selinux-policy-devel-3.13.1-192.el7_5.6> H HtxHF[u ?*}}?_YxhJ#D=SI{X+5qCC5cbc311f4fcad63f2e4fcf518619d77d5bb0ae5eLߌ R\G9݈F[u ?*}} .sR\2GtETz2?)o%S]9ƄhtwDl^>: t? dd * ?pt  XI|I !I +I @I MI II)II (  (68@Y9Y:!Y>xGIH II IX Y \ ,I] 5PI^ ~ b d @e Ef Hl Jt dIu Iv w Ix <I `Cselinux-policy-devel3.13.1192.el7_5.6SELinux policy develSELinux policy development and man page package[usl7-kojislave01.fnal.goviScientific LinuxScientific LinuxGPLv2+Scientific LinuxSystem Environment/Basehttp://oss.tresys.com/repos/refpolicy/linuxnoarchselinuxenabled && /usr/bin/sepolgen-ifgen 2>/dev/null exit 0p Q1m!,$#}"3,l2M*Y)H/*6#~! .' >"m2G)!n%ZJG'd([N5<(=%/;%-.2<.86+$E+B&26,"2=LJ/b=J/8V 3$27{)55@23'T&;bP+,-M-1,1,2}%@ ($P#!d?!38w44(,h9CO8B.)F4->(}=+0410z4:#=-_?vB-:;/o(]*c) )%$ (.&R$A 0Hn.p]9d)c?$4:G-+*#)p6`3x6/N436!/;5m4A;16-cc0BE*/'n4:>" Q:5dk*26E?$3105-LGr#-v<}46f<5+G05/4J4"3k>4&P"?R7Q#E/T5'U3!5=2!,v%<5;5MK4*G+;",{'/\6Z5*Q357Bf8R4$2҆%$ ,':O&,%$`7v+Z)5,@w:AiG&5q+0B!x3(.43O8=5-% 46a43*0Q%3-X2s6?y,&*fB$/-,h3=u558+5-/F!t<*J#9DN)LE3)6.W/I=6?(3$O//.(i,L7-%/-78=:&5'9 /c*'MA!-%(0-?<5>+ ^,_-HG8R3v6gFA)gHP.1{%o O1d%%-Y)-K!'#o"U,`2)(E1)l@X0775)7; 17A.;1{5&'\"?2,-934R*-t%w*8S 2+O/?:02w08#([/w/202O///0Qr;G+3*:x0+3s,.413/59X8Bcu$Al%Bi'!O#5($E'8'2**$4(3(*,'])$0-2qQ<H48&E .,.\3U3'4|7i:4K0v,+>06_ 5Q'24!-'G"'4-R04@ 4Fz4/2**9C,602r0AR(,.>K25M+Jb,.4:F-e>u%E#<0=)&%`51-|&/o&1V1!1(91(:0%*,U<6--)</KG$-.-&/D<.,%j&+--(9//+#.6< DM1bJ(A&u'55<[5Y6605&5QX&&;2 J(%/<M1 ZW0].''($#C$-A$47Zf&R" F!A.,),@/7/'A Q'"$#W$-.H3*51E-W+2`-f1t,/,t>234r-04|,6-06=#'4<5p+38D+++,)*<D/~;163 ->Q=)@4>.{.,7"$/<&1I')x'Q() *w''*$#/$AA*"& > -#9/[33"8"r!gL-2'pEL1b5v&9+EA<&]7.v&I,M2OV<~AY#2G5(g5r,2-F1m]'(D/G/.,5E3+433.7363?LW$#9?t d| @ 0U oV 2 H:3 v* ']  O<&K fD M1  x h  Kk  6h|-! Y.N~Pr& -U*pR5a }# @ C!6q ; V*c[ . sGN  l /e*1.; p )  B*p6k N+F4 "jaco d  bN ;+ (t  + ;Q$jY)M N19(f x'" c   ;Y  Y =/+.B#  P' g[= T"\+Z f^\gj  *P  8 !(D+ n Q8&xF ` 3 auV;F C[ $ 8-  1 Q "r PQ: %K EX$& `  *L1 # 8 , EcIn8W " a #e-'<Zĭy;V NMDeYWBbY$5u-\ ҦI 1] Vi-q)II =s + h*/|FjUD'"3^S+ Fq5vA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤[uK[uF[uF[uF[uF[uK[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[uH[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[uI[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[uI[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[uK[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[uI[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[uI[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u [u [u [u [u [u [u [u [u [u [u [u [u [u [u [u [u [u [u [u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u+[u+[u,[u,[u,[u,[u-[u-[u-[u-[u-[u.[u.[u.[u.[u.[u/[u/[u/[u/[u/[u0[u0[u0[u0[u0[u0[u1[u1[u1[u1[u1[u2[u2[u2[u2[u2[u3[u3[u3[u [u [u [u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[uI[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[u[uJ[u[u[u[u[u[u[u [u [u [u [uK[u![u![u![u![u![u"[u"[u"[u"[u"[u#[u#[uJ[u#[u#[u$[u$[u$[u$[u$[u%[u%[u%[u%[u%[u&[u&[u&[u&[u&[u'[u'[u'[u'[u([u([u([u([u)[u)[u)[u8[u8[u9[u9[u9[u9[u9[u:[u:[u:[u:[u:[u;[u;[u;[u;[u;[u<[u<[u<[u<[u<[u=[u=[u=[u3[u3[u4[u4[uJ[u4[u4[u4[u5[u5[u5[u5[u5[u5[u6[u6[uJ[u6[u6[u6[u6[u7[u7[u7[u7[u7[u8[u8[u8[u8[u?[u?[u@[u@[u@[u@[u@[u@[uA[uA[uA[uA[uA[uB[uB[uB[uB[uB[uC[uC[uC[u=[u=[u=[u>[uK[u>[u>[u>[u>[u?[u?[u?[uD[uD[uD[uE[uE[uE[uK[uE[uE[uE[uC[uC[uD[uD[uF[uF[uF[uF[uF[uG[uG[uG[uG[uG[uH[uH[uH[uH[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uQ[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uQ[uQ[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[uF[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@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.13.1-192.el7_5.6.src.rpmselinux-policy-devel       /bin/sh/usr/bin/makecheckpolicym4policycoreutils-develrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)selinux-policyrpmlib(PayloadIsXz)2.52.5-183.0.4-14.6.0-14.0.4-14.0-13.13.1-192.el7_5.65.2-14.11.3[`O@[6@[@ZZZI@ZH@Z@ZZz@Zz@ZyZ_:ZWQZV@Z.s@Z)-@Z%8ZZ @ZZNZNYYA@YYW@YW@YYY@Y@Ycl@YP@YJ_YI@YBvY9<@Y6@Y5GY1S@Y0Y.@Y-^Y, @Y, @Y%uYYY@Y@Y@Y.YXQ@XXX@X@X@XXX@XۡXP@XXg@Xg@X~@X@XƉXCXCXX @XXXBXXXs{@XY@XWXRXRXOXJXAb@X@X)@X#X!@XWWSW_@W_@Wv@W;W@WίWW:WQW@WW@W@WW~W@WW~D@W{@Ws@WrfWj}WbW^@WYZ@WYZ@WUeWM|WBW9@W9@W1@W(W V@V@V@V޾V2V@V_VVCV@VZV @VqV }@V }@VBUUU@U@UpUUUUoUoU5@UUȒ@UĝUUWUU@UUK@UUU'Ua@U~@UzUv@UT@U@Tr@T@T@T7TTTC@T@TTT}Tto@TsTk4T`T[bTWn@T?@T>aT6xT6xT@S@SSDSg}@SB@S>S;S:@S9XS5d@S4S2@S0@S,)S*@S)S)S&S&S"@S!S L@SSS@SSc@SSnS @S SK@RRR@RRJ@Ra@RRR&R&RRR=RʚRR@R@R@Rv@Rv@R@RR@R R@R@R|@Rz/@Rz/@RsRpRnQRi RfhR_@R_@R[R[RSRNRNRL RIgRB@RB@R:@R1R-@R-@R(r@R' R%@R7RRNRR@Q@QQdQQ@QQޞ@Q@QکQکQ@QzQQ4Q@@Q@QKQQ@Q@Q@Q@QQ@QQQQ@Q@QQQ@Qzl@Qw@QvwQo@Qo@QnQm=@QkQfQb@Q`@Q^QZ@QQQIQGQ@j@Q9Q8@Q4Q0@Q-@Q& @Q$QQ@QQ@Q @Qh@QsPP@P@PP@P[PP!@P8@PO@P @Pf@PPqP @PP7@P@PPPYP@P@PPPM@PPd@P@PoP{@P{@P@PP5@P@P~P}L@Px@PvPvPuc@Puc@Pr@Pmz@Pmz@Pmz@Pj@Pd?Pd?Pb@PaPaP[@PXb@PWPS@PQPO'PM@PIP@@P>@P8@P7lP2&P2&P,P,P*=P(@P#@P#@P!@P!@P@PkPw@Pw@PP

@NNU@NNl@N@N@NåN@NNNN@NNN@N@NGNGNGN@N@NNS@NS@N^N^N @N @NNj@Nj@NN$@NN@N/N@N@NFNFN@NNN@N@N@N]Ni@Ni@Ni@N|tNyNx@Ns:@NoENoENiNf @N^"@N\N[@NTNS@NS@NC@NBrN:N98@N7N6@N2N.@N*N)f@N(N%qN$ @N@N7@N e@NpNpM@M@Md@Md@MM{@M@M۝M@M@M‘@M@M@M@My@My@M3@M@M@MMM@MMMMTMx@Mx@Mv@MlMbSM[@MRMQ0@MQ0@MJMGMGMA^@M>@M9u@M6@M5M4/@M4/@M0:M,F@M$]@M@M9MMMMM\@M M M@L!L!L@LL@L@L@LOLOL[@L@L@Lr@L L,@L,@Lډ@L7LLLNL@LΫLeL|L@LB@LB@LB@L@LMLL@LdLL{L*@L@L5LLA@LLLL@LcL@L@L@LzL)@L|L|L|L{@LvW@LvW@Ls@Ls@LrbLrbLmLk@LjyLe3Lc@La?@LZLYV@LXLN@LN@LMxLMxLI@LH2LF@LEL=L=L=L;L7@L LT@L@LL@L@L0LLGL@K^K^KKKj@K$@KKK@K@KK@K]K޺K@KtK#@KKՀ@K:@KK͗@KŮ@K\K\K @KKKKK9@KK@KK@K@KKKKrKK~@K,K,K,K@KK8@KKK@KK@KqKqK}+K{@K{@KuBKs@KqN@KjKie@Kf@Ka|@K`*K]KXAKTM@KPXKEKEKEKD{@KC)KA@K;@K2@K0K/c@K+nK*@K(K"4@KK>K>K>JJęJH@JH@JJJ_@J@JjJjJ@Jv@Jv@Jv@Jv@J$J@JJ0@J@J@JG@JG@J@JJ@J@J@JJJ#J@JJJ@J:J@JJQJ@J J J|@JzJyt@Jyt@Jx"JrJrJq@Jn@Jn@JmJhPJeJ\s@JW-@JT@JS8JKOJI@JCfJCfJB@J@J@J?r@J<@J;}J:,@J7@J67J2C@J0J/@J,@J%@JJB@JJMJ J dJ@J@JJ@J*@J*@II@IIA@IIII@I@IIIX@IX@IX@II@I@IcIIo@Io@IzI)@I@IܑI@@II@I@I@IԨIд@I̿In@I3I3I@II@I@IV@IIaIIm@I@I'@II2III@IIIIIIII@III@I1I@III~@I}Iy@Ix_Iw@IuItk@Itk@Io%@Ik0IeIcGIa@I`IVIO@IJ;@IHIAI>]I= @I7@I6tI3I-I@III9@I9@II IP@I@IIg@Ig@HHH@HrH~@H,H@HCHHH @H @Hf@Hf@H@H+H@H׈H׈H7@HBH@HǶH@HH|@HHH@H{@H)HHL@H@H@H@HnH}H|@Ht@HsVHr@Hl@HkmHgy@HcH`H_@H^>HRa@HQHQHO@HFHFH$@DX@DU@DN@DN@DLDH@DGwDGwDDD@@D?D?D;@D;@D:HD:HD2_D1@D1@D-D+@D+@D'D!<@D!<@D!<@DDD@D@D@DDDDDD@D@D@D@D uD $@D D @D @DDDFC@C@C@C@CCCCCR@CCCCC@Ci@CC@C@CtC@C@CC:@CECCC @C @CعCعCعCعCC@C-C-C-C@C@CCǖ@C@CáCáCP@CP@C[C @C @CCg@Cg@CCC!@C~@C,C@CCCCC@CC@C@C@CZCZC @C @CCCf@Cf@Cf@CC@CqCqC @C @C @CCC}@C7@C7@C7@CBCBCYC@C@CC}@CqCqLukas Vrabec - 3.13.1-192.6Lukas Vrabec - 3.13.1-192.5Lukas Vrabec - 3.13.1-192.4Lukas Vrabec - 3.13.1-192.3Lukas Vrabec - 3.13.1-192.2Lukas Vrabec - 3.13.1-192.1Lukas Vrabec - 3.13.1-192Lukas Vrabec - 3.13.1-191Lukas Vrabec - 3.13.1-190Lukas Vrabec - 3.13.1-189Lukas Vrabec - 3.13.1-188Lukas Vrabec - 3.13.1-187Lukas Vrabec - 3.13.1-186Lukas Vrabec - 3.13.1-185Lukas Vrabec - 3.13.1-184Lukas Vrabec - 3.13.1-183Lukas Vrabec - 3.13.1-182Lukas Vrabec - 3.13.1-181Lukas Vrabec - 3.13.1-180Lukas Vrabec - 3.13.1-179Lukas Vrabec - 3.13.1-178Lukas Vrabec - 3.13.1-177Lukas Vrabec - 3.13.1-176Lukas Vrabec - 3.13.1-175Lukas Vrabec - 3.13.1-174Lukas Vrabec - 3.13.1-173Lukas Vrabec - 3.13.1-172Lukas Vrabec - 3.13.1-171Lukas Vrabec - 3.13.1-170Lukas Vrabec - 3.13.1-169Lukas Vrabec - 3.13.1-168Lukas Vrabec - 3.13.1-167Lukas Vrabec - 3.13.1-166Lukas Vrabec - 3.13.1-165Lukas Vrabec - 3.13.1-164Lukas Vrabec - 3.13.1-163Lukas Vrabec - 3.13.1-162Lukas Vrabec - 3.13.1-161Lukas Vrabec - 3.13.1-160Lukas Vrabec - 3.13.1-159Lukas Vrabec - 3.13.1-158Lukas Vrabec - 3.13.1-157Lukas Vrabec - 3.13.1-156Lukas Vrabec - 3.13.1-155Lukas Vrabec - 3.13.1-154Lukas Vrabec - 3.13.1-153Lukas Vrabec - 3.13.1-152Lukas Vrabec - 3.13.1-151Lukas Vrabec - 3.13.1-150Lukas Vrabec - 3.13.1-149Lukas Vrabec - 3.13.1-148Lukas Vrabec - 3.13.1-147Lukas Vrabec - 3.13.1-146Lukas Vrabec - 3.13.1-145Lukas Vrabec - 3.13.1-144Lukas Vrabec - 3.13.1-143Lukas Vrabec - 3.13.1-142Lukas Vrabec - 3.13.1-141Lukas Vrabec - 3.13.1-140Lukas Vrabec - 3.13.1-139Lukas Vrabec - 3.13.1-138Lukas Vrabec - 3.13.1-137Lukas Vrabec - 3.13.1-136Lukas Vrabec - 3.13.1-135Lukas Vrabec - 3.13.1-134Lukas Vrabec - 3.13.1-133Lukas Vrabec - 3.13.1-132Lukas Vrabec - 3.13.1-131Lukas Vrabec - 3.13.1-130Lukas Vrabec - 3.13.1-129Lukas Vrabec - 3.13.1-128Lukas Vrabec - 3.13.1-127Lukas Vrabec - 3.13.1-126Lukas Vrabec - 3.13.1-125Lukas Vrabec - 3.13.1-124Lukas Vrabec - 3.13.1-123Lukas Vrabec - 3.13.1-122Lukas Vrabec - 3.13.1-120Lukas Vrabec - 3.13.1-119Lukas Vrabec - 3.13.1-118Lukas Vrabec - 3.13.1-117Lukas Vrabec - 3.13.1-116Lukas Vrabec - 3.13.1-115Lukas Vrabec - 3.13.1-114Lukas Vrabec - 3.13.1-113Lukas Vrabec - 3.13.1-112Lukas Vrabec - 3.13.1-111Lukas Vrabec - 3.13.1-110Lukas Vrabec - 3.13.1-109Lukas Vrabec - 3.13.1-108Lukas Vrabec - 3.13.1-107Lukas Vrabec - 3.13.1-106Miroslav Grepl - 3.13.1-105Lukas Vrabec - 3.13.1-104Lukas Vrabec - 3.13.1-103Dan Walsh - 3.13.1-102Lukas Vrabec - 3.13.1-101Lukas Vrabec - 3.13.1-100Lukas Vrabec - 3.13.1-99Lukas Vrabec - 3.13.1-98Lukas Vrabec - 3.13.1-97Lukas Vrabec - 3.13.1-96Lukas Vrabec - 3.13.1-95Lukas Vrabec - 3.13.1-94Lukas Vrabec - 3.13.1-93Lukas Vrabec - 3.13.1-92Lukas Vrabec - 3.13.1-91Lukas Vrabec - 3.13.1-90Lukas Vrabec - 3.13.1-89Lukas Vrabec - 3.13.1-88Lukas Vrabec - 3.13.1-87Lukas Vrabec - 3.13.1-86Lukas Vrabec - 3.13.1-85Lukas Vrabec - 3.13.1-84Lukas Vrabec - 3.13.1-83Lukas Vrabec - 3.13.1-82Lukas Vrabec - 3.13.1-81Lukas Vrabec - 3.13.1-80Petr Lautrbach - 3.13.1-79Lukas Vrabec - 3.13.1-78Lukas Vrabec - 3.13.1-77Lukas Vrabec - 3.13.1-76Lukas Vrabec - 3.13.1-75Lukas Vrabec - 3.13.1-74Lukas Vrabec - 3.13.1-73Lukas Vrabec - 3.13.1-72Lukas Vrabec - 3.13.1-71Lukas Vrabec - 3.13.1-70Lukas Vrabec - 3.13.1-69Lukas Vrabec - 3.13.1-68Lukas Vrabec - 3.13.1-67Petr Lautrbach - 3.13.1-66Lukas Vrabec 3.13.1-65Lukas Vrabec 3.13.1-64Lukas Vrabec 3.13.1-63Lukas Vrabec 3.13.1-62Lukas Vrabec 3.13.1-61Miroslav Grepl 3.13.1-60Miroslav Grepl 3.13.1-59Lukas Vrabec 3.13.1-58Lukas Vrabec 3.13.1-57Miroslav Grepl 3.13.1-56Lukas Vrabec 3.13.1-55Lukas Vrabec 3.13.1-54Lukas Vrabec 3.13.1-53Lukas Vrabec 3.13.1-52Miroslav Grepl 3.13.1-51Lukas Vrabec 3.13.1-50Lukas Vrabec 3.13.1-49Lukas Vrabec 3.13.1-48Lukas Vrabec 3.13.1-47Lukas Vrabec 3.13.1-46Lukas Vrabec 3.13.1-45Lukas Vrabec 3.13.1-44Lukas Vrabec 3.13.1-43Lukas Vrabec 3.13.1-42Lukas Vrabec 3.13.1-41Lukas Vrabec 3.13.1-40Miroslav Grepl 3.13.1-39Lukas Vrabec 3.13.1-38Lukas Vrabec 3.13.1-37Lukas Vrabec 3.13.1-36Lukas Vrabec 3.13.1-35Lukas Vrabec 3.13.1-34Lukas Vrabec 3.13.1-33Lukas Vrabec 3.13.1-32Miroslav Grepl 3.13.1-31Miroslav Grepl 3.13.1-30Miroslav Grepl 3.13.1-29Miroslav Grepl 3.13.1-28Miroslav Grepl 3.13.1-27Miroslav Grepl 3.13.1-26Miroslav Grepl 3.13.1-25Miroslav Grepl 3.13.1-24Miroslav Grepl 3.13.1-23Miroslav Grepl 3.13.1-22Miroslav Grepl 3.13.1-21Miroslav Grepl 3.13.1-20Miroslav Grepl 3.13.1-19Miroslav Grepl 3.13.1-18Miroslav Grepl 3.13.1-17Miroslav Grepl 3.13.1-16Miroslav Grepl 3.13.1-15Miroslav Grepl 3.13.1-14Miroslav Grepl 3.13.1-13Miroslav Grepl 3.13.1-12Miroslav Grepl 3.13.1-11Miroslav Grepl 3.13.1-10Miroslav Grepl 3.13.1-9Miroslav Grepl 3.13.1-8Miroslav Grepl 3.13.1-7Miroslav Grepl 3.13.1-6Miroslav Grepl 3.13.1-5Miroslav Grepl 3.13.1-4Miroslav Grepl 3.13.1-3Miroslav Grepl 3.13.1-2Miroslav Grepl 3.13.1-1Miroslav Grepl 3.12.1-156Miroslav Grepl 3.12.1-155Miroslav Grepl 3.12.1-154Miroslav Grepl 3.12.1-153Miroslav Grepl 3.12.1-152Miroslav Grepl 3.12.1-151Miroslav Grepl 3.12.1-149Miroslav Grepl 3.12.1-149Miroslav Grepl 3.12.1-148Miroslav Grepl 3.12.1-147Miroslav Grepl 3.12.1-146Miroslav Grepl 3.12.1-145Miroslav Grepl 3.12.1-144Lukas Vrabec 3.12.1-143Miroslav Grepl 3.12.1-142Miroslav Grepl 3.12.1-141Miroslav Grepl 3.12.1-140Miroslav Grepl 3.12.1-139Lukas Vrabec 3.12.1-138Miroslav Grepl 3.12.1-137Miroslav Grepl 3.12.1-136Miroslav Grepl 3.12.1-135Miroslav Grepl 3.12.1-134Miroslav Grepl 3.12.1-133Miroslav Grepl 3.12.1-132Miroslav Grepl 3.12.1-131Miroslav Grepl 3.12.1-130Miroslav Grepl 3.12.1-129Miroslav Grepl 3.12.1-128Miroslav Grepl 3.12.1-127Miroslav Grepl 3.12.1-126Miroslav Grepl 3.12.1-125Miroslav Grepl 3.12.1-124Miroslav Grepl 3.12.1-123Miroslav Grepl 3.12.1-122Miroslav Grepl 3.12.1-121Miroslav Grepl 3.12.1-120Miroslav Grepl 3.12.1-119Miroslav Grepl 3.12.1-118Miroslav Grepl 3.12.1-117Miroslav Grepl 3.12.1-116Miroslav Grepl 3.12.1-115Miroslav Grepl 3.12.1-114Miroslav Grepl 3.12.1-113Miroslav Grepl 3.12.1-112Miroslav Grepl 3.12.1-111Miroslav Grepl 3.12.1-110Miroslav Grepl 3.12.1-109Miroslav Grepl 3.12.1-108Miroslav Grepl 3.12.1-107Dan Walsh 3.12.1-106Miroslav Grepl 3.12.1-105Miroslav Grepl 3.12.1-104Miroslav Grepl 3.12.1-103Miroslav Grepl 3.12.1-102Miroslav Grepl 3.12.1-101Miroslav Grepl 3.12.1-100Miroslav Grepl 3.12.1-99Miroslav Grepl 3.12.1-98Miroslav Grepl 3.12.1-97Miroslav Grepl 3.12.1-96Miroslav Grepl 3.12.1-95Miroslav Grepl 3.12.1-94Miroslav Grepl 3.12.1-94Miroslav Grepl 3.12.1-93Miroslav Grepl 3.12.1-92Miroslav Grepl 3.12.1-91Miroslav Grepl 3.12.1-90Miroslav Grepl 3.12.1-89Miroslav Grepl 3.12.1-88Miroslav Grepl 3.12.1-87Miroslav Grepl 3.12.1-86Miroslav Grepl 3.12.1-85Miroslav Grepl 3.12.1-84Miroslav Grepl 3.12.1-83Miroslav Grepl 3.12.1-82Miroslav Grepl 3.12.1-81Miroslav Grepl 3.12.1-80Miroslav Grepl 3.12.1-79Miroslav Grepl 3.12.1-78Miroslav Grepl 3.12.1-77Miroslav Grepl 3.12.1-76Miroslav Grepl 3.12.1-75Miroslav Grepl 3.12.1-74Miroslav Grepl 3.12.1-73Miroslav Grepl 3.12.1-72Miroslav Grepl 3.12.1-71Miroslav Grepl 3.12.1-70Miroslav Grepl 3.12.1-69Miroslav Grepl 3.12.1-68Miroslav Grepl 3.12.1-67Miroslav Grepl 3.12.1-66Miroslav Grepl 3.12.1-65Miroslav Grepl 3.12.1-64Miroslav Grepl 3.12.1-63Miroslav Grepl 3.12.1-62Miroslav Grepl 3.12.1-61Miroslav Grepl 3.12.1-60Miroslav Grepl 3.12.1-59Miroslav Grepl 3.12.1-58Miroslav Grepl 3.12.1-57Miroslav Grepl 3.12.1-56Miroslav Grepl 3.12.1-55Miroslav Grepl 3.12.1-54Miroslav Grepl 3.12.1-53Miroslav Grepl 3.12.1-52Miroslav Grepl 3.12.1-51Miroslav Grepl 3.12.1-50Miroslav Grepl 3.12.1-49Miroslav Grepl 3.12.1-48Miroslav Grepl 3.12.1-47Miroslav Grepl 3.12.1-46Miroslav Grepl 3.12.1-45Miroslav Grepl 3.12.1-44Miroslav Grepl 3.12.1-43Miroslav Grepl 3.12.1-42Miroslav Grepl 3.12.1-41Miroslav Grepl 3.12.1-40Miroslav Grepl 3.12.1-39Miroslav Grepl 3.12.1-38Miroslav Grepl 3.12.1-37Miroslav Grepl 3.12.1-36Miroslav Grepl 3.12.1-35Miroslav Grepl 3.12.1-34Miroslav Grepl 3.12.1-33Miroslav Grepl 3.12.1-32Miroslav Grepl 3.12.1-31Miroslav Grepl 3.12.1-30Miroslav Grepl 3.12.1-29Dan Walsh 3.12.1-28Dan Walsh 3.12.1-27Miroslav Grepl 3.12.1-26Miroslav Grepl 3.12.1-25Miroslav Grepl 3.12.1-24Miroslav Grepl 3.12.1-23Miroslav Grepl 3.12.1-22Miroslav Grepl 3.12.1-21Miroslav Grepl 3.12.1-20Miroslav Grepl 3.12.1-19Miroslav Grepl 3.12.1-18Miroslav Grepl 3.12.1-17Miroslav Grepl 3.12.1-16Miroslav Grepl 3.12.1-15Miroslav Grepl 3.12.1-14Miroslav Grepl 3.12.1-13Miroslav Grepl 3.12.1-12Miroslav Grepl 3.12.1-11Miroslav Grepl 3.12.1-10Miroslav Grepl 3.12.1-9Miroslav Grepl 3.12.1-8Miroslav Grepl 3.12.1-7Miroslav Grepl 3.12.1-6Miroslav Grepl 3.12.1-5Miroslav Grepl 3.12.1-4Miroslav Grepl 3.12.1-3Miroslav Grepl 3.12.1-2Miroslav Grepl 3.12.1-1Dan Walsh 3.11.1-69.1Miroslav Grepl 3.11.1-69Miroslav Grepl 3.11.1-68Miroslav Grepl 3.11.1-67Miroslav Grepl 3.11.1-66Miroslav Grepl 3.11.1-65Miroslav Grepl 3.11.1-64Miroslav Grepl 3.11.1-63Miroslav Grepl 3.11.1-62Miroslav Grepl 3.11.1-61Miroslav Grepl 3.11.1-60Miroslav Grepl 3.11.1-59Miroslav Grepl 3.11.1-58Miroslav Grepl 3.11.1-57Miroslav Grepl 3.11.1-56Miroslav Grepl 3.11.1-55Miroslav Grepl 3.11.1-54Miroslav Grepl 3.11.1-53Miroslav Grepl 3.11.1-52Miroslav Grepl 3.11.1-51Miroslav Grepl 3.11.1-50Miroslav Grepl 3.11.1-49Miroslav Grepl 3.11.1-48Miroslav Grepl 3.11.1-47Miroslav Grepl 3.11.1-46Miroslav Grepl 3.11.1-45Miroslav Grepl 3.11.1-44Miroslav Grepl 3.11.1-43Miroslav Grepl 3.11.1-42Miroslav Grepl 3.11.1-41Miroslav Grepl 3.11.1-40Miroslav Grepl 3.11.1-39Miroslav Grepl 3.11.1-38Miroslav Grepl 3.11.1-37Miroslav Grepl 3.11.1-36Miroslav Grepl 3.11.1-35Miroslav Grepl 3.11.1-34Miroslav Grepl 3.11.1-33Miroslav Grepl 3.11.1-32Miroslav Grepl 3.11.1-31Miroslav Grepl 3.11.1-30Miroslav Grepl 3.11.1-29Miroslav Grepl 3.11.1-28Miroslav Grepl 3.11.1-27Miroslav Grepl 3.11.1-26Miroslav Grepl 3.11.1-25Miroslav Grepl 3.11.1-24Miroslav Grepl 3.11.1-23Miroslav Grepl 3.11.1-22Miroslav Grepl 3.11.1-21Miroslav Grepl 3.11.1-20Miroslav Grepl 3.11.1-19Miroslav Grepl 3.11.1-18Miroslav Grepl 3.11.1-17Miroslav Grepl 3.11.1-16Dan Walsh 3.11.1-15Miroslav Grepl 3.11.1-14Dan Walsh 3.11.1-13Miroslav Grepl 3.11.1-12Miroslav Grepl 3.11.1-11Miroslav Grepl 3.11.1-10Dan Walsh 3.11.1-9Dan Walsh 3.11.1-8Dan Walsh 3.11.1-7Dan Walsh 3.11.1-6Miroslav Grepl 3.11.1-5Miroslav Grepl 3.11.1-4Miroslav Grepl 3.11.1-3Miroslav Grepl 3.11.1-2Miroslav Grepl 3.11.1-1Miroslav Grepl 3.11.1-0Miroslav Grepl 3.11.0-15Miroslav Grepl 3.11.0-14Miroslav Grepl 3.11.0-13Miroslav Grepl 3.11.0-12Fedora Release Engineering - 3.11.0-11Miroslav Grepl 3.11.0-10Miroslav Grepl 3.11.0-9Miroslav Grepl 3.11.0-8Miroslav Grepl 3.11.0-7Miroslav Grepl 3.11.0-6Miroslav Grepl 3.11.0-5Miroslav Grepl 3.11.0-4Miroslav Grepl 3.11.0-3Miroslav Grepl 3.11.0-2Miroslav Grepl 3.11.0-1Miroslav Grepl 3.10.0-128Miroslav Grepl 3.10.0-127Miroslav Grepl 3.10.0-126Miroslav Grepl 3.10.0-125Miroslav Grepl 3.10.0-124Miroslav Grepl 3.10.0-123Miroslav Grepl 3.10.0-122Miroslav Grepl 3.10.0-121Miroslav Grepl 3.10.0-120Miroslav Grepl 3.10.0-119Miroslav Grepl 3.10.0-118Miroslav Grepl 3.10.0-117Miroslav Grepl 3.10.0-116Miroslav Grepl 3.10.0-115Miroslav Grepl 3.10.0-114Miroslav Grepl 3.10.0-113Miroslav Grepl 3.10.0-112Miroslav Grepl 3.10.0-111Miroslav Grepl 3.10.0-110Miroslav Grepl 3.10.0-109Miroslav Grepl 3.10.0-108Miroslav Grepl 3.10.0-107Miroslav Grepl 3.10.0-106Miroslav Grepl 3.10.0-105Miroslav Grepl 3.10.0-104Miroslav Grepl 3.10.0-103Miroslav Grepl 3.10.0-102Miroslav Grepl 3.10.0-101Miroslav Grepl 3.10.0-100Miroslav Grepl 3.10.0-99Miroslav Grepl 3.10.0-98Miroslav Grepl 3.10.0-97Miroslav Grepl 3.10.0-96Miroslav Grepl 3.10.0-95Miroslav Grepl 3.10.0-94Miroslav Grepl 3.10.0-93Miroslav Grepl 3.10.0-92Miroslav Grepl 3.10.0-91Miroslav Grepl 3.10.0-90Miroslav Grepl 3.10.0-89Miroslav Grepl 3.10.0-88Miroslav Grepl 3.10.0-87Miroslav Grepl 3.10.0-86Miroslav Grepl 3.10.0-85Miroslav Grepl 3.10.0-84Miroslav Grepl 3.10.0-83Miroslav Grepl 3.10.0-82Dan Walsh 3.10.0-81.2Miroslav Grepl 3.10.0-81Miroslav Grepl 3.10.0-80Miroslav Grepl 3.10.0-79Miroslav Grepl 3.10.0-78Miroslav Grepl 3.10.0-77Miroslav Grepl 3.10.0-76Miroslav Grepl 3.10.0-75Dan Walsh 3.10.0-74.2Miroslav Grepl 3.10.0-74Miroslav Grepl 3.10.0-73Miroslav Grepl 3.10.0-72Miroslav Grepl 3.10.0-71Miroslav Grepl 3.10.0-70Miroslav Grepl 3.10.0-69Miroslav Grepl 3.10.0-68Miroslav Grepl 3.10.0-67Miroslav Grepl 3.10.0-66Miroslav Grepl 3.10.0-65Miroslav Grepl 3.10.0-64Miroslav Grepl 3.10.0-63Miroslav Grepl 3.10.0-59Miroslav Grepl 3.10.0-58Dan Walsh 3.10.0-57Dan Walsh 3.10.0-56Dan Walsh 3.10.0-55.2Dan Walsh 3.10.0-55.1Miroslav Grepl 3.10.0-55Dan Walsh 3.10.0-54.1Miroslav Grepl 3.10.0-54Dan Walsh 3.10.0-53.1Miroslav Grepl 3.10.0-53Miroslav Grepl 3.10.0-52Miroslav Grepl 3.10.0-51Dan Walsh 3.10.0-50.2Dan Walsh 3.10.0-50.1Miroslav Grepl 3.10.0-50Miroslav Grepl 3.10.0-49Miroslav Grepl 3.10.0-48Miroslav Grepl 3.10.0-47Dan Walsh 3.10.0-46.1Miroslav Grepl 3.10.0-46Dan Walsh 3.10.0-45.1Miroslav Grepl 3.10.0-45Miroslav Grepl 3.10.0-43Miroslav Grepl 3.10.0-42Miroslav Grepl 3.10.0-41Dan Walsh 3.10.0-40.2Miroslav Grepl 3.10.0-40Dan Walsh 3.10.0-39.3Dan Walsh 3.10.0-39.2Dan Walsh 3.10.0-39.1Miroslav Grepl 3.10.0-39Dan Walsh 3.10.0-38.1Miroslav Grepl 3.10.0-38Miroslav Grepl 3.10.0-37Dan Walsh 3.10.0-36.1Miroslav Grepl 3.10.0-36Dan Walsh 3.10.0-35Dan Walsh 3.10.0-34.7Dan Walsh 3.10.0-34.6Dan Walsh 3.10.0-34.4Miroslav Grepl 3.10.0-34.3Dan Walsh 3.10.0-34.2Dan Walsh 3.10.0-34.1Miroslav Grepl 3.10.0-34Miroslav Grepl 3.10.0-33Dan Walsh 3.10.0-31.1Miroslav Grepl 3.10.0-31Miroslav Grepl 3.10.0-29Miroslav Grepl 3.10.0-28Miroslav Grepl 3.10.0-27Miroslav Grepl 3.10.0-26Miroslav Grepl 3.10.0-25Miroslav Grepl 3.10.0-24Miroslav Grepl 3.10.0-23Miroslav Grepl 3.10.0-22Miroslav Grepl 3.10.0-21Dan Walsh 3.10.0-20Miroslav Grepl 3.10.0-19Miroslav Grepl 3.10.0-18Miroslav Grepl 3.10.0-17Miroslav Grepl 3.10.0-16Miroslav Grepl 3.10.0-14Miroslav Grepl 3.10.0-13Miroslav Grepl 3.10.0-12Miroslav Grepl 3.10.0-11Miroslav Grepl 3.10.0-10Miroslav Grepl 3.10.0-9Miroslav Grepl 3.10.0-8Miroslav Grepl 3.10.0-7Miroslav Grepl 3.10.0-6Miroslav Grepl 3.10.0-5Miroslav Grepl 3.10.0-4Miroslav Grepl 3.10.0-3Miroslav Grepl 3.10.0-2Miroslav Grepl 3.10.0-1Miroslav Grepl 3.9.16-30Dan Walsh 3.9.16-29.1Miroslav Grepl 3.9.16-29Dan Walsh 3.9.16-28.1Miroslav Grepl 3.9.16-27Miroslav Grepl 3.9.16-26Miroslav Grepl 3.9.16-25Miroslav Grepl 3.9.16-24Miroslav Grepl 3.9.16-23Miroslav Grepl 3.9.16-22Miroslav Grepl 3.9.16-21Miroslav Grepl 3.9.16-20Miroslav Grepl 3.9.16-19Miroslav Grepl 3.9.16-18Miroslav Grepl 3.9.16-17Dan Walsh 3.9.16-16.1Miroslav Grepl 3.9.16-16Miroslav Grepl 3.9.16-15Miroslav Grepl 3.9.16-14Miroslav Grepl 3.9.16-13Miroslav Grepl 3.9.16-12Miroslav Grepl 3.9.16-11Miroslav Grepl 3.9.16-10Miroslav Grepl 3.9.16-7Miroslav Grepl 3.9.16-6Miroslav Grepl 3.9.16-5Miroslav Grepl 3.9.16-4Miroslav Grepl 3.9.16-3Miroslav Grepl 3.9.16-2Miroslav Grepl 3.9.16-1Miroslav Grepl 3.9.15-5Miroslav Grepl 3.9.15-2Miroslav Grepl 3.9.15-1Fedora Release Engineering - 3.9.14-2Dan Walsh 3.9.14-1Miroslav Grepl 3.9.13-10Miroslav Grepl 3.9.13-9Dan Walsh 3.9.13-8Miroslav Grepl 3.9.13-7Miroslav Grepl 3.9.13-6Miroslav Grepl 3.9.13-5Miroslav Grepl 3.9.13-4Miroslav Grepl 3.9.13-3Miroslav Grepl 3.9.13-2Miroslav Grepl 3.9.13-1Miroslav Grepl 3.9.12-8Miroslav Grepl 3.9.12-7Miroslav Grepl 3.9.12-6Miroslav Grepl 3.9.12-5Dan Walsh 3.9.12-4Dan Walsh 3.9.12-3Dan Walsh 3.9.12-2Miroslav Grepl 3.9.12-1Dan Walsh 3.9.11-2Miroslav Grepl 3.9.11-1Miroslav Grepl 3.9.10-13Dan Walsh 3.9.10-12Miroslav Grepl 3.9.10-11Miroslav Grepl 3.9.10-10Miroslav Grepl 3.9.10-9Miroslav Grepl 3.9.10-8Miroslav Grepl 3.9.10-7Miroslav Grepl 3.9.10-6Miroslav Grepl 3.9.10-5Dan Walsh 3.9.10-4Miroslav Grepl 3.9.10-3Miroslav Grepl 3.9.10-2Miroslav Grepl 3.9.10-1Miroslav Grepl 3.9.9-4Dan Walsh 3.9.9-3Miroslav Grepl 3.9.9-2Miroslav Grepl 3.9.9-1Miroslav Grepl 3.9.8-7Dan Walsh 3.9.8-6Miroslav Grepl 3.9.8-5Miroslav Grepl 3.9.8-4Dan Walsh 3.9.8-3Dan Walsh 3.9.8-2Dan Walsh 3.9.8-1Dan Walsh 3.9.7-10Dan Walsh 3.9.7-9Dan Walsh 3.9.7-8Dan Walsh 3.9.7-7Dan Walsh 3.9.7-6Dan Walsh 3.9.7-5Dan Walsh 3.9.7-4Dan Walsh 3.9.7-3Dan Walsh 3.9.7-2Dan Walsh 3.9.7-1Dan Walsh 3.9.6-3Dan Walsh 3.9.6-2Dan Walsh 3.9.6-1Dan Walsh 3.9.5-11Dan Walsh 3.9.5-10Dan Walsh 3.9.5-9Dan Walsh 3.9.5-8Dan Walsh 3.9.5-7Dan Walsh 3.9.5-6Dan Walsh 3.9.5-5Dan Walsh 3.9.5-4Dan Walsh 3.9.5-3Dan Walsh 3.9.5-2Dan Walsh 3.9.5-1Dan Walsh 3.9.4-3Dan Walsh 3.9.4-2Dan Walsh 3.9.4-1Dan Walsh 3.9.3-4Dan Walsh 3.9.3-3Dan Walsh 3.9.3-2Dan Walsh 3.9.3-1Dan Walsh 3.9.2-1Dan Walsh 3.9.1-3Dan Walsh 3.9.1-2Dan Walsh 3.9.1-1Dan Walsh 3.9.0-2Dan Walsh 3.9.0-1Dan Walsh 3.8.8-21Dan Walsh 3.8.8-20Dan Walsh 3.8.8-19Dan Walsh 3.8.8-18Dan Walsh 3.8.8-17Dan Walsh 3.8.8-16Dan Walsh 3.8.8-15Dan Walsh 3.8.8-14Dan Walsh 3.8.8-13Dan Walsh 3.8.8-12Dan Walsh 3.8.8-11Dan Walsh 3.8.8-10Dan Walsh 3.8.8-9Dan Walsh 3.8.8-8Dan Walsh 3.8.8-7Dan Walsh 3.8.8-6Dan Walsh 3.8.8-5Dan Walsh 3.8.8-4Dan Walsh 3.8.8-3Dan Walsh 3.8.8-2Dan Walsh 3.8.8-1Dan Walsh 3.8.7-3Dan Walsh 3.8.7-2Dan Walsh 3.8.7-1Dan Walsh 3.8.6-3Miroslav Grepl 3.8.6-2Dan Walsh 3.8.6-1Dan Walsh 3.8.5-1Dan Walsh 3.8.4-1Dan Walsh 3.8.3-4Dan Walsh 3.8.3-3Dan Walsh 3.8.3-2Dan Walsh 3.8.3-1Dan Walsh 3.8.2-1Dan Walsh 3.8.1-5Dan Walsh 3.8.1-4Dan Walsh 3.8.1-3Dan Walsh 3.8.1-2Dan Walsh 3.8.1-1Dan Walsh 3.7.19-22Dan Walsh 3.7.19-21Dan Walsh 3.7.19-20Dan Walsh 3.7.19-19Dan Walsh 3.7.19-17Dan Walsh 3.7.19-16Dan Walsh 3.7.19-15Dan Walsh 3.7.19-14Dan Walsh 3.7.19-13Dan Walsh 3.7.19-12Dan Walsh 3.7.19-11Dan Walsh 3.7.19-10Dan Walsh 3.7.19-9Dan Walsh 3.7.19-8Dan Walsh 3.7.19-7Dan Walsh 3.7.19-6Dan Walsh 3.7.19-5Dan Walsh 3.7.19-4Dan Walsh 3.7.19-3Dan Walsh 3.7.19-2Dan Walsh 3.7.19-1Dan Walsh 3.7.18-3Dan Walsh 3.7.18-2Dan Walsh 3.7.18-1Dan Walsh 3.7.17-6Dan Walsh 3.7.17-5Dan Walsh 3.7.17-4Dan Walsh 3.7.17-3Dan Walsh 3.7.17-2Dan Walsh 3.7.17-1Dan Walsh 3.7.16-2Dan Walsh 3.7.16-1Dan Walsh 3.7.15-4Dan Walsh 3.7.15-3Dan Walsh 3.7.15-2Dan Walsh 3.7.15-1Dan Walsh 3.7.14-5Dan Walsh 3.7.14-4Dan Walsh 3.7.14-3Dan Walsh 3.7.14-2Dan Walsh 3.7.14-1Dan Walsh 3.7.13-4Dan Walsh 3.7.13-3Dan Walsh 3.7.13-2Dan Walsh 3.7.13-1Dan Walsh 3.7.12-1Dan Walsh 3.7.11-1Dan Walsh 3.7.10-5Dan Walsh 3.7.10-4Dan Walsh 3.7.10-3Dan Walsh 3.7.10-2Dan Walsh 3.7.10-1Dan Walsh 3.7.9-4Dan Walsh 3.7.9-3Dan Walsh 3.7.9-2Dan Walsh 3.7.9-1Dan Walsh 3.7.8-11Dan Walsh 3.7.8-9Dan Walsh 3.7.8-8Dan Walsh 3.7.8-7Dan Walsh 3.7.8-6Dan Walsh 3.7.8-5Dan Walsh 3.7.8-4Dan Walsh 3.7.8-3Dan Walsh 3.7.8-2Dan Walsh 3.7.8-1Dan Walsh 3.7.7-3Dan Walsh 3.7.7-2Dan Walsh 3.7.7-1Dan Walsh 3.7.6-1Dan Walsh 3.7.5-8Dan Walsh 3.7.5-7Dan Walsh 3.7.5-6Dan Walsh 3.7.5-5Dan Walsh 3.7.5-4Dan Walsh 3.7.5-3Dan Walsh 3.7.5-2Dan Walsh 3.7.5-1Dan Walsh 3.7.4-4Dan Walsh 3.7.4-3Dan Walsh 3.7.4-2Dan Walsh 3.7.4-1Dan Walsh 3.7.3-1Dan Walsh 3.7.1-1Dan Walsh 3.6.33-2Dan Walsh 3.6.33-1Dan Walsh 3.6.32-17Dan Walsh 3.6.32-16Dan Walsh 3.6.32-15Dan Walsh 3.6.32-13Dan Walsh 3.6.32-12Dan Walsh 3.6.32-11Dan Walsh 3.6.32-10Dan Walsh 3.6.32-9Dan Walsh 3.6.32-8Dan Walsh 3.6.32-7Dan Walsh 3.6.32-6Dan Walsh 3.6.32-5Dan Walsh 3.6.32-4Dan Walsh 3.6.32-3Dan Walsh 3.6.32-2Dan Walsh 3.6.32-1Dan Walsh 3.6.31-5Dan Walsh 3.6.31-4Dan Walsh 3.6.31-3Dan Walsh 3.6.31-2Dan Walsh 3.6.30-6Dan Walsh 3.6.30-5Dan Walsh 3.6.30-4Dan Walsh 3.6.30-3Dan Walsh 3.6.30-2Dan Walsh 3.6.30-1Dan Walsh 3.6.29-2Dan Walsh 3.6.29-1Dan Walsh 3.6.28-9Dan Walsh 3.6.28-8Dan Walsh 3.6.28-7Dan Walsh 3.6.28-6Dan Walsh 3.6.28-5Dan Walsh 3.6.28-4Dan Walsh 3.6.28-3Dan Walsh 3.6.28-2Dan Walsh 3.6.28-1Dan Walsh 3.6.27-1Dan Walsh 3.6.26-11Dan Walsh 3.6.26-10Dan Walsh 3.6.26-9Bill Nottingham 3.6.26-8Dan Walsh 3.6.26-7Dan Walsh 3.6.26-6Dan Walsh 3.6.26-5Dan Walsh 3.6.26-4Dan Walsh 3.6.26-3Dan Walsh 3.6.26-2Dan Walsh 3.6.26-1Dan Walsh 3.6.25-1Dan Walsh 3.6.24-1Dan Walsh 3.6.23-2Dan Walsh 3.6.23-1Dan Walsh 3.6.22-3Dan Walsh 3.6.22-1Dan Walsh 3.6.21-4Dan Walsh 3.6.21-3Tom "spot" Callaway 3.6.21-2Dan Walsh 3.6.21-1Dan Walsh 3.6.20-2Dan Walsh 3.6.20-1Dan Walsh 3.6.19-5Dan Walsh 3.6.19-4Dan Walsh 3.6.19-3Dan Walsh 3.6.19-2Dan Walsh 3.6.19-1Dan Walsh 3.6.18-1Dan Walsh 3.6.17-1Dan Walsh 3.6.16-4Dan Walsh 3.6.16-3Dan Walsh 3.6.16-2Dan Walsh 3.6.16-1Dan Walsh 3.6.14-3Dan Walsh 3.6.14-2Dan Walsh 3.6.14-1Dan Walsh 3.6.13-3Dan Walsh 3.6.13-2Dan Walsh 3.6.13-1Dan Walsh 3.6.12-39Dan Walsh 3.6.12-38Dan Walsh 3.6.12-37Dan Walsh 3.6.12-36Dan Walsh 3.6.12-35Dan Walsh 3.6.12-34Dan Walsh 3.6.12-33Dan Walsh 3.6.12-31Dan Walsh 3.6.12-30Dan Walsh 3.6.12-29Dan Walsh 3.6.12-28Dan Walsh 3.6.12-27Dan Walsh 3.6.12-26Dan Walsh 3.6.12-25Dan Walsh 3.6.12-24Dan Walsh 3.6.12-23Dan Walsh 3.6.12-22Dan Walsh 3.6.12-21Dan Walsh 3.6.12-20Dan Walsh 3.6.12-19Dan Walsh 3.6.12-16Dan Walsh 3.6.12-15Dan Walsh 3.6.12-14Dan Walsh 3.6.12-13Dan Walsh 3.6.12-12Dan Walsh 3.6.12-11Dan Walsh 3.6.12-10Dan Walsh 3.6.12-9Dan Walsh 3.6.12-8Dan Walsh 3.6.12-7Dan Walsh 3.6.12-6Dan Walsh 3.6.12-5Dan Walsh 3.6.12-4Dan Walsh 3.6.12-3Dan Walsh 3.6.12-2Dan Walsh 3.6.12-1Dan Walsh 3.6.11-1Dan Walsh 3.6.10-9Dan Walsh 3.6.10-8Dan Walsh 3.6.10-7Dan Walsh 3.6.10-6Dan Walsh 3.6.10-5Dan Walsh 3.6.10-4Dan Walsh 3.6.10-3Dan Walsh 3.6.10-2Dan Walsh 3.6.10-1Dan Walsh 3.6.9-4Dan Walsh 3.6.9-3Dan Walsh 3.6.9-2Dan Walsh 3.6.9-1Dan Walsh 3.6.8-4Dan Walsh 3.6.8-3Dan Walsh 3.6.8-2Dan Walsh 3.6.8-1Dan Walsh 3.6.7-2Dan Walsh 3.6.7-1Dan Walsh 3.6.6-9Dan Walsh 3.6.6-8Fedora Release Engineering - 3.6.6-7Dan Walsh 3.6.6-6Dan Walsh 3.6.6-5Dan Walsh 3.6.6-4Dan Walsh 3.6.6-3Dan Walsh 3.6.6-2Dan Walsh 3.6.6-1Dan Walsh 3.6.5-3Dan Walsh 3.6.5-1Dan Walsh 3.6.4-6Dan Walsh 3.6.4-5Dan Walsh 3.6.4-4Dan Walsh 3.6.4-3Dan Walsh 3.6.4-2Dan Walsh 3.6.4-1Dan Walsh 3.6.3-13Dan Walsh 3.6.3-12Dan Walsh 3.6.3-11Dan Walsh 3.6.3-10Dan Walsh 3.6.3-9Dan Walsh 3.6.3-8Dan Walsh 3.6.3-7Dan Walsh 3.6.3-6Dan Walsh 3.6.3-3Dan Walsh 3.6.3-2Dan Walsh 3.6.3-1Dan Walsh 3.6.2-5Dan Walsh 3.6.2-4Dan Walsh 3.6.2-3Dan Walsh 3.6.2-2Dan Walsh 3.6.2-1Dan Walsh 3.6.1-15Dan Walsh 3.6.1-14Dan Walsh 3.6.1-13Dan Walsh 3.6.1-12Dan Walsh 3.6.1-11Dan Walsh 3.6.1-10Dan Walsh 3.6.1-9Dan Walsh 3.6.1-8Dan Walsh 3.6.1-7Dan Walsh 3.6.1-4Ignacio Vazquez-Abrams - 3.6.1-2Dan Walsh 3.5.13-19Dan Walsh 3.5.13-18Dan Walsh 3.5.13-17Dan Walsh 3.5.13-16Dan Walsh 3.5.13-15Dan Walsh 3.5.13-14Dan Walsh 3.5.13-13Dan Walsh 3.5.13-12Dan Walsh 3.5.13-11Dan Walsh 3.5.13-9Dan Walsh 3.5.13-8Dan Walsh 3.5.13-7Dan Walsh 3.5.13-6Dan Walsh 3.5.13-5Dan Walsh 3.5.13-4Dan Walsh 3.5.13-3Dan Walsh 3.5.13-2Dan Walsh 3.5.13-1Dan Walsh 3.5.12-3Dan Walsh 3.5.12-2Dan Walsh 3.5.12-1Dan Walsh 3.5.11-1Dan Walsh 3.5.10-3Dan Walsh 3.5.10-2Dan Walsh 3.5.10-1Dan Walsh 3.5.9-4Dan Walsh 3.5.9-3Dan Walsh 3.5.9-2Dan Walsh 3.5.9-1Dan Walsh 3.5.8-7Dan Walsh 3.5.8-6Dan Walsh 3.5.8-5Dan Walsh 3.5.8-4Dan Walsh 3.5.8-3Dan Walsh 3.5.8-1Dan Walsh 3.5.7-2Dan Walsh 3.5.7-1Dan Walsh 3.5.6-2Dan Walsh 3.5.6-1Dan Walsh 3.5.5-4Dan Walsh 3.5.5-3Dan Walsh 3.5.5-2Dan Walsh 3.5.4-2Dan Walsh 3.5.4-1Dan Walsh 3.5.3-1Dan Walsh 3.5.2-2Dan Walsh 3.5.1-5Dan Walsh 3.5.1-4Dan Walsh 3.5.1-3Dan Walsh 3.5.1-2Dan Walsh 3.5.1-1Dan Walsh 3.5.0-1Dan Walsh 3.4.2-14Dan Walsh 3.4.2-13Dan Walsh 3.4.2-12Dan Walsh 3.4.2-11Dan Walsh 3.4.2-10Dan Walsh 3.4.2-9Dan Walsh 3.4.2-8Dan Walsh 3.4.2-7Dan Walsh 3.4.2-6Dan Walsh 3.4.2-5Dan Walsh 3.4.2-4Dan Walsh 3.4.2-3Dan Walsh 3.4.2-2Dan Walsh 3.4.2-1Dan Walsh 3.4.1-5Dan Walsh 3.4.1-3Dan Walsh 3.4.1-2Dan Walsh 3.4.1-1Dan Walsh 3.3.1-48Dan Walsh 3.3.1-47Dan Walsh 3.3.1-46Dan Walsh 3.3.1-45Dan Walsh 3.3.1-44Dan Walsh 3.3.1-43Dan Walsh 3.3.1-42Dan Walsh 3.3.1-41Dan Walsh 3.3.1-39Dan Walsh 3.3.1-37Dan Walsh 3.3.1-36Dan Walsh 3.3.1-33Dan Walsh 3.3.1-32Dan Walsh 3.3.1-31Dan Walsh 3.3.1-30Dan Walsh 3.3.1-29Dan Walsh 3.3.1-28Dan Walsh 3.3.1-27Dan Walsh 3.3.1-26Dan Walsh 3.3.1-25Dan Walsh 3.3.1-24Dan Walsh 3.3.1-23Dan Walsh 3.3.1-22Dan Walsh 3.3.1-21Dan Walsh 3.3.1-20Dan Walsh 3.3.1-19Dan Walsh 3.3.1-18Dan Walsh 3.3.1-17Dan Walsh 3.3.1-16Dan Walsh 3.3.1-15Bill Nottingham 3.3.1-14Dan Walsh 3.3.1-13Dan Walsh 3.3.1-12Dan Walsh 3.3.1-11Dan Walsh 3.3.1-10Dan Walsh 3.3.1-9Dan Walsh 3.3.1-8Dan Walsh 3.3.1-6Dan Walsh 3.3.1-5Dan Walsh 3.3.1-4Dan Walsh 3.3.1-2Dan Walsh 3.3.1-1Dan Walsh 3.3.0-2Dan Walsh 3.3.0-1Dan Walsh 3.2.9-2Dan Walsh 3.2.9-1Dan Walsh 3.2.8-2Dan Walsh 3.2.8-1Dan Walsh 3.2.7-6Dan Walsh 3.2.7-5Dan Walsh 3.2.7-3Dan Walsh 3.2.7-2Dan Walsh 3.2.7-1Dan Walsh 3.2.6-7Dan Walsh 3.2.6-6Dan Walsh 3.2.6-5Dan Walsh 3.2.6-4Dan Walsh 3.2.6-3Dan Walsh 3.2.6-2Dan Walsh 3.2.6-1Dan Walsh 3.2.5-25Dan Walsh 3.2.5-24Dan Walsh 3.2.5-22Dan Walsh 3.2.5-21Dan Walsh 3.2.5-20Dan Walsh 3.2.5-19Dan Walsh 3.2.5-18Dan Walsh 3.2.5-17Dan Walsh 3.2.5-16Dan Walsh 3.2.5-15Dan Walsh 3.2.5-14Dan Walsh 3.2.5-13Dan Walsh 3.2.5-12Dan Walsh 3.2.5-11Dan Walsh 3.2.5-10Dan Walsh 3.2.5-9Dan Walsh 3.2.5-8Dan Walsh 3.2.5-7Dan Walsh 3.2.5-6Dan Walsh 3.2.5-5Dan Walsh 3.2.5-4Dan Walsh 3.2.5-3Dan Walsh 3.2.5-2Dan Walsh 3.2.5-1Dan Walsh 3.2.4-5Dan Walsh 3.2.4-4Dan Walsh 3.2.4-3Dan Walsh 3.2.4-1Dan Walsh 3.2.4-1Dan Walsh 3.2.3-2Dan Walsh 3.2.3-1Dan Walsh 3.2.2-1Dan Walsh 3.2.1-3Dan Walsh 3.2.1-1Dan Walsh 3.1.2-2Dan Walsh 3.1.2-1Dan Walsh 3.1.1-1Dan Walsh 3.1.0-1Dan Walsh 3.0.8-30Dan Walsh 3.0.8-28Dan Walsh 3.0.8-27Dan Walsh 3.0.8-26Dan Walsh 3.0.8-25Dan Walsh 3.0.8-24Dan Walsh 3.0.8-23Dan Walsh 3.0.8-22Dan Walsh 3.0.8-21Dan Walsh 3.0.8-20Dan Walsh 3.0.8-19Dan Walsh 3.0.8-18Dan Walsh 3.0.8-17Dan Walsh 3.0.8-16Dan Walsh 3.0.8-15Dan Walsh 3.0.8-14Dan Walsh 3.0.8-13Dan Walsh 3.0.8-12Dan Walsh 3.0.8-11Dan Walsh 3.0.8-10Dan Walsh 3.0.8-9Dan Walsh 3.0.8-8Dan Walsh 3.0.8-7Dan Walsh 3.0.8-5Dan Walsh 3.0.8-4Dan Walsh 3.0.8-3Dan Walsh 3.0.8-2Dan Walsh 3.0.8-1Dan Walsh 3.0.7-10Dan Walsh 3.0.7-9Dan Walsh 3.0.7-8Dan Walsh 3.0.7-7Dan Walsh 3.0.7-6Dan Walsh 3.0.7-5Dan Walsh 3.0.7-4Dan Walsh 3.0.7-3Dan Walsh 3.0.7-2Dan Walsh 3.0.7-1Dan Walsh 3.0.6-3Dan Walsh 3.0.6-2Dan Walsh 3.0.6-1Dan Walsh 3.0.5-11Dan Walsh 3.0.5-10Dan Walsh 3.0.5-9Dan Walsh 3.0.5-8Dan Walsh 3.0.5-7Dan Walsh 3.0.5-6Dan Walsh 3.0.5-5Dan Walsh 3.0.5-4Dan Walsh 3.0.5-3Dan Walsh 3.0.5-2Dan Walsh 3.0.5-1Dan Walsh 3.0.4-6Dan Walsh 3.0.4-5Dan Walsh 3.0.4-4Dan Walsh 3.0.4-3Dan Walsh 3.0.4-2Dan Walsh 3.0.4-1Dan Walsh 3.0.3-6Dan Walsh 3.0.3-5Dan Walsh 3.0.3-4Dan Walsh 3.0.3-3Dan Walsh 3.0.3-2Dan Walsh 3.0.3-1Dan Walsh 3.0.2-9Dan Walsh 3.0.2-8Dan Walsh 3.0.2-7Dan Walsh 3.0.2-5Dan Walsh 3.0.2-4Dan Walsh 3.0.2-3Dan Walsh 3.0.2-2Dan Walsh 3.0.1-5Dan Walsh 3.0.1-4Dan Walsh 3.0.1-3Dan Walsh 3.0.1-2Dan Walsh 3.0.1-1Dan Walsh 2.6.5-3Dan Walsh 2.6.5-2Dan Walsh 2.6.4-7Dan Walsh 2.6.4-6Dan Walsh 2.6.4-5Dan Walsh 2.6.4-2Dan Walsh 2.6.4-1Dan Walsh 2.6.3-1Dan Walsh 2.6.2-1Dan Walsh 2.6.1-4Dan Walsh 2.6.1-2Dan Walsh 2.6.1-1Dan Walsh 2.5.12-12Dan Walsh 2.5.12-11Dan Walsh 2.5.12-10Dan Walsh 2.5.12-8Dan Walsh 2.5.12-5Dan Walsh 2.5.12-4Dan Walsh 2.5.12-3Dan Walsh 2.5.12-2Dan Walsh 2.5.12-1Dan Walsh 2.5.11-8Dan Walsh 2.5.11-7Dan Walsh 2.5.11-6Dan Walsh 2.5.11-5Dan Walsh 2.5.11-4Dan Walsh 2.5.11-3Dan Walsh 2.5.11-2Dan Walsh 2.5.11-1Dan Walsh 2.5.10-2Dan Walsh 2.5.10-1Dan Walsh 2.5.9-6Dan Walsh 2.5.9-5Dan Walsh 2.5.9-4Dan Walsh 2.5.9-3Dan Walsh 2.5.9-2Dan Walsh 2.5.8-8Dan Walsh 2.5.8-7Dan Walsh 2.5.8-6Dan Walsh 2.5.8-5Dan Walsh 2.5.8-4Dan Walsh 2.5.8-3Dan Walsh 2.5.8-2Dan Walsh 2.5.8-1Dan Walsh 2.5.7-1Dan Walsh 2.5.6-1Dan Walsh 2.5.5-2Dan Walsh 2.5.5-1Dan Walsh 2.5.4-2Dan Walsh 2.5.4-1Dan Walsh 2.5.3-3Dan Walsh 2.5.3-2Dan Walsh 2.5.3-1Dan Walsh 2.5.2-6Dan Walsh 2.5.2-5Dan Walsh 2.5.2-4Dan Walsh 2.5.2-3Dan Walsh 2.5.2-2Dan Walsh 2.5.2-1Dan Walsh 2.5.1-5Dan Walsh 2.5.1-4Dan Walsh 2.5.1-2Dan Walsh 2.5.1-1Dan Walsh 2.4.6-20Dan Walsh 2.4.6-19Dan Walsh 2.4.6-18Dan Walsh 2.4.6-17Dan Walsh 2.4.6-16Dan Walsh 2.4.6-15Dan Walsh 2.4.6-14Dan Walsh 2.4.6-13Dan Walsh 2.4.6-12Dan Walsh 2.4.6-11Dan Walsh 2.4.6-10Dan Walsh 2.4.6-9Dan Walsh 2.4.6-8Dan Walsh 2.4.6-7Dan Walsh 2.4.6-6Dan Walsh 2.4.6-5Dan Walsh 2.4.6-4Dan Walsh 2.4.6-3Dan Walsh 2.4.6-1Dan Walsh 2.4.5-4Dan Walsh 2.4.5-3Dan Walsh 2.4.5-2Dan Walsh 2.4.5-1Dan Walsh 2.4.4-2Dan Walsh 2.4.4-2Dan Walsh 2.4.4-1Dan Walsh 2.4.3-13Dan Walsh 2.4.3-12Dan Walsh 2.4.3-11Dan Walsh 2.4.3-10Dan Walsh 2.4.3-9Dan Walsh 2.4.3-8Dan Walsh 2.4.3-7Dan Walsh 2.4.3-6Dan Walsh 2.4.3-5Dan Walsh 2.4.3-4Dan Walsh 2.4.3-3Dan Walsh 2.4.3-2Dan Walsh 2.4.3-1Dan Walsh 2.4.2-8Dan Walsh 2.4.2-7James Antill 2.4.2-6Dan Walsh 2.4.2-5Dan Walsh 2.4.2-4Dan Walsh 2.4.2-3Dan Walsh 2.4.2-2Dan Walsh 2.4.2-1Dan Walsh 2.4.1-5Dan Walsh 2.4.1-4Dan Walsh 2.4.1-3Dan Walsh 2.4.1-2Dan Walsh 2.4-4Dan Walsh 2.4-3Dan Walsh 2.4-2Dan Walsh 2.4-1Dan Walsh 2.3.19-4Dan Walsh 2.3.19-3Dan Walsh 2.3.19-2Dan Walsh 2.3.19-1James Antill 2.3.18-10James Antill 2.3.18-9Dan Walsh 2.3.18-8Dan Walsh 2.3.18-7Dan Walsh 2.3.18-6Dan Walsh 2.3.18-5Dan Walsh 2.3.18-4Dan Walsh 2.3.18-3Dan Walsh 2.3.18-2Dan Walsh 2.3.18-1Dan Walsh 2.3.17-2Dan Walsh 2.3.17-1Dan Walsh 2.3.16-9Dan Walsh 2.3.16-8Dan Walsh 2.3.16-7Dan Walsh 2.3.16-6Dan Walsh 2.3.16-5Dan Walsh 2.3.16-4Dan Walsh 2.3.16-2Dan Walsh 2.3.16-1Dan Walsh 2.3.15-2Dan Walsh 2.3.15-1Dan Walsh 2.3.14-8Dan Walsh 2.3.14-7Dan Walsh 2.3.14-6Dan Walsh 2.3.14-4Dan Walsh 2.3.14-3Dan Walsh 2.3.14-2Dan Walsh 2.3.14-1Dan Walsh 2.3.13-6Dan Walsh 2.3.13-5Dan Walsh 2.3.13-4Dan Walsh 2.3.13-3Dan Walsh 2.3.13-2Dan Walsh 2.3.13-1Dan Walsh 2.3.12-2Dan Walsh 2.3.12-1Dan Walsh 2.3.11-1Dan Walsh 2.3.10-7Dan Walsh 2.3.10-6Dan Walsh 2.3.10-3Dan Walsh 2.3.10-1Dan Walsh 2.3.9-6Dan Walsh 2.3.9-5Dan Walsh 2.3.9-4Dan Walsh 2.3.9-3Dan Walsh 2.3.9-2Dan Walsh 2.3.9-1Dan Walsh 2.3.8-2Dan Walsh 2.3.7-1Dan Walsh 2.3.6-4Dan Walsh 2.3.6-3Dan Walsh 2.3.6-2Dan Walsh 2.3.6-1Dan Walsh 2.3.5-1Dan Walsh 2.3.4-1Dan Walsh 2.3.3-20Dan Walsh 2.3.3-19Dan Walsh 2.3.3-18Dan Walsh 2.3.3-17Dan Walsh 2.3.3-16Dan Walsh 2.3.3-15Dan Walsh 2.3.3-14Dan Walsh 2.3.3-13Dan Walsh 2.3.3-12Dan Walsh 2.3.3-11Dan Walsh 2.3.3-10Dan Walsh 2.3.3-9Dan Walsh 2.3.3-8Dan Walsh 2.3.3-7Dan Walsh 2.3.3-6Dan Walsh 2.3.3-5Dan Walsh 2.3.3-4Dan Walsh 2.3.3-3Dan Walsh 2.3.3-2Dan Walsh 2.3.3-1Dan Walsh 2.3.2-4Dan Walsh 2.3.2-3Dan Walsh 2.3.2-2Dan Walsh 2.3.2-1Dan Walsh 2.3.1-1Dan Walsh 2.2.49-1Dan Walsh 2.2.48-1Dan Walsh 2.2.47-5Dan Walsh 2.2.47-4Dan Walsh 2.2.47-3Dan Walsh 2.2.47-1Dan Walsh 2.2.46-2Dan Walsh 2.2.46-1Dan Walsh 2.2.45-3Dan Walsh 2.2.45-2Dan Walsh 2.2.45-1Dan Walsh 2.2.44-1Dan Walsh 2.2.43-4Dan Walsh 2.2.43-3Dan Walsh 2.2.43-2Dan Walsh 2.2.43-1Dan Walsh 2.2.42-4Dan Walsh 2.2.42-3Dan Walsh 2.2.42-2Dan Walsh 2.2.42-1Dan Walsh 2.2.41-1Dan Walsh 2.2.40-2Dan Walsh 2.2.40-1Dan Walsh 2.2.39-2Dan Walsh 2.2.39-1Dan Walsh 2.2.38-6Dan Walsh 2.2.38-5Dan Walsh 2.2.38-4Dan Walsh 2.2.38-3Dan Walsh 2.2.38-2Dan Walsh 2.2.38-1Dan Walsh 2.2.37-1Dan Walsh 2.2.36-2Dan Walsh 2.2.36-1James Antill 2.2.35-2Dan Walsh 2.2.35-1Dan Walsh 2.2.34-3Dan Walsh 2.2.34-2Dan Walsh 2.2.34-1Dan Walsh 2.2.33-1Dan Walsh 2.2.32-2Dan Walsh 2.2.32-1Dan Walsh 2.2.31-1Dan Walsh 2.2.30-2Dan Walsh 2.2.30-1Dan Walsh 2.2.29-6Russell Coker 2.2.29-5Dan Walsh 2.2.29-4Dan Walsh 2.2.29-3Dan Walsh 2.2.29-2Dan Walsh 2.2.29-1Dan Walsh 2.2.28-3Dan Walsh 2.2.28-2Dan Walsh 2.2.28-1Dan Walsh 2.2.27-1Dan Walsh 2.2.25-3Dan Walsh 2.2.25-2Dan Walsh 2.2.24-1Dan Walsh 2.2.23-19Dan Walsh 2.2.23-18Dan Walsh 2.2.23-17Karsten Hopp 2.2.23-16Dan Walsh 2.2.23-15Dan Walsh 2.2.23-14Dan Walsh 2.2.23-13Dan Walsh 2.2.23-12Jeremy Katz - 2.2.23-11Jeremy Katz - 2.2.23-10Dan Walsh 2.2.23-9Dan Walsh 2.2.23-8Dan Walsh 2.2.23-7Dan Walsh 2.2.23-5Dan Walsh 2.2.23-4Dan Walsh 2.2.23-3Dan Walsh 2.2.23-2Dan Walsh 2.2.23-1Dan Walsh 2.2.22-2Dan Walsh 2.2.22-1Dan Walsh 2.2.21-9Dan Walsh 2.2.21-8Dan Walsh 2.2.21-7Dan Walsh 2.2.21-6Dan Walsh 2.2.21-5Dan Walsh 2.2.21-4Dan Walsh 2.2.21-3Dan Walsh 2.2.21-2Dan Walsh 2.2.21-1Dan Walsh 2.2.20-1Dan Walsh 2.2.19-2Dan Walsh 2.2.19-1Dan Walsh 2.2.18-2Dan Walsh 2.2.18-1Dan Walsh 2.2.17-2Dan Walsh 2.2.16-1Dan Walsh 2.2.15-4Dan Walsh 2.2.15-3Dan Walsh 2.2.15-1Dan Walsh 2.2.14-2Dan Walsh 2.2.14-1Dan Walsh 2.2.13-1Dan Walsh 2.2.12-1Dan Walsh 2.2.11-2Dan Walsh 2.2.11-1Dan Walsh 2.2.10-1Dan Walsh 2.2.9-2Dan Walsh 2.2.9-1Dan Walsh 2.2.8-2Dan Walsh 2.2.7-1Dan Walsh 2.2.6-3Dan Walsh 2.2.6-2Dan Walsh 2.2.6-1Dan Walsh 2.2.5-1Dan Walsh 2.2.4-1Dan Walsh 2.2.3-1Dan Walsh 2.2.2-1Dan Walsh 2.2.1-1Dan Walsh 2.1.13-1Dan Walsh 2.1.12-3Dan Walsh 2.1.11-1Dan Walsh 2.1.10-1Jeremy Katz - 2.1.9-2Dan Walsh 2.1.9-1Dan Walsh 2.1.8-3Dan Walsh 2.1.8-2Dan Walsh 2.1.8-1Dan Walsh 2.1.7-4Dan Walsh 2.1.7-3Dan Walsh 2.1.7-2Dan Walsh 2.1.7-1Dan Walsh 2.1.6-24Dan Walsh 2.1.6-23Dan Walsh 2.1.6-22Dan Walsh 2.1.6-21Dan Walsh 2.1.6-20Dan Walsh 2.1.6-18Dan Walsh 2.1.6-17Dan Walsh 2.1.6-16Dan Walsh 2.1.6-15Dan Walsh 2.1.6-14Dan Walsh 2.1.6-13Dan Walsh 2.1.6-11Dan Walsh 2.1.6-10Dan Walsh 2.1.6-9Dan Walsh 2.1.6-8Dan Walsh 2.1.6-5Dan Walsh 2.1.6-4Dan Walsh 2.1.6-3Dan Walsh 2.1.6-2Dan Walsh 2.1.6-1Dan Walsh 2.1.4-2Dan Walsh 2.1.4-1Dan Walsh 2.1.3-1Jeremy Katz - 2.1.2-3Dan Walsh 2.1.2-2Dan Walsh 2.1.2-1Dan Walsh 2.1.1-3Dan Walsh 2.1.1-2Dan Walsh 2.1.1-1Dan Walsh 2.1.0-3Dan Walsh 2.1.0-2.Dan Walsh 2.1.0-1.Dan Walsh 2.0.11-2.Dan Walsh 2.0.11-1.Dan Walsh 2.0.9-1.Dan Walsh 2.0.8-1.Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.6-2Dan Walsh 2.0.5-4Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1- Allow virtlogd_t domain to chat via dbus with systemd_logind Resolves: rhbz#1593740- Allow virtlogd_t domain to write inhibit systemd pipes. Resolves: rhbz#1596730- Allow certmonger to sends emails Resolves: rhbz#1588363- Allow snapperd_t domain to unmount fs_t filesystems Resolves: rhbz#1561424- Allow snapperd_t to set priority for kernel processes Resolves: rhbz#1558656- Backport several changes for snapperdfrom Fedora Rawhide Resolves: rhbz#1558656- Label /usr/libexec/dbus-1/dbus-daemon-launch-helper as dbusd_exec_t to have systemd dbus services running in the correct domain instead of unconfined_service_t if unconfined.pp module is enabled. Resolves: rhbz#1546721- Allow openvswitch_t stream connect svirt_t Resolves: rhbz#1540702- Allow openvswitch domain to manage svirt_tmp_t sock files Resolves: rhbz#1540702 - Fix broken systemd_tmpfiles_run() interface- Allow dirsrv_t domain to create tmp link files Resolves: rhbz#1536011 - Label /usr/sbin/ldap-agent as dirsrv_snmp_exec_t Resolves: rhbz#1428568 - Allow ipsec_mgmt_t execute ifconfig_exec_t binaries - Allow ipsec_mgmt_t nnp domain transition to ifconfig_t Resolves: rhbz#1539416- Allow svirt_domain to create socket files in /tmp with label svirt_tmp_t Resolves: rhbz#1540702 - Allow keepalived_t domain getattr proc filesystem Resolves: rhbz#1477542 - Rename svirt_sandbox_file_t to container_file_t and svirt_lxc_net_t to container_t Resolves: rhbz#1538544 - Allow ipsec_t nnp transistions to domains ipsec_mgmt_t and ifconfig_t Resolves: rhbz:#1539416 - Allow systemd_logind_t domain to bind on dhcpd_port_t,pki_ca_port_t,flash_port_t Resolves: rhbz#1479350- Allow openvswitch_t domain to read cpuid, write to sysfs files and creating openvswitch_tmp_t sockets Resolves: rhbz#1535196 - Add new interface ppp_filetrans_named_content() Resolves: rhbz#1530601 - Allow keepalived_t read sysctl_net_t files Resolves: rhbz#1477542 - Allow puppetmaster_t domtran to puppetagent_t Resolves: rhbz#1376893 - Allow kdump_t domain to read kernel ring buffer Resolves: rhbz#1540004 - Allow ipsec_t domain to exec ifconfig_exec_t binaries. Resolves: rhbz#1539416 - Allow unconfined_domain_typ to create pppd_lock_t directory in /var/lock Resolves: rhbz#1530601 - Allow updpwd_t domain to create files in /etc with shadow_t label Resolves: rhbz#1412838 - Allow iptables sysctl load list support with SELinux enforced Resolves: rhbz#1535572- Allow virt_domains to acces infiniband pkeys. Resolves: rhbz#1533183 - Label /usr/libexec/ipsec/addconn as ipsec_exec_t to run this script as ipsec_t instead of init_t Resolves: rhbz#1535133 - Allow audisp_remote_t domain write to files on all levels Resolves: rhbz#1534924- Allow vmtools_t domain creating vmware_log_t files Resolves: rhbz#1507048 - Allow openvswitch_t domain to acces infiniband devices Resolves: rhbz#1532705- Allow chronyc_t domain to manage chronyd_keys_t files. Resolves: rhbz#1530525 - Make virtlog_t domain system dbus client Resolves: rhbz#1481109 - Update openvswitch SELinux module Resolves: rhbz#1482682 - Allow virtd_t to create also sock_files with label virt_var_run_t Resolves: rhbz#1484075- Allow domains that manage logfiles to man logdirs Resolves: rhbz#1523811- Label /dev/drm_dp_aux* as xserver_misc_device_t Resolves: rhbz#1520897 - Allow sysadm_t to run puppet_exec_t binaries as puppet_t Resolves: rhbz#1255745- Allow tomcat_t to manage pki_tomcat pid files Resolves: rhbz#1478371 - networkmanager: allow talking to openvswitch Resolves: rhbz#1517247 - Allow networkmanager_t and opensm_t to manage subned endports for IPoIB VLANs Resolves: rhbz#1517895 - Allow domains networkmanager_t and opensm_t to control IPoIB VLANs Resolves: rhbz#1517744 - Fix typo in guest interface file Resolves: rhbz#1468254 - Allow isnsd_t domain to accept tcp connections. Resolves: rhbz#1390208- Allow getty to use usbttys Resolves: rhbz#1514235- Allow ldap_t domain to manage also slapd_tmp_t lnk files Resolves: rhbz#1510883 - Allow cluster_t domain creating bundles directory with label var_log_t instead of cluster_var_log_t Resolves: rhbz:#1508360 - Add dac_read_search and dac_override capabilities to ganesha Resolves: rhbz#1483451- Add dependency for policycoreutils-2.5.18 becuase of new cgroup_seclabel policy capability Resolves: rhbz#1510145- Allow jabber domains to connect to postgresql ports Resolves: rhbz#1438489 - Dontaudit accountsd domain creating dirs in /root Resolves: rhbz#1456760 - Dontaudit slapd_t to block suspend system Resolves: rhbz: #1479759 - Allow spamc_t to stream connect to cyrus. Resolves: rhbz#1382955 - allow imapd to read /proc/net/unix file Resolves: rhbz#1393030 - Allow passenger to connect to mysqld_port_t Resolves: rhbz#1433464- Allow chronyc_t domain to use user_ptys Resolves: rhbz#1470150 - allow ptp4l to read /proc/net/unix file - Allow conmand to use usb ttys. Resolves: rhbz#1505121 - Label all files /var/log/opensm.* as opensm_log_t because opensm creating new log files with name opensm-subnet.lst Resolves: rhbz#1505845 - Allow chronyd daemon to execute chronyc. Resolves: rhbz#1508486 - Allow firewalld exec ldconfig. Resolves: rhbz#1375576 - Allow mozilla_plugin_t domain to dbus chat with devicekit Resolves: rhbz#1460477 - Dontaudit leaked logwatch pipes Resolves: rhbz#1450119 - Label /usr/bin/VGAuthService as vmtools_exec_t to confine this daemon. Resolves: rhbz#1507048 - Allow httpd_t domain to execute hugetlbfs_t files Resolves: rhbz#1507682 - Allow nfsd_t domain to read configfs_t files/dirs Resolves: rhbz#1439442 - Hide all allow rules with ptrace inside deny_ptrace boolean Resolves: rhbz#1421075 - Allow tgtd_t domain to read generic certs Resolves: rhbz#1438532 - Allow ptp4l to send msgs via dgram socket to unprivileged user domains Resolves: rhbz#1429853 - Allow dirsrv_snmp_t to use inherited user ptys and read system state Resolves: rhbz#1428568 - Allow glusterd_t domain to create own tmpfs dirs/files Resolves: rhbz#1411310 - Allow keepalived stream connect to snmp Resolves: rhbz#1401556 - After fix in kernel where LSM hooks for dac_override and dac_search_read capability was swaped we need to fix it also in policy Resolves: rhbz#1507089- Allow pegasus_openlmi_services_t to read generic certs Resolves: rhbz#1462292 - Allow ganesha_t domain to read random device Resolves: rhbz#1494382 - Allow zabbix_t domain to change its resource limits Resolves: rhbz:#1504074 - Add new boolean nagios_use_nfs Resolves: rhbz#1504826 - Allow system_mail_t to search network sysctls Resolves: rhbz#1505779 - Add samba_manage_var_dirs() interface - Fix typo bug in virt filecontext file - Allow nagios_script_t to read nagios_spool_t files Resolves: rhbz#1426824 - Allow samba to manage var dirs/files Resolves: rhbz#1415088 - Allow sbd_t to create own sbd_tmpfs_t dirs/files Resolves: rhbz#1380795 - Allow firewalld and networkmanager to chat with hypervkvp via dbus Resolves: rhbz#1377276 - Allow dmidecode to read rhsmcert_log_t files Resolves: rhbz#1300799 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow pegasus_openlmi_services_t to read generic certs Resolves: rhbz#1462292 - Allow ganesha_t domain to read random device Resolves: rhbz#1494382 - Allow zabbix_t domain to change its resource limits Resolves: rhbz:#1504074 - Add new boolean nagios_use_nfs Resolves: rhbz#1504826 - Allow system_mail_t to search network sysctls Resolves: rhbz#1505779 - Add samba_manage_var_dirs() interface - Fix typo bug in virt filecontext file - Allow nagios_script_t to read nagios_spool_t files Resolves: rhbz#1426824 - Allow samba to manage var dirs/files Resolves: rhbz#1415088 - Allow sbd_t to create own sbd_tmpfs_t dirs/files Resolves: rhbz#1380795 - Allow firewalld and networkmanager to chat with hypervkvp via dbus Resolves: rhbz#1377276 - Allow dmidecode to read rhsmcert_log_t files Resolves: rhbz#1300799 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow chronyd_t do request kernel module and block_suspend capability Resolves: rhbz#1350765 - Allow system_cronjob_t to create /var/lib/letsencrypt dir with right label Resolves: rhbz#1447278 - Allow httpd_t also read httpd_user_content_type dirs when httpd_enable_homedirs is enables Resolves: rhbz#1491994 - Allow svnserve to use kerberos Resolves: rhbz#1475271 - Allow conman to use ptmx. Add conman_use_nfs boolean Resolves: rhbz#1377915 - Add nnp transition for services using: NoNewPrivileges systemd security feature Resolves: rhbz#1311430 - Add SELinux support for chronyc Resolves: rhbz#1470150 - Add dac_read_search capability to openvswitch_t domain Resolves: rhbz#1501336 - Allow svnserve to manage own svnserve_log_t files/dirs Resolves: rhbz#1480741 - Allow keepalived_t to search network sysctls Resolves: rhbz#1477542 - Allow puppetagent_t domain dbus chat with rhsmcertd_t domain Resolves: rhbz#1446777 - Add dccp_socket into socker_class_set subset Resolves: rhbz#1459941 - Allow iptables_t to run setfiles to restore context on system Resolves: rhbz#1489118 - Label 20514 tcp/udp ports as syslogd_port_t Label 10514 tcp/udp portas as syslog_tls_port_t Resolves: rhbz:#1411400 - Make nnp transition Active Resolves: rhbz#1480518 - Label tcp 51954 as isns_port_t Resolves: rhbz#1390208 - Add dac_read_search capability chkpwd_t Resolves: rhbz#1376991 - Add support for running certbot(letsencrypt) in crontab Resolves: rhbz#1447278 - Add init_nnp_daemon_domain interface - Allow xdm_t to gettattr /dev/loop-control device Resolves: rhbz#1462925 - Allow nnp trasintion for unconfined_service_t Resolves: rhbz#1311430 - Allow unpriv user domains and unconfined_service_t to use chronyc Resolves: rhbz#1470150 - Allow iptables to exec plymouth. Resolves: rhbz#1480374 - Fix typo in fs_unmount_tracefs interface. Resolves: rhbz#1371057 - Label postgresql-check-db-dir as postgresql_exec_t Resolves: rhbz#1490956- We should not ship selinux-policy with permissivedomains enabled. Resolves: rhbz#1494172 - Fix order of installing selinux-policy-sandbox, because of depedencied in sandbox module, selinux-policy-targeted needs to be installed before selinux-policy-sandbox Resolves: rhbz#1492606- Allow tomcat to setsched Resolves: rhbz#1492730 - Fix rules blocking ipa-server upgrade process Resolves: rhbz#1478371 - Add new boolean tomcat_read_rpm_db() Resolves: rhbz#1477887 - Allow tomcat to connect on mysqld tcp ports - Add ctdbd_t domain sys_source capability and allow setrlimit Resolves: rhbz#1491235 - Fix keepalived SELinux module - Allow automount domain to manage mount pid files Resolves: rhbz#1482381 - Allow stunnel_t domain setsched Resolves: rhbz#1479383 - Add keepalived domain setpgid capability Resolves: rhbz#1486638 - Allow tomcat domain to connect to mssql port Resolves: rhbz#1484572 - Remove snapperd_t from unconfined domaines Resolves: rhbz#1365555 - Fix typo bug in apache module Resolves: rhbz#1397311 - Dontaudit that system_mail_t is trying to read /root/ files Resolves: rhbz#1147945 - Make working webadm_t userdomain Resolves: rhbz#1323792 - Allow redis domain to execute shell scripts. Resolves: rhbz#1421326 - Allow system_cronjob_t to create redhat-access-insights.log with var_log_t Resolves: rhbz#1473303 - Add couple capabilities to keepalived domain and allow get attributes of all domains Resolves: rhbz#1429327 - Allow dmidecode read rhsmcertd lock files Resolves: rhbz#1300799 - Add new interface rhsmcertd_rw_lock_files() Resolves: rhbz#1300799 - Label all plymouthd archives as plymouthd_var_log_t Resolves: rhbz#1478323 - Allow cloud_init_t to dbus chat with systemd_timedated_t Resolves: rhbz#1440730 - Allow logrotate_t to write to kmsg Resolves: rhbz#1397744 - Add capability kill to rhsmcertd_t Resolves: rhbz#1398338 - Disable mysqld_safe_t secure mode environment cleansing. Resolves: rhbz#1464063 - Allow winbind to manage smbd_tmp_t files Resolves: rhbz#1475566 - Dontaudit that system_mail_t is trying to read /root/ files Resolves: rhbz#1147945 - Make working webadm_t userdomain Resolves: rhbz#1323792 - Allow redis domain to execute shell scripts. Resolves: rhbz#1421326 - Allow system_cronjob_t to create redhat-access-insights.log with var_log_t Resolves: rhbz#1473303 - Add couple capabilities to keepalived domain and allow get attributes of all domains Resolves: rhbz#1429327 - Allow dmidecode read rhsmcertd lock files Resolves: rhbz#1300799 - Add new interface rhsmcertd_rw_lock_files() Resolves: rhbz#1300799 - Label all plymouthd archives as plymouthd_var_log_t Resolves: rhbz#1478323 - Allow cloud_init_t to dbus chat with systemd_timedated_t Resolves: rhbz#1440730 - Allow logrotate_t to write to kmsg Resolves: rhbz#1397744 - Add capability kill to rhsmcertd_t Resolves: rhbz#1398338 - Disable mysqld_safe_t secure mode environment cleansing. Resolves: rhbz#1464063 - Allow winbind to manage smbd_tmp_t files Resolves: rhbz#1475566 - Add interface systemd_tmpfiles_run - End of file cannot be in comment - Allow systemd-logind to use ypbind Resolves: rhbz#1479350 - Add creating opasswd file with shadow_t SELinux label in auth_manage_shadow() interface Resolves: rhbz#1412838 - Allow sysctl_irq_t assciate with proc_t Resolves: rhbz#1485909 - Enable cgourp sec labeling Resolves: rhbz#1485947 - Add cgroup_seclabel policycap. Resolves: rhbz#1485947 - Allow sshd_t domain to send signull to xdm_t processes Resolves: rhbz#1448959 - Allow updpwd_t domain auth file name trans Resolves: rhbz#1412838 - Allow sysadm user to run systemd-tmpfiles Resolves: rbhz#1325364 - Add support labeling for vmci and vsock device Resolves: rhbz#1451358 - Add userdom_dontaudit_manage_admin_files() interface Resolves: rhbz#1323792 - Allow iptables_t domain to read files with modules_conf_t label Resolves: rhbz#1373220 - init: Add NoNewPerms support for systemd. Resolves: rhbz#1480518 - Add nnp_nosuid_transition policycap and related class/perm definitions. Resolves: rhbz#1480518 - refpolicy: Infiniband pkeys and endports Resolves: rhbz#1464484- Allow certmonger using systemctl on pki_tomcat unit files Resolves: rhbz#1481388- Allow targetd_t to create own tmp files. - Dontaudit targetd_t to exec rpm binary file. Resolves: rhbz#1373860 Resolves: rhbz#1424621- Add few rules to make working targetd daemon with SELinux Resolves: rhbz#1373860 - Allow ipmievd_t domain to load kernel modules Resolves: rhbz#1441081 - Allow logrotate to reload transient systemd unit Resolves: rhbz#1440515 - Add certwatch_t domain dac_override and dac_read_search capabilities Resolves: rhbz#1422000 - Allow postgrey to execute bin_t files and add postgrey into nsswitch_domain Resolves: rhbz#1412072 - Allow nscd_t domain to search network sysctls Resolves: rhbz#1432361 - Allow iscsid_t domain to read mount pid files Resolves: rhbz#1482097 - Allow ksmtuned_t domain manage sysfs_t files/dirs Resolves: rhbz#1413865 - Allow keepalived_t domain domtrans into iptables_t Resolves: rhbz#1477719 - Allow rshd_t domain reads net sysctls Resolves: rhbz#1477908 - Add interface seutil_dontaudit_read_module_store() - Update interface lvm_rw_pipes() by adding also open permission - Label /dev/clp device as vfio_device_t Resolves: rhbz#1477624 - Allow ifconfig_t domain unmount fs_t Resolves: rhbz#1477445 - Label /dev/gpiochip* devices as gpio_device_t Resolves: rhbz#1477618 - Add interface dev_manage_sysfs() Resolves: rhbz#1474989- Label /usr/libexec/sudo/sesh as shell_exec_t Resolves: rhbz#1480791- Allow tomcat_t domain couple capabilities to make working tomcat-jsvc Resolves: rhbz#1470735- Allow llpdad send dgram to libvirt Resolves: rhbz#1472722- Add new boolean gluster_use_execmem Resolves: rhbz#1469027 - Allow cluster_t and glusterd_t domains to dbus chat with ganesha service Resolves: rhbz#1468581- Dontaudit staff_t user read admin_home_t files. Resolves: rhbz#1290633- Allow couple rules needed to start targetd daemon with SELinux in enforcing mode Resolves: rhbz#1424621 - Add interface lvm_manage_metadata Resolves: rhbz#1424621- Allow sssd_t to read realmd lib files. Resolves: rhbz#1436689 - Add permission open to files_read_inherited_tmp_files() interface Resolves: rhbz#1290633 Resolves: rhbz#1457106- Allow unconfined_t user all user namespace capabilties. Resolves: rhbz#1461488- Allow httpd_t to read realmd_var_lib_t files Resolves: rhbz#1436689- Allow named_t to bind on udp 4321 port Resolves: rhbz#1312972 - Allow systemd-sysctl cap. sys_ptrace Resolves: rhbz#1458999- Allow pki_tomcat_t execute ldconfig. Resolves: rhbz#1436689- Allow iscsi domain load kernel module. Resolves: rhbz#1457874 - Allow keepalived domain connect to squid tcp port Resolves: rhbz#1457455 - Allow krb5kdc_t domain read realmd lib files. Resolves: rhbz#1436689 - xdm_t should view kernel keys Resolves: rhbz#1432645- Allow tomcat to connect on all unreserved ports - Allow ganesha to connect to all rpc ports Resolves: rhbz#1448090 - Update ganesha with another fixes. Resolves: rhbz#1448090 - Update rpc_read_nfs_state_data() interface to allow read also lnk_files. Resolves: rhbz#1448090 - virt_use_glusterd boolean should be in optional block Update ganesha module to allow create tmp files Resolves: rhbz#1448090 - Hide broken symptoms when machine is configured with network bounding.- Add new boolean virt_use_glusterd Resolves: rhbz#1455994 - Add capability sys_boot for sbd_t domain - Allow sbd_t domain to create rpc sysctls. Resolves: rhbz#1455631 - Allow ganesha_t domain to manage glusterd_var_run_t pid files. Resolves: rhbz#1448090- Create new interface: glusterd_read_lib_files() - Allow ganesha read glusterd lib files. - Allow ganesha read network sysctls Resolves: rhbz#1448090- Add few allow rules to ganesha module Resolves: rhbz#1448090 - Allow condor_master_t to read sysctls. Resolves: rhbz#1277506 - Add dac_override cap to ctdbd_t domain Resolves: rhbz#1435708 - Label 8750 tcp/udp port as dey_keyneg_port_t Resolves: rhbz#1448090- Add ganesha_use_fusefs boolean. Resolves: rhbz#1448090- Allow httpd_t reading kerberos kdc config files Resolves: rhbz#1452215 - Allow tomcat_t domain connect to ibm_dt_2 tcp port. Resolves: rhbz#1447436 - Allow stream connect to initrc_t domains Resolves: rhbz#1447436 - Allow dnsmasq_t domain to read systemd-resolved pid files. Resolves: rhbz#1453114 - Allow tomcat domain name_bind on tcp bctp_port_t Resolves: rhbz#1451757 - Allow smbd_t domain generate debugging files under /var/run/gluster. These files are created through the libgfapi.so library that provides integration of a GlusterFS client in the Samba (vfs_glusterfs) process. Resolves: rhbz#1447669 - Allow condor_master_t write to sysctl_net_t Resolves: rhbz#1277506 - Allow nagios check disk plugin read /sys/kernel/config/ Resolves: rhbz#1277718 - Allow pcp_pmie_t domain execute systemctl binary Resolves: rhbz#1271998 - Allow nagios to connect to stream sockets. Allow nagios start httpd via systemctl Resolves: rhbz#1247635 - Label tcp/udp port 1792 as ibm_dt_2_port_t Resolves: rhbz#1447436 - Add interface fs_read_configfs_dirs() - Add interface fs_read_configfs_files() - Fix systemd_resolved_read_pid interface - Add interface systemd_resolved_read_pid() Resolves: rhbz#1453114 - Allow sshd_net_t domain read/write into crypto devices Resolves: rhbz#1452759 - Label 8999 tcp/udp as bctp_port_t Resolves: rhbz#1451757- nmbd_t needs net_admin capability like smbd Resolves: rhbz#1431859 - Dontaudit net_admin capability for domains postfix_master_t and postfix_qmgr_t Resolves: rhbz#1431859 - Allow rngd domain read sysfs_t Resolves: rhbz#1451735 - Add interface pki_manage_common_files() Resolves: rhbz#1447436 - Allow tomcat_t domain to manage pki_common_t files and dirs Resolves: rhbz#1447436 - Use stricter fc rules for sssd sockets in /var/run Resolves: rhbz#1448060 - Allow certmonger reads httpd_config_t files Resolves: rhbz#1436689 - Allow keepalived_t domain creating netlink_netfilter_socket. Resolves: rhbz#1451684 - Allow tomcat domain read rpm_var_lib_t files Allow tomcat domain exec rpm_exec_t files Allow tomcat domain name connect on oracle_port_t Allow tomcat domain read cobbler_var_lib_t files. Resolves: rhbz#1451318 - Make able deply overcloud via neutron_t to label nsfs as fs_t Resolves: rhbz#1373321- Allow tomcat domain read rpm_var_lib_t files Allow tomcat domain exec rpm_exec_t files Allow tomcat domain name connect on oracle_port_t Allow tomcat domain read cobbler_var_lib_t files. Resolves: rhbz#1451318 - Allow sssd_t domain creating sock files labeled as sssd_var_run_t in /var/run/ Resolves: rhbz#1448056 Resolves: rhbz#1448060 - Allow tomcat_domain connect to * postgresql_port_t * amqp_port_t Allow tomcat_domain read network sysctls Resolves: rhbz#1450819 - Make able deply overcloud via neutron_t to label nsfs as fs_t Resolves: rhbz#1373321 - Allow netutils setpcap capability Resolves:1444438- Update targetd policy to accommodate changes in the service Resolves: rhbz#1424621 - Allow tomcat_domain connect to * postgresql_port_t * amqp_port_t Allow tomcat_domain read network sysctls Resolves: rhbz#1450819 - Update virt_rw_stream_sockets_svirt() interface to allow confined users set socket options. Resolves: rhbz#1415841 - Allow radius domain stream connec to postgresql Resolves: rhbz#1446145 - Allow virt_domain to read raw fixed_disk_device_t to make working blockcommit Resolves: rhbz#1449977 - Allow glusterd_t domain start ganesha service Resolves: rhbz#1448090 - Made few cosmetic changes in sssd SELinux module Resolves: rhbz#1448060 - sssd-kcm should not run as unconfined_service_t BZ(1447411) Resolves: rhbz#1448060 - Add sssd_secrets labeling Also add named_filetrans interface to make sure all labels are correct Resolves: rhbz#1448056 - Allow keepalived_t domain read usermodehelper_t Resolves: rhbz#1449769 - Allow tomcat_t domain read pki_common_t files Resolves: rhbz#1447436 - Add interface pki_read_common_files() Resolves: rhbz#1447436- Allow hypervkvp_t domain execute hostname Resolves: rhbz#1449064 - Dontaudit sssd_selinux_manager_t use of net_admin capability Resolves: rhbz#1444955 - Allow tomcat_t stream connect to pki_common_t Resolves: rhbz#1447436 - Dontaudit xguest_t's attempts to listen to its tcp_socket - Allow sssd_selinux_manager_t to ioctl init_t sockets Resolves: rhbz#1436689 - Allow _su_t to create netlink_selinux_socket Resolves rhbz#1146987 - Allow unconfined_t to module_load any file Resolves rhbz#1442994- Improve ipa_cert_filetrans_named_content() interface to also allow caller domain manage ipa_cert_t type. Resolves: rhbz#1436689- Allow pki_tomcat_t domain read /etc/passwd. Resolves: rhbz#1436689 - Allow tomcat_t domain read ipa_tmp_t files Resolves: rhbz#1436689 - Label new path for ipa-otpd Resolves: rhbz#1446353 - Allow radiusd_t domain stream connect to postgresql_t Resolves: rhbz#1446145 - Allow rhsmcertd_t to execute hostname_exec_t binaries. Resolves: rhbz#1445494 - Allow virtlogd to append nfs_t files when virt_use_nfs=1 Resolves: rhbz#1402561- Update tomcat policy to adjust for removing unconfined_domain attr. Resolves: rhbz#1432083 - Allow httpd_t domain read also httpd_user_content_type lnk_files. Resolves: rhbz#1383621 - Allow httpd_t domain create /etc/httpd/alias/ipaseesion.key with label ipa_cert_t Resolves: rhbz#1436689 - Dontaudit _gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Label /var/www/html/nextcloud/data as httpd_sys_rw_content_t Resolves: rhbz#1425530 - Add interface ipa_filetrans_named_content() Resolves: rhbz#1432115 - Allow tomcat use nsswitch Resolves: rhbz#1436689 - Allow certmonger_t start/status generic services Resolves: rhbz#1436689 - Allow dirsrv read cgroup files. Resolves: rhbz#1436689 - Allow ganesha_t domain read/write infiniband devices. Resolves: rhbz#1383784 - Allow sendmail_t domain sysctl_net_t files Resolves: rhbz#1369376 - Allow targetd_t domain read network state and getattr on loop_control_device_t Resolves: rhbz#1373860 - Allow condor_schedd_t domain send mails. Resolves: rhbz#1277506 - Alow certmonger to create own systemd unit files. Resolves: rhbz#1436689 - Allow staff to systemctl virt server when staff_use_svirt=1 Resolves: rhbz#1415841 - Allow unconfined_t create /tmp/ca.p12 file with ipa_tmp_t context Resolves: rhbz#1432115 - Label /sysroot/ostree/deploy/rhel-atomic-host/* as root_t Resolves: rhbz#1428112- Alow certmonger to create own systemd unit files. Resolves: rhbz#1436689- Hide broken symptoms when using kernel 3.10.0-514+ with network bonding. Postfix_picup_t domain requires NET_ADMIN capability which is not really needed. Resolves: rhbz#1431859 - Fix policy to reflect all changes in new IPA release Resolves: rhbz#1432115 Resolves: rhbz#1436689- Allow sbd_t to read/write fixed disk devices Resolves: rhbz#1440165 - Add sys_ptrace capability to radiusd_t domain Resolves: rhbz#1426641 - Allow cockpit_session_t domain connects to ssh tcp ports. Resolves: rhbz#1413509- Update tomcat policy to make working ipa install process Resolves: rhbz#1436689- Allow pcp_pmcd_t net_admin capability. - Allow pcp_pmcd_t read net sysctls - Allow system_cronjob_t create /var/run/pcp with pcp_var_run_t Resolves: rhbz#1336211- Fix all AVC denials during pkispawn of CA Resolves: rhbz#1436383 - Update pki interfaces and tomcat module Resolves: rhbz#1436689- Update pki interfaces and tomcat module Resolves: rhbz#1436689- Dontaudit firewalld wants write to /root Resolves: rhbz#1438708 - Dontaudit firewalld to create dirs in /root/ Resolves: rhbz#1438708 - Allow sendmail to search network sysctls Resolves: rhbz#1369376 - Add interface gssd_noatsecure() Resolves: rhbz#1438036 - Add interface gssproxy_noatsecure() Resolves: rhbz#1438036 - Dontaudit pcp_pmlogger_t search for xserver logs. Allow pcp_pmlogger_t to send signals to unconfined doamins Allow pcp_pmlogger_t to send logs to journals Resolves: rhbz#1379371 - Allow chronyd_t net_admin capability to allow support HW timestamping. Resolves: rhbz#1416015 - Update tomcat policy Resolves: rhbz#1436689 Resolves: rhbz#1436383 - Allow certmonger to start haproxy service Resolves: rhbz#1349394 - Allow init noatsecure for gssd and gssproxy Resolves: rhbz#1438036- geoclue wants to dbus chat with avahi Resolves: rhbz#1434286 - Allow iptables get list of kernel modules Resolves: rhbz#1367520 - Allow unconfined_domain_type to enable/disable transient unit Resolves: rhbz#1337041 - Add interfaces init_enable_transient_unit() and init_disable_transient_unit - Revert "Allow sshd setcap capability. This is needed due to latest changes in sshd" Resolves: rhbz#1435264 - Label sysroot dir under ostree as root_t Resolves: rhbz#1428112- Remove ganesha_t domain from permissive domains. Resolves: rhbz#1436988- Allow named_t domain bind on several udp ports Resolves: rhbz#1312972 - Update nscd_use() interface Resolves: rhbz#1281716 - Allow radius_t domain ptrace Resolves: rhbz#1426641 - Update nagios to allos exec systemctl Resolves: rhbz#1247635 - Update pcp SELinux module to reflect all pcp changes Resolves: rhbz#1271998 - Label /var/lib/ssl_db as squid_cache_t Label /etc/squid/ssl_db as squid_cache_t Resolves: rhbz#1325527 - Allow pcp_pmcd_t domain search for network sysctl Allow pcp_pmcd_t domain sys_ptrace capability Resolves: rhbz#1336211- Allow drbd load modules Resolves: rhbz#1134883 - Revert "Add sys_module capability for drbd Resolves: rhbz#1134883" - Allow stapserver list kernel modules Resolves: rhbz#1325976 - Update targetd policy Resolves: rhbz#1373860 - Add sys_admin capability to amanda Resolves: rhbz#1371561 - Allow hypervvssd_t to read all dirs. Resolves: rhbz#1331309 - Label /run/haproxy.sock socket as haproxy_var_run_t Resolves: rhbz#1386233 - Allow oddjob_mkhomedir_t to mamange autofs_t dirs. Resolves: rhbz#1408819 - Allow tomcat to connect on http_cache_port_t Resolves: rhbz#1432083 - Allow geoclue to send msgs to syslog. Resolves: rhbz#1434286 - Allow condor_master_t domain capability chown. Resolves: rhbz#1277506 - Update mta_filetrans_named_content() interface to allow calling domain create files labeled as etc_aliases_t in dir labeled as etc_mail_t. Resolves: rhbz#1167468 - Allow nova domain search for httpd configuration. Resolves: rhbz#1190761 - Add sys_module capability for drbd Resolves: rhbz#1134883 - Allow user_u users stream connect to dirsrv, Allow sysadm_u and staff_u users to manage dirsrv files Resolves: rhbz#1286474 - Allow systemd_networkd_t communicate with systemd_networkd_t via dbus Resolves: rhbz#1278010- Add haproxy_t domain fowner capability Resolves: rhbz#1386233 - Allow domain transition from ntpd_t to hwclock_t domains Resolves: rhbz#1375624 - Allow cockpit_session_t setrlimit and sys_resource Resolves: rhbz#1402316 - Dontaudit svirt_t read state of libvirtd domain Resolves: rhbz#1426106 - Update httpd and gssproxy modules to reflects latest changes in freeipa Resolves: rhbz#1432115 - Allow iptables read modules_conf_t Resolves: rhbz#1367520- Remove tomcat_t domain from unconfined domains Resolves: rhbz#1432083 - Create new boolean: sanlock_enable_home_dirs() Resolves: rhbz#1432783 - Allow mdadm_t domain to read/write nvme_device_t Resolves: rhbz#1431617 - Remove httpd_user_*_content_t domains from user_home_type attribute. This tighten httpd policy and acces to user data will be more strinct, and also fix mutual influente between httpd_enable_homedirs and httpd_read_user_content Resolves: rhbz#1383621 - Dontaudit domain to create any file in /proc. This is kernel bug. Resolves: rhbz#1412679 - Add interface dev_rw_nvme Resolves: rhbz#1431617- Allow gssproxy to get attributes on all filesystem object types. Resolves: rhbz#1430295 - Allow ganesha to chat with unconfined domains via dbus Resolves: rhbz#1426554 - add the policy required for nextcloud Resolves: rhbz#1425530 - Add nmbd_t capability2 block_suspend Resolves: rhbz#1425357 - Label /var/run/chrony as chronyd_var_run_t Resolves: rhbz#1416015 - Add domain transition from sosreport_t to iptables_t Resolves: rhbz#1359789 - Fix path to /usr/lib64/erlang/erts-5.10.4/bin/epmd Resolves: rhbz:#1332803- Update rpm macros Resolves: rhbz#1380854- Add handling booleans via selinux-policy macros in custom policy spec files. Resolves: rhbz#1380854- Allow openvswitch to load kernel modules Resolves: rhbz#1405479- Allow openvswitch read script state. Resolves: rhbz#1405479- Update ganesha policy Resolves: rhbz#1426554 Resolves: rhbz#1383784 - Allow chronyd to read adjtime Resolves: rhbz#1416015 - Fixes for chrony version 2.2 Resolves: rhbz#1416015 - Add interface virt_rw_stream_sockets_svirt() Resolves: rhbz#1415841 - Label /dev/ss0 as gpfs_device_t Resolves: rhbz#1383784 - Allow staff to rw svirt unix stream sockets. Resolves: rhbz#1415841 - Label /rhev/data-center/mnt as mnt_t Resolves: rhbz#1408275 - Associate sysctl_rpc_t with proc filesystems Resolves: rhbz#1350927 - Add new boolean: domain_can_write_kmsg Resolves: rhbz#1415715- Allow rhsmcertd_t dbus chat with system_cronjob_t Resolves: rhbz#1405341 - Allow openvswitch exec hostname and readinitrc_t files Resolves: rhbz#1405479 - Improve SELinux context for mysql_db_t objects. Resolves: rhbz#1391521 - Allow postfix_postdrop to communicate with postfix_master via pipe. Resolves: rhbz#1379736 - Add radius_use_jit boolean Resolves: rhbz#1426205 - Label /var/lock/subsys/iptables as iptables_lock_t Resolves: rhbz#1405441 - Label /usr/lib64/erlang/erts-5.10.4/bin/epmd as lib_t Resolves: rhbz#1332803 - Allow can_load_kernmodule to load kernel modules. Resolves: rhbz#1423427 Resolves: rhbz#1424621- Allow nfsd_t domain to create sysctls_rpc_t files Resolves: rhbz#1405304 - Allow openvswitch to create netlink generic sockets. Resolves: rhbz#1397974 - Create kernel_create_rpc_sysctls() interface Resolves: rhbz#1405304- Allow nfsd_t domain rw sysctl_rpc_t dirs Resolves: rhbz#1405304 - Allow cgdcbxd_t to manage cgroup files. Resolves: rhbz#1358493 - Allow cmirrord_t domain to create netlink_connector sockets Resolves: rhbz#1412670 - Allow fcoemon to create netlink scsitransport sockets Resolves: rhbz#1362496 - Allow quota_nld_t create netlink_generic sockets Resolves: rhbz#1358679 - Allow cgred_t create netlink_connector sockets Resolves: rhbz#1376357 - Add dhcpd_t domain fowner capability Resolves: rhbz#1358485 - Allow acpid to attempt to connect to the Linux kernel via generic netlink socket. Resolves: rhbz#1358478 - Rename docker module to container module Resolves: rhbz#1386916 - Allow setflies to mount tracefs Resolves: rhbz#1376357 - Allow iptables to read nsfs files. Resolves: rhbz#1411316 - Allow systemd_bootchart_t domain create dgram sockets. Resolves: rhbz#1365953 - Rename docker interfaces to container Resolves: rhbz#1386916- Allow initrc_t domain to run rhel-autorelabel script properly during boot process Resolves: rhbz#1379722 - Allow systemd_initctl_t to create and connect unix_dgram sockets Resolves: rhbz#1365947 - Allow ifconfig_t to mount/unmount nsfs_t filesystem Resolves: rhbz#1349814 - Add interfaces allowing mount/unmount nsfs_t filesystem Resolves: rhbz#1349814- Add interface init_stream_connectto() Resolves:rhbz#1365947 - Allow rhsmcertd domain signull kernel. Resolves: rhbz#1379781 - Allow kdumpgui domain to read nvme device - Allow insmod_t to load kernel modules Resolves: rhbz#1421598 - Add interface files_load_kernel_modules() Resolves: rhbz#1421598 - Add SELinux support for systemd-initctl daemon Resolves:rhbz#1365947 - Add SELinux support for systemd-bootchart Resolves: rhbz#1365953- Allow firewalld to getattr open search read modules_object_t:dir Resolves: rhbz#1418391 - Fix label for nagios plugins in nagios file conxtext file Resolves: rhbz#1277718 - Add sys_ptrace capability to pegasus domain Resolves: rhbz#1381238 - Allow sssd_t domain setpgid Resolves:rhbz#1416780 - After the latest changes in nfsd. We should allow nfsd_t to read raw fixed disk. Resolves: rhbz#1350927 - Allow kdumpgui domain to read nvme device Resolves: rhbz#1415084 - su using libselinux and creating netlink_selinux socket is needed to allow libselinux initialization. Resolves: rhbz#1146987 - Add user namespace capability object classes. Resolves: rhbz#1368057 - Add module_load permission to class system Resolves:rhbz#1368057 - Add the validate_trans access vector to the security class Resolves: rhbz#1368057 - Add "binder" security class and access vectors Resolves: rhbz#1368057 - Allow ifconfig_t domain read nsfs_t Resolves: rhbz#1349814 - Allow ping_t domain to load kernel modules. Resolves: rhbz#1388363- Allow systemd container to read/write usermodehelperstate Resolves: rhbz#1403254 - Label udp ports in range 24007-24027 as gluster_port_t Resolves: rhbz#1404152- Allow glusterd_t to bind on glusterd_port_t udp ports. Resolves: rhbz#1404152 - Revert: Allow glusterd_t to bind on med_tlp port.- Allow glusterd_t to bind on med_tlp port. Resolves: rhbz#1404152 - Update ctdbd_t policy to reflect all changes. Resolves: rhbz#1402451 - Label tcp port 24009 as med_tlp_port_t Resolves: rhbz#1404152 - Issue appears during update directly from RHEL-7.0 to RHEL-7.3 or above. Modules pkcsslotd and vbetools missing in selinux-policy package for RHEL-7.3 which causing warnings during SELinux policy store migration process. Following patch fixes issue by skipping pkcsslotd and vbetools modules migration.- Allow ctdbd_t domain transition to rpcd_t Resolves:rhbz#1402451- Fixes for containers Allow containers to attempt to write to unix_sysctls. Allow cotainers to use the FD's leaked to them from parent processes. Resolves: rhbz#1403254- Allow glusterd_t send signals to userdomain. Label new glusterd binaries as glusterd_exec_t Resolves: rhbz#1404152 - Allow systemd to stop glusterd_t domains. Resolves: rhbz#1400493- Make working CTDB:NFS: CTDB failover from selinux-policy POV Resolves: rhbz#1402451- Add kdump_t domain sys_admin capability Resolves: rhbz#1375963- Allow puppetagent_t to access timedated dbus. Use the systemd_dbus_chat_timedated interface to allow puppetagent_t the access. Resolves: rhbz#1399250- Update systemd on RHEL-7.2 box to version from RHEL-7.3 and then as a separate yum command update the selinux policy systemd will start generating USER_AVC denials and will start returning "Access Denied" errors to DBus clients Resolves: rhbz#1393505- Allow cluster_t communicate to fprintd_t via dbus Resolves: rhbz#1349798- Fix error message during update from RHEL-7.2 to RHEL-7.3, when /usr/sbin/semanage command is not installed and selinux-policy-migrate-local-changes.sh script is executed in %post install phase of selinux-policy package Resolves: rhbz#1392010- Allow GlusterFS with RDMA transport to be started correctly. It requires ipc_lock capability together with rw permission on rdma_cm device. Resolves: rhbz#1384488 - Allow glusterd to get attributes on /sys/kernel/config directory. Resolves: rhbz#1384483- Use selinux-policy-migrate-local-changes.sh instead of migrateStore* macros - Add selinux-policy-migrate-local-changes service Resolves: rhbz#1381588- Allow sssd_selinux_manager_t to manage also dir class. Resolves: rhbz#1368097 - Add interface seutil_manage_default_contexts_dirs() Resolves: rhbz#1368097- Add virt_sandbox_use_nfs -> virt_use_nfs boolean substitution. Resolves: rhbz#1355783- Allow pcp_pmcd_t domain transition to lvm_t Add capability kill and sys_ptrace to pcp_pmlogger_t Resolves: rhbz#1309883- Allow ftp daemon to manage apache_user_content Resolves: rhbz#1097775 - Label /etc/sysconfig/oracleasm as oracleasm_conf_t Resolves: rhbz#1331383 - Allow oracleasm to rw inherited fixed disk device Resolves: rhbz#1331383 - Allow collectd to connect on unix_stream_socket Resolves: rhbz#1377259- Allow iscsid create netlink iscsid sockets. Resolves: rhbz#1358266 - Improve regexp for power_unit_file_t files. To catch just systemd power unit files. Resolves: rhbz#1375462- Update oracleasm SELinux module that can manage oracleasmfs_t blk files. Add dac_override cap to oracleasm_t domain. Resolves: rhbz#1331383 - Add few rules to pcp SELinux module to make ti able to start pcp_pmlogger service Resolves: rhbz#1206525- Add oracleasm_conf_t type and allow oracleasm_t to create /dev/oracleasm Resolves: rhbz#1331383 - Label /usr/share/pcp/lib/pmie as pmie_exec_t and /usr/share/pcp/lib/pmlogger as pmlogger_exec_t Resolves: rhbz#1206525 - Allow mdadm_t to getattr all device nodes Resolves: rhbz#1365171 - Add interface dbus_dontaudit_stream_connect_system_dbusd() Resolves:rhbz#1052880 - Add virt_stub_* interfaces for docker policy which is no longer a part of our base policy. Resolves: rhbz#1372705 - Allow guest-set-user-passwd to set users password. Resolves: rhbz#1369693 - Allow samdbox domains to use msg class Resolves: rhbz#1372677 - Allow domains using kerberos to read also kerberos config dirs Resolves: rhbz#1368492 - Allow svirt_sandbox_domains to r/w onload sockets Resolves: rhbz#1342930 - Add interface fs_manage_oracleasm() Resolves: rhbz#1331383 - Label /dev/kfd as hsa_device_t Resolves: rhbz#1373488 - Update seutil_manage_file_contexts() interface that caller domain can also manage file_context_t dirs Resolves: rhbz#1368097 - Add interface to write to nsfs inodes Resolves: rhbz#1372705 - Allow systemd services to use PrivateNetwork feature Resolves: rhbz#1372705 - Add a type and genfscon for nsfs. Resolves: rhbz#1372705 - Allow run sulogin_t in range mls_systemlow-mls_systemhigh. Resolves: rhbz#1290400- Allow arpwatch to create netlink netfilter sockets. Resolves: rhbz#1358261 - Fix file context for /etc/pki/pki-tomcat/ca/ - new interface oddjob_mkhomedir_entrypoint() - Move label for /var/lib/docker/vfs/ to proper SELinux module - Allow mdadm to get attributes from all devices. - Label /etc/puppetlabs as puppet_etc_t. - Allow systemd-machined to communicate to lxc container using dbus - Allow systemd_resolved to send dbus msgs to userdomains Resolves: rhbz#1236579 - Allow systemd-resolved to read network sysctls Resolves: rhbz#1236579 - Allow systemd_resolved to connect on system bus. Resolves: rhbz#1236579 - Make entrypoint oddjob_mkhomedir_exec_t for unconfined_t - Label all files in /dev/oracleasmfs/ as oracleasmfs_t Resolves: rhbz#1331383- Label /etc/pki/pki-tomcat/ca/ as pki_tomcat_cert_t Resolves:rhbz#1366915 - Allow certmonger to manage all systemd unit files Resolves:rhbz#1366915 - Grant certmonger "chown" capability Resolves:rhbz#1366915 - Allow ipa_helper_t stream connect to dirsrv_t domain Resolves: rhbz#1368418 - Update oracleasm SELinux module Resolves: rhbz#1331383 - label /var/lib/kubelet as svirt_sandbox_file_t Resolves: rhbz#1369159 - Add few interfaces to cloudform.if file Resolves: rhbz#1367834 - Label /var/run/corosync-qnetd and /var/run/corosync-qdevice as cluster_var_run_t. Note: corosync policy is now par of rhcs module Resolves: rhbz#1347514 - Allow krb5kdc_t to read krb4kdc_conf_t dirs. Resolves: rhbz#1368492 - Update networkmanager_filetrans_named_content() interface to allow source domain to create also temad dir in /var/run. Resolves: rhbz#1365653 - Allow teamd running as NetworkManager_t to access netlink_generic_socket to allow multiple network interfaces to be teamed together. Resolves: rhbz#1365653 - Label /dev/oracleasmfs as oracleasmfs_t. Add few interfaces related to oracleasmfs_t type Resolves: rhbz#1331383 - A new version of cloud-init that supports the effort to provision RHEL Atomic on Microsoft Azure requires some a new rules that allows dhclient/dhclient hooks to call cloud-init. Resolves: rhbz#1367834 - Allow iptables to creating netlink generic sockets. Resolves: rhbz#1364359- Allow ipmievd domain to create lock files in /var/lock/subsys/ Resolves:rhbz#1349058 - Update policy for ipmievd daemon. Resolves:rhbz#1349058 - Dontaudit hyperkvp to getattr on non security files. Resolves: rhbz#1349356 - Label /run/corosync-qdevice and /run/corosync-qnetd as corosync_var_run_t Resolves: rhbz#1347514 - Fixed lsm SELinux module - Add sys_admin capability to sbd domain Resolves: rhbz#1322725 - Allow vdagent to comunnicate with systemd-logind via dbus Resolves: rhbz#1366731 - Allow lsmd_plugin_t domain to create fixed_disk device. Resolves: rhbz#1238066 - Allow opendnssec domain to create and manage own tmp dirs/files Resolves: rhbz#1366649 - Allow opendnssec domain to read system state Resolves: rhbz#1366649 - Update opendnssec_manage_config() interface to allow caller domain also manage opendnssec_conf_t dirs Resolves: rhbz#1366649 - Allow rasdaemon to mount/unmount tracefs filesystem. Resolves: rhbz#1364380 - Label /usr/libexec/iptables/iptables.init as iptables_exec_t Allow iptables creating lock file in /var/lock/subsys/ Resolves: rhbz#1367520 - Modify interface den_read_nvme() to allow also read nvme_device_t block files. Resolves: rhbz#1362564 - Label /var/run/storaged as lvm_var_run_t. Resolves: rhbz#1264390 - Allow unconfineduser to run ipa_helper_t. Resolves: rhbz#1361636- Dontaudit mock to write to generic certs. Resolves: rhbz#1271209 - Add labeling for corosync-qdevice and corosync-qnetd daemons, to run as cluster_t Resolves: rhbz#1347514 - Revert "Label corosync-qnetd and corosync-qdevice as corosync_t domain" - Allow modemmanager to write to systemd inhibit pipes Resolves: rhbz#1365214 - Label corosync-qnetd and corosync-qdevice as corosync_t domain Resolves: rhbz#1347514 - Allow ipa_helper to read network state Resolves: rhbz#1361636 - Label oddjob_reqiest as oddjob_exec_t Resolves: rhbz#1361636 - Add interface oddjob_run() Resolves: rhbz#1361636 - Allow modemmanager chat with systemd_logind via dbus Resolves: rhbz#1362273 - Allow NetworkManager chat with puppetagent via dbus Resolves: rhbz#1363989 - Allow NetworkManager chat with kdumpctl via dbus Resolves: rhbz#1363977 - Allow sbd send msgs to syslog Allow sbd create dgram sockets. Allow sbd to communicate with kernel via dgram socket Allow sbd r/w kernel sysctls. Resolves: rhbz#1322725 - Allow ipmievd_t domain to re-create ipmi devices Label /usr/libexec/openipmi-helper as ipmievd_exec_t Resolves: rhbz#1349058 - Allow rasdaemon to use tracefs filesystem. Resolves: rhbz#1364380 - Fix typo bug in dirsrv policy - Some logrotate scripts run su and then su runs unix_chkpwd. Allow logrotate_t domain to check passwd. Resolves: rhbz#1283134 - Add ipc_lock capability to sssd domain. Allow sssd connect to http_cache_t Resolves: rhbz#1362688 - Allow dirsrv to read dirsrv_share_t content Resolves: rhbz#1363662 - Allow virtlogd_t to append svirt_image_t files. Resolves: rhbz#1358140 - Allow hypervkvp domain to read hugetlbfs dir/files. Resolves: rhbz#1349356 - Allow mdadm daemon to read nvme_device_t blk files Resolves: rhbz#1362564 - Allow selinuxusers and unconfineduser to run oddjob_request Resolves: rhbz#1361636 - Allow sshd server to acces to Crypto Express 4 (CEX4) devices. Resolves: rhbz#1362539 - Fix labeling issue in init.fc file. Path /usr/lib/systemd/fedora-* changed to /usr/lib/systemd/rhel-*. Resolves: rhbz#1363769 - Fix typo in device interfaces Resolves: rhbz#1349058 - Add interfaces for managing ipmi devices Resolves: rhbz#1349058 - Add interfaces to allow mounting/umounting tracefs filesystem Resolves: rhbz#1364380 - Add interfaces to allow rw tracefs filesystem Resolves: rhbz#1364380 - Add interface dev_read_nvme() to allow reading Non-Volatile Memory Host Controller devices. Resolves: rhbz#1362564 - Label /sys/kernel/debug/tracing filesystem Resolves: rhbz#1364380 - Allow sshd setcap capability. This is needed due to latest changes in sshd Resolves: rhbz#1357857- Dontaudit mock_build_t can list all ptys. Resolves: rhbz#1271209 - Allow ftpd_t to mamange userhome data without any boolean. Resolves: rhbz#1097775 - Add logrotate permissions for creating netlink selinux sockets. Resolves: rhbz#1283134 - Allow lsmd_plugin_t to exec ldconfig. Resolves: rhbz#1238066 - Allow vnstatd domain to read /sys/class/net/ files Resolves: rhbz#1358243 - Remove duplicate allow rules in spamassassin SELinux module Resolves:rhbz#1358175 - Allow spamc_t and spamd_t domains create .spamassassin file in user homedirs Resolves:rhbz#1358175 - Allow sshd setcap capability. This is needed due to latest changes in sshd Resolves: rhbz#1357857 - Add new MLS attribute to allow relabeling objects higher than system low. This exception is needed for package managers when processing sensitive data. Resolves: rhbz#1330464 - Allow gnome-keyring also manage user_tmp_t sockets. Resolves: rhbz#1257057 - corecmd: Remove fcontext for /etc/sysconfig/libvirtd Resolves:rhbz#1351382- Allow ipa_dnskey domain to search cache dirs Resolves: rhbz#1350957- Allow ipa-dnskey read system state. Reasolves: rhbz#1350957 - Allow dogtag-ipa-ca-renew-agent-submit labeled as certmonger_t to create /var/log/ipa/renew.log file Resolves: rhbz#1350957- Allow firewalld to manage net_conf_t files. Resolves:rhbz#1304723 - Allow logrotate read logs inside containers. Resolves: rhbz#1303514 - Allow sssd to getattr on fs_t Resolves: rhbz#1356082 - Allow opendnssec domain to manage bind chace files Resolves: rhbz#1350957 - Fix typo in rhsmcertd policy module Resolves: rhbz#1329475 - Allow systemd to get status of systemd-logind daemon Resolves: rhbz#1356141 - Label more ndctl devices not just ndctl0 Resolves: rhbz#1355809- Allow rhsmcertd to copy certs into /etc/docker/cert.d - Add interface docker_rw_config() Resolves: rhbz#1344500 - Fix logrotate fc file to label also /var/lib/logrotate/ dir as logrotate_var_lib_t Resolves: rhbz#1355632 - Allow rhsmcertd to read network sysctls Resolves: rhbz#1329475 - Label /var/log/graphite-web dir as httpd_log_t Resolves: rhbz#1310898 - Allow mock to use generic ptys Resolves: rhbz#1271209 - Allow adcli running as sssd_t to write krb5.keytab file. Resolves: rhbz#1356082 - Allow openvswitch connect to openvswitch_port_t type. Resolves: rhbz#1335024 - Add SELinux policy for opendnssec service. Resolves: rhbz#1350957 - Create new SELinux type for /usr/libexec/ipa/ipa-dnskeysyncd Resolves: rhbz#1350957 - label /dev/ndctl0 device as nvram_device_t Resolves: rhbz#1355809- Allow lttng tools to block suspending Resolves: rhbz#1256374 - Allow creation of vpnaas in openstack Resolves: rhbz#1352710 - virt: add strict policy for virtlogd daemon Resolves:rhbz#1311606 - Update makefile to support snapperd_contexts file Resolves: rhbz#1352681- Allow udev to manage systemd-hwdb files - Add interface systemd_hwdb_manage_config() Resolves: rhbz#1350756 - Fix paths to infiniband devices. This allows use more then two infiniband interfaces. Resolves: rhbz#1210263- Allow virtual machines to rw infiniband devices. Resolves: rhbz#1210263 - Allow opensm daemon to rw infiniband_mgmt_device_t Resolves: rhbz#1210263 - Allow systemd_hwdb_t to relabel /etc/udev/hwdb.bin file. Resolves: rhbz#1350756 - Make label for new infiniband_mgmt deivices Resolves: rhbz#1210263- Fix typo in brltty SELinux module - Add new SELinux module sbd Resolves: rhbz#1322725 - Allow pcp dmcache metrics collection Resolves: rhbz#1309883 - Allow pkcs_slotd_t to create dir in /var/lock Add label pkcs_slotd_log_t Resolves: rhbz#1350782 - Allow openvpn to create sock files labeled as openvpn_var_run_t Resolves: rhbz#1328246 - Allow hypervkvp daemon to getattr on all filesystem types. Resolves: rhbz#1349356 - Allow firewalld to create net_conf_t files Resolves: rhbz#1304723 - Allow mock to use lvm Resolves: rhbz#1271209 - Allow keepalived to create netlink generic sockets. Resolves: rhbz#1349809 - Allow mirromanager creating log files in /tmp Resolves:rhbz#1328818 - Rename few modules to make it consistent with source files Resolves: rhbz#1351445 - Allow vmtools_t to transition to rpm_script domain Resolves: rhbz#1342119 - Allow nsd daemon to manage nsd_conf_t dirs and files Resolves: rhbz#1349791 - Allow cluster to create dirs in /var/run labeled as cluster_var_run_t Resolves: rhbz#1346900 - Allow sssd read also sssd_conf_t dirs Resolves: rhbz#1350535 - Dontaudit su_role_template interface to getattr /proc/kcore Dontaudit su_role_template interface to getattr /dev/initctl Resolves: rhbz#1086240 - Add interface lvm_getattr_exec_files() Resolves: rhbz#1271209 - Fix typo Compliling vs. Compiling Resolves: rhbz#1351445- Allow krb5kdc_t to communicate with sssd Resolves: rhbz#1319933 - Allow prosody to bind on prosody ports Resolves: rhbz#1304664 - Add dac_override caps for fail2ban-client Resolves: rhbz#1316678 - dontaudit read access for svirt_t on the file /var/db/nscd/group Resolves: rhbz#1301637 - Allow inetd child process to communicate via dbus with systemd-logind Resolves: rhbz#1333726 - Add label for brltty log file Resolves: rhbz#1328818 - Allow dspam to read the passwd file Resolves: rhbz#1286020 - Allow snort_t to communicate with sssd Resolves: rhbz#1284908 - svirt_sandbox_domains need to be able to execmod for badly built libraries. Resolves: rhbz#1206339 - Add policy for lttng-tools package. Resolves: rhbz#1256374 - Make mirrormanager as application domain. Resolves: rhbz#1328234 - Add support for the default lttng-sessiond port - tcp/5345. This port is used by LTTng 2.x central tracing registry session daemon. - Add prosody ports Resolves: rhbz#1304664 - Allow sssd read also sssd_conf_t dirs Resolves: rhbz#1350535- Label /var/lib/softhsm as named_cache_t. Allow named_t to manage named_cache_t dirs. Resolves:rhbz#1331315 - Label named-pkcs11 binary as named_exec_t. Resolves: rhbz#1331315 - Allow glusterd daemon to get systemd status Resolves: rhbz#1321785 - Allow logrotate dbus-chat with system_logind daemon Resolves: rhbz#1283134 - Allow pcp_pmlogger to read kernel network state Allow pcp_pmcd to read cron pid files Resolves: rhbz#1336211 - Add interface cron_read_pid_files() Resolves: rhbz#1336211 - Allow pcp_pmlogger to create unix dgram sockets Resolves: rhbz#1336211 - Add hwloc-dump-hwdata SELinux policy Resolves: rhbz#1344054 - Remove non-existing jabberd_spool_t() interface and add new jabbertd_var_spool_t. Resolves: rhbz#1121171 - Remove non-existing interface salk_resetd_systemctl() and replace it with sanlock_systemctl_sanlk_resetd() Resolves: rhbz#1259764 - Create label for openhpid log files. esolves: rhbz#1259764 - Label /var/lib/ganglia as httpd_var_lib_t Resolves: rhbz#1260536 - Allow firewalld_t to create entries in net_conf_t dirs. Resolves: rhbz#1304723 - Allow journalctl to read syslogd_var_run_t files. This allows to staff_t and sysadm_t to read journals Resolves: rhbz#1288255 - Include patch from distgit repo: policy-RHEL-7.1-flask.patch. Resolves: rhbz#1329560 - Update refpolicy to handle hwloc Resolves: rhbz#1344054 - Label /etc/dhcp/scripts dir as bin_t - Allow sysadm_role to run journalctl_t domain. This allows sysadm user to read journals. Resolves: rhbz#1288255- Allow firewalld_t to create entries in net_conf_t dirs. Resolves: rhbz#1304723 - Allow journalctl to read syslogd_var_run_t files. This allows to staff_t and sysadm_t to read journals Resolves: rhbz#1288255 - Allow mongod log to syslog. Resolves: rhbz#1306995 - Allow rhsmcertd connect to port tcp 9090 Resolves: rhbz#1337319 - Label for /bin/mail(x) was removed but /usr/bin/mail(x) not. This path is also needed to remove. Resolves: rhbz#1262483 Resolves: rhbz#1277506 - Label /usr/libexec/mimedefang-wrapper as spamd_exec_t. Resolves: rhbz#1301516 - Add new boolean spamd_update_can_network. Resolves: rhbz#1305469 - Allow rhsmcertd connect to tcp netport_port_t Resolves: rhbz#1329475 - Fix SELinux context for /usr/share/mirrormanager/server/mirrormanager to Label all binaries under dir as mirrormanager_exec_t. Resolves: rhbz#1328234 - Allow prosody to bind to fac_restore tcp port. Resolves: rhbz#1321787 - Allow ninfod to read raw packets Resolves: rhbz#1317964 - Allow pegasus get attributes from qemu binary files. Resolves: rhbz#1260835 - Allow pegasus get attributes from qemu binary files. Resolves: rhbz#1271159 - Allow tuned to use policykit. This change is required by cockpit. Resolves: rhbz#1346464 - Allow conman_t to read dir with conman_unconfined_script_t binary files. Resolves: rhbz#1297323 - Allow pegasus to read /proc/sysinfo. Resolves: rhbz#1265883 - Allow sysadm_role to run journalctl_t domain. This allows sysadm user to read journals. Resolves: rhbz#1288255 - Label tcp ports:16379, 26379 as redis_port_t Resolves: rhbz#1348471 - Allow systemd to relabel /var and /var/lib directories during boot. - Add files_relabel_var_dirs() and files_relabel_var_dirs() interfaces. - Add files_relabelto_var_lib_dirs() interface. - Label tcp port 2004 as mailbox_port_t. Resolves: rhbz#1332843 - Label tcp and udp port 5582 as fac_restore_port_t Resolves: rhbz#1321787 - Allow sysadm_t user to run postgresql-setup. Resolves: rhbz#1282543 - Allow sysadm_t user to dbus chat with oddjob_t. This allows confined admin run oddjob mkhomedirfor script. Resolves: rhbz#1297480 - Update netlink socket classes.