selinux-policy-targeted-3.13.1-268.el7_9.2>t  DH`p_.$ƨ7\1j¢bMT߾ dBʪoXHu cJ-BOYguvbjaJ@Ӡ!hۡ<ш|D݆njZ) xj ljk8,n4mc~1l( ~x!,Џ}UwD>!jFce{#%M="9"m':fӚ\}+S|qhDm*Ł[@,MGY__--k D{TD^@5 3)_5guȶK06 X ҁ{@(İ e H&3)+r9cf8227db909c7e5b223d10e72a148e594b3e28co_.$ƨӳnZ16_7(QP[@=^—s*z$ϗڸUihtcf50-.vMf11b4M6.}${m!VQeb/Vl^?|cm-U{-QSd$p㸀n-1?wO z74 f K;ߦ{ggt~CꢖT8si%| ̉7GoR~y-фO'oyj.4jV7`1.sj~ro "Lc_|.vH24B-2o;POC|[O~9 XuIFMf2kwIqNj1jj y 韹egGү#m˓ˌ21n?vOSX枦(}Ma3FDMI-}KAdD!ƖB ? d! - J| " P$ 2  ?H Y # pL   h(89:8:O= ƪ> ƲB ƺG H |I X Y Z [ \ ] ^ Hb d %e *f -l /t Hu v @ w x Py  Cselinux-policy-targeted3.13.1268.el7_9.2SELinux targeted base policySELinux Reference policy targeted base module._3x86-02.bsys.centos.org3CentOSGPLv2+CentOS BuildSystem System Environment/Basehttp://oss.tresys.com/repos/refpolicy/linuxnoarch if [ $1 -ne 1 ] && [ -s /etc/selinux/config ]; then . /etc/selinux/config; FILE_CONTEXT=/etc/selinux/targeted/contexts/files/file_contexts; if [ "${SELINUXTYPE}" = targeted -a -f ${FILE_CONTEXT} ]; then [ -f ${FILE_CONTEXT}.pre ] || cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.pre; fi; touch /etc/selinux/targeted/.rebuild; if [ -e /etc/selinux/targeted/.policy.sha512 ]; then POLICY_FILE=`ls /etc/selinux/targeted/policy/policy.* | sort | head -1` sha512=`sha512sum $POLICY_FILE | cut -d ' ' -f 1`; checksha512=`cat /etc/selinux/targeted/.policy.sha512`; if [ "$sha512" == "$checksha512" ] ; then rm /etc/selinux/targeted/.rebuild; fi; fi; fi;if [ -e /etc/selinux/targeted/modules/active/base.pp ]; then DONT_REBUILD=1 /usr/libexec/selinux/selinux-policy-migrate-local-changes.sh targeted touch /etc/selinux/targeted/.rebuild systemctl daemon-reexec fi . /etc/selinux/config; #TODO: (cd /etc/selinux/targeted/modules/active/modules; rm -f vbetool.pp l2tpd.pp shutdown.pp amavis.pp clamav.pp gnomeclock.pp nsplugin.pp matahari.pp xfs.pp kudzu.pp kerneloops.pp execmem.pp openoffice.pp ada.pp tzdata.pp hal.pp hotplug.pp howl.pp java.pp mono.pp moilscanner.pp gamin.pp audio_entropy.pp audioentropy.pp iscsid.pp polkit_auth.pp polkit.pp rtkit_daemon.pp ModemManager.pp telepathysofiasip.pp ethereal.pp passanger.pp qemu.pp qpidd.pp pyzor.pp razor.pp pki-selinux.pp phpfpm.pp consoletype.pp ctdbd.pp fcoemon.pp isnsd.pp rgmanager.pp corosync.pp aisexec.pp pacemaker.pp pkcsslotd.pp smstools.pp ) if [ -e /etc/selinux/targeted/.rebuild ]; then rm /etc/selinux/targeted/.rebuild; /usr/sbin/semodule -B -n -s targeted; fi; [ "${SELINUXTYPE}" == "targeted" ] && selinuxenabled && load_policy; if [ $1 -eq 1 ]; then /sbin/restorecon -R /root /var/log /etc/passwd* /etc/group* /etc/*shadow* 2> /dev/null; else . /etc/selinux/config; FILE_CONTEXT=/etc/selinux/targeted/contexts/files/file_contexts; /usr/sbin/selinuxenabled; if [ $? = 0 -a "${SELINUXTYPE}" = targeted -a -f ${FILE_CONTEXT}.pre ]; then /sbin/fixfiles -C ${FILE_CONTEXT}.pre restore &> /dev/null; rm -f ${FILE_CONTEXT}.pre; fi; if /sbin/restorecon -e /run/media -R /root /var/log /etc/passwd* /etc/group* /etc/*shadow* 2> /dev/null;then continue; fi; fi; exit 0 ޮ4^.@pB&%- ,f&D# *%| +!071:ZgO/2(/ %9 ,7 'wqC B+AL'h(I4:"2.]'";'31#f1!A%'&Z&6'$L$O#&((C##{5$t&!mS$rb4 *D(3pI%# "6i# . 0 k,e *E#G9-`2K>Y}%" 5+/% #!)xO L*B - ") +/%GM1"4 e*(e&@(,D#|1=3:#M!e )(7I'` *=#>1% )" +g& D)'`n/ %K& 5!9#2 #)"(!c' 8)"O *3v /$7z$ %~ '&5!'"  -:$hJ5J'"!0gJ">I1@ 4(D#L'xn"` +Zu{$I!1I(( ,54Ey %z0&^& (K#$A <) * 5215J&& u)Bs#,#r3"!@p% d@[6i ,}.&S"< -8&1"#$s#" )F\$"4 !x! - $6W'#'#y>!I +O /j(7SA%13$$H" *iE" +3%;a#3.2 b,v^&0#*& D*4"$. D("M&##C#qBD$" 9u + + $9#%' 'k1A(F#GWPW""B64U#8&&2& ;&H"Ca=|&O210?%[ +iF$y%  !_14W7!~s/ (am3' 0# .y$ ..N"5"[&Y2Bs' ~-&Mf3 3)}" ,:1""']2'k#E .% +v +y"%/S&9>C'l .$T ,B$L=D #( &TId7(!s# ^-b"7`g&U#%_ * )%4%'< +(6%:n"b3&OQ13ZC& (W6&Z ,' )b*&m *;$%Ju!:&#"1= a(7&z$S$ +S& 0' i,% / *j#/KB&C( '% JF%^(x!$#/|>8S&uA '" :*!#%$}%J1w >)2>#-v'x&1m9#0 ) <,$ #,G|3a,X"H|}5 -? u( ,n ;;jjee ?ޮ94^ M!J59#Ba3>G h;_j0 0fs yyA큤AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA큤A큤A큤AA큤A큤_,_#_+_,_+_+_+_#_,_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_#_+_+_+_+_+_+_#_#_#_____n_,_n_,_,_#_#_#_#_____#________________#__,_,___#_,_,____,_,_,_,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../selinux-policy-migrate-local-changes@.service@@@@@@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.13.1-268.el7_9.2.src.rpmconfig(selinux-policy-targeted)selinux-policy-baseselinux-policy-targeted@     /bin/bash/bin/sh/bin/shconfig(selinux-policy-targeted)coreutilspolicycoreutilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)selinux-policyselinux-policyrpmlib(PayloadIsXz)3.13.1-268.el7_9.22.5-243.0.4-14.6.0-14.0-13.13.1-268.el7_9.23.13.1-268.el7_9.25.2-1 audispd-pluginsseedit389-ds-base389-adminpki-selinuxfreeipa-server-selinux1.7.7-11.2.71.1.1210.0.0-0.45.b13.2.2-14.11.3__V ^^x]µ]]{@]{@]]c@]n]V]V]S]R@]Ik]:@]5@]%@]\F@\\9\@\ޢ@\\@\@\7\@\\~d\y\s\k\V\R@\R@\@n@\;(@\2[v[[;@[;@[[R@[t[#@[@[@[[h@[[[9@[@[}P@[{[{[z@[m~@[i[i[i[dC[`O@[]@[Y[6@[3|@[2*["X[d@[[ [ L@[[[@[ZmZȲZZH@Z@ZZz@Zz@ZyZ_:ZWQZV@Z.s@Z)-@Z%8ZZ @ZZNZNYYA@YYW@YW@YYY@Y@Ycl@YP@YJ_YI@YBvY9<@Y6@Y5GY1S@Y0Y.@Y-^Y, @Y, @Y%uYYY@Y@Y@Y.YXQ@XXX@X@X@XXX@XۡXP@XXg@Xg@X~@X@XƉXCXCXX @XXXBXXXs{@XY@XWXRXRXOXJXAb@X@X)@X#X!@XWWSW_@W_@Wv@W;W@WίWW:WQW@WW@W@WW~W@WW~D@W{@Ws@WrfWj}WbW^@WYZ@WYZ@WUeWM|WBW9@W9@W1@W(W V@V@V@V޾V2V@V_VVCV@VZV @VqV }@V }@VBUUU@U@UpUUUUoUoU5@UUȒ@UĝUUWUU@UUK@UUU'Ua@U~@UzUv@UT@U@Tr@T@T@T7TTTC@T@TTT}Tto@TsTk4T`T[bTWn@T?@T>aT6xT6xT@S@SSDSg}@SB@S>S;S:@S9XS5d@S4S2@S0@S,)S*@S)S)S&S&S"@S!S L@SSS@SSc@SSnS @S SK@RRR@RRJ@Ra@RRR&R&RRR=RʚRR@R@R@Rv@Rv@R@RR@R R@R@R|@Rz/@Rz/@RsRpRnQRi RfhR_@R_@R[R[RSRNRNRL RIgRB@RB@R:@R1R-@R-@R(r@R' R%@R7RRNRR@Q@QQdQQ@QQޞ@Q@QکQکQ@QzQQ4Q@@Q@QKQQ@Q@Q@Q@QQ@QQQQ@Q@QQQ@Qzl@Qw@QvwQo@Qo@QnQm=@QkQfQb@Q`@Q^QZ@QQQIQGQ@j@Q9Q8@Q4Q0@Q-@Q& @Q$QQ@QQ@Q @Qh@QsPP@P@PP@P[PP!@P8@PO@P @Pf@PPqP @PP7@P@PPPYP@P@PPPM@PPd@P@PoP{@P{@P@PP5@P@P~P}L@Px@PvPvPuc@Puc@Pr@Pmz@Pmz@Pmz@Pj@Pd?Pd?Pb@PaPaP[@PXb@PWPS@PQPO'PM@PIP@@P>@P8@P7lP2&P2&P,P,P*=P(@P#@P#@P!@P!@P@PkPw@Pw@PP

