJMOp -(‹ Kk$x'a,/ć je͵a\s=5iU GxMuS`R($".9; ma__)Ov&T50+ptZ?15[om7Ѡi;AybЕmiz9LYqw=t36snN6ׄWVUp 2Dea nVxc?Hu`N(!+\& GOzN 3/GQ!@jnzNXys,DcKf·d49VRei+b`H1Hʭt !?Tg-kqp7`d'kM?j<4^fCIE}9=P0)Vi?SXT4A4X*%jΗ_i,(O|;sVڭT`3ۢƆ}kFiѹb#z8hW.AБpfSIL\AXuNaDrV[ le֪807 5m67>F;i6'2eĵ_41cQAVh(DL rx-0/61z`Ak@%fp$Ő\^,ܞ >PV`=9jԄP3Gj8n'$a\rWF]F"TTK M3ޏVIn#25Etd/V;SgAoq:+^* 8Ȩ*s]wi(1PDC*`ڒ;*ӓ{Ȅ3⪋P45gߙJY'XֿP5|\lջHAv ?d`nرy_J"qM҇qV8!)^?HjP?+`/+nJ*&Z !P.E u>7gMa bq vtQxT.11Hc.тVڮs-!P1_Bǹ_ RA(";_X<\w) MN5R VI]v.z󉻙2O?rE VC75˦ADL1gNO?=M*M9łuANЍucovNi @b\w"sX]KxޘPRWpb}PKw>.Ε40d=d`CmW֜Kj J~ciOQEmWHYWisnjyKIɋvaJ;9Oql?| Oqm9QZvD)@5KXn]Ug.ɾ+8kƕCo;\+t&y>;~;V*dFBeRƊ>!>N*O1*Cop$%bdfG唩z:w:L(rXCmf̖"3SmUdx6ߟXH_%y3qX~O!<ڢ eЂTt W1:fdy@~9\7꣡Hޕ8{\n\LwlLH\YtM-e  Ihd3كve6 >7яDW!/CWi۾(2c9~愱pny:Y%C~}ik"Nf^,wxšgOPX{bI A 'F%?XDC{@k俷r/Xd?ZyoBϿ52 ѽ}-'٬4_r%@ao&=d\63~tao@ёz&2;TUlHh{ܷA˾M{e:tw97G3k aO ј'i. vnUā+QubGL]KZkI"$<+4B7}12̩&׌w]n\`%-y OmA` [v.Y$*W;e4R5S 2GMvL2(kfhnC/"a n2,тJ()BL+ߒM: h:Q0x*GsKJX. qXh'u,hq y۩4C-;>}pDʇYBN8*f}WiM8};cIt]7%\63Qݕtz\O)]|xi9ELv?$!i6RR5% k3o pXXs(H\Qv"ߜ+s}'K̴gmѡ_Y=,O‹JA#-eD8O}~ E=j:Q4>.hXC9tl #O=k؞D?wk#4/FpEy935% ( 83\%bi2W͞pXxOͱKt?;Q1PGNz}^hsP \+$/\)s[PC@Mp80q Tܚ]*D༉Ye3JX $ꀋ_+Ѥ ? ʕOn[L!P|# p}z $! rqy))˶ԂUÓq {\ hR+Pሸ '6b:p8|J,q*7GSkm<*NT*Pz ĖJ}lR'֘Jְ&4A4 #E*XPq_+o FyK[-4S-2kiAhܤlo&"6vB`5=zl-5Sh3X샅;D=TEB m=Xr>Ji$.#'$-9E B*dnX7A0C ӰƐ3%}ź(;MWZ=,tl3NЏbv[l-1Q.(:OV/FY+kJqQa7Bg7H䅬" ~VC%ܨ=l2i)VD~LK#)EꝃSb¬WXާu{p+&d/U 3H"&%Zy!boAA=->|^c?pD ;7aZs`DlFJk<淄Lf_tV0RyÞ>`ZWR\_B"wH$^猲/؊?Sb0nuV:O Cj Yrѕ .?%+ᩑ0}l=n9#ia)/[J*w v.3#ON|_ͣ4Ҁ|~u0v<64hr!&#Qz6NXY`ydc :*eO3n*Sɏ9xH|]w a%c NZ xv>uAo綃*]pb@]Hǧ$+2=a<-UXMl]`ɛ Ig@]&6e~ >ao 4Jqyݏ7 h|ME4 CKFک6A1i`_ReI\zr[!'.O85ιz[H@?~Sno2Ta3ߛ;u.DI<]ÍfWR evb6!oMה|JO(VZOdHȒ-rK-v/0Y^D QY>yo'. u ih++71Vl*qf ;dŽ)qJF;u} sɶtJهVs?,e'4]?ሱukl_bm$hߏC}!v8+d'J}29LZuz*?&@>A0<@T۰w 7X@1X'Ʊ=]EO\QS AG[Q[J-bQ5Jt<4^Yd灐HM.qkLVZ :wN$դ?ٕ_4BcF@x\/a4hwz  8ښ+ G:|_<\`g ?FV Ltm:kX L`;"B fؘ)8fC*B"AJβT7Q`;&Է>"{!:`\"kTL e1MF{QNڢ1AI(Gql۵ '7s92]pl^%*)kp ؍!'[HR$S`nþ-׉o|֖gI$j񟝃Jnl±cUpLkH{&t;; SH_)&%+PlNE7L!=s[Rߎ 欁&T0+BRKNbFUMA1t$ 3V voas9]sW$`9.)Fo.ĞN1Q/6)WcD/MA*X Z]y8 7(' Ǭ6&UE4]H\p@ mUD{Im1G91nSFugI:|&Z v|ρThqptXaUZX~[IhuUVAlP.: CӐ 6d.@Ekh [ɽla@d`,;|]Sq象'&PruOb ,x_2~ BB|:WXg! (ٮ[U$6i-C}-(goJ^f).k si!@z/lfiܛ0G7PJGDOWRh\ubo[\1F ѢKBGD{ձ~ɧS]u3؄!'[FmEwN`gٓ{3H@l j `Z["Xs3}ۜ'ɮ,Lr’a<VB$;DŽa]B7 =(*d*Ԗ#x_* xRZ;#:^yH# %=YK,$sc}Nүqs 뫿 _ ǹ5Kĺ*y|V}!ϖ 0KS?{) a%_%X! &II<:"㮭Gj b6uZ 2_0j"eӅw #IgE M69*5fW}->`ܓ srp"}I;qx X5E\+0؛piJiU!d|c1e7~Aa:B39|Z2M>=ÈEؓ$ː֢" zf۾9[B} }+ 1a>_)ХK^:դ!4 >ZM4 d,)M W`s]8v&F+v7W.O ȶ)AձݗO]GW|<#i":owJ;i!KZ*0Ǻ#,Xosw{\47) {ZBY#O,?0Ճff3)#K,;T,?r|q*i{n?Oe>!T=z79ki~hd9^n?Vso{-b3s*F;EoE4(b VYgH@˜9.EպS[9?bsZ9AVͿۙ>@;}yuɋBzy Ktgx}{lݺgc&o *ӏϽYc =ٴje[K..r؞"e{OJؘ~w^ KP&!gn\lꀻ~ҹ5O405] 绂;0Wb}]AARr;1ݢ1׫NfpZ7,= ".NRmh9˽}wu:΢d%|Sj{M#m#y08ω:Qᢷ6.57ҿv(DZEZ1yCP[ȹQdȏ`rx0Ő꒱zꆋ_b ʋ$~v(2l8ռգ.r #VhיRpD 32XrhLgk!MaViigQNeP5LJSz=:W q>a>I[@AZ$cȼڦa2#)):N'u#] WY6s6y5@jխķT} {Vc$IƦ=n5ݡ>Bg3*lԐ]ݭrS\^LmyMzn6.fwpsd J+ lvYw<1$!ʓqN12q ٙ; ;csZSX\jbw""MsWP\ iQOLAjLgvcyRZG̊N*`סpl\S-ÂL1Y1ϋtQf>kb{6n$7^O4eG;pkEVeaSbYF5 ke ^q^ZyEΨ'6=_LTG7EMzc:H ߔƛ퇄J;k %>9 GPx/JW3P<J 97i5;wEӀUuς nF/G0zY'5/c)i<JYj@`V#@n/Ѡ/:Ao5!E> ~Ibe#B \9ssHU;zR6 JԎtK+K2"RYM@ypDΥ7\u<٥ ܋eu0j-S$C8~b3{5ӷٝg#\2P/4POʆKL]5y)y z!W`#J}9Ek]_L徜 =GF P>I-2oYFy[PS:[/&a? ưչWkFG#7{krxpF IN>,P3l(2Va>SjӸsKE$x?(d]SS,GOU2$M`_-(歆|ɿ_#f~Dkyl.yLrs kP@Wc m]0z1.Xiz);n4?!5w5kǦo馍ز Xe x:rڒTWSwypͨ "Fec+Pd"%X&&+:`4lk@, -2^TN_Xcj,K `|-15Yx gE8qe7`_e.gleoKQ$O FX`l#UWWK `.)~ÑEfQ9*:} d%+_C\L& y:u/o h.KR,l ^f{ȗܪr8Su%J-%ZV+x3(߄9wBu5dԈ[%$p1d N*K#Zkhp)gZh1gnI)wO)[æ)AB}_ s3:jmOVa4yXp6Y7bDY1xJ|/@o*/`NCj (=ӧxI9]}{g h UK1 R{8"J vdRHܑ>: ~0p=L8>N&-GG0a*;"`VCNğ:4|jnOb_­QlT@iu`(сXN(_4 HDAt5quYǨɡG~S֤h+ fB +6a Ц}!VUF73bŸfןͶBv" {AGB2Nt[{D$c v1&7i1U.9~>x1Ba.y =!eyD##vB)"NdPw,1Ц7s#6g_ɲز`UNht,Yp|2oȻ?2s~ddd9<:,xb G6S}C[r5 ;$⭓=p-_^к"-ﰁĈw~S^f_0nV\I|z}-8 l=H#=+enB[낉Dދsak R֕y T2joF]xip M[#lɸ =&6+.W^މOjU IurtgQ2 L_2WMφqzKv`4l{!g!˔uX#l?i{WAJRE-@:5KbA DG ;Ke/'pgL1][qy23TVk/CJ+i/ W14IJ^k$b-~f3ClLmh *J?-biO i _e8w ziC  1x\GE,L)?4]4T2dp cA'bX7\LRl OF:Alk:$yUH (e;(Lv%:0ё6X87ZE L<y=:["n^Yq(gǴL@).]gW&–Q,+6w)j|s-5>ҔG-^-*Jdh"&=/|u $r--g8٨"uf<;cQN]'t:hlr ^ <(m[ֱqF9e;1;u@oӔހJRUl1Y}>9" e.~L+ SGC0!=X%b(\㍐Pp}۷htƔ rNUc0Zb#)רE`Y q:E߆w!Y I,d_,B F'bFXt}cbWarw"X6r(AšAz#w?(]/^ 5:84Ey@b/ "'\w<5Z'2Pg J~a?³y8ޔ۫\Ԟ@?1.rh׸)vA0P>x, CۆtpSg IqCWR~u4= Xi->$ |M9iŎ ]܀@Y6Ϣ ޔk5Ggl?"Z?#[:Jp9vXV%As?K;Gs1B9}x$̲U`t gjwi@3>J>+strQ}E2}A&)ªtHe9kQtFb尵aeQ'%x&̮џ3QV6< qN̤) BXwفaaw`IO2՛?dys-# Gp;H%tk#]RT9ǮOߐGK}ɕL{e`ϝpᢇUߖm7Fؼ9b&qz231E颗Nlgb u=x6 j|éB€+gy2 /'=d+a7E`2"7"f{^2ȝd@]e7Abg&KW@!OK|>4V}י {p4u6n1nv?o[2@y%>#K a]yj+}3,ddnɘ~26K )sR|z@)LaX%p*}Aofw(,C^9 f&yNQ]%;.8OCWfyӡjrvg K$@N+R OR\`ڱk "Mvh9X@) ]u+Zz-,m @*ag)"4|nx'wlUK81H4bϠMȆ=<SPIT#Eb 4DOTV^rG_`؎p󔿌~k=vԒpxKel$}GҐg:N!Ƣ gvBjںNųv5;;z[@D\4mqWEg.MI][p5<},3blv3?\ 9{`=!=b~Ag*uZ2 <,w,#c??v/+:qp幬#o!(7<ձaL3i*>j4~pti"<,dq砫#gZyNqg)Iz0Ma,~@N+ZLbkF,c$EGQ? L%"Dw'f 1ȲcB <ֿa[b`MB@@.ɠR~leN kލzd_DD#vFb&I: L|8}љd; Y^'cY%iSgz?"n薁i6Yz&Wy^I>v{G-f9 ++֕.:n8-2e#8#u>0G8=ÂĶ`4Zʮ b3xO\NϞkx‚bf'p 7'HpZ@:FJO][ghce;W  =ZЊP$ȚYUKWO 9# T H\`^IE0-v7_Dh%Zn~?G͆O `gA" .g 'u/6i+vxvJ2="OԺ.{)yCt  2nړu@)5WFWyD=F2s˺!NV1#5Ob(S])^vxAl*ɡje =d=6pM]ُsCӧ7mZK3|ƚ&+ Vuɚpd\l8*yg!9LO y`arWL]n!\`?gG7}zۅwޕU^nZEogjݬ}EmK:Z2 yc/e9~v 5ɺjߞ6ZMVXp='"p%~fJA%é[Q8(7Ǩ1;aNH̝ՊͩYumaDDk%F aZXO'~E(я0e :-" ~E 랓 WĢ_U!ZT*'+) &K6hn /]3c &4ެK0oac?,1ZOL[y3Y->FvܶvP8,# H8Ck%h:vu_ZkQ(ZpZo5^/O =dNBv A>a 9JSܲұ9_ AQIK9ȿߕw|ojfAY>!$q #m:2>~=Y:f҆ D6/s?AE]-W9P>1j/w=9_`UY /P*sR^g5*['ffJIWk|z٨Lyoh1]6=I//kXBaҔ$JCDp |{gg@xhclVapCYM !bעD%̈ߓ%LXɘdў/ urc~,Ŏ7v"piT5%=a]+F1OdVUʹm 7Hk)Ljw5Lj|N=Sb*^@Negw߉PH4T_k6uzdP.Mm߲y.;seb{4r⊤ctHlt?%_в2.>qnty?ipjPX[kFRp<؛LXyvv:%omOB7XfFADpC@&ʼn /zRwJjKm'Ȑ~!?Lt_lmi`e"h4쑄L-]%1 ~oxnpM*2c Atv([(#_M ]4FGM Ɉc 4J Q^bol;'lj,ķh( \bטBcW~3Ǜ ^EAIHo\KWU ڛl-V0iDq.*rUz{ˡ_r%wIvp+ ʤ4:1Z~qN sPVMN_ lEJAEbwn WD3Ka㢗E=q2>Y#\ᯩ W?;cÖ-~Gպe4D p_8\#-dkzZ&cjWnN5uPZi&j.g^_Rk.9rAkf_+/[Bw[jmzxV/:tKrXfyi6 9$6lUxO+# r Q_vm:08Rc$M6k]]9͝IDd Fd wvg7.౩J`:g4p4g SCmNڡ 7pZޏ~x5?jԐ#wKz*`k4p$<<=@7f] %\iE920źu3*[Kλ>rx2.*u>3p^ύVּ 쮅vbM>`xD"aJOڦiS~IU[ =./ModO!OxvWl+AAڦ5ԍ=g+7 $mYpD^zeQE[[:`ĭ;~