- Allow conman to kill conman_unconfined_script. Resolves: rhbz#1297323 - Make conman_unconfined_script_t as init_system_domain. Resolves:rhbz#1297323 - Allow init dbus chat with apmd. Resolves:rhbz#995898 - Patch /var/lib/rpm is symlink to /usr/share/rpm on Atomic, due to this change we need to label also /usr/share/rpm as rpm_var_lib_t. Resolves: rhbz#1233252 - Dontaudit xguest_gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Add mediawiki rules to proper scope Resolves: rhbz#1301186 - Dontaudit xguest_gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Allow mysqld_safe to inherit rlimit information from mysqld Resolves: rhbz#1323673 - Allow collectd_t to stream connect to postgresql. Resolves: rhbz#1344056 - Allow mediawiki-script to read /etc/passwd file. Resolves: rhbz#1301186 - Add filetrans rule that NetworkManager_t can create net_conf_t files in /etc. Resolves: rhbz#1344505 - Add labels for mediawiki123 Resolves: rhbz#1293872 - Fix label for all fence_scsi_check scripts - Allow ip netns to mounton root fs and unmount proc_t fs. Resolves: rhbz#1343776 Resolves: rhbz#1286851 - Allow sysadm_t to run newaliases command. Resolves: rhbz#1344828 - Add interface sysnet_filetrans_named_net_conf() Resolves: rhbz#1344505- Fix several issues related to the SELinux Userspace changes- Allow glusterd domain read krb5_keytab_t files. Resolves: rhbz#1343929 - Fix typo in files_setattr_non_security_dirs. Resolves: rhbz#1115987- Allow tmpreaper_t to read/setattr all non_security_file_type dirs Resolves: rhbz#1115987 - Allow firewalld to create firewalld_var_run_t directory. Resolves: rhbz#1304723 - Add interface firewalld_read_pid_files() Resolves: rhbz#1304723 - Label /usr/libexec/rpm-ostreed as rpm_exec_t. Resolves: rhbz#1340542 - Allow sanlock service to read/write cephfs_t files. Resolves: rhbz#1315332 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added missing docker interfaces: - docker_typebounds - docker_entrypoint Resolves: rhbz#1236580 - Add interface files_setattr_non_security_dirs() Resolves: rhbz#1115987 - Add support for onloadfs - Allow iptables to read firewalld pid files. Resolves: rhbz#1304723 - Add SELinux support for ceph filesystem. Resolves: rhbz#1315332 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) Resolves: rhbz#1236580- Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added missing docker interfaces: - docker_typebounds - docker_entrypoint Resolves: rhbz#1236580 - New interfaces needed for systemd-machinectl Resolves: rhbz#1236580 - New interfaces needed by systemd-machine Resolves: rhbz#1236580 - Add interface allowing sending and receiving messages from virt over dbus. Resolves: rhbz#1236580 - Backport docker policy from Fedora. Related: #1303123 Resolves: #1341257 - Allow NetworkManager_t and policykit_t read access to systemd-machined pid files. Resolves: rhbz#1236580 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added interfaces needed by new docker policy. Related: rhbz#1303123 - Add support for systemd-machined daemon Resolves: rhbz#1236580 - Allow rpm-ostree domain transition to install_t domain from init_t. Resolves: rhbz#1340542- dnsmasq: allow NetworkManager to control dnsmasq via D-Bus Resolves: rhbz#1336722 - Directory Server (389-ds-base) has been updated to use systemd-ask-password. In order to function correctly we need the following added to dirsrv.te Resolves: rhbz#1333198 - sftpd_* booleans are functionless these days. Resolves: rhbz#1335656 - Label /var/log/ganesha.log as gluster_log_t Allow glusterd_t domain to create glusterd_log_t files. Label /var/run/ganesha.pid as gluster_var_run_t. Resolves: rhbz#1335828 - Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus. Resolves: rhbz#1336760 - Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t. Resolves: rhbz#1336737 - Label /usr/libexec/storaged/storaged as lvm_exec_t to run storaged daemon in lvm_t SELinux domain. Resolves: rhbz#1264390 - Allow systemd_hostanmed_t to read /proc/sysinfo labeled as sysctl_t. Resolves: rhbz#1337061 - Revert "Allow all domains some process flags." Resolves: rhbz#1303644 - Revert "Remove setrlimit to all domains." Resolves: rhbz#1303644 - Label /usr/sbin/xrdp* files as bin_t Resolves: rhbz#1276777 - Add mls support for some db classes Resolves: rhbz#1303651 - Allow systemd_resolved_t to check if ipv6 is disabled. Resolves: rhbz#1236579 - Allow systemd_resolved to read systemd_networkd run files. Resolves: rhbz#1236579- Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus. Resolves: rhbz#1336760 - Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t. Resolves: rhbz#1336737- Allow logwatch to domtrans to postqueue Resolves: rhbz#1331542 - Label /var/log/ganesha.log as gluster_log_t - Allow glusterd_t domain to create glusterd_log_t files. - Label /var/run/ganesha.pid as gluster_var_run_t. Resolves: rhbz#1335828 - Allow zabbix to connect to postgresql port Resolves: rhbz#1330479 - Add userdom_destroy_unpriv_user_shared_mem() interface. Related: rhbz#1306403 - systemd-logind remove all IPC objects owned by a user on a logout. This covers also SysV memory. This change allows to destroy unpriviledged user SysV shared memory segments. Resolves: rhbz#1306403- We need to restore contexts on /etc/passwd*,/etc/group*,/etc/*shadow* during install phase to get proper labeling for these files until selinux-policy pkgs are installed. Resolves: rhbz#1333952- Add interface glusterd_dontaudit_read_lib_dirs() Resolves: rhbz#1295680 - Dontaudit Occasionally observing AVC's while running geo-rep automation Resolves: rhbz#1295680 - Allow glusterd to manage socket files labeled as glusterd_brick_t. Resolves: rhbz#1331561 - Create new apache content template for files stored in user homedir. This change is needed to make working booleans: - httpd_enable_homedirs - httpd_read_user_content Resolves: rhbz#1246522 - Allow stunnel create log files. Resolves: rhbz#1296851 - Label tcp port 8181 as intermapper_port_t. Resolves: rhbz#1334783 - Label tcp/udp port 2024 as xinuexpansion4_port_t Resolves: rhbz#1334783 - Label tcp port 7002 as afs_pt_port_t Label tcp/udp port 2023 as xinuexpansion3_port_t Resolves: rhbz#1334783 - Dontaudit ldconfig read gluster lib files. Resolves: rhbz#1295680 - Add interface auth_use_nsswitch() to systemd_domain_template. Resolves: rhbz#1236579- Label /usr/bin/ganesha.nfsd as glusterd_exec_t to run ganesha as glusterd_t. Allow glusterd_t stream connect to rpbind_t. Allow cluster_t to create symlink /var/lib/nfs labeled as var_lib_nfs_t. Add interface rpc_filetrans_var_lib_nfs_content() Add new boolean: rpcd_use_fusefs to allow rpcd daemon use fusefs. Resolves: rhbz#1312809 Resolves: rhbz#1323947 - Allow dbus chat between httpd_t and oddjob_t. Resolves: rhbz#1324144 - Label /usr/libexec/ipa/oddjob/org.freeipa.server.conncheck as ipa_helper_exec_t. Resolves: rhbz#1324144 - Label /var/log/ipareplica-conncheck.log file as ipa_log_t Allow ipa_helper_t domain to manage logs labeledas ipa_log_t Allow ipa_helper_t to connect on http and kerberos_passwd ports. Resolves: rhbz#1324144 - Allow prosody to listen on port 5000 for mod_proxy65. Resolves: rhbz#1316918 - Allow pcp_pmcd_t domain to manage docker lib files. This rule is needed to allow pcp to collect container information when SELinux is enabled. Resolves: rhbz#1309454- Allow runnig php7 in fpm mode. From selinux-policy side, we need to allow httpd to read/write hugetlbfs. Resolves: rhbz#1319442 - Allow openvswitch daemons to run under openvswitch Linux user instead of root. This change needs allow set capabilities: chwon, setgid, setuid, setpcap. Resolves: rhbz#1296640 - Remove ftpd_home_dir() boolean from distro policy. Reason is that we cannot make this working due to m4 macro language limits. Resolves: rhbz#1097775 - /bin/mailx is labeled sendmail_exec_t, and enters the sendmail_t domain on execution. If /usr/sbin/sendmail does not have its own domain to transition to, and is not one of several products whose behavior is allowed by the sendmail_t policy, execution will fail. In this case we need to label /bin/mailx as bin_t. Resolves: rhbz#1262483 - Allow nsd daemon to create log file in /var/log as nsd_log_t Resolves: rhbz#1293140 - Sanlock policy update. - New sub-domain for sanlk-reset daemon Resolves: rhbz#1212324 - Label all run tgtd files, not just socket files Resolves: rhbz#1280280 - Label all run tgtd files, not just socket files. Resolves: rhbz#1280280 - Allow prosody to stream connect to sasl. This will allow using cyrus authentication in prosody. Resolves: rhbz#1321049 - unbound wants to use ephemeral ports as a default configuration. Allow to use also udp sockets. Resolves: rhbz#1318224 - Allow prosody to listen on port 5000 for mod_proxy65. Resolves: rhbz#1316918 - Allow targetd to read/write to /dev/mapper/control device. Resolves: rhbz#1063714 - Allow KDM to get status about power services. This change allow kdm to be able do shutdown. Resolves: rhbz#1316724 - Allow systemd-resolved daemon creating netlink_route sockets. Resolves:rhbz#1236579 - Allow systemd_resolved_t to read /etc/passwd file. Allow systemd_resolved_t to write to kmsg_device_t when 'systemd.log_target=kmsg' option is used Resolves: rhbz#1065362 - Label /etc/selinux/(minimum|mls|targeted)/active/ as semanage_store_t Resolves: rhbz#1321943 - Label all nvidia binaries as xserver_exec_t Resolves: rhbz#1322283- Create new permissivedomains CIL module and make it active. Resolves: rhbz#1320451 - Add support for new mock location - /usr/libexec/mock/mock. Resolves: rhbz#1271209 - Allow bitlee to create bitlee_var_t dirs. Resolves: rhbz#1268651 - Allow CIM provider to read sssd public files. Resolves: rhbz#1263339 - Fix some broken interfaces in distro policy. Resolves: rhbz#1121171 - Allow power button to shutdown the laptop. Resolves: rhbz#995898 - Allow lsm plugins to create named fixed disks. Resolves: rhbz#1238066 - Add default labeling for /etc/Pegasus/cimserver_current.conf. It is a correct patch instead of the current /etc/Pegasus/pegasus_current.confResolves: rhbz#1278777 - Allow hyperv domains to rw hyperv devices. Resolves: rhbz#1309361 - Label /var/www/html(/.*)?/wp_backups(/.*)? as httpd_sys_rw_content_t.Resolves: rhbz#1246780 - Create conman_unconfined_script_t type for conman script stored in /use/share/conman/exec/ Resolves: rhbz#1297323 - Fix rule definitions for httpd_can_sendmail boolean. We need to distinguish between base and contrib. - Add support for /dev/mptctl device used to check RAID status. Resolves: rhbz#1258029 - Create hyperv* devices and create rw interfaces for this devices. Resolves: rhbz#1309361 - Add fixes for selinux userspace moving the policy store to /var/lib/selinux. - Remove optional else block for dhcp ping- Allow rsync_export_all_ro boolean to read also non_auth_dirs/files/symlinks. Resolves: rhbz#1263770 - Fix context of "/usr/share/nginx/html". Resolves: rhbz#1261857 - Allow pmdaapache labeled as pcp_pmcd_t access to port 80 for apache diagnostics Resolves: rhbz#1270344 - Allow pmlogger to create pmlogger.primary.socket link file. Resolves: rhbz#1270344 - Label nagios scripts as httpd_sys_script_exec_t. Resolves: rhbz#1260306 - Add dontaudit interface for kdumpctl_tmp_t Resolves: rhbz#1156442 - Allow mdadm read files in EFI partition. Resolves: rhbz#1291801 - Allow nsd_t to bind on nsf_control tcp port. Allow nsd_crond_t to read nsd pid. Resolves: rhbz#1293140 - Label some new nsd binaries as nsd_exec_t Allow nsd domain net_admin cap. Create label nsd_tmp_t for nsd tmp files/dirs Resolves: rhbz#1293140 - Add filename transition that /etc/princap will be created with cupsd_rw_etc_t label in cups_filetrans_named_content() interface. Resolves: rhbz#1265102 - Add missing labeling for /usr/libexec/abrt-hook-ccpp. Resolves: rhbz#1213409 - Allow pcp_pmie and pcp_pmlogger to read all domains state. Resolves: rhbz#1206525 - Label /etc/redis-sentinel.conf as redis_conf_t. Allow redis_t write to redis_conf_t. Allow redis_t to connect on redis tcp port. Resolves: rhbz#1275246 - cockpit has grown content in /var/run directory Resolves: rhbz#1279429 - Allow collectd setgid capability Resolves:#1310898 - Remove declaration of empty booleans in virt policy. Resolves: rhbz#1103153 - Fix typo in drbd policy - Add new drbd file type: drbd_var_run_t. Allow drbd_t to manage drbd_var_run_t files/dirs. Allow drbd_t create drbd_tmp_t files in /tmp. Resolves: rhbz#1134883 - Label /etc/ctdb/events.d/* as ctdb_exec_t. Allow ctdbd_t to setattr on ctdbd_exec_t files. Resolves: rhbz#1293788 - Allow abrt-hook-ccpp to get attributes of all processes because of core_pattern. Resolves: rhbz#1254188 - Allow abrt_t to read sysctl_net_t files. Resolves: rhbz#1254188 - The ABRT coredump handler has code to emulate default core file creation The handler runs in a separate process with abrt_dump_oops_t SELinux process type. abrt-hook-ccpp also saves the core dump file in the very same way as kernel does and a user can specify CWD location for a coredump. abrt-hook-ccpp has been made as a SELinux aware apps to create this coredumps with correct labeling and with this commit the policy rules have been updated to allow access all non security files on a system. - Allow abrt-hook-ccpp to getattr on all executables. - Allow setuid/setgid capabilities for abrt-hook-ccpp. Resolves: rhbz#1254188 - abrt-hook-ccpp needs to have setfscreate access because it is SELinux aware and compute a target labeling. Resolves: rhbz#1254188 - Allow abrt-hook-ccpp to change SELinux user identity for created objects. Resolves: rhbz#1254188 - Dontaudit write access to inherited kdumpctl tmp files. Resolves: rbhz#1156442 - Add interface to allow reading files in efivarfs - contains Linux Kernel configuration options for UEFI systems (UEFI Runtime Variables) Resolves: rhbz#1291801 - Label 8952 tcp port as nsd_control. Resolves: rhbz#1293140 - Allow ipsec to use pam. Resolves: rhbz#1315700 - Allow to log out to gdm after screen was resized in session via vdagent. Resolves: rhbz#1249020 - Allow setrans daemon to read /proc/meminfo. Resolves: rhbz#1316804 - Allow systemd_networkd_t to write kmsg, when kernel was started with following params: systemd.debug systemd.log_level=debug systemd.log_target=kmsg Resolves: rhbz#1298151 - Label tcp port 5355 as llmnr-> Link-Local Multicast Name Resolution Resolves: rhbz#1236579 - Add new selinux policy for systemd-resolved dawmon. Resolves: rhbz#1236579 - Add interface ssh_getattr_server_keys() interface. Resolves: rhbz#1306197 - Allow run sshd-keygen on second boot if first boot fails after some reason and content is not syncedon the disk. These changes are reflecting this commit in sshd. http://pkgs.fedoraproject.org/cgit/rpms/openssh.git/commit/?id=af94f46861844cbd6ba4162115039bebcc8f78ba rhbz#1299106 Resolves: rhbz#1306197 - Allow systemd_notify_t to write to kmsg_device_t when 'systemd.log_target=kmsg' option is used. Resolves: rhbz#1309417 - Remove bin_t label for /etc/ctdb/events.d/. We need to label this scripts as ctdb_exec_t. Resolves: rhbz#1293788- Prepare selinux-policy package for userspace release 2016-02-23. Resolves: rhbz#1305982- Allow sending dbus msgs between firewalld and system_cronjob domains. Resolves: rhbz#1284902 - Allow zabbix-agentd to connect to following tcp sockets. One of zabbix-agentd functions is get service status of ftp,http,innd,pop,smtp protocols. Resolves: rhbz#1242506 - Add new boolean tmpreaper_use_cifs() to allow tmpreaper to run on local directories being shared with Samba. Resolves: rhbz#1284972 - Add support for systemd-hwdb daemon. Resolves: rhbz#1257940 - Add interface fs_setattr_cifs_dirs(). Resolves: rhbz#1284972- Add new SELinux policy fo targetd daemon. Resolves: rhbz#1063714 - Add new SELinux policy fo ipmievd daemon. Resolves: rhbz#1083031 - Add new SELinux policy fo hsqldb daemon. Resolves: rhbz#1083171 - Add new SELinux policy for blkmapd daemon. Resolves: rhbz#1072997 - Allow p11-child to connect to apache ports. - Label /usr/sbin/lvmlockd binary file as lvm_exec_t. Resolves: rhbz#1278028 - Add interface "lvm_manage_lock" to lvm policy. Resolves: rhbz#1063714- Allow openvswitch domain capability sys_rawio. Resolves: rhbz#1278495- Allow openvswitch to manage hugetlfs files and dirs. Resolves: rhbz#1278495 - Add fs_manage_hugetlbfs_files() interface. Resolves: rhbz#1278495- Allow smbcontrol domain to send sigchld to ctdbd domain. Resolves: #1293784 - Allow openvswitch read/write hugetlb filesystem. Resolves: #1278495Allow hypervvssd to list all mountpoints to have VSS live backup working correctly. Resolves:#1247880- Revert Add missing labeling for /usr/libexec/abrt-hook-ccpp patch Resolves: #1254188- Allow search dirs in sysfs types in kernel_read_security_state. Resolves: #1254188 - Fix kernel_read_security_state interface that source domain of this interface can search sysctl_fs_t dirs. Resolves: #1254188- Add missing labeling for /usr/libexec/abrt-hook-ccpp as a part of #1245477 and #1242467 bugs Resolves: #1254188 - We need allow connect to xserver for all sandbox_x domain because we have one type for all sandbox processes. Resolves:#1261938- Remove labeling for modules_dep_t file contexts to have labeled them as modules_object_t. - Update files_read_kernel_modules() to contain modutils_read_module_deps_files() calling because module deps labeling could remain and it allows to avoid regressions. Resolves:#1266928- We need to require sandbox_web_type attribute in sandbox_x_domain_template(). Resolves: #1261938 - ipsec: The NM helper needs to read the SAs Resolves: #1259786 - ipsec: Allow ipsec management to create ptys Resolves: #1259786- Add temporary fixes for sandbox related to #1103622. It allows to run everything under one sandbox type. Resolves:#1261938 - Allow abrt_t domain to write to kernel msg device. Resolves: #1257828 - Allow rpcbind_t domain to change file owner and group Resolves: #1265266- Allow smbcontrol to create a socket in /var/samba which uses for a communication with smbd, nmbd and winbind. Resolves: #1256459- Allow dirsrv-admin script to read passwd file. Allow dirsrv-admin script to read httpd pid files. Label dirsrv-admin unit file and allow dirsrv-admin domains to use it. Resolves: #1230300 - Allow qpid daemon to connect on amqp tcp port. Resolves: #1261805- Label /etc/ipa/nssdb dir as cert_t Resolves:#1262718 - Do not provide docker policy files which is shipped by docker-selinux.rpm Resolves:#1262812- Add labels for afs binaries: dafileserver, davolserver, salvageserver, dasalvager Resolves: #1192338 - Add lsmd_plugin_t sys_admin capability, Allow lsmd_plugin_t getattr from sysfs filesystem. Resolves: #1238079 - Allow rhsmcertd_t send signull to unconfined_service_t domains. Resolves: #1176078 - Remove file transition from snmp_manage_var_lib_dirs() interface which created snmp_var_lib_t dirs in var_lib_t. - Allow openhpid_t daemon to manage snmp files and dirs. Resolves: #1243902 - Allow mdadm_t domain read/write to general ptys and unallocated ttys. Resolves: #1073314 - Add interface unconfined_server_signull() to allow domains send signull to unconfined_service_t Resolves: #1176078- Allow systemd-udevd to access netlink_route_socket to change names for network interfaces without unconfined.pp module. It affects also MLS. Resolves:#1250456- Fix labeling for fence_scsi_check script Resolves: #1255020 - Allow openhpid to read system state Allow openhpid to connect to tcp http port. Resolves: #1244248 - Allow openhpid to read snmp var lib files. Resolves: #1243902 - Allow openvswitch_t domains read kernel dependencies due to openvswitch run modprobe - Allow unconfined_t domains to create /var/run/xtables.lock with iptables_var_run_t Resolves: #1243403 - Remove bin_t label for /usr/share/cluster/fence_scsi_check\.pl Resolves: #1255020- Fix regexp in chronyd.fc file Resolves: #1243764 - Allow passenger to getattr filesystem xattr Resolves: #1196555 - Label mdadm.conf.anackbak as mdadm_conf_t file. Resolves: #1088904 - Revert "Allow pegasus_openlmi_storage_t create mdadm.conf.anacbak file in /etc." - Allow watchdog execute fenced python script. Resolves: #1255020 - Added inferface watchdog_unconfined_exec_read_lnk_files() - Remove labeling for /var/db/.*\.db as etc_t to label db files as system_db_t. Resolves: #1230877- Allow watchdog execute fenced python script. Resolves: #1255020 - Added inferface watchdog_unconfined_exec_read_lnk_files() - Label /var/run/chrony-helper dir as chronyd_var_run_t. Resolves: #1243764 - Allow dhcpc_t domain transition to chronyd_t Resolves: #1243764- Fix postfix_spool_maildrop_t,postfix_spool_flush_t contexts in postfix.fc file. Resolves: #1252442- Allow exec pidof under hypervkvp domain. Resolves: #1254870 - Allow hypervkvp daemon create connection to the system DBUS Resolves: #1254870- Allow openhpid_t to read system state. Resolves: #1244248 - Added labels for files provided by rh-nginx18 collection Resolves: #1249945 - Dontaudit block_suspend capability for ipa_helper_t, this is kernel bug. Allow ipa_helper_t capability net_admin. Allow ipa_helper_t to list /tmp. Allow ipa_helper_t to read rpm db. Resolves: #1252968 - Allow rhsmcertd exec rhsmcertd_var_run_t files and rhsmcerd_tmp_t files. This rules are in hide_broken_sympthons until we find better solution. Resolves: #1243431 - Allow abrt_dump_oops_t to read proc_security_t files. - Allow abrt_dump_oops to signull all domains Allow abrt_dump_oops to read all domains state Allow abrt_dump_oops to ptrace all domains - Add interface abrt_dump_oops_domtrans() - Add mountpoint dontaudit access check in rhsmcertd policy. Resolves: #1243431 - Allow samba_net_t to manage samba_var_t sock files. Resolves: #1252937 - Allow chrome setcap to itself. Resolves: #1251996 - Allow httpd daemon to manage httpd_var_lib_t lnk_files. Resolves: #1253706 - Allow chronyd exec systemctl Resolves: #1243764 - Add inteface chronyd_signal Allow timemaster_t send generic signals to chronyd_t. Resolves: #1243764 - Added interface fs_dontaudit_write_configfs_dirs - Add label for kernel module dep files in /usr/lib/modules Resolves:#916635 - Allow kernel_t domtrans to abrt_dump_oops_t - Added to files_dontaudit_write_all_mountpoints intefface new dontaudit rule, that domain included this interface dontaudit capability dac_override. - Allow systemd-networkd to send logs to systemd-journald. Resolves: #1236616- Fix label on /var/tmp/kiprop_0 Resolves:#1220763 - Allow lldpad_t to getattr tmpfs_t. Resolves: #1246220 - Label /dev/shm/lldpad.* as lldapd_tmpfs_t Resolves: #1246220 - Allow audisp client to read system state.- Allow pcp_domain to manage pcp_var_lib_t lnk_files. Resolves: #1252341 - Label /var/run/xtables.* as iptables_var_run_t Resolves: #1243403- Add interface to read/write watchdog device - Add labels for /dev/memory_bandwith and /dev/vhci. Thanks ssekidde Resolves:#1210237 - Allow apcupsd_t to read /sys/devices Resolves:#1189185 - Allow logrotate to reload services. Resolves: #1242453 - Allow openhpid use libwatchdog plugin. (Allow openhpid_t rw watchdog device) Resolves: #1244260 - Allow openhpid liboa_soap plugin to read generic certs. Resolves: #1244248 - Allow openhpid liboa_soap plugin to read resolv.conf file. Resolves: #1244248 - Label /usr/libexec/chrony-helper as chronyd_exec_t - Allow chronyd_t to read dhcpc state. - Allow chronyd to execute mkdir command.- Allow mdadm to access /dev/random and add support to create own files/dirs as mdadm_tmpfs_t. Resolves:#1073314 - Allow udev, lvm and fsadm to access systemd-cat in /var/tmp/dracut if 'dracut -fv' is executed in MLS. - Allow admin SELinu users to communicate with kernel_t. It is needed to access /run/systemd/journal/stdout if 'dracut -vf' is executed. We allow it for other SELinux users. - Allow sysadm to execute systemd-sysctl in the sysadm_t domain. It is needed for ifup command in MLS mode. - Add fstools_filetrans_named_content_fsadm() and call it for named_filetrans_domain domains. We need to be sure that /run/blkid is created with correct labeling. Resolves:#1183503 - Add support for /etc/sanlock which is writable by sanlock daemon. Resolves:#1231377 - Allow useradd add homedir located in /var/lib/kdcproxy in ipa-server RPM scriplet. Resolves:#1243775 - Allow snapperd to pass data (one way only) via pipe negotiated over dbus Resolves:#1250550 - Allow lsmd also setuid capability. Some commands need to executed under root privs. Other commands are executed under unprivileged user.- Allow openhpid to use libsnmp_bc plugin (allow read snmp lib files). Resolves: #1243902 - Allow lsm_plugin_t to read sysfs, read hwdata, rw to scsi_generic_device Resolves: #1238079 - Allow lsm_plugin_t to rw raw_fixed_disk. Resolves:#1238079 - Allow rhsmcertd to send signull to unconfined_service.- Allow httpd_suexec_t to read and write Apache stream sockets Resolves: #1243569 - Allow qpid to create lnk_files in qpid_var_lib_t Resolves: #1247279- Allow drbd to get attributes from filesystems. - Allow redis to read kernel parameters. Resolves: #1209518 - Allow virt_qemu_ga_t domtrans to passwd_t - Allow audisp_remote_t to start power unit files domain to allow halt system. Resolves: #1186780 - Allow audisp_remote_t to read/write user domain pty. Resolves: #1186780 - Label /usr/sbin/chpasswd as passwd_exec_t. - Allow sysadm to administrate ldap environment and allow to bind ldap port to allow to setup an LDAP server (389ds). Resolves:#1221121- gnome_dontaudit_search_config() needs to be a part of optinal_policy in pegasus.te - Allow pcp_pmcd daemon to read postfix config files. - Allow pcp_pmcd daemon to search postfix spool dirs. Resolves: #1213740 - Added Booleans: pcp_read_generic_logs. Resolves: #1213740 - Allow drbd to read configuration options used when loading modules. Resolves: #1134883 - Allow glusterd to manage nfsd and rpcd services. - Allow glusterd to communicate with cluster domains over stream socket. - glusterd call pcs utility which calls find for cib.* files and runs pstree under glusterd. Dontaudit access to security files and update gluster boolean to reflect these changes.- Allow glusterd to manage nfsd and rpcd services. - Allow networkmanager to communicate via dbus with systemd_hostanmed. Resolves: #1234954 - Allow stream connect logrotate to prosody. - Add prosody_stream_connect() interface. - httpd should be able to send signal/signull to httpd_suexec_t, instead of httpd_suexec_exec_t. - Allow prosody to create own tmp files/dirs. Resolves:#1212498- Allow networkmanager read rfcomm port. Resolves:#1212498 - Remove non exists label. - Fix *_admin intefaces where body is not consistent with header. - Label /usr/afs/ as afs_files_t, Allow afs_bosserver_t create afs_config_t and afs_dbdir_t dirs under afs_files_t, Allow afs_bosserver_t read kerberos config - Remove non exits nfsd_ro_t label. - Make all interfaces related to openshift_cache_t as deprecated. - Add rpm_var_run_t label to rpm_admin header - Add jabberd_lock_t label to jabberd_admin header. - Add samba_unconfined_script_exec_t to samba_admin header. - inn daemon should create innd_log_t objects in var_log_t instead of innd_var_run_t - Fix ctdb policy - Add samba_signull_winbind() - Add samba_signull_unconfined_net() - Allow ctdbd_t send signull to samba_unconfined_net_t. - Allow openshift_initrc_t to communicate with firewalld over dbus Resolves:#1221326- Allow gluster to connect to all ports. It is required by random services executed by gluster. - Add interfaces winbind_signull(), samba_unconfined_net_signull(). - Dontaudit smbd_t block_suspend capability. This is kernel bug. - Allow ctdbd sending signull to process winbind, samba_unconfined_net, to checking if processes exists. - Add tmpreaper booleans to use nfs_t and samba_share_t. - Fix path from /usr/sbin/redis-server to /usr/bin/redis-server - Allow connect ypserv to portmap_port_t - Fix paths in inn policy, Allow innd read innd_log_t dirs, Allow innd execute innd_etc_t files - Add support for openstack-nova-* packages - Allow NetworkManager_t send signull to dnssec_trigger_t. - Allow glusterd to execute showmount in the showmount domain. - Label swift-container-reconciler binary as swift_t. - Allow dnssec_trigger_t relabelfrom dnssec_trigger_var_run_t files. - Add cobbler_var_lib_t to "/var/lib/tftpboot/boot(/.*)?" Resolves:#1213540 - Merge all nova_* labels under one nova_t.- Add logging_syslogd_run_nagios_plugins boolean for rsyslog to allow transition to nagios unconfined plugins Resolves:#1233550 - Allow dnssec_trigger_t create dnssec_trigger_tmp_t files in /var/tmp/ - Add support for oddjob based helper in FreeIPA. - Add new boolean - httpd_run_ipa to allow httpd process to run IPA helper and dbus chat with oddjob. - Add nagios_domtrans_unconfined_plugins() interface. - Update mta_filetrans_named_content() interface to cover more db files. Resolves:#1167468 - Add back ftpd_use_passive_mode boolean with fixed description. - Allow pmcd daemon stream connect to mysqld. - Allow pcp domains to connect to own process using unix_stream_socket. Resolves:#1213709 - Allow abrt-upload-watch service to dbus chat with ABRT daemon and fsetid capability to allow run reporter-upload correctly. - Add new boolean - httpd_run_ipa to allow httpd process to run IPA helper and dbus chat with oddjob. - Add support for oddjob based helper in FreeIPA. - Allow dnssec_trigger_t create dnssec_trigger_tmp_t files in /var/tmp/- Allow iptables to read ctdbd lib files. Resolves:#1224879 - Add systemd_networkd_t to nsswitch domains. - Allow drbd_t write to fixed_disk_device. Reason: drbdmeta needs write to fixed_disk_device during initialization. Resolves:#1130675 - Allow NetworkManager write to sysfs. - Fix cron_system_cronjob_use_shares boolean to call fs interfaces which contain only entrypoint permission. - Add cron_system_cronjob_use_shares boolean to allow system cronjob to be executed from shares - NFS, CIFS, FUSE. It requires "entrypoint" permissios on nfs_t, cifs_t and fusefs_t SELinux types. - Allow NetworkManager write to sysfs. - Allow ctdb_t sending signull to smbd_t, for checking if smbd process exists. - Dontaudit apache to manage snmpd_var_lib_t files/dirs. - Add interface snmp_dontaudit_manage_snmp_var_lib_files(). - Dontaudit mozilla_plugin_t cap. sys_ptrace. - Rename xodbc-connect port to xodbc_connect - Allow ovsdb-server to connect on xodbc-connect and ovsdb tcp ports. - Allow iscsid write to fifo file kdumpctl_tmp_t. Appears when kdump generates the initramfs during the kernel boot. - Dontaudit chrome to read passwd file. - nrpe needs kill capability to make gluster moniterd nodes working. Resolves:#1235587- We allow can_exec() on ssh_keygen on gluster. But there is a transition defined by init_initrc_domain() because we need to allow execute unconfined services by glusterd. So ssh-keygen ends up with ssh_keygen_t and we need to allow to manage /var/lib/glusterd/geo-replication/secret.pem. - Allow sshd to execute gnome-keyring if there is configured pam_gnome_keyring.so. - Allow gnome-keyring executed by passwd to access /run/user/UID/keyring to change a password. - Label gluster python hooks also as bin_t. - Allow glusterd to interact with gluster tools running in a user domain - Add glusterd_manage_lib_files() interface. - ntop reads /var/lib/ntop/macPrefix.db and it needs dac_override. It has setuid/setgid. - Allow samba_t net_admin capability to make CIFS mount working. - S30samba-start gluster hooks wants to search audit logs. Dontaudit it. Resolves:#1224879- Allow glusterd to send generic signals to systemd_passwd_agent processes. - Allow glusterd to access init scripts/units without defined policy - Allow glusterd to run init scripts. - Allow glusterd to execute /usr/sbin/xfs_dbin glusterd_t domain. Resolves:#1224879- Calling cron_system_entry() in pcp_domain_template needs to be a part of optional_policy block. - Allow samba-net to access /var/lib/ctdbd dirs/files. - Allow glusterd to send a signal to smbd. - Make ctdbd as home manager to access also FUSE. - Allow glusterd to use geo-replication gluster tool. - Allow glusterd to execute ssh-keygen. - Allow glusterd to interact with cluster services. - Allow glusterd to connect to the system DBUS for service (acquire_svc). - Label /dev/log correctly. Resolves:#1230932- Back port the latest F22 changes to RHEL7. It should fix most of RHEL7.2 bugs - Add cgdcbxd policy Resolves:#1072493 - Fix ftp_homedir boolean Resolve:#1097775 - Dontaudit ifconfig writing inhertited /var/log/pluto.log. - Allow cluster domain to dbus chat with systemd-logind. Resolves:#1145215 - Dontaudit write access to inherited kdumpctl tmp files Resolves:#1156442 - Allow isnsd_t to communicate with sssd Resolves:#1167702 - Allow rwho_t to communicate with sssd Resolves:#1167718 - Allow sblim_gatherd_t to communicate with sssd Resolves:#1167732 - Allow pkcs_slotd_t to communicate with sssd Resolves:#1167737 - Allow openvswitch_t to communicate with sssd Resolves:#1167816 - Allow mysqld_safe_t to communicate with sssd Resolves:#1167832 - Allow sshd_keygen_t to communicate with sssd Resolves:#1167840 - Add support for iprdbg logging files in /var/log. Resolves:#1174363 - Allow tmpreaper_t to manage ntp log content Resolves:#1176965 - Allow gssd_t to manage ssh keyring Resolves:#1184791 - Allow httpd_sys_script_t to send system log messages Resolves:#1185231 - Allow apcupsd_t to read /sys/devices Resolves:#1189185 - Allow dovecot_t sys_resource capability Resolves:#1191143 - Add support for mongod/mongos systemd unit files. Resolves:#1197038 - Add bacula fixes - Added label mysqld_etc_t for /etc/my.cnf.d/ dir. Resolves:#1203991- Label /usr/libexec/postgresql-ctl as postgresql_exec_t. - Add more restriction on entrypoint for unconfined domains. - Only allow semanage_t to be able to setenforce 0, no all domains that use selinux_semanage interface - Allow all domains to read /dev/urandom. It is needed by all apps/services linked to libgcrypt. There is no harm to allow it by default. - Update policy/mls for sockets related to access perm. Rules were contradictory. - Add nagios_run_pnp4nagios and nagios_run_sudo booleans to allow r un sudo from NRPE utils scripts and allow run nagios in conjunction w ith PNP4Nagios. Resolves:#1201054 - Don't use deprecated userdom_manage_tmpfs_role() interface calliing and use userdom_manage_tmp_role() instead. - Update virt_read_pid_files() interface to allow read also symlinks with virt_var_run_t type - Label /var/lib/tftpboot/aarch64(/.*)? and /var/lib/tftpboot/images2(/.*)? - Add support for iprdbg logging files in /var/log. - Add fixes to rhsmcertd_t - Allow puppetagent_t to transfer firewalld messages over dbus - Add support for /usr/libexec/mongodb-scl-helper RHSCL helper script. - Added label mysqld_etc_t for /etc/my.cnf.d/ dir. - Add support for mongod/mongos systemd unit files. - cloudinit and rhsmcertd need to communicate with dbus - Allow dovecot_t sys_resource capability- ALlow mongod execmem by default. - Update policy/mls for sockets. Rules were contradictory. Resolves:#1207133 - Allow a user to login with different security level via ssh.- Update seutil_manage_config() interface. Resolves:#1185962 - Allow pki-tomcat relabel pki_tomcat_etc_rw_t. - Turn on docker_transition_unconfined by default- Allow virtd to list all mountpoints. Resolves:#1180713- pkcsslotd_lock_t should be an alias for pkcs_slotd_lock_t. - Allow fowner capability for sssd because of selinux_child handling. - ALlow bind to read/write inherited ipsec pipes - Allow hypervkvp to read /dev/urandom and read addition states/config files. - Allow gluster rpm scripletto create glusterd socket with correct labeling. This is a workaround until we get fix in glusterd. - Add glusterd_filetrans_named_pid() interface - Allow radiusd to connect to radsec ports. - Allow setuid/setgid for selinux_child - Allow lsmd plugin to connect to tcp/5988 by default. - Allow lsmd plugin to connect to tcp/5989 by default. - Update ipsec_manage_pid() interface. Resolves:#1184978- Update ipsec_manage_pid() interface. Resolves:#1184978- Allow ntlm_auth running in winbind_helper_t to access /dev/urandom.- Add auditing support for ipsec. Resolves:#1182524 - Label /ostree/deploy/rhel-atomic-host/deploy directory as system_conf_t - Allow netutils chown capability to make tcpdump working with -w- Allow ipsec to execute _updown.netkey script to run unbound-control. - Allow neutron to read rpm DB. - Add additional fixes for hyperkvp * creates new ifcfg-{name} file * Runs hv_set_ifconfig.sh, which does the following * Copies ifcfg-{name} to /etc/sysconfig/network-scripts - Allow svirt to read symbolic links in /sys/fs/cgroups labeled as tmpfs_t - Add labeling for pacemaker.log. - Allow radius to connect/bind radsec ports. - Allow pm-suspend running as virt_qemu_ga to read /var/log/pm-suspend.log - Allow virt_qemu_ga to dbus chat with rpm. - Update virt_read_content() interface to allow read also char devices. - Allow glance-registry to connect to keystone port. Resolves:#1181818- Allow sssd to send dbus all user domains. Resolves:#1172291 - Allow lsm plugin to read certificates. - Fix labeling for keystone CGI scripts. - Make snapperd back as unconfined domain.- Fix bugs in interfaces discovered by sepolicy. - Allow slapd to read /usr/share/cracklib/pw_dict.hwm. - Allow lsm plugins to connect to tcp/18700 by default. - Allow brltty mknod capability to allow create /var/run/brltty/vcsa. - Fix pcp_domain_template() interface. - Fix conman.te. - Allow mon_fsstatd to read /proc/sys/fs/binfmt_misc - Allow glance-scrubber to connect tcp/9191. - Add missing setuid capability for sblim-sfcbd. - Allow pegasus ioctl() on providers. - Add conman_can_network. - Allow chronyd to read chrony conf files located in /run/timemaster/. - Allow radius to bind on tcp/1813 port. - dontaudit block suspend access for openvpn_t - Allow conman to create files/dirs in /tmp. - Update xserver_rw_xdm_keys() interface to have 'setattr'. Resolves:#1172291 - Allow sulogin to read /dev/urandom and /dev/random. - Update radius port definition to have also tcp/18121 - Label prandom as random_device_t. - Allow charon to manage files in /etc/strongimcv labeled as ipsec_conf_t.- Allow virt_qemu_ga_t to execute kmod. - Add missing files_dontaudit_list_security_dirs() for smbd_t in samba_export_all_ro boolean. - Add additionnal MLS attribute for oddjob_mkhomedir to create homedirs. Resolves:#1113725 - Enable OpenStack cinder policy - Add support for /usr/share/vdsm/daemonAdapter - Add support for /var/run/gluster- Remove old pkcsslotd.pp from minimum package - Allow rlogind to use also rlogin ports. - Add support for /usr/libexec/ntpdate-wrapper. Label it as ntpdate_exec_t. - Allow bacula to connect also to postgresql. - Label /usr/libexec/tomcat/server as tomcat_exec_t - Add support for /usr/sbin/ctdbd_wrapper - Add support for /usr/libexec/ppc64-diag/rtas_errd - Allow rpm_script_roles to access system_mail_t - Allow brltty to create /var/run/brltty - Allow lsmd plugin to access netlink_route_socket - Allow smbcontrol to read passwd - Add support for /usr/libexec/sssd/selinux_child and create sssd_selinux_manager_t domain for it Resolves:#1140106 - Allow osad to execute rhn_check - Allow load_policy to rw inherited sssd pipes because of selinux_child - Allow admin SELinux users mounting / as private within a new mount namespace as root in MLS - Add additional fixes for su_restricted_domain_template to make moving to sysadm_r and trying to su working correctly - Add additional booleans substitions- Add seutil_dontaudit_access_check_semanage_module_store() interface Resolves:#1140106 - Update to have all _systemctl() interface also init_reload_services(). - Dontaudit access check on SELinux module store for sssd. - Add labeling for /sbin/iw. - Allow named_filetrans_domain to create ibus directory with correct labeling.- Allow radius to bind tcp/1812 radius port. - Dontaudit list user_tmp files for system_mail_t. - Label virt-who as virtd_exec_t. - Allow rhsmcertd to send a null signal to virt-who running as virtd_t. - Add missing alias for _content_rw_t. Resolves:#1089177 - Allow spamd to access razor-agent.log. - Add fixes for sfcb from libvirt-cim TestOnly bug. - Allow NetworkManager stream connect on openvpn. - Make /usr/bin/vncserver running as unconfined_service_t. - getty_t should be ranged in MLS. Then also local_login_t runs as ranged domain. - Label /etc/docker/certs.d as cert_t.- Label /etc/strongimcv as ipsec_conf_file_t. - Add support for /usr/bin/start-puppet-ca helper script Resolves:#1160727 - Allow rpm scripts to enable/disable transient systemd units. Resolves:#1154613 - Make kpropdas nsswitch domain Resolves:#1153561 - Make all glance domain as nsswitch domains Resolves:#1113281 - Allow selinux_child running as sssd access check on /etc/selinux/targeted/modules/active - Allow access checks on setfiles/load_policy/semanage_lock for selinux_child running as sssd_t Resolves:#1140106- Dontaudit access check on setfiles/load_policy for sssd_t. Resolves:#1140106 - Add kdump_rw_inherited_kdumpctl_tmp_pipes() Resolves:#1156442 - Make linuxptp services as unconfined. - Added new policy linuxptp. Resolves:#1149693 - Label keystone cgi files as keystone_cgi_script_exec_t. Resolves:#1138424 - Make tuned as unconfined domain- Allow guest to connect to libvirt using unix_stream_socket. - Allow all bus client domains to dbus chat with unconfined_service_t. - Allow inetd service without own policy to run in inetd_child_t which is unconfined domain. - Make opensm as nsswitch domain to make it working with sssd. - Allow brctl to read meminfo. - Allow winbind-helper to execute ntlm_auth in the caller domain. Resolves:#1160339 - Make plymouthd as nsswitch domain to make it working with sssd. Resolves:#1160196 - Make drbd as nsswitch domain to make it working with sssd. - Make conman as nsswitch domain to make ipmitool.exp runing as conman_t working. - Add support for /var/lib/sntp directory. - Add fixes to allow docker to create more content in tmpfs ,and donaudit reading /proc - Allow winbind to read usermodehelper - Allow telepathy domains to execute shells and bin_t - Allow gpgdomains to create netlink_kobject_uevent_sockets - Allow mongodb to bind to the mongo port and mongos to run as mongod_t - Allow abrt to read software raid state. - Allow nslcd to execute netstat. - Allow dovecot to create user's home directory when they log into IMAP. - Allow login domains to create kernel keyring with different level.- Allow modemmanger to connectto itself Resolves:#1120152 - Allow pki_tomcat to create link files in /var/lib/pki-ca. Resolves:#1121744 - varnishd needs to have fsetid capability Resolves:#1125165 - Allow snapperd to dbus chat with system cron jobs. Resolves:#1152447 - Allow dovecot to create user's home directory when they log into IMAP Resolves:#1152773 - Add labeling for /usr/sbin/haproxy-systemd-wrapper wrapper to make haproxy running haproxy_t. - ALlow listen and accept on tcp socket for init_t in MLS. Previously it was for xinetd_t. - Allow nslcd to execute netstat. - Add suppor for keepalived unconfined scripts and allow keepalived to read all domain state and kill capability. - Allow nslcd to read /dev/urandom.- Add back kill permisiion for system class Resolves:#1150011- Add back kill permisiion for service class Resolves:#1150011 - Make rhsmcertd_t also as dbus domain. - Allow named to create DNS_25 with correct labeling. - Add cloudform_dontaudit_write_cloud_log() - Call auth_use_nsswitch to apache to read/write cloud-init keys. - Allow cloud-init to dbus chat with certmonger. - Fix path to mon_statd_initrc_t script. - Allow all RHCS services to read system state. - Allow dnssec_trigger_t to execute unbound-control in own domain. - kernel_read_system_state needs to be called with type. Moved it to antivirus.if. - Added policy for mon_statd and mon_procd services. BZ (1077821) - Allow opensm_t to read/write /dev/infiniband/umad1. - Allow mongodb to manage own log files. - Allow neutron connections to system dbus. - Add support for /var/lib/swiftdirectory. - Allow nova-scheduler to read certs. - Allow openvpn to access /sys/fs/cgroup dir. - Allow openvpn to execute systemd-passwd-agent in systemd_passwd_agent_t to make openvpn working with systemd. - Fix samba_export_all_ro/samba_export_all_rw booleans to dontaudit search/read security files. - Add auth_use_nsswitch for portreserve to make it working with sssd. - automount policy is non-base module so it needs to be called in optional block. - ALlow sensord to getattr on sysfs. - Label /usr/share/corosync/corosync as cluster_exec_t. - Allow lmsd_plugin to read passwd file. BZ(1093733) - Allow read antivirus domain all kernel sysctls. - Allow mandb to getattr on file systems - Allow nova-console to connect to mem_cache port. - Make sosreport as unconfined domain. - Allow mondogdb to 'accept' accesses on the tcp_socket port. - ALlow sanlock to send a signal to virtd_t.- Build also MLS policy Resolves:#1138424- Add back kill permisiion for system class - Allow iptables read fail2ban logs. - Fix radius labeled ports - Add userdom_manage_user_tmpfs_files interface - Allow libreswan to connect to VPN via NM-libreswan. - Label 4101 tcp port as brlp port - fix dev_getattr_generic_usb_dev interface - Allow all domains to read fonts - Make sure /run/systemd/generator and system is labeled correctly on creation. - Dontaudit aicuu to search home config dir. - Make keystone_cgi_script_t domain. Resolves:#1138424 - Fix bug in drbd policy, - Added support for cpuplug. - ALlow sanlock_t to read sysfs_t. - Added sendmail_domtrans_unconfined interface - Fix broken interfaces - radiusd wants to write own log files. - Label /usr/libexec/rhsmd as rhsmcertd_exec_t - Allow rhsmcertd send signull to setroubleshoot. - Allow rhsmcertd manage rpm db. - Added policy for blrtty. - Fix keepalived policy - Allow rhev-agentd dbus chat with systemd-logind. - Allow keepalived manage snmp var lib sock files. - Add support for /var/lib/graphite-web - Allow NetworkManager to create Bluetooth SDP sockets - It's going to do the the discovery for DUN service for modems with Bluez 5. - Allow swift to connect to all ephemeral ports by default. - Allow sssd to read selinux config to add SELinux user mapping. - Allow lsmd to search own plguins. - Allow abrt to read /dev/memto generate an unique machine_id and uses sosuploader's algorithm based off dmidecode[1] fields. - ALlow zebra for user/group look-ups. - Allow nova domains to getattr on all filesystems. - Allow collectd sys_ptrace and dac_override caps because of reading of /proc/%i/io for several processes. - Allow pppd to connect to /run/sstpc/sstpc-nm-sstp-service-28025 over unix stream socket. - Allow rhnsd_t to manage also rhnsd config symlinks. - ALlow user mail domains to create dead.letter. - Allow rabbitmq_t read rabbitmq_var_lib_t lnk files. - Allow pki-tomcat to change SELinux object identity. - Allow radious to connect to apache ports to do OCSP check - Allow git cgi scripts to create content in /tmp - Allow cockpit-session to do GSSAPI logins. - Allow sensord read in /proc - Additional access required by usbmuxd- Allow locate to look at files/directories without labels, and chr_file and blk_file on non dev file systems - Label /usr/lib/erlang/erts.*/bin files as bin_t - Add files_dontaudit_access_check_home_dir() inteface. - Allow udev_t mounton udev_var_run_t dirs #(1128618) - Add systemd_networkd_var_run_t labeling for /var/run/systemd/netif and allow systemd-networkd to manage it. - Add init_dontaudit_read_state() interface. - Add label for ~/.local/share/fonts - Allow unconfined_r to access unconfined_service_t. - Allow init to read all config files - Add new interface to allow creation of file with lib_t type - Assign rabbitmq port. - Allow unconfined_service_t to dbus chat with all dbus domains - Add new interfaces to access users keys. - Allow domains to are allowed to mounton proc to mount on files as well as dirs - Fix labeling for HOME_DIR/tmp and HOME_DIR/.tmp directories. - Add a port definition for shellinaboxd - Label ~/tmp and ~/.tmp directories in user tmp dirs as user_tmp_t - Allow userdomains to stream connect to pcscd for smart cards - Allow programs to use pam to search through user_tmp_t dires (/tmp/.X11-unix) - Update to rawhide-contrib changes Resolves:#1123844- Rebase to 3.13.1 which we have in Fedora21 Resolves:#1128284- Back port fixes from Fedora. Mainly OpenStack and Docker fixes- Add policy-rhel-7.1-{base,contrib} patches- Add support for us_cli ports - Fix labeling for /var/run/user//gvfs - add support for tcp/9697 - Additional rules required by openstack, needs backport to F20 and RHEL7 - Additional access required by docker - ALlow motion to use tcp/8082 port - Allow init_t to setattr/relabelfrom dhcp state files - Dontaudit antivirus domains read access on all security files by default - Add missing alias for old amavis_etc_t type - Allow block_suspend cap for haproxy - Additional fixes for instack overcloud - Allow OpenStack to read mysqld_db links and connect to MySQL - Remove dup filename rules in gnome.te - Allow sys_chroot cap for httpd_t and setattr on httpd_log_t - Allow iscsid to handle own unit files - Add iscsi_systemctl() - Allow mongod to create also sock_files in /run with correct labeling - Allow httpd to send signull to apache script domains and don't audit leaks - Allow rabbitmq_beam to connect to httpd port - Allow aiccu stream connect to pcscd - Allow dmesg to read hwdata and memory dev - Allow all freeipmi domains to read/write ipmi devices - Allow sblim_sfcbd to use also pegasus-https port - Allow rabbitmq_epmd to manage rabbit_var_log_t files - Allow chronyd to read /sys/class/hwmon/hwmon1/device/temp2_input - Allow docker to status any unit file and allow it to start generic unit files- Change hsperfdata_root to have as user_tmp_t Resolves:#1076523- Fix Multiple same specifications for /var/named/chroot/dev/zero - Add labels for /var/named/chroot_sdb/dev devices - Add support for strongimcv - Use kerberos_keytab_domains in auth_use_nsswitch - Update auth_use_nsswitch to make all these types as kerberos_keytab_domain to - Allow net_raw cap for neutron_t and send sigkill to dnsmasq - Fix ntp_filetrans_named_content for sntp-kod file - Add httpd_dbus_sssd boolean - Dontaudit exec insmod in boinc policy - Rename kerberos_keytab_domain to kerberos_keytab_domains - Add kerberos_keytab_domain() - Fix kerberos_keytab_template() - Make all domains which use kerberos as kerberos_keytab_domain Resolves:#1083670 - Allow kill capability to winbind_t- varnishd wants chown capability - update ntp_filetrans_named_content() interface - Add additional fixes for neutron_t. #1083335 - Dontaudit getattr on proc_kcore_t - Allow pki_tomcat_t to read ipa lib files - Allow named_filetrans_domain to create /var/cache/ibus with correct labelign - Allow init_t run /sbin/augenrules - Add dev_unmount_sysfs_fs and sysnet_manage_ifconfig_run interfaces - Allow unpriv SELinux user to use sandbox - Add default label for /tmp/hsperfdata_root- Add file subs also for /var/home- Allow xauth_t to read user_home_dir_t lnk_file - Add labeling for lightdm-data - Allow certmonger to manage ipa lib files - Add support for /var/lib/ipa - Allow pegasus to getattr virt_content - Added some new rules to pcp policy - Allow chrome_sandbox to execute config_home_t - Add support for ABRT FAF- Allow kdm to send signull to remote_login_t process - Add gear policy - Turn on gear_port_t - Allow cgit to read gitosis lib files by default - Allow vdagent to read xdm state - Allow NM and fcoeadm to talk together over unix_dgram_socket- Back port fixes for pegasus_openlmi_admin_t from rawhide Resolves:#1080973 - Add labels for ostree - Add SELinux awareness for NM - Label /usr/sbin/pwhistory_helper as updpwd_exec_t- add gnome_append_home_config() - Allow thumb to append GNOME config home files - Allow rasdaemon to rw /dev/cpu//msr - fix /var/log/pki file spec - make bacula_t as auth_nsswitch domain - Identify pki_tomcat_cert_t as a cert_type - Define speech-dispater_exec_t as an application executable - Add a new file context for /var/named/chroot/run directory - update storage_filetrans_all_named_dev for sg* devices - Allow auditctl_t to getattr on all removeable devices - Allow nsswitch_domains to stream connect to nmbd - Allow unprivusers to connect to memcached - label /var/lib/dirsrv/scripts-INSTANCE as bin_t- Allow also unpriv user to run vmtools - Allow secadm to read /dev/urandom and meminfo Resolves:#1079250 - Add booleans to allow docker processes to use nfs and samba - Add mdadm_tmpfs support - Dontaudit net_amdin for /usr/lib/jvm/java-1.7.0-openjdk-1.7.0.51-2.4.5.1.el7.x86_64/jre-abrt/bin/java running as pki_tomcat_t - Allow vmware-user-sui to use user ttys - Allow talk 2 users logged via console too - Allow ftp services to manage xferlog_t - Make all pcp domanis as unconfined for RHEL7.0 beucause of new policies - allow anaconda to dbus chat with systemd-localed- allow anaconda to dbus chat with systemd-localed - Add fixes for haproxy based on bperkins@redhat.com - Allow cmirrord to make dmsetup working - Allow NM to execute arping - Allow users to send messages through talk - Add userdom_tmp_role for secadm_t- Add additional fixes for rtas_errd - Fix transitions for tmp/tmpfs in rtas.te - Allow rtas_errd to readl all sysctls- Add support for /var/spool/rhsm/debug - Make virt_sandbox_use_audit as True by default - Allow svirt_sandbox_domains to ptrace themselves- Allow docker containers to manage /var/lib/docker content- Allow docker to read tmpfs_t symlinks - Allow sandbox svirt_lxc_net_t to talk to syslog and to sssd over stream sockets- Allow collectd to talk to libvirt - Allow chrome_sandbox to use leaked unix_stream_sockets - Dontaudit leaks of sockets into chrome_sandbox_t - If you create a cups directory in /var/cache then it should be labeled cups_rw_etc_t - Run vmtools as unconfined domains - Allow snort to manage its log files - Allow systemd_cronjob_t to be entered via bin_t - Allow procman to list doveconf_etc_t - allow keyring daemon to create content in tmpfs directories - Add proper labelling for icedtea-web - vpnc is creating content in networkmanager var run directory - Label sddm as xdm_exec_t to make KDE working again - Allow postgresql to read network state - Allow java running as pki_tomcat to read network sysctls - Fix cgroup.te to allow cgred to read cgconfig_etc_t - Allow beam.smp to use ephemeral ports - Allow winbind to use the nis to authenticate passwords- Make rtas_errd_t as unconfined domain for F20.It needs additional fixes. It runs rpm at least. - Allow net_admin cap for fence_virtd running as fenced_t - Make abrt-java-connector working - Make cimtest script 03_defineVS.py of ComputerSystem group working - Fix git_system_enable_homedirs boolean - Allow munin mail plugins to read network systcl- Allow vmtools_helper_t to execute bin_t - Add support for /usr/share/joomla - /var/lib/containers should be labeled as openshift content for now - Allow docker domains to talk to the login programs, to allow a process to login into the container - Allow install_t do dbus chat with NM - Fix interface names in anaconda.if - Add install_t for anaconda. A new type is a part of anaconda policy - sshd to read network sysctls- Allow zabbix to send system log msgs - Allow init_t to stream connect to ipsec Resolves:#1060775- Add docker_connect_any boolean- Allow unpriv SELinux users to dbus chat with firewalld - Add lvm_write_metadata() - Label /etc/yum.reposd dir as system_conf_t. Should be safe because system_conf_t is base_ro_file_type - Allow pegasus_openlmi_storage_t to write lvm metadata - Add hide_broken_symptoms for kdumpgui because of systemd bug - Make kdumpgui_t as unconfined domain Resolves:#1044299 - Allow docker to connect to tcp/5000- Allow numad to write scan_sleep_millisecs - Turn on entropyd_use_audio boolean by default - Allow cgred to read /etc/cgconfig.conf because it contains templates used together with rules from /etc/cgrules.conf. - Allow lscpu running as rhsmcertd_t to read /proc/sysinfo - Fix label on irclogs in the homedir - Allow kerberos_keytab_domain domains to manage keys until we get sssd fix - Allow postgresql to use ldap - Add missing syslog-conn port - Add support for /dev/vmcp and /dev/sclp Resolves:#1069310- Modify xdm_write_home to allow create files/links in /root with xdm_home_ - Allow virt domains to read network state Resolves:#1072019- Added pcp rules - dontaudit openshift_cron_t searching random directories, should be back ported to RHEL6 - clean up ctdb.te - Allow ctdbd to connect own ports - Fix samba_export_all_rw booleanto cover also non security dirs - Allow swift to exec rpm in swift_t and allow to create tmp files/dirs - Allow neutron to create /run/netns with correct labeling - Allow certmonger to list home dirs- Change userdom_use_user_inherited_ttys to userdom_use_user_ttys for systemd-tty-ask - Add sysnet_filetrans_named_content_ifconfig() interface - Allow ctdbd to connect own ports - Fix samba_export_all_rw booleanto cover also non security dirs - Allow swift to exec rpm in swift_t and allow to create tmp files/dirs - Allow neutron to create /run/netns with correct labeling - Allow kerberos keytab domains to manage sssd/userdomain keys" - Allow to run ip cmd in neutron_t domain- Allow block_suspend cap2 for systemd-logind and rw dri device - Add labeling for /usr/libexec/nm-libreswan-service - Allow locallogin to rw xdm key to make Virtual Terminal login providing smartcard pin working - Add xserver_rw_xdm_keys() - Allow rpm_script_t to dbus chat also with systemd-located - Fix ipa_stream_connect_otpd() - update lpd_manage_spool() interface - Allow krb5kdc to stream connect to ipa-otpd - Add ipa_stream_connect_otpd() interface - Allow vpnc to unlink NM pids - Add networkmanager_delete_pid_files() - Allow munin plugins to access unconfined plugins - update abrt_filetrans_named_content to cover /var/spool/debug - Label /var/spool/debug as abrt_var_cache_t - Allow rhsmcertd to connect to squid port - Make docker_transition_unconfined as optional boolean - Allow certmonger to list home dirs- Make snapperd as unconfined domain and add additional fixes for it - Remove nsplugin.pp module on upgrade- Add snapperd_home_t for HOME_DIR/.snapshots directory - Make sosreport as unconfined domain - Allow sosreport to execute grub2-probe - Allow NM to manage hostname config file - Allow systemd_timedated_t to dbus chat with rpm_script_t - Allow lsmd plugins to connect to http/ssh/http_cache ports by default - Add lsmd_plugin_connect_any boolean - Allow mozilla_plugin to attempt to set capabilities - Allow lsdm_plugins to use tcp_socket - Dontaudit mozilla plugin from getattr on /proc or /sys - Dontaudit use of the keyring by the services in a sandbox - Dontaudit attempts to sys_ptrace caused by running ps for mysqld_safe_t - Allow rabbitmq_beam to connect to jabber_interserver_port - Allow logwatch_mail_t to transition to qmail_inject and queueu - Added new rules to pcp policy - Allow vmtools_helper_t to change role to system_r - Allow NM to dbus chat with vmtools - Fix couchdb_manage_files() to allow manage couchdb conf files - Add support for /var/run/redis.sock - dontaudit gpg trying to use audit - Allow consolekit to create log directories and files - Fix vmtools policy to allow user roles to access vmtools_helper_t - Allow block_suspend cap2 for ipa-otpd - Allow pkcsslotd to read users state - Add ioctl to init_dontaudit_rw_stream_socket - Add systemd_hostnamed_manage_config() interface - Remove transition for temp dirs created by init_t - gdm-simple-slave uses use setsockopt - sddm-greater is a xdm type program- Add lvm_read_metadata() - Allow auditadm to search /var/log/audit dir - Add lvm_read_metadata() interface - Allow confined users to run vmtools helpers - Fix userdom_common_user_template() - Generic systemd unit scripts do write check on / - Allow init_t to create init_tmp_t in /tmp.This is for temporary content created by generic unit files - Add additional fixes needed for init_t and setup script running in generic unit files - Allow general users to create packet_sockets - added connlcli port - Add init_manage_transient_unit() interface - Allow init_t (generic unit files) to manage rpc state date as we had it for initrc_t - Fix userdomain.te to require passwd class - devicekit_power sends out a signal to all processes on the message bus when power is going down - Dontaudit rendom domains listing /proc and hittping system_map_t - Dontauit leaks of var_t into ifconfig_t - Allow domains that transition to ssh_t to manipulate its keyring - Define oracleasm_t as a device node - Change to handle /root as a symbolic link for os-tree - Allow sysadm_t to create packet_socket, also move some rules to attributes - Add label for openvswitch port - Remove general transition for files/dirs created in /etc/mail which got etc_aliases_t label. - Allow postfix_local to read .forward in pcp lib files - Allow pegasus_openlmi_storage_t to read lvm metadata - Add additional fixes for pegasus_openlmi_storage_t - Allow bumblebee to manage debugfs - Make bumblebee as unconfined domain - Allow snmp to read etc_aliases_t - Allow lscpu running in pegasus_openlmi_storage_t to read /dev/mem - Allow pegasus_openlmi_storage_t to read /proc/1/environ - Dontaudit read gconf files for cupsd_config_t - make vmtools as unconfined domain - Add vmtools_helper_t for helper scripts. Allow vmtools shutdonw a host and run ifconfig. - Allow collectd_t to use a mysql database - Allow ipa-otpd to perform DNS name resolution - Added new policy for keepalived - Allow openlmi-service provider to manage transitient units and allow stream connect to sssd - Add additional fixes new pscs-lite+polkit support - Add labeling for /run/krb5kdc - Change w3c_validator_tmp_t to httpd_w3c_validator_tmp_t in F20 - Allow pcscd to read users proc info - Dontaudit smbd_t sending out random signuls - Add boolean to allow openshift domains to use nfs - Allow w3c_validator to create content in /tmp - zabbix_agent uses nsswitch - Allow procmail and dovecot to work together to deliver mail - Allow spamd to execute files in homedir if boolean turned on - Allow openvswitch to listen on port 6634 - Add net_admin capability in collectd policy - Fixed snapperd policy - Fixed bugsfor pcp policy - Allow dbus_system_domains to be started by init - Fixed some interfaces - Add kerberos_keytab_domain attribute - Fix snapperd_conf_t def- Addopt corenet rules for unbound-anchor to rpm_script_t - Allow runuser to send send audit messages. - Allow postfix-local to search .forward in munin lib dirs - Allow udisks to connect to D-Bus - Allow spamd to connect to spamd port - Fix syntax error in snapper.te - Dontaudit osad to search gconf home files - Allow rhsmcertd to manage /etc/sysconf/rhn director - Fix pcp labeling to accept /usr/bin for all daemon binaries - Fix mcelog_read_log() interface - Allow iscsid to manage iscsi lib files - Allow snapper domtrans to lvm_t. Add support for /etc/snapper and allow snapperd to manage it. - Make tuned_t as unconfined domain for RHEL7.0 - Allow ABRT to read puppet certs - Add sys_time capability for virt-ga - Allow gemu-ga to domtrans to hwclock_t - Allow additional access for virt_qemu_ga_t processes to read system clock and send audit messages - Fix some AVCs in pcp policy - Add to bacula capability setgid and setuid and allow to bind to bacula ports - Changed label from rhnsd_rw_conf_t to rhnsd_conf_t - Add access rhnsd and osad to /etc/sysconfig/rhn - drbdadm executes drbdmeta - Fixes needed for docker - Allow epmd to manage /var/log/rabbitmq/startup_err file - Allow beam.smp connect to amqp port - Modify xdm_write_home to allow create also links as xdm_home_t if the boolean is on true - Allow init_t to manage pluto.ctl because of init_t instead of initrc_t - Allow systemd_tmpfiles_t to manage all non security files on the system - Added labels for bacula ports - Fix label on /dev/vfio/vfio - Add kernel_mounton_messages() interface - init wants to manage lock files for iscsi- Added osad policy - Allow postfix to deliver to procmail - Allow bumblebee to seng kill signal to xserver - Allow vmtools to execute /usr/bin/lsb_release - Allow docker to write system net ctrls - Add support for rhnsd unit file - Add dbus_chat_session_bus() interface - Add dbus_stream_connect_session_bus() interface - Fix pcp.te - Fix logrotate_use_nfs boolean - Add lot of pcp fixes found in RHEL7 - fix labeling for pmie for pcp pkg - Change thumb_t to be allowed to chat/connect with session bus type - Allow call renice in mlocate - Add logrotate_use_nfs boolean - Allow setroubleshootd to read rpc sysctl- Turn on bacula, rhnsd policy - Add support for rhnsd unit file - Add dbus_chat_session_bus() interface - Add dbus_stream_connect_session_bus() interface - Fix logrotate_use_nfs boolean - Add lot of pcp fixes found in RHEL7 - fix labeling for pmie for pcp pkg - Change thumb_t to be allowed to chat/connect with session bus type - Allow call renice in mlocate - Add logrotate_use_nfs boolean - Allow setroubleshootd to read rpc sysctl - Fixes for *_admin interfaces - Add pegasus_openlmi_storage_var_run_t type def - Add support for /var/run/openlmi-storage - Allow tuned to create syslog.conf with correct labeling - Add httpd_dontaudit_search_dirs boolean - Add support for winbind.service - ALlow also fail2ban-client to read apache logs - Allow vmtools to getattr on all fs - Add support for dey_sapi port - Add logging_filetrans_named_conf() - Allow passwd_t to use ipc_lock, so that it can change the password in gnome-keyring- Update snapper policy - Allow domains to append rkhunter lib files - Allow snapperd to getattr on all fs - Allow xdm to create /var/gdm with correct labeling - Add label for snapper.log - Allow fail2ban-client to read apache log files - Allow thumb_t to execute dbus-daemon in thumb_t- Allow gdm to create /var/gdm with correct labeling - Allow domains to append rkhunterl lib files. #1057982 - Allow systemd_tmpfiles_t net_admin to communicate with journald - Add interface to getattr on an isid_type for any type of file - Update libs_filetrans_named_content() to have support for /usr/lib/debug directory - Allow initrc_t domtrans to authconfig if unconfined is enabled - Allow docker and mount on devpts chr_file - Allow docker to transition to unconfined_t if boolean set - init calling needs to be optional in domain.te - Allow uncofined domain types to handle transient unit files - Fix labeling for vfio devices - Allow net_admin capability and send system log msgs - Allow lldpad send dgram to NM - Add networkmanager_dgram_send() - rkhunter_var_lib_t is correct type - Back port pcp policy from rawhide - Allow openlmi-storage to read removable devices - Allow system cron jobs to manage rkhunter lib files - Add rkhunter_manage_lib_files() - Fix ftpd_use_fusefs boolean to allow manage also symlinks - Allow smbcontrob block_suspend cap2 - Allow slpd to read network and system state info - Allow NM domtrans to iscsid_t if iscsiadm is executed - Allow slapd to send a signal itself - Allow sslget running as pki_ra_t to contact port 8443, the secure port of the CA. - Fix plymouthd_create_log() interface - Add rkhunter policy with files type definition for /var/lib/rkhunter until it is fixed in rkhunter package - Add mozilla_plugin_exec_t for /usr/lib/firefox/plugin-container - Allow postfix and cyrus-imapd to work out of box - Allow fcoemon to talk with unpriv user domain using unix_stream_socket - Dontaudit domains that are calling into journald to net_admin - Add rules to allow vmtools to do what it does - snapperd is D-Bus service - Allow OpenLMI PowerManagement to call 'systemctl --force reboot' - Add haproxy_connect_any boolean - Allow haproxy also to use http cache port by default Resolves:#1058248- Allow apache to write to the owncloud data directory in /var/www/html... - Allow consolekit to create log dir - Add support for icinga CGI scripts - Add support for icinga - Allow kdumpctl_t to create kdump lock file Resolves:#1055634 - Allow kdump to create lnk lock file - Allow nscd_t block_suspen capability - Allow unconfined domain types to manage own transient unit file - Allow systemd domains to handle transient init unit files - Add interfaces to handle transient- Add cron unconfined role support for uncofined SELinux user - Call corenet_udp_bind_all_ports() in milter.te - Allow fence_virtd to connect to zented port - Fix header for mirrormanager_admin() - Allow dkim-milter to bind udp ports - Allow milter domains to send signull itself - Allow block_suspend for yum running as mock_t - Allow beam.smp to manage couchdb files - Add couchdb_manage_files() - Add labeling for /var/log/php_errors.log - Allow bumblebee to stream connect to xserver - Allow bumblebee to send a signal to xserver - gnome-thumbnail to stream connect to bumblebee - Allow xkbcomp running as bumblebee_t to execute bin_t - Allow logrotate to read squid.conf - Additional rules to get docker and lxc to play well with SELinux - Allow bumbleed to connect to xserver port - Allow pegasus_openlmi_storage_t to read hwdata- Allow init_t to work on transitient and snapshot unit files - Add logging_manage_syslog_config() - Update sysnet_dns_name_resolve() to allow connect to dnssec por - Allow pegasus_openlmi_storage_t to read hwdata Resolves:#1031721 - Fix rhcs_rw_cluster_tmpfs() - Allow fenced_t to bind on zented udp port - Added policy for vmtools - Fix mirrormanager_read_lib_files() - Allow mirromanager scripts running as httpd_t to manage mirrormanager pid files - Allow ctdb to create sock files in /var/run/ctdb - Add sblim_filetrans_named_content() interface - Allow rpm scritplets to create /run/gather with correct labeling - Allow gnome keyring domains to create gnome config dirs - Dontaudit read/write to init stream socket for lsmd_plugin_t - Allow automount to read nfs link files - Allow lsm plugins to read/write lsmd stream socket - Allow certmonger to connect ldap port to make IPA CA certificate renewal working. - Add also labeling for /var/run/ctdb - Add missing labeling for /var/lib/ctdb - ALlow tuned to manage syslog.conf. Should be fixed in tuned. #1030446 - Dontaudit hypervkvp to search homedirs - Dontaudit hypervkvp to search admin homedirs - Allow hypervkvp to execute bin_t and ifconfig in the caller domain - Dontaudit xguest_t to read ABRT conf files - Add abrt_dontaudit_read_config() - Allow namespace-init to getattr on fs - Add thumb_role() also for xguest - Add filename transitions to create .spamassassin with correct labeling - Allow apache domain to read mirrormanager pid files - Allow domains to read/write shm and sem owned by mozilla_plugin_t - Allow alsactl to send a generic signal to kernel_t- Add back rpm_run() for unconfined user- Add missing files_create_var_lib_dirs() - Fix typo in ipsec.te - Allow passwd to create directory in /var/lib - Add filename trans also for event21 - Allow iptables command to read /dev/rand - Add sigkill capabilityfor ipsec_t - Add filename transitions for bcache devices - Add additional rules to create /var/log/cron by syslogd_t with correct labeling - Add give everyone full access to all key rings - Add default lvm_var_run_t label for /var/run/multipathd - Fix log labeling to have correct default label for them after logrotate - Labeled ~/.nv/GLCache as being gstreamer output - Allow nagios_system_plugin to read mrtg lib files - Add mrtg_read_lib_files() - Call rhcs_rw_cluster_tmpfs for dlm_controld - Make authconfing as named_filetrans domain - Allow virsh to connect to user process using stream socket - Allow rtas_errd to read rand/urand devices and add chown capability - Fix labeling from /var/run/net-snmpd to correct /var/run/net-snmp Resolves:#1051497 - Add also chown cap for abrt_upload_watch_t. It already has dac_override - Allow sosreport to manage rhsmcertd pid files - Add rhsmcertd_manage_pid_files() - Allow also setgid cap for rpc.gssd - Dontaudit access check for abrt on cert_t - Allow pegasus_openlmi_system providers to dbus chat with systemd-logind- Fix semanage import handling in spec file- Add default lvm_var_run_t label for /var/run/multipathd Resolves:#1051430 - Fix log labeling to have correct default label for them after logrotate - Add files_write_root_dirs - Add new openflow port label for 6653/tcp and 6633/tcp - Add xserver_manage_xkb_libs() - Label tcp/8891 as milter por - Allow gnome_manage_generic_cache_files also create cache_home_t files - Fix aide.log labeling - Fix log labeling to have correct default label for them after logrotate - Allow mysqld-safe write access on /root to make mysqld working - Allow sosreport domtrans to prelikn - Allow OpenvSwitch to connec to openflow ports - Allow NM send dgram to lldpad - Allow hyperv domains to execute shell - Allow lsmd plugins stream connect to lsmd/init - Allow sblim domains to create /run/gather with correct labeling - Allow httpd to read ldap certs - Allow cupsd to send dbus msgs to process with different MLS level - Allow bumblebee to stream connect to apmd - Allow bumblebee to run xkbcomp - Additional allow rules to get libvirt-lxc containers working with docker - Additional allow rules to get libvirt-lxc containers working with docker - Allow docker to getattr on itself - Additional rules needed for sandbox apps - Allow mozilla_plugin to set attributes on usb device if use_spice boolean enabled - httpd should be able to send signal/signull to httpd_suexec_t - Add more fixes for neturon. Domtrans to dnsmasq, iptables. Make neutron as filenamtrans domain.