@NNU@NNl@N@N@NåN@NNNN@NNN@N@NGNGNGN@N@NNS@NS@N^N^N @N @NNj@Nj@NN$@NN@N/N@N@NFNFN@NNN@N@N@N]Ni@Ni@Ni@N|tNyNx@Ns:@NoENoENiNf @N^"@N\N[@NTNS@NS@NC@NBrN:N98@N7N6@N2N.@N*N)f@N(N%qN$ @N@N7@N e@NpNpM@M@Md@Md@MM{@M@M۝M@M@M‘@M@M@M@My@My@M3@M@M@MMM@MMMMTMx@Mx@Mv@MlMbSM[@MRMQ0@MQ0@MJMGMGMA^@M>@M9u@M6@M5M4/@M4/@M0:M,F@M$]@M@M9MMMMM\@M M M@L!L!L@LL@L@L@LOLOL[@L@L@Lr@L L,@L,@Lډ@L7LLLNL@LΫLeL|L@LB@LB@LB@L@LMLL@LdLL{L*@L@L5LLA@LLLL@LcL@L@L@LzL)@L|L|L|L{@LvW@LvW@Ls@Ls@LrbLrbLmLk@LjyLe3Lc@La?@LZLYV@LXLN@LN@LMxLMxLI@LH2LF@LEL=L=L=L;L7@L LT@L@LL@L@L0LLGL@K^K^KKKj@K$@KKK@K@KK@K]K޺K@KtK#@KKՀ@K:@KK͗@KŮ@K\K\K @KKKKK9@KK@KK@K@KKKKrKK~@K,K,K,K@KK8@KKK@KK@KqKqK}+K{@K{@KuBKs@KqN@KjKie@Kf@Ka|@K`*K]KXAKTM@KPXKEKEKEKD{@KC)KA@K;@K2@K0K/c@K+nK*@K(K"4@KK>K>K>JJęJH@JH@JJJ_@J@JjJjJ@Jv@Jv@Jv@Jv@J$J@JJ0@J@J@JG@JG@J@JJ@J@J@JJJ#J@JJJ@J:J@JJQJ@J J J|@JzJyt@Jyt@Jx"JrJrJq@Jn@Jn@JmJhPJeJ\s@JW-@JT@JS8JKOJI@JCfJCfJB@J@J@J?r@J<@J;}J:,@J7@J67J2C@J0J/@J,@J%@JJB@JJMJ J dJ@J@JJ@J*@J*@II@IIA@IIII@I@IIIX@IX@IX@II@I@IcIIo@Io@IzI)@I@IܑI@@II@I@I@IԨIд@I̿In@I3I3I@II@I@IV@IIaIIm@I@I'@II2III@IIIIIIII@III@I1I@III~@I}Iy@Ix_Iw@IuItk@Itk@Io%@Ik0IeIcGIa@I`IVIO@IJ;@IHIAI>]I= @I7@I6tI3I-I@III9@I9@II IP@I@IIg@Ig@HHH@HrH~@H,H@HCHHH @H @Hf@Hf@H@H+H@H׈H׈H7@HBH@HǶH@HH|@HHH@H{@H)HHL@H@H@H@HnH}H|@Ht@HsVHr@Hl@HkmHgy@HcH`H_@H^>HRa@HQHQHO@HFHFH$@DX@DU@DN@DN@DLDH@DGwDGwDDD@@D?D?D;@D;@D:HD:HD2_D1@D1@D-D+@D+@D'D!<@D!<@D!<@DDD@D@D@DDDDDD@D@D@D@D uD $@D D @D @DDDFC@C@C@C@CCCCCR@CCCCC@Ci@CC@C@CtC@C@CC:@CECCC @C @CعCعCعCعCC@C-C-C-C@C@CCǖ@C@CáCáCP@CP@C[C @C @CCg@Cg@CCC!@C~@C,C@CCCCC@CC@C@C@CZCZC @C @CCCf@Cf@Cf@CC@CqCqC @C @C @CCC}@C7@C7@C7@CBCBCYC@C@CC}@CqCqZdenek Pytela - 3.13.1-268.2Zdenek Pytela - 3.13.1-268.1Zdenek Pytela - 3.13.1-268Zdenek Pytela - 3.13.1-267Lukas Vrabec - 3.13.1-266Lukas Vrabec - 3.13.1-265Lukas Vrabec - 3.13.1-264Lukas Vrabec - 3.13.1-263Lukas Vrabec - 3.13.1-262Lukas Vrabec - 3.13.1-261Lukas Vrabec - 3.13.1-260Lukas Vrabec - 3.13.1-259Lukas Vrabec - 3.13.1-258Lukas Vrabec - 3.13.1-257Lukas Vrabec - 3.13.1-256Lukas Vrabec - 3.13.1-255Lukas Vrabec - 3.13.1-254Lukas Vrabec - 3.13.1-253Lukas Vrabec - 3.13.1-252.1Lukas Vrabec - 3.13.1-252Lukas Vrabec - 3.13.1-251Lukas Vrabec - 3.13.1-250Lukas Vrabec - 3.13.1-249Lukas Vrabec - 3.13.1-248Lukas Vrabec - 3.13.1-247Lukas Vrabec - 3.13.1-246Lukas Vrabec - 3.13.1-245Lukas Vrabec - 3.13.1-244Lukas Vrabec - 3.13.1-243Lukas Vrabec - 3.13.1-242Lukas Vrabec - 3.13.1-241Lukas Vrabec - 3.13.1-240Lukas Vrabec - 3.13.1-239Lukas Vrabec - 3.13.1-238Lukas Vrabec - 3.13.1-237Lukas Vrabec - 3.13.1-236Lukas Vrabec - 3.13.1-235Lukas Vrabec - 3.13.1-234Lukas Vrabec - 3.13.1-233Lukas Vrabec - 3.13.1-232Lukas Vrabec - 3.13.1-231Lukas Vrabec - 3.13.1-230Lukas Vrabec - 3.13.1-229.5Lukas Vrabec - 3.13.1-229.4Lukas Vrabec - 3.13.1-229.3Lukas Vrabec - 3.13.1-229.2Lukas Vrabec - 3.13.1-229.1Lukas Vrabec - 3.13.1-229Lukas Vrabec - 3.13.1-228Lukas Vrabec - 3.13.1-227Lukas Vrabec - 3.13.1-226Lukas Vrabec - 3.13.1-225Lukas Vrabec - 3.13.1-224Lukas Vrabec - 3.13.1-223Lukas Vrabec - 3.13.1-222Lukas Vrabec - 3.13.1-221Lukas Vrabec - 3.13.1-220Lukas Vrabec - 3.13.1-219Lukas Vrabec - 3.13.1-218Lukas Vrabec - 3.13.1-217Lukas Vrabec - 3.13.1-216Lukas Vrabec - 3.13.1-215Lukas Vrabec - 3.13.1-214Lukas Vrabec - 3.13.1-213Lukas Vrabec - 3.13.1-212Lukas Vrabec - 3.13.1-211Lukas Vrabec - 3.13.1-210Lukas Vrabec - 3.13.1-209Lukas Vrabec - 3.13.1-208Lukas Vrabec - 3.13.1-207Lukas Vrabec - 3.13.1-206Lukas Vrabec - 3.13.1-205Lukas Vrabec - 3.13.1-204Lukas Vrabec - 3.13.1-203Lukas Vrabec - 3.13.1-202Lukas Vrabec - 3.13.1-201Lukas Vrabec - 3.13.1-200Lukas Vrabec - 3.13.1-199Lukas Vrabec - 3.13.1-198Lukas Vrabec - 3.13.1-197Lukas Vrabec - 3.13.1-196Lukas Vrabec - 3.13.1-195Lukas Vrabec - 3.13.1-194Lukas Vrabec - 3.13.1-193Lukas Vrabec - 3.13.1-192Lukas Vrabec - 3.13.1-191Lukas Vrabec - 3.13.1-190Lukas Vrabec - 3.13.1-189Lukas Vrabec - 3.13.1-188Lukas Vrabec - 3.13.1-187Lukas Vrabec - 3.13.1-186Lukas Vrabec - 3.13.1-185Lukas Vrabec - 3.13.1-184Lukas Vrabec - 3.13.1-183Lukas Vrabec - 3.13.1-182Lukas Vrabec - 3.13.1-181Lukas Vrabec - 3.13.1-180Lukas Vrabec - 3.13.1-179Lukas Vrabec - 3.13.1-178Lukas Vrabec - 3.13.1-177Lukas Vrabec - 3.13.1-176Lukas Vrabec - 3.13.1-175Lukas Vrabec - 3.13.1-174Lukas Vrabec - 3.13.1-173Lukas Vrabec - 3.13.1-172Lukas Vrabec - 3.13.1-171Lukas Vrabec - 3.13.1-170Lukas Vrabec - 3.13.1-169Lukas Vrabec - 3.13.1-168Lukas Vrabec - 3.13.1-167Lukas Vrabec - 3.13.1-166Lukas Vrabec - 3.13.1-165Lukas Vrabec - 3.13.1-164Lukas Vrabec - 3.13.1-163Lukas Vrabec - 3.13.1-162Lukas Vrabec - 3.13.1-161Lukas Vrabec - 3.13.1-160Lukas Vrabec - 3.13.1-159Lukas Vrabec - 3.13.1-158Lukas Vrabec - 3.13.1-157Lukas Vrabec - 3.13.1-156Lukas Vrabec - 3.13.1-155Lukas Vrabec - 3.13.1-154Lukas Vrabec - 3.13.1-153Lukas Vrabec - 3.13.1-152Lukas Vrabec - 3.13.1-151Lukas Vrabec - 3.13.1-150Lukas Vrabec - 3.13.1-149Lukas Vrabec - 3.13.1-148Lukas Vrabec - 3.13.1-147Lukas Vrabec - 3.13.1-146Lukas Vrabec - 3.13.1-145Lukas Vrabec - 3.13.1-144Lukas Vrabec - 3.13.1-143Lukas Vrabec - 3.13.1-142Lukas Vrabec - 3.13.1-141Lukas Vrabec - 3.13.1-140Lukas Vrabec - 3.13.1-139Lukas Vrabec - 3.13.1-138Lukas Vrabec - 3.13.1-137Lukas Vrabec - 3.13.1-136Lukas Vrabec - 3.13.1-135Lukas Vrabec - 3.13.1-134Lukas Vrabec - 3.13.1-133Lukas Vrabec - 3.13.1-132Lukas Vrabec - 3.13.1-131Lukas Vrabec - 3.13.1-130Lukas Vrabec - 3.13.1-129Lukas Vrabec - 3.13.1-128Lukas Vrabec - 3.13.1-127Lukas Vrabec - 3.13.1-126Lukas Vrabec - 3.13.1-125Lukas Vrabec - 3.13.1-124Lukas Vrabec - 3.13.1-123Lukas Vrabec - 3.13.1-122Lukas Vrabec - 3.13.1-120Lukas Vrabec - 3.13.1-119Lukas Vrabec - 3.13.1-118Lukas Vrabec - 3.13.1-117Lukas Vrabec - 3.13.1-116Lukas Vrabec - 3.13.1-115Lukas Vrabec - 3.13.1-114Lukas Vrabec - 3.13.1-113Lukas Vrabec - 3.13.1-112Lukas Vrabec - 3.13.1-111Lukas Vrabec - 3.13.1-110Lukas Vrabec - 3.13.1-109Lukas Vrabec - 3.13.1-108Lukas Vrabec - 3.13.1-107Lukas Vrabec - 3.13.1-106Miroslav Grepl - 3.13.1-105Lukas Vrabec - 3.13.1-104Lukas Vrabec - 3.13.1-103Dan Walsh - 3.13.1-102Lukas Vrabec - 3.13.1-101Lukas Vrabec - 3.13.1-100Lukas Vrabec - 3.13.1-99Lukas Vrabec - 3.13.1-98Lukas Vrabec - 3.13.1-97Lukas Vrabec - 3.13.1-96Lukas Vrabec - 3.13.1-95Lukas Vrabec - 3.13.1-94Lukas Vrabec - 3.13.1-93Lukas Vrabec - 3.13.1-92Lukas Vrabec - 3.13.1-91Lukas Vrabec - 3.13.1-90Lukas Vrabec - 3.13.1-89Lukas Vrabec - 3.13.1-88Lukas Vrabec - 3.13.1-87Lukas Vrabec - 3.13.1-86Lukas Vrabec - 3.13.1-85Lukas Vrabec - 3.13.1-84Lukas Vrabec - 3.13.1-83Lukas Vrabec - 3.13.1-82Lukas Vrabec - 3.13.1-81Lukas Vrabec - 3.13.1-80Petr Lautrbach - 3.13.1-79Lukas Vrabec - 3.13.1-78Lukas Vrabec - 3.13.1-77Lukas Vrabec - 3.13.1-76Lukas Vrabec - 3.13.1-75Lukas Vrabec - 3.13.1-74Lukas Vrabec - 3.13.1-73Lukas Vrabec - 3.13.1-72Lukas Vrabec - 3.13.1-71Lukas Vrabec - 3.13.1-70Lukas Vrabec - 3.13.1-69Lukas Vrabec - 3.13.1-68Lukas Vrabec - 3.13.1-67Petr Lautrbach - 3.13.1-66Lukas Vrabec 3.13.1-65Lukas Vrabec 3.13.1-64Lukas Vrabec 3.13.1-63Lukas Vrabec 3.13.1-62Lukas Vrabec 3.13.1-61Miroslav Grepl 3.13.1-60Miroslav Grepl 3.13.1-59Lukas Vrabec 3.13.1-58Lukas Vrabec 3.13.1-57Miroslav Grepl 3.13.1-56Lukas Vrabec 3.13.1-55Lukas Vrabec 3.13.1-54Lukas Vrabec 3.13.1-53Lukas Vrabec 3.13.1-52Miroslav Grepl 3.13.1-51Lukas Vrabec 3.13.1-50Lukas Vrabec 3.13.1-49Lukas Vrabec 3.13.1-48Lukas Vrabec 3.13.1-47Lukas Vrabec 3.13.1-46Lukas Vrabec 3.13.1-45Lukas Vrabec 3.13.1-44Lukas Vrabec 3.13.1-43Lukas Vrabec 3.13.1-42Lukas Vrabec 3.13.1-41Lukas Vrabec 3.13.1-40Miroslav Grepl 3.13.1-39Lukas Vrabec 3.13.1-38Lukas Vrabec 3.13.1-37Lukas Vrabec 3.13.1-36Lukas Vrabec 3.13.1-35Lukas Vrabec 3.13.1-34Lukas Vrabec 3.13.1-33Lukas Vrabec 3.13.1-32Miroslav Grepl 3.13.1-31Miroslav Grepl 3.13.1-30Miroslav Grepl 3.13.1-29Miroslav Grepl 3.13.1-28Miroslav Grepl 3.13.1-27Miroslav Grepl 3.13.1-26Miroslav Grepl 3.13.1-25Miroslav Grepl 3.13.1-24Miroslav Grepl 3.13.1-23Miroslav Grepl 3.13.1-22Miroslav Grepl 3.13.1-21Miroslav Grepl 3.13.1-20Miroslav Grepl 3.13.1-19Miroslav Grepl 3.13.1-18Miroslav Grepl 3.13.1-17Miroslav Grepl 3.13.1-16Miroslav Grepl 3.13.1-15Miroslav Grepl 3.13.1-14Miroslav Grepl 3.13.1-13Miroslav Grepl 3.13.1-12Miroslav Grepl 3.13.1-11Miroslav Grepl 3.13.1-10Miroslav Grepl 3.13.1-9Miroslav Grepl 3.13.1-8Miroslav Grepl 3.13.1-7Miroslav Grepl 3.13.1-6Miroslav Grepl 3.13.1-5Miroslav Grepl 3.13.1-4Miroslav Grepl 3.13.1-3Miroslav Grepl 3.13.1-2Miroslav Grepl 3.13.1-1Miroslav Grepl 3.12.1-156Miroslav Grepl 3.12.1-155Miroslav Grepl 3.12.1-154Miroslav Grepl 3.12.1-153Miroslav Grepl 3.12.1-152Miroslav Grepl 3.12.1-151Miroslav Grepl 3.12.1-149Miroslav Grepl 3.12.1-149Miroslav Grepl 3.12.1-148Miroslav Grepl 3.12.1-147Miroslav Grepl 3.12.1-146Miroslav Grepl 3.12.1-145Miroslav Grepl 3.12.1-144Lukas Vrabec 3.12.1-143Miroslav Grepl 3.12.1-142Miroslav Grepl 3.12.1-141Miroslav Grepl 3.12.1-140Miroslav Grepl 3.12.1-139Lukas Vrabec 3.12.1-138Miroslav Grepl 3.12.1-137Miroslav Grepl 3.12.1-136Miroslav Grepl 3.12.1-135Miroslav Grepl 3.12.1-134Miroslav Grepl 3.12.1-133Miroslav Grepl 3.12.1-132Miroslav Grepl 3.12.1-131Miroslav Grepl 3.12.1-130Miroslav Grepl 3.12.1-129Miroslav Grepl 3.12.1-128Miroslav Grepl 3.12.1-127Miroslav Grepl 3.12.1-126Miroslav Grepl 3.12.1-125Miroslav Grepl 3.12.1-124Miroslav Grepl 3.12.1-123Miroslav Grepl 3.12.1-122Miroslav Grepl 3.12.1-121Miroslav Grepl 3.12.1-120Miroslav Grepl 3.12.1-119Miroslav Grepl 3.12.1-118Miroslav Grepl 3.12.1-117Miroslav Grepl 3.12.1-116Miroslav Grepl 3.12.1-115Miroslav Grepl 3.12.1-114Miroslav Grepl 3.12.1-113Miroslav Grepl 3.12.1-112Miroslav Grepl 3.12.1-111Miroslav Grepl 3.12.1-110Miroslav Grepl 3.12.1-109Miroslav Grepl 3.12.1-108Miroslav Grepl 3.12.1-107Dan Walsh 3.12.1-106Miroslav Grepl 3.12.1-105Miroslav Grepl 3.12.1-104Miroslav Grepl 3.12.1-103Miroslav Grepl 3.12.1-102Miroslav Grepl 3.12.1-101Miroslav Grepl 3.12.1-100Miroslav Grepl 3.12.1-99Miroslav Grepl 3.12.1-98Miroslav Grepl 3.12.1-97Miroslav Grepl 3.12.1-96Miroslav Grepl 3.12.1-95Miroslav Grepl 3.12.1-94Miroslav Grepl 3.12.1-94Miroslav Grepl 3.12.1-93Miroslav Grepl 3.12.1-92Miroslav Grepl 3.12.1-91Miroslav Grepl 3.12.1-90Miroslav Grepl 3.12.1-89Miroslav Grepl 3.12.1-88Miroslav Grepl 3.12.1-87Miroslav Grepl 3.12.1-86Miroslav Grepl 3.12.1-85Miroslav Grepl 3.12.1-84Miroslav Grepl 3.12.1-83Miroslav Grepl 3.12.1-82Miroslav Grepl 3.12.1-81Miroslav Grepl 3.12.1-80Miroslav Grepl 3.12.1-79Miroslav Grepl 3.12.1-78Miroslav Grepl 3.12.1-77Miroslav Grepl 3.12.1-76Miroslav Grepl 3.12.1-75Miroslav Grepl 3.12.1-74Miroslav Grepl 3.12.1-73Miroslav Grepl 3.12.1-72Miroslav Grepl 3.12.1-71Miroslav Grepl 3.12.1-70Miroslav Grepl 3.12.1-69Miroslav Grepl 3.12.1-68Miroslav Grepl 3.12.1-67Miroslav Grepl 3.12.1-66Miroslav Grepl 3.12.1-65Miroslav Grepl 3.12.1-64Miroslav Grepl 3.12.1-63Miroslav Grepl 3.12.1-62Miroslav Grepl 3.12.1-61Miroslav Grepl 3.12.1-60Miroslav Grepl 3.12.1-59Miroslav Grepl 3.12.1-58Miroslav Grepl 3.12.1-57Miroslav Grepl 3.12.1-56Miroslav Grepl 3.12.1-55Miroslav Grepl 3.12.1-54Miroslav Grepl 3.12.1-53Miroslav Grepl 3.12.1-52Miroslav Grepl 3.12.1-51Miroslav Grepl 3.12.1-50Miroslav Grepl 3.12.1-49Miroslav Grepl 3.12.1-48Miroslav Grepl 3.12.1-47Miroslav Grepl 3.12.1-46Miroslav Grepl 3.12.1-45Miroslav Grepl 3.12.1-44Miroslav Grepl 3.12.1-43Miroslav Grepl 3.12.1-42Miroslav Grepl 3.12.1-41Miroslav Grepl 3.12.1-40Miroslav Grepl 3.12.1-39Miroslav Grepl 3.12.1-38Miroslav Grepl 3.12.1-37Miroslav Grepl 3.12.1-36Miroslav Grepl 3.12.1-35Miroslav Grepl 3.12.1-34Miroslav Grepl 3.12.1-33Miroslav Grepl 3.12.1-32Miroslav Grepl 3.12.1-31Miroslav Grepl 3.12.1-30Miroslav Grepl 3.12.1-29Dan Walsh 3.12.1-28Dan Walsh 3.12.1-27Miroslav Grepl 3.12.1-26Miroslav Grepl 3.12.1-25Miroslav Grepl 3.12.1-24Miroslav Grepl 3.12.1-23Miroslav Grepl 3.12.1-22Miroslav Grepl 3.12.1-21Miroslav Grepl 3.12.1-20Miroslav Grepl 3.12.1-19Miroslav Grepl 3.12.1-18Miroslav Grepl 3.12.1-17Miroslav Grepl 3.12.1-16Miroslav Grepl 3.12.1-15Miroslav Grepl 3.12.1-14Miroslav Grepl 3.12.1-13Miroslav Grepl 3.12.1-12Miroslav Grepl 3.12.1-11Miroslav Grepl 3.12.1-10Miroslav Grepl 3.12.1-9Miroslav Grepl 3.12.1-8Miroslav Grepl 3.12.1-7Miroslav Grepl 3.12.1-6Miroslav Grepl 3.12.1-5Miroslav Grepl 3.12.1-4Miroslav Grepl 3.12.1-3Miroslav Grepl 3.12.1-2Miroslav Grepl 3.12.1-1Dan Walsh 3.11.1-69.1Miroslav Grepl 3.11.1-69Miroslav Grepl 3.11.1-68Miroslav Grepl 3.11.1-67Miroslav Grepl 3.11.1-66Miroslav Grepl 3.11.1-65Miroslav Grepl 3.11.1-64Miroslav Grepl 3.11.1-63Miroslav Grepl 3.11.1-62Miroslav Grepl 3.11.1-61Miroslav Grepl 3.11.1-60Miroslav Grepl 3.11.1-59Miroslav Grepl 3.11.1-58Miroslav Grepl 3.11.1-57Miroslav Grepl 3.11.1-56Miroslav Grepl 3.11.1-55Miroslav Grepl 3.11.1-54Miroslav Grepl 3.11.1-53Miroslav Grepl 3.11.1-52Miroslav Grepl 3.11.1-51Miroslav Grepl 3.11.1-50Miroslav Grepl 3.11.1-49Miroslav Grepl 3.11.1-48Miroslav Grepl 3.11.1-47Miroslav Grepl 3.11.1-46Miroslav Grepl 3.11.1-45Miroslav Grepl 3.11.1-44Miroslav Grepl 3.11.1-43Miroslav Grepl 3.11.1-42Miroslav Grepl 3.11.1-41Miroslav Grepl 3.11.1-40Miroslav Grepl 3.11.1-39Miroslav Grepl 3.11.1-38Miroslav Grepl 3.11.1-37Miroslav Grepl 3.11.1-36Miroslav Grepl 3.11.1-35Miroslav Grepl 3.11.1-34Miroslav Grepl 3.11.1-33Miroslav Grepl 3.11.1-32Miroslav Grepl 3.11.1-31Miroslav Grepl 3.11.1-30Miroslav Grepl 3.11.1-29Miroslav Grepl 3.11.1-28Miroslav Grepl 3.11.1-27Miroslav Grepl 3.11.1-26Miroslav Grepl 3.11.1-25Miroslav Grepl 3.11.1-24Miroslav Grepl 3.11.1-23Miroslav Grepl 3.11.1-22Miroslav Grepl 3.11.1-21Miroslav Grepl 3.11.1-20Miroslav Grepl 3.11.1-19Miroslav Grepl 3.11.1-18Miroslav Grepl 3.11.1-17Miroslav Grepl 3.11.1-16Dan Walsh 3.11.1-15Miroslav Grepl 3.11.1-14Dan Walsh 3.11.1-13Miroslav Grepl 3.11.1-12Miroslav Grepl 3.11.1-11Miroslav Grepl 3.11.1-10Dan Walsh 3.11.1-9Dan Walsh 3.11.1-8Dan Walsh 3.11.1-7Dan Walsh 3.11.1-6Miroslav Grepl 3.11.1-5Miroslav Grepl 3.11.1-4Miroslav Grepl 3.11.1-3Miroslav Grepl 3.11.1-2Miroslav Grepl 3.11.1-1Miroslav Grepl 3.11.1-0Miroslav Grepl 3.11.0-15Miroslav Grepl 3.11.0-14Miroslav Grepl 3.11.0-13Miroslav Grepl 3.11.0-12Fedora Release Engineering - 3.11.0-11Miroslav Grepl 3.11.0-10Miroslav Grepl 3.11.0-9Miroslav Grepl 3.11.0-8Miroslav Grepl 3.11.0-7Miroslav Grepl 3.11.0-6Miroslav Grepl 3.11.0-5Miroslav Grepl 3.11.0-4Miroslav Grepl 3.11.0-3Miroslav Grepl 3.11.0-2Miroslav Grepl 3.11.0-1Miroslav Grepl 3.10.0-128Miroslav Grepl 3.10.0-127Miroslav Grepl 3.10.0-126Miroslav Grepl 3.10.0-125Miroslav Grepl 3.10.0-124Miroslav Grepl 3.10.0-123Miroslav Grepl 3.10.0-122Miroslav Grepl 3.10.0-121Miroslav Grepl 3.10.0-120Miroslav Grepl 3.10.0-119Miroslav Grepl 3.10.0-118Miroslav Grepl 3.10.0-117Miroslav Grepl 3.10.0-116Miroslav Grepl 3.10.0-115Miroslav Grepl 3.10.0-114Miroslav Grepl 3.10.0-113Miroslav Grepl 3.10.0-112Miroslav Grepl 3.10.0-111Miroslav Grepl 3.10.0-110Miroslav Grepl 3.10.0-109Miroslav Grepl 3.10.0-108Miroslav Grepl 3.10.0-107Miroslav Grepl 3.10.0-106Miroslav Grepl 3.10.0-105Miroslav Grepl 3.10.0-104Miroslav Grepl 3.10.0-103Miroslav Grepl 3.10.0-102Miroslav Grepl 3.10.0-101Miroslav Grepl 3.10.0-100Miroslav Grepl 3.10.0-99Miroslav Grepl 3.10.0-98Miroslav Grepl 3.10.0-97Miroslav Grepl 3.10.0-96Miroslav Grepl 3.10.0-95Miroslav Grepl 3.10.0-94Miroslav Grepl 3.10.0-93Miroslav Grepl 3.10.0-92Miroslav Grepl 3.10.0-91Miroslav Grepl 3.10.0-90Miroslav Grepl 3.10.0-89Miroslav Grepl 3.10.0-88Miroslav Grepl 3.10.0-87Miroslav Grepl 3.10.0-86Miroslav Grepl 3.10.0-85Miroslav Grepl 3.10.0-84Miroslav Grepl 3.10.0-83Miroslav Grepl 3.10.0-82Dan Walsh 3.10.0-81.2Miroslav Grepl 3.10.0-81Miroslav Grepl 3.10.0-80Miroslav Grepl 3.10.0-79Miroslav Grepl 3.10.0-78Miroslav Grepl 3.10.0-77Miroslav Grepl 3.10.0-76Miroslav Grepl 3.10.0-75Dan Walsh 3.10.0-74.2Miroslav Grepl 3.10.0-74Miroslav Grepl 3.10.0-73Miroslav Grepl 3.10.0-72Miroslav Grepl 3.10.0-71Miroslav Grepl 3.10.0-70Miroslav Grepl 3.10.0-69Miroslav Grepl 3.10.0-68Miroslav Grepl 3.10.0-67Miroslav Grepl 3.10.0-66Miroslav Grepl 3.10.0-65Miroslav Grepl 3.10.0-64Miroslav Grepl 3.10.0-63Miroslav Grepl 3.10.0-59Miroslav Grepl 3.10.0-58Dan Walsh 3.10.0-57Dan Walsh 3.10.0-56Dan Walsh 3.10.0-55.2Dan Walsh 3.10.0-55.1Miroslav Grepl 3.10.0-55Dan Walsh 3.10.0-54.1Miroslav Grepl 3.10.0-54Dan Walsh 3.10.0-53.1Miroslav Grepl 3.10.0-53Miroslav Grepl 3.10.0-52Miroslav Grepl 3.10.0-51Dan Walsh 3.10.0-50.2Dan Walsh 3.10.0-50.1Miroslav Grepl 3.10.0-50Miroslav Grepl 3.10.0-49Miroslav Grepl 3.10.0-48Miroslav Grepl 3.10.0-47Dan Walsh 3.10.0-46.1Miroslav Grepl 3.10.0-46Dan Walsh 3.10.0-45.1Miroslav Grepl 3.10.0-45Miroslav Grepl 3.10.0-43Miroslav Grepl 3.10.0-42Miroslav Grepl 3.10.0-41Dan Walsh 3.10.0-40.2Miroslav Grepl 3.10.0-40Dan Walsh 3.10.0-39.3Dan Walsh 3.10.0-39.2Dan Walsh 3.10.0-39.1Miroslav Grepl 3.10.0-39Dan Walsh 3.10.0-38.1Miroslav Grepl 3.10.0-38Miroslav Grepl 3.10.0-37Dan Walsh 3.10.0-36.1Miroslav Grepl 3.10.0-36Dan Walsh 3.10.0-35Dan Walsh 3.10.0-34.7Dan Walsh 3.10.0-34.6Dan Walsh 3.10.0-34.4Miroslav Grepl 3.10.0-34.3Dan Walsh 3.10.0-34.2Dan Walsh 3.10.0-34.1Miroslav Grepl 3.10.0-34Miroslav Grepl 3.10.0-33Dan Walsh 3.10.0-31.1Miroslav Grepl 3.10.0-31Miroslav Grepl 3.10.0-29Miroslav Grepl 3.10.0-28Miroslav Grepl 3.10.0-27Miroslav Grepl 3.10.0-26Miroslav Grepl 3.10.0-25Miroslav Grepl 3.10.0-24Miroslav Grepl 3.10.0-23Miroslav Grepl 3.10.0-22Miroslav Grepl 3.10.0-21Dan Walsh 3.10.0-20Miroslav Grepl 3.10.0-19Miroslav Grepl 3.10.0-18Miroslav Grepl 3.10.0-17Miroslav Grepl 3.10.0-16Miroslav Grepl 3.10.0-14Miroslav Grepl 3.10.0-13Miroslav Grepl 3.10.0-12Miroslav Grepl 3.10.0-11Miroslav Grepl 3.10.0-10Miroslav Grepl 3.10.0-9Miroslav Grepl 3.10.0-8Miroslav Grepl 3.10.0-7Miroslav Grepl 3.10.0-6Miroslav Grepl 3.10.0-5Miroslav Grepl 3.10.0-4Miroslav Grepl 3.10.0-3Miroslav Grepl 3.10.0-2Miroslav Grepl 3.10.0-1Miroslav Grepl 3.9.16-30Dan Walsh 3.9.16-29.1Miroslav Grepl 3.9.16-29Dan Walsh 3.9.16-28.1Miroslav Grepl 3.9.16-27Miroslav Grepl 3.9.16-26Miroslav Grepl 3.9.16-25Miroslav Grepl 3.9.16-24Miroslav Grepl 3.9.16-23Miroslav Grepl 3.9.16-22Miroslav Grepl 3.9.16-21Miroslav Grepl 3.9.16-20Miroslav Grepl 3.9.16-19Miroslav Grepl 3.9.16-18Miroslav Grepl 3.9.16-17Dan Walsh 3.9.16-16.1Miroslav Grepl 3.9.16-16Miroslav Grepl 3.9.16-15Miroslav Grepl 3.9.16-14Miroslav Grepl 3.9.16-13Miroslav Grepl 3.9.16-12Miroslav Grepl 3.9.16-11Miroslav Grepl 3.9.16-10Miroslav Grepl 3.9.16-7Miroslav Grepl 3.9.16-6Miroslav Grepl 3.9.16-5Miroslav Grepl 3.9.16-4Miroslav Grepl 3.9.16-3Miroslav Grepl 3.9.16-2Miroslav Grepl 3.9.16-1Miroslav Grepl 3.9.15-5Miroslav Grepl 3.9.15-2Miroslav Grepl 3.9.15-1Fedora Release Engineering - 3.9.14-2Dan Walsh 3.9.14-1Miroslav Grepl 3.9.13-10Miroslav Grepl 3.9.13-9Dan Walsh 3.9.13-8Miroslav Grepl 3.9.13-7Miroslav Grepl 3.9.13-6Miroslav Grepl 3.9.13-5Miroslav Grepl 3.9.13-4Miroslav Grepl 3.9.13-3Miroslav Grepl 3.9.13-2Miroslav Grepl 3.9.13-1Miroslav Grepl 3.9.12-8Miroslav Grepl 3.9.12-7Miroslav Grepl 3.9.12-6Miroslav Grepl 3.9.12-5Dan Walsh 3.9.12-4Dan Walsh 3.9.12-3Dan Walsh 3.9.12-2Miroslav Grepl 3.9.12-1Dan Walsh 3.9.11-2Miroslav Grepl 3.9.11-1Miroslav Grepl 3.9.10-13Dan Walsh 3.9.10-12Miroslav Grepl 3.9.10-11Miroslav Grepl 3.9.10-10Miroslav Grepl 3.9.10-9Miroslav Grepl 3.9.10-8Miroslav Grepl 3.9.10-7Miroslav Grepl 3.9.10-6Miroslav Grepl 3.9.10-5Dan Walsh 3.9.10-4Miroslav Grepl 3.9.10-3Miroslav Grepl 3.9.10-2Miroslav Grepl 3.9.10-1Miroslav Grepl 3.9.9-4Dan Walsh 3.9.9-3Miroslav Grepl 3.9.9-2Miroslav Grepl 3.9.9-1Miroslav Grepl 3.9.8-7Dan Walsh 3.9.8-6Miroslav Grepl 3.9.8-5Miroslav Grepl 3.9.8-4Dan Walsh 3.9.8-3Dan Walsh 3.9.8-2Dan Walsh 3.9.8-1Dan Walsh 3.9.7-10Dan Walsh 3.9.7-9Dan Walsh 3.9.7-8Dan Walsh 3.9.7-7Dan Walsh 3.9.7-6Dan Walsh 3.9.7-5Dan Walsh 3.9.7-4Dan Walsh 3.9.7-3Dan Walsh 3.9.7-2Dan Walsh 3.9.7-1Dan Walsh 3.9.6-3Dan Walsh 3.9.6-2Dan Walsh 3.9.6-1Dan Walsh 3.9.5-11Dan Walsh 3.9.5-10Dan Walsh 3.9.5-9Dan Walsh 3.9.5-8Dan Walsh 3.9.5-7Dan Walsh 3.9.5-6Dan Walsh 3.9.5-5Dan Walsh 3.9.5-4Dan Walsh 3.9.5-3Dan Walsh 3.9.5-2Dan Walsh 3.9.5-1Dan Walsh 3.9.4-3Dan Walsh 3.9.4-2Dan Walsh 3.9.4-1Dan Walsh 3.9.3-4Dan Walsh 3.9.3-3Dan Walsh 3.9.3-2Dan Walsh 3.9.3-1Dan Walsh 3.9.2-1Dan Walsh 3.9.1-3Dan Walsh 3.9.1-2Dan Walsh 3.9.1-1Dan Walsh 3.9.0-2Dan Walsh 3.9.0-1Dan Walsh 3.8.8-21Dan Walsh 3.8.8-20Dan Walsh 3.8.8-19Dan Walsh 3.8.8-18Dan Walsh 3.8.8-17Dan Walsh 3.8.8-16Dan Walsh 3.8.8-15Dan Walsh 3.8.8-14Dan Walsh 3.8.8-13Dan Walsh 3.8.8-12Dan Walsh 3.8.8-11Dan Walsh 3.8.8-10Dan Walsh 3.8.8-9Dan Walsh 3.8.8-8Dan Walsh 3.8.8-7Dan Walsh 3.8.8-6Dan Walsh 3.8.8-5Dan Walsh 3.8.8-4Dan Walsh 3.8.8-3Dan Walsh 3.8.8-2Dan Walsh 3.8.8-1Dan Walsh 3.8.7-3Dan Walsh 3.8.7-2Dan Walsh 3.8.7-1Dan Walsh 3.8.6-3Miroslav Grepl 3.8.6-2Dan Walsh 3.8.6-1Dan Walsh 3.8.5-1Dan Walsh 3.8.4-1Dan Walsh 3.8.3-4Dan Walsh 3.8.3-3Dan Walsh 3.8.3-2Dan Walsh 3.8.3-1Dan Walsh 3.8.2-1Dan Walsh 3.8.1-5Dan Walsh 3.8.1-4Dan Walsh 3.8.1-3Dan Walsh 3.8.1-2Dan Walsh 3.8.1-1Dan Walsh 3.7.19-22Dan Walsh 3.7.19-21Dan Walsh 3.7.19-20Dan Walsh 3.7.19-19Dan Walsh 3.7.19-17Dan Walsh 3.7.19-16Dan Walsh 3.7.19-15Dan Walsh 3.7.19-14Dan Walsh 3.7.19-13Dan Walsh 3.7.19-12Dan Walsh 3.7.19-11Dan Walsh 3.7.19-10Dan Walsh 3.7.19-9Dan Walsh 3.7.19-8Dan Walsh 3.7.19-7Dan Walsh 3.7.19-6Dan Walsh 3.7.19-5Dan Walsh 3.7.19-4Dan Walsh 3.7.19-3Dan Walsh 3.7.19-2Dan Walsh 3.7.19-1Dan Walsh 3.7.18-3Dan Walsh 3.7.18-2Dan Walsh 3.7.18-1Dan Walsh 3.7.17-6Dan Walsh 3.7.17-5Dan Walsh 3.7.17-4Dan Walsh 3.7.17-3Dan Walsh 3.7.17-2Dan Walsh 3.7.17-1Dan Walsh 3.7.16-2Dan Walsh 3.7.16-1Dan Walsh 3.7.15-4Dan Walsh 3.7.15-3Dan Walsh 3.7.15-2Dan Walsh 3.7.15-1Dan Walsh 3.7.14-5Dan Walsh 3.7.14-4Dan Walsh 3.7.14-3Dan Walsh 3.7.14-2Dan Walsh 3.7.14-1Dan Walsh 3.7.13-4Dan Walsh 3.7.13-3Dan Walsh 3.7.13-2Dan Walsh 3.7.13-1Dan Walsh 3.7.12-1Dan Walsh 3.7.11-1Dan Walsh 3.7.10-5Dan Walsh 3.7.10-4Dan Walsh 3.7.10-3Dan Walsh 3.7.10-2Dan Walsh 3.7.10-1Dan Walsh 3.7.9-4Dan Walsh 3.7.9-3Dan Walsh 3.7.9-2Dan Walsh 3.7.9-1Dan Walsh 3.7.8-11Dan Walsh 3.7.8-9Dan Walsh 3.7.8-8Dan Walsh 3.7.8-7Dan Walsh 3.7.8-6Dan Walsh 3.7.8-5Dan Walsh 3.7.8-4Dan Walsh 3.7.8-3Dan Walsh 3.7.8-2Dan Walsh 3.7.8-1Dan Walsh 3.7.7-3Dan Walsh 3.7.7-2Dan Walsh 3.7.7-1Dan Walsh 3.7.6-1Dan Walsh 3.7.5-8Dan Walsh 3.7.5-7Dan Walsh 3.7.5-6Dan Walsh 3.7.5-5Dan Walsh 3.7.5-4Dan Walsh 3.7.5-3Dan Walsh 3.7.5-2Dan Walsh 3.7.5-1Dan Walsh 3.7.4-4Dan Walsh 3.7.4-3Dan Walsh 3.7.4-2Dan Walsh 3.7.4-1Dan Walsh 3.7.3-1Dan Walsh 3.7.1-1Dan Walsh 3.6.33-2Dan Walsh 3.6.33-1Dan Walsh 3.6.32-17Dan Walsh 3.6.32-16Dan Walsh 3.6.32-15Dan Walsh 3.6.32-13Dan Walsh 3.6.32-12Dan Walsh 3.6.32-11Dan Walsh 3.6.32-10Dan Walsh 3.6.32-9Dan Walsh 3.6.32-8Dan Walsh 3.6.32-7Dan Walsh 3.6.32-6Dan Walsh 3.6.32-5Dan Walsh 3.6.32-4Dan Walsh 3.6.32-3Dan Walsh 3.6.32-2Dan Walsh 3.6.32-1Dan Walsh 3.6.31-5Dan Walsh 3.6.31-4Dan Walsh 3.6.31-3Dan Walsh 3.6.31-2Dan Walsh 3.6.30-6Dan Walsh 3.6.30-5Dan Walsh 3.6.30-4Dan Walsh 3.6.30-3Dan Walsh 3.6.30-2Dan Walsh 3.6.30-1Dan Walsh 3.6.29-2Dan Walsh 3.6.29-1Dan Walsh 3.6.28-9Dan Walsh 3.6.28-8Dan Walsh 3.6.28-7Dan Walsh 3.6.28-6Dan Walsh 3.6.28-5Dan Walsh 3.6.28-4Dan Walsh 3.6.28-3Dan Walsh 3.6.28-2Dan Walsh 3.6.28-1Dan Walsh 3.6.27-1Dan Walsh 3.6.26-11Dan Walsh 3.6.26-10Dan Walsh 3.6.26-9Bill Nottingham 3.6.26-8Dan Walsh 3.6.26-7Dan Walsh 3.6.26-6Dan Walsh 3.6.26-5Dan Walsh 3.6.26-4Dan Walsh 3.6.26-3Dan Walsh 3.6.26-2Dan Walsh 3.6.26-1Dan Walsh 3.6.25-1Dan Walsh 3.6.24-1Dan Walsh 3.6.23-2Dan Walsh 3.6.23-1Dan Walsh 3.6.22-3Dan Walsh 3.6.22-1Dan Walsh 3.6.21-4Dan Walsh 3.6.21-3Tom "spot" Callaway 3.6.21-2Dan Walsh 3.6.21-1Dan Walsh 3.6.20-2Dan Walsh 3.6.20-1Dan Walsh 3.6.19-5Dan Walsh 3.6.19-4Dan Walsh 3.6.19-3Dan Walsh 3.6.19-2Dan Walsh 3.6.19-1Dan Walsh 3.6.18-1Dan Walsh 3.6.17-1Dan Walsh 3.6.16-4Dan Walsh 3.6.16-3Dan Walsh 3.6.16-2Dan Walsh 3.6.16-1Dan Walsh 3.6.14-3Dan Walsh 3.6.14-2Dan Walsh 3.6.14-1Dan Walsh 3.6.13-3Dan Walsh 3.6.13-2Dan Walsh 3.6.13-1Dan Walsh 3.6.12-39Dan Walsh 3.6.12-38Dan Walsh 3.6.12-37Dan Walsh 3.6.12-36Dan Walsh 3.6.12-35Dan Walsh 3.6.12-34Dan Walsh 3.6.12-33Dan Walsh 3.6.12-31Dan Walsh 3.6.12-30Dan Walsh 3.6.12-29Dan Walsh 3.6.12-28Dan Walsh 3.6.12-27Dan Walsh 3.6.12-26Dan Walsh 3.6.12-25Dan Walsh 3.6.12-24Dan Walsh 3.6.12-23Dan Walsh 3.6.12-22Dan Walsh 3.6.12-21Dan Walsh 3.6.12-20Dan Walsh 3.6.12-19Dan Walsh 3.6.12-16Dan Walsh 3.6.12-15Dan Walsh 3.6.12-14Dan Walsh 3.6.12-13Dan Walsh 3.6.12-12Dan Walsh 3.6.12-11Dan Walsh 3.6.12-10Dan Walsh 3.6.12-9Dan Walsh 3.6.12-8Dan Walsh 3.6.12-7Dan Walsh 3.6.12-6Dan Walsh 3.6.12-5Dan Walsh 3.6.12-4Dan Walsh 3.6.12-3Dan Walsh 3.6.12-2Dan Walsh 3.6.12-1Dan Walsh 3.6.11-1Dan Walsh 3.6.10-9Dan Walsh 3.6.10-8Dan Walsh 3.6.10-7Dan Walsh 3.6.10-6Dan Walsh 3.6.10-5Dan Walsh 3.6.10-4Dan Walsh 3.6.10-3Dan Walsh 3.6.10-2Dan Walsh 3.6.10-1Dan Walsh 3.6.9-4Dan Walsh 3.6.9-3Dan Walsh 3.6.9-2Dan Walsh 3.6.9-1Dan Walsh 3.6.8-4Dan Walsh 3.6.8-3Dan Walsh 3.6.8-2Dan Walsh 3.6.8-1Dan Walsh 3.6.7-2Dan Walsh 3.6.7-1Dan Walsh 3.6.6-9Dan Walsh 3.6.6-8Fedora Release Engineering - 3.6.6-7Dan Walsh 3.6.6-6Dan Walsh 3.6.6-5Dan Walsh 3.6.6-4Dan Walsh 3.6.6-3Dan Walsh 3.6.6-2Dan Walsh 3.6.6-1Dan Walsh 3.6.5-3Dan Walsh 3.6.5-1Dan Walsh 3.6.4-6Dan Walsh 3.6.4-5Dan Walsh 3.6.4-4Dan Walsh 3.6.4-3Dan Walsh 3.6.4-2Dan Walsh 3.6.4-1Dan Walsh 3.6.3-13Dan Walsh 3.6.3-12Dan Walsh 3.6.3-11Dan Walsh 3.6.3-10Dan Walsh 3.6.3-9Dan Walsh 3.6.3-8Dan Walsh 3.6.3-7Dan Walsh 3.6.3-6Dan Walsh 3.6.3-3Dan Walsh 3.6.3-2Dan Walsh 3.6.3-1Dan Walsh 3.6.2-5Dan Walsh 3.6.2-4Dan Walsh 3.6.2-3Dan Walsh 3.6.2-2Dan Walsh 3.6.2-1Dan Walsh 3.6.1-15Dan Walsh 3.6.1-14Dan Walsh 3.6.1-13Dan Walsh 3.6.1-12Dan Walsh 3.6.1-11Dan Walsh 3.6.1-10Dan Walsh 3.6.1-9Dan Walsh 3.6.1-8Dan Walsh 3.6.1-7Dan Walsh 3.6.1-4Ignacio Vazquez-Abrams - 3.6.1-2Dan Walsh 3.5.13-19Dan Walsh 3.5.13-18Dan Walsh 3.5.13-17Dan Walsh 3.5.13-16Dan Walsh 3.5.13-15Dan Walsh 3.5.13-14Dan Walsh 3.5.13-13Dan Walsh 3.5.13-12Dan Walsh 3.5.13-11Dan Walsh 3.5.13-9Dan Walsh 3.5.13-8Dan Walsh 3.5.13-7Dan Walsh 3.5.13-6Dan Walsh 3.5.13-5Dan Walsh 3.5.13-4Dan Walsh 3.5.13-3Dan Walsh 3.5.13-2Dan Walsh 3.5.13-1Dan Walsh 3.5.12-3Dan Walsh 3.5.12-2Dan Walsh 3.5.12-1Dan Walsh 3.5.11-1Dan Walsh 3.5.10-3Dan Walsh 3.5.10-2Dan Walsh 3.5.10-1Dan Walsh 3.5.9-4Dan Walsh 3.5.9-3Dan Walsh 3.5.9-2Dan Walsh 3.5.9-1Dan Walsh 3.5.8-7Dan Walsh 3.5.8-6Dan Walsh 3.5.8-5Dan Walsh 3.5.8-4Dan Walsh 3.5.8-3Dan Walsh 3.5.8-1Dan Walsh 3.5.7-2Dan Walsh 3.5.7-1Dan Walsh 3.5.6-2Dan Walsh 3.5.6-1Dan Walsh 3.5.5-4Dan Walsh 3.5.5-3Dan Walsh 3.5.5-2Dan Walsh 3.5.4-2Dan Walsh 3.5.4-1Dan Walsh 3.5.3-1Dan Walsh 3.5.2-2Dan Walsh 3.5.1-5Dan Walsh 3.5.1-4Dan Walsh 3.5.1-3Dan Walsh 3.5.1-2Dan Walsh 3.5.1-1Dan Walsh 3.5.0-1Dan Walsh 3.4.2-14Dan Walsh 3.4.2-13Dan Walsh 3.4.2-12Dan Walsh 3.4.2-11Dan Walsh 3.4.2-10Dan Walsh 3.4.2-9Dan Walsh 3.4.2-8Dan Walsh 3.4.2-7Dan Walsh 3.4.2-6Dan Walsh 3.4.2-5Dan Walsh 3.4.2-4Dan Walsh 3.4.2-3Dan Walsh 3.4.2-2Dan Walsh 3.4.2-1Dan Walsh 3.4.1-5Dan Walsh 3.4.1-3Dan Walsh 3.4.1-2Dan Walsh 3.4.1-1Dan Walsh 3.3.1-48Dan Walsh 3.3.1-47Dan Walsh 3.3.1-46Dan Walsh 3.3.1-45Dan Walsh 3.3.1-44Dan Walsh 3.3.1-43Dan Walsh 3.3.1-42Dan Walsh 3.3.1-41Dan Walsh 3.3.1-39Dan Walsh 3.3.1-37Dan Walsh 3.3.1-36Dan Walsh 3.3.1-33Dan Walsh 3.3.1-32Dan Walsh 3.3.1-31Dan Walsh 3.3.1-30Dan Walsh 3.3.1-29Dan Walsh 3.3.1-28Dan Walsh 3.3.1-27Dan Walsh 3.3.1-26Dan Walsh 3.3.1-25Dan Walsh 3.3.1-24Dan Walsh 3.3.1-23Dan Walsh 3.3.1-22Dan Walsh 3.3.1-21Dan Walsh 3.3.1-20Dan Walsh 3.3.1-19Dan Walsh 3.3.1-18Dan Walsh 3.3.1-17Dan Walsh 3.3.1-16Dan Walsh 3.3.1-15Bill Nottingham 3.3.1-14Dan Walsh 3.3.1-13Dan Walsh 3.3.1-12Dan Walsh 3.3.1-11Dan Walsh 3.3.1-10Dan Walsh 3.3.1-9Dan Walsh 3.3.1-8Dan Walsh 3.3.1-6Dan Walsh 3.3.1-5Dan Walsh 3.3.1-4Dan Walsh 3.3.1-2Dan Walsh 3.3.1-1Dan Walsh 3.3.0-2Dan Walsh 3.3.0-1Dan Walsh 3.2.9-2Dan Walsh 3.2.9-1Dan Walsh 3.2.8-2Dan Walsh 3.2.8-1Dan Walsh 3.2.7-6Dan Walsh 3.2.7-5Dan Walsh 3.2.7-3Dan Walsh 3.2.7-2Dan Walsh 3.2.7-1Dan Walsh 3.2.6-7Dan Walsh 3.2.6-6Dan Walsh 3.2.6-5Dan Walsh 3.2.6-4Dan Walsh 3.2.6-3Dan Walsh 3.2.6-2Dan Walsh 3.2.6-1Dan Walsh 3.2.5-25Dan Walsh 3.2.5-24Dan Walsh 3.2.5-22Dan Walsh 3.2.5-21Dan Walsh 3.2.5-20Dan Walsh 3.2.5-19Dan Walsh 3.2.5-18Dan Walsh 3.2.5-17Dan Walsh 3.2.5-16Dan Walsh 3.2.5-15Dan Walsh 3.2.5-14Dan Walsh 3.2.5-13Dan Walsh 3.2.5-12Dan Walsh 3.2.5-11Dan Walsh 3.2.5-10Dan Walsh 3.2.5-9Dan Walsh 3.2.5-8Dan Walsh 3.2.5-7Dan Walsh 3.2.5-6Dan Walsh 3.2.5-5Dan Walsh 3.2.5-4Dan Walsh 3.2.5-3Dan Walsh 3.2.5-2Dan Walsh 3.2.5-1Dan Walsh 3.2.4-5Dan Walsh 3.2.4-4Dan Walsh 3.2.4-3Dan Walsh 3.2.4-1Dan Walsh 3.2.4-1Dan Walsh 3.2.3-2Dan Walsh 3.2.3-1Dan Walsh 3.2.2-1Dan Walsh 3.2.1-3Dan Walsh 3.2.1-1Dan Walsh 3.1.2-2Dan Walsh 3.1.2-1Dan Walsh 3.1.1-1Dan Walsh 3.1.0-1Dan Walsh 3.0.8-30Dan Walsh 3.0.8-28Dan Walsh 3.0.8-27Dan Walsh 3.0.8-26Dan Walsh 3.0.8-25Dan Walsh 3.0.8-24Dan Walsh 3.0.8-23Dan Walsh 3.0.8-22Dan Walsh 3.0.8-21Dan Walsh 3.0.8-20Dan Walsh 3.0.8-19Dan Walsh 3.0.8-18Dan Walsh 3.0.8-17Dan Walsh 3.0.8-16Dan Walsh 3.0.8-15Dan Walsh 3.0.8-14Dan Walsh 3.0.8-13Dan Walsh 3.0.8-12Dan Walsh 3.0.8-11Dan Walsh 3.0.8-10Dan Walsh 3.0.8-9Dan Walsh 3.0.8-8Dan Walsh 3.0.8-7Dan Walsh 3.0.8-5Dan Walsh 3.0.8-4Dan Walsh 3.0.8-3Dan Walsh 3.0.8-2Dan Walsh 3.0.8-1Dan Walsh 3.0.7-10Dan Walsh 3.0.7-9Dan Walsh 3.0.7-8Dan Walsh 3.0.7-7Dan Walsh 3.0.7-6Dan Walsh 3.0.7-5Dan Walsh 3.0.7-4Dan Walsh 3.0.7-3Dan Walsh 3.0.7-2Dan Walsh 3.0.7-1Dan Walsh 3.0.6-3Dan Walsh 3.0.6-2Dan Walsh 3.0.6-1Dan Walsh 3.0.5-11Dan Walsh 3.0.5-10Dan Walsh 3.0.5-9Dan Walsh 3.0.5-8Dan Walsh 3.0.5-7Dan Walsh 3.0.5-6Dan Walsh 3.0.5-5Dan Walsh 3.0.5-4Dan Walsh 3.0.5-3Dan Walsh 3.0.5-2Dan Walsh 3.0.5-1Dan Walsh 3.0.4-6Dan Walsh 3.0.4-5Dan Walsh 3.0.4-4Dan Walsh 3.0.4-3Dan Walsh 3.0.4-2Dan Walsh 3.0.4-1Dan Walsh 3.0.3-6Dan Walsh 3.0.3-5Dan Walsh 3.0.3-4Dan Walsh 3.0.3-3Dan Walsh 3.0.3-2Dan Walsh 3.0.3-1Dan Walsh 3.0.2-9Dan Walsh 3.0.2-8Dan Walsh 3.0.2-7Dan Walsh 3.0.2-5Dan Walsh 3.0.2-4Dan Walsh 3.0.2-3Dan Walsh 3.0.2-2Dan Walsh 3.0.1-5Dan Walsh 3.0.1-4Dan Walsh 3.0.1-3Dan Walsh 3.0.1-2Dan Walsh 3.0.1-1Dan Walsh 2.6.5-3Dan Walsh 2.6.5-2Dan Walsh 2.6.4-7Dan Walsh 2.6.4-6Dan Walsh 2.6.4-5Dan Walsh 2.6.4-2Dan Walsh 2.6.4-1Dan Walsh 2.6.3-1Dan Walsh 2.6.2-1Dan Walsh 2.6.1-4Dan Walsh 2.6.1-2Dan Walsh 2.6.1-1Dan Walsh 2.5.12-12Dan Walsh 2.5.12-11Dan Walsh 2.5.12-10Dan Walsh 2.5.12-8Dan Walsh 2.5.12-5Dan Walsh 2.5.12-4Dan Walsh 2.5.12-3Dan Walsh 2.5.12-2Dan Walsh 2.5.12-1Dan Walsh 2.5.11-8Dan Walsh 2.5.11-7Dan Walsh 2.5.11-6Dan Walsh 2.5.11-5Dan Walsh 2.5.11-4Dan Walsh 2.5.11-3Dan Walsh 2.5.11-2Dan Walsh 2.5.11-1Dan Walsh 2.5.10-2Dan Walsh 2.5.10-1Dan Walsh 2.5.9-6Dan Walsh 2.5.9-5Dan Walsh 2.5.9-4Dan Walsh 2.5.9-3Dan Walsh 2.5.9-2Dan Walsh 2.5.8-8Dan Walsh 2.5.8-7Dan Walsh 2.5.8-6Dan Walsh 2.5.8-5Dan Walsh 2.5.8-4Dan Walsh 2.5.8-3Dan Walsh 2.5.8-2Dan Walsh 2.5.8-1Dan Walsh 2.5.7-1Dan Walsh 2.5.6-1Dan Walsh 2.5.5-2Dan Walsh 2.5.5-1Dan Walsh 2.5.4-2Dan Walsh 2.5.4-1Dan Walsh 2.5.3-3Dan Walsh 2.5.3-2Dan Walsh 2.5.3-1Dan Walsh 2.5.2-6Dan Walsh 2.5.2-5Dan Walsh 2.5.2-4Dan Walsh 2.5.2-3Dan Walsh 2.5.2-2Dan Walsh 2.5.2-1Dan Walsh 2.5.1-5Dan Walsh 2.5.1-4Dan Walsh 2.5.1-2Dan Walsh 2.5.1-1Dan Walsh 2.4.6-20Dan Walsh 2.4.6-19Dan Walsh 2.4.6-18Dan Walsh 2.4.6-17Dan Walsh 2.4.6-16Dan Walsh 2.4.6-15Dan Walsh 2.4.6-14Dan Walsh 2.4.6-13Dan Walsh 2.4.6-12Dan Walsh 2.4.6-11Dan Walsh 2.4.6-10Dan Walsh 2.4.6-9Dan Walsh 2.4.6-8Dan Walsh 2.4.6-7Dan Walsh 2.4.6-6Dan Walsh 2.4.6-5Dan Walsh 2.4.6-4Dan Walsh 2.4.6-3Dan Walsh 2.4.6-1Dan Walsh 2.4.5-4Dan Walsh 2.4.5-3Dan Walsh 2.4.5-2Dan Walsh 2.4.5-1Dan Walsh 2.4.4-2Dan Walsh 2.4.4-2Dan Walsh 2.4.4-1Dan Walsh 2.4.3-13Dan Walsh 2.4.3-12Dan Walsh 2.4.3-11Dan Walsh 2.4.3-10Dan Walsh 2.4.3-9Dan Walsh 2.4.3-8Dan Walsh 2.4.3-7Dan Walsh 2.4.3-6Dan Walsh 2.4.3-5Dan Walsh 2.4.3-4Dan Walsh 2.4.3-3Dan Walsh 2.4.3-2Dan Walsh 2.4.3-1Dan Walsh 2.4.2-8Dan Walsh 2.4.2-7James Antill 2.4.2-6Dan Walsh 2.4.2-5Dan Walsh 2.4.2-4Dan Walsh 2.4.2-3Dan Walsh 2.4.2-2Dan Walsh 2.4.2-1Dan Walsh 2.4.1-5Dan Walsh 2.4.1-4Dan Walsh 2.4.1-3Dan Walsh 2.4.1-2Dan Walsh 2.4-4Dan Walsh 2.4-3Dan Walsh 2.4-2Dan Walsh 2.4-1Dan Walsh 2.3.19-4Dan Walsh 2.3.19-3Dan Walsh 2.3.19-2Dan Walsh 2.3.19-1James Antill 2.3.18-10James Antill 2.3.18-9Dan Walsh 2.3.18-8Dan Walsh 2.3.18-7Dan Walsh 2.3.18-6Dan Walsh 2.3.18-5Dan Walsh 2.3.18-4Dan Walsh 2.3.18-3Dan Walsh 2.3.18-2Dan Walsh 2.3.18-1Dan Walsh 2.3.17-2Dan Walsh 2.3.17-1Dan Walsh 2.3.16-9Dan Walsh 2.3.16-8Dan Walsh 2.3.16-7Dan Walsh 2.3.16-6Dan Walsh 2.3.16-5Dan Walsh 2.3.16-4Dan Walsh 2.3.16-2Dan Walsh 2.3.16-1Dan Walsh 2.3.15-2Dan Walsh 2.3.15-1Dan Walsh 2.3.14-8Dan Walsh 2.3.14-7Dan Walsh 2.3.14-6Dan Walsh 2.3.14-4Dan Walsh 2.3.14-3Dan Walsh 2.3.14-2Dan Walsh 2.3.14-1Dan Walsh 2.3.13-6Dan Walsh 2.3.13-5Dan Walsh 2.3.13-4Dan Walsh 2.3.13-3Dan Walsh 2.3.13-2Dan Walsh 2.3.13-1Dan Walsh 2.3.12-2Dan Walsh 2.3.12-1Dan Walsh 2.3.11-1Dan Walsh 2.3.10-7Dan Walsh 2.3.10-6Dan Walsh 2.3.10-3Dan Walsh 2.3.10-1Dan Walsh 2.3.9-6Dan Walsh 2.3.9-5Dan Walsh 2.3.9-4Dan Walsh 2.3.9-3Dan Walsh 2.3.9-2Dan Walsh 2.3.9-1Dan Walsh 2.3.8-2Dan Walsh 2.3.7-1Dan Walsh 2.3.6-4Dan Walsh 2.3.6-3Dan Walsh 2.3.6-2Dan Walsh 2.3.6-1Dan Walsh 2.3.5-1Dan Walsh 2.3.4-1Dan Walsh 2.3.3-20Dan Walsh 2.3.3-19Dan Walsh 2.3.3-18Dan Walsh 2.3.3-17Dan Walsh 2.3.3-16Dan Walsh 2.3.3-15Dan Walsh 2.3.3-14Dan Walsh 2.3.3-13Dan Walsh 2.3.3-12Dan Walsh 2.3.3-11Dan Walsh 2.3.3-10Dan Walsh 2.3.3-9Dan Walsh 2.3.3-8Dan Walsh 2.3.3-7Dan Walsh 2.3.3-6Dan Walsh 2.3.3-5Dan Walsh 2.3.3-4Dan Walsh 2.3.3-3Dan Walsh 2.3.3-2Dan Walsh 2.3.3-1Dan Walsh 2.3.2-4Dan Walsh 2.3.2-3Dan Walsh 2.3.2-2Dan Walsh 2.3.2-1Dan Walsh 2.3.1-1Dan Walsh 2.2.49-1Dan Walsh 2.2.48-1Dan Walsh 2.2.47-5Dan Walsh 2.2.47-4Dan Walsh 2.2.47-3Dan Walsh 2.2.47-1Dan Walsh 2.2.46-2Dan Walsh 2.2.46-1Dan Walsh 2.2.45-3Dan Walsh 2.2.45-2Dan Walsh 2.2.45-1Dan Walsh 2.2.44-1Dan Walsh 2.2.43-4Dan Walsh 2.2.43-3Dan Walsh 2.2.43-2Dan Walsh 2.2.43-1Dan Walsh 2.2.42-4Dan Walsh 2.2.42-3Dan Walsh 2.2.42-2Dan Walsh 2.2.42-1Dan Walsh 2.2.41-1Dan Walsh 2.2.40-2Dan Walsh 2.2.40-1Dan Walsh 2.2.39-2Dan Walsh 2.2.39-1Dan Walsh 2.2.38-6Dan Walsh 2.2.38-5Dan Walsh 2.2.38-4Dan Walsh 2.2.38-3Dan Walsh 2.2.38-2Dan Walsh 2.2.38-1Dan Walsh 2.2.37-1Dan Walsh 2.2.36-2Dan Walsh 2.2.36-1James Antill 2.2.35-2Dan Walsh 2.2.35-1Dan Walsh 2.2.34-3Dan Walsh 2.2.34-2Dan Walsh 2.2.34-1Dan Walsh 2.2.33-1Dan Walsh 2.2.32-2Dan Walsh 2.2.32-1Dan Walsh 2.2.31-1Dan Walsh 2.2.30-2Dan Walsh 2.2.30-1Dan Walsh 2.2.29-6Russell Coker 2.2.29-5Dan Walsh 2.2.29-4Dan Walsh 2.2.29-3Dan Walsh 2.2.29-2Dan Walsh 2.2.29-1Dan Walsh 2.2.28-3Dan Walsh 2.2.28-2Dan Walsh 2.2.28-1Dan Walsh 2.2.27-1Dan Walsh 2.2.25-3Dan Walsh 2.2.25-2Dan Walsh 2.2.24-1Dan Walsh 2.2.23-19Dan Walsh 2.2.23-18Dan Walsh 2.2.23-17Karsten Hopp 2.2.23-16Dan Walsh 2.2.23-15Dan Walsh 2.2.23-14Dan Walsh 2.2.23-13Dan Walsh 2.2.23-12Jeremy Katz - 2.2.23-11Jeremy Katz - 2.2.23-10Dan Walsh 2.2.23-9Dan Walsh 2.2.23-8Dan Walsh 2.2.23-7Dan Walsh 2.2.23-5Dan Walsh 2.2.23-4Dan Walsh 2.2.23-3Dan Walsh 2.2.23-2Dan Walsh 2.2.23-1Dan Walsh 2.2.22-2Dan Walsh 2.2.22-1Dan Walsh 2.2.21-9Dan Walsh 2.2.21-8Dan Walsh 2.2.21-7Dan Walsh 2.2.21-6Dan Walsh 2.2.21-5Dan Walsh 2.2.21-4Dan Walsh 2.2.21-3Dan Walsh 2.2.21-2Dan Walsh 2.2.21-1Dan Walsh 2.2.20-1Dan Walsh 2.2.19-2Dan Walsh 2.2.19-1Dan Walsh 2.2.18-2Dan Walsh 2.2.18-1Dan Walsh 2.2.17-2Dan Walsh 2.2.16-1Dan Walsh 2.2.15-4Dan Walsh 2.2.15-3Dan Walsh 2.2.15-1Dan Walsh 2.2.14-2Dan Walsh 2.2.14-1Dan Walsh 2.2.13-1Dan Walsh 2.2.12-1Dan Walsh 2.2.11-2Dan Walsh 2.2.11-1Dan Walsh 2.2.10-1Dan Walsh 2.2.9-2Dan Walsh 2.2.9-1Dan Walsh 2.2.8-2Dan Walsh 2.2.7-1Dan Walsh 2.2.6-3Dan Walsh 2.2.6-2Dan Walsh 2.2.6-1Dan Walsh 2.2.5-1Dan Walsh 2.2.4-1Dan Walsh 2.2.3-1Dan Walsh 2.2.2-1Dan Walsh 2.2.1-1Dan Walsh 2.1.13-1Dan Walsh 2.1.12-3Dan Walsh 2.1.11-1Dan Walsh 2.1.10-1Jeremy Katz - 2.1.9-2Dan Walsh 2.1.9-1Dan Walsh 2.1.8-3Dan Walsh 2.1.8-2Dan Walsh 2.1.8-1Dan Walsh 2.1.7-4Dan Walsh 2.1.7-3Dan Walsh 2.1.7-2Dan Walsh 2.1.7-1Dan Walsh 2.1.6-24Dan Walsh 2.1.6-23Dan Walsh 2.1.6-22Dan Walsh 2.1.6-21Dan Walsh 2.1.6-20Dan Walsh 2.1.6-18Dan Walsh 2.1.6-17Dan Walsh 2.1.6-16Dan Walsh 2.1.6-15Dan Walsh 2.1.6-14Dan Walsh 2.1.6-13Dan Walsh 2.1.6-11Dan Walsh 2.1.6-10Dan Walsh 2.1.6-9Dan Walsh 2.1.6-8Dan Walsh 2.1.6-5Dan Walsh 2.1.6-4Dan Walsh 2.1.6-3Dan Walsh 2.1.6-2Dan Walsh 2.1.6-1Dan Walsh 2.1.4-2Dan Walsh 2.1.4-1Dan Walsh 2.1.3-1Jeremy Katz - 2.1.2-3Dan Walsh 2.1.2-2Dan Walsh 2.1.2-1Dan Walsh 2.1.1-3Dan Walsh 2.1.1-2Dan Walsh 2.1.1-1Dan Walsh 2.1.0-3Dan Walsh 2.1.0-2.Dan Walsh 2.1.0-1.Dan Walsh 2.0.11-2.Dan Walsh 2.0.11-1.Dan Walsh 2.0.9-1.Dan Walsh 2.0.8-1.Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.6-2Dan Walsh 2.0.5-4Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1- Allow certmonger add new entries in a generic certificates directory Resolves: rhbz#1879496 - Allow slapd add new entries in ldap certificates directory Resolves: rhbz#1879496 - Add miscfiles_add_entry_generic_cert_dirs() interface Resolves: rhbz#1879496- Allow ssh-keygen create file in /var/lib/glusterd Resolves: rhbz#1867995- Allow rhsmd read process state of all domains and kernel threads Resolves: rhbz#1837461 - Allow ipa-adtrust-install restart sssd and dirsrv services Resolves: rhbz#1820298 - Allow nagios_plugin_domain execute programs in bin directories Resolves: rhbz#1824625 - selinux policy: add the right context for org.freeipa.server.trust-enable-agent Related: rhbz#1820298- Allow chronyd_t domain to exec shell Resolves: rhbz#1775573 - Allow pmie daemon to send signal pcmd daemon Resolves: rhbz#1770123 - Allow auditd poweroff or switch to single mode Resolves: rhbz#1780332- Dontaudit tmpreaper_t getting attributes from sysctl_type files Resolves: rhbz#1765063- Allow tmpreaper_t domain to getattr files labeled as mtrr_device_t Resolves: rhbz#1765063- Allow tmpwatch process labeled as tmpreaper_t domain to execute fuser command Resolves: rhbz#1765063- Update tmpreaper_t policy due to fuser command Resolves: rhbz#1765063- Allow tmpreaper_t domain to read all domains state Resolves: rhbz#1765063- Update sudo_role_template() to allow caller domain to read syslog pid files Resolves: rhbz#1651253- Allow sbd_t domain to check presence of processes labeled as cluster_t Resolves: rhbz#1753623- Allow ganesha_t domain to read system network state and connect to cyphesis_port_t Resolves: rhbz#1653857 - Label /var/log/collectd.log as collectd_log_t - Update gnome_role_template() interface to make working sysadm_u SELinux able to login to X sessions Resolves: rhbz#1688729 - Update collectd policy to allow daemon create /var/log/collectd with collectd_log_t label Resolves: rhbz#1658319 - Update sbd policy to allow manage cgroups Resolves: rhbz#1715136 - Allow sudo userdomain to run rpm related commands - Update rpm_run() interface to avoid duplicate role transition in sudo_role_template Resolves: rhbz#1651253- Update gnome_role_template() interface to make working sysadm_u SELinux able to login to X sessions Resolves: rhbz#1688729 - Update collectd policy to allow daemon create /var/log/collectd with collectd_log_t label Resolves: rhbz#1658319- Update sbd policy to allow manage cgroups Resolves: rhbz#1715136- Allow cupsd_t domain to manage cupsd_tmp_t temp link files Resolves: rhbz#1719754 - Allow svnserve_t domain to read /dev/random Resolves: rhbz#1727458 - Update sudodomains to make working confined users run sudo/su Resolves: rhbz#1699391- Allow virtlockd process read virtlockd.conf file Resolves: rhbz#1714896- Rebuild selinux-policy build because of broken RHEL-7.8 buildrood during build of selinux-policy-3.13.1-253 Resolves: rhbz#1727341- Label user cron spool file with user_cron_spool_t Resolves: rhbz#1727341 - Allow svnserve_t domain to read system state Resolves: rhbz#1727458 - Update svnserve_t policy to make working svnserve hooks Resolves: rhbz#1727458 - Update gnome_role_template() template to allow sysadm_t confined user to login to xsession Resolves: rhbz#1727379 - Update gnome_role_template() to allow _gkeyringd_t domains to chat with systemd_logind over dbus Resolves: rhbz#1727379 - Allow userdomain gkeyringd domain to create stream socket with userdomain Resolves: rhbz#1727379 - Allow cupsd_t to create lnk_files in /tmp. BZ(1401634) Resolves: rhbz#1719754 - Allow mysqld_t domain to manage cluster pid files Resolves: rhbz#1715805 - Relabel /usr/sbin/virtlockd from virt_exec_t to virtlogd_exec_t. Resolves: rhbz#1714896 - Allow systemd_hostnamed_t domain to dbus chat with sosreport_t domain Resolves: rhbz#1705599 - Allow rhsmcertd_t domain to send signull to all domains Resolves: rhbz#1701338 - Allow cloud_init_t domain to ccreate iptables files with correct SELinux label Resolves: rhbz#1699249 - Allow dnsmasq_t domain to manage NetworkManager_var_lib_t files - Allow certmonger to geattr of filesystems BZ(1578755) - Update tomcat_can_network_connect_db boolean to allow tomcat domains also connect to redis ports Resolves: rhbz#1687497 - Allow lograte_t domain to manage collect_rw_content files and dirs Resolves: rhbz#1658319 - Add interface collectd_manage_rw_content() - Allow glusterd_t domain to setpgid Resolves: rhbz#1653857 - Allow sysadm_sudo_t to use SELinux tooling. Resolves: rhbz#1727341 - Allow sysadm_t domain to create netlink selinux sockets Resolves: rhbz#1727379 - Allow systemd_resolved_t to dbusd chat with NetworkManager_t Resolves: rhbz#1723877 - Allow crack_t domain read /et/passwd files Resolves: rhbz#1721093 - Allow sysadm_t domain to dbus chat with rtkit daemon Resolves: rhbz#1720546 - Allow x_userdomains to nnp domain transition to thumb_t domain Resolves: rhbz#1712603 - Dontaudit writing to user home dirs by gnome-keyring-daemon Resolves: rhbz#1703959 - Update logging_send_audit_msgs(sudodomain() to control TTY auditing for netlink socket for audit service Resolves: rhbz#1699391 - Allow systemd_tmpfiles_t domain to relabel from usermodehelper_t files Resolves: rhbz#1699063 - Add interface kernel_relabelfrom_usermodehelper()- Allow sbd_t domain to use nsswitch Resolves: rhbz#1728593- Allow ganesha_t domain to connect to tcp portmap_port_t Resolves: rhbz#1715088- Allow redis to creating tmp files with own label Resolves: rhbz#1646765- Allow ctdb_t domain to manage samba_var_t files/links/sockets and dirs Resolves: rhbz#1716400- Allow nrpe_t domain to read process state of systemd_logind_t - Add interface systemd_logind_read_state() Resolves: rhbz#1653309- Label /etc/rhsm as rhsmcertd_config_t Resolves: rhbz#1703573- Fix typo in gpg SELinux module - Update gpg policy to make ti working with confined users Resolves: rhbz#1535109 - Alow nrpe_t to send signull to sssd domain when nagios_run_sudo boolean is turned on Resolves: rhbz#1653309 - Allow nrpe_t domain to be dbus cliennt Resolves: rhbz#1653309 - Add interface sssd_signull() Resolves: rhbz#1653309 - Update userdomains to allow confined users to create gpg keys Resolves: rhbz#1535109- Allow ngaios to use chown capability Resolves: rhbz#1653309 - Dontaudit gpg_domain to create netlink_audit sockets Resolves: rhbz#1535109 - Update fs_rw_cephfs_files() interface to allow also caller domain to read/write cephpfs_t lnk files Resolves: rhbz#1558836 - Update domain_can_mmap_files() boolean to allow also mmap lnk files- Allow rhsmcertd_t domain to read yum.log file labeled as rpm_log_t Resolves: rhbz#1695342- Update Nagios policy when sudo is used Resolves: rhbz#1653309- Allow modemmanager_t domain to write to raw_ip file labeled as sysfs_t Resolves: rhbz#1676810- Make shell_exec_t type as entrypoint for vmtools_unconfined_t. Resolves: rhbz#1656814- Update vmtools policy Resolves: rhbz#1656814 Allow domain transition from vmtools_t to vmtools_unconfined_t when shell_exec_t is entrypoint. - Allow virt_qemu_ga_t domain to read udev_var_run_t files Resolves: rhbz#1663092 - Update nagios_run_sudo boolean with few allow rules related to accessing sssd Resolves: rhbz#1653309 - Allow nfsd_t to read nvme block devices BZ(1562554) Resolves: rhbz#1655493 - Allow tangd_t domain to bind on tcp ports labeled as tangd_port_t Resolves: rhbz#1650909 - Allow all domains to send dbus msgs to vmtools_unconfined_t processes Resolves: rhbz#1656814 - Label /dev/pkey as crypt_device_t Resolves: rhbz#1623068 - Allow sudodomains to write to systemd_logind_sessions_t pipes. Resolves: rhbz#1687452 - Allow all user domains to read realmd_var_lib_t files and dirs to check if IPA is configured on the system Resolves: rhbz#1667962 - Fixes: xenconsole does not start Resolves: rhbz#1601525 - Label /usr/lib64/libcuda.so.XX.XX library as textrel_shlib_t. Resolves: rhbz#1636197 - Create tangd_port_t with default label tcp/7406 Resolves: rhbz#1650909- named wants to access /proc/sys/net/ipv4/ip_local_port_range to get ehphemeral range. Resolves: rhbz#1683754 - Allow sbd_t domain to bypass permission checks for sending signals Resolves: rhbz#1671132 - Allow sbd_t domain read/write all sysctls Resolves: rhbz#1671132 - Allow kpatch_t domain to communicate with policykit_t domsin over dbus Resolves: rhbz#1602435 - Allow boltd_t to stream connect to sytem dbus Resolves: rhbz#1589086 - Update userdom_admin_user_template() and init_prog_run_bpf() interfaces to make working bpftool for confined admin Resolves: rhbz#1626115 - Update unconfined_dbus_send() interface to allow both direction communication over dbus with unconfined process. Resolves: rhbz#1589086- Allow sbd_t domain read/write all sysctls Resolves: rhbz#1671132 - Allow kpatch_t domain to communicate with policykit_t domsin over dbus Resolves: rhbz#1602435 - Allow boltd_t to stream connect to sytem dbus Resolves: rhbz#1589086 - Update unconfined_dbus_send() interface to allow both direction communication over dbus with unconfined process. Resolves: rhbz#1589086- Update redis_enable_notify() boolean to fix sending e-mail by redis when this boolean is turned on Resolves: rhbz#1646765- Allow virtd_lxc_t domains use BPF Resolves: rhbz#1626115 - F29 NetworkManager implements a new code for IPv4 address conflict detection (RFC 5227) based on n-acd [1], which uses eBPF to process ARP packets from the network. Resolves: rhbz#1626115 - Allow unconfined user all perms under bpf class BZ(1565738 Resolves: rhbz#1626115 - Allow unconfined and sysadm users to use bpftool BZ(1591440) Resolves: rhbz#1626115 - Allow systemd to manage bpf dirs/files Resolves: rhbz#1626115 - Create new type bpf_t and label /sys/fs/bpf with this type Resolves:rhbz#1626115 - Add new interface init_prog_run_bpf() Resolves:rhbz#1626115 - add definition of bpf class and systemd perms Resolves: rhbz#1626115- Update policy with multiple allow rules to make working installing VM in MLS policy Resolves: rhbz#1558121 - Allow virt domain to use interited virtlogd domains fifo_file Resolves: rhbz#1558121 - Allow chonyc_t domain to rw userdomain pipes Resolves: rhbz#1618757 - Add file contexts in ganesha.fc file to label logging ganesha files properly. Resolves: rhbz#1628247- Allow sandbox_xserver_t domain write to user_tmp_t files Resolves: rhbz#1646521 - Allow virt_qemu_ga_t domain to read network state Resolves: rhbz#1630347 - Bolt added d-bus API for force-powering the thunderbolt controller, so system-dbusd needs acces to boltd pipes Resolves: rhbz#1589086 - Add boltd policy Resolves: rhbz#1589086 - Allow virt domains to read/write cephfs filesystems Resolves: rhbz#1558836 - Allow gpg_t to create own tmpfs dirs and sockets Resolves: rhbz#1535109 - Allow gpg_agent_t to send msgs to syslog/journal Resolves: rhbz#1535109 - Allow virtual machine to write to fixed_disk_device_t Resolves: rhbz#1499208 - Update kdump_manage_crash() interface to allow also manage dirs by caller domain Resolves: rhbz#1491585 - Add kpatch policy Resolves: rhbz#1602435 - Label /usr/bin/mysqld_safe_helper as mysqld_exec_t instead of bin_t Resolves: rhbz#1623942 - Allow svnserve_t domain to create in /tmp svn_0 file labeled as krb5_host_rcache_t Resolves: rhbz#1475271 - Allow systemd to mount boltd_var_run_t dirs Resolves: rhbz#1589086 - Allow systemd to mounont boltd lib dirs Resolves: rhbz#1589086 - Allow sysadm_t,staff_t and unconfined_t domain to execute kpatch as kpatch_t domain Resolves: rhbz#1602435 - Allow passwd_t domain chroot - Add miscfiles_filetrans_named_content_letsencrypt() to optional_block - Allow unconfined domains to create letsencrypt directory in /var/lib labeled as cert_t Resolves: rhbz#1447278 - Allow staff_t user to systemctl iptables units. Resolves: rhbz#1360470- Label /usr/bin/mysqld_safe_helper as mysqld_exec_t instead of bin_t Resolves: rhbz#1623942 - Allow svnserve_t domain to create in /tmp svn_0 file labeled as krb5_host_rcache_t Resolves: rhbz#1475271 - Allow passwd_t domain chroot - Add miscfiles_filetrans_named_content_letsencrypt() to optional_block - Allow unconfined domains to create letsencrypt directory in /var/lib labeled as cert_t Resolves: rhbz#1447278 - Allow staff_t user to systemctl iptables units. Resolves: rhbz#1360470- Allow gssd_t domain to manage kernel keyrings of every domain. Resolves: rhbz#1487350 - Add new interface domain_manage_all_domains_keyrings() Resolves: rhbz#1487350- Allow gssd_t domain to read/write kernel keyrings of every domain. Resolves: rhbz#1487350 - Add interface domain_rw_all_domains_keyrings() Resolves: rhbz#1487350- Update snapperd policy to allow snapperd manage all non security dirs. Resolves: rhbz#1619306-Allow nova_t domain to use pam Resolves: rhbz:#1640528 - sysstat: grant sysstat_t the search_dir_perms set Resolves: rhbz#1637416 - Allow cinder_volume_t domain to dbus chat with systemd_logind_t domain Resolves: rhbz#1630318 - Allow staff_t userdomain and confined_admindomain attribute to allow use generic ptys because of new sudo feature 'io logging' Resolves: rhbz#1564470 - Make ganesha policy active again Resolves: rhbz#1511489- Remove disabling ganesha module in pre install phase of installation new selinux-policy package where ganesha is again standalone module Resolves: rhbz#1638257- Allow staff_t userdomain and confined_admindomain attribute to allow use generic ptys because of new sudo feature 'io logging' Resolves: rhbz#1638427- Run ganesha as ganesha_t domain again, revert changes where ganesha is running as nfsd_t Resolves: rhbz#1638257- Fix missing patch in spec file Resolves: rhbz#1635704- Allow cinder_volume_t domain to dbus chat with systemd_logind_t domain Resolves: rhbz#1635704- Allow neutron domain to read/write /var/run/utmp Resolves: rhbz#1630318- Allow tomcat_domain to read /dev/random Resolves: rhbz#1631666 - Allow neutron_t domain to use pam Resolves: rhbz#1630318- Add interface apache_read_tmp_dirs() - Allow dirsrvadmin_script_t domain to list httpd_tmp_t dirs Resolves: rhbz#1622602- Allow tomcat servers to manage usr_t files Resolves: rhbz#1625678 - Dontaudit tomcat serves to append to /dev/random device Resolves: rhbz#1625678 - Allow sys_nice capability to mysqld_t domain - Allow dirsrvadmin_script_t domain to read httpd tmp files Resolves: rhbz#1622602 - Allow syslogd_t domain to manage cert_t files Resolves: rhbz#1615995- Allow sbd_t domain to getattr of all char files in /dev and read sysfs_t files and dirs Resolves: rhbz#1627114 - Expand virt_read_lib_files() interface to allow list dirs with label virt_var_lib_t Resolves: rhbz#1567753- Allow tomcat Tomcat to delete a temporary file used when compiling class files for JSPs. Resolves: rhbz#1625678 - Allow chronyd_t domain to read virt_var_lib_t files - Allow virtual machines to use dri devices. This allows use openCL GPU calculations. BZ(1337333) Resolves: rhbz#1625613 - Allow tomcat services create link file in /tmp Resolves: rhbz#1624289 - Add boolean: domain_can_mmap_files. Resolves: rhbz#1460322- Make working SELinux sandbox with Wayland. Resolves: rhbz#1624308 - Allow svirt_t domain to mmap svirt_image_t block files Resolves: rhbz#1624224 - Add caps dac_read_search and dav_override to pesign_t domain - Allow iscsid_t domain to mmap userio chr files Resolves: rhbz#1623589 - Add boolean: domain_can_mmap_files. Resolves: rhbz#1460322 - Add execute_no_trans permission to mmap_exec_file_perms pattern - Allow sudodomain to search caller domain proc info - Allow xdm_t domain to mmap and read cert_t files - Replace optional policy blocks to make dbus interfaces effective Resolves: rhbz#1624414 - Add interface dev_map_userio_dev()- Allow readhead_t domain to mmap own pid files Resolves: rhbz#1614169- Allow ovs-vswitchd labeled as openvswitch_t domain communicate with qemu-kvm via UNIX stream socket - Allow httpd_t domain to mmap tmp files Resolves: rhbz#1608355 - Update dirsrv_read_share() interface to allow caller domain to mmap dirsrv_share_t files - Update dirsrvadmin_script_t policy to allow read httpd_tmp_t symlinks - Label /dev/tpmrm[0-9]* as tpm_device_t - Allow semanage_t domain mmap usr_t files Resolves: rhbz#1622607 - Update dev_filetrans_all_named_dev() to allow create event22-30 character files with label event_device_t- Allow nagios_script_t domain to mmap nagios_log_t files Resolves: rhbz#1620013 - Allow nagios_script_t domain to mmap nagios_spool_t files Resolves: rhbz#1620013 - Update userdom_security_admin() and userdom_security_admin_template() to allow use auditctl Resolves: rhbz#1622197 - Update selinux_validate_context() interface to allow caller domain to mmap security_t files Resolves: rhbz#1622061- Allow virtd_t domain to create netlink_socket - Allow rpm_t domain to write to audit - Allow rpm domain to mmap rpm_var_lib_t files Resolves: rhbz#1619785 - Allow nagios_script_t domain to mmap nagios_etc_t files Resolves: rhbz#1620013 - Update nscd_socket_use() to allow caller domain to stream connect to nscd_t Resolves: rhbz#1460715 - Allow secadm_t domain to mmap audit config and log files - Allow insmod_t domain to read iptables pid files - Allow systemd to mounton /etc Resolves: rhbz#1619785- Allow kdumpctl_t domain to getattr fixed disk device in mls Resolves: rhbz#1615342 - Allow initrc_domain to mmap all binaries labeled as systemprocess_entry Resolves: rhbz#1615342- Allow virtlogd to execute itself Resolves: rhbz#1598392- Allow kdumpctl_t domain to manage kdumpctl_tmp_t fifo files Resolves: rhbz#1615342 - Allow kdumpctl to write to files on all levels Resolves: rhbz#1615342 - Fix typo in radius policy Resolves: rhbz#1619197 - Allow httpd_t domain to mmap httpd_config_t files Resolves: rhbz#1615894 - Add interface dbus_acquire_svc_system_dbusd() - Allow sanlock_t domain to connectto to unix_stream_socket Resolves: rhbz#1614965 - Update nfsd_t policy because of ganesha features Resolves: rhbz#1511489 - Allow conman to getattr devpts_t Resolves: rhbz#1377915 - Allow tomcat_domain to connect to smtp ports Resolves: rhbz#1253502 - Allow tomcat_t domain to mmap tomcat_var_lib_t files Resolves: rhbz#1618519 - Allow slapd_t domain to mmap slapd_var_run_t files Resolves: rhbz#1615319 - Allow nagios_t domain to mmap nagios_log_t files Resolves: rhbz#1618675 - Allow nagios to exec itself and mmap nagios spool files BZ(1559683) - Allow nagios to mmap nagios config files BZ(1559683) - Allow kpropd_t domain to mmap krb5kdc_principal_t files Resolves: rhbz#1619252 - Update syslogd policy to make working elasticsearch - Label tcp and udp ports 9200 as wap_wsp_port - Allow few domains to rw inherited kdumpctl tmp pipes Resolves: rhbz#1615342- Allow systemd_dbusd_t domain read/write to nvme devices Resolves: rhbz#1614236 - Allow mysqld_safe_t do execute itself - Allow smbd_t domain to chat via dbus with avahi daemon Resolves: rhbz#1600157 - cupsd_t domain will create /etc/cupsd/ppd as cupsd_etc_rw_t Resolves: rhbz#1452595 - Allow amanda_t domain to getattr on tmpfs filesystem BZ(1527645) Resolves: rhbz#1452444 - Update screen_role_template to allow caller domain to have screen_exec_t as entrypoint do new domain Resolves: rhbz#1384769 - Add alias httpd__script_t to _script_t to make sepolicy generate working Resolves: rhbz#1271324 - Allow kprop_t domain to read network state Resolves: rhbz#1600705 - Allow sysadm_t domain to accept socket Resolves: rhbz#1557299 - Allow sshd_t domain to mmap user_tmp_t files Resolves: rhbz#1613437- Allow sshd_t domain to mmap user_tmp_t files Resolves: rhbz#1613437- Allow kprop_t domain to read network state Resolves: rhbz#1600705- Allow kpropd domain to exec itself Resolves: rhbz#1600705 - Allow ipmievd_t to mmap kernel modules BZ(1552535) - Allow hsqldb_t domain to mmap own temp files Resolves: rhbz#1612143 - Allow hsqldb_t domain to read cgroup files Resolves: rhbz#1612143 - Allow rngd_t domain to read generic certs Resolves: rhbz#1612456 - Allow innd_t domain to mmap own var_lib_t files Resolves: rhbz#1600591 - Update screen_role_temaplate interface Resolves: rhbz#1384769 - Allow cupsd_t to create cupsd_etc_t dirs Resolves: rhbz#1452595 - Allow chronyd_t domain to mmap own tmpfs files Resolves: rhbz#1596563 - Allow cyrus domain to mmap own var_lib_t and var_run files Resolves: rhbz#1610374 - Allow sysadm_t domain to create rawip sockets Resolves: rhbz#1571591 - Allow sysadm_t domain to listen on socket Resolves: rhbz#1557299 - Update sudo_role_template() to allow caller domain also setattr generic ptys Resolves: rhbz#1564470 - Allow netutils_t domain to create bluetooth sockets Resolves: rhbz#1600586- Allow innd_t domain to mmap own var_lib_t files Resolves: rhbz#1600591 - Update screen_role_temaplate interface Resolves: rhbz#1384769 - Allow cupsd_t to create cupsd_etc_t dirs Resolves: rhbz#1452595 - Allow chronyd_t domain to mmap own tmpfs files Resolves: rhbz#1596563 - Allow cyrus domain to mmap own var_lib_t and var_run files Resolves: rhbz#1610374 - Allow sysadm_t domain to create rawip sockets Resolves: rhbz#1571591 - Allow sysadm_t domain to listen on socket Resolves: rhbz#1557299 - Update sudo_role_template() to allow caller domain also setattr generic ptys Resolves: rhbz#1564470 - Allow netutils_t domain to create bluetooth sockets Resolves: rhbz#1600586- Allow virtlogd_t domain to chat via dbus with systemd_logind Resolves: rhbz#1593740- Allow sblim_sfcbd_t domain to mmap own tmpfs files Resolves: rhbz#1609384 - Update logging_manage_all_logs() interface to allow caller domain map all logfiles Resolves: rhbz#1592028- Dontaudit oracleasm_t domain to request sys_admin capability - Allow iscsid_t domain to load kernel module Resolves: rhbz#1589295 - Update rhcs contexts to reflects the latest fenced changes - Allow httpd_t domain to rw user_tmp_t files Resolves: rhbz#1608355 - /usr/libexec/udisks2/udisksd should be labeled as devicekit_disk_exec_t Resolves: rhbz#1521063 - Allow tangd_t dac_read_search Resolves: rhbz#1607810 - Allow glusterd_t domain to mmap user_tmp_t files - Allow mongodb_t domain to mmap own var_lib_t files Resolves: rhbz#1607729 - Allow iscsid_t domain to mmap sysfs_t files Resolves: rhbz#1602508 - Allow tomcat_domain to search cgroup dirs Resolves: rhbz#1600188 - Allow httpd_t domain to mmap own cache files Resolves: rhbz#1603505 - Allow cupsd_t domain to mmap cupsd_etc_t files Resolves: rhbz#1599694 - Allow kadmind_t domain to mmap krb5kdc_principal_t Resolves: rhbz#1601004 - Allow virtlogd_t domain to read virt_etc_t link files Resolves: rhbz#1598593 - Allow dirsrv_t domain to read crack db Resolves: rhbz#1599726 - Dontaudit pegasus_t to require sys_admin capability Resolves: rhbz#1374570 - Allow mysqld_t domain to exec mysqld_exec_t binary files - Allow abrt_t odmain to read rhsmcertd lib files Resolves: rhbz#1601389 - Allow winbind_t domain to request kernel module loads Resolves: rhbz#1599236 - Allow gpsd_t domain to getsession and mmap own tmpfs files Resolves: rhbz#1598388 - Allow smbd_t send to nmbd_t via dgram sockets BZ(1563791) Resolves: rhbz#1600157 - Allow tomcat_domain to read cgroup_t files Resolves: rhbz#1601151 - Allow varnishlog_t domain to mmap varnishd_var_lib_t files Resolves: rhbz#1600704 - Allow dovecot_auth_t domain to manage also dovecot_var_run_t fifo files. BZ(1320415) Resolves: rhbz#1600692 - Fix ntp SELinux module - Allow innd_t domain to mmap news_spool_t files Resolves: rhbz#1600591 - Allow haproxy daemon to reexec itself. BZ(1447800) Resolves: rhbz#1600578 - Label HOME_DIR/mozilla.pdf file as mozilla_home_t instead of user_home_t Resolves: rhbz#1559859 - Allow pkcs_slotd_t domain to mmap own tmpfs files Resolves: rhbz#1600434 - Allow fenced_t domain to reboot Resolves: rhbz#1293384 - Allow bluetooth_t domain listen on bluetooth sockets BZ(1549247) Resolves: rhbz#1557299 - Allow lircd to use nsswitch. BZ(1401375) - Allow targetd_t domain mmap lvm config files Resolves: rhbz#1546671 - Allow amanda_t domain to read network system state Resolves: rhbz#1452444 - Allow abrt_t domain to read rhsmcertd logs Resolves: rhbz#1492059 - Allow application_domain_type also mmap inherited user temp files BZ(1552765) Resolves: rhbz#1608421 - Allow ipsec_t domain to read l2tpd pid files Resolves: rhbz#1607994 - Allow systemd_tmpfiles_t do mmap system db files - Improve domain_transition_pattern to allow mmap entrypoint bin file. Resolves: rhbz#1460322 - Allow nsswitch_domain to mmap passwd_file_t files BZ(1518655) Resolves: rhbz#1600528 - Dontaudit syslogd to watching top llevel dirs when imfile module is enabled Resolves: rhbz#1601928 - Allow ipsec_t can exec ipsec_exec_t Resolves: rhbz#1600684 - Allow netutils_t domain to mmap usmmon device Resolves: rhbz#1600586 - Allow netlabel_mgmt_t domain to read sssd public files, stream connect to sssd_t BZ(1483655) - Allow userdomain sudo domains to use generic ptys Resolves: rhbz#1564470 - Allow traceroute to create icmp packets Resolves: rhbz#1548350 - Allow systemd domain to mmap lvm config files BZ(1594584) - Add new interface lvm_map_config - refpolicy: Update for kernel sctp support Resolves: rhbz#1597111 Add additional entries to support the kernel SCTP implementation introduced in kernel 4.16- Update oddjob_domtrans_mkhomedir() interface to allow caller domain also mmap oddjob_mkhomedir_exec_t files Resolves: rhbz#1596306 - Update rhcs_rw_cluster_tmpfs() interface to allow caller domain to mmap cluster_tmpfs_t files Resolves: rhbz#1589257 - Allow radiusd_t domain to read network sysctls Resolves: rhbz#1516233 - Allow chronyc_t domain to use nscd shm Resolves: rhbz#1596563 - Label /var/lib/tomcats dir as tomcat_var_lib_t Resolves: rhbz#1596367 - Allow lsmd_t domain to mmap lsmd_plugin_exec_t files Resolves: rhbz#bea0c8174 - Label /usr/sbin/rhn_check-[0-9]+.[0-9]+ as rpm_exec_t Resolves: rhbz#1596509 - Update seutil_exec_loadpolicy() interface to allow caller domain to mmap load_policy_exec_t files Resolves: rhbz#1596072 - Allow xdm_t to read systemd hwdb Resolves: rhbz#1596720 - Allow dhcpc_t domain to mmap files labeled as ping_exec_t Resolves: rhbz#1596065- Allow tangd_t domain to create tcp sockets Resolves: rhbz#1595775 - Update postfix policy to allow postfix_master_t domain to mmap all postfix* binaries Resolves: rhbz#1595328 - Allow amanda_t domain to have setgid capability Resolves: rhbz#1452444 - Update usermanage_domtrans_useradd() to allow caller domain to mmap useradd_exec_t files Resolves: rhbz#1595667- Allow abrt_watch_log_t domain to mmap binaries with label abrt_dump_oops_exec_t Resolves: rhbz#1591191 - Update cups_filetrans_named_content() to allow caller domain create ppd directory with cupsd_etc_rw_t label Resolves: rhbz#1452595 - Allow abrt_t domain to write to rhsmcertd pid files Resolves: rhbz#1492059 - Allow pegasus_t domain to eexec lvm binaries and allow read/write access to lvm control Resolves: rhbz#1463470 - Add vhostmd_t domain to read/write to svirt images Resolves: rhbz#1465276 - Dontaudit action when abrt-hook-ccpp is writing to nscd sockets Resolves: rhbz#1460715 - Update openvswitch policy Resolves: rhbz#1594729 - Update kdump_manage_kdumpctl_tmp_files() interface to allow caller domain also mmap kdumpctl_tmp_t files Resolves: rhbz#1583084 - Allow sssd_t and slpad_t domains to mmap generic certs Resolves: rhbz#1592016 Resolves: rhbz#1592019 - Allow oddjob_t domain to mmap binary files as oddjob_mkhomedir_exec_t files Resolves: rhbz#1592022 - Update dbus_system_domain() interface to allow system_dbusd_t domain to mmap binary file from second parameter Resolves: rhbz#1583080 - Allow chronyc_t domain use inherited user ttys Resolves: rhbz#1593267 - Allow stapserver_t domain to mmap own tmp files Resolves: rhbz#1593122 - Allow sssd_t domain to mmap files labeled as sssd_selinux_manager_exec_t Resolves: rhbz#1592026 - Update policy for ypserv_t domain Resolves: rhbz#1592032 - Allow abrt_dump_oops_t domain to mmap all non security files Resolves: rhbz#1593728 - Allow svirt_t domain mmap svirt_image_t files Resolves: rhbz#1592688 - Allow virtlogd_t domain to write inhibit systemd pipes. Resolves: rhbz#1593740 - Allow sysadm_t and staff_t domains to use sudo io logging Resolves: rhbz#1564470 - Allow sysadm_t domain create sctp sockets Resolves: rhbz#1571591 - Update mount_domtrans() interface to allow caller domain mmap mount_exec_t Resolves: rhbz#1592025 - Allow dhcpc_t to mmap all binaries with label hostname_exec_t, ifconfig_exec_t and netutils_exec_t Resolves: rhbz#1594661- Fix typo in logwatch interface file - Allow spamd_t to manage logwatch_cache_t files/dirs - Allow dnsmasw_t domain to create own tmp files and manage mnt files - Allow fail2ban_client_t to inherit rlimit information from parent process Resolves: rhbz#1513100 - Allow nscd_t to read kernel sysctls Resolves: rhbz#1512852 - Label /var/log/conman.d as conman_log_t Resolves: rhbz#1538363 - Add dac_override capability to tor_t domain Resolves: rhbz#1540711 - Allow certmonger_t to readwrite to user_tmp_t dirs Resolves: rhbz#1543382 - Allow abrt_upload_watch_t domain to read general certs Resolves: rhbz#1545098 - Update postfix_domtrans_master() interface to allow caller domain also mmap postfix_master_exec_t binary Resolves: rhbz#1583087 - Allow postfix_domain to mmap postfix_qmgr_exec_t binaries Resolves: rhbz#1583088 - Allow postfix_domain to mmap postfix_pickup_exec_t binaries Resolves: rhbz#1583091 - Allow chornyd_t read phc2sys_t shared memory Resolves: rhbz#1578883 - Allow virt_qemu_ga_t read utmp Resolves: rhbz#1571202 - Add several allow rules for pesign policy: Resolves: rhbz#1468744 - Allow pesign domain to read /dev/random - Allow pesign domain to create netlink_kobject_uevent_t sockets - Allow pesign domain create own tmp files - Add setgid and setuid capabilities to mysqlfd_safe_t domain Resolves: rhbz#1474440 - Add tomcat_can_network_connect_db boolean Resolves: rhbz#1477948 - Update virt_use_sanlock() boolean to read sanlock state Resolves: rhbz#1448799 - Add sanlock_read_state() interface - Allow postfix_cleanup_t domain to stream connect to all milter sockets BZ(1436026) Resolves: rhbz#1563423 - Update abrt_domtrans and abrt_exec() interfaces to allow caller domain to mmap binary file Resolves:rhbz#1583080 - Update nscd_domtrans and nscd_exec interfaces to allow caller domain also mmap nscd binaries Resolves: rhbz#1583086 - Update snapperd_domtrans() interface to allow caller domain to mmap snapperd_exec_t file Resolves: rhbz#1583802 - Allow zoneminder_t to getattr of fs_t Resolves: rhbz#1585328 - Fix denials during ipa-server-install process on F27+ Resolves: rhbz#1586029 - Allow ipa_dnskey_t to exec ipa_dnskey_exec_t files Resolves: rhbz#1586033 - Allow rhsmcertd_t domain to send signull to postgresql_t domain Resolves: rhbz#1588119 - Allow policykit_t domain to dbus chat with dhcpc_t Resolves: rhbz#1364513 - Adding new boolean keepalived_connect_any() Resolves: rhbz#1443473 - Allow amanda to create own amanda_tmpfs_t files Resolves: rhbz#1452444 - Add amanda_tmpfs_t label. BZ(1243752) - Allow gdomap_t domain to connect to qdomap_port_t Resolves: rhbz#1551944 - Fix typos in sge - Fix typo in openvswitch policy - /usr/libexec/bluetooth/obexd should have only obexd_exec_t instead of bluetoothd_exec_t type - Allow sshd_keygen_t to execute plymouthd Resolves: rhbz#1583531 - Update seutil_domtrans_setfiles() interface to allow caller domain to do mmap on setfiles_exec_t binary Resolves: rhbz#1583090 - Allow systemd_networkd_t create and relabel tun sockets Resolves: rhbz#1583830 - Allow map audisp_exec_t files fordomains executing this binary Resolves: rhbz#1586042 - Add new interface postgresql_signull() - Add fs_read_xenfs_files() interface.- /usr/libexec/bluetooth/obexd should have only obexd_exec_t instead of bluetoothd_exec_t type - Allow dac override capability to mandb_t domain BZ(1529399) Resolves: rhbz#1423361 - Allow inetd_child process to chat via dbus with abrt Resolves: rhbz#1428805 - Allow zabbix_agent_t domain to connect to redis_port_t Resolves: rhbz#1418860 - Allow rhsmcertd_t domain to read xenfs_t files Resolves: rhbz#1405870 - Allow zabbix_agent_t to run zabbix scripts Resolves: rhbz#1380697 - Allow rabbitmq_t domain to create own tmp files/dirs Resolves: rhbz#1546897 - Allow policykit_t mmap policykit_auth_exec_t files Resolves: rhbz#1583082 - Allow ipmievd_t domain to read general certs Resolves: rhbz#1514591 - Add sys_ptrace capability to pcp_pmie_t domain - Allow squid domain to exec ldconfig Resolves: rhbz#1532017 - Make working gpg agent in gpg_agent_t domain Resolves: rhbz#1535109 - Update gpg SELinux policy module - Allow kexec to read kernel module files in /usr/lib/modules. Resolves: rhbz#1536690 - Allow mailman_domain to read system network state Resolves: rhbz#1413510 - Allow mailman_mail_t domain to search for apache configs Resolves: rhbz#1413510 - Allow openvswitch_t domain to read neutron state and read/write fixed disk devices Resolves: rhbz#1499208 - Allow antivirus_domain to read all domain system state Resolves: rhbz#1560986 - Allow targetd_t domain to red gconf_home_t files/dirs Resolves: rhbz#1546671 - Allow freeipmi domain to map sysfs_t files Resolves: rhbz#1575918 - Label /usr/libexec/bluetooth/obexd as obexd_exec_t Resolves: rhbz#1351750 - Update rhcs SELinux module Resolves: rhbz#1589257 - Allow iscsid_t domain mmap kernel modules Resolves: rhbz#1589295 - Allow iscsid_t domain mmap own tmp files Resolves: rhbz#1589295 - Update iscsid_domtrans() interface to allow mmap iscsid_exec_t binary Resolves: rhbz#1589295 - Update nscd_socket_use interface to allow caller domain also mmap nscd_var_run_t files. Resolves: rhbz#1589271 - Allow nscd_t domain to mmap system_db_t files Resolves: rhbz#1589271 - Add interface nagios_unconfined_signull() - Allow lircd_t domain read sssd public files Add setgid capability to lircd_t domain Resolves: rhbz#1550700 - Add missing requires - Allow tomcat domain sends email Resolves: rhbz#1585184 - Allow memcached_t domain nnp_transition becuase of systemd security features BZ(1514867) Resolves: rhbz#1585714 - Allow kdump_t domain to map /boot files Resolves: rhbz#1588884 - Fix typo in netutils policy - Allow confined users get AFS tokens Resolves: rhbz#1417671 - Allow sysadm_t domain to chat via dbus Resolves: rhbz#1582146 - Associate sysctl_kernel_t type with filesystem attribute - Allow confined users to use new socket classes for bluetooth, alg and tcpdiag sockets Resolves: rhbz#1557299 - Allow user_t and staff_t domains create netlink tcpdiag sockets Resolves: rhbz#1557281 - Add interface dev_map_sysfs - Allow xdm_t domain to execute xdm_var_lib_t files Resolves: rhbz#1589139 - Allow syslogd_t domain to send signull to nagios_unconfined_plugin_t Resolves: rhbz#1569344 - Label /dev/vhost-vsock char device as vhost_device_t - Add files_map_boot_files() interface Resolves: rhbz#1588884 - Update traceroute_t domain to allow create dccp sockets Resolves: rhbz#1548350- Update ctdb domain to support gNFS setup Resolves: rhbz#1576818 - Allow authconfig_t dbus chat with policykit Resolves: rhbz#1551241 - Allow lircd_t domain to read passwd_file_t Resolves: rhbz:#1550700 - Allow lircd_t domain to read system state Resolves: rhbz#1550700 - Allow smbcontrol_t to mmap samba_var_t files and allow winbind create sockets BZ(1559795) Resolves: rhbz#1574521 - Allow tangd_t domain read certs Resolves: rhbz#1509055 - Allow httpd_sys_script_t to connect to mongodb_port_t if boolean httpd_can_network_connect_db is turned on Resolves: rhbz:#1579219 - Allow chronyc_t to redirect ourput to /var/lib /var/log and /tmp Resolves: rhbz#1574418 - Allow ctdb_t domain modify ctdb_exec_t files Resolves: rhbz#1572584 - Allow chrome_sandbox_t to mmap tmp files Resolves: rhbz#1574392 - Allow ulogd_t to create netlink_netfilter sockets. Resolves: rhbz#1575924 - Update ulogd SELinux security policy - Allow rhsmcertd_t domain send signull to apache processes Resolves: rhbz#1576555 - Allow freeipmi domain to read sysfs_t files Resolves: rhbz#1575918 - Allow smbcontrol_t to create dirs with samba_var_t label Resolves: rhbz#1574521 - Allow swnserve_t domain to stream connect to sasl domain Resolves: rhbz#1574537 - Allow SELinux users (except guest and xguest) to using bluetooth sockets Resolves: rhbz#1557299 - Allow confined users to use new socket classes for bluetooth, alg and tcpdiag sockets Resolves: rhbz#1557299 - Fix broken sysadm SELinux module Resolves: rhbz#1557311 - Allow user_t and staff_t domains create netlink tcpdiag sockets Resolves: rhbz#1557281 - Update ssh_domtrans_keygen interface to allow mmap ssh_keygen_exec_t binary file Resolves: rhbz#1583089 - Allow systemd_networkd_t to read/write tun tap devices Resolves: rhbz#1583830 - Add bridge_socket, dccp_socket, ib_socket and mpls_socket to socket_class_set Resolves: rhbz#1583771 - Allow audisp_t domain to mmap audisp_exec_t binary Resolves: rhbz#1583551 - Fix duplicates in sysadm.te file Resolves: rhbz#1307183 - Allow sysadm_u use xdm Resolves: rhbz#1307183 - Fix typo in sysnetwork.if file Resolves: rhbz#1581551- Fix duplicates in sysadm.te file Resolves: rhbz#1307183- Allow sysadm_u use xdm Resolves: rhbz#1307183- Allow httpd_sys_script_t to connect to mongodb_port_t if boolean httpd_can_network_connect_db is turned on Resolves: rhbz:#1579219 - Allow chronyc_t to redirect ourput to /var/lib /var/log and /tmp Resolves: rhbz#1574418 - Allow chrome_sandbox_t to mmap tmp files Resolves: rhbz#1574392 - Allow ulogd_t to create netlink_netfilter sockets. Resolves: rhbz#1575924 - Update ulogd SELinux security policy - Allow rhsmcertd_t domain send signull to apache processes Resolves: rhbz#1576555 - Allow freeipmi domain to read sysfs_t files Resolves: rhbz#1575918 - Allow smbcontrol_t to create dirs with samba_var_t label Resolves: rhbz#1574521 - Allow swnserve_t domain to stream connect to sasl domain Resolves: rhbz#1574537 - Fix typo in sysnetwork.if file Resolves: rhbz#1581551- Fix typo in sysnetwork.if file Resolves: rhbz#1581551- Improve procmail_domtrans() to allow mmaping procmail_exec_t - Allow hypervvssd_t domain to read fixed disk devices Resolves: rhbz#1581225 - Improve modutils_domtrans_insmod() interface to mmap insmod_exec_t binaries Resolves: rhbz#1581551 - Improve iptables_domtrans() interface to allow mmaping iptables_exec_t binary Resolves: rhbz#1581551 - Improve auth_domtrans_login_programinterface to allow also mmap login_exec_t binaries Resolves: rhbz#1581551 - Improve auth_domtrans_chk_passwd() interface to allow also mmaping chkpwd_exec_t binaries. Resolves: rhbz#1581551 - Allow mmap dhcpc_exec_t binaries in sysnet_domtrans_dhcpc interface- Add dbus_stream_connect_system_dbusd() interface. - Allow pegasus_t domain to mount tracefs_t filesystem Resolves:rhbz#1374570 - Allow psad_t domain to read all domains state Resolves: rhbz#1558439 - Add net_raw capability to named_t domain BZ(1545586) - Allow tomcat_t domain to connect to mongod_t tcp port Resolves:rhbz#1539748 - Allow dovecot and postfix to connect to systemd stream sockets Resolves: rhbz#1368642 - Label /usr/libexec/bluetooth/obexd as bluetoothd_exec_t to run process as bluetooth_t Resolves:rhbz#1351750 - Rename tang policy to tangd - Add interface systemd_rfkill_domtrans() - Allow users staff and sysadm to run wireshark on own domain Resolves:rhbz#1546362 - Allow systemd-bootchart to create own tmpfs files Resolves:rhbz#1510412- Rename tang policy to tangd - Allow virtd_t domain to relabel virt_var_lib_t files Resolves: rhbz#1558121 - Allow logrotate_t domain to stop services via systemd Resolves: rhbz#1527522 - Add tang policy Resolves: rhbz#1509055 - Allow mozilla_plugin_t to create mozilla.pdf file in user homedir with label mozilla_home_t Resolves: rhbz#1559859 - Improve snapperd SELinux policy Resolves: rhbz#1365555 - Allow snapperd_t daemon to create unlabeled dirs. Resolves: rhbz#1365555 - We have inconsistency in cgi templates with upstream, we use _content_t, but refpolicy use httpd__content_t. Created aliasses to make it consistence Resolves: rhbz#1271324 - Allow Openvswitch adding netdev bridge ovs 2.7.2.10 FDP Resolves: rhbz#1503835 - Add new Boolean tomcat_use_execmem Resolves: rhbz#1565226 - Allow domain transition from logrotate_t to chronyc_t Resolves: rhbz#1568281 - Allow nfsd_t domain to read/write sysctl fs files Resolves: rhbz#1516593 - Allow conman to read system state Resolves: rhbz#1377915 - Allow lircd_t to exec shell and add capabilities dac_read_search and dac_override Resolves: rhbz#1550700 - Allow usbmuxd to access /run/udev/data/+usb:*. Resolves: rhbz#1521054 - Allow abrt_t domain to manage kdump crash files Resolves: rhbz#1491585 - Allow systemd to use virtio console Resolves: rhbz#1558121 - Allow transition from sysadm role into mdadm_t domain. Resolves: rhbz#1551568 - Label /dev/op_panel and /dev/opal-prd as opal_device_t Resolves: rhbz#1537618 - Label /run/ebtables.lock as iptables_var_run_t Resolves: rhbz#1511437 - Allow udev_t domain to manage udev_rules_t char files. Resolves: rhbz#1545094 - Allow nsswitch_domain to read virt_var_lib_t files, because of libvirt NSS plugin. Resolves: rhbz#1567753 - Fix filesystem inteface file, we don't have nsfs_fs_t type, just nsfs_t Resolves: rhbz#1547700 - Allow iptables_t domain to create dirs in etc_t with system_conf_t labels- Add new boolean redis_enable_notify() Resolves: rhbz#1421326 - Label /var/log/shibboleth-www(/.*) as httpd_sys_rw_content_t Resolves: rhbz#1549514 - Add new label for vmtools scripts and label it as vmtools_unconfined_t stored in /etc/vmware-tools/ Resolves: rbhz#1463593 - Remove labeling for /etc/vmware-tools to bin_t it should be vmtools_unconfined_exec_t Resolves: rbhz#1463593- Backport several changes for snapperdfrom Fedora Rawhide Resolves: rhbz#1556798 - Allow snapperd_t to set priority for kernel processes Resolves: rhbz#1556798 - Make ganesha nfs server. Resolves: rhbz#1511489 - Allow vxfs filesystem to use SELinux labels Resolves: rhbz#1482880 - Add map permission to selinux-policy Resolves: rhbz#1460322- Label /usr/libexec/dbus-1/dbus-daemon-launch-helper as dbusd_exec_t to have systemd dbus services running in the correct domain instead of unconfined_service_t if unconfined.pp module is enabled. Resolves: rhbz#1546721- Allow openvswitch_t stream connect svirt_t Resolves: rhbz#1540702- Allow openvswitch domain to manage svirt_tmp_t sock files Resolves: rhbz#1540702 - Fix broken systemd_tmpfiles_run() interface- Allow dirsrv_t domain to create tmp link files Resolves: rhbz#1536011 - Label /usr/sbin/ldap-agent as dirsrv_snmp_exec_t Resolves: rhbz#1428568 - Allow ipsec_mgmt_t execute ifconfig_exec_t binaries - Allow ipsec_mgmt_t nnp domain transition to ifconfig_t Resolves: rhbz#1539416- Allow svirt_domain to create socket files in /tmp with label svirt_tmp_t Resolves: rhbz#1540702 - Allow keepalived_t domain getattr proc filesystem Resolves: rhbz#1477542 - Rename svirt_sandbox_file_t to container_file_t and svirt_lxc_net_t to container_t Resolves: rhbz#1538544 - Allow ipsec_t nnp transistions to domains ipsec_mgmt_t and ifconfig_t Resolves: rhbz:#1539416 - Allow systemd_logind_t domain to bind on dhcpd_port_t,pki_ca_port_t,flash_port_t Resolves: rhbz#1479350- Allow openvswitch_t domain to read cpuid, write to sysfs files and creating openvswitch_tmp_t sockets Resolves: rhbz#1535196 - Add new interface ppp_filetrans_named_content() Resolves: rhbz#1530601 - Allow keepalived_t read sysctl_net_t files Resolves: rhbz#1477542 - Allow puppetmaster_t domtran to puppetagent_t Resolves: rhbz#1376893 - Allow kdump_t domain to read kernel ring buffer Resolves: rhbz#1540004 - Allow ipsec_t domain to exec ifconfig_exec_t binaries. Resolves: rhbz#1539416 - Allow unconfined_domain_typ to create pppd_lock_t directory in /var/lock Resolves: rhbz#1530601 - Allow updpwd_t domain to create files in /etc with shadow_t label Resolves: rhbz#1412838 - Allow iptables sysctl load list support with SELinux enforced Resolves: rhbz#1535572- Allow virt_domains to acces infiniband pkeys. Resolves: rhbz#1533183 - Label /usr/libexec/ipsec/addconn as ipsec_exec_t to run this script as ipsec_t instead of init_t Resolves: rhbz#1535133 - Allow audisp_remote_t domain write to files on all levels Resolves: rhbz#1534924- Allow vmtools_t domain creating vmware_log_t files Resolves: rhbz#1507048 - Allow openvswitch_t domain to acces infiniband devices Resolves: rhbz#1532705- Allow chronyc_t domain to manage chronyd_keys_t files. Resolves: rhbz#1530525 - Make virtlog_t domain system dbus client Resolves: rhbz#1481109 - Update openvswitch SELinux module Resolves: rhbz#1482682 - Allow virtd_t to create also sock_files with label virt_var_run_t Resolves: rhbz#1484075- Allow domains that manage logfiles to man logdirs Resolves: rhbz#1523811- Label /dev/drm_dp_aux* as xserver_misc_device_t Resolves: rhbz#1520897 - Allow sysadm_t to run puppet_exec_t binaries as puppet_t Resolves: rhbz#1255745- Allow tomcat_t to manage pki_tomcat pid files Resolves: rhbz#1478371 - networkmanager: allow talking to openvswitch Resolves: rhbz#1517247 - Allow networkmanager_t and opensm_t to manage subned endports for IPoIB VLANs Resolves: rhbz#1517895 - Allow domains networkmanager_t and opensm_t to control IPoIB VLANs Resolves: rhbz#1517744 - Fix typo in guest interface file Resolves: rhbz#1468254 - Allow isnsd_t domain to accept tcp connections. Resolves: rhbz#1390208- Allow getty to use usbttys Resolves: rhbz#1514235- Allow ldap_t domain to manage also slapd_tmp_t lnk files Resolves: rhbz#1510883 - Allow cluster_t domain creating bundles directory with label var_log_t instead of cluster_var_log_t Resolves: rhbz:#1508360 - Add dac_read_search and dac_override capabilities to ganesha Resolves: rhbz#1483451- Add dependency for policycoreutils-2.5.18 becuase of new cgroup_seclabel policy capability Resolves: rhbz#1510145- Allow jabber domains to connect to postgresql ports Resolves: rhbz#1438489 - Dontaudit accountsd domain creating dirs in /root Resolves: rhbz#1456760 - Dontaudit slapd_t to block suspend system Resolves: rhbz: #1479759 - Allow spamc_t to stream connect to cyrus. Resolves: rhbz#1382955 - allow imapd to read /proc/net/unix file Resolves: rhbz#1393030 - Allow passenger to connect to mysqld_port_t Resolves: rhbz#1433464- Allow chronyc_t domain to use user_ptys Resolves: rhbz#1470150 - allow ptp4l to read /proc/net/unix file - Allow conmand to use usb ttys. Resolves: rhbz#1505121 - Label all files /var/log/opensm.* as opensm_log_t because opensm creating new log files with name opensm-subnet.lst Resolves: rhbz#1505845 - Allow chronyd daemon to execute chronyc. Resolves: rhbz#1508486 - Allow firewalld exec ldconfig. Resolves: rhbz#1375576 - Allow mozilla_plugin_t domain to dbus chat with devicekit Resolves: rhbz#1460477 - Dontaudit leaked logwatch pipes Resolves: rhbz#1450119 - Label /usr/bin/VGAuthService as vmtools_exec_t to confine this daemon. Resolves: rhbz#1507048 - Allow httpd_t domain to execute hugetlbfs_t files Resolves: rhbz#1507682 - Allow nfsd_t domain to read configfs_t files/dirs Resolves: rhbz#1439442 - Hide all allow rules with ptrace inside deny_ptrace boolean Resolves: rhbz#1421075 - Allow tgtd_t domain to read generic certs Resolves: rhbz#1438532 - Allow ptp4l to send msgs via dgram socket to unprivileged user domains Resolves: rhbz#1429853 - Allow dirsrv_snmp_t to use inherited user ptys and read system state Resolves: rhbz#1428568 - Allow glusterd_t domain to create own tmpfs dirs/files Resolves: rhbz#1411310 - Allow keepalived stream connect to snmp Resolves: rhbz#1401556 - After fix in kernel where LSM hooks for dac_override and dac_search_read capability was swaped we need to fix it also in policy Resolves: rhbz#1507089- Allow pegasus_openlmi_services_t to read generic certs Resolves: rhbz#1462292 - Allow ganesha_t domain to read random device Resolves: rhbz#1494382 - Allow zabbix_t domain to change its resource limits Resolves: rhbz:#1504074 - Add new boolean nagios_use_nfs Resolves: rhbz#1504826 - Allow system_mail_t to search network sysctls Resolves: rhbz#1505779 - Add samba_manage_var_dirs() interface - Fix typo bug in virt filecontext file - Allow nagios_script_t to read nagios_spool_t files Resolves: rhbz#1426824 - Allow samba to manage var dirs/files Resolves: rhbz#1415088 - Allow sbd_t to create own sbd_tmpfs_t dirs/files Resolves: rhbz#1380795 - Allow firewalld and networkmanager to chat with hypervkvp via dbus Resolves: rhbz#1377276 - Allow dmidecode to read rhsmcert_log_t files Resolves: rhbz#1300799 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow pegasus_openlmi_services_t to read generic certs Resolves: rhbz#1462292 - Allow ganesha_t domain to read random device Resolves: rhbz#1494382 - Allow zabbix_t domain to change its resource limits Resolves: rhbz:#1504074 - Add new boolean nagios_use_nfs Resolves: rhbz#1504826 - Allow system_mail_t to search network sysctls Resolves: rhbz#1505779 - Add samba_manage_var_dirs() interface - Fix typo bug in virt filecontext file - Allow nagios_script_t to read nagios_spool_t files Resolves: rhbz#1426824 - Allow samba to manage var dirs/files Resolves: rhbz#1415088 - Allow sbd_t to create own sbd_tmpfs_t dirs/files Resolves: rhbz#1380795 - Allow firewalld and networkmanager to chat with hypervkvp via dbus Resolves: rhbz#1377276 - Allow dmidecode to read rhsmcert_log_t files Resolves: rhbz#1300799 - Allow mail system to connect mariadb sockets. Resolves: rhbz#1368642 - Allow logrotate_t to change passwd and reloead services Resolves: rhbz#1450789 - Allow chronyd_t do request kernel module and block_suspend capability Resolves: rhbz#1350765 - Allow system_cronjob_t to create /var/lib/letsencrypt dir with right label Resolves: rhbz#1447278 - Allow httpd_t also read httpd_user_content_type dirs when httpd_enable_homedirs is enables Resolves: rhbz#1491994 - Allow svnserve to use kerberos Resolves: rhbz#1475271 - Allow conman to use ptmx. Add conman_use_nfs boolean Resolves: rhbz#1377915 - Add nnp transition for services using: NoNewPrivileges systemd security feature Resolves: rhbz#1311430 - Add SELinux support for chronyc Resolves: rhbz#1470150 - Add dac_read_search capability to openvswitch_t domain Resolves: rhbz#1501336 - Allow svnserve to manage own svnserve_log_t files/dirs Resolves: rhbz#1480741 - Allow keepalived_t to search network sysctls Resolves: rhbz#1477542 - Allow puppetagent_t domain dbus chat with rhsmcertd_t domain Resolves: rhbz#1446777 - Add dccp_socket into socker_class_set subset Resolves: rhbz#1459941 - Allow iptables_t to run setfiles to restore context on system Resolves: rhbz#1489118 - Label 20514 tcp/udp ports as syslogd_port_t Label 10514 tcp/udp portas as syslog_tls_port_t Resolves: rhbz:#1411400 - Make nnp transition Active Resolves: rhbz#1480518 - Label tcp 51954 as isns_port_t Resolves: rhbz#1390208 - Add dac_read_search capability chkpwd_t Resolves: rhbz#1376991 - Add support for running certbot(letsencrypt) in crontab Resolves: rhbz#1447278 - Add init_nnp_daemon_domain interface - Allow xdm_t to gettattr /dev/loop-control device Resolves: rhbz#1462925 - Allow nnp trasintion for unconfined_service_t Resolves: rhbz#1311430 - Allow unpriv user domains and unconfined_service_t to use chronyc Resolves: rhbz#1470150 - Allow iptables to exec plymouth. Resolves: rhbz#1480374 - Fix typo in fs_unmount_tracefs interface. Resolves: rhbz#1371057 - Label postgresql-check-db-dir as postgresql_exec_t Resolves: rhbz#1490956- We should not ship selinux-policy with permissivedomains enabled. Resolves: rhbz#1494172 - Fix order of installing selinux-policy-sandbox, because of depedencied in sandbox module, selinux-policy-targeted needs to be installed before selinux-policy-sandbox Resolves: rhbz#1492606- Allow tomcat to setsched Resolves: rhbz#1492730 - Fix rules blocking ipa-server upgrade process Resolves: rhbz#1478371 - Add new boolean tomcat_read_rpm_db() Resolves: rhbz#1477887 - Allow tomcat to connect on mysqld tcp ports - Add ctdbd_t domain sys_source capability and allow setrlimit Resolves: rhbz#1491235 - Fix keepalived SELinux module - Allow automount domain to manage mount pid files Resolves: rhbz#1482381 - Allow stunnel_t domain setsched Resolves: rhbz#1479383 - Add keepalived domain setpgid capability Resolves: rhbz#1486638 - Allow tomcat domain to connect to mssql port Resolves: rhbz#1484572 - Remove snapperd_t from unconfined domaines Resolves: rhbz#1365555 - Fix typo bug in apache module Resolves: rhbz#1397311 - Dontaudit that system_mail_t is trying to read /root/ files Resolves: rhbz#1147945 - Make working webadm_t userdomain Resolves: rhbz#1323792 - Allow redis domain to execute shell scripts. Resolves: rhbz#1421326 - Allow system_cronjob_t to create redhat-access-insights.log with var_log_t Resolves: rhbz#1473303 - Add couple capabilities to keepalived domain and allow get attributes of all domains Resolves: rhbz#1429327 - Allow dmidecode read rhsmcertd lock files Resolves: rhbz#1300799 - Add new interface rhsmcertd_rw_lock_files() Resolves: rhbz#1300799 - Label all plymouthd archives as plymouthd_var_log_t Resolves: rhbz#1478323 - Allow cloud_init_t to dbus chat with systemd_timedated_t Resolves: rhbz#1440730 - Allow logrotate_t to write to kmsg Resolves: rhbz#1397744 - Add capability kill to rhsmcertd_t Resolves: rhbz#1398338 - Disable mysqld_safe_t secure mode environment cleansing. Resolves: rhbz#1464063 - Allow winbind to manage smbd_tmp_t files Resolves: rhbz#1475566 - Dontaudit that system_mail_t is trying to read /root/ files Resolves: rhbz#1147945 - Make working webadm_t userdomain Resolves: rhbz#1323792 - Allow redis domain to execute shell scripts. Resolves: rhbz#1421326 - Allow system_cronjob_t to create redhat-access-insights.log with var_log_t Resolves: rhbz#1473303 - Add couple capabilities to keepalived domain and allow get attributes of all domains Resolves: rhbz#1429327 - Allow dmidecode read rhsmcertd lock files Resolves: rhbz#1300799 - Add new interface rhsmcertd_rw_lock_files() Resolves: rhbz#1300799 - Label all plymouthd archives as plymouthd_var_log_t Resolves: rhbz#1478323 - Allow cloud_init_t to dbus chat with systemd_timedated_t Resolves: rhbz#1440730 - Allow logrotate_t to write to kmsg Resolves: rhbz#1397744 - Add capability kill to rhsmcertd_t Resolves: rhbz#1398338 - Disable mysqld_safe_t secure mode environment cleansing. Resolves: rhbz#1464063 - Allow winbind to manage smbd_tmp_t files Resolves: rhbz#1475566 - Add interface systemd_tmpfiles_run - End of file cannot be in comment - Allow systemd-logind to use ypbind Resolves: rhbz#1479350 - Add creating opasswd file with shadow_t SELinux label in auth_manage_shadow() interface Resolves: rhbz#1412838 - Allow sysctl_irq_t assciate with proc_t Resolves: rhbz#1485909 - Enable cgourp sec labeling Resolves: rhbz#1485947 - Add cgroup_seclabel policycap. Resolves: rhbz#1485947 - Allow sshd_t domain to send signull to xdm_t processes Resolves: rhbz#1448959 - Allow updpwd_t domain auth file name trans Resolves: rhbz#1412838 - Allow sysadm user to run systemd-tmpfiles Resolves: rbhz#1325364 - Add support labeling for vmci and vsock device Resolves: rhbz#1451358 - Add userdom_dontaudit_manage_admin_files() interface Resolves: rhbz#1323792 - Allow iptables_t domain to read files with modules_conf_t label Resolves: rhbz#1373220 - init: Add NoNewPerms support for systemd. Resolves: rhbz#1480518 - Add nnp_nosuid_transition policycap and related class/perm definitions. Resolves: rhbz#1480518 - refpolicy: Infiniband pkeys and endports Resolves: rhbz#1464484- Allow certmonger using systemctl on pki_tomcat unit files Resolves: rhbz#1481388- Allow targetd_t to create own tmp files. - Dontaudit targetd_t to exec rpm binary file. Resolves: rhbz#1373860 Resolves: rhbz#1424621- Add few rules to make working targetd daemon with SELinux Resolves: rhbz#1373860 - Allow ipmievd_t domain to load kernel modules Resolves: rhbz#1441081 - Allow logrotate to reload transient systemd unit Resolves: rhbz#1440515 - Add certwatch_t domain dac_override and dac_read_search capabilities Resolves: rhbz#1422000 - Allow postgrey to execute bin_t files and add postgrey into nsswitch_domain Resolves: rhbz#1412072 - Allow nscd_t domain to search network sysctls Resolves: rhbz#1432361 - Allow iscsid_t domain to read mount pid files Resolves: rhbz#1482097 - Allow ksmtuned_t domain manage sysfs_t files/dirs Resolves: rhbz#1413865 - Allow keepalived_t domain domtrans into iptables_t Resolves: rhbz#1477719 - Allow rshd_t domain reads net sysctls Resolves: rhbz#1477908 - Add interface seutil_dontaudit_read_module_store() - Update interface lvm_rw_pipes() by adding also open permission - Label /dev/clp device as vfio_device_t Resolves: rhbz#1477624 - Allow ifconfig_t domain unmount fs_t Resolves: rhbz#1477445 - Label /dev/gpiochip* devices as gpio_device_t Resolves: rhbz#1477618 - Add interface dev_manage_sysfs() Resolves: rhbz#1474989- Label /usr/libexec/sudo/sesh as shell_exec_t Resolves: rhbz#1480791- Allow tomcat_t domain couple capabilities to make working tomcat-jsvc Resolves: rhbz#1470735- Allow llpdad send dgram to libvirt Resolves: rhbz#1472722- Add new boolean gluster_use_execmem Resolves: rhbz#1469027 - Allow cluster_t and glusterd_t domains to dbus chat with ganesha service Resolves: rhbz#1468581- Dontaudit staff_t user read admin_home_t files. Resolves: rhbz#1290633- Allow couple rules needed to start targetd daemon with SELinux in enforcing mode Resolves: rhbz#1424621 - Add interface lvm_manage_metadata Resolves: rhbz#1424621- Allow sssd_t to read realmd lib files. Resolves: rhbz#1436689 - Add permission open to files_read_inherited_tmp_files() interface Resolves: rhbz#1290633 Resolves: rhbz#1457106- Allow unconfined_t user all user namespace capabilties. Resolves: rhbz#1461488- Allow httpd_t to read realmd_var_lib_t files Resolves: rhbz#1436689- Allow named_t to bind on udp 4321 port Resolves: rhbz#1312972 - Allow systemd-sysctl cap. sys_ptrace Resolves: rhbz#1458999- Allow pki_tomcat_t execute ldconfig. Resolves: rhbz#1436689- Allow iscsi domain load kernel module. Resolves: rhbz#1457874 - Allow keepalived domain connect to squid tcp port Resolves: rhbz#1457455 - Allow krb5kdc_t domain read realmd lib files. Resolves: rhbz#1436689 - xdm_t should view kernel keys Resolves: rhbz#1432645- Allow tomcat to connect on all unreserved ports - Allow ganesha to connect to all rpc ports Resolves: rhbz#1448090 - Update ganesha with another fixes. Resolves: rhbz#1448090 - Update rpc_read_nfs_state_data() interface to allow read also lnk_files. Resolves: rhbz#1448090 - virt_use_glusterd boolean should be in optional block Update ganesha module to allow create tmp files Resolves: rhbz#1448090 - Hide broken symptoms when machine is configured with network bounding.- Add new boolean virt_use_glusterd Resolves: rhbz#1455994 - Add capability sys_boot for sbd_t domain - Allow sbd_t domain to create rpc sysctls. Resolves: rhbz#1455631 - Allow ganesha_t domain to manage glusterd_var_run_t pid files. Resolves: rhbz#1448090- Create new interface: glusterd_read_lib_files() - Allow ganesha read glusterd lib files. - Allow ganesha read network sysctls Resolves: rhbz#1448090- Add few allow rules to ganesha module Resolves: rhbz#1448090 - Allow condor_master_t to read sysctls. Resolves: rhbz#1277506 - Add dac_override cap to ctdbd_t domain Resolves: rhbz#1435708 - Label 8750 tcp/udp port as dey_keyneg_port_t Resolves: rhbz#1448090- Add ganesha_use_fusefs boolean. Resolves: rhbz#1448090- Allow httpd_t reading kerberos kdc config files Resolves: rhbz#1452215 - Allow tomcat_t domain connect to ibm_dt_2 tcp port. Resolves: rhbz#1447436 - Allow stream connect to initrc_t domains Resolves: rhbz#1447436 - Allow dnsmasq_t domain to read systemd-resolved pid files. Resolves: rhbz#1453114 - Allow tomcat domain name_bind on tcp bctp_port_t Resolves: rhbz#1451757 - Allow smbd_t domain generate debugging files under /var/run/gluster. These files are created through the libgfapi.so library that provides integration of a GlusterFS client in the Samba (vfs_glusterfs) process. Resolves: rhbz#1447669 - Allow condor_master_t write to sysctl_net_t Resolves: rhbz#1277506 - Allow nagios check disk plugin read /sys/kernel/config/ Resolves: rhbz#1277718 - Allow pcp_pmie_t domain execute systemctl binary Resolves: rhbz#1271998 - Allow nagios to connect to stream sockets. Allow nagios start httpd via systemctl Resolves: rhbz#1247635 - Label tcp/udp port 1792 as ibm_dt_2_port_t Resolves: rhbz#1447436 - Add interface fs_read_configfs_dirs() - Add interface fs_read_configfs_files() - Fix systemd_resolved_read_pid interface - Add interface systemd_resolved_read_pid() Resolves: rhbz#1453114 - Allow sshd_net_t domain read/write into crypto devices Resolves: rhbz#1452759 - Label 8999 tcp/udp as bctp_port_t Resolves: rhbz#1451757- nmbd_t needs net_admin capability like smbd Resolves: rhbz#1431859 - Dontaudit net_admin capability for domains postfix_master_t and postfix_qmgr_t Resolves: rhbz#1431859 - Allow rngd domain read sysfs_t Resolves: rhbz#1451735 - Add interface pki_manage_common_files() Resolves: rhbz#1447436 - Allow tomcat_t domain to manage pki_common_t files and dirs Resolves: rhbz#1447436 - Use stricter fc rules for sssd sockets in /var/run Resolves: rhbz#1448060 - Allow certmonger reads httpd_config_t files Resolves: rhbz#1436689 - Allow keepalived_t domain creating netlink_netfilter_socket. Resolves: rhbz#1451684 - Allow tomcat domain read rpm_var_lib_t files Allow tomcat domain exec rpm_exec_t files Allow tomcat domain name connect on oracle_port_t Allow tomcat domain read cobbler_var_lib_t files. Resolves: rhbz#1451318 - Make able deply overcloud via neutron_t to label nsfs as fs_t Resolves: rhbz#1373321- Allow tomcat domain read rpm_var_lib_t files Allow tomcat domain exec rpm_exec_t files Allow tomcat domain name connect on oracle_port_t Allow tomcat domain read cobbler_var_lib_t files. Resolves: rhbz#1451318 - Allow sssd_t domain creating sock files labeled as sssd_var_run_t in /var/run/ Resolves: rhbz#1448056 Resolves: rhbz#1448060 - Allow tomcat_domain connect to * postgresql_port_t * amqp_port_t Allow tomcat_domain read network sysctls Resolves: rhbz#1450819 - Make able deply overcloud via neutron_t to label nsfs as fs_t Resolves: rhbz#1373321 - Allow netutils setpcap capability Resolves:1444438- Update targetd policy to accommodate changes in the service Resolves: rhbz#1424621 - Allow tomcat_domain connect to * postgresql_port_t * amqp_port_t Allow tomcat_domain read network sysctls Resolves: rhbz#1450819 - Update virt_rw_stream_sockets_svirt() interface to allow confined users set socket options. Resolves: rhbz#1415841 - Allow radius domain stream connec to postgresql Resolves: rhbz#1446145 - Allow virt_domain to read raw fixed_disk_device_t to make working blockcommit Resolves: rhbz#1449977 - Allow glusterd_t domain start ganesha service Resolves: rhbz#1448090 - Made few cosmetic changes in sssd SELinux module Resolves: rhbz#1448060 - sssd-kcm should not run as unconfined_service_t BZ(1447411) Resolves: rhbz#1448060 - Add sssd_secrets labeling Also add named_filetrans interface to make sure all labels are correct Resolves: rhbz#1448056 - Allow keepalived_t domain read usermodehelper_t Resolves: rhbz#1449769 - Allow tomcat_t domain read pki_common_t files Resolves: rhbz#1447436 - Add interface pki_read_common_files() Resolves: rhbz#1447436- Allow hypervkvp_t domain execute hostname Resolves: rhbz#1449064 - Dontaudit sssd_selinux_manager_t use of net_admin capability Resolves: rhbz#1444955 - Allow tomcat_t stream connect to pki_common_t Resolves: rhbz#1447436 - Dontaudit xguest_t's attempts to listen to its tcp_socket - Allow sssd_selinux_manager_t to ioctl init_t sockets Resolves: rhbz#1436689 - Allow _su_t to create netlink_selinux_socket Resolves rhbz#1146987 - Allow unconfined_t to module_load any file Resolves rhbz#1442994- Improve ipa_cert_filetrans_named_content() interface to also allow caller domain manage ipa_cert_t type. Resolves: rhbz#1436689- Allow pki_tomcat_t domain read /etc/passwd. Resolves: rhbz#1436689 - Allow tomcat_t domain read ipa_tmp_t files Resolves: rhbz#1436689 - Label new path for ipa-otpd Resolves: rhbz#1446353 - Allow radiusd_t domain stream connect to postgresql_t Resolves: rhbz#1446145 - Allow rhsmcertd_t to execute hostname_exec_t binaries. Resolves: rhbz#1445494 - Allow virtlogd to append nfs_t files when virt_use_nfs=1 Resolves: rhbz#1402561- Update tomcat policy to adjust for removing unconfined_domain attr. Resolves: rhbz#1432083 - Allow httpd_t domain read also httpd_user_content_type lnk_files. Resolves: rhbz#1383621 - Allow httpd_t domain create /etc/httpd/alias/ipaseesion.key with label ipa_cert_t Resolves: rhbz#1436689 - Dontaudit _gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Label /var/www/html/nextcloud/data as httpd_sys_rw_content_t Resolves: rhbz#1425530 - Add interface ipa_filetrans_named_content() Resolves: rhbz#1432115 - Allow tomcat use nsswitch Resolves: rhbz#1436689 - Allow certmonger_t start/status generic services Resolves: rhbz#1436689 - Allow dirsrv read cgroup files. Resolves: rhbz#1436689 - Allow ganesha_t domain read/write infiniband devices. Resolves: rhbz#1383784 - Allow sendmail_t domain sysctl_net_t files Resolves: rhbz#1369376 - Allow targetd_t domain read network state and getattr on loop_control_device_t Resolves: rhbz#1373860 - Allow condor_schedd_t domain send mails. Resolves: rhbz#1277506 - Alow certmonger to create own systemd unit files. Resolves: rhbz#1436689 - Allow staff to systemctl virt server when staff_use_svirt=1 Resolves: rhbz#1415841 - Allow unconfined_t create /tmp/ca.p12 file with ipa_tmp_t context Resolves: rhbz#1432115 - Label /sysroot/ostree/deploy/rhel-atomic-host/* as root_t Resolves: rhbz#1428112- Alow certmonger to create own systemd unit files. Resolves: rhbz#1436689- Hide broken symptoms when using kernel 3.10.0-514+ with network bonding. Postfix_picup_t domain requires NET_ADMIN capability which is not really needed. Resolves: rhbz#1431859 - Fix policy to reflect all changes in new IPA release Resolves: rhbz#1432115 Resolves: rhbz#1436689- Allow sbd_t to read/write fixed disk devices Resolves: rhbz#1440165 - Add sys_ptrace capability to radiusd_t domain Resolves: rhbz#1426641 - Allow cockpit_session_t domain connects to ssh tcp ports. Resolves: rhbz#1413509- Update tomcat policy to make working ipa install process Resolves: rhbz#1436689- Allow pcp_pmcd_t net_admin capability. - Allow pcp_pmcd_t read net sysctls - Allow system_cronjob_t create /var/run/pcp with pcp_var_run_t Resolves: rhbz#1336211- Fix all AVC denials during pkispawn of CA Resolves: rhbz#1436383 - Update pki interfaces and tomcat module Resolves: rhbz#1436689- Update pki interfaces and tomcat module Resolves: rhbz#1436689- Dontaudit firewalld wants write to /root Resolves: rhbz#1438708 - Dontaudit firewalld to create dirs in /root/ Resolves: rhbz#1438708 - Allow sendmail to search network sysctls Resolves: rhbz#1369376 - Add interface gssd_noatsecure() Resolves: rhbz#1438036 - Add interface gssproxy_noatsecure() Resolves: rhbz#1438036 - Dontaudit pcp_pmlogger_t search for xserver logs. Allow pcp_pmlogger_t to send signals to unconfined doamins Allow pcp_pmlogger_t to send logs to journals Resolves: rhbz#1379371 - Allow chronyd_t net_admin capability to allow support HW timestamping. Resolves: rhbz#1416015 - Update tomcat policy Resolves: rhbz#1436689 Resolves: rhbz#1436383 - Allow certmonger to start haproxy service Resolves: rhbz#1349394 - Allow init noatsecure for gssd and gssproxy Resolves: rhbz#1438036- geoclue wants to dbus chat with avahi Resolves: rhbz#1434286 - Allow iptables get list of kernel modules Resolves: rhbz#1367520 - Allow unconfined_domain_type to enable/disable transient unit Resolves: rhbz#1337041 - Add interfaces init_enable_transient_unit() and init_disable_transient_unit - Revert "Allow sshd setcap capability. This is needed due to latest changes in sshd" Resolves: rhbz#1435264 - Label sysroot dir under ostree as root_t Resolves: rhbz#1428112- Remove ganesha_t domain from permissive domains. Resolves: rhbz#1436988- Allow named_t domain bind on several udp ports Resolves: rhbz#1312972 - Update nscd_use() interface Resolves: rhbz#1281716 - Allow radius_t domain ptrace Resolves: rhbz#1426641 - Update nagios to allos exec systemctl Resolves: rhbz#1247635 - Update pcp SELinux module to reflect all pcp changes Resolves: rhbz#1271998 - Label /var/lib/ssl_db as squid_cache_t Label /etc/squid/ssl_db as squid_cache_t Resolves: rhbz#1325527 - Allow pcp_pmcd_t domain search for network sysctl Allow pcp_pmcd_t domain sys_ptrace capability Resolves: rhbz#1336211- Allow drbd load modules Resolves: rhbz#1134883 - Revert "Add sys_module capability for drbd Resolves: rhbz#1134883" - Allow stapserver list kernel modules Resolves: rhbz#1325976 - Update targetd policy Resolves: rhbz#1373860 - Add sys_admin capability to amanda Resolves: rhbz#1371561 - Allow hypervvssd_t to read all dirs. Resolves: rhbz#1331309 - Label /run/haproxy.sock socket as haproxy_var_run_t Resolves: rhbz#1386233 - Allow oddjob_mkhomedir_t to mamange autofs_t dirs. Resolves: rhbz#1408819 - Allow tomcat to connect on http_cache_port_t Resolves: rhbz#1432083 - Allow geoclue to send msgs to syslog. Resolves: rhbz#1434286 - Allow condor_master_t domain capability chown. Resolves: rhbz#1277506 - Update mta_filetrans_named_content() interface to allow calling domain create files labeled as etc_aliases_t in dir labeled as etc_mail_t. Resolves: rhbz#1167468 - Allow nova domain search for httpd configuration. Resolves: rhbz#1190761 - Add sys_module capability for drbd Resolves: rhbz#1134883 - Allow user_u users stream connect to dirsrv, Allow sysadm_u and staff_u users to manage dirsrv files Resolves: rhbz#1286474 - Allow systemd_networkd_t communicate with systemd_networkd_t via dbus Resolves: rhbz#1278010- Add haproxy_t domain fowner capability Resolves: rhbz#1386233 - Allow domain transition from ntpd_t to hwclock_t domains Resolves: rhbz#1375624 - Allow cockpit_session_t setrlimit and sys_resource Resolves: rhbz#1402316 - Dontaudit svirt_t read state of libvirtd domain Resolves: rhbz#1426106 - Update httpd and gssproxy modules to reflects latest changes in freeipa Resolves: rhbz#1432115 - Allow iptables read modules_conf_t Resolves: rhbz#1367520- Remove tomcat_t domain from unconfined domains Resolves: rhbz#1432083 - Create new boolean: sanlock_enable_home_dirs() Resolves: rhbz#1432783 - Allow mdadm_t domain to read/write nvme_device_t Resolves: rhbz#1431617 - Remove httpd_user_*_content_t domains from user_home_type attribute. This tighten httpd policy and acces to user data will be more strinct, and also fix mutual influente between httpd_enable_homedirs and httpd_read_user_content Resolves: rhbz#1383621 - Dontaudit domain to create any file in /proc. This is kernel bug. Resolves: rhbz#1412679 - Add interface dev_rw_nvme Resolves: rhbz#1431617- Allow gssproxy to get attributes on all filesystem object types. Resolves: rhbz#1430295 - Allow ganesha to chat with unconfined domains via dbus Resolves: rhbz#1426554 - add the policy required for nextcloud Resolves: rhbz#1425530 - Add nmbd_t capability2 block_suspend Resolves: rhbz#1425357 - Label /var/run/chrony as chronyd_var_run_t Resolves: rhbz#1416015 - Add domain transition from sosreport_t to iptables_t Resolves: rhbz#1359789 - Fix path to /usr/lib64/erlang/erts-5.10.4/bin/epmd Resolves: rhbz:#1332803- Update rpm macros Resolves: rhbz#1380854- Add handling booleans via selinux-policy macros in custom policy spec files. Resolves: rhbz#1380854- Allow openvswitch to load kernel modules Resolves: rhbz#1405479- Allow openvswitch read script state. Resolves: rhbz#1405479- Update ganesha policy Resolves: rhbz#1426554 Resolves: rhbz#1383784 - Allow chronyd to read adjtime Resolves: rhbz#1416015 - Fixes for chrony version 2.2 Resolves: rhbz#1416015 - Add interface virt_rw_stream_sockets_svirt() Resolves: rhbz#1415841 - Label /dev/ss0 as gpfs_device_t Resolves: rhbz#1383784 - Allow staff to rw svirt unix stream sockets. Resolves: rhbz#1415841 - Label /rhev/data-center/mnt as mnt_t Resolves: rhbz#1408275 - Associate sysctl_rpc_t with proc filesystems Resolves: rhbz#1350927 - Add new boolean: domain_can_write_kmsg Resolves: rhbz#1415715- Allow rhsmcertd_t dbus chat with system_cronjob_t Resolves: rhbz#1405341 - Allow openvswitch exec hostname and readinitrc_t files Resolves: rhbz#1405479 - Improve SELinux context for mysql_db_t objects. Resolves: rhbz#1391521 - Allow postfix_postdrop to communicate with postfix_master via pipe. Resolves: rhbz#1379736 - Add radius_use_jit boolean Resolves: rhbz#1426205 - Label /var/lock/subsys/iptables as iptables_lock_t Resolves: rhbz#1405441 - Label /usr/lib64/erlang/erts-5.10.4/bin/epmd as lib_t Resolves: rhbz#1332803 - Allow can_load_kernmodule to load kernel modules. Resolves: rhbz#1423427 Resolves: rhbz#1424621- Allow nfsd_t domain to create sysctls_rpc_t files Resolves: rhbz#1405304 - Allow openvswitch to create netlink generic sockets. Resolves: rhbz#1397974 - Create kernel_create_rpc_sysctls() interface Resolves: rhbz#1405304- Allow nfsd_t domain rw sysctl_rpc_t dirs Resolves: rhbz#1405304 - Allow cgdcbxd_t to manage cgroup files. Resolves: rhbz#1358493 - Allow cmirrord_t domain to create netlink_connector sockets Resolves: rhbz#1412670 - Allow fcoemon to create netlink scsitransport sockets Resolves: rhbz#1362496 - Allow quota_nld_t create netlink_generic sockets Resolves: rhbz#1358679 - Allow cgred_t create netlink_connector sockets Resolves: rhbz#1376357 - Add dhcpd_t domain fowner capability Resolves: rhbz#1358485 - Allow acpid to attempt to connect to the Linux kernel via generic netlink socket. Resolves: rhbz#1358478 - Rename docker module to container module Resolves: rhbz#1386916 - Allow setflies to mount tracefs Resolves: rhbz#1376357 - Allow iptables to read nsfs files. Resolves: rhbz#1411316 - Allow systemd_bootchart_t domain create dgram sockets. Resolves: rhbz#1365953 - Rename docker interfaces to container Resolves: rhbz#1386916- Allow initrc_t domain to run rhel-autorelabel script properly during boot process Resolves: rhbz#1379722 - Allow systemd_initctl_t to create and connect unix_dgram sockets Resolves: rhbz#1365947 - Allow ifconfig_t to mount/unmount nsfs_t filesystem Resolves: rhbz#1349814 - Add interfaces allowing mount/unmount nsfs_t filesystem Resolves: rhbz#1349814- Add interface init_stream_connectto() Resolves:rhbz#1365947 - Allow rhsmcertd domain signull kernel. Resolves: rhbz#1379781 - Allow kdumpgui domain to read nvme device - Allow insmod_t to load kernel modules Resolves: rhbz#1421598 - Add interface files_load_kernel_modules() Resolves: rhbz#1421598 - Add SELinux support for systemd-initctl daemon Resolves:rhbz#1365947 - Add SELinux support for systemd-bootchart Resolves: rhbz#1365953- Allow firewalld to getattr open search read modules_object_t:dir Resolves: rhbz#1418391 - Fix label for nagios plugins in nagios file conxtext file Resolves: rhbz#1277718 - Add sys_ptrace capability to pegasus domain Resolves: rhbz#1381238 - Allow sssd_t domain setpgid Resolves:rhbz#1416780 - After the latest changes in nfsd. We should allow nfsd_t to read raw fixed disk. Resolves: rhbz#1350927 - Allow kdumpgui domain to read nvme device Resolves: rhbz#1415084 - su using libselinux and creating netlink_selinux socket is needed to allow libselinux initialization. Resolves: rhbz#1146987 - Add user namespace capability object classes. Resolves: rhbz#1368057 - Add module_load permission to class system Resolves:rhbz#1368057 - Add the validate_trans access vector to the security class Resolves: rhbz#1368057 - Add "binder" security class and access vectors Resolves: rhbz#1368057 - Allow ifconfig_t domain read nsfs_t Resolves: rhbz#1349814 - Allow ping_t domain to load kernel modules. Resolves: rhbz#1388363- Allow systemd container to read/write usermodehelperstate Resolves: rhbz#1403254 - Label udp ports in range 24007-24027 as gluster_port_t Resolves: rhbz#1404152- Allow glusterd_t to bind on glusterd_port_t udp ports. Resolves: rhbz#1404152 - Revert: Allow glusterd_t to bind on med_tlp port.- Allow glusterd_t to bind on med_tlp port. Resolves: rhbz#1404152 - Update ctdbd_t policy to reflect all changes. Resolves: rhbz#1402451 - Label tcp port 24009 as med_tlp_port_t Resolves: rhbz#1404152 - Issue appears during update directly from RHEL-7.0 to RHEL-7.3 or above. Modules pkcsslotd and vbetools missing in selinux-policy package for RHEL-7.3 which causing warnings during SELinux policy store migration process. Following patch fixes issue by skipping pkcsslotd and vbetools modules migration.- Allow ctdbd_t domain transition to rpcd_t Resolves:rhbz#1402451- Fixes for containers Allow containers to attempt to write to unix_sysctls. Allow cotainers to use the FD's leaked to them from parent processes. Resolves: rhbz#1403254- Allow glusterd_t send signals to userdomain. Label new glusterd binaries as glusterd_exec_t Resolves: rhbz#1404152 - Allow systemd to stop glusterd_t domains. Resolves: rhbz#1400493- Make working CTDB:NFS: CTDB failover from selinux-policy POV Resolves: rhbz#1402451- Add kdump_t domain sys_admin capability Resolves: rhbz#1375963- Allow puppetagent_t to access timedated dbus. Use the systemd_dbus_chat_timedated interface to allow puppetagent_t the access. Resolves: rhbz#1399250- Update systemd on RHEL-7.2 box to version from RHEL-7.3 and then as a separate yum command update the selinux policy systemd will start generating USER_AVC denials and will start returning "Access Denied" errors to DBus clients Resolves: rhbz#1393505- Allow cluster_t communicate to fprintd_t via dbus Resolves: rhbz#1349798- Fix error message during update from RHEL-7.2 to RHEL-7.3, when /usr/sbin/semanage command is not installed and selinux-policy-migrate-local-changes.sh script is executed in %post install phase of selinux-policy package Resolves: rhbz#1392010- Allow GlusterFS with RDMA transport to be started correctly. It requires ipc_lock capability together with rw permission on rdma_cm device. Resolves: rhbz#1384488 - Allow glusterd to get attributes on /sys/kernel/config directory. Resolves: rhbz#1384483- Use selinux-policy-migrate-local-changes.sh instead of migrateStore* macros - Add selinux-policy-migrate-local-changes service Resolves: rhbz#1381588- Allow sssd_selinux_manager_t to manage also dir class. Resolves: rhbz#1368097 - Add interface seutil_manage_default_contexts_dirs() Resolves: rhbz#1368097- Add virt_sandbox_use_nfs -> virt_use_nfs boolean substitution. Resolves: rhbz#1355783- Allow pcp_pmcd_t domain transition to lvm_t Add capability kill and sys_ptrace to pcp_pmlogger_t Resolves: rhbz#1309883- Allow ftp daemon to manage apache_user_content Resolves: rhbz#1097775 - Label /etc/sysconfig/oracleasm as oracleasm_conf_t Resolves: rhbz#1331383 - Allow oracleasm to rw inherited fixed disk device Resolves: rhbz#1331383 - Allow collectd to connect on unix_stream_socket Resolves: rhbz#1377259- Allow iscsid create netlink iscsid sockets. Resolves: rhbz#1358266 - Improve regexp for power_unit_file_t files. To catch just systemd power unit files. Resolves: rhbz#1375462- Update oracleasm SELinux module that can manage oracleasmfs_t blk files. Add dac_override cap to oracleasm_t domain. Resolves: rhbz#1331383 - Add few rules to pcp SELinux module to make ti able to start pcp_pmlogger service Resolves: rhbz#1206525- Add oracleasm_conf_t type and allow oracleasm_t to create /dev/oracleasm Resolves: rhbz#1331383 - Label /usr/share/pcp/lib/pmie as pmie_exec_t and /usr/share/pcp/lib/pmlogger as pmlogger_exec_t Resolves: rhbz#1206525 - Allow mdadm_t to getattr all device nodes Resolves: rhbz#1365171 - Add interface dbus_dontaudit_stream_connect_system_dbusd() Resolves:rhbz#1052880 - Add virt_stub_* interfaces for docker policy which is no longer a part of our base policy. Resolves: rhbz#1372705 - Allow guest-set-user-passwd to set users password. Resolves: rhbz#1369693 - Allow samdbox domains to use msg class Resolves: rhbz#1372677 - Allow domains using kerberos to read also kerberos config dirs Resolves: rhbz#1368492 - Allow svirt_sandbox_domains to r/w onload sockets Resolves: rhbz#1342930 - Add interface fs_manage_oracleasm() Resolves: rhbz#1331383 - Label /dev/kfd as hsa_device_t Resolves: rhbz#1373488 - Update seutil_manage_file_contexts() interface that caller domain can also manage file_context_t dirs Resolves: rhbz#1368097 - Add interface to write to nsfs inodes Resolves: rhbz#1372705 - Allow systemd services to use PrivateNetwork feature Resolves: rhbz#1372705 - Add a type and genfscon for nsfs. Resolves: rhbz#1372705 - Allow run sulogin_t in range mls_systemlow-mls_systemhigh. Resolves: rhbz#1290400- Allow arpwatch to create netlink netfilter sockets. Resolves: rhbz#1358261 - Fix file context for /etc/pki/pki-tomcat/ca/ - new interface oddjob_mkhomedir_entrypoint() - Move label for /var/lib/docker/vfs/ to proper SELinux module - Allow mdadm to get attributes from all devices. - Label /etc/puppetlabs as puppet_etc_t. - Allow systemd-machined to communicate to lxc container using dbus - Allow systemd_resolved to send dbus msgs to userdomains Resolves: rhbz#1236579 - Allow systemd-resolved to read network sysctls Resolves: rhbz#1236579 - Allow systemd_resolved to connect on system bus. Resolves: rhbz#1236579 - Make entrypoint oddjob_mkhomedir_exec_t for unconfined_t - Label all files in /dev/oracleasmfs/ as oracleasmfs_t Resolves: rhbz#1331383- Label /etc/pki/pki-tomcat/ca/ as pki_tomcat_cert_t Resolves:rhbz#1366915 - Allow certmonger to manage all systemd unit files Resolves:rhbz#1366915 - Grant certmonger "chown" capability Resolves:rhbz#1366915 - Allow ipa_helper_t stream connect to dirsrv_t domain Resolves: rhbz#1368418 - Update oracleasm SELinux module Resolves: rhbz#1331383 - label /var/lib/kubelet as svirt_sandbox_file_t Resolves: rhbz#1369159 - Add few interfaces to cloudform.if file Resolves: rhbz#1367834 - Label /var/run/corosync-qnetd and /var/run/corosync-qdevice as cluster_var_run_t. Note: corosync policy is now par of rhcs module Resolves: rhbz#1347514 - Allow krb5kdc_t to read krb4kdc_conf_t dirs. Resolves: rhbz#1368492 - Update networkmanager_filetrans_named_content() interface to allow source domain to create also temad dir in /var/run. Resolves: rhbz#1365653 - Allow teamd running as NetworkManager_t to access netlink_generic_socket to allow multiple network interfaces to be teamed together. Resolves: rhbz#1365653 - Label /dev/oracleasmfs as oracleasmfs_t. Add few interfaces related to oracleasmfs_t type Resolves: rhbz#1331383 - A new version of cloud-init that supports the effort to provision RHEL Atomic on Microsoft Azure requires some a new rules that allows dhclient/dhclient hooks to call cloud-init. Resolves: rhbz#1367834 - Allow iptables to creating netlink generic sockets. Resolves: rhbz#1364359- Allow ipmievd domain to create lock files in /var/lock/subsys/ Resolves:rhbz#1349058 - Update policy for ipmievd daemon. Resolves:rhbz#1349058 - Dontaudit hyperkvp to getattr on non security files. Resolves: rhbz#1349356 - Label /run/corosync-qdevice and /run/corosync-qnetd as corosync_var_run_t Resolves: rhbz#1347514 - Fixed lsm SELinux module - Add sys_admin capability to sbd domain Resolves: rhbz#1322725 - Allow vdagent to comunnicate with systemd-logind via dbus Resolves: rhbz#1366731 - Allow lsmd_plugin_t domain to create fixed_disk device. Resolves: rhbz#1238066 - Allow opendnssec domain to create and manage own tmp dirs/files Resolves: rhbz#1366649 - Allow opendnssec domain to read system state Resolves: rhbz#1366649 - Update opendnssec_manage_config() interface to allow caller domain also manage opendnssec_conf_t dirs Resolves: rhbz#1366649 - Allow rasdaemon to mount/unmount tracefs filesystem. Resolves: rhbz#1364380 - Label /usr/libexec/iptables/iptables.init as iptables_exec_t Allow iptables creating lock file in /var/lock/subsys/ Resolves: rhbz#1367520 - Modify interface den_read_nvme() to allow also read nvme_device_t block files. Resolves: rhbz#1362564 - Label /var/run/storaged as lvm_var_run_t. Resolves: rhbz#1264390 - Allow unconfineduser to run ipa_helper_t. Resolves: rhbz#1361636- Dontaudit mock to write to generic certs. Resolves: rhbz#1271209 - Add labeling for corosync-qdevice and corosync-qnetd daemons, to run as cluster_t Resolves: rhbz#1347514 - Revert "Label corosync-qnetd and corosync-qdevice as corosync_t domain" - Allow modemmanager to write to systemd inhibit pipes Resolves: rhbz#1365214 - Label corosync-qnetd and corosync-qdevice as corosync_t domain Resolves: rhbz#1347514 - Allow ipa_helper to read network state Resolves: rhbz#1361636 - Label oddjob_reqiest as oddjob_exec_t Resolves: rhbz#1361636 - Add interface oddjob_run() Resolves: rhbz#1361636 - Allow modemmanager chat with systemd_logind via dbus Resolves: rhbz#1362273 - Allow NetworkManager chat with puppetagent via dbus Resolves: rhbz#1363989 - Allow NetworkManager chat with kdumpctl via dbus Resolves: rhbz#1363977 - Allow sbd send msgs to syslog Allow sbd create dgram sockets. Allow sbd to communicate with kernel via dgram socket Allow sbd r/w kernel sysctls. Resolves: rhbz#1322725 - Allow ipmievd_t domain to re-create ipmi devices Label /usr/libexec/openipmi-helper as ipmievd_exec_t Resolves: rhbz#1349058 - Allow rasdaemon to use tracefs filesystem. Resolves: rhbz#1364380 - Fix typo bug in dirsrv policy - Some logrotate scripts run su and then su runs unix_chkpwd. Allow logrotate_t domain to check passwd. Resolves: rhbz#1283134 - Add ipc_lock capability to sssd domain. Allow sssd connect to http_cache_t Resolves: rhbz#1362688 - Allow dirsrv to read dirsrv_share_t content Resolves: rhbz#1363662 - Allow virtlogd_t to append svirt_image_t files. Resolves: rhbz#1358140 - Allow hypervkvp domain to read hugetlbfs dir/files. Resolves: rhbz#1349356 - Allow mdadm daemon to read nvme_device_t blk files Resolves: rhbz#1362564 - Allow selinuxusers and unconfineduser to run oddjob_request Resolves: rhbz#1361636 - Allow sshd server to acces to Crypto Express 4 (CEX4) devices. Resolves: rhbz#1362539 - Fix labeling issue in init.fc file. Path /usr/lib/systemd/fedora-* changed to /usr/lib/systemd/rhel-*. Resolves: rhbz#1363769 - Fix typo in device interfaces Resolves: rhbz#1349058 - Add interfaces for managing ipmi devices Resolves: rhbz#1349058 - Add interfaces to allow mounting/umounting tracefs filesystem Resolves: rhbz#1364380 - Add interfaces to allow rw tracefs filesystem Resolves: rhbz#1364380 - Add interface dev_read_nvme() to allow reading Non-Volatile Memory Host Controller devices. Resolves: rhbz#1362564 - Label /sys/kernel/debug/tracing filesystem Resolves: rhbz#1364380 - Allow sshd setcap capability. This is needed due to latest changes in sshd Resolves: rhbz#1357857- Dontaudit mock_build_t can list all ptys. Resolves: rhbz#1271209 - Allow ftpd_t to mamange userhome data without any boolean. Resolves: rhbz#1097775 - Add logrotate permissions for creating netlink selinux sockets. Resolves: rhbz#1283134 - Allow lsmd_plugin_t to exec ldconfig. Resolves: rhbz#1238066 - Allow vnstatd domain to read /sys/class/net/ files Resolves: rhbz#1358243 - Remove duplicate allow rules in spamassassin SELinux module Resolves:rhbz#1358175 - Allow spamc_t and spamd_t domains create .spamassassin file in user homedirs Resolves:rhbz#1358175 - Allow sshd setcap capability. This is needed due to latest changes in sshd Resolves: rhbz#1357857 - Add new MLS attribute to allow relabeling objects higher than system low. This exception is needed for package managers when processing sensitive data. Resolves: rhbz#1330464 - Allow gnome-keyring also manage user_tmp_t sockets. Resolves: rhbz#1257057 - corecmd: Remove fcontext for /etc/sysconfig/libvirtd Resolves:rhbz#1351382- Allow ipa_dnskey domain to search cache dirs Resolves: rhbz#1350957- Allow ipa-dnskey read system state. Reasolves: rhbz#1350957 - Allow dogtag-ipa-ca-renew-agent-submit labeled as certmonger_t to create /var/log/ipa/renew.log file Resolves: rhbz#1350957- Allow firewalld to manage net_conf_t files. Resolves:rhbz#1304723 - Allow logrotate read logs inside containers. Resolves: rhbz#1303514 - Allow sssd to getattr on fs_t Resolves: rhbz#1356082 - Allow opendnssec domain to manage bind chace files Resolves: rhbz#1350957 - Fix typo in rhsmcertd policy module Resolves: rhbz#1329475 - Allow systemd to get status of systemd-logind daemon Resolves: rhbz#1356141 - Label more ndctl devices not just ndctl0 Resolves: rhbz#1355809- Allow rhsmcertd to copy certs into /etc/docker/cert.d - Add interface docker_rw_config() Resolves: rhbz#1344500 - Fix logrotate fc file to label also /var/lib/logrotate/ dir as logrotate_var_lib_t Resolves: rhbz#1355632 - Allow rhsmcertd to read network sysctls Resolves: rhbz#1329475 - Label /var/log/graphite-web dir as httpd_log_t Resolves: rhbz#1310898 - Allow mock to use generic ptys Resolves: rhbz#1271209 - Allow adcli running as sssd_t to write krb5.keytab file. Resolves: rhbz#1356082 - Allow openvswitch connect to openvswitch_port_t type. Resolves: rhbz#1335024 - Add SELinux policy for opendnssec service. Resolves: rhbz#1350957 - Create new SELinux type for /usr/libexec/ipa/ipa-dnskeysyncd Resolves: rhbz#1350957 - label /dev/ndctl0 device as nvram_device_t Resolves: rhbz#1355809- Allow lttng tools to block suspending Resolves: rhbz#1256374 - Allow creation of vpnaas in openstack Resolves: rhbz#1352710 - virt: add strict policy for virtlogd daemon Resolves:rhbz#1311606 - Update makefile to support snapperd_contexts file Resolves: rhbz#1352681- Allow udev to manage systemd-hwdb files - Add interface systemd_hwdb_manage_config() Resolves: rhbz#1350756 - Fix paths to infiniband devices. This allows use more then two infiniband interfaces. Resolves: rhbz#1210263- Allow virtual machines to rw infiniband devices. Resolves: rhbz#1210263 - Allow opensm daemon to rw infiniband_mgmt_device_t Resolves: rhbz#1210263 - Allow systemd_hwdb_t to relabel /etc/udev/hwdb.bin file. Resolves: rhbz#1350756 - Make label for new infiniband_mgmt deivices Resolves: rhbz#1210263- Fix typo in brltty SELinux module - Add new SELinux module sbd Resolves: rhbz#1322725 - Allow pcp dmcache metrics collection Resolves: rhbz#1309883 - Allow pkcs_slotd_t to create dir in /var/lock Add label pkcs_slotd_log_t Resolves: rhbz#1350782 - Allow openvpn to create sock files labeled as openvpn_var_run_t Resolves: rhbz#1328246 - Allow hypervkvp daemon to getattr on all filesystem types. Resolves: rhbz#1349356 - Allow firewalld to create net_conf_t files Resolves: rhbz#1304723 - Allow mock to use lvm Resolves: rhbz#1271209 - Allow keepalived to create netlink generic sockets. Resolves: rhbz#1349809 - Allow mirromanager creating log files in /tmp Resolves:rhbz#1328818 - Rename few modules to make it consistent with source files Resolves: rhbz#1351445 - Allow vmtools_t to transition to rpm_script domain Resolves: rhbz#1342119 - Allow nsd daemon to manage nsd_conf_t dirs and files Resolves: rhbz#1349791 - Allow cluster to create dirs in /var/run labeled as cluster_var_run_t Resolves: rhbz#1346900 - Allow sssd read also sssd_conf_t dirs Resolves: rhbz#1350535 - Dontaudit su_role_template interface to getattr /proc/kcore Dontaudit su_role_template interface to getattr /dev/initctl Resolves: rhbz#1086240 - Add interface lvm_getattr_exec_files() Resolves: rhbz#1271209 - Fix typo Compliling vs. Compiling Resolves: rhbz#1351445- Allow krb5kdc_t to communicate with sssd Resolves: rhbz#1319933 - Allow prosody to bind on prosody ports Resolves: rhbz#1304664 - Add dac_override caps for fail2ban-client Resolves: rhbz#1316678 - dontaudit read access for svirt_t on the file /var/db/nscd/group Resolves: rhbz#1301637 - Allow inetd child process to communicate via dbus with systemd-logind Resolves: rhbz#1333726 - Add label for brltty log file Resolves: rhbz#1328818 - Allow dspam to read the passwd file Resolves: rhbz#1286020 - Allow snort_t to communicate with sssd Resolves: rhbz#1284908 - svirt_sandbox_domains need to be able to execmod for badly built libraries. Resolves: rhbz#1206339 - Add policy for lttng-tools package. Resolves: rhbz#1256374 - Make mirrormanager as application domain. Resolves: rhbz#1328234 - Add support for the default lttng-sessiond port - tcp/5345. This port is used by LTTng 2.x central tracing registry session daemon. - Add prosody ports Resolves: rhbz#1304664 - Allow sssd read also sssd_conf_t dirs Resolves: rhbz#1350535- Label /var/lib/softhsm as named_cache_t. Allow named_t to manage named_cache_t dirs. Resolves:rhbz#1331315 - Label named-pkcs11 binary as named_exec_t. Resolves: rhbz#1331315 - Allow glusterd daemon to get systemd status Resolves: rhbz#1321785 - Allow logrotate dbus-chat with system_logind daemon Resolves: rhbz#1283134 - Allow pcp_pmlogger to read kernel network state Allow pcp_pmcd to read cron pid files Resolves: rhbz#1336211 - Add interface cron_read_pid_files() Resolves: rhbz#1336211 - Allow pcp_pmlogger to create unix dgram sockets Resolves: rhbz#1336211 - Add hwloc-dump-hwdata SELinux policy Resolves: rhbz#1344054 - Remove non-existing jabberd_spool_t() interface and add new jabbertd_var_spool_t. Resolves: rhbz#1121171 - Remove non-existing interface salk_resetd_systemctl() and replace it with sanlock_systemctl_sanlk_resetd() Resolves: rhbz#1259764 - Create label for openhpid log files. esolves: rhbz#1259764 - Label /var/lib/ganglia as httpd_var_lib_t Resolves: rhbz#1260536 - Allow firewalld_t to create entries in net_conf_t dirs. Resolves: rhbz#1304723 - Allow journalctl to read syslogd_var_run_t files. This allows to staff_t and sysadm_t to read journals Resolves: rhbz#1288255 - Include patch from distgit repo: policy-RHEL-7.1-flask.patch. Resolves: rhbz#1329560 - Update refpolicy to handle hwloc Resolves: rhbz#1344054 - Label /etc/dhcp/scripts dir as bin_t - Allow sysadm_role to run journalctl_t domain. This allows sysadm user to read journals. Resolves: rhbz#1288255- Allow firewalld_t to create entries in net_conf_t dirs. Resolves: rhbz#1304723 - Allow journalctl to read syslogd_var_run_t files. This allows to staff_t and sysadm_t to read journals Resolves: rhbz#1288255 - Allow mongod log to syslog. Resolves: rhbz#1306995 - Allow rhsmcertd connect to port tcp 9090 Resolves: rhbz#1337319 - Label for /bin/mail(x) was removed but /usr/bin/mail(x) not. This path is also needed to remove. Resolves: rhbz#1262483 Resolves: rhbz#1277506 - Label /usr/libexec/mimedefang-wrapper as spamd_exec_t. Resolves: rhbz#1301516 - Add new boolean spamd_update_can_network. Resolves: rhbz#1305469 - Allow rhsmcertd connect to tcp netport_port_t Resolves: rhbz#1329475 - Fix SELinux context for /usr/share/mirrormanager/server/mirrormanager to Label all binaries under dir as mirrormanager_exec_t. Resolves: rhbz#1328234 - Allow prosody to bind to fac_restore tcp port. Resolves: rhbz#1321787 - Allow ninfod to read raw packets Resolves: rhbz#1317964 - Allow pegasus get attributes from qemu binary files. Resolves: rhbz#1260835 - Allow pegasus get attributes from qemu binary files. Resolves: rhbz#1271159 - Allow tuned to use policykit. This change is required by cockpit. Resolves: rhbz#1346464 - Allow conman_t to read dir with conman_unconfined_script_t binary files. Resolves: rhbz#1297323 - Allow pegasus to read /proc/sysinfo. Resolves: rhbz#1265883 - Allow sysadm_role to run journalctl_t domain. This allows sysadm user to read journals. Resolves: rhbz#1288255 - Label tcp ports:16379, 26379 as redis_port_t Resolves: rhbz#1348471 - Allow systemd to relabel /var and /var/lib directories during boot. - Add files_relabel_var_dirs() and files_relabel_var_dirs() interfaces. - Add files_relabelto_var_lib_dirs() interface. - Label tcp port 2004 as mailbox_port_t. Resolves: rhbz#1332843 - Label tcp and udp port 5582 as fac_restore_port_t Resolves: rhbz#1321787 - Allow sysadm_t user to run postgresql-setup. Resolves: rhbz#1282543 - Allow sysadm_t user to dbus chat with oddjob_t. This allows confined admin run oddjob mkhomedirfor script. Resolves: rhbz#1297480 - Update netlink socket classes.- Allow conman to kill conman_unconfined_script. Resolves: rhbz#1297323 - Make conman_unconfined_script_t as init_system_domain. Resolves:rhbz#1297323 - Allow init dbus chat with apmd. Resolves:rhbz#995898 - Patch /var/lib/rpm is symlink to /usr/share/rpm on Atomic, due to this change we need to label also /usr/share/rpm as rpm_var_lib_t. Resolves: rhbz#1233252 - Dontaudit xguest_gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Add mediawiki rules to proper scope Resolves: rhbz#1301186 - Dontaudit xguest_gkeyringd_t stream connect to system_dbusd_t Resolves: rhbz#1052880 - Allow mysqld_safe to inherit rlimit information from mysqld Resolves: rhbz#1323673 - Allow collectd_t to stream connect to postgresql. Resolves: rhbz#1344056 - Allow mediawiki-script to read /etc/passwd file. Resolves: rhbz#1301186 - Add filetrans rule that NetworkManager_t can create net_conf_t files in /etc. Resolves: rhbz#1344505 - Add labels for mediawiki123 Resolves: rhbz#1293872 - Fix label for all fence_scsi_check scripts - Allow ip netns to mounton root fs and unmount proc_t fs. Resolves: rhbz#1343776 Resolves: rhbz#1286851 - Allow sysadm_t to run newaliases command. Resolves: rhbz#1344828 - Add interface sysnet_filetrans_named_net_conf() Resolves: rhbz#1344505- Fix several issues related to the SELinux Userspace changes- Allow glusterd domain read krb5_keytab_t files. Resolves: rhbz#1343929 - Fix typo in files_setattr_non_security_dirs. Resolves: rhbz#1115987- Allow tmpreaper_t to read/setattr all non_security_file_type dirs Resolves: rhbz#1115987 - Allow firewalld to create firewalld_var_run_t directory. Resolves: rhbz#1304723 - Add interface firewalld_read_pid_files() Resolves: rhbz#1304723 - Label /usr/libexec/rpm-ostreed as rpm_exec_t. Resolves: rhbz#1340542 - Allow sanlock service to read/write cephfs_t files. Resolves: rhbz#1315332 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added missing docker interfaces: - docker_typebounds - docker_entrypoint Resolves: rhbz#1236580 - Add interface files_setattr_non_security_dirs() Resolves: rhbz#1115987 - Add support for onloadfs - Allow iptables to read firewalld pid files. Resolves: rhbz#1304723 - Add SELinux support for ceph filesystem. Resolves: rhbz#1315332 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) Resolves: rhbz#1236580- Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added missing docker interfaces: - docker_typebounds - docker_entrypoint Resolves: rhbz#1236580 - New interfaces needed for systemd-machinectl Resolves: rhbz#1236580 - New interfaces needed by systemd-machine Resolves: rhbz#1236580 - Add interface allowing sending and receiving messages from virt over dbus. Resolves: rhbz#1236580 - Backport docker policy from Fedora. Related: #1303123 Resolves: #1341257 - Allow NetworkManager_t and policykit_t read access to systemd-machined pid files. Resolves: rhbz#1236580 - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) - Added interfaces needed by new docker policy. Related: rhbz#1303123 - Add support for systemd-machined daemon Resolves: rhbz#1236580 - Allow rpm-ostree domain transition to install_t domain from init_t. Resolves: rhbz#1340542- dnsmasq: allow NetworkManager to control dnsmasq via D-Bus Resolves: rhbz#1336722 - Directory Server (389-ds-base) has been updated to use systemd-ask-password. In order to function correctly we need the following added to dirsrv.te Resolves: rhbz#1333198 - sftpd_* booleans are functionless these days. Resolves: rhbz#1335656 - Label /var/log/ganesha.log as gluster_log_t Allow glusterd_t domain to create glusterd_log_t files. Label /var/run/ganesha.pid as gluster_var_run_t. Resolves: rhbz#1335828 - Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus. Resolves: rhbz#1336760 - Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t. Resolves: rhbz#1336737 - Label /usr/libexec/storaged/storaged as lvm_exec_t to run storaged daemon in lvm_t SELinux domain. Resolves: rhbz#1264390 - Allow systemd_hostanmed_t to read /proc/sysinfo labeled as sysctl_t. Resolves: rhbz#1337061 - Revert "Allow all domains some process flags." Resolves: rhbz#1303644 - Revert "Remove setrlimit to all domains." Resolves: rhbz#1303644 - Label /usr/sbin/xrdp* files as bin_t Resolves: rhbz#1276777 - Add mls support for some db classes Resolves: rhbz#1303651 - Allow systemd_resolved_t to check if ipv6 is disabled. Resolves: rhbz#1236579 - Allow systemd_resolved to read systemd_networkd run files. Resolves: rhbz#1236579- Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus. Resolves: rhbz#1336760 - Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t. Resolves: rhbz#1336737- Allow logwatch to domtrans to postqueue Resolves: rhbz#1331542 - Label /var/log/ganesha.log as gluster_log_t - Allow glusterd_t domain to create glusterd_log_t files. - Label /var/run/ganesha.pid as gluster_var_run_t. Resolves: rhbz#1335828 - Allow zabbix to connect to postgresql port Resolves: rhbz#1330479 - Add userdom_destroy_unpriv_user_shared_mem() interface. Related: rhbz#1306403 - systemd-logind remove all IPC objects owned by a user on a logout. This covers also SysV memory. This change allows to destroy unpriviledged user SysV shared memory segments. Resolves: rhbz#1306403- We need to restore contexts on /etc/passwd*,/etc/group*,/etc/*shadow* during install phase to get proper labeling for these files until selinux-policy pkgs are installed. Resolves: rhbz#1333952- Add interface glusterd_dontaudit_read_lib_dirs() Resolves: rhbz#1295680 - Dontaudit Occasionally observing AVC's while running geo-rep automation Resolves: rhbz#1295680 - Allow glusterd to manage socket files labeled as glusterd_brick_t. Resolves: rhbz#1331561 - Create new apache content template for files stored in user homedir. This change is needed to make working booleans: - httpd_enable_homedirs - httpd_read_user_content Resolves: rhbz#1246522 - Allow stunnel create log files. Resolves: rhbz#1296851 - Label tcp port 8181 as intermapper_port_t. Resolves: rhbz#1334783 - Label tcp/udp port 2024 as xinuexpansion4_port_t Resolves: rhbz#1334783 - Label tcp port 7002 as afs_pt_port_t Label tcp/udp port 2023 as xinuexpansion3_port_t Resolves: rhbz#1334783 - Dontaudit ldconfig read gluster lib files. Resolves: rhbz#1295680 - Add interface auth_use_nsswitch() to systemd_domain_template. Resolves: rhbz#1236579- Label /usr/bin/ganesha.nfsd as glusterd_exec_t to run ganesha as glusterd_t. Allow glusterd_t stream connect to rpbind_t. Allow cluster_t to create symlink /var/lib/nfs labeled as var_lib_nfs_t. Add interface rpc_filetrans_var_lib_nfs_content() Add new boolean: rpcd_use_fusefs to allow rpcd daemon use fusefs. Resolves: rhbz#1312809 Resolves: rhbz#1323947 - Allow dbus chat between httpd_t and oddjob_t. Resolves: rhbz#1324144 - Label /usr/libexec/ipa/oddjob/org.freeipa.server.conncheck as ipa_helper_exec_t. Resolves: rhbz#1324144 - Label /var/log/ipareplica-conncheck.log file as ipa_log_t Allow ipa_helper_t domain to manage logs labeledas ipa_log_t Allow ipa_helper_t to connect on http and kerberos_passwd ports. Resolves: rhbz#1324144 - Allow prosody to listen on port 5000 for mod_proxy65. Resolves: rhbz#1316918 - Allow pcp_pmcd_t domain to manage docker lib files. This rule is needed to allow pcp to collect container information when SELinux is enabled. Resolves: rhbz#1309454- Allow runnig php7 in fpm mode. From selinux-policy side, we need to allow httpd to read/write hugetlbfs. Resolves: rhbz#1319442 - Allow openvswitch daemons to run under openvswitch Linux user instead of root. This change needs allow set capabilities: chwon, setgid, setuid, setpcap. Resolves: rhbz#1296640 - Remove ftpd_home_dir() boolean from distro policy. Reason is that we cannot make this working due to m4 macro language limits. Resolves: rhbz#1097775 - /bin/mailx is labeled sendmail_exec_t, and enters the sendmail_t domain on execution. If /usr/sbin/sendmail does not have its own domain to transition to, and is not one of several products whose behavior is allowed by the sendmail_t policy, execution will fail. In this case we need to label /bin/mailx as bin_t. Resolves: rhbz#1262483 - Allow nsd daemon to create log file in /var/log as nsd_log_t Resolves: rhbz#1293140 - Sanlock policy update. - New sub-domain for sanlk-reset daemon Resolves: rhbz#1212324 - Label all run tgtd files, not just socket files Resolves: rhbz#1280280 - Label all run tgtd files, not just socket files. Resolves: rhbz#1280280 - Allow prosody to stream connect to sasl. This will allow using cyrus authentication in prosody. Resolves: rhbz#1321049 - unbound wants to use ephemeral ports as a default configuration. Allow to use also udp sockets. Resolves: rhbz#1318224 - Allow prosody to listen on port 5000 for mod_proxy65. Resolves: rhbz#1316918 - Allow targetd to read/write to /dev/mapper/control device. Resolves: rhbz#1063714 - Allow KDM to get status about power services. This change allow kdm to be able do shutdown. Resolves: rhbz#1316724 - Allow systemd-resolved daemon creating netlink_route sockets. Resolves:rhbz#1236579 - Allow systemd_resolved_t to read /etc/passwd file. Allow systemd_resolved_t to write to kmsg_device_t when 'systemd.log_target=kmsg' option is used Resolves: rhbz#1065362 - Label /etc/selinux/(minimum|mls|targeted)/active/ as semanage_store_t Resolves: rhbz#1321943 - Label all nvidia binaries as xserver_exec_t Resolves: rhbz#1322283- Create new permissivedomains CIL module and make it active. Resolves: rhbz#1320451 - Add support for new mock location - /usr/libexec/mock/mock. Resolves: rhbz#1271209 - Allow bitlee to create bitlee_var_t dirs. Resolves: rhbz#1268651 - Allow CIM provider to read sssd public files. Resolves: rhbz#1263339 - Fix some broken interfaces in distro policy. Resolves: rhbz#1121171 - Allow power button to shutdown the laptop. Resolves: rhbz#995898 - Allow lsm plugins to create named fixed disks. Resolves: rhbz#1238066 - Add default labeling for /etc/Pegasus/cimserver_current.conf. It is a correct patch instead of the current /etc/Pegasus/pegasus_current.confResolves: rhbz#1278777 - Allow hyperv domains to rw hyperv devices. Resolves: rhbz#1309361 - Label /var/www/html(/.*)?/wp_backups(/.*)? as httpd_sys_rw_content_t.Resolves: rhbz#1246780 - Create conman_unconfined_script_t type for conman script stored in /use/share/conman/exec/ Resolves: rhbz#1297323 - Fix rule definitions for httpd_can_sendmail boolean. We need to distinguish between base and contrib. - Add support for /dev/mptctl device used to check RAID status. Resolves: rhbz#1258029 - Create hyperv* devices and create rw interfaces for this devices. Resolves: rhbz#1309361 - Add fixes for selinux userspace moving the policy store to /var/lib/selinux. - Remove optional else block for dhcp ping- Allow rsync_export_all_ro boolean to read also non_auth_dirs/files/symlinks. Resolves: rhbz#1263770 - Fix context of "/usr/share/nginx/html". Resolves: rhbz#1261857 - Allow pmdaapache labeled as pcp_pmcd_t access to port 80 for apache diagnostics Resolves: rhbz#1270344 - Allow pmlogger to create pmlogger.primary.socket link file. Resolves: rhbz#1270344 - Label nagios scripts as httpd_sys_script_exec_t. Resolves: rhbz#1260306 - Add dontaudit interface for kdumpctl_tmp_t Resolves: rhbz#1156442 - Allow mdadm read files in EFI partition. Resolves: rhbz#1291801 - Allow nsd_t to bind on nsf_control tcp port. Allow nsd_crond_t to read nsd pid. Resolves: rhbz#1293140 - Label some new nsd binaries as nsd_exec_t Allow nsd domain net_admin cap. Create label nsd_tmp_t for nsd tmp files/dirs Resolves: rhbz#1293140 - Add filename transition that /etc/princap will be created with cupsd_rw_etc_t label in cups_filetrans_named_content() interface. Resolves: rhbz#1265102 - Add missing labeling for /usr/libexec/abrt-hook-ccpp. Resolves: rhbz#1213409 - Allow pcp_pmie and pcp_pmlogger to read all domains state. Resolves: rhbz#1206525 - Label /etc/redis-sentinel.conf as redis_conf_t. Allow redis_t write to redis_conf_t. Allow redis_t to connect on redis tcp port. Resolves: rhbz#1275246 - cockpit has grown content in /var/run directory Resolves: rhbz#1279429 - Allow collectd setgid capability Resolves:#1310898 - Remove declaration of empty booleans in virt policy. Resolves: rhbz#1103153 - Fix typo in drbd policy - Add new drbd file type: drbd_var_run_t. Allow drbd_t to manage drbd_var_run_t files/dirs. Allow drbd_t create drbd_tmp_t files in /tmp. Resolves: rhbz#1134883 - Label /etc/ctdb/events.d/* as ctdb_exec_t. Allow ctdbd_t to setattr on ctdbd_exec_t files. Resolves: rhbz#1293788 - Allow abrt-hook-ccpp to get attributes of all processes because of core_pattern. Resolves: rhbz#1254188 - Allow abrt_t to read sysctl_net_t files. Resolves: rhbz#1254188 - The ABRT coredump handler has code to emulate default core file creation The handler runs in a separate process with abrt_dump_oops_t SELinux process type. abrt-hook-ccpp also saves the core dump file in the very same way as kernel does and a user can specify CWD location for a coredump. abrt-hook-ccpp has been made as a SELinux aware apps to create this coredumps with correct labeling and with this commit the policy rules have been updated to allow access all non security files on a system. - Allow abrt-hook-ccpp to getattr on all executables. - Allow setuid/setgid capabilities for abrt-hook-ccpp. Resolves: rhbz#1254188 - abrt-hook-ccpp needs to have setfscreate access because it is SELinux aware and compute a target labeling. Resolves: rhbz#1254188 - Allow abrt-hook-ccpp to change SELinux user identity for created objects. Resolves: rhbz#1254188 - Dontaudit write access to inherited kdumpctl tmp files. Resolves: rbhz#1156442 - Add interface to allow reading files in efivarfs - contains Linux Kernel configuration options for UEFI systems (UEFI Runtime Variables) Resolves: rhbz#1291801 - Label 8952 tcp port as nsd_control. Resolves: rhbz#1293140 - Allow ipsec to use pam. Resolves: rhbz#1315700 - Allow to log out to gdm after screen was resized in session via vdagent. Resolves: rhbz#1249020 - Allow setrans daemon to read /proc/meminfo. Resolves: rhbz#1316804 - Allow systemd_networkd_t to write kmsg, when kernel was started with following params: systemd.debug systemd.log_level=debug systemd.log_target=kmsg Resolves: rhbz#1298151 - Label tcp port 5355 as llmnr-> Link-Local Multicast Name Resolution Resolves: rhbz#1236579 - Add new selinux policy for systemd-resolved dawmon. Resolves: rhbz#1236579 - Add interface ssh_getattr_server_keys() interface. Resolves: rhbz#1306197 - Allow run sshd-keygen on second boot if first boot fails after some reason and content is not syncedon the disk. These changes are reflecting this commit in sshd. http://pkgs.fedoraproject.org/cgit/rpms/openssh.git/commit/?id=af94f46861844cbd6ba4162115039bebcc8f78ba rhbz#1299106 Resolves: rhbz#1306197 - Allow systemd_notify_t to write to kmsg_device_t when 'systemd.log_target=kmsg' option is used. Resolves: rhbz#1309417 - Remove bin_t label for /etc/ctdb/events.d/. We need to label this scripts as ctdb_exec_t. Resolves: rhbz#1293788- Prepare selinux-policy package for userspace release 2016-02-23. Resolves: rhbz#1305982- Allow sending dbus msgs between firewalld and system_cronjob domains. Resolves: rhbz#1284902 - Allow zabbix-agentd to connect to following tcp sockets. One of zabbix-agentd functions is get service status of ftp,http,innd,pop,smtp protocols. Resolves: rhbz#1242506 - Add new boolean tmpreaper_use_cifs() to allow tmpreaper to run on local directories being shared with Samba. Resolves: rhbz#1284972 - Add support for systemd-hwdb daemon. Resolves: rhbz#1257940 - Add interface fs_setattr_cifs_dirs(). Resolves: rhbz#1284972- Add new SELinux policy fo targetd daemon. Resolves: rhbz#1063714 - Add new SELinux policy fo ipmievd daemon. Resolves: rhbz#1083031 - Add new SELinux policy fo hsqldb daemon. Resolves: rhbz#1083171 - Add new SELinux policy for blkmapd daemon. Resolves: rhbz#1072997 - Allow p11-child to connect to apache ports. - Label /usr/sbin/lvmlockd binary file as lvm_exec_t. Resolves: rhbz#1278028 - Add interface "lvm_manage_lock" to lvm policy. Resolves: rhbz#1063714- Allow openvswitch domain capability sys_rawio. Resolves: rhbz#1278495- Allow openvswitch to manage hugetlfs files and dirs. Resolves: rhbz#1278495 - Add fs_manage_hugetlbfs_files() interface. Resolves: rhbz#1278495- Allow smbcontrol domain to send sigchld to ctdbd domain. Resolves: #1293784 - Allow openvswitch read/write hugetlb filesystem. Resolves: #1278495Allow hypervvssd to list all mountpoints to have VSS live backup working correctly. Resolves:#1247880- Revert Add missing labeling for /usr/libexec/abrt-hook-ccpp patch Resolves: #1254188- Allow search dirs in sysfs types in kernel_read_security_state. Resolves: #1254188 - Fix kernel_read_security_state interface that source domain of this interface can search sysctl_fs_t dirs. Resolves: #1254188- Add missing labeling for /usr/libexec/abrt-hook-ccpp as a part of #1245477 and #1242467 bugs Resolves: #1254188 - We need allow connect to xserver for all sandbox_x domain because we have one type for all sandbox processes. Resolves:#1261938- Remove labeling for modules_dep_t file contexts to have labeled them as modules_object_t. - Update files_read_kernel_modules() to contain modutils_read_module_deps_files() calling because module deps labeling could remain and it allows to avoid regressions. Resolves:#1266928- We need to require sandbox_web_type attribute in sandbox_x_domain_template(). Resolves: #1261938 - ipsec: The NM helper needs to read the SAs Resolves: #1259786 - ipsec: Allow ipsec management to create ptys Resolves: #1259786- Add temporary fixes for sandbox related to #1103622. It allows to run everything under one sandbox type. Resolves:#1261938 - Allow abrt_t domain to write to kernel msg device. Resolves: #1257828 - Allow rpcbind_t domain to change file owner and group Resolves: #1265266- Allow smbcontrol to create a socket in /var/samba which uses for a communication with smbd, nmbd and winbind. Resolves: #1256459- Allow dirsrv-admin script to read passwd file. Allow dirsrv-admin script to read httpd pid files. Label dirsrv-admin unit file and allow dirsrv-admin domains to use it. Resolves: #1230300 - Allow qpid daemon to connect on amqp tcp port. Resolves: #1261805- Label /etc/ipa/nssdb dir as cert_t Resolves:#1262718 - Do not provide docker policy files which is shipped by docker-selinux.rpm Resolves:#1262812- Add labels for afs binaries: dafileserver, davolserver, salvageserver, dasalvager Resolves: #1192338 - Add lsmd_plugin_t sys_admin capability, Allow lsmd_plugin_t getattr from sysfs filesystem. Resolves: #1238079 - Allow rhsmcertd_t send signull to unconfined_service_t domains. Resolves: #1176078 - Remove file transition from snmp_manage_var_lib_dirs() interface which created snmp_var_lib_t dirs in var_lib_t. - Allow openhpid_t daemon to manage snmp files and dirs. Resolves: #1243902 - Allow mdadm_t domain read/write to general ptys and unallocated ttys. Resolves: #1073314 - Add interface unconfined_server_signull() to allow domains send signull to unconfined_service_t Resolves: #1176078- Allow systemd-udevd to access netlink_route_socket to change names for network interfaces without unconfined.pp module. It affects also MLS. Resolves:#1250456- Fix labeling for fence_scsi_check script Resolves: #1255020 - Allow openhpid to read system state Allow openhpid to connect to tcp http port. Resolves: #1244248 - Allow openhpid to read snmp var lib files. Resolves: #1243902 - Allow openvswitch_t domains read kernel dependencies due to openvswitch run modprobe - Allow unconfined_t domains to create /var/run/xtables.lock with iptables_var_run_t Resolves: #1243403 - Remove bin_t label for /usr/share/cluster/fence_scsi_check\.pl Resolves: #1255020- Fix regexp in chronyd.fc file Resolves: #1243764 - Allow passenger to getattr filesystem xattr Resolves: #1196555 - Label mdadm.conf.anackbak as mdadm_conf_t file. Resolves: #1088904 - Revert "Allow pegasus_openlmi_storage_t create mdadm.conf.anacbak file in /etc." - Allow watchdog execute fenced python script. Resolves: #1255020 - Added inferface watchdog_unconfined_exec_read_lnk_files() - Remove labeling for /var/db/.*\.db as etc_t to label db files as system_db_t. Resolves: #1230877- Allow watchdog execute fenced python script. Resolves: #1255020 - Added inferface watchdog_unconfined_exec_read_lnk_files() - Label /var/run/chrony-helper dir as chronyd_var_run_t. Resolves: #1243764 - Allow dhcpc_t domain transition to chronyd_t Resolves: #1243764- Fix postfix_spool_maildrop_t,postfix_spool_flush_t contexts in postfix.fc file. Resolves: #1252442- Allow exec pidof under hypervkvp domain. Resolves: #1254870 - Allow hypervkvp daemon create connection to the system DBUS Resolves: #1254870- Allow openhpid_t to read system state. Resolves: #1244248 - Added labels for files provided by rh-nginx18 collection Resolves: #1249945 - Dontaudit block_suspend capability for ipa_helper_t, this is kernel bug. Allow ipa_helper_t capability net_admin. Allow ipa_helper_t to list /tmp. Allow ipa_helper_t to read rpm db. Resolves: #1252968 - Allow rhsmcertd exec rhsmcertd_var_run_t files and rhsmcerd_tmp_t files. This rules are in hide_broken_sympthons until we find better solution. Resolves: #1243431 - Allow abrt_dump_oops_t to read proc_security_t files. - Allow abrt_dump_oops to signull all domains Allow abrt_dump_oops to read all domains state Allow abrt_dump_oops to ptrace all domains - Add interface abrt_dump_oops_domtrans() - Add mountpoint dontaudit access check in rhsmcertd policy. Resolves: #1243431 - Allow samba_net_t to manage samba_var_t sock files. Resolves: #1252937 - Allow chrome setcap to itself. Resolves: #1251996 - Allow httpd daemon to manage httpd_var_lib_t lnk_files. Resolves: #1253706 - Allow chronyd exec systemctl Resolves: #1243764 - Add inteface chronyd_signal Allow timemaster_t send generic signals to chronyd_t. Resolves: #1243764 - Added interface fs_dontaudit_write_configfs_dirs - Add label for kernel module dep files in /usr/lib/modules Resolves:#916635 - Allow kernel_t domtrans to abrt_dump_oops_t - Added to files_dontaudit_write_all_mountpoints intefface new dontaudit rule, that domain included this interface dontaudit capability dac_override. - Allow systemd-networkd to send logs to systemd-journald. Resolves: #1236616- Fix label on /var/tmp/kiprop_0 Resolves:#1220763 - Allow lldpad_t to getattr tmpfs_t. Resolves: #1246220 - Label /dev/shm/lldpad.* as lldapd_tmpfs_t Resolves: #1246220 - Allow audisp client to read system state.- Allow pcp_domain to manage pcp_var_lib_t lnk_files. Resolves: #1252341 - Label /var/run/xtables.* as iptables_var_run_t Resolves: #1243403- Add interface to read/write watchdog device - Add labels for /dev/memory_bandwith and /dev/vhci. Thanks ssekidde Resolves:#1210237 - Allow apcupsd_t to read /sys/devices Resolves:#1189185 - Allow logrotate to reload services. Resolves: #1242453 - Allow openhpid use libwatchdog plugin. (Allow openhpid_t rw watchdog device) Resolves: #1244260 - Allow openhpid liboa_soap plugin to read generic certs. Resolves: #1244248 - Allow openhpid liboa_soap plugin to read resolv.conf file. Resolves: #1244248 - Label /usr/libexec/chrony-helper as chronyd_exec_t - Allow chronyd_t to read dhcpc state. - Allow chronyd to execute mkdir command.- Allow mdadm to access /dev/random and add support to create own files/dirs as mdadm_tmpfs_t. Resolves:#1073314 - Allow udev, lvm and fsadm to access systemd-cat in /var/tmp/dracut if 'dracut -fv' is executed in MLS. - Allow admin SELinu users to communicate with kernel_t. It is needed to access /run/systemd/journal/stdout if 'dracut -vf' is executed. We allow it for other SELinux users. - Allow sysadm to execute systemd-sysctl in the sysadm_t domain. It is needed for ifup command in MLS mode. - Add fstools_filetrans_named_content_fsadm() and call it for named_filetrans_domain domains. We need to be sure that /run/blkid is created with correct labeling. Resolves:#1183503 - Add support for /etc/sanlock which is writable by sanlock daemon. Resolves:#1231377 - Allow useradd add homedir located in /var/lib/kdcproxy in ipa-server RPM scriplet. Resolves:#1243775 - Allow snapperd to pass data (one way only) via pipe negotiated over dbus Resolves:#1250550 - Allow lsmd also setuid capability. Some commands need to executed under root privs. Other commands are executed under unprivileged user.- Allow openhpid to use libsnmp_bc plugin (allow read snmp lib files). Resolves: #1243902 - Allow lsm_plugin_t to read sysfs, read hwdata, rw to scsi_generic_device Resolves: #1238079 - Allow lsm_plugin_t to rw raw_fixed_disk. Resolves:#1238079 - Allow rhsmcertd to send signull to unconfined_service.- Allow httpd_suexec_t to read and write Apache stream sockets Resolves: #1243569 - Allow qpid to create lnk_files in qpid_var_lib_t Resolves: #1247279- Allow drbd to get attributes from filesystems. - Allow redis to read kernel parameters. Resolves: #1209518 - Allow virt_qemu_ga_t domtrans to passwd_t - Allow audisp_remote_t to start power unit files domain to allow halt system. Resolves: #1186780 - Allow audisp_remote_t to read/write user domain pty. Resolves: #1186780 - Label /usr/sbin/chpasswd as passwd_exec_t. - Allow sysadm to administrate ldap environment and allow to bind ldap port to allow to setup an LDAP server (389ds). Resolves:#1221121- gnome_dontaudit_search_config() needs to be a part of optinal_policy in pegasus.te - Allow pcp_pmcd daemon to read postfix config files. - Allow pcp_pmcd daemon to search postfix spool dirs. Resolves: #1213740 - Added Booleans: pcp_read_generic_logs. Resolves: #1213740 - Allow drbd to read configuration options used when loading modules. Resolves: #1134883 - Allow glusterd to manage nfsd and rpcd services. - Allow glusterd to communicate with cluster domains over stream socket. - glusterd call pcs utility which calls find for cib.* files and runs pstree under glusterd. Dontaudit access to security files and update gluster boolean to reflect these changes.- Allow glusterd to manage nfsd and rpcd services. - Allow networkmanager to communicate via dbus with systemd_hostanmed. Resolves: #1234954 - Allow stream connect logrotate to prosody. - Add prosody_stream_connect() interface. - httpd should be able to send signal/signull to httpd_suexec_t, instead of httpd_suexec_exec_t. - Allow prosody to create own tmp files/dirs. Resolves:#1212498- Allow networkmanager read rfcomm port. Resolves:#1212498 - Remove non exists label. - Fix *_admin intefaces where body is not consistent with header. - Label /usr/afs/ as afs_files_t, Allow afs_bosserver_t create afs_config_t and afs_dbdir_t dirs under afs_files_t, Allow afs_bosserver_t read kerberos config - Remove non exits nfsd_ro_t label. - Make all interfaces related to openshift_cache_t as deprecated. - Add rpm_var_run_t label to rpm_admin header - Add jabberd_lock_t label to jabberd_admin header. - Add samba_unconfined_script_exec_t to samba_admin header. - inn daemon should create innd_log_t objects in var_log_t instead of innd_var_run_t - Fix ctdb policy - Add samba_signull_winbind() - Add samba_signull_unconfined_net() - Allow ctdbd_t send signull to samba_unconfined_net_t. - Allow openshift_initrc_t to communicate with firewalld over dbus Resolves:#1221326- Allow gluster to connect to all ports. It is required by random services executed by gluster. - Add interfaces winbind_signull(), samba_unconfined_net_signull(). - Dontaudit smbd_t block_suspend capability. This is kernel bug. - Allow ctdbd sending signull to process winbind, samba_unconfined_net, to checking if processes exists. - Add tmpreaper booleans to use nfs_t and samba_share_t. - Fix path from /usr/sbin/redis-server to /usr/bin/redis-server - Allow connect ypserv to portmap_port_t - Fix paths in inn policy, Allow innd read innd_log_t dirs, Allow innd execute innd_etc_t files - Add support for openstack-nova-* packages - Allow NetworkManager_t send signull to dnssec_trigger_t. - Allow glusterd to execute showmount in the showmount domain. - Label swift-container-reconciler binary as swift_t. - Allow dnssec_trigger_t relabelfrom dnssec_trigger_var_run_t files. - Add cobbler_var_lib_t to "/var/lib/tftpboot/boot(/.*)?" Resolves:#1213540 - Merge all nova_* labels under one nova_t.- Add logging_syslogd_run_nagios_plugins boolean for rsyslog to allow transition to nagios unconfined plugins Resolves:#1233550 - Allow dnssec_trigger_t create dnssec_trigger_tmp_t files in /var/tmp/ - Add support for oddjob based helper in FreeIPA. - Add new boolean - httpd_run_ipa to allow httpd process to run IPA helper and dbus chat with oddjob. - Add nagios_domtrans_unconfined_plugins() interface. - Update mta_filetrans_named_content() interface to cover more db files. Resolves:#1167468 - Add back ftpd_use_passive_mode boolean with fixed description. - Allow pmcd daemon stream connect to mysqld. - Allow pcp domains to connect to own process using unix_stream_socket. Resolves:#1213709 - Allow abrt-upload-watch service to dbus chat with ABRT daemon and fsetid capability to allow run reporter-upload correctly. - Add new boolean - httpd_run_ipa to allow httpd process to run IPA helper and dbus chat with oddjob. - Add support for oddjob based helper in FreeIPA. - Allow dnssec_trigger_t create dnssec_trigger_tmp_t files in /var/tmp/- Allow iptables to read ctdbd lib files. Resolves:#1224879 - Add systemd_networkd_t to nsswitch domains. - Allow drbd_t write to fixed_disk_device. Reason: drbdmeta needs write to fixed_disk_device during initialization. Resolves:#1130675 - Allow NetworkManager write to sysfs. - Fix cron_system_cronjob_use_shares boolean to call fs interfaces which contain only entrypoint permission. - Add cron_system_cronjob_use_shares boolean to allow system cronjob to be executed from shares - NFS, CIFS, FUSE. It requires "entrypoint" permissios on nfs_t, cifs_t and fusefs_t SELinux types. - Allow NetworkManager write to sysfs. - Allow ctdb_t sending signull to smbd_t, for checking if smbd process exists. - Dontaudit apache to manage snmpd_var_lib_t files/dirs. - Add interface snmp_dontaudit_manage_snmp_var_lib_files(). - Dontaudit mozilla_plugin_t cap. sys_ptrace. - Rename xodbc-connect port to xodbc_connect - Allow ovsdb-server to connect on xodbc-connect and ovsdb tcp ports. - Allow iscsid write to fifo file kdumpctl_tmp_t. Appears when kdump generates the initramfs during the kernel boot. - Dontaudit chrome to read passwd file. - nrpe needs kill capability to make gluster moniterd nodes working. Resolves:#1235587- We allow can_exec() on ssh_keygen on gluster. But there is a transition defined by init_initrc_domain() because we need to allow execute unconfined services by glusterd. So ssh-keygen ends up with ssh_keygen_t and we need to allow to manage /var/lib/glusterd/geo-replication/secret.pem. - Allow sshd to execute gnome-keyring if there is configured pam_gnome_keyring.so. - Allow gnome-keyring executed by passwd to access /run/user/UID/keyring to change a password. - Label gluster python hooks also as bin_t. - Allow glusterd to interact with gluster tools running in a user domain - Add glusterd_manage_lib_files() interface. - ntop reads /var/lib/ntop/macPrefix.db and it needs dac_override. It has setuid/setgid. - Allow samba_t net_admin capability to make CIFS mount working. - S30samba-start gluster hooks wants to search audit logs. Dontaudit it. Resolves:#1224879- Allow glusterd to send generic signals to systemd_passwd_agent processes. - Allow glusterd to access init scripts/units without defined policy - Allow glusterd to run init scripts. - Allow glusterd to execute /usr/sbin/xfs_dbin glusterd_t domain. Resolves:#1224879- Calling cron_system_entry() in pcp_domain_template needs to be a part of optional_policy block. - Allow samba-net to access /var/lib/ctdbd dirs/files. - Allow glusterd to send a signal to smbd. - Make ctdbd as home manager to access also FUSE. - Allow glusterd to use geo-replication gluster tool. - Allow glusterd to execute ssh-keygen. - Allow glusterd to interact with cluster services. - Allow glusterd to connect to the system DBUS for service (acquire_svc). - Label /dev/log correctly. Resolves:#1230932- Back port the latest F22 changes to RHEL7. It should fix most of RHEL7.2 bugs - Add cgdcbxd policy Resolves:#1072493 - Fix ftp_homedir boolean Resolve:#1097775 - Dontaudit ifconfig writing inhertited /var/log/pluto.log. - Allow cluster domain to dbus chat with systemd-logind. Resolves:#1145215 - Dontaudit write access to inherited kdumpctl tmp files Resolves:#1156442 - Allow isnsd_t to communicate with sssd Resolves:#1167702 - Allow rwho_t to communicate with sssd Resolves:#1167718 - Allow sblim_gatherd_t to communicate with sssd Resolves:#1167732 - Allow pkcs_slotd_t to communicate with sssd Resolves:#1167737 - Allow openvswitch_t to communicate with sssd Resolves:#1167816 - Allow mysqld_safe_t to communicate with sssd Resolves:#1167832 - Allow sshd_keygen_t to communicate with sssd Resolves:#1167840 - Add support for iprdbg logging files in /var/log. Resolves:#1174363 - Allow tmpreaper_t to manage ntp log content Resolves:#1176965 - Allow gssd_t to manage ssh keyring Resolves:#1184791 - Allow httpd_sys_script_t to send system log messages Resolves:#1185231 - Allow apcupsd_t to read /sys/devices Resolves:#1189185 - Allow dovecot_t sys_resource capability Resolves:#1191143 - Add support for mongod/mongos systemd unit files. Resolves:#1197038 - Add bacula fixes - Added label mysqld_etc_t for /etc/my.cnf.d/ dir. Resolves:#1203991- Label /usr/libexec/postgresql-ctl as postgresql_exec_t. - Add more restriction on entrypoint for unconfined domains. - Only allow semanage_t to be able to setenforce 0, no all domains that use selinux_semanage interface - Allow all domains to read /dev/urandom. It is needed by all apps/services linked to libgcrypt. There is no harm to allow it by default. - Update policy/mls for sockets related to access perm. Rules were contradictory. - Add nagios_run_pnp4nagios and nagios_run_sudo booleans to allow r un sudo from NRPE utils scripts and allow run nagios in conjunction w ith PNP4Nagios. Resolves:#1201054 - Don't use deprecated userdom_manage_tmpfs_role() interface calliing and use userdom_manage_tmp_role() instead. - Update virt_read_pid_files() interface to allow read also symlinks with virt_var_run_t type - Label /var/lib/tftpboot/aarch64(/.*)? and /var/lib/tftpboot/images2(/.*)? - Add support for iprdbg logging files in /var/log. - Add fixes to rhsmcertd_t - Allow puppetagent_t to transfer firewalld messages over dbus - Add support for /usr/libexec/mongodb-scl-helper RHSCL helper script. - Added label mysqld_etc_t for /etc/my.cnf.d/ dir. - Add support for mongod/mongos systemd unit files. - cloudinit and rhsmcertd need to communicate with dbus - Allow dovecot_t sys_resource capability- ALlow mongod execmem by default. - Update policy/mls for sockets. Rules were contradictory. Resolves:#1207133 - Allow a user to login with different security level via ssh.- Update seutil_manage_config() interface. Resolves:#1185962 - Allow pki-tomcat relabel pki_tomcat_etc_rw_t. - Turn on docker_transition_unconfined by default- Allow virtd to list all mountpoints. Resolves:#1180713- pkcsslotd_lock_t should be an alias for pkcs_slotd_lock_t. - Allow fowner capability for sssd because of selinux_child handling. - ALlow bind to read/write inherited ipsec pipes - Allow hypervkvp to read /dev/urandom and read addition states/config files. - Allow gluster rpm scripletto create glusterd socket with correct labeling. This is a workaround until we get fix in glusterd. - Add glusterd_filetrans_named_pid() interface - Allow radiusd to connect to radsec ports. - Allow setuid/setgid for selinux_child - Allow lsmd plugin to connect to tcp/5988 by default. - Allow lsmd plugin to connect to tcp/5989 by default. - Update ipsec_manage_pid() interface. Resolves:#1184978- Update ipsec_manage_pid() interface. Resolves:#1184978- Allow ntlm_auth running in winbind_helper_t to access /dev/urandom.- Add auditing support for ipsec. Resolves:#1182524 - Label /ostree/deploy/rhel-atomic-host/deploy directory as system_conf_t - Allow netutils chown capability to make tcpdump working with -w- Allow ipsec to execute _updown.netkey script to run unbound-control. - Allow neutron to read rpm DB. - Add additional fixes for hyperkvp * creates new ifcfg-{name} file * Runs hv_set_ifconfig.sh, which does the following * Copies ifcfg-{name} to /etc/sysconfig/network-scripts - Allow svirt to read symbolic links in /sys/fs/cgroups labeled as tmpfs_t - Add labeling for pacemaker.log. - Allow radius to connect/bind radsec ports. - Allow pm-suspend running as virt_qemu_ga to read /var/log/pm-suspend.log - Allow virt_qemu_ga to dbus chat with rpm. - Update virt_read_content() interface to allow read also char devices. - Allow glance-registry to connect to keystone port. Resolves:#1181818- Allow sssd to send dbus all user domains. Resolves:#1172291 - Allow lsm plugin to read certificates. - Fix labeling for keystone CGI scripts. - Make snapperd back as unconfined domain.- Fix bugs in interfaces discovered by sepolicy. - Allow slapd to read /usr/share/cracklib/pw_dict.hwm. - Allow lsm plugins to connect to tcp/18700 by default. - Allow brltty mknod capability to allow create /var/run/brltty/vcsa. - Fix pcp_domain_template() interface. - Fix conman.te. - Allow mon_fsstatd to read /proc/sys/fs/binfmt_misc - Allow glance-scrubber to connect tcp/9191. - Add missing setuid capability for sblim-sfcbd. - Allow pegasus ioctl() on providers. - Add conman_can_network. - Allow chronyd to read chrony conf files located in /run/timemaster/. - Allow radius to bind on tcp/1813 port. - dontaudit block suspend access for openvpn_t - Allow conman to create files/dirs in /tmp. - Update xserver_rw_xdm_keys() interface to have 'setattr'. Resolves:#1172291 - Allow sulogin to read /dev/urandom and /dev/random. - Update radius port definition to have also tcp/18121 - Label prandom as random_device_t. - Allow charon to manage files in /etc/strongimcv labeled as ipsec_conf_t.- Allow virt_qemu_ga_t to execute kmod. - Add missing files_dontaudit_list_security_dirs() for smbd_t in samba_export_all_ro boolean. - Add additionnal MLS attribute for oddjob_mkhomedir to create homedirs. Resolves:#1113725 - Enable OpenStack cinder policy - Add support for /usr/share/vdsm/daemonAdapter - Add support for /var/run/gluster- Remove old pkcsslotd.pp from minimum package - Allow rlogind to use also rlogin ports. - Add support for /usr/libexec/ntpdate-wrapper. Label it as ntpdate_exec_t. - Allow bacula to connect also to postgresql. - Label /usr/libexec/tomcat/server as tomcat_exec_t - Add support for /usr/sbin/ctdbd_wrapper - Add support for /usr/libexec/ppc64-diag/rtas_errd - Allow rpm_script_roles to access system_mail_t - Allow brltty to create /var/run/brltty - Allow lsmd plugin to access netlink_route_socket - Allow smbcontrol to read passwd - Add support for /usr/libexec/sssd/selinux_child and create sssd_selinux_manager_t domain for it Resolves:#1140106 - Allow osad to execute rhn_check - Allow load_policy to rw inherited sssd pipes because of selinux_child - Allow admin SELinux users mounting / as private within a new mount namespace as root in MLS - Add additional fixes for su_restricted_domain_template to make moving to sysadm_r and trying to su working correctly - Add additional booleans substitions- Add seutil_dontaudit_access_check_semanage_module_store() interface Resolves:#1140106 - Update to have all _systemctl() interface also init_reload_services(). - Dontaudit access check on SELinux module store for sssd. - Add labeling for /sbin/iw. - Allow named_filetrans_domain to create ibus directory with correct labeling.- Allow radius to bind tcp/1812 radius port. - Dontaudit list user_tmp files for system_mail_t. - Label virt-who as virtd_exec_t. - Allow rhsmcertd to send a null signal to virt-who running as virtd_t. - Add missing alias for _content_rw_t. Resolves:#1089177 - Allow spamd to access razor-agent.log. - Add fixes for sfcb from libvirt-cim TestOnly bug. - Allow NetworkManager stream connect on openvpn. - Make /usr/bin/vncserver running as unconfined_service_t. - getty_t should be ranged in MLS. Then also local_login_t runs as ranged domain. - Label /etc/docker/certs.d as cert_t.- Label /etc/strongimcv as ipsec_conf_file_t. - Add support for /usr/bin/start-puppet-ca helper script Resolves:#1160727 - Allow rpm scripts to enable/disable transient systemd units. Resolves:#1154613 - Make kpropdas nsswitch domain Resolves:#1153561 - Make all glance domain as nsswitch domains Resolves:#1113281 - Allow selinux_child running as sssd access check on /etc/selinux/targeted/modules/active - Allow access checks on setfiles/load_policy/semanage_lock for selinux_child running as sssd_t Resolves:#1140106- Dontaudit access check on setfiles/load_policy for sssd_t. Resolves:#1140106 - Add kdump_rw_inherited_kdumpctl_tmp_pipes() Resolves:#1156442 - Make linuxptp services as unconfined. - Added new policy linuxptp. Resolves:#1149693 - Label keystone cgi files as keystone_cgi_script_exec_t. Resolves:#1138424 - Make tuned as unconfined domain- Allow guest to connect to libvirt using unix_stream_socket. - Allow all bus client domains to dbus chat with unconfined_service_t. - Allow inetd service without own policy to run in inetd_child_t which is unconfined domain. - Make opensm as nsswitch domain to make it working with sssd. - Allow brctl to read meminfo. - Allow winbind-helper to execute ntlm_auth in the caller domain. Resolves:#1160339 - Make plymouthd as nsswitch domain to make it working with sssd. Resolves:#1160196 - Make drbd as nsswitch domain to make it working with sssd. - Make conman as nsswitch domain to make ipmitool.exp runing as conman_t working. - Add support for /var/lib/sntp directory. - Add fixes to allow docker to create more content in tmpfs ,and donaudit reading /proc - Allow winbind to read usermodehelper - Allow telepathy domains to execute shells and bin_t - Allow gpgdomains to create netlink_kobject_uevent_sockets - Allow mongodb to bind to the mongo port and mongos to run as mongod_t - Allow abrt to read software raid state. - Allow nslcd to execute netstat. - Allow dovecot to create user's home directory when they log into IMAP. - Allow login domains to create kernel keyring with different level.- Allow modemmanger to connectto itself Resolves:#1120152 - Allow pki_tomcat to create link files in /var/lib/pki-ca. Resolves:#1121744 - varnishd needs to have fsetid capability Resolves:#1125165 - Allow snapperd to dbus chat with system cron jobs. Resolves:#1152447 - Allow dovecot to create user's home directory when they log into IMAP Resolves:#1152773 - Add labeling for /usr/sbin/haproxy-systemd-wrapper wrapper to make haproxy running haproxy_t. - ALlow listen and accept on tcp socket for init_t in MLS. Previously it was for xinetd_t. - Allow nslcd to execute netstat. - Add suppor for keepalived unconfined scripts and allow keepalived to read all domain state and kill capability. - Allow nslcd to read /dev/urandom.- Add back kill permisiion for system class Resolves:#1150011- Add back kill permisiion for service class Resolves:#1150011 - Make rhsmcertd_t also as dbus domain. - Allow named to create DNS_25 with correct labeling. - Add cloudform_dontaudit_write_cloud_log() - Call auth_use_nsswitch to apache to read/write cloud-init keys. - Allow cloud-init to dbus chat with certmonger. - Fix path to mon_statd_initrc_t script. - Allow all RHCS services to read system state. - Allow dnssec_trigger_t to execute unbound-control in own domain. - kernel_read_system_state needs to be called with type. Moved it to antivirus.if. - Added policy for mon_statd and mon_procd services. BZ (1077821) - Allow opensm_t to read/write /dev/infiniband/umad1. - Allow mongodb to manage own log files. - Allow neutron connections to system dbus. - Add support for /var/lib/swiftdirectory. - Allow nova-scheduler to read certs. - Allow openvpn to access /sys/fs/cgroup dir. - Allow openvpn to execute systemd-passwd-agent in systemd_passwd_agent_t to make openvpn working with systemd. - Fix samba_export_all_ro/samba_export_all_rw booleans to dontaudit search/read security files. - Add auth_use_nsswitch for portreserve to make it working with sssd. - automount policy is non-base module so it needs to be called in optional block. - ALlow sensord to getattr on sysfs. - Label /usr/share/corosync/corosync as cluster_exec_t. - Allow lmsd_plugin to read passwd file. BZ(1093733) - Allow read antivirus domain all kernel sysctls. - Allow mandb to getattr on file systems - Allow nova-console to connect to mem_cache port. - Make sosreport as unconfined domain. - Allow mondogdb to 'accept' accesses on the tcp_socket port. - ALlow sanlock to send a signal to virtd_t.- Build also MLS policy Resolves:#1138424- Add back kill permisiion for system class - Allow iptables read fail2ban logs. - Fix radius labeled ports - Add userdom_manage_user_tmpfs_files interface - Allow libreswan to connect to VPN via NM-libreswan. - Label 4101 tcp port as brlp port - fix dev_getattr_generic_usb_dev interface - Allow all domains to read fonts - Make sure /run/systemd/generator and system is labeled correctly on creation. - Dontaudit aicuu to search home config dir. - Make keystone_cgi_script_t domain. Resolves:#1138424 - Fix bug in drbd policy, - Added support for cpuplug. - ALlow sanlock_t to read sysfs_t. - Added sendmail_domtrans_unconfined interface - Fix broken interfaces - radiusd wants to write own log files. - Label /usr/libexec/rhsmd as rhsmcertd_exec_t - Allow rhsmcertd send signull to setroubleshoot. - Allow rhsmcertd manage rpm db. - Added policy for blrtty. - Fix keepalived policy - Allow rhev-agentd dbus chat with systemd-logind. - Allow keepalived manage snmp var lib sock files. - Add support for /var/lib/graphite-web - Allow NetworkManager to create Bluetooth SDP sockets - It's going to do the the discovery for DUN service for modems with Bluez 5. - Allow swift to connect to all ephemeral ports by default. - Allow sssd to read selinux config to add SELinux user mapping. - Allow lsmd to search own plguins. - Allow abrt to read /dev/memto generate an unique machine_id and uses sosuploader's algorithm based off dmidecode[1] fields. - ALlow zebra for user/group look-ups. - Allow nova domains to getattr on all filesystems. - Allow collectd sys_ptrace and dac_override caps because of reading of /proc/%i/io for several processes. - Allow pppd to connect to /run/sstpc/sstpc-nm-sstp-service-28025 over unix stream socket. - Allow rhnsd_t to manage also rhnsd config symlinks. - ALlow user mail domains to create dead.letter. - Allow rabbitmq_t read rabbitmq_var_lib_t lnk files. - Allow pki-tomcat to change SELinux object identity. - Allow radious to connect to apache ports to do OCSP check - Allow git cgi scripts to create content in /tmp - Allow cockpit-session to do GSSAPI logins. - Allow sensord read in /proc - Additional access required by usbmuxd- Allow locate to look at files/directories without labels, and chr_file and blk_file on non dev file systems - Label /usr/lib/erlang/erts.*/bin files as bin_t - Add files_dontaudit_access_check_home_dir() inteface. - Allow udev_t mounton udev_var_run_t dirs #(1128618) - Add systemd_networkd_var_run_t labeling for /var/run/systemd/netif and allow systemd-networkd to manage it. - Add init_dontaudit_read_state() interface. - Add label for ~/.local/share/fonts - Allow unconfined_r to access unconfined_service_t. - Allow init to read all config files - Add new interface to allow creation of file with lib_t type - Assign rabbitmq port. - Allow unconfined_service_t to dbus chat with all dbus domains - Add new interfaces to access users keys. - Allow domains to are allowed to mounton proc to mount on files as well as dirs - Fix labeling for HOME_DIR/tmp and HOME_DIR/.tmp directories. - Add a port definition for shellinaboxd - Label ~/tmp and ~/.tmp directories in user tmp dirs as user_tmp_t - Allow userdomains to stream connect to pcscd for smart cards - Allow programs to use pam to search through user_tmp_t dires (/tmp/.X11-unix) - Update to rawhide-contrib changes Resolves:#1123844- Rebase to 3.13.1 which we have in Fedora21 Resolves:#1128284- Back port fixes from Fedora. Mainly OpenStack and Docker fixes- Add policy-rhel-7.1-{base,contrib} patches- Add support for us_cli ports - Fix labeling for /var/run/user//gvfs - add support for tcp/9697 - Additional rules required by openstack, needs backport to F20 and RHEL7 - Additional access required by docker - ALlow motion to use tcp/8082 port - Allow init_t to setattr/relabelfrom dhcp state files - Dontaudit antivirus domains read access on all security files by default - Add missing alias for old amavis_etc_t type - Allow block_suspend cap for haproxy - Additional fixes for instack overcloud - Allow OpenStack to read mysqld_db links and connect to MySQL - Remove dup filename rules in gnome.te - Allow sys_chroot cap for httpd_t and setattr on httpd_log_t - Allow iscsid to handle own unit files - Add iscsi_systemctl() - Allow mongod to create also sock_files in /run with correct labeling - Allow httpd to send signull to apache script domains and don't audit leaks - Allow rabbitmq_beam to connect to httpd port - Allow aiccu stream connect to pcscd - Allow dmesg to read hwdata and memory dev - Allow all freeipmi domains to read/write ipmi devices - Allow sblim_sfcbd to use also pegasus-https port - Allow rabbitmq_epmd to manage rabbit_var_log_t files - Allow chronyd to read /sys/class/hwmon/hwmon1/device/temp2_input - Allow docker to status any unit file and allow it to start generic unit files- Change hsperfdata_root to have as user_tmp_t Resolves:#1076523- Fix Multiple same specifications for /var/named/chroot/dev/zero - Add labels for /var/named/chroot_sdb/dev devices - Add support for strongimcv - Use kerberos_keytab_domains in auth_use_nsswitch - Update auth_use_nsswitch to make all these types as kerberos_keytab_domain to - Allow net_raw cap for neutron_t and send sigkill to dnsmasq - Fix ntp_filetrans_named_content for sntp-kod file - Add httpd_dbus_sssd boolean - Dontaudit exec insmod in boinc policy - Rename kerberos_keytab_domain to kerberos_keytab_domains - Add kerberos_keytab_domain() - Fix kerberos_keytab_template() - Make all domains which use kerberos as kerberos_keytab_domain Resolves:#1083670 - Allow kill capability to winbind_t- varnishd wants chown capability - update ntp_filetrans_named_content() interface - Add additional fixes for neutron_t. #1083335 - Dontaudit getattr on proc_kcore_t - Allow pki_tomcat_t to read ipa lib files - Allow named_filetrans_domain to create /var/cache/ibus with correct labelign - Allow init_t run /sbin/augenrules - Add dev_unmount_sysfs_fs and sysnet_manage_ifconfig_run interfaces - Allow unpriv SELinux user to use sandbox - Add default label for /tmp/hsperfdata_root- Add file subs also for /var/home- Allow xauth_t to read user_home_dir_t lnk_file - Add labeling for lightdm-data - Allow certmonger to manage ipa lib files - Add support for /var/lib/ipa - Allow pegasus to getattr virt_content - Added some new rules to pcp policy - Allow chrome_sandbox to execute config_home_t - Add support for ABRT FAF- Allow kdm to send signull to remote_login_t process - Add gear policy - Turn on gear_port_t - Allow cgit to read gitosis lib files by default - Allow vdagent to read xdm state - Allow NM and fcoeadm to talk together over unix_dgram_socket- Back port fixes for pegasus_openlmi_admin_t from rawhide Resolves:#1080973 - Add labels for ostree - Add SELinux awareness for NM - Label /usr/sbin/pwhistory_helper as updpwd_exec_t- add gnome_append_home_config() - Allow thumb to append GNOME config home files - Allow rasdaemon to rw /dev/cpu//msr - fix /var/log/pki file spec - make bacula_t as auth_nsswitch domain - Identify pki_tomcat_cert_t as a cert_type - Define speech-dispater_exec_t as an application executable - Add a new file context for /var/named/chroot/run directory - update storage_filetrans_all_named_dev for sg* devices - Allow auditctl_t to getattr on all removeable devices - Allow nsswitch_domains to stream connect to nmbd - Allow unprivusers to connect to memcached - label /var/lib/dirsrv/scripts-INSTANCE as bin_t- Allow also unpriv user to run vmtools - Allow secadm to read /dev/urandom and meminfo Resolves:#1079250 - Add booleans to allow docker processes to use nfs and samba - Add mdadm_tmpfs support - Dontaudit net_amdin for /usr/lib/jvm/java-1.7.0-openjdk-1.7.0.51-2.4.5.1.el7.x86_64/jre-abrt/bin/java running as pki_tomcat_t - Allow vmware-user-sui to use user ttys - Allow talk 2 users logged via console too - Allow ftp services to manage xferlog_t - Make all pcp domanis as unconfined for RHEL7.0 beucause of new policies - allow anaconda to dbus chat with systemd-localed- allow anaconda to dbus chat with systemd-localed - Add fixes for haproxy based on bperkins@redhat.com - Allow cmirrord to make dmsetup working - Allow NM to execute arping - Allow users to send messages through talk - Add userdom_tmp_role for secadm_t- Add additional fixes for rtas_errd - Fix transitions for tmp/tmpfs in rtas.te - Allow rtas_errd to readl all sysctls- Add support for /var/spool/rhsm/debug - Make virt_sandbox_use_audit as True by default - Allow svirt_sandbox_domains to ptrace themselves- Allow docker containers to manage /var/lib/docker content- Allow docker to read tmpfs_t symlinks - Allow sandbox svirt_lxc_net_t to talk to syslog and to sssd over stream sockets- Allow collectd to talk to libvirt - Allow chrome_sandbox to use leaked unix_stream_sockets - Dontaudit leaks of sockets into chrome_sandbox_t - If you create a cups directory in /var/cache then it should be labeled cups_rw_etc_t - Run vmtools as unconfined domains - Allow snort to manage its log files - Allow systemd_cronjob_t to be entered via bin_t - Allow procman to list doveconf_etc_t - allow keyring daemon to create content in tmpfs directories - Add proper labelling for icedtea-web - vpnc is creating content in networkmanager var run directory - Label sddm as xdm_exec_t to make KDE working again - Allow postgresql to read network state - Allow java running as pki_tomcat to read network sysctls - Fix cgroup.te to allow cgred to read cgconfig_etc_t - Allow beam.smp to use ephemeral ports - Allow winbind to use the nis to authenticate passwords- Make rtas_errd_t as unconfined domain for F20.It needs additional fixes. It runs rpm at least. - Allow net_admin cap for fence_virtd running as fenced_t - Make abrt-java-connector working - Make cimtest script 03_defineVS.py of ComputerSystem group working - Fix git_system_enable_homedirs boolean - Allow munin mail plugins to read network systcl- Allow vmtools_helper_t to execute bin_t - Add support for /usr/share/joomla - /var/lib/containers should be labeled as openshift content for now - Allow docker domains to talk to the login programs, to allow a process to login into the container - Allow install_t do dbus chat with NM - Fix interface names in anaconda.if - Add install_t for anaconda. A new type is a part of anaconda policy - sshd to read network sysctls- Allow zabbix to send system log msgs - Allow init_t to stream connect to ipsec Resolves:#1060775- Add docker_connect_any boolean- Allow unpriv SELinux users to dbus chat with firewalld - Add lvm_write_metadata() - Label /etc/yum.reposd dir as system_conf_t. Should be safe because system_conf_t is base_ro_file_type - Allow pegasus_openlmi_storage_t to write lvm metadata - Add hide_broken_symptoms for kdumpgui because of systemd bug - Make kdumpgui_t as unconfined domain Resolves:#1044299 - Allow docker to connect to tcp/5000- Allow numad to write scan_sleep_millisecs - Turn on entropyd_use_audio boolean by default - Allow cgred to read /etc/cgconfig.conf because it contains templates used together with rules from /etc/cgrules.conf. - Allow lscpu running as rhsmcertd_t to read /proc/sysinfo - Fix label on irclogs in the homedir - Allow kerberos_keytab_domain domains to manage keys until we get sssd fix - Allow postgresql to use ldap - Add missing syslog-conn port - Add support for /dev/vmcp and /dev/sclp Resolves:#1069310- Modify xdm_write_home to allow create files/links in /root with xdm_home_ - Allow virt domains to read network state Resolves:#1072019- Added pcp rules - dontaudit openshift_cron_t searching random directories, should be back ported to RHEL6 - clean up ctdb.te - Allow ctdbd to connect own ports - Fix samba_export_all_rw booleanto cover also non security dirs - Allow swift to exec rpm in swift_t and allow to create tmp files/dirs - Allow neutron to create /run/netns with correct labeling - Allow certmonger to list home dirs- Change userdom_use_user_inherited_ttys to userdom_use_user_ttys for systemd-tty-ask - Add sysnet_filetrans_named_content_ifconfig() interface - Allow ctdbd to connect own ports - Fix samba_export_all_rw booleanto cover also non security dirs - Allow swift to exec rpm in swift_t and allow to create tmp files/dirs - Allow neutron to create /run/netns with correct labeling - Allow kerberos keytab domains to manage sssd/userdomain keys" - Allow to run ip cmd in neutron_t domain- Allow block_suspend cap2 for systemd-logind and rw dri device - Add labeling for /usr/libexec/nm-libreswan-service - Allow locallogin to rw xdm key to make Virtual Terminal login providing smartcard pin working - Add xserver_rw_xdm_keys() - Allow rpm_script_t to dbus chat also with systemd-located - Fix ipa_stream_connect_otpd() - update lpd_manage_spool() interface - Allow krb5kdc to stream connect to ipa-otpd - Add ipa_stream_connect_otpd() interface - Allow vpnc to unlink NM pids - Add networkmanager_delete_pid_files() - Allow munin plugins to access unconfined plugins - update abrt_filetrans_named_content to cover /var/spool/debug - Label /var/spool/debug as abrt_var_cache_t - Allow rhsmcertd to connect to squid port - Make docker_transition_unconfined as optional boolean - Allow certmonger to list home dirs- Make snapperd as unconfined domain and add additional fixes for it - Remove nsplugin.pp module on upgrade- Add snapperd_home_t for HOME_DIR/.snapshots directory - Make sosreport as unconfined domain - Allow sosreport to execute grub2-probe - Allow NM to manage hostname config file - Allow systemd_timedated_t to dbus chat with rpm_script_t - Allow lsmd plugins to connect to http/ssh/http_cache ports by default - Add lsmd_plugin_connect_any boolean - Allow mozilla_plugin to attempt to set capabilities - Allow lsdm_plugins to use tcp_socket - Dontaudit mozilla plugin from getattr on /proc or /sys - Dontaudit use of the keyring by the services in a sandbox - Dontaudit attempts to sys_ptrace caused by running ps for mysqld_safe_t - Allow rabbitmq_beam to connect to jabber_interserver_port - Allow logwatch_mail_t to transition to qmail_inject and queueu - Added new rules to pcp policy - Allow vmtools_helper_t to change role to system_r - Allow NM to dbus chat with vmtools - Fix couchdb_manage_files() to allow manage couchdb conf files - Add support for /var/run/redis.sock - dontaudit gpg trying to use audit - Allow consolekit to create log directories and files - Fix vmtools policy to allow user roles to access vmtools_helper_t - Allow block_suspend cap2 for ipa-otpd - Allow pkcsslotd to read users state - Add ioctl to init_dontaudit_rw_stream_socket - Add systemd_hostnamed_manage_config() interface - Remove transition for temp dirs created by init_t - gdm-simple-slave uses use setsockopt - sddm-greater is a xdm type program- Add lvm_read_metadata() - Allow auditadm to search /var/log/audit dir - Add lvm_read_metadata() interface - Allow confined users to run vmtools helpers - Fix userdom_common_user_template() - Generic systemd unit scripts do write check on / - Allow init_t to create init_tmp_t in /tmp.This is for temporary content created by generic unit files - Add additional fixes needed for init_t and setup script running in generic unit files - Allow general users to create packet_sockets - added connlcli port - Add init_manage_transient_unit() interface - Allow init_t (generic unit files) to manage rpc state date as we had it for initrc_t - Fix userdomain.te to require passwd class - devicekit_power sends out a signal to all processes on the message bus when power is going down - Dontaudit rendom domains listing /proc and hittping system_map_t - Dontauit leaks of var_t into ifconfig_t - Allow domains that transition to ssh_t to manipulate its keyring - Define oracleasm_t as a device node - Change to handle /root as a symbolic link for os-tree - Allow sysadm_t to create packet_socket, also move some rules to attributes - Add label for openvswitch port - Remove general transition for files/dirs created in /etc/mail which got etc_aliases_t label. - Allow postfix_local to read .forward in pcp lib files - Allow pegasus_openlmi_storage_t to read lvm metadata - Add additional fixes for pegasus_openlmi_storage_t - Allow bumblebee to manage debugfs - Make bumblebee as unconfined domain - Allow snmp to read etc_aliases_t - Allow lscpu running in pegasus_openlmi_storage_t to read /dev/mem - Allow pegasus_openlmi_storage_t to read /proc/1/environ - Dontaudit read gconf files for cupsd_config_t - make vmtools as unconfined domain - Add vmtools_helper_t for helper scripts. Allow vmtools shutdonw a host and run ifconfig. - Allow collectd_t to use a mysql database - Allow ipa-otpd to perform DNS name resolution - Added new policy for keepalived - Allow openlmi-service provider to manage transitient units and allow stream connect to sssd - Add additional fixes new pscs-lite+polkit support - Add labeling for /run/krb5kdc - Change w3c_validator_tmp_t to httpd_w3c_validator_tmp_t in F20 - Allow pcscd to read users proc info - Dontaudit smbd_t sending out random signuls - Add boolean to allow openshift domains to use nfs - Allow w3c_validator to create content in /tmp - zabbix_agent uses nsswitch - Allow procmail and dovecot to work together to deliver mail - Allow spamd to execute files in homedir if boolean turned on - Allow openvswitch to listen on port 6634 - Add net_admin capability in collectd policy - Fixed snapperd policy - Fixed bugsfor pcp policy - Allow dbus_system_domains to be started by init - Fixed some interfaces - Add kerberos_keytab_domain attribute - Fix snapperd_conf_t def- Addopt corenet rules for unbound-anchor to rpm_script_t - Allow runuser to send send audit messages. - Allow postfix-local to search .forward in munin lib dirs - Allow udisks to connect to D-Bus - Allow spamd to connect to spamd port - Fix syntax error in snapper.te - Dontaudit osad to search gconf home files - Allow rhsmcertd to manage /etc/sysconf/rhn director - Fix pcp labeling to accept /usr/bin for all daemon binaries - Fix mcelog_read_log() interface - Allow iscsid to manage iscsi lib files - Allow snapper domtrans to lvm_t. Add support for /etc/snapper and allow snapperd to manage it. - Make tuned_t as unconfined domain for RHEL7.0 - Allow ABRT to read puppet certs - Add sys_time capability for virt-ga - Allow gemu-ga to domtrans to hwclock_t - Allow additional access for virt_qemu_ga_t processes to read system clock and send audit messages - Fix some AVCs in pcp policy - Add to bacula capability setgid and setuid and allow to bind to bacula ports - Changed label from rhnsd_rw_conf_t to rhnsd_conf_t - Add access rhnsd and osad to /etc/sysconfig/rhn - drbdadm executes drbdmeta - Fixes needed for docker - Allow epmd to manage /var/log/rabbitmq/startup_err file - Allow beam.smp connect to amqp port - Modify xdm_write_home to allow create also links as xdm_home_t if the boolean is on true - Allow init_t to manage pluto.ctl because of init_t instead of initrc_t - Allow systemd_tmpfiles_t to manage all non security files on the system - Added labels for bacula ports - Fix label on /dev/vfio/vfio - Add kernel_mounton_messages() interface - init wants to manage lock files for iscsi- Added osad policy - Allow postfix to deliver to procmail - Allow bumblebee to seng kill signal to xserver - Allow vmtools to execute /usr/bin/lsb_release - Allow docker to write system net ctrls - Add support for rhnsd unit file - Add dbus_chat_session_bus() interface - Add dbus_stream_connect_session_bus() interface - Fix pcp.te - Fix logrotate_use_nfs boolean - Add lot of pcp fixes found in RHEL7 - fix labeling for pmie for pcp pkg - Change thumb_t to be allowed to chat/connect with session bus type - Allow call renice in mlocate - Add logrotate_use_nfs boolean - Allow setroubleshootd to read rpc sysctl- Turn on bacula, rhnsd policy - Add support for rhnsd unit file - Add dbus_chat_session_bus() interface - Add dbus_stream_connect_session_bus() interface - Fix logrotate_use_nfs boolean - Add lot of pcp fixes found in RHEL7 - fix labeling for pmie for pcp pkg - Change thumb_t to be allowed to chat/connect with session bus type - Allow call renice in mlocate - Add logrotate_use_nfs boolean - Allow setroubleshootd to read rpc sysctl - Fixes for *_admin interfaces - Add pegasus_openlmi_storage_var_run_t type def - Add support for /var/run/openlmi-storage - Allow tuned to create syslog.conf with correct labeling - Add httpd_dontaudit_search_dirs boolean - Add support for winbind.service - ALlow also fail2ban-client to read apache logs - Allow vmtools to getattr on all fs - Add support for dey_sapi port - Add logging_filetrans_named_conf() - Allow passwd_t to use ipc_lock, so that it can change the password in gnome-keyring- Update snapper policy - Allow domains to append rkhunter lib files - Allow snapperd to getattr on all fs - Allow xdm to create /var/gdm with correct labeling - Add label for snapper.log - Allow fail2ban-client to read apache log files - Allow thumb_t to execute dbus-daemon in thumb_t- Allow gdm to create /var/gdm with correct labeling - Allow domains to append rkhunterl lib files. #1057982 - Allow systemd_tmpfiles_t net_admin to communicate with journald - Add interface to getattr on an isid_type for any type of file - Update libs_filetrans_named_content() to have support for /usr/lib/debug directory - Allow initrc_t domtrans to authconfig if unconfined is enabled - Allow docker and mount on devpts chr_file - Allow docker to transition to unconfined_t if boolean set - init calling needs to be optional in domain.te - Allow uncofined domain types to handle transient unit files - Fix labeling for vfio devices - Allow net_admin capability and send system log msgs - Allow lldpad send dgram to NM - Add networkmanager_dgram_send() - rkhunter_var_lib_t is correct type - Back port pcp policy from rawhide - Allow openlmi-storage to read removable devices - Allow system cron jobs to manage rkhunter lib files - Add rkhunter_manage_lib_files() - Fix ftpd_use_fusefs boolean to allow manage also symlinks - Allow smbcontrob block_suspend cap2 - Allow slpd to read network and system state info - Allow NM domtrans to iscsid_t if iscsiadm is executed - Allow slapd to send a signal itself - Allow sslget running as pki_ra_t to contact port 8443, the secure port of the CA. - Fix plymouthd_create_log() interface - Add rkhunter policy with files type definition for /var/lib/rkhunter until it is fixed in rkhunter package - Add mozilla_plugin_exec_t for /usr/lib/firefox/plugin-container - Allow postfix and cyrus-imapd to work out of box - Allow fcoemon to talk with unpriv user domain using unix_stream_socket - Dontaudit domains that are calling into journald to net_admin - Add rules to allow vmtools to do what it does - snapperd is D-Bus service - Allow OpenLMI PowerManagement to call 'systemctl --force reboot' - Add haproxy_connect_any boolean - Allow haproxy also to use http cache port by default Resolves:#1058248- Allow apache to write to the owncloud data directory in /var/www/html... - Allow consolekit to create log dir - Add support for icinga CGI scripts - Add support for icinga - Allow kdumpctl_t to create kdump lock file Resolves:#1055634 - Allow kdump to create lnk lock file - Allow nscd_t block_suspen capability - Allow unconfined domain types to manage own transient unit file - Allow systemd domains to handle transient init unit files - Add interfaces to handle transient- Add cron unconfined role support for uncofined SELinux user - Call corenet_udp_bind_all_ports() in milter.te - Allow fence_virtd to connect to zented port - Fix header for mirrormanager_admin() - Allow dkim-milter to bind udp ports - Allow milter domains to send signull itself - Allow block_suspend for yum running as mock_t - Allow beam.smp to manage couchdb files - Add couchdb_manage_files() - Add labeling for /var/log/php_errors.log - Allow bumblebee to stream connect to xserver - Allow bumblebee to send a signal to xserver - gnome-thumbnail to stream connect to bumblebee - Allow xkbcomp running as bumblebee_t to execute bin_t - Allow logrotate to read squid.conf - Additional rules to get docker and lxc to play well with SELinux - Allow bumbleed to connect to xserver port - Allow pegasus_openlmi_storage_t to read hwdata- Allow init_t to work on transitient and snapshot unit files - Add logging_manage_syslog_config() - Update sysnet_dns_name_resolve() to allow connect to dnssec por - Allow pegasus_openlmi_storage_t to read hwdata Resolves:#1031721 - Fix rhcs_rw_cluster_tmpfs() - Allow fenced_t to bind on zented udp port - Added policy for vmtools - Fix mirrormanager_read_lib_files() - Allow mirromanager scripts running as httpd_t to manage mirrormanager pid files - Allow ctdb to create sock files in /var/run/ctdb - Add sblim_filetrans_named_content() interface - Allow rpm scritplets to create /run/gather with correct labeling - Allow gnome keyring domains to create gnome config dirs - Dontaudit read/write to init stream socket for lsmd_plugin_t - Allow automount to read nfs link files - Allow lsm plugins to read/write lsmd stream socket - Allow certmonger to connect ldap port to make IPA CA certificate renewal working. - Add also labeling for /var/run/ctdb - Add missing labeling for /var/lib/ctdb - ALlow tuned to manage syslog.conf. Should be fixed in tuned. #1030446 - Dontaudit hypervkvp to search homedirs - Dontaudit hypervkvp to search admin homedirs - Allow hypervkvp to execute bin_t and ifconfig in the caller domain - Dontaudit xguest_t to read ABRT conf files - Add abrt_dontaudit_read_config() - Allow namespace-init to getattr on fs - Add thumb_role() also for xguest - Add filename transitions to create .spamassassin with correct labeling - Allow apache domain to read mirrormanager pid files - Allow domains to read/write shm and sem owned by mozilla_plugin_t - Allow alsactl to send a generic signal to kernel_t- Add back rpm_run() for unconfined user- Add missing files_create_var_lib_dirs() - Fix typo in ipsec.te - Allow passwd to create directory in /var/lib - Add filename trans also for event21 - Allow iptables command to read /dev/rand - Add sigkill capabilityfor ipsec_t - Add filename transitions for bcache devices - Add additional rules to create /var/log/cron by syslogd_t with correct labeling - Add give everyone full access to all key rings - Add default lvm_var_run_t label for /var/run/multipathd - Fix log labeling to have correct default label for them after logrotate - Labeled ~/.nv/GLCache as being gstreamer output - Allow nagios_system_plugin to read mrtg lib files - Add mrtg_read_lib_files() - Call rhcs_rw_cluster_tmpfs for dlm_controld - Make authconfing as named_filetrans domain - Allow virsh to connect to user process using stream socket - Allow rtas_errd to read rand/urand devices and add chown capability - Fix labeling from /var/run/net-snmpd to correct /var/run/net-snmp Resolves:#1051497 - Add also chown cap for abrt_upload_watch_t. It already has dac_override - Allow sosreport to manage rhsmcertd pid files - Add rhsmcertd_manage_pid_files() - Allow also setgid cap for rpc.gssd - Dontaudit access check for abrt on cert_t - Allow pegasus_openlmi_system providers to dbus chat with systemd-logind- Fix semanage import handling in spec file- Add default lvm_var_run_t label for /var/run/multipathd Resolves:#1051430 - Fix log labeling to have correct default label for them after logrotate - Add files_write_root_dirs - Add new openflow port label for 6653/tcp and 6633/tcp - Add xserver_manage_xkb_libs() - Label tcp/8891 as milter por - Allow gnome_manage_generic_cache_files also create cache_home_t files - Fix aide.log labeling - Fix log labeling to have correct default label for them after logrotate - Allow mysqld-safe write access on /root to make mysqld working - Allow sosreport domtrans to prelikn - Allow OpenvSwitch to connec to openflow ports - Allow NM send dgram to lldpad - Allow hyperv domains to execute shell - Allow lsmd plugins stream connect to lsmd/init - Allow sblim domains to create /run/gather with correct labeling - Allow httpd to read ldap certs - Allow cupsd to send dbus msgs to process with different MLS level - Allow bumblebee to stream connect to apmd - Allow bumblebee to run xkbcomp - Additional allow rules to get libvirt-lxc containers working with docker - Additional allow rules to get libvirt-lxc containers working with docker - Allow docker to getattr on itself - Additional rules needed for sandbox apps - Allow mozilla_plugin to set attributes on usb device if use_spice boolean enabled - httpd should be able to send signal/signull to httpd_suexec_t - Add more fixes for neturon. Domtrans to dnsmasq, iptables. Make neutron as filenamtrans domain.- Add neutron fixes- Allow sshd to write to all process levels in order to change passwd when running at a level - Allow updpwd_t to downgrade /etc/passwd file to s0, if it is not running with this range - Allow apcuspd_t to status and start the power unit file - Allow udev to manage kdump unit file - Added new interface modutils_dontaudit_exec_insmod - Allow cobbler to search dhcp_etc_t directory - systemd_systemctl needs sys_admin capability - Allow sytemd_tmpfiles_t to delete all directories - passwd to create gnome-keyring passwd socket - Add missing zabbix_var_lib_t type - Fix filename trans for zabbixsrv in zabbix.te - Allow fprintd_t to send syslog messages - Add zabbix_var_lib_t for /var/lib/zabbixsrv, also allow zabix to connect to smtp port - Allow mozilla plugin to chat with policykit, needed for spice - Allow gssprozy to change user and gid, as well as read user keyrings - Label upgrades directory under /var/www as httpd_sys_rw_content_t, add other filetrans rules to label content correctly - Allow polipo to connect to http_cache_ports - Allow cron jobs to manage apache var lib content - Allow yppassword to manage the passwd_file_t - Allow showall_t to send itself signals - Allow cobbler to restart dhcpc, dnsmasq and bind services - Allow certmonger to manage home cert files - Add userdom filename trans for user mail domains - Allow apcuspd_t to status and start the power unit file - Allow cgroupdrulesengd to create content in cgoups directories - Allow smbd_t to signull cluster - Allow gluster daemon to create fifo files in glusterd_brick_t and sock_file in glusterd_var_lib_t - Add label for /var/spool/cron.aquota.user - Allow sandbox_x domains to use work with the mozilla plugin semaphore - Added new policy for speech-dispatcher - Added dontaudit rule for insmod_exec_t in rasdaemon policy - Updated rasdaemon policy - Allow system_mail_t to transition to postfix_postdrop_t - Clean up mirrormanager policy - Allow virt_domains to read cert files, needs backport to RHEL7 - Allow sssd to read systemd_login_var_run_t - Allow irc_t to execute shell and bin-t files: - Add new access for mythtv - Allow rsync_t to manage all non auth files - allow modemmanger to read /dev/urand - Allow sandbox apps to attempt to set and get capabilties- Add labeling for /var/lib/servicelog/servicelog.db-journal - Add support for freeipmi port - Add sysadm_u_default_contexts - Make new type to texlive files in homedir - Allow subscription-manager running as sosreport_t to manage rhsmcertd - Additional fixes for docker.te - Remove ability to do mount/sys_admin by default in virt_sandbox domains - New rules required to run docker images within libivrt - Add label for ~/.cvsignore - Change mirrormanager to be run by cron - Add mirrormanager policy - Fixed bumblebee_admin() and mip6d_admin() - Add log support for sensord - Fix typo in docker.te - Allow amanda to do backups over UDP - Allow bumblebee to read /etc/group and clean up bumblebee.te - type transitions with a filename not allowed inside conditionals - Don't allow virt-sandbox tools to use netlink out of the box, needs back port to RHEL7 - Make new type to texlive files in homedir- Allow freeipmi_ipmidetectd_t to use freeipmi port - Update freeipmi_domain_template() - Allow journalctl running as ABRT to read /run/log/journal - Allow NM to read dispatcher.d directory - Update freeipmi policy - Type transitions with a filename not allowed inside conditionals - Allow tor to bind to hplip port - Make new type to texlive files in homedir - Allow zabbix_agent to transition to dmidecode - Add rules for docker - Allow sosreport to send signull to unconfined_t - Add virt_noatsecure and virt_rlimitinh interfaces - Fix labeling in thumb.fc to add support for /usr/lib64/tumbler-1/tumblerddd support for freeipmi port - Add sysadm_u_default_contexts - Add logging_read_syslog_pid() - Fix userdom_manage_home_texlive() interface - Make new type to texlive files in homedir - Add filename transitions for /run and /lock links - Allow virtd to inherit rlimit information Resolves:#975358- Change labeling for /usr/libexec/nm-dispatcher.action to NetworkManager_exec_t Resolves:#1039879 - Add labeling for /usr/lib/systemd/system/mariadb.service - Allow hyperv_domain to read sysfs - Fix ldap_read_certs() interface to allow acess also link files - Add support for /usr/libexec/pegasus/cmpiLMI_Journald-cimprovagt - Allow tuned to run modprobe - Allow portreserve to search /var/lib/sss dir - Add SELinux support for the teamd package contains team network device control daemon. - Dontaudit access check on /proc for bumblebee - Bumblebee wants to load nvidia modules - Fix rpm_named_filetrans_log_files and wine.te - Add conman policy for rawhide - DRM master and input event devices are used by the TakeDevice API - Clean up bumblebee policy - Update pegasus_openlmi_storage_t policy - Add freeipmi_stream_connect() interface - Allow logwatch read madm.conf to support RAID setup - Add raid_read_conf_files() interface - Allow up2date running as rpm_t create up2date log file with rpm_log_t labeling - add rpm_named_filetrans_log_files() interface - Allow dkim-milter to create files/dirs in /tmp - update freeipmi policy - Add policy for freeipmi services - Added rdisc_admin and rdisc_systemctl interfaces - opensm policy clean up - openwsman policy clean up - ninfod policy clean up - Added new policy for ninfod - Added new policy for openwsman - Added rdisc_admin and rdisc_systemctl interfaces - Fix kernel_dontaudit_access_check_proc() - Add support for /dev/uhid - Allow sulogin to get the attributes of initctl and sys_admin cap - Add kernel_dontaudit_access_check_proc() - Fix dev_rw_ipmi_dev() - Fix new interface in devices.if - DRM master and input event devices are used by the TakeDevice API - add dev_rw_inherited_dri() and dev_rw_inherited_input_dev() - Added support for default conman port - Add interfaces for ipmi devices- Allow sosreport to send a signal to ABRT - Add proper aliases for pegasus_openlmi_service_exec_t and pegasus_openlmi_service_t - Label /usr/sbin/htcacheclean as httpd_exec_t Resolves:#1037529 - Added support for rdisc unit file - Add antivirus_db_t labeling for /var/lib/clamav-unofficial-sigs - Allow runuser running as logrotate connections to system DBUS - Label bcache devices as fixed_disk_device_t - Allow systemctl running in ipsec_mgmt_t to access /usr/lib/systemd/system/ipsec.service - Label /usr/lib/systemd/system/ipsec.service as ipsec_mgmt_unit_file_t- Add back setpgid/setsched for sosreport_t- Added fix for clout_init to transition to rpm_script_t (dwalsh@redhat.com)- Dontaudit openshift domains trying to use rawip_sockets, this is caused by a bad check in the kernel. - Allow git_system_t to read git_user_content if the git_system_enable_homedirs boolean is turned on - Add lsmd_plugin_t for lsm plugins - Allow dovecot-deliver to search mountpoints - Add labeling for /etc/mdadm.conf - Allow opelmi admin providers to dbus chat with init_t - Allow sblim domain to read /dev/urandom and /dev/random - Allow apmd to request the kernel load modules - Add glusterd_brick_t type - label mate-keyring-daemon with gkeyringd_exec_t - Add plymouthd_create_log() - Dontaudit leaks from openshift domains into mail domains, needs back port to RHEL6 - Allow sssd to request the kernel loads modules - Allow gpg_agent to use ssh-add - Allow gpg_agent to use ssh-add - Dontaudit access check on /root for myslqd_safe_t - Allow ctdb to getattr on al filesystems - Allow abrt to stream connect to syslog - Allow dnsmasq to list dnsmasq.d directory - Watchdog opens the raw socket - Allow watchdog to read network state info - Dontaudit access check on lvm lock dir - Allow sosreport to send signull to setroubleshootd - Add setroubleshoot_signull() interface - Fix ldap_read_certs() interface - Allow sosreport all signal perms - Allow sosreport to run systemctl - Allow sosreport to dbus chat with rpm - Add glusterd_brick_t files type - Allow zabbix_agentd to read all domain state - Clean up rtas.if - Allow smoltclient to execute ldconfig - Allow sosreport to request the kernel to load a module - Fix userdom_confined_admin_template() - Add back exec_content boolean for secadm, logadm, auditadm - Fix files_filetrans_system_db_named_files() interface - Allow sulogin to getattr on /proc/kcore - Add filename transition also for servicelog.db-journal - Add files_dontaudit_access_check_root() - Add lvm_dontaudit_access_check_lock() interface- Allow watchdog to read /etc/passwd - Allow browser plugins to connect to bumblebee - New policy for bumblebee and freqset - Add new policy for mip6d daemon - Add new policy for opensm daemon - Allow condor domains to read/write condor_master udp_socket - Allow openshift_cron_t to append to openshift log files, label /var/log/openshift - Add back file_pid_filetrans for /var/run/dlm_controld - Allow smbd_t to use inherited tmpfs content - Allow mcelog to use the /dev/cpu device - sosreport runs rpcinfo - sosreport runs subscription-manager - Allow staff_t to run frequency command - Allow systemd_tmpfiles to relabel log directories - Allow staff_t to read xserver_log file - Label hsperfdata_root as tmp_t- More sosreport fixes to make ABRT working- Fix files_dontaudit_unmount_all_mountpoints() - Add support for 2608-2609 tcp/udp ports - Should allow domains to lock the terminal device - More fixes for user config files to make crond_t running in userdomain - Add back disable/reload/enable permissions for system class - Fix manage_service_perms macro - We need to require passwd rootok - Fix zebra.fc - Fix dnsmasq_filetrans_named_content() interface - Allow all sandbox domains create content in svirt_home_t - Allow zebra domains also create zebra_tmp_t files in /tmp - Add support for new zebra services:isisd,babeld. Add systemd support for zebra services. - Fix labeling on neutron and remove transition to iconfig_t - abrt needs to read mcelog log file - Fix labeling on dnsmasq content - Fix labeling on /etc/dnsmasq.d - Allow glusterd to relabel own lib files - Allow sandbox domains to use pam_rootok, and dontaudit attempts to unmount file systems, this is caused by a bug in systemd - Allow ipc_lock for abrt to run journalctl- Fix config.tgz- Fix passenger_stream_connect interface - setroubleshoot_fixit wants to read network state - Allow procmail_t to connect to dovecot stream sockets - Allow cimprovagt service providers to read network states - Add labeling for /var/run/mariadb - pwauth uses lastlog() to update system's lastlog - Allow account provider to read login records - Add support for texlive2013 - More fixes for user config files to make crond_t running in userdomain - Add back disable/reload/enable permissions for system class - Fix manage_service_perms macro - Allow passwd_t to connect to gnome keyring to change password - Update mls config files to have cronjobs in the user domains - Remove access checks that systemd does not actually do- Add support for yubikey in homedir - Add support for upd/3052 port - Allow apcupsd to use PowerChute Network Shutdown - Allow lsmd to execute various lsmplugins - Add labeling also for /etc/watchdog\.d where are watchdog scripts located too - Update gluster_export_all_rw boolean to allow relabel all base file types - Allow x86_energy_perf tool to modify the MSR - Fix /var/lib/dspam/data labeling- Add files_relabel_base_file_types() interface - Allow netlabel-config to read passwd - update gluster_export_all_rw boolean to allow relabel all base file types caused by lsetxattr() - Allow x86_energy_perf tool to modify the MSR - Fix /var/lib/dspam/data labeling - Allow pegasus to domtrans to mount_t - Add labeling for unconfined scripts in /usr/libexec/watchdog/scripts - Add support for unconfined watchdog scripts - Allow watchdog to manage own log files- Add label only for redhat.repo instead of /etc/yum.repos.d. But probably we will need to switch for the directory. - Label /etc/yum.repos.d as system_conf_t - Use sysnet_filetrans_named_content in udev.te instead of generic transition for net_conf_t - Allow dac_override for sysadm_screen_t - Allow init_t to read ipsec_conf_t as we had it for initrc_t. Needed by ipsec unit file. - Allow netlabel-config to read meminfo - Add interface to allow docker to mounton file_t - Add new interface to exec unlabeled files - Allow lvm to use docker semaphores - Setup transitons for .xsessions-errors.old - Change labels of files in /var/lib/*/.ssh to transition properly - Allow staff_t and user_t to look at logs using journalctl - pluto wants to manage own log file - Allow pluto running as ipsec_t to create pluto.log - Fix alias decl in corenetwork.te.in - Add support for fuse.glusterfs - Allow dmidecode to read/write /run/lock/subsys/rhsmcertd - Allow rhsmcertd to manage redhat.repo which is now labeled as system.conf. Allow rhsmcertd to manage all log files. - Additional access for docker - Added more rules to sblim policy - Fix kdumpgui_run_bootloader boolean - Allow dspam to connect to lmtp port - Included sfcbd service into sblim policy - rhsmcertd wants to manaage /etc/pki/consumer dir - Add kdumpgui_run_bootloader boolean - Add support for /var/cache/watchdog - Remove virt_domain attribute for virt_qemu_ga_unconfined_t - Fixes for handling libvirt containes - Dontaudit attempts by mysql_safe to write content into / - Dontaudit attempts by system_mail to modify network config - Allow dspam to bind to lmtp ports - Add new policy to allow staff_t and user_t to look at logs using journalctl - Allow apache cgi scripts to list sysfs - Dontaudit attempts to write/delete user_tmp_t files - Allow all antivirus domains to manage also own log dirs - Allow pegasus_openlmi_services_t to stream connect to sssd_t- Add missing permission checks for nscd- Fix alias decl in corenetwork.te.in - Add support for fuse.glusterfs - Add file transition rules for content created by f5link - Rename quantum_port information to neutron - Allow all antivirus domains to manage also own log dirs - Rename quantum_port information to neutron - Allow pegasus_openlmi_services_t to stream connect to sssd_t- Allow sysadm_t to read login information - Allow systemd_tmpfiles to setattr on var_log_t directories - Udpdate Makefile to include systemd_contexts - Add systemd_contexts - Add fs_exec_hugetlbfs_files() interface - Add daemons_enable_cluster_mode boolean - Fix rsync_filetrans_named_content() - Add rhcs_read_cluster_pid_files() interface - Update rhcs.if with additional interfaces from RHEL6 - Fix rhcs_domain_template() to not create run dirs with cluster_var_run_t - Allow glusterd_t to mounton glusterd_tmp_t - Allow glusterd to unmout al filesystems - Allow xenstored to read virt config - Add label for swift_server.lock and make add filetrans_named_content to make sure content gets created with the correct label - Allow mozilla_plugin_t to mmap hugepages as an executable- Add back userdom_security_admin_template() interface and use it for sysadm_t if sysadm_secadm.pp- Allow sshd_t to read openshift content, needs backport to RHEL6.5 - Label /usr/lib64/sasl2/libsasldb.so.3.0.0 as textrel_shlib_t - Make sur kdump lock is created with correct label if kdumpctl is executed - gnome interface calls should always be made within an optional_block - Allow syslogd_t to connect to the syslog_tls port - Add labeling for /var/run/charon.ctl socket - Add kdump_filetrans_named_content() - Allo setpgid for fenced_t - Allow setpgid and r/w cluster tmpfs for fenced_t - gnome calls should always be within optional blocks - wicd.pid should be labeled as networkmanager_var_run_t - Allow sys_resource for lldpad- Add rtas policy- Allow mailserver_domains to manage and transition to mailman data - Dontaudit attempts by mozilla plugin to relabel content, caused by using mv and cp commands - Allow mailserver_domains to manage and transition to mailman data - Allow svirt_domains to read sysctl_net_t - Allow thumb_t to use tmpfs inherited from the user - Allow mozilla_plugin to bind to the vnc port if running with spice - Add new attribute to discover confined_admins and assign confined admin to it - Fix zabbix to handle attributes in interfaces - Fix zabbix to read system states for all zabbix domains - Fix piranha_domain_template() - Allow ctdbd to create udp_socket. Allow ndmbd to access ctdbd var files. - Allow lldpad sys_rouserce cap due to #986870 - Allow dovecot-auth to read nologin - Allow openlmi-networking to read /proc/net/dev - Allow smsd_t to execute scripts created on the fly labeled as smsd_spool_t - Add zabbix_domain attribute for zabbix domains to treat them together - Add labels for zabbix-poxy-* (#1018221) - Update openlmi-storage policy to reflect #1015067 - Back port piranha tmpfs fixes from RHEL6 - Update httpd_can_sendmail boolean to allow read/write postfix spool maildrop - Add postfix_rw_spool_maildrop_files interface - Call new userdom_admin_user_templat() also for sysadm_secadm.pp - Fix typo in userdom_admin_user_template() - Allow SELinux users to create coolkeypk11sE-Gate in /var/cache/coolkey - Add new attribute to discover confined_admins - Fix labeling for /etc/strongswan/ipsec.d - systemd_logind seems to pass fd to anyone who dbus communicates with it - Dontaudit leaked write descriptor to dmesg- Activate motion policy- Fix gnome_read_generic_data_home_files() - allow openshift_cgroup_t to read/write inherited openshift file types - Remove httpd_cobbler_content * from cobbler_admin interface - Allow svirt sandbox domains to setattr on chr_file and blk_file svirt_sandbox_file_t, so sshd will work within a container - Allow httpd_t to read also git sys content symlinks - Allow init_t to read gnome home data - Dontaudit setroubleshoot_fixit_t execmem, since it does not seem to really need it. - Allow virsh to execute systemctl - Fix for nagios_services plugins - add type defintion for ctdbd_var_t - Add support for /var/ctdb. Allow ctdb block_suspend and read /etc/passwd file - Allow net_admin/netlink_socket all hyperv_domain domains - Add labeling for zarafa-search.log and zarafa-search.pid - Fix hypervkvp.te - Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type - Fix logging policy - Allow syslog to bind to tls ports - Update labeling for /dev/cdc-wdm - Allow to su_domain to read init states - Allow init_t to read gnome home data - Make sure if systemd_logind creates nologin file with the correct label - Clean up ipsec.te- Add auth_exec_chkpwd interface - Fix port definition for ctdb ports - Allow systemd domains to read /dev/urand - Dontaudit attempts for mozilla_plugin to append to /dev/random - Add label for /var/run/charon.* - Add labeling for /usr/lib/systemd/system/lvm2.*dd policy for motion service - Fix for nagios_services plugins - Fix some bugs in zoneminder policy - add type defintion for ctdbd_var_t - Add support for /var/ctdb. Allow ctdb block_suspend and read /etc/passwd file - Allow net_admin/netlink_socket all hyperv_domain domains - Add labeling for zarafa-search.log and zarafa-search.pid - glusterd binds to random unreserved ports - Additional allow rules found by testing glusterfs - apcupsd needs to send a message to all users on the system so needs to look them up - Fix the label on ~/.juniper_networks - Dontaudit attempts for mozilla_plugin to append to /dev/random - Allow polipo_daemon to connect to flash ports - Allow gssproxy_t to create replay caches - Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type- init reload from systemd_localed_t - Allow domains that communicate with systemd_logind_sessions to use systemd_logind_t fd - Allow systemd_localed_t to ask systemd to reload the locale. - Add systemd_runtime_unit_file_t type for unit files that systemd creates in memory - Allow readahead to read /dev/urand - Fix lots of avcs about tuned - Any file names xenstored in /var/log should be treated as xenstored_var_log_t - Allow tuned to inderact with hugepages - Allow condor domains to list etc rw dirs- Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type - Add additional fixes forpegasus_openlmi_account_t - Allow mdadm to read /dev/urand - Allow pegasus_openlmi_storage_t to create mdadm.conf and write it - Add label/rules for /etc/mdadm.conf - Allow pegasus_openlmi_storage_t to transition to fsadm_t - Fixes for interface definition problems - Dontaudit dovecot-deliver to gettatr on all fs dirs - Allow domains to search data_home_t directories - Allow cobblerd to connect to mysql - Allow mdadm to r/w kdump lock files - Add support for kdump lock files - Label zarafa-search as zarafa-indexer - Openshift cgroup wants to read /etc/passwd - Add new sandbox domains for kvm - Allow mpd to interact with pulseaudio if mpd_enable_homedirs is turned on - Fix labeling for /usr/lib/systemd/system/lvm2.* - Add labeling for /usr/lib/systemd/system/lvm2.* - Fix typos to get a new build. We should not cover filename trans rules to prevent duplicate rules - Add sshd_keygen_t policy for sshd-keygen - Fix alsa_home_filetrans interface name and definition - Allow chown for ssh_keygen_t - Add fs_dontaudit_getattr_all_dirs() - Allow init_t to manage etc_aliases_t and read xserver_var_lib_t and chrony keys - Fix up patch to allow systemd to manage home content - Allow domains to send/recv unlabeled traffic if unlabelednet.pp is enabled - Allow getty to exec hostname to get info - Add systemd_home_t for ~/.local/share/systemd directory- Fix lxc labels in config.tgz- Fix labeling for /usr/libexec/kde4/kcmdatetimehelper - Allow tuned to search all file system directories - Allow alsa_t to sys_nice, to get top performance for sound management - Add support for MySQL/PostgreSQL for amavis - Allow openvpn_t to manage openvpn_var_log_t files. - Allow dirsrv_t to create tmpfs_t directories - Allow dirsrv to create dirs in /dev/shm with dirsrv_tmpfs label - Dontaudit leaked unix_stream_sockets into gnome keyring - Allow telepathy domains to inhibit pipes on telepathy domains - Allow cloud-init to domtrans to rpm - Allow abrt daemon to manage abrt-watch tmp files - Allow abrt-upload-watcher to search /var/spool directory - Allow nsswitch domains to manage own process key - Fix labeling for mgetty.* logs - Allow systemd to dbus chat with upower - Allow ipsec to send signull to itself - Allow setgid cap for ipsec_t - Match upstream labeling- Do not build sanbox pkg on MLS- wine_tmp is no longer needed - Allow setroubleshoot to look at /proc - Allow telepathy domains to dbus with systemd logind - Fix handling of fifo files of rpm - Allow mozilla_plugin to transition to itself - Allow certwatch to write to cert_t directories - New abrt application - Allow NetworkManager to set the kernel scheduler - Make wine_domain shared by all wine domains - Allow mdadm_t to read images labeled svirt_image_t - Allow amanda to read /dev/urand - ALlow my_print_default to read /dev/urand - Allow mdadm to write to kdumpctl fifo files - Allow nslcd to send signull to itself - Allow yppasswd to read /dev/urandom - Fix zarafa_setrlimit - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add additional alias for user_tmp_t because wine_tmp_t is no longer used - More handling of ther kernel keyring required by kerberos - New privs needed for init_t when running without transition to initrc_t over bin_t, and without unconfined domain installed- Dontaudit attempts by sosreport to read shadow_t - Allow browser sandbox plugins to connect to cups to print - Add new label mpd_home_t - Label /srv/www/logs as httpd_log_t - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add labels for apache logs under miq package - Allow irc_t to use tcp sockets - fix labels in puppet.if - Allow tcsd to read utmp file - Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to access host keys - Define svirt_socket_t as a domain_type - Take away transition from init_t to initrc_t when executing bin_t, allow init_t to run chk_passwd_t - Fix label on pam_krb5 helper apps- Allow ldconfig to write to kdumpctl fifo files - allow neutron to connect to amqp ports - Allow kdump_manage_crash to list the kdump_crash_t directory - Allow glance-api to connect to amqp port - Allow virt_qemu_ga_t to read meminfo - Add antivirus_home_t type for antivirus date in HOMEDIRS - Allow mpd setcap which is needed by pulseaudio - Allow smbcontrol to create content in /var/lib/samba - Allow mozilla_exec_t to be used as a entrypoint to mozilla_domtrans_spec - Add additional labeling for qemu-ga/fsfreeze-hook.d scripts - amanda_exec_t needs to be executable file - Allow block_suspend cap for samba-net - Allow apps that read ipsec_mgmt_var_run_t to search ipsec_var_run_t - Allow init_t to run crash utility - Treat usr_t just like bin_t for transitions and executions - Add port definition of pka_ca to port 829 for openshift - Allow selinux_store to use symlinks- Allow block_suspend cap for samba-net - Allow t-mission-control to manage gabble cache files - Allow nslcd to read /sys/devices/system/cpu - Allow selinux_store to use symlinks- Allow xdm_t to transition to itself - Call neutron interfaces instead of quantum - Allow init to change targed role to make uncofined services (xrdp which now has own systemd unit file) working. We want them to have in unconfined_t - Make sure directories in /run get created with the correct label - Make sure /root/.pki gets created with the right label - try to remove labeling for motion from zoneminder_exec_t to bin_t - Allow inetd_t to execute shell scripts - Allow cloud-init to read all domainstate - Fix to use quantum port - Add interface netowrkmanager_initrc_domtrans - Fix boinc_execmem - Allow t-mission-control to read gabble cache home - Add labeling for ~/.cache/telepathy/avatars/gabble - Allow memcache to read sysfs data - Cleanup antivirus policy and add additional fixes - Add boolean boinc_enable_execstack - Add support for couchdb in rabbitmq policy - Add interface couchdb_search_pid_dirs - Allow firewalld to read NM state - Allow systemd running as git_systemd to bind git port - Fix mozilla_plugin_rw_tmpfs_files()- Split out rlogin ports from inetd - Treat files labeld as usr_t like bin_t when it comes to transitions - Allow staff_t to read login config - Allow ipsec_t to read .google authenticator data - Allow systemd running as git_systemd to bind git port - Fix mozilla_plugin_rw_tmpfs_files() - Call the correct interface - corenet_udp_bind_ktalkd_port() - Allow all domains that can read gnome_config to read kde config - Allow sandbox domain to read/write mozilla_plugin_tmpfs_t so pulseaudio will work - Allow mdadm to getattr any file system - Allow a confined domain to executes mozilla_exec_t via dbus - Allow cupsd_lpd_t to bind to the printer port - Dontaudit attempts to bind to ports < 1024 when nis is turned on - Allow apache domain to connect to gssproxy socket - Allow rlogind to bind to the rlogin_port - Allow telnetd to bind to the telnetd_port - Allow ktalkd to bind to the ktalkd_port - Allow cvs to bind to the cvs_port- Cleanup related to init_domain()+inetd_domain fixes - Use just init_domain instead of init_daemon_domain in inetd_core_service_domain - svirt domains neeed to create kobject_uevint_sockets - Lots of new access required for sosreport - Allow tgtd_t to connect to isns ports - Allow init_t to transition to all inetd domains: - openct needs to be able to create netlink_object_uevent_sockets - Dontaudit leaks into ldconfig_t - Dontaudit su domains getattr on /dev devices, move su domains to attribute based calls - Move kernel_stream_connect into all Xwindow using users - Dontaudit inherited lock files in ifconfig o dhcpc_t- Also sock_file trans rule is needed in lsm - Fix labeling for fetchmail pid files/dirs - Add additional fixes for abrt-upload-watch - Fix polipo.te - Fix transition rules in asterisk policy - Add fowner capability to networkmanager policy - Allow polipo to connect to tor ports - Cleanup lsmd.if - Cleanup openhpid policy - Fix kdump_read_crash() interface - Make more domains as init domain - Fix cupsd.te - Fix requires in rpm_rw_script_inherited_pipes - Fix interfaces in lsm.if - Allow munin service plugins to manage own tmpfs files/dirs - Allow virtd_t also relabel unix stream sockets for virt_image_type - Make ktalk as init domain - Fix to define ktalkd_unit_file_t correctly - Fix ktalk.fc - Add systemd support for talk-server - Allow glusterd to create sock_file in /run - Allow xdm_t to delete gkeyringd_tmp_t files on logout - Add fixes for hypervkvp policy - Add logwatch_can_sendmail boolean - Allow mysqld_safe_t to handle also symlinks in /var/log/mariadb - Allow xdm_t to delete gkeyringd_tmp_t files on logout- Add selinux-policy-sandbox pkg0 - Allow rhsmcertd to read init state - Allow fsetid for pkcsslotd - Fix labeling for /usr/lib/systemd/system/pkcsslotd.service - Allow fetchmail to create own pid with correct labeling - Fix rhcs_domain_template() - Allow roles which can run mock to read mock lib files to view results - Allow rpcbind to use nsswitch - Fix lsm.if summary - Fix collectd_t can read /etc/passwd file - Label systemd unit files under dracut correctly - Add support for pam_mount to mount user's encrypted home When a user logs in and logs out using ssh - Add support for .Xauthority-n - Label umount.crypt as lvm_exec_t - Allow syslogd to search psad lib files - Allow ssh_t to use /dev/ptmx - Make sure /run/pluto dir is created with correct labeling - Allow syslog to run shell and bin_t commands - Allow ip to relabel tun_sockets - Allow mount to create directories in files under /run - Allow processes to use inherited fifo files- Add policy for lsmd - Add support for /var/log/mariadb dir and allow mysqld_safe to list this directory - Update condor_master rules to allow read system state info and allow logging - Add labeling for /etc/condor and allow condor domain to write it (bug) - Allow condor domains to manage own logs - Allow glusterd to read domains state - Fix initial hypervkvp policy - Add policy for hypervkvpd - Fix redis.if summary- Allow boinc to connect to @/tmp/.X11-unix/X0 - Allow beam.smp to connect to tcp/5984 - Allow named to manage own log files - Add label for /usr/libexec/dcc/start-dccifd and domtrans to dccifd_t - Add virt_transition_userdomain boolean decl - Allow httpd_t to sendto unix_dgram sockets on its children - Allow nova domains to execute ifconfig - bluetooth wants to create fifo_files in /tmp - exim needs to be able to manage mailman data - Allow sysstat to getattr on all file systems - Looks like bluetoothd has moved - Allow collectd to send ping packets - Allow svirt_lxc domains to getpgid - Remove virt-sandbox-service labeling as virsh_exec_t, since it no longer does virsh_t stuff - Allow frpintd_t to read /dev/urandom - Allow asterisk_t to create sock_file in /var/run - Allow usbmuxd to use netlink_kobject - sosreport needs to getattr on lots of devices, and needs access to netlink_kobject_uevent_socket - More cleanup of svirt_lxc policy - virtd_lxc_t now talks to dbus - Dontaudit leaked ptmx_t - Allow processes to use inherited fifo files - Allow openvpn_t to connect to squid ports - Allow prelink_cron_system_t to ask systemd to reloaddd miscfiles_dontaudit_access_check_cert() - Allow ssh_t to use /dev/ptmx - Make sure /run/pluto dir is created with correct labeling - Allow syslog to run shell and bin_t commands - Allow ip to relabel tun_sockets - Allow mount to create directories in files under /run - Allow processes to use inherited fifo files - Allow user roles to connect to the journal socket- selinux_set_enforce_mode needs to be used with type - Add append to the dontaudit for unix_stream_socket of xdm_t leak - Allow xdm_t to create symlinks in log direcotries - Allow login programs to read afs config - Label 10933 as a pop port, for dovecot - New policy to allow selinux_server.py to run as semanage_t as a dbus service - Add fixes to make netlabelctl working on MLS - AVCs required for running sepolicy gui as staff_t - Dontaudit attempts to read symlinks, sepolicy gui is likely to cause this type of AVC - New dbus server to be used with new gui - After modifying some files in /etc/mail, I saw this needed on the next boot - Loading a vm from /usr/tmp with virt-manager - Clean up oracleasm policy for Fedora - Add oracleasm policy written by rlopez@redhat.com - Make postfix_postdrop_t as mta_agent to allow domtrans to system mail if it is executed by apache - Add label for /var/crash - Allow fenced to domtrans to sanclok_t - Allow nagios to manage nagios spool files - Make tfptd as home_manager - Allow kdump to read kcore on MLS system - Allow mysqld-safe sys_nice/sys_resource caps - Allow apache to search automount tmp dirs if http_use_nfs is enabled - Allow crond to transition to named_t, for use with unbound - Allow crond to look at named_conf_t, for unbound - Allow mozilla_plugin_t to transition its home content - Allow dovecot_domain to read all system and network state - Allow httpd_user_script_t to call getpw - Allow semanage to read pid files - Dontaudit leaked file descriptors from user domain into thumb - Make PAM authentication working if it is enabled in ejabberd - Add fixes for rabbit to fix ##992920,#992931 - Allow glusterd to mount filesystems - Loading a vm from /usr/tmp with virt-manager - Trying to load a VM I got an AVC from devicekit_disk for loopcontrol device - Add fix for pand service - shorewall touches own log - Allow nrpe to list /var - Mozilla_plugin_roles can not be passed into lpd_run_lpr - Allow afs domains to read afs_config files - Allow login programs to read afs config - Allow virt_domain to read virt_var_run_t symlinks - Allow smokeping to send its process signals - Allow fetchmail to setuid - Add kdump_manage_crash() interface - Allow abrt domain to write abrt.socket- Add more aliases in pegasus.te - Add more fixes for *_admin interfaces - Add interface fixes - Allow nscd to stream connect to nmbd - Allow gnupg apps to write to pcscd socket - Add more fixes for openlmi provides. Fix naming and support for additionals - Allow fetchmail to resolve host names - Allow firewalld to interact also with lnk files labeled as firewalld_etc_rw_t - Add labeling for cmpiLMI_Fan-cimprovagt - Allow net_admin for glusterd - Allow telepathy domain to create dconf with correct labeling in /home/userX/.cache/ - Add pegasus_openlmi_system_t - Fix puppet_domtrans_master() to make all puppet calling working in passenger.te - Fix corecmd_exec_chroot() - Fix logging_relabel_syslog_pid_socket interface - Fix typo in unconfineduser.te - Allow system_r to access unconfined_dbusd_t to run hp_chec- Allow xdm_t to act as a dbus client to itsel - Allow fetchmail to resolve host names - Allow gnupg apps to write to pcscd socket - Add labeling for cmpiLMI_Fan-cimprovagt - Allow net_admin for glusterd - Allow telepathy domain to create dconf with correct labeling in /home/userX/.cache/ - Add pegasus_openlmi_system_t - Fix puppet_domtrans_master() to make all puppet calling working in passenger.te -httpd_t does access_check on certs- Add support for cmpiLMI_Service-cimprovagt - Allow pegasus domtrans to rpm_t to make pycmpiLMI_Software-cimprovagt running as rpm_t - Label pycmpiLMI_Software-cimprovagt as rpm_exec_t - Add support for pycmpiLMI_Storage-cimprovagt - Add support for cmpiLMI_Networking-cimprovagt - Allow system_cronjob_t to create user_tmpfs_t to make pulseaudio working - Allow virtual machines and containers to run as user doains, needed for virt-sandbox - Allow buglist.cgi to read cpu info- Allow systemd-tmpfile to handle tmp content in print spool dir - Allow systemd-sysctl to send system log messages - Add support for RTP media ports and fmpro-internal - Make auditd working if audit is configured to perform SINGLE action on disk error - Add interfaces to handle systemd units - Make systemd-notify working if pcsd is used - Add support for netlabel and label /usr/sbin/netlabelctl as iptables_exec_t - Instead of having all unconfined domains get all of the named transition rules, - Only allow unconfined_t, init_t, initrc_t and rpm_script_t by default. - Add definition for the salt ports - Allow xdm_t to create link files in xdm_var_run_t - Dontaudit reads of blk files or chr files leaked into ldconfig_t - Allow sys_chroot for useradd_t - Allow net_raw cap for ipsec_t - Allow sysadm_t to reload services - Add additional fixes to make strongswan working with a simple conf - Allow sysadm_t to enable/disable init_t services - Add additional glusterd perms - Allow apache to read lnk files in the /mnt directory - Allow glusterd to ask the kernel to load a module - Fix description of ftpd_use_fusefs boolean - Allow svirt_lxc_net_t to sys_chroot, modify policy to tighten up svirt_lxc_domain capabilties and process controls, but add them to svirt_lxc_net_t - Allow glusterds to request load a kernel module - Allow boinc to stream connect to xserver_t - Allow sblim domains to read /etc/passwd - Allow mdadm to read usb devices - Allow collectd to use ping plugin - Make foghorn working with SNMP - Allow sssd to read ldap certs - Allow haproxy to connect to RTP media ports - Add additional trans rules for aide_db - Add labeling for /usr/lib/pcsd/pcsd - Add labeling for /var/log/pcsd - Add support for pcs which is a corosync and pacemaker configuration tool- Label /var/lib/ipa/pki-ca/publish as pki_tomcat_cert_t - Add labeling for /usr/libexec/kde4/polkit-kde-authentication-agent-1 - Allow all domains that can domtrans to shutdown, to start the power services script to shutdown - consolekit needs to be able to shut down system - Move around interfaces - Remove nfsd_rw_t and nfsd_ro_t, they don't do anything - Add additional fixes for rabbitmq_beam to allow getattr on mountpoints - Allow gconf-defaults-m to read /etc/passwd - Fix pki_rw_tomcat_cert() interface to support lnk_files- Add support for gluster ports - Make sure that all keys located in /etc/ssh/ are labeled correctly - Make sure apcuspd lock files get created with the correct label - Use getcap in gluster.te - Fix gluster policy - add additional fixes to allow beam.smp to interact with couchdb files - Additional fix for #974149 - Allow gluster to user gluster ports - Allow glusterd to transition to rpcd_t and add additional fixes for #980683 - Allow tgtd working when accessing to the passthrough device - Fix labeling for mdadm unit files- Add mdadm fixes- Fix definition of sandbox.disabled to sandbox.pp.disabled- Allow mdamd to execute systemctl - Allow mdadm to read /dev/kvm - Allow ipsec_mgmt_t to read l2tpd pid content- Allow nsd_t to read /dev/urand - Allow mdadm_t to read framebuffer - Allow rabbitmq_beam_t to read process info on rabbitmq_epmd_t - Allow mozilla_plugin_config_t to create tmp files - Cleanup openvswitch policy - Allow mozilla plugin to getattr on all executables - Allow l2tpd_t to create fifo_files in /var/run - Allow samba to touch/manage fifo_files or sock_files in a samba_share_t directory - Allow mdadm to connecto its own unix_stream_socket - FIXME: nagios changed locations to /log/nagios which is wrong. But we need to have this workaround for now. - Allow apache to access smokeping pid files - Allow rabbitmq_beam_t to getattr on all filesystems - Add systemd support for iodined - Allow nup_upsdrvctl_t to execute its entrypoint - Allow fail2ban_client to write to fail2ban_var_run_t, Also allow it to use nsswitch - add labeling for ~/.cache/libvirt-sandbox - Add interface to allow domains transitioned to by confined users to send sigchld to screen program - Allow sysadm_t to check the system status of files labeled etc_t, /etc/fstab - Allow systemd_localed to start /usr/lib/systemd/system/systemd-vconsole-setup.service - Allow an domain that has an entrypoint from a type to be allowed to execute the entrypoint without a transition, I can see no case where this is a bad thing, and elminiates a whole class of AVCs. - Allow staff to getsched all domains, required to run htop - Add port definition for redis port - fix selinuxuser_use_ssh_chroot boolean- Add prosody policy written by Michael Scherer - Allow nagios plugins to read /sys info - ntpd needs to manage own log files - Add support for HOME_DIR/.IBMERS - Allow iptables commands to read firewalld config - Allow consolekit_t to read utmp - Fix filename transitions on .razor directory - Add additional fixes to make DSPAM with LDA working - Allow snort to read /etc/passwd - Allow fail2ban to communicate with firewalld over dbus - Dontaudit openshift_cgreoup_file_t read/write leaked dev - Allow nfsd to use mountd port - Call th proper interface - Allow openvswitch to read sys and execute plymouth - Allow tmpwatch to read /var/spool/cups/tmp - Add support for /usr/libexec/telepathy-rakia - Add systemd support for zoneminder - Allow mysql to create files/directories under /var/log/mysql - Allow zoneminder apache scripts to rw zoneminder tmpfs - Allow httpd to manage zoneminder lib files - Add zoneminder_run_sudo boolean to allow to start zoneminder - Allow zoneminder to send mails - gssproxy_t sock_file can be under /var/lib - Allow web domains to connect to whois port. - Allow sandbox_web_type to connect to the same ports as mozilla_plugin_t. - We really need to add an interface to corenet to define what a web_client_domain is and - then define chrome_sandbox_t, mozilla_plugin_t and sandbox_web_type to that domain. - Add labeling for cmpiLMI_LogicalFile-cimprovagt - Also make pegasus_openlmi_logicalfile_t as unconfined to have unconfined_domain attribute for filename trans rules - Update policy rules for pegasus_openlmi_logicalfile_t - Add initial types for logicalfile/unconfined OpenLMI providers - mailmanctl needs to read own log - Allow logwatch manage own lock files - Allow nrpe to read meminfo - Allow httpd to read certs located in pki-ca - Add pki_read_tomcat_cert() interface - Add support for nagios openshift plugins - Add port definition for redis port - fix selinuxuser_use_ssh_chroot boolean- Shrink the size of policy by moving to attributes, also add dridomain so that mozilla_plugin can follow selinuxuse_dri boolean. - Allow bootloader to manage generic log files - Allow ftp to bind to port 989 - Fix label of new gear directory - Add support for new directory /var/lib/openshift/gears/ - Add openshift_manage_lib_dirs() - allow virtd domains to manage setrans_var_run_t - Allow useradd to manage all openshift content - Add support so that mozilla_plugin_t can use dri devices - Allow chronyd to change the scheduler - Allow apmd to shut downthe system - Devicekit_disk_t needs to manage /etc/fstab- Make DSPAM to act as a LDA working - Allow ntop to create netlink socket - Allow policykit to send a signal to policykit-auth - Allow stapserver to dbus chat with avahi/systemd-logind - Fix labeling on haproxy unit file - Clean up haproxy policy - A new policy for haproxy and placed it to rhcs.te - Add support for ldirectord and treat it with cluster_t - Make sure anaconda log dir is created with var_log_t- Allow lvm_t to create default targets for filesystem handling - Fix labeling for razor-lightdm binaries - Allow insmod_t to read any file labeled var_lib_t - Add policy for pesign - Activate policy for cmpiLMI_Account-cimprovagt - Allow isnsd syscall=listen - /usr/libexec/pegasus/cimprovagt needs setsched caused by sched_setscheduler - Allow ctdbd to use udp/4379 - gatherd wants sys_nice and setsched - Add support for texlive2012 - Allow NM to read file_t (usb stick with no labels used to transfer keys for example) - Allow cobbler to execute apache with domain transition- condor_collector uses tcp/9000 - Label /usr/sbin/virtlockd as virtd_exec_t for now - Allow cobbler to execute ldconfig - Allow NM to execute ssh - Allow mdadm to read /dev/crash - Allow antivirus domains to connect to snmp port - Make amavisd-snmp working correctly - Allow nfsd_t to mounton nfsd_fs_t - Add initial snapper policy - We still need to have consolekit policy - Dontaudit firefox attempting to connect to the xserver_port_t if run within sandbox_web_t - Dontaudit sandbox apps attempting to open user_devpts_t - Allow dirsrv to read network state - Fix pki_read_tomcat_lib_files - Add labeling for /usr/libexec/nm-ssh-service - Add label cert_t for /var/lib/ipa/pki-ca/publish - Lets label /sys/fs/cgroup as cgroup_t for now, to keep labels consistant - Allow nfsd_t to mounton nfsd_fs_t - Dontaudit sandbox apps attempting to open user_devpts_t - Allow passwd_t to change role to system_r from unconfined_r- Don't audit access checks by sandbox xserver on xdb var_lib - Allow ntop to read usbmon devices - Add labeling for new polcykit authorizor - Dontaudit access checks from fail2ban_client - Don't audit access checks by sandbox xserver on xdb var_lib - Allow apps that connect to xdm stream to conenct to xdm_dbusd_t stream - Fix labeling for all /usr/bim/razor-lightdm-* binaries - Add filename trans for /dev/md126p1- Make vdagent able to request loading kernel module - Add support for cloud-init make it as unconfined domain - Allow snmpd to run smartctl in fsadm_t domain - remove duplicate openshift_search_lib() interface - Allow mysqld to search openshift lib files - Allow openshift cgroup to interact with passedin file descriptors - Allow colord to list directories inthe users homedir - aide executes prelink to check files - Make sure cupsd_t creates content in /etc/cups with the correct label - Lest dontaudit apache read all domains, so passenger will not cause this avc - Allow gssd to connect to gssproxy - systemd-tmpfiles needs to be able to raise the level to fix labeling on /run/setrans in MLS - Allow systemd-tmpfiles to relabel also lock files - Allow useradd to add homdir in /var/lib/openshift - Allow setfiles and semanage to write output to /run/files- Add labeling for /dev/tgt - Dontaudit leak fd from firewalld for modprobe - Allow runuser running as rpm_script_t to create netlink_audit socket - Allow mdadm to read BIOS non-volatile RAM- accountservice watches when accounts come and go in wtmp - /usr/java/jre1.7.0_21/bin/java needs to create netlink socket - Add httpd_use_sasl boolean - Allow net_admin for tuned_t - iscsid needs sys_module to auto-load kernel modules - Allow blueman to read bluetooth conf - Add nova_manage_lib_files() interface - Fix mplayer_filetrans_home_content() - Add mplayer_filetrans_home_content() - mozilla_plugin_config_roles need to be able to access mozilla_plugin_config_t - Revert "Allow thumb_t to append inherited xdm stream socket" - Add iscsi_filetrans_named_content() interface - Allow to create .mplayer with the correct labeling for unconfined - Allow iscsiadmin to create lock file with the correct labeling- Allow wine to manage wine home content - Make amanda working with socket actiovation - Add labeling for /usr/sbin/iscsiadm - Add support for /var/run/gssproxy.sock - dnsmasq_t needs to read sysctl_net_t- Fix courier_domain_template() interface - Allow blueman to write ip_forward - Allow mongodb to connect to mongodb port - Allow mongodb to connect to mongodb port - Allow java to bind jobss_debug port - Fixes for *_admin interfaces - Allow iscsid auto-load kernel modules needed for proper iSCSI functionality - Need to assign attribute for courier_domain to all courier_domains - Fail2ban reads /etc/passwd - postfix_virtual will create new files in postfix_spool_t - abrt triggers sys_ptrace by running pidof - Label ~/abc as mozilla_home_t, since java apps as plugin want to create it - Add passenger fixes needed by foreman - Remove dup interfaces - Add additional interfaces for quantum - Add new interfaces for dnsmasq - Allow passenger to read localization and send signull to itself - Allow dnsmasq to stream connect to quantum - Add quantum_stream_connect() - Make sure that mcollective starts the service with the correct labeling - Add labels for ~/.manpath - Dontaudit attempts by svirt_t to getpw* calls - sandbox domains are trying to look at parent process data - Allow courior auth to create its pid file in /var/spool/courier subdir - Add fixes for beam to have it working with couchdb - Add labeling for /run/nm-xl2tpd.con - Allow apache to stream connect to thin - Add systemd support for amand - Make public types usable for fs mount points - Call correct mandb interface in domain.te - Allow iptables to r/w quantum inherited pipes and send sigchld - Allow ifconfig domtrans to iptables and execute ldconfig - Add labels for ~/.manpath - Allow systemd to read iscsi lib files - seunshare is trying to look at parent process data- Fix openshift_search_lib - Add support for abrt-uefioops-oops - Allow colord to getattr any file system - Allow chrome processes to look at each other - Allow sys_ptrace for abrt_t - Add new policy for gssproxy - Dontaudit leaked file descriptor writes from firewalld - openshift_net_type is interface not template - Dontaudit pppd to search gnome config - Update openshift_search_lib() interface - Add fs_list_pstorefs() - Fix label on libbcm_host.so since it is built incorrectly on raspberry pi, needs back port to F18 - Better labels for raspberry pi devices - Allow init to create devpts_t directory - Temporarily label rasbery pi devices as memory_device_t, needs back port to f18 - Allow sysadm_t to build kernels - Make sure mount creates /var/run/blkid with the correct label, needs back port to F18 - Allow userdomains to stream connect to gssproxy - Dontaudit leaked file descriptor writes from firewalld - Allow xserver to read /dev/urandom - Add additional fixes for ipsec-mgmt - Make SSHing into an Openshift Enterprise Node working- Add transition rules to unconfined domains and to sysadm_t to create /etc/adjtime - with the proper label. - Update files_filetrans_named_content() interface to get right labeling for pam.d conf files - Allow systemd-timedated to create adjtime - Add clock_create_adjtime() - Additional fix ifconfing for #966106 - Allow kernel_t to create boot.log with correct labeling - Remove unconfined_mplayer for which we don't have rules - Rename interfaces - Add userdom_manage_user_home_files/dirs interfaces - Fix files_dontaudit_read_all_non_security_files - Fix ipsec_manage_key_file() - Fix ipsec_filetrans_key_file() - Label /usr/bin/razor-lightdm-greeter as xdm_exec_t instead of spamc_exec_t - Fix labeling for ipse.secrets - Add interfaces for ipsec and labeling for ipsec.info and ipsec_setup.pid - Add files_dontaudit_read_all_non_security_files() interface - /var/log/syslog-ng should be labeled var_log_t - Make ifconfig_var_run_t a mountpoint - Add transition from ifconfig to dnsmasq - Allow ifconfig to execute bin_t/shell_exec_t - We want to have hwdb.bin labeled as etc_t - update logging_filetrans_named_content() interface - Allow systemd_timedate_t to manage /etc/adjtime - Allow NM to send signals to l2tpd - Update antivirus_can_scan_system boolean - Allow devicekit_disk_t to sys_config_tty - Run abrt-harvest programs as abrt_t, and allow abrt_t to list all filesystem directories - Make printing from vmware working - Allow php-cgi from php54 collection to access /var/lib/net-snmp/mib_indexes - Add virt_qemu_ga_data_t for qemu-ga - Make chrome and mozilla able to connect to same ports, add jboss_management_port_t to both - Fix typo in virt.te - Add virt_qemu_ga_unconfined_t for hook scripts - Make sure NetworkManager files get created with the correct label - Add mozilla_plugin_use_gps boolean - Fix cyrus to have support for net-snmp - Additional fixes for dnsmasq and quantum for #966106 - Add plymouthd_create_log() - remove httpd_use_oddjob for which we don't have rules - Add missing rules for httpd_can_network_connect_cobbler - Add missing cluster_use_execmem boolean - Call userdom_manage_all_user_home_type_files/dirs - Additional fix for ftp_home_dir - Fix ftp_home_dir boolean - Allow squit to recv/send client squid packet - Fix nut.te to have nut_domain attribute - Add support for ejabberd; TODO: revisit jabberd and rabbit policy - Fix amanda policy - Add more fixes for domains which use libusb - Make domains which use libusb working correctly - Allow l2tpd to create ipsec key files with correct labeling and manage them - Fix cobbler_manage_lib_files/cobbler_read_lib_files to cover also lnk files - Allow rabbitmq-beam to bind generic node - Allow l2tpd to read ipse-mgmt pid files - more fixes for l2tpd, NM and pppd from #967072- Dontaudit to getattr on dirs for dovecot-deliver - Allow raiudusd server connect to postgresql socket - Add kerberos support for radiusd - Allow saslauthd to connect to ldap port - Allow postfix to manage postfix_private_t files - Add chronyd support for #965457 - Fix labeling for HOME_DIR/\.icedtea - CHange squid and snmpd to be allowed also write own logs - Fix labeling for /usr/libexec/qemu-ga - Allow virtd_t to use virt_lock_t - Allow also sealert to read the policy from the kernel - qemu-ga needs to execute scripts in /usr/libexec/qemu-ga and to use /tmp content - Dontaudit listing of users homedir by sendmail Seems like a leak - Allow passenger to transition to puppet master - Allow apache to connect to mythtv - Add definition for mythtv ports- Add additional fixes for #948073 bug - Allow sge_execd_t to also connect to sge ports - Allow openshift_cron_t to manage openshift_var_lib_t sym links - Allow openshift_cron_t to manage openshift_var_lib_t sym links - Allow sge_execd to bind sge ports. Allow kill capability and reads cgroup files - Remove pulseaudio filetrans pulseaudio_manage_home_dirs which is a part of pulseaudio_manage_home_files - Add networkmanager_stream_connect() - Make gnome-abrt wokring with staff_t - Fix openshift_manage_lib_files() interface - mdadm runs ps command which seems to getattr on random log files - Allow mozilla_plugin_t to create pulseaudit_home_t directories - Allow qemu-ga to shutdown virtual hosts - Add labelling for cupsd-browsed - Add web browser plugins to connect to aol ports - Allow nm-dhcp-helper to stream connect to NM - Add port definition for sge ports- Make sure users and unconfined domains create .hushlogin with the correct label - Allow pegaus to chat with realmd over DBus - Allow cobblerd to read network state - Allow boicn-client to stat on /dev/input/mice - Allow certwatch to read net_config_t when it executes apache - Allow readahead to create /run/systemd and then create its own directory with the correct label- Transition directories and files when in a user_tmp_t directory - Change certwatch to domtrans to apache instead of just execute - Allow virsh_t to read xen lib files - update policy rules for pegasus_openlmi_account_t - Add support for svnserve_tmp_t - Activate account openlmi policy - pegasus_openlmi_domain_template needs also require pegasus_t - One more fix for policykit.te - Call fs_list_cgroups_dirs() in policykit.te - Allow nagios service plugin to read mysql config files - Add labeling for /var/svn - Fix chrome.te - Fix pegasus_openlmi_domain_template() interfaces - Fix dev_rw_vfio_dev definiton, allow virtd_t to read tmpfs_t symlinks - Fix location of google-chrome data - Add support for chome_sandbox to store content in the homedir - Allow policykit to watch for changes in cgroups file system - Add boolean to allow mozilla_plugin_t to use spice - Allow collectd to bind to udp port - Allow collected_t to read all of /proc - Should use netlink socket_perms - Should use netlink socket_perms - Allow glance domains to connect to apache ports - Allow apcupsd_t to manage its log files - Allow chrome objects to rw_inherited unix_stream_socket from callers - Allow staff_t to execute virtd_exec_t for running vms - nfsd_t needs to bind mountd port to make nfs-mountd.service working - Allow unbound net_admin capability because of setsockopt syscall - Fix fs_list_cgroup_dirs() - Label /usr/lib/nagios/plugins/utils.pm as bin_t - Remove uplicate definition of fs_read_cgroup_files() - Remove duplicate definition of fs_read_cgroup_files() - Add files_mountpoint_filetrans interface to be used by quotadb_t and snapperd - Additional interfaces needed to list and read cgroups config - Add port definition for collectd port - Add labels for /dev/ptp* - Allow staff_t to execute virtd_exec_t for running vms- Allow samba-net to also read realmd tmp files - Allow NUT to use serial ports - realmd can be started by systemctl now- Remove userdom_home_manager for xdm_t and move all rules to xserver.te directly - Add new xdm_write_home boolean to allow xdm_t to create files in HOME dirs with xdm_home_t - Allow postfix-showq to read/write unix.showq in /var/spool/postfix/pid - Allow virsh to read xen lock file - Allow qemu-ga to create files in /run with proper labeling - Allow glusterd to connect to own socket in /tmp - Allow glance-api to connect to http port to make glance image-create working - Allow keystonte_t to execute rpm- Fix realmd cache interfaces- Allow tcpd to execute leafnode - Allow samba-net to read realmd cache files - Dontaudit sys_tty_config for alsactl - Fix allow rules for postfix_var_run - Allow cobblerd to read /etc/passwd - Allow pegasus to read exports - Allow systemd-timedate to read xdm state - Allow mout to stream connect to rpcbind - Add labeling just for /usr/share/pki/ca-trust-source instead of /usr/share/pki- Allow thumbnails to share memory with apps which run thumbnails - Allow postfix-postqueue block_suspend - Add lib interfaces for smsd - Add support for nginx - Allow s2s running as jabberd_t to connect to jabber_interserver_port_t - Allow pki apache domain to create own tmp files and execute httpd_suexec - Allow procmail to manger user tmp files/dirs/lnk_files - Add virt_stream_connect_svirt() interface - Allow dovecot-auth to execute bin_t - Allow iscsid to request that kernel load a kernel module - Add labeling support for /var/lib/mod_security - Allow iw running as tuned_t to create netlink socket - Dontaudit sys_tty_config for thumb_t - Add labeling for nm-l2tp-service - Allow httpd running as certwatch_t to open tcp socket - Allow useradd to manager smsd lib files - Allow useradd_t to add homedirs in /var/lib - Fix typo in userdomain.te - Cleanup userdom_read_home_certs - Implement userdom_home_reader_certs_type to allow read certs also on encrypt /home with ecryptfs_t - Allow staff to stream connect to svirt_t to make gnome-boxes working- Allow lvm to create its own unit files - Label /var/lib/sepolgen as selinux_config_t - Add filetrans rules for tw devices - Add transition from cupsd_config_t to cupsd_t- Add filetrans rules for tw devices - Cleanup bad transition lines- Fix lockdev_manage_files() - Allow setroubleshootd to read var_lib_t to make email_alert working - Add lockdev_manage_files() - Call proper interface in virt.te - Allow gkeyring_domain to create /var/run/UID/config/dbus file - system dbus seems to be blocking suspend - Dontaudit attemps to sys_ptrace, which I believe gpsd does not need - When you enter a container from root, you generate avcs with a leaked file descriptor - Allow mpd getattr on file system directories - Make sure realmd creates content with the correct label - Allow systemd-tty-ask to write kmsg - Allow mgetty to use lockdev library for device locking - Fix selinuxuser_user_share_music boolean name to selinuxuser_share_music - When you enter a container from root, you generate avcs with a leaked file descriptor - Make sure init.fc files are labeled correctly at creation - File name trans vconsole.conf - Fix labeling for nagios plugins - label shared libraries in /opt/google/chrome as testrel_shlib_t- Allow certmonger to dbus communicate with realmd - Make realmd working- Fix mozilla specification of homedir content - Allow certmonger to read network state - Allow tmpwatch to read tmp in /var/spool/{cups,lpd} - Label all nagios plugin as unconfined by default - Add httpd_serve_cobbler_files() - Allow mdadm to read /dev/sr0 and create tmp files - Allow certwatch to send mails - Fix labeling for nagios plugins - label shared libraries in /opt/google/chrome as testrel_shlib_t- Allow realmd to run ipa, really needs to be an unconfined_domain - Allow sandbox domains to use inherted terminals - Allow pscd to use devices labeled svirt_image_t in order to use cat cards. - Add label for new alsa pid - Alsa now uses a pid file and needs to setsched - Fix oracleasmfs_t definition - Add support for sshd_unit_file_t - Add oracleasmfs_t - Allow unlabeled_t files to be stored on unlabeled_t filesystems- Fix description of deny_ptrace boolean - Remove allow for execmod lib_t for now - Allow quantum to connect to keystone port - Allow nova-console to talk with mysql over unix stream socket - Allow dirsrv to stream connect to uuidd - thumb_t needs to be able to create ~/.cache if it does not exist - virtd needs to be able to sys_ptrace when starting and stoping containers- Allow alsa_t signal_perms, we probaly should search for any app that can execute something without transition and give it signal_perms... - Add dontaudit for mozilla_plugin_t looking at the xdm_t sockets - Fix deny_ptrace boolean, certain ptrace leaked into the system - Allow winbind to manage kerberos_rcache_host - Allow spamd to create spamd_var_lib_t directories - Remove transition to mozilla_tmp_t by mozilla_t, to allow it to manage the users tmp dirs - Add mising nslcd_dontaudit_write_sock_file() interface - one more fix - Fix pki_read_tomcat_lib_files() interface - Allow certmonger to read pki-tomcat lib files - Allow certwatch to execute bin_t - Allow snmp to manage /var/lib/net-snmp files - Call snmp_manage_var_lib_files(fogorn_t) instead of snmp_manage_var_dirs - Fix vmware_role() interface - Fix cobbler_manage_lib_files() interface - Allow nagios check disk plugins to execute bin_t - Allow quantum to transition to openvswitch_t - Allow postdrop to stream connect to postfix-master - Allow quantum to stream connect to openvswitch - Add xserver_dontaudit_xdm_rw_stream_sockets() interface - Allow daemon to send dgrams to initrc_t - Allow kdm to start the power service to initiate a reboot or poweroff- Add mising nslcd_dontaudit_write_sock_file() interface - one more fix - Fix pki_read_tomcat_lib_files() interface - Allow certmonger to read pki-tomcat lib files - Allow certwatch to execute bin_t - Allow snmp to manage /var/lib/net-snmp files - Don't audit attempts to write to stream socket of nscld by thumbnailers - Allow git_system_t to read network state - Allow pegasas to execute mount command - Fix desc for drdb_admin - Fix condor_amin() - Interface fixes for uptime, vdagent, vnstatd - Fix labeling for moodle in /var/www/moodle/data - Add interface fixes - Allow bugzilla to read certs - /var/www/moodle needs to be writable by apache - Add interface to dontaudit attempts to send dbus messages to systemd domains, for xguest - Fix namespace_init_t to create content with proper labels, and allow it to manage all user content - Allow httpd_t to connect to osapi_compute port using httpd_use_openstack bolean - Fixes for dlm_controld - Fix apache_read_sys_content_rw_dirs() interface - Allow logrotate to read /var/log/z-push dir - Fix sys_nice for cups_domain - Allow postfix_postdrop to acces postfix_public socket - Allow sched_setscheduler for cupsd_t - Add missing context for /usr/sbin/snmpd - Kernel_t needs mac_admin in order to support labeled NFS - Fix systemd_dontaudit_dbus_chat() interface - Add interface to dontaudit attempts to send dbus messages to systemd domains, for xguest - Allow consolehelper domain to write Xauth files in /root - Add port definition for osapi_compute port - Allow unconfined to create /etc/hostname with correct labeling - Add systemd_filetrans_named_hostname() interface- Allow httpd_t to connect to osapi_compute port using httpd_use_openstack bolean - Fixes for dlm_controld - Fix apache_read_sys_content_rw_dirs() interface - Allow logrotate to read /var/log/z-push dir - Allow postfix_postdrop to acces postfix_public socket - Allow sched_setscheduler for cupsd_t - Add missing context for /usr/sbin/snmpd - Allow consolehelper more access discovered by Tom London - Allow fsdaemon to send signull to all domain - Add port definition for osapi_compute port - Allow unconfined to create /etc/hostname with correct labeling - Add systemd_filetrans_named_hostname() interface- Fix file_contexts.subs to label /run/lock correctly- Try to label on controlC devices up to 30 correctly - Add mount_rw_pid_files() interface - Add additional mount/umount interfaces needed by mock - fsadm_t sends audit messages in reads kernel_ipc_info when doing livecd-iso-to-disk - Fix tabs - Allow initrc_domain to search rgmanager lib files - Add more fixes which make mock working together with confined users * Allow mock_t to manage rpm files * Allow mock_t to read rpm log files * Allow mock to setattr on tmpfs, devpts * Allow mount/umount filesystems - Add rpm_read_log() interface - yum-cron runs rpm from within it. - Allow tuned to transition to dmidecode - Allow firewalld to do net_admin - Allow mock to unmont tmpfs_t - Fix virt_sigkill() interface - Add additional fixes for mock. Mainly caused by mount running in mock_t - Allow mock to write sysfs_t and mount pid files - Add mailman_domain to mailman_template() - Allow openvswitch to execute shell - Allow qpidd to use kerberos - Allow mailman to use fusefs, needs back port to RHEL6 - Allow apache and its scripts to use anon_inodefs - Add alias for git_user_content_t and git_sys_content_t so that RHEL6 will update to RHEL7 - Realmd needs to connect to samba ports, needs back port to F18 also - Allow colord to read /run/initial-setup- - Allow sanlock-helper to send sigkill to virtd which is registred to sanlock - Add virt_kill() interface - Add rgmanager_search_lib() interface - Allow wdmd to getattr on all filesystems. Back ported from RHEL6- Allow realmd to create tmp files - FIx ircssi_home_t type to irssi_home_t - Allow adcli running as realmd_t to connect to ldap port - Allow NetworkManager to transition to ipsec_t, for running strongswan - Make openshift_initrc_t an lxc_domain - Allow gssd to manage user_tmp_t files - Fix handling of irclogs in users homedir - Fix labeling for drupal an wp-content in subdirs of /var/www/html - Allow abrt to read utmp_t file - Fix openshift policy to transition lnk_file, sock-file an fifo_file when created in a tmpfs_t, needs back port to RHEL6 - fix labeling for (oo|rhc)-restorer-wrapper.sh - firewalld needs to be able to write to network sysctls - Fix mozilla_plugin_dontaudit_rw_sem() interface - Dontaudit generic ipc read/write to a mozilla_plugin for sandbox_x domains - Add mozilla_plugin_dontaudit_rw_sem() interface - Allow svirt_lxc_t to transition to openshift domains - Allow condor domains block_suspend and dac_override caps - Allow condor_master to read passd - Allow condor_master to read system state - Allow NetworkManager to transition to ipsec_t, for running strongswan - Lots of access required by lvm_t to created encrypted usb device - Allow xdm_t to dbus communicate with systemd_localed_t - Label strongswan content as ipsec_exec_mgmt_t for now - Allow users to dbus chat with systemd_localed - Fix handling of .xsession-errors in xserver.if, so kde will work - Might be a bug but we are seeing avc's about people status on init_t:service - Make sure we label content under /var/run/lock as <> - Allow daemon and systemprocesses to search init_var_run_t directory - Add boolean to allow xdm to write xauth data to the home directory - Allow mount to write keys for the unconfined domain - Add unconfined_write_keys() interface- Add labeling for /usr/share/pki - Allow programs that read var_run_t symlinks also read var_t symlinks - Add additional ports as mongod_port_t for 27018, 27019, 28017, 28018 and 28019 ports - Fix labeling for /etc/dhcp directory - add missing systemd_stub_unit_file() interface - Add files_stub_var() interface - Add lables for cert_t directories - Make localectl set-x11-keymap working at all - Allow abrt to manage mock build environments to catch build problems. - Allow virt_domains to setsched for running gdb on itself - Allow thumb_t to execute user home content - Allow pulseaudio running as mozilla_plugin_t to read /run/systemd/users/1000 - Allow certwatch to execut /usr/bin/httpd - Allow cgred to send signal perms to itself, needs back port to RHEL6 - Allow openshift_cron_t to look at quota - Allow cups_t to read inhered tmpfs_t from the kernel - Allow yppasswdd to use NIS - Tuned wants sys_rawio capability - Add ftpd_use_fusefs boolean - Allow dirsrvadmin_t to signal itself- Allow localectl to read /etc/X11/xorg.conf.d directory - Revert "Revert "Fix filetrans rules for kdm creates .xsession-errors"" - Allow mount to transition to systemd_passwd_agent - Make sure abrt directories are labeled correctly - Allow commands that are going to read mount pid files to search mount_var_run_t - label /usr/bin/repoquery as rpm_exec_t - Allow automount to block suspend - Add abrt_filetrans_named_content so that abrt directories get labeled correctly - Allow virt domains to setrlimit and read file_context- Allow nagios to manage nagios spool files - /var/spool/snmptt is a directory which snmdp needs to write to, needs back port to RHEL6 - Add swift_alias.