n(!a8kdΚ%0.JmDUJO%~lhPkm'[v _Vbn* Cͥ.)w?_{ `4 J hHNӟ![$fUv{nfkް]Q?dʠWKn $lh-kNy63@kO@#L>Vl$/[L Md|M%۬\+~WO|peDdS&J-UDĭeK$MR#803U\*ff٠3f5[7 Ɠ){[jRbp9P֓Qfj5\J}]@8ʲ f'dOf\VK!WyW2:o3vD*GF/S USw\uFmq'?9A{Y!>@EfKmS!.H+B4/U*<*FVRBWiX3(j2w*_t梲@mEKE3kً^դ쯆H,pHX4`"K~T([8AU7ZC5k/$-t`2mv0m6u6~_ jIüu~>:kj:t<Vlןy!$1^H,s9KsML+HrwЁӑ>VI-!m@CnLk~t[҄ٽ}T[U~֎VdX̙bίt}l|< >}OsR[䴳{=7w4c1E!ωoQ A`M]Bp[Eko-zpEg*j!1д58ALzݱmmhq >ģF@KZLK&g#sbF 0ɠ0 t/Q5+׉,v9CQmeS`R#-`駾GiYS ;; ,:="\Y&mV}% B2,/XavFMWwXk5l 85C܃|SnV%H@}31ob}ߦ ;{ 3ސ+GSǼ)ŨTU]:IKr裂x}UUS~. .OIxЛmF/i&'5.u6QYLߏu&WJ.k$)%F?x{Ps~0D6ᓔdroKt(\Oe*j=U\HOHWtliLX|#A,%̐ǷN? 4UBd{*d<\V9[ɯ(/e У[v^mcjLpD$bTbl݉˼fDR(eSHaAX4ɖ}?h6FD Q$,ĬB&dʍ)Q {8/JLO+À1!)2wؒҍySi#ߑ.3(UwjgxEeUy C"q?f.5N?8}9tElD|c⍞kUš`蠧ӐӀf7#W0cɉ%R~Mv^>rjK&-|Q 7"hx<{L!5Kn'=49{ʌLM'rSOx9r&l\fSq?}pse,-0h:t"!ъq&Bz/ gUuVBbՉV(x#07-\ zАR-_;(utG|UOC4V!/8,Y49:9|% ݅&Mⴍf1\gm3LxM_A뀖RYa=vPW_>S>↼%5Wj5lmZ'! 8&0?(?*GhuF&=3S<3`i^蹖|$1;/n qvˆ(A@+sD]Tg|Dr%m}۝=Ysf Ҥ'*m>1< LtwҾXM0MTğOr/AzJM1l՟Mõku@@T*,aT"?[Ƃ-[d^^̒s?4I w$Y޳aF۾Ҽ)"㻼ݕ) #U&m RL}'od,<\G~ᵳoj7/|S:2V|?B&c5=c𹽆1ݳ[NS3]P*\M^q>xYѥ;ybʨm0˓8Cvg툮p-.uCSڧK{WhT@0pl#UKߊ2K&ʂTRy%?_z1DLr|ӎ6wv>.53ܑZoq/r;`a{V"zd؈N(wde;ο0oIypeu^, \!6??Jp&eVCF|gx+ZH֎h) ęyTV8DV;Bڡ&U=ioy*^sr0ke?!]c& B8ǨcqVSԌ>WݡR)1h9P\1Zw6, 80ߍ q?&fKM5x"pxM|)LAwHJ#iӠ)f1O $B 8[IH[% + sw4p_CQc)cZ}uIّ[_\Z# 1EQ ;#7)ȑt#4H}WYhORS9o&/;&]6n)$E2뱑kM~4QNNJ5sWK/9jqM$W^c+]96,ѭ5$/Y0xҥN &С24PT+hWu 6 X4ux$МlbxfC!Z-"f߇h:p<=g5>H@ oicSj rz4h #tw\ez Nmʴ w:^J JMkkFI%_ nzgM{Eq#^K ֏I*]\ٱEU9N lh(|yyJa>W_1rŋ 0=҈wG~jZpsנyN!ycW<2wRKq$<~WCU]t>?+=~ic /aZ;Ӫ{ yyfe-yzC~ꅠ;J0H1XHZ,CH%hB>P9dgP`f !-1.o0ח**薇ֲ(nfA *!z}l iM)J1a\ ]YNe9 ~0<Ƨx PF45c- 2VϑPF':{؎;sd Tm o@*[l,Z %ܐPä?\~MEZ;"cM`Du-!l LܜȮ!J㫻9sp,8^^t[L8ks/A# Qm6KUábfoog&}:/ 2)ecL qH9LZC(iqA,01bYN&]XР dԹT!d#A.},@gTd0.=/^H_IU4Bt.}#itdNj@ c} O (ڹ1Pk K|ћU/•<'cCrRϋc{~'KH^Q#um WmW\Mߑ?P\ZJTBU], w< QmSsDKiJ{.SS cʀa4qgf|!m*3Ul@.}|$sY}s}NJq"dA6?hK* h_q]U(t&eAdxuOȈj*\cW(!s)EEynrC@@I B>^v#Sk"hai^sݰM+5N0lhe+:q*f%ϳgHݰN_\3S#~Hlٞ917?fXʨKsI$ɷ{ ERfO{riMϸ<\ CG¢`XDCl EKf u}.0*|oNYH+YJh zMDݼh\e/bʎ"`%wZ& HEpg>͗}R_ҹfĹi1NZ9lVT|R},׆gw:܊% @e[,*#vsp 1ř|hȢ*RIEvd&4qE lr{Bczw7j4wT/<)s묹&6IPbۥ|K_($P΃>%X e(JX{XG̭#gb I<0AZv/82`%[6W' ҆d< (眸E%&7L#yzY!V} B**ѮP[V}=*5lG6'7} j*2V4.43e@.͌uSuh%IP2) .vmN_[hRᒃ@ )w!>.0 -2y:g xs?l*9g7`h~z2(ofՈ>"Y"aP05&+ 90RMaBFl@$VwpWټ#ͅSvs7HZkee>>qfOf j=ee7 >x͈0~(iee~?o@>Ap#8rlc,t%{D9.:*`.+V+ GuIFG0\z<:H_Ls@zJw=rl8Oh#O /soj28W=_ǚw0:[E1K]Ln5[ʹw7ÀUĭjd[w5s){^z)b@Fɖ=[Ťڟ'7\2Ǧ'U-xzɏ'g9™s626bI)QoM:!`&_uǀv;[B7+pb.^zxL:խSN(vmJpaSNâjOVRj #Uo& _j_"' J^QNe\-$SsL*S!w'7ȧl $G Zr5[]v^ lL:Zۖ)Hˮ,˰8b0E0Krڼ9(XM^y9<b9 8=Vq̟%!$+ES) e#1 U(l+wA&Iye/آ1;V.p⚕s 2~6\59$#vAE $<4Co*%WW#fqLExzfЖMHq(cTS.j%=k IK$Le2B_GViꐘ E#|rL)QF9y&- ) _j壆zho ~^|⽛AYAc# ,,UҏXkM9Q6w\WW%ʳf*hpIa[.IX4kh!W\aѯ0fwN @S.و+0ʛS|ո_H+eg6`7G%)6C!ۭpTk5v,Ct?vd_Y|0|ch-KDP Ae౺&#b{;ݰx^ o m$[zgOWEfT܀2 l:I.RP%\ -j p" @rL5{n] c [OSdU) Jiê?.h|d[y frDm`7ja}bZ| ?K>I%|Y>g~yk#RH Q||r՜{)Jd ^`qbqX@ @o:q{Uk]AE>eY΍;F}G8]Ifdb`'0(#5YVhj!Y21ihю^" 3/[ߺts@RjU݂$'U5>!󄶆Xr-IS~Cbh[TNнp7aENa8->zG;V{FjnH]0÷a{r48(#qg1Um~n߭9gÐ/Ӫ ǩYXRlWkqm&%?2y{ H +niu(| /pdَcfb>Z\:f))MVR~tڏDt"E]_>E1/&kP[(E{ʚQDs{̶7k7˴yB9$ɧ2j twfe#d HgQ޹<<#`ZՎa=*ْ\\|Ui<~wAOeU؎[?A7w"vޜoq {*SH($2,28o]sS~[eeL񟴽EvƗv emo&`Rס% ;WZڍ\1̃rS, |Z,߲|k3m z5G#H8Ks<fCpfDiG=84Zl~qxu4MݨTppRAp>2N >xFGBTodnOb;qfni7RuגSW Rna ;kHxsö.9ga J5p0lw-zoVju$qFttާ>@ 4UYnY b]>_,ǐLRs\'VRSO  'o77lJrA@be noYͺ^BBKK2~hic @C²̎tHsϺ/ riO,z,]j v$B%1n@QE3>&waߒȊ6]n]tk 2zX(BnhP&᳇(&9eN C9a 2Ă0,wU`''-S}s(to4 EKT@B)D%FAΔ-;rrhJꐩGcD^c Ԩ|5@K\z ⷤy%0Gd0)t'}6Qb>kj3W! Ax{yMBFދ t=[LvQИzkNmѿ. s5-(A'clŎ;4:s"eB>$; V)5^%BdäB/L^Gw/n {MqJĦ~:AiJ}|/jL0SE;y2 %Bx$QZ*K#k< X:~|K瀞CXgSaJdZ: l4*m$YļxIELYIP!G;ZQ̷yhł11a֛2`yE$⋰cG"cwgXPP-ZPAp`q;A,> RNԖǰ>#ӝ~KF!a|"M!xoԖd; oT+W-'ƍiw@rQtފƥ4#F^X ̩\*^v+B}iSm'$ԕdI|w[/<0r;P]CfN?W$Ԓ2a9̈́=nD!_ yoT\lQ Gv;a]71n yoGB wnL4>SХJ;0L-pt20Cŭgеrzk\s IT֍GM+ 8Qm.` JZ)%nO֩)>]ؓ@XoJ=ajMf- W/v*"Vq3OsU3\uL~JA5I@F.*<& Ģ4Fc7(̱zVj*sD\MP<>C@\*9F*mPlxcPAgCW"oÑɽQ ǬϬiY`=gBmeǢ|#q:|]=#ӵUviP%)`<PyeOb_mEKMښ%A hce&Tf ?Q5s0F=2z/c U7('|ş)y`'K,,$\` t ''┐ EX|q0ϗ!a-LNp;,w6&0 |M eO%6B,5MH1kִ٠N?, գL ) Ӗ\ekߐUss W4O/;;$}³'[H υQ,Ʈ2 EZ*-9Rt=t KG|ؕ1ya͏Q0u~Ok<̪K(GreFsbfmӯ$h^N_7RW:S\w`LrQ#oi vKpdEcw!wI7Lq9z6葏9 Rc0&*H$,Kmv#K:+wDKSw ~B^{td-)]dqfMh3,1%˷% ߰du8lk#rٟ9|Vƨ4/*+OuDZ_tz(#);lU(;7;& W59 KT}x3SW7>lnq, 59`+fXxEpbo4S/ 7CX̢́L)԰^v{ppgm1ZkNĖ>b4m3n/@eZ;'?3-!fd]Vצڈ m>}kE],A_ҋ~ E: TL;NW|yJt!aR8 M ?B&iO LV0p ؎7W>?ofn5*15d!^M%yea*Wkps6}R5t vn劅 O>մ^M(e6aRSz3# )>\zWBST0 1a$n(HMQxv QJ萍0@OM)+Vd@>XR>+v0CcQ|A@YqSf`QF@F=!|ѳ,|9Rx=UX֜l S/LJ]"VsA6+%RQ`CzJA H"3G>myDdn6Ah Uv6sC'z6,0Nqplk<|yDTڕG7=QE5wN@M?HD[sxr}Ga}oOJ(37bq"Q>'t+xE) )TaMT*_N+3^/1>:7owӅۓ6IS1<0nb@T:a*ei lW'5+-I+<|)7!5;n]1\OL~*.)H<Ԛ釗,ˎg2)okAGGI_!~i)ݭfjL|%ȌDB c6 Ս-iB7WŗU2ߖ1RU2őQYvT0F=fVF]*lNO.wY$~W/A\xDZڎx'm؁ED,{/1shyo&`6els)跤. 6,*o&kj}^Z_rي=R7KA)ia /_d89PT@vRCk9\<=Hݘ X3%?ˠ;F*!^eo2i$hO\obwhrDI[WM9EHdђmPݻ-%Vo ӯ-i.[_zۊԒ?#S.C{W7Ln5z0j&, #W0@wDrGxN84FBWjE(F`ѣ."Aؙg#W& Yž8 hG3#c-  pJb-h5+S!+I{%S8=ԻmE\~HLkT;fkּJAa.A;cyvsj>ݚ"eh )nзJvNN֍u/ȱKWe4\WS˄㿤;/ʨD߫~D`7:$/Hd #k"~~C詜md^@gv2@Yb~ePP׾MZjZ&x[n |ZFG6.ސx}wK=&b}r]6,xkrx-OH묑tHlT/Ij[f ӖC[NS޼βH7R'o/+L.^$vD/X8A:L:ӍO"T* xbeًO_9N#Y@tM[2q0_UQˉ$P1Ÿ>rHѥ1śF_wa$y))f*|;dt֑Vh듏=*T.Ue~CĴ"GZI@im6OP6*:l]A qYd BJQw띬d+ ar]dnA i(Ÿ8V:춌?H3 /A Gkр'cd3$ BU8.7_L 4u8hgf%y&wTDVKm-7òL{_ż)baR ?!>i1;-\#BVh^,8+T6[ zr u'1M8UV0Ae߱Z @EC/O %*dA{(ܣ#> !PLj ӉG: '"355-zFDcl~ƒ#r h9bBr zcӨ}jsә4ZU,f_&9ut/ . b!s+YIoC>Yt+>[8pR #Э@S3i sz\'ln!?~W.7uW4؁xmI\Td~p/ɡcI}6d*TJHɕ~OiUSdPV"OSDWXFu:|[7rc\#eT¹#5<4/ D0O 4E"Vm>̌fAD˛pNh17FǓON"@ȭS6(! v Yܴh NY@=AŚJZ̒5z|DHm淔9D dsZL &!Y/d) Jcѵbu[Y W)˞T{FzPJ^B'0[m:E,!Ȱc)oH z!ƹD1-!ge+R/U)(>t<qh.ƠJ6G\~)yPn@sȬ5f f͸86 5g*uɤX[à ߄ $U\1@`ւlj2FocQPn]N*ɢh7#͎ uDX| l M"Sވ x ߬K3%ÁӹKc 142geRSx'3Ɏ:g.tI3oACK^"(PUG3f a*C闄]6=1ܣ65ɜI11W{Jl_@Pމr]s}ͱS!pVl ̙yڢ,?y=UeM:DvN_ *ÁG3rR[]zinmVқ.q0,,qcF}:R3YYeð){UtljJy{Xʀd,&ib~3c;}h`C Q!'ŧ펈]F]1`mUu&'K#bg ҜDk4?gv% +a ]ͼg67fud,u㞸 \HM"e}1j؋(xi疃E׎Ð~\>t^fJ3,%]R9ELvE;wn^]|,(J@g>lP j0R@-~$]E@@XF:>:0(v+ēT sj{cP K-ym6YWxXb ~mΈC%Jխo+> bkϊ(NE.tM<~ڊZ" Wқ.wgטaȊf 6Ap5rglhԟ e`/{ 2*8a+?P:08%bz(&iRTÃc =csƑubT2YhpxϳKn=یz{ra$[Q:Tѫ`%:@EN[̎Ndt~m$9S4vƨpEh6OamZ!]SC tsJ~ 0ǐ)L":t{L97tMC݆``TYdx],w䤩[kzpb&,ePrE%)l=ਕ@ Lφkhz:Lj֢QvLͲ0šYآL8e8̻0*3G2e6pAPMfuG" spսml? ۱Vkv Td^HMFIsZFbI"UXwjς2N܌?Aу{.`h9oAc(aָ@xdfc;/:΂~ Ɩ GL IX{|DK[#&2zĊ,涣XBF`ycw_=>]mot -o x}*lmd.@8h]utU`ݬeᡇ@E t~} k֬BREuGhT'$*D6(E8xƢzms*L kWePZ{J1Pמ^̢tL1r?:V/'ƕZ&H+ HKri Xpo4 `X:i[?}ϘeK; #aX)w\ػ~qV촿J4`iIƣoBW PJ8LY•.Lώ *)~/X;ـ~D)7X N+byA.y8[Z=hF^ 7*/>_*cuf1&H$H!|yq\BsjFxj=E݄uKrX|g) 5zr(0wHgu_ݮ* =s ? ˓2]\KHtRpEu2Woq鵒'P_8V(|8YXG7a&m JfeK!emm:Ls[ͦD_a F4USuiCIWw졌-[DO"Z2I$՚Qae6CA/3<<] 洂D(:݁3>ZN^n-*c ,߮ 1 V")HqZu*j:uջD=r^6>̈́_EER-(Q .רY<%<{C3,/#IH 1Dl3,sOBg5Xdpff|m!TRB p2~lm=ȷ9rS#9&yyA.E~< vN2yjxjMN^\ X}"йӭi0v H; "r#@h$B2ۉxǘ[+aݻY+,ѐ'ڞ4dN#ײʓ0. ,$5B )[)cPyA٬Q1>~ghσiu`s—}A3%;!vf[$i][W=.I΄Wd!33]a) V߬ &Wn d02vzaCL5 Ý(|O!*].;P7Zn%a&.< `QcUK՚uG YHm93ȅ1hHc\ql_|?_z)2_㒶L{AYܥDw7Nt8|W3A.&Шc`xu&?}`5=~3Օ42O tĸ?z)E̔lն\x0 ,"܁571]ZeZ,WӖ= 7{Ln 3WDh+^[>atSIBFFz\Q\@ V^l~&aǰßC GctFP(=2N&wfQÈ\(qq{okN>'-b1bqݫj8陸~}i9[uxٸԽZeJfJTv!VKcBsAq3nl0^v>:>l\&u#-5?ǿd#lwyvadvC|JC6‚?fNe#wf˼@fx/Mfsvd2nDE$cR's~8ɚsȹrm;fVX }KK{S`%J^5k_aVt68>m'q;q, -+um!@M&VOI#Mf#WWzo7Z,`0:P%cH=rҐYUI(CB/r1vܦ !$Adbpm6%7UON*̚e['zOPa.%/ڗ`$ًyw6UIg<55uCJg+;?-G^ҥcZ/ar1tx jnۄszC.]ӓ.E%EM潄B}zc唟 L3 >|BO[WzvJN51.Zl3"mY="Svi)tT֬>=|S Aj1ЍRj(!sK>G,ӆdRZ{RG*A𹶵^hK"GqIJy aHAwb'/w"?a2ɇUhO'.~zmLAĠAo=\:N--E3UC 7kұbit HFuzn'Y,ЌkU  {`  bFQ-?\EP~Թ2!bi 쐝8א6qZv[&mz[gώ E!8&-'e#@SqE쑣L vCϵZѯpF;P U Xz80jnv":@ R:LQ_b̲`Rg tgiҝv6 }8`s Uu,"CWBQ9#Wɔ z .'hœɏ ӔuC *QGS@1iG'D!hDAjR/_eTP8 1[T%5rW,V N+bk"e%*B=]n8_Qc0b2&˅($2IB.UR u=fJ, lR b>U"HI |Ʋ/$6>>(;6/.X%^.![b]獧Dvo0\h竾D#6( JkiR! 䞵JY!8Q&,9‡gaZjxmi%[\nwLMleRPTHą4jAiCt(8`"O=o*1Ǵ?Γ`ߺY FG;$= nlpR0ҍ׍eiN.=,21nPӀ8Cv<"cb^$5&8 g4Ow'g< _×>Ymtΐ7GZ!ߴrm3 HnFlQWHں#(IyKeJ D ҵY>s#"Xe•&nxLk&4|xDTԒNVL3BRg : .;ax.G(949N]p!~?o51X( 4Q*]c!gO~Uv@^ޕ$P~d?)FW1+)|JR!"6݇0 bޚy?JeY%ՂV{ Y]mJƽ9spP9)HZvL븿qNNyo)ˀЩĀ0&^W9 S1_+#f_+1+w&sOG&mv.B,ڭ{YAT+x6 D ~Cm)έ74{leq=>urH*5)¡XNUi"(C"3Lsi ߔp$ ,npjT__kӦ.|I˩ wc} INCsylك?qw#%]}9OJB/# f\Kn"R+bI8rG*4+wHAf{EK%j(>OHw\ HA09"bWDzK-\YIGe?nL$+Mݸ1^Sߺq\2~bwrƽ=\dEL-Ev֒7j/G1c+lW5&wnjj~UF{ >6Ts\4 ٽ(ZAp.rK˥ݪ/dRV2Ѽ)sנs=WdW0kUFI,\]:@m}9'Exi5#.