- Add neutron fixes- Allow sshd to write to all process levels in order to change passwd when running at a level - Allow updpwd_t to downgrade /etc/passwd file to s0, if it is not running with this range - Allow apcuspd_t to status and start the power unit file - Allow udev to manage kdump unit file - Added new interface modutils_dontaudit_exec_insmod - Allow cobbler to search dhcp_etc_t directory - systemd_systemctl needs sys_admin capability - Allow sytemd_tmpfiles_t to delete all directories - passwd to create gnome-keyring passwd socket - Add missing zabbix_var_lib_t type - Fix filename trans for zabbixsrv in zabbix.te - Allow fprintd_t to send syslog messages - Add zabbix_var_lib_t for /var/lib/zabbixsrv, also allow zabix to connect to smtp port - Allow mozilla plugin to chat with policykit, needed for spice - Allow gssprozy to change user and gid, as well as read user keyrings - Label upgrades directory under /var/www as httpd_sys_rw_content_t, add other filetrans rules to label content correctly - Allow polipo to connect to http_cache_ports - Allow cron jobs to manage apache var lib content - Allow yppassword to manage the passwd_file_t - Allow showall_t to send itself signals - Allow cobbler to restart dhcpc, dnsmasq and bind services - Allow certmonger to manage home cert files - Add userdom filename trans for user mail domains - Allow apcuspd_t to status and start the power unit file - Allow cgroupdrulesengd to create content in cgoups directories - Allow smbd_t to signull cluster - Allow gluster daemon to create fifo files in glusterd_brick_t and sock_file in glusterd_var_lib_t - Add label for /var/spool/cron.aquota.user - Allow sandbox_x domains to use work with the mozilla plugin semaphore - Added new policy for speech-dispatcher - Added dontaudit rule for insmod_exec_t in rasdaemon policy - Updated rasdaemon policy - Allow system_mail_t to transition to postfix_postdrop_t - Clean up mirrormanager policy - Allow virt_domains to read cert files, needs backport to RHEL7 - Allow sssd to read systemd_login_var_run_t - Allow irc_t to execute shell and bin-t files: - Add new access for mythtv - Allow rsync_t to manage all non auth files - allow modemmanger to read /dev/urand - Allow sandbox apps to attempt to set and get capabilties- Add labeling for /var/lib/servicelog/servicelog.db-journal - Add support for freeipmi port - Add sysadm_u_default_contexts - Make new type to texlive files in homedir - Allow subscription-manager running as sosreport_t to manage rhsmcertd - Additional fixes for docker.te - Remove ability to do mount/sys_admin by default in virt_sandbox domains - New rules required to run docker images within libivrt - Add label for ~/.cvsignore - Change mirrormanager to be run by cron - Add mirrormanager policy - Fixed bumblebee_admin() and mip6d_admin() - Add log support for sensord - Fix typo in docker.te - Allow amanda to do backups over UDP - Allow bumblebee to read /etc/group and clean up bumblebee.te - type transitions with a filename not allowed inside conditionals - Don't allow virt-sandbox tools to use netlink out of the box, needs back port to RHEL7 - Make new type to texlive files in homedir- Allow freeipmi_ipmidetectd_t to use freeipmi port - Update freeipmi_domain_template() - Allow journalctl running as ABRT to read /run/log/journal - Allow NM to read dispatcher.d directory - Update freeipmi policy - Type transitions with a filename not allowed inside conditionals - Allow tor to bind to hplip port - Make new type to texlive files in homedir - Allow zabbix_agent to transition to dmidecode - Add rules for docker - Allow sosreport to send signull to unconfined_t - Add virt_noatsecure and virt_rlimitinh interfaces - Fix labeling in thumb.fc to add support for /usr/lib64/tumbler-1/tumblerddd support for freeipmi port - Add sysadm_u_default_contexts - Add logging_read_syslog_pid() - Fix userdom_manage_home_texlive() interface - Make new type to texlive files in homedir - Add filename transitions for /run and /lock links - Allow virtd to inherit rlimit information Resolves:#975358- Change labeling for /usr/libexec/nm-dispatcher.action to NetworkManager_exec_t Resolves:#1039879 - Add labeling for /usr/lib/systemd/system/mariadb.service - Allow hyperv_domain to read sysfs - Fix ldap_read_certs() interface to allow acess also link files - Add support for /usr/libexec/pegasus/cmpiLMI_Journald-cimprovagt - Allow tuned to run modprobe - Allow portreserve to search /var/lib/sss dir - Add SELinux support for the teamd package contains team network device control daemon. - Dontaudit access check on /proc for bumblebee - Bumblebee wants to load nvidia modules - Fix rpm_named_filetrans_log_files and wine.te - Add conman policy for rawhide - DRM master and input event devices are used by the TakeDevice API - Clean up bumblebee policy - Update pegasus_openlmi_storage_t policy - Add freeipmi_stream_connect() interface - Allow logwatch read madm.conf to support RAID setup - Add raid_read_conf_files() interface - Allow up2date running as rpm_t create up2date log file with rpm_log_t labeling - add rpm_named_filetrans_log_files() interface - Allow dkim-milter to create files/dirs in /tmp - update freeipmi policy - Add policy for freeipmi services - Added rdisc_admin and rdisc_systemctl interfaces - opensm policy clean up - openwsman policy clean up - ninfod policy clean up - Added new policy for ninfod - Added new policy for openwsman - Added rdisc_admin and rdisc_systemctl interfaces - Fix kernel_dontaudit_access_check_proc() - Add support for /dev/uhid - Allow sulogin to get the attributes of initctl and sys_admin cap - Add kernel_dontaudit_access_check_proc() - Fix dev_rw_ipmi_dev() - Fix new interface in devices.if - DRM master and input event devices are used by the TakeDevice API - add dev_rw_inherited_dri() and dev_rw_inherited_input_dev() - Added support for default conman port - Add interfaces for ipmi devices- Allow sosreport to send a signal to ABRT - Add proper aliases for pegasus_openlmi_service_exec_t and pegasus_openlmi_service_t - Label /usr/sbin/htcacheclean as httpd_exec_t Resolves:#1037529 - Added support for rdisc unit file - Add antivirus_db_t labeling for /var/lib/clamav-unofficial-sigs - Allow runuser running as logrotate connections to system DBUS - Label bcache devices as fixed_disk_device_t - Allow systemctl running in ipsec_mgmt_t to access /usr/lib/systemd/system/ipsec.service - Label /usr/lib/systemd/system/ipsec.service as ipsec_mgmt_unit_file_t- Add back setpgid/setsched for sosreport_t- Added fix for clout_init to transition to rpm_script_t (dwalsh@redhat.com)- Dontaudit openshift domains trying to use rawip_sockets, this is caused by a bad check in the kernel. - Allow git_system_t to read git_user_content if the git_system_enable_homedirs boolean is turned on - Add lsmd_plugin_t for lsm plugins - Allow dovecot-deliver to search mountpoints - Add labeling for /etc/mdadm.conf - Allow opelmi admin providers to dbus chat with init_t - Allow sblim domain to read /dev/urandom and /dev/random - Allow apmd to request the kernel load modules - Add glusterd_brick_t type - label mate-keyring-daemon with gkeyringd_exec_t - Add plymouthd_create_log() - Dontaudit leaks from openshift domains into mail domains, needs back port to RHEL6 - Allow sssd to request the kernel loads modules - Allow gpg_agent to use ssh-add - Allow gpg_agent to use ssh-add - Dontaudit access check on /root for myslqd_safe_t - Allow ctdb to getattr on al filesystems - Allow abrt to stream connect to syslog - Allow dnsmasq to list dnsmasq.d directory - Watchdog opens the raw socket - Allow watchdog to read network state info - Dontaudit access check on lvm lock dir - Allow sosreport to send signull to setroubleshootd - Add setroubleshoot_signull() interface - Fix ldap_read_certs() interface - Allow sosreport all signal perms - Allow sosreport to run systemctl - Allow sosreport to dbus chat with rpm - Add glusterd_brick_t files type - Allow zabbix_agentd to read all domain state - Clean up rtas.if - Allow smoltclient to execute ldconfig - Allow sosreport to request the kernel to load a module - Fix userdom_confined_admin_template() - Add back exec_content boolean for secadm, logadm, auditadm - Fix files_filetrans_system_db_named_files() interface - Allow sulogin to getattr on /proc/kcore - Add filename transition also for servicelog.db-journal - Add files_dontaudit_access_check_root() - Add lvm_dontaudit_access_check_lock() interface- Allow watchdog to read /etc/passwd - Allow browser plugins to connect to bumblebee - New policy for bumblebee and freqset - Add new policy for mip6d daemon - Add new policy for opensm daemon - Allow condor domains to read/write condor_master udp_socket - Allow openshift_cron_t to append to openshift log files, label /var/log/openshift - Add back file_pid_filetrans for /var/run/dlm_controld - Allow smbd_t to use inherited tmpfs content - Allow mcelog to use the /dev/cpu device - sosreport runs rpcinfo - sosreport runs subscription-manager - Allow staff_t to run frequency command - Allow systemd_tmpfiles to relabel log directories - Allow staff_t to read xserver_log file - Label hsperfdata_root as tmp_t- More sosreport fixes to make ABRT working- Fix files_dontaudit_unmount_all_mountpoints() - Add support for 2608-2609 tcp/udp ports - Should allow domains to lock the terminal device - More fixes for user config files to make crond_t running in userdomain - Add back disable/reload/enable permissions for system class - Fix manage_service_perms macro - We need to require passwd rootok - Fix zebra.fc - Fix dnsmasq_filetrans_named_content() interface - Allow all sandbox domains create content in svirt_home_t - Allow zebra domains also create zebra_tmp_t files in /tmp - Add support for new zebra services:isisd,babeld. Add systemd support for zebra services. - Fix labeling on neutron and remove transition to iconfig_t - abrt needs to read mcelog log file - Fix labeling on dnsmasq content - Fix labeling on /etc/dnsmasq.d - Allow glusterd to relabel own lib files - Allow sandbox domains to use pam_rootok, and dontaudit attempts to unmount file systems, this is caused by a bug in systemd - Allow ipc_lock for abrt to run journalctl- Fix config.tgz- Fix passenger_stream_connect interface - setroubleshoot_fixit wants to read network state - Allow procmail_t to connect to dovecot stream sockets - Allow cimprovagt service providers to read network states - Add labeling for /var/run/mariadb - pwauth uses lastlog() to update system's lastlog - Allow account provider to read login records - Add support for texlive2013 - More fixes for user config files to make crond_t running in userdomain - Add back disable/reload/enable permissions for system class - Fix manage_service_perms macro - Allow passwd_t to connect to gnome keyring to change password - Update mls config files to have cronjobs in the user domains - Remove access checks that systemd does not actually do- Add support for yubikey in homedir - Add support for upd/3052 port - Allow apcupsd to use PowerChute Network Shutdown - Allow lsmd to execute various lsmplugins - Add labeling also for /etc/watchdog\.d where are watchdog scripts located too - Update gluster_export_all_rw boolean to allow relabel all base file types - Allow x86_energy_perf tool to modify the MSR - Fix /var/lib/dspam/data labeling- Add files_relabel_base_file_types() interface - Allow netlabel-config to read passwd - update gluster_export_all_rw boolean to allow relabel all base file types caused by lsetxattr() - Allow x86_energy_perf tool to modify the MSR - Fix /var/lib/dspam/data labeling - Allow pegasus to domtrans to mount_t - Add labeling for unconfined scripts in /usr/libexec/watchdog/scripts - Add support for unconfined watchdog scripts - Allow watchdog to manage own log files- Add label only for redhat.repo instead of /etc/yum.repos.d. But probably we will need to switch for the directory. - Label /etc/yum.repos.d as system_conf_t - Use sysnet_filetrans_named_content in udev.te instead of generic transition for net_conf_t - Allow dac_override for sysadm_screen_t - Allow init_t to read ipsec_conf_t as we had it for initrc_t. Needed by ipsec unit file. - Allow netlabel-config to read meminfo - Add interface to allow docker to mounton file_t - Add new interface to exec unlabeled files - Allow lvm to use docker semaphores - Setup transitons for .xsessions-errors.old - Change labels of files in /var/lib/*/.ssh to transition properly - Allow staff_t and user_t to look at logs using journalctl - pluto wants to manage own log file - Allow pluto running as ipsec_t to create pluto.log - Fix alias decl in corenetwork.te.in - Add support for fuse.glusterfs - Allow dmidecode to read/write /run/lock/subsys/rhsmcertd - Allow rhsmcertd to manage redhat.repo which is now labeled as system.conf. Allow rhsmcertd to manage all log files. - Additional access for docker - Added more rules to sblim policy - Fix kdumpgui_run_bootloader boolean - Allow dspam to connect to lmtp port - Included sfcbd service into sblim policy - rhsmcertd wants to manaage /etc/pki/consumer dir - Add kdumpgui_run_bootloader boolean - Add support for /var/cache/watchdog - Remove virt_domain attribute for virt_qemu_ga_unconfined_t - Fixes for handling libvirt containes - Dontaudit attempts by mysql_safe to write content into / - Dontaudit attempts by system_mail to modify network config - Allow dspam to bind to lmtp ports - Add new policy to allow staff_t and user_t to look at logs using journalctl - Allow apache cgi scripts to list sysfs - Dontaudit attempts to write/delete user_tmp_t files - Allow all antivirus domains to manage also own log dirs - Allow pegasus_openlmi_services_t to stream connect to sssd_t- Add missing permission checks for nscd- Fix alias decl in corenetwork.te.in - Add support for fuse.glusterfs - Add file transition rules for content created by f5link - Rename quantum_port information to neutron - Allow all antivirus domains to manage also own log dirs - Rename quantum_port information to neutron - Allow pegasus_openlmi_services_t to stream connect to sssd_t- Allow sysadm_t to read login information - Allow systemd_tmpfiles to setattr on var_log_t directories - Udpdate Makefile to include systemd_contexts - Add systemd_contexts - Add fs_exec_hugetlbfs_files() interface - Add daemons_enable_cluster_mode boolean - Fix rsync_filetrans_named_content() - Add rhcs_read_cluster_pid_files() interface - Update rhcs.if with additional interfaces from RHEL6 - Fix rhcs_domain_template() to not create run dirs with cluster_var_run_t - Allow glusterd_t to mounton glusterd_tmp_t - Allow glusterd to unmout al filesystems - Allow xenstored to read virt config - Add label for swift_server.lock and make add filetrans_named_content to make sure content gets created with the correct label - Allow mozilla_plugin_t to mmap hugepages as an executable- Add back userdom_security_admin_template() interface and use it for sysadm_t if sysadm_secadm.pp- Allow sshd_t to read openshift content, needs backport to RHEL6.5 - Label /usr/lib64/sasl2/libsasldb.so.3.0.0 as textrel_shlib_t - Make sur kdump lock is created with correct label if kdumpctl is executed - gnome interface calls should always be made within an optional_block - Allow syslogd_t to connect to the syslog_tls port - Add labeling for /var/run/charon.ctl socket - Add kdump_filetrans_named_content() - Allo setpgid for fenced_t - Allow setpgid and r/w cluster tmpfs for fenced_t - gnome calls should always be within optional blocks - wicd.pid should be labeled as networkmanager_var_run_t - Allow sys_resource for lldpad- Add rtas policy- Allow mailserver_domains to manage and transition to mailman data - Dontaudit attempts by mozilla plugin to relabel content, caused by using mv and cp commands - Allow mailserver_domains to manage and transition to mailman data - Allow svirt_domains to read sysctl_net_t - Allow thumb_t to use tmpfs inherited from the user - Allow mozilla_plugin to bind to the vnc port if running with spice - Add new attribute to discover confined_admins and assign confined admin to it - Fix zabbix to handle attributes in interfaces - Fix zabbix to read system states for all zabbix domains - Fix piranha_domain_template() - Allow ctdbd to create udp_socket. Allow ndmbd to access ctdbd var files. - Allow lldpad sys_rouserce cap due to #986870 - Allow dovecot-auth to read nologin - Allow openlmi-networking to read /proc/net/dev - Allow smsd_t to execute scripts created on the fly labeled as smsd_spool_t - Add zabbix_domain attribute for zabbix domains to treat them together - Add labels for zabbix-poxy-* (#1018221) - Update openlmi-storage policy to reflect #1015067 - Back port piranha tmpfs fixes from RHEL6 - Update httpd_can_sendmail boolean to allow read/write postfix spool maildrop - Add postfix_rw_spool_maildrop_files interface - Call new userdom_admin_user_templat() also for sysadm_secadm.pp - Fix typo in userdom_admin_user_template() - Allow SELinux users to create coolkeypk11sE-Gate in /var/cache/coolkey - Add new attribute to discover confined_admins - Fix labeling for /etc/strongswan/ipsec.d - systemd_logind seems to pass fd to anyone who dbus communicates with it - Dontaudit leaked write descriptor to dmesg- Activate motion policy- Fix gnome_read_generic_data_home_files() - allow openshift_cgroup_t to read/write inherited openshift file types - Remove httpd_cobbler_content * from cobbler_admin interface - Allow svirt sandbox domains to setattr on chr_file and blk_file svirt_sandbox_file_t, so sshd will work within a container - Allow httpd_t to read also git sys content symlinks - Allow init_t to read gnome home data - Dontaudit setroubleshoot_fixit_t execmem, since it does not seem to really need it. - Allow virsh to execute systemctl - Fix for nagios_services plugins - add type defintion for ctdbd_var_t - Add support for /var/ctdb. Allow ctdb block_suspend and read /etc/passwd file - Allow net_admin/netlink_socket all hyperv_domain domains - Add labeling for zarafa-search.log and zarafa-search.pid - Fix hypervkvp.te - Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type - Fix logging policy - Allow syslog to bind to tls ports - Update labeling for /dev/cdc-wdm - Allow to su_domain to read init states - Allow init_t to read gnome home data - Make sure if systemd_logind creates nologin file with the correct label - Clean up ipsec.te- Add auth_exec_chkpwd interface - Fix port definition for ctdb ports - Allow systemd domains to read /dev/urand - Dontaudit attempts for mozilla_plugin to append to /dev/random - Add label for /var/run/charon.* - Add labeling for /usr/lib/systemd/system/lvm2.*dd policy for motion service - Fix for nagios_services plugins - Fix some bugs in zoneminder policy - add type defintion for ctdbd_var_t - Add support for /var/ctdb. Allow ctdb block_suspend and read /etc/passwd file - Allow net_admin/netlink_socket all hyperv_domain domains - Add labeling for zarafa-search.log and zarafa-search.pid - glusterd binds to random unreserved ports - Additional allow rules found by testing glusterfs - apcupsd needs to send a message to all users on the system so needs to look them up - Fix the label on ~/.juniper_networks - Dontaudit attempts for mozilla_plugin to append to /dev/random - Allow polipo_daemon to connect to flash ports - Allow gssproxy_t to create replay caches - Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type- init reload from systemd_localed_t - Allow domains that communicate with systemd_logind_sessions to use systemd_logind_t fd - Allow systemd_localed_t to ask systemd to reload the locale. - Add systemd_runtime_unit_file_t type for unit files that systemd creates in memory - Allow readahead to read /dev/urand - Fix lots of avcs about tuned - Any file names xenstored in /var/log should be treated as xenstored_var_log_t - Allow tuned to inderact with hugepages - Allow condor domains to list etc rw dirs- Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type - Add additional fixes forpegasus_openlmi_account_t - Allow mdadm to read /dev/urand - Allow pegasus_openlmi_storage_t to create mdadm.conf and write it - Add label/rules for /etc/mdadm.conf - Allow pegasus_openlmi_storage_t to transition to fsadm_t - Fixes for interface definition problems - Dontaudit dovecot-deliver to gettatr on all fs dirs - Allow domains to search data_home_t directories - Allow cobblerd to connect to mysql - Allow mdadm to r/w kdump lock files - Add support for kdump lock files - Label zarafa-search as zarafa-indexer - Openshift cgroup wants to read /etc/passwd - Add new sandbox domains for kvm - Allow mpd to interact with pulseaudio if mpd_enable_homedirs is turned on - Fix labeling for /usr/lib/systemd/system/lvm2.* - Add labeling for /usr/lib/systemd/system/lvm2.* - Fix typos to get a new build. We should not cover filename trans rules to prevent duplicate rules - Add sshd_keygen_t policy for sshd-keygen - Fix alsa_home_filetrans interface name and definition - Allow chown for ssh_keygen_t - Add fs_dontaudit_getattr_all_dirs() - Allow init_t to manage etc_aliases_t and read xserver_var_lib_t and chrony keys - Fix up patch to allow systemd to manage home content - Allow domains to send/recv unlabeled traffic if unlabelednet.pp is enabled - Allow getty to exec hostname to get info - Add systemd_home_t for ~/.local/share/systemd directory- Fix lxc labels in config.tgz- Fix labeling for /usr/libexec/kde4/kcmdatetimehelper - Allow tuned to search all file system directories - Allow alsa_t to sys_nice, to get top performance for sound management - Add support for MySQL/PostgreSQL for amavis - Allow openvpn_t to manage openvpn_var_log_t files. - Allow dirsrv_t to create tmpfs_t directories - Allow dirsrv to create dirs in /dev/shm with dirsrv_tmpfs label - Dontaudit leaked unix_stream_sockets into gnome keyring - Allow telepathy domains to inhibit pipes on telepathy domains - Allow cloud-init to domtrans to rpm - Allow abrt daemon to manage abrt-watch tmp files - Allow abrt-upload-watcher to search /var/spool directory - Allow nsswitch domains to manage own process key - Fix labeling for mgetty.* logs - Allow systemd to dbus chat with upower - Allow ipsec to send signull to itself - Allow setgid cap for ipsec_t - Match upstream labeling- Do not build sanbox pkg on MLS- wine_tmp is no longer needed - Allow setroubleshoot to look at /proc - Allow telepathy domains to dbus with systemd logind - Fix handling of fifo files of rpm - Allow mozilla_plugin to transition to itself - Allow certwatch to write to cert_t directories - New abrt application - Allow NetworkManager to set the kernel scheduler - Make wine_domain shared by all wine domains - Allow mdadm_t to read images labeled svirt_image_t - Allow amanda to read /dev/urand - ALlow my_print_default to read /dev/urand - Allow mdadm to write to kdumpctl fifo files - Allow nslcd to send signull to itself - Allow yppasswd to read /dev/urandom - Fix zarafa_setrlimit - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add additional alias for user_tmp_t because wine_tmp_t is no longer used - More handling of ther kernel keyring required by kerberos - New privs needed for init_t when running without transition to initrc_t over bin_t, and without unconfined domain installed- Dontaudit attempts by sosreport to read shadow_t - Allow browser sandbox plugins to connect to cups to print - Add new label mpd_home_t - Label /srv/www/logs as httpd_log_t - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add labels for apache logs under miq package - Allow irc_t to use tcp sockets - fix labels in puppet.if - Allow tcsd to read utmp file - Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to access host keys - Define svirt_socket_t as a domain_type - Take away transition from init_t to initrc_t when executing bin_t, allow init_t to run chk_passwd_t - Fix label on pam_krb5 helper apps- Allow ldconfig to write to kdumpctl fifo files - allow neutron to connect to amqp ports - Allow kdump_manage_crash to list the kdump_crash_t directory - Allow glance-api to connect to amqp port - Allow virt_qemu_ga_t to read meminfo - Add antivirus_home_t type for antivirus date in HOMEDIRS - Allow mpd setcap which is needed by pulseaudio - Allow smbcontrol to create content in /var/lib/samba - Allow mozilla_exec_t to be used as a entrypoint to mozilla_domtrans_spec - Add additional labeling for qemu-ga/fsfreeze-hook.d scripts - amanda_exec_t needs to be executable file - Allow block_suspend cap for samba-net - Allow apps that read ipsec_mgmt_var_run_t to search ipsec_var_run_t - Allow init_t to run crash utility - Treat usr_t just like bin_t for transitions and executions - Add port definition of pka_ca to port 829 for openshift - Allow selinux_store to use symlinks- Allow block_suspend cap for samba-net - Allow t-mission-control to manage gabble cache files - Allow nslcd to read /sys/devices/system/cpu - Allow selinux_store to use symlinks- Allow xdm_t to transition to itself - Call neutron interfaces instead of quantum - Allow init to change targed role to make uncofined services (xrdp which now has own systemd unit file) working. We want them to have in unconfined_t - Make sure directories in /run get created with the correct label - Make sure /root/.pki gets created with the right label - try to remove labeling for motion from zoneminder_exec_t to bin_t - Allow inetd_t to execute shell scripts - Allow cloud-init to read all domainstate - Fix to use quantum port - Add interface netowrkmanager_initrc_domtrans - Fix boinc_execmem - Allow t-mission-control to read gabble cache home - Add labeling for ~/.cache/telepathy/avatars/gabble - Allow memcache to read sysfs data - Cleanup antivirus policy and add additional fixes - Add boolean boinc_enable_execstack - Add support for couchdb in rabbitmq policy - Add interface couchdb_search_pid_dirs - Allow firewalld to read NM state - Allow systemd running as git_systemd to bind git port - Fix mozilla_plugin_rw_tmpfs_files()- Split out rlogin ports from inetd - Treat files labeld as usr_t like bin_t when it comes to transitions - Allow staff_t to read login config - Allow ipsec_t to read .google authenticator data - Allow systemd running as git_systemd to bind git port - Fix mozilla_plugin_rw_tmpfs_files() - Call the correct interface - corenet_udp_bind_ktalkd_port() - Allow all domains that can read gnome_config to read kde config - Allow sandbox domain to read/write mozilla_plugin_tmpfs_t so pulseaudio will work - Allow mdadm to getattr any file system - Allow a confined domain to executes mozilla_exec_t via dbus - Allow cupsd_lpd_t to bind to the printer port - Dontaudit attempts to bind to ports < 1024 when nis is turned on - Allow apache domain to connect to gssproxy socket - Allow rlogind to bind to the rlogin_port - Allow telnetd to bind to the telnetd_port - Allow ktalkd to bind to the ktalkd_port - Allow cvs to bind to the cvs_port- Cleanup related to init_domain()+inetd_domain fixes - Use just init_domain instead of init_daemon_domain in inetd_core_service_domain - svirt domains neeed to create kobject_uevint_sockets - Lots of new access required for sosreport - Allow tgtd_t to connect to isns ports - Allow init_t to transition to all inetd domains: - openct needs to be able to create netlink_object_uevent_sockets - Dontaudit leaks into ldconfig_t - Dontaudit su domains getattr on /dev devices, move su domains to attribute based calls - Move kernel_stream_connect into all Xwindow using users - Dontaudit inherited lock files in ifconfig o dhcpc_t- Also sock_file trans rule is needed in lsm - Fix labeling for fetchmail pid files/dirs - Add additional fixes for abrt-upload-watch - Fix polipo.te - Fix transition rules in asterisk policy - Add fowner capability to networkmanager policy - Allow polipo to connect to tor ports - Cleanup lsmd.if - Cleanup openhpid policy - Fix kdump_read_crash() interface - Make more domains as init domain - Fix cupsd.te - Fix requires in rpm_rw_script_inherited_pipes - Fix interfaces in lsm.if - Allow munin service plugins to manage own tmpfs files/dirs - Allow virtd_t also relabel unix stream sockets for virt_image_type - Make ktalk as init domain - Fix to define ktalkd_unit_file_t correctly - Fix ktalk.fc - Add systemd support for talk-server - Allow glusterd to create sock_file in /run - Allow xdm_t to delete gkeyringd_tmp_t files on logout - Add fixes for hypervkvp policy - Add logwatch_can_sendmail boolean - Allow mysqld_safe_t to handle also symlinks in /var/log/mariadb - Allow xdm_t to delete gkeyringd_tmp_t files on logout- Add selinux-policy-sandbox pkg0 - Allow rhsmcertd to read init state - Allow fsetid for pkcsslotd - Fix labeling for /usr/lib/systemd/system/pkcsslotd.service - Allow fetchmail to create own pid with correct labeling - Fix rhcs_domain_template() - Allow roles which can run mock to read mock lib files to view results - Allow rpcbind to use nsswitch - Fix lsm.if summary - Fix collectd_t can read /etc/passwd file - Label systemd unit files under dracut correctly - Add support for pam_mount to mount user's encrypted home When a user logs in and logs out using ssh - Add support for .Xauthority-n - Label umount.crypt as lvm_exec_t - Allow syslogd to search psad lib files - Allow ssh_t to use /dev/ptmx - Make sure /run/pluto dir is created with correct labeling - Allow syslog to run shell and bin_t commands - Allow ip to relabel tun_sockets - Allow mount to create directories in files under /run - Allow processes to use inherited fifo files- Add policy for lsmd - Add support for /var/log/mariadb dir and allow mysqld_safe to list this directory - Update condor_master rules to allow read system state info and allow logging - Add labeling for /etc/condor and allow condor domain to write it (bug) - Allow condor domains to manage own logs - Allow glusterd to read domains state - Fix initial hypervkvp policy - Add policy for hypervkvpd - Fix redis.if summary- Allow boinc to connect to @/tmp/.X11-unix/X0 - Allow beam.smp to connect to tcp/5984 - Allow named to manage own log files - Add label for /usr/libexec/dcc/start-dccifd and domtrans to dccifd_t - Add virt_transition_userdomain boolean decl - Allow httpd_t to sendto unix_dgram sockets on its children - Allow nova domains to execute ifconfig - bluetooth wants to create fifo_files in /tmp - exim needs to be able to manage mailman data - Allow sysstat to getattr on all file systems - Looks like bluetoothd has moved - Allow collectd to send ping packets - Allow svirt_lxc domains to getpgid - Remove virt-sandbox-service labeling as virsh_exec_t, since it no longer does virsh_t stuff - Allow frpintd_t to read /dev/urandom - Allow asterisk_t to create sock_file in /var/run - Allow usbmuxd to use netlink_kobject - sosreport needs to getattr on lots of devices, and needs access to netlink_kobject_uevent_socket - More cleanup of svirt_lxc policy - virtd_lxc_t now talks to dbus - Dontaudit leaked ptmx_t - Allow processes to use inherited fifo files - Allow openvpn_t to connect to squid ports - Allow prelink_cron_system_t to ask systemd to reloaddd miscfiles_dontaudit_access_check_cert() - Allow ssh_t to use /dev/ptmx - Make sure /run/pluto dir is created with correct labeling - Allow syslog to run shell and bin_t commands - Allow ip to relabel tun_sockets - Allow mount to create directories in files under /run - Allow processes to use inherited fifo files - Allow user roles to connect to the journal socket- selinux_set_enforce_mode needs to be used with type - Add append to the dontaudit for unix_stream_socket of xdm_t leak - Allow xdm_t to create symlinks in log direcotries - Allow login programs to read afs config - Label 10933 as a pop port, for dovecot - New policy to allow selinux_server.py to run as semanage_t as a dbus service - Add fixes to make netlabelctl working on MLS - AVCs required for running sepolicy gui as staff_t - Dontaudit attempts to read symlinks, sepolicy gui is likely to cause this type of AVC - New dbus server to be used with new gui - After modifying some files in /etc/mail, I saw this needed on the next boot - Loading a vm from /usr/tmp with virt-manager - Clean up oracleasm policy for Fedora - Add oracleasm policy written by rlopez@redhat.com - Make postfix_postdrop_t as mta_agent to allow domtrans to system mail if it is executed by apache - Add label for /var/crash - Allow fenced to domtrans to sanclok_t - Allow nagios to manage nagios spool files - Make tfptd as home_manager - Allow kdump to read kcore on MLS system - Allow mysqld-safe sys_nice/sys_resource caps - Allow apache to search automount tmp dirs if http_use_nfs is enabled - Allow crond to transition to named_t, for use with unbound - Allow crond to look at named_conf_t, for unbound - Allow mozilla_plugin_t to transition its home content - Allow dovecot_domain to read all system and network state - Allow httpd_user_script_t to call getpw - Allow semanage to read pid files - Dontaudit leaked file descriptors from user domain into thumb - Make PAM authentication working if it is enabled in ejabberd - Add fixes for rabbit to fix ##992920,#992931 - Allow glusterd to mount filesystems - Loading a vm from /usr/tmp with virt-manager - Trying to load a VM I got an AVC from devicekit_disk for loopcontrol device - Add fix for pand service - shorewall touches own log - Allow nrpe to list /var - Mozilla_plugin_roles can not be passed into lpd_run_lpr - Allow afs domains to read afs_config files - Allow login programs to read afs config - Allow virt_domain to read virt_var_run_t symlinks - Allow smokeping to send its process signals - Allow fetchmail to setuid - Add kdump_manage_crash() interface - Allow abrt domain to write abrt.socket- Add more aliases in pegasus.te - Add more fixes for *_admin interfaces - Add interface fixes - Allow nscd to stream connect to nmbd - Allow gnupg apps to write to pcscd socket - Add more fixes for openlmi provides. Fix naming and support for additionals - Allow fetchmail to resolve host names - Allow firewalld to interact also with lnk files labeled as firewalld_etc_rw_t - Add labeling for cmpiLMI_Fan-cimprovagt - Allow net_admin for glusterd - Allow telepathy domain to create dconf with correct labeling in /home/userX/.cache/ - Add pegasus_openlmi_system_t - Fix puppet_domtrans_master() to make all puppet calling working in passenger.te - Fix corecmd_exec_chroot() - Fix logging_relabel_syslog_pid_socket interface - Fix typo in unconfineduser.te - Allow system_r to access unconfined_dbusd_t to run hp_chec- Allow xdm_t to act as a dbus client to itsel - Allow fetchmail to resolve host names - Allow gnupg apps to write to pcscd socket - Add labeling for cmpiLMI_Fan-cimprovagt - Allow net_admin for glusterd - Allow telepathy domain to create dconf with correct labeling in /home/userX/.cache/ - Add pegasus_openlmi_system_t - Fix puppet_domtrans_master() to make all puppet calling working in passenger.te -httpd_t does access_check on certs- Add support for cmpiLMI_Service-cimprovagt - Allow pegasus domtrans to rpm_t to make pycmpiLMI_Software-cimprovagt running as rpm_t - Label pycmpiLMI_Software-cimprovagt as rpm_exec_t - Add support for pycmpiLMI_Storage-cimprovagt - Add support for cmpiLMI_Networking-cimprovagt - Allow system_cronjob_t to create user_tmpfs_t to make pulseaudio working - Allow virtual machines and containers to run as user doains, needed for virt-sandbox - Allow buglist.cgi to read cpu info- Allow systemd-tmpfile to handle tmp content in print spool dir - Allow systemd-sysctl to send system log messages - Add support for RTP media ports and fmpro-internal - Make auditd working if audit is configured to perform SINGLE action on disk error - Add interfaces to handle systemd units - Make systemd-notify working if pcsd is used - Add support for netlabel and label /usr/sbin/netlabelctl as iptables_exec_t - Instead of having all unconfined domains get all of the named transition rules, - Only allow unconfined_t, init_t, initrc_t and rpm_script_t by default. - Add definition for the salt ports - Allow xdm_t to create link files in xdm_var_run_t - Dontaudit reads of blk files or chr files leaked into ldconfig_t - Allow sys_chroot for useradd_t - Allow net_raw cap for ipsec_t - Allow sysadm_t to reload services - Add additional fixes to make strongswan working with a simple conf - Allow sysadm_t to enable/disable init_t services - Add additional glusterd perms - Allow apache to read lnk files in the /mnt directory - Allow glusterd to ask the kernel to load a module - Fix description of ftpd_use_fusefs boolean - Allow svirt_lxc_net_t to sys_chroot, modify policy to tighten up svirt_lxc_domain capabilties and process controls, but add them to svirt_lxc_net_t - Allow glusterds to request load a kernel module - Allow boinc to stream connect to xserver_t - Allow sblim domains to read /etc/passwd - Allow mdadm to read usb devices - Allow collectd to use ping plugin - Make foghorn working with SNMP - Allow sssd to read ldap certs - Allow haproxy to connect to RTP media ports - Add additional trans rules for aide_db - Add labeling for /usr/lib/pcsd/pcsd - Add labeling for /var/log/pcsd - Add support for pcs which is a corosync and pacemaker configuration tool- Label /var/lib/ipa/pki-ca/publish as pki_tomcat_cert_t - Add labeling for /usr/libexec/kde4/polkit-kde-authentication-agent-1 - Allow all domains that can domtrans to shutdown, to start the power services script to shutdown - consolekit needs to be able to shut down system - Move around interfaces - Remove nfsd_rw_t and nfsd_ro_t, they don't do anything - Add additional fixes for rabbitmq_beam to allow getattr on mountpoints - Allow gconf-defaults-m to read /etc/passwd - Fix pki_rw_tomcat_cert() interface to support lnk_files- Add support for gluster ports - Make sure that all keys located in /etc/ssh/ are labeled correctly - Make sure apcuspd lock files get created with the correct label - Use getcap in gluster.te - Fix gluster policy - add additional fixes to allow beam.smp to interact with couchdb files - Additional fix for #974149 - Allow gluster to user gluster ports - Allow glusterd to transition to rpcd_t and add additional fixes for #980683 - Allow tgtd working when accessing to the passthrough device - Fix labeling for mdadm unit files- Add mdadm fixes- Fix definition of sandbox.disabled to sandbox.pp.disabled- Allow mdamd to execute systemctl - Allow mdadm to read /dev/kvm - Allow ipsec_mgmt_t to read l2tpd pid content- Allow nsd_t to read /dev/urand - Allow mdadm_t to read framebuffer - Allow rabbitmq_beam_t to read process info on rabbitmq_epmd_t - Allow mozilla_plugin_config_t to create tmp files - Cleanup openvswitch policy - Allow mozilla plugin to getattr on all executables - Allow l2tpd_t to create fifo_files in /var/run - Allow samba to touch/manage fifo_files or sock_files in a samba_share_t directory - Allow mdadm to connecto its own unix_stream_socket - FIXME: nagios changed locations to /log/nagios which is wrong. But we need to have this workaround for now. - Allow apache to access smokeping pid files - Allow rabbitmq_beam_t to getattr on all filesystems - Add systemd support for iodined - Allow nup_upsdrvctl_t to execute its entrypoint - Allow fail2ban_client to write to fail2ban_var_run_t, Also allow it to use nsswitch - add labeling for ~/.cache/libvirt-sandbox - Add interface to allow domains transitioned to by confined users to send sigchld to screen program - Allow sysadm_t to check the system status of files labeled etc_t, /etc/fstab - Allow systemd_localed to start /usr/lib/systemd/system/systemd-vconsole-setup.service - Allow an domain that has an entrypoint from a type to be allowed to execute the entrypoint without a transition, I can see no case where this is a bad thing, and elminiates a whole class of AVCs. - Allow staff to getsched all domains, required to run htop - Add port definition for redis port - fix selinuxuser_use_ssh_chroot boolean- Add prosody policy written by Michael Scherer - Allow nagios plugins to read /sys info - ntpd needs to manage own log files - Add support for HOME_DIR/.IBMERS - Allow iptables commands to read firewalld config - Allow consolekit_t to read utmp - Fix filename transitions on .razor directory - Add additional fixes to make DSPAM with LDA working - Allow snort to read /etc/passwd - Allow fail2ban to communicate with firewalld over dbus - Dontaudit openshift_cgreoup_file_t read/write leaked dev - Allow nfsd to use mountd port - Call th proper interface - Allow openvswitch to read sys and execute plymouth - Allow tmpwatch to read /var/spool/cups/tmp - Add support for /usr/libexec/telepathy-rakia - Add systemd support for zoneminder - Allow mysql to create files/directories under /var/log/mysql - Allow zoneminder apache scripts to rw zoneminder tmpfs - Allow httpd to manage zoneminder lib files - Add zoneminder_run_sudo boolean to allow to start zoneminder - Allow zoneminder to send mails - gssproxy_t sock_file can be under /var/lib - Allow web domains to connect to whois port. - Allow sandbox_web_type to connect to the same ports as mozilla_plugin_t. - We really need to add an interface to corenet to define what a web_client_domain is and - then define chrome_sandbox_t, mozilla_plugin_t and sandbox_web_type to that domain. - Add labeling for cmpiLMI_LogicalFile-cimprovagt - Also make pegasus_openlmi_logicalfile_t as unconfined to have unconfined_domain attribute for filename trans rules - Update policy rules for pegasus_openlmi_logicalfile_t - Add initial types for logicalfile/unconfined OpenLMI providers - mailmanctl needs to read own log - Allow logwatch manage own lock files - Allow nrpe to read meminfo - Allow httpd to read certs located in pki-ca - Add pki_read_tomcat_cert() interface - Add support for nagios openshift plugins - Add port definition for redis port - fix selinuxuser_use_ssh_chroot boolean- Shrink the size of policy by moving to attributes, also add dridomain so that mozilla_plugin can follow selinuxuse_dri boolean. - Allow bootloader to manage generic log files - Allow ftp to bind to port 989 - Fix label of new gear directory - Add support for new directory /var/lib/openshift/gears/ - Add openshift_manage_lib_dirs() - allow virtd domains to manage setrans_var_run_t - Allow useradd to manage all openshift content - Add support so that mozilla_plugin_t can use dri devices - Allow chronyd to change the scheduler - Allow apmd to shut downthe system - Devicekit_disk_t needs to manage /etc/fstab- Make DSPAM to act as a LDA working - Allow ntop to create netlink socket - Allow policykit to send a signal to policykit-auth - Allow stapserver to dbus chat with avahi/systemd-logind - Fix labeling on haproxy unit file - Clean up haproxy policy - A new policy for haproxy and placed it to rhcs.te - Add support for ldirectord and treat it with cluster_t - Make sure anaconda log dir is created with var_log_t- Allow lvm_t to create default targets for filesystem handling - Fix labeling for razor-lightdm binaries - Allow insmod_t to read any file labeled var_lib_t - Add policy for pesign - Activate policy for cmpiLMI_Account-cimprovagt - Allow isnsd syscall=listen - /usr/libexec/pegasus/cimprovagt needs setsched caused by sched_setscheduler - Allow ctdbd to use udp/4379 - gatherd wants sys_nice and setsched - Add support for texlive2012 - Allow NM to read file_t (usb stick with no labels used to transfer keys for example) - Allow cobbler to execute apache with domain transition- condor_collector uses tcp/9000 - Label /usr/sbin/virtlockd as virtd_exec_t for now - Allow cobbler to execute ldconfig - Allow NM to execute ssh - Allow mdadm to read /dev/crash - Allow antivirus domains to connect to snmp port - Make amavisd-snmp working correctly - Allow nfsd_t to mounton nfsd_fs_t - Add initial snapper policy - We still need to have consolekit policy - Dontaudit firefox attempting to connect to the xserver_port_t if run within sandbox_web_t - Dontaudit sandbox apps attempting to open user_devpts_t - Allow dirsrv to read network state - Fix pki_read_tomcat_lib_files - Add labeling for /usr/libexec/nm-ssh-service - Add label cert_t for /var/lib/ipa/pki-ca/publish - Lets label /sys/fs/cgroup as cgroup_t for now, to keep labels consistant - Allow nfsd_t to mounton nfsd_fs_t - Dontaudit sandbox apps attempting to open user_devpts_t - Allow passwd_t to change role to system_r from unconfined_r- Don't audit access checks by sandbox xserver on xdb var_lib - Allow ntop to read usbmon devices - Add labeling for new polcykit authorizor - Dontaudit access checks from fail2ban_client - Don't audit access checks by sandbox xserver on xdb var_lib - Allow apps that connect to xdm stream to conenct to xdm_dbusd_t stream - Fix labeling for all /usr/bim/razor-lightdm-* binaries - Add filename trans for /dev/md126p1- Make vdagent able to request loading kernel module - Add support for cloud-init make it as unconfined domain - Allow snmpd to run smartctl in fsadm_t domain - remove duplicate openshift_search_lib() interface - Allow mysqld to search openshift lib files - Allow openshift cgroup to interact with passedin file descriptors - Allow colord to list directories inthe users homedir - aide executes prelink to check files - Make sure cupsd_t creates content in /etc/cups with the correct label - Lest dontaudit apache read all domains, so passenger will not cause this avc - Allow gssd to connect to gssproxy - systemd-tmpfiles needs to be able to raise the level to fix labeling on /run/setrans in MLS - Allow systemd-tmpfiles to relabel also lock files - Allow useradd to add homdir in /var/lib/openshift - Allow setfiles and semanage to write output to /run/files- Add labeling for /dev/tgt - Dontaudit leak fd from firewalld for modprobe - Allow runuser running as rpm_script_t to create netlink_audit socket - Allow mdadm to read BIOS non-volatile RAM- accountservice watches when accounts come and go in wtmp - /usr/java/jre1.7.0_21/bin/java needs to create netlink socket - Add httpd_use_sasl boolean - Allow net_admin for tuned_t - iscsid needs sys_module to auto-load kernel modules - Allow blueman to read bluetooth conf - Add nova_manage_lib_files() interface - Fix mplayer_filetrans_home_content() - Add mplayer_filetrans_home_content() - mozilla_plugin_config_roles need to be able to access mozilla_plugin_config_t - Revert "Allow thumb_t to append inherited xdm stream socket" - Add iscsi_filetrans_named_content() interface - Allow to create .mplayer with the correct labeling for unconfined - Allow iscsiadmin to create lock file with the correct labeling- Allow wine to manage wine home content - Make amanda working with socket actiovation - Add labeling for /usr/sbin/iscsiadm - Add support for /var/run/gssproxy.sock - dnsmasq_t needs to read sysctl_net_t- Fix courier_domain_template() interface - Allow blueman to write ip_forward - Allow mongodb to connect to mongodb port - Allow mongodb to connect to mongodb port - Allow java to bind jobss_debug port - Fixes for *_admin interfaces - Allow iscsid auto-load kernel modules needed for proper iSCSI functionality - Need to assign attribute for courier_domain to all courier_domains - Fail2ban reads /etc/passwd - postfix_virtual will create new files in postfix_spool_t - abrt triggers sys_ptrace by running pidof - Label ~/abc as mozilla_home_t, since java apps as plugin want to create it - Add passenger fixes needed by foreman - Remove dup interfaces - Add additional interfaces for quantum - Add new interfaces for dnsmasq - Allow passenger to read localization and send signull to itself - Allow dnsmasq to stream connect to quantum - Add quantum_stream_connect() - Make sure that mcollective starts the service with the correct labeling - Add labels for ~/.manpath - Dontaudit attempts by svirt_t to getpw* calls - sandbox domains are trying to look at parent process data - Allow courior auth to create its pid file in /var/spool/courier subdir - Add fixes for beam to have it working with couchdb - Add labeling for /run/nm-xl2tpd.con - Allow apache to stream connect to thin - Add systemd support for amand - Make public types usable for fs mount points - Call correct mandb interface in domain.te - Allow iptables to r/w quantum inherited pipes and send sigchld - Allow ifconfig domtrans to iptables and execute ldconfig - Add labels for ~/.manpath - Allow systemd to read iscsi lib files - seunshare is trying to look at parent process data- Fix openshift_search_lib - Add support for abrt-uefioops-oops - Allow colord to getattr any file system - Allow chrome processes to look at each other - Allow sys_ptrace for abrt_t - Add new policy for gssproxy - Dontaudit leaked file descriptor writes from firewalld - openshift_net_type is interface not template - Dontaudit pppd to search gnome config - Update openshift_search_lib() interface - Add fs_list_pstorefs() - Fix label on libbcm_host.so since it is built incorrectly on raspberry pi, needs back port to F18 - Better labels for raspberry pi devices - Allow init to create devpts_t directory - Temporarily label rasbery pi devices as memory_device_t, needs back port to f18 - Allow sysadm_t to build kernels - Make sure mount creates /var/run/blkid with the correct label, needs back port to F18 - Allow userdomains to stream connect to gssproxy - Dontaudit leaked file descriptor writes from firewalld - Allow xserver to read /dev/urandom - Add additional fixes for ipsec-mgmt - Make SSHing into an Openshift Enterprise Node working- Add transition rules to unconfined domains and to sysadm_t to create /etc/adjtime - with the proper label. - Update files_filetrans_named_content() interface to get right labeling for pam.d conf files - Allow systemd-timedated to create adjtime - Add clock_create_adjtime() - Additional fix ifconfing for #966106 - Allow kernel_t to create boot.log with correct labeling - Remove unconfined_mplayer for which we don't have rules - Rename interfaces - Add userdom_manage_user_home_files/dirs interfaces - Fix files_dontaudit_read_all_non_security_files - Fix ipsec_manage_key_file() - Fix ipsec_filetrans_key_file() - Label /usr/bin/razor-lightdm-greeter as xdm_exec_t instead of spamc_exec_t - Fix labeling for ipse.secrets - Add interfaces for ipsec and labeling for ipsec.info and ipsec_setup.pid - Add files_dontaudit_read_all_non_security_files() interface - /var/log/syslog-ng should be labeled var_log_t - Make ifconfig_var_run_t a mountpoint - Add transition from ifconfig to dnsmasq - Allow ifconfig to execute bin_t/shell_exec_t - We want to have hwdb.bin labeled as etc_t - update logging_filetrans_named_content() interface - Allow systemd_timedate_t to manage /etc/adjtime - Allow NM to send signals to l2tpd - Update antivirus_can_scan_system boolean - Allow devicekit_disk_t to sys_config_tty - Run abrt-harvest programs as abrt_t, and allow abrt_t to list all filesystem directories - Make printing from vmware working - Allow php-cgi from php54 collection to access /var/lib/net-snmp/mib_indexes - Add virt_qemu_ga_data_t for qemu-ga - Make chrome and mozilla able to connect to same ports, add jboss_management_port_t to both - Fix typo in virt.te - Add virt_qemu_ga_unconfined_t for hook scripts - Make sure NetworkManager files get created with the correct label - Add mozilla_plugin_use_gps boolean - Fix cyrus to have support for net-snmp - Additional fixes for dnsmasq and quantum for #966106 - Add plymouthd_create_log() - remove httpd_use_oddjob for which we don't have rules - Add missing rules for httpd_can_network_connect_cobbler - Add missing cluster_use_execmem boolean - Call userdom_manage_all_user_home_type_files/dirs - Additional fix for ftp_home_dir - Fix ftp_home_dir boolean - Allow squit to recv/send client squid packet - Fix nut.te to have nut_domain attribute - Add support for ejabberd; TODO: revisit jabberd and rabbit policy - Fix amanda policy - Add more fixes for domains which use libusb - Make domains which use libusb working correctly - Allow l2tpd to create ipsec key files with correct labeling and manage them - Fix cobbler_manage_lib_files/cobbler_read_lib_files to cover also lnk files - Allow rabbitmq-beam to bind generic node - Allow l2tpd to read ipse-mgmt pid files - more fixes for l2tpd, NM and pppd from #967072- Dontaudit to getattr on dirs for dovecot-deliver - Allow raiudusd server connect to postgresql socket - Add kerberos support for radiusd - Allow saslauthd to connect to ldap port - Allow postfix to manage postfix_private_t files - Add chronyd support for #965457 - Fix labeling for HOME_DIR/\.icedtea - CHange squid and snmpd to be allowed also write own logs - Fix labeling for /usr/libexec/qemu-ga - Allow virtd_t to use virt_lock_t - Allow also sealert to read the policy from the kernel - qemu-ga needs to execute scripts in /usr/libexec/qemu-ga and to use /tmp content - Dontaudit listing of users homedir by sendmail Seems like a leak - Allow passenger to transition to puppet master - Allow apache to connect to mythtv - Add definition for mythtv ports- Add additional fixes for #948073 bug - Allow sge_execd_t to also connect to sge ports - Allow openshift_cron_t to manage openshift_var_lib_t sym links - Allow openshift_cron_t to manage openshift_var_lib_t sym links - Allow sge_execd to bind sge ports. Allow kill capability and reads cgroup files - Remove pulseaudio filetrans pulseaudio_manage_home_dirs which is a part of pulseaudio_manage_home_files - Add networkmanager_stream_connect() - Make gnome-abrt wokring with staff_t - Fix openshift_manage_lib_files() interface - mdadm runs ps command which seems to getattr on random log files - Allow mozilla_plugin_t to create pulseaudit_home_t directories - Allow qemu-ga to shutdown virtual hosts - Add labelling for cupsd-browsed - Add web browser plugins to connect to aol ports - Allow nm-dhcp-helper to stream connect to NM - Add port definition for sge ports- Make sure users and unconfined domains create .hushlogin with the correct label - Allow pegaus to chat with realmd over DBus - Allow cobblerd to read network state - Allow boicn-client to stat on /dev/input/mice - Allow certwatch to read net_config_t when it executes apache - Allow readahead to create /run/systemd and then create its own directory with the correct label- Transition directories and files when in a user_tmp_t directory - Change certwatch to domtrans to apache instead of just execute - Allow virsh_t to read xen lib files - update policy rules for pegasus_openlmi_account_t - Add support for svnserve_tmp_t - Activate account openlmi policy - pegasus_openlmi_domain_template needs also require pegasus_t - One more fix for policykit.te - Call fs_list_cgroups_dirs() in policykit.te - Allow nagios service plugin to read mysql config files - Add labeling for /var/svn - Fix chrome.te - Fix pegasus_openlmi_domain_template() interfaces - Fix dev_rw_vfio_dev definiton, allow virtd_t to read tmpfs_t symlinks - Fix location of google-chrome data - Add support for chome_sandbox to store content in the homedir - Allow policykit to watch for changes in cgroups file system - Add boolean to allow mozilla_plugin_t to use spice - Allow collectd to bind to udp port - Allow collected_t to read all of /proc - Should use netlink socket_perms - Should use netlink socket_perms - Allow glance domains to connect to apache ports - Allow apcupsd_t to manage its log files - Allow chrome objects to rw_inherited unix_stream_socket from callers - Allow staff_t to execute virtd_exec_t for running vms - nfsd_t needs to bind mountd port to make nfs-mountd.service working - Allow unbound net_admin capability because of setsockopt syscall - Fix fs_list_cgroup_dirs() - Label /usr/lib/nagios/plugins/utils.pm as bin_t - Remove uplicate definition of fs_read_cgroup_files() - Remove duplicate definition of fs_read_cgroup_files() - Add files_mountpoint_filetrans interface to be used by quotadb_t and snapperd - Additional interfaces needed to list and read cgroups config - Add port definition for collectd port - Add labels for /dev/ptp* - Allow staff_t to execute virtd_exec_t for running vms- Allow samba-net to also read realmd tmp files - Allow NUT to use serial ports - realmd can be started by systemctl now- Remove userdom_home_manager for xdm_t and move all rules to xserver.te directly - Add new xdm_write_home boolean to allow xdm_t to create files in HOME dirs with xdm_home_t - Allow postfix-showq to read/write unix.showq in /var/spool/postfix/pid - Allow virsh to read xen lock file - Allow qemu-ga to create files in /run with proper labeling - Allow glusterd to connect to own socket in /tmp - Allow glance-api to connect to http port to make glance image-create working - Allow keystonte_t to execute rpm- Fix realmd cache interfaces- Allow tcpd to execute leafnode - Allow samba-net to read realmd cache files - Dontaudit sys_tty_config for alsactl - Fix allow rules for postfix_var_run - Allow cobblerd to read /etc/passwd - Allow pegasus to read exports - Allow systemd-timedate to read xdm state - Allow mout to stream connect to rpcbind - Add labeling just for /usr/share/pki/ca-trust-source instead of /usr/share/pki- Allow thumbnails to share memory with apps which run thumbnails - Allow postfix-postqueue block_suspend - Add lib interfaces for smsd - Add support for nginx - Allow s2s running as jabberd_t to connect to jabber_interserver_port_t - Allow pki apache domain to create own tmp files and execute httpd_suexec - Allow procmail to manger user tmp files/dirs/lnk_files - Add virt_stream_connect_svirt() interface - Allow dovecot-auth to execute bin_t - Allow iscsid to request that kernel load a kernel module - Add labeling support for /var/lib/mod_security - Allow iw running as tuned_t to create netlink socket - Dontaudit sys_tty_config for thumb_t - Add labeling for nm-l2tp-service - Allow httpd running as certwatch_t to open tcp socket - Allow useradd to manager smsd lib files - Allow useradd_t to add homedirs in /var/lib - Fix typo in userdomain.te - Cleanup userdom_read_home_certs - Implement userdom_home_reader_certs_type to allow read certs also on encrypt /home with ecryptfs_t - Allow staff to stream connect to svirt_t to make gnome-boxes working- Allow lvm to create its own unit files - Label /var/lib/sepolgen as selinux_config_t - Add filetrans rules for tw devices - Add transition from cupsd_config_t to cupsd_t- Add filetrans rules for tw devices - Cleanup bad transition lines- Fix lockdev_manage_files() - Allow setroubleshootd to read var_lib_t to make email_alert working - Add lockdev_manage_files() - Call proper interface in virt.te - Allow gkeyring_domain to create /var/run/UID/config/dbus file - system dbus seems to be blocking suspend - Dontaudit attemps to sys_ptrace, which I believe gpsd does not need - When you enter a container from root, you generate avcs with a leaked file descriptor - Allow mpd getattr on file system directories - Make sure realmd creates content with the correct label - Allow systemd-tty-ask to write kmsg - Allow mgetty to use lockdev library for device locking - Fix selinuxuser_user_share_music boolean name to selinuxuser_share_music - When you enter a container from root, you generate avcs with a leaked file descriptor - Make sure init.fc files are labeled correctly at creation - File name trans vconsole.conf - Fix labeling for nagios plugins - label shared libraries in /opt/google/chrome as testrel_shlib_t- Allow certmonger to dbus communicate with realmd - Make realmd working- Fix mozilla specification of homedir content - Allow certmonger to read network state - Allow tmpwatch to read tmp in /var/spool/{cups,lpd} - Label all nagios plugin as unconfined by default - Add httpd_serve_cobbler_files() - Allow mdadm to read /dev/sr0 and create tmp files - Allow certwatch to send mails - Fix labeling for nagios plugins - label shared libraries in /opt/google/chrome as testrel_shlib_t- Allow realmd to run ipa, really needs to be an unconfined_domain - Allow sandbox domains to use inherted terminals - Allow pscd to use devices labeled svirt_image_t in order to use cat cards. - Add label for new alsa pid - Alsa now uses a pid file and needs to setsched - Fix oracleasmfs_t definition - Add support for sshd_unit_file_t - Add oracleasmfs_t - Allow unlabeled_t files to be stored on unlabeled_t filesystems- Fix description of deny_ptrace boolean - Remove allow for execmod lib_t for now - Allow quantum to connect to keystone port - Allow nova-console to talk with mysql over unix stream socket - Allow dirsrv to stream connect to uuidd - thumb_t needs to be able to create ~/.cache if it does not exist - virtd needs to be able to sys_ptrace when starting and stoping containers- Allow alsa_t signal_perms, we probaly should search for any app that can execute something without transition and give it signal_perms... - Add dontaudit for mozilla_plugin_t looking at the xdm_t sockets - Fix deny_ptrace boolean, certain ptrace leaked into the system - Allow winbind to manage kerberos_rcache_host - Allow spamd to create spamd_var_lib_t directories - Remove transition to mozilla_tmp_t by mozilla_t, to allow it to manage the users tmp dirs - Add mising nslcd_dontaudit_write_sock_file() interface - one more fix - Fix pki_read_tomcat_lib_files() interface - Allow certmonger to read pki-tomcat lib files - Allow certwatch to execute bin_t - Allow snmp to manage /var/lib/net-snmp files - Call snmp_manage_var_lib_files(fogorn_t) instead of snmp_manage_var_dirs - Fix vmware_role() interface - Fix cobbler_manage_lib_files() interface - Allow nagios check disk plugins to execute bin_t - Allow quantum to transition to openvswitch_t - Allow postdrop to stream connect to postfix-master - Allow quantum to stream connect to openvswitch - Add xserver_dontaudit_xdm_rw_stream_sockets() interface - Allow daemon to send dgrams to initrc_t - Allow kdm to start the power service to initiate a reboot or poweroff- Add mising nslcd_dontaudit_write_sock_file() interface - one more fix - Fix pki_read_tomcat_lib_files() interface - Allow certmonger to read pki-tomcat lib files - Allow certwatch to execute bin_t - Allow snmp to manage /var/lib/net-snmp files - Don't audit attempts to write to stream socket of nscld by thumbnailers - Allow git_system_t to read network state - Allow pegasas to execute mount command - Fix desc for drdb_admin - Fix condor_amin() - Interface fixes for uptime, vdagent, vnstatd - Fix labeling for moodle in /var/www/moodle/data - Add interface fixes - Allow bugzilla to read certs - /var/www/moodle needs to be writable by apache - Add interface to dontaudit attempts to send dbus messages to systemd domains, for xguest - Fix namespace_init_t to create content with proper labels, and allow it to manage all user content - Allow httpd_t to connect to osapi_compute port using httpd_use_openstack bolean - Fixes for dlm_controld - Fix apache_read_sys_content_rw_dirs() interface - Allow logrotate to read /var/log/z-push dir - Fix sys_nice for cups_domain - Allow postfix_postdrop to acces postfix_public socket - Allow sched_setscheduler for cupsd_t - Add missing context for /usr/sbin/snmpd - Kernel_t needs mac_admin in order to support labeled NFS - Fix systemd_dontaudit_dbus_chat() interface - Add interface to dontaudit attempts to send dbus messages to systemd domains, for xguest - Allow consolehelper domain to write Xauth files in /root - Add port definition for osapi_compute port - Allow unconfined to create /etc/hostname with correct labeling - Add systemd_filetrans_named_hostname() interface- Allow httpd_t to connect to osapi_compute port using httpd_use_openstack bolean - Fixes for dlm_controld - Fix apache_read_sys_content_rw_dirs() interface - Allow logrotate to read /var/log/z-push dir - Allow postfix_postdrop to acces postfix_public socket - Allow sched_setscheduler for cupsd_t - Add missing context for /usr/sbin/snmpd - Allow consolehelper more access discovered by Tom London - Allow fsdaemon to send signull to all domain - Add port definition for osapi_compute port - Allow unconfined to create /etc/hostname with correct labeling - Add systemd_filetrans_named_hostname() interface- Fix file_contexts.subs to label /run/lock correctly- Try to label on controlC devices up to 30 correctly - Add mount_rw_pid_files() interface - Add additional mount/umount interfaces needed by mock - fsadm_t sends audit messages in reads kernel_ipc_info when doing livecd-iso-to-disk - Fix tabs - Allow initrc_domain to search rgmanager lib files - Add more fixes which make mock working together with confined users * Allow mock_t to manage rpm files * Allow mock_t to read rpm log files * Allow mock to setattr on tmpfs, devpts * Allow mount/umount filesystems - Add rpm_read_log() interface - yum-cron runs rpm from within it. - Allow tuned to transition to dmidecode - Allow firewalld to do net_admin - Allow mock to unmont tmpfs_t - Fix virt_sigkill() interface - Add additional fixes for mock. Mainly caused by mount running in mock_t - Allow mock to write sysfs_t and mount pid files - Add mailman_domain to mailman_template() - Allow openvswitch to execute shell - Allow qpidd to use kerberos - Allow mailman to use fusefs, needs back port to RHEL6 - Allow apache and its scripts to use anon_inodefs - Add alias for git_user_content_t and git_sys_content_t so that RHEL6 will update to RHEL7 - Realmd needs to connect to samba ports, needs back port to F18 also - Allow colord to read /run/initial-setup- - Allow sanlock-helper to send sigkill to virtd which is registred to sanlock - Add virt_kill() interface - Add rgmanager_search_lib() interface - Allow wdmd to getattr on all filesystems. Back ported from RHEL6- Allow realmd to create tmp files - FIx ircssi_home_t type to irssi_home_t - Allow adcli running as realmd_t to connect to ldap port - Allow NetworkManager to transition to ipsec_t, for running strongswan - Make openshift_initrc_t an lxc_domain - Allow gssd to manage user_tmp_t files - Fix handling of irclogs in users homedir - Fix labeling for drupal an wp-content in subdirs of /var/www/html - Allow abrt to read utmp_t file - Fix openshift policy to transition lnk_file, sock-file an fifo_file when created in a tmpfs_t, needs back port to RHEL6 - fix labeling for (oo|rhc)-restorer-wrapper.sh - firewalld needs to be able to write to network sysctls - Fix mozilla_plugin_dontaudit_rw_sem() interface - Dontaudit generic ipc read/write to a mozilla_plugin for sandbox_x domains - Add mozilla_plugin_dontaudit_rw_sem() interface - Allow svirt_lxc_t to transition to openshift domains - Allow condor domains block_suspend and dac_override caps - Allow condor_master to read passd - Allow condor_master to read system state - Allow NetworkManager to transition to ipsec_t, for running strongswan - Lots of access required by lvm_t to created encrypted usb device - Allow xdm_t to dbus communicate with systemd_localed_t - Label strongswan content as ipsec_exec_mgmt_t for now - Allow users to dbus chat with systemd_localed - Fix handling of .xsession-errors in xserver.if, so kde will work - Might be a bug but we are seeing avc's about people status on init_t:service - Make sure we label content under /var/run/lock as <> - Allow daemon and systemprocesses to search init_var_run_t directory - Add boolean to allow xdm to write xauth data to the home directory - Allow mount to write keys for the unconfined domain - Add unconfined_write_keys() interface- Add labeling for /usr/share/pki - Allow programs that read var_run_t symlinks also read var_t symlinks - Add additional ports as mongod_port_t for 27018, 27019, 28017, 28018 and 28019 ports - Fix labeling for /etc/dhcp directory - add missing systemd_stub_unit_file() interface - Add files_stub_var() interface - Add lables for cert_t directories - Make localectl set-x11-keymap working at all - Allow abrt to manage mock build environments to catch build problems. - Allow virt_domains to setsched for running gdb on itself - Allow thumb_t to execute user home content - Allow pulseaudio running as mozilla_plugin_t to read /run/systemd/users/1000 - Allow certwatch to execut /usr/bin/httpd - Allow cgred to send signal perms to itself, needs back port to RHEL6 - Allow openshift_cron_t to look at quota - Allow cups_t to read inhered tmpfs_t from the kernel - Allow yppasswdd to use NIS - Tuned wants sys_rawio capability - Add ftpd_use_fusefs boolean - Allow dirsrvadmin_t to signal itself- Allow localectl to read /etc/X11/xorg.conf.d directory - Revert "Revert "Fix filetrans rules for kdm creates .xsession-errors"" - Allow mount to transition to systemd_passwd_agent - Make sure abrt directories are labeled correctly - Allow commands that are going to read mount pid files to search mount_var_run_t - label /usr/bin/repoquery as rpm_exec_t - Allow automount to block suspend - Add abrt_filetrans_named_content so that abrt directories get labeled correctly - Allow virt domains to setrlimit and read file_context- Allow nagios to manage nagios spool files - /var/spool/snmptt is a directory which snmdp needs to write to, needs back port to RHEL6 - Add swift_alias.* policy files which contain typealiases for swift types - Add support for /run/lock/opencryptoki - Allow pkcsslotd chown capability - Allow pkcsslotd to read passwd - Add rsync_stub() interface - Allow systemd_timedate also manage gnome config homedirs - Label /usr/lib64/security/pam_krb5/pam_krb5_cchelper as bin_t - Fix filetrans rules for kdm creates .xsession-errors - Allow sytemd_tmpfiles to create wtmp file - Really should not label content under /var/lock, since it could have labels on it different from var_lock_t - Allow systemd to list all file system directories - Add some basic stub interfaces which will be used in PRODUCT policies- Fix log transition rule for cluster domains - Start to group all cluster log together - Dont use filename transition for POkemon Advanced Adventure until a new checkpolicy update - cups uses usbtty_device_t devices - These fixes were all required to build a MLS virtual Machine with single level desktops - Allow domains to transiton using httpd_exec_t - Allow svirt domains to manage kernel key rings - Allow setroubleshoot to execute ldconfig - Allow firewalld to read generate gnome data - Allow bluetooth to read machine-info - Allow boinc domain to send signal to itself - Fix gnome_filetrans_home_content() interface - Allow mozilla_plugins to list apache modules, for use with gxine - Fix labels for POkemon in the users homedir - Allow xguest to read mdstat - Dontaudit virt_domains getattr on /dev/* - These fixes were all required to build a MLS virtual Machine with single level desktops - Need to back port this to RHEL6 for openshift - Add tcp/8891 as milter port - Allow nsswitch domains to read sssd_var_lib_t files - Allow ping to read network state. - Fix typo - Add labels to /etc/X11/xorg.d and allow systemd-timestampd_t to manage them- Adopt swift changes from lhh@redhat.com - Add rhcs_manage_cluster_pid_files() interface - Allow screen domains to configure tty and setup sock_file in ~/.screen directory - ALlow setroubleshoot to read default_context_t, needed to backport to F18 - Label /etc/owncloud as being an apache writable directory - Allow sshd to stream connect to an lxc domain- Allow postgresql to manage rgmanager pid files - Allow postgresql to read ccs data - Allow systemd_domain to send dbus messages to policykit - Add labels for /etc/hostname and /etc/machine-info and allow systemd-hostnamed to create them - All systemd domains that create content are reading the file_context file and setfscreate - Systemd domains need to search through init_var_run_t - Allow sshd to communicate with libvirt to set containers labels - Add interface to manage pid files - Allow NetworkManger_t to read /etc/hostname - Dontaudit leaked locked files into openshift_domains - Add fixes for oo-cgroup-read - it nows creates tmp files - Allow gluster to manage all directories as well as files - Dontaudit chrome_sandbox_nacl_t using user terminals - Allow sysstat to manage its own log files - Allow virtual machines to setrlimit and send itself signals. - Add labeling for /var/run/hplip- Fix POSTIN scriptlet- Merge rgmanger, corosync,pacemaker,aisexec policies to cluster_t in rhcs.pp- Fix authconfig.py labeling - Make any domains that write homedir content do it correctly - Allow glusterd to read/write anyhwere on the file system by default - Be a little more liberal with the rsync log files - Fix iscsi_admin interface - Allow iscsid_t to read /dev/urand - Fix up iscsi domain for use with unit files - Add filename transition support for spamassassin policy - Allow web plugins to use badly formated libraries - Allow nmbd_t to create samba_var_t directories - Add filename transition support for spamassassin policy - Add filename transition support for tvtime - Fix alsa_home_filetrans_alsa_home() interface - Move all userdom_filetrans_home_content() calling out of booleans - Allow logrotote to getattr on all file sytems - Remove duplicate userdom_filetrans_home_content() calling - Allow kadmind to read /etc/passwd - Dontaudit append .xsession-errors file on ecryptfs for policykit-auth - Allow antivirus domain to manage antivirus db links - Allow logrotate to read /sys - Allow mandb to setattr on man dirs - Remove mozilla_plugin_enable_homedirs boolean - Fix ftp_home_dir boolean - homedir mozilla filetrans has been moved to userdom_home_manager - homedir telepathy filetrans has been moved to userdom_home_manager - Remove gnome_home_dir_filetrans() from gnome_role_gkeyringd() - Might want to eventually write a daemon on fusefsd. - Add policy fixes for sshd [net] child from plautrba@redhat.com - Tor uses a new port - Remove bin_t for authconfig.py - Fix so only one call to userdom_home_file_trans - Allow home_manager_types to create content with the correctl label - Fix all domains that write data into the homedir to do it with the correct label - Change the postgresql to use proper boolean names, which is causing httpd_t to - not get access to postgresql_var_run_t - Hostname needs to send syslog messages - Localectl needs to be able to send dbus signals to users - Make sure userdom_filetrans_type will create files/dirs with user_home_t labeling by default - Allow user_home_manger domains to create spam* homedir content with correct labeling - Allow user_home_manger domains to create HOMEDIR/.tvtime with correct labeling - Add missing miscfiles_setattr_man_pages() interface and for now comment some rules for userdom_filetrans_type to make build process working - Declare userdom_filetrans_type attribute - userdom_manage_home_role() needs to be called withoout usertype attribute because of userdom_filetrans_type attribute - fusefsd is mounding a fuse file system on /run/user/UID/gvfs- Man pages are now generated in the build process - Allow cgred to list inotifyfs filesystem- Allow gluster to get attrs on all fs - New access required for virt-sandbox - Allow dnsmasq to execute bin_t - Allow dnsmasq to create content in /var/run/NetworkManager - Fix openshift_initrc_signal() interface - Dontaudit openshift domains doing getattr on other domains - Allow consolehelper domain to communicate with session bus - Mock should not be transitioning to any other domains, we should keep mock_t as mock_t - Update virt_qemu_ga_t policy - Allow authconfig running from realmd to restart oddjob service - Add systemd support for oddjob - Add initial policy for realmd_consolehelper_t which if for authconfig executed by realmd - Add labeling for gnashpluginrc - Allow chrome_nacl to execute /dev/zero - Allow condor domains to read /proc - mozilla_plugin_t will getattr on /core if firefox crashes - Allow condor domains to read /etc/passwd - Allow dnsmasq to execute shell scripts, openstack requires this access - Fix glusterd labeling - Allow virtd_t to interact with the socket type - Allow nmbd_t to override dac if you turned on sharing all files - Allow tuned to created kobject_uevent socket - Allow guest user to run fusermount - Allow openshift to read /proc and locale - Allow realmd to dbus chat with rpm - Add new interface for virt - Remove depracated interfaces - Allow systemd_domains read access on etc, etc_runtime and usr files, also allow them to connect stream to syslog socket - /usr/share/munin/plugins/plugin.sh should be labeled as bin_t - Remove some more unconfined_t process transitions, that I don't believe are necessary - Stop transitioning uncofnined_t to checkpc - dmraid creates /var/lock/dmraid - Allow systemd_localed to creatre unix_dgram_sockets - Allow systemd_localed to write kernel messages. - Also cleanup systemd definition a little. - Fix userdom_restricted_xwindows_user_template() interface - Label any block devices or char devices under /dev/infiniband as fixed_disk_device_t - User accounts need to dbus chat with accountsd daemon - Gnome requires all users to be able to read /proc/1/- virsh now does a setexeccon call - Additional rules required by openshift domains - Allow svirt_lxc_domains to use inherited terminals, needed to make virt-sandbox-service execute work - Allow spamd_update_t to search spamc_home_t - Avcs discovered by mounting an isci device under /mnt - Allow lspci running as logrotate to read pci.ids - Additional fix for networkmanager_read_pid_files() - Fix networkmanager_read_pid_files() interface - Allow all svirt domains to connect to svirt_socket_t - Allow virsh to set SELinux context for a process. - Allow tuned to create netlink_kobject_uevent_socket - Allow systemd-timestamp to set SELinux context - Add support for /var/lib/systemd/linger - Fix ssh_sysadm_login to be working on MLS as expected- Rename files_rw_inherited_tmp_files to files_rw_inherited_tmp_file - Add missing files_rw_inherited_tmp_files interface - Add additional interface for ecryptfs - ALlow nova-cert to connect to postgresql - Allow keystone to connect to postgresql - Allow all cups domains to getattr on filesystems - Allow pppd to send signull - Allow tuned to execute ldconfig - Allow gpg to read fips_enabled - Add additional fixes for ecryptfs - Allow httpd to work with posgresql - Allow keystone getsched and setsched- Allow gpg to read fips_enabled - Add support for /var/cache/realmd - Add support for /usr/sbin/blazer_usb and systemd support for nut - Add labeling for fenced_sanlock and allow sanclok transition to fenced_t - bitlbee wants to read own log file - Allow glance domain to send a signal itself - Allow xend_t to request that the kernel load a kernel module - Allow pacemaker to execute heartbeat lib files - cleanup new swift policy- Fix smartmontools - Fix userdom_restricted_xwindows_user_template() interface - Add xserver_xdm_ioctl_log() interface - Allow Xusers to ioctl lxdm.log to make lxdm working - Add MLS fixes to make MLS boot/log-in working - Add mls_socket_write_all_levels() also for syslogd - fsck.xfs needs to read passwd - Fix ntp_filetrans_named_content calling in init.te - Allow postgresql to create pg_log dir - Allow sshd to read rsync_data_t to make rsync working - Change ntp.conf to be labeled net_conf_t - Allow useradd to create homedirs in /run. ircd-ratbox does this and we should just allow it - Allow xdm_t to execute gstreamer home content - Allod initrc_t and unconfined domains, and sysadm_t to manage ntp - New policy for openstack swift domains - More access required for openshift_cron_t - Use cupsd_log_t instead of cupsd_var_log_t - rpm_script_roles should be used in rpm_run - Fix rpm_run() interface - Fix openshift_initrc_run() - Fix sssd_dontaudit_stream_connect() interface - Fix sssd_dontaudit_stream_connect() interface - Allow LDA's job to deliver mail to the mailbox - dontaudit block_suspend for mozilla_plugin_t - Allow l2tpd_t to all signal perms - Allow uuidgen to read /dev/random - Allow mozilla-plugin-config to read power_supply info - Implement cups_domain attribute for cups domains - We now need access to user terminals since we start by executing a command outside the tty - We now need access to user terminals since we start by executing a command outside the tty - svirt lxc containers want to execute userhelper apps, need these changes to allow this to happen - Add containment of openshift cron jobs - Allow system cron jobs to create tmp directories - Make userhelp_conf_t a config file - Change rpm to use rpm_script_roles - More fixes for rsync to make rsync wokring - Allow logwatch to domtrans to mdadm - Allow pacemaker to domtrans to ifconfig - Allow pacemaker to setattr on corosync.log - Add pacemaker_use_execmem for memcheck-amd64 command - Allow block_suspend capability - Allow create fifo_file in /tmp with pacemaker_tmp_t - Allow systat to getattr on fixed disk - Relabel /etc/ntp.conf to be net_conf_t - ntp_admin should create files in /etc with the correct label - Add interface to create ntp_conf_t files in /etc - Add additional labeling for quantum - Allow quantum to execute dnsmasq with transition- boinc_cliean wants also execmem as boinc projecs have - Allow sa-update to search admin home for /root/.spamassassin - Allow sa-update to search admin home for /root/.spamassassin - Allow antivirus domain to read net sysctl - Dontaudit attempts from thumb_t to connect to ssd - Dontaudit attempts by readahead to read sock_files - Dontaudit attempts by readahead to read sock_files - Create tmpfs file while running as wine as user_tmpfs_t - Dontaudit attempts by readahead to read sock_files - libmpg ships badly created librarie- Change ssh_use_pts to use macro and only inherited sshd_devpts_t - Allow confined users to read systemd_logind seat information - libmpg ships badly created libraries - Add support for strongswan.service - Add labeling for strongswan - Allow l2tpd_t to read network manager content in /run directory - Allow rsync to getattr any file in rsync_data_t - Add labeling and filename transition for .grl-podcasts- mount.glusterfs executes glusterfsd binary - Allow systemd_hostnamed_t to stream connect to systemd - Dontaudit any user doing a access check - Allow obex-data-server to request the kernel to load a module - Allow gpg-agent to manage gnome content (~/.cache/gpg-agent-info) - Allow gpg-agent to read /proc/sys/crypto/fips_enabled - Add new types for antivirus.pp policy module - Allow gnomesystemmm_t caps because of ioprio_set - Make sure if mozilla_plugin creates files while in permissive mode, they get created with the correct label, user_home_t - Allow gnomesystemmm_t caps because of ioprio_set - Allow NM rawip socket - files_relabel_non_security_files can not be used with boolean - Add interface to thumb_t dbus_chat to allow it to read remote process state - ALlow logrotate to domtrans to mdadm_t - kde gnomeclock wants to write content to /tmp- kde gnomeclock wants to write content to /tmp - /usr/libexec/kde4/kcmdatetimehelper attempts to create /root/.kde - Allow blueman_t to rwx zero_device_t, for some kind of jre - Allow mozilla_plugin_t to rwx zero_device_t, for some kind of jre - Ftp full access should be allowed to create directories as well as files - Add boolean to allow rsync_full_acces, so that an rsync server can write all - over the local machine - logrotate needs to rotate logs in openshift directories, needs back port to RHEL6 - Add missing vpnc_roles type line - Allow stapserver to write content in /tmp - Allow gnome keyring to create keyrings dir in ~/.local/share - Dontaudit thumb drives trying to bind to udp sockets if nis_enabled is turned on - Add interface to colord_t dbus_chat to allow it to read remote process state - Allow colord_t to read cupsd_t state - Add mate-thumbnail-font as thumnailer - Allow sectoolm to sys_ptrace since it is looking at other proceses /proc data. - Allow qpidd to list /tmp. Needed by ssl - Only allow init_t to transition to rsync_t domain, not initrc_t. This should be back ported to F17, F18 - - Added systemd support for ksmtuned - Added booleans ksmtuned_use_nfs ksmtuned_use_cifs - firewalld seems to be creating mmap files which it needs to execute in /run /tmp and /dev/shm. Would like to clean this up but for now we will allow - Looks like qpidd_t needs to read /dev/random - Lots of probing avc's caused by execugting gpg from staff_t - Dontaudit senmail triggering a net_admin avc - Change thumb_role to use thumb_run, not sure why we have a thumb_role, needs back port - Logwatch does access check on mdadm binary - Add raid_access_check_mdadm() iterface- Fix systemd_manage_unit_symlinks() interface - Call systemd_manage_unit_symlinks(() which is correct interface - Add filename transition for opasswd - Switch gnomeclock_dbus_chat to systemd_dbus_chat_timedated since we have switched the name of gnomeclock - Allow sytstemd-timedated to get status of init_t - Add new systemd policies for hostnamed and rename gnomeclock_t to systemd_timedate_t - colord needs to communicate with systemd and systemd_logind, also remove duplicate rules - Switch gnomeclock_dbus_chat to systemd_dbus_chat_timedated since we have switched the name of gnomeclock - Allow gpg_t to manage all gnome files - Stop using pcscd_read_pub_files - New rules for xguest, dontaudit attempts to dbus chat - Allow firewalld to create its mmap files in tmpfs and tmp directories - Allow firewalld to create its mmap files in tmpfs and tmp directories - run unbound-chkconf as named_t, so it can read dnssec - Colord is reading xdm process state, probably reads state of any apps that sends dbus message - Allow mdadm_t to change the kernel scheduler - mythtv policy - Update mandb_admin() interface - Allow dsspam to listen on own tpc_socket - seutil_filetrans_named_content needs to be optional - Allow sysadm_t to execute content in his homedir - Add attach_queue to tun_socket, new patch from Paul Moore - Change most of selinux configuration types to security_file_type. - Add filename transition rules for selinux configuration - ssh into a box with -X -Y requires ssh_use_ptys - Dontaudit thumb drives trying to bind to udp sockets if nis_enabled is turned on - Allow all unpriv userdomains to send dbus messages to hostnamed and timedated - New allow rules found by Tom London for systemd_hostnamed- Allow systemd-tmpfiles to relabel lpd spool files - Ad labeling for texlive bash scripts - Add xserver_filetrans_fonts_cache_home_content() interface - Remove duplicate rules from *.te - Add support for /var/lock/man-db.lock - Add support for /var/tmp/abrt(/.