* policy files which contain typealiases for swift types - Add support for /run/lock/opencryptoki - Allow pkcsslotd chown capability - Allow pkcsslotd to read passwd - Add rsync_stub() interface - Allow systemd_timedate also manage gnome config homedirs - Label /usr/lib64/security/pam_krb5/pam_krb5_cchelper as bin_t - Fix filetrans rules for kdm creates .xsession-errors - Allow sytemd_tmpfiles to create wtmp file - Really should not label content under /var/lock, since it could have labels on it different from var_lock_t - Allow systemd to list all file system directories - Add some basic stub interfaces which will be used in PRODUCT policies- Fix log transition rule for cluster domains - Start to group all cluster log together - Dont use filename transition for POkemon Advanced Adventure until a new checkpolicy update - cups uses usbtty_device_t devices - These fixes were all required to build a MLS virtual Machine with single level desktops - Allow domains to transiton using httpd_exec_t - Allow svirt domains to manage kernel key rings - Allow setroubleshoot to execute ldconfig - Allow firewalld to read generate gnome data - Allow bluetooth to read machine-info - Allow boinc domain to send signal to itself - Fix gnome_filetrans_home_content() interface - Allow mozilla_plugins to list apache modules, for use with gxine - Fix labels for POkemon in the users homedir - Allow xguest to read mdstat - Dontaudit virt_domains getattr on /dev/* - These fixes were all required to build a MLS virtual Machine with single level desktops - Need to back port this to RHEL6 for openshift - Add tcp/8891 as milter port - Allow nsswitch domains to read sssd_var_lib_t files - Allow ping to read network state. - Fix typo - Add labels to /etc/X11/xorg.d and allow systemd-timestampd_t to manage them- Adopt swift changes from lhh@redhat.com - Add rhcs_manage_cluster_pid_files() interface - Allow screen domains to configure tty and setup sock_file in ~/.screen directory - ALlow setroubleshoot to read default_context_t, needed to backport to F18 - Label /etc/owncloud as being an apache writable directory - Allow sshd to stream connect to an lxc domain- Allow postgresql to manage rgmanager pid files - Allow postgresql to read ccs data - Allow systemd_domain to send dbus messages to policykit - Add labels for /etc/hostname and /etc/machine-info and allow systemd-hostnamed to create them - All systemd domains that create content are reading the file_context file and setfscreate - Systemd domains need to search through init_var_run_t - Allow sshd to communicate with libvirt to set containers labels - Add interface to manage pid files - Allow NetworkManger_t to read /etc/hostname - Dontaudit leaked locked files into openshift_domains - Add fixes for oo-cgroup-read - it nows creates tmp files - Allow gluster to manage all directories as well as files - Dontaudit chrome_sandbox_nacl_t using user terminals - Allow sysstat to manage its own log files - Allow virtual machines to setrlimit and send itself signals. - Add labeling for /var/run/hplip- Fix POSTIN scriptlet- Merge rgmanger, corosync,pacemaker,aisexec policies to cluster_t in rhcs.pp- Fix authconfig.py labeling - Make any domains that write homedir content do it correctly - Allow glusterd to read/write anyhwere on the file system by default - Be a little more liberal with the rsync log files - Fix iscsi_admin interface - Allow iscsid_t to read /dev/urand - Fix up iscsi domain for use with unit files - Add filename transition support for spamassassin policy - Allow web plugins to use badly formated libraries - Allow nmbd_t to create samba_var_t directories - Add filename transition support for spamassassin policy - Add filename transition support for tvtime - Fix alsa_home_filetrans_alsa_home() interface - Move all userdom_filetrans_home_content() calling out of booleans - Allow logrotote to getattr on all file sytems - Remove duplicate userdom_filetrans_home_content() calling - Allow kadmind to read /etc/passwd - Dontaudit append .xsession-errors file on ecryptfs for policykit-auth - Allow antivirus domain to manage antivirus db links - Allow logrotate to read /sys - Allow mandb to setattr on man dirs - Remove mozilla_plugin_enable_homedirs boolean - Fix ftp_home_dir boolean - homedir mozilla filetrans has been moved to userdom_home_manager - homedir telepathy filetrans has been moved to userdom_home_manager - Remove gnome_home_dir_filetrans() from gnome_role_gkeyringd() - Might want to eventually write a daemon on fusefsd. - Add policy fixes for sshd [net] child from plautrba@redhat.com - Tor uses a new port - Remove bin_t for authconfig.py - Fix so only one call to userdom_home_file_trans - Allow home_manager_types to create content with the correctl label - Fix all domains that write data into the homedir to do it with the correct label - Change the postgresql to use proper boolean names, which is causing httpd_t to - not get access to postgresql_var_run_t - Hostname needs to send syslog messages - Localectl needs to be able to send dbus signals to users - Make sure userdom_filetrans_type will create files/dirs with user_home_t labeling by default - Allow user_home_manger domains to create spam* homedir content with correct labeling - Allow user_home_manger domains to create HOMEDIR/.tvtime with correct labeling - Add missing miscfiles_setattr_man_pages() interface and for now comment some rules for userdom_filetrans_type to make build process working - Declare userdom_filetrans_type attribute - userdom_manage_home_role() needs to be called withoout usertype attribute because of userdom_filetrans_type attribute - fusefsd is mounding a fuse file system on /run/user/UID/gvfs- Man pages are now generated in the build process - Allow cgred to list inotifyfs filesystem- Allow gluster to get attrs on all fs - New access required for virt-sandbox - Allow dnsmasq to execute bin_t - Allow dnsmasq to create content in /var/run/NetworkManager - Fix openshift_initrc_signal() interface - Dontaudit openshift domains doing getattr on other domains - Allow consolehelper domain to communicate with session bus - Mock should not be transitioning to any other domains, we should keep mock_t as mock_t - Update virt_qemu_ga_t policy - Allow authconfig running from realmd to restart oddjob service - Add systemd support for oddjob - Add initial policy for realmd_consolehelper_t which if for authconfig executed by realmd - Add labeling for gnashpluginrc - Allow chrome_nacl to execute /dev/zero - Allow condor domains to read /proc - mozilla_plugin_t will getattr on /core if firefox crashes - Allow condor domains to read /etc/passwd - Allow dnsmasq to execute shell scripts, openstack requires this access - Fix glusterd labeling - Allow virtd_t to interact with the socket type - Allow nmbd_t to override dac if you turned on sharing all files - Allow tuned to created kobject_uevent socket - Allow guest user to run fusermount - Allow openshift to read /proc and locale - Allow realmd to dbus chat with rpm - Add new interface for virt - Remove depracated interfaces - Allow systemd_domains read access on etc, etc_runtime and usr files, also allow them to connect stream to syslog socket - /usr/share/munin/plugins/plugin.sh should be labeled as bin_t - Remove some more unconfined_t process transitions, that I don't believe are necessary - Stop transitioning uncofnined_t to checkpc - dmraid creates /var/lock/dmraid - Allow systemd_localed to creatre unix_dgram_sockets - Allow systemd_localed to write kernel messages. - Also cleanup systemd definition a little. - Fix userdom_restricted_xwindows_user_template() interface - Label any block devices or char devices under /dev/infiniband as fixed_disk_device_t - User accounts need to dbus chat with accountsd daemon - Gnome requires all users to be able to read /proc/1/- virsh now does a setexeccon call - Additional rules required by openshift domains - Allow svirt_lxc_domains to use inherited terminals, needed to make virt-sandbox-service execute work - Allow spamd_update_t to search spamc_home_t - Avcs discovered by mounting an isci device under /mnt - Allow lspci running as logrotate to read pci.ids - Additional fix for networkmanager_read_pid_files() - Fix networkmanager_read_pid_files() interface - Allow all svirt domains to connect to svirt_socket_t - Allow virsh to set SELinux context for a process. - Allow tuned to create netlink_kobject_uevent_socket - Allow systemd-timestamp to set SELinux context - Add support for /var/lib/systemd/linger - Fix ssh_sysadm_login to be working on MLS as expected- Rename files_rw_inherited_tmp_files to files_rw_inherited_tmp_file - Add missing files_rw_inherited_tmp_files interface - Add additional interface for ecryptfs - ALlow nova-cert to connect to postgresql - Allow keystone to connect to postgresql - Allow all cups domains to getattr on filesystems - Allow pppd to send signull - Allow tuned to execute ldconfig - Allow gpg to read fips_enabled - Add additional fixes for ecryptfs - Allow httpd to work with posgresql - Allow keystone getsched and setsched- Allow gpg to read fips_enabled - Add support for /var/cache/realmd - Add support for /usr/sbin/blazer_usb and systemd support for nut - Add labeling for fenced_sanlock and allow sanclok transition to fenced_t - bitlbee wants to read own log file - Allow glance domain to send a signal itself - Allow xend_t to request that the kernel load a kernel module - Allow pacemaker to execute heartbeat lib files - cleanup new swift policy- Fix smartmontools - Fix userdom_restricted_xwindows_user_template() interface - Add xserver_xdm_ioctl_log() interface - Allow Xusers to ioctl lxdm.log to make lxdm working - Add MLS fixes to make MLS boot/log-in working - Add mls_socket_write_all_levels() also for syslogd - fsck.xfs needs to read passwd - Fix ntp_filetrans_named_content calling in init.te - Allow postgresql to create pg_log dir - Allow sshd to read rsync_data_t to make rsync working - Change ntp.conf to be labeled net_conf_t - Allow useradd to create homedirs in /run. ircd-ratbox does this and we should just allow it - Allow xdm_t to execute gstreamer home content - Allod initrc_t and unconfined domains, and sysadm_t to manage ntp - New policy for openstack swift domains - More access required for openshift_cron_t - Use cupsd_log_t instead of cupsd_var_log_t - rpm_script_roles should be used in rpm_run - Fix rpm_run() interface - Fix openshift_initrc_run() - Fix sssd_dontaudit_stream_connect() interface - Fix sssd_dontaudit_stream_connect() interface - Allow LDA's job to deliver mail to the mailbox - dontaudit block_suspend for mozilla_plugin_t - Allow l2tpd_t to all signal perms - Allow uuidgen to read /dev/random - Allow mozilla-plugin-config to read power_supply info - Implement cups_domain attribute for cups domains - We now need access to user terminals since we start by executing a command outside the tty - We now need access to user terminals since we start by executing a command outside the tty - svirt lxc containers want to execute userhelper apps, need these changes to allow this to happen - Add containment of openshift cron jobs - Allow system cron jobs to create tmp directories - Make userhelp_conf_t a config file - Change rpm to use rpm_script_roles - More fixes for rsync to make rsync wokring - Allow logwatch to domtrans to mdadm - Allow pacemaker to domtrans to ifconfig - Allow pacemaker to setattr on corosync.log - Add pacemaker_use_execmem for memcheck-amd64 command - Allow block_suspend capability - Allow create fifo_file in /tmp with pacemaker_tmp_t - Allow systat to getattr on fixed disk - Relabel /etc/ntp.conf to be net_conf_t - ntp_admin should create files in /etc with the correct label - Add interface to create ntp_conf_t files in /etc - Add additional labeling for quantum - Allow quantum to execute dnsmasq with transition- boinc_cliean wants also execmem as boinc projecs have - Allow sa-update to search admin home for /root/.spamassassin - Allow sa-update to search admin home for /root/.spamassassin - Allow antivirus domain to read net sysctl - Dontaudit attempts from thumb_t to connect to ssd - Dontaudit attempts by readahead to read sock_files - Dontaudit attempts by readahead to read sock_files - Create tmpfs file while running as wine as user_tmpfs_t - Dontaudit attempts by readahead to read sock_files - libmpg ships badly created librarie- Change ssh_use_pts to use macro and only inherited sshd_devpts_t - Allow confined users to read systemd_logind seat information - libmpg ships badly created libraries - Add support for strongswan.service - Add labeling for strongswan - Allow l2tpd_t to read network manager content in /run directory - Allow rsync to getattr any file in rsync_data_t - Add labeling and filename transition for .grl-podcasts- mount.glusterfs executes glusterfsd binary - Allow systemd_hostnamed_t to stream connect to systemd - Dontaudit any user doing a access check - Allow obex-data-server to request the kernel to load a module - Allow gpg-agent to manage gnome content (~/.cache/gpg-agent-info) - Allow gpg-agent to read /proc/sys/crypto/fips_enabled - Add new types for antivirus.pp policy module - Allow gnomesystemmm_t caps because of ioprio_set - Make sure if mozilla_plugin creates files while in permissive mode, they get created with the correct label, user_home_t - Allow gnomesystemmm_t caps because of ioprio_set - Allow NM rawip socket - files_relabel_non_security_files can not be used with boolean - Add interface to thumb_t dbus_chat to allow it to read remote process state - ALlow logrotate to domtrans to mdadm_t - kde gnomeclock wants to write content to /tmp- kde gnomeclock wants to write content to /tmp - /usr/libexec/kde4/kcmdatetimehelper attempts to create /root/.kde - Allow blueman_t to rwx zero_device_t, for some kind of jre - Allow mozilla_plugin_t to rwx zero_device_t, for some kind of jre - Ftp full access should be allowed to create directories as well as files - Add boolean to allow rsync_full_acces, so that an rsync server can write all - over the local machine - logrotate needs to rotate logs in openshift directories, needs back port to RHEL6 - Add missing vpnc_roles type line - Allow stapserver to write content in /tmp - Allow gnome keyring to create keyrings dir in ~/.local/share - Dontaudit thumb drives trying to bind to udp sockets if nis_enabled is turned on - Add interface to colord_t dbus_chat to allow it to read remote process state - Allow colord_t to read cupsd_t state - Add mate-thumbnail-font as thumnailer - Allow sectoolm to sys_ptrace since it is looking at other proceses /proc data. - Allow qpidd to list /tmp. Needed by ssl - Only allow init_t to transition to rsync_t domain, not initrc_t. This should be back ported to F17, F18 - - Added systemd support for ksmtuned - Added booleans ksmtuned_use_nfs ksmtuned_use_cifs - firewalld seems to be creating mmap files which it needs to execute in /run /tmp and /dev/shm. Would like to clean this up but for now we will allow - Looks like qpidd_t needs to read /dev/random - Lots of probing avc's caused by execugting gpg from staff_t - Dontaudit senmail triggering a net_admin avc - Change thumb_role to use thumb_run, not sure why we have a thumb_role, needs back port - Logwatch does access check on mdadm binary - Add raid_access_check_mdadm() iterface- Fix systemd_manage_unit_symlinks() interface - Call systemd_manage_unit_symlinks(() which is correct interface - Add filename transition for opasswd - Switch gnomeclock_dbus_chat to systemd_dbus_chat_timedated since we have switched the name of gnomeclock - Allow sytstemd-timedated to get status of init_t - Add new systemd policies for hostnamed and rename gnomeclock_t to systemd_timedate_t - colord needs to communicate with systemd and systemd_logind, also remove duplicate rules - Switch gnomeclock_dbus_chat to systemd_dbus_chat_timedated since we have switched the name of gnomeclock - Allow gpg_t to manage all gnome files - Stop using pcscd_read_pub_files - New rules for xguest, dontaudit attempts to dbus chat - Allow firewalld to create its mmap files in tmpfs and tmp directories - Allow firewalld to create its mmap files in tmpfs and tmp directories - run unbound-chkconf as named_t, so it can read dnssec - Colord is reading xdm process state, probably reads state of any apps that sends dbus message - Allow mdadm_t to change the kernel scheduler - mythtv policy - Update mandb_admin() interface - Allow dsspam to listen on own tpc_socket - seutil_filetrans_named_content needs to be optional - Allow sysadm_t to execute content in his homedir - Add attach_queue to tun_socket, new patch from Paul Moore - Change most of selinux configuration types to security_file_type. - Add filename transition rules for selinux configuration - ssh into a box with -X -Y requires ssh_use_ptys - Dontaudit thumb drives trying to bind to udp sockets if nis_enabled is turned on - Allow all unpriv userdomains to send dbus messages to hostnamed and timedated - New allow rules found by Tom London for systemd_hostnamed- Allow systemd-tmpfiles to relabel lpd spool files - Ad labeling for texlive bash scripts - Add xserver_filetrans_fonts_cache_home_content() interface - Remove duplicate rules from *.te - Add support for /var/lock/man-db.lock - Add support for /var/tmp/abrt(/.*)? - Add additional labeling for munin cgi scripts - Allow httpd_t to read munin conf files - Allow certwatch to read meminfo - Fix nscd_dontaudit_write_sock_file() interfac - Fix gnome_filetrans_home_content() to include also "fontconfig" dir as cache_home_t - llow mozilla_plugin_t to create HOMEDIR/.fontconfig with the proper labeling- Allow gnomeclock to talk to puppet over dbus - Allow numad access discovered by Dominic - Add support for HOME_DIR/.maildir - Fix attribute_role for mozilla_plugin_t domain to allow staff_r to access this domain - Allow udev to relabel udev_var_run_t lnk_files - New bin_t file in mcelog- Remove all mcs overrides and replace with t1 != mcs_constrained_types - Add attribute_role for iptables - mcs_process_set_categories needs to be called for type - Implement additional role_attribute statements - Sodo domain is attempting to get the additributes of proc_kcore_t - Unbound uses port 8953 - Allow svirt_t images to compromise_kernel when using pci-passthrough - Add label for dns lib files - Bluetooth aquires a dbus name - Remove redundant files_read_usr_file calling - Remove redundant files_read_etc_file calling - Fix mozilla_run_plugin() - Add role_attribute support for more domains- Mass merge with upstream- Bump the policy version to 28 to match selinux userspace - Rebuild versus latest libsepol- Add systemd_status_all_unit_files() interface - Add support for nshadow - Allow sysadm_t to administrate the postfix domains - Add interface to setattr on isid directories for use by tmpreaper - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Add systemd_status_all_unit_files() interface - Add support for nshadow - Allow sysadm_t to administrate the postfix domains - Add interface to setattr on isid directories for use by tmpreaper - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Allow sshd_t sys_admin for use with afs logins - Add labeling for /var/named/chroot/etc/localtim- Allow setroubleshoot_fixit to execute rpm - zoneminder needs to connect to httpd ports where remote cameras are listening - Allow firewalld to execute content created in /run directory - Allow svirt_t to read generic certs - Dontaudit leaked ps content to mozilla plugin - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - init scripts are creating systemd_unit_file_t directories- systemd_logind_t is looking at all files under /run/user/apache - Allow systemd to manage all user tmp files - Add labeling for /var/named/chroot/etc/localtime - Allow netlabel_peer_t type to flow over netif_t and node_t, and only be hindered by MLS, need back port to RHEL6 - Keystone is now using a differnt port - Allow xdm_t to use usbmuxd daemon to control sound - Allow passwd daemon to execute gnome_exec_keyringd - Fix chrome_sandbox policy - Add labeling for /var/run/checkquorum-timer - More fixes for the dspam domain, needs back port to RHEL6 - More fixes for the dspam domain, needs back port to RHEL6 - sssd needs to connect to kerberos password port if a user changes his password - Lots of fixes from RHEL testing of dspam web - Allow chrome and mozilla_plugin to create msgq and semaphores - Fixes for dspam cgi scripts - Fixes for dspam cgi scripts - Allow confine users to ptrace screen - Backport virt_qemu_ga_t changes from RHEL - Fix labeling for dspam.cgi needed for RHEL6 - We need to back port this policy to RHEL6, for lxc domains - Dontaudit attempts to set sys_resource of logrotate - Allow corosync to read/write wdmd's tmpfs files - I see a ptrace of mozilla_plugin_t by staff_t, will allow without deny_ptrace being set - Allow cron jobs to read bind config for unbound - libvirt needs to inhibit systemd - kdumpctl needs to delete boot_t files - Fix duplicate gnome_config_filetrans - virtd_lxc_t is using /dev/fuse - Passenger needs to create a directory in /var/log, needs a backport to RHEL6 for openshift - apcupsd can be setup to listen to snmp trafic - Allow transition from kdumpgui to kdumpctl - Add fixes for munin CGI scripts - Allow deltacloud to connect to openstack at the keystone port - Allow domains that transition to svirt domains to be able to signal them - Fix file context of gstreamer in .cache directory - libvirt is communicating with logind - NetworkManager writes to the systemd inhibit pipe- Allow munin disk plugins to get attributes of all directories - Allow munin disk plugins to get attributes of all directorie - Allow logwatch to get attributes of all directories - Fix networkmanager_manage_lib() interface - Fix gnome_manage_config() to allow to manage sock_file - Fix virtual_domain_context - Add support for dynamic DNS for DHCPv6- Allow svirt to use netlink_route_socket which was a part of auth_use_nsswitch - Add additional labeling for /var/www/openshift/broker - Fix rhev policy - Allow openshift_initrc domain to dbus chat with systemd_logind - Allow httpd to getattr passenger log file if run_stickshift - Allow consolehelper-gtk to connect to xserver - Add labeling for the tmp-inst directory defined in pam_namespace.conf - Add lvm_metadata_t labeling for /etc/multipath- consoletype is no longer used- Add label for efivarfs - Allow certmonger to send signal to itself - Allow plugin-config to read own process status - Add more fixes for pacemaker - apache/drupal can run clamscan on uploaded content - Allow chrome_sandbox_nacl_t to read pid 1 content- Fix MCS Constraints to control ingres and egres controls on the network. - Change name of svirt_nokvm_t to svirt_tcg_t - Allow tuned to request the kernel to load kernel modules- Label /var/lib/pgsql/.ssh as ssh_home_t - Add labeling for /usr/bin/pg_ctl - Allow systemd-logind to manage keyring user tmp dirs - Add support for 7389/tcp port - gems seems to be placed in lots of places - Since xdm is running a full session, it seems to be trying to execute lots of executables via dbus - Add back tcp/8123 port as http_cache port - Add ovirt-guest-agent\.pid labeling - Allow xend to run scsi_id - Allow rhsmcertd-worker to read "physical_package_id" - Allow pki_tomcat to connect to ldap port - Allow lpr to read /usr/share/fonts - Allow open file from CD/DVD drive on domU - Allow munin services plugins to talk to SSSD - Allow all samba domains to create samba directory in var_t directories - Take away svirt_t ability to use nsswitch - Dontaudit attempts by openshift to read apache logs - Allow apache to create as well as append _ra_content_t - Dontaudit sendmail_t reading a leaked file descriptor - Add interface to have admin transition /etc/prelink.cache to the proper label - Add sntp support to ntp policy - Allow firewalld to dbus chat with devicekit_power - Allow tuned to call lsblk - Allow tor to read /proc/sys/kernel/random/uuid - Add tor_can_network_relay boolean- Add openshift_initrc_signal() interface - Fix typos - dspam port is treat as spamd_port_t - Allow setroubleshoot to getattr on all executables - Allow tuned to execute profiles scripts in /etc/tuned - Allow apache to create directories to store its log files - Allow all directories/files in /var/log starting with passenger to be labeled passenger_log_t - Looks like apache is sending sinal to openshift_initrc_t now,needs back port to RHEL6 - Allow Postfix to be configured to listen on TCP port 10026 for email from DSPAM - Add filename transition for /etc/tuned/active_profile - Allow condor_master to send mails - Allow condor_master to read submit.cf - Allow condor_master to create /tmp files/dirs - Allow condor_mater to send sigkill to other condor domains - Allow condor_procd sigkill capability - tuned-adm wants to talk with tuned daemon - Allow kadmind and krb5kdc to also list sssd_public_t - Allow accountsd to dbus chat with init - Fix git_read_generic_system_content_files() interface - pppd wants sys_nice by nmcli because of "syscall=sched_setscheduler" - Fix mozilla_plugin_can_network_connect to allow to connect to all ports - Label all munin plugins which are not covered by munin plugins policy as unconfined_munin_plugin_exec_t - dspam wants to search /var/spool for opendkim data - Revert "Add support for tcp/10026 port as dspam_port_t" - Turning on labeled networking requires additional access for netlabel_peer_t; these allow rules need to be back ported to RHEL6 - Allow all application domains to use fifo_files passed in from userdomains, also allow them to write to tmp_files inherited from userdomain - Allow systemd_tmpfiles_t to setattr on mandb_cache_t- consolekit.pp was not removed from the postinstall script- Add back consolekit policy - Silence bootloader trying to use inherited tty - Silence xdm_dbusd_t trying to execute telepathy apps - Fix shutdown avcs when machine has unconfined.pp disabled - The host and a virtual machine can share the same printer on a usb device - Change oddjob to transition to a ranged openshift_initr_exec_t when run from oddjob - Allow abrt_watch_log_t to execute bin_t - Allow chrome sandbox to write content in ~/.config/chromium - Dontaudit setattr on fontconfig dir for thumb_t - Allow lircd to request the kernel to load module - Make rsync as userdom_home_manager - Allow rsync to search automount filesystem - Add fixes for pacemaker- Add support for 4567/tcp port - Random fixes from Tuomo Soini - xdm wants to get init status - Allow programs to run in fips_mode - Add interface to allow the reading of all blk device nodes - Allow init to relabel rpcbind sock_file - Fix labeling for lastlog and faillog related to logrotate - ALlow aeolus_configserver to use TRAM port - Add fixes for aeolus_configserver - Allow snmpd to connect to snmp port - Allow spamd_update to create spamd_var_lib_t directories - Allow domains that can read sssd_public_t files to also list the directory - Remove miscfiles_read_localization, this is defined for all domains- Allow syslogd to request the kernel to load a module - Allow syslogd_t to read the network state information - Allow xdm_dbusd_t connect to the system DBUS - Add support for 7389/tcp port - Allow domains to read/write all inherited sockets - Allow staff_t to read kmsg - Add awstats_purge_apache_log boolean - Allow ksysguardproces to read /.config/Trolltech.conf - Allow passenger to create and append puppet log files - Add puppet_append_log and puppet_create_log interfaces - Add puppet_manage_log() interface - Allow tomcat domain to search tomcat_var_lib_t - Allow pki_tomcat_t to connect to pki_ca ports - Allow pegasus_t to have net_admin capability - Allow pegasus_t to write /sys/class/net//flags - Allow mailserver_delivery to manage mail_home_rw_t lnk_files - Allow fetchmail to create log files - Allow gnomeclock to manage home config in .kde - Allow bittlebee to read kernel sysctls - Allow logrotate to list /root- Fix userhelper_console_role_template() - Allow enabling Network Access Point service using blueman - Make vmware_host_t as unconfined domain - Allow authenticate users in webaccess via squid, using mysql as backend - Allow gathers to get various metrics on mounted file systems - Allow firewalld to read /etc/hosts - Fix cron_admin_role() to make sysadm cronjobs running in the sysadm_t instead of cronjob_t - Allow kdumpgui to read/write to zipl.conf - Commands needed to get mock to build from staff_t in enforcing mode - Allow mdadm_t to manage cgroup files - Allow all daemons and systemprocesses to use inherited initrc_tmp_t files - dontaudit ifconfig_t looking at fifo_files that are leaked to it - Add lableing for Quest Authentication System- Fix filetrans interface definitions - Dontaudit xdm_t to getattr on BOINC lib files - Add systemd_reload_all_services() interface - Dontaudit write access on /var/lib/net-snmp/mib_indexes - Only stop mcsuntrustedproc from relableing files - Allow accountsd to dbus chat with gdm - Allow realmd to getattr on all fs - Allow logrotate to reload all services - Add systemd unit file for radiusd - Allow winbind to create samba pid dir - Add labeling for /var/nmbd/unexpected - Allow chrome and mozilla plugin to connect to msnp ports- Fix storage_rw_inherited_fixed_disk_dev() to cover also blk_file - Dontaudit setfiles reading /dev/random - On initial boot gnomeclock is going to need to be set buy gdm - Fix tftp_read_content() interface - Random apps looking at kernel file systems - Testing virt with lxc requiers additional access for virsh_t - New allow rules requied for latest libvirt, libvirt talks directly to journald,lxc setup tool needs compromize_kernel,and we need ipc_lock in the container - Allow MPD to read /dev/radnom - Allow sandbox_web_type to read logind files which needs to read pulseaudio - Allow mozilla plugins to read /dev/hpet - Add labeling for /var/lib/zarafa-webap - Allow BOINC client to use an HTTP proxy for all connections - Allow rhsmertd to domain transition to dmidecod - Allow setroubleshootd to send D-Bus msg to ABRT- Define usbtty_device_t as a term_tty - Allow svnserve to accept a connection - Allow xend manage default virt_image_t type - Allow prelink_cron_system_t to overide user componant when executing cp - Add labeling for z-push - Gnomeclock sets the realtime clock - Openshift seems to be storing apache logs in /var/lib/openshift/.log/httpd - Allow lxc domains to use /dev/random and /dev/urandom- Add port defintion for tcp/9000 - Fix labeling for /usr/share/cluster/checkquorum to label also checkquorum.wdmd - Add rules and labeling for $HOME/cache/\.gstreamer-.* directory - Add support for CIM provider openlmi-networking which uses NetworkManager dbus API - Allow shorewall_t to create netlink_socket - Allow krb5admind to block suspend - Fix labels on /var/run/dlm_controld /var/log/dlm_controld - Allow krb5kdc to block suspend - gnomessytemmm_t needs to read /etc/passwd - Allow cgred to read all sysctls- Allow all domains to read /proc/sys/vm/overcommit_memory - Make proc_numa_t an MLS Trusted Object - Add /proc/numactl support for confined users - Allow ssh_t to connect to any port > 1023 - Add openvswitch domain - Pulseaudio tries to create directories in gnome_home_t directories - New ypbind pkg wants to search /var/run which is caused by sd_notify - Allow NM to read certs on NFS/CIFS using use_nfs_*, use_samba_* booleans - Allow sanlock to read /dev/random - Treat php-fpm with httpd_t - Allow domains that can read named_conf_t to be able to list the directories - Allow winbind to create sock files in /var/run/samba- Add smsd policy - Add support for OpenShift sbin labelin - Add boolean to allow virt to use rawip - Allow mozilla_plugin to read all file systems with noxattrs support - Allow kerberos to write on anon_inodefs fs - Additional access required by fenced - Add filename transitions for passwd.lock/group.lock - UPdate man pages - Create coolkey directory in /var/cache with the correct label- Fix label on /etc/group.lock - Allow gnomeclock to create lnk_file in /etc - label /root/.pki as a home_cert_t - Add interface to make sure rpcbind.sock is created with the correct label - Add definition for new directory /var/lib/os-probe and bootloader wants to read udev rules - opendkim should be a part of milter - Allow libvirt to set the kernel sched algorythm - Allow mongod to read sysfs_t - Add authconfig policy - Remove calls to miscfiles_read_localization all domains get this - Allow virsh_t to read /root/.pki/ content - Add label for log directory under /var/www/stickshift- Allow getty to setattr on usb ttys - Allow sshd to search all directories for sshd_home_t content - Allow staff domains to send dbus messages to kdumpgui - Fix labels on /etc/.pwd.lock and friends to be passwd_file_t - Dontaudit setfiles reading urand - Add files_dontaudit_list_tmp() for domains to which we added sys_nice/setsched - Allow staff_gkeyringd_t to read /home/$USER/.local/share/keyrings dir - Allow systemd-timedated to read /dev/urandom - Allow entropyd_t to read proc_t (meminfo) - Add unconfined munin plugin - Fix networkmanager_read_conf() interface - Allow blueman to list /tmp which is needed by sys_nic/setsched - Fix label of /etc/mail/aliasesdb-stamp - numad is searching cgroups - realmd is communicating with networkmanager using dbus - Lots of fixes to try to get kdump to work- Allow loging programs to dbus chat with realmd - Make apache_content_template calling as optional - realmd is using policy kit- Add new selinuxuser_use_ssh_chroot boolean - dbus needs to be able to read/write inherited fixed disk device_t passed through it - Cleanup netutils process allow rule - Dontaudit leaked fifo files from openshift to ping - sanlock needs to read mnt_t lnk files - Fail2ban needs to setsched and sys_nice- Change default label of all files in /var/run/rpcbind - Allow sandbox domains (java) to read hugetlbfs_t - Allow awstats cgi content to create tmp files and read apache log files - Allow setuid/setgid for cupsd-config - Allow setsched/sys_nice pro cupsd-config - Fix /etc/localtime sym link to be labeled locale_t - Allow sshd to search postgresql db t since this is a homedir - Allow xwindows users to chat with realmd - Allow unconfined domains to configure all files and null_device_t service- Adopt pki-selinux policy- pki is leaking which we dontaudit until a pki code fix - Allow setcap for arping - Update man pages - Add labeling for /usr/sbin/mcollectived - pki fixes - Allow smokeping to execute fping in the netutils_t domain- Allow mount to relabelfrom unlabeled file systems - systemd_logind wants to send and receive messages from devicekit disk over dbus to make connected mouse working - Add label to get bin files under libreoffice labeled correctly - Fix interface to allow executing of base_ro_file_type - Add fixes for realmd - Update pki policy - Add tftp_homedir boolean - Allow blueman sched_setscheduler - openshift user domains wants to r/w ssh tcp sockets- Additional requirements for disable unconfined module when booting - Fix label of systemd script files - semanage can use -F /dev/stdin to get input - syslog now uses kerberos keytabs - Allow xserver to compromise_kernel access - Allow nfsd to write to mount_var_run_t when running the mount command - Add filename transition rule for bin_t directories - Allow files to read usr_t lnk_files - dhcpc wants chown - Add support for new openshift labeling - Clean up for tunable+optional statements - Add labeling for /usr/sbin/mkhomedir_helper - Allow antivirus domain to managa amavis spool files - Allow rpcbind_t to read passwd - Allow pyzor running as spamc to manage amavis spool- Add interfaces to read kernel_t proc info - Missed this version of exec_all - Allow anyone who can load a kernel module to compromise kernel - Add oddjob_dbus_chat to openshift apache policy - Allow chrome_sandbox_nacl_t to send signals to itself - Add unit file support to usbmuxd_t - Allow all openshift domains to read sysfs info - Allow openshift domains to getattr on all domains- MLS fixes from Dan - Fix name of capability2 secure_firmware->compromise_kerne- Allow xdm to search all file systems - Add interface to allow the config of all files - Add rngd policy - Remove kgpg as a gpg_exec_t type - Allow plymouthd to block suspend - Allow systemd_dbus to config any file - Allow system_dbus_t to configure all services - Allow freshclam_t to read usr_files - varnishd requires execmem to load modules- Allow semanage to verify types - Allow sudo domain to execute user home files - Allow session_bus_type to transition to user_tmpfs_t - Add dontaudit caused by yum updates - Implement pki policy but not activated- tuned wants to getattr on all filesystems - tuned needs also setsched. The build is needed for test day- Add policy for qemu-qa - Allow razor to write own config files - Add an initial antivirus policy to collect all antivirus program - Allow qdisk to read usr_t - Add additional caps for vmware_host - Allow tmpfiles_t to setattr on mandb_cache_t - Dontaudit leaked files into mozilla_plugin_config_t - Allow wdmd to getattr on tmpfs - Allow realmd to use /dev/random - allow containers to send audit messages - Allow root mount any file via loop device with enforcing mls policy - Allow tmpfiles_t to setattr on mandb_cache_t - Allow tmpfiles_t to setattr on mandb_cache_t - Make userdom_dontaudit_write_all_ not allow open - Allow init scripts to read all unit files - Add support for saphostctrl ports- Add kernel_read_system_state to sandbox_client_t - Add some of the missing access to kdumpgui - Allow systemd_dbusd_t to status the init system - Allow vmnet-natd to request the kernel to load a module - Allow gsf-office-thum to append .cache/gdm/session.log - realmd wants to read .config/dconf/user - Firewalld wants sys_nice/setsched - Allow tmpreaper to delete mandb cache files - Firewalld wants sys_nice/setsched - Allow firewalld to perform a DNS name resolution - Allown winbind to read /usr/share/samba/codepages/lowcase.dat - Add support for HTTPProxy* in /etc/freshclam.conf - Fix authlogin_yubike boolean - Extend smbd_selinux man page to include samba booleans - Allow dhcpc to execute consoletype - Allow ping to use inherited tmp files created in init scripts - On full relabel with unconfined domain disabled, initrc was running some chcon's - Allow people who delete man pages to delete mandb cache files- Add missing permissive domains- Add new mandb policy - ALlow systemd-tmpfiles_t to relabel mandb_cache_t - Allow logrotate to start all unit files- Add fixes for ctbd - Allow nmbd to stream connect to ctbd - Make cglear_t as nsswitch_domain - Fix bogus in interfaces - Allow openshift to read/write postfix public pipe - Add postfix_manage_spool_maildrop_files() interface - stickshift paths have been renamed to openshift - gnome-settings-daemon wants to write to /run/systemd/inhibit/ pipes - Update man pages, adding ENTRYPOINTS- Add mei_device_t - Make sure gpg content in homedir created with correct label - Allow dmesg to write to abrt cache files - automount wants to search virtual memory sysctls - Add support for hplip logs stored in /var/log/hp/tmp - Add labeling for /etc/owncloud/config.php - Allow setroubleshoot to send analysys to syslogd-journal - Allow virsh_t to interact with new fenced daemon - Allow gpg to write to /etc/mail/spamassassiin directories - Make dovecot_deliver_t a mail server delivery type - Add label for /var/tmp/DNS25- Fixes for tomcat_domain template interface- Remove init_systemd and init_upstart boolean, Move init_daemon_domain and init_system_domain to use attributes - Add attribute to all base os types. Allow all domains to read all ro base OS types- Additional unit files to be defined as power unit files - Fix more boolean names- Fix boolean name so subs will continue to work- dbus needs to start getty unit files - Add interface to allow system_dbusd_t to start the poweroff service - xdm wants to exec telepathy apps - Allow users to send messages to systemdlogind - Additional rules needed for systemd and other boot apps - systemd wants to list /home and /boot - Allow gkeyringd to write dbus/conf file - realmd needs to read /dev/urand - Allow readahead to delete /.readahead if labeled root_t, might get created before policy is loaded- Fixes to safe more rules - Re-write tomcat_domain_template() - Fix passenger labeling - Allow all domains to read man pages - Add ephemeral_port_t to the 'generic' port interfaces - Fix the names of postgresql booleans- Stop using attributes form netlabel_peer and syslog, auth_use_nsswitch setsup netlabel_peer - Move netlable_peer check out of booleans - Remove call to recvfrom_netlabel for kerberos call - Remove use of attributes when calling syslog call - Move -miscfiles_read_localization to domain.te to save hundreds of allow rules - Allow all domains to read locale files. This eliminates around 1500 allow rules- Cleanup nis_use_ypbind_uncond interface - Allow rndc to block suspend - tuned needs to modify the schedule of the kernel - Allow svirt_t domains to read alsa configuration files - ighten security on irc domains and make sure they label content in homedir correctly - Add filetrans_home_content for irc files - Dontaudit all getattr access for devices and filesystems for sandbox domains - Allow stapserver to search cgroups directories - Allow all postfix domains to talk to spamd- Add interfaces to ignore setattr until kernel fixes this to be checked after the DAC check - Change pam_t to pam_timestamp_t - Add dovecot_domain attribute and allow this attribute block_suspend capability2 - Add sanlock_use_fusefs boolean - numad wants send/recieve msg - Allow rhnsd to send syslog msgs - Make piranha-pulse as initrc domain - Update openshift instances to dontaudit setattr until the kernel is fixed.- Fix auth_login_pgm_domain() interface to allow domains also managed user tmp dirs because of #856880 related to pam_systemd - Remove pam_selinux.8 which conflicts with man page owned by the pam package - Allow glance-api to talk to mysql - ABRT wants to read Xorg.0.log if if it detects problem with Xorg - Fix gstreamer filename trans. interface- Man page fixes by Dan Walsh- Allow postalias to read postfix config files - Allow man2html to read man pages - Allow rhev-agentd to search all mountpoints - Allow rhsmcertd to read /dev/random - Add tgtd_stream_connect() interface - Add cyrus_write_data() interface - Dontaudit attempts by sandboxX clients connectiing to the xserver_port_t - Add port definition for tcp/81 as http_port_t - Fix /dev/twa labeling - Allow systemd to read modules config- Merge openshift policy - Allow xauth to read /dev/urandom - systemd needs to relabel content in /run/systemd directories - Files unconfined should be able to perform all services on all files - Puppet tmp file can be leaked to all domains - Dontaudit rhsmcertd-worker to search /root/.local - Allow chown capability for zarafa domains - Allow system cronjobs to runcon into openshift domains - Allow virt_bridgehelper_t to manage content in the svirt_home_t labeled directories- nmbd wants to create /var/nmbd - Stop transitioning out of anaconda and firstboot, just causes AVC messages - Allow clamscan to read /etc files - Allow bcfg2 to bind cyphesis port - heartbeat should be run as rgmanager_t instead of corosync_t - Add labeling for /etc/openldap/certs - Add labeling for /opt/sartest directory - Make crontab_t as userdom home reader - Allow tmpreaper to list admin_home dir - Add defition for imap_0 replay cache file - Add support for gitolite3 - Allow virsh_t to send syslog messages - allow domains that can read samba content to be able to list the directories also - Add realmd_dbus_chat to allow all apps that use nsswitch to talk to realmd - Separate out sandbox from sandboxX policy so we can disable it by default - Run dmeventd as lvm_t - Mounting on any directory requires setattr and write permissions - Fix use_nfs_home_dirs() boolean - New labels for pam_krb5 - Allow init and initrc domains to sys_ptrace since this is needed to look at processes not owned by uid 0 - Add realmd_dbus_chat to allow all apps that use nsswitch to talk to realmd- Separate sandbox policy into sandbox and sandboxX, and disable sandbox by default on fresh installs - Allow domains that can read etc_t to read etc_runtime_t - Allow all domains to use inherited tmpfiles- Allow realmd to read resolv.conf - Add pegasus_cache_t type - Label /usr/sbin/fence_virtd as virsh_exec_t - Add policy for pkcsslotd - Add support for cpglockd - Allow polkit-agent-helper to read system-auth-ac - telepathy-idle wants to read gschemas.compiled - Allow plymouthd to getattr on fs_t - Add slpd policy - Allow ksysguardproces to read/write config_usr_t- Fix labeling substitution so rpm will label /lib/systemd content correctly- Add file name transitions for ttyACM0 - spice-vdagent(d)'s are going to log over to syslog - Add sensord policy - Add more fixes for passenger policy related to puppet - Allow wdmd to create wdmd_tmpfs_t - Fix labeling for /var/run/cachefilesd\.pid - Add thumb_tmpfs_t files type- Allow svirt domains to manage the network since this is containerized - Allow svirt_lxc_net_t to send audit messages- Make "snmpwalk -mREDHAT-CLUSTER-MIB ...." working - Allow dlm_controld to execute dlm_stonith labeled as bin_t - Allow GFS2 working on F17 - Abrt needs to execute dmesg - Allow jockey to list the contents of modeprobe.d - Add policy for lightsquid as squid_cron_t - Mailscanner is creating files and directories in /tmp - dmesg is now reading /dev/kmsg - Allow xserver to communicate with secure_firmware - Allow fsadm tools (fsck) to read /run/mount contnet - Allow sysadm types to read /dev/kmsg -- Allow postfix, sssd, rpcd to block_suspend - udev seems to need secure_firmware capability - Allow virtd to send dbus messages to firewalld so it can configure the firewall- Fix labeling of content in /run created by virsh_t - Allow condor domains to read kernel sysctls - Allow condor_master to connect to amqp - Allow thumb drives to create shared memory and semaphores - Allow abrt to read mozilla_plugin config files - Add labels for lightsquid - Default files in /opt and /usr that end in .cgi as httpd_sys_script_t, allow - dovecot_auth_t uses ldap for user auth - Allow domains that can read dhcp_etc_t to read lnk_files - Add more then one watchdog device - Allow useradd_t to manage etc_t files so it can rename it and edit them - Fix invalid class dir should be fifo_file - Move /run/blkid to fsadm and make sure labeling is correct- Fix bogus regex found by eparis - Fix manage run interface since lvm needs more access - syslogd is searching cgroups directory - Fixes to allow virt-sandbox-service to manage lxc var run content- Fix Boolean settings - Add new libjavascriptcoregtk as textrel_shlib_t - Allow xdm_t to create xdm_home_t directories - Additional access required for systemd - Dontaudit mozilla_plugin attempts to ipc_lock - Allow tmpreaper to delete unlabeled files - Eliminate screen_tmp_t and allow it to manage user_tmp_t - Dontaudit mozilla_plugin_config_t to append to leaked file descriptors - Allow web plugins to connect to the asterisk ports - Condor will recreate the lock directory if it does not exist - Oddjob mkhomedir needs to connectto user processes - Make oddjob_mkhomedir_t a userdom home manager- Put placeholder back in place for proper numbering of capabilities - Systemd also configures init scripts- Fix ecryptfs interfaces - Bootloader seems to be trolling around /dev/shm and /dev - init wants to create /etc/systemd/system-update.target.wants - Fix systemd_filetrans call to move it out of tunable - Fix up policy to work with systemd userspace manager - Add secure_firmware capability and remove bogus epolwakeup - Call seutil_*_login_config interfaces where should be needed - Allow rhsmcertd to send signal to itself - Allow thin domains to send signal to itself - Allow Chrome_ChildIO to read dosfs_t- Add role rules for realmd, sambagui- Add new type selinux_login_config_t for /etc/selinux//logins/ - Additional fixes for seutil_manage_module_store() - dbus_system_domain() should be used with optional_policy - Fix svirt to be allowed to use fusefs file system - Allow login programs to read /run/ data created by systemd_login - sssd wants to write /etc/selinux//logins/ for SELinux PAM module - Fix svirt to be allowed to use fusefs file system - Allow piranha domain to use nsswitch - Sanlock needs to send Kill Signals to non root processes - Pulseaudio wants to execute /run/user/PID/.orc- Fix saslauthd when it tries to read /etc/shadow - Label gnome-boxes as a virt homedir - Need to allow svirt_t ability to getattr on nfs_t file systems - Update sanlock policy to solve all AVC's - Change confined users can optionally manage virt content - Handle new directories under ~/.cache - Add block suspend to appropriate domains - More rules required for containers - Allow login programs to read /run/ data created by systemd_logind - Allow staff users to run svirt_t processes- Update to upstream- More fixes for systemd to make rawhide booting from Dan Walsh- Add systemd fixes to make rawhide booting- Add systemd_logind_inhibit_var_run_t attribute - Remove corenet_all_recvfrom_unlabeled() for non-contrib policies because we moved it to domain.if for all domain_type - Add interface for mysqld to dontaudit signull to all processes - Label new /var/run/journal directory correctly - Allow users to inhibit suspend via systemd - Add new type for the /var/run/inhibit directory - Add interface to send signull to systemd_login so avahi can send them - Allow systemd_passwd to send syslog messages - Remove corenet_all_recvfrom_unlabeled() calling fro policy files - Allow editparams.cgi running as httpd_bugzilla_script_t to read /etc/group - Allow smbd to read cluster config - Add additional labeling for passenger - Allow dbus to inhibit suspend via systemd - Allow avahi to send signull to systemd_login- Add interface to dontaudit getattr access on sysctls - Allow sshd to execute /bin/login - Looks like xdm is recreating the xdm directory in ~/.cache/ on login - Allow syslog to use the leaked kernel_t unix_dgram_socket from system-jounald - Fix semanage to work with unconfined domain disabled on F18 - Dontaudit attempts by mozilla plugins to getattr on all kernel sysctls - Virt seems to be using lock files - Dovecot seems to be searching directories of every mountpoint - Allow jockey to read random/urandom, execute shell and install third-party drivers - Add aditional params to allow cachedfiles to manage its content - gpg agent needs to read /dev/random - The kernel hands an svirt domains /SYSxxxxx which is a tmpfs that httpd wants to read and write - Add a bunch of dontaudit rules to quiet svirt_lxc domains - Additional perms needed to run svirt_lxc domains - Allow cgclear to read cgconfig - Allow sys_ptrace capability for snmp - Allow freshclam to read /proc - Allow procmail to manage /home/user/Maildir content - Allow NM to execute wpa_cli - Allow amavis to read clamd system state - Regenerate man pages- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Add realmd and stapserver policies - Allow useradd to manage stap-server lib files - Tighten up capabilities for confined users - Label /etc/security/opasswd as shadow_t - Add label for /dev/ecryptfs - Allow condor_startd_t to start sshd with the ranged - Allow lpstat.cups to read fips_enabled file - Allow pyzor running as spamc_t to create /root/.pyzor directory - Add labelinf for amavisd-snmp init script - Add support for amavisd-snmp - Allow fprintd sigkill self - Allow xend (w/o libvirt) to start virtual machines - Allow aiccu to read /etc/passwd - Allow condor_startd to Make specified domain MCS trusted for setting any category set for the processes it executes - Add condor_startd_ranged_domtrans_to() interface - Add ssd_conf_t for /etc/sssd - accountsd needs to fchown some files/directories - Add ICACLient and zibrauserdata as mozilla_filetrans_home_content - SELinux reports afs_t needs dac_override to read /etc/mtab, even though everything works, adding dontaudit - Allow xend_t to read the /etc/passwd file- Until we figure out how to fix systemd issues, allow all apps that send syslog messages to send them to kernel_t - Add init_access_check() interface - Fix label on /usr/bin/pingus to not be labeled as ping_exec_t - Allow tcpdump to create a netlink_socket - Label newusers like useradd - Change xdm log files to be labeled xdm_log_t - Allow sshd_t with privsep to work in MLS - Allow freshclam to update databases thru HTTP proxy - Allow s-m-config to access check on systemd - Allow abrt to read public files by default - Fix amavis_create_pid_files() interface - Add labeling and filename transition for dbomatic.log - Allow system_dbusd_t to stream connect to bluetooth, and use its socket - Allow amavisd to execute fsav - Allow tuned to use sys_admin and sys_nice capabilities - Add php-fpm policy from Bryan - Add labeling for aeolus-configserver-thinwrapper - Allow thin domains to execute shell - Fix gnome_role_gkeyringd() interface description - Lot of interface fixes - Allow OpenMPI job running as condor_startd_ssh_t to manage condor lib files - Allow OpenMPI job to use kerberos - Make deltacloudd_t as nsswitch_domain - Allow xend_t to run lsscsi - Allow qemu-dm running as xend_t to create tun_socket - Add labeling for /opt/brother/Printers(.*/)?inf - Allow jockey-backend to read pyconfig-64.h labeled as usr_t - Fix clamscan_can_scan_system boolean - Allow lpr to connectto to /run/user/$USER/keyring-22uREb/pkcs11- initrc is calling exportfs which is not confined so it attempts to read nfsd_files - Fixes for passenger running within openshift. - Add labeling for all tomcat6 dirs - Add support for tomcat6 - Allow cobblerd to read /etc/passwd - Allow jockey to read sysfs and and execute binaries with bin_t - Allow thum to use user terminals - Allow cgclear to read cgconfig config files - Fix bcf2g.fc - Remove sysnet_dns_name_resolve() from policies where auth_use_nsswitch() is used for other domains - Allow dbomatic to execute ruby - abrt_watch_log should be abrt_domain - Allow mozilla_plugin to connect to gatekeeper port- add ptrace_child access to process - remove files_read_etc_files() calling from all policies which have auth_use_nsswith() - Allow boinc domains to manage boinc_lib_t lnk_files - Add support for boinc-client.service unit file - Add support for boinc.log - Allow mozilla_plugin execmod on mozilla home files if allow_ex - Allow dovecot_deliver_t to read dovecot_var_run_t - Allow ldconfig and insmod to manage kdumpctl tmp files - Move thin policy out from cloudform.pp and add a new thin poli - pacemaker needs to communicate with corosync streams - abrt is now started on demand by dbus - Allow certmonger to talk directly to Dogtag servers - Change labeling for /var/lib/cobbler/webui_sessions to httpd_c - Allow mozila_plugin to execute gstreamer home files - Allow useradd to delete all file types stored in the users hom - rhsmcertd reads the rpm database - Add support for lightdm- Add tomcat policy - Remove pyzor/razor policy - rhsmcertd reads the rpm database - Dontaudit thumb to setattr on xdm_tmp dir - Allow wicd to execute ldconfig in the networkmanager_t domain - Add /var/run/cherokee\.pid labeling - Allow mozilla_plugin to create mozilla_plugin_tmp_t lnk files too - Allow postfix-master to r/w pipes other postfix domains - Allow snort to create netlink_socket - Add kdumpctl policy - Allow firstboot to create tmp_t files/directories - /usr/bin/paster should not be labeled as piranha_exec_t - remove initrc_domain from tomcat - Allow ddclient to read /etc/passwd - Allow useradd to delete all file types stored in the users homedir - Allow ldconfig and insmod to manage kdumpctl tmp files - Firstboot should be just creating tmp_t dirs and xauth should be allowed to write to those - Transition xauth files within firstboot_tmp_t - Fix labeling of /run/media to match /media - Label all lxdm.log as xserver_log_t - Add port definition for mxi port - Allow local_login_t to execute tmux- apcupsd needs to read /etc/passwd - Sanlock allso sends sigkill - Allow glance_registry to connect to the mysqld port - Dontaudit mozilla_plugin trying to getattr on /dev/gpmctl - Allow firefox plugins/flash to connect to port 1234 - Allow mozilla plugins to delete user_tmp_t files - Add transition name rule for printers.conf.O - Allow virt_lxc_t to read urand - Allow systemd_loigind to list gstreamer_home_dirs - Fix labeling for /usr/bin - Fixes for cloudform services * support FIPS - Allow polipo to work as web caching - Allow chfn to execute tmux- Add support for ecryptfs * ecryptfs does not support xattr * we need labeling for HOMEDIR - Add policy for (u)mount.ecryptfs* - Fix labeling of kerbero host cache files, allow rpc.svcgssd to manage host cache - Allow dovecot to manage Maildir content, fix transitions to Maildir - Allow postfix_local to transition to dovecot_deliver - Dontaudit attempts to setattr on xdm_tmp_t, looks like bogus code - Cleanup interface definitions - Allow apmd to change with the logind daemon - Changes required for sanlock in rhel6 - Label /run/user/apache as httpd_tmp_t - Allow thumb to use lib_t as execmod if boolean turned on - Allow squid to create the squid directory in /var with the correct labe - Add a new policy for glusterd from Bryan Bickford (bbickfor@redhat.com) - Allow virtd to exec xend_exec_t without transition - Allow virtd_lxc_t to unmount all file systems- PolicyKit path has changed - Allow httpd connect to dirsrv socket - Allow tuned to write generic kernel sysctls - Dontaudit logwatch to gettr on /dev/dm-2 - Allow policykit-auth to manage kerberos files - Make condor_startd and rgmanager as initrc domain - Allow virsh to read /etc/passwd - Allow mount to mount on user_tmp_t for /run/user/dwalsh/gvfs - xdm now needs to execute xsession_exec_t - Need labels for /var/lib/gdm - Fix files_filetrans_named_content() interface - Add new attribute - initrc_domain - Allow systemd_logind_t to signal, signull, sigkill all processes - Add filetrans rules for etc_runtime files- Rename boolean names to remove allow_- Mass merge with upstream * new policy topology to include contrib policy modules * we have now two base policy patches- Fix description of authlogin_nsswitch_use_ldap - Fix transition rule for rhsmcertd_t needed for RHEL7 - Allow useradd to list nfs state data - Allow openvpn to manage its log file and directory - We want vdsm to transition to mount_t when executing mount command to make sure /etc/mtab remains labeled correctly - Allow thumb to use nvidia devices - Allow local_login to create user_tmp_t files for kerberos - Pulseaudio needs to read systemd_login /var/run content - virt should only transition named system_conf_t config files - Allow munin to execute its plugins - Allow nagios system plugin to read /etc/passwd - Allow plugin to connect to soundd port - Fix httpd_passwd to be able to ask passwords - Radius servers can use ldap for backing store - Seems to need to mount on /var/lib for xguest polyinstatiation to work. - Allow systemd_logind to list the contents of gnome keyring - VirtualGL need xdm to be able to manage content in /etc/opt/VirtualGL - Add policy for isns-utils- Add policy for subversion daemon - Allow boinc to read passwd - Allow pads to read kernel network state - Fix man2html interface for sepolgen-ifgen - Remove extra /usr/lib/systemd/system/smb - Remove all /lib/systemd and replace with /usr/lib/systemd - Add policy for man2html - Fix the label of kerberos_home_t to krb5_home_t - Allow mozilla plugins to use Citrix - Allow tuned to read /proc/sys/kernel/nmi_watchdog - Allow tune /sys options via systemd's tmpfiles.d "w" type- Dontaudit lpr_t to read/write leaked mozilla tmp files - Add file name transition for .grl-podcasts directory - Allow corosync to read user tmp files - Allow fenced to create snmp lib dirs/files - More fixes for sge policy - Allow mozilla_plugin_t to execute any application - Allow dbus to read/write any open file descriptors to any non security file on the system that it inherits to that it can pass them to another domain - Allow mongod to read system state information - Fix wrong type, we should dontaudit sys_admin for xdm_t not xserver_t - Allow polipo to manage polipo_cache dirs - Add jabbar_client port to mozilla_plugin_t - Cleanup procmail policy - system bus will pass around open file descriptors on files that do not have labels on them - Allow l2tpd_t to read system state - Allow tuned to run ls /dev - Allow sudo domains to read usr_t files - Add label to machine-id - Fix corecmd_read_bin_symlinks cut and paste error- Fix pulseaudio port definition - Add labeling for condor_starter - Allow chfn_t to creat user_tmp_files - Allow chfn_t to execute bin_t - Allow prelink_cron_system_t to getpw calls - Allow sudo domains to manage kerberos rcache files - Allow user_mail_domains to work with courie - Port definitions necessary for running jboss apps within openshift - Add support for openstack-nova-metadata-api - Add support for nova-console* - Add support for openstack-nova-xvpvncproxy - Fixes to make privsep+SELinux working if we try to use chage to change passwd - Fix auth_role() interface - Allow numad to read sysfs - Allow matahari-rpcd to execute shell - Add label for ~/.spicec - xdm is executing lspci as root which is requesting a sys_admin priv but seems to succeed without it - Devicekit_disk wants to read the logind sessions file when writing a cd - Add fixes for condor to make condor jobs working correctly - Change label of /var/log/rpmpkgs to cron_log_t - Access requires to allow systemd-tmpfiles --create to work. - Fix obex to be a user application started by the session bus. - Add additional filename trans rules for kerberos - Fix /var/run/heartbeat labeling - Allow apps that are managing rcache to file trans correctly - Allow openvpn to authenticate against ldap server - Containers need to listen to network starting and stopping events- Make systemd unit files less specific- Fix zarafa labeling - Allow guest_t to fix labeling - corenet_tcp_bind_all_unreserved_ports(ssh_t) should be called with the user_tcp_server boolean - add lxc_contexts - Allow accountsd to read /proc - Allow restorecond to getattr on all file sytems - tmpwatch now calls getpw - Allow apache daemon to transition to pwauth domain - Label content under /var/run/user/NAME/keyring* as gkeyringd_tmp_t - The obex socket seems to be a stream socket - dd label for /var/run/nologin- Allow jetty running as httpd_t to read hugetlbfs files - Allow sys_nice and setsched for rhsmcertd - Dontaudit attempts by mozilla_plugin_t to bind to ssdp ports - Allow setfiles to append to xdm_tmp_t - Add labeling for /export as a usr_t directory - Add labels for .grl files created by gstreamer- Add labeling for /usr/share/jetty/bin/jetty.sh - Add jetty policy which contains file type definitios - Allow jockey to use its own fifo_file and make this the default for all domains - Allow mozilla_plugins to use spice (vnc_port/couchdb) - asterisk wants to read the network state - Blueman now uses /var/lib/blueman- Add label for nodejs_debug - Allow mozilla_plugin_t to create ~/.pki directory and content- Add clamscan_can_scan_system boolean - Allow mysqld to read kernel network state - Allow sshd to read/write condor lib files - Allow sshd to read/write condor-startd tcp socket - Fix description on httpd_graceful_shutdown - Allow glance_registry to communicate with mysql - dbus_system_domain is using systemd to lauch applications - add interfaces to allow domains to send kill signals to user mail agents - Remove unnessary access for svirt_lxc domains, add privs for virtd_lxc_t - Lots of new access required for secure containers - Corosync needs sys_admin capability - ALlow colord to create shm - .orc should be allowed to be created by any app that can create gstream home content, thumb_t to be specific - Add boolean to control whether or not mozilla plugins can create random content in the users homedir - Add new interface to allow domains to list msyql_db directories, needed for libra - shutdown has to be allowed to delete etc_runtime_t - Fail2ban needs to read /etc/passwd - Allow ldconfig to create /var/cache/ldconfig - Allow tgtd to read hardware state information - Allow collectd to create packet socket - Allow chronyd to send signal to itself - Allow collectd to read /dev/random - Allow collectd to send signal to itself - firewalld needs to execute restorecon - Allow restorecon and other login domains to execute restorecon- Allow logrotate to getattr on systemd unit files - Add support for tor systemd unit file - Allow apmd to create /var/run/pm-utils with the correct label - Allow l2tpd to send sigkill to pppd - Allow pppd to stream connect to l2tpd - Add label for scripts in /etc/gdm/ - Allow systemd_logind_t to ignore mcs constraints on sigkill - Fix files_filetrans_system_conf_named_files() interface - Add labels for /usr/share/wordpress/wp-includes/*.php - Allow cobbler to get SELinux mode and booleans- Add unconfined_execmem_exec_t as an alias to bin_t - Allow fenced to read snmp var lib files, also allow it to read usr_t - ontaudit access checks on all executables from mozilla_plugin - Allow all user domains to setexec, so that sshd will work properly if it call setexec(NULL) while running withing a user mode - Allow systemd_tmpfiles_t to getattr all pipes and sockets - Allow glance-registry to send system log messages - semanage needs to manage mock lib files/dirs- Add policy for abrt-watch-log - Add definitions for jboss_messaging ports - Allow systemd_tmpfiles to manage printer devices - Allow oddjob to use nsswitch - Fix labeling of log files for postgresql - Allow mozilla_plugin_t to execmem and execstack by default - Allow firewalld to execute shell - Fix /etc/wicd content files to get created with the correct label - Allow mcelog to exec shell - Add ~/.orc as a gstreamer_home_t - /var/spool/postfix/lib64 should be labeled lib_t - mpreaper should be able to list all file system labeled directories - Add support for apache to use openstack - Add labeling for /etc/zipl.conf and zipl binary - Turn on allow_execstack and turn off telepathy transition for final release- More access required for virt_qmf_t - Additional assess required for systemd-logind to support multi-seat - Allow mozilla_plugin to setrlimit - Revert changes to fuse file system to stop deadlock- Allow condor domains to connect to ephemeral ports - More fixes for condor policy - Allow keystone to stream connect to mysqld - Allow mozilla_plugin_t to read generic USB device to support GPS devices - Allow thum to file name transition gstreamer home content - Allow thum to read all non security files - Allow glance_api_t to connect to ephemeral ports - Allow nagios plugins to read /dev/urandom - Allow syslogd to search postfix spool to support postfix chroot env - Fix labeling for /var/spool/postfix/dev - Allow wdmd chown - Label .esd_auth as pulseaudio_home_t - Have no idea why keyring tries to write to /run/user/dwalsh/dconf/user, but we can dontaudit for now- Add support for clamd+systemd - Allow fresclam to execute systemctl to handle clamd - Change labeling for /usr/sbin/rpc.ypasswd.env - Allow yppaswd_t to execute yppaswd_exec_t - Allow yppaswd_t to read /etc/passwd - Gnomekeyring socket has been moved to /run/user/USER/ - Allow samba-net to connect to ldap port - Allow signal for vhostmd - allow mozilla_plugin_t to read user_home_t socket - New access required for secure Linux Containers - zfs now supports xattrs - Allow quantum to execute sudo and list sysfs - Allow init to dbus chat with the firewalld - Allow zebra to read /etc/passwd- Allow svirt_t to create content in the users homedir under ~/.libvirt - Fix label on /var/lib/heartbeat - Allow systemd_logind_t to send kill signals to all processes started by a user - Fuse now supports Xattr Support- upowered needs to setsched on the kernel - Allow mpd_t to manage log files - Allow xdm_t to create /var/run/systemd/multi-session-x - Add rules for missedfont.log to be used by thumb.fc - Additional access required for virt_qmf_t - Allow dhclient to dbus chat with the firewalld - Add label for lvmetad - Allow systemd_logind_t to remove userdomain sock_files - Allow cups to execute usr_t files - Fix labeling on nvidia shared libraries - wdmd_t needs access to sssd and /etc/passwd - Add boolean to allow ftp servers to run in passive mode - Allow namepspace_init_t to relabelto/from a different user system_u from the user the namespace_init running with - Fix using httpd_use_fusefs - Allow chrome_sandbox_nacl to write inherited user tmp files as we allow it for chrome_sandbox- Rename rdate port to time port, and allow gnomeclock to connect to it - We no longer need to transition to ldconfig from rpm, rpm_script, or anaconda - /etc/auto.* should be labeled bin_t - Add httpd_use_fusefs boolean - Add fixes for heartbeat - Allow sshd_t to signal processes that it transitions to - Add condor policy - Allow svirt to create monitors in ~/.libvirt - Allow dovecot to domtrans sendmail to handle sieve scripts - Lot of fixes for cfengine- /var/run/postmaster.* labeling is no longer needed - Alllow drbdadmin to read /dev/urandom - l2tpd_t seems to use ptmx - group+ and passwd+ should be labeled as /etc/passwd - Zarafa-indexer is a socket- Ensure lastlog is labeled correctly - Allow accountsd to read /proc data about gdm - Add fixes for tuned - Add bcfg2 fixes which were discovered during RHEL6 testing - More fixes for gnome-keyring socket being moved - Run semanage as a unconfined domain, and allow initrc_t to create tmpfs_t sym links on shutdown - Fix description for files_dontaudit_read_security_files() interface- Add new policy and man page for bcfg2 - cgconfig needs to use getpw calls - Allow domains that communicate with the keyring to use cache_home_t instead of gkeyringd_tmpt - gnome-keyring wants to create a directory in cache_home_t - sanlock calls getpw- Add numad policy and numad man page - Add fixes for interface bugs discovered by SEWatch - Add /tmp support for squid - Add fix for #799102 * change default labeling for /var/run/slapd.* sockets - Make thumb_t as userdom_home_reader - label /var/lib/sss/mc same as pubconf, so getpw domains can read it - Allow smbspool running as cups_t to stream connect to nmbd - accounts needs to be able to execute passwd on behalf of users - Allow systemd_tmpfiles_t to delete boot flags - Allow dnssec_trigger to connect to apache ports - Allow gnome keyring to create sock_files in ~/.cache - google_authenticator is using .google_authenticator - sandbox running from within firefox is exposing more leaks - Dontaudit thumb to read/write /dev/card0 - Dontaudit getattr on init_exec_t for gnomeclock_t - Allow certmonger to do a transition to certmonger_unconfined_t - Allow dhcpc setsched which is caused by nmcli - Add rpm_exec_t for /usr/sbin/bcfg2 - system cronjobs are sending dbus messages to systemd_logind - Thumnailers read /dev/urand- Allow auditctl getcap - Allow vdagent to use libsystemd-login - Allow abrt-dump-oops to search /etc/abrt - Got these avc's while trying to print a boarding pass from firefox - Devicekit is now putting the media directory under /run/media - Allow thumbnailers to create content in ~/.thumbails directory - Add support for proL2TPd by Dominick Grift - Allow all domains to call getcap - wdmd seems to get a random chown capability check that it does not need - Allow vhostmd to read kernel sysctls- Allow chronyd to read unix - Allow hpfax to read /etc/passwd - Add support matahari vios-proxy-* apps and add virtd_exec_t label for them - Allow rpcd to read quota_db_t - Update to man pages to match latest policy - Fix bug in jockey interface for sepolgen-ifgen - Add initial svirt_prot_exec_t policy- More fixes for systemd from Dan Walsh- Add a new type for /etc/firewalld and allow firewalld to write to this directory - Add definition for ~/Maildir, and allow mail deliver domains to write there - Allow polipo to run from a cron job - Allow rtkit to schedule wine processes - Allow mozilla_plugin_t to acquire a bug, and allow it to transition gnome content in the home dir to the proper label - Allow users domains to send signals to consolehelper domains- More fixes for boinc policy - Allow polipo domain to create its own cache dir and pid file - Add systemctl support to httpd domain - Add systemctl support to polipo, allow NetworkManager to manage the service - Add policy for jockey-backend - Add support for motion daemon which is now covered by zoneminder policy - Allow colord to read/write motion tmpfs - Allow vnstat to search through var_lib_t directories - Stop transitioning to quota_t, from init an sysadm_t- Add svirt_lxc_file_t as a customizable type- Add additional fixes for icmp nagios plugin - Allow cron jobs to open fifo_files from cron, since service script opens /dev/stdin - Add certmonger_unconfined_exec_t - Make sure tap22 device is created with the correct label - Allow staff users to read systemd unit files - Merge in previously built policy - Arpwatch needs to be able to start netlink sockets in order to start - Allow cgred_t to sys_ptrace to look at other DAC Processes- Back port some of the access that was allowed in nsplugin_t - Add definitiona for couchdb ports - Allow nagios to use inherited users ttys - Add git support for mock - Allow inetd to use rdate port - Add own type for rdate port - Allow samba to act as a portmapper - Dontaudit chrome_sandbox attempts to getattr on chr_files in /dev - New fixes needed for samba4 - Allow apps that use lib_t to read lib_t symlinks- Add policy for nove-cert - Add labeling for nova-openstack systemd unit files - Add policy for keystoke- Fix man pages fro domains - Add man pages for SELinux users and roles - Add storage_dev_filetrans_named_fixed_disk() and use it for smartmon - Add policy for matahari-rpcd - nfsd executes mount command on restart - Matahari domains execute renice and setsched - Dontaudit leaked tty in mozilla_plugin_config - mailman is changing to a per instance naming - Add 7600 and 4447 as jboss_management ports - Add fixes for nagios event handlers - Label httpd.event as httpd_exec_t, it is an apache daemon- Add labeling for /var/spool/postfix/dev/log - NM reads sysctl.conf - Iscsi log file context specification fix - Allow mozilla plugins to send dbus messages to user domains that transition to it - Allow mysql to read the passwd file - Allow mozilla_plugin_t to create mozilla home dirs in user homedir - Allow deltacloud to read kernel sysctl - Allow postgresql_t to connectto itselfAllow postgresql_t to connectto itself - Allow postgresql_t to connectto itself - Add login_userdomain attribute for users which can log in using terminal- Allow sysadm_u to reach system_r by default #784011 - Allow nagios plugins to use inherited user terminals - Razor labeling is not used no longer - Add systemd support for matahari - Add port_types to man page, move booleans to the top, fix some english - Add support for matahari-sysconfig-console - Clean up matahari.fc - Fix matahari_admin() interfac - Add labels for/etc/ssh/ssh_host_*.pub keys- Allow ksysguardproces to send system log msgs - Allow boinc setpgid and signull - Allow xdm_t to sys_ptrace to run pidof command - Allow smtpd_t to manage spool files/directories and symbolic links - Add labeling for jetty - Needed changes to get unbound/dnssec to work with openswan- Add user_fonts_t alias xfs_tmp_t - Since depmod now runs as insmod_t we need to write to kernel_object_t - Allow firewalld to dbus chat with networkmanager - Allow qpidd to connect to matahari ports - policykit needs to read /proc for uses not owned by it - Allow systemctl apps to connecto the init stream- Turn on deny_ptrace boolean- Remove pam_selinux.8 man page. There was a conflict.- Add proxy class and read access for gssd_proxy - Separate out the sharing public content booleans - Allow certmonger to execute a script and send signals to apache and dirsrv to reload the certificate - Add label transition for gstream-0.10 and 12 - Add booleans to allow rsync to share nfs and cifs file sytems - chrome_sandbox wants to read the /proc/PID/exe file of the program that executed it - Fix filename transitions for cups files - Allow denyhosts to read "unix" - Add file name transition for locale.conf.new - Allow boinc projects to gconf config files - sssd needs to be able to increase the socket limit under certain loads - sge_execd needs to read /etc/passwd - Allow denyhost to check network state - NetworkManager needs to read sessions data - Allow denyhost to check network state - Allow xen to search virt images directories - Add label for /dev/megaraid_sas_ioctl_node - Add autogenerated man pages- Allow boinc project to getattr on fs - Allow init to execute initrc_state_t - rhev-agent package was rename to ovirt-guest-agent - If initrc_t creates /etc/local.conf then we need to make sure it is labeled correctly - sytemd writes content to /run/initramfs and executes it on shutdown - kdump_t needs to read /etc/mtab, should be back ported to F16 - udev needs to load kernel modules in early system boot- Need to add sys_ptrace back in since reading any content in /proc can cause these accesses - Add additional systemd interfaces which are needed fro *_admin interfaces - Fix bind_admin() interface- Allow firewalld to read urand - Alias java, execmem_mono to bin_t to allow third parties - Add label for kmod - /etc/redhat-lsb contains binaries - Add boolean to allow gitosis to send mail - Add filename transition also for "event20" - Allow systemd_tmpfiles_t to delete all file types - Allow collectd to ipc_lock- make consoletype_exec optional, so we can remove consoletype policy - remove unconfined_permisive.patch - Allow openvpn_t to inherit user home content and tmp content - Fix dnssec-trigger labeling - Turn on obex policy for staff_t - Pem files should not be secret - Add lots of rules to fix AVC's when playing with containers - Fix policy for dnssec - Label ask-passwd directories correctly for systemd- sshd fixes seem to be causing unconfined domains to dyntrans to themselves - fuse file system is now being mounted in /run/user - systemd_logind is sending signals to processes that are dbus messaging with it - Add support for winshadow port and allow iscsid to connect to this port - httpd should be allowed to bind to the http_port_t udp socket - zarafa_var_lib_t can be a lnk_file - A couple of new .xsession-errors files - Seems like user space and login programs need to read logind_sessions_files - Devicekit disk seems to be being launched by systemd - Cleanup handling of setfiles so most of rules in te file - Correct port number for dnssec - logcheck has the home dir set to its cache- Add policy for grindengine MPI jobs- Add new sysadm_secadm.pp module * contains secadm definition for sysadm_t - Move user_mail_domain access out of the interface into the te file - Allow httpd_t to create httpd_var_lib_t directories as well as files - Allow snmpd to connect to the ricci_modcluster stream - Allow firewalld to read /etc/passwd - Add auth_use_nsswitch for colord - Allow smartd to read network state - smartdnotify needs to read /etc/group- Allow gpg and gpg_agent to store sock_file in gpg_secret_t directory - lxdm startup scripts should be labeled bin_t, so confined users will work - mcstransd now creates a pid, needs back port to F16 - qpidd should be allowed to connect to the amqp port - Label devices 010-029 as usb devices - ypserv packager says ypserv does not use tmp_t so removing selinux policy types - Remove all ptrace commands that I believe are caused by the kernel/ps avcs - Add initial Obex policy - Add logging_syslogd_use_tty boolean - Add polipo_connect_all_unreserved bolean - Allow zabbix to connect to ftp port - Allow systemd-logind to be able to switch VTs - Allow apache to communicate with memcached through a sock_file- Fix file_context.subs_dist for now to work with pre usrmove- More /usr move fixes- Add zabbix_can_network boolean - Add httpd_can_connect_zabbix boolean - Prepare file context labeling for usrmove functions - Allow system cronjobs to read kernel network state - Add support for selinux_avcstat munin plugin - Treat hearbeat with corosync policy - Allow corosync to read and write to qpidd shared mem - mozilla_plugin is trying to run pulseaudio - Fixes for new sshd patch for running priv sep domains as the users context - Turn off dontaudit rules when turning on allow_ypbind - udev now reads /etc/modules.d directory- Turn on deny_ptrace boolean for the Rawhide run, so we can test this out - Cups exchanges dbus messages with init - udisk2 needs to send syslog messages - certwatch needs to read /etc/passwd- Add labeling for udisks2 - Allow fsadmin to communicate with the systemd process- Treat Bip with bitlbee policy * Bip is an IRC proxy - Add port definition for interwise port - Add support for ipa_memcached socket - systemd_jounald needs to getattr on all processes - mdadmin fixes * uses getpw - amavisd calls getpwnam() - denyhosts calls getpwall()- Setup labeling of /var/rsa and /var/lib/rsa to allow login programs to write there - bluetooth says they do not use /tmp and want to remove the type - Allow init to transition to colord - Mongod needs to read /proc/sys/vm/zone_reclaim_mode - Allow postfix_smtpd_t to connect to spamd - Add boolean to allow ftp to connect to all ports > 1023 - Allow sendmain to write to inherited dovecot tmp files - setroubleshoot needs to be able to execute rpm to see what version of packages- Merge systemd patch - systemd-tmpfiles wants to relabel /sys/devices/system/cpu/online - Allow deltacloudd dac_override, setuid, setgid caps - Allow aisexec to execute shell - Add use_nfs_home_dirs boolean for ssh-keygen- Fixes to make rawhide boot in enforcing mode with latest systemd changes- Add labeling for /var/run/systemd/journal/syslog - libvirt sends signals to ifconfig - Allow domains that read logind session files to list them- Fixed destined form libvirt-sandbox - Allow apps that list sysfs to also read sympolicy links in this filesystem - Add ubac_constrained rules for chrome_sandbox - Need interface to allow domains to use tmpfs_t files created by the kernel, used by libra - Allow postgresql to be executed by the caller - Standardize interfaces of daemons - Add new labeling for mm-handler - Allow all matahari domains to read network state and etc_runtime_t files- New fix for seunshare, requires seunshare_domains to be able to mounton / - Allow systemctl running as logrotate_t to connect to private systemd socket - Allow tmpwatch to read meminfo - Allow rpc.svcgssd to read supported_krb5_enctype - Allow zarafa domains to read /dev/random and /dev/urandom - Allow snmpd to read dev_snmp6 - Allow procmail to talk with cyrus - Add fixes for check_disk and check_nagios plugins- default trans rules for Rawhide policy - Make sure sound_devices controlC* are labeled correctly on creation - sssd now needs sys_admin - Allow snmp to read all proc_type - Allow to setup users homedir with quota.group- Add httpd_can_connect_ldap() interface - apcupsd_t needs to use seriel ports connected to usb devices - Kde puts procmail mail directory under ~/.local/share - nfsd_t can trigger sys_rawio on tests that involve too many mountpoints, dontaudit for now - Add labeling for /sbin/iscsiuio- Add label for /var/lib/iscan/interpreter - Dont audit writes to leaked file descriptors or redirected output for nacl - NetworkManager needs to write to /sys/class/net/ib*/mode- Allow abrt to request the kernel to load a module - Make sure mozilla content is labeled correctly - Allow tgtd to read system state - More fixes for boinc * allow to resolve dns name * re-write boinc policy to use boinc_domain attribute - Allow munin services plugins to use NSCD services- Allow mozilla_plugin_t to manage mozilla_home_t - Allow ssh derived domain to execute ssh-keygen in the ssh_keygen_t domain - Add label for tumblerd- Fixes for xguest package- Fixes related to /bin, /sbin - Allow abrt to getattr on blk files - Add type for rhev-agent log file - Fix labeling for /dev/dmfm - Dontaudit wicd leaking - Allow systemd_logind_t to look at process info of apps that exchange dbus messages with it - Label /etc/locale.conf correctly - Allow user_mail_t to read /dev/random - Allow postfix-smtpd to read MIMEDefang - Add label for /var/log/suphp.log - Allow swat_t to connect and read/write nmbd_t sock_file - Allow systemd-tmpfiles to setattr for /run/user/gdm/dconf - Allow systemd-tmpfiles to change user identity in object contexts - More fixes for rhev_agentd_t consolehelper policy- Use fs_use_xattr for squashf - Fix procs_type interface - Dovecot has a new fifo_file /var/run/dovecot/stats-mail - Dovecot has a new fifo_file /var/run/stats-mail - Colord does not need to connect to network - Allow system_cronjob to dbus chat with NetworkManager - Puppet manages content, want to make sure it labels everything correctly- Change port 9050 to tor_socks_port_t and then allow openvpn to connect to it - Allow all postfix domains to use the fifo_file - Allow sshd_t to getattr on all file systems in order to generate avc on nfs_t - Allow apmd_t to read grub.cfg - Let firewallgui read the selinux config - Allow systemd-tmpfiles to delete content in /root that has been moved to /tmp - Fix devicekit_manage_pid_files() interface - Allow squid to check the network state - Dontaudit colord getattr on file systems - Allow ping domains to read zabbix_tmp_t files- Allow mcelog_t to create dir and file in /var/run and label it correctly - Allow dbus to manage fusefs - Mount needs to read process state when mounting gluster file systems - Allow collectd-web to read collectd lib files - Allow daemons and system processes started by init to read/write the unix_stream_socket passed in from as stdin/stdout/stderr - Allow colord to get the attributes of tmpfs filesystem - Add sanlock_use_nfs and sanlock_use_samba booleans - Add bin_t label for /usr/lib/virtualbox/VBoxManage- Add ssh_dontaudit_search_home_dir - Changes to allow namespace_init_t to work - Add interface to allow exec of mongod, add port definition for mongod port, 27017 - Label .kde/share/apps/networkmanagement/certificates/ as home_cert_t - Allow spamd and clamd to steam connect to each other - Add policy label for passwd.OLD - More fixes for postfix and postfix maildro - Add ftp support for mozilla plugins - Useradd now needs to manage policy since it calls libsemanage - Fix devicekit_manage_log_files() interface - Allow colord to execute ifconfig - Allow accountsd to read /sys - Allow mysqld-safe to execute shell - Allow openct to stream connect to pcscd - Add label for /var/run/nm-dns-dnsmasq\.conf - Allow networkmanager to chat with virtd_t- Pulseaudio changes - Merge patches- Merge patches back into git repository.- Remove allow_execmem boolean and replace with deny_execmem boolean- Turn back on allow_execmem boolean- Add more MCS fixes to make sandbox working - Make faillog MLS trusted to make sudo_$1_t working - Allow sandbox_web_client_t to read passwd_file_t - Add .mailrc file context - Remove execheap from openoffice domain - Allow chrome_sandbox_nacl_t to read cpu_info - Allow virtd to relabel generic usb which is need if USB device - Fixes for virt.if interfaces to consider chr_file as image file type- Remove Open Office policy - Remove execmem policy- MCS fixes - quota fixes- Remove transitions to consoletype- Make nvidia* to be labeled correctly - Fix abrt_manage_cache() interface - Make filetrans rules optional so base policy will build - Dontaudit chkpwd_t access to inherited TTYS - Make sure postfix content gets created with the correct label - Allow gnomeclock to read cgroup - Fixes for cloudform policy- Check in fixed for Chrome nacl support- Begin removing qemu_t domain, we really no longer need this domain. - systemd_passwd needs dac_overide to communicate with users TTY's - Allow svirt_lxc domains to send kill signals within their container- Remove qemu.pp again without causing a crash- Remove qemu.pp, everything should use svirt_t or stay in its current domain- Allow policykit to talk to the systemd via dbus - Move chrome_sandbox_nacl_t to permissive domains - Additional rules for chrome_sandbox_nacl- Change bootstrap name to nacl - Chrome still needs execmem - Missing role for chrome_sandbox_bootstrap - Add boolean to remove execmem and execstack from virtual machines - Dontaudit xdm_t doing an access_check on etc_t directories- Allow named to connect to dirsrv by default - add ldapmap1_0 as a krb5_host_rcache_t file - Google chrome developers asked me to add bootstrap policy for nacl stuff - Allow rhev_agentd_t to getattr on mountpoints - Postfix_smtpd_t needs access to milters and cleanup seems to read/write postfix_smtpd_t unix_stream_sockets- Fixes for cloudform policies which need to connect to random ports - Make sure if an admin creates modules content it creates them with the correct label - Add port 8953 as a dns port used by unbound - Fix file name transition for alsa and confined users- Turn on mock_t and thumb_t for unconfined domains- Policy update should not modify local contexts- Remove ada policy- Remove tzdata policy - Add labeling for udev - Add cloudform policy - Fixes for bootloader policy- Add policies for nova openstack- Add fixes for nova-stack policy- Allow svirt_lxc_domain to chr_file and blk_file devices if they are in the domain - Allow init process to setrlimit on itself - Take away transition rules for users executing ssh-keygen - Allow setroubleshoot_fixit_t to read /dev/urand - Allow sshd to relbale tunnel sockets - Allow fail2ban domtrans to shorewall in the same way as with iptables - Add support for lnk files in the /var/lib/sssd directory - Allow system mail to connect to courier-authdaemon over an unix stream socket- Add passwd_file_t for /etc/ptmptmp- Dontaudit access checks for all executables, gnome-shell is doing access(EXEC, X_OK) - Make corosync to be able to relabelto cluster lib fies - Allow samba domains to search /var/run/nmbd - Allow dirsrv to use pam - Allow thumb to call getuid - chrome less likely to get mmap_zero bug so removing dontaudit - gimp help-browser has built in javascript - Best guess is that devices named /dev/bsr4096 should be labeled as cpu_device_t - Re-write glance policy- Move dontaudit sys_ptrace line from permissive.te to domain.te - Remove policy for hal, it no longer exists- Don't check md5 size or mtime on certain config files- Remove allow_ptrace and replace it with deny_ptrace, which will remove all ptrace from the system - Remove 2000 dontaudit rules between confined domains on transition and replace with single dontaudit domain domain:process { noatsecure siginh rlimitinh } ;- Fixes for bootloader policy - $1_gkeyringd_t needs to read $HOME/%USER/.local/share/keystore - Allow nsplugin to read /usr/share/config - Allow sa-update to update rules - Add use_fusefs_home_dirs for chroot ssh option - Fixes for grub2 - Update systemd_exec_systemctl() interface - Allow gpg to read the mail spool - More fixes for sa-update running out of cron job - Allow ipsec_mgmt_t to read hardware state information - Allow pptp_t to connect to unreserved_port_t - Dontaudit getattr on initctl in /dev from chfn - Dontaudit getattr on kernel_core from chfn - Add systemd_list_unit_dirs to systemd_exec_systemctl call - Fixes for collectd policy - CHange sysadm_t to create content as user_tmp_t under /tmp- Shrink size of policy through use of attributes for userdomain and apache- Allow virsh to read xenstored pid file - Backport corenetwork fixes from upstream - Do not audit attempts by thumb to search config_home_t dirs (~/.config) - label ~/.cache/telepathy/logger telepathy_logger_cache_home_t - allow thumb to read generic data home files (mime.type)- Allow nmbd to manage sock file in /var/run/nmbd - ricci_modservice send syslog msgs - Stop transitioning from unconfined_t to ldconfig_t, but make sure /etc/ld.so.cache is labeled correctly - Allow systemd_logind_t to manage /run/USER/dconf/user- Fix missing patch from F16- Allow logrotate setuid and setgid since logrotate is supposed to do it - Fixes for thumb policy by grift - Add new nfsd ports - Added fix to allow confined apps to execmod on chrome - Add labeling for additional vdsm directories - Allow Exim and Dovecot SASL - Add label for /var/run/nmbd - Add fixes to make virsh and xen working together - Colord executes ls - /var/spool/cron is now labeled as user_cron_spool_t- Stop complaining about leaked file descriptors during install- Remove java and mono module and merge into execmem- Fixes for thumb policy and passwd_file_t- Fixes caused by the labeling of /etc/passwd - Add thumb.patch to transition unconfined_t to thumb_t for Rawhide- Add support for Clustered Samba commands - Allow ricci_modrpm_t to send log msgs - move permissive virt_qmf_t from virt.te to permissivedomains.te - Allow ssh_t to use kernel keyrings - Add policy for libvirt-qmf and more fixes for linux containers - Initial Polipo - Sanlock needs to run ranged in order to kill svirt processes - Allow smbcontrol to stream connect to ctdbd- Add label for /etc/passwd- Change unconfined_domains to permissive for Rawhide - Add definition for the ephemeral_ports- Make mta_role() active - Allow asterisk to connect to jabber client port - Allow procmail to read utmp - Add NIS support for systemd_logind_t - Allow systemd_logind_t to manage /run/user/$USER/dconf dir which is labeled as config_home_t - Fix systemd_manage_unit_dirs() interface - Allow ssh_t to manage directories passed into it - init needs to be able to create and delete unit file directories - Fix typo in apache_exec_sys_script - Add ability for logrotate to transition to awstat domain- Change screen to use screen_domain attribute and allow screen_domains to read all process domain state - Add SELinux support for ssh pre-auth net process in F17 - Add logging_syslogd_can_sendmail boolean- Add definition for ephemeral ports - Define user_tty_device_t as a customizable_type- Needs to require a new version of checkpolicy - Interface fixes- Allow sanlock to manage virt lib files - Add virt_use_sanlock booelan - ksmtuned is trying to resolve uids - Make sure .gvfs is labeled user_home_t in the users home directory - Sanlock sends kill signals and needs the kill capability - Allow mockbuild to work on nfs homedirs - Fix kerberos_manage_host_rcache() interface - Allow exim to read system state- Allow systemd-tmpfiles to set the correct labels on /var/run, /tmp and other files - We want any file type that is created in /tmp by a process running as initrc_t to be labeled initrc_tmp_t- Allow collectd to read hardware state information - Add loop_control_device_t - Allow mdadm to request kernel to load module - Allow domains that start other domains via systemctl to search unit dir - systemd_tmpfilses, needs to list any file systems mounted on /tmp - No one can explain why radius is listing the contents of /tmp, so we will dontaudit - If I can manage etc_runtime files, I should be able to read the links - Dontaudit hostname writing to mock library chr_files - Have gdm_t setup labeling correctly in users home dir - Label content unde /var/run/user/NAME/dconf as config_home_t - Allow sa-update to execute shell - Make ssh-keygen working with fips_enabled - Make mock work for staff_t user - Tighten security on mock_t- removing unconfined_notrans_t no longer necessary - Clean up handling of secure_mode_insmod and secure_mode_policyload - Remove unconfined_mount_t- Add exim_exec_t label for /usr/sbin/exim_tidydb - Call init_dontaudit_rw_stream_socket() interface in mta policy - sssd need to search /var/cache/krb5rcache directory - Allow corosync to relabel own tmp files - Allow zarafa domains to send system log messages - Allow ssh to do tunneling - Allow initrc scripts to sendto init_t unix_stream_socket - Changes to make sure dmsmasq and virt directories are labeled correctly - Changes needed to allow sysadm_t to manage systemd unit files - init is passing file descriptors to dbus and on to system daemons - Allow sulogin additional access Reported by dgrift and Jeremy Miller - Steve Grubb believes that wireshark does not need this access - Fix /var/run/initramfs to stop restorecon from looking at - pki needs another port - Add more labels for cluster scripts - Allow apps that manage cgroup_files to manage cgroup link files - Fix label on nfs-utils scripts directories - Allow gatherd to read /dev/rand and /dev/urand- pki needs another port - Add more labels for cluster scripts - Fix label on nfs-utils scripts directories - Fixes for cluster - Allow gatherd to read /dev/rand and /dev/urand - abrt leaks fifo files- Add glance policy - Allow mdadm setsched - /var/run/initramfs should not be relabeled with a restorecon run - memcache can be setup to override sys_resource - Allow httpd_t to read tetex data - Allow systemd_tmpfiles to delete kernel modules left in /tmp directory.- Allow Postfix to deliver to Dovecot LMTP socket - Ignore bogus sys_module for lldpad - Allow chrony and gpsd to send dgrams, gpsd needs to write to the real time clock - systemd_logind_t sets the attributes on usb devices - Allow hddtemp_t to read etc_t files - Add permissivedomains module - Move all permissive domains calls to permissivedomain.te - Allow pegasis to send kill signals to other UIDs- Allow insmod_t to use fds leaked from devicekit - dontaudit getattr between insmod_t and init_t unix_stream_sockets - Change sysctl unit file interfaces to use systemctl - Add support for chronyd unit file - Allow mozilla_plugin to read gnome_usr_config - Add policy for new gpsd - Allow cups to create kerberos rhost cache files - Add authlogin_filetrans_named_content, to unconfined_t to make sure shadow and other log files get labeled correctly- Make users_extra and seusers.final into config(noreplace) so semanage users and login does not get overwritten- Add policy for sa-update being run out of cron jobs - Add create perms to postgresql_manage_db - ntpd using a gps has to be able to read/write generic tty_device_t - If you disable unconfined and unconfineduser, rpm needs more privs to manage /dev - fix spec file - Remove qemu_domtrans_unconfined() interface - Make passenger working together with puppet - Add init_dontaudit_rw_stream_socket interface - Fixes for wordpress- Turn on allow_domain_fd_use boolean on F16 - Allow syslog to manage all log files - Add use_fusefs_home_dirs boolean for chrome - Make vdagent working with confined users - Add abrt_handle_event_t domain for ABRT event scripts - Labeled /usr/sbin/rhnreg_ks as rpm_exec_t and added changes related to this change - Allow httpd_git_script_t to read passwd data - Allow openvpn to set its process priority when the nice parameter is used- livecd fixes - spec file fixes- fetchmail can use kerberos - ksmtuned reads in shell programs - gnome_systemctl_t reads the process state of ntp - dnsmasq_t asks the kernel to load multiple kernel modules - Add rules for domains executing systemctl - Bogus text within fc file- Add cfengine policy- Add abrt_domain attribute - Allow corosync to manage cluster lib files - Allow corosync to connect to the system DBUS- Add sblim, uuidd policies - Allow kernel_t dyntrasition to init_t- init_t need setexec - More fixes of rules which cause an explosion in rules by Dan Walsh- Allow rcsmcertd to perform DNS name resolution - Add dirsrvadmin_unconfined_script_t domain type for 389-ds admin scripts - Allow tmux to run as screen - New policy for collectd - Allow gkeyring_t to interact with all user apps - Add rules to allow firstboot to run on machines with the unconfined.pp module removed- Allow systemd_logind to send dbus messages with users - allow accountsd to read wtmp file - Allow dhcpd to get and set capabilities- Fix oracledb_port definition - Allow mount to mounton the selinux file system - Allow users to list /var directories- systemd fixes- Add initial policy for abrt_dump_oops_t - xtables-multi wants to getattr of the proc fs - Smoltclient is connecting to abrt - Dontaudit leaked file descriptors to postdrop - Allow abrt_dump_oops to look at kernel sysctls - Abrt_dump_oops_t reads kernel ring buffer - Allow mysqld to request the kernel to load modules - systemd-login needs fowner - Allow postfix_cleanup_t to searh maildrop- Initial systemd_logind policy - Add policy for systemd_logger and additional proivs for systemd_logind - More fixes for systemd policies- Allow setsched for virsh - Systemd needs to impersonate cups, which means it needs to create tcp_sockets in cups_t domain, as well as manage spool directories - iptables: the various /sbin/ip6?tables.* are now symlinks for /sbin/xtables-multi- A lot of users are running yum -y update while in /root which is causing ldconfig to list the contents, adding dontaudit - Allow colord to interact with the users through the tmpfs file system - Since we changed the label on deferred, we need to allow postfix_qmgr_t to be able to create maildrop_t files - Add label for /var/log/mcelog - Allow asterisk to read /dev/random if it uses TLS - Allow colord to read ini files which are labeled as bin_t - Allow dirsrvadmin sys_resource and setrlimit to use ulimit - Systemd needs to be able to create sock_files for every label in /var/run directory, cupsd being the first. - Also lists /var and /var/spool directories - Add openl2tpd to l2tpd policy - qpidd is reading the sysfs file- Change usbmuxd_t to dontaudit attempts to read chr_file - Add mysld_safe_exec_t for libra domains to be able to start private mysql domains - Allow pppd to search /var/lock dir - Add rhsmcertd policy- Update to upstream- More fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git- Fix spec file to not report Verify errors- Add dspam policy - Add lldpad policy - dovecot auth wants to search statfs #713555 - Allow systemd passwd apps to read init fifo_file - Allow prelink to use inherited terminals - Run cherokee in the httpd_t domain - Allow mcs constraints on node connections - Implement pyicqt policy - Fixes for zarafa policy - Allow cobblerd to send syslog messages- Add policy.26 to the payload - Remove olpc stuff - Remove policygentool- Fixes for zabbix - init script needs to be able to manage sanlock_var_run_... - Allow sandlock and wdmd to create /var/run directories... - mixclip.so has been compiled correctly - Fix passenger policy module name- Add mailscanner policy from dgrift - Allow chrome to optionally be transitioned to - Zabbix needs these rules when starting the zabbix_server_mysql - Implement a type for freedesktop openicc standard (~/.local/share/icc) - Allow system_dbusd_t to read inherited icc_data_home_t files. - Allow colord_t to read icc_data_home_t content. #706975 - Label stuff under /usr/lib/debug as if it was labeled under /- Fixes for sanlock policy - Fixes for colord policy - Other fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log- Add rhev policy module to modules-targeted.conf- Lot of fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log- Allow logrotate to execute systemctl - Allow nsplugin_t to getattr on gpmctl - Fix dev_getattr_all_chr_files() interface - Allow shorewall to use inherited terms - Allow userhelper to getattr all chr_file devices - sandbox domains should be able to getattr and dontaudit search of sysctl_kernel_t - Fix labeling for ABRT Retrace Server- Dontaudit sys_module for ifconfig - Make telepathy and gkeyringd daemon working with confined users - colord wants to read files in users homedir - Remote login should be creating user_tmp_t not its own tmp files- Fix label for /usr/share/munin/plugins/munin_* plugins - Add support for zarafa-indexer - Fix boolean description - Allow colord to getattr on /proc/scsi/scsi - Add label for /lib/upstart/init - Colord needs to list /mnt- Forard port changes from F15 for telepathy - NetworkManager should be allowed to use /dev/rfkill - Fix dontaudit messages to say Domain to not audit - Allow telepathy domains to read/write gnome_cache files - Allow telepathy domains to call getpw - Fixes for colord and vnstatd policy- Allow init_t getcap and setcap - Allow namespace_init_t to use nsswitch - aisexec will execute corosync - colord tries to read files off noxattr file systems - Allow init_t getcap and setcap- Add support for ABRT retrace server - Allow user_t and staff_t access to generic scsi to handle locally plugged in scanners - Allow telepath_msn_t to read /proc/PARENT/cmdline - ftpd needs kill capability - Allow telepath_msn_t to connect to sip port - keyring daemon does not work on nfs homedirs - Allow $1_sudo_t to read default SELinux context - Add label for tgtd sock file in /var/run/ - Add apache_exec_rotatelogs interface - allow all zaraha domains to signal themselves, server writes to /tmp - Allow syslog to read the process state - Add label for /usr/lib/chromium-browser/chrome - Remove the telepathy transition from unconfined_t - Dontaudit sandbox domains trying to mounton sandbox_file_t, this is caused by fuse mounts - Allow initrc_t domain to manage abrt pid files - Add support for AEOLUS project - Virt_admin should be allowed to manage images and processes - Allow plymountd to send signals to init - Change labeling of fping6- Add filename transitions- Fixes for zarafa policy - Add support for AEOLUS project - Change labeling of fping6 - Allow plymountd to send signals to init - Allow initrc_t domain to manage abrt pid files - Virt_admin should be allowed to manage images and processes- xdm_t needs getsession for switch user - Every app that used to exec init is now execing systemdctl - Allow squid to manage krb5_host_rcache_t files - Allow foghorn to connect to agentx port - Fixes for colord policy- Add Dan's patch to remove 64 bit variants - Allow colord to use unix_dgram_socket - Allow apps that search pids to read /var/run if it is a lnk_file - iscsid_t creates its own directory - Allow init to list var_lock_t dir - apm needs to verify user accounts auth_use_nsswitch - Add labeling for systemd unit files - Allow gnomeclok to enable ntpd service using systemctl - systemd_systemctl_t domain was added - Add label for matahari-broker.pid file - We want to remove untrustedmcsprocess from ability to read /proc/pid - Fixes for matahari policy - Allow system_tmpfiles_t to delete user_home_t files in the /tmp dir - Allow sshd to transition to sysadm_t if ssh_sysadm_login is turned on- Fix typo- Add /var/run/lock /var/lock definition to file_contexts.subs - nslcd_t is looking for kerberos cc files - SSH_USE_STRONG_RNG is 1 which requires /dev/random - Fix auth_rw_faillog definition - Allow sysadm_t to set attributes on fixed disks - allow user domains to execute lsof and look at application sockets - prelink_cron job calls telinit -u if init is rewritten - Fixes to run qemu_t from staff_t- Fix label for /var/run/udev to udev_var_run_t - Mock needs to be able to read network state- Add file_contexts.subs to handle /run and /run/lock - Add other fixes relating to /run changes from F15 policy- Allow $1_sudo_t and $1_su_t open access to user terminals - Allow initrc_t to use generic terminals - Make Makefile/Rules.modular run sepolgen-ifgen during build to check if files for bugs -systemd is going to be useing /run and /run/lock for early bootup files. - Fix some comments in rlogin.if - Add policy for KDE backlighthelper - sssd needs to read ~/.k5login in nfs, cifs or fusefs file systems - sssd wants to read .k5login file in users homedir - setroubleshoot reads executables to see if they have TEXTREL - Add /var/spool/audit support for new version of audit - Remove kerberos_connect_524() interface calling - Combine kerberos_master_port_t and kerberos_port_t - systemd has setup /dev/kmsg as stderr for apps it executes - Need these access so that init can impersonate sockets on unix_dgram_socket- Remove some unconfined domains - Remove permissive domains - Add policy-term.patch from Dan- Fix multiple specification for boot.log - devicekit leaks file descriptors to setfiles_t - Change all all_nodes to generic_node and all_if to generic_if - Should not use deprecated interface - Switch from using all_nodes to generic_node and from all_if to generic_if - Add support for xfce4-notifyd - Fix file context to show several labels as SystemHigh - seunshare needs to be able to mounton nfs/cifs/fusefs homedirs - Add etc_runtime_t label for /etc/securetty - Fixes to allow xdm_t to start gkeyringd_USERTYPE_t directly - login.krb needs to be able to write user_tmp_t - dirsrv needs to bind to port 7390 for dogtag - Fix a bug in gpg policy - gpg sends audit messages - Allow qpid to manage matahari files- Initial policy for matahari - Add dev_read_watchdog - Allow clamd to connect clamd port - Add support for kcmdatetimehelper - Allow shutdown to setrlimit and sys_nice - Allow systemd_passwd to talk to /dev/log before udev or syslog is running - Purge chr_file and blk files on /tmp - Fixes for pads - Fixes for piranha-pulse - gpg_t needs to be able to encyprt anything owned by the user- mozilla_plugin_tmp_t needs to be treated as user tmp files - More dontaudits of writes from readahead - Dontaudit readahead_t file_type:dir write, to cover up kernel bug - systemd_tmpfiles needs to relabel faillog directory as well as the file - Allow hostname and consoletype to r/w inherited initrc_tmp_t files handline hostname >> /tmp/myhost- Add policykit fixes from Tim Waugh - dontaudit sandbox domains sandbox_file_t:dir mounton - Add new dontaudit rules for sysadm_dbusd_t - Change label for /var/run/faillock * other fixes which relate with this change- Update to upstream - Fixes for telepathy - Add port defition for ssdp port - add policy for /bin/systemd-notify from Dan - Mount command requires users read mount_var_run_t - colord needs to read konject_uevent_socket - User domains connect to the gkeyring socket - Add colord policy and allow user_t and staff_t to dbus chat with it - Add lvm_exec_t label for kpartx - Dontaudit reading the mail_spool_t link from sandbox -X - systemd is creating sockets in avahi_var_run and system_dbusd_var_run- gpg_t needs to talk to gnome-keyring - nscd wants to read /usr/tmp->/var/tmp to generate randomziation in unixchkpwd - enforce MCS labeling on nodes - Allow arpwatch to read meminfo - Allow gnomeclock to send itself signals - init relabels /dev/.udev files on boot - gkeyringd has to transition back to staff_t when it runs commands in bin_t or shell_exec_t - nautilus checks access on /media directory before mounting usb sticks, dontaudit access_check on mnt_t - dnsmasq can run as a dbus service, needs acquire service - mysql_admin should be allowed to connect to mysql service - virt creates monitor sockets in the users home dir- Allow usbhid-ups to read hardware state information - systemd-tmpfiles has moved - Allo cgroup to sys_tty_config - For some reason prelink is attempting to read gconf settings - Add allow_daemons_use_tcp_wrapper boolean - Add label for ~/.cache/wocky to make telepathy work in enforcing mode - Add label for char devices /dev/dasd* - Fix for apache_role - Allow amavis to talk to nslcd - allow all sandbox to read selinux poilcy config files - Allow cluster domains to use the system bus and send each other dbus messages- Update to upstream- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Update to ref policy - cgred needs chown capability - Add /dev/crash crash_dev_t - systemd-readahead wants to use fanotify which means readahead_t needs sys_admin capability- New labeling for postfmulti #675654 - dontaudit xdm_t listing noxattr file systems - dovecot-auth needs to be able to connect to mysqld via the network as well as locally - shutdown is passed stdout to a xdm_log_t file - smartd creates a fixed disk device - dovecot_etc_t contains a lnk_file that domains need to read - mount needs to be able to read etc_runtim_t:lnk_file since in rawhide this is a link created at boot- syslog_t needs syslog capability - dirsrv needs to be able to create /var/lib/snmp - Fix labeling for dirsrv - Fix for dirsrv policy missing manage_dirs_pattern - corosync needs to delete clvm_tmpfs_t files - qdiskd needs to list hugetlbfs - Move setsched to sandbox_x_domain, so firefox can run without network access - Allow hddtemp to read removable devices - Adding syslog and read_policy permissions to policy * syslog Allow unconfined, sysadm_t, secadm_t, logadm_t * read_policy allow unconfined, sysadm_t, secadm_t, staff_t on Targeted allow sysadm_t (optionally), secadm_t on MLS - mdadm application will write into /sys/.../uevent whenever arrays are assembled or disassembled.- Add tcsd policy- ricci_modclusterd_t needs to bind to rpc ports 500-1023 - Allow dbus to use setrlimit to increase resoueces - Mozilla_plugin is leaking to sandbox - Allow confined users to connect to lircd over unix domain stream socket which allow to use remote control - Allow awstats to read squid logs - seunshare needs to manage tmp_t - apcupsd cgi scripts have a new directory- Fix xserver_dontaudit_read_xdm_pid - Change oracle_port_t to oracledb_port_t to prevent conflict with satellite - Allow dovecot_deliver_t to read/write postfix_master_t:fifo_file. * These fifo_file is passed from postfix_master_t to postfix_local_t to dovecot_deliver_t - Allow readahead to manage readahead pid dirs - Allow readahead to read all mcs levels - Allow mozilla_plugin_t to use nfs or samba homedirs- Allow nagios plugin to read /proc/meminfo - Fix for mozilla_plugin - Allow samba_net_t to create /etc/keytab - pppd_t setting up vpns needs to run unix_chkpwd, setsched its process and write wtmp_t - nslcd can read user credentials - Allow nsplugin to delete mozilla_plugin_tmpfs_t - abrt tries to create dir in rpm_var_lib_t - virt relabels fifo_files - sshd needs to manage content in fusefs homedir - mock manages link files in cache dir- nslcd needs setsched and to read /usr/tmp - Invalid call in likewise policy ends up creating a bogus role - Cannon puts content into /var/lib/bjlib that cups needs to be able to write - Allow screen to create screen_home_t in /root - dirsrv sends syslog messages - pinentry reads stuff in .kde directory - Add labels for .kde directory in homedir - Treat irpinit, iprupdate, iprdump services with raid policy- NetworkManager wants to read consolekit_var_run_t - Allow readahead to create /dev/.systemd/readahead - Remove permissive domains - Allow newrole to run namespace_init- Add sepgsql_contexts file- Update to upstream- Add oracle ports and allow apache to connect to them if the connect_db boolean is turned on - Add puppetmaster_use_db boolean - Fixes for zarafa policy - Fixes for gnomeclock poliy - Fix systemd-tmpfiles to use auth_use_nsswitch- gnomeclock executes a shell - Update for screen policy to handle pipe in homedir - Fixes for polyinstatiated homedir - Fixes for namespace policy and other fixes related to polyinstantiation - Add namespace policy - Allow dovecot-deliver transition to sendmail which is needed by sieve scripts - Fixes for init, psad policy which relate with confined users - Do not audit bootloader attempts to read devicekit pid files - Allow nagios service plugins to read /proc- Add firewalld policy - Allow vmware_host to read samba config - Kernel wants to read /proc Fix duplicate grub def in cobbler - Chrony sends mail, executes shell, uses fifo_file and reads /proc - devicekitdisk getattr all file systems - sambd daemon writes wtmp file - libvirt transitions to dmidecode- Add initial policy for system-setup-keyboard which is now daemon - Label /var/lock/subsys/shorewall as shorewall_lock_t - Allow users to communicate with the gpg_agent_t - Dontaudit mozilla_plugin_t using the inherited terminal - Allow sambagui to read files in /usr - webalizer manages squid log files - Allow unconfined domains to bind ports to raw_ip_sockets - Allow abrt to manage rpm logs when running yum - Need labels for /var/run/bittlebee - Label .ssh under amanda - Remove unused genrequires for virt_domain_template - Allow virt_domain to use fd inherited from virtd_t - Allow iptables to read shorewall config- Gnome apps list config_home_t - mpd creates lnk files in homedir - apache leaks write to mail apps on tmp files - /var/stockmaniac/templates_cache contains log files - Abrt list the connects of mount_tmp_t dirs - passwd agent reads files under /dev and reads utmp file - squid apache script connects to the squid port - fix name of plymouth log file - teamviewer is a wine app - allow dmesg to read system state - Stop labeling files under /var/lib/mock so restorecon will not go into this - nsplugin needs to read network state for google talk- Allow xdm and syslog to use /var/log/boot.log - Allow users to communicate with mozilla_plugin and kill it - Add labeling for ipv6 and dhcp- New labels for ghc http content - nsplugin_config needs to read urand, lvm now calls setfscreate to create dev - pm-suspend now creates log file for append access so we remove devicekit_wri - Change authlogin_use_sssd to authlogin_nsswitch_use_ldap - Fixes for greylist_milter policy- Update to upstream - Fixes for systemd policy - Fixes for passenger policy - Allow staff users to run mysqld in the staff_t domain, akonadi needs this - Add bin_t label for /usr/share/kde4/apps/kajongg/kajongg.py - auth_use_nsswitch does not need avahi to read passwords,needed for resolving data - Dontaudit (xdm_t) gok attempting to list contents of /var/account - Telepathy domains need to read urand - Need interface to getattr all file classes in a mock library for setroubleshoot- Update selinux policy to handle new /usr/share/sandbox/start script- Update to upstream - Fix version of policy in spec file- Allow sandbox to run on nfs partitions, fixes for systemd_tmpfs - remove per sandbox domains devpts types - Allow dkim-milter sending signal to itself- Allow domains that transition to ping or traceroute, kill them - Allow user_t to conditionally transition to ping_t and traceroute_t - Add fixes to systemd- tools, including new labeling for systemd-fsck, systemd-cryptsetup- Turn on systemd policy - mozilla_plugin needs to read certs in the homedir. - Dontaudit leaked file descriptors from devicekit - Fix ircssi to use auth_use_nsswitch - Change to use interface without param in corenet to disable unlabelednet packets - Allow init to relabel sockets and fifo files in /dev - certmonger needs dac* capabilities to manage cert files not owned by root - dovecot needs fsetid to change group membership on mail - plymouthd removes /var/log/boot.log - systemd is creating symlinks in /dev - Change label on /etc/httpd/alias to be all cert_t- Fixes for clamscan and boinc policy - Add boinc_project_t setpgid - Allow alsa to create tmp files in /tmp- Push fixes to allow disabling of unlabeled_t packet access - Enable unlabelednet policy- Fixes for lvm to work with systemd- Fix the label for wicd log - plymouthd creates force-display-on-active-vt file - Allow avahi to request the kernel to load a module - Dontaudit hal leaks - Fix gnome_manage_data interface - Add new interface corenet_packet to define a type as being an packet_type. - Removed general access to packet_type from icecast and squid. - Allow mpd to read alsa config - Fix the label for wicd log - Add systemd policy- Fix gnome_manage_data interface - Dontaudit sys_ptrace capability for iscsid - Fixes for nagios plugin policy- Fix cron to run ranged when started by init - Fix devicekit to use log files - Dontaudit use of devicekit_var_run_t for fstools - Allow init to setattr on logfile directories - Allow hald to manage files in /var/run/pm-utils/ dir which is now labeled as devicekit_var_run_t- Fix up handling of dnsmasq_t creating /var/run/libvirt/network - Turn on sshd_forward_ports boolean by default - Allow sysadmin to dbus chat with rpm - Add interface for rw_tpm_dev - Allow cron to execute bin - fsadm needs to write sysfs - Dontaudit consoletype reading /var/run/pm-utils - Lots of new privs fro mozilla_plugin_t running java app, make mozilla_plugin - certmonger needs to manage dirsrv data - /var/run/pm-utils should be labeled as devicekit_var_run_t- fixes to allow /var/run and /var/lock as tmpfs - Allow chrome sandbox to connect to web ports - Allow dovecot to listem on lmtp and sieve ports - Allov ddclient to search sysctl_net_t - Transition back to original domain if you execute the shell- Remove duplicate declaration- Update to upstream - Cleanup for sandbox - Add attribute to be able to select sandbox types- Allow ddclient to fix file mode bits of ddclient conf file - init leaks file descriptors to daemons - Add labels for /etc/lirc/ and - Allow amavis_t to exec shell - Add label for gssd_tmp_t for /var/tmp/nfs_0- Put back in lircd_etc_t so policy will install- Turn on allow_postfix_local_write_mail_spool - Allow initrc_t to transition to shutdown_t - Allow logwatch and cron to mls_read_to_clearance for MLS boxes - Allow wm to send signull to all applications and receive them from users - lircd patch from field - Login programs have to read /etc/samba - New programs under /lib/systemd - Abrt needs to read config files- Update to upstream - Dontaudit leaked sockets from userdomains to user domains - Fixes for mcelog to handle scripts - Apply patch from Ruben Kerkhof - Allow syslog to search spool dirs- Allow nagios plugins to read usr files - Allow mysqld-safe to send system log messages - Fixes fpr ddclient policy - Fix sasl_admin interface - Allow apache to search zarafa config - Allow munin plugins to search /var/lib directory - Allow gpsd to read sysfs_t - Fix labels on /etc/mcelog/triggers to bin_t- Remove saslauthd_tmp_t and transition tmp files to krb5_host_rcache_t - Allow saslauthd_t to create krb5_host_rcache_t files in /tmp - Fix xserver interface - Fix definition of /var/run/lxdm- Turn on mediawiki policy - kdump leaks kdump_etc_t to ifconfig, add dontaudit - uux needs to transition to uucpd_t - More init fixes relabels man,faillog - Remove maxima defs in libraries.fc - insmod needs to be able to create tmpfs_t files - ping needs setcap- Allow groupd transition to fenced domain when executes fence_node - Fixes for rchs policy - Allow mpd to be able to read samba/nfs files- Fix up corecommands.fc to match upstream - Make sure /lib/systemd/* is labeled init_exec_t - mount wants to setattr on all mountpoints - dovecot auth wants to read dovecot etc files - nscd daemon looks at the exe file of the comunicating daemon - openvpn wants to read utmp file - postfix apps now set sys_nice and lower limits - remote_login (telnetd/login) wants to use telnetd_devpts_t and user_devpts_t to work correctly - Also resolves nsswitch - Fix labels on /etc/hosts.* - Cleanup to make upsteam patch work - allow abrt to read etc_runtime_t- Add conflicts for dirsrv package- Update to upstream - Add vlock policy- Fix sandbox to work on nfs homedirs - Allow cdrecord to setrlimit - Allow mozilla_plugin to read xauth - Change label on systemd-logger to syslogd_exec_t - Install dirsrv policy from dirsrv package- Add virt_home_t, allow init to setattr on xserver_tmp_t and relabel it - Udev needs to stream connect to init and kernel - Add xdm_exec_bootloader boolean, which allows xdm to execute /sbin/grub and read files in /boot directory- Allow NetworkManager to read openvpn_etc_t - Dontaudit hplip to write of /usr dirs - Allow system_mail_t to create /root/dead.letter as mail_home_t - Add vdagent policy for spice agent daemon- Dontaudit sandbox sending sigkill to all user domains - Add policy for rssh_chroot_helper - Add missing flask definitions - Allow udev to relabelto removable_t - Fix label on /var/log/wicd.log - Transition to initrc_t from init when executing bin_t - Add audit_access permissions to file - Make removable_t a device_node - Fix label on /lib/systemd/*- Fixes for systemd to manage /var/run - Dontaudit leaks by firstboot- Allow chome to create netlink_route_socket - Add additional MATHLAB file context - Define nsplugin as an application_domain - Dontaudit sending signals from sandboxed domains to other domains - systemd requires init to build /tmp /var/auth and /var/lock dirs - mount wants to read devicekit_power /proc/ entries - mpd wants to connect to soundd port - Openoffice causes a setattr on a lib_t file for normal users, add dontaudit - Treat lib_t and textrel_shlib_t directories the same - Allow mount read access on virtual images- Allow sandbox_x_domains to work with nfs/cifs/fusefs home dirs. - Allow devicekit_power to domtrans to mount - Allow dhcp to bind to udp ports > 1024 to do named stuff - Allow ssh_t to exec ssh_exec_t - Remove telepathy_butterfly_rw_tmp_files(), dev_read_printk() interfaces which are nolonger used - Fix clamav_append_log() intefaces - Fix 'psad_rw_fifo_file' interface- Allow cobblerd to list cobler appache content- Fixup for the latest version of upowed - Dontaudit sandbox sending SIGNULL to desktop apps- Update to upstream-Mount command from a confined user generates setattr on /etc/mtab file, need to dontaudit this access - dovecot-auth_t needs ipc_lock - gpm needs to use the user terminal - Allow system_mail_t to append ~/dead.letter - Allow NetworkManager to edit /etc/NetworkManager/NetworkManager.conf - Add pid file to vnstatd - Allow mount to communicate with gfs_controld - Dontaudit hal leaks in setfiles- Lots of fixes for systemd - systemd now executes readahead and tmpwatch type scripts - Needs to manage random seed- Allow smbd to use sys_admin - Remove duplicate file context for tcfmgr - Update to upstream- Fix fusefs handling - Do not allow sandbox to manage nsplugin_rw_t - Allow mozilla_plugin_t to connecto its parent - Allow init_t to connect to plymouthd running as kernel_t - Add mediawiki policy - dontaudit sandbox sending signals to itself. This can happen when they are running at different mcs. - Disable transition from dbus_session_domain to telepathy for F14 - Allow boinc_project to use shm - Allow certmonger to search through directories that contain certs - Allow fail2ban the DAC Override so it can read log files owned by non root users- Start adding support for use_fusefs_home_dirs - Add /var/lib/syslog directory file context - Add /etc/localtime as locale file context- Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn off iptables from unconfined user - Allow sudo to send signals to any domains the user could have transitioned to. - Passwd in single user mode needs to talk to console_device_t - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio - locate tried to read a symbolic link, will dontaudit - New labels for telepathy-sunshine content in homedir - Google is storing other binaries under /opt/google/talkplugin - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15 - modemmanger and bluetooth send dbus messages to devicekit_power - Samba needs to getquota on filesystems labeld samba_share_t- Dontaudit attempts by xdm_t to write to bin_t for kdm - Allow initrc_t to manage system_conf_t- Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory. - Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets - Allow confined users to read xdm_etc_t files - Allow xdm_t to transition to xauth_t for lxdm program- Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home - Allow clamd to send signals to itself - Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm. - Allow haze to connect to yahoo chat and messenger port tcp:5050. Bz #637339 - Allow guest to run ps command on its processes by allowing it to read /proc - Allow firewallgui to sys_rawio which seems to be required to setup masqerading - Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba. - Add label for /var/log/slim.log- Pull in cleanups from dgrift - Allow mozilla_plugin_t to execute mozilla_home_t - Allow rpc.quota to do quotamod- Cleanup policy via dgrift - Allow dovecot_deliver to append to inherited log files - Lots of fixes for consolehelper- Fix up Xguest policy- Add vnstat policy - allow libvirt to send audit messages - Allow chrome-sandbox to search nfs_t- Update to upstream- Add the ability to send audit messages to confined admin policies - Remove permissive domain from cmirrord and dontaudit sys_tty_config - Split out unconfined_domain() calls from other unconfined_ calls so we can d - virt needs to be able to read processes to clearance for MLS- Allow all domains that can use cgroups to search tmpfs_t directory - Allow init to send audit messages- Update to upstream- Allow mdadm_t to create files and sock files in /dev/md/- Add policy for ajaxterm- Handle /var/db/sudo - Allow pulseaudio to read alsa config - Allow init to send initrc_t dbus messagesAllow iptables to read shorewall tmp files Change chfn and passwd to use auth_use_pam so they can send dbus messages to fpr intd label vlc as an execmem_exec_t Lots of fixes for mozilla_plugin to run google vidio chat Allow telepath_msn to execute ldconfig and its own tmp files Fix labels on hugepages Allow mdadm to read files on /dev Remove permissive domains and change back to unconfined Allow freshclam to execute shell and bin_t Allow devicekit_power to transition to dhcpc Add boolean to allow icecast to connect to any port- Merge upstream fix of mmap_zero - Allow mount to write files in debugfs_t - Allow corosync to communicate with clvmd via tmpfs - Allow certmaster to read usr_t files - Allow dbus system services to search cgroup_t - Define rlogind_t as a login pgm- Allow mdadm_t to read/write hugetlbfs- Dominic Grift Cleanup - Miroslav Grepl policy for jabberd - Various fixes for mount/livecd and prelink- Merge with upstream- More access needed for devicekit - Add dbadm policy- Merge with upstream- Allow seunshare to fowner- Allow cron to look at user_cron_spool links - Lots of fixes for mozilla_plugin_t - Add sysv file system - Turn unconfined domains to permissive to find additional avcs- Update policy for mozilla_plugin_t- Allow clamscan to read proc_t - Allow mount_t to write to debufs_t dir - Dontaudit mount_t trying to write to security_t dir- Allow clamscan_t execmem if clamd_use_jit set - Add policy for firefox plugin-container- Fix /root/.forward definition- label dead.letter as mail_home_t- Allow login programs to search /cgroups- Fix cert handling- Fix devicekit_power bug - Allow policykit_auth_t more access.- Fix nis calls to allow bind to ports 512-1024 - Fix smartmon- Allow pcscd to read sysfs - systemd fixes - Fix wine_mmap_zero_ignore boolean- Apply Miroslav munin patch - Turn back on allow_execmem and allow_execmod booleans- Merge in fixes from dgrift repository- Update boinc policy - Fix sysstat policy to allow sys_admin - Change failsafe_context to unconfined_r:unconfined_t:s0- New paths for upstart- New permissions for syslog - New labels for /lib/upstart- Add mojomojo policy- Allow systemd to setsockcon on sockets to immitate other services- Remove debugfs label- Update to latest policy- Fix eclipse labeling from IBMSupportAssasstant packageing- Make boot with systemd in enforcing mode- Update to upstream- Add boolean to turn off port forwarding in sshd.- Add support for ebtables - Fixes for rhcs and corosync policy-Update to upstream-Update to upstream-Update to upstream- Add Zarafa policy- Cleanup of aiccu policy - initial mock policy- Lots of random fixes- Update to upstream- Update to upstream - Allow prelink script to signal itself - Cobbler fixes- Add xdm_var_run_t to xserver_stream_connect_xdm - Add cmorrord and mpd policy from Miroslav Grepl- Fix sshd creation of krb cc files for users to be user_tmp_t- Fixes for accountsdialog - Fixes for boinc- Fix label on /var/lib/dokwiki - Change permissive domains to enforcing - Fix libvirt policy to allow it to run on mls- Update to upstream- Allow procmail to execute scripts in the users home dir that are labeled home_bin_t - Fix /var/run/abrtd.lock label- Allow login programs to read krb5_home_t Resolves: 594833 - Add obsoletes for cachefilesfd-selinux package Resolves: #575084- Allow mount to r/w abrt fifo file - Allow svirt_t to getattr on hugetlbfs - Allow abrt to create a directory under /var/spool- Add labels for /sys - Allow sshd to getattr on shutdown - Fixes for munin - Allow sssd to use the kernel key ring - Allow tor to send syslog messages - Allow iptabels to read usr files - allow policykit to read all domains state- Fix path for /var/spool/abrt - Allow nfs_t as an entrypoint for http_sys_script_t - Add policy for piranha - Lots of fixes for sosreport- Allow xm_t to read network state and get and set capabilities - Allow policykit to getattr all processes - Allow denyhosts to connect to tcp port 9911 - Allow pyranha to use raw ip sockets and ptrace itself - Allow unconfined_execmem_t and gconfsd mechanism to dbus - Allow staff to kill ping process - Add additional MLS rules- Allow gdm to edit ~/.gconf dir Resolves: #590677 - Allow dovecot to create directories in /var/lib/dovecot Partially resolves 590224 - Allow avahi to dbus chat with NetworkManager - Fix cobbler labels - Dontaudit iceauth_t leaks - fix /var/lib/lxdm file context - Allow aiccu to use tun tap devices - Dontaudit shutdown using xserver.log- Fixes for sandbox_x_net_t to match access for sandbox_web_t ++ - Add xdm_etc_t for /etc/gdm directory, allow accountsd to manage this directory - Add dontaudit interface for bluetooth dbus - Add chronyd_read_keys, append_keys for initrc_t - Add log support for ksmtuned Resolves: #586663- Allow boinc to send mail- Allow initrc_t to remove dhcpc_state_t - Fix label on sa-update.cron - Allow dhcpc to restart chrony initrc - Don't allow sandbox to send signals to its parent processes - Fix transition from unconfined_t -> unconfined_mount_t -> rpcd_t Resolves: #589136- Fix location of oddjob_mkhomedir Resolves: #587385 - fix labeling on /root/.shosts and ~/.shosts - Allow ipsec_mgmt_t to manage net_conf_t Resolves: #586760- Dontaudit sandbox trying to connect to netlink sockets Resolves: #587609 - Add policy for piranha- Fixups for xguest policy - Fixes for running sandbox firefox- Allow ksmtuned to use terminals Resolves: #586663 - Allow lircd to write to generic usb devices- Allow sandbox_xserver to connectto unconfined stream Resolves: #585171- Allow initrc_t to read slapd_db_t Resolves: #585476 - Allow ipsec_mgmt to use unallocated devpts and to create /etc/resolv.conf Resolves: #585963- Allow rlogind_t to search /root for .rhosts Resolves: #582760 - Fix path for cached_var_t - Fix prelink paths /var/lib/prelink - Allow confined users to direct_dri - Allow mls lvm/cryptosetup to work- Allow virtd_t to manage firewall/iptables config Resolves: #573585- Fix label on /root/.rhosts Resolves: #582760 - Add labels for Picasa - Allow openvpn to read home certs - Allow plymouthd_t to use tty_device_t - Run ncftool as iptables_t - Allow mount to unmount unlabeled_t - Dontaudit hal leaks- Allow livecd to transition to mount- Update to upstream - Allow abrt to delete sosreport Resolves: #579998 - Allow snmp to setuid and gid Resolves: #582155 - Allow smartd to use generic scsi devices Resolves: #582145- Allow ipsec_t to create /etc/resolv.conf with the correct label - Fix reserved port destination - Allow autofs to transition to showmount - Stop crashing tuned- Add telepathysofiasip policy- Update to upstream - Fix label for /opt/google/chrome/chrome-sandbox - Allow modemmanager to dbus with policykit- Fix allow_httpd_mod_auth_pam to use auth_use_pam(httpd_t) - Allow accountsd to read shadow file - Allow apache to send audit messages when using pam - Allow asterisk to bind and connect to sip tcp ports - Fixes for dovecot 2.0 - Allow initrc_t to setattr on milter directories - Add procmail_home_t for .procmailrc file- Fixes for labels during install from livecd- Fix /cgroup file context - Fix broken afs use of unlabled_t - Allow getty to use the console for s390- Fix cgroup handling adding policy for /cgroup - Allow confined users to write to generic usb devices, if user_rw_noexattrfile boolean set- Merge patches from dgrift- Update upstream - Allow abrt to write to the /proc under any process- Fix ~/.fontconfig label - Add /root/.cert label - Allow reading of the fixed_file_disk_t:lnk_file if you can read file - Allow qemu_exec_t as an entrypoint to svirt_t- Update to upstream - Allow tmpreaper to delete sandbox sock files - Allow chrome-sandbox_t to use /dev/zero, and dontaudit getattr file systems - Fixes for gitosis - No transition on livecd to passwd or chfn - Fixes for denyhosts- Add label for /var/lib/upower - Allow logrotate to run sssd - dontaudit readahead on tmpfs blk files - Allow tmpreaper to setattr on sandbox files - Allow confined users to execute dos files - Allow sysadm_t to kill processes running within its clearance - Add accountsd policy - Fixes for corosync policy - Fixes from crontab policy - Allow svirt to manage svirt_image_t chr files - Fixes for qdisk policy - Fixes for sssd policy - Fixes for newrole policy- make libvirt work on an MLS platform- Add qpidd policy- Update to upstream- Allow boinc to read kernel sysctl - Fix snmp port definitions - Allow apache to read anon_inodefs- Allow shutdown dac_override- Add device_t as a file system - Fix sysfs association- Dontaudit ipsec_mgmt sys_ptrace - Allow at to mail its spool files - Allow nsplugin to search in .pulse directory- Update to upstream- Allow users to dbus chat with xdm - Allow users to r/w wireless_device_t - Dontaudit reading of process states by ipsec_mgmt- Fix openoffice from unconfined_t- Add shutdown policy so consolekit can shutdown system- Update to upstream- Update to upstream- Update to upstream - These are merges of my patches - Remove 389 labeling conflicts - Add MLS fixes found in RHEL6 testing - Allow pulseaudio to run as a service - Add label for mssql and allow apache to connect to this database port if boolean set - Dontaudit searches of debugfs mount point - Allow policykit_auth to send signals to itself - Allow modcluster to call getpwnam - Allow swat to signal winbind - Allow usbmux to run as a system role - Allow svirt to create and use devpts- Add MLS fixes found in RHEL6 testing - Allow domains to append to rpm_tmp_t - Add cachefilesfd policy - Dontaudit leaks when transitioning- Change allow_execstack and allow_execmem booleans to on - dontaudit acct using console - Add label for fping - Allow tmpreaper to delete sandbox_file_t - Fix wine dontaudit mmap_zero - Allow abrt to read var_t symlinks- Additional policy for rgmanager- Allow sshd to setattr on pseudo terms- Update to upstream- Allow policykit to send itself signals- Fix duplicate cobbler definition- Fix file context of /var/lib/avahi-autoipd- Merge with upstream- Allow sandbox to work with MLS- Make Chrome work with staff user- Add icecast policy - Cleanup spec file- Add mcelog policy- Lots of fixes found in F12- Fix rpm_dontaudit_leaks- Add getsched to hald_t - Add file context for Fedora/Redhat Directory Server- Allow abrt_helper to getattr on all filesystems - Add label for /opt/real/RealPlayer/plugins/oggfformat\.so- Add gstreamer_home_t for ~/.gstreamer- Update to upstream- Fix git- Turn on puppet policy - Update to dgrift git policy- Move users file to selection by spec file. - Allow vncserver to run as unconfined_u:unconfined_r:unconfined_t- Update to upstream- Remove most of the permissive domains from F12.- Add cobbler policy from dgrift- add usbmon device - Add allow rulse for devicekit_disk- Lots of fixes found in F12, fixes from Tom London- Cleanups from dgrift- Add back xserver_manage_home_fonts- Dontaudit sandbox trying to read nscd and sssd- Update to upstream- Rename udisks-daemon back to devicekit_disk_t policy- Fixes for abrt calls- Add tgtd policy- Update to upstream release- Add asterisk policy back in - Update to upstream release 2.20091117- Update to upstream release 2.20091117- Fixup nut policy- Update to upstream- Allow vpnc request the kernel to load modules- Fix minimum policy installs - Allow udev and rpcbind to request the kernel to load modules- Add plymouth policy - Allow local_login to sys_admin- Allow cupsd_config to read user tmp - Allow snmpd_t to signal itself - Allow sysstat_t to makedir in sysstat_log_t- Update rhcs policy- Allow users to exec restorecond- Allow sendmail to request kernel modules load- Fix all kernel_request_load_module domains- Fix all kernel_request_load_module domains- Remove allow_exec* booleans for confined users. Only available for unconfined_t- More fixes for sandbox_web_t- Allow sshd to create .ssh directory and content- Fix request_module line to module_request- Fix sandbox policy to allow it to run under firefox. - Dont audit leaks.- Fixes for sandbox- Update to upstream - Dontaudit nsplugin search /root - Dontaudit nsplugin sys_nice- Fix label on /usr/bin/notepad, /usr/sbin/vboxadd-service - Remove policycoreutils-python requirement except for minimum- Fix devicekit_disk_t to getattr on all domains sockets and fifo_files - Conflicts seedit (You can not use selinux-policy-targeted and seedit at the same time.)- Add wordpress/wp-content/uploads label - Fixes for sandbox when run from staff_t- Update to upstream - Fixes for devicekit_disk- More fixes- Lots of fixes for initrc and other unconfined domains- Allow xserver to use netlink_kobject_uevent_socket- Fixes for sandbox- Dontaudit setroubleshootfix looking at /root directory- Update to upsteam- Allow gssd to send signals to users - Fix duplicate label for apache content- Update to upstream- Remove polkit_auth on upgrades- Add back in unconfined.pp and unconfineduser.pp - Add Sandbox unshare- Fixes for cdrecord, mdadm, and others- Add capability setting to dhcpc and gpm- Allow cronjobs to read exim_spool_t- Add ABRT policy- Fix system-config-services policy- Allow libvirt to change user componant of virt_domain- Allow cupsd_config_t to be started by dbus - Add smoltclient policy- Add policycoreutils-python to pre install- Make all unconfined_domains permissive so we can see what AVC's happen- Add pt_chown policy- Add kdump policy for Miroslav Grepl - Turn off execstack boolean- Turn on execstack on a temporary basis (#512845)- Allow nsplugin to connecto the session bus - Allow samba_net to write to coolkey data- Allow devicekit_disk to list inotify- Allow svirt images to create sock_file in svirt_var_run_t- Allow exim to getattr on mountpoints - Fixes for pulseaudio- Allow svirt_t to stream_connect to virtd_t- Allod hald_dccm_t to create sock_files in /tmp- More fixes from upstream- Fix polkit label - Remove hidebrokensymptoms for nss_ldap fix - Add modemmanager policy - Lots of merges from upstream - Begin removing textrel_shlib_t labels, from fixed libraries- Update to upstream- Allow certmaster to override dac permissions- Update to upstream- Fix context for VirtualBox- Update to upstream- Allow clamscan read amavis spool files- Fixes for xguest- fix multiple directory ownership of mandirs- Update to upstream- Add rules for rtkit-daemon- Update to upstream - Fix nlscd_stream_connect- Add rtkit policy- Allow rpcd_t to stream connect to rpcbind- Allow kpropd to create tmp files- Fix last duplicate /var/log/rpmpkgs- Update to upstream * add sssd- Update to upstream * cleanup- Update to upstream - Additional mail ports - Add virt_use_usb boolean for svirt- Fix mcs rules to include chr_file and blk_file- Add label for udev-acl- Additional rules for consolekit/udev, privoxy and various other fixes- New version for upstream- Allow NetworkManager to read inotifyfs- Allow setroubleshoot to run mlocate- Update to upstream- Add fish as a shell - Allow fprintd to list usbfs_t - Allow consolekit to search mountpoints - Add proper labeling for shorewall- New log file for vmware - Allow xdm to setattr on user_tmp_t- Upgrade to upstream- Allow fprintd to access sys_ptrace - Add sandbox policy- Add varnishd policy- Fixes for kpropd- Allow brctl to r/w tun_tap_device_t- Add /usr/share/selinux/packages- Allow rpcd_t to send signals to kernel threads- Fix upgrade for F10 to F11- Add policy for /var/lib/fprint-Remove duplicate line- Allow svirt to manage pci and other sysfs device data- Fix package selection handling- Fix /sbin/ip6tables-save context - Allod udev to transition to mount - Fix loading of mls policy file- Add shorewall policy- Additional rules for fprintd and sssd- Allow nsplugin to unix_read unix_write sem for unconfined_java- Fix uml files to be owned by users- Fix Upgrade path to install unconfineduser.pp when unocnfined package is 3.0.0 or less- Allow confined users to manage virt_content_t, since this is home dir content - Allow all domains to read rpm_script_tmp_t which is what shell creates on redirection- Fix labeling on /var/lib/misc/prelink* - Allow xserver to rw_shm_perms with all x_clients - Allow prelink to execute files in the users home directory- Allow initrc_t to delete dev_null - Allow readahead to configure auditing - Fix milter policy - Add /var/lib/readahead- Update to latest milter code from Paul Howarth- Additional perms for readahead- Allow pulseaudio to acquire_svc on session bus - Fix readahead labeling- Allow sysadm_t to run rpm directly - libvirt needs fowner- Allow sshd to read var_lib symlinks for freenx- Allow nsplugin unix_read and write on users shm and sem - Allow sysadm_t to execute su- Dontaudit attempts to getattr user_tmpfs_t by lvm - Allow nfs to share removable media- Add ability to run postdrop from confined users- Fixes for podsleuth- Turn off nsplugin transition - Remove Konsole leaked file descriptors for release- Allow cupsd_t to create link files in print_spool_t - Fix iscsi_stream_connect typo - Fix labeling on /etc/acpi/actions - Don't reinstall unconfine and unconfineuser on upgrade if they are not installed- Allow audioentroy to read etc files- Add fail2ban_var_lib_t - Fixes for devicekit_power_t- Separate out the ucnonfined user from the unconfined.pp package- Make sure unconfined_java_t and unconfined_mono_t create user_tmpfs_t.- Upgrade to latest upstream - Allow devicekit_disk sys_rawio- Dontaudit binds to ports < 1024 for named - Upgrade to latest upstream- Allow podsleuth to use tmpfs files- Add customizable_types for svirt- Allow setroubelshoot exec* privs to prevent crash from bad libraries - add cpufreqselector- Dontaudit listing of /root directory for cron system jobs- Fix missing ld.so.cache label- Add label for ~/.forward and /root/.forward- Fixes for svirt- Fixes to allow svirt read iso files in homedir- Add xenner and wine fixes from mgrepl- Allow mdadm to read/write mls override- Change to svirt to only access svirt_image_t- Fix libvirt policy- Upgrade to latest upstream- Fixes for iscsid and sssd - More cleanups for upgrade from F10 to Rawhide.- Add pulseaudio, sssd policy - Allow networkmanager to exec udevadm- Add pulseaudio context- Upgrade to latest patches- Fixes for libvirt- Update to Latest upstream- Fix setrans.conf to show SystemLow for s0- Further confinement of qemu images via svirt- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Allow NetworkManager to manage /etc/NetworkManager/system-connections- add virtual_image_context and virtual_domain_context files- Allow rpcd_t to send signal to mount_t - Allow libvirtd to run ranged- Fix sysnet/net_conf_t- Fix squidGuard labeling- Re-add corenet_in_generic_if(unlabeled_t)* Tue Feb 10 2009 Dan Walsh 3.6.5-2 - Add git web policy- Add setrans contains from upstream- Do transitions outside of the booleans- Allow xdm to create user_tmp_t sockets for switch user to work- Fix staff_t domain- Grab remainder of network_peer_controls patch- More fixes for devicekit- Upgrade to latest upstream- Add boolean to disallow unconfined_t login- Add back transition from xguest to mozilla- Add virt_content_ro_t and labeling for isos directory- Fixes for wicd daemon- More mls/rpm fixes- Add policy to make dbus/nm-applet work- Remove polgen-ifgen from post and add trigger to policycoreutils-python- Add wm policy - Make mls work in graphics mode- Fixed for DeviceKit- Add devicekit policy- Update to upstream- Define openoffice as an x_domain- Fixes for reading xserver_tmp_t- Allow cups_pdf_t write to nfs_t- Remove audio_entropy policy- Update to upstream- Allow hal_acl_t to getattr/setattr fixed_disk- Change userdom_read_all_users_state to include reading symbolic links in /proc- Fix dbus reading /proc information- Add missing alias for home directory content- Fixes for IBM java location- Allow unconfined_r unconfined_java_t- Add cron_role back to user domains- Fix sudo setting of user keys- Allow iptables to talk to terminals - Fixes for policy kit - lots of fixes for booting.- Cleanup policy- Rebuild for Python 2.6- Fix labeling on /var/spool/rsyslog- Allow postgresl to bind to udp nodes- Allow lvm to dbus chat with hal - Allow rlogind to read nfs_t- Fix cyphesis file context- Allow hal/pm-utils to look at /var/run/video.rom - Add ulogd policy- Additional fixes for cyphesis - Fix certmaster file context - Add policy for system-config-samba - Allow hal to read /var/run/video.rom- Allow dhcpc to restart ypbind - Fixup labeling in /var/run- Add certmaster policy- Fix confined users - Allow xguest to read/write xguest_dbusd_t- Allow openoffice execstack/execmem privs- Allow mozilla to run with unconfined_execmem_t- Dontaudit domains trying to write to .xsession-errors- Allow nsplugin to look at autofs_t directory- Allow kerneloops to create tmp files- More alias for fastcgi- Remove mod_fcgid-selinux package- Fix dovecot access- Policy cleanup- Remove Multiple spec - Add include - Fix makefile to not call per_role_expansion- Fix labeling of libGL- Update to upstream- Update to upstream policy- Fixes for confined xwindows and xdm_t- Allow confined users and xdm to exec wm - Allow nsplugin to talk to fifo files on nfs- Allow NetworkManager to transition to avahi and iptables - Allow domains to search other domains keys, coverup kernel bug- Fix labeling for oracle- Allow nsplugin to comminicate with xdm_tmp_t sock_file- Change all user tmpfs_t files to be labeled user_tmpfs_t - Allow radiusd to create sock_files- Upgrade to upstream- Allow confined users to login with dbus- Fix transition to nsplugin- Add file context for /dev/mspblk.*- Fix transition to nsplugin '- Fix labeling on new pm*log - Allow ssh to bind to all nodes- Merge upstream changes - Add Xavier Toth patches- Add qemu_cache_t for /var/cache/libvirt- Remove gamin policy- Add tinyxs-max file system support- Update to upstream - New handling of init scripts- Allow pcsd to dbus - Add memcache policy- Allow audit dispatcher to kill his children- Update to upstream - Fix crontab use by unconfined user- Allow ifconfig_t to read dhcpc_state_t- Update to upstream- Update to upstream- Allow system-config-selinux to work with policykit- Fix novel labeling- Consolodate pyzor,spamassassin, razor into one security domain - Fix xdm requiring additional perms.- Fixes for logrotate, alsa- Eliminate vbetool duplicate entry- Fix xguest -> xguest_mozilla_t -> xguest_openiffice_t - Change dhclient to be able to red networkmanager_var_run- Update to latest refpolicy - Fix libsemanage initial install bug- Add inotify support to nscd- Allow unconfined_t to setfcap- Allow amanda to read tape - Allow prewikka cgi to use syslog, allow audisp_t to signal cgi - Add support for netware file systems- Allow ypbind apps to net_bind_service- Allow all system domains and application domains to append to any log file- Allow gdm to read rpm database - Allow nsplugin to read mplayer config files- Allow vpnc to run ifconfig- Allow confined users to use postgres - Allow system_mail_t to exec other mail clients - Label mogrel_rails as an apache server- Apply unconfined_execmem_exec_t to haskell programs- Fix prelude file context- allow hplip to talk dbus - Fix context on ~/.local dir- Prevent applications from reading x_device- Add /var/lib/selinux context- Update to upstream- Add livecd policy- Dontaudit search of admin_home for init_system_domain - Rewrite of xace interfaces - Lots of new fs_list_inotify - Allow livecd to transition to setfiles_mac- Begin XAce integration- Merge Upstream- Allow amanada to create data files- Fix initial install, semanage setup- Allow system_r for httpd_unconfined_script_t- Remove dmesg boolean - Allow user domains to read/write game data- Change unconfined_t to transition to unconfined_mono_t when running mono - Change XXX_mono_t to transition to XXX_t when executing bin_t files, so gnome-do will work- Remove old booleans from targeted-booleans.conf file- Add boolean to mmap_zero - allow tor setgid - Allow gnomeclock to set clock- Don't run crontab from unconfined_t- Change etc files to config files to allow users to read them- Lots of fixes for confined domains on NFS_t homedir- dontaudit mrtg reading /proc - Allow iscsi to signal itself - Allow gnomeclock sys_ptrace- Allow dhcpd to read kernel network state- Label /var/run/gdm correctly - Fix unconfined_u user creation- Allow transition from initrc_t to getty_t- Allow passwd to communicate with user sockets to change gnome-keyring- Fix initial install- Allow radvd to use fifo_file - dontaudit setfiles reading links - allow semanage sys_resource - add allow_httpd_mod_auth_ntlm_winbind boolean - Allow privhome apps including dovecot read on nfs and cifs home dirs if the boolean is set- Allow nsplugin to read /etc/mozpluggerrc, user_fonts - Allow syslog to manage innd logs. - Allow procmail to ioctl spamd_exec_t- Allow initrc_t to dbus chat with consolekit.- Additional access for nsplugin - Allow xdm setcap/getcap until pulseaudio is fixed- Allow mount to mkdir on tmpfs - Allow ifconfig to search debugfs- Fix file context for MATLAB - Fixes for xace- Allow stunnel to transition to inetd children domains - Make unconfined_dbusd_t an unconfined domain- Fixes for qemu/virtd- Fix bug in mozilla policy to allow xguest transition - This will fix the libsemanage.dbase_llist_query: could not find record value libsemanage.dbase_llist_query: could not query record value (No such file or directory) bug in xguest- Allow nsplugin to run acroread- Add cups_pdf policy - Add openoffice policy to run in xguest- prewika needs to contact mysql - Allow syslog to read system_map files- Change init_t to an unconfined_domain- Allow init to transition to initrc_t on shell exec. - Fix init to be able to sendto init_t. - Allow syslog to connect to mysql - Allow lvm to manage its own fifo_files - Allow bugzilla to use ldap - More mls fixes- fixes for init policy (#436988) - fix build- Additional changes for MLS policy- Fix initrc_context generation for MLS- Fixes for libvirt- Allow bitlebee to read locale_t- More xselinux rules- Change httpd_$1_script_r*_t to httpd_$1_content_r*_t- Prepare policy for beta release - Change some of the system domains back to unconfined - Turn on some of the booleans- Allow nsplugin_config execstack/execmem - Allow nsplugin_t to read alsa config - Change apache to use user content- Add cyphesis policy- Fix Makefile.devel to build mls modules - Fix qemu to be more specific on labeling- Update to upstream fixes- Allow staff to mounton user_home_t- Add xace support- Add fusectl file system- Fixes from yum-cron - Update to latest upstream- Fix userdom_list_user_files- Merge with upstream- Allow udev to send audit messages- Add additional login users interfaces - userdom_admin_login_user_template(staff)- More fixes for polkit- Eliminate transition from unconfined_t to qemu by default - Fixes for gpg- Update to upstream- Fixes for staff_t- Add policy for kerneloops - Add policy for gnomeclock- Fixes for libvirt- Fixes for nsplugin- More fixes for qemu- Additional ports for vnc and allow qemu and libvirt to search all directories- Update to upstream - Add libvirt policy - add qemu policy- Allow fail2ban to create a socket in /var/run- Allow allow_httpd_mod_auth_pam to work- Add audisp policy and prelude- Allow all user roles to executae samba net command- Allow usertypes to read/write noxattr file systems- Fix nsplugin to allow flashplugin to work in enforcing mode- Allow pam_selinux_permit to kill all processes- Allow ptrace or user processes by users of same type - Add boolean for transition to nsplugin- Allow nsplugin sys_nice, getsched, setsched- Allow login programs to talk dbus to oddjob- Add procmail_log support - Lots of fixes for munin- Allow setroubleshoot to read policy config and send audit messages- Allow users to execute all files in homedir, if boolean set - Allow mount to read samba config- Fixes for xguest to run java plugin- dontaudit pam_t and dbusd writing to user_home_t- Update gpg to allow reading of inotify- Change user and staff roles to work correctly with varied perms- Fix munin log, - Eliminate duplicate mozilla file context - fix wpa_supplicant spec- Fix role transition from unconfined_r to system_r when running rpm - Allow unconfined_domains to communicate with user dbus instances- Fixes for xguest- Let all uncofined domains communicate with dbus unconfined- Run rpm in system_r- Zero out customizable types- Fix definiton of admin_home_t- Fix munin file context- Allow cron to run unconfined apps- Modify default login to unconfined_u- Dontaudit dbus user client search of /root- Update to upstream- Fixes for polkit - Allow xserver to ptrace- Add polkit policy - Symplify userdom context, remove automatic per_role changes- Update to upstream - Allow httpd_sys_script_t to search users homedirs- Allow rpm_script to transition to unconfined_execmem_t- Remove user based home directory separation- Remove user specific crond_t- Merge with upstream - Allow xsever to read hwdata_t - Allow login programs to setkeycreate- Update to upstream- Update to upstream- Allow XServer to read /proc/self/cmdline - Fix unconfined cron jobs - Allow fetchmail to transition to procmail - Fixes for hald_mac - Allow system_mail to transition to exim - Allow tftpd to upload files - Allow xdm to manage unconfined_tmp - Allow udef to read alsa config - Fix xguest to be able to connect to sound port- Fixes for hald_mac - Treat unconfined_home_dir_t as a home dir - dontaudit rhgb writes to fonts and root- Fix dnsmasq - Allow rshd full login privs- Allow rshd to connect to ports > 1023- Fix vpn to bind to port 4500 - Allow ssh to create shm - Add Kismet policy- Allow rpm to chat with networkmanager- Fixes for ipsec and exim mail - Change default to unconfined user- Pass the UNK_PERMS param to makefile - Fix gdm location- Make alsa work- Fixes for consolekit and startx sessions- Dontaudit consoletype talking to unconfined_t- Remove homedir_template- Check asound.state- Fix exim policy- Allow tmpreadper to read man_t - Allow racoon to bind to all nodes - Fixes for finger print reader- Allow xdm to talk to input device (fingerprint reader) - Allow octave to run as java- Allow login programs to set ioctl on /proc- Allow nsswitch apps to read samba_var_t- Fix maxima- Eliminate rpm_t:fifo_file avcs - Fix dbus path for helper app- Fix service start stop terminal avc's- Allow also to search var_lib - New context for dbus launcher- Allow cupsd_config_t to read/write usb_device_t - Support for finger print reader, - Many fixes for clvmd - dbus starting networkmanager- Fix java and mono to run in xguest account- Fix to add xguest account when inititial install - Allow mono, java, wine to run in userdomains- Allow xserver to search devpts_t - Dontaudit ldconfig output to homedir- Remove hplip_etc_t change back to etc_t.- Allow cron to search nfs and samba homedirs- Allow NetworkManager to dbus chat with yum-updated- Allow xfs to bind to port 7100- Allow newalias/sendmail dac_override - Allow bind to bind to all udp ports- Turn off direct transition- Allow wine to run in system role- Fix java labeling- Define user_home_type as home_type- Allow sendmail to create etc_aliases_t- Allow login programs to read symlinks on homedirs- Update an readd modules- Cleanup spec file- Allow xserver to be started by unconfined process and talk to tty- Upgrade to upstream to grab postgressql changes- Add setransd for mls policy- Add ldconfig_cache_t- Allow sshd to write to proc_t for afs login- Allow xserver access to urand- allow dovecot to search mountpoints- Fix Makefile for building policy modules- Fix dhcpc startup of service- Fix dbus chat to not happen for xguest and guest users- Fix nagios cgi - allow squid to communicate with winbind- Fixes for ldconfig- Update from upstream- Add nasd support- Fix new usb devices and dmfm- Eliminate mount_ntfs_t policy, merge into mount_t- Allow xserver to write to ramfs mounted by rhgb- Add context for dbus machine id- Update with latest changes from upstream- Fix prelink to handle execmod- Add ntpd_key_t to handle secret data- Add anon_inodefs - Allow unpriv user exec pam_exec_t - Fix trigger- Allow cups to use generic usb - fix inetd to be able to run random apps (git)- Add proper contexts for rsyslogd- Fixes for xguest policy- Allow execution of gconf- Fix moilscanner update problem- Begin adding policy to separate setsebool from semanage - Fix xserver.if definition to not break sepolgen.if- Add new devices- Add brctl policy- Fix root login to include system_r- Allow prelink to read kernel sysctls- Default to user_u:system_r:unconfined_t- fix squid - Fix rpm running as uid- Fix syslog declaration- Allow avahi to access inotify - Remove a lot of bogus security_t:filesystem avcs- Remove ifdef strict policy from upstream- Remove ifdef strict to allow user_u to login- Fix for amands - Allow semanage to read pp files - Allow rhgb to read xdm_xserver_tmp- Allow kerberos servers to use ldap for backing store- allow alsactl to read kernel state- More fixes for alsactl - Transition from hal and modutils - Fixes for suspend resume. - insmod domtrans to alsactl - insmod writes to hal log- Allow unconfined_t to transition to NetworkManager_t - Fix netlabel policy- Update to latest from upstream- Update to latest from upstream- Update to latest from upstream- Allow pcscd_t to send itself signals- Fixes for unix_update - Fix logwatch to be able to search all dirs- Upstream bumped the version- Allow consolekit to syslog - Allow ntfs to work with hal- Allow iptables to read etc_runtime_t- MLS Fixes- Fix path of /etc/lvm/cache directory - Fixes for alsactl and pppd_t - Fixes for consolekit- Allow insmod_t to mount kvmfs_t filesystems- Rwho policy - Fixes for consolekit- fixes for fusefs- Fix samba_net to allow it to view samba_var_t- Update to upstream- Fix Sonypic backlight - Allow snmp to look at squid_conf_t- Fixes for pyzor, cyrus, consoletype on everything installs- Fix hald_acl_t to be able to getattr/setattr on usb devices - Dontaudit write to unconfined_pipes for load_policy- Allow bluetooth to read inotifyfs- Fixes for samba domain controller. - Allow ConsoleKit to look at ttys- Fix interface call- Allow syslog-ng to read /var - Allow locate to getattr on all filesystems - nscd needs setcap- Update to upstream- Allow samba to run groupadd- Update to upstream- Allow mdadm to access generic scsi devices- Fix labeling on udev.tbl dirs- Fixes for logwatch- Add fusermount and mount_ntfs policy- Update to upstream - Allow saslauthd to use kerberos keytabs- Fixes for samba_var_t- Allow networkmanager to setpgid - Fixes for hal_acl_t- Remove disable_trans booleans - hald_acl_t needs to talk to nscd- Fix prelink to be able to manage usr dirs.- Allow insmod to launch init scripts- Remove setsebool policy- Fix handling of unlabled_t packets- More of my patches from upstream- Update to latest from upstream - Add fail2ban policy- Update to remove security_t:filesystem getattr problems- Policy for consolekit- Update to latest from upstream- Revert Nemiver change - Set sudo as a corecmd so prelink will work, remove sudoedit mapping, since this will not work, it does not transition. - Allow samba to execute useradd- Upgrade to the latest from upstream- Add sepolgen support - Add bugzilla policy- Fix file context for nemiver- Remove include sym link- Allow mozilla, evolution and thunderbird to read dev_random. Resolves: #227002 - Allow spamd to connect to smtp port Resolves: #227184 - Fixes to make ypxfr work Resolves: #227237- Fix ssh_agent to be marked as an executable - Allow Hal to rw sound device- Fix spamassisin so crond can update spam files - Fixes to allow kpasswd to work - Fixes for bluetooth- Remove some targeted diffs in file context file- Fix squid cachemgr labeling- Add ability to generate webadm_t policy - Lots of new interfaces for httpd - Allow sshd to login as unconfined_t- Continue fixing, additional user domains- Begin adding user confinement to targeted policy- Fixes for prelink, ktalkd, netlabel- Allow prelink when run from rpm to create tmp files Resolves: #221865 - Remove file_context for exportfs Resolves: #221181 - Allow spamassassin to create ~/.spamassissin Resolves: #203290 - Allow ssh access to the krb tickets - Allow sshd to change passwd - Stop newrole -l from working on non securetty Resolves: #200110 - Fixes to run prelink in MLS machine Resolves: #221233 - Allow spamassassin to read var_lib_t dir Resolves: #219234- fix mplayer to work under strict policy - Allow iptables to use nscd Resolves: #220794- Add gconf policy and make it work with strict- Many fixes for strict policy and by extension mls.- Fix to allow ftp to bind to ports > 1024 Resolves: #219349- Allow semanage to exec it self. Label genhomedircon as semanage_exec_t Resolves: #219421 - Allow sysadm_lpr_t to manage other print spool jobs Resolves: #220080- allow automount to setgid Resolves: #219999- Allow cron to polyinstatiate - Fix creation of boot flags Resolves: #207433- Fixes for irqbalance Resolves: #219606- Fix vixie-cron to work on mls Resolves: #207433Resolves: #218978- Allow initrc to create files in /var directories Resolves: #219227- More fixes for MLS Resolves: #181566- More Fixes polyinstatiation Resolves: #216184- More Fixes polyinstatiation - Fix handling of keyrings Resolves: #216184- Fix polyinstatiation - Fix pcscd handling of terminal Resolves: #218149 Resolves: #218350- More fixes for quota Resolves: #212957- ncsd needs to use avahi sockets Resolves: #217640 Resolves: #218014- Allow login programs to polyinstatiate homedirs Resolves: #216184 - Allow quotacheck to create database files Resolves: #212957- Dontaudit appending hal_var_lib files Resolves: #217452 Resolves: #217571 Resolves: #217611 Resolves: #217640 Resolves: #217725- Fix context for helix players file_context #216942- Fix load_policy to be able to mls_write_down so it can talk to the terminal- Fixes for hwclock, clamav, ftp- Move to upstream version which accepted my patches- Fixes for nvidia driver- Allow semanage to signal mcstrans- Update to upstream- Allow modstorage to edit /etc/fstab file- Fix for qemu, /dev/- Fix path to realplayer.bin- Allow xen to connect to xen port- Allow cups to search samba_etc_t directory - Allow xend_t to list auto_mountpoints- Allow xen to search automount- Fix spec of jre files- Fix unconfined access to shadow file- Allow xend to create files in xen_image_t directories- Fixes for /var/lib/hal- Remove ability for sysadm_t to look at audit.log- Fix rpc_port_types - Add aide policy for mls- Merge with upstream- Lots of fixes for ricci- Allow xen to read/write fixed devices with a boolean - Allow apache to search /var/log- Fix policygentool specfile problem. - Allow apache to send signals to it's logging helpers. - Resolves: rhbz#212731- Add perms for swat- Add perms for swat- Allow daemons to dump core files to /- Fixes for ricci- Allow mount.nfs to work- Allow ricci-modstorage to look at lvm_etc_t- Fixes for ricci using saslauthd- Allow mountpoint on home_dir_t and home_t- Update xen to read nfs files- Allow noxattrfs to associate with other noxattrfs- Allow hal to use power_device_t- Allow procemail to look at autofs_t - Allow xen_image_t to work as a fixed device- Refupdate from upstream- Add lots of fixes for mls cups- Lots of fixes for ricci- Fix number of cats- Update to upstream- More iSCSI changes for #209854- Test ISCSI fixes for #209854- allow semodule to rmdir selinux_config_t dir- Fix boot_runtime_t problem on ppc. Should not be creating these files.- Fix context mounts on reboot - Fix ccs creation of directory in /var/log- Update for tallylog- Allow xend to rewrite dhcp conf files - Allow mgetty sys_admin capability- Make xentapctrl work- Don't transition unconfined_t to bootloader_t - Fix label in /dev/xen/blktap- Patch for labeled networking- Fix crond handling for mls- Update to upstream- Remove bluetooth-helper transition - Add selinux_validate for semanage - Require new version of libsemanage- Fix prelink- Fix rhgb- Fix setrans handling on MLS and useradd- Support for fuse - fix vigr- Fix dovecot, amanda - Fix mls- Allow java execheap for itanium- Update with upstream- mls fixes- Update from upstream- More fixes for mls - Revert change on automount transition to mount- Fix cron jobs to run under the correct context- Fixes to make pppd work- Multiple policy fixes - Change max categories to 1023- Fix transition on mcstransd- Add /dev/em8300 defs- Upgrade to upstream- Fix ppp connections from network manager- Add tty access to all domains boolean - Fix gnome-pty-helper context for ia64- Fixed typealias of firstboot_rw_t- Fix location of xel log files - Fix handling of sysadm_r -> rpm_exec_t- Fixes for autofs, lp- Update from upstream- Fixup for test6- Update to upstream- Update to upstream- Fix suspend to disk problems- Lots of fixes for restarting daemons at the console.- Fix audit line - Fix requires line- Upgrade to upstream- Fix install problems- Allow setroubleshoot to getattr on all dirs to gather RPM data- Set /usr/lib/ia32el/ia32x_loader to unconfined_execmem_exec_t for ia32 platform - Fix spec for /dev/adsp- Fix xen tty devices- Fixes for setroubleshoot- Update to upstream- Fixes for stunnel and postgresql - Update from upstream- Update from upstream - More java fixes- Change allow_execstack to default to on, for RHEL5 Beta. This is required because of a Java compiler problem. Hope to turn off for next beta- Misc fixes- More fixes for strict policy- Quiet down anaconda audit messages- Fix setroubleshootd- Update to the latest from upstream- More fixes for xen- Fix anaconda transitions- yet more xen rules- more xen rules- Fixes for Samba- Fixes for xen- Allow setroubleshootd to send mail- Add nagios policy- fixes for setroubleshoot- Added Paul Howarth patch to only load policy packages shipped with this package - Allow pidof from initrc to ptrace higher level domains - Allow firstboot to communicate with hal via dbus- Add policy for /var/run/ldapi- Fix setroubleshoot policy- Fixes for mls use of ssh - named has a new conf file- Fixes to make setroubleshoot work- Cups needs to be able to read domain state off of printer client- add boolean to allow zebra to write config files- setroubleshootd fixes- Allow prelink to read bin_t symlink - allow xfs to read random devices - Change gfs to support xattr- Remove spamassassin_can_network boolean- Update to upstream - Fix lpr domain for mls- Add setroubleshoot policy- Turn off auditallow on setting booleans- Multiple fixes- Update to upstream- Update to upstream - Add new class for kernel key ring- Update to upstream- Update to upstream- Break out selinux-devel package- Add ibmasmfs- Fix policygentool gen_requires- Update from Upstream- Fix spec of realplay- Update to upstream- Fix semanage- Allow useradd to create_home_dir in MLS environment- Update from upstream- Update from upstream- Add oprofilefs- Fix for hplip and Picasus- Update to upstream- Update to upstream- fixes for spamd- fixes for java, openldap and webalizer- Xen fixes- Upgrade to upstream- allow hal to read boot_t files - Upgrade to upstream- allow hal to read boot_t files- Update from upstream- Fixes for amavis- Update from upstream- Allow auditctl to search all directories- Add acquire service for mono.- Turn off allow_execmem boolean - Allow ftp dac_override when allowed to access users homedirs- Clean up spec file - Transition from unconfined_t to prelink_t- Allow execution of cvs command- Update to upstream- Update to upstream- Fix libjvm spec- Update to upstream- Add xm policy - Fix policygentool- Update to upstream - Fix postun to only disable selinux on full removal of the packages- Allow mono to chat with unconfined- Allow procmail to sendmail - Allow nfs to share dosfs- Update to latest from upstream - Allow selinux-policy to be removed and kernel not to crash- Update to latest from upstream - Add James Antill patch for xen - Many fixes for pegasus- Add unconfined_mount_t - Allow privoxy to connect to httpd_cache - fix cups labeleing on /var/cache/cups- Update to latest from upstream- Update to latest from upstream - Allow mono and unconfined to talk to initrc_t dbus objects- Change libraries.fc to stop shlib_t form overriding texrel_shlib_t- Fix samba creating dirs in homedir - Fix NFS so its booleans would work- Allow secadm_t ability to relabel all files - Allow ftp to search xferlog_t directories - Allow mysql to communicate with ldap - Allow rsync to bind to rsync_port_t- Fixed mailman with Postfix #183928 - Allowed semanage to create file_context files. - Allowed amanda_t to access inetd_t TCP sockets and allowed amanda_recover_t to bind to reserved ports. #149030 - Don't allow devpts_t to be associated with tmp_t. - Allow hald_t to stat all mountpoints. - Added boolean samba_share_nfs to allow smbd_t full access to NFS mounts. - Make mount run in mount_t domain from unconfined_t to prevent mislabeling of /etc/mtab. - Changed the file_contexts to not have a regex before the first ^/[a-z]/ whenever possible, makes restorecon slightly faster. - Correct the label of /etc/named.caching-nameserver.conf - Now label /usr/src/kernels/.+/lib(/.*)? as usr_t instead of /usr/src(/.*)?/lib(/.*)? - I don't think we need anything else under /usr/src hit by this. - Granted xen access to /boot, allowed mounting on xend_var_lib_t, and allowed xenstored_t rw access to the xen device node.- More textrel_shlib_t file path fixes - Add ada support- Get auditctl working in MLS policy- Add mono dbus support - Lots of file_context fixes for textrel_shlib_t in FC5 - Turn off execmem auditallow since they are filling log files- Update to upstream- Allow automount and dbus to read cert files- Fix ftp policy - Fix secadm running of auditctl- Update to upstream- Update to upstream- Fix policyhelp- Fix pam_console handling of usb_device - dontaudit logwatch reading /mnt dir- Update to upstream- Get transition rules to create policy.20 at SystemHigh- Allow secadmin to shutdown system - Allow sendmail to exec newalias- MLS Fixes dmidecode needs mls_file_read_up - add ypxfr_t - run init needs access to nscd - udev needs setuid - another xen log file - Dontaudit mount getattr proc_kcore_t- fix buildroot usage (#185391)- Get rid of mount/fsdisk scan of /dev messages - Additional fixes for suspend/resume- Fake make to rebuild enableaudit.pp- Get xen networking running.- Fixes for Xen - enableaudit should not be the same as base.pp - Allow ps to work for all process- more xen policy fixups- more xen fixage (#184393)- Fix blkid specification - Allow postfix to execute mailman_que- Blkid changes - Allow udev access to usb_device_t - Fix post script to create targeted policy config file- Allow lvm tools to create drevice dir- Add Xen support- Fixes for cups - Make cryptosetup work with hal- Load Policy needs translock- Fix cups html interface- Add hal changes suggested by Jeremy - add policyhelp to point at policy html pages- Additional fixes for nvidia and cups- Update to upstream - Merged my latest fixes - Fix cups policy to handle unix domain sockets- NSCD socket is in nscd_var_run_t needs to be able to search dir- Fixes Apache interface file- Fixes for new version of cups- Turn off polyinstatiate util after FC5- Fix problem with privoxy talking to Tor- Turn on polyinstatiation- Don't transition from unconfined_t to fsadm_t- Fix policy update model.- Update to upstream- Fix load_policy to work on MLS - Fix cron_rw_system_pipes for postfix_postdrop_t - Allow audotmount to run showmount- Fix swapon - allow httpd_sys_script_t to be entered via a shell - Allow httpd_sys_script_t to read eventpolfs- Update from upstream- allow cron to read apache files- Fix vpnc policy to work from NetworkManager- Update to upstream - Fix semoudle polcy- Update to upstream - fix sysconfig/selinux link- Add router port for zebra - Add imaze port for spamd - Fixes for amanda and java- Fix bluetooth handling of usb devices - Fix spamd reading of ~/ - fix nvidia spec- Update to upsteam- Add users_extra files- Update to upstream- Add semodule policy- Update from upstream- Fix for spamd to use razor port- Fixes for mcs - Turn on mount and fsadm for unconfined_t- Fixes for the -devel package- Fix for spamd to use ldap- Update to upstream- Update to upstream - Fix rhgb, and other Xorg startups- Update to upstream- Separate out role of secadm for mls- Add inotifyfs handling- Update to upstream - Put back in changes for pup/zen- Many changes for MLS - Turn on strict policy- Update to upstream- Update to upstream - Fixes for booting and logging in on MLS machine- Update to upstream - Turn off execheap execstack for unconfined users - Add mono/wine policy to allow execheap and execstack for them - Add execheap for Xdm policy- Update to upstream - Fixes to fetchmail,- Update to upstream- Fix for procmail/spamassasin - Update to upstream - Add rules to allow rpcd to work with unlabeled_networks.- Update to upstream - Fix ftp Man page- Update to upstream- fix pup transitions (#177262) - fix xen disks (#177599)- Update to upstream- More Fixes for hal and readahead- Fixes for hal and readahead- Update to upstream - Apply- Add wine and fix hal problems- Handle new location of hal scripts- Allow su to read /etc/mtab- Update to upstream- Fix "libsemanage.parse_module_headers: Data did not represent a module." problem- Allow load_policy to read /etc/mtab- Fix dovecot to allow dovecot_auth to look at /tmp- Allow restorecon to read unlabeled_t directories in order to fix labeling.- Add Logwatch policy- Fix /dev/ub[a-z] file context- Fix library specification - Give kudzu execmem privs- Fix hostname in targeted policy- Fix passwd command on mls- Lots of fixes to make mls policy work- Add dri libs to textrel_shlib_t - Add system_r role for java - Add unconfined_exec_t for vncserver - Allow slapd to use kerberos- Add man pages- Add enableaudit.pp- Fix mls policy- Update mls file from old version- Add sids back in - Rebuild with update checkpolicy- Fixes to allow automount to use portmap - Fixes to start kernel in s0-s15:c0.c255- Add java unconfined/execmem policy- Add file context for /var/cvs - Dontaudit webalizer search of homedir- Update from upstream- Clean up spec - range_transition crond to SystemHigh- Fixes for hal - Update to upstream- Turn back on execmem since we need it for java, firefox, ooffice - Allow gpm to stream socket to itself- fix requirements to be on the actual packages so that policy can get created properly at install time- Allow unconfined_t to execmod texrel_shlib_t- Update to upstream - Turn off allow_execmem and allow_execmod booleans - Add tcpd and automount policies- Add two new httpd booleans, turned off by default * httpd_can_network_relay * httpd_can_network_connect_db- Add ghost for policy.20- Update to upstream - Turn off boolean allow_execstack- Change setrans-mls to use new libsetrans - Add default_context rule for xdm- Change Requires to PreReg for requiring of policycoreutils on install- New upstream releaseAdd xdm policyUpdate from upstreamUpdate from upstreamUpdate from upstream- Also trigger to rebuild policy for versions up to 2.0.7.- No longer installing policy.20 file, anaconda handles the building of the app.- Fixes for dovecot and saslauthd- Cleanup pegasus and named - Fix spec file - Fix up passwd changing applications-Update to latest from upstream- Add rules for pegasus and avahi- Start building MLS Policy- Update to upstream- Turn on bash- Initial version/bin/sh/bin/shselinux-policy-targeted-sourcesmod_fcgid-selinuxcachefilesd-selinux  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~3.13.1-268.el7_9.23.13.1-268.el7_9.23.13.1-268.el7_9.2 23.13.1-268.el7_9.20.10-1      !!!"""###$$$%%%&&&'''((()))***+++,,,---...///000111222333444555666777888999:::;;;<<<===>>>???@@@AAABBBCCCDDDEEEFFFGGGHHHIIIJJJKKKLLLMMMNNNOOOPPPQQQRRRSSSTTTUUUVVVWWWXXXYYYZZZ[[[\\\]]]^^^___```aaabbbcccdddeeefffggghhhiiijjjkkklllmmmnnnooopppqqqrrrssstttuuuvvvwwwxxxyyyzzz{{{|||}}}~~~                  !!!"""###$$$%%%&&&'''((()))***+++,,,---...///000111222333444555666777888999:::;;;<<<===>>>???@@@AAABBBCCCDDDEEEFFFGGGHHHIIIJJJKKKLLLMMMNNNOOOPPPQQQRRRSSSTTTUUUVVVWWWXXXYYYZZZ[[[\\\]]]^^^___```aaabbbcccdddeeefffggghhhiiijjjkkklllmmmnnnooopppqqqrrrssstttuuuvvvwwwxxxyyyzzz{{{|||}}}~~~targeted.policy.sha512activecommit_numfile_contextsfile_contexts.homedirshomedir_templatemodules100abrtcilhlllang_extaccountsdcilhlllang_extacctcilhlllang_extafscilhlllang_extaiccucilhlllang_extaidecilhlllang_extajaxtermcilhlllang_extalsacilhlllang_extamandacilhlllang_extamtucilhlllang_extanacondacilhlllang_extantiviruscilhlllang_extapachecilhlllang_extapcupsdcilhlllang_extapmcilhlllang_extapplicationcilhlllang_extarpwatchcilhlllang_extasteriskcilhlllang_extauditadmcilhlllang_extauthconfigcilhlllang_extauthlogincilhlllang_extautomountcilhlllang_extavahicilhlllang_extawstatscilhlllang_extbaculacilhlllang_extbasecilhlllang_extbcfg2cilhlllang_extbindcilhlllang_extbitlbeecilhlllang_extblkmapdcilhlllang_extbluemancilhlllang_extbluetoothcilhlllang_extboinccilhlllang_extboltdcilhlllang_extbootloadercilhlllang_extbrctlcilhlllang_extbrlttycilhlllang_extbugzillacilhlllang_extbumblebeecilhlllang_extcachefilesdcilhlllang_extcalamariscilhlllang_extcallweavercilhlllang_extcannacilhlllang_extccscilhlllang_extcdrecordcilhlllang_extcertmastercilhlllang_extcertmongercilhlllang_extcertwatchcilhlllang_extcfenginecilhlllang_extcgdcbxdcilhlllang_extcgroupcilhlllang_extchromecilhlllang_extchronydcilhlllang_extcindercilhlllang_extcipecilhlllang_extclockcilhlllang_extclogdcilhlllang_extcloudformcilhlllang_extcmirrordcilhlllang_extcobblercilhlllang_extcockpitcilhlllang_extcollectdcilhlllang_extcolordcilhlllang_extcomsatcilhlllang_extcondorcilhlllang_extconmancilhlllang_extconsolekitcilhlllang_extcontainercilhlllang_extcouchdbcilhlllang_extcouriercilhlllang_extcpucontrolcilhlllang_extcpufreqselectorcilhlllang_extcpuplugcilhlllang_extcroncilhlllang_extctdbcilhlllang_extcupscilhlllang_extcvscilhlllang_extcyphesiscilhlllang_extcyruscilhlllang_extdaemontoolscilhlllang_extdbadmcilhlllang_extdbskkcilhlllang_extdbuscilhlllang_extdcccilhlllang_extddclientcilhlllang_extdenyhostscilhlllang_extdevicekitcilhlllang_extdhcpcilhlllang_extdictdcilhlllang_extdirsrvdirsrv-admincilhlllang_extcilhlllang_extdmesgcilhlllang_extdmidecodecilhlllang_extdnsmasqcilhlllang_extdnsseccilhlllang_extdovecotcilhlllang_extdrbdcilhlllang_extdspamcilhlllang_extentropydcilhlllang_exteximcilhlllang_extfail2bancilhlllang_extfcoecilhlllang_extfetchmailcilhlllang_extfingercilhlllang_extfirewalldcilhlllang_extfirewallguicilhlllang_extfirstbootcilhlllang_extfprintdcilhlllang_extfreeipmicilhlllang_extfreqsetcilhlllang_extfstoolscilhlllang_extftpcilhlllang_extgamescilhlllang_extganeshacilhlllang_extgdomapcilhlllang_extgeocluecilhlllang_extgettycilhlllang_extgitcilhlllang_extgitosiscilhlllang_extglancecilhlllang_extglusterdcilhlllang_extgnomecilhlllang_extgpgcilhlllang_extgpmcilhlllang_extgpsdcilhlllang_extgssproxycilhlllang_extguestcilhlllang_exthddtempcilhlllang_exthostnamecilhlllang_exthsqldbcilhlllang_exthwloccilhlllang_exthypervkvpcilhlllang_exticecastcilhlllang_extinetdcilhlllang_extinitcilhlllang_extinncilhlllang_extiodinecilhlllang_extiotopcilhlllang_extipacilhlllang_extipmievdcilhlllang_extipseccilhlllang_extiptablescilhlllang_extirccilhlllang_extirqbalancecilhlllang_extiscsicilhlllang_extisnscilhlllang_extjabbercilhlllang_extjettycilhlllang_extjockeycilhlllang_extjournalctlcilhlllang_extkdumpcilhlllang_extkdumpguicilhlllang_extkeepalivedcilhlllang_extkerberoscilhlllang_extkeyboarddcilhlllang_extkeystonecilhlllang_extkismetcilhlllang_extkmsconcilhlllang_extkpatchcilhlllang_extksmtunedcilhlllang_extktalkcilhlllang_extl2tpcilhlllang_extldapcilhlllang_extlibrariescilhlllang_extlikewisecilhlllang_extlinuxptpcilhlllang_extlircdcilhlllang_extlivecdcilhlllang_extlldpadcilhlllang_extloadkeyscilhlllang_extlocallogincilhlllang_extlockdevcilhlllang_extlogadmcilhlllang_extloggingcilhlllang_extlogrotatecilhlllang_extlogwatchcilhlllang_extlpdcilhlllang_extlsmcilhlllang_extlttng-toolscilhlllang_extlvmcilhlllang_extmailmancilhlllang_extmailscannercilhlllang_extman2htmlcilhlllang_extmandbcilhlllang_extmcelogcilhlllang_extmediawikicilhlllang_extmemcachedcilhlllang_extmiltercilhlllang_extminidlnacilhlllang_extminissdpdcilhlllang_extmip6dcilhlllang_extmirrormanagercilhlllang_extmiscfilescilhlllang_extmockcilhlllang_extmodemmanagercilhlllang_extmodutilscilhlllang_extmojomojocilhlllang_extmon_statdcilhlllang_extmongodbcilhlllang_extmotioncilhlllang_extmountcilhlllang_extmozillacilhlllang_extmpdcilhlllang_extmplayercilhlllang_extmrtgcilhlllang_extmtacilhlllang_extmunincilhlllang_extmysqlcilhlllang_extmythtvcilhlllang_extnagioscilhlllang_extnamespacecilhlllang_extncftoolcilhlllang_extnetlabelcilhlllang_extnetutilscilhlllang_extnetworkmanagercilhlllang_extninfodcilhlllang_extniscilhlllang_extnovacilhlllang_extnscdcilhlllang_extnsdcilhlllang_extnslcdcilhlllang_extntopcilhlllang_extntpcilhlllang_extnumadcilhlllang_extnutcilhlllang_extnxcilhlllang_extobexcilhlllang_extoddjobcilhlllang_extopenctcilhlllang_extopendnsseccilhlllang_extopenhpidcilhlllang_extopenshiftopenshift-origincilhlllang_extcilhlllang_extopensmcilhlllang_extopenvpncilhlllang_extopenvswitchcilhlllang_extopenwsmancilhlllang_extoracleasmcilhlllang_extosadcilhlllang_extpadscilhlllang_extpassengercilhlllang_extpcmciacilhlllang_extpcpcilhlllang_extpcscdcilhlllang_extpegasuscilhlllang_extpermissivedomainscillang_extpesigncilhlllang_extpingdcilhlllang_extpiranhacilhlllang_extpkcscilhlllang_extpkicilhlllang_extplymouthdcilhlllang_extpodsleuthcilhlllang_extpolicykitcilhlllang_extpolipocilhlllang_extportmapcilhlllang_extportreservecilhlllang_extpostfixcilhlllang_extpostgresqlcilhlllang_extpostgreycilhlllang_extpppcilhlllang_extprelinkcilhlllang_extpreludecilhlllang_extprivoxycilhlllang_extprocmailcilhlllang_extprosodycilhlllang_extpsadcilhlllang_extptchowncilhlllang_extpublicfilecilhlllang_extpulseaudiocilhlllang_extpuppetcilhlllang_extpwauthcilhlllang_extqmailcilhlllang_extqpidcilhlllang_extquantumcilhlllang_extquotacilhlllang_extrabbitmqcilhlllang_extradiuscilhlllang_extradvdcilhlllang_extraidcilhlllang_extrasdaemoncilhlllang_extrdisccilhlllang_extreadaheadcilhlllang_extrealmdcilhlllang_extrediscilhlllang_extremotelogincilhlllang_extrhcscilhlllang_extrhevcilhlllang_extrhgbcilhlllang_extrhnsdcilhlllang_extrhsmcertdcilhlllang_extriccicilhlllang_extrkhuntercilhlllang_extrlogincilhlllang_extrngdcilhlllang_extroundupcilhlllang_extrpccilhlllang_extrpcbindcilhlllang_extrpmcilhlllang_extrshdcilhlllang_extrsshcilhlllang_extrsynccilhlllang_extrtascilhlllang_extrtkitcilhlllang_extrwhocilhlllang_extsambacilhlllang_extsambaguicilhlllang_extsandboxXcilhlllang_extsanlockcilhlllang_extsaslcilhlllang_extsbdcilhlllang_extsblimcilhlllang_extscreencilhlllang_extsecadmcilhlllang_extsectoolmcilhlllang_extselinuxutilcilhlllang_extsendmailcilhlllang_extsensordcilhlllang_extsetranscilhlllang_extsetroubleshootcilhlllang_extseunsharecilhlllang_extsgecilhlllang_extshorewallcilhlllang_extslocatecilhlllang_extslpdcilhlllang_extsmartmoncilhlllang_extsmokepingcilhlllang_extsmoltclientcilhlllang_extsmsdcilhlllang_extsnappercilhlllang_extsnmpcilhlllang_extsnortcilhlllang_extsosreportcilhlllang_extsoundservercilhlllang_extspamassassincilhlllang_extspeech-dispatchercilhlllang_extsquidcilhlllang_extsshcilhlllang_extsssdcilhlllang_extstaffcilhlllang_extstapservercilhlllang_extstunnelcilhlllang_extsucilhlllang_extsudocilhlllang_extsvnservecilhlllang_extswiftcilhlllang_extsysadmcilhlllang_extsysadm_secadmcilhlllang_extsysnetworkcilhlllang_extsysstatcilhlllang_extsystemdcilhlllang_exttangdcilhlllang_exttargetdcilhlllang_exttcpdcilhlllang_exttcsdcilhlllang_exttelepathycilhlllang_exttelnetcilhlllang_exttftpcilhlllang_exttgtdcilhlllang_extthincilhlllang_extthumbcilhlllang_exttlpcilhlllang_exttmpreapercilhlllang_exttomcatcilhlllang_exttorcilhlllang_exttunedcilhlllang_exttvtimecilhlllang_extudevcilhlllang_extulogdcilhlllang_extumlcilhlllang_extunconfinedcilhlllang_extunconfinedusercilhlllang_extunlabelednetcilhlllang_extunprivusercilhlllang_extupdfstabcilhlllang_extusbmodulescilhlllang_extusbmuxdcilhlllang_extuserdomaincilhlllang_extuserhelpercilhlllang_extusermanagecilhlllang_extusernetctlcilhlllang_extuucpcilhlllang_extuuiddcilhlllang_extvarnishdcilhlllang_extvdagentcilhlllang_extvhostmdcilhlllang_extvirtcilhlllang_extvlockcilhlllang_extvmtoolscilhlllang_extvmwarecilhlllang_extvnstatdcilhlllang_extvpncilhlllang_extw3ccilhlllang_extwatchdogcilhlllang_extwdmdcilhlllang_extwebadmcilhlllang_extwebalizercilhlllang_extwinecilhlllang_extwiresharkcilhlllang_extxencilhlllang_extxguestcilhlllang_extxservercilhlllang_extzabbixcilhlllang_extzarafacilhlllang_extzebracilhlllang_extzonemindercilhlllang_extzosremotecilhlllang_extdisabledpolicy.kernpolicy.linkedseusersseusers.linkedusers_extrausers_extra.linkedbooleans.subs_distcontextscustomizable_typesdbus_contextsdefault_contextsdefault_typefailsafe_contextfilesfile_contextsfile_contexts.binfile_contexts.homedirsfile_contexts.homedirs.binfile_contexts.localfile_contexts.local.binfile_contexts.subsfile_contexts.subs_distmediainitrc_contextlxc_contextsremovable_contextsecuretty_typessepgsql_contextssnapperd_contextssystemd_contextsuserhelper_contextusersguest_urootstaff_usysadm_uunconfined_uuser_uxguest_uvirtual_domain_contextvirtual_image_contextx_contextsloginsdocker.pppolicypolicy.31semanage.read.LOCKsemanage.trans.LOCKsetrans.confseusersselinux-policy-migrate-local-changes@targeted.serviceselinux-policy-migrate-local-changes@.serviceselinux-policy-migrate-local-changes.shtargetedbase.lstmodules-base.lstmodules-contrib.lstnonbasemodules.lst/etc/selinux//etc/selinux/targeted//etc/selinux/targeted/active//etc/selinux/targeted/active/modules//etc/selinux/targeted/active/modules/100//etc/selinux/targeted/active/modules/100/abrt//etc/selinux/targeted/active/modules/100/accountsd//etc/selinux/targeted/active/modules/100/acct//etc/selinux/targeted/active/modules/100/afs//etc/selinux/targeted/active/modules/100/aiccu//etc/selinux/targeted/active/modules/100/aide//etc/selinux/targeted/active/modules/100/ajaxterm//etc/selinux/targeted/active/modules/100/alsa//etc/selinux/targeted/active/modules/100/amanda//etc/selinux/targeted/active/modules/100/amtu//etc/selinux/targeted/active/modules/100/anaconda//etc/selinux/targeted/active/modules/100/antivirus//etc/selinux/targeted/active/modules/100/apache//etc/selinux/targeted/active/modules/100/apcupsd//etc/selinux/targeted/active/modules/100/apm//etc/selinux/targeted/active/modules/100/application//etc/selinux/targeted/active/modules/100/arpwatch//etc/selinux/targeted/active/modules/100/asterisk//etc/selinux/targeted/active/modules/100/auditadm//etc/selinux/targeted/active/modules/100/authconfig//etc/selinux/targeted/active/modules/100/authlogin//etc/selinux/targeted/active/modules/100/automount//etc/selinux/targeted/active/modules/100/avahi//etc/selinux/targeted/active/modules/100/awstats//etc/selinux/targeted/active/modules/100/bacula//etc/selinux/targeted/active/modules/100/base//etc/selinux/targeted/active/modules/100/bcfg2//etc/selinux/targeted/active/modules/100/bind//etc/selinux/targeted/active/modules/100/bitlbee//etc/selinux/targeted/active/modules/100/blkmapd//etc/selinux/targeted/active/modules/100/blueman//etc/selinux/targeted/active/modules/100/bluetooth//etc/selinux/targeted/active/modules/100/boinc//etc/selinux/targeted/active/modules/100/boltd//etc/selinux/targeted/active/modules/100/bootloader//etc/selinux/targeted/active/modules/100/brctl//etc/selinux/targeted/active/modules/100/brltty//etc/selinux/targeted/active/modules/100/bugzilla//etc/selinux/targeted/active/modules/100/bumblebee//etc/selinux/targeted/active/modules/100/cachefilesd//etc/selinux/targeted/active/modules/100/calamaris//etc/selinux/targeted/active/modules/100/callweaver//etc/selinux/targeted/active/modules/100/canna//etc/selinux/targeted/active/modules/100/ccs//etc/selinux/targeted/active/modules/100/cdrecord//etc/selinux/targeted/active/modules/100/certmaster//etc/selinux/targeted/active/modules/100/certmonger//etc/selinux/targeted/active/modules/100/certwatch//etc/selinux/targeted/active/modules/100/cfengine//etc/selinux/targeted/active/modules/100/cgdcbxd//etc/selinux/targeted/active/modules/100/cgroup//etc/selinux/targeted/active/modules/100/chrome//etc/selinux/targeted/active/modules/100/chronyd//etc/selinux/targeted/active/modules/100/cinder//etc/selinux/targeted/active/modules/100/cipe//etc/selinux/targeted/active/modules/100/clock//etc/selinux/targeted/active/modules/100/clogd//etc/selinux/targeted/active/modules/100/cloudform//etc/selinux/targeted/active/modules/100/cmirrord//etc/selinux/targeted/active/modules/100/cobbler//etc/selinux/targeted/active/modules/100/cockpit//etc/selinux/targeted/active/modules/100/collectd//etc/selinux/targeted/active/modules/100/colord//etc/selinux/targeted/active/modules/100/comsat//etc/selinux/targeted/active/modules/100/condor//etc/selinux/targeted/active/modules/100/conman//etc/selinux/targeted/active/modules/100/consolekit//etc/selinux/targeted/active/modules/100/container//etc/selinux/targeted/active/modules/100/couchdb//etc/selinux/targeted/active/modules/100/courier//etc/selinux/targeted/active/modules/100/cpucontrol//etc/selinux/targeted/active/modules/100/cpufreqselector//etc/selinux/targeted/active/modules/100/cpuplug//etc/selinux/targeted/active/modules/100/cron//etc/selinux/targeted/active/modules/100/ctdb//etc/selinux/targeted/active/modules/100/cups//etc/selinux/targeted/active/modules/100/cvs//etc/selinux/targeted/active/modules/100/cyphesis//etc/selinux/targeted/active/modules/100/cyrus//etc/selinux/targeted/active/modules/100/daemontools//etc/selinux/targeted/active/modules/100/dbadm//etc/selinux/targeted/active/modules/100/dbskk//etc/selinux/targeted/active/modules/100/dbus//etc/selinux/targeted/active/modules/100/dcc//etc/selinux/targeted/active/modules/100/ddclient//etc/selinux/targeted/active/modules/100/denyhosts//etc/selinux/targeted/active/modules/100/devicekit//etc/selinux/targeted/active/modules/100/dhcp//etc/selinux/targeted/active/modules/100/dictd//etc/selinux/targeted/active/modules/100/dirsrv-admin//etc/selinux/targeted/active/modules/100/dirsrv//etc/selinux/targeted/active/modules/100/dmesg//etc/selinux/targeted/active/modules/100/dmidecode//etc/selinux/targeted/active/modules/100/dnsmasq//etc/selinux/targeted/active/modules/100/dnssec//etc/selinux/targeted/active/modules/100/dovecot//etc/selinux/targeted/active/modules/100/drbd//etc/selinux/targeted/active/modules/100/dspam//etc/selinux/targeted/active/modules/100/entropyd//etc/selinux/targeted/active/modules/100/exim//etc/selinux/targeted/active/modules/100/fail2ban//etc/selinux/targeted/active/modules/100/fcoe//etc/selinux/targeted/active/modules/100/fetchmail//etc/selinux/targeted/active/modules/100/finger//etc/selinux/targeted/active/modules/100/firewalld//etc/selinux/targeted/active/modules/100/firewallgui//etc/selinux/targeted/active/modules/100/firstboot//etc/selinux/targeted/active/modules/100/fprintd//etc/selinux/targeted/active/modules/100/freeipmi//etc/selinux/targeted/active/modules/100/freqset//etc/selinux/targeted/active/modules/100/fstools//etc/selinux/targeted/active/modules/100/ftp//etc/selinux/targeted/active/modules/100/games//etc/selinux/targeted/active/modules/100/ganesha//etc/selinux/targeted/active/modules/100/gdomap//etc/selinux/targeted/active/modules/100/geoclue//etc/selinux/targeted/active/modules/100/getty//etc/selinux/targeted/active/modules/100/git//etc/selinux/targeted/active/modules/100/gitosis//etc/selinux/targeted/active/modules/100/glance//etc/selinux/targeted/active/modules/100/glusterd//etc/selinux/targeted/active/modules/100/gnome//etc/selinux/targeted/active/modules/100/gpg//etc/selinux/targeted/active/modules/100/gpm//etc/selinux/targeted/active/modules/100/gpsd//etc/selinux/targeted/active/modules/100/gssproxy//etc/selinux/targeted/active/modules/100/guest//etc/selinux/targeted/active/modules/100/hddtemp//etc/selinux/targeted/active/modules/100/hostname//etc/selinux/targeted/active/modules/100/hsqldb//etc/selinux/targeted/active/modules/100/hwloc//etc/selinux/targeted/active/modules/100/hypervkvp//etc/selinux/targeted/active/modules/100/icecast//etc/selinux/targeted/active/modules/100/inetd//etc/selinux/targeted/active/modules/100/init//etc/selinux/targeted/active/modules/100/inn//etc/selinux/targeted/active/modules/100/iodine//etc/selinux/targeted/active/modules/100/iotop//etc/selinux/targeted/active/modules/100/ipa//etc/selinux/targeted/active/modules/100/ipmievd//etc/selinux/targeted/active/modules/100/ipsec//etc/selinux/targeted/active/modules/100/iptables//etc/selinux/targeted/active/modules/100/irc//etc/selinux/targeted/active/modules/100/irqbalance//etc/selinux/targeted/active/modules/100/iscsi//etc/selinux/targeted/active/modules/100/isns//etc/selinux/targeted/active/modules/100/jabber//etc/selinux/targeted/active/modules/100/jetty//etc/selinux/targeted/active/modules/100/jockey//etc/selinux/targeted/active/modules/100/journalctl//etc/selinux/targeted/active/modules/100/kdump//etc/selinux/targeted/active/modules/100/kdumpgui//etc/selinux/targeted/active/modules/100/keepalived//etc/selinux/targeted/active/modules/100/kerberos//etc/selinux/targeted/active/modules/100/keyboardd//etc/selinux/targeted/active/modules/100/keystone//etc/selinux/targeted/active/modules/100/kismet//etc/selinux/targeted/active/modules/100/kmscon//etc/selinux/targeted/active/modules/100/kpatch//etc/selinux/targeted/active/modules/100/ksmtuned//etc/selinux/targeted/active/modules/100/ktalk//etc/selinux/targeted/active/modules/100/l2tp//etc/selinux/targeted/active/modules/100/ldap//etc/selinux/targeted/active/modules/100/libraries//etc/selinux/targeted/active/modules/100/likewise//etc/selinux/targeted/active/modules/100/linuxptp//etc/selinux/targeted/active/modules/100/lircd//etc/selinux/targeted/active/modules/100/livecd//etc/selinux/targeted/active/modules/100/lldpad//etc/selinux/targeted/active/modules/100/loadkeys//etc/selinux/targeted/active/modules/100/locallogin//etc/selinux/targeted/active/modules/100/lockdev//etc/selinux/targeted/active/modules/100/logadm//etc/selinux/targeted/active/modules/100/logging//etc/selinux/targeted/active/modules/100/logrotate//etc/selinux/targeted/active/modules/100/logwatch//etc/selinux/targeted/active/modules/100/lpd//etc/selinux/targeted/active/modules/100/lsm//etc/selinux/targeted/active/modules/100/lttng-tools//etc/selinux/targeted/active/modules/100/lvm//etc/selinux/targeted/active/modules/100/mailman//etc/selinux/targeted/active/modules/100/mailscanner//etc/selinux/targeted/active/modules/100/man2html//etc/selinux/targeted/active/modules/100/mandb//etc/selinux/targeted/active/modules/100/mcelog//etc/selinux/targeted/active/modules/100/mediawiki//etc/selinux/targeted/active/modules/100/memcached//etc/selinux/targeted/active/modules/100/milter//etc/selinux/targeted/active/modules/100/minidlna//etc/selinux/targeted/active/modules/100/minissdpd//etc/selinux/targeted/active/modules/100/mip6d//etc/selinux/targeted/active/modules/100/mirrormanager//etc/selinux/targeted/active/modules/100/miscfiles//etc/selinux/targeted/active/modules/100/mock//etc/selinux/targeted/active/modules/100/modemmanager//etc/selinux/targeted/active/modules/100/modutils//etc/selinux/targeted/active/modules/100/mojomojo//etc/selinux/targeted/active/modules/100/mon_statd//etc/selinux/targeted/active/modules/100/mongodb//etc/selinux/targeted/active/modules/100/motion//etc/selinux/targeted/active/modules/100/mount//etc/selinux/targeted/active/modules/100/mozilla//etc/selinux/targeted/active/modules/100/mpd//etc/selinux/targeted/active/modules/100/mplayer//etc/selinux/targeted/active/modules/100/mrtg//etc/selinux/targeted/active/modules/100/mta//etc/selinux/targeted/active/modules/100/munin//etc/selinux/targeted/active/modules/100/mysql//etc/selinux/targeted/active/modules/100/mythtv//etc/selinux/targeted/active/modules/100/nagios//etc/selinux/targeted/active/modules/100/namespace//etc/selinux/targeted/active/modules/100/ncftool//etc/selinux/targeted/active/modules/100/netlabel//etc/selinux/targeted/active/modules/100/netutils//etc/selinux/targeted/active/modules/100/networkmanager//etc/selinux/targeted/active/modules/100/ninfod//etc/selinux/targeted/active/modules/100/nis//etc/selinux/targeted/active/modules/100/nova//etc/selinux/targeted/active/modules/100/nscd//etc/selinux/targeted/active/modules/100/nsd//etc/selinux/targeted/active/modules/100/nslcd//etc/selinux/targeted/active/modules/100/ntop//etc/selinux/targeted/active/modules/100/ntp//etc/selinux/targeted/active/modules/100/numad//etc/selinux/targeted/active/modules/100/nut//etc/selinux/targeted/active/modules/100/nx//etc/selinux/targeted/active/modules/100/obex//etc/selinux/targeted/active/modules/100/oddjob//etc/selinux/targeted/active/modules/100/openct//etc/selinux/targeted/active/modules/100/opendnssec//etc/selinux/targeted/active/modules/100/openhpid//etc/selinux/targeted/active/modules/100/openshift-origin//etc/selinux/targeted/active/modules/100/openshift//etc/selinux/targeted/active/modules/100/opensm//etc/selinux/targeted/active/modules/100/openvpn//etc/selinux/targeted/active/modules/100/openvswitch//etc/selinux/targeted/active/modules/100/openwsman//etc/selinux/targeted/active/modules/100/oracleasm//etc/selinux/targeted/active/modules/100/osad//etc/selinux/targeted/active/modules/100/pads//etc/selinux/targeted/active/modules/100/passenger//etc/selinux/targeted/active/modules/100/pcmcia//etc/selinux/targeted/active/modules/100/pcp//etc/selinux/targeted/active/modules/100/pcscd//etc/selinux/targeted/active/modules/100/pegasus//etc/selinux/targeted/active/modules/100/permissivedomains//etc/selinux/targeted/active/modules/100/pesign//etc/selinux/targeted/active/modules/100/pingd//etc/selinux/targeted/active/modules/100/piranha//etc/selinux/targeted/active/modules/100/pkcs//etc/selinux/targeted/active/modules/100/pki//etc/selinux/targeted/active/modules/100/plymouthd//etc/selinux/targeted/active/modules/100/podsleuth//etc/selinux/targeted/active/modules/100/policykit//etc/selinux/targeted/active/modules/100/polipo//etc/selinux/targeted/active/modules/100/portmap//etc/selinux/targeted/active/modules/100/portreserve//etc/selinux/targeted/active/modules/100/postfix//etc/selinux/targeted/active/modules/100/postgresql//etc/selinux/targeted/active/modules/100/postgrey//etc/selinux/targeted/active/modules/100/ppp//etc/selinux/targeted/active/modules/100/prelink//etc/selinux/targeted/active/modules/100/prelude//etc/selinux/targeted/active/modules/100/privoxy//etc/selinux/targeted/active/modules/100/procmail//etc/selinux/targeted/active/modules/100/prosody//etc/selinux/targeted/active/modules/100/psad//etc/selinux/targeted/active/modules/100/ptchown//etc/selinux/targeted/active/modules/100/publicfile//etc/selinux/targeted/active/modules/100/pulseaudio//etc/selinux/targeted/active/modules/100/puppet//etc/selinux/targeted/active/modules/100/pwauth//etc/selinux/targeted/active/modules/100/qmail//etc/selinux/targeted/active/modules/100/qpid//etc/selinux/targeted/active/modules/100/quantum//etc/selinux/targeted/active/modules/100/quota//etc/selinux/targeted/active/modules/100/rabbitmq//etc/selinux/targeted/active/modules/100/radius//etc/selinux/targeted/active/modules/100/radvd//etc/selinux/targeted/active/modules/100/raid//etc/selinux/targeted/active/modules/100/rasdaemon//etc/selinux/targeted/active/modules/100/rdisc//etc/selinux/targeted/active/modules/100/readahead//etc/selinux/targeted/active/modules/100/realmd//etc/selinux/targeted/active/modules/100/redis//etc/selinux/targeted/active/modules/100/remotelogin//etc/selinux/targeted/active/modules/100/rhcs//etc/selinux/targeted/active/modules/100/rhev//etc/selinux/targeted/active/modules/100/rhgb//etc/selinux/targeted/active/modules/100/rhnsd//etc/selinux/targeted/active/modules/100/rhsmcertd//etc/selinux/targeted/active/modules/100/ricci//etc/selinux/targeted/active/modules/100/rkhunter//etc/selinux/targeted/active/modules/100/rlogin//etc/selinux/targeted/active/modules/100/rngd//etc/selinux/targeted/active/modules/100/roundup//etc/selinux/targeted/active/modules/100/rpc//etc/selinux/targeted/active/modules/100/rpcbind//etc/selinux/targeted/active/modules/100/rpm//etc/selinux/targeted/active/modules/100/rshd//etc/selinux/targeted/active/modules/100/rssh//etc/selinux/targeted/active/modules/100/rsync//etc/selinux/targeted/active/modules/100/rtas//etc/selinux/targeted/active/modules/100/rtkit//etc/selinux/targeted/active/modules/100/rwho//etc/selinux/targeted/active/modules/100/samba//etc/selinux/targeted/active/modules/100/sambagui//etc/selinux/targeted/active/modules/100/sandboxX//etc/selinux/targeted/active/modules/100/sanlock//etc/selinux/targeted/active/modules/100/sasl//etc/selinux/targeted/active/modules/100/sbd//etc/selinux/targeted/active/modules/100/sblim//etc/selinux/targeted/active/modules/100/screen//etc/selinux/targeted/active/modules/100/secadm//etc/selinux/targeted/active/modules/100/sectoolm//etc/selinux/targeted/active/modules/100/selinuxutil//etc/selinux/targeted/active/modules/100/sendmail//etc/selinux/targeted/active/modules/100/sensord//etc/selinux/targeted/active/modules/100/setrans//etc/selinux/targeted/active/modules/100/setroubleshoot//etc/selinux/targeted/active/modules/100/seunshare//etc/selinux/targeted/active/modules/100/sge//etc/selinux/targeted/active/modules/100/shorewall//etc/selinux/targeted/active/modules/100/slocate//etc/selinux/targeted/active/modules/100/slpd//etc/selinux/targeted/active/modules/100/smartmon//etc/selinux/targeted/active/modules/100/smokeping//etc/selinux/targeted/active/modules/100/smoltclient//etc/selinux/targeted/active/modules/100/smsd//etc/selinux/targeted/active/modules/100/snapper//etc/selinux/targeted/active/modules/100/snmp//etc/selinux/targeted/active/modules/100/snort//etc/selinux/targeted/active/modules/100/sosreport//etc/selinux/targeted/active/modules/100/soundserver//etc/selinux/targeted/active/modules/100/spamassassin//etc/selinux/targeted/active/modules/100/speech-dispatcher//etc/selinux/targeted/active/modules/100/squid//etc/selinux/targeted/active/modules/100/ssh//etc/selinux/targeted/active/modules/100/sssd//etc/selinux/targeted/active/modules/100/staff//etc/selinux/targeted/active/modules/100/stapserver//etc/selinux/targeted/active/modules/100/stunnel//etc/selinux/targeted/active/modules/100/su//etc/selinux/targeted/active/modules/100/sudo//etc/selinux/targeted/active/modules/100/svnserve//etc/selinux/targeted/active/modules/100/swift//etc/selinux/targeted/active/modules/100/sysadm//etc/selinux/targeted/active/modules/100/sysadm_secadm//etc/selinux/targeted/active/modules/100/sysnetwork//etc/selinux/targeted/active/modules/100/sysstat//etc/selinux/targeted/active/modules/100/systemd//etc/selinux/targeted/active/modules/100/tangd//etc/selinux/targeted/active/modules/100/targetd//etc/selinux/targeted/active/modules/100/tcpd//etc/selinux/targeted/active/modules/100/tcsd//etc/selinux/targeted/active/modules/100/telepathy//etc/selinux/targeted/active/modules/100/telnet//etc/selinux/targeted/active/modules/100/tftp//etc/selinux/targeted/active/modules/100/tgtd//etc/selinux/targeted/active/modules/100/thin//etc/selinux/targeted/active/modules/100/thumb//etc/selinux/targeted/active/modules/100/tlp//etc/selinux/targeted/active/modules/100/tmpreaper//etc/selinux/targeted/active/modules/100/tomcat//etc/selinux/targeted/active/modules/100/tor//etc/selinux/targeted/active/modules/100/tuned//etc/selinux/targeted/active/modules/100/tvtime//etc/selinux/targeted/active/modules/100/udev//etc/selinux/targeted/active/modules/100/ulogd//etc/selinux/targeted/active/modules/100/uml//etc/selinux/targeted/active/modules/100/unconfined//etc/selinux/targeted/active/modules/100/unconfineduser//etc/selinux/targeted/active/modules/100/unlabelednet//etc/selinux/targeted/active/modules/100/unprivuser//etc/selinux/targeted/active/modules/100/updfstab//etc/selinux/targeted/active/modules/100/usbmodules//etc/selinux/targeted/active/modules/100/usbmuxd//etc/selinux/targeted/active/modules/100/userdomain//etc/selinux/targeted/active/modules/100/userhelper//etc/selinux/targeted/active/modules/100/usermanage//etc/selinux/targeted/active/modules/100/usernetctl//etc/selinux/targeted/active/modules/100/uucp//etc/selinux/targeted/active/modules/100/uuidd//etc/selinux/targeted/active/modules/100/varnishd//etc/selinux/targeted/active/modules/100/vdagent//etc/selinux/targeted/active/modules/100/vhostmd//etc/selinux/targeted/active/modules/100/virt//etc/selinux/targeted/active/modules/100/vlock//etc/selinux/targeted/active/modules/100/vmtools//etc/selinux/targeted/active/modules/100/vmware//etc/selinux/targeted/active/modules/100/vnstatd//etc/selinux/targeted/active/modules/100/vpn//etc/selinux/targeted/active/modules/100/w3c//etc/selinux/targeted/active/modules/100/watchdog//etc/selinux/targeted/active/modules/100/wdmd//etc/selinux/targeted/active/modules/100/webadm//etc/selinux/targeted/active/modules/100/webalizer//etc/selinux/targeted/active/modules/100/wine//etc/selinux/targeted/active/modules/100/wireshark//etc/selinux/targeted/active/modules/100/xen//etc/selinux/targeted/active/modules/100/xguest//etc/selinux/targeted/active/modules/100/xserver//etc/selinux/targeted/active/modules/100/zabbix//etc/selinux/targeted/active/modules/100/zarafa//etc/selinux/targeted/active/modules/100/zebra//etc/selinux/targeted/active/modules/100/zoneminder//etc/selinux/targeted/active/modules/100/zosremote//etc/selinux/targeted/contexts//etc/selinux/targeted/contexts/files//etc/selinux/targeted/contexts/users//etc/selinux/targeted/modules/active/modules//etc/selinux/targeted/policy//usr/lib/systemd/system/basic.target.wants//usr/lib/systemd/system//usr/libexec/selinux//usr/share/selinux//usr/share/selinux/targeted/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=genericcpioxz2noarch-redhat-linux-gnu   directoryASCII textASCII text, with very long lines (bzip2 compressed data, block size = 500k)ASCII text, with no line terminatorsASCII text (bzip2 compressed data, block size = 500k)exported SGML document, ASCII textemptyHTML document, ASCII textcannot open (No such file or directory)Bourne-Again shell script, ASCII text executableASCII text, with very long lines, with no line terminatorsR?7zXZ !#,NY] b2u jӫ`( %yKЙM )5VfkLW\,!FaӛJRmHDk1 ߮L"_J ks"~_<ٵ,Va~";B9h˞ckO yeIR6mo ldGl׿P+ixa9~02L Xʼ2 eSo{iFª7 >G!t׀|M Qb&3#=Р K5[5*7eٌ:ά .9M"bI j:KΆqeK,A-_#1p'+'- _)! +^݆ <:LEy> ]6e&i%~)c44a|-z `˰*vJZ3߱in.}/~@0Vp ? #c ]p5Ajd~D9a$IX?ܿxNo hԻ61ԪnmZ})?IT}8dwXL"/~ɚ˨R`AAP!͵~?lf(*9]pPAn Կ#x-e|.C`y4?6t߇G pQ!Kr,+(1k#ZFHm+wɼ!G|A}rDkuu$YUQ^4t私Z|7++pfXV= (̊k+N3K-mpˇ$H_2ϖ"D'nvW{F3r͹Zk iI%E(']Ƣ+tpq2T=` AK!ynrJ{{+(Ơdk1rF溊>F|]鉫u\aWYt_|$w/6<]f/4pYNکҐ_zJ+qq] 1qPQDD:Ŭ'B"{tj\/Adp/E2`䓜{PnL Kg\0GssVQOjuŞ>SiLF5D@Ϡ~OV hXԝ 6=Yߘ>yXGS x/*ܡwj40ђyu^jlY.fD YR Y0*:[ӾsY. -z t#(/SZ&EШ䘀ܷLb.v.TCà9ޞ|A[|[w)zt"/ltHv^,T܊/Qd}:$;"q6*E.uroW0vr 27;S ́Ht*k'-lx0G?b)a못P(%rh@7^&V-ZRH?;٩#9`w~$xYKO6lڳt/?Ҧr+X"bEӻ-SmeYjV)iáC'S?w3Kgg:[;VXτBM'FM|FTnV޼i~mb%(_)n?ގ(7kzIX3O))\qRbc6aQ21f"5;*9^pdt4//7?[ɪqqD p6nM&cQQV%DY 6Ќm%kIXM:S{^9QHIM@xc*"|MI/86 4F)z_ 6 G/fa:kJȎkA|7B׵oW4Ne3 DIn$ [ԦI&[:X U 9ePrAlǴ7PX9B' }1LAju}?E?ir.HNN!hS FH +;AK2Qۂ$fS&uoC-q6w"*m#Ųb"rG>eʎtB~`vTq_m*VR|<3E$oߪ؍ d'@qe7*\qV`$Gw@`fo2}F3sZw᜚6 Eo$.dj,h'%Yd#"c{ו=F BdhH{QBngN"Jt&<5*?$ZpfL?|V|Q)JXdXT8 1T!S~?20!Y׺Yo~5¹!L)z i_s]z \0T}uI1/]n7ACuglj@dv ?~M{<;_3CaW0aON[AVL ="Faå-H -pu7U^he7·}3Ң{?KP|@2h- IɟƎ|)yPl%+w*c@G}{ !I8?R5"l\(jѦ#F~[ڝef_@ irR~{Y/EY_L+@i!Ջ|òISg[,9ܕR"'⏂yRS$J8%g/Ils@B02ˌ5H\n;HxMJ}~!橂wQD9w@ h5mHDMS EN^IrqWuU%cX`I?llP~ ?*%B~5:L{ ƅS{BBbFS*Hgvukh%崎 3qMꪽB3 `Ҟ6ȳy;y^hT t6Y3aљ:ܱUЉYTrhfGr_> #g}{tx2mm#z`U$phVpj0~j2-)XR3gPgv= r@) Ga"3lqXS$$zD^l*ڤ쎘 ݷ2Or(daNRfR ^֓}OǴ =h9؇=˗^$U~!̖s=Cvv}Xv5W `JI#WɔbLehLOO7Iα$Q;2go'CW8GFɲ8Lp﬎/^cUFo8v8}J.'2 _)zX܇iVҗד]r'JLƸYL_Z*q;H8كQ\*G#URNկ|8l-Fuf Br'9dcCf6rI@lKּua *ﻩήA&>.Jh~1X{wоm?Ʀ,s☙´&shLY9 w3(%eWo=,!b0gO mTF**ro G[PۏD!.)bLLjk:c*\1s`F"lq ͼqbiq^.lSMuk&{p,,sB˜vuh̔)gy{.!$׀/ I=騼FDOy7 G+M;sX(VYzDX,OĤ g(}́z}KY&JTo2YE*xJyl|`orp!ԉ+Z񗑝쮸7 p1^NSI0=ΈOtaK  )'k9Up^J!VXve$[w%/6Ip\ :Dz̃S@CGt:΍ Nb4dݑzs!|+h)R.фǥiJE X VPMU}Tgٴ;{pK!j!گ$T<G d9{yK i/$:a|j8ܐz;mjxD geGsCin\!9ؼwj/py-p%ɢ$KvEl2vD*-L%:ԒH3̡;o ~v Zb,?/ O𖣦7,np.L +f!vͿݫ=&iFzezcPqD,1Z@1>})-@fҟDtUo&D⩶kIvX#盀WsR5:#P;y<(+ ¦*C\L K97"MF]:[g*^Qqr?9Tb+\Jq?_aFZB JOi~̭<*e©aݳ\ Ja`oZ5Y*VIaƂǩ$l[y'RHѡ=ۯ T >5<3]kdM'eIMRqsMG5Zڐ \,*J9`Z 9#sx0-@'a,2sZ2ꅸJ*I= 'N)N^] *2kq0A)C.9߭ToN`̯&Վ݃RC? :PmF`|$T|g.Qwz ҽw#`Kmr,nbY(Ǖ$MUr&J.'e0bgYb;C,c>;>q_4^]ֈa3^y2NpM<ۄTކn:dp'5(!9%qR${#П[xp0I`t13W<݀~59YC{rHq|I2u ]-eX8 u5KE麉y)*FB2ȟIWSt5DtѲ?$DJ! |O sEEh8O(Iiaԃ~6FczW gWr7 :hCuد]KM ׌P1]s q*A55(ݠMj4edV??z 6`΋fnVJ 6ضD9NǕ"Oh?K8a @&pt}ckȱ\TѠke!E-$UrQԖ_gO4mV -PO>-zLX\\[bI0zM L+d9AYA}v*Y.NVob~8uHho-t` 7 >~D_779z.OL췕n P2OB&^M6i`n^H2`!*>,wiX[p P~ȟg2,\{N0hv[ݝdpP<G#DFǰ-8ʗ|^y7m:ko5- We]k&ܲ!'ZpMGAU|ұ|V)δ.ΪlDnֺM6[2=߹a*%Ѓ-:{&`>ydYO)`^m3uDhI-Fa̦opLa0YY9\[gQZ6NJE_j7׽HִnV$Bz5\5gHm:d05b@!C,)úFKbVQ>PX.| RtsJD`b}ѐgy % !;*mzn QWp#20 ͲY5JWݿCiNN߳TVcHKj%+ 33ЁFhv`!ٔ%N6Dhv]ZO;Do<#yۄ`&|.5ū %SE1 K67>,a7nWB_m3FdgwK>?#EtLyp NC-v'b {!)مT̳iQ Ra-o\*x݃kpv$FXt^ttc]0TCA머$U5!-j?c^ ]N-ԏ!)A=\%vv %>_7%BߍEIjT&s,*Tq:BR*L0G'Wx꟬aq BKk[9鍾__>0 [ %y J#el]BLC0{C) dg9&8Fzj4 *D6LⲦf渵`-bvHE!e,򝙞bDf Y&dn#vh;/ Z8_,T\}C^ Dp쪜yՄ\B ,%-4\gZm V imn +1eMxrOb -tgQz-9ӊJ=² B9QdԸ o_{0>a8=iWӖku'Zx 67s.u[~XhLہU~+Pș51 DvFbB6gX~$ED(\-yJP., G VGBد4YRqwBg@5YiPm<D/ BY]dcyЪFApUm1P܀HPma+WW$[+S$V9-}|ފc.YC(u_AQA!ڧqU)wnmV.{:}„NOyng)@$~H;lIa;s"sJE=ǩ 浯憟5<蛚܈A{ȼ#*,%{LSRʮўh uF)Du|,SgI=F8f \>;OMgQՙw]Ξ⨄:w}6]EKjtJ vӞvx/5ێ?(CI&GC& U}#=w?piM_P$n;I} JWE3(Wa.^ 0+84fen qlj7D_f+(`l 7@-QQ1ÑWG֐x%nfy()R2ZhH6ɠ,a^P`bb -g Qe:le,ZtCI\ =5[yLx3%]Rӧ> Ru#;uG? M@U,SREBgAG?,ت<\89/rFc4X9N{ CmX, ѨfKb4(-HT53t"@2K>ftż![h##ʸ?AeF(_ñ)"Лf1OC' Yۛ3ne1I %fNǀ*o*݄GOaYĝ P#|g>%PȊkw5ON1I\Z 鄆V∎]x 9$3غ7LnUUGkdxzoǤ+jan;;?V "3VeXUVEy'%L!oDj߈[Q@tF-g3^T'JՅQ!GժLѲgW#O v_åst<JG>p}JȋmuhȃhBWx!fԽ2NP$^b9?|PJfU2%,e[48T0%fvcXk]m./ }R3k5kGF@zʽx4RTB\#mmOٸ|OS6Fkf#IU|Ýڻ>u#]53)8 bWOn~C=,sXK?oKz~R8WD:ɄT f韁.A%B,!Dۖ՜׍CHfF iHwp5'k;±)}wwH3pB>:0M zFkKG@?/Nq< ?.:ekQD&NKm<9%)RC/sv+<}OM=*_ݰ9W<=xTi~ߌ$d*w^>ܗ|`)s\ =$z4Pacҕ-SnF5^-;<5n_bJ5: @_RALhlS`Uf %馑.#Mp*>bI0GC&H;n:(FwxA1pɒF+*򧋶0&'<R6CߦȣP5 @=ʹ]/"|] XWY[+[$MDD9[k2Z[L PMqPxtc㤱uN!xsrIf3ci ^`R!ݝ8\( 9E J YHdw_R:N`r3* ;mcG3=zK c%GZV3P%\gPل̙n}$yS H:*?v\&wҝS4'jjbJ4(d`!q+Pӽ0^;ܻ=(u+%^P[JZ7]G+q|eL}:>3TEZS+o8pfI}逮YLinzA NߗXv9FWfPeKg/ldq@ Z%)ꕂۮc+StY ,^"kþ ڿ?BmZ=p QS ڱyUAP?w&gcMR;tӗ$KOL!Ix#=+״ ת3"-u P0ЇBUxUodl]pu Bo8~_! oUAu31" +.Q HZJeFHڃ:1)l)׵M_DGB茈ތ%"r ARW\;)F+Ay;&g0olX̾ş:Pr0|CJѩ'JNiGԪ9~IPkS]n9< `O%{CD?[%|rKmDz.+Ӝ@POy}% $ E<'K͓;Na]yX)pSPU0;;+M]^sUO{ԇ8?Ц&q{C:~ lMu`*[7tgWOۿn@-tuyeU ~kmݘ_s2p*\`0[XF%JXŵ/ǒ3֍Rm-RF^gzD ѝ~n,VcgQ:PD #v rCTo#*s>]S<,@*T6r,cQ%FtV8vG#D]ӥObMЦ7b{&`(޳63L}X+}ɓ4 Z!: rRҨyQLsv2ی$m,Z{4Ln]TU3BGYdkN烂^VTB3\{xϼDg;cdٔ~Ӣ\ f{;s[znt!86y)6^ q~c9kiPY#gɇm~`U<[W SR$mkE uʥN&N=uB#fJJdgׁݎ,r\oC0zSXJP&9(L*pKFY^$uEo/E`jX1StWmc۾f  є)"t|Do u(;(_>BѦtF9 Ԛ 2%,РnI#օ9M`Y15+]1kECmCF?uϠy\!x }N.RՋB{, H#kK\^-v8l4'`@' O -̧w &K欏ooՇaGW}*6*$N Z*f3UJHdReO˒X`J_9X>($Z}p?r,[ D>FbX] '"+k0wԠ{z¢e7hBf9$d }$XMNVh[}R՘RHp'8B83m4_aFAح/ @#Q! $``h+8>`?´L^=omDDSB?K-7?20}hOaeD!ilLPn;|c#-$^F?&)0V=FD6Xo {4/<< -;,o/}Z#|k+컖K%Ctz(ШK 3jYaP/&"95-v2{`ɸws;9faezP!)e!ys8;Z˜B ~eD|6q\\·Ri]ϕ*?`t ( 0Իk5Nw|TZյA JYH_hHgV56]G(e;A aԠÂq*7TXW~!C'{_ter6,%9P6m)sqN Sz$Wozr8MD"_RF̙Vr; %9db=A^8Bf$ &F(O/P>OE2, _~;UaJ0 ٿU1?y hp Zƞ *Ο5{_fwH8xk Qe9ʳdMG( Ꮿ@}zB:_$Pg8^4  G?NVYS($ⱔ;RfU1܋֔~ڈW `n K}\ ])^w:SjЪ5d&Z%i:c>jȒ qZ]FBb{.rx3V* obo\{vj'>Cv~@lJnu2 hH+KoNa NwoG@=nkːŜ{<1Yc#ϲI6R§uq").;[O؝*"7|HiZg[ta#v\$o2 1>y3}}p_lt(ȷٶ8ңBQp!a_qB%tjmȦgŵVX>'QundC=tŒvoDwJϋ.84r8\7vx{u >j-Ӑ@62I9E!ؔ712&z g}oټV`2 :/􅈃xeyU^$*Ap,1ޠqHMZXD_r[8e ]֒:.5ˋ9,Yf#lYsW4eWz|*̀{ JJH1R}_E7VU r_ vN y9ZVfw #n\ {mFHmEQUX%xh])i/ysMhG#1} myd"ri(KN# 0ֹ)xEO^QJE·e];sO`Kt;__xiU  %cCxsd& K{F+ױZy|+`Mnk*݉245T<[c]њXhSQBQJe=MqdC$AQSZ(Uf!yĤ.#:v"0\QUg QQ8|wpH@GC> IOZS4xpU˂u°`n*7? ;*i@105i6tŌRv]1zG$nkʸoxds~] hO)8#c=,J|6Z-Ƅi5p5G_ƋiZeQsfWcQI|NAoѶ?GRK`ޣ R=դkIH9V:=sv=T!3#9V7!Wת]~%F~eS%9i/L'VJH)  p=)mSǒ>"Ϗ*.}+N3unkɹN?>Kpp 2_GKwo =MC\GDڭ',M:-V:}=}Ò"}B(,VO3Nըr] VX#Dw:C?_x UPa͐eQhAcSZ~xvˮs\}j=M ]QIyB NF_=Ll=_MLF8W KN@Rѧ{اk뤮$NKH׺B4`&煕sM= "~e@@ Fe}֎ыV_^(0-!(Oς`߯ ,HE3rHbavUʬmƠ'AJ襅=rW;ۿ)xM-&Xi24!u5\N=/$g_9jd,v4eHB@Bb>wDͩ=fVu [$#侗9>5}Aӈ\!u_ ְkEVP&wX5XK<""Ηb*f\Q-s?5˻aO+ü@:g@k`i7ҟcq {s uS) '@9U;e X`|$7H]= 0؉s 1DA/v=oe..[=˩&52Ѿ+xhlm6dύn@(@7K=r`ILSK.9%n2h 2Xy 5&wjJ hxX = JG=bЮ\|Ix}~oX)0 ?%$铸BK^|$kM>zw T~;yGbvOCޕFT"vgeaqf~6,;@ӯ$8y <X]>~9Έ+o!QnȑןoRQtFQ(zcc. TJ`W,M. pP\>: p4 =ut/U3U ߦ>, ڰ쳠GFpu!$& ŵ=qY@V4بz.h4 I͆CzR62 3P->-XT3 b5mo DO!VCě[N08ݣN\]x1lunS7;Iƺ%[dw "k|"[^~v6 {58;i%M!~1amlFP,AS31ÝI.VDȗ|>2nu_e=ACDv^11 Br*fb^"iW& tI U|ɒ =O I`UghK"\Yv{B G!?#HB~LԻyej`f1dCAٰ^Ԕ:&|/#;T;l㜎\WxLJb5etx'⺑dk<1X lq +rQ4kȩF>?5RW_ZV~)#шSyD9xc65Zy5@+?"CN@QC٠6uRv:z{HQ…S6!Y# xR=q}!6Ua&و>lq$_.p;7f$ YwçqaEpZg(n>T~U\{lPJze8`(##dB|d %<8ʞtHG# P)`oyyrl?7s2MT5rlZMQH$A0J<#Uߒ#uXҨU +\)o. NS^4s85+ Y l^;e o7Dy>*Źi=YeVKleZqqUɩ3DG} 8ˈݬ p; RSI<&cv!ճD!?0 ĹݢɝRPVD0'Y(eoܰr|R,jGsʵo^u;>2xx>%Zt:@}{ϜG$}!yM8U92=pwW'Ţ>-F0SԈaI[ˋUCuD;C,)_/RzDW"Q% n,P yD-Br1"?|n}\KJ]rکN@ĝ7wTg#X.[kw&y@yti~/S'yQB͵sA# ^ё[7DAr!F߂`zfQ55ޙuҺTP8vA%nK_c+j͋Ε"-4]2 ,U+6DjU 1UI{ -[' қrRDVKZkyuZ%=[2m͎ _Oi|3R5uP>i|ϭ)r*]ȏbr|4X|CCYBZY`ˏ'Bν6H5j#(=Q )|TMlӕyWfSQBeMOqm<CòGRXlÈS}YL3}W e&eU⧟5YI*TJjS!. ؅yx/j@gx}G]#ۅu}ȁVn5ڤ@UmN+T :8,4E %ay56^D"V@.bk x jEɈY'nq-<נ2OCc~ЊS ?Y,HwFg5n*Zsk5.%HtX_nl 85-[Y+blɛ+RR1Fixd$ڗmpyb9Mڝom\>(pg8}FGýgϫ Pܥ4ʙE%ܬۓ>}J^0leQDU?A iʫ8j=yRܟȳqP۷,PF닖~`zN4ƻ8]įnag1X&vX L.~<gH"gA)`\c9W"ce'Ն1J`~&+8!&j`yOu2;o;vEBP_c\p+*ϒXLQ k>z M6Ϥ~ГͦWo1o'U0aAط׫9@v캶~ p5OOm<& ܥLSQ;\xI[M{vr@INw˓/VUdߩpNuq 2!7:fLb"dcU!^=pV N驄Fcn)|,B[5%Ԅ)FF. ŏvik72ga9ϯ tlT-wPy혖T 3#=ʙMgd)>."Շr֯g&Z~f<~ C&?A a}ZAҔ:7{;7v &,~X]nВ]4h$ 1Lt+Qfz~MY,J}hHG? 9EKB; B+p{+=5dDlrqkT'.nLվ%.D vHUwAKJrZI/!!S }OhbF7^Nwb̘%p#3Dw{ id/6%WϛFSKMpWY[ÌX/8R&yWT>߬Z|99xaDw<ˢ/I=~DaaL0;,uM ^gw.q(Cx<dِC AQ4ʸzqmA/Hc w㙦ze]!5[sni BZ 5hao{hwXcFuR& ГTSQ9-p6'}#/1^Ă !N"щpWPBTa3)Z",#;3z3,Sl޷%A4ƣ8 =îWo B?GBV[ TҐ?5e_s췡|9w>O&WMzdQ28 4 ڍWE_H)gx{pbtvVsfp-}©!]ذPj*ߠ ,ԫ4{ :K1]H}p0;9/,jQ9Ors/ `5Qv%J:~O= IS_z=NCq̟Aya0y`i)bz2"P%Г5cJRRM%P=1d.I\B-Q_׎W<Z\@-o\Y( Cq߼w L%_/:r'j} oiN>3ҹAD٥i>SAb/.zc#}&*y7qmwH=]KoW{ْHTH)>uW?C*JR4y koKJr]=-$#xgp:6۞}єP9p 3࿐tPYdV+6t8MZu37{izqj#%N׬"!WEο5xP71DDDBp3NG6}wҡ+Z>bq0|@qwhSYտ$u)tψ&m8@fl2 :ew 1筸duI5*3 ]mgK{OudQ#Y|>όXb }tcYBwd~N@13YƸFITq(¸Xm/|y9p kvU5sja\ m6Л[pdP i 2krn+m\aΕ<8~21tsg*.3}&Uz<`RnzOw]?jԟeE=EdNt1w/ADt#dBuwrUg`xC4nx<JhF0]a ~ZuIL;kcy_ (v7i洸]%ǰ:xC(Uv )hM:ǷEpCc:3ëb-w`oj1.4O'+NCoxDQH:;>V wpQ`DjYfP}(;ӹeg<ЈDZVGdvm TY%aưa+:n?ٯEt8p")4ȷt)x-X[TOLрjh0 66x_ٺ\$E xb6G[ay Ws!Ziȭ#˧B8xO՞,cw*#bMu渤kDH0]q^j~8D8=՚%NgO4n9zP z1 ,a5&I2rލT)|K/Qm+ 1@\:#݈Jn YP?oCB; Mm^<^XʬbX4PKH=7x Gh9J]uSn7?Pb xlHݯՄIen`K3mCdŐMʁ n(_#7W5/nc˺ZsC+5|`WA|44Km)L5L^olxR;[%k3p/;N@~ࡸGS-Kfwg\oasoV,%SK\NJrM*3piWt #c>nY3ޢ5Sd$G,5[O)-RݢΤ U|O !IU,kT1A_c0_Sæ1c7;Nr|QwR}}£DC.jQÌS n?Y7}I]Ҍ9ëWs׏YC6"|^gYp7>uJ+3R`S-ydfIJcK51(m'K`RʷPY+'*+lusR7k]]@:{&ߙسgV "E6beBۤK'{[|7\j2G>ȔK`u!1 G/T{\Ǎ.ȧA5apPZʣ(Z &hÊQΜ5#kRh,~AݮF2pRnnxuFVR=@L&J@9H1=xo'dh5ecIV߻~TcLiTFc׸Y5m `tdou9,K>=5%8f)o4NoM bu&$\>Y;| Я7P,ɻ phJgy@eԈ_͝h].]=WUy^tAS/̈́7=%ݡ@3x=c?r7ouIҮTԿ&f$w9Q>j ?A؞FO W02-_ȧݙ. U rl(\B)GL pO~WY2[-5* 3ysc/g4&gkevwa kK%]VeP5k\XzmT(Y5Z39;D @: ہ ( !$BQr6gH \1r)jѪn1~MIb[{y]g[%R* Ga gN}c7RSGF, 0`0[v[f`J81d~R!uDw+a Z1IA[" 6B`d^e J7vj0tς%pT L,:=~C5n`;+ OXi[8,^|E Irrl0>Cax?NmQ2ւ3uh?6WSť2_S?WPovIH}tb8݊L U)uғ}J=f@Zl9 V7CTuFIn 0p2; SobD~P˷pi,N8 B/t>koW}!Ԥc=_ iT]-<񔠮پ.Mqv.5@Wŀ"렁m Հ5Z g^_] (/.~eHp¥kǩ%Y"D){p XBh+ψ0m(e˪[-'v ʨ5ÊҴU`n@&5h 9 Z-W?e5ԣhF`(ʂ y N5|@oN $\WKիBp6+*m#v3ё>Ih$iUx*Ї"KQ;Vf@[w|x"&dEЅ&1O=fr~4M8*`|yz0Gm`^̅3,rj?n(P{x8w\Qm15pdvtũyt^F2Ed uh&fD4RT@udih3]:(p_I9Ő% s("Ք"@N\6^5c WNyuv+w }9[.,HKcMID{@$Ĕ#rk#wiiSGWQ @߁_V\fi'Ce~elŨ fC[ޞfM98ch)n3"WtqP:@XqdU#Ysvcٸsq|Ay~s\l wrۘI6-|Q 0B1KV5Nf0gw-Lrl]{q)8$p.le„v ~ i"r C;vBZ#a<3X0E_$Yf1DLˍ P2VxX^7 D8<Ipx(3J0$F tDfLVUQ@&|"_~g/? x)~J"(XlW%ז9äsz_7dP7QD=WRО["J( `vcYʄ ;Bcw nGZ&s?It1ŁNwRJȜDq>AW%Ŵ4ZTc1UJ/ `ς3lPDdVLt^Jţ+O!lpgPJ0d~CLU2~{3*=B؄p-rOvÁ-Gnvڍϸ^5(Pߥ/뗅e0͞мq\VdntZq˔C#6P&,7Ϲr_"1,iF$2wp覶%e}>8,mz>K'\~OTG]/kƯ%MkU_7\@IJ 昚r]%fdRT=1@ǰ3|J* 1UtKq53z~|lFHkrеd6`Q ĭ!)ʃv,@1V6HpS]nhC]Iu', ;bei6}d?^إL;nD Nt`yNpo&4a8b+c~ c۱c#C|9T4nƽmu)HՇl]/[ѩ+v#oP4pw)n’1=ml:J,g$ªgm=cx8>I27Cuc|%v>c.XTet Fb;cr/uc`H/;+13h=5 ܄y\z|\~S!$cBH4I޲FK0yFXwbBV:4)grخR[8 M夬TENL U\'x 6H`5ՓaCX4tRZta_'Oy ,yAY0@ #Fmk -zi`v&l_r0t׈ahs|ļLYWѢѺn{P_윺i âQF萏:Di_"+%[c}wOR Ţ^_=]rJ Ϭ,qz;e9BZj G3܈Xx#mP qr8ؑ5뛘S֏*<]u 37G2PϱJ ZHfʌ-b5ռ{1y s$wXc6 ԡNn?Qa{]'8o琴{Y X.څTExn3VgThHJk5?Zbq߭f4}|Bd:Nk5:`/l=&uqRFv Z"+tݨY Vĕ+fo.V*f:4D%אr_v֞.bØ%J0Kkл(v"1OOc%4!1v%uNLx  O;MyLߴ'ӯ1=]ݎle=mkv+"]۶bB;:.ƎlF>ѕ]hsRƏ݁>jpƜUg;4 3UmW̥&*}bsX(jN ߅\bFR6a(clPUQqtϵkU) |ptBH=8Q XSb^*R88LO"F\xՐBt\O;A䈵7v)Yne9'x7)+3Ӱ|T.B?~:mh!uLฯ& ].}>˗q'ӽ{TY$/yfh% KXC*13\]+nðI_ߟ <ׅye@1 Wذ$̸0rBsN=( :GggZЃWcoʵoO4m1}؅aekTQqG$1QS{OKC92*wNyDE,&PQy_ 'AzQi"\*` U7"T.';5+N벞M~a$RY(KyW>9[TZ?II_;i:.U r*-CJ&ksҿt?Xi~?I >1 _Ŝna5 +v*߸@D#c6 9t \Oh/8v' W4v78+\G5Jo'];.U[[+It ҃4VA)He"̈́i<EtI/A*`4YgAnD_||k/N? WCw<ђQȭi ы}=F!a?Zۯb,oTGgg{ԣȐO,$c CFZIR*FP/[4Aɝhj_MeM`V(݈kTn/nt#lĶ͙?R=*V|K~ܪR~c \OUvU,M2}hA.T!b } oCšauUvN'3 ] &Pzp&Mg2-o gyM)#&`E[aȊk~#B9Q WFҠ4$4.{u%T$82'ࠫQr̅V$] "NVeyZKZ׮A;A#5޵e ұ_-eL=_@؍Q#N4<Ó*}Ob` g 7SR6EH]5h*:㲃"Qkk` ֜"B@NՔT?y yϭ*645UQSxU=HZ]?9@22(%&nԻ.y0OKnM.2@"_z#PDaC~=o7l0s@YmӧpaA^+hвJUnu]Mb!pFJI@ri =H[HvNjhoAQE_&~dIO4džY3-o`Q^['"%P8Ιނ/I)S%fQj1l$-%7?aY9q_`+rC[0ӹ@#0cәJ B:ɴ(,1Ʌ'HiIg~'IČ^154vTDԮ1"X9qt̨>=U'>!UY?ÈAkD3p B\ ѧgï8bfƞj FI9=l1 )a xJyv\=U:#ϥ^`$`Vsm5[n!VkUZD઺?=qX}{rhn0CehAGzOD=lw QsR2#|ĹL' =uk#oͿ4DD"Ťsj -b,S;ZJ*4:Fj *0T:x.Q39m<;!Qt`8BYJ28^^CH C/y B^bLḢ""۫}xP@@F-@4n5snxgmαq\ 27)ULZ*]9s(uc􁼝5!Beյ?>,][ˇkӰ}ż(.f;`UV\`s#g<,t\D.IyDUQĖ>A wSB6}/)6h.U)gcIQ5AwUy.Pɥ 4"b F ZX9DZ1<ͽx,cPf@rTk~ %>JǴ]4ȾSky%)>P5Ƥܰ ĹD]i0}QM j ~Tp!l֍pɉhY s]; mEqq ӌeL Y''GSAL`2S9VKQ] wr`zrj u9pD"O tezp]&תUP֩Z=O0t&EKmcГQx:}\Qo+W΄Nx.\@}Xgi9t]-UwA~zL~(\V* sBSfg`8[hƱ}W9@t3#Ţ%a͑zJcAoYV\ʌ!bX wEgsC'-i7զ~rR5<7)Ʊ ̨ 0ex_f`HuEڙ- ~űcor?E49l(zOxكւƈ3+Si-:[N70[cp]Z-*>zu|7{F"H6.mԢ>'9>SUV|KYyv!PlyUHkS:nP{Rdf]ʏѽp+Ҥʯn46˯gk1[?rxa߃},l[B_ao^¶e} yYIskEh~ڵ)ƦT;*sQ o@A'cEH 7ٛk+>;:\*1+6/y2>$BloP-1ֽ!D[*_T3Ar;ٞ\ݒl+ؽo{ta_5Xʝ}*~(88`L0Ք%UbMys%x504{&މ@x oN N5.!>(L!@<9ϩtV<&:< x}~4?+zza[u6Q) 9X{ }v>d}5) 1lpxAr#mdψ :.-#4)_mhok<KύGeV0UNft1wD@5 ֘rRнk/P̛JB_̀[s!$$=vǞȥG^{?."hi$? :YaORB ׌!gRcwnfqyWŕ1 ZE@Mp-#!n! $?h&A%JWb08@QޛqI0V{@]Ր0 + ͋M04-h@'c',[Gfj8=5IHѰLC=a2>FFh3r)2nJŖQqwF@?5;޵Ahz (ZFUzicY!n?{Ƌ՟|tYG7Dx7R}`3uc:h{pԽPHzr4njAb7/qyClef֪v 2E~XA?nb?j1 tEHqvU;v/q:=O83aB 㘐pJIP(EkZjoKTV6h,/͎^h+gaFQ#< \)FGt`)mnˠeL$rs ௛TuV#*cAiR, ?MYs^)Dbi nA%܉w(/u[\ٹgUBٟiS"IwbOL&m&dßm Z y>žJ%KCLH7vVVͬj '}$ ae ${wm "pD1b l/i5dTq;Oh;3*{( KAuo)MV`q$~ӷ ržZEq>Ch3TtRDv_UJZ/-Z?.(}8u7!n_/nAYI>n3*SO$ׯ+K9\:M4Ȕ#3`'Ĺ9m"ڀ<{0T* AM]!pEaLʨ,6QYmJu)0ȭ%ZBzqR3 M܊Hs`P}[4+ړQUi8$T8s-iC6oΒ_vwP1OzSH}+r3e꫏+6lJ8 jd.6&+ֈMZ#2Ȍ[ 3YZգڙb)  qgfd~|=rCϐ٪2: eEh ,J5܌4FOH;ELё|(k=Lqb=.0k;CaB@>0$r~mp^|Czӑ:CNwQb5Qn3}%AUǬЧ5?v/Yt'm (@?"ߺ_tGٿudvZ5q`y<6 2#4lJ kIڟLAN wFK*j}>^Ӂ eaЕ_=-%Fx {ʻ)1,ٛ8Y"PZo$91m2%Ȍ;[0VRB"nfR*")Z Qt/ a+˶Y\r $=G4gjfImHc1mA.(IrrE,x+j겡Z63q݀']а*f̑s^IJɰB"5^n7Z~^ߢZO42@-sAhx+Tn АVq,y)WM+IA_X Z51xulZii8#TtϽEduΙe]K IVB G_,l6XoA"yNOnLAcD^Mq#]v, +%4M3+!pd=Z s\vK'i;' e2B, rR¨,*[oe(MNN'{kY: 梏,-Y^Ag Uwª I8zulM\ I<dϕWOH`lͣ0#\ ]Bh}ix ȋtT]ݽv.#d]ˍnaQ6Jiv M'LxWt?d %Z>ܒ_)G?{1u/!\7HՆU8J yǙ37}Ήp`քPEDlWձZv[7߱>5BGW-eU1-}Nd9)sOtoJP-oG^9L,ߓr6QpZxNEM<]jճEd 0fȄŨ'$<*''ewuɷ%D-Cyxp滉5P'zv}(AE3: OD}y]={haY<Ljwiٲۨ@}cЗ#9w|$ Ȉ\?5SbEҫE׀9vI{ н'ÃP<8wiD?n.?_`s m&!1g Q`aMU([;納0(kZg7\+suc 7|\ l.o{ߥax) jeJCm͸q$]3{T7R |UQXȋd2*1M"HX_c]/sz1ȶsj$3 OdmS/H>߲ ecCPT_@7k9l̤PGx7{qzF2L ?!x$ R8b D%i=2&y+,"uOACLW >}5*{]p4;-ݍp62v &Y&1&ש~KsA![sn<*M#zpLGo'3`Go>OB#sgi(ek[O1׉螣&oMlW[=Zje!uJ6 GPJsF4Qa8 j0Y% M'eT5Ftad!e@×Ԕ*=)kѦ'oodi͏ A6JS~ :/;%Ωyַ:̬'69;`_uՒYF 1}r$G7VQ/_jo `T  Wf_ B,}olxԭ*bt^sSKڦ>>I&LE 䃖1Yɨ~8Xp6(.pVaomٓ[zY3 /ri:6fO+﷽kI8Z*50PaΔSt//Rq"3}\MOU x p'ʛ*ླྀБZqcrN]Ўv8܇ B -@NF0P!9:?|SӜHn\b5^$‹sk4'ӽ>mؒF XC{>-Po_WcLvAjȱ9%e f)4T;X▎̯(q05^ވ F| qC[˾Du=i;yfYG#Q;A&$\L !y֓QΆ wJ~tH;Cf-wNdڪْz0g)&´(CROdf2h6]Yta QTZE' ՈTeU0(demw^'uI5J ;;uLXh'g&G m|eE.[CDw']jlk`?ƿ׸܈[.t*3]z֬ǻEɔ} :-Sn{$22kCgwYPHN0P=g6Sfg!& E'QܓF`ID \`6{rzlFG, WTs8BIIFt.h'ލD)iQ^1~'T"L4;8gD oՙ`$n2m] ylss兼ѮZk> }z+P>"0ڜ-@Dı<5&S d8O#1BUeҞН3hCt<5hWHʞ#w_¹fMڛioȗF!%9EE>`>y|n: #8zWurR.)^J ץ/Lͷ{|q^E <c9¾5ҁ"rQ9]ڤSpa[MX19p5ۚ)OIJa9*9@Ի<=V m.r+o*8G K(93,oY@(c^_l̆/ aw]"PE"#`wOwfŽلyVMlLbXVn>uOFa 5+{cIJPBuoK-+9UXrbH<Ťl !ħnB,wd\ "%))\H/DZuUVސ|kw(Lݘ~cѥbR1j0֚iPx3=l^B5%$ )9J.2H䃩+Yѵ%lc0Hޗ2+: Vy p> Aņi" kZp6͠K. XSP72'愰,5)#[-}˙/RFYֽx3qĨλdVO689e><4{꽥gb.:Qu<8|jHZDwjU{nB;xK biUm1i%)K='3n<>eԮ~v[&m^8la#zx8 `!aSkQn!л#uz hr@7$"SFZ, ]N;sZV;4]x?#*Mhi}!k@PEXAbVC9u5KI_qF;w@Y7#5Y6{B1;ۉiXP :#1۴BahY`:ak|LiE:H#b|ؗRuUu~TEW0_ln/5>++NotOo.NCڂvlȜa0Nz,&^zaPxYac -_I-jF[`N阫[11 u95Pwp|MGΫ}(tÛ_0f%>zo*>FQB5#[WGЛt95 t"PCPHvUpa&L IѮ44iAb=3`$l@ 0!A >=&^fUS8ͫq3-\l0]wWƆًīZ񍶻y4=$g)j@'gUR]-y98FE0L};a TRG 3B!OE(<*&6"`zGisl-{HSRZtnv-OB8\^3NۙZP旅ho XR&cɨHE7B'#T^bsNJ)f,'[X5 &V>l*/ٰ!A=t$ %h'L s2Bv"0ؘxub?8YjR$ OE."1} y ;J銴c|b|4 ŖtY:B8 /m:SrgG~>ީȪMݗ3J IʋInx( 3*4eH-@<ϠuDQ ų6:"è; Ʃhym$s ͰC>"6v$YblSJ堢SVXX.zf.p>f&0n j:bfKh6;#/PQ˫`zRg`ܳ:FU5 coK3pzQ'32\|(614fd˴?Wosvɗ~!}?  *N2FQ tBT{f+QyfC#qAv]@zYCC'*AE[x¥-ƃmӻ]8V"ނܺhY*b7y:Qz5U EpbM"QM8ϯs6/i![^8u M_h14k(nA /xe`a{!dQ]pϓ&Mxo;¤BL,Jyx&> UHEN34D⟎l&;jCŸ..}ov@襤_6 rh]f,О耗M$(@ec3~mZ͐HJy,4Ⱥ+2Q!Ax9@{we<28YR;ENdl/N?D:TI0A8..¯;| pH0+? ]bMQx[ÛS^ v1̶bk6Xj?D)/dy]]]+O0'^Y9SO,`3Q?Eg٪A'VbO9K)zeԛ^[7gV]7"&nۡ>O#ի3}"Uk O9<,ZV~-3Kb:_o2@pMFh ;)bsWam Iήu4D1#jX*,PK#8PoX &:)"^/Gp8:-6<\9&j CZŷ0U'W"ͫ].흢di!,v&k"1= x `qwQ=P97]L\W>^e ?et.vnrVNʝkCsSo+ìmWƓ\DQS`bie% Q'1a{{to&V*d|f9IU>ܲd8k"yE7?L#u9iӡ)*iq@Ί}haPeBEյͯpz`Qȡlc}qkUN/ۏ6q}㨧 5@ISaLv.G2hBh:h Y)4XǀًF0Q:{SxHH0,;!a^."ƳfE"gSW@~>k8`ןw*TaBXi@הEMZZWKH~, Z4y4ɘ_΢t[[\b.XUCэȯ5iB{W #3Q9ro3aJR`5>aO[;T\Eռ\07W ,WsVZ>c1uo qmi+$ճSp dp.V i2)UM7 DvY!CW݈k 3і?G4yoہF*>w)gf]i7' o_D*i*/<,ޑeJmŁBbL_z'Xu3A XHk:&2`V%6`Mɇa婦tɧ}\˰{C$um @(l-]GSPSkbژ uXO":JmtS[Znj{kJd쁎E;ΦޱDŽ *$HY(A{&AA@,qr{1I7x>{3nb>#50^YAN g &4(}&"]M݋4r@N \,."1ܣB񬌸^Uq/@u%bh҉$XFHm~-7=FC0i "0sJ#֘VR36R {4&}O[ʧ:y|Ye*'pvJz3Y"z2ݬdHGN$d6fli ƷEj/A{MfF1 7KVKI}Z1HyKQb1CTZCQ{-I ]g 9܈G_m x>a) @H},L,q~H)V`A G?Bm7^pn%&_݆Ԝjv4ʓ6EaUǕSyLZ] 2?M$jF8%hPl u*NcL!F{HMb2#Pۖ?CWzlfנ!}aM k #Q˶56`*?LoMxr$\x\ j4l, hrw ~n˂ۦϺHx\tU6ulO\b_z?N oK%>0iؒ\11jmp-Y@* czVmuQs-uܽ߶f\J"'g!I܊.@nbu:!yM3R:S|6Q3iт M}zϹŷ- +B ~H[# <@-?:XҕEm(*~Td‚t+W8MǡnѾk+F߂ǎڜЈJ[Q3.nP{lBH׺ʖp?3p̏ĸ)ʷIE] ??LM.j0ߢk/5g42?YJ1k٬0s&D),ELr[2&m q}2}3j=ԫ~ҘW 5׶51'GG2*CbSk YWKPw:9VTL#,@_v+mDn5(t,U+&) Ec5У0 $X @ďptP! 9]?[q"lPo0/$GN)xCK.u"6<1;U1Pi EJl ;}@ B ZYX~H!Kyv| %E/;ܒ85 qBV1ol>+3BwCkդ(H~kdQ`=MMq4p|JQ(*nmRs@~)C8B{.) !Ņ+R;*pZa.&`.]=Pb^Bn|3Ȁi7Y6`,&k :!|Yi] dl;] T0*,LF|Rqs]v!8ñ_+ $JrǗy=t߼2ht:cNXMPq@W^s`5Ҡtޠ+κSJa*b[բʖҪwg Z=ZvΙLW}V뾝k5l&Ot]Zĺ&6gtwA`􌕁΄&({X%"~im6Q/ZFaoi+!@WItq.gzx`s( aPI6:Fƪ$5ka|hXGi~+` NJ/g6|DzK`nLƦ)Mk~VgSp Kb*t)8$A]!jB X\Ғ46MXXhT07szD֬E1 &m=q&Tr\{cP_q_jR+wOiS*S#mi,OJ("ú9 &߱ͳmjj0%?EQ6;,\?t[  4j~Bz2Z\Li*Wn1^O}ys@ȼ  z\tQD_ڵ0؜>jPdhvolfٗoI/%G,Vgq(Cwz'|twEVg:L"+H@~9q;^q9LhRV*?ڑk}Z)zR!6'߽<;3! Cbe4z.z',:,Cv 71j3Vdlޥ+D.jt[ iڢ*⚋@VnNgfb˒<#$Bg2A*.}CJr<Ј &1|;l}/ Y lMJ14`?N͓8gЖբ@6.z6b,4 dG]5 :~ăӖ[V^WCxTA u2- zHI9~ g1xhk+jFhS\V'7Vȩ`x'^]g!Kiu/hbQ^sAP=:ް wd"ѲryT6k"KJ# NpbG}G:Ya'+b7Jʣ|IsELs ޞqݥW9 1$$z9fZ:N ;w9e5rQ<67io52㬽^`_pv;oK)<2(eS) ;RAOO @,h:YRC{i'QX^jeS.{pѶ|Oao- mH(GuK_DW?Q(7?$3拵v0yA y&m.S|BdE0 )䤹@j|SXݬrIH1DWyT\T;5o@3]V0XTg ISV:^z3G1;d6V>7B?z+=J')%pY2I;ThFVpPs~.0Y5Mp"{@@WRnO]rX}56 "sEIjHYhc2\.0\H*?TS|&F]b'KI"ӈHH(s?xXRyQWq÷"ΊFYQ,`d˜ BTPjd 2 DĕY[[GzZg6Qֻqƿ+f ݋C[ol81x9 WB4dîm}` x^'zpa64vb&pauc XNvbjֹ) j 4I_ mv^"#>1>ښUC;9c!iڰ( <(Yc% >@dq)n#+誻 s^"}[ 5oLt'/3;b].OCMlt@>v)Uut`WMiM(j5e6jF\QܥDHDEwP]$i_X+>9J;(E}{ MްAhG;ŵV-w1fo5Y哦ݻ[b~Ks!f<MN̞ÓPh,&CF>9LPFfH٧.2&e.RPV8N.ioyMedL>s-}!5.vC˩VUb8KGo^# KQ&he`R"2ܝ 4hU~V=dNx۹ܚN]6NI"IpLCaT-W/!iRӫ-;oT WRjE(6arvoeb؞׫9 ^g&x,,)̅^?5Hn MҴR[mXÄ3 LŸ+U#}[QŢU UHsK9\ P%88rHNz 3f$JIkMe A t}J|3[N}GlھܛQ<f\Z5/Ͽ]YȻe8M(_]=5576u ֗,徑`@W/H6ׇi.$Հ}zm+}DtΫ|Ġ+!%)B :B- - l͈yԴ.it`%6cW6 {aI<̱PЀ KmFe/Wx ռ5E~\tAEWV] bC#ՁzrYHF齵r[>cNGґױ]bWsdf"Bex0QD^U "G4rzyl$ajcIDgpp߳.VӈWcvBD|u-P4YA-/v1}]tu,:uGWp_@b$}v;uxlUϽ܅xVm7]8 a"}#BZY P?!ͷQ{ `mihM(,:C.q1G&s69F~\QX9NƐ>=[ Gջ5qքx"Ɖ+.xܹ-JQ" ϊܼ5ۘ̐~Cly[E"L ζP?Z7h& Mم/aIT8nB.;6uGF#D:?2JHt#-$IVNhMˁx1(&ł>8%O̳=cY$/ b7NBiigV7Mlԭ~p2WYl!7SbUtru%B|]ڭKEXA(+D~;Qa0_,4$$L6Q4"5w.#&;oV|uZ я_רц~.S&0kLWuQqi*G99FE M3wbE,6Ut6%%U`5XU3'9PUvA2LCw 쳑c71|[9V?q5%~Ƶ340w \뜵^&H[4Ԍ@sV9Hsu(T{-jm!SihOh^Zhm31E2 HA\-jn/HvBb9%3Ko-k>䗫eѳ+h> J)w]tt?*0xUmp*pZ" j*\N7xT -g4ׄC%.@v"2Hن&22W9 C_PTDڶbZn`Z'KCdfVzc,f =L6m1wnPi o}|,7Hn)e@HN:X5zGW|."-_T?1AWCH!'iv+ F19Bp0%@8 $d4\@FaƶX^W+b/`*ڛWEA&(Lȡ :㖪Q9=gu%#~8X~BC^-y (p EJRw-rg/\;' gy!y̺O?cDf&rxDI8Be2 f|gr~ CmAS{$3ۅ{:VYҰ뷴]pވ_}I\^)u fKıړY愝5w*ߟ|̽9̈#5m*t7͓ .y5ij2,;-bKݱ1~sZF@5HN;iRX%9uҁ rSȣJ6G%,,}fikXɰ4|$,3GZ 1'ULyarg-ΚtQHvҴ?;7/ W&c_1IB!;k#ե-Ky <߿/8,tQm;(3j0=Jʜ)zEY[b,7 TJezJMYCϰv89#&HO\H~26[lؙt{^FBoG=BvxS|JX&$= ; eO qApMH' ^j# S~ }J{]H'7s[ O;jQ#}GIe`bQr\Eeoa^ԜX3}}`I`0D (|NϏ"2QIO";_WMaxȫYgM/@xUoтǼ+|~3]J%-HVS<I`# 9mtJdlxrGtOjmpL|wGqwaGɘ6줮c0|[1H[a,Z]#B-Y~do* <؅[+jJ/HJǺ:h'i|} )_g2V CfMCg^'Iw'a̜y(*ЮV 4,SPtCbFף 9ff|Qofh@fΰBMrIQ8ęІQt@;Pl4/τv5LNZ .^5h^bv錗V%-_GL?H(ksI+ӎL?5Z4k IvDAFWiDܓ 1FKBA?8(\GQ<0y+ұ::˞GI_CfhXsI 'T ]CN({9K@9I^u~`~f2(!\g1?799hӭ4 dz3) Y}Q=1@؛x|ƼF0}lr‘Ra ~>sS ,BI"i֬Yo׀}OȊDc?0ZE엸z5& |E7 ['DA91zoDhRuTsǝru2Z߷dȵ 0D:fQuy'q+AĚ`"*R r@:诏(P\[V+H9=`6nq5s9^}j.fT= IN,_i?; p($'Sʗ/\͢4zBN$ = أ_қ z149w_D)"LPns-4ilBS z^'*ӰY[/&3,`oe $D6C-Xu0aט)dRf"cOVj[}bC uh&ؔ$B[{}?5.o9ZEi*>9B=5d-Kպr<\mֵD:wpxuh,@B^uˉ{-K+VXx`*nLl/?3@ ;=G'"0h#9ީ=ٮKBߘv5#M]u>moг(e$h<@(g:2,H)Vh_늅rOZd&t6bX+*ka85 E r5g 7NWC Pj>EÆ5.2 xbZg_)rfe./Zomc.l]مoޞ nO4Q`mQ#MFNy4vZO;eNiޮߝ{۟37 i2qv6Wcϯjc?.%;k\+#_i*Lze>s";@-̒ϯw0oET`ǫ4!H cˤHk]W9g{da;! 0`1/CeS~$WPd$lngTHFW)4ii8\SS 2 )ðd>.`h4 e 4ՠƅ^xCŇ؊ACoTA.9d|ܔH>^muT8Xf4BCp̯`*#N@ɸ;1{&@-ce'v&>RR֩hq~0A^ H#:Rջ%=7o|O2EOa2A,ٿS sM n` )m/Q3;wM&^T/>I [5,H* 2/Ai~krPJ2"&JI#d;XI=uC>-PJxs;nAZ;5=9[YIǑcN‘P(FW CEZ}_19Rk?z.,9~[OE ?(l;h~dz3e:ǀvGNWHXR>uS3AԷPYm#$25#@.wPO-0Ԙ,qz9]{|?%^nH@WmN0^m]z dDn90S8j/7&XDN'wg@omgґ #Ot4MouJ(v^t:E1sj~Uc-6?7ۀ烩 -iC x/ٷqmIjwqPx '闒;_(јd:-Ĭ4d- pmu V 'a'"o|t~&iz,y4!;, T՝DJ{#ߨpJD S'(eb}ahidQ k̃j`^ ǣWlQ&4.!AIt@V|oZ3օNpYa|Rۼ_]i%ew;]vWm {ɣKy͢ŝ=@;1)wx$l2RMnS-!R:W?NCQ2}wߘ$qݕ[f@U&;4iZey5_;GVn) ~r~#OXxUD# =>h{c媡5h'=),sP1|sRƮ{H$2%NW*A 5O~k2*f #g:JäbQM 4`>v?`cj_؛8gpAjh>1YDwK4"VQQ޻YW/]jIսS2KAbQ׻i!+)j@a +_(@b'|j(MLL/k/nt cزt_9pp -@xt!٦G5`A<:92=ݕ:V6KD(* G 6xO~Bi(~'c osLqo aE+LM׺ÚZT?\-dF/' *~v^[\gpoeVC? @fQ'גn1[yԳ>cǻfVMj DPF{gD KL<6IU.p|g.LNtp+OZ-W x_l ü]ʤX' {xvk ȄPz`g+7I\ b}LE yWPuABW7D v贌c,rh 4Ņw}Iau `sT3Mn.6lFLl,В\TSء 5NJ /|C 4Zi&UIˌyzL"c3BE="R/[0֔5ħ%A,OԨC7ĘQ^-W%XM_'2+69l`Zh=&ԲTiD&b߉|HM{Bg4f[D7 `ب~qGU 7"|HE{` ?xƬs ˘vQK> )Ki0ίɎE\qʸrtw^qo獗jQA 2r"DmDiU\ֽ|Vֹ4`߼5b,?؋3_-ОrڕI0V]XS|[rnX*eSAϻ:Yc˩GI-f|[_1L+ yB3m*>â j`3:`:dzsK"Sxfl~yDnj]xpmA}zB} 6 qkL}Iq]5+X# 1yh-c b] Q[*/|0X3ʬzˤoҚP{6S?-1aWԥZ}Wx-ɘ CS*RSCXAjޫ2h{YEkvP%FkI1kpgʂL0 /HP'gct, ]xvރsM39,I60`@4rG$?d;ւf\>+Nh{E3b4L$+yaxFNsgn]nV (8g̅X