&.فZXh4X9iu2BqvJ/&~viı~.AQ6\RGe\tgT9ub`f8鿚+[o^q CB% /#}T:Uo `;sTbOri-M21 9D39$BƟORX7eL`ΏET1-t:Jhk'u3iRzX,{T(v7H}T旸Hu;YY2,*XP ̙aѪsE9.;hXN`8Lq͇A$gc֯Ea472nSɧ`9*#jzW}rۗQ; QΐEmF^CcD2JŭR.Ɇ#S Y4L Y?ߠQL~y?sod/<`_@C&y3FJҫAϘ#[8~mKZޒh뮬.hyo`UYvU|6d!y!2…gMD=VQ0[(g h (a*}=u7_i\nY :Vk(?%l#5^v<83t }`Nj9{.j*(r_ a~m0P03`M8Xz'FMr;q}\VTIp,Ջ|0V)viPMǁIdbLߦ&-3]NNJ9d^i8bnF.bm6~\LVˁ+>#k(ߔN[-[aP# 2yꪙ|_]">Q0EoPa'D3GW Ѭ2Uu'P@s~]J*ifYrQpDLS.a p`ɡE RH'_(VƵDZIXa8;iBʉ%; m_FaU7=PPOr](MnRg.& *j'|lMܪ'^:ޙ a>.%cwEveck9;oB4‰Ifz k)uq}zh uJDKʰ̃}PDClrJX$e61 l+%/% &fɀ׎O9}@6p). |W%%o#I~zu6 fW(hƒ}6 :,]#ՂkH'KAQʫ {wb ~;ɷWJw BГHhi@N^љ$HY\?׽8=*fC2pzo3 z7~ ȸD',@;h,XZTNuAes2J+n޲ϻnyoa#I}`Rq?אA`mhAZ>'.5ci)Del'脺ҔnY\tyò4OZndTr#8Kc1%}I؏PQD06zw uVh6i$:Ef1v:jx[1tbzwsH(ya]ZSi O6Ǜa E캟/lЗv4F(b"I V^.8C)4Ek 6:[|<%k0gom^Yۆ̅`F%h ?zy'WOոm*s?r/%E 51!It\֘vjaSt0I}R=-G. uVL^߆0szЉZD@l᛭0P==;_*/J#72pQU(al$ty6-2=փI`KdW¦1cYɺŃqc@-bڈ:<*XdF`߉/.`2|Q% TV.l4n(g!kv;iԛ/VV 7cFN*P08I6 {VYr&{UȒR  z QKøG1@tLX(]`Ӂ]Zpb,j?C64XV vLN߻-2n6yq[YXJ/+X`-Y. gvD"7JrʆT^Q8U 3zZB0vGA*X@w b_[R;gp;Li J$GυB}fZla"TWYo-xdNfjEorK1mOTmn*rSâDw(P0]lTZ@ʧ'+騳w^޽b,\E6͞icIbYmGȼe%">$BĢ1!UW =\/iAsPG)d"]I]-PD-_.'+g}rlR<441k%)\OQ|+c%Gib{3vO |i+U-{JEOKe%&n@} *ZIp"ܕS&4[^7 YNߩǭ"%c[p7kad4Hzǔv/+?އhjj1[mӃOZ,R kK$s.!N"elܸ873\*SFpڛRsg+E*Wdȃ -kBV fߌS*2]`~}}!}/`|$ts nxwMP/ѫKSL"-C裦ˡ\J>jSw8ąot^z ^y[=lujA!:Nl˃H_Z+ބDك >ޘeĖ4W#I>DջWS"A 4* $XUi6ʥU/{ 2kUc~EQ)&]&G HgKCss #ې+8Ӱ}:.qdĥph:0 [%ҔL7(zߵh+z(6XF/vtq 9vrRNLٔ{B9>f"q[yl:j8EhsEnJlC)69߆>re xh@)'G:8 EiD }*&4= !s7E.W!TXM00H Nrk넱N)SYו0SP4,!DY UΊOd.+򲴘^Dط<,x6N_J̽>Sa ^Pg&ViMWӷ|AL4 4` (\]` (Pc RYo hH<Ρ{BYa6B '[-Fϟ&i*>=iz[!Ċl0=N6!6Ljde&ʆ5&g+;U* Kbah]KRúa:y#8\o;6;?Lz ̋|;Tw&P,0CjS~iS9ب  Ztn=$d; pAk^|GJᲖD-=۬p98оd.7:7}*5zv)܈)t,'1#) f-n=cDƅF+ǽQNwԸ&\` 3fB[Rc@[!F=[51LwFQ9*k@e9BBhSwNqP8/kE+Zrpֻ}"ʢ0} Fht"4~ 忰Tcw-`uLQ.V0U!Wɗ9f=T {!*3Y~o|"yŏ )ΜOD({+ra{5*7a;_ :/-X ?bds3PJ AAEb#HX$ `_i®Ld=ѥWJγUjX_- 2jlŜ2seJ[e.Y <o8liD6& /gS+H9}Y_`[@C`"H$qk'K(%ܳ>tV&dۋ(lQ)`{FtR:aJ)ܧ4i>='RIiԏAZƁIcxyvͩb.( =IИ߮"\"<\;qrQcyN^'D}|Qy V%uFㇰN4 ݭXw7 gV\P7hۀ91%-|PwV_kOA{!+&u"3Bks/9Î ,Ɩsq$%+^];Ikrdo':aTTfuR{*Y#=M5co:JqWh =$'FT+ ȗ\ a-٤&wT$ ԌͅX"í ^TIdgъa|tbSӤU&Wq aARXE \pAt?M_:yc&S&e*xY2[|ߣ-w= MbΫT e>&? x۪m<-U"᧫_Gs[ߛ,l)Q{p! & V P`㭍wS0ƽ &kӬB>LO8"rqH-'+!+&>N6Qީgd1 rWux~o_dB4YҲzX!"}6޻:Be С;ZC9S-o? FxʍwzB4pT&Z wR:nF[!,UųT|QvCLfVv[Úvi6JCM7кKޙf"z7v!K07rg*кߓ: mUGj~8bZ~aw+4Owmǒׁ,34 ]rn惨S%b]bn9iij|^ !0\?Aڱ:@T,faϤks?IXrѸ]sKvޯ)} >)Oc8Vu\*@N= @@w%+uRL_Uu&ӡjkAJFTox÷:Po^] tṔL!wăx9>wj/K̩`bZQjcv;<%*eInw'֝ԭGWe5|$LK4>~V{ˏ6awkf9R@`$PU*S{*սt-0#W7wtooaY(l\lMu㒠Q R؛xit ')dvMR -@#oGA^X B'u+k<yGD=-I7RuЏ%mZ&L_wXmoCj{T_'=6?[&Iё?7|Po 0.4lvMW,L721l mF-#{3l+8;\sD#^kJ)c]Z$W8h#59%[se rО^qOe?q FqLoW^=h֬B RU9kS;`Q x&ϏO{byx K@ZOHrdpH#[xEaaSMl/Z79>e^ %&{zEsI%tl̗r?kXg<4|Cr$I;MW!=Pߋnb3FS2 1`$ R֍@ R6wC^003x=|* 1}JI X]Ư41sV8(n,H bc3LdKehR&R'">ܓχ,.?pA0cIWr=hhhD<<Rv#v,z4ƕ"DҪ?¬}ߺgKy?.uŊ:5xo|i׀Mlg^_Tz(K.F>KmuS2_H qYs+JRe5J9Hl@4DXHCB"MU^ AF|͒Yh=y1_n?~y,q'Z1'=,Po&>^qͯ2$ }bj8V(.U0]Z "~EFfdhy|Գ #ako.HwL]}C<[>v8N3 PlZwMp8[;JAFwv *HloS50ܖHF]fLr`4?^C$Zgfœ7;7bAxVoDPՔR8`y?/(=^%Ȥu)9mɛqx ycbP?rWޞpTT.[VQMԑ2ב-|7M@lm7RGoW9ae=·٫ibT}?75(.,HXiq$t#bK{f,~۰0^<ލf<zX8ܘR%0Lϱ!=!C2iZ+pz6pN'ʻ>& Y:6m 0REEu31.2^WTH?Z`)yi06K-ӕ/wpQUtC^I*|D Wcq c!]N'_[ÃSg֔ϑjٙ2Hp%gGIvbH葍` :)YN<]Hlޒ pԗ-tҵu\E6Y-xO-B 3B' Oܹ Cņc'f"!:(w&%VT dcD!V+Y-scf#Hs3)d]q:ڔ!$\ܖDC1&A\;4j d9Z3w.O̭vd&~O ]ҏwD"?#b7`hWPPzÉNwT"6ċ 3=y7w9F%^ ?quIGk~b[Y´fY-6R.bTVL Zb3˻3 Ma\֡h!G?!"Ŋ?Il+7*^ߑ~e#`h2&:} ;j0Mi(EI tDۏc(Lۍ"?v o4)D hoА7w,w<,LfֵՂ)Gf(Y!BJ! lZ^AxzTj̷Ͳ޳4a󆨓#C؈`?Q5Xnٯ#`p)<$'MhQ E~-?:1ppV֑Ύ@DxNXFAϏ\Q1\w-?ʑ@ρWʹV Z)'{Hj`Ty7v3.t>!ʏ"N$bˆ0h9'` JFnhxyvC#'.7OmX,j 7? v\ yY7sJcnŮYDKq炪N6cߩ =O=f:9Cd%ruLN #ʞx,"13:mVږF{Qj*c{/!v2&{;>>ǠA`6PS%<P(gk^jo@i4*غIXp ̷>+fU/N $%A>H3|a)ҙS-6UHw@UK.{[&&lթ{K T3x pE1+="6\Ibcвo4;#-A'cc*XK*A~so0 U9A?ky->6|9=Yrx,y럎O}z1 ^9 )w͒vŪ:{FFڙ &@r>fᆐ4e&gUEu7Ba#35} hi;'@aN0Dk ǒn,h-0~W{j)gff?/.iw`=(M2wdW ihE`[mAA/En,楗q 1Dk7JT.3Iu5Tܑ&)v76>x^ŗiBB+&gnVja/uS12#XәȫĵxbWnf!G#{YР+4gcbѶ#b\O47Z{,CK5ӠǢf_|m^gY'k w@cWp6]Y*<$ K ,*@-l.J#+mA rDd4Ojlb*\9vk۶NIϞ#|QBvz{oT\GA{q3r 6BRqHLn9,eyB2^%7,9-HAxw\u;˞/GwS*q{J\Ճ/0Ҷ+K S9Ub5MV`yN Ѳo" -b(;@Wpk167ޭ&#{XΜN%X~B%\Zp9ià[N6d*cby~xOA'w: egOV(to핁U ?\p'Hm+7n$bpuZkKQGE<;3'C|M"ݔA vU8*i"'ﺫtc]^QN!0 hL*t`Ss{Ќ+ b(y}.">u? [X\¾u׍m% )F7[B^@Jn1?hlmDz n\Ny&5x4TҢF[9;4O@ )ׄ:ީD}F@UU}1C$ aUDG|U 8z2&sM^~i8hohb6%<хV]v&z6,Ճ m$܌+#ͯ%u%zN8CRT^6ՠߨBbŴ6X6?`s7ά0q0&mA&;uKo3P%uR')m:gBDy%"Iuʷ^g(vdL2LV {H#-:E`Q} dz ĂzVo;po eU FG~H[GܭI9uZpIÝ=V[,D/۪A4| sj(l|84\!cn+;K@`+@uI0d(|%RrR7Tݿ~{@fO_,YY!Y•{u W){%O1٢Lc?/Y7k 53."ir>WV#dSY26HQ# JIO#^v~FH502nSealCJr&};/ZW]E} 2`!cEovdFZ%udYjaD1l9LTDZEC+:%0RC`3~aP.OF+:/lDDDUQ:n+@h*`HW&^ybt~k={_],j3-+1h~9^KCoR9/-(=g9L pc>ggf YagKfvILH%[q>&wdC!՘A~Ωr'L/[}d)ng*fS$^0$B+.M|KIyN޾ҿ.E#FD)X;P0)e_;DAhc?x(!TMԛ=y" e0ʽ?1eS ҍ߱wJill'qx Y!MZDA57!PwM=n?~yK%tig#g^&A4Ҫ?s6 PGVJؑA?KD3-hvJu f|"bNʟ2]BZ03*/&ݟKa*&b4V4R/8R>.=m !;yMWܭ_"FLo΅uv|;~t]Pl| 4R~dT@`z&ꟗma>C&640\ s'ٰk2 ٽByC/!p?WH3f0l eRUUFtw^>SFMD x T_^,%l#F67eb = ;# \[ l.i_TF}"Nų'"jG8 υ8I j6uc%:gԣK['tC[˫C8J.OJՆpj*40pG=sZ\;JDNj7EM]Y+t++ZqOO~>Xt `GELkV~̈ފL=MrrKW_twiqVɝw$m=f?W`-v!g%W$ V`zZ3 L'6g۾}/z豸OvTSYS5gI3KL:KtU-_aBig][xȎO ŋzOZ} 10pmDbrj 4k9h]RAU^[Myz.1^QNԘHl\q̯f~5=ͬ)+SL~'6@62>S,2북wAr[w>Kƒj:{;'@U~sb 41:51du;UMWXZH5 Y9z3 6v]ڸ5X Ǩl+1Q)ICcv"wY-Y]:6hJed)k"^I- 6u0EXE<U /_Εo.2;saŖ%<jSRw`F]yM947+&=͇L:s~r5bKD6Yq {%r `n=1;pn3! e Ô Z'U 2A9c#tP=MK66`- m Ojz]:EkLu(Y(`1 V#iJyig φNмU1"4OFpWG]5TNӠf)7^h u9$Y8^*_k"eTR!D.DYxY@'alZ>1ƽqTՒp;z>].j#]U3N>QDgw~.J^ q!(ADаG~.ws@J<:3xuz~T2$`[FhsvlCse/5{htM=?IP- hi;my[^_ ,!T*6f"P\mκ VYKgw혤?/F):] w:[?8Jl7҇;Qށ/d/qF4归RIȤHC$)R39tBPX+C]9.xPbګen-TrI$[bXÿiq,+Z)vID!4~: E~FT#7bApW^I"(F Uߏ4k)(p$%-ce1SaE.8-'&L _{FK<ȌVSH,D|h?0Chv-x ]L|5*樐+|G3''3 eۮi%괸pgz4$>![6pN;&K8/¼߸U *j/DBN{ϤP{}jd8>&jt6 ~זZ]?Gt#gg ұ |y_*w2('DG1Y)|wlwoP<#מ+g [f ~ J?V_ KAѤ&hOK>ֲ A H@! <*1Z))=js2ZCTxZSg"Ê;{cp,kլ5Ϧø0]?k4T$ĴB'ՊJ7瀸@;6zgqjR\`5FIZ$\0DǮXqUArvI?N &c'j*a=ٺ@LmCok4[ M睛2JDHz, `) @r@ؘl$'IzŇhTi!sQ=k{JfpjzUh#BL7ޣ U6RU۶ifXqݮdK8c1?6h/X['sKJD,7E󯴠^rFְFYnb6<]@tyQSn78'mi(tQ/3DG7UT5N}CA1ECgARey>y55ZW>Da2HE̽8:9纃Ūp"AήOFcw&nL_4tnCqE~uZ7h VO` 2{9g,B0_Wܨ٬ؐvrj)ꊯ0Xމ3p#ϣA~?J}Q Vu32Wmdd Uz88 HkeY-Ce7>3.,}:^I[Mb S:ߎn9it0STQCXIQNyi.|9;. 6P*wbNhl$\K\(޸mx;T]$|mJnnfS ǂKilSP!4,ߐ߈U^)jEr/z6a}*ZI,F|SчjFB> PgTIz)BHy2_#|h5qżkw1oH]T@i8BϥGs.V8V=y4f3=A#)cfԈ,zdIOSћRCw_ZZvtBF)DYP& Q5e2jo\3',.'4Ei8ؔ5y+sh%g2L7qWװN zHi&@Exwe7Fym ^W@ޖL Zœ'{nPao)C61 ՗lz:g+UOR% - ւ+o#6BS<2196& XǷYzI+[~6QOEA)Ы4mO휪rY_ߌ_ =njinLģ"&E'STq=|B<;l V3+m;FYKTg?.@՞?D!zfp|TZ/9iMɤb$9pt8u}C^O{j3oz?N)kl/>$:o_R O$߻0g[w=BKo|ImzHEzݿj8TaL| _}/W_W)VoVEem /0ٕvLs,8vWq[ ۋư|{*yy_`rې>8~4}{C~xO{o Ntn5 `fƲZBtp_fKy \!0"˭zbe=_ANy7@ScRļ+Xh^ _hN`0a+-,[?`$,l4wlw}6[eq^a(-2K6K(eHoDJ!VR1 )b=r|n4*4Spx)p̜7 R׻Vt0=-S͓*"o QȂ GÔWD\o#2'͸~^Wo+M*E+c ҂b/Y+ޓLc6m]?. 4JB5g}wh2Vs%*fx)qy:P|aK2z_K.J`;@\b˯rM4]"_S00# &=?6lXӜYX(3jZu,0dnĆhPShtdԗ!KefFP֮AB_q4 ~ Q^odK|(=68<!s-, :$]R1mPj%I}9 G|e┅ _8ںZ|%[ }TzS5oaS̊d /5t%&JRHX9" ܫ;"g d*FI\&pחP y̧z@':˛-,Uɢ#|+i@շD蓥Θv+_H9kH4zFLdC?Ѕ=KFSEkx(qo=(Ps26)нPY[,]9?A.ʖC39V =dOFM;FtP?'[SjX׆nK|dD"8$fTW~,9Tv.˹o͊xU _,ͰףEfK3L(7oKƓW~:"[,&j,Ĝ,#UN Ӎfp*.pZw/DIߌMfcKF礀2ߛF9՘jϭ4P.