*)? - Add additional labeling for munin cgi scripts - Allow httpd_t to read munin conf files - Allow certwatch to read meminfo - Fix nscd_dontaudit_write_sock_file() interfac - Fix gnome_filetrans_home_content() to include also "fontconfig" dir as cache_home_t - llow mozilla_plugin_t to create HOMEDIR/.fontconfig with the proper labeling- Allow gnomeclock to talk to puppet over dbus - Allow numad access discovered by Dominic - Add support for HOME_DIR/.maildir - Fix attribute_role for mozilla_plugin_t domain to allow staff_r to access this domain - Allow udev to relabel udev_var_run_t lnk_files - New bin_t file in mcelog- Remove all mcs overrides and replace with t1 != mcs_constrained_types - Add attribute_role for iptables - mcs_process_set_categories needs to be called for type - Implement additional role_attribute statements - Sodo domain is attempting to get the additributes of proc_kcore_t - Unbound uses port 8953 - Allow svirt_t images to compromise_kernel when using pci-passthrough - Add label for dns lib files - Bluetooth aquires a dbus name - Remove redundant files_read_usr_file calling - Remove redundant files_read_etc_file calling - Fix mozilla_run_plugin() - Add role_attribute support for more domains- Mass merge with upstream- Bump the policy version to 28 to match selinux userspace - Rebuild versus latest libsepol- Add systemd_status_all_unit_files() interface - Add support for nshadow - Allow sysadm_t to administrate the postfix domains - Add interface to setattr on isid directories for use by tmpreaper - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Add systemd_status_all_unit_files() interface - Add support for nshadow - Allow sysadm_t to administrate the postfix domains - Add interface to setattr on isid directories for use by tmpreaper - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Allow sshd_t sys_admin for use with afs logins - Add labeling for /var/named/chroot/etc/localtim- Allow setroubleshoot_fixit to execute rpm - zoneminder needs to connect to httpd ports where remote cameras are listening - Allow firewalld to execute content created in /run directory - Allow svirt_t to read generic certs - Dontaudit leaked ps content to mozilla plugin - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - init scripts are creating systemd_unit_file_t directories- systemd_logind_t is looking at all files under /run/user/apache - Allow systemd to manage all user tmp files - Add labeling for /var/named/chroot/etc/localtime - Allow netlabel_peer_t type to flow over netif_t and node_t, and only be hindered by MLS, need back port to RHEL6 - Keystone is now using a differnt port - Allow xdm_t to use usbmuxd daemon to control sound - Allow passwd daemon to execute gnome_exec_keyringd - Fix chrome_sandbox policy - Add labeling for /var/run/checkquorum-timer - More fixes for the dspam domain, needs back port to RHEL6 - More fixes for the dspam domain, needs back port to RHEL6 - sssd needs to connect to kerberos password port if a user changes his password - Lots of fixes from RHEL testing of dspam web - Allow chrome and mozilla_plugin to create msgq and semaphores - Fixes for dspam cgi scripts - Fixes for dspam cgi scripts - Allow confine users to ptrace screen - Backport virt_qemu_ga_t changes from RHEL - Fix labeling for dspam.cgi needed for RHEL6 - We need to back port this policy to RHEL6, for lxc domains - Dontaudit attempts to set sys_resource of logrotate - Allow corosync to read/write wdmd's tmpfs files - I see a ptrace of mozilla_plugin_t by staff_t, will allow without deny_ptrace being set - Allow cron jobs to read bind config for unbound - libvirt needs to inhibit systemd - kdumpctl needs to delete boot_t files - Fix duplicate gnome_config_filetrans - virtd_lxc_t is using /dev/fuse - Passenger needs to create a directory in /var/log, needs a backport to RHEL6 for openshift - apcupsd can be setup to listen to snmp trafic - Allow transition from kdumpgui to kdumpctl - Add fixes for munin CGI scripts - Allow deltacloud to connect to openstack at the keystone port - Allow domains that transition to svirt domains to be able to signal them - Fix file context of gstreamer in .cache directory - libvirt is communicating with logind - NetworkManager writes to the systemd inhibit pipe- Allow munin disk plugins to get attributes of all directories - Allow munin disk plugins to get attributes of all directorie - Allow logwatch to get attributes of all directories - Fix networkmanager_manage_lib() interface - Fix gnome_manage_config() to allow to manage sock_file - Fix virtual_domain_context - Add support for dynamic DNS for DHCPv6- Allow svirt to use netlink_route_socket which was a part of auth_use_nsswitch - Add additional labeling for /var/www/openshift/broker - Fix rhev policy - Allow openshift_initrc domain to dbus chat with systemd_logind - Allow httpd to getattr passenger log file if run_stickshift - Allow consolehelper-gtk to connect to xserver - Add labeling for the tmp-inst directory defined in pam_namespace.conf - Add lvm_metadata_t labeling for /etc/multipath- consoletype is no longer used- Add label for efivarfs - Allow certmonger to send signal to itself - Allow plugin-config to read own process status - Add more fixes for pacemaker - apache/drupal can run clamscan on uploaded content - Allow chrome_sandbox_nacl_t to read pid 1 content- Fix MCS Constraints to control ingres and egres controls on the network. - Change name of svirt_nokvm_t to svirt_tcg_t - Allow tuned to request the kernel to load kernel modules- Label /var/lib/pgsql/.ssh as ssh_home_t - Add labeling for /usr/bin/pg_ctl - Allow systemd-logind to manage keyring user tmp dirs - Add support for 7389/tcp port - gems seems to be placed in lots of places - Since xdm is running a full session, it seems to be trying to execute lots of executables via dbus - Add back tcp/8123 port as http_cache port - Add ovirt-guest-agent\.pid labeling - Allow xend to run scsi_id - Allow rhsmcertd-worker to read "physical_package_id" - Allow pki_tomcat to connect to ldap port - Allow lpr to read /usr/share/fonts - Allow open file from CD/DVD drive on domU - Allow munin services plugins to talk to SSSD - Allow all samba domains to create samba directory in var_t directories - Take away svirt_t ability to use nsswitch - Dontaudit attempts by openshift to read apache logs - Allow apache to create as well as append _ra_content_t - Dontaudit sendmail_t reading a leaked file descriptor - Add interface to have admin transition /etc/prelink.cache to the proper label - Add sntp support to ntp policy - Allow firewalld to dbus chat with devicekit_power - Allow tuned to call lsblk - Allow tor to read /proc/sys/kernel/random/uuid - Add tor_can_network_relay boolean- Add openshift_initrc_signal() interface - Fix typos - dspam port is treat as spamd_port_t - Allow setroubleshoot to getattr on all executables - Allow tuned to execute profiles scripts in /etc/tuned - Allow apache to create directories to store its log files - Allow all directories/files in /var/log starting with passenger to be labeled passenger_log_t - Looks like apache is sending sinal to openshift_initrc_t now,needs back port to RHEL6 - Allow Postfix to be configured to listen on TCP port 10026 for email from DSPAM - Add filename transition for /etc/tuned/active_profile - Allow condor_master to send mails - Allow condor_master to read submit.cf - Allow condor_master to create /tmp files/dirs - Allow condor_mater to send sigkill to other condor domains - Allow condor_procd sigkill capability - tuned-adm wants to talk with tuned daemon - Allow kadmind and krb5kdc to also list sssd_public_t - Allow accountsd to dbus chat with init - Fix git_read_generic_system_content_files() interface - pppd wants sys_nice by nmcli because of "syscall=sched_setscheduler" - Fix mozilla_plugin_can_network_connect to allow to connect to all ports - Label all munin plugins which are not covered by munin plugins policy as unconfined_munin_plugin_exec_t - dspam wants to search /var/spool for opendkim data - Revert "Add support for tcp/10026 port as dspam_port_t" - Turning on labeled networking requires additional access for netlabel_peer_t; these allow rules need to be back ported to RHEL6 - Allow all application domains to use fifo_files passed in from userdomains, also allow them to write to tmp_files inherited from userdomain - Allow systemd_tmpfiles_t to setattr on mandb_cache_t- consolekit.pp was not removed from the postinstall script- Add back consolekit policy - Silence bootloader trying to use inherited tty - Silence xdm_dbusd_t trying to execute telepathy apps - Fix shutdown avcs when machine has unconfined.pp disabled - The host and a virtual machine can share the same printer on a usb device - Change oddjob to transition to a ranged openshift_initr_exec_t when run from oddjob - Allow abrt_watch_log_t to execute bin_t - Allow chrome sandbox to write content in ~/.config/chromium - Dontaudit setattr on fontconfig dir for thumb_t - Allow lircd to request the kernel to load module - Make rsync as userdom_home_manager - Allow rsync to search automount filesystem - Add fixes for pacemaker- Add support for 4567/tcp port - Random fixes from Tuomo Soini - xdm wants to get init status - Allow programs to run in fips_mode - Add interface to allow the reading of all blk device nodes - Allow init to relabel rpcbind sock_file - Fix labeling for lastlog and faillog related to logrotate - ALlow aeolus_configserver to use TRAM port - Add fixes for aeolus_configserver - Allow snmpd to connect to snmp port - Allow spamd_update to create spamd_var_lib_t directories - Allow domains that can read sssd_public_t files to also list the directory - Remove miscfiles_read_localization, this is defined for all domains- Allow syslogd to request the kernel to load a module - Allow syslogd_t to read the network state information - Allow xdm_dbusd_t connect to the system DBUS - Add support for 7389/tcp port - Allow domains to read/write all inherited sockets - Allow staff_t to read kmsg - Add awstats_purge_apache_log boolean - Allow ksysguardproces to read /.config/Trolltech.conf - Allow passenger to create and append puppet log files - Add puppet_append_log and puppet_create_log interfaces - Add puppet_manage_log() interface - Allow tomcat domain to search tomcat_var_lib_t - Allow pki_tomcat_t to connect to pki_ca ports - Allow pegasus_t to have net_admin capability - Allow pegasus_t to write /sys/class/net//flags - Allow mailserver_delivery to manage mail_home_rw_t lnk_files - Allow fetchmail to create log files - Allow gnomeclock to manage home config in .kde - Allow bittlebee to read kernel sysctls - Allow logrotate to list /root- Fix userhelper_console_role_template() - Allow enabling Network Access Point service using blueman - Make vmware_host_t as unconfined domain - Allow authenticate users in webaccess via squid, using mysql as backend - Allow gathers to get various metrics on mounted file systems - Allow firewalld to read /etc/hosts - Fix cron_admin_role() to make sysadm cronjobs running in the sysadm_t instead of cronjob_t - Allow kdumpgui to read/write to zipl.conf - Commands needed to get mock to build from staff_t in enforcing mode - Allow mdadm_t to manage cgroup files - Allow all daemons and systemprocesses to use inherited initrc_tmp_t files - dontaudit ifconfig_t looking at fifo_files that are leaked to it - Add lableing for Quest Authentication System- Fix filetrans interface definitions - Dontaudit xdm_t to getattr on BOINC lib files - Add systemd_reload_all_services() interface - Dontaudit write access on /var/lib/net-snmp/mib_indexes - Only stop mcsuntrustedproc from relableing files - Allow accountsd to dbus chat with gdm - Allow realmd to getattr on all fs - Allow logrotate to reload all services - Add systemd unit file for radiusd - Allow winbind to create samba pid dir - Add labeling for /var/nmbd/unexpected - Allow chrome and mozilla plugin to connect to msnp ports- Fix storage_rw_inherited_fixed_disk_dev() to cover also blk_file - Dontaudit setfiles reading /dev/random - On initial boot gnomeclock is going to need to be set buy gdm - Fix tftp_read_content() interface - Random apps looking at kernel file systems - Testing virt with lxc requiers additional access for virsh_t - New allow rules requied for latest libvirt, libvirt talks directly to journald,lxc setup tool needs compromize_kernel,and we need ipc_lock in the container - Allow MPD to read /dev/radnom - Allow sandbox_web_type to read logind files which needs to read pulseaudio - Allow mozilla plugins to read /dev/hpet - Add labeling for /var/lib/zarafa-webap - Allow BOINC client to use an HTTP proxy for all connections - Allow rhsmertd to domain transition to dmidecod - Allow setroubleshootd to send D-Bus msg to ABRT- Define usbtty_device_t as a term_tty - Allow svnserve to accept a connection - Allow xend manage default virt_image_t type - Allow prelink_cron_system_t to overide user componant when executing cp - Add labeling for z-push - Gnomeclock sets the realtime clock - Openshift seems to be storing apache logs in /var/lib/openshift/.log/httpd - Allow lxc domains to use /dev/random and /dev/urandom- Add port defintion for tcp/9000 - Fix labeling for /usr/share/cluster/checkquorum to label also checkquorum.wdmd - Add rules and labeling for $HOME/cache/\.gstreamer-.* directory - Add support for CIM provider openlmi-networking which uses NetworkManager dbus API - Allow shorewall_t to create netlink_socket - Allow krb5admind to block suspend - Fix labels on /var/run/dlm_controld /var/log/dlm_controld - Allow krb5kdc to block suspend - gnomessytemmm_t needs to read /etc/passwd - Allow cgred to read all sysctls- Allow all domains to read /proc/sys/vm/overcommit_memory - Make proc_numa_t an MLS Trusted Object - Add /proc/numactl support for confined users - Allow ssh_t to connect to any port > 1023 - Add openvswitch domain - Pulseaudio tries to create directories in gnome_home_t directories - New ypbind pkg wants to search /var/run which is caused by sd_notify - Allow NM to read certs on NFS/CIFS using use_nfs_*, use_samba_* booleans - Allow sanlock to read /dev/random - Treat php-fpm with httpd_t - Allow domains that can read named_conf_t to be able to list the directories - Allow winbind to create sock files in /var/run/samba- Add smsd policy - Add support for OpenShift sbin labelin - Add boolean to allow virt to use rawip - Allow mozilla_plugin to read all file systems with noxattrs support - Allow kerberos to write on anon_inodefs fs - Additional access required by fenced - Add filename transitions for passwd.lock/group.lock - UPdate man pages - Create coolkey directory in /var/cache with the correct label- Fix label on /etc/group.lock - Allow gnomeclock to create lnk_file in /etc - label /root/.pki as a home_cert_t - Add interface to make sure rpcbind.sock is created with the correct label - Add definition for new directory /var/lib/os-probe and bootloader wants to read udev rules - opendkim should be a part of milter - Allow libvirt to set the kernel sched algorythm - Allow mongod to read sysfs_t - Add authconfig policy - Remove calls to miscfiles_read_localization all domains get this - Allow virsh_t to read /root/.pki/ content - Add label for log directory under /var/www/stickshift- Allow getty to setattr on usb ttys - Allow sshd to search all directories for sshd_home_t content - Allow staff domains to send dbus messages to kdumpgui - Fix labels on /etc/.pwd.lock and friends to be passwd_file_t - Dontaudit setfiles reading urand - Add files_dontaudit_list_tmp() for domains to which we added sys_nice/setsched - Allow staff_gkeyringd_t to read /home/$USER/.local/share/keyrings dir - Allow systemd-timedated to read /dev/urandom - Allow entropyd_t to read proc_t (meminfo) - Add unconfined munin plugin - Fix networkmanager_read_conf() interface - Allow blueman to list /tmp which is needed by sys_nic/setsched - Fix label of /etc/mail/aliasesdb-stamp - numad is searching cgroups - realmd is communicating with networkmanager using dbus - Lots of fixes to try to get kdump to work- Allow loging programs to dbus chat with realmd - Make apache_content_template calling as optional - realmd is using policy kit- Add new selinuxuser_use_ssh_chroot boolean - dbus needs to be able to read/write inherited fixed disk device_t passed through it - Cleanup netutils process allow rule - Dontaudit leaked fifo files from openshift to ping - sanlock needs to read mnt_t lnk files - Fail2ban needs to setsched and sys_nice- Change default label of all files in /var/run/rpcbind - Allow sandbox domains (java) to read hugetlbfs_t - Allow awstats cgi content to create tmp files and read apache log files - Allow setuid/setgid for cupsd-config - Allow setsched/sys_nice pro cupsd-config - Fix /etc/localtime sym link to be labeled locale_t - Allow sshd to search postgresql db t since this is a homedir - Allow xwindows users to chat with realmd - Allow unconfined domains to configure all files and null_device_t service- Adopt pki-selinux policy- pki is leaking which we dontaudit until a pki code fix - Allow setcap for arping - Update man pages - Add labeling for /usr/sbin/mcollectived - pki fixes - Allow smokeping to execute fping in the netutils_t domain- Allow mount to relabelfrom unlabeled file systems - systemd_logind wants to send and receive messages from devicekit disk over dbus to make connected mouse working - Add label to get bin files under libreoffice labeled correctly - Fix interface to allow executing of base_ro_file_type - Add fixes for realmd - Update pki policy - Add tftp_homedir boolean - Allow blueman sched_setscheduler - openshift user domains wants to r/w ssh tcp sockets- Additional requirements for disable unconfined module when booting - Fix label of systemd script files - semanage can use -F /dev/stdin to get input - syslog now uses kerberos keytabs - Allow xserver to compromise_kernel access - Allow nfsd to write to mount_var_run_t when running the mount command - Add filename transition rule for bin_t directories - Allow files to read usr_t lnk_files - dhcpc wants chown - Add support for new openshift labeling - Clean up for tunable+optional statements - Add labeling for /usr/sbin/mkhomedir_helper - Allow antivirus domain to managa amavis spool files - Allow rpcbind_t to read passwd - Allow pyzor running as spamc to manage amavis spool- Add interfaces to read kernel_t proc info - Missed this version of exec_all - Allow anyone who can load a kernel module to compromise kernel - Add oddjob_dbus_chat to openshift apache policy - Allow chrome_sandbox_nacl_t to send signals to itself - Add unit file support to usbmuxd_t - Allow all openshift domains to read sysfs info - Allow openshift domains to getattr on all domains- MLS fixes from Dan - Fix name of capability2 secure_firmware->compromise_kerne- Allow xdm to search all file systems - Add interface to allow the config of all files - Add rngd policy - Remove kgpg as a gpg_exec_t type - Allow plymouthd to block suspend - Allow systemd_dbus to config any file - Allow system_dbus_t to configure all services - Allow freshclam_t to read usr_files - varnishd requires execmem to load modules- Allow semanage to verify types - Allow sudo domain to execute user home files - Allow session_bus_type to transition to user_tmpfs_t - Add dontaudit caused by yum updates - Implement pki policy but not activated- tuned wants to getattr on all filesystems - tuned needs also setsched. The build is needed for test day- Add policy for qemu-qa - Allow razor to write own config files - Add an initial antivirus policy to collect all antivirus program - Allow qdisk to read usr_t - Add additional caps for vmware_host - Allow tmpfiles_t to setattr on mandb_cache_t - Dontaudit leaked files into mozilla_plugin_config_t - Allow wdmd to getattr on tmpfs - Allow realmd to use /dev/random - allow containers to send audit messages - Allow root mount any file via loop device with enforcing mls policy - Allow tmpfiles_t to setattr on mandb_cache_t - Allow tmpfiles_t to setattr on mandb_cache_t - Make userdom_dontaudit_write_all_ not allow open - Allow init scripts to read all unit files - Add support for saphostctrl ports- Add kernel_read_system_state to sandbox_client_t - Add some of the missing access to kdumpgui - Allow systemd_dbusd_t to status the init system - Allow vmnet-natd to request the kernel to load a module - Allow gsf-office-thum to append .cache/gdm/session.log - realmd wants to read .config/dconf/user - Firewalld wants sys_nice/setsched - Allow tmpreaper to delete mandb cache files - Firewalld wants sys_nice/setsched - Allow firewalld to perform a DNS name resolution - Allown winbind to read /usr/share/samba/codepages/lowcase.dat - Add support for HTTPProxy* in /etc/freshclam.conf - Fix authlogin_yubike boolean - Extend smbd_selinux man page to include samba booleans - Allow dhcpc to execute consoletype - Allow ping to use inherited tmp files created in init scripts - On full relabel with unconfined domain disabled, initrc was running some chcon's - Allow people who delete man pages to delete mandb cache files- Add missing permissive domains- Add new mandb policy - ALlow systemd-tmpfiles_t to relabel mandb_cache_t - Allow logrotate to start all unit files- Add fixes for ctbd - Allow nmbd to stream connect to ctbd - Make cglear_t as nsswitch_domain - Fix bogus in interfaces - Allow openshift to read/write postfix public pipe - Add postfix_manage_spool_maildrop_files() interface - stickshift paths have been renamed to openshift - gnome-settings-daemon wants to write to /run/systemd/inhibit/ pipes - Update man pages, adding ENTRYPOINTS- Add mei_device_t - Make sure gpg content in homedir created with correct label - Allow dmesg to write to abrt cache files - automount wants to search virtual memory sysctls - Add support for hplip logs stored in /var/log/hp/tmp - Add labeling for /etc/owncloud/config.php - Allow setroubleshoot to send analysys to syslogd-journal - Allow virsh_t to interact with new fenced daemon - Allow gpg to write to /etc/mail/spamassassiin directories - Make dovecot_deliver_t a mail server delivery type - Add label for /var/tmp/DNS25- Fixes for tomcat_domain template interface- Remove init_systemd and init_upstart boolean, Move init_daemon_domain and init_system_domain to use attributes - Add attribute to all base os types. Allow all domains to read all ro base OS types- Additional unit files to be defined as power unit files - Fix more boolean names- Fix boolean name so subs will continue to work- dbus needs to start getty unit files - Add interface to allow system_dbusd_t to start the poweroff service - xdm wants to exec telepathy apps - Allow users to send messages to systemdlogind - Additional rules needed for systemd and other boot apps - systemd wants to list /home and /boot - Allow gkeyringd to write dbus/conf file - realmd needs to read /dev/urand - Allow readahead to delete /.readahead if labeled root_t, might get created before policy is loaded- Fixes to safe more rules - Re-write tomcat_domain_template() - Fix passenger labeling - Allow all domains to read man pages - Add ephemeral_port_t to the 'generic' port interfaces - Fix the names of postgresql booleans- Stop using attributes form netlabel_peer and syslog, auth_use_nsswitch setsup netlabel_peer - Move netlable_peer check out of booleans - Remove call to recvfrom_netlabel for kerberos call - Remove use of attributes when calling syslog call - Move -miscfiles_read_localization to domain.te to save hundreds of allow rules - Allow all domains to read locale files. This eliminates around 1500 allow rules- Cleanup nis_use_ypbind_uncond interface - Allow rndc to block suspend - tuned needs to modify the schedule of the kernel - Allow svirt_t domains to read alsa configuration files - ighten security on irc domains and make sure they label content in homedir correctly - Add filetrans_home_content for irc files - Dontaudit all getattr access for devices and filesystems for sandbox domains - Allow stapserver to search cgroups directories - Allow all postfix domains to talk to spamd- Add interfaces to ignore setattr until kernel fixes this to be checked after the DAC check - Change pam_t to pam_timestamp_t - Add dovecot_domain attribute and allow this attribute block_suspend capability2 - Add sanlock_use_fusefs boolean - numad wants send/recieve msg - Allow rhnsd to send syslog msgs - Make piranha-pulse as initrc domain - Update openshift instances to dontaudit setattr until the kernel is fixed.- Fix auth_login_pgm_domain() interface to allow domains also managed user tmp dirs because of #856880 related to pam_systemd - Remove pam_selinux.8 which conflicts with man page owned by the pam package - Allow glance-api to talk to mysql - ABRT wants to read Xorg.0.log if if it detects problem with Xorg - Fix gstreamer filename trans. interface- Man page fixes by Dan Walsh- Allow postalias to read postfix config files - Allow man2html to read man pages - Allow rhev-agentd to search all mountpoints - Allow rhsmcertd to read /dev/random - Add tgtd_stream_connect() interface - Add cyrus_write_data() interface - Dontaudit attempts by sandboxX clients connectiing to the xserver_port_t - Add port definition for tcp/81 as http_port_t - Fix /dev/twa labeling - Allow systemd to read modules config- Merge openshift policy - Allow xauth to read /dev/urandom - systemd needs to relabel content in /run/systemd directories - Files unconfined should be able to perform all services on all files - Puppet tmp file can be leaked to all domains - Dontaudit rhsmcertd-worker to search /root/.local - Allow chown capability for zarafa domains - Allow system cronjobs to runcon into openshift domains - Allow virt_bridgehelper_t to manage content in the svirt_home_t labeled directories- nmbd wants to create /var/nmbd - Stop transitioning out of anaconda and firstboot, just causes AVC messages - Allow clamscan to read /etc files - Allow bcfg2 to bind cyphesis port - heartbeat should be run as rgmanager_t instead of corosync_t - Add labeling for /etc/openldap/certs - Add labeling for /opt/sartest directory - Make crontab_t as userdom home reader - Allow tmpreaper to list admin_home dir - Add defition for imap_0 replay cache file - Add support for gitolite3 - Allow virsh_t to send syslog messages - allow domains that can read samba content to be able to list the directories also - Add realmd_dbus_chat to allow all apps that use nsswitch to talk to realmd - Separate out sandbox from sandboxX policy so we can disable it by default - Run dmeventd as lvm_t - Mounting on any directory requires setattr and write permissions - Fix use_nfs_home_dirs() boolean - New labels for pam_krb5 - Allow init and initrc domains to sys_ptrace since this is needed to look at processes not owned by uid 0 - Add realmd_dbus_chat to allow all apps that use nsswitch to talk to realmd- Separate sandbox policy into sandbox and sandboxX, and disable sandbox by default on fresh installs - Allow domains that can read etc_t to read etc_runtime_t - Allow all domains to use inherited tmpfiles- Allow realmd to read resolv.conf - Add pegasus_cache_t type - Label /usr/sbin/fence_virtd as virsh_exec_t - Add policy for pkcsslotd - Add support for cpglockd - Allow polkit-agent-helper to read system-auth-ac - telepathy-idle wants to read gschemas.compiled - Allow plymouthd to getattr on fs_t - Add slpd policy - Allow ksysguardproces to read/write config_usr_t- Fix labeling substitution so rpm will label /lib/systemd content correctly- Add file name transitions for ttyACM0 - spice-vdagent(d)'s are going to log over to syslog - Add sensord policy - Add more fixes for passenger policy related to puppet - Allow wdmd to create wdmd_tmpfs_t - Fix labeling for /var/run/cachefilesd\.pid - Add thumb_tmpfs_t files type- Allow svirt domains to manage the network since this is containerized - Allow svirt_lxc_net_t to send audit messages- Make "snmpwalk -mREDHAT-CLUSTER-MIB ...." working - Allow dlm_controld to execute dlm_stonith labeled as bin_t - Allow GFS2 working on F17 - Abrt needs to execute dmesg - Allow jockey to list the contents of modeprobe.d - Add policy for lightsquid as squid_cron_t - Mailscanner is creating files and directories in /tmp - dmesg is now reading /dev/kmsg - Allow xserver to communicate with secure_firmware - Allow fsadm tools (fsck) to read /run/mount contnet - Allow sysadm types to read /dev/kmsg -- Allow postfix, sssd, rpcd to block_suspend - udev seems to need secure_firmware capability - Allow virtd to send dbus messages to firewalld so it can configure the firewall- Fix labeling of content in /run created by virsh_t - Allow condor domains to read kernel sysctls - Allow condor_master to connect to amqp - Allow thumb drives to create shared memory and semaphores - Allow abrt to read mozilla_plugin config files - Add labels for lightsquid - Default files in /opt and /usr that end in .cgi as httpd_sys_script_t, allow - dovecot_auth_t uses ldap for user auth - Allow domains that can read dhcp_etc_t to read lnk_files - Add more then one watchdog device - Allow useradd_t to manage etc_t files so it can rename it and edit them - Fix invalid class dir should be fifo_file - Move /run/blkid to fsadm and make sure labeling is correct- Fix bogus regex found by eparis - Fix manage run interface since lvm needs more access - syslogd is searching cgroups directory - Fixes to allow virt-sandbox-service to manage lxc var run content- Fix Boolean settings - Add new libjavascriptcoregtk as textrel_shlib_t - Allow xdm_t to create xdm_home_t directories - Additional access required for systemd - Dontaudit mozilla_plugin attempts to ipc_lock - Allow tmpreaper to delete unlabeled files - Eliminate screen_tmp_t and allow it to manage user_tmp_t - Dontaudit mozilla_plugin_config_t to append to leaked file descriptors - Allow web plugins to connect to the asterisk ports - Condor will recreate the lock directory if it does not exist - Oddjob mkhomedir needs to connectto user processes - Make oddjob_mkhomedir_t a userdom home manager- Put placeholder back in place for proper numbering of capabilities - Systemd also configures init scripts- Fix ecryptfs interfaces - Bootloader seems to be trolling around /dev/shm and /dev - init wants to create /etc/systemd/system-update.target.wants - Fix systemd_filetrans call to move it out of tunable - Fix up policy to work with systemd userspace manager - Add secure_firmware capability and remove bogus epolwakeup - Call seutil_*_login_config interfaces where should be needed - Allow rhsmcertd to send signal to itself - Allow thin domains to send signal to itself - Allow Chrome_ChildIO to read dosfs_t- Add role rules for realmd, sambagui- Add new type selinux_login_config_t for /etc/selinux//logins/ - Additional fixes for seutil_manage_module_store() - dbus_system_domain() should be used with optional_policy - Fix svirt to be allowed to use fusefs file system - Allow login programs to read /run/ data created by systemd_login - sssd wants to write /etc/selinux//logins/ for SELinux PAM module - Fix svirt to be allowed to use fusefs file system - Allow piranha domain to use nsswitch - Sanlock needs to send Kill Signals to non root processes - Pulseaudio wants to execute /run/user/PID/.orc- Fix saslauthd when it tries to read /etc/shadow - Label gnome-boxes as a virt homedir - Need to allow svirt_t ability to getattr on nfs_t file systems - Update sanlock policy to solve all AVC's - Change confined users can optionally manage virt content - Handle new directories under ~/.cache - Add block suspend to appropriate domains - More rules required for containers - Allow login programs to read /run/ data created by systemd_logind - Allow staff users to run svirt_t processes- Update to upstream- More fixes for systemd to make rawhide booting from Dan Walsh- Add systemd fixes to make rawhide booting- Add systemd_logind_inhibit_var_run_t attribute - Remove corenet_all_recvfrom_unlabeled() for non-contrib policies because we moved it to domain.if for all domain_type - Add interface for mysqld to dontaudit signull to all processes - Label new /var/run/journal directory correctly - Allow users to inhibit suspend via systemd - Add new type for the /var/run/inhibit directory - Add interface to send signull to systemd_login so avahi can send them - Allow systemd_passwd to send syslog messages - Remove corenet_all_recvfrom_unlabeled() calling fro policy files - Allow editparams.cgi running as httpd_bugzilla_script_t to read /etc/group - Allow smbd to read cluster config - Add additional labeling for passenger - Allow dbus to inhibit suspend via systemd - Allow avahi to send signull to systemd_login- Add interface to dontaudit getattr access on sysctls - Allow sshd to execute /bin/login - Looks like xdm is recreating the xdm directory in ~/.cache/ on login - Allow syslog to use the leaked kernel_t unix_dgram_socket from system-jounald - Fix semanage to work with unconfined domain disabled on F18 - Dontaudit attempts by mozilla plugins to getattr on all kernel sysctls - Virt seems to be using lock files - Dovecot seems to be searching directories of every mountpoint - Allow jockey to read random/urandom, execute shell and install third-party drivers - Add aditional params to allow cachedfiles to manage its content - gpg agent needs to read /dev/random - The kernel hands an svirt domains /SYSxxxxx which is a tmpfs that httpd wants to read and write - Add a bunch of dontaudit rules to quiet svirt_lxc domains - Additional perms needed to run svirt_lxc domains - Allow cgclear to read cgconfig - Allow sys_ptrace capability for snmp - Allow freshclam to read /proc - Allow procmail to manage /home/user/Maildir content - Allow NM to execute wpa_cli - Allow amavis to read clamd system state - Regenerate man pages- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Add realmd and stapserver policies - Allow useradd to manage stap-server lib files - Tighten up capabilities for confined users - Label /etc/security/opasswd as shadow_t - Add label for /dev/ecryptfs - Allow condor_startd_t to start sshd with the ranged - Allow lpstat.cups to read fips_enabled file - Allow pyzor running as spamc_t to create /root/.pyzor directory - Add labelinf for amavisd-snmp init script - Add support for amavisd-snmp - Allow fprintd sigkill self - Allow xend (w/o libvirt) to start virtual machines - Allow aiccu to read /etc/passwd - Allow condor_startd to Make specified domain MCS trusted for setting any category set for the processes it executes - Add condor_startd_ranged_domtrans_to() interface - Add ssd_conf_t for /etc/sssd - accountsd needs to fchown some files/directories - Add ICACLient and zibrauserdata as mozilla_filetrans_home_content - SELinux reports afs_t needs dac_override to read /etc/mtab, even though everything works, adding dontaudit - Allow xend_t to read the /etc/passwd file- Until we figure out how to fix systemd issues, allow all apps that send syslog messages to send them to kernel_t - Add init_access_check() interface - Fix label on /usr/bin/pingus to not be labeled as ping_exec_t - Allow tcpdump to create a netlink_socket - Label newusers like useradd - Change xdm log files to be labeled xdm_log_t - Allow sshd_t with privsep to work in MLS - Allow freshclam to update databases thru HTTP proxy - Allow s-m-config to access check on systemd - Allow abrt to read public files by default - Fix amavis_create_pid_files() interface - Add labeling and filename transition for dbomatic.log - Allow system_dbusd_t to stream connect to bluetooth, and use its socket - Allow amavisd to execute fsav - Allow tuned to use sys_admin and sys_nice capabilities - Add php-fpm policy from Bryan - Add labeling for aeolus-configserver-thinwrapper - Allow thin domains to execute shell - Fix gnome_role_gkeyringd() interface description - Lot of interface fixes - Allow OpenMPI job running as condor_startd_ssh_t to manage condor lib files - Allow OpenMPI job to use kerberos - Make deltacloudd_t as nsswitch_domain - Allow xend_t to run lsscsi - Allow qemu-dm running as xend_t to create tun_socket - Add labeling for /opt/brother/Printers(.*/)?inf - Allow jockey-backend to read pyconfig-64.h labeled as usr_t - Fix clamscan_can_scan_system boolean - Allow lpr to connectto to /run/user/$USER/keyring-22uREb/pkcs11- initrc is calling exportfs which is not confined so it attempts to read nfsd_files - Fixes for passenger running within openshift. - Add labeling for all tomcat6 dirs - Add support for tomcat6 - Allow cobblerd to read /etc/passwd - Allow jockey to read sysfs and and execute binaries with bin_t - Allow thum to use user terminals - Allow cgclear to read cgconfig config files - Fix bcf2g.fc - Remove sysnet_dns_name_resolve() from policies where auth_use_nsswitch() is used for other domains - Allow dbomatic to execute ruby - abrt_watch_log should be abrt_domain - Allow mozilla_plugin to connect to gatekeeper port- add ptrace_child access to process - remove files_read_etc_files() calling from all policies which have auth_use_nsswith() - Allow boinc domains to manage boinc_lib_t lnk_files - Add support for boinc-client.service unit file - Add support for boinc.log - Allow mozilla_plugin execmod on mozilla home files if allow_ex - Allow dovecot_deliver_t to read dovecot_var_run_t - Allow ldconfig and insmod to manage kdumpctl tmp files - Move thin policy out from cloudform.pp and add a new thin poli - pacemaker needs to communicate with corosync streams - abrt is now started on demand by dbus - Allow certmonger to talk directly to Dogtag servers - Change labeling for /var/lib/cobbler/webui_sessions to httpd_c - Allow mozila_plugin to execute gstreamer home files - Allow useradd to delete all file types stored in the users hom - rhsmcertd reads the rpm database - Add support for lightdm- Add tomcat policy - Remove pyzor/razor policy - rhsmcertd reads the rpm database - Dontaudit thumb to setattr on xdm_tmp dir - Allow wicd to execute ldconfig in the networkmanager_t domain - Add /var/run/cherokee\.pid labeling - Allow mozilla_plugin to create mozilla_plugin_tmp_t lnk files too - Allow postfix-master to r/w pipes other postfix domains - Allow snort to create netlink_socket - Add kdumpctl policy - Allow firstboot to create tmp_t files/directories - /usr/bin/paster should not be labeled as piranha_exec_t - remove initrc_domain from tomcat - Allow ddclient to read /etc/passwd - Allow useradd to delete all file types stored in the users homedir - Allow ldconfig and insmod to manage kdumpctl tmp files - Firstboot should be just creating tmp_t dirs and xauth should be allowed to write to those - Transition xauth files within firstboot_tmp_t - Fix labeling of /run/media to match /media - Label all lxdm.log as xserver_log_t - Add port definition for mxi port - Allow local_login_t to execute tmux- apcupsd needs to read /etc/passwd - Sanlock allso sends sigkill - Allow glance_registry to connect to the mysqld port - Dontaudit mozilla_plugin trying to getattr on /dev/gpmctl - Allow firefox plugins/flash to connect to port 1234 - Allow mozilla plugins to delete user_tmp_t files - Add transition name rule for printers.conf.O - Allow virt_lxc_t to read urand - Allow systemd_loigind to list gstreamer_home_dirs - Fix labeling for /usr/bin - Fixes for cloudform services * support FIPS - Allow polipo to work as web caching - Allow chfn to execute tmux- Add support for ecryptfs * ecryptfs does not support xattr * we need labeling for HOMEDIR - Add policy for (u)mount.ecryptfs* - Fix labeling of kerbero host cache files, allow rpc.svcgssd to manage host cache - Allow dovecot to manage Maildir content, fix transitions to Maildir - Allow postfix_local to transition to dovecot_deliver - Dontaudit attempts to setattr on xdm_tmp_t, looks like bogus code - Cleanup interface definitions - Allow apmd to change with the logind daemon - Changes required for sanlock in rhel6 - Label /run/user/apache as httpd_tmp_t - Allow thumb to use lib_t as execmod if boolean turned on - Allow squid to create the squid directory in /var with the correct labe - Add a new policy for glusterd from Bryan Bickford (bbickfor@redhat.com) - Allow virtd to exec xend_exec_t without transition - Allow virtd_lxc_t to unmount all file systems- PolicyKit path has changed - Allow httpd connect to dirsrv socket - Allow tuned to write generic kernel sysctls - Dontaudit logwatch to gettr on /dev/dm-2 - Allow policykit-auth to manage kerberos files - Make condor_startd and rgmanager as initrc domain - Allow virsh to read /etc/passwd - Allow mount to mount on user_tmp_t for /run/user/dwalsh/gvfs - xdm now needs to execute xsession_exec_t - Need labels for /var/lib/gdm - Fix files_filetrans_named_content() interface - Add new attribute - initrc_domain - Allow systemd_logind_t to signal, signull, sigkill all processes - Add filetrans rules for etc_runtime files- Rename boolean names to remove allow_- Mass merge with upstream * new policy topology to include contrib policy modules * we have now two base policy patches- Fix description of authlogin_nsswitch_use_ldap - Fix transition rule for rhsmcertd_t needed for RHEL7 - Allow useradd to list nfs state data - Allow openvpn to manage its log file and directory - We want vdsm to transition to mount_t when executing mount command to make sure /etc/mtab remains labeled correctly - Allow thumb to use nvidia devices - Allow local_login to create user_tmp_t files for kerberos - Pulseaudio needs to read systemd_login /var/run content - virt should only transition named system_conf_t config files - Allow munin to execute its plugins - Allow nagios system plugin to read /etc/passwd - Allow plugin to connect to soundd port - Fix httpd_passwd to be able to ask passwords - Radius servers can use ldap for backing store - Seems to need to mount on /var/lib for xguest polyinstatiation to work. - Allow systemd_logind to list the contents of gnome keyring - VirtualGL need xdm to be able to manage content in /etc/opt/VirtualGL - Add policy for isns-utils- Add policy for subversion daemon - Allow boinc to read passwd - Allow pads to read kernel network state - Fix man2html interface for sepolgen-ifgen - Remove extra /usr/lib/systemd/system/smb - Remove all /lib/systemd and replace with /usr/lib/systemd - Add policy for man2html - Fix the label of kerberos_home_t to krb5_home_t - Allow mozilla plugins to use Citrix - Allow tuned to read /proc/sys/kernel/nmi_watchdog - Allow tune /sys options via systemd's tmpfiles.d "w" type- Dontaudit lpr_t to read/write leaked mozilla tmp files - Add file name transition for .grl-podcasts directory - Allow corosync to read user tmp files - Allow fenced to create snmp lib dirs/files - More fixes for sge policy - Allow mozilla_plugin_t to execute any application - Allow dbus to read/write any open file descriptors to any non security file on the system that it inherits to that it can pass them to another domain - Allow mongod to read system state information - Fix wrong type, we should dontaudit sys_admin for xdm_t not xserver_t - Allow polipo to manage polipo_cache dirs - Add jabbar_client port to mozilla_plugin_t - Cleanup procmail policy - system bus will pass around open file descriptors on files that do not have labels on them - Allow l2tpd_t to read system state - Allow tuned to run ls /dev - Allow sudo domains to read usr_t files - Add label to machine-id - Fix corecmd_read_bin_symlinks cut and paste error- Fix pulseaudio port definition - Add labeling for condor_starter - Allow chfn_t to creat user_tmp_files - Allow chfn_t to execute bin_t - Allow prelink_cron_system_t to getpw calls - Allow sudo domains to manage kerberos rcache files - Allow user_mail_domains to work with courie - Port definitions necessary for running jboss apps within openshift - Add support for openstack-nova-metadata-api - Add support for nova-console* - Add support for openstack-nova-xvpvncproxy - Fixes to make privsep+SELinux working if we try to use chage to change passwd - Fix auth_role() interface - Allow numad to read sysfs - Allow matahari-rpcd to execute shell - Add label for ~/.spicec - xdm is executing lspci as root which is requesting a sys_admin priv but seems to succeed without it - Devicekit_disk wants to read the logind sessions file when writing a cd - Add fixes for condor to make condor jobs working correctly - Change label of /var/log/rpmpkgs to cron_log_t - Access requires to allow systemd-tmpfiles --create to work. - Fix obex to be a user application started by the session bus. - Add additional filename trans rules for kerberos - Fix /var/run/heartbeat labeling - Allow apps that are managing rcache to file trans correctly - Allow openvpn to authenticate against ldap server - Containers need to listen to network starting and stopping events- Make systemd unit files less specific- Fix zarafa labeling - Allow guest_t to fix labeling - corenet_tcp_bind_all_unreserved_ports(ssh_t) should be called with the user_tcp_server boolean - add lxc_contexts - Allow accountsd to read /proc - Allow restorecond to getattr on all file sytems - tmpwatch now calls getpw - Allow apache daemon to transition to pwauth domain - Label content under /var/run/user/NAME/keyring* as gkeyringd_tmp_t - The obex socket seems to be a stream socket - dd label for /var/run/nologin- Allow jetty running as httpd_t to read hugetlbfs files - Allow sys_nice and setsched for rhsmcertd - Dontaudit attempts by mozilla_plugin_t to bind to ssdp ports - Allow setfiles to append to xdm_tmp_t - Add labeling for /export as a usr_t directory - Add labels for .grl files created by gstreamer- Add labeling for /usr/share/jetty/bin/jetty.sh - Add jetty policy which contains file type definitios - Allow jockey to use its own fifo_file and make this the default for all domains - Allow mozilla_plugins to use spice (vnc_port/couchdb) - asterisk wants to read the network state - Blueman now uses /var/lib/blueman- Add label for nodejs_debug - Allow mozilla_plugin_t to create ~/.pki directory and content- Add clamscan_can_scan_system boolean - Allow mysqld to read kernel network state - Allow sshd to read/write condor lib files - Allow sshd to read/write condor-startd tcp socket - Fix description on httpd_graceful_shutdown - Allow glance_registry to communicate with mysql - dbus_system_domain is using systemd to lauch applications - add interfaces to allow domains to send kill signals to user mail agents - Remove unnessary access for svirt_lxc domains, add privs for virtd_lxc_t - Lots of new access required for secure containers - Corosync needs sys_admin capability - ALlow colord to create shm - .orc should be allowed to be created by any app that can create gstream home content, thumb_t to be specific - Add boolean to control whether or not mozilla plugins can create random content in the users homedir - Add new interface to allow domains to list msyql_db directories, needed for libra - shutdown has to be allowed to delete etc_runtime_t - Fail2ban needs to read /etc/passwd - Allow ldconfig to create /var/cache/ldconfig - Allow tgtd to read hardware state information - Allow collectd to create packet socket - Allow chronyd to send signal to itself - Allow collectd to read /dev/random - Allow collectd to send signal to itself - firewalld needs to execute restorecon - Allow restorecon and other login domains to execute restorecon- Allow logrotate to getattr on systemd unit files - Add support for tor systemd unit file - Allow apmd to create /var/run/pm-utils with the correct label - Allow l2tpd to send sigkill to pppd - Allow pppd to stream connect to l2tpd - Add label for scripts in /etc/gdm/ - Allow systemd_logind_t to ignore mcs constraints on sigkill - Fix files_filetrans_system_conf_named_files() interface - Add labels for /usr/share/wordpress/wp-includes/*.php - Allow cobbler to get SELinux mode and booleans- Add unconfined_execmem_exec_t as an alias to bin_t - Allow fenced to read snmp var lib files, also allow it to read usr_t - ontaudit access checks on all executables from mozilla_plugin - Allow all user domains to setexec, so that sshd will work properly if it call setexec(NULL) while running withing a user mode - Allow systemd_tmpfiles_t to getattr all pipes and sockets - Allow glance-registry to send system log messages - semanage needs to manage mock lib files/dirs- Add policy for abrt-watch-log - Add definitions for jboss_messaging ports - Allow systemd_tmpfiles to manage printer devices - Allow oddjob to use nsswitch - Fix labeling of log files for postgresql - Allow mozilla_plugin_t to execmem and execstack by default - Allow firewalld to execute shell - Fix /etc/wicd content files to get created with the correct label - Allow mcelog to exec shell - Add ~/.orc as a gstreamer_home_t - /var/spool/postfix/lib64 should be labeled lib_t - mpreaper should be able to list all file system labeled directories - Add support for apache to use openstack - Add labeling for /etc/zipl.conf and zipl binary - Turn on allow_execstack and turn off telepathy transition for final release- More access required for virt_qmf_t - Additional assess required for systemd-logind to support multi-seat - Allow mozilla_plugin to setrlimit - Revert changes to fuse file system to stop deadlock- Allow condor domains to connect to ephemeral ports - More fixes for condor policy - Allow keystone to stream connect to mysqld - Allow mozilla_plugin_t to read generic USB device to support GPS devices - Allow thum to file name transition gstreamer home content - Allow thum to read all non security files - Allow glance_api_t to connect to ephemeral ports - Allow nagios plugins to read /dev/urandom - Allow syslogd to search postfix spool to support postfix chroot env - Fix labeling for /var/spool/postfix/dev - Allow wdmd chown - Label .esd_auth as pulseaudio_home_t - Have no idea why keyring tries to write to /run/user/dwalsh/dconf/user, but we can dontaudit for now- Add support for clamd+systemd - Allow fresclam to execute systemctl to handle clamd - Change labeling for /usr/sbin/rpc.ypasswd.env - Allow yppaswd_t to execute yppaswd_exec_t - Allow yppaswd_t to read /etc/passwd - Gnomekeyring socket has been moved to /run/user/USER/ - Allow samba-net to connect to ldap port - Allow signal for vhostmd - allow mozilla_plugin_t to read user_home_t socket - New access required for secure Linux Containers - zfs now supports xattrs - Allow quantum to execute sudo and list sysfs - Allow init to dbus chat with the firewalld - Allow zebra to read /etc/passwd- Allow svirt_t to create content in the users homedir under ~/.libvirt - Fix label on /var/lib/heartbeat - Allow systemd_logind_t to send kill signals to all processes started by a user - Fuse now supports Xattr Support- upowered needs to setsched on the kernel - Allow mpd_t to manage log files - Allow xdm_t to create /var/run/systemd/multi-session-x - Add rules for missedfont.log to be used by thumb.fc - Additional access required for virt_qmf_t - Allow dhclient to dbus chat with the firewalld - Add label for lvmetad - Allow systemd_logind_t to remove userdomain sock_files - Allow cups to execute usr_t files - Fix labeling on nvidia shared libraries - wdmd_t needs access to sssd and /etc/passwd - Add boolean to allow ftp servers to run in passive mode - Allow namepspace_init_t to relabelto/from a different user system_u from the user the namespace_init running with - Fix using httpd_use_fusefs - Allow chrome_sandbox_nacl to write inherited user tmp files as we allow it for chrome_sandbox- Rename rdate port to time port, and allow gnomeclock to connect to it - We no longer need to transition to ldconfig from rpm, rpm_script, or anaconda - /etc/auto.* should be labeled bin_t - Add httpd_use_fusefs boolean - Add fixes for heartbeat - Allow sshd_t to signal processes that it transitions to - Add condor policy - Allow svirt to create monitors in ~/.libvirt - Allow dovecot to domtrans sendmail to handle sieve scripts - Lot of fixes for cfengine- /var/run/postmaster.* labeling is no longer needed - Alllow drbdadmin to read /dev/urandom - l2tpd_t seems to use ptmx - group+ and passwd+ should be labeled as /etc/passwd - Zarafa-indexer is a socket- Ensure lastlog is labeled correctly - Allow accountsd to read /proc data about gdm - Add fixes for tuned - Add bcfg2 fixes which were discovered during RHEL6 testing - More fixes for gnome-keyring socket being moved - Run semanage as a unconfined domain, and allow initrc_t to create tmpfs_t sym links on shutdown - Fix description for files_dontaudit_read_security_files() interface- Add new policy and man page for bcfg2 - cgconfig needs to use getpw calls - Allow domains that communicate with the keyring to use cache_home_t instead of gkeyringd_tmpt - gnome-keyring wants to create a directory in cache_home_t - sanlock calls getpw- Add numad policy and numad man page - Add fixes for interface bugs discovered by SEWatch - Add /tmp support for squid - Add fix for #799102 * change default labeling for /var/run/slapd.* sockets - Make thumb_t as userdom_home_reader - label /var/lib/sss/mc same as pubconf, so getpw domains can read it - Allow smbspool running as cups_t to stream connect to nmbd - accounts needs to be able to execute passwd on behalf of users - Allow systemd_tmpfiles_t to delete boot flags - Allow dnssec_trigger to connect to apache ports - Allow gnome keyring to create sock_files in ~/.cache - google_authenticator is using .google_authenticator - sandbox running from within firefox is exposing more leaks - Dontaudit thumb to read/write /dev/card0 - Dontaudit getattr on init_exec_t for gnomeclock_t - Allow certmonger to do a transition to certmonger_unconfined_t - Allow dhcpc setsched which is caused by nmcli - Add rpm_exec_t for /usr/sbin/bcfg2 - system cronjobs are sending dbus messages to systemd_logind - Thumnailers read /dev/urand- Allow auditctl getcap - Allow vdagent to use libsystemd-login - Allow abrt-dump-oops to search /etc/abrt - Got these avc's while trying to print a boarding pass from firefox - Devicekit is now putting the media directory under /run/media - Allow thumbnailers to create content in ~/.thumbails directory - Add support for proL2TPd by Dominick Grift - Allow all domains to call getcap - wdmd seems to get a random chown capability check that it does not need - Allow vhostmd to read kernel sysctls- Allow chronyd to read unix - Allow hpfax to read /etc/passwd - Add support matahari vios-proxy-* apps and add virtd_exec_t label for them - Allow rpcd to read quota_db_t - Update to man pages to match latest policy - Fix bug in jockey interface for sepolgen-ifgen - Add initial svirt_prot_exec_t policy- More fixes for systemd from Dan Walsh- Add a new type for /etc/firewalld and allow firewalld to write to this directory - Add definition for ~/Maildir, and allow mail deliver domains to write there - Allow polipo to run from a cron job - Allow rtkit to schedule wine processes - Allow mozilla_plugin_t to acquire a bug, and allow it to transition gnome content in the home dir to the proper label - Allow users domains to send signals to consolehelper domains- More fixes for boinc policy - Allow polipo domain to create its own cache dir and pid file - Add systemctl support to httpd domain - Add systemctl support to polipo, allow NetworkManager to manage the service - Add policy for jockey-backend - Add support for motion daemon which is now covered by zoneminder policy - Allow colord to read/write motion tmpfs - Allow vnstat to search through var_lib_t directories - Stop transitioning to quota_t, from init an sysadm_t- Add svirt_lxc_file_t as a customizable type- Add additional fixes for icmp nagios plugin - Allow cron jobs to open fifo_files from cron, since service script opens /dev/stdin - Add certmonger_unconfined_exec_t - Make sure tap22 device is created with the correct label - Allow staff users to read systemd unit files - Merge in previously built policy - Arpwatch needs to be able to start netlink sockets in order to start - Allow cgred_t to sys_ptrace to look at other DAC Processes- Back port some of the access that was allowed in nsplugin_t - Add definitiona for couchdb ports - Allow nagios to use inherited users ttys - Add git support for mock - Allow inetd to use rdate port - Add own type for rdate port - Allow samba to act as a portmapper - Dontaudit chrome_sandbox attempts to getattr on chr_files in /dev - New fixes needed for samba4 - Allow apps that use lib_t to read lib_t symlinks- Add policy for nove-cert - Add labeling for nova-openstack systemd unit files - Add policy for keystoke- Fix man pages fro domains - Add man pages for SELinux users and roles - Add storage_dev_filetrans_named_fixed_disk() and use it for smartmon - Add policy for matahari-rpcd - nfsd executes mount command on restart - Matahari domains execute renice and setsched - Dontaudit leaked tty in mozilla_plugin_config - mailman is changing to a per instance naming - Add 7600 and 4447 as jboss_management ports - Add fixes for nagios event handlers - Label httpd.event as httpd_exec_t, it is an apache daemon- Add labeling for /var/spool/postfix/dev/log - NM reads sysctl.conf - Iscsi log file context specification fix - Allow mozilla plugins to send dbus messages to user domains that transition to it - Allow mysql to read the passwd file - Allow mozilla_plugin_t to create mozilla home dirs in user homedir - Allow deltacloud to read kernel sysctl - Allow postgresql_t to connectto itselfAllow postgresql_t to connectto itself - Allow postgresql_t to connectto itself - Add login_userdomain attribute for users which can log in using terminal- Allow sysadm_u to reach system_r by default #784011 - Allow nagios plugins to use inherited user terminals - Razor labeling is not used no longer - Add systemd support for matahari - Add port_types to man page, move booleans to the top, fix some english - Add support for matahari-sysconfig-console - Clean up matahari.fc - Fix matahari_admin() interfac - Add labels for/etc/ssh/ssh_host_*.pub keys- Allow ksysguardproces to send system log msgs - Allow boinc setpgid and signull - Allow xdm_t to sys_ptrace to run pidof command - Allow smtpd_t to manage spool files/directories and symbolic links - Add labeling for jetty - Needed changes to get unbound/dnssec to work with openswan- Add user_fonts_t alias xfs_tmp_t - Since depmod now runs as insmod_t we need to write to kernel_object_t - Allow firewalld to dbus chat with networkmanager - Allow qpidd to connect to matahari ports - policykit needs to read /proc for uses not owned by it - Allow systemctl apps to connecto the init stream- Turn on deny_ptrace boolean- Remove pam_selinux.8 man page. There was a conflict.- Add proxy class and read access for gssd_proxy - Separate out the sharing public content booleans - Allow certmonger to execute a script and send signals to apache and dirsrv to reload the certificate - Add label transition for gstream-0.10 and 12 - Add booleans to allow rsync to share nfs and cifs file sytems - chrome_sandbox wants to read the /proc/PID/exe file of the program that executed it - Fix filename transitions for cups files - Allow denyhosts to read "unix" - Add file name transition for locale.conf.new - Allow boinc projects to gconf config files - sssd needs to be able to increase the socket limit under certain loads - sge_execd needs to read /etc/passwd - Allow denyhost to check network state - NetworkManager needs to read sessions data - Allow denyhost to check network state - Allow xen to search virt images directories - Add label for /dev/megaraid_sas_ioctl_node - Add autogenerated man pages- Allow boinc project to getattr on fs - Allow init to execute initrc_state_t - rhev-agent package was rename to ovirt-guest-agent - If initrc_t creates /etc/local.conf then we need to make sure it is labeled correctly - sytemd writes content to /run/initramfs and executes it on shutdown - kdump_t needs to read /etc/mtab, should be back ported to F16 - udev needs to load kernel modules in early system boot- Need to add sys_ptrace back in since reading any content in /proc can cause these accesses - Add additional systemd interfaces which are needed fro *_admin interfaces - Fix bind_admin() interface- Allow firewalld to read urand - Alias java, execmem_mono to bin_t to allow third parties - Add label for kmod - /etc/redhat-lsb contains binaries - Add boolean to allow gitosis to send mail - Add filename transition also for "event20" - Allow systemd_tmpfiles_t to delete all file types - Allow collectd to ipc_lock- make consoletype_exec optional, so we can remove consoletype policy - remove unconfined_permisive.patch - Allow openvpn_t to inherit user home content and tmp content - Fix dnssec-trigger labeling - Turn on obex policy for staff_t - Pem files should not be secret - Add lots of rules to fix AVC's when playing with containers - Fix policy for dnssec - Label ask-passwd directories correctly for systemd- sshd fixes seem to be causing unconfined domains to dyntrans to themselves - fuse file system is now being mounted in /run/user - systemd_logind is sending signals to processes that are dbus messaging with it - Add support for winshadow port and allow iscsid to connect to this port - httpd should be allowed to bind to the http_port_t udp socket - zarafa_var_lib_t can be a lnk_file - A couple of new .xsession-errors files - Seems like user space and login programs need to read logind_sessions_files - Devicekit disk seems to be being launched by systemd - Cleanup handling of setfiles so most of rules in te file - Correct port number for dnssec - logcheck has the home dir set to its cache- Add policy for grindengine MPI jobs- Add new sysadm_secadm.pp module * contains secadm definition for sysadm_t - Move user_mail_domain access out of the interface into the te file - Allow httpd_t to create httpd_var_lib_t directories as well as files - Allow snmpd to connect to the ricci_modcluster stream - Allow firewalld to read /etc/passwd - Add auth_use_nsswitch for colord - Allow smartd to read network state - smartdnotify needs to read /etc/group- Allow gpg and gpg_agent to store sock_file in gpg_secret_t directory - lxdm startup scripts should be labeled bin_t, so confined users will work - mcstransd now creates a pid, needs back port to F16 - qpidd should be allowed to connect to the amqp port - Label devices 010-029 as usb devices - ypserv packager says ypserv does not use tmp_t so removing selinux policy types - Remove all ptrace commands that I believe are caused by the kernel/ps avcs - Add initial Obex policy - Add logging_syslogd_use_tty boolean - Add polipo_connect_all_unreserved bolean - Allow zabbix to connect to ftp port - Allow systemd-logind to be able to switch VTs - Allow apache to communicate with memcached through a sock_file- Fix file_context.subs_dist for now to work with pre usrmove- More /usr move fixes- Add zabbix_can_network boolean - Add httpd_can_connect_zabbix boolean - Prepare file context labeling for usrmove functions - Allow system cronjobs to read kernel network state - Add support for selinux_avcstat munin plugin - Treat hearbeat with corosync policy - Allow corosync to read and write to qpidd shared mem - mozilla_plugin is trying to run pulseaudio - Fixes for new sshd patch for running priv sep domains as the users context - Turn off dontaudit rules when turning on allow_ypbind - udev now reads /etc/modules.d directory- Turn on deny_ptrace boolean for the Rawhide run, so we can test this out - Cups exchanges dbus messages with init - udisk2 needs to send syslog messages - certwatch needs to read /etc/passwd- Add labeling for udisks2 - Allow fsadmin to communicate with the systemd process- Treat Bip with bitlbee policy * Bip is an IRC proxy - Add port definition for interwise port - Add support for ipa_memcached socket - systemd_jounald needs to getattr on all processes - mdadmin fixes * uses getpw - amavisd calls getpwnam() - denyhosts calls getpwall()- Setup labeling of /var/rsa and /var/lib/rsa to allow login programs to write there - bluetooth says they do not use /tmp and want to remove the type - Allow init to transition to colord - Mongod needs to read /proc/sys/vm/zone_reclaim_mode - Allow postfix_smtpd_t to connect to spamd - Add boolean to allow ftp to connect to all ports > 1023 - Allow sendmain to write to inherited dovecot tmp files - setroubleshoot needs to be able to execute rpm to see what version of packages- Merge systemd patch - systemd-tmpfiles wants to relabel /sys/devices/system/cpu/online - Allow deltacloudd dac_override, setuid, setgid caps - Allow aisexec to execute shell - Add use_nfs_home_dirs boolean for ssh-keygen- Fixes to make rawhide boot in enforcing mode with latest systemd changes- Add labeling for /var/run/systemd/journal/syslog - libvirt sends signals to ifconfig - Allow domains that read logind session files to list them- Fixed destined form libvirt-sandbox - Allow apps that list sysfs to also read sympolicy links in this filesystem - Add ubac_constrained rules for chrome_sandbox - Need interface to allow domains to use tmpfs_t files created by the kernel, used by libra - Allow postgresql to be executed by the caller - Standardize interfaces of daemons - Add new labeling for mm-handler - Allow all matahari domains to read network state and etc_runtime_t files- New fix for seunshare, requires seunshare_domains to be able to mounton / - Allow systemctl running as logrotate_t to connect to private systemd socket - Allow tmpwatch to read meminfo - Allow rpc.svcgssd to read supported_krb5_enctype - Allow zarafa domains to read /dev/random and /dev/urandom - Allow snmpd to read dev_snmp6 - Allow procmail to talk with cyrus - Add fixes for check_disk and check_nagios plugins- default trans rules for Rawhide policy - Make sure sound_devices controlC* are labeled correctly on creation - sssd now needs sys_admin - Allow snmp to read all proc_type - Allow to setup users homedir with quota.group- Add httpd_can_connect_ldap() interface - apcupsd_t needs to use seriel ports connected to usb devices - Kde puts procmail mail directory under ~/.local/share - nfsd_t can trigger sys_rawio on tests that involve too many mountpoints, dontaudit for now - Add labeling for /sbin/iscsiuio- Add label for /var/lib/iscan/interpreter - Dont audit writes to leaked file descriptors or redirected output for nacl - NetworkManager needs to write to /sys/class/net/ib*/mode- Allow abrt to request the kernel to load a module - Make sure mozilla content is labeled correctly - Allow tgtd to read system state - More fixes for boinc * allow to resolve dns name * re-write boinc policy to use boinc_domain attribute - Allow munin services plugins to use NSCD services- Allow mozilla_plugin_t to manage mozilla_home_t - Allow ssh derived domain to execute ssh-keygen in the ssh_keygen_t domain - Add label for tumblerd- Fixes for xguest package- Fixes related to /bin, /sbin - Allow abrt to getattr on blk files - Add type for rhev-agent log file - Fix labeling for /dev/dmfm - Dontaudit wicd leaking - Allow systemd_logind_t to look at process info of apps that exchange dbus messages with it - Label /etc/locale.conf correctly - Allow user_mail_t to read /dev/random - Allow postfix-smtpd to read MIMEDefang - Add label for /var/log/suphp.log - Allow swat_t to connect and read/write nmbd_t sock_file - Allow systemd-tmpfiles to setattr for /run/user/gdm/dconf - Allow systemd-tmpfiles to change user identity in object contexts - More fixes for rhev_agentd_t consolehelper policy- Use fs_use_xattr for squashf - Fix procs_type interface - Dovecot has a new fifo_file /var/run/dovecot/stats-mail - Dovecot has a new fifo_file /var/run/stats-mail - Colord does not need to connect to network - Allow system_cronjob to dbus chat with NetworkManager - Puppet manages content, want to make sure it labels everything correctly- Change port 9050 to tor_socks_port_t and then allow openvpn to connect to it - Allow all postfix domains to use the fifo_file - Allow sshd_t to getattr on all file systems in order to generate avc on nfs_t - Allow apmd_t to read grub.cfg - Let firewallgui read the selinux config - Allow systemd-tmpfiles to delete content in /root that has been moved to /tmp - Fix devicekit_manage_pid_files() interface - Allow squid to check the network state - Dontaudit colord getattr on file systems - Allow ping domains to read zabbix_tmp_t files- Allow mcelog_t to create dir and file in /var/run and label it correctly - Allow dbus to manage fusefs - Mount needs to read process state when mounting gluster file systems - Allow collectd-web to read collectd lib files - Allow daemons and system processes started by init to read/write the unix_stream_socket passed in from as stdin/stdout/stderr - Allow colord to get the attributes of tmpfs filesystem - Add sanlock_use_nfs and sanlock_use_samba booleans - Add bin_t label for /usr/lib/virtualbox/VBoxManage- Add ssh_dontaudit_search_home_dir - Changes to allow namespace_init_t to work - Add interface to allow exec of mongod, add port definition for mongod port, 27017 - Label .kde/share/apps/networkmanagement/certificates/ as home_cert_t - Allow spamd and clamd to steam connect to each other - Add policy label for passwd.OLD - More fixes for postfix and postfix maildro - Add ftp support for mozilla plugins - Useradd now needs to manage policy since it calls libsemanage - Fix devicekit_manage_log_files() interface - Allow colord to execute ifconfig - Allow accountsd to read /sys - Allow mysqld-safe to execute shell - Allow openct to stream connect to pcscd - Add label for /var/run/nm-dns-dnsmasq\.conf - Allow networkmanager to chat with virtd_t- Pulseaudio changes - Merge patches- Merge patches back into git repository.- Remove allow_execmem boolean and replace with deny_execmem boolean- Turn back on allow_execmem boolean- Add more MCS fixes to make sandbox working - Make faillog MLS trusted to make sudo_$1_t working - Allow sandbox_web_client_t to read passwd_file_t - Add .mailrc file context - Remove execheap from openoffice domain - Allow chrome_sandbox_nacl_t to read cpu_info - Allow virtd to relabel generic usb which is need if USB device - Fixes for virt.if interfaces to consider chr_file as image file type- Remove Open Office policy - Remove execmem policy- MCS fixes - quota fixes- Remove transitions to consoletype- Make nvidia* to be labeled correctly - Fix abrt_manage_cache() interface - Make filetrans rules optional so base policy will build - Dontaudit chkpwd_t access to inherited TTYS - Make sure postfix content gets created with the correct label - Allow gnomeclock to read cgroup - Fixes for cloudform policy- Check in fixed for Chrome nacl support- Begin removing qemu_t domain, we really no longer need this domain. - systemd_passwd needs dac_overide to communicate with users TTY's - Allow svirt_lxc domains to send kill signals within their container- Remove qemu.pp again without causing a crash- Remove qemu.pp, everything should use svirt_t or stay in its current domain- Allow policykit to talk to the systemd via dbus - Move chrome_sandbox_nacl_t to permissive domains - Additional rules for chrome_sandbox_nacl- Change bootstrap name to nacl - Chrome still needs execmem - Missing role for chrome_sandbox_bootstrap - Add boolean to remove execmem and execstack from virtual machines - Dontaudit xdm_t doing an access_check on etc_t directories- Allow named to connect to dirsrv by default - add ldapmap1_0 as a krb5_host_rcache_t file - Google chrome developers asked me to add bootstrap policy for nacl stuff - Allow rhev_agentd_t to getattr on mountpoints - Postfix_smtpd_t needs access to milters and cleanup seems to read/write postfix_smtpd_t unix_stream_sockets- Fixes for cloudform policies which need to connect to random ports - Make sure if an admin creates modules content it creates them with the correct label - Add port 8953 as a dns port used by unbound - Fix file name transition for alsa and confined users- Turn on mock_t and thumb_t for unconfined domains- Policy update should not modify local contexts- Remove ada policy- Remove tzdata policy - Add labeling for udev - Add cloudform policy - Fixes for bootloader policy- Add policies for nova openstack- Add fixes for nova-stack policy- Allow svirt_lxc_domain to chr_file and blk_file devices if they are in the domain - Allow init process to setrlimit on itself - Take away transition rules for users executing ssh-keygen - Allow setroubleshoot_fixit_t to read /dev/urand - Allow sshd to relbale tunnel sockets - Allow fail2ban domtrans to shorewall in the same way as with iptables - Add support for lnk files in the /var/lib/sssd directory - Allow system mail to connect to courier-authdaemon over an unix stream socket- Add passwd_file_t for /etc/ptmptmp- Dontaudit access checks for all executables, gnome-shell is doing access(EXEC, X_OK) - Make corosync to be able to relabelto cluster lib fies - Allow samba domains to search /var/run/nmbd - Allow dirsrv to use pam - Allow thumb to call getuid - chrome less likely to get mmap_zero bug so removing dontaudit - gimp help-browser has built in javascript - Best guess is that devices named /dev/bsr4096 should be labeled as cpu_device_t - Re-write glance policy- Move dontaudit sys_ptrace line from permissive.te to domain.te - Remove policy for hal, it no longer exists- Don't check md5 size or mtime on certain config files- Remove allow_ptrace and replace it with deny_ptrace, which will remove all ptrace from the system - Remove 2000 dontaudit rules between confined domains on transition and replace with single dontaudit domain domain:process { noatsecure siginh rlimitinh } ;- Fixes for bootloader policy - $1_gkeyringd_t needs to read $HOME/%USER/.local/share/keystore - Allow nsplugin to read /usr/share/config - Allow sa-update to update rules - Add use_fusefs_home_dirs for chroot ssh option - Fixes for grub2 - Update systemd_exec_systemctl() interface - Allow gpg to read the mail spool - More fixes for sa-update running out of cron job - Allow ipsec_mgmt_t to read hardware state information - Allow pptp_t to connect to unreserved_port_t - Dontaudit getattr on initctl in /dev from chfn - Dontaudit getattr on kernel_core from chfn - Add systemd_list_unit_dirs to systemd_exec_systemctl call - Fixes for collectd policy - CHange sysadm_t to create content as user_tmp_t under /tmp- Shrink size of policy through use of attributes for userdomain and apache- Allow virsh to read xenstored pid file - Backport corenetwork fixes from upstream - Do not audit attempts by thumb to search config_home_t dirs (~/.config) - label ~/.cache/telepathy/logger telepathy_logger_cache_home_t - allow thumb to read generic data home files (mime.type)- Allow nmbd to manage sock file in /var/run/nmbd - ricci_modservice send syslog msgs - Stop transitioning from unconfined_t to ldconfig_t, but make sure /etc/ld.so.cache is labeled correctly - Allow systemd_logind_t to manage /run/USER/dconf/user- Fix missing patch from F16- Allow logrotate setuid and setgid since logrotate is supposed to do it - Fixes for thumb policy by grift - Add new nfsd ports - Added fix to allow confined apps to execmod on chrome - Add labeling for additional vdsm directories - Allow Exim and Dovecot SASL - Add label for /var/run/nmbd - Add fixes to make virsh and xen working together - Colord executes ls - /var/spool/cron is now labeled as user_cron_spool_t- Stop complaining about leaked file descriptors during install- Remove java and mono module and merge into execmem- Fixes for thumb policy and passwd_file_t- Fixes caused by the labeling of /etc/passwd - Add thumb.patch to transition unconfined_t to thumb_t for Rawhide- Add support for Clustered Samba commands - Allow ricci_modrpm_t to send log msgs - move permissive virt_qmf_t from virt.te to permissivedomains.te - Allow ssh_t to use kernel keyrings - Add policy for libvirt-qmf and more fixes for linux containers - Initial Polipo - Sanlock needs to run ranged in order to kill svirt processes - Allow smbcontrol to stream connect to ctdbd- Add label for /etc/passwd- Change unconfined_domains to permissive for Rawhide - Add definition for the ephemeral_ports- Make mta_role() active - Allow asterisk to connect to jabber client port - Allow procmail to read utmp - Add NIS support for systemd_logind_t - Allow systemd_logind_t to manage /run/user/$USER/dconf dir which is labeled as config_home_t - Fix systemd_manage_unit_dirs() interface - Allow ssh_t to manage directories passed into it - init needs to be able to create and delete unit file directories - Fix typo in apache_exec_sys_script - Add ability for logrotate to transition to awstat domain- Change screen to use screen_domain attribute and allow screen_domains to read all process domain state - Add SELinux support for ssh pre-auth net process in F17 - Add logging_syslogd_can_sendmail boolean- Add definition for ephemeral ports - Define user_tty_device_t as a customizable_type- Needs to require a new version of checkpolicy - Interface fixes- Allow sanlock to manage virt lib files - Add virt_use_sanlock booelan - ksmtuned is trying to resolve uids - Make sure .gvfs is labeled user_home_t in the users home directory - Sanlock sends kill signals and needs the kill capability - Allow mockbuild to work on nfs homedirs - Fix kerberos_manage_host_rcache() interface - Allow exim to read system state- Allow systemd-tmpfiles to set the correct labels on /var/run, /tmp and other files - We want any file type that is created in /tmp by a process running as initrc_t to be labeled initrc_tmp_t- Allow collectd to read hardware state information - Add loop_control_device_t - Allow mdadm to request kernel to load module - Allow domains that start other domains via systemctl to search unit dir - systemd_tmpfilses, needs to list any file systems mounted on /tmp - No one can explain why radius is listing the contents of /tmp, so we will dontaudit - If I can manage etc_runtime files, I should be able to read the links - Dontaudit hostname writing to mock library chr_files - Have gdm_t setup labeling correctly in users home dir - Label content unde /var/run/user/NAME/dconf as config_home_t - Allow sa-update to execute shell - Make ssh-keygen working with fips_enabled - Make mock work for staff_t user - Tighten security on mock_t- removing unconfined_notrans_t no longer necessary - Clean up handling of secure_mode_insmod and secure_mode_policyload - Remove unconfined_mount_t- Add exim_exec_t label for /usr/sbin/exim_tidydb - Call init_dontaudit_rw_stream_socket() interface in mta policy - sssd need to search /var/cache/krb5rcache directory - Allow corosync to relabel own tmp files - Allow zarafa domains to send system log messages - Allow ssh to do tunneling - Allow initrc scripts to sendto init_t unix_stream_socket - Changes to make sure dmsmasq and virt directories are labeled correctly - Changes needed to allow sysadm_t to manage systemd unit files - init is passing file descriptors to dbus and on to system daemons - Allow sulogin additional access Reported by dgrift and Jeremy Miller - Steve Grubb believes that wireshark does not need this access - Fix /var/run/initramfs to stop restorecon from looking at - pki needs another port - Add more labels for cluster scripts - Allow apps that manage cgroup_files to manage cgroup link files - Fix label on nfs-utils scripts directories - Allow gatherd to read /dev/rand and /dev/urand- pki needs another port - Add more labels for cluster scripts - Fix label on nfs-utils scripts directories - Fixes for cluster - Allow gatherd to read /dev/rand and /dev/urand - abrt leaks fifo files- Add glance policy - Allow mdadm setsched - /var/run/initramfs should not be relabeled with a restorecon run - memcache can be setup to override sys_resource - Allow httpd_t to read tetex data - Allow systemd_tmpfiles to delete kernel modules left in /tmp directory.- Allow Postfix to deliver to Dovecot LMTP socket - Ignore bogus sys_module for lldpad - Allow chrony and gpsd to send dgrams, gpsd needs to write to the real time clock - systemd_logind_t sets the attributes on usb devices - Allow hddtemp_t to read etc_t files - Add permissivedomains module - Move all permissive domains calls to permissivedomain.te - Allow pegasis to send kill signals to other UIDs- Allow insmod_t to use fds leaked from devicekit - dontaudit getattr between insmod_t and init_t unix_stream_sockets - Change sysctl unit file interfaces to use systemctl - Add support for chronyd unit file - Allow mozilla_plugin to read gnome_usr_config - Add policy for new gpsd - Allow cups to create kerberos rhost cache files - Add authlogin_filetrans_named_content, to unconfined_t to make sure shadow and other log files get labeled correctly- Make users_extra and seusers.final into config(noreplace) so semanage users and login does not get overwritten- Add policy for sa-update being run out of cron jobs - Add create perms to postgresql_manage_db - ntpd using a gps has to be able to read/write generic tty_device_t - If you disable unconfined and unconfineduser, rpm needs more privs to manage /dev - fix spec file - Remove qemu_domtrans_unconfined() interface - Make passenger working together with puppet - Add init_dontaudit_rw_stream_socket interface - Fixes for wordpress- Turn on allow_domain_fd_use boolean on F16 - Allow syslog to manage all log files - Add use_fusefs_home_dirs boolean for chrome - Make vdagent working with confined users - Add abrt_handle_event_t domain for ABRT event scripts - Labeled /usr/sbin/rhnreg_ks as rpm_exec_t and added changes related to this change - Allow httpd_git_script_t to read passwd data - Allow openvpn to set its process priority when the nice parameter is used- livecd fixes - spec file fixes- fetchmail can use kerberos - ksmtuned reads in shell programs - gnome_systemctl_t reads the process state of ntp - dnsmasq_t asks the kernel to load multiple kernel modules - Add rules for domains executing systemctl - Bogus text within fc file- Add cfengine policy- Add abrt_domain attribute - Allow corosync to manage cluster lib files - Allow corosync to connect to the system DBUS- Add sblim, uuidd policies - Allow kernel_t dyntrasition to init_t- init_t need setexec - More fixes of rules which cause an explosion in rules by Dan Walsh- Allow rcsmcertd to perform DNS name resolution - Add dirsrvadmin_unconfined_script_t domain type for 389-ds admin scripts - Allow tmux to run as screen - New policy for collectd - Allow gkeyring_t to interact with all user apps - Add rules to allow firstboot to run on machines with the unconfined.pp module removed- Allow systemd_logind to send dbus messages with users - allow accountsd to read wtmp file - Allow dhcpd to get and set capabilities- Fix oracledb_port definition - Allow mount to mounton the selinux file system - Allow users to list /var directories- systemd fixes- Add initial policy for abrt_dump_oops_t - xtables-multi wants to getattr of the proc fs - Smoltclient is connecting to abrt - Dontaudit leaked file descriptors to postdrop - Allow abrt_dump_oops to look at kernel sysctls - Abrt_dump_oops_t reads kernel ring buffer - Allow mysqld to request the kernel to load modules - systemd-login needs fowner - Allow postfix_cleanup_t to searh maildrop- Initial systemd_logind policy - Add policy for systemd_logger and additional proivs for systemd_logind - More fixes for systemd policies- Allow setsched for virsh - Systemd needs to impersonate cups, which means it needs to create tcp_sockets in cups_t domain, as well as manage spool directories - iptables: the various /sbin/ip6?tables.