44g`Sb6ZÂ4X&hץpN{a4)i񶱤d׵uբYw9$YP>3Sҿ{Z}qS ^9s->ݡSAaNX,_rYr> :iWjw3 ͘ #;|SZ㣌xڭq|uCCaoDyb۴uB;&Bp[p [$ w78t d U7WdaFz"V^[dtdi3 WaA 2I)\{vz# D"Roc pO(؍<]aS/֏nb5 Ytgx볆0U.*t gWj#v:ir#ęX|Jq.41RUH$T@A:81tv!,iGe) #CX 3Jޘ.Q"{Ѷ9Դ_-d +m kn> /G#tlJ($}p5·knoV6PW8tx o{-=Vł]$pZPRچ5ADt1h⯆0z/L:+)`$ԢoC<*5E;fٞ'@Cז{y1H44*2Nغ zLW9_SjPQg]l;ɹV9DF2@3n՞[yc M==X^A@\KLΤ ki6>~4#RIT_]82۞5!B Ay<ÑQzBgS\S)ܖƷpArrwXy*{*D^aQ571 ڭ0HQ<;eĝlձ@~6@_nؗ`5l @Zs־+6>*j4l4Zdb%xӚF ~HG-@Rrȵ'l^wrvb`.!8Lڗ(K{TD&sÜ(Ư_݇_ݲhF-&bPz wiٖE)r@-i.L4uOS[.P.ѩh`w6>mnjݿ",__ttbH%){M۫@ڧ%^$xK%Fp>nH2io)\g@5+/:z% =\vH'Πi/$͍V\^R( ±)$#Ո@P$p7b瓽@$H=.$)V R] o%KZͲJ)?dsuUImNM&U09,_by}V_EaŃ0:&lr*y*Ǿr '&YH+--EqD)齌/SVH=ĉ~i:oDg'w&Qag}c<q2U_h!1gL*vǃ*j_qN0GJu[6@V5Q`nkiǾHLC&}DdrbHl ~8qMj{_j HmPȵ# ._Z:[EPU"W7-te.K3XO(#4@@A-!ttS-z_UhS_ڳ9b0i#9q»*gA̿ΖA}=B zdggg*y ?UC|ilp=]yN3PI.6 Ztן`Q13*43n""+n#KT&3'JyLj3B< wMv:& /Ƭ>̫I]6P;sVěP(,GBͪD^Kq3M|V/x` po$~M$俺 ZcFCN<1pv͎R u)[\>+PNԮ=z^T PAz&ߝ!zp[O?c#V~2]lDBGt޶n%U{+wm$ O E l`[E܋/ItBŒj{WWVf`m!?|;lw*q>LyXzʖQÅiֺ~kY91vƝ:C\Q9\i8]D%"aǑdѭW{7 8%r2TF 摝%iE$kG"]p! Zq*-.MbvSmAEu|Ͽ |]`C? tu}p?gHhWe嵂$O_w9BguO :)[K7;ݭӇݯ1mh=;6{)!ؾA. dPST {B?,R,ݿ~>G'X@ɬ>S 2N?fR{])3@7)_m9k캜3!sL6O\Y'lU CX̄C=vG@qbjTS2 f1ՄVvv%(ŗ^f^A\q1_rAE %]ak: AʗV4>Ff_% w/WBjCFcTa;<5k®ϲ>3pkx5n~XTHFG [JL";Ht])U5pʗr;U<ըtt9tV2u}r3cDtO Rb^NP?<30\i؃̌o (F&)85b_ժ-{`$%ϗU> P&T~-*0rPg&pʒ TM;y\s`^QBv:eGUQՅ]VHN01R=٘0J63U*%]+1x;8c.ӎԑX`'nuKfjI?Z{Mġf 1M?Q%[JîHܭu'ވ<_fngW9)fʘʹ01դU1qJ^zE [Sh6mp %;أ_b?" R7NzmvO`Ǹ6>/}g4a\s޽>G}Tc?s>8BR(8kErԵ%bitd$bh\T}-ޅէnؚ){m>}S[*T2:ӬssdQrCAۻHD\' ,i记\n2*$ࣾa+#Mr,<#|拚ux4!12JXD-!+w{8ƁZLSLP$}. ":G}-Zu)lKrcY(xz&Z\ M~ʇT.!ʳÔZo ?e]Eu!w'l >/ꀩ;u Ҡ)*͛'m4:PHoݱk&z:䪶晤gdxb*ME 0$)Wx/oAOӤuMqO}pbN2+^H>j9<qmeV |X{n:[TO0"HqKq4ZCO8Z\nf\VQpktpF,g,uP.I!hL6RSajkQzA-a?ylk:.EkTgcZs,ϥ }u# WܥV1z!BF^t)WNh< lZb>oS'ھWjm 0/dJܸ@O9kꆝ:.#w8@DëUw V;@=*J{7Kp&}#qj% TDTOe1u [SrUL_lwϦEᅢ|9>otZvVu Ur GgoOxY\ʻRoقp;铃m02f#w.d2?ʽ>Gd,="[b"(3vdOL\D<Oшc{mc6ʁ7)&z]#ѵ?r]ŒG?~.2] ׾ͤZ?3 4^ĞzXcN"\*>=,d<6C{`$#}< 1z뜻!(q$v1XMvq&gtC< +xxuJ>)E"aشTgQ̼ŷJZRfYlFO{r;{{H_1~o] kTg4KD[;  k!>@YX6 **مo0-Z#O7zCT8> {OXw"T]B >F)Z dž ^?X[C?cZLo i&¹|Kbc T:nȽaِ\Lɓz9%mm2c $_wڀY_A: 1[Đ6(c i0)jNAĝ|Rž1u(@97_*K;Yk{N3w*oNWF+52d](8l=G vZ+ [vyTj'j CP5tF.]\<9^*;R'~U;$}CǼsjk"J!n 7FT*s٬'~001[*9kf2V|ƒ5.r M3X#8ˎאG[*/f]!Nyw5,-OvH^9%㵺x֛yͺT'򌡂UU]93aԐ뉯qbfPnRgMI@}.Y]UW՘ay)xfm4{uCgQ.Kl$ħخ=Z} " i#I3I~z*e͖w6ذ - ̈z4?غ~ҋ}GW?tnsZ$[6*IƯQY=: TbZ(¢ړR}6 qpT}p!+>i"41ql,%xE9U[ҊIQkmQ:d2! O:{=Iphp#Q YXfl 3DGCBؠFzC2] i]t3{a*5Q9\ _~CUP`B@#W+hu\FM xъ,MT7w M.v.&e64FX5(/4X>L:D[8#VzmK}?{/(j,:ĀsZ@Dtx!`S'4/)j9g%X߱)rޞa2^0p"chT/EƾBb:2R[Vy ٬ba;I]k nO6 )]\%XBe=įXyi 3QǼ,WuA!AgYl7tZ<^ܪ_L!r_ dA7"?G=='fz!;L%u 9#p2È$Pk XGcب7K\.LC[o=ļoxΛunå$a,rYyS>WMt`}Q| w+43J1qfzpY4'2sC.PWzLq ). 6Y.0^p1G@ רތ$ YhCBƽ*LT?v+RwZ,""G1ZCH'AK2I&𫼳*.!'e˶U[h;; ebևhJ"`Y4e@_g)ǜ#tnKtpJySw*JsSTO1sD$-ُn3:BhdE`ꊌV%;`q݆Z%1Uw=5͜91gNJ87x?l̥aVWFDaA8e#״4)YK D8Vn%h›i@'VMZ:J%=ɎvkŀdQm6XJl Ah*d}*8T= L2Vjmsz!޽Xn:/YM~G+{Cǘ6䀫0ң:[7L 3U^%n~T-{F#>'ksxi,b;]rH>6!-Ed([Lj:~\AV== Ddj5 lJ©8:R/FP0Ofml@):8_=Vqm϶1f| Bÿ֑WK 01PSFGI5ۀv"~Ո3r#=Q92ҍ[MՒ 1}?u-C&Uٓ·"n" X<N-aջì/߭ۡd<ꖿ'7Am3 e8FIl_ZI؋ ߪ|QHEk)ovύz8s!|Rc$bĂ4>6*z@Gb`y1dnWYRo;Xmtqg-=LlnJ@$(_5w6hXm*Aa!/X9Ҕ+RFE+96GNT 4B6Swߴ9vC]%+T|@VRkgO n۷)4Tw.1ilS^!ЃJd sɥ#oO\/8-߁{** 8n+*/U,*8' 三gnZbe KҪH$Mos>(wTɰs3)Q\b9Cn/k;|SA׍k@`IJ!x6pN44b t_:4k |,zѯ+xrP3QQkPJ"M`|AJI(ؽFDٕf@b_9 O(ʵ0,mNJF0&> ꈦpQyXWu7W6u%3ؚY]"ų ]P\)Y srs U ZCO2M?Z2UN?w_e_K<px%x&CR?xS:F 4t3iC>Hk+fՃ[<S&F)y.n(?gs5H2Ev,w]p/AJ.[SJOtJ":jsVǀdZoE^1u_ XM'IWM흕| Sy z ,8Y ECh&  &ߌF' sS,1ʹONZn0.Ru\!lQ6(_+LtR73+BU,"骦̤њaqqT%aLdoLM۷h~0󎸶m'3r ")ZO2wr9`C;:\hA"$('ϒAUd24r7l0L'\+ \ Z<FMX޺vPVx ` e?e9MίC DeY~<9Fd_'/EulY/h(;f/|e]JmPTT]b"oy.\Pyޣg`Q k AWlJ\˨ -v;bҎ#:hH@BtpNR6UP[ 5wEC]vV߄@Ȅ%,o'Kϓ ҴNY4K̪AS$#*O"0N3|w9&hwXHY@*tt^^f/$\տa| *uNXc<jdTyvnIgyVWg|d͈ƔR0)o'wˏں?F 4As#HX|m h07![kz30>D |I}Fy0JA kXE^ JlɁ8%r5^0v/^qpANٮ:}0Kxx"!g$Nk-ѸxZ`r) & UD[H,x'(Cךo #7*nJK5S$C/dq.h/>|6j3ؔ,Linl;+[Fv&!$vaW!Ue>ޗDkPL-hHp;o5wɼ_?H j#_QHX9t?h.QU)Z!9ƅ8+F28 a7&RMdg;9-lU_Jx+DS!(G 58XԼlPxz?wgr[_Tc'&&WkT=tYeB/j- @{6L"'CSZk;u!ɔRZ{51Wp7;M=#jz@}~EI1]֮ O.OyXŖX4}\= CE5̤YKzU$iTx^$n(TCh(+ ŁNٗWOTgGpRۨwuC()vלyh{iv#JkJm(o H7lZ& C~P>퀹^nZ҃ޢXa%%9/NqȦ#OCB ;-UIVdş0́Vڑa ;Qu4I*3.,ӵմMݛʋbâxY.?BYKybSZpX䏒`gU-;5B2fԅZ QnZJ\+Dh٥6W͒rI]ֱ TI D1s;[HBhH7poW_12j? H\" xMK 18X3tW96lFB ʻ6myeEeM' ' T+]l8~h ֶH4(ũy)CEƢ b?O8Co943+U 'qz1@[=c 1/"wP!Xs>_+ٵkze0MSdا&P$;-3yGoõe̊xylr*Hd*wȯDHw }YLGd@Q~Ѷ+'"tc9\[d%4/ecvfQ=MJSCvID@ri@pΦ sof`([+qnr(asꪥ6rQ w[nsx,zwG1c͉ΜpE[&-z6j&RCC(_`Vt)؍x lOYv;Q.gv`+nC!?*6nE.0ަb93??{;PYΣA =3ک`L)Ѷ*v>^dNܱşr=p7 .Jhhr6B:?w!+h\;ݫT{(7.S3j4VLnp ROH;vQ/R`]6iyMpj ιi6iV0(8W=3hQ5~2 7U_l<~W!kd: kx}\Y#:Q#*ҿW)ݮyA:Bܕ3fxK}lKGk Y,m=̫PKZ]M(RpZ' eJI{1TxЍcÛKW0-'$F\s%u:̈́C녊mYԇhՈe#+k­}|'ԒˋѢ̗NO"{A9hmI wWo{l=f2؂t[h_y]K$Qsdž;$f+f2mj8oygyXxt i=-;Yֻ t18\}բbi&)w0 ׮j|nQFEr /@y/N0C.͚[S7lv^ L Qj_ٜ-4`ϟǕ'bMY*p%8וۈ% |<ʣdDk`ip rn؏(= ějs8##w- w.f ^k&֫Z`:?͚H@|SQ:މlj\OO=تѯʡKs/mn߲X`M2z/}*ݞ麅E/~| =֭rA@M7r iQ*UQ&e}G0*kegGTFp$`}u(~Ǵ\Vkŵ(nRJiYmlc#YGv-*&6/%vKw$WH!5"u\'8|ow3Zun +Bl+ ]o78vdr`M=yJZՋTF" yNz$ q̶g#6`iDZ7$b@UNp. R/]"Os͟m,P'iFi+&tJt6kQ:i*zqpպ#sH\@ \f$0Ph<\i@9{V+^fjBvGrE {ML]yĔI֌m_MPU:ʎ}3'kR@-w3+ϻ\Sl>T!B~4 8!6dBJSM|5jӇ$x͗S}iwz̲pE^cw]†uJ3C %04mTY#f=JK[F!Z )2¢WbZj £P!$[p*Y=xړ,Xs9тv WP->rN-%ֲ`U'j{}*ȓC7Ļ]5ln{`< wNvtE; GCD&qp^S`~cD͏4ۿ,%ēv]9 Sbj{qb@l4i dnPS(&q&c]-/ di޲B4_H 5J_zW7\L[CؤΪA!2[[J3᯽\֊,Q̛hZcP&+qDcľ،p0.<[@K?VXjvϳ|vtqRX(o(t2ӡx]AT %^[r%؁#v&~ ׃=%෾fknE}3.;Mo%i'(TPꦯ|^uvswͧ=:B5rV{Q0fVΦQn i1a:XR ʈFVS5EQg]R?VBB:,Tct^w}Vݪ/a暕er6Ug5~He^XQEy-ƌ_M_@uS `/:ʝ01.hSˣfkͶUr'\N (˜ iqp&"UF*4F ʲ Vz =T{S7m9Vb-OLo:5K CcT- "ut9Jx s CGGYV3:A Ioޕ7 !>d)%ZD,[Op&>ZW>J#g'xPےS)a=ozɓҵkY1rj'0T6aׁfIqí6 fYuj )vrHuQNߔj^LV0>r:}e=覎gQ^x~/ڕxKv/o>jz+\w|m{x 1h( y\֏w6;,kQBJ0E.+3I}RD͵|oz2Ҵjat⒜N?Yҥ7Tsg ):X<\l'Ow9;Rj63Ɇk t}Ȳ<8͔&1Ny&h#A/;N߲ckc}7ˆ+t'A_`o>vA$k|(#=vh³[$G]SH,U(3Ӡwpp cΠΝd/s% )a5;)i}=@ ,kzhd?,@+Xř)| Sk~w^o(]WןqRI/+Qj/ODž&ّ@g|=UjReEц2;Dl/p![OfDey9v|S74#lqZNDt3vƩ]XEfW 'ZhFpeժ<:nMmg# o)zn$:R'`ZDQK֚) ϟV*-őzkA%tUj3ݹZčm/D_AگH7&lP 7󁋴°Xe/|o$H/|CѕٜˇcˡEXvm0>)eĿt!zA}'*<[(_3[x_oO5*w ! &aħ@l|P:=/!M[0 ?yIx~+TQXj*w|RS- d2dyPֆUpAS'QV@A_ 0bFT6oHKh_8-gEM<[D@9;8O4%FF^|E^bs-w n?]p#oi5oXjp͸.ۺt[ȋXAOĶ;dzω3YKSD Kb0bZ"fgg*x4,52<g{ Tpa^zor }85> 戸=KU˫c"&P#O/A(JTș}csD!_Mf)c1oܦy9B>kl)gB\tC C" ."|RwL̩K7bIfDzRX/ >hnGmuQ'cpd3~O7)OEMo-<2nhkBI|q@UOm⡔[T&Z}o޷T9%?Ѩঢ`R=w*0xgi^i-5G11~Vv޺yʩ![̵V.S'N=5@[@%*6Az ǧ *@B,K}ܙ(H`'1 ߹W!uI=7]^=jTrVTq.w {/ўĎthX?g v҈5KnoY+ۢʶ?-2 ;E.6\6}hUToeqV1wKp\<44M ,6Ѡ7$KPqL 5u]:vUmcYIš(Bm?cYtn0d./4b*La*6D5dhyr\UVI&iEFa&8 Id-X'mX%]q>Ib_%]WrM9/\+*쌁E:d“H`^֔0]L࿀}㩊RFZ^j7O}5M]uFOTDT}>]2 )~'O$ArNv#ɜ꥘Ge=C|gWBu4<=@Ñ^uKB g$o['m!=ex ђ`^73r _FUDwO37U<0`ɸIǵ-n/hီ4ZDŽ6[+ '4t+eogqί`K'}KV=0|*?⠎W[4g |\rZP: [In9Hq`{%^:]"װ闁AMv^R|A(`TZWH|nxB7QbY—)%g{lKyMpVwě6"zK`y:x|=.ģp*V m~qu h$l!X F|xI_Km`-#2bKPOb< ?'~ёG?ØlEEA`.;zj=E&_Ŭx(|T@O Y<6:NXxe$O0\}oP 4iwfNwY;12c'R@t0$>r]DZZA,P `lt1 I7h1cۼbO<I :H*Ԋ|<mJU|xf=@x/̑TeqSGP|~:;MsecfF'S-YW(;,I|%,gFrK۟U\ҟ!7L<>9UC!-+Gl!DUߐÌ-܃&%5(NhFSH:sryƧL}bO?[Vaj0*'<.BQ$N}2b) Z;cuK;|˰Z-*]Xƒ~ǖ{TA+78LP%M͝ m]wP.*~u-n.P?)#S1B{O%_ +;7 )B "Q|Na(\="=jdƞm#tk/E kݗ6g,gcvZc gP2M+mZ/T~_$+sGɎ/}.Sr!W扛|[^a(JP)(!<kll\M;'Y%8(AB$bK}f (~Av"cE/(WgGuMiz/bvCDMmܘ46 W[1_+Ć @Vqyd y!⏂ڶKJ8.$TWL7=e4(a斨Ԏ(֌aԽqg~ ա8_Nj”©CJ<$BpN^SĢ}3[m*9hYe.N5 /޷ \` i*DtMy]D.lh]D.ǩ߼_6]=x-,/ɴg@ .2V=8sEM GW1wgdS#_$(gӽԓ5lz8.@l/ 37Y +8nE]H`b^PԌ(6Wz*YM5y~@W 1z+D={$y]y<@Feu!#ec IJ tǹ J;|Uhҙ)Fk[uZ1ui!)㎏`{-Jjp 'ZϘuO~4[M7Y`Z;)7T>oٗv&71(i&⠐3dUJՔזLFDM 4&0!pr>.uqS2 Zoo^'Y=*;"=ܽ7j"gMoNӢ<{h@HR9xd ޽ܺtqWw-Q(n *0^;KJK+Xd }2(Z"B>OU`VT{gFǻZW@1* \9 03 C?DU 9j?pFN~dS̓o ]OH8kNk "i|dy,*ⅩIҜ/`p~F!#+oCL?AZ[d6K }ONIE?[D`oRD^#JE (f# '+/ 3zg^0!h@b=@kRu[w26? Bj$s6=9! ~sKJ?ÆSuC1sK+^Gg 8K_hPwa ߴM[TXXKsbrAARϬxWPM3Լ/ݽ;O0o&ظ˕=u><E F~E8 `?pYRGeZ*o'W`M֏H%?ʩJ{DAr~1 􀗘4ɸIBNODh,g_+>GU,a3S)-]k(" ay_7|5ܔP uk):޻wܱw[5{Nе/.d De'cokmAOZR>6M 2w#zKI2TpZWK}{[H5)fUG\{[ptl+s+ݔ尯Rhceq5 >5R:,/Xbj Ό5),VA ae Æ㞉k_a/!MDTi?bG:'‡t<[pO DЃ9_xjAij:RF7\- hk(Lk~~pO=(#EePTJUuN)Ks;bu}+cD%*kZ&uwM~sq/54b{}1k+'Fdѣoyg}g T=F` a.T9.t̂7G=|62_U [ն}\X[ '\[,xpqVٙǣS|XhvOiik6OIYBx|iM+ϵJ Shʺ"jn 2FV!U7orC,22ErM.\>bgXp1=0ʶDm*k4FČiފ>Eݞ_[b*ոm|zjyH^n#S:Dsqo]"L,m%.ЈSH씀pXRx I^XYj߰=.g;5<ܫS7+hՠ"dǔ7~]?,{:)8eNljkY^)}yMBy>mw$DF4hP\.o1t,5ío~v4j,yjLkɤf񿒝#w*䪜$_f\} )%e ܳjJJb@q,zKrݨT./,d?c"龀<žst vtfHl*6^F8 LЏM$uRh^q$/VUƇs"?n Assp<0.G@[Hbĸ*C3yar5d+7Nĕaj] N#mBqLl%Ga(yf! C%#Rk|~Bs<@=4G'$+3Q*͕%RVgFȘٮBF*283BX5)E9K`\tp/͝Vt=KBoknL') G"…['+樫hK2VuE:j/rHauň-hěu/=M5gWMG,KL?(_%0eWs;F#F{vL5JlH4mŞ2vU v& 9x[ Pܯ6aj(&rJ5#Z]5;938"+L 48D"U۫ĵ 7p[2 U~ LA Fde8%7kVsy=mBkSet2ͦ5#zK6p7o߆{R!ț"e(*i6Kpi~+\%Cz\aDid,-54jOή s^ D¬1*8@"l lW%#oFZ;\wl}wOnm~g_ ߱L._2oE+oR})( gB)(&katEJ'<-NwO.>D-UF '4P*$&9LN*jyN&mMi+\ \gHL"?i4.i ByeYJfQpPB >N[3Gڛ)' <~j=CXmL\ (oadʡ:xUx3@ %(=mYUnp3q9jQSAy1ƙ)4 0Xңyf~t`Za&拎.fYq/;=I9HLSBw\ vNK0ƳkHϚr{?$pn()/Y.;>&ݹf5bz< ?G9vg,@&fPx0?kvBuԝ/ff,vR]WUUo6+x=?Hqw%X77/CDڋ,b0dG[0ơyϥo냅ꗐ td,^WNFW 0X =Yl&.k8:_F.(]v >:~ %'<dz_WN3-A0\jh\@۫e4F)ͽ0]3DZqzyb}z4r$*rpL#atdK,j"װf*P&&A?p^hTǢ|u账HK^͞\3 2'2pB5@ ʹd)ɓ80R+ ćV08?LjX|9-Mgf?x d=Xz!x`D7@lh* *TPz :PIm0|=es=@Z$Sބ+a1K Tr=*?cy [2y7P:'0vVAڀ%tG~q"XNt NC(dxzk[K%y~$Ę~4i dv}X;BPNjDqk0:CFxcNZAm[1<:Zx]C\K^EwtUS=@0Xi>@A%]3^e=X7 Og%Hr=R5m;u[bJt>sl a[=aOʗR{r55WI|S\o6%M]V}E#ؾ Wz+&a OU]C-tkV3!nFOv.grB5fzݭIEhm&EJhV!_&C\u0U5瀻\Uz; Rx}L mn[M7,"Lui ո|!= 4Is!`02i7ańn b- A w8؅ԝ+,pG-S,cuy!Yghf 0[J:;RnRB (֨1y~[5 t%BEO1t̒oWęP^U$Z ܢZb׬Db!pl=t^w&#%85s W)HYv )P.gU Hi"1D@9+ (řf3.5_ Տb޿/[Fzf)aBm9b| wR;4..T0@hX,\O҂Ppo}ݟi9B+S 9!Y`tj%[Ẻ|Zv-0xܗ YPl)pI^K+uuvJ5ziW;=8,oЭ_U^|677|txݺrm}x~w܏q] cYo+vS7pf(&q5Ÿlp= C7BrAf_nI2,"h-j.1{̂oKT(6hx1b<yM4`ݻ#ʾQMH-+_~uR<,!Cؿ_yDɒD{cX\;Q $\D1>UFx߆8/n,sUsCn-ԏ7V t6 -ǞBfLՖfcljهhgkƷ@!АE'}YbF;8.延o ;v3fIl7㚯 -u޳w=gWͺ1|:E!Z2ֳm[ՍYBVzDi;Cjß,yj fo9_N 4gNq:RKqVduaH/Mz \@,Z/-ׅIYV{d Ni؜#QzΘ" *5 XrtwgD1Ys`=M5 !&@cT-}T_N~uV<'ڦ2-df NR+XY?5?\٦su!@.QHPMw1z{8xhohbڪ?pT=6̊ƆAPb|W,>Nc:4 칃}uaˡMFUt V5_BjFŕGӑA4He%sC(dNQʲV˻gQODa>r]Tq1D-sdѻ" ,6ֆ>L="$бH>'U|'syW|}n"ݥS"9J$mOPAo+^X-1XǮ[E>&\!_~f^840>018 V9Muj<)Ʒ7X}#4:`غ,s\ PoL:-KmqE *|O]G&"qc9ʽ_=T0 , !sYR鿅Hg!18pGA(xp~Y驎QhΉWtL=#}x6^DA Ƕ &1E^rJZwhPj$%m|_ 2#j?~[=Bw4ؤv~BvHäU1)Ze7!5L"6[2(= km&Yk5QzIDY3Aԗ |%G#U"J1鱄49i4J)XSj|a>CIeb&Z1pEn7ҁli>x$ .ڴJtL,MᾹnpTǩe%ƈXr>W@"_M!FckK88- kKn kib\/[$`ciWGqS6 ө?#h9w0ayNfڂ ZڰtP)eT9Kw9}4PP9P?(pvds<$rݨ!/OlmIzBi%mVj4;ʵ(p:;@ }JHc $^1_Sre'I5\1!.fz@Ed*3 > CԺ H_NJДNG04ˈߒLTXPXhGU?S܋ ,>ELE=7GEN}͠n% ĸBO GpKWpw,3_#`YM?\}WA86\a:42g_$? ˞+^*zk#%m-\c"W] a36tB=+P[ #akuD*oz'[u(㉐$-$<}5ʍo%{jVӦ ^DVt(B&Y|a8 =sH@4LSJi١nفOFQ͎" -u2ROgh0dtV)w~L9*iߍYt}p9И,dߑTrd( tJnnw{^@C/bl/QKjBJsS4r [;m4K"JGbNAe˖X9,qUMq +'rT=,Ϯqb>`@.l< bkIˊa5v8&`燕o2!OP゗E8o 7QO&6,dؐ=G*o\`(ޟS%4_p&ެ ˄I hEiSx F}^s !\CepfhAN(M0*h.*M>'h"SbOj"Ҵ McXE tAb[giܷrZXN!s0(O;ƬWO&)%uP 鋇x`z>lp 1do &5X7-S8LA7"x(⚝: bL66lz [3{M3Osc,&{%EI_8 ^bTwD<ƄM5Hi Ll'a!3 W8mJ:A=o洢3@a`i2+жVa)A::Kh9g0% \ȁpfܨƾь qw` `^ ,RkiJ~}0z/j|/<`'KŜ8R; lJ.%it19IȌC H.lG985x6Bi!Gla[}tCQ9ű0%?ҸAhP[Dpݙʯ6_Ge.SߦrvU 'gqI"!D^tzG&UUZɍTKly?QEArth ح oU{xV a(t;z2D_luzʣ E<-DZV-r1lEaMWY\8v%m>BnI1p͹E"Mzs%c|knpZ25|0ך' bcܿlyP#V(exp=LQW.]"' [j@B7* U/PPoI'E*I]q;]6 ;5kb`8{7PU%)p)I;ɵ"WcD:NcMt`=rfgp;&Zɉm$[yVwTzVD]^! ~A 'CRWtb):eWdLsC8zjɠ nGm.a:g7S"{o޶?{_gO,cg`cԡ pGE~_Wp@APXAꎢŅ\o.%CYDa7Z}"$y`83S2hsjZlR2PAF< 'VECO <ಝ(ҁ'd=X$zeNUbPnneA!I^KfS(;g"T]|,|?.Ǥ4Rmc`bA151)1$X:m1uI6OUuk\,gQ#NQ7cNu#w݃-7)#W(_w}'`%|-No4IM"dޭw,P#X7(dAZ*! nUkۋt\1=ͺ)@zBզ6EPJ2JT髃bVlW C֋pw8 s;i6!gvRYޚޙO޽ oۖ`oG ͞aWc53Њ[ޫ2ȈKBRҖBFИ.i+aDL~Z>Enj\Ǹ𡩱l`<"/M;:-i*užqXX%UXV/$4NeuDĬWю#iJU;3' `gR;FȫiډF1h}rbuHJ=vt" Ng`)vԡZ*/1ֵ=ϲ]0 : !ͅe7QqWN}2}Ih秐!}E065S?Ωz#Y[M0zȈ tRYIlPOH GGn +ʧ&̞ k!=%-мNHJ9BbV@{STg;.T""RRK ER6ZsӪ!o/q˿=9Xi J5ş跟\mNb2#VT0*e>Vb?Kj*I+K_ "n])ܹ𰟛Er oT^> Rau :v8>p6pM{Ne4K*ۏ*ݙj%\-":VN|Y  _ T~0PぽEd P01'a>C#fce})w[V i_"Aj =^ AGvN{xp&̞3ҹU"S*#?}B( /&76Zfem Jp8H~[ȢbЭ wIkQe6*'UPNپaO|)EؼꬳPksCq9Ĝ782͏VQ$9 l u 8QS"z*l4w=18ZPt女s ՠ:QuG%ѢPvg\m;qvwa>~1ȍc".eBnT~͡zw_3$dqYHp:yyr-g/InZE[3+Zé өn e삯EDEk:](%|7nWWDHiQM/[Z'b^dRaKMs№l|a'vC㋛j$ fuh海!PPU2LrnbgR ^qDU܃WMNeXop,~c<2-}4+B;3̜uC>;ٺaSSINy%g%쀬td ) Y'/6-r⍉C{ʤ@17o>(ySMbf+b,`br O4EնZŸ䠣$&?^#0L7>P9蟀QT*sufߨf!}?4+J-Kn>\FUj3f~wx)h?vUuJRjuH 6 ݾ֮^wiSd_$D{q\u Agn8blYoF‘pwŪԶNTL@M7oz k> f:S=jv-FC& q1hi~KBPH_?-|3P>>&[V`Tp{qk,`e{,[LL="rVq424[Pf7.1}ipS/`cTL4$P_;ǂb4a΃BpncO8f&RtjUe}66JZ9gW(XfT:e1,Dncd/@&Q\ϺrJOIɼ,Do^10cw96LUWrgksR#Tx&ǏڐYU| 4] bR$\gdh^39߇O6):dҳ)x(&LOJܐ*Yo6rl`|Uh6#E@q'3e Fi+! ʡ]&~|LpԳ  (C-pH?VsȎ]ӘS9}fg?8zF{ m'[<z |Sx!hgcFS"\?݆I]H+|A1q=COG33o!}z DpԯImTτr\12?YXžψ6t Z]vvOҩ|u}~8Հ'ζU 1| x`ϫv Lf×ds(Dg> EZN#{`_{F(cn:e\ӈA~f}r]Eu4̗Ql*x.Z{6R&es9\I]ayc>v,A1Wәw,[]&T~ }VXʱFV]."Ac %3V담WNńi#Gbqĭ;'`@)QbسHI|*{ -c흶1:'+_ĖM*!wlysApK36҃ %*%$E!<z &!'FH0ye?>v"p'iD̩;v?rp&gAn-A: Wr*Wкkl0#b^nY5‰]eR˔}E0=䄤3Mu~X9cCZU@ _ > NsT[~wl} ׶ϬES LԐZiӌ ;$e}˭5ڈ B| VaՅJ4 T ֜Yf{]Lxw-V=#0]5(0 ߤ _` ,m3zlJ`m-Fߩ|VF` xy4-AF?Zk: 9O2O ضlvsKg(eNbF µ.`_gsB'h}BR̯t'sl}ket ﵹ^M(`|")q6Pa^D4aaPF6 K@ 2wOڦGE|[ ey>:tfG=)CFʖӥD1cB^M|Bn;͊)NzjuUrg_qPNj؀u0nQ,C`p @ &,ZÒZe(ݙ\^?N7=v b@l|k:C\uzHcug7 ڊ?+Lv܁YSeCi{]L)j+Sop _I)59Y#{a0UY0x&؟ז+eW8=ĆmObc'%s$C>Bhi ^&b2Ҷ^)$`1\XOg+ O.*^ΘFiOHD;<v%CfJx+.XŸ+ "7%Ҙ<nKBZllYHYC>  #E6o (\礝܏4|̍@LP23vJC ta;m<1_5/˨+ek|7nQcsh0F >VҐru@7XyͥQZT(C~b%ޢ"<&<݃Fd}Q̈ptE΍`GjxmfdnPc&<%W^ue7Z]+ Hz:>AP'^n T-ן W]G~+ ܩMc תrK5-l2n2!1[D lM֡e3I D<jM?:&K[x8_A./IC-chȀV6sM[ vT 02SPxN,F QN.՗.72pYᅥ/懸Pӷ^:lȅ;Sfe (j4~B^Vw7A4Y8 qHcB ^iUMw-~ߴu7Z%1ƻ )%'0kJWJngr4`)BWa%N7UpK]04ﶥCBh0|nyLYۤٞz_ 4-Kw ¨̖R}<MۮUU3#D@cϠ@!sqJ ~\p3gPqqbNȹm/6JD PNHŹ,X#)GJ \'"~0X:9(8+[xip"0PuWNLڮ-Y{X}-YWϤkSTBr{f^`B)\K ΰauA)SP_c 7ޑHx#EGj'ʧGښ V6ZL~*=P~_xh̆û]6#`W0*977 =& ӫ> 2{Tj'`"MqbNU@t"W@HxPaĬ=nvoO څ?=9H2F ոq<gy/ܨ VsS8O֧u~ gsv捃0H"N \j?q= !,,foɻjP aChcxY# =54-a(^q{&:u٤@K4Gg-2N0R~D;O"ѧonvv,s!k R&/v 3'G)IEO;knZ!I SoL\~f茘*pyq:JsfQl(3Cs#7. AJ }E FzrMfg=(nMb}T(z+\wMaHYPO F !:ݿ/jzy5%.ý 2E) %Zv= 4sJr`ijHrVKxv w[:Jc ?܈C'̬Xtc~0o+MңvI$ө~j;.0(ngF6VŃ]KpPVo iWq@S2`ca9tXO"ޟ\dT>b9*=IF&4bܩVM{DrJb%\ X_KY{JgzB[WW,Ad>LBU1m}9mv6`7u!u\N-c> `on$x߯SadEЌwv}@ȏ Soc=cSp}?so\ *ez2)(8 sܷb 0"q'U- IsԒXnݿ$2YAJy?UְOsZn)??% }D#^7Vў/ag`bebFQ‡ZxƇ۩\Q1tLz;?F]eRt-k"} X\ R`2OItHuwnC^qh@ gu;Kæ2]=dNÅN K؍ 7f&cn8=&"<Zy00rl٬KO$ )drS0}D)HVu i߯M$.m>[p~Nav܀m@1ADJ{4/(͊SoYȸfcremJa7S1峛ݙ[ qơXwmnlKގ%pDT cv*K(&w5ɞcC{ q$t'O^#z=D0Tnv>Qnz `|*TռhlQQg:}qy7>&ޡQUEaωAi]{ aޜᙛ@vN֏ [W *"{R8S %a_$ķk ΃5(ïGj}a?@T 'ds64 /2y(#_=6WFpm~'a e&:c3|P~10HIu홬Nsyd|`7xj^}&0R$(~"9 ƛm0<ЛuӚbNW:[e{BqqvlFm6% R&Uybn鬭xs$ zs>x}ϨჍBvJ&- g\mGqwdk4L/Y >Ak l2 r ?g:Cp7)! Y@)]'S}gdRWZMo1v$ܑƴ;laރY(LJ&Kpn퀟0%VJXU쎿6 ,j-@*mEnpD[ܠ Qk)XX?.ώ]+6{{!sMkBdSkҀ1+(1 V)Hׂ -KfE܂FY!Y[GG(z xx%jګjVT;34p90Puba)˰ 뭷xTaӓ/DyU.twg{VQ44o2>pL^S⮢@#YYqŖ7䣞q*^[$L%lCԡpV{Mxzn\ko_tWgUA;$:1xW&I2zHF竖S'bJ)Ti2OE(-@腹tuueD(hu_hX<-Mr3)z)&L{[3^j e{[.Op\u6QDv/ =|IU[Wl]gwy&A%*zBoR־wnXoLG'dzǣi9=3a {d6rO׵J#'}L S@K(OF`\BEZ{HrgnAŗ 3}{;˄{Q686lS[*X,nuIxvAuy-D]-|"7 yHs5#q[8=uj=CܑQ:K s:! *(wD  )~Z,86?d :-U>.1S:o-"cGpQ<ۍHZ7@iPmscHQ-vF)|/BƛxM(wnHgFc2Fc?5ީ=O{[wA<ƬdFc΋_g:|H፹y’V W)r5 }W+Ri@/طH7tOQ NZ7G^z)LoП8c:m J>dUN5<*o.M)ȋGf@7'S3U̻$xB{cV %5Ac +>ġYnk7Y$*ӓKz}]DAW JA{; 3 \X.첅OrxYw$ʐ8Q5j42!Ue&e%tX0xax^'ȘJru#~y/r<,C:x-.3W[ j9/+K]rJ錅a&(1 2s頻?H10 FOϯN"V"aAJ2 Rlb;J1p{}``#7H߱Xu^H_N:JsD!Dbo1!#4,C603HxK\yiFl?t~rS%HX7GڢuR$ XemlA˜[Vs}ؐQtZ#Kqwk)+=uc옑uJ*dJN2\*B'Vi_`~;2 $wew #)+$ gSaIf1B󶐳8p#Bgfe&(G'zE㺮 Eg"@yR#g)+wu{SOʎVcwINsWJUdIt5umY9HsEG)=G1[hfaeܡֻ)PeƬ^ Nײ*qUk0a׮}`.[pɦL ܋ j)v>* eT4V)7e6=ip {<~<I6H*_s sڪ J%g{1 .{#|Cܤ?!jWY`*[y\FK 'kqGk}`WY{ǧ$}4>{rQ +Y5g=%#u,/kDޕ"|7?8SqܷVP?o$O=X^^ٙQi z ;_Ku nAX <\I,_?:.N beRZ;p0sխƼ&8rz+2C,}n1)Kt7JNSp;;h~AEx0"m? \%eUжiczj5τI,1!`5҃M7c?~>: Jk;e:4}Y\ eǰ'QƦ.@'-+ҫis.f kfl+ A}Ҭd 6./lY怇7b޳gzpa@^. hQb#G ($`nbKG៳ F/GZugqSf&H4a`0Wb. lWLcb#t!M:K^%PG^u nYLyn۪bPd3q]Ne<\hO :<]$܊oB=M 2gn$N>*Ĺ@WErF' &jA,=:?ŝ'j}HE $0h[!d&fQnxDQKny-\"+*y>H~i@?}E#"WԑC )*/ScZmPQm H(#ڨLzV>J9jȅ-wk&T"(har{6實ՖC.q2i*Xm n7+{Yh_sSw8=峇T xJ̲S_zK"clLPyEZV7Pi~]*'Mu 4YTxݭYMq%?|s!1m)dS/Mf:^ | TT ڡf0IW4cp Qҩx {]fV-xQKl}>Pe8HӬKLPg6\Y5 CA⼉#0y}T)N– t+W2=sU`5x2{ `}]n THҬɇŹ6A͒`xD6ZtFl [ۊ |ATʥ/buqVE!x:399@dŇWYg@)Υ8^ڼ~#{ څ X2xF׽c_r`18& 1ȢTTizES{}1N+F7G0$бb.}roD׼6-ʆve4b= \N ʁѡ]>  !U5'Ǭ6o.Y?-㳾RܼhO}@o(/cq.)5/"b~4:{֏5&痹d Mמ%[Mo=svkLfoC@څ-`gʡw?o=J'9GOe%)Pg㿭 1p PMΨ$-P~^ !+} l3s[l`s l1=z,0ǫ ƶ;Q+Z1 PN8ȃ5(9e+ кw.ZD.,>a7#m%oY:mϯ`5T<ɯPV㲈H[4xOiaDɘa*M _%M5K^Ɋk(d AN?(D `0sR(K20dV8l5C9Aõq2(UTD-UŲ:fSgh4Η>uU24}~D VCXLYVy"+t/!:Y T QQ9\H*eUKeYdMp>!EJ$v=o %7Ov״﵍ i ܰZSs- ]f9-Fo׷=ZiE|y_)IohŴvy|xH8<+E(Y>m8(Cs%sӷrU:m0L .M [ S kf'm!@$O{7ߟ\Dfž$A*5N΍0/#ˡ#.TZֈnYUkڥcuKI>X@¶Z(-ÜP4]cˉ+g4RaԎ{RKц=ˈN_ʨnC_zҹ:پAs82Eܰ$7ZԞe5n6Lu7bzZP7@ aYT`sW}I p}ގz$&Gj϶ct;| 5n y/Ny=O>M|uq㹓(eO*9p ^o^Jsnʇ 4V vr琂3 GZrpO du]CZM Z68[եjfLPFƙ|DWPy?^.{\pe!X7CM.t+#^'۶Fd;W%+W&ԉTa`^a;Z[y.-mWc#*dEZ850Ծ᪜ႻÚ Ge7)G@*lE*`KRMvxƋ{%lp^'3?q{:ȣ-x}mqgk^! ND&=FGK 8:ts^1E/KPc{ik ;A6\Ųzgyd n8Q#p{O_0u"Ix!;A-ټ MSaHR1U;8^ۏ53&bz(Yg=ˈ>|J4ӎ2aPe%/LҬ-QS_ ;ɲүljt<QQ~d'bw5尔 yYcIx~27t,߱$$ H A.Ak ~`]al-0<+D7_q&VXmo;ubm3kj*^ΊKW\:y{Z}A!5 _93l$K7avhnxQk?t{Sm{mFGs&rN1YAT [_+`a / /) ~EjCBO3)zteE9ZE[V(|iz꿒1 (@RBl̇4UL8tҵ f㽃_QCBDi-b@ 3%Z}l Yq]xp|:v::J~Z8.RbtJdeUMKrl&} &)1Hbw3Si3<7s$Kp}Isxp ~ 'Nj{Tzn _Y0$c7Sjqv- 2Q!yCm يy"bHx .b#@q _d[梊Go"}Z߶--4lV` sw$! z2iњшm٥F6t~@l Y'(qo ُ%Qa>Z8`ևiW&HW-yEz~np{zT;夛[Kg^*,47AmKF1r|>ׄzd& h2~]8NZu]d{k}D?tE(x]d͘^sgJat hᇦ8!unAiqi hkF8d$b>\ c1&űټh jA[Yh7e*g|e/(飼.i` G_~4ލ^UfCV7#พ=K(±Z}v4\)ko7,y&O(& TLEf?.<}vИ/N0 c.tT|7FN[~kF +rӜ U}tɽhZ*xZkld8!H_L"=a#L|XFzaHk>9f\MP|ÿtvKB6aՋI"?jpm;wh1cJkH̓N#졛[dq>i C<-@96!28Ɉ"(T{m/SAF۝`4@zE1fh]i,sQ z2[Q{(ͯjIY-fFFj;˕)9.afs@CON}^J%:dZ .Xa> Ċrw; 9m~3O,}3y/-?,HE`a]7 bh+X0dA O ҪG_i͕1յLeGK-|8Kk#@/R+ 9 ~&t&SݭG1ATbVkjC&]r6LL:YX L@ʷgQ[[26d.T@7wj n&6eСf뎽e݂k ASA-چ1^t(xGc!Ȑ]1/Z1c̛0Գ2r&Y峛E 7\*TLa%zk(ǐrwB ?;ploJXA= 4WF|qOƦ \P!%~Y5Fy_}ހXu=0!2džrs4H!oih(5'$Mqϱ!OQ[6.z0+2J@ ` $e˶4𗊰%aVlV?~袵Ha8B-~rPp!6Myݔgvψڕy4kb aȩ%Pbm˹ b*.c]#.GAZ9o"/wsb?! ]"GN^oB8yԝquo;gna((  NJh$0\w6Fig-ŧvwԶ4Җ~v, -(nD12d 4y&FIrt^d ?c1WM!%Zs-QѫY;4Ώ+ט%[-Ee9b)3Os"g_=[ sODfK8 <,$TJ{H[IoEx_BӺJaމee9oQ6NCU?J;zCnfhYN[bt ښsEOom` 1,*XX,`*FGjF /ez7\Wܾh9EGرuܬmw3>KWݻq|-xVCƿI1}+)6Ds6Vꥆz @MA{Ż@FS"I]G* v'LElOVXT.%x&V~e39GBSBa6(2xv@˔UʼKv"IRw+1&#A:{! {VuQl1̤XkluZ| Ӎϖoi` n I˥,O򱛑 ǢD(41ae~a\Oѐ(  }\}%sM(Y^b s:#C@mb[ ņOQ~6@ϔtJF=TȦ1x"Jc$Es@['O7gƱF]\j  _M(vI⼗@QǛN|@-v&GdNpt D$I)P@Ϊ3:8ù8j*Қ:f7WI2RV/-_:8[ֳ޳8xOLhy5,{ ARz>q) N E{#B]KFѣ%udGɰca;%՟0lf! az7ys*~mD4'ٱ~G鐝4IuX3ԎnC+Q3#G'}X_hݸvC`>PP3[蝁y%j!w6$#TR)PNizzce\CYEWIŸ3a~- 1WWLm7͉X2Ux7|uk y~'Ci Svu%ܴv3>VDΤg=Cd,ޑZt?<(.eA,f^nhftbTe0X#H>0J-qQѯwWzܦ[1.2:_D 5xD;Gf\rA[V*1"H|Yl7D @'[l 6'k<:KOgwav@= (fSh öWE!'5N? !A1ϴ;;B\I`:: !zJb>I!oU\RQr%){V4GۀAIvx/ UrSE`DsT-Ŷ69`YyԷ 7<{|5*zl2儴O`v|V7ilgT !N`[9ؔ뺞s}*#؊/ʳ> 709{e2=r෪O ^ lU}Z̆)b%߬@YI9nt ilϤ{[DRl s@jޞor"D`T0MݴΎyXqX-)k"$)M mT;qd O} OsUe nU^MMXO'g#k\MKbZXGρn$JNĮ0#h?J/*E4x0 6 i).݌E`YdBI92~ =B4*⋨(k4hl%--M!sP<^>Wv_^SoCqgb\v`-U=kH !oW"QKT݁6$C3V~goQs;b-I<}S΋X?Z7OB?;!}6T@/=|.c/AUkCE+!M<¹ QrrVV0iy,,C?B;^5A DgW^nX) 'XPi 7dSeI k]SߍZ; zmfGuMqn~"R`T]h2tetBT9008 T%2ȇ'Gcg >4x ]L5[`-)4|CXgQX"6Ub*XV~2ζi1.]<*yBgrtkCgyuCȆ_4Gur*G*t^[ߕӮ[!El nXlϰ'ճtsT[Ƈm~O#$W38׸G՟|3Of2WdnRn ,j۶@5({D1b߻휁HL%v l ׷6H\?7tu{l2AgZ ܟ\=NE;^<5sGm⾜*}.PVEwUBrЛSektHĢGc k-gƔ26r&Fsv*j;&x|/i0k(CDc =2.OдP~o qڥë W`*⁺]?󜕍v\ g٢PѰbt1<JΗ紬#IՓz/1X6f'H\D. h6VwEa5n\%괲|+C͹@g;ܩŵ鵶 zopm &=ZfsNoѧST}_^^*cƨoPb(pB(o) 6\z+u~*hD^Ǥ_O*cͧ~b`"^n{Y7>! 6qK^ u|`˦9OGFg3y t}Ku>zۡGBVڧUr VmS )!S!/DV0wt>Jjthe˚Lͩ-=r|}IVML fjC:AUGlv-g˄{3nD72˲"+~6N3\a\@Odү> \H3Ea$0P R4Tie4 hb&PTW܄n{nZl/M6`gltZyA/{q-?]N'[P5[X[|Y)Bo0uZ9+ 7/w XYZ8uQLhMZݗ [[K};Z QhKP(y[fKU`Z ksq^ Z- NX=തOՒU/X\fRv"8GRGRY0aaEjswN+kʗQR3D+Aó#O#;ˣ-B_/\}#ZQ1X6Ѿ]Ǵ~R,j!WMӧ >gK9".+FƓ5a0Cj5 cM;|dϥ6d69k > l::ץBDU54r{H2%Ę1.#p[WY- #z@cje+; 4=֣O(3oœ@BHK b&.e+쀄Q5 Tkt[6P/a{[z+e9ff,Dx~DY7n#H# jcRO=0Nҥiׯ<8Tk|J;u.ܵ潐%0"Qt^F^veD0ƍX/59ڟۈHX,  7gQ}p\ ?>5VOYVEyT4r5Tj Nä%X!"NB0s[ d,֯jӃKt]b_GZV\W 5wVhs#qWq̑v|}! iTs30s gМm),}a#˧d+秄i^&xovlʹh-W F9]FD+VOJ#v^LɜyzK#i?4Psv1ޕ!L)1L(AªJQ 7_lOw N/ ̷4P;au }~@ }D5OR B#݆L>Oj;O8Y%C3Dn6Q9=`Y6,wh;o#_VO>'֤qص,CS]+͊.XcbSi~2XksVC?ab,M{p##1Q/3A!kcZ,(АHj E}ކ pa N4'<5 CPG2:'3=L㷓SѰėq&B|߫w~`4r (Ϋrҹbq9s%I_nZxK%T\#cv:fLՐ,w q ڴh#,9:'W؇~Ȅ$lFʇox ifh8i$svХ1U1hL7,յt0$ Eߑ$m2=]{QY|ELrl{FsX:q%F) '9x wݬr9*x0n%4~ =fQq! }2w=VtƴQy݋cJ1d.0sϰ󫐇%H07O +1uZ?)1 $Z? Ao /IvT?Nj|$bwy!—K9 K7 %849}F^ruM?AЅqn,f> ozo۳ؖ3+&H]%EBQq/XSb3Is`ƜH,ɻŁQRK']: Ypgc`3;]ir')oꫪ e4j{Q>&ﳢ #yR 0L}qfJS]y!#?!󅈑7wajhB\8 ɵ<[̈Ɗm 2~K>S-d:&FJAy_L>D2YE$eT9݅Atu gpb\ k`l o%ߒNs%&|($t$R&nw?aI.V˓' h^qCED:ήR/`bm彄I?/.A&1<;S< !*qC/;ҸBVb`z0;\7DW7 -0M{ |*^.쌷Q$ !ʬs͉G5k0( w@U+8V9=QTG R A5|V]XD*2Dx(=Aob~2b4d*&7ڲ Ќ;z,,MAZr=&YҋGnp %xSUr\aADtEuCKCU]EGckS>:.])AN"BPo/Eѽ]ǥ0", mGR]u2+}HHHMt+93k? ]E֏-"H3B2=Bg/i$dִi(ɻƆa!syBSnc )$ql\RM  vD3l}oa5!cj,BrX?Jq;o | \ 7^nJwbQk: O T9Aw-xy*B\Mlm=;oՁYMx$%+P|rN|*g拙ly) XmqhĩW%i| *f/+gU #˙ou:i׵,dM?WGK$SɊ kAU#\EFqeEnSOi&t}1Jx#lNS~(YcjWExǦ0ǁNzquxqfs/K޵2nVqNGh2Eӡߠ/}}?xs yWzmh,35Nu<*|.kx}RUݺq-G?7(1_@ٞ[FDL}1Uo7O22(른 Qjk쪃\A$f[ Ť‡EeQuKPO [i8f .ujl[ƁnUs]td,ͽUTJJ~$i6݊fv|B}{ ES2v]}"zI/ϡ RNJMgAb'Bxj8^ T9>ܤbN7rhnXX[2aGI% ,2DbNj$`c~ӫW4R.PppV?;B6[=atQ prr gQ<>G[Smb5m6zm h$u=H %rMAI}̞ O-?ϭ#W! qy Ńǧ\,8v"4hΏm8Z(\n %OW;Yv2QyFZ,.8oA:WfCHE>_Jv Yh0a 7i>^gN9,:5i |`;ٵJk9; iV,:u(;vz9dHx8m1%}%oce{ܲ$=i[Y{-K4 q2,u$.(F,4k̛9 ~*FC +<T2־y“Ial 9l'`G{JtXlWc'H!s^&k)d0 &_4 T77~=-N"RؚէqXdFQuwSVeBI?]o4#(ISaLZtКgiOvuhdLI}$ײi lV%p0Çdr J4 .|0joG%#0fvԼ "ž| *;ұ<j90NÐr4ZO? d<; *ݭgIj'x O 1-m uBЯ8ƻhG `T9­3u6ƱE@hz5w6ZS$r}ּLdQayÇ%2Զc0)|1|$E2h1$2G`GfuB*X@Z2%So;,؏-jB_xç,RBE0Fe`?yP(O 9q*=UL.P:PU  i^f/XUQW3l fY$bkݨU*d $B.Lm;^EJ/Ǿzw>^ZHGە~vTgP>=H;^IؕIkWhtamgysWrp1( o-.88NRX9#*hcQR_Bdhޣ`XuQ{8m4=urpB1_/ AQ(p`xD gNK|^/@\Η5f>J%9st8`Qd ]i? ^BgirR 6m&Ef ~rSkcAA250(m" U\GL\ʯPt=.>dg 0 Ֆd(?j3^UEdktag ^6H8ݼsP4-9QQ@W9j˦qe}5Q]z 2jﺭXB[P5д]0ZqW @qYܧ_&X@2=/)v$J=DE~MDX SƆ>Űwe# J&:f] f TdHfAw^|UʮsmِZ1v{S?p{hBs@Ghنr3 $66>,*ztל{#Ц2L@aD2*|ZOI\}lkmZx Fix_D_tۯf@z[67Z^ jN$4߁wTFYء n<EG2X 5%iҊJnE Sjv{d*Y"R!.̸dS h`fpU NOa N[@Q8,*gqeX8ؚsǕ6 Jr㣥R0x,vT*hrܧITsl.O@$=h 1M\w/3HF}4Os }{,.Ǻ@;oMnLĪ>Cq5[ǭ`ή$h"I{?V_#K[BsEG4ej\6%!Q,[iN$.\M7y$=*ӍpԬź%Zيk>V>j#gߏ34ґC਄sG Rniթ72@O7+Zk]2ǂ6?k'Yg3N*){}^: 4H$F&"I=ih&@֑.A;)!9ҜfG%\~.;\D vd0B^G"u"λGk.T'j]Wq;=Fx ;M=QCS#Y 'J|#X1Kl'sMF٪tJäKl5XH!抸n( +4ɧ= 4ߐQ7yٹ,꺣RQިlc˟Δau_k%+VZ34CP*9vnÌr%έa~y(zq W9'ٝay|tqS97MJOb 1C*p Nrw?ItخUVoq^cܶ”#R$0\y~ Q74F{uLs+ux~FdYʽh#/$$[ȣpe%¯条X!J>kƣ"֜kK&1T_Hsi]ak*2Kv HOe)L?f XÃ\&aQ19w`rU'ή{7H9g}ųR5#cAabƈ&<Ɋ`TIF^q'n,=c+owPqr}s5zA*UNj[e?aṳ=[.M0qX[\Al4!8D(L%W];+!%p]KLtJ6N4 )̡ Tї\ȷcDKuɷܻ0?Wܟs t7sU!YIմٵv䛃rRfS{a1O.  u}}'ws!uum;-ʵƦsݙ|ӿ}՜|1fpu8(0g ao^9^Nd[5藅P@}\jVBJߊCɂ6Nh(ukG rF .VU̸RW26NHÑU] fy$deOG͹/\ xCu$4ȓ}NĿTNd0p@Q^B-`B?PhZhb榵 *jk`|4UR='b$SY6y}D; AH-9G+fvb:x_7 eֽ}33qEh\dίbIf |tߺŤ~]i[t<Y~17j-3C#'7@< 4,S"ञFi9k)suA /N.n%nB~mhaV,[oyXHY(4q"ًO6|O}U*$=g<|p.ҭDP[ ^EFdnWj ;,sхD(V|Hi X[+x}-rȸ8~XxgNG3nH\lq:"Nx~!оچwsM Ǝ[@Tv-6{V#Q?rK/%7w$gk>d?P>pAꎠZڇ\ NX J<@;/=eYוAQ c`0 lYLhК1by\'c{WET]eR$^ZN-5J4 m:s+wX#~'XS4DEHoBolQ^lQiQpwjitˍJH<GK(VY-aqYQ0`䯇]):*?mn> R[7 }**YFz&oFvGDI?yq9_ i\#A`zn&A1 9 ܮ>kM5nyfϛw='־m7ZStűЋb;S`=?Iib;Fxlٲe~(. !KO !P욵v3i7Q_@wO=H}^mF9~h ibb4gp[anėtoRKi Xi*[B*UCu p:d [(t\pOHAS$2(km*hfRүF BO>m P@FºX~܅n;/ a=> RŃ̈́ ^#1 _4 ad2n%٭u6{T Wj86NE|4|s*h;VvFTy7s/[V¶Q&foS]slI jFx(r!1O+of C0=iv9[`bPVoEiMU%KxR.Xg<[xCAD/5ڼ`+$$4R@BQ;٭ ټк]aߒ_NpO&4 _Iܖk' 5)K(n_G :},w-̧oֲ}vI c1D8?n`]c,#mHD.Z o)^mX+N֑ysҴr#'2+NmwգjG0קw-Mať #/+5ҝ6OEՒKt25JNo@[^!}m+lEvn9 30Ɓ;7 FʿwOQ,>,`%fUxv84[F-6C ̀KAP.sΐEai_ 5:9qvp,=tu V&cGvԬx;^aNCuNLsEЎ/(L(HQ8 {= wsUAZqCӔx:@4gpȜJ+@GV =Qc,S{\T(h8r;@(vE?dZ(/1 a1;<%,6 q& ~lFE]EjBt#-aijTsPҾ5#3T\2O[kIQ)yh%wiNgw=i@d,K5cر'y`70Q9ĉ4.\4i yW=]g$z$,nrͤ䬅P}٤vC1Flƚi uhV,Osވ|ye"VUP6Ze@f?HP(pꖔ#([Y a`Ah_ d3j]dQ6(8SQ%<ҒH; !B}~ʷ]5[ 0+NyzۑvZTUZ*愝_hS_ӨcTІPBaZvj]nL2XTL_6УDNĈx-*^آvh6Y%ю R9j1K4]KrPZd\u˥Z֫*aU4Y4y{lg߸J͞-e mk҆-Rp)l8޾Ypy'Oզ] +/%_r PoIXt7S3V>dZ lYb^'go^V +?c+MCE6%3yȾz^T~幱sٌ;æZ#1R1=A"!,G{9ySgۑ&̇E]6[ǰΘ+Т X4=#exO'Q*^|Oi0Q%Ȟ>-._(bЂeɤ.HIl鈙^jފs%5hY{m+Ri;5G_#1 hN!y!݀8xmA=ݲQp?}?i˕?UF?e5q$Sv3xqżJ:~L4*u`FMVw% sE<jLQzˍ\(;ZIBb'TBlQ0yt[o#Gy\RBA0>ew1'|>/?JðQLw'|=X<}_m^ =(u",wj@ڍVB {)ψtMj*A$mc'гPMj>_@̄mՇ6IsE:~|nh{nA mH] wqe:dnmuM 0YI(@fA&6KxոqIx-p9:As nvGOW[ih7BCx0^vNn:l>nåOj*v0s/wxψdZʹc1NՀJX!E Mxw54ovIʒY<4Y[]N>yݒ"!:g#w-n9DO8C yUYSA|o8Peun(lҒҼs4O|NgHl1ure9M7$%ĶM{tE*f&ۍ? VQ=U`i}e4ҩ4Sq kWejbq\c鍬 /@h¢W9`j$Nx qO M0[fAp.j`׃#quRpyڿIOw>b ~aAa&?cT}Yks1~&#@'F.5aLע9_{4Ek؆Л8IoƅQ>БGt\+½D(DfEU@H_zQ@;i;'к%inJ'M΁LZ"$;hʱwșXp*=D;[D*uq4fca FcቦQewHh>nT)a1 _l #-iW_B:׌Έoju&t>^:yfhY@hJ>o]^g3#?"_nťLdϏw4)ݦ)S(ՐbԻy SdDy~ɐ6ίܥ[X$ldńp#0 |nJJ߹vVS s>Ŋ0&ۭ]4}YN!uioiUNjWzz,~Z!! x+%Z.kE*mf!Szfx+oۯѫԞ6^:fL ^".x`3N7l'+-E6L@P0n=F!::a`)K:^8JpUD7(PrEl؟ODq9&~ND\\W'g)slu\KI *@/; 0rT`d8\%`eƳroUjaQH!$h3}yts  C Mӆ're)_-PDب%=/Me{9֟`aI2fpL`sI{rv]wO)JA>P?knM8w9:>x@JlTZJ?'ة;%.T(NZ+G:\1@Yl\Chur*BdQ*_'. hȌR-&_$zӯEW1=Jn˄#ߤB=jҫy[jSgj2Y?Σ$^89ӊ>S]}ZHJr6)3tf;ߠ ;3[w}rT&\gPrXPwjr\l_,'EpUU@bg]iG!`7# GgAOǢ#Sp RBdïN^ rYP#v@]Q`6ir7s'蒤*]\24/K=(7n@۩m{a\Ѹ8kX¡/J"Z5B Dj=DAy:`&Ge~tY6eIW-+C00!ؗ|YѩȺf>gv?>*8&r:o9)۸F؛4Y6h Y=q",v9 J|EvKU93&i/a7d"/ZM[̾ K*Vh05IA\^gQINb&SUjR R*F滟 0p$3\!a}+Y*pڮ_ѓ*WO5A+ G ,M9e ǦNO9)T<&s)vVHdB4(EB V~)v%r$*A0u)ĶG B-TiЋ| &ÁV'Px/-=O]uWYqD8*g<4CK9G` z-_W3y2X=qd1!#G/ )sQ#J;Gͥlyd m$&%vNk^wU湋_[˴L6+O dǴ]}*Ž]rq갍G1J|6m;O3G4G8 `^v}څnSG)hE6`V 46@:eG+B%<ӛtws^e1wAиKF]3*~UШ!1xdd$u!v%<*Bm%&J 편î!ʳ&\PZn__}?I T*'Κ*(z~/q+dQ3^j1ѬU"/VQ}5,ڜʻ ՗)/&3pR:saYъȉ ʥ9_4bYB5PN' * '$( Xi giFpaB:=oR͓k=i뺚-@r#jY>#/%ō ܙNԣu 8 =_vyu1OIͬd"xf#K+4Тt+f9em"V3X $:'qS2R+"WF4}}:q\}:%# xkfRx3iՆ χ#y ʔ C4+ԏrq(o![YP&sxylC!r|&?崲&ȋs Ur&>GXK/>7e!> x$ڮRTQW;TTEJr?˃[ُ:y|s޳dt-Yc]=_h[Cx*GYkNRBeN*"ݡEQE6.„X:DB&ewc F v ȬèO"4A&r2;J ZE޾L`ɕgz};~r.-5a:Ɋ^+ z!v~TFֹFq{Ӏ'mD hQ; Qbm lev>^ =Ǥ#A0W?;h:RNd0tDr Zn>aEx2t ~mM{Q1EGŢsx 8@8TKe%ã7n("Ze"E暑1H N"psr%,v0u\k- 'A{g05E(%\P$W;؊a":W6zhF*ڿ)Bo@=4W*qa[ݓ˜bzVH9M~zFUX.4U0 !X->1M5c҈[!H+tHh4dŎ'fb2LPpjd!ڏQ {,S?=TYj<m.QA`9$E;7;1|8WDĭ>mv [8$~衕K?D̅4szK$Q\ 졈 >{w[,yCB;rpl~v ,D% w%O~CorO}ąke3{{K)HcFYȂ[ά[a h<}+m6=ܠ1<8@+pHWY7xVL<b6Qߟ5O\DED@+Ғ&cG`7 ޕjE8-6/ĎAj%KwCLh'K^>ĔijՅn] жN; S襪liETV $ӱ\+cǨҎ3Lܴ7Z )8m'""JQ@BC7hݭ!7i%lO968Ѡw}"IXBU+;=`O0r:m2 ֱ:,M-kհ# ib Rd咬qhgGK3žzE.(gx%oEYMD*\o@fșFS~M<3s_ko~fH>o>S<\z-sm"z&>)D) Ŗu<076и!?NkV+`*Qç3k245u]wsVIJ4h 7 i&)u:;$Ѹ9-C , rUƘO-P[Z 5kDB.^v} n{uA~91? 2| 9KnNq kkN^fg欥?7zh3`$9op?1'T/okD>qCwG(CaHDwW{,!<$KZy}ȁg>E es͵e|0~"hA]]2=Hscp+vкRG?wF50,OwEٿd8d82nŅjzJ. 6ajzΎKrtFQC o ~$g9BrrD"ʴp^ Uez٬"u 58>^5z՚`zaW(WC޸j/]`y%E}Bz,ޭCzUb&7<s.xy.#+}o=$ط9uM6xN^ZC5f)mE.wmCRMm4Ǧ`dwVd(ʹ& LuӴt6f11{bܩ"uBwt"O 6tYR5fJyLؒj5%Znf(x?hl%^+_q[0`MY5'WF6n6T^. /4|d J7z 9bf=E\L|#10ꐛN+:啰u@TA'6-H44zr-vG>2CZZ }V W_B[{F`N]H6׺GaǵOo4Ay*d LBV]@M1V4+IԘPX?'@0nAc9n4>&DJOhl^Ö©qO-qVL]wplzewɅ'IdN}{[RNh79魋!$gϝ.2ܲ2͙_NV6]#]GV* %Ih!2=(8 }eg!\^Rks 5}n&R{%X9VgLc"v ?SXAлVT]66_nQv6 c m!huL6Fd",δZn='wjp7l&xv 800Љ9+(zھ[L9 r 8<OƬv!hAưRY*:3K/,N Sf*6dm)zG|00WE\.ٳB^rئoS c&FoOzmw|Bv} 2X- q}rP[yaz%o~0iݨGSڗf!uEec֟(͑TC̎GS%}7rxq-OM[WEd,k(6Qکpy"L>/XC#ŔjGB 4"=NݼoDyk3oGKbJf>6IR6n l#jXAkSdwIrjT`|>u4~ QUI=h:9P) }P?%G҂5:戜ˢAC?Ka-:S+uP;F2&!H 6u=r)geQ!|yǹv^V`xRfDJW \Ta|rk%{lrji6ft |gk˛j" SGD,we'JkߡFrQ.*xUQCxWY5k~MuA0dv.Uo'D\9- cTp W2$e-*9 ^}Ր( XJ0^cV]ĕ=tѻ~] ƈT~]mװsKT~yŀKnEpz*e8"Weϼj+R`\=h`ɉ$wNGċ C3c+gc`y ?EʑX͖cq3n* Hqb6v?ϻIr\hXӀB't e"RXQ >OUBP [yA<{0I2#۸+%c^ Y s;o6-~v6ER&1 bԤEsC<k(9 86cO%q߮hq)_s1|ߠA8(%xer3Q=a0s* RghH'RX@Id m {fQ/H̟<]'OjX*_@rC>gZo>WKFKG2`Puf §RtzL]xI d3A鉾O~6 cIhEX01oJ@vVٚYȄ6pDIXVA/IqA202E>vf8N)۹ԍs0MWwjA7h9'[蘪t>J̎yخ􍂊pnb;V9GU!NuwnJ̀*'YxGOb~Iw2L`J헉L⩑4 <K7lg^e(h1: ]2[W8ħo퍛?Aºc" :G/D \!tug11i݄Tdb8~y* 7N%W@L\!LG8c.Ac(er#$YX~!o[_5:׶k-RvidɌzV) SyJ/R7S CSu &C"2 $<{FYWo"QUx!x~A|Hg҄g!55cwEhG"@n| e,eJ#Uw? 8Pv㏒!㉵~1LxrҬ1t(_ ־̫qn| Yjo0RBڭy1M\tOF{ɑU|: [IS,)@x 4 QQ  9i2F7F9muvQ1X{Q=9!ܜd%K?n}gPL4z熇Pnuk>a['$[l9gAr\?F{,515HЖ}d OL,56I$[XDjTGЌTt]Q6j_bzoV% GN['~J] ĄRd;;/D\V5iV?Iow &dgwaN*K9ASWDh5nNm#)@d?M϶.hD|1" =QVy6``js+xA ,/5YTU=*GrP>bvܫk@달8ZZ(imS), :^-Uڣ[RZJs)덟rY^1H4r(vSϷ@ɛÁ* I c'?|tUK 2Rڄ4DG@#@98,=;#MY?!=m9K" ֳaƶs6 ,M:Soe'^w 37Uy4ap.*0%(Hd5p W7r[`Tbߜ*H 8 ~a4qJlMG4雀^;Ԙ x4cj[=Fi)FW N0o /`gs&b*D%sKAXGyDѰnɑ/h39x"B~awA'Hd4$-:d9~{\5hObHvv:_04y;z?֍ G0{0U]amaB1{ս٫i~G@8sB%-3b,'TC&RS"ݒ4hUD|SAhU/@|ẍ́StT}[N7Pu韊B;*bm[`#J}o'+0+D3kYG9‡`z:% wMkHyT%DT橍{*'emQF [7lN:*XM_NG:WBDu;ϷkhƲvHD1w+h͎/IgQ^Gu~#ovlsX˭J%as zYXj+bDDnjFoIQu3ܗ%hb7/4\Z*sR)!+]% fb9]̢vGQ w%^̉^+) Y:oCn\wP'NP $p6so*`=B[O9v"1Ŧt $[wx8:q}u_C`q ,Pg FG0m^QeI'T˨Μ :EG$n#WɔMbt#@)QA譠tEz\jWY Rs'{k89*h=vO2ŔÏg |}e`(tF޷& P y.ˇ$YuG=*u^N"\`Ŏv6.r06=) b'0IUwn{G9&uP-nlH1 ` ("05A ;/d{:m8D9A7`_5b%OZwhHYƤ$@$<;thg7YW5N^Ht˓`ŕfP׬΢ ;eY IZ'Typb.k! %=}s9v:ءw$H% /&YEL{ b}ߏ3/x!kʻ i$n,iK[j(1w‹"GD!Ԗ gr*Ś٫p.wʉ -At dA_F)#|ޏJ7 F?dEYxoZmV96vj37d}aW)왑4TD]d},)p\RaL#V0}GJ"y &p;!~u8L eB2vMp wmf0Uf(}Kko:cPڴ}Kwqraf CۏV ]+M M!Pay 9*[.XX,_CʞIBb *GΎlĈ<`OߔTB2J&,[vwGaP"0IQgcmN.q ¾j/NvhV$ Q %6\m yXj%HqmBiI9W7Z֍ի#,ffT݆XTGTh@\C_^fmu!kKݰغ (! ɘ)0>Ҏ2<`y9%78A UJ4 &c"c>3%5UwV?SDu,7^lDb| Wݗ_cەtN@kpp3obS8 gfsEsMGx,mq .w#`ykZ=QJC:J^#y8A[# 5% PTuZUVA;Y{B#Nbg:Q"gASY++R ~Xb7G <^-Q ?&h9_oC0*.eO..0.UxC'X i*k#h^eH.1B,32umjɇ. 02ϖb? ޅ 2Lh,.!^T&R:7lIb ";BvY<aBc?q'Z0Ȧ$]Z׀BSMvOSiUybB^"$ƕ22Ȃ01"\y~^_NNim^4%|m ׅ ?x:6J7r !0S.Pv{;E34Ӱt `@3F=u ~8=|m[wѫ_rp{EL1m)WXOᇑc44/"`S,Ŏ\$ޖTAk>ڟ+˰x8P1)87+R 91WXፁߨz?赚cO >H2(y{u/H @5켊Hzq KU; ƒkpxbK 9\sҍ`bu)7kVH퇕+2GnaJ/ ^ =Ν_&Y#{> M`]^HؠA2:$jW[\aDWl:1Zc^X{Q޲AfJ"i'D-9`VH@K秼bM9+]xfΊ qӕ9g'6/uP&Ѕ=6d ,v}d?~B&!Xt(RC_cARR&-QNd_xe"/Ss}|~D" 1F0 c,kg 3T\,|ǓCLCM$TD:@Z,3@;u:&13k 6~9 :f_}Ϭml~tBm–P ԫGjLf3;ڕ렌س!QGb B+5o_stzw::О}|ňq QҊi{D>wR!BPw.mcBq3ZX@=JcM5L6R+KPSi/3a|X ̐os|}|<$̧3#}mͧ+7kDl{qcWW~ "9L`gNFQ@П>fEaD][_AH}-{H:YCvazR:_U >䗀Euifn[㪔<5x/y_'ov\!om^ MPfs!% ,e="ig2/ ~GC/[W@ztƜjj5zxcp3wfElI.Ts՚>-f#z0U5iF-RB ף"`1֏vٞE_ty|  cFVo6/=sUBforDZ6e'$ˮFC#yo߉Ђ7S'tx 5/:,#Џ58^o#4X;*y|[g,m_/з̮q%wB ܹEN,?MZl7~S%h;q<4տ{a*@f09môG;%0XMyw 0_m#Qf4K}V01rkU@+q_*=Qrbt ׯblcNsB\m lC&]4x$] 7#! (P dƧ74` FUHpJՎȹgz!H?>odnC>zlљO#&Z榷&uzW?K&mĴa<^yGm/(q8!(}60b/컃2J eLò"O ki?af'\{c&mAV='qX^ =s|/dPѦQ)X'C6K1 F.FcRӗK|mps]_1y J.B=Fqh KMfڹr9kR6ʤaoBîLːDn0Ҙomd*~TT_C휠qm_dI&%dz,pM 8vRDwœ/h,Gs ])qLRBSdL[5I•؇^>\K67r?{ОmWX *V!gDĹD`9+Tڃ(ph3u*$Z˨J8 :HsQnTro=L]71}[{:w~zA8\*!7\}lb~^oM$/*]Ԫ-AxKPvx­]Q[ʙ\rVeVoBp֐/:|Jl &tolBʁ k'UK:qg@\Kd:rse2ԌA@.CxJO 4+C2# `f .3 YwPVb-Rv\n }.M >eNN\/wS9>MVٹ os$b ':` ;iBsg7>><y7?\?#珝}6┄~:5bCkDz~V`f2My*_>r*dksP'$w40bm~_CkaS3(gR.x # )4N "LvXlQSȾ5ބ'ԢdBvc;cET/}yax q =$pm Vr|@@[qO 1I?P9b:DM+kZpޛx ReliDU@62v:Ia,fZO˻ +4]-4aP rq4W>ꆀ7qL;Z68-g̬Z @;6x#"s QlЋlLudLsf;͞D `nG8,שmC$Gr"FK8-W\ɷrś )Z~QHq,Q?M\]/&ơShp`n:W\ ވ_E9@YTJw_!ĽM z^J{(eoTb#JޚIAI$|@ ]A(*U`zѦcv9cX?jq@]N_Ϻu}tgEIjp`ES`Jb*Y[  g.| s05\>͏g8sC˨1c*4"Dyo)t Vpb;hn '91\{aVGuo@ee%^=TJH3R_ɘgxiu!, b#c ӷD-"b3=^))fXmX7Ռn&P pӑ;djI=B*OcWпT.4c-ɖQm^,Lzj'TIW%XY&EYT kq['4DͻԳmA P |8veG0|ȁ&:Hz/u軗#}Bl?01הҒzRU4{!bЙq#!WYV;/$[v?E&?`c|u)uWrHn6;u RE![uy%Q.D|?tmdEzד5!.ؗ~?KgV_ux 036DLlưL%x K?R-L57i3/)%% @ 4/[_c/0qh4p8 F,%ma.Lq'_bn;l2fIro-#{l;N&^_w55@2ȿ][ȞQh2jb <-ߔA 'W2/ Qщo-=G柶fzuoP |Pt/-͔O2Ңn2Sc// ⶛D`'>M&>I͖:p$D#*>x(+lrooX?Uani0(y]h`65U%RcЬ4”$kc1x J+&Z~#dw xp? |b>]cİNU7d'1/nM0%p(R2ۄE㴻7)OdUFXKBT(T"uQ=l0e5{dS{d8:s% %GI%ZjrUb)B1:d-իYmTOltHwaEJ2h1sƚ&4_N\ӊEPھr嶉LD&}Q&\7m^ڱW\=3PΖ:F\5qU(?Wfs0xz-u'?چcF'윊h<;FPbeBx[J멻̖8ۿb&x╸V=Qu"d)8|H\<[W91l01`)~l~-B2t7x$}q}=*(V)8\ -MTO ^gHhB{Ƌ. 9&Ah0AdR  '5כ@]tbįi{Sq Wb[Y3s2Ft.A0l@4{ j֧\?~z <ﮇNKxT :۰0 "n0gD<)}] v!5>HkIfx=,`{ OcK1.U޻|?5E;[CǍlH8 DшB P* O+7\% |4ĉV.[3o|Җ k(JD9F]pi]TbnϟTc1">~)JK /ksRm ſE;R ܆cJTy$AAc7uz!*M$um̺v< Pgjkp48jMtl۵Zqܴa]n48~9A,$q#'Mgԡz+FkNztEF (úȬFbuzvEbP3=&6RgΨۃ ?D*z] uip;ij%D̒U('\DQJήoX~/!ΈE =^IeW̫/ bހ!!@A#.+32>ϟI:-ǎf<\uG&\x}7R.ސADCC'6 {[Ҹl@&s?$Kͪ97uHW!؃ 0P%fd >wcm7g]~#7Ϭ;.jZ&cM c<0CzŲM|؛Q='rxLti8y`HV +-40!;8lJp Tw$#\n%l->Qđۨ`^҃:MjKL.IZ.٣e9rYrz$WW+ԂCFX,៷PlàVC[mx(}SZNw {x~Ds ;`(tm:qhȵH1`~,$ia#epI:E|y @;<暿e<ۀy{ kz]-5<=b.Qcg  5L#GjJ06JVxVxk/8f!uZDjWݖD#ec'xЗ  \ m kf'02Ш-ˋݝ)HnSJ$4՚+ڧf)9"!fwD%+ִU؀U_8q@a>gCyI[%<=c_V -Z j` 8 ZFoBkS@70{mwɁ"׊RR@4vE(|4'oT;6 4PS2mqa!HH 5VjVӒDoHs}.{"T+)'=VЌ{85{hF+-N4L?O`1}.Y]=Qtsؑp@_T<>{d6#yF.@dAlzk pm#NMKEJ[pb͜MBAܘG|'U(l%@A2|=c܊3s!*P<.\s#' u025^cpeZ`bQ^ }[&UƁ4Q"XDLxוMU_gNKiX_!sI KR|m1 % =4{;/ uH$"z -Mݐ5 CCc%6!K 쿔GK9l?S25iN!)-ލ`*-0EX!E4.7O"I$[ز<)"[z;atL}(r3EA `v&ཕ c٥\k=@YkYSoOMG8\Sɰ- @ӣX>g^A;c t#3|SwQ*mbm]5c˗$4R\Sr/hؽcG1#xH 'TwaVq!.$6YZx?4D[6QX6'$y޷mIq fwZm'w[iT' פ?"ehZT:/3_ZY)R&[vc -71N'<8wUk==;w\`g' ĸVX׉F1REbiu 9%w mU!+KHtQps?~C~n\XOVc{4˛`D6ڒ鲤 j絧_ÆE?Iݭ38q)gxkΥϑMݙLNXp}bXzGxA\Կ'b nچ.T(8`ޞ~r8YB~kv"U!hxtX$l 1:O:FlT| 8ڂF "RR0D)/7:s+a\W[EotvY(n1|q6sl>pNvWaO3NKsɌ%-dd;)n 9Gun (厞&4c[ 7 jH{"1J^N|kflUJ@±"|F@EZ2~*;&]n 7? .o.GEߺ11zH1Vc]& y{j: ;շFM- %wj<%, 5j脆hE ~ vb闣 -é(@F%ݷ}'n[]bՁ$$ 8qε ](ٌ0`:@Ib jl6M,}68mO[gicr7<rS$?U~:Lݟ~ m1mU࿅exdyvq͹|CZTvQ܃MLcdy&m!jPb^+ĉѴ7)t La&qVn4*ߵgbn6en!\2y_R%K=t ~l٣LJUơH+^$,4Mo2WȺ N}X -oVh7E7؃~pG\ّ[Oe ^T./Dv!rݦ%UL2KfW̑C{|`>dSKO J6o"FA̦9tO J !\k;6HS1S2AaqVbӓ[{b8>r` JE"#ipl|6ٚyuj+*v 0ZSA=@wser 韔raH`JR(aWN+P3ѡWӄWz'f_ %M[if6%|m)Fg#owvujgaJ` QQ$ujKBbJM3&rF'=9l<}GrSxp?"*!?o ! ̄n^ h-Yh32:} ߋŨ҉FQ&#kTNO0i/IACӃ;Y#<<dK@r1q(oq1nCq٤^˄I` ()P|xdt g)ВweT,0<|&yCs;)$|uTc}QYj,~Kb֤&kUfp:KR BfiDzuL)`2ޮd1\qkN45F_zeIw.Uސ_"HCE^?9܋οW/6w~ U@TW;̈́y5Y/N=Ì_QAݵռ`]jmGQ V|u}~1XL ׬n?FvXJN1ǺΘ(̗&'^8$^woУwJ PSE 9LyFFwTnn,d 7Fe:55X.^z.j&JW)\!=PJ1qG:bxMԹvƱꛮ9||1`z׹L ! Y1?JXIQt0_؛)P.대p}E_)$%V{Qv"]]//V1rڳ>5*gF"sCx7zP8&QƄYbZi@4W_T]KoUs1%mtp =ϧES*d _+ *`1/ˌRp ; yI Z0PCY8NWLpv˦C&W5 /ԸX9ߛ;MciE1sdN7xTq*`0 "lr瑞~"r"UGbuĺ1pDž4A!&0sZۄypXऊѽO]ۆ`9v$pWCF@w|1 *Iiy&0Xȟߪ"FNch n{/h$麢ok9˂iCUjSw#r a\0kf/@m\HYwȽn~#٫ MaҚ J!܈QQFv7,h9ŻK)?3@Y0=.p]hQ:p;brӜ~X怘zdK-ՠ6Ax$3]WG9`j[fTwHC(>j+x ʹ/ c8FAFP oD{ңK8bW&RA0q!A67Ŕ/ZdEJi*юA_D6NM[!w R8!mF]A346$} *TkΑZ!C&a@l28Zt\z*;q M9^!YܞnB^~ RFyCt!k(hgG BBŤӡNcٲb%&~aG冫0L5*Ho* a4:^Pd΄BMǭ{lb I #WN-^GP8# 9 -בi֘?5`Gh;x>v*n3.>۫f?#Q?(MM%?`TFwkx` @[mEr>?dX! qn[?8FVi*(y=*I,"n9. i^AmYyB+HDc}Snx)Pdo{M'qzn߸\4kD!ljT[+4ٔnENDё.f > sј 5Z#m-ι-Nv넛4ǔ[0Uu#'3qD\ٳC@wSz%W7SnVt0XQƿxgdUL^}-MXō @x60L1;a"ۻ{X5묀BId"BQ Gl+/"Z^5ghW)>ٿͯ/kƶrEi"+EgH8%*L`7,&=v.T1 ozXZA*$h?)qc)Ku>?*ǐ"E?J=\zxS#V^7"mjIkc3q_ϰk&s모!l&:b81f*thِM#r|QՀԷotӍJ¯|kS_$coLE"ӞT!D(TuP<eY'y `=$ إ۪北lIc⦡?)#M)!@-;'X$n3o،&;DԆuq:@,M͆9g#,1R"Yb\!v q,O<KaRB}u4 5Ó9D`F y#9 Qc{ߌF zQQ\liDONwJ&c@}Gc#BabniC2ޙs;)-ǡ/7+uKw _goz\Z1X򊣩q-mɢk_PEJ&dӉ-#%xfJ",X8[6ᥟG%b~K,C^gLB?h!_.{c:UaS۔78D9T6WD/d̊-!< =r;=r&m 8C/)45!z1;˫W/x^-z{t {B׎1l.Cz{_o+e*<#w pgCy'qS'X@{19K.t cQԯRĢ.#pD}"szᴾetvRh$vF*j&e ,Vlʳb !G|Fy͖\m}Cۍ(G4Lzx}I vV,R`doFl^]dH:o7n6g%xxo>63 !c6TwCWl)t2ӉQ1n*%-~ybXް#q_F<|~=vղ3GMcBNGcWxLMlޙ >C=[OP M֫͏[*)\`u4`YXkCHFPUlޗ0wQC$+c[bɍjx褸S-fkQA=ٯk5Gw<ȟ4m8'B[HHlf%޺Ji偛36mcƱiֱ~Z`hPBb`mνVX1uP;}ݛg/?DBb6kqYN } 3' H3DBcǟ:WFЂ)~%װE&w[.+ko Kj/pB%8K^v^eW @} ԗbV\vڶ;B3;/J:d#-r͹SLw]OM,h D- # , 6Nd!U;ߌ9j:~-p[%D>MSBK=wpޕ͞Q͌ل6y3d_N\V/{]~e7vC(NӰ7)SI:\v2nQڜ̽3=^#Z{[)ea1/J^6P쌁;˲SfQOIZ8bEVaupSwݺ Vn>y_MNfOc[tt0j0&j`BQ0UrIlu_dPX^~ ? /^I4>('U tp pt55^t!aJԸ燶oNAT`ο7{j glKP_v5`;#!4K|[əWiΩ }[oZrj$ Dք8A.,N9Ǣ-(N^>{E5 Xvh䟊r{ 㑉]^֪yWLau4ҨHdc'@ ؅`&u/CغLg#r]٘SJ=֛1x;y>T; ɑDrpx{ך.9@d_ ZΪMA癴r r.odr_քLnPS2ºzDt ѥE{L.FëQ&DyQIZ 6exMڬg#Ȝ1Kkb%E5v@N(9֕D$֯4yhKDʥ,5%Lg]Lmsԩ0:26ć/ʁ [[3%]`na 9뎇AENLrcsL *5^U=>41xZrsociT]>Qyջ3qZMby4!y  dqb M8p. DySBP%מ[v(  xCLj4pȥO6W3QK"`ԑ51m ZK-Arriy̼ͧWK^&:T&OfL"\> ǵMH}tKDzqgQU:ĵ<98d~p}\3-d.&iX0tFv<~ztIFLb }|uh3.8/3>cر$M.쳶JCXhm-e=('P\?<Hnh;VM>*Q9j¼yqƲfmf|F+ngax*EIcFOi.5Y?=8f&I/ hnطT't B<ΉJV)QPTM5Vb .Ge'L=dԂѷؐ<tK[P XJ飕}L3i::%tJ0 &~iĶ|ds!UVdhN 2G[@ZMNThI_sX lhU߈gP{t"l*: ?!.l0xQ{} ׹yq4.Lt]_A}!Tņ}xQGlO.2`o>ۚ%]!W={"o-(8lQVbSq1їLmљ^#@O=:yț$ PW9&D?]kwsGnTKX^\]xɧѰ # ?43Ih#܊IS㛂:qCp `]^GAtMo 3+gBX #h嵉2%ZkɅ]h.f $P˰6+>(*^!p\{mc8Mr :Q]'7l7O\i+/Wb1,~$)db ;L:!!}GohnW7MDSS<+ˑ,I ,n"IlIqjw??҆j6 #Iyhh3JT^6(C8TY5hʹspDX Z_A8ͨ,'\~aow/_0L3#̍L}ؠC3VȎNƲ Ƨ4Hfl 4\Nz,1|rwMё+sBgt5/9\n 0T B|,8gO͠@;)PM!3#%,Lbe\5puu@ #j `98}ըkfT!VCsC ;78UY*m{6 |^b L|;{o%sfa3.oa8P0wfv= H;Y7y]sg/|6!zNн~[d{t&a7nR̯9߾(pKTO 隐h,i;F ;dT6{婄w-;i$/Ghrrq(;;c\B뛇![K5.DF_YpWԺb{7IkdZ;3_ 5 $o7fDj[Hq9ynq ߁NS#x|;!O÷N9z]sKhN(w8y投zt4d WҘ&ޘl ^6W2ۆE#;V )5\z 1N)xA[`2j/NH+%iDh'SM3OO Y=q |4>3\,k'}w~vXWl0-=#uE݂8)_Iy#NM +/3~\¨ְ% n%(3,4${fY S&}@^]'.{]Yf͌?x2֔ůx.}~myfxiƒ ~_u+]kNqKwPA5(n\Qlhg5qGӑlt'-9d_%JCF ӳzbM0ʤ[|@E r$vˑռ=P2tP{G! = `SdAX-"YWTkU.j(k&G-!-i;F#x}Wu]8" ϒQ*9ԫv!l^GffݪlDDZ-+7zvbkO).7VhխS Z  (`28B%EЗ< "]N/N #]~ڸ^,}{hf]eÕ5_dwfR Keu[QgO_0D{y۞i!UҕЂeϢa4e|>VmLٵIfsa}u&d(Џ޷sf"&~4 xER.Z*cѨK{Eg?8<!å  C:T?D(6_%?l0=(u|އh/IDKR<}R gc\iK,؏Q2o;1ǭi ŨQEOf@W`<]W ZZҍX+F4,am4jKmFDh&m mX'I"NxKeXe+ЕZQh"(i Ռ_P̫0Q2zv,߽ۇ =0˝$ @5GbTJqʊ](gcg T#𷍒.Cݺ~2OƓza0Kfo‹ASxt_ߵ-Ҽ6zBR% [z[#trL$+7ЁV@WkZI8{p`F&쳺q-7!g策,C=(-5*[޹(J5A4(@&k#5";ўƑB|Z\iwhoF^NaM=uk+t;\ZaAbojWd c PS_]}8'+YˇL=P$\S,HOY(T侟K8}[T @473>3`ƈc !UڠDTs.Z(:v6m$ 1Bj"8%w>+J&ląg#wo?>Iwx?0&Ks;wi}$ 4F7Wkӕ|""`1%/|D^_ ~l;n|70.R_9j y'4i/A пM#M^c'1UbiuZ3:tb'_OALzF~1]$a=3rSIf;s~-aN$̞ϩMP|lTx ]rQk af2}$fHx8zqW\|wD;Y%rj)bcV'oQlxE؋ܢ%+:!`E9 j '.jЯzBKO)N+GfSgIlZ-q`)3~9}im ཭0|N\{pΚ^e6gK,G,ulE5(6a /4.7Z8u3jV7)mB QkOi>wl`h/VÀi4CX/хׅYLFHbi"> 2cUoH~6ebnbXYbQ78`e`^q:iup®UƊ3,92B/dA]xPkK[`3!*=)cw[:r"jz+%?GiP^$E 9D A#Cҭi ưlũ!d6k-F/H3x@E7Y@Puk b˺xN-=9v$<{n?Ð1l&U}w<#E[L-4GѢ$së Ciu5ݯZeLv&ۭdUFSAZE&)7NTٶH717GLJ8"qkMɚyZ kiӯ0&Sg*N* \On>Q>s;?C(BaizpiM!+nG1 QО:tZ-mJa5'kūp`-DJqɘu&Bw AE9  )țd[kAaZ&ٵq|g:fW?DN=xS_UIYt xqR<4?='FN[@S÷2nζqLԃ^8QNs(d_ieT{{v^U%I׀[/8j'|6 ={Wx #B4)"xo^xa^rA-?S{*;!7CjZNn #|:lΖ~`J)D'>&qY>9XV'`\-{Tym>! !xVmVH Db6>)T`0 Y1C@(q,; g(k;OO'aYׂrvDmBq+eWZyDD=٤~ (wiY uj?T=lSmYOV$i&ۭٷ!eEor]2w^-$ZMJt3>.ud4^DD`G(“H$>Ѐyq]1SGS qQzl J m 1OۘСdC_}OKp bKs'Kywt"; ̩ukoӧBn=˔8gLZd3 .w9kAHAb)1aqavBL%tVn @e- ]7wǓ_!4 /Zki1w1}VhI Y'w'UbH}[xdf^SԸ%+O{=+hL2ѭ{KV C)@[ Gn뽮V{1Jo48H9麆Β0Cv޷~>f矜IOQ&z 2n#l|xfeJ 盱;(++ b~OS,.1; պ> e'~ٜ^2lB9`erv#HtY݉mR5]. v$gcs~JHk~ la_I-яp,G;GO"_;IڳX=柷xul<"~,]q(yN(kN"2.89aW_>Eecyem۫ :J=Hs/׷E!3h;۩M+1(9i4jPiu6/u*SZ&E1 OORC:)0H3`lF}AaoVc͌9%azM[_>htz$ 4(|L83[ k姯))0H Q8,Q\w 8 -ͭهX۷5MZ?WA']mWEdޒLb: 0TWxsp?L}kNn¿3o䔆&O\SpjJ68 =a٠=zios 4a*ܩ,Uݍ`I({GQM߼*ޗiq;c!&u,z1j_FfXcۚ)\ w\+3U&S21| P5/^E >bX܍VQ7nAzxWa f\eDə9|RPhoҬe?4Qf'V[Dz껡4Žrwt-%S}Ԛ2E,gg/F]ft`CEຌ7W\\n %-qy67`Zdy s=D^K;/dz \'`=zDW49,"Tتn3U yl[jIŏ<[CDOv#^dvjS>@'AU7=3[Uk*WNɐ xjJÜF .gi,+e[ޓvn%M$mJDc{ڬrlj]+HA [m/oH櫦jNV55xs#o,xI|-tX$ZLcJpTG0%P!a+ƼWnu1_\>E{{Τ׬tqתE[JF&msUh&u?KـݪVl?D׍&z ?UP 2iJZi!I *V TO) !zBH-7K=[L_*(|ЁȎ)A%Pc8d НmiSU"07YK||1^W'<8L)]A7[ȂN DSM*jHX蜭K>%*nD{kP#u8wFlOTޞ!v>=* C<9pd~L0=u_F.u%vБHmL>-0LPEe'v yP^C4?r/ 85Qhe:]8t6P |o6C e>$2R׽䠵_vpF*'[>Q8הb^j wM@3 tWq4q;YI{?AcCڪsl0okŃiC]̋\ö *txtѩسi$}a{1ׅ}x?ˬw1 RmTcX&b-07&:m 0!K.sZu<}o'4F&'Ͻ-h<}&$DM1BACR^c%ѯ˼*Pq o'ᔇ0 $}o>ViaGZ`r.TIq[rC' ÔGf]mR F#O _dbʮX T )u8w&u`\2s|߁*iJ0mB9k  QM}.5a` +мmQQY՚o;Wh]90AÍy?9Wee4yb~pmC2:pToƬ^屪&TM#^ o6'uoe PC)Д$evNi2nԋR\J`Ԏ [_Yk̈.&u e7/m2"i#"} 0kZFgD^4S8)j!4,af1IY`w=>v1.c ^ϋJ# Q (W`}6]j,ѭ8=Dg):^?虻+D]wGe1⛶d-pŴ*1?0q~=,;e@H/d"'۪B[lZ>m.VLi{xsH)1Və㟊I\*8Eq*4r8M^dX<[" Y%2i(h,W@i+@~v! ?Ɉ"r{v/C"-.Z"Ȕ8|7.aQvNX+ᏱJ#DV -W nqHAo,ux5XSIbEGGkpO:O1 39)]ߖnK~hA?nݟTk [w6)q65YK-n@-l);bWOQJf\2xpeÊ)y|qZxEd*\5Z~̔!-mBeRǮ6DZDx:$=]viczL|( s.ܜ+ZumW8Ev9HύQ 0”8ϐQ=23S3mVJ"HI1n%rYXS8Ag3  dS<Ϊyt`?$y2֕ 1f l `ؽ\Ly7C R2-q=}}ƻ&fDȳR^$_q'EOn}+ MSWeH3SdgGV2>gn"w<{ڢݍN+<]~p;Xk0#S+y|F`|Vi􋙷XV)5ZG%zbHelUhƺ`BR ڔ. u"`W!)?_d pչd,{h%5v\HcJ^̄~ duĴw _2x[cҿ5BLFׅ:Ԗ}˯s]}0>vTYba9ʖv NhW5>uu1vÄ![]dN5OM הM@ӼUyq!իΏ(Hk⣯urB?T>]j ?WZnq[:e.]=7 h75ҳmLY\t\E'] o(k۱ dA*`$ '.DѨ]05;!nLr%"(fE 璷|_᫶B-\13Vɟ >}ڰ5N1onO4Ǯ]( |71p(ī/7KEF9v4OpeW#C"剞J )aW_҇hrtwB*zX-iUW9̲t }i3nDn'O:rۋh-#^Οdϟ<]K5z10p6g' 7E`ނGI_X,j+?VhF2 ĉ=q 4'0=_,-̹q?~r\Vߖ50,vZe% @ .= R@ QrQP1Oؒ! Lʿ!,QfڹQ$]T:͎<`V<fF;>-]-u8hW0 1 B-2c.)}ZTOB92"wVÑc^h4b(8UXp7yTgϔ$u6e&|"wzѦDM/Ec1 Cd3޼S(OLtӰ2Li)qؤ+1vFyˌvbn8_T!RTWG ?l.SՍV*,%\(I@:wRe gktWQPҰm1aRnפȺIձ/B/t9z@"c5)׫8e6Ze1X{!hoM{vꁴ<XL)zt`y+I`֌} iNk fAg{HN* 8OӅ zEN,*ѯq6(ź6: RKh #b[ Zy%PEHM|8Q4TtFmNF 7Œ !ge߾%'"_H$Zί#^,5 !@H*̽ R **ErfW>X߉w7@FA\U%8NoiM;b:}%:\`e]TO8al6t^y9x0/wQPа[/#g&1-! (ejlFw̭ 2g(%=??*b8Jc|~\+2u!I Ä"ƍAЄqY+O~{yPw '8Y+6Ǡ\RyH1%,iq!ꪤ6WSLLD0-6uHb!q$,7+J^DNE/XrQKA{nTԃ 9Zޘ2a_GFM$upOFJ5*da̝NcdS7~FFu7.q s`tRk%+yocHO̐>Z+ &%)sq}^P+3aO|HrqI@z:] p\x/Uϥ_^"O\[#=J貒fg.k'`>.B]+VrQ1A lݵ@[èL-]LG+a#YfLyϕo:?MHmb^1? |\!bE2:F-h=̵䣏y^^6Tj0˫VakAl֦skFPnn0F0Btu*zAסtgg:-_:|ذ-[ A/xfoY-w~_ ✁:t W䔄"-BZ;ѴsQכ\QAfH&3K:`ĹT̬.[OstbƯ+ $j M}uNኬh.Xď,x7czM~? MĒKM<ȓ >;G7u\̩mO gOcq@=95\LH1mAꜳIe8Q;= fK F\֣V{}דfag2DBxr% Sœ}<ulX!+7XfFNcmdR6bاlBfE+}!Rg̃,@60: _Ic$>tEF&4}争sHԞ{g”1hqN5-.mYDP73{* &i](1{wSwnx)Y|Q8VIvR 𥢷_o;d`8 0˶ Ci2=4:ǵF(:*)zq9ڋM|loBieJiftFnԜEglHuUi:: c--\3EEI!ঊ" VBJWTe\ŵmLǖylL[u dBykWA #kOi25nMh^&$FrT hdOq`Õ0,ը9RE Ԅ%&<q+ q /ÂU{*{pMk(MRbH2vL;s GD6 `^WSlS3 6 vYۇGnCaMEZyL2aSN y .Dž_bӟVzi*x% eSoSï`l0( @M p`,ЩO9L.&L\1\6EYgDI>,6Qi"lLVvu,z(cg s/#wvӊk;&=pyYe+P \!v&1^yd#쿷tg[]N)Z/,_}BG5f_xXa^.qS, HRyhK L8lj UALnko*W[=Ӡ!4#֙-ʖ/W6{ebIh;w;c?%eo%H7ӥ}TF a fPa Nd场"OoC8 6ym/S0L~'@MR?)r0o3p^J)C!ե`b*z@#}!zfE3.u Zp*d;lxJ]orĕJ7QBZs 5# .9Wcyo1KX&c.cxh߀xi/q]*oLsFܗ7}ZKI~?@FyؑrH[Y' +Nǰn=>y~N`F9f?BJ2A*?(#k>7%{~x^d>AИ]q)|Wb4P$4ך;{wAokUJoM7q;#$?a#.vHgWNs3qWվm`>40/4Ú,cx9ZrQD}NeFnfۺ  ڴfږm+VuSo{@ Boeda޷D{M]^<d)A{YDƘ9#@W\hôqIТa( 5\5PFn;;¥(c\PP<~md-#H+rU}."?.0Ml]ѭԍ%Οj4a k3;o{wEa:rJj^El6UD] 0|2V\ :G-7Fk&0"=-@JRQe4 $F]}4qǤ.kn)oh(u;>j%\\E-CJ7Gbu(`6wwկHWyP}ج ֙B#VXRQll)Z6Rt*J@,1u @Yѝ rB /C;,P.99whBrݨCQ#[tӲܜmS0ADeKZLl`haF$F8($g=ҋ,jsJERg?eB;OШ YVɖعqr%Xij00՗wGсF\,t9yKр7ʵ5_A8iYԡe"[Cɑ&=gDň KYϿ|7IO1}E| H^<|o;)R)K86\/fwɂ1|9`s_%9If$L?vտCO*[s5`S!FB޽?J3Is+*'zzC/Ly G ȺcZ4*jfs;+ѼzX%z^S"Aw|k-mIf=U!ju9L&YdTd+, FG6 ;hcRS+q AMRa3V=zn@.aU0-Cۍ) C$Hר{O8/HWV2܂)H4xJ 3AxZAxq>~ha%rBТ$Y !#P]vyW[v^H"XWW r`k:C|<3>28bH7{^W6,B^@촲7NlAwzb_p@cXU%_=ލy`׸t&F# m]wk\vB &(..ZIt%k4ݒv%!)-!?.w N6㨌neu;%N*'|IV܁gAW~ei3[ߏS a[2 AG&~$.Ǭ(gT4I絷7tW%GY .>G#^*n{AC Aڕtn*4M^?)TQciɽVp/f7%I4 ^ > u!O)Q*Ga ƤZqQMj5ݲYCW/d/=ݣD1G8 jXGЏ VR#1̟7HpKGZG]z8>~1qz,6bWB@4+ VEN. eVk/#.k li = =yqI#8hP^P¡*^)g̔?8 e&sL1-Kok|`0ζtᶔdz_DqCz1Q4@7(tf2)6=[vސ<%^s uj ֨6TD^6tؿ!s=ݾt&فnwVq/OG޶!.Džbjs΍p;|}طfuBhV>Sǡ\jd7I>͝zw/oc?rsVъ\q%WܷþmMzm9l/ 0jBIb\e,0uG 컄'<{ s%VnOSa-T82@kpO4u{;g&T~%mWi¢b#Up#ZL6aw.,2$LdYF%)^:ۀ4LBa-3n(A81}GG!r Xбk[[ 0v(qBd(6h_XCa1 '@/DKOig5J|4p,,gŦؿӵ7Y͜meTSq%- ]~fZɇ[8$@k\}'.hr12~sp2/%A,Š u&U7 H+_K`\7 daNqasDM@z~&l7U=hO{2 }C+}9"#3ⰾ\Kakщ9LC1DޥgR-$Ѫhtnq6 Y$"W#g0ypOΞXIX\GUT;k>B S^CP틻l[@x]GKVAG[|` F7MמLRSRBZF5Da_L%[+ejj"|Zޥ?ז4R;K/i@)w ϑNvX gXa (1CH$ 2Ri[B+aӂjYqQ%;i5WX @R* \b>i谒pâwr>ed=ȮoEioMF8rGr7dBQ2-R -EïN+*=soʈJa 2o>T̟SC~{YWP*RaN(90!ZVx љZ*@V[J-t֫I-Ɯ o T<Bm 98aDxi([|:V WjxF})xi(/+Ipt4BD=;:Xg²%Vz11EXgΖ+L\ 'keIi:K 21qssd);} '54* ]T_i /Wxh[pIc۾o9`Js, 1p΍/%=!e y&la[Uoy8ksA ܫ7QEZ`:#j }CNOa5] >4UXN}Mr#gcvAޒ"1b2˴G1>}YSEڿ -cRvjɡ6iy^IҥB 2 #h0 w3I;ģ̎Wy5\ulEa4|YUC:n?~>4s ЁkoPm<#ES c_t>WfI3% d-U [Q T{uBbLAa?f,bֶiWHG?K$o8o/wCNt>yUyY-/y8$9lϗ@Kj%јG8ۭh<ե}–6)jq so)o7 >L1fDzhUS%!>}'LcFOia #.3H_Ugk7T\%jȾ#} B!1HO+Np/#f:/*)dFo HvB(L}Yv FXƤ´)r6&uC_Wufzt ٸ`&j f4bN5"e@*k+%+hMKWpqq$ IHsYS<=mCTA FJ=lH^;F*ОIӐpPa^L:3.KK@ ższwSYLe!҈Ew@kg [,l{0s [,27M7(hhKWK(K85\&bh? qgZ 'hvkq/v+0m " 'p֌M8b^LX+NZ)ANnZM3d`QU"wI|AphIC=ht">裒B+2rY(b$ӛ4<8*<fU`eCnoE$,1OpvBdi~$mRsZ?]wj(afTf a_F(Ίv7Tu"f<\nj0DiVOơo I{x7YM_59IwߜnFv]…~b9TF ]< a5mr.p|pab;,3{A4^NCQxѽjMU@,/W 2Vm`?yM9]g ݎ2G|vhjW>B`gk;(Yu ?# )YaZ^k(.1{(r 6wͥ*Gk)du0ycK@KfFYٚZ5HaL}/1b3k$UR]uuQL.F)ZƬrE-4!ӎ c酊 lPaI:+FP\hCG#z@DUAxV@rO29 qEUٛf{k=hZ]e3iA#%~L'=W0W>N_Y>j:w^޵\k-/ }hHL \эdHDb-B_q=]|Y tJGᛚfϙp昻~Ku1Rᄘݡ%@~4n(½$ᕮ*ck z_p4:ҮOJWB_oPC~wcSm= '_"`P B )^{gn.>眹dXkgnv1&%zVu,.vKc^+e2/l+/O0O]z4Fmں:݌8ЋOsucQNS/5wߋ hڞ5N)D8,#?z[ Tzy22nwhf Rd:: wwބ$xIڮ PKu S~`~oQN1t2ó78$?ddp*I~vzs\TFuA{'_}3ɒ@Ug3,ik[a#:g*Xtq, /z@Qf&US#zS'Zq#11@E<-V%ެӀRg UNܿSTn |ƈּx6&?,#z&ڸI)1}JULnXVu8ާ掦jcKO/;< JCWZj/3KS?!!OӛfLQy ؆J#vQlHxb4_MJ?Fv?ұ!3 kE3!b h 2q6MbywO?ڳm$ A [#X.3Udi13.%4 g+~j!wo]ŌYFgJLaA)g}'0wJGwuJ*э%ME\eA"_?oDF֚V"}L- H_ q[pǬlVgv8grMf,0H޿h$ɘm ."NSٵ $4kpT^2n;VoU1ݼuDR1,W1~ʟtJs=YaqԲ4;m @ұ-!w[xԈt`qAɱGdx{bYw 2Vu /n!єwi0N0X ʕh|U!&aE}0YJ/S/!R7el ,zT}!>:#%CT,VdsD(E熼 0p?`6s; 5;w8YҜJBlQU/JF\Uv+$t8eV։^kV{7{uDL{QHUrK^E{Urh5C@ }0 N2.CNA9v2ǵ+V1z(J1돾)UxPd_mO,y飵Ûx5uR`mh(u=ȣ}9Ju^,{aQϥ\>Si03ЈݦunS"`] Uk]g+T EQQUp9| 4* 0Gץ`-UjR$-3Β '/I\٫e:>8KX[ _d)*x揪]Լ1O8@>g }8 S @ӊ+EQi:udH7&>-/= 2CZD`%GWnMٴGw> -oK9;zCw]SLg[4οj~;_Ud ұfM9 ?Vթ7% Sn]zϻDͥ{ّ]^MFB 6d;ƧqS8L 1\RhlxwzHVV;eeox{|iX& 'u!AYg">þM&w|7/VG9ůȏ.!?/-iެT3ޒWO@0%+ 9 /$!se,]ck鶵x!37Q:0 ־DZHf+K䍇p9y#gZ8Lx`E%lw~T7TTY( GZASHG,.Q PHHPyc'ʉlwgv5ʧ@ĩ8`<N(O4Qu1vs2#'vfm-EN\A[Dlg>*=SPgxC&9d0?~ ɖ} VF*;m;F=76Z[ "D{41ɥ%=irW6>s.8 vaX}%q!mר=јSc~/(ѕL͉>+l6'^[S fPxBTh0[Hȡo-Gp IA藤T_ 7s?R؈:YWSKZ|3u1a[DU/g-{fqB d׻#LNϺH=?XRËRqY~/uD(U!#ԵkF;+T@ӺЭdOtܞuefA3jy GQv: +qu6d IC 7"M9:Dt%%Eܰ{A*9]~6(P9SDtAld}@ nLJpES ~LxQӾvQ,͖{~z̤vH^Z\X +L*8Dΰ[;,{jS 4q +{tbd68!-'!iȎΑT gT'#uH>^A]̄δ@LsPim[H+TA۩q5(UO?Єy tPݏ7)ʏpʩڟzOyG6bw|phjSꂺْ}w(CnlMPz$Otwb9Rv#[7KruCC-Lj("،-U9m1j#ma6Ip{%'8uGQ!NOإin~VU5V{_8;>/+@Aťnhݘ=ӚspC-aKV\r;;u}N*TbEfc9%h|]r)svau+_@E>$`TyF5ܓ~p*o*s`&pT\:{*\ vϸ%?4|"1@N62М #58qT:&bݸK@r\5Zo<߿}_:OjPY}Ni0dG cDQP$=xonqzvE.oWͷԼ:"Ȇ-gV^KN6w&ޣZ!U wH0I .IXк5G"9z =x `qXo %VPe}  {m~lty:JCuuROw'8O͓b9M/W+- c` ˤKXDBzAשTi=|/a!&GH }z;u@:Ni MFmBݑ!]oBA|1{LOFc#^Viz|{vU]7kgkvpj<"q&.ǕЌxA&ӫ=}I5ܦ$4)kxC >f?"fVv4{ʶHpٸUgX)?;)΄N6r*J k B=0oħcmv"ĖL \񽼝ٌ&/kP,n>hf„f0dMzq} z Vt?Qm3Mϊ߱d_aIU~TKmģP@B6n/#Zt}jlI2>f*"ՂWbY%n13YˡFP'r(#CX]uXEn\HF吧ZOPߥu7^_QƇJYY#gz1[+ zQ:Ng)V։.ZI[i8=^ "7XR k`8;m-FRS\f *vZHXVoQԽ\ 13i A,E ˗*1āG -l/8C+mP#0] ,\ME!bIJg)ѻ5ʿH"je5.S %ZA f%n5ZKyekYY\81V67֯Sp[rE g`^hx]!Rѝ&!m=5?V&j gt1lm=+|і2Xg<R!xVXr8sY֩ٮz)Qk+ggM딒ӿa $"z፲ƨp>2ZHVL]Bɤ.YRӸ=o4zvvn\k4݃pJu(ŘVjP 1^`,V``I~ux]C oUBi;@>) v1}MP9ŶӻM_̖FP&ܭMf^RѤRhv'':%:+el-gmYmALcwDQ~fKpopCj Ř F"o;l^.2AJA!W)-)^LzG#^ĹXa(% qp)dsW~evT?\gA5ˈx1mƾѕAgLg`SV{c\gn(/(vZ-f0֡9&/TWO_]A%Ԓ=7\PfiyRVoZs%"]~zӝM0zjD !ɼ@[Պ׾e |De"eNHjq r^bq:(&ˉXἀ0rI#06r8O]gL ǹ#|I ِk%[j8^Sp'{HM. sn*4~*Box9tYf.'Cudxad -,IO.ȹi 9N P5-7r1lbBf\n`SIB4+׋Rk<04ȾC^g.ULso9)7lX2V~*&߸D^ BΞn26ICEc4Bcc **GAU\I:MA"T.޷-¢=XbÒn|6e>b ֒ X蚱{a*heSds ;c(*{{+T<)s ´ͼ[iO%`Dd+1;`}eZy4Ek;+~B,s>yt:A`KǺGI$KNCT&ͱO$|Y6*x yK) ^6=J,zځDɯC2"h= ƺh` =T g %=0] OnK-"\5(/wبx7ULReg!EI. )1Xǽ8!Xc'2 i3.235 *1+~{=Y;x7Gsw,r $7 ! ܌aZݯa pٺن)3NzO2_׾On򣺽D9)iࠗ{D`oEMMvZ/BW N݁``8UOϾ@d^M^+6 6*R>"B0 fڜ}p4ɕcblZ S)R3@:I&&oQlBіSqwɦJTV(\hd)~3Iq*s'Hsmq%4u2q/f_vpq9/iQxdÕM8RP<N4*yTHO3jT$@[oolw5; "0A+OyQя{*;rY:#Is etQ!!͙͢G%I}q{ײ9Ami۱%Ƈݨ bQaY's#Ʃ&'bTF8z[ JzTb&a[@BK,"X:` N=ǰiNbzydb32WSmP*PQ*K?ݟn"bW+Z4\{uQV, OglO%8OԴ2#G&C)UGAb 2<|hS'}~Bi̿եQ 0~r(:٦g|{èezosLuل )#sRRJ|f X഑rcBTSuV-bQ^r0*rl(N.FJ{h,$q|߄4irOxBK?Yz 5#]˓P81ƫUm{>w|rzZ트A6ICODDnMe,6TgiQuⷑtL3WgAi[ЬGli\;7 *v3y\,ztlܨ6}^~ {7.M,`kxnm&ז$3 ϖEׇbad5CjQI#ex/it*KD7KgR»/$=ʫȑL4Oټa]`%>vzf"`I?1R+ClQV/5ml_$4-y&k_v~[ZmLϯ|D_ J#tCд[cif%c2 @ffIK~[yf\3(%5!-f@ҍtOHĀ@1c& @'l d<270]sDSTK1;r=䰯ёVҡ΋\T>T*m;B? !@7;0-ẁm+tkRbO)رC , ާ\}_"R|SL͖5uZ,=~dgWmz09i%`JC#+i9=b./%Yf |^3Xr gQ$ӜѴk!W]?Yq(ug{jeCJJZNSDp0Lu[gH21B2R 1vۮޒH UF'wW=}f/5̜lۻhi֭wBcB ݢ8"Ov@ۖlzha(FŮe8`̴'wO<4<2$}yTX*vX0v9V gNhGH;)Lo sX`ZDգy DAAS )bω4_֑;Ȅu)\?hoU3@*t(FpPLH֓yLn" ixFIc#78&$^\6b9;(.P5d,0kU㨙"k|Cs^ RTk;^ gV4^L,I%Z6Xdptry@uxIu#Κk)rf-'é>hlYEb/9,SKTA% ƒ2@ȅNot@ `U_Y\B^`(O i\/2%فvd{O5ڸ-HA=/44nҍjuYCP+72$">=@1JUUO~b#0.b;)+0"y+k H)^?-,HD6"e&y!qN6(+VJZ|Sd8L8*lD˽ 66-^Ax&^g$2|4KL{lק2tgn1<KFڀԅW}z2,*RARynu^X'!nXrS 2_zr^ w+81T(1gx#agQa[Wigj K=x qw0%򫜼ZlLa+%좒#;4:/fQoLKdž*Y!;A*K]:AS%ǺaDSCO]xMY`ݬc2P ֥AFuP`/=s푺|,a;`gP8$=dƶ-<|vc)z4IIycpq1[`giD/2 ۩G/ t#b,m|&b><|˭Q"ɺMD4rcD1RZh~}q쮫}>6Mڥ#͂QiI 7f`zCpjYa7?t {{gGzLw/spb")E(@x ?f7%20v"cmpԜO9WZLme"L@0kOTV|bI{k‘j/No<,K&*6.i*Sm0n>'\o􌵍K>r6A$*={c;a"|}mA X=0ou|\D02ζ`D/. rAe^H_qTOy 6j_qm/VATpjam yn-rK=,0dkf5hd%Zq3m#zE٘*_Xr;^"cf(XУHބo˺kKS2HRABs;=N䝬2| ~jeC !z:~8A>w:)}{Ri&j c=[1u޼ g;V;TdSz0T mm(ZO&#­ϋe\f77zS̱/WGO(>{rwEVKtsaJmp~f XlòPt3\zESV(w͛|@M{޾$[BxB HٔàA@仆"0yʼ2tEziٜdk ^̖UV0 ? u+!Ogw+=RP!|y4>kq|N<^owO Dɴi]p^k\n NvʐZ)~pA|J<LL EnkPRy`gn ɵjt+Up:ZT+N /ŕbj^? 4'm ˞ȫ(x O&Hs_r,Ҋ;4m]AYR;Xe !j;,b0mZNT۝@ yYW8}WM0Ș쉶OP-qJ8KԚk~"lORΡh\3oXQ><66kd|V`,lxQȍ4GYf"z}(E󏕟$3@("c?Ρ>0ֈmu]Q1f4Qe%L |7D&K̡kqՀDͩvl5wY^)!Mt}ZI!YH"fٓ2+`TCѫz:_0'U/!'oc$쑾A-;fkI*#yPԣ:Rހ')TxZV,sPӂYUZh"Z Zg_蠿랎4!Ɵ]} 8E?K._ys""Ssbng$ J5 ] ?5 ug=Oi^H)4F_ߑA|Vf쨏/]1e׶]ߐЋYw4 Z8$ьP"_aS. cCeTnJǨmeiЗԎ3}Dݡb5wDzQΈf4$_h٤S-p~ |-TI87h<" /JMJTo6-C,pQL.E;Y19X9 K*ꯓf$wo:s#>yFbE!wˣ8فk㬓p%xs mKimߘG\;xLX_(O ZzV 3b{,j*@ 8T55Ҏ9pS%(v'Cu_Nj:Kb>[amJ!d,W'(}mTAWF@ĶUMҜ`\v'y]Zթ9r@2&`|Nmly6~ƀܚC}ݔ>};UlA{8yӐro"~E|-z*@ḬAA]!lWAH[v5Ed}7W<bj n:o1>`b:b3^o.l~7tOg/;~lūk'GM}F$)ƒ^~mЯ00i#C Y;8lO!WLDǥ.Eڛa) ջMZm)D\:,=e"hי`-(˱aJzv[x=hKsnDAi``3e: iq)A_vʅ_bj,Խֻ/||w~O΍GI n RȳYa02.Ň l5s  Ղ< : *X-Ͻ Q*Z~A] VnE1Uc"y!)]Nlk#A*v4 Bca9ɤ۠m ; 0Ȋdp`l(Ӈ<=b};P 9><,ߑ~͞',W!^ E30&rU߈CMɶԹſA/(R$vn!6ꢍXˑ&+gņ镰Ro-?x4 mI[!tY˧up'PS\\?%m~ŦQ`趚0aPˢlX,v9Cx&c:qηl0O*Κ`A$OH7gh GbRE7wkoKơs4G{Sjt]m2r0d0,Iw(Un~M5qi-F<I˺xnӲ5^X}R^ߞ>ޟ'[5.d6=ff|Jג!j:}(^4= FE]3Φ(?ԍH}`b*`69#oHRskWB c xڵъ4[ +j':>JH Wrܭ:CaǢFŶ983)< `|iٕS%A(ʫ۬(u:% v+*Su.$ /ѠndsE[o%=BlenoiN5j^)f/'_p$#bNdHߘ kngi.ü Dh-2m><Kby+,3 bfyw6 Q5[|cehDKz*XN\R| }c)~>5}ύ_ެc |0(^#ʋߋ6R٧8G/tEЯ}\ G_`aݯJqb9xmO&,7x63lO[_5\Rdb5r&J[`~.0N^X4 ~Ō+]愍~bZ^ino%{j );X䡅bœrEz4vo*?F.mVysvǝb Yl12ͥ|2*<Sf u0mm#o^F JwǂQ+$/oJxSܖ\3}#MdI*5꒣LO E-~>V.~>0C9>r! CmHҵD-(?_aMO'|5h`y=#K15xv=u>F4%ػut髐4927DۆE>٢xZu! !Ll|>vx;M&R׆-sGH-с?qWX}"1KVc5}n~4%y8ҳr˹ٰ%惂=y_q?挞ib// AKSDӑ8;!sȫ`RWnڟ{P1 MwUV!X[u?yɘDC/WbJ'kHcyIQRw u_40f\ KcmP6S S6i9ٍ]K=ғ{+\Z(|.2hy]Ke;x*4xhpyPTj/ o9N9-3w)T}JߑϰY̻z'jvX  %cs Kk؝&j*H֏-y00Q\N !|dblKGVIr<dz,/$'2H]Ĵ3^^v\qҡZZ r?15-1ƨ _-3n+쒆xL1E$;$Y؎`дX <7>kEfh9 Ds*-sf\kC% 8f\LL Iט2s*ByY<˞VI) 1trx2ECmPj7쳞,].ʷe$n<קr,e_ }n DDם up*q:!}OJOj "kR Tv:"N4]7H82<9C[9rsOZ]>C韭 |r"8ET q][4֪ gUBq7 s}si۷D, Gw?Bpv{q巅~&њg dxr!d^e*Pp819| JHlG(q@+'Ş-Nf,C# ~_<7FN?)y# I e!j#f(:\Vr,ug$wF+8yӭ.\c *A_Xne{I@x-UԛMI:ۢ"QٯV zn-Ց>fX,s\\rIt3M %ɩ̟`Ɇʹ{䦺SdJXe6JG_|5XtV$~GJ+6{E`??խO7*.޽qљ&dC*I]0f~-~2i:(ӆ}c9"q 2?IB}I@ 3mc녔sq 7ok[>1z^Py"3f/p*M^/29Gdg`ACDkJΣFrLg|y3+1SҨLkD&Cax;WS. 4QM'T-HAMk"%bgy}[=RfD]zFGw<spI9za,H6i>{?)8SZjeA8@kC-p~DxVX#b G z  oIeY6; V/ȾmZz{c!֝( m^Y ]@08x+/ܬE9>ZSd"1L!Ŝ-}sO+e|]v{8MeV5W)ͮy%KC5b{7,O|7brF6SXJ-&K.9zrg{ҝ C#֥SPL챡ߏpoرKyK @0Ѿ} ^ۋ* t\Dz V4Mfem VlHcQ˫FqR.Vikh©Gh=8uܛ2)ֈqD;I[fiǴpay`fq<S(orgbqiotUvgFo:KUʠǬC`uSSqp]ooyI0y*e>tqvYOw-2liCCoڀ]93"rZsV\Y}Ɉ\).&P5`nK"F1#e8o{e6'n=o(!-.I` V_r@%"uMIjd7IeK҆P=҂%đɢ͡}v J@5b:B])7f-oxMtk 씡) ZJ3ԤY}Lz9>";A Tdctdʝm$^.{#>=ȷZ}Gu+Jf zVEioizSd\ T|KO"喷C7lX2J]T-LP1KyP2ypˀ91~ꒄ{}ф7.Մ7̶m[\KClsA--nbZ~:+Q'3ԙJZ.#J0_1Z\JD / I:GFIV0V%}Sb* sX|T<rZ+L^Q c$u,e=^'0Us:ޅ[uu.P"qҠ@|rpyhDE.x 8XiPڸL@K& B+,k9szJ׃]C $'󬚩uY(F"ŇrRO3Ajw*@}o&oeycCM=2M"21kQkA}a}kRw7 O|NF?؄bj2u$*u1c. ):[oNGJvu_wZ*BfV5mAr1qfCC <ĂfP7ɬS3HfzyJ:ެWmI8-Bp䷠VHXt˲|t4<ī=834a+BM&a{;Jv|uRaꁄGhՎfLgيMщ*-LB0KϦ/($Eʘ; ?\LEђi%K _}Vn>Y}j{l.Uił( 6`J ,dGyX&ˡ՝DM5)L[2k`f&LJb'>Ե%lZ4MZYs&' }l.=K^rd=}r0+(m#ۦʏl68bk/#>}p I >4&x'MO"af&/˻G54Vêu748Tv|DuH9VHb"Aڮap_`G{5 X@W%ȽDyHdX WN8Lu,pƤ_#_\g@՜]\8p_()l7nd¸@3 .g(')=ZjCT/gu=TdB7~P~Ejx/Ĥdxf_!ÉV%FAԳG; Li-j=4:Ǚ<i<vD>?j𪳑$^Gφu_jUlo;pP۵ W1=#'Zk_o9jw'Avᚳ-YhDП[itN6:$`K.ΐv)+{x @3}7MMYB?T( r$ΤǸAK:{JoKZakJ:(}#WjM$'{{6_OsddA!s2!ehݵiʳf5FlN  rZ$fBvU8m @tkt4]lh2+ 6׏g` 9j헋K)\j=T]uufIqDB_ΥcZ%Q)2wʇv53d$J;a5Z趛 ;#9 Պڛ`Ob%ˮ2Sl$`'v:"@ G5".lB}нz5Vo[lJ˅lÐr濅ZT9qG x=}K M$b&WS Tl83lSCCټ88`SYT0||(/eLw\W.xT8:[rk*l QIۭ,A!~Ƿ`x3fwٳhxpw/oXkSWJ*0@bs22FI2ovNRPҁ#laeq^3[Nv4NќA=,YM<`T+IR/y;6S?Q3}aOMOhU@0%I4VhJ4Sc*:λ7҄{$ 4,4@hJr1 wx>hʞKQn.Zjs~S2(,D+|(SM߈QRSn/33өȻA倭{tOzLEkc0Տ4Dgbz}Þgjv% qTgbԦCE<2B|q<|x ̯̒iہD"ƍ)s{r-~pg̍a3w=4/ezt!O/;vU^~+ϸr^@Q̙?x+arT;dk  Q?::(jD$P8|- d sӇ mP~l$܁îW3 .$#KTP#Jr ~KoVR͉9M[:873nrC.!TB_D⨤ w.H Dw}T0U \kx"F9N.YS(=`" ,PsݵbKfÀz@Hfp0:~ QbXCTTKdw~OuGSӮu"kuA8Lݰ agY.<7+` bK}ǩ`>xٷ4h&2T)~IS^2-U..HTQ2zbolt"0&-)}'[Y8V*֠qLZu@c*|ɣbg׸Y&-3x˭OR ƚ*N7W9 Oߋs.e'-JzÕFJ̐ӌyrk65mK^JγV 7/:jb0˜7K:>ǰWX\g z=Az{ İ{"KCבvxwp.RƞVk!gܞQ|a*ڳUǩ4?m/h sMGgHAzɎivyUetվ$ U pr"uRd@k4+ڨtE"{b2)`"t 񿒿4IJC.,+֤Ls8){9GOZL  gЁYE,k C.;%LꝌYZ6ݒF09ꅅ$i]QbX+!+aAf<#>~icuKd&H4[48,Wj"ޑ;=O~} j$vk .~1fniTVZ]I&?ѹvX^sdcj|19D\@^xfBGlAcPG}KtÑ'Ps.Eqb뇝>f,m>Vӿ3WFh86mZRXFw/Ke_,X޵!3Y3;ƉDu3pym$/KM[ *v$͈P9:@wTNa !N (* B.mBh1GeK en(|3Xֹ()椅r6B^_NiI;f_'ϵ Y2¤%z[߭Z(=YCdj[1ؓz5_J9dl5y4[/+P fZCBK\w#?W%uEI=9.Ldbwϵ oo#t)+o2O3 yksoP <]hM~#^:xFn[7̂-98is6\BɯN oqHu:oyin'߂|.jU}i})VƦ c5 EܙJxsmVa&ሰ-vv6|9\Y/:y'|*z`|]$ށ¶cDH +i)NH/e1`LnwD9~,1Y@:~ٚ*wHa =h^}՟-h?VxHؔ.]p3 z8\nQ@ LbASߦ{; )?2+{ u9Di(vQRu uE&CM)mj<H#8JxN 5qGK2v<">Py-t$g44PBIӘQHukyje7⢗Z|TYs^$|SQ?VAZ^g2s{B6}Ķ^5Mx=ސ-`!CZwhbP8ۅx) `glTj@5f>G,f4ش.fON"~:Y^SH%h̚㖑wQlgFBmrmrV^3qHW.F::Pqκ"T?SIrQƞ_csX"PKHSqdf n0;26]Ij.B$mMq}-6kE5D#-v*CRI Z/E&N+wU\yriBgSC])F,o POQt'0qd=_"j`%nE7TJ2o|5 ZW ʺ7| +g3AN1zqJ ܅IZ6*![h%s2ʠe:-t:uhV #ɫܯ]dМpcF +X ^l.Rz$qlb6mt?ulAkXʣxh 9\t⧇mCdԛRo2"^+8W Wt-Ԅ`lᰐ` G~7 z~@Ep%Jb{qAL\` qt$̾0'A2 0eʏgrQ 4csyRlɡ_m8EN43ߵCRASVߧtKF"W1}xNf1n _-BvNk7ӻ63qeW,M܍P$P\R= x4ΐ89BF'L[^A20hyiAV0תd(h!?t,S&]9XUnE@0ޢWZkB TC_v#e}w$X^$DO闭q ~RLԎ"u34URfip!'c燗=";+p>J .#U4j会){bFo Jx寸15(>ˆ]+p 2jɥ}X']TX§8\6oB=m_M|%a""Ӝ)QLS9~Nl )bX2a?cDdoBa틚EkW ]Ô6? hHl\y͜QiU~ /Hk$AJl* d $S(xITG_ :ZȄ/LQ /|oYdT_zd\STt|@\3?QCpOC?Մ4LQJ7zcɞ;z_m?1$Kr%$4Y?ٽ^vN'SCl~Z_e82%;adFnp[BԙIz *M`7r`]Luٚ'K,Kq‚Ϗ3*xKD"Ia!rB頻\Hڌ3Rů5^tgcF=?*Khz=&#e@ %@d]%!VaE&pAQ:??=Jlc) =>k cxdvz Iϋu1 0;M¾3/ Ny.(}!z`6Q;Ϋ-zT Ք,jd`GKD,Dv\pF :TL!S_eC]fZC~Mw %cN% /Mnu H!˶S!ł20ݞO 3։RYR0[CHך 3*Wy)Q0P.TyaJJ| ͌Wa%Ĭ:&oMp:pK5Z![á|2='/9(K`8ݺѳs^a3b5+S2Y43^L7dGUhP~c:/hc]5p3\.dA^ <sY2)=~~1/ԫXKRH\@סdrCNDY< ۺoCzjvvP9 % BЇHԹ1{bsq܊re\c5K\B2d_]47!ˑ洱uHƟ\ԊTqO1TWY m^BH0w>Go8_9xKvR6J [ w滛>-/c6<]O!ZN2T]Ö !I@UQ#ldh Z]ro}LU*M#m}oD4_lz9{}2gQh#hvO]L3#3Rf\@'fGX9NԷi#5z$S&e-i j}Ak{MElA-DD⭑J}4#nm˗)1B7iIllIT_VKRbXupŝpͣ}',  2P *MoK'v+2yeV/cBu5т'gD 8rݬȫ%vzlExlRY:-*g m!t v1G`]0[#r-v1do)4~/:sxJYa?u Hݰ[ ?c:ɉ96$7"U +:U"0SD0EgD?F EMpܗ:JF&&/]1$V:1E_ h!cbBipmx7\mNؐwHb~YC$35*5*Ua.\ʟ51t0Td,FE7 9)%UEnngo zeRZ>j^|N{m$ =-ض8yЌf>0|7eS>GcrltI"HA(܅yY?qeuCu&^@HKNiYl-~FS퟿ +^tT0T8B!O7Tfݡrq֦Զ?KbtLHǨ_=֯?ٰuY=y߉/P[-mtKup{ٰ}M-wR|fh9H'fe0)+9D4J ^;BTqvYzTGbq=zX}$F墺L>tz}f|v:"l* VR?띲@0@*F #e;fŗ;h G<.=#y"M|dOVLjP\x4TNO'Iw;QBg _N)p]:BpRvf mQu `4-R7|o~tGcrRi8JHL3H9PÝ^Wn{RᔕF:Tkg{MRHNbSաK6QV2_d?|L=7rA bh^GJ .2}4kZ5蕋bXJtxFStMvLȰv=\weG=AB+PK+W 5BcQQXي 8He={T\֒opŀ^1w6S98;YGY[Zҡp3PPEԳP[3_LRtQmD X M$#A-5nT3`r`&8&ƽO ia" !5v ~jUKu8M^Ӽ1ѵTK'h 'xbzDJ`-0~?H9_bP&AqI? IkZuL&C(e#c8fc`d^m[+UUH~X$Dw1jIA%?SN#D.*wOUGdh84f1pU:".Ј0b55Kv;1 g#<@ꢬ͢n,1{-?y_dH nb"只 )׏d(_RsjËm C3/@eESY_̣N{GE@E GVU (: 9kzmua, H6PZ]LFПAӔfyZ 6(A?>|Ɨ,Ґ+neshයӜG{,EV'00ÏK y\ $ >niYVU"*[!(y {aT[zCO4WS5U: U-_NJPB|d%[p'JΙ7DH\4ʢD SXL9@5Njޗ# `Z-g# !#biw027АK {Yb`L4hg[E5&kO-&{A yD1˟FL|D1bI'®vݶBS_YM*6)f>EܝhY Y Gu-M&3AL?G-(*[3~tKR!Kn]e׽ZF)o+d Rˊ>U5Ų5 yV| y+UĜCuu~Ni'G+ NZ7 :|ӏY-\UE}L B zdupIS:1r9v+:XX)=j!GQQ\.|ձ3''EcuAc֏K696 C6=[}qa5H(؆NU)ٴ|% &Mp!cqCEc4Nq}9XJ/ ˏ@MjqQT`WrM~m*yiВ'ǓSΩ-BGCriP(,bO xT(P7925Y'&#R͚6h{98$n]'O#p7HEFV5,-HO@KYX'ÐF&6FJc=!8[VjQK,f瞞HB9d7v ۪*ti{ZպA+\פGPj&y$h1 ?lk$N _ϵ|\v#M}Ԣ5}JP Ƕu$r !~ҊAeQmgm}Q}FGQUJ\ܞdg/_깘4t!C\ < G )Oe%4mM q/#ϥ^u j9b FgaI6?>"cL^\+Sՠ8d>f?+'S|t3;-\ `5el/Or4lG}>yNYF 6h-eBq5t(KFnD<4.gRe/KS]o gtu0)s8ک< Anb t+)!&I;v| { 'e5g3_XG\7V0mᶂ:&~~T3yQREk)We} r) B|)IxNc5׌>V`N籴]qJ83;:+E-<1ؗƅQwFU,$bL[Z~_=Tg+Z:3_猪_LU3u-yjTg "|SeG!J;mݵF*&$MZ&w^谴a@i^5cR[vcN^ft\ (L?P8n{mSزP[)ohbG4 OҔD̙!pC,)؎YITy)/ Gyt2)26g,yJ5*;A`GWiCBmjɳg-"rB- Zݜi>-I3HD͒TٸJ9^g )SnU,쥯<Ԛ3ؚ9Q]1K]<.!&Jb\l3Kuv2= 9Z}.I^ˈ5GZR )i8h b@+ 7C :w!Q,pYXxξtg ⊳ɞ3Z05Vp}z:PFy.I a"`&S*=0#?(t }؏L|P(x&=d6ꗁ[!}Nz2_uq~GbV-% 鯥` [B^Qӳv*8S5B=!;^7ٯSpԯBGT8GOa&;VfwX o^Ftŏ@AH_k)mf* . "@GL^c0f4h=<=sjЩ=BJA* %KjtD<`*ǡKb֗dtQLk`Å>wgX92!IsCHZ&埡 G 4zYFIOJ-wD@Ix >XrvN??_WdA|X&3 hĸv;Qµf 6 (3,p)ofۉ{\u/[0k9.Uy&ӽϘ*9q8R#͔E 4aVAȤ>a_u.jEƙhU^cj0_Wn']')Ϋ,~#9n4ale<5P]VA f@$}"GyRtl`>{tmjVfc[jsDYrޅݻ7 BQSmVZTJ/UZȩT5kg>9ga$wYCRHQYj8O4 ˛ӕםr=  JתʙbG-r1#<OUS;W$O7`[kPz?'e&}BY I@7K4m($saDNBWߵ-'F8W0OOh2Kygmq$hF(/@Qn .wjw^0 kA0&]<4%9l?|=S +ބd՚10a  d-ԏ'8ˮj|qjlu P2 Uq&'Fj`/#1F_uTȒ֎b G7T"hH\JB uMSVݭv'1:2ܶ qD ʑ ⢔hho  WB>SB3DSfÄC&{o除c`Ү4`wC}0\@'oR6 Xzg`nlK;gG(VLbSKUi2X] ~|bV4$Lz!v 7.&C]O(Iݬ1KD >iHV`y#Wom%cp1e)n 88jlx˙5U|c^@w3ʳGd!d-^*p#M8<9X{$#36NQ=FTg Ugys'|zbP֔>^fM9\z~W)?(̑~r|8`<8/פw5U­1os!ia֛ՠu'aB4T8+NSb2r(Y^+/@ r{&_~MriθCpq/<Oda8I<1OthԲ>6 J :DRȈm:Լǧo^86ny⋸lhg]/ީ1у6r<+ާ|?n!A櫪2 $?Hp~h7uW(J֞7I6/6!|%^*RL N?u Iu5y(8lK'1H>e.F7.}V R)RrJ>-,AP [Ae8H(.8U:#&-O53Ɩz3ǣHIdoat̗ϖ|SfRۆ$'Bcƨ 6| >fhr)P[懁^~+J}-<\4avFWHljᄵu8+ .SI~_(7eޖb6:q5&U MB;W?q=W^d'>^\๞9:ti,;K쁴QѬ oZ8JZCqnc'F2 ?dHᢊFц VVXWMe|.B@|:tCKmS?ݖ&kM E|$"3Z4UZ>8{ u"G+Ny"fcdI/챍\FFr_].xhrLNѳ*MqYRN"Yye3D̕Kas4~ڰ0hf"[a_=׃$lR_ R.7n7 fs)Ó+CYa_NJ$*B `: $f/Ҡc# )}zX "83*uЌ.Vfٵ)_8ɝ=ߝ]N0+V`?JB׈Py XVG:^ɏO1r6ɏn>d BaD>rWdɠQ̚;D?hCdkW0GƴFsfӺ$1+/W;Ǐz".%xkO=⼈dȏr?&qMiY^yn]"2yԚ1t͵U%j*r'WK'ZXp,;+0-Ydt34V(ɔ;v% $,n=x 0o\Q:B!^oCOX>XL%-=V_H|~hss=/nTey0ѻ\}VX‡#9"v Xy.BsޑS$`_7'+1xд~\T2"YyuX}Ԥ^˵n!}m21:љ(f.th(0\<^>\ۜ"lԑn@O%k'O{&H{Xx.rzL܊;j,Ao>ott|2niH{0k>gY}C<Ւ]*kp]~=(UNÓw(K6NX$:p-d"U_N'9hEUHgVܦw ~2'lpSA. ݕ<:{8=xMF ĵ|m"QT_y2tgt,Zos)bLRh&N6'OSdj䒔khf(8k!xZ wӣfY}7iuT h x#~O;K`# e(Ī. 1ԁ)z3IYP8Οz9Ca71L6+1a68:ea'56!r<> +Ws̑o{iZ*헝;K3rxg# 5hx1k&wHL12#l_ gS/K{RȻ%9(i='h_W:]ӈ7 =EH*b.o;P!E?=uR[)X, ))_jTI# '*fu"mOJ\Ծ6? .'-F@Jt\ 0#we-c5nTs<1a1#Ν"'|bkI;T6\p25qFpS>)H)r'{g-ξ)p!*cpm͢S.ǫ #ΤlۊՕ]STS|JX^//* Yr,@CrmHY4h89"DP` 杭 2G{ I^rx3kZ4mFM+,Bvz]tO0B ;)[| P/f!/EDeTF<+]D`"b.~vN܏ly!5ܹ鴣dF֨7ݩfLMW}"jv1#/G~3FPU=w>e *a (0z]+YjH1Bm/>J*U_qDiD\s$l. ϏŪ_{FHs#x<.޻!XPa,mJ< Zf^-H}@M빿CXvJW}y v,U&2꘠Fm/VN< Vip3BůF)BE!Lfxn/.6xLƁK!4]selaUr=$i %]H3DX 0& Dtc ;2L iݮs{l7"hXiH?Iկ~ԪMH1( KYJחwzA _xhvHoci+O񸞴76[6QOzM(c>sMԉǕzit\p_#BjKdCM(4bq?7i `_8i"iυ)DK덧0+d?ƯEQff_ϲǔ̓v*}Ş4o:6IbNք^'%1la bl pp0!廄x#UGj7jԕ2' 0W:m4fΜ RU/Π8[kDMb}od ;kMP`}M\jٱHV.-=.2..i>l&^\+VL EE@ /^n gpsWuqI#3gW\oh2Rz>)g\<&ݙx-H_s㷝Vq펩EE>Yf'|*kttڂ?3DOhYN"1('?'R{bCIWԙ| IHLƲX来Mhtes.Gv&E؝nC}=Μ>o(:sɜɮb᠎ IQ_dB fи~8*>]wazd 2PwnoǰU@O܇ ,OFۨ坝 6iEo)I1K|\USV{G} zOaf!!fw6Vi<TO%DvqoW ģܜE%[M2g YG'zH [ȯDԋP,)}ӘZ )dRIS bX*UTVhezۏ"xf[m+qBN%uvCo_i?]Uڊ^%})^**Ol[.WN) &9C X /d Ҡ{N̳M.v3*"F>K$0 .:4gs5sL^쇘A S1K%ӳZ^ZݰB揍PeWv 17Nz;pg><  A_58㒢N*Y$ 8UŔ.Qy*ae?is:a2čE{ķ?a% ҠҏabZ59 |as$Qlc)?Rm?)b(TۊRd g ɫU RHK޴H-op`U)&LDb؇--\Pn!P^%!zu2xijhBĘw⊐x_9XkLGC9EX]+oi{cq2TaN'2XoGcv&* 8qCd€^HSӑqsŋ_^$;Lqq@HmȈM[T<f߱4Bi><_A9CMZ1^|$agC67ivw:8w v@ɧ(TbZQ" Q]'ow~,]6EW4 ,rꁬ,9sCY_AzCf|^[id2^Yg%DcX+j;P#&??g„`"Tc]`O5-ͬ3གS' eB~N痿,ُٺBLWS9= I}*3qĹMA;:}I Wre3 ]z{Ѵ+J :_4"T'+[Ӫs&hQn"KBϚgdy5u"ս1KWtAsKP8a> Ie*!+㊬}b|c`Fa7݌yN!x]0ғGœ앮.PF帢Ŷ$Uэ?QGcO9$2S:Os  MBQ c,c*,*pdwZWi#7?U<*oXBI?D9'Vs-ewGK~a[ T5O9{(RbGK+_NߧR`INU;ng9f(YOXF'2_pa\{d, i)a͏ŖjKnn0\tITܮ@|Lsݗ-3i_/vGVIKϮd {XTMvG Jx8Lwp>,AcY.^ izFO1$%dcO^WoϣCS|+X;әk#̜B')tB)B0#}r.LT}Ъ_XT'#ie|B_Gιg;#2A3o\oGUkK Ҽ&0%6:L0c'9@&EP] - NkyEU)ưZDK:P練ǞLp0>3_>VDy\H A95[q3|!!߽t;O5Yt4u`]B!O>ǚ{S)W)r5ʆP~/>F%ӮqCU4+_(97I2CsRIjCձT~wer h?`DŎ_;0 ٰf-J1;8yiͷ#]!f a! >QrهXR{8ơÀHiS?qR9jcbD\hzeO)P; T+(^pDXlT&1i>-h8{϶8oh8##&72&%U+*կPe(eYlod`C]V7m҈H9םH^5j(O;?9`λaP|,Wi1=q!,A-{pDG .""nBy6jq16n qZ(ķLBDŽ#A C ?t杶 ^\)ݢ|i '3=xai0УOM EH&ts [_&?@ٶᛪ^ҭ}(X :C!A_Aj_%ޖ ~q՟k0㬲P١>`@^4vn֝i>\'!NMcSh7g^\m|3XN8:e>j̀}b¯6Y]z2}]xo^Rar|0UaTTPY?GNZz_%,( m7ԔАcc}Tեso ]#'E""YpSMwGKEw3X S ]m\Kj:{\Ʋ 6h(<ԌōMi/ Xc!ȗ,_"=- O2$zSɀ9]Y3(7LV$2u|X>u|.<sk _PR\b4OYYmi_k`{ꖯxC/E `t : :3F.Rm剧1ԒH(u:o~ :dm@(f^]鞴yY޽*FD(*7*:vmcY|fI\ G`Y92y1$R֎:xfeUYd2#bNxQ.[ rY뮵D9UYI)F?GDĮ׀@h5Û1C zH Ĭ(HXv[2(RxR-M &%cZX: g9EA燺o 5]#?+^/骙^17~X}LMd4RR8l=1*,9UF3>QRݣ ml7@ Fߌ\LowlrCOϤ`\AlH~3hqqEs>%` ^чYlicu}F^3$af,r{Sx,鷔B8T/6YΗ>[Iɴ .o5W<7'\G#*&\[<'@  LCa^bǎ8t)J*V0vj5)C(rOP.279t_%mi :g)B@)`'~(iv0K~qy<,XO{$UƗ^T!?-< =W7=dRoE>x}tg5pc,!mµT D-E4ib'䴝VXLQăLe',>z4TTZ0tkS`z|XYIس懊)p PY&DUabԯ8ےYK5^B2L~6gB_W敏+=rRà PVnR/SzBrNBo,xXT"FP`1R4X%oۭ<6ijPhC6\@4Y㦀/tʟe/Ό 8/C:_Б 7s|j/l3"JDI~]cYgM>+Fxޢ,#Aek*UpRk2g;7 HFE_L~هb G>Q,Zt/8wkbn:궅S$W}Jyv=wڒ%OM=7e+5B#ͭޔAu˼{bXb^Q16i:ԂgcK̀AdXP!ONFbZ붛~_lJ>=%dzBJid_ )ޜ7@awIiL lIhK$)Ք[iv_Reg;a|A ms'hW)q=_2rwY2@rgo1`yx?vc $7">r^]wS7P)G'޳Ƶe!g`B@6sj;y+?k(iVĉ;c 6~{S`5Ú{A[O h,Zꖍ0S9./b v ؗlO(;LAlpbn<%JprJzu|mV6uG6g8*nSօ5u Ʌ4%`PMdv+@d=:a_@e9ZjT "V>oOw OsA{WK7eNDIXH E"c%~ q@.9.dpueii["x'rn Ǣ,XԖp  pK|,2Nj˦ BYȢ;1uU$J Bm|g#x}WsE2Z/pLZ]Dyux{{Z*>D&Y@xp\]. ^_Q<Qui-@?KJVH- H-r, N[$o/.Ǿ!@H'63Y*&x9!OB>^%O#0)!H.-?h <7ʕ -.}}HĘYPj59y{)L۵YwZ.0Q.%ߺ@X4S'G_lUSY鞥 &*y`ǔid  ( ѬSh 2X4,}M($3;'>V]&У"C.+zpB=U/ˋ灀lq,mt !a'ظD[\ݰke}]B쇘Js%԰9*ҫ7̈́cRu*,~kyԔnǥCWA=#V!RmĄḙYe$oriӭ{6u{4# @%.ܟǿϿ`f Nfʅ AsJuv tőo8@W@c@ߢlfSg&?k@_^n`!)+DPrnb Q_+^z>qdBbt_N-kRR|@uA$${2U"ցtd>43!ϕ2A] IhelzAUءV,X\Qp$)|SwVpMP7ĮT9ӮѵѡMξɽDï錦GUgpS^[C߶Fy_c1Y1< z~ %NCn3=ǠQ*i9dyHGA+[r.fݏբP{4hR|]X*WXT8ӱ3.9QW&g{rDN\NO;]<V%יfJ"q2tN 豭Hޟ.ྟo@< ZȪ cQ^A s[ 0IzK|Q`Ei2=İ[܃i}MØ{h.)SK9'C%]D eW:L\$deEmLq~cFLI6|_ʄEWu)l 'ר|Yi7Ev&?qi ^rY?O~Bmn<Q ԎWZj!U1Y!4`Iԁ,M(!"ކx6rq'i.I,4ۺ}CBFIp!!i2{^P|!&9 g y~ۘ31NG6GZw Hw`$F}SΊl:EvCE^9;>&wT8Gò*5Q-B;.ޛq֟-0gnAz?`3WVͧ#{֒R@sg`㷹 #odTcy+Ad5vr=(c<>Bdx3Q ٴ#-jϛo5TT!O>sL:_-+.4(P_4ǟ˺H hU Hnv x1$ت_n6xn鎜vySiCV.s> oVsł) 6z7 ?<(p@(egҦh[өRLS;=0BE]K]?74lp:Ǩ{ JD@5;N>@B 2( R= ̈́vKwaׇ2 QlݱtX r>L KHdQ#F'?i?ihHQpV%  Yҳs k4%8nlC].vjW:ĝJ}Kuy; i{cD+nYnn9⚺g *K * .0n~e@W\ņZ ==rR.G1xc%_k{hT7SzO0MMXĒmA`۰'P*@ Jtr[*cu̫@SɄzD䑜<<)DnRf RvBdl Up2v[TJSi1<%a #Hpbsr]C~%fX]LO{A'.č<d#D| *AQ,BBnCS"jdl.tK* 9z@UzȪ& Omx`&}$?/t Vq5r~Bl^`͜f-ᾦeL@xԏK>'o92x6=2fltaTН65Λ4s7IR~߯Oܾ4Wmx6b L=Kzq8ZSC%b]:S&VO|+~fFfAULjm!stz'/*e7{]׭G/.\Xy4)(HZSnL1rfH6V2obx%ބZtM4qzQx(#vٰDb뤹EoIOԧ^:ԝp!;Ez p~$/yt\zl9 qމa1DhD%#:.cu8)m$Ȣ;=[ܪ||й]ek.*[Hyk*@"ˡ+ԪpD̪IBV $kd{[O =Σ-mDV)]W@&^Xx-e֢`0z*q>?'yw`{-]uG"M0<v9/9a\SLMg"{i 2C7<\!v䞕@Y?s-ѿLY.B-:hbt ]1&x~=T;9~Qi T1 ;Iʨ_pdJ ÆKy.?阝)JE wtRB$"/2\YyPd@ m|JD#8pܐcuXȳ~p :6ȹ@Ui.FB[aF\" ,zq + wN1Ӟq-뷈m2}1hZKؔ(n%$1BPt[IS_.VG*Sp?݂x"L)&Utrfso$1FtbHxR 6@k;DPX m7oM&?(f\ y%"MIGԚ~ήL?V$׬ɟ WQ ?~2VbE'_ngUF6Fs`&^WHlPf Tem*>N=gL_sC17(.p$xMЩ5M8YI#R?e.g?kCLdV|( oeVrymLY(&Ԙ=+c:6@kK*:YThG~Eh2}sxCps&q! m كS޵rx`)K Z$xΛNX4;Rx[®*roPO܊$\q9 -AtWSPٻW(/- lEvT2%s:9Hkn;)U\ֿ q _8^ EhUUcRw'#^EBQZ1LI~IX €$uߋ]q濡MFbJǝa6x RR=W8(>/̺ -rINm%-/fl>6+[:r"_vDo{aGDsA ^G"w{H\ &FY+frBN9,RW/qIi="/6.X<9 TԜ]xǭAmF^#8;ir<~\P CO.cH WO}nxr~կ۫)g)bhD$X);@u`Xm͢Wo8ƶ(?]q>lk}O;WlM s8x_(2a.iVC.XAD\ iXK}!pB2mZG)x4 45RRAA׉ۛqZp)" 'E+ɧ?PCj{gq.D6VjT3RJOOߊqQ/T SߕԼ"izHھ+0BFyiP" Ip6%rNom"p%v$6nOuPT2 X~fA6(@BUSIْ|n4x ]=@VH.8g}~Oz۳{\@tЮkPvd@(i4,~^̟yYdNML{\v!s1U0- e B|Pے|.,t;K 47~]g+=hVZ]uYL#McmM&bsQ2~dXE74:/X7[l/R {a?!Lg7[k; wjFqq̢_үۡ8w'E+"r!Ī'"3AmDž(.WX=œ/7.ʥFv[ zy ZÃO(ٹ4S*}ī80W[$U2WS;9S߂ݡ D*[%L`Y' ݋fH}0dMwX i!тL" ICH)v|J=L(!uNMf,hJ_|"s97@tpѿQ:yJp%e\FLd<%e4#gR=_)Aff'X|KFˬl9ÂhβBZ6=ъz=3Q9=XFjDOcE֠@b/gj3%z*.ă8h.SuUK-Bf3їRd:o[ω(yCG.eB\).V NG|ritjDn~$aWv14@{.,z4DZj۫Xi>exr1}P|Db%;J/#V??]-') I}^\j!t`Gt `PB%1-DǮ=)//葒'͖IYP}XԤ}`!(V!l,x˄yMnOrx Mk;wEZ1բe( 7YeKL z0NGJN;w`+Q'OBvf-qt>{~c9Qvc?Veأ!0B\5eO>=SqR&}1ȽH=X#?V*7azvc}{-`İ{9sV4? {7$-3Jvqs%XB32uBskM-]60Qi17mַ2]+r:L:.`m^HP7eT6Amdoη:"fCEKLHI|vNn;UuϤ"^b%q+"ͩ&|Q\펐}iaCiAܕ_s~ıiN'ɧ< ~}SҙZ2Wtm tYp1EԔ24l%G *}>orJ[.0e/.B"gb()}%SzܭfŏX֒>rt{p1G3z3͞(g>8L?N {VA:&}g;;*! f⭛Gt߯^X9؉_mr}Mcvɩ-a:u Ojk:X#6J/ a_,^)~%uQ Pp@IP~*z<"s04`YuE [%l"mJPz{эplq;&ߺe 38zO=Lj7WvgwiAI kT\u4(׊m>VLjGLV,j{+fԠBi 4uؽΊ6$],H;9 aRH6jS$ȗXPkVUըrf jOU+ e4sc[{] 77GYu/:ic =2𘾃CxU7\eJyƯcdp Y?8}}r T AM( ^414`R55jvF_:>q6Hxbp?ȷc筽rXLf\Kc仅p9A i$48R>Kwj:0Xx; #ʛ4^Ƽj{x_p ,͟>KP"e2i1Xo7#ҏhd])dpi.'D/-Nq}HBwpFh<^d"lvs>h pk'[PnTN~lS&b"4+;L)4[Ga-n[&mΦ \[Ipj  aV^ݷ`?^\3.\"5 =䅘k6Yt 6L~:wtaA;C"*{hl!xnw4< )w~k`(3(Aeh=wxD}p+P'f:QD|(CK:* d;+\;v~ $Ј]&*VTگ !lKc"%țsYv]Ec8x {<ek`~^_bmSr ^ <V/7ܦbx֜M IQ7[nghexkdqu 3Qn-Z?0l )͋_$,prݑƠZ"' 3A7z4tWWijLL$G2%"(vGǎz42Rzl1W+:fdk{Y9̺Y$ȯ.#ru$ q}xöB\\93,[8!_kDe_yn ^>Uw7#REGR\u\{ 1E;Nx8wM籤ÖT (ݼM-&Y!n_w`iwx./䇃A&@axy_t֊9{d=UTͯۍ8A&ps&~;c=u}LBӤNy' 9ߡf爩\l Z&b[?%,* 'mRa.˄Yz,]U[TNe 0%y#aٷ՘ q›ڐ#6`nmI,x薉|4wU=>M$Oskjq=D~& OLiVONi(?h J)Q-y =*q>13AԊR~=B:0̂}7H[{\6ucj50M¶,praC=aCPQͤH(=|oYN[ ̆ Ŀ wyaii`[ʛaBw3>esfHesujޜI D;u'$rUVʹdTqn2Gވ!AެԘn}sK:éiUN:Fk}w*M!9'"=RMof@`yƁ:%0]Zkb[q@}|&Clfs4MsTu*siUDD)B>%OI}rZ٬BC3m{I]n8*Ry* ߚ@ h̶WUk/B]EKZFKAm<'nvIwfTFF pSS mD VAm^gƠ6ڧKKђ:F55h6Q@͐C0%izPq}ޟ8޽axiV|z). !6(eBY ;#zhx])B߽m2BifPf. q%<,V.w3!@{v$ɺ418*RmW6s; J鏵͒xCv1~KPK&jOƮfvD:Tu0]AtH Jq2\x%(zj]hSQFXCzO3Ԝi[!5nHX/2c Ύ;a|Hf@k_gwdnm0ExEO3u'BqNCo CՀ졇+6WDmgXVPG<"`ϫpš儙=:Y<%IK直 ]&]BJHlfY>EL +%N.F,E.?t@B'KK!Jrc^xK0зHJ lڸ osq.M[/`.U0GG+(?zfU,ZW ,!!%Vnh-|P >&-k˺c]` jtgz0lfǘ~.}lN WRAb2?+"9Hk~/hk# W]-SյpVn:: +fE%/7{:0T|}fL: .]͡PF_lSCCq'O%JaY#!Ib5^R'!V S}[-SzC`kǷoAֲ3BQTܷ!Y]Mԁtٰ>>tN!ԃeQ-ҫ1;8%7N1;sҨ7BL:Y;\;&0:sp2 ^4sS_}, m p$e,h6jT6ϝ?([*ӬBBSgc ]8p՝LU]ZSt-Qx嗯yHh#~03}f$)%+khena㣎+IPO$Y47~#p{]@3?_}+EwZz0UNFҕȀlP̊`jBKvVj \G Ǜ2񕇯VA#YAnxl } [MāI[7r -j>ܩC " V,5s`HRƺaKeT-e[ShʃҞ{1wѼ5zqP|썋cё͑ob nVci?$գV7tDࠁʣYŋЇo9i޷/DZJYbD+(XI^̩f좴_m!ܹj!VB4X xV[˖ 'Mi˰,~ܘ[!s$R^wTb{go*L[~;Ӗ1: éz s,[BxYAEA9G.çt!iqm@Rx5;Z@21.y |xyޟLYy}2o!2٭ZZDM}#kQci5 efԉlm)6#ϋ3'B>9m3_B9#rJ:LoR~\z(*Cܨ(zAm|j6a+u8`WTj(\UVN Uk^NX"NbWҫ$T/&S7\(Jޛ% ȊX"뻛[F/S7'hѼcSlh[<󲰯,b-Ը8dy?`Em E27uqŕ$tC$NXN?]_ksH?ãŁs07%01nE`-> y]~'5$1#D>U7,ꋘN#3n ֠R䜠5Jpؼ'!W]jjӮy,`߶94xp c^#7Q&O.k!NzI_^FV3%=__TmAn(EtaPIu.tuK!o~\\&bIͷ!LxvШ[-6lpRNçkm+p hi>ok"3Ewd(U|D^gv~`YdHK+!S?+7Ai'E+jmGdLL~pڍݟ0A]W[c ˆR-W\= 4d+PDO>8>-vPȡmB솿vM˚YGV$C"%y| Ymi a2@o-#R*&]F[e\Uh!vL2Gv־>Zᬿ_\' W' fArŔ*'=أً4:^&K6q&zI%`t$ޮ߭l]rFn@NMxl%i/]nObHTNsuC<ʥ$sT^KCm5݃ٙ1HvPD;Nl'IrNM7򯺃nuIi1+CH j OmN+VR&ͽlߤ9hUuqUС'.zd,chGx er9͇UCR::e3JAF^50䰻nBcmv}>X%mU:݊h&纭W˰h4Oߐ3Ѩ5{ZALHqGj&HWgP  ˥ # GoA(E~NyqHL_~2t0b WNa+Vt[pVRm$A󸦷8q!gv4$3ġ W-gxU}nC5?Vri7I-]%Y|/Ө.Pc{hVӆ˭ X '~/Rp ^8z[= k^n!> TFjqAO֏qoQv Ķqޮ  ]6o$w,.jp9 ɂ -W,hKT܃)^y}jStPXIqrFVb2؍l.-$ Xy%TL{jF+ llE㪁U(KMN6dPViJϩq9`F*Z$*%d :،WBf*?K%!c}J h_#IT}9 AekZT$3)䠊ODz:;E/kĶ.B)jI L՜I($ 2Y鵌Mi"l(do 8p$^(lOII4T؁J3(q4y'Ժj1ؖ twU}-"*p8ciN۱B4؄ |p¨W뿍:8O`5+tZp;J~hZc<:B]Og xzl4M\jeE&!Se~V7U£ 4,B``&sE=@l~4u|ihe^bV'nDQ!>K = ;[lz-Ī U2+j胏+8Ŧ<ɮhrIV'K,N/yBT&2ppGRsUSd(=ztUUH]oDuh\QA'GA-3 ^; GhGKy=6۷ f#?嗕JNf_(Uat ^^&)zS ~u NȚN{-^Wi O2&JE5ȬoBpxT#n:m&|*V"eA uk?a}1m6TA$K䬩JpG ls|q-P0=%^!תdDK~Ah3Xioc8&.gܩD:KFT0 9r8/{;Z2VΒWH .̉,js̃?g:i.98EPD,gILܳko7EƋUA9܇j"ǴQEyN! yMa}3n3SZ-Ti9nSY[6vaք^Oݍ_Gj"_&!eHp4z4ai#ڑV|x y5{}ٝyEqBΪN8M/旌Vd.B, TDo[ёJr/8ެ"boGtUu,Vsq?AS3̖)S/jm#B*c] dƮN6_bm Y.碇lyqbDbHx흼+YkG!^ M=nhBk{a6#w5Vtփ "% )M^S`-cN=1-כ2 z$yHQ̒;/$URC#l 1T&:+S7)-A)Fj*x-gp8XVgXE?4* :"8dJ?޳p`'Z>uKwطCMD,ク7L&|# @uנ~aF{Bgg̾t?S]{}^w-VI ުnJ]Gƚ[-!)W \?w;,Qwz=? iЌ;q]fFe$#ձ[gnT730? ń_#h_IT:Oyrt6nyh1h5 X} 4r7|b5V܈=UpqZ~PD3,oth*W[{Q[_d-yptqd"h 1g>?n#ή6/b5k5A"PN1>KN˂R(%Ӱ`=d뼃74xlG|p.for,hEfWu9\$ڝ_:6WY(>]C;`6Q x\FC:֭zRh @bݟcXҊ ̭>{]oaSK)>f<j_p_s-g8 ymJZݛ;IRW4ji3- Np'`CQҙ6UZ ՟;009jM1'v({N6ϲi}6EDr(*-`W4auF \y*Hfm'+FEWJ]'A(fL}e~@b'1_0kܘ5;l(CɚT?2\/H5Q6^nq2#s4/X:-9h HALz3e.LxUNw:cNXR̡}V[\?3ݤ>a",?g濲#l5]$c IW97lJ/V6^.!%>DIrXwq̊2?/8P=,nO>R-)D$|\?5c/e -^L`vsAOtlETZ)ҘU#.  |l-nxQc9fN2]3TS.oLR]qI9ƄU_\Κ*iΡ\Ǖ3Wָd=:'Hp3OBT* P:CZg*P6AS RW),SG#j ʗǤq9 x':fo96>xLP^BaOs=ϿކD!ih%[j_gмT y R9Ai_4ʄ߷54#ɏ'XuqbtZ&|zy|dVW5JŒtIUz^O@ ډ*ltWrhaZsG[( 18\ƛ]#L36m{+P ~0P FraȲi’C]KRsfP}.9f+C&8iYF<AϚ!04=qIOwWFVYF=ʅH pcz4h?bRB0#+oT:^YEGV(\L,h2gWliƘDDĉP#4ϲ|ZY<;29,U;+¿$ZW;GuQelmQ6ƦٮjvW]E5%%haR`?'e*/8_)gfVaxb ǯ%5􉖙j0#g|ߵԝ3MʨBbʱd\O/ H%_[y ҹUwRwǨ'bî;c3;L;?r 8M 0^3,^{v"D?[ 2(u&33j>V-.<-8⌀r &!m?Uw DEs"9'/B2b6i{/y [18xЊCCþ '2@p6/3m@ :SI( xKmR}'ÑAYCqϯ"Y'$2z#_sDv!{U+-C'g 5oك=|ɣt?YT>r-N(k<;YIy8[xvpע+`estPUC~V)74=6K8^b/3ɲDX~@gwF9܁FMi7n Zxunyn<#zطdzm[eD#G|h uHˏ'@ srlg r!d31L P&}CFV.E'Jl\V?A- "4e<EY\8枻B9=|$1_`O]֏gG -VJimN& ++Ā۠. !-]ck = /t3Kr[0v߸D!ǣ\PM/QhȖb[m@SWڏoG\y=gVYmz/ӭh355@%&+X5'MnЎmD]uI@j 1H(jףDnn"I\ʬO֞$Zf7.Bg u" f[)ç+v2VJ*ggՋZ3fi $i$ݴexs\#^)>`N[a&O+"ZC6(Q<,mT]Jn]^;YzE4lFجlUll1G_9Y4jއA,H9659Ve 5٬NJ(NJvZ>`ɻwDʐ){{(&rTחPa$$h մ0FCڅGˁD WZ.s n7\4uu&1uU?r4k 2xoމ{ v#`<5L󇁰5˔J-!c/2o#ᾪs.13` 3a&2hcn#FJmSG/yz˜+=#@904̤ У$)T֨0)pCezRLNM"iۯHl*\ $67@A6Hr=c &Eg(ȕxmUd?zL,*>g/J102c'{J%܉Xb ڹUmJ}L>f&ͮD QiO&uWz 6wŨA*=?2z Gz)&-TJ`cGi&c_7YsUu;bAO_?[m.{41BO|̐3+ N*43WuBN24v"_/i]uJ%64wT9$x0#QOK21BqəˇtwV`d~} xHBэ組dLd lA =JN2ҴWs 9>+$5m"gA]skAf^J\;<6P/Xb>%eQ;v)ԸG1 *dOg* TCDRg#Pe>`BlSr',BkKTU>(6e>4j* 7wPºݿ9J3L4~c?,|oxߊdՂT)"LJ*a cC$pJX-+Kɢ=j|#W9h#{B\QG?`謺YeĪX-O w,CK',$jvT 7`d/;V[T.n pT1v)!1IfPo#(:tJLEzyexSUAۃ9wgOQC{`S.>[o^2,vÁ6Y%\|0606y&цG+aHĕf_\4 D7yf~TB{g7 u&廘~Wtua+u3WXT @y:TE%[ X&ٺfی=3Du #&L#g/Es%ZD}ɖQBbB7ZW1`bt#Z-PIO%̩b捾@mR`QLןҩDD N( v ؓ ұiQ~bj%#UabboHka[@E4&cah ";=}:b9 :{؄t*9mc6Eb9#۩wp{!e<)8s }S%Lyl33M f|=kP_dgJnB5םcL#/ @g>*򠡧3-QBq&,Mhɠn{#*S',& #!w|4N&9tANn!45g _^wz>Ĥ aG'"F}b?r 0Dd$'5PnK@n4םGmo M=1i-, 8T+MEvޏxk|AQoP, ܫ)wbzPPΠy7R<[PyY52h W<2ݗCf/7K9&/5HLځԽf#?̯}eMrbBh%((gLItN1kAİބj]%7 &e%6Me4 Y,TCEwx5ϊ۞Aku}Qhsmx$-<6gg _ O$ԐY37Ëy㯼 tbU9JaF@01p@2_ާ!qй: 7P|CLmTɥwz}PYCROEI 8Gz-Y"^l1N/2ݞ Zh1gniO,|"f-AJѕw}p:[ \6ۮxCXn(eo#u]P}XGP/BZ(SNp.MΟcMgqt-X,E$EI^9G6p柊&HGى>^kZs[,l컴WChK>zf۷h}LEYφbvGzJ6iO'[^Qz;Fjq찎{әl(/; r~ ]'̞AS7B}(X g.c2* Z)Y;?qbtFPV~&<j7b]L,Td-c2}@Kj?4LJ"GV`\ǚܛļ7XJ1 KQt RみI^b 7trv GH1JW)Ğc5ܦr-N%i}yDɅB%s\$,^qػW^筨" `_0lQ6unAd\?dY$Wi]`kqYgErk&Rؕygt wSM>E%yWG5O7KSi_"Oᕇ.q7#AI:?á7L/ne};؁E#P)V8%ywBzu,6x Y;dUF$^B; 8^ݻ |^"h=JqOjǁgoOhx#z뱮S?=&)o8_A"'S$yn<0mhhV*msTl" owk,%5-gK1&wͩ]?"@U2-;m24+3e\ޒh [8R $7`k7f3[`v{[.RYMd]16 bhy 4M)lOó];q- E޽rcsnJVu9B5!j@~>mtp.R[g%5B#Y{MΒp8M(vXs>8E/uЊ룅,`;#<"!Ge >ώ. l87D4 Ϩ-PA݀,q!8~^pϰ>(|Lեyb괩>7{@an^ù>aZS \U߶‚(}2ੑ|N''RJ rqtTբje5dUƴ 3S'x~]bi2q컍?,%-%p>f]x:x`FlŘ`),`M՘U lU!C[[a~kp~I ~*[$\=kLHADlE堼 f<&#H}b yATw?" ސlB .P6=0±:}U\2G+&qooYZX43Lz7/2 ^g':z &zZx֕NpA܀[t|1~# {AXzqNΥښSO| kRg`JgN+=Mq0I-.A)WEujs NkI&A1(Z[fRDF!gtԁ?e_ma{{;ᄴѶ2>Gg*r[EDwvsi]gN |+/v)1"G<#*KvmZLU9LWmHܘ;NsEkqldUܟ5!3 _&])5#;OuThktNj#%` :_;\|կ {,4o2 –_Ւ|.hafʋc1 YJU{?[_; <85@2`D"{w`-?,Y6E)H췺U="љ#R"QwȶWMX#S eR޵5o((oiU> p~21|~?iطk>*/VMi3gњcPĽzzj$ Vz*jok μ淧x4đزZXzS/&9`yg{z!k<ȟJuVVlʮ$vj1bh͇ODшvĈQJAlFc(Ib1:=|M|Q5a*Hyqrs VRbP]MgWØiE5,kF2d~f`uHNʉ1Iwce]H"?GFmDOzF^9S+9>~+>J@dUen"J 帶G0)rjk,Irގ8(AxGIyF9b{l2_QSEWE7GfEyTHDvrۍ늹ud%k(g_uQN|!; gR{UEbR,d~A2y^Ik`nUR-2翰tӏ`ٸ0ZI>n5w@XB v&i);(nH};bo0!d!XS?2p0 , y)hqi3Grs%"^6.RPFḢeGvGFy k NUGZkjKHr&5Tn Ѣ=(LxSX)w1Vϰ#0{(Y =Wdy"œw&\C8N R`+ }5k~jN.d"p>67C 7¤cw\m` uV >. ynIByf)"!UK$k~"#aS _ `5?Cx:pm^j9Ɍh '\YV'RMqi"W_W~x8iZZQP,ø)b3OFd$${l8V>I&[%c,6b#YۊK[B I´ 6*Vb0i$ȪȎX|+gsQrc|yKD2`071b \Ÿ7nDĀ~‘G#tl8/}%9}2@[ !ݗչΪ~Td|~`]گ_?ѫQ??_^F6Cp v]OZg,ASzn|n2"㊛Oݽꯣ72R;O0tAYĻDDhD.M1 .Cq\V/GN,_PRx!V4r2'BԪX&"6$z0<~VhbWkK:-n 昘})ijotbD7Ӱ_[˹-E@1^EgB0~އ?WR;r$zݡQ|{H71(՜j/v$H׼3VOl#8EefQ53 aV*jkSߟqvp^t kG "@JVsSPsbc$H;V"HL--G7i82T?v,MZPFnpCWԭ"uh{(drFwzy H+M Ǧ)P& 5…:Ch!WsfAPZdZ7e(sms L1lHrl1Ǡɔ􅧩q5,!4 }y ;G3uWTsiXc I+C97f6ߖ6)ЇYu)(8νja ˓IMOVVo0]m-YȆۥK H0ux{^/[%qx_F;vk^M2<ĩC|A?Zg8JPmop_;hwņ jN֖t~VhaOql2oxi7%25+)[жR WדVذnjgEp/\t~G*\ G g膼CgRp4-,z&2F} {J4#2ޗitȩ>q@'S9\b+:ī(e:(QF NQՀF]w'mV̀t $_࿍a %z)L|$yGJyc/.!էq>d1=4qO8 ynaH\3OP2\/G&VsbOM,ϋ(CX<dd쨌r !<}{^xGY)Zٟajwr;$_[s1TUN.]lUg)(`74لH;wB'O`m6˟ Br]V-PWI&p7vy8MYwT\ LGފx70S.*ŎS/N'F#mV%ZLTTt*I) kYR7wXiòڅ!;Ir#&5Jg7r$7p uJ/Uel̽M->MȒ^ J2"A|I]<~3AvҏRS2Ff =wOZLƽE4cmW#5 ηhr߫r۽&mA!HΨ4V4nP%b Aa%Mrc(MvGćshݮVv~+ LYwK:^^%|Cx'4lKmKX@md_lk5[t µVx _CB>^jB{ 7F>7-k5'^'wP>DbrquviԬ?Lv+Ylڗx{U7;ػɘwl&];IC\ y(B.f%̸a.s hy [V=M@3kCO] .ˠ9%.9}MZ ǵyo,m Arycr閡(A?v/g_c%9R!Jxxnzɾ:8@Ȳ1seW FgM5qARysETIɖ!33O?nsCrnHs[[}& yTxwa@+ݟ1 2ř3~~2~5'uߵ VCRkpPŏI>-}u`َR/e)M/z#*uƋ6@ ) ѭQ[n.l Sejr+њHN'Er9u)BYr`LJx 4I vOOrT-4RAG2|)4vs!;P~ay̿tS 6A6zCA!N0^&ZX^ak򬊦o_؝赢؟7C/IGyF0zzx Aȝ_Vܽifoʉaɑ {BTF.=|Uſ֪9* iԞ5(^BؑI W.9\&Q"u 8;Aazp7uZP-(+ocކG/\܅u@) K\LEV%_ֶyNuޠ0 VݭYYeBMW}E<Mt(KtG弹.,g̨D8jrkħ.Bj>`VH#-݉hl w8Hapn}nrd=  =P([e+Ds3YXv0.ȯdz[=Q#D9-̊X8.+ˀYczn]r 扜%Opv#u1$ j3,4 .a*D}Hjեޫ|4 ,uV@6a\!\pE4{e Eآ &#TمIIq5ƲGs B:xz':rOaPƒs(\ GjJӟr%.<+)tMYXǃcf\grdzhGz( -DPOQe`H&)_kHԅ^FRAKVG7O{f2 ^jT>cu6o3ZZ?l [G~#WT015>pǚ g<'D4+k쮚?m3>i].:RQ>qDZ-o4"A!GFq|hu<2Go7+s4ޅ}5jDC^"B 4 5J%b@ͅEEʓ6~:KiMM\zJ6 FQsz;tҝ=J aBˀqӋgѮXZ&1@LZnR`<.Nl{:aSi}k } (wSa-9Ը% ~/g!Yz嶓qa6"I7H6ҦNX4iAȥ>ם,"<}ݛGm^mQDǒ 9JB@CR-C>U9zW;_owݵޖh" X+%-%I̊P~|PC [+KȾq+Z6ispg:;'=<|1e3$gE&!eC>qa g_3÷ Y*PabX\]ovx;QN Bj;sX/Upr؎0D+Q\ejVF&4gi ('I(Io[d, -+EuB#~hAb T eβgpFr_3q[I?TJ+ZZ<> n)ٰn`bʌUur۞ͽ,5jv龀 nZ{tn#. oOegT\axni㖘W~ٗ5DƿR: G>Jm F H (jtQl{ytPU7+Je4Xz吸]S 8^Yϋ'fں2Q9}_gž~ Lc;sZgеud? \m,7@ZI#M{Œz`ӓ\ *?eZOkQ:t֤_hkmcLy?v`a!W&"=mc8{Y~pC(ϸdtvv*C5>P ͉1bXv2Y{- 8# /irZdaN}!JT?Ÿ۱[ DZ1$ڃuMu7@L9@zE S- D`_AS`S.Rⱔly•nE{.3jUO_Mlq*kfԑik/=LY 's,_47OhگC@נ8?fe=2h/|ڟJT2a2?j_]{Ҍe!G>p$yRyT`lPgfm6:+ EVTԉSeeQ"E2V7#G1\Rcqm]LGT^fm0]fd;>zT7&sPR9L#r> +* na7^FjEޭSA}tk`-q5$A$[ -egbfTt]-MfEimSłh]1+s|rۅwXeη-';:!$<0(itZE p!9R삶@4zW$XmЇ T^~KyWPB\0eiwSO>薴3ȆQ ?/U̒nS'J؋E!yiCM^cz%/#73}IRi/giEB٦pYy98,oP8%d!Mk:V:84~boɼjg}=qX!Ok7- fU%zU Ô$`v)t:kFެJ$2d+8,|*ťSw#?8JaVN1wzT僳WR'm{9|RJ/)RUC )0fw\m8cU<]@ \G=}j*]491Ei/=T%+/T p:IX$13N<>pn:rSjrqRw6yI=$ z )k*i)XQlq*.5iƓKëD!JKCǜ[k$IDsh7d8YcL }v^VR NESJ{XlƵ4=< ynJ1Vq\]$`/'ȯ,@m26XDYꅦ_:d"’E"nVfqƓ4,e @s~Kbƽ]uM^ATm˜X^97PqKʂn7~Mx8bc9 8#][>Cx}c,#dA7ph#3er4 0*n?c@Y&xʻo!~7leHj…BU-6|gژc!+z(.!VK!&~*d$"ѱPdci^"dߠvq` i:=$UPIH0dLh+ͭR5H?!bNQ<+d *AJdO7 KtASTd0\X>e]Ukpy]nVM.? Q,FS2xA &޹EC+"c^G068S)=/N?\D~ z->M̥~PLNq6'B#%DDD!CkhjG-ti Au-*ܐ)i %Jj Ϋk٪B.D$3e=ט+qÍ EŃ,VwqVe-܅~Pבw)ċ"(*LbZW~k}XK{^>g5/'0v@)d+j 8:OScNLjIcPP+WnR |u mg 8 [P:t .yJ#Ĭs` L _ (bX߰e:guPڡ,4U}{/{mq\&N|K8?V!U[<߇3XԼX )Yjt K\=#ICkb?J /y R8t [&SbX#]1$bS9qֳ Egivr֗JbxvޥOwh6_hg֒{L]niC˓eSg"׺x^reerhQ,S`B y|]6CaPN^h+zn}Fè` f0V%W瑃Ӥ0VYlLSdq]C<}ɧ@|&#Bprxִ=t.D!OQr)C@-Rրm*<Lh H\V3Ñ1ܭi|5qnkz7 t7aH$G~fx6UcXfǓ;|E8oۯrv@݅j {πPU :u+'{ [u`K&Ǫf Zx- 2u:$7Ҿ&ۘL,mdTtIY"NHL1W7oő`3&m''\DŽQ>J6S0 ="XTboɰM]8õՁٗ =}o4qNIXLfvԖAЄ0[9QIֿ g Wjuy# ?uH$m DW'];^75Q0; %yab?VHFJM4]H йmT.kG8 ܒH} Kg?VF/>=˚/-j:Xfx~ӸHFxp"CH2Ts9B[Fk9 {R̉p"{'bPnliЈhA)f+9B~X>y(P}! ̹?jȊ{֏ſ', L 7><“ðuȖZ_Eb-4NPDk3ZݯU\ .Yl8:u'e:OΠIGkMU^iБ &aɦOb &]K# n? n%VM";id%,0G6MN;p~b]cѡ*O?^6eV%dqpFv~AXx}/ ~cahtHdb1TɌf}ho1`7g \0hSEbZ^,򩫠[7l{ hik.%J~P :0` <|eF ~:d0cTǚEk{dM1!YQPD :>6sɫF,".xڄ] rO]Vn9zC E5hv ހ3{(JTץ!m|]zݠg%Dd0o~jTA.[EѺ/}5W`8.h*=y*溂"RdUj"~ ˸^|lR |%^c7A<cSSdG!E0]*2 $%!1]_U,Rmp`ɉx S R;wD|٦.3JzR'1v?o^~𾝯j$l cEh)Z돂EeB[Ax#2e3)ڈIm:ڝ88D1Rnith=ZFY"9$^ZM)%^h (Dߪ> ._PN< 3)Gcg{ٳΓTď]0z^qi:}vdwE;]}?pc`\e8PLW?\pѕ[ޖG'WSpN@;64a+fR?ϑxi @iy#H͚ms4>Z(JhtO< (&֊n`L%*MkĬ'OU^p=ݦ1(fR1KMaH \o4Z nC'ov/{8=U})_D8QCQX*X=.ANtbXLipaYm؎y]qqp@G>fc6 27%s)boȯ֝Q_^7:H>np'Dp g*0ġW{qR˟ sQnk~]:oͦ*E0(P)@KeG4ن0h-|Q3TNZø3J~Ro}b'eN.J(zw׺N hUz=Kzy.9֬B3˿F{V3O(M͙Y=L8W9p=t a,Wל]4UnD`cjmjb?\To-{;:5ojEᔕr)"zXUU+"1Q55@ W)dN,wE6q(oׇRocɴ8mnmYZ!BhpF㚘b`H{~}7ldqQ !h*Pp|>VVtib$9Ha4O3 m]=Voxn 7[mʃ?uN rl䦌 +xXΦ7Ysm%I4 ٍq"(/^\#qӚKЙ8S<~*DA0D.'93/Y53<7f\$g,*X6''˵|aZ@G ]5tDF"+amaBK0ws;e)h93(ijbZYm P8unȪ]LD[Y#]rU]:V\,~@#;`|xUGŸ|p4YNiHgQ< qka(~qNJRcgkq',;c,hΊjf_OFc:H PPjrXa h2E:c螩tBޚj^r]ᅔX'G ߽̏? AR򤍔ЩO+]6 _hS͵bVrf!l,2ߛ5,W1plAS k`uW&JBMVlUeqp?IχUaPO^e9躟D d A4~,9cx Xg]=)+]:?PӈΟ߭SJ(ڈcg9_qahU@+h֯yzF`<r~NMYK0oA~2g??zQMnوcd|:?ܭL"6EY'ޮ'7Eqhظ'A$锦c. eˮҢ@)FQǼGg(n'lT,dz gI? Z@ʞhRpVY}* yTUWfSI ph P ibFL}9/ VԖJ볋]P-#%)0e)Bz6$4:08bZXg~ Z}p  F`<4+RKjrْI̍)rjݬ8-\Njo8Fǫ\#SA7ﰩrF*NnS8Astk_M-Kn^p'+~驄C'D:sm\RoCd* Pt݇EǷ\^%+8r6X`P;#/31yrft^X+_mqV_(fG[:PR_9cӼmSʺ@?Kz5˱Yj=Jxj,•f|#;nD;c3VS3Z#sxCGEt'Tp\e$rrL[tr:؀hS !34?ѹA˴}v=A~*q vcm.̽(UjzQ7bRVtˤ)UԯC{Ry#BiyzITzLo>WQ{rGp<,^p')"[n, &B{-GYZq,zS/G䥤U>'ӶK_;x%~:9ВZ8[nd. H,p])Gcp*$AdﲒIXTqH26%qm^‘SN]UmG++)25w㖼gW/q722-\-It;}`)tDn"[IҁqF}#GlN-99 .>uI$v;"" 8rY>=Ɨ,Fy>T ?fw||cutxi<T@Sx`'_EMm'Dު/9iR1/FNFnWE{1As-h\jӶwƗѯ9 ;T6-F~A"-CPUG!*4EҚ捤 =4Nq݀-S@ȼ^@ȲF7@ <Nׅ$7lP+@ h9׷6%eţ]* 55_nsgh-:u|Fډ劵oP83Qvg/z˥dKV;S=ʸVmpjw+쮩d._r:bBfSUW%]nyK)B>J?Y\^^Zpk28*4E˕NزA|brI;{(`S3Xے'^:ڷړTH)ټ0O]{$˰.q`삪ܦ:)Bʏ%cEH$,bUkKֆ"4c)-g\EPΝR GmJ^V:SäTv;M h,"|Fypoыh3I"$T,g'MA|:^s%ژ վvAi'ёڕ<*}Lpc)bNN* y!i a>. fsѦVYV\m+#Cs+yD>g o4jN)dWR旎 tO}_w-ow8/l@b-s ıѷbw;翗3أV}Q8@iQ|+C*̦2_ jXS/Zl@8-bE5v,!aesqq͡HM=|Eu-M.k=E];>H&eP|<"\ z,eg~|d'D=ea1Y,&oZI}= B6qWFUࣱ8B"jtŷ_7Z\ʃ_h/z$>Z᜙Tk˛eqACH +^G6IV2C"* I'C{ziG-d7rja"Y{|<8JATГ3P,cUJy 6ó4kZ&NN7g)ԠYnVDB.-:㠸5:IW]%;*S$6ԆyU/MF?N؉H> Ed'<川qGe))IUUˏXTVfޚsN*&Ƙg}X0FU0C\K@{\ئmF QNÕǩ0; N]\xIc=>[s1Oa&=B źtVodU–^V7HT^fij?VqOp((),k`KҠ ~qcu\!U?8*<)%CyFJ@5#+9ZF:G(3\#grPg*=/F[k@UNk@:3m;^~c{{5Fj.\W/B)58•[=U5(/w$OA+)[loJ7VYp?_YH³)` Pu :ָC4KVߙY ̄# , >.#4R&:wϑPU1?Ej>JveUlOgk0J~=;NsP H[H|ZqK;AJL9@"zOǥ ~Ӫ3xbX Ǟ^Ȳ Ut 1o2CkwV"4 )tWhRGUj0ȵX gu7e" _?$?@#*b>r߽n\%m ÒcUުCpoY#V}xf =A @ S~}6F* bHg&+'Ο&~u{~bhF.Ag]" W{dZ)W_,66ڔ@;#?&_RXP^2hnujTj_F{ŜuUr(IP8$Qn%xZ=*bJdJ@e)- yL'M[[gse,&Sf=PEATFv,MR0KÖ~[Hq䍓br{sɨDlI3.3hidHv?ˋ |2bƃ >7΅u-y>Zca?ސ ZbI)6+ Zz5S>rq  ւHnpϜX_sF>7?>3k^yDC:Zk|[Sj8^ֺ-3K`!yd_2=D`ڢ![$EjҾ.”H23vz}qM &6,!R2tDW;Ƅ'!FpqwR Td.مDٝҁ:ǝ0M^cE}5Qnx&T~Jh\f|:9^-ULP68?0aKyxMsq 3(ayT`|Dg0z|O4jhz،gfM{'Zڭ+G˛m,2{憊 ^PҰx 4$#~;HB6aTLKܩI{fV]sL:)Oڨ0i_] ~/ =!Z$>EKuP򉻔 *91#'64l M{L#*NRHWFwڂU?՝S^gBon1.ZlK#U!`'P28RIh UQWs(^3rc9BՁfM(.з]UH>2ApV(<:f'A:N/  "NUC,}H-Gh|]|I2غfēH§?|b%Xm>$ˍJSл:BBEB]'oo [-s$ِt~#AxHgR?zdcHBZ^>!ˉb_R0vc4=&X@oZe.c(w)AiiZQ],/pߋ8)kQ|+c~{}h%Ȣ)(RGv)(ۤ)?|ͦ^w]1DO;)w› oϙZ$>P<Gg`=0#6H `w(7c~bEGu됰@f tFDd .A1.-Q#goYhzO4#jE@ֿ;H}Y'˷U͎Rզ6}-?ߋGJwDSd"qkWafywg(< ("ȵ_ʣ%vx7 İ?ؒSDljw8 4^jF0_1ul΅P{ ^xILszUEae·D]S#㌅!t C#c-] [ΝK:"׳SG6Á/N mNkt(pS7lf/gmG`޼[?<ڇH3tXg˰Y|r[;|}\b cָ&|^4OXVdC/!My?ZtIFHѼKAk!eSp PYآ{i|W-ȉ%hM^):oa dyͤs@+ a7cdQN#?jPrRR bˡN9j~}*2Zߢ|%q!,eYzd TEdexݣ$"o/k5Wk:_0lH YY Q}nA6S֍ŽMT˽m0MB3ay&;:'; Dmą"ᓕ$N7t ,H7}IBd4$FsIo'"}CG)'c`|M'xibKC[};Ì$"&Uep<ĭo%@R;D[yKy(a)ľi 1 $ w }ȥmd@b=~2_kiSR/QGp=Ԭl)?jKjg9h8פaEd ދ*-qB\5I\wE? +;+T{\^IS q%j"@*z|o˿@ ~wH^y9PʾN@4 oI02'!F-{,T@P5xcez')PQ =VB. "kraF-X@#bwVrb8ETlRϰէ9AbKTSnQ<3;PKM5(]xYoj1Tڈ?`Į! Rou\KwkiH {ѳdӒxS1 QYIHo[iF5,4*_顉4)1E}b 7}aFUP%mwg@2n"3KN.i }O.F_Aic7\.lޯDp;:˲+'E:li?lhJQ(Ѡ7GA%B "sXwK 1׷ 2 fKdڅaݍӫYi=B@=d!4,F ]\onƓ8^񳯣'.?4/+\t2:kKy#- tw>$K'mi] 1s'/6/K,rH>S9،'_œݕ )}KTIw-ܞX*c;GػS@ ؾI$/+db"y {Bad3$c t{pGv *4k67\g[]դ0|fpaAMmO{!9jܼ ]cKޏD@ӻ C[X2}]wf>դpm[n3 ኤd{.J x6{΋慧- \TtnE]ZVM _:fGh !{ V:}~֡W'iET6+>RXc~.smԟl'q̄jY3cұAvWUL q=){F\/Bor WEbuƢ$frNoFoD ^%+}r ;+%^nd88Lޤn}@އE[*~1 B.ϲ(zbKWe>aO҈'#EXA_o7I}rJhד}Kq(yZUVIgdg T1_( [Jհ6?g>?2N L Kt-d4=S=aAU߉v=3YUôoT36z Y3`uA$ydU >~%&J`&3%" Y.inH 6Ǥ e8)5K$BЋ SYyDRPM/AӸjYM$6c`i:I2@ϗ=(\ҝw-H8:F!E{㤉* n L 0Ȇb(Y\c'.;mk!, ^MޝJvf`,sk2 |R54jǥo):oNJP\FE^t," A<ٌ@< VA!\菙~xkƙbRO]pƛ\Wr?昙Ȭ wPT~Mףm ,sk`[]jc K5v8W3TʹE抧}fMӬLzT9eq g'wхw/HaM 4fGcj!&%LZ^~: :}yGAYyۮbMD*Yɧ{^0,OjlS<+ŽY>biNGk& @H5ɜ7z>;B-9&ç^'4zWq*VTܤ _SChko K ms>_PLfʃsams9( m*57=b^9FGFIb,uɳP|GXz1&R9jQOҧNb^(@k.&9q:d'@_-WIdFfsF<>ƃ;P<.L=:<%C(Ѡ mƔu\LZ:l^6is(~ _!adAW>lA? \4A*GO{q;/}o7C|etZ)'d+m˿A;%{ Rg}ҷ%SBoXh@fE'@;Uh < 3_Nzo`P\|VU6N3o esF7O/7%TUk4U\z*~O!ҩˆ ]k( Ʃ5Ufё0aX`xHj@(9\FtefYR燕Hs*f*koޟ YY7uUvڡd ? Ԇx&kASVȾ'J"-5EPҾjƢ2Z1lA/dJRnkg^ޜxwsXv` j vbGeGBd]JgjWzdx qQ6]=zHONK`LLx{h"] d`1UO7qMkEg6TW owH,cDCFLjXOxA DDd/, B"V濷L\<ѥ@ } 5` HoLP3OnQE~ ڞEz 9'5)$+GpuDj."$9}[R\R)Xc.SiKHX! t!NXم/ؒ.-6ՑCm6VNΠ/7m evr,"<) 5v%{V-:(@t8t3o" @׌ǯx7hL.!8't4;pi0j6|8`PC*q#e~TD iGg+- kM摚+QHpŴNoN [hL,]+QC#fB ;v]`B1JXxA4r`rP䦆L*tOw`JOĊPwN\Avf.uAj|>.]_Ήl98-)MY )3G׏ [>VCs$02g3Aqz6 QcǾψTVCM:wi-!/TQ7iU %_Gvˑ(>4h(/$b +FFx/{ vM\#j~?p_¡;ǀ)(Q˗ZZ%=2[)-Ne*DX_3=n~3ZߥCt3?o h{7I8 (-G[Tg@: >`HHg.{e?L[OPnEFPC̲4G ӑUD{D3;-{dD.O {$?~q෶Pˆ_48~IG<7= q`[=v-EݖgR;\(:SߊMe$xMK&pַܻRr w iHI b:~8 ՛ 'N;Hׁn o;4eC)GI}*=.0Zׯ;10楲9Xt.ͺV-"bJY~Ra㰛 -DF$H'4edrHk$MlBeiB[@$y 7+ݴ9\ %^W{Y4upHזXlyI؟B=ėJgvyNl#z%2b;(ėDp_qC:&-%Վ4]79A:;HW5G*>*^dF {j]Űy4JVu{k<}b{mee"`#z&ع6bѽ TpKvWs@={p.5Ϟ@}jpSea! f%ÐlӶx75Έ9i~7;!3^Okz+D>̄OuY_B^(蘆ˬ 5Pm1W;!M&Je-Et@gNmT|!%)}VLpF+#|ȃGAxi>Hvv Cq4c kY- t1Cg"QT% g <jz6gD=D?˝B0눑5,ܚ.Љz@/Jm>tO:PW`='"AMmsOzf)HD멢|И6W1,ЂAx  I;:E<tPڛr rqQf*\u0aa%&D2^b}X!@ #s|2Ac/4)_!!C,R HB~b?=xi?#9u9}xsZC3# z‰=u+<{J`_lK 6BrFn9gAԱݾ/$: *XJ)n:ќ:X3~7yHD-ьYJ1 sM&Xdm>0ȍ?ӏ#tdzX!iATanU)j21JTd>[C @Z l8xh<dӯy׃/,`8PyL>X,- ;4T6]ѻFs8ݯNyXd_ejP=87ky6_Ν5'PYm1Q\- aϻ;t`̰η$uoEu[s? LIքu}RzUi>jey$W؆Mx4];*(#k;Ozv'(GirPlIC"hqc9#Ԝi+| XuH>6^M E>'|sc*Þ+JSZ"snDm8M8K>S:f vb}olT!YVTCiDqƣo璗:'D!Ѱ2Yۓ)^MHW6%uv3U_hey '[.肐}HZOH<1-O4|UOG>DɅv)/q Xr803rO'6ݱ5Ce=s!u5kȫq $VM^%cxapFӒQĪ*]1`%cPUUk9oL\2wy1+پN!ݗpo>iNmǡ@-7朳JvPd'n旍!]zHHDuAQu }Da~;$wvznm)ccopq ?R‘0/HQZկ#I5Sdjf{.a1I\RZ#=34-8߾_N/;3ߠ&dI]Q]Tl+ʾ?, "B*F?Qs@̥;S0v7aԵ߈!,^50xk_ lZd2JAӫK5Ab*īmuTrW1 UC@8 s0E@~g̸ &,_$&{W K stRb.1ܟ|5"Du^ %6QHr);laY'Ϋ)GBW&Iڏ"&`j_wiSMd-( zJs1` uI8>q8UhlEBߔǖjxZ4Ric8p!s 7[so =4HV%V+h\aOm# !sf_s )jRڕLx <,<#x=KW'oa9g9ݿ44Uy9%@jBim-7i*:<ʸJ5˿b*{ZLV^*<O#m[}:Gi:o;[FOmp2dLo FOpB/gCS-S}` *i 5n\;E- GkΎXCw6 r?asr~q}O( Ae2({<ʷfK-OKk)*?i uzopr!\ҖDXwN^ q2lbg~_0z"=ٙX{%fr_|fyP V|r%"릤پCAM wˌkii']TZ;z =}*jGm5I$f/ !-L*\-[+F͔Q hzt"zD"zK_[T <DVj yS.htΊ>áI>Oٵ1:wfOjpFjOiқֳd> F|bH2s 7KT;F^TGb5bb+9ac}|Px*$>]i+#*"Z_0Qr(bU;6[w}IK69\aXR}~Y m;C|;)$R 2 ?K&8j«!>Uߎ>OkҔ_13 ,K)!F=-D=^wjm Gjd]z<%9KՉ|fZuOZlODJO> ccH'Ι̹0R_'HNLq*:ttzKM )@ns>Bli!^⻾Vsx1J~Rᔈ ,]59&> tv-DV #1˱HʮoVw*tpRqD:l " l@82It|?e^="I&rK Dh黥T]Pj[*MH^|1C֡\풱L^qˆ=?=UD }Y) ]KQ8WzHَu贍!׳GFWbz8PZrP~ms~ˋ-0V_(u4H =9UfuRO񀗁]DhOQEU2q @lp [X@kUyͽ$MC وWxB%?\Sb-|ƜarbЦ$؀?]ops}LyEؘJSod98n:%.8+K_N{mY(~@e=T Wzj y=l)?j[x$ ad L]ʧ E-݉GmСȌ PMI\b5f. >XW_&f {m)|j*,oT'j`5Ϝ,I2W[˥Oz;,Y3صtB2S6 ^dyh 16{,MN xT^Z6ŐY{P6t},t+32`|*}J|]PZ5:t'} *#0ERMAS\ yB (JѤ@6N~bE 5Q?x1U.x`Һkϲ.@IGv!,T*;C^Vh.>/*Y:'QZ(B{kQiMA#b=#nB7k^)uȳ=29$znh*G3ice+9 (裘Cړ0ejNt@l;-QGIUiFko)1ȄsYrj?d݆G1^X-6_ G6zp?2kD@PXIK7wxO;YFD8~\*؛4I'v']uS|piy'ڟ/,(JkA-LuYw )lG/9LrAF^'F 񐁱'Hyuõ궥n%,Juβw0^N'S~ #AwͤMdۿЅ`+Nav12͟w#<,8ܦ` Dl~IvI`bU8 :ps1Dם]ڦn+;a@&9+?7rmGp.{Z-Bn"*w~a4OLG4+D3/_hWj~`$l;BL;!T zʧ hPצ:?=:z9&-o6x&2`NED^w{Z2yddX0~9/A17l8sW4[˨u6_O^;oN7x"ØģyC"sbD"þETm$76v?U$[B zﱄ}lE0_灒aJ(w,mpWȐ6a7 kR3Ih'ikb;SWʇ2J$>|v˝&9 cQ #|QvduZ.L,=N_ T!%C6yMLI>YjvOAp{bY|Pfű^`_1 6>@e9/Q\d&66T~­BMXO~*L+6YI2Q'3JR@|{~o-rU(7;QfdOQ;:(rKڎKYW8 '%b,>Np*D Fot&&-zweb U`A"|*mhǤucs}!>m]èMorGQh鴌RGІUj;-LŅl98]~ >g]ʖ}kL3`I$T kl/y2IةI9Cx {3$\n}T΋J)YXڀ*Tj_K!}P_hɡl2YdBuzٍGґU[!zP M0W^B7"OBT;2 ?4xQmdR' 689vW=aM~.Q5܍ZvGϾt\tBa=o|΋.e@z`m[DO 8/! rVF ,Ցv7v4)ȼkeS['Ot|VX1fI>1gz Fif+y|{g߿qfaG/ Z1n7K)!ZƦBq?ݣ9o:v5;\JRy/3T2ؽlK(uǘB|q;F;CFɨ l;QRK~+>V98N5K(Q)uIZSdچ* |c)w pr[do^zi8_'bDS##oYH7-EDcs ~Wtlp{y838ttB Ψi{ G@#qU}+L[6951-iJfN'>ʼ}~Tڞ`E$h(>jCb1Qba/P!kZ?._GUO; SrH#Mڛg'\vq(j=N:ڞw\#Ej" ]~346 {Mxk{s#T =4#z}=k8̏*_UpePP-ꕌN`ACr]_we.dN{ ZnwX"W 62Ow~~cy"xb)z9>+TP_ιޝ#K&4G;啣?x&Tyqi<$-eGW3fʬ{a IC7tEg6*~x"xg zF싄r-R)ϋַKT4} ^/(%9cyڰ`E=(Rdi,osl^12]iu=ݍ$3jo_Z8"De_4,R[b:"ABEޖ'ISEt`RT;7܊ e=m'~(e lA!Wk| W|3M8j)cL*2QhXX;\,7D aݡ~ysdDy4L֭,p}V-+BOB#C̋de{_^C-f;1tX?`B|Xʊ993m%pFxJqk&@^@:‘uzy?//wf28 l$c nջk7U$s\C"Aߐw=ĜH f/mܡ'+%B̕+,'{6O4%SBFXg 9ҫIZ2w5PW|GG`Bgm87D"eAX5%1͊{x->CQ T}iͿ2gh>X:C@&g`U y Ǭ!m >ֳt9J-H2 ` @ii<}ճ{ x,O#w\ ֐ntƫɑ-/SO^K0:& k d1*@ dn)9Mj_~$qrC8wcPx5?|.AuiD yK?Ꙕ2R}\|˴@T8d-A>H#EȡB ܔb1Q8bcX>AM!G7_#LoϹRT{Jh?Rz7Cic8ڀ)v_n=r3-7X8)/z{}V#eV99n^0*de3.8aҕfϩbtO Wzj9`\rot6.ǐz%Zie!$؀qVXC 9YǼjt0h@ %2玮q(s.OSwrk5i 9v<(ճ7UŧƲ:J03.ϲL=߷e[sO[N BZ`Hf(70` GR2D7ɔ Ɏikէh-O?7h vUo!z_£I+g R_H;n$sy(#Z:`+"\5HFHNiM y9XVH-NBG3hc FyN::üAFz]k9 lUr;U@e_(vSV&sbya*[v;#ת5nfZɀv{'GDwhd/˅/eB̀b?ufU1ss_Aej|wFK5slqe!4[k}m14afX*:]֚ =:͆ZedRߏدI2,wSp!ߑ#N6j43e{k!N`=0 *u ۚ$O΂HLGd~)y&QWIznR-2o|lvCw=[26G # LR#H"_H,ʯ5׮&88sIDys-iTFK \ܹ+4#[ Աb9Ox?g6bsY9ڂ91RK(w<}*~[ݮ6(izLwu@dvqJP8:XES=p1m e(./2$=K%Fk")HCJ@x ԇryW!?0EM ;Gm@vvKג(Xd&; :)06sTF:cdɤHṿ8->8 9:hj#DWpI]^Mw톴|Cpdp]@6q£@̼IaW§" }j_K1QU-ǰ0d=<:ʖN_3KV;JW 8#N`bddwz0g`Vƚ[wNStžr v "BRQ(HjҨyQ;ڴdI~%" ' %&hCxӉJX ^ Ԁ;tt"QG  le4 zGo**ov W&Cj VC_rW~좐-Ɔ#tҁ("A o*1e,ָ pO$V^A@"ۿaZ3*(̫o,h M\Xhc\K?A2|30~ҩ/iY?ulKZ-< A(@qd枻MG4[NZ`Z]jq?S& 4+Rm6 ~Y84OCm^l'!3r1,E Ţ6]\ a NZ7sDQU 'x1[N[agq꾢Nqq?'X]}C8+D=0p@֋%QC卢h*usJxBV,&<7AP:xo"IJ61 RBJ[%9UQ ?=.gy9DN'(T1WKp0PERv\dsF7oy)FF6R`#ôQrb& x+tJVx ླ$H}EUroBY}U{Wy뗜9ڲd-}{{nJ֯OK(X"0f'h ?'+l"oqP 3". ~ IQJZ(̕{&l΀K|% ~k"]RP9cgT F5]_J#EJd΅Him*٤ifHWWht!]^h*eoaVB'@?@z*mH.[p·ÉQǽ70;x\38ķhLLbTGkvY¦Sgbn(enI$dymҫVa6sPs ;So"I 60{VMȿudr䅿k 1DC gM N;ͷ>HR3q88?(?PT}!%P;H@k-'Ѯ Oa]Rػp.3.}h;"$fwVP!jDVAGLjM4WKe( 5|o#-zvc1MH}oKcu3Ϟ{ega#E*+ 3ā6 8Fc((MGaЎߤy\-qW03?vzJ +)IJFgX,|G> f-,ljuھoIS&6,?p''%yTq_&J+eE os9ņ;mPYe]0<(15z! >=kc@/"n6(3wǘ.%u8>GSІ Op %(Y-F0zʹ5P}8)MMYw+N0Ta&lGVK0ssSL&~(8=<>dy:3Wg?{I3 , 2HC0\ZInjuD|YVyn\7Lԅ0u^܄ŐOQ+ 6}[!!;]o"E֘5..$>nw G+IfAL yjYaSZ&3FQ:kEG.8h X Ѽ'|r7A9h0&N7 f]@  ֫nӶRT,ˌ=J} 14j˔n:RWG2zEGVs]KAhbsaz&jFNl\lLK쥥fB7~F[ 8fJjxLe+ ɍuIr N_[΃dBݔ]'M-G0#{ڗL= (aޡ 6Ǩ$٭OVW-1#ZLyy%g߭\?Gu3N/;>N?_UA_oFp:m+IyK5_AEV4EYm2뎯Wr{ KFeQSƌg:$yz9V9l˾+kJQB7mgu0"(0TM_oI }^=Y!p^ZԚ8yZRf Rj;gc#VPMg i_ן$ x)G_Zwk'!*wFR^̈́\_p`X5A2WIfmbc\4zѱoQeTEiw+Jvŏ1[gd P:Hҁ0hJыQ0CT 2UW7 rk&g`]RC>Q?ۼ@x֣B?/M\΃!hiz/°{S*F~9bͫi3K$|S +¶w!~UlRB81؞;BKi84{ /+CMrrMS(RTEkIw P6şґCn;ZL*/Hc%h/R_zaUsY \㻆Q7ϝtB U \ 9,UOqPqn0ej6 ShJ)JҺE r0$UM:_P)8jᓑ8hN3gx4LY Rg5q6&d`2ԄC ?W@A5l)J,BBx?,o =u[ݰt&>*}'[QbkٔĪ,!uqaAn;vu`2ҺIin.O%iy#"Aȑ/z->É |ɨז8U,6`4 y.Z;ә%Fk*VLߝ))3EwD)Nz] i6+U(Saf)jv˖3^w#u+]gNJ뷨s侮_ ѳ^KoI]qeHwG3U#C;CnZ8\|j`nPb6{*\D-% I@l*/H&xVBr]yYOy`Sp1pprV޹ކ|8Jϔj|UZvhdmMq|.B,gB@G !"q2<vܠ ;0Xs%fR g ?}0rѢ74Ex!7%+R,;3@QK #՜mܴ4B6T(J`ix r@ OBLVC^!}إ ~m&$ogbҬY0"qONR&b x{>]Ykj/T+sP+|} WXՉ&<#XsqLd/θ5{Qy""N+by},"Ĥt18H3|U q f2j#Km}PJ?13ş0vSXcq2l*hD:oi_J 袓`Dvڮ:_WNetu}}0IM6:x?GrLBhї! 6PQ{)_T-Vw\zZ}d`j8r_)y$7FL[ i@l,И'Egџ 1fJ^5\Tw/.X0lue@$swj1z/! y;u%W[ՂѣZHʵwl(EIQ;54>׈ .:C]j6#NPU?hZE۵ 1tD%N],?.5|3v@ Zܗ2 K 'OU3e+G(Yљ̰84Վ˚[^3hEeZܚGc[i~fބ":TehV~Kzelo7}Ilaxo4G^:EtX!R CxyĪn XXhCElyU+=ש]\2MHNzdlII3+-rPEXr٢D @O-.P``V^jvTo2#_V=AFf(nԲ:P)_2X\QHݵMkbX- h@|*5T=7v[&x x7TgTLM IJUs57S) 3a=Et$&h|y_b;4z*%\C#@aMGywE)= 4Acl?[Iz]㴀@r;>TД9=_i@$U80J2qn9X!s5,."gŜV|rC_+ u𹥵yN c^cTէ,~zpOzv -Jݎr34uѬܦ)uRv|Zi-o0dג*29~ SLDU)7%+@DIl#QJIyRu%w~i3~? )£n9 Rk2|KS%ڗao"R6UM;3FsX*zEh& @p@Z)9zb٨Eԗwg u}.aۑcÈ1erԦYǶ|+ѥSK+: *" t]9:/Lӣn'!1h~4U %a㼿##V@VB-2@ETh`W=KzQ^Ҝ]|g'ߋ*Ɋ"jFѯJ|yOM*k6,15.dj(d׿ _/0|jF3_W{ЯFXf.SJB`+a g3-.SfvN"(cEW]BW+.·czpg6 ]I>(Ϊt>vdR *ڸf3a=ޟri\R[ǝ[ډ MyI7_R񒈗Dϗ`!kd–]hXٿ$.l%/Uޟ;unAƮZu4cKX/K^V8j 2'`0\" TTsBcOm7-ysQJ$ZFeIU2tEP!gK=6`,:; blm0FpE-rSy;Fб:}ίqx`ҥ%)mP'#ᆬE8Cm쁉Rqgͮ _bh;*XDgV̩ԒiDKo\:kx%M;id#Tڹ+ =%ϪL;G &S$6ƾgv&J̗5<t gk9bݛLaN̟ow:u| )Oqզ)8&R _%8~7)~r.DS_3#Bs#E³~Bf0r^k#~D't>]ՇK} 3EtBq==rkr 7|L R\"YK}_A~'UAN:})Zl5<;X@97u%}r ~<&PEp"eׁ)ٛ41NJڌm!yS ag hf7ygkJ8Z&)iW?W[B!4H] qbՀcrӎȣ!D54{aMh6jƖ.9[w59'vIxhS>f8"Qp@ Xyj ٜ0VX$䚉ڟE}|4C8 ?X4?u; KmĻzѭ^C84fÖ%+q4Uveq5gR%3Rv9eD(q_QN-ۀPe䔯5\%@q iv~ v*(TH4Ufi & HY<֖6KCW0F?}k i8 ljapM , TG7!_|F㞵tEP.f`0ueްn4Ț ‘H:'O\dͤLnm'o?tg Dn'N"2z߻EzI"Ӣ- 5X.ڴٓ3ӵQR=D=˸ 3vztِC[BKy;p[2,zWFes}ׇ5qn騞 = M!+2Ц̦G#?A3PTٴ"x E)5]b;kFE(]Ciyg$В -hk !OL,eG¹7/-"pC ĀgRm!lJD'_ 1hhcU[z9\b8wOl}a ["vw^QIwo:ზT=>N79"z*6lс`}_pCmBn-c N^iʈG"QB"К4(KSfʖ1:,fp~P>g8U&MOyI?<0PQ%şqTY`S }YF,A<,Vdh'UofZڶKrL"QOc}GٝpJ/b|L4ŧ4t vy m\`i|ZGf-etA2Rf*N[!!ƕTK#cnalSt\A#Eك~B{s쾗NG jT(4 3Љ44"y9=D5W`#e_k@X ەF.sΏ~J@R T` ,>wo#ZvQRׄxMɧM'9nQjtWa6D78ELw|ښ\ ^ksgUs"+q8t;yU, ff5hTx:OE: %[* ywCcJ.7 >} @?Ofo,U. S B] 5*U#^}OmS:mm{OE;֮Umo"+zR,|/ x"+hhҼ 7ILfTfAE}-4//7djCttxp'roπStH+k: Fpj=fkv!>˚P젳D?1c/tIYB|%Ҟ'V91DXP3PR2:z<+\/0-z&="_3Mv\, M;\D0I'% dU{#AMNNw;+cU)ЪL+>[ <3d<WyTڳ&(9mɱ@G9_bL~BBǐ2ZsT0X- )5XXj Hzʚk]m7CNG?؜GSGZ-:Mwp sIgOiDO {|ʐ|'C%!@AQUd;U_ t30kr[F9lt jsʀpS@Z@Aû5^2v OCe"Xc"N؞%{c̐1*QjSe!lUYgՐGֵgexE&xn&ѼY>qV<<kȬD(+f |p8#B`UE>fSj-(1!<B_!\"I]QT y邞*M>!g,WxzY}n Սm9`%#TcҶ֊wqg3o%;3Q=Ϗ(WY+7Us)Ёj̟eyZMzJ.Ā<Bv:o9°h6t0݅ yH>my |翍+|#ۊ2g5 Z7৏V=A"i~#~&|٘;ve*~2yM@YwhA! YFM ޿N[JB^&C;s:u@d_Hd#Zvstzgg4K.q&ho2zŸv!y7KgsyނȼFCFR9Aqg^4#!3J_EP\_$;It+_'!A|R"nNu/\_;+~l(+$`=5 Jw+/$spÊNr2 [!*_% fC6ו%[,:wUäP/*CpЈm|)3tweGP˟KSA_2W P60ŌjUhq AOUq;}A''+qG(W\Lv2})~V?<17igԷަ^&U_K%8~hXy/fAyOj:O#V^(`=y9IoC'z[qp gwƭ*HuX'tr&+atPABL5끍b(PtR3O`lOXkïS wOOm /7^\9RCC?%YA";!A!vS)=tV԰P玲@LŃ5݌H`}^8#?zmFb2uFI~hxvÐv&ca(]Q 7nV:@2qS]% cHTmunM{% k0'N-3 S̐E֣Xu Y\ssȑ9(aҵ|5 =g[e^:8$8?*^Ĵ ^ zl2@QGK7ZY?Jϑ*D ĩ=fN&F}ti&^_u :h"E+fx4itVeGcqpwUeJջ'GH!~l m<<Wo 7Dʄ=wFNWVnQaW1>ga n3lQ! zG<*iRZ#AX, 䎹v%!r:a9t&7L Y@ Ej?wlpT}MoHS(rO6 ̆ق (@*iG7ŗګ5qDa[O Igl;Rv2b~]@VM!KTE(=dj8tN=2W@`[6,w i1l 7ԙL+ذaQi}ؚ֟y_N/|l#PSb`EEm-B>q0rpLSQ$9E} t{'ğ5gѷ vV?;^Q0=3Xq@M]!LW̾*]Yt9? - SC7C3<3;j+ HANF&«&0@oB""7w4$-_Z N%ׁT5D`UC;0/ѮFf-G%hV|[WE=x@|a|0`+k+7|Hn|S?l6G7zMǦ $c!f֏vhQ'a!!dYm.)(S C 1 mV+S!"fT* 2#~"3K3O#pM#lW1c@>m.0"$ݠdG9MZ]@qw`kjt-(/g~jb^nS%D3 [⌻{~$~31;16n\!f_~u31E#zNuMfW=?XEoCju͆׬ ?iK8%TȧOJ삟h=d ;ܤ_+;)/U?c=+)$g/K>񧳃%MXAl'wR4 |Ezd3?p];9FZF"&V)C/1{|YdGOhM4\; 2pC78lMx<8*Hw@5F%uּ_t\7xr v[#ܴy/ VHygI<- oϚj cגz4A'4$iS6lc%#wOiJ-}dfƵT_Ҽ4ˋdvY)_`t#ˆ"mat*/ 'EK,Ҕi"v|X}xE&I_r;7;jH)2q) E $Ѩ.,!Ӏ ^sGopߞw5ƣgu#7b(DN48ҋ j!9DEio0x-b"$"Yލn)laz4'_Vh _EfH Txy̪ʍɉ~w@]uLM#Ub!C9RR~b%A۸A\TȠ G5*"Ⱦ:􃕞ț;U/:3F)zdA3 p|ҽ4. KjF!:\/K@j vDELTe=WuyIXfOo{6E42t;vT"yIA6,=AM>! EYJd|x5l𗢀]ˍ<1#|Z(R Gl,8̉?QhŇ_O<`kMp #ˢ&hYI[n%¾C\'l:~t>8Ct eJ0j*J$sD f1}f\JH8[EPZ݇*^ `@9,$͒i^&!mB4*򩼙&of9h%.Z[w\F jxl[sKW:Kx򣍕 :u WA^_ݤIyk*3ym&~!t`U)#??=8T2.BcbxNLYaw|>)}.0W͸)n?z&0}nZu-ݶ8)Pvww@dJ.GRQ:']+gp~Sj0F oyg qpZߡ޹cu>@Bd__SfPe3ltXp) 7ˊ8h .Ɣ賔)z5Tr uNYk݌mYEԴ%nf' לAL5Jց/w{}9G- d7ig)ʝuuCJkśmqvOZ:wJh!*@gRwI< OYA%|0.ؾ=|*\@zk[.E}Ϲd ,]!\Ja$ %z-"[ns{ti@[.>ytVVA4?\O]j;P- Ü_}&y(cJ qeZ_lhC@/#!2|3s}N[ zu/3d"()@kk´,;mZo)Ig!S9b;)iV^lru$l"mŤC.O &]+cyߛɍC}-_ Ϥo7nݨ>92a^ۊ(?~x~AkۛHTmxQ§657n`aЁ,Kjp+)FG8aLҦ]霺SkAxy]izLc\S:ڮc{|"V+Kȏ%{&HEB$)|H%Z߁\懶2A7!>ttK$/ù!4-z1 1;i۩ k> Wkǎ8VxՉͿ9~YRuf(zUo1ut$G!Y3ydZ 8=5in_ߪ E4%D5 ,f rYz҃=6Z a1|qP#ծͩ>(eg~n#Lg n&B{}68qәQpʱ kc\<9K2OxLo!KCsoxQ/nWމsYC~ieghhX&hHZZGn0h@=5u4l@`(˲D!1,tCY:ee7p6@}}2#;}6{={r3xH_& H>ȝm%Fbp+'C~}i$LA/ 5ϗI! Oz~ ՂN)+%`Vʥ".=aqvyOtçM*1GM މ[[dRۖ,)0yF'̤-Ѣ~:T*)YS퉺&)73,}1; ʢYGyۼcׁh@`5Zmdd d(D,N"l]Of u6)$f+.FQidŦ=}h+TԘ(_8ړ|z"sAq.+t;;c2<[] ! 0 [[lyEX 1_hσ. TOS@f!ZjӃd _rqߢLr'5A/1ScR)zf%=͋6aǜVGE`)l=}PcAx Ȼ,7ԒkM!{m'?'̚ţvīM{Û:N(\ 5y 狗hb"*j@q*@XZiwjPs'i5Oo vR5Cߍ\5‰_-A!a~fiyET{tRTR}:KyDJvqDZ)͸ؙٚ^EHTQcsT?1l,‘$՗ L>&oDDDTLCdk]ŕ2-ua^ Ye؟=Ώ3<1Hboh`S >fl0]{F]Y$XN?MbWA(1 ?pv29&.s\+J 8Y Om_0?8ZoA!hY/4PV` ЄPX7]͒z9΃/4Nuaxu(tM Bfԓ!Bl+)O q|TD<oRfe:2A25qƯl^!a%6ٺ"ܡv+RkdGEfNj؞60+=G뽅@]s-sZhrF}˔ g\xMJ;Fkg7O}u[`$91T7EC#3|8vdA?gAc54!Ȳ߃lx:`$Aְ "G%G@Ѳ9Op8}`F2 Xցt1_^sƺ]nކ(l0 @=tۨ4^qVÄPhLCjԡ7ύգ2lb |BxV˳n/e3ҀRwMa-`QIxk7mIE .3<",z ٌ pBc7y6e3oȇ5'ꈛG!FrDfwD1g&V VNN=TwgbÈrSExU@-@40"4-{vuDu6Buۙzk˷DG[iz8؆7"ɎD\ Z][Y'=eXUfzwU8u:+vl0i͖j%K#[s41d/0V2!CGpiTj8 #o&p@ז0*T'߶r/n/^4j¡<gz]uNƕzĘ8>)fV9,iY~TUpۢ60iTUYR`r/ÿ3';j3J۲8 WG!˶ϕ:}?Ҫ' "ZW4V91Wj5AQdܐ(c#+;Κ;=#wR;ЁU7 L@IO# }ܹ Y8+&) oJ#&琢טwDQ8~3'ʽF(%f\0.I{"ߝkAȕ~@]ŵT0pvK%g7y;Uo"j>tDEߴVd&Cx U.;zma^pЧj=@d,;N%QDg3Zɻ1TгL?TZm3pZ.WECk}9}V i_}ztK F{smiisLEkT>)tnF ȳ~I{I}*AjI]ׁSIz^6*| Cw.%vט>8\y8j'H^eKaoʜmW"C'sZPOg+0EK.H*hh+ .6BQ3KkVVQepW]{kg G5QQGr$T\n*4Nr$P_Mb\3s?SqWK4)ޢWq*1I 1^[2EhIwV -hpEgX;4 B%4M^0xv[%iǠT~MeIk1>.ڙP܃KGQnY ,֏L mNGH4>-$A:M''7Gi{a3 6v~\޳QGVA#snS8ǗG ߊԟeAay+a''|0jy\5'zpd4VxBUSI. XkH`]MU HԿN)SwT9_EytO6cjiX`?v`UɅ5FkuV 7m1v}{04~vQR^|"mWo2V9xZ)?5F: $ 3Ct CGhe6 wiK |@:{@>$Uu`& ftDfLBQR1OuZ|%6o\%`HToV`B*9kNT0dE"+vUFa%_BC:#Ӆve\e4p$ʍ #T0h9@4ͦw |"E($`b_mNmNsW%"Q]?ݴ47+5[Һ6dHݬֻg(BtsG rC>kqa RݪHčg⍣kDiB+]|OhS>jcyNo݋;~? 9K ]s>ZAo1lvQz@ k7JTS1u_<.~G+<(cay?,cTYSKQ~*B5QQ0>ÁzY0kmJ~`#Yxg2AGo~LP,_$rNWڠ&PV),،)ĀcK7ru6E%A,bL y.Fѳ*SC^ ܌L2GSWP,oT#i| ?ylĬcDV"VSYT3] &"Ip=* ^'A}sl:TxCU&.oX^> E:>r$gԸqzf(^: &IὼcxU+AtD%ảdsP?}ݽWI-EPUӍLb++ӟX:'we6#O=F -x['*V=8g&3QKf͑Akl`b- W6z`ы7Í2l6df=4և:g/kl)F+P_SE5CpEl.촙=N=fj2{;|1Dx?al'OuJFj0NLalBZw N, ,!G/k'r-}5) *J䛘H\ӘWFG3hʯ2Pa4&5(Rc%l~GgK̅mc '뢹sԲ :)}Yepa# doI G5V2m暡Hhl5p,b\8s0P1YGizd5 5z㒗>D|"-ԗ$`M~hպb(`rO[ ;c⧘+G2=wި4*]ZKkL -AmFV-N0Z=H3l'6n|J#faH-/jClmeދ)&t汫@}łZ Fv)*ʇEv0'DHWYJ7a ke 6X^(P\1,!Un!iJf1{:ba&)'ͧ2Q@VQVոF54>D:ʑ/O6L/[R{gפsu3 9j# 5&77$Kyj$lj}7' kD 璫!Ճ;C֦p#,Md驆Sc{`:iƑr¹vht]vp})ʅ8LR:UxlgV[[ 6Ih۝xpE ,GZU|FmdT"-]y ee.\"Bޚ11q9 ϰ=Yd˿裉Z^ em!-Z̘Y[lشZf9nb!v*ܝ0R"dݵFJaɭ%7E8lG>ǠHK2=k`FZG,S2ɥS=RPK);*POsij8f,61>_9Ζ;cW2dԝf`T&N]q\gu|fqj_ݹ&I,=c<DsJ&uӏR ,N4@Ѣvc:k;n>=0.+FWDe> @u]q#ʴї$S;V|c&"Avf& )׾1c!r'%!`궠j kPf9k0n/K  4Χ??.[:ACYz{]ͅo-fa)Po: ,J-Sw2Ft)j5dWa^w6'6074l}YϝcI9WZ'm_D-f1P3c^N`Tݹ =%^_}(su*UIh%o=㜵!鈴#%ym~Wozeɸ\|zyFFleL5WH=<ͽ˅<(^Ы,WOE?n@l*{WӻX+Ri6/n6Bqqz@ncr%WuԠ|I->qDa#W(pa`, 'mБ`ݾ^AGy~nio;^G(ERVMGУnc}0kO!8F^8mHdlͲ 6u?5Ȁ}>*Γ6E̟!I%"[R< VAr~J;.a|PSd 4iU]|VdW`cXԼ?DWΚO먗0yw\3  +~mB=U_&)DS:+!HZGjTE .ݺUֲw!}$ `S9K_< #(#X/Wz1It\6̂&7;!=pb Rd:)/A(;cķ.y+Re&"0Fj\8ş\ZdɃ7JaEO$f.hȀOfeHGCاjo;t3xuhMdIA% [b:د ۫;.BY|a*~=w+QP0dk|hU cqݘ=~/RG[]xЁD7XfD-N]>}?wRneŞ<4G~,Թc300T9̗=h ,or1E9$1Ywtkۻ~ ,jy"PS ڑn]x9nbĢ B':pՠْ!EO?q{]#F $|UF~PyzDI򣱠oFrߎRFK8Ȕ=qd ]w,6&3~]} l(V}2Ziq\zpqo$ȏO2QjgH6Y兝JU%9t/!.TaE6뿥d89ɧDgTqU&[Bs&4~l[])ʷnl_D$X43$[Ia&Tm>3 wӎ@!Voa LZUɰ!*?߷I/І-=` *ۉ{9.%ˉL   jLSusBߋ4ZӃhc:3l D&_2tvV;{$.Q};DL1m&~v+Y詥j{[Eϋ3*`:^v⾶SڱN eP' Z<\'TQ=G|&2'XTXGcS_k٫?~l߸ uեۈ.;ls{2^ FGOV QPQcאmU/hK)H 2 xkVYP<1i"OܪKdEDZ{CqbYSi_ A Mwh]IG1 _9$f|V'MU5?Qi 1 IQ{5]J Lm)Sv[p2i ; ›sWA,x!`J5V .>l[z) a),=&$j h'o h  =Ӑj43H0[({Ȩyn@E#hG.Zs$W:|՟#4邻# J|TR2%u@fvUeC`ZƁ\*Ϟ~*Ry|V(|#ZݭS^G1f{:%r0DA,t=ё._͍$Dߙ+ჟ::5ㅹR[vI_/e@%P H=4h` _S!F|5]uEg9\ V;[Oŕ~x/fij\O_em,oC9n*Au";D{S5n.c&\X~O$myc|d!/ ^Ab6=nU$Ϋp"HjԾo48s`W*fYC_#a1ص@Ɯ$lc:s',R&]E=aKIu}.lbItCyҢe2shp|bkU[MU ?ƨ > JY# ѦCR);/ć)dIf`a9iF =txB?'sbZW%'ǖ~ {3ٱ:_JcGdI2\O0ǫ8ciiR\e[ChU}U36&}z?atX~;J/sxct:te#S1$͛˙ vjH.+k全\ITՀhGy+s#KG9|)Q2oHnPmD|?`JVS3`1smE+G x8u1bXT٨fgN E ]\BŃGCB?I dM.f=aSbajL\'!x !0.ȜH-B9^ގCIG^ؠB/PrXi_@Sd$F-٦L0c rrwÝ5$1!M>,DSqt oy@ҪKCVqV- EK`VUOiZwW%ۏDU\ ǟS2HMX$>DZqA͙w,U*)8XlQ%C,O9W]6`c@0n6ݵHM(˦>{.(^v\Pw3pB/&WA?QS-]YޥRP*ܭ. 6VE <$խ>Lg͙/FohRH{0eAGNBs> S u\m3Llk Ȑ5l=:η84;gbo&i5(a6yrlܣ7Jݢ1,RKww}k_B6OQԲA`NWf;YNmљZ4w!9noݙ> 3+J>" /䳗xvGA}+ӁbY 6 r2BC;5uqrHϴc[^Ы:0ypL vQSJV=Z| =WBn-:$VǁEٞ˖;!r:GCH~fnR}V3*6Ѓjf>$_WxO(O*9\p)'4"XBS Oy17%ΒuĐ!eLRolw;#XّRב6~dnc,"U S3T/l(9.<_Ho('7Zch3U+[z WjJ`M"ɂLM= ]=7.Lqz9'1>Kh-qV]ɳ?^.4LbnT/NR!@s*bh}׫$ |`sCp)QJE=ᯗVW]:@hyvTI =l ]^9mzfo$Ie8 XZ\2c2g|›Z!w }dzRLkʳ4'\ǡn^qB0Z HVxyъQf \BrkQlO8O7`rpK" w /bVdV[3͑A]hF,ĉH&^ֲamzioo[i0XH"0  وɒmWn>`Y\!˚gOP#6J\ 8=5@ގ!3>h:8ku~â`Y’|"dt2[Z/Gu1MivǤv%2`Nc 29tP QMxMfC$rbPguk"*qFc +h7чbUB@QBB[D\(DV<usVUx_:/\7=Brrey~X.[@YLv g/%e"pEe4; 4.T@OۋꂃD4@tD Oרּ́#gԤJ7ac恱ă6)Axw"LqD[ A9tEڹ|4qIa1I>,ʧ_9^( |@` s1K1'qjHD&l)󘔬20`o]G5z ΆXWYrtpq4.wE?)jNJ$BOuG!Aqw0fʹs-KbҗzOiOVYoNaѯ]Gu v뵇axHpݒ]Fc-=k;-v_}=`Eq q'PxgG ,ȓ&Cήi2}K%40^bƓ-/$c$19=Aer/ݺ9 sUmvq?Ms9`De7_ޣMd S(#k_7SORDjNXkg/:2lHI-6dUlY-%IXxJ|`^"%Jl8 LdՇ0>e&a{2#7vW[7$wUa U@=!1N/晙i/)G( 7--t})8!^??h(0EMf*1{iQ 4΂|C.{^B3„p4 {4o|xɬ`w?}ZauOK +BmOb)V#^ӂV;CwMqD|Nz=;5NԅSBg힊"b!oPl -6J:/nk :@EܟhFϝ< / j.8ܑ̻Gˍŋ3dJAQKG+-~%Lh,[TnmŽ'(C=-,OB(R<O8ZKEQu>}l(K`6.]^SG$ܷ~o0xѸBnt3$9<@·k3f../2;* s+61_ mOQwpij?MrVIˢ9|עIveL`B+?z-rLSm28^ľAʼnkUW77ckYgi5^H,#\zhBpְ_OVA^VL)/WSíIթ/f%8cF!~ppUT8Մo2T1`ړѸf2{\r9 Z~སB"b'e_mkВ/x0 )]"kְ۷,O*%$yEAل,'>J2jC]NsL{NxYS;܇4 1IٌsAVt>K`"4s >\Ie$jkŸ5nhFc#q}B 4[ UwY F⺵>U(xa 20珺,hu)"_8Hꫮ:$p+ZvU"ĄN$|^Y AT472 H1JC?5}X$t݀+9erZ؞^( 2rT()FFǺ+4m/` _Őe}&O+mws 1x@%DIBe~z\^Ǩ7R_,`UﭏB{y:L'ky YFCJ, *n: '%ER;QR׭9"nU[meJbNÌD\,q4B~sH1@rЖ{{̶Vo,K* Q@ MN;gT(Hh z0r%pJjuէ}ֱ멁U1L݈GA _FSndZIlk%aQ3!(RyHͺRuؓD䐙%(td<(.6./'yB~92_V/݊mly 楾DL&z6|6!'L+ wj^v7z+i.gXE{#VA | ?;D،m8OyZ&S\(a>NQ] RdU~Nd xXB> QK;>#AM i# EЇEv)b} nhסbįAtW\hVnb];AFĺ2g{zx T꣱]7~w =YPE:5#4֢_UѠ}ϷHU DW(*oǙ fTB>jc0%<+ō<Wx)҃tb1%{J.Ky/Euװɇ_Uv|D,bIf;Ds><DfIwOmPdU s$-yuo_{,{Ȅf Kų>^0` P Y݀Jy=}b(U NgH԰fCu =ArZLEG0 [x1 USՃy#:an)UVm^enS~c3"vPO݂>k&Orbeǂ5_;+}ۛkaMwrSlΔeNjr /NΤ G.s ;c0k*5vW[a\C̅}:ϥãF5@rW]<( *ÿJ+(2Jp556(3Ũu&vż:F\\)}dXݬ.ް]ؙuBxU&\&ɮ"'8v `l.3&Б"?2>r'=o7U ]gsXD*~fVP`D~YniņBXJjAեxӂcxMq4CRxzz+xo$Zȟ5J>dxjSBH$/VUZee&VUB̅a5',8>Utz-vX]"ƆeN0 |J4eҖh-KL98NJ@~2XWm"7%#leMJ&z Mק"ć[<&B~y؎`,~ϐN'VWM~ M "dbCcwk1zYzm,'w{Ve$Ί7:X$pP{Da#>j= 146+ǛT朕=W uvC  M%&:_-^fYS(?Jڢ 7R FNyma\2 E=V>G5!N#ΨI%[++=Zƿ/­Vc2czGiZkXf7ʱ:  /:[y%+E^Mch3.<}R\;WGZ42N`f2,7W6#v1u-I[x:-8%s<tbcC(u&sz)糪fqrMtiFdCaDQvI)0[X] !:0}B'9Vj|"8T:Ŗ0VΝj-HuRU:jޣUvx{.ozN~>Ϲ,ⷡ[VIrso0Fi%>d&G-QO;_8O¡k)兂 ~q{6#Ŗ2M29*!'"Hnd|G}#Si.˛alM-n%+Mr|cu(OwrJOzhmAhآXI25j%3Z—Ҷw0bN<0ף 8%uJ>s%uFsxTrUBSy2/I}+ #)׏t't+>\d>/کҘ2-(_UXHھu3wȸ!bpɍ݄4 (G-HZ7'UhZk E˧zQBQ'Zjd̠`5t+rva1}D`$>X5>E x?&S1,\x'cS{T TG~S(.MQ T<ψU9'My ewTPzǀwyjҖn?01`OW%;Qh,gF-U͏uLM$n]*ܢ l9%tn=9Ft*R9j8޼c:әűR1SY)5R&!;(8%jTu9B!z2MjQ@p1:кwŇU!9t[u8}? Kw>A]x.v߿Zشe4Щu<싺ie/}o8ɇ=yiƝYE/15AŲQ'M;Ea. * \KvB 87bN($is5xb9hx.`\;L" YY` T9Zu5x53\Ӿf8 gp2K'uӀbk5zyP Ro&Ԡ)+M$7P~-~i/6ak pAλw$]?ݤ/V)C5/~|+c}mKi1yS'y''\cl)NjZ䠒D"$$i+wZCk.^A469r C &j@bExδbbt}7!uv'no'[mm](|iJ̻źξ:HcA7{GstPہ|׉Ϣml`cy^ d(lQs;` x1)W|~Z]X:2B| oG֊ =jC3a+cla9tGJBr$(<|>$fP=Ox#vPii<4ºsn{R31X?WAנ 0"#]O+cdud[ .?mb .M&-~}8PZ>k\U~=eQr;(d.`yLbӰrU#QWvC~ H>ppb.;M|TEx7 >x pi4~+/"y&0Pҙ}e. Nj%Y obO=>ځڳPXEkL^.d?1XQ FEZ?WR5qᴀ;pt:5yL|?T !&o0%}']xy`h~X]zz[/F=x~.HIxma>qȳ!] #RMѫ^ nJc˝##~O#dٗNoDx3;ݐj8Zx5͵v &?A,tf< gLȾQ4Jxs_/!K[^Vpf n؇k>6ԐАurRx 8~(g>5'bB(A69w~[)97I)i&o^W`gq^b~2'aṔTdy?Z~hϱPnO-/yҋ/9ȟ 7,BUI$iV (>%P ~DV lQD;[uNMg⨗3VxJ7::揗*M#_MRxg6,T/2?.U+@?S!@PP7Gy]anRsP3$yXzRy=$Bc!`hktR<"EB)9mJLŅf0m~lH9ë$}޽с⻑)C"'d&yF1=q ,wt87mEarp{(6[Ӈ^7ʻÁbA4G\E._j[RQdrqg|XC|%ԓiƇ@w։H}x#TAD?a~t̥sG2`ȟ&htwY*T̨c)&f6_L}_ $Q!M w Qsl^0Td]n5HBړɛK C*?8jO~%iI *"SmZD 6ZU :5{{RT8m̆˾`p;թ U||СR]3V G߷-V7/ڪWz!;0!־ ҩCb6ťɾr${F q327(vDRިꕀK&.|TpJ&p4UYV] `Ё ':C\uJs|+ߓ_>+U ㍼xz99jv;a R`CXTT(F'SBj>x(IN>tSY9f&bҚe+'ٗSmi$o(.["cIa 8䠃 c*N|^))AHnTQc œk-S-f 'Ώ-v,*${FƖFɢ#r°:%Bi"Q]/,VN Jkk3nYN:y#ݣak7 &tx8˵=F.=>?%|k[d׿m^˕6KmJ d*x)5Ѐ "[Ĺ fk= b'$ (w g}.1UǼc XStJ.|:W.Bp6b(͏ғ>㗗=,%Ϻ"䇕& Ja\^ΖrC{(e7A!a0őpqre!eCe:(M;ߧ'>bGZlѣ14OVx` fs CvIQ٪&Zo& SKF`P$ꭺZk9ɰ1Y˱(fjb2ްE/-Gn`r7д=ojt( 7UeoVn9|:ź`P#+S WAޘ6s{FJzbtE=維ÊNJ{#ɝ[dRvYEC e,y,'s!c: m0h]0@{4N3Rp%QR{m_CVW`ao6u(3wW6r)t9%'~9 /N(/Xw7#h PФšVs-kX/.US/Q8H"!Yޑm,o{C[!j#8u'I/峆pPM41mU@,|3:C2#`|TϮK baB @,CC d͓"|2 J4_2"NW.t)C-7vHH.D"bxi֔gH1+aƒXJ$΃ݬr$^݃ |8B#GI&A{mtmѹl \8b[tH8!c"[Q\]֜| #2AEYRFQLxu~/)YF)2(&Vj)|]zxtCgO03i)Xf3$̾$h󥁙=:I؅H @tOνJ/kWr,~ãO av(R-_kE:ez%#ή/ȗKBnڻҧG w>s Sq{QMnUq d!-ۀmŹ]hSW ~-r@/v{47M9Oh-˕>SOOg(H4HNV39V<Ų j]Ӹ7- Qݘ1fT+#E78SHʗM)=na*`<%`9],xc5gB*ˡ/`[BuQn?SCCdUd'(27c'-a-d&G [UuBoT/[To#Ij S s#CK`|I.5I'כߟxL0 UndFž.2΄D,L|*n,)6rAr]/ @K;[bg OJQV҇C a%Q@dAq#_/ %DZw̗!@|M~jO*OnNߑcd2G|]y7lꠏҀ1Kn]ɰÚVk_NqG4B/P6cfVzj`v_$HUcNs >nNZg[~|;oh; C'PægD wliKp-Ji|PA O~9Aim56įXLp)I)6P^ŵ1 BΠ5RлpLf_[-k. 1I,Ȭ]&LYŔ":qב($&Kƅq"[e[ 1&]G!9T?bkP#Y t~Lj-, \'![?S^e;M3gp tɊah!c ъfN'-(v;ғN)cqQ0@ZE $؂g^mH0W*u4}06‚Aّ4wso4_y(ᴃW5 ڜZcoDSζh#jGEol x0^ f0ӥ&"S0om> y#T?Xxΰ0F=IÉsaBfL}v$chLxxRnW 51 4GMOb" ̼cy˶^Ejԏz5a<^R$ Bd}T+gk%3DX& k*rE HNh3@N%~iG⻤{KzN2B|2:1lbvc<8 wC^(l4aTߩVg ii0TRT6s]MD{:' WAz||raՔ'?( U?p1h"yZj94FHߡA 5.H&k~|{TZK虸LfLjV|9N2ʇ$?MKU[ שwQ-zI٬v. hE"q9۶ggfQjZj]9I,դ FGA܂d)s6a:TQln]{ӣ &`8*k*#UBuTO6$!S 57rs\\E1:Jm,6D/]W\]Sʩu|Z[Y<[:vE V|3p@Yz3abV+/1^n*-+cEEtnwJͿ+ѳ`{(JaX"L̯^cT8A<{[׽sch:CpDǮPH7m WbpdNMLDnl=B#`|zL~@ b !/bu5F ǭXp _Dpeh2 U R;.~[EwE$i̲,LLc)}*=H;xR]~T gpcT}/w| cGbpϐu},L;X%0Dd~q)SvRSwޚr{lӳѻb0E- 6*3OBl12b>LFQԖaciҕm{r\[:$oeD|VҤ7gSthd2\iͧR Y؉CS7f0ɵ(\,ӱ0!p&wSZ:iI3BTq#*Z(|>a߁mz!!-Vy36KZe9$az1_Ϋ ExԐ0@d*c}*d'\ģE~ D/i@QIҔT&fi0<S%XyaulL6H H.lȔÚGw@pbFtZp5 8x%'JsxzOW`- h_9%GV!Bg\D^ Muõ7YRƹhLqB:z'hB63d5Xgma߼b Bi) 0Gq5zjiT箄 [#6āC;| Xl+{` \\b }_2ʛGOS;2U`'$$"ZRk$ 0UcyAM\plOR& D#'LUt#t cvf-¼MNJ`Xw]w$5:J"q {_OIMRWŌc d:zH.R w .]`6^$TrnΛa{OBu6Ԕs_Fy~̟HCHN@#M0c f x 1/8# Z\;I@@톒'> U :2% te\ڬ W5 ; r~E`,NWkB`EVE>iK[D=$Zx!Y% P 9[6ۖc~VDԵ۶ݶD0*2Z:n MC2R3p8i4H -&*dKck$ۡopW.;hN}A\gŚ3wʡ"c/WWq j\eC[tvZme&n&/vst3f},kzcr!H$"e88JxWGXρ^B(B-`-| TMkrZG[o_'q;S4С-#bkȋ :z{?լԒ[ vnZ@f%QQ`qG._éV;^rMOfF^tčB_v3UmX ~f?VeЅ ̯JTx8>BbLN: R8h) /kŖ<>E4z 6]xJނvg;"c]M!Ý*0K}TfG 35&9bgET]ə%2*u/a=+T:J4 י2!Dzo>)y!{n]4gH|/w!U;TCg}8 ȽFݣhaIj~%Fk.XG:A[H%J4TȾ7`RԎL% _*R$.2_P#Ac6 `Q`;)i;Gѝc.7 PGE;8VV _gX8#Q | @Fk=F=ebR˰xZE&Tg0) }{zї~#@u|47Fnta0 %D@ȡ &iQ`HRȽwh55B$mRp;X_eHc /U_B9ZݥC: C8lr> 5Z6sto_\ꊦ" WN(X!|3`59$8}QZ `n(k> zwh䌔h}nz}[vM 'I9<+v2_ctgE+*T%xl?4{yGgX8UB>wB݉ZuG 0:0{"sSCbN gyA(]ݫh2L0x@pDmTwޖ"'~aj\8w >˧@CM+\36jcT4e9P(>Zzj$ O'cδLk&$ (>-pb ìr4|CE3's2\b!k.& nS5vtG?κ>a;q*4[` /t#xY{9<[iXJ>l 'FSYc\T~j(n"Sag`Oꋠzx73C Kd){bJRiAË5^Y3p-z0Osqhp ꤒo7g28Šo+QuWK _ZI7J<]k)b`0Vx6#%A,X_y)K k ɱ7F-l"c쑋[;ė`iU) b$ȅC1Ftg9WqR_9Roo;!(r pjApo:)U6ۑ8.4,?{N7P5ap@] Q&keشM]۰{v us.PVYfklBW=(͙ܨqH&\mzdoXzqV@0 ߚ%{/7Sն;O ,~XO"1)V/^m8 мcVd|A\zv|iqn~qly2%=7ᙏ }f]`%Sט,xNk7j?Yb fef&^]/iʐrxt 8g~2 V*fa1'*-m) s*B%eES#(ޒ4:f0D'f ']!u{34&? oMgC'iShkox֓ >D'C2*~גXyb붳w"4Kۮb%ưiE$ꪇ0EV" I(r23:n2Z-r JiLbf4L2}*If3E\F^.ODEOB'8hx$>aj*^ ?hL}\wnIzJ(b{2/{ȬsK9\0٧:mi;'L8ȇz~  $Q){%b ~Ɩrd^oX@ HN!ś>C ³ItJçNY1KE7A2d᜞d~Af*{ds^k?%`S[BN )ς^;8/u[ˁr}rSWF i'. X֕(9 ,x2͗QӀsPFT0 |I35 G,(E{X-Ls?k)S`;C!h=LI 22Jv P_re +7tm1{@2)~m[k\x(:&.3-=ortԑ&iJń!gS}WK2vUPEO'}cPU4a} Uh am;auiBlޣDuiP0IZ~MU/IROq;IG׻1C'3cJ_b!PpQyn7ΰTGE7o91Iswu'^d5`BG6! /$,sYo! 5.ZoKmzBS&e [q3 LmCLQ=D]9F}^% gl\,޴x*#3 \3k<_Q݋dX6qaFA$2'hҁϤ|RoSM=! ,<hZ B@ɀA}1 SJIW'-h29tpco psA7)4tM(V'ʬ˙D 9M0^SoتLqv `Tؓ([b!)kqYtFbGۑo֫irqB#l\I[jA;E*zNuպX F$S)w@҇2"(2ny, JצB8Z7,ǩа7aJB p&fAV*;v!@xHKB}Vr4QR`? VZ=p )#+r 'Y;5dDtY`.UʵK<^Ɂ^jN7,(l"oJw~V//ur` 7%?"d sҪL>+9.M69o%о ߾L>3@6,ױ|?Ft l?|pK+q%Ix#RjQ.![R7 'TMAC3<=T7IR 8U~h7 .邈lʾV"Faby,19R~`nM0Ŵ7sfDsA709Peu h$"C J[E{rZpmMH|f֓?9$֕Սp Wgw{K(uG'Bk8 p[똢8ˎ9<1(90z 䖞AKw5MvqO) 'P}Kio8NVvP1z?OHWXq12)ɾahxPJCΏ* T}O&FM9G ?۟ b#ܗ/5̳(b'ҖQē0.rN' [Ama,hW9)3uҿ#bqɏ3Q>% [1} V_G}y6!X| MGBO%*I'IÛӺ|HLB␎4)o_었8F\]ޟ*8!ϯ<\T5Eβy)@/%ݟK٪&,};D: 06iA'n@ fNԂk[7ko< hL '<}o)(OAp0 I+" 1\ 3v!M9rpOdxE"sv-9 .ߺ#C꺟-}[4j_n<&3GUy@i^l̕7>& Б3ߣS[;pUΙZ9h/4 n;Y"S3/HӠkIj:oaTe)ݫ'XlKކ2?Z7aLL| 3ft"_6=sjj:C`$z]дܒ.2ݽ`t]&R k^ =>K }’** ( n^M%L+8Af b>BILtn!P rzuB "* nl^x፴&hFl^-jjMb:j,C}zlU}QbkR'z[=u i@)s]]׀N51KW#APd yNXo&m(_?ԡ`W@D}"~PF&bނvZb d!'&H bX4L <,>0DZ xI?9);ҹYfȻ)ʢ~A*w=WzBee`a~z//{$S&x-)~j5coޮg[QJ/`%,!~ѽp@n,c ToLA#\OqGF^`EQi9&D&/Rٲڳ]1H.%vʒ3rd֥@1q(k 86`f;+QR6bT"6*mi[dV"͈ Ԝ"7UGZ"1+׍}>nB̻ F 1L۾B9x)%LuW@_Z">D@OKzLB|lO[bcg`3րA6HGH`ˤ⎈)\ĩDO*7;ҲcՏ)zYR}..+KFzb3pgN-4eL^)H ]7P_u)Me(m?dG 1>-^A$ 'rXS0?>LBJw *b YvrI Ᏸ!(IlC*{#/X%2DXd^hD`!R;,;<9e2&\?FlQi@<+fHLKuu/DPZDάį!9A={bK|i5UV%9-Z v~ߙ..Silb>8UWt# i-9\_Ӓ t/jy &>eLr=Ƴ[(k%l9麠4_]إo Nu` t|يvicԃWE0^`ww m? )avxHGL༃Wtێfӱ&`XTa}%EёKc#geZ ]{nz7o8Tϋ?fA!\792i蒬|~_vүϐ vWw[:wx<K-B䧽Wc]2ȝܓcޱ#%x! TdϧF(mMa!PCFHU䨟ƎҪ%UT /H7Tc/VDP;|EC8Gn3z ]S!B#!B9Iԏ\ Cbo~x,zD` 9 ɼUIigOR Kb퓚27p3fZ!`m NY4W*%עW)7ϿַMU$k H6DJmRp59Z'۵t@;Q:p m['~ǯh]D)f OII?;+es: A^ʽD!9Zp*x#ݬv9 4 w.qm hPlJ^VA*}^+a*"*z즽ߣJ875?ANz~n23f+OqI8 L6Ağ8ݜ8f9R4`$Tږ˘9\bLLi6B`?Zp ݻ|hl压{-(YOor|mt |RQhR_p}#0?}A-ӯ VD'fѓӈh._:ˣ੷M 8IAz=y!jO>P] _pb +! Cjnj=)N@ d<P1umZ=v$!{z>NˑX#3($.P*zPʤmjBQ9t/d\?5$]HՖS6yq#u61?$ ͰIj ϰSzut{7$c2N<[z>_a>/PkwȞg+5(r0/SfPHކo0S AW|f`Ma365q =[4U^wl~6.*rbH_Eh BwK3@u&x*{osJEy=̘aLTP,4ŀ3,p\Y&;:l˓A|!:_5>,^g@+tX[@#s),Ƞ[Պ#:cY9,p6"W_A)L;(1/nH tE$p T"Yd)U]&z?z+D,*vq g;)t5SncP4\D.D]]StG: ̨Z'T-f2f}6uVZ`v&}a7;CvcA6@Je4BcCF჎&jC(bɧܔ7먹螹9ehWa|M"z#=E'%w:A)[ L(呩'7(q^ __<5FIVq~3=#F˕ϫY!2o<Z!3pkֽ{+řUG:jKk⑧z2o>H Br&Z`o^!q"ROsN"zR4نPyXUߪ6 A%5 kj>EHs{6=2M/5ҤsêR-`_$$dȬ"t(Og&O'N3jzLTc4;( r]Xt]=KsN2FBBYbMxc߃P/a3($Ao|91e3h4epK~jU":FY.)A6m u]z(=-1lTΪaNiwIl$&#A)蔌d#1-[{d[> Ca+DD 4Sq;6IOzSLM~7œ^ v3@t(rM\#}?,:OxS KVK!:B> \$wg[2CgũIpg@rt;\oq*1C0}yKQ蓱h!~2@8؄Ӂt)%{>{E}Nj3.ݯk +ZS}Q_WQ6tFL&S_Iy'],6oAqeᕨmʅl3 N:?oP\.w%%դ faF+ gQ#(AYR",݈[/' Myw]-(kG}חC# `*c}ײy-p&:.]22x){hX)鯉 8g;uf7ڠAZn]sʭmJdK9 0m}et]ja]R /u+\NŝFӽ ؅B',8X*LfԄq UcTM(2 N/.ֹ5OcItEP ԋy-zsN.!%_`+yTO)Ķy؂|tf9=e#v&.Ko5T~jQKjCڢEBE/kOkR XrBHj ޛ[.qri^dc~k V2!P 0Ϳ幂N F4Yu\qe,tHs6fjr B9g҈;xҦ77NZi!+y&{}/XH񾹳HܩAۍ}* =T7dY 6N6%d( 2PFUͦdzEDJ#N3bRt>Ms/g 6[yR;faժ[\HQ_g -~k g >_>/SSǦv86.bc^R~l8cxf}.;}`Gu Hfm,.aqbz_ J8 G,ePg)py )|lnM\(v=w뷣Դ%XuxDuks}3fn>Hao<:E1$!Ȉ|:52<qh"ЎI%9#>D~0&0ȪeY@cK{T͘b96ZKL15yNߓV0S#7Ә㬢k>*B˖Ъ[bQ>k\\a{E*]ST5`vh lSK^xgV ܧ\})P3 `Cm`6@4PFHlEh Zc275`crEQܚHpZ'1f ЁS#Z Mʑ_9@#YĞ+-0;BH*Ϙs;L!DVԂFU23.%440 뫳;N_Ĭ+}v_׶_β&8$tVSܟv9|gh+hnrx6wz wN3ԮE*cwT: oŅ0?&ϩO*rqQcPz!cޚsU"[\e~zCqs'Aא[Y CNw4\?|(xSMsjaXn 7mz/e1n.8! dxdPHhgk%PBW_k3:PjnÆc!ͳhGM|]%ayï R NГ|>CV"XJHq܆[-N;+"Ww64QSP{9xNSzNf}0SHjJ=yۧפWm6[5RsaC<uXF> s w÷q} S&Gd(*Ij;JIca >Y'X@ h=p\BG59APy>ԀG}BdSXU.+l4Cmvtu;[:Dvf O K*32D-؄M F b6V/N#G܈Ҽeh# djӃT:Rɪ!4>ų@9w00BC`8aWB@rF*]~x{CSN# M3nM.(?G2zf[߁U3km{@4f{hϢ-7tPuB> q~!t*J 1y|یy&9V`cM_#K#&Y;)v N,g=FZ3308m\e-MK1mњIBvihoMGَK1)*IFVdUYG_EHf_胐T%dIo,M؆]GD#o.-,~}WD::86x Y+H~kාP72PiyY?x,Ä:&HuTwdaVsk1-:̡uEdHگl$hĝ9nP:Tp- ߨ#L7OWip9;Q. !3s10w* hM²mFmY~ƧFǠ!@|n{">(/) AJpSx̊]mRE'2#u=)9 /@99YOq9-D69T͏SXJŬgCĭ"2 l1o0 j!c;ZlVV%؇ ֫~&)SustYP?<ݧMyaofQp9xXzw!! 7Sd187?, [b̙Fn`*E%3dtHJ5ɾg!'80Seɤx0l/UhxLPR@j^g@ME0x31 %<det'iKMs&qt#^lj3Ļ%l3I5K}!ZHt-@vs]i,. OV{7K5FO-"Db_R;#z- g6! o'U XsmjC [t ~˶u;6KV{bv;i[-ރQzٮfwx+}.Y @T"$uCq2{P0dѰ9H\ƍbɢvĩOxN0][_Z0P$+{㥹6XtPF%=HDր Xvڋ[9>&4A1ƒ*3: ]|;D.Rs!=^=GӋ6]t/4Y0U3<5N35U/%؈oZ牼\ܭ)J|fcNp17Q>RyZCQ߁HRP:1d= pIRa֊m= A#O1*|/r)PiQeѢ\W_Ro@zS.o.QBPmAH.TeL̢; ]םGkK2`NtEYzmדOБizh _"U' #!D (V`"9*#g'u 8]>U}KC ( ji]K6Z6|khܙ> ]s8v ~|Iw*tkbORIfSr>F#Hh X x c>jRg΄CW# _M} [;Iwޫw'٫*?(`M0`'U+R,39"gd6@_%D4N|Kl^vX{c~B|qN48$yϽ~ۏ>KQG7cnt{\̺A. WKdWZWFoqQPUu^_>[ 3d|}͙s:%+9Ye+jKrO,Yxd_cA[Ӂݴ7ׂz/=@0c ( G c2!wҳS]Sip?L z%3%D PfV;wbl"7p|(v͏c0Uvв_}pwMEw9Pbғ2{'@+^E,8S>4GۅST|.*zF%o{A ë42+R6(;nEayJX3pI'P:;'$%߁&x:{U4>? qAFڈj D7eiB+ .6YX'QL4|~"DՖ*@`b"v{' -so2ʙ{؈qU ʚH:m5 'eJԇBi6=\OFŭ oddxuD 9/GO/`f4~h̓|puGk:ᦧ()į΂覹 d@KL q!iIf1iVd-BIP:Yp˃AfX\t7y6qzfwz~ǞLLCB Gم Whorxi/lhʖ,tp6 z͈=K0zwKx aőZ#_#?JB4]y0/HE,?\f΄ĨߚhjOwZe0S W|&)ʹ$fe>I$Kѱ2= tEri_m4kY}ژk2IE`< Ð䤽%QƸg^ XՒNOV}/PtbVYi[hLeY %y!M.OTj 9{ѠAr_fwSJ"!U<9V v$xhV^~--:ozl$[y=nX7̧ʌoAr ;jl4.vŇDLY#lGm#?upn=>V7 97NPxٹY.|v=xrwg 6io..P;)'n, Ikl{SgyPžSj~K[4f4hwɽBOY+[aD/2#!Lr5׾jBk$WJ^g\܇D*2AptP~x~^EXy$ p- ~HjQ0- /:;}`f<UX $b.f&Wh?|V9w;&NJKKܧ\i<n&a}D!ZLKt~ox;xN>>.tpF.\_ )nqK [mHi/FK (B (y%6{9GnW _DP4S$(D;g0|&mcےJXlsIDM^z OҜ2JҮѺN':$ٴ_裔$!C7ԅU63BbCQ^or 5e ?_ iU/"*?rxdS5&g/4Vr7oZ$[KQ7ֹЮlM̤:* {x"јT&usirϼ;[Ni Cl?4J@H l)|5GbrOˆͅ>j;ly.'؆./ g~:?3DZt7I!u~煳Kkzt>:kٕ 0dډTv;ڗ(r_od% m $cڰ*ơF~;55jR)mRXS@.nД1bK(M7IɜP Q QpOBX'ϝ C =]U v;y-?#4gݮ+Q8$E$8X#!0tZGs$,Tcc6׹S'//`,\Tre_+ Uⴱd5OM抑$j&n) "VET^Ǿ?B~K pu|oRRB q$3$,C1x;p_RE DJNq=H1QsFy&K!咺#nQ%.i/\|) >.Nlc9@5/:x,ƲVVIT#7l-_Qqߕhߔ#d!,rv8? ;1VTvd8pv$NdѳLv n˧RiD I=)sDalZ>Y3azpxҫ1H/'FS+%`3C곿ƶ1)EZ^G,^x/+Rgph#tޣb:.3ĐtP5yCf4kiTzxP=AWl|hFX} HN^ZQP\GNV"WDω8+JydZĚl >d8VbNQ DLULl,hji nL.V+hA9}}^p8!${zRX!vZ BmnOnl%e?ܑ߹^ b~ȺEVxK'GNYdBc8Ƽukw bG8166|^g(1!]J$kȥHR`e-6-ꘙѦJ3hhɴE_YxwI.Y zSdL *yfXZ_S?m[_zD MOI5  S0d`02K"~%=KH)|է2δL p!ѰcZ)6褜b+I06}`q"A+8cV-'Ŏ *kNkm\F.Gx{\FʢVĶ֪1ɢ:jLli\EdPdz[4|;a@V蜫O~ FL(ߛRs./nJ5|T V+h?YYi-CEСF?{ ye&N%wȧw+;.[CG9G@U룅{}z*Zf.6&~E1BѓJ^ +ٚHh5H^|8~ H!:# Sw:> j.2BkHwӋ[ϖj.0DQg([Řim,1PR#j0dQl!iov^k2Pz#o{6-.\W ĝʼ!k9rG0wQUy(!iIM0_MxlMX@'8ob4`dx@ ]DY (DϪ8̆$GbΔ "~F/5RUH9T9LQ^csp6@< *x*|ppH&d~8dxV7>JY##ꍁ%}#̞OĨz!tDdA- iO*sҤZጟe[$n\zb=.X[Œ4 `frFԙ(.!Z<_^^LHxzIC@JVEAJڮGB%uғ/Yƿ}1W/#A}LՌhiʍe.[ S}6EIycI xc nra[ 7/ف4K0F@TÒ{vSpLJqoK%EnUθoa6Z +4 -9¨_m.+I\.t|~4h5yK=^<0qDqⴾ\r"~g%hҵG)=3Cm#z)YvAI}7ԋ Q4mnz S{@ tێ|+QY}ؖYSCFTk &#6i:ec9\"LuwpZ4rlA֒L4 T.Q/] ard^F8͔0oPM̔<0 uAcX㜧ı >LX锹#GP|”~{T/%wD`a֯.@ՈnR\wH0v&r秧j1ԥIE6u6AN,A(yth徧Imxӵ>S.Ϛ?A)|rh;L99cD*Vݾ'^Wz[a4ل,e9x oF/М!6Do+NgargQI6O^Ad)ù'j"}dIg,@%'Yd^}yfz?֧DEZ ă?a) <t8n *G}$FhwR㹇>]Z ʗl H 5xILQ'G<D~kp=q7Pd~ֱ/~*_GiWs6{K[s{Frq m]VtMB5K#J6m"ޏOuq xl&g7 G/lPԖwl.lA nCHOAqbȡ{NW\>g0c=R>]\'@.::*.R}־4k-'hhwD\>q57p-T؈95ay2a7"`1| ޲ݘ4ERJH!u4W3P5 w4gj0A~iHZգͬ'%bj=A:Dl^|TJS4?o) ^pC(_qӚ.ik7o œlh]z2:=1衫?cY}3vz``YD[$ ϷI a7]>-vZWG c 'eX/Spo7&_u L ]yzҀ^PXRgP(~ ů$L$ ,NŎ\=$ѾՇco|xM/L5[2I<Z1SROXǫl{ [TY; æIVNLu Elyֱh%=[H/Ǜ$Rzo?Poy!Ҧ='n!t]d_;>V"lA{5jY̰rf8Z<ȃyR{a'N?CI!_~G'sv?k6_%<PYXNyZ ^^|Leϻcud>*Ag_dަct c>{>Op.E-b9!N枻iO(2 ވ&<Ժ=_pQu)i9Pu*v1"A5n: *rn)cRPxC*_Th/,oH]vwL8D%<7A^n(QTG O\Ni:P]cLEL4 A2r37 c aojT*qva.|>8=eL" (]RٞiP;Xj*ռ3J TS^ʆDZhӣ/2/oߐ#Yes=^)5Db nB{my \}aht;2'@rhӮ Z)Zu1uZC%GÑxz{3Wjҩ*'&:!-z7`oc=[ >З($/8+T{t >%FnMU;?@)is]]l%0[H>^ο"F?uWPt#I,8G8۬H>˖e ;梋~\3R`^O Z!˷Y]/N[ 3;oD}U3;eeIO`|Vh4idqsD܊gRilu0(q#MjT&LITwǬxAuS֟--̑]N傐6f?Kq(K2o孭ؾ:{cP2bES76v$<s8[\)8'Ǿ3l_ALy.xqx޹gуH=?fflmFh&{aH$0.JG=&Q𡒻tj# !^n|Q;;^!' NAyB]")zdž/b 5+$k;su^llPఌ~K0OnM4$=grO*̋l7Ї3&%@4{O a :P i9WJNZavG";y\MEٸNKnj/f1#ai]Yk>Fcj3OUYf>pg@75ɟcϹyI˚!Ayچ=_:Lt4oR^uPK >y p5QX$qBʞ2m`j1_xƂpLd}>[ qӌR_,x=ˬN|3Zk)N.=.絤z"@eENHVX]5hO) A0 kjs=l2 +prDP>ܼ5 wn|2nEވߙ`Qj#Nmmr ea !ߙm|4'wD5\ٟ_E J: 46gRc3a]LqQU t;p:ߧ"ȫ(H$XTDgAWZ\9`<ɬnK]&mȗõECp0)X*b`v@>,24wU=&jTX)(,VqS/ 0ʗ)=2- Hרi.U" ՠuv{[(Y\"mgie|5uνG k.F͠oºQj)GY>L0VOl2.tg#-6?3BtWb"#l@" K:K- Y >.X̫M8:[mͯzwJ jϦmcALVk{wI\F\[.ԫ@.Yd=m,XG,v^Wr,YCBmuXVo.q'F9Ȗ]Iz 9Z <"_)wܹر?|a% r,-5۶o/Y5 >qME1Wu%Ԅ0i7dT=Ԓ]̾}u5r%x_g\`J3ZQfV=pՋOV]SDVDLѳ Q!< lk6 kbӃ9C?wjenWǗSHOWxjDpDfv/RbE-g} ,Xuo2b _+IφB̄$j#IuLVi{|{.'oo<G7Lp̭&3&)[!S2L/>Z6f]1Cl8<dbh,_C3Lg%VO~`)׫`5l:|S-C8b8ȱg"q*Yҵ\t 1jT┤];\CX5 ثμ8;kpLwϥډ~WI>yJӞ5ZQMYћha+7tZ[؅OpRL21?kYS)~v8GY:H{߃RX`M h\@B !#.եSm.j$ . яeX5x Pz9ܯ*̽}x}C#8M%kNJ 𹇀XmV(ٙh0H]SpШG G|wY af;yuB^'%4y\~Bz~[VӊO_|XL7sq)`}XeVMy9B kQL1x僩`|;~J^D,)!N٫a@uîQӑDħ-1Ȇ4O9"cH )6D~<2 ŕ,-N 8$}WO VA σkayӝIBnzۗʘ\X3蜜i$%ߧj 2aWvQ]Zݩ$X0:O L~ٍC,24\DQg/ubԺ6__س8ht#9IhV[n5?՜Gw w3|?n.I2@t-*m鸫*$BVn7׆Ṉ̃vj,C61FeN- IH)#kݰnzX©)/l mm|A\PLپZ"Zp_J/؍=ˊxFmԫ*s; qv.7JwŜN*MؓO[FgX⠺;]2ɂ–H.rR vfOq쒣n"}#78kv6b i'1qT= s$uB]cjV McDGrX꿔ORKHCQc% 47T{ny%V߂#ޕ|0nllM>Fy<Nfe=XPQ|<PZ݄iX7IP؆g aJҊ'Q.%)?}nAp W9¿/N@)EVi0L%4^5EwFp`QF/e-0֦sڛyބzz(N=$pJ,+d_ ܦaBXR/N_or .'~_ϧ$׋N͝0]]pÄo߯f[%Q}}K۸?3V6I\C[δ(NXESwqG!IcID`@%FῼXN}r偘FצY9܋liՌ I(:\7xUF,@d$ Q#|"?܌ЮaLހ3 %%.4bj,Á!x06$7܁6'uz$9Z51!e`4K!fTYg)/U@! buUp= ޭ1C^'i# &/dw|gGs_e7p6 .[ `f|wƌ&ns]C?x\@ͣy){jSs9|(VK_`v\(\d5[UnZd_C){I8<i> Ci%ӚH>~}0|ʃ ^^L_dXZLДydTl3&4fB` TK|,ծ^R1%LVjҾw,gPc^1-Κ(&RO% i! jbr&4Ny}ћ.Ǎ[1豎bF)qyYI]jQ#ՔԔXF-Cr߂"''LCǏD9}TZB&[ e~ɷ@  C8yuE|ds.aרu5]LKzi- <􅽠EcnU"i C1" ۹:^3zv)U_WEod NEaXWAXS/g坊2Ӣw? nFuVxk[/ji4S97QY_r-Vs5PQ=znh7w\>P98zoQULXw53w&wpiqG}V.1{*ެ(@pWE+󭽱D.bd+GA#5a~l$<+&K)@'{RB,9s"}]X]6~glsz;@!H/l#ۭ0Pj_m0=~sǕUIaCCDѾly`}>Wo۩DquR ڒ#]f{&AXTZG< qYD\.Dt'D݀͆?ب&9\g"]=*r7뷎Bv5%6:5`Jgڟ#,ϼmyG:XQg:AFeC60`CmnxV [T&8oϒo t g3٤]CyD61 wȻqS9wZƅR%'^PBL hl_|ߖcZ`pw d-_?-3jhDW{e]?w&/3](fGםh66j#|mz:w}3و?F!s`(b+1Q`8!]mg f.oW"&!OyAr J5q-|},!Uy#6OKdeI.2.;r"IJHOέ^ PIpdOY.Ie9I ި *S+20[%p0#K@6H'^!(kCҽz`غ ,>` MP4~=S%V<%i8 "]:9-3/:.hXZƾ\q̦i.t9(4WJBznlj&%kaAF ` D}[Ot1dq?סgA x8:X%`#Ԍ^ (oҏUd7 I#T '~SѢgz>U"/ubyṿZZ,Ddswe<[>8,?FRғWfR }fʴxv*l2; {0A9DLyJoesj!0cJǪ9;fI-bU1YFatЏ ׫]yZ)iܔ4Y4E'g؜658pLeXÈ!'7Zpőyp^ǎ+-BP|@ư\aOlƿ~uǘ5ӱ]:|<δ6 Dz֮!>%Q2{4:)b'ܨYXp:9i(uo~w.n$1xQJ Аߗx5(]kW2 ΅[+2gᎨ H zۤ I)B#IuU8,mȀѺM5rf~rf]2\X&U3%oHnۑZ)yx^Zx?wl6ʑ?:QFь++-;ޗh^tĦ5Eޅl MMɨWc O>LY=єV )ɦw[_B$q#0!SimYPf'qpt%Εab&j(CӂAw\xUKT:-"|tTb@iwt6F !OV_)646$Uzl>xf|1MaXTM)=[ Uh2,,]i‘I"{92_d`ᖔ=fp>r0q#LhB(v95yf ٮWrj `?YTB#IlQ*`&珀/HIzFnCo,3X+x  T-`aKEڷ= ZW=K5Ҹ3Ms'PAB4jszqҭޅ"'{)VPJq̺N'MZLöXvxZl"HSزE n"/ct )wnmźN<4ᄕ a] IRݓ5{H͹.$R7_lb1#д>HW|*Heyh5`29 =dւk8oĐd"hD^f܈PC#ZgJ-oBz #<X7ҥ|7b5ߛyfCl+|3{i;EkhKCXǁ /#\>Jہq N=c'cGҵ9KXvF'FA1m,'CG {R] v_8nn$1J J@ Z|Qݹh2U. cj+tz4#i .?LdInC6߉;J;2٠=Sk>в$mQq51V̈́!P(1"4q`QNGBRO& ,P'Q#P#:79SayC}U" 5bPݯ)0ͩɾqBiWXcggp?GN{4j*m/͡E3VIR|y 34#cDq"R1w "7H8uHaEXO\EQӓ|͛{8*}0lA)UisQˮ|at*QҬtLEz>1+1]_0 'U X#DLl!,r]ǐjp/&bp(s00p.ᒺ8,V`(螦Տ)y~!G@-{,Zp.J8籜)٭.$; EXLj\lKkz2Y$1M!' <p6cPuc9:xE`"#Y* KAnyN%?T@DFZiBIXhrE岒}:Jך%^>X!srb^\ޮ['v<#wE@P\I0?.m<!?;[+(?2#:&@ⲫ[˴l>M nBJΗM4AveJ6*yHjnCofc HQP }h= atZ:R&ILݴne/T'6&Iি^'[L^ל Ҡ@}8G=Q#SLv#AsMu`Ł%Ş&&/aۭ堤93e;q W8DW OZ#6Z\7כS4 KEjU=e 1¦Tƴm|sj@QeD ٳ~ q:g7㜓ªPj9 TY`ݖʆΖhze?JJv Ǽg3@9Y1Zn.-WH|mmV'B-it-*-#@T$ŧf=?j1[h_,ժQR @Vr8i4ю8ZliG}nP'ҟ<oDZj ;$cpk'yN*hI +-iCm2R#x*&o$r߲[w 9ZItkkд/%>.oIq˕v^]HI4I /<|Mfy$p0֗jKv;IgQB VG/iQR[Mڰq\(`I/biw0ppq%O:MII}P߭:lCpA*l.~n4` S[q8o'lHU/$/X)KaJI{ Sq2gUE:F{d6r(QhvqRa Cmb܃JL U5[AD)\NO:+iH@\lzm܌ pr7_KzW>N!;ssE,`iX΀ b'g[cmf-^4 t ə#Et@D7:>,93/O:9yO2s?mcȨJ7GՕϐiNOdv▀`۶$LY6I[lkvY9Ue1߳@V{B*&j)Cҵ><0;THG?!Eqprcb( ZπY'f#qeP`FI݁>pFQvi ;cq ة&7KK\:+2[u+ uk8wa ۦf+׈((#!.jg0L9o &"s0n˽P62'xA{ī5WBp=q'C[Ы`&6sB56˭ŽVW`=٪XˈQNX1Am#BiQaK Rc"1[ Htc5LuPɋ{2Oikv/AH-27qá%B^Huҝ), B^)O1U k6.0شr(:um;!1L='W9m}PQ$VQ9U4@^QLd/'0ߠ -//A7I(z@M̊ye.! :96Y= SVMg X_Viݤʶhʟ%pzxI ϙf54VIO &f ~yk`:wFN^ߴn$D>\o~Bb|bJ}{05ND@[ HJ)O!~A Y+ w-J|@X= kҭeM>M1яnoXCm""_%ZpϸuAfZ<5?J+m  yef"aoIQqC9v󸵖!WDRAДC|[( 50Z#*pciT꧍K2TUvPՈiI3Im~֝RXܷ΍1x& /L̹:{!ж惋ձ|\mNh-"w9DZ|͓7/ Zu'-^\* K"(z lt՟kx2qK;oQ35bfHEՃN7fS}X %e"oE3&p]blruW͐/R' >O(D'_.y a}E'zbLu:y/r!B$Ͱ[-D@И>1yҦ_1 -ÇAz{ŶYc|N1 ѩ=vሯ֭oC|Vjilxs'㒒G-6y,"|gp7.{Ol.fjUxR>ez]4&#XuF m>m5pgoGε&!,#^: Y.E8HL!5ܨ|:S($v"}1PݦWR1E&Wczi #HHiC/o `q~>;vjWn9kE8+ l, {yF:xX*}5ZzyzH_}z̴ QW pY\Z*F"EuEoC_,%)f hj~_*񆒎pm{mnppg(SN"4u Kw|C_Aic{z,آxu>d;#\r!i//ޮ;@ S;γ16e˧*}lƜ2 mA>5lPd  o=.[7kdh2+$T F6G=|PJEDd#E x#vdʴ'X"jI!nYn.t>q%"_J~ SzzMcAɎ3q81{lR0+NXCW-$os! fx qQ 4U )^e]w-:n웥HT^5mldTnb 9K.8 nXZg0F(c{=3_y_Y"ે Bq0Ѱb~\@UƑ>}/}o:5ܱ#*yp<3<O. Nt«iͿ_'sx0 VnTf*sOrj>UIOkcxVZ-Vp:9&{8@ lޏQa/[*o.{?U!]D:Q}5Bi$βv9Dn^䝢lV͟SfAt7ľ!phN ," o-0izEO@ g30Rͻf@D\E$l Δڞg #0$˪i&#-F*^[?17L)iuc&7]d'j˻V&/o_pԙ݌y"l}P}D.y !;۩J$"qwُPS @imB(bvhz%`]~՝##L)vʷ 1}{fR*"&6_(R6rT`{֌u*j˩BYޟ;ϰsG4"DP,1y iL$mf}xA9]_|6U֭؜Dj1->`כP~/k?SɼrV$SʰH-DnaɍGَ ٗ7I >+Å%<-xViu&cmXEO".zWZ DI\ C3:tR=4bA]4)g 'i/@_iVy(rU ϔfs;Rlf;^>4K=LY7ºhǰk lr-%voi~;R;@SيmMiu7?V#W55z'YL-5EDTSȺHksWv=`6\׽d;h {8ۥo+R0fa K.5 '= GW\ԱEOQI(kr N2]A3~w=vqዏtu+\:/& n}y eBҕ^iϖCbY[6įCSz}U7mQ$#:UOm0ТXx&JpvBrޙu\ezs$r XKpY" ZV$VXhrѵM\##]iLp=@A&@_#0aos^Jz0qkӔn{g!P=6 ӻU|Ld2]`xnېG!9#p,:>i$LHN%_*{cgWrHUaqɹ$/K}[5a{{ \pC6AeX96rbmڟw$ĒX KzKUyOIŪvmtW^)A+X\&%5OZ+$ }l4{HݩCL(p@U^X$Ud^Z~-gCo8Npi0:gLFӻTChxeNn&GT>I[\ɲWz)J5,?>έs3|_aipwZm"*s;#b̌\▬-@P<2$yF#@խùa;p\#:#V6h갅 Ai͌_4n |'#E{jf@?GD#@ qJ9We U^AYJKUqe&5ρב  aC ]‡gH rE:oo.Ib1x a1-V-^j&'@cvbKWi'8e FȎc| -kBdؗk KUn12d.F3`ݺK+w_Ԉտ V4D}D`ϴ%>Sk{3-}:)a4n̗e%q/x9X>^ˌbC€br7,ޖ(1Tկ?JN-ANnz9A;u>J-HWm!$e\44*~OXs\wq7?i tSSQ:wgi5Xï*8M:dvϓQ>~sVuz Q' /0bM[b׬.ͺM5k;{<Đm.`/'0#izPDׅu 2w abp/}e7H@go&BS< vQUM/Q:ٛ|̜_f3g4~ (-'ڣ, 2=z9Ʋ4N GP]h/΀rzC.XRKi:1Ƌ8smώ~͕SQx*#K=e"9ߕLAqf)RU,_)jۺ@,emQ@8,ĚfL1Fo87/ؒ 4vVv᜶I >.syNX%o&sb?*u#irHxF)sdK$̾U/^č^j܎3J@bΠF/b14@WV` "FeL ( agMоݴods -Nk[9} &)}~:wFy?ME+) c俒!Ovː﹓{wL.\Ŝ Es[/\W;m)* (?Xhl 6ٲYG<%Ɏ/~:cJWA~h-d<Ǯ΍x}A9c( ɾ">?/nF (gP)=vP?Qa%dhyLz[ 畓VnV|F۫5NY ƒwӶOes~EI!y@/Uk]N0-`$f7܏,kN(5#U2Z|&S*p8n#ScN=`?Z)9<^`E!Wn}W}ΤY{^aE7guݵbO,-o.aלa*Fڎ+Z-~ccF!0>X =-P4-Y&{(F3xz !3w9 ?h!!U_; F@2fLq-}woZDi)sTPJܓ.#Y}45?*!ȲCKe\Z֝컭(x u S(XWPܚ*@+ ڑ P2O+<ĄPߛa?2(yܵWւg/E32QNF)LO훆ZӣmaJvœʙ9/ kRtޫZ'A7tG!f=E ^@~C|l?PPr'ZJ![ԅh@dV8߅wzBkshMy2# &'W%<;=BkC -7KLiV_νXũ̈6*ƿA/ا%D/? X.P<)<[暎a0$do %KqĄjCwqET wFbbmO ~-T=kꯏc %vSi@cwXl^ӆn.c* </i윖 ℻&):_C+LiAq塤62(yN‡BE/`3|c>iP_stC lT}?|p^ϟ/=%t:&goP@X(ٚfv丬xq#ǂyyY} uqR%nb!e~".Ks q:%3'&@T}ZO[H4p y:"YXȍqLごP=_o] e ]*5h~x Ƕ:Lޕ#''~ +,^xҞYy}T '#Kw*!{Tz`!>3E X-Y˧L iنS4qGK5ʬb껪0ߗ_gO& SњK|̂M1PT,=p^r6'ZsMx3S.Z&g|^0YR4hFɲ#Rz1q옪L R^Q.ȃ;ԬfIuE,֍5ڬUwD Ea0!>tI99ej`J3]v >eM7ZOH<=SHp)HHu\=wpuüZ'ֽ2ʣ:[6\}JًӃYuvdSfʱ7hx)5I V(=o {qɶRU2\vMJ|FHfR`s'喦m7`b i=98_ne/qR{NeVV9nHMS @2PoYk7/6E?uTV}LҧfqfG"& (i΄6/=]=-=Dr!J28GOh 5QHp%C[4{)>;7Z2 -ރ؃WvϒIKWjGn}7y|wm]QmY6t?MHc%+ vP1ب:HH '0&=‡wuerQm V{v3{D00Qy4U 9Rg'iU OJHĂG4&FV gUIA <%v=^JWY&ZVK'` o5-YdAz]xHZ6$3G({Yhk߃P1Q+"@'^ xOXݕU`Vwck̦6sÉ_י t<1oпڮD!xc}To!|+EkYٻ}y0 $K<`fmnDhu-X7+څS7PCq7w) {3{nʞ\dr|F ՁB_jfkI\bЛ.2ÃxSE`IFLN~~(Yb.*a{sF j˴m#!9Tڐ)\r"34@*cIC}H٧5NYcw%ʹFJIe&D@h@)w* } 靔Sy i}aڳFp#.tyvsHON#O8o358&.sZ JghD򔩑yĂˡV8(Bܫ4,$sO(>#2^EvQ$.)6 2W̭|[ra,=ɘrr9;{/r K|jL3 t OZ;yXv"y On|2;}֢!~q mm $=E`.A$'&U+/a9 f )DZɿ_ȔcG9U 6p.J i6e8sELNo^1&> *}۸gD|-j h ! &S$hdW;[K_[v(6_;! F&10Õ8du=XxhЃב4ait=u('ETה9kaxybD1AMJG/ Jw` J+ob36dc"f# M9S$5ީYrN߆\\d>ϸ}QNR>=+YDlq&MGI*d՘cW˷3[CcK!͏PvX;ʹ.ĵNinR_5.-Q㑋7;_=U=w+UoEIo"#1/t8j nʲ0LT/0U9"ex?HvQStΘXrU:UT6O]?a] [>5jbQ" ֞*,;30C>a!&ѻš^G(W|d(yj :]Z`ex-7 ]Iw3JJ*< A`Uu\=HBx4[_IP!etăP;|]ru4't^P-j:_(Z]u\iKΕk ݑxK+Jp.zi'#`f` y?/KޙEô04ۍ~)Z+Bр|{omn٭i08E@#+ jʎ<'{!iݍDmR;62?,9$L3i5 R8 dөt20' &#XglD}[DZv}'>&b4B7ik6wMwS`ؖ\0A-Qcdrkduah5XNkነ|=S*z_h<+8dXdU2?cĢmZlgnDZHŋ-/y)CDž6{CN-e5VC8R:)%H?t7WiJѢGcf98fTR@0aMhIfiS}fS])> GDp/ !&"corZxxʥzqWu.ȧ)PvЌAA3c{Dd =rꕎe1^PE;ef5$YYÀ, rMlT/*2-954 `t)9Eյ7YѯmoecmrjŴ+1K flA*W" ֔D@PGG_0*- @ؽ=a!&c1U` 6̙g\)f̐/cnzsG\tv"h4`I[Nua >@=ſIsl"R ب=멟U߾!]x\^ TްZL,11d/*~P1&06;ݷ*YRtF4]ƶ:2%)2D\K:r<} HlUL675`4ֻqPp./m*H' ̬ 08FE~3SGp#"n89L:{H>3AryWp] ) [H~ `|Lk}wx?+wS ;.7) NZ+EJ0fb6*1F=9/~|?$d,VxPFwN" _&2B*ojN!߁[9^A)K#bI;{m7Ai@pK7Hi)tAȰ_)!yGÅ~E&li/ qu{EL=7a2^_u(+u_z]EϸI^U9a&6oh_/cs"( 1aN푡2߷Qyc9҄mѐ߿~0\v۳HKZiԩK7yQٰ"} (W-2-Π?K%'q$jLfqsn-UX'0B@Ynr&6qQ39ހы}/ؕVߣ)nV < p#z4 `__bt w|˳4QT971 #m)&@p *&1F6Zr %"& @(Cχi'fJT|I2)gUA_"gâaݱ|#Śnft1U( !"T^+=v[={ ]\{8t\ҥ=t)J Wяǝ`Gzsk#9^IH $ ە=$k^? %9Qu\7OhDȤRWmLmK55)$ͱgmOs) (΃(wzN#8~i EQf<L1%!*#Ek*gq8,i.UOkb1־h͔`7kQz2NJ'xٮCX2$W BM[q^)gn|ah2ډǣ㕺ARP `#x)^Ӥ2|/r7KE+sW(X \ʗ&ϹnEbGkY( ʍF߯\gwުlLW. j}ncE ^ư`KXdu?Qlxb-҉r״e;Mj?b(*2<@%tt?iF5G9|vf=ғ0~ s~~!JpMS; 6%#m/#$"lse'~:ϣgӟSTD593_ڣeľD ]1=; ӧK%Hliܸ_'{ɡ8QZ%2?Y1JSNhqi\=抮媎x%`Rwr9c] HJfE dL2+;k'24Wa0+CE7N ~čRbU.mF}m,M3A{ o]I1dl& ^WɦU$rR܄L@=;S6%/jV"lKfs{u lĬ~=uduu¦)hT.OD~+U,H%\.vzw# kF G cuI{{VHw-[LQ;TN9#S mLM`fFtt=U\ߛEvSS_B$Mf%*tWƁG/@I}m0: HKKصLr7[7?] ")ܡar嫯 11>+H %݋kyP* ˠeW3rgNj4XCu 4WdZR97*^ 'J$^(<!@YkNZ(ǬLFY"#E@< zwLE'tiVpP[z$3Len: KɽQKRċlM2@oӸ8OW>:rwr XLaTC7ǘA) +9oNƣg[6O$ӒDIJL[E$6/Y~[(/0~fMw-}\3MOU KƃsiGrJU,( 3SsW&+ھ zw`OM5/Ik>ȋD`u?(au~M&DZ8pHs (&OJu, q̈́?s>~=u&^2՟&Їא &[4;$\?2ecG(G[TOyي2,aaE؝HG9zq`a )e*l Ү,R~ffNA}1X1i9%(_IyXm*C|ITY¹9іRT+sx ϑcQluݘt {m)r#$(- lx՞V"b |]vr `U&'VB׮!-b9UC IҗFܗJLk>N֌ѢIB^\~;NW$ M]iK1e ̕ !`4irěaDõRd.OHn&{U ck5 VQ*+ΤJ|_i1o^ielyd3$,0]X Y(Wr+טKsD\F<$y:yhv[mA-DFHg]&=HzEH/e/qQէ/% :ؘr9ࡉ"K P6 nm7q4 ))95NmJ3 mj4Y D JS4CT@2Q掁=%=0PЇmLjzc6#dq&|IO.gpn>C+&^U5ES/U;lA66R11˖36v!Fo`y1)kQ9M$#@{>s9)tY,L܇UY_'*v?GytyDcw'ZƑ60!bK<|HTaB}Z:3xvBtt:M}ˊ Fc50el?Emug g]fƂwD~o@$#>6lsU]opn<ۈ*"#kCr1+ B؏q(/JˌQG(X?Pj*.ȐUDH bm uEg*Pu~RyT¿-*/ͷ9Ug?fA߅k~H5ֈ İ+2 }tPQ٥'U uUL,Hj;"$p.rJ2B}ZPR-Mn8_W}CAץ҄zhvuNהʘ:uôjo`:'t/W5 sh`"0@Y)vR^w5s|țYyW9\Ig{dB`7Z^`P|F%`c6-zżҸމ%C#St>㝐q>bz!ٛa:1߾3wi=]GKgSk0-56(ÔNgXhJj9v8F61dW%3~" \yeæŎmI+*SSY(l2ƙv3BɔNzd瑳V'_3@Y ~jLrUiZ`c,+OOieeo-HBzWx)q'-3 >?Aؐr[2N`Ҁ9e`Cbޞ.sHN4L;,`[1D18L:]V͖}y=ô'/tfHW9~ApE|5qHY0 n5ԋ哏*0)u~v wS++ئ'<z((W$mo̸ +Fw^(݈pSk7PVC{@@ߟ]elSཟ~LJܼ퀑v+4W&nЀ6POrR9'a[ '#;7kaO+Mr$REv<gR6xy]?0*D _ᰫ)F!=ȯ,;[`Lݬ~lȝb|Mľ8=]N!C$&Zs:\N C!RQ57q<K # ,.Y<@;ܱ<-V#A &? 3aE^GXy(f`GZ`4%юu y#\q H؞6F Hw^"Ziui+.s}axaEAUﴥ0QWW@lV]BaIotjI=#&=OYjWG +vmZ?!TwZ Dr! ?kMrhv,JB#Um:g,a|  B;GwhZ拜l& Y^!`~ll= |[oU 2T/G. y$AmbfF{ϦnV51Ե- I҃ {7LO@:_qGC3iŬ3Ώ}v!?՚R`gނ0G Ae7IHQyy6cjho-Æ8p@{X~w͸AI#"W|B>3t$?L8 Vhryn$rPٮd1:Hgt:h@֚$x7Z8O+5 j/ pQ/`xPlvHb_fk]l ]2Xk[ldc}ف ΋ڻ' pDz2keK×ymuB)& NfY + _AXRP Å|AZERk" ?087tD@ۉ/dtvO]@3+ݍ5m.b9dK vԾ( E!ue ^'m" N> A\TCd閶ȬJm S[N?IO+;ZDs:N7 W(8{ۺ̍Jmbȡv +ɤI*ֺtFcYCF"[Z,8xeBBVl/v2F_Ͻk8e Þ< 2}t gSSi֞Y,$k fOrm 0[Ca=iC#u, 3t;;zt`S;f<г2|`J+Τ584c2C:<_ikq@AhJy` @[(9D6tfrV iMi5?I+ B:霉1CN D\2W( R#€9K Km@U[J0dˎå}P K~[z߸K;4 =_,`DnjM1 zs%{k,G H۹zDCa'=6HI+^AqKr[E8ӑ:?P[ ? F7iߘ?z4:z/ \wcDl.0IS')tk/Ωh|0Oܸ N;3ؤj &jN 3Sa/g:2{~2G5|z@(`"Aj/|=@bD"+L߅_Q J|"R.dwք3Ɏ=rEI=I7fg;(-׈36+C..OOڂqǕ;|Ql i"8ҥܢmu[d,u_v DZUnWBrL@TLSJ|㙐KEiK‰# fuYvd,e |>+̌;YeA\JmD{-b#Η;Ϙ+VyWZ7Q-xoObxN Kէi:i0F.f+5DCP1 x+wq29<~ZӉ|NjV%luEe P'M7]6Y N4JV'WNDߏZǚn?Sg~Wwp>  z<{i0ռxCI@y%6HLʞfiAʓtOf%4gh iN/ԌTiъM _ZK:EF)_;} [KmP?蔙b3Y_LuCF w)[# AYR@3BvQ#N؁<|&dOӳ=LZ_3Qa zƵm-uZJ92t4E(m.m# n z?o&bnЧtѼxeIEs\@lQӊsh|E1.K,1 f/pCIcW^ϕ1ŏsɂpQ.[z@\OE2zr|K܌~?oXk24pZeo,+vmpJ{tp%AKԴ,CrOGwE) |o>3)- &;^=*28 sw/{)Ue;!,pN RH6ϷQ+H}AJXJ@GL /?\;Mt ~xiMITZZ)d6$@qSU5`Ľ`W_K!2v2V~oa`{)? ca_^b8k 4$N "\{HkԯHz&r`sy~E7w7(UfF&󗗲]O0O6C|U%ٳXP mE_7ENe>UbD]S( Ŕ]Yxߖ (܋~e`_I.كQXlt&]4 ̵C4L13vލ}IAd-`M}/RƂ.aQx-93}ta+q,Oڮ{>eF ]mDrV+]Kb/k4Sɬ^1n\1P3.(]#mDkRu|gDğKe]hΉԯ=90P{m*ǀcK_|4)VBnS-j6keFAGRitw)n?tbVh}HܓjXxd!6FhaU]&biP2v5 g5hdu+So}rq kAtjV9ܓF%(rkgYXD0Hh?AQX^eP 3m2%&S)I,evؒg~Op.#:!?L~-D[%mdcM5v3{b:K| hKK/hy[_@[ beJ$^"%l4rjގZE`5B#<;~Q?y5glP󏹹ow_,!\֦Ř`Tq?y<;Z FVJo-tfќx':ĩY4zo~EȋjzSto%2Z!ͤH vo^UHB F잶6r#j~`jM#]q v#}?}p _A#dn! V3 N#ŋ8"|XҦW\vkpVF}IM¶1t7 "b2"JӉ£뤙'IǥXU`L4*eF< `\ږ:#E o$ЫdwN'U#D-hC^*&Ḓ B?/m. GXZsЄ!6u}AioSrIQTɐXReEާ]kGLZx}J&e Pri@@E^|w_ J[Bħ8؊¬rJӳXLmK9r &TAix_vz{U^:x5z BE/A۩R^ΥK\do,U;9e-Lx"W\4'[4H ^{1 H連?w>ys Up ZQ20M#DGXʗ%ObexK`g5y3Ě Z;vػ{K'4C:VB-@l#PqРV+9{9Gxݦ'W3{~mC\v 'B.q,hv;.6dB+*FUF4e'P};NyZFMc,;YcL d`Y YhxzT칌%*ء*m5gЍ֏ͩ/Sy!  Z͢zⶣԈ0=+mR&h>>MԕUW'tjIXF}[tciE܍YYjeBiaBj)#XHDB`xN|4E_MvZ4'xVPLЙ^R;{ ˟< ~JqS8h6h0,?$q~imd2*ٻtMff[TG6CboeEBnʨu>fӺ&BIYL"T)-ؼSq#/4G;<#mQ^_JycKYFv}7HVT+lc7H%6؁a=Qܑi5d\cX%Y=%L7TƩr؀g?8١$LqɀK@f 32 XŮ!~?[Ŷs`pC%s _k+ ]^)HVQMe ;~%9 xX jY`)|֙l}%Dp򄻻Xϸvj( j2\PYxDO>½y]#Y$ͤ`78\󠸘fBV^kqdsey]`~س<#{Ip( l1 <8ԮZP;X\%򮓊)Ҿ8 .@".s<˹|)}F['Iеiwks vMEѓRq&:0gʏwy20#~a'E#5Z0LXyϱTM7ԆY$ .m7D$8'<̻f5782N?l:@CtD"RSNkij5ErRUE^.HbUg5yaXiFCҐUMFl̘ {Y;E9#bM D{A8̉|bid08 i|Tt`Gu9нGB"Gs/`Fblm6XD$c ǻ-}}Ns_dv ϯ/(}6/+{_/B?T4iYiB'ou {7Yzu=~$ de/,=Z9KL.& exwq/&ĎuUuckн3H'վ=^{?47ΥD@@c$sNYPHҫmͭG7{j*N("t)WSkvEt2xE=FOd:anFęCBLG)n0 zFKI*϶75R"fF"#\1ܹrċ90ӕT胳1PUŴVΞ4|LU @^`\q4[ !36GpY=P- NKTp+nI _خPj8$Sm):n1S)3'^ lL3H^ Ow1XJIn {v#X}qF:>f6PNgd M_ߒ˝,vYyԧtzi^x1T,XSӿmu1X9s&+Dn<J"/a0Ԭ ѧTRvs?G? 9-zAFihѷFcW-csvAk\_ȗ(_V+PHl'5wLk8(!ҀKx||GȨ3,$yF=([5 4O: 8/FMkZQ K~y"~* XS4͙+P`]ĵT WsD~BV̂, =7:gG_2fd" 0~!,xJDQ=* s[ $K~sPyȣ_ 1Y龴eaTFlʲS/#u끚[i )8*25휟D5'j}'m+AiY֗#dYTʰFHu,B( ]0iӫc $?}9+EKq| pnma](දhC w1JX~En}h{iY#CXSKЋUaWmy%9y,4lmt zq&UͽztT5b9]bEYl/L?ޝ2[6T6*馗 "b\7?n&ͳ[+,Bc+ CϴZ]6PGLZ=(+Btݞ˘J[?Oѵڊ=aPu =gX4Z|:"u[rQ2]N{XA-M*[E6'0n$ħ1ʛzbsh(Ifms  ԓtV'۲9gW7LND1eۏ^@>聓-H)To3USW Oգ˖z=)//)!w5eC v?9m6\z˭QdfmMGJaWc 9uXOuIOO^SBqnw'l:*_)*߭xNk~hm HꏠP>O&A\<&~'s}qDΣ7D}f#}C;y ?tTR?!'K2 Z-뮅ZL58U>?ݕ[rCz-r 3(EA}}h2rm9nǁVx^bx*`sW)d5Wf*|A l,eՠOƯ1k:MBYڍR\;}0 m6lہ\͸,k&hs.R\"ALt25Dz62 Ȃd O:,u=#V]>?^Hv ~E22RϾ0$I` eGy&Z rO|~2C3}=Px(MnГdIyF Wv }DZKMe+ͪQYfl(TuI;`ԟ0d)c }>1Q tJc8R=,rɚR+~ Z vҟQ뢮!d{SAiH!?,$3MĐO1.∍CGP۫e&M>m6XE+N6,=@TmlyeyV3 'ВùSę}?A VN@4=$BDPo\Ү-)vP< H= e}^\"r"qTM 6:+Pr]Y#Y8~-x dI)MC+?[es-^zw.CGSϻŋ ߴHj,7_dsTT^p0fUx YY:OP8(kZHOZ 4d2[aAREу˛t5 g`ɃIamU$Db}|aoYhQSJvWA->jt(?-(ۧY7G˩Wȉ#=]s=sꡂ'&T"vVV8go$ᄑ֦>x} B zN!Vb|Q|8vMJո+NsWhq#t ;q[{V}>ƳJi'<@L{*GaH#V=@UKc[8e۩ v|8)3DQYaEˍ4oG~a:baM>[sno0Gj%ύuebl̑nY{,=F'SA078,rsے)H/P?ה@l™0>> }{N՟vިΓTIb `O䩱FQH51L߰ʤ8b$jwS鵣MCDE: S\e\ԄSpGRBNr6st)LS))M> CyEVꄲt'h: ޺hBmx`A㌞# "L\~H^q&b_CSUenР/ CfV'!WK9+õEb-tvgrP?Q<tT(FI19!I:P>!O\3ԊD\hou`UjX_;NavVuH'CnN՟rgp- gTLr!.ת7Ƶ友ٗ'*ޣ+}eJF^\PISw89Zgbw>O=0^^};jg9v(SZ?S/j>C=d*Z ᶔII;LwL;8r4q3HI=(,5ڭq`y'G:AvKӁA˖oKKXPjs`/ -e_D\L+wDiuLQmhR{|%oV0/6>n5  rހ'= A4#- +G-#w3v8*f>(h!vfgԃڌ.E5X]0"k;-N`]#S0+> ɩ+`-s{}X#6K M%iу4+ͬVnf>]u^0teg9FAU w~ 9Ub{;h亍Ő[,1Anc&g$9|fiiZtC1䤿t4?xmvQm]k7L&+L׸S9;sJaWkR r;P-(o+eeSw<0MjR)Dt Y~)!zoTr[5h?(qȜS 6p?-R@ZEt~x֟xΥ pi=ޮMhiqϨ esrr7c@-cJ#ʘjU, _;ܪӵ&yֶN|Fڷ>{Y*3sZa'pQQ,$nRک9W+l9ɢrVB8\7lāe -i;֤"pj_‹2:kEG`a/I1߮ڏH\$rN P ^ ؍>Khp- /D[PBRCTBl~u%zI5E1I6V{ zC8l";Q6lJʯo -auծ<_E˛AL4k'Ԩzt C{Y۟,RBD1>%.$Q ˳0  A3 _$<ԡ&/(nimE*)^clz]J2i F3xsNl//4 /wt8fy !rЧ2ha.&e I -e;B*+WFh8Xo=M8Y'8G?*!5tF(NV&{w״cqп`<>!_p#}P$ۿ / kƒmo (6f{K5L&~:'AZr/-=7Ǻ<&?<9JP%H\]Ns~'X6{%*6C)|*5AG=x\T'pō_3TrX<|pm#S8krp=LH!yqew4E0-#[dNH v!Lg,"Y!QkBw072pz^P1;q* o-DxqO6Zx(88IrzHeʶcsP=NAOM @N.J &pV[z$YB{Ĝ4T$wcD}Q! Mjte|*Ž1EA;]L`h_,)_Y!D41C{Cl9i$=8 _Vi;qMj_(cmqI^4rqͲz/sA`~N)V'I51`f9G^FtCI3 /eJş'~rUUw%[ I MZ)5v_K+Y>XHj{*@%Ѭ(ޚ>5)5ђ|p5d $y@ ~+ALHh22ѨPJq{+&W\Ndܭuव0D` >:kCyer'P~3˴D"3i(. `w#O{tw "> ,eoDYy`gل05P2rru'#"DP K +[ lUie] ŀvK/;ؐQHUGGt?ɮ%jXRNҡގh^囻WΆ\#UթBdazJ^)ApJ -2IxpQQ֣>߮v ̬?v'K45_d`Qp= U49OL&uc eDE#QP'+ۮ,y$UɿWw*XHb4IӹweXN" Yy0iM~"t1voψxOT99@ڷm&.0(` dLP#L%2ƿeph#ے0"g}{XP@x\Z;-/2EwX7:R>PSIK!}%#;[Sa#ZD.{zI6DMO! ⹖'-=_\I1oC}I̥Am&'gY/|}:5:榿:, Ӟˮf!`),VP-pdYV3n Zzm}^~m]*o6o̖!RGfX3 CCc˴&͎yyMNc|2Mi VhdHf۹],nM"W,3/i 4o4V1ԡ!:ÌMiZB΢ҚbcC< wEKHV42NRU U2wy+u#|ATAC h:\|kgͣ~鑒>2Dsms Cq>eyCpW:anR̬ۡF kW^1los"s-j2~Ͳ =_[2= 8/۪E+a8X|JhA}ݟDX#`F˱e)iߎz2ut&:zS% X Ь/8CRܱ\zĔ/B;U1A= f l BGL#'Q g٠fr<r$Sqܔ_ʵvvL?ĥ 3"l=98'A9bU tm*IOYXZQ6{>ⶒ%D"`T LhJ/T3K!V#T`~Ў0Zٝᙇav ɒO6u{.,D" e\O6, oe_!PgW:HHXa1r[&)9\:$i@qcÉ@_?=ܳy^F]9i[W^!Yqkr@㏑H D4C`hgԻP:pr5mځ#E{ ,>|U])2߇Hey-*D'/T"=\ʛ[B u m:n ?Yy {j (-00.&C*T!SwR6,&ɱ)<]l!,F@]qK~c>DŔጮ zJPHơ߀4Pu3 f^XƙV 1٥`1NJ> >fW|raO@psMCAWdqO6γ 3jUg_u' p6i"v0~H('{B0sP)\)C0=#" H](t[LeDz%\ru_0_ѓ(gr{kN2Pg[%Bhd+ʝiMmf59fnfHnѐ`?@OZ!>iڃ`jNf7sjH]̄㼉 *͢cep]TdJ=}P_X8{rIuTX`L9G05Hp3,H%d+r8Пc ):?mF#R?CeD45iuḑAk1,ߤ{tX i8GR\sT9Ť1m(w!whyqe34y?ґ]JƲ$Fi-ܶR?UMI)'ܛZIؿ#f< 2tة3Ex+Yk,.#꓊7Lceb[qc5V>TI3'%2qW0#ֺ*UFyj x3v56T"(sғuGˎ +c5^Ɓ*eáArUiIm ha:θ](*")Jː/ vX2@$MDk_]0FbۮG{o&O.>=v>O#Nv.M_;6lW~Mi\aiW5#8v',‘ Y̱Ѓ)Sɿ*|%FW:0ɋX\UTyV?82߸^gQdŊ rfŖ3hv~'uK&g:UlVȦS9hϭiX_/By7yHAAB_cФs#\x]}^'4SV>jZ}ya~%" >]Au{0?ݐ~A e\dnn?yYlhJV%bp` JrA2n"GޥUPi^ȭw%qH j:#ӂ^4v谪RE,^EIZ/mjr;[g݅J6(:ޕ&ހ;mMt#@ *FRnal֦69[ÚIxeՄ8P37R^T؟,h(xAo5$V΢gl_5e6;=k2pU'H"߯eڴ^+SG_@NR/[OREz Wm10N^6MzZ7hfd;nxšIuu28-ph8f'2fB%]EP!n+[|U2vD)cL)q&TvY^&1oTBᓨw!< g<:D$p-L(#F}7I5eeNoڱYPhPWEG6,я^sM9NL|꓾;e9 DO^p CHRu`=0(v*a!.nߺJ4؜]?'vKV(FD .::j}l\/w!U8Ӓkh,BAnmٍњ*xo OXwJ"}&dlTb*MTzdMA33%+zg!kYG/x]7lqT裧2vn%}c6YDESl-QU仯URA?Z> X{ @oC*!-aʘk`+Z;Y6K)JC ߺ5ͬkyL T&<=&_uqjbp=rJu$H$G-IJF/gZDF ,)Rf׌^J'{ nJMeun;o{/Pͭylȥc'>!bJ4F+y5\e-ՌkOE΍v*)MQ3vX Jlj P}U ``g]@j|[OPs\!1? Q D$1O| y s=t{P$NlԼq7:k mQ6sqM#1p`C=B*:0U9tC>V?կ0iFsQD~ڈIH5Z5@SiS}Մ[oJmi|l]By';rTh6Gj]aiG 7 mqGnD ͪW\^lm|Il|MEYl}C NTY4y6āTDbU̍f_HQg D$k9@3#hX[,׳n2SnGo 7c/XfpYʇ(Kcgۈn\Bq%gz,a0F:ze @5/lZU̻c:Z ȒKL~Ycի[s'y15V4BNJzͷiwUQG~|_A?SUVF7^WkI!fP[;rmB=& d$9f;ZTı&XrMxNhQ(z*]8wM7Ϫٵy@)њyl&O,²xl'pۡܺyϩ7dPk!iiGZ$u_}8ô4:HOFӃFOw7<,e})asʊI_*{ cY!ogv]#6ҵKRZǧKmw)EYI6z}.~tqXIhƆHL0۲RŴj.8ynZ8 VgRSx&DyWŠgrv]M2`9Jb{BnהCb2NA˖,ml̒;2(-rjdg CGr+gT,B{$]?13R41(&v?) 7[ygOy;ǘ9\tX W/T bpŭZPw<7-ԙltt*rᮅ]$$IoH QT\N*ūowoֱ)0àAp m9⯰ 1 r)Q"{)@O&!Tb029+ݑnsm{z~XBaKlj9>t'I'ď,Eg Iu(ݓ4^hG}w/Ml牆F^Bi6@DIThr+y0RT^Ec +5̀3R̭6W.%wT==vyc{:Zە!L"OTQQ/EC S 81Ȱؼc۾/Nǯ"F9Y7ΉIqwhAj @C**kU[,:Y A,~g{I[2]:!Bݿ '{Urkw%j6ۤZ ) `CC<<7j7"TUh*=ܽ,R4<㑌Eg Pɹ;(>+O$П|So̽;I~sM@VZWҶ JklEW;Ƚbжt!8S̤ľ"#Ccxv'1\䡚 ipBD4hp݉^CP