ⰴY^Cw)c~}T\?66yJ6a@GĦ)s_:7EJ2X6B l-axMAE[g8<[Yݗ/VvD~';v :~yd)[E`iWk@75qv e'>y`AǍ(aⸯ% z >E~,vJ~-Gn>T'zȔ C윳$7qG.@O 9un@Ҋ" M̿OJM'߄p~r?3~WW +GnN4!Ƣ GQv$=b?lԥ7;$U=PU/rC9ZUZ.^㕞\W"*yGHE s8o?F hT\[9* )[]X"cN(PVZĔfVP̩Rwa`[G>)'HW.@wRQk%&3.h]RFvbHvbW) 'zu&sf>b&n;;nK*zlKK{•büg}:tg7](Smq>u^Mvqpի|jpr$g>*,HZ7"5Oc\'0p6d1?')}O3#CʝNMx!,8`R񸍀ŧk=IIZc] Dx@& `\i9Լ|xWlC>Q:7WCuCXR'>3gBihyqA۸<r}dlĮJ$/Lr,9z ss?zP/voZ9>\, IcZ64nb's-Cdr0™V,ďaH9DQ;G(Su>h1J|عx +g8`m33`pWFrdItL`}/u88{y9w|1T,RKvᱏJnFD^U(55 vq b XmFp.I?{|Q%TfaEA3Ƌ߃r_mag1ޜ2LE3 RuFHBPT8X]-`,P8hO !f$w$i qc+&2^h~}PuI0"c(R)ŪZ&=Y̵iM8„U[1== eU#AiMot=V3JX~k;-9uUA3`!) 9cL'Ⱦ01h_ʑ "8zGS{YRDUKX͆w K(yGbSECK kW2p^|GZ%Z{DQ]`˦< }rWW1L!0:&/:F_5WItg{\7L>hzD:LlT}Ul/к/ؽ\ńC2R(;G y!NHOy";S([,u,al * ܅IwTLq(y&g,VGh~S+͜QYwq}}_㳢s I&v|vm"7]%9P2@!onBXq^^ Ӏl= *0;ɱ&oeP`_? BV6#z'k``9LBۂRiŶ ,RK(V>}?OXND#~_: ¢8a'/SBM.b5<ՏЧgp\8?be[^.Z&KFrr \oD9N6Vt*c]5e eEdjw /CgMvT,["^-2%T'5pׅeԆ3J<@r$Vw2-YTk u4g4yS4uIvz-+-UYDtPHz9T@Ep,%6ʃ&Z4qJxꝕ n>s#\=mGZQnLwxK&|] xpPI`O?}1#AeD7`^QR'@*ay9AqyTq}ZD:aRI>x7eݝbu4Y*ybha3$XDf"B bJEw^`S9ތu[p7Q~C4\4r"ko0sg$ҳ Z]f哱(k V!;O%ȇ3ޖ[/6E2RjK lQ4c mHA yKKI*8]dm:jxՈd_¸v\KnڈݣpwsB]+cX=QS1&VfqN2pYlo Fh/o%̓0_ۊN,xIC.go2%'ݱTƩc>#`O\ϾЙo Ip ?=~wY$ʔCnoY: mFF!uj}Mm) HSwTXilIʫi U(jŐ`d+-VzM4M:ɐnc7!g' 0A] ƞjCħ ĒqcW ‹LL10.s$~*@k/͗@wNV0ec=%DI#3&^DxQaO]?_W:ȭR/v*j(b6AT=&L=n?ۆskJL=bCiÂdU$ݭԋ8{G&%Ϝ[9aF P#btm5kV2({hÃi)x@ s 0$sӭ-Y6vH׬HǹF0ANoFMÐ+lzTA`^rz9Pe1AL32\*Â憖)l4jZӲsAmcn#|KXುhR6mSn[' %l8;ppۯQ2;ed$ቹ5Q'Cysn #@i(ˮ}j wqc `v,liW"j9 ~I@Pm[ E?r ߞ,S,<o8cN3:h+2d A#O\8 ?z>j$hy'Mi)쫋d?n_*؟>o  %gxG\Sc0%C:`lB+!]MFKD ɹ,Ejk͐,5(ϛެ#H;wat_ކlx8BgubĬ;<|ʜrUrW8Nc ͣϐy=xFطU)']j]#dDnb~16a z&؅7VV>-"6D֚1EWFR6P9\B6v  f*E*dKIJH @ ׈}GHxX3o%p|dHic7YLrQ<ѩP48WV6/JuD(c1[G50L*o>7zsld32 JHlhYC='DV1,66%&k츯^tLj^?1&:Q:NUՕa`50N7 zE/kj*|B Z*W̜YXb>.P{ {u4!c~s=Ei ]M80by-y|S\H2YL\H ?]PfbP/lGa&Y'U4!9"?lǾJ`B4Uɇұ~%g?Ţb.}l=Y䧖M=ڧ(`33]*pgtꟋRNme!j b/ٜ^xDR,cЕ,*,08O⹏#ȴpkuMNtP*CEHcI3r*!Uz^BO/XwK?*Ƨe;eͧ>NښCP,j(؞~誉&$+@޵ԑ}MNB-{溎Bmu'I9F: NYlm1 mѕ[9'v}+c3|іAgdЅan ~^ p{c(k=0cDҹL\u]ͺcbWXX Kgj\J Bk珹>+j!e|q_ě?}:CS *bIԩ)vj4)V)cLFW>]|DĬMH7YoCFtb֞hsqr(IŻkhەM븟*{ *~j/xZ&=Byyr禥pt!vfOg=ꣴ}ҍSy_4V݂>p./(0fD-zw^6/U9=5 3"^>_:cgBR"Q92Rd|f!"^qr8)IVtSºD[b`yB޹'3t**7>$> B|\ux2䅑op.KB7Esk @oӲ*ĄtوBOX`Wl^6漯Os6y{Ov޶T(ZU^,^4ĠHS U^MiH&>-_] BJDWw_oٛz4xEgؠneb +k8^g他I5ؚ{baC&ĥL\:%[%`YqȡXam󣹻܎u,dWc[ OXv8=]޶'Tq'n|~1"9Kwg#Γ_˜xmO36Z V7"K~TYRCaH" X7TP <4knBiCgh)@>fPZd)6_h`ZeT] gl0ʯ}1~%Rvn %V:+3!͹N|y]ESIԤt̲>P6Ot:av;="?wYBo~ߪ1B?v2Sǃ8Oyc a!euŒMSC7FR c wjר]BzYI^[ Ma [Y/χAPI ɨZ#I -Pz]d3ڈPchҲ8rc8tNPaEusTɝ SDR@1HUkN`~;yPuMG;)L~^zesf3>M@u]W[N :Qޅt'3% _!.0z. ZAA]T'R@GDOwVZAȬ.8JFnXu?"Y'5ӡ_ ^(ZfO(Į]5tiEy26>u.@vp3tl/sRzs( -}f1sHKBj~"{S'/? $o7$|ɧ\>7ƪߔ:_xG,سi!iAŧ;V{k;lh$WOL<_W94;l<Дf*dwbtĢ/m(x@rF#e<јjA祖ߞLM^n@:FTkָ"YVhQ,_sb8svA|6W.P4ܝkNk#x8>Eb}!Eڂ<ר +8ضƍ6 1kz}nK85tx8m (z!u.|db$qotvBiYʋ2-NML~gWlw'|~Hrqcю u`OdĜ:밆89=ˮ:%qĀyE 9NQPfHxvl5lhYғ-Ty[ҝd/L&5|1A[ j0Te]H zBUot,}SFX3V$EqAB+(dCreJp6DʡI*Ԑ>K;A4FݓIc`OЛjV36++G$?S Kwn;xe%;=r=iqPa6~KkB4 :, G9C@ߞ%"kKk C{ޯlFc7r$kibLDG6՚y- ZyTm@t mz|;H1#K:@g.1{k;Y|P21jADQ+؜C+4'#9P=weV Vs;Lr 9G,}xRɵluB ˴*bҼ`[w~.簺ј,C@Vc|4芆 hN|h(5n\)\}4g/+/qSqQLv|b-r:M&>)hiCC~g3}q<0 RN)f|fC3`Fl?p2jԠ;o)Lq֭՞.ՆXÑ]NauV'A\C캨R'61iyyӋ +ؙъҙCW쁎BOXcХyήd~WLXfmό GK&J{6 i~A7 X fE|+m1b-,TD}F'Ms]LJHE> 4ݲujn0XT,2Rpv+:ב1hh8̑C-l>>E %q|Hsc\8'L`撬I\h67s&osO%5Z>0ӳL]by0"WzRa`+L25r5xs=,RrJ~;]r&U[Z z-^ xV-:$^S~pp,K@ D,Z=}vqRiMcA-^qfUg޻±e]K3&R XM1u(~5ru%@qXgZ>tSczN? ]ZxKkԕ o1mUG.Naܛ]·N[$1;J7|ӹA8<3]9}2E;Wֲo>| 2h$Ld`ǧ!ӧp$O!r=#j!z].gd'RNXU~-J3S:M,\; %ym Lm=JX =%6\l2-nR1 &t+il66WIaǡ Y4lY0zDJj='+Y%mRŠ _1}Y ) f"?YwOrȹ·L\b`]qdLw d4T{SĝlnDYɭr=ko5JytaENDJ)vV(zAH[ǍoUi+5Մh&1⣃]rbIea ;oJDW9pGDet%UiP21Y=3ˑwCšG ""o.Q.nu< SfqXٔݺ}+RE<Go %@E >N@CU" ;-gw8Jw}><6$${9Upck#t&l:KgMp`WyB2)EնTHhL3\bjMiѶnp3=xH>1OUWLH [Wl N{̬yC}c$dIy3~m 0_k#3/4lu 8=@P^ppees券hBOÅe'j\ySNDjޚrg<9]6G5 ~:!Ǻ:~[>%`eWpv@7~!r줬'2'dPKr IJ¤YoZȐ̟݋?R/Ij,6T=Fs!J:vbу(Z@LF~E}qh\4>z_^|A[R1P3=p8:Eh uM[3d l3'qĝL)qlDcX6WVK^vF6Y#R/)5v`! ` w:PyZ u)g@Y' V¢_֍D7M8 zkMc[eBDŽy\9+#-5-lXYr;XAif"2KՓ5ˉ;a$)b3Jxywٳu,VI1o ~[<)Q[#Gho:N ؓjqd#.H Z2̩^#'rP@}%0Q+(aVl(/u)9[TOWp+|=e9jHsɛ@s]^Ƈ x}ammتTR,e{*'dkE(@3Ф@YoqIIl,؃p%d{񻦊l#xSp{xiː)̘C@TR2~x2biFt;@-i TG#V:˳ mVω;&L: .)ObWV% ˲5X3ji+&UJö o| cײyR<EE>lt+.Ƅ%9mu}5|X֙GaΧi+Ֆ+.b#\\hf Xֆ>{uP6Ņu~Ff&<=y ǠpPo&{Ϙ;j< p gf9QHcfؕ5]ey'CSr%<} Ӎ'rIj$y h|NnW/mAd .]$r7 $T$*OKt,_ªsp*+WRˣP{MbZF &[Q:yGqC'gk/PfN=|| ::J` Ql)|V}9y(T\c ie>7c\1Zn-WGd)?3nd%c( skf.cWbNۘA*v4ޣBnQx^P ^ z왊7`dYk 믗/$k X!gʺLH s#l?2q*=–5YZ*ڞnnQUGy{_dd]ƺ"> I>mȕh#vq] oa ?PDiQPb }CAz>Z jZ&3%y5`,lg} 6x?\0؆ U?XηRM|"\;4Qb_becs-+:W;i@qKagbtrGQ L3|EJIטN(]v{vfyފ1toG Ӗf|qSbj$B Fk,lhl#&,Tx|g0%3[+)o;cyV@w )abrw+Oy4R13㍱P)&E#Q;uM@XWYdゥ9' I!{#̼?UK'խCjYzCwٔµE:"jiNЭ5⭬[ʵ36Hw{rQE+ll$#A 3񞉸 O ~VNa% sc)ءt9|3]95UC=$L ^; 7dIgjɛ4KnnRhbYnJ3%Q¿>1 ye5xU,eg%FgNOul R)pY+Jzယp9Bv@yJIj8_l'GWCU1!t;MW`w) P+WSV!z-PMǬj^Ufޣ)u_Ff8nvC$a5I|y1"$wmR0FN Qq;Scn6=\RQCgfRlt'S$= dhLa9o)ʏD;f|$~DV.*:FIӕl7֒Xyۧp :óEc2#;UEyLJ\0y_)=|o@~fhvGS=JȰi)#p_{eyC#Bi0j`@fyTw$wlTAl陔:!H@,G'0~n|*І@e)jxFUհa9?SQt[:nkm(\g$a*ФhJ'k&K;N6 &!Vm؁@kV&=j(=,13TbGzD-N1D7;B (Z0)`?Y>̀TӫQS$u+<^WiG9/B>N6@+4"eDHaC\c'2\bn8|WȆn'9|'Lk*qW؀TQ Vr'#DU}ju]2ҁ_Kc|1?7g[:ƌQ^alq׍ٓjŀ |R=7*]_੯jZ\KT~1Iv.^+]^X(0K\E*0Ml lH߲%cl㐳!X ~Kq~bXgca) 4(7j V[U#U\e$Ep4CQu+7/~PB>T ְ\;@uY֝Aɺ{0U|}w`.(z2^sԴا[>Oj7s~Xt~罋^stoz3Q H7a_1d;rV1P@cK5rm)fGSJFoela]nd/ѧAK;GI9iNBh֞}mn $ 2>k$ u 9Ú"^l\_ G.++GK]pdwcR|P,.^.(ʠp-99No, v!c*L[B8ĚXl7K8#~,L)W4W-% Xw; ?5ACD @~G`[ Cqx) 62lWUf%sm0h0_#ahj2hԤv}MgISaڏpR#W([!帡7ǟx}C͗ #7/c&3CZu*s } ͏Gi,L6U ~ ^Id cL;8bE}T(h|0D(EC9(PA@hA2JӕNsL5n#u{RnpM.マO?}<9A:0qE2QĆ{I\+foi{^oi3 \Še (s.o0},՛AɊJ;!A}-UԈֻ@fR|>;vTg#X%tAe:[;|A>vh|HqtRL~_4IgՇlƵMĈRQYJvj=4^ZN0ݴXyl-S C/Zһh dҕ &@Ei7wD*rڪF8jzNςZ pM.|R]cA~gnq44BBj*cC:L݌kT.1aU n뺔]3ibk\ż'WY\W(,P^w kK#L@L #eJNm*ulޫBUˁui$dA.]~T~N0Cz@*FF Lr 2 }9t[.Cʥd#&vE$>E""*4B9>_&S簷%HX'H|N*RtkXQڌ[Z6]JT ɂ{xIE;c,P/1!GaFMRmxti m޳[dJyi||:e@܋1w .39g}T Rg$uM+V# C-w{Yhh`(j fhG\ א(lCrx0ܱv󎼛~?+ʙSx Z>dH8AB7Noμӻ"`,uB@%6ױo4-5`5;J\'v֚ۓY]rz4~?&B,:6PDe2ZT2ûIv/x%`mi-zQޒ us< x봘1cOxD1[(d85?#FYɥtBby3dMhbU5GrY hB*\q84+dEV1>ɹ(E "sP /P+>u620Ա[Lsˎgn) g6d9}59H8qt5(4G|l:ʄORU|JQB&4z[;%C{]x_2驰b_R Eyr]ףBy '>Yyƻ!lE\3q2,r`zK,ħI-X]rytj5!~D1ڌфmW֌Af RDSAcg5C#y3u >쀎6L;7PPdLp.ǀh|P56BnG~QjI>6L?>9Ue<+dBKOePLo"p9@;Q_Y+rY `4m{rW9X8vخ6v0 an5i`rZy9BlJD!2RTL1 7VOذe324(ܹVG$++t[I$Ӄ蠍y1/PAÄ5n,#eV9a'TO䪰lX0W\7:ۡc>SWW6*BKͥ?5]S㺦]'Ua7 Ʃd86#Mx4q*ɣ'_"~ėO*N5!S܇0Lȉ/؍ :4 6P{N@x^m'b b; <-"W|׈04/y;RC͞DfMр\ )c38*\Sw#w=ð\F_ }' ~nVV <:YI@UM&ʼ-o嶹b\U!</O֪@ۺD;|N%2n(10aR[[Rbyq?"IdH믷Ka]RRT.l^]@RFHʆq{b(w1j"(ٲ?C{Y̯kl]sYoz;{yB Dr&{k؉{ %*FaW5/Y0d't$uT ԝJ >FX:_ ?ٕ#t_3m[ V^&Ȝ;%.9[hA)xO-HY'c;e\lؚE ʧKsWGjO`RUgƊ uIh` ^a Uu3x3b$\9LT! "h3_y|q)"$GHY)GM\ [OH?+`2 a_^OHI?C[m@m@.lVUk^+.N2lX #?|;b $h*=%hSU/"c&n {x@SQt>_o?y1iS'/oF MR76D$5)H({1{КsyEoaU?otEl7YZ0t*^UDmJH$ilS&q۩RwV 7_Ii+v_ 3Ԅ% JC3H.)tۛt,Ę{t(UPB+{4 JD: 5WL=ݦ+pî|zB/tK_ & JJdrlRr_/XCN~ R`,VFPJ2m*Y_ )j^l*21s/Tcx%J:P'^*v,,At -<2%9CMiU/P(t Z{X44b{Ȅ`@$)O1wm+`yl %SbQ ϴ=v|voC&)Dycraxe Z3Ѕu &ю("&2][U2VFKZ;ʼnG{\mxXE҆FLW:Kek 9U[Cd"Oir= j^3nA"У?^u;B]lJG# "̦8`D܋,Ѓ} 7 ۸R+WL| ҧ;tHgR?U;gSQ:B00e3';tC l/}$+*/G5v; tI_Qm'gRu@_c Kx`|5zYdl% N9SZ{;I3VdGZKq&8y[r=&Y<Ģ$򟭂QcOtOo7+)hr~R%>;g9D E2?0]m1oSǛ@'`7q6;D\~g:2-Hdb!AhZBIof Mp]Qu:tXr 68fP[GaC.