* are now symlinks for /sbin/xtables-multi- A lot of users are running yum -y update while in /root which is causing ldconfig to list the contents, adding dontaudit - Allow colord to interact with the users through the tmpfs file system - Since we changed the label on deferred, we need to allow postfix_qmgr_t to be able to create maildrop_t files - Add label for /var/log/mcelog - Allow asterisk to read /dev/random if it uses TLS - Allow colord to read ini files which are labeled as bin_t - Allow dirsrvadmin sys_resource and setrlimit to use ulimit - Systemd needs to be able to create sock_files for every label in /var/run directory, cupsd being the first. - Also lists /var and /var/spool directories - Add openl2tpd to l2tpd policy - qpidd is reading the sysfs file- Change usbmuxd_t to dontaudit attempts to read chr_file - Add mysld_safe_exec_t for libra domains to be able to start private mysql domains - Allow pppd to search /var/lock dir - Add rhsmcertd policy- Update to upstream- More fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git- Fix spec file to not report Verify errors- Add dspam policy - Add lldpad policy - dovecot auth wants to search statfs #713555 - Allow systemd passwd apps to read init fifo_file - Allow prelink to use inherited terminals - Run cherokee in the httpd_t domain - Allow mcs constraints on node connections - Implement pyicqt policy - Fixes for zarafa policy - Allow cobblerd to send syslog messages- Add policy.26 to the payload - Remove olpc stuff - Remove policygentool- Fixes for zabbix - init script needs to be able to manage sanlock_var_run_... - Allow sandlock and wdmd to create /var/run directories... - mixclip.so has been compiled correctly - Fix passenger policy module name- Add mailscanner policy from dgrift - Allow chrome to optionally be transitioned to - Zabbix needs these rules when starting the zabbix_server_mysql - Implement a type for freedesktop openicc standard (~/.local/share/icc) - Allow system_dbusd_t to read inherited icc_data_home_t files. - Allow colord_t to read icc_data_home_t content. #706975 - Label stuff under /usr/lib/debug as if it was labeled under /- Fixes for sanlock policy - Fixes for colord policy - Other fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log- Add rhev policy module to modules-targeted.conf- Lot of fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log- Allow logrotate to execute systemctl - Allow nsplugin_t to getattr on gpmctl - Fix dev_getattr_all_chr_files() interface - Allow shorewall to use inherited terms - Allow userhelper to getattr all chr_file devices - sandbox domains should be able to getattr and dontaudit search of sysctl_kernel_t - Fix labeling for ABRT Retrace Server- Dontaudit sys_module for ifconfig - Make telepathy and gkeyringd daemon working with confined users - colord wants to read files in users homedir - Remote login should be creating user_tmp_t not its own tmp files- Fix label for /usr/share/munin/plugins/munin_* plugins - Add support for zarafa-indexer - Fix boolean description - Allow colord to getattr on /proc/scsi/scsi - Add label for /lib/upstart/init - Colord needs to list /mnt- Forard port changes from F15 for telepathy - NetworkManager should be allowed to use /dev/rfkill - Fix dontaudit messages to say Domain to not audit - Allow telepathy domains to read/write gnome_cache files - Allow telepathy domains to call getpw - Fixes for colord and vnstatd policy- Allow init_t getcap and setcap - Allow namespace_init_t to use nsswitch - aisexec will execute corosync - colord tries to read files off noxattr file systems - Allow init_t getcap and setcap- Add support for ABRT retrace server - Allow user_t and staff_t access to generic scsi to handle locally plugged in scanners - Allow telepath_msn_t to read /proc/PARENT/cmdline - ftpd needs kill capability - Allow telepath_msn_t to connect to sip port - keyring daemon does not work on nfs homedirs - Allow $1_sudo_t to read default SELinux context - Add label for tgtd sock file in /var/run/ - Add apache_exec_rotatelogs interface - allow all zaraha domains to signal themselves, server writes to /tmp - Allow syslog to read the process state - Add label for /usr/lib/chromium-browser/chrome - Remove the telepathy transition from unconfined_t - Dontaudit sandbox domains trying to mounton sandbox_file_t, this is caused by fuse mounts - Allow initrc_t domain to manage abrt pid files - Add support for AEOLUS project - Virt_admin should be allowed to manage images and processes - Allow plymountd to send signals to init - Change labeling of fping6- Add filename transitions- Fixes for zarafa policy - Add support for AEOLUS project - Change labeling of fping6 - Allow plymountd to send signals to init - Allow initrc_t domain to manage abrt pid files - Virt_admin should be allowed to manage images and processes- xdm_t needs getsession for switch user - Every app that used to exec init is now execing systemdctl - Allow squid to manage krb5_host_rcache_t files - Allow foghorn to connect to agentx port - Fixes for colord policy- Add Dan's patch to remove 64 bit variants - Allow colord to use unix_dgram_socket - Allow apps that search pids to read /var/run if it is a lnk_file - iscsid_t creates its own directory - Allow init to list var_lock_t dir - apm needs to verify user accounts auth_use_nsswitch - Add labeling for systemd unit files - Allow gnomeclok to enable ntpd service using systemctl - systemd_systemctl_t domain was added - Add label for matahari-broker.pid file - We want to remove untrustedmcsprocess from ability to read /proc/pid - Fixes for matahari policy - Allow system_tmpfiles_t to delete user_home_t files in the /tmp dir - Allow sshd to transition to sysadm_t if ssh_sysadm_login is turned on- Fix typo- Add /var/run/lock /var/lock definition to file_contexts.subs - nslcd_t is looking for kerberos cc files - SSH_USE_STRONG_RNG is 1 which requires /dev/random - Fix auth_rw_faillog definition - Allow sysadm_t to set attributes on fixed disks - allow user domains to execute lsof and look at application sockets - prelink_cron job calls telinit -u if init is rewritten - Fixes to run qemu_t from staff_t- Fix label for /var/run/udev to udev_var_run_t - Mock needs to be able to read network state- Add file_contexts.subs to handle /run and /run/lock - Add other fixes relating to /run changes from F15 policy- Allow $1_sudo_t and $1_su_t open access to user terminals - Allow initrc_t to use generic terminals - Make Makefile/Rules.modular run sepolgen-ifgen during build to check if files for bugs -systemd is going to be useing /run and /run/lock for early bootup files. - Fix some comments in rlogin.if - Add policy for KDE backlighthelper - sssd needs to read ~/.k5login in nfs, cifs or fusefs file systems - sssd wants to read .k5login file in users homedir - setroubleshoot reads executables to see if they have TEXTREL - Add /var/spool/audit support for new version of audit - Remove kerberos_connect_524() interface calling - Combine kerberos_master_port_t and kerberos_port_t - systemd has setup /dev/kmsg as stderr for apps it executes - Need these access so that init can impersonate sockets on unix_dgram_socket- Remove some unconfined domains - Remove permissive domains - Add policy-term.patch from Dan- Fix multiple specification for boot.log - devicekit leaks file descriptors to setfiles_t - Change all all_nodes to generic_node and all_if to generic_if - Should not use deprecated interface - Switch from using all_nodes to generic_node and from all_if to generic_if - Add support for xfce4-notifyd - Fix file context to show several labels as SystemHigh - seunshare needs to be able to mounton nfs/cifs/fusefs homedirs - Add etc_runtime_t label for /etc/securetty - Fixes to allow xdm_t to start gkeyringd_USERTYPE_t directly - login.krb needs to be able to write user_tmp_t - dirsrv needs to bind to port 7390 for dogtag - Fix a bug in gpg policy - gpg sends audit messages - Allow qpid to manage matahari files- Initial policy for matahari - Add dev_read_watchdog - Allow clamd to connect clamd port - Add support for kcmdatetimehelper - Allow shutdown to setrlimit and sys_nice - Allow systemd_passwd to talk to /dev/log before udev or syslog is running - Purge chr_file and blk files on /tmp - Fixes for pads - Fixes for piranha-pulse - gpg_t needs to be able to encyprt anything owned by the user- mozilla_plugin_tmp_t needs to be treated as user tmp files - More dontaudits of writes from readahead - Dontaudit readahead_t file_type:dir write, to cover up kernel bug - systemd_tmpfiles needs to relabel faillog directory as well as the file - Allow hostname and consoletype to r/w inherited initrc_tmp_t files handline hostname >> /tmp/myhost- Add policykit fixes from Tim Waugh - dontaudit sandbox domains sandbox_file_t:dir mounton - Add new dontaudit rules for sysadm_dbusd_t - Change label for /var/run/faillock * other fixes which relate with this change- Update to upstream - Fixes for telepathy - Add port defition for ssdp port - add policy for /bin/systemd-notify from Dan - Mount command requires users read mount_var_run_t - colord needs to read konject_uevent_socket - User domains connect to the gkeyring socket - Add colord policy and allow user_t and staff_t to dbus chat with it - Add lvm_exec_t label for kpartx - Dontaudit reading the mail_spool_t link from sandbox -X - systemd is creating sockets in avahi_var_run and system_dbusd_var_run- gpg_t needs to talk to gnome-keyring - nscd wants to read /usr/tmp->/var/tmp to generate randomziation in unixchkpwd - enforce MCS labeling on nodes - Allow arpwatch to read meminfo - Allow gnomeclock to send itself signals - init relabels /dev/.udev files on boot - gkeyringd has to transition back to staff_t when it runs commands in bin_t or shell_exec_t - nautilus checks access on /media directory before mounting usb sticks, dontaudit access_check on mnt_t - dnsmasq can run as a dbus service, needs acquire service - mysql_admin should be allowed to connect to mysql service - virt creates monitor sockets in the users home dir- Allow usbhid-ups to read hardware state information - systemd-tmpfiles has moved - Allo cgroup to sys_tty_config - For some reason prelink is attempting to read gconf settings - Add allow_daemons_use_tcp_wrapper boolean - Add label for ~/.cache/wocky to make telepathy work in enforcing mode - Add label for char devices /dev/dasd* - Fix for apache_role - Allow amavis to talk to nslcd - allow all sandbox to read selinux poilcy config files - Allow cluster domains to use the system bus and send each other dbus messages- Update to upstream- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Update to ref policy - cgred needs chown capability - Add /dev/crash crash_dev_t - systemd-readahead wants to use fanotify which means readahead_t needs sys_admin capability- New labeling for postfmulti #675654 - dontaudit xdm_t listing noxattr file systems - dovecot-auth needs to be able to connect to mysqld via the network as well as locally - shutdown is passed stdout to a xdm_log_t file - smartd creates a fixed disk device - dovecot_etc_t contains a lnk_file that domains need to read - mount needs to be able to read etc_runtim_t:lnk_file since in rawhide this is a link created at boot- syslog_t needs syslog capability - dirsrv needs to be able to create /var/lib/snmp - Fix labeling for dirsrv - Fix for dirsrv policy missing manage_dirs_pattern - corosync needs to delete clvm_tmpfs_t files - qdiskd needs to list hugetlbfs - Move setsched to sandbox_x_domain, so firefox can run without network access - Allow hddtemp to read removable devices - Adding syslog and read_policy permissions to policy * syslog Allow unconfined, sysadm_t, secadm_t, logadm_t * read_policy allow unconfined, sysadm_t, secadm_t, staff_t on Targeted allow sysadm_t (optionally), secadm_t on MLS - mdadm application will write into /sys/.../uevent whenever arrays are assembled or disassembled.- Add tcsd policy- ricci_modclusterd_t needs to bind to rpc ports 500-1023 - Allow dbus to use setrlimit to increase resoueces - Mozilla_plugin is leaking to sandbox - Allow confined users to connect to lircd over unix domain stream socket which allow to use remote control - Allow awstats to read squid logs - seunshare needs to manage tmp_t - apcupsd cgi scripts have a new directory- Fix xserver_dontaudit_read_xdm_pid - Change oracle_port_t to oracledb_port_t to prevent conflict with satellite - Allow dovecot_deliver_t to read/write postfix_master_t:fifo_file. * These fifo_file is passed from postfix_master_t to postfix_local_t to dovecot_deliver_t - Allow readahead to manage readahead pid dirs - Allow readahead to read all mcs levels - Allow mozilla_plugin_t to use nfs or samba homedirs- Allow nagios plugin to read /proc/meminfo - Fix for mozilla_plugin - Allow samba_net_t to create /etc/keytab - pppd_t setting up vpns needs to run unix_chkpwd, setsched its process and write wtmp_t - nslcd can read user credentials - Allow nsplugin to delete mozilla_plugin_tmpfs_t - abrt tries to create dir in rpm_var_lib_t - virt relabels fifo_files - sshd needs to manage content in fusefs homedir - mock manages link files in cache dir- nslcd needs setsched and to read /usr/tmp - Invalid call in likewise policy ends up creating a bogus role - Cannon puts content into /var/lib/bjlib that cups needs to be able to write - Allow screen to create screen_home_t in /root - dirsrv sends syslog messages - pinentry reads stuff in .kde directory - Add labels for .kde directory in homedir - Treat irpinit, iprupdate, iprdump services with raid policy- NetworkManager wants to read consolekit_var_run_t - Allow readahead to create /dev/.systemd/readahead - Remove permissive domains - Allow newrole to run namespace_init- Add sepgsql_contexts file- Update to upstream- Add oracle ports and allow apache to connect to them if the connect_db boolean is turned on - Add puppetmaster_use_db boolean - Fixes for zarafa policy - Fixes for gnomeclock poliy - Fix systemd-tmpfiles to use auth_use_nsswitch- gnomeclock executes a shell - Update for screen policy to handle pipe in homedir - Fixes for polyinstatiated homedir - Fixes for namespace policy and other fixes related to polyinstantiation - Add namespace policy - Allow dovecot-deliver transition to sendmail which is needed by sieve scripts - Fixes for init, psad policy which relate with confined users - Do not audit bootloader attempts to read devicekit pid files - Allow nagios service plugins to read /proc- Add firewalld policy - Allow vmware_host to read samba config - Kernel wants to read /proc Fix duplicate grub def in cobbler - Chrony sends mail, executes shell, uses fifo_file and reads /proc - devicekitdisk getattr all file systems - sambd daemon writes wtmp file - libvirt transitions to dmidecode- Add initial policy for system-setup-keyboard which is now daemon - Label /var/lock/subsys/shorewall as shorewall_lock_t - Allow users to communicate with the gpg_agent_t - Dontaudit mozilla_plugin_t using the inherited terminal - Allow sambagui to read files in /usr - webalizer manages squid log files - Allow unconfined domains to bind ports to raw_ip_sockets - Allow abrt to manage rpm logs when running yum - Need labels for /var/run/bittlebee - Label .ssh under amanda - Remove unused genrequires for virt_domain_template - Allow virt_domain to use fd inherited from virtd_t - Allow iptables to read shorewall config- Gnome apps list config_home_t - mpd creates lnk files in homedir - apache leaks write to mail apps on tmp files - /var/stockmaniac/templates_cache contains log files - Abrt list the connects of mount_tmp_t dirs - passwd agent reads files under /dev and reads utmp file - squid apache script connects to the squid port - fix name of plymouth log file - teamviewer is a wine app - allow dmesg to read system state - Stop labeling files under /var/lib/mock so restorecon will not go into this - nsplugin needs to read network state for google talk- Allow xdm and syslog to use /var/log/boot.log - Allow users to communicate with mozilla_plugin and kill it - Add labeling for ipv6 and dhcp- New labels for ghc http content - nsplugin_config needs to read urand, lvm now calls setfscreate to create dev - pm-suspend now creates log file for append access so we remove devicekit_wri - Change authlogin_use_sssd to authlogin_nsswitch_use_ldap - Fixes for greylist_milter policy- Update to upstream - Fixes for systemd policy - Fixes for passenger policy - Allow staff users to run mysqld in the staff_t domain, akonadi needs this - Add bin_t label for /usr/share/kde4/apps/kajongg/kajongg.py - auth_use_nsswitch does not need avahi to read passwords,needed for resolving data - Dontaudit (xdm_t) gok attempting to list contents of /var/account - Telepathy domains need to read urand - Need interface to getattr all file classes in a mock library for setroubleshoot- Update selinux policy to handle new /usr/share/sandbox/start script- Update to upstream - Fix version of policy in spec file- Allow sandbox to run on nfs partitions, fixes for systemd_tmpfs - remove per sandbox domains devpts types - Allow dkim-milter sending signal to itself- Allow domains that transition to ping or traceroute, kill them - Allow user_t to conditionally transition to ping_t and traceroute_t - Add fixes to systemd- tools, including new labeling for systemd-fsck, systemd-cryptsetup- Turn on systemd policy - mozilla_plugin needs to read certs in the homedir. - Dontaudit leaked file descriptors from devicekit - Fix ircssi to use auth_use_nsswitch - Change to use interface without param in corenet to disable unlabelednet packets - Allow init to relabel sockets and fifo files in /dev - certmonger needs dac* capabilities to manage cert files not owned by root - dovecot needs fsetid to change group membership on mail - plymouthd removes /var/log/boot.log - systemd is creating symlinks in /dev - Change label on /etc/httpd/alias to be all cert_t- Fixes for clamscan and boinc policy - Add boinc_project_t setpgid - Allow alsa to create tmp files in /tmp- Push fixes to allow disabling of unlabeled_t packet access - Enable unlabelednet policy- Fixes for lvm to work with systemd- Fix the label for wicd log - plymouthd creates force-display-on-active-vt file - Allow avahi to request the kernel to load a module - Dontaudit hal leaks - Fix gnome_manage_data interface - Add new interface corenet_packet to define a type as being an packet_type. - Removed general access to packet_type from icecast and squid. - Allow mpd to read alsa config - Fix the label for wicd log - Add systemd policy- Fix gnome_manage_data interface - Dontaudit sys_ptrace capability for iscsid - Fixes for nagios plugin policy- Fix cron to run ranged when started by init - Fix devicekit to use log files - Dontaudit use of devicekit_var_run_t for fstools - Allow init to setattr on logfile directories - Allow hald to manage files in /var/run/pm-utils/ dir which is now labeled as devicekit_var_run_t- Fix up handling of dnsmasq_t creating /var/run/libvirt/network - Turn on sshd_forward_ports boolean by default - Allow sysadmin to dbus chat with rpm - Add interface for rw_tpm_dev - Allow cron to execute bin - fsadm needs to write sysfs - Dontaudit consoletype reading /var/run/pm-utils - Lots of new privs fro mozilla_plugin_t running java app, make mozilla_plugin - certmonger needs to manage dirsrv data - /var/run/pm-utils should be labeled as devicekit_var_run_t- fixes to allow /var/run and /var/lock as tmpfs - Allow chrome sandbox to connect to web ports - Allow dovecot to listem on lmtp and sieve ports - Allov ddclient to search sysctl_net_t - Transition back to original domain if you execute the shell- Remove duplicate declaration- Update to upstream - Cleanup for sandbox - Add attribute to be able to select sandbox types- Allow ddclient to fix file mode bits of ddclient conf file - init leaks file descriptors to daemons - Add labels for /etc/lirc/ and - Allow amavis_t to exec shell - Add label for gssd_tmp_t for /var/tmp/nfs_0- Put back in lircd_etc_t so policy will install- Turn on allow_postfix_local_write_mail_spool - Allow initrc_t to transition to shutdown_t - Allow logwatch and cron to mls_read_to_clearance for MLS boxes - Allow wm to send signull to all applications and receive them from users - lircd patch from field - Login programs have to read /etc/samba - New programs under /lib/systemd - Abrt needs to read config files- Update to upstream - Dontaudit leaked sockets from userdomains to user domains - Fixes for mcelog to handle scripts - Apply patch from Ruben Kerkhof - Allow syslog to search spool dirs- Allow nagios plugins to read usr files - Allow mysqld-safe to send system log messages - Fixes fpr ddclient policy - Fix sasl_admin interface - Allow apache to search zarafa config - Allow munin plugins to search /var/lib directory - Allow gpsd to read sysfs_t - Fix labels on /etc/mcelog/triggers to bin_t- Remove saslauthd_tmp_t and transition tmp files to krb5_host_rcache_t - Allow saslauthd_t to create krb5_host_rcache_t files in /tmp - Fix xserver interface - Fix definition of /var/run/lxdm- Turn on mediawiki policy - kdump leaks kdump_etc_t to ifconfig, add dontaudit - uux needs to transition to uucpd_t - More init fixes relabels man,faillog - Remove maxima defs in libraries.fc - insmod needs to be able to create tmpfs_t files - ping needs setcap- Allow groupd transition to fenced domain when executes fence_node - Fixes for rchs policy - Allow mpd to be able to read samba/nfs files- Fix up corecommands.fc to match upstream - Make sure /lib/systemd/* is labeled init_exec_t - mount wants to setattr on all mountpoints - dovecot auth wants to read dovecot etc files - nscd daemon looks at the exe file of the comunicating daemon - openvpn wants to read utmp file - postfix apps now set sys_nice and lower limits - remote_login (telnetd/login) wants to use telnetd_devpts_t and user_devpts_t to work correctly - Also resolves nsswitch - Fix labels on /etc/hosts.* - Cleanup to make upsteam patch work - allow abrt to read etc_runtime_t- Add conflicts for dirsrv package- Update to upstream - Add vlock policy- Fix sandbox to work on nfs homedirs - Allow cdrecord to setrlimit - Allow mozilla_plugin to read xauth - Change label on systemd-logger to syslogd_exec_t - Install dirsrv policy from dirsrv package- Add virt_home_t, allow init to setattr on xserver_tmp_t and relabel it - Udev needs to stream connect to init and kernel - Add xdm_exec_bootloader boolean, which allows xdm to execute /sbin/grub and read files in /boot directory- Allow NetworkManager to read openvpn_etc_t - Dontaudit hplip to write of /usr dirs - Allow system_mail_t to create /root/dead.letter as mail_home_t - Add vdagent policy for spice agent daemon- Dontaudit sandbox sending sigkill to all user domains - Add policy for rssh_chroot_helper - Add missing flask definitions - Allow udev to relabelto removable_t - Fix label on /var/log/wicd.log - Transition to initrc_t from init when executing bin_t - Add audit_access permissions to file - Make removable_t a device_node - Fix label on /lib/systemd/*- Fixes for systemd to manage /var/run - Dontaudit leaks by firstboot- Allow chome to create netlink_route_socket - Add additional MATHLAB file context - Define nsplugin as an application_domain - Dontaudit sending signals from sandboxed domains to other domains - systemd requires init to build /tmp /var/auth and /var/lock dirs - mount wants to read devicekit_power /proc/ entries - mpd wants to connect to soundd port - Openoffice causes a setattr on a lib_t file for normal users, add dontaudit - Treat lib_t and textrel_shlib_t directories the same - Allow mount read access on virtual images- Allow sandbox_x_domains to work with nfs/cifs/fusefs home dirs. - Allow devicekit_power to domtrans to mount - Allow dhcp to bind to udp ports > 1024 to do named stuff - Allow ssh_t to exec ssh_exec_t - Remove telepathy_butterfly_rw_tmp_files(), dev_read_printk() interfaces which are nolonger used - Fix clamav_append_log() intefaces - Fix 'psad_rw_fifo_file' interface- Allow cobblerd to list cobler appache content- Fixup for the latest version of upowed - Dontaudit sandbox sending SIGNULL to desktop apps- Update to upstream-Mount command from a confined user generates setattr on /etc/mtab file, need to dontaudit this access - dovecot-auth_t needs ipc_lock - gpm needs to use the user terminal - Allow system_mail_t to append ~/dead.letter - Allow NetworkManager to edit /etc/NetworkManager/NetworkManager.conf - Add pid file to vnstatd - Allow mount to communicate with gfs_controld - Dontaudit hal leaks in setfiles- Lots of fixes for systemd - systemd now executes readahead and tmpwatch type scripts - Needs to manage random seed- Allow smbd to use sys_admin - Remove duplicate file context for tcfmgr - Update to upstream- Fix fusefs handling - Do not allow sandbox to manage nsplugin_rw_t - Allow mozilla_plugin_t to connecto its parent - Allow init_t to connect to plymouthd running as kernel_t - Add mediawiki policy - dontaudit sandbox sending signals to itself. This can happen when they are running at different mcs. - Disable transition from dbus_session_domain to telepathy for F14 - Allow boinc_project to use shm - Allow certmonger to search through directories that contain certs - Allow fail2ban the DAC Override so it can read log files owned by non root users- Start adding support for use_fusefs_home_dirs - Add /var/lib/syslog directory file context - Add /etc/localtime as locale file context- Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn off iptables from unconfined user - Allow sudo to send signals to any domains the user could have transitioned to. - Passwd in single user mode needs to talk to console_device_t - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio - locate tried to read a symbolic link, will dontaudit - New labels for telepathy-sunshine content in homedir - Google is storing other binaries under /opt/google/talkplugin - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15 - modemmanger and bluetooth send dbus messages to devicekit_power - Samba needs to getquota on filesystems labeld samba_share_t- Dontaudit attempts by xdm_t to write to bin_t for kdm - Allow initrc_t to manage system_conf_t- Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory. - Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets - Allow confined users to read xdm_etc_t files - Allow xdm_t to transition to xauth_t for lxdm program- Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home - Allow clamd to send signals to itself - Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm. - Allow haze to connect to yahoo chat and messenger port tcp:5050. Bz #637339 - Allow guest to run ps command on its processes by allowing it to read /proc - Allow firewallgui to sys_rawio which seems to be required to setup masqerading - Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba. - Add label for /var/log/slim.log- Pull in cleanups from dgrift - Allow mozilla_plugin_t to execute mozilla_home_t - Allow rpc.quota to do quotamod- Cleanup policy via dgrift - Allow dovecot_deliver to append to inherited log files - Lots of fixes for consolehelper- Fix up Xguest policy- Add vnstat policy - allow libvirt to send audit messages - Allow chrome-sandbox to search nfs_t- Update to upstream- Add the ability to send audit messages to confined admin policies - Remove permissive domain from cmirrord and dontaudit sys_tty_config - Split out unconfined_domain() calls from other unconfined_ calls so we can d - virt needs to be able to read processes to clearance for MLS- Allow all domains that can use cgroups to search tmpfs_t directory - Allow init to send audit messages- Update to upstream- Allow mdadm_t to create files and sock files in /dev/md/- Add policy for ajaxterm- Handle /var/db/sudo - Allow pulseaudio to read alsa config - Allow init to send initrc_t dbus messagesAllow iptables to read shorewall tmp files Change chfn and passwd to use auth_use_pam so they can send dbus messages to fpr intd label vlc as an execmem_exec_t Lots of fixes for mozilla_plugin to run google vidio chat Allow telepath_msn to execute ldconfig and its own tmp files Fix labels on hugepages Allow mdadm to read files on /dev Remove permissive domains and change back to unconfined Allow freshclam to execute shell and bin_t Allow devicekit_power to transition to dhcpc Add boolean to allow icecast to connect to any port- Merge upstream fix of mmap_zero - Allow mount to write files in debugfs_t - Allow corosync to communicate with clvmd via tmpfs - Allow certmaster to read usr_t files - Allow dbus system services to search cgroup_t - Define rlogind_t as a login pgm- Allow mdadm_t to read/write hugetlbfs- Dominic Grift Cleanup - Miroslav Grepl policy for jabberd - Various fixes for mount/livecd and prelink- Merge with upstream- More access needed for devicekit - Add dbadm policy- Merge with upstream- Allow seunshare to fowner- Allow cron to look at user_cron_spool links - Lots of fixes for mozilla_plugin_t - Add sysv file system - Turn unconfined domains to permissive to find additional avcs- Update policy for mozilla_plugin_t- Allow clamscan to read proc_t - Allow mount_t to write to debufs_t dir - Dontaudit mount_t trying to write to security_t dir- Allow clamscan_t execmem if clamd_use_jit set - Add policy for firefox plugin-container- Fix /root/.forward definition- label dead.letter as mail_home_t- Allow login programs to search /cgroups- Fix cert handling- Fix devicekit_power bug - Allow policykit_auth_t more access.- Fix nis calls to allow bind to ports 512-1024 - Fix smartmon- Allow pcscd to read sysfs - systemd fixes - Fix wine_mmap_zero_ignore boolean- Apply Miroslav munin patch - Turn back on allow_execmem and allow_execmod booleans- Merge in fixes from dgrift repository- Update boinc policy - Fix sysstat policy to allow sys_admin - Change failsafe_context to unconfined_r:unconfined_t:s0- New paths for upstart- New permissions for syslog - New labels for /lib/upstart- Add mojomojo policy- Allow systemd to setsockcon on sockets to immitate other services- Remove debugfs label- Update to latest policy- Fix eclipse labeling from IBMSupportAssasstant packageing- Make boot with systemd in enforcing mode- Update to upstream- Add boolean to turn off port forwarding in sshd.- Add support for ebtables - Fixes for rhcs and corosync policy-Update to upstream-Update to upstream-Update to upstream- Add Zarafa policy- Cleanup of aiccu policy - initial mock policy- Lots of random fixes- Update to upstream- Update to upstream - Allow prelink script to signal itself - Cobbler fixes- Add xdm_var_run_t to xserver_stream_connect_xdm - Add cmorrord and mpd policy from Miroslav Grepl- Fix sshd creation of krb cc files for users to be user_tmp_t- Fixes for accountsdialog - Fixes for boinc- Fix label on /var/lib/dokwiki - Change permissive domains to enforcing - Fix libvirt policy to allow it to run on mls- Update to upstream- Allow procmail to execute scripts in the users home dir that are labeled home_bin_t - Fix /var/run/abrtd.lock label- Allow login programs to read krb5_home_t Resolves: 594833 - Add obsoletes for cachefilesfd-selinux package Resolves: #575084- Allow mount to r/w abrt fifo file - Allow svirt_t to getattr on hugetlbfs - Allow abrt to create a directory under /var/spool- Add labels for /sys - Allow sshd to getattr on shutdown - Fixes for munin - Allow sssd to use the kernel key ring - Allow tor to send syslog messages - Allow iptabels to read usr files - allow policykit to read all domains state- Fix path for /var/spool/abrt - Allow nfs_t as an entrypoint for http_sys_script_t - Add policy for piranha - Lots of fixes for sosreport- Allow xm_t to read network state and get and set capabilities - Allow policykit to getattr all processes - Allow denyhosts to connect to tcp port 9911 - Allow pyranha to use raw ip sockets and ptrace itself - Allow unconfined_execmem_t and gconfsd mechanism to dbus - Allow staff to kill ping process - Add additional MLS rules- Allow gdm to edit ~/.gconf dir Resolves: #590677 - Allow dovecot to create directories in /var/lib/dovecot Partially resolves 590224 - Allow avahi to dbus chat with NetworkManager - Fix cobbler labels - Dontaudit iceauth_t leaks - fix /var/lib/lxdm file context - Allow aiccu to use tun tap devices - Dontaudit shutdown using xserver.log- Fixes for sandbox_x_net_t to match access for sandbox_web_t ++ - Add xdm_etc_t for /etc/gdm directory, allow accountsd to manage this directory - Add dontaudit interface for bluetooth dbus - Add chronyd_read_keys, append_keys for initrc_t - Add log support for ksmtuned Resolves: #586663- Allow boinc to send mail- Allow initrc_t to remove dhcpc_state_t - Fix label on sa-update.cron - Allow dhcpc to restart chrony initrc - Don't allow sandbox to send signals to its parent processes - Fix transition from unconfined_t -> unconfined_mount_t -> rpcd_t Resolves: #589136- Fix location of oddjob_mkhomedir Resolves: #587385 - fix labeling on /root/.shosts and ~/.shosts - Allow ipsec_mgmt_t to manage net_conf_t Resolves: #586760- Dontaudit sandbox trying to connect to netlink sockets Resolves: #587609 - Add policy for piranha- Fixups for xguest policy - Fixes for running sandbox firefox- Allow ksmtuned to use terminals Resolves: #586663 - Allow lircd to write to generic usb devices- Allow sandbox_xserver to connectto unconfined stream Resolves: #585171- Allow initrc_t to read slapd_db_t Resolves: #585476 - Allow ipsec_mgmt to use unallocated devpts and to create /etc/resolv.conf Resolves: #585963- Allow rlogind_t to search /root for .rhosts Resolves: #582760 - Fix path for cached_var_t - Fix prelink paths /var/lib/prelink - Allow confined users to direct_dri - Allow mls lvm/cryptosetup to work- Allow virtd_t to manage firewall/iptables config Resolves: #573585- Fix label on /root/.rhosts Resolves: #582760 - Add labels for Picasa - Allow openvpn to read home certs - Allow plymouthd_t to use tty_device_t - Run ncftool as iptables_t - Allow mount to unmount unlabeled_t - Dontaudit hal leaks- Allow livecd to transition to mount- Update to upstream - Allow abrt to delete sosreport Resolves: #579998 - Allow snmp to setuid and gid Resolves: #582155 - Allow smartd to use generic scsi devices Resolves: #582145- Allow ipsec_t to create /etc/resolv.conf with the correct label - Fix reserved port destination - Allow autofs to transition to showmount - Stop crashing tuned- Add telepathysofiasip policy- Update to upstream - Fix label for /opt/google/chrome/chrome-sandbox - Allow modemmanager to dbus with policykit- Fix allow_httpd_mod_auth_pam to use auth_use_pam(httpd_t) - Allow accountsd to read shadow file - Allow apache to send audit messages when using pam - Allow asterisk to bind and connect to sip tcp ports - Fixes for dovecot 2.0 - Allow initrc_t to setattr on milter directories - Add procmail_home_t for .procmailrc file- Fixes for labels during install from livecd- Fix /cgroup file context - Fix broken afs use of unlabled_t - Allow getty to use the console for s390- Fix cgroup handling adding policy for /cgroup - Allow confined users to write to generic usb devices, if user_rw_noexattrfile boolean set- Merge patches from dgrift- Update upstream - Allow abrt to write to the /proc under any process- Fix ~/.fontconfig label - Add /root/.cert label - Allow reading of the fixed_file_disk_t:lnk_file if you can read file - Allow qemu_exec_t as an entrypoint to svirt_t- Update to upstream - Allow tmpreaper to delete sandbox sock files - Allow chrome-sandbox_t to use /dev/zero, and dontaudit getattr file systems - Fixes for gitosis - No transition on livecd to passwd or chfn - Fixes for denyhosts- Add label for /var/lib/upower - Allow logrotate to run sssd - dontaudit readahead on tmpfs blk files - Allow tmpreaper to setattr on sandbox files - Allow confined users to execute dos files - Allow sysadm_t to kill processes running within its clearance - Add accountsd policy - Fixes for corosync policy - Fixes from crontab policy - Allow svirt to manage svirt_image_t chr files - Fixes for qdisk policy - Fixes for sssd policy - Fixes for newrole policy- make libvirt work on an MLS platform- Add qpidd policy- Update to upstream- Allow boinc to read kernel sysctl - Fix snmp port definitions - Allow apache to read anon_inodefs- Allow shutdown dac_override- Add device_t as a file system - Fix sysfs association- Dontaudit ipsec_mgmt sys_ptrace - Allow at to mail its spool files - Allow nsplugin to search in .pulse directory- Update to upstream- Allow users to dbus chat with xdm - Allow users to r/w wireless_device_t - Dontaudit reading of process states by ipsec_mgmt- Fix openoffice from unconfined_t- Add shutdown policy so consolekit can shutdown system- Update to upstream- Update to upstream- Update to upstream - These are merges of my patches - Remove 389 labeling conflicts - Add MLS fixes found in RHEL6 testing - Allow pulseaudio to run as a service - Add label for mssql and allow apache to connect to this database port if boolean set - Dontaudit searches of debugfs mount point - Allow policykit_auth to send signals to itself - Allow modcluster to call getpwnam - Allow swat to signal winbind - Allow usbmux to run as a system role - Allow svirt to create and use devpts- Add MLS fixes found in RHEL6 testing - Allow domains to append to rpm_tmp_t - Add cachefilesfd policy - Dontaudit leaks when transitioning- Change allow_execstack and allow_execmem booleans to on - dontaudit acct using console - Add label for fping - Allow tmpreaper to delete sandbox_file_t - Fix wine dontaudit mmap_zero - Allow abrt to read var_t symlinks- Additional policy for rgmanager- Allow sshd to setattr on pseudo terms- Update to upstream- Allow policykit to send itself signals- Fix duplicate cobbler definition- Fix file context of /var/lib/avahi-autoipd- Merge with upstream- Allow sandbox to work with MLS- Make Chrome work with staff user- Add icecast policy - Cleanup spec file- Add mcelog policy- Lots of fixes found in F12- Fix rpm_dontaudit_leaks- Add getsched to hald_t - Add file context for Fedora/Redhat Directory Server- Allow abrt_helper to getattr on all filesystems - Add label for /opt/real/RealPlayer/plugins/oggfformat\.so- Add gstreamer_home_t for ~/.gstreamer- Update to upstream- Fix git- Turn on puppet policy - Update to dgrift git policy- Move users file to selection by spec file. - Allow vncserver to run as unconfined_u:unconfined_r:unconfined_t- Update to upstream- Remove most of the permissive domains from F12.- Add cobbler policy from dgrift- add usbmon device - Add allow rulse for devicekit_disk- Lots of fixes found in F12, fixes from Tom London- Cleanups from dgrift- Add back xserver_manage_home_fonts- Dontaudit sandbox trying to read nscd and sssd- Update to upstream- Rename udisks-daemon back to devicekit_disk_t policy- Fixes for abrt calls- Add tgtd policy- Update to upstream release- Add asterisk policy back in - Update to upstream release 2.20091117- Update to upstream release 2.20091117- Fixup nut policy- Update to upstream- Allow vpnc request the kernel to load modules- Fix minimum policy installs - Allow udev and rpcbind to request the kernel to load modules- Add plymouth policy - Allow local_login to sys_admin- Allow cupsd_config to read user tmp - Allow snmpd_t to signal itself - Allow sysstat_t to makedir in sysstat_log_t- Update rhcs policy- Allow users to exec restorecond- Allow sendmail to request kernel modules load- Fix all kernel_request_load_module domains- Fix all kernel_request_load_module domains- Remove allow_exec* booleans for confined users. Only available for unconfined_t- More fixes for sandbox_web_t- Allow sshd to create .ssh directory and content- Fix request_module line to module_request- Fix sandbox policy to allow it to run under firefox. - Dont audit leaks.- Fixes for sandbox- Update to upstream - Dontaudit nsplugin search /root - Dontaudit nsplugin sys_nice- Fix label on /usr/bin/notepad, /usr/sbin/vboxadd-service - Remove policycoreutils-python requirement except for minimum- Fix devicekit_disk_t to getattr on all domains sockets and fifo_files - Conflicts seedit (You can not use selinux-policy-targeted and seedit at the same time.)- Add wordpress/wp-content/uploads label - Fixes for sandbox when run from staff_t- Update to upstream - Fixes for devicekit_disk- More fixes- Lots of fixes for initrc and other unconfined domains- Allow xserver to use netlink_kobject_uevent_socket- Fixes for sandbox- Dontaudit setroubleshootfix looking at /root directory- Update to upsteam- Allow gssd to send signals to users - Fix duplicate label for apache content- Update to upstream- Remove polkit_auth on upgrades- Add back in unconfined.pp and unconfineduser.pp - Add Sandbox unshare- Fixes for cdrecord, mdadm, and others- Add capability setting to dhcpc and gpm- Allow cronjobs to read exim_spool_t- Add ABRT policy- Fix system-config-services policy- Allow libvirt to change user componant of virt_domain- Allow cupsd_config_t to be started by dbus - Add smoltclient policy- Add policycoreutils-python to pre install- Make all unconfined_domains permissive so we can see what AVC's happen- Add pt_chown policy- Add kdump policy for Miroslav Grepl - Turn off execstack boolean- Turn on execstack on a temporary basis (#512845)- Allow nsplugin to connecto the session bus - Allow samba_net to write to coolkey data- Allow devicekit_disk to list inotify- Allow svirt images to create sock_file in svirt_var_run_t- Allow exim to getattr on mountpoints - Fixes for pulseaudio- Allow svirt_t to stream_connect to virtd_t- Allod hald_dccm_t to create sock_files in /tmp- More fixes from upstream- Fix polkit label - Remove hidebrokensymptoms for nss_ldap fix - Add modemmanager policy - Lots of merges from upstream - Begin removing textrel_shlib_t labels, from fixed libraries- Update to upstream- Allow certmaster to override dac permissions- Update to upstream- Fix context for VirtualBox- Update to upstream- Allow clamscan read amavis spool files- Fixes for xguest- fix multiple directory ownership of mandirs- Update to upstream- Add rules for rtkit-daemon- Update to upstream - Fix nlscd_stream_connect- Add rtkit policy- Allow rpcd_t to stream connect to rpcbind- Allow kpropd to create tmp files- Fix last duplicate /var/log/rpmpkgs- Update to upstream * add sssd- Update to upstream * cleanup- Update to upstream - Additional mail ports - Add virt_use_usb boolean for svirt- Fix mcs rules to include chr_file and blk_file- Add label for udev-acl- Additional rules for consolekit/udev, privoxy and various other fixes- New version for upstream- Allow NetworkManager to read inotifyfs- Allow setroubleshoot to run mlocate- Update to upstream- Add fish as a shell - Allow fprintd to list usbfs_t - Allow consolekit to search mountpoints - Add proper labeling for shorewall- New log file for vmware - Allow xdm to setattr on user_tmp_t- Upgrade to upstream- Allow fprintd to access sys_ptrace - Add sandbox policy- Add varnishd policy- Fixes for kpropd- Allow brctl to r/w tun_tap_device_t- Add /usr/share/selinux/packages- Allow rpcd_t to send signals to kernel threads- Fix upgrade for F10 to F11- Add policy for /var/lib/fprint-Remove duplicate line- Allow svirt to manage pci and other sysfs device data- Fix package selection handling- Fix /sbin/ip6tables-save context - Allod udev to transition to mount - Fix loading of mls policy file- Add shorewall policy- Additional rules for fprintd and sssd- Allow nsplugin to unix_read unix_write sem for unconfined_java- Fix uml files to be owned by users- Fix Upgrade path to install unconfineduser.pp when unocnfined package is 3.0.0 or less- Allow confined users to manage virt_content_t, since this is home dir content - Allow all domains to read rpm_script_tmp_t which is what shell creates on redirection- Fix labeling on /var/lib/misc/prelink* - Allow xserver to rw_shm_perms with all x_clients - Allow prelink to execute files in the users home directory- Allow initrc_t to delete dev_null - Allow readahead to configure auditing - Fix milter policy - Add /var/lib/readahead- Update to latest milter code from Paul Howarth- Additional perms for readahead- Allow pulseaudio to acquire_svc on session bus - Fix readahead labeling- Allow sysadm_t to run rpm directly - libvirt needs fowner- Allow sshd to read var_lib symlinks for freenx- Allow nsplugin unix_read and write on users shm and sem - Allow sysadm_t to execute su- Dontaudit attempts to getattr user_tmpfs_t by lvm - Allow nfs to share removable media- Add ability to run postdrop from confined users- Fixes for podsleuth- Turn off nsplugin transition - Remove Konsole leaked file descriptors for release- Allow cupsd_t to create link files in print_spool_t - Fix iscsi_stream_connect typo - Fix labeling on /etc/acpi/actions - Don't reinstall unconfine and unconfineuser on upgrade if they are not installed- Allow audioentroy to read etc files- Add fail2ban_var_lib_t - Fixes for devicekit_power_t- Separate out the ucnonfined user from the unconfined.pp package- Make sure unconfined_java_t and unconfined_mono_t create user_tmpfs_t.- Upgrade to latest upstream - Allow devicekit_disk sys_rawio- Dontaudit binds to ports < 1024 for named - Upgrade to latest upstream- Allow podsleuth to use tmpfs files- Add customizable_types for svirt- Allow setroubelshoot exec* privs to prevent crash from bad libraries - add cpufreqselector- Dontaudit listing of /root directory for cron system jobs- Fix missing ld.so.cache label- Add label for ~/.forward and /root/.forward- Fixes for svirt- Fixes to allow svirt read iso files in homedir- Add xenner and wine fixes from mgrepl- Allow mdadm to read/write mls override- Change to svirt to only access svirt_image_t- Fix libvirt policy- Upgrade to latest upstream- Fixes for iscsid and sssd - More cleanups for upgrade from F10 to Rawhide.- Add pulseaudio, sssd policy - Allow networkmanager to exec udevadm- Add pulseaudio context- Upgrade to latest patches- Fixes for libvirt- Update to Latest upstream- Fix setrans.conf to show SystemLow for s0- Further confinement of qemu images via svirt- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Allow NetworkManager to manage /etc/NetworkManager/system-connections- add virtual_image_context and virtual_domain_context files- Allow rpcd_t to send signal to mount_t - Allow libvirtd to run ranged- Fix sysnet/net_conf_t- Fix squidGuard labeling- Re-add corenet_in_generic_if(unlabeled_t)* Tue Feb 10 2009 Dan Walsh 3.6.5-2 - Add git web policy- Add setrans contains from upstream- Do transitions outside of the booleans- Allow xdm to create user_tmp_t sockets for switch user to work- Fix staff_t domain- Grab remainder of network_peer_controls patch- More fixes for devicekit- Upgrade to latest upstream- Add boolean to disallow unconfined_t login- Add back transition from xguest to mozilla- Add virt_content_ro_t and labeling for isos directory- Fixes for wicd daemon- More mls/rpm fixes- Add policy to make dbus/nm-applet work- Remove polgen-ifgen from post and add trigger to policycoreutils-python- Add wm policy - Make mls work in graphics mode- Fixed for DeviceKit- Add devicekit policy- Update to upstream- Define openoffice as an x_domain- Fixes for reading xserver_tmp_t- Allow cups_pdf_t write to nfs_t- Remove audio_entropy policy- Update to upstream- Allow hal_acl_t to getattr/setattr fixed_disk- Change userdom_read_all_users_state to include reading symbolic links in /proc- Fix dbus reading /proc information- Add missing alias for home directory content- Fixes for IBM java location- Allow unconfined_r unconfined_java_t- Add cron_role back to user domains- Fix sudo setting of user keys- Allow iptables to talk to terminals - Fixes for policy kit - lots of fixes for booting.- Cleanup policy- Rebuild for Python 2.6- Fix labeling on /var/spool/rsyslog- Allow postgresl to bind to udp nodes- Allow lvm to dbus chat with hal - Allow rlogind to read nfs_t- Fix cyphesis file context- Allow hal/pm-utils to look at /var/run/video.rom - Add ulogd policy- Additional fixes for cyphesis - Fix certmaster file context - Add policy for system-config-samba - Allow hal to read /var/run/video.rom- Allow dhcpc to restart ypbind - Fixup labeling in /var/run- Add certmaster policy- Fix confined users - Allow xguest to read/write xguest_dbusd_t- Allow openoffice execstack/execmem privs- Allow mozilla to run with unconfined_execmem_t- Dontaudit domains trying to write to .xsession-errors- Allow nsplugin to look at autofs_t directory- Allow kerneloops to create tmp files- More alias for fastcgi- Remove mod_fcgid-selinux package- Fix dovecot access- Policy cleanup- Remove Multiple spec - Add include - Fix makefile to not call per_role_expansion- Fix labeling of libGL- Update to upstream- Update to upstream policy- Fixes for confined xwindows and xdm_t- Allow confined users and xdm to exec wm - Allow nsplugin to talk to fifo files on nfs- Allow NetworkManager to transition to avahi and iptables - Allow domains to search other domains keys, coverup kernel bug- Fix labeling for oracle- Allow nsplugin to comminicate with xdm_tmp_t sock_file- Change all user tmpfs_t files to be labeled user_tmpfs_t - Allow radiusd to create sock_files- Upgrade to upstream- Allow confined users to login with dbus- Fix transition to nsplugin- Add file context for /dev/mspblk.*- Fix transition to nsplugin '- Fix labeling on new pm*log - Allow ssh to bind to all nodes- Merge upstream changes - Add Xavier Toth patches- Add qemu_cache_t for /var/cache/libvirt- Remove gamin policy- Add tinyxs-max file system support- Update to upstream - New handling of init scripts- Allow pcsd to dbus - Add memcache policy- Allow audit dispatcher to kill his children- Update to upstream - Fix crontab use by unconfined user- Allow ifconfig_t to read dhcpc_state_t- Update to upstream- Update to upstream- Allow system-config-selinux to work with policykit- Fix novel labeling- Consolodate pyzor,spamassassin, razor into one security domain - Fix xdm requiring additional perms.- Fixes for logrotate, alsa- Eliminate vbetool duplicate entry- Fix xguest -> xguest_mozilla_t -> xguest_openiffice_t - Change dhclient to be able to red networkmanager_var_run- Update to latest refpolicy - Fix libsemanage initial install bug- Add inotify support to nscd- Allow unconfined_t to setfcap- Allow amanda to read tape - Allow prewikka cgi to use syslog, allow audisp_t to signal cgi - Add support for netware file systems- Allow ypbind apps to net_bind_service- Allow all system domains and application domains to append to any log file- Allow gdm to read rpm database - Allow nsplugin to read mplayer config files- Allow vpnc to run ifconfig- Allow confined users to use postgres - Allow system_mail_t to exec other mail clients - Label mogrel_rails as an apache server- Apply unconfined_execmem_exec_t to haskell programs- Fix prelude file context- allow hplip to talk dbus - Fix context on ~/.local dir- Prevent applications from reading x_device- Add /var/lib/selinux context- Update to upstream- Add livecd policy- Dontaudit search of admin_home for init_system_domain - Rewrite of xace interfaces - Lots of new fs_list_inotify - Allow livecd to transition to setfiles_mac- Begin XAce integration- Merge Upstream- Allow amanada to create data files- Fix initial install, semanage setup- Allow system_r for httpd_unconfined_script_t- Remove dmesg boolean - Allow user domains to read/write game data- Change unconfined_t to transition to unconfined_mono_t when running mono - Change XXX_mono_t to transition to XXX_t when executing bin_t files, so gnome-do will work- Remove old booleans from targeted-booleans.conf file- Add boolean to mmap_zero - allow tor setgid - Allow gnomeclock to set clock- Don't run crontab from unconfined_t- Change etc files to config files to allow users to read them- Lots of fixes for confined domains on NFS_t homedir- dontaudit mrtg reading /proc - Allow iscsi to signal itself - Allow gnomeclock sys_ptrace- Allow dhcpd to read kernel network state- Label /var/run/gdm correctly - Fix unconfined_u user creation- Allow transition from initrc_t to getty_t- Allow passwd to communicate with user sockets to change gnome-keyring- Fix initial install- Allow radvd to use fifo_file - dontaudit setfiles reading links - allow semanage sys_resource - add allow_httpd_mod_auth_ntlm_winbind boolean - Allow privhome apps including dovecot read on nfs and cifs home dirs if the boolean is set- Allow nsplugin to read /etc/mozpluggerrc, user_fonts - Allow syslog to manage innd logs. - Allow procmail to ioctl spamd_exec_t- Allow initrc_t to dbus chat with consolekit.- Additional access for nsplugin - Allow xdm setcap/getcap until pulseaudio is fixed- Allow mount to mkdir on tmpfs - Allow ifconfig to search debugfs- Fix file context for MATLAB - Fixes for xace- Allow stunnel to transition to inetd children domains - Make unconfined_dbusd_t an unconfined domain- Fixes for qemu/virtd- Fix bug in mozilla policy to allow xguest transition - This will fix the libsemanage.dbase_llist_query: could not find record value libsemanage.dbase_llist_query: could not query record value (No such file or directory) bug in xguest- Allow nsplugin to run acroread- Add cups_pdf policy - Add openoffice policy to run in xguest- prewika needs to contact mysql - Allow syslog to read system_map files- Change init_t to an unconfined_domain- Allow init to transition to initrc_t on shell exec. - Fix init to be able to sendto init_t. - Allow syslog to connect to mysql - Allow lvm to manage its own fifo_files - Allow bugzilla to use ldap - More mls fixes- fixes for init policy (#436988) - fix build- Additional changes for MLS policy- Fix initrc_context generation for MLS- Fixes for libvirt- Allow bitlebee to read locale_t- More xselinux rules- Change httpd_$1_script_r*_t to httpd_$1_content_r*_t- Prepare policy for beta release - Change some of the system domains back to unconfined - Turn on some of the booleans- Allow nsplugin_config execstack/execmem - Allow nsplugin_t to read alsa config - Change apache to use user content- Add cyphesis policy- Fix Makefile.devel to build mls modules - Fix qemu to be more specific on labeling- Update to upstream fixes- Allow staff to mounton user_home_t- Add xace support- Add fusectl file system- Fixes from yum-cron - Update to latest upstream- Fix userdom_list_user_files- Merge with upstream- Allow udev to send audit messages- Add additional login users interfaces - userdom_admin_login_user_template(staff)- More fixes for polkit- Eliminate transition from unconfined_t to qemu by default - Fixes for gpg- Update to upstream- Fixes for staff_t- Add policy for kerneloops - Add policy for gnomeclock- Fixes for libvirt- Fixes for nsplugin- More fixes for qemu- Additional ports for vnc and allow qemu and libvirt to search all directories- Update to upstream - Add libvirt policy - add qemu policy- Allow fail2ban to create a socket in /var/run- Allow allow_httpd_mod_auth_pam to work- Add audisp policy and prelude- Allow all user roles to executae samba net command- Allow usertypes to read/write noxattr file systems- Fix nsplugin to allow flashplugin to work in enforcing mode- Allow pam_selinux_permit to kill all processes- Allow ptrace or user processes by users of same type - Add boolean for transition to nsplugin- Allow nsplugin sys_nice, getsched, setsched- Allow login programs to talk dbus to oddjob- Add procmail_log support - Lots of fixes for munin- Allow setroubleshoot to read policy config and send audit messages- Allow users to execute all files in homedir, if boolean set - Allow mount to read samba config- Fixes for xguest to run java plugin- dontaudit pam_t and dbusd writing to user_home_t- Update gpg to allow reading of inotify- Change user and staff roles to work correctly with varied perms- Fix munin log, - Eliminate duplicate mozilla file context - fix wpa_supplicant spec- Fix role transition from unconfined_r to system_r when running rpm - Allow unconfined_domains to communicate with user dbus instances- Fixes for xguest- Let all uncofined domains communicate with dbus unconfined- Run rpm in system_r- Zero out customizable types- Fix definiton of admin_home_t- Fix munin file context- Allow cron to run unconfined apps- Modify default login to unconfined_u- Dontaudit dbus user client search of /root- Update to upstream- Fixes for polkit - Allow xserver to ptrace- Add polkit policy - Symplify userdom context, remove automatic per_role changes- Update to upstream - Allow httpd_sys_script_t to search users homedirs- Allow rpm_script to transition to unconfined_execmem_t- Remove user based home directory separation- Remove user specific crond_t- Merge with upstream - Allow xsever to read hwdata_t - Allow login programs to setkeycreate- Update to upstream- Update to upstream- Allow XServer to read /proc/self/cmdline - Fix unconfined cron jobs - Allow fetchmail to transition to procmail - Fixes for hald_mac - Allow system_mail to transition to exim - Allow tftpd to upload files - Allow xdm to manage unconfined_tmp - Allow udef to read alsa config - Fix xguest to be able to connect to sound port- Fixes for hald_mac - Treat unconfined_home_dir_t as a home dir - dontaudit rhgb writes to fonts and root- Fix dnsmasq - Allow rshd full login privs- Allow rshd to connect to ports > 1023- Fix vpn to bind to port 4500 - Allow ssh to create shm - Add Kismet policy- Allow rpm to chat with networkmanager- Fixes for ipsec and exim mail - Change default to unconfined user- Pass the UNK_PERMS param to makefile - Fix gdm location- Make alsa work- Fixes for consolekit and startx sessions- Dontaudit consoletype talking to unconfined_t- Remove homedir_template- Check asound.state- Fix exim policy- Allow tmpreadper to read man_t - Allow racoon to bind to all nodes - Fixes for finger print reader- Allow xdm to talk to input device (fingerprint reader) - Allow octave to run as java- Allow login programs to set ioctl on /proc- Allow nsswitch apps to read samba_var_t- Fix maxima- Eliminate rpm_t:fifo_file avcs - Fix dbus path for helper app- Fix service start stop terminal avc's- Allow also to search var_lib - New context for dbus launcher- Allow cupsd_config_t to read/write usb_device_t - Support for finger print reader, - Many fixes for clvmd - dbus starting networkmanager- Fix java and mono to run in xguest account- Fix to add xguest account when inititial install - Allow mono, java, wine to run in userdomains- Allow xserver to search devpts_t - Dontaudit ldconfig output to homedir- Remove hplip_etc_t change back to etc_t.- Allow cron to search nfs and samba homedirs- Allow NetworkManager to dbus chat with yum-updated- Allow xfs to bind to port 7100- Allow newalias/sendmail dac_override - Allow bind to bind to all udp ports- Turn off direct transition- Allow wine to run in system role- Fix java labeling- Define user_home_type as home_type- Allow sendmail to create etc_aliases_t- Allow login programs to read symlinks on homedirs- Update an readd modules- Cleanup spec file- Allow xserver to be started by unconfined process and talk to tty- Upgrade to upstream to grab postgressql changes- Add setransd for mls policy- Add ldconfig_cache_t- Allow sshd to write to proc_t for afs login- Allow xserver access to urand- allow dovecot to search mountpoints- Fix Makefile for building policy modules- Fix dhcpc startup of service- Fix dbus chat to not happen for xguest and guest users- Fix nagios cgi - allow squid to communicate with winbind- Fixes for ldconfig- Update from upstream- Add nasd support- Fix new usb devices and dmfm- Eliminate mount_ntfs_t policy, merge into mount_t- Allow xserver to write to ramfs mounted by rhgb- Add context for dbus machine id- Update with latest changes from upstream- Fix prelink to handle execmod- Add ntpd_key_t to handle secret data- Add anon_inodefs - Allow unpriv user exec pam_exec_t - Fix trigger- Allow cups to use generic usb - fix inetd to be able to run random apps (git)- Add proper contexts for rsyslogd- Fixes for xguest policy- Allow execution of gconf- Fix moilscanner update problem- Begin adding policy to separate setsebool from semanage - Fix xserver.if definition to not break sepolgen.if- Add new devices- Add brctl policy- Fix root login to include system_r- Allow prelink to read kernel sysctls- Default to user_u:system_r:unconfined_t- fix squid - Fix rpm running as uid- Fix syslog declaration- Allow avahi to access inotify - Remove a lot of bogus security_t:filesystem avcs- Remove ifdef strict policy from upstream- Remove ifdef strict to allow user_u to login- Fix for amands - Allow semanage to read pp files - Allow rhgb to read xdm_xserver_tmp- Allow kerberos servers to use ldap for backing store- allow alsactl to read kernel state- More fixes for alsactl - Transition from hal and modutils - Fixes for suspend resume. - insmod domtrans to alsactl - insmod writes to hal log- Allow unconfined_t to transition to NetworkManager_t - Fix netlabel policy- Update to latest from upstream- Update to latest from upstream- Update to latest from upstream- Allow pcscd_t to send itself signals- Fixes for unix_update - Fix logwatch to be able to search all dirs- Upstream bumped the version- Allow consolekit to syslog - Allow ntfs to work with hal- Allow iptables to read etc_runtime_t- MLS Fixes- Fix path of /etc/lvm/cache directory - Fixes for alsactl and pppd_t - Fixes for consolekit- Allow insmod_t to mount kvmfs_t filesystems- Rwho policy - Fixes for consolekit- fixes for fusefs- Fix samba_net to allow it to view samba_var_t- Update to upstream- Fix Sonypic backlight - Allow snmp to look at squid_conf_t- Fixes for pyzor, cyrus, consoletype on everything installs- Fix hald_acl_t to be able to getattr/setattr on usb devices - Dontaudit write to unconfined_pipes for load_policy- Allow bluetooth to read inotifyfs- Fixes for samba domain controller. - Allow ConsoleKit to look at ttys- Fix interface call- Allow syslog-ng to read /var - Allow locate to getattr on all filesystems - nscd needs setcap- Update to upstream- Allow samba to run groupadd- Update to upstream- Allow mdadm to access generic scsi devices- Fix labeling on udev.tbl dirs- Fixes for logwatch- Add fusermount and mount_ntfs policy- Update to upstream - Allow saslauthd to use kerberos keytabs- Fixes for samba_var_t- Allow networkmanager to setpgid - Fixes for hal_acl_t- Remove disable_trans booleans - hald_acl_t needs to talk to nscd- Fix prelink to be able to manage usr dirs.- Allow insmod to launch init scripts- Remove setsebool policy- Fix handling of unlabled_t packets- More of my patches from upstream- Update to latest from upstream - Add fail2ban policy- Update to remove security_t:filesystem getattr problems- Policy for consolekit- Update to latest from upstream- Revert Nemiver change - Set sudo as a corecmd so prelink will work, remove sudoedit mapping, since this will not work, it does not transition. - Allow samba to execute useradd- Upgrade to the latest from upstream- Add sepolgen support - Add bugzilla policy- Fix file context for nemiver- Remove include sym link- Allow mozilla, evolution and thunderbird to read dev_random. Resolves: #227002 - Allow spamd to connect to smtp port Resolves: #227184 - Fixes to make ypxfr work Resolves: #227237- Fix ssh_agent to be marked as an executable - Allow Hal to rw sound device- Fix spamassisin so crond can update spam files - Fixes to allow kpasswd to work - Fixes for bluetooth- Remove some targeted diffs in file context file- Fix squid cachemgr labeling- Add ability to generate webadm_t policy - Lots of new interfaces for httpd - Allow sshd to login as unconfined_t- Continue fixing, additional user domains- Begin adding user confinement to targeted policy- Fixes for prelink, ktalkd, netlabel- Allow prelink when run from rpm to create tmp files Resolves: #221865 - Remove file_context for exportfs Resolves: #221181 - Allow spamassassin to create ~/.spamassissin Resolves: #203290 - Allow ssh access to the krb tickets - Allow sshd to change passwd - Stop newrole -l from working on non securetty Resolves: #200110 - Fixes to run prelink in MLS machine Resolves: #221233 - Allow spamassassin to read var_lib_t dir Resolves: #219234- fix mplayer to work under strict policy - Allow iptables to use nscd Resolves: #220794- Add gconf policy and make it work with strict- Many fixes for strict policy and by extension mls.- Fix to allow ftp to bind to ports > 1024 Resolves: #219349- Allow semanage to exec it self. Label genhomedircon as semanage_exec_t Resolves: #219421 - Allow sysadm_lpr_t to manage other print spool jobs Resolves: #220080- allow automount to setgid Resolves: #219999- Allow cron to polyinstatiate - Fix creation of boot flags Resolves: #207433- Fixes for irqbalance Resolves: #219606- Fix vixie-cron to work on mls Resolves: #207433Resolves: #218978- Allow initrc to create files in /var directories Resolves: #219227- More fixes for MLS Resolves: #181566- More Fixes polyinstatiation Resolves: #216184- More Fixes polyinstatiation - Fix handling of keyrings Resolves: #216184- Fix polyinstatiation - Fix pcscd handling of terminal Resolves: #218149 Resolves: #218350- More fixes for quota Resolves: #212957- ncsd needs to use avahi sockets Resolves: #217640 Resolves: #218014- Allow login programs to polyinstatiate homedirs Resolves: #216184 - Allow quotacheck to create database files Resolves: #212957- Dontaudit appending hal_var_lib files Resolves: #217452 Resolves: #217571 Resolves: #217611 Resolves: #217640 Resolves: #217725- Fix context for helix players file_context #216942- Fix load_policy to be able to mls_write_down so it can talk to the terminal- Fixes for hwclock, clamav, ftp- Move to upstream version which accepted my patches- Fixes for nvidia driver- Allow semanage to signal mcstrans- Update to upstream- Allow modstorage to edit /etc/fstab file- Fix for qemu, /dev/- Fix path to realplayer.bin- Allow xen to connect to xen port- Allow cups to search samba_etc_t directory - Allow xend_t to list auto_mountpoints- Allow xen to search automount- Fix spec of jre files- Fix unconfined access to shadow file- Allow xend to create files in xen_image_t directories- Fixes for /var/lib/hal- Remove ability for sysadm_t to look at audit.log- Fix rpc_port_types - Add aide policy for mls- Merge with upstream- Lots of fixes for ricci- Allow xen to read/write fixed devices with a boolean - Allow apache to search /var/log- Fix policygentool specfile problem. - Allow apache to send signals to it's logging helpers. - Resolves: rhbz#212731- Add perms for swat- Add perms for swat- Allow daemons to dump core files to /- Fixes for ricci- Allow mount.nfs to work- Allow ricci-modstorage to look at lvm_etc_t- Fixes for ricci using saslauthd- Allow mountpoint on home_dir_t and home_t- Update xen to read nfs files- Allow noxattrfs to associate with other noxattrfs- Allow hal to use power_device_t- Allow procemail to look at autofs_t - Allow xen_image_t to work as a fixed device- Refupdate from upstream- Add lots of fixes for mls cups- Lots of fixes for ricci- Fix number of cats- Update to upstream- More iSCSI changes for #209854- Test ISCSI fixes for #209854- allow semodule to rmdir selinux_config_t dir- Fix boot_runtime_t problem on ppc. Should not be creating these files.- Fix context mounts on reboot - Fix ccs creation of directory in /var/log- Update for tallylog- Allow xend to rewrite dhcp conf files - Allow mgetty sys_admin capability- Make xentapctrl work- Don't transition unconfined_t to bootloader_t - Fix label in /dev/xen/blktap- Patch for labeled networking- Fix crond handling for mls- Update to upstream- Remove bluetooth-helper transition - Add selinux_validate for semanage - Require new version of libsemanage- Fix prelink- Fix rhgb- Fix setrans handling on MLS and useradd- Support for fuse - fix vigr- Fix dovecot, amanda - Fix mls- Allow java execheap for itanium- Update with upstream- mls fixes- Update from upstream- More fixes for mls - Revert change on automount transition to mount- Fix cron jobs to run under the correct context- Fixes to make pppd work- Multiple policy fixes - Change max categories to 1023- Fix transition on mcstransd- Add /dev/em8300 defs- Upgrade to upstream- Fix ppp connections from network manager- Add tty access to all domains boolean - Fix gnome-pty-helper context for ia64- Fixed typealias of firstboot_rw_t- Fix location of xel log files - Fix handling of sysadm_r -> rpm_exec_t- Fixes for autofs, lp- Update from upstream- Fixup for test6- Update to upstream- Update to upstream- Fix suspend to disk problems- Lots of fixes for restarting daemons at the console.- Fix audit line - Fix requires line- Upgrade to upstream- Fix install problems- Allow setroubleshoot to getattr on all dirs to gather RPM data- Set /usr/lib/ia32el/ia32x_loader to unconfined_execmem_exec_t for ia32 platform - Fix spec for /dev/adsp- Fix xen tty devices- Fixes for setroubleshoot- Update to upstream- Fixes for stunnel and postgresql - Update from upstream- Update from upstream - More java fixes- Change allow_execstack to default to on, for RHEL5 Beta. This is required because of a Java compiler problem. Hope to turn off for next beta- Misc fixes- More fixes for strict policy- Quiet down anaconda audit messages- Fix setroubleshootd- Update to the latest from upstream- More fixes for xen- Fix anaconda transitions- yet more xen rules- more xen rules- Fixes for Samba- Fixes for xen- Allow setroubleshootd to send mail- Add nagios policy- fixes for setroubleshoot- Added Paul Howarth patch to only load policy packages shipped with this package - Allow pidof from initrc to ptrace higher level domains - Allow firstboot to communicate with hal via dbus- Add policy for /var/run/ldapi- Fix setroubleshoot policy- Fixes for mls use of ssh - named has a new conf file- Fixes to make setroubleshoot work- Cups needs to be able to read domain state off of printer client- add boolean to allow zebra to write config files- setroubleshootd fixes- Allow prelink to read bin_t symlink - allow xfs to read random devices - Change gfs to support xattr- Remove spamassassin_can_network boolean- Update to upstream - Fix lpr domain for mls- Add setroubleshoot policy- Turn off auditallow on setting booleans- Multiple fixes- Update to upstream- Update to upstream - Add new class for kernel key ring- Update to upstream- Update to upstream- Break out selinux-devel package- Add ibmasmfs- Fix policygentool gen_requires- Update from Upstream- Fix spec of realplay- Update to upstream- Fix semanage- Allow useradd to create_home_dir in MLS environment- Update from upstream- Update from upstream- Add oprofilefs- Fix for hplip and Picasus- Update to upstream- Update to upstream- fixes for spamd- fixes for java, openldap and webalizer- Xen fixes- Upgrade to upstream- allow hal to read boot_t files - Upgrade to upstream- allow hal to read boot_t files- Update from upstream- Fixes for amavis- Update from upstream- Allow auditctl to search all directories- Add acquire service for mono.- Turn off allow_execmem boolean - Allow ftp dac_override when allowed to access users homedirs- Clean up spec file - Transition from unconfined_t to prelink_t- Allow execution of cvs command- Update to upstream- Update to upstream- Fix libjvm spec- Update to upstream- Add xm policy - Fix policygentool- Update to upstream - Fix postun to only disable selinux on full removal of the packages- Allow mono to chat with unconfined- Allow procmail to sendmail - Allow nfs to share dosfs- Update to latest from upstream - Allow selinux-policy to be removed and kernel not to crash- Update to latest from upstream - Add James Antill patch for xen - Many fixes for pegasus- Add unconfined_mount_t - Allow privoxy to connect to httpd_cache - fix cups labeleing on /var/cache/cups- Update to latest from upstream- Update to latest from upstream - Allow mono and unconfined to talk to initrc_t dbus objects- Change libraries.fc to stop shlib_t form overriding texrel_shlib_t- Fix samba creating dirs in homedir - Fix NFS so its booleans would work- Allow secadm_t ability to relabel all files - Allow ftp to search xferlog_t directories - Allow mysql to communicate with ldap - Allow rsync to bind to rsync_port_t- Fixed mailman with Postfix #183928 - Allowed semanage to create file_context files. - Allowed amanda_t to access inetd_t TCP sockets and allowed amanda_recover_t to bind to reserved ports. #149030 - Don't allow devpts_t to be associated with tmp_t. - Allow hald_t to stat all mountpoints. - Added boolean samba_share_nfs to allow smbd_t full access to NFS mounts. - Make mount run in mount_t domain from unconfined_t to prevent mislabeling of /etc/mtab. - Changed the file_contexts to not have a regex before the first ^/[a-z]/ whenever possible, makes restorecon slightly faster. - Correct the label of /etc/named.caching-nameserver.conf - Now label /usr/src/kernels/.+/lib(/.*)? as usr_t instead of /usr/src(/.*)?/lib(/.*)? - I don't think we need anything else under /usr/src hit by this. - Granted xen access to /boot, allowed mounting on xend_var_lib_t, and allowed xenstored_t rw access to the xen device node.- More textrel_shlib_t file path fixes - Add ada support- Get auditctl working in MLS policy- Add mono dbus support - Lots of file_context fixes for textrel_shlib_t in FC5 - Turn off execmem auditallow since they are filling log files- Update to upstream- Allow automount and dbus to read cert files- Fix ftp policy - Fix secadm running of auditctl- Update to upstream- Update to upstream- Fix policyhelp- Fix pam_console handling of usb_device - dontaudit logwatch reading /mnt dir- Update to upstream- Get transition rules to create policy.20 at SystemHigh- Allow secadmin to shutdown system - Allow sendmail to exec newalias- MLS Fixes dmidecode needs mls_file_read_up - add ypxfr_t - run init needs access to nscd - udev needs setuid - another xen log file - Dontaudit mount getattr proc_kcore_t- fix buildroot usage (#185391)- Get rid of mount/fsdisk scan of /dev messages - Additional fixes for suspend/resume- Fake make to rebuild enableaudit.pp- Get xen networking running.- Fixes for Xen - enableaudit should not be the same as base.pp - Allow ps to work for all process- more xen policy fixups- more xen fixage (#184393)- Fix blkid specification - Allow postfix to execute mailman_que- Blkid changes - Allow udev access to usb_device_t - Fix post script to create targeted policy config file- Allow lvm tools to create drevice dir- Add Xen support- Fixes for cups - Make cryptosetup work with hal- Load Policy needs translock- Fix cups html interface- Add hal changes suggested by Jeremy - add policyhelp to point at policy html pages- Additional fixes for nvidia and cups- Update to upstream - Merged my latest fixes - Fix cups policy to handle unix domain sockets- NSCD socket is in nscd_var_run_t needs to be able to search dir- Fixes Apache interface file- Fixes for new version of cups- Turn off polyinstatiate util after FC5- Fix problem with privoxy talking to Tor- Turn on polyinstatiation- Don't transition from unconfined_t to fsadm_t- Fix policy update model.- Update to upstream- Fix load_policy to work on MLS - Fix cron_rw_system_pipes for postfix_postdrop_t - Allow audotmount to run showmount- Fix swapon - allow httpd_sys_script_t to be entered via a shell - Allow httpd_sys_script_t to read eventpolfs- Update from upstream- allow cron to read apache files- Fix vpnc policy to work from NetworkManager- Update to upstream - Fix semoudle polcy- Update to upstream - fix sysconfig/selinux link- Add router port for zebra - Add imaze port for spamd - Fixes for amanda and java- Fix bluetooth handling of usb devices - Fix spamd reading of ~/ - fix nvidia spec- Update to upsteam- Add users_extra files- Update to upstream- Add semodule policy- Update from upstream- Fix for spamd to use razor port- Fixes for mcs - Turn on mount and fsadm for unconfined_t- Fixes for the -devel package- Fix for spamd to use ldap- Update to upstream- Update to upstream - Fix rhgb, and other Xorg startups- Update to upstream- Separate out role of secadm for mls- Add inotifyfs handling- Update to upstream - Put back in changes for pup/zen- Many changes for MLS - Turn on strict policy- Update to upstream- Update to upstream - Fixes for booting and logging in on MLS machine- Update to upstream - Turn off execheap execstack for unconfined users - Add mono/wine policy to allow execheap and execstack for them - Add execheap for Xdm policy- Update to upstream - Fixes to fetchmail,- Update to upstream- Fix for procmail/spamassasin - Update to upstream - Add rules to allow rpcd to work with unlabeled_networks.- Update to upstream - Fix ftp Man page- Update to upstream- fix pup transitions (#177262) - fix xen disks (#177599)- Update to upstream- More Fixes for hal and readahead- Fixes for hal and readahead- Update to upstream - Apply- Add wine and fix hal problems- Handle new location of hal scripts- Allow su to read /etc/mtab- Update to upstream- Fix "libsemanage.parse_module_headers: Data did not represent a module." problem- Allow load_policy to read /etc/mtab- Fix dovecot to allow dovecot_auth to look at /tmp- Allow restorecon to read unlabeled_t directories in order to fix labeling.- Add Logwatch policy- Fix /dev/ub[a-z] file context- Fix library specification - Give kudzu execmem privs- Fix hostname in targeted policy- Fix passwd command on mls- Lots of fixes to make mls policy work- Add dri libs to textrel_shlib_t - Add system_r role for java - Add unconfined_exec_t for vncserver - Allow slapd to use kerberos- Add man pages- Add enableaudit.pp- Fix mls policy- Update mls file from old version- Add sids back in - Rebuild with update checkpolicy- Fixes to allow automount to use portmap - Fixes to start kernel in s0-s15:c0.c255- Add java unconfined/execmem policy- Add file context for /var/cvs - Dontaudit webalizer search of homedir- Update from upstream- Clean up spec - range_transition crond to SystemHigh- Fixes for hal - Update to upstream- Turn back on execmem since we need it for java, firefox, ooffice - Allow gpm to stream socket to itself- fix requirements to be on the actual packages so that policy can get created properly at install time- Allow unconfined_t to execmod texrel_shlib_t- Update to upstream - Turn off allow_execmem and allow_execmod booleans - Add tcpd and automount policies- Add two new httpd booleans, turned off by default * httpd_can_network_relay * httpd_can_network_connect_db- Add ghost for policy.20- Update to upstream - Turn off boolean allow_execstack- Change setrans-mls to use new libsetrans - Add default_context rule for xdm- Change Requires to PreReg for requiring of policycoreutils on install- New upstream releaseAdd xdm policyUpdate from upstreamUpdate from upstreamUpdate from upstream- Also trigger to rebuild policy for versions up to 2.0.7.- No longer installing policy.20 file, anaconda handles the building of the app.- Fixes for dovecot and saslauthd- Cleanup pegasus and named - Fix spec file - Fix up passwd changing applications-Update to latest from upstream- Add rules for pegasus and avahi- Start building MLS Policy- Update to upstream- Turn on bash- Initial version/bin/sh  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'())+,-./0123456789:;<=>?