uհf Q]2˒ +M<0+1.Zpf&Ē絺9A]d oĻaIbO,aL lܶ@o,7 3St^ 4s#Ba҄d4 9+ʊ(/ Lm%3.cIrOKe0k=|/'=T-> 12sNeDFĉIUۭw>nc53nGjͤ:Hv6{v֭([HK5.Dyf7wvMyǀ?!O붟 Ô{*_@r4TJrbXP#=SDێi_sGN`q!قPU-ʝ`o 8&^oJ0lݜ~lR֟xoL1oG\}G冥vXӐ~$:^pghBޤ`W#zp%q04)>7C[JD70eI `9x #ZPKC!KtS' L"+Ym \rJo#sw8U*;3)497+4R@c񑪭UIi3B$ W/9b49`)Nl S^O'g1j}cFaPT%#G`.`]֟<6.8;sG *3>юn~H?iXj] jZB{2jeZ\G}뎝wQ+K6f "k1nRc7>pbMQ.*4W{S`\E265Lϖ*5ƫv6<{v4Qj:q\fe[m;2lCNEY,D( vCxCK?a`[(?lz_ ~@DcǶ`٤>hwٽ @&E NG e S8>̺p;gJ8D񫡘K MXkJ,ko҃n`@Ս*hY "s>E}'s7jݔ37LؙG9mlCcRzkq~|iB! iv{ N# ?Qs}0}؋>,'"jڽwLkǠnLW=:K(58C^KcboVByk%X8G,׏Jgr2R8L~eɥN(nLu]M'ajQ=gn4Oo"!Ĺ@YKeyݤ'8 wKBolF!*J@yVP,:SɃ p"B`#@p`L=ik]A)Of"SF+Y 'Qi)(krl~ݯf *Eoíĩ rgH=t[j;5J^g>TܢuP]st va? ZӰBwb zX9̂v!*n5Yޓ\ᐄ@&V}D/{)2ض(}9=Zg0V.:/8ɞ)߇qhe'Oo7m /( 2A1zE4#9 [e5$Ȍy6%hPՓK<JIa{Fm lS 33"^<`X4r7 opW_m^p:d7`_֞=Sg*E xg!  b$l(w$A]xvJO& 31nL(.y#4 (ca&de]o*kt/Q7tnH,C N7!r!GmPwJB72l' 8èޜAP Ck8vLlsZZ~(F5" I U[̌#_:jFb(V Fm#;rI,`hD1bedR}\.7D|PHeځϔ0@EV>B- ȧA7gM-(&ibtJX1~%M J:#aZ1ڸ.}^1> ;jA. ENZ@I+`"ihd+nOsڦIa϶TBQ?Af&J1B:Xf`i ߽ `"y̪JDc+Rx55'Rm0 %c>Zc(8 |%{xSI$ϫF }$v%b$}Gm}.uZME !hNӛ57DV!VB7[RZ'5u ՌxnUv·A s?T~!KDN FJMqw,DX"׍:jQX Us)S.2>2];c[[%7(ovX گzcr;t_d%nmڵpUV60Ī"QL`M]=Q|`ƊD3hNBǩj(4>f!AN\}'f9llfIuJK8"Uj 3Y cȸdò+L (p=!rk@2ycI*M8Kn PCw͞2m!'9߇ <6ۅYV$b#Un\LiujB&fQ)35LcהMu ^ pAJp)/c/K~{ٟuCc5uFw(ܦR~qr{nBAoR@9{qlw%$`󓐎ڷ¼FB;E8$ AEa!4oW| Z5\;>G]Y+b/֩p)M%.VcY\\}JC(|sNjpXXfYH]p8"6H?VvHEp9AK>hc(Wut-s ױa; \KfS*is IuVH"a$KAԩ VtÕcWՎ|SDr)o֞̈z1̹5iCd AOtᬍ3 evH AwAՌ*Ĥe+w5+7Be35n&)}5'ao11fB1)|A$Ǡ{ݚ EZjGSen9Rwlz¹3f)Hx:_T&QL1v\=<애s[|hdxdL_!VF`&Kn+^^KmBJ丹5*a9VrQs\vobojz 7MZqɬTmoKY;c|n8[,̌7,K68)xzlEqKPw]Zk*N>m2XKa|dm7Ԍهnz8'PƗ̡8FQk{;fDP#J (8KYU@W:Sclsoo[>.0ZgqDRZ1q47{x!&d7NT [xjh_xе|Ql{U*݃)]r<tVyU/F)w8Jt◭Y/IS }W!`@S\Xc:Lb`oPF""Ōr!=%p`F'u,.vnKcIF-JӏQhZe? @iV(HwqNHtI7q.:nJ6k^aSK{Br+BS\Ԉ[hK3Am%X&_XOq^J^ue)!v.Z[Ɂj;oY@#bS&gV`&= Q[7Yw;E^ 9' U8k1,͏b&F3>Lug1A @vJ, QI;N˂7\~]+FyvbJ0(]xMZLiuJ c)T"ϵ{yBOQ埃4?e >mئVDu]qOzoYC[RL0xfa2 y2ؘ[G%bKIH`DoUDA,NgRrc=8wٗ2gQ&u,ԽקIVڒ{y:"53 ]kx%8˭Fړy>1 l%D>VspQ0AuV->z>~lqZ9bM;ے;_-d~a|׺^]qF6- Lpium鯤@P䱽km;4 ۖ(x\{^#[ٟ 'ku Zz \ Vδ (烴-#2ctۭ[C(߲?ȸmܳ9UZWa=~6Q86tqܔg ߦ؎N:'&p8jOja'.E![@Vk˫P׶T<q4 WDr][#xA:Φ ۇ*, rD:T zfTx BltS&LmXtKG 5󠦆lQ}^}I|i^pp&x#DSL2*W{MC>+f\Du4+& c9:ӯV)~7՘R/MM uyd&Z0 ௫|˧ͨU{ [q?iCw*̩N%O3 :>#n5rnb#{[sTCԓdoex1ow5!GQ4k@ɛpot!:B W K #sL|=zg9# nnhSkH0 a&0OV !h 1l @kI&节?h7 ϟ]֟#M~;" ]V*(|`>jN پ!  V̥!@3b/zZ${ TyYz]4z#|Qp94C[J5a~|)~?ZO"|DAOh =39)󹿻9kQТ-\) *9Izݽ۩jG'3Sݔ/woCԏ8)!;;ba/-nM'ͲZĀqEuĵHqesWr}يHSGOZc>Z;RfRޘw}qv9Zㆿx.^5;4~c6w _@O^aD&FtixKP pzi)Qr)X73_*`"o8yg!޳휙,Y[)\_0K baј(QAj=[FX~)5g-1`*L^ 4u:s;z+@)x!$AprR^Hb\xr7Fx xlܡ9KSs>1ZuhGhJБTӈ ¥] ՙ]_bUl5 A|IvRfYMN 5r=d. kPu\J>.!q#: y7Y%LfzyVXIP+})I~g~$!d2xPxs1sܠ}ŴZN\6C]j BDdĎیWߟj#"}|oZբ/;l.c}e[.ʂ$\WHUcP bujX%Jz/HR~,n]2*/:''w%ln|(ySL/X>ӥ_8R2ƌ_~AͿ"bԻM!Trmt{is_av% yDfqV0LJM +fTU Ǹat*<ޟ"?a7.~Э_dY:؇ i9vS4SÀ=pZIUgDNLSm>#Yٗcęv#%Ʉ) Cqz$V$,|\S<[0|)w_a&.hygVtcc>{V[KAϚQ[pYl[(ߝC c|>ꩢȞR_ <| w:+PSQ@*0'/HTi̶ՓD@UBr!ls#ĞptS :ȥ8 c #'YI+eu=%wucŠ#1W,yCZ5\=IUĴzEjDMsŴQ^ d A6& (œ )th 73s[yP !h@4kLZswh~3|cIȰ b>%=`I~J+Ny|H0*PUүfewe=] Js8U]<~Dd,$]6Ueм}K" )0h,z2, 6>!z\W4D=qlWoX醑Gh 3߼m~j)ub(i֜W, R2y6cA5Uf5mRu^ ; V #H2IQK-01SF%bMsÉ/?4]L@53 ysO׺l3eLk^E66d%[ݧXu"9qFAFiypѧ>c ͠dpFP}}sEڿ&V v2UL46/}Q'ɐ%cݔR㕸*LM;B?[zot߶Mw\ =WqI`𔗴kmc@P<#ҟ2ү0Fq.hif Ө3sF)'9d~xBXz4 n 3`vG([[֔wZP(hk"rG}>]x}S޾h};og~x>5g ߬*?@+b1b|7!GU'1D 3^a΂o NμL 3wëAbąt1 ~+7.R ufMfԌrtcs,<$"'aԁM11ArICG!$*Nn4~ 4a9EnP N 3J{Ov mVoq -bU#1V`_>54%x293x Jc] VV4"X7@B*W*ICB(h]DKkFbq~P^f (< Rsh|kٟBA;7 N`ahD;7:mҌVT5vdOx@iG`RC JIUX<*<[TZMZN`pק9ݏrCoVw%ch܅ i sggIJ$"H _+blDR=O Fhڍ*|vDy??I Opt?*ZX{3$ܪ7ͦLDGr^:IBOKr x2mٜY I5jk8oXTqo2E&O?>G*x؅]z9%1wNlQt{jrXGlv &P_g}cf7;NO$ &(?@@Fش߲ "<6G efA"]cI=YXUi@G1js̱\jER<4 Jt|v=_a?q^!*lHxQemTYdƲ{%uѠ#NywsI`=ƕdD%&(;Z ]0 ,*-I|&|:c!Rsu)R*;y ̏tϝ3ӜhxH8> VMjD'̞n`oYyuEacxn 6 Fu8 疥r=0dĚ(oc@lGo,/`~eeg%K$qxx.I;'9ALhG7rF|iDL]}Hqw,mP Cfғ- }/pX&ϡr+pxET/^jͿ4UзHcX~! L05_JC vwdOXN!21hSlF<0,3-뮨 5_6o>({# 5]$Ζ/)DѺ~3f49 QR]oKL, v~ $Y=0)+d~& R*)qvqNE a6KG[w$QWB?A H|O- a)5:h ~A14%Eae"1^ k~{i#taE3DXyL7FQ6}H(EviBEP޿q=x49@h9Al|Vˆ(UTfb TFv1bƅ9XE@TD0[hwP3aQǹP%Gfۯ=fE"ny?V77&-k2͝WPY\Ñ F`Yf۵ r^{]8aS jCS2kxDTPV]`ΪT&3J4+x?^:9WхB9.{S4 ` ~n"ߕ*M0^,%5sܖ[q{Kt -Nڇ2[0B. I_T)Owx`beD b y5o ŔX*YĜ["pӡTC4 s 3-W\{)ZiM,<@v,AvHbG7GSKQZ潛D EvRW"Gk}{ج\2~t##-Sz_J͹߰+A@a%nV$:g&o)|9F˥ic =Ѓ1 wYuf f144;ԓJsq"<и#mvå[llƄc{|xʞ:8t%쀅G>~͞o(Ǿ;}h%f;oBALJE^1MDތzrBHDZmdlꧨD1]6Rϭ8"KL_( 2|6 b {/5 Ǡ .6쬑5=\d0h#DqEw#wQEfD ˣwf.,神ǚzml6T/ƶĆЀ36b$P뫟q{хey&y?ީ v`ݦ޾SAh,S°FGMxdbӃ+zs~v@ uO6/Eᥬ/=a, yB,I_R]QWSo:+zR|6꽫0\//sAڄfB_4E}0O]_ussonex7۞kOL<:=S9(h;ăpoP>\fA9 U7'G\?!|/Y'3u۱hE2r@*>A:CBh?/U~N zEWq@YiAST]I*y2yu,#' ad`ϟD.- AE_6-vN,zDoLd}cW! M0ô1؍QV7gj y @V *{IK\S)ߐ1#7ZͣK}֢3܆I],zLYO ;ţxM MX*$$~wCny_[Z~g+J?慠lQ$bShㄈF25`՟:KP7E>+@(^5{m2m@eF u)fL ->+voVÃk2K)}Եn󤥊 {4&T%!q}7Vz#FE<\uF4Z$ro y1aaN2 idJ̊ _<ϟwAf֨gӮ,m,w%O v$TJt .cC,%ƋY NGgj6_"sMo )䍲֞q]n `4ܙYz\,YjF14_$369%Q}#F* b*.-!Srq "އp2λO}e7+YQH:9YƵyؚ Y)!5 hWP n3KhHjc]7KD`}w:źv4ϑ EW[>I!e Kꅫ56uzE~$i[*B^9L/Rx~*bDu'TV#&GJrS&忁 t:mxBÎ]*؆2?'SPo;9W2/gf1Jzqٗwrp{Ox5WF}WQɫB:.*E"ATRwP7a1}_؉Ύ_S㿚S Etk, JE8rjUcw {ސ"q*qUY:\O\9tbo|d䃘IS9g!zĮ۰ ӯEELC-SЏvNA .뉔noT{/w0FA((kOEFo/~GԺCǙqHss)F"dXSN_di0 genx<ڞRĭÉ._~Sp Z9#5m~tw%r_#TGX('漜!!˚nquq\ZV)j0#"s\Z0H}0T?_M\eUuI +gg-Ď w#-w#X3d_ZױqGlcۛ *VljqCQɽ@JCr#0d]BO\IB@8-Hx jrufO9=2TCsT9:,}8v .gb"Z|!=)aP q oM{-7uS%"tz?'JFwj,xso]^٦(#+zAajއ'-B,$ɚfjb4ׇE 5@)= e`1 V6uPOٕk6Ņ ]QdH\1lQ [JOt c!2g8 S ^CFSxiхC.* 3 l1ڤi ,W!M׏|dFgg9 }5n),\s['flOY%v s6+xVBZȦyN3#Z˴ Iۤ\ǴO C5daZ"uV"٘rLFF_#az~i#). lgE[坭L1Pk<R#F*I[Ļm'80RJ;I@RKM (HnRz h0(dm*]1J; Amo}\ޅV(^BB?/OVv!ŠS\sh< A|zc@^R2g 2Rx=Q "R"6O mh&+oX;[Qޕ 7pȢkjF8'b f+nTxl0)s .m#`%pPّ-'NLJJ \|sy0z}zU7"4^)uvo3M) |Gb2$i8Lâ&U%w8`uxBȍn= 1}M[Ჳc7%->uk4Dnl}f[Z3c B{+vP!UVWc6Zb6H'L<=^|c&j6ɉ)@-BMgTWia r|Di覧z0fTHCS2K _Y!|# ZH^U'̖b*o6CA3a1 # QbT,M; pdm WAD|cv x5q US.da>ԑ}F℘37?Wvh5._X#l ږʅN+=׬pfk?ʞfƠ /d𧆻XʘIƳ*,7?sQ3AGeFJ~D^&"gpz)9H\!k*u9aPGւp_;[CE c΃ yQ!ԛ~avvs/P5Вd5f[eoziC߱X j~ Rg m&N$W< 9͕xA)kݿ\1Η1; \Wi] ;@ \j•9!iفuYH>V 9 LTc dn6\"9G:]:fgR~f\/tPr$PQ 5&a[K'%_cҬL#8G]3r9zu_㌙[w,VȿԪ[;Wz,U Qd-]n5md1w3A'aNì]u` oFEogvFX6( Kˊo*o>lU;K؀fA?D|x g0W9?E7瀂2M Q $ҵ '8G\§2&&erHtuj?9-\T;~hi#2qMIjԮz=dh0)%Be@1zG}ϲ{57*]Pm@L!<ϞYƗk3||QEu;dNRo~.\n9""7YjAʄ;_ũ* !|,}}%,t!9Du7'}4iף3%bajXriC>2hܲ?M~k0$6< ?QFeNU_tg-1Xuk_o5Tc3rK1C?2Oxb‡&+z~:BF點846*o)6U2Ĭ*;^~zľڊ[M%?U?"6-#f*BS8@RoÃK 7]QOׁ& CW)!![<а͸ T"m i[͇;*{[+x&M|<[٬' z߷ژkS (Jω}%!QEai$wp|I6qfy#`>L"LSn:4K'Om4D<K1&_׀(iP[ހq,6AM&GYɵU[sf̬{,A5yDě]aϩm|%7XWJK,t!#9 $#[ft`ɭa2@^.:]r}]R1lq&OSSхO Sp:} ԠS*Qd { hmO>3,.iyY$ 6y%=Ŏ "OĹ#c</jFPxqé՚/6РIzٔ;|v'5Q 2O&jAnWy FX =g(*E7䫯BYҡKKtT%°QXwASK#I!H W}*ϯ|(Ѻ6 Р33 ɍ+R+.V}4S ʻ f>o,uͽH;GuW_ۀҸ@J Q1G+|gE_DW{]H А.'}R==h2`wQOGHk%H!,إC\ 1X2ia,]Ю:>1?Kk7 _4ׄؒcKGwݰN uq/PAMg'%oM:uQHNyC/5@ M)*ãW&Hݮn9fD}Sl%Sf3hq *:p΢_ͨ/5lz@d{ Mؿ5 >y =^0!͍@8<.Y)%74ghS(gqa֝*X*1껁C gF u Y$noT!Wlu6@i>Ah?wdP&ƊDouKJmOT}.B9SBv@>͘թzsJO&4?5hev⼄_lFkSq*JȁNųL^3Km⒎uf4gQ}~RYJ?[n!cxf`I߿Wp͉-|Qs,O+) mLT!ό9[C=n8\ȿ,p:8BE1z:ޟfXSLO;7GN&&RT𦔑/vgDd `rj*e7'.`C7Q+3 k{cuΣT{soD4PSbz}{&mQV63Ϝs6;sf.q#:tkH`.xVFfTOr5@r˔˝xԂ76Z"i'4@!Y X]X@S@b et*{kw?TJ=COeԹ]j(`N=-H2iL"#g`! zk40\X/&TFʪ‽Y_[e8'GӲE^ݩk'ٯ4,}4s5nv{+An_+`Ft>eDh ۼ]r*|<[Oh&v<,J/4ʛp/nKJ EdVo DSYފlmu[@Ď5A͚|;vxEݒ4) |Y ➇DES&vKʾ0z[H(vJcʖ]\zմ\ҏRs6]qkn7YլsZ!?J8ѽ Մ6¯^m?`ez_3Me%摄;DzV_.dLL I kN~nD& Xn'֘ ؤJ ڎAqϦ۟sg]|% %˳")")VnA3:!QAvaz_CʥB16yGy%ECOscA<̛d2"Ǭ_Wd[pZ/}a[C"1`SH NC?Nf=}4X|ލq .IXs-igVMYBY8HyDb˓˫|vzV:;n/UpO A恗fC0xdSG?bQC1Ja{0k1!I(鮫,1^56=5ٹBRi+!/d% ̟D9AZA])V||C*g|?B7߱ DSPs 9_!K)#pA*P[^~kph>f-p09̪9"BT/$G4CNCOPU֧/crkn EN~Z$Fށ"~㣇Oq6FEC[#.S"< O&p˧3rÇmBe@TRn@j 3 PZ֡\>8 R+;.=7@'ps/"WL4q’hQPbaO!54G|Qd.Er?=uvD.``k#BI_.)m:E1N;oPH&T[:A$k0EB#h.ԦlڮQ8FC| gю5 ^zq/ml eC\~3VX]mYCyF܍Oĕ^F$‰17v^rh"uDٌA*"t i Dw]ǗXK 5,8@or&ILXC8t ($B6S S{ާJtT1mRkQxZS 2HG\fUmlE%.d`=fZG;ݸ}zsP[ >SXb<ҮD,\0 !Td}e:a=ہ;9۫=a]D6XYGP<:ed5 w΃4RѴ#h[~2X.a(h0I}$Bj.%7`وAb<.bc?3w|z_";F=mɝ@ Ȥ(d0d,/1dFLncC;}D{KԘ-q9U`\B=VD++9qC$Akм13N!M b(Y7A]?4x,%У 2<`O s0hMDmB$5ff`>Ot1j\tP U%ہWۺXde('Rz/^ `s*">fFFt!^rYbnr9 mnvwW$~|? LNRNmr,RHt^]Sj@!5r#q9j }ݷ<?UԿl XTTGO1@l mzt* $ x'uZOYQaLj P£(ҋc m< XB_1Y[s8Rq,oW)M)l% ŭ^,  р s_htW7DuFzEK"H5*[.TyvP%J7Vo9rc}~c37>$]25.F-љ,RŤ F cFKkHR@Kܐrσ/[pc ˖/Mz(p*u)-*@ nL ;lb\LY"(_,eвK"t6Xh^Zlg&~MƤ@}pa&l)©K1~ݤF! }Gj e@øp% 6P4'FM%U$ ѧ%`4A6@?,Z$Ԕxk7= 9ɕVU0JsD7G̙*oi(&?~ zc9lR#6Vs&TvCs(?(԰NV/ k0MWpRe&/EIp MT"kKiF7+64])=fPG=ĀFE Z;v kTߢF-,rT*{b^˷8jJnAʷL!7ʲIB1wHd&+!qC7tG %Ql:tN&:e"m?JɷEr/̵Ժ򽇝<5>"C5֌)4=4݃]y}ƃ_pL~V[ZFD*Ga-U7Bjø̰gT`[ɐ]EX|:S8!/i(i2 ڞі$"~lq-p,! j_6x+QyCG8SF=/[\ۤZtфD9 Ϯsm3|ùq+=s7PaQ1Hbz)mdkx=+15OcB;/ M/91p9+ADiJ=dPHui pt5#\tn2 h8hY*ԩ;7tUU@5l ;'OVXo/<[ثL,PH/mt]~w>Q==pz^Izuͬ4GLuϸWWTv.2ֶ>TƶrN0H/q*Gٸ &$ DXm3]m[Cw^yMg߉@n-1ME9SϳfQٞ;vV;!IĎduӳRYaԋՇ^=WUjo)r0y|YMPP+Xu55["J÷W6Dx'jXw ORy8{r'Ϸ.<]"y*>eqS6ǀE,8go%`|4 %Eky d2,Ml0ii+N1o۫VJ4_݉e#@WFwdN%ҁSbK݋;m9ik+ށ@T-M.Kʱ*})N=xO<>ܤ3cr_{OJvm)?ehasԮxW3 ]k$2iW#_ĭգSA _/0?dsl=ݪ5EkJj3@ {\tfꙟP >I;헷)S3a5l2#BpnBٙdI?DgS1Sdn}3(g7I0bťʷ7a̪"C }o<=y(Kj7;._:u } !񒫂L!T ycY"pP\k%ז&l~?ڨb震GEI mWcGecRxcuW# y^GE#'qN ,-=?3ϊg5hjD)Nnܝ>[eg @OEM+4?nzpSÍ;]W-*ʺz +"p+\aA%+`d)q%φ3,ʞJKȯTR( Zaa/pLثZr;b//SO"r#P˕Yxf{LE\'[gL+ēH[W9%~;pQ3.M_Dڈ`S< ֏lIdhJb'22tU#Yw $~[﷝s`V ,M*ڊ[RպnJOQ >U=R)d- 0UY[[o"n80A]m"|V`7As|Ju`hTn& K\$Sjly*#غMS̛ߖgO%w9b9"/ͷXoc7?y5^w]X)?+:زhl LN;[fa#WE*qT/ukg qel"BaȽ7kW ">S` \''~wyv2ґzV1mT> {RJ *bHGj;}EDxiPDDD ?TAI ^GrJւ P0\oIk"V*QovQd̹_+DӸpT" jU"q%t]/,$oFto3}U|sN]":z[J-s5i(t8M4n|Nuě8`Y (l4dg~z$kY:%Ybk8BT!a (4>Xd?Ee& Sj.؟c-JA 1c-i 4iS@3>٭7"ipdcQ*{ϱg(Q^ztI˱c~{p)-<}Q]_@ =1#G!6k,K%m?Y1VИ5Tw=&576P,ōlØ.kb=)HOWXU*Ӛ 8iiu; 2-b2WǗX8PrzlHO|" L$kܷ?3Be^D^L~`Zi)/Afߖ[ݱ ]Qixc6~80Z$&vU ve#:0jo+*q/o:S\vu?˭x c aݘNuɠM/I!!1R|vHm^DMXr)Q}M q\ˮQ(4+3{SL @4@քP~`QNb>`DNa$3VOB$q& ֽ&cd}AtI;`(wE{a\]8FR< VC+ް:N%&WB {皋DDƒHpl !2r8@vVYe_8"V| 24*|ml"0S۟s ׆g:xB-qr!mMA'm[~u2 {\gD À+斾z4!Mh\ɘbfaSltgtd[q(0툰x-?sS^|dEߧ$J<U!FNMV՛ A0[$}h Y:=w&jf9ތ5ZuoG[Z7L43V- Odس|xOh$ kj9@P6vIW:@VG0Z#ExLcK>gI-J$<]Hs"-UTAq)t+G q_"7?mH[@D,IpV V[ǕF^RK٧*$? 't)%ҡ+atXCXH 1nՑޱR!</IJաzcr` 3Nbپκo,Yx Vke_AgdHR:W^ ?)ׁFmM^Fs1d7u{,0')O;O}/j<ө %Iہ™ʋv)p6xܱ-!(S L9r~Zb 6Id[}]8O{ pܩJ3?zOtN$BNGb~Q3uߚiLk}ti/?1xjwG>Z5wK# N><7ؽΥ=)EδrsU.v/e݌ɒdVS@<'a:WT1-臓k\}4]C4;Xt ?"nҠ7"ަU;+(ZP J :мe}# 27os-Q:Y 4,3sSo(pj"f%;$RxF!!kow?{B,XH|%YyVbW0L-?[&uxIa,ԱٲȿEV%,Lv9~+Eu$t2PҞdmJR2\LF3)f^A~a=/ :J[muM5="^FeF֎0$*-Kt/|C hꢇ=#Aޜ PHHJO{)V[_"a=%!YSgJC[tUi@rkןi]a&AΨ bp-~Q1}e\QWK#}5 L9ܞuT·Q'[LXZ)y~|"@|fGt pVlzQ"y=>aZbd?r*$zՁ ue}MjU^v\TiRn('1DIy RP>uI vl6L tT H;hQs~ CfqnDgh 7 tWb/N% V0>0>I!iE'NYOC\§v;J $_uH..c'g9O^Z^;qfAbW~ғT>)?& ns:N^9R s%gO xѝL3|;+ےn&&mEaG]}[ (:zoVc%^QNI\zK|lEsiAX$b`8,4 ;sC\}Q=hu=Q7yDf$"}9VZkvsq2H\Ѵcu"bΝ]H=zBb4L8"kR2^DU|8#g$A+z )-{$*byRmpHpdyKk,lF@ JDUkBWTy{ڍ"r[*ڜ+ :0xY ^a#T񚉦 H"2 9PS\'Yp (v"wفL/taͪq. D, ♛3e!0j6Z 01(킴RryCPGivޖu^~7x-z]/!]DD)naIX"Ś (?46)a 2=!IV- Vco5QMT𶤓c4Rxi U!Ws5qGA?uS9B=*{kox.hWi B_?dl_ Ȣ뀪 sb_  k﻾Kbeg ^w ꋬӬsdkv%ANCHLrB~޶/np M{# JvRaGD{> ^ƪKT7~EpURt5o=O:mPdE#Y4;"۴IGEÎ9q QE|%P >) ';}X`-_4Gfn'27oWJO枴3f|Tz|t]C7'6}΅m?po Rϵ7A~?hY5֔aYןM.@4 1"Շc8}Zɓ8:ޡ,f%Lag2aX>|Hr/Q#pYW<޻e>slAu&y+%4C=iN6t83|]bg0)o-/<n؞* l*rRDr4Je^#Wd/)&jc.Y>4H(%Ũ r⼢?;B5N{]mcQ}P =6Z<,Z%CC[ E*+' =ʬyv\M*dAjϔOH]v7#lZh.rW-> |Q~?D ~ ֤r>fЌ"*ۢvUR;m,L"1kujG>[r׾ iUsLtxC^ۋU߲i!i8KJ*J KYm\|*9&rT58\C'?}>ws? s+6u:=j{*.\ Lza)/e/MFGesnּ )fE-X{tܐDɀwUs$_Ǟ8 L ͷ7ʃ*u$\NS!Z~?]m/}ʈ {i~mu,׶~؈t$x Z̡RvhΣD7T 9i{iKs 2>^HQ/nUL۟ܽ` EKFLYJ!??$%1eee4zخ'ءW%w+1Cv+zT Qv;~~ /K3l{vc5ѫX +*%>zD|wcyECJ%2 ?"}hmP~KyR=(!^PeR:A %[`R{SK$?Xϒ}(7dvӄ.f," o+T'`DckD? %L97'FRE\mwpf1.wRe14"[<ٖ|03'穗v';PՑ,U`ZKc18e1d_;>!89IUT [Icd_?@ʼn=i#ɍW5Q:]yӼr]Wx! Ңlc]p!=?75L)i@*&ݴ5wHB(@N"J܅|\cӁ%"!o e+O/I&_;{Sxv@Bky!;5Z[UB%/"CYTwU7dz##ӾF8X#yiG~6PcEݯ;}!% @WmaEޕ8+VLEMuuCtXY,z?('S&c Ђ! \9%>Eeyp}}(>>YrT-] \: `OlIgBwL8S[%zeL0YXࢼux$%{ʱLevm-}qpc+PN˱qXi#%Hsݏ8c5' Gd)~nW7 U(c=zΐ3r#w 7rc]M7CʜMx-ۉa}qJ(]_RBr09H˗G~la[~ 2C*ҏNSsJ00/1=Wtk-_:]6+Vg!`ْ[Og$=q~L(1pWB>Y  gȃMʫߥ&Hp{j}&d>S2ԐIV-DIm/Oo{աTo# )]>e3q{)|(rK*t=&Vt''*gVmp҈@)bN:n>, Ot3D̮*h's_jqJ"RDͧ?j*v*{Sj ^p3b!wR)pm Aì )`?^ GZqx6c&%t(b*ׯ4>g<rP@zo Q;}\p'r| U Ewbc8$eҽ;M$6LJ BKX+c3ɷ ş(@KNO O/לyNGUwߕɘ3n`P7`6SoPvdk,V%wA}CR=qkAA1-Wk%],x40^Џ1 Ev Q谈DrZf=&(EddJPvĴb"5hm޳D P/s`<,d4]NQO@9hrNU+{oO_Q4VJ,po v}j8IR@JZxlC]Wxp]"qڶjBɣ%`_rQ*^c*f(4\}yyΑҎH+T0$j _^%Ox9Z7dWW$;+ rd˙RyI )jc x]lW-lf8` h(s׏`ܳ 2U܀:Zuۓ;Vo:.F,*L^~dd؜BkTYTkt:SṔWԲ'|zbw09ˡ+#8؜p1bWNP2^.-9T:e_j9$RU5:0=_2e~3ލ9͈B?a->gn8{|J=k˜ \N^kI@YU.xJ yX刾N60N\QMt|jC@Wu-mU%ũ"S?RgkgX66L* aKj87ay+qU-$j_! "_Yi,$޶$+H_Q8H=/Hv雷bd'~y9Ѳt˝^6Fuqp)fd@+v`a;c=Z~nݧӝR+2W+Շk!`x nI Ljxgyn@БNd2AwĄ̇̄2^uEڥD 1 [u[Hצ} @ІͰgp Jwb)C@LFf ޭѵ}u V߫?ىZ489k$C1!Do w;FV+8W;-C6tUŇn'.$i 5̟{80E?y"xyE6jp_cR'gcX'Pvݽ(Q5S]Bj(tsq&4` }uvK7Z'Q7xL&]%+)^ڧ'8&ױr=Wy ӾR@i}bӁ'g西^)X^6DM4a͞ 6,"i6oHNQp ǟAN{4g@U 6IxNaZN6l-4 |3%._Wm=91=_̻ՃX"P% #NɌCE@:G`RY:nu.}2??mIiΒ1,̆ɿDuΰ@tį ӴB/+~ɽ [H2,XIb_l#>Ȃ `T{>ۓ4Kڍ9Up=1.9f jXJlϠ1> X!TʜB~\de3߱~B(+Rd(ık}zq۳_C'6Kˤ q fYMd X"(WVxixZENn:K\l<ԯo(4M1=?QG)mIK]až\ ;B *Ϗt b՟ș,e<:/omI~TVI4!!qREE% y٦(}F\GJE j{`QCa444#6}H.WlV4I[KNr(*/kv  `:/3AI=F;vIGiLHi c9hlQ]f|kK`Jˢe! VeM. TY{Zn0}ބW.{@lxC_3NVj* N8V&*tc8-E|̩v\0ѻQ\Uyr`$ lHwoMvi8e@4KhٗsXc aIۣ.=EI]W m$F805ceW}'Q >kwJ`[na}j D}@p` !5p;Wi袥7X'Q  k;&4[3:dYu=CRGTHrb|~ K劸Gt̝kˌBWEX>=VEC˳?w*2ݤrm >``yҿdP" ˾9ΰW2޺ [4)V:wu| ؠw[3"j`p`'Lk+}D!h3>=׵Nt9{U^fCv73jg+0%=Y#TD! %ꗹAGM~/5]d4W-~n,ى%qo< ͝* <>H?.INYl ~ CJn\pcʿN-5K.uR~  wV߄Zھ <{NSb,evDGk3.ΫA3q o;@ b"nt?<+8ØdVHg?]3\^*_8e, "vAoH K&}qZ–g.O}h爂hY_ǥk,n܉EǪ%|֥b9fNB&؝r'q/к:eQiTCSDք-}Ă7#EGn/8gsgVD]m;㫤'XaJuu =H-0\IwNxHb(fXj'RWT7:|!\&7N'h*D[)i[U`8x1-bbEݪҮ%7 tc地6*4;";e]N2Nh;N:ayd<6xPSnA1~S<DC "xwi;X7Sto)I99qH`O,ĭE Q-zY'&魿 t<ՠ5ΝZm#Y k a)'jo-5SVxh^RЌkLPt4%RQϏxPDb+{ш ? =aQ48>'n3F[Ņ/lF!7 Fx6U%FrOF"缦hsTgXԜ\waഴEGw*@*Z!42[}Z 1Ӣhs'*vx{aC3:KL8Osao>>};^;5NxWFɤv/@!ƨƭnCNW"eЦfSCnA(툼"^<]&o`(8f@&OE}'KYW#z^RTISyl~ '#^iL.iϩ4gī|Y ާܗwKq֥;nBn݌KT<M. $t^-ZO>xg*, >[<3c٬:6_Bo6҃٥-:J{!r5ī!-M>ifE۔FK,#Seeo08෾$;YqF'}XDxTҁr@|&R+_k Lcƞ)G6ȼ,]ouxW O1~Y 8bҩix<jTōΏ i`pnR!2?Lu60] h`i T9㚫M6| c#dZUL.?C!1ȧڂLm|?A㛰4E4jԏR}|qO/4D]X\REM+h%I&ϊrQC8|.鵊rxEa:s-=((`|J_/ Y/>+/(X#3v>fHQxqZzkӰ:15=nfϏ.#ŏ7h zNF˗]i_Ezޓ II ’GILQl_ Q+:u&-:. FM:W@˖-JMvݣ,M6+2G80cB5Ԫ8i7*ڿD|/D^IVjȫ-b+H)= U1RяPӭ-)>):r;eJ^rdl% |]/e)C.\Vz2a5=ꈐL+W  oF2WKħMpStkw,sl ^SٲRw7eAh`[cgفHܣ}Alw1Qyr kC4;9f@![<'Sؗ~m$">dFT^*;[AS㯆}Fs9[鞲N_'aMof7n jz+,AY7{8lki`|oQ']Dp2!Cc? 1LTnΔI J+*|,\"=4h =Б5C"ryO% ~}3_=})`[ނsg#Du?q"7xKg&3I 1P M5ai_6eNU[2_#V@qie#'Fsźߣ=i,v?ˀ[ A"1%q~REzݩᾒނjmFAWcWՊT0F"Ԓ_6aPvzmn CŖs[VbvGKvj҇caFѪ3QFЀ*'qQmqG\6_!u妈.mp#>񓄋X0+dnceIOO^a?).P.$˪SJu4C]d2YNt^?zvSCt5C;ßKt$$*BVx!CteFS"ڊp-mGV=i2,l$;n%0BaBAYVVVtjd1Snt#?ݙY T%Պ$HKCgZ1A ªY'l ݦm:djM9׊te}"m&\/xs--:Ƴ9v=c\*«>vk'l8N`'+w `z!Cuz C!e!p&x $Mno%G! lJM lSĄ'XY%h*nEPp$+AS! Iv̄|Nk-[U? :IBH"{G$d0yu3IwL#SV*UȯUfQUѿ,If[C `yl[R[ZqXP:@ϧtQ tWDD}r Ii7aT fXq31RS>#!ͷ7I[*Ү!'p*MPB:=g߇0h1-i{eLs: ,JQk$+AoVn3unUWZ|cOuyٹ#pуid;i%_!OL"a2O 8"M̿EQ!{L1?cEgc#06 IOJ"&69ʦ J طۀ◗?)f!=ӉY?zhFQ ?9Zףwų6JKP_cFBH[5*%v*oEnYkB&ע0R6LZ} Mn -x[1U i >~X֏[E sX6:"ee$<ˬ}& p\7z)K(˴LGm[TKRI.of/$KK7qO dawA`[N$ !{% ClHN,3^7yWp}o|?.[ < %b.!ُnw$3̥oq5lȑ:zVK\h/˷ Ҧ9Ꙗhw^qPPԙ£%e_E9gWmA[FWnۢזAmXv6v̕D<Fۑ'*0QdN*o+mZ&/|4`xN)h.t6VzCrdw!ԂP4 պ1q@?54 mm8Ebp`5T ՏKD!% Hr. )\=ERɂɳ.Іǩik  ̃Xp u{Q*rЮ!܅D=!|zCaѦլyуsgP֤쐪@"+As>JUס[^eR[ k/U`|NuX0^ [>ܘKNE`^6Csz4)^&}‹P q;XfFa[l,&uHKӔ$c(mƤg `^U`t5'׀z۪Sy7TluW4Z3D0 v:B(h;-h0tr/}E`1%wR>y AuHTi qԾ@[vM ɗ;;%Q.lӿ.N^ iPpo{y_ 躕g%Iŏ힭d%^|lLI\cR{ry@'#MbXH\N6wRĉb?bʢ ǃ"Ywr}=r]7Ȫ$>&( jWdmwJΨ?o,z˟y:i:72@;Ky{LJ+XSxADrpwݱF,¿W{!<$F9 ҡmRС^h=3)h/UKū/|-ɿVYRSgowf g+oCӫ?+4'Wath9h .+L)t*I xQKה>A!^L!P=uͷJa@b0h )~FDgJ|2I]+ ;4)ΜUBR>K*q?\;P;Vu]_2IVEboH]Tc LN84XNE<|-(*ií-e_S˂0 SFߪ󴃮]M06^YfVlC`LaLsC)F4 8->|飇Vn20Y[ mgഌ VtK"CH 믒"z˴zi~ 3_%惺V.Z(Rb,ca,AEְ~[9ƫ:GF[ XДVz@XQ"7TVT B#lV'&(lRi RuAF02^avU@&Xt1}vryg9A@$"04wžLê Nd&YMM#mߡu]of0Ǵ5A %Ǿ[\.:A8i tw),ٳH~SI4 2)i|%Fmݍ­wqږpAY@-;6^_R3lEl-A*\cTɛv_fZ# 2U] ;_q{v?k+˥haJuM:s=y HdюvZ|rd8D#=+\&PAgފr`^0El38xl-;A6'LYZ,M0_ߋY'bMG^c59Z'Sb!l:/)T!Zȁ7:.qv*su{BBįB6;ck3HX~ºU/Υ_^{#&P3sZDHq*{phGל:ߔu[i6y?tbG j=W7oKB#/s? G_42'8LͶ@_℆?i=kᴡIL zڤk"߈P&~_DZ#7~@(&:yE?Mͱ5*JHt)Ackݥ8n"S*NJq]Q~.!FDLI윔NСj OD2YjJ4mġt: Ż~lu O!3ƎL€+=J!\ނ s9j dn-8>㖭ЍH  ^.ƊRoY[GEF@n ߵc+#(.#t~UtF`Qi#9S 6Kʙ|s5hQ!; #yFkIzK\*| h̛uF-Ns8Ux)C-y A ҙ-D9>T<,y6g`u)xQ{2R >ta qhkTq6qOdoSEeլd9#'VKg-]DxK'ܪ)ns g}eZ!$p!8J[{7Yc 20ͭxBqV+2XƪM^LvMX*9\_xxy-: `3̻BݳʒV*+́^Yv5ҘS0J"h&M1*E?a:gwB'ntƳ\"QqE\sJŏ1@$pM~ ,>Nˈbe,å;]=pxuK^g[>^/v8ci 1z#g  5K!A+H^S;jo/q.JgXZ |ݔ."p2Zƙ~(qW ˽W50#G3*5⑵ZZ@π%t b;z֮BH-N!8;"]EQpZÑ|#*gT$5mO .0(Ĵdȱ>c'n7@JFv%u 7_f"6Eݙ| {Ю; ~=ƚ&+. znBӿw޸Zt=7Lsn/`Pa4RxI?W6)ZF7Rbw-}u"^$p(t)SBW57 ac*  ?qC6A.]%g)9o=;1z;xI=qgrQL1TNDQ 4 -rLB)cP-^PƎY #gVGaξ ([x7L}zisG@D/i*zG_X}Y@3ꢃO Xt~=w)YkM1<  U :j͜G~W0@RK喖o ]dԜheqK>BapKӰAsB")h%:4h슌<39IRoʈ˷dC; 8jen4Y=:dBٵzV ʃnfݕ|>gR)$9|t1gz{y&lJ2:1iӂx&ZͿ5FZp!y>I kЙ{?v3k5m3RcφBGz [b'#T`6TctvaZRqrcz$Bqx{Um ˫kcmD(}||Bj %e* w5\oA]"}Upw PI\M I%@N3胹=%\Ə=gwh>?"Bp;}Qaڍ8kϨ)J`#xdo৴}^! b̥1 ,ڞ cA%42-M`E`?iƨ&Mc 97S50LW*O,fG{GY+>hU9@ᣒ=2[Ia`XwVչEx_ו-+0)ˆ?8b&q@{)HA)8BD{\yvm@C !-653WQy<_@p҄!m9VuGBtO:3@{1-})jwNU =m9=c70$X c$ZKC 7MUޖZ^jObɿi*E\Xb-Z s+Wssގ|߰I SwJ܁aT2e#h qXT0}cbyQ08\M+*-TjԌXe~x'h(h!k€f AtQ '-Jc]^0ߒ9* TyF:uꂰJN`*dK~_3E*y{hrenRhX>;6 OWp7"E1 H@<"2WUpK3t La4:.n@Jмq)d\<$Q\@%IC3y%?,ڟa} (CYCF&DM+nwWIF@\qU[DF ]ӑ=Aw/r<랅\/Wdhz{]nz3㕊 5eVވu 6y dA1v̩c eӫ9nS"`?1&@ \Iǖ}HVw{$jjb`BJ魦8oWo{3+NQh5OՅ7X}Sh˻ :w?3H<0BY.qb.3Zig4o]wN!9VMWp9|/!< He) 7[uхJ4Żfz!ovp#ՁBTِ D\r[kbgyez:~;pUzO٤4*;x.JB(_. gF} ;uWVY-ϑO>p/Oަ&ez+B qv4S.8eUہOraISSaB_m-?t|!bvSUlҔVtW+vW9gvaNy;F7B[Ei|MqMԅˊr E''6K3g@z\$ 'e$Cׅar?v;J쥖­y\s,սD7bw%U/xsMDJ$J?SYplO%Z eKR IWB@%9zwC(-ͦe̲u1Ӌ-C\v8rZxА{ޢD\g˧g"l|gp6#V=SiA'`x`)̩y~āʸդb䵶͋%Eƭ-x`:>hdG2G dxFp| kN;oo˿剈G>5G9=Wvn?eP2=  8o3ؠisU{1򡈩jb8DMq(! !"})\ONcD`E?MF0A|_+ʞĂJ!Q%Wb2^mz%E:Vo|5 K-1ŽB̦ [hp#qgx wa\=RMVVԒA00- Zm_\4-0>r@k5!xB}t2?R-9 %t{8&È̥;㚑o#шXUapŢM*t7}T1;HoA -(m׷zqwFb 6;Y4%BВ}!`/@2AIWŢ׿bf^HHibluCL6i>FOKg#1Ŕu3_R&l\=9J՟΍h_ qi\<¨&mPߪG4I=ݱ1L}t&X-t$}lS,Зh#(KD Pr;:pQ*W("M`EG)bHlßS5^5g(){X>kgܒ.4SXum4zr u6Y Rk: rM%(aI߲LOb~6-5M3n7P/q*2l4D>䦱Dsmp[+a =snBp1@i{IROPo\&Ze? jjfpދ=Ar@HKl 2%~%s!: N'^/m߆**Rh7!$$Kfr6$ "Qxpw&ۺ݁!-\28J;ҳ1jH/fcV>R@3SO)h9*DZ}|tz/uJ[B|;1@#O$R.(nrDDlz%6XecEP=&Δ&RmNEb!$E*5QipJvBF=A@mX&h L!EZ1mR54y2wN $U?1fGɍ =.]YKVb_`ҙ,ܥ5~| ]\ҪcN%b[\<4zZb._ʃVy^̋IT|aH*6kK ydP/$.az>Khl'< 'ɇ Siqwޡ7uޝ–RNI6!B&A# 4՜.z_BnH oaVw/-vm(JSCK8r;X22ʏ gMH1L9Ro"%S}8?'$enpư1SHlL^nrT]v* 'Mr21'<;N!zD, @ k*dQ։!UtzPv;5`%Wv5N/aiE^nܒA3a,&x劓gP =I[_+s+-RTxS杺W&Q@$ۡ$í }m#E>&LC." Pd eL Fe2СrS^ӏ*IYG#:8, Rr 9?пi 6LGim]yPE[qEC}L8?bRVj3vUu?1o9Fm&/((ibH%M /}Gsp(~~]|[ELLjR0%]15y 2  潕GjcrpU %IWy5ZXjN:hЯ)|P%͖Oس5a u[x|BJ%*=vHJ$6Z!ER kBn0xJ3\Uq#v PpZJ1ddhqXvyMyS%ƒ g<٭=pSmӌ"F0 (`ߍ[4(;N4FBZL6{OX> +-dN[LO&彐9(p'E3bmE*f;>I'tuys4_w u7ZM(  vW'0M= {,!+0~Gi[IaCɗ{AGW™҇dD]ˢ7#zVh?l)vS&G_*d~L9VX$%Vd<@+˵0X|BhYO?~l$^5jg9 : ܹec\]Ѓ !~}y|c]NyV-K"Mz#EfUKTHs*Lq5̯7zAxƧdLQ 5(-Ln7h֩5" N/ #q1y9;RiPB? pUІPtϔkb~Qei *xoŽ\ _Rd3 9;VVY<Ǯ9!!D**rUK1HNI4 @01 K`݊e%EɕO!g)n8qp J2p !l š'/۷r|ev5[#[VO҅N 2({2WTmRyXM\>f<~܍1%ikωs4XGVYG_MA?uDB- jw5LX-Db1~fR>ҍkۥ9L7}Gk@0 V[gEڻbCKGݙWwPA"d9eTM9>qKJ'\;k$9mJĻM=UY.Oz{Ő,w`]`_IՌڨhM)or~Ȝ Ӧ:u4YZp=0JV^j C<`q܋Cs::,Tcẗ %@byŌ- !b밡y:H>J뱎aD-Lu1>NYڑ/%]|*6ѓ^70OerHeMͰܦCD5u|Ĥ7\{ E9B$K9 t&UGZIRH2SJ>嗴n諳ei$rNp$iYC.B%L+˭ R~gҲH$Uf?gPcq)W8;sه(6_%ƤpGǹ$D:sc,uszRS7=ϳ["p&Ҥ/hL|MxѺU C&%L贵f$LHI<ȯ;~ϼyK)/W OAK sMr@G]6'|/4]e`ʒ2W=Laj1'Y%+6C`CaTHQ\!aV6+P^0Jaxaf/U{gbnh7=Kctkѐhu$y@}n~Gھ3rתY5M`$թ.GGhg־C6p@4x>q6o6QM 3a,Z1Ms!n5AO8rpApD)J!>C-b &4pߡ _(sݸ*uqqpϼV#n9XQ1?#O za*qVqo[%jy8> T*=4WF߁D&Wty S nB,Q#{m8X꺇ap,JߌXUYǛ1ga ϺHŚ/w&u霾_'Xlc':OiUe݁9|⃓[e` &eL6nio2)Q;)$wbuF0Cd\I4A>k~O\DfDG$fThVdX]ws٪aAT, h@ZSX~-k AR:^{KrgLspX1()Z(\5Mo9Y\ !ag0zg`m0 cTw {vLG?{MZgG9& Ժh-/--ّ0ف ?dIuFfwrM?S.+] d02ԊZva-[ yl^{;c4& AhewX>m?J3dk(?7D3(@ͥ'?f|Ģ8VtԴOOMZr8U6~/"oCɯ1 4 0Gf])#vv6[sF8}홫yUjv-qZFɠ1*c٫*v+C hs r92B|qv8>"1I YJmX‹o1ޖ-h=?  #Ԃy c͖#Tz#iG^U:YNv슶[ŎxpHM~T*@W:NS=OTS1!6rhU)#o)!A_!CbO| ) Gmo5䬡>-g7;o WYX."$ɯ MpЖ}DJ ^P=`A:g^@J[$+[H!CG1Rw7Ǘ͎p% ].ZABg^5$.3C lt0bK{GluLycE ^bsg3sS#WMJK•B9kx9HDqӶ{CDz)9Xv iR'><]#" P!vhqmo:,k)~>o!Qݦ =6KSKɷCB)l PIʪYE2vjxͼ#b%+e"eɐQH^dB+" U [' -|MN -]Q+;VeB0cxeÿwPɗql5vk<ব8XgB7Q\}+&g=LLMgw)9 ¸Ӻzb1ABYLwžD ZV.`Fj(e[J!3W7;&4 46|zXн,AL!L!rmA*eAxHeK"(d%$iR=1HDu ^Rbh5>PcZzu N H=#'P?MEc,N{l.ÓGtQ K.Ea[8=YtB-I9 ǁ̐iAUSExWf65UnVNU}6|z粞?5[B{f8Qeiw7K{$TtSNjXwSc ʗNWBiOLs&K̢ÊUtR4&ץ0{=LؼPc2єo"R5`6DsLNM"}6=t}5?/y1^|;;ބY)>U61k֖z5xUݰq9#/l Hk8>9z9*PTȷQ /k}tbo30~BhATMI7h2!XIwWZEPq%a/I^d5j7-…~tT]JPh],v/J1TJ^=BK`=2qC\帻/C:4 A3R{;odRIguv: *ɔnn;BZC5Auj¶J TX%B< ejY\T3fΤ+pcԭő! 30D] -6`'XФ7"}^}Y2tn*ãB7BuٯtV_q@.؉=|`wt~c| )*IoT{T*Hm I;iP9veI5Fq'=#R݀5ʖIy}IDK8xU\R@^xPO(em²R<wIY-{np,n{ݣ1ƮNwj,` U{e/{ P*b[YW en%N1J &B2lS+4GB0>X6%_\Y+8A+\@zYL2z(-SgIoVUc^^7-/G([*qV& p|iƚljXԮTBA "yIElm Et"{ul%oϘgsn~ b4ٱ/#`Q4kGEZ(o?N6>["ݾM k^|RƱF=pڐEVanQJ6h12;SG<Jۮ_[{oiiW )x̶>"Fݪ H4 TUOUǫ|װ-ή~P&vqX޻tEi-pNڇ$CW&d2N3@%Ґ%~3.$7OVתGe8U0k6U$񟉆 ЩD eа>, xtP9ijpW2pptb\h{f|dV_wNЄ1 ǐ^T <{GYt4ſos:}-d'"۞a(= NVG\AqoWw'8G;zsJ0—~d-YXCa`3q}b oǰK.bf=F\eeQ ^I(!!W{o]n^%x>m}_`wokKg6jjjO1 ti.]a'"tU3Cߐ]lqPY41I!qB(=FB}/9eP" R[)56*l|hČ{Fo _a6A2h_#紞Ae |i>_5N]2GGs0( o̗8,O#t(|SIv{ v^ S6Cm/2L'+ƶŪa=Ám'T=He2t-~]ʋE*xUzuI̠))}y: ˛8ֆhsDFL-[jBtllq.Bڬ&C#Grڊ}A%%D&[lSNBh[A[6SFd?E,ϟIAO}HBѡoF2fi*+1g9 [ehE ιT#4K%Q=!ݸ[T+o%@.=uV [znKyZY_ɞGc㓉\N=6b gP,7E6Gn53þfH_L/><{_5?׼ #X:ز&e,yD0-,}@{dUq ,Dr czݨi}땰ZLil2@PTT "a1HU AjXрCoQ@0%1~Oրl=)>;_L Pun.,<[ R %]RhdҎYylo*WeZT4ڵNщA3;%r#Q5rB TOAtVB(,V,!xWwH/2u;im3 8QS|d 79nL$r Ȓr A7)zv2{,' a;Y<ϼ˔њZҷFtitqmuԝ,~$3d5y4 c^Aʺ;1N&-;ik&lruQKܻ^ JFQ2}%i/n=44j=~2=5 w<{ENpY])I%SMW^eKګYKbzj <:DW5N?6=MES"D2%4sS}϶H&skz‬ ]%'Tl#kq& djA3ʫt{\Y҈Rç߅=#74]hȏ\d] U9'33rO+aև)#FY[:k13(y*:~T(Vg,(h_c. !A%) c1Vx_tFƇ9[B{ 4 drkiB}+*%hȶiPG 2ј]xps;YT8S`KhN^?Hxt0d1$=g?AV 鍭&%HxKp .ӊ]+, FR'h,O.6|J \u|< _2դB'>qpvGZ7}HK0}|NNlk[}@<ςTѥչCjz#wL+]ߍIu+uiB=H|6qKҊ.VQn:gvp2t]=[? ox/ +d9Fl\\+a i#V0nWb{ PbtMhWQ RHfVME8+kR)̭vSCkB*Ƭ&:hO:ke`l 83ڌdXB$iвL㯇/ҟA(Y|iUo,o7zRW23Ϯ89`. X58D$ehewW *eׅUg1Ը0(jx0I\_QTEٶ,uH|e mYK7vq{F2}@ϭkzko,8,Ϟz&kv Br\3 vvb~DdժI%2+[5JAcմ !I[YVYi1X=ߠ{P3, Bh^:v#cΜ}R @"xv,35S XHE{ iMg.6eh[EI]^+{ )w-vë?+N]{JݳKL-F`v.!+ NwtZ|N3o^ f]k~aFhܪ1٩\Q µLlަH?SzH-(#.'Tv-.44`kLO8W/j@ѧh#J,Xǽ|Li!UPa>h 2Ugkپ&NhR7||WDPwG&tkA}Y扑B9Aj(KnքnTb]^%.(t*T|it3amɿ"\; #q N7LAq3H\}MO;V i͜ΐ`vsns}K%ɬ5:"*8=GbPg`7A`wz'q.#aU' YdQ=2f-{ [3ߴRp>OAgxtb0^WC[(NCv`^U_9ԁ}S=MѢ(?'eBgզGm2Nq!ǁtpT LCb0M6E/O~?pZ`idiqр- }w? Z'?E%|eQS)Cp7جP&=iZrIS4:*վE'yŝs巎wxgG%jb'^_'42A z:Bb4{ILI<φ&` %tiq;( `y8)xL鉽3I`\hF]'R3}V!qNmw Л6 ή)T.釲J?&("4e[RZeI~KmN]LQ(FG@ }~zYZTb+GgNS j|0%-eu4C)"w`NV]-_MjmתK<|7H@k~W,H XhFݩ]AO<,q56\*+h LpقWdUn^|yE[e6;UM.]_@Rm/%Gim`V Cmlny߼޾Ybᏸ&5I-PՆ}#S2uNs' Xf Js!zcC,>HK5J;$NX#Jq=YnnE Bl~Ե-4 ?'2ӥq>TL =W60'5۞|`BlkQpK&W'=!僚B#r}7E@K83?wNō(S`AA"n@d);@6WboW6Zx׌]/OG*O}("$fChA j#]6_]\acisaO]o^]=VW(~ wxM;0;a2mke]E쎹xGJ֙<7*;X`S+ 6#h 3a56La+(v{ iY:_wvM3/Ej`؂ȔZ&Bo(NlTS*Wb:Ìͥ)ux I.b `\KrOb0 zR-1qyݕm=@yTxbУ%i0hÈSB N#FQJeGV@ ŮݵćݭRCcuYg};I\_e7(QCIr_-ϯAEnjh^v17lGPPk҄dj>yxpv| u%*̴Mx q\\c˞ܝVr'&G0kT}Z[8Mc>4ƨ s9 +;^+CN[Y2Kd-WJJGzؔ qi AWѬ*ȏk(y\ r7Ob2zQ[&\CP-&Q|Ac~+ƗI!'gNv@Q`߷N(;? <6=_!5vJ;V6Vh< yl!qZd.nd:团EI 1{0Ѿ/R5P0"H?+ɐ'›׿߶Y`ԛUPQ|Y#O0AA);y]^x=MF9GsMF֢1üFUU'6h:(mAN=L4? ,e'kƺ\l3Ά`DE9n\"DQ?4GۅxvL" ޜ&l= Ev"&/̚n(u肃'ChyIKsQdB?SV<԰6Փ#ZqW`CW߸KIEnR~K B;`nS`uNDd~]['d]Vk4Te*J.cա)<= ԟ-:ޠh6+cʲCB $8eчd'-Lu YyWjޠ>XR=#vUM- ӞY΁-@=4apʥzdډm)Fe*4ՒfVu6w{V#/DzjRÕ̗!B*hCqJMV.5<1 " ]=Q8^ ȞMiyAWO s 0Vt;IDl 4؞zuFz[24)sWAٰl :,&w{mqD>Mx@(J.Pa0H܈Ǵ&Epe3|`$.`Qi Z{q HG _$|v02 B_DmQ9`gTq'j\a0!MPKeBMp|d;T3ޥsnB+do~_h5: i/@s߲m#gXmOx>RS6ga z8տz|$T.Ipwa6y<^IR^S*ii}zU_P@h;dsg;Ҧ734W`P<~?Zs:jA$9X9t #o^q+юP!F>;ӴZ.d3_Erdf%iMLכ~X[Jjn*uQ .`Hf k:!&zڂ癖86aK0&VOuIoK:S5ͤN$ŠV)6l?QA< K23Vtō=K|[#ж]؍#`^״0=- Ec@KeбB[jFDnO!vE籿AyhNO 8s?ـ Z}N;?%Rb/Ωf$c您x@ }c`nj G.@_(UyE!:ъN&u%Ɗ+-]o9 (OMoXbն2@3oجEq)xٴXmX(s[җԿ6kH_m~iulc-{wj'YZBg%3/Cxa?r $Y@>D sG9)錺62ü!WÌ@]~pDXz(6=Ivx&w ^:FX1mjD=KҤޢ!UJWi䙲9"r.;nXn Gg^E|P~2TՊ#m!BiEE|?kQyNld{G3xB~ sBͺ+\F #~o>1_3"afeKIa3{8<>pMf@\REr7N)`7+=esX3^CG!+AqE0V>zp5LaK$".iMx_w-uKl|u (W?i"g]i{"DXYKmP>2t*1,Z k}-"s՘:bntX{+=*ECMYtZ"v}:m]ԅŕJϽǁkyX1(0Nج@a.lPP_AVxە3fAUs$+@]b/X;C^[y33~£4: 7_4Ϋ YV-,pC e^F٫i%z,ۤBFJVȬu{=Swwo6!B.gVs.6Q#IAql^XNZS!@"ЧYv81rwq& y=|mVMMUɢz5X*͏HmlJ)|)EgZfk4^RovGA:j'a/F﫣)D┃d< #}7՜F)1!wMNj']Ufv^7](oǖz0 ۞WBh/cU]~M)o8U`>q!]F@bHyA&1Hvz|ԋ2}Tƚ-st=7SiDH/b 1ȏ0EMOt yHEj⢮bIJd&35DGsZǯ[t Z΄H'̃:0%ߺq=cqz!:T{- Ȕ0xvv|߂=Q rʍ[iD$62ݯa{X[?1`9\~Ő);SȦXR `V{ T7GsZQU+QY M7m=R QNq2[`~pQAպ:ܱ;d6E*T[=UDl UCsnS:si9vwL UBl҄_dH逡Cg)';DūR'FDǠdtc ~S-ȈPH|xʰ䪡nGH[Itjj}uyP|nJQF=,FB {x-Y]E}8πl>?bV%gĬ,m7 @A_U!2 rAD@X} r&?-ggC6!ՠqƬq-GEu7Ιc>flp:ĥ&!d\=30G?cL;>Kٖ;wRr*KQnż|z k jqmA1l{0}Ͼ C[G%0$A%I c͡ ˚B'!v 'BMTHx-T!̀oKA;u;o:?ȑ>cI\5g$g]'-Vؔ`!z^Ttλ@hRxĆя;/1j(_ u9뎭r G-=m?duՏn&]1 CL #jpe h?Lƺ;1Q&%O%8-.y &{pgp$MYjY,eUe0/&c&BވQp&yd DM}Ko dqgx{b rM{(l[~Zjt?8O3nA%-&rGh7t`~%9$Ђb57˯o,j.+ol~ݎel&&_X {'+R8Rf6n"4!Eu1rjqQL[9$ R=,4uN;_bseW{^GHQE"[g99BDh Tn ' @x k /oKk+XAKj> ^-MbB>dN?eM[fnrxƢ,c㺌plu|Dż :x*·p1K.˹SaS]+=g(Զzq}i|ǭ4#F/~\TںW/jŶa Zjfri֩ācIM>Rఠի#G Tjo`Y]^*ôpMR h#r_h'vB: \t"4pqC c`.`gf[4˛ _733rO dGhB өAk"! qmCmݭVBSrVMyy/@LBվU>[[/4 wϓK\5GTtTA43~_\梪e% &_HHw + l@r9 *E昶x4ȴ D!el~ ci]RSכҠ) >p.1veY$KZKjI5Hy&")Fޝ X+^P5z*ʭ#q !5#gf ;D!i.ieeqD/d,-ہ;Wd0[HUY,tnr#ھFH4P<*\4 ^`;Dp̛-0xMԊ84 <*Y0'Ѡ]O ,7 gfqH.! B_(sl(g~C|z08xvܑK qiզ![<꤉W9, TZ.r\ F%C)8@w#zt`DVСxKۅ(0~cE]7qvU_.&`yJ烶^T;M<${ 餪y&[aXI :ɋJW?F|kMt'iDaYt?Q' o)P< {_ tSQyjЖq2+;yXun ع0N|w!8+ε]e'h@U2ڥ^m?M>/yqâ>c QTJ;jy $o|E6 ,nm뽌)j8â1VᏲEͭH\1f#W=_X9r2"b0-XOTc1|`?:i˨Md$-d } <~?oszDkk.NI3>Ya]BϲǑ0?X͎; (1-qc%UGB@ʘ'SD)j&<&nPmjAA> SQDl֌I8);X6^!bC !;smt$:%UhJxikeiz 0zj6ڰ Dj6/ I웧%o쒃d]̥~>xP47>)6E]n7@2*ii,4~?ݓDO0Sxi ;ƵIW/%\UL$˥C|MWh&BfQHEj:McOȧTf𶰹!,P'gDyUio?13?D6'h:seťzlNXNh%@.gVR?~ 6a=|ԗnsgnsԽh-k5lvbm }t hTHcV`ĶE|^NXV[ڿV:ʦf=Th*ULS [xrO!YGxi$8w$\:L3`AWr WzS4,^Y 8(%h䥠zu=^Dž1qcORw i' U[6f ): dS7KzwN݊{Xw?t&b+wo R40nMzIE)/8婓~(٫R$ {d\}vsAQ &" z{ rf%Tgc3g|΂Fd6h| *7WFPڊ(YdG7@hK#Ma>05`brkY:\ QI._H>w=c)3;[T }1O^:jj7uK[p4X녰 WY*trHAhQ0b3#wTMZ;0֞7Hu(@ &%U<'++om%ķ4c=AzY#F!Cs+ykѐ)ѫpl!R3+[Y N|`>Ϋ֏c/Z[:*xWqsXzGDBvn8-"I_zl_Qt-fW(~)so0aSBDċ_nb@oxe`Fd9vut,UO/8rJ.g4i aFS 7B2lg5cz#XwC&!|5FL^"IWl-CVzG[tM%jRi&ߚ^m F]7>v$j`8(:M>;HWmUt32v'QkIλ I'!4kC}[_/2R:+kID ֨?2ٰުL _XX^x903(ʸev/2ix _诙UJ'g f`fD[daәlFY-ga2U!rqE}X${X)ߋ@!K3 0CUT"Ġb|dC@ꧮ.~L~q^v6]M1)D@,UΜo{^G`G`!5BlYL:S<7oFy♩곬x*Z46)k[mtQ8O+Qo(>cuD9YO{tK0HuZӁA.N&[W^0fRwKXnG%Jr s`Pj7xTP[zĉ`_+֨4$,īSG`OgrSAaefF1#g VUdJ[hf;a.X/aAr JjkY[|cxMϩz+c\z{jBJ` W=nwg2]##ngPt3q`&`p5ɪzb!G8 W">PrsvBj%0TU5ң$بLdOo*>Wq7{i:J(kSZx6ؤO< 1@Vz Mfι)}qbϒ~1sɻ#=wC$VT cAUA|}))H &G(xgŊoFU8M ]>OͮGmdACXJlޭ[̂ Vϟ9Q7,#QYdIxk D~EVY' RIܠޤ(cQz^%)4kUJoQ.5-vzNH /{QLa SL?+'O}qfrۚq3N룗[17A &j Tg;]pZ!Ap(FvL:0W $"}xq/<9KSa]|1P^BYˆVqĉw*A܎81eM^k!D?޴P!qhWHJ,_ hh8SS)GA;YT4-`w/'sU6QlZ2Zޔ I'Ƥw0Zќԣ%x+-~^J4$*qKAnG>l%)^EMorp_<,;>YyO0cb+о`-}:9OSLJfƄ [} H ,ޅUYTJoҹuWW]qn8&XYUL 03nKmŪh4=Dx*KܤI1Pyؒ2UP޷: tJsS`^%SGo+ha*;;F08 [t?H58Fcn^ڪԸb]<9RBN"בdeF[l)>{P܆/J˓AT 3{˴uQm Kzy+UD+֦˰_VHf/zjܤ{VeJWSQH3z3N:/1dTLlb髇nWR*Gv&j߹g#war>KؙTvq;Ўx\chRwH*nȌ BjD RBesPX}7 Hutȓ ހ^m6<=${< m̈-~˨q {@aHG$L4p}+Ԏ6 O'c'tNԟ]S!k0Y>Y_$MEd]d1jmqAfpj7}@z+ Z"t1- ׫mAa 'Jl144}i>9͓>*;g F:ӔIFкo J.}[ͳ+boMsOWx~D#?>; ٺq>ϑfb 5 D8yStQeK۴p΅%ڞ,WfS;7<&t\z> a9co6O4 +m>7n7,9U0jV ?_ژ}lw}QeW抇ǘ3*0"UTRT28~Sn`]sG/k(9^rNe'DJb_c :QTb [.~_+H]3dwi yV/Rԯq͘ni e::ouۥKP))@rM$ߝ<F:a4VOrrXGXIB$]Ș?H=F\TNQUغS_pn F:_hihU_9/Z.J$wcb;]zŅ_p^`}ucyϲu0h˿1vkFd0LA `m;-COej]kgJ${Ѵ4&@Oqxʮ8=㾝#0A/;//蟿KHZˣw@S/)1`ɖ3iG#1=>cBHl,Ԧ^lgpEY#6|߮z .f)_ Nԏ2|PdƦ_[OM͌wlO qs1^#E.撫+fwnhodoz3`:0#ַ]tǹX,4b_ΈmV9Y߲ule"4죊o:'nη8 +kTc?gj&brT]h~9m?NbZ"yuEUE|j?nyH{tl\%499O 8,W+gd" xZJ=`|G 0^Az,j]VZofj4q\d@2fǨ Sb!qw@+ovRF4ߜeԔ\ gx# <sW믬7+C l*bBB G l Ͽw߳7n&!SF}uIGi' [gĦ5ae`I"JTn_9~[f+䥷 |##VWѪ j:EMҤhèm`i]e~G+$@r*+;!T8/8 U=4% J4)ba@+!+.dc[:O4+===8͆j]rd| O=SؑoX xR>ArBF7Mʋ?;D[rBH:P%xh7U $w7MધU{SD$h I" 5| i(7?$Q}'@2Ve( 1`Vo]}͍C/j !>&FrPp˯=\YpXhaE'(Oؤ=ŤXF73LvƒIػ0N-eUc& j|:^BФbkS ,vTW%k;xJXV劏b1UM%kae@HWIMO[Q $~F>Vgֆ1$MA{@] /q|BTIPtcWx  73o"&`uz̧M vfi)Uuʍbv?Ղ">:*S^LFGa3.3tGnrBHA^O[% oZd'Ѐ2H؄{\(Jy0J=]~&HկR9T.=hurfd훪l¤e9|@Bɺo;r$"2]8AOx w]AzɕneM5͸PM5m5mj3: 4 [偀1|~ 7h\5Zǩ@r'|d:i_2 PehUH,}C1+iYG6ɑ'̖m@9'g*E 3&p1}c\ެz!?VaA\ ʐP\nRO"ǜ=k@ y3ftR  d' ȎmiT'&7|,Sm _ b "ˋÐD* NG?xIvW9OE#Y`#P֭+R#E-׷Sn"^l\|#Y7֋ߌ[mPT`(jj k ot4>qZPZi. Ohu1'N-9,$2v-)h,-N+k-cMg izu-BqU] T k>3(P* Fq-es1 @ s!nI@HnrK<l>amgF6ikuo)_S]BͨJCI8,c>E(8"c5MT%d2Ar\˾`AQqQ ѯjiH|3 E+ȸ+ˬ¶\$az>EB:0Xf4y9`f˰9i40m9^i=>L+<,#2F-9,`Ҡ>O*g 22{ ާs|Kj{`ox72:vJ"4ήsQpүNZ=׼pe5Ul\O2Maz$1/V;YP> JP]On%D]XAlh iƤk z)sYs䢶sڠ|TbIG*)NI+C1'@\*^,T#ܢ1?g!˃c"djk_Ul"53 y)Jh 6HG=&;8) LG. ȈrL+2Uuؿ/}+SPRd b5CKWoDB闎] `:ВDAiN8ѣj W%NOO@,]QVW +vs 15**w!&圶lH%KZ" yB๽R!x)!a9d uyհ\Z WPUË|Dd/-ᚎ~+ӴOńJ/v?~ {b bG'6ٴʩb:JUqe8qHuV-JD4]P0 |XҭTQlFyLҦQmZ֓x:>8!A^g)h=Q{OkE./ 0w@$7C. `1z:b>xLBF$8f1^ݾʆcŜM1NЎu>5Yɹ Ѿα,iǟDѥ(|3T.b R:hCIʸb ?a(Ѵ-K4gq(q]uR>oi;a5['Nƙ.]ک cNL?dnG ڶK bb,L:/ RjRɋe&-,?C5$S}$1ykBr5<J6\^@9$}W2e*u- <#F}"'A-_1MqX$ iI]~0h0홅}h*.&e9&.\s>>4#0ժI}(WflŤI'PŸs!t<p" #\%A Lq%ݘpD=IciGl.Zjl@_RZvQQSavВ]#G$ nǏ=拻x }΂Kp}!,2F4jOn4Th'z _ĽGfȓ*EF8 ϦS|=^rUlmk]}ywwbXt#N ^.DIqoz rۙrm{- 89(G [zN/y&ŭDh{%NSCHihh->bLtYl NG׵U>T _L]ROP}^4cqPi?%t @RJ_ !$d:J-HOOhh%䲜}xG1es`FKe* X豕KԾkC!k)@Jn(ؾ{LH3V3dZp5צGWO]F@yCW1\U'bmG ~z x`9[]X\h[oA_ԗЈ[O)LnQb=IZkTG "؁ r+G?{A>ZE!&3ݎ lW8a^Ȣmf`LI "Ry$o3-QqX~SD p\6mt.$({h_ C C{IjI'Q- @y9l }KQTc֢ljQO W2#8uc6ɕ3& J H;bSQ|;] I2&n)'tM\`\K ݺ]UgXToSl_s~z(6dd8WA;O/7g!NAT {tOD=8ߩQߎ͢||l)gHˌs[&GY˸+D,aI }wˀgBQ[\<ڥ23) xȾ8dK/w- \Fxrvribכ L,vz;:;]6}T|QVS7㵝jyy-|N 1닣UVnn\(=3^qjy7)y^dy+8f$1CWʖN[X<ysZTlOmWou͒ZFXΐJWYym[K*mgaթgF`__?BlJPrzN֊#AGmL023 uh`m1iӟݸXTLRh?)M(Xv}Ϳ=Z$o)Iƻ-9}7ssײ^jq;z/ MIdrQR5r4~ٹ17\ hz\<_r*8ҬЁ«,5WTV{t#JFC3/wIgÿMV?S&A"3Rϋ |b$S/9̌JQ@s5czG©J`}xYhbF9 u 0F{|gWFWsBuVx«A`9&p+K<-nA顈Bv-tƸr.{Iഎ+.5`AV+dYx݆Z<m45o.G變2ZI*I%  n cCi^Ƀ>4epPY,)@j__#G^?J.k_3@3Ӌ3y"$24Z%1! AnE^vzc⾞Ҫ3MFWAvj6+(C#ۦc `-r \O>X3 )/ݾA[Nolim^;(ϫ3,UTЬfP-0k[632߲7) b~,8'UB)Ob6M3S p`PDE" ?' P@ @ XŽfR !&KѿTǩXRKi/="R]-9pO隿/ସ3e.xy[QViK.ڑ'W0}6wߤORC8w(ʌ۰Yc+@j%RukI[kG6Q AB/. t$3'YVd\ENXS{D jeK,Hvg (qхߝ:EwZakʓ᱗Z_|Xf7&8^iU НAd$?G ,w;/r)Ԉ]w>*DdEY9>x/ڨLpG [\lQ-⓹] K0o1mz[!ؐCoZ3⬖ ]2a`3?W27fjzb@ta^-/{{ vTπ'./XQMz mE6X D.zHc-s3K\u_f̔}/za%0ې1s f 6Ŧ>ʈFmɷW#7=!ry߭%\WF99 ?k%1AIHϏ{P-O~*KZ?[*CԢ ^-ݠH'5~?cWJ&&*I#)Uq%l b{\gp7;n-ౢHjLnjT?nbwsfNy"go}pk8MaGkzPJLX\C ]#,,Xs |/ƅO r7O .9Ӳ~ 1&ԗ&)1Mя234+WTqp-/jA^KUCx`Y5XA-qROAt7ES欰"y#ar|.XGd 1\fג6uƀܛʥ05WozxIޙ8 ef.}$睬ܥ G֒d\tဲ|Ƌv6G;cꖀ*l̴2T<ck䍦3a&bglF{+L\s#V|oNR6M Ed"/$'&ex{zXJ+|w @Tb{:Yc*:+XlWvÞ3/DvV [t鲹 JqEP-M0ŭ&)sqH{3xA)iElV*,cIuͶ{yneUo@u6h2 $zp*/21&͞= 3]#,)#Ah/q\ ?~tG粢ιJiHkF,NdCME?XrOmMg= TqvuJ3~>`GW 妣N:%ƭ`EHC p"kiJG}tV`,9. zB1l:,]|jqJ9` ܭҋ.Kً|eyq!dS2uqb%= =El8ͯZT&nDlG孧1[dwFӎ| :] 5P}+Q']jXurC9I#̳4B>0#'0ahFi `Boh C~=-i;"h陰mLeu Y6` sO(8m:y`/UioP"TTI@ݰ*(Hz0$INñQ<͹~jU)Qbv3kgXlRf⸹_xشZD24p q"* [,G^lWM^85_`Of% P\n0,Z;}r&mFz-`|#2S ]Scy~Tdޢ5ʳx4Ȝ.-oP[ddNI]ҧђiEL1a^1o)#kO0S4BǪI5>A$/>tqVtX$S& $A|JDrC5VAIN& ֧lbg2z;Ĥ4Ӯ`L|n[Ȃ֎pDxF;ɚ< Y by<(ȸ''mJAۋ8R$8Z_P\8QK2E{i7Iu<sZuv%`Oxb<ly?UZy=WXBѩy4goп1†/lj6`f _-{>kϳM9SW̦mG14 S:gԹWb i,)VZ".4 c,SĭM|ɧB$+8Wϭۮ2u,,m@ q_@Nov->\D/]c{eiA[k菻@5xjNK0L#tHz {5OhQ)]%gj/^] 'T'O-{";6Qˈr?ey( K q7g1,{s-kӑl[6CԤ2TlrYɚWtw |ŋhZAsת=)#l{y 1^&+4^{[0jO qвQ=KN6'9:f!0;Z}[CIqcbNt!t{3#ܵ4൛JQ{ʷRG$1R{ů:W UGqhGP\H{Os q^/6sDlbHk JCmSǾ+vKZ~0˞V%L.‰|6`T˯G]lVYT >t{KOVj+{p= ug)&vEa!?HwW[Şab? aJNhpZMHfh2?[2"h ,xsyOc o ʓ@u m $9qGH2nKU6l!%hfj[4Nx;H_>WB. `;c9lk8A Y5H)%HdtH 5U:lS?c~o->:R)#:Uy-ŝnqS'`zoC[2˺Ͼ=k,kPv0 fDe+AhmHfcJ٪kXtݪ>P NàwR>2 ZGWxj0/0|e"$1S,N;FpG;z"Qr9dŏ꫋Pԥz1<'#@3cJ{X_I_9?w=2jΑ/ODP3DJA'5)2 /UrLw?$F骙i=U%S-6\ B2ID ~p7ihI ƳNmJ kWj64 "̃?m4V9+Z/xT1SP} g)qOׅڵEixɵJL?f]G4f1GX贛?,u7ݩ~IbnЕa+Kwj,we={ E'4+>6pblB>K i ۾Y4Ix6^lxԴI䊤bO;D-=\K:v`Ảra !DWL=?q_-ױnW);fbBXy.[!3 <hfhjĻ{$smBVH᫄XRIEs;uq'R{(,GlYL)mbwBR =&0[^Dh̦&L~#d27VJx/8Kbʭ,xτNm ]2[6v~uhȓ:ߣ*읎Ql@p椈83SM&HdsԤhePM_=.e ՖICSF?ڼz|0anEwBo'J.ceN]@[sƠDӶ3%ekѺz…Fcgo3nae')&0u|(q Qp%ٓ y' އϣGH*I].oㆫC_m]*L `Xv&(t(G_&ҿWEkP ,~lMhLmi>qt4֗&p߶׉nWU>/Qʺ(C> 淣G 3A> *TD*&FD90#yZ1{ 0i~pcOL'HsO.+v롼&HEpѴz)쁓Zq&Ku mA?d%=1OnJ氤lIE-1m 0д1(4%}m&V#ka%:j( OP%#QGthɟ%KQZ 'FbjQ 7PȲRE &~krPX^ ``gu$sC}d\z_S(%p4—]fO^(}Mx&PA Ïx>sl>jd4X+ k7h/{>_ڦ)N/TSWCo$9񩋚 uKj`vagVkܸqC?GV)iGnh4&;YSvE;բ )ujD.Jx ];Ő4wֱ*gTg_C[; Z^sFu}٦wOEJX֪mD>=[K<-Ѵk&J-qm A-h %T]_.Iղm7Z=9vS=IdBɶdcVķڗl4L܏䃇DR `d?HKmC-O΢+=7> _i[4ʇR;SRO!/KY~A3Bߺca5LpM[Q `w$P?,$GܸщzFGaHgq!t(h;#U:(fDvEW ˻#ŠN ^/Q%9/O9.&tn/; u- fO4활QIC-5B[r I$A) !5mpNäٯH#V$E[;UG:}@ÔYπ93)!5C1^c ,hA> ٱ VIҜcve⢖4Ħ_On\h +#GoW(frk=\pe)K9z!l/0[ ;6Szfԫ1B㹐IdRXV35?-zIR{%Sf\ZH {A0npiH,Nl3.hAc.yR 0udC]^$xyN:~*',5#Yt2\8OȭwC>aGc8ͺ MSLqïq:usG7i.|ApAlJy=zS$ҩJ]"s+VA_߂C͓v(qw%VCW|m M2at.>]\n>&O.cxx>|sx긛E0Ǜ  RwQob,tR耺@R~0+7 w2{vd?XتqZ6;q߆hyJ(Yܟ&̟ɏ@Td&ҭ:Cv}~;u|:@g ]^y `Syo.W[%Shi`-wX6Vi/_#v9$IDʀ}(r3ԀV٢>]3מP[ > uj +?y>m^st}CAMVo_.cw5z5 q( >,鄥FpYT*d_Tj)) ʊM)ϴi~s㋮?tMl/tXi_Lr^cMbfrg m8yKm:$PI %gm 'βn'negX]dhXϯh:_%`8oY<~+{ dqtpp:R%NR0eUіcNJ'Cz's'?eY3]d: 62e43-Xi>! غ 3F]7 Hh_Cr!5gexJ3{d9ט1 !;Kǽa..x m֚a xV :Z}SujRi]EEIT?S9f((T*{OY @q@.-v |^ᔮ0+ɱmA:3za61ѷw[`}eDO]D \bY9e'$3Z z^]T܇-$3ߏ[YdMOQHYxi,ũYuu'q!t&x[To7~Ms3׫ Hj/^43(@[3lSzFmzZ.CEtA=ORIaBJ=tD,RYB#7֝"4P8 &(ίLnMtrQ1Z&z&TT"f <iX*-suk!%+Ao맄U pC%%p%*JmaLP9aosθP,1(yh i0|zj Q wjI6:NE :l4fd#ѵNY'BUFZM`8+ Hi֯G{6kYej9;rdSjSJ7߀#׾Vvfg6ۈ[cbgqBGL>TU)*ܮGR:蛚ml'_Y%¿(5- 0f`>L5' nQhP(7:A49%v6R*rϼսxC1ԏ {Q+ߗɸQ!Nk܁!I 16+:ӻ1jbWjpayE}\*IxU_s$ K:!+ŀ'Y>b؛hx=}?z&r=&on#%M{ͿYOm A[Am`gʚ1 =:RRhIHYO3y`P+N//\Bnd/'hLe*00E"41e>9<" Z\k}VeчtOb kEͩF)gs"(f~ mo@k\=cY: ortEWU-iUÆO^׬< d%BJH>B{2:mcNǸQ5ř˟ttȇϕǿV['C>.^nB@&ևlw~/)L9D+^U.u2>gd[n34 ֗iӂP ZțH%מa\6 8  p,^":ǝiommēu^I1Dc2j#"|yAVWu+WdSruŚfi6[MOqwL+b/%<#1p/5P 9EfJ(g( "`;盨>X:؉AAO˂q  mjXBViiXkKX|qrOU`ע VqCr{sN=NET!to} L_0f.Sxb-(bsTQOꜩB1I8$5Qv }Hs`o⿀5u ~)9A6 n\Y϶d(ʲN I-)L*nFi賎H1/0n3+޶tU5CMs®~m"?~2EAmG88U-Ijaa4ߕxfTtD.,s׌,+QӵVo 2͠V|i,(/(ȑ2jWWIvcuTg {9?6t1Cw. _Ftde?:9qy8!Mu%T"5RNifyn`^M!vH* IQUNKlFX-vV&1873*:Ϻrk2\'nφ38nMx(>,DIm:(c8=5҃`]Z&?5pF %M%cC#u(=F"'&N6XJᩩz%UԠ[淶f4|~O' XO8_M"&QRTc?G}tl:#҃5UQQétcK_2=X.!ЀG_1K:jG`xx|RvTL3*Hk]]/(WZ ew{vTͭ'#ؓYs甸!s4uۀ_ @ y ݸEփ)k.fE rE,MB#j췻ca.4~F|R:wQ aGYDc+u}f4m zSfN X36z" ^uTc|9bE3Ly~MTǢ/.2#fipBD]W-]:%)ieVڪ &EDLgbMǽMѪa^rƒrI"7eekQ|\PԵ0)"DD3uc+~F:"7 6ju}q{-% =61ꦐᦊNwڦMQU 5b:Rz)$?\;j>FZhBI1#>DJ*=) &N-`d0Yjbr5ɷTQ *oxBqgOQS#%)f3cu}h Ct(9X]NEcܹ~glﵽޤЇdfol)bl}ʹ*-P8^1N]7Ku$a~ #J/5tJQ RGײ$ G_ARl Ls݅,+,۷Va3ybEyΣxYM1{Kd[Si@wdxVз<--r`];-^DD\II*2V$j㟚-=?rן)`M"72j]<^yǠk~IՁh̎*xlzhvכPC'<~?w:~<(b-!^m^{8w(ݣ"*xYPyZ材=S/@0) ZDu gm;6ʌ4Npj#JTؤ6RS(nW2ޭuCN@L59~5׳-I7OIʔ*n*!> Vh.YAͯxC;wnK)\śHf(P&8룭<+9wf8v[kO!Y=w3-xr3wXz_RcbFĝڱ rtv|R/e!֨@Au,#bĮqT4y Ia4(-k)poy\mݐb3c,W1kF^ﵿ=!A@kg@U:y lI_}{Wa#jO E"w(:FפA&1dTkd5sާJj92 @$z$E6)?e=ӎ[|)e[k/hM @u1i f;*fКCQ%PCs&wۨ`w`SyX5JxQdJ?hl󑡀y\P\/<ל x/ ,f.SEۿ#;n1A'^ڎ4tf|p&+bYcXn_u@c(E4r6Vt߆o-AB:.b #5N ;E7n ]n=o]NNTdԃԽ!kN=œ ̿q)W{2f9u\!!Wf60VЙbY` M>S|5 6 o!~9m Bwo(-g}iwg& ;U$|T}ۨkY4#\`n/i_-GrȇP`fI7_qu=1oO"Ցdߴűbk`#ТkcOcd(~r,eTe_I҄c1 b;|;)؍ 桘|N9&!~w>I\6tk)X{`3kkI7m!ps,2b^ȕ(\i+i=(>I7Vx9ղH]0= $IZϥ#$9{S MÞaPK9sJay? 5sжh T懻ЀDI5C(S.HuJC_W)]Щ bCItZDBȏ~k3 zYC774dN%C8W C~+l|Wg-9p Ҭe%ܡ&v*HΨ[6C= >>U>';3Фn]3J ^T(p(LUT2+z|#g??#y?.p8q.Uzn+E=S!7Q2Q,E2Wɼt:UeH>i@6#ڨ+lO j]VWf?lhKG2۱hOWgieyZ 5du#By ]c$h!/0m(&0̑㭧yOp=;Zbe=J%-;Z2 mm#R{ "ٸ3C"%] ; Yv#p>-B<伲AcS彖-S̭Jޏ7u?X HMB" O=RzLm{^uZ'ֺܝo) 8*q=dãQEEJ/ 02A,JlR%ΣliNޅ/vP?še N:C $Bkh^j]<g&iVM˥ wB'JмTdu Ѕa> ґXGAĉy<p&v~O,emHKeWj[/%Hcn4cXs P _\6!w糾[3'{;5ܖ vDK_t h֙UpyZSs\ySu\^S}ܰ1 ͭK\Jѡ QC_z?}櫧n3=~c,cXʹ' ⴻ>M 2=ڏ}3#IFvImW!r&rmeas5Q-UCNF?H( xEd| 1 y셅;1 I2$n/HXyKVaZ sGl#AMczmΝNLFN8!9,(Y/泓l{fqf 0Rf $@>T-d:/zP48QGP2vZkRb Ya?#E?K;siA6~Xp{8mt$Fڵص=ffiηGM򞞟h#$8koVvskβ{al y / lƮ*-MGݵ^H0[`I7Tr&-f.㾞'8r^]Nj2dP3ج/QL킍0*:bO43,AP 7kG{%xe3qauAL9YͭXMY09~πG*@d^c[=t3a ={nqx& z ;{C~N=UnYv=4{:>Sfs0 Ҧ&Y {#T;E8W~mp{vg<xn9l5X%y$?gY`ƻf%y㿳̘ч9Wi'gc8L /wG_G[,}wV7NϰZ%B_u|*Iԍ[3.k3_J58l'LYx#5VG}kAF™qLLxDOleR<ȐSȱ[.h!"-n;٥d܎y eF0,nj8bLJ<@VKes--K4Mi*8 7\ #"O^e9჉h@~L  >9bS5 2hG UgP Z%z47v Z{Jb[_+'YRs h 7hdҸ[vcTYXf+6jh-Y/:J}:Z0l~:=8H G )% p!K䇎7*idklp5Y|M9O0K֨GE(_'Ψ-?#FJo%҇{u2|pd-yR=TAֱp닷IAFv ې _si}nҧT2yR7OҢvЙuB;T.M$˄eHLK߆9VCRmx΁ zi?n U5ss^5X>5p=BfBdN ,ygtV|x2u90üv͊9 ˒% _s7%KwxXzĶw_TidÂD0}ݝ"OnW=ȇBKn`^Iܺ-*,qUWܠq=xW¶ݐF/w 5<0O---5s8hPuxot"WcC"#)AՄ{Y)iXdl`Rk{۪tKy$y<9`Xޠf?CT}>=oM}Ti@`hvo s&VXT,VQJP6C%3tF~rFikA={Pex%< )srnc%MePf.D Sg2ވ5q&J#)%=ZK]b`G"it]غ`"X(/^j vlYE< ; "aQ?k%ΠN0r " *? kI֬ʋoi2Pjt4ЦQeR9[G"ÿI\ޮlO2qriGtꮃ3c)qx@;V f7 |׆\fap!(rn-4MRbz3Z+tW Gt9 WN/w>ƍ骀PM64M-fA]z,He@2+'\'yDOe 1R>]zR;6Dd-tiQx*w} } dvl<#z@UNF;rH'ѥyɿip 1 LV{!k^ #sDǢ0*v1! &(|kl~tN ]0#,9GQ@7"xa;G{PRrqmYx yʩK>ue4{Nr ;MX G܃#^ǎ>Ү KgnuȽ|+OxA BTiH- ؉#{w'45KZuߩAs\mY9?'0\|9f U;~f[I‚.=rX#qRs!sq]<Γm-DP\eTՇAOWBJ:Ċ 愰HM3X5ReBbYB-qI%w 3FHz,ٚN,j:z4Y#[}"{fDs-[Lz/S޲U4.Z]=yݢC}Ŧ_½0wc. Yt5W=0B7{i odiE'q%'-Freg Jܶ-З):oaWO:C+P%@" F,dlUK 2lh@^ R >1lȣ𼏴JmIKi8@]7PҮY`gQ/h|xv^麱 s,w5"Ws&[Ž6_uUt>CQ$ Ei|l: Ggj q6MyQ> qh-K`*x?@4{A "/WÈEn/&[SS{;XTizc "OqcK PJw$PSJ!oUP+)ˀ!NPqڼ{fb%_zȴȔp vKo.|' lEl鴓{Jj+ Q\: Wy:̫!^z^C|it\3bw1$Y9$}O<#+X| lJJ 0 @l?*JaÎl!GCF4s!+ƪ4s0.7yc;da~MzeW"Q}}١'z+Y!nuxahkRBm* C -7@+w8p'Uv[Tr VdR O U\ٴCiNc)D!ha 50^5 Lͷ¦2J9wL][dІY}_/r[p@ 3[s~jkI[wY_Zs(5ˮЛod{\VPA--/!m dQOn p?,11~usիZaNDA0~ \3.N_^2v< AbL ]Bbr  Vl8OO)}x}EfAo&4M,B pHrV7Ɋ8J\N@c;i\4I34'qXϩ)SnjJ ~v$(fG8sVdcҙk8AٺA1 ^pHS 9^öm/IPhHl쑌wO )"zSifuXgFa>I¶_qCiiL=t"nSܮZ8ӑnzAONd݋VChFcTf?[@YE 3/r):<6V4P>n-mCBozn&1JaU)Y0x*t7_yTx !ڭ.ւXK־)_c|?p^fQt+ m 0]g lf"(wٞEu  r?H<=B< ܜH>r0$.K7 ?ibx5B)2=VՈ|^ן!cet919^-Π|/'  1M8b g*$CFX~?SqIj0{bP1E[3|psʆe:T{j=#(wV~fŐvM._wőfӻ Sg=&G_v3cn-a#WLWO:!p Xx(3#|5\ u HO8&PYx5/^4ң^퉚ău OV1+=Sd zNXb=GY|zSiEˎ+/X>sJ/DsIILxw1m'ebcR; $%n y;WT> d) o+ƶ.Q7S+'U|JԐrn3P ?oy#_!/0BZKX@BaA1y\LʉGh` K>ߠ #IVf]:yTC- `m6~ >'=4,'+j^uΝjVt4v RO&8r} r\-Cvzˠ ,P|˘⠂kdE{X=fZ, I{BŊ FŸݢFJrB[X`I0PZO6bpT 9czJq[u75ȅKejfWhsGqjc98rƗ['bqݺMdp-q5- DpYY`SPBU\Ykg2٭3uǥ͖=ʈ|[z>SE *E:ky”>$IgfVO2'pYu|lRM{ɲЁLK(e׫qmҸw!m9w<7=Mf,vF h&f78 YK(rب;T yl.e:vV!="< _t^Mi()l12Eϲ;c,ѥNM=9!{1.S9x y2:<K ~cfu-|z̀AJBE5"ٕ~ɬKq#ڼ 7Gވw,3{b?J>n~Vktr rӦ>j-)A(Dy c!L{Ds @7O4X+%D 6a"U8:Vո( mtӉWnϠ,`)#_ &LZxI0F#Hh._ș#~ՇmNܨRqXhufo5~o,'unucUqƮlJ#˰k )*6jM'>y9Sg4Ց1M{:s2v!Ge*<"/=pc!Q-7nlFryG;i5w)P'!2`;@J|v#+t8.ukxڕ= =fk3,>8:As|;ĸPg&L]⯼!O7 t/:0H@"Y miKsఢRsf)FscBؐL=:m\#~}2HOBeR-:( '<̅X){C?*b P 5zeGp~-IH3G-2AMF; S3PUi7>LTNOZuDhS8m9A܎4op1jzj }*4Аc;BT'X+ؚb@ЗtƑ}F QI$#^;r",?@YH_{}Meall`fzeV6B#z!膨ufL.f8f#ʍ𙷧 |YB}g !MS[j]\Or'- `gu_ޛd+9xB,p[юbPg>U"l=Y)#ŇB'SrPH00:OT)$ 5 kD< dtjޔqmմK<b"DD^HNk!=R V)5Ht/˹.4/EͅuZGxDVxp,TQKd2TuzZ+ӱ}4? [R"GA܁̨Sϓbҡ`+)sUW s!Fm>᡺iG%S,pN[jx3?WgOJ'Ͷ@N%P 37e8^ \n_U+O;6M@ 2%㚓\-a'=/ H"66upWR =T#/%@}*"^_ ;Ib.&+p0ֈI!1>71"c{r=usȀfs@i,ɞCh|?x.T sWLipDM7$^[jbqe*IWTNR4P& ʣ:*t&3ޜ٤*\%tAZib"k/O$H/\uoT+ȸTb+.{иt)9 = lU_v7I6CZ'&s@'uSxHVI/9Ɔq^nKYM~H=tQP_8?\uY;^mH6t8nh$=AF 8 {дǦ>Tb5Hl uTgGpn -'lA䋢iU+̀ 5)'e5+(CDJ|`Gs-幨٩iHjМ$y \:I'7Ʉc`C3y,^#ڇƉD'Fr4&V U{Gмz_͝öoLM!FXR\~/m;bXp<6PZ T^=(rq jQQުRC TW{0LrXo@|:n"AECXTEpfHEٱ5c_-3+2{YV"uwnfHj\b}cV|.Ì+rseFHߚXKre{$\gM''b}7't/e9vZmz辶_P& "s>'{)EF{'(j ?βp]<, hnHR8"$=B.7:=GYt1IJ*r ,+jfу,,Á̪v=j-$4¤_"=2hXMz)cՕzC6]dj~\"0'Ouj2Nq@!{W.1QZ8#Xia?‰g H>N[L#4 %BӸluDN9FO\sa $B AEaJEl>/J oCH=tvv 𼾪060#.P9m]`+kyLi eȗ.6{ji"k25g 4Agc9=[ FX\IRcGf~Rfra'@j 0(S״Ꜽ.޽N35!<{VܬW.%yym\K$6GO=OaөZ_+OikA*Z-GgYF!>Qm$:E#p(ik1{b ̯_J?Ի erm#f\=Ny"#0vpt8DOu$I8譭pϧ羸<(C/u(}}wbMOzh%T˴=bp݄J X@WegB}1bQ2ou(?*1>MINFD] ;j[^Fb5u!b,*R?*aTBEZgB9oҞc鴇5<\^D*xkmN[BVJq}:$X$lHǙg#}Q(ZZ`OTاХ%E~ot}pgؽV[P wdv(2"Gljfr\9Rxq@dYU^<evȝLEd!l:oYUmAUa/8LlޘrW%Y7,S/՚=|h-9.=)Q1!M:":t /ۗr[c:C\&PMՊb'a,DVE=C,YE<=m2ilKq\.^`͢v/g8g~[_°Ao$"[3ba}9u*+)˒=*C+x=@勷V+PS쨁ES̃4e{~L+<&R"FĪ|;*F>kSxRkL.iK4f&և%N ""p=L;ox1%rҫ̕)bJ a2KϣB`u˯eThtpV6"w@ g%CXgs˕}OHl[^?$ln3Tg>wɜ1a]6dXX."dbJ6b% MЬ@vvʜ],A P=he.ݝy7З'UkWB 5 yfcv;L5_oR"mܬRj)5`NP2ԷƜ1;qML+WzRic۵7]5-n]<=)%%&YH13n`^":ւXfY po`,ZCbWK sC; >JQ7C32þ2t~ f%G.h?ǨQE$aw@ <5B<~kWJ0ߘgoZsŋnŝ,Szk/uL;/@9~DV^W¨Nx_83~'=k 4FQ{湥5|UsaW@8P53 jCY? %zn"9A'#1^qE(?Z7q}V&6ô͒fZF+]k __Sq jͨf05!HɝT,3Z: 9W3sV|ٔ?@>j61 VA}d|ɝHқ}،፣r*) zcX ybzoܣ2@ I<'];g?l"dƜxL y)U|0ԺЀۙC8*4S#^SŲ ~~wZ} #7 8 {琠5`1gd:O6݆= g% 1fĨm=jd?3" \2iTZJ(Evjn mRFow UD*DC XوP-ܹg:TJ@[;^/q*^pYOFM1ctBYDRO}_ŋK=GPew,bʮDB{]ԛר#̆+VDP Ԣ<ʆ{v5MMD;܎guP@z{)u7D6vl!_`^r9I̢F&pHݺjMNLw,Jw˭ ^Ws%d* ̔ nMD"6lR{ӳeԣ[| ʃb U)M|DJKt{'0HdنMEk2M#.{RڇuDG=9 S>nCX!&b2&-OjhkwO*6|:wY kz@Gs2Kt"V7z8:FB7Wԫ$#NZ)WIQHʙwJxVís̘?\B+/y%i ~ 䋞Lp+Y&s.!JKdAk沆 6X(I$7xY@$> ¥ŠBܧ{*&siAǭ-;8>0ÿoIYe(c(KMqșkG\&}@Nw\rg.6[-nOm2zUA{OK@f5!sn.;<"T>Cu;:b@1F5ki~\#MlqMp#Z9+=*l%psAdؽ|"VFx4k0*1Eᱬ?z[% 7tV79)_G\ TbB^c3hz#o~z4 +zӃBrEҮF/sB&`|, E*qKOGC0%lz$ޮzS7BwUEW+$DZ%B"mCSO%ư=KK@Bd=#7ƗwFMK6m 5 lEi1.I?[Yo(Xᇉu۾T3gAԴ%¼ iU$3Lt3j #H )Y7z 3d*8$2fO8eT&PMEr|tK6>!bvkKٖ3ߖO鑳^ESA!V)7=шt+#Wnb!},d%[\G 0 ` ݵ)H!<=̥҆~771'a:zg,JpVt1~6xN Aш~СbmAlC>=/<'@R!Ģ߳"Cŗ&k+7Pѥ`- ;lWG&vo=^jnr6F$F rپsF i4BṘm^")͆ XD pB%A=!.հwGHNEUXV@ ]+=iwb9|B/z)C 3jz22F=Ԡ*۬ڮgdeٻ;zM9GcEZ%[d:n,Q=4@3Z8Y:B#ad$ gV_Q2X9NC6!8|&o@H} G}6{s9`}gL2AA^u=]eIR8w%hX[{GEҧɦ;JFBDaIH}AVi&NHӣziCszV 2S5??ϴ$bNma94bO[g}d.<fw2e\ Xxh78REɤ1$)]&Sr,C:«)yឮGA#x d*7\-O#wand4nJdO75Y^:y-ԵzQj=E֝H L ĚgU1>fT?4<4;o#Rck }?qK~0W̟+[-BI~aR)C&$-&?4޶(ScKI*'V!Ugd$E# L\b֫ OϰƻdJ0 ε@ ]Dlf˅kY*,L~zUG4Vd_Kayh4~!a2n,wXXlFYL8*wHҭ GiRU9%muhPE'kc~i{?DKAhC3؊?n~aO2pqī *H68/޳ Q,p:XcG֏Uy:sj db&Ikocsi^@PTKߘCdd;!:lߴE_O?(7/SOu:Hb*.]5vtvSvu5\+j4N:YWHTi'%jaC^#L\9wȨ̲Q+M窴KL7GO{MT sт,mFpFOtJM!GKXgg(3^Yr,v}g(8^eYq1oDƚ*rY7K%r>392Y*,m]Y=jrFr jL(J@VSqoC{l3/ɴQ+jOڨTH#Zˣ1%A-~i2ݍCJ_杲d#;֚/XPɾ9>M.6 ވ7j !Tt4E|H7R|lkj%ȯG2K `J ~lV^[&R~ LqI2?cE?s'L:ȧAxog+=`G*3,  IxA2T.K"x(D*4 xBkw;Apf;c]\!v}bÕ >m{LLZ˴9-'Cd`187''c4 J^װ8-|\`q2zѥdٚD&sL}dݱ+q4ßਗ਼ > smy*+P35ksnOyͅ"Op+ gaXo] VDn ĨCa8H9 ïyQnf a*:"lĉ-xF*N-N*VJ̔[M"<-i^0D&Ɋ3Щ'TE=(pgACuuT)xV-DWU*AHJn|_yvodv2N~Cf"E8 R>DKG.3ii(Kٗ0Gۦ~s''IX"uB#dw0=Uv=vGP PLPn, ZґSO\"nCc,Xrۇ]4{hqO:,,#J$%4{Zѝint*\.V .o5]\W0J VV 5H)4y-~;kC1qjWr!cA|& ʓ [!- Փ  iYByVWGP*d$R!Aw<=jRx>BKiK EV g68.WT;O.Ŵz!Ep'73 E Z`vᡣ?Aa{/^Qslj<7&j$'5p\r+k,w_GlE0t[?"꾺ƪzvd@Iȥ>-/__]=/+Gg_yvkv۱tMT޴s\_ e&n"!"?MEDW6+ 4T"cCsʓ5[>7$`ۙ~ZghEFw=a:='pR؃[^oIͲEB" BhᘑMy3;:JBĚk}V&',Q`C9|z'fwzͼdJqZbIU:d v_HT^p7:a8G!$y*$~4A\E>ErM3{(Yp':pNW½ɦIj̢9f&qs$rɂcqz>eR'OY?g%T.?᝵бJ;tX$mbyL $ޥ10IVMoMK"Y9/¿ahy&uld`6ñh% ji")wϔzkԴpx Uɞ ǂ&]&Td N Tܹv]Ƨ|rۍY4DuZ]0Ǯ>@a7h mo,')O[j5:M檆Ӭw( ;JYcFNĄV̅DI Wa7hp@oMPcI7x &Ӯ28]e!j%,Y@VrGhy˾gJ`vr7:Uް0NM^&0IY&2|]z;؍J?"l9D(s5?Ǚ5#y2'| {D>fԣVG@To˩IdE"R-^űq@ߧ:Ε; ~Yn4"Ġh%PUُ4X MuI_huT+67Z=}]GOZytfyh\HW}s1V-G.-OO"1Kj ʚ7Tʽbb$l\!8;*g1q6\rw?݀GN[=l{Uťԕq!+'B9SԬɤ!=`9w%rћĿjs'g0P.'+pegdZJ&z箲f|w,Hw(ЀzIqt<!1`|͹U"Se`*2rDž՝-S<;F6iq#ؽƂ5u>_DDEǸoߺ`V:(#-N?lEBmK85)UIill^XiFi(.}yͪY #;hⵄŹ%cp4v)[л#|QDt ~UMV/s8< SLe,.pLA*Fԇxڪgד+!X,]T˞&aҀ,l <2lh%Ow8:bbTk_ RΑTh0<,d$b\K^wWJG].'a0z]Rzt]ypny^y>S6('b'v#fVX 4CE!r*.CW¾kSC`4J- /-ؔ.VI* p g:*7kf(W'g(;gl ?Xya>p;X;r+f $6C> ֯ c|4q>R܄Mz"D !ǺbbE>(n]@9FA@5EDڽ ݐrGC/q\ƋxEB_13%L [BጙݛZ0 2Jupqݒ^,0_BrD5Y+[6C^Kqc h%E< О#F< z=IWC9qE\ b3 $=Z^d|p|cl+k +˥eJk!yཔ\pM & ZM#ݾ<@NL q6G')tX*e]`cjj.םPῥRhM=Thq,WіMRH R1MQynE+m /' *Ù;a 4\%Q :\KG$gK̉vMߝcǔW:TbX%3#:ߧ)=ˮ, E^bϰBA"TS<G gMD 46~fSW_J08}doǤÀ?V8oYXuIil %O^"в]4bhFr+}W`+VQji;קּսl,YЮ Yŋ8ʒ~GE )f>AŠYi,<>KiBQr>B $ؾNt -?B:?Խ_Q"Sv{2|2A%4sfYUAf}uo{>(''6r􆃸@ֽTm*30)dSOLub{ѿ2=^Vp\-/jC~_ec1* CXˉa Cap#݅Fli0K,jn;С-F)]@|"F!QM:^΍fĻ{:`Vm2^{jB=n,A'Ú/sNw~29+uJ9|P9"ߩ8~_h'!M> ੡x)qu`0=]z~zN^R~wA<%Spp%tqqD>eQ?ֳ%'/ʤ+@.8i@+[>*Ӻ~ArL?`S6P͒P6٤M٠m!4I1-)TŞ(- Pwi.LMX =񗆺j*~CAA6UIAD^Z uXqzF-NcfvW=g"i )mFiP wæU!?*HON)X2T[N菐D)%MO+\18Ƀ2$B(,ϭ|GowI;jEۧqArN*:i*.s#vJ"sHR-1mS;plG lBZ;9;Mڭ!~hZP\jr/3 (w4#_4h 0n**^c_N?\v<[[lUqz8s< Yɺ G ]A5]i 6&})/ 5R蟑:),>tO}Q.-h@.B-@gE=ٟD]SKF/ ѕj#. f)#~aS D8N{t caT3*uL%iQ$?SfylV%Bć ^,>6K"* čm b}{vLfFDh + ˉ3 T=npfߖq\C;jce.ݥj%L0=(JZ9P꠽AItf}[y, c!L%d8 x*CRM.;ez0pw\I^o?R_ IbUCG&CoWrHMnFlשpy -ꐫpWbg)ֺ彖hº$l!!oX`zLksJ`Ly4?VJmk.7<X}g"XHڰPR;)H #8]Ӥ]n,}}x^P_4\]Kmxct^CE5]KbM-6gJ~^AkEiEwО! [&We V*g:1ҞeN"vi: 6RO!L,3\Oã5HJ\vk4+ xjG # vcoXZ ^(HW4Bϯ (FEVe"Py׃HX_ZKq}K ^^VӨ5fwN'Le4jt>wr (k:K׬ZUvq=Pb?oK@eܷi\+mGG{<ӽeH.`RxL+1ɐUH Xz$(mA4Nr,Y(C}ƾ =4XSq`jOؘ83mXhlCU X}v>!L(_jasLVQgRmSv [FP l6{mnA%+\㊌5FسF䜫I1߃kY #83v N&kDgU*u2UKPqÊSuicӥա Ub()_}/_2N rH_"+!ߡ/cazC@$JJ 3SRl4 _$UyDo.2Fh9 ljRyDi { 96&}yO|֡a lҤ(TUyuUN7)78hdY L]W7Hmgg3wic cUt=:OzMdxTdynΈ5UZW#|ī}l~ZTk:2?gb66B y_,V&ۮ6hmce yT`X>dӓ1wNn_z( {Twf.`8*\.?*Ct3JsJݓqM4YTYWOvߌ޽L)psi]9.[82jлNyWcd8Q T@YzLr dX'9={nƗ_ ӗ u(tq[O] W4a&+~̥KCԪV0T 8SԩM`Bݑ\_6/Cr;.<Bpj>m$ԤmK騜:'S0gwLd'ҘWu#9Q9okR0/ݟ AāUp/f^UzJ21`¸f'YV&,hO%ШQgb;ԖrCWh>̑'}ajHRc v Hz# &#oY\ɳz򔚾%4>s?ZT*0bH-a[џ|n0&L(qػ.EnVYE[ #_Z +az|5A|MpvBKGd - %v*sNYYѰ}Ԃ=iu+S&KKؽydDuW(]smq3)`4gP?)Ƿi&gq5:`6A9|KSٟ 1:t.wUx/tPr~]:I d&'dPA]̤o$h9?:)_iOj1Ti;Xp"4PoLuZ&z&cO2z'n@!~,qIxz!LkF= oc@u_Z<O<[ODX ޞV%kOP1+T82 |L"H@ܪN3Ь[4@[b* >>*«ulGN1`Ɋo8=!cd\L2`]OP>}}Ǧu)Hx^Dv?LYDܯJ[W3C* gW,9㢄(4E h/J:a E9sjaIYR+3#WRJ3rBx;[Ƴw/WCnꬒHK#?TR zD.48'b :}<}G^7keSWZ 2B?0r@CӺ&7(kq0 /a s7ķ|Z}J̣1^hԒ4N84 q-mX\^ mJC;G&DRlZ.foBh\C'_ ?ö҉Fr^Guw@Z ~XuhF")AdȇyT/KEMC}Y06EW(7GVU}`y4ǭs`ۣ5[SKov [+lF;WISx7y(/|6SkQXKȃBk[D>V1ۦ/}iKP iɔJJ#7 mZ+jߑL_qXxrv ƕAJ>KzG@4Q4ՌdETmTZώȔJ8:A2~7[yp0'ŕ \AX]G`NPYD1-?w>]gYSv"Ӈ3Tc]J\n 2-nMS٠/'&X|Zm+ P.cs Eb=I; .h#XLCj9qf䨜>D7w' HQR-ha6+ixz%9~mˆK;nF䀊숰7XLlۢ#!Xn7%7Wr.]8ro i$.=Վt GWdNh`7`?򆁯,_\isNz`b[U} F9O$0(is/o;uft!ftXNq?prc>p`0͠m~W+? ` +Sy{/ ]% %4B#'g]G弴OHGW u=;؝LAe𠫳],c"Dɾu?}MUg /3+9uvXXƲN׻<*ɋB:A#C ])568n9_@I5HCV$. =7/op(9UY'S'q3İݑY#Q |[;:5dYj"bxGK՗&u/EQp EBz 0(dil]]'-owd=Ȓ)DQ$Jt W]:Ô3J!zx,P#x~I:!W{ۊ!8tSK ־K\1n-Dh:>?w#OaWUQBڸ㢤bD=8!Fw|H]Yjbâ'[ȶ#ovk;柂Ԕ @{|V4{D,Ƹ%Adڜ;(C;u&Qe+KøE'v1YZjE2K(C?E7uq3oy:Jqo#@F}*;R`WZ*ۨl,ĸ_a8ę"}7fp-Z u/|%ػf$C/$3ie' ǖ?9BWV,rd˒A:FE#]s '_ wwVmM !Zn#UW{,C,S^~ZJW!~e36'gawFBoV iBZR̳?ms*,:$~^-ο/(!~]Z8UyeuӾ-y5qsɴ.fp5[/32;kE@=MtimMph׌$Zw(3 Z /}GF:]H]Xl`\vBcv-I,(h {f^ӗBO!JN<쪩veutU{Tn.@a.ϑjuf#S/:[Sm]tb5q'ėB[ @TB q`5hlfZu9 Yuw0KAI4dUiAlڨV4~ϋoGhae(CG S=Ό$ SlDzb[!ր,(>#'e[3ƩrđT9:)rq]{{hE5l(R!^<ӄ,Cy|QܘaM?+9T g J')Q72fNm̂gH^1Gz"+9HPr#ѦJ;3U3M~kjZ5" ?0 rV^TR$u O?dWEYl̐8NEeNXRBfeqb󠿘f"2.*x<-}ڿ)ק@d"7ip+pNN?\J'|F;ZQͨ-S%<<0Vo#B4JhiFFY.PV3֣s{'>XL_p;skGhna/_(o[zkEdOJRwR͙Nn5'v3d_n дרyB*(+!_R~F. s\iܖ*t%UzDɒ+W7 D-•JP VayM"3Nu*+GXԦW=\xǣޜaK|(7֋YSvF8l,]pQ;R:S%>X'?DXS+RMu.f"AtbST$?ź(>@<:Gϖ"aJO1wKϹ'k R(eF~^9qхL1o(a@ l⅒5p_e>ŠR$ 7{jhuNP,\!-f>PBm7&s[ hQ] vєdCMȍ'~@%WA+fh pr꾺zVQQrH8UoLN6aU-LUGTw `$%|*sJ_Ρ~qF#h(N P 0 RG/h]4]?%׮E '$'UtQ9{'Һ( YIȘیrr998߫.\LuZc_$?zP2Xvc9m-sE)qӪxI=e*Z q $+U?班9` b`߄S0e9ɣe+Z d &8sHMk{w%JJBD4"v VJ2:Nr?wnrB-E:*ozI_B MZ?BIA7+gV\'@p@9^hWQh)bzS@ذc⭂;vDEUG<RrTtdsgG{=BF}^@?N$TZ(導}5prQ( }WZADl말E>T34 u?d{in@w*/tй y\~$~}9ڇGVh&?gקͫ6.5!|>aܐ=1Gq+V$dͺA4qM. DP)D\Z'LV2 ץ X5 E҈+|{@4܏Ys=nUx?II/(rk r~ښ-Ċ8BV`26 oJ1[|5 #B &qĜ1ZsWv`aTә0cݚ9߷"pC/15yDMlt\c7aP{4Է #^ӱKHUPHTq)x8+Nk$48@*jbTRSvyW'ᔪafk7.:e?C6gyuv;]I>rXXW+;du$_ʻ V\me%\R= deu~[a ߏGhT>?*V&+qYbxwZy||Y&̗M0 %-}uݛhh Wx *TX4Zr3ǯgkT0DsA0-_x*xc6 Nx?Fz\c3?246қkJ"6TkBOn]ī؜wTY+FNOJ= :l(3z zF%x?Lk266x@lsǾRDF9GO:` ,J]*(gzKB:U~Cp{#ɼȆnQ:/:+@LhY 0:' {=+5KKŒ?0u Pg ZX޸-73VR" pLJ: 3ҶȼFV];#H/Đl8NJ媞+yQ._h];4SE/KɷLGg*h %b~HB4tù9GB-#v;3]Wb((rG1@34Tv3 naNr$u2wu+QAko[kB+Ae­0:B96-xٮ*9Cq VŠjٽ )Pƫ(2(ݭ*bfZS,&'P&L4u ˓n{ъDq j P߂7=ZE)rkzVmϘŐd 4fE&vv|כ]y'֠ TzC$\ńPA,! X^iyv硍ԓS!ب=˧C"y+T#"W}m}yJTb~_r?2ˠRߒ$a.i7qԻVe|"Tt6oB)@ W'0؋G#7f*'D4A&2Yk?φ: L$i̼v<=toɖgy5)Yka- Hu{Z2\ Q[%|N{A)V1Ser̸BD+$FqR9“!@WJRٟH< 2@,:7,CI[hT0kJwh9)\*и3!lW;䀍6<(1O~t $u:'Tr&xA)5-QWHcM],¨|y%5ΤkÈ=V"E-: 5@Zʦ̈́LIEPlGt nT~DŘ7 evr טFʫ젎CΉ$hcm@f4'S90_)[s]pdm'|V$Z]='٥wjcP"fn=-)q*d$o_`Kpa .:6qɕNmQO""O E5XxKBtWH.37xrCQcW"| k8X[}Ƞ+Mv~^b_[S; +`g2Ѽ¦A&A6 ږQLE!d2pYR}3RPMȐG㘭6hiUX C'nV +Vu'fmChSֱ1,5gc Re'G !x(4Wx9ZWOvsQK<62r|5mrȁOp?BQT1D9TiF'9\b5| Ial> {PBei`CsWǤU\zt+"-ƀ>'Pq$Hxߧ˥eM =R=9*-d)øo޿j,ϟ׺og@o{C6:*ɖF(D6۔fM!~G?&4[ `K8ާ3Z>\hHBקPhddR?xqȂvG M}_f36Fٺ1|Wnp[_eJqo=ܖI'FhL L>"e,S Ĺ&8eXӕfŞ7cfdwc~W&xCaȉсOD\to6EJUʯRUxmP9JV. P'e!O\vr?'% $-ﻦ_p{F_ଢ଼`k#'? /v΍"ÕEJ@kA402;|@ҮFw65,&sk?n)5rI~#r)EfHo6.iuB"1"v׫p:MX)ې5i>|-@P!')'y|{~c{{Y|!Y TԥEYp"cE.fLih7#^gXr >78r_4$k FۀdOBYg@ılc5q#>aJ>.# ^7px-b]: !i)_F w݊aDoli(XU0[̋h!4=k3w 3SޕSYDj0pXEo|9jmV&\ 鯛.sÐaS#P4$&%xv~;5\[j-yw1 j!U)ca᎗jT؁"Q|TbKr.zdt zwa`VElX(jjTٙ; Ƙ<ٕ([WY @b0M{^Ou/ u[K0 BƘo`tWO jgᦑz61a\,g "{.(g$'.";A_ofQp_3;k*F Pӏ#vL<&;Ngl/8rfF4&MC Bc32-Ӷ$C|z_ -N dYNN,"M= 1,Rzs>V,ӔwuLu:,w on߃7㖷8=2%\!z:!7&PrenNFbYԠ Hx}Ht7&k%ofU qjSHܕ#A|l \+¦MЧGWBq%%]^rDt@UН h۽DU_ȼEg~y&SsNؐ# $J-Q@!WԦyRS eԷiэ r;u[x;9ku 2Θ_{<sAv*_eZ1'g6ȣ>or&F Z7~HQgY!`zc"Y\wpq[5\$ ow;"NIAAnqmi >qn ;UA}U luw kbuhvG=r~gPҐҨ,Xޑ-D ct5:8G+=8,=s͘)Պ6(@*^Y2{mZ%@p+l<# z80:S:ႚ`Ғ & G )[pª8 k7\L󐖋ܿ^&̩/vPiJ'#pS2.z:suwXCY*0U svyoYv7z奣 !Nk}|l'E0T_ds,j +h็C D"L^6%/PqnUk{nFE%-SWe=N}tMT*GDwE}rD_>l.x-r0; UƠo>Bҽ sz΋?v#P' ^6m4ιP Y\#)(^"#PG|8_;6Sҩ-/qE̊}ǯ+S.X"Bb|:&V /OBm&偩iН$ǦhaP7 ŀSrs$ Xb(5sܟʖi*\h ݥM& Ch(j%7}qoj:[4{d"eܙz͒$D==DkVaqe&3xzf \$A SɫM-xRNIG"8-븉2yu@TN5iF)6qJ"V&ns+(lčR.굞@pfZN/cPuF{=3+ U͂oK:@*(L:3 u?{ݠm =koEZ]UWB=4:M](Q I~#&j3;(sy(5-PO \gq5yPs0KǾP.y-] J .&2?V3tWݏX7윌u`ϱ3B7f83 uq1O=.ez2/$:x`-l++F.Eۧ/s5+dWVyK]d%U 2?d䦐,5ԡaJ,PG#VdGUicU+8^ss,Mnq˷]r+m+ۧz1Kh_xZeSZ U#]dh6AhGޕi ZWȂHgȫ5t,ҹ7= v M)>u/JGcC}> >џq }`[hb)sFɁvMmtobzqBbB8@g(Cs埕ѡP/s;pt(0,=cRYΟͣ$P Fo+|"e\9fOgy/29RȖg^+QuZwRW)oVi <۶ AŞթ۝ :VaTB-bt7C+ M|]e|&QІ#m.dD4*}D&hH}<<sR_TQ%lTE2']yBV'E^V YHxX"FlP1 U;hs^>v`|ٽD{YcšLjw5GY\lDu|tluK^lUOm|ӆuPx|>u6EDi# ?> ~c|94"6tTcEUr‡q>ft?0XYhOi95h), 4f؋OYLLdkVX S>jgE`1ۅ5cH垍[\i_afH"[uN+1CD]ftH̿Ytgg7U9r+΍y o0٦o' kߪvP{)ڊ]h!7d!,j4|f4X\zE9)ҁ+1 'Ҁ $l[tl3l%cV)YhM(b"XYK0£3Q!fqw)a/Qk(Z5Ŝ}8Y(e*]>O+ zkO j>E:Bet{攜kI*ڻwh#cHw\8dP~փm @_PE^֒Ed-p붡 &~^ItI;'-G%H5E,bz뻢-e˩qMR;L(<"ʚyN\F\E.0.l[a6_,W&),]1à/ ڥQ?^Em&eDn ) OH]kl0tx`N?7M޾1}jo5Fv'[6gQgeL'Pof~* :,9IJ)fnb;,)=j#gԋЏf寏GpA/앢Pe&QavN{؟r1٧s7ƌ4xGD XdܲS%b;X̗`U}YϒYy-VKjG+\{ 2D-g%3jd,5DdXJ>M~*{3;ÜpId"%6YY7҅ϱ.í+F28* S:[půcZm=,ڑݶFhA8b@cƿOSe%k" Dy 5l"?B;67&:/T^'J_9䰼~)T3Ghƫcqtdiр.ݴR n"2C$jפۖ?`JͱG~K)͗^+4۸-SbguSPCI5;=q]4]Г+ܿx탿KD2K6kݙw be[y]L"sx0k;6-(w@R) l/ostߍ`F/G^- rlê|oߕ(d(Ldea7X Ou/:sAQBM[`p]7xZZNH~p*TROZuK44oAgEƜ-Ł\SJU ZG[iaC ŴgTAIUt%DfW))%C}jfyT]g_8j ^?GhDmaKٖBCh&ԮŌGM4Km0axw\6Z8eA+>7|`>W=AJ(Ʌܧ *, V]P(H%X={u "AbÁ*s6p,jmggO?";VS:9{,` C'-5! [sS:v$ Z|:wQSvOjS ͠бoJ,5T3#˒fLPOLK!ZklQN^ ׼ۘKG|uct2Do?@Ir֨ogQ(R?0??UBzW:d< Ȕvť]>ўWppaeRMK548NƘizXT,{n k˪kNl ;c+THC  _4aM_E9&MV2\h g*}-!qrգ=|*,&3'Qة*ʑRZ88qu3ը _ؑ(6Vȍ+vEEr"N_.mjUi߮W5"6cN!jhn*kv֞cz6PV-O~Mq -WZU+vCɎK3 H3I{BqŝV $v7 ~OH/1}9]$_JFI8f/JkiQAs@Xޒ Le?@ 3 g iÞt[K۰C܄HbNGRk^ J_ VmψG\$hؕ؜W'+w0եy]cB&{v݁l o>=UTᶘ_E@wK|77[dO^L`о׈~Fٔx3\=̀Kt@1ﮇAFa %jD2iF*ctq\{as|Dqeah̕%mI0 tFH_ WY];=?iJ!uzM`}!mgzy Q !nֱ6'iCbswTrXBf\75`-YCw 7ip]U4 7 0lME}9v$d;vuZ=)K >\~BvJm#+Ѡ6¡1WDs'F3oJj'F~Ha^)d~9n/:DckxjNqbfHے q/>ZйW{-gcYJWs#!ph˄^EqGD[Ey1 3 /JaO{ @rFUS[RU D8Dh!LD^XWi'۶F<ck7]6`G6jltnx.1O@+iJ7FLEJ2AV YTܼbf`.E yFeܔH]{*Wv8(vm9i8s4F_HKNfڵI )on]=%>4ǣ4 ~qbpwnpy#c(ϓ.,>yOaD,6eT$@qBUZGȪ9q֞ pl)d˻>x`@-r->rH4,EkN >{;K&uiϲؔ{7Q;2@m :X#(vQs5:2`;B -Lړr}AIO5=YSV`P0Y¼1 RF"BK)sl)C*8)^wr72 aEkYL6Rm vMNCoY7&gc*{ޛqFUkW1˿5 'օN+dBU'p8VcI^b2L,:dk4z1a#G=SmnˮB8P-@/iuUA$YY&{([syN5kY&[ةJ(i87nMwxC~}V _?UoSyAr#Uҡ5!mzC-Xcv~xw~^[J@l")eS3qf)#kUVoGݾ0*% k/秃%"Q795+hFKPۃ21-R[yG,ӧOGQQ#y,}yBIFx'LdMFs3JyK!;R -=]NGAFb]3XYZ5R#WPa#`[KB*w]fN?b\FDH0,.ħ-0g}K{KB&:ᱜ)u ҽ95Wˁ'ˎsdXrDX:Z}HjKh@iijYiy>HSYZ pG E}.5)`J%O7P}XVE$+g; Bu啮X-lhE\z"cp0`n򖞤zqɚ *En\P3&>ʸ}-͔Nv˃\ͽ9RŒ%) ^xq#H֘UFzEM?PDs~m_l5Eđ/b |!;N ujN,u *hj (Uq5pv٬ K }־amJy#‹V;M0mP?!:eyu񁸉>ZixZvF2Im0ɷ}2vde7Fq5l"ͺ@3qa:=sI<`ԥc/ǥ"5dZY@ wbWd8IWU&I|sJN=H`u:R>5jx~1뤪58+N}& yiWk@RH*S吤Vi y^"r,C-p*ޗJ£\|tdmemR(ZDcExlߨO F?jAH;$oSN=LRgBL{>uЭ5\dP 3ϱI }:=OuZ zX.J`4I򎥢潌@v2C@Ѐ]lHe)Od~lbabҧY谣юrZ Ǩ?ݲN5#k C+ O3ϳ-4yG }oOEOTD:@ /{h嚄OL'f:6@}˙2>އۊCˌNuLzbWGq:?tkBx o+A H$"RaiXʾãJzqHFg # pH/\h vCmk-IDR-Dm0lަS_^Ph5G*Я;ZRZEB<%Yso'gNAڛ\9 UX3P'XɏC=Q k~a*x] @dhXt܍qS#w+݇!ܽ`b]5}s9eߩxv!vۄ8sq9hvb˘7 Ғod|16o5^T%V<75r?:oepOX ~4'Lyf:g5'ʺ_ [kUR*mƞ‚}%?^Zw'e;S `A'+s^.Z^YoFwJ<'+moz&1ėu}հJSɽ/bqM4ht8@{ Rf 2-8>-^n=P?rE,-3FHB 'bˡ;ʑ ͈L+˧%r"DH3_*4 ")"l`7M1HDYOd)RkHe ]S\U{0E358 峒WVۍ}WJւ/f Ϸ bfy3k&+l*ؘ.WcO(-uuvջUz~Zjr)~7>J}PGJVWa-Os\ Pќ5=BۗC_dEnc{vk#=ϋ2GA5XqZssp.,l{-h2p@cO$&3}А C;%HQbUW/2l]aSdMQTt͆) 6ڳg)gCmQ#lE(,gݾ0's56¯`Ҁ5X<^/wOkT!}FjbBv04)dup;w .((t<9^Db>BIM^wrB4u~~^b`HJؒ Əa'rrte<ъ@pԐP&l}d;OGƂ2^?&wD^=C+uM:8PE_Ek^ -𞰤n4J`l0as]tqء])}7xY $uu-Ґ{ޝ0؉rmP55#j6x< gӘ࿭w?Ax4'|&YԺGMt` ?d6(aZK>8l3Y' \E9=Y4eシ;A@W]) աaϱ7򄁬 J5~˛a˱ sj6t rj,_8TixT"h`1NDKwKh/(|QZWjt-(q`Ir܀܍,kǠ s|+.` MKTCC:Ordl_uV lTjfCFF(kh On&\6*=mmsbsk D\y}'-7!"wr fڭ?vƩTSʋA0hbXeItln]Пz*Kc-LZ&J<_sxSlfU*C6P 霾zxD%2Q3iZFdVOsoTc` 4H9ioO8 4(a;H|B`T@7YTj٘ˁ\S^ lY %+:ġo@eRXܶlR!52$97SGƊI[ԲK `lugڊ[!3^..X49є3d%/Qs1b|ԑR# 븠Ñ)Ozta[ȍ<)#%<J&}T{[|yF+kUY 2m ,7L?w guE]yeC[?#,=.FŕDRl(KyOIzzTYLɩT`B=>ɼD\8IѮ@Gg e+ZJޛwzqyrꛩ7IgCȚ0f-gK 4n%@ i#"\ _Kqsy):7R}ˎ%bF#4s1ߍ:dCYXɉKջ-) 76r^^4zI!t*t_ J.^Ӿ!><hA0xx9 cT4$G=_mgL}Z<9Ug!%qtN0^:L= `dQN3&nڭ8jefKfU\~dPsAU!dǃ1Te)uE)eW+𭀃~34WIqs }.nh?;ܰ8zI\i9[Q2 tPUx%У_p {q7%[.>;dj Xԅ?YysA\JۧZ#@'F&z9D pRtD9_Ei+1Nbs:*XsſXMhgaz?NmOOu:wڣbp@`SiǾ2ӸAp_9עt!0!̸C?J5/`ǚcjw5!Y%o:%u݉mp/S h-;|hCPZ3ߔdtӍ˾?Qwy]{j~*wHtّE`_eh(սhCƙ{@N^ BBSD<Ǘwg+(NDQ]SUZ@Ɓ @+WDNC|9S3YܥWpρyהiFCjQ kGVrƻ! Zm; n}"V9ޫ@L9|qwD@jdvBCI HI0}3>&7,b0[Ӊ2mq d"dW'.V'ML d'X(Hr:YMŢ@O˞^=XdtdNfa>A u8?p0DhOjH? RVk!>m6[g0!"Es{f1 |[/:"j@8HG5\,_2Ce\$#"z8чX j]HYQtT%PI :H`r&$=\@yo.&7 [u@yaCEn{IY{ޜCq(>Mb:v/tA+H7R mъ\> ܮKaq?}4H4 a9K~wl^{uz塊9 &|ܧt_д}ĪՊՖ(җvNIL28Bcqh`jcX1XYZΫ\ydv+? ")B!8B#9ףzx<6O S2=EB޽\(HܨIp P s }sPsa9d~B=sj+`~Ӆr}΄0:aR/=Ҫ,mCOԥX}w!`y%rTV[www/$lqw ~kSU0N\`#"zCwdt4DN>Ky+`$PmS/ciZ- ^cdtj=4U OTnz]M 3!9_Z`sp.|n#~x*qdohu2!K#Q*t 1#W rJO j-һbΚu޸%Β1m"<ʔfUP𣀎"@pzqP@W@.S6W6l,Q E{KH2C4j.Ԏ@Dd}Nopt5|.h+bQQmlIfԙpgF" 5F7"ŇVhiDL0z(U?l7?1FBd*zq5l~YZ+cjރWY bg[u졼|@wU]2_&rM.ދ|%Z|<‹&s]HrˎI)3# $K3;2gu.->ܚMғ7nA+2s'x/c>=Z kRbx`.C6緾e6\+o#7jmo5)!]asc"SI7?SKަehwn/٭+ %G(m nQalUK \ua L|\!?M`1P#fTEd{zN6)]\gDqX OG'(ruDOҟ90)3d!x<e02AN d{H{тfa(sH(.03?eni]C@blWu#7E#ă'%/? Dӛ^ s( Pц5̠MoZ+̂@n"y~yjH3 ^h9Lau)-!oizL^PCStwTfl7!2Xmg4aL E۝(;FAUu#K1ssԾo; +WI/UH@ ̝ȑݛ^ ̚GTxxF[oQ OB>u4kS8nSsTposdUos3̆Y4|u3x3<P? a7+Mǂl9,,"2Y IIx߀NL=dC;h)ы'K=+~SxL>y1RůH2pqKI^)$ |Կ]ЍTk3+$q P|0}5Wyr9V> ;}_81?G_.n?xewg-=}1T7թuS\JTU@G4p] hc(^"@'#!k=&uUL/dGLf*4ڰ'*DϽBh-%FH)? G?A2' )_wG4?bܗЇbv*X[I={\A p%R˰ɇ𪵤=w1CuU8_ m N"db4y(C@_(cu&&`DADtݘ~FX2vǷFCPkŚ.n߂&lB|{ٿDŽMe[h23џTy-QR C/Q 12yBt4yWHg_v|8hf% 2(%h[x̕+1X +8yKU/@#hqLhY{+\OPY He6e/ ̠wu7gU$Wa1& Ԝyz.1z igtg +J`^$b#b=Z+hJn%'>d^"Nmc=EqQ& Td2;HS]B_T.H:*h@t1НǽiSH10\1-w!5y;a^ yiCJ r9 ;(e[tWս"A![Rs΀(#BpͶYʟpQlkAȶ%)0] }j6!7RN݇He9]M"d|`E ,;E[gmoe )O0F#)O+ZplcgĮZR$ֺ`O}/2<ȓa< )0!qWK On> vGg %Ѝiqdl4F⯮. ݸV zĥ– Ϝq}ydF`߰ gTq-l\Pv{>?ݭC6쯼 ߈[[(+,.E:hU/`0,C4٠r>]̀jrFb5?r’|ξ#xy]pYT,D!q8n(eHaWNȆ3zx., XBhh ; h3['T@c.E'=-pƁamPi3^}5?@iI@d #h/sjn+jVgqhOBuѮ 遙pe?(̦q#O"`9B5S"=g)2)Ѽ\+ 04: *p]u>{<4%/ +$R)s:P Dl'zC}812nW#Vnvg&~/|1{f!L9ɚPy{z2zI,A ' е 62ǝ vaXCzɠ'{pJd%*K UjsmģV(U?ah|˓ 9 FNI3S5.Rǭv'&9|b׊6i|RmR+6b֨ N6Ω"캂WD:6މw>5&9UWZ)E`ʑ}Y-.?2kJPiԆ_"YpD*d=J5y)jrb Vvs1~K|_vvQyʙh2 :[OzMe}{bіm$+$ZqҙYЄhv.Z4\$`ڧwWuvū"SA 7qS ٚЊXݞz_&_-7Ž)JZ*qy^ݻAo ̷>eS1nwi$Էl;]wY> p@Bh<"Ʒ3UUZsI%fdF/h3(ٌ %U NQ۽~2n[/FΝT_a\* 6#f(. :nOэ_Jaa4̯E"KM`Ohvvhԗo2y\UnWR>T VY5o&9peYyte(%Dg%g搉uim=[ rg_[TLz.,_,Y7m-QgPͅBȐ6f K0äa_:H:Mߤxd**M:8{z$ DeH-/h 9ԹqllߠGEсf5~5pҌIiJ2~PG:!P @:v{ՠj0TTƝ] &"l8G &2>ya]{N, p2W #ٰ?Re *IR/wiOd[CH"Y> -Dנ7-5gY\у^s=[dT8z]jݐ @X;5 k66* ۘb˼Y7޻9'*a Jl@;Χ +z8cn'%u|HB}K Px:7LT=r%wF'_H=te79"ANuoh+^)G*VN~z=mp10TIY8i͋ ħca25ơm(6 ' i, 2Fvs>>0pD J0M2 \K!yJQA9!-QFrCӤ| <\9=n{>o!a>糢h)oB Mʶl{Cey" u_?-WwCOJhvUG8NxV')],{aHlS^Rc bmq16f^H;C9|fwy,Y;㔢f;rB"NU+ tJP5%\2sޖ Aɕ?m~ 4OSvӉX9xþDX_Ɣ4m'A]+6k?~3 f8@/lU)s#r5mDž%*ʰ#D 9Im"m+Vҷϝ8(?SE@ A/N=蒷 g N&#-ځ) 4vpz3NlP+Fclo j09,pR s弘m/Ϊ)IW qmil(?ʺ=I|ўS> i!|nŠQQD~kEl"eWI{`H|7 <v O xs:"^d _ZnJ|wOv,7t|6\θ4#: _M I2g̐/\ƭL|淍9m=*=ݧ=R|!ӓ\gt=JUפ&S8jmo|^"\8qkl(őtgo` } "=Yr8A[g8v}pHO8yvOմ RڜmiZ-=2M]kVp0|06<}^y-J,Su@s`+ #OY'~|˟8z5j!a|lS@} 3Zr$_sPssz٨O0cx',HQYTx~NՋJsoQut(S aqk6(ml%o7bb#S/;L&U gm)Q̾ =܆1/3n$ d-/K4Pc;dSٺ#|-lZI3pA%|C W(1wu>ܼJ{[;Ҩ/8?[ZYR8bV~\H9ڟT=E,Uc[T/Y%ZE*j/p 焤 r^1_ړwPMs ,'Ѽ_qBXI[z\ҏp<9ŴUwg˼5GY?LޞȤKl& sAMν %Sy.K/lO3pN٘jaJVͤ WCB2J|g3A2a&V CSj5F0 'J7LZ.)$9*ZF)XțnMy}g DIoFJ:5`)]*tn}B($\k#j:PK%\_a.Kܼ,XK k2Q1)&J-j(%M LWdmga_2ͫTڴrd~hME]Hk[7aL'z6W E'\3E0)DE6x2@6dm{JqGaRz fDok/e4, ={t5<,XrĽPzd洃6<<+l_@)ҞcuKro(ċa[=3!K/geW64g>U-қ.粝vbY/uݪldD3e@HT XSj[*X4!7D_L ^`U6qc!2H6T+E&+ARћMd&E A67^xۖ{:K'4d7NO-nWHb`'/A&\7X,tSj"e `?vowJ5wS[l6eUOɽ f$1D(DRWYd'4[6 \4^jp2;i(y!֪Bwӕ=ٷ6D> K>Z󻥷l OH6 l қXaD{#xvrlrr-=w a?3vEVA-`^*dx^&zAQ <1is #7UhoҒ ,Ƭ\K3p/`y:eس`{[NVX1KY_TB \Z|8wo[h{1rI$v.1ÛF"^\3,hb?R2r<یk˥Z/\Op[v X;-rdN6+"kL$X[gʺ.=hR^?Y:YVИōOG}yR9ȹ6 4ͯHYE006]hJ`K5MsYo=k5#ju/:5!*QbSo-Fۃy6{ MO!t?:!5:㇖tQ%~Cd<3t60Tk㬾G|*8<-S}/@e9?V;-Z6>ɘpc'.Cfwy2\91oN78jZL[SBd>;bQ%kq#Qhx7R-g{9BFJ_6gݮ[,` 1B~xk:N(lF{XEC_B rU"}of09T/]{3-X+LJ#9 :XpS d tor!/<d&w3GC0_n_vzX+wn@UF]q֦FDnɥ!7 $ATkb!9䃊w(U_[|f`%F&8[;_0^jR._Tʠ/boԏU"㛚G)TŲ4m4L{O(Α0!yT-ta$~m3^NR}؃0HgWBN)P|$\R=Id~6f\%0b?֗b4l*{+"?LJDQБDךRRYg.jx,raє{_-VTfd~JQbX]!( >ػ]*: "|F4`?MU`ѥF"[mo?R8rcS=#t5:>-YDT˰p'yH,OOD!}3Yn䊛ŝaϚhhQQW$xÐ ,Fx*(%x!Qr0'-q'R`gVsURLė55M7wȢZfСpJFywv׿Ɨ~z7l#r3]$]eMR, $h~c&G H~`~eUvƢ'QrC$?[F!kc ',TC}iPu8{?M_o=)}[hvdm4Ka]GA&R +j d 1TiTT_n&2 o͏/ sʜݾ`Oᅠ"ĴII.IWԞM(byTi ț$;?M (z\rp 3j#.4K;*cm&Ǭ??qdA`<,Wn-pSBPxgW8s N_Hˣ<A{DXQW!4J{~g ' XZe˕ I@TvNМ%AH݋H\L8NR:ͯw0r<6XBr͛W83r+|R k]N^Wפּ`g#,MiǰRe&=K\ * huʚj}. )~Kiq]@T:O'-_ާz~ #bBHS$ga<"`h.JY ݡoH'*X-Ųٚ̕:7*gr-噊Z%ŭU*6|n@:g8tx6Opb`,?t|gK^x;u$]*2M3!$̉Zz俹^p'*ɿ/DQv9\SKYfYJY<h<5QϪ&:T:ޠa)LZ<+CROl_k:Vbw[`\/6ߙnq=NaB>*hAӬ! *L]Btv@+ȼОs*B<m_oԤ8WDMn>n%2jpg6}K0!3 >d1y@hvy߽񢍰9ʑȄr TSQCG AlZ`naƠ=)hFRN#a`]N1N/ok EmV2bx2Nd:}H\:wqbr mC]AF7KP+ *u>d쨲+'&hAUh)\J_FCAxx!J ɑ!{B@U=# L07 9-f,$7}Xggaf%ٗ3PB̫S +;*JM#K/'>Fd*cijIOBL8eP99F遫ʶ SJ~KKIU\}gFii󳭏Wl9TmEŗ€@Q)0P8N9ԠN:CpMzqhj|N28q&I1 !Ͷ3N"^@z7] Ѯ" +U8\לd}Vߕ-#~Q$i\\¥;!`!~[J}$n&M} e`|8$QBWW7&$zݠKgL +X{ QXJPY;4a+="Jퟱ׷'q} fā\kk#2U^R,Dm&eM o6|QA:>rU juh79J[:o_|0\X^o ;I1*0S#y~˓LA= &Wy*`l-'Yk;VˌYcgwC@6j|pVhQ^b nuV"\٭fHi*Zv-ye:ɼ>fp7 wf(9<ѬsS6|\w).F"NkyslZ%ϰ+i ;uP\vLJY_(E+SNC;.&߶9IR+z9="Qld o9#-C^qm>']_ aГ@c16E.$g؉*bHϗoϸ>+ZvՅdr!>sm3?VEXRS~X]wY0r DtR.ŗV@Q:ogW0)g}Qv 4c JV^dǓd6A ;mK?=( QaakB-{UtTYno->c JLtǴeg|]+kւ+؀Mk<ՓIU`6 RK38}yzӚm ? mp\%]0P@ŝX7k^ @M9iiY(?B-=x_:;\eKHTd3Z$|(/Es@lbE3koLŸ&y*{:0nhMe/8}WfkDl1UAR#v(%h@2*m?VD%o*sӅFNq1 mal{}2C\3. Ds~p?G  >ԧYJ]4pd9Urk}g ߂k !ĺa&nVRbs{<~[8%lw3s|HD&j9W55`w#Ƨ߾ Ҭjb<62g'x `31.+|-'e2_XLj'KQfG%ROSt,{h +y;|Noy:=!Z WRzX]ҭJԾ$4%RY]K d*lU0hx4,~.- "jkfRcݼ#g`y ;F!+K _@kDK\5,4uqW6FFg| ; UI Ҥ>$Vk|_9Ȃc]љg9qO9^3,L ^~ 8گR* oɵPj9GRI5Nе<mbSհtUŻadƘ,z_zU$#Ȓ3[Z 6DL[y>jv8Zw-#|zqߩw\EQ .-(zГEO>cV21AK;U?{d,bwwjoOSz ^xoHkX;ۗ7Yy։vCZщ5l*nsH?Lfҽ{Hv,U`p$bX«1_P~V,&rnN ezbb`^:6ACZ!wA#ȅ44q^ WoqԛXTOfO3MVqc6D4;`ح k鸿Aa#lO_Z;Mƙ*4BF1Ŷ.A x,oݚA,#YmI ܞ";< ^buF ,AzV$sĥ0:m76b-S&Ҡ`BʺCstVOp Gy  Vz#I1wJ&(3%' Y¹`[ŵg4n[OM$HZjfz5=*cP7f/]R2Ce&s&.[+;/sBaUMP.O:g2߼0Qc{v`FS)DH*Y[rqcWY977y F E* tc ?PkA+dnWּٛٷҔ]3 3=8XbU~|}+i!b \=po|#`ILˉb>R:{Ygp\v {}i8|ayTEsg4In'Ju&d_<5Fz wЗi<(ɐd7*t bvwPcf#B9ٸKxrbԙP,t~QE6z̚1 45t,'2]r4?ZO(v7 z5@3ţ dl ZZ$ўD__.i)ֻ3_w8KwF/Ɣ.YWq$o&2_RQPwIL\:_\u6;U҄v37wdg#|r;l3)$3v쎀}#Nnm g/Zm V$1F_K"Jzi8x.QM3k^ =B5:`Ʋ }G6)F N88dvS>Gp 1͍XNJuKdE'W."Ze󨡃+Eݲ̆>A{K-]P@x//_tZ8d &r;ӴXK#l)(LKOfKoq%i}Ϙ+6槷zX!˵ 9X. im4CIjZ^[APfZ} r2to+v6otq"q]s"jdz%j{3Q4{du5pi%q2ڵldFGKZj_Xxʽ8$URv,qp@K뢾.kXod]QtnV$uWWUbuk[VZn}4\*$:!*IKBް.V&m`s ԴkqPb4jܹayo:N<~]kf2u>{ᡩBdOKZ \Y(QϑMuyc iAFٙK檘5<`Tl=WE5ivF-tQ}!mQb٘I JV x̱z,-?PO2hbejҀX+1h+w hˮ"J BV(ldI~LFN^R,šG&Y3мd2 "=(Tm$ ~Y RͼIzV-|C S<]Нze0{$db9GQS~_-)/1Ez>u"yFFi  nT/4̺T&AkMH!Ӆ⦉+U0"UJmzŽeQatftU 9yCrwbNX  2)9K2Tk{r>bbBq~[Yz&^mUB!>q| 7>i)`4:N/l*&~'O,`ds)~,J1DE<8~s޿j\ ӑF/lIb;袡cdYR\s}` IJ*\|!mwΖp4=EDF~4 +(_ɎL&$nw[zQ0{F0T iTwʼԗaѼR-:8RsqHhX!9DGc_ED 4GR xlr`׭yKľ՘ؤeeV}-hW%œ/dmoI\ֺ-8OP>)!JUQ`\>=V_ە;fӑk 8)֙f-x B-3L*2 .P7[L=b3b:߼PM>ʜ ~$`CX4NLg.9 y^\;${v/+mc40;xZWC]g_J( C9Z ,U[:Eq1_f+ziNRF! "G/k`+$GWa?6:sQD+P%J73*ۊîU}ZӐ@` Fq:ЊrNjVjZGO9V?QN\qmY|Sw4li֚uOoM必^)E1d%whZ4}:S襹Pqt~n7@I>͵JtC;N`(8䦞4HO#k9bznNQea PPYSWa%Җ?zfa9+Af*.%j, ,~׻e9o"gۯb@:1zu\wQ5 h#7]ztzռ/J.Txb`aOMQw16ߪ:I3Si1LRW;2WoRg$LE(RifxVO~ԋ];}#b$VIksbK#2hs*ew̏@8fŶ miҨ[¾› h-u'|ԤZ'"O|mH!~do;[e>yY(U *DJ@p(dj{D0Ȁ'Y,Ő<r.u,r*iA `pPvf ɲajGKtfP@3yiZ+Q0Qq[2[$gaLz|;}-26N%r 7ʚjL_݀E\ .\hu,U%,VɼxA@\("b|+iiο\L1{bQ҈: 5F3*%|q`0m;j<ƪ#L+Íu eKխˀ~Q1))hcVF:Y]~`A8mBB(uVdF@|[PH'&hv M\Q-1EKѰ3i ]GNV*6]γwn]QVz==d$sfEGiPBkC,U܏UFmɋi`S$>R0stU쾣u/xtףjSnV: =Z ћuI/Biq=[msEC1{+sS2OSG!Q/5x鸳\Uf'./(;bwG;xZ ÷;KМ}e4 =\6'HɁ r$xVl35.ldp.!`y?ø ^ܺ'LP|0v\Rz$4kFJr:@l\fn :j)w.[T1ceh2諸K ) NY߈{]Yǿ\~qQ.@b|7R|\GrKDi>u 8ca*7c p;5g$k\u{Ɋ gd5u6E.|[stRα5C\" & XQ_ԃRN/ff]P<V6 Ja:GͻVknysd @k ^&^K5]h݊ Tg' #/i ȸLc[:-q\,aL"}LC=\Hbt;aaE lobHrUN@ՙ2= "7ċP,qL]dJK T5zj'Q`3헹C<0^W,rCz;~"HI7KJOB;M[ C6qnErCfӦ/l{Fx4-k?lf?{ #4dhj\f ~=dhfLXWgp)ƾ c/GƤQz?Ί/ekK[<*rk#AN^w-5ȁmRJ\ϲio3K3a IĹI:W`wzy"%J{6d7@ʘyCMYNE4Y[ϛ h-5^lH@n:+]qt'V0ȼ̚c3$IaqlRBvXs&w_/#xx{upG]oӘy.-nE2ą 6[6L0GgM䮳X>m%v)2Nkj/W̽kxQ K{EH z.A{>C?VKNr37j ΃xE|ūĤ{{,OH:QMn /Gߧ0x sG]}f+D;Ū@?/gҞH#~g0r5Q%:\ Dhi<,8I7#Ɠͥ:e.DB<|8prucq//Uuy7]?Ⴢc=CMCP]h0dׅOS+#,Bq@W3<8WFhgCf8 </%妄>f&=wy }0z j/gם#mƙB»+oĮ,v,"ض(ITBXK$ ՙ(2؃zP+nVO(ȰX[`'1 ~97lIeN8ݐ;vEa^i y$%)Acְbh8-` &6,\-hwS-uZJ.+BuiPXYM>lB| lD /l[UZu~]>$h;4Iay@z=@v%;=hlzd>|&) 2JzP\x 2H6[ Gj',%K$nɌb4)w6فm\ fe>a4(P4S%j4=7$ 5R4Q:֊&A([ztI7զ; {fM Tt07=fg uw!\"i٣rBƹzx[7"踐sXXk-.@sɲ<+ٯ=ԕg-w*K'Y4l n /qKĩj}dB#sJΙTÔ::`egid-A]`K$1ܕe,!4޲_cRL~zmRLa}7Sp7@H#6Lv!NQ9]{s BppTpn6,hxGߦx>;.ס#w+RYuXKTHS ,],MLxuܱ@VA- |V:;ҞCiҼ`%t4WtIӔ=}BĎ[%]p;\=|JIa 4y,̫SH-ծ@AH$ZBpS}PZ]1D CHl^*.'e|҃J~zNrA{Mz \k5~Ӽz V*0 zHLV Ǯi6}8T?}\ZdB^rFHK%U‰-. *rC<$|/E0,t ?.9FD:D-L8lkWcH(۪U(60 OwF'R!ƈo fQm㪇'Zqh@Hao>]w>y;,vNZ(|yR`gDE|K%͛`=TMR~|QIO=q5)ix1FhQ&vXZ ԉX ,;2gd 绳52dkR1OwLeg0Lk1F\icF9b; *F%yybA[N^&;fkl*erD6u:$b={ҩkYYB-'?pzАe1SCT^&->K~#Ηer O <O_~A>~lvveV#Z87/FM|3٠)U"¼|wttۺȹ1S~cGEfHAF/ v>aԢѦeVr<0D)Z*W*!%XRT=۩תm/.'.0$z;%#RJ7 36S^nEgXO~z_ir+=v}\5Ev)]]j#=P+ʘ1AQUٜW|n$rXZ`nGJWyڋk]*5מb ^ w#zY7.a3Z g tk(ĸy-&i+6PEԜ <@q$ gs=}Q\c'߂:uR\xu4VpP(P?%d7hi2HGe)?nD!!* D#e`A!4ybbTmҶT" '~d8)|6,Kqdr`8".!9GFWo]^yIſą|kӪasg"A '9)Mr*f'Kĸ淕른ItmsUÄ u=$oiB*w72Y99D'+h䭀FcW,O x?¸2P; .tId_7j -؈RRG6&鐏ƜU>ݖ y0A]g9 ?n;`zHډn~}[ψUkQ VQ<-[rE;,zC  5!KYGx ɳk|2!)Q(+ꓵI]7~m-l*0yJA%b 8"mIPyF.vor>LӄAMTB \z,% 7I4+/[\dW ˑiI5{yh,T|niE mOcE]pJ_TsdSBb(blQ-nE/^~{ԟM<=x%VLV"GTa쫯.P*⍛<ߨ!b{޾]5D+՛xYok9̙(Ft@3]Qk~!e%(^S#]n~ꋀ2R~5c@[A&0L,(]SU2Ø:{IM*J;8 byPDfm7*6a+kFFC2֖\d5Tv3i>`XIiǰ.c=b9Y^NE[ՆAH+'* 7x"K\H=t)焑}i(tFFSx=,L e;,&GNm:5DP~^.3'Q`7ЦXXbUJK'2.~O·sK[XLJu굫(Z.topwȹ;ЏC>q5+Wυ-gQF-9ѡ }9G.UCfw!|BK ca(mO6Mk1ݧir? ;^Ur .^kt w\u8F^J{ŎodVwC`Iy/=4Wz+fM#/JF :<_<< 'ݎ7lZ0.Z:>- jbE<໭2}Gu6e:\O^\h|(JQҞz=’E@y_UsbvMAQ-KWǥPU>+7,?TC +rK^(ÙBKǮ;>"tF̒?HvwV!1 i\~8}G*6_R A( #IYwd^: J]1:$vy׺]@|PMk:)Y/]f4.ry3X:|DzM#6bx;i dek ҋDeYkSx ݀i#K{,WMv%D0[1i]3k Mp4rM gN LC%I3^$OEA⪸I&sQHp'Uh7!OJ{Wvp%>[a7,4yϢrN!0t(3.Ep+\nB + qdVH$DNA KsjN"u`CpT̜q٢є:aQ(r ʍ [Z~+pe4b;.PQ(V;z*) 0FKCa0RTMTiG~ȝ.^DGY̶bci<v*Bo=h68^Tv񓶈DrIi=YdS]&Jq6vR\ID 0tW'C.lՆ߳IW ѽ}PK]%-J,sU AÉXkQy O#hz>mTM hurG~8 }3wxe%`?ԎZs^2=w@G 6SGG"QX5S@r7toKiKYN\^4 AGfBC=12m3RrT =%ZrrnV Ƽ }r:q<;l]jT|[B5ji ^'~9~ fZ!7Qd+J J zpx;]Rij1*Mرsdt(Wc*INRwxXA/SX 4V'DÊO5O,'Y(Cߘъx0eR~FH5(bD}t+ѐBdi@61ԬPB x"8yPB R V7@ߖorBAm 1)aA1k-r#(Dtw|$ضʅ<[YZMNl`iL]C7A),͌^%z~Xy/LˆD}^%X:nd:r#)cGʿԐGw| w<-(RGf`Mc[gIIc!g1UFK.ͤA0@oܸBr?Ve}Wo#e,UbY~v ]fSv'/`Z.㎮[(PBX1T]䁛Ag369T(O*d]3b " pbqq`l/x_7Ig5@8} ޸\'/0RnEJXoC_L*i,nq'Đ,BcM!"+lrhV/^>#6p{G(:vD~:k'unj9Wz4r<mF&?E(nB9*q$eu}BF馅TZ X._.Xz )5{f&.=d[aM06ljX#U `8M)1e4BhBF˅qVIv'6뫊ߠq"Miz7'0$Hpj=[#& eM@߽'(n$o_ET2mKek; 0_a5Z].#GA*kQo)rJG&b% 0?!Z5.p-8,wHX{Z @+g5S: xn{U5{^{65ê^RէHl5x^P{!lRCI>i(1<!KЗZ/ۙ;!ShL; ͓ܞzº]!2VSYSvStK4>g٦ SWw3 ć1̂<ݦ2`~RUx̪4҄~w>Q Uꅍ# |F@pGʴ(4S`UAU)KYmx tHߕl8Y|F([\/9mh~QL.;  !Ў>!Pt/QVU GH L/OV>/\䬶L_ﺴLt\hN\i9wRg0) +diWFI &HEnk-Pn`-um!KFdMvV5YJ&D'Ẏ !y- &i {c p!|ö}fPlbY`t;T @9]"}&)օI!\wJ1_DW" U8+9%pmtn-TG>moA7ʴΠV?&WlhalפmX(^R`iDrK}W*|aAFqFg}7g7hW4[`z|G!n #;Թ y.mƹ47rbi<#~!c l,q 0O8B wtD)%.yI+a<(34k^{3CcmƆچ̗-IEaF,X XC0C.LR@׭l&n! I+:%\DZQe/bh5@ғK;'̐IJ>Ud(L tO)OߍmE^1/2*逪jaMȆBu{`Yn%R-_m]%K V*q=1UQl+-Q~_f4oTvh#L3N'IJWUHT*NpU>Z~6YGQkʤFs;hG.](>@``d.vBm_Y=k)!.A*FA9^ D s#{mHr/x'<^xf15l$'DENH]]&Ѝj }pOqgN~$;W`0ᬇ66 <Չdدz/u5g\lC͵ZPT!I-b]B-.~r=֐G= ?)oDs$IJ6/'0bV ӁaֽrOo-#ߣVN7lһ ~O^\*`#1$0SA6Jní1Kj$54e)7!Ɓu).seQ *cKIJHt,#y6s74&5Cn[I p}|Ȍb .`@XkN#cC@g8}P9nTQ>Q.P&..:SĨO3{B0+\~)%ǭ5̓~S`XaCG$!\WunKҴ*D8Bā8k鰶 m`k~nC_х(kϋ2SIe/] FX\6ᯑDrXEyzP.+ɏWL㽛zrM`ff^څc,f5xlzcy ț VgQ~L@yBQ|(FzI~!& )Qll>E ʳuY~ "f.'ө_\B'5 L Wۭ^-_X.E/Hn.Z۲SFlօ !\g©R NZ/Cx3/W;gQd- F7M\U 8q.2n5 FoawI)ba"r$-ِga=MXagUJ(AԠ:3G;^M?C#˩d>JOiob O:8#X'-JK_#2:W-<9ȄPVVޣ\yD86_5\ oFʂw/Pt5cʙês,e-=t)7mg9*'h3AڑMT͙*|L2LTud _x#D&v(8(rL9BF?FwnPJ?.-A=3PN Vݿ^ST@!ޔ36`]h |/qJZh檭v$c qK:1kF\*v\ܒ$P8ۢjC4rE=Ζ漛A&KKu2{1M YC#|t~&et܍(QURbrBdW4ȝrw&qF[Z)C_(h0k) Pfͫ5oRto2: f~}S}4VKDŽ[L#вkӴ&^TUQk 6a,zq ]D*l4o @b#qFTwh mRr2z?A-oQHMqϺ 0}.D.l?uu7/~Dl;mٟT*YiCO#G?9b0dB,7ME ^-7!'n4V(-q;Pr^,&>DQw:j%,v'4 4Ѩ>Cü>MADbkjF_^"fS ͋4J鿐UmpGX+f =<þ~ $ TnHVWt&7+ 3YoW6rj4㙙 k%6i3TwK0$^=兀'8{~? A POX|֥^óڸ2E4~XHLK雥;%kc5Č{$+ %=,sl aՄmyA-ϣwzV*5 ⯦-oVGg,G :E,]+&WR .$]xyϏ_ky}gEw^Ԍk4;~xH-ÒNz2r=q èZf}r$' <]?'% ~8Tg+vStT6LlekH.ca#-`jvJA@,[.̞58Y7\ۋy܃ǥcf|8aCL,@ U21iqE&?W+M1Z7,R<̠KHF3@4O cY{`go#8=6&gַI1,ݤ]>]U!\ZYQ .WB7J0 n'vO8 |A0(A 3=&Z8Bt[GO 1mrz=5>M:Y-𐀏mJp/Kd$ugkjONlաW0 X:Z.T趌7u"JMS~rmRTʽGDjn浙S2uykҋ=WL =A6n˞-)_cl7pn<.|}18X96W%mF t&5X]^(ܩsG5JF{7,pt"xW+awDdt<ӂpp)#R.{D< ^ :,u $]c+B.LNZgHZ;h[jF54|aEx9^FvG&Hdxg}+OboUU%!^-ԏ30~RCR(v>s-bri ;"?+NE}4VES>KGbMS-`ҭ"1Mˡ)[U i>tM"v]Njw0M jSOI®Dr.W;{iH#Z3y1h"='2RKhḯg9Q*30_D,V8ŹqZD,T$KE/TB!'Xuy=h/w@BjՎ*ӟJIs7,#nSJmIkw ybu(E @;D 0٘lP wIVDk9,c^'ɄŖX&d{kUF_YV(%gG' QƲxfMm(m;΍B/RfWf˝+@NyWR>T͖, *(ird1qi)kO@! #rDIy2PeӤE\>ʫvN,Cz4QSM@RX(UB|x*Vdll#&XLjUU/ !zGh/".* $&OWlfD(=" B;li =r HJoCEP7aGГLG!+aQ8!%k:tb5Wh<OPo{INՉ-,<,Z]7ЂɯL4TDr*ѸI̚JmY'5u)GH*h{f+ WpRb[p)j1=J` QIULL{.Q w ᦌWI=Ύ^=t1 zOT2$FyWQ[^0o乲Vo!3."6JG32Ioj]95@-ൢucF-EIDov tƣKPBGNu|v mʄ>$J& + C glr1 Qx3y?-$Iķuٍ V y0! 6hJLdob] bpS]ffE*jq_y3q1 t,nM^ڀo԰mY3EZb)ۯImئ\"\O`~3Q)n\ă \T 4 νOSdkURf ɅVJ2?\:%dߚlc '3Φ Erio5֪M>]KfS.4ZբQܿr':HaA22*C#z & y\CĽ5NGFSH0MH|iD7̱_Аpe`Q4i?Q'׭`ܑ"єZ(-läp|Hqڗǭm:c4[^~BL=jɪR fZX-D !)6(=HL&%C3Ãe['u9ΐ ZwSl &z1֮ˣ5qOL@AJJ&mta1I k Y|Nΐo.0c=mve!D;ꉾ~͖N"" 샅؊g9Aoѝ@)ٓ2ݲ"QQ7k>eֺ !3P:?/T.xМ-{_4?g7^ٴ%S*)?%{o.d:5(}b ;Y h#KCcp8K N ӼWYi3G9pU1fr1U}FV~uS3L<-~5U#9·LSo .;fU8uA|z'1tJ^0rtFSj}Lأ5VM6Q f8+"NoP-/HE? 7EAh@w{eYDk V.i%6M f=B޽}qJ^usq.اmM%Ju~TюŠ_eSm4S'\C(l(r kأ}}ԡ!"%z]L_h^q^__!6 qJ.۠vՔBhk?U?Ȭ')`M>S Bm>Sx,7)-99M<]$JѡMG>~2NGbA/^p"9Wł%LUdajq aodzd.4IK%ERcqS?Z" 2-#qF:MyDa|- >TQ!o5Ь '5Y;k!3YtMs  >l-4WP@mnIsUrQH<.u;Qgwe>)ƣKX}MWyBV?&USGۋ׋lb(1:k 1Hͬ+O,`}s`Q. ̇fwá˞#Cӷ,s*)~GwHzT.YUɀ7VPPAXǗD+ot~b6NI+~#~'_Ddj){/\7x0ݮ.!3<>RWRm'MjA89;5~=/Si e<lيϭ|}%l"aQ}i1R{Ai6bOb/ӻQffv+j#ЛW'D3 .9~ƿa8:AaHwlPf1(k@i?c7TTȜUSrղDGES2`Ĥ:$aŗܘשv͛Y a7-w$5v¦ ؝W;g;хCwn/.Llj8x"V86B?!fS>M:uuxΒ͍3$6…=Ċf$+rjREIPo},%hD@҂j Dχ#] {lFO Ӗ^EEY C:RPօO bAh0e Fgrǥf7ܙg#t*%gi ~1+_i)Pz7,;F90MJ*^d?s՚G,Nd5"SYP5HZWI"!4E@..ugrN}4] ucCy0,@f&7ՀCSi[m>gP ;/LꈝtS# ICBH:[)DO{7֧>WY\<@WP$&߽VF*07BF㍁g=҂U#Ko Ee>'=j*wjVqttյDŽkуDݣ= 6TϡIeZL~aΕ ،A| DԧoQ }1k*#F+H(q{6^x#YwZqY@0c^9ga_{9B~CC$&g,I_0б-V59z0~;>/ #>OK7(.>u2| ލ81 1^&lMN:xV!v%[6g"}؛bD@n`@^l ϸx_ D\\HTSEf6K'56VxlR6=[.xyR x -IiCP>ԗ{s]k3P%|6,D4 6M-+ϛo*uț a m5EZ ]0Db!-M:n܆+/6ѨqyL/k܀`3M``żH]#47h&J:zb K&C [Z2PlpD[%rK_v`!:әtIê]TTBZI~-Ֆc7rDn5IT%m ʲ#S=xcUO"}'ZW rU _tgCz۩ #uI/l5di2OfԪk_>yд0Dߩ%Jw+ J.͐1@zʇhy1ׅY&T*,l]ɸQ-^J(.[tF챇֝Q{z0g*#Vu?z;{Ϧ^W? N|^\Uš⋪o9u)fWS #{*>.+VZPrB˗B?rVFSh_O N4"W '-(g C|Z>;}LܷB}C &-zw̌tռxN2u%ɓq+Y5:ZԬk+y|^j̱ԀM-£ }캧\;EV "kK ~vG|EpHz{͹4*I_ZMZDP"Fǀ8`;[@uQ~WXLψ[y/Mc+SgllY@28P$0@φr ϏUYT7% ]E؄ }iB*M >a 3A<\!O[-_،ٌh\JL$nJC>EŜ%0k^ZzŴtɍ ՀHt!ebV,(}3Hzq0ʲ j?ʖ=JG٠R$zwf; K:Й̨ Vi߂Q…9v=lLgХ V¤ 4[ T5z\dW8GzT6ai?DCD0kYvRdӬV}*<cXSY|40<}%iV &`k dϺVVɐRT*u 2ifC2%biy7GzuD\=;kr71&n)բ7S_q20޶lcnTEW_qRtg-~S&s+A\C0QCCuA n7< aMf"ngm"IAI8?r頔ݭp 6M6%Pߞ$ Up-) m:tRzO(KebSbtaՀyF}TnቷE,s5  VQ}op`,Qqz̋ظU?c~*(խizT?7>K=hV%^raæb;>H)=@|%.q;Y峻n~4aY^> D f޸YXe&hvXI2N]t9FˡzY.@ͯ3~FO傑-h˚5X5k41+|m-UA>T:fbJԵ 󷟱^dȌs$D·$!,ZG juDD\wqg˰yz`3SMBOxzhy@t}6&D-ipB3_%%5Ѽ8gO,MFGyM`UL"ҵubLWgW$`h%H :@GSmpV)Yookۮ(ڦ՗8$FVB`s% {?ÿw#Bq]iu\CXK˹)HzftᇩkZoualWH)( `[1cٍOO5 xO [+3UwB7n+-&RXzFc%KSYSʯkV g=C#~ԋ0L-C9e ?ы8 ́ZZ#eVqq.>^8lϹŅ#ߺ(2j-7pپ|ꐗY ^YweVZfn=la=Karބēj A?qV-݋:z"~o3 Ѝ\zVЮ5gVO~qQ|)2"WoNt,v$t!A&puuAnvceE2<_Bʅ[;_z/m`ըJ݊ݱLwX,"T].ܺNuεl֓M\^xs's{mNf %n%trh(=A U+J(@'7dYSņz*ܱ }*Q`F⠢FaADB)+<ROsyU'!m]9ګңRp UQR2U,J᥎}Cه##wnZ[sG9[#Ix?ox>]H+Z}qo68' :,uԂ2K{ŲSGAM=@a`mzn6bQxA].n<>]a"Mg}ֱD*vܬiD^FR4鴏3W5@mJE,t2YynT(wGN>@ܔPCr{Wj듹8= ⥩$aA=SF/'~8HN !s.ɺ25(KKW#R vjI4pmY/YjqcVxIJ[.,lf<ň,AF WASԽ׸ckɥ^Vɀ^[U YME&v\,[;ݫ eǒ׌V[B}dc) i7}e$ p۬qGZ#_˅3.!DŽkOΑmL$|l.9RiqkdXřu5+:YW1]e}k| m|-=lEkY_pEjQR\Ԙ+|S.RdRHI61UJf!X=qM XQAs4roqݩdm#L\:պlśԆ?v6Y`ㆸMwqhcr-*˺H΂HgLҁ 5)x~m0fAZ7/I<2 ûx&~\'Z3ڵrp^a~c?X9O2CDs$d ֚)fmتNrt5pB}! #x-؈ uW $) )hݛwI&ȥB ?vXL@'ޡ4 A۬M7ctMСTNM ۷RB½LXa!v+wr&T5oΠi̟OG4sZY=y(:<(مK41kFI^) ɍ*Dc<o%bWAi6S71H~ O=͊#C:fXۛE9%VFT̈́͐۫@Q:p6UV)1CJW0Ń2&3{1=z[5 }%n'jSpτ,U0* \gAmˇ1:^g [!gAk*( |Qvu2*b[XeQ;0VV X~;>ҵOwo\[+ْ%hU2~4N 1f.]Ò,155 w${:>T' 뱙HY3wq+٘HO. [a"ӡcKQZ=(R/K+d_B:ڹ(E`&uNfqhz dEc/.D1m:քeJ?'%bM8>ctHF,j`slR VLFzF$ [la/Yޔ"QUl q];OE6F,-K|Igte2ܔQ[Ϯ)+V{-547 (ߘÈdpnz|{sb H&m Ch0㶠 '"H!$~VCsj9sDh::&ݧm7 {.x[nZ( uqH|5qS +N$>ؖ쳧6ovր"񬆳CLKmR/!W.b$2lj1Rtl&ruui7E[>euUJ ήrQa[*0|c 2eIգtߜ ~N n7-ʼn36%HT"rLȨRV `oiT qE- | TێD{F.Rz!H| X௢m%Q,ob&jk$i f2gL ng̣W:{ǛM;8S7z?4u?3cgj2%J*c~A^Rcg!+Gޞ(hә=4Dv4rvoi2!(gmIX&Þ#pZ~\yrS ޯde|ZgcSbI7VSĄ'MUA%\m@*b)VЩU^E{>06e),i7|%\/ 5Ys5G/ ))5rDX0gʦKa3wpb!H oǐN$ëie m*}W/͹1 (j=K,P?d U뫲 U5C/ʸzF霑 awl,MZ,s1qap}nU*iq@j,y\ _Ukl٘dokp p[sh\'d/e7bp&`kRD3Ɉ!aĠ”o7Tf./h,Q m,Y_SC0{&"ؤʁ1js XK NP8T$cpu9tE]D[菫ݙ r~GՅ0ȱbPYTxI{),Tgp V2(l1 IT})P.i6A╄VOhVk},߈bpdǴ N+BWk#\g>!>jGGկ8PĈӈ@.#DhRq*1b񼽮 ?:SA.,}q݊$!p,:"!?B0qj:D1'~a=ѯ89.;EDC,>nb^)Ө77O4#^ֵ5qG9Az1ӎ*HQ. KHrMSKYu <%Zpk_ՙ!)y|&K{D*kJ:X{[FO]nJ}]^cSGVDNJEXL>af(Cx!-3J9t<=QSrƒu><uV^SF@_*UMmK,G[b7dPT学RA-+kͤƍ" H$,BC *fv2֐;uX&a_XXU2pJE%58_\D Lt{AǓfqwX`yd]+Qj6e+ H7olRe/3xW zŕ8ͷhZ< ҍK WƯ k#?;Y(fwB%BANmgu?ᆲKv)p&V[ O+ʐs0Ԇ!dk'e=!S.I"C4c&~~_o~۰K=32]V'|LomsI+pa fN2HL-% mDvS6Q&EO$_K=+3:Z]"j52CE"h- FR9{^$Ƅk׃!]EEf ދ6Q v5.޻H3z!JGo,s>'PB2[.B?"a3%tez@bW S_-h߶cR]CT}yV*qIihA4~-kz2φ/xr(`5 O͙B'452;I AAļ"qBO0m :4gŒH`zPxuŮk܉ t=-yJ[ڤ)e sLFzSߚ󛰽Ї4BL .OuXd?WaaKUȲ;][8?Uut#VΌj(* +P]h!BJ\#֘Xa"f2&LE9(7YXXbAkF͎^֮wvsҘ,9R'j4:q ]{w7vS"'&_ByÊzq46?G4t|+5yc2{"FkܵK g6ӄU(:xXhHyˮ5Aj잚XyUJ;n\y&M7ױzJvH1@$mلj6v@TR쿋KR>hn:<==F S,%au;F# XX7|AM+ȧS;ZC5laá1 PB Q(5X{XwT<*!:y| O)[`?A_BҎш!j@(f<, !,`/Zޟ鿑:A$c BAΊkڟhw7ӛ GȥLkw#s&TQdm{zG8tG>h)p1la$aBe;$ JD_. _ T6n&ѡqж5LÎVj5[8N5?(ni%smf-#iYo%}XR:$6sXɚvv{%-4 G{& ߘU+ڪhb씚MЌdSk%-@diԁY- hմ>bx<ĞJXtų `s^LVbz;F‚]0ݫ~50[~dҫŀA>755`ݨ5~VϦ0t Mr>=v XИoUb(C?٭]1b+ {ї+"YD_j.cn~3W)uF=ZÑ촛xUj"Hs.+ƭeNH(8grS71!t@=RFm-\W22MϩD[k4 Swn&9s74 J%L̄r cg7WN M:zx-(ltbYs4YlUȔ*h R?R&] M?é5呕v?Ϩe\"+]1ɽunB y~ 4`Pe"Y-i@pV?l"XREJEwzBdž(*,קj6i =Ѽ;Hwt1F`4?_â|s .K} |7=~u%t.s3AN2lȢ窢h _~iOg}a$4Rxl^,m@1}2qB 쓔'{ӟiE޽!@ٰSmۭg|*UO~y$cBu02Ȝ?jُP9x$|"4ɯ"#2Ь_(@PNq&$Q>>iITI/rE!Q4RvnΡbaS[pp T}Ə %MKulVJstZPO<-ߛgF-ʖ L$ױ#g.t0+ŮAl&?&sfDL[{ 7ba@+],ptBD _3b :ljKf g(.N#t#{q "t~y=]$UUO." l<2ԹK,\g,Cq=ec?@ObTTӻo.j>m|: (k}`=*x1IA}V5XŶm͔~zhj` 0)k){G/XQvҚ$Zr|->rGALvHqF![t`|~jtqf}'/`rǺ~ǍP,`nú;gBN+@iE܊ԙp!r_ 2,4VeJ! B)o/EKNK=a]QS $[B C3,mB󮕥lafXC1[cVհgL5++!m7ƓZx{Y-csar58yщkF7{F!Ur6,SBfA0S1DazGC9 (!~qCÑr5սڨݟ& `u,M,~Sie/fosBMw s}E]"d@* JaSI*S!vFRJ:Xv$\0Z1n7tw`}9&EmHq)BQj߮\2[shԇ=ss`2r0\f,d1\^uHRe栄)ڭ:FK栂塈Ӫw<&p4׵`Sk'N 9Z]k(פs5$om Dmؘ@̲l 9KJx 9}7d)g$wL{ G꿲uP$ށK+/FgTIߩe"d-ڴl7gLRST))b{6jɇ7Ά[E{Ň+[Yٳ4DTV誴/l @C|q+6lO[~&$GEK+oh~B$ŧhSJedAnw%$t*!LNXo{C ѢWM֒]Mѵtywu"{B yy5,Z XX~Qn C^;Uʵdue6 $o=j9t{Dcqk՘i"OpL̤ijkŘ^lÍQ  chꖼ_㳮 `?ѭm8"7|qFV};qi'>4<7 \Ji;o AQ[wd-p3~Qh'+ywtEjaZmebʮz:Qĉ2Zt1T꫇]q 7J\SQu!sVü"w*帡4'% scx)jay˹7|y ސƾxC9ӒWOpLKr2AфoVyz>ė(uHw6ls~Fd6lpҫW?)]4L~uueO$C.~Uj8Քz/zn{=SE+ۖA m{.a I A(L-Z  ~q ^VdL'\G |?V5Wgl*og3Q.mw \~8Z;&Sv8R؁$vhX?inaېj>]R"QDFK.Op|`3&Hd 0^l ɫᛵ/ZBǟ-$;a%E`R\Ҡ5} CO\AP%ڶSrWr}m+.)A>UMR\8rz7nMM-Kiʫ3rX J5%lƑ-zOV$CgQuȖ!St(B "6FGIa4"@(a"cw#$$>R3eæ;+~&Ri~8Oa3!?CES$ғ0`"N1ޣ$%e0={l0U'0W:4\5 dw݂N@~;A6c+%q kev_/г]jC/jΩ{vml*/^AsZۏG亿sAJ ΢^ZҫE.8@egU̙6R4~Cs! T6Q$獁P3$7^'tkfqK'$Z !2K! W* (I.mk1W2 G+a5)nRl7-m;(]*h8O[=!"gqB[ac8i3Yeo^nHx6t/̢K:QuSWg yCu#:Szs2ٴZkJj?xcEty\s]mf8u,_p)F-%Ks p;{;Rgl-i?<ѱ.wi/=,edIE[ll8!^43FA  «c8Ɏ%T>aaNё9A7L@WĖ@ 4Z`ư«lnImĊ]l3/$YBEMC߬j9j(-丘v&PkK;M2Jicmd6 Zhj]Tq Ys֓/AoM8hY0CoJpXP RT$Pˎ+EΌ3R'8sZh|P 'ۯ<Wbv2#^0í}]tE{s&@*W+a.<ʞPla~ӾOq0G$|;L!Vk)?DF r<SM«a|~IgXy"7Y"ba1XA1^@Tci$X.7-+6t<QZ.pT/該4 $;!F_15&фhKՐEøodք9il3gWk1q?P7p`o"1*뙖^V(c|߫nM޷wjAq}N~tg _ts2=w$O31M\׷t޸cURκ4|WkezC4j`,?q+[ayJckf ?5,^/$dҹ'DKN"=Ru4=\vO{XiyA /F?]e}2e7tDDsmSM/ \kr%eu|ME;R $mu0`w8)̪ KB+bSE6tc oV,UL (O8$D#O%Ei,#UI"]]1QҼ4>C E /&r `f6zT!ZA3YMcܻ%c1!ѥLKCo]E ͝( 05% VM5" gnf2{N`Ŝ۝>MCk}`?U(y+<dF~ՅQ]S7y#XG(J 9s/~눔DOT+#"ݝvR^ys?E@:/&.dGQ;"]%[a /1"mZٹ 2@q!;Z $&e&/cUMqgUKa?6B^gzGXAJmo]s?)ɿa;oL]|?]esnl0bOɀ& 9-U2c l#~+f$;ak>#A\vx-u~&_,AjԒY Q)x?vm-TQxt֨7oKL~ KTL@@_afpt!IÄNAuRdfwrhOM/OҐcbj0mCcQ\VE-/4AJzoåMseC8M!rc58VFFDOCSkT3l.VWU!!n!É<:I:ö)n[4%FYPfQ`mP 46p9@kC2E[(-t2HKE ySg!"o|ZMʨcI@$[״VoH{jɡ<ě 1yjX$l= Ruixc<ֳbV"LZBk1eoXz&v򮅭IݏvQ3z'4&ɍ_c3c @qpɉ]6D}t#$O[|vQ7 !sJZߙOauF6,σe; 6mY[PTQ\f5?^vppsI\HXSc}~*Z*IDz=`jh6$G$8tJpbډ&VE]q6"4u<W7o/v@W55/µ]ӋT:R(s$Ue>j2:547s~ f΁jbO§%Rm?lՀrp%>wH0͎gFqOېyH*#3w X$i=Ni?]h TlXCvn`ʇ$>$ WFK@-{T>MpYM0 t1Xу1ϝy7# xd%˾ ?:dMq|nŁl"pUyQ7@?o&J{p)ȣA'mxltp+Cc' ;joQDZv%˸LhovgywEW;hO'gyENNMdPx4N«=KDJ1Fe^ e 6p\F١/uH?u{j|#T5^-ҍt`w݀Z#/B-CVAJ0CU{z~L,c X~4 T($:cdKX@X<jhZmm;pV8SPf: Eek7XZ 52'U//)aSg@Z_Q|B V$fM r̎[\%w>0$QwހZͽŴPdxS_֟1]o^+`_õ~,o&{dP0}Kp> G7A֠x'U6:A#0S 󪘘TCS[Uλr.|pΕ zC4Hw@Q~=hɃm%4USLAKAYpnavo?cY>;4ռLOr?+#y'5l|8,|SG; `]@oBwBV*J,'̎F( `Ѭԟt:T|p\'GBx\q@dȦzz\qXl'"c_R\*Rzٵm8ۘhXx$x/4hYYpʔ; ï7xcb h9YxP)~/3c}+W59=5h#/Q&*5'9ݚNp.U8|&>BY7E v+^Z`޶/ɚeͼXb +뗚PԠﴎ\F50fDj뻴OzTQBGJY [kNȫ%% > 頄 N)K-lRnpN*&᝸i:4uNDuNĞ9Џ:(UGbP=C}`3/=)s 9KLNc*O3hmchkrěvB0ZlLs\YDi}$l{{8ߧ^DЃۿ/ 46=q;Rhٵ1ߤ@y.t+UӅcHQ+MS٠/D8^#AMSoV8*,6cRs2vvQC לF>#!8SEZ07s)b0==y{KBl&qVR{Ahs=(U~7!? 㺏c(I_.؜t 6\o&d' Ԟ^zm4mqw/o}ɤ \ۣt[, "5N} KCxqnm0zˮ`G̈1bĠ)Z[g!#zEz^w .KҬF_y 7- \cqF0<{6VG?)IVgׇ[9HFb5+WQN>W +RCLQ,󂱊$ ʥ1!.dZR¯ 1řw˺BN̡&mcod 06uPڊq[ȳu5GӸi1G\>) :>,O|rE'NǾ BkL +OW X R/JOh'-Q@| S"PKzkpNUϔ KdbJuƒؗx->2֞vTTו\ %@V{uHr8`h&q.ݱS9VzDǪK#*珴(Ft(P&LBM*AUCst 'v:؇i%җlQ+&%? VSH!O;`g&JsgDD1Nܴ늲OSaR]$_k'>Zω6#*Ix VyN#_$y1_ gz*ϲh1^<]wk2 9ۏLƶ$BMEE9mV.`Q4+MxT*ʩC@f},Rw;2Ly8\ɘ/Qu!<_=Z 3z1j2$[%.G6.T <ܥ 3_J 1;/;u頺%:d=y* 3`N%&f>= :-K?o(Mq]dWܝ4B~qVA-<\}>kS' E.mkDV~Mfr_'dÜcߙl Jw(;󙄿="!šb_7^tK{j[#9}e h:D"+.v9X8˞/! k8Z rqCVdR9K{Ka*JxϺl!c,P,E'/Q?0=b1 DQc+F{BzB$fAK%҂:b)h&x6Tz}.^ŒDS k>kaY2q{klY] JQ0~Z=1bfU9wG P#ÓF_|md(y1!oGG6N GM'B Fb"@_w'Gſ.7P2,2\'Ҟ =C~' mh~i"?@,[OcH4 9{zdUH1bc\XVOE)a̠UQ2B9mWaI$۪,uOTR3=7ޢu{RJ 'ɽymr "г#nv~XaK#3 qy9̞Oh|{_ʳ[.3#8>dɃNQݔ?l)cCk`$`?0SFs73 t[6R|^]vZp.U0U:ܽ#s=mzXL'q8V?:e7xc9k~@zr6;j_#ӬM#m6,E}տse!䢎?~jZ˽z~] eht ObQjOžK߀ϵhE( #7 M3Ul,ɕ aZJ?s 'IޚπС-HwnͶ} x6ornDseI!)hKEEa]8nsj7f\ݼ%$=tK +!37vG8w!xҗʕm}u@qw5VLxMq+Pp_u,T1=~Fw2qp{{WƤ2$y+)pqh*'3/ˣ9*`R[gUYDPp%3>ɞeh[ Pz Ao[@N$}_]gF>/>DŽݷܨW[.6L4 h}HSMRmM~PJF'Š^\ }G#jz6nT:Vٿn8SSc'vMZԛc~Lwe|󓾡 Q_~Jһ+gJt 鯎BpptHߖqFEcޛ!Zj T u<á&unw]I=aNGFEg63 *s,kxן͓>NxyIÜƛ.׌xA EV%6#_Ne}ՀrpX|0f;~A̪^Kt5H@ iL6wCbgM" 6Pf(G\w)Ӽ#X0}8\ 9JxƟWVoB2rǠ04ɧ^5Md*8Ǥd"6Osf2I51Iu,&],"4)Swޓ<DF܋ dAYcS:ۘ>u) +fT@ćs+;6aKd0.ߖ|7zQ`22-ۛkRLsuLaXm(a= H ꚑ.6}}"[ e礐9ʌGKk Njl~/ƕ?BL3 `=vC)χ)iaU[@ghvQ2X!sԥݖ@tQ[vn_fFnV ]l LkB\8LL:?x^`z~A RRwV@D ";Orڮch 'cZF)4m"&iSd5dxagLNV툥%=/FlHdCujM#_cyf۪%CYs5G)0S "ȶ,x&Qy H(bU2XqN?cI 0}`@$3k 'cO)6Z /?AZȩrUp+X ;]kbc??#gt~C \DkqGc?~ҲIܽxO)4IFpLA2ij _!OT{:㿳Qcq|J6]2ԠE̫.SY3~.O~fT81jFf=16G݃d|qQLE⢨!?{('^^9׉U-)(iU AgPvYNJ̈I< }}qi|pS( *ژ MQ3t dF(lּ3|5VIeUԟ~c砉 떘ΫÑ0Q a>EOnỴL?w;pe{59$wBoWGn5β@; ޻ca=Ђ&"̀2쭷oesrtc-{Bܻc Z8TG&r^١q F`[ݲJh|INϴ!GqJBO/P$q3O}8?E&QxPH{O!Oi~:km9cYC<-sHn)zz<0/#6i pdӪ[m*9ƑDjgr^@Nmu|7xV#t`qXk-IkЅԩ7Ɠw${{U'[i gwoVG`2]D$(E-|{R,-=Z""[Smu9Qt%2G)jQk*Z_ebA/i]J ?h^ةiMmA&31krHڌlر|XLZE)`j7,ce6` s*"v|\hg[~ {#Uk&˫/ f1>=q缧6I/LJTO?͠D>rA@YJ\bxh6ެv,T!!#L&UH- 9:KU\iȦqӂ cg>'@Uȶ~^AL4j|:)%3þ@X]16Ӳ ~6|T*sj t@Qppt? +!X=\6co+O%֬\mjG@v)-gv0)ZbDr >Ǽ=1W<4 KXl1qTk Jo+SEdԆٶg'2X\r>|.Fau \ ޑaw)#j NAfHNqȭp@CZe!D 4I&cio:vw=(:XJdKmzF߃Z^?Kwt 8d1sO<¹3IU A"azU~g!3:lEܠb8*Q[o {rJDyww w{3M%2^22jOV֧Q?̙-yGb:Xr.YGTN9.OY@~4@gz~lAGFT50&ǻAHt]84}olƃ̌,aVV.=ChnDwUnD)XNFxYuH؞*=="=ꏦ@iX![e}_p|121l ӧCeXHB7e|?㌲`HO,~PaV;F[8lw8G FQ#> NG:ꮆXQlU^(L?;ݽ{Y϶vcex a,&wh k-ٗ.;dX|[o:\>~ \\z=Y&BMcj#204ݎՉSlf@mrS&؆ɪۥOdfzUϗ~#\YX % zôSSD=֑+ETg>⍴D[NU5A.k=afLۮ!J2*wLVjT9.w[luI=dELWˉLF&䢾s.i 8EC:5$83Y\XDZc471x6Q-H+`TR=N=6vTvm!ī&B(VJ`1XNXBp!i|@|K ;9~(:tGIg?Ke0"cYٱHl]΄&%p?9By!r}|7נ-!mpw-k8P&{آ 늬sv%ݑd ޞ q%ٓ8Vm iYR6EF%/JS+vkQ͓u]"'̋o_;u 8BgoZݏF-)?_hH7^(m&w \o)̽z:mꡆi3Ka8Kx\Bfyv_]4ʨ 8w#'*sI<%p")lTVZCj-(;v9J\u+5l5^E%hlSLJ "&'.f:Y . ݸ_c}M9Z ^P5U!; *=IA}_R"44sV^N$m>pR9p" TIz 'G@ilxn~h>h>RBL!qJ)3w\Od6r*]&l#;V<$\~(ғafE(T )rV4WMz M2$xؠnv(8@7`chѐIDL3ќ^$*LJS!ˢj6&b=p{} c5>{S  361T˶UOGvXfWDfs:b05VRGd$*HT&7źegq1rNkZ$⿰_ާ !wz0)HC4ANm^ ," 8EpkuR"1[r5/JQvi2GOWקv^~ȧ]q0]Z9@P3E<;v1/m衁隴e⊡//hS1鼩F\/Wf^C-u(!1zdx!<<]ҥv9b'ٔ:7:?RÉAfL ;^- ID)?}q^[ٯ}%Vx|7n r'h9|!Glb >7ůz")+3I '"pqo e?J87;|^3V.O>d6@Cw'nR&b#,a\]٬<x:o4 waҞC] dKZ`Ŗ33Nn;"8ߨao)+ 9Y[V݋,G A Šlh@X>.z+ܶ)kYӌ'{Y9 nIɗ:h&JհoJw Z.@4e{7lH q~nN2x7 򚈃9β)ȫYO #5>E܁,zHU0y&qٿ vU/OMUgϡ^ Pduz :șj¢cC{$*E~mHtxk)Nw7[3 +pl,]!ID]eyGW"fN?s o2oRYŷ%s "܊PؗDG|'ϠwH`jx뭋Qvfj+bƯ.ö ;9"&I zꍒ(7.cK7\0d1|a 3bn5楗P/\fVjF3-;dx=Rm#p[n~5Zr7 ڭCvud)YnY"s1_pa#{@="Z˥u}&]z ƶ-ӱ a.%1$w#y|9AG@ o˳I6́>ߗwt`aUP+n'E BhŽȜC͈> ܦƀuqnpOХv:X.PFŵN+٬tY#OQ DAf+ Ƃ_rS¨Bܻ(z6<\)zvلYiX$IɅG3?s:#=b1wd@UD ) &O'+G>! ڵ%g6H +,R<DaؤK Ƶ :c琀z}jV54QfhN?bHw]- 1&2݁jdC} zKpxj* YIo:muq16 ![W/bֆ~q/7`n7PJ2 ~IփNГK`sҸqQB!^zb)-^FϮV2uzIo ԥypOT'."cOXXۤTԃgk <]˳ѫ4) &*;3Kזl􀫆Șg}%|$^R*ʁ5@Ing{i/1]÷U\dyy썭{ٲ{ȱ/:0Zd_&2rz"VxNcg)ō+WnH;eC,Ę9A!Y0E턛s٫ Tx{-8#, Yw{Jk3}P5pG]qPn -BvhQ72`Bk\;М\aP̈`ւE+75-r}&S hgWlJKL؍&]s6x,:bZjWĬRwQMn,wQ =PQ$!g(E 4{lK38c UnJƊ/vx"KFcj*KbDtE,rC `+r鵰jO7J畊 ZPn*ڲP`y`=b4K?^[~=NkruF^kyfDA ՘Y nfj!ށ|LJn,s+#TSu) ƙT?R .$IySρ@ Cl\rSr^:3yPm>l|^u'B$gf4eƣ S1&JQR[k^,^;NBc&d].1aYLeY a0s Yx $es姿Iy֜&έhN f:բ)z,UG[ğͥ8>]?%s"GY1 Ǔ,~{cL)^rBՠi&_[s4|嬲is<<<^97'mG2P;x#g)iiu4y0QOUr 5V:g8s?gNЫZc\J7*<C`iXi2^dK2mm/'ޢdVh?מc`}#I=,d9ʹ}!5[|U }ط\^gcJd(햘#P R)Gr6)?&L*>AzhӮn6y / `8g 5Z .8砮 δGP:wZq3^ct*P- `N3%=,6=NF 87b<> [94hLk*Ap,AW l:H[J< OMCשAm)6Fф~YCrpK>WT [|ǔz'Lebr䌌LdL HSnaNؕ8Xi:0vGǽE*ȴD*^H1ϋTgMߝAg&4lsWr ZiKr"0yQG_zc)6<*flw#NA)>|_I<{cٶǐY'Ѫp;YɔykU_x@g4UYq,Xi.*b`qE a-#$Fڵ^[=x9d|,> O@he^Uc(cХ Y|H݈]OքK}3sr+Z|lYd2`;|@3ȣ?=o7bWǃӟR#{K JppEULֈ,NidL #f!5pSM^i򥼉PM5q> [)oUNS!1FW Fz<ݶr-;4K-bpŭ8kK4E@>"oğZ3@_R 탩JKR߾Cλkr|]ݪ|Lo -I,찐b#bfM1˘85{3 (7GcCs(v[Zыz;69.4\+a2450W>ng7ã;tT e>7E1f2> LI۫Ȱ\_|&o,@,6EM7֊cܜuډ# WӪgaM_&Lq?W{3I#n#tiK'uIY{xL<0P^29`?ac_;ޝ`ѼscY ]߭?LɃd77BW^l[R럢Z` {f|82)_QpIq`1rԐRz70HU0tN; xzjo8(隱-b_BcVl/o&of_!wxi왦!ƒ].x;V! Ȩ.(## Nf㥥&Ù<<6ħ, 3!9*،҇ 2L(T8P٨_"}ԇ?|钏R$pb4!<%T^<7#2iͨљ=+s]{â!7P  |bUE&yƨ(֩ RFP2OZk0i[Ԁh.*'=0cBzbVy"MCWӄ,W50aNd!]As_R"K@jdgT}6Ij^.z…MP-*â&H2V^o,1|?O Dl+p_>2[gxuz 2AdpB{Ξ7 +ZxZe ﮳ﱚ&!֣5"c&f_[HC:HP!rT7#n6P%] L$'.3K}`;a}@%:MRS+LpEB'; 7D2AU`"O2qct!duMՈ~igax6a'})b~9 ,C*4-R6{Z^fxoEƙ%rA,u9zL3*@쭐?:`j[˛AiR˫sjٕZ)raȊqUxDq_P%Qb[cj׷zjj E}h bvAdR 2^Z>'=l#XMl&Y-7ĕQyb}NfXY=札A$tm]8X0=<L\˵2s'ڱo,?:X6Ek5IWEqt#8cra8KG\dv='6:'O C {2Z*ߨGSaU/zٛ!|vYt$Tɇr3hQF]y]EPS|+n!!1MoƚιnS =mfMAI\nKODຢ)[6;kK2hIɶz|@bN3+\ػwt^ےxxaJѺp(v) Z{Dʶ&uz^|* =:p'l/cpoM̯IcL3#ݴ}tHzj[pU@N7!]Y SD5°uYc\Cl$eȸQاxځ]A~)P f q@|:dhfL^&*'ғVH`%]]a+Y7dz6D6e׿J8 qtmX|GTk KOGfGҗ@#xJ$j%_KF/7 W7kFL.\-ҟ{P % 6O?BJ'zZ{M]BKnm/qk8[*z3=Eڿ+8( F|M~桓}zmVg_>L&`nNCCi1VY,T"$22U~ebD3g?b"W@.;P7&` _4;l[x2 ?͈.l=ka kEV!ԳyeSC~$+{p VZP>u RBf7,-y%/@ai>q:QaoPwQ#h%q4t>xj2_Bxbg9(cWBC{xIA DEN {=X {X&N_A%^BPMAI?!2U.čфaI˭B.GD,HFvҨv\Fc߸Q o(gk1fo9ſ}ӜU0vD^K7bzEAzxo2lI'<Qbb,hU+$Wo/4<[O,%Rj9 ƨLLD]uR$$5$}6@%=?_!nh?Ur].%-@:U3x^8)+TXLYfbT^~Ӣl<|ƩR$! 76fV %n¹h9Y~9E; {Urקd: Aj"f)Kg$H/HCG} -r_5Wck}s9ܑ"0C !!R=$KyX::`܃hP>A5 [XsܣHSI[h5S:2 xC:x`3Ls[E ".0 bC5~ |Um QƋB͠շ]-3_3GS3c$Ylm-o?c" ~oY/yxc\BVW6gHl:!|}l[\o ܽ%#CR-8SQ1Il;gוDG7!b3v!`W6(ZheF*|aVF | 4o[hDbO"$tCVZ]}*j/$Y58|)#kL,Eo%}v7 \ӎ>nC5Gܔ;fA O$U (S_[x>J3BdbY.t½B)90ѻI0(c-Pk7QPGD[}=D$7V ;Rֿ##dzzyz8#JK3Q6&{K0SI%~($eRTl6 T!ѲFrz5}D.oCDg:κEJ{o'y(0qҲ\@`V=F<'Ӎ"Z @qt+^'e񀷑:w?>ۃG cТu $hKs:?z $,SO%J.xAo2,=etɣ3YxDA RfmX6w!N9԰ 5Eluic>g^ kεnyE\v1p4(k|<ÅP)0=,n\'TW%Ҙ "hP'rdͰ $2euN鐉c#j }x1O,tb&#: (3D*A2;3A@TdyDY&>B؃k7- {x{IPU1C` M"$UqdL C,NNjv(mH/n{Ilb_ w@Ҭ ?C`3?p[]KGڪߊJCf'zB(QP袗.&C)"mIg HXV:0zr=L&iկ#$#A:&^i, g!\G ;lƩiTYQ`%7Z̤>A/ND\wA\Y",/ֱ%( E!Dځ4[y}nv<|.H1qM $=|O-Qq&L3Ԫ|0D.ާJ)}ɴ'ej!bw7h~1T%(4uVrϞ`O,^D<*[7?62S~~wc5p2l]+[_AYD[¨;?7Ajds5/}lfS&V-_%m r?;}H=8tl8+c`-%8n6d9TXJJYpel~!q ی&q>Dŕwxtm/ZZ+y4 lݷ3@ZlZoIo6ɱ ^,2P ht _P'?s׷TU ?N ҉jjJ?&??M8eNfAbLO~ɲ0G͉$[h塥7_EԪKUhh/U62X=!Z=߇m^`Li)ytԼsN٨"~WϊgKh?=1tۭH,/S/'v+IuR9hངj9L;<3A?&I sLY/KMj@ ޕ.ۉ&5 UoW!أzxI[ooI<=ۦoT0ǵ3r9*6-`VRTLEIf: 47hpJ^*2>9T X]+}=GY-[qz9GA>ĢOX)ic\tJd/㏆:u~Im pSKRM X/{wzch_#˨ꇶ89tAg8Rh`.so(Useʩj̖)y (2 sf@\JG88#~z:t y&Μ,8jV$z yMf:h_NLm)A Lrx2;!Z6>-ΖUXʤKBKp/')֎tЈ :=;rħ>Wa:&2۝hr8>*i bED<`֚>LT|SA}NF(X{{]Ÿax`yG&. hB]8Q͌c8ɼXΠxХimEG5F$Ί&4ķ 3SNO,f~(CKo}*ϝIj4| E n^-V Jj9}Pkll?FM c؏(j=HИўB&J~%S*MXzߥ4 m86F_EL'>̱ z W&\-acFOHll"JC!:_^qSw|坏U c]#6XK: UF$,k <}b57L ~*f,[_1iUGE w&՞{;]mWiWQnRPDz7e?U|3M$/q@T{=a.D<1\@KQĚ1!pRJr[a"A3+ d- }T /W1jsp|S`5wfX4{]gTΰ29* p6ؾc9֣s]iT(fi0ljnQ*7 Ӊ*9kl{ɕsf}r7cev& zZ65HS{e,LzǦt| KŗyUZ+Jr-cůn$<3y_(LŒ8+M @qԬ)jfcuat๜06L)y8U[bPГ`14|EV+3nf: tl )1@N}CZ4bQ4r.D;ʟs\ݶN׆[+Ka}k$^F'HveUхv׽d1+k%FhAxT'io19lkU2ϲlF+ W}S՗`@E.2o nݤcOɋ/U&#ޠ<gZ#QW](cyiJ-CP 9zXpϡH!1︮RݗvDd#R`Ydkty|ji_91&QUEwXj݆9DKRHu D7KWѶ2@1y<ŦetH#V38iX>J(~?[QIz/=L-op\s _wq@+&g zx<.Vk9!қͅhe$,K)W-Xa^q,fU qxl{GG ͖3UvQi&4sjErCuFRQέת gơʻG:h]@嗵5mP\>O[D#]\oeǒ4̈́}@I(ty )OXgmA3?1^N#tp@# ^ۡXYApoS݅6MwFyO]B 6G$Kq<m ;9fF=EWqO7*,DU,lC&S2N79C;2oDL<@@v).®ϧ?5SbyZ^Dc$^Js$BPg#c*6EC&:uˠYKO)Gw!f*ci,u+ DK$ px>hIx <~+Oh[r`v6/DU*"և׆LϢgF@"!Y'vt U ؼf@ui h!J~_ >T?ﱜ~gί%Kc-<>jkM{;Z]vS@gӖ.wB6DTJ*A,&[cVO_xg?DN}TN~D tag E0r(uY(_߃]K'dc 'I ~O$EkxJ]VgcE<:̴ۭ z8Ѩ9F#]g.]#I<&!". Ly":V/ZJH-ꖶ`Rj[%Ƽ,jz;@jrl3oBt8_F@f|m?GUN5[ҷ.TȻDEOJwaI^8w~/ qd\bz-hԳȃ>Gڕm_\oZeZ6gwhNcE~SFMrlH'Uf\+=W#-tT+\ ajpĺ@l}( ΨjO}q[b\4=xZPµGRʹ}Ekq $3mIC;ЃϪy g3h~׳!{@#θ e#=-@LM]-v5yT~Y!o[ؑJ_O$m1__J_H,흁\.384j8pݸ2!Ed Myګ[﹝>Al!6fM<=.u/ sGzz~愽sx9=N8r >=6ŰoBrj=4HT Gڃqb1w piҦHM"`hϐVBMH93k-NMϡHBETy vv],#flwYL}b|B45/<$᠖xJ{po<:)H/@ť/oX =ϏW5P^(تJlN[.?i~W1_T(XbD"޳Gݾ@b(O sfx>G1d-[VG|9>4DJw``_Pc3g'4_>kHhF{AvQSCd: \%3;`f".%՝̤ɨ=:ɳ:!@i3!;JLD?&HlN}0/brXer=P ܰq?9S*.(Mc< M Hy LiM40 l$ X)'V5#Garkw U$Go) M@GiXi<&7"}y`ɹ02x9`-dNjATұ&/UT@jkYE~ҋfvTB3~;Bc`~hG'+Sd92 Q5}X`У~eLz6^M˷i~vSQ` A 5z>|{0' Nj|cIb ۱>.خIBA$e:ܠ[ {Zp `ҲteYdL?y:I -'sÅ"2"u`2y"TGm%Dm`G_W83eԶ3tus KڞFyE$+(;[_?ʡ\#T1R??_As]d{d0ϺA8X6 Rb9Bn L>12A2~Nl#i+iu3 @TTBPoѷcnwG\jl*in]_/r(G~8b^g*$0>ֲy04IӴIlF)՗MM[ɣ6E m:ILUפM!]QTsdir,uŲuKHS!sSIJG23J2fǝ7T1 q8%o}nMBjPW3jbUpq1X !?NDKz[ʩn!L% |ꭤA jf)ɬ=y?a#ثi̓;A`Bx#J1okN=.ol~VuNz3V b5JuW3QKwfOrt0|WoM*v1E"|7=0< mwi8ѻypzWDahWL#Okr,(e8DZcŭzJjLaߙ&d'V}fo~Wodh 7ҭk8]a>-oLh< y2oxDqvV$Iv )$:(Qi׬)Pܵi:d O~^W7|zz>z9s G50CM_o(b&IøP8 。#D ߕ?ӏZLQOfƻ1<î^,o=2i;LгɌ~(8C>TP$ $d3Up8󗨲I1t+MĴ)ubLA -  }pb64k +ϣsS MG0^yx5 `/q}L`Y'bs-T_0xtfy&ucLwر/g~"i7 4T04}\qneZVNEl=uQ}WOI*~t-Y%"CqxIM ~fA8\R @hMqgsjc!!a. n/΃O{{bwh?)*w$)OWm.O(+5ş eG U? pMt"Χɟy WKt]FTݿekȤ>V|'n[R| e-UA~x.BCD 2B60fh`9!,dPzGZ[ z6YC 9C{25$s/3+-*R;Vjf_]yZㄛ*>#T:񟸢Q_BNPLMvQ+,xݭj֛MOy8q/7鑑]K+dKsvE%zȔh+1~6i nW[MC5U! ȁm%2qY[Xւ:/mK&*\{2Aӧ&6^ 'y$u /J& K˱tWq7k<(н˻&coS8vrSg:;^ڇfɜ +A"_Xn1-~?š@bD&PX4X._[3ܠ%=67Yc+{RfpNHᩛ9ՈtnQC̨?w*½e؆+<$InA^F~0i5ʎ7NV*~Zb.7h)NFTH &Usn(3ێ-aet/נq sy;ى,@H NB4*?e& G+XV{#sڔF!=Jb'si/ʳA)#쟔ɧSzT߉$!"{~!*Ȱ,G N\rOhAReY-D#HdO PQ@˥T~~銖J;-B"+..[>Iv`S3VUY#Yy ,k9QvFk~'~]Ը+U׈x63k7\}"v'1a8.3g^HzXi qJt9p&~orm>98K&(S|y61)J-үX7+ϊMF\:, EK]MI 7$ATS9Ej 1'a:&JI`8Oo\N2݈9y躬%,%UM=268s>#qk9x4& H^GlUx?il1 |x]+>o (X_IfڈQ8,P\MĘ UdJH~<9dO[ -1nr3 z> ,bH$;S\'LJQ;ke*yE(,< i+K.S Ïv<[xg&Ű/s{GZ&{gh/L'[ZIV򾄆g>rU8 s &z< xW!z5C&WZVCVs;Ob %TXK@.Ĺ )[gqBqKfLQѥE_i 5&wY:RP[\Tr@r$/H& ǛZlŸ X>qSNt<<ܾНRJV9*0g0h8%Y8M`i/S#XBPN-טû?j_rc*A@"7j /6'Yw%Ҡ&9wf~zt=2#r'M>DZUCY?LG6XcTpw>*:KMX!v+])-W=EX1v2nL׸Qj`bɆ‡ ruZT$_B}h_ =nmnzNo+.lʫ| nCl ~?fˏ:ڬᆎzuCe.w<,ߖݻ4ҭ!ž0tNU`lୗ_ 5dM558J~& /h@zŒU0Hm(-]1R! =zZm*1p`t-ߗ5?ry?—\\eʙ \69VrP6*[lr`hZ@ط>kBՈ)y>xyOKtIkҲ$%zm]Na}v 9՗⏨aͻDG)[Dp˻uż$F}K=eaj,>tcVrsX <=ݮ ac A;Um:_IyJ56D 2Ǚ',IOIRLI]ީ  IS?fohYhpToM"nP|mH8Dxi ^GTM\ ̯-OB?8% apGL!UCȡv$EM)K3*=|S~k7uAs桭RqTsgπ_o_jhJ978vR8UQf/`i0T9oյ$*O1Qmnjեzқ WJ/Iַd ,aZ#`xݴ@E#jrW@Fy ܫ@I10V${8?6% 5K✺P OwRқ7kH`֢ j3"a+=zOHXgV. '!- s4EOhoF" *{]X"UҬQ[`jX>̥QhJg=`,)9}4CtujMe7Xh缛ZB5`x䵶"[DׇNP3t,#>\)&%l2=̈PF639~*#ܼfnzwm?i~^CO~`nb4t1mӍk7=͘n6-MMƅОKϖ 2/&SL Ҧ˨Y yA(s45-5,`.q'nSjljV훴F"kuCB[CS?u^^gX$>3DГX*9R  5z]&RQ]Se(<fgJ=CW͗ @C%LJV4p9Jф1BY4['52"'`0 "`pIrGH!?ν? ݌b KG{1f~9^Ļ ҉*y,‚$ZfNdVHqGL1*O4Ww[j}I}jx6 jL aGþ /Mݗ[W,)}aB1kKb0XRɅYnh&. $u̵M}֨a'Бrs1x-ìJ#B!揥6)3w545h7GGp*7l = e(B3M=_E]e׍PWs=,S˪>a uP+v %K<{BXBT4+g۽%7hִOB+=#?q;#j?:/*WM_9]Lj`C'+.~ ,&5"Xg'<6쳷wR Pm}@#D "*}@4zםb]*|Z$Vl83#NEIwnk0Lx+H4,GY02 lÿ08-iRP#\YZ*j$J׬48~RM16s#j;ņžLnPg?cia+ s%3tN`_ܐWT>i*Da`.k1O$x S!f,8!oj*۴;|j@l1wqx 1T;fʒ|M1?@+p;t X01ġ7kL2vwa 2v-xִ1LC\Ɠ٩wUp옕Nw!AZ_n4Ug¼U?wK0/P!UAf1YQ}^KK(Ity1bvAMWv,9pfֻ *4OQBǨT.Sr68lLf!XgbLf^W93cZX][> #P;zB(`ya3l/LA me}o3cN<ܖ7V%53}ҽ=Ɉ䄘5/CGpxYeƇD԰dl`ʍ`7c=@ v$uyؓɇx@l#ˋ2fZ?=ocfw\UO 4UZĢuP?>F$}DmM2d_;LGF3D"#Xlΐ&.K6C n$ڡ%l,"o)Jt%IEx t T4j6]F$Ic2gu/$T^ݧ"RY^'!v15q9d6Xx=9anR43&~E35W &sC !AU\z#h9WHqXlGJ|wU1w -0xaҭ[dDjIukk86Rp:;` nWddX"c~_W ;*Vа{$y5!Mm`CoHJ0\O"Ўw~潢-gdIJȮE6@Et 42йWyf3"B#f/#LLŅsRL4E h8 2$nEy,&aFJ4ߝ)G7C.wϼJ 1`$#aZ {295rq+mLf )d" M'PM7Q0pGfu kn 83lEn梙~:oZJ{aN>WvJx 6ɺ$(aAŘ8,!藔vdFdpfBh'(?i!Eς!"/ZZQM_6VrV:-}00庒DZdE3YJ&R\áyb >!f& M-"Uqm_4𘔰v:QnAiY",~ƣc]k9!.tu.ep4 DbJ[pYy{sśw̬~kط7aT8nNeZ)QK=ok A>cEڪ}8XtIE l[رph2< uȔn:% ]MJKm.K-0.G?Fq|"H.?ci|ݡVlp*zB-rnFWmsh y@?b }pd6hK`3 bG;k_];}ag%fZ1ӧtFpS$8/@< M-ԫ]Z0,LJBWP"%CmtE{ 7d=5RI>* Jᯥi&a?<1EG=73k>CS 72m SJ2:{#^-u׽VBEJ&tKd?tm=c>ǽAy 2f@/ k(/ǭv\nBd]!$D :&]a~5JYC:跶&@ ݖ1IgKL-MY[Uf2E`^R,`Db6(Pjpf({3:JC 8ƃcn*dg/g6.oF-CF- t (} If,ڈdMTFЊ4UP\v >qg.:ƘICGG`bؽ F̀򮨈˟9|vK9Y],Cxa>B-bRBX7Q SK/դA;LZ2ƯC/>۵Ƣ}@0"V-ӓSb9ap#g>IMk> (c% 0J wtN3 d/>c |[f,X9xqBNZi$vRiG x:-pYa̙rI4=#i$m\.arm;h?}qe>;kP~] w~ KO)MSFwDw4KLHEi[:/vG+yΊvfI8ppw*>msBΗDӒFsd=(I]|+|/ڬh)F/ykaN<5W?Ƞ6K9  -5Bl[QlN@j@Nc3qp/1+ʖ?0I1x`ge仍ɉ6;{p&57HD?0n)ݯ_s\?= )c }fKk$Sh?Ws+o$L'P@QBͷtU`N {i $n#+)99< ͢QPҠ9g:&G=zvs<ʢeNDp q^e^W4X>HD-F>|1^< [e%Z.5hZsIq=O̬m;в]oBAڠ`/AX.Ě TuAy߄G7SFF ~r\ R۔JR <^{;9sDܷîa+dR$jTMkTqۣu+iUa. Ngxfy4 ?d}9[wdH*nwVN&µ(b׭M"Yw8p$mr4\)XM qy{Jh:R:I<#h29XM87b^yM&AAe".ƕ={xFcR0Iṍn3U`vĂ[=KB%g0w/F'UlNQғ%`a3B7e;L4P C@^շq͞`%ψ8c-kc\d\YԡA~"T*e.J0WΥ7AfVK:!_C\/_1r{qk-1!YMg+a@l̈iؔ;‡%a X=K(͔\ 5Ŵ c}5$ɬWUEB91c֏"[{/U~οl.r-g{_" 3 ˀ@3Ջ>! 򛄼M{E4MQǝ/V+/@2 R^̙ʕL+amjR8R];c}vyxg8L뽒 >Mb&@Sv>iS&Ӣҿ\Tq/Qvgx/vAykJ &k{3l?$$JZFWHR0:ц#!/ C͏rQ%␸8ݘsrÌϦSm "J]vi/rR=Kfa1~~1}=fqpH23業aYGDb53GjbvD} h'+ۗN#|{iY+,jg]RyEB,|% |3*նų[L&䱠\Me8|'Cn|g>"/\t, (ƮaT& ެ EjSGVB{jUg+.Vv ?x&wB~d7ef3iW{E2! ̝ɩ])]Tb@:oU`%7 *1CCN g*T=<⧳1Xx-LD5l~*zPy'=i8z쬯fO>)u:<ѷpXi=G4{c>#\u`xRښ?]Eh+ y-;eYB_6-*8&џ2 s."! ؠ֒-Wa?\k8p\xrFTV!I!OB8lD(6-HSE1%+32C|j$Dfo'-%D"a\6xԿ @qTe3U7'Huy={R0eq G&UOߟ(mҵq+FcyFj y%Dݽܺ[~9X(AHؚ4Psb<%K1 m~Q!*Z`w 胇 tɒ~C{ht'Y sZJ~WP;-EA @4r!쥋!dWTjk~TZ_H 0Ua9뭂a"u ǒ@0h<,77_N Mz^ub' A8pQIjo8udl_xq*?O}vVmcV"r$W5WFzS}Ս`OY$90EĐCvU8#)X#UOKq\o@y`Q?9"ݼtp}؂%ЮUdWv@0UE>n=ak"emv^|})D 8}Y!DP@:m+_.:>@ a&b/@b%XĈkfJEJ7i=@tE@14cjW<:- wrh(k?bfQq)e8K"Y$'Nܣ D89d C #Et¶AEu%rQ.;]AGܕ#NԨ=#ܭL+wr%#Z`eǜZvɱo6\i JRlwq>a4jῇgԎu`QcnmGv*DFY1rpASl-s~E0i۠CD8n}@`c bUqyX|6Q<l!MwɆ6y\:/g к( D`gp9Go:Nf@pj"kc\W y-U7I}, P=&4EɮxdS2{ӫm&Za)e([W Syv!^j?O9Id[ D!f4\ߘ{j_Q^!Єc;rr& @5S,/Uq$NDg~hV9"Iq-Nbմ$gF7aL,%F4'ݓD=|c\5tݗz&Óx.L)9@JdA̿K$څ[GO#tkwW-+~[92 $R:\ivcPSKl鞒y EOۋ`Mdp ˃XZO_'3?Av,UV6axSJR unyJ4):ƫ?(ZPqNΎS5FfA_W7؎؎.`yA?M y?G6Ý׽xa>-Kng:`~1ןhBO7c㮰ZDp4+* iCZ1tQ5DnF/;YUR f SrIL< b9NjZ'P':AT+&NQN_ 2y-OQrdכw18Gn #0;6A54s*nftM0abՌV_0s;0|n8g=+@H*7fDv84" % df:}I[/O~Նi!eI uxlw={>\e4'C-<ځ\RZkg1;땭ݝU`5{ <?z[-wSI,'I|iXRT`tuF(I 6Q1"qG+.g:īPz$g]'s`rT;J6|OHZS*ma|FWvL6C>o?J>.Řa{WS`,>N5SI/gz_׿Y0 XG6AtНу\KU%Al?'&>:Y?, W:loZS_5>A7q˃?.`m646f级L:+9Yqf:TB6l`qnϐHcd)ǍsFE[Xi8v>U)TI)+˨7Pt`&H؊"t<вO1X kClB[6*1}ӶNHϯPv$i7+@iңy4t)l"lj{+Fn7I+2@r1g5|{gq2lƺ3$Qiȡ|U:V_T^0lV8mb{6 5a>ER0^,niyP4a@ lI-`!CS^%wbF} mnIլj5#ϝO8@xE.0 yx1љEs72ԧU;/*Y3dmAZ#3'}dAYѱ9T)_e|.O3nGxГd]jH>0QroS'AI 1+اjN!fKyFRʧgӡɳp9C φN53БW:f&L(ڮqcO2R1-  5O >x/l@*I)T0e 0] g P1zpjb-:t6ZE Pf8-3A ^j(kY`,_ QeKdhueHʬeN\;옷'(מ u)·{ " tzf0d&d>.2C߿ rמO!NW@`b 鹑ULo]E 6^~RF9)l *2(, u[{{@n#; r$tYޙc Ȱ͛w]\ؙF>Fo8 r\c koZk*gYMEwHrA0U%dC`pJ^9:Z Ԯa ӝ h6nQ pd H&, ntvS&/>, Z&3JFAe۵)#l$`j4@Ϡ%e2jHPfxuͼY'>y=MI<^+:^镬C4AnnEJG?UuzHa:.Xrb|/}[1Be'I/Rq $(̿siw^HL}O[7ǖxIb_r\{ RQ \ZTrv^YJ@U4v OJGE p~`"rQe]6]%y ϭOI6=&፪:fGǧ! iЉZ[t& N}Z-(4Np@OpAD&3CHͺ0H^jp!n"ijd`9rbyW{vrҚ^ 8Ly i:Te-e `X uZN37O?u{`zl^#8'M )0=Nw͋mt)rmE}0^h51 ]s# - |´I¦Mb~0PL{5tђ4*SM_CebQ7 XІmT^Þ8vRL Ah#s7ߞ1ptFT>v<֫(ƤE@E֙<&DUofKT:̝$%81Ofn >Qa|MA =20FNF;^%vI j% #:ek!˨l}s:@ߓas8)81Y0>CƟo:$7K5rUB] &'jfɍȻ]~." 6{D]KaA .F:P:_x?H&}]kn|Ku6Sc1R&p@śIclO2'rHDd)W|Bjp|P>9ZWa7aE)JڸU =3L#\DȞgܰ OMh_gBk;:T+ԁ)G#8s 3Wt"T~$!8t/GOr=5#>~Ke9̈́)C旬vWIm؆O: W@ *喆Ⱥ-fslꋳ1=kbvfDv uzsm}y]+U}7-$ fD2/٘Hf6`2Xpb៘7'[|g ̕ ;خ6d醳:&bm X{3A3,=W^aD lpE(5}Uxh_ 6֮6o뜷(b\\_I.Cqs3Rlb W2]^wf2~7EC^ %N,zMgCbz)BZ5y2;*}&h|a+ sD"Z; +H)wq7YB+RigP @&Yh PH[ݵ!&S lOx,Rsj8Q@Xrhc&ɱݯdQT ޒ;,yerB UKѭkq //'ow&Yס/{"=טiAx uV+U[pnve1E96AA*6zl-l[ٯD8!-" 6䃖B!@3i&ū{rj@=o.APZnPb@&cbhNX=yY `b/)^24F׶Tjwif=H˻6+ߖWMH"i'4]xS՚ ]mŬ}q1w*#ZCr~\,$Ffm2Uapyd/ZHA曱~BcSni?R#[.0"JeTotPUp$ NUCl= ]S RxC:")l:d,]ܞjx_/60J3cZl6\\Vj DJ$Z/K?8h@ׁ{רGh>ccIr;+9b0ɉ4;+ )ƭ@%9'כF[WJHS]xa_?@`DAM:tP/Y1(qp)qE'.2_ UD0M{y\\_hbs I E+w 8.vj:NWON5f>t-s]W6P/\98b|oUKᬖk`B݆Z=V}q@ wȏqTy&o5ȟH77 j;:PH%9{9#G7$\Yֵ#+;g s)g7Onw̯ T ת׹s*vQ-?cЛb殲\%3KD "bPigbQkD^k&/ye[/$;\r3(%k|:@"-HlNڰBY}k~p'{E(Πl쵇 @ծ欭!2,t|) Vk?ͅ].p ЅVz<[J$avͨ=]4i9M*dTBD BAtSeɌkqZ:vi>nC:y`L_|q#@,O4LɷV+n9-3fLڈY;8)HF<^؝Q! 't:ɯa.B3Ưx'8i{d`0UXC1Tb)'= ΊVX|Yƃ臓}Ӿ6TlN}htEW y\FA1_MAr\<(Fb[JʯHF8 K$;P[>h)D돠 [Ċe7ѾNvq_DycOBWe$i;̎HqDBItt:42̙ȣAn! .ޕֿ'|ӆ5 A6u^LnL`)+zy8 +θ̮[b_^h@q"(+؝ͦ`M#:S Rwa-pYzp4WT~CU~=i^K`cY" L$=N4zxU3z6;ګM`Z} l?u \q0*orlD n}Q¡ s?2ӛC(`)gH?l>,~.0rSu|Zw~\i=F Ǿe_\GזӹwUzUWJa ,L0ܲ6~n%ũƄfY`fu‘OW$heH}ZfY㡷yOlg zNUCDԅ-)oWꓦGYXQ9.Mt䝸cejHNz%ftb8ZUP\Ț"Xh>ֵ-YY,ҟlR[̤^YlP@"Ngmre.ZV *D-_-+\O Ǜq3mymόI.(_91YWF1Yw:-FAr1Obd$=T>]dً}7D܍f q39/eH;[6#zvqSbhUk6A/;%>f3~~<,5[  ^ byvO#+}(zO#))RpL+;NWtaNǾ|Nk0Mh5l+sR Rސ3=3:;]/U.~r_! 7A"'TE9bwq1`[L!(dq?zrEh&PӲcƎ W` 6906șL5iΈ콩Μ"Yxŷ }zvtrYǶFBDWәmF^L{Rz˧ [6(ϲ,kcgGj G1F?o:g v?c"ryr /ݤʐH=qH[~]u,Qx1l3D*͓.9cXKʘ1*WkǛ`tqRi+ReȨrQ]q :쑯{9?iR@#jFݚ'W[_Cs?u>40w4awBӏY{h[MŠ7ghGlT6ŷt<> LzU ~G.q-`Rw6TbQ{Gs&LpoHSӽX F˝1 ǰ!ȠUՓ\ F6N嵦X5B , S0m{eEbC[ h4Fh'LT (OKS.z8p8O|7yqi:Zͥɵi`-/E-}`%ŷ?rA>v& }d-FTFxVfsI\ `BJ\3%WkHpԡ*@ Wǵ=ɮEl TBa7-.T,`2 `;HY_I6?nf.ypGV쇱ϣT"k;ຄZT1o?vF'%a/x4^H|I]PÇ\Q39|>:QaX :PQkIɊ <;H^0CZUqs'aXg4*L%8n ugU*1'ך>7Oe&beNL s`?2 !15(񴡅bcg&H,U.'Y(nX,c&g:1J5у#:k:ss D)} .hBO",X: +P|bYgitAh;?r/Qص*YaR]c(W~I|bn6kC_P*AlsaIBz-l0bOlmP8fa>Lit87ab*#dnsO;FmIY\rHٽu.vv<Rs{91fAjn䘻 {`G9(h ]INs1jNe#W̾zXy̢ߧ~oF+◛&M(U8Jz#O;Y#Jweێ:)Z?JĽO5nK iL7\W4_^ 5 vCJ%>#3(K_ m;C_v<^E|s)x|Uy1.Pr!a_|ar.$v?4e=Р^2\Pj{}?4LCMNN޺-؛٦+ LiEd|\0q|d$quC W=QšN6 z8|L7/oG灭}^@Y>KBz(e# NZ/ŎgiςTpFYBT v%_rB1}ߵށBb?hAyFK`!2\Bf A[Ţ>̔Ls ''r x)d\ˊLZ6ǃY<7("Z@)ir,yɇb4 mI^UnuO3<[;ğ=IM+l;kLr]L9 r'ׇ0:<. me(^wÐ+I*F" vZ/yL뱺̍BUkx>MSjYJ1ٴHU`<Brp=Ŷ}y{!PC 8ʶC'w7a^͗Z}݁!+=>8uD0%M^萗1H'rr}4hA9V zǵ=ʯZF: 3GWmnۓ|c#F>/suszl$d-s!F=2O}8״S(y@.ѱU̝!ādJݬͫ*pDJ<ǚ q}"Od ;նFX#oޔm`Uh]z ''8mA/1Z=0<>s׵8R }gҜ\Lb$,>>@7byHÚdf / bh`w=#Ϋݠ`9tbb\Pqmm `/b?/ y~*FI-ϵޭo M8C#5ۡ-PԒ 1,)hga&*[h$$10*NhDbA\ouj U--Ygō}92zK0.Kkpe*rZh*8Ϧ2EP(ύTPfPIMZt7ާIhk Ĥ bJ މ9I(lVHP*c! '0cnGX j4V;h~s]霳 HuhWE#'3*@L#7AD? i{Upì(.iq$PAVu0-8 seg^{EEPvErɀ RtstSku7aHaɲ # ˭5}T1.ju" B̃]=:t}D.}3s2"RfSMI===a# -t4ohрұc+$5L+R2OчioSTH{%>dYR/'|6J s M0Ԗ$o}S;7{F'9L19|T,{Ȧvhc92݀S̵xRZݶ7 |"g$> l%.mHz9JDg$`Mi(ЂIm#/㔤rb)RQYl"!)1z{/8,\1 ^`Y#x$=7@\),H4|":Dz"ۊ\CU.6tATWhv?d<<.wEf,纾A5םO_R}#x 6\[x&ΣLD\)6Ah\~>y1GhTЈw{ftokϯMXt~榔$(T# 9L!R/535bdn^hnZ^l ;GK[{EgWLUft7]V[~cxJ ~6Z9=OJ+4cd9h2{큸C&"4oi9Z,Voe3cT;H#/N6<^D;nvzMrFЗ Ip]Pr 8NgӯiH5RZ #˵6tvGߖs:fC&nJj,s)Ɯk5!uXh)7ۺJOYtʸ z<9c - $N=gbe$wuP!./vf7ٿEվ^uV#j%p&%[=VUiuzE6B}Og gI0zyb8XY90*hen0fg}A=^`ɹUd=0ig灮eۿecUųiTfh_>O6Lcwg'طFc#\`Q.M΍l5ZQ\P=ٟ9-Qn*,vES3 t$+!w.㈞7Z૳>b\&x MWV/QI8"/+l^p>req])Pq~W"#- ƄfʓW8|G^>MYy ݀F4_ IQ^() @Rz[mCsa'G.)u43F j:KP;bJ헌q䊢/ *ՎYhOƍH}(nd&s?Lv_E@e:}y-?jB=ЃLGx{=T,3x aJFF ܋Vhy$]O6FDuA<TD/wH$/~ݡr@a$ 73N "圪sѸ"z0L9Ijq(9do8~';MW!_tO،J1PǪlG \߁O޽EB©ۀ-,/2NW1g<Jh6!!d 44) 7oδ͠K /1Ӳ,JbRT}Eyi[Q]\b-[hSU#iأDqFG|+YS"Sj`њESC䩘ԀO//NR*{"Bu!nTy 7C*vt(-$\D#08vZL 7RLU>(pZ_C$7 F4a #N\AKP,֠j+t{wOƙD{gl%[](\JP<}U(Pel+ʍ膽Su%U﬩v稛I mw+#^1²vaX7Z7LNW @ē²13`Cћ;0g7%ZkB7kc^]PmSԽ.C-#~^ يQWLuyN x|`VNxϯ1nT7դJ vB x"dUQ6&HT?W7m qxjrJ8-}S<; \7iLa l VQPCb'AZ5a*mZDC'UVrj#ZV=V{7VhC C_%YGC PE,,HSp5֠==@c>-^[WGh|O5;#xgj]'|%|x˗c^E)fNGhB+fN~(C }$(q>jevRܟYz$& {rYs:aQ?&ܢ*\5Xo+H_nv "LeX|I4UD;+_~'=O=B_ҁfm<WutNY eo)p#^v1068HDƬq/;0 {_$. X@e]K7nRFtTC0n.'&VJRN4IlAs=el:G/,)fxGؔ>BO|ޗ;qtP3M 3Q+@E7i fh՗HzZ{NT58w&EQozd"tv9R-k4vCbmZ_g)hX":5O1ǿ7Z&o*ÕulmE!5,\!zJX1$IelFF% *Wx\9ߢ.@%vHZ>]R{_5!*VTQZ63c("i=Tr:A+l+9 d?kƔaaBMX_eϦapc5E-.R(SQJ;m)BzZZҟ?'ԶA;Im3rbaVV<(ƮsjY@BR'EYH h>[.K34 ]ЃMDGdCZ <p9{-Z"GE8i&[nLoK8$$JL/' }AffE(%2>?c1NvYYwD4WqSl(1 Sy[=E:9^>eWgyBb't~[q#aLqRr;$̙Yޔڗ񐃬/j LS*SJՁ?!gnQ3=!O6Z'b dA6x $܌CSFMtW&ϛtaAGQLd葴G8W ڋM@Zq'BXwlC$w[&^"]R[7 u@u|H/\2hXlm!u`E8ۏ*W[sa.ї5X6>#}2&GuчB]48 \Tj߈w8AnE-LZe\c~`VFbHk'ν'0֏2"|uqf89kySNg@/ժ8˦ xt3O*.8R`AJ}Z,­:Ezc"d+cڈ 1|:O̭30 6I # H@ߓ Aa£c cl ծ10U/a;^2sB9&5#Y'DW̑<12PHp?Ek}VYA3-Kn_鑷." (LZd":U\H+g POPm2,њ1*IKrǖ1!ܞ Syh5H枌静,ӡQT}^=G><˲K,cv+2 UYO@2:0 d- ܳ ׬6ߺEIx!+3R-|JmkqC[r0WLKYh͍ۭ܉?{|zj8J*Ķ @o4$% !}77;Z6~D'(14Ļph-{Sdgb:I1Dr[{ Nyǜz Gle;/$nIRY qjj7yHO7ց*J$]u.\*R k%ly'%Ǝϸ"L53gkSAL4e:fpßѲQZj7$ÃZ[>հYo#V45?aH $|C:,ް]7ϮN {a>cr\w%R] Mrf:!F~N,AZVBd͞?/J'd+1ʼWE9D,8zvl}aȣdQNpP*ǁz^[-%W0!lĎ">7 \jƞB8ߺk^@䤝gTQKlI?kfm@E1; ?n(msfyP}vUډoA:˥( wvXdjR'<[Klfk(^&+®U HM1Fznm<Bgx;ZUMr;A_gi8펀 {nGrlBQIrC>:;K#.QƖmjW&^[uql`їr_D]JƸR\Ik/դ"'̒@5vxz/@6=*MvHI2Z'բg/tK2hwK=30[Gob`3P2n0Ѐ~ȩ2֍=ovЋ1ʴD J-XE+&%hrɒNvw  $b`~-ݚ;<q:XE!⦆TXBq p0BZW?e M̘q(ض_~0/X@r"ʼny$B+}?/8aJG9wT]E r5 {Pm hI+y,b엑{SZ_ !SMVr 72A'6\m"f}D0vz6S#eEm/z0G}ҖjHgl%>cs a GCިhpg=ݐ7S?aֿ^uf')HI`u Zy k}f(3ħl4Sd(r'c^W@μf|E}R-Zd ͼ$q@y&XX]'cvĨž)3 tbĮEIm7~.]7>i|  U+FnmNkEn{]cmk)bLPUmЦx q0`ݩf70(+ A䔇$i I@{ =9HըJ.@p{(gZSe6BխV=A5airv9_ySyi&paA=qeCybojek \D`^65Z7159Neu,ԑN 5e5ufا庛Sջig<uN+qf4;OAMK?쑟^g؅@DS[qyCο+7_\ V+?3u)BCTN9*#|\G*"VmU;]C03)Q C{ț6゚. C"s7BQlp0MYZX|隫 2yUyrLs2r/B ;F-Y9 Tcj $Gh,I]K^ m^X?!!4wKuFq@ 2nC&_tG% 1na$rrlA &tA*7Bx`SYrT cI>~6VGѐ7VYub:óӴ Jfl0w7ާ}RA*K*@sԬ8{go%#kBTfq4Zdk.FA[pn080eRy ϴܱ\w7|PpswbwKUe?L. Au#H *aѢC}JEExo6JGמb1lCA ='`*na$ODZ_[HV D\Ejj~%TѸs$J`Hvuw0cWG#J%BN '_ΩV zuˊh0#5=o1`XǬ`Qajc*f7љEZGIMGT??CKu~w[Ջ$qOd+7 _os ò#<EDFGk|x)kdI'Shy'IqREsu 0gW8j$*ca .U=|l8fe `?Sūx C<ĂOEoXK %vץam.^'Jr-\/lŀm u 2:X,+f\k5Y'\"8G")ש\ '8ssZ铐nfD5Cͱ_,gj%H?- A-}lMJ% 0҅bR&( FEgHzx<t]@kv΋'Mu{"R 8kGޛÁ@-~Z=Oz ၝ#oZLCJk]\Ar^oډ2']h8.-$?XQ8f@]z.z3|U8SY.' >]*qnc{LmvNIaߖxE^+L\[:Z[]"7Ɠas(27~V{'4oÂ[%Y 'jZQV!]yT |[+-tY\"(sEo])}w?>1Tcl{rob5(t/Ⱦͳ3oJ߫bH&aga*TX̳64FQ!b}|Kwصw)WhRXnOֽsJ4ca3s @m&jwy-NLF z .ӔHp|WvarçlƀFm5q=)E}j/JLH*̡h TeŲ$k@?fx`lNjzHGGCW4?#Qg_!; Ӿ^-.}NWd*>wO g]͌Sރ?5!N*WBbpo)ow/(pIf3•P Ųͩ1E Y:y'Po4o ECJG. 7c!/K 9_N%~< aN82e)lz'1uxҨ9q}bEN 68wFJa0%[_?qII&5pWN0 -CLB|u8X~cjWwS)Xqu+ ޼gfLF 0֣X6#zr0OOSא!p1rg?S 8}j]=hm@y6GпtH"̢8CVfUxo/T5-c/3r+??zFVwh;d]_唤IB=O$]nK7.RޟA@y~FSCȢvd~'btKVKAsBtKDkSȎw5J/bmJGbg ;OOfm l{kiuU~\ ?hexQ=-NPbX ,"[e2YWiipm;C i;õf)($KwҰ6}-߾9: G bydcT8uڷd10866ᏰJICю[$HdudNIT-O"j/;GCw89Q$Yš`I} 艿ع7gm>RH8=~q@xmnnľ'bЃ5W`JFC1ffD¿47T *ؕivL7=SbS:;kDu:Wn=UTn   g-o>/Oh &w*c">`]i(8;> J\V &WlLlrX-P-Ǻ|~a~h*p>( i)f$SbX꼀hY00M6#"Ch'X ;^|=NH7 ~@P81icSXan@PC]&]5Α@)mF( \Sk^8wh| n?+HwЂp6 fVdPa\19FgGFƋ+6Yd!m™s^wI氕ʔSD$ZJ&7ȣI֧Tڜ| Ώd}D7]FY;"6nYzy:r̿ܗ5(*}t5:%s1@–*Ʌ^D-Á Ub+Z m\"}n*[ې*MWzwƟ&SШ_c n̊#GtF4n=!|*8Yc2ҁb+kkzU-)]U;lFī?{*\<\Pk!!2 k?e<^\ BڧgoC&ǥ[rf*DMRW*LKJBR\p xi gq̓j u6 Muq10nWcЙʶOWAZowRoB6ed7:(!ogj}dl S5}E "O} X5j,n# V>d:v\N(̆ŇGkgEy\9~QuR%8=g6ȥ0-ID`$ Lo u1_>$A=̀,|lׇ45 4qS{$\8d "q Ȗ`mh⒭~B (i >~*K4^jJ}cgJOG8\ئ sQpz-OSϊ750l) گtZxYӺDDs2<ңGG>V[?gBK` 2znWy5h9/Ze\Ҩˈr|_­xV,k< Q FAmUxTc&Lūf8%C\~s29;a{q x[.8TՉGJ2IC /Y]T7:+Oό4 wK(viBXg]Q͓mvϲ'(Jpe83˕kѱox!A{-?;p_TNC肌EU2~Qj?6dʁz٬dDd`#ߛme@_DN?xZT5ӄ_B))8жb<78 ה41c+^Wٍ ޢ>]uɑNX|f=NBwkJJ/0ӵYJPyɻ:>]8KH#S6'LSҞnd&DjQ )6,ͨ4"3[4s5;`:˶{Ea/ />Az9z,[ B!y_?k[H=G'1]3.@c) h~<_ƾ9rΣYXEa@\O@3O5˯$"dZrJϻ=1uAA8\uゲ" 1 exsdI:'|%&}cRԧ<.6c6S*#l/ Wy+c[;sUzHO $e*sH6~GҞqcڊ'&މFG0Lz-O kɻYCء8Y`AA7*iO?o)ۿDV). hӞ7~tFSB+jHHӫYlY -oژF/Gy|TJ-eο …vRސ;nB^&MZ:hװxJMR]9p"uXrR. /z!tz!]Lք:ҪLeZu-OԷ@UV <$kvj:{wӎ_lR, G^yF`kxCjma`%P|ŧRndlVтT;l|8 Ov9ƈ#,8b'G j=ڣ 8JXh)Yܰw׃e+LC'8Kt%k(innQH#":y.dttkο|$ǐYgK?Nq _N2&'׼hɭ-CV8 (0שCxP'/r:kʢk:WͲ 4ׁhE4˚a 2}4>?<$~ wĖpӕD"`%g =ɶgHЙh>?D #!Vk"TVDHHX%JRFf">e q~-4uξg]%ln\ >v7d< ukI%)I,9LWm]@܁ Q`>O8y4M`vɾ4ֲRK:~WHX[㵾dg4r8 yk37k: n-h!luv mdįJyZYL=DQ{0#Z8kĻZ97(iN}ku F-&- *J|V<@|R7sZF{̫W sNǺ㟝a%[?H7y~ƺ4>GZxMgG{ ikU*,Հh0&S~#6>B"" S @6w)Un'#"~& >v}CdKJIyژwl\&S>!d œD#JF< 8Hdvn@.%ޕaUSN4>EĜB>t/=H Xø nުH ցz_?G<*gqVKw,|f LSβ͓cb~OOebNrjcSJaUq)6߄ A 3ØY_]Rt鏳giy6@V)pZQ5@l-Km,w n%PXg#f'^Ǵvr8 d:v344S T(gfpkUI~}Σr>buprzٙO-T#0Mp2a6q5&M5 $G&wČ1Nw144C;W%IaxO,i;K/nǫ9z;%.֙Ah>Z~Rڥ[QuKl3R `eh,[kjǫ>}GC#`+yI]sv(U\#d5Ƭʷ!T)`IKMU(.ы>y+npkHN>ŋ=7]cOOeiKU`ǝZ|$gAB<*a [MgC3Ak}`^r^cR(D(JXEzt} Bn!l[| 6T;4=E1KNVP[04\gfO z޽: @ d 3`C#ť #6ҔXAYaꤷ&G7\ uN-vEH:a!e)ԫ-A$A+w1!J =-^48J]Qےr?ކIa!OpV02}*[/rjpJKːD`M7tKT<mFZ5C(TE α-2c]nz1T٩Dqü?jg̚1Il)V!W'%oHz:™ҍ!H :8fm-55fKHQ>)D`,MGX.x٢b \ӏ |57;ELĝG3jJmҒl\,/iCq"{~\с/*6=q]!Ev[ލ>]WeNp._s`@@Q&prPoOET2ڙ,*-BG%E}j@T}xPv·9V_ԚFĝ|\mw9ggߔg, . ){Wq3G|OmEHkNzT֒8sΌUVnVqGV(_$Pdu(atj1m\?T(x2 ?EvYō!E9VpӝցǝigI0D( BQY=Kx}u'ayMcqST7؄n%y L:F9Oꐄp[1kg<'N+2D.;hM8{ tGr](1SosP |amQζ"SLõ5E urLbDMmY%\ˇd³I3NE0XLɓ5 h jዂtY"]ItD+mlT-0*E7 JFfd#֌\I E-@frWBό>\)wOP =X)\ O=g݊jf1Tz?˩#}viy'Q^}[զ!Z`Yp_CCd{}[oe-*0z똮ӭym0qR4_%%Tn ҥϸNx3Mc z!e8@I(a^)߾6ctasL^cP#V֯X! (WAk wM-<x;y؜+hW HFMB66 uF˒&|xQ81/h `_AVa$b 0ɟQY(m_п[CI*OP(XGMAJSA{S t,t!Eapj`;aڸ=.JBdY bToVDB5/tjp aTRSu8H#3tk^ƇVA+g!`~Jե*$yFL`Cx⛇4juKzi +)gT1}.0ng|6`973Uh+]iT>хH|GM j}]Z0ʠ^|1#YO :t9|"=IZ-z;.O`{8s[&h&_:$'SFF<xj@9˗}._u*@PSF4+S\ΪtMHozs叩9!Y𔙑o<8&٪_ڛY"ffj;飰j pF#ɯZ7Nrf#Pݡ}UȍdQ gMJ+SU(KZi5;>a4HBݶ+Y<g;yl9V=޽p\M}dc\[7KCcNX]2J@l޹]ɲT{sKWnQrsjrD.h8bGWXu-dD](wDh׎'AOAVzg#dexq[I3; a >/=s9 8Kӈyf`߰x(fQ+6}ZƨູZ< DǤ-$[-Y+\ yG XeAc)q*OLD'.pƁ!Ǒ)F[ET`鳡WOyLrW9pV\ƒΘ J:BL^a ,tfw-y*OB^{4P$pN?MBQܬ8PeZs|շY kT A׏agп(}+M9:m|l\N.΂BI%f;xkOږs/ -Й5tVT*S g@a]rTVw1*o'y ] p}%Ϡ-kC[/S&T_].<>4,`L-p0WUZP6A{+˚[' Ϭ [a Px"Y lBTpZ?2bvQ-AL(;|-O`ԉldi42脶O赻FydR0#L=\p$7FĝWJow "M33vkm)Ro0XnoN^Uz,tZ# (n:bn'uvgaOB]Q)zILZ0" 8HMw7$447##*lΩ>b70j,s9Di s`'oO~YOa#Eo>mcx)a~_B3,#<B$s!˙^%fbril;=ҴX̬ +3°?ŴlI+4nߐq0֘i $EuM=¤1=q8zC> Qwlv<=™Ѡeb`R":89,8F,e2#oSn"pwi c!bئ,"<}2D"S ,l: y0{2ca!-;;$6< q(spNk*D5W' 0|G>:ot 5.ҮjnTadz`15n0iVY~ 9jxnw,znI>{ x`_/hvu&y)RЮoV)I11ov7q _OYӲi<6ui(Bf \~A/ j[UBK!%4U.f=v,gcq6a|~ؚJaKbbi-sZX cI6v⧨ ; U,|lpF}>e #4$24mu'\W>4s=a'{g5*G59i}vF=~&A1"[slF8[@~R-ۮoet;JCR]D]mPF{n~f.e`ca-{{VE {_\H ?S\5+&AF͐K:y j4@kUwxZ ,(oK}&; Gtfb:ʓMy )cz$Zl$< RhFO&` e;1/M!2^@tBj e:0hsfX"y-Z  Us^i1Ԁ`5c9}yVEPZ"IĻi*$Dɑ%95(OC)%)v"bdWs_NGS B__R.7x7[6ڲ+xұoV =`Fs(B ,F: ގSU*_I0e-((rqϾh50ma91]x@oryLfw)rw\CpDUaeㄔn-45: KCTi`4 4wl<Rni 2R'ԶmnvM,ϖWAEaU# Ïojvw!#<wNSrz'J;6r0tJ 11Y^DBuE%QG?Y7F@g~,^I۴5]8LysAnӐ`4ώ\d&A]f}gv˃"*wmYhG©eMKpp)wXT.AQJ ٧(29S- 'MC2Lwܶ_N-ޱ(4 R,B[BsA(nނNi"dE;g4(m-McZDM2%2#ˌα2=BC*kx#94ǽFמj}\}/ _\*r_|;L/T+ :Ƶ9ܔENn ސ˒ہ&v(em]Àd 4|&o[X-ElWf2zeNL3:ȖŏY|Yh1:uBJ/6Cmx{<>vp|-4BiAwzs1~KO0$ q͛m2ZLJ(X.hLs.ev~[iJ9O7V)߁l]B^)DirNVnÄ\S W:9QwZ[7?-UPDo7&W\β4Ө֞c&Nm˻B8# Z^37 |Y;,S~+ǶErH_EU6IC"afFl%tmj#Q*͕@Ṝ'vY>Sd!%+ug_ZNqS5Q6jr ?g{ ᐭKL^;|O˕CFԦ@ )9طZ%ګ%Kx"l*{Je-^'kb I/Y5Nע'ï1,8on /Nm,Ky& *tΘTGIwmQHlʏF%>NͶ5U+>e[EDž؈T-BBb^?~Z0m}cވ#,Gzw !縀]xʖoRyǛ;8gl7.rs)5ڱzq qtR/4kC+'cQHeŢxҕ*z 6fҡzFoe6?!|Z {ōWԵ3nLjv߭BJ, ?dS@PVsƝ Dl~Q10͏3,5zq5UjS:wvQm'[v:6p[F>wNZPx/ #ֳj@( I,;؎Z ɭ?Hf~"QJG8?lr'.H\a7VW%3N*E? {xZ8 ּ܈|CE˰g7ܸ20o>3cu' c݆ž1m$thvG$mϿj#;mxYY +* Ҋm'R!RVXFӺaiy<^w A;䟪[4eKD#K~=L5d*?SD<66*@,<:A"Ucۯ٬,vDGDV"M"b QǁJ"jElX $w.-"NJOezxz;77.^3nI/^yU$0Gvg@ .Mқ.ěHe£^%% =@պPDFL4AwDUC6#QDh7+g?(Xz 2"s8&-N>Ny6 R}r8)3 Zy8Rah}iNÎ+\h累Gq:H -t9K`'(0|%$Lh6Y?oUגɯ==|ƙsi:}'E2. [3[J'E'cn}Whsfd&- @|l\A8R;R7Sl6|I |^l %4'ڝ~L!Jyߐ oo6(_sΑ,K'ź"cn^A)&K3g(رB/Z-!K,:۽!(fԄGr(+w>N롒48YZwoK##ϡSP:vwtS (")WѸEǭ4W[U,Ta4vmS=0bYKXWPtKie YE/6"R]ьDjхGU.2tΐV لpG}\vH[0q%^_eq6!jataIe)ހ[ÊQTv2lnSCn'@:8~w dY:~L%GVOSw;cDO,u){K&SDwSϛ:C*7jͯ醶ݏw4wj$6+Nl{a|Mupr:U=(҇o: 1]n{ԥY-g ҷ0&YߠPBMŰ1XO^):JjW3 Q< \%kQRHN6R~HHs)Qe2UsЛ_[ֶv8y^ek1gpz\"CU="'i@69zJ|(&IRe|Z^`FaUwQ-؝ܯy;d/",9 ͹K 4VoF`&qp3=6'/^ag7qF˾a)6駉,'a]Ab#NP% Z?>>>TGӅ$VK?1m]u *˿#3ÂL'TFrD+#A鍵;dx5s"/z@|Q<($3Yi _'<Ƈ/Ё_a| kǖ])Ua:%d 樸5#faz, 'D7mc5'~!h,+:*]e+4eMTI #T dvC0}nx푃sçs @Ǝ6X 6v + =Rj9m'. ܘiv̀ݽh,?W+E4ew󿁤dKc-XUA)f:qӁ"/=]p(bW-60E@P(׭^*cO4})l#CaAgL;Sjf\!|}n$,,3)깿S`1Q>D&[_OVAϾJUC_LH)Z0C=-(w$C4Sqo/EBI0-vO.?6[VYJds`^F3|It0vLg'Ex|S(tYX {jO%ljNo9۱ ՙ=q͕γsn.ԅA[ްYDn6,0.ۀP_FdGG7F4.K8wKH[-s4.pz|捙0kh_*(Gڄ_/kH;s+;[0l_U߻Ǖ/RŌvT;gnsJ3|A7ܱ;-8nV"+ '&Xw@D]"cV}Sy:QCM^U΋njvb#+Dk_HNYw)IG!_W=YL`'aulzqn%1nATe :v'|J)CWC8 ;iZUh>,X;|lӓ07[Tꐠ~8^ itG@4z5郠+Lz۩\@׼FBvҕbT l"A1+AcHS%C3]+ YZp(Oa,s*CNY8r6s8#CE4M"iiH?pz~·$֯{fֆץ2 N-;}0( t6IbgE8ٟA;Ђ%F YgqR26#oh-QB5$D] [)`q.[C't|F^O&N=j8eU.&0aneݭ%UJ6%Lq`](v (%}7ַA[ Q֒ DfF$-Yɔ-b$tՖ]@D@?LcmKM|jHFSj..5GKptev D8.NN2B9&]/u Ʀ`ִ_Qy?in 2Uȴ ~ddE9RbIGEYquwf2M~k#L俠W-ͿhR|bЯW11}h?"(LDAL#xXobRpɘ%Lͫpv0ނR4ɞeJg!w(,OV7Cѡ pNʩp4,5 ^'`- ߚ8+>oȐx Í wnMzwO.;Vn/ھDgۦGFdG^qJ)Vd(Um=a>Ɯ2|7O4IFѯ&x0H³a(n/#*&.Ƿ@<զ&ȶظFU5**W= FLl6plmv*Y5|+c&; ?l$y$M+DžV'X}T|du Ð:$FK6 lG۪Kߩ,8ZF-\.6EKd}@_M*7yAtk({ >)ycCKY`)GtǐTҨsR37a_uH=thE0"@%x@x] uu pfe$4\EXUViI({Ľxm 9 4< vSzysr.- ^ CA(y׶R `<;ePԳEugdFS*E9,XI}(ӪcPݯԩEv߇H)Jp7ZJ$lDL:u*$;Pjo4@y} `Ji d|;9 6Cn|awϽ/qE{p6u#~]牼AEj:[EZ))j"uwM93~ڑ]UI$ A Ѭ :K#MPl2vD[Y^ ?:k$ߊÆw9f͟^ּiCR`$1;}RS,\tQ4Ճc'@?~ VM@~B~>=*3Lj۴=S잼3+ d iL>%cu]DSH۹Zi$"N^(Iv.L1.N> +Q-M3HYL,N`ɐX{8Ubtz㝶x[1-1Pd79#TXE2EkrVx'S;C.v/9aԻ g |xQpA:}g FfI.T`;r`=%uܢUCSGumTMPȹA դS*5pEK9eM86G/+BD k=qEOV$3|wp}뮠': vAˬ㧘 ܩҏ[lu ]N!"ZN!R ;aWYAZ=|ͩܯTԬUnʢ47)S`p֙j75w0nsbN0YUP*¼ٺL2~mD  %I )I~^FT>H9*<^^)xِ 'iL]:h܋ Q޻!qsRr[c|>N¢46A.^cX֜n9md{L %XYkb _S(QȦbOZe'CyuC-<$.yubjΌ 蠯RJfT{Q bcUf; B;$)ǜ# N+;,!ٖLjiLf_0s1 V֮XtUqi2.U htWo&D:%treAUi&#FzE̼bվxA$1VUA5oI nA(mcZiˏ`Kحcbj 2Jćailqp@}UC: fLEue"\Id{%t^JÐhgZprT\žsU)db FrMyhEæ}>CE;>;R)qHg|;H߁jRmm\ܷ2rv٪vь_VX9\s.>l.7~.s)& 4x-ra6t[1X!rT Up@*+Ζo8+ز+:zGݞ4Z^kӑdUC=8F@u:p&^Hڌ ֵ\y"CТCty`݋콺8p+y,7׊ŇJ:\y 咑Mh: V9 Pk>%֜VG f gUc,McZ ֤vhyZ?UƉ <2oҙCR;SǪZ?o lB UnWoQUc σʔ4Ӧ.Zt8!DR2䦅0:jr̙I5V_Acl{UL?kw҄g}0&^K-9wIp!D@`%V>!/6!) !(7V_?W;KŤ=3~c<;N$Bܑ OMXTs>gD0RҜZf[8xx <"ESHp$" VX=N^Co`cC .ڦXj<YF?$#;o˩e~l2hwM/n}4unL5=YL@ωaMfwnđZak-ABDj{>c^ \P<6~)9UO }D6K!fD01)RI?0"H-"JQLm}NQga+Z2"+'vÄ>h(3IZ{qa ihsb],BVuw- `i|i [y(W ]س,Ђo$#pۯ No H (T?):<]zjPH`w,Jt[ӌ WYM Mޮ'ʸ]-\[v 3I6=Dw۾B{Տ3צb#]:(g涋-%G\[yX;edAɰUlzn38S ;-?hw* f64v_t.-rƞo#vQhYw6YaQ'8uv{DکN{l̇ES>Ao,[Rl Q##zQS x7,0J5."99:JV*g`Tx@L5hL~248kߎ S߬ #"=қYl1hz7'1:}m;|N l_s6c4VwQF /6{8XP04Sِ.gm3=1*.Z)tf~`(NV{R3,(5HPN{km%me8v i*$_*&Cw^@sƹ96Ij%,qٮ`BżrX? eG{)Ƣq7*n#pIЁ؂^B'†F5(3h-fGFpޟ*Ω:,hK/43ZԢ4-|=gcD1.v ޘF<*f kB<_B5-%%L[P`/ȝNk8E=Myg)/kNkx8@zA _;!5N9feu*^!%d k|рuK`r2_} 9DJ Viܧ(w@/1!L Ra{7=cK1z}LbRk3"|Kd]J%&?n#Nv*d}3(hMLc`| DX/Ya5vz1K`sn,͔k2r*8_ Ol`t"w.RoJ'/j#iPqqs(¹h=lۃca)XnS%HHfJ_b$i("&I_7)LYzXHK|9+TÕ_==bE^g}}µoez|".? xIHn& m E:.@NHZXKd?(e)MkUS65/ʵbjܻou{<H>JvG4#(P;JЭ PDTH\L)G-NYȈ ~LBpX\bJQ:}΍:M?>-QE;7BӆF e/ʊ CGN aj| Pk!c`y6aZgv ,GMB=L)/4?69bkw83_^?|fм>IL&뤽0\sb"43B)F vt:uW|^lMЍ!\H=7}nߜѐP{yD7N{yc2@l. {NA%coI^ Ph44NSyxTptsk{ֻ X.$AUJkm?ZjIL4E$9N;>vs%(ұaDYtܔF3(ek*J-mz|ݫu("ת[ьM6u +nI͕~M?B&pӮm^OcPY}jB\5u 9 nc VʱM&L mʨ#b%Q;{w;8o]PMQz58kti9 E{'T,8IęAb=o皂;e r~MS,b)Nc]nJby}fe☩֖L&ȅMq띑qKnBaK1W+z#^sd%]ٴ(FĖ#3O+pщob؞Eb͊ʠā@EEfF*\u*?Ti0̆H~z|?Raym[ǖ-ɔ7`--" {k?4ðed|CIDUe{1ft3 x7rCx.!H7oty^BFeI`W_aN`tАK5Я KdrΑGUR&L\:|ZD]z?c {4F15͎Bz 1nXpezwAU2mȇL4a/dw.'K~Co-P&Y:\1Rw5I7^щ/S0&ROka25}etņCZMsRhOqy'F|c4o'"ń-n>U516>{Md_ܐ~| !Z@w9+4&лvanjz̸n]#혜l頬 d pޯ7D֍L3fr2Ae eJP7 ڬ@OnUV 6,oʐ+ Gݨz m Foo!uWxPݯz+B0_={ *h͑ Ɉ`vO&ݎa2 vIrdx{rHDj1k,mUԊ7 NhZyNw6e?;W`cGQizWԷ%=I,#$;8x)AS p4TRbF9fKGĠ6"F|P󆒖8) ojc}?fS\j&@z=2$nQ$yt؄UˊV`.2׹ۆ?*ȕV˽X 1,"C,k>nY g{VH gWt߃ :e=U"w ɂ]$pt’G_cwVs]$FL ] \T: a$g{o4~OotOfŨUvLA bj2#X{pP}T3VU&ܕRc^A76v `6eKZ`wLaej+}Żi%f^FwaXbɻlxS:4w6wnda=& :cn S'ϐ_KT+rʑ jP (AV/n~cVW'eQ2 47x2T/DԢTSZ8(9hڀ w{b& J_rpw\<S\Buِ*)ct9[N,*\|J.(F| /kDd^qs!- IkRkڋ4_ yIs )O1WBa֔˙hQ+}zqV~6vh(׉ؠFN-@ ֲH1vȜV~UcWxgmޠ˅l͸Apc(,`{qa4WqshrSܘAk2ߚĮիdPTAdA͙js)y)|(mޑ|D$:=J5~웆1+V"bIE7s"]m] pC,yP5h~*k$qJ+{{l{AXiY€.~\<@NM+qOcC&iC@/L2,طՊ2Za{aY-Z'?hQu-"W yLq&Ro;Q/v7?3j"nHT"fx|΄::u@mՑ!d(nKJ,toaam÷oNayy!@~cl;9OJWlZNgi!rRY( gnw}c-0O( G#qˡ)0ܥߩxtE*0ƵKɁͭ([Z4=, <#BM+lØTEniadM58"C3bGV ɦ+LwA(K^(*Ops™Q;A}WL1>w.o,5!Q nt]i~;i9a$>`UoN?1V˒c#%9?n4*|˨M$^x0ۋn \7P wOYYdX5dm7-Zpk,_&ٳFnjn!^s2-[8Y <>1w>UȮ(Y^H-ؖlnWi%_?Z4X%|'R뚨7'-Z0WB}MEgėZ$ _A8|ćOt= AtXzLwJH)ȽS{-TW "yy-yr&t bȕv#3]m-~?@`qDxJ&gZ^;F ;h1JA~;wsMc?Oazua,QR̟{ K|*[kZ-n$O!J|@ZR|1I rڹ*+VAGN%?VY_ǬQo Lf'sp#)d&5<0Ƀ++\g*+ϰ5 ë! qv:9RqviEH˥:4Oà&4!cSتjavߤ)oV{ؼ2Bf}*  $+Q@DHЊ2 mӔ-8"eP.JV5sX3FͪI݌oݰ-"TqHK'd^!U|];XϫK=M kF@1gX,2o9 !{ vaX5mFId1zn&F9ř*96g74h*DtC4!0aF9)RmvPsC>1ؘYdKPof{E}zƟnߵ*|8R&ɟsݔxw4: >"*} +Gr+g/;` >3uL&ǃ8K#x 1#8/Q1nW)X Ð/-`Q!Y ˙qzBыfEhq|+(Ly†i -& 䁝 _\3pF_FTe -rc89fY6J.v]B2•юabjrZ:V%x|X]Ԕr[ N_I9? Twx-wFГ  @t7rdFRJt hasH96 VӆCLX>. l2 BLW%sf4?bκks913P;Wg |;X۪N(Rc O7 8-,- lGJ\OmU)QޭNx y@UZ0b.'#nVY(uwy"??U^t7Q1|R/ {ޗ]AswW.أ]xuxYYq@ +ߗߧ G_kR#`k1׬jGgzs$Rt;s ,DƩ?l;p6ʯሪV"!h4I|xL2n&*1ncU\uÕ;5gƟ^7gOr U\2jEFv+~ńlqHE|ݩP=F2R JL$]`. 1 ;66shB BcG7S$E}D;ޓ_<D>mM--Ju1HtW_m!I5Yvp蘿L=}vۆ5#*{\/tgl'$qZ2?+f/!*E.W=9I|,$,zlZF Dޖ!pZ6?t.E|aX\c`*,rsץT jM[?оp(Yl.TcpV-qpN` T|CK:MsF\/XiT8|`-h1RXH!\S>7?x/boUHՀzdZ#|܀xde;vRFϊwf^dC"ڱ8ŎsK[kҚ LrGcnOQO)A {M3b'\\RǺ$ 6uyg G W"QO9TVU,e< Ihl@,W'٬W.EX~;"w쯽~W%4=qYw"c!0whYEAʥD{9{ JbqC7W,/Sۦ[zbd}%5D}ֳrSְ4v:Eeվ2jdϊMX՟GMym"jN;?F*0Tdg뽡^٪+x[WC Bgv0W$ 5a T&:< tVmN uXg pdu#/bLFSk#-77!/\ZVJ>> 8-2SO9ꊎ %]?pRAl9QOCٞUs]v{N~ s3c cA+UTDH*:MAqʱT)ל,%IM!ck:5hJ:vFjg+o#AY;RVGtf܈KQ~!Գ0IuX|%atM/6;<- zBzc; ^bw&!LS)QY g$pl`[*$`K1Enf2O]Vf^'&.zOE-@w }.MT 躀P 8L W[ň߯#H3MO2wlb:{Ƃ_мE319eHq HnlULm#+Lj U߭c;`% |ҚIj =j(@2>mLmVnJ q/T^I2`^ԿKkH<hi1Ԝ|FցAUv3s%]R vM<,BFHl;5ŏj[ +5wYdn,Gd)][݋зp5(R 3&lEBOaZQ& HDp8X bDAϬ[0vsZXs}u٤?w{W beXpyrd^Z>0'Kլ^ԙՕ4;~ ^r[;k6hdɱ= Ǎ-!]:: kHAn=\­v2˱:`8LKv͠X dܙEq$*fSAgjNO]}pIX}ZZ^-| "oCU6MQǒxf;.. 8Ȏ"ܜl>p,GXk:V(jB7=p;b uv=_5N-jIA$.p.í9Q LF<> sl9;0U0Tn=Qv:A8P v\VWߟZ!v,uobstN:8f`*巵 #_X 1A=69`TR`ǃo.DijW4Lv/HNi^ jX@>?Ă1:$fT}G7ŬـqW |6ʨox[ѡ|zI՝W7j\Kq :2:z/Ii71 wN?Qۈ8{Yp@^~:^i/a0 n $Zm\' %x1G Sc^I^0=0 opՊiuHΔ bǢVTt+kurf^F=kqU)q=Aģdx>{eɟ$S͓Z4iŭg|ѧ> 4',oˋ 쟂.ZI͉ٶ (eDCG ~fx*WpqNxuwy?"P|e@S$'e^d1!ANs,d1SXiQ&E$t5\ce][ dY~+ՄMqv>9'YfF"P㞁B~`mtem ;Uu8-ED.xNRn8:HuRatSI2 sMQHrJGixT-'Qf?ceCl`$/x@}nO#+ @)A*7o 4)_ã ܨ>A5r:g':9j& f=y` B95(݁];zX2 4,쳠XTU;m] ǩZ:9ӈ.ɟyEɺ 3:A~h-B現y<,g d~5v%iΪmoQ+)&ۉXLrQz6e* w6tI|4 ,[JfP!^Ij#KhaY)/1C-VܼԻN[VX"=*mizDNgL4g5"U|VaցbF*õ}!j!BbC`I+h5CMyu|˴¿@L$ |=Ii96[H uc˝Pą^h5?34e[| "q5h_̭>4/Xi* Apx?9 t^`Tm_dy/7ih,^tI=c"P5|;x^nUSΉ B Za}Lwo|1aIFrZޔ/iꉥk"ε[#6J92SM=8!LBS*fdV[D!)1!`{vs&Ah,vvd^cE,?j6ZNIT&Ӟq/e@q{n}&v! a}hQa~#p_ bʬLOV6vq9Fm"+@wV_L V# ٶB/!'G?mq'P%M+4, mڊC5ܕ(pt^ YquvА> $:TGn?^K2Sfo %S4Z "qamBܧ28B"R&1u sv]}MbYD/5/vG#,~XY$EhF,;ue``e6tQ|^V@{k'b/[X+ŭ8&8L~@k})oy+C@f[m $@28 /? cxBpai |oPiCe3+V^d{I?FޯҚ )qgPNO?1UBA.z˩`okɷyA1[e.q)Ul-ȏ4[^aH'Fl~0N1K >*7* 4B]Hz,`=<׿7*ʬg*h;e$vY4W~8ʁ+ܒ7e,R76&d#H:O/5]jUD[#\NBGY~!>bi&S ̆3u~+(i{33 ep1-g3=f &I(Ҥ i%p>Kx{<աj=Hw`< X7FG%_nP*Sq uG"9]6c#2Js^NPuto ?ҳiYj㲩\[k9\ejOœ6qJ4ͱ`q` wnyjU?a/x],^˵[aMRґ&(qyw|E:FAދe$ŗb+Vks=CNJ CGIROMMLga&{N9dMKчEm^erx?DBPgWY]pnpf;\滉& [T4-Xg=j Ik*϶ACJ{aTw0]#/Bk0W+a[QpffR#tvTM%/RzQKy[8v"|~VxtE0# l1`DifK/Iae<>sٳ.C&l)e>1YG.uV^ ^MD0UY<(a_61toA_c}$EES1x=_'~kª\4ObjZbəv=f;9=5 1D]d쨺fTbkwGÊ"}*&`ʢx$YVx:|0aRMyy 1:8x3 B/˫0on-3퉻MJdx7u LwJom8 灖/"i p;Y7s͵Q^Py$P(e7yU7<;̡)(Wu$^۽Smoϒ0Hw"vq__ԕ:]G}pf$m=̉FY~+8eQKl-:ͣbJi]1g΁6]b;8Ym҄=1ZOyn!yoWFІ`!s34Tkԝ( GB!Fдzx{!jt/>lRysw~!z}ʖK+*zថC qz.Dewj)!BC(ˬk31 H >1[˩S0 L:W$ bEjxV#$Oo845廲ks|.{oF^cZ^XNۨb{Up1jFOrxNV7760в{ߘI#h {LJpx{5ͥ739NQ%S*ə붘VZWԠ'9H hFX3%&x~&L$w]y@'KmQ!y^- 8L![c"y\hTzV@0LIC,;Df]gY:o DÖnqLܜGPM U> 'R-u鞓8 ᣁR+%T?מ:E#IJf|oF0!Us\^G"].//<7K0iI>z"&آ+2kE7- >}e|ELX:RcJb\Lפ/lڷ<#&Jȉkh{ڭH)oåh 6^a8?6" گ0[*ݬXXH3qď[=milQ)'68[<&Z^Bp! sC-z:#T7}B`i& 6$Jj32/mW_VlF+2:]Ն$~ X$ %5?>Z{DL1n- bVg3i6B`kGDgh)}Ƣ|>5A)q);$"pO&3/r {|MNvWnmlps1i}9Ug|#d%3ِ;|U%6~蒹otd?7`Zvמ)Xc-ՈFrv-2` c*3!U{qP.Dl̴JF2s!|J %׶ZtKq0.M~3'g #&Eo7MG`l91MRiJƬF=CbdYSOv;hj,$HBQnF5n[ՓLuI~cd2vLr_F61&YKJֹ6BeKEUeAjr,:n0(%WӃI [eI+"eRM4]‘DLu|7 sGY{rsu树'$-㱥5nCK"}5桛] mߎW"k]2-Mp3){U8 /wx@gи '}!! ܁P}W^Ө0mB[-!blZc+ƺ!׀~FtȾ@Y|)Yi/ߺLEˆ '6e&2! M߀TDd 0ϺeKUB} {cylbn_*w1Z{1x 4ȗ4_8 NaN %9j1oX!6{٣ /j vv& mrGx_d_ jv! (v$A%9GӁׁU-&@#l l;Xi΢+}lnth(~s]$vid\\B}e0 Uohgaqe *%R>E}m{rG[ .ޛWOT?HI (wy] dJh Mds)1YW9Q?'߸^>JxUzx ԸDT m)S+ A߰, V:nl]1lJ\Hc ⹺Y,S(gsTP=ck7Rp?'\_;+\h(ws%ǖa|{CG@9bZҩ;xhgjh`=l~WcͲClq<d$U|?^CerxBxL0(nMLOZc!]1XaW$` ;Gkɘ?|s꿌ga5͊37 k4J#޹zlOcd4<:{S/×p:|^?0 cpP8 Qb$"c~kVRWln)9.ۍ{aOg1ْذJ{mʻX:sQǪe!-נ&fIޥ]>^u|9Uq wlV#w~e lOsPvwt*s]n Q,cBt AY+4t o6{gYj qfhkq/xDa~,2=NFus_HmtԧQÙ82pDxh訍yQ!( 8$ ِEk[ogB` , 9<6fBx)h0n%$`!1y𻪟`zI'qmv2f bQb8X>Ōm5-+']`f8ƙ6|UQ0$oOiUA` 0S }׌h{H:Hû>lVs5d6@;T;%<~Bݭcb[ =].Hm\'A0\QEW \7#* 5k3=k_k/b r;%T~q̋2]_Wo3FYcisyk:L,#2$wwnaeVSXD$uMɑ}`m6~KodeRڒPKx *D˭<;p+DX^ JM88(Y蜫2H1**g(ӏa!>3-c Q:!xtsfx\B"D/hnC"Cerp(f%6&q=y @Ss@mt\~N[=9NHPYUTO^)o Ç`hxG@-&[/MÐ'>QiZ血ZF%Si10SZVx h`ųOKaȜ;m)du # ]Pkk#FP^eaS~ɧpؙp$x.!LqqIPd9>rC~D.[c(H!xz &pXdj^2a=2=76ꍱQ)ʧisj&P$71h+\E{ >4Ws[Q)OɌXlU9]͜F 6HgQ[S/Ts3TC`6i+0w0j }?{)\9b&W\=F]86j15ތJl 06i@{?K5D7-1u!, ٠!h3r: ~.s|i05^l*<8|!4e,[X+VK@8I%)H^Jf&ؚgń=yFBEo:q!4Z.@wP1`ݲ,("(NWۊ)%T4GϊwZ +M4|귋([Nwu<+9[lf[)6 RD-ǚv:x&{AY:9M]ӟpOu6]rݓP(E^L'w9sk^WX+ Kf]-ǥ sj;)@UHOChZTەop<['p8lm>UG|V{CupbdoIvhpwe5]'A8{ * ~~֋#&mRb;`ދ}Pv53:OVJzV _fEY /Ǚt`n~2uh3a3h}nH82ԝµ>[؊- KfCNTvcфqMd99VSU k+Sq\7,) sg7V Ew[l?{b7:`ӬOj.Oũi { tldHA\HV +kTZ]PɣE CI*0ѵ{]ee>Qw~KF0(MjoL\jk,# dqg(nb_Y]BĹ!/ym k HN/h B@`GJ]&\q"D%/=Ol=)ފ6l5bvv$h;'Xأ 7 H ]S>z혓 C';OAǒ6{VL~EXc*,rG_SߚbA[xݛzj:T}kӾИ5 Qﰛn89MȂU%{oxo1j5 ƒK3KNDKθqeT3xVo xf%SvUn+<^[bo_-f?S='v(:y(ώMv6 N)lb7k+-;;f@?n4H!x@҉1ߦ C?^}*)U؁0fflzD'jZTQf,6/<`=x~1@ B`T$"orH`ݽ.A&aqY.ES_ʣ) bF߉{;ąa45.f;H}} {2M?u1nsE7 [#w1f}͓bx~d\;mWmXlv-MR=z%v i>8#M-oH/T[ 5RMA[ dN'tOM8A_D{g?mkjzpٟV29;CwqvW^p[C?*>?8"S${XgR{"%%} oYMj#n5ǑbC#,B Zbw9> a2>_!"VAvi'|j`PxGEFHSOޅLJL}, #hYK Уi|X U7Z)g(WWFQ,K!FFTu%k=ԓy]h!Vvz)g83cfJ3/M(9(if}ͩ#)RizUTs&"<AKdo vm *,E$kI/f8ph^ZEBBOJnF.uY!-n2M5uQH曭p@w e$MZ=&QEE eHmʬOt9GCy4Ƈ+:%'4v)ly?8hW8ֵ_JZe$hn8wMl{w5RFK衿Җ- 񧇣pLGT 7%7K6ƛi%|Q+}OͲ(dGF1Nx%O6|k`Ji`#*_V-"d'Cߏl(Cӷi[2Rt9jrp N/G'e aKL%NBD2ȠǕf6mF8d+ H[;x͇IJcFWZ}8F6k&o?Tr~'ARH}oNIz|70FGL 8yqwt :`dtX?Q V>NM k7tȷ_(lz05;i)Rll03UpX_xLyѫX@*=NnAM5kJ71ΞnoA+S"ZpB ˉ迈 s⓴6hbr.~W%oPXbĈP>zeVםlk}Bg'ܑBCŻ2 ]|LGI</r}Eg1)z^_E?K , ,CK~056s#KP2vY׭,ݛ߲3ok柚+kbEڏRJR?A5M-&ϱf~Nэ[p{TH.9 <8,7S p ?JHϰ1_7N.,!lGE=bD F. p;ܰna=SzzXvp)>QP]&;6>塅svĘ%$рhYչqwX-;Л\&[!xB"I=]lէi {$j+ˆ7Rfk1 EM;z.C͹Pvvױq IKAVio ;і%(% dgT=%2 QCLm&FoAPa6.z̆o&OJdz!`G8_UԆ\O4AW|`قOUNpi1;gi6wTF믰^iPu&~kLo6ta^:/.7}\YÔ!֏)cc/pmڔ^1Xuz8Jw.18 K:gP-Eu-Oɔ31BtzrTutt&nA6XQ}'巠r|޵Yݓ*ªCc7s+\WZY]&?`PDTyKi3r3Evc;Y3 rya4 𥥨Z|O#5>@Oq{l RXE*!19/TUY896IW7'ܬIήfU*!ARňͰņ%O'(`v~=v3ftˈf"}@j}P cx8e-i;^A7[""sb$"gy3X@\>\lB&GVAđ@(¬lq+8W%5`pKAP)p]g7G{8QAOo&y{_lB-[5=69_&X C~ϙkXT2C7r,q%7|[[e7J~~R*eZ=҂TN [My Ak`ճ7=; T,kDCS m.%_&R X~P^ Q ΤN|9kV@]( Sꪷ`*vԔ{7g| j8WO5aw:=a&AV  SL`Z7imÝnܕ1&|sjlyʇۀ ^ _dƘ`8U,m+;DL>w ;[N974#GVjzGh5MG nGsڏ yW:V`.(?@0mWʗty,$TttUäE~9~IRZ(ވOuʖa;Zo}18)ZC7nSQY|(hZ٦n'yhnjWvJ-ρ[Ha,kP9iOڐKĮCP,zC ?% >.'Ιҙ^ΐ?Jr10F< "UMw& $yp~heq.nO $q=N gJɜ7bݴ tǍJ|2ٛiNX^w!CLy.bޏ竢HڤCaq_Ǵֶ12f Sf2EC Af-gA֡Q= s+I<ыf+Ɏ]Ew2&O(bn l^ŷ2$韇U'mJ1L)^=n"5OցS'/Dޒw|x{I`a/M= ‘ dyVu^E>ۖ*B[bSXe4v ]ZVR9P0/Ұ9o\9E쑋0 E=Q`b( W3hMN)ѣ.X|) cu𭈼ޗP{#ܫ<%mGbTjmRk[BSrM hڿk*W8O_ȯTڻZ^1F2v#%5Mգ =C[_d"ܬ G^njGk*?-VD ğ2-䶨'0@XU >Ft~ȚZ̖ [ g8w~? (