=ոzEqXbU"UW*T{R$Dbv~A*E˿@)pS9_ƚ*>L&sC'g4@N~ݜxsf)kfL\-*}w 'A9 "b :l׌Rxz s|s%AlQTͳ3ƢDF%(Šc|g-ZxJGxb[)snL9ORAK*+4 Ͳ-6xF;-uHka.)q&Á P ˣA+ȸ0Ejj%놺\8~ IL:"#$^'o";nӄu{LH% ǘ3`{PȻͬ!aY)$`~ԧ'.|Ăy+$)g~c)2ZBAf;8i`hk=vĉ@5 jQ# RqK,#窠î)ۡ+ o񉖷ukb q{lʦwg0[ ~3iPt/ysPQ)][u`~V=W0KIM0 m3t,xz\͋]< Ehi=cjal\dÂ+W\W qsZPl> augQJ[t.Mazy4eKWG6>db2>%vU@zku[ L}Q =v\C7*c!qQMi+o.=OWL\*de}$wOjW|2ńN`!Y}j41'eB9sr_fbV`pp vw4A>GU4K|& VWaI_ZpJzYK d}g}3$Pc._!3o=Z*&г)^HJfXShDnm;X6Td˂%8a+VnfpA LQN(]CO֪>1T saRv_x!Acn)K*7e0Ի(ʷv[@mqAY"5ݲiGͱ[ RMZZOidHdxf~C7ȳYWwSB_Ӌ˿LK?b{l4wE:ؓ4Wޮ6"Fu0~e z3 `7el!90pySj韑o.)s 3p`uQm%802z$ԫ3e(0==GJVNt?NajXʹCUpLoyNM m{n b}5L5]vn{^WPF!%ێšdi4]]w F:PpzI<@eܻRKق_'CloReI _vbq͸n#0·G ~w)&rm Y@ڛ Le._ek\@!#tU5*F|9F@c)8P-X7I G2*CBҏ㭍d4AT9 UPYA#-©Vuo6V╃m_HWFݒުT(ƌzأex_*Ybkӻ7Vw .zmЩSS;7U(c'LR2*O/ }diMglW W v]k o+C]"TJ3mܺ$WD)kLo݄K͵)S+ @~֑(fY+&<rZ7Q﷝y}#$B C(Q䤤hu$s1}F3VOG=@\;<]ףrW={<"}ciDlOi8.w ݍŰоSPh*E%LRGK=>!|+OGKlOxRJzC|wmR#o EG aEE(T~6id6SwJ\S 8A_[][ Md{|M+iר.ZH 0 M5p*էD[=wךb&bHr4(3Q+XQ@ܰlW뿏8bDզ8ܳW,Xz ;(Yb~,MyLl1W.!q AŬ#N~ڬyp.q=/ Cg Ck (j ovYBhD)т~e5K\Z3\({mgKta[MX`'tpM~!,'t=R ! m疏שɔA)-2ڦ99,Cw8) z9QR;g%˝R` .+ԨcvV`\Biuh^/nȊxuLȮV !qsqwlbnd!ͩ(.XAeHy^Tg=)h5޲FEn,V}z%(%ac胄U^j'_FW9+_|ScRe<(HFGȾ8ȴSwW0_`kPBqGC{'<ˮ"  )ZM4IʙRe~`Zݠ,gg ˋ 6ʯ SPї:}B "D>i%Oϵ|9O?7$so-o@mpVbxhs |; :@c|(xt1HLVv:y1qk,Ҍ9×yAuՕgE)Hάl~ W#D٪E" bzUoq (Tq]TaMJ5*>u$@J'R;'J8 ftEXۨAx4sP S'ldƜݞ+\{T<#&щ 頚" F'07&wl#mؗ Df#E,x7Ooa44.I,P^Çpx<=ĭɓ"WGKz;֌Xkpu+O,_vA\۲ߡ HuyAB {ֈSlT7Rx9{-'{LQ!sԲ6YnW^ ơQiԍyNPE,ӘTI`֭ٺ$;tWW-zɵ[ErHT=  P^z#Z40N` nfb/?!/ _\LD0(_9L+qS*<ܚ H7[ KʾY||ڸ'ǽO`Mp]˜WO VHoyTg]>nJ~ގd*hg_y9M`w״9 j4NK[#A_%6Omtω7e#7:k ).X iT;e<'g'@0'A]$/%׸en_O(rbD!> PiL Z)#4b9秅N8o~.5rpv(ˑܤC/!811,zǚGm)x?EBkyOsL EA)˜Qn2@ E0᾽tҕ8 #]],+Wk5 ֿf TH;ž4(V]J\1u PDGWJEG8\rF@eK 9=K]u|!Ơ.$9fa1q@}NHe[iTEi!EA&:i&&&u,KZy8S}=&3 T耘8mvk QzFnu^0cjzab#>c<hά,IF:|t!=PPg \a#wW$Ǻ70{* x #d=t\ Ӂ$^V_ݛLJ `8;LV4*j9T6Dۤ65d 3H /U rp%qRSe׬KKӷf~ϫHWgdD/;[r\XQyc~n۝Z '+R=EEI;>(/y4:ߦu׌<$c&#^wQs+yEv' 6]%O>s^+-9AZ<3&B  \z{l(¤P5*AA.(Q;-1M36=/W⨋/C'~M[>1ً5zhnf98vgbA{%vuӬ@#fi'ؙf]$g@Vg:rZlQPja_pŊ'/1&c)T㡽 `kLK;&(6>OF[,C1o例hB9= Dftr:9w4g&i`j6i"7Qެ=R MpDiC*Sq,4ACNA9QTJQ~#i'Ut V}Y/JBP˫V#b"*+va.SB] ЩcZbC9DGnrVt2;)oRAK^:y2og}.PI'AQ:Uh H3[ޣk>rqB&8]9<;}YnĽu^wq߲lAȬ 5(i7nz-a壌y%w*cjz&jh=VgO@FZЗ,eq`z \4N8t JOj(D;-v? n &ܛZԓZc~1Auȴ]Ҫ\___; a,Y0_ȟI4@4D}x\!}<ӑ_cRɗ!ZRC=C*]'yA嵺p ɄsVSRI~(sBo-,JHÏu˧'Ew&L+ GGG170Pcwu ZZ$%E-6+m1.]FKBY:^qo$B{R*o<;>rg{B++!PQ :Vv OV׾-y8֌T\ӠeQhׅP[Y=}U$㎃a 5QYe#6Sy{o ZP>Z<Ez x# g[LYQ:codyZ> o Vw( KEz X$MqUKsvKUçaoky۴Y6LJ|4ʫ ^Y@%~ Qo(VEE3i12vج'sw,1i]sIkUxp41}59@%RKB_I@rs< DfmnrB3+k^-”ԩJK:;:9ǴH~Cv/ w0-O5Jy >(woIA43 aqMqpTDW?ki[Il> YNݡ$5{OaVffݥ,xj4-+Ϝ2 R%xf)=TߍWXP[CLцi=Л[&:(V-aFZ>hnE)E#{jIլfI#΁Ŭv.Ca>vrűo r"p@jLt9LgX>WKUvhNr.q38F)]@BZ_ShF㭔o\G;B+p/7*bϛZXwDDEB<,NGR|-2>. ̮xkm8Ky6^rRN v~'™CBARD"3[JsAv7Pm,4(n)d&&l pee\PMc,f'trրqjop+yy~E:pn3JWԜ\QMU&>њE]ujx4olPTcwXpo hFUC;2YxkHa`Ls' pG/v&^Oc4~[WkQu{M`#!=?͖} '|O^1슃q#m6lkZ}͊7Qx^%0Xګ$̈́ⴛ޾6) ϸGJ0SeD6,HC"a2~yp/?ϳF jY~hFJN+23D:_8P\id=4.<>ӠׂQJe %M,h#ב忻$8d?Oq[`=)pf-mпa?-Bz3az 2q54iK`sVhgǴQMaAK !h0y]z=Ngo'mqml'C n!/v%p\O4|?Ŕqn: OVU=HR_=$81CeyH[L8r3w)XDDioj7%B=*ݐfF4,"&/xR{ PNXBgK%1JR%M&;qo=ٌ;`dDTrnv8Itf~VSwnhXNT,{@q91,J :9(x䳼HDE>'={. ́c7у8,V1-:e2N`K;ve[]]B)AzDZ&aRQ7~`rOa&j-OĐ p5]PV=(] LVe*^ TzIƥ _N(m7į-ɏJxVv&+`SV \7NzPDN oj3j]ڬ&}Xx4﷓Ű^)kӶIii l+4/B}ųnT적c٭uۢCR(J9_%e D.Ya-e`6>"tfwbB1Em,fM>,4%:3-c,] :47byJo($-eλb&0׉<78saZ\`LF3HcoPHBqlOxotw0Pp.u2npܷ`grS$ΑdV+كol?{gۇtMy^~0( 9pVeepZ͏V^$*qbg塅[ɋ]S ﹶ41L&^Pd$ԧU:U*7p&X)K(  ![a}R>ElH&aN26cdΔ,wq_̐FMLu)Ȃ _:SiO 4A=F^"Ş*5WJu?|Ȅ\6M$7=9Fk^K}H CR%2:^Dȷä9'vA 9K  S]IpU?P̩4+(E5 ӥH",L7t֓{-n&F 6_'/WkYJex2P1Jp>VD$*D%w47\|`rVJM+z&`FdR U-'w{@/3tt̘߿[qu_a8q$ q6Ga%{Iq>CL16q_]* Y.z!eu‘{kօ.WB蟏71PD{dr|R|BEna8`*męf0u􆬾Q(mwV ^"XdQN9E.OC"9:컣Бu8 ).c>W$ގԘO2b+S_`a<&T"&{ۓ"o9y}7Yk?p:\]2>_[8ǻ]aʫH@U¡7ggƏz'wIA!9sjXN n[,enU"dĞۖNZXx H 㝱 d/y9~|e҈BP? U|4a`=X#nW%r+"}1~!. =-!E<:g:̵PA[IU?/Lm&cdvcV5k/AdCL5c8lnjhz7 ll&LI3}:D6n Vr~k1m ¬dz[}1娎g.Y_ncsxY>h݈AYh%Xf% 8 _] /34 ]P6kԣ'ȧ-+aԱjZ.TtO;$j30?b% (i+Hݘm^uGd:2d_tMbyRsHb6m`nԹ$ ]хrT%uWbNh0x "sLzyFU͵'lQn@wY!SaQh\}6l4hI9Xy0t ;[fȌUKIxÑMPL66Aft)ZOoYhRI |wߪcȟnfҏ:Ơ]$>n'!j(y4k3[Oެ5Nc&wSq#cqh&HAiVg?a@v*e+ۿ`Ovꌌ;k&#, U! kivl1TC#/.%%{;Tۤ=3AmG3虺mR`YTJ Mb#e\[]MUik?0Sh]} `0MrH\2ayߨCSVYm|\=fZPx&[Ñj-=cJn3,5cxE%niʦ%Vb5H>caD뿪alqqǢE@O1%OȺ}ŵ 3HooB%"؋ޙs'S@Scvu4PyaSp%8Ki[&\Ź<h_,|ؼ _ COНÅP} <Ca)gM[$4H4F  o'GX9Dk3 ]5JnphQ"_.iM9z2>~EC~@OH6tF$|1π&ɄR,oѼ݉8؀cA. H$ܳpϬ|XZ (|q +iBlk9skOTڻd^|󽦨T3nhL 9?G#IOIG xupk7 K*"N(WmG̻Dj*8Pȅ0lR9/ݣiCvTfe_^AE=KeU=O-Bc;qxؗEilKx~= zտMEC=J؆:eϦ*c|k@'~Ex.0%I(=5 v.Mu(SDHՄzv;N B^zRvغ@qƬ]+>}MUe|ń`>d(c`M3o`FRA (j~NDۺXK+d^(YN'*}AqFg`:RP#qEstfU霱N]=&Ubޫ/7tzk< 9oѕ-&1ֈsRv-O6o']_TY <.}dʒGw_ٌōy@%_[.o"%ew7'$W65W=gy;9xr|rdh^]!͌0^|`p/e"Oy&(^^W`]Y7GFnd ri҄l`%+*g>pU aPWtr\;J%+dK:LW55lT]O{a3'UySr?`japTe SQKr1ɒ}ئ^ot5*-0%R= z3MJEa  8c5̻܀~DQ< |}%C}݁O%>ok_ЌeLǮ޻'h퇴4,Q-|D; f^cďs x,6@T<&bDcKQOΤe߸pbiv3+ j/XfN^nt#ɹoZI~ntkZ\p$furz0]b%"~l _;?e~2nmJ~?cxy3QƓ, [!*f`m4z,"jGqʹ"swmFm@tyB3xv0,̞褀ԕ*rRq#NmG1畁q yIJrU!Lwtcv#_J)\*4@PpQnY㢳`*ש5-x՛Sh_۫:zQbR&1=l?4Y^{Rݦ":k5pS/wAmSJ7ǒِ7 xzc"*3stN%7sFROбJG 1_Yl קtȁK| M;Z:?τ/X&Fk,YFd>k)mn51 ͟q>Q/-LJw|I.趎>DUt8]Gȥ9 :KtOSfK-\9DbbG 7_'FٛpEn-|: 6cCNDjDd~ʤHȞ4IB7{Ao 65m=1Urc$G:?T72wA~J5Ȁi֫"%t5R0wқ[Qy=Ɂ42 rp}j,ZbolO,b{pn\*D#sf!F5V1^v#E|/M<"Ӝn+/N/m%@rW՞SjIZa * 0՗t" tA^$H0S}&]U6<&֑jVQ8gAZ$sxMblӠ~^>wiZ&%<_'88`v/$ꓡPV|;u&mXgOFR6)ݧJRPPKw@G4L]4|(rW[m(PMCe0|{t#;܂!"Np ֽ\٢AJ4"=ti?:Xk*IRӐdhTB9x ؈kZ_Eu`Ma.Ӊ^vzAxR?D;e+5J5㪏21ڂVOjq w13U1Dwn* XZwzYêϵY!5NqcZWIUb۟ R@:N2FY. Tݥr?3]`"s4b?7B)*>sͭ'lƆn]g.t;6K+ ̿e`Alsd<)!Z0_ sV4e@c748Kwo܈ 9_˥g5_G#EMg'* QB`JKhELľ^ÄM0ؿNr*Wr{,Vۏxb_7М^۫8-G?^MކcoWg>Hω-EVzѴ B7gMM ,ѭМhIڤ"s6_}<#c#{~? ua*|C,>"5+y!-;0Dzޙ]t_n mZ; š$'Ƈ.#{,d̎0 Fn#goQ_x>~OS.|xp8=Ϊےu'_|Q=`mr^n9O gf[A$UԟvjpX=<NVa; SRVTH,FI NxN (`6uLBq)kHXRcx>b>inVGC1ZT;Ah+ƒ"p T:mHPO3ߊvIv$Yaq!"3kD.0Ҹp;%bƚZԱ iR mr\7Ml6[Tap|Mq6[\UЌ$$0;"N!W"l۞]pz:.ʻUAǀNtlKUyIz"%|m7Oha7s]fB_nq}/U 'ÐYJKC&*f913E=a&rUԊg{|1#EmZGY/q#[ ~x\|[Y/:EDjOe8IP[; b)ӑH9NئD?>A8P b*C\Z\JD'p+~z(~Eom2m!|$1/1:u>5(tPgǗ!~pمDUoͺ`a`'۞ 6S23J ڥr'|ri3$J"!Go75惣.܏b'X E9PYFU y@oAǟ,ZN'{ҎuSf(A}Khȍ*_K]JF? @M J.jn".NzA٪B["9H*h1'cϹ g<6*ehkhyu͍0C D$z <o3LJhdjgla<>m&*4@N[yG7~ֿ3# /U}w:N +0]PscVĶ*[Svl㦄g7.iÀ|I~\[vqP^+:(LߣvG=,skSnSҨ@˘޼HR^o"Mf I;WҠ-iTb\`3Pi]=| >[D#nrO,u dJ(hKyHIƥF|M& 60ziɦhhm=&c >lj!V^h M0 txX'Awuc;k{FXe>N PLmD2ҋ@e{T,g4Mʩ <Ⱥu@IN;*UgGk>Q*[ˡNs(2J:)]t$cK'=81 uJ󨡧a/`/TQt+2$`9Vc =BښB=Keɪ=HAK14d6BI+] -]Su(a!hdMYkxr!&Hg2[d7~UcPnMZpv21k@apRjGei*{E$nðȓUi`\p5-k0W^žjk?% ˄H/tǯ7V оX"Sm}ąs[W\QS7 <)GÞ9¡i@8죈G+20i{ٗ)@j~h3P Ɉߗ[g2dc\9{@,Y3WlR|O 7;V hȦ*g %#|>!zw[NqHE"O_ANvEو+# jBP`R\_f!IuRw9Rd LCήu!!,6ۓ|Q,% OEl-~_L{y[dפuPoR (k k68U1S"U O* /=ʧS&aefXws*=?9i<$&µ%׊R$}u׹@)ڟ(;dOл{0Hؐ '^ /i/$~l)jNEј=ǯg`'Nk uR5=aFpm,u,£}Ӊ|?<vv j(HĿD lGɃR#.YCOe ʯE `ɰ 9I 4Uu%#>2 s]Nn w[FCE̹Z|nSPI;Lq.DUyv5}[l c ,'hGWڅZd ʂI`@Z67Z¨Q#pV)4T;v4M:oq{1e y&-SabΉY.l1B{]| K`Q0`JQcDaThlb̆b^j՗okY~Hh%ۄ<!oߊ_γޠn̶{ԓvqOV0҆6S2LBr_P>DkUOb?i( yO/yuk`w7Q+ݣǗQjJLpK>?H~ҹ8Ր泓݆Ja>Eg>Ww.n~Li*/54el_CwD}ĔD+ĖOėgp PrLe|^IU/LL$_ktvEȞfUk7s~&fV5jRhf?{,u^DWl*t0ݍ Ee_Xch \Yn~a2UYtF$hDQĎKr󭘫d-|h\},uR` N5A Z| ~%=XK-봩TC>r!6:nc,hG.ji0JI5ذW+_ ܞe@ke znt`=J͚*n>+ӔX0R\rmʿhZ@xOZܑYYl N^ASSL,FܖȾ:nY`zpwz8f>=^ڈ*1"0V},&y_z&#E@\0 M@ri6  52K4"#i!