@ABCDEFGHI3.13.1-192.el7_5.6    develMakefileexample.fcexample.ifexample.tehtmlNetworkManager.htmlabrt.htmlabrt_dump_oops.htmlabrt_handle_event.htmlabrt_helper.htmlabrt_retrace_coredump.htmlabrt_retrace_worker.htmlabrt_upload_watch.htmlabrt_watch_log.htmlaccountsd.htmlacct.htmladmin_crontab.htmlafs.htmlafs_bosserver.htmlafs_fsserver.htmlafs_kaserver.htmlafs_ptserver.htmlafs_vlserver.htmlaiccu.htmlaide.htmlajaxterm.htmlajaxterm_ssh.htmlalsa.htmlamanda.htmlamanda_recover.htmlamtu.htmlanaconda.htmlanon_sftpd.htmlantivirus.htmlapcupsd.htmlapcupsd_cgi_script.htmlapm.htmlapmd.htmlarpwatch.htmlasterisk.htmlaudisp.htmlaudisp_remote.htmlauditadm.htmlauditadm_screen.htmlauditadm_su.htmlauditadm_sudo.htmlauditctl.htmlauditd.htmlauthconfig.htmlautomount.htmlavahi.htmlawstats.htmlawstats_script.htmlbacula.htmlbacula_admin.htmlbacula_unconfined_script.htmlbcfg2.htmlbitlbee.htmlblkmapd.htmlblktap.htmlblueman.htmlbluetooth.htmlbluetooth_helper.htmlboinc.htmlboinc_project.htmlbootloader.htmlbrctl.htmlbrltty.htmlbugzilla_script.htmlbumblebee.htmlcachefiles_kernel.htmlcachefilesd.htmlcalamaris.htmlcallweaver.htmlcanna.htmlcardmgr.htmlccs.htmlcdcc.htmlcdrecord.htmlcertmaster.htmlcertmonger.htmlcertmonger_unconfined.htmlcertwatch.htmlcfengine_execd.htmlcfengine_monitord.htmlcfengine_serverd.htmlcgclear.htmlcgconfig.htmlcgdcbxd.htmlcgred.htmlcheckpc.htmlcheckpolicy.htmlchfn.htmlchkpwd.htmlchrome_sandbox.htmlchrome_sandbox_nacl.htmlchronyc.htmlchronyd.htmlchroot_user.htmlcinder_api.htmlcinder_backup.htmlcinder_scheduler.htmlcinder_volume.htmlciped.htmlclogd.htmlcloud_init.htmlcluster.htmlclvmd.htmlcmirrord.htmlcobblerd.htmlcockpit_session.htmlcockpit_ws.htmlcollectd.htmlcollectd_script.htmlcolord.htmlcomsat.htmlcondor_collector.htmlcondor_master.htmlcondor_negotiator.htmlcondor_procd.htmlcondor_schedd.htmlcondor_startd.htmlcondor_startd_ssh.htmlconman.htmlconman_unconfined_script.htmlconsolekit.htmlcontainer.htmlcontainer_auth.htmlcontainer_runtime.htmlcouchdb.htmlcourier_authdaemon.htmlcourier_pcp.htmlcourier_pop.htmlcourier_sqwebmail.htmlcourier_tcpd.htmlcpucontrol.htmlcpufreqselector.htmlcpuplug.htmlcpuspeed.htmlcrack.htmlcrond.htmlcronjob.htmlcrontab.htmlctdbd.htmlcups_pdf.htmlcupsd.htmlcupsd_config.htmlcupsd_lpd.htmlcvs.htmlcvs_script.htmlcyphesis.htmlcyrus.htmldbadm.htmldbadm_sudo.htmldbskkd.htmldcc_client.htmldcc_dbclean.htmldccd.htmldccifd.htmldccm.htmldcerpcd.htmlddclient.htmldeltacloudd.htmldenyhosts.htmldepmod.htmldevicekit.htmldevicekit_disk.htmldevicekit_power.htmldhcpc.htmldhcpd.htmldictd.htmldirsrv.htmldirsrv_snmp.htmldirsrvadmin.htmldirsrvadmin_script.htmldirsrvadmin_unconfined_script.htmldisk_munin_plugin.htmldkim_milter.htmldlm_controld.htmldmesg.htmldmidecode.htmldnsmasq.htmldnssec_trigger.htmldovecot.htmldovecot_auth.htmldovecot_deliver.htmldrbd.htmldspam.htmldspam_script.htmlentropyd.htmleventlogd.htmlevtchnd.htmlexim.htmlfail2ban.htmlfail2ban_client.htmlfcoemon.htmlfenced.htmlfetchmail.htmlfingerd.htmlfirewalld.htmlfirewallgui.htmlfirstboot.htmlfoghorn.htmlfprintd.htmlfreeipmi_bmc_watchdog.htmlfreeipmi_ipmidetectd.htmlfreeipmi_ipmiseld.htmlfreqset.htmlfsadm.htmlfsdaemon.htmlftpd.htmlftpdctl.htmlgames.htmlgames_srv.htmlganesha.htmlgconfd.htmlgconfdefaultsm.htmlgdomap.htmlgeoclue.htmlgetty.htmlgfs_controld.htmlgit_script.htmlgit_session.htmlgit_system.htmlgitosis.htmlglance_api.htmlglance_registry.htmlglance_scrubber.htmlglusterd.htmlgnomesystemmm.htmlgpg.htmlgpg_agent.htmlgpg_helper.htmlgpg_pinentry.htmlgpg_web.htmlgpm.htmlgpsd.htmlgreylist_milter.htmlgroupadd.htmlgroupd.htmlgssd.htmlgssproxy.htmlguest.htmlhaproxy.htmlhddtemp.htmlhostname.htmlhsqldb.htmlhttpd.htmlhttpd_helper.htmlhttpd_passwd.htmlhttpd_php.htmlhttpd_rotatelogs.htmlhttpd_suexec.htmlhttpd_sys_script.htmlhttpd_unconfined_script.htmlhttpd_user_script.htmlhwclock.htmlhwloc_dhwd.htmlhypervkvp.htmlhypervvssd.htmliceauth.htmlicecast.htmlifconfig.htmlindex.htmlinetd.htmlinetd_child.htmlinit.htmlinitrc.htmlinnd.htmlinsmod.htmlinstall.htmliodined.htmliotop.htmlipa_dnskey.htmlipa_helper.htmlipa_otpd.htmlipmievd.htmlipsec.htmlipsec_mgmt.htmliptables.htmlirc.htmlirqbalance.htmlirssi.htmliscsid.htmlisnsd.htmliwhd.htmljabberd.htmljabberd_router.htmljockey.htmljournalctl.htmlkadmind.htmlkdump.htmlkdumpctl.htmlkdumpgui.htmlkeepalived.htmlkeepalived_unconfined_script.htmlkernel.htmlkeyboardd.htmlkeystone.htmlkeystone_cgi_script.htmlkismet.htmlklogd.htmlkmscon.htmlkpropd.htmlkrb5kdc.htmlksmtuned.htmlktalkd.htmll2tpd.htmlldconfig.htmllircd.htmllivecd.htmllldpad.htmlload_policy.htmlloadkeys.htmllocal_login.htmllocate.htmllockdev.htmllogadm.htmllogrotate.htmllogrotate_mail.htmllogwatch.htmllogwatch_mail.htmllpd.htmllpr.htmllsassd.htmllsmd.htmllsmd_plugin.htmllttng_sessiond.htmllvm.htmllwiod.htmllwregd.htmllwsmd.htmlmail_munin_plugin.htmlmailman_cgi.htmlmailman_mail.htmlmailman_queue.htmlman2html_script.htmlmandb.htmlmcelog.htmlmdadm.htmlmediawiki_script.htmlmemcached.htmlmencoder.htmlminidlna.htmlminissdpd.htmlmip6d.htmlmirrormanager.htmlmock.htmlmock_build.htmlmodemmanager.htmlmojomojo_script.htmlmon_procd.htmlmon_statd.htmlmongod.htmlmotion.htmlmount.htmlmount_ecryptfs.htmlmozilla.htmlmozilla_plugin.htmlmozilla_plugin_config.htmlmpd.htmlmplayer.htmlmrtg.htmlmscan.htmlmunin.htmlmunin_script.htmlmysqld.htmlmysqld_safe.htmlmysqlmanagerd.htmlmythtv_script.htmlnagios.htmlnagios_admin_plugin.htmlnagios_checkdisk_plugin.htmlnagios_eventhandler_plugin.htmlnagios_mail_plugin.htmlnagios_openshift_plugin.htmlnagios_script.htmlnagios_services_plugin.htmlnagios_system_plugin.htmlnagios_unconfined_plugin.htmlnamed.htmlnamespace_init.htmlncftool.htmlndc.htmlnetlabel_mgmt.htmlnetlogond.htmlnetutils.htmlneutron.htmlnewrole.htmlnfsd.htmlninfod.htmlnmbd.htmlnova.htmlnrpe.htmlnscd.htmlnsd.htmlnsd_crond.htmlnslcd.htmlntop.htmlntpd.htmlnumad.htmlnut_upsd.htmlnut_upsdrvctl.htmlnut_upsmon.htmlnutups_cgi_script.htmlnx_server.htmlnx_server_ssh.htmlobex.htmloddjob.htmloddjob_mkhomedir.htmlopenct.htmlopendnssec.htmlopenhpid.htmlopenshift.htmlopenshift_app.htmlopenshift_cgroup_read.htmlopenshift_cron.htmlopenshift_initrc.htmlopenshift_net_read.htmlopenshift_script.htmlopensm.htmlopenvpn.htmlopenvpn_unconfined_script.htmlopenvswitch.htmlopenwsman.htmloracleasm.htmlosad.htmlpads.htmlpam_console.htmlpam_timestamp.htmlpassenger.htmlpasswd.htmlpcp_pmcd.htmlpcp_pmie.htmlpcp_pmlogger.htmlpcp_pmmgr.htmlpcp_pmproxy.htmlpcp_pmwebd.htmlpcscd.htmlpegasus.htmlpegasus_openlmi_account.htmlpegasus_openlmi_admin.htmlpegasus_openlmi_logicalfile.htmlpegasus_openlmi_services.htmlpegasus_openlmi_storage.htmlpegasus_openlmi_system.htmlpegasus_openlmi_unconfined.htmlpesign.htmlphc2sys.htmlping.htmlpingd.htmlpiranha_fos.htmlpiranha_lvs.htmlpiranha_pulse.htmlpiranha_web.htmlpkcs_slotd.htmlpki_ra.htmlpki_tomcat.htmlpki_tomcat_script.htmlpki_tps.htmlplymouth.htmlplymouthd.htmlpodsleuth.htmlpolicykit.htmlpolicykit_auth.htmlpolicykit_grant.htmlpolicykit_resolve.htmlpolipo.htmlpolipo_session.htmlportmap.htmlportmap_helper.htmlportreserve.htmlpostfix_bounce.htmlpostfix_cleanup.htmlpostfix_local.htmlpostfix_map.htmlpostfix_master.htmlpostfix_pickup.htmlpostfix_pipe.htmlpostfix_postdrop.htmlpostfix_postqueue.htmlpostfix_qmgr.htmlpostfix_showq.htmlpostfix_smtp.htmlpostfix_smtpd.htmlpostfix_virtual.htmlpostgresql.htmlpostgrey.htmlpppd.htmlpptp.htmlprelink.htmlprelink_cron_system.htmlprelude.htmlprelude_audisp.htmlprelude_correlator.htmlprelude_lml.htmlpreupgrade.htmlprewikka_script.htmlprivoxy.htmlprocmail.htmlprosody.htmlpsad.htmlptal.htmlptchown.htmlptp4l.htmlpublicfile.htmlpulseaudio.htmlpuppetagent.htmlpuppetca.htmlpuppetmaster.htmlpwauth.htmlpyicqt.htmlqdiskd.htmlqemu_dm.htmlqmail_clean.htmlqmail_inject.htmlqmail_local.htmlqmail_lspawn.htmlqmail_queue.htmlqmail_remote.htmlqmail_rspawn.htmlqmail_send.htmlqmail_smtpd.htmlqmail_splogger.htmlqmail_start.htmlqmail_tcp_env.htmlqpidd.htmlquota.htmlquota_nld.htmlrabbitmq.htmlracoon.htmlradiusd.htmlradvd.htmlrasdaemon.htmlrdisc.htmlreadahead.htmlrealmd.htmlrealmd_consolehelper.htmlredis.htmlregex_milter.htmlremote_login.htmlrestorecond.htmlrhev_agentd.htmlrhev_agentd_consolehelper.htmlrhgb.htmlrhnsd.htmlrhsmcertd.htmlricci.htmlricci_modcluster.htmlricci_modclusterd.htmlricci_modlog.htmlricci_modrpm.htmlricci_modservice.htmlricci_modstorage.htmlrlogind.htmlrngd.htmlroundup.htmlrpcbind.htmlrpcd.htmlrpm.htmlrpm_script.htmlrshd.htmlrssh.htmlrssh_chroot_helper.htmlrsync.htmlrtas_errd.htmlrtkit_daemon.htmlrun_init.htmlrwho.htmlsamba_net.htmlsamba_unconfined_net.htmlsamba_unconfined_script.htmlsambagui.htmlsandbox.htmlsandbox_min.htmlsandbox_min_client.htmlsandbox_net.htmlsandbox_net_client.htmlsandbox_web.htmlsandbox_web_client.htmlsandbox_x.htmlsandbox_x_client.htmlsandbox_xserver.htmlsanlk_resetd.htmlsanlock.htmlsaslauthd.htmlsbd.htmlsblim_gatherd.htmlsblim_reposd.htmlsblim_sfcbd.htmlsecadm.htmlsecadm_screen.htmlsecadm_su.htmlsecadm_sudo.htmlsectoolm.htmlselinux_munin_plugin.htmlsemanage.htmlsendmail.htmlsensord.htmlsepgsql_ranged_proc.htmlsepgsql_trusted_proc.htmlservices_munin_plugin.htmlsetfiles.htmlsetfiles_mac.htmlsetkey.htmlsetrans.htmlsetroubleshoot_fixit.htmlsetroubleshootd.htmlsetsebool.htmlsftpd.htmlsge_execd.htmlsge_job.htmlsge_job_ssh.htmlsge_shepherd.htmlshorewall.htmlshowmount.htmlslapd.htmlslpd.htmlsmbcontrol.htmlsmbd.htmlsmbmount.htmlsmokeping.htmlsmokeping_cgi_script.htmlsmoltclient.htmlsmsd.htmlsnapperd.htmlsnmpd.htmlsnort.htmlsosreport.htmlsoundd.htmlspamass_milter.htmlspamc.htmlspamd.htmlspamd_update.htmlspc.htmlspeech-dispatcher.htmlsquid.htmlsquid_cron.htmlsquid_script.htmlsrvsvcd.htmlssh.htmlssh_keygen.htmlssh_keysign.htmlsshd.htmlsshd_keygen.htmlsshd_net.htmlsshd_sandbox.htmlsssd.htmlsssd_selinux_manager.htmlstaff.htmlstaff_consolehelper.htmlstaff_dbusd.htmlstaff_gkeyringd.htmlstaff_screen.htmlstaff_seunshare.htmlstaff_ssh_agent.htmlstaff_sudo.htmlstaff_wine.htmlstapserver.htmlstunnel.htmlstyle.csssulogin.htmlsvc_multilog.htmlsvc_run.htmlsvc_start.htmlsvirt.htmlsvirt_kvm_net.htmlsvirt_qemu_net.htmlsvirt_socket.htmlsvirt_tcg.htmlsvnserve.htmlswat.htmlswift.htmlsysadm.htmlsysadm_dbusd.htmlsysadm_passwd.htmlsysadm_screen.htmlsysadm_seunshare.htmlsysadm_ssh_agent.htmlsysadm_su.htmlsysadm_sudo.htmlsyslogd.htmlsysstat.htmlsystem_cronjob.htmlsystem_dbusd.htmlsystem_mail.htmlsystem_munin_plugin.htmlsystemd_bootchart.htmlsystemd_hostnamed.htmlsystemd_hwdb.htmlsystemd_initctl.htmlsystemd_localed.htmlsystemd_logger.htmlsystemd_logind.htmlsystemd_machined.htmlsystemd_networkd.htmlsystemd_notify.htmlsystemd_passwd_agent.htmlsystemd_resolved.htmlsystemd_sysctl.htmlsystemd_timedated.htmlsystemd_tmpfiles.htmltargetd.htmltcpd.htmltcsd.htmltelepathy_gabble.htmltelepathy_idle.htmltelepathy_logger.htmltelepathy_mission_control.htmltelepathy_msn.htmltelepathy_salut.htmltelepathy_sofiasip.htmltelepathy_stream_engine.htmltelepathy_sunshine.htmltelnetd.htmltftpd.htmltgtd.htmlthin.htmlthin_aeolus_configserver.htmlthumb.htmltimemaster.htmltmpreaper.htmltomcat.htmltor.htmltraceroute.htmltuned.htmltvtime.htmludev.htmlulogd.htmluml.htmluml_switch.htmlunconfined.htmlunconfined_cronjob.htmlunconfined_dbusd.htmlunconfined_mount.htmlunconfined_munin_plugin.htmlunconfined_sendmail.htmlunconfined_service.htmlupdate_modules.htmlupdfstab.htmlupdpwd.htmlusbmodules.htmlusbmuxd.htmluser.htmluser_dbusd.htmluser_gkeyringd.htmluser_mail.htmluser_screen.htmluser_seunshare.htmluser_ssh_agent.htmluser_wine.htmluseradd.htmlusernetctl.htmlutempter.htmluucpd.htmluuidd.htmluux.htmlvarnishd.htmlvarnishlog.htmlvdagent.htmlvhostmd.htmlvirsh.htmlvirsh_ssh.htmlvirt_bridgehelper.htmlvirt_qemu_ga.htmlvirt_qemu_ga_unconfined.htmlvirt_qmf.htmlvirtd.htmlvirtd_lxc.htmlvirtlogd.htmlvlock.htmlvmtools.htmlvmtools_helper.htmlvmware.htmlvmware_host.htmlvnstat.htmlvnstatd.htmlvpnc.htmlw3c_validator_script.htmlwatchdog.htmlwatchdog_unconfined.htmlwdmd.htmlwebadm.htmlwebalizer.htmlwebalizer_script.htmlwinbind.htmlwinbind_helper.htmlwine.htmlwireshark.htmlwpa_cli.htmlxauth.htmlxdm.htmlxdm_unconfined.htmlxenconsoled.htmlxend.htmlxenstored.htmlxguest.htmlxguest_dbusd.htmlxguest_gkeyringd.htmlxserver.htmlypbind.htmlyppasswdd.htmlypserv.htmlypxfr.htmlzabbix.htmlzabbix_agent.htmlzabbix_script.htmlzarafa_deliver.htmlzarafa_gateway.htmlzarafa_ical.htmlzarafa_indexer.htmlzarafa_monitor.htmlzarafa_server.htmlzarafa_spooler.htmlzebra.htmlzoneminder.htmlzoneminder_script.htmlzos_remote.htmlincludeMakefileadminadmin.xmlbootloader.ifconsoletype.ifdmesg.ifnetutils.ifsu.ifsudo.ifusermanage.ifappsapps.xmlseunshare.ifbuild.confcontribcontrib.xmlabrt.ifaccountsd.ifacct.ifada.ifafs.ifaiccu.ifaide.ifaisexec.ifajaxterm.ifalsa.ifamanda.ifamavis.ifamtu.ifanaconda.ifantivirus.ifapache.ifapcupsd.ifapm.ifapt.ifarpwatch.ifasterisk.ifauthbind.ifauthconfig.ifautomount.ifavahi.ifawstats.ifbackup.ifbacula.ifbcfg2.ifbind.ifbird.ifbitlbee.ifblkmapd.ifblueman.ifbluetooth.ifboinc.ifbrctl.ifbrltty.ifbugzilla.ifbumblebee.ifcachefilesd.ifcalamaris.ifcallweaver.ifcanna.ifccs.ifcdrecord.ifcertmaster.ifcertmonger.ifcertwatch.ifcfengine.ifcgdcbxd.ifcgroup.ifchrome.ifchronyd.ifcinder.ifcipe.ifclamav.ifclockspeed.ifclogd.ifcloudform.ifcmirrord.ifcobbler.ifcockpit.ifcollectd.ifcolord.ifcomsat.ifcondor.ifconman.ifconsolekit.ifcontainer.ifcorosync.ifcouchdb.ifcourier.ifcpucontrol.ifcpufreqselector.ifcpuplug.ifcron.ifctdb.ifcups.ifcvs.ifcyphesis.ifcyrus.ifdaemontools.ifdante.ifdbadm.ifdbskk.ifdbus.ifdcc.ifddclient.ifddcprobe.ifdenyhosts.ifdevicekit.ifdhcp.ifdictd.ifdirmngr.ifdirsrv-admin.ifdirsrv.ifdistcc.ifdjbdns.ifdkim.ifdmidecode.ifdnsmasq.ifdnssec.ifdnssectrigger.ifdovecot.ifdpkg.ifdrbd.ifdspam.ifentropyd.ifetcd.ifevolution.ifexim.iffail2ban.iffcoe.iffetchmail.iffinger.iffirewalld.iffirewallgui.iffirstboot.iffprintd.iffreeipmi.iffreqset.ifftp.ifgames.ifganesha.ifgatekeeper.ifgdomap.ifgear.ifgeoclue.ifgift.ifgit.ifgitosis.ifglance.ifglusterd.ifgnome.ifgnomeclock.ifgpg.ifgpm.ifgpsd.ifgssproxy.ifguest.ifhadoop.ifhal.ifhddtemp.ifhostapd.ifhowl.ifhsqldb.ifhwloc.ifhypervkvp.ifi18n_input.ificecast.ififplugd.ifimaze.ifinetd.ifinn.ifiodine.ifiotop.ifipa.ifipmievd.ifirc.ifircd.ifirqbalance.ifiscsi.ifisns.ifjabber.ifjava.ifjetty.ifjockey.ifjournalctl.ifkde.ifkdump.ifkdumpgui.ifkeepalived.ifkerberos.ifkerneloops.ifkeyboardd.ifkeystone.ifkismet.ifkmscon.ifksmtuned.ifktalk.ifkudzu.ifl2tp.ifldap.iflightsquid.iflikewise.iflinuxptp.iflircd.iflivecd.iflldpad.ifloadkeys.iflockdev.iflogrotate.iflogwatch.iflpd.iflsm.iflttng-tools.ifmailman.ifmailscanner.ifman2html.ifmandb.ifmcelog.ifmcollective.ifmediawiki.ifmemcached.ifmilter.ifminidlna.ifminissdpd.ifmip6d.ifmirrormanager.ifmock.ifmodemmanager.ifmojomojo.ifmon_statd.ifmongodb.ifmono.ifmonop.ifmotion.ifmozilla.ifmpd.ifmplayer.ifmrtg.ifmta.ifmunin.ifmysql.ifmythtv.ifnaemon.ifnagios.ifnamespace.ifncftool.ifnessus.ifnetworkmanager.ifninfod.ifnis.ifnova.ifnscd.ifnsd.ifnslcd.ifnsplugin.ifntop.ifntp.ifnumad.ifnut.ifnx.ifoav.ifobex.ifoddjob.ifoident.ifopenca.ifopenct.ifopendnssec.ifopenhpi.ifopenhpid.ifopenshift-origin.ifopenshift.ifopensm.ifopenvpn.ifopenvswitch.ifopenwsman.iforacleasm.ifosad.ifpacemaker.ifpads.ifpassenger.ifpcmcia.ifpcp.ifpcscd.ifpegasus.ifperdition.ifpesign.ifpingd.ifpiranha.ifpkcs.ifpki.ifplymouthd.ifpodsleuth.ifpolicykit.ifpolipo.ifportage.ifportmap.ifportreserve.ifportslave.ifpostfix.ifpostfixpolicyd.ifpostgrey.ifppp.ifprelink.ifprelude.ifprivoxy.ifprocmail.ifprosody.ifpsad.ifptchown.ifpublicfile.ifpulseaudio.ifpuppet.ifpwauth.ifpxe.ifpyzor.ifqemu.ifqmail.ifqpid.ifquantum.ifquota.ifrabbitmq.ifradius.ifradvd.ifraid.ifrasdaemon.ifrazor.ifrdisc.ifreadahead.ifrealmd.ifredis.ifremotelogin.ifresmgr.ifrgmanager.ifrhcs.ifrhev.ifrhgb.ifrhnsd.ifrhsmcertd.ifricci.ifrkhunter.ifrlogin.ifrngd.ifrolekit.ifroundup.ifrpc.ifrpcbind.ifrpm.ifrshd.ifrssh.ifrsync.ifrtas.ifrtkit.ifrwho.ifsamba.ifsambagui.ifsamhain.ifsandbox.ifsandboxX.ifsanlock.ifsasl.ifsbd.ifsblim.ifscreen.ifsectoolm.ifsendmail.ifsensord.ifsetroubleshoot.ifsge.ifshorewall.ifshutdown.ifslocate.ifslpd.ifslrnpull.ifsmartmon.ifsmokeping.ifsmoltclient.ifsmsd.ifsmstools.ifsnapper.ifsnmp.ifsnort.ifsosreport.ifsoundserver.ifspamassassin.ifspeech-dispatcher.ifspeedtouch.ifsquid.ifsssd.ifstapserver.ifstunnel.ifsvnserve.ifswift.ifswift_alias.ifsxid.ifsysstat.iftargetd.iftcpd.iftcsd.iftelepathy.iftelnet.iftftp.iftgtd.ifthin.ifthumb.ifthunderbird.iftimidity.iftmpreaper.iftomcat.iftor.iftransproxy.iftripwire.iftuned.iftvtime.iftzdata.ifucspitcp.ifulogd.ifuml.ifupdfstab.ifuptime.ifusbmodules.ifusbmuxd.ifuserhelper.ifusernetctl.ifuucp.ifuuidd.ifuwimap.ifvarnishd.ifvbetool.ifvdagent.ifvhostmd.ifvirt.ifvlock.ifvmtools.ifvmware.ifvnstatd.ifvpn.ifw3c.ifwatchdog.ifwdmd.ifwebadm.ifwebalizer.ifwine.ifwireshark.ifwm.ifxen.ifxfs.ifxguest.ifxprint.ifxscreensaver.ifyam.ifzabbix.ifzarafa.ifzebra.ifzoneminder.ifzosremote.ifglobal_booleans.xmlglobal_tunables.xmlkernelkernel.xmlcorecommands.ifcorenetwork.ifdevices.ifdomain.iffiles.iffilesystem.ifkernel.ifmcs.ifmls.ifselinux.ifstorage.ifterminal.ifubac.ifunlabelednet.ifrolesroles.xmlauditadm.iflogadm.ifsecadm.ifstaff.ifsysadm.ifsysadm_secadm.ifunconfineduser.ifunprivuser.ifservicesservices.xmlpostgresql.ifssh.ifxserver.ifsupportall_perms.sptdivert.m4file_patterns.sptipc_patterns.sptloadable_module.sptmisc_macros.sptmisc_patterns.sptmls_mcs_macros.sptobj_perm_sets.sptpolicy.dtdsegenxml.pysegenxml.pycsegenxml.pyoundivert.m4systemsystem.xmlapplication.ifauthlogin.ifclock.iffstools.ifgetty.ifhostname.ifhotplug.ifinit.ifipsec.ifiptables.iflibraries.iflocallogin.iflogging.iflvm.ifmiscfiles.ifmodutils.ifmount.ifnetlabel.ifselinuxutil.ifsetrans.ifsysnetwork.ifsystemd.ifudev.ifunconfined.ifuserdomain.ifpolicy.dtdpolicy.xmlinterface_info/usr/share/selinux//usr/share/selinux/devel//usr/share/selinux/devel/html//usr/share/selinux/devel/include//usr/share/selinux/devel/include/admin//usr/share/selinux/devel/include/apps//usr/share/selinux/devel/include/contrib//usr/share/selinux/devel/include/kernel//usr/share/selinux/devel/include/roles//usr/share/selinux/devel/include/services//usr/share/selinux/devel/include/support//usr/share/selinux/devel/include/system//var/lib/sepolgen/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=genericcpioxz9noarch-redhat-linux-gnu  directoryASCII textSE Linux policy interface sourceSE Linux policy module sourceHTML document, ASCII textmakefile script, ASCII textC++ source, ASCII textASCII text, with very long linesASCII text, with no line terminatorsPython script, ASCII text executablepython 2.7 byte-compiledXML 1.0 document, ASCII textcannot open (No such file or directory)?`7zXZ !X] crt:bLLlR?}mՍo]_)ck-a Y}`&X/C$?fZYЉ!d벺z;$v bx!"H% !,<+Ρ )3xh3X/!P.u?r1v0"qY 6XpB#C.0. pp_cB̊|*ֲ҆='=q*\][H سNַ' -}wmնZn!<(ԫj>Y{4 2JR:r?r{A25xm*BYp1 /ήЍhXi[Wf 6C~V^43);8zU\ێJwId[; Aw*c06`-p}yw 9?)tP4/V2Y'P<0Y~D~1F=FXr8'm+!_!2Ijҕ8[wK89QTn<-u5S.L#LإJC3W w;Ih4sŽ8{Hݘ?L\sceZ 1&wchm357&f9諒9M3/q~b6~cQ`SvH̀6!f~ŌqYK@f#]$WovvZ:؊B=e Z6 9>L@པ\IX)b˟br䷚#U-$4 bE 5SYmV5#AZXMcN1ㆀqCQv»"( !#mXFGY |f|hFs)Z o ;`cqļ?. }}0?ێqj7Vhv~P U^RTum:>𳅳CȜ NtYHL_pC1-"W䆯~5v?<<36b_v~}&z|[etR\ʛe?!%NӚ6w#\M}׎keNdAB#yRnaAX1XݖTh Eo:;}?<R#(ŇE]8?\)v"Cu#K&`8J{⺛IXC,'r@8wVx+NdZUr"؛‑?W)Cl0'V1ߘɫ-6n6$0&*Ul0Pf8zb=mh#p_^a/8Q3h8Db>CO@dMt {2˰ZƳoF6]I?)O:&0o=78zwH3p9?(x|[I^ȼ겿g]3 U@ 2/5&K#bfA|7~^q(2g uVoVM,D9P@uۙ65рx-Xi|뭺v)Yő㛀i>TʨNLXdɴ23QYe x_\@@ܨ H'pFʣ#WV Vn)7x^ ТI=N_Y쭤@)7Ą۱" w _ ږ(=v%1NMAե WxN7"̨fTUcU DIݾmQX .ZuU~UI}o}:[d0 ŷZNC߭9[CNL{譫ϢUPnUfzLwQ{y%m舐酙.̍l0=${Ɇ;01ʥdA5/M]x޴f(T*N36>}$5#! O z\E'!/O:~z?"JP[(f2)~8 w@b&P $s9(|ds F(߹ MUndM,Vzڑm;P(YE7@E+eV%8>=99vDԢ?P$Y_p~I ,}JG+j7`a9f U'Hw79=b_z,td\{$(b硤l?J8g+mĢPيaY=51i6IEx2:|0BN]KR'zse°KK eMpux)O#FFz`|1ph<0P_uyI)fh4wˤE){K\Ržv©~SXha fP5]tk%5lz[,뮖#襈<6@྿ܚw }`ln4h~x瑞u e=mʟCWI*v$xh&$^e3ׯysNזl%p[oSϣAHǫPE!07 ߞUn󦘩t^&G0;c6e8)}s;^k`ZXe܉{3]ǂ?3dy9\L80 gD‹.H(٨bA8 ͇ Qc6WID)X6B卙l tCJI Lo` 2pXvȃgFlX:?r&*^#@iJiy0gG9)WI{*W`@o:C& 'Ijx יҧY!~ 9qq cϒ]Ϭ-ZDP m`֭+@l$9<[9Z򙇮هe>yX䢜Mž_Q1ުS6A"Y2Sc,s%cJ;v`(wXM+ق /]X0x ]$2mALؖ+=TG2:z,_G(OR/fajWy΢/TEtc`#*5ƔXwZZP+ gW h.r)`Eub:wI.lWQp#.<9.R~ ybPq?9M]ELb YmvKA]LƦɨh  cș\uh|6!![E.K%m7LE&j;  zj9R|*Ķif'Y14cJ͜X e$ps]+E2:dg%;d&ۣz~8Ha0c$&{7~)Jp@f|p=sQ OzTӑ,Q@*\d"bN5DZ~J2'F ͗1 XEIf3 -.ïazT6~;Gw; 1'抖 5R'vvHb ܷު[! O1؈QO멽6WL&"/Q ].$VҬEKǙrOϽo ,ss1{񷈥TIOHxPחPKT# KYl${}x%yjnխ=T:~;翈rq[6HZaPetD|]KnY V[!۴cJ$/0Ŏ,DH#NLW8D|a]F>Z-?ߴI#|tAiJƠ}#'h,H|lVHB\xL􋭮Mr(z;c-ɓwc$U#sCX'&+UZ[2$N6T+(8? xoV&s^kNGwZ*ĠmviL6C,-EM6k#.8{g ڝ@0goveSm~<Jyڧ㣧G;fo=xt?& >>lHԃ#Y2KQVTh/49PdHvǷ8| ?^ c7[CeK1cfKopkX_{3[ΖQa9̩QDlŐh5}WםbQF_^=w7Z O$r,lu1n^û>emAE1/j ~S[c*`ߤU֛/Ur9|E6͹BgOnFjNz=/m.#N9!Z.'yg/4[,@f8E`N]~DMD0Ӻd&|R`}InRtR #xzV++.oUg&UI9y/Z 6 7n5~R,O%w_&zz\`-lHqKJU7m n燐gΣ MS.Z8F؏:nwwfP"XLK2%DZ g[QztTA-3RKਰG '7Sl6n.e6u]/&IXa]!lBsK;S4 OVɇy[br.TwR&Ecu) Mn*r&X'!?3"=X)P1޽' @/IGU`mw0&.ԄQeddekUڔvLE@fƊFKJ؋ͬ;m0/.z啲uшx%D/ÏnMD)*",2.*Л/v@A: ?U%~ ST1j5+ r>\+Au˒6af5 ebߵ:GmM4d'Sy2 -l>e㎰?1P@9ɚy5w:B'\VG,!ܝ.4ed6_aB~ QTwL HwP! Ɠu| &7 | 0ZGp vjb A_mkKFe׳,Q#j)7N-38]Wl-mM?Od..*w.1"l E{RXElbk`5|ߨnValL~G,mòUW; q]5s^tն78O.&Hpz\5\8";m![:yh;x(9Af3~&ޗy]u48Ɩd"R>d>ÓyRf&63nw00V g,Bub䀹)"EPN /{ƄcǪ[XZ} T0HvC{rۇ1~*(ޏG (͆7-o1o+dN@RfHrĦ*&ga,١u"P7+עNhヽVڟs# @6 Mlx`fZjpdO)QV#m,OX0E\ XF<"dfts:f8N[ Vk3lTqԩ7 XrE$xl:cIonېfX0ώՄ 7:`tty˱z,w*Qw~r'\2q ɼq .NM~ڌB/ H|Lm M2lBa&qn9LҎRN7J~FgSUQeA8I3$g+ğg"@0 )2>D$ΪkٛM+:-$~_@3^uMI)=& XNJ|ti6q@n,sʧ,8F-ﱭD[__ ̾g v5Z3[:%+)`-7ߓ:ln]MC>9ﯲmS5GJmIsm.-okMĝ FRԵ>yi&kv psp[cv^N18*w/ɂ`Pc+O\A2=#0}ۛ?:c`/~hKs m=:d;FV' ҎETfOҼbbnH4ikyۼH ,!Mz"s|~vצ[c_V{>̾(r& CP q\oQ[J-X}[{LCoiJuR*ÖPk[ϸVm/Ϫ#]]@!l+ #="C4?-&Q4|[yyHs[_p_.nrx&rμ'ᨽ4fcf~̓u(`9CP]g@{e\J82LDh}FK%kD zg Hri\.[Pkww":0D^\G.g&pcu2# $'HWreiL+k{ r),VDuM&X?܎ư&1ڦ _c<F6fn8"۷ٌvuկS~;*buaH4OZfU>lz6H&8N#8a[λNN3^~U; ]Y-8f6Xs/n\/8x`Jc$5ZoSl>fG9Q4@LL|yWkR@Z`_X~3Gh$ʮ̜eWZDA A blzW1HZZ(*_(I98O8ƳĊ(v^]2$.*I mфR$tq[ARP='HGs2 H=\d<%^yǛixy~Y̖iq ž|8;ᬕD'pH_mzoLl?hc'EC쓡wRFd%w+p~;#/]]$#jgH+}e8ל8 t ^,>' sb P!mUqyܧ YpNrZ^L?OL+ͶFiգ?<^pxpUƼY^x]OqU̽_(_= I fH[ 2:|Xi Cxoݽ8~,CcB=h׭~'..,eM`az19!CCEjU2#}WآUtLzT)+ Ug&p$1.ǫ*5ǩB|ῠ߫>tc3nhe=}>wÎmcOG߇׳Q9Ny7ŇaC2CA#'ɸYJo(La7[C_Ұ1 gG#Frس}wk_mdnbs,z p cJG7X><*?[ WiVL#fXs2c`rh#t;'놃`Ar64)s7 7ٸuk[=*,P6Jc#۬ kt"3Y堭k{Aۗ)Wx.CםUYH*_o,md}V2lW8TۖLzijy5P;p2VGNU#g3Ð_+3Hl,K(UkV =`zF.?I=aiLPf4wۏL6}OK2tȦ6S2 QNU4LnTԎ#4Ioխzx;I%njh?/sySjя9aJdg* D68 &"aa*- J0I$ZIK-t2^,wm*?1K~vNn\D;Ifx:[$T]t̸d ĨjiEY$Nz`9<:Z$RҫFE=I uUxXH"w\euI"3˼IF*; Yc׽# Lֲۭq="kXҐ)+%Ss{+;\^؄Rpˑ>PWbEKt`\БCک+aq!/stJB<(_ַ ˿ uL' s XHf# h7J`[tЗY0> m){b"l3/Ϸʜԙ4]̕t=QH)uXmf&eˋ@yc 3xQ4*AxOΰѰ@8ޥѷ/ nIVmLJNlٵh]I%9V,G<;#&1 S:2fsg^WOHb*%ZU8OH]*{$PPr#}S4{wJt,fz ǐOW>ڜn2[)"a=}r) 7. WV>Ν j/`xKxq)*l`GԢi1r_ f)M`&;w"zR0!;֧`a9Rro_lJfkL7{1~ u޲>q(= e퍋l~j^7^&S2jtx۹l>:>/wO~~D>1ly#86qHqзFd|B0 }W֌nN㋀"Hi(Ǧ@ pǪ **=lu0CPs {9 S:woP|8qj}juɁmY@@zKTmH..zf{VP-wY[ Bkʤǫ4فR늺Fē`bv Ӿm*X=u:D_dtAS MS_N9Oy|.d$\ :sȌHv$Î>뿎 ߉ E~ =lZ2ԱԶ̠p_6Q  0 سHTc% ^L۽*r`K3 i3̀1՘(e^rL& Q!༽j7C U03է(A_#'Zj;^HC!lfR”nG2Gfn}dAl4jK RI9B]ئ" qˤ񫄭2 C#:oB!bke׉HBdn5qaz5\ld|dߋ U!qo /afwmo*u8zC!zpbٽPƂթ}GP'ĀPcq dM5}.!5E:q׳_?>fm 'o\$%p3"=ep!w̫pEWCl,^uu29$zF2+2X\eNkoU`CtM(OJ@G04PtUA9c7pFezEsQ8ե#5u_Sf(U~)X nd*K?ޑ**(i 611I'Ubdװ*LB5j%A ۤ|9W줇b[4_\yYǥ`IVRΌJ`mR?|/cy f`$IPT#"fS/zxBUJ(;$qLŪyFY0aۦRuT"^6Y"wzmT(LFF=)VZŸ Tke!B*TX|+q-~0%/^SUZVYr2mUb|/> n5wueנ+-+ҟF)W;5d 3ޭS;>m>ɸwͼvbpLc;W؟N2qiDgHifpMA6"+2ӗ+h?rݏk9EIDsK:ٚPS|s4RQ,rlψqK:C9 {.w 3oCsZdai|@ m}, fG{V: Ǹ3ʵ.@4lIOX ҿs Mj~Oe`px"%hLͬ+ g;wT6GVP\sDͅ8Q6) bWFbS&gR`k  pUiLx+߈![+lkWhV-6HG#DD~ *{ksHp*ڣ&(I^q(GנvJ6d7 ao3U-6Jd"穈5D{|JraP%w&@;oBԽ~e(¢Lwn^$AwsWSK k@/iRGpuLu[=4LYu@FTV4pI7y'6}!dC:]~OxN9, OJxy{4V 0YEnͯ ἀ~iHUY'h ϋeJܥ*7usXwOߞƀ$HrEpxWlP9cDslJW9ƀ6 (9c@;aFWHp x6Vc#~;$&EsR0LW*/lyzE(՟|^ 8-\p ZJ>2SeP9Mݣe0 c9$CRk:Oe i$=tH>+,#GN㓷ɿLCǖ-rlC25@'Uҋމ}Ӭ5ilG*o}CP){$ceW:|SKy29 "Me+nM}z㜄Yc*$6*,.Cӡ@tk0ta\ɍìoӵLC8QYlZB®1{x+k|_& @gܰZ2]._f׆"<!Kq2?t{_|RHb>ֿU#Bu,0oǑ?}ۑuf+GXz61*Z9C9|_]c;a uHE~9ax ɨr?<{쑾cO92<~_&6ǗpϓمmINE)f;扚R8fȦK2ȉDLIX;yY5P-&'?k(A C+o4a^O.WV*r"^ o9KzUiT<KKM 1"hFarNƐ ˄€K;. V(ϟ0cE@̘dJ@NjكT4vRJ=HU7$FٽY,[-{@|Rw70Xk=qPd'H[7Aij϶ -/½ ώpCquBdreTɟ3Fk>}/,EbHNᥭ ]{J5+%F餞ߕbtIV}(kBzt oyJizRH1iz|{3Y}ΓRԋfb`aR^z36ƨbE*P6<ĢY<╌ӛUc924g8:c#KKa\ƕD=_ChpѢvL>i[$ob$[<:!OKȢ=nh nbEݛS1u&[⩞~?K,1re<)_Z̼y |$ 'S/)3v _ ЫS ;Vs7tP ܳebvM|TB9A2j]~csZ.7IbS$o99tȲ/P[Cՙϔ<*tmV˜qCÚRoih XO1`iNaa"B2UHUcE'TI1<=NT_}g _2uʸN)x=T+KԣBfs߯Hv9&xaϾ1HHʰ=һ2a{u&E[nhΞL˧TcdP7C2kꩪ_%aYOzZ܂tқ.!˘$W<($G`%)&t{6gxOy! |~ˏ\x@Cm%.<-U{ @J5275H"ZU̍ȗBLl]rغ<7uDwU7Ix|F56Fefo.$Th$g;D"+WX/7QaEڒL JKaob U)uAg;71f-or欽\p~?`޵z"˳h  r5ثP YVMEz>F̥/!,C*~fBLD֕vkZݻOPceqKtɏ3 7Ⱦ샱lD,|RS9tȣ:#=.kuF03M!D%)$Bߋ9cFFfJbrÓۡQR'?|UE+ HdH3Av[e(!?ۧa=|F)L/5Խe7ub(m־R;4ƷN+o-c,XP$PVeH'{v-Ƨ %X\C4EYYIL/:h}-Ua Y:aFB2Y.PXg~0vϚ1EN0;g)Da`slUXa⪎/@Ĕit=̇EY 9p>]qgx$G XNththzyJXD7V?4'J8S͔ze*MQܟ]Y$E:n:"/D|uvImX,|aa|^)Ѳ=| t{pIu=f9Bl '$<UsXqguSu 4X eڨhhf%R 9.$`bhWcZW(q%Zl9v ڽp.%>;*-%uo~YV5gSАBren&iT(c}9Ar{s5E([fA1乇PgP7qX,kxr/ |{'jFyΖN*? M@VEFh¬4fG$.-WgWo!Y*kOQP<DJeMbP%04>O5%BWyUtt S Fm2{#Z!hV7Cuю`ߐۧJ r12oYC& qG[&3AlPA 1O2ú]{C?)R*&Y] xid; M9!7[^-HI1(U>'MyfYLC pqѻHT—08K1SOZKI,\B'RuI|'|kq9souFB)U/SP%׃g&^5`FVnH`Ql fmPXB&'O {;yPŨ7RWQOnآM5V_Ӽ̍>mb}-Gȅ::pĞ,ZT/3ov喽1dE趤YP6΢OBQ}s`qO {@rLZ, wCUkՑӨH=&p7>7=8Ԋ+O~Fhx2cXm0|kmѸ '㇟).̘ױ6y=pD MB/{8˲kM)<2@ԉ~n52g4oBgDH'_-au+We<>Y,ֺvDdh0C֓\6gC:s;ֱt.3k=gRuŠN7y\}ne* aV[z30.t#%M?af㵿YBPc h~k@I r+9UI>WVrl;`2!i#Xo /# `Nz *T4{AOyls 3QQQMOXT>g!2Uvqܼ!5Zܚzoۧe2\j%&!o`2oE59Ukdž;Ta;nY}- ש|gIIULC&\:ZVGY11 bʿ-WN[+iwn)!>zR2FG}2%o9Ȫq>#y⍎nԘde[f46Z,XJש78Zt'=7\suRrAr.I_'/ = oBg8C:RSnz)M$C>H{6-/(2e"`.^QK@~va}]:?Ҿ.vCyu@Uyǚ KEZw'3TFpE+q?y7ʀ6Lޚz j;BZS3p:QuT=X~|c0e:!lldV43/ڳ_#^3K4cEut~O>;љm_SҀ. ږջE6 7vt M&"٥\*S5v^e=g" HK.7"HK<¸%yM_ [3oZT}a^+k '>ݿſ}x}"gϊy5d)[ ^;Gy<+ȡɣFC{b${EA> k Vw}ԭl.j`C #ߏ=FoP^ˈ*a__GlxzSMe$%NoM^ _nMD%W m@wJN߉4F06p?$x>wVҵtx [эCR߯wjH8'({2〗}Cˍ>,6&P* ;jIM k/IN} (WNt3;B{7lL* ISR_jۊ9H&n7-tKRHCB+zuvU]CN4f6'*blgYgQj,U`M[? pM[Eִ%e+"0^/h,+]|v\z$7ڍwSLM6Ki0hqӳd,f9G9~ӠWy2:E|z/g-5 =>+u ^B7K/oaqE4}ωI: a ګH>9,8GܪHJ×0 @n4u:d>SK>,[Phڏ9}Q 0[Tgk<{ލLUTs)y!ѸRN"qNt*1W"wv5mg5waxua9)C.NpD3'h]E\!٦oS@D'}'dD,QPjpznn%];HJPlQt?,MxVZ6X ^ XYF>G.\m_*dYfZ3:  XP+qxN%'34 0@LgU|a?o"]3u2%іO-Tt hS9*I(ɨkoCF;.ثrt|^ %2,b-;N\o%+B@5kW jIx ̜9bź .̻uxȺ߃T 暛P>aW"?Ue/&GMAzERytlL:_Q;RJ1}gʈ-ݨEȍ#h %x!vM|$e\)$d9dgp>aisiqaRR5- t"䣒DZJG[]F |*tY sHѬyS{Hq)X䩌FXw$;Ӵ,d2XC74|?deUy_t'M%!oz k}Z|jvHyЋU`w~d2@˭jKD=I tx B"?4;'q Pe'kIM-UOr@bpU=c*gi|C`7D(g0@,ijCK'.}m2a7C;}2& O# , {V#T薹ys`O@a$83B\&Qb$N}-5a>v5մM׽HAk}.ۢp>Lӟ8Z`ip{L7P#Ͷi0N0@ Qgug%D|z &R34;kR䥇۹iFM[2Zꅫ3XEw㚿MmLJ6B!KP2\F"pbC=?]>"q,JX[ԣF7Qc[uEq+bn}[mET\} ߪ5Ji z [(7GJ3_,(>QU|˳ ᅱF*aR̗]A7yFG@3ӶM{gS.(EqϰHHєqX ^cUyC_#el4[2zq8hn&(Aw&SMjU_ ?!GH7tL@\;͡4)xkHbg^SaV|@AIQ|*8"yb J$ܒ|J+3%+1 QZP,#觭Q=<drL-w<+ )809qt("T!YO佔6)er6EfkQ!me $ȏ̥t/*ք=_!PXtc0=]w"W6 mn/W|yB=ۑfGʯ2$Z_M-[y]sHVd$fb3)-8<6Eر+1ktjT5YrrLѦ]B= !Q!Zveɢ*:̒nZ; Z8pe\pe2Z?9?#qy0@!<:+,ɈnpQlns&ȹr/\ #mXIDec)Kθ*9m+ p7 .}h=P'hu-:ZR9F1`@OvgT/-XG{z{%ňFfXef!"YU/[T}|nxvܰvyտpoK4r-O ™;d:؊N1>?.7Ӥ>6aޙV״1 Cٲ|E[DyEg6'ؔ_1fj`ܱ3Fz" ?Ȑ/x9CJg4Yg~ >NOiOQ,-Or9 p].% @᭹4b 81ADɽW,S7A˱NAQ*m*M(ŋ{bL&p&}1vp{ĭB;8L3{L j |υ od>1@f1ߨ퇗VVw?ƗCzGے2<7gHJr'lTLP *|v6fpyܐ)[[wy tgGj_-vdеq7E!U' WyyUFr? (//&2-z @gv̨@(C&˂ZՆ.Jw@}lU[ugΠE:ta̬a,Ϭ=38U9)*GjUe_;=-ėȢ@tmhGA]2VZ \lo咪Mt'clq,,8gO9 |_x̥2&U^maK4Qɉ۱GBGu^P2atBs\/,-EUS5$'/bmWy g8פ*xi_Lx6`t2*2wVن*d z@=6Y2{bZ6N'< a='_7d?IN8^RZ僃Lf.~s he2qU!x3tQknU%//Vu.S8F)PbE8?a*߿+0`ltlcB&^Pfk^k%χ̧n=(J\-P3[\ P7a_朄S 4),NyX\5䙲]?pT.bgQvP$SL܅57Mߓ]ͶxA:'1]yM:o^i*n`wzj˙9ms}9&v>-j{Us44B49N3 6N# i-VNg, kVUt%lo\ b_N,#8XQQMJ[ ޔ>z8Jop_*ķy4SMײݺke> ;ش&p39dλ+^3ʜt/ر P)h+ӗat|]u#M -0pG /nV' ȲƷa.ʮRKR5z#+_f3Mb#|,I2JF,Ydt)MTH%gIb:,hN]T܎^e{O7f o 8Q[>B// |h$.PNkcUcXݓǙ܇y 5C8'IxM ~&r =S}W@q{DX a@S NylvP촘sGҰ7)!т.l.&ek;IMED:WVgTYWO*a_{aD=+~A9):Z vnF [4 ~"c+.!b%Am3 *`h5^=]6ػF {I7O L2 Jb*&: ,%6ozŅA_‚]Ll[I1rp*42Cu[PQizqZ‰_p/.H}UWFvDwBEӄM<|#sؚMgkȲ3GĚq *`Y8eb'?,BsyD@;f#ꭈuo"pz eg@wsv %'`Z劐~x9%uej4cڌGq_PEA@C\G\F8Ra+-,N8w:qe'~g@ӷ ItUi}%8m?-*mU5LEٲJ>`LMhp 1SPݤǛ׆\s~Ot3w3UGm2!=ϺشĚ_8d ޴5VG׭>ash7pE0\7,LrT2# FXv5m`O˄ qj6L g̨<VG `V]vP. [~4lWrUSF۳xaN=K5'uHF%|VTPx=gN ykQnZPq>KҮ[if$S8s{"2HifQ1z! 1>nvU'ж%ֶa$WUoAؒנAV03+pЊ,[10OؖGݶS2#k"oTb]9X,V;}}Àt׃$5:z/@pc #٦Ew|#.L?I$K@Ũ'},ePI=渀B ]63+q*|U{GK0s1"Zj RN&w SB.%qF .:?f.h28*"P{];; ęef QKK&Zx:A#мt֨l`RU؁F90hG2R')\դmA-ѓބ4Pg#Q5ĵ&}o17{5K*ێs9b%FU|ӳW+qG+Uٚ9p?^G9~gq,1$i>PHɪe2QOn~+`O"Rj:%;Eoo7K홂49._R[`JcRk"r&}@yar< x[G![u0NDmB)ǀ5Yj\<\᠖yA_ Jy, :"-է6c.›{YP#v>xzt># r7JLBͭ>7{F#OQtT%AMG 9!ꀧ͖ƎE*/2yyCĚj49U^G be՞/ۖMc'TvwpѰ0EOvSBO@q}L5-NѥҎ8 zg+S`>|"ɔA4̟;k_;z\nop4^3 QUZ ٍPe=go Ki3zf/9:a%`8zXia.._P?d+kKgj]eHXi UAlZۘ|"]"DZlxu hcwq.)I%(G|uwh\ &6uz)0&[cV]z,ߡ|-t ׇ/CUl[Z fLpsG=FvѦ /42]u`xXv?N !.|{=:~,'[85yVrv r`\K,\Fd%U+ssgxv3e@'/h$P7׬'LFev>7IBcLm R1v0]62+>(tpdRJn /^U rl)S-:$c'`Mz2Rol6:E^&?$A)m9NF/#3#,#)7I%Ӏw0pdw=K (DKfoFy[IhwcL-`;VZqϧt#Z; w'˔}K+D#6*q2DK`:y_2cvljoM6pŠؾ?^Xj*aMqG_wJo3;s[x ]XЅ!<6Ů$o)!Q0 \]^+8"5kF=f7Xy\e˃6ZD3/<;wBWv<^^_܋&i2@y ]Ũ1tj澅r)`J;QܳsŽ<);3n0뎛 fNa(ÇX~:)o|Y4L(;p#ɹ+=s@e.>v)cbM(.ǐAݱqK7-v7[w6mL caFCnHJO=jn}Ȯ>M1M[IW9`UY.[;kEnM"lCOr)4uM1vY?-v,L8|zN`LU+X1 >By˰&Ab_}ͷ4 xJ" 6:؀O~UG1tMwהbWE_XYkw0J=cO-b#vqkH  3PMc13`jvmD xӲT6 Xqt`#5M n_90A4R*'-YSaoz9> C1cĜV4e:g_)gN\f`F-T+#qĈqİ}8$Ը.ɅH}(!B/&^ۡ'B?}yM#NڪΈ@ /|Μ,C -r 5ayk5$au%ޚSPsxpU:1xixg0!𨰣du3MV'qcO_ ΐA3F曐կqDTŒ};"R y_\OeK]|MpؘQl&[.lw2cWI\1QqdqA@ڹ}0%N@䇭e@T*n=b|N۳ր|x-Uhp~NrE *,1P;QM,VA9ns`(([fncyu2m/$s%X8k6Ԥ$㡶-H4~:a" V>!TmΝe 1l=WO0+U71I`>*վ[9A 8p|H$AHsʲܽ2a6#cDV.& *_J&QnKnsKZ23[NNBQ-O]1ȅES8|' 1: `;W6݀jݩ;{U(x;ҳG,p ɛ T%^tQmv1Md*E2D;HSXmϜ\F*ƛG+5%vgҵAA/k|1|.EX` ]8,?+4Wu-3#nFC}mj؆IN ʟe],wKeb|jTup{˻`ěSӣpu6k2F |&89߮R#goLP_T|F3hl.rw"|uE_|9K x1F#;+꾘Xv"#L [TY5#eZ>crÖ)6_$j0v@6&Ւ2”a紝d| Ҽ,!Uh ^W1o>e${M}^7<Q԰G}6S62$XsqhLX"̪V~ qFc@6=~%߾$&`U&2 [aSh>-u1ܦ5\y֯YZ0K@4IJxLf\gi2=1MY[.[0|QJpYEnX: r(]gn/ᥜe\J_e x)pU ;Iha{v$VpyxiGaIJOa>K'3 sl0C\03E.wpRCK3۾?D`u7Su=iˉ:[ayQЦAExdD"z;-tХoE.v4 P hSPZV*Wm h q>@)P'd)9bCJ+:ZtʁɠGvAK H.n$ͦx dĦ0R~Cږa`?2qXs2]=irm S6_d56ϏN}I;!8Ѓ1m;*{).Fp4&^Db9Fx 3mw24zIWDiG#&R0YlкaF$I7j#px[d'a|!dERŃ}8a*qY.Rth ҆DtQN z12mq9!w(/EVA"fMBDqbArӯDé-w#&&vƷZ^@!#Ҧg|RƑ^K[KzR>ydƉUVx 7_H\?ፅVOٚTV6R̶}㵐u5GQ\z:6pjGWE _A{#Ժ}@gtq1T$ skbJ{c^"qbMȣ $qh9R U<޽nB.C'}Y;l;XXL {r@C!J :۪4!;؂C`4av71,ҦB<5+؁>͖|"5Gf+2:Z6St*%Ӊ5Vwjgr6@p0X[n& Zwt,:mU˧\KYD']ʷ^"$p u}4iʶ ;b< ha]uzC]Um,Ų<6@Òr0+z eN6p܂uz[tVη`m|Ck@3יtT[éQ:"T3!YqgFĢ\a:V}+P~3H5mb4X7qcޔuT2I3u~:Gۏ>qGYDFc1`%L;1 Y:ƌ}-z_-S{$B( ex ,\1IUzsr𴤫̏Ua3ziɴJ<{,?@]nd9dPb(Y:\3"2IZ $*"֍G8w~If3(*:FxçPC 3 Z&n`ћ\$Z~2T"ۡia2xp= TeZ8\dIk [~St[tX7, R"7Aw܇͔NnO$@Պ X_#/WiLg2i劯Yu,gB &7'wgg/A(m͛i)nK9*9:]%S<+e/D}tO@~+w8k= =;Lgⲭ%|O u: ]GV:r<\:,7hu?I5*,P@2,1o-.$Kg4ȗ#:א.<@~kle]fk`~P$ˉ乇{0g rpd>y "`l0)͹[ &ɼ@Ĺ2uww16踜`)|=i;h,xngp )t̜pLvr4KA,yԦH_5nG.z@Q'.sQh,q~_ٛ?27\&en܎[G4ȭ!ACH/nGh?U =F#-HOsaQV|GuifN)4>" ֮tl_ٕ{YXV1LsZ!dp[גh+{)9D*I ӿtnVK?ǒ) k?>M7L.TSybC2ztH];Θ]֍UTĒ]EBp5dQv{SJSuz4BɌsUb.h /gS~Q.lkj Н_Lk Ղ. G.> 1%E46 #KMEr~+{pIq UA)Tғh+<ڙû(j.wdRIn`NJR03'𯸋bxۊy51gtC?&Fpc!t\2dyC>>Ki2zAK~VJGK+{{I.⾩վ{?N08!~ +1 8&Z DY#Fc> G?UL̀nuDc5v䪼@Ԑe]1j^j5ǪжZD͹3+CjnHWfy5E*9 N@i?Pݝe G4QJ=:2߀P˰-6rMQ(xG۔.76`z`0p"Hq.io8jx U*{M]دl£ 11!{kSc o$|he Aވ %gƃD4 bU,:vJ!2Q_D;Ľ3(7l>&IȂ y;',MĄYkSf;&:-s@1ߟѾ̀5`uׇ$aMee[#? 5BPH*I7..~@IrdIFXO߬>FE1B׸$x AqU! ң ;P3L9-,fP[yz,b?5]bsoF,8+ew83'rhFXȷQj9Up-5PEhrchtqe7Ӑ ZCkQJnyV%Hzki_ 붍gajpː A+Bc;Ɩ 9Vu&Oޡ8Nz3HG3 M1Z 0(j83HtfYܘ âSF~Q,HP *ʥ s»$9b h#G'͞25$HY9#`" i_dJA톜*D^>uފ*䔣 + qTo Ҽ 2N mɭsqJQe*K/!0>m Wn 7sӒ!H劣OSۯdar5Ŕ ,z--elr>;3JU/EٿײQkX0VEO8cn-!~- Ic5%{>(K]C8/"a y1brr ]Ocy r! 8`'F 󊵉j94?F1#]\MTFFnƟ(G(j1D9Hoѩ ݜmPrYsm*ʲAtܝnU^v S@*HHDwlC/bMV`X`jM.8Z׳31:Oi%LM.\NDdg | |{R@2[2e, I\(+l 3>eyo.C`rѮ̂?!ϙ,}pC֩>-o PJdL o?dOAk)!򓤦Ǟ]N&jRFX4[IBvr ˜鄙=єVk[/<ƇKr!3P&mb\~W(yL&(_Yh0P_axz&&TۊKLM[F2cV@IRqǶ/5C B_m2ystX>d;ܫ2un_ Tg> 08{.ktӋ՞:YxB"U!OzﴭbZDj,Лq6q!;=m^wDܑF} ;3Ec>Mj&JKӀ:B3'w!vҿ\ɔO3,SAepэge'#X .|(ՇU.fnJ#eHOK5Lhԟ'6E*l0n-0}yY.U0$ΐVrqmW"q_Isq_p%Huq@03tigB%)Iڣ[a#qg9A2ro)Jr2!*WOϠQV"Ń+dS;9n~q׿i!J|O=jV Z6.1˙," @DhmUAgo$ C!iBeD[4 \ rGֈ$O^?*`y <4PXR'kT5c@nsB}S24HG CQ.Xrp4Io.M D2L;ݤ[8t^8cX\>j<;L6ޤ"_>uϰWNN:Gt(X|J9 \h4UݛA{+G(}Yc uqu6I5ư( o:=-X}A?o'Z"L'=BUJ)<$)j>, S Wr=L_)peFR t;/#$]!I{؝(7zFi) *@1]UtC*P-tG puԶG@y4Yb"}Ӆ9e8?z%pWjR:_H pD detx+9%lC3f=GdWY20AkisQ~.XqJl9@'o.Kt~uRz`mVMҚ6܉|ͦ({ʹrF A3%|! HZΉE [R3mB/Hy_ dWX1 ?7 RJIM|Eꎤ\T(eu24sЃ 8.AInW0/s2bqoVLZWۍG@hz#h~^DI:tu'6?qP鬔8\X$>o lc/w!Y`t&&tpiHh@Jhs>P'QiUn4B̵u0xȔ [ o >kxd>}[H\Gg hZmۃ|"(jx%kN#g4h |%f=pQ{jy_ߛ 5 ضMGʏ-gJ2S /~^/%򣰆*MN+{7rCSOO*WSct~4)Zҳ}J) ⬄э_N ղ6b!IHkTbz!a.fI+wPP@~zyڸ5584b1yu_5YT]`pފ|I{H>+yaVgt^nJP\iMv/[ iI_Mh6D?*P6-8}b*ʎ0vpluۨle1EK9)@_Z]έ dԥd]D6\W~nN tHV G0> 7yP ̬sG gf&X~vhjH0 5vphqubq#6D  N5AK^$Ƌwh6jj%'#{19DZD,ڱ?r>YFt{.*b^(& Xn\WhX%bT+JjrS6"@"qi 9j OB4¹G}ѩ%l4bP3Y[زTG|H:Lv_[)]=so ɣze#=*1j` ;tf'uE=^ |?¹*jd"Rl-;ڭ\pyvB yvS: iYn/W9^Dd4YgPU=: Nf/c7BFEi-5T ܏sĀ_Lөr=hb,#2ݭ)Ft# 㲞cFAP'=g8xJ|ǔ T%~l@4@oH۱aΥ S ̹J }ic]L 7MaHS=4h`Y-gθȔVSc֨>J]>! 2 {/5-Y⭩G7-=Vi3, cg[xGJeg(B2@DCgkOTtMS,?}aP$>lasS3ġb̒YϺe9d2h )-{=r-m!2ϓG8.wuGlDrh܃~m0X)PUIH"[Epy_TY X˶w4$谕C\~-y)nrǸͽC (ӨA}ڈJ*(Ri% "S8 %rәlJёG곬D(NH :3 X~0 Mx?O /8qTտa'y}i8iv z;[MPv,j. PɝT.#I~h=H nqW2`0 vM$G^зu .rdž6xk3jxSb+*?cCna8Jm{K{ py!K $-__5{MGܨ-x|!!s({xR*at)WSxGN>=8DƖރӺB#a/I-ŏZѕ,,)eOKXo<Â]P#ka18}*E،*8!-,gu_ikLU!ϴq 1<˪CZf_'i[,`WA =6OMFhTԵ0p%^rjld1e! ZyUR|1vV@9ٔ@xGfVMeG;X>D!TkF5wa8ؽiſOc??]>k8klntgT{OMb0{U-9gG!߲} S??#!kQV+UyD'KFE}C"b蚹'f!h(` mҸp]w2q)Bkh(61:B 2]6ԌT@ӊ#%3GʔvE:y$8<< $ 'x]H2#ׯ!7 Z.;ÆlB&%An*W"s(\03o} !u+_B~ʼhaDO~J+SA;{X~Y`8唸7mݱeܤ SΤftS#XF?oNH24,lb\VǼbSc*deŋ+]߈; 3gogljNx.oiq 9@QpŶ*uL 0jxc-W!KljfR?2y@DtpnW;[R{#ۜ9Zs)=>h".'[&D-MM(\^_>hySsvm gO^cHodRhq0i&Lė6o¿G9Dw(Y0W 4ze'.oג # l.؛!lEiliô떶4Y\Xs@"̪c)\V@m[ka.JÿwC6ŧ sq/Sʐ +xBAQ[SQD_'$S;ܚ٦>yV[C6f%:e޴.!_v^ )9f/F>}TW mp^i3(9C;GJK3e ik0 GoGS7NſҐȱP cQ+W{XP?, 2Z7>%c]qی7-k/n=%ĺmV1Q[%:w *Цx"\$>NʤnX>, uMfDz&SGZj@5N'fW(2) xY 5`~xB)>R|H!hg#R˓~UkU]OAm0 GD D=+j.MpYⅤi~Z T+Q;EĻ9IdS9-Vg>,|'؋xvD{GFPw]Tt̘i.У)DpL]!.(tX"€rq4Zglg'~*=7~Vj/o!Ԛ@USKi,B<.g͔8%.EЬ=G+N)r8rsrPbr,wmPI !u)e$@SzLK1?9jTpzC#vBR:4Nq H\CT'|n+Q?Q(mm̮(3'WϠеB٬pa:Ɩ7iW)kI*a8kc0<]iS^m%jW⪼ޓ` sw#`T[a}6~Â\HvB4):zڄ]c$$G5'S0ٯܝ+fS"x+In)JHO Dt;kYm%̔m?(⥢. MnB>]H[, jï,uŔ=/EXO1mnNGN?1? 9 hBF3z1زw da7Eu-ثvhxCftLe~joTEj nr>ݪr?w0LkZ>rE߰3L[RH4# \*N ٙTK`\7U~J[.ؘlMzƾۭH\kwrb,*q{tƃU$$c/^(dD(@TeօO*kq^1p=a;I7 =~BǤ' XݎC-exԊ< (#G2є'rCK4[)*Q̣#,$#I+pšFZ9[?UJGRT#4 E(FKou`F!R_~59hȯ  oB=]2 A ܹPzQIKP0◅"")'`$67iQ_زrҰEk^՝V&s8`gɽgTHtB;!6jk:lG0;ơT aF^TxbqrCj?C8"V:5rNB8Yo2 9;ΝЫ/C1vI2Ǝ)'=i. 7uΏ؟if +H*BmJ|pܦHDb|x Z$+vOA VJ'aA5ChuǁmUfB.zPV: 噓9R|7\$F 'CێU"1ZvUY4}Eٓq%*PƇ8|IA)jtы E 9n‰qF,䲏ÿo_Li쫊HDFAEv帱ȖM=6@0{cX|sk3$]}2a3ˇ=Qسx΂k72yəjp{l?7vYpx!|?K .|^TzL=Hw7nz?#'%qcmޏ_\7WjGJp>=툫>j:J,VX)\B`B;V|}0ӽF -Ydܫd]Od7M/a&JKr'mEQgɰ*7_ֽZ&[ZBoWpu8ɛe66% 8T$"<&EN:̐ q OPka$bF2V`1QBݙl@҃ f[ ij>TRgdZ; E.|}qvel]d[!\}Y6*ʄ>'pIUYN Ҧ;у0 K t"j ?bf&.NI,SsDK[UIZ'Tߛ6.j?w|7&{Q Qj|zI/-ty/=1."X5m ,V=.0ϙ;P-F- {mhY_|Ιե Ե,؇R'7#݉hl S:9OG&/*ͳDr:y/A9LK66ȈAFkƶk< F >l"*bit'ΰKT=xl[+d^'jC㫑[19̂ V?ONj"BhHn$ ?Ak @_3j.tlɤ09 E,Z`I&" *wT"K熦J/{A7W]L0B:pn rBZF\l< -&=P;WI %FAcRdD& rQŮ|hxU)H 4% Ye3a6j#AzQ{ږILX>8] c}cl>}wZ%G/WK"cl!x<(J?>ȦZw0Ģ 8KQ陜v.֔ qV[uF?m7'W[]r !<R3cS TȝpL A8|fx ]cKk`嬱,DlX*ofIHpnY?<8Cf/zk MmT͎K|=/#/hSۆX;U bhW׋8ޅJy~bteVZ|:ё^_Ag'5rcg?OX'j Sw؞in֥kQ䶄%'Zl 'λwL>]|MQ _Z2 :ݮSNi3/ IuAXy&L@8²{mzc8!GOaq UC%$`苝.!&a9?+$qE Z`?gEjUYo-LIEdmI<nSQ\hңQ:㊺]6?Ka/~-Q nsy?V Ay+ Gf( M~,"1%^^WR)k il*ZJ/CV$Ov̙ݟDiVK5ڄEݺC6duKakIkoD\8-0os$VW%"D!>B',azavZz%oÑSU :&9zD;lנ+K8mj#5~ ڶ@UT? w7"@v7o}bV8QQ 7LI~PE5l >h##~ K߿YDC;RhVu*h$'=tI=7sn(@I,@L/lQmņoVSdOXS1_G" \ pB%-R-M "φ">8_9rH.'!6;#ܴSx!`+}?hImDq6FWb''\ zp5?BC^ }Y}Ev_LO'kfDc).8U]`N|^?o|hB3NURWNԉix2l$%~0P)xX\Q@h8&v(%֌YCEF- HWS$RqgYWmnvh k^Mql6x?Q Ua*")Jܚ@aXsѤY, BI:juһqYe`̅QTڕ׿08 F6@gi"EhvOp:mS5 O27ɟCߞ2E<̎C^%k-/tIB9W{Why{w :D[@U2Q ܛ;9PywRYy41P_` + "\g>CɏEEXF</}>Ӡ:EVWwiJT #ogGpj!0C0bZ`]Az=zv%]4 ͝VDhSʁC`g(6S2'%߻tY N]JDl,YAT@H|zgrC5BS)}GLW&7}}fHhnj꽠 S{& Oj^ߙ@ukQRp.$2j1*2M.fRfe3Ɓ/d&\tИS)MW};λWp6ͦUUT#7r$ rB2C}%GM/\_wSޒG:^n/%wem1a?xJMe:wiF,Vp; cj(PZQw ivm`I*7n{ $s ) )&03h>t%b|ؓcwn0)ҳn&: VL; `V)o+{bG٬yшJi6˘VĚh w,\Zy,7X0o_r uڳS ɞ:)7FffiU(\ŁڍPH,bvM|0r&q~xq kH&n@ 2LԌ_`kIY 4n)'EJ7U"' l!0c_ va~e-켟v[[$ؖ8?C3OՋ] H#mVjdbl}8:;1 G-XfoZ>v7 FȗJ d%B}a[~l3:FN9،@t\s-qרy]v:لvKDQ^vp]|ڮIaZ;^vԎe c9gR^cL Er(8s h[s{^\6q(79"Wd)Gq#TGK sÔqe1J9[Cb| u:0فv2ɻ'rgNƏKr==Ok3lXٵ=Jol#j캎[թq jQ咚SKMKfCeMY/ =h+LV-t*vXmvgnyl"ܰ8sl9߼smA^ͥW^KѤ) OQ|{+ K 3zZ"x!yȝ*zE#b[3iMsNO'V Ɏ0 y#FpA5U}2ʝwn[zpnv߳U[{(ة Kj<q^Ҥ'yZ.c߯(#ЗmgA?oCt7fݙvH m7 Q}?p?5n\h0 ,+q`7Wn}*?nuzCP#B}?j `/qp| ߥ4Yj԰Vf{ TXS&}IǕhi-t7]|"R<܆M'ɽ*jޘьdNݴ(' -D DӼČý %MjP=% z2wAٲc9 e0df*ؗ!]6";TQ EZ <''a,^9V*pjlGWw Eܵߍш9-#4m㊥֓"ܪǻeFkx>JD[_!X38VJ.Ó}n)n7 q&c&pK&#7cjH_|& m{=7J R?goIu8q໎d?#Bze69 r.WyUhuYbԴ\Vp#\&Ͽ| WOt`^=rlx}tܿ*ZkA-7Ɵٰ@Z0-cnhDkGbk+K[㬩/:oW.mۓ+v%trx Z$[L@'yD.N"eꤜf"U<~kY1 J:Dx'Cn5oxhЖi"B4w-ݸ_Z@A#ǹΊz I!!"[j'<+OoU4Ȇ'¿ .G$ e͆6 ZT +h^q_ŹH~zdSʦ'kA$^}$u2 9cNՌm,>^^qlf ,b(ċkCS7qP.-| ư8j_5yȤ)u<<bD noM B-2\"^ QZT"}j/QʍZ-7:nlЈX׸[zvEmH BG5 ˲oӤ"Kj()$BJ0K' R- z1Ԩ:_ %0L@YzP8YL')5`>ĵ58V1B;nâ1K=1t^ vgJW Cm9 ][Ɂ\GqPb9ݭ!-65ձϽ(#xm;jU"ַH"l:9@ !O+f^jrO4{6xf~ _Ցᲆ[ȤJ4ֻDTwwh+fl]YD'@ϩA;+؇RrFurGo [WO~|`q6J3.(o1!#F_߱"㏠5XpFDZ7i;dj AܺI" ND"!uK6ɼCd9JOFRiwR`3}4_hEvXY;5Dk"i}GJMh R$ש ImdJR/ <93Mb*v=?<;=Idm5kZoF;kʀY2:O;t}Ѱ7E=YN_7i&Ra {nFz=ެ(+vL\~✜r_V/Wm"(‘(%x^};Zxi8R߬pX#Ԏj-rwnA"NյU٘U77UTM;h*y.^%IzxtU ֵ3dDCఔ鐝Bl͋-wqƁ,;T7P}} '!CPL.޹;8j"F蚐 ݠVfm?1,%E>[|08N/S~rر+ 8Ŧ^`"Lidpt\07̮ܺ`-y+AۥFWAP*5~~ 4AuaRzR7Fq+x[u nRțr[JGMv:n_?N6HWxdS#&.(#2}ykƒ/+3dn/C!V+|AGBqcZc.I1G]WJq%3C2(tm8+1 {5꡺x T_PH-'U| QFtQL]y0Vqsb:k*;?x|x6v/%=nA-Sn.@$/Wub 1{8*!u7ESI`>Fs*rv0.3?YɅ@qXqwCթ%A">|3p $Շ+PBL<#նIݑP~.Q ?`ow$a~va8 < L7<"(RfZ WIfF.s "}pF =C=BEY4̆#3/.3ƌD9ȍ"D0gE[U^2ֹ@k2KQ,Fw/( Q_j3TA2`mp"!jn`:ǬIm{TaMlq>ׅ"Y`-WL;&R-D/MUJ.-kO*FriI=B6Uic'2T 6=Fݟ(éwaMFw&JUJW7.&'-d(8٫JB~վ^ pR~!z;p{^,C@[IBL8NZ[/]aIlZ=@ap"SLJHڳt&1|fзf7.:}Q>gJoXj6pZUWX)Êp }b+^ʹͨo0\^n߫uYi'H2bQ:7ur? Hޝ .\ybA]4yf8f"3=̡yڽTe_V&#k/͢_[1`?4Rxa۽:A=Ri }Ѡ?:\oLv6]+ae[, HGx$<39z< DGLPTT;o> hK3jM9 .9 `Sfo\O <`6/ N2YI/.-.o NY`l xύd=3?&tRNT_~,eoOUv5QW>GnVЄ? {v(JXaͶS86}3M ˉ؈ʨK][ )d]=DUXdE\w/>5H?ٵ}0M2aʅ,Sp2{j}F07EM"|)QS\ܗ5ε/4_'Am tK" S90}f4HWҮr VܐqCYP[7%_pE<3\ύ;1 |,5O'[}b4`aᡆtLa5'~4P:19WT4 Hxo!) ? C:lK2cN8 !!NkA@v7;2nN+NҌR͒pԛtMUd$(I )yA]2EFM3 94=)}`2Ogf#v/TL! -xTXHB| =T`[MG `_{*AvCO4NeC҆O<>9})[#qܘ)X뷪BFn+HRn"[V Oo\#ĉRG&.|k\cz;vH#:(,f\8G0T+VX~5%z ]Q;_LKAnKb׷âC%DN|0P&G'y{+N:,/ڼSRכybPA2I3A&?h;(j7Vqk4XlCt,+#$-fr橁%r+\ٌuHq |7Wkg&\Sȼs@t$V,z/}##19GtXk;gk:η'#om{w P:#X}uJRv@ O}ric+h&8!i?י+לgeյLQ!SN4Z`Jb߇K !w3դMd هCFf+zu$m!'>$'*ai77 ^>K"Q!Sï+6[] ΅jxR.@:imrO5 D&s9bVFv ٍ~{{walMAIC;sJ블kZjFqcl%$qmo-4`{x`fyQ*|m;?V 0 8$∴Qh-r㓪S-9}y?>C?}g(VR<:eSoQ>_JK~e21͢7@5z\Gr{ɓ;6tw_vXp$&6BݤJ0ƽ<ʹ%ݴV>. O9x[NOq, H+ba82/YgsJ2'fЀ&w wXLV{#F[-a^ Αd;O3d/8i[L("4ѱ'z:Z$6GtKS-/$P. }eUiQ*Ht#񳒷u, ,!c=C6qN|/?E&NVEDݛ1:6/ŅS 쨩҂":2O73 ߳>0vܞ Eݴgzc1,d`IӒkĺ x0KI%mgpz}AN; =v`N2xH(D =QOnYLfL7S~gJvu(" _amv6{&xz7F&q(Vc͋ N NLHr1b9 F. <\:Ep3"nuи/dwyjLjH#W!.e*zh[Z';\z:}Ķh89 19-R)lr,kzoQ~$Ur#PSRi߽" 9FzlIj]~ȓr@6҃HJUw=f4^hHOq2\Mut(ݞiw92, a~TuIͰ&>.T12i`gUܪE2+=7*ϴ)C.#>_k8;j & \aBv8*2lr^ ؓwrq؄2_M*;H]ej^A~@[qX2j8!9>@ T~EH}(C@xY !d^K~Kvu%|=WA}#Kdzq0J:{NO">>NӅ>g%jR?:ݍoH Mbj!.$pF۱_/0 ]}Bnʅ&?$& v۶W1o(5D"+8C^B[pf et}x^0P sqکKB۰KAd/Cص dj^XR{xSb}Fߐǎ%m颲{MY.~{MafnχNL-_>+t ,r{c!"S~1#&`D5dҕfX[K#E/.j#)[kEslz/1[ 4v :@:a,?fGm2} =EB`.ӯ]P"R/㻥pwF $&x -xGfbб|aW(MR͝쇨(Iq&KfȯdB`.GUE;UJE,LW7.Fv[pjh<ģ 6dc=)^eIv,)S֘|N^Uц 6a6o WЇFy{p N|dUdp PbXP00Yh&fbn*|!ēr"XSݡou2Eq-_ۺKmԧU4ӞStv̞/ʇlj6U1'%w7Â.3MPPG5fi[O gn6F  cK)LV/S+ `M&ha&"C{ȘMQc"Ԃɣ@iU1Z u_ cp;zvSӹǟg(7.ضv]{1AeBYKryNv?(]°8_.]ք*abRȜ\.,0k<$YA&ʟQӪʰuh00+𚌎BǴ_.bGs֕g^Jlo/Jx0dm8E~t=ph$v%[8+F3 =r@[./.Z*} LPeŮA} 렰F|u=mܮ?"'־rA)(CAsمDOx`1ȗzצl(}p:iefo]59l^1"3rsl<~4ޜ*ۻI #]e*j'0`,y٢ׂlvE֕mIsvvA~f$pQ%>QBhXb݄YI  QZcPjn:ŸEIT8 SdK@Lxm{ƹ ;N MNsjĖya<}[fGI'΍liӗLCא~s7g wqp|͐r7s|/@y)8O =RKxئ@#d_u~-.n!9w6v8s+Θϊz]V!Qױkqdu#@c H P ;czL6kQICT_Rc|3Vp0aV}~ukL/l-Id A&r{hyDęN$}"N<7?$d:1bƒ;+(UTJPAٸ5 }\ANgJ7PZn19"0f /o#C 1쮊&}\(E{Qrp"3gyq{3(;"kP ^}W~nBZ#NOzXDZJSE{X;)mN3!/L- $ܧ#=8>JW]G٪BXlTm32%SʮBO=&$oQ^MvR j&Wfs%+ 4D9䂝(D&1]XaԣsւD _Ag:=,3c/c/JN X<ޢG՛kؖdRJ4C$ܷS%̒5e@\XV{Qbq:/w*xt{6I[ܞJ%ZI>(߭6Y`H Wyڏ4I0%#Xb3VГ![N.AD5'·L66skzו5ʄp6i402j2%e 3>6Q  _TMFE`LNl7$ (<74ىȞd_ɸP%+._g{dd0 6d4hU)޳nj S^j$xCޙ}VR|'`J|a2Qy9ɮϤ3ֽ@St+ &MҰ>;b$䛽/讵,4(ۣI ҋshQ~jA L̮_ isRСHqׯ{gp)ˤ)yOO 0~#u/zBF_?/eݠ#f>xMgYSKTلA5fhD낔+vDR:li!X_bA|K$6<%V5*.?_FOg${~Z-?{`_٘[3nbDo@*4T4f?'L eF޵ꦪ:ubSHt\?>L/3Y dy$܀RSvq,_l)g&d7̭(o'5hyt{"Jơ$? HI4/^>gQy{]>k=ҥ4)񹃻Gu_F]1Rh?n9ÖVU5f~YNKI Y+ )gm^2*M{#kZ] +$fneLBF"ꆦB50"V15[9](rٯ]Nh7xd(anj&f{G)#zBY/G%zb1#gJϷq:`bג5$ Љc(-{:)]z(Vʺ<_qfdI9IF^ Iqb#ٻ9Mg:u[&Ѽb%׃Ff{w4 eK2.M~!;LjIaLG6,niRAeVXs+n(mf2X Y]{)\WD}=P_50%GDgi3SDNĵ{<'t:8ri hr"gD!ץ.%orCfI]R-S>1ޥgm!66|ki!eP)3 ޟ#(?HENA[B<\ ^K}eڅ([o BĺsQk>ltOxo/(-*V HY #n[w^=1]B\z.K%?0NCz iw魩B!}Dˆ@W-!Z(ya>S4|cfC9Suy#ꓶn8ozj6wbҐ=گ"3ZY-j 'Z+6&^dޗb`gĠ#WḩH;%$3D%hw9QIcx/Xbۣs@Vߢ7^LX$,ѝ5J=XXtď>Npތ?Hk•NüdTLE?(ЁbXɂ%Vwi(7Jdܳ>P7´Gg F`ַV3F0)u2M-v ׺ fUAOcRn}jG)ֱ0QbvQqZ5tVeɾ~6y9!M*Oc̱gq0U<]= QQR3tEҷ0Q A ~8qJ袕9H+n`aV#P/RO?M+&g0gm_]йϟ;K;1NW!#hT\˥"uJh֟º9` )ΘdK0:Q@SjYV* oW{Kvw.bbGC)~ƻO7NoQ*p5 c9vR%j$Z3U^3dמ,6?ׂs vYEWrs<+X* $5Ā[ds@|/0l-M;: f>u.5+SX Tm*xA8&m#LunN] ?mGB"3 ?[HB=6!I߃6FɃXz:OK8kNߖ;!{ )PSIذ$翑2w kQ3j#>{F\F=NHO&fD5׈23 T<Q\J[7TnR);^~y3So+ၴ y3"O̜X!Uinm /}7ls F֛ H`Rf/מ6qZK\.[ ={cd.B=Sɱ \uD=F!5"+ !?*M,w:V23AQW;+W_ئ:}}J z+ qQC:WScTɊ!xՖ*舟0>XdoMl9{ĩ%RM@+YSZR㍧ؘU4ZNl֣x &&IPY WExTg4n6FC[-%A9ݬBH% B rwOv+*~)&K[o\l4_l-؂&^z ݐcmH;17"7'2μ=U81Lhj 1.lY`!Yo*"$6#1S%o8a<al@G 9J6$@JWkwԐ+y.]=XP%G3a?R,(e,|#ÖQ<0jr F.Bk} CqdSnwKTLJ΅--lؠX>-vMDy<ͷN~3XŌf'Z;$6mYf/!osM"%q0ϪۼsV=ءBd5Uǘayfwޞ榤+E8_2~Ϥm/?]c2Žj%R}gݺڪ8h9 [oh dbL+B}I9kPSPD3X+LoHu9-=Ҙ86oO{y{՘7  O$#~#ɆLTNBwGhFC΅|Wn (x1ɾ 4AVEmeH). [w\l%'ɵsԢ%[(^SKBv1=:+3~3?AKhąHUFmnڹp*TMQYi_W1SVFi+KzMǭ1y ^O-^6!5dR,-&NRpI+rlk;;7T )0p,B_mt\>{ǒk/ QgД|3)J. m[&JS-bs~ix!+U/d|"ۋ;><B4o s˞|vskfq`k@Hۊ)iSKfB/ls ۰8$bCFR(LvcDq@?)W*$cv4sf)oDLFڷ!i޽FiO=dVL+9GДܓiKgYЕ3͍7$gr#Z!Y6[Gj%UG/q3?ӏ ONmx+K;4C8Z61o0H?KDA[f&`PSb|KLE1J5՘fVT0j΀e'?b y[gfzF)3͋%PkY̔A|2"J*Q yS7\j|uEihC)G7lUMD]Ò{KvuKWē|' 婥Ipj0kmOa$px׳t2 սh]y5k02۽ B@wKA}5)'n烀M0mW'>NBr4sA$bw3()>H/R1<@C_^ SY(fYm>,mCdNf_t隘8~fBE"ײZD)kQ][b1ƥK֫/="1m09gnDm;g F[&JP&}jϕbop>R q]C(Kfo u Az~_: rnfkGuuv!oq=C Nc~pJ iINuZaq}aL |Gm8G@AU+^n.UgLVH'.uG&-y>WQSIIF879r礮ǔ1sl] O xpǰG7HV>$FZ u4I Ad+G('YĿϥ Vl^DV53gej1J"TF4lY2 e+f,ئв_S2j`\<:Eܫ@#߯%mbOD`qTU ȥ]~8ɺ8ghu?jw9D(WۇАOR9 hx@y&d 3*j*!wZQ=fn-e&RŮtѰЮkf[4'Y@sr+s랋j۶ +Ѽ>58#6Ulj7Q0tϺifDBK먍 ȹmTrN=\$Ut2_hMOIXg!N QS^_FCliJ렂IŘշ_TV C=m)\9(6 w( W>yaG͜-*&Xf*z,Ih| ܊-B EKc~weK\u1Dm7 |0̛:+qm>ml 2 <&صf!I֢a:+Nmu#3@])Sf̊#ؐ(mQU]&>#b HY?c8C@ _!}O*Źޖakc{8(æ]޲}R5 Ơ$O3ˮ܏h? i>Dƞ4؜Q)K>L2/L B3AjFehA{ܼa}*x<\= rs1u7 b ;+7 @Fj$3+xXݦfz5v0g1 ڀ DVgלn;ܳZpN_O'=hWbXi1sꕍR- ߒ>)ޔT-sI=yW=CcFN2ߓ!w)\8`pI$'ʛ*ŎjZ2 Ⱦ̪c5#8puĕrZjڸ5XI;l%5hZ] ~ HLdj&l7WtCݏFwO9i15дq)N@wၜ~#LP(]AIտ k5HJAhsjbtg Du1GEV q ҜFd'{M去2MW^ւ1hohJMTIT!;e5Yw< *B* fNgNLrV(/ eA_B#3X2eQ&aR4#&2ӫ eԜ?gG6M;E5vHMf&Qg{ D>j6u<4r?9g-my_ (e*jhD~vhQFV*M+w%ύKtdLh-*\ WcG@h [/$x]5r[?ӈ&6X{.IX8 U蜚 V.3p̾4J21E>` T0 k6LsX7frA8-쭳DSNiG$5n崨 4xbKqsH[ Ġ{4iH}i9pFw׊TqGeb ~G5ە@d ('dpyk6 屃mmX4&͂"r)ۘz4p~<;vx1 `g #)cf9AE4)l( =l{ڛZsN ]1f?%ԋ2rӗ,3QQCq]; IŹֶy|;!o(J i-*;ˤfJӰ)k[ֿD(FGi=EQD1s+YQ 9DK}U\ 4? 96M B' /0[ñ4 tLR,"WޣY4Nk;X;i2=C,^ʜq},:]vF+'^yuv Qg|;cP iBܒUp<g}#5ns)C`%:+PƎQ"0X+Ғ$6D)?Q45p`.Ycc@ 9m^'HL C1gw{on߿b?>bE ؇ȊP~q_ ?Adc" 8Nx~_rvcy2V{=K8ɘgF̘($I|A]v(M+Y_r+ 5`>hS5)h&Yn+L;DH/ mAub M$}f|kcH勣x<"").#>lx5qCВxͳ,. uF'v[v%DgKHղx̅rrInRV7]"JGf b p~n3V!WE]cBV CqS*sȠje) Dۊ_`\G"[i_ y9M*E6}UCvD!JVrgNSUjݻl\z23gvv=5#|`NWV0ЅSL"47k:K6l8%i;$L=ɾ`@yc0/,5[1Vls 2+ƿM%>nV gn"AX![y(QSٜM@۠ f2p ~"d|gDzѩhS[ fO( U ;3z5H .%0 _RC;`dPhr ̈ŧ9MfLꘙ,pLL̳LEu˟ͼ`w|Hxxy>Ѱ*gWYtfHEAqp@q(AC||ݝׇ{)B[NZ~g@;ݩ6>ĈmM |jw*A L,5gL 2Js 0O?]a ݯ^ݕe"NUmf*yw{'geF4v'Q?eOS*]tm۱o,eDdJWX:5}h͎ۣ]u a6T M]$oU;g\)H&QeMWq^ õyT?K;n:)66NCL ھqEt/I<Xq<Λ:+̾"\3D6`ԡ$*OJR/%?,7Ɋ0SiXK;Z^Κ?|L \FΞ݀BAg+& י‡Iv۾HWk1+B^ -rdgՠ76sT6TN ITF/++ᡜ5vfI~A0盢 q֤b":}pF8?40 =,JŸEk\se/yWl{!6UҮuICkѭX YdEKirH\Tȱwog͊v;}CԻp®qk;g.w 2NWF;W,! 0KfC?*Й"5):oz誐bMGvU|0wᾧ"D A}u-\Ҟ.%53tIQKz>B zn=܌2R/eB:cí?cy^A4tV!yQ=/2OR;{(7sv;LRF_86 1u%EI{r 8Z!II43LbXr}y5c_ T$p9-mЎHŸ0YTW;!.֬Ha_B.2 h=*.M5.,U:8G &Z'E7u-: [TPK̄`~6_;մb3091WCG9ZEҩ*X:~ŅY}3̽ì-ݐd'K jGQ~DS$Z+Pw{?!";(owi*^ޣ>1'fLWR~( `S. Ǚ\]i9~H,{ ^^գ}m44v6w]?9.yD~-q2ƸF[YEx.t z$5a\aP1@$ݺUflLheK)]ϒ 8峩ɩ1%h֧F3߆nc_Dt0E22bpʳ>:阩[KnITmPwZd,/ilDS&y{?g 򶓹ՈrWňB6aXA\p-}7vyg\NY8FS-"&1ac_PyVTqox*Q9hrDuk/0 {;MG2ŁK*WMC#yk[f'bJ{F%?Vj ݝlKɅqppFő!]`nc gL@ΏvZl妆QIm&.ڒ-TܿޏD0sEP3)]K:؍XDJCN-E:J<@mOz].\q %<0Mgdž͠n A-YdѪJbyEEggTxSrOMl1tLKhO] -'7Cc0H.D6}?M~^t wC&@>1Wu?-+@1) 뚢m̏rHeѩS[ k=I)Q&)AtUu FIACSq%XjOX^΁Kv!s^aֆ3 ,t@zW#o=Dsl}@J>=5&Vri> n4,Ip}ug/$כ5m6ct䩗yL3a@۠dd`f my&D@{L3꩝e+&b#dTr&\ԛbrvSK!krq*6Yn%o6ˑtvTU{⌠MIDTh8-Q-]H%561VwaSea[8Y}^T_4˂j~zg c HPR4|eג ]5s郐S&hߦx]yE&h^ > oH19~ *_Fޘ?i_d?$AF2[?{2rJɝ)BpF+!gLI$;g06,UwLk157&/Yh A? 2戟-X(\3qs< Ӿ-3Fw6yѮƓK&PS&dqt"FJ?9㟹SnU_8"(7/, ç鿛QB]U@c3le<:m kE$UQXulJ HKA8gx RGz'QYŽ#|14WdȻ9 ,j.QpCuHNOHׂMI6CI@E{ IRVKvgwwcDB (ѨlM] /.16>fL-±#ekʼnR'ΐkDR@yWk|FoW)vQ7gLT:qnZI%GyuD s$zS#"΅,Lc:; /Ù eLz*unS`ݡ5gx}޸E7a9KLYFLFť46bЫ0"i^X@&U s8,cUC ([SR8#iaXpe֝D-3 7~HO+gkT#Y9ˉ]b鯔t#Iu])rTqvR댉€4Ku닕B h\J\@jOt TlES̃]^\!&5XcHscHc,f _ؖ)5|dž)ufohBYp T.N~x1 6b5IАJ^{O?r(q||@n>C7 %VHJѰ:* S};[J' Ș? ZC#hfSB0.pcB3BAүf3h/#'>剀6{u&â I{x)f\] <;~6ыWǵv'g6qIƿ#iMr&VS{q,z] oeqF@y|؄Iɕ3ws+G8[|tSik+~cmԀ_𮁶 yV)K.t6N6޵f`֩t k+8 xW.2sODl<|(uۂ+ǖpK׽9(WbŲAP6؊W7*$,P/`R&@i0tQurf@ CŎ]3N"Dy>.) g[U KnK+7jߺDWsqqKC_R4 O[7}&[tE V/r0bBCYZbdI fP*3L Ѐ"VV" D+'AYaY%2_E/{gȄ#TSd3{cJN.cdN1|#5'*^XݕS`bZ\{')C4nqWF<=s3C"ܬ.6>¢Boӗ7ʧ)1zgz̳'a5ҙSC59 R4b1d<ӣ* nr,s7z'Xd_ҷYYCӉL+_ve8rNS-R 6W}膁ivC gB"?r#|3O#MED&dqXW_QJE*6H'$iVK`kkl-\AX[+w=/ݾ,[}YV>S1$ dnnWq5D F9c?79B'aKB/*T+*wU>*.G!3Π usS7p Uн&21PHK@;{|*;Mח@_KӚKh$|6X_ [gCq84^}>>ob!)Y7)W+;Oە8A[EI/I2tc 3O# 1~~S4&TA CW0J0/(Ʃ:M\A6<&< cxu .p8*>7iG!4'J$wc 6(Fnv$hڙ, ;ŔkWtWOI!NGG OZ}0R?",n)n E.EܔZMAϹԚE$Z{Fj^* (18*q]xU5a"ѭ KK[-&茌KD Q1f-կ0n/W>{y?:Sc`/u24J5MN8"t _%s: 6üC;,ЃCSUv d&e`?Mf0rMiVc`D " T]4, 1ٟG-2wy~x clCgk\~8vx=.&SOh0̃Ezx9UIS8-N_62x{& 0'?Uڼ Jh /O^C;?~cfǧ'].<[[&`E&t_me[$1wod)K!)|J,'t?|<0s,5 P`Ր,)wBYxblA4vY[G11šnf=*nox3=.$n\[qpg1-_V$dZNm_^Rh3s [L7ﻑ ,@w2 p>NS'0%u#hSaQi_ኧww|lZQ7Hǜ3 ġ#7t R;ΘDBl4uI1XZR(mTQ]#28oXByIԴA/yRc KS2xi*ge KV `$2LMJa-Sbnq=[,鉪 h(83ZĎ)r\43{ay:P)B:K Wq\5y`s6Sn :jHA*[ { +q{ykL&&K qqNXarJW_g1\~uE j"suI{72@~w:P~fFIF^jEtk7?awi>pVwU/-zS t}~i-Q=ZPUnj%-/t+=6(|5?DÛo?o2c_a-o2>l,qMbOLxBnqزRE!1C~:)%ʷVO81_]IOp#kŝS|ȩj?Ieo-A ekfç\s;?VCI6Ap]Jy}d 9 f `׹z{oMm¼*>7W(LL2q0ѡdJ~`BoJ[92JZ"cOSeJL%7lN @=Gh帺 Z;GdO܊{u45ϬO%UFNiYCl~R 2U!=*=gK^Aba+Yy,lp-o!q7ڑ^LHLp=֗TE=J%|~~GuxN6ؕRNo ]EI|ngˣڋUqh_>Vkx9QֶnV OQ#m ]7ȃ ߓ5,@xZ8Շ;ZM@Z-%8^( u#o "HKTDFƒn: ymT@fјYDy@!G8˰'lu_''458dǜܷG+ g:㿺Rcy:WP? tNH(|){~BTɎ`4DIrH9@V"_9+"0"5[mE2g*WǛZB!Cr\hLv/x阥m " ] Ȩz(-,&^gUG+χ'̘?Ń<vMҢL U,Tb{b[{hP?3k] Q!#Z)sA|SY;ݟ(ЪތZ }6 xv5sEq]! fakQ[%ޱLRR *!>ಔ=lmb'藈'sH'hacvY5nm8cm4,CDڏ{ NO]e=m0j!_s` 6#uiv/(*Zb8!=7 vP\`W?CKR{? b\ݲ4ńOhwo&zWj N/ޢc.-|o[~cn>#ӇnjpF*Y{1RñIH# r#f4kh {Gg?K A*A Fʚ0-(X:8L}Bשe5mxFhx-flZBwlcZ~O,42JAcg&yͿC5O~ 9vS_r9R?o@U수SB^3"?$z6JQ^)㞻F;7TQ7&j?kIXY>fFCWwlї@m$>!f6wHylhtBѬ g.`gO ?`_1i;ĽLL|{ }C;W! "m5cnb"58ϼd K#swZZ( zJ}hԂ4/ҕt$9|p64xK.*,BTbCFA5ĸoP80kx>Kx+Y,\oĿ:w~*ҩQ ~Vw]OֺNO4VC+W "/趋zc.T>բSS[J]KFAmtZk IwkWex856t ]Gjg {<"AW7qn⦱KkI{#:t!}Ya*+l#k ->fW^]}tߥm3s֫xe*ӚT'qdD v8{Hoo1CK&We*% 1pR93V's铀׸DTmڧrCCݻ6׻zc1[Ag F=s] Z]~ik*&pҧD%O]/r"HgbJIo!ԟvRZa׺DRƂPqE Rw 7Z0P+i+`E \# 1[4iTvϸ)87挛% sl* er7d9ڗJġ/?lL`6PJBIogIe&RԹWR1@ C冺5 }nJTPt. }:֠IOUR-Ѣ.;ҚaC:ܻ KL̚"D;-B QbzU0H0 G?KeόA<>-Of "F  Y i@C˵Fe'ŧp׷i+[ے,]ՠ$DR`h1:ZpHʼnNp^i;U!P(I=eҌr!?6/|A*6/Zw,$gSb&^"+id歫#u !lC}AzJU}}:2-JN~{WH<9Ս8ٚIyg.|l+P&l8 {{@MGo4]pP!Yʿ-F6xnxC+` gMX5zSE!-ƀhۣCSUc"*_r׏ӦHz&lxik>9Yg'-AnouYqQ>: 8fPHK#TAd h}0AڵM yr#wh58n(`{E. CcZrwC",U d[5ePܼ t*`V g]inNfh(Ց磭9XMoTE/[CUGm&WYy(be(_f" '*6D:_EkCK.^T|h?b\$|>'v͕VQDøofmKgiv\ #|xlͬ⏛K|:]^xEF UR71ZH *Hg1Uy >z1P`0eB[˃?w^ǁJrn)&. 2V;.qt2)PX뱐ܛ<=0b\.;4BlE] Bzs8~| Xɥ#B.?X~j}{e4/rVblZB 56} :5T[>S˻wvux)O:w"^-Q 0+sSQzTo_D CD MCOA5;e(lMiugrIfUpO%hՂ"Oj<˔jn-QvͣOS#eidt%swN$4X?qobKظ^ |I]bTj[:vs-%NDO$ҴW`պVJ@ڛsDH*,<ɖHk<}9]8&Ne4Qiכdy8(inC {j,)XrPVmΌϔ; "$ҺUOX"BoHFsjE1f-ӔYH~Yfz-b o'{Fc'^ LbXK )nfFo(Nk{F{*IK mV ߿(,OVcV.X6EP_0H^:Q@ApI$ ~D`W#)w{̵#' -~,O77,hojUo$EM-A$(d@ PL |<_b2̰7V.oQ\aE,&7=t󏰦{F;De$ A rMKix};NVlq ,GL$ k@M+|yT'eP]ǖ VH>>$d txK]"=A$G#qo1G _c[*A/k~sQsɓv9d"vXDX0 l-[!@Ʒfߪ=Un;+X 'mU[ڳ`1S]E]UUn˦1|PI,A"Q{fwc >W# nTƊ7;h27;q6f)@x1z3 *qgp4Q̫萒I@e" "E?acOBiOЗh`U{#CzQku|r[h9q+)̵3hХ^P{EѾ o*0`\+jَP/)WMyJ-N7z9tLt!-gt=W9Ow.Ҭ_-\[m`S ')>L0zfINY%j!Et'M+ʖ!gbz犿Wp:S_Ri^¸xbM{ieEyО(q@}~CiU/B%/ "' `^@*[ki(Sݗ@kz=K)۽e署O!Z/0 )وjk9\O7Ex``>,imf]0f,T=Dma<4i c49a } wU+F?+VHQAe3 R&U}'cWŸgf2Z^w抛OvR|!϶QxȟaΚWq $ ],LGkEj $0Yۍ|4dET"%lx(п*ğ #]bfct7 )8Qq'zM$ E;‹Tj!/&;u%P(Rpt/7yᯧ5UVO Ϩ ++O6!ˇpJ(%ũvh@/YupW/6[_ ~Y3 /O6~4%BVQ)EF,sIjSV^i{y׌) "ěΏz{g wZ~Ȁܥp!Еg\ Qajȗ[9;ii_y.& u۴iIqE6V;ʘH2چ}iKŇ#<!P=*3-~i%^ЧG~@ Ӝ43=)%#dM #y /bi9 x+!n _jm 3ݯ [ k-1< !cP0&QAm>7QBZ_hXᏃrL!0.:8 N6␎X2P6׾ݬjƓa y'~3K2+5UѶl OGTMDOQuoI3q_oI/vGiAM--ρę/퐳V;SOO+PŲ)X=`KztX[!K;O_JMf fDm*kJP\% ƚ%X&CV6:'9̴PA;Ьh>4SGGHCQZ( (-?%`-ΪP deMֲT|p=ٱϹ!cm JϗQ~ F{_"WXh~q0ky//5?zԚ LϙF}5@'ְ?9uqd/R8|%}ϱs_XXͽV24OըM>92p>;uunuiMΓpAi&U'fZ0\=s4\!! <;>wsHw/\P+ "<ТZ߃LE$?o[s,y6b*5伩澋T#Zyⷱ.U3޲LMggcC0oD~;A6T h Ǖ~ʥrl82qT[8ԸHRC*g K}B(> kUY\k %?P!˯oE{enxw(09_`CDMMJrnDLh gM,m=ԯ#7:jlV ~g? 5_o96f5҄Y-2۹WH&CcP鯧 ;U\^m$o?/5o# {5?3J`_?:Wz07j>t'brV349׭J:W6n>ѼXg++ :IB|-xnhGQZNUHYgjլ<: %nGj㮤e1/19ÂNMvVomKlcmB"᠎#)rgNFCiٛ8=G>SM)M-V3+A]! -,/kCnk >/tf~hyon1z8(7~-nNdG *{ +Qr׈S= U*d5dO>_q} JvGH~ $d Hwmfkty"\S8MpO͵8MC+GY NkC-7ʂ0GL&F+5ekWsN'&ҵvsnA]8郐55oKD?꾾Y2T 9lo|دOC|Jb@%,6(hItf[p;%#<ҁ?#Fa_jh4/{4x5{rA~Wxi@k9*zN$#LXAqɖEZAo!ﰞѿu7 cM%']ah`hdIFUt^7tP"Fں'dlQIV㨵h߿+Vrw 2xD<;k|c$u_ZI7Wg*w։JA>c6r쪋S5/hJ:h9{jϰ+6[JV~SɫOC՛j鹚Sw)Р ւ-9@68mzf !ZdL]"ZrťCKMP^oPoe558Gvsa^Ǿ:&ӡìr DOi9?vPѭOb#f y%5略Ï}X; .jc[i/K35mj*]XL: O 7ڳ0RcF_ȮDx?bD&V^pɸ7L/[:PVH8zi?F>rIhS~t5'g=`G{}Z6I<SwJy 1*yq_ F\Ff`~\~_>j#{#ϣ--+(Fԡ1B6Uxh;F6x(IDb6JK 2v70ՇwѤbmq^㢐H3MZ+\W<AzKOw'vRMyK4\xQKSІ^y+tՇ ^ZU &TZ!^:;E^5TAWFK)N3"?oo%':40S\فrDZi/؁P;v*)30f:dĮ1I_r{4? )aDfh5oỌP({#ҹ 23ύ_7,H q(^?cxd@NvIw/daO[01Aqze:&ܭ, ˎqtQڈ&]MJb>eőRD]xXَx#eEǝ"p}'c΁o/##/z_7M-)op|Er(q^A/;.□j(_ڋRk}ץ3t8SgWEv* Zb\ZGA`!VX< +cW;i{WbXVc)nA[ 4 y?pGD8UR!cd<1he1\l|$M_}UW6(ԈkDKWhE8e=Ԙ'j!d1c_32#kN0l[R(҇+k+Xqk;gV&9{U-`Kv] 6zn+Sʌf;5t̟v|CLhx p%}&,0bwS,m&pBPqt\:1|C 2We҃$&p;+"g½ )KBa4cV}ew;m:%&9y8ǑjxHnL7=q(+|0gaGDQѤpP!oά#85iYٗJ>Aþt!Pپ[9~QƊ_SeWQVLţQqIC|^m1RZ:L)n S;VLƝSRBOs4~ ֊%8 7i_o l|+<4^t^t{L9}IM⒤Ms ѓ/H`W2kU-@4jԵHrrȪp |!A?arev!o(Sj,aqLZ:Q.2uԪ t1I?M=I*%skVyG(j2B՞[ ,p@ڬaƜ4RaцqHb\r9/% i4!4sRK-]Sx߾;Ȧ%,Cөf@~ͭz˞Q:tuKl@LnoL^1T-٣dK>QRyt,D_ji(#VpM߸"v!Q]Z~n'd0bry~ajMxRǖ$#a&q @cسTieWI28 )*9nC78MDxQpU}Al< FJo< Md|NyoJj2-$dr+@#?|lV3`7\#+AD+\i_|sVg8Bx80=\q{ YbFa3-873-Q4k/)`/ w Y W5 _Ll@^ U=GU AV{ s擔SFqAӅ#oz찃@Dvmy ݍ.N|jFL!|'1c @!*; hW=s\^67L/n%+ {=j1Pe/-%#MT_hnI*`c_@uC\m + V+Q"dvH9<؊Ⳡq5Xj1[YH9c͎;_ʊ" i`O5UHe Z8W}BF+s_~ཙ^?jXSk ͨwxbdX1SESegOo|8͖ &c0W v9HHvNqœ.'\ U'.³N1UBKk@dGxgI/\fx 8Ûlyʢfp]-<|hzYпIо7c|}vN"꡺[T*IR*2ČǽO+F1{L hlG=xT/T| îz1vEX3t&)| *u!G߰*hj_D1uvJJd4v+qŕ*5 ͉x Qh|¯7s֜ Q-B-Q! ~\v좁8JTk*ou9EWf=Ʌ3&}c[L$))M|q 4GV)Ԑ'Y7VU2KH8tb\L'һ\p=W:1\]qrd6`t`PԗL9,e C6\+5j 5,K*wPp Mp$k6f`ƧU0.;1<,[pϭ, E0؇2jUY^ _u+LkFnk}b _I5CK:(:#[9p'ç+ n@6ڸM|.I#p׫kľtD5eƴ ^<і?,S3Ӏfu}b*֓?Q;YʹzNfE@:$I[[qD{iH<6WGבR5Dȱছ+]'-.`a镪@ 욍+"u6z{#~m ?9ː=.cJ+f,<',Ӣo>gBElK}Xmb"r³V,^#]mI%f+lCܮNdkɦѠX+jR0^S{7p3bbuM%]ؗzkzҹ|hB}Kp5P@eo<)Po.n}[sq0 K"į廆8YlFGJ2ts8 6Ty%d TFT>=0WLËlRwh̷;VA3JͿ Ƿ2%$ ;v@4Ov5セGפ1:\ߋX,~d]\me ̭(]yEWão 43Y"˴f߅m" .`#m2pCWҬ7i@q޼h ˮ1N%ΪwKXUmؕrM}NLw} iHȇQ <5|8p|#MSqs2ܳU;)CPU(`@3fz0jxs ܲBꒈ7{:m/y>:a䪛jX GdWoVN"u8eDP aFKDsD-?=20X)*)yvHP7)e;4pB>{R+޷~ 4ix=HܿtwHbiVDİ:af :Ϡ[k˻;q@z`<9TN"7~ķ+ 5C2-z*p~l= 7ta!En1rg캟EbA@̓TqMLƲbnӁK5]78 (JxVY]I^:-;:ג,pZ䄱=k$Ebu$m9?|po+bٟrju,'טv}ܮU)[lJ 8z(:AF%?ygo;5D9GyxKJiVAܼWѥt-lF<09o!s dq碟çRLki+H״<ԑtRY-[--tBgOyNrnU--}t4|U!fQ5ݑԨk(+t+SEZgh}:^ m.c懡rι޸G+Bڭ1|{FpuX[ԩ{ 9P٨*ǃ-ݮ) 02]R!(HѨm&n"2WFQK?.[ϗP5 @€(8]sC5ÝեB;lR`MT~-hoeUY^U&,aA3U#Bvj9c )2t7̩Kpʒ<,Va9ۛژ`~zTPk\%!@5n_FuC4ܜ^f({ݨkFbzL'u&7+ MV̽ L155]kʛn@Z-ھ/W K?U><݇rK8<*#x"k, Z.m;3(ICG.ȍ8<%i:s[ R:6rlG:ؗ@;͚]2'8q Kp!\jfs'Y~sQW}^HD@h漍iAGcρ.QuE/_6%쪬,iuyBo{pnˆr8?J_#<=0H?C"f88 N.cK7:ALLH5T^[~grR;":;6PD3I,( ܇0R^oeA/17ݽF1= `V$0i> q96!'.aɶ!›h`kNkP[&syMCkK58F]4r[{0'u'r+0="p1IžӢ4~4P#%]ffh^ӊY8M㱐PbE3/ƾl޴n_…,GI=L8mBĪwMq앎UNJ*U*뗗Ex%DAx5LqCz+{K,2Za\|jp. KەFWK~B ,pĸ6VNXI_9T3o;z UqkX\B'9cV 3g.މG~xB6e_ euʥ/ؘqݠ,tъ[e2"NN#1'+1?"[We==md`ĖqyڙBdshZ4pwыM ;|ŵBC00rU PKsO r<]`EpFCT vާ&$ '1f"Ó4t@H,W5IaD̙&!gLn&#ڭDld}˪[~;XWL N z[0> i'0>`;a_m0P>o;XO:7MbnMInTEht$WjK\XDB^GFۨP͎o6SǬu$Ҿ8hBvϪ2qdfkʤO {" j 'O tC4ed,ހ]ߐoޱpOegf߻ґ_/dRZ|wwu 1GKFĪ2Ykɰ:JKKV@fj  f' NQՑbc$оSV3^J= P8$e4

s|HȍF)A^'RnJJ:H+p8x؃G')mDnk=SxfZ21lMr>t]erBAB}EL|3ZDIa" Q#R_bz|-zQ/D<[0ORw~I%(ۯn$^Tyĝdÿ=BFדP,@Fiz/y30T igAxk ̷@feСgDujwGH`fν[*[`YFФ_K %l&pCdhtS.+@\|AGe߃iےKO8+A Y5\kZCGԀږg{ NZ9BAx vƜEY#L_}T); 28SUfCUzk|Rg&HMZVwy~Dҳ?̈GEЏ->{2Rq ȽIzP #ڍ ]cj@=NhN#*5W~ƏeJq0E9טm"a+@"i(eyԦnt"<=W 3;&"P"i{,?On{6llL"NP j2$mđE&$KΐHwBYgAg [>p|PLU]akJ(+Az sp$#]K J>}kP@NWX\Mo$W{Y|ByStvdKP^gx&9ʊ(8Y&oMM9*):_h"׹{`=(u),4hG4Ӏ@ZRr,f\"e*ԺwKn'Q CAbt_uMy(|~Z?-Ԇg :+c>/ DW)ۿjS)Ԉ^ndd?TKåtv:VQѕk +y>bI6#I\dJQ奦vE!DUYf&BNȒubzBKSaEeo$Ln*ݩQVݙVe (bKZ7l1&GGxI RaR-[(8֋kZd3ࡠu}z"C=Xvvt8PBv/S8YXAXWcu`& D6cvᙷ^sP,5!`xEL~>wdrl8 ŅEM`"\F&.EuH&$f·{[1rL0&B#f؎^QbK{6ߝx}̘<쬃3W6:~3(O<6^oUGۘIG[Ė.?tns/Y߼N\:d;cĦh`htQb1,~[~ǔ\EqyQvgh& |%ᆙv-anh-Sû!e~.BbEZj{`ss!#>UDudqdQs'gO## 8.?&.}!E6S9ށ8XkjLghL%hubJ;J Cw-NH(o%% k_("6-n9NB.`Lul\0t+@Â}@푼`g VX @8DCWe˜9gϻ+"<>%vi,(w? /]'' 50fp[v|PK¬7dsIMнjLG?=ǣX `N|Q 3j?`o{@ [_MYt7E?0j /s*Ƌ7Qqu!džXѹ$ni؝)Μ>sL< x_w|! 9`CaM艄+i)NFG^qh4*lE+ GW&$:sT$u2e:bVP5Bg1z'mO#JjiةWY+xn!iBD=?];cp)&05Ez07yUY-i(h|~_x%Q2s /\i,ZzHUg W.W0;6q,~YRp>kE_T~\5YK>|_Sʓz{ݪTs<[,iѷVj|e\-U.;h,ؽ ]H;nsNAMb\8?l Wlٰ(HLcDuuS$.kn 9l|;G?K&gTiy$@__yXSvT/5:u/Bg}~xbFtAs N hIYYW\phiCtd PFݨO߃)u[\a[906<~|KUiv }@KU-@,-Ã-xЏÑQ.5e])G>@7¡_Ck=sfoT)i*Ի=s@zh-mi/i9Λ2:֦@3Qa=qƾKnQ#XIރ}sk:(b!v))erGEV1 )C1d&5 Cɲ^p !me֝| ([7JyQzƜQߨxHVh,jfPx>J7\ͦo-Jc=vkYgp-Z74f1_>>Ҭd)V3Ŏ6}QE1bv7_5Z+8I[UenzUd5ҊJ}9ض[\ElNx酼qL/l,1jkiNwuK ;e&XGտiEesmFq2 G3354‹?yI~9q(d||VM+{W|V0YAoHy%? ajJ?F̀f4Ez*|Νۧ' |7Y)ɵfӄaqR #(Uip6?AOr,JF;ef"᠔7t~ JXg%\>ILNJy2ݓTE׫ 9kc?_.aOɝ"lcykJEy%¬DBq[8/uZəO~~K̹]ek!0=Bv'vy"s|*ލJf>R,dAF$& )AOEo]-bdNҜyIu0J>h#q2D[0fT9R(> V,-ǥ.Z~LmHB ~g|&#jɻ81톌])r{‘.h>m kXm{LfLHǟ?vm mw Z̆Qh.2I5 ,),0 }̒-[ѩevQ"p2}r9O(hp-HAAFYI%/<>!14o"! mmK#4$+G B>x5Q5 zws)6i|E^o,;8rxv;bYZi Pܶ N)(U8أFT1gr"%t"m`|: E,?fkD6/;L ^RSp :P7o {O_J}!CAĥ'Z _PPhq`"e(V_08"d"% _ a.Z-@|fOKCG7OS?8z$V+o]C kKfߧ[ٱ\EHpr/&jx; qfqqO+sբN].|\dREv'_¾NIKW£:.MK"7amFCM5*ɧ_'s`-0) Q<C- }|J{*0^V` K;s ` C̈́wЄ*00:X6PS9V{r>9iIXHj ܖ R5Ԑbq(:vy݁fϩ nQpˤDU77/xGƝ՝A<" шLY0~SY~{wdMjfVm$}_ZvK?} J7 2A`xr-(po((|Aho-i@B(7 JIBUmA#m~|cٲ鄚V>bf%à:]јMھD9Lj ~t-dxP86b0T7]`uuϿ3LZFZ7ѐ0\{VmV-lqPWqPBo<'=djʾ1L3n3Necg'YuozcŊWI H[Gt_}I{,mSHEUGd!QާGN׻귯Ѓq;J ؼ6u.>MA|1屗jZKݨ[)6R2T-av$]= <w=X!}#a&,'-3/M&琺stR2^>-(F5M" |%-x,d-„M$*wh[H@vc;X2G6",yfz=OxFZ}䵐 FA}u*u ,NFBJb1}Rti-;+{0^9#v]Wߋ*3.E8zJsƀL&Pqt2AWk \/&*R}"qrl736%HU\*[0"2vTW &fK_;3mxH! A&MrYٽepaK;}8ͯSTU1 a[|p6eZ|k>!C fРow!(W^6RD|Dff6C'{VfX<՜cɞܗVR7!\(5Y 7^wYDef=d꿏\,z.NtԒӉfWV3;ft46~+8F*9j&++:`D P^\)QفG[N^49rpOd+2Eklt'o+[l{/WpI3RX D ݟ93~#AlD{(?Aҽ~A.b=XAh;+΀r-F؂-lbTVd5P#G8A@^;/oKh^Q|tϐBso`JnL% BQJcSE9[Lz(lSP5rѿ!Ct~S>cܼϨ'U<uK3Ae~TaAX2Qq&;5a!OKy]E+6AVx5BSQqa J7 TܬL9\;@OF׫DMݭũ!jþY>JoqRL.Ɯp"Gb{%nq%hv︈ F=ȮL;EIId~z15'uM?qu8lt(䋰Ʋ=}oՐ8[>oXS mz.xjpٓ[wCU Vd$yF8$qB  hÁ|A qB4&P}7fuyObO$c\nSb7oD%CY6f/_ E\`]#Ys/2ɎʵvHYdYw\Lt; k$ԶfSX Ե,`*?0|R͸ܖ(uS][dA8M~i-F{N)9t)Cct^POXMF%q j=6)mm͡jfU1*-xQ?foA] y'`0UΎ \.Pʉ&ΔRs1q1]4 6[o{`if =RR(2Q6{*ڱ5}Bu~N;Nq!TOMfaWH.^ޯhs4`oOճ]:vk:Eћ2rovK#32Z[B+H+1o)_qЁy߫_ jI1' >*OEַ39}X՗&e٧W~;hjل}d.AvۯDy<2"g}-SPhh$&ts0gj<~VAbt~NeH9=]yIc2o޴BxVH{NG7 ꍜNlPƺvtA.cMJ!_QgeoQE W3_"FB6t1l*W㭰)2HpX'ň"Lgې`/hwai&^Bwڵܦ-{0`=d ?r_KCE]嗟#:LLm1v|938pgk;V -tE {6 (NEaloW,$)/'J)י' 5|é[ l :$ˮ3U{SRKc7p[^`caN_Zk^Ӿʷ\zzwVi{b|.I^*LB& O1V`\mA5*-풲S%{ZgI/58GY{ة͚V2]) H|zaʫpNA<<8e'8S\DMOg=&suWEv-jC$/ C2Q _*F':^%Uu Hþ9C|D )1 iKTXr /V9o7SdL>& HN>\bzm:2BbV bP ԍϿրyp;qNA*MI`ғngs>{Vc==l}NJ uZvU^Nɬh lm6UUUl G6 pJƀBjm|Uq*xӍ崨!𡃒]VDŽ Ql]h0\(!*$_ւ}*_s y97!? g|dV![F%@`-ѻSez{i4#B[`]WsD b3Hvj".QPP/l6ٵ2omRQ0H(a DnDGXw&,YW8{+VoO[/@7Cۦnqx^QC (^oA֟z6:q> !iVpWOR Zsp1\L~-Lgerq-nEl9`GkE'ܸ'cTB"UUď L"Fk{ghtZ/ݏZ CVQGub ˆ>PzMГz쒷[d{悵T]xcy \MTZzi싘blC&oWK>.6z~hJ6f'ک^}+8Μֳ mu|V6EߎA?mZOŕLRDC?sf8ϒ=ܺY(d;un^5Hq y:0T-|.SɕEHc\̽xFAUيS#+:P@5>9!8q3PMMOB='64X*|h>6j,qPQmudG| VezZ3.m%--*k .X)dpp)v0%j%p tF%fQP$D3~夥Q}%aN"26Xil u~ʵ:R<`юv$3Pk[2+^RFSIOHٜ~>@b3*Ƞ pFx:֣o?QIqF J6?f ûS0K6 )j9o9'SA\i9֟N{YtV[,iwueM_,(U e/"NbgYw"l'>>ഀi$ޚP.+4Hq/|oEK'b-cAyST~L `SDieq97Zy{!PT] 9KP1Fh\<kF6JcWu1ݡ jQ2?? LD+tDčq2lPYlծc%BSeߓܣ2%Sl蟧.w㏷ wlzznPz5ll@ru}u;Ӟglr$.11h@@9Aq4_(Kn .x h mjCշ߶c`f ,zoz8z; p 5]ړ$/-H0vVe! `oB~pm1[ hE\J-Dtۄ#$ߩr8;gشGm[m,AGhq"t^WBhuƞ`BYƎq55VU4+(ײ$ 0ܳ=}N:c}#_]zMհ} 85}p$(Lpfζ*A-9ȲR;-rEW/+ WO }Np؎J#VUeJ}~flF)gb5gI+/ ֏R0Q(m"ܷleɩŧ|1T_RӞydYkVr&I=ơ.B2N젩"NgIUh'o?&byKX\`%)S ߥFNlً2-Tz-b9| ed*"DNFy$a'BQJ1J>՝=_IqwVapE)t97 uDwc5VNT9q_&K=(;7SJKew+u%BVSIƺ1>NbWF!E ΎH{N"/G5xi6UhMrM Wf$CI6{qK*;D+QTXDGQFL9ig}B ;÷So㝘k_0H/hZ6.Y|DQ;QJoV4[\;Qr'#Ddmݴ,ݚQ,'/=s2kBf$iL]ʞJ^>өiW|A?F!O 1R2`3@>Q7pl~+.@vnlV8"0=7K[0FmRiPcN ݏxkm[,Zie) u':'sgۤ8 |bӶ]e|5$¦շEId^&^(}oldnjl_-0D'(DRUmO#@=H|Wc*i?NZZv:'s}ۧ=n$u*thu4õɒf⒓mlknś Xiă]u\qEJ>ZðKfHwiȒP-,:6]0|!0*W\YkwL1qE9;:M곒aƵ.8827Syjnp,L(hԅ6dl d? ܃wzvKs)T+KؐM-RjYΆ2)O&KsI_Nd@lXN:HVW~B$!/`Iɜ5(Zl&Nj b\Y53 l9'|帉$G`! JGih4GV{Ag*/&_ ^.@>}܆ABkߢc#S=wb3I:ՏC~)Hּ-,^6員PqE aȉAr&'wul$1uH23LfVߛ-|0(~& /Ka,_tPSwѫ9[,kG^;AgEg3, 'BAu(Z*nOqFH;%Ȫρ9{H P")v#(K\J k^T܊/xմH%&INr OMJDRs *_ŇS$(xLhi{+x r[S}, 0tItzIazԤ94< wo.S8ÐNX2](;)Tӽ2QfG_D4?ӷY~m8̺؏m?|س>%{uP&_fSSiurQҮ F˳=`50a]+BX~~aQ:w3)];T&ڻ+ʿa1[-B~JOG997pK4SiPTGm~!!ENi 3>Q Jdb69=7_6Ur;;:TD0 #ޤpQ~%=_$+ Q@Za+%b7=<'#/Pʃ9n.D2ٳqb=HW'"]CFUiV$3(P\k/>2By]5BOt0Z+-@ysY͙|}D4sX',綹׵ "R@ p%LtJ$,E.9fD7gH9gٙb"\ݧkÊҋաjY{ VyoYcurƷH9r K[ߖ:?Ө#Mb(BV|ɪFw5"o].՟( WI!^ +X,n2>x[֎[ ]_t-:Aު1@򗿐X1X1{Fec}qFtMg*OcM"x^Ͱyhh|pq u ;щ ?:A/~ m"89 `\a: Y4: llA |k3%{1=D;`#÷7K%5˓jR#P<$EntG҂Vzhpuѹ(rYa(5 QZ6Da%+|U4fhF0|t+?p 6*{Hõfn=lrkiݡYeOe-Q"%ԇ|3XEdXETnJDѡkEFߺ#4a,rK;-D-5"&o͡Z¶(o&##yЋ7rݬ% >`1SZEY#;FDz @zhi[xImw͛ZjK!}$[),ѬTV:j @}ПJ[w&IJ,g02;t}[# ;Y+ni : zWn{Xb/ 7攀0߳wZweV6;m(EcT1FfK3Ѳ֚NRzTF\!pdl*źym;6B Qի$AϏ"qZAE\_B&ӷ GT~rTFbm`K46;R)e8`Iu\XzĽ|6HG" ЂǪ8&qʣ=EvO< ]/S ny/jhuwHq ^nsڕ=EYb!poVcFڪ1fVC=kqSX*q҄5%)y{`;?N]&vLԭWLX7dcplGǯ4s Lwz^`λ!6*H7GAڇe($b1_Mև#a6tL|w-Vn)-U!Xt;&99"gqEr9aQajY;Ts<&>%?ŅlTo.4yx_^/ oZ:;0P_ACd@^Ɏs͵yy/p;-IQ7Gm#Hϳ'7bs(ᛅMz-J Li˖.D: _u*|)Doo1yދeh"AfJcq Q_[AUia/<$/;&¾w@%E(؈Տ:PfCI[y4( fP2c=#A "I|=+c4Wb%A}?˳iT#@uZGfדT@fᛵ7RzwjۨB3*>HGxMŐq:YZJTN4SyO7ΓgJ&dM4,Kt3ϐ pBw쬨nlC%q J_6'=r%hX\E{W8*үRvC.& Qns:sn~MGP˹ Ŋz{N)hإ Ce3Q Tӵ[WϾKL&7&GȦӱt`SOTlogET1)8S=Gտy*K,6--(?Dd=&k|'AmY<պ}zn#U YfY1]NԺ``>s^4f^XSxFIK 6o:W| r]Y'Gp0z[Ȇcf>QB z)[6#czuɝ%#.A>0C4=ki3"ʔ5!A(~s)Bk36OuT(~:X9Uq0't"dD U @S0[ևō<&Ej X:>:&n_~~yk WکanVȃ}DZU|-4Zc>?Nڗ\m8`bΌ9ELW ?ؿ]\2_=ZoFJŕSuM JavdC bĦM'4SEC؊/WKrx=L56weo52$ڜx߈g!~ Cwuס9I,UcPv߱LJ&wKX0 Wyࡘ3^!ZcPT 5E3* N&8F6LF޺./+d+zTjCLOᤡl=5 Xzٲܠn;0+*{:aUwFiq|(yՋ{-2oSEїRP&FhV( Usbpw;K7 7y|^ŕT;Sta4>1Bƾx+d_ߊ4^]I*ƴ*Ybc0E~ eў#\"~QZ֢*2 VSJ+ʂE[S 8 \1$uڗ|zmvB?.AIUr~(6=h1 yņn7 垬YQ;mui(^ИS#?{Q}S7iS+-{JE1p̟9$cq2[TgzM5SA P/AeU:gCi~\@+˗kvu‘ECAi}ẑ1cyTMd^LLAXc1~&y" i:KY;ӓU'OD7usL=P7+CRB~"H=h7]Khԃi0QQ!&Il 7V%#4. \+1*$1mtff灻Y/"tz· Z+ſ1);Z"m2h+'אs5n)\`s< T3G*߿D~"{F2- ~@tlz([hMߋU ScO1yJQ@̀>r -"IX֟;v 7aOx k*T 6F7ٰ=:;'-5ʕd*q}f߰D“#sB+VRٯBp <wY}τ%ly }+6-A%CB( Pw#\`3qM,1 u7zMC.V[8y0G\(%AT@Ϝx UŴHHIH:*n#–bF>Me>$Irg1̓/kmlmg&ge]mgK. Hb~'TUph6unѷ!' ר]5VRnx ڄLg _^JK^U߇e0D?[ _ҞM^ȑ5"֑ χ]e0`qag2t2:y?i+ l]MRE7k!6jgp)0Vsih5~B+Ol~N1Ϝv;fشq~ϝDb1!## a\tK?L'J¬" ӭs_m[f;={.Q7!"D[~hr|8]X>#7j?)f}rKMq;] A_:uF*{i>s+7-Onq[Z;h 397AUq1˧wLP xKFVF~oߺ.&[ؽL|[O93}4}r aa(rSVrXvjmD5)z]dT&* ) OGm]~b`&s)q@cnn%(1SPqeX66gpmp5z#:3r''vmdiX9t(쭹%&35Xo3cQW•D`xȓQ0{PIRd܋&rtt`&Q?ZP{u/>t1𭌓w8bu xL.X6LrbRv\`>;0I?4F1F!I׸JKst $/Wz Љԥ!wEN;OEow~*ꈰfDŽn 5?x~MEuP:㤫fDA&z =S 0|:[ck~C C1_~1E'M@#o\-gmj-oC0ҮXng#s_nSB%lT4u~D,6fŏb2f񱼨jQo/3w !S2>A ş٭_eA~c:-I@-=CB4|(cOVrn6ܡn;@(&`:qPADR7}J8EF8).\txxN4XKn/=0c9+Fn/Qqͫ((^! 8mHQVA$:=iր4(րLeJ_2Z~dZ7kUfٽNގF@{S^E~3`$ѩ9%/];$9׀QcG6~JahFH?yoj8ncĠy^ 3_m`ci*"83 "Ѩ~Hz b&,,o ۷BJhMw o^j] &Lůh1/zH]IkO{$W!NO^eibA-¶ hczUW&"66Am-<?8ªٜ嚖{( K=litIY|l2LuxA]~§A (UZC3_L8[*|ڎ 0KA/(xB6&@! )vhxagZ xڲיL*ps ~Ǣ.~,Eܯ 8OށNx Љ}IA ,"z+.gbW䇥Tݏ<޴ڪEcPoJR*R]nܙ._{)q9> .f=?&`B\Q * xXמH5R@MF ɉ--UT7?S2T*[A<Yr(' Bx<+[>dHf^03ME>RkA i ze\2kLT2yoitb,Q -'v어ndb S%/ %QPv0+ߠOnr,X8"\1vvE!5X pJC DŽ4\%0_)U&SƀeK,nILTðiz1!ːN% CXߐ= П5.bgr Dc!XnLpQFhrKqmXT5&N'ߑאp!nn`x5?%&,Xqp%u`4rڕРKcH1.KOPB-m|r""0h~ Ē[S6d\fl=F =ꪬI;V[Sx1F^ծbDL%M"Ϯ.H;tXgrX˿"KO0{,YarhM{jhZ䙉s徑>"M{QҞ Ӫ\K)6 xH1_@5iނIE2ޱ0EW Dtr/܃y+Ѫl9tYxMݕb=,k Y ayvS 3K4all,p -0B ў.Gę6J/ Ș `gfԄˆQFk:j2!Wm6.5"zAӯCYk%X#QыbRZbABI"M5?o;z^C7+rح>aǘ%dNJ^b7GDeRځZ# 1j|5TRfa gޭZ5E)Z[$5n0Sԩfo3ܑ=liI:*l2G"ۘZמF[1"v` AJ0qb0 $Eɢl.!к$".pɈ巕@:>xb 48 Buem 39aTS_(kCM[@4sl#ȿ?}J君mi]QҬ]GUMa LzŽ#d+ bFL)O;'_|Ʀ]s6&]p8\N)?|'w;2݈Y %n=?O,JA (+k?90B :z \ȜBݍ_酙NT)Rw=6YFWv+Z٥%9p/Ux"6txZ;C=Wj/.&'ĖGU*l8D(&le pD%NoĨMtW0+3tFdHGJ%+ 'MX2Z[T( i 4y_?Mktrj\x=\dY:PݪjA= Ę RJl.'h 9qh6'+S#o3.+XTR]u_bpzKc&}^cg ՂX0 A,Zݖx.է+,Fi(*.2X~ORFgv6p8TpL+tx)0 #@0jWl + LXdXވ,&*(,CU:p !a%R6!J)jJG2F#dNqbHEdĨ #(CĥEo˹ap-|jк^q/zBiiᙵʖ4lOafCzt^@R+syvνkH?M 6JQ4~i4%Y8e`ć.`f2㮧(ybFΚ,H-6jeR[<\݅&tf]%+C 59ۨg㘯 ?DuQ/#V4" I83O\ 9ځ@ɮo$!Ba??jXc;pcsyPyV=y[Vk%i MW0LO>,|;Y LITP Ȏ-6 vX}BPWͭ#J216[f]Q1xQ5j t}qx58z6 K^P+V.`>C 1Wc#;5Uyij/C (1Wβ\'x՟Ż^2>D7N6V pˆʊCTMwcKbN;o~[T1%!KƲbbE&'u Vh~|U] s$<0>چdŐ:^ܩjV-'U5C8p;'Rf'-qw>_{5}#)!L9.adkY^,y l+&BY)\TJ)=1-QD6*0\-"I@˴r/eUkN@6HbY@B~I"P,w8`FlMtO 3TDž% RˎɄ#`. E:_^&# 36$_jjGޟ 'Ɗn{y99fL Ivm.@p ѵ"< jΑσ P7O/RjZm *#qh})Y+?|9deQH0&LC$bWfmk˼`p߶b}hi= \1aa,zf..>Иț)J [0`2BN@ntC2d4r\{$$R>f-2r@71F&V:\Ti#.F փ;k|ѠR%LI0W=&f /*jFQcޏ[;1 őZ# Jf}iWWwBs02hMΘ4i+F8 H_u0H>S$-bQqk8BBodBS'7X%z@O\uUV6;Bs]Y9͏Q,FBA5ײXtٶ2ǞIgqRRiXV ߮MF?ZXA-+MxԷG^hD3Ͱ͢ ',B GJb\]ϞGO 9NHͥuJcRNqHoO96JOHC\H=$ʲ=B`!u5x`lͫ`ou dU\aZ2x2*_<.=ֱ GK-ihxo(͝=~Gh)L AjֶNKHFB6QO"oa:̘kSoLkuY3wfer *Q9,cGC=dDÓN-2+fNʦ`( ^6mLg.,77Ænꑁ)؊)r;OAe+l%5Cg ,Bysq3Fh>WC$ -o󡠠ٍGAPCC  ] ps''(;+f\AŜ3K,$j5r̭*t.h%ˍX_j Шb^kPSB̓lgb=fx{BpèƧhX\kt3 HK2etgGłXHZ؜ Z6jmAD\ +u ]HP8/J]c&[w)8[~Q z Bb˓VAYZɹMkPK)4>]½'ҊWuB k{lJd珗5ݭIR$m]I^kO_TZz[=+S-xbV5Db7N^қX&-(AL"mUj98^Yo]>}&mGYaA Oae ́ o)hjQ-p<)BQF"&aյ&vD24# v(+??s?-õD%\ۯ_2걊Dl7 -/ ̿3 (y\VNrX a#Hjc;)ދG f6WXs= un)eueZf iֳ ^c9纓8u_fX}0ܾ$VpaYݻLkoQy9eV*}ɖKr5)\vʲCCAFLXC٫l A $4 4 H /ſb;$AAw͔ ;EkK_+R'Nf;nw $kl )J.҉26`";.H&܌i4J'Z>UЄ+W#-%8Ul_peH9I@f Sqјgvk^O0G}FQG3j{Tp2*Uo!2=G E&oP#Ư t-9D=`8}ȚOofhU>C Fl*_I} zͻA*1N@h޶WUDg 0&R#"˻ؐS±ߪN +ο`97mŃ06pc : g߱v1MZMKl{1jP{ cbHfEg yжf)CHO4..EX ]&P2(ll`=W : ٘;gۃм=|#gM"k*b `]wryв.mhˀ4h[$tL 56N9r Ҷg^댹} t I-jDvLwAC6> z n4 rnqz &$aʄBC Irt98^){@m%RoK˞AVNwj|T/By$o) r{3vq)4[lfмt̝@$"?`ѭũ2:BRbao.GݚkC@}*cLڔ2݀y֓-գdC'.dx衷 LzO)$%J?=DrZxt,a,Xq/"c++b#`P91lwчiD)I_bmF29g7(51fB ͌6r.#bS]OỶ瞑/Ӧe?dH^G~_Ս}X7JˆsػB[ nv*  j,W瓡>tB oK$0 ;t?쓪İո<{Q,6UҢDZ+&Dsvs9ѫUxzu%" :U8k $>Mmǚ/$e߇ȯ78I&I9H.H۶d|4AYxFǻy&Wo`~SИl-kCRE.TfAwQJ bR}e'WxTTqE痓094?<Q4'1Ngjxe睰 ,k4cY[5'o8DfI_̀cTC1k)Dύ5vw۪Moc"x@ǬEIk6JY_?Eq޶g#@JkV}!θLe(x%H$I eDM[ X5UKj WO,B 5 gmz7h=j.!(b;~ {. XBV:Q9e@G(5_={P6\wNܫseN1Dtu(pS _S~WSf[`%dYcHLX. .|| RUF9ōjgR$0Z*ʁWuQ@ `|6E4tRdoD݅93@, tFzwWa8*tX[Ly /`` MRG_+'ko֘ZWmz8??|ݟ*'\  >,F cbiτc:tsr2ƥE]O ܳQ81Rp}HT wV[Dnո1͌vYsUWX'9+Wr" ~.ueD' 'hM2:4K<LD%wN(LgՑfLzmծ˄>Qkv>R }pD{^H\g?{@AtɋLm#˒~BX[+`Ǝ*a|;֑ݞjcCv4|Mw_L+#Ԩej)3ؕtX!M m7b6K~"Z"&|V6|¨;xPݼS໩$ _MeFI\[)1μw)FPd{DS)48, ^ k+ HYa\>_o!eת۞nB~4H ƚ>$lWǤSJəי= &ߛyI|E=B +Gc+i;Ρo5 #(zrtiK& k;g5z=ݴ;)͆S]ԕ{z? O}&u]P^bnDQ'}#59B7 ;7w |䫶Cr'OAޢl\5ŗ1A_1Ae=VKZAGղoҝWk72=%|UjLy%&",~ ?yDMu3VG[4.wkr(]9 w P;$<w*wGb`ȊﵱUYZѡ}ݵ n,ҾnN-ѻС|]J}mچyB6!ZL?"[ kq #\ 3|-&x,Z4k-Uda8SZ`"9:Z'aےJeXN*3z~x뭔X׳Iכoi{B+$$g/I6#$~G_LR}4nXk$řRU0-}rOdf:Utt8tOX"# oU>U?$z͕)beoh2g) 㓡=P7Y|IduIӲ)\ZO-$#\t|w4T_c5 \U1O@Ň!pr8NZ(MYȪGx;C;ƒ|ҡX/cx"5_4&ڭQ}f!*LRQ .TՖ ǟ߬pKsgË̯7B3*|]s/!fd kKp|Fj ' -%@۴ɍF",~A'Q\(8~WS"أ2RV]E6w+*[Cq AȔh'3os17, /5? U MyAy ,22 ;wH@s5^TZ238K{ {+wS!Nbld2pÍ E7My.];fq1!":2+EJ|\kZ,EfvuA7¯9G ɾ%n@1G7PQ3XMkmJ&PLrKk㣈 oSWY#2yXkV":!԰>m`o@ c_yr٭t8hA"!?cg+qM7+C$*%ڧOqi;a'/amG\E(-jU2x#fyre.~bp\&S(GY9u YRZ?m V*u 6 u˕;He[&F̡&RȧK|iKbTHIlvGYVk0KYjz/X^W[4I܄-.2xY&J/Y S ."BDrP5S >fF"g %Wdw7HFRsb5UC] T\eCht;ЩM6IFL1e'ٔk0Q.gLIr*Q1 v4@ڨ# !e HKitݿ@5 siF2Fux~~d{zQ'L0ݡď'm J!eЎ*epD4hްƈy"=crB6%PgA751]ƿİ(SC,@*.s~ ߽R z a (ƶWb1oH>,IjqJZ31h[}b8c%tJߣ;qgs1cC\vV3Csl<&mIm _*)[Ue7w}%ĀcX|L27'+DI@ ;!1W_t_t%I§Z.L媠z:Gvb5"#;T `ܾ } 20iZwk,Y=z "`m KM6;z*Id&IS2H!lTYFc|r1np_Ryi͘RoH޹LZvK 7wv%਀2 2wOj]B{.M=/2o%ϭ  0>Y]]"_À\N|f")S5}<lf%Pִ:GM$ ƮSPҏ>M,>Ȣ8"4L{F1)H吢ڃbv>"`h@F^Z^u?4o1;4 QdUD(fOk?&]R!qX͹vz궡H<'ENkX\mqőR4(6$RI\גً܏' f nR,9'@[׉eC~38 宍*BT.GPچ 8##0ÁkK:&0.ь``$Sk6`ăsu2TqtEbsiL#jo:!Qi '!]&/~VDp}! kviJ.MbܜSѤfՄǡ&TLI=mr濚Jzx!{[e7-T3S#gL ~\F/N޷(/ɫ*{Zns2'kjt?5QBO}NF2#KYRl8&BZ[JէभsOEwQA0蒌F}Jrʚ*5<#.24ڛ A@c=u eE_ yZfoGɑq #[aH? ^es=w8(4;zQ@ɷqqIj+CJP0:kmC=M% <|:( C|^~\Vyܐ5kkAJ6oXfIsO<`ď5 &wx;nH U6/%9bB_CL.] w"]R"J{O!D=[~$ߚpv#e ~V'd+D gcr ulH.:9I {.0T ;[⦽W;kЩJX<㴒";bَjf1bPC> f]SUqG.5$b81;.Sb!BYHWxAKBKsziqph"(],51 Q{hlˊk'X1?}T=Mо ?,s][ $P694rz_x};6;PÅ HfVժe‘,y:"%R(D.t ?Ha.8 U͜F@kzi8*Za$Ng)ȷZ gL`߇I?>A>Isos{I.eVv`|A +adqEԾa_,O7N߮"|5b!SS4MFǵ`'?Zc>RkaMĎ v"QyAT[7SϻU#D=j"B`#gnȁTV,hM8k.y.RHϘނy50]DJQpC*+LOq@-`Ul;Z\E魽Ga'ߝhC{=xV sV &RY' &K^AUnGLSK1\$31 @PT)4VO*0oNGqp/Yyjs9ݾ޻whZE T1S.c" )"2V6T~Q s ;vŖ݅=qK0x$&4 P FL:)U1y `"Ƶ^1P@raBnhb}=_z!Eo3 *j)7fBe\~Ri:%ZX7b R"Gmo8l-+7BbCiȦB.#y(ֶ6YS"oԌ7(Ju,falCmWb"^˺gm8~3aPY?c1e|$ F`{KۢO aHG 2!JOSUXqiCƞUwii9^e8VDzqr S\ P$!qГfMoG+|ah؅ö tIM}yi޶i$ *DǙrP>_#J'D:D* 5*qDevrkX+~# Y@^ミ!cO8|<ᏦFPmLo B םX[ܒ~0Vu&! (Ƿyy  L} f S$Jah5q|u>bg5\E$ sn,N -ΦUە>%eW!Xjeku]WܤA"gcG ELc[NB٠oC2A0.,{yY@? &m%"Cˮ&Z>T :lVpv:zN7/9Ly1md6v-k *@- \?_0#3vҔrriO"a4Mk2(v"9siĘeO!'6($d*Db&Bf"k] [ )3G~=%y+Ռ׺tSCň.{KvdXuV:U5͔)R2d /`[d]θ"\czht<}Ľ>7K Z ?0;䇣afsKa:uM7&|\(-mS˓[En(s~;jJE=zvR5>!?;GA$yAř+)׵{хE4>&X,YjI=W4U:jlNYPɢHO9re qJ.VVDJ3wȱ@}uY{"t!I$-+?ču,dinW}1ǙP $`*G¼$=J. VGk+d+b:.!f%xC?.!̵LLBy^ B.j0i8ǚVx#J%s7 @;XL_#{ qC vۗKK{Jr&|Rbٖ_،h&֍CѺB3ƞg͉nEL2W>dT:ǽ2]K:\!NN4͇A%9+-'vW|ɖv:fzǀ% <]YHHZmF29|#սfpMGDҌQdjE$uU!a:+t }-.)'"2Hr 2f1N ): :\gS"FȻ&M? { p=ΐnAh: F}U([ԪJElKk 7sEAu)L!EսOvIC0XНeҖ VoY /u9|R;zwM@.QPԶfMvUx .;.zԚGb݌yo+i썙 ߆;3֎Y3erL,F.y??hm-'11N"c/ZQ(~cyYnश5L&[q:?N@m +0y8.EoyP_9ZQ?YlLifGR.'@lGB˸qXpm4&Q\d- OZFꆲI޽Km_MMn2ⵍD7f!=Uzif1}\b&~^ַ}藁),lm ]]=Z%NkI:aCYK+@Sp\ȹCs% !J;ӟnM솪(4Nߛh^>S1CEva`FI# UgS[0r0;˅ܶE:[-~9W9y̓ԚyO9`t"<W(XT݆zۯ`ي^~8 ^v,2^_}Aʖ&oiz;FG%4|R؄X.P93.خ$:K~~فi," L7e}~~5[E@ ۙ?hLxau;~Q/3Z;s쩚M|i oٲ8s40[.?=GpKkvIZ*դ$A&k=fJQI^vr %MGu2#OfrMY~b;t֩o9m}Pwq{r,9ćnVX@5(A~q_C^x#?Vܺpg64[4ۡ[1M -0d&zi)> K*>>'RgO 43~U$Glo3p8>y_˝zc$!:4 "r*o;j/mKtpQ62}CR /8`ny+ l5+$T2d̃(\[M 6fzeG=Hr3I@v\>zR),JK9 x%;oMwE R1fZg:[(IBR`Nx;Fβ<ǁ%mH $DbpBF?P\ArT')3.CH+$rn-TN6bYH0&N^{ 3PT=lMJ)ZzK/{-$seS X-Xf=$Gth$ %cYm7ToesfZ;FDI~ϼWC@8ԶX䀬I?Q6٠䊥[O6b nW̋O92;gcPz_ ԁSqX+$2{^NHmΓt).3ջPE&@cMJ2W1W@?Řa;}m00쪰I{8_m$zVl{#>YA?]Nf^[DФ/N+awqg_/vNCL<,TD783Ɔ5aJTƭ٥>~Ӫs \,Q )dkք{eOՙ^$/6銓֍ (Cz2{yGy3mƌ;/d!v1ndT )tֺ1 :1mh4 3gZST =]#Y`-ßz I0FoޥE?!GV{!i9A ocMʰ?dž`bk1Ef~ѸVX)Č,MYn,E.IV 2r sn3Z4#Br+M=kr9 AE#|s^y\LlfZn˹٠|PUl@d{bj3'Iރ5|$;C"Y8]O6alʊ|5,ୀ@zDeTX0x^Ay1t%Z^?_Ap7@M/Qρπ-^ އph=b\? ;;W;X+: 3=TRuy;sjLÿ:/{9QQ̪ff5 jڒ!Nj'r4rf &y5{dfUԌlf?$8Ы5&'o~u7t#ޚZ9 =Q@ S6UNtu~abfS|9F.Z"EE@b[n{ȣg!lFeLj0>ǂ}[ V|3{(G$zh?%}-\>ױT%<!oz[A31XriQd]WkCR7m 7PD'O+\X884EHjx7G-S|! ϒzfĐFYׄAoj-gPue6v]b7U>H+%'3E"HQϏ#U/Y7 Jk͕9dLE={s4Z &I<<k,i RMEu^"pD&L20ԡtYǝ@Փ(mɈUDNJS^}'M-ҧgXe~ڲaⲴN\H8tV]A;ZҨtRV8 hXJj&`3 9lRˠ 1,282.ۣ'o@AQ&jAM1ʖ^-VⲜu\4QD/6"سD' \T0)g!GJ@ %/mb9Xl`gn +gKPՆۆ`fvr 9D[嫨{-#DoEY;%P/1d,r-$Ynz[D(g:5D2Tso+ť̮_)|וHo4v%IX{9/>:cntE+=-ECp جcH5~#thbq Dqx` C%zP+z"|٣a:7<ŸiFk1Pv,&y 2m!k~zASDҊsOyTV崈DC6mryAKs"_(2ܡTO3r/L7s-Eͥn!(5V$2`c?UU \>f.e76^xaB<ּD<됷6o+$nHsΈ:+t"t702CU, 4(K!⺺)_e?a<}n6@0{*[ <7vrp3nn!\ͥˈrҀ &*x%A&N/}EӞvs{0p PPYQ/n^h@sFGcs||nQ2YT+O Sm(V 9ƒO.sQ]j4L¨( Bܝ׃?`T :$T6ò\IX?JPهKzk\3x`>(Lomf#{j }C_dTR.?3Bpw.RNG,5r :};Yh&q Ofo^,E3ԆugI7X+0K> wWfR yen!Xzq7fˏTOCִ\f V: aYDզ^Շ WdPlieLN₇WdE W'E:H[C] fh^T6Z% ^vM'&NUkB DQoUV tWL ǩ@'( nk Dasdk 9/`4zpdPvUU)7_~FLs]aERԍj',aj~9A&1 @k,?'00̑=i#ML*h$%F >#Md:foPYvGZ͟iHaoJ6)U _.Z'HLRI< BsK2J^Mt[vQ-B''^jKs?)܏(?dss*/L= wQg k(g )p4 J ,Լ^0`o>n=ܧs8\&/XtЯ0 ,aE>cњ 3ܔK]MCXygnNf@au}b'[_Fܳ%Bm/'|ݙ{LyU`@ag 6D4jd1V%{*_/[KE`ɮf.˻CiHH(üb#C~gx+lREE.zmmx6itA~1* ֨൛YjrhPh|exl.z 4*$NnKf> E ԕ @qSpZ WGGMt#⢄R$g*s]nS`_T">=z#'^#O6lm\<~CA܀(S3`Aj#}\>IxV%DBPߙ#K/`^>W%hQ (A>.5DqY ].3Ё2"n3dGi)G7zD+;WUV`(XvőE1FH%:0 c2j92eVY`83iw 6,NUh0eM-Dٟ@h6@S]I1u4z'4|fc/0bxHJd$@-(5/M +LX|*t^ *%\ DF6՘ t: LxJGCI 6u f۾M L]P{U2<&C}J(tu+R}]6qG. ZtםZGH2c}Q 3~6-OX .iFI*U/ɸ o|I9ʧ^q/S5͗_|rKKar+v?pK]'?+ٔ@c_s~+qTH58 ckP˄đk( mNmU-grv Aqr! #[w* nipGRl|eTu  XH9[Ku3K:8${6YA^+q5aEؚa}LY|Th( 7"9G͈R[ lP޵Gqv*ewV#ɽ]N,1oqHcj ewؿ(򿆗1eb;$=hp"}j[ *@?kkΤ-67wG qE91wcfOsQz{^9PS~VYz1ՑX*Kq lMvv23&o/gl󇾳=gK bZKmXo#'t:x~ $FIA-Dq0,y!"[ռXWYegbe8_JQi,!MH1p0Aپ }1n]aKoЎu*h--[p㈷,4)f]_cvUukc .w^+g)Lg F1I`^Y ,ؼgjJWkJWe$KB'G?ląuY>NaDx(PxԬ:lelZ*23H񒣰jFt܈k-nH=>ekZ( U{/ M$t"tUkέ (uM&*H=~5U%J[ G D .jƆJ4<&- H$R|5f,פWpΰ`M]bj7TUE=<c~ޞE-N-a}I.`|ֳN;ՀaV69A|^I6 Z}>K!>}xirIW7xQ:2|`G1V ΐ嶗vthŊpD#nuħXS O3񂋭 Wh NdK}lN.:eFK@JXҺք;X<49nT&~):6[dwu1oV ;˗łs/n3X<|)(qcBD;K :H-_{t%b :VJRb&zy.PV]zq88u!O_a,hJ \PIs7#s c='AE^K/~S#HjGoH#S:L6Z{s$YÎOӶq͑){YH4YD^4]NYYNp| x~U& uY J\tʲS1_dLx+U8kߘރp.Y{(wkSL97.@ 9 ^wV#V:/j>ѽ^]|t-}z糶ŸPl/I9mqTe.x Pl0P)-.<#2>cW}J%F&?Lo|94<_.DOA }1/5M9NfGnjoA]}4Vdlgy\Z3mzPJfFDtHpeKތFH9 tނ^4b=_ 9p *Gb)!.b>IذA9kA*@d"bkޤ醼d* tHMtsOҷ"kB|<`A`Xll#(no4ޕEFnmH#!|: Jy[dgŁt*02 --;!L09! mW?|H619i%*Jyp^ӊ| IQi^݈]3T\<.Z/(f[{#*Cc]%u- Tl[қ=υETm{tze ~#9é5t'%=^lgLΪq~ #C7tO\$ۖph1q-vs QgMѲ0="ƒEfE^_)r.b.CĢqDu|(b D> V6wiYgd?|LK?T^{fV1*4E_g;ɐ sj:CAw4reEf^ؚ]O~[ekҸ<ӱUk.K)I5PTkBj^YY+{>xshT>Ed6TYFLiLb5S.\kڂAwץW}z?ۣF̙s±b}X4{!_nN$bEjqS3:9Y +qZd puC2rjs|syfd]Pc_0֨cf06 :Y2@+nL݂د_Y1dA#p=Օr|=)8Qv sEIrq5@$-RWVD{}rp~y\:p=+?va-5 vyʼ{8d!FsRNO>&MYnm]0Yדl.x35V5Z gg{&v˷|P{~q+%Gr9jZtj75i™{5\CTj;$W+k3a:'R88UFnY,ڧr$Fq-E/FZI(SL|D}D8n>@$N"X{.F}nh_Z0yTMLܣ Hyҩ) p.`ٖfAVɤU֮:ocfeڴB ykkc54*d y@ EInmD!In% xhwpu߷tCW3D}0?hWW:^,}ݼb)Ve*W~S#4&FgH!RV`_͈ OSZ{ELHR\ { }RϞ,m %Kxe+XAQu|K邴 B KƓWOMz<H^=d"S O0XJߚY}'ɽoâ:F[,q9azTlmSa@ Qdc\o2ΥڢKq{x3͙U EiX 6 G PV62}!5'{{2ηbׇzl_ }I; - -<. C_iI(|7<2[dD42eAZOA@dˠXS(xcK'l+7h^?D/ rU-Fm0g2gI/6h}TAWUU{wUTiN_k7zb`JS_bM-WNʁPE:jf[H7Zt@$ = UDu;ICuݥ[m~" 2n(M&Av5% ͏A(gF sǤӱIJAA_TgR~] .Nq  h'JlW2/f'QMn%yW.Mg| [DTC>JYKǑ eC֬0 vLѻi0{tW2,aW'" Z2X% L Ff-2 ұ*@.@AZ]"; k3Gmo'IhLa v\nsRmYiz^hӬZ:&0pH 7Zcfe;1Lit~1u_;0P,5hNsO'Igo'k]ptW$`x!:Z#8g#*›jAti u)W ٪_=**T9{:jlQS"'˓5`۸o*>c.N'ѽ[US:yC~RHĖ""=wQzs)hgl  tOhhB.sU|bLơKٯXbRښDX&NzT\EVtX|AN$A* ٷג$ȃ[jj}nl5BFk7NL^: /KL[6S5LZ6(,{FDn[la1[j>ry} 5E8 _@EϔId TS0girHL,ƺօȍ΍gB@a\Ѻ%ߕjevE6-+ͷ iѵ * dѝZxrUh8OiEywXwuAVL~K'Q݅DŒHQo0ޢ0NtFv"=tvY8;-cO͵WkBH;Q' qc//?tFߩS@5s3?x}zޓ,l8LFmz1 LhGi_`(K,AtUjPSJ <3*2tS-?GE1"~]FF|}}䗍;SA[V_+)8{O6)3x9d|*m 5 u`Œ5),>C19mmb,:ռN?uʇm1*%Z$Ft@T!iGڜRC?$ŵBX3', ط(A rx) r*ʆ'_'Q~$)dv-Pp;o<*$?fF_ d v5^Dh! *p:H$ZbR 0.3X.#.xYu]Y˫2%L^hE@$@H~ #QЭ4}3Oc*+rP>MpvC(0|4=2 *rvL"}xJ5㳷w<.>CJz.0D2oμyF+\.I>N2Ȁ'4̠Py0YQԧ6Q b\rbt!HsNz``(YQZ)b@2obbPeru=C 9f+mMԔ{YyÎ+]Ϛ;xT8 $]dPڌgLp#㡳_Iz!QAp ae50m;|kzIn" *G§<7*딪X1,<1"Pk=4nF | QV +F7~ߔ\){`1os0&Wx3_:P-;af:=  ~Z7JBLBG]1,'9 RDb3 0=Pjabx7ʣ fy< #":Z#cm0iz( {ts5ty0}t(+4WF98Gy;d9kW0,cnK . \I"5&SSd<łܾ2>=~CGwe 0h5.j`$Hmt;*oOYJʱN'#2FA\a Ĥx@}7i O"E c n rbr7ɋ v0@~bf29|>vesUhN@q|' ºaE'Xcƍtz~.!\P@Hl3WTJ++fٔZGYۙ \ -&v6" b8 JF+UcCZJ;tчo$B't ޤ!ܻ*bطIk}|4^37s~|CJ$xZab̮U#Gpmh n)ӵdRYpJ=P¾fAG:*ONetwh@mɉ'^ͭ_βk qtfH8k馟v\zEq *TsO%)!.|W}^TrAki?*mp~)k Ef,hhǓJ/"O̜Fw6ukni嗥@d< #SLbz}Rew{!:zu=aDKpur8M!Kޞ=N$ɮ%ZΓ``\"d? fY *Q:xDHꅰOQ+C7Q#b@ ODlY2dFn V:() D,q"^a%XknYJ zBU LՄv,/#V㎾xSjSiKs"?G@XDBG~8h2+vkLN֮ĞH#a< .AUkfF܉9gģgtIN:X_YG6s EH-qb]tU#qBCvrqj(]^-54D ]zy,D߂T璞̆PgFs$h-cbIC7"g#R{1lrYOG/cd lG\Z,D#e<#ezyo|>>R*2L05&Wq?ojOa2X#{XJF@eySF y0DR9<%U'I\HY_1+p =Q*Fj3 :bUngȾflS;b[;)/`vh qבa\SƢ[IVgMN4=^W vTA00ty,? 2z\ǿucGZ*-22+LrZ4-#IA@]wt@x]-6\Nx#% L6@-9Wِe_K45 ۽:tP i!*Mf,Gy5csԴ)dNsQ.NU_': *5lG$@ X5*c{w ~̈r88Xj$F~8 C?O.!N..9 Y9tmF<蔛!oGt'Y}bz |d=X:gVEqrZƬWI |;"L|`ǻg#AƩ}uOJ V8 0!3Xrf1A *l:nH\HmXq٧d9 MNZ2@y:8p[ad|H}LLu^ӹbj[K,<;𦴐MkMIgHI*Unvjݪe`}PLIܿK%K<~6 ĬE$Oјams;:^u\qi{ .je> "aRDe31~$/1$r$>h/wnpW[=Ae2w&@g;(WSBE~=RCL!o^i#r<4u1~:U/ѻM[[fW޼M&$*!. P#PÓtNXÅh,D*t(YL.].N#VnhN?R2n}$̱wiF.orХLxZooG]k=?$|^C]k3&a$7c\,h7 6-'`,:T=f Q;p-`_rQ,ܫ#(Cj w`܎ 8t ]n9a'ц.\y^_Ӈl;kx|کKmg~Ԟ}N=L3?T Ye+^18OepY|]!-GUBBrRN#F }z-]uu0;n\+ؒvvuljʺ0^Dh5a,HHRcʚ /t#&$ē"N-G0߰VJΘKMGH$j1Hj (b'j(OφsK,5Ц8#2YjS9Ro)qs n*}%irF1Yāy?A\+*1IY6"";:Vuw{v$3 ` i{o2 4?/bBRj,JcCϝϣ B&Bv 'jYZ_nEI~-\%[[n7 4cktP#\vG3VZsp1̘F/xm}"TO|=ˌ2C&%{ɠk(}RW&~rT[a_4 HAI٠^ӏr;& HsI3+0a<TQڬiwE<FW|D,,]+w}R$EG> mwleIjv*]Bj47I?S9H)O$35V)&d [T@ 8 HËt%邆:ZIuj~ٺ?!@,"U Uv9l{CB@߅4{jbCvܵ %+U h^мHxu(kNC8ld$3St8Cq))xh\x8neZp{, QSj6YCYGX=wk_,y"Brig4>;b>>]:?H<7=EX{ED= M"m؎&=rfG_'eċE\ ΉKP Y$ESCfbed~2C?siM2ꆸ0+~^<~Kpbg×4lzB{ a6kM'2iDIdBRb;쒥j?\I%=t#XbZ)ҟC$zNɀTѠPX9HèÆk*=)UTXBS#:Oc`9\.9z[W=|iP9.F%lUsAzJ'mwa]b6Z {I]-m])P#^jƕJ*iIf% }P^̑5ǩS4ϻRnj>B ti!mf TC!|qRg'Hzm6HPc~ؤg-˶Jdk:IuH ' un(om)cMm@$Hjݿ1c[<t!sr[{_jKYr /tpc݆VGrtNP8cZU:4Yaz/`E ;iS։T~ʥG#;\2_ǣݠ4qŜ| 2ƋaI9;gMAکB왪'$G;&{09ADFYE? #q"$rײt>?zNjR̶_jԞ&aPFl_c vbWw +s1ϥH@b&lh*VחHWI g zr$t @(뱚}ZM/o4dii FY+ Kp:*6 mթ3*?0:٧睔cϪX8E{h$e, -s&J4ǖ m[jibB6V(:? ˇ1N& mM@4͔/evѺ=A?KԪW!1!Q;X7̹%)=6%6k2 Xa(d䡽hVz+NHX}-yBEfD?+`XX#$ wNĆ[Խ^Wˡӳߢmsܤ&$qPa 86rE8Ba$8P"BKDv$B)R}y@2!`,BgxBl fvmBYcIvǍf$d{zE/_Ah.R3NV{d$*͚%h3>L7r͂QaͨsOBz0(}~vCR~Saa*`刮~>,\>RZ4禨aA,"&Di# y<xM/8 cTAwuTUGƳż1߆8-YS27 .G]k*@UOA*s-()D3eCɯ/MnNV},٠i]}g\CLĮUpA-#xCqu록-*W֛~=pz5;'M03c0/+~O7:*ȄL,5Ok>RX^X!АM|^#6SNA+Y!C0j AeK6&P gKܻ _K4qqO$e IG$(! sn>1w3c2.jF :lrK,CCHouwY=p]X`*]* G曁EW6XƆ&Pf*jFKRǴ GZ6v5( LMx%l}¹҅bI}?('7YwQaJvMt|'h0@>{|z_&L`i=m#%8Ρ57V}0T$E4|]ǬP NOT*8œy!>Yiey/ )LEA&,1Jͦ*;8KhD$>~0B٨LP&c oxd_BkM sdKEE'BIHݖTUT0_kgM>[2nkq@2{>-ɵч1(\H[ ~PK_>""n%hRu1B6kɸ ?Z/UE n?BĎN ؎P%yFPj~(oɊ EJToo'O;=cn+^ĨApP 5 N?JSsU0kC.gR$`~Hd]{؝J#%lHnۜިRsL=6ΡHM2 -)}O@$Dþ8'nYHD5wOq {j/h1)՛ʜͫbuIٓ3X^\֓@xvMehyWk%`j~rHtd7۩+48<280bȳ4jhhc=7!f&ܷؿz(h O2 GÛM ND^82hh^r9DC@''2mb$vO~isaYs(O^ )yפ.hbh] 5v| ziĈgz)o"_`A]JgpO|ztmKF9Љ*yZ}AݞF[ܘõgqFO%9ca=1:}Wl)BWLͯb |n;:Ar̤dL߭UƱz{kӜRhtW~?n2сrY/K Ƙum2Q =:()J~p֢J𘛙kn΍nKr$WH CR~ 8ڈw:}p\o=<=C?$^¼{1 v yP/Hy4@(o|7@옻hh |d|`HVlKI>z5 sSd$tx0x+x)`ZϦ>: :YO ݎ$;"}wfcѲcˀՋDȋ2] xRQM3b]ƌ TQfcANgT-OcIe/Шu,0xzMᠢUGpʧL\ʡmMa҄}qN@QE`IZ܌Zngҟ ,7&ۓ8-k֝`Cpw&Sg~/ڏP!7PT/fnl}ycHB.3悿d tކzG}p}@%pԃ_n|n5E"sc0xH6+0v3%~$|čMpξ A΄ʿsDC!~U.Z Nwyd 1ONiB>$pveA>WA&<*(H.>l/ ?8R\7Eф-{uesp[&X8?.V hThzc0Ň;VZkE緟sZo\WsʱVqgZbۥS}XSfe ss9b^Yg C5Ý+b\E^7g7/CRs0-{kNgWp7)A -|llW&?f2@phkt1Ld``< Hb-8el[PTnP_jS$cpGop,&34Fbx|Xtő9z{4Hd2)Pe_$>& lIp+ƲV̷h/Ҵ\Ӱ1Hi45~:*Lٛ ʰti<]Xkj(ia]=\k"i!.Lp,LUl =}!SG+?Gc2ŜYKgѾ:1X 1;5gA*P`Fh}Q+hmlJJDZ=yH۔hMb:ha:l -sMNNbէ'<ַ ܃Cqlƴn%K3RRhasA0.B Jt* &~&>NZDž\iK-HR:Ν… ;M&).zNvaz&/6U9p$1J=;xDIq;K,tV \g|6o{7 S@}XJ]'*]/Kb; >DάFQ K"I+T]YZíئj~/ZA 'Ͼ4FiP&$BGV2MdM~LzpA>Geѿ"_pŮ2ge"̴xwtz/O ۘuQXD :TGIw ޜ \^R~4Ѕ͕w>5Nc㱏)xJ QPY,$w$Z}|^ѹp+;`}`R$(xb67K I!H]}jS?RƌpYy5I}˔IShw.n%\`-԰DRk@ak oy9A:>ƫ3(IA&-D@:i+k3y^H,g.o 㟵Hy&?+7g:y 7JR^ ,7݀ҟ8T*:kltƦzc ~dبBzQoTBj^ )xy̘ݗWDg@D][*%lm$ qjhٞ@xw$3X1r.CNJ21i>Me):ۖ ƲKT߯lBO_ި%hVؔ5ၗDUM|ĔCMMUE/.=9 Bs)Lְ,-gLN#z`vů&f"_7tzaV jSWm.⬤C`E▚e9R>I{+(@;oV5 ڙϪ̥9g6nV!q\WE"2[~PF5۹Qȑi(Kk*~ Sh3",hzoGMN^"\5]8X[ПFR3%{:к ֎UmN6G$& <WS v _J׏eo*Ɗo.NDw{jC/ۛ zmҢ+?Qf3q j{ܩF`;"nZ3!ufrDbɴR'xѕe/ JQS0O |nP؛!WV:]5!_#j׉G)d RHgΠ1ơd& J=!l  M"T8h`=W(M ЎOLzfOZoj׬qԯc=]2FB$oU)ifH;$s6Xq^ykxfӇbμ{3DB2}zXu @>"zguc e#sM*y=T\ǽp~^絽+_Vb'SѰdgɚf[5>qAoa2>:{d7fgjzt5;\z:6>*KŞ]" =p[5%XWD-Ob,x.NxC c2T`[g*[ijh"EE`][U[o82ȧdĈ 6]Bʀ!Ӧʪicd`y4PZ9`GER *a7 >VrnAgrSd `)kv5k2>:`g9񭋹HގI Ѧ7=o+DiDࢠA`^1Kh|18Z,-_Ƅ}qbY<ꓒ13ÅH?}3Zv,RQD# A;Wz82 o8^-tP(@ NދFT0hLpd@4L` ݷpD,ɍ"!p౞) 9#],(V|9Dx4Od2juX4{Ps.1_7ˆHYFpDuw.o8UJ؋?&Qo5wNtzk.k$ =8m"a(R/ݎxv-v6 vզ5Hhf3 l0P |߷S敭?|ELš|m,ZN3Qć~`>%ˌ?k#uߋ] O`A%Xo~Ebuie%|OBڲ=CpMu K"|ÌDI$6x Rߚ3:DA©Йg2}ܬ$72Mۓ/hh=lOBڵ%ҝ;h`ꇊ'v]̳7ṃ"\v ϓ/pVQ{zjc-FOa>Yٖ VdQn8RyFYWV =YdL/y M/6`IX\$x^,4g^_V?ݿIiB(!TpisjE5rLw9x(9 #HMiK3bη]* VwzZh#4K=z,0lA^XfK 2'2dw;p= ZFou!F\]\QM,riaD#g E^VJ"z)btdJ9MtHQ 4:Ϳ80㰿lXbc(Dmu~T$R1Q ? f% %7aᷳ<ǛJ1DBp|lӮEi$L87aI~U 7jh=4++2#DIsoCAHx`Y1=<ʟ·/]IL;X;4@U~\ԩ7o#rՖL8nd[bmIԍ(Vݽ ʅ?jTc~|ĦE@<<]Zk-n T--gq.ז,_e/ߟ?7 2V,9Mjh՞+byI Exc~UQcZѣG@p?j;)3:ycI^RH`zQ"XsI ,s> NЅjo~6x/AZ ^kzL:|Yp6 @~o 7-M8=;=2Bq(l `"e0FTơ}h " Pk$L*.5ȷyblQA7nZV@Iعô[)c3K٘/Хe*0$PoNfL9i;w'ZʮHVx, ~ = (43 LctBUƒga4D)`.i<8@vDL9њzazZ\>6{Pۥql% AtDH m+)Y 78}&M:^)hd&h%#/qB7. M`I[^SU vڶ~/,Q#pl3X {yr.ִ"ܘs[@(Ok_ʶKCӃ&PJ7B>QJvsZsoʭO~]3~_Up(1UKΫidX WXG|YUH(9Oi :_@[.BɦCk Fr iѰks!J0,~|k=cˤ=݄ǏJnakRzUv7ˍ/QN5k U7FҶ킋6Q;f#_"W߄WJNhx72 e8&CbYጼ hװa]3_80,WF`ПgFW;"sO֏ypWN<9 {&аqEXwbMDݤ\OϋHx|ȁKibAabjW*O_=nGBT*YZHd9џ: *ՁY9O]cA!NkW l`\ߚtxsC:q C[)oN.V ZbLә} +D{k<-EΊ0ouxIJ\FyOxvRh7Nw_}mkQ "  S32 4Qg ^BK(S-l]G8Av ҁg7aਮdU9:0CĺZKؐ̽sm 2s|d ;WUmeZf*t d^ԫ_O{ܠMJJj umïQ5?C8jK&P;k!_l) 7t$}eqW^iikaBHDBUO ז:tE˃9JkgԾ?]4"d/$3g`V)aJ@8Y (%'z?*yL)ꃣA C)XR} ,J=>x4Y῅-IHzBq25!HɣK85wR_a{Pp4oRHvcT;`سft$Z@ߦ@i2۞aDAT3\YpZD+j|Cm/ f1F$WYu}(8%ЍA ɟ9{|i i~8:mRMtSmwf}i*NoDPl ۷rPGo>÷5t Iʐ0}(z4d;.e({{SKT.\Ѽoȏf揊[cJg*O3)-JFݤwJjFt~%Zw&gFj͢Qxm23ё4sAR$ĥOK`7w]]?>~*1"ӟg⯨*hm}ԗ5h^BedߕDM m{L68Y5pLpj~3iĞ=҇ 4LhI7D|97z1~SXQPG?=%uP0^zziݝm TI e{彾+Ahj+L_$SVGLV4yYx\#`GQ|T|h*'U;'rWS sFߌXƗS?=(ٗ>xa=I9H\h 1 0Aa_êGd{ׂXA+hl.q_94~=` xKDJ:5!М.iE-udQ\Ui2Sx!~.Jy>PA]y4 TX}M"??{yxg…6hs%r[^/}ǒcƅb>(ʸr4IoD%/f<>/ݗ5`}ƣnsJїFtL7^s|v{G7-乍A<؋c/Y1jxVWo&Y<_E1zAd05J+aL/6a>=~s{멮D̖S0%[\+G5eKo9bxtO.`ei0,,)_A}F5Ö0"X3;NY_FΛ:9F Z>ޣ.\N%(zZJf^2U]S"ISUt wtɆKRͺ{D7O_p "j8r[ Dxw%s햪 .GR~p27GQRؚԔ..@}@Tg6>]\7<~P37Jo:3FomW>u.!hCӆYٽNɬZSqa^jbAJ_a:{ƙ'S>+p p,g!v?Ċɵ%hn)ampH"Œ>({],!M{/M}̂TMf W1̤E9G'֙#aH .aS3w1a01^#t!Wdoz}WBMo۬@hD4RA_hho2a4pEve~BƥE=S-3$cKYIkEeԊ@c3,9Zѷ.5[QȨ/_Ejz(/D o4_,CG[=inwK ,A_ȹ;ԛ6Mf$JH` )"A7,C݌{Yu7kV]_nZRK,( E4фjR(@#ؑ7p+ 2)A097OoL/p w;AŽz1$S5zh v.VZɠ 5RKMJ}hF@da.&!B9nH1Ӎ'Dmu`bZRiݹ2ϻUeȒ 3->o ͷCPረ8^QS// >i 6|m؎)-\`xNxq;ϰꞟiD98X~IPʶdፕ!/Zluv!x '0".fquQ*E*;0| ѱTdy2B^5L?ǝ9RWx3AS=bk̥Ǐ+ത6/Xb̹}˿4,\No &K,xXped=ch(t~<=+(fcb(W 72,MYm7e*.MJzM=K 7zv7ྙe0~ey n-dy$2U=.&N0hj| " 1(LG2yOW^8zOYuN7:(&(e#Wh,(ðA˂hi%z*/L7M{$)!TK16m!CՁT=J_N &,~Np/JN))Odzxxgvm!(OqWIxd͂9DF갶yɈ8Y dwˌTt?i?4'E"@#(!A-4Gjr2˴ y{M:hg2D}ITL;+ݔuOYbxg0kݒ'^2=V4+Ηqs\@;q8ڗ|פꞬAg+ʕqYLtVQ=5lJ[7J `)ya?_8d&g6˳0](JZ].*g5NH]ƋpZu!:)Mvh`H_ zjB##?v0Dl'"Nַl挓^0*RƯY:'*SÂc:v(0a~{LYλ\1j)-/'@&:DB7}S&bʫ1& M28fَ5 =<50|A|Б,w/n\E`QG8 me_m|˟'$Ia~QQr~_^1˕0b ;{AņeKG7G1 b95:v? eٺ3gڜ?^m N^+c/B DN{;,&phq}C7c+bD٘)Opb6d:; %0c &W RoXd2FsCϪΠrzP<DZ"hJC2 F6B`8X];tc jbp^8T 7>&HCTlWLHH/f#{SB 씚PDWɏ9jwL(1kAg0E+eV$2&˸]5ڀX+3$&hR¢Ujft]Nֳ߰8;h^߭7?tG2NN]cK{@ءR@vj}sIQC©=ϴh&$\53a|7~3k5ߘ6[zH`.в|MFDpp{lv7KӋRF%y ka"B?k~wd~F),9;ljZQ-WwB,C9t#ƻNo0aX@3\Lt.uޠmrnAX߫9Y&Wՠ6D\RWnq>'v a.^ ,W2J3zRƽ4~}x,D#Rp).k.vd5sf-8ҍ4O>B1vEIZX٣RTy)Xeut#r`ZB6,06UaA+} ZcTyH5IɅ>!%_9n&%q ^~ , %HNQcoM^9hII.a8Y/`|`Ȕ&ik`vI"}D_R`0X̐lv3r@2nX)/P:2TӼ`ḃ)u߳耵# !?j Di;aKqIg>Mzet󔔔L*Z_M U9t%zD ou7V/EpCnEN[xՌ@!?y $Q/th&J a7h}~AQwH ~E7 )ms| !)ϝ[;4в_N2(r\ l-O(PcΝ֋#6\`'(= E@V:Ⱥ4xl'kc*☩Ac:oet6~N2Dg͸*^7?Dr7EZBY;ܤݯb~Zf!{%_^-[n>lɸILADtTo]Թ(! #`ɞ/tH'< ,Me@p᪒K!F<3M" ACӇ\)ˎM~jM X{M67- .ӂ&ĔcX8yab' QՕ\Zy祁oK,W\#R$2!*d~#m%A>Ԟer'Sl>&E*QWr=AeIk@=.U yc PAYv<55yhid ߿>@"9{CFw hdIpg o3zy Z!gpyZu7 `B;x`KU~.W: Tv96z*@RPne| p/QzO2+sZoq ݹ`kCog{^Rg)πj vs5Fڝ'm+FkXtj|c$9OV^$! %KB yR:- ,~=!-v>/Ћ_IAJD0WwFT!}'&f%n֞uN8bv-H1lNFw"?x%uCAHlqwV,!=Z=_Wƞ{\3ie(pW"Lh )/s1BMn@L",^"6g6#* 9U~?l4 ry dT&rC?1q*F稱[uJ>Vk1&ƧxO{՜3@0䮭HۑQ_g A/Ep"s0KAp~5w YRPx9 HN]\'H&]oVUJGV F"T#˟!;}6&qp'ё(}&fOeָE+: c歷ކt Vߨi`V&˨omӏ̃aD){/F@.!3|gۄ]<,~)ѣؙ}3ah׎~s?q:*}~D.q1g!cSs.tfDJ2&i5.iS% \ѡQ`жGKi0א!)Q::JYX[iym6=ǂ40) O`":<2=\ )$ Z87EAc5fhImBE/J(f~a3wi0) J#8 _VZػҫxk6HV #7Wݛvuyb%&ZjƛRcx 1G2sxRURI:u[P>ؑn BL,hEP[1l912nG uDZy4ҼF\쿁DxbU>N=xwri>$539DhFWxB2 PЄYʜގ0mR,eY(p*'GȬAkBY0=/ҝjZJ,zhsUQIܱ{D]`fgltIx9$<â~"1.fjQ QqRrnJG6 e\[*ώۖwFgW0t?p] oE*zf@i˕@uU0*;U[Il; M{GBRN@Tޯԕ.>|yՏh*Ιv;Kڣݎko'%*ϰ+2[i6 W +n3uՃLDD7#>Wݝn3}XLIj^!Sw_;EyG h#i*s8 rم#t͡_N>.NkCj }WKA>54lI%`}%zW4UsM(SkNK3fËE,J.8 H/3~["aEI;]QW`k]͜: OZAoxZGѤ~g ;AY"ètn /D5FՏ/gxhIׇϛ!f } lmE!H;NU6rE )4]Rcr ȘfŜ! NyxsROU9 1XM(`~qQYM\:2n+mh.rouCʾ WKb6=Qj'w=S ;Yl5A [nOF_;)LSCTWdIT*&FZTqR\r.Ҧ:7ڈ3$к:r/G@}ϋ6 &Pn=qOe'9ޜFk2O/NY)NWKpil>-YXaRA5oUN]LNt&-AJTaOڼq 7VU -9dRMU}!Xnh ߳uR"~+4RNf T]gWZaRg@ CԩEd  P^wmo{TѶK 6[=qP}U4~SA."Bqe|l}yU|_0(>٠˞K/; @KmS=4g3 !9I tCfJ1Sgё%OD .mICHQ4>c_uŒF'r!?c DW3 c#HejπP^.L {Z"a5#GPE\eYJ4RdgZAȝa@Lؤ|(sg74Db =%|Y㈗=*T¹TA)iB"# akIjLrP4ɬp":Գ6IE L3Hy?#W8%W;<`0[O̪oy7AJ_}-_6`i倡%xM@Mu\޽ սGY4|?7@.RDm8k(vpGl#J6QAkm)xd*sـT#!L&[weG <96:[.nN#5\P['U)#cd' j"]byh'Ύ"#'}^dn(35V̭63k +8WL>*i5벻R|m@ds=|\%C ]G6"$ a,'DtE:,mFH~\z&'&U:x2s^d["+ ܮ{^M'[ 0F&j4s2-Mw'ij5O10f1G"dx*?B5OhZ>:2|iFRE%#|qj\-Ze ^.=MρFa2ֿCrtOtO`r,~ (oi}GŊ>EUE;gZ q lbt> Fux' G9+SW5 ;s !Y;pZݚH0WrHTE3uHD {O6$O5~ g3ۨIrH';GHVÆCiǑx 8`SZE00Ϧ fI0?x:avu۱=/夏.L 7S:H,bkr21p_Ow bb~ҝZM"Ebzu1A`!ކNآh18ٚ m wjAs͉.Ļ^Aox=wd}ym0 _!)0 '-zTY7_E29#;ngVIY|јH}'v%UrGEI[5·7 ;:mb aLGRn7H^ýOB=› Ԭ< bc.'/ĠR'R.:5ނ6<;i4wcðμ=D拫LR)]h C܋ VIs+ Ml: ~֟%gx:twcA }i1Y^5,t[ UMLH224̥rFR?}OSfʀyGpQdr xH G[@J/%7~i0ɡBY K{o3΅ơ3#(EV 9 @˰_Am|s`(ӵjE\NB) 5Bɟx-7!؉*sN:z7uRkH lkT199-]#O>yFKM*{|!ڨpfW ՘=vnpOݔmBf10͘}~g=\ os g<u`j fȄzΕ^kdn·m3ܾT31?^P!{r5M9u%՜ =zF)(+$~k Y B>g/# oa?}A<=` vMQOk;¼$W=1  P"3~\mX=^K8nRjGUs6uC.C\fN! wӳDZ[iQݛV~*f0 5J>T $ $~q>đoܼSb3H.QЎ 5$+R̤KcjÖRH|ڛB2>HeJCgh>+E9*6_|xH_5ɂ`pA/ê~WZ} rYe|Q16LfEx3mă拱l$zK(Lbl\TRm Zd$(\QhH$bf\VX29M5ꊨܖT?$ %tr!l@}F/ݓbl`Nџ!\!4;׌L%QIg'R5+BcqɃ]Lj9xmAbJPw)VTL֛4߸37PU) VC cn_;[-e'ȶ@!-#nϐf\m[2q h"_Rڑիi//ӊ], F7/eݔ,J-쨺@W|}ɋ<\ͦ.wd~i-`Nt"l\0 6p GLb={W nC E0&hO!zpШV>!p]c*/Hbx ́56!)e%W7TX/'ӟp_#0`] YH}zrpD 4^SfНy;gEr!8YWjhǽ)ۑO Ρ{!K7j |f7c) 0RH"~.`<|P #̯f^8(_Ռ@dGa MQ~3JרJ58{x"hyAݠ#Lg`] +\+BV=O&S8DɆ} ;owDidfӅ_ui58 ƅE3; 8giafC[E X_{3~Ib&{(x>mjDnggCD= :ztrEif3O:v ]( BӗG}PAaߎ܅+suO0ƷegN|xk);NX,8l"`}(+䷛DUFkߋ* h1F|A zw=z?>gDʲ1*Cu_FB;k<_ V%GAyaRdX%RrO>g_%rdo"GWQ1nPu~f靋@# Kes .{T_4vp#Lib-TpiM S ]ɺhK~9w(nC/7_ q\" ĝ'sohu+6\ 2XEԂ(UD7`ࢾQ<#[a_oGh/)d%}G"f2ä\r FX|MƜXϮfPɳxUkUf7^vmXolnR5m9Y*V&_dtW|`{7 M,s}03\sIQ2b+YWms.gW)E@}-x#ӛ^c E?)Iib Cru 60rdX) =Y㚿$w7đUc>LqܧWʴZ R@Omx4آ$2мuC4SX5D,c_: PY/7#hnv"\r3ίZ'(ɦ_('@reZw˒!DЪ{8%ƫ7HvD tO +yOΨBXfvUbn[74k}\Ҿ̺H=?Sp_32ϲOQzE~wē7c1Zߛ/+{*A4p7Y3juޟV`g>.$I4/Uw&ft'ety#.;Ë %05+ O=n[]kDJiV*+Cb\s@{/+me.5K58jCf9MTK#bcT\k| kܦIa :MO6}W:XƂ~|T(D'TAv#&Hؾl(uI~{pi&qc{^MYW"Cu]e ~mExc_=_qCl-#зS# 2{Ȁ)3P!ޜ1z{OWsCq |K2s<ǤyvfxQDfomRtdO&)Hpog4vh{sA4PK [~v0Ì&K9UVFN(ȃ ,J5 e\K{˳ucIɔtB-ٸh(q;:a ҀdCvX>\VVxgMaepm _g!Po<]{ew`K3oT)^[S`}Bgd?Z\^묊93\߱_6"i-۫|rB]t;/ bѺ&rCm [cBڟl)t}wOyx䥡BYtwq݈+[ϴIz9ay|p`pL*SQdrbUd @-˧PnWgG)oSiX3D_OP{,H?"u) ^[y78=*$8<m D];E c nRJV_|w-e$9^txgZգ֚]EKc"k^:Һ'<@z!C_?Т.,J CVpcAD%&`Y)׾xz]ܟH y L7h1żjkܱ̏!.C%sp|UUҍ.i#~ٻH^as栽_ Gf=26}CkJVOp?Bq ޫ?ƍ.QG[04bEª{/O6(BgLFp¢L+"~I0*9r: ^b̘YͰnן BvIe'ImBQ\23gFo3cDq(DWgn讓dm ],B0- vO'}" ԇqOѢŲ_ޱߏԁ!1ţzW5> 6oGu`_HKT.FMbb4B@;kٙİC~ Xߏ6zNl)~Ƽ<ѓ{6e_z\kV~ϰ^Zoo}\KYHC ^ӊmۡynfҁXGw5Ln6*cC94=㉗jEFB7IE-P:3 J/gIbRatxq(mbW} [s#v7aF^фHxkУuga5 \K8 b lV1}\r,IqRr lHe+.} ֭oJ67M>d[`z3ctStCN$ ȨgaCʫwIN`ɺ7q`aӌk&2'k-nlQu* otrQx<r065QȾH01CCJ g8a.+0Kڑ͓ ޼ܟUL| W)":ṷCHe">WC8 IΚ.`LhئhlU `62Z;<d@Z-Q܊I^ƻVOˋ LVWrr/ ]~ARhۃYy&BK"V*mOaNMƦ[G3#)'@P1İƶĄUzCEhv9Z 43HNYFoǿ\C@Ncvdž뵞_~j[Xp-f##ONvlr @St]9!P0ertuSu$/К'80֨RH׍+w55Մ[V;7BWIIn(AV ΝgT89-z,Nd>{QVb,Kf!g>#A!Atvj)U-0TKdC^bU0+'ETU_L3<:TIH~@d iF(A=k*wFh` ~")wXP5w1H{AZ wzdnƇ4d6!PFumK2W-ZL*x,wEFfDnDxA -ɺMyt,mR%‰OPXQ6~Qk}p8^e gsy:1%.rc4Lphls(b Ls>*Y&`eմYiϱ 0:'a'' vNS}Cד}AIJo3v܋c}y|N@}Jego 7V#uY~_ w;b6IF3(.޲@|z62ȏ+MYO|%^5ʂ Xy CP&2ƍ:>%-~s'&єf&5IKDf8`xGzzȿ%]mD;Ɠ&dhV_~x|;k>ZJw 4?Kxxn_pl73w%mϙՆ7: 5˃^P?/k I?Wץ5M$ź97`)'⸤?eKKQ O |Q8Fh3l׋v4mώNm +qX@il=v5uQ&s%-hFTm|%آ|nGA9ns9< eg^=4!s ٧3/}*_\ &sۭZ,vF=?MF R^͔WLy݌R}_@  tܞ8-8C1ժ08vjD-H"V'YʹmU3Sow%ի c>`.Z:Z,)W@Qˉüމ~?sv/!ͰQ(f+>]H($msS)u0_4T 0"qj TahG_wǒ8_#ZuYygS<tGHȡ(PpxVJev, ˹X^asoZrB/?<ڎ$ǨGM×Fe谗%E W$>\ݼEvm 1Y: ~x##Z 8jRID\0)> !9s%mAajXvsLH ڌ&M«"$F'z% i@t{ד嚕 8,IqџǑmp󺽩k;.1ؚg1ٝ <ؠ%V)(ˤn2p>|C2tsÄrCKɴLUv P~6Әc}&. d$G2'钝yz["%xn3.gU5\ҝ-p}Ŧ%щ,. s1TC(wAJhzdǗVWH (͈N`'xiẇL椱O"Yuc|OF0i1RxnH!^7crRcd`%Xl^P-դYӫS6G6Yv3UgpZ\mX̩e彏:Dh;n- a[t@YɆG~N IUXSBn'+6V$ (wOO*f d..y}@yPO4mlH>–{",AexOj} ͢tbTj4?4آ X:!Oy; 7=]]M "?~Nw{vKQ7PE%ӗI"p!YMbF X6^yJܶW\-{Coer%<@}nh ny4k+WD-J"dry F$Ke)ީFNFPCErfӱ}SCp囧ǘ 2lL;Rl3{r3۫ CjyS+aCàtF)%MA`d)nk/$H;W|HKňD֧en(%XքNoOO !#: t̷Y;oiIdfJ 2 FGlR:Y_·F*U* Un:A:.5R|_ ]ï `{ F#vʝ-U^7 UΑ:Xm&$8G%q$Q4s:IُT| K=͆2/ʕ8AXw)NnΆ֭'N U:}ov|䡁w^cY YDV9V7:ytEk=-(}uWuUóRUs1T*#6yCGh&-{Wҏ?HjLU ~􃪨s yηz|wӘUaNyazk9*E$3Q)$laj*JA&[kltPo`lz03%ZXѥڵAe6[XdYX<UT*^@nɓK֨%tk%;a.] 放yRn1iNMgtOjhvZ'n<+^_IO]O\X`̿mǀFIL,B7;" !h`%ƞ+5XG23KbD/aM ?Ef8ȸKqeۻFk:п|H%˩ƾ?(s.N`t c, y$I:+Kk97+M~IȮTxޫi_67'sڊH]ѩ, _(+r<LHUKDY4%ϦAkj-2 97s9'Iu gtdGx迩ևAcW%a)#h"abOx>i 9V͝ 7/4yqb+c4 t2B²}|6_?ljrv{7,xa5¿0>%3&9N-_W.oC|`z-Lp/}q:L.mDȏF uN4Zv (29IZƜ@:,lHA JzY:w/q.Oˎ&r%pK$[H{Gu_&3HĔin{}$Zvkc,=[=ى5H]Jx"oa4*L'"Uշ8O#!M𝲢@RӐЀ"ɥSlg}yl]A$x)fW9M ~Xvq]G@g@HԶsy5nGpDTW ΃}BW@~Ř~ݜFAǥi?jwCwb-ͯoc}NFS s *=T.iA9ঞ̏"o֚3'19N~o8h޸e ۏ^DoF L ѩ{a=R\T9T9դV|i GìfY3,lskB~t4fFw-NQ b8fi]ZcmAM"f_:+w"sC-".2]D{CCEPajWF#t5ʨ*$J̛O6P$иP c%aS5Mέ3dّJN TJbS4 - \ޙlEvHf c2+c;A*ŧ6C ky'2rR ms`11n0,T/@{5>fLf̧rR%mS>pPzfw? b#a[ar2ڈ`@aaCwu,LWQM2/6o?.lt|M!ЊeaLRLDIOٟE_\8R(/ ׄ2ge*w PKh:ŽlZZ9IG sb@a&/imk[Dz8'A'mlƺ] [ޮDX׌*j$m};kh!bϳxpXrkj!M>0h3f/L%4R/lipM]wZऩ/^Ts4#x?*\[ X*7xe~}z~wZD !R`b)#1D|fv>`h(K@c0-sumy<@q䡿/ cD4Kr]m]Uΰ)Ο ESX]Ǖқڰ)bw{p3pupy x0ΪUuߕ[܋kgVQG2#ΉOcK:?7emkôҶm-i]'QRf߱Dű;VIjn͆"&-̹=B*{.wz3W~ɗdm_Bduibt=<#f,Q~=|(!~Uo`*8dc; j̄9Itf]CT y\B"B9(vRs^)?$a2g ĹJhrG1}͹#2+L ؜,?m;^O0 Wa{77oŀ6ָ"e"g g+SVtؽ5[c$8F@dXtl?FڧJ'(5*%Gm.WhjgR#Ø&`gL u' cY-~V>@p4.l)pC;MzL^ݓM~(6@d$[9iH)n*5>?W([M+=_(UaSn05=|{Iި+ثpV}q˿_U?">lLWC`A,|^ҋNUu-X{* oFhh4cb@iSY:P$$=F^}2I6> +}aI"2,Khݎy˝<ŖAd]dC:hmς^?3 {#fQk&v9 x Wllwʰ\#FҫF:Pru_xo8̺y^,:$&X!^uP7.PwM@֯)w6#قp?2 '?O6XR0HPn}.Ii"Y7#$C_kIg%{\1DXx:<m3iԎ}:oi sm4vMDePaP:.C+f>`oVܣ-2:fKӋ4pnط?z]^{ =̈́.汏crH8C %&~$γ-8H0hUo~F&OJiOe)ӧ@/ᩙ"NLYOy͌a @8G{:GÒYS~x={3"e4mhou:+B@r$?DJJs1Тp3ծhg^Frh%A:,Z-2<|Ȋ0 Oj;*dfѰB]iC[t]yu0N¯+4n" >)6\@-|DU6_(%']v^Vj)mJ'/u Q?UWJDGpZu0QQ+IUġU(x:U-`oDqPFKˋ``TMܸ v\[N~#0ڸ%Ig*Jwtulp^uz1dƳ--Y+۪ge1CIS$ՠτfgI_2vj?g3}WoԞ"o8w)</~$ifT>O'~իGi(I)q./Ȏ6NMo#Fb&z:=l;vNuu("Ƨw H%7QZVpW!-oRG{ ~5><~VȆ *Td,e]( ˽`枸xU ӿmBr?c0rȆ k ^/FӴ):aoHZl)g6Q5j&o|.Cmܑ{*3pG&\TRc"TZ܄Yܫ2݃QΕUbc +>T^dYאW( v>Υf_ :ӜaJW*E ;BLcV& Z_)v#<+gCivRm1y*ŗz! kY&{SA>5n v:^,A^`RrlEH_|q_kAn@<$|&źcwg%@ZBFn,3Xs /\9;ee4/uYٲl'=?aOG_VabS'}Zr~󖪿FN˟Vv/eJlܕ/.k.+񎠑4IL GrL?J'y[ٶdP=SaY{c3VڢmV njWPg+,X)CEmum)|=܎m(2?]?!6cOs +a\ov%v.A$NN_5 6jÉ`ԗ1P_-[Q\+MҊom}J[l[µhFDB%&*6cIEۥzxK,gՄ2Eѭ+ б8'?yq@BJϰ{ \|j9$ %j :Sg`)AmSTGB::U6czd2  ,4r`vItjT&&D,D9wQ.{_36djdCX𤜝A@@01?@ATC L%k'PB:Y* T0xLK}hא?gi! #t`uem7 d Vz8F>=RZ\VFnĎ5B5t01_ 4)ċa0 0ck"_~(c-c-K.QV }1|m)5~!hx]qc4mƞ\NUp )EDM|%jOj;^(/{5p|#G1=.q>^@.c%-<LcӕX6ڄXJ٠?V.:Hp-Ku()kEGKJE bK3_B"Ѷ5X, #ɂ1NӮL^@Һ媡aw<{C:Rg+s1Z%dcH2/SSrE$Ƀ]@hN5UF XWfDxŊ3xn:S Fo>*ޒo05C0bW\‚3PudŶ)ej,>%DZ]Q}¨&iXol7ӈhK$b8"rT؟x)'hr`ٳXc5>ypn7)Ȝ:.̮_ a@d^?BN퀲dН.yv?!mb O|sX'QUw=6 Ca d Oj(%4ޠ܉1% P5i/1wJrYUDhf% OJ+6 ڥi3PM!%fg8_ ]'=S=M]i?]>NU9E#6LYN1kh:1K,9%VHZ$ce&Q"]SFn[k &.7 >䷼ijkXҸ0֣oek21H7REqg XiOOWmC lsj[k -F0`@"請%>;-KX)]TDV2K)MZ3O.#\v%/ǹ]r$]Ĺsh7~ul̦EbHOol<;CwHyȐ? L{;n4!iy,X45PLٽj^/-6tE[jԉl8Z,4L#J(Cj..&,m܌6 n|4K$ٲhPPYd!49e_ne(Q6\Ne M?zD5J@$;y:+ @#,D? zʷU / kd"&tp Mw0|pzh2b:t˭P.ZvG3Łnu6-S$\K3aD(8ALJU?nȺ)iq,p%ة 7; }YƂَd,,nɿx9#)/w_c""in` n|g tlb,B`Մ_D@ $- ~"fK ]qշ>ѓ)>2{/4{`2E"hCqP1*'Oꏍ+]KpLI_Cx%(ĬilZmE1]1wpˍQ[=a,7B]%3t60x)RH3W*Toʝو=sfw(q nї6h3ϹwPzН%":3뀝kgmSe9 R[!PDus bRdCtP(|+8B&@l֬POVF- ~n4ywsv3 n"W 2б!U0\6vؽl3($P}@ZьyTAfZN_30pLסh{%,hJQv2??DQvsPb197h¢)wS¸FF>J^k0b}M|ݹKjBIԼۣ ,',{Ðu,0ɚwP)? ЧUN:tJUnVLeK6[Vx++ N|_MmZ;ާYkMbԴ6iU= i ߹;;sqnsy,̵jK,x^%▷q'b25@Z^Z Vұ)-_w$ԴY\ l2qtK?7V+"Pt!eÐQ6܃CHlq"ExmB.ګxDcGU^ U_8{"e8~B ^~MoyJ#l) ZPVMu.KȢ d!N}3-=)H<{l\$In=HU7 m4е윿_[ 9= Q᜺M*]@l=RnUmkص4YZ=::N@N _|E57sFq?-ɼG]}ޢfxZ _BSǥ*"-)%1)ʵ{tߙ\ KC&}1ϗl9*NV:Qi2eoWL¯}r:Hɢs~ۉ@M?0gK]s 3fs@4.jlV_/j6.9q]]Aidi豥ۢ#";5fB~ζr"$ GqT6s2Ͼ] >pj$5O #3Cԙ5Lo)&as1dr%Y h]-}nz-!s:QM}6!KX??ڃc^ ^mP]t䄳M& cF$[4MCȱvǰR1,gwT7rDavAn?J̻F0kr'wT`?LLPiDbBʶ?9Qrj"گ}r`r[E9R h\<0~d2xɢ`MgyY=_3*AMp)b oId7)g{HI6.g[._򇴣طKMBv 4b ))*Ke }wypZG4r,nt>WA^>P\Ůqs$*Iy9фBᶨh7Häk8Wo0^Y!ezBzhnA{u^zWmSq5e8t/ 4S^9X{᛺Q _m~9⽧Cϑ=Q4kL _ Ok6<+ J1$<@\*FO]?Fr}x U{0*a2wfPA{3=&*e.7s=Vڀwtٕ^4߹!4H Uda( &w0*oG;2X Rȉ& Iކv]\3ntb,U@ȫjC?f#g2v(ym+>:M;f! fx49D!dxa@1>EK3u~٭uPgpX:*Ci< T{dFw%T1=e`,ax]ԎzmyD* T/yzVQᔘBZ&hƷP4X"O.2#1cX 5ӛ?"QC.) b+ ifl X,ȬiE2v&1Ef#[ֹQ(3zR=a Hz^$ K\xAYhpe\K1t =*r"HlJ'7Uq0*Q5_[7!P`LAEop| | *': Llϝx?kA|;J?wn.b/-s,T-ϡN 2 Ȩ{aiIaaɾ0bwT'Y?pX r <%Y*|t(3gЭcO?–0]u `ccB*ݣ)ݗ$nisiL _s6 FehBJw٩%?g6-G`bIqjBZzPu fc& ,]o7F8,= KYҴ zjYV0UC_ n*28J>y-FT"@ (&z.:V&Jy:-]x3Pw䀑cNg"#\$po/5Q{oB4E@ǷGXV,ba#2h¾h>\PaoM@IaRa{50:)3DD![?T1 LIM]53O.5qTr)IOݍ3a&1U-o)D{`6~%GU9:'9k'EdÄ͌d?YjsgTOI p&wjvS0c_-2".x"9ӣ[‛FL77]hwDSLA7@t^<+G+~׏t ΂:T~=M4MT.Q vxZJU5(UuξBJߦQ O@¨"X;;=h<<%\^ u8m/ی鎇 ZUp"FH FV~]Gs= V1m %&Cpt&en˥|.ȫ1^c6&DCAqٹW2Rū*`:Hh4cχPk6"N |k=FⳙjaQ& ӥ םuq-,"3ŧ֚;x|%|cZxb!e%sF)7:=`'@;ONtD "Gfh8 7Ϻ ;H12Ozb"c/$pcv7LN9*NilLq NzHƁevϞ6o ''0*/ҡ˹t yq9LLJ#Hs2}"\8D:7i6 #',뻬NJ>^ZL꫰wi}ɯ9!`zvs`١L¨GGIQHӉ5ܴ<|9EJc^Vita3}ų Yoe$:'_2dPqI(ʘPM]aЀx:j=, d*R!6r{}boyYQP4MWi+5񒶠6}Q0k_1ϰ?Ec--KCJ{gɠ"F9UX*k54z'=oVZ| \x-zN; k;X=$u\>R]ςi>a(q>f:f@3!HNwXDx ^5h7P o\yoq'6] SgV'9WMĔ6"GGh_`<:%w"ʌ i[VɝRp)yœhO² =%[zݭ)ȇ:gaoæcGFvǾ_M @˱; _W 쵉ڽ|#{Sma 0nvF? B*^3bd>ҬWә*B6M\u+x;kmSa:wj VcD=;Y"wKS(u\?mNr(KqX{G#骕, @=TIJ0Rhs66:&5-).qУ~zԽa0Ʈx9oV$.{QY|+O#E[]bttFyy. KYE)'Nͦ<]CN]!;o*8nna%Y`cEAy&ɢ͑wT/Lj۱sߴ+GNqwsm+1)5! QWsCo(τfJ@fX8`R4aѿ{m:˚&U{CNw\5ʆvr7o8js u6S6C18سN_O۱:WjkC ą/D:m 틹VJ۞1h}c{<68 {6y}ئ^:5)iD1JC^h@"0js FsD7VԪ` EE([]8 F2,9\S]K\?$x~P"UR<`5 kKOLW{n#H{\ mPE_jJDzzUH~E(ĐѴ}EqSbՙ|9BpB'c_C~0x|a#<̢h%Teʷ4Ɂ-o߮ k]E+[s[_ӆ*3@An^maNdc($(5j|rj-_”7%1-@ܥ)-[` Ȯ,=tC3yN}0.9lIaS'~/G=bQ9i"ޠ2)M`cP|h&#Js! ]Ky^Ӭt̹mBSk.~ ҝGͺ:1i1Bq"S/23L_ ZPxm}"` rItB|5tfOG+OPfmnҤ6"k4?6hc`_8dznװ[탃f禔[sمIƼPׁK>ޣq-bQ5oԃb{>mdu4Þ]wo9ṴZ'AINBcܤAkQoK rYJOkܕ|}"[ 0ɵU7G4FcW{">t2/>!ԡ&~h)چCʹD;{. ,ـm7A ;k eanUB -'B3%R FLm͟Hb!5#r tl10Fy#IU2ޗH&ݳ ~:b@ L}(?2ß[h'+cvEm?íIO75-MpNv2IDDC9oe~5Z5k~^nZ*Oa>DɢǤaDfc|0??Jڸ<.ݝ[q{Ds釄AC8VUY2-%p,AWUίh% ˡ G+n;H׼vkƊ-2P m ûB`|hjRER4R#ɒG^ӊ"_֠1XrysYhjǤ2 ʑl]{>ڇJ`i gˏĕ-l>]C16_my\s ,(B mP%-I}9p/H?m0Z< 7Be^P'f*aEjL1U1{[gM˧ qj|'+=ԇGݜK!6\ɟ?E=)Yo؃.x崌4 E@+]y(#2qDFg1'?v^GRBVzS[BK4O3:]d %@#R 3y5L^e9; aw )XBvo/C 8U{NfRO<"Yoկ'st=-R( XFCֵ p]S~>ctbaYr6ʷŞif*ҍJfW876mj*;[5"zۤMͱc3k;]ՙp|Hz"QkrQHm*D]{Gj3;3$Ym9v٬mT"ZjR"RNP5c(TTqC*4Ey]&Qp0q2tVXRw<2~?~ h⃡fݗfԹ{Y6u7{s'o *}n=nNHU D" )0y#,(ɩ욕$gn_#/jyc}|}Y8&Iy!q5R0VzcF˯r ,ꫥ0AQOW\EL֝pTth_Z6V^ok2<-gxM͆ki@18DȶWB9Mܮ"JK2ΚEW˷@M}_DSF@&̼y]Y0'ϧ5bHk~ULO%|j,|xAs h]\bW#biB );QZikS nEJw:>/kW»/&*NNBܬcKp9̚0 ޼P3xtLe/f؜H|6}s`KX ɵ锧58{PدB:wc-e$("o(&HZD 'Ǡ?pQI>Skǁ|-^(]V#°l6h Hl_w*/zIeH=ڎqG޳Uv]{(YXiceyy1K3F>Zx6}}~ Ta31(ݘQkĤ("1Sq)$TI mu?A_7b,L˒,K?p)sCq?Ikpot_G*vA8OQʿQQ2G}T\}hl' v8H.imo7f3 Gm/p"T>f7D[#GDG# _Xz'[zy_(f|H6jH TY/la;g,$)RN{%k3/ dga3} 2k TɴVsV=͌SD@&lą9SÖe9. ֭/5\u0; V^Mx9f{Mf4<J{9- [$,a}з0}- ٮ p$ XMO.