ldžJs	ϥsKpCT9VdY&_BhӂHf7P䰏1eiԆw^s2?
Z$:ĥ>9/,mo526@+hW5 ,!*Xam`*P~xgX˜7qrjI
4xKzn"(%MI߅6w`rtERKP!TxD+Nɳf7\)m
BwX%Y@-pHE?rE$-Yd+gX-E<ŝ޶WȫJ;PP}UopP{Hd`H_p6rp,X,i>\DܩA]BghY{Isq0H
Ot{XoFM׮5eaè֕{FrCSI{}Еn?K@Zzq%Fi~|;>˻NbLתV?+MlS_D1
Ҷ֕f!h|3d`.]"vԿ10'K/

e#[kfP#@36_eiX6GP	w%,";
0n@hبο2Cٖb>OUKqSEBI
~PHd!ZAk>aBˢ=hg;WŚ4|Eo?1 Wbo
BY֜HʂJs-x4&bq3jrv*1,E2yOԺ&py~:t
\^AA>s`{ӷ0yh:zO],b܏a(%~ʵ+-rZ;<~:󚚉
-b/t*S#.eDpP[{STO2%Eq'@q|nH"hupA*w	BrK&K64qGG843o'VV~P,mTѶP_nϐ*⦾ueZS4sr>%D?n&)vjCSBUy(~3$aTtKr+1&AY|v-=Ɓ`NQ4jkP-\P?@&2z;U"2y]bzvA)6?	w;JrS$EDrDN]wy4,K{WH˂z#]ǽX+{;БBONVqlXdeKCW^E)AR
`s̥zOv[hV~.ȾLBOa>͜ǖ<0DT0
U}.),^NnQVS	e@{ZD
f6\Uf]f=A! <
p5800~X
jIC
PHm_sICM
./Ab+.qKC[2aIAS[h?A]&q\UfzK_27qH:|&!-\)M9csB؇8JZØȯtD6Ú"0
=ް7gq *);YHNYK'XV,]5QKhozB*b 0n󑬘OZu7:IGbNٵ`hݠdJ;CZMn:wYoB6V)QahZCAo:tfiŵ>ɛMgnx?k՜]0cO6
N%Mv$Mu_t)W/j"7չ{Bc;Trz_5t([/7R$}rGGIM\b=$9?yӢ5o|.\-ݚ)Vv.#jDj>3q?FӛYEd;gHm*w{@joۤtЯlԉt2`#1M3u"Vqߜ)2CW^5,HW	Hкα='1x)*w:=4jr	)"xRWKcSwsb^avnƜf-Hw2,0!\F4aMWyĄ1=WŵPQ
4g*]/:PK9CqCVc}s#`#lodsb-<RĦvԠ@[
H="&q+Ƚ;ʧS%:؂kfsP {cLܲ,.dΒHP&pMS4Xia R4|[lblKv%N?]twyYvbAC$9ۈCimK9,boͿ.ooP-1~6SζapۏQ!gzao;8ʖim:c,(>/Z[YbpS|H5O%nYi$Yg0hgo++~jT;lv;?bčiX())_j /:nXA3Y	@ `1"oإ`ng_֟]J	 h%GY\Bm𷆉G(i>5;>AH^z)Rj1|L?zF [ާ2nQ9"3pn[A!%_(߰4IL 
ϙL M2!	0v8Y5,H]
@QЙ(ylK3
jڜJ1H>]݆V@FNݛU(ΟjIg=x42x1TWӬ"VEArU:)݁u9a^}v\DO\D%E֮")=_L[WfGAAT/gV>}wΜLz0WzGtz`dyYn2PkuN%Ad+F|x%z+3׼!iaٝmHVn0\ǜRLO~rQ;aBU ް*czz‚}wRaߨ5#3MJT>,BlkCYLΩLnw(wʛVn5ܣ8TFXoL`	ٟmnasa׷kS
=#z?Ց,c$zaV{x	]xķyA~_*з/5`
:&RۦY8hkcosɚbDަ*w8 Ƹv!?7լ!#ƹEcy-NI)~8Z䇀ru'JzSk5[&FchL ͯϟ'(ޣ]݈Rݣ@uqƿ9<.Φkʇ OlQz$y0-ͩVm#.Vllo5M
eqҊg6b%g*Iw?^j9Ω/pW5I|H 
*3q$]kUdJ2&#?;l++BA:mBq6hC#f;ňBf[U&zf?{MWz;b]e7*gkK^=ԅW|OtV;?=uߚܻ'y5%݂sM(	%~t'Cy]k~PCoX39UG4!xCrcP*P
srJTe`*>LIZfYDi_Hjl;NvZLXAf4 `8rzֆ+ըUNvqxUT,C
˸my֮'Gf1ׄ(?U~EZ<ς^'=ܕP}
4`|ۨzgd		Frrr39BؕnPQgPUƣ39 W0<ۙh&)3_,fI-y\AeXOBiG̰"-l,dpxBAo܌T7-ށ3|hPT='rT2U/Dz~x1xC5>湘`Mc$C[4NKx1wU)NiW<
~+H1r%z.1%h^9uyR=ۨ3_IMX3깼0!³cc^+ PXCI{9aqͳ
M(1?;sЍf3җ2&H-TxTolԞpk6w#s]5w\ [7IQd'ٙ]\>hݵ>Rq͢5߉(cyqw5dҬZݓG[V`BIO	=귆na=~ߟɃ9DzpT.Ei޲T,-V##(֓pTer~
2[*[M#(;kW­7uZ#%x	:H[a6.x4f &x;_	5UQLΨ	;Lyf:;ygqrԉFձbOIG͋ѧrs(n
@_mDIb܏ eYXZ-U;j:ZH!	{!$>==Bq@dAh_)ǥ"{*4p<aFPE6F1Iw	l蕾lؗ:*4~ i㟿