}п7s\gMc~YUQ#Ҭ^iHT5$c6m|OP[r1hîo2x]YqN7|]] _R[ ;ըӿ~o,nq2 Ƣ*Qms2= n,1s-HErՅ-&_u~^'j\W7h#aJW E ҃v&Z7Ck-4dx= f.Xi{ Z^1 <ڛOsG3{ t!JS9HܗS:.4 c߇U⮔>:ߢi&d3H%"܅\\TӠЀlHlZj俗xU(s Јe4wkFx 9/;n?Z~TMCA{s\EQ_&$JG).nǝ"OA+$V扔9D 6~wK>oC,_V);^=5JM~U8ԉkt\6.K/2 LmF~"IрAǭgת ^Qt+@;_mg'HҦc"u@I%V/]ɂ<*07amf4*E>\VަT=K`ݚߥRI0]/~9_F@!?}%[%#F4zQEp疫-JLh5p[!ur'`OoOPM_%ӴU}t3 nG61jGB(tb|=Gj{>bc$N]˕'F| w闞G2LVȴ+nvs6cLγwww=)HDI+P CZNnc"Y PnC"JmF%QBU1;|N_7б%d?wx1*9ZMaO;V5+_{NaI{^D5 N&~$z*dPs+!( z_(@teG? AY!XKxoErV]aJ|co3̧X`/zBTq,Uҹ~ $m@me4 0iU="@Qj.8&i6ϙ_IGTax|pJ Bc;7{*`kh9 .AyntՋylAhF$X9 7w¿HVOFbom*x&[.{!nzt@q"|E4 ;n'O<Чk n+5n0IqDc~-#MMTB|w_P~ nѵoWL)r.\wL& Z5F Fϑ8I]kTE NĄ)+P yo]ǦQK7vwF8ǶƑ|`aO mWS۸-!NY)܌JL>FQ;ILx:UvI@ >+M6I,RIhzSeே\]@2ֈ*+_ ,B8_##H}N gsؼ W& #q5Xoו~s;qmbfW%+eP׻Z/ >b=o(oXu^Zs+`rVGN1ԐVNnF6yuvܗLM :*/Uo(/ N<ĥ:3T|Db g؃;}p\W5 Hd_,w1T5wVgco5` `̨Xtg@8떚z8i62lpsrNP[Κߌl:[A~̷adu'+JLjX etm1Oνep}Q'YE܉8pJ<^im9wV?+! 8 ndSj| gBR1SƎQRLh!tS,ӯA#iA=~ ~_F?ͱKSzˈ (,o_F p}WнhEѿaC 30L9R77u^Os(fmB/1&&2AP_a*+Ѫ>%wOdb ͭBUP"UbXϒ+N*snitOc1hL1V-=R/Ϲ,tDZ2ۍ1XL g"l@ ;\CKWcޓJ\ /0~[d3kBw_d m (W.'HťA:Y3”{h.q6IlhIm.ya-@F,sfj8<`Дg ^NX2> .0^qrP% U.@  %%IBXz0p6_\yS6b-9MS #V(Z5G4t ]\';SbكmTuTЕ oT竏G`n뼳 wj fg.v5Os,HJF91ob&c0i!뿝h])LXEEGn WNc|=k|6S0xC7տ\l$Gt%QUf<1*Arq}8IbUq8ai>~͗)*qj^@7bE AF%T_O${RڤE\2?xAI1h)k!H(@ospc}gj`0_z>yV C{:Ϲ )7 l< N(W<0ϲ*X\⑐@9߻pmbٹ1W0ܽ>y]=(70c>PO$s% 's'RP&3ZVg)RN%܋%# U+빬}ҭT( Myp>I.˛(O/.bJ~P䢊rݐerwVo]dbx;%;M:&?]٢77O;SOr&T$KT{8[q^H27f]3~N@w_&P0zơ /(X(bocҟ2 t}}ۧWM r͍տdr"Mm3V! kY𹫉y]DlQc NPX~ϢUVP`Kos0C˗euՄ29\aB),HaJϔ%ƪh6q.f x8CK'O4>Pq+7&yc؎_l†.mɺ|kBP A\UkFM)gOr?#2 Ʉ},>QBNζ+/' B8NCQG@8F;9 ])/Ld.10Crn* YC &>_\_q [YR7/+q ODXoXydD }70gζwKDw)lzmEZy2eMF:9O9Oy jHI =khJ~w?(cIW'l88j$_2:t "d+7v܇sYF:,.7z&Fܢ \ou"XwF9Y/_3tl@.WM@{;'`q<'.J͖2(Uqހ? +O _pC5[a# C{7u$پS6dd9j/w2*Pv6?K,CLpr50n?yP޲[u!DzUҞ J$ww_39x\^;gH_&/Jx5 6KoLQHDA R->"/w]jg/] : ~S`+?F.@XSY:\B.Bdo?ִ3X6T2B{DJȣl@e&_5*!ꋛ<%J /A4KA dkԂZd|M53e`J I"=qmTG-g+x%5 ["Pn3udݎк`#kn̵+DNt43=,!g qWNH'ѮJEka_#yPnMn)UdkGׅ$ݝdf'% Lm}kkzgښ?<-'RP(; y~ UDl$t~{58)d=u60}/{vrqnڲ GճEˆfPaEeK\plE'c%c:p#-,JD0h=4ɳ+;W#G^ Dn S>C+8В1Sc|U)wN|uj!K'}J S5!@{oUX Y 7b-Ȩz?D%{6D ƫ"2)^;_TIìKjq1( Kuf5}̻NSA%J` wT/Z@-6w3U&|d YCOo Ȑ4z\Ώ#Cr Mۆ`=-U2}$mcNMuH4W`y2c7W =Y0GAV*QgfEb9KI^S~x1**uOR^:_hYnw=mYHv" ]7sTx'|%’!>Mo): Eңʪe2;!4š3adL9N.z.o_?W|vQs=s-؊% d;.,c}xiW46Jc"un l҈=5۫|\o4')FZG浭OioÖG*Fzoo h󀯇EiRqu|x@3/ h8 oVW*&VIgAŖSݑŔvc^wsA1}E 7/!<|@h[j4J fD͘ T&+eh?_ ۅ}5|r!+03;J(Y?LtZP~$3u Edo=eݟjO) 误Y 1>54YxZrmqyˀvPmSGN"nV]U&;hz4^/ЋqeR%s۠HU"kH.L@JnհUa %X{P <#\gɃ@m?jDxEojZ@|[)}u:{evds:T#9K Yqq=s8p w&$$C w=%MfK60oup}x&ҧ(꠵2ڗlHfymR|{IR_v@v(0ӧdz+#K{+of x&_qv z hu 8wmOЌRj;H?.>V!+:rvmBt/dgnSߊ_¡®iGfaDzH}HF\l=Jq^"j4{=x8נLe:o* r0kde9!nBiLFa lV59!A'#J FQ11^#9K7dXڞS8;yŎz o N)n.ot 8JևwaYtQi J;_ފB>h>Y&p-XccH^#߅uwlOriFv2Ʒ2Cl .)4rBYހ!v%P50Oɬ uwsZnP!|DD+˔u},[l@`C/*>:`|Ch Dp&5oW&>eQ=nQ Poz-RY 3ER,G#[A&1c|nG;L (7,˞^!*R8tl琢IpEcbd!#>׎?N`;Cf/DD;,ZgIٖS|&J6͚UIiUF3Ĩ #)Y{Ey[<oZ $o cc$^1R}kuqߌ>ctT%6|lȕoa  DB/GeL0GDc =* I<%up+x/F\u<!Y$3M@OWcήm>9,bЁ[2`ydn+uao'`Z,-f^hYk\s)%M@s/,;?. ]_l.xX#vXvcKzFo !`9=CV DKXdb_HHZ7. ?f@"/fי#A˺y~|#) S ۥ 5l;JYOD6a-Lay8%:_呍 ؿ[`\\ݡ8&H~ߑ3[}yXSe,ZH id ;[T+0d2עkAWw`蓇vR#A OZBlx); =^^g-VP՚e3d+yr,ߣ:풞-FԃC԰~*^@twM3V3}M?tȣo@D)bz"ZDgiw#ە ȷ߳bnNYθ3bo_PѦcf( ^'<"TM!>+cco$FeeZMJF. Y5g^Ç#7zsړ9 iܗiZ~Ru=ptu!!*1$61Ș*,xsМEIhz1kPxbDӏNO]qd-l6U&Q5,ý󋠗a5)E~гys<`QQ;V@|/"ќY'Vb.~(h~1IkT =-!hӌ{ىHך&q6(U:EH1MyeQ+,y!0 mDh"!& i8͇}7{_Tк94T$X146ФS'hZ6d1Q>)@nEJ]+ 0`n=41>S3|T ٤MU6@]e[s)N!52L([I$#Qs] ;5 <~<1$0!B "eiPrxVmo.zc\d4& 2YBeI.Q{9|EHBkalJ'icA q$!21 vJ3|8aKQ37Łwj?ѫ.oO \INCso]ZnWr)Rhex𜐌lC| g%@;I^ huuLv&17~+m2x?lmڐEQBM.8[yW"8փ e#ǚA-La]gTi~Nc Z%LJ-8aRHKbqvjQڼ4p.Z;ۄdKWXˇDevxi/0R=ԡ`py]˱)J5,ML֩w. @lt,ei[gr2؍o~貦3Zc$ 16g+1XFX+ G9j;M9K̈́r ОC0R}6˖"Gb<&$?E(j3HL`N?d@Xeu`mRށlZbc XMnp>V H:nR0M@݋HQ+Gj^:רen_\ZYFg-?XI3Zj2# 8EH&smmyM'ZIuS1!Eb;ronSvO,gzq5Ƈ56m%+%^hUk,-Sܴ>zBKiX&~F3ːoS@qMeNѢXіc+ڍ4uG1]`V;\sA՞&س^mkx(v[ۮeiWqԋ_}{$6Udzhv1I)чR6UEqO@YYmVJg|2Y{H1ɄV{Ogf:6ulYܪSRqS% 'UMO1 Qi'@)RG$7*ob8YLz"?戺)EʕͤI2$+:o1;RtL 1۱v 7nldW =Gޣf!>OtWY鱦 `)= "_vc\ǽSHE_a9i7骍%6 Xb\";7I{4fQ`)15b'SY#EB MN6㷍}de Å#9;?[ÀXdK+ P> NJ{Ca"&tnO)2/W,2k fBuGx-Y/,e =Pª`c.|AFi ͙PԀ zUOPgF!9l Tc8 q,+}'V]0tRiY|ъ\Pucd~Tp㩸3Ahڸ-X0"lr.a:-l) /D$a"/!)2Rujhֹ !]߈JIrpVêzU^8P'lΠ洴 ZHAѪN a>p{p,xUm1pm&rKh#DM ; $c^۔ WHX|0PhU?JIv\oiتg'g#tZ"7 ]#͞?6*B+!ꤻBƁNm6 #vp yMg+)O ubK/2>C  0G3n5K|̡;:u&#lFY- 3>U .e|n_xRjnh}_v'}]M.\u3awTΉ8ᤳ+_h)V< Jͺ< vGhU~LtWw#3AW&OQ(iKL_j؏i}´ŅUsRg#FY彣bMnʝi;…Fe*kb o6Ygw%k.J.uR`6šY{|t(O7 7"eV 񩼊,יxNJh: ϋO}{%fiN8bQ4fzw@i^K+ux\1p뫘sn=8|b>Wi3H m~0 iö^2 |6]$ߧwEp00Ǖ22rX_2}1L8x~]Z_1jj"mF k=[v\p:p^zEN>:@`KaesI}e~̮iM\]zx>FzqAox VC6[us*Pm'%HHt+R %F1\ k9c.V,?ގ q9gJ`:yUX~mY^W|NkTV>}ycزuk@!,-)kLMEƌ U8jrjtP}^CsƚjvE핕@d>LӼm!8y'Z[kqaL, #j 1W[h !5ˉM2?҂r![⠧ƻ 9o G abɬ1p!)]24^?Vs{ kNͪU'LQ{WQBy-/n aWkǾ..q{Ƨ9[-a|2V2+$wez//lLVZIq`Nv 9P !D!D}zj4dpMBsx5=ziF[!Vu3GsLԡ2p'9F1I🩻19湸$yҏ|Y/-#C6HEf/.He b0lg_>O4REJ$p)m9|[xE%{]#nfcjaWUi:aOd%劣v9$9Ǟ:"z9%)˳3YJEZ,hW4e-Ɔ3 /c>$\鯛lF+kX+Ko|øhI~R}o87hZ)6?N89Mb^!SҫuNoYY<ZJXdx\dhj n3CVdȨBWGҝn)35%ǣ"EY.|qm8/0a1|J<]am'M/ȉ b hCIaGDNAK違G&m686\9FFqqY&+74q%q5h%kylFd#FW$_ 6\ACws;gܨHVci{I޼zOAb1qR`^ɿAbB(LA7y80Xezzo({it+>s$OU`J%jGi*K~7ܠMZG03KMOc+#T!d dv7fٖVԥ2vۭHtW_46ļ39f>N";qb;'yKOy6L夫E:'jćPhEjm?|Nu3ӥlK_?pE7:co<71rHW$( 6h;BV/']ɪ@0X lAH "gg^^MAn.M*㴳#"QRK~W_Fi8"ǂf졯 kgH$uб` W>*ݿj b?f9LӍ.eC$J?adtO8>醴e\VH]Iۄz!EflxB!P`o` ^+w3߮uLAK}%{ 5ZfV˨\k2?$Kg!fw|Pg鹂J}`{\}ӥV10 edbW$GĮ̂.|а% N^ʷ]9~I)rH\OV2v[$tÇx%6r"E/EoS̓a=iUc٭L֬@DvfOt(:$(aO셋lXo 5>YqaPKH#e A"ªo57*d:,8Ac7^|mDZ> ;aݱx`mnatϸ ]_奆:Xr?r-DB6R=JGIXdlVv0W^`/(=PХk~kPᐈϸvi8ZuJ#9jϤ5d;NvdUbn%p 걓%?9ʗlʀ|PevLC bDAb•C/=e_.o5Zl=ֵ9O{S4/"M$BPQO\}ic!i<։vhՆ ΌS0q'Gqp(ȁ|-g"[TνUK ̀av^* C]\5&{{%OE5`-Se٫wÇZ{@1M ÅvjNjѤ3lyFRޢe|w0k5%ɺ ?IdI!HB>*`0ΐի֒7W\la?FPD`*c1YԴqwm r?A&lĸPQwk{sEz# - m&TC'A6=sxS)&nô뵢OR|TAc3CRL"qEUiRM4.teZ݌n$ ,M Ofۙ8BaI[6:)tZ'KP^F 6[AirSzUG!9Gk}Ќq|bӂFץq_q./8wVq! gT3_i80?+7iNg6NCfk{RFJSrŧ{_tAي:eM?'z im~X`Z/&dD[s~f9~TIltf:`ق` X.S:}ɘr7ڏG,VD :Ȉk9|)"d:MT#qn%C s$3P;\d\Ѣ^{ԉh;dA[ٴ!Izggp8cҰ)RE$/p8>z5oK!EglK"u|0Na0`yjt~ 2mg><68L+`ZUB0^T瘢rJve*4덟󔫂3X&~\e"bgP܅>G)a`pN ?K%UYO8>~!*e\,lR_CQ18M  X\RY)*UJ)jE; h2ʗ# Hkp^:MtkcHl#&4aqÊ"C# .+;0Z( H4)3ã{UM+( :[fƒITOhl5|>:\wB be}[\/ ;2KDZ1zKl VSg5rHݟ4LJ<Lt"$,ٗ}& l gm.zG"Q G Kz4!˅h]ŒqU3z-+3ףC|gsdl}~Res Dg6V1&KJ^90V̴ $"Cwx 3[:55%rQ`q4_.*4$ٺA1A*ꂉchvDwژ1~E^&A UeI+CVV1s3km8 -AO('>cYbےO];<?$v3mxwrB/K(zB8dIK~ҕ5c KXOqh9qb_~fjE]e }@$ 23 -L5c* GXxVy2pl٦{Y'zS$C3TEg8cҽDiKX4O%,:WfZ 2ћĘm^搄}* u%~0RvPM=A cZ[OŸ&}$\m#OF3,gД2b$"sYKM -Ё %,ѲⴭÝNy\AbԿ#|D yH+yMy{6q~Y}hbY9r' {QMI@mV* j1KjÄ] -We%uYc4Q{{kFQ*>w{"V'|!.xR!q~*G4ZX(|cAq.,Vfގf̗i&Ή]Wf]Yg|)0:[a~K-Yy8)^` aBJ׾hg B(T9,0.n_ڕTqt?2mk4ſAYqh6 zkҽoGyPI*Z!'Vc9KKҽm"ey(8<=MF~`pt *kx#li; `ͷT95)|}B_Pw-\;R4]w&2t_B4~Q <9}zdxf֪SMVM53_ nhߌ@-V(.*ZY_Ze}rebof*0T6HP-Rwȹvkջh|yPe!n2 |y㪠Hٖ95y`OK'EY!lq-r6@tNůai!ҡ Jup/ |mԩVz;Ϳh6g:&O Bh7^<+z-c:fĞc-~ `DIJtCrsKG:DvL@{㭡Ky݌P R u/x!@!Cd9x]~θ۳.7A Mw4q[;1 ҹ[Ü_i~/d q7'\ r,;z=y2R)EpvljMU^*KԷs &0U}qWl 77l\~ۤޖi( Q9ˬTsAcrձf\SJQ~'s_6*vTE?0l2rAPKvj\^NvZ)Eŧ9͜U-'Bp|@+BpKW?]XKgNIIp<fE`\݁߸;B/HAu]*J7ιT lEr@r)L,*z~6kd kWjZSBa&-bi"]'_KDUv8F]NU%h~}˻khkvQU Ըw6ҀM3Po_hn+dr%b,iȿ!