ހ'x߃3bw;T[(GNk;% nbfy}f.EX YkPh s*%:]κ1G6pOp¦1N\׻>,mXhZ`x%YΖZe!MC|K 4#kȆ^1jܶW_[Im%#Vshڿ_AexEٛW~IfsT5ƟOk0A~sܗUOHz~U2G}ё´<5,Kְbe&mPJR c.P<1`*IObH\}eP}í&ޗ5=bR}96ۑ2lz_1cu>nV@]jfap `ֶ?YicBK_jk.Gɷl$$!aIMw ]eEp.mѯp7R"ZlPjha^0X@M hɋ?/7eVH?+yCoi/YT-Je?n8FMDNB_!2ā.|`$FUzo͓+zX9`!as08ė›8dA^=jkJ܄n)fbgp`քii[eM9;Oy{ l}zZB2`?3HKg+M0l/ә[!_!f([MsCPQP$9i3?$0 +#˰W @8=UnJpyP>0,udv.Jn4DW]p&G='4N;ԊV鍤#L.@ Z]Ə/VZHl=`D!Ϛo"caVWyΟ' KRp*{nkgojc;KFإ޻Es65Ťf%88)YD>o{Is b eA_z%m,:u$'^qv7:}q .ޔ|{efpvzrspLVzDl{ @Qo|Xn[1wFmp¼0L+L屗@-PIIg5?aiו9">ZTu̾5aMXEfp۩ymӹQP|O]9 D#xRG&~k)BZ+/8cjD ڔ(^Ym].Pͱ,%"\EhH_%"%4"|S*)@Ђ!K!aCdIDB^*9Dm|&6ugTb8˓*!lEmXxj/po14bduDv^^WDkıo4G\t͟Swp9_1,'1Qw*(0(:cu4񚱳ҭ>_ǟ5^.>=bn4ݏkRw݁ZG܌8cftHXV<# C7moߋ%m{/ԔŠ{Ʃ7#x!ԩRiENl-=o=G?V*MjNd0S@S 7 K()9LMB o`K z+"6kz`^]N'XN8ã=D4\KԐgVdpJY5mNe~0:&3i†,ZMQ5iHss?\peGܱew-TD3PY,0>7)0.OcW,2M'17Lv~ȶ^چX'`[x6`7MP/ Hu'8)sŵ '.UIZ:DU!bN1"Rq%ϝ72%\Gs҅ &D[zfo6Ae.|W#A%Uvr$3%L[lyoSHFU= D("Uܞ z~ʇuTʯW1VtS~˗hER 6_3A^J&#;ttvgfnJ42rډȷo[tPq޾h{kK Bby$66ww%>dOua&uυxLl{չMEdcE9ձ~ 4n.+p\UeSwˊl?nC3 *'wgSL{)s# EU(XdPۿ+xd>% V1c;BU'H+\YF{2 "CI0 ֬;ѫD(D`A-(f,qw[r1ͷ>h'SmU1;W7MNm1 %s6t$I Lg5Tu_H_%͟Egu@"FGWzLMAovu>Hok3?(9A0K2u[̆Sx7bdEk-+hہ=0 #Gpc2&S{~R(o#Nbh@t[ظCkw6Y-(~F&!bP@9le2r={B1"րiaVμ6~ۨ7EaTvki_[~8%w`xYd%&_jxUM&.I?/wdϢ4rN"uhbQG5}bO!A-C^pnb]-o哙!RuI=D~2ĨwڦLcF ^PT (N8?i[Xd&cvUن9pFX>ls[J[&vW *acBjk\Ct%.vAs h"[Օ#V. ޳KCmIDqkE8`d1G2{:VBxS`a&%{h A 6Y^% A{Q6 Gչ:x1wX$p_pMI3rlJԀ,NLjfI/eMqJA;}uwYy9 wvڶrJZfl8j?;#:"0nP2Dqq tfD3vٌ֊8;HO/fbWsg(ѱZBvdl3xbK7hh"J6-O-=wݶW 5ž*lA ;S gh@P*҉^]O9uU; 3sgqrY߹Cwh7dW#m@1l&rq.!L[ cym#*H1'+|i<6q-,WAu+뮵7`QrauO Q/VQ!k {3fz\VWgu~|gs#TVQr1tIL.gSikuIɑ;T?690oJi` b܌Xk6f\Md$1y OISo ǸOiSUvKAV/H )PȺz(ޣ:?3@+i9f<ɦ%{*GaQVݶ\'E4Z7 m7f3kƈ_y H@%0 YCѫ]ͪ>"N e_3)gmb;=rܢKE;&`'riyv;Mϩ!@1)_U;wG~A4c)jJPf9>GSj4̱ȂX| 7&|pǡpVQ_]N bkO.ɌLd}A:zs&M j~" YmEj6_D\XRO'RAa3 SL z G:;pyۃkopAWk&>66}+I@օ񷦷H/ *լDŽBLnT36;dWS/Du5aVm Rߝ`eyEZه]e ~`y3_~qr sȬڨ^>뼂O/*y lg,Ge@z3D- jKc9&"jKqnC1c[3-Wy@WZ>stKQjW3{h +5p"NsdE4+xnMie(y]\ o>o7V oޝ\ fj" Rq?^i7dJ5S 99(D )<44 %Y&FORz ,KI!XHL&d[>?`aytrw頃fi0 Nsm/KE.xZ' '24kϭY 5UC1/vj|@ v"e2!+Z3ܙŦ^hM;δH<&Mtpf^{+ IHYmrB(@mMHUUfw?)B |]wށQbGj3 Tܜn:3M(׎ K$lxBM;NsR@&W/yx@?]ow.\^r(oB̝ѕLBAu{6Ks ŃIkHMEhGz3`TF0_8^.Lu; Uރ4Tvtl3 .{qTHf QQ۾w>~ wXdd 7ab08gƪ YiXCi)x.R@QX]''}"}^:P(,B6cQ Mw.;0kuzw4uAOmh?KˇcFɾenI5HHcD1!n ϑ:軴ȍ%DPeTYb"ԪK é՘ca$l=^3ђ+ZzM`?n0DŔ򓠾h< Ir*x#-]7د CvþQOu86D*BeޮZ7[}QNKEŽ@?~rL &t7,tQ ^${a;|qSGpvS7ꚁ]{RDWW7e9.s@ԟJ47NX?|Zs +@׉-F Mþm^h{ᜧrHYCxh<(((kL~5l8gP6].nB?H&'827l]fzĆ3=ݝoDk%H^IN27|'uE{ܻH6$HQ$t{}G.HS"gOpz&o,lνH[Aa"pGIy=X'K MhCG$q?fq12K$6Ky{bElՔmS]=.uւI -A.ᾛ*.ډXvALv̌-|5 Xᇞ3⨖w+Q%-}qcm fC4˺eT}m-OAp^瞃,Nӡ jmj"JA|(57 -2M/Ԁ9% } eU+ چg?N*;TDb7ZFMPl*A(%K\06R_K\_EŰĊW*tL0ҝZK R| t[%d:z=Q;E}%!iG=*3vN>!(}L*;Yqc/rFRdze^Z]e ז+ia מ gM}nsІq֦7!l N> _QiFf0WuYptUEnO&Di3o Ϟ,'N$v8\vP8ڑc xDO1S~H0r$]B\n '"Hmp?Ĥ`E uYtj{muzCQdKjl){%8'Z$̦+g/81Dib6 vJNj6?S%~4YHEbNX9D5{{Su)cDUȩ9G_S *sỠӃ Ď-sު+=K!|Lۂ4=ÞZBg)t J\ 32WL>.i`!~>pׄ]e`lD[ "b~/{`‘H;BX@\ sj-~d^#eCrGUн*տs"Ҝs*&T :SFf@T=Pbn~=Y@|&HA[eqWc `7"lgwn>GYng:hk];%c Dr[ 8 -jm͂ +Gj΋sK aiaՁյ|a(S8_}pLXtPOiW &6ir )y uJvVv: 2chFrf8Aҫ~t3{Z#UO}s_+_BZ\˙SSp%;Kr-,'Fdd(!;K)onʍTrNZU!rP& Qe{W髊]αA.WzƉ8QK+ƃQuKN?&?`O\3q>Ey{:fҋ~F0se ׮VT=&)!D]l\ꀌP`lK Xf{Jȷ>b0pk+ә}>?`uedaͫr-եb(Ƹok|gAM-a:NtFDin.r> N֣LFqD]ÚT $9~%X[ll>*ꨧ-fLaEP R痶C2Z̏u e쳿4jL*gR\ҽu8Y.oLL>7v5z nc+fP}5 /ӶK"Նz=Vk=XeZXK]%W ElC!~'~Sl| REаs20PM2P2g- -m(N JN }&Jx-ΤsqPSᅥ)1@Q= 3r1aO\,tjI>"& Yw:ܩbh'>i*q/x1F.TX.AGD-7\aSL~gU(C|L{LcAV{' ɯu|X%@ ->?t[8*.C !TQ] ~?Xb͈^ #ܼ v _ 2cC"q]hעʙbx>:![ AJȯӨކH/@IIl }%mY'ٮ* :cpg1Δz5z=р܂oC;9`(d+Q*ɡ+.X\H"/OEY/'M-/3{W.am|PuᎥhij>Ń)xIQ݇-q1'uU[tP_wjhԸKݧA[g)>U@aKMe3CX't"w=*?q щ!ZHYgBωDTuC_|`N+-V0sQu'=բς-HH /bc zwB;F_j'y'{B\zwn7c: z6_SjI) Mon8 1rPh <v'@vDr6.ZYxJ7 k<:0LI`9sN.2QIFd$Fm^p O2ڿNQӜmb7xj9@MT EK?~u>Se-pg= nu-j D#KpJe2#^qlv/h5BP)%dq)앒vu}yJq.s K._>xݳO "EHش%[I4 4,1Q2cas RH () U}ý5b3OI+%Y*g}3y]B U|y.hUhS~JỎN #,H̼E+o97ىؿܲ.ioI*)1؏=f>kp0Ron*ń""A)B" P$)Ċ/)L*yLdr%Cd@E߈dhy@-1fXh g͢K*$6:,MIs@66y`]Fb-6_=j bQTzQǁ.?J ^؍ -0#QgJcMKѢ'(r,4G< f-98 PvfkEN`v|\E0,LJ/vw + 曞SU[/2iRۖi|*V x(v^ _bL][JM'}sL9EmH\}3eHvflXJ4t׬y-!3sf|@z QZ~Ea$6 aqsgNk70X:fXo3BȆ>Lra g7GIhG,Z>-yŪh0zMfh ?!Уy`l%niX g2ulwzXAZf}dU= ՟$E >ߡv 6+S'\,dg+G7X7L$-^HU&s02%A #Y)C%tjZ3VD,ԭ٤W[/aבAkt(XW"͕܅떲!yts-*1Hn>RgS7aЍeS eAAGZ#n^[*7U`eW+Ң-Kj֤T UhL%4$u2Uũby(R dMm?Ci;-;yS# %Txj(BW &/BW)LYhwP<tsGk IU߸"&kCƈb;dVŕ8:UT :^^ʮkrYl>  { NVfP\2+C7yv ;Y]M8JdIán]V9Nb.,.tT?rQXBȱUynqT:-Uo!V&;҆n,z}8ݝqLB`Qgq_ҝ~ߧzL=L pݨ0Hi `p`vEK͐-0,V`ZsX~a':߻v.u=L,g&*DRdʼ-"&LO,pC"=|l%Jԕ>Qw/yjrMp"C'il QZ Ng [dD_ZO_P_Yz]L9ր S):y7wͰSЃC.TE}^Gϴ*?yY%EnhXzT ZM˱atl$9}o¸̧TA|_u?sox$)!o| 3X4~nxWK$+`{d^} $3C|lR13 k\n%єlA) VjӼ[4ScQ[G-mWE?ڻ~/Ϡ,bń7\ÀsA{IQU؁2x_U!L=1/sřXpN%O^>u`!X5@l['rڞ<dzyaa(joa0wAA((=jH4:GRa>UmMxsT`2=-g =nE잭)d&8*7id'yS`(`qT5L^U[B:I`(rWvdN"-  a YW_yU;#c8Hh9Em?S}/de:PZY%R9!IFQT(:(~7̺-YmJ^z'**D_4wIv@=r?/ zb'aIM"IĦd~ƥh"ٟFTBsm&̅0U<18/㳣d ze{W5Et>_DP-er+ɝyO"jS/dVn0'*mwwASf-cE= 7p6焑Ҁ(nfq/#EBPR#cA:ձ_5kA7˂>.=S D_Cr>\:9/ Ӕ*c8)Bޘ7-Fee,0 uR0F+`Ceϐ AL `fS~ }{å7(Uv(}KdFgIf @@Z/M"@Hl* %ubvroRgf̓=ww.^Yեkx2aKKd!VKiv6)Gjl`i{$9˃ ;[ڝqn}'9+O]ɐO) l;eP1jiR CNF)Nq]1't˜֔DhҘzk+$-? (B&j5SӰkh<쵖PweyM[e8w[_f `gSmdkBu,Ni&TygK3B7OV+.wTaR;u@3[꾸jeFڌymIAYN_LS^Ȏ3#FD|p~܄5$}g2EG ~@_#٭Q!7uURn8}~id-ϳ i/cieq: +cx>'HAѢG8%-jTblwO'$[{Ė{u-_9CƼIb9%m܃qҕLڼaњt/ GRhxtux[!a}-8VYFO3k^l4D}NQoxx&C(viq6O2fvn"NJB}}Ӥ В4OU0JZ#3+Xs_ G+\s1:+Ia=@TIȋ}()77tNg ;c]uH8c5naY(&h5d OZ5r[sDO :/_JM9>}}^5,;$ׇ3ZϙfޕBpiOM/c/Q-,qSIz4bȺیml+njgrwQHLXlQkӜkO݂;iʦE=ƒ@bcE;JXZF|NJȺy.E-6#|Qݭ}9`h#'LzsKqdZzu70AX4m|s8 PN7\K2<$z @CdöU~gMZ7u ekކH2$xm#Px앩2I+x!Z lAOTmT;Z߂|^E;]C[`.܈`K!@A5rݧݶ+Q  c1}h{'q*hB·6ttMJU~N!^J9f#Bu0ֶ ~5e=ʨEÕ.hUܦ@\}98k亲ELg"޽BhY@ү8˒H)ҽH1SFڸe$l^-URX$Q6*-tle ;'£u&(}SR"mc41 x9'"?"g_+^X@ ̷mWl! zк}g%+*cR>|$ax9bfCYL{ Bvv~(C!νAaQ-n i7J!̴ZK$A/fZD^tF!Y_b-Q>+uĴpX*xg3 h{[ӧ,Ezl^ Lj#0O8ll'lTNFbTݘrva/`ίd-'ǡGe'Xf'1iPHhq>B ɛ; 9e9V J .j@vz?2KGƣƁj3?޽ҧAdwE=&"!eml~^PgL#rݩ?cĊBQG&@Ǽ7j8)c*k\ {gYjN"7_+<RnOJI V'>a4V+3BelnlAe y9VhI/LZaN`L"-osGQ&P_dyϱ 1MqwAˊ}(>\N dp_G퓢h[u'FձPN#5E] '&RCM Q4Sܝ2W ¹Z+Cqv[8sqOŸ[,SK=L pM'j kZ;@ҷyWB ? 6ٕY pgbf/#$m.rUN tp*/-[ | (ķA1vy ̈́23om\0b&c#R aJ ԝ@^W#9W㽭"An{MOA:u(c]O\Y9u#(J#(b%b8j`KVc&BF_h3zArHmBxXӶ1[cP5ΦS ͤ "BhauiBջ x xzRUSGؑ$gE<-s_&Ũ1l~0uЌZĴ]hSa}š6"}a]#a>&I3F S ?|Cߎ:aE8R%?>:7lz$[E譽eX+~!$QeEx+Iеz>h+ILL|4~^'j>V--뀪0$ 2ޙ^xvɘʴx\ȹ+yLUG[Q!`ɐ RNQѓWZ2HPެ?ex[)o1OAmv@yzۮWJ9O"h{^8 3ȴRYS)ͽb:INK&'qXώf['zC޴6.iu,sг&Mi)@֗f'a+u`w.΁ENvM]<]B41I:KHv1t <@+zb:SiQ fo,t.8 +HIciuI@j*r{/B@&Z,+=` t݂`|n|gQZ7Ra ˁo4TvR8^ѣb<xřG/@@k~\{YCa %r-~&0Ls2b$s[{T.RMSIvl876.͆ oQ %TEhF_4@mO}%P(5+[A:Z0Զ--Y0ٽ>tb? ޹Æȼa+"qqKSBxm;Q"r>e ΙRk[C>#dHͱq/H!.KG+>?>q1.aG5kƱRp<p25΂Q'UR  A3zCTnq5_/2ڋɼC Uy$b̋}HbSUaX}8> 6'V.9_FMp5ρ4lyÍ- ^/Iƕlkl9vxRA\$zĴVZL8+˪s#Zs ׿8^|n7QRp?kc^p~B*A~o)"<ãpeDZy~HtHQ D*KVw!qkb:zsX@+U8. ;I5ܜx`S|숍8 Z gt-<݊>R~NBԕWYR@x$#4l]ld1}{6TVf5&C%KeFͥ#:ghX?[)M <Nbov{+yh jam$L[;MdQCV^QގE=VJdtA1*زG1*cDN($y(ړ&BKq+Ye5ìvA %%Bgbe,!E1,=5` >8!ȇC;I㱏6zZBgUM,-mPlD$&Hw,!jv +pi*q)Hd.>¢] 9՜cZ!>˷P{ `P#? O&^Lvn 6R i})G|Հ4aÝ*C)b0{XA p @ XݩCpۓ6)/)\q1j}iHi5%A }؁Y1.I+SpKɨ17# .B>90zL֐,, >OD|#U6 faf]{{[o7r 5^*aQ5)q\.bOHk" ]ST~~*U@Aa%qGV1,Ry2Ah]l61rdB(F5%DʚBl-T&eF`$dUcCE&"b) S+oevaj[ A0[ H~@@-?kDgOKdG˦ ,vTh'(#R~H8 cBbO' Vܝk&X[ .d=6YL>s!8F^|͗= Э=% ]1ZHz~_Kyu cj}sJA Y~sJ,񀘥_:lvh;_N7Sm)4BfְG,%K0׻]$)F&qNUQ{̎)gF\gþfS@!pV_rbM[٨s QQ㣞]_RxRb$ZnGFi06!KɨDcx<^lf,l"Ditul?g9v00Pml0KE`is(;vQѧGX* H sm<НL~V\jo'7:{VY>^LQRD7se9è?Z moÊ ;M8?\5\|!4}Vpgn_ؐOxtŨ\?I\;~OJǏr@{GK`E]!Z+@ Dxe(%m{Y3T_]>)]p@ ޘ\,Alh~n΋wpXQ BuTF=T@;zwy2EDGtC}s6F36zݚ-2Nj:; K1O qg}+]HJkr eV&CIo\qGH#H5NOș, o` g'QBE=.'0!B^*P=WsfЕJ$ec\d Du= 06ZQ)ѱb+L%y9i~H?MS rDkRKG`x$ hϔTBCCGbToȻ$!Rܣ`{dfu28h_\Mֳʑ;>i拍i;";Xxe-%AKJTg|CKHdk%zBUξzԂ~#BCà3DPI:L@{('i砓_d0 1gVySȧ3="B/=j),_wj W@tt8sU_2D.`ٮB9/x/  `4s0^kLLģ hWL> ʨPkq\^߈hU Ңe@|TfY$2$Ȁ%kv&NN־+ /C5T"O >i*Y✩۾^&iN^Il%/rɚ*2) }l7~@aa䅚B±F,Fyʐ\7pY!>ʷٚuR:~Ձ7ŀ 3p0~ ( j%qZ gT]ovw\Խ'yN_x}6mK>f{܆(e%+l+%H]j?\tlO~*+.q!C 4!K񣠾 yC_l2]K3@JL+JocN0%Kp15>JuL5843]jBwX>LN o^diˢthYs`PMGDua40ڂdIM¤Q"ćj,4cxMBnFkȇRO|LR'WJ# >kxXwJvmҾ=n^#t8N'2΢Ŏ!\la;l\+?@ZS-jߟ*kYq%̯L @fVc@>`Տ+13$3B_DثhJKsbכg0p@vZZ!dQBy .}E~< Pg_ |8d{lp܇ʅ_s[_O=$ȃHߘ: m#39ɭ:Z, .I/IeG+IfXYpoZ IEڝ!ãRulL.H]iy7“k6ѩD`gL IIUM㡇 ** 3R4N?m k?7GKv`hS꾚+$+4\>A*̷# N=,)M:d.T8x4$vs]3y옫>_泧QΆ~){ I9LMv'S jL:B{i4"f>qV0kN!ebXfRF\V`"B Mp( [QA3tI,3ᄶCqi` -b7[;t6k *99i,xdBa֧a*Q"99}^<K\ݾ irG"s Izrmݏ)ahq!!$b$ٔxѨ~œ/eI/\BӅXשWbJ~ A!IJ QC[nUGw PL9QV 'Ǭ"h6 ? \G 5{W5~+wֱ*v}),a^1)ؠ̄M\l<_ q> RR0I" jyB@pR 21p$-LWR8 9(w/m̳Uc’/A|\Jqվ~' Mՙi&qs_ J"'O$_2MC0LǡߤfUѝgq_kpi.Nq;OW48'ԏe)=vT GeqcVy6?`oA*q)nmUώn>/ҭȭ=\9U;&&fQcbV9";~Rc,DM{.V¨н[!9 N:5{C\Bw惮?߂lޢ@~*D Mv5ܺ'OpV.\Nud8׷!9LM4bp$Il\bKlEb`2~m^-s}ضПHQ k,b`z?PvlQƭZG8Hٖdl?% l)x'޼3'-)TTJ+1h9 G*XkQ1& ʤ *3w2ؾD Ыӈ_?9s8+E /6d?"ڻΫῦGya0;_3e kj2  iD!2u}w㙡 0әe`AQ}SU$F8%Gn)z?zu"ⱶ*A` 6N$[U%$ 9[-! Y&LsE~aX]ڳbZ:8:>cNIT%uzaRB&(j5*pzv[ziaB*ݕ&1H Ű/UTUq+bc a?s;ǷA1[ǣxև &` yw$V9¶,v%q~e ?q;7m7ϝ~K[b Si4UNdܐ/Huqeq^n)xsS5mQ'l~s`G۰E*4'&'kKo(6^ԏt"{U!Ƹ ~` Hy`,Ξ K$|̂.#hFى'tkM~gk;x}ET1=j4hR6T?^uwR/]xR6[) 7CF ,0PE@{01dW~e-;$:lrN'b[[!QzKMwoAE=qd'1).%ҍ^kOU;io2 Dibpo3X^s3)G07p:_ch@Q:tIogo56 ۾7F`UHM9#=u/R5%do' qkhrF\ ~ A6&, vf(|?88Hgk2N^ޒVΙtv(W#|>c*WJکw~ MsA^SFŕ?=~Q Ǎ8(\oiIwnDcK?';]t* $]1$,3H_f<tTMM2l%GӪY.yKn 1):Iva5ֻzѓ¨ڴ\PޢM 5vtq)ȄS[CP0̋cPg'T/?#Sf]yC(C7(3.l6+҆+<+qKmzy\ @`&鍑^K> /PŔ/:_cbl$$y uڽ2 |qP qeSAωX;x>',M ,@KHtVHbbrϾ{~ DP }diMmMZQʐf70-Z@FBI$3y·@J _$T5R}NQԡ 6/Qj 3ڡ]8Bѣ;Kʐ`!H|Y#vQfܒUˏtX+^rq' N+rl)^3تZ"Xs>YȈ)'e80|1DЀ%JU§;;:$z7H[mQ-yG8ﲲQзԵiq]/# ?4pmpJ4GQfE[AΙZ9eE̜܄}E^[w';S?qT!Cq3yUf' nx-cP?dӼ &GN\IINQ"&Wgkؿa뤅V]ePĞЫQ"sPmdUHnush@ i;'Ї-2X!YS4 A 2ТH0\9չ DU x/n3{{HTmhST|ZB'[TxXo8M9\AQ>:7s=U[tF)>Dkذ`!r9Q \3fkM/ZD9mAfEh0וJH3я&ekY=Z8GP+\Awm?ؘuTl1^/LDH7Cȟid `RLh 6emjxwC~a#htzEYU"k*6+IAt?bH=o䐣P1khڋ-/д:ӕmNټm]QVxMe0<. 1|) 2~Sf -;(It h/oijjzVKF<*ε@&9}zR]0 \5=G$@Yz$ČuoQ=%[vK澀)אK29$)AtzٮbJo, ;g@nni`0DV֜Zc#(ߵYkxg`iS3BאX8sݬ6Lpjs ;K>.S)b^/{wrE yuX-KOmI$U 6pRJ /ܪeg}&Hd2%+>JϏw>^? )]=f<+ⷝ)3l/;&殏w<;*ۧDxe5:%!:>SQ'd\#t!?%w#?2>_"NowLsCm[|6¨]|&xa ~$RRe(}ID1q *:Q$_J8UK5'%a2u4. `'N[IcE;6Wy & !#*n` I)ܬRj6;7wǗDLQir;yH|ʘ3"ܞ>>ex&~q V/Ar{޸Mak&~izjXFXG~e6qTlupP>CT\̂a`AQikU֡GRO6ғkvFg{-ixA^+ɂXG*"_p/ Yd%s#xjr0` yuI[P"u/%CQۑeWQ+V,9S[NȅDEV_}XTE^$(b/ZϚ֛#oPirjՎ&&\GFPz:Ejp_#EyN,z;v[$Y%TWK:]Uk^g. ? ˊH`N҄_21Q}u!'.gZz"pK5vg -Fx4NNݣfu:Q` uERWPD}`*J(J1:D؅ZRBwjC"S,ߝL`t||n!jk4D#)'τ6+]3u3DmN 43C'lSWn9 joN'3Yu(Z(Ch-|UR U}>E@ .}b4ofj݉%eΗע#/{cuJp0NJL]bHeUO2mP=J)8jHE&z+soIg/6x}4? P/LL s_2;t<8bxq,X([Jk,DdA~T"|-̔~XEj?(ueDMr5l* uOoc|ZP,ݖ``h=𵧹ߟ^C eX}݄^ k%IC4ea"1A5J3laLᲬ#1*[@J!r9zoFb&;_V[3Rwwn>M(Vg"g Xs\/I7=( hi^M,蟁,`9ϖ3)QƫDb;0>RG.ˇ7.%{aT{ N RG` N] vecE³A/DVdFt wҷ/&w5 X< ەlaA=tTNⷛyHҢ"7'@;e< .,#d}$8 ?Ogg12TF^ Qzݚ&5Tf!@q}M6m=62:SʰsVs|(}p-Ŗǔ1<GmLf{YOGoWUgA*>PöCl粯0ڵ%{3,l7-U3T~ScP`,Xn:JĮ6i<d@ʳlIkVI$|ʡ7̵KDjs-cLje7l&("MLz900\>q}5Oj ܓW' Eۖw_![ѠoZ Rd+.Gg".|1Z{ّ-TK@XfWv,aqkuY#:CbT؛ ֧w19&=ILd<02윟~/3(Sө1{$8k>ay5-2LTem*MrTtZIu.ʠZY 4#{ؿ ]dcEj5*ȿ:˗h`ZCoA y^s dUaL_8k(WVAX/@ĿE& "/#U ơƫr8妸Yp>^ F q; Vd1 $gn<@Shv|{:{A| |r`B|B~?7o}ǗFtډwv Fie%zR@r18(SNY ֋ N;}^ mn !Sוxm]=\3mN 3.nGt3`(ưO<#;NCܳzsg_Xg"TǃnM!7J;=40&({sƪ'Uh2 fPpBa0%"(Pcg <1i2pO;Q`~\zn# Pq ě h8{ө]<ёS%}IHhdcP:Cest ;2ͩr]lw5@!ardϙ{q0l}'_cd|T-z[y}kA!:F+ mtu6Q"4q,_Ej} #hL<dۯ815Bc=e$k)6PJ \vV2Y!ʞ L(?m:C|SK +λ/:[tL ݣS鬽dϥ҇\dRǼA>Jn;~n簡u8w,*V8(j|ro+M #^ʾ5!E"EXw^#oޙ'$1G.HSiCOn( UFckfTΚ)O_hx MX{c+CFk{rG `=aX-p nl3NN,y W+vc/Sp D4`s:fpL(5A=klaSKeR['>;E;}VR 2,`Q>ņZDŽ.h{4rTq7}ݼ wqyy.m*1ZW̹A90a4,hR\WT6wf#-HYju(q LMyMY{mRFw)Je*j~x5 FnKy[0O9"2F1#9 ?V9H7ZStC<O{e|yBB&vB_aM/C[q`E^ki!LAr / 1EU=nU:Ar _Q7C]BD8@t*ـ>p* 7ZNP?,\.~-ڏb\ nցlTGd4KL0q3W+MDWv<8Vc"]"uS"^z|P䯤0QOʃog麫%Ie[Z3]D٢HRg rqANOF $?J YYG ˑJ;WOpJL<ҁ=/ױ3Hu?D_rU\U.%'5<]o<# Th@ʥ6:GG]m"%D6呱t= &lא<1 FaN)D%&ך]igg /\oߌiws-^zv./-/[{GfZ 'z!Ydlf6&OM- @YjxdЧ(CqA !Q BR煟l *1 CS")zٯ\fO)bd)M.#Ҍk.aO.ryGI1ɓ_ZyA(by .¨y&D㉼hXo:QHi,0/ jU^aJ `?#f-@VB*~~$ !?gxXbT JCūKj[[YS7.<By$Uխ9ɩkc3Lm6CFk,] i~ UP/THCME\1/F,ɠN/nER>E_ :Je>9%e8*Zb}ZaNO]V14sÏ_ZYQc'v<4;D;Ŗ &Rc@mC1'ȝTYM%4|Z,)o͓m?H)hdz:US*B>lx? [/Ѳ=[$VZ(O @혫ŽKhsx~:5=%&(4GGNW+斎(PA;u{W嶱~Zq-Vx6iٔ5ؿqU>!&\}~A'5CgS o(=r&E^]zɨ5"f"Fu?LkXS$v#(>}۬!p+9`gO_ܚ,_28hދW]I )U9<)B,[Dkxm:5Cӹ$ , 6f3.$AJz88]L[J{hhoCcጵDNԉ/⎺Rx,f-uR%mqpfh{m l'=*v 1 %(zwќ ^»vx/sNw̐"?fH/+*d[s>l2lCMIL\mM aJMA sXk%o|Pa p| -1m!zt'Q2EĀ9g<[nO 6V7\ԫ,SqfG{**`+ dIYsW6FյIܥ;x+@4YithvčcklV&{zY4! 3B<"`k?(:fIDb.#95^FuT-څoV `.q? {.}"7Cݒ;ضOYmrp];Z_I;ZK-Hȹ:u)SA.e{Nֺ'O;%v`289yS*Y'6wFx6 ;>jy. C%hhѷQm_,FY]PZP Q׋RK9@H 3On)lM,-}XȸDRD`!B{}]kaY`ϙOj![~~f tD %n4.us5z%m @W170V>=1"ėq9 #-jFCd&TT ę⁐T<97SH4w|sL:,~|]S>=u12ŲodI\wI@9oBSgZW oK~]a- `u3b6HCt.lc#p2v7$zČ6G-&=pu6K=5i6hQE1no \)].RcG-nUأi]vqY4Pla7[k_unj*6z8`;L)1hbb:x).2@d&нzE6U7PNUGcxG(Һ"d䉜 M+gbm#r +-i5oQ2qݕ.BGΑV fFO_gc)tji%H!w^ |H$&Hv% H%w0N$Sh4%_ 却c + bkGgvk^o})|n8%2iPy KaMTIcfzrշcu{uRr IiI1 cf:ElZ;)^=Xؑ'0l޶ԥ'ˎ6X'l|5=6FT4Ý'P[f談^S2lDcLKoz/΃FD)J8C[Rd @#~wioot >^'7.]vF3Ԩ.,D4}ӆ=q;`"H̨4Hޢ _8-Mvm=hVi Z JyXKrU g; MXڽŶ[5@(]wnk`naǒ2*Av .K\OW lU7%ms`m*fAl q&lTە坎Զ,e6^ ~|~gtJ7ICB9.nF~;DŽeۖٔs$v/*|KGz;q~h: 0m.j[׹1TۤE1%n#q˭F&KauMeZIw9rB3sv27)kЗHiL|+X6z~ёѧ0eae;T`o#P9021[ vO@H4}̂ wfQ\!TS,\0'K/yƢ+3{`?rh%`h.U!Y~d;an c|P?0 đ/Œ a@@)IS|#{o4UǨ+|+%J: 9$ȷgA + *h (-U94ӧ%(AiBrzL 촻wGhr64rRJϠbG ͹EtU)zY5 /]#v2l,RjƬN)$?L2! 4Ԣ6DZq@L| @kڃPy̋osO~;Z{59Z\|tJ-q' Z> {+N'jZmi]>u?¬ؤN;6h躮(w'8: ϴ UGrQ ߳C?&eyZWP-_%Hsf Fvגr @] mbi(:%?0ˉGLUK 8}Cj*j[k:X7b #_X՗6HocuIkuQ٬~{Cgtt,da%[&P~3ϛ}csz wl-׽Muƹޞj%:{./*쥼hf.텰}P2[;7Cj6 ېZs :>?DV.YtTCċ,)SJWh5Oo/e_ZLt'lQQJ6v@(%t@ReiXΒ:hadD(.LԕvHʧ&ya !%:܇w2CA?O9gO쪁߽_;ݽT0v .4C.7W=z2O!6Q~ʍj+y:M|Hn.8b Cn)7UQ3%Mkb{@+{+5RVlx¹,ajĻ,dTZ4JWuZmԅ462?[ !=fqRv#c BIބh\bZB3 1lYg<+k2I(ӥpJ)dZEI8rG(s瞀jjNj{Maհ&5  ƓUS\9,P>p\*+ D9]GO&K( nk4-69+>dROwFKU_Xf2 rU qܪE-챎I\H U-}^NnAka] A6}R^G)otCme1wIܢxzM\IPr>VcB+p0 ûn%ӏph`u'Y&@o |Ycʋe9LUF״7)fkr^s92,B7 fL8\ wǂ(+.mq7Ί`kw.PA@F>uq*BM{8@(o)ws(|lkє<n$'#@J<&.JT s3B[f XOBӸ`)2oBpo wPޘ0%LWf?sN zzOg \p cGґw"GQ:7y'FCY &wir \DPV_#?D@X^zQX+(]7*L3կCkgr|T7гIzď6kLIw2 "Ƹ!*LMN,MR UevJhiݰs`4[bG:)8?[w:mJ! SdRLQf+(x=;[Ss_˄4UDߙHg<}NܲT,f"7iA)[1A CDɜ&ӺDaw>BW9Tc"鞯d'yHcvGP[MA IT\\Xw8kRF:ܸuy ?.Q'LO.Q Ԇ"o wa3UH2}eښ~);Zy$JYOyFGw?jWKDjs_]zlK/ RE"0{CuxKGgKw;YL0m`]\ۼ$ $Rd#K 0h. ?>}3ƶ5#MM5AsВ17%SW4l`205l=#1qݥRчilqJx: YB֘ɍ11*wмvƕQ,B=Q f\^[WC}-R.yy}7~3;݋0{POfBXwwr -.ؗ4t܁/#l͎ h.5=*j&uB~Vts"mf-TIaORGJfxjD.ZLp6[Om7 z'R̅z [,I˕j,WcKM4gq᨜F_+n$5Ic8CM8YQtpp YUByDOmRhwCr{: ;_ 'xZOR bp1<un .keDUA _ *}VU6cH)rJyL aMG =PWV`G?K%̨eU"ln0^D\W'?;$jW[񞀑4#GY9hQr8 U{M3&ĭEgUM@sc2<{/q6M>%a5(߰(ffTl2?. X&Ibܨ}NOt oIJTN P"Z^Z)j ֨eZ/qWkscA[3~ç~uMQf{0W]) !)i3V#z[eh,<6[h"ke(՗S_y041]m4ȭ<`R EǢvsV߫-Ap[j<߄~a =Щ>e+; &/8 :| V 5?UOk ΋-E.$A#-ՠ)-’v2dٌ` S ђ=/%I6x6V|||˥zxIngsџtdF^8/g~""9SPTz9gů*]TKdh\#?66ttx&7˕&~h<X"HڦJGjN)"IC5ex&&@vbDJ>4~Zetc?e} 7c*e)1y֟&W/C`P$c+0xTr^fs Wjz"lcPi.*Kh}j|v9_>&VK7zjqXB_{} YuEݝ-r O0=`xA0 ;)nyW .ΤIs5Kwܾ P%ZE3f)bd>8s)Zd_CzUaSʇ=]\l !Iyz$#gHk th:qw!k[jI oQr!NO_/^]?>ȭoάUe䩕'm!3'sjG ]߲[rM5ܥ8_ϻ  GK ZG)/~a#b`Kmx-(,""l7윛7WhO' "%.-L 0e>_3OPMf?0| U&@, +8yxj{g8޻,b\cMOҿ$:x?(5# vj"\CccHFG+h~ХNvG:94 K 'YEq-(5 r9y\8^6 wNמYbÞh'#zi1j| H\([HՌ"dbtO{+J [Xr+fJB11ZxQh~e}ͺ[jGHGɷ.^I7HntdW{Q, YqMZܥ, o11La%sTG7N[ ֠G>Z4kN8LQY6:V=[u-$REŪI_N{SX6z]F ,"VwU 3>_ 7?ڨHui2a,$Y Y4%D%˜ \>^ 0KcqeyC3Ba%"}b}Sl/2ix)G}&Ggwʦ!]#  j4VH{!5_Ȑ=](V3i_k++h9772g_ qZׁƿa{f8\4KLh9ي;"֜L2L'J"z^jZtN#X̖dP!|4 ]z4M9t>Ag1||NRjmM@IW;+vqiYTI̶n(&_+耓lfQlm3x;*yhK5k^ۆ~5Z?&۹Ѫrtx;eB5A oK\Eac!P+a;])DAU͔|Tv`rb9"GqBl܁o\QIdYoĈ~[?p ޣ`v gߺ*u }+Ɔ55f~A y2yږK&)ՐG[_|u"6u*"]ڏ3m|Ď AwƦDR v%Hp돲bߧ2 [ ߮":˞ ğjح+vҌ0zsVf^lM&~gJ>5h~a,`n4I.xD뒀6WNc#00NCUp֧M٥X*s#-U_HbH&xjkEH;ͨ+?Xa7Pߨ42u\HʐREOYB I"@UcKn.Uw"1Z:aHV: {n]`Rď!iQ#&FM)t%9(u ]iHQXtkَa<.T%lJ+_)?y=A9/N_ l,j:5G'1`)8Bſo_A4/EG--6 `qeF`<]+DT(|Ud IVٗl3X;#a,s$E&98\/8j@3N9k `AP `gu^ *ݾ9[ZV{ƖәqJQ38C jRy*"찏2B ǐS{x5XޡeܗTl@ާ̀(Sy%Ζ9#mn<5J֥`)L{8~'}f96_c_Gfe99q I_\_VeVnxz6f2W?|B^!냮('Z:/t": -ro&O)>xc´1ny_q0Є-nn}]C~ D.T3ڈ(-?z5HOpXR EƮ"E`ZsY!H[~h5EUE8_  Htӏ)~ₚI&տjMi`7?K&h|LK o Vq2dl&X:aoYW+{)cjBK_Tm>W+0-ZV\*vxbM3S_&O[N'ΊUp}WcA =>wLvvH; gwX?yy:J\a5p>v#gX2̿G-|= N82T6lvNa~o897]1,upHt6p\~:̘uWk &3O`:`mů$cQXȀ8â+$I{w<͕O.t8LohS2a3>"InW;]$@:/JKLiditemX6/'\1-.t,ILI [3TzRXSaB*- [)V=gPO2M F~y(s]);Z?R#'`kHtxR}^R1SV%XlF,%4)N.p  UIa 1{!R GžMFffz2wB`ܲ GuSǧ](ZH>J%-9!,I ynOwG-$ɕg~/XZbPۺA#DY0Ww ؾpJ'ld.+WuX O!OGgL4i"sstd- Cd(J!42FYQ29x$]Nm>sjP 2qyP4p^3U^T%^V*eYhSnMC^wٵ;P N1?l&%y_ Px!.<Λ&> 7i3aW(!mwUtL͋&* 1FtCrnCq. 21Vp-[2hܒ7(ltR{*B+XҕLb4zK3 . Y5qկr ԯ#o${\{1QŤzs~aq<00dRYofBjd_N 8@Qmo`Vi֘À_"qp-AfmU/ yˑt cmBnۧ;4^N~)cl$"ę777m#Ev)GˎΈL);i+ bel⳶tn3mNCfg$&: :#Wn-+fo@SPǂ,It!^^#C s1?-]IMSH/o|ufFmnolU*񎂿k&(1m:`xf4?Z36"jsc˝o_'2|3ʋ.X6ne8VVX:޹=M"oqc6mx?sjR49!a>5V߲Vu<)GS?F7U'࿭}cYng:A<ݙsޖqJapb-\'w%Pmc旐mK0srb,7|uѐZ?LH f ~>)CJ-5t[xK&vՇ(m~Lc \fQǻy ,H,/^ӹ-ދS]q#Ydu : pPz;m 5\4rtJ |߷r, 2; Х$cB{$K6w2MK M&#RX뭐.A'!@#|K K킆 'KVi}%$ɴHNt9U>/5y#NH|pƚ|Mq5 ؝sc[ [t$y"S8C+*$Bg"DIO9͏qArbIs0+5Ԭ2}nQ*sL@CRH9b}|fCBP:NriZF GnF@.p9b=RB4VMP9"8qqå*f3siJ5*JyXh4 c.(rf;2/,t5qP{Ohsh`(5?KP^qp6T#~SOFB6&Ԩ~u0jDBL)>#橍3j? |Ji[YZ 4t>)Nh[Fg4w+= 4߲Q ep)rFUuF|,\njGl(XӬ G~'7F FSKX8nT'yVxߓT[ENWeE]MߨRKwLL=ŝŜnij3 Z˅hl)8YDթ}$  ĸU'#+nTS(%Y+ Q݌lݨRn.5 c$@`cX08RwcƀoۓBk]׋i:b[jJnD9 : hz V &©lrEAMI d8խ7V&ppN(=f iv?]bKr?zI*a[s >@Mw%3 ۞xM.R 8kr5`^|(웅n7:MK^Dը~; !B49 FaLvE3[`xN7S6Vr%"b1?:ɩTr]KwϣV?˄"m8[M aQND똂m!|A(N3VE4לS sKhw&C }m#29K8,.jj jyğl!g+L `wSk_! (-=ֹ>/#W` <&$IHXHؓ̕t_]C{/|Uv% Bޘ>}3~p/9yG'YOkH#WOSQ=B~O(3==pEx } Qd9 !F{r`J0A|ȝyptT5,L(K̺iv8Ĥ>/`%j\{^j|l^}ԆPL ~8d l~ok(W[0'J)+Ko}5|ppBنDt4&%3I#QJu4Hge};|C=lL{`(cVAjuМ6 ⨯m%n>dxk' 8Q:S/i6.KSNՔj03qu&Gk5 S{vUwl}D2Ttf*(?Pfk%>dUu^[=UULy;7Ó`CO '(D!E2H;`E,s\`mtVl_%YVXnj9-xRpdc 8n n-+_u?_-1DWKڒ_j +VM ayL ҺD l~}(c&s0D}+|*6{"]3<՝;9s1:m?4IXg{x GHUR{Vv*|X7_S>xkOC!$&J.֨-aF)3p{ ]ghF_i:@ ݱNE^.P]tP(x Y䶈!JJ3(mT'#`:aLl%y.69v@a,Ԃm Z m͖EF/7G'1OLOɶ@Z!_dA 1Oj$HQgTڂ:8u§>hsrO۶hG/idix}mX9scCVWsJl7KF).\ bMa&aZhjR 6`Ls ^Ͼ!T!dm𬆩Ufr%8p5#8T]IH3Y8AEgAZL%; FSm?,Idٵ˪JVt@2Do43Г&9\o<:!xZ"n0qiT+a`dž\ܥz"K091[o2I[[x GH[_"J%gPP[Sb:bQ)< GZx?9&MQYq!|ۺ"b\uwk(]5LޭikJ5fASkR=܏ya5=NI#q[ÇOVI(u[+2 O< 1cNX#VGT[[~-;|+Zy'< \mʞ\t=J Vd \ IfhA ݊h|dH[Vi"9\l |۱gu"`GTR٨PuٳM(+I>r.Q\jўzaK:|wFF&iE"2Ѡ[-AS0ו˵Jw7*JzN@/hk/9cO*1)Xg|@7. @MAjEZs[D/ddk5W#v<a.%y=Pp (爑X>yb5[>:RAWyuɯDQ>6Y져@D2f p('8!iXdl7ըm9x8!WECcd mq2י՞&ÓIƾ@A W+MEY\m(SDTy؞L!K-Ra~h]C9؉S9);q'Zw>sq -|]7 7@͖:+Uk~^,ccD{u@(qןCEVf<ưe ޞVODДbL1G+ud֖ctV1^T u/o#UJ J'7wEQl%aL@7 "W|ziL0$AW=|֫l9[UL*:.;љe>)nKUN?3޾Gx'+KKJQYzEЋ{fL yْ > ^|.\rڠK& R2`AVZ(Mk)0W7Xr`rs1=G,A;;l%CYF%Iξz[' NdhԽ]8۲T0~U4Ӎ/)c(wfiguW_&IcF&@Ǡ|1ěe ]0a+bgoEe춿]n-3CB]l|E9u˱R!0Ce;^hCm;"lry+&a'ZvOraOr :Z MCrߋ MgPɨɷL'VV?"g/IeK6Ѷ" IPLI?PRH ŞŮpdswVӭN-C[W A?4r@MB>2?m|CRL),NjJ3(B*>UVȨ f #iZCd.O6uk࿋>,AMyRѷqh>4}[^5Kr0݁lG0F`oIy0F^UX@PLos7 jENbRB(k B >xkD :$e‚eNp3gYL=# R[\hX+;͕9U򄌠+BZ)˜(?#$^F;3韂(⹲'2,ďLCrt)N%'/afsWJY8 )`t;2w\"Z+2IL=ͧ\mAmjc&q[ |99)Lav6#IrP̃P ZRؔ/]~>GY8Wa7v<'!6BS|R7c6zޛޯ ZP(rrF[ٝV"lIYkW# yçr p;a83df6ߵ~VoȝL,܆ȑ#,y+G n-#e.?g4$Tb5ZPv2{y ,`(q0:'lH)$z|CnUwU5Ҥ`<ֳ˂,\ x>#efS0Lƴie:wh<\c,Fi{yZ9b3]ح h7?(ۤqb\!1>_ $ }Qt {P/jP枴(.:$zF"g$ Ec )dɔ~@N >,[ w }rwKkq>,\' 긭Dj( ^ldb4`,d?l{yF=_,̲)+o¨ifnyeYH>D%jm-C9 G$ꆐMΘS=vv_?{ˬ9=IuR2k 'εH:gZ>4%EZyL|rGׯٔ& 0>#9.7\ҮR @!2wo˫&iǼ.fbҗN6Î8p `flL!&xTR j:ʽra!ńA綺A/CI8$he(?. ɢv\(zD1/QwTv ²(uJpM r'H4/)]"D|5o0#9 GDQ&deJXAzNTpUhމ*ϗu 4R4>wE0t8K XޣAxZ"v RF908ÏTy" Os/f VF-@l QY*{QZw ImDbȮ~sDvr~Z:&6*@j^ D3ͯyA=+aٍ۷P~a,ds.@ ulYl^ќh2P p13 Dn"EP?VU vF#\6t1kvn X ͲAUg4MHPX%<"soD~;F7 '"suO9(ўzWxcf/mչ o\p򰕿Ǽ,b_T%/1Mb7H|*:6T) D kA%I<Y3!ɪoLƃw#8P잢)3XK|iA"hӃ(&9hۂQ{;W ?V%7SV,>nhLⰎ$Ǿ& W- ̃+榉-Z\6FF~wdž2UGz,߿y:yPy2g16ӹwƝ̊O|ش9iZ;Wgt:>\1JPX-f#^,ewkgxI]-fF:A_եѼJtK+3~^UyɁ,UU9ЉFT^ \('jeqM.MSƯdyQ vJe wnx6M ䷥5kmnHr3Ier-(ah~4Ә/QerDZ}_t(ng?P[(!A 2ݏ}P{];"&~"ab 𛢈5bAۚDB 7:s]LlܰJImq\4ex Uդn Mg&ah>qreQDWGlR߅q6nܣM)Kwt5ՈN.ȴ*q]vؕe1Sr.*laڜ08-ӱC |Ά^l,-2ܫݱsKwV`QL9/3A]OeWJJ,{uQ!sv\ҙ/cs'fĭ!e-\5ϝEOi-̓&f}pĕO|#dk~^g-t] Zԫ0mث/trfZ[ftYM߄^8AHPa҈a,-v-F1j?H``3ڙxhYfWj'O˟mS뿛jJܓ;|gOvh9T|T xjπ$}oq飂"wm}%ad0>*3Cu?Ao-rdЏA1 `2DwKj2%\E黀TyJ#hhЯd{9#֭.tx~ AĿbMk#N+;zCvvV?v 7pmӗo;OKOocr{6Ʋm2e%Lt=w&Нztˆ"mǩ5=~ #Z5D? 8oy+P-7Ldð'ܚOćjo68gHewL%'KU;Rڠ-\S6B[:[ \]T#f)eWf6wڜV i-p*q~$aZ;kFY&-@dE14ka)D5U>mfrņYeT#L̑( p_&4cl4l? g®{RiťmKMS6Kw) z b¨2DH|<Ah\V="o"V[NG(wX" [)\ݟe,VVC@5oĪOk2J}nO(_-%s=Y8:m}1"+t7 yjgVp_yX}x3J¼{Jxyq 8.;I#Bct zso02z;iܼ ;mCPl?x&i[u((6X #yo6ѕUy=F7s_t6d!74Hmc 9GE Qev90- U,dPc)^WiěN\J~mNBܪ߰ռKz95!< c6gg_k(U 4h)eĽ+J=im# NXh)iR{G-Wr4ؙQ8y&ƝoDl.P6(z$_$?P8 .}l</y MA` xHGb܇ZOff>X *p-m'eзBΘW2&0xےeI|7[GUGQ1rp#6 ^Je2W%vhtOq+ IN_e{)(KMoc&vvx^h Ai4cϏ^՜sfg_vE(8e f^'np9,ϓ܇QU0620՝H$q!`o۫;%bj_}xć-wp@/b_sNϏ\\#Zt0 ƿy}Kռ_T߼m: %TXf*%%YY0k ^MUk5Heƣkb/ẾQw$#15l_A>cSU@'-SZX Aȍ{Rc҄Y20-M%OFLn睼9i|"b$lQWܲUeJ!Z[(}zkU닾-5PJ!_^P '" 2p Y憦Nc_k Sƌ*Qمa' iZu-_PdO( ·^}"٫60ʰ01^gIGi10M3#M$e7'HF_M~ qk'd(bg>p/4LpxF]*M3(xa߉^}vbciPteh߭#gy\I"@?9Q,czbe~9mTTPR `*Dӫb7 IK!M;RnCi &OيgG4iQȓ&w?M(,t_l#ff4(]i4!̙em@aH 5YKD' kӻkw:p̵սN_!U}#}mJC2ƋhdO}ԧ#EoҍHdDžCF䳂'ӅާB|҈oVs}! D2scr_>:%I|ni +pwCC6,J'z&N- - yPCLrp./{6C:T`L/]~xiրM+W!dm4 2?$>*GAWCW.MnVX e4;=s o ~o$#9pcSY-Yl'3c)e&ALvatV})Ŝ^иލELq>D9csye<^EN?N6 `5Yu8 L*gH<]stl>GQ4% )CR^B=NM ~,iM#O*޿6mcnt娉!asw9&hs*)͓ç48$E4J)nC% ÓUfU xmr+*ز’k~NO|3iKje-]}~pJ)!d N,?b~! 砬YEHmmx6;˴h*gF[z+xۄ;> W!0R2M#ks{yAh3R>E)DמwKEqVxaI*ՙlqW_)Βm'`N'nlS*Q5lH1 (*Q hp_g>gQlO`ԅoAX{;r #4MPI[CzUBQΰqeMrofJw[6#[Q`KqY.g\L^ Ff=JDQ!Rrc./^n^1HڼQ߉vۚ g0h٩l7#  i[5;ǣK>*YMıKe+Kd^=gfs5+d uܬfnC}.j1; -79f{l܊QEܰ=gBNTεj:[ }eH9buy"DI z->Eb6V?.j|T߻j՝VA,|ֹe–A4P,a<hҀyNgš}(;3RV,`] MPB=h݃2#.2zG_T @G㞂ퟱhkT=AQc7*Kc JRI@OARPA # H? - M1K`|T7X 7 1 O`4dWt:2 ks>l|kc>`i߬OɊnr fL#dT`Bdr.V?^̮=; ޔ!f6Zuh>Tbg$OeO0wSePsdQʞ{x0.^|o 4FZ9@+(IM0[{'&p[}$@DIa/΄{]j | ԋ>H9a_ vh -4!7N! ڐq?fȃ(پ(S2.)'}Mp% bwbM q5h*IQ&ImU*, R2$s#I;ʥh(9fixo`@";}{[ѷ 04i"`l]'Wvd}Y̗٘O`@vzA%(QJP!zl"g MJOه#.h+韚K1Lk…f'[ h$iwhRh8tvL8^h<_ SfrdYB/@q9'8THXҠ2,̚XWhW7f@#rj(v{$A%׹@elg4id|k|tN/iV%<߿Ӫ9daĂ[Д8F!moVCӵ0|BJvϏNI!c}ʰ JO>c"In$ ܺҡ|uz-)“JbbhL+SxԘN*0ԌzM3}$V?J,4 =g^>or2i`ɤcz)Z좾}ICcSb_n1+eUvW]F |L+ q[P׈Mr_BS }W~D(A+27DsT!*% [VKH+{,g Dz4 вI@a!=3ue1'jIPG)o #L#C!DkwXMc[1GQPNjK6k%DqJ5&Y+N,g']Swޢ #!f}"Xbt[ycpW,б$̟_+) m8mԗB$`>!LhgvJ~iR+4qfF='FjIkc" r;[C蒻1*rj8ѽE>BsY EIl5 vQay^46!=)*_'ķ` [`#M"Tyqi1y5V/Vyo >pZv JDMG{֍ͦ=Lcjg xyBn eM+z % IRlnUaJ>3g+LsLFEiN㓳ĦUWi6a=jZ+bg9f]Kl6ȸ~Pu8wL[Q>.p#Uoe_X/;Rtϸ(f^\T,PL4T#-($MBOlXid҂k:^!(L @?5 DbĊ# I ܓx5;D9tj%fmoͧTo_hɯ1mޗTϕ*^٩z7s6108,9{6g;ʏ-J/! ַi37DP'V`nFQ0V9_.i8,#]YKZNgC2c GwG}hOR4B"7-x,3ϕ |7 6LuF`9!Y24/Ԃs3[ʞ8(Cj~QnUm CKħHə["i;,V#I`use\@D.|Հ+3K N–O+c6$N gДWBZH"NX7"UƎ^9krҀ܏Aoշ2cwɂ1JzUT6<AkV]kG$lBNAw5JDFX*8X iX^ wCӸB*Dv1KGF._9/z%ńwvdts8o40X%wyq<+? ,?i4AȘ7Xc1Ei H͇ ,y:zU;|8L:Z=ϷIGO8"kV;89*e)d"uthPZsrsډjp<-'5,Bŀ>ʋ~84eZZS$ii_$FG;(YI'h"m|Xk{I.z̪9[6{B tԶ4pȃV"Ig]RĻ]h_\NGϨY͡9Uq^Z ^0>3.=]NGHh^Ye9^UxlFa3ڍ3X Q`.T8IS{5~]Wsm=" kT`}_ӣ2ѧ 5K۔Vd+n+<`0lT<h?&W/ \% eNP@!Vfk*",uuUI?ʺJ50`^ oKP<~k `b[z͌4ip r6hdC o,W㢈^{Y&|499df+C$J1d6cs<_ѽ6>}2}|$Sk9xFP3wvs G# h apZ'J}bIMȻDW?C%#7V].E2y5cE8#.ٰTͅpRK0-BD"nHq_KQH)~YCj5*~=p{}1|ȅ;Rܔ /I2H,Yv:)}h@|#}!Js`F&GHr?lxseLL߷sgD]M W}\Z<OMMqC(^.JUT ՚2kRWHC߶ٖ!}|IΊr8w? {O/s1Fn|27d Gpvm{=%_p^.fۇ8zĖ&W;]PizDSÊ>nqq}fׅVD֏7:HOkbI;(2C8Kw5;|{3 ru>355 8 K٦[1Vqȶ _y\Jd,LpKqyciY}=y42KmYcC\[Wn!kkgqftmp4%3  j C0.$2Y٪Hя5LH3!D^ ODI*~/aLT@5g"|ly9Ao w~<Hz^dnffć((ݐX%un!> A=*15N8M+=5<Ҹu?yxnw$XۛI/̒xxYz7x i]Yybn#?-AZw"'ådXn6N!xK)~K\#*KjuǔͰ}Ap/A)>}㎁x>ph);D䡖H@dZ"yi fhAw>e s`@ɤ,b1UV*wScJBVQ[{TOa'`jw;ףL~Br^(XJo)B;r_I3I$^ Q@XxU5>}}gLq1!8DEz2 ]1o7;Z3"r0ɺq6ɸڽ1-D:XwwEp6\'l32e%cT7@ :_{ǔPZo7cTRl=(n+s8/PyKd7_=A| 5 Le*5CCSevM' '6M9?k.6AMEZ 2‘gd;+͘4c 2Re)z0o8(#z)/(]>q!cV:9}&J{T]q@F97rFWe1_JiYBx:5+C q~KHʺh 8֫)wj1 !GP]$ǓgyF'o]ߡ*#cnܚm!;CbbĨRw%ÒH|}/E`3]"_?ͪIw7I@9ȗOTp=|]"]<)+Gh$Cyü5}d,>GKq7b"+}v5h-Pc]P$]5t?9GG+-K, `Fq,@ v+8mւ2W 9"멑3?HwPEۻY!.mMu[+I矘00YW8Ƶԥ,Ґ Rc 1.'T}E@5:D{9e5Eu=kptqxdgoCj>~8_lC OMkfyWsM$PF %c~E8/Yy -u3uVt[LUDX QtK/gGN!'2ָFs/غDt9|$)2ӾMF[Sdd,Ws'HұkOxFsoxd։eإܻOnPTHIK Oi(/= Wj* BCt`q$YR!bhʠ˺K_"'!9E6ǃ9 w5kp_X QiqSGEu0e.4SN -(gHY7YI1ZJsn nc+h_ 2w5]^ )uQ{Ib K ;ݗיf$77jp]D$[Q^ͱVh$1Ҧ*cA#ms ) iDn$6'>%1pX ?!;KWoC;ۀxՇBxRDB==s)v]X[kTŝ\j3Bۣ#jt Fw[y Ezo w6S_8_X~M?Ge}a=ΤS GgKB"UuHÎmM'{o+Dk Cdnp*f;<`O-H~ 訲ήkh:G˒Zz푤FxddV%@E i` kAC{D|f=*š B423LlgN[{_8i.pfc{rTk&U EbB%¸OLt͉Ag~Eh{gF_0\%bNݒĆS iEgpYKQQm dNby/g,&ZAViIywuob[LBroiy c4c$ƻ AjX P,ȁ7e?<- .űrv縮ydw2_'wxSS*?c0" v`[4\ JP$jU|-uwYkx9ˣb~<O G[܇*%kVQQ7}9 mW&P]2s u}xV@,L"6|I6ɾ֙;߃?42JmQ)`o콇òx1[x,5?W6aMEz~fjfXC=n* 6r;06܃CEz68ʐĩ,deFʷE>!IJKɰ/DCʱ_p_< 5* L nxj C_Jr+FC}hڛWYRԩINΙN͞~AvEHJ bV˞LA{*}"<4k aZ(%#OTp ׳5.,Dv5\R}vR5n5ic EK}0n xq"E tW;08"\zeJZ촎;%m mV> 8˄V u' o|[/ 2l⧊%82{&C-3ST`Kټfܿ2z(2V2cQDSk>{Iʹ]"ppfK`VdD]͊6̄}U\&Ziub[̈xesm=4"t! %\]_pi9;c.&yRШw'e0S!eP3+Ym`n6;}&%SaxNCu @"NjRFD_gaO{> g-v'5`A֣!-X`ևYԾv߁cD6HO?;$E8,v$|^A=fk ŷ[_SspNH*9>iiHW1xڦݞk>ޢFdvtsn%! 8K^"PDq`%~w4lؘE( "e(XB-'x}g [QPz#Խ-I[g0/~޻ 6O]SOHyDSy !6϶P:SqMiD7TX[4vl1 M=~A”U2l 6!t[_Ŷq)Y0}(!2$W0Pw)k|4sw*?'dx5;-3弳%;ؖ]'IQ-k>ώTD\IM\39|TFaꝁ7RÝK,&%GphPijE 95z5tB+Tb Or =t ^ biw 9vNj2by}"lloRaij`g2b;#)9.k}^.44gCh-U5Z!+EGv\N6N)Ƈ f&^*ػԺSb:]e6۵7cm.lX 5u0$MB:+WM{R6&/ʺb)_EN"mKR2jA.n}V-<Ϯ"%Ц VaʠnoMBejHK>ä%goQ( Zݿ P\uqCۊ%俳v@)nzOղqfX tQ>-*3KЦ<ӶH`l~>snfn_kQ7 :S{tp(dє~_-#S8հW|RYd:;T!tO~.QD`*0op)c3_;ϼ4)BjO$,*tX;?l:{$h[kDb3q[.iEN[,l ,3ρ9&^9fѾ;̝ޑx{)^{`~O**jS9]gsĝMkZgV3(#2^ЍMQ=i-/X}Ѕ,F< g2m݆Q-2Lh9x?F T4^z ~7Gp ל%E;v3S`g!Ɒܜ 抺mM0e(r'S+ȆY2^D:~}9/H [h7>0N1N@t6k犡=ڽz 5Wx\|\ּxy xw6b7sSڥPUlRpL kΠnQ v5ٻ&AMr酞&HlNA:ӷ>>(Ȧ|D!۴O'.Yx(=I$QN;O`p TFoY8qp{6s,^iﺉݒoU8.*P3D+:oѬ  "zfY|_h6-Lr*{Se !^@g7mYˬ>Rbf^~)(A|zkD0>W)`U4߾T=&͂ inE&ƿCd1?Q{l$h;j-^˹+M`tF-C⣊zy(Ma٣# fљ5߫6x>)\J?IsDrG[< ۙs&l*[QWgޕ\'dY+:&A6!#Z㜤K7kffyPS<`7oUX~LH4,/Y;0:V@ mJߚsJl͹ߠ#2q4"_A~B̶3D (@}ۊ糷\'a>I9;x{|J)|%߀䠃2?cσygG5R̉1apeMTR_K2ĂqӬsDI4ciM/Q)C)[^Itهw|yﴜB:^)E6*OK=/@y;>J5 Kugcغy=O`Ղ{:Z:asxmE!5TDt_-ֶZe9Tz:=32|F58j?#nX6ufu#N%Om\"K۸W+ _!ѽ"p9ӣ[+upUe<O;?wvQp(/wE67-]3D ӱ##ì UE<,]&n;C|,_^@֧($j#y<r O6Ij)j~m]jW$~? !bYmh|'^N](^U)]ܔ7vddw:Z~Yrv%HQt*O-WplyCGi o- 1^ֺXܑƉj#%c].>aa\쨦"8`ëؒH9PD[/_ oKpBG51Zmg=PVƗ/}w (>;1 5l=l\c8z Z0;f |D4+w?]_$p]ݎ2 JR<$s^#Ě/(͉ O>riɮGY<(] qe͏u?)j6ʙOGZ3+2P{纽ڄ*e{8FV\s/UqyĸDn, I70ַd> mT<TP({f^Oh:gl7)XûxT~헨`SfUn\W; L䭊fJ9CUņ8U.> -u,v-M@.R 7 i|*oP{L-1Kdᬆ{Eo8_b(rvGL_@4Bk<^nvN֕g[Md8U02eVcTUr~rD M*@H9$\0 r! B;Lz/\ɜ+Ϋ9ǶW TݢijW-IZ0^+>c8 8YȮ 7N =]x7a3`{Xp xdh&艽rӐzH(<Wq/oLݠ;p>kY^o؂$D- Tre'Rh #yY`kᛛ&L~tUݕ9~Ma%$E{lU Ĝ 8yXgT.jPvaCU䫖 6-kFhbFw- L6d'~,P6On(eVI){I7U ?m+ pgo! =J(y ;CF3RDDDs6y+^Hm_ Pi9\1'ao8aQ&M'.sp|ZM18'h-6uJ3AFrP41z PpڟA^';xW9-@ l7A"<@a2U4uؘ52ҏ}w1AXR aGdH,4ڽOtO)VQc{ӧ]v:!/]PFDqko 30Qc ΁Ms2tڄ8/zpohVD/,q&$LEk!r0=!w%ݢCpPU,K"ghDB5AX t́.V(ZY)åݫ7Wv\#ba׺OB`lP˞*t 0ԝV3յf"ddFlrGD: X(<1oC)e7Dxar E5r޼:}';aQ޽yo#WRFQ}eo< ZÊ 2cZ-L;sXOn:d+Zx2%$H^rܝQ3n $qV+a5a`zy6&"$N7dzeCƜ#]pC:IA`P.jkrJ'Y}T@p}N? sLTn6Y.3yrxj>bi,0yv!T×Uqbz3X5zK5OfG8w] Z?pdyM2>OAb!{7^R =1*z48)RO!R35xA)bX1a*F$0h =OQ nVbC9vY {F!Ipќ z"2_Ѭ ] E  Ȗo~z?Z7f5̈́mC3o'I[t ~KÿR.2 iSe7+ N.>^.3Y[.>kWUFpHj<] _Ħ~sRŵo Cڔ>%-~\Lo'9*̸gp"i$#T/`V ͆EQa`e`م3 yPu-tx=.oq5:^{z1\6X@mfE٠vy^MKߎN J5dm/)DL'%iN5 8 a[*ƅ P5`:5\{c8[S(zO~L.dt{P`1R+ɇ_P%-#p+:Ϗ | PaUnc7.YxVWhM8~o^Y(P2G >ї xݩOgw_[2@Ъx:4<|T"7N(Z*ڲ yW FלUAY~ F, ]zi3y[:fʜ(a$}்`U[_u)%v$itFz4aRY\]T8*Sפ`lݱϖxAk-}6r{ը_=YcgūVbcQ5CrSk4p%8QĐPP_L?I ###Ôc$ l'w\p9!MCdS|sQoeT{.ĩ,,~ frx+6Aso頉0r_ǔEtI!Á  R̐=T%~FΈl5Eȏ} ΐ_?$>`bc=6i.3hgʨ 03,Y*.hhER!c_[ u3 ~l 9q8P$Yl+;1t4bFO ˂ "ҦVvdŰO31(.؈ $Sr\AI1((kXncWاpzHJzE, Ki ~ /Hmd]3*8"-+U\Vp<WTZUrt`M0+Ĺfr$ av@q0MJ5tz]V Q G!*"o@p[Q7^[89'hڧ]l KU,=*>FC쇯o~~tPO҉)TՈ 5o#Yf9ZD|ω\M R4Tqb4&\ϙ I X=2 4d awYYlp"}/جxcZݰ0tf2>XvVk IsnpY|u22 3°2f6{g];iQCuaxb36~kh&2.6z`Z(MJ׳ 2ɭ"zy8W$#n/ Kyj,½3y2|^txl|U# d 0kxaF/_ʘQoE'hrs H>?&2''nbV-М&Qһv?N^#lpqFyjQ"iq`8+ 90j"U̕1`m7"x W# /햔E)E"fw)vFG o/я;PbkbïCC]տQ*V;T*uSE0z,ɾT,q)F"5~f58/fh*8xY(0PEѦ+t1RvkOlkyn񸟫2OF0>)Cj 4?KYvW\4>k!\,="JA3hȓch_a z.x^hĭO cH @fGzH/(}}`*T4yꕐFeXhhd5YcCN⥀ϕϹ4vcI-Bԡ7epg>Ov1)8#Xz^8{WfONEb/#W>0lYZvk\k Öv2k;v⊎XUJC)_щoZxMuLDz|yfpYL`Tkqwih{) :\FyJ q (zkSlv!?n6ꖝ/7 dZ'"x STNct,̈E+#f~x!4UG3Tn%X65&1(+ ['p7m{ó@B%mT`5nn>$䝤ChźLڃj3!HP؃ (V v ΐO)ok:a\x%3s=o ~6# :7Z@~DѸ$q¯@F)Q{3-bC{}nL$9x7|95$2yd;={qzOP36S޽9)YX`͎ ]V!l:d1~fuUMÿRmϘF[ɉQ-oE!1 F@/bK9xے3CSgCO@2;$}f>y)4`03auCx4'xQ,2܏#B_w:1eTsegr }_3FC:%lgjFV6BS.2咕̼S=ˇe+juRvyWU_KiM*J-H Sa>-:!#`aԊZnWc8nY7F6o7W0.໰A . C/ 6P1MJv6STRQwSGdǁ\:eP[1& ͨKBJÃi+t[H<=W 8'śD`d*O,Rzbh@|!1Jư&z"֧<K[㮕ňbJcBɤ ~jz0f͐dJx]eXӆT9Ke3VƀA~zEox'j98Dܘ0 1KKbJـe9WAchйchz"\sdKF4K0!"Alu"rE* 9 qe~%bdSM9[Jy:ՠ[܉̀Tg_LfqmE:D`KgD~ :.;?]1q9 S 9+lE;Y9H.Cn#-yZ,-->q |08wR&-v%@bu9Ƣ oGGk,՜oƲtˊ$8ZL(CGQl%ppS"JؕØXBv9Jr E ll^Ǟvռ5D>D} T/#O(~yr+w LCܳmzhV0IJ8&BJWfq)^[FC0ϊOs(78xjRR+9b{<#<]4T;hN`a_nU=xe"7jUe M"T]lurͩ:o.㡚Ǎd6u,L[QdwMQӫdؖDzlۻMv u]Qγ hNh{0nY$0]w5{A* u/\88!]yZr..A/kw~H+ϐjl5wۼx?4J7 ԨQr2Ѯb`ps$VO-yxS*G6@dԴԔfLc1ʚʙ;{ug?co^ҝ}28%)m>͎/2g|$DKZ3!h65apnj$NWۄ9BT/|p5<̠A;";d\i}f/ B+sڝd繾w,̇ Byg{ u .ӝ!ܜ%$D?mzjXTY68|ome+ mor3]dv L{+A]͏e?ŏ$Ͳ\X>2 F2X](1ԔrZz{E,h#+dNwU~Zz#=j۴Aip_E0Q%)~\iWܗot#{x+Ԛ2U$#r8DեS\X - GbO#e>dBpޖG#tQP _{g|~uE325g'hDSMyi5K_]c:T oQz1hr%[i) ,p]3٩ C:8I5PM781dZy?a} QZQF=W2Q&+a 2KK}xV>{~ |;!6AP{&O.*XhMt,L|m #ZL^+PRG/U%\=1qt},.U޽z V#$ 6fm'F%8`Dr?Is~$˯I`y_\ؘ:3*-Y{$1 8MUia8_gPC6,-gK?sV83 uʥ~̹wq'm<ޱ ֮0la| ÜW%i5;0 n3}ˠl3}KʸUr]8;hR^/ZgF]z6_-SʦվgOajMB${_ʋLְ+]q}Xp߾'S~L_]0CM<'iUB==5 o~S(g +Xܼٳ0爴ӧ|ȁђ-F!;Hqn$,ޫh{)`]"8w+l𚐉d`,e+Ic0M 7OKvbr5>U41Rr~*"LDmx[i= >yBB0gYg}a77HDg/oG藂\.;!d$E-K#30ntūGw||jNًďL^QJfY|s2@UU0—`BZ`SWR1h[hj6G>{z'2nB;qZƳXԟ 2"\OP\MD/S"\9#p]CbNw2#ͼ #uP&Dj(L%z;d“s'|?žd:lUɸS!0Ɋ<#5Kߏs"qH=׬>LDgl[@u@@*kC^a32_>lnI$i&^EyC^;C]lv( +Pǁ?%}[+m`RK7<\= F2t$#ɐWd)%t,b r+ǻVS͙|A!hGNj݅@ˊU?~Q^8MX[ǙzL5p}c!d&_`e9K\+gC(J~K΃sB(%:ΜYo6A#MO2HtXC.:c"^ҕ[[ zDT2$d$ѥ^'dMSI'8YtR-}l>MOM"i7%F%aBcj3X G=PFUwX} j 5U ' [a,KeFM9qID/b,((5!L<:4w~7bȫ*3 c[_9;a !"6nR1߄f-6 l^Ƅүi2˷FzJ,s+H5)}.VϺHMxŪQ1 hr Ru Oy>!^P&px&Ӄ`^i\s/Dh1%LJz۹=γfurE^y!&ٿ_H2ZMiXMiG!H(o #|uu2s`ׅ|7r%Ow|'bRw]8# S)yc f, Zح!^;B]u ipjy5Mx0'zHDKKb?]Ma&,:*}90K3Cwoc9bZؚ -d%3z86v9}^8Zs:zZF9n:ȖnmJ@h4z8|\ZșNXBO.h>ۚ2m̬PQE/9j,sBqDޮL5⚬38L zjTLMcq%{G,t.yP2#s+.V[bZ&'ϔ7^&j>)ѬGCd lʙ I-;y2#} C%JH70@B xmDO\́ iL:u-$I!׺UzQ0>r8p]'s@MH0l(oMPxalW,> mC?H,,SほG$>?+IJ ʶH@j'ma83X$H3o IA@fZfm\wb<j YzUP7-t"Mb:eXf0(s(}u*fI~Qߠ꿮L5[7-ݸ8A3fo9'F4MPSS֌}Ufeo翾@,G <ט"In3x?7Eh D T5b Mjy,xI] ^}x_gsҋA~G~S#H:A97[-@T!O]cxP+20v}*R=vEbX8*H{Dm#\Ey o<4uIFQs:4f;:RUN`ޥz>NI3BEZM`{cGnۼl(n_6QMF\qDLbכТOҏHX 7M_8V"NSrD2nV@:bu%u XYޠVY/Ar/|$8aW=R9(Ju,A|K qEg'FŲȋ/+]_Q53C {`pV|K[No?_R4LZo7'hםG;qey)2Q_=`x~|x¯$'p)lG58>S$TA6xH5[v}5a$#rǘnli㴓wჯu.+2# ~6d[xb%Em߆K.Ĝtl_~.ZewCxWqu-GOcU9 yi͐y$۠egv6nN,)BUE?V 'AF T:>-W;10XK(rR, 0fwʁJbL62"fQ6!Pi9!P'rkt "%#B!Xض⑀ qX >7b[ge@YW5crVp~=]$YA:wZWd-i XV@ R*[W6 <"];›N5,XHG28U/@)S۸'`h5_P)3WP 57\Ba3,Wl*u4U\$ !yy82^qu0_Ŝ@خ+p ځ[)>س^-W,i*'ӭُƋAg~]7|(",1߽iU0um+.-e'w/3qEhD#s A(1\Z8~D_;TMejV_lݯ`.%?C8ψu.hV+T'Tt;l[]hQ`q .P}JvrϜWJ AU s(mM<]tj#l> ּOҒE a!ZAW!bkأW7RMkrh#y2g+`kDFf4=җˏcd(Ef'SGqnΤU Lzw-x%os?x~_ݺffV̡ƀ)S8/ iFt@F}v+[s,TҦZC*Й- tP>Ճߣ49l0~H&x!$vVB [IGF9'F*^fk^wnu0~ u& JTҐ_Mjw{c.i [싸Sg6scC>&ZZ<ɍq.$:9(~*g<@m/1 ; mlur#$W8HqдC׏xsإxvL*oj$EdUO cU)t#Bc~VW@j?Pt?SR -5 U^a_\],Iʬl`ޚd3~|eL@dQX-V"j^pb\ʸH8rϙ鑯j>I0Vܿc 6c SwܻDEm  ,N@ycԣ3Qy8*L赦Ұ5JvWzUY )Q<喆X2uM'f)qۮ h7z %`(L9-[3XNG %dwI+^/"P?0˝H˄lqQXlM̉KUB1 ;Í<#?/n,HfW:ո]p!n\R}%??,Hd;Bg:0k(EꅹPJ}$OGb0`hJ@1I,~FqHcy6ʋ_%:W \2_0!+5_1*40bը/"e)SIȔ/C2HT s`xһrB{&h+n^"% o"g}W˙'ŬPh3Wc0߇J֫P/Т mH͐u;P V *LM=CrCj͸҈>4Bb jIX,t8BHu!N<#]Nu!Gy> P_ʪߧ" >vҫc.x.TbwP3X/;ZͳQ//[K:>qN!'-u0gfJs%D7)5y>8/|uFx9l_CӦ^G?Ns+iNI ۼ46Y֔#ހ 5}W v?ŭo_-D\eau7Vyzъl>α3l0' jQF %z%eߍ>QAfeCwXkH'3-&(xEYxf(TnHR~WX7>-I׹>BlJk v,mJ3F$TN餌jG%̂s $bnG'qBW?);SA o7v]M4dnH f]tM5 U L?BI] :Uqh+W全"oGnjtFn_d^jEaQpPwShn(Lšq.IaAdj\{#!]iDCwO3 U0\k=δŘ0'D7fRȘo]Nrvr"p;׷̐W4, ]<14;JPP5' W_xPeCDc?)>o/uA ]&v\q@;D:0. Oã)-HPәC# T.:Y ooGE(OD#R.Nr<8M9jR`U~3$Շ2+:gc%BſgSZ70(]!pXC9=4VF?52y o&kXE܏oX\Ҩb?WToI,c@-7&_<5PN`ϙ+]W%TbOh+$~sBY<S8Tn2aFi/kXDkLmbqzV}w 1jKe|_ ]LFXf?3U#ThTV ~Te`ˌ=;:$-Xz y/5iE0|hYe`^/>q(/ پvF(X0/NCF nB9eD N]| [7ƿ+iְk5x)m=4D+ut ;*Dɐʑ+U A`Ϙ{Ea@澠iELÜ6z`&r8iW ṡ :쓲 #%i&N &fU]YA- xGVo' 򷚂 oӊFm,W]v)(tKU-y+$Fg޶9T?37s׸t_&M]\ 3ԞV`J>9T$GY+Vn-}8FR<<= h[ +tHcqH?4IH\LZKKE,gQRgԚ3$gP7A<գֵI&',ѧeg|Љ9MFm&ɩg#‡%s%ļZY\dMrURƇhvZLeL؅GÊgCeJСjgXbm_@V'BrMΪbB0omR~qv BLSͷdCTXeL[j%͐>UB 1D⢊,mPv:Ej·)KئjWÒr( #>wK&"'g1U!(;7>-dG3HBp&iD\}WU]ӓ#s)0x$deS*/k i*OeWc=]΄ &iJa%-f䨟x]Ef\!2۹^^bo7DOz& c56Y⾋g8lm1R?✖KU? T׷XiZLt~C ugѸӭ֛ }Ô˖l%lÐu`tiYĂSI H'k> ;5*NZ=d4v]cef\'2&x *~A˴X-ኇ1' GbN9$,zlؖb$ę8ʭ\jB3vzШzϷ;9H}C_^V )o%6>2Ŝyh Ԫ5K=sҥ[#FuUtЋuY@1E4~B |革 FS ǬIl҈.*[TdKn`(ָ/Y lNm5J_XJBWMZoy8'1 _o g\sL_lt-PuF9ѫ,qK8CM13.$4z8LBBpvl:[0co ee C.MLҽkm!&8캓Dq8/_NQ05N!Ϸup%B'eߍ8Â8Fߠc+Vs$"Wd [/3nUR)뢟n |h,i: /2Hv 8WkXCɱhc10DfDCxh1ft dLF+Y t6˖z0zs*lbל* KK4@.Vb]7Y ~^' c`gQ]lHˆ 3۷> ʁ%#]/- FڡjRBwDx~cYL4YfN^Rr5.[8V1\v+)Spq[ܼ[ WydܡR]nӆ?ADzf !w`q>s~XushH^vr| 5|  |A0ϰF:f};uIٴfhFvR?C]7Lj{"Iǒ;eCR1鞧8Ѵ,L&q}dH:؞<;!U761݂$ eґyRH&۾fwG aR-'S_l3% pC,̂ R6AyOު|3&iϺ?֚#,omZվ֖9["du0~ZeaeCwl:w?UJH">VRbEg?6]UKIU9S T'7scUC︁D%t4oV&ѻsveGv>l{D^ ! RIc΋jEjbnD 3Op<(CoZ3dQ5e~n&m7bT)?3L}O D'_ ;nRFҧ[) hedf.;Aa\'=Q""f({QSXM/@)BCK@;)d;=m8-)4?`̦!b1 np_g"7h{=eϜ>cPJC7 nNs,XLjpsEƈ-jFx~^şƷ Y}6SEtE/OHx ;h=!Zѧ"Mo, eԨu3;i VQ љI؈="O][[дf9x$y穲..24Cp7/u+7A6ح0KF:~yh0NoBѕ{Ҧ)RrH|ǁpdeQo{FSMN6ݡ)= >q7&ů'Z=c=PO9aϫZ\OJjSŽ{!Z6oa) DNԠc?,RZȰf,7*;ʠnJ le"LtׅxS|)'cˉa[!fcO*uhfF?@JQZ; Q)x)HQ\$beLY \>-eGxXRh2ƤysCGbwJ\eX<)=PDͩq39DkDu}.bu[&,L=lP5x. o B#;L D!k<3m ҃uK{#~faLe:>6W/Vm$ͤI뼃zQX}<Ɖ#_NA=bT-\Wd0O |]=VfėŬfw af%ǫ wFD B[XvLBX2\"2rٍ^&X, #)kR8p^ sJ6%b(_v0'>;fo՟VAΟsW7vS2hA=Z_+Ҍ,Np6;zNW:J힠KphdE'AN[ Ċ*#Uf|mGrP6q"QyŽ OAfmIV;ZcJ=KʯaI7+* ]wF9UIaA` ct"uDgXJ4ǹ+7D5`y;\M˕iML nt)O8bJ*MS`?qGo8N<6PFx"{lxfݪWǗ6b}CbacNWH!rN#C%ʽifdRVbEoc:Gkka4wͪlcnN@9)Q~qv0}7Ʀn80Z'~[txD: (10R6م\AaM@se&+HK "IX9%[oC4AHs9HFs]^?_БD0)V"X6ǃ:? ojyhHD/2l(5q$+<җeנ&Z`^s|Fjv0&eXm 8;qm}>jYLpϛLJΑVߔe # KS#o^m,buj_8tGo}Ƅ)}MSD5Vޕ@S3"85D/K13#H. ށJ`f`;ocuI"H#&Ž ĢVaJ;Rkx“;M5bv44]3i/j 8],ʘ+v,(/sf2TgG"͙<s,EӲ+n7)*b+ !fo؊6,Dd?fp*cP.-L<,s8FA>:4sفB6 Mu%ش؞7#b#?8)(MfИS{z+!Y뒯4IgDSET?2vM›wf7@]49{)X(? ?d'RD5Y)DZ n$@y+6}ӊ3 }dd)+؇ZwHYjCNjỈ`>Ni6;0> 8?G!(Ztg؁OW=0+}G@CߖV%g 앵2=eQz,@{mp!w,C[bzsEjTvk,]a,+,#VI&z͒[n?5;k")QҠ~BV#,9 i,.cցl/ƽQ^ygح NcdhdTz/x./dBn,8z 'DHjè+_g3%bn-'ymrdYNЏgb{UnWMg4480s6OB%:לF{'(rI^hU)qѢEU:,ۛ9#,>x9 BYgm[I ɐL1< 3r*xJ=GXguH]W!OFۜqW':XnYHUjhE\!y4 ^9Se#͢[`>#\.7X#V~isc}fQUﳀᤦt%NBHܹߠMUni@W@3Ő{{B[-Ci h6#Q^՛s XJ.O.NJuP3à8̈́&`.Ud ӥnTJ 6*6}8eiOwɅxM݊119ͻ]bZ#б݋]I3 1\uSF54<ڃr%jXN_r1KFVd쿿)rKM,CdPbʼ`XB; wk}B 6]ܨZ4" s^i+*&^^kjZ%ACzE7H&#eC.D".^Øn|p 7ȁpâ?KN-qބGMF]I4<6_3(i7lD ) ԈK^^Gg|tSfոRģ(&iP& pIoL}2 ~ 묲7IzJ0!6pR6̈r|ճY_;)p#}G7rY'0G6(ة1y|i@T@؝wbE!2kJu ('y)’b ; J"dB=]|'.{e8 tѽӱ†o69ck0Tﳒa#-(~ݻ}8#Qs"XV$ (JM7Θ@9' O Ft}8m4vTPE'fqu24گqb(Zyt$?*Wǘ̴e3YT @sRl}_q$t+' jEwřS vlm04Kۍ O,׏K@WۊoЙ&^YIȍEylт vM.M,r{C nnՕs<1-,+-kDS0c O81ea*4R7R0E XAzw~y-̌>JR z4=BS[,je7%JAןtODiÅNJwLz~_"m~Q"x%7 zo>%۰AƟ\Ok֗@>Rs ?dif,jzo/˫#=FIúRYf8zӄސY ^E<}MlE7G5F!=Dy@HjUWdMr/t>}x9dːjdU!C~!{r s]{Wî"KVóI tـ0\Xd_py"t|Pl/'-h؊ыuf_ m\&soйs :e 9RI=LBL4X\=5cZ,ͣ |Di"#c}Rk|=<`ZٛPt=q'c&S =@. S`٘~I-^%J6=ǔ ~Sr0.U|oX~eEo^Tw+vi,}j8 +ոi97wDgE4%%MA /m`pֆ4|L$~?6_ٵ 2S@mf50\TN]rǦ!B/JUȭ'|wuK"#o'y0H~A'H ɲVStfА _1(1AP%N2STy^]Bͤz)+IƖeF&?™V>zq~[Uc7e&To\pHEP&أahe_#LD%U.T>܈0)X8Ԓ ͂{g!Ҙy$8mvɄt8|;ݗzPŕM`a XH%#'ŸƛE :;G}r* (Si d_VUPgxDbaJ&#tEDT=rgtIM,չl@̇IJƂv)p427e$ņ30HfM,i;l`o #SҴ5& }@ Q~W m'<;ʞ=Dž{K[E"بg.k9<84v vcoJֽaMfxG¤hs<+8Cy&[:o ߯R<T&]N4Bdh8^ky8Z2>+8PZ./aom/{u`7.;|"'~'qܓ%AyUZl!P-[mlՖe΄_k Td6kL9-P> ? d:[8 ?V> 2O_T>i@#0wqA+`̛$ߦ^;>nޚJȳGr^Q*2&?P/_{}vf$0Bi.AQi\ǸJP1aykH A̷xzR\' V".غ:q C-.GdZ/.yȈiIAxD=@6NI+dBk0TApR ?É&!+4l5 ϲ$X|(~%Ϲz?7[z[g-gc4 R{eKfF} L*ȾpS%4L]@fz8[7g36TW3u^^@9&hLkg=?=ɧS 'V v(MB5\v|odȑgB6ȯ[pqag_`r$L>0SZNd/g,9k!-/yjzbKXiCi!!6FE&aLnݏpubZLpq9QXTyϡeʅ 瞔(aO4)"0Z:TQXr/kˡ ;E_=*㉍0rdv"k-Oqk!Z<,H&pma< ^Xn'%<&1A3P>[wo4pP 9J:H& P6դJ%T co/f3RuO3;qã 2n6r\˖?OWD*E9?M-O|v$ ڕ3"md w_C/wRP.#;~%p ~'&D7ŵRyf.h06-Y2x;~W]$4Ɩ^RjiF6\܀S(U6D*ys5Y.HHH02œͥccԋ>F2a]z6)&0 ?);٦M2F\]v&y)#ךn9%Fi12R.CK1TNm{z;T۟>(NMwC~j>x!D3:~|Aݡ&.eN;ڨCVzN}+/hzSMVh}nINA'6r oWuu^dvcjp1P"T[3a(?'YߑQ|~IG wQ)dۚ&rD818_ڧCEA ݹ~4͡r)zõ)FQXB/I`Oa[7oY&3% KpDMX> 1XҴ[=PM0bM0+/D*#J!~\Ѯf&'YEAGWSJH˯VW Q(<I ahj5+yĨ=g2n#Xć%garw͜-d|5ҮYŲm ߴ¡]%+`*;RxsMÁ.(Ywy"lLX?R9&o|#nKIQ0Aɳ*ĠNZDOߛu䙟"|"#22j?}! (a {3-4C\S{Ɇ1f:H޽(9XuG[-\+ωSatV"7U%]ux-`.;0m| c9[8LzJ[  ScCn@зFSl:^pUd*rĈK2 /l%vB(:=E\OAcg>bJWsqcس n]ͅDzV EvH^Ekg8!~ TdFB^BC:㳘@ J=T& Ga 9N\:7VBm[ }vP3kv$bo-QhvB=IMX2`1d/gA ?T%>:O Rt'+f<+[w|^HCd%EXkVLR\+Rj^`Uru#KָRT<X\IL  s{q&p[#:zu}m(N[gfXbҏGWJ,Mo8y⃚/yh69?A9'eD_\f|L2%)2 Ux) f ִ͛^`T#'T7k|K +(֜WB~cMGwU1t{D=[+Nca-^}$'EK&t &P*Ϡ^<^w ([:R˶jlpU=NDad=Yв;T~!a&e.t=iK׹]ҢCu*#L>x@Lb;kΦ_vN"ZJ%K:MY<|`݃yOϣ?PY7MO[V#JYG;Xd P@(,XKã Ry"4i;,|x_hEB&HRM(E!b]=?L*'d*<.K]nB ^+ `u #) -eCްy9d^jTs@MNw)#!cU0íZg`\ɋrtD輮i9 MA:g-a!Z OƑSL=0"putP+r;+P[sI#Tao%~2XV߭@eʀ?mR6qN2as@#~V[@#Di@XXY0.eɃ{a#m/uټD8"&3 m RIr ;Tѥ99.ORcML7YΔ[aW*b1돿*]u=:Bλ/E$t&YmmhFeS2yc>ܯI "h'9+}̷Cfs[/II m dsYF(*[꼑~sm"d-X}-Rzmo%uZ<- BR9`RrbPf &Lfq IFk-T.ORSr&Nxk;J}Tihh6.{]O! QQV-eL1d4LPr/VcN"3}wc1;齜D|OA9?3uāJ1_v+YrUXCQNʚO.``~(;V˄ L޷5U(q 5dzNlss{ܥsnJUk7cU>K 9Cy:3# (&Hc{I :ڻKc%kkxinY",8R)?y/TڽibOMjݰ|*Z'+e?H."c#Xƣ % JXId?wƾnKpEȋ㱼Oc,TnZ ft*?pߤu{CЋ!7 t\8/k}ĝB;"t/QhwG@sBe.7x$.m[Sn)%U]UcYG pa[)l ;q=5 xrh#^=;^0_&ȆY)fr7 \C.!E0r|q?4@Nbf1k7vւbkt}D0?lO̼İ5F|3?r|i{֌Oj1}tbcZ˩sm蠠ύ!870?OL{Ui22vaKa#gEP~ ?wT_8=*C[ߞGA˧R cl$8x2fy@Vl,r$t)%{1pꃸVC*Ljd5H-qhENYIr,Z'f $ʒ*&ʱUV. X {UrK꺥@wRk!moTsExpȞ1*";JqNZ/#<~>k6'XQOܖKKUlܤ5=Ct8q%^Od:@ Y!AK n}R'G釡pICdvN}#1`vӚ/`?InkX2P DGq8NcXh",֩$)+D?MT.qSHLg֔Ӏc*~ Yq(cV-xf~ s$PЛ@. IgSVGvv @Su'ֽ!b( 1G Of NAz11r}Ѓ)=7sD ~$ՙh޷-\70EV]*GPnFjf1q sOz!hG dtLq?~K>mf6Q%nY܋?zNbo|@@˷߳::ݰg6z9K,OF)XŘz9[ !ԹN|iA:f.e ͔"6B؎BSc㱾n}]Wϸ T' :TȠSrC[x;s]>ȟBsrf1[R}(Y6:vM1ϑbT39%%Ua9F*1MA%ׄbWlkc 47e5Q9UӻGjN`_jk^4ʊoε,pVIbm^+nl_Stf`j, WEZS;<PoV"e21l/r@}Gn`))Cs̶+hIۓ<pt$L>ڨYK3F$7Sѱ=vFw!sِYKn7@\Li?#WAݟ"f`{WxX юѯTNKz5/{( mRJ:AIX!D6D~29}Lyq]xj/[\ZLmCuLH~-6[jz|2g3 `;d2޴kpFg$|;!Nz;'Mdʸ>-EJWc9ohp qoI@ wi=f@f6\͖ut4x?ukڇWڸo`CFI0.Ѩ7s nɆw&;.N 3Tւgd|M:)@=X"7D? WZ Bdߑ "#{q5zNUytH{ҿ9b& lkLs\j ]pͅFnٸ<]M@pQ<wz󍈞068{ x b#^ X[)J%7sa1डJ5{%CjYKɶ@$((MM07zpWxҺS;%u s%t aAOl;@?_xL/bTfgDBԚ#1_K.YzUrRT򘁠HKFw5יz$+Y+kJO;, 1 ۙQͰ{9xQij "/)56cH vZ1NcBi@O~]7x1: S!W"Vœ.Ռ۵ZH[A䯠 i Բy=>ԭ2Djs.eQYpܡ}xeKw³1_c/' "lNlC@65+sv{BK2`4d/N[VoCWEuVFVW\BFhB0MFGYWOF(X1pf}mӅ$`CeAMy;}tC9KV/0鰏j*:{2h !ضZNƧ 2F 4\qeVEXIT7qjZm"8T^Nԃ9e+؃Foq{<|/04v0Wu1kX,V7 Ml%L[ w_FQQ% `aހ[-r=)7J;v60m8c4WwmɰEw^y.,X6ı9d jiNuobN4lq] ")_e&Chy ˾+\vcj&bv<01WhǾʂj49ՓJ/Z%^ :,}VsMLuQa{t|Wbcbl\~G[gxv,7:vY}Dqk))E_8 6OKc\& zx-J[ŧ@=\w#uS' V;2 WwgNeʪ)$!ŵ\SlMM@b$GT}UoDPB:!f׳LZ5YH]Iܨ K  n1fFy/6Tk%ۨCt.էӔ97MWɘ~9v<4b͐!v|,=|xTNe۫-aZZs>7;bėRNp禌zr?qI/ˇlX?DϤ(XEτpmB,%MHMz:{ K螟ٰo[:D 1D-eφ.ԋ,[>H`* Cj S:)Ě>I>09ʗŃmN{y '*9dl8l醆k^uEBB8a]:NUu5LyeG֧ :<}&tlw!դI$q'H Bm;tW`> }ePQ [+YSG@yl<3,cN2 Dvfl?gg7$Iyin6mWd][K% lonvi)82 dx#6Me! _ 9lUBl!%jֻ.%So {rPЌ٥OZŝ&Dv:h4*?0mJA.OAAv`P1ojSPO\{ZzkOHfs@H"VP( iT%_2MU-*.tlnF,q⎭֐oEPAN xG_/\NlHq[Xl3qg: Д\ RKۈ>jw~adّ,o3Ëd~#m %HTT¤V#+AN5$ꍼDs%S8*yuv6 矈4D92^@^sF#+'y!"$ǧ$;ݙl,xvv#ZwL.rpBIČ<;=Θ 4W,Qyw@~a<Sn!+n|,ml3+\d-[5zLi"}t2OH\\w KE .\X`l}nzGC~Kχݍ}!;4!oG[G@sK bpxkH̯.B]jv:QMppO:mr` c\:A {\[ؖ!':)MƂITlEVl!a?cg %Ikog%B=(qS=y9oKpm6)EAS)!S"Z"7i)FB)|_?|߂'~i?;5P@KT޶wLS2 > t!gDqM_~\񏇺;cGW3 ĕ1< !{6,.vMS)ԭWܩR<8ga'ψ )y,߇ UMNM1³X\whgZp6fJOר_J&V)7t_ ɱ~Y] 0ʡ119oNz.uk[mA,H;'E[@ 2"$@a\&Tlr]Hy\Y[/wlˉLÚ+P/ `$sk ѕ 0B@U$2YE.z@Q(!&ro%FR .[(H];Uْ$CA[>SB3'w^՟L}M }/̂ZƜŷgB,Ԅj~ >SviPO/IiQz$E#q5:gIVwpsr08 4Ct<& \a~}$avZvף&b;a" 1i1rޞC[i`3ɴx7PA_SW]"e#:|v [3S"!?);1#!P`ʚȀ毑`(9ee]{yQ'|mx[+(uI+ĚT!iCf`a5 (h :'f:G8hmơEGX9e]A ov'-; =²9N@n2(2Qd*iwvW]X k>'"qx xk"b%@~OgrRw٧MR^E MZ4:R;llRSrK<Mgnw@Q6l^׽QOO9µEPZH%bm>F=ޔB&;Ô"k{5E"gM4EPp p _ŗZHo79\8I Z4sj}ZRv1L'3 ~闎0Ul=܎ϙHp0k~&0 (=r l lr'<C2)@5p7O{!cw>IRmz;NQg]撼C'RN9:fm dZܠCOVs:aY[\ށ ;cF-1>\X媛8n z]xK%- s{0$ ,Pim>U{ZzI!礲d\_s2hxQQa/÷[ V VY^DcU-fT?ˆ7/e]m9.p;%Tr_3qd :c t~Űp4LiƋruw;)C.̮rYhIQT=$&+uAd RՓ="0&~Bg;:LOmsX+| uUr+syE-^a_6p:Y A":^BS^54z0EUce2“`'3hXɒzkz&YAM %W,]EL:Y\Z?H@ WM\ub<~sA^rS8zaWdaH~`$VD/_jtoV<.WdrfZiS6JNqGn۟1D"  Hiꌋ$ȼ@-l> bies7l{o׫1FpBӞ.7c5r`C>PIY (HN 7wH"MvZ 910-rLXrks? =@be4# -E2'I@b5Kx%o(kҗGz0M&ךzJi$`Κh8Lqe\t 3νyS̤s3Ey0z']<@•)f(fd7;$:ЪQgy^D(5 l5˖-*Z~1S^\ebA ϯ/RV y*d{68Ϥ]SA,g*{>#X~/H]–#(QNaTP!+X822ocGٶ. Mft71bX/$Zoa'^f޸^2S0|-G9`STS j9ǂ+m jc [6IP i*X%"Ս&i<َ2 Dg+.$eio" 8fn UR|P/ICd\Y5O Ղ}|4ᕵ6|%b6MK?,;q)Ct0K,IĒ߫9>Qs/s~ga9T6E;1D T~5C2e'[1ffu_8!3Oy- E!dd\ߣL?/wwGWmcM a} /n;-ң36O؏|i x3) dq+3~pu )sjEY9'b \gVkmZm_EL5 ی k^ua ZJgu\)#CnR؜-jo\f/fTsn}~j&ڿ%\,d5B}rp?\icJ">bm{G-Y@jn'ɤF*܉c;sR> )S=dpZJZ7!c(8AhÞI!X܎2 +]W\  =A;TI@8fܟ+?B{;! bw؄\݊N3q`Ȉ 7KRd8y]Ыm0#sEfp;# ~r oA눑<ĭRȺImb}LdP  :?6@D侃ͷMn&uA*Mb9 C\',rfza)MJ p7Eί*Ť%~_?JU%2aPI2ilM.OOH [r~swԲa7ډG9Q" Hh_]n#'ѧ/FBfO_=BpRgy.`sFc7n^9l"]N%\ ^fR:6^)ze nI5{q`)؁U;w6Rb2)ǵsC*K]? %N{b{ aBE`_ӊZ%] `&Y<1壜޻h7jclwTp9O:9aJNB %VD70xC3p&3l$a)0ax:ҫA3@A,X57j%&h9z_;lKn7PۊƦ0Ps]1U*TA.$Gu,n30 U >okݢ rdESXlڄAo|"imIMU.:(攐My"#g\'Mj.M5}jY($a{(8֟Coj4N3(P}8&G얀UW{fZ7}t FDua䰀oƮ~mKr-ZKgD1-9]mѠjsd}:t*|: BD)lM8ZP#h:9IJ1 DVZ>3GsQl.*LYOW}ewtC!ktrl/&jQo%3@JD Ax~a si`X- a 夹fwqzyk#貧2vq,3ׁEYe͖$4LIPYﺈ|c ? pʥRoล|pnN'M%ְE2k:E*uџ,V*j!o*ݎYO.W~nf7u$y,E܍\LQ)`l{ƒDP e2w.37zfDV]].3!N/,J5Ux[r;y|7\7x~`zGw}h`H{``W)ջYdC-lhUHoP#{ `[e'&Ǔ4H?2Q[7>T׍_?Qڙo]迟;h72M[_ԂuvTf{\PH\ϔ.[F_5626ZEڟ2| l"&'OЖ(y3FA C~(/yOLDV"ˁJ(7ٙr~%9I³E{ۻmo igH#>C&ix:vZ86I\gA{ϝ%t$t#Y)< f2@e'tc|x P~8|Y"21vx^@a\O•Vlq"9_w```5yk$k]@DVS#`V(>Lq Sr}E IF93a<p*A@\@^a.Kr!>$KQ$Zq , 셻le4uSDqt;R%m^Ǵw\'TŪ|"Z'Qx'7#/d+PX k=ym;p%OMǠ/ܾY*oq{  ^Vg@IU$sz[pwa-zk+ιq|8-^)(AR_"GK(k*:rT=/^YguzM:nX:Q~oL*ִ)1yW`r_h0ihL{5@mQ1$GtÃә0l*;2DamWfŜSXW67lR5~%N\V)S2(y`# |jyDZg/8Zi=7lʝEѭ-w0=F*fG r?L?GGCl8E(^Ɖ E0:wd0a 롣׋i+9ҷa1U=2뽗jW$ tٯFAiv˯k8B)j=Xn4HKWϚs?dwL{ڽ塵 6\whplz%Ƥ əʔ-62kI6'U];(5gQPrc"t|xv=zn#v8K>Ʉ8 xxr=G5i_rrZ,fTItnoF_XkN#31y??BQK- L$<|㴈u$-=_|"Ui[IˑB Tx<œJaUbԊ$e 1Of2ybd^5%õ%?ңb& m-g~V aƒ@ӯGl'um `*xQ94\/`#sSZkڰRɥdJ2g@Zv_Q+x)7ۦjvh6OmbRR+X)2n$B6_L ?#R}N(~|6HQ1fgȏ38n-ıGE$,9 6SP^b?>8Kr^)jK3j#V9659,*C+Ǝy)sKfu+R4g=XUOgZAI"]簵o`56ĥ $؋49d|k̰IXg$caR>.Q9:0k x~fmס \4vANIkj<}?V*(x}[` É}65>wȰ 0=ا5KA\qw#wu6|5$c YicT*pf82 y U!C9f8$ ubSj܆F}7Jd<]y# _}mO{uþS9zHUXK$#bl\NSGRRn>?P`C텊Hpy ,#6wo.Dԑ;L ^ %҈lo |`^̖XFУ??VPȒd] LhVA W7-^BEEfC Ӝg@υ(ܚFߠlAFJcﯽS3}Ϛ"ko[q93+tu>J8ϥsNUua~NcUȃ,3<C&t(&!z&F}J΁ GeSZG7Zけy|Xos%m~l w%e_Mo;A[4(gB;RCv9rQÙ \)ť}UmMOʇ[gM&,&Bсi\#2!bM}`V}Ĥm/oXR3c7cje!zo{{)ށ~ t$~Ah,/ا[S4lö| u_P8 XZ˺Bj|Miu9`>>q㽵B}XhQ+̭JSA(n&_ D˫bƉ<(qyҗ_fz}zx̊TLĔ 1bBk%ˢƚ٩q%r>ܬq8F1>q[>ᲺXBZŖpL[L5q, J31o`cS=W4{p'EZl@p;sw0˄dqW5wő;3YeyzM|ntX9H=d1N7R-_ e y h}HXiƍsD!|Jt\ fJ1:ۭ lڞ4lFRi%Wjqra1qbzܼ&K\YO`9^AaoDȢ*Q $^0v0* m)mĊnԎ{d#}@Bm)Na4inJu7•d;1j,k:ZP1Z#f1^S+ اàK *.w/ҸEcúl {e#qŠԛ.(N1s +Nˉlp[<+6()U0?]t4zk'tH/Yhs98hLuKߖ o ~9KԻPEWoV[B zC:?gz-TM6T"?"&&ӌ%/[撋C,0l>Ds&K8lkWr7A굌Vy9k:xcMH;|i׾N{UPAĻa ҄(kZXFέ>?ȉU)nY;t;}(~,mZm͢V'}c ?]6i*Q1|Ě0@%]WjD "ns$|hBF(;z\rbdRyY+IBv3iJz(ta,1#;(B$8v5n~m7wz"P#W/?NcB{m?+©`SjA WqQ[tTخebN>ӹi"G~-eGj0շCSӆAkXϖ2קmDz蕝Qn h`w/@; |Aړ~EjסJHZq~nJ)VC2A@wo?m 9O`jh& s; ɯ!(Fsq*+:p&XA-F nbf=sg`|uiW+Q{py:`R#eZMInGo 섗))ٳkgZNj>/ 8#[E;*43]/Y+9 ۨ l_39Oa6osO`u>U]Wg F"ǕZPVarT0U톇>8BG,8գN8zlb  N:6-]i_ՎɻAU/َEӓnGh8@m0laLq F"x"^Ei wHKa(\d+?ʇp5× _l3)c,N}w߰Z *BѵԀ*\ۮԹ{e@k8e a E^;tAe< eb+󙞘˓3C,sH ; [ks,}p#}SВ)RR`TP̐R{9ZJ/mlq@~}~&:'3ڠ1,LVLPb *nfЄo~x:RuNaFW\hUzesܠ}TAY$mJ%{RTI `8B^ N|| E_2K)0~m4axPJ-lC VpB[%Á~1I;cnuHV~\:=1ݳ0B!WܓļlO<<󺇼!_nI7= sc:WG#蕈D\ vY/ڻ.M+6KBDѭnE(; ?Ȼ8ԍYK&InUŭ N ~:?ЩE:l()g(tƆګsjD` >~Bs"`Sf׻wRG 9*E-2HywaznFk"`[2#4N$?eHCsֆ'=HhqYG!AC`vf9 ]Aq3[մLM; KTH{/0I:e96 g-m"b+J/$/獰=..P¥Uq#MtgC^k-+ܟF=ڼz/ooD T'}a 1^Suc (i[y D[B:oi2fFG=@0#3φ2]ǁ Nb/:CĤrKI@<:Wg.bt)%7'?e){)řsB,=fǪ@]3W,@PfK\ȝ܇Hf╩o3)\d )q/)hQ"ϸo]3}B]jY9#1ou\??/ z뚣$pryH?h>|Pq{3!ȗ9*FL<p[F<Y{;H;QHV9$]ƭJvUE(DK g:;=Wk- t^Q+_2ʥM湒4??eSc ˥2gq9&/|W—0õ*zvC向#wV=x##i[)zQE Udy\ցY0^a&P FjmFr_E B})':$j+krq0T*.UsOwgh|ژ?B˜(K"dӶu *HϚҘr=XeW heR i$>yk4o!l䛠z"~Iƪ/!FvW WT!>ԭ!PeHڎa,G1ݭ!׀1%.eAG&(᥉ Fn6 meOjѽ wk&~eGta"(g)ȘQ$xTؐ7ܤFÇsk}Mg ^Qrڇ`B Ĵ5+o3ԅ(пW*a$i}wp_q&DkwgE zKWj1ر6>eEB8t~,r? ((MpbX2 ޥoJKj L"#R4TR̳aT~&BxxGدÒ [yW*;0Z|ښ9ذ:ALbp|DusQAc6?vx0m][4{0kA^)8ZkLT֣xFAzqmoX"[U޻ tZD3.}w1IƯ"Iӿ[Q#S1'4ei77TX ϶[);'r_7%5=]i򲅱X}nw}ˮ4LXa²;xDTlhj fd(lp4_k/B>U̦:,%G 57;5䨹[h11 <'b)S(R4j< \),\4 S>ALg*a4(^'xTc@U3sKe1(APpV$ ^z'2O)X NC'j2)iB 5g[5*ԫ aCf]2~2r] ߳ JZ?V v>mb;EO@$ҩ H}S+|(6-kRDU7ʠ!ް֠ |bZ(CRcޱe *g\l"4t3mrǒ#NԿE%I^cVTuj2ԧ." ^V.P;ǭnxah a_:ul%U⨳7zpXƋdr)D>S($;{S Jdsy{țKpD Ȍ@"-mS[=$F ]LjQ7KVsx537pU`)eBȊ ]qf׍C=gTAMd-y%B 0|ҢeGAw-Y5ANS3o$9H+Iȋ4LxHTNRyEtחw SX=}ۇR*;U79rL0tS$ym@6r㗭,tN'-`aOha")Ic֍hohW%1ك9Rg;%"';0,yEst X_Чq'"!I:5N6sUbuccDIru%8\W?uv 9TumkO91{ A2WxsS%G eq7f <PyzC/1Sq~rW+& ʣ=;yҎϫuZMFQw_Jgc^?ʌ)v$7pS49޳{ex߈,}7ukGSm'mrܚxp!Ӻ)BGZ g%Dlxw "GضȕI9dhYhԥq9K185Hvὃ5Qޔ2x]zuPό%ک(xGAi2 Ji^_e_dyJa$&V+iX!c 'an{u`Ԛ6bXc@Tv<=.R*x罱wD6fzhӹ`@QNmg7 $mXmN-Ǝ x_25cÖ4v_ cƛI?zL uƾdHۊv,bp=hgNJZ&O9%R(wΣ)\`t Ǝ;3՗yMUU%z4xz'tpmxQ04"f CN,AzE]Է|,$c$ "[{ǁ^7a ~W,oD >fL] 1}sE7"U*MKY((tġQTduM<mu@;,@;8'F@*}>n}jͮɑZ:F$"i"]O9ZgNh\ HȣJ 0ms=]9+!é_oO>O{.ݿ)i0Dmo>A ێQ{_$(ﯴYhcdF*J%g-8 )ZxÍ@{ F(j۔`;@ E\46!wW8Y = WEh1Lv$EX6auCA\=$9?7>rG[wp=54z OV< OSpeU.B;PÔCkE5 T@ O nvNÄ>ivL62@v:RcZXw_R9:!Lӿ,JhE3UxA O=pX%EsEu0[1v~{Ϛ-'bnK˨迷hsB?vj- ч7ⷷ#NuVpm Z6"v nbɕQ_MVh kTѾb5WƨK8]%T(bpƓc٘-<5vPbi,KyBJ\7e+ވefaCJqxl?d4q՝@R%gq@o e}$߂{"B3*]5K$n|XyZ&*zlf6x>7aQ0q9we T?o?ř2\(Ӯ\> 7GTt 1DaRU1 |L,R_ a)_*?qG;cr:IpV@o@G&itk|JM߳C>T0 cFoư "Gܽ.G#>CgW?EM "_ /vrn zh,rL~]kIa܃YM+ J@/A ;Gd)?~<˃\(jײ2Xzdi5 P8*3܎!f`h!_OXмG#a<{M3#CP}I7 '8gdVu:|'lot:mn,|D[yuɌf ؟#ةcYb4p9 +di?U9bPάQ: u_6_ΕJf28@N>.fT۝l jf e.<9!4XV[qaiSQqz}V #7*۲ :J SeZ*fg/b el 9D.Wc?ꇗ,3^%tFl1 gӞAP$hȈx .Of]4esW-nCa3Vv#pxu2 dH^ְd"2ڥ-A-_IԉU>L ]fPs@oU Ye8ׇ #3h*)qЧ^COgk@v:__>KտB&<.UlC 8pį/M-|H/vndʹmobM&[Q% *>oZ/OZ; 5*ehܸ_u fVhS>7˽:?܄+/ @le$0u r+ɰU_rBr+T^}YkE@ UZ6zXŁEt!C穑p w_T5ƭ%khLףpǛX8["avLmb|4b'^QwqW_=њRB6R^zy#PILhQt[F9AJLlb\ dS# f‚Q~XnKS@/~'t”nir|h0ǜw|c!M3IvRPG(g.M%oD"NR (tԼ&ڍ~}9ʨC9u6VTn6Ke#GNd ~\U4YbNRQRC&>s^ڣHDy{mW$Q9-L(gX]Ab|Q4)^̶u:[zS68O;߸2cjDT!n<9_"-?W[͊ͥ0#.8&:.Ʀ k6FոFM~u6ƨ;ʟ5GW`}9E 8yi l3n~%HV[dM|\0ipY/e,T7Gcź=[r7#kfd~[Q!4h>˲.o7q.|摕BsUm 8UFG6ɶ 9~ $,\@Eli+Sf=r%эr18w^3<-9Bo a6 ؋h2ZN F8-FKg\oJeWU7d!=W H\7꡹@+B.Ê2Yf,9+qݖ9"~>CQͺr%-9Ʈ~V4ٱˆԄY=_!iEk<5Ȗ)>aß#u{#WQ922٬؎l\g.o#$d\}i.'ӏ8\9]1hRvkc>c$W*QlܺeCIpsiX'7BDmZKq҄E0E_M{xݸ{|ˬa4Tg $̛DQHUBߎVT3;Ҫ Ԭ$2=e6w:+[1jރaҧGeu Q65 ܖ7NxG$K%dgv}'AHڍr wbz,i@Bg4>pl0OB%:*؇~C8ITcUc1>_Kbak]4_]M>[ndjP3^,w,QխVsX>z߉{5fn "^~f*Ԡvq/nJdXZZ.|}+ BPУ%똨6+WEDGϕs]oJofn v$nt<:Exx i1kLXMw(\e7 i勎-ߣ/$R-yufێ1!OgtlIW;u~K!FE3pNw|?x@cmV֛`OP tAQ`1C%>A4dkƵ~Ay"W _nqEzڀdlLPC8 /8?kbq 1k+@ jAE(K N YGTI[KF 3Ds->\˴)V՞/Dɒ>]65if=|5d5?1T|JLqfU])YJ%l ceZE)aoyeD3*fx}[4f!s{\J^dn#>EwB/k~;B)歵/mg7r=2Mp u87ؿԓ+tW`Ъ?XwZ[{DžE9TY[c2$Oօ |@@vh:Y׽S'1j,A84üޔxO(L a@DӅ| 9tq 6gq7@n>B[=j,0GT/:}v:IĻJ2 +>+u*Au's=>Xi槠3|4:ͺ g!3..gt\Jq)u7>,I(/Bѧ9)x${ 7e<T}|8؝v4H2,%`ݡ} 1 rXf!1Ȫ]yHKWR'"Zg63s?=1{e}c ES5$lTHPP@\^(«\aVsf$јX"Ɍ\o~յKX,+bY>JRo&8Ə5`/Qd+}fE{zuԋ`]t*5ԥh|,KV8zQxS>~ʱUE/EOE‘SRȑ05 T ;$U~YɛD){1]U_Bޑ1%@l);oStPPzcm}`e)s?=Ћތqz~;VZ 4Z-9qTBo1!5ycֻYbwN>Gʗgr'$7eYX [uP~KgF!9169*Dh7>M1NyjQYIԎ} aD, + x{Ի4X|1*d\5iwg(Dh2`JI7Tߑ/13i$Ot4YX;%ZʬSoq]@%xAU&ɈFܯvP)˾cטs7'g90 )ь7Ak@3*bEk)Xݬ/U7>gDoGkJ x/<=4 Pw ;&;{֘b _-~W㩺 xKrCuv?3hǩߡ)qDA$lO/LNQu +m6%ꉴWztM cu@ٺ .ioYpmtX`ҷ?VjfgOx~BTh|r4rð!| 4-a+ד^I$}!Fx /\=4#~J%mѯ.$l*YPGJ n:׭҄r YE?y>&Le5x=̕ Z|,*}dvǼ*ybgyV%\<) +<ᬫ2'㯔]źlNP""tU $c RԘMxةe:  {9]_O'Ԏsc} l.w[6i1ڬYxꨢvb2yM - kj1\(G`IW졵3dTaPѠgc@v٣MlwB&Q-?:ed?34Oќub/,#)URz"V S![8x|#$iRɏEP~ˆFXהJJnt:,]P9elv%2M$"v<cUprKJ=]MN4uO2\>W;68muC9?2Pd qzcy.餤ӜAO _=QGFˡߋOGߢ?9llӵw'%T 9L_JV$ (AWdFN24 ITM>[nLJN3S%k;2$HLt.EOOL睴Sg vmyspW$|B0".}j@چ{H" $e/脎yGn-`kCoP,Ml0c>Aiԏ>~6,":+~\9ꧨLSR 3;1#rEX+uy[u#$\nzUEV?p\cﳶZo`iEn895G{}7csx{T}řD^3 M"~c-<\ @Yȧ WFO9ZSJ .x /+I5 Rߊ.XucxԿo#$8MUtlDB.̠'uKm GҫTqf3ų̏y/C9%D&-%ح 7MQW0Zf=w#ߙĎs@ٛ9?FO&BP2Q(^T#%=")wDhbkՀ X`t(V?c3^#C =p=IEWi`8Q<„|ȏ"e"$ b.!v+aLٯ$E Zf~ib Q:U[r`Tvy djx,`kq#y-/"IOK!& yYm",J5AA Zɶ,U2Li+)G1^݇8 OJrbBdaJhidaaVB>vvDcH=+JNhvK^7oH;D-48 8EB@E8T偿!g{cUnACG>\/EŒFmpO :!69KFЋ44EJ_-Ncfssn+.]5%6 $q=.%D`zwέ\U aH{|#ך`Vy2T:2څOoJtpEj@.G&=<_K%wb ZWd[S~ EТԭ^Ϣ.1k8eT)X3ə]Ȟ6 ZIhoNpmKر+(n:|@Jg"TNFsyRFc <3^3Nk05P>~z|.h tʶ]Bު XphG4!9dT'8%֕hb NfwP\GIC_wnj{2.^RD~Bqй+5Өb<+n<88& Ug7{_@dE@^1)}by|u4 Dm ?_ZR~1/aXx= rFb@m'ϊ0/>ǃgBHAw[82Ý!:]LA9uιbzSG["1\DK3xaG?q}t[T: P[4VNcV#ꁮhg!Nfˬ(VX>_d{›: D//q2uի..hE`Q[A%ݾs{&r ӢN$<a-?  ݊հb쑜6 Aэo_+ 1!ߢ`ʰÈh) (@Ǘx\>y/!C.p#^}g%l%7ti]P>*O\veu{!Qu2`gSLUYe @jGMbV7Un4EJ‚&r $ HMZ ܹcа BOpٕ޼~8#nӠ]qj=2Yv̲~G;=>j%t1{s Dt=bv?h@\w Zv{bSM~DK(H@).af^67ϋ@*=Uj*j4 &$qix6oE3}*Q HµQ}>L B2#P *<%dQ <߻UJb+:\XVG->^8#)iיwG3Oj mg1gU&DtyyDEnAinHw{A=c!l:Jy@(>+68"LVU/Ϟߓd| Vj~LœE;';NzJ; #!?Y3Q0iװKT<= `E[fUr+x/,ELh&[723W#^E ]c3 :a\zhkq #S}S>RX%2uխeUMڦ@^^(+ r:45a J"vͽ?^&ڱ'Q[`1uġ]㽸z9W[> D83/sl_`g4Z{z JCKPY+ "So+!Ee]?(FucrJ?yS|͕4rV&?X4%Fr=*IivtL6L*(/bVL0 ȝ[?A͊3gɢd\kUgEl:(&tZ SM3GCm)/&vJ5W?)VcO$b,ruP\Lp<[ĝvUd2I= V Yu'?p*vebrY؀ԭZrclqW̶{p0`nxt֥P>:as Hal䣥h"6TݓYqtk7  sWIӽs L|`\{݆p@COg"`fka\5޳D#$yTf*oƮv޾NF ; Nv!RLwIs҂7il{n > |.IP$ü J^9m瑂@"#La!o)QXtYn%k^(lodDX]8(}Wgļߜ%UUʷs#dt2ICZdȈkJHwܾžSb za`~ Kpؑ|J^1t@P5UF f閹rw4rHɩtm]LW_|}j&VaY2EJǸD Z#؃8.7|D7}KgJьu:} d9w3Un꘎2%e"ר;9UD{t~c' ,Uwobpn+J-T*>E=ֳfJlP].7Dقupe,FvqN1n$ansr7;'(G4|_ۀHBo8 :Bah4RC]A 3H#ŦzM5H}JSF<G R2xJY/i%4z}'ϑuZSVdvPvφU`L| lxhv`fR <ZqT^AHBW+8;϶K#U$ ,ϭT3so#G~.ǘhbgeH7D;5ntOתn |Wd6wxǹ|kRFsGlJ)18UFE9Jgѩ Ub5YS4yLj̽TPbb҈{:HXxX;.)eն/,|#VJҾ^R0qԐai3%u=GɧE&* *;~oa [*x}7 ps'8q6Q؀c9vEV,ړ }(@|^Feddp=[-,yߐe$ط'B:Рx0Ҥaϩ-U- zn7$u߼ξJ⤜y^8fUݾ@q|m43}Qn >AJc ~tS(3 YvTjݵ yxÏ)fR$(;J'/8-Y=F^'\*cHNkh}lz`YxTbPP{ "#tTA"St (UUi!erM`+עEP0r@ W#{37 ²6)),^\p{=p5N@{d>:q`A"_9х81oRmRc*TagkBd=N6*+Ð.50a5 qy>0Ҩ 6굏Q|AѬ;}%Nͺc0'IfQҩ[ k/vC9͌\l/kŭcOOw(.ʷxAtx')ARx.ԓEPࣖtٌM8_j,6! _I7 vע24zΒe:~k2S˄WƦ7X6_Gܾl_*VdwDiF4d`&xmSs`ѯtAb!'0 㚁Bg,hNVj5 LXgUr,wӁ;6Zzd3u:pl3*wJ a:j ۧeS$jPT`t`!Q?D'Zk Q&"})DLP6jwnC(Z? w@v{oү(?ff*ַPCb}q_mD%X5F;}QK/̽xE jQ,0sJd<.sjԃT;z&NP6w9 AN%3}})1m'>,ۯUk8Bq۶ΚT-5N{?P[kYeo j1=eva)Γ3- am*QE^A#rY>i|G dAkzLSym{&FX{̇o(|9V]FBseNbǦm7 u1ML$!j̝6'/ɱ4c 'VJ6hexyܙ3S xu:iei9'F"=w2E *k|ʲtu ńjs\2hۦ^FNEAJ:i7k`Eɼ{hDEvA"N6&-,W*C`zr h9b#[d$&[xSyRqEGRZ%2,^b~M&YX4^ȳ;D߯bȲ nW][|g (k <u&y*VtXEOy]q*2 >&®;V|s:x#S( Yb0jJ|$p(Vϊm4[ߡ˵=G[1V7Gxܝ}l-0z)"{ܗSL!UW"K}^d@C*y4wcT/orԛ61}qUO~@2nZMA0ШR|FjAhP9[]M;޶:gtzӋtbILhvG}HQm,ٲVPSe}awi2qoTt5+KUJzO4)s_ȓf˄}Ȝλ|i'n$) 4E5=>)nwd \ @  BH^w @)=VL0?3az mzg3~01Cy妒uI :ۚj|8<"d8/kOX,DN[3/.ʗ[-5H|J+WIgˬ:xDMuB'ݽ?:ۥc~T/LD" ]`he@'{- J߷* |#س $w0%ſ_H ,L=Y/4Q_6p-`uyk&NGk1k~q=ԝ\δH$RLc9<-S7'beOW 8ܐ0E÷IS~ ecSwJ;sHqwp51/+JHD þNqAJ)Z ^|&-!`9B_0dAeY 9BU?Ng(.#Vi ǎ򴐸ض80<\t\E'ˏfs9~^ފMΗ}oVX'p- <͊!i$1 6kq=4teY-N3?LcIC~0Og"fp \uȔ7?wM:q"=i)r*nyjƷ'q'<dDے_RSch~bmЎ}z/WUl Y-6rgn'C==ռ2D8H; fh& yUc@5891|Ec9؋J%;J1ţ9>daEBk3rJC:%cM8y43ζ@nJbVQ㔜;ԮǍ1-XJLISnYuCtlGvj*ʎOܐr"Ic?t{g*`,CzVqz;a!_TSfWyA:Q*BU8Jɷ; a['[KHWNx7n%6@gPn>a!'vxwegJ׶@!4yLU3QC¾`cd? XQ)goDR%ey ɾ~N'j z.(ªWeO 1ܩb1tGv`Ü9&歛& YNX`ݶNENCR}YZm#뛴NV'7mѧί)gkEHЍbUGֻ;6Ģ@ @vwG1ciu7٭]+̌`?邦C+C0C(Iӿ6't^gƱN7l! ?ߖǕS(ߞRD^tR?'UH"6T %zw,)}%sXk^,w?7l!UKH>~O!k4SGc†t-JI|zrZcFCwh`/trNM8 Bb7~hf! yMTچd'܊AE ¥yu95:p`~ r* ":L3 Q͊݅AC6ͺYR0JkX<ط8b]9"wj 0{|5 iW=QuprY^bx@ӱ (.h׽GeLgݙ\쾲p,WL?΃L77h l8Ym3HG)"RrfY-M4.!0Qʍ4?7l:kNUixZ@AL7LIO0]M-(9>Qʆu֍s._yEmSLuP/c̍sϏo9/* v'QB.i8o Fn9%ƜՁTO0o~؜.&oɌLT ۤRU F0bNM| gcǑr+Xz^"-b29.FQ">')n?ٸ~fjMY}n? cqݮZ$V:d{a2fZAw/9t Q?0Lxvsq"ᕑE&Iܬ4/%ܹ29ghJX.%+!ݕb2 dΝ6˄=:mԵr*JdD¬y#<luz}>̠Ub'iܝzЫFu#/< Wy)΋#@?#_8CkI(QxI!nɜðX /8mS\Ug„jy )u6E( i?ˤbiު/^@DM0ǚv'ԁ=^/ !BC//Wm_l3,z:[ok=nQ fl0qDQD$!Wa>R<-8 FC8g6ur_Rv'zQU:K7ll1n(D>-&zٕ4_$_<4:@{*o[报(i^Vؑg?^\ۥx ˀ!?w6;VHd&=K*뀐an!)\t5b#GTƮ;%J C.Ģm#[H8OP zLaMW g6 b6YO%%yiB{@+7(8fy͙$}T_g,M9a.Q/pcn-֨|B?2&T'O&kzÆ Wx@<7~-C&Q}:ߟKj`|U##*AxQٸQR#O\>j>2;F`p;"3K*퐫YG,׌L/l6(ψStCԎ!Ez^NnyF'E 7wѤp]{h\9|ʦy=M)ے3<+if_at]fDi:m{Nmz,Fu ~-/uG'aǙ"8:iAQ}Qi:C,^+cc:Ql\}򒰂&RFؖ;*o޵d9+Wc `d!wZQۆ !~wB_BOټ?s-Qb y+[LC!/'uÐʽCX4bm9^i z}\VwYc- : ]6`kG>i(9Ijۤ7 <2{ \Ş4a),@V0KIb%{bkt_GgDп&ONuuy{i#.zZT#']ܟf81`>r:w<geugaKc-Δ}?M/ ցbErv ll^3NT1OSj5>kb)nOX"P@l 't~f+74 syǀ@לUgՎ|3!i,0|?A82TګeF$w%J  7'ULpNj>#0p?^696A0j[y"]'}%tDsS$~6 R:}*g>̉&*|AoػiH=fSԞpv<2]oE[R"@QCuy^\/eв} :Fl`ۑ(Diw}ѻU꥾|=?=SROu Q3NIs9! 5x+rhT}|ĨXxILt2GP{|&XE y-u?cyb{I,`O;;N2?/ZiKNrEoOXHn/!͵^/4jh3)XC+.ԏLU;>;zp2<^qtLsPNJB¡\h,I,_2^h_/ MH)zkzŶ" JGܤqi~L'}ұX}Ӆ4C Cǭ3nLQC`{("3Q O+o!~i+A6(βkWMf0nX1_Ϫ*n|f#u u n4R9_?lh-G|R rt@RG X*USN'9LOUtz yzG%2î( (}դ<2Z!Ygi="ܬ/,3VNAPuȪ 8F1u| h`2p7K A'1޷a2zԜy=OJ 3b <L5tw˔*v9wrytTK}%ԗJ {uVvO~υ_rz1p<1\_3;mvrCU޾!3,;P&/ 8Zh,n;G'R x+%$)pv;dc]9XI y'+5hbWm" svPVi8{gKTA5y*WQ8wNLC8GaA,lg05$`_5) ׹ :Hd*`~:׌uUe]AW+ a<'-$xo=iagVzD&'6κC] 2ihy+|A㈬ciE%༮v)\D=rXµ2tlG%-{(4}J麆BJ4|su;l!2+U9Q,IoTRKt1REmAB9r̓D֗4,fmfѦ1PYzvY]X]oK 2^;zSH18 \CNW|$^O +eKY]yiD-AVKy^ɗo~Kt <%o# a2Tl;ɨ>Zia3 6PZWXv."X)MX8sFN܂ʶpG  ^2w 6%HP[̙"uAՈdߕH ?7Ǥxn#88S\=VrFLyF.z{V %>a`$#RW(Gl̨`Azdr6}hPjG}X}+YSY [EE}意o>M<^ZXn4W#u]\I\f=:!wC'/q/硾3r|Ji4W{"W`*Tvi}wT.M'uy丬,#|ƕL7ʡ,5/%H VūU+}W,ek`gV7$o2kʶC-BE4k䣆o\dH> Yׂ n5VB{1&XFKi<$ȋ%L h˵. .VLqyc1c}QG:JGҧS}!xnǹM ܴY2,7?z֠2cSΰ?闽W/zX9zo2_ /HIQY7{@^k,7Ki~E,i͎/*4Xf=PD9qd'1Pٖj&ފ[EpV?|YQHRTاX_9(CPǖs[kuV-6ħysM`r)"g< :~b[K[CYLl%wDBg/k޶SĂɑYR,*쩣xC>HRAaA Di4NI JAk x t.SLZڋqpUI 3{ |nXX8GQCnއJk3 wjYڰ廤|,"*6$FbC1CݘvXLQ0 TK`7*T6?t+hl cpz6"#+ޡ кSּ#n4gb@Yq#9N [I?ǀu Aɦ5T+$P\IQpfaZս}56PnҢ}-6}Zu (EC8Zc4))&dIτ D}1Hfe[,ƬsZ^]!w"|Ͷ9(~Ib|*@O 2{U*؁Mi`O(iYo iۙKd]BbeXȤBE+ߍƓ5bi]ȝK@6֟|ˈ/2u$-F 4]bB~G}e? EeqCRz Pf4 _8e]6(n\eֿ񰵡-9.>&T~Q &yV Rb"`-']BP1 kV`` Lcn2{'R9 (teX*`I KjTCJ|O񿄫OP` KNM\Z #8bAA eE w M k}[yўnk qЅ(1JNhkIBq5 )~pymځ P^1eoD h$lI镼K_\e\9;@Z_ݾuM{ 5Se.@~4ǻ;> tu!(8zє.^ ƳOUh1HexTHzg^SݓZ304t!3&<Ύ?9=$69`Xj JC6(f 5ᱚe ,#y* As3mK[{_P-xQ~~ǼSpp;aAlkGq7]maQXS~>`jK^?L Whvo?lͧ!KTZb,$5T&0yM1cV+D2[d}K"G-)n^ PIژf2J\FNӫuo=?;\̐C"8O*rf`_4{Y&pz:P"+&{ d+|~FTqSVޱA0DͫV<Z}MX7UC &4J)-(pe%ey yQ $0TЙc7r DZy7k>q=$_&g!.'>ʠQ*2q_Wv a'K4o`"h\Q3iΡpoUtUD,GjΠt?4Yrn sC4LQA P%|Pd#~TgWhD3h>aܳM'"il:KP,~Dy@+aDa.?0P3 L9BX䑭76v0ya0֓ÄBS7yibXhYu7X/(?^{\) ^dQe3@}0$F͙͓4[hxs&`h4ԚuøƁyVVtYNg7چ MC˞HvS+w@i>ȼR^5!U@-Y4AyP΃tPoggJZ)e"88 ,HT'wtYӕ Jɷ=QOG ,}fpZD.ٸo8ޘy4د ?sql+5M4럍IPo`23)=F!@v4J` b)xwU3!x r_n|VU:,]Y7`[|UkI{S (E3-,ϩ\Z0p|O7+ !e Y _f,:!~ ֘4q1 '&0l[~vdy?+_8e97jHzSm fОձ Wb3&wM. j7?c:K_2+]51p膒&[=Zs)toJtwDoFZcM~ K+4!M<||*ʩL= p~|@H -CFPIć6:z™8̞k§dzU-da)3:N@ ~4{>7ķ.(XUڤ;r5&K z΃ckI$ zhΐl3 C|-Kۃ'ȼ>\6ڞzW7,åNps,u5n2Tю9DN$ !s#hjmĿ04x=f?'i1syRq㎡ZX=M& HLhrG]o :[ εAөa*ᥗZ{=Y6KO$%ɓΗijґt~2%B+dty YB21& 4+5[~u?&',OZE#TIwOϦxShr8Ly zU~ [{u|r>Y^]t</QFW^% YrLK΍*'GXR>x-ɝzQ%1c~kYlK?xя ,2b8ƒ4j{&6tf#NpNC?az +z\Xχ0oC^2PKvQac2|P^]Ǫ!v0[`W|gQۏ9,ˈDND~t:l’v6DS}/'q-)>|U9IGғr#<Td3r0d:+R{╻ % N7_hԺ # >w yb ŷ 6S#~|t1!\*܃{/ӱSAOZ)?jlO5Fi,G4/bc͔]9]jӨ|Msm&};0CTŗm0K_g&"w9~Ja,ɼ#{]~BU$+if^מ˃ Y)FݠB:U;Ї.J֮!Q0n^ȶ%y&fMtc3 |L_+g~Yj =f[pM z C|R|] \Fu0@ݛbra-WEwO"Z垵c8$kPFS*mॶP"0ޠ]',P#˱NDMOHLyaBDI4xAv (&֪&_ Qi935]ioWwY!l4aIw!q\}y}‚?UޮbJZgSəmXE% 'yEs {gKMi@us~[īfP7;q9*INъ痫FMPH<ß%6'MPlx=chbahJsm_ѡ*"_)=bTr#_SA4C/SqAZnZL t8ehÕFoVwŴ;P_\m_5&_PnE`*P+BlT?ZkNmI";ldB+օ#U*K+O_ܼq<:}Yњ1&0c`n\o$<ЙV{|hiqY5!{<aFH1edaX9 YІ(͹*= q@* .ck[!g5o`8!_A}yFyy2Vyy/ )K (y  Gi }2 ]7fHX'RN:<ބ9٣O- 4';KU0HUWץe5ScF35F*0T/kfm!O{o_C\εdg.(YQC=5Dz.k%//d#-6gIpbyV9ݣ6 is$&jҕi`;"4XJ xBbYC/2F>v{+^WEǸ0H`Ɓdy:a[A6v 'PtEC:8`SL3i}gBl;{TqqΕ+U|J?!ibdGA'272TT#؟憡o1kM4#3I1j̋[RW'~:rreWkeI2CqmƉ:nBڲ޴7^#=֚e07P+A"?9nyg8!p+WвlǜGD>I>c=^2Hy-B|7#Lrʯwfx'dmo4bRS|í!. ,tؐ84G,E`:@s%_$-sUʟkTPn[O*{EN{ M[v~1l.QI=㑂W옃#[_5r-la7B%-7 ? <u?.Χ2zH,2t'lJeBȑr$m z6&SmrXFPq3lfJ⥔cN?),E,mlkV5ORH!v!^],bplVQ=^r1/9(Zz㼔~VJt-ϙ:+3efFrߝFr_~$+zb+u{`:n-+˽b>pF4\ 41,H险N{4{K(qHZ-~w= j׋9DZsLg SOm B6ȼ\0@6u\#|ΣY,!U6‘sA y̿74 &unnK= [hj18}}$rayRdclp`GH43k&?DIu^t 1wXE\,e-M8" rRuG?~ݔ@IӼk[)ƣVg}w;0>DkUt:i =.R(Yehjr7N: ;/_="Nti%pt1͆"6.F%QD7 E:'Xq[Cɗ ;QPQʝ285׼zU.m30d桖{DŽ;?y3jI܆Yh T Ti&c+QւC^Jz7*\ Ue3FDb!B7*J_a@ ٜ=>~`B YZ J²vNQH\fz3Oxm}ܷlYV)6 $XsAwم8S |/w'h{sF6l7ШT{2zB2T,E6`Te隦9n9j_Ԡ0!N7cMJʞ\*ۥnW'O.bZO^+s!f7 &[MWrs(t֧^,rbGP> NѬ T}ss=R4.{Ж2,ZX@A,[nk-M*jkhBQ8)ނ\7pXs G(j 64WPf 0*.[:2JBha4A'Ɩ{#{K{ `nw9mfiMW@^ Ey s.LWɈhj; 9H^H}ײSh`(ˠ-kJiv(EI`3h#zbdjꆋxc8vl pߑh}d,y,NXxmȍo取 C:!eMR%8{ ?kf1K/prV)%>V')ǔ}7dGRV$pAAHr ᑆl{V6pwjp29j,&ěYひmzKݗ? O쨎 $b2gνG\["//ݐ`clX>J/2򳮃L܊;gil7woavSP۴z\^QM:s3*T;"W˕ 'q,N1Oҵ h̐hX._EMwsNWqR+BY`O|fڢU\P{R!.tg7^ZCS[ I?!p8 EpsŨ B|W~GOUSՓSu&1 Dz4Rm$.}D2C#q5-]v? q}bD/iA^4IOH8Dl#7(\nx!bf'3ߙX-)vcNǰ">vKfJ)RGeun<Crtv_vv_ g%X|Sm\ KXQJvd)hjW`C£/xJUb?KNce"0ˋWbi`<Ʌ(:@- c W5K{*O@1y89Ȓ>1-ߋciQ{ T0-gKc*s.~Ւ=ٌE'h%ҽQmPO,zaO|Ad"~s'YaMf &쯸PB~ugX9N#F\肣#Lgh=`{R3+&7]iԮd}LU60.JB l| ȭ[ YuhiZ' ]]8 b O'A p}S`IOa'G 6&9̳tW׳@^!1+X^Izk܋0 uJz,0ǽatb)_il htF&XUF͊ǥkIN2/mKZj }g \OuB2{TOz-Wͻ/_ʒ\ w/&) uF}x#X)A9>!\5% ]q ,^BNCKk^JrTp~!JV?b33-sj H#@ :j  1hԟ3р5D Wz`5;L c;AtlRT, 8Lm?Jj̫'6,ZR0ip0谐P]qV_IuCk:pN1/-JCH& MiYAQ5UHVMy"le5Xwsl촤2.%ՈP<[T *9!Aa*m*ti^#`hwz4TMC]Їd2*%͒^E2q=n; e*LsIW!I%TŐ<|Z~]](hֲ (FrBDvA|?= {\A"ɥBhby$6X+iL:|[JovXToJƉtYC){,h:ܥ!GG`:)Btָ-3r ǨT[&M;zrdXGh,)Jgݬ`uda;ssquPw!Aƶd^˘($-WyO4 }<7a@bY*%ugP-OZY󓆑"ˋ|o)s~E $<2Mf!U>d ߝB{Ly/9mT;rh:^ ҍ?_k9~ 䔎)6&9Oؑ-: k+1 Lju=R? E*DN HWSV<#t\D b7~~_p^bǬAȱTXxSV><رmAP}m*J'ω{.`Qi׀C=H6{f3wWti6} Ke;7y }THNˊ> ~}n֊YW)#ΕlXPyQmoxBO[{xmsTxL7x+R8ʖy'\##OǎgZ i}_7!HJ8֯jEjU!B>a7C9ٔzM)v4g %FIp.RKSU_:C52O`VݍMCpJxu! CDaժِW [TST !͜nv*$7ļG:U+d{q)7,m Y\=Hю6Ւxe Jr99g%),Rlfg?9 ;Kt%=W1xG,Ưc5>D%2U-*}gܚ\bmh`4LڇJ߼$TY}yyЏ HNW^m؟[9q6Ţ} L06?wɇu&`w)+?]ʫX.HN NN<ىw0@wz|4S]E{Yp|*W)@}qH~KڵQ ؂]}ҁ?B$ȲYֳ>$m lg?RY~pڅ(I5ݭ.tOz/<0D" Rta-r~Ս2ni6+cFJc;kDO'ćt֧RX\!ޜZA_\ǍMK2Cܺ)e^_3uo=މ ]$i.넷VCLd;,r%cj!r})mS#dЯ)|#}y;(`{iK.|/'qjvhE[gM?;P^ CwwL|UR{NU&^2 y Ps.*ֵll[JZ+iE}(j6n c:ϥ)/%bpl?!9S6Ӗב!mfi4O>4ܸܷ6rw>ϵGg14#h%̛^Qŵsˑ }Td͛[i[vtw% E YtlwQ P(%v֥sޟ`GXsqqՍPە#@^<<#D$R[5xC!gl'}]9{F@C7Q2j>¹/ ?w;`^)aƤɯ_1MRxmN8Ȥv1R K{):T҇ E7ܒ{}G`=nY+`q1p8O Z@#8]' wn vt<+,$?||XE5;5f.Xdž`~3oCP\~h!LRЎsɊ/. S6~*-6ENt[Ġ#/j1Jx%*0X&L}-j^d(5/l0/ E~])xӃSnP{igh/A$UjIN,B37(`·& {,2 ~տK']?}E"ZGuMJ@2v*4hBdBgog\)#)T2d8-#H*Ewtwĝ:Ī()eSG ǃÈ0ˉ u齯ɱ?,9YqߨWg0THevEnvӌ ,_4ア?82=kN08 jE&(6?RJ@Q2/.g[2vDdaRn@%T#\,Q\x@rQtͺSaCG("hEx}"}8 ;J ޱ77bYx؊/z',m~#[E \oK%J=D f["s>5, xWfF2dXc{/=Kmŏh͞:e`nm)?Idd#J^1 55A%=:Rd&T "K%hr8",Ito*Si>R*=!a}O_ jraR@:WS~."\w>}_(/-.;>>4mb;0ve~gL@0ضN|([V5X1~[K20Sb>Zs69{)2?p:x"c kpNY> i˟o{^53$u CJq"䝐CMHiPWkv@4 Y$$1kJo*mBR$2>+6]H9Uh*=bfʾACT˥$BrSOeu".<@~ߒW-4 y,>rI=qDVg|ngʳģ)AsMS HYd1"cHy,%-83O56'<ȏ `$=;qs e ƕS[$z!p\4X|ӈYؑ8e6\m .%ar )vWS7*dgUne9gH_uơZy΀ı9!j|@уHu]Z J^ҧ0n{ro?qPv RIՌ9ulѦ5/?ZgDxrHloVKTg&L d.HA:U ۸ic_&i~Td? iTW"n<ݻ6A/W s?XP!lxݨ]gabpSWd/QRd)"}7Sjl b: K5n7cm}m|0iCI(̒Qƃ]Uyj! AQP/AZM."kRxF%b>K(n de7*6V5jg)?֪~dO v]$4)W.^Cf{3'FBuiׄ ¸how4iR>CefB?{9Y5 ,Cn!}?9YZ<|!,91tf:z}:SvNv/\iz _A46.7` 9f"T#֊v!nKnw61bSxndYٚ҈݅${$d lq`GL=,#9hi?UA"oP+]Í6  %F gf% @k _#[_HpVVO K=s`;# N1r_#{ +[]^폄U~%exgb9ϓEhrQfVe < sEX(J`-S:ތc̤La)NDb#cnڿ&޿IiKV+&RPtĔv% +>m\&L=~?| }9G`ƻJŦͲao L퐨*YV2/M|%(q QY&הgP_)AAXBٳ{޸f+enBpf ZyiܣF{Th$7Ρ??s,oV uiؤ=  Kg:nƜi٤!ZofSuqMx`"ZJ]M7Ϗ"(k Cȁ#3~n-@>I>С O,*9|^C_]mkcp@]F{riBU JBk3=(:hP3C+ܛߣC59CzfM#u9(^6JbKl~(KDyJ0> eڭˆ@;& ӡn:gtݣ^,T%+TX7aK㥢op ;rۙwj?mHOkB)ĥ:j܊iW[=ֲa\[Ky~[V<X4捎.pGFLN5:A6}LRTl$\DJzXr 9tBO~[;ŶvvĐ>v u`ԏz5JXZNF0w'.{*<7a|:>$MeS[udU<\*5HMj7VڄзVm* Bpy0ltѱv w>9P j'c!!!AX9{Za,~SN /|P9>jW8,ZtNMGL`iBn&dLnMSDrЧciUB'ݕsmZ`AZּۘFqcm~$뀁|d3_;\f}PgIw- /?rqPxŒ\0Y5K?|) G:ftZx&tUs5~lίin /"uXZ\=~Zݐ~Ͱzeٛ<+]76džg-[/W}Xn"^+(=iV-|߂hUh㝡Cؠ%) gJ2`Q HnmȺ̜F8ģS"4)Nj P|$]< $F|`aJ\+dAӭ)^#(j`G* lI_ i5 6)OT&P^mcwe}$niO5.h U[ z@#Ԫ#UVr[!; y!: Pߋ s1m,!S-<75Hs=4B!ڑvWh#R 0s $H;9Iv*pAmN EHbbᕵ %@B n&mq"Oorʼn()}{xS)xl;)2]7LyF a<22ҥG4i,ʎD򓟹KLFSh0|m5|>6ƴw~rq=YsGg;?V5j%ࢱǩl"D:mXzv~*Av^HZAg~:QaY7 PdZ8+M׀Dy`) R/{ъ/i [r1s,~t {4eѿe4h2F @_qzWܲ-)OW@+Րڈha9KBxC.<κrgЃhͺEl!v$tMbiFѼB3[1{5T GD=3)@5 eTY*L'S'B Us44a_pꀴbgJPLsXoy6W" 2t)=٣&{hyk.,q+9S#QLae0PZjKTQa™g{XCcmۻCjgBVB ^ݡ@lṂ/SqR2_>V({wt#jZ+U |s-U-z'x wa-# s dJ:H1x}Dop) e ޤ?h;b}3O ;ߚJz7_ͼ5(8d0k(1pbU=="ucOWiU%wȆWyb?A|T0\0d ƵaDYd2ڀ*֑`\1_[Ȧh{E"rNj)]٧s NqHc--ۡaKS5i z:'l%>c1LJ qbvI+&~ozQ†T~! &U{/cF/ Gr%w IPdĖ.7V&phw,sJQш}JxS:Oa㙕$ynr_x[`oE-ar<7EV0*1g疧( }2!pKcSHv຤@,S%{A B&;Dy*V4 K Uiyֵl&ңzQpgM 'g'tM~E{cS`4PL X]l'&PFyle}mg28(L1O9ٍ2J'6Ne"^sUH0櫃ΧVرK} M]bS~M7"DW" !4 Q-6n[Е\,5ƘlDV$!L9x 㞿Z3y^1BPګr.GVDC +rڃ`T=O Uhm|q'X$Cʙ4$.X/R6 `0TfB逛Fw,ɃkA,6ux#1D@LAxW"> ZDzâD)]|`FSf?FgXF7WʍSaɗ%5R#|nD{4Bg6>C:5R+uśqqNkXY!!7)Q60p:f &0n|5D*P#jKn%Jg41Ѧtpt 9[( 嶀\;|4BP_'0y BFhYKǺw(H!;'ܧCa^xS*ίd%b Z(!5-0K XVy;f>苣Dٟ#vW 䕃M8?Y B#8:{35}? 㻲i[\GǽTߟ4?y/H ƒ+U969hcA}F"04ccmuBVjk;՚Z1V&8?LևiVТ;0 N.;Oml,BE^0"8F 0dp:W`#ʂjRf<֌SĩIE @rmFKAHޟc <6me[ M2+q}>΁C[K"K3iu_Pil0m`=ޢƗBބcN wUBFi=6}13i u>2~P DDkIiS&)3_4KQ !Vb?fu%}e~{ZU7x56ſ^l}Psm$[o肀~>7#OL}m<&$$ @9]L+A{02Cm5 rRjr"g6NUVRτD]52V6!Ǥ4 J8<؟rMpA {sƎwn%d~&Y?>";#\Y[]&T Z ƂNN,fSdEDbm.b)F ')F~fG[vd@*񎟔-+)%=3̄}&_sGzE` 3ld0Z:Ff45j Z^]SyD0oPAdS…(H*5=VdML(v3K2,ak]-L P"c0OEYL\ j#@H7;HL7̓BJ_$:0 qrN $ĠIU1m@4*Qu@%OFVLʓVc1tx)1Dr*Y`Aůsse2dg."$g a5 ;Fz-`+bšd[@rɣILHaMx[6(]% 1֊|Nc"-gX #sU+6%ظ^.ݦEX '0m%'g:c`(~??7&,vj7lrd-l%`p? et#epea&%Rm^r5NV;.Bvw3z|W»fUTѹyL-f /gؙϠ~_z`*)SOhŽr耕-^hcyJtZs}K&Hz]S{6Y,xS !nbpC{-U5U0g.~JÅءQs͌G( 0< L޵O ,Cut I-:MF|=n G kcWDWZi[ujJR1+?w?Xړx3zd̹4gd.C6w \SKR)CQTFs@ﭜ7l'&:o>1\p{/}JapNpm@mfȖ)A?)NuRv̙X8ߖ4`%M|W yfDkz>@].(o "?s(>A JǠhP23!G;rtwcT&a_D%M}`|B<57Խ1 k ȏ:)<Ҟf@r;ھrG%W%b^ϣ؃D268,h9*\:d:;T>x6h! dκ0CzYMlMvYowAx4C3:`6a=4P ;avNk#\G?Rv-nl!HFO2lҋ*L ‹+ HAY|z6$HVUG.,ϦpWe3a"sbuKsCf>1S˓luL0cM*bu<{[cTPǀ|AЌ6χ3~X+Se>$&(0SlaMhԴwTi9$ |GTbД7"|?~)@d綤1\?=L,|;vEk^H$V7)ʈ[s}u[]#p%%1"4]6Пf˨jeI |qi$ѿ/jփ0SQ mM3r2r1t)-YF7},O γ_Gv 4[]aj.WGZ,8?FT5onz7Z 3 6pWMQ妓eA<^Dj0rV]`7/~lieIPj\z2'X.nX!XM>b 8&ǐđ @5Qlr61H `?. p9x*Af=/gb8(> km8pZUO{\v (YoyXD}iTf6SXy6t fcp/cHkՎ8s+WW4=Mx͋66oXߞJ">D\Y?h c&#v}&zuW@8KO B e3K?Y\ҥdDϠ=bLhs=Oӎ#Û}u%HzZ5~c8pȞXt {OگsZmknpgs&=iy鸺KIЍ8F3.o(zdSH師&RRJCTQ- 3̮k7NpDFO7^^PރG\q߱oDwp]?d_HՆKHT& X7_L 8u v#<|qRbm1totݧVհ8q3moŮ?la-Zpܼ?]68N g=;$Jd F / &]9&y`6T|\!;alq#yaX>wkŒ7L=@))X#  Y²VG,ڔF^;DY pʴR$aK&|HC;)<5M[} c ߵ<hl%VH*^x0b~ꤐEg[2 +*};f*-{Br<L'6up)܏c3YX_lDOy: _eh$1mbNxpLK\?OD,$f)M?Ѭ=&g iWz1Tҽxc~BԂh_Me,B}o˧dO@?~Ӡ)yq0JQijܹOR֍aMn;_RC@}VUJ7mC\1'w@0i.mp:;lThEJsA2e&Ze^A9 u_A *w*!փl3&bf,զÊl?|O(YUkMVH6:j2_jQx7A"iY: 3T7':gxa> Id$#$@wo,dn2H ?/߆ @{UWX ] SSjtH%V6e6Bu(,sd=d8vpQG-\gk k( 5B4 a*<}3= 'ngvMuԔ}X =Ekf1Ir۲a؃V1އpŰ,,Lq&ʍ%\!L97y}u2ob&lz%,O}YN Aϐa#0)=4]wH M7b$˲QW: H={sFi:Xo({7m( GY|hLCN1S1>p-иaZԋU4U֋2:) di_%{]$п,e{ CP;ԥo* A8g,I +_5Zs YuN6ۊ%#1xOt. 2i@X^S6՛ْ#$5|'Q( ȶUpTٹ')=^[˷f)ﴐg/=q-E]oԜrSS}3,YK>eHd.%){@~F"Dxw51O]=c8-⻒IQ3qpTb q *_d4#Q#@ CL?upai/=(8"Z{5P'N45v 0s.MY\]/[<]#^;0 r(5r2C) 4 P)Q ~.H%anfARa5uaC3a;6ubfUnE& r@QK[~ 1}3g /}wotGqݴ0yMEZT;c}QCXj 0>\ԂCq6ڍqaOuc䙅FحԴdA ?m0d[-$.9󺦓o*9c^"JWT -v+R !|9 y2±Kڮu̫ Ml&a~WajiДAʀNJuRAT'e8G,/.l-fJy˭SM6K E˕Lأ!0u4BHu8Τ>KSw&w)׏C>̷wK*X'8"8݃[H~P--5S~5m!&nt|ȅs\X Oky{Iw!@{HP Zͮ )i豗RtVR_7yJ2xsAhOeϬp-3tl:C{Qc:up1x'i" 42o*e~|ОW #;?uQ0B?Q Py6;fX=04aUk ٥syA[ɶQVmjy{A!AR_yw,A=X"m_/|0UgcpREِbU"|;+.7GQ/'"O@Ok$q30OyFC2,3Or)&QH|H|Z<]k$Uu4gj^!$Hd]N,,ߠwbxACzfoV}{>2 ro[v4UE/j+.9 IЀkV;e/_n[+f8%%Wo&=nEs5A\Oxzj!(*:vF XrVo/!1[= ôaQfhE~ tp\fBm[MH7%3^.M(w* jVd9Z=m-Oyb_pWǠ# z9tG0YUq )Q>J lI 5) mjs9$hQ=t8I[of`z["gٟZC^^@kp0ى3] OMC> H>0R{ùdQKg#<մ2S uPU` @+\ Vv<= Bk#`wLv$rUc;7_ ,˚`AJ[#3n ٭CvlqJ~5ӔmOb#+u]~+Q&a9"LJ!,$M'nӏ;^PЫAcCFzmnq&\y/UxyPx*MpE*ԛ|bcrZ+s Ug\kVF&wCKm(\}o: RIxsN b}Od3~0IkkSKvٖ\u m%5Uu\!(\Ҕ0-;clKpRgeTK?D/Lwꋂؤ֫4* x2Q5ռ#do9֏f0LW^Ό#f[@+TxM \_HcLyM ߧ*FQnm0.:Reg2S*D'`M6qHMыQӆ:0Дq(:@la %)#NtGaj*9'8+xI;'Ix隬/t,B_=]@+Kn0 Kf=Yjeb\ayfϜR) Hn=Hs@'qXYL,>շѦGJX#( tn>Q#U1w<;ǛXKBƆuw5ˑʟϨtnS}ӿ;~E1`*x1T!>p]I(ʊl>qJrL>]1no> 2@_H1vHy,٪;,G W~#1dxEH5 N'"ũvLxrъTeda"É.&1tboib^MZ#.pkW,Ř2-겂>A11!oMX ˥MOofTJ237Ӆހ9$ny闥'M$gTLu2T@N5/"ځcpN͵Ќ;"] ua,*Sq㬒SzD69}.E HW5OgVzڑ=+CaF^Vd+0^Y18f©Ӳ#> 8 {ҳx o1u'9zSTR(y4V6O>͏c77geaj;i6Xᭈ˖ÐpTs o4^>maYQϭ 7v6~MR (8>#6y: qO{tfu:4:P:-L:&+<|tmσߎlgVܟoVTI1kVB؟bj>* wUj}NcƼ{M83F׸v {Ih|:ֻ,36bx5G+EߣzuD|RМ@}zGM"x! DfY5fas mv3NENk~oDZ$Zߟ"&QVJZگP<I9Rd5 HUr fymkcԕa~f"~Q'65Q,w_,rnMTOqi]clWq%ES؀kHo=t{ B"];d|BG췿n13+dP WPv1GI7x hBlЋVb ELm 5=WL7iJ(gm>C?b#l&kcQ oDn z4 6{(Kq6`_3\"B{{ . H`{Fɩ0QUOn:Ju 5qoGj,kMz 9}P.񿚛(0jr=obtxlO|#J^}y~.^_o,)mc~:‘?W5ft@99<4IlQ1 0$`ϵ#VtPR+)#>诈>HSYa|ΚS&J@HpU ×7ڈ Wq?VLI ?[&}+KE}7ST^a?{@XF}.e+ t&&eWl@{ƴҲYsР)xۄƭLvGFM3&z"h f/F} N넪|s'-xNB&A!|b<ȍcxaeBT*ApXR0֓_|tF@l0Q5siSSmPuɠ\,Qs,X<H\Ƨe&3|fTy[-0_{XC QFrW˝ȚC365k\]䒋8Ɋ% Z 봺Wy7Si$;~@lJ>' 1dlse=|ct!Jz0πʢVLK:W+A־rDkFc"-,zZ|F^`L9&8K8om3 }~p{\]Hb F4c~5E\7ަ/Fc©HJhJ6 G̥IgQ o{ǭx WL˪Yx.G)hϿFТ*I}2Kyu剣r=10r? T^e 1Q̵K٨rpVsUP?^h|޻؈Α7v:>g ؗ~*z*JG*X"@1 sivp#d>[ɛܖG׾,peX=d2#"O3+MWZc9wK"ZaNR}NBdM: N-=vbZ.mtk<#IjNpklf e1_D~KI7vB"D϶(A-)V"S^x[)/ N6&[}xz^A \Uc(SA" ViHKYFraʓAeщ׿}2y6t:ŭ%{p" }ⰶXgkZbּ${ZG3@~M/Ӏ6j5p N6 32E!!ye):ZvbrTmU T,XUլTIzÆхdgmv!c?־g.@3m G åD*`+XclD2xpwg?Mv.*tۉ@v80|WKt}A10aW[e佛i3i^PyHy׻jԜ53u:_t^ykϔD,Sv)CJb[qM%Khh|e#Ųrz“v3RK/ nZ*h-S &j5J(Nx?#+ѽ3oou@_kmJeiKC6gF +$cp(~/ЏmZ+_~(hMl9t:rTO[xhQ32 ,vqP~ kɶJ@;3G<qA"q=ҹt€hEii35 8+ï`eyH܂ڛZW#2[}u=ީl%KmѨ| t^$ya %-ڄ >a+Тv޿U3vVflO(5" :g&i -gсƳ>pr7x.Gm'FW@׮WJ;ނdN:zUsOŤ< C}e4X.fzʈ'suE~idZMgpq;pyNEq-A>ײ?ٌ,ܮؾ\S #ـwCp1Ex=TZҬ?rdV6\ǸsM4kz\%'d3prؐmGZjE{̨4zR dymC|:2V o] Jd 4ᾇZ>qc},=e!7=:иyܸ 2* 庆a;~,=<`I`Uo~3ڌuhDF.)C}%X4m#gN ;V=Nkۀ|aI--9;oň_kLpbyMuێI] VR2p䔢{P1(޸%( 44${ѹZ'::SݘA>/*6'Y$y%8d:+ /3YQfg!dž*{KaqӴ=\ɔvlMh/lH!MbrsL g Ѥcm_jgbr`tCM-Ӂ p TVYWξ`< ]N(e+{r`¬%Nn6J!=Vx-h8`m'{E _8zIq#ό/3\򈲄GPgX‹ftʼnu`ZW(5o5^)H#-+;K34 aR H0/QNo6RSqP}YFw+ $D{<}lN)ŀ 8m*eߴTB"EbY[x.< W>r%Aj5o{5C=?#Ǥ_|dcR`;=;%B.$Fy)l}ŸH;1E cwf:B.sq5|T^.@ np.TbW ;( a7}0;3tIX'vқD2q#pHs:]J]U[Ȭ<| 4fyW9.y3c Ímgg4E!Bĥ-#4qۘ{Oj R<{)m} t~Y\e p{̵2FD#Å[d[vFM!$O*a]&i,^&**T2krK2JJL"&,dKx)ԡxTJX Q,tG]a/XG tv=wu=c~zb&5@'%礽$`_ xi=KT5Q46ݘO.[$vkc@k)g?!V.wXx[B=J};H0  m ˉo04* Aj{ Qv75xclI߬cc;?_ë3lNmkN@Gh!2DCM,Gz.<9C6 /U ;$vMtvƁtݎ69ћl\XJd3qq*D[ˋ{, "vsݟƿ%O[F}",T2}bJ0QqJ,׃G/I[m+5 =H(<مxjg@ -c@%LX"ԴTړh7A: m ihذFBK9NQ!>/ mfp0;`ťMlK3nM^l^UMG~m|e2EzyT=a=׸\Hl?x0 +f_tU 2B(|.[BW>fZpnEI@tx}:FmЭtMiQ;ӑ&}U; ̟U [ePGM`1ASQm{ےb8H+sކC&-\>ڝ)ؙJu-#Cj$zckJSxM{YSm%Ѓ:s3aİG%G$C>u,s-wCL?HMzun2K'*>/BgM5e Qfro,h4@JY=>xbc0>cv~Cdp"ɻ NC771^؃sei#KG'9zJE؜$Fg\;i/ܰho٘FA){SԋG>9u]m,f{"m g,@ENuN)@;:u5`kcisC_pbAĒ5{VʾHys< oc#U7y+C%Vp)aiծ!n1¤5#Tnxjݭ2lk[= .ɂ -0\Hp=!l#mWe; =lou<\o`;1eOOëq\HS}Dvxeip]ЂyG8_¢qy ~&ΡRa#, jQT0‰BT? Dqbǡ&E-/!}nG-5VDiTMAZke)La2lcMWAH Rgy!# &n7@.)[kK1N;P J'/Ytz`^c?la o kd<3aZ#e@ G$0[2|fvi{|]"IO&Xa-pu+RmcUĔfn/҉gmؘrR|G8ぷ!5ֆ}' ,mh r@(ghZ 4f5 LD4 #|{|&ڲS jW@vo;,#)._eʲoidJj~ͱo& X>4aZR.HO,4=ěՅ]@bI)*k:Т 8vX46Ef([q30T<琗[g驳LIW&9D}ϱgx_F[R):f(hФ"ys} nmn/"J+ȓ62ܵ_l,w?뮊@5 ^ח]? NaWQT~m|Hnף}|CgkOIJc c WY8Z/A 5U jIj;weyF]᬴} ZVJ$dc1rZB ),p4,(KylRO++i6n.|R@sFQQ.#$1/uZ4WPo̲/WO=b&(m 3v}5ҁNꬻ f5 vcPдMSry? kM'Q!̩N>cebL3h̖l1FF,}:Վ¿B:rTyqB3> ܤHsZ*JF,z{4T#M( G;r {Cƕ>ɠrR2E2pٛ9\hR*SN: KL]ѫZ뮓}'j%ypnLc{1Bo#<\|\n@! V9G`藎 !-8ˏNA,PLʓD:ceo:huF 㴂1 蜨AX=էnb^2 d4hpczOپsJֲ(˻ޫUGѵNnkItV PrIPv~ei ޣY7Ƿ܀rdkя_][S*n%൸eOxIJ:BPoh& ws!3B-ߟ^$|Yլ;Nj^TYJ̰4HcAkiy$)b.;6RHenF&0@@_uʈVEe &AOLD ȡW{v&hUąb,[wx+QQKk⪮2:KMP`}ɃSבo%-*Z['ڮ3s\4Yuj80r~Hh)q&J&?[r=9 Wϭv grTARF$y`K%6OZFcMD׻K-C2,){ l;PգLAo~ zV><=tsB i$d~Hqx(Y|N﹯HD!z-:Ir/U] D0wPn{J(k{ftGs|_ï[60qM^q-b} Y#g%{fn\D?DM1GBA=c[ V`Pc9[6L?M:_ԗf+MGP݌); PkQ8+-(g$ŖWz׮Mlܿ^^iLpgvRp#fzST,6WΝ@LV(pc8mƳSl os=ik )4V^Vg#v~ibg\Tvd $?s]a>y?r 5]D `֟3szL6irl@H2~l*^'7i:SzF9@J&@N]5U`R-\ j̥/]^v?|4SJ3t5BV3Qh`A`Nw}1dd[fF g5r*cZ.\6iVʣgz"d\UTra1M6vߓ`j2i0sHK9h@[ax7xׯXF@",>ӵEJ,#?HaU:9﮳obʩ#c #Zp]];agYl~lw)ѿg. ;ydGP ܴ2^dhS*ni7D+>8Cf.M vI'M!k}$ ;&q1k~\\oƳ4qu)G*ɰ^_FEjOS^9d qsVlUMtɷ2Bj+vv\h`$ tw0^7ZjC*4A{Hl@VQ+n2!q'B-rl0M ]PgMhIvhf aOz 'n.]/T==-/ 2{X4heH(0[ n=1+3k/(Zb7jM&_}J]z@+,&(*.z_#]0u% )EB8⁃;۰YcքAߌ$ÊD$~9肂q_x>hA<׶lJ0?!4!7/~3_%95_?O}x? H_ˮgNPS`1e9$Bukm,‡e/gO*&I)#U<M% %0Gx8 PBtKr?e#,ACClITm@*0<(<:PljFDDG.)-Q1B`uuyܫ Y5wdM.zÚe>_^LNN#KA qqQ')͵>7 SR%P!GE9*_ w!Qތ_[N:j @* [`znŵ:ͅQ.|R=%} һs01=Ϫ.b+t)5f{/s^XLC~"DƎg#0Z:91vm"M af/g{dKf[>,cechb`Qv- $DC%~u͍|ALcK_b&l~,\n1и1IAPs˯ԓr!g5-vpq̀@ [r`;*la[ϵA {'z^8\yf60f^^'RZ5LĬ3D4y<[-5;銴My@lFWlRq3^CDud]=҉aeӹϏBwp96ٶW+Ց:eȊ?riC<ݘ4#VNcnwG$d}%lE ,4V=i=J&ye{iy3|<wx,OUwv@fs6Rl{wCNo] RѼ[@64>N߶KJQfiePhT#N3VmQ(Rz?˸JWf5o &U!,c9)̕7fڑ2qiנZtS| >Ɔ9_%fdpYmȧE2"ߩ$Qm ǎi.ge]nzH ޺NHÈe$":!z\Cc ^3`\͹[/s„,mUr;O;Y"7H;fݰSď*ZΆYP-sFZwaABh`\N.i-[(Urqvيv˞ # NFg _n*s-T+ё]J0BjVIPg"^{":f {,W<>DН|1j90?r>Bn_ݽN^8ѥ5{Rg# +i{} Ql\U͒ܜL D4gq_\ZF׎Rc^I M] ɗ/j'p"r)e^ur$K~* # e7B^LcafIT7ln4;_` !Lxa:W\ xП`} Atދ T\}XꚐD \G|p׽B`KZѩ>2N"b1~7`AEO:Xz %SZf{aк%1U;H-p38ҪE}Jӛvpm4S!Ģ' _[>jޥ!߫ۤC{*G`! !gXM5RvrsJd8X'} O Y q_>4u&f^3x5ovE@˩(ؓvYp7]v]1[Pylw]EnGkzÇ~ADY࿅m0 UZ^jh3 >9 ݶ>e0sZ10&k563I7P<_`]ohR,Ӫ\0&L66֩\ j%nM$9_Q?*Σo\AC#rϛy < AbkMy7@nd#!>^h#V]2 ڗz5w?? "myvx.77[5tp,D'ϻ̭} ]A)l"sp{6%f!)P\L'0F+>-PiS\{ywm sbZM4`gF'KNtDRlG$D<(KXPҖ ~̓#s378k/M-o+Nh$oCM\h+̍HSF/c¡&2yd8ر]1 Dկ%*T1qCz ozU"5iX ya_*?欵//kmaF r')O+I 0eaOkWMrg,&hIγTX`K S)zF 9Û6XOBu؊{ aHkES!ΣgȾ?/{33tko @v0RJ:/2;')Sl!*5ZoDs8 +I6Ğ0Јd(pYؙfl׃_Jw7i|}nc㪑kP, єgc R.ڤbQTևjst٤ay i8 kPgc4x&H(E{ӵ ;c=K{=A;Нmv=4V^iQT5~q($rth`ȶRJQL8T!ᛦ<$HmB͇K#:}8Ȳ"A(`ʻQ& ^<6+yzT Ī\80 ' W,{Vń=(#1 O9Ь2s^ˠfL`xѝz9+6!%SXbJWꨗ8 3Ȥok):%VeΉyt$+xbc `:X:[@@gpT6ִ!?^3V G;$HG gx*H%PsI[#?%i: *r0 +|WNXV7&gomuc *7sTpM yq*q&Nx4JO.o~z6{;`y_.r#Cٚ X'YlgvQA27F>\[{ERdfk'xJlˈ;,Z90X!ӻ&R\an0'72TZ~,C}e?Օ~*$˒`h%<n8]mJ.p^;)@5¯eւu v As&B;xuּḏ1ChP0ipEʣ7>+u$iYVi.pv1 F~ɒtHy]/_{CoG¶E.arci6B!W0D8q0_Lýfe γ+VqvamGzIetpUׇbseXBE;GgRmtq3 :kؕҾ!Kz2 r$QgrL +pYi_> bcR.vbj,EHVhߡgKJ wI'*|aC(%TGcӈJ!CDѣc wk]A.V\$2Ͼ:+0;7!qkݭ}Qtj3Tz<~A_uirGwLij‰C=Þo.iqͣ >ܶ6PtUNFfX.|R>7ԕr{x;,yO/Q/ÔYuV$ͧlEr&puUJڇ;2?~c8!/AɎÏj>AIBw>GCu`agz:bnjG\zJy%fXjRnTsGj$v(0t2d,m,B7F(=,d(ʞӀ8;_S'ή:'wߺZTA5 bF Z?k"PhQkkΘ!f Nx%]#n/iNZm[.;` Z)5~.Y`MUg)}2yۊD Zq3i>4:s&U;q Y{S7R߯7>(urK4/)NLmU##ZL媳5 Dc΢88ǩ˨@>\I\AOX$ ܿSvрn[kΧPIʁ MJș!7_=@b)ܪGT /{I|:!j) 퍨#ʿ}4>@.|Zl*x̍BPM=GۊIYuޣ_-]m374I 868'?m^ }ֱ"{Jz0>ǩWuo"OGQw0G)!~f96J`&/??߶%!?kUoaua }ף*&h {v|Ra࡟Ss4d1ϪZD2bAS]c1_`Y%rF.3?b,x XkHi'/WKo0e۔+:ꊓ,ʧ^!@swNrVpf!+ILXa$'dLZcHHrߩpحj1N)\w5mgsL<>` <)V+} wU{e{n +R;e5Q`״&aWW7 _"q!MK\rUvpF'MU;TN+.Y>":zl@$ĩ.}w' k+UfP)x¯X#@D1CE/T;E$xί2PH\wl{x}}ud5;I NbԿ3,*$82i,z2_(RHw6Zw`å:/1]Rb9` @(J7섡%EH?;@dþ z<cb 2K..?Hz\)' I 5wnƣ2L]VqLI %  vHKk"rhxSX ԨY )Ȋ<"G daEY< ][_;r2_{מJ0kk 5[ 45Mԫ0~[2T0 =] V87[+8 SGTq6a}R%'@9,YM.h.{(J ɊyǭG1y?V^|7˥J⨾xOx-+}I}!NeY~GJ+O '߸.sz`l-يo^ۑ3;XҾӱGEb=&}`pUC`znݭ.dR#G+TESY8h-}gKXE ),&zoCAS,PN?Ĝ P3W,E``Z;^ڧ(2)C~ J)-E ϭWۏcϣ.P .oLHY+KR CݔVQN|0f#x÷D֪؝ayv66O1kJ3:+jH-VHd'<1ᡨ*[O2'^ =ߙlɤTuܼ; OHZ lYx]OF]Y=W$`^ɋ2T$ r;[xzthBB㩥):jym1?+BeG^L^ݸadQn}b|JQr^y"A`^tVK?;TR,akNƔ~Nu6č(<h6ԅ´BҜ/L)_AU ԂMex(ai`?[0sgz|usj,ESI_Uto Mw 69?ό$}<+ )E OǃIex~,Q!c'cAD3(O%/w/4W*'O=HVESXd#,HIJlD2jd KدzBOKULok\Ao^֭T;T͵l՘y@ݦp{1;. Ō\a̺P.|RwY'B$T+ ^fh?E7ɥt7ȲY(Ύ,%G@n>jGWnJNoE*p:[` s-p&@pD/$=Dn7fdz Waj>M4Cn/D9s~U,50g^ɨG_f G4L?!G#EQ7H7ABBD圀<"kRړ(lwŧ9ѸjĬȡ j\a/!VPfrg\#n*57u%൑Ư>΅LZ㠍S6BSC0(Lʹ2 GCQ4]-FlU%x'P=W}s͑zl*䆲(|eW`R:gD3!&5wN4y#$2 -}i#i@U䕗LV0"Xj,LH+Ԡ A,tÔݹ[>٣UGG{!wN |#m6 5JceJ 5 $)0ML}[u`ODbFYTAw?u\#C٫S%Y0 ssX̓==bJn,pl!uy7ɮ}O6@cLtDH9/$RyhzlmZj`渽P>3TSfE( 43ME20ĝu }9>~˰>8_BVsvnͩRCX}3` ^{$fx:VϺQԍ&9Y(6UZ1=2(ՀU7g˿>]jpDߟȹ?;}P[Jq൷Ig:fD _U[φ~/ޕ7O79%.~:S!j)jvmLFW[#>`cPkT=*av I㋫)Ǣwn&Ӵxþ8a<14Zv tm{kX}M#pEK@׷UT"B𘐀e#Ez m "<3*O- sRFP7|o P Rq%mp2VP7 ) ͣxKjHBW+NIǪY#h̫/F YR4S(ڧB~z$_*MʣvDaEag8:,fS)KduN->(t0M= žIo .}euzS ؊km;?v,bH(B u{}h;7}rI\el%`g ᗝC펅Xخ)'m2\[d'mIҤӯw3&B}?ڔڷ]@ $`jFs49I uϑG5OۣhW XƇe*'7n`O-l"=| -\z.{fz'-c\<'Qߡ`:gV:1">0SFOk}e5LB[lfDª7G}pVDYG-"|OasBV/"e4 V2C>~7~Pt2b-+^֐2>+e&1He M3JF@EY0;e7,'* ͬUb)r=bAsD"ZPXjoz7GZl1AMvLRCi{{)/?q/ƼoyU5yZ1zGƹ1lmzgu .ȼ6 #Eve"({(1H vЊ0w"Գy f>"+nhS AC0*g+" >d#ˠP #H2Cn8Rd ab+QuڡI+Jh] \NOh:$OBkbUHq µ; \MNla~Y#/AdyZ:Ĕ#\  9rAD!U9׬6$A8FGVqu濷*E,f4r7VW{qk|z<:DjWp_í EōkY<38v#h勎 R)ܧRj+DE7 k뽢Ev&"$j쭍`آ 4'CEKj^[ ԂVP՚R9ިN w#:muRlNL6U9:2`hYO4nu- ٖSȗ?^?Ry wG Y֝#Qb " 6+!5f m.xɵp_ég:*:lLfqq 9c&Sdwx N aI tKϩ VE Wb"dЬMp" ԭ_ Ig?pd{q$nB-c4psZ .)@QHNZ@rhͧiA(x .=A} W.`yf*T$!a!|W@U`n2o<,*ǩdl숭sxL\<3H:a-b #4L'BccP}}4YILOT2[ iq<ԟ'7Z1&Ulr#E<>ͱ'(ك5O3 y"K[#F'lv \tߛ^ 2N6 m(IUx tɵL0IsmۑK|r2?eQak3 y|SUiNppѷZ,PK\B0q[WOҮLcf.pkusK4~$'Żl}id+O xafrnB B0w D 8^ow4캮vtN:zGI/5N2C<Wi:*Fi)nxlEVlV#&qlhlqYv@nqj {GK5QŚ{c+'GC[Fq@KGB}(\*\$`dSmAeg輜9=Ea9 2 gmi(8=H fa?" ezU押4R`bGA\*jTs )P;Nʆ%ӞK>\]ۏ~ Ltւ?:ŵu*[;x##g^*ݵRHQo郏† %V5d8bAƽ-v՝YT-؝8XrAu+GxMJ f"حk g y.q19$ e6d` կ6imwP{HmЁ1)5Y=nhrfdOI DmORrM0֓ulyuV-gfu5끠*w f >C>!<=2a331OS*ɭ {RDDegFZ,Lk [un)Cbu;~ { lP᥏8.Z؞ J;wc_du/C9$l*28w,tq-#m)*tCB–SG8F/clzI0E!7GOlЈ-@.6Q * &.bA.UN|hNi C]]K 3}08,|V]V U28J9d 0kQ* -KdTY7#H#-!C_E$nu)%NG<:ǟ(w,5sG(Q9kYthZ0 B:5i]l%y`somL>3PHB=Lَ2fܓVy-VM18Pp||}8B9RV𕌷|re0P{MOisHʸ'pM3?#B'[yDΑibЎ@wt?1yG=R "D%.yZUԙXp2>n3 ՘jv8ħ_kTʿƪe}BK~@d>0h΅ۅqqIJ,, ;W㛇AZI?/PY2_ KjZ5ar Ϗ<(M.@x=<BOn2f]̻MP%#13#.$|G\B-w:ZdMnhۣ5;!ad=bȘPR[F2fe؏`q[>Ja`Ɍǘ2sW !V>ep@2ng'vXf1,n.x GlȲxY 6,T1v!=/B7>߆܍3w%07*s4)_RFqw0D@^9l#5aǞ'Q(5x,=XNJ% HwGϫ%6>>m~j&K~W&Y JKPq5 IqZr3ّqy{d@勃,=p61u;8Q)i'Wk}J(XE,o8ŒLJ S!YA)=LYheT/mihˋ+k3D!zn4Mvҏo%03sANh,aХÇw_JaЛ l,BMR1(9P5ŸMVQl1lJyOrZ" BѾkC?FÛ!bJz {aD^ tn0fK1(V{zu`p:x/=8oMzwM"3Ma0֗F'Ԫ "~y3XO()}.vxF4B^ןCm)v}FcyJηqY_%+pD堑`vkI&#snrɵQo# /d!JP3 `m"ΉQcRZP@u[Psªm@ c$L-u%9%L3~_|My'^hH- S FwI}tT9e[F[EW].b@ ?f=4NHἯ~A+L+$e0W 7*9)oFYpLa-{=bcEXz}V//vr>y23CfwP{.UX'l Zj&7Y!;77=?X' ='+ ` >z(PXL!H iZ:TM]b)6 ،gDXCKRAɮ}QF A{*^݀qyobfL}u`k Ҽ<Ԁ%QzRi~9̋o$*Ƌ {˻!!tsdوcX?[@vߠb'MXS}_?2oBzJ);Z}t%r[Q=,M}[ʰW% u<5Fa&5?7ǵE΋N$"iஙr3fܛ&(f(@R0 r"sc8O ;&J3GnIk! V12 諆`ș "֝i~[ xORD-Sr(g-wyvYcێ/iؔb&=J]88ٮpј'Fy*Ho X]7 R:miPAZkz,cԄ 7$y0Q"ˑ<TqQJ4ȻJijnw+{BU.5Y.ֿxJBL G_n_ B!;t;AIÌ$) C' 5[ FqB$dv2ԨU zVGJ:B;T&-,um깵=gwr\*.yWQx0ܔ[#T+&`قt= ΍,+ FZ sqmOJܗI9Om[%^fUpL0rP//a;e6؝NU {T }F)_ll<⹒[1u mt}[Dj ECعV}9fRu_knLbn^ܱRwWf]ƤJ^[y\IxN4^^kۜ9:$m%fMvNSg^6E0{Z 1c'""zY~(ʘ8(JvPLq2@}:X^re[:1@AY_P$71PPd!d|_B)u&;1YX_Of NK2(QA{ CpI!V}te{)ЕתY.4+(0$'kȈ[1%&z526M᳓sRm{ (w:::߯;\pͣ pxӟ'٥cV?w4( 72kTt!6#;G;jA>NEqF 7 h7t}?bf\ cęɲh='LYcvrlajHPdf̬9R")9va*,#YX W0]%?ﱘ-&)8MDAo8͡|Jr-iwj ~MMX`45-a%?|`ę*& MՊXʦ<Ta1T2 mkيIj n߱С )`lr-^ \&iS= o2䋘4U4"'ڽDD >^3Wphܵʆ vGhF>0uyP,"^V5 D; y"ɚ|T|-1L>.QAC}5Ra]_3\@sjtj~̥_ Ew|Y3$`J bl0sn_D ϼJ{z]=bZK ԫRQܯdbK=5_֑&%LAU\u,u!4ѐ%d\'j[22 nd\=q2&hFz cCW(2Zf~z"B'ѐqW)ؕ<r4& /%rl3&ʡ7=TT@= EYʳ"6x D4+[hhũdVwܷN.|iS8N\_C[/ҹ'C ۤ2tWg ryFDӛ0?3# >BMVM{nB:@c|4cծe〲0|0>,x|(@uS@B P+@r8yD4V84(F %0,diy\\Jf+=JM.Z_u5htL2{b+IP ذlcT1"o`@! hwa؛m:ϝM5/ Β,vAYO֒nh5򀚹Fetw6]7}Y%y eIZ{BC;q%QQ|z&`d-[jĢ0͘\dXEb`Ϭ@Bo_ 4 pUq%)kɞRNZ"ҤN.C] a9.ob ΘR̗G4ymu]O-SW{mڹәr٣XW~b&Fu ^ YCNBEEqnO'_UE{˧xjʌ vAr?:t+G8g<8/hBrIQ2|+, tuf恌OJkK D;?1eˢFG?)F]E?K2vv~-P?fZK5 &a= 4߸c|8wMoXi8~~ˇY'B[ HhHt E:_ɌUu<&F}5:/ kO,~-bil7zaAuQ0x#cSH.8R[2yu/[?r9))uj6ۢ#nR/Iջi)PX `% 6DjZ5YISKʍ d%^*ITYe7F^O9F*JIlBeg-IDÃPY5j7c6 tעoȗn2*Bx|9qI R^OưC/ q)ƣJyx|fQpAaФa}H|'깤_39q ًw4+ k^v K'|)B*kͽn;vI^aSnR%E%/pSsGGmK3 n[{Z2V(H _ރkFqpYQ B9 NE!9k ?ǟhkyyFpA")lݼ8.77YTN ǣ?k1Feڍ;!Ezn*#m-8wPDKl3DG_m\ PALQ7zOb? Z?0H۫EQ.CG7]΂w,tK`m+><-F5me_h߳J{.I~E1+w G,>TCIҰ1@*ѻØJFS}Q-85Sیx\J*ĉ Vd6=)QCA~uWζ@Bg#!rqp=+O 2np)/L B5o;Iq+ 1Ԏ,=e [C{&@$omUrYQ^sERMh2'(7r* nR3jOeE 1jQbfGZV5@!)\qZS,Fd͖U-t56`]KxX ќ{hBT 늚m({o"6k\n-'˾#8-b7/zEI<9&Ni0D ]yV>nAv[[=rci^c#XqpȽf RCyVλzBg>,0Sjf JޘK~8*E"l0k8 I="z%9#YOuW~cbW]C)3gWҽ$>Oy~yN'ÍMFyh{}D ~n Bk/Em+U c ]p/4sT>vƋd8/~U:#xn%o{RR =^l@^]1"!m 2$Q*+dr޳^AGVMLTOMNoCPmtI^e רP:vŔ$cs˷|ۋٵX5nF:b bG(KmxFge4 okw51YF E<4'^|h*0=u1l'fyYWU<=7ߨjuI䮒`YQ!e@)鼝Dжxi5̦0qfڦG/hX}وsN) ^ŚDbHn]LOBA"igy#[vKLr,gegUN[^AdXfx׹Z܎2 >moS\̡7^GzhBL%{.~37 "_/ݿ_ygm*wl^qlr)Ø<qAo5P,WWo xd3,F'ϼ?T2SO~mȎGbnz٘Gk7a(h_U( "z / Y]o_wbnm B[Z|#rm~3; "cPS ޼=um @ۤ0|4|cD?8 OE`ɛ^*PK_/5K r 9AIteh'Cq`jS c:vY8& 6g&šadpL=zqI^XRlxg-Zs&${^EىD5L %[q[1Lcc@tm|zSt>) -e2U[UqEr?]w[׎!cb^n$qm"דrG]sЭKdoo [|| ҀAH[r(q"~YϪzX ` :@l= 䞞H 0qe8jĒǸP z&ç I 1 *u4N)ܷtMlmS|O&O'mPv/lde|(M8/v>-Y"( k"Ry-;56j6ep)?$hWxR|,OSSRթgA v. ( sH=Ŝ6(M%0Y+_oɐꞇb+Su'FnTdUoS@ϵhR ah]te4VsHoaT$.SA.*|lK$ksfTLJgӶbX!bQsWQDn*󧅪Lyw{raI'\cBTHȟ&57u} 8nIVH=#sbV{# T-%"2>FYAɒ|Ch:T$5c4NG=]CFȿSG/MlKr1LXߚF`ז->VPb!AD Yr &O!j'Cmgdd㠦K rw{> _foG!pK3=AAdYJ!|[ ט4Z3C7[Rtz 쟀N.!;Ώ]SumJnd0ȼikU{s!ouI^zh-w}Uuk`وI=a+78%7(;=sy%є~2h'.w`Lҟ#M$.mE(f Z~Jh|[ c+iRƣ~jst |vjY DkbYf %m _8j Y0J-L{DtᒟIvU0b * [$Bc?kJf(fN!U|Jk\1Muxe׎%O:d0V5ìބ͇VҾ68`3aڋn*U{QMvH?U GN[:f3ʠ8BU@U%Of!`]| yt¶胈n+m 1Ȕ75e11sH[PVEtPL8΍ 9v1o#빐_G:"qCLt2UNJ3n ˀÇvDWR F=4782KL"خ_"1D#zQ 6#G_:c{>9C_5iFN6du&;NbcѾ`vPB_;nj{1Fl4FxH{ȓif> ș:ЩUyK ,efe3ܓgm1 x>zB? "wƼ`ZvaZ5^Q4<=g˵3EJCsXKv-I uPf|~0lg-+Rb,H`˰O3aMb˸m0°xb4].NBFO~Pri[mBUx)G'rw]P*e`qkRM"1kM"V^yE NGo Z}D!n 5\E[G@([<8`(+ӬH ]8ϩ؆kSs_ܴ~!p'TݴW\ՄC#U_lWw^TP|a+gtUis3JzBrUkqI+-ASo3f!i3eƢA`f4{) Qc;&^~e8;lUfy`)h HӖt5O^&3p wEoqL=&a;i8<JC ?hOexB,$;˵h;u@赊_+6gOo3!(dc>xC#(xl괫,t7g8"U(l zONY)ع;*xV˅ Xwc+S~fE3wcMu4QB^@/^NZٔ=,{@T`wL:4f61Gh4͓AY[6ѮFHW4ǀv9^MaqшqZ.(zGYdqigcu\~ʼnkEu/,:`Z!#8g+K&QxalRݩdh2S+A{g?31Au0묆9 ss,W 4e;ԫ +N0r2%'KKYKr`qiiF8u_l5T$uOT `Q4oŔ0iD[b cet"ymt_. (Ǡh0([?D$/L@;Nj9 ZG8 R%8\Ƃ\*D|Q8/&QH-G,ܑ5Ķ"P|:'XN;}:9J f擹ynExJ]yi- Hj_4"{N@r~5I}pMwK{zCH^Tnju'ȓB=~;H" dTE*)aB݇-57%rֱ4+)DץJ4vFC b[C@s[3,&>+'5ӽ}D=v I1yu3ɬ|R\=DɂHi\0ZxZF5~v/b{cWmM{P*N]da , }hY̥aEF;-[dYi#%Vf7Bо8t0 D(  V>/y͆#fuXȹRpK)jU'\t*X;"{[Sc&`L&]}AC6NͣZ;2p6~}Īzm!e0x0^)0`82CJkn[\ڃo Ҧ=ٜPvW%?%ODAB`yǕ|8 w0?1A@Y!;mH=ԓoe/<>b^-7D-c. cX*mվҙ8xkJ0˞P*γWu ,:Qv_KY6FlRsLΟʑs'Z~2T&pr }6„wމi]bNJ[T;WhSQ j"'pWB;]5:pg@ۉ?_{)>Esɍujb[=.a&uu*:) Xפ2hW/ ‹xk`NN *z]\ߠ&KgIk1>9 &XSq$TSPc[*UZOh muo?/ͳ`.|V@ V!/-&o#saV΄I?EG}F.mb4zIC$ \%4+$X0 g i\/n?ֆ,6(dQ.^5bq*(U?P4>H)f d:OZO,O0y| nb¥-&6 Jx+" S O%i$^#q55t_c=ۍL~D07m"فjAoڃń N wOVE<kDb<9Cn'綜 E?J8A{ɾSP\İlY3_<*R(O*E lD9HQjM{FI (UleeS=_KrY +uSM$t ӈ^*^#( 63i-? cL*UEEpi|oResd: aFCx#A16u86*ߚn#PT\g:x&mFext>X];TQɁQu'd>۱(UB hL'y1qpV@"q$2?ܒi+yz0:e+"MIЇ$Ke@jSQ ߙ;ߢ$ uG\#q9KR'z2֗.uM w~\wA5ϕHIxK& ?z5De1^ۉl3^{4頻Qp}tc@v'.hX ևN(ȓJRv˝eGs^1:"IlL4yJTRrn:8/J2E'k:(=q:@-8^$ah'-BQGU\xmsx66;òMRkp +.ڂ|l(U VaC{ vHE 6!c20n6n(HEjpc^spcwv6\gG,gN+ɢOLv 2ZXZod륒cAARs h!c&-!ZJ|;K羁mtNWQs%-Ǣ6ӍC EmrIPPn5{Jj{Gb_|<,'VWoXa.09ʤĨ)=eG㜭.UՌvoQJ$5?=6}zZ'vӡ&w=1<#ٖ6d^,# 9*ifX ,0ͳ,i_<,&EV|t~MK?Z|BBĎ1}p}`JLt eH!O]NU!>-T:QL=1zP4)_ E.X92*Y4,]Mo=tѤʛعB}ZUVYW ckkzp뽋]ܴД~ن2C=_QG aOXwOjC֛|p*˙9~CB ʭZ/ |9p=J` h o:2jSw`n&ʋ 5I o?2PbH&{xɂD:#q& ώ\32kE_ғ+m_?>=5-x#,ES([y~ A"H\kRtaG{zPe'LuG/uT5n7i^w˯^Rsa+PJZSъpiO} GXwBX7Ìa+H?l5o%NB7xtgĴIN%~}jS|D ͇]%uA7zBz"ESј9LH@ *VHˇ0W[+ܱ\Z֙lȾW4 |"trlG[镦j&`mJwݓcJ,p'"DDKdzN,b{?vKisR^~2/9po$͓NYS{ZIEǚCy+KJϊg7v%>۲K*s;1&(Ѣc]]o# 8, R5l]mPf_Z atlny#4c*]8߽)ZFbKZ {j|{14 - 3l{̉o\?p[94ы.ʀ҇FI;J@{gɹێB3T2OM0TP,Tni0&A2 .  L4SVsmu ̀+"R*JZ/q %5aL9h2$=+w~P;@iPd^ aoeBCR(A5(L %w !vK9vz\)Θ^HqbXdYIxKTO ͺq]55pϡ{&G"_\U/> ębhR x7ZfŌvBBQl8QrB14#fn~сkb xKwՙJԶ̖\H,e@af=<~*~je^'O0Qa;hI]b ̼j-5MYAIN6ejAT W"Q 3G^i PQ,ݰ_xBq[z pSԄس/ B,E)Q}+7MԖϴB'9is]uYn@&bl5ػD =m ʼSZp? N=4o-.Mʦտږ ߨsۂx! dyd ŮEU@JesyOb~LݵUh#U,ecI_c G6- VĴM2`}V{ە)^ID(]̿8  W}>]tD҇Uebj7|e3N )LP(RhRC !X_؟;uQ^@Y;K%C93@%1~(|J@ʴ *T9~}/RfH5*qr3s;Xϖd ǩ1Dц+$=%hf41d J'?^e%ȃ(Q?g5 o܈Oެ:e;A_6A[+[]@QSi(z咕=aU@KձD+ª2yx}}Y4(<}DM(h| ۱q-y^M^~ؕ1z`O?1Yc'f?2q;'X|2C M[&-ˉc2 F9>7 V|̧C Bf>4:%6c\=qqqsM*S% L&d 9:W6(x7S'k96=D*Suc=քc'7{$}?>Tr"l;'ٺlIRm# K2J7(b&i4r;-<>2#F Lh_ H7Wzb |d춲SgKг6ÂbGRX[β"qІw1m7>F[Wn:Ì5Pӎ"ȴT2{2R#KGڸ,!bGms9 5(n,PD,"jذn;I6Z]FPW%2^?6癫JMd\jh#/ 1C )^j* ߸ߔˉ#uZtxiPHdul 7e Yx{<(|s$HkrKC7T:qylF-Ɖ:zqħ"R 駀]8b.:;2RVcy8xR חoMl;6ęHPΪa}Yw_.1 MCb8ʛaEgȓ*!tLM=BOlN)#ۭx |*s$0=T\}ćG$~*W'bm]yw' Ŗ+rwQT>u$3yaVV2Rk4֢tW@}&/DL.ջW'i#d<4)%7؉Y?N.c@D iby3?z17!*ؠ$H>J%se)1yWŃ֧kj 䗙2hOGhرXxRJ\S>]aIDZߑ1 mJr]`4xboC,e:\QN:(¼h:@pM ړ2K  'f9qCS2 i{H{`t~Ue/L;44ԣB~jW"㯹қDOZC ء>q00 02Ct=Z%N5TW`WTz)`lD=Wq:AUN3U4zmyXcDǷxsИ^O\)r")ZGMc@'2`x݃Ыދ-: NUS|Tmn=qo[zMb$ EbJJjTE2FEv=@l0zjV/\i3M!& o<Î78tuX2*l xXtC֮uY lj(LW 8RT+g 7w2x|eҺyt~Q&nRN|#C{PFy(,SIoi=0f3?W)ۖd y  Ge@"8K+r.ɧD^4K'd\>}T?vb(:!1 “7h4eyPjWeO}'Wp]wMK[M$:IpX3-{  .`͖55WT[oQbW'g*Ff?^[Gevm`x.[,b{tJBUvav.r||@Yy(H :T^dɈ۞G͖{nt[,FHl8Zrؠ>:V:Oi{rz150( ŁE|+Kjrq*x91s^ M}A/ŧV=f7s.rqn[dId+qLBc̩.VqiS˩f)O28HIˁXw lZ`Z-ι1YL\*#/z8lÛr*#\ nU}bh'&4|al2rzm5iG*0;VW"29Y(,p/מ@OP,_.E7qq#m[}]MZB+H` )tl; p8qM0]Т$Ňiʷp4 ;| A܃Q~/H2.Cewh0UynR+dvH64āӄ<(>S1(g=B}/PzU񋘙w7^8ʫ|qIl2D %F))]ۧ%Au«Rٴ\Q{Ǖ U+wQJ4 f#3S1\lo#g4DQ*"3Lh?LYMLambxU>,kPbn}P$m{9Poq,6`Т;J`Uoks%q5-(ni?t PȢEU:3h (*Zdrtꑡ$yz?z|{盾{hcC?~O'TͩJ޲ gvfQ^]ZVHe%o,r|H9͇ySTa 6) [̺cYl5$ O~a%]uZm#~(oY%y 櫕8zf;Jl48Kfj1+ۺq!Fv4BDZWÃ:-v G{HShm0,7, rƖSjsL0s6UC5@x>/-&e3Ѭ+[S@N\*y]Qr?L.Va<(Y~NpM_`M::ʼ ͘4)jrD 3-6v-?|7v|' rvvIך_L?AvBLE!Bm&cVjH**+ _ry mG,D]:{;njO-vÓOy<#RiǯV .e)ՇterBLX6{'/f-`So: - ؉\ |W&}eA@4fEU<];CEhoF5db!BOrsVUBxDY\kG~U o@[K (w\iPɄNavP= bf&r9דDtk^@ `llȾ~Tt]:\#CLxGN]KɖI+y(eNT裇q An˰󏪴A_ȧ#͐J#[)o40D.NTFq7ZKx%\N<4냝}vO2±Cԫ_ qQ:5<Χ2tBtac8S7QݔC}L.hg2bze ԲEYFELUdwg1 g -譆)FTHz4 p`4k0 AH>祿Zf{^8'bu@]'vMpA#׃rfDjv8"ySI\]ӄq/"硆^ \K${_HsX^i֧+f/SS'hh;k~68zy#Z- Y%oKuC=iiRŧ(F.x2M?va{WYQwA)3Ш^.)㛽}g?^Y_2& @߯YoҸogp$v"ST'^ii\ w]YkvVB 1E .UU9n{RpTA,1`h5"rXw|L ƾj&dl] eMI34ɻɯP`p\ĀM^աS8q9xUL"BQ lSmmz6l ~b՚>OMnrw *m0V Xo8mssHJT J )I-q*ێtOJ Hka]CM75a%$4SS/U{ DDcwJd4S꠵jmL<˱G+Fu7/&;/~*cmG}ܔWS($t>' {wbQDh[ ']rUbm".8DNi+֟kj_,DDpg 2 ` k 'E+js{P }ռl~pdm'lj <=|Cb҆p"x(ǥ*S[?9p#*7v&`]Y$ o7Fy/:C|'CC$ Ərd\fp 9/.m8! Q<']Jx.d7Z\ Y R0b]0ȫ#g.:w19sSF˕I⇥ks:T~e]:*,DdLyl  Á:v/V^p!OOG+ujf{yhB) uWu9ς\nndk7F'"mJs"/WÜUCh^{c+޽Gb(_\X2;Dn&dm7\4|J \=+uĂ} &G)QG7Yc]78Lhk6]̧|kCcݴo>S;/;35NwMt[Кˠ3Veci_lwKBz52tǺl{V*ar;Y5ˊe$J?vR,{5ǭx;{щ̀wR8aN2@J;75D'qwq7i~I-&p^uʛh4n[ ]G%NIdүr,CP;,s<Ob Ң`:ƹ7z(^(KO&0#ȶc[-f$\ݠQO넮3Cj+Ez[lP/؂[ZHݱ`AX`+c/I+_M?t\xNFx2`TpC+K)=a1RUN12;ŶL>r'Ts2c"A}]G|6G펔a~x6u?iJj`&IXw+_gʌ32[Aה[Q Y:;+z0=U㩩 =+՞̫ s oZگ"cmd%!+Iˀ mLþvEtS(" 7Nq1fNyxyFK`C[ LFP0C3B7 9k80Wt5ࣘdS WEqv}(hѾ4sрiaKM>uVfw]zg#T$b+;d*1:/y18kA^~(l(ŷ,4JKIs4\%XQʱƕ>}[IѝBJŌVDEnD,-(0ei=kBA5GNlqL qoHC'3Yk5-a&y]J$BO&ӗY lINx(ddnl4yM]}[:Д@Ks[W>?oljm+dE4ٕ/D Μh$jgجg!ꅙEP, G\@fe {~ 'EG7&XybC&uyn({3\ {]SQc*K[t3X'Yv&vHphN=%@H+/ ZR^5R7į9O j(&8(@(Z{1ZB3$M`(/Ii*2d VcfrZU[⚞QR9ßʌҳsZWح3gm؀ o &>[T/+Z7D2L#?@QC38VS J5e/g)m>p`46IEa+Ǯ0"F'/ jt]7BBtq]j3(cԉkS; rb˴7LF8t'Z۸#][oPo ,y}C!PXvDGvdSj.k3\asW 0Q0fbWvGF҉Gw\ژ'z8GG6!cU$jjʱR@Gcإc9W6wz-HWfG\bZ on⡙:Y[U=fy|P]Z%՟G!H8H$! Vx NHm)vp}==O3i2~# ƥZV5,x1t9>EvVN/Ր8{90Qb ޵yZm eԆ8.8Z]Gw2Dq ]m5+5̿h]^BC'}zu sΪZa=HvěFGP[ڳ ,WcRS“gr)*< N$Oqnͽ 8)Du4vݰcD-2~{M( "d<`)B ic(]bڍ-vu^RbXVV@r,&(P5% r>_ϋ&a)h0K};q2bqhEJ=1^hŵ'8~wFiiElE^ apS3T,v4aWJ,NTљ̓SIקsam0"_<"=7q lVux䞔v)o+]Y |͕4Vg/5iqe}nѿB5o׺# qz6vP:d6zQV'018 %r,&}HZޛnjU(% -wB܁1ce#Zq@ǏCM9QaURasSEJ-/&Th_uM;ۉxechu>o` }@'W&-LI49?U8[Ɔd#X"x k >GWVS! y]u=ͅ ,SQt k va 6C+ޒN^eE`ŹIa>mWԊCn,@ CfḷTΛ@(S簫]O}a&| p~VBv?=mg sә ۬XC1b㦣i޴~w= aMÞ$F RY"kKߣXz0ѐ>N:FwTUZijeimڗo+'-rR)XeSF`|heoH>At jFۘp1lԞ-RIU[p&$m+zu8Y[T8ac1xx )Fx)DҌC,0~Z<*UVʷ([ab_hZ5q~Rj _ æAD >E T +jh>]-&Ȟ3fpaC7 . /w+F #r,ⱔƺcv%?4pB;u"reցs|ۡ!Xo!sHky߲`'@ޅKrIߌ>F*!:Wd:P;Z9h_S Wߣ1^)04Kix,6ƕ6](G66DMG2ޗ/琓Nij9Ǣ/㸹%<9DQJZD9jQ[:pmqmo_=7M0WxX4+앃ESoj跎U4᫄xP\a'cl8F rk.y [v5$R3m-&ߞ# p-za+g zњm|'/ߏu!faYE\ ^:D7 sנ16Òx >Y@xdSvDG=a8|>5'<3UD.\DC1$P^~õεILZ]$H)HfQ & |3mijt f2Xs-U}'օCu.zP {#V#$1@֘v" 5q)1ĸL82z52&[u ;a(49|]Jhg80m\ɩ0}#>.P ߙ Stq@`T8(މ.:0Q^*Ɋ|uB iy+ͩ:uVXg Ɔ#c߈ѵ,h6sl%0gyL*) 45y}' "Jovq.uwhe?hY3V䰘8/:dr_ RYyOʭ(߽3Q٠*摚psq{&$=&.3/vZÀcJMteP*"N+f:lZ F#cՀ_=10u()HmAhy5& ba)ٓo}BݺK/=ċ]WLJ$$e:IV{=jv`xJ++7H^?L3"1ٴ4{ %ZfZ܅-sy}6'< {7kk ѣ⇨h1~zDhhl&o!Z YM8b }۬n hjƤbyR]SD&}D6c],v>uGHby3cCzv.zRxPS9*$gԝ@a6; ޮGB)Dm4kt09"lj~[x4Z)&rg6c><lIS+q'a 88-Tr`% :2!`X }A{1K2 69K7Փ^r`x=mgD!7yN&P'n1%hr,Z I 6ځVDo/kfFKreyB(?߀##qaUpWW#X^~Ŭf+`z5|R *s[_5[E &B C07l0 \pJp$V}T*^I)bbK[ZtxЀ@HfD8W6 39넟"w11X|mwC؆ۿ|C1t o*n DieMkWe4|9ОcFխ*-y1$&.c2F>-[c^*=2is_*I~ :Ow9Xnπ8QX(/ _>%R@fbP2?懧Q/wXB y5Fq/BcP5H$bB˕Z [U]͘NnN8VŸr*{XN&d n|p?ᙗvFfOQM jSۈ`c'X0xEC[GH9z%ח5mX l6<T2G-@yQ4v)ஞ%D(iq",\E#KDm-I]?\HRibHj멍<#[ӳ]\G'=$V>,ܸWW{pg@H}Z9u.ij>yI KvlGXusAt/TDq)vëf)fZjp_|^OLjhJINZǕ(-n)'][Yk)5@?*MSEjk)BQFNVew2^3,]D~WE,fK7iG P{=@<*+Ǽ 5rJ%IuJL훏`&cKB6dqӠ؂2K^/E$ i*k5:D,2`0zLޝ*}:u՜Nٳ79-lpf:weB &n!K++p8^.w*IX\a]uDŒ1k@~P +‹0c] Q:@'פC3H>QW9}D`:_|`!@2?,# +0N1Ǘ{͇Nt{Ckcw7};۴CIjbA=L4!<3\ᇃq":6s8>/0uA ƕj_EX #듅ԡ.~ٸnj"lJNkf1Z<҅4ӸQ@?o%3~y` o/N!j$ðcW8hIW >Z{(Y~(;SNM(lBvYCb'c{A6xw?BYT8w9'8^87:egzm}[Tڤ|6UPo%W)jC!:CVObVCÆ#RlN0.,Ok5g%>*WedAp|- rrDqBh p_j MryҊNsP33o&d.yOZ౮S! ӧ _ S0`e<<ё_񗫼Lr&Ӄi}Ų*jė!m01Ou1Yu$>2w9,xNEY>9R0(}8v7L‡ n(mhBZRA*"Sz@C0GPǹR 'OebՔv6 3+5! yӋ$݉lu$GaHjU'ή@!zmx2te_}'p ҺŔ3,4d\?V!(YF_U&laI~Xb@uva#oSjU!` yA/!%~xU]X|R܀[ =K6 ;9CRvR21j" ʛV$ncn u}Qpԇ Y>M43vO.eSu5QF zMM#L\ӅV['& {BX6sVBaq?=t+S]lTs 1%TWb< aYa@w-q? ڹKܷ7 TPȉVnty3[`1#mK~˱9h>g4殱-KuKwސEz/%Nxy]ȬJ~IiGicԫ5Cb=sC0//؇//ߓ_c !FڞlZVwNDe󷛌\ؚ λ2j' EhMtǛG 7@J/h}<=/jXVF1P2Z=xqJt@n<]i/wXt0{"l "Yoz^}X"=Ha.-,JSD|5=LܳGDy e,)Lo$ ,~_[?1*er (% Xpusz$޳2Pϡh h5R;=7ImAz-퍆{9efܱ*UЯ!4^X$ܐ u%RY!pHEo^ßyI{tAB maٶoFmrOBٳ[ dž)(U tl{?ӢQDyd@c}K"pA0m^6g IPЉ{2S˲f ջ[z[a+;y\P2a./Cv\Jy,RBty]Q; MFp -X IwMhQpbT'8FE)hw=gt3Dc_0otE1sMO,oTkն g)y8x&*)1[;pjK.@21nۇD17 +q.ZNnhw#dtV/c8SV l-[W=#b\n5qvFmmYn4!AMe6t_Hj ^m LUEF8,nty0vP(byESM s׀}5~YoL"ҎS p&1rRۈYxN{ ~ǩ,4*@%,#1~ N']_MY1Os#Mj:X xԣS@I?@@6ΫφL͟|Aǘ6%۬K2L Oܱo5C^> >0hB^cPv+ <>Rk-,;2 5UgUN-CW/j!VfEӁ!r5f53< "9["f^o--sse\.5V(uJhx < ߎ G MG23a[9B-#k6L]E ^ٷ̈́NwN2yI^ o&.MWdl:C̩tS#z3u/G%oߔy0Uo-<0' S)L%S{ b55;h>H1:1 Esf*%#1X)DBKMwj* ^Ȼ?kX}!/Pcug#tFݨ!22ĥU 6Pj\ƨ1 Vs{a_WthAXEQ =0FNޑQzxې8mtQufn]t0t$N(䬶gqpOf^p@)]=SY$ XhІ`m)wX[G +b/CV0[i+Lѥ _n^n|`h1@RKxuW_wXkx#L:'6L ^.%tGnMWLӗ؂Rw,=AFR17n\~ѬcĀR݁*ү#zֱJ^u ͬ"Em[ 8!90hn.B ssf$>8v4]>/2>  n|7davV:cnϢ0DVQZs$P祬O@5ZW<% 2LBVv4&-i$,6%{OW=CK/%>}jNae"/kP!8h[N(gAC.\(Wh4yF:[x |݅7o."aHh ˎ-yՒûHCMb|Ϳ@,2DoXȻPk YݠWgEZa\+c]t D.3:mJ$_J5,vZ[omhtM-+ J Mg v+v䍊p*n!Nsl1 p<@  QF f:(‘3%9*}Jhn{;%e.Zb0 HD('c;ւvN˽Ghk,(>VBN*W2wz2WQ0a^ae2QLϴcvnBc_c!~Ho͡A*zfp7A~@VƎf&^H=Gd V;/t,3ץY׬=3=I sj?V ׂoR=P:`V z_shE+wNH1t[!N{#NYIt @_"j,f\RKR-eTA=F`2ߘ; 3 g5\rQ7j\D j^x!S[`6$ jwh,w~z!i7d3 IN2kKK:-v/UMy;e[Lg'Oœw!=zvY p0H+qە#:RH5d`0&}Ϟn5+*$Wa딆dC XJ{l؁uaX ŀ>%6)Л'Qg9p>uRI# e 4N;Q"!x uX0ن2P"eB7glënGğvV_z!Nv%gX- 3{CJsl(䥏YRȦG]qܰ;:D%oM?lr<vڰjٔ)ڱ ]3u>BFncO :"iq?oqce(' Iѻ'uDi5oA;"Z؃8::ܡBGKLemLvj R-SULr G\x"Ĩa#B)Y*M*-Xu$ovгBlrӮ豯@B<t^CV2})\VEZ$KOe ^imy*²kSbD]턲l$gpZ&@c:|Wh5@>y<ȂY@P"Nt.Cƞ=·|Rqҽ[EA:NGr'?(9=2}.o x0[G-.V[Iâraj#3FzRUZMβ?!S-k8Oȥ;I$wNCo+k\ZM rJYą{,ix sM@Z~7D rz o >npmKp*dzeQ<bRE(Vey6Z:W>Dſ X! ;UnWHV*~[8!F_w!묄mT1+X DB_e[Z)B6pb7@Ä$Ի1F-"\qV.L#Ak䁦5ow/qu5Lh}ٿ3 Njq `;bOZW^#ݕ/Չ]8,*܄#q,=Í9h*W0`^ʽbC"w1b*_ 0B.swwK/ Ȃ< |{CU:d}#2͞mw%2WfptM[w&'<g90vhލ͘st%> @3!f=ԮŷZtaW Y%vaxޯHySp=2# 89Twmz)>g*l $Ig3}Է=bd!k){ :0gm~ϵB/f|֩poq5+.*~X?:/)Oۗ\nxxJdK~\V]35+iS<-mZ>z{DK%וïzC )޼|Ν 3(*kpؙC"">G 2<<5t:o3mvVF p/ёٛdlt]isKl1t'*-RaȮbg4= _L_4GM)-g6++ ^4Q-(r&h$%,:[+v9fũ[ w3ʬ^v꧈ .[Hl~?';3G"u .^"/@9AW:p`si flu IjtJ b0(yJ@XdOKSozz'M(oRqq)k#dWCD|0iB(X7G}ϓrC}7+*˝y3ݩ]5D_o^rJ(ӓl#m 5x0i ('xJQ /;A_>˷-@)E8x%)+%88dJ)N/!L:j?% ED${{шq@88A~~uDۋ &[:^˜¾ĥ<6-w~rDG%ߪח,hq%)chBjb:k:K]/v^K<4ua (fئUhi]S˃ӰfbBbbwbni!ƣN5O:tNI}:&kK9F'Nl~x' ?^k#abƁl?,v *bA+NGfK Q=i%ٗO>C(^gUK>,6WR2{to/Dcv;;OmI+3DHfh҇\\{05[Md2:[@`9?DD#'Usܺ1&dG}#M #KhIVC7^W"f讑b3 tL$ez$RD:tƴ  8SkzYcho -q\͉e ΰ+ajt-=N@Rb]'ζƆh?_ѳW ̉_\|+[s^ͯS^JbY8gTtւqpuCS KJZԜ=}a>7bHmB#D ._w#W<`Dy0E`[TC k w 0j 8X*^39]:FjqkH |8QLk2rM OyZp e&LO{rvWPE`o,lqXӺ 0o ,N.2(G0 ksgԶ7dޫ VEͦZ[ F~`~<ٴ1H#t͊2T(?#π>T9_RR7]׌'tKW29faL@S0}ɟ݊.^ .ĪUA2|˃kn4#^&ZH.if/ިMBGliR3l^$ۆ3ض[YUA9I81iN \]JZ̻aLj[]e:XH'ʃ `c:ғNuknA,Ρ߮,mD B~JSБEix<H57f]ADi~<ܰ=^QE+Ts8yd8է+WheJtFuL%Df:-<:|$Q%y٪g._w Xy{6u§WT2q۰ׄܕaujjbGHi))(g:e ݓ.KïI;?׍M{ٴH@-fx ڵ;g:=\{ruc5'BnW=&^%8f[.ȝbUyUl=gGVjorжm2ļѝ=ݿ/cͻaǣuFT*s!n+NAwN֥Ej%kpDSφȓ,O/z(XM$1SoΦ<4pqFXA\\]Eo>$B1};y?-57݌*2>`Lن0?&kU S߿0`lpz}^qI^o_؆VUz3"C49]4A+QE)<`n7*$I8b``DQ[q:VgkY>jͤ:XhDX=*'k ,<9 >ثgj搬Lr*24 ^%3__' +טm@ɃÃ7h(q=>{դR{}#{_twІg|CVqekH A^+:d92!yK AlY:VPa茖q>G%""V"(EU ׻wYi=y~q#Ig~hIˇ RG#qYz%څD|}̌~b e/04np\)~\`؆g3R$qW\MO羱{M~6j\ީE]sg{j^9jњ@-KDo5D(:R6FɐF뜀(?4U| 1rp8[]:7L~UmJ-`TW$o<+[rdAic Y(&O)~ ¼*5)=4gX^Fe{)$Sqqѧem4(=AԳʒ;^U"YL7+N7D>viB[e{01mñR.)?Rq\`i%ҍ1OwxPMۿu)TMY1Gkӛ=8 c^l'n͵ҋWHwhH+öIp^#,))pu r@RE?&!M'eߦXcwM<m5[[pL½1դedG>贲|#a6%[.SЦ#VnVQ6E,ta(YwW[U dz!HMA:[]Y57*1_'bY~a!m'.)1{ݷ_~8VL\`@;z C~Trإ爎= ђ1[y#=AT[ڛ4˃@y018Ynq>Beva g=gƗ0Le­e]~0=k>\4NMi / /6ᔯ} %CI| gp':0WqN#kM;/wϷ/ȄbobmPVAF9m G5 !} !QNGELbP'څIy-Ե8 [mΪct}@MSJSd=',K%)fܨc; KzZy;F.]OobP  c$׏; }&C?n|0@p6Axu] rӽ4*a9LIͲ֪6̀޳G} y@#̀'8E2gX|¢' qU:֜5 VEٚ  yGI@OwRsuΏ 6DT`~t~.@T`8}',?۶'6l_ZI,|UftFsz+?q{~&EtW;¶.L5sqt_~og YRAl"\4|E[l)-c)>JDSqtxRQjn$Tfseį6eK=:R"_yZϩ]c)ֵ wJov[&dnW0+є.P6e{)nip hdZ*eXC35ƱUi+#f)k\*:.{r|s&`[yXm(Z~#%d7#5)Q 0 [#2:;SmUrm.&Lʏx)7?P+M7$ƥ.Y0)\DZK|Eټ9z5}L5#E+ӝ WN46Z:^}#'q<`yB#R*Ya̯6ukAʚ<˄+@;>hjs(پ\G=&(I4; n i_tKF'Y˸XmV6)= N_MR:.2j"OHr3Xq=N!rI@D)qcu6/ ^X~dp&9HD0Ã;GA6x>&m8}ߑ~fƳ\Ns[NVCQGH-X:H=K+F-Τ/aĸ^U!B1_`TT\jl(D!)׹Φ ] Æ~Sr줍YT%C-F* ·p r9T;#;K*-$5ns#LkVz](!^pZ?s;a0S 8/whHq " cq{Z,PGK3N$fzл [)b-5+mlH$| tWZG7KՊ\Q0])ˌآW% gxکavq򰹕nH(g(H){ju]3 -UvUu*F"n?ֱ=K[x^]σ`Cs%W{p6/[ZG$ aNnܵqolOH׬3N@cAZTN_p;yN8^ 3ɷ0<(O1_~!R0w+tNS3Ao,NDoz#1T GV]K9`F+'uyL ᳼Lς.hWH~_ںr"2o\uNI:2Y/W/ۭrS_K X'._T8ubw _"OR`N6 /M8 .bc $A,*ecn cljrtoa#,T{GVo?F'r?R<8|5~^ Dgѩ'v] m-EWq#X+nsz >;С/ &pjC-50x:$Zc#K*2!VRc.8M@kr`1pfYpDk"B$"݄U@w3189G(bK)rX6:1̌nJt^Yer!H-MA,1ߕ"Nvx-5knÃ394G|1mv~Tn7p"5՛"(^Kd't?L'/0D :38ݩŲ4]yxڝ*N$qckvsc`" TU9Sj'h;[Y '[!Jh? ln殤ejqv/q*4`IR^RA4NɍƜ<<ITC.