^v>a6ќ`Vm"ZؗQ *ͫ`N&tO(
?.p`vN&h?6/0;M0φ3ەX6pEҢ$<>6ݡN5@P/~OX]A+5u@cueZKP"?i.ĭBH}w+A!#ߎN2H/bOLC%T,p#9`).Z:6eV#Puޫ5q4{թ7]v#ϭPSmXş߅M!2'z@1|T[WDG OēNAilqșU&8>K+D68fRLWp?${A.3YRy*M~Aq{L%̟,8i?
L8+eNPz~
wu xn,;JS|D:	gy;nv/h0)wY
Q{)kߟ],58<'lf/`[],2h0T-/=6gTw	Ϙ"['"hZNv2?4A׫]rV7N*(7Ojۖc~PØD}DnwF4]}ҿuZC3pޑO-DS8R`Gm/Tau8|D?eCtƔ<,1v8\ᣎEkL[@ToWuM^(tM}R㞭uvqPk_5ⳮюdYmW3>sO˰%f+]a3a}y̏Sg[
yKRtFms~)`9߬^_+"׀Dw[t6O.d2u]9J2~b>ۨ]M3k]͋kڳ9ܦ䖃0CE0^	`s_g]@y=z2
-uMПoVdi1+è\u-?M"jb%[~YB~Xc O4G$~mOp)ZK50s3+aoB;OQ1OD7p<	߯OP5>zkL!p?Ά|ћ9HgN]9<-ΜXTɺ=5dR/}L6vD1{H=Hcלڔsno1ebLqU$cY
C2l"hB,)?	}zkWi€It,A[d6~Zgݚ2BQ~tW?bcё;ViWMT
uoB=J4ӟ1D`n+}3y| '=fYBɈ
5۠&gIӬsS^r>C߯')#b=ά,fy~~T}.
I.X↗ent7'1W:̡-,m?T*VP8^PyrהClw94]!|'"T|v={70g0c発`g&.q8N *m#ny-;$&QS0+giw!Rw=eOxL
Rݔw0k63Э&d5ҪL/B3he6OL0]XKp7%Z1Jȱ9BA>XL:w`P-)29+B(`r5gi/	Td|OrTPٚlVLz>ȟ2Ri,XyQ]b¿y=*z"PLE(uvx֚w[hXJ3i1}K	\zN{9zE^.
LzZbze,3FTzAGry^@7J܆/wUѾHT>=`R0qG$:%:ۧn93y3b|jbW*ҍeiAZ%݃n2ags]
ˤd}ξ