^תT:6<2M_KF#6Vb̛x/U7CA4${A.RG5tQ= poid Ȝuq-AY|*DTe~L^ORn+͞*$ dKĽ`DG\{ꮳƃҤ WG&KN9m;)ǥ/BŴf*Aӧjm=@( pAx[u ]#bvѫE雇hN"SqLj:UHBggABga2/ZP)Ud^bzK.\&Ƚ٠~<4}`Sm GΠxbcmCv <0+)Knǫ+95ASxGV3 DK0z@7_L~yӲ\!I)gEB :wޮSsqO4ŞHڜ _ ߳] SMxImw| zNXx}"nG$,!W|6A>vO&'"模t$q _yF0'CRHTm7-_'ab^ׇ uv9r@hO.pDȎbU1 ,غS}Qa̯sA2@ɉP衵ٸ~ V~y_ՕkwszdT CAk#B?c# RK\]V=r3:)jDL|P6ч;v=*꼏/}h׈xjH^bIq]a=. ‘VLzSPOq$s[/G2 $VmadzD &CW 'Uſ69v$M_ K(y4Ap4lE$~*Ug7@,}MhXt]qZbh}68[&(^gVLLXOSk.Lby"! Urѷ!Jzq;Hzq2hm!e(oI=wyw7lpNws 79y0mݲ ;֒ 6+\tJKor壔~С1#QfA _IDB; c0?m* uw^}GLƯxA"*_tS0,Yh_sjPqqK&.$\{^>e5`<篖&.5հt /Rs*-@F5Ώ9. zPwo9lͭyC@7+m$ ́o2Ta4BUv=C46 wB8*ݸ+;22K. +qΖ2Y[ёĚaPQG^U䁾6KPe<l%dGS*sh/iAs6ڪ~(EeevcOo&0?\+C-g*xh;vP)ǧ>(h:;n в "㐸 /}թo9{NJm#m]Vi N޴i6QwSX2 PB"YWlH3fܠ y|ЖAM'kH/$By+(̀"Cpe{ad} PFg^ bŽ=?؏5hUR7٘NJ 9@Bqwwd5]UOzDe|q/PЛ . ̓˘Zn 레0%zlL kwB˟C^ */tړEx,bbbzLkԠS]@(a:KWa-ۇqV!fֹߪfj`8yG595P LfY=(>#/`! Mlh=*Ck3?K$XD!L=tTG[__g,C][w7/E/%ySq v|ZkB(ᝮLWƀzoK`)y@|/.tz)\.VCk$H%5AxMTaoGq޽[ˆ@& -=W6S DS DŽ .Wn  bZr=Q(0/}LRޝ;r,nz kG͵! iM(33eMuˡZ`B0Q]垳@=5{y<-/+cV/hה͑k,^1ISB-$ O8΍u2YV!&m 'bkb+{;pj.۸B 2āH 1F԰4/}+x6 uPqi4"},\1$e4ܧ 9UM2E`Z{Fx@Kۧȿ EGS@0))Fo 4 ѩɤulzk%BtiRm B1CX9CG^dLn D|܆ 4Moj2iAV\ø§UjU )H%w4]jĉ.iJ2(1Ha"by'Eº)@qh"{ÿj9D^5iwcyRnvȬqF a⚊Tn/B8eRMd>-TW<Ġz{k]b XzbDAoư >p+;L}+=a1SuH|b_nI\  +=v]"}Tq oKS Id(I] L+$r_]a1M>jfzgRR5jRUM *~/*b½n>]N>! u%U u@jIg@ RuuLA_,ؘx0a|F+a,qbHn(08ۍ]LG3&+@PrxcZԽLItJu[DSR6|7RiZ@>i1~3x49KOzo=P=oHvb: i\p1΅1ˆ9.N`/S24vCxKG:BYjPJ:(w˪E0fyb6z:\A)Zi@#ܦY$A3^]K.&\,O 6ퟙ0Sbo1K?=}0:Ue>εOᅰQAlJ#D88"8 i=U~M.GǕHkLP1| Mld& z'q3c{8_L~KFyc+7̬S!PaH:v!5gx|o,}4MLmRB y )˾#+HI]v{=ڊaQ^ְ ߋF*V肬YGkq]D8 st&cY[\Q"cuuNPC@V0éDCp\غC*g^jZ5yP {rSJ'ɚp BT5.c-瀺QeήCvbf*kӘt9e&[8j.ER=[ݚyy.FSoif~Nx4\4LyfKzXw-;!O蹜yш B6)h ˼DerNQ8sbHeX ]qC|q1U>v+ϓו.jp_G﹍\pB^w6?U~KBl[ .t[C@'&eǩX%ՍQ~{)){R}g r6 SB)K0 M1+'XZn36:RhK=-fG;)_`BzrZqhQ'4 RTEd::6ZR7EE>օA1<ʝlLI '4@Х.{-V a_O \ "~H97gw8@tXe`%S xӆf:@BsL1ݍ(+ink^czs;YG7%ᵌ9&?]z8!gN -~h,eu:HYhEkG؏;K%Ѣvitf ɮC:?森 C'RR펇h $J&]OJ[ZٗșJkob?Sݕw ?;*Qy0q —q? 9ߘW'ϥMw/FD0uڼzz6LKpK^ $0dOBmSoyJmRHh8gƌ #{SQ,\NNRGu$_S( t3=2HyS]_SF;xNY"rF&0X90[G`-.Ezҏ[|-b:-0. `bf@H}:'INX&M7 ^UT:DEj{9t0t2_qr& /+ 54Zd(!zr?hNHğH`= v "D/6EsXk23j0E6*+p@Z% ^S-R`*p:)*N:~[wa5;fy dh2vVê(OHfΚ{.  *YPrd'L0FSJ%udx6qW z¤ xݗ)ϐ ι$>~}dI6q@J ia53_?w6?''y8vƀ)o4혲@* +DScAm>Δb }g6"I\^K$rE}ܝ@4Vm^r<. _&/}2y}o't{axf -e 6e_&)*60_VQn=b2&_ ?lrY eJ7O;RGlqNrl̓HDb2]RMiɮ=n/7Y+BTt.;h̐C>jvt$.ီB6:I{>Ӽ|F;) L@KQ^wG!MvCpJ=+ r s/wb2cx GmqhSEIEX}?wW!T4/=jՔDI^,!b[ᾆ¹dL|[k 'HI7߂8D ,3B\ h ;#=T*exlh%^ΧCZ o|YX}VHF?"3eP$B16z識gcH-Oj2zaM"4p&>b .^4^|wS|H 7ՑZx\bA?ˊ'ALddX:6DZ`wo}o *ٹV#pH\$:d96]vAyPwbñq91ndư iU.[ũYҷ!jJƭ ?-Z^@{ uܨP*f3#| 7aM ܟr(PiPѕ qZho.hAy#T~'yjĜD#ː3~ U* ;͏j$.1Kv'H8hbz 7wf}~u&vŲj?_Đ U4g dr߶5RTSMΞ(,3:T>x )qM9jKudO :EoٴmE]T[+Ncő7?p!nk6f%bza*Wլ }\06qQ1f `3^vArf1+#?.CjT2O c+P=R??OҩM`4:56X\g 3. ^>ab)}>Ҕ9wJZa- fjx2\^_ }rƱm{ݬ0>n5״e(pǛf:\JVٻ Szeꧽ!iҪ'DddqMD&Mͨ VnD㸒Q*"/ "K`SbӷI.=.ͺʊ|T[J}Di8^*xO:_pr~y3Lۡuwwʑ0 Zb1YK{riM'38E4̢0gzQc?C\22q} Yeޭ0|4 a%A~~|JlHťOQu4WfJ5Iw$ph"kU*;#\%/tK.:cJd5]"/أiY#Dh+ ")YB#WD_Gܒ+8˽5w]L(芾= eHId>  Q&7cn[):G|ފb=28 }J^FS_B)BnNZYwډXH5U'`aG629T|^9Ci,G:-82,3}"kWYʉѿbvWH,&fݛΡH( U'^,M?+saUx3* (b6D] k(67[Ǿ qx ;T׸rGj(<Ys-i,A}p;7-5P< &5~^^[b9 a^zeEy㪪X翁2M9 wdЋA:EM7y,mtMP$oVmB:gLZlˡ=bBOrq1K>6mlFMa h {sW թx(^;+;=6j%rX4IDLL+iEP< h)ѻeO{{@[e^RL^ `9`g\Xl^VZHRpeDF6}c ^kkeQ;L;L㧆9κԩrMO6T#Hw4L ¿hִ{uM qwUD,`0cR1yuV H#5'[ɨJ!MvSɈi^$G;΄AFqx~!_uT*Tl2#o[$+21^u0uy>'yHKkg?Dэ Ԕ,ץSYk|~eG>ǁ鋼њ'z[f,q9Ct̝!r'd9"gD?,Hajg3Y4t  {p ;s-lZ c~ռKF6T1}UA#$`}j1A911B1DKf\>ƾɲY|bKCeu]/bSHS~x5qևNy \g6 )mk}6D ސ ay^îvVpmr2AY.$3qgJWEқMt@,ʯŞy=+JS[ܚJ7RJM+2_/-Bhm5RO2,nq1C ]_H8h#ZOijkkl<'SIfY\(/]C~RlJ27QFz K{S%J5WC'^ Ri~j7u*`N*vx2,ɧc_x S?p2y%)ȃ\PeI<%(6:!l:GZ +ßj>prGy@}.MSu^1;<,SQ~LGO@1بӊv0ۃjb!*TqIg2N,No Ֆ=^a: 4Jݟ[q;"UwĘIv]en}"@{Ai+szלEڄx-:#,LIϻ4t.-$ |,_ZN+; Y)5#]%4!UIZyqR/: hlt(N&']l~ueWJp[lR/j28'xLe.6\FENk^69 {ޢ>B?e@, Ɛy~yo7KzơP@y%NMN3lڦuMAT ~Y%PQ`)6 Hs&HGwY$3WITsQteA5!GHctARHo6n10WY=p -(kD37)3u \,aHP@Oo^2ИQ=cqn, H}#TS=7@,6yn"_`ݸ3#$,ⴠ+aRmes0Tļ,q(%Un|lxGװu +u|wjm&! ?)|_ұsQ"eظ %,>\d[%* =zMeVoFo5աb(x fmpd?e /O}G(VQC&?\nh_/TA""F,Pg[. :ϯy]d#? p@tI4o_A A@T+onhy(n48 :F`Ip_Ar!1؅=5agiq}I͎gC3%U~i-آ8ca"1pDmcd*x}t?:vL Z^=Mۻ]%'LECJ=s<>95c9}~|Ңth?qПŻ5>k*?ISѫ(C?~O +ns{$A߽eڍ|1aTfc`ZoԿx7U$ȟ4"Y-"`D\ЦK:p^dEaŠdߟ8 尓IF%1ip%´^`g(ƾYfI6oMMKԉM#oNWb(B"34[ :H/lvh>}Ab`dO@R~R+Yխhxo (R愕338. FmVݿ&}hlv]+B?X ',buxD]꤅9U eu딉1Q (tYm|uV#x*,'LIT~BԵrtҩXq@']߅KyR|4?2u=@Iۚ1ަg3|ٖ+Zz:(+ Ozǩ7|>kם$l'eg2eRvI4Dօ#-gLP oV7Ӛ )\r y^1%JjyL䖪 X8h:)ik(sHW0d;*fJ0I}PmYķseQ M: 9p:~sz&^HN9xȰt?[**3l2 =Dg+۸\V PxȵoY.0P .E#ǣZ(\DtQ5"?+3-~|s*^ I,c{#(,XzOM*tM?9X3`o.-@%SA:אO)\?^ 7Ka+`a)(qN`Masj{6}jY,75!'1;q#uQ}rJEf!LHA~)kBt#Bcs}! Dl1 ˵Y3>X _ڱwc`cL6E|J ,=3 À"҉ }3Ɛq`Ir?y-xqϣ0r ˬP]tUNx$ ܂\ͻ[,+&f=%cs]nqn3R] tuƠLTXK& ^Qs\(G[H{D0]HFG ?SbZy1l~97+;o|j+Xm P1;Mc\=noRŰ)fTJM)GE2hܝg++u 92RBo"R+%tH(&=|;wk\ |.8X$; */:pk*~ ,4MTLZ/ 7zj  @ҼjQ!W-M&0#nѢijp]OmȚ%wR8(9c9oex洕jļWAyƄ>fg+.ܩ >Zޅb֠K LE'֭Z2.vq#6+8e)[Cد~c@؛l2yYW07ioKC`D>1sHGNS3L+W+x(8A _2q>X&jC*/6S]q[SK? 靤HK E>mվCx f2:lj>E []DB7)fgSB)bh`VX_2vV_OAlU[F%ci޺|SMpy vYB;joc 4nskyJ4C S;{Ӽl6kf L2 ș"E4R4:L^J=" :bG{=ϰ~xع)ˎ{96;}SX,t<>#^Ph*;; ֶ7y}Y !P=?Y;!w= .:Kڰ5\V,M#!@~p* *A#NBZ*BNuJ6$xo6L"r9h9fkKک0.d)+s]9{@Py+T5LѤ0BVۨsS3SM$lCۖwAŝ'T/A1VH$Sg 7Ov 2Z_'*&cחl]dRcb6l0sty&OYG(!(x)\1cun`d:c"'TwxZeZW}l}+,6ɤ4^B x=)$LVHx:]CwK0Ghôf}'bhC&yzQAr6XqOe?cҪ kGjh#l`̴sxȬ+۔ o,p)+sj:P# RfOx9h??D8BxAjXKIlaF!įJ92IJ^iE֧ n2"Zy!N9R*OTűqRPb$ ,#Nq9:ޟ]l{lԄr4ML_;X:f]89$λUfU-iAl0ga$ Gq Tw;032wLgT-"[|b9{iK, v {MP$otJTNW7\K 7K!rymX_' 4۴2,Րz1v&YouzoZԦ@.-N4Ɲ2xwam\ٜ͘f]i @!ɼpNW%t4ނΏR8@xcoȧ*vݥW>6O߭ĺH?\H k[tߔK2W~b` irb7O7ia-l\v?9Tʘu}F[+Fb8Ep=XHF2AIe{L#WL\w3Vp/݇<|5*S7! !ꛐ~v2X ǚvHC|_ZWm5kՄDr@St 3 2p/l~>נ APg#ݻ\ 'RYy5r#Iց'vr_\bb0ubi{Dˌsޗ4L_A)|y [40vCF,EE Daxp/(W;YL#1[lJ?!{jP֮$  vtg:!I2OkT)keKf!G|!F Ry u/HZ9JT-#EGgFm4V||Sn'qإf?q N{+s8Ңrk&51q G78{/GwVXq>lk zWD<[LEheOg Tk8EϥK39Xymluhe k2ҹP KZ[ W݇A`Z%a^S3dnP=xF5Kd ڈb9('ٌ{C[,[Zp+d2|`w9BuPSGˏ/qJ٤BRNĪEBUX< 0Z)#OݓUYn Щl)]VyT)[~^ս,ȋa>F\5C]u"TL]M&Eb$?;=c*e O`\dh7k<*g*<4F#7GJOPB17[fULV' Z:9ޭeܦ'v} 3?]ݑ~_-#B qF}oMb{^z@Cd~;#߫6ȵ9G; j1d4b(^n:Ua% a"!.lȒ\{.XjۜFm켉OwjA+=^qrۢfO6y y=FDeǕ&:G)Y NHkN}z8ej$L2h7y 훗٘mPIM90B/~ش.ɡfh֦͑}p ޿6<+-歴!t[0 LX8X Uq|CE9}maܡ#ǘQ6L4\쓠N{ ˰Φ"tuo) D$EnL ѨkKC%=7SL Xx^ͭ#d3Il@&q!^Cνlx# ztN.LЪO8Y‘ iMlnyP#g~!R[%ȠK13' "7=vt ~3*o!z~*X-iMvb ˱oG&Ez٩UV$Q+)M"/}e$ ^bmYIW`h< *2c-߈tO28|6`=3^;57+ikJ?!s;\T=n?-jb(<@rşB8*)X*# vqg_(CJR;HT:CaW)o2]k{1~sՋ{eye* ҆@ y4ctF'ɇ M9Vrc)OYĢi#g8l|$lԟg($ke3p3&lOޘy5U(Tw+?BĘ,\DsE[t0"Pz"O=PH㟶47Vô{CEL&x^eAgbSZLKR>#qgF8\s_cڔ$N l#Ypa|vr ͸*O p־(({{(? -5Et-qb9;1ײJZxb~Z#ʫRzLm\f(7w3E?K3G*eܒD jwq,vGi[=x}@H@x-lkS\~;?B2@^,=xIOIjTf<8L59\j7#n#8quԸQCU 8+Xڂ[&uPJ iB8T.)ҍNzH(ݞSfՋq55!B1I`. kf='ľrkt>C=USMVA/KXv,6cDLuBGl϶]gxQp9%7: VcƀtL`x\#//U,Z /Ea8X_!C!^PFH{V_oz< %QS (J֪^iB%Ew6+>ul >Ow@ePd H2/$ w_A9uYc7.< B5e;KR?,ZRsoi°[}?J〥 Q*=w-xzxxox"Y`TO8e׺yç;jtHW]lLiϚ"V]V͉*g!%>2$Nq( tsUɚoAd+wi0M]D>}[W-/KqIJޛ0a^,ڂ3=LBz\7㘞8vap xwΨQ{~;5Fr7.e72}vcrV]C"}m(]"r (^x؀&S~ &>v E1G)u9A\ː}S< 8'V!//0~أxץnjDWGӬ L$d><_?=r[IywZ^o qqhJE˰i.-&,qbtB+m htݣXܛ ׭:UܸiaA9{8{ zXev%|,Z~񱢒FZ_a2oȮo7e?IWDڴY<EHkr9@v7@Js݈ΫmJ+w3]{/]Un~w5MIitփK"jo=L@ȞORt+"X F ߨI_Xsn⌉g?TN-K\Rk=!.!b`F05wGtpu!yM%reZX_})%kpꐽPGBP>::`]9xK$LUwo5©ZG5ƛ7;-v7szUCsނ N؉:ɥ:7N/@?";iTdKe<OD!v砮\rġ0+FsPm1 ; 9-=ȴئ^#:X&WmL_ĢIqooE`I\-" >#("¯ȎC̖>kόztb~z`0 ɻY[}N&$uƓީڒkaT%D3K2('=[ϬV|u{swU #}MX#W?Ky L73@=g(ΐ1bG/򴐙 :q {y ~yԏ*;qrJSiqXu:‡E8|`2A.,GQ)PFQtsVW){D"dfH=-=!