&MbׯV;B5+R|5n$ՙ8awvQVS*K;WpStNRF>)^5,qb}8d_hRJpi~F0̗>s4%z|qX~(lqڴpsڰ9"?,G9y 8 rEZ`^\tZdR7[A;Wp%!rv~K)DuV쬜O(%Vb14߽Rpb.MܱI쩨'ys2k!mZfD;?BniZȸ*|.`o`//MR*mFQHj ~yd kԪ1*=O?}Ι'"_շ4}~Fhkv9Dgqk<ɌuǠM6H<0ѧMsK٨Zh)Q3a\!:uIyx J$L:>ɦmv'?:9c(r*S70U-`'cZ1 S;FH `pH7e~=f7aޑ޸*[X^-:1qFW;i%HbfAQadHE̴\8$ȐA*eK& AO%"ˣ;&O{-͐/3!App-ts+t M&g@GTn4Zq0|{H*cyN?d::5DnFNbJ jKw(u>Ϙ oSu %=M=+n<;ctZ 1F"d[G2/ٴ[{: 7%KƾbGZ.@ܪU XUmJZ2)ӌW}MJE՜=Yȁi?b?I'6pԘ΋t{6>}PDވb\Ta'x˺~ƛ;+*fPY|/ԙڣ-%Qby@ƦyQՃ6 XB}T9?\_:PP Q%%X!(HU= Wd%B 51秏E J9CH}aTŸ}tI<}pr.YsY2ncLĚJDfX}ם5_ h1G|A~lFs&M-AGb|!s{c!h;XllF8SNJ3d65.O*z0k *(ٚU'cJo ׈C~z`Y+E)( zWF~LT@H0 e )3Mfo@VApS9TT5̜| x*"9֐IV^=9ڱtS';CsŘ\nZ-ݸDD(]\gF/i!j"5t>Jcԋ a:xn,RL`gҚؐOX"9\6Xm#j`K q'FPǥ6B_m$̄ܩ`d&bGK=o/ `1mkզqiGsbGc7ރ'ahvإŞGGuKU*ÅZ$OwɦO]du,>WKE>Zr#DP| *Ϫ`eZ$:Da+](f2ֳ_73* NtLly\jVzW{a"Vwd)2 4|%d q˹=+L)l,=<$r ?,Ebt;742ݸ Zʔ߳<ăSY+% X@ 7V^ښ2\d17*4YZȦf4׬h̉Rvgd;B9MB`MX8R^l]h'+:|?OK`369h'-GO.omu Xzr9gfek= AQfIN7TL"n❚v @/:(x·%&|K,Ap=C ?34/I\wcO` 1z3RBMddh~T{(pY-Ȫ6T/oFr)Oȝ` w {L&T+#]]oqxVLopiL1o7nc&Fs+"XN@":'~;^!H9fۅ)P&wK L6XzL}̍}rpŝr}s0pf} VZ<)G2UΦڦh쯵*!L` JН; Om/>_xC6}V?<؅\~ /6.c'0nM׍ފ~|etׄNGG0eS Ug)-}(â[ 1jaoVX(sBfػT5\TK+Yԡ2] R 3oGukܯ~tg.قmc>́!gE?3jC S˵U6 1h+9SEQ#OU{aưz")% 1=1 p򘁒(,ɼtF'~haælW=-b}K)"=Sx Á2N$|i^]~;^^oJ`=ey[pK,9:L1EZHƌ QЯ-^&-bw"t@z!hg š1Y\ .xܲaJ #o>QWYi\K'4`*N7|#| KnQ./U K~!FwijznZD/F}r1~EW])r(FlHQH)hMnISp@H 7[^Ud)ZO4pjb p6,~g}CO20"p8fM\eov!{^N6O,Q#mvV!U63bp#%Q[EDj@/Qw>uk Y cc[1j2 nOch%3`S.shw$Jl> 25]k4sv߃UZdj)8t ^ym!4f^*t 0t %Mέ:< FӲ5%ۅsW3BƀĄ4r3n 8NtitKz_d#iXЯՈ5K4GGQӾT٥5 j|\} 3g uUj/RsPB 3Y!Ҵ8X4Amg(dB1E f`"֕  1!}NuU铼u5.zo6 +)a&_Zp_M6JW*E孃7 [R;%ƶF ] %6Xzi$gQIDlZ/}/eCy'u@Jry,=#- #D-@jX%0k-X%- Xmb +ac7z C^啯WQ+m4bXQj_~mG2陸;3暟R9I.sG9TQ7l~9k&UDh~Y_P`h.$]Y%әa;w˗cCұi'Ցfi2]tZoϰ1 e:|XB8QNTudz =]| >,h|l_&"vzVgǓXKtdD=;>_9e%+'홴B̙\@ZG=V7|5Kȯ`Z}{f&+s*d|-XyLݝig-?on KY>#7Ms d&OxS`*~pRCdMї\G>=-KZr06:N9R*|R>z]A0Ɲ ﮦ`({6,=OvؚV&;hca*w,LI?uG4~[ ~5$Vbc܅?!C*:o7m47p5/Ȅm[a5xԟs~fuׇ's bZ/z /G8ǵf6Rs=1vG!&ka;"w Ȓ1tt 74ˣ.lB(wԌf: EݒtFa8Pu?՗Yu>ˇ;_ 9 S2)[2ˍ%<Q<'^ߛ8aVd /?dC$4b(:-boc%-?;$nej$kcd'.I_ =#J>[ s%hgfTo)8oK +\MZfqQڽ|b|>n;09W^Rσ}aEpn`A{+V(ÎCMh+M#i{Kď&FL18k[(u3޶;OL*AcS?X1--d6o0soSU0YY!ڞXː ȑ1Fշra)x`㕑!^O󱶥L^c\OF LicO1(>B}Hڮ'2F:lǮnžZ/zy4 )842t`^GayLnbo5B/6b+2zp}C7d߬0Jŷa؜\^2/+MHt#g-sl }C[.8l FT[d_htuJ6a3RJӋ|3گ6AENS:ewW gLFx y1 /f |wu@Z )kRq `/Cd $2Wp207b1x3 gkUcP (.?SlфX \r Z=މ1nFE/IF>)Z5`y"hbJ3JWMOt\t">U-@+6,$mɮ"rz=! R3݌^ +lщ_/!KG"ʖxH ur;6! WE{ҷM($΀ϨJYɘz!m%vK[&sܳ:$< >jXUN H͋$ѳoqK>4} 0 -"ԻU] Z:~ɑ-WLr*_|^֭S!AxƵQ?S=s17i on BP$ ' [ 0@hmaNV71=ZꐅYEZ( q*Ÿ79Np[?v;XB  ѳl|m0c$ 1eGZ~2C7heà;:V=4Pd5JrP*ٵ݄ˬ^xak%;µAKEO|罸LV$@ɛdDub:R&ݶORvM7矍;a߱/ |4 % !VuB̒h:qt,Όe̍N3,䟤REXLл\9b%Cm=hd;^!A&NOH9do[ Վݫ =mlQxUDhOL"{JX|P]r!Ku5hǑ޻Hk~uv=vnzOqGյ2JRԆYRG=N] 6ޔ,@r\kZ/wz3oHtbU fWpc>Li4ptd JvuJR؞wK6'!̸B÷ߨˆGQV:A _w#5n !FE<4_? ђzVn8>af~)$. _R)LBU|{l.?`Frл^ <60*;x 4 OyjŒY؇ =\0jjQ7)Kzɷ& j~tX}؅[]jT>X)g jln0E q2Yi&-[}ܙyX׳R;_o;壒7&T!|vܤ,o qXuvs;FW~?NwȣBX+}Es@>0gF5^c{YO"IhMF@BT1XOds31L$v%t 3$NI= Fzw|$h-"]nAl~9hȮ>0#IE.r|$#.)|PHa~%]VM1P6ڹJ'}!Feoo;V M)J؈{쇖ڑPV@|Zq]݋ p[(eCheIX\ ˀJc[[4eIqlQ|_CF9P%)ϵ$ =NbyhKpC\o= Ҫ-=s&W (2>Ь&o#R%*+\1s{2&{c #c1P_QΑ.DONkTڍͿRWKG 4\v2P޿ sz=?}rԥ XͫTG%7'+ry-3\e嬗!c<:J45].} %(>f& I 5I3bb}=M`<y:>v |D}fue .0x)F5 ^m㋯{{-W!6 CE{!{ 1G"W?`xi՟{V:q i8srT= uX=y z[uߔfLk'jdZl-* $5?顪%l ՚ {,F=n[ )Ҝ /(c N'[CjYx(fo'v8vDTBA_&:9$ ,X?7X3/ߧG)fl΄}z-vu`Yu{iU@LZ`[l7BLH&&2<?7_[Hw_2{bމ:/P,LϮƢG i nYm ғr'DV hq2\|cB7.[W_5Qc;#d )>6KAmZk@ cBlaWh-Qi*OK`M`b( CY 8VBtH'Z-LڈA^/\? z\E'=$bg) Ox/#F$-`D@ũD׹;zJC L.ڶzmׄ6ɕ6lpl=/e*'|`#d2V<CX0`<xh/@\hcpPrF#q7(~Z &Jr4GP`tnqܰfӻzTm~*Y@Mܪ0_6D;>42ɸd2WkKZ(à6 J{Xg5ތCsՙ۹}WlAouTJ3eAÝ:pAvcLyB&۪i\{46c=M'wRɶǯxԶ9hJO/ E;*cR.},mR>mU$:T[{Ƀ˄3q¦E*iGs'谚n2(rH㆟nMXZ9JoR"ʾ@#۴3WjJ j䁏|2 f2X%>֖ZBLt /G%dv1l6%^]Kn:Jnf)_>Hra:OEtij.[l=nD{WnU~ier)+&?g79J8ˤ%b=R 0hF€!wxR tR V.a]k<Udd}J'77&`KTJfb!c| | 0AmkѢP<2[v!*շ%SY˗l磔m&9\ʯfg'{!&wϫ"ƼvGsI6iu!_|K{KQ1^#OrҙAºK8Sـ,pu@늒FN M1 O,)'|AʼnKhǜGשc*9%Y?hyRs|@$)q"i#jΊIWU̥y< +~m 0cyjxF?tHw*[hyl MwIa+AgZc{ujcg*_ڲHJޞ$~/ BƈX\b 5 .{ Ta\RWp oZ[1\oHTm&'}_XR-[+а"3Ã?**(3Ip~+v[6 y,26/%sʷM&|)a/ VО=;7U7⻨%oo0.FwwdOcu-0;&x;ADT# a[`!rtis3/miU׃Y&`\dł {ܧS,sa6<̆I Zo+%pψ{꘻8[& ZWA;ťWI?Ɋ Pr t2Epk~WQֹwi>o㹴e@Voc4i% }j6@צL4ˬ;c5'ȁ"dd0v+oE[sjJ58E{7Q.69\:Ȯeptq?DxlfMb [9*D@i\x(M7ZD?CWNip(No41l Ȟx\?J ShvSسjn_~[@I&S V>Պ _nS 5CTJ[J`xН-4@d4J2e4,$R!/bߢ▅82<}>QWc52s6QmelW^ŲyI|w=Ċe/胬P`fzm6tsȉoq,zauqgyjok ZsV}2^;.# VYmCx/mYyU;6YG%Se&az*df'B `t0"ZsŨ*xe wvpzh2CAt{`ƃl_{**{7C^|ؠ![΅Uٵo"4p >մ5,X?:B #[c턮@L۵_wgBϔ3̣pX(UT6Jt}HW0&1JOvh|y_ӢALNk}&cU/'>M {Fhr}!臑,Q|Z|}lo]K"+["F'< x"X ݽ в!,5U xwQ?mAp_iD,vjUa>*O&Z 'wJeo[ :7:}k EsNQd딅"'? w6o"ྛMdGțXzy$+ȆZ=T_U!i! :{K07Lbb P#pvyg~/L߮V3ɢ/1P{9oJhVBq==D4Kk,8􄶶#̪'NC4 H Kz3r] J#nwx^yˌ( 4d/@~QI A1/(&2kPr. xt SGk͞7EwPPAN[`?:MTBQt|Q2Si58`1cbz) 6e(-'1Wx JN ZD"3,OFSL8`P%6R79}gu`s "-nV*vwē|Uhe:3ƞOĞ{$YPYP 3y O,n 9RD GWF!Tb4čoiJ/Z*|~ яu7/t)鹥~m,I3P}`H^T``FFOW# 0U(WnڝJT :e5V䊽J5t%c$-- #2I܇WL )Tjuqzo'o1< ˯rD%*)~`[{P Uٷ";7;xU4Boe%tm7U$~j%]G]0T˺(pH|ȁ^=?Bڎ0P$QHlV/+A ߨ1NIdZպkeYa%Vf*f NcgN-蝷^jpYwYtBMLM.f"IJ .yrP p"Wٸ‚󄀼}R4Z a"w,N?3eܭdvX]B0ΩCӬ:~2̋+H([g`:f@n<]ҳ"kow?GJ/5I0 {[~7%3ēqA2< aP@in땣q5#?*!?v2UW]xYA!)^0PXˆf&]M]9ն/+An bE H<:>!o;X|F!kv &-.Y^_ 4d]bC}'P}0h6?puN``[]-" :,2Ğ#bZ[Pu:c:X5n냩 fo<{`3Q2:w`J3A; ǵ䟨dܯ=&ڭAWv9Ζ"2..2Kf_xF(jUQt]|O_|ڱ&줉.-")4 iclriLL6 eaqc-,,sϣ¬|="2,iUA+׫!Cϓ@g:r#z߈2:GfʍC7 xlc[lcdueںDA?ѣ/1i$dGq:=9 @n 7acxҩfn|J;ΔeqjscOhns0> o,BpйLrTE\c9I#fY'9x%f1Wd /yQf:fO-G_٤7pua4"]D*ԖT !RI,C9L!ҡR1]KZ!uP\:F!Jfָ`DN1T]V]6?e>lBOE=0@WFcGrzF na얇AFA FL3llwy(8=IA#j3hg/: Me/l7Eh "}JL`";/R`h!K] hKٴ?- wG9!B4!t@[^{7>]* uh[61}m_|)l4 r&F ~]vPv_D x\MEʽ(i%-;2qp8֝#o$5lGvLwj4#7+<R] ;p9=;/t[81^~Q3%|ĪK'S/N?3F0xG/ٛ"6 xQǣ麐4O]k \fa',yeYzיQ.<+ :R0?&1X;15"0%~k&džjl J2͉ WE/M}ڂr.C^d1TةWߏxUe!( q|h_0 i~(]H Pd!nʧ^=NGgPYm_%cI+Bl I#-g rPςO5H)xKk+rQsF&`{ApWB4I%+b6#&P,s[h-XTVd".Yz_z1P&c_ ȸp㐰r8DŸR]":{o6kA䏡bUJeI(h."o3'TuKǦ$乢;6Ksy)8Ò23Xd|4]J ԏuyGbNls.X}} WQYa0W%cQм9an$8 3*ZyaZ~qsJF9U䑘=vfZCSSPiCЗ}钘2*zҸ/z  ``_^$&+%,yq}U-~0rw:e_SZ4m2 )ܹm|Sb+(6;xw3p"*lwH*[׳ Rϫ8daqσh4msٕ֭ڱ{ب^X 0 ގ{Lg)M-qbfٛ\ XK:>4X,W7KQRWWL Q"14Yt ^ 5Ѧ ~heM0[K_ -0%u_ l R; d=AgL@x>98b8i](O', 7FuߪWoZT;Xt6M Bm)D.!Rg$c&=w;+="&[Fg;HK`ukdb"UTRknPʇ Mo!65AJ,,/5(jP'm-I1l`*52{ٕ-\%1m"6g4Ij-ޠ͇fZgCtƑ4LgdxzW3 &8=z\sΏlFϗ5$*..u,]k_5wd8cV^> cgYXZ~,UYEꆯ!I%p=Tb(2䛣zM|pH$'ҏcy+tZw5۽'m4Qx(vEH )V_cFklVn í'E>5wA|/)F.jF ,کuUx7Ʉ#+7.b0 uf|A6]fB ԇNt'/o%]Ͻzh:a<̢@AHK]b_ #י.VngjǼP4"gS#!޵[*髑SG.8ܳΊi.9cP6߳>LfȎu4ױDںΎs,G%B .ݠhk|*GjIEU[_^;db:0%.C?)$*gk`K zDbQ6ZZu<$Q2NҺ/]1I6+pOW% ECpG$]L{| ![L{cyϡD]$h*nm*LWE)X0\)k ́0d(>NY@u{WV̌EAbY~tfno!}CF,aGؕNnՠQg|@s}R]:6ۢ'[G1x #;Q\hhԏTkkg4d}CF˔hLMm8ũ6Rbՙz'^ia4QMњKy%P+v|;Xes362WV;%M +) !Ѥ6@T!e+WD9iɳsːr̸֖)X1$Z1tיKW_ eTXuw$i"R V-\ YlJ8,'n2)^0C^3T|;̍W X,rKO5zd#pZ%ey nZìo2=\FdΝ:#ܜ1$MZhjnr(Gc`}K}:M .COf8zȢ !`1 Y(ȸxiJx8LޓZ)TZ#iǐٚ۳21(fPoZ|hUhI=}?EzM%.i |k>y͑y1,vciHRxepzC%cͧΚz?EP'DZÞfQQG}_GqL'OG&{A9F>"h=׏Wc.亊𔨱GmXr sIA7,*wu/d71aɈU*֡zt~adK Pњy @ywbltĨa4BNAi E=ў m-74"2.#e2:8:HB_}^1T<^5x-8 n jkȮjHFqaryR=ו p1/kݦq~SWMihXw~Wh$^d&|YrNEa }fDTLy82Ͳ0&ŶJ|A08~䎖jM}gG,/=&?-Ψ ǧKzxu[ɺFB UMV&gbW'\^X8[BmWE(${Ч:w2S$U{ko"k|QK)rr b(hF'?awTLRT 44B6h9[dU0e =jYh/;@(YVbR@#=6!㑭[8٥XL)M/ 7& %NEևp$!(>1}`c?*f W%UP<^byP-DH֘2w+Q~$>ZmW PjLcwsl@X~iX\ uw. v+)mv)z3idVX$ˉw,C9Af3L0':(Է'z^1}98j S37K]q ysY˧1?ȳ+8ަtCҩE-+ڴ׈~}xKgXg:[0u9[,`VrYP!lռGy 6=&n+WX$+H*?`6җ}Дחb*R>?T.t<`-nVK`|JP\?a!['JOJ)oR޵[?V8Aޠ労k"Αon<[ZVQc!Q RIE)"(՞5I97-0˧> NٙDI3hדKhi\A5hDk$LޫL\Xn$)H e}lYw(ӫ0-[ rC'_0 K!RS~1hʍui `&).B%K1%UmEt9`}s^NGE1FNmNQQn[>,а(~>'jlǿȌi5R#^ +'Bġڬ)ٱx A EIcIiUJrD:DH[3/qX Q|RM["A8:MRQ hiWg 3 F:tݛOd$){b1e-im3Qx :ʋƑ껏u@1f2u>5ߑdjȸ#ۃ9BeBQ$|c{YLx&IF[! h t֏(5sokbO6ٻGe;ū{.G/i56\괴Fh]JW]˩~ iKșUHE0g{(W>8ȓQ!_dQ|KtL9ջ7yTu`H*]ō_7t 4?K$:=cB߬N5(jfMhi>ShpƓ}: مC9uSz"oqr#o3]%:2=_ *ZHA si~;!~ډPQȠT-n 5 bx@Nl3kxYNC )0Ener!ϥ&dÁM1c_T!l2EAE?ч A#'O," .us-~wNOƹSy8m0Qk- < `rp~[5/T0cH;sh*ٟ*y}jӈm4wdT靮Mb/B̛AmeYqw4no  KijU~W14Dd] \[ߢ,8/1v"g3W%\ݐ£h~oYUFnFEwAQFrhL~1g7p`oxs%Ed6t"kLs0OD* \7"Y   φ;P;_6qSyRv^{PK w\+W;cki&hl8(kn+ke _E]7VB}SP fbJI^e7[o?V qu4ڽ>O&{~&P33`qCdmo!V}\ F~Srx>xKI#'›p&LhȈ{ybæ1Pܳ@tBIY)V<n[€ӈ t?_jWL8aE*>ˆRe"пxZ!QVpk&Q>ڊ>DYnF޴b'*nKI1^Ǫ(Qn״0=YXvm2Jq:w!?ӢZYER)gM: r^Vktҍ`_KـgAɭ 湼}#(wy<$p"d߰n $aW_CI4ROP6Gĵ1}U-xs-Ѽ|T*)܇b9HD', 2(CmxGdWWH%Lc]ƌńL0u=쬰{6r}n1op>6A`TvMW`9CסjTHNʈ^erƧFx)~ۄWYFI.Vq.sDOVxQ(jn٣S*cd/qpҡzCdAQ?|[2C9šikϐ "bxq))ۼ7h|8)`a [u1r5Nh馴A_+&I}Lo&L^c_R[;2YFXk"FDWzѥ9E\TnKt-0XMob'mCqiQƒo]&XX9߇*Bt"u0 ĺ ޥf<<.*dy`FL_o7B:}C*f;vȚ0V }Ywl LZQ|tAjG *`.T{^0~|7seZ ޝ ~G5fCE~{zZm|[`+3 UBΆC67J`Q)Yt0o=TH?Ppoe1;<>:ꦪ趆._Aﯛ6Xy'f/2N`{Y>DBRS| WfeFM|4rXq$o9n3[<;Qv :, ϓ L]ۇzVq*#VЩ $滸Mrڠ&df{{wlx4<6tEi+ v/GpO]U{bIχ5zG~^A_ R5tl=bm0@y$"SQR0tJ#E#cJ?^3=/{;夵~g9D~'t~}wb/bjW=զxZXSbZlW,zE;zVT$`gEYAx_Gx,VCv*kjS?tE |!JD6]Qȧ 8sQLJEp#iٟF6T\ԶG[L퇂Q(C7gs'c8R550(Y 3ujFWO1}_w|&%\gV#caʶ –៾^à@ 47Lbia@hF^=0ln{d!_%V#(qo@͟R9x*^ji_)KPom5ݜo)p [gG~:: U*˂;u#)EG#"&o9ls:Eoڐ:S癌 ƿ0>hG*!TUs">I@zi:Pz]GڬH/ C~JW9%d'ŒJ|:mmUP}cfrHJsDmx$k^ιY|ĵbK74OoJU^D8k*i]l3vPh4,B9^ -hfo^g;<9~ufѱvv|o'H TM'+owl}<"6 RY)Vc)?;M' ΡjB8k$8ڨn*l5{'4I:/SWaFw7M)gr}WZ..'A{3ū`҃Ev:|{. u7st,0{r~(G|-dR":^uÄWɺsl6C|u(.O!D-Ʊ|%dVJ&{o!L8u#p;@SN>kg_(Lɍ@ȯbʫ,-4n؛?OE==o{/ϹDdvC<JT_tnX'g3jC+PuDiW3~Z^gxRKEfb mH2fv^鄍e}Wx>pzh0HNZUW>&pq &)񱔛p#a PF0L=>!xMd$@1 a_ֈwF4$htMQL9%{]XgHL TkQau| Ϝ+j E;C^5/_! :/LJFQ)yqSPd@*dՠTC>ҦSߘ3Ut1I6ޣ׽?J\wvpR*:]1Uuu7NZ{k>a+A5P(@y$qk}/B!N&pƷɆ;zOİo$%G ST'=Fݚ\HC↑V>7eۚ kʤ _<}:>O蠿"k}KR Շ($4}JL9s5K RT%2/E4mP eK'|9 R=J h%Fcv+c 53.H@DݱLe㖋90p:w@^cHK]Drê%L,p7YD#_UW領pvO=%AnBȊ;uYh{wUlvuq<%3ˁ6V<:A+Ba\;*|%/pI?EoDma+>џ[;e)y:{.3ĤP67%Mkk[2򚑗LsrثGVuE^򡈰;j+S/DKTU8Aa$JM(;7wUBbƻ :0҇vښ͖zN4@o8Jy -5OCyf*Uh 9{*Y%H׭Jb0\V2(dp6xf)I^fXkb,uɋ@j50JY[o^]%V.A֖' BpHʅ !CN *-Ā 4薕}$iN)F/&iE*=jiY&qNav< QO'{N4残^jO}A,ޣqU׶O[@&OތH˻hoOLf㬡*4wNJYq-kNAn]Oblj%ɠl |[' ˊVѢ6WlO*n|̓ ;|( itu@1H-T(!"S-'SxE2h5kd$]gIW;`Fh T, md.q#6TH^%; Resyey\RAIWO^dy* dkhG$R6 x[;2i u'Y%8N3k|Gw 3Ha3}Vzk|jYƩ^,^!-.,uȃ~N)<mj vF-XmugGЫrz>ɢtЫB0 9@78&Eh\Lf#{=aѺ?jr7\#CdZ-;A43ٿ+k84d[b1Ϡ2(=r鎳A,@9|Э.O1C4(c'D-Pw(M5[4417؂JhBwO^Wub&Nj;A d-ZG%s ; eٛZʐq<4#L(|ys :{_gN^7r퉤>ڛ >8O5f􎼀%/YC *ŗk a11;.a/f҃˧F`UtyEgi@J]2udJ*UrRLcgn*Z^?|FS ǐfoupRחΗ]nW= bv"iMѢ3 ]>nF\,?:U-~l)YnF>3f\XP:K 8 VKic&;jsبТ׽A*ºB6YgK22V|;)nA{Ƃ؟@1s? IߡXCmKdMwnX̩)X}v<%xgT.ٸX%w(spG9n?uFDsK B@p}蚹aN B{ϗZ0Iw@pZ4GS}-۰8%*9W I3inI^wpD3;p]K ŰՍR((Е/;7EJ/3bI{;ߏVD13jS6y`cG^4w NjyϏ&~i:]A $ml¤RXf"Lay7GCՈQ_[H<)@ӢNN1G]nq:Pt{o+S2@ojhU >[`p'#@Bdkn(tOl5%<@Sk=aQ%|ݧRKF=⺫6CZ_hz <5.Sx#!)GɇK7ÇЦh3%g )twfz2T 'iꆅk!B"^?lm < #exΦZ;t;TZu&Z['+&זt߱LL};צ2@2c&*?'BԽ]nSNP$Lxt<7+3jqY4'[;8%fRIwWm,=oBM8sQ&Lq q)Nr^k8`Wa&_k?lAgH2_u \(@z KT[LXts}8B!8y f\VnvszSoɗ< )V f4ÇAFJƷ"1;ҪU7cE&6 J։ELt, n0Lld1a눛okd/\ܗ׹65Z)pNwF|,e3r(?RTwc929?WKL.~)m?Ql2i20ḍ|'9(@hN3~DqYoJ(#QijBtZ#A"Q\PE"$ؔmIsI1կ/x}bv$g|)M_>vz}&xHZ?LX& D!^U׏sF%jW3G21zC*Ʋ%f2 :_\뛄ݲ͈n@_ҡ/<\:s Ħ +$!o*W_iq@ ~ޒd9iOetc3.m4C6(q? l0}\Nx@?p`)5_4 D%tڴZEx1,k¿Ǎ?*z¿Qwѿ_϶třŦ(LF,T1 y ~_ލ5??y:n&.Gyx 1FXJ 4Yu#,v*j&NYm}.B?`cFǀ9]fZr6HQk#]%N.R3߷O|bC|\ /& 8`;/l9[I''GvWVݲ._j=imAzaR[ɲMQia!~! >@K)ڦ1۰T]+Nd| A2xL8 YJ#uZgzp0S@6#Rx"^d  |nj٨) ,~+*7 /c`6@DZø^ѰN!rj39dɎ\$r_՟.R/gܴw'Ym-SlkH_:rٜ~ e^) oWċ: v*ʁV;1%@8)Bl߶Zvn0t;~4jsK(I9=nv;xb.FH$bBD'mbS(PcDΪ) 2 . ١-5P&_ 7!;Ps&mBARԧ29t%w:$HĀMRꪬVulٶ~r$Kp0];X'cϗZ+jCA] %f݆dWJc n?Ĝ@+jiМMFѤ1jF悞s[z# Gg9CLY]#;╼8T]"xs@opD+xdS=RЀK1;ZSi83 D_ĒF"~<iω@_)B%[&K=cɭ9 H|̹5馥o-'/:C "9q&VI!o፡ 畆iN&<Ǡ.LCRg&,W"*(jQϠ(=O-\* tuU.S_m3Ny_&sR;. e8iןǝ(&XXlUц%.`R`_KFnZ7  >_jnzcVT{>KtER4CBsQйECYG?R͗ۘ")Q+.w赒OBc7[D:I8Es;=V'—5 SjtcdS#3 \.\Y%pز0F:î@}T7VDJ۠H+O[;iGɶw0k ܿbssZ`NETM0;wmgi;P8ҙgiVŻ%KjeXWnD%)5jO<_ aji8]džZvb7ħ]ٗ-/lh&RIMw |p1Hs"DR#h!"n n99{o>ڳT͉w+6pX|ǐJd`p)ϛ% q&mhDR49wDՊؚh rrBw؆fa>D69W |lKi䩍^ŗ#ZϚɪ|dv9UfYp#^Z/ pW/Tϸj۪-V&iB[$._( ^ 290fOsApRp3' G6$@wӋW j4i&V%CK?/0`"/6GJUٳn; xn[|V͟K:_TP߱'[EK~?~EH ,ʕ6]2oߜ`p$*t5Xc7%<۴3(% V0esgx6CU}SRKM!!6m糙]5I&Q}AvRk"K {o'eSXq^d &l!`XKciiE';3u0C-T_-2x@s0kkna<ÑYM tЄEmZ"`)mCfknU<-$7'48i/K8ImhWk0zE8yߦHx()8U|%v%>":J-PG^aZ{U޽;Z\@sA."/TZThʈk,p\hAqVQ:exⓩL&f*V.f=' lr݈àW/@?*Ec$P(ؠUݺ<+a|ԴYҭJ6E+|>Z[-*f {8SlR 6';cEǦ#Шʈl(G%^_!9Ν[݁Kh5E̫mC?BZd^8M(f5,C@ =E}gDَ {;,.O2D5XX(9U Qk CZk_Se%VT@BE")C)Շq=)Uvr%ѓьAn#Zo/L,N@%e+#v1(i`:#e0,W"`C<^*.:11<#UI3׻=Y)}oH\ȕmb@T_Ir(`P(#*$x4IcסC3둽rџkƢAjxϦrתY+3"{ '(#T/4 f.HW=5ǡ"t՜n GFG'_<&g$2]?0٤8|M0k`tA+4vmhB  Eei_4 ` ٨dGwI1M2Dj0G ڙj2,l{ (kK5vz Uբگ~Fkt1׹ mCRR뮫z乲 {pjj[4:ؐkLD Y|}Σb]p-r-F”e,`(K'9|#;F5dpR]_oO B X~XOhYiW[4NG.;&vCiiӕt]YW&3:#!%Fc.*,;[nuB3=֒ Y-@5lt#lS'ϸt % |94Ԇ|.3}V( Y^hw4`x ڜpAs}2{}-?^cv_<񬧠q0|4Mi۾WbLv$+ ڀFWM )x[r=\|(Zu|) O8CIYMKw_|V/[U37me&Cg? f܅8ϷhTWJ&8"lmu"euCH$ Jw_GnZL^BC %Dž5:ݺBEާV;c\slOq5.OWʃb"B_gaM.οga=ܡj0BQ/f󉬓/g#{njeàZO)Q1?.OEfFr ^٩`z&NL=r)QN\y)_yrw1HUFl cS8wPTK^ < ,ddKbǕz XIve7CrrS|y 'ik92ԙiMU? )c*͂5*)ptl僆+/;O? 6HnNȞ>ա?%ub $rj؂)6gazUW=YJ&}mn=Ҳ֡m*1Q>=BNt#e:s]FikS?ST`onk]A(ց@2r Qձ}QOX֟95K.& 5C/߬lQj9 o\تAKIa:u/,S~QEpK۾8L{q9d[UtZf-fLc&vYxjm d]rhu*i宎 ˕Z6P-M H}?S8Kǔp eab NH(-!מ3OҎC&2@o a/%#lȚ%6%;e C$oEk1,z|s*.`\IDP:^ s)!^Vل-Dt;+0M1NV=D[s b֓1pسa4?`rmpD-][>t #eO~82Ǟ5Et&nڌ acOFF&S0yJ&x!fo0R#r{7N p#GbPĕ^P;ÇR?+u]?"ӬÌB&'unJ՜ۇ8 kq6&E^PNJ"NaGP~ף=KÅ8OQؔw$[&¶5x*&ֻ+谗S\áL^kAnfj ]΃Ċְe5 dgStV!ȷnK軒$cg~;"J W[w*/c9>f$EFd{6+u9c})alS7uoQ7ZH} .! _Gq kNM6 M\L(g)pA&>ɋmZ6U#FO߀R;`[|Ufz\oiZ&L+Eor.hSw: 5|g?Te[{Qa}Q>M)J)j؟Sz\N P"\ӂ2 &rcNUGQ( m+.yU2qqed[[~nQAG8{?֥^ 1VOdQ>l(֡2G@Nء B?&4uRDkO:tm?Vi?L#d% kށQ69Jː!QEVQA*x-+]plj"ܒ= qZ7,>XM= ˤRl7WK#>B@MϛL]դ*JMP KhBA+ӁC^1šm$LtE=saP+~9)}Nm96('y:%omQd(ǺH$@vfD$cb&ɣEYGЈ?ѵ ۃw= wj7y 0LĊ"eA;L#AG_Dc˔-*xS-QЫ[Sڲw{ӧPǶ=G|߇&)6.$Ak"5/3A^=y&"':i@&J'iBdjUnos#&x󱤄$|IG\HɻhV 7*ArW*Mji K&<c2}ib O1r$_v?{n&AĵY7p'z5ʩ[ʰ%uh'-AP11+B+ u:ã4\j *|2&I 潀ꡗEvE_/R+Q.ρmBAw>it/ UDJ1˻U_-'_Ip  C466ָ  TbOB =U7sG"}kA1F q_8N⯺(w4kh:ڊ8\$c_ⒸD $5mtfA))]~ $BJ>VXQcv4HK} X+<݊2u\A" bcIŒ"RuxvN2(@B!kp &WpaY>>ޯ'vkQXr›e))3dوʬ&g[Gx_dt/da -Tk’U^qB_BQЄX=g;t`G5ui=i@M`?J! [XԄ^ anfI:24pϐ=idBu]0p*̐)@-at7+/ּ_ hE;+m@MɢJPp珩;W+Fd~zb q!n'_H~#㓀LkYIefb6C/" ,H`n?tSl~{JWϒr @F`3/г5.*lr*a^Z"(a .K.rF}!u{j;*{[:MxMB\S!)hyw&ts'oa)nsT@ӟA*M܎6#iD*Θ9Xabfxꕮٌ6h['>vFQ!Z%hӔ_𐶷=÷/ s:*3p&Y )y)Ȁf;WSJdDKR8dNNetY٫\6t}@dyվOA)I[&9~avvKބg ^[k,IyOΦss) `~; |nZ2CŚC'KNUz~i5g|޶`=ev9bT$DZju(bxpʳ9'D+|ol_9C%fRGX$3Lȣcd:>oo u~50qYRǭt$I+[`} a A3c.OF<鞟8cr<#U;:`8YV}_&K6p{2-ZOֲs- Rx&q`L) qϲ6`Wy1zoX?:}bFJS]6/ǜއĕMgR:4…:{D]!ќMy޺ϝW@ HX RN>NV',nY)wegо?!4-fbbI-pU窅1G1\y{50~*zY} ޾.nʹQ[o1ZGF(3;P=hbF0B8MK]Mei;fr("s%M|a\"/քX}}d\[ FjߤRDe=W >4Q.c 8l hy:t@`бXG뷂ȀƿUnR-.-/aR@&L:ྵJ]~{Q&_n.Sy0XtpdwdK@cJpqkjttmF ' MV6TP^PQ,:EŀwGa%6 7yZL&R3fߦU͋*$pJ[_oOoVcGԃd9=(x^;@O^0h4,5G OJasaOB,4x2ʃʤJ@>QRGB%ZibWv؅="jC3x]ii`)ₜ Ejϣ~IE; 4ʺ;^9KqD4OR̄?\:M=i*F)͘{7ÔC/0  (VCg:B"{ wrycO)wC:@=O5sRm$k -ޖ)ͱam `Clzj9T* @ܣ$t7sU ?Db-&qDü{\Dw dEx4QUq:#,.9ݣM!;LGM' L11yY?XZ?sav Ydio|>l/ҞcDZAQCpQd5aP{%"Sk w욜Js>D> _~HbAB('zYkځt$K(./ӵsM}Ӷ]ә.'-syh7rSLHc0 {WZI؞ET7E4k8J"SM/sbԠ7e2YXQ{T t8; p'8](Jॊƭ߃X|0\-"{2{^| ŤZt{.cf:M5YD-'5.뫷OIqNu<<҃3g8)Anj2hWYm !e7i%FH4&2aN볓aZaZKK!WmԖ2>w;K (" He7/#>4qN ͱYN|wz5BW8?ǘt ʟB bUQD$X &Fb\Z5L^|Pj-W)-f$40 JG+qZ[xYǂll YaG*zZX{'7MW""&uh${. `Z} FPiÅ/iYS 5 o&`2.LM5F~4,곊D2u}gipao#U(xYEsfe_ŷg|̘|L`b8 `2h~ pl냆]~LlxepF U'lD,?L든^ALj)6ٵ );d4 \%|BXn@FYF領p)|G|tZ~-5 )s8pTƴikLO_1Ly (`JMͤe79#]et]3Mȱ:ْz(\*3_[lI3Ll`L% sx'z 7" p-D&ҳ}1 @&nRUNJak憃tOj<'bV (e~kus}Jy==ufIpb*LMro1Xgwiž/I$^Kaݫ_eo͂:f^8P.2iK`Q?|%u~6ˆ,:q@ qi\Jq; p?nHr.7(z`cȡgX|ىuvhMA>IbVj3sZL1ÎtQ֔ kJ+~mew"0( AYűŎXwo/t#NzX_aYCz22vƷ{4Y Zn(n[ELfc8,?L}q\&\ mO;(؈kkR9",H2@Aj+ǒ_୓NCI_ ^|Yk>)^n&X%ks GTkQgᬩR#+REdqv<6bw |{E{WˤJh3L;ES;&ofGOU2D>0|*(挨)nې167Bq48ޠyf6衠.D|R=ůYLe+ (y`>zQv>bЛ6%!^"u k;OJqJ3{gbܿxoͩY>,\)?(@zhd}kUYn5/޸9kaxi"U,l0]\pV"2p'IcidPBRcϱ-Pu q5(MCɛߕev`+q.槧"ۂ#1lUK ˺|JьW~,.'l̓6630v6ZwJnibWˁY.R Zÿɝ zFD O`h'(wcGΰ _2C&OFe,i~Amۦ^qMX4a"5cIcrK-F\! s9۵N=s|,hrٚ_MEu/5^Y=za@VV# GxGU,ZX3+Bo+&*OrOEt6tZYy e}\+w5Q^d Ͷ=E/);8K KalVh/Ftnz 1 RPU=Z}ۋ=`qugh5ptedL\V Ϗ/~gXi543X"ѶHFD@WPh=m)Kӯj&$N2Dd@ܼ'Pt&ࡍ hXaU ,ucx+ލ5g yxUi|ݝ#e;A1di!ψrB7.<ұ|d}=zg]5BgG=fV`}k8e[dfhȁOQ[l#b ߛOH/A!>n^/Z ׬o\2ǚ[yuX1 88 蚅2ZyYIx4 z04&&dtJz @I]s,Ρ흴<4ԭ5`I} u$E_F.QJY< $hIG,adGZxiqaO@ų!.^Vn+0k43;ӣ\þ91EjqV6ir5x YJsL]a^Znv\vw ͙֩H+Vp& ߹&yJ!f%  E.~=rc)f*\P\«Ӭ=TW01o^(A4 d:Z(RzyR,"csͧ] 1A Bڞ] NyDRq`@4yƭ&QOwg-"apT3Sc`pI; q}.-ShGc0 pyA&/!b˩4HTU ['X-mB+{a7s'|~-qcQAw3޸I"nm7; M&oGC~7 \K\Sm7at*(JbNts'㚀%3ײ#vuy;sĆ1n*ZۊS^!fD T0d$pGq5FUi.ӘXߠxPxgEM7(`I-=ǻwvc x'؎WhT.~̥TLq0ZS QjnC⋒8Pm&q;xe] Dk$*/nսWy#-?΍oyT3CKI  z)^1Y ]UēY6,c3NyLDRmY.E.k 1e#Y5 Iҁ}2p-B`@q_Pa3bB9V!?{|Rx!bTKةI(vCa ج ` ހԮkSO2Iߠ %06aU^RW pgUv2ɖ{xHz4okJk$46gdV@b2#aozC&'([?HTǼ"#RsPd֭tG>?c3-au1-@ BxMsJq{wT-YǾW)"M==d&#I[#ywZRHKvk=FWEUtj>tDZ%T ,p64krtHk\?fLu2ܮ=5d8웡 d€d6] NlJM(n{i\ݥGr.җ=>ǎd*BJ,y+gsU{uPr$wgS^<6 wCU<46}Հ\ְh0iR1qpbT>7cf$κ zg+Z5ʪğĶߩ.:`MܕI=p>ˉn;|DCՎ(;*U|,5Գ L-ʈ{Ү K Y+?Nc1_B? (O Zd[g9FfNHD熤V W^Z99~MtC,&4ZM I;,0<]8صA:!r_Hx{0:v5izAX)6D?e4 eF4+bDۖا •PTݳӠf;͎mK y6 7j,2or.|ˊCR(M|çT1.BNps&/dn'}1eDeZĀ'fpGJ6(5 ULu)CGA.rf@@v:Hk₽" *mЅ&8T ̯,j1(CpnP?7\?S~Qk<;49"@IK^U[ N.1j3$L#jAH&J.4Mc諧kEe\)>z`߰֏O.#A֪8n-ό$炋e`lОgKFeT5QIYTPw[5TPOD)Y@0j6 6sܩGE#2׸aE`p"IPDnd^4ؤ.}{7]5C]G ۭ8' :Ʈ"xDrWWo4j`v_ݑc\\} cJ"xU(5 XpfՈ}*p_8 Dr끃YKZ#dfs$Jbc:/~eH].0yrt:7ߌ|Gt"R|I'!dC,"ܮتwtn+v`.Vku4$Lhڂ%J+5*^Tw9Fsơڍ ҕ6 b|W[ 03NgiV`0ܢIW^$7/6IBR6 CU6]o0*'삚otPSl^)ornĔo'=Jsa)a Y.IbpiR^f|\~4z/<(Me g>ο [yl~ӻů51}VY2UG0 }AYUgmK]gl6(oV{9ss8ݑ8b>EUgځ7ŗ$| <^%f#y׼#1r0{Z#zB2/bl1EuC*cn"Θ%կ$JSKhŖSy| Jj )xP'@W}:P.7m|%ƃX*p\wF2ĭ6¼bqJ£am, S\:BOFxj[ &OG䋍`yƥao(g T6GK;W*+Lˣt T@YMV o/Y +'ވ=ڡwIs="槔y|UF^<<,!ErK:Rǭ.…0B}^`G`sl-;#&ɒ3WXѤ3<':{> į{_>h;o2NMqA׉ wr\(tO_׉ZxFr*LM0*c೅3 U _֪ɀm5ӆD޻WTiD箌^;d' I$A$5R(SAgjn3"a h}\6&lT1 9?t0ccղֶgDy,v&跂.c~?;*寗ЉiZxkeE ~C% ʴWkat_(nP5O\}+ 8mGi9L`$j=1XFqH(rCzBbM.tO$L㭧4i5G;u:̺K85TD;~haf)" " J8\ӽ&1WG`fmRedr#EajV n^%{))E]i2E3`?1*3V?" .d Ȥsbsd]SpS{Ĵ *XE)蛘p€C󮨇'sX*}3:bGSlW$AIA@:@^F::THxsặK!=wtj \.+SBFyF$ƭ,)q0B>fb?Ae=:˥DzLW8.Ҋ̡dߐoP~QT=4B  p13P}|az)1U0k` wh)Nn%nisNZhR%_7.xXU_]qAGrh:vˣp *qPcUuGqQPdDvx3>ŨA #Пbdm>؏J{-JR ;SCT*=nnW ]tOdʫ=gsVØe5&Ȑ|:mYSI* !O,KwsP !!xN2r\"?]G W)J/nF i+h# V=IN+* U>QfXQ`2[:VX[BVL!G%Y%k.{UQV\f} s K/Kj  M%J_5֡2od3PNjī㍓|e!h42#bgg<}?~svQdj-f Jϊf] wT3!oS)c鲐!bD̛fI~cqOSoWcOKpֱ~L`j q v  ˘M7wf5`ibݎjr v2:vkcZHɤKnk\@ߕ;`j7‚RDS<^ ~..iΞN{u坫?rL?n b4+Fp4 pۧFɅ@Q;g5Y[^9ݩ#Ĭ#iڠ:Ӆt_W; QPtD }8Q0UٙͰL?Eqx^bH %/ϳo{ n%Ed101A^>7x`5HO8,x7NoP]܊ငiS? 9aPCYcЎ;@RBzsƛ;ZeĚ*/[(i`[,> K}Cp6 So@ %umObʽ_󹎬=D$vփI3L K˧=z qtqܻK^Ŕc BNg>\z ^ A~27XO|5!I#z*Z8 X]{ZJ" 0&/xc'-KB#k7 G«"G!Q& +WI8 'Z [H"sr.bh;(8{$sOы ޽lӹ6 m]DUy KuRSmƱt;"1pBCmvp# 9Ta R$}E$mq:pqu"~r!Ỷi[ڋBOŸ K )]^V, ȾV;G"MDTEkl{L#]'ĉzM$P Ơz;"+-Me@A}ӻN6Sſ'{SА nP\q#7>C)w(͛nD\9p:!|76W.Dz3CwW]i;b.kA,U+)~yN!C!7n:{MX:Ÿ́XbdUT@ o e{V&uPDc7)UFm8-Ț>t!gk:PN }4,M|L޼d-3Qzn,|._ /٠zm$ .(C+l_n!ڥMW~408,&iP``=dk}j(uR\xJ{W gJ?2esT̮%dM^uk`LJT)M@PrnjpxVD 08bؾ],KjJ܄_NMG@FD_j]k`[fҊk;_^~^+[%1"v7ˤ'ø@(Rf }0), k2!ZOTU숵U](1#7P;w5ew}11.cBY};DiyF*]yT&WDc C?}HS\a~!AtyGNuj]/ç2%X xr QnHG8ȋTI;ZK18ZF$}ArfM4v\x%{FZWLPV]-rK1D7~tKLYW8Wo[c pt`m o^%mnݨRO.} N)N'Z}S& Qɚ%bcEt:,OB S}:ԃšf {%@+ &:2N/ a"~VFo"T#dȿJl p6dF+-"ۘ{e/f)|Ze9%3g%t45c]U̞OS/?o\!mMۡ@EbuKsgd1-{y 3٩OaU@ng(56Yaqviێ@%f#H6Rg'hpcz3Wgr šS5hxX~yԮKh2f%mz?>F\𧫨?ד5eu|!©QTEuwB&/ j`=_vjT\b ˝3^\ L|"=z",&' _ 2֞#UCvX[bcg7*-`Ez۫D~o Go ~2_;ׅ—1"lhO6/4 QAl,=];Fgke3Tm^pddM_c ʜJ~;p[G,"v&NlE~UYJ,D* W2kg7Pr?F:Oc^@Z2>ͫT ʚjb[&Y?5'I+aXou> +B+IOcSQ4!:{(x% 0H="_楕4Ʈʳ&!m`-߱dz%CJ9жTSO':)=[Υ/ٖ Q1F0jD'? dB0nd!*ɡt&IxV&*ӳa&+=E) B-?CqQW]{N2F\ < oaC+m}[8\S8;R-ob)@ZWaVh&GW.SWa\pb$4F'ez76  TUa 8@<+yvz4$E 8˭T2@;!=^5&zl Ԏ/gHR\Z E;JT,فe֜u h!eǺf̽OB{@>˵, Y.ae򌛚ூn%i ;YjMp2[--k0mQ}@ףP%la`%xGps4.d-$5 VrDuD;iAnՌT.Ez%v} 臭>@:E+$ QYN;$@eX_?ڷ2k>{Vng)5<\g\[]2*2۠?kuL^lXa7b]UA6,E8Mz:.KWpwCښ|Эl$e5C:_FjXj1^*`i`1p;ەjiE0fҨ2U0͝? *2|aS@ BWo_Q}ted.֭`L D Òप5zN`*Ǣ^ ̸xBcc_Be&0Փ$P2؍<96Qר>2%VCRcdM&3me'=xq=.s"hC5 B\'=P'mH&9`qpMSW7޻gcB/wP!1(jw=\Gw\g7i dFaS7tc/ʹ34*9\'pݱq/t*jrpXL,T;T:SFQ8F9IQ#n&Q#SϭC@cgUJHqB"@a8"l1RfFϝi~5 U_CU7=h@ (džU)a*3ۍ}2g"K(P=μCo';G7S[ߏsL( @!Q~UvxqvD#1qw^ VG7M )>3ylmՙ2uo7qX V0RV\UŌlIkjd"{(<ΈUsflb@qΡCy820&6(l+yߥ+Df8ǖ扯_ܔ9h_b,1rAVtȁ,g͋Q Q(. [i6e[ vILbxBi|~u/)ӡ q>/G>㇞'.oJ9Fdi֩}H`qJS0-o[QhۀrRB fXI|)ϊqqx*N+=˖ pdMz$Ąh(+f\Ղ ~W';fBܷ$ؠ"=T a=#\zH08{&ij73Vy1Z.?fZ>}.ȏUdк'6FȘQNO}jm^7  5[&O©"yo3OUi5ĕ>4- !Ie,8\/3ܤeHw X±Ue$Yr̺9۫[B19dlQyPfc[ jPj?Q, ?͗1NBw0FSIA-q1G3yаF0r+a.c59'T,`e  pt&t-NygN1 n7$JHJ^#3ϙAOf[i))4l7z4j!r"/z=3r:V8W0g`F%1UYP ΓЎ%4L+w: $7t '=G㤀n'|99ŰPߵ i+hqvO#B0gUpVSe$F"w\2&Ǎ heD<8T4`aN@{BRO#aC51ˬֹC0VKofc\ŵ =^A DB["U{ݔS/KLE )ߐj%ߚbk?WYCUέV ^慎ўOQ9/bJܕ )op I>6)k[:'etJcӸÓܥ`z5x P#)?8%|$nA- C4I*"N5ߜؼZߑ_S' fVY\aQr9 Xs`\7%`Zx,|ΓrO)rnqϗ+eXF\,MEn&]Jޱ/lɺ:<УuǬB,ns<&J+佺πpLP}afTDOuM}>A1R콐wNc$f(=l'Ԟ /s? A2݈ pb4WJC# YY_ :qqp0d\3$ 'nͶ}a 2,A4~ ;ri==<\=R0CR(7[#b.=#>9*2"Ex4ȪϤFN3}5?cў"t씆Ɵb+?^)&$5-N;w&!> tICYEbԹ`<ān\~$'E+ @;_=koRSՆj륙a:gU"95.UcՑ"%|rt-krы/ҷق[9}Uŵiq6gA* YǤKϐɣ2oύ;*dN7uKPʶp1 מP 4s2?⢗Gh#4> ň$sٖ9ì@q74Ml^Q1N3תxe'ᯫbʓ^u T8v-(#SLPn8ٷp tbp<=a>Q;.1SB6R(j׏wa>*#1sR] ͦhL y%ao7|B V,Dog*s˨пeECs//p6#,N2gc`anOˡl9<3#{ F+ll YA'Qm 9nz] ѤD20ˢc@`aO,Ap dvK5o}}+8$K%C &tgVxWĘ"H`6͜E߲bڀ+Cwly#'UEg HOM86_g5نCc5~V/dk>HrOcK Y7O6:+ Mh~FℚPn,]x;GQۦԵs(σF|882pWVivFx o``m<q"z$1AMB2 !JȻTPXk魹W!t(bQla'Xʅ؟<ɮZ:.lDI:],1zk3^l/ܘE`/|ğTשcls7(sYg'SevEFDF(r}{mh.ex#N,_;MD<:HLҦ c&ӈjȍLl\u\zm1W} r.;s5\OHny.5޺ôx7QC2hp ވtN kꫜЛE7oFK..V2 _ղ $qۢyE,@FS.)„r+12}h-4N5iM.sLW} a]SDGVJ;W'D_RRNLrj+Yѷ_9j:M8N+fL`Cn<2!#Bm:/ify,9yM.K 2 7M3$<^Qb4suh916 y1C0%\/>224($z(lt:ngm(ejp\.kd«_R8"aրW[3Z}Pe[s`.s"E 75wilm,SӰ<C e;_ j^4I%Jʓ5[;Za yK^ؒ=u/=qiMπ3J1ʓSsZDjfrTk+#؂:!ݥ])7ds7K̔LC[ցN2R=2&x7U7Uy½'$/嚔 k&:5݈U[$vTi .0iW-.:+0L C:,;y|V{x79xԀODgƶP=?5>hUk7(pP: geu?,?!]8"`oȠ^amGm,3-Nʯsʓ@ܵ=v%/ļ'𔞴c#TL{Otbt* DHݫ[P?R>YtoQڎZIU);Y@Wnomm8}:4#Z)IT4+M 43_bis28IЎ5(C~ 9r"}DUKm7|~2"IֱD}V 0"c~f2,\s<(?,G+ /w*=ͮ>d) NN:kCDAZ0 ;&==}Ӫ++%ߩ:?QBrFal eG%Cjj­ "/$P)VD_CYOҫ>Y;q#%dW:ߨ_7Q0ά ~>V me}f4%fyu (E57/ s0O;E5LZj [PpM$1Weֆs3ޏ DdO[cnnOL7Mՙh9}' dfX1nJL 9"CMְ#@㇞ `'n5d \L9H+E3q:veaݥ{=].3DÉ3~~ ۈrF3/Yz|g=(YNa^ו|F{vI@"T,~sܭjYyzWDCQJR#y=%d%?-QݑTd뷢m&`uiiAwo3^+H_1k>ji(c+~r!X+ֽ-b#b "*/+WucCz Iyu-rx l=Ul1N:{yf|j!6y,Hۈ] S=rAʟIDuh'Q ubǏ:L%aÐZq+QvHіe?,kvMR쪨đD6tx(Ra@;]ݬ :WϕSdHEX397J^~3Hdiq d-5#/in+Y_Um?0U3XUyi.y'IM}@bPJWr BSY`x @uj34a{R4ͮa+=6zlwlmdYm_!(3Nl$p ۑ(FoUyL[LqX!Q QQ:L%jzniܒVOIaڣ pO Lڷ].=7F3^Uh{rU'DG=craCmלOG.O|G邺{KUqLflɺAr2eh76[hx!g]i%lPOeq3"һ3 Ū|qL9Eׁߡ#O m8QcmmǑJƭ!u!@Ӄkq e\իnJ7+ G"nD'v6T]1Wݙ56H~sb)AT*g>.gy =r(u=z;BN%MbDIS &&fX]Gxk}]K01!}/BYh  )!RͤաihtWؓXjeDH\&FViHeʓ 9 KS3Z|e:1@<.BiOz%DXi"-[WD1\Z]Y?\f;U. `OlܔKR\hd\? :N@#t]ʫ{Qh8l3 jtd(S,l,Z.L( 3z jsE9s #P.5^@#o,זk!Jikdkuʙq&&ثOaZOQ, b+WMWX-F|Z 8l4Vpi[hK@)x8e'x'%lLV 9RݓgʂcXg5PaCdO~~G5 xߎ vp3:$U Pa:z9|Dы>klP oY89ʿ9B?VhTz|syxkq9&U0\ˆOdQʎODjJ\\Gao8V@8.ߝpLb? HIOxIn)l=ϭGsAA/Ǩ{+ lݘ3t _vnʙLr;6yZ#!FdžQ*4o_k#Yf沨=ӹCHTG@r?rA/iFQmzGaGgŀf8 9tDPT_G0S/'g+ec,\@y^X1ˑ4]Fh,< gS0 }5"LR_bGJ4C{:s{Bm,}ngoೣ1!MQA9[0v^U'4ce9CMf*n}o =/N8oGI=:j ¿il"/QD$5tJMqؚq(˒IKWmf_% ~VoJռ2Z4}K'Kwql J{SדOXSυ'* dQ!J+\=5vZv 4F3PXS&,D*BeÕ%" %8 3d܀czLۚ5`܌h0ꑣPl࿾8NӻHHz[jȠX=Mo% e %gvφ_j.`J.hCgXБ83MߌM__. _[[Q=~`ՋX={ 7Fַ6XBO 7ro/uC;}k3IooD@tD\h]hW Bi(']:=am^hvw4]\̏y{P0r \Z`͵amM",H0]JwD W_1mZ7ژr̍~xCMeք)y)4fTg坉~M- TcEp|(؎#n4e ?-\\Dk:ߥ?ҟn^Tu4$)٣]i/u#C317P羧R81"7&?.onL K>7_+egV w>T1OE7n@x\h%5 *{\Sl`gk$C?J?mdTZ)Pzu@l^G(*rp%̳k`#^z 틣LBS:'%TTsRZ_te3%p'NyOx$ؔAh#/[WF4<> N HuQcE#22>dLPkџ =uS :z(-o8mFf*Vxm/滘 8ښ)Tӳ!Z|'T௵&\H\YdI;dGÄ T#^)ێlphtZpc{cl%psStr!vzT;{Fa?\mG]uc¤zRՆtګ7q)m'>h9zoPt/ULi0s@#OEAΨ꩔P'lovjcom8|;ޚ;ude褌')UiYZt_fp$>ʝ,{bib\$y<g#4 o.]\7^*Ë^|'/z)3ۆ*>*PH-πzڢi~抌CxJpHOUPb> *KCGs]~ Әu(R2)ptK,&+ꖛD9;.)zƕ g6Jp}h Z^^1hQ$BIˍ.V)CQނp}Qo7@w|ΑuuiDu!,LUkoA3;B^`ew34=i,\PP˒NH a_ȼ 7C}־%7#*qgL $k267Kb n2|mr}@^m@A޺L7 ES+.(Dz䎔eࢥh{8÷~8/JuD.99:{ Lz "N @]AJjQpPAs (Z]5Mx6wʝ"03B/~OGhIo:@J'GOkmZSΓme "r?0~mY覷iV!<^~ks9BuYq^aaõ)L6$0mCx.U9'2|iƂ!OjRy,;49=g0yƆ_dI#HvX1Ľ <!~L \Ifzo)V$JgI\?*0H+Hɹ2DZ-QYM>ذ#ۻ5 f}DD}I &0:2hbS9*vYЌƁ`:zmHHAG/2?9EPEˋ B߻I>. B \Do.7cˆgg#qUVĕ&>D<ֻ Zv1o=y~TI/A3fhWCA87Jު" (vY44tz"7}B ~ElS?umʎ% Vn6ZEߍ[Td7NWw<6MĢsE#B<3A˷\ʏDB> 7FCD5.3OŠBPX:"NdRec" x.LXi_(^éS۳ *d{y=MG,iк%<ٲVx3 W`W@3149Hl S>SRBWb}{xx>rĞQ]|rՒcf3ZDžOEmκ#H:'Eh8U>n 4ctG=@q*`dY{p8ԫ.'6v+~ADU,sC>hf6:I(yem, sEM^?|ǎbASC 2/>0ZQCW[ Ol`,di?:TV:AbO1w9XIS>VzQrÁu  _ kk5rad)L8Njdn gF=孺e\g% ^UmffjJQSyO)FeLm'1zUᅮ@ht4yz~.K4p{6ŲSe%H^g_-cU=s._c61Q +%5q-| xP;XX9UbVM/>TceWʬkӇJ,@=K ԸfWF>1 2Kw|Ehg63eY'BP l+Ib80@eX`աvAv OBz#6 䃍@9|ʺwZI>:Uj8Ӵ_VlhD]HW/gAkD[GwC֢ƇDN Qq7u*Dʛ&zwZrQ_„ip[DJ<-zVNJYWTƅh2MD1Kȱd6DS_c8Yҥ$Z:ie| 셰Vd`U@8tk_): 6G}lK9}.ʄLK#95ks6)cY$>L')ٌ+C B+Ox-`弫B9 iP`ln {o$HoBx_}'=(rzX*V\U>o0gƩ0GqjhVC[*&ʽ38򟟾Q9Bb%-Z,(> (R//,1u3guf2X8-m'HD&us9j0aKfI|ܵͧ-}?AԸ% UZ5Tpԟ@2lqu 4,P}̟`Sp`3Hlc$m4U X Ȏ+P| L:JR1MMS @څ=s%@UsN+j,eaT Vf ehAmJK4kB ͣ+1AfD~Iy^K#hY{+xֻAdi/Zsgo,.+iV&p(% I5yhB47>?y`1`bUÑNP~4mK`snRdd{ =y_ D0? :CEkaB7׀Q Fz6gd9拸@trVuM_ L|ծ71ZrF)-i8جHYm1 ˗sXi\T{S3G΢F% 4:zX;ek,9IFߟbB:CCF=ח^r"]ϮNnH ҕD l#Vc"p;*ڴxٮyMɢJuQca'L"4+мruJyJYL%6·BjԱ(6L4|g$ĠpDNPl܆W!NhP/dddwvCİZ?\B@yxWTTqguu71up*ܘo'JG(UcRRC<%3jmj=xGSl9Ion_7#U1]̒0(]Æ˛OaVէwZ]kS($ȃ@$4s>]i X gth6KΫy~lS5K!Z k%*x:)0龴Nyk.y !1B?Q1q}h{$#7nJnҚ?)< -63iW}d5`|M2T@ b69Q➉sj )ZDyHjvR1OTm^vXGڤW j < R-7?S9k.y+i\[9J=t.W:J}솪jpjFUU_SF\nOO@a^y*jl~Whע~C guJTB E^Ab0[==esÂPwB]Ar~a4%DD9= `FJM3O⊄5\4+U hn~T~ Iur@VUDJJ%[Hɟ!0w:@BKge2Tr&E%q1-"LqUEK6b}UU9U4A3~әdO`uU Rl[O_fvft8g hؐx9j~۲a^=蜘1\|.6FL,4WQ}z5vmgKae5O-L5ͺn09E/HȚcrza2q-ZXn\*FD*ϲOn,z6z3JG},9)."a~&GY[M,t4uښ7;hyUO5*L=ʰk`|rkr:Ux=NN余񖾹ȆR;HadodhEy[0\.)%(\̈́ҫՅ$)'Kś81fzj FԽFJ yUJIW.`cxwqST9NE_TV0׼N Uc.E6a\L"/9ѲV jSf냗d-r5N^oMj|S1[MRi~Z#΄PTc_;0y%"ݥw̞W7=SZ o8ɏݵÞu{ s g_6#W"ظ|FHf 0z>f4:V:h0/ԁʖS'3x|XK Y5wyy3Z :Z~m4̿.52r'2OP?}xNU)V;La רrBd Xmq#.`c X2'=*ozxO.WfdqjkO$^řֽzڦy?6:HbkqZ4im0K8rֵp//eOe!(HAӦa/`ƙIsE#v8<cVVGlG&H1f[諤;'ŷg4-qVLB$]m(1ī7Se{CP+>rC'ûj4\/Zd_.˞Z逫ߏ%!zzLe  L~xkWwXx/5QʑR1`ŭe`ڒrqrT%&j372ڪt}s4xpcu'G4R]QHS3g$7  <# wrIelknr-=4&+$ȣAN0{ɬ-z2ap:xgҤ[d*G,s)ߥ->>G ;lSOSo*A< 0Cb7ݔQ:.`3"ȃLʊ;@G EտXI;-;!|}z4Cc~1e\XδK+y45ӟx' F60^YjUv. . nx >sВ5(W|mZ0\σE& o=m˱$D쐙ǰ@v4Bfx;#TliId&CɢP:6q9eQOrrJ&m|nۼzdY*vP+""e"(.*Yls#Aͨ"v峇o p7 vf]|g8 &Uo!ѢrU]Q.|c.$v䐒Ir6qTwϡy_l'2\9b{n,& Ʉ*_JyILB(l$xL#dlS̹㴇q1j\A4H->>H}Y g T>6re[֨/ 5-.^*W <4 Rm_JƐ!Ĉ `PiWl!V!\'JOoe鎱un'EOA1l!?X9Oإ DUtc3xF\6R'e *kȒErX)nA!bR=_>vQr>7^cX+@uBk%mL;$ {1/ݸ'$&R7/WBwac *]]]& d[ Wkd,ED!yd%TW 1yފʨ;8h{{NJ h{Y)^!)^r /y'־1& [ʃoTe#IJӵ,TƏ aG 䟯"MSh)!(l_c(Aя_2hK~|MorDNJ'' o8/&?'~[H_`_NJ?WέLOt9;,Zsn7'k -uOg@'~: ;} Y!5C{T'`S'Isa[lh%;m9kbWۦp BҷԷ=h, u=;eGJR4Cު"͘Fi $Taσ(DɪD:Թ Q* ]RwC{zJ-`\KB yu=?î{E1e[谍YTX4o:P_8վ[U0YE`6ϐWf n|59{6|X [m)G2l9uvBxغ * SC7@0WeD^aV)kp|>*9p&%Qx5*Jm*ܝ eK(HLdTˑv%:?_R2KVU-^ æܮE"NZޯ;[]oe6bG9 }#ɞbJTk*M%#uUtV?X0py 3d2 Ɏ#-'K&q(e'kV[8_=? w&JvNcy-ɠliȢ⛮!k ҥD-NtT")f=4(BYaBS*d-b'1uM+ιY>MBǾxs;#e;C=4΀'yՖ&9ִ  y <TU?G/U~e/M@##Mt'Vǻʳ TC=?\{s_0Z= A)&O) "<ށ|*Ό9>CI:=0(1U(w<_b{'m$3!A[lѧSbӑ n _6 0Oq]>߀Y؞(F.c4f;2lrD=#sA4;t8#29U89lVj8/F6a~ucIAf5`XXc䵎"P)_/;C%+\úS/#P$HO(LFXE!f:‚b%@m[B=y ldúhgSp)s~O]y 5YZ(_\ J1sŤ#z'p³WD*'pt7%;Gkg22"4ڷ>I$i% u$KK|?{G\=uV )NoS _W*V6eCHqZT2V2RAbJSrc9fj;h.Y;d}w ? s?q@Ӂ:+f"$F/`:O΍yh;/昿ʺzkTӪ&w {ALT,;RǓFA(,W$/aeׯuЙAy2I7GH \Q5x]MdIix*kSq 3+2D` !Y29p直G J6vR?"AK9I*J5+b Gr܎]Mv@sY,U>@Aug? oBfF?M4]_J+ _(хuJ4ś-XQ12U%30S 0D2LN-FrKo,DNC%B֯:/,ܬ,T؆@Vz?K&{x9#n4*L)(-( p|UޞT@kfHQ>e;u;*w+),~*zoYHbnj| ([ U]&_lП>r<&Rdst1U,rd9|E q {j A3@'p=4 -~hb'!8l*01x 1XQ^eYjɅ*!x>CE4tI@;%ɾ2l5J gj#Ϭ\>¿ϒw?@&z4;-97b\I3}+abIu4TI]e*0 ͹Ȇq'l& p uvh7,XUx784r/ɚg /̑cc0bjRRU'J.moy2~"rkѦD г^~1)]B}%H~ ['PV477.H9ù\Vy'2u^Kڅ f :_4fܚj51rUzh@pzޣY7WFZ~}ooJ*;7oD=.̟md14M d+bf +jы8(zo AOi 5KNy K [Em 3$rءcL +gd.HTJXu0ÿ +hs["Գ${J 4 &󌿅3/݋$6sRYݱ;{Z=2ֶ79: N͔O=(r`^YAnexݾt8J^ d򡾈>AZ ,`!Mp}Gvr,R‘Ѡ,h9rIKVe:>tYYLI1/GtՅ݂%M{cKX!d2ɓ><ٹ6UNV5$86@Ҵ~'6W1"Mk >t9?9n8{b% X@TОD som a ےmT3,Ϊ૆Fw$CʵgvgO~x]PnC="Jgջ􎏎.boYax}x-*Cdda:9Y9? 5֎tbq}?Qvr>5F4U XBhqE}8V9);9(Mьn>eCA%_PФR@eSYÆhgQ5ΙZ^!kN{G%IJԏHw]4{OsUChS[Z^/n9AYThy@CqHi <֝^}J y1'9"վ B5k$UAt>!"5{]d4gRn+# jg/` Q'BM[yzLt~9dvIz1p}Ptҟ )U]6<3>"fƒYZĈTRosvyҙ )H9gU)"ӌqp$eVqQPo:iTr>^vv*l%pObՄJ[<a9Uk+^KO4փ?1Y2a`y9SߵW!M7?O_ }UY [*0>@b}~z5{ۄfaܚd"7Koq!C^wf]zљmS,sGC^koJb<*Z:J%L}+v %6#`ZTpq-@vwJ {)'注|O3a1 |}i>9A \,:dp/ <]6y%['fGgƚM@cԉTLu r- spLDN;Jr֭k>a6P#܀vf7:DDhU:>3쬴%xڪvkr<>@.g Lz݇軺pfS0Y])4_ ܦjPn'SPqJFLc#0T=@d?8+88tYHgJBnp_7&{I[igniH]ưOUz@Jata` Ic-=2 ej)"8Vy9Tu8wF4?xVؙjvaxA^}(vR>D_~K= [;ҵ׶)>3 =lSj)'5\@ZqF|U줼 Wj ȝ?.EB>^h"x.I-(j=!Vi 3ћڸFPSCxg:겛QkVϞm ,]{3i{ky5}93-K{ x:1ZF0>FNbNLkv9l< nٕg>{(O?.DGnƅ.6$* _ԨTKlEN(Gx*,J렗jO"kG.ۅ-АM4 M8waH5n/^ݪ9M4 Ƒ2gi1B)9BL=*muALfW~3G2ȫ A}<%TDw>ϿQ1nJ/kvuBU`wnIaj!-8)mVx咳Jl*HW _o3/ltoxG#Oj* n =oH08bM4g}~n^TbϗU9U<5mXչ9Q̀+V* GSCҘz4?۳u `+XB=e3 ??o[,ĺB(QpHP&fSRՁx^/} Leُd4Hz0zyKPS{.d4hJ^4pySp%9}T9P`SLB.$;gPπ1&xj:^N⧰vCM:P2J\+e|;6C󊘤 Fok)5ExX:z}duؕ3ƒU5rfm]~z:g7@a R!pM,vJVn!3꠮$Оw3kf\TU]9~k3nN6y.R -"gcjxOJ#OOؿʍm/`W]άo%Dي)n3Yͅxd ;/(0ڗmFN~h*dOr}U9ʟ!+iͻ8Ii质.# dN(2x.eȈԲ3#Q^s; YyP3=j$IId<czˮ!ĬzvW: l/\,donCg"З\򦰀Gt+D4E(щI-r@q2r{"C9.Bc@o ("^N/QsVXg;~QoYfU#ZA3Uc~Ux*as !l*߳p=RWsAG]0S{5.Getؙ\a?W`)aTh:M=UgY(NmFҍ:*dMlXI:YPS8k#xp>ee70(ʯ@U*v7s@"IPM>5;8:nq(F(> ~3Wnn @hr6MNڗ/c/@Ƣ=g8aC{ձy]TOC$7kF~.+*d|yLPzkצXb^g3nN*C=}-ߞGjͰаxm^7r{q;._ de5gU+vԘ])VxAuk0n*er꒱Uh&,*E޹V|siʡUшo8k౓kgw d2dWҰ O y65YK"pQL^j\NSeqxi2ð7N㵤n *{3[o~Q[<ܻ[ASc:k=I^[XeZ 3g4fM3Z3xV"ZB-_8&x-J%1i34ID&<?$AB^8.-p34_6Q7[o:ѣvl 07,3k9qا .9*bJ~,)qk½#!ʐ'Fם-o Is51.EuK zl*|!I;;@ϰsdnQn$?6&#}ؘ$jʠLe\pqX8 U=H1MV|񾞩 WyތbmٿƇ^]2@9-Ԉ P8 2 z v2B2/G'ᐢ=L$νO+b Us(ox-p_BeH{׷CnleH$\ pd" d|fP#1zl)˘򸇄/n3 tx\c@K=qT䜆8G^ .(XsH06@"W$|7xT04|%|Ӳ8I{Lțͬ|vlJ% (E%sR/'HFJe g$Ņ!<γlj(nh 2G$ ^mDq0+c/Fe^V,бu*9G5-*bl7g8+h5.2_ݎY5bV4)hBipHѬxT6{ۊ:¶iDWny'S=.:8`q$.cC8k .5HCA.q?/%°f80Sax&w~v1 z6 XoZ q-.ۢ=kl/ʐ݇E{(4 iyZSjCmW+A9eBF(-&2z~Y՜Їȝj 7mrTx3x 9ͻ|a$>(M!i. tɂgd|oeWζPe2҂ ]пnܥißn\ }Pqֹ[4f-nTUB tmY0EťixMh"oQ1cdTJTP*WgЫڞl,G$u(m5ee'Yz\w}ؓ]})`E&^O)rҜ)}N8-<- w߾$X\ I7i4RX; -s N3quRe+~嵾 :?XrS\磎M(4ǣqt UtlR"#k*N߼ݣ屺aGV؊/#fxpP;i EGVջ<GF9 *ϊ\MgShyW)@ ѷagoy/X {}&%~2J4 3-~c6Q{  )wmRxlwKpbJW٧z`Sʜ"Ynf2\']oפ@~L6еId*Iq% Vuexv|3q64aI@4ja'lxkV d#f^eU}RbOP+A{-͍x΀?yE]G'] :Z>R|63sRdD '^0lnN3T*xN݀2vPLEn?ŭ D.og'R|@FF5u!*ٵ{la+"9]ZGLgl!igZ"ps+;i3Kơ5>Ͳy0I&V!J,Lo\vÛ}tĸ4͠q!bkeABKsBGX6z d &#;D2XY $4긔"&ICyGj#;b ;@eA8?F,"ŒKbAS U:]3ئ%3xPoRżSx  C0%Zԩ@~hJD#2 7W\tC=<s(8}f9ד s(1̤զ.̒u DS?3%Sg; =N`󋇯ڊTu`r+ݙW_FgXlT|EJ8yceb枲6KP{qN^T7b"oGn բ2rR  fi,Nr?H 4KJ]TF71MevtQOr੶Yit܁|$weUqZJ<b]$PWM]5jgQҮK5eNtہ-*RW taen)8C^Eaw@,eykY jjύ+rʬ 6o[4/רavLɬɳT\z3´ -*CH'l= _<KS+No?095\(:%} v@^5RFo9rQ1`.D <./:s{ wK&!bug= _5v#a4Y}PpA׳Ih4׻ww9^-y>ˎn<3:8o _,!'Y-)-ܔE[ԒT+}w*M{tA]X% 3S,R&r&^q)3o8 knd3YJ%"*kȨ p2&Qe[X!L<Ad| NGHKaIÁ}^m| ?."<ӟ;m8 =UK%<:q? 9*|tTg v⦙ԯJ04A†F{RlfEA¿(̀,Ì %ЪwtEaq@a<{.* XxB5'5􄉸!4>咾٪KY}֚˞JQA*7*Rÿʭ:T,}o/9כ/lLz k2])*9-N(sFb^Uq$F9y-|LY2" dE^]"q U`!6$h=goLj#i2<ԃ A"FÞR 'mxVAPn)SvC&O9&*' lCѺb_+S]fD$s_jUdH(_[PCt ZT`2AHj`diaA: J,9SlĬyT.k\L9 A$ӿ\"X:Ocܓ2Uf`Dv,uK,e,"KOtxwLݰ,?Z g7[DMU+ɯ9P RNEbsփjTks;xޅBq%˷:!p&)Ѹy(!&ZGr^>]BY{P(sjuUf(Q@ WخO_3E?dH}8 ÆƜ@;S&٨U؃b_l u.\p*GZ @%!'`zd :}s"&g2O`/KSB4'%7"[>UIg<`cD+JT 1C$F %o˝5ExKaWĨ—_:ǂˬ2h&}zCTvmPk)(4McQv'_=KDG0DU9J`'ZՃ)(p #TI?y)g c 67-gm:`C@Iϛ0~|CZ]L%]8nG'hcWdAi:Wns6Z\[mfE`-k1r+$IBC6ϗ x0(4hNNJ̌s}dS*fEɼڢwmM >}8`rrujR`;pDtހn> ~ A6NocGVGDK) %G;ҀS!찢|v{G#nBy+-5T$8Vn$FL@f;CkNi%+i>pĉ@\O<Ϡ=3T4= p섶5C%J[]{N/pBZ[DTS65$oKEːx~4j[[ғH#qHz@Hwt "|N2A| ݡ&o h}),c&ӣB [)w"#t+Ag(b~3z[Xד/gג`_m˥ͬ6V0rFF"LIRs (|ٯMʖ-dmM B!.@X^/ئfa .\ޟTR餛/{ÈLppҁ(Slgťw5>n?p1`E Nli^#Ҩo3Ex;tr8HO\L:T@}|-ƫGBj`[%6-`4csR&k'Yƌ5mhWܕ c԰xxk1Gk=5ILz,Cz ?LX//B5!}<ԊJ.YE0 ƕݘ^k8tu}7KMCb3H$; Oi?sxC=R5{JY8SSw^C`N1WQR7{[UZ:Pig`!zZ\p^Nh Fx oS`l36; Gi6&@'!m⼽}kRݺ[[I^ǥ ;>ҫ ҇ "rEmQiBh$ha䚚wK&!Y*xZG Ks͑<osl)Jenhz3 V? ֊g/G0! Sٻ }mܲ›EspVFM('WmP۴FpY+A7_S DTUtv9E|e^0ϳzB(Q4ϠsᬏyIh4]6`M`Hџ ޱnpFdU=Om!(m]) \antDizD8 ص(7[Lzɨs24aLB(mBC mT9C @}''s"{&γ9)O }Fk:JpCe3c7}s7!YMySNp}P<U::tؤInO֐w@} XϾ ][DA_CV sɲկhgY|zd~xij#)._.DEDI 򌥣xX8-o¶zQF3/G\&P&6sѫ76܏Ci:[9 SoA!V{P7O>ˏz1`b+^-7m8`a:Mt{*KE2 AͿ3Ԛ8[)> a]톙QSh~Agl:ߩ**\DB#S7D33ү' ;-S^ŕ!C l Ƅ+ 7?/a\*݉ǐt)ᓛ3b~dyq]69*3׎"I:G!(cF.2h en_~k{Yof%II,Wqg/llyMmkٱ%$ږ(qv74iL(,pHHwӌ)UgL5M]WKE2-I|2WG3$./W`#<!I؝Y 'W|9u ˉ(B]ZV8sAƈw+O'_QAw\exFrֿuT—t "OjRYu|]3%ǥdié,"m!->w؃okD?W@fcɗ4*1q*bWY-BVQb+~:>h] t%,J6LwW2C `4HDDC# b܌G!FJ20qmG} ]sA*qpd/EP.NMVn/"YPAd}gXLr`CpHzf B-u5gGq0u# ,D6Hjkو?=vj`8GȚcf!OH(Ơ0MriB_qEj_;N_b޼>93T/UM&DHtV$.4T&=A.bow3\zu+9HK97{,n$vhV1uֱmx$F[/|-xCz( RJ>|!)N짜@$RVxHs,aGfߚW7v3"+ȬN|Ru'#;T?6e^k_8T't8 '[.Xq[bB%00ٔb̟Tn|Z@GfN^]}hЕ_ZarIboea(cw݉ 즥5CX!+mv;q[+`g"܀Z(߆6h% '1Pb;#Gn+}C|}H<5l'8"?:кR9&+4_W|"@(p(NSj-4]}QNB2C:wQ}Mm|i!e%$̲zc  Kx0d)Bܺԩ3N=i4p镍+Oe-3}D (SEUn_f~RErBϫSa[8dQ/#.wT3YEU A.l=vdڴ^dW^8 }#Mld1~aڶF~D;8ƾv i[eI$3L!dv  m _JUs%ژoV\Z-`,Bx|{sg E\q{ѭ^Mg %o(=у\ު9.VRzKryvӺ(՛O :\wz{.թ*|Z7ȥfC?ML3UJ@̶<:n5@B M}ŕ6)292&su䪈//{xV-. hrQ׋o%1/韭9A0諶㢸Σ>T*I+~u7($y1n[Mf@Ƿ󂱑*Oz`\*m#z;y7c5Tu%mǙra)$LjJx.&ݜi{>:~wm>cC(̸'+ɳN Rc8O>%*j%OpUpbGg)O|T~|tNԆ$7Ch9$ W;P|-p OBk19B)YU5cРꁛ_edIhKgJalzh)t[kUO$RaҴVXy+'0_F5ʠO'm-<:%L=㗶`Qs xqrveh[k2ŽBjuHmYO5C7] T? Z4KhbC$kby4nM9һP P:=X_a*V|>+RV4fَ}>1YJϗ8B@?E,റveXJKGs| Ċj\CxZ7bɘgXjCm|ɠ*F3ZL4Bٷs!(a@>(vѨZqGp lcҚJv3?:Tcrэ6dҀ}kP}c+3Bw q:T[ة\TUˬJĉ :N%%ˋWk1Q]m ^8x뗙ׇ@#@*+q؎F\~*<11* ؔ}9U=X>nL`+or`l "sTpȇL*w@;xT[b_ǬYxsKkZ"1~@?[ߛBK(`-H =+} gMXhSc1<Ud&*^x kٜ;K䶁i1 -4*ݱD$PޞH}r=P;*`ьT Zts>HyZSx]: Kiۧ$ĹVZC]%ËgLȮQ]AYߘuo2Bb5I듃}:!?sHJSZ,/YDTnJ:!Q.5v7ŭDbOIf79ᕎ]'\͟Pdfpgvb1QSj_El~9b^flFWGl/@Zy5jUX1~bj,"MSĩs'rYrqBwq5h7,e-4F3 L υZg$/M a[Z@H-Ҥb?k.@ 4Drbү)>]zX &59 v`I޼X_qk:]thHm(^$YTnCm:pDy*vk32PGGQC9,+t٤ě Q| 2S]4sksYɭTⶇ)M/8>l[^ۍ8#s냂НB0AC˼u{޶uɸakђ!0ޔ@G^/tӈOf(KXc0ɾFܦ7ۤDdk)SكCECwsϥ?S(%ͅKdA#`_oUc}`QcG)_ \/ CZϔ=jO?$ `"EH`cɺWϾ؜&Y1Cs6h_F3Ē` Rx7lzN2Z$d+AI\dvPf 4$n_ko@1=@ qkˍLUܯ)݋XZamu+:u~s` +#5 _ pjeCr{o&H7l`h~2ښzے4`f#Vc#7H^~F R`z1tjeC8.+a .XWQLc>͠Ϩ&C1ctҋ^/5Ra!`eD|s7 Vj. GuT)K}\I[)T.Bw:n9t|Epɝ{$yYFR{âvpRj2?( OA7Z1xjI]̩Rt'rI5y] qp"ůa={r#'1&\-*.ͳRQjN]P&yYӳ٦Q|ʹRNX@{(cN`:0-!zP%ta$Fy`M; ANEZD~ɢ^VOWl*k- /" o)&OSq4q Nr57'wye*硹(,t)u@gނ) ԅ Rfi2)Փ܇ڙ${@W>ٖYjGkU"fʕkuvWjpQM`c/{fkhl).Q*d(o za 6l/ggW5JIU!kYV- ٨D?a{Xn+NfS]57Th6Q6gYp|2+gL0sj"rISM7Rf$r]UT:P=Bd>5[{FJ]=(-zHh3"+xp}ŋU,Q5?:BѼvDZݲaNBsp!p9,)h" ٨!H>AM?m8x0塊 ~$^Ѫ_تSB~kfw7gyHG!kZsjʉ<媵s 12EZNXN S]bz(9+g#sj*~ {3nj4c(ZbCѹ]s/ pe0̇|Wl .ƶڟOUSFnϬJ&546Q #! cym&Lo)b+_DtCk~yЀ0:{ˊXTTNR=Ҍ"V2VݕrԁN<+P5r B S2P+ARs2 ަAlmcQ]j*mf^wּ~9qIlreڑљp2h9 =ˡoHl6I)B5EԆ%5']XThI(@z`` K:h6 /r H;c437>"_*-F?ŁKRo *.ǂ ۉbgΧDݠk M5/~0Mz 5K("S}7 ճ GwIvGdI,CJNz!hQڴ8CdZ*' m|LK۱i cP@tB&[]VO;qȔ~Ojbm @17=7O#6\q^y(qvvG֬6έZ j |N.fmrx+ê㒺r%7c:=ӌcMǑܬM$+"-rl:jⰵ"!}I͵_Dz_@SJ9!W Yn(^GAS?u3[}5VX0didIEP"dErճXZ&p1_9sk5:iH1 `cMK )ETuH3{gJNWhd!$8!x&$,;Qi:U_nǽ'%OMxQ0)\`Ӣ3U(K &=MAϻpXfo..z~pD&<?2<Q-X|H)R/DdM&Ya-{|@ocx Tȵ(?cw<2On3B.>H:}oiJTY\J[`[mXO8GfC-`($C E3[pQ;@k^Bj3d#p0+JqB؇KYv`8p>5?~IH:VP#]Ƹ&FK3OZ ~W ϒ@)5?L-a8+6iZoT:j_u +#?L `ho=MsCv7rJ!S &Z\gcx=ˇLRj5vnk|h6^Kmi褌*_KwKzW3kMB'(l ڕW::N*īr ^6h84KMvc h K硙w6Oq= 2-?!oM.RUQ)~z.kJEe k[s0zL~PwIMP'_i1`]{Zqra<%*)a)(-.5K}7oA0m^N2ԚrzcdnY=<ۤO4% W.0,rRdSzg 9L]ZוO39C -F(9[Tu3{(+Դ4nz$;_~OӇ90Gp),ע- r ]mb+cӈewɱ CV?3r94pBfT:9DSX# eVz/&maiǖ[qࢧ9^uhquv7'e.>t5n U oz\M-`O.1 aj"l-oPleMze:IwY^$+/X?PnfUTF%8&!l"~7tlZ/GHX JU:Y&zhŽ gv=C4Vj:頹~EDžYb+HIS$5ԫSS&d Ɠ>rc2D[ O)B˟?Ɗ0ϛ3okMAν>^+7νWe d;lK m GzzebACbo%ɠ20z#r)(xcI{q0dٰr lcQmtWiqRT&=HB$1$d%}n"JK'(9FZ gA(J%ӬYRd.d^)FsA8]-NXi3vOM NP|Y2pDw6tw;zZD+ushBu\^~1v/<)6٩勵-*]Slq$ԷFZFF_CF)S*bl2"R9+^ݱ]K_p 1s`-fZ7jyճM[o,2H4?>J&U%752 ;:3Nl$Pڳ\ Hl jpGZ㸭_]p^i g4  (囜6Aө-FTfJ7EUf}pio1}8D5CR `.2R'&ܚ-n+?יWCZ+i!ޝSJ|哤}k;-a/qE&B%?b0ޠīRR]"mGΚY:mv Sb;‹NQHP 9R]gyO珋۩h=h]UK&t*b*!x[ ˊRА{UxN;Q}nJLFӳa: 9.(yE 7s-0k[1!RsXmcL+]xI-Ɲte2NcQvg*AF_%1WڽЀxE>fTfYҷ(|smْoQޕ&^RxfnUgxπ"@|nr@Z!S^.Eaz}?2 N"=uq4O(q"κ>JdV>ٌ1%W>%&{C!]v,86=a׸OIfƚx._LjRNbèw'$?ndΦGMbR&\(>Q_ @'to-]BZEZjJмuStY-:p#P9#.>*B4^}o9j`> Yj/T_'sWmQ@s(D 7t]TOAMxaU-rQ>q,[04>dtnxGoSNv(wu~**mt୸f5EU<a_)0c(2&f7w]9fVcz?K\&a&SS*1#XGFDF.<OL)9I~YlHԑWs#}@=]l|MwJH02xyP+%$3SKCjDq}&}An%QT^*1./B3sbBw8bSx3zfE o҅,2~̓km?OϤB5iN±%zd bhp{/3JO 9G+JPuƜ`i zݣ̷nv+p# 90LQ ȂuNc,]P[ϣGXG}SG nu3fJyET[a,qBJ_};#zqY܃7׉xP>fpS~Ivy8"JxS9~ks!l>/@Ëp. cA޽9ċ3vDclL'ěݱ0ȝ_!|J[U*[|p qRMP*P.zcoyB.Upc}hK#aCO)=om!SӫXӯTKKJn`n~͑.Ȕk%%Y+1EM ,Gq?ߏ`)T(P~| "~5}G,:W2ڊ2EΚB C+(GhK0AJ`?ٿ@lh#Z7 lE ׀&Ng˱r4"/qkX{~ݶi59T 3xbIKf?VvU.r p짅/O<\2 8 /Ih1&o 1!(y*wK rfٛرA)18~v q0?MAMrC v p4F+.Vvdfs-8Qw٨u!̍fW,|R 9]5/lhccD7"Tq voj P:mO8ai$cTE0,PvŨ &FStN4mGDܻaa @dڛ7feVk, *Z)AheM. ^plb0|--6&)3NMvʼn32 9N5$oR Z:k]}X>xilw0P1dd :^Sŀ(Ez~/]nq?5E)]& Q Yc!b i%Я9~=p5[vƜ5UR8͕0w;Ruo*Z'BDY8  "VByLSàݶ;̄SDx[KܟOUˤ`k`-ζoA#ǴZv۰ :`ztpZgeqJ\=lQ3s1.]UZ2uvW8M=]E;Rr2!Y2Njj,=v;-$@lt cOP9SRD3١PٵcF{@z¸6=Cy/-KGLnɲL\udD ӐUBv)5_ZWUt14lU̫ڱS[SBk"*owy-MWn&UF=)C t㫟A;%¹$ EqưjEOnՉnya?1I\Y2wT-=Q耨K6ͬ[M)^vGL_#2\ y7|vaԯ6xe߆1Ol'89Xkk$fQr;[wڌ#Qtj`Bb1cpxukV΄z-Jձ,^ w›2WQ$f{ fŠ;-hB"H00r.8/ Z~_zY+YPs Q3?΁|iBUЉ);SH#^ R E'u$cli<ɰo TP0dG$=Oy0>ǁѺ;|(rv5AwG4)xLvFp5+ZR3-;{ϙqAY h!+FHs0J? #\XYVS(ċ")r*,; 8W7~!t.Yv#-2KZ+|甦pR"v A)!z4z]g;hƻ_hF2OL^=]Wُ9u{rIX!LR4&A n4&2 g8OD*ی m.3qUq,m6?1INB rEc;[} D+[5VuB?z]i25`L2(peb`K˭}"#Ӭ'"22^ y,\4n.Kٰ8<*,PL%'1]*}_|$}g^r ߭`)Q1A<=f qE8B$'='yR0)RK7FI_Ctb/09̵Dޫ#I2 B+'U%1rľmCpqSc;HU?j*RVQ]OkDP[ևLI#A>ĿRI`c6 G}YԙfhƣV.wh]LȀg'!9|Es J&؈bɟd+ lj?wZ9OU=fZG=->0-$Ay-tXO Nl=ۻxjGAxpSU_~JvCDD^VUESQ5E/l/T%Ŗ }@ivU&{[}}@c0zN83AՅqԎ̑"vB!tQzT(I IP7r'v@?Lv)97Nρh&y5*`f[|ZTpgt,n 51[2.|_yO"eh6[{s1[sa7fe5r`6OTÚb@y%>X{0[rfZTȜLr.2 8SDݨGogÅNzhm. JwDl)muQgcSdY+ϯq(c5Qp0}FjL E$Rud-S[\>I{Xʟ.;8/&2`韉O3!(tͮݧWW>}b8P: 4fyfÜa~ `6j)TT.USLk-0#.MbF;oLV%6T PYCmQ,U\NZvԩN,ʷM,{C'ѿ鱏}DDA9`9WdbBB5 "_R@TBHL+V갉Ǚ$Ǵ.0jb0'x b z>59V 6 `؂jwzOo獻y-u\[Oڰ/ǒ/ G+K@p=\,4(| ϦZ6])}[~\K׬F@:H/@OPs P8븉{$"c;fL{8I68Gz::u"$c!)B-[ɬ>|m"_PHsygg+./~n}7{=>wܶt۲am.mׇ+?QUitgB48iXrLjduYR{e%1 T s M]{697~bA1 W*'P@mQ@l/HkbǎurG-ӌ:pc]',⥘*S'aՓ{rb3fmG?,A:W0 |Sb#O8sReh:mQvufFb6DYd挓 n79GwQ?I+4#U;kGif#.*Y, ׼"<\؝o'] YItQN1y͹kڎQ5yo"`|onIWy#޿^mG~٬$LMM^yOc$I% 0&K2K!9Λy5ƶ$, ۛ'd͕5mՋ[A DY'xF@,-/c ]X^̌1o?R!h 83/S%i7l`nޅ>Im<ø_\Irvd#`M4 EARnZOq gu)μ,R j X=I|,Oe^'ec tƕ]!Fg[ (" /NTN"yRQӎeta&[i U(]k}!#ElMN$Z.7l"9r]i|5֨Gv#'.r^)@6M(d,ka*1sQ @H4rZ*֜xSzu8Ad`$ݺ{ӇkRo<)?f6EPn{X/SAMYŧFeIrs~NUv6/}W-;G]Ҷ*<X$&%ߵ"!,H;d15-Gkz6ʨѪO="]{벖 Ҫfj2U` jA#)oq IG J?TfƟ,핉Irk&2W \'@{KDqP7 7ze@(q ku"+bXX {w ]\/ cA 7nԀqK&485+<\'ы] ड़(!Sx',]I P⛸ ?I/~*;6$m?oX4ҋŋ7+z ġA2s8'^֏8=~e#)|hAR)i4#=9&6o\V):吽9,9E9/arѵ= S"bG>*hcݙ$S/ȍ명d$}XC p=:T ^e:|w4Xa# e4$0yp>+ϘhO(TRCUU{V켔=]*П^N3/~\L8:$סwGw{}":JL^*OwkE=lcp"X4?TbqEKLAh9λݡ4Сcˈ!uawzxDH #ϮQBW~kޔ" Žs*~3{7(9CњF%kbp$$z oKZr:M9tVRtISKgboe ,vvi7T6>I.<mT%xJEZWbߞ@GMf6'^s]łV)}Wj'p=GKZO /7Xӄu[g͹ɆxLv|Wpam([_֕E9D˱L%S\7H&е tc*Et?0n:l lBB~'ͅ8Ix;;M0t@NM IPkv>Iџaw;(W3;n#+`$TKnkԦ:F5ub qw&$ׁB#f]O5ID:W/ۺ5z.\m/.A,l%A,ޚýZkJr֯яZ(kv}so3-5C kpJ[f /@_{D!ȳ$q+y= #̨n+xy{T+>_u M'(ㆷp!HmdtbE[pMٴ.I|=ryӃA/].rg.svHZ^i1rK Շ;ֲ0kbl<޹(7O6@Ti ݥOw 7>^qO6P%G4-x}M1:AgXp-c f|[< SegVGR"D.'CT}aG^{*1'lHm$FWch9*na[ڴhSFO @.6lZeI=X #FSp)b kTw[a~e$ "F:wAN1.qN=1IԾ׍]3b ̊.죨;)!#v!rk^!0.t/'2.g@O1Ԛ$i '7~s痭v=75cVBDD)_#xŧT[@pEdU0됯KMrƏ`ip>兔L \jQF_н4_ڧ[.L &&zv (\y87uCp 8) }хf`Rs%4.%ڪ-&Uf3AUuTL|_ aEVpf P'&KS&O =*h/wAA: ̼ YEUS&r#\OA/M*K#hn?RK"U0ƭp>% |cu+`^r~]g 84=w)#mxISuQ_b&o{g2-F'5$  j#p /@o_('Al6JhBdUCVjT=f #d.AZ(HgsnjVC%q߫c!9:)NT!͜pVPg@)텍Ͷ7N&"-QB,/?9c Ssh @vQ)lftrydeg㼶2dz[(ςY)$n%bYָq/HpQ,rKҞׄCr(^\hOHf{tt >6Bug|kA\ *'JHUbٜAE}0q"n$;ͪ*=? uľG$ M9︇"!;[ࢥK]<"Wkk5?H;Ŋt!m?E)~dH3^ovHqLa9 3`U#hZ?~$H>QE(])gqWdAV:ˮ})ڽd?j{$7Nx \Xo:FRC!#k z9]EyYfo&4ZVwє'Hm]p bq闏SV 6Vd^Ϭe9_LGmic7H5S+/V̆>uy*Dp=v"P j\P]3g력*ˎ ,%muO Xt' ^T|q!GW3 62g~|$}wc 8,:igB׾:G&1kp4ǨXFOٔp:JVç?UҗO|[~oQ.h~k;_"E JCmKc#6^.Pmn[2횒Oe$9xmX< 11 ϫJ9@,\A*Δ,ZqĿ*R\&r@} 4/yrS~J|; qf(w)Ĥ|/5Mxuqq-8 +MMW<_ѪV ,ȁ_d^H I-sO'xVnJʬq,p!Η1Bb3O?v2l7 ^C/_6Yqu\fQ G{]Qp04^`.w5b<5%[{;W~e8.O"mΟ!C]6;S+1AcYA4J λ!ur¸8Np(0H7xn5Ǖ{MR6zD2U]ul;Ẅ́M'B\TA3DT7"\>:@\ciaR}( BŜ6}4ECvoc NIs$hTe@f⚵Zj9fBHv`i2qoR{XElnQlIA*`QNe+Wȧ'Wn =\~cB1^0iwP x&kc1)(Pp`>ozJ !A1Ď]C 7guFiBZ&*Vηk=\Z4X!"K}XN{ ]>$r\l~p$߿DcUP]%4bm!#)nJN.E@N3 "VBd9@u>7C4^ߕ R>' Bbe#/Y!ЬUd=&\&PeB؃jx1X>l)uMemڊWq?3{S0g rھAlRVTz0F@m vꘞPPf elt4%JflЂ j#&o/F@E" ƷhZ%4G 3YXΩu0MR[ɈL(.Ch-ŭHzPЧm}`8y1_z޼H9d[&e/+vzͯI'2's<~DU7raaZ5jEٖSiqOO _77̸5mu`7 ;M[Z$d_q>( ۖ]`Qq%nSz$S;DM}S<=#v+QS:L@ݙ]=ҫ%ŚxTV˙ƺ3=RkiloaG7/02gۉ7ThCe ,$5c,;19p_XNѶug6<;m*NFSA^p+MKҩےw-p5  ''eP\c&Y@$ԳXҏVJfR8o<PhCoL3tNռT^INA=:V±9?Kf.d،sybiauEctvG8zƮ|@̓5fX`;1R֞w-|ڎ6êtNT#AYq5xZ*Kģkf͖#U S]w2XznO&Lj1#wڽtEK /#_tr{@Ӈ9vOt=HIOjpɕ\1gw$;WG$E946f,,h=~ KTEwn f3ÊZfMnHy Gq@A[g2vR qO̚Wj]5~&qs6q@\!^/ouͨPPA*w&[$~]Y#^JV #45W)RfALtwyuA&T20Zr>YDVB%h7MU>?D#_fM\M`ĥE`n+pp1L晪!S;|u $XR9l8<^pY}ei3P(_^]Z&3H Yu &H||o?ٝ ̌PInV/sR)MkG q{r}Cc.y obDA8;t`i\ Dحΐ>hI\j0sw mӗԟ;3zLQB%bhfWiAj$뽎AdβDKҒn@Bq - >*IE2O~ʹx '#G.: ѣ.B3vʢ~W!b0ndt:KQd|ؿDHS Q#,Je{^}ZToP+͸pL[›->2_nё4זCȓ !Osbُdle^sZF*bt1H#iuU<SJQW섰WX N`ZXmMBq7h`9?Hlk]_w=|}D|iٱc޿ցuEH[N%|Qu 1YIZ)r+qJ\Y&;K?ϝI=~p $PݘXqVgB B0@24,?NA;ve`68do@U_9ZfjtLɟy-uohIwnC|bj.2g5=exBJ(vI '@Ҳ块*=:5 4%(9 .oInPZ|uzʯ^58R1NpQ,~2`<>1x~hiGy3~E]ul#qD:}~"ts:e( `7~R.ku}OvH>n+`jͽ#Cf(Д_)Rb沗NL*)A,G-q8$.;ǓsID,])~c#g?:D,١_~"6U )YA:ǠU^=jx~h٬u-rB Li2N?pﹳRV4/+-9),N{/JK7DMJݴ}PJQeB( ;@e*AKPnpiT%'?l) k%Y3(* oJ:r!Cpw+/xE&ò8EB54_dANfڞ3bM]k$qnvfC9YWOeӦS2L^SgV@~fU`'y7ý$ƼǛ; >|dA7myh+gLSH.NK4Sk1Bo_݄ ^[x5}'A|d<7iDԏ,ٶxƋv^$Eѧ)CIAں5G>`T}j:?KF e,]Rvb9buMx]`cݢRi} TY4 K#V2^(Gڽ#\ RFsV#cl`rۄ& ,qO+`t H(W9l˯Im ^~mSaȹ]oa9jLu!M:nUPq'u rH pX | B-uvq96Z=pT$rgje򖮠{ZQhhq=GuSP!?! -MqUe7K+Y(#:%mQ!}uz{ͫ,@)ϛV տH2"o>rqǃ("/deu 樴;0rZ`vz3ZZ9@J@qҏBô@}m7Z{~欩 p !&q u 3b'%÷`*ugK{Co@p P?P \G0ds aZhS:J)ݝ{7C h+-[Pk*VQj/coOSq}Zش"]OĺpP&H/c(۹~>PBP٭ E|] ZLRhO$ˈ`#l k)N_WUsVy78V見cN+ae)>Q4ϔ !EKmb+ $]1U_u#4|ߦ3׿9Nc:}lGRi_:㒿|Oq {ozHXצB)eOm_3 TLb֊A75^ʑBu3kͅ| "٫Qş ĨryOMT;Z;R_}11_ur')T[ʢ/"g5dZL>>+D!Lqt_J [m>g$')HZ&Y1Z^~kΪke]IuDp0/84x:Q}Y˗!RQh=G}}xV '㈼";(UJyР$@xT: իJOA*Jm1G'ʱɗt0Eǟ`B:-BE1đ ޳v*%߲Pҏ? SzK־=zP>\F0h -\w}k迍 q/C/Gy#BSM|=a. ՛1d6}"zn bإq q]kr-.Ūu>G89/  bS$%Tb6 /0 æS; a ?v/9GDnmO˒e˄{7 [\x:^1)Ę#~PK*׾鳲eXvT #/ќi:O?;'q$ m7QU]3jSh&qnTuAجZ[&TAF"K"ٜ g/@,kqc he3R˗:1W1` PHwI\7{4-@"c:8(;*$l7PƊd+bP}_?Ǒ*P)[qK|B`.FjU4b"E0MN./e;=T~qk}65ڒX81ʹs'%fn1Pwi#Ytr^+ŗ AHj9eFӤ sKYO&%=5P(6l$}n@"s?6 DpM5ghfKbg|wg^@$mO4:!ƠAqrxXp6 >pXc"F*.L([X9oG~Eot$x/4فX\Dnɕm*wIlΆ tl^E]!HdOL -əZ~?A1$ALs1sUR 3&IOm&X[جRPj8jHWKdX?ܞ 9+7= -δj7IaYn6Hg?"= _&oDyh'9PÉBLˬVj^,x+#V Y*x<`ƭȎ2cRZCY/! a¬aN$GJKmyÃ0ZxV:I#2-]RoHPsQvBzjʑY18gkz\\}GHBu:O}GӗH%}i(K Oo,Eٞxa-^W/D"qs\Fw7$i)! pZSO9;s L<_4<{Xe(4zT:9qBZ$@*'v?f֣Z°>e~=yo`p\`+"14^aϫYB6ѭ3vaezNZޟ4N}4#~u;j-"\/BTb}qZ.X[rV=pj=B٣aLlc0WƘcx먳_s)*°ɿrJHJ4W 3 ob3K,T6ߏW]R\Ig.@Jbr+€AfoY?T@Uy=EQ}EľFʴ/IL4v_w^Q`72mъߕnX'+\Ű+Nf2J7wN^^Ò 5`+CIStlE3M P1nÓ اM6~ٺaRwc3qg5aͲ!'L~>-DkoHmJq4lq7XlAǃj0h uoGpyI\\3XܽR_LC8wˢGjwźɎzW @2eǻYaޥDȤ]Xmu%\zfBLYB:ai`[CΆ.ja@?yZ1)bos?[En U}qws2w~@d^yjws/H@m] (!?M$Um(dLWDM" fCvD4`Ll ״>ū7T,%ā/Vpbtkw(`puvPG;~x7„7jBG6ȩ PO$V+0TyEYn{ xGlMm SlW%&ZIU5)fBAzpS @~ @[oIQd4y_wQƚ6QUiŸ@Z}á)m^^#2~C!?9}WrɺER+xɿ)‹vV»c(~;][87Qb۫o //׼<ߒ;L:o /2UUoH7& W1!ݗš85PI"t(쯊CO>f]>sዞ; mI孜jr~҇1+6Jy PwnD&kؠ8H8lQwیMWN+C VC}r,~)g#Tĥɵ Ns-U7G Tg""P5t3GW`KGɾ!/ ÷I~s̕,tsBު "Utuy s O.;/.f`^19`{)av,c`^sVjnC]B֖14RgkC[x ;lI`|cX?18y!t۫<8׬MiTf7aAܝl;@ Cy {LnҹD9-dIZ^8[ŧ}e.D:WoYonxe~C{BJĎۡ]@`j؏mN/{WR1r՞p _Gdx\O0?z8FǠ?u]hiW4N/߸cӜ VL \u͖&qo(T[WŎ4~$C#g~Vlj}D6_MK'A0]Nkޥ(C!dedgѿ L -s|3,ʳ"s/*E5&zm&0 Lw6B k9/{*"wmCX6A5ib P`;p&IXYvD2^l/}GO):osdTԋ;5RkB cVpCIHDnh>ŪPu{ -v4̧ӵeZ@T:~V}Ue)xY)` kXo8J0&FɼK& 0W4O8?nbպT:MU:xAx %I|ԥp,ti|Ip㉉LC4Χ+ɿ*cCbyolCJ/rKc^~S U(_mːZq-mL~ND(νZʾA 'OBwIg]:۳RxB(ݚ=Qu+S+(*fDc#w!?wʤ||jJɩQlj'N/mle̕fgod@=k+"~J&i j#L QFvtlǭ|L{Wg2)E(W ۛIרd:.%<eLxJ)I$)w6W5W.əzs %Ǭy+|.)ǡgstRTX5 Ӑ^T b*vqӺn :aLL~4o(Aڝn#&-;*yds3rO޼/BZ; Eo0Q2#_oe9^y +"Ǭp`^a2߹&8UesibuAJS#}@ߜFdodI5~HV2W\KY6w4Ყ80b~zwkO"Dۅ ȁ SG&59ڡa@.{ݏ&'_lNd;ņt6 pGB&T%Ax848,ti]ǁg #jc C)@y.5ۋŴBM"0^a6'dE%XV$D\ SWzmÃAyst}G[+Y4qಬb"pt烆h#l@ʬo7_xgh)HTH$l4ٵo6 HRҒ^\Dܕ0Dԋx\juՌnx/DfI{@{Oq?OHxp3l uDX-)D(Q(zTs"@e[&JHM3\醗TڢUm^ ?E.e6mW&t4\Ie~=E69Y@jpI3|mȴR;%iwgqj-dRbʍz` %Cqy~\sZyu) oҭ/uR_9VDreN1| iw4|cih 3ﻂ7mW.у#@!k4a֝ۏHz!%&f`ZQVGu% qOUAyJu`d?JQ^d'Χ_w2iUn'I?I6)R6$hl¤[UNJ¸PqXACSh% }.ԖjE-L\x%Wd)70Z%` O6@ S7aް DBr>i'H(.) kf-2[83K=֟Ydal~u(3ս_w$zý?.]ncf~wcOFQn`瑓m,b쭱.Nrc'/|bɍValT3\iz / E:ŋ )٩p'O|]q>W@j %s^vY[,U77XE xV1i,&tS lW FbONq'֤bRM3t^. ^rBbLXHcې^v0jS.yɅr.:DGn_gMl.cײͅ;/\^oBVylb#;h4ax3H4cK:d.!`_[>?%D~t 8QuSnG[ҝvQ3D6y7<)G:E|Ljs=YtEc,Q FmVYqWZw/e;qW,` gi10sZ5Wϣd%L-r]=a$2'laxi0[GpYAz׮@ZK}Ʈ58 л*6QZ?5 ~wxSYgheG\QsҁmkNjGf?<룅cMW>+ 6 sMKCVH+~.3{h8"GTfSp8HnQZ~W0BT{ M]lc\@;KDSLY[|X"Di[-,im}M˄/QA@xzRXXmn+ƚt1O4![0W5՚o7,`wdxCL3BmT+Wu#ZѶaYt `*~ّ(WkcJ|tr{+&rv2V':JoIZʯ)5˛\֊y|ljU$Is!63c(+41>8І|)y,?chrwp>=P$=)18 ,è]q\hX`"E ^7i`[?2Hͤ6 (sVDRp3jem &HFĂ7243.\oxGOljݸ>J?MG/|C9Q \*t(5A# U2HXQK%R{ՈHwG@V/]$(wg9x7K=_J: FHJ2lj?/)7wyN  "~FYHK}rn4c~xbh:l4­7Xe2Ka:u3S#s)"r2 I$$ L9+ESA5yu g{mAų+KILd,7 E9jKFN^(7$? ~#l[brK@PYA.QAR}{i'N :D0t GqkE6Q&8I.v5Tk 23tGO7[B4o)qіG#;::{11zBES[L|󭗫{qjYٌ>B-׉@,aP[fS {\cBqoMQ&G=mQͯA&yd]ޓaqo~ Z7H wJkN:f6,JA.x9/-ׅ)hJdB[2-}1=?~ i<^U. @rGn:j U3 rUNKPʃ_v0=@N[DZ-->x,Hf/gDǀFbб 3Aݩ.~dBjj悌wZR5xjYc]'J[K:5dmBãK@9x?2h:5~ھ%R n/.Ε.ɜH. Ƿ*w8N %Mc挗"O[kޟgR [NC^l` Uuą 8 *a@/PiR!='Yec(ss,]ݘ}ߺwGhA+Hx[&*xXMn1؂ oc``.L_pz/ _Zvl;_7 lO$~d : iN=D%U6} BȨ~Sv1"J97YJE\c{F ,m9;G K1|k'U^fDOQ76и*nve!{XFtM/<0[h$z3T|Ԓә[Y]sY]4/qh(e7ȄG]wvm `]ϹSlD}X (_|T8,Ua[. p@pZFDⴶ*w1$ޥl/=/u^]Q$/Jj Թee~3SYfA|tcn+ÐÒCNPӾkfʺL:TNv!]ou7o4ewdr>0F;YWeӐ#4꯳$ JWy s_L}}gvv6Vcwjqh߰`:f37*pWD)5PFe2v@R{TF3aL:(&{&!_FN+ 9E==NEPٛBUAVw<(HI9ZW{s鳭m4C9O_!&4 `UWȜ\YO܍VLKS7 ?|IH-s?qѬ1 ؈W+B~D n vmh|EO0󏣸 = FvEH\dkwc-;>pkD$6=ԄW{rh⧯\eY 3>huo4$@Fۢy_2M3FԦhz`ͶÕV"6k'oEPС^v(O~3},\c7FbKQBY3ߧ_H&4gI1sta% 0<,uf|π㛑jY˟g& })Y!z2pl];w@X"{AsߠTKbUDEŵFPP䛟k8ʼ_P V\'r/*;Pfl]rb&G 0_rB]N,OtkҐ{& LoVSPܭ~˰0nk/&[z i9K.`q<&Y[<C$ԃӔ(iKwFV^Gzj{K=HslJ?P `ϗ,w8ͧ>\ Bݴj||R$ 6에ł_+u|[ۚFj/J~߰KLtu }YΖoA?QwcͩK Z%`d37Ճ0WЄny+i F+˔&bpge@ቧT6n:}cOxM53gAh9'~n̜/4;So6[TP?~pWtPJ+WKH9.4o~wyeJ ן,g[EXۏTM",IUx=0Zj=ǒ%?J J?zVaFQgb#H㮼{ gF-vsmv] ;[ #ȡOfL fq߯evwl54~e틮(~Vmݸ| n~/ݝ-͜Xtu ,xY+yU0UzVxLAVd"Wr 6Ֆ|v?sĩ^C>Nïv"b]j.Az/5ǀ؂}Ū_5],7NxA_J5',K1_QaZ}̆ u,y=e›. _G-I :ʦ"g--{:j% ,]UW`ɲ?~t h=4֚X@]n~:{xKk#B{V#)zf)d>gV vT8_MݐF@^Ch\{v= zZ%~}w>GJ^'dI bsw3QN09Oeh?bV{r#jZtAWO{Cͩy (I᧍]/6Q a/  n[I0xJij&Ip>AR_W_о9>ou:J/x$CEoa`jcЪd`5a׍2RT t I"~ A{RD itI8#h}Y$ZjjŽCyAbF ϢȮO<^"HuX7~Ci {)jVԷ Z=O ,t{C &b|E#Ja9x!ȫY_8(ncym^ݩF`[v-+ zruF=I_󺼫0ʊЍdi,WԩVjf׽ǔ1tIyCHb)‡FN9O(5a\e oZ!wƾ QE*œ8"~!@VB+.-M1'16;</k,XIIqb$erl)]`9a`Wۯ)Orc^ô p5.Jaַj/Nzh:reA4y0j3"oq雊]8vqGbηޒ*yF1.b<~6nHm|Xh=ړJr/?rUuK3}ۢOFCaPp0ׄ3eAXjDqb.f}~+Aj`[-r|re7)Jđ]ˇ&,a5uȋ ըgmeeg_}d;5{i.Z40`K,D4(A~R w_;`K< y@Ϳ^D d bRŇLjitX>>uYMbIrhߋ5zWaV3 [^Y+ƷU*UZnw Z#{Qu?DY :k[y󝲵'֏Kl@YXW0Ba/8Lq\8FO dv2FrhM)V ]=0f[Ew aʞ BÑ5I-%# Pݢߕk.o0D)dx x|-`4b'%jѲyQfY<٬mx< OX=;Y 8I*.g\U.6}O?2,MOPetulLJϣJ5`W1 k6Ƅ23@Ρ{rUJcF}CuZT:zs];?;[.}u?wbidK{)r=1Q)5oeph~>߬t7y@]y9K#uCt5n6+1p„k#VuVg{1JjM!`^"EϔMCx:p t Q .g<<.7;MKhJ*% 㟱P‹[7xqw_FU3)plwliŰs~g7aP(|jI\Vw%6G`_cznJCP[fJJAr_DXz#lED<:VєHF# ^\#3Z7ZZpc=104aq#Ĺ0(4]ŀ,N;wH}G HPʹ82ZՖ.1 Qr gEPUt#ɚ0a-uI1͛$ r%"uy^"exߨ O>;2R}A7/K`cPWnDڴ"\ i0Quth5XAn䫛k1͘2EӖȧ:$5vbsqɥx|`P4;{iA+§F΃p;ԫc0{7v}(hF^&IR)o՞!7Q{\iZQn %OMCQÐQt?Y6O~0wyzmhj+ ^n+]إЀ_^IJG=Vg1y9Zq 7.',MdU,/Ӥ<Ş {hmN@qxkVv`T%ef]نP'U|#2G0%NjOHX)uJ]aaNr2_Wl=&hs<89K:S+\wϺբ"t疪cɼgImekAcE)מr{٬9M: aH')ȣbg:j^nj z Hn a]fk;8gDxqgJL9ApZSċ5@b5je0JM3ENB -5_A:]B:tͣ'1>p+ڗ_Kq/GŎd{ Kĭp{- ݴ70f IӮِm!K%x,}ۀR%؄q T_Y WӵHi$jo/}A$+Ÿ-Dj(m`Ť~ՒH Lx_08}T$Dd*jEmc.BӐeFq^;N{B‰ޘRw!grD䫠4~M^X.UKr|)ra/{ۭ/$. _eZ5rm̎|t Մ5utU?>箼48tGʄ9D3ǬnQ/8M-A듚R/ mIpORkGcr׎ǭ쫐 nD#lEUkPI&ǷQB!d\6oFtX_ʽRO%x"p6 w ciBؐ:d]^Bz|gXN :Qg"<;/ɏڵja}WuM?iݪ,n\Zv|+vtb؊.9ULU;PiS lT_ՑralIj+o+PjǗڨ\ӐʔAM'oqX><4>na]2 KX؅ڒ )9b&9GDk<~gIWg#-c(ESJ,&_";?C]Qgu,ܝ,d[ΐTBU5mPܐ-<+5-Nt"b8]~MGoY  VN8{Dj!L;<8gBhí4FW XD|)iԶ]+0<M[arY#3 N4Qm36<uxq~i*^+==w\w5X"@Y/Z}r׾BcE)׵PӖ)?r4<# Mh xC3Y2:z![wfUHɜ9 aRx13L1ъ'c'x3%pG9y YPW4z 0w]8Ͽx2 γ3Iټ)p_70`"2HϗLBO `dž8"9WلO6Z(V3\7V&"bf_BrZ~o#Y.܅IW:c"(3P[ Jy d0`:7`Sɖ] IlaѢc7VHwN$_m>٪b3EOۤ V],e"P h&7e-թKUzW2Z0,a`caaI\Z'~@^k \ϺH$"W2Ow̶<R~P F&YyF48BAٸh7e#6mb1InwT/ 1%ͦ[*/gf 3IL7Mm[CS ǵi|PG.N/in\J!kNn!Y)u) I1$+}E$ĈS\ AղO`۠P4`lnM y -@C*`;u86XYvuNTMA]o054{sci#n(bEKH?vaD*o[ ք5! ɪq;<<aE&2BKs{x {Y̴rbd5+[&}7`=Ҁ;O؋ 땁F_򠴒Wv&*Z=5;?&/ SHjN^k1(0mKl'/N 6 v(-;UaF(VQ4KJ_ojA(WƩ##+h"m;5vQ D Y&]Y4in6'GkSh,·c3HVƞ(fN*6^/N&T ²\my -AZLMe o=)Gh5[2SL(9dFt1bJr `.MŢÈ5 RRg f#=g ВeНb?;-pu"06I ^Mp3'39Æ{>vr?#!Vdhx"w~l9vujfwjy[ 7`|g* OhtYgu a ]Dˊ ;XLkSyᑷ@`Z8ՍN. ,)^YVOhK١TJf <;aQc|Y/ clعiBJAҵ"{Y9&Ί쿚jmO4eqDx.3;'Ͳ0kg&X4OCxӏoF;㟬#EhUDʜRq }m|<0,ǒ)M?=A < L^D\]3ۤ>R(6*EC }0/1K˒Ȕ{ | $nXd+O1x R0DR_HtD_lqk 9#Va6{RHGFZl Q@7P`$]0 9یKpT~!>ˎk3aɱ^Q(ff>V"3D!iIL碑libM==H%1x)ElyQsV^#D)p%f*q.YG4 gBAROS [I$k0-t$UEC! -|_ĎĽhmJ8 K vy4Χ>N7ML5 I8QMɮh 02n(Be(poĤ5wy<):r=qA>p]jybok/xt,@Cm7 8e baAZ'h 2[">t@(/4;% 0zi==a,W&A ɬMٍ7 N:ĦQw6/L@eѼ\(+s} } (B BsIOm=XtI$(pIRҿe{RbmRG(onFrzB^f5B=弓u)eC"X= a u*K%|tIˆ5$RRwD,E(BcgeV™dBcđzsI|U;^ς+U]&Y'(*l̀0 Z7(Cg0n՗}hǗQV*0Y^z H4kON|p"[ ,Rp\ OC[^#Ip8 ݦtF4ߍiX@\jd$P(%_9V$Џ"{†#4H#`)=|:5/LFTbd-h)ۖl[N .Pʇ뤠SF_+N0uff)ζ,8*!_X<۝MW51D )Ǒj{lpAϜ@AQ㿖hFh޴dwN` 15g9k~iq9]䔢# vZ/2F`HT|E E|7lL*y*juj~EU?zлxOXӬ--lVc^SR&q<'?Cf =oH*n .m4zAO$iXLEL~O,Q.)C cw !RZ5*WN%5"{G UjDMxB3tZ Pd.;]su櫩p^6b[WØ Dd}ѽ_Sp)ggKH=?@pb/ʍU !)Db֝RkTmN\e5 rb* G`{girn)?oPN~A>K)TD)T_Z/߀\M|Ii;eshުY(sQ* Z5j?ҺXp&+a7_ ;Imо?q[]'!bJ W:6i~]Qd: b-%C#,Vp5@" GbRi{A̙jRC^wa#:rCxi Ĵ{x6KFg@S?4 TM&荒DU/mipZ2ӹb--_Oz Y>y(d ncT~0& !BPڙfFXj&A:eSs#.eD(j ]֦br|ЊOBKd446@`j ;zS{19m6,c?,9xU4Aů9KHS2*PNCaeguXqTKƲ@rY=jX)b`τ_Ղed C\Q9s\Ւ׈!Kmʽew@t?evhN"y#d/`YB ODw%"]MȒd1`ߺΚ5ՌyOy7)IKO֦۵ZՉPGIړh/;AS l`M4t[rKo-٬xB-S 0{xpZ i"?*)99MKY=.}_im9zesZ=]mUMKIIآ۫Gt3K>9KAI c8(m$FqTG1dNK+E)~-S[(/^WB)kGJEUlU"D\"vMgpyyl"x1_xvkFȝdϋmY-ћp}zin5?8Ҧ01 M()=U\6C2PvL[sF0c3A-h&_vי\u TF Elņgh툨v;/ xv"q&lWh'Y&SQ4; g`rn4`=c߰%dstqs =v˾)k(\/"ĐgLŮ|<7*7[XN <麲pJe.c+h؋79yVF靷*O0n>Y,P[s'΅CS.Zq1BIP!CrYQaU"-ː<_};d /B~56,S!). Άi=7aPot,6/ e镀::ߦd'=EכhMuqۂ7Q{頩mwkEa n'b /Ͷ$_T 2GͰ>"~r oMD6` ߼z[¡:H.)'U0/_HwXB{"Z <6ܵ g;PX[]$Vf#<9o K1Fp$+N7g%@Q0ɋvtfʵvqa hJ_C'ěmlK}/AW(`b7|2>7/gI>+Fp}8Ri=AX&&.xj]B"IͲLۻ!ìl*;mNk;`ֆa9?yoC/2:7ܗIF{qL3x[Upだ2aR… A?;7mvdzi<洽ގ 956\Ĝno.TU7ofE*%dHu62PPloQ=kTҤ1>4ƃTeaph&+%~@竫jg`Ool0SD;{GU0 ,ၪ}?)x U&mqUۏ-t~-Ux1x8X8]}}|Mp\Vd2'w}>Tu\,0< h,lB2wfzV^oTUZݴ]^%l#A,5R^сˎsͦbbU)XTc&|7 {"$VT}dA9Z,0n-.G3/2[f\*ܴՉA3jjї:w7~_[HHq^hf2.·yK8t3Tɬ6ޣ묫^p!Kk#$hM{Lӽ@M`K~wX> $>#,)eFۉ`l/sqFtM=`OoԃWFݢo”ٻ +Uǩ~ڨ>+tbxA {&jиz%^w(COZd{(EЧ`8:6 }&`M0!ٝf p<3}u]D^,b.P.uql+gNE׀X11'?dT5 >5ʧZIbPAHP4K`J'xqĢ]F{b( 7 f"2*MQͧFE^}*WC < حq^fx~ 2jfhOJ h@2#uѓt݆,)>ڧ QaqL6oHTOM)F݄I\r|ۏ#hCAc8!|]wB́)'k焏 _@+7ͼr[?r;=}@}{ 蘝t<*\^l(cĀ)}@!7I vt $Y~ π:"kxqlw& $p&XRaBaem&5؄ѕB\}4 T0 &/LDN>^$Gװtoz}mðSoym|_>?.j+;T:)).P9/^ :<鸨Úx 3*f fAVva4Z,p.EW/)wn@KUTo镫2Se6. fmeؓ=}}uFjRøAGt|GhZ>5m!0c\pn,K?)!d!R=.瓺H}2n~C %9Xt")vz~Pfax1y'EAVBBIuD9~0v<)%۬#JnXoq R6)vv@6uޞvD1՟@x9AFNJÓ=}Y bb[xW[>ϵtu'fOfyl,-&7"b7LQ'$rh}~h撫 i)o;Iй! 5*K,1o}RB"zh1(0hCݥ'Р3Y(+5Oq$-1G瑦A:*ч+.4H!Dbi4} N3DaI7B̅;p'i9FfMU k̓L7ZF^lx{:-<]C'f"h &cQEb/ R҄ M^.k ʏc9 !>OI 8U}"f㳼X. `YRJ4|?yhL&*͒ȥ5fL.Mv;=ҀP|҇}Wrp6Aj0Ki24D\A='wd]+RiyŒܯ;QyKhCu Sa -"=2axh;^ˆ>vɣV}^(>>THPQOձ:o"4]m f!UFhG˴L ,Q-Y y~.>f NܓUF]vpwZK39uHMBꖜjG~ ?-[+'T?I1_Ok&c)ҋ}ٻ~a\dK=g R!Y\n*r<>{Iaи}#Ύ5'S {d\>zzOT!ܠ2UAd%]t?Z1/+֏L("0ղfJNcC^ \k1J@V^/7gu猌[H4 =,"x$>beWj^F6[0叝߾^Xx㙺GI/Xs9B rȟ/r(siysT'w6W όS&l\'(W{IŰS"ڗ(R4 o."itYWT׆Rb3Z]Z. >@sN<~\}hgw1<|y sX 2yF/W)$g%q^ <ג0,6uTIO)[Cu1;9CfZgq@sƔچ-3=DiR e Gvb`q߀h%Ŷ{w iXc}JŒ_IM)*Jx8#!Ņ=R'eE~LEVR{-@ԩ98 |z&AHaUDSǁpjX׷8Mm>-"n/Dǫ6g-9Xx(&)3Զ Y@qy jژCSF$.;O${-(p{pĎU Sѫـfǫ($J9*ij 7ťIfTD WdtlŎ\O`g[7[KȂʩ="wʏ֌QFP&n؅l䈦+M؃O`Ztd۔{@gt b%I"|Q)n[Nx8R}8֦0 ´JϋGӳ9( zid]+chAuBb$^xZovH4FiB<0SoIQ* | wx_>T"M APҸHѕ&񷗜lOτx 5(ƔD4ժ+;`KH7k{iUt )%?r%'JmаT W0~}<} S܁jE5b{2ٞ&? ]Ջ..4ض_XhN1%`oQpiA0NVS>\%'7"nJ]%,f;#LAvfl7XMCXPTS\GEp.{c$XEV(U=$)ϊ]^iarJWm}3&+.@Oknk(!>%'˛RTͤ"%Iٜ.p Ns葌g`1kZ_a!J1/%AW$6UNlk2M'ɊI%n-2" j =嶘Gctqɰˏq}.b<\^cwV>68)yi>2tϱ?N&tDa͋WFB5?٬;? y]~sHFa@\R[1bؤSjvk%ͥjel}1Rqª  7GdNOo&ARStEf7]LuqH4/ PA&6L(CUAve*!x M`dQ버&&qC\ UǚPy d=q|͆;Q+;Y9lʢݛU}h;Z q}x^ڰ7|;- 6n K>vnB-&;. B[vh[&]\&w$ԣJ>"=mbƛs22Vԡ7Đj-ll ׷ ߟA*$\G SɒnFײ@BՋ}SBޜ:10n9ݽݴDƋۑ&1#Z#'"^~^nF%%zX"и3'SneeP Jb,Vxǃ#QeK1l9a)W1"@ .A0&>/N@Ai7qIGlU7r9A1ʽ3bYG@!(;>+Onƞi#VPVڅrUX~q1M]$;6O8$"2,!rKZvK\x8g!A!JM ycJۓɽTAUP^qLދv l)jRadI$HVwG DZXy@T&@ 7 )Epr7]3LiE YYR|Hz Ę#R4̀/yX= b&S׌ ڽFJ͍u]㴠oCOa6~Rn9Ubbbc]!R6`==( )7him?0~ɏ{1V<4m–mpZpmpi߽4PHկ6U~vT-gXΔ^bl>T ;Uo7v҂z5IYN鿬޹ƳbLy(.Als  A[Z&1d oz˹+w̲tumaMGpMG۲C1YIʟL;@8иc5u/]r))GҰS-dԨ84 ( t/Ap)~g~ TpB&Gdѣ] xWWKYNQS0KVX]e(MntatNoPLB7;ѱG ,`̫w/|*3M}6E}|O ьkc؏EsJjq 4=b1'3W? O -N9x29p7;#q]FSbP˔ʗ*(,<'6Ȉq44ۄYJCzRݷN\/O뢢[}BbN"5^ljrTC;fvT 5ݳ~*k'+|&9ɘJ{/|˰: `Աw0]^1?Xgv@WmsB)=0*(~΀m֢09~=]_/򮝦ʽm f_f5!wLCSㆳ ιtY[7ӓ1D6E[0q6.L\f&>|<ђb^B6ͱ5;o ߌLHEh'adn+I#k(:YrƂehr>PpFkZI΃("]2 SMh5; =3SLPd'$dX,. ;UuÊM{XWhBšKc inb"XmHyXK/}S93GHê 4ޡhj$sx-xop'V$O42X68+n}ynսoS~ɩnz"BP^*{7wu]|1 ө2`)oQ9)5]fpУnǺ7e$J kH`ݻih,7ܡ}>_qa}K@ȡEY0QA* c` FwlPw_|}NO #uΧ[nK0p! r/7 Հ68L"+߭Łq# K%#&oԥ4j?Dya_T-i+U 3rtнi$1á̏Z^W1",|)Roh&m!UX Qx $֛&bťz.T_$6QGh:xf3Xp5=X;DWO]t:ФGGkXjw%g׈' l&ĤAr͎K;5߼3W0:+z&g\.,zxg `KoI d!Jk$| ?LX(x^@[܏6OR_ւ`x"΁fE_K b&:op!޲#MH>~p#/n.i7w%T> ON뗳GK̹l"dFfTl7LAЮͷdj)T*&S+YN4̾.̗ӱ \A՗K(W%uro.7=w)9y9ZIiȨ1C&9| 2+$D/Xxڋ2]L^2k +|B(A1 #FLHDҗEJ6{zp /Pvqё;6KlbL:RUUi|Pl{ 6'xU}8iPܞ2̢ )P5i :2p31XjWߊa7 rK&gdB rr "X^VFN>]!H a3cG`DP!.<>75tn.I/ٶۦ{v 0cPw!tKmA5s%hh=nOmp)jƐmYFXgęOSYdl \EW'W+}Fj1-RҲRq2")Hf%? AMhkʡ[|"jf8ϛ)#`4'#iTAĖ~X;2kS!EGy $U̖.Bf^`}R1_MBo1rNΑ q ) O(ReD=&%.Jp ~+ u%dةO(-9 Ɔ98yhU\Vvt"1 y4+ 32C7ͮ]Gw%GM3Iu!^0s4VbW\`Pf8gXv)1\, \\nȑMpQKЛ{e|R Wr:|oGՎD{'vA^9zco(^D!3Gܟ 65wzEgUo!+vȞ{..L2T?d)Firرa;}xքifASBAn)#F9#8$,V/s69n jI2-ɪ*ְݦiLS DO"\^mۨ7 %5jJ㵃T0uu"(rM2G*؀ e{m y-*:6歒Xs!Eo`m;z\$dt7l[$#J- u:o^U\&o|Xm@uh WziN%c5G9uRnz8?,#Jk{4HlRNoj={$ NwռaZ"֙ê,;}v)(m_>g58&(7WoT]eID? h&Kr/PL>ػ(+s^dl0S_MM6 a;<54)z`Y`c"lCv_㫤ɜoQMR(Tv8hY/m2;[[B*,p [ 9:>kQ'|o!1uaZ%aENu!V e20civ'R@eVMqTb jC;W={s.'19\y-! Kl>ʊk;b8$*y&@@eyqtTE : ;mWL%`&jo#2_OK1ѺQK}њ$,\-JYߐŏ%zھ̈́X'֝_^;PNj^yy;!=\+@՚+*?,߼1Sj'%$?AKiM'n9V'aiw.=O|[odP0tjQA5Wg1/­[V"h\v+!77Ey4cz9-HtF$e( NR!vNթx:ZU*ǔd)cG2QD_"7$UHAQg.PwVRxIwc x%%\1W}ݍ[-]k dj{'W&oDCu9pNX 7cBsexzTSC3 =rJWܡH; oH=,؎aDs :K cQAsAz3f @D ΎO) 썇T^6c+zD]8A ~|uY'jOBrzi& VDVC{;4 p'zJ +̲Y=ZBRNfPH&N\;'n,0 n%"Z)\:f)egqdm;t{){rk.r\1Ѝ"YFk9d;1)kl??)iC 'T%//{|M Q,TYWxvzU5w =aezvv8l%|_zySSʼnT4K==mE aDk. *?neKQ[ yZu'(iJtTՌ|H0s1No )o|:ZX nJT#`ۧ:W q-L z2'Wuh}ߦdbponTM_\`g2ll>qt lOw$!e'|5R;A;+Rm< N= C08 iYjeD}kn\ 'IV9Y)WECMCI6j6F8\eE>-b #pty^Ok\*-ŝ7m):q3S} E#_(._&<㱶I ':]=7{_Nd;{ Ie&ԙުVmj(Tg>~*yq枘!2dH&29V#L脢2"B={gZҰ{wfΠA) V_72%-+|vZKV%g͌Nchϓ_h]P -Ng}XY( "p{uV zEV kue*g9%!01Ɔjp:S׋Q  DϫJz"nX*N56WʛP`ʺ:AUc^ {6hz|w7n-^,:Kiճ8x H -܄mOQ2fBAt`YR {Ӝ~=))  Jbh`ю5~O;/ֿۦc,6uQGm W>=͚aعV1XqO7TE?%ܟ$@WAGD'KV`]tțZ{@Io&lfɨ Ocyʿ5?S,PFw ]W'>ߐXԭdzI4Xu䵡/O<9/ ^ج#/^āF.vNCo|e VEd:ǝksu%tRZeL5b- ջ%P5!',@/k׳m u8%۴߲lwo}=[8y)߯tAuwjEh$n8 .{SZIrɜ4,jCg >Ķ fL؏nWwLαͫ #mĒХSN܋}}VǍƭ;C%K6CNJM@@cH3;,dm3 .d勪:qՄ7hDrj=q^!(TC-ӳ|zd@yo-{+r6 \o1DʭiJ$-x&s7td$.'вQ0wr303 kߔ|>(8Hϴ%E_;=hIEH|:;y~I/uDfS{N:߃MW.u}@U9(r8[sZ=HkD۞3ڻt{O/i.8ӃLAbL7"[xlѥlf˟n ZiAɚ&sm%^h' _j} ;4#&'IICʇo6a`$ilaUǷ/nU 谎.8oC I(Nԟb[-&3̭>);{39.he շq9YXqZ_8: 9 wELa@A3uwm_بj1N $}H:6702ECߎ, k~{Zߡ[m[7hAu7nZf=!H@UiW W8ʡ. &EG\Đi# 1Mz Ħy]1'^5UM 2ƐdR|pNiz Sw4$A?*bU$nX|*U)_*f~ *W$v,&(Ldr/޾L##A%j؃(8q(CliZt:^@Pѻv&,TM|(~/rZW3dvŊ,̮+}ɏ9!U &[J]}%*<6N>%k L("NzZ1 6~kisSbBD(^IBb\(kѨtMMuR($OReW2® ĺУ<`\5id| *صŕ_*AJdJt%CԪ^JME8Ao1;;ShVF>#PQvog>_ " xn:FF:E",wI>'}Lnh(SXo^½BXKXNҐ7jgɯ7֤DZW4:u^["e~F F.GO&mK)K7Fxe*@ʄ:Z1sЯ#ff.xGt3N>#j Z>B:p+O[t\Q_okA(Nv]iCqHB%LyLz* S"1 WMSKec0yҎwZd37\5P2VC԰{'B;# Uӵ~%C+ֆLFd'{Enh.j:6=5,JJ ,_^HL*bAcy 3x ?+LS dd2fB] $T8[dv7_:cʢ$i0l7>lkFϖ|?j4n9CS'Ek&S {puC%өFE.պ#[3CLr;(+OPTH=? ~(^FY 19n WX9[HtQ2`4\| OoW;49% t#{wA. p1́[~Bߩ)Ms ԋmVqd~~Gsÿ_R&om7EeǍfnTB-~)hf-PF~ݜa HW2V}ƊLu" εSŠ.bqb W20= LirY gTK`(D%)#X^\6) ?՟ɰR#k8TTflJ䑏!Oh <s6iodd[T.K/c)eƜV,b'xmR@KCJEeJ%?=Do<ʜ-ꏋ#LHo--m NEY)t-J gY T`^Mn-jBu| x,nņʿheL0%kFCsZ່Ro3޷;dYV\Zs9\H}bz HKX']W29w s_{mδՂEwya^E}4^]rv;J􋰥0GIyR`ӡ q(?Iz7\%ܵJ} TVnEnCEBut;V\m{;nexh4go$q@D8iJ,Iec޲0_;ZHt~[bxc|U$4{z⽃ e"%6zq#?$a)V&FlڌI?UȎq(1.~4W(n͗{ME,}1[]oʖC$ -%\?=px6z.?*/Iu#ujCP D[+zsНPLb[($>}přSnHZR ÄH/+ɽ*1M=Ke+l!6xWUv*Ћ;&1K:1\'ЪU8$EpRrlY4M /Ep d y3D%㘜E!g2 \qCPLD0wݖsr{b%C\  t}#\ib ̈ ŀ k=5z h)Xi;q[z  ? Ztzכ^h726<)Ӿ2Jm(qjזg?bNj"E@qgN͌R#($r}:[nȵ /4RBˆP\cV*1H}aPM2`T^JkO|)GќrLl* ֚9lom*lfc]L:5 oDސY " 20v^|!tAf)d`3DK+'7?Xy2+s v F.v6oQ|܀^ (@)̭,Dd[+ZQ+u3R6 j{9P[o @/FWq,oc\ǐY7 uNSwŪBk{;?IM-q^+>|,}ؖTveiUZC? d'ֵr)-I*ڢX]`߾q˚+4L( ,7af2(ף0{'u̡ M/X7o[}Pp^N)mz\YoMOR9FcCUnWy4z4T._|]VttRPzLzcoڝ;Lfa9|85@ 27wIPn*GgJ5m; ?a 2X<)bՖ%s q߳iW( F ޅM#){u޲}[btczҺI=C e]l@m)Qqp/ԳGu-1P vhzX `tC]%X? wd~R<=Ae!..46Ҿ˶k XʘZ[^(H<*!TA<>DoCG"e.%SH>VBH 5QF!=F 3,;?ػ L퇿?ƽ+ hm-AIJ[8Fv[9ϓq$?VI[o>9l`MPi5 ӱi K8pa^fқ u>1^dC09+c7(^\;}BqXK䐃pSӚ[幉/K.ɌTe| v[ &?"ݶuEPpTH mv*>>t3?j8xf"2گEGAKyMgB=@mZ:C݋R;AO#*D~&Ҁ]_z[Dս^}I>vIt>}с /bzB,)Cem~w_k`@Ёl"RZ~wp-t4e5ΒFYAKh8l.tGX[#WB0 I憆:%)*!ěD޸Stxqݻ-a$Ȑ?bBɺ~f4gyrI:[0a! [&A{-0zpr(Sz»^ U4@ Q[t5(L=<;N LQ}plBd;Pi onl@jģ# ODașG͐}:1u~s[W$4#]>d).)+H4e(n@`G428[z`':0@)ibt% y[U*=%JaPzL6eߎ(7ZEGW>)Sz;lH\=+/#|39"7 ,=O=הO(= nc(\Z<&ohbKɞ0+PXlP50Б>Һ06 ,u-\T)a؈r-OqT$,,]) R{d&xBB~ׅ<&N2K\WJC]XyNVDe"zdZDZA,@?eeE5Kد*h~$dAr.{7zP}*+.q ,T68<*51le_C ۭ `(J0XMV|2x)W犫s/Atv. S@^5 q 0k+L3Guc詵j9!iluOH?OW^K# (^BYjtGUў_OX6<Kd[)W,>=)ÿ tP >rGK8N`@$ؾ;9 "tea#Aq*vba![[4%HsHVKhz-A0Q,i w%stHZS\{Z؅zhjN7ԁkۉ7@{M=bxw^X#R:#g(bC}8!(- UOf|$]i>9j/j0t^B$,_'aFwUiɐy{Zxf›"9 MqW{JF 6k%X }ノ1`(MK͚<н߭zŇseA9}w7H(MW,v$9[$[KV*? G1]V^P=Pʚ_tw_v ˧QFYgDA {} 8E]H#+oSQ5[206A2[(6EEW= BDzWYK}6$147riKa]{(kZ.>p\Km- 63ji# .ӹbps$yQWl>Yx;S# >9,H;Nj&4"E ՜ݖ#k;W ;XHUaN{G*(˟^%u鳝;T"=tՖYYhI$kouޛޢҝ"F=KGa0K Ͻ24_1"0z/s1s|!*jݕG$nYdGE0b2Ъ-6]<޲YzT1E×fz.o6S׹ :*tp+UL*/T3Տ: [CC%J?㷖{'vR8ٹv""ߛXU}avvDJևtў~5Vƈ6n;8E Ab%:}z18S`3E-48ϝX< b35RioAxO0+Al2𓢖&M=;Lqj:GzuHԕX&%=Z}%ELW#6[TϜc1VDK_jRXSM @BElh'gI 9uis%e5Oh /0i.i B?h*Et@BQKC~QK`+'Fʾ Sq|؀)npoB: (0ϖ+,xxu= Ou< n|-`ۈ(jFz'9"|b[Ӧ=B;N䊐tD^C\:=ȸ^.r ohj "xzVզJ;(e?/BC7/^]Ims%}v}*AT{k1)z V$hVyQsd6j}^tH_!^ų*CiL٘\2R J8xv*L%V2KLY(=X+#հCd$ AKCih^Z٘ܠN5xC3[n]A=^"a`d;L4+e: R#lK ]P e&jÉa;la+73.FWX7Qϔ4:۟I<^RN$/)u%,mOTcy!qa l%7)ͯ:N ©E:8!O/Ygy- IU{rftw+«LO^9(iѡ[ ӶJ\b63aKwl%Cܼd*?({SY,(OW`oU@AwB"ku)sZSy fH]bDɈXS~B"dKZ@ oK5}7 xwpe-3)q|՝Sc.(\ fC <HzRm"jT1a.CǭNEH`OZOҧ^D6&2i S_`NnLu9",T/QA\ւ0y3'dB'<ľxdb[icPÄď)lP #}l(tWr7g#47<,K xSP ;-e"gSp.Ͽz" ']c:O7{)RŐ{{7OԎ<+JUщ GF; gW> eV6iG0%c\Gnf@9 >vOx/W41`T`7mihQҦ_Di"Ω&^RPIeI9I (^WM,8}WPIҡvٍ0BGbE626`n ^+; )\PTs۴ NtF&UʺBSFviőƃ<8{x`Ao"gz9,$1kH]b7V*y{? (gF@M8^EzQ]6(\k!^A_ɘofǧ8~8et宱5@}<@<-+3%=@P3a%Ue ش0N0W;:(%pF.5ub[X-ʞE|C׭ $TUg^bH8ws4îbԢg ]IYk-# )1Q(†5u!)Ycٖ"e.FiB*@ۛ, l5)[-4|:; r\ NM9j.i!M~stݎ2u$b9LG­2 =Bj#؏ru2(Bmu G{7HO^5KGChjepϿd$X84_߬e0%7l9}:H~AЍPxv4BT扖Ux*{alxx˭OL324c%sb̔!WbLb(x6- : <9pC-&uiVPSy[Y^?RFuj̙#]ϩyO'gFUCK n 3ncdTZIv;+KYi?İ'/92Jsٶ!fM$'ƃ,3ӣ`IsaOyItvB\>LiVF?>(VFm݃7tHQOxwγK}nœQi!)&(bvgYy//3P} SxO3h%cl&>'DžIw&E 9.ЫQFXWg#/}Hrg:p\\8P-gb5kuF`Vq> .̮O#Z"Y3}$LLr'm5 y&H9:k,Cꔎ!I#ZF3ܞ+?heD1kSqG͒Q;Ƅ "y6|"|Ǜm6<$!]L4K .l$\ _";5"anT_U /DĥH݅]jLRz73zB.CHBglv`iǘP,1ep߫IJ<rhNUYIj7N`\זo"|ۅ0Y5w37o3t&Ʋ㧦9iØLZWf_IiE-0!Y;MZz| °YAiut:ivdz~&췁6c%_'-qHJ\ | U܍9Ծ63뛿>CB93j)}]fqpv&o{d+N? Q@H^&݄E˵ n^r+&`Vj 2Ad3\g˂6̸cZmUX6 ˂_e.شXW/.Ū{4<5I:uNNV['W= >2:euQL"aKkheF BK=ː~ 'S0̇gN$vFK zc{㊝b3__udZOʾа\K9;ݣ7mzr4?GA,+uKm=Im)9i{/J0$..u?;_ȧtiE[碻*c`P?HF+Q0Qew4 ֡.P6aTVbш8c^kg8qGq^KkV!ZX@yJ3z?MAD f%YKOc;^AEǞBNk EXRp'5M`zfQ"t_۪PI'~=~N>>78[vvbMm=yUt4+ hVw+ O**c;d#L eKcYˏ3XC*2gQ]Iy.^-Юb1\rJfR _^]5: c(24o[  6ͩHF @ SG>_ONQe)B{GaI$1hQ̀BԘ*ԝ^F}d(gx-Űμ~4cV..'GLh%N.C FyE$w gAܷ@ 53Fj*4Q0.iWe :N+ 'yTL!Oο!/bH#eYm,kvX ~5$cӷOdq CLmhѵ{`-toKq4d~/[g{^K̍l:E2ٺXUwc)0{Emdg WGhb$7|l~bI zW1l5Opd> 9U0-aU/}:r$W u##.4 EU(+!];eur $ڔ :MVJ gSyNL ;.ȃ74L[yt 8\/ jFZUzNY4T5!YzeY3„R)Xᢇ? 8>\mzqyR,1CA;ʅ"Z6̷swkg_J]pEhe4?j# u9^I?i\8b!I++E(QR.>~F3~!SDq%ɶ˥{0 /H|$MOűK?2}z7<1q%~;ncn;Z/y|(E"nshC5;)e'þ&ۆ2IU?7ˀ6{;7G&߆9n0Yk [g2@v͏UA;rK8,kӪW{yUj,ھ졏mЄӶܪd g'f)Tk[wlޤeX^%\ԂjdB?񁵨/ =9PLIlE8*!9@UL̫Ae# nq4_ou YɰHeVg[Տ"z起Bb_1m ^u *5Hu]'p5 ׷S=!y~eÉ(Wa#ìX}vJo榋%W2! A Q0 g,jt3 FxR9}Y⎌t2NXS }TYTGVW/:7x8hR!7B$]U6 LX)M0m me^I>*O%<".U/3(mRA ݨeAţv qWK<ۣ7@z 1^a*d!!W+$Ќ6 _‹33~UGNN p+JeT_Z>.D4, ͻ%|r鈃Ӛ. NoB>3hM]UzO =NC|E¡]9;'nWPaZerE[>@+㜫*U.+4tuo=%$X!+3~*χ4ZpX[0OF9,ZyY}w*&IJW"ޏ3SmNqVAQ׽wb"Dϥ:]+ hXlGK ܸUlCJ27xy+.|kՕ#{>nu'FڎP^ z?=Y$j~<!3Vd:e"";墄Jڃ~S0Oȵ HEÕΏ\eqqD>gٛqO05jL͘lR+NsS?8wve57A\8l/2e;2q*ߒNuޘ~†j5(hRi-1z="jɥ"V׆D^C/Ǫ5 `1xȥqRi?_YT@.+F#AePNbʀ46&^7`~! q {bT ~$Ц,1t6Ӿ*f*1hvrQ2B~DД]Di~2)i<(\ǹtw9E H'*gOG_}gcYR!^ iS J)rH4Ꝋ9sL,z3(ʼn'|G>/--&ґiG PZyj7rj}[ ' O h x8:Z՜뜳0*1ȇoq.k:sڶqM3g]M, S w!{r}8L ]f pmzƣS-3:Rh8,% p39~ < 2zÀmA"9R\+u| _&1[D-K%4$>F* ˺8 %"tX_)Si.ϳD2 |Ի{ߧŸB<,ufa.S|9;/kq!-u4HC?<3~` ySl9WLh5у1Ea.QPV7&jI¼!08^#[A l{>T'ԩy[%yDݥc6/ζBkYXg}ь T/K96nY]_-Жr4TU 4FeР*!\Cuz1!WG! (!nK }[IZVKޢOpb z)dDMv⾟)IklBM^JY?T+3V;cifVkŮO<lP*^q:TԌۣin%"M*_qFu9eZcEҌ_ޑC#kvKngq& 6uI$j<kD\ bCaEEa,[d>aT6fH{ i`2%ۦ%@灡Q> Zg [4qO،:6uJ6F pT k4W0;,z㴱 ,@+}/p/Cel 9w!/;2C䒖Ƽl EBz]f!XW#\SCsb7LțKlJEXk:zYb%^V3"&kgv23&VwJZggy;յuM(. ѧyU;G&[ tnݝ ?Kґa6 B AJ aJ@l:\Iq (1k呼Z KSN 9?0A [%O{4[t:T*ࢩ|W}؏G[r[ÙB/鿶6בFlǁR醲?X*2gbrJKʋ7:Ύ4ƽcpQ~9~<„T@ҟT#y ɫon׮ɫ޻+aL& tbR{0zҵ CM8ӌ$ˡ7 - ]A=_\jvPuUs  nߍj)fbڃ6+R.q1. rN!q*?j,8q*w2"_hÎa'ОT53vb2tso2N;UK)L F a>5m Vmn p8g  }lu5- ,on"mReE#{:͑zXrilxQ$Rݐtq :Ѯ__tܰ;0KIfhZYv~URo/w7[T7fa CqL˟p_9^历c=%89DTѐ/-{b 93 iz!xSO;vJ Ffߞ]-up$P Vx#M]$~[`R8Ye̋l>l 6~Pũ01dyD|:c=(Qiz rh6-X{ʠ oOK)Ea:"JC$TP*vTnIqw$ 6!֥t<ҰOMAWMYv}6Rvʮ}_nKAeN5پ-Z L{jS` R{IX5ac 8{5&yO #&zۙq}s[v9&AeagZJ(v7Zՙo㠢KXR)mpKw!hUcAZ 駞Ό>N:QR-+$§ouO<nz 7AKJhJK@R`sZ ёqnsQD!3̩tRFyɵ, vJ7a&4ƐC|Ь X]c~0}x-  (=|p^Eɒr}Ʈ،)0|4tEz&9&?- y|0LG`p%j'Y#%__hy92rYõh% <@kN$ڳu*ܙ@H]<^{kbP8>:^n#])J@詑;&{i([,S#lÌD G7ɀ_ݒEoY<º.#^yA jVo 3N@üpZKEVތ/fQwtieTJnfyҵOFN vb4?x]߳4iB@جz%N;l@9*& t0NPܙDM}mࡢ1}@%r#~ ^?/4m7q( O'6K<|J{UG3"󥧃L7*g2$LoQOusB.E?5{f{ڨeAz l>˙(Ļ`(Dgc0*ӴK+=El Bb*u6v1NdO {?N~PX%EHWŁ+)#rln$I2ןʔ{c{W6hJ{f-70q\ť/RYnS f0h9P$GJinNۄb߶H >OܦL۠+U}\W7ŵ为5߽8]u۫eJy4"J?Sc#y`1^0͊IKacj'ETTJMY$;&r }wʊ֊ PݔAu8mg˯M239\{NŲC\ ?Nl9[|zVX:\]Rv!ws2H)l׭O? O}bRK'`ryK_C(NKds98j ПhvF'Ur:ۈL R]t+\ơ7`O5 g/i8R˖c~$ >(*); kF(tcz?]{2V'&mȠ+Q(['뀶(i)[%a"7KbiLAclw.ŸfRmjxm`(XV˷_xB]ӊ[ V)u<ЋP6z,a4jĂcjOb;k>+c[*#u=`-Gqx<)& $F۝LY5v1t$QRfN/?!ѧJʲTzCE lg{nqfh6:?$yΣ9,QOᾃ VfW.CϝMK2ϖڣ8] oA O|¼[!I|( =rڪhM֍شʓwkNXw&u}!YlOT۶di;e > Ŏ1O)CŒB1@D\~Z(mi"#;DXmK#wq"LfQ4吷tD4|9_IԹ;UjP2O>D 9ǼP6{+Gvؔfe"Lamx5fױ tn kNv]XZp*Y ܪtaPts)fi/izWU"$f8lt8.y<cd8L#m4upLd`?ĸ `#v 6“>:C-Y 0ܵ,4D27W73 VHbV'uWcqS[bS\P}/OSSoEo3+-r;vLQej.\eJɭ{2#t5Ae6ݒ"oA>]3[ckOKa+ 땕Q>a$a3O$2]9WdM:EqY#oBTf+$uC~94YO9?y,1}AsrOd}֐ ʆ7qjG#&)p^ZK2ZkH=_\7ߥPu=\֚WXx%qY*?IJ}hxbW 7s6+ 5\ꨖb]?\\W'+ .gKQRf&54[5*ij~,*`\GыDخ f5[d;AYp2l]q@eİ%Kn1,tgB#`iVX?jxLbT(' \(1:IZ\Bav.0!ynrɥjF7>9֨dPK~+DN~h[9+]l?1!#,wOKkC0l߅=g9`p[R kb)[[{%oeMYT~Iۦ;1I\\oS^x3׵4dHTqCsw}c1Y;r$ԙF s|k2,Zr37nXAܦw59W,zo]O؉2Yga8{W ){ HVb@/*U؍ݘ KP ƙ;CxOg!@ptwZ*X:UUܠۿ5t~H*Vێ^L( qBygpiuh:x#ѧ #:{pVm怍31?AVm.Z"A+>ՠ0yv(Yu(̔2""$V+w/JB]rd:zi!S9?0L 37P`HÔܾG)G8"&h~70Or <٫|vCoh44[~! |s5ˍ+D4 9qH|Ʋ"]fGN0!AkVi%3QDavw=lSkiHjh36:d AVA aSIYdDrꀤl'4|׮gH%MwV4qUo|W> 9{7\xFA b@}b CC[3ɍ3qPqrPp14D~A;D[% "t˷:CF.:L[q_Wk\Yk-8$'4HQj e ]xŗgHj -Օ+\~>5l6;l5CB]tu$ʌز# x$ d# ? <>l 텯{N8 "qٸ.d{(i~ KV3y+qc׸^O%SoY[ń׸eCo,t^rb <X~!)i2U({87>?O h+cnN_;Q"ͩ%U E5$ҦH(g𸔑?OukIti?O:!8ܜJ6]6ꑒ㟺 {zp !1?(E6X>w]u)UĸkQ(HO ۨ6V t'zGb4؆N&&{rtrNE:=GO /egӜҸgʙFd [%BJ!4g9#aMљL cV,{t qg̲fׁ]̩3I%%4}0`2 <@ Ը4r Ī!J3MRqf F078[8A5zahݧ}/u]Gq.i"68I3rpNa@RQܿ2٫P9D啭A m ۽PrO bV@S4& $P2me;=PwhHYjx2 p=QP%c>3?ڳNpk2ſ3Y^:tвwa(}F}w0wnup?C/ 11\3?`n")pl ݲ7'G&n?|$X 1\L)JP-k)# qb7dn8ʄتX. Xez]l^Z1\X]'mi^bf]lEVqʼHnüuEi0=E9W)I~I#J@KnaA4e)9 Aap%Y2'` D`yOR/}ӪOc6R>/1Z- SMPz/HB ==:.+#l/\vsO𕙮O +ي2+kWxp0Q%UX]8?f.>i*8)fҸ::2iW@(\ ֮LE9/w3G/Dk&k|W^9֏`.]c SV7ՈC܆9o w g]rX(@L-j`D"KO|1ܜCMKvUZ*-r,+p(T=!@h9 wdѷ$VWvwN]CKwU*۲ ͋V/Ɣ>3g+8y;FVZ;;Sv BܷiO:*S&ӓOU3TQ|qO Q+.: 9bq﬏ IopZPQzQm)6yw(VPtꆋL S'z c%$}2yO{b?u*H~?Y*SAiլsK´ev֥?ɻ(=!bsM0GU#v!ZV/P]v&::ڏy!Z@O4%1+MJtM>,Px^lG0v\}خ4vvK -QS_rE;͂Џ w$rK"Y`kG,C‰5bą0CLYY&| 8xtc&5;,XdH#w'hk_qnTJvEu%|0n̦NUG@Vz|,4 ޙA8?Cv#60x/^z #SYFnK1+ndX8m8:[>nMy=mv$ Pѽ]\"=2 H4$AUKZfV٢z.1Ï^ 3.8rq~*(6e-˺$J%yt[)ۜu∬*CfJg[C)r)ssZ.5_p2Fi_iZNcIhE}Щ Pb:q -+J2FX-8 G bUw bZܪFy[7D*{&>j5dqߞwnN8և!o5+f4w.SFzߧ.ZaW#W0rIQ18xDVF^QfoWSp-1咱Hw n"?KG;p>JtHdl?PX\*S~,!˃t@q^6<[a)(dD'^QmfUOiٕ/ -H?$jl&gŅbFDN6\Po˜ءCXPc¯f`=~m+QhISX F;<[}xcۖU//ς6A9&Q_׵, ,o"v.63TΔ)JA"Z sq2%8Ml/CSO1t=rT-,JTCOdlٟ0tgX(7ZF0 g#mEB=&ErE_VW? 8 G祄|B_9.) mNQMP\2]L:@6=ʗ?9jEbz,CNiSNV!?)6ּ;,,՘jI &MS+%08PҎtRD1]]=Ѝ[  6CP w4'm}ltgW/6LRk輸Ae;!U];| }#z*{vsVCy)˼T7Q͇GF3nUD5p4~ݖ!j[JheN~e՛O8{8S 7F A+ìE,zcD ": ~Z h_"s=+bZmW4KxmL"Ueȋ'R%?rU-XC0ΰl7YeOk^a]vKRÀV} xP>Jӂ^] app̛CʘsrgZ|<Ť!ǫ5j%/`03pv€3^ݑ!2’ eOK%!`,n>ێ#kMsjSDB#̚bcֿU^2AG QnO#\;Fuoqj&X&a2QyCp"^poz Oy@Lq] ŪXl`_qrre#ETlGZ<*jnjmޮ"D13 C(p`78nyG!֡ 5~| •RerQS}e {=ilS zMkI$(2F;]ٙɩ+$ O!mOͲUo֚#Ry.U;|r*{Obj0 g+9粿SI\ZGVMc~Wc ~(vۜjK=V(oJJnR"@ߕF$_L${ yg&|Qȕ٧&ּB <- 8[JURuk봁|(\v;;@.Dzo3uϫk)${0d'`yVY> >th.Ay89_"X%@1{بqkc@z,#3;xLw|\JL)~[MA 5=uqDDHV"W+4R~Kץ(A C;h(1bI^u6|~^mI#n /@$db=()J42{`uR&a|'k %ة\O>͎T nrMVW1MދOBG;]az¥T&EFѪR0CUgWI5ϣxKz^4Ќ,2N;j򍑞l++q$.`g[=0zA/jҝOEz˿-C"N;|\ j&I"ꍞ,7NR\MLf5# r;ʈu[Tu`F݊~]<%MP%REÁ-3$(3>6o񛮆M{nқOn8b3ዉvF!a!?f!~LV/%`ǧ[d*,d{3vmyd8kgjT^2! [t iDi?CceUE^Tp&K}A='+qFv%MR9>s E4 lk[Chܼ<݇7jLRaЬw:;!}@أ7' \v'gHS8 O$pįRڂ3AK8KNUHʸWX]r"k$:2.M*Vg5@ȓ~%lMy_A[,[WǛAm&hŖͽs:.[`~Bf "E*MG5OC|̛cG{'p7R"#hek$Js>fҮY)9<)e,^xxnz+#Se"Rh,]E35>Naw@gҎnjn4XX'N5rPe]_$ۃP]_W#81&z?VZr>p%wL:$IŏNLFɚ 7!Ѹ2B ()d",a8Qq JƔymԘafFzb\^LbSx JH4nʜr#4J*+ł&~[?d-K_ S ƅ':낶͝o O^.TSԂ|'ߤ'ieľ n]<{YN1[)q޿ |\ w7nfmS?ѯ-Z}Bt$j!V:Qi?1+k L#7=~cwC-P}Douyd3o1&.]E TMm38B8}N'@[MT#k@iL( $q+5 gKidPdb ]9R-iЪA"ajlZ]ϒ[C83⎳"Zlյ9?f1?D|DZ73e@!bFx9ĩ[v =@!lX]w.M OLJFXj2%0yX%TލbYFAw݀_CH0 けNv)HH[UjWw3 w.$8 CJ3弽 8tÁ:Tc5JpfFb;> 5s29vLN8=53(D?RZ 7pg!W/LGI5O oTn~jt/~K ッDuL]i(8sqiqT6AcR(5˛} Ju+t9`ie{ɨDp5utx'gUSi$Z/T+6 b9@[(0xLE.x)@4 kYoǬ~U"W!chtO[߷;0uzb{Y1-PWUKI}KC{КG2 Gu#BQY|Jb Mgr|5~gm;= %&`;Wz=]E^ 0Bi ,/p|}<+1=+S/m-mNϞxݣghbݿ[ U8y'5u4}5 !'`6{~ ]>@ nяX>iCRMT:H*[q HG8ZhZxM6܅_HTBJR', Xԑ>91T(wF+QCpoJ+<ޢD(W殺,H6Ek|ŵ:G>>oIu$N_ O פ _}l!^T2?GTEүQ!>CW ) TXz=.NMC%yOTWe+w$, v赏I\Quw# ί@܋QQH`L'(v%ceb]yEѝ$;_$ًk;_ +Epb@ YX>0+4٩chM8Z1{ 8b;]*S硢)99$ p&=q9G$s欔 xPKkAsVn.A>DDE*]l }RoJwq+ r 1z}rfpj =UWqCrA]Ą~_qZ4W=K؋tYb^Dϟj/|],XjsoNiuȅfV%GK@Y @ zQʙF&Ѐ u 0t[L /> ր~^JR:&KzRh>5;xbvZ $lLbA"OjU.HVE* Rh^- TuPC Nz}zAdq RWJ:t$3$ԩ8JIZjGN볐mz4ȃo0 sy#YBg-ratMA^/Hb0\_>Izy [bz3i\6}J'L vɐҿ=$bb΂Y'NC _+vF\G{mNdΧXwVe^ž^Hr,ek\6+˯zQ1ʹT鯗K2ɃS7ʳ ֥evr5UߥLuE#័rCc*Z,)خ1}1]UvIXyv -/?5* !j?[hK+XU˰ |f JC~!Dž58`xӶW8m<W"!~t~>`<cHլH~\p!f[1"TJ|۱c M((Bu|̨ٝ'3;`;ڋ6wPQy euHdkQtH]\p%Wf_?R$hCP]-3Z{ܓtaeܤMBҏ~*tm>`޵luBƕ]ۿ  6]%+ܤH[;>3j5J)2{`q\ Z| Q'YS |XxVt ?1rS䡩(Eª #H ]C&.F z|'`Zs7oDӑG.%">d\U Ύ}ņ|Dү L^F@u3 ^뻗Tի93O"fF-꣎.23 Ō<ֆqg2$Un=BV p;O=q)j D\7By<#R.c^\., N]Bjʃf7Kb(8dP[!s}M3%+`owNW$AoD0& NLQ RrWIw١ {5BAw- ndΤ26+~*uC#72s`P,OYV?>ʣ;@OREL;2x^wN@í0n&zF 9./וP'5 F,xga`y+KUQz; ,%Y0cy%e=#.׶Tb YJj!f GFVM-nU}! p N}`k|+*jcE ۿ+® ҍy?^c9CqnH|iMS5l@ nDd'Bu1S%~nhK/J%M!L͏R[Rj=GW6WuV[.^̓{e6z60V8HT [ԙQiRjMuҥ=;Rw橉 ݮ So*Uv&e TҎ5yn\hI ɗ喒ƿ2i=nѶ9U5;{TΝO-τAym%~^EGίV1%J=2Ns y;/r4 _4㊽{A.SL7;Tr{f `HY{mnVvR },(O:RDs'2RX9r>D\jDOBa7"j_~@ jT [@Q౫BX+ g5N0m{;PݦQ]uiI1HSPVq1i5A^RuCK&j&i\$.oLT˷fc8^tHdNi%ng* {,{'=LHi7XY7OEM!| EqLO̱pxġK|( m!ǒU3c\`Cǡ1Ljdɰ14mozſmH%=*ǚ qFkrZy do&Z4W4#ڿ[Y}30*RU9.?;x[zy)4[x8iaM)F{촎pK:>Yogn0D'm9E(?z՚3hX X["{59cCr sPywJ8#q6 ER_vqOЋØ<ȌRdh$~wo3{F޴`x̌c2H2ԏBfK.T^Q- !1SFs WD"`ZogkT.?XUm$Ųx^M{,Ю-N<2uΊ"?FL9`$-Q,>S)PPP@s97ʙ1J?g-j^,eW=5XAwKNA-]m9W!b=3U AI5ID%KyK18d`x9P1B ΀tB% t\2JTzVpL[?/j#)i~asmk}V֙Q_{{xh@}jH=J!BQ|ť8▩Jp(DT]"*WK׬ClPduk ҐFEQ?6*MztUS^*C:mehdYilj %53ُ[~^vﴷB( lW_=.a(Q1pؙ'}ijASRn1, dL(^䣡1B[piu>yup:֪ hKKa([D!S{$Ey[E} /XlEyI޶>s4T&c{G__cdlO䑔Fx%Gm߷V7U6h28r3-v827 ڍAߨ)*?M8W 9TQ56Wtޣ omV[=?HDg H̥ؗ ə.OsfoyH?@V@`:|~<[f˘b!vo|!qrr!<"~$zq}0ԍ،s~'n RȏdB^U{\p<@VP34N [2E.g{A{Hcm(a+{*/ݽM~ܘ{SӃC[;:Ύn6mVmI?S5| Q!A?'j~=||9“R:a W1Av?al#xݧ&])O[fK`0e!ּA?LVi!o+KߖϬhZOòAZzG Vaw \Xl{Xwl:f*꿙XM$K42՚L,B+xTo5dG-bs  6>m`Fu ,ML__^C4^*%4/Ά-'vZ%Pwz~yywY*aG\9~*AA7+ҥ`?9tq oʩ|j3,`'^]^V":|,vn9xekqij4ZzD-K&̕u(o"#p雜ܰ`#YV\"I#z4)X4Yb5gbM 3؛/ Q"ۏꡊyemyͣyM٭vv*Uv9vO[aK<ػWkik~x͂: qS)1:˜Xax'Pfʱ2Mc|[Bc. Q_}t3k$38ZCq -:G0OټR&߄H|?0IƃI㔤ܐیb/竳,]d †JM.UGOl.t @' m E{L?ղM.,n싌t} (ڔFkyt\`: ^I%uĠՊ&` GԻk!ayc启k䟙S51!'P<,B[˰X{E5LQݔ}f<ə;5*R|F#s1:3f ?!U<ڤrw;Ak'%Amm96*yWPm)Aٟf<ݖ(r5͟T܍l-Syu*$iv@=Á7t Ю2[B)A'z6:nl`X44˘4 zحk Kv.o3VIh2_ ճ qd#5"U«$x͟e+$'b_bWĥ97CQN"Sb5e߃4}?cG[x}n6ǜXBCod]}=pW鞑ߣ'6e^]&,Jb5 сˍEM)lͪ G"ր9=EhK]6|<;9LĪ~ #0Jd8Mmzۅ{/MfW.RE}?,WED0;H]uWT%2&HyTI#JUӈs]{@ԔȪѮUY,#6ܭ.%s)bۥHSIYm[nՎm.^dT-->E1<`z{8- ==m Jq ٪l?uRR|^ v.@LNJ xY᭲nf nӭHD'=5~2lc~;&hYCk u)^oS)7~U}N" TRJ:}-SCO ~ 6ReW0D JF^M,Ueߤ+T>"CBC|+M!W}줾tT;54L} 0(=2eTd)MlNoV}Vo? q >48RS/8!EA!@$>(RKU>! $>u?9tuEJOmgt:!}*az8+ҦGĴ(fQC Dʎ<=tkZI|޲G}|tm_ڛ=VBgea]¹渎Wx==1?_YDkg)0}~&"gS^`?T /Q$pA_U$,><vd?=c r +>ݻrjtXQ&kni*>yCi;#u^?x_H`F,V)DӁE ruv%,QfOS"uzRTx%6n4?^ q cl|%sƚtA8$ν<||Yb .}QƓMܬ5]ytȃnod#_5/fp@Wr.1H١bq;~O ;f'@'sVk\7-=6EƶSHC c(w`(.]d#bvntnqz,5sĖKUp:3GwR9VL^2gGBhRmUGJ-= ,%{g DPF=. SWDDTYǸ"-h2{X[|!<; jDz,}+*W#7ZIҹ H,pM.MpA~l5O2]{ rӹ؉G]W{$çoZ6eXG'٥)Q:Z#>}eQf\m_bԛMrzoyV(<)D>b黕g*C;v/Et8^I)h:V3Oxkt͑Ohޅ!`acb$|ƪځn@ ;{&૧rQK>. nQi)&˳c_c/" E/.a ޷ؔOT< $snO9ᗛ!N\xBZi4/e[T ]FWW 1;f$׶A2vq$j}%.g֕:#>P ey^u"/$#X$ުNQT8<` hj;m$vuA x~j%]"c mȁ]B'J'$kIVݣy+K.nc P魐@z`'ۢmtN4E('PTN'΍Α.w9 G9W_l˨ eEEIzjb"4S_Ia(7Hn:1%qe-r,syX\ ZH 8ţ<'\ -*D'Ӎnm8Րx;#}1[j*l+זs5GYZNZɰPoqJK[tQۋ̥ܛ9ίLȣ_܇.2y߹`ͷK6Ku}3F!g>VV_ɜ%T@rr>qoCH1/t~h=* 1RR?l>(dָ)VH8"oRxRv̹y kk6|+]lTzYS~봍XIkf5,u ]Fr§8{jw1"~Dz]2m^'M%|;e#UP ;.omqM:t>=2 oE$& ե=-5v#D {5DS7Gvm ܡe+(BDIL`a]$N+jX!b8ҧ=['jD(s\q <o:@Bj'M[Dˆg*0_)עms2n;vԈܘ@d2Vu&$~"TckM{d=!)IjhgiXhlb7c%žwJh0z3@c֓Ӏq&69~/DB5_TyGLN@9@H2!Q.(r$o{tE7@ʸO I(D U֓0^[gVy25։ s;|?2ʚF^ftLV{S' d^-g;2 uJYݩtb&RQJ2< 0hKPec i*D8I\fhU=p~/@Lx[h!xؿMo+15`*O'RRbZŢ{(4b"F_,?k6 ݡ.q]T'Ȧ58GsJ֗k0lwqG-?IT>Bř1*[]>CBصl^n D4ŐȺ7"b;S"L)&w}9$ ڣ|hr*ᠧIgZ`|?(qu!LxXi3GHGiq xq)U=z0'7h&f] \> l"f⥚~+b^iQx04P)z:~R#OCO;ZL ނ6,3n#e]_4%-'a ]9B[&A>Gxq(u֧vQW#I5(~ dat"WoRbupV`v>S9JcD5Xd.t张L'yP[5NSh='$4b!î5#hbljiJwFbZE:/Kif#~G 0 IW>i1䎽S^}b47🝡rܤAcmuƻ|uJTOq,41 n z~;Jtb@KdY?LKI,ĽX[ב._&HUw^W'5"C.͵$5PV#Kv@Ǯk2tLJ2d979ZE@nQ`+zGv91W޹(]WlNhVC$D}lPM֌E\Zz " ʿ*A/|nEDRc 9G 16c qUʼn+L}QǮy`&"T+9Λ]ٗq[1R(sxS 7hgqoS gJh0ݍdd Hu7k2yeSO\0khȖi^b; 0r&x`0pc]'|T^^>ϧ8.B/sj;:0m!U8K^KJ={R F͋a7#Cg?>#&CFQ fΏ/uŵqֻx6LvKz:Bmi[><$SŠ?r(_y?4Β~$!dp֡u~[ZvH'L sbU.E"I&*_fsVVb^pXĕFk];CB##osʩ5Uޅ!3aW8OY _z>K>sP>LNz/o(DʤVy-uLk~5hˆn-+4W*3!ßPq0zKptӽB,Z!Ҏ2sC M8;'~77)ÉtsoNr3BzF/wg O\nyQES~EPZrf5̯̼Md&} qs0a.HGb$M 3?#uꩵ?u>O`jvcmpst%H.) zЕn{ȚE c.;7 `lˡ %d!m᠆~ RKT@/0&b(odu`uaU8:eՒ+I܅!&m~@Jd|˱F >ች,c/4n/PfW)VOӞn9_碽L# $Sh~t3EG?|C@֘ Bڌ^q⌌Nh颬:#tS @ KRIlB:kҐZeuV3ް!Z?F2?$E ta*!"`ih5ۙ MUP,S.f QMRLr^+6QF P<:lSM@~vw\CT^ȃGgxx_ 呪pں[3ͩbiP#we@EDM@wC4mу^XS1GؕhN- OIER7ޙ D@ۡwKN_eګ\s='ŵ~oo"fn|)\|Xf*|TrVωfwJ%E[S)]b6Gn %.SO)^ZTc)RB6rA~MZ40 B+:175t^Fo; gO~S0r:3P/DT %?Ʒpd"'aO8ˉ' .8 EBymHЬFU:ؑPрmtmk֢!Nm^uZ]E_S.7t1cGТ*^JڣyW|WkeR*Іi/9Zl~>ZUdIZ gB6tQ$'[g&}#^ EĀ!xz.,BF9S[gRɬWUvso7 \@Wu~F;@y[&8XC\4%̌f<[e?R <7\әE F|._d5掲g \~'"^A"G R>O%K' |@>wyΦ#RwϢJu96Spj`f- P;69 إRēRh[@Hhr^ۈszwE?/nMzV #ЁLT4VZϾb0l()s-Znѩ-g8LѰ,zP,h$;_;ɇg' s?-D^X 0&RO4˰A '&.,?j 4f0FJ@euj),/mpwۣ(GNG`qJ lb@N_eޠNG HB*((U_xFgވy<x-6= ܯjۙ]I=/1N-NBN.t&$* pLݘqK( 4iUHuPZdwG`QۧNjg]I}Q R`6SZFpGjSdyvאwcr#u*dn}|aeSGOTY ⢒-'ΏB/MWymrc8*Ê^7Oo)$C"훳1әޙ*.U5) |-!:̬ƫa j,<]U*P-,; *vfeK-1`eˇy$%^?GZ Od'RE0)3* wgs/R:4|vĈ}i5!0>9dڅRM>QL-#ҏ*s*TD_ mՉE)B_IS{۷&sIE긊 ɇ~`/DvYkSPGC4NBZN߇<8Ϟ1.i_]4zdYXisnyJ=*b9Y΀mF(xG0||ZMWؽ;Ho`T;rڊ.&:7wذjH_xfPh` O:VQf/uՊUלvt:H#A~ij^ld5qɽ.%S҅JVV}=@2tĮtk▎ժp1p"~*תuC07taR"`$y NQ-x :#Jg!FvSa{ 9uOs7]lf3H`TM,v?[Uݾ;-nZ%f4q0=2{'Q W_It$Ȥe?8L516Aq"y6 eVCw§mN,QQ!4%2j߯"@JًL y(SX1р,djj='TGIOգ˟leFHnesĊU%Nlx  eM>ƅߑ7%Ѳeŷ,3X:d氂#Rg|Y T Iub}!I0K}x⁚w-t/Ń[ !Y&4HYMơRl-7cHƒJGC*' BQ}8{J@3.=O[(HuIeW"͎*90y$h~f ߰x^rE#/C׈#*ؕRyUdj3f~#_49_.f!r[~.Kb2ЫPC+x*/zX*=% Ek&KZ7%=۩Oi$z>eMʮ #7l_k};-V=kxuzgfQ&QXj%s'?o);SٷlV0u -oGu_FhZ\BVڐԩJUwD&lʤTb.QDBgGjt[bDB =I1s;FdW-Q7QWjruRj5O-!;#Tnj$g:,Vi;4D-U?dE! h FBE1texcxv|C&@8gܞ;D;.v똜h_!)h*><)3\F8"wޡ@T*>%ԃ63"B]hK@\YeX4pE`_ 5{LՕMnԣtCbi@Vflhd6 #zBM7R~JaߥC@hQ5!@6f+^ vX 0)rQqwؙO3֙|k"WB^: KI- ^Lk1gH^eP `SAAZ? C^yO6FNK1dQ,G=L֯e+7Ut:M\ j#)`xFFc#FpZʲ<ǞЙ>4F&5dENcY+i0ř,\|;RB={`{kuļa!iveⱨ'9@_9A&"wHqEJI;$\>rO'GIkcO%E؄hَ8xx0Stv j\ p N>Nʥ+ 3F3aM;`\N!F#5|y"=h77@ZCK$td]J(K/m:vUaB"VG [+JХ8\Rsk[{ ٩ |hy;Hg5/^;8lFb ĜUB #4HrO9mY}9U:<_W`;Yo1(ɬ"qb]ok ]%EO*RIM#`½[`=6[ْ ρ# MDHz{*w蘯;{mY8ߘnxswP戀߱bKK/'e_CjXsȇ'&mywJ@-)*oqAíc}.^D`Jei KcO:/W غ1(:\Z߅ގe1(̳ `2#dxLd.z۬LMK>aZ<; 7_!>3R4C]`UdA=EDr'\#LB_: `[hDfCڰ#- 5tcC:q 4vu@:$5Ę=UN]$  oKRߐn|c#]on eJEL*h={v!)1yYlwK%:OXi6-8^rj:;[ ih f߮~^!q`P"ۺ4+OEcmFQK2 ACIW@g9 Ԩ0J+KlL*-rc֐ו C[igAxW|v`4پv|d(eՉ3NzJ@GRECFDMB8@h &FmJc̦!J){ǟkm49c QB*DfZ?+>L:9kiu b#%h Duø.`+i+jeY$h,T?:ӫ_zwԭ?&/+h:\ds8kk0k} 8ݾ'Qymҽ&f $qF%vMvUt$G%ew!vo!}iT7RcuH'?[9b~>&z*AruD@!s=?ܗ$ k[4 LsUI;+fBǒ8FK=w,o'P.$x/40;K FD7I_x\SkkWhq69TGB610ʎU{0))"캹S:aYdWwٞ*#Km99Is V>^`$ .p|F%F4y9˳qK֜\l'rBmu>+˜{a,qqPcbHp͞i3!җTj8XO0d.KOkk㧎SW>X½ l:=o-Q\C@ ekm.m]lzJEX/"ˡ)ؙhuiUV5L9{Аf[S?~L7ƅX8 Pj/-ej|^ sz|^pB@ $[q"Y6#-VI @LV`N T!EyB[hF 6-JZR$va3jLճ+Bk`nAR$i<(2ȘF,^ڶN'8 oAZ?h9j匟DPFm)O\[*RqV2quno*7 g$XKLz5Gnܽ>S*;&3Ṳ̀Ml6k!ZːP}I&su;^yF~| Ee`۳b*C{g5hHLJ=K$BeY| I}-J26*@AA PC-o~!JŨ1qYhqL]B!d<[{zw0cvlc0 _,sfh|%\PAg.}{7uZQjzwȿ<ʗ@}~dp#usTy! c H$SDO)/eg$Tt/fu[픦XfKP]Y2B-{Ni!I;(6XȻnC*|j ƟZ%$!rKh=oWN_m՚<0SDvwuY;-}sbWh[-imT!\Dt,yTI<TRZ5^m>-3vZέb}YYݰ0"oO>2y/^wVM"رjh3wXkKo7 p~WZF(oRqqž ik%YwC/E}n|cY7Uy`^ʌnRvn$T\\L?hB=#V-y>ɘ*5SmfEK$ Ǡ l~Ml.pNT { =pƧ/T[!Df.Ho.AW4 =gC"lގir53xV?=>vkٹg{'8 w{A*0/ؘX}k/(ffQ8(ʪ!Mț~AȮ{ <(mW⁑xIn?<1  \<'B)j2ܜ^rSάN}P,Ej2x"rg{h[6Ir8e}>nidĦ)i15I&辧cU];ţrnw,? _ QR< 13uIƤRM8 /\V\sur"V*K*6?Iq#tΆLyYsuGΤn[C+ٝ,ڶ!,.%7gGx%A 1aNyU~[5#Ns+aEEwUc_/hؔq}?*s0D!C.6/]Z ?EDo f]q`nmJ9>-Ʌm^kl ^ "/!=%X F )ȋ8$΅^/FHIAƴd7x%\ t {#tدI*^g* FzH1vNRcRW)S,S+O%qͺ Zr?e@*>`C3b)??d{*pxO-qq!yb)PaJd뜬\ Y?nF"̎Q7{O c$7R›yH! pF~4I\N;i gť.c0Fdž׋ kVh>$XB,HP(Rld"+N}w(WqΎ*H;ş*Xp=,֜ެ0*R%MM\~zrb;6 gcu ࣒YG&f..4%T{f?_PBJ3OL(ld_֒Kj--5Z~1dBiz'";X  <(>Z5FFrw.ƙ>hR5 ݻ *Цtgb[XkC4)g.$tInzlе* G/P:#o\$B#8u܍u4/Iڤ8,A'Nωx㝅dUUFgnr%jPW<E'vz9^c0b|it Nq :y_2[X0|a:zD$hɋtG Ivx'|<$E-둫6_)TZ3H|DqD8Y#UȣS&0̍ _0ɿ3CMDr;#r;8bTWz0+h XsɵmԷvF;J/!.C>VOW%+0xk.+xk$eJ)Ҋ Uqov݇!:nNz2aG{˭W:͝+M,ЄK٭$ito kCQT$ u B^lWә &KKǧ{q5OH\EP0qj;ׇMc<nz.G <Є=^R95RnQRk!:V|KB1AE?Ej4]nr0PՍj*(֨y#1_C曭 /t7{U9O @>"iP@~֪־Wؚǵo164L y;0npfJ6>, ;9Lh֨/+kMcyi`Op&r+jBiIK֔׮U`@+++JN]Μ@FY>S)mo,;ؽzG_rs pƙxG-POs x2v|"B?nHhOUiwMR%0*}>3:nѽffRMtDڧٔ&Lr Ru7,4:־b{A{Sp_ 4/);lFܨaW3?'|~䟽 iZMz% XY$8-u#Ra67 @7ov~#j5m9\/iQ\HVBL;u8a]@k,P̯ns#F/6u3jW jЮ 5UJ92n]]Zmv7KsJEMZE]SDVJt=&OMf4=ZTůY5};I&{'BۄyW0x~i Ue?Tqa9am=\*.ؚ^>@ KLJ!92nހ> %ͮ"*[+\S5B!|zWT.9#"f$ܖu"I >MҐ^oz3Epox Gd!A| N,Naw09,L$72,r{u+ʰWi*] QJ3nHb(OJ'0ev\u,) Fte)Dnmau.H8F -=bT8|b}VN~Uy&UQ%#w4Yf(| -Xn gc 5"gAN%.%Sb^;sLy1+`*W8p0 :Wle3` zs;jEݧ5*{ mG|ʻ|&v0lՒ}.s6#; #ě-_j="f4ퟖkǝx8s(csUHL/JnuBqvsXA/Z;"@* #/ LZU|\X3q{ieznIe9W/=z5jlG0Un6D/$!aklז_Q&A9c7Ճ覠ښJ%?LP[g{V^6D*b$^gYPEݱ#ц%;yQ92CoPCӏrrd)Ir(? W(X¾UjZZ<:)A|.l \s׻\328:lO2VbfǑ8:VEC!HE"Sκ0%JC> O[ hh)[ I/,XDn'#~V6ui~lyN>_u> bPu'צּ &ݢԭ%~D Ao?xFI L;ZK^4'Z͵ 2_s)f>M,Gq+mخ;nhvm4Xlqhc,FmZ=/S7rX_owtf"է[DפUSl-B@CDͩ&N -uEOC Q`MBV0'^ӄv~T/#NmpدgN5e a~/p,:O |2llV(^99z0nj@RB؆.qyxң¿umeWMw ~9 /;߉7жVUIggt\Z 0 =$ D? 19nq!|T3!Vxj~BHqA:R`ff}R+n()x.<΍, Mwhc]TPKy9-0p>|EVrvT3mn=[HY񛔢h w  -1&)#{h8r7hX$C{ʗ!#\FcԀA[e(mT|\2(lr-O aWMXMYsʓwŁf e\g:~6~F􂼸~76p>-4}/a:mЗWj̽O Iw {'%^J̃U5;d}>:e ӊNT[x؎t!P#M%wꕟ9+ hUv) Dv>pÈF3zxiY1*ryVPBC=f|=ՑA7|.Ǟ_s-tݓ{Q IIWa`JUQ<}R>VZZgSy|Mf.Sy ZG<y *p$G[aN(^0-TXҋ Rޚ*cXJnlޗ C)!B/„V6< s`rTM_}H>;97;YecI рÉ{bH{R0o=*4+VjeLvzMqt9;a(|-9#l~Ћqd,6x^bZRVq]D>,o+;Wv>$>%oIր,]o|jA._It:0xT1Iw[4fE"5$bh_μG15e[7ɯ&;iM&Y<._tmͧz~34}:ɿ}/C-^(dq)3x jb]QݠA/UV2Or'#LޮrŐԨ3ĻZ5r%yduA] 2asvq62^=父 ZWH{@H'V-jWuEչbg$szky}oGǚͣ%DC>Z&3D#l|8cSf/Ga.~_3΁~IDz*Eܶk\1y{ e:nV'ƒxG;=SҲÆb_5XY;J_Fh2rx* BT_^:@hs*E*ork}kD3FQ׬zmsJ"~V`ރۑ5#bI'?[ {P*=;KTVpN1N[$ cFgWn%]$MXN?ːٓFhԓ"gԳթ\ťbaEO.h2]R;l8>>ZMUhr{ (*JV0XscLe }dL ;aݘez^yho6P;#8SE1k;v0sɉ1t"090|KR#ov9IC}osnKmhJIywF[daߊ- Tmhc/ i]~qNIwL^nDtCPsQDj/nχ >Mxվ'-o޹0P^De6LcK*"w2W;H 6΃zg/=29,elO/H3gC^*EZ.7}%X~_N@cQ Xu"3NrkqΖQNDD4\JFGS[r2`7,,TppD1>[MceX+}$SLnRm1t_ovQ<?Uc?ߦsq3=_?6{WTmhqA%Iٞv)Ie$t U!aDszn#*L}}Sc/  =%e1z?V k?<షԳwX#{HgH Mm[VB<i+rߋ:k)YGժ?3rOErb4)ÛF 4?U/%N>q3,2w3qg6xr_[[o?MAr|9tIlZMq`R:E'?YC|@e_u[ojs(Rݤrtytj>d^seuH SBlHm #em#dn4,Z`" .sxYq^eFsӠ@[ƖݵlDq}Ǚ&EU/V|l-Y=kˆ%pn+Zc#j mH4~U/veOBkһmQcEH.#~ kx%fB)b!L86@^WlPYkҾB M]gMS⚅ݡPƫaְb2=v0J$:j֤ UPxv:f,e-Tz2/!Ey 's6O !w2/atg)6M fi҈$AN.\[Һ!œnmk z~4]>}-:YɃhJO1r+gT1moMP\}jD ds g̚VtB_wY]{: 7&7v;VMq_3!)nĒuzg .t@iQQzܢ6]]W؞p^(ʝpGAmgN] Bˌy:@_VP0'_BґLB;̧fSJgkG^D/Fr|˜4>O< 1TB(sw5e(3ŞndjQO>igoz0/J@Fj1@<6~}W9YH8a_@f:5qnp]{ө1GR~0K!*.d_ȃjĶYt!BK  7T?Z %c*l\_Ng0ܒ5N+(65y\{ikP _#O̟g"jtTio32( 2E[H{, "q$Zʢܾ[H" _ǽ2zvHg9) .D{c|yF1*y,Q_c94FF`6މtD-{OQ8:0JUh#)`w!uׁ)l!e(mI]E~P6T2^_oX̶ِ$4-IA;V3V&۞ksI`·aXir^fшڲ-)cz -r1#w';vsd4T%0K/i_M3>{Z.Mbyhf1|JiiN5F7Źƛr\:~҅Ssx`وHoq*i9D+ 2۾md{viO<HP IJ 8% !ؽOH i>QNňya0^͋wtlk:G>@qVyŶI;F%3dB$Pk{[Uu? K.ZUܬHc}Ɗ љXkT6!f6bDbXH>#͉+yQ W g'"8:\=[WNĺ,[wGSHzg3OiK 2bH.!ָVJ3F pecE/$`V3ؽ);i!+ݏ'( _FHxVyHds[TJV@d4oB s MWv)kOg#hD Q{XP]o܈`[7^Y <VE:6e٩KHewK\UMW׊XuÊlrx&<8y J3j;i0?foqȽDB&_q"ZxFvH>OIkc5uIz]JEO, ߜf6uGBպq.}2WpJayOdJ~-=s8SǠAaE[K=,vOchk#Io )ɉ ҃B(1Ae7덹L"x&e=R7!#Is*~*RbJ:ZO3&~-tr^;ڀdm~W;H̏!:F.YG“/~.PhPB)l€1eꌙg\ ;44yZlDT(ն=ҢTnD֋D$fKV**9;ɦP ŏ(mOɵk 2LIBb7b? 6|;Ϗ`. Ef2>%` WV@Y߾ qn{ ZMSDkvGy+EL4]^ASD떸{zCF-MY>Hhmxܺj*ެNFP^^GUpj^y\+ڗTF$[Y}8@֠5h=Bى4 @.0ERDh4 Eht7&uQuLw^˰{|=N|ZX!I- r_P{rDE~^=}ᎧV{ՠ0I|YGϫtKdyأwOV:/ =q봙n9_bF!ոDOdKu's:yhJz4CsK=<·v"J]o,*yq?[&@wku>6%66ss6'Gx=V)Sqs H/]oU/vbDNYwOHˊlħ!DLxm̴`}:Xũ_!X')FF1HQ%~Y{g9"&TbTq$ۿa̚PU +' >]ßmcP2ĞMEh ~9K5'WY\y9PhkCg-&J׫PZA"b\,7yx'o,"M7_PLpd%j)/wYQu2 NJJ ƸxQc zx!'6 ]BrI`#;΍DMqqaͳcI}?-="5RISA&%Hn/U~3/ȷ+)mlHo^Ѕ~ZTz'N6nGxxwkg;M~j&J;!e({%/Z%^+6iC |w( ?ƣU`dwT;D0,V-"TNcX`D. ?PGTC+UDtM Wn^ gr_v9wҊ,Ņ&rYEO.OVlٝ)WQten~9=?PlTxT%"YԖf G+z*u`h==_u08@1N\ލ}-nlVYol^kJAlfnqtZ7lCL(9Ƴv™S!!ɠ;[]ȻH,?ShZ*^/}~8y-'\YvXO2> 3TPXWcK =9zdPPRfym-|6Y $Epgmt?`.%TZ,8]Zyw NK@?(ƼRWm<ۯ/738m7X.tÔrL02@ٞˠ> "'Abrg'VfoyiHDl,|NY3ӿN3Ĵ%KB ѫS t{Dי;R+@f@uY]Q>\'C^J8u+|:$j\^)OO,*BJp= #E[U3RV[*5>$)"70B-jI@!لr1XoGZ:ApzˇJ/ tŃ!C׷Tc \BR˪վ@N:iV:e=lLq%X\TXC-]3|U'(Ŋv_dr>n]$xDаʴ]}Yl%rwF/0+UB@[u0;xtD:#;wt J1vZ׆̈:B[S(l}7Ѥ 3v caz3"J9|6z)C*lD_iXjcV *9\-sUZGx ϻ2neO\Ҽ`=lx_R4L)|Kj_qkH@F峈6h|\W?66u\t~K:󤹋y)p' eخ8LzT>Pҍ 7EPZ6ײi-AƢi}V 8_;k!7Fw1V_.u\,[H]-6gYbe%O$,8ˉkJ\*~KI4swif9uƊ'sCwIc7ڂX/Vlro(~]#k:I@xnOd T%@w\*CofVOLm F1q5iPJ7(1 Oڄ#6[c..Pb0"F{(tHF) @AnׅƬNAP2v ix]ٗ>c|aЧ1B ` z2zX^Aq-}#9䆒 [65f{^MӔʾ:^} ##\G3&N sI3a 8 4ZLA$L (Ɉn?N0<}a3<˳ lRR~R7Q5лչ:8zQ {Y#Uޒ Ca'/x eiu*gioYRgd._tZin Cm,[$J'I{;4fuW ^󁳩?=6N(4Aݰ,CkOe0ȍDrLrGG&o YB+cAL,[£-"a)ZvȻq87߾f>j%.y'h-B}4I2S1FJq7dHráIOg%Yb-'c|^5=0wo|__ړz/!ֺ _M;tb|A/|s#%. -@i.[^V$#&s +A-3*ks ^_*5EVTë֚rwPuu;^M iTw#x Ձ裌O^FS"Y0Ddz";~:P\}D=HpFշ:B[?'eyW*;#HzsQ3o?\iWlEDY)Y?kf)@=*-br(A>@3E2A>j P5kp&UcD(5fܓ\|L#-} H ϰyY>eOh@z`H^R$|a\Z Q{geg%/CQI7vl*ȷÖ%;sK!Ayp< Q4ࠊ)s\2 7-]1H:^,4Gijs0n[V,^M&|:ЗfYͿ0+oGeMzvpì%)>t4;5)I 18Ԅt'VcJE'n)%{@f{K5=NM烨)ng7D{tynz2Ea !wB[IOMqvm-(]q*2^I{]M"(ZD7f?0"f\7(/PAs}qiJ-pnYI?>/9H e 75qqSˢQz5Iy.sLܧ7\swmJF(_jJ6AAT5tq <#š,Ղt[y2 HS~iHRʛ&XYq=- rV41`Muȅ.QՄLBU`~,j^?XtY&H _,z'{/lC,fm\ zF^jq܎ N7}ɋ+| OjfyL/>Gf<c'/2˻K|ݾ!-EFc1OJe\t<:N HpG1~܂;]; V: Qhf;v=)cqXUta+"dt A;ߛFZScտqx{;?"o&bIqD)"ǘs{ʼbJg&._pٵFj,ZU+䒜-CbW8s8n T Ey%utsLcr]u9*$v[Hplx~㯊UVOqDx70Ӈ +bCV9?noRDR.8Rs2Q 囊ü$%J*( YٴKztd_6QPE`ijS^Yb Mk Q} ddA.u)0f߳x:9;[ (B =UT_c䬆Ŏ voP>\=24o8.Y9Bp2\! tV]96]4x݃ťN\ȚC'2X=uŠ {A\uBH~&/8D[p7 ws| ǨL Q$o,[àZq;OB TVYW68ވ֍vpې||qT6d_qF$8)FYǩq 0)R*Zky5݉mg<(-CoԴ`Y]vR"jiu~萢7+joNӫqKVn}rCVS {Z%Srn1sX2]U / \]sX F\W(X(jtG}-lIlzoMi&uNU|kUx)'rR؃dj)!f6@AN&ێƺ)jHS?o{+_Eb~ܠ/S h^[ sgQyaU\ 'R\{?^+^]1 Jz7COyՖw++7L%".wKAηeuQ?OS.rͯ`h+Vbqbh:V`{h d`5]G_[/V+Hѱ֝%,OqpC1Kj0 r+BURFqZW~Ko :ш! DOTgbmanAQxDo.efP 7qb`,o̙$+zc ӷXWUzAe4 @Ř ?9XI>_O)b4GPw3N 4S9RJeފIБ?7PO٣:6sF+81x " YUƣGZa:,(s^4wrWҷ E?ғE9&0>i"b=@$FJ\LŦ?05jC& NҼ|PNF)u$*t .\KjPג=Pv-e: ">`{0bZTCa{3 wí.}N˟̭fuu&@Qu;o& +%eTSHt<'-{g;[RF{~KwYurd$@ߞu̸UKw4mOpHNƫSL)JaJ{47fsX/fL(ּ+FP;_d#տ حRU RY ԎExˆt0#8b7 hY VY"N35qg-@_~]u-fsD7\$|"JH,0tDH&_-e1i~U8Ԩ}Xq_=WZ}FSqkEoXZu9n !\YXlJg-qj9mF:]d ߥȻ\ԇֵδu*&rB'3QdFw&]G뻂 ~n8CiKIcЋ<,ϭ -iCi杖l/uSm[TRF@ើ 3X ,f+\`$wɡH 򙷩n11A'l􎚦$ X2س}|W;bdv1'XM~>eд[rǁ-SEzw L_+W5PD=g6;]$1n3:c?C⧶ OzOjNheF0[mՃp:\* % qD$ 옥/̼@2)'?jUL)pOݝmmԍ1NΘ}8ڋޟE2acv&$e Ӗ豴ҵ#-|}U\~. #vzr^l c rp)ˤ=}#񲔅DZzhsTR{ܯ'}EM^%ͻz;-!JN )U&_._u<-L341;mWG܌|Aւ` M"ɔ7A@&2'd췧8 3QWR L]xLGى'A}rx i"Eqr^?G9B4k`I'#?0D7/0 ȋ"U"Yg??5H-rJυGb8(M(GP.kOWF`?3%y\"ji_.rDm~1oU;{ vB3ѽVCN M/ph1#$E'OȒ;Uh;6U,jnu5/1䅢ϭEfG*"zw/k0T$b)x(}-w̵Dq~͇_=A4:"svGFQ3Y1`.{TTvZrW91 Z<+ʨ{a3WCM|}@\Sչ$7Dǿ,yQҠݫlNJiςS#v;I0@90]̄s 5l !p2c Ѓ ](Beq^Q,YWbg4N"u&LZ 52wGx$3A3lS"S1:ˤJ}SOJXK!|Xm.5% 9!!Mh 4ӱCnYL4ϰzU8WRt6B9thjs"ϿFXDCåj[ؖ2ysIs58Def!/]g$J9ʉP&{oKim\NГDxzTewݼC@ =T&(b(B$XDB>$&f#] /9RZqDٖXÃof416l|)4V9kF\'xl!24tiZ7?~WN܁>xd\gwrgý]WQi W#3*o:ۤW3YeJ1 #[i)܇Bcu)!h$z8 PMkv++KM5ޡaV4jDI3y2U"֮SJcp8~DCJz0˙#CƖ(H,X/r0/%fxQ.0Im'~`m@I@3R, =.H/l <:e.-Za64;1;>;&Ldi(0]w3bw#3}Opf4U@Cաfjo4R_ڃ&Í6#Cw00eq]rtH`8#ZVc<08 G ,'x!oo V* lo}[]4Gs 'sR͘bgYnQ7թ^7n ojnAAu`!j^}Džzs\*bWLJ{^?˜HXT˔*On/"H.Y׉I}Un"3܀0~<JU/ G(-*ac&Av܇cDƶ=` |AXLGL\Oji 8b\crJ4{muXs'ߏ,KGI+IxY^Y_Z:B}V5+p)% wmG9h 6샘v ဏhaz>ETg>p!CQKWE8_7/'O~O(B5"h4>ngnsntv~\æ U& #^$(]0uw錓fMP٘h`դ;_vWlu+g󀠠E:[LOںzflQ+D-^j<'-旈 Y.ikg}>XZL,w ~!88Y\:WC?޸~D$BTy4#:L v6GmˢogvH>{:u8i5XZkE'5 O%<7z޿,/tRmS j#G]B=.s(3 g{dnJ)#Ωܦ]`i"ӱq&]-*~FDD,3S}3~5ft˞S>݇*8.#f9[Ͱ؈`oRΫl P_bS cO]I0T=1 [\"ē(%Xn ]W@A_`}%O44ceϱZ6+>&?“7\vc_"Z-rx4RSmnuEH?F/J:VDsġs4 R:| $aYx5)>q ?2']vڕW&+zufvHe:$} isSQCf y-6䖙1b<D9/yŞǧ<вx7hXPY{5D_bnTkc[Rx=D6K{b\-<3A16VxV@6xCMB&+ed$}=ѕ6Z6 XWϐZ\th ^+`[ q.}rccn`L8-p #[7\FWlJ [Gq]~ $&q % E@Aou\AK`[RhQD˨9̀?Os'Fh5./z]Q;g*Bw%Ѭ>"@ɘU&tQEY S1E R#G+`kI grmiF^&i2`+ |SV" OU_YC6Elvi@P-"&O R〛*_* kYBaq)x~oXƱrV0Nיc-S p]zp`<-lRT30Y"Y9{~}S ';n-S lkt !7ZD?!KbBЋZ䣩T$f*ij-Kb'9>e#E5uBvZ7ld*}C&=#Q6L@9{}\)hW*Ie{ #g,eGU&?׸5ohe{}`V3Clڸ$sh׃.eEAhSK}&: I숙iHR`^3J hQo=l` [*ɼQ0LyH^jφwbӚ+.;go9`B}&e@n~^?#l|ТW'vd*vgvP&,'}+>N?d`U+JSW障/̬W+`1W]Z @ ]lkrMjl4]95+|eL8cIbD|i-/(T GDb@<od3]ݎNFQԷVLZN0a~yɰN7D'~8W{՗,U#)H%1;Od/:47!WKGZDSgU' G9C9)>]"-77*A)RYF)2n*ڮ)dZ][NTU ^dEC:y)q D0xa=7+{74gE~hƱMHebk|AsOvD~&%ɀYtmxk oU; ~f?&ZP ¯\]( ֐iO8˹th*̍D7Piz+S}tDm{RͩIb`P2~LTf.o%T=?ʢV6vre[J;w+N }i{:ȹ.||fhg8 ՠqU(n%DCPr}y^Ys ,.e䬡ǝ,ɢƊ]@u.ޙxtgvVxѝ;垦ַk.E g˕͟T +wdE zWIXt^ǵɩ)Eu#EGF$b?A/GTelN3A$ ak1UJy]slMRͨB@`f^D -a02mѡz[m>` <_KԊF$Wʣ= ^]IN%wC3 3Z1?Sd`s5[xE`V;AcѼSTnbMZY9ipp_<){`om!x[7*@WTm tsrr#ݸ_b.̾w vIFY[6P,(3mfFul?lCixern~[MTwnFT6, W"*k aeQ%:=FvbGa4h8` 2/3$!'0y x{k&_]/&ٛ][DNf Cڝ 5(/f(]udf@J&Kcʩ^xUm4 tA7,u$HwT+WJL:&'*irxo3/6~d}"%=F*T {jY{x|6[x X܃uiCן0EZ'.|qYnUU!/]e;!D?FNi/0`N &pXWEA @((s*{yXSᕞ<4T oK8YC-̍\n2*g"V:UE*MD {MAΥ0;/F_7C]^Tu.7;WJb{GñGX Yg?'!=׀v͔HnB^L78}Ea4 a pWěs%B $2d$.onzH)<DQ@</<5F='+^.M YbdyTbݑ/¢E^m@yt4EѦ@ec7}gx+;n.Q~7C8hch/t~-7a I" $0'һb\Qp.DF$ Jfj zĽ1dM#7Fhr9b>"-#]+YIw[wSκXKVXKg9Y,MMdž>^ĥ.bv9!8`"򂴦?f$wfE >2 }8J-i_&Iżص{g:>_qwX!%D9yQ?8p,sw9<Ĩpx)pIWёE}!0>?0[tHk'_B~mnnh]IhFnšfNoX .%+UtY/V"tܸ=R^F~QPv|&=+h 8F$8 ~/B,Ђ];# H=؍&7r}cbu(,{shYL]n8zn[^v:{!}1QAk,[~]Gpde (/:m*&T.#ԄB鷌T RJvC4yG~"D~]_32DArcg!qD=s^ sggj)C  .:6?IԟEH_ܪϷM^ P#7pRbYE77n9w˼ULƙ5ϫė[Zt ĉbRds=: (]l%#`LXh#CSC%)Ep{cѣon5Pqvpg'qg?b ۰miI{ =W4$ :NidJib@-oЖFW5,5lʼ '\D4ű#f~~ 0T;/!泵Mb:-f&8 _&֩{oQ$|)cxn(Bҩ/EnMj̗Ұn9EW ҨBD͒SthQPRw.K^Y|Yκpl!)9.IS|mz,?u:ˣV$YDkb˔;2,9L%sWtnnfb\=cab`dO[Ǜ4w&*]؎kz (LtKj]P];y7vjN^mna,3 dz@Q4Bt+YN8v9ẒU3 X,B? 2Śt,^QeA3M5 @- W3בY;9p{qi"RY/{IA=fUn\%_ jveuOK902d?[TeK~cpJqD_KTO=~/{ɠpDF@ގ]0)#/:cbOHH˺߹Cl!00mRYգ;-tWC3Desỵ̈ 4V!}i[,,\*<1>Ry@Sh,_Vۓ# ?aO· R#w y F)dS, Wu<2.2@]ZDvmuDB+m{KGr?]q1k 4)RK&W_ӑz?=\*H[$ܞOJz 2(&+#μ7EFk;:HS!ki[jsTDK-/|? 97i#Ӹˬ|?;l?yu$G+$`]8F[ʃN ̢Isd [GVHxs;٤@~z JS I@2*nP a% I?W"@+C5ɉ-!$ӈ5ZJ"F)NE߳Q7]AiJ;A;t.d2DEmf5zw4Z&(eqd2qwθmjPBRu& &.4qChH=W Q)]cAiVYo !s:Ҥx6G}CjŅѴ! '0ay_צkJ+˓)FT|&#((Ci5CF`-L44l2S\f9d1Vs*τyb%+^̔B[ béO[);P쳴Qn͛1:=QFw;9wk MDJdE9 Znķ.wErr#6p!. Y*8]t ʁT27J =We0Md$g joZ> =&dZS\> hեϟpUtöR^}D6ߩӭysdbuwS%Q,]u7PGOYH n[J'rH}n0̌<5f"˜d.c9y3UIp*3^YD;2thq-wI( IsfEh psi`n+ u_͍xk/4_)Bu+a +2=KIEy S3^SlxoC*$&R]ԗ U"U|+AB5S;UkF1Dh:) Lԯ!p>9>wofGƠ&l2`4Eza1c.Og2N5Ч\$)RڲFhvƖMY` FgO'Y.RV*Ƃ|ZmG@hN,ֱp\ןfO5kiRxc۹<~l9"s4( <5^"QTa|}x)RKCDַjnDPLNxOF4ȇcv -W;w[NӞBb hqԛ(= "Ǣn~c VgSXvH^N`GJޖUp鱇$<mQ @Ҍo$ڛ#nD{gٗ tN@ ~ W` u|A6vO|{G.sJ].#M;>&X@gBIJu塨{tC^f b299C[V|Z (M-6fʀ96"9) ڧBnO? v3v0-$O(cN&r\\'s|\W5~{)'eLy/=L q %:0}5a2\r""lT*8CIw_ÌY&*T_]N:l? jk&ղJsA!zު7YvʌeDBb.%&oq(˥'q9X]O}ztا!Ѭ"ݸ-֦?@(Mt陼V-Hپ"Z)Hґ(oCL8=k}ytݝ:.o |ZvPLLXդSoaiOZ\ IiI Q{8ہ>ƀwWi%͝fSN: )徐H=\|O<,&cM#%in*({ǯ> ,D3X_X-Ls0}C.}_v*4Ajw- tkV>J201uf&ԎCZ諕W/cKΟ4\~Ynl0Jr E z(xzcH?;V酛wFX]]D\ܩ33݅~($ :HJTR ]J8ԸPo+EUcmqh-郥08 xV^ 9X:<:(Z9H+ϰ` ~+{YL|$4䄮㗸yd-=bp4`V쪊?M!nFcyjn8oh(V0US(z?^ _5UF7 ps:k?nj] Fhr^cONZOo5SP-n♲*56?,6!%^.'>u7*ax4@IMBrGFNX:cK͆S`њl$xJq |.ItnY_ダX*GvuwnVR b\c%5(,=! 2} ^2]*X9v#dt'wh v0hrR0mPNoɹeG*[(qS# q%͖)kI*d`6Fo@z )mR)Ukgz78fǬښy g6Z>8VB_8#2=%۵Űs:0Dw6třbK ő?sB*ݞ1\7cu_Aߺ!lRȡ(?0 dVl[jI7pd'Ks%V ,^QIc4ܘb/_ዴ;;4O4UI@Ӕo\я.JI֣3lƪí13H4Xh[~7ie$`?)1DOc8Zc^YWk2g{yH=zS{Vvq<\E`5Ύ9& !dW.>9SSQwbr*ȓ'79ǘU$E&늖m@8^½_Q-./d| r}O%Fy%vo^O#Gtx]*N;H (A$*61Ei\naI-uۄ'Tw?MWNV"{^ԼYbe|i۵l N }zd,}5dljQP4:|VJ{اq}vO([` ;9{ |c^CI3E@\hLY_"vcKƩaTPЮn6kyK,1_3pRz*2LgiA&M+o*@w":}([ePDBZ"XIпC9 b|v!K,-E0OCL%6nrqA YhYĊ؁@h~qqH^'a ) OS18mۊDz*WcXzJ$~8hSܽ#}s*`?[{$͋M,Yb}FVG(-`b"idEkYe$ C x(1m Wad?U>@%:8ck_b>8b9/H,kMɈqBlWF)>ns]ط2&Xm⟢SgImHپU+~."| {z5۸#m5lhGzdtPz؋3υZyoh.Q18qHu]_ңʄڣq@d;]LC/=~2l7$,C ,5,_[@d\9SDբ~%K +7AE҄K~L#R |xXVȊb"B(r|k.d}vYoW̾`7nda҆8ǕȍyʩVXEs/[笑O1,@nv=:ܠ~Ky۽ٹɒ%(]RCJ 1V_Pq~Zdv0p0{ jf1qڞBF;aRLVZeM3{3,Vu՚=;]LE]~8(˷hfY4BVh m,6١q =ρ5jM/1cx7m1"::'B*Hf|ؑ7W,eq0X)ߞU [Ƞg7 \  ͱ}MXG!d\ ( }!;!,ز:A|gc< ח|H[Hf8zyZ{_9f_JQABbMOi{=)+ߐ߰)"H"v(S]ay/iG!Դq6߫&,#Lq\Kɢ٪SgN\E1̿ư=%0)gc]]z#/f#bA&_92@p# V@ ~T<.e ɽBoTyh߽s>9_4Bڈ5v";_(k-[3ƹczrxxۢ8iɣ_1}rqFJq.zGŨ[(v/s`ew)MdžI2fɢ[<ڸg,h!^"4̟ݪ.`Q^°eTҘqt`! t|Oy잆COjAR9"X&o-7b,VY?3#9!lӖ* [!c l1ck! 8'a-]% W1-t9 J[_ ]pR6e̷ZU*H.Xy݈3v W\naߪU"Mxauj\$:R ,]V{qf˷'3#P(8Al bu;%ȋ.TZ) Bw`jN]"KQ-S"zr*Qg&cm( 4(|Eo(J9~?gT -<5{ o9ukPÛT\AySk\\bCaR 5 C9)=c}Ds]8&}}<'iu o.+QF;_ZZZ=,}L+[W=}|!#Wv>[]!ICz\VJW@h#Olf % si]\ BoiBtڿW4ho4ڥif92)Cnu.Qcp$wy$QoxʢunGBz:6`Q=;.0n'PImin>ioIͿkgV3 䖯ZbBhlLoøo먒2at2DQkg @L'cQ٢^Gj4 &$sTf %:aiD~/U[AyS?(BR3cF,.*2`$xߊ`8 3$K9ۥv]}1 zM+3gp]"JWҁ;H gnk3bRdP af!]xCILS_{~f#?S=w3¸F{RNr.T z$h yoжb("٤d LCUnAɂadItER/)K&S ( zy6t߃].PLWf#&PeH&\OEj N)=pe )9b _!n>Udy?JwDAG*a`L*aM{HԱ- sv < MDX'tpMdS7Ś^e+ܿ+;Go28gR.@Fmj&7amN/ j[ƺs9"w>q\A]4% ѫ wh{lfHuU/ ;% i-lhBXAJ ?+͛@bu.b=O,qS}谀mѝq m*+<ǕT #Zನ4,7"We1+9BNU-B -tE,ӫu}oƦ ov7F\;KfoYϳL qGHFug'r'^:t@˲' %%1h$q?̀Rz,$i+NF*78 c Td=\pe BC]ކQdw:D|TY+QN~ 浍BRP/廊Tb4׵D? ߟȉkJxJHc*i:ݫ(Թ`ף_[KjMxZq%ؾеkJ IeVg&&E)5_I_N}3nU ÛPb_l>$lP±IA\# p_5IS7y&̎x}=/k eobҕ#z<¼G9Q 9;uLPozxhsz>`Ы;y&}:RI?\1KgJ|+~8v|YJ%X !oyF`ztezݟ"E&em QҦbVb~-:} 7$ X/M(Ae JO>+?)3s"tDwO(Zjs, 7_&vØ2v;+6^鴙?S3Ko9l[$L9YfrW#/7M9ȡmO ڶ 7DzqYzYҽ aNd9[AM`V*Bݩ=;XG ۧCo|;BS]@g5(c>LQީׄV R_̔kT̀z`$DR4U+ӄiU,$r Mce<my ;0 ::~d] Oȭv;^!_fpf+2^'^ Kq$BE`nr10תe1uh+Sa39)E%f)=wGN]$SB\ h9̸ QL1wUZF#tNS í([ fL]e">Nh#/]jՉ/U>)kylkS;Onס$?zR~ocP(SnNN 'jmgԼ'~"UuR֝v08WùHc˪~4GDr.oqD%6(0wqe <$ꌙ?,|%=f륝:R8ǰ,VL߀"#=NaЉY~:%M{Cٰm1:ߑ"OBsz fϻ}I.O \Di58:Mח-l!"־ ҂m_0eGG>vnޟ.GaUR.f욧Q} ]Df=Oy?0adlwΤM&*Fn51+yR2nSSft)IQ-;FofLF\r7NPٰSJ.Rٗ|bT+kT"yxXFNeаLyvu@ZS+Op懾xĮ/mz$1UpԲ{Sa_\?J ?̾2JDM1;ubgϬ`qp3@r+5c 6w(4Ʒm"jdbc/HS䤯A a #BGpS0}`HhvYӴsvzwg*/gNk @($R}r 򧾒eo"-8,kDv/D#)l3^.4k2ʗ6XP^[( ݖċH{XELiòLET}0lĚͭmG/z"w=Ք,k" 63O8{C2SC~vy5 lyUVDp&dù;$aPiEQ5i=1٘=SXKduGUYM7|8D`~0 c8t! V>Fc,9IdI-NN2qӢFf۸9═ݞV!"4b?㠪"Z>_ /? 6. ΝuU\hG m}GP3ak.v+cq(|?4O#tk|!;)og$izT!GG==븱a #6Eb}?@68 sC7Q1 j u雴V=;59C)KJǒڐyc4:뻌Ҏ,ygiarL(W2;lΪ.Kڮ!?W3k({xs&* K`TU9Z7׋:gIZ_[7wfPD#-x?ljR1pGQ;.ŞfV+ڰG yRTe<|]3 W9"dĊ5l*zLSDY[ղYiAgs3]_91%Uؠ$.ưxUSJ nAbjs 9s)Atr["(?N[W.~%uui$T3O< kK3 \ڐ˄.Q)OK ]` 70P3xݍ5by?/E ݤ71&1jP˅1K暡ܽL0~E{ļGٗ<۽LCMZ-ŁR::xս% # pڏowDXZ^{@EF#N6Di)CyS&]ޞ-T4bhD[oI,:[[fYwo>&.F!~Jjmο+3ϕsyn۷OaУd6bzQ-qDN`tH[ ̹/()DC=t8 Q'K~({]?>F@ "`WWU`˜E jcؙّVB"z`۳\ҷ0I̩i3'PNlKfBqxY (F|0.Ve%S61opMG ё`α'\YfRXvY[ڭR+t[ BS=)'钼YpAJњ%_q;+GL|h)͒ܝ楲 |6ړ4j2~qFq#mW4O +CIZw~ke+5LbaDrMxk,ߒ.PHWr67L\G~5c<,) =.ڣTV|ΌXd4AJ# o^9 ~ȵ<}Fr m6gs[07 oD˜x N>0*%^`Y3m۫Oj57$mO"φ 7?m:_{\Oϊn=4hJԾ,sT "JL3i]~ViHIwd]YKE6-w#tyU5lW1<_Cv>Tr [IxJAt5XoSʉp5 bKGv ["IVMDlޗ󻐓w>TЕ[Il;6q:j_\dsGX>_&y\c`aBt@1]G$cXBy?|pOk:[򸮴-9j͙= 3IH(|MTG-R.%XR,K 0`*e2$&Wg,}e3UO/E{MUuopL>FzV9z_*Ɏ{ܵC[ ٕiM= b0' A_ h Ʌ;0m 7+ИL,xy6 ALT5W0I@\iq51^-9@%ԑδNx}=.nPLs:QO,n4((~YgF5=:H9! %\=HUe$[hH[",:ƉXlII$ӝjCW4¯zYMCivbC>^gc#C6.zOZ]^d^,O#FE6TG+nK#+,[WzAַ/L1V[>k_VHĕ6ewnb2frS*Dv즦}.w3>%:EE( ; ( DW"|M\w)2Mck*;+Lҍ1VDPi[܇C)LV@V6e;&%&ЧdiRm ZvhhGaߕfmIs(nJjq27pԴH_5Iw P\"Vֳ7&@mUst>j=_Qq&_{ l)?m/Q"hJѼ8' HuVދ;F"˹ ̭|7BNpmYP־H ®_97Rk@K;)dt >qN\Xvg2C=,;/&żB n(̌3AÌᇲ6~uN0B҃~[7Z)3PbROI屔3|/V9 o(jС@` WBqx ~S>OGpL­\ sΚk[)i 4aZ.gKN 6_AGT[ (xx-$#&YFU^dDAqa}c-G6`p[(ڢa1lt`(p<r_Y~KP/Nf }ɐtso5W;`׵)nMEQ(X:_EGt&IHN<TJPol AB˶g MgAϑ:]^ mi9FԀndF)@,;lp9I wn`hEq!q%OMx Ä"7zSH8DXRhWP.ʁ0wHﳫь d@M{X4v鸃uŕ4_ NAK@QA[8N1轱 !: YZ