ԅ+`WPb#S*NoKA ٪`lgjQ{ʵ@sJ=ӓ7߂9  ˝=cy $!L5Z5=eD*#4tG̻eTPEƀ(1*}=?_i06qpvضOSdMNݬ0oe뗌+ i }+×fPϚx?-{Ί4T<&֯# jmY]ƣi3=In4 /v`7x i6*[rrqh`L=HuSi V05Ύ>]p=Brg\hw}>;Z`84Rpx47dfEṭV?B0v}* i@,)SYW^hAGv|)% hQmzR ,דcaI$ؑpH΁7Zq%o:Xmq޳XBs3]n^ٻ, Wd_'Nqrh!D,3[c3lWd4 ^]%DͲh2*Hc_Vp5 Wp3ɉɁҊ(߹ˍ.-ʲ4e s2uǯ3ϵc`3'/.5̿|mi#6кR$1ۣuLnLc]6 l8Z=JI1tC}A@"X 4}m2DhbD̿ ]c^Etf|3LuB/+Mws&=?r(_k.Ępb uf:ke `w $ԼDQ#ij" W|2'vl(HhA.O7iN-6b(bL@R&nݺt ``|P7NIT) pDGRpNO5sg,؃ZC̎6lku.cF|\p_7PiRD(,9*W]-ؐPH {ތ޳m y0I[nR-'mE WEm -dW^_\8%OnX~(CU7r3|-NJs4C SIbBUS&+ȸx?dHb-<9TbpBIjeèx$y@ c5X&V0W y+,g>=/2\kKȉj"~GsB GZltyPalM-Ag7 gWMfc5<‚+> ;&RYwJ$ڝJ8j5Q1+ dfs0 ˾,E1P\8Dw fil<-#.[%إdtZI%c/ʏmg*7)y׀\494WSŌ:)]d4 v"|3>Jfe{\"݌oWVꡞÐ5A>a^_H"/: `obQ3W[7}?'<&Sa 'g@P  UCzq[i|@f xhD:R!lt-bnbeV=E.'r>~N ĕxU>Okj\ƍOŨo&gAbHHRe4(X&^ +]n=;3u;:oŪF-2U9h!N] ]V4ɐ},TRILVmS* ̚eQJ{ : /:Llʻ@# ݧMӏS0(&2] )}5[Z/m@2J+rgxc27tj"Z#ύq yE\sP>6=މ*(;qHyaI~XM+ >y4_Ձ]L>Y EPy'D|qX]9dDR-2$`.PZav;-s*bl 9opП< m/b#:/}=:5M$3 T0Ϯ{G?d |ߠ8x,} keLWs@C+T Q 7M'{dCu (NQE{bqZ=5U_`HHdnW 1 Lx\t#И r=q<2D9RDN8=â7-JT$Qӎl( BFQd S觗6/G=oEd"c51(a\=wBJK`NY&;a4HCU+5 ))Q91R'R;al"jL84t g<P7WE0LN䈲c%٦:k d)L3av0ፈI C^q~"D֖ ~Q(%]7Jja߫b}gt2m&eTl< 1l w걶d]'~2y=gWMPw_>￾ZVjnϗ=-z<\W?5xEj6:haJφn1ȉDxw鹜pBB@Min|{nO{,[uAvDºhϪL?] %xPt6IӬmȫ{dM=Glp$8. iImjc!ϓjk)|k+ɷ-gVo h W8Εi6 Ŗ;4@+\>?aMfDqE3Әpu!{D>Lm2aY]ʢ̣̄lpn\\Z@}VH$ɭ/%[X6+cD{լט⥕1s+foWx|E(U%P ;E#AU ݳw!KdrzF[3kM$OٕL^>ž#R6a4`Ќ\'u3nĿhs(|!J|+WG].G䌲T=vSX_gs0a2 { ^8Erhq?䐍/\E3Є(_ T0;LHNZ&3 sTVJ6y>lʭ6;xkvUxȬL u>RSPg򮇾s{_Եl hΣ$PV {{}lY!jLba{_gj:|9`Ϡg}-@P엩"hqBs06}J<YBp#M+JDFOa@4jk:f~)/IJtphe,x{_J D-ňsT a-=Hi*!W3h!ՍA,f9q4rч*UR(GckA] =헖2w@ D1mo<_!:1дSR61ulP ^]J+w^%_S֤>PKh5K ߸$ u c X ڞg!"iBK%X:ea\>= P2aQQ)mU|F;涁3`dA'r<uܝЇω$/roSJR'.~"8Q*$b3(gu4T[ T:O?e⒘qzrG Tl )-giA)"ۏ3$+vb7(juCr TM3OcuˠJ*gN[_Ac%f,0GAgSYKS ȅ3@o"fLF8D%IobXg~ q'B@E^܉aq+25Dou M&Z R*(\Smef/aOȺcNt'0kNAaQgP}̶荅.Z{wU ˌ|?wH;h96K3jD <(;s zUM oP{ y,⨴Eh[w]pR+*mQV=ֱb*MJoe6 tǏX1  6¡_n"9fK UPJHNG9hRZڡGdeX-kb7 P`cP]z] s<ȁZ9Sr"cH2B:%{ש7o cJ]*=NhGmwAJ{aUW/K&)w(lu@H+#%LV&l9#(>W| ~ zy5ymr3a5u,PBz7ўNRbckqNz[h0rꂙe>%sI#P~D ]ȀS_,%JHQ"n6:ٳ^K~Hvt%t_Kn-j1| WnL,K4)<3M% nł}%PՂOVg['yRE".HW" ^ӇjrMT1OeT:ĬZ9MbnHr|I6ǀ~*Gjn̐Nx ;6ߟs=u\*-b1#\-)>ԐUuUf9:o_AxVӲpлLǻfDԣ瞓 I2$;H"ڽj_I.$_E$?Gppz<0o٦A21[I &hEqڦb3y€Nf "Yϻ Gm$o/k*Ef'=n#Vl/VAx , 4H.B m%<-<\7@[X Ė30oivT 7[P MѲx]4BC}Kd2QeېAnl}?ۙXu0OuVe7^"TsY$.ĶCuw`T`)R|Ysz=ϵar[a K(=d^ ?ep$2;`2PeO|.Z~0%U"@XkU1%1Sgk${ٻ5t4Ap3"qjcPIKIµثJN#/Ubeɾ?􎋎 ?\|{d{%u;D #fFG |A(oR@P^qWkd~^dƻò~I4q209热 aY#t}( .:v@eԼe pEmXCAhdAҬu*g̓|/кuƚu ڢW NH>V| n@ڀRڸ$zP|ZdNBd WM/>Ã*mݡf 1vTQ/ry٬ƅ=A՘ćSXAj(Ӱޏ+' ":XSGBu֦cz5~Ў 9S}ϕw7D{OnjRL+J~Qh;#I5&{VA 5S/n]1n)%ԙ6/z۷nCz\ƁvGA98g^@ s`H% C )1x]RH\e$ݦy '~וS,xְ\$h9Phˢ46a B1/3Nj^&d4һ(}~YXr^cF(W |5\BhRb5U b7x8$4nozR? tS4xqt>Ɍ sS i3xrМp fSTB s>H6z[pNRHܸ]V{mz萃ef;H F y`"G-Ȝ_+D0gR*R咵{0U@fb_,r0I^%hSOO^~s4<0y+oD`W.x;^5sٺz-wLc}oYRwt#UTҶ}Vmuq"R%Hj XE:2윯g9BptRMum {NځCbظwoikdA fe0ﳙG1j3.\gFYRHSQވ?dv3+EBG[vgF(AMfv 5"F͏IsSVXSRaFod-ndn޲x6TZ9۪uM&c4y]-Ohp< S"e鿬$ ibA 4c >1Nd|TB \:kͪԾxbď%1bE$!6\h$ހI'xNҙsU^T:`]>@` zfb=xx7R&j]fK4kk CIdٰ3X[k]-B>aaʝ%Q,/DzK!ߩQkIUHS$Q w b4@=Wbx%+eEVp%Ki?HwfF88`-`n'x ('i\~ȈN9,i @#k~~oNJ]47w@yz#l & ,pgCoPy wfNˆ cɖsn4ZhsEv~FxNzCݾ t"Hlh|GKD7׎֝Bs ɬ{<.I _]~{jA90(-42J~,mGzyJਥ#- uVm/|>dZ#b~?W]DB^"gVsi8TL̖~_n}ɝRpč?ڀ.Q]¾U_8}/uD/t ^?c=`d:Ux+wIh*vN՘{Yא W4 Ț?vXINL;*ef$ VC_xKbO^Ƅ{T++SU@QP(9J9n|?Β@p`nB)tW eH]FLC)*Fzl]G`KD=I2x'1 \$vC8oJi35лR,\ چоKp`Vd*@ bX\eyAŪ5>!?3 ]VB |i<Ӣ\!4͊LOFz(;7*ic2s;r]C˃\AYen/hgY9o}HDkg= fJ+dbFoCv#JԋګׄXcјOn:IPnCgxr0„d?>Dn/SA99'!;sAWG 5by]w,>Si |+`7QܣѴ|V:b>BELQp3&d RQ* HYi)/ꖻ)Eju܆VCVJY{^zx{cQUTS`f,cr[l/%&On巅s ֘&1"%#ڐCaj0,ZH]b"ᘎ,)MOzծ, Tq*؂@¢O;a) b6lXrPqC*N O_e[SY"`~[=Ja R)Vks,kV*ւ)8V,u(:zT= on($P6%Q.@^m4Mq)xq"e "A: Sp}D<'k*!BRӦm+ !綡4A%`dVb. ݗ =49xR|kʳ,_萆OM rdP\0` 7鄝t{Dy)u}XS Z%r6{R|;-mOt!$ "_+EShFܭwl8 q]5W1#?> '.[ܼY6Bx*Ok, r 췦/Vzl y5ݷ^ȱUM SNs3eM޶;с$349&TzH!J՜Seu룰7EvظHoXoUݪ"p6iFZRG+r:6샶a+Z23P7uj|ewnm,Mw1_wtKOa.W]o%^d<ޘnǝnG<‹ɞŐ_욢25 A>*ղkS.q1$NM)7`I~f;[3Ar_6,HrĻ0{?c^xp)H6Tт?έf:hdY`;;Y^CvμR6q*G1h '!D wbsOٙ`RpdG1r̡ȿRY*T__Kv5Tky>YW!#:2w ~-_fJ&Ș;]2s%|~=FNz̡<7w?!4Goү2CxeW"t%Y?B%w-yp@͖HG''ٱ(n, hٙAG{g%Di{}.+"yc-ۖmh'ͯ߫+jOLTNIϻއEQiCm'mۖ^|2偔}l_L+)+5K*N<h AID o^oሶk%C:]TdI/`Hawe=< {ӡ~MT/Pb'q÷‫ r5 -zZ?3o|j R>&oR໙ǿ/<[~!cT[X:,q [Fqf}2@.Vb٭X/^EE=Z0lQLU6ɨ٩f=Af}/62~s.AA:c EplQ { Lg<]ms Ʉ6q z>?yvhM흳i y6T88_ o$*Ժm|}5mS$N.Qr|F=ACثN'/ѐl<ĉYggjI%_k~yy a>/]$%]l {X-PFjU³z09I6opWNʑ<rqm=&ZwcA׬f ׬n70uŮ:"ZuGO,GvkPHzf)\EvkIC,ާfw ub_51ӊsWč"%PGxjMt N@DH: -1҆:=^xEre1l̥ I6['ѽ 64Wσ9LhQcU"mu]VP  ;?Q;Q1]eܥM"\n|[9:NY0ïy]%hgtvg"^{3) W}hqBM'I2˒¬1nx : zp0#>C,}Es 픖[Q $_Z<i68оӢĸz @aL PfxX`Q3^>(!i/~ܗm,wM|Icלүb7#╠сf) < \cvB/y҅M]8jzK)ZXZGH ]d N2Xs𱨢$d`& 9"ҀC6'eE{+Uӊ`i%+8.|)bI$&h> 4@bΧ:zjӼ=Ip6hm$ڍ|>AF)[Fڎi:p.G;Y_W!@FfN)wY4T]\[|㳌ebS=ήw6'<7{\}&W]QHk-"gOu5H]: r\8?Q]);S|_PkqG^C8 ot[o ^KȪܣ5qg>D]f# 2=[v 梲|q%2l g#O+RW l<.WHlz_/< k1F 2:XU1sp_{ juQ=һt 1~ 䄔t$ ^iwM#6}0-tecZ'GPX 2.ž?ަߩEK=} (GqsGDk˫mKHM𠯧*_WcˎuN [a3DߪJ]% UxJL[Ll̡eDX8lϭX!ki,@l0 Jr8ה Jg H^#󑺞|v,p6;={ شPiB`ˆ%Qg(#z,1ZϽu6N~ѣ M游"! +F~J8;9/3HeUT 6qRczضK1w1hdzxGTJFAa!8\}8l/fnc* K$\@r7?x#wD5?<Uev|@wn#llix FzAmVR9E:6M,R9nl1q0MpHEE㿍߾J_0X/3sH;EHÙˠZ ~A+\GF3Rp͇+5CQKA]^)@[W-X??jXf%Kf B`r9 쇁CU@QR)Gilhu~G ^oq"t [AJ*/hMP3?Q QB"{/"T G[ר)wxϨQ[uBnF9{-/lNu 5qmj௅dFf³yt@'rՕj${Ղg &p"UT₁iYdahW'mR9DIDI .i~ՠSA] g~/ܠ3fpY?ax[#}QKXjm%jB݂D-d͗,߮&ԢTY.@ JCX>(C74P6\t =S`h)# MW-HT+SDC$R[V JiEd9FuDCUiƟ ~^wRj'ʢ* J($AN&含՘V9ⲬY"yKp(˒ikN?ڴUQ؟Vu7FX?"esv>2sm-F#.d[)q/I Q;*Ɯ/#Koc)- y~wyx "LNItcw 7w9([/`#t?\PsTkQY"LTλm}65뵒e(=`?*H |FE[PZWOO-`ݬ.®ǽ,r|Y'6n(Q/12i6 !R/PM]vaY/7x'QLlErH }lö̼#ݖmb2erD~W{Dm}5Jp~xxlUQP6Cz E,l\c{^q7VTSHJgkUb}6[C.9 N=v k7B]17Bw,mRJC&FhuX;/6^qAG[9'Pk˥çLdl[DxpSݽ(.[1%wɢWWk5E~⠐*^Uf/<8KT:zBIeKOR$(/}/-FED1`/PpIFeMUn#0;&up\H,xr`oG]v;{"Wqpy}VƱU.GX89vhWwF w wjHݵY&7zq`HUsMF28FZ3K~ZA٭0W !m`h$T4W.!./Q?U /=bP~bKHʡurCU4&^y, "$vx*^?%-Pqm12JCSPdc my!3b}ZQbtI\mޥBˈ?\N&(q=$p#_(˅ѕ~*'uMدՐ%S61opMG /JmYCՀ+V*ɧd;Ľ._>KfBqxY (F|0.Ve%S61opMG ё`α'\YfQ^{ sS|11np#_(˅ѕ~*'uMدՐ%S61opMG ё`α'\YfRXvY[ڭR+t[ BS=)d ;*lߵ;Ľ._>KfBqxY (F|0.Ve%S61opMG ё`α'\YfRXvY[ڭR+t[ BS=)VX L[4o:rQkuנּ^Y8wOrnZ `lEMRK!nz>SbvY[ڭR+t[ B9O abВ7?ߌ;bW+hFr8Mr=GQ"<Oy.tqNSrݗfc $37NW]O$0l'`]Fч(LU#9GGE3YO:(xt2CҨUrǪ싮Ş@gVI.!tSr%:`O%~_lC+*)<*ڃ{[.⌞қ<7m5,ƽnK,Txˁ(k,>ISRedvԦ*) ~Ѝ/R "QT m]cPZz) g]eȒE-=0ԁ7 q_@|Ot0Xy9 ͦ5oЇ -`'<&Xiy>{S d_ $dE8*3II)m tK1dɁ_b`vtWo2-LHP ^-`Em%qFk?M^6-HNUf9Q/%/ FC_c`D^ohq5F_c>B!OH(0Oqր2gFf 60iY^U h`};k?;U+ZRzLSU8|WC.dM6} VQO@KrHAՇ1رyƍAoH괝ށߧ*4F]q$#X -qh6nLgA  P 'T[yc_gZj1ZD' hp@SZy#^dE̐jq摁N0#'C ӵk}߷giJ4 jk&AA8O n2%yt}}rٝ܃Yd5vw-21p5Մ NM1w,Î> 8Lzim3~P+HWWTR=2ڹv.2J5Y KH BqauG\Pn7Ggܸ ) Lr(&%]"i9LR^ٶ/99Hu>y5?r})y7T uٶr퀹+( UYbwz@0:UlœiXG^*ȎLe׬{oLE3xL>g5#{G.;E\$`H1ӡz!F9o^ CT,Oߗ!^.%rNOArf̝-9Epûo{=:Tz~Q0bx.a5%cr"Be$$ bhr4&m?P g56d'&-@lYFR$h t"VR(FD&W3-Y!N4~BCJh'a-% ѿ}T &r>5UibV>:g>]\zaߘQ5 t6oRM T3A^]ÔWyKWw{#/Z-)㕶v\- M̕ӼdUЌ8Riqe=VIot[6Qu9awb6-|Vgx` 4è/?<' D Z%qn5WCiZZ]:_zߵ3-|7ly)_^X U>a{~ ~SUMad :;$^ 72V\J-ɟ ^S3F9P\O$^ hCvaxÿjc'J;.9"6}S}ԵAE Bu#ʺșb/i}ϢM.Ä] 1^\u2lb.p8rQ9Ӧ@;3xʤXF{ hy rDĀd^cSsqߑQutEx"[1轱 ʵ=: YZ