礸:\!qhyRWДzݎŒotvwL!1voj30Sp}4	0~Vec$PfP?v"RlO¶`|(/lD~+ƼKᤘLDJ5F
;!PXf]UT.Z;fcTaC)6Sȓc5u٨5Ie5J?L˴2"P2!Cm/ܑlKWUܷ^נ*k%}.!Ydq2|gr
06(لߏ22SD4G\U1^'>s38LprEJaKT.95}s;^2LcKˈo-t
ն("Cֶ!L ipOF~?R_%oJldFG@i^DGlV0"vҌ|ZZ=Npĥx;=aNGJqI/k=lQG:[,^z4r*U
7ЗOr몿pR.l.mV4.́~Ri+nA,Y:5f֕GL8ҹɲ'{#D|v}'yE>壘^>`'Ut۸roVuPW,dWqCTl1X`_!}yǭH?ZWmJyζD4|vbMU([+~On*O=nyMD-\[k+6Uaݝ22_:CZ=rUEt.R9Bci6+޷ihO[GCî!z
l{u|t9qYgkMyEmXH0ߡT.t@6 9EC8-aTLl4\烆U}3
j*=-K䶃^S!_&JCs=7kW !+=㼥uD޿B6W]\&AaI0vґ+)A^S͛06?ʱg)vG8z|
=O޳	k.vpDxu}qM
"H/&?e '2ɒ^,#ȧEA.)fp(Gyz1h7Ei7Bv^wՊOAnIaY`D59`VO/1?{*P;!ƒnɹ1_w[t. :~)9Hn	xy^O(V?^zƗ`Ga|P^gվ‰:ϳnd{S\50fW4MieO]n;\˔Te -xuNv2XJ,O;PG;\]FtRv~Ʉ
yJE)o.C8*eݔ
2HH_L1؈
KY_+Z	ɼ}jinHԥzS9$Va?B&	3RKFT?IZkö(M4KxsSD&bJ#VC{I3[/fQb
khJ2]0a5
Fp`m\_s?('mVounm&.0aagRn!+tb
\fǩc"9V	#mwfM|\oۄJ*fC"teʟ,GQc@qghgg6YġaϚ(m,w,H
pҝDӉhp`S`N|C}Q"ӍOBn3|鹘}nϴ4S]FKV*^[p p1{Ndb=pF/KaTW#Ry` 	>JsJ8MhBHf J."]Tu'{qPMĮÞ.jp$dqaán"'	hhlDo苒E@gƱn弍Hc<"b6F\<%z/@߬ek}ׇ?qBǯg`t[ޜS0r"lZqVRU'RQiltë"Vuwyk*MiwrpUNx#-?7CiY>,(s)kA$±B_lU7^[muO=P
d{~w'~&
#5Ev)(S3\]qͱx)c37qh&08G}f\
9baKߓ6ּ\b|>e
ow?~ӳA/xj'^Lnɖ=e*׃}sB^@%.q@4TT@feɷ2mUp1?NwOCUgT>#܎ўb=JtA8fFQ[uw0̂ma;/KrA~
P^6x Ś#W^	@S˻n5~,BВRN"S;pl.gtBu+UtKQ~cK+KID٬ghEnnYS»5,lw?[xol^">wF[UQ y,P.j蘔ݕW^!a3£m9.KkRǢmר9yζSAw~ķ}1>JXǜs.{ԷX3O-r:1-EC݇, p;*$
!g
h}C.STE&NЇ̈AyD#EK"3I~!(YA̩2xgn7|M?8Y\i2Dt5J\o->wՖl}	zE8Ua>"ѼNpq~./gp٩
83烬E0yM'ME'2[^VS"[s.f@kpZx85,y&3sv9]Г~?*u%廈a|}!j.	RciAe`AY&l?T:YcoPyb)wn|Ov|Hi)b<hoL{sNG9b§^GymГZZ%ybᮼ֬ѕWPLB80"ܸ7w8	 `M_ZRKү{rhGؔ”^bP ׬oVh{K
NizBAc"fZڴ:dE$XOQX;Hy1XXd@Z>YN#g*;.(T҈L6%´Mnf\6c?W%U#X)/[BM.>p4_b8RNlrPxx(wɆNMђp2OV1=V+sW8ЙCУԦN@,P3FՋ@I o
'okrp6QSv/W(
Vr{siYbCE#|lu%:s]G.Z.\n$2zƣ-e&
>-Z+W)6AɎg?bJ[4b~ ۆR[~6W
=VT
5.5WX]`ME5́~
6h"Hx%o)*)h2:-,&8'1y vp?[j]oTrN1oroȬ'iejqPǜWp#(@[Dz2Rl0=I(c"K{`X)z&QV~)_F^FJ&.=g˭4Tͱ.W0[>c
@w s}ʫu`6.!% 'tD=E٬Ι841ȉ2Hgjudnsx5R])>eBl[cՕ? 븛jx)t
x)|Ѫb)%TQtPP:4C68q&x}װ*o	VoZѡDߦ͂F?>A^bEUfD;7>-A;+*n$Am1[|'ݺ)=Ppk.3^Թl6q[UC~؃iZXmYSqL^셜»lheݸ@%\&n(E052~8;8RoVB'&.2
ދs"փ[lmm&<7Qqbh۪>Ow9zZpj7=GY*-7EEr AFx*fTEPXsYY	2L:QH	},NH9.%D;%+2A=n5yЪa.wGWlH:zOآ@OJ&cbcA^Ź0zjͅ٧I'ܖU)gמmq$	b}(kː"Q1>RG9?t!s<}eXa7R[spz}^EfݪN:B4<7CpuJSrX*mǓwڜiPWbmy|_pvsPgۊ{l2B#dߤTz5>=~7\?{
vad[aKr}>h-;0XHL<O8x}L`7JCŹ]BUG<73?$H 0#9^*!Vlf*k0#Zx#&6o{75ؑ!7qN9d=iIbr6fK9
Fb#n*Ey/tm"xN	1,^n10j[Ub](Ԣ\ՖdzS%/
Y-"+ܪˁKe>|?&{n`~mXrQw}Īv$uTJΤYp̛T]qdj=>%Ը	vQ~fVW}q!A4L	b+K	:'5-QRLG#|,~.{
&S!
Qb,"`6HwFWnXUjmͤN&ߦSaب]Ret3#3ťtUK_6&(b/vbq?1G(.r-kPIa{Nj1w>tڪ7d
I2RiX6nt=Nvf3U(m٥D'1r[0C_q_}hpKBT^4v}]vwH_CrUfKRq&u>4Mt~*妽S%bq]bbι`knz:)cJ[e_(U൶h.695Sw-ezHU7Rb}	3>FU$^%"7GɐeZ-|(c̘J;*VH<0|RJ_EȲj:ׇq]l*%1E;҈$`|XO/8P9;18&[X%e^* |
t>@r΢M]H-GaCtVb_bҸy@KR	+(ͫݴ{EI*XH1P9GC/{8sShz)P`Q=\e){ѡi}arK}g&a8G<۷&:DYМ6$jDYh:Ueߪ߳=oh
}KaAi&<E9sq;&pvKoVNsU*0h1=X:"hfӤg~^":"u=
fĩ >“'kRAɸ;CMuz(FָZvU0G!u]3hn͌Cnerqu7]a5J	h t,km7,;tC1{\,fE^6{A:IԞrU˧SݾrVan`pȿcEqB!ےn;-AM)NĖm`
z63js盢pH t5Xg\x8
ku,+ B3ƳgW!
WUVH<,|lᇓ1qtԵd6QBxMEn
_kv͘q)S&]eȈ;*ާ]@pʀ5:}c+=7kosTͳvWqYTO&
qGZK7;
-mOi&s}KF8Q9͙e*0bó'c#OdM&kIuJoNy		,j`ӈ94=dktEENĜiTP4죨|q#/2ɾ|UJQĚݍuG{?(47nCQ74a'MtDtu2EJ--˘Pb8`ja.0j-;@,/*Yf=:RwKw0E*_j=L&煍:ZH셺bFK*/#z`SMνcA0 b>8/?7eV+_Is>@7<-&)좰
Koڑr!f&Ц^
Tnbk<,;{-%eb])*SdHg7voLGI5 8Mpěv4j9OA|&fHD_OTL#}>wRTeheWZcgȡmէ pABp1\
T%kKu͔oo*e[)nI!<|;=^BƂ*yKE̠/JAONnYa4v.:lI]N&{4~Ĵ_+P77
LM]!".P
N-Nb)1&)]\Pԇ"AxI|j=EK^<jJrv$T?Wc7]m'Zo:lxǭ{fZlC[jo63$,oP)̟-,Ε[gYfM:ܪ6QY߰}]~ͣOiNS沇
$_1\}‡`4(Ԭ3GBh_D7F1[J2>0W
LǯlR$&qU.&j;^L#-tqouG+#u_GSf|rg]G
 52y OVxD3x\M!^n?NLƧqvESC42@R=j=#Έ8r?(5'Wp(tg+f14S<.u+Bߧe[- oø,߁̤zJGL[IϮHBCjj/9;F-
}mrL8*/[qLHEA=/CzV:[#FnU^g`>T7h/fKb(JGݫy_'[tXvqP%"4Ի
@5Ty2UI]5ss;\@[9i8ԴO9+}:C0dc3hgÿ jqf?LAT|M%ynG{a\w
RV8lɉ36
[Dmňqdl 9!-?_CFM2bΑ[3dƠf;"|lb[dСFUUg9 r˸6|8N&G7@\GG*{WԕcRŹ/ҭMph9
m=A1Pr}T<7Wj*V4ݰӋنZrBZPlp7vA|՗2"J9C盍w@xEzв7MjP7WAYI
珃v":k&:cB2p
E GSv{435ӭj|z-%Guݧq{Q,]o{s@t7q#P\Wp/۾X]zz߹݀ݼZnULІ*q䄀el3:-iE'[L.XgQ]d9ѻ1[/D^Ӷ'
΄[UqnDޛ9?SF	
N4Si	nEڼb_ˉQ{_yW?.:3eטyIyhfwD"6M}sdw[DG0k#4Uuj}1-}XO~,t
B@!	kOy1DJa=SQɛ`+#tCB8!˃l'iVǐ+P`{3v'ksVv.uU:<^>G'Mq!7KЫhfرf9]7m͕ѯUɷ%"HҜL.8pq_`+"zF{~CvIam܊o\AlNU5Q4xdh9A7
8Asxg";7wqO&#?d3Qc|chpm)rVǿjR	h5e
͇=$,DmHC$rJ	8(Z7^nvO%cH	bbY|fwQ[/yC;PFB=XM6ktTt34oNK)ț@<7u{dPkqwֱ(~֡`͑I(+00y	t˲\LG(T ԅ/le;N2<!D*/a<=$_4%_T/+TkeR-S|%kV{Oޜk=pnA QM)zm\~I21KeIiJB9di|`Z[iɏP#\Cyj(N:e=;x&h|LH8/k<誏-eXVT%Tڹ^HO`ƎPvZfX*%	7zX2!Yt|JwNre;ӎ'w$b)go?&E

N;}"B
~@mԿ2f"Q̩Tg!"XIusyeT;rk\=tuwK"S‰} Is%dj֒Q#ON+@jDQNrz=hSQ0YF:{M=grXNnc{,hv:	d
f=%DwFxҗvfC_X6o=H3$9jV=^H.t]o]\o@1wL,iPmO0!7pHCzobr4*.ĥu9֫C'1u#ÙBi`5ggbKoΙ5ͦnOcHw@)rR%W,XwY,< ԃyl!4#6ÛpnKA?H)HqrYS
LXrvym5{[IGWڅ1|
d!7Fϛ$/mfì1 Q?1,W\QD
wӡE37inUj.ɹdQRd+KO+c~Gd#Kɝ
FAS'۪'9+I%_&2J%4t0$蛳x>:J&IY>{r:~ZY`q}҈%mo.#dMu
%; ޴ٹu.m_ħCuF3PdR*`AA-1|לSYMIydQ-NK:LP۾&S7[SlՂvTE9;^eTt/`ǂ[{3AJ^
PhQX
ǫ&`(UW$p
[a#VzY~
hmM"ϷfF%N^R!}}vϜC$4}Wsr\\r8׵O΂L*/ָҵvXXvXq-K{]bl/]80i
8>9։pp*3}7.LѭG9"̝;glø쎇m~碾
VcZ=
s[tQzdUOO$p_bP<ɋzg_GRx,&G_aORo".D<*Aq5wZ
*z7Vb#y9ٯFխd^]v棊2rH]:FKgGxN%B])6H2cu5=#(-
qq{A|-KNUPSkV;b6*7t+ig_{ikZ=$D[t@hHa"+h>d>xS;A92>"n4! ;)-qxl€[TKҝ(BO P>!O@
d!&P-"m m>jYs9\THZ=Qrxl85o'|CJtshwi1sZ/+Hy9*5ZRVD#,lRZi٨`2Vd.UhO6*;H^)oO'"~ͳS9S$/oF/w7Eka{M8)E+,Hy[jGm@T:飀EE:7HpOzfBtH9|M[-qתJeYgt3u.Pâu%RM\,opb9A}HnJ.D-(5:봺U^õwƘ~^Ij:qPÊ&f-UYcM-/Z @Բ=yg.k9p(y1ThW-0G4õZ6t<ևzM¥
,k(}.b]&:s<\ICcw5OH;iGT6^ō~7$7tXos)M)cN쟁d>I^	a(ǩ8,!	F8xis,5N,y3.5c[OLZlChͼJ0P{ [5a}2F*׏4ױTaN6(Cpy MV?ĉ[NϽE
v/&7J#f\ķR9z`5̡ٛ[:ltIy
 H ,cJPD	:\F=A++>|zv5=$]!D"yܷه%wqY6NV.\1 7a,r#)֏R'0y5E1rZ#zi3D5epg 
^JM5Sg41FvF8
ze26FTY&]}"n2ͯOQ?R!m)`jB[c'ra:azn)QOV#RdeXn&/sK_kQOOh+oso6;˯Aǖkףuʰ|jvXw){/Tᵢ?1XQ8(+D)yrtYٹ7&MДuߠȁD	օN9l̏|
d7p	hU}
[@6IN_<.2%rfTwqm0Wk*C]Xܫw?V[`ޡ9Lwd吤6'wJ1*󆩂o	d֪>]RPJ=;jϟ~|_Qnr*F%o3fe3YhX&hWW^lڈ5Mu2	3iULGzZ(GIՂϱqƛ#+Ga98$PR|B1s&ekrIzH;D;a}U9\hϚ!$lAfR'HS69`-&m|/:myt}?I鞍}{kQtф;ܝ
T
mRIs _J*坩E_T?[
9Zyqo_=EZL:#3@$# kLO-鱥a*8MD,:V}tNBVOORAց%&!Yk"hS~N(
LfaB܇K*i/H*	l
~[̀'8OYw1S@s{BVP&Bia-dE{Y?:"߂c\8*Ng@$>&*B&^ea\]+9frGIߺ'Gis	Dٛn13Bp"	{U'~bЦ*j2eDυHGoo|r'51D4Y7'ȸ?!(K&@[9|v/&RW@sh{,OI.J{r	jAwuQTaw
[Wx϶@hDYӇnֹrC݅Oͦu;̒WTNJl~z,No%3cBY'V(|fj£'rØ#f6bY~
yKN&y`<#}Ⱦ=qSg~uJOHur!EMUЅL;ĆA^sch
.کߋnNeNIdrbfs)+frbh	uנd3,?}^'`(E	8z!pJtd;)Qfs(0`@5в7D7$$*v]b2_Nhq#,.a݆Htdpv/~UO<ƖY&+Ȧg[UQgs4NP{\8kMQy4
)˅\``@LYhv`"G  T\.6DM. İ4>SA?8
3uKgCkKos;C]a)3r
dHc}S|ηf~v*"8kcs BMYcVHݿckTjpJWjh8v'gtXqVGk"eU:%ϕҚ> EݻRWr#Āj@@{*'-a:׊;th>`סi<1nSD*I9,VPM7E8H|h`ߎΣSES1ppX3y`u^J0®SR~m%o+PݑMdZ
JwPr0*ڃhWmNʹim4*%pI%Q.g#X,c{܊v;t
q*T=w+ՙ5Zc^HhϜ&8BP59J`{!kk*./Ң~] 
5=V]$>COhx}NU!aȽM|1j{k/$g9M/wPxFY+L+C77g'/NiFq/^!6F2 '|`EuҦBqj";^6嘗}:>r!hHpfA09Y$y7gzdy їƨd#Y71'ak3:	P`ݬj@y5qpDwj9g+ol/(BEL})%_h[ 
a:	v^e)¥Cl좃VAH&U̧/c.+8\YJ7xᐇuNBJ
W^*Rg%]f>n`v6
oWXpYm؁3o"w'oݡ
F|4in`f5EPŦPh@NtZ) EjӒC[B=P/&QIaAFEpR*ѝy[Hy<-hyd@2~*_WLJRG
PdN]ǤpÔg
^aI/Ǚ6oEV	ىzQ(Z&blK!X%T5+Pp0/)@+"Aa>7FVlLs%r+%<希G]VHhTd'P}a>ȯdPߺ*zL'{ӥP?|:yfnaC>k=/`Ep$ShE)S]H2H߂w=i|HjXu*)[FbݏdaGc
m U<Z졽(.A1FMU~_WZ_)!FYSOC<`?;=L'.G?Woޱ۶.Ԇ&tX(3d]B	w xfiJ;-5?L
)|e`p@ͥP|bn=Uc&GM''rw2[fE[p~	!Gȳh'u8356%2nRd:w-5~rwWߦ>SP?ZmjLjNu_-'A6/l'Cl9CW;dGCxL>v++ RCRPtMK&Ad+W:,Z9Ziuo&AP[]4rs
DMZ.e(0M[[ntf("̘FrE.dO溈c_+qf~
]LįbPB؎˜ި43
-NޗHUKiR̔Љ>)xu'Obgoam6h~)k:TN%]v*SV_}WFUϕbo~+$SYJO
_ع28|>OZ8ֻaq;ӭs>a}okMd(坏8puHn}Πooo݄J?}	9jS1

>4G?93fc^	iw,lj3́H
zJc)c^c4,OSbZu9P!g+0}/g;e'^ڒf`UkX{pO͏W`RvY*0Nxc'a+ovdO	DohƉMQ:A:s l)멈FӐ`7j=+èڌ`G(zY<ק
jHC7B\ƽS|]0Ʒ=ٰN&llg.2RYџ 培oδnԝG$[F=L5uf%h$Lw鰇.!X>er
8fqYH4lGcu4!Mtt{"\!ŵ/vo>mn'j#?%',&j.Mq^YéhM
=Vp	6	'Ġ/ll1u+sM
$.9N=B5{冫B'מPJaz00Om[ocv(AAPRfo?uxzʏDmy6ߨ܉d+k%FH`$=͹BfR$A/?n(FdA!QZټk/`mڝ~lk/D:o-i:xfcD1z7J9U^:hg7y߇#7p$UuP:V~,b8[<,Is-	u|3*(LrxY30H,)qpH}3ݑӺiK7:rq/9N13Ӥz/\v?!WWbސ懇$nC&'#%>{\-~strrHM~V`J9@\L]o-?]pwP{L&Ĭ6?[+6F.C4[OZLYwkV@ k#߄uQg?=7$usΜ`5Fe&;X
'M)$YU*&bAH31pB])UIPԊ-JcD00#;]BҼ,UZ(tԀKH'ϋ^GqyX|-DfoO
zJЛ4Y7{b+TH<2b5zܫY͝,>8	68G̰J\jÍ)+Î
_X-+g13RtMsgeZloDIHhb~
s͔?իgH;'xbή
gͽ7hv6o;ԁksHd)PskFB^*F4{_}K2)
yB__ۇ}hK<j)5]	K1)X{5ӿ=imH9!c>hBe%f&[Ru91swox{]b8#iDmu,}9RpS(cyCwZJNШK@Umfhݤqq5YC-oXc|qءU!vo|OjFF`vSf =|B/z
^?@M^Yq]jNYF7_=w~\]wXp

|ILM=m/H?LuaBʈ;K\Rо1B xi[;K޳hD[S[G0wLv_-,SoY:!Ѿ!{N+Rؑ۷'tݎ3fhOD=FͅH>K/GڣPf<Qz
;?5}%vP	*wb|\GϚ][!JYatho`GdhqRi&}}໸n=>m~+^̬bnuGbћJvwA>c}\7,xo=44T*sP^"杖9iԕKTۯ%JImتgHus6xݴ7ćc(i{VLPlxqP5HK)CF
ZD}gwY`5F/xOoQK=WlԒkOدp/42կuQO'%+>/͵;
gBm83TTt'ۥ]ӞQˆbnNw$$tM@-6>c7Φ-)XR釹l) k4{
iE#/QRPnz12'HalB%6ޚ%O`ʃpslFns=p*d6ݤt r
+apb܇G%L$"pU7Az H(zV,]6ָf_9ӷdrt}c"&W~TGOӕ*EjHf+8]Ƙuיm
*r*RZbYz:nډJ@9L79Гo֢(QrϠ'xYug
0F5Wq"'+RMKXB6bfHuqYU˼HTcƌv,B%bϼ-zCUA.$1;х)?i	bܵUVlmt.# ,F˞8W#2{>t#&,6hlUWNWD'&\FԖUʦ߆iґA`oi^Q/)&茵2x*}EcE;1YfFFԸ+kQV"!
C`nwy)S)WЬLRl ʊ\W	vF% Y!x03e8sN3+<^D:3!ُeI`/M3Gm93)7*vc	Tawx΢O80zdrfD$11xSVpl:]JGJHpeEg=>LxjAH̉3BWGm	)HBHBHKԐ5Rc1DN|_Il%UsN䠢>E]qQE~o20h-sATW#ad}0;fxFob1T"i&mq.ʪ̻Edn}BMjWa'5#׌mvE`C%d-M+R
T~;3oO
	 YΞ@59~:r	C(O&6uQqM+be>\:$Ͽwv/J)4d/HӲB~;?)*'.9)ߧsf3UrVf+r\bÌgv&V	طFռj婻"Y6*Q^	i=A==evKG۪.\Hʴ +h\Q2]uw|3nKR^-}%
dY
'ߠ6f #iO1+LDOH)-#@cŷ-b,6>MkV~q`-ۋ
O/>`OSzϼ'1in9vgdkP,+EߕF[Ò0[S᪾ɗӌ.rX~&O+̾P@v~vk.:j޿ԹQxmLǂ(|/9J{]}Yj6ŬTb2JvMz,3홀b'6h<`,_Ѷڿ/fi:b*;|tHi0Ϗ#
l *&z~qlc_4ǎJ䧮O	0!_K2e^oovZu9RRj/TiEz&j1֔3/A(:ჷ||O5c\M*u%xJ=,ć+Sᢛ4VOɭch6Oy7'x-@_c~*^Q2sY
_a+%?7a}O&0ld/^(0E
8
Oόk	a
N]#imҁPq9%QY6qT~Dζ&Ȣ7Ycpۡ;L|ՈHvH=
Ցr3	Os%DD_'v߰!(t|>#P4!'Oԋ{޼"񛡇,q)cg_0X!"&.O~iQ;+;w<)Khb]9ש>p$@6YدE7;a!^
Ì~sÂ6bX v!vQ4p&!]K'pZ$|sߪo+η=nuĪ[ui7T>6Me0Jh23V&{>f5c 16BȴTǃ2+J
57[d2ۢwz!:M;^x1Sv$c4?dxvw29?kUi23[V
X<$y!}HL7[Ͼ`G"P@Јoׄ
P{|+(rI*v$nL1~/5ZcЈ3#)IJr)VZ	2+;&0Քv~h>]i8['_VתA45N1+nڃ\e)C;AЫȍ[{**B
P82||%
uO}{tL%oz9besϴKnjjt}f4.w=:ϯ߉)&5ch?fzaڷ#h rVRpD\ҙ,ɩp}/R,Lu4eפ1c`lvh	OjoZ\,+C!ݙcKf"s{+Ӽr2GٙR|*߁j`u|AœejS%+5%x]
<ɑ͉'>_Ůª|ӏFHe\ F2%4H6Su~:k碘a2jْnN;Jbko7gRG{BO?m]3̰16QE],Բ>ǗAʰhRxPO ܈a6CaJrGo^m,y7
%aQ:fa>?ܙ{3qGɧ"`4`&O@}Î4oe8o.<}sblUګAU*~&;ɳ@	zW|WMX~̳(^MrfjP…vo¸4o^ekӞGbغ.mY`㷱8ʾ֚s(ZaAkB3Q\L1΅"fӶ@!U	AUN-|'ݰ}Fθ|esH)`qeA]տWVrVPaҝsI>oS4{ꮡvvîqVJ9H-z>lw쎕(bC4lʎ_E1!z$MFd!1f{u&XzKOgP7Tә(.b <Tk\oUiB럖	d^eY4==Id{&Cy]}XUGt>^\9Jp32h߽437aeWwzTs՚}!l{{Q8#E
\ =v躗DczMDF\ c`z#zquɫ!l.
ʂs:ڟ[+ÄǺra~0|f{86:D0Z_Orie[;&9篚ù(svF
/8uvsqN쒑.-窍&h6`Op2
'I!3p²dU<+sBf2Kڕ*VH)*܏E0sA.ZKAUw:Q@2MnÊ5\S#I
T--v}]^YK]
e%H3O/f&Q	9*l~BM'w~|'",fqy8mЮ!U.:Q2HPmID;cɟɩg%囃ģͪl;,lQT3AO	t^7q,[ICS[(-M?ҨdߣU;r`x
lގ-ս	Bz4	^WGs.Bsrd2&a'(rqjtJB"ChBtxܣg!5|uop_i:g`oҨxaGǁC̍$!*3UZf;aM-nوAV[{r
M:^7̿Y&u	6xIfZXY^IfM9ls
\:WNߡg9-1U?(P(F!p`HU⭟('EZU,tx ›mgYųٜ˱X`{!hжW!Sny@(˅DGH-üRzi5ljf[?MhdY=QJ(g8J%Æ>G64w=g@!gnZO׿Ix\~E
!Kly|h^$з^&攈 ^n\v]^ɵFqQc;
Bx[&Ht҈e_W2>UQ
sp\'ne|5CzI=h^
%9nɄhy;eJ048,Weåpb)zUX>p@2YŶm]]D
琫'mCa֓xE
C'nY%5[b^	?C-)U:^aH?sb

 _pC{z`؟,Y֛B	ˑJy~yYf/ზU&9wOiZRc3":k%0ow)65۷|T)YcV-NŹ EاN'ŭVVNG`FJ~ɴўvԈ,TBHA,їĒkl}Azj
;$0J{O޹{Rg5D⛒oͅO
'n&Ch{3y^
TtK'C\AO`ȵ`Bn832IjiNA
v5Àmtpqhݦ f?j7kalVYjQ:v^M)id&}ZZ"i[@if4)ɪoji5Ʋglʽm_."XU0ѝb/D
?*h7Yd_&*3&ToX	Ja~2!`q2d,%.ȓ˸28{^*NCjtC[8
,</a"lZ-V7%78
j-Q1K+Wy0%oDqV3w⁜o/*՞/,zcΉ,
J
VCa%i}G說9N+=1e6FOӳbY|e'!+	~#T781~]h%%la5K-\eeEeiӰ,F}>C[ "A~6bIحr./\ol?Ų;Lo$=Ya-LVSN"gI+Dr0)وEVc7['1;sU&Uم)kFH,Bn|Aei$.=&opCF
寥FE|53gOnd3n}o":JHz!}KUMh+zqPø>T~B}}7_~nJAXy9t0|W9kˡEn~~>ى9ىjfuwK(y\eqޓ7HGn^;SLjF?sr
K
Mx㎑F¾ΣWma+WvG($ ϧhO#X
6Jə;L2
-_}W'QBoڨ:$֑.9{a{n	e:pai;1GAXB%>!Ȣ_iE";tZȑm=0)=]G0k"i!*f_ͭCB9Fcfҡd;DܔF7`h;-w[a95gS[RqVh\[nRR\.<@yK/B2`#&C.MkBLk6hiAYRLqF]<9M߽DƜzemȭJea`y(PpO@iwK]!p\y4,rCBrhQJ'?!N^4o./gӯk0fJ(
1~u]ln)SIMDr	v=\=|uC[bm˛r@s#MQo6?X0+_C̲GT0V	M%&&4EYp$g۹\q$fL~Ǎs{WP^Ex4々z;Lˊ[A
-:W\#Qp5.^5Yiykul;\I
Ѡ"Fz%֣'.)1u*cah8C|SGïM(#ߨ>78COh
V.A^`
-YoT,Raz͌FT|V^DXsjזgB$_f9b8+sߪ!so}"8 NSjCfY!`xg֩ۛVM:!hLfڝc-^BQTGe֤#Bԟõ9!=$v|YB6'S)7߉)	T*'v~,Ӛ(AʠQJኊ,-~zNx8
KXѦ3X?ӪW7В죹9[va)Ll6Y\͠wyWgVx5WYy 9ma9/z L#H]{2_biv9A-1!m$fWk#cB_8?|~]k&
@cgA&oF*[1~%OPv"y`YsU1ȱXOA.ӞS7'ZogTtڭLpjP@I(JdP=2Un$HKOA#wQ/M^c~QC=X\j?{Kd
(`;4I&A*+Hc
1VX,7f&)af3nMb(`9ٌFJF非Ljf8N+-|tkC
]}U᷐X@5qw	D20yl6jP$}_Ecյj`<9^ځMZ!qH|Pf~dv/ZVpʱ]PQ;TPh8nXm
"O9:JtZi^GL|&gͣU3uOi
o4us42G3C:֏[R$O|KټNo=\RejINx
+oƴ 5[w!+M=+}UmJ;~Hj8aSA!Y>`Vifi13MU[VM^j &	>peQ	D}M0DhBfj_)Q}M"`[D[7u4p%mЮr OjuNpAnW귩04:x\	c/YV7mh7;-Ԉw?)~ԽJco,%FLxU(eӊEZ6CR$Z<`բ{]0$L+C	^L>Qߥ
PYׇ$97Kpg
H.mhܬNBN@nQ`0.?7>ϳ\2.KP
V+QW
ן蓦1PJvpj2%t_]裴OMtxQj'	w/}ʡ6Jh1rĴ>5e?8=FδR0*%eӽeed3G)VچD:g!c]ZF}֭dZˁAa~9p;+ՈG׳|L[CU͖uiKA!Zn>3l>"b>8Sү62czj;^yt"ϩ8(#ӻlqj뚅E|Q@N	ήO!6dCTAg05ƼH4fYpx0 si	aM
B݉Oq7.[:y o{:~9u}&B@yOa7!nmUl\l\3ZW}ʙDhc\g۬wZQ6af;5o5I'
8#/Q~Lby):2FBİϝYQjfwErU _'}QOMK2;y$-
Qzm XQ[Yh3z$GB޵/N'
=n3-fM)ϥ9o#*H"!F"/$#|GN:G])_wnpd/ɭ$zDQ)Y	70ao:S3<	D_ޖ@yl;NɟpC)oi[ZgV%E"//^^T0E=i5L/f!(K{]&Vd!aR?zcEioeʚ5֖*d;fNdenRM/6$|Ŀ$rJo
LKH_y,*zS4j˨-gYMx3		%u=!iz`Cx|cA/]U'r`LK0XͨFf^WnfeQh*7ʆϥͳlo%ѴLlj³m"pEgJN	{L}K&H1Tۤ6yYώUZz0=".:Ƭڮ\6iRuy4O1a?oيmH`u3wϷ9gjXx$|5vooaD$.48D=0;˿~ZOq(fz݌{kv,"(kNL[lAoGgF#T֜:8@n1
@Xq^V05McTT@A*@䛐
D](?*tH-a܆T1^?7X˗8#&[d]ԬGL9@׋lPN&;sKHna-k~z206^,Z*֫z(\iQ_i
@&Yb3KPf7Ès9ȫEλ6YR-K?B(irԣZnHy;!V9YZD_mQP$c^.H0ls;|ln?P8r2K#/I~TJ 2,
ѕz>xHbW(;#T(^d93K4s;].9r7iviF#"qi
ƥi>DpDFTբbnm+حdo˜PZYݺ̤Xe5qC)Z<)`QenF_.:{V8HxߜXx vC<ߔ(LwwJS1l|'c;mWf1
j&mWj%mWJs:|&ˣNZi/PV1$*|RxC1lw*jT 7}]ں-ke8jaUny.8VSYr/>f-A_+LGk
zFt<	ѯvd]"۬B:M\z*Lb|͕
(7]舳BXDXr
2oŇIy 7_̆
؇Ǽą6^	\i}z*(S(kq3>$);?qH1

[
ՔϺ6NkPGT)_BIfLt
86uc6WZ"cn\0	i4S,"*#y/q}KRw<5a{{کf@8lXߴJ}x=Faͪ
nϩ}E;0'B:([X:O/rd۶H7҅jF:j({u/kF88PۻGd	!@gV7JTQ.gCs'sDR&R
1$+h

2>S9Y1&7Qn9uS:mz^^7Qa43l
R;CngR+=hRiaq驞E&U5sDy.mIJF"’/t,1W/*Zco
WNlO7o/ؠCv;i1V]?@(<5-y21^C!A,Sj1#=wfWi@bPSa2g4w]ܪPWKYaB@fݓtZ[tOJx-f!:9zԙ9w}QX5\ew:HcdTZub˘MuGtLQb:_4k8^̂4weAwqmkޠ<;GFTS9T*
5(5k"LWUQ/}iB֥HvgE>9㮂S@a5~B_he,.Ȇa偪w&34(VQ#rzpNm>܈5EM=F?۾GyXse)g&J4&Cw͈'cR_Սd&ۈbAΗpkb#~g[m%Z7PDpU#o=n^taՔeW+
j_m˜4Ƃ|HPWN?ɫϱQMЍ;hbwdr>ΊKSbcQb8V$R\*s8$#.4%sW֊+pa1H=}R9DM&zU녘RB}Ϝ%6;"{޽
KL(neh0C*S!J*8ODs	Ɇ:1g`7]o;mQ*	JqdIw:pV99m;\ԱEefJpuq-&/p&n~p7lfηt<|d
1(ͼHT
'c@!^ُBY%Y"`q
4og7I?(O4nnz |nf6t: Cs>,wyyOV XfaLBx PVsO763l75_ɹIFW(EqpNɿLHzN|~q%u\.y@kɞ
IJ~{շW[eɻS-qFљvR*sX-s]az"SayѓNZ7{zlh,AmທN~/
-jCؒ_~..LZ=	CUe y̎!'M,jzDz'96VviiFO'Lz:ң,Ǡ޲U3&H}xFiyĥħΦ
ȣ32"UVȧ9t+ÙRǷ0FcTk3++bɧ=1^N)I
QXpTipGrY#'JlS@M\4b^J>Ys&vaEeÉfW8-KuN|q>niy>p"sάFB|
kV/٧Sم7"JX.ꭉcH.a[3%UNP>BWˇ&=mJ-y}#>q[ytFK>e2ڀi]%$9`(}١$S$f	#%69{Qj
$-xw==N\T/|eFAxÔ騞ˑ0r]ޒZКe }q[j1ڝ\#Dh.Zp_'8|xv6w!:@I.m8aMdoSeF$?(vwjxhȽ9c)CYYt6`˿take
^@۷|R
'L>9YP7
ui꨽\;,Cd$UL#v\d5VGasq$54KOiTOtafxGE?nS&;6
ze '=LFIfPP,/@T(9Vea[M;qazMPlQ(4J{0}}flSIO'Tcx`UchWSNzdvc=ƯyH{! DT`]U/ЪjA`;~/l+%guiiԩ[D$Dx,<0%N<Ȃ&
̖:F"lBlf
6lHf7o_,?.Ɍ5UsErQDlηrVrSȷ)*}x~_im7h9zFC)JD_ͨ │-E"S/u^,0|:dZz|"4u ~c* ν6,iC!|tbA :A]C"$/JreY')-2y`>IIKʎ{끦vdE[wd&rK* /A4S\3q	Q9h,:h@jV^YΡOܟRRjϸ>m>!ν#ZdVož
7%fDu0d˩)&vʥ5Qz2HB'~:;*vi1JJM﹖r;&K[ۂ+*oݚyPOxJ30OB۸
fh[Ow-N'^/!z:pqd0ce4AR"voGM-O!=X\erGvԌL+,J	s@~kgNl}t7mLM$֐I9W>lKBtl̓D%IAYW/r!p6@giԫ(Z!Uџ7˧JAAW/jʎ$?(zΐb#єk\O_ѩX/B	H
4:z!DΠgp6u8MV9w4e6tq}ـ0dsBҎLpPـ#gxt&ܩ6'`b]P ߑuOݛ_1΋D1{|P0!.wGgSz|~t1݂m]bKذP9JNNe?!X̵-wxIs^&v3BM0 3aqhY9U1r5RLGGL*?OdB[):]F}C^J_{?`8`3!lQ3ˠ컴N;02[J.Z9CLEhX߀(Js@d)#AG$HϾҶ2}~ZV.
Ydbpr=(&e'bq>Pk,*~} yBeCHJ?GHNOF-w.޲hB
q0Ⱦũ7R)9n-xrg߻"~f<&FK9~|	fMCֆyxHwGk)2L9Q:Ō
ye64[A}7C6m~k+ʖrtyy,-1µmۧ%BKeUֳLh?5\Й<%gu,r'
0PLmjec{wGn>F)Z8@!rV'L5%=,b{J'<1>Tɷ<f
vǡr0>$8!|c=wQ4`Hp^VP8ɉ~),LIab5j-
2,\lK*Yϳ
&c
̂Y~_;QX0Nͳ%ʿ'}D9ױwiI"5$~\Zb4q0<(T+dzؿR7zm:ihɗVR+[
$kޞNWM$lDV! 
Gq >q,1}33bnN4Kipl/L٬L'tCA.XsZE)fEϺ/#}8XSbjz"~%$C-{㙛!6s
cHw:܋6:VF9,Qߗ,Igp
$t`Ts_Jm%TW󒝆DZdFeOM3b7-{.-"ǖRI|X;~u2KDխ!GN4PK,(10gr{R~͐T֋O(y+/̌S~IMf<$۶=Ĥd(-[L袖N^F/->ӧhF%*y=LB03g~
{${)W΂2&0fRɜʝzf۪5#8*AWψ
nD(v=n.0sOwqJc)ݲ<4o`\R'&(SbTZq٧mw?]h#Nt,›K2Sj*wpZkWO*>Sď;eᖋ]ǔQl+S;X9Khޅ|ej)gal~6A(r/2[LCZ1E>ܭxX]an,7T_;+lfs3fghv)
2
>I{)6!:_øxIuilBTu
b+?=~UGdR!%Hm=2]2jsnm.\fc{")`?wO
$3_t:j-%C27aZyZ5G[!FM~>7|(x+FJfnBQ{L:cY%6xnP$fĐ1ѕ
qv5lA0
v	5d1|UbD8Sv׎	^Q_p{V*CpJ,D?:Ĥ?b#?+6GDK{7dMS{.Ȇljw\Inyp4]2Sϫu>we]]4BhbQ3eH6iz6ö
ѵ\fbcZs)o4?Rrxe:ͷ]^'i$EX7HSRl5R|=jvڔ
.,&,ON%CLU\fą|
]qNGht1k	>t!A5JH:xu:ߌha+P'	Ɗ9稞ܸ4(EY	Jr]`qn(^]{>r!kwwBN= ړ`h6	D&Q٬˘$C6}ʆy+Lg[)'kPTwqF=>i;V
EA~Ѷ[gd$;2cT9{#5rV%x_0M-9-)厭)UHi?;}Șֺx0ڡgH%޼PƑX{KbWǐaxnR/oq64OCol8]:jddV"E6;e?åay#kKeS#9$Yo;]n?$Z12!vYx/
\Nbfe>ٟsGxZtSPSabSiC<0I>;~Mz<z?RJk7FaKW!qAq-H%YQ`u\vM5aߘ;L]7[ Ͳt̨rP>KUdxfQhX,6pNɵةOv4O8(q\=ź*F;d+pW8s@o
`.,b|jb}m=Hi^M*LnU)r<񧙏?_iI)z7gkhp_/ȱ;v34M[};_u05ƻwi:Z(%(~x43"4|{~
fܼ{h˻yj\Q:{c'/LOzC?9~D4s:e;	I/Qj6t圅V*)gp|q;!|
4\{e_f*m3yۀӛp2S|FW3!GV>!@ݓj)hUڢ5+'DsL2qj=!hcu.
DvL;w7ܟUَa//0"d-c-A+0HЪ#^Y=EHz:fnÔ$(k){z68
l2^sjgُ@"C?Йk S0ӦWby(JL@7@ߴU&h}&R̻œyY'#U
43Ø3$ѝCQnk*+,M #yd=mɪ=k8=VpiZOKiQN|뒌-ssN{	F/-=Q
Bf6ngiUV	CnkzQ_>1]e.=CHXK#Og'-e&Q2
ǑV^dJ EJ|V?u7	5e]ϝZة,W9
c
M0#Աp+yvDXpD\9/5`ܡ7TL£{2?pwkfxt}C
0MG2Sbf{K2[5%}Q'A2Vr
0(sgg.~8ErnڬV[o..Pep5L)\X;Trn
A^0ltGSn<@k׀|!LubIÙX/TکՐRYUT?6u`g),iߡ44&({Y6AV\$IUTDnP=nEJs(M\v>T*7t-
sokw7b-
8Jz@q)Ef	x">r_%r??eoZ@KZe}dD/P1{nm̗gk`#GO3Q}_yoiqy3܌K[L%h|R*j(
jex 5]%?CeOYCj{
Qz)uO 4
Sx:""\oϺ#99qKB9*x'A-
Ѳ=/xD/]hwzi{l{Qzd}$?S6lx%#s6@C3$[:gBv
Ds@!NCT`C\1. >uj_+U<,n]er,K sMI.tm_ü]
.\]vM0ay7NG~Dev|
HEiw;9"| 7-wɹ sYH>7|Ygk,A?xRz:1:%w[.HO2=1Y;<Llvy	Ǹ&9U5Lax8䇇ۇhXÔڋ/#aV.7UMacM7GXCJBf`(G|:lksWPBr0,ӘxɋGC6߆|Ű%`$TG&e]`QLВtoNuZPM[\!>Y …Aac<	MN
c|Y0	v]fb猳9g
ͧue4ZY~h67}ߨDjp`ԫv%|@dV#sFl1:wRĭ5:SѪJSFXZvYʩdFx6mH(FJZ 4GiASNg7{($kPBR|SdW+!"N~F
D{s0C \
VF}hgFnY\4H--"cPÐBIҞXBcc|X*Ӿ`pj0\Kx'}rj&q	WPJ_{GnxQc+ӓ>gT&z,Sej6QN:?[%S1ZjECG
-裮K],&~$	#CФjZ3a*mM!*"]jErNJB/fE3ysv!>/q3/\tngKwƤQaqqG-t%2*IK-ވB{H@q#aΙhBB%1|\C1L>:U|.|~ PMNMbV'>~00 {w^".#XM)(<M>ϫ`[z1,_q>2'2lk
"}8Bew\taߥ^P;hz`8f^iTڴn>YCILuf8ą0dO+oTHL^R)XC k]bQ?a{q:gV;z9Q
DpZ*SpԚZ[]>s9K7UzJ8o`\li=g+Sh(hf^G=Pz4
Ir6SN-:Yݓ}N%k	bs=OšgHuNm[9QYl|-xβFʪ"ZԶ!>Fo5!ad?aC{L+vu-qA@ܬW&+3Ӊ|d}K'y02R6n*Mle)}مOgWVJ*lNƚtv`Ȅ`j8>~3;p.w"rB`!Ǖ"X7HA1uL|#pe$pPM-(p;+SqB0C0svuQY1,nNb7/[mG<8;4`Ie4^JvG(2]x~!ٛt~6uw34+ɷG,8T?X Le'ŏYՆHi)a{lVLZHҳR5v.$%`&;[vuL,	G0SVh̙bc(]dƄ|!s5NjɎlBT.(vnveS-f)۲!'	7Å
y˙~gs镜hIqbyML<Б4t34%
Nۅhbp/C$3Ak:!tưiBN8MpL&7DT2鎨hP!k
h{ą:y{LkG  \j;9RY_df71R'ƨdpIdomL&5SQHt@Cӊ5mrjWPJdzF	_Fde1#.Ij1gq*Kݹ_
xM XބnvPX[ 50q=ĴQ"c9
hU[|Po/JG9
);pujɫ;^AdףV:b B:]l
D5423ݐTW"xYL
7ް>07GMv[fiW{TpKEjō5dۼcUPDK4j]"
-֊\2_Fq"]c8+)@iΈ]sUQ1B,RSCmr35P.ަ>ѷ490Z
c3nd
ଐG #J1׹m_E><њ00A|%O#^62It%w Е#Vr5=܌l
Á/8ySʌ+u:mFu[}C`6ٵ
_Ɵ;urRi<Y3Uh-['zVHaI康b;(rW}F	:v;fSF{.Na&u).R9=:Re&QݠXnEMѦ\s3i
*y )mZڽFUom0qx8kFN"iM7~XG2Oaֻ$N"?x]3he3K)NA	U])-E k-OO=DVv!GC(JdL5 d~{]:!(싇}P83&M	<e)X&S=۸cwe]ċo1,2
lC	hW.#0[xkc>
 ~*qc(>hRz'^D[PN?d_F=o6A:q3hA#'+` rH+imUH"&.Lt4Mx1x6y+/rm9|"6PY	qbrM]niIԭF:6½z'O|.gߊTauUGD.({jn*$}؞p3Y@dW]Eؤj`%TS^E^oF?t(#O	LQ?#`K1pw/^]~٥_T,9-ijVMwMk +tfeDwt՞.)oh۵vVfi]u]4E=R柊%$W1	
%`b<+|K#VM[ke2F#wrС֌W;˃QiV)^
>ox'TAXy놭|Ĉ21c(kC1XY츠BČ{ {I1c܁Jkj䱼KՑӚٕ֎ڻ_x@jD–oK?&c%XB !'g@(>b6X9=T)P:c`m{m=g?7!jZ>il.ժ-~)*ʏ*m.#@lM݊'vrfnh+y>(b}S5Iǐ4huGi,bU-}s֍
wdߍ'ePrC~NKxq5-H(U&bkEa:ۡD@	hIfϠƃUXYWwݟzEv[`/b$[@_EQ)"YVvL+]F{/UAHIVe?Re%a>Aa00\6@ŸGo &T0nԛ3+w/uCEo?Nn6)ٸnFY5	e87۹#o}oԜ++OsvJD+F7CC,ܼ5dQeo
ݖzVQo@k0tjK!k /ђ[pi!&~FCgp>;\.*8a̶P	䓅L֜z0UũW8o:܈<"RhJ	^_	Ɍu4~6W%JK&e>eCO9:oUKpRWU9f}b#DAn!9ܱ_T~eZEd׷jtc#N'"aLTA,U@tE9Agbdl㌟h#hU)	ReꞡU>ҍCsqDgHP5w9skMXC2y\N_Y/omgtN+n
{BYaE7GʹhBب\fB`@<ӀgJFvfab-{POp$k@Y*PLT'<񮨴mҔ!`Bj?O(]kGvs'Cbر
ɔɪiU.bp>[a+ 3W|!	
~?09@>?ƤD{s'Aq몾5Q񞎘S1I/L낚*秾OOvF't\_7JJ^>J{m"LIi
BTkԋeZB̯wD	0J=Dlbb)`qB=JV9{y1X)6S{DbuFr@~㺺Hn8PyTvl.U6i`BAI"La
@
!ꀷ,Iqk^ɘ쥟i`%9Ψ1[-s۶6bK2Oª?1i>ϝUhUڵSaW }
h6jSEUP.$BL;:Hr\Ts|"Yn)/r
HE\i+jCmINΓ@5qWKߐP<lfò%ՍFڢsk}c-#lҺjdT՛eEM3z#9m`0?բMU^s^@\wLR}/lͧIbp ==*
DΎ˝ŐS3qxd[$͏NZ{X=ӴLy$},x;>}`ІGP2oKS4e
2!>LeF-G
VeI5*HCR*_jj
Jxʮ!TqqN$(K*يe#x0%l"Ktz2xqc9T+754~Tvqq({Az*Ɇ| aR/	cˊ}Jk)vg\Cot沉.oXX$r-[Ώ-<"92kQÁ)-p],ZW
ҷƉfA5^uE%n{ko(Tl^@$#K
nǻSJ?1,[8Ֆ۔`)":6Fp>Ivo[kOdC׷93WpHݕ?qr;Q?]#ŊPr\8wsD'4/J`WfP<@G&di
@v8D j5'Vֽ^s8%oӾ{h-KhQț^K5c&-vxK1ʒf{3P
'bulWߘ=k#Nϸ8MpWPڙM(Q~Jw`B)ZT#475y#3C+߀>]xNegPs'?S@W9+\qہ;EvU:3xecfj W)WЇ#9
&eh]%߬!w@%*_^%LtqL96R
̭hX0Y|Y访`"?`dz9cj~*۞xn䥖r=`Dٍ
>,,B.)v]9~\ho@U|H- GU-c`<3x$O.8)bc5YXއ}]aꃨ#&2s×~aKU _
(%Vci# 9qk>iHi II#XLZж톉'b-vR,O5wL&rtɈPN˔3R_o^IySmZ0}~:Cq(􆱑|Qg^8ܒ-;.
Z ]9muqBv ce5I,蚈N7unA{*U_oxBBohhh@M*~ȆB_TRޒ[Yإ;lRڏH~؁GXZdbzI2`y}·{bfϐ@*D$5fڕ(($)bFq8~S|W\0%',eҡʦA!S=W[%yv7k,MtFo\ȧD@RyޗXgps`.g)OKqSFf$@eF΀;CM|9𤷈a2ɆC&.[WC4|Idz(AwW.æuߠiA^:2mi_:0jqPM2wK6O2sכG^ݞJ+Zp@3<<hD^F(wT8Yv>!a/p.O
ݫ.Ju;1]'
[(En`yvU^m5!N]l9=^^*,Jͧ OvbTc
D
1^ת	U#QT-A3MAVђFE/\-XFF8UdT=@ApdKAcVy=i9⧸{5%¸)FLj!g!s;}_
8"唂A(40k]y,J7(
jC5Ч,KȔ8rtVL4A=m?ގ/}(:fOdmW٨CTqcMQB
R)¼aJHu\<&,.$w}IkMxHZg>xܷ;e([E`X'?񐄚T`sNEcfr{׋;*$ėyLK]k.5$1~"kwȾ$FJ:5j2WnQXj6<6zȥy:&Zᣂq#'?)=ز6-yMlHWq-;µU0Y^=hB Jn:WHcJ@7jg@[pUZ>s2rORiڗS,T%о(Q4f@yx[5>D]hߟ{D:H1:HP6g>MISG@))'謫y5NܶU=1~^LӇut7*v}#>٫zw)~PhC"A _!T6oQBΰ-Iܣd~EVR>s	u@%;ex٪|H	GϮҁ*hYuS5MԿ>6&N$AHG6(Wֳ(A:RB<9MI97f~	S0nlpjNZ}!8[ets0uϭ3@m1Pݡ_ؕTĽ=^%+mr=:-oU7jm|)	!v[/hgmXC9212ЮG0KD$JA"
,i$O/gk7&4&-BXZ5}PoOeL֜Q(4ӣT_4{!e<)A3b&gk3$Z*z@bφT ?{Ose)`|$	i	`W(jԇ26euIuKv؟fލK93-#nwRPp<bk˴-
!ݾXh`}7*+oTzf4u]6U('hn/BUk{E哥>yx<'G=ckP}I?x[=|
Oðf9xPIDAS?	ƻ(`*+!4r{	&zmaFH-gw"[;)f9R>X֩ݴ6X`&F;HmHk^Z^h~V&;˸+`+8
7%R3\킲R}o*,=fR.FT6Q9?:a;ſ/d2O9DN9MAȘ~ńlr`PoWa83SMI"L2;	PFлl2߾sЉk[
qgܣ
=	vаOdŏ/Oʒ}lmA/IR2|cz~֢3Ϸg=ÇR-QZ'QUwjX5D@Hg.+cs`1%O94ltxw_QH?4Fok~+r;OaHCKh^q>&{Eb|OjI5Hv*9dG0]o*m;Eφn-'ٟh$,`șNqu?e5zɯ``df=rca^czS"ީDOS-X8pg%7BLGDbZQqCH&\xm.Wmw"D0.ϣW'əо|_pIn7LssbL"Fr15 ":moܭm?
9!~slŭHk8uѠg/OLu$iøheWl	]*>|dHI՛n뗍~s#cZ:|t{8sBl۴MA>(:?:q_,6p%Aixm }f"T|1+`?~.CQkL4}[A"G@Οȱ۪~H2vo
+b5/e}BHPXG	1ϗ<yU&xəVKC)ɚ;HxD/֖4	ֵBXF5j#2җqM3;2qn8*%Ca 63Sqhaϵ%u-ZynUw>\PU4`2:Ow
zWj‹d܅
l4ᓰ']Y!$[:ȶ
r\˪/kj+ 3"!]ssRE_hj"K_$#"l|Ti/\Sp=()uin"ܫ
IC7vnK`{4O^úV`uj)$ e8#:^Us#Nk+y}2GBltQoQ^xUͮj<>@?ƪ;E&ջX`)1#.I?;svxhZ縷yZlX!,usj-ޔܝqF*jT)m#ZWlkȢ=\TBXwv)Wۡv!i<}~M_/v|V4A6{v @jf5-~Wz']]0l[:BhIWű:_4cZ!8VjJylz:IJ&?_ɶX_72bZr##s{6rcч7la[+͕ju9['+6#G}6WVdw`mbբC:g]riJOJGy<'Nvy<ӎV_SFg%2b;4rSRhg]	V	M]d䌭I'M԰#Kpf0.2VXtRRz&ڿEuaS&p)"Fp(avh-
tzj0	JputqXPʔ
\A;nromЙgVf}]3~Ky=ZD=i!vU
ڶS5Cis~M`X̧.7
[L ܳ+C "]GN^`Gm+g&5n5N}Lro+2d:Pi:"PWPVW6-o暺'ew[ݝa,@z"Mx];r+K7ͱ5ْF{@Km7eGgW^^{
λ!`?gf;?;:ǝjݬ)XM"p(eiE9 y?"lEѣDybB
]O#
u/C68V
48	[*zB3"ylbW(*VTĐ|4`(y^>4s5z8Jm#fCg;9&%Q;C-vppOK2(SX7a
P/>WR1V'׬>AOgS zO}[8g+_	Nf;T:̹V1I]u1efS?#_`NVX9ykq|*LMdc	[ŖVUx^>fZŃX~r>.[5wu0V%y:Zc{uw~$23o$J|nCnh#Hz|	tdnCgP,crA})90V}ٚkʉ5͹#r^>.N3Lƿuh*R%oJYdUA3rEҍ9a4ͬM"r/co:/[:YpLq_8LA+	.3eE|{!3?;N%]IzU/k[$zZB[-fW4tW
fhk}npS{=<?L:U8#4j愳tsBѹQ/NT!	Ѭ7~485坳{~4FQrȝjE}CHjN0(,d*`ok9Q`7M&2ԀAxԅ}jwyʊB鿴.Vݧ5E83ٯ݈
?` $fweҕH?!xϝtܗ5@?OǓV0k[PC$F+NL*{m0 V#c0CuH|AhVfDO:)+#5aC'~j$RϞϣCJ!M&f	"(*?ێn2@՛6῟ݒL&$+I2S+
}؍	ŰxJYv=_D
^jt.z9Hp"5ͫYW?֘OCZnJ󴼍=*}tH!#)g lCOA*9qۙ	>9pjowQ|\E^[lۿb;d7Z;	cu!S6C'-js^D>m${
V2)JghsD5zY)ЭpEWI*KXή#~ĘizH,~#q7i#A-"XCbCktm~D(%B
>Xq[!ki7~L|By{
!-\"u62jCee*?O;ݪ$dA
Qjq[
<*_׫NrY*qS0*N:	%`Յ$iL6BK_s>P50>ɴ6e(\2j^S	"caG;272|^PݼL^,5
^ö՞~㜏	'1wRϖ(-.p_ ezGYWSM=nCy:ٯ[3fkba ϰ[[twm/_XD<p=f#Фr1N-@7Vk_;#r
<ײ\KllA&˳78kJ/Md^`;FY1)sdYC$,yx7	/~&a$A-BX]dȣqg~'qMgESκӟG	}ݠm|:)3gXaoѷ\ziq>3EAiN!=\>F'6&L4aT=j7(4AEf2H]D6ZԶ|hyc|BjgX&NE&h
m']i
h# 3[
[d8
y\|RDsC<8ى",Z_.J 
/7"r~0_vweGi>[]LVoƯ}:I߃]d0nXñ6
2eR":"/1!~|H4PƺPWN5T9j7!l0c
[ev5oo16FSء??F_T}񡴱gDg1¢!"lHIM1r
QL3r-
"~Qߣ]7q_sעT>o"Zca3cJaısHL#ij^."[oCGϑzdx3HrzE7I"٢I')ͷVw|>I~1taО[Ʊݷ	KM]{!V6`Bad=;/vQti`n,cU¨p
u4|~Ƃ]ޙ/‰#&t]懘Fn.cij
|EJ:bboqRT%Ehcs:skW75u-&'͏V3HKSWi?vgN~c
kW/YoQM-ڭgt~.uLPĨȘ(>E,r[33
ҋ~Vi9-\vtODMItMxQၚe+C!N*7Ԝ.5L'>l;Y	S2wFX?{G;ͻD;9PHJ Ŕ;؊bxTngĵlƗdSW&axdhD_9(fqu@7A;ˣq6ZUiu˝41;on*N#@iډRd!	RR9U4雪{[ߙWdLhq7vVz24d`HN=9}ͳD|wQ=Ky%f7ʰc6?Xju%t>͎_M!
!I+u:Sam̌|jLzmLjB]UADl qޔ\O}[30zs-J-u`9Lz>i.&DfQG!mAqbMMsqpf9	fW^IKD^뫾یIq"-D5}`eYC8t:Β_f"Zϗ'T/1|Pn#@?sqJ;C3߅Y`_VӱڀmO@tʤdRmWTntϥY+ꙧn+FCl{}(k%QobnwK8JʍHL{Rd`56uc"U(Vo,ǪA%]V
nէ!]	R`5
OBwN\hx,jJnoNԐ&NwE][<:_tT1		TlfhU?8ez`5\^em8E)Bm;BgIJ5U:	T|dx"Zp

umfl+ܓejjNShc$<^o<)ew90ơa2.ȺJuHs[yQ̘SdmL4G@CK|('2P9526~|tk33>J
t	1@βpFqބ[M<%R8tԂxxKM~B']琭XxuV5"♭XuabPY<
Q~GBKx5&Y{\| N>n2-wm^FZn
7>.e/1llUˁPR8%q@!]90
6vTC9a*4۞X݌F|԰@eIJcr*وp]XU,NYBwNew$fDTH}q#e~Dt05cǖ;eYSU(ˤ9rWm۾ڢ0嗦>RxQgG\\m	mRtwceO6//!ܨ`Ҙ}]"*XxLaFUR;i.-K
en}@(Zcz̜tXb_|ыHcX
.^{#"uF\kB݁XYMZ0ړm>-G\ķ˾5v~%~O(yd9G.XmzPW3	>J^ȱ]vv}BVcfP@=uGZ6n;i}$+p
4bɹdH##47^;l2U,mP`W|µp8pMUܰTWհqO;縁׊ؽ!ѫ3+q#]Hn y4^~i|FA3k6r]_JO9	"wۅ܊}hLjo\O0|=.P3{Dfbuறxvi§eO	W-4mlI$dg`*n0IH\r)$p.P3K#ؑh+SѯEKב|J&~ۑrA0ͅޯ$7_R1AO94_`X=<%˄Zѱ
_:ёddnl5	K|6>0\w;n",ڑ=+\iSTt*dqf )k[l5]g-j3+ps(g+
kP66;vsВcP+1N!YKt t=]s
`tXE̢hQ'm*,9qggődoNbq}
+;iÖB=|(j,aVzKr%K55I;;az=ޖdJFpPua8xB.1|ʌ՗3C4K0W\$1P;kr<Yl+@[>¼F3#~vo~TzSL%ޓ*#cޛl*@ePq#9
sИmz,m*VQ/3smttBK*Ejy@e Ѹ0hӚ:ׄq5R#̺'rKpҶ65!Cr8\kh?aeNJ.t>8HIޠcXTv@7<ʡYF!R5%C_J)!Csy
5b#b*Q&$Cr'Ȏܞ%@Oxo:7q'86
!%ߑ;L3yXq|34(DY_8693\I_=UcW?XNBцo~Ac].gk0ŀ7+×@$#ˤ6'l|)N5
k71E_k|bn~6
S$&i61H0^ds&"c<'!&Vڥ*5
':}D?Pq(>c9s"O#8	rޥslQnȸe8{hq,-$%a;tg2-炪l6vi^ԂɣJkEo)+ 䣯NUH'[{D*D_CSԋ:EdbsIPo%UvPOOJި~
"oq~[}LvKOߨçeܙ/^qل"b3F٩\@ԯճ<wi:,+=Y۞ꇫxJ	[ssQ	_&B4ǚ7sL+,BQ<>>EQ	k X'k>@'
	H\|"mJMSq&=u÷G**Bڤ5)frB4R
dD6vWF;onX'4BqL46yWoiƶˇVi)OW\_Je+g!͘J^󌅳y=;h	ޥUT"C
󳴦,̚F{v=}|`or_G
d_	1d\yz9Ę}7;i$%Ӭ+?,lH(y'|mҤe|mEMu0k
uI:.Lhi)*SO/ޛ۟U\`UWZ "Q˭TV5fz>3	׎e~w3ܾg{6ԴͫҥQ96x
>~:By[@WlC|
LGhB.l(lAA8

7Ztswb2N?jZ.T0B'sy?2 i)	O:j	51>lCx23HĨöRAFm?,S@Mܦ_et
"+0<"R6SL-M,7GsZ8bv[VP@x
}?יo8BjZV%yٹ}XXY
WҌ6ۇllIu$XSݺ$l~a+)YrL9\uXp3o%#M#H/S-q	v)`Q(@qHb_p~,tcըy-Us(!կᒰ8ܻP -T4SVnrt6݁WŴ5LSa̾sy:A_BI>V !:|]&L^ĵOF4$?:Ey4tB%ۍ*loq|Em=ڙQHfq:n)Vۣ.Qbad0Td]MLZh/!DN'7(JwX]nћqAع5f')	 X$(ynyzEE>GU%w2oyA׺Ϟ+	N:UZ&:#\M/tGίI?&^uVis^7kMYwbj/Dx4!&;	FЌyr\8
W]UrhAytq?XM|t
cҷsOa0uᅫƉA8TS/_zOؾ5G~X<&,èp_\ ̆Yz
)U/;`cP3B28vǼ{xn%?ʑr#%&hszl]+FY[/H_!I5VKR~?90|=Hι9@מf~9Ijo77GQTm{h#{F"pFԔb6k.meڋaA/}0)99271-8=PY3ǎʱ듑e051*?k+0Bq17Q^KJID:3s2u4L
hZoVH&պC6/f~yU(6Ḿ_$W⶘GA
(X63!>JinOm9tHIwDf+D!<r%>ᾒsɶ<+I^TR\T69ox-&GGU]N[uK#~w3{*w̍<)k~[Ņ?ID E .L]Y-<ao|@l)$QW=^B-G2]KRED1pla6%Ȼ+LQxo'ٿk`3Gw0Ә瘄I4}Kwy>n1Y;PR/2Z1e/i\ kM]'aZ.yfV @-Q472nyp5Àm'P;f%1./]]>h6 ]b%gA^	lN&*⽮ⷐwR`HQ)pP86A\)S]Kx_כ\vW,);{1c1(
wvom pLZ,"i{dT0>usX<a:r#}]ޯ&z1x_NyݙK)#;Wm|/#_iaK\irI$6v3`Cb5;Pֲ]F=BP$~_{IϗO`$EE^\7lgL|o1j łc|œu8a7Ea{5wlR|=r;ƂibCZ\ݦPiQ›`93A'ቸ׏\&`OoA"7BCP:uqg`a3tO)=/Qsħ|P]M%9+:P%,@m݋ǒ1>@Ba-1b
U0	P$oFUIH@1VeԦ0nL"Ш4JgN5C>\1:YH5SFoZF(|9'= nAFj0$(yŹi
)$//.y,Di&|fbScWI3`
=tBEHYQ*ombV5RKvwQpc쿮}VnoHGCk~T0|#"m]!#=zM| w"v;~I>}l2&EPzOfIeܶf6W޿OEfCֺkou%'u;
*9KD?c!Fz
%3	C'A䀒3݆70=grAizV\cޕA\<1)f'8_
K>u+
Yr)=Ur9ՊbVt-UI-G/Oo&)LHy^WS&J݌GjظI^ﰁ'k}"|{oHT}XJ]ɈtEq n`(&Y˘CLzm:EG7^;	8z5f({4]inm972	C_=~P&
Fjn[U)|BE'
"\k¨V5\aC8W5^.Yh4*P8bf~9vPsDNAj>cC>W3ۿ3u
6WC.aݐ׹16Z6d ,9yMt%RO?MEW,<:,hgW;bo$8Sq(4hIHi'9aGDQ.lHemOV=,!͒\٧xS}/4Tc^a{0Zc;n7hcxɭ1ٚ뾈SrGKp-ggR,ЙjI]6 Le~[qlko`%'
^KZx0U
Rl//\\ǘ0R;y9J*W
c	>joqdt6*	ur
r({c4_B7R2TTzPj05Aʴv#,i2/eAPw]	;Ę)mc,0< `7K"$)6a2fR*>@4Cpe޵k0+).-cX.Фɕer;Ui$yQ-(IYg%erBTI8ɫҿM1N29O/Tw
jgMA T
(-.Տt8*&w=#`W2#Hn\Y⁩/:P2
M3Ot0Wa6B2%]?Պ⫖
	c(bt6]^JYS,6/QK۶XmZ>iKkZ-lcSS¿FH-j	)Qʨ곡se%Ñ_kerz[3LY5F7?w-RSP)9($Y\|!?E"r6SN_tDp	N
c1v)؝c{;T>xt*/	cn2
{DG;qo, ox4FbEK˘gh3㌺9&jaG`9VVkZUǦ
b\Gxx vדg)	qfֵ7
8L@e/a4,VicTXCRZ՟/
9m
r.=	g&փm\HQ`䑂p72t`H(V݈y1kR0
Js'Qv	.=n]ơhЍR޹}ye Cnf>
7-_&I]^X/,9lNo>:+'Fȅ"CXANBTє$G}TCd Ɛxw,:rlXUh\?CAd;Vݰe6ˀf}Wc)"}1	K3$cv90Kv+&xO_'!Gs-['x+.YQ?>P&ȁ1^ÈD{(\r^

`*TtoEk;߉V):% @	yLj$DoebD1U1ptX Or>G<+o"ihHH2|ՙ8JFƙ/>GdA` i{v/cFS,0=f<_v(_ĮKp%1)^(5O)R%~s68BHt=ެĨ.(IEҦtepñHxȧd.l{5ʹޖPeGb'#=in*~y Ǔ7mQwv^Sklˏ]nt}E]&I5>4T,_B+֞&,ĤSm_DVc%	X8si&ŕw޿lA&x4[.ub:'[qeEwQtDɅYB}o^uڶEzN--_>r$:T oT~A[RoJ-D[£)52.XC66c`En֧D])Z评:hfUs\*tKK&I/f~Y> u[D`::# H>DX"R ~s|'xUK!*My>GEFY(:o"2v2Ix\
]GY<\9{(C^Ay0Eg=}r]dMaU_4hdU
N[mB\WngTɭ*;(DsTDgGVN,~9"Ω0\x)]ј
BPh7XX5EdE!ქ>!Dy+2!|BDGŽVtjVAkO>qlu12\5("ӫSr6l	NBV|P-4w8SɎ|A~Bԛ%~Լ0kw5|a^צeEgp4=e<8z@HtKt[a1!+FD7UumV/h/93o
rIعڷݎhOU4_Rl='S[:hn3$(x*c>lwuH6ץoܚa$EJ[=Yf]c{+HSjGur)fWF@kwiM84MɷN@˝D7 V3<4x?JK2:s -oAXˊh#J哼ӆ='	Nl^FXs¹Y*B?`%7{QLA:N-~0{Ǩ?ȭЫqZ:Սj.KPN\9?,zy]Xt,$ҿX]2M1MU3"UWK{gEPtZ1G]iGBf$&y aGp(PQ ?sǥ,tv_\U)hxz=\Q\aqa2x8Wp]}+0WP]aфZbKu36jQ
iL"zVǝI;DrEx\;
ޣ-N)k	
`iR	$ŠRk5أa +|Y/mZY9!U

	4ڝi'-WȬ]~7R!aS$ïQՑ C܄YIh12C)b"k޶j#ϣ:"45DOFv~YYVҕ;14'DL/v&8.?>%@giU.pgNsVoTpB3u^ddneaܕ*gj+P4Sbw=қ
9S^Al3T]qjj{skk˰%Ǻ~ǏŌBA|wз.R%pzbE#u(:W$pI ukόE6fAe.[F>JxB֒Qv,i,ɡJB./$TS 
5ciAiQy`Y7PPh7";pY.4*T$π}.رֳH1<ЯUdB(6S\n%f7hƑ~,W#tI_DX谞-?%"0o7.JK\۰ic7B֭s[qu:*U2s88՚1.Z!AH},T(u@u[\$gb~4FO@E9r.:7'SG'hIߑLK%hacڥqא҃(y?YTؖj%3J$s_aDVq|MU5I޻֍qyJ%ʣpZ#4ζ!e7BX	"K]d)$цY*ߒDyxw_M	6#T
Wqdl$xB/ɂa ؃n/_H51$0?:wR4͹Gһ#;d.d`ޕꡯ[Ieuqo
-H1
(3#	_p6]1؊p2j4(2}iN埪v=GX 6ֱ.yWcg(_Nz%`^vh+ܟ*{ylZ?2qOPn'
1rYhy@ҝײ?2=j
e{*=IHlJaKyST'QUR]eY*NbkHĹ9=IƗb݈q7/o@&kdAШ}ǔ5SyUio2mSqv)oFs^RGW'9sgUD*cFwGq:٪Y"#l!&jI\xA-3ĎO9RiY`[+ˆhw{>գL+]U)RWj`sN<<.ͅgyĂOKZ/:6HSa'IXJaUf!oljG~=B v=`$Rŗpj"=liE)\6q.+;/GrQ30»Blѿ^UgR5[e5f`nxՊ+o8*ZlRQ \Pg)clR=YRɚ&ܝA 9>I*j~Iw|܄Q]Ձ_Dnت
]DU."0@-40hkaaܞ!
LA	t

7<5W]
!izĎV2^;4X8\۩oQQ&DtIp4ڪGXKw#bbҸ)"]uzvRa@8bqW3Ϸrz+PvO@`6z^>(=6Upf.pt5|ٛɾ^`lQ>>,0n|1j5;m#-VI{ml Di"OXѨ^=h:u#gI/.T9*aDֽk;7oɝ
5~Aj1e`؀/Xde:DgQA;-8ZNRT*eB
7jw㒲C$Egijonef+( Q^ dG&"-W61DI
ԙOGrVޛjq?ɧ~arQ+C`j;|r5r[fWggA^&?QL%8<~t/uδoLJMPwj}#!ō
[}Gk]]̱f	)YX[U`Q`
%QQ&="4+z&OnULEWBZ6<fΰje$)W i[nVAf5]dl!Cb`fE3ʤ4/Ѻ.Wh0}5Q|›&`>7)~dH+A4o$${i %**7wA|˧w*-"`h4sR|iY00Ft6"h#1@0#ˁJ,>Fg#-TS.[凉cݒR;*|p
CpӞcVSh6mXe7*NT{A~e1[7;^{ Kw["5.w4R̹XfI2V*X”R&}j>@_ټM$[yfz䬚x?:
`L
l?%`%SaFD7n"
NVW&19ܥuaXGnJ*A cvň͝UNŽ˔<pRn$`Rd:Ey
{Q'(j
|q-8;Zؠ,"yڇpOI%~t[oBYlz6_~H6QyO%)-6k@wDR7@c^Kxnh#{;$x0B&LRl6\0C9R\:J'@ôN!yכ(n_(['ǰz
x̋?V(L4iU!ϩ{ɈCd/-Q8%bxoct&&P]!o36i0kf^܍38!vB1S}"-[2̴5cuVrS]Lc%aZ0LRIټCG7Gq&;-Ơr²-">}^*!CS%ۻ,:e"ۈ1ΥĹiTHx~)p+һyK/CYv?k_0sta|vC(7gޘMi>!p:LAEcӷSIjgf%;+bM
W5+sOZu`Ɏ5R	bRE-Uߓh*&>1mbPʗyi+7-";/A?'}ZծzEFHL@p˘"!2p+D\f֛ᜋ#d$fi[w`h-K6SBݡe
v~8hGL~1!tf[csSzNKPA䵖KbXҨdcXG0)vk5?U%	VJڹA+w)_k
ZLxɆq"R_fo3_rvvHB0?'Ff>m1$j%>1U'aaKT^)tkߎHf܉h՝J02.w~ bdMJx2:ŦtA<,;\Wۏ8FĈzo);"q>ej(=uia98j"43_
Qnd+͠R-Ћ;bT>LU<,tgN2PzoMJm^nYrSL7jt=v0?Ȣ&
!nKQhőQ$ڛwhƱg^qdmkSka82ض‡h65Bra!-؛ce۱>=kƃC3MâGS6Sb(;P9r~›6>;#ZH6(RB J?Cz9rnQ\'o ?Rގ5h*	_F`pr)Ĥ	RnVO
绶ۃL3}x*B#eO"fIc]_0Cǚ:52nA}Č8B$ȢglV&şX}XL	DĦOtvk^=_4wH?^&_WIԹ s4N(0[X_lE{b)ͣuzlV84K6zF!0rBK2
F\)dĢ@YE6#=D
!>X-hN'mƺ>}4lZ!{Y2k7.P`89sJ|H5q4K1@Q]ǐ0^T!av\{tXONᛇJM֐_B1}57%'/o$YŀCrQ7;e){ i0.ObDEi.ܵ$D:kġVyq/qչXJrMk%הJF`2ewኬ<ݐf~hqB3D[4?e.nFP3X=CkG[^^{Td_  N #ɺa
csdCr!aVUTd5GԊR3m
֍OQ	]
pя.at魯=>t^$"R%l<2dZd)qKYqENswZCt5ndXNuveXɅ	P傞`ӿ^hߔveK#h02Fw0t+`ӻU:k$S%"9$5XxJa"'`ŞݼA…GV,G9Yc
Z2q"q1HnH~iZQ'Pa=	5U(fM؇wDi-@:4V );?I,2U]Q_}qKcz.T;W,)u贘ʤ8.E+4x`JV
G
a؆E(˼:?%e!u58
aXaȥ'd	w<2sE`GVY1_7]#Lm妷y?.B~H9P/ft{jH&nxx+HM
X'lc}qTGC[c^R'Џ}1QWnFK6>^nkQ[2rAU >*k5)h٩FI`1KzcGWVNV{2Tk0|̵ٛ@
e]`MR^Fsj
QlqFx+QB/|ĦFtWK{ֱ60@y)WS*Op&rK7@PaO1c}=p@ply>cKlqj+0F,$`6}eU+*_QkF'|,LQTBj65:WxԖU4"y`}у\,~a@|:|b$xwa['f0@}E?)5]n)`7f|˴/X`{T<~XEB4uq`N[=Ѹ	Lm6Ǵ:҃sڷ@[͍dt
V+E~|HQyjːOt{YrNK@
(i0D_TOt(B6nI*#Q*{s7Niz_8dw׹_@nۀ
wu1ajgCsU+PW\deBo̧ƜӠRD.F.Lo58z~%SH-C
ŸA?0[?_Sޝ)0AfIvA'Z!;:I9?JdzmVI;PPPќ%2]+[/&ڏp$dCص|l,[[3ZDЍ^ZY'5_&h?#U?-50pn?5છN#;DzweB0J.qŨ96|
9}Ѓѝ0F›1ͳ%MRS&0XrG35&]Lnk5
6حM[/QG|Zҙ4p"L =p^UI̚-J8D9nT;
~q#*ݓ{Jn=;xڼEXlmjIVK|Ax#a%nBf[~@j6'ph>g)~dW;&r4o.6
B!>i6E'دÞ9-76e YA.nH٭tagH	LVG#SjJS9^_GiV)g}k]pi=_i]6nJl<n5og稄0K9Cڄ)ҿƛGؤPf _[	'EqP?C/;^L;=$Sv z-Fg36]Xk^*CAɥy{b0G3S`MByDxG=d	ɒ;L.jÆԨ.wc<WVqW>};:cBRUT"dܹt1_(h691=|*V&4>zE}_0OP #ް"i)	Ff4@)~LbK\RmY l&3׺-
zYe4VU>nnGn>+w?§K!4y߻$e0ߚ.C`ۂ6dH:xC4+i3>)%ߚ+F2?xIA^ǂ݇̈mYgqbzc
+m;-FрơR=B"Thv5jNW5z/:lf6!iF}=*1$sWomSJ^ɻjpyi .,C1tz!LpȭkFIaISIYo3!JհMc- gk
%ٽ%eh7Avh}ۓjgЎ[Uq%QϿdBY(4Cs4H\PPZgq*;EWX6ko??AI<
{1cW$]N/衇Hm+iW Q~/Ϟ[ct4VMi@UwBj$nC`žo}b0ȩvAV4qVЃ{*89{R>W)ju{9JYg#VQM1И.54>ɖ;CG5?q,H߾>
6Os_K'Ɗ犨~Ƽ39uܹD?Va2%dp	.0=P賜
'Io2M)FfX#)oXߋcAHt/ᤅAuФGɺA7iM+D[M6RL]+OՁ)u*YֻYM$}c	}|+E"Wj]TBM/(͡XMveBU1	2,
7n̆i#
g0hD`0cЊU#Fsin2<:%Vnݿ@S-J*@qsj(Hle56)Y* #<]?kJYmRpV/&?eZK$kp1T[*hަɦ^(nl*&W2:i7.v+}eRY(TA'.
:^~Ջ
'*paN6Z'&#
Bӂ.&E_PPpP͋BAi=p`+mm_ 84)Ne5N=>Hx(,l0J`qܬn4,"/uRukiL~\RD7n-dKEIFKt_9JS SFC |j'ʘ/f9-
tEK
Kߨ*,AtX`wۜ'o:X_1K 2uڙD=s#YEPMj*L~jH!H&\X?aE9{H
1XN=Www@GXT0Ég '/9joKֺfop>U*"ahKU%6Ma^%ťrBc3BkW.+8iӊϽ ӌ]%:+C#^.o^"-nJ.+Hϝv-f|,?ŝvL[|U'=DF8)幭2EhO3OPl։d9*
(Y-܄1	u"ekqvvm2MdFKL|t;H~hQOrhhk1Cp-ia>;N/
A-Ӫӈ_$@$,E BeC뼜ul5IlZeS	B8$#v|NJ/UʼnFt;}e{u8ԋ3KW/fF+e&ClVmQ@7KP?7
}Woh1,8yTlӲ>Y^
+zUDtpr(7+xch!D2n񋥷GxXq%K3D,e79/4r~!`~r[

E`O7'gقך='$]`}ϣ.ms{!PAB'",lou-lb#wwo1oKtʏvDZHrLh{5ϼиHoOuX 9~"*ɳ-G;Q(cϩܗTffuQB)a$','}qߌ$t@ksNЖH-J5˔D}A=(T/Y$) =*kkVr vA~fInql'#K [J)`7{#_o;+l:\_@awBO#ɨ{QM:ۏaSos!pZt0\jgOGr)t?w~ւI{Y EMZ!ܘ-(ًL@o6C@\.ā6Fms6͎>Ĉj3|drNfyXKI͞r===p^\y:l3*glHy* 2V((@q)im9Sl6k3]Z&{c(|P:+Q}rx R'ʬI8dt_1=. >pPg8y f3Y(UɸMMl$u/x;1:!#T9!%Ĭ\;8?stYg6c.RRPA@ҵ(<-=K2D]?:c02v[&~| U77sP0f7ֻkrMSgbwdf8a!埤Sx @?n򓍠.7.;HJ^׊^42L.57R J^U[|U:kَ]p.Y0asQ/b*QxKg gwBҁ@$.:0-wB^SX)\%f0i'E<ƹa .7;fSeOaZLqׁiu~xֽ&檖HQG3MzXm{s;}0]5Lڨ]* iC-;+ ?NLky9l5:"Ҧzv!G(5\̛ګu9w.+JTsls&Mq(8ܳc@J{Qʸ}EչB:2nq^rMkI/(0uDI/U 2϶P{'UPX_P"C*(ƶq Ǯ+[D@*.( aL{J=.h ?h ~ɑ0uӬ iN!$UB9f ە(/xU?c}Y2SUbQ:ɰ%NYg2Wᮦ hxo^R!'U*B4ˀ(y X0%#h߫b:">& `Sˣ~ԖwTFrBqpC}p*u@ߢBep&Fxe=.|hw'3<{!.YO?>xs2"Mf$1㕡'߽e>-*Q0^ x/Y d6xkH\&"<8`-[2:2%qĸ8ާn+Yfݺ5ks){[fzk:Ū1EQQ'B3*c`)'U:`2kq;+,ZeNr0v &T7B+;Y%3]CB:bc^;\g-Dx&b hǕ"V?jݸs9x'5wIf%urNE58Yww.(S$tYf`s. X\ ZE:_2. )~abbo#3t(}ɂaC{S'ZY-CQyR2,C+TsAjڿ,zЀ:C7} R=b]9nt;"EͺLIy\ڢ Edi<qd+J"?n{ZGʜѽTTx"L ^-D=(L*W7Uj7ocdʜFn:[{J@+m &]?Q̇@lBp65+7vRz*VƎ Wd_+\o{ %v 1iz='[kS*9$ȕrLlhnftv;e]!nA lǑBJKn5yjfiq Q821dh}?9. He& Jf2I-6D)(uХtKه PVCmU#KD|WzrO2j=% 8cٴNw; y7ˀlq"hfB Yw:; }K[d $ d(x5Şf$PI&n+(-Rq/e#~5 J+e<J2N"@7T6X("( 7[wSvK"ϵ !u@40߿:@yI$Ft ,F%W!9A20>$%Ը!((T|Xa Yf>Z.#3M{i\JJK*PeȓÂ,"?] WI7$QSwvu8">)rvWIq/3nZ  alooN =lBJ+Ubڏ uwEnLi.I3, RY["@X{cML߬Xܦfl\uzd }m# c4s{/_$ \~];. gАbg?w+-}TTyVr>]5D\B=Pz/4 N26!؇e+X繭N->3$UtRZ` %,JvKӚӅJǕZèȆ_WH=(]C A.)֜cǜ^tzn`GH< *7󈶣E9 Zfʮs 5eWڳ]FCBI_C`HՎB)p'k:[;P4+p1p?ZJӵŮdz=}=zPpAǥ ŒFw=X 'b (rzg+jj^pH2<=d`lҰ)0W l(4eqdrl3< t#RN)mW``\8 V?f2&27|ţx9"OÂkôBMEű5rO $8~30Z'~܌Wث$Tg_>0[j̔ҙ)9$0Z*ܱq %Jʡ1H5oF#_kR4Ewv}2dҞ&3lKLL8hD^PL&7N& qrzмX";"5Wf_k\0 9pcmǏ)H(GQw8ew>'˻UFž$ة۩1#edi3WB + p5kjOܽM&fbO,T,K'^\xbRָt &{[sOYHMaտk gL٢GyKdaJG$d.v2ÊɏF*!`ƅ!7p*׈&$w>(H!{d;p5jMeSu%(ZdsGb-gDޝX {⹚6OOч<5MWpX6#ۂW-z!AJj,9fo5 Mvc4`Ac*2=_#8wfAՇ)OsFVB )TŒAi/c'e十B+|5tK=#hF^{(_FoSPK%<|ۂܙQD-%i'=H_qjZuXd.EGQ5·+>y+ \7e8h=Ƃ΂Iᵱ{z椅OYͧ8qwƌfw<үojn)9 U8`Y}>V4OlLG"RTKY l!y3yoW4BKNF " {F[,vu <`}unyzƻ`>s\eӑy #|gt<@JKGUby׈c*D4/Ft,g/4I*hGܗ{6`aLjlf])L yXɟ)q䀯q )с)a۴?RՍc[iQbC@0*N|+;̄}O$.DTd3  %z(, 쥦E9n,m(lpo`J&y}[_D{@tr՞;)]X#u˂t@%&zmf5[of,fhkߺiR2U!g^ڜὉ:}wAAN輶bE1XRRfGg)}\d8,Ğ ; rnџ4 `H'DSlZ(kK;%Jhܷq&tE.(_A'|Wne&2b577NÜwEsXNq-ISE\rY@ѩ# 6 {DS=ęJR5qm:PPkjҏDᰭDIb=`u,-hs=<"@m[/$k.Ji7$&:1,v^ӀeU; n}:WC\*B䜸mM62ãngL540V&U z_5g x!{` ^3կD6Eyc̆6E9ֽO۹q<@iնAbƥn{ɚÎC`< B N _ۊzM-LL7G4-Po8" fWZ< yqȞꌴB}"=*B= uMzˍqyK?|K9ѦRЇ`i~;>1Au)C]vh @n #VoW58zJ ;.$tijN+ќ36 +͇+Oq'0ycj_+)o%h˸^OfʁRb/KLX8&-]߶zr/~M]Uosڣlo{`+vIot+"Hӗ;Oҹ]- ){ :n6}|}8THG=O ]Fz-*phОS_ 56tDD&n)f Fv5E*لʐFX)vK";u$ä&t8YQ&#r[vkAD%#o q_'3Ԓ65@M9wxLuolݷ݆6`n'C$\b{:hZ3gXܼ>w BUsz]Drl/Rc2UpD;?-]xD*}<-?bFRﬡL+ptY |_S9 sнwMü[S|p|4bw-dЌk>XȣbB`_[Bp"f+z_J"ϩ9ZDGɰ'ܗb? Tـ~\GY#DV "g YlN5 f>ld] :dК, ]tth#R qW){uc49 &nv'Vb^!v> P"ið:=Esg` Le܃uQ@Ix\yٔGku7u‚p0Q-C\:Њhbn(Q@,(}1<|8\~\x(2NtoKnZ-,B5+0f9&HfK /.~M*}[N%_{@:#8>KQT}`s+%fƈ2!TX1_W*aG!Z0܇AADHDk4,*{d8H$EYI6YvzMG~#[Ÿ;ٛLxEQ~Ҽm+1UNFҧAdy=ހR.NS&40m LC ovAy`ǘeL&圆 7`$W;op' Ǯeg5hDɂA.'Qw5<t<|`&P7lɷ/$vv- B&G1(JͼR><~j<򻺵cc U;U\ ܿLvBc>-'o{.ھu(@0m2d?OTH zJzDB(Ro_ yVyKN=LPζ `̘2 ,n<V2ЧHٱЭ>u݌S{I>x5ˬc;> 'h~v+QU}ᘆY!alVpnmw!;HߜawIoj8,7J,D,l"xtmtޟvQ`)vqvOFa3+m\UH[cd^FVg8 1nЬ3!Mo('Q^@ZFC8XO:p{uʹAvyCi5q 0ACK¯fh^?4, + cRr?b:rZWv(VBqxFBF"<>NzQ-ÿ(JnQkEU`̛ &|@^}IzJ&S d/#m|'E(l.Up1sČ\Nٯ9X `k_OK7H[EOm{3XOn+nF#d@|ү˞_V.wo"#5ȇ@Tۓ5,\r_6~$۵2A8Q'f{yWP vDtegKsV;/)&{d_9/QP/׽cӭ9i]'S!hAHQZI؝ u:pr H ,Wvބ47ΩAy/fY~L*!AgPFPu|ʁo}d\- K95D>N#\%gh3䡲ApvjǍ?~]iW?&H5&|_U $z#|[x:vP|6fv &鯻_!қ{bolDj~gZ^mClerTfy\GovYXٻ}Z%؏;\ɽ,SzQνUO #fhI<rbhymF:҈)}D+FQGأSc \ rz.7)JnßЁm1"Q!O0a$ӉB'Y r9 >Ҫ.H#x-2BӿIG@ F]}]zRᮈ|A;.t):oB5ԩA̮tp'蝭sSbU'Ze F7FQ"lcay"R"߈+d&>e^=H7I}k|fgAPF8"Q\Y8N2[]Pc)`T݆ӕGt[I%*Tl-&̋ hŋlꜝ>4?$JqtJ)m7+ GpfiS+SZNpl?O6 =p4_rMTJM1MJNs3et];X|%GٶF:^Og\"A Rq O+>V"ĩJ`|FjU .@;/us)t7PuB #S{a@$kx2j4KX;X_;ۍh Ɇ ? rМƤz"- Kp& !LiQŌAtȀKk5cO>U;EUف8qc#RKI,e]m 9?9 lj*IYShxN[~XN"HCt㳥ע 3T#?AcM'-OqBFAO t_]ZZʡac.G{hLytQO5HMEQrIkM`0%Щ\A\~̲l&4S tY NPkg÷mSJYݟg* }'npic8D0m*}3៭JbU~PIR 0ts|yK+Tw,EP)~ dr$#{ H DTH6}h^׭v E(D2JѦYב9N'?yȵdPO}"&z97\ bF\qEzWFJy'éu]\a霛.<УDf"AZB3dS(R)= u^Ok%r`H&dEu.VR= k-+PW|LefE`YuA2kf m6-G@j7:ErK jm\jvfȏ9wԤji4Z~LG8dAvHho:g%?wB6M"v!:Z'vޔ} 3' ŗ!EbPz|mx`nHW "NC9U&!`J"^[t6g\/65d:L| sampD>k9DGR]}C `w|#8}&nycLH݂ҤcKeyW+bf\ђ`fn=@+dc NBj_Y eLiBBveFIGww~a}⛊&lYW{PA8vRCld]Ql:$ȰUssaRe)xfk'it ˅VWmΡq5G F!?Gԁ)'0qJM2]VNaLq|(-kNl*u( d']z-QKxvRǻju +a߻)`ޒDV2_Gƛ&=`za}q/tcvH^ 4V.$"!= 'g]* X9@HG߃>?ij"^^x;;A N!T>3$kXf>Imi{kz,C;7U pƇ:m :FxW;1"D(&\Ӽ,ZCsU=lga՚*hrfT m>soT:[W8cXז5P䠉m0ayx?2Lg/7X.a bS?MW窵bU7(N+ g A/4n_K Rx(w'+AG VF3䳦A̰FbU[N#m%cdp#T{trQ'^f"4?pnP=ős%;i $R1JҨ<)U.B)2I_gNTL [%°TF6ʞ. BӇyfK38 %!Z=䓺ҖdRB!rĺNZSf\,5_8,ŇyqY:)aobqR!WJ1t)p;)"L0]fB?֞wjǛW *}UMnd;^,Au:-!7 I\.@AɆ>7 |7G.300R *'Y&%oP,TF1Զe_^ (Iq-5[Om*ᔇ`ƣD8**!B*'U#: sq[J'$X7,_ʒ4G\"6ƒPkD$wjU*U;ʢ,`P`a=Ɯ| ~AJȹ,&~ s,6W/fU>'4b-#P\3`q`P ^?MOjFLP5˔I%> NLoPo"x ͷP\~oI,x&(d : B9%fb qsZm#51~d{'(:Oⵊk*֜yX*z\BB!N  rt3A$Uk犉 ~nQy+?|rugn~.“|oFa!"|_ QZYƠrhܽ{K95~KP=KќLIi}2Eqlcz-Ju#E{qjOe˫WIۍ_E 7, XKa)kVLKm a\)Ņm 9IEpQuK&`.tw[ tK%ğjTvE`E7&80~OS(=b|nՈR˽FϜn7,kowu7A;?<>'чfQZ(eQb:}5)E6]\"T<@U ?G.;C'Ebh)2eL`i;A/w.U>"iJt"Q돬{RU$.1:ɜ0*m @ѦYhMY"]}@82VYDlt5 0O!\h# Ywnr.QXtz9n &u02G#=Vt2C`Aq-=2J{S%&9Kڬi1x,m%ciwr#*L|놾ea3A}[s~t>瓸!pWi\vEèژ kUچu sA5WN oT, l2gGR]|i"ή\!…c7n?jɐ];؆$͟> ~D݃*$&L읖vm h`cCNJ>?a)+Nh`U Z^b?npO5E# $m_p ނWe/"H^[4ai6DsFis{t(vOG1#k:,cЋ.B۟,+YMrJ^jsؾjp 0j7]1lJ0=;##ko'4:w:5_EN~3W QV4^@v8#Tו?dZDݐ6 XM<'; T޹??g%d9id6{ckztR3gDgۜQkKVJ{FܸۣG, I^/©Q 6Φ<0{ _]F8ÞU!WZ1,:C4e6r'NUrP.uGx2U4芭8^1s!.FNtb>½Hut 샷8+˻rapɘn &ء ɬ~}^U8 i"ztյ>.Gq~ ݙG!RnLzΉyb[-AXD#mn>gX%0uh.n DCq,%sɒ%Dts$jfGa/>ڳu0TQp]cBt/ A&}^P__f"3>6Tni _F=ֆYFܔ__VUHs!sFsv=N.0.E('U\N W5Ec_Š_T[$41|84G&'* zbJxySGɍ[B'QZnDVZa,`_iZ r(u'rK[(1Zdd" ^ǔӳî%={S8xoKJY-ﮗ1mьaK,iZfþ:5=~(WMuqT=|:̙`^R`OǐѠJ#lJJ! |o47nQ8P==J9M#02vc~Ÿon2t cJR4GH'`yp'شGټ<Aѿ"Bppc 2O_2F]5t/ Ur|hJm[Qyted[줗ٹ$rЯU6KN^"ƩԈ~47~Vm4Ļ(Y$o}C*O0^O֓A7dy#ؔ_x<ņo^.i 2Q_$<P]NS~! Qxg"G|_]4y/(Vi 'Ą ʌ%ׄ@ .J{ԭ2>JP t/N't3vL. oި7Ը._ډQ*L-Ԅj gDtO^u(2c|UH ]ݛkNd)EA!W̷i_aK1NUVƒp^Ԇ0^['H 5D1NQw@^u,8Ќ"AaO,x.HoE!>26_*u̜(-W+lVσiEci/UE|^%fnJ| ݰXv# "h=+.WG55sF(Rl1T#ϡ̚7Xj.2GqpEJTBE:h,!tz N|t!}*^<+(B(" s~PUY+?eF}|Z*^' e?S\RV06{aܮq>j{{WO:*qe9=j)X`6 NIG'4+ ڇO>Bl=:!" ZB+u?g42urqeٺUtDtUCa;9#=e5~% _QIQt̼~}~H%2s|Qh"\Nz{*)7MG+Rf 4(Q02;\@1VRw:PGp:HBpJh?,3:e!ϐxdDc{,ȥmxpAX HԚGZ2v]-V!#Ő#'h4!S4Twk >GdǃŁX!^'L:^i ".g5UƏ }[ =1m2뎩hWcwbRDG@o(Mzx\P_LGM)4 >Jc΃mk0_z+5GkSIPv TDz9zqQ_׸Q[6hɧ ;wWfgD̾ >WI{'άX7rD$%~BL/F >;p/o1Yt}0*siF0g)ZWЕz`qKsL&3=pw_dq$,/ C wH3/u`

0#;[ r#< KK1s*X_OK\%<ZӲyx7*\8'Y;iF u@Dmp$46.9K;'ٻ%9u@]JMñ28-ORo)^/:b<Wdmch.8(/z=QϋHC{C l'wRg1O-2>wZ̩ജ |=k[$3:)Be@b`$GBkV0|YwfSeED 2sy?_` ?G*{}u:N%nP@vנ8qt,bmT1~MϨ=DHsf rp ]RHY

P!EMC!V? J"yfE[~m9 5$DsB\nQa+~W֪?#3Z g쩎֏˄w3QnE-MBTj~$0>Ϲ1rcBw]8,IKTW,x!vۃ.)W3ЄIkO?;A_8!$K *29"b̆VwmL3`KL{CوtG`Diٟ@Pyx<|Jf3=7}Ak*W#:Ӡ.,VZvgI V!"(aY%&u\fL Z}N8'3+}*H[HxgcreQ8[`58mW;6PLؼ#t4犮K¹ $1Yų7ܺrܺw-):AA#?%Z5WasFUzI,[Rj PMI @K8ɂXzH"ĖI(Q#qW MQAr?l.͐OmHWA{HB @xA] V B&g4 lBVȣk*ީď~W},tNmGw)¿$Эsj~dGlTr:Æ?Ѐ$VO/$[N MZ⹭Do{¾iM=Cg>-'r?Lȋ>780[)= D<4EO(f %4ޭ3c.#ꨑ:SHfN8ҢDaބ+.f&V1DjYt7XCˁ#:RM3˯dw6{q4ANV Л&J,nBiɶiܦ$We>"dE~EĎ #ojv5 z؏Kךڢ#5]d1$w\tDMr=z^Z[,7T;@+zXԙ?TLl[U.xhjd:g"<:q/!2U6ׅ?BFJ@ñ< 52L,j .\ii^Ђ^ܜ="qV7y݊spBR@솭? <`lpٱ~,N:Z#v@i&j!-[q#;yEzKj+ND=hvQY&{>b?psDh.¾̫8 tmWc(H%g<'2yBhRLb3OҀ;El^ hdKZ2xB54!J5Ӱޜ|u?훥Y>(J"%B4~ >K`1WJH;$!n=[TVGtM4r75c}=]yA-8wQ)]&rO`}ACzc(= !4ܮK\#/CWMw~44w z\w"-]R 5>B9q^ 3z;]Kaf9T/H6saOy CMxt4Z Ϊ&#G3 Izy6$Mic5-XJ=)̲Nn CZM(9\ O@!b yʻb 4iL;3&{s n>qy 2JASRӲ(|e}I6DwD:qꋌVX%L5P"߳[Th@6> }ʤJ0/\b!n_b1tI^5 W9ol= 9oAVyQd[ɚIx85:l<"IZpfݤЈ,P6W2'_ƲPu_ ({&Bݽ> rz䭓DD:Ǝ᮰޷K\wc䴄UBυfs{☭Pjj[^ ", =Ў<%ˍ O}/@-d-a+ef;U+qq< 9b$cuGcbSF>hI:0qE]sFfvθ:Hxkvm/͜z( W6au|tOhhP(h ^,& "7<4 MZuϖo#͜`ea$.+v'\DE̘;:4It;3izCCɇ%5\<~=,|0@5ư9?^']:lHeeZ:4@g#fcIgt[V*ֈHYَ~휳E `v3̪Hnaeg. u[4:q熕O_zڃ[ g?YF]cFLeAٖH E(}MHw v{@W?V \⦷h]}$ K]N.2%$cK斟BJ_y-2:nԑkKy:FQpSB>+OvX lio);ВfZh Y!9$(('iH햒3o͛2ߥ0rȩuTKo)$K$׾Y# sV!a˾ñ5zR3HpdՉlmm:]pu}+˓IdVPoywPh#-[!rB%mC$YRclKğM,UD2w|;tMYw!\v y+ѻE5wG5CeOml ;7O+B9$Ao=f1 )ɵϱn䊑<}GXvbaUi A%}] ۢE =66 Nnׁa@`V37Y|qϔ[Y2V U[Ir˰ iN3Q_;%Ub2DzR:(_z9hɶRS(?t.7/|WX_A\,kjClJ襤F`"EO@uM(zGR\((]b)Ž=:z/erv ,:};"v O?l&k!%J!VĦB:f|J#/霶w^zFUd"t1Kn}a|eNء bc[<ѐ'iw<0'~=~==&|FJ?A,A[)/5n.D0(ڣǵ1C M+s4O-$~,AN쮴w op TO "Ko Cg\ Z4_`|YT{۷SߠۼM!UI(;-Wa4 mĘĴ+L /G%)*€=I[kH=w"`|m5_%1dS5RٻA_\6앱fμw:nȌ{.»XK$?fST׫+W,Žr4,NK^nd*{I= 4|Wڜ:y q욫m`o,äh(E9ƕTu;[>±Oad Gi#Aj1r 3oIh3y3A%k@ G1=H@^{JB܅\ m4(ߥqTM38KȎ,\S >dy*$g/fAۙ8OĮsX?j +;Y:\Fs?撷R#X#)ǣDqQcm~ˡuN<}b1_9[8~iWsm_|-0>nkL%DZƠ7B 1tbiPBҁ#5u!m#RG~(wEh`/ckM+9r1b,irG' =]{djWffP>%; I}]lIs/C~zx,8GO)%d۱7QK=>zua_6Pٕ>gHLjO@H̀v0:;756O!3!* )/ yl+ئs1Y']pnmo:'BFT!r!pJ"i`{]'o/)崷Ve%S{ҾVb79X" x_X `VWY4(޼C`^ZCs|Ms&AQfju3 ZהFIT>|pT6 3ɞc%WYJlY:ՄW-hU$"L.཭0))IG9* 8\6Mnn O_`޵ѵi1v$Ӫa ?,,Җ7+/yU6q:D6؁]"n.A)ضz\\;]2Ĕ O%H9.1"v04J>{M))JbGL(-s ZV2-"[Ndi=`IrlL*/L4 At94VBJH~=`hU0Tb-,ԴB\^'70dIz&M짟c9X7@CAac;JrtM1$%PXcvRsY^c+ T*'`m'ri M[ "KŊp MzP_+r9.w㜈6CZԲ ܡz!w9)>?{%M>a;j 3-%-|Z@h& 0 EҶ>14@Cai?YNHZ$kU5+/7t!y1&#_s_#?m >Vf^D2׆ \CmJި̪hҌ$e SwjvLlѣŪ_։fϏPa:բl܏Q[ tkx//ȂɁ`"m4&Ztwx,1O٠~ 1?*C[w:{ n ΅cj#uTY"c;n>J/S.P&x])tnn7 ܭTRHw%`Øgczָ'AwCL*φ_*;V9哼J/H&_#E,p=' -H0>E;w6 /XO@zk[|4܃F2?g0%GTWJuEg䲊dlPDhm bv۝ۋˑh7\!>!W~uRUjcv۳7xY68|~9M`v6'h<),ĺ?E I[|3xyxa +P"𳋱0*T9L@R`( DK5Ւ.I>=9ȻsKe,Y'4]bЮ>0]1WWE+lA{iF7k5apnzYNѶN;͎3\˛ f+̘s 5ȶ̎ăkZf>dl,_ 6iȲTtM_ߒSȬ5Rq2G|N>XD.0WCg-AR8^7Vp*) OP糑zfn !r1Etdm_?6WRn+̰FռBE3'_NOÝnT\3rfJ[$SuxqI_j5b%,ք973t BDC:R,_%[m4bkvkUs"tS 8[ckS@Iy~JBX5!pFL]6pj;ƶpq8P hta&8*鳣x@;\%&4t o\թEqDź" Tk򶙮}㧶VM7~9dlWui/umÆ/d|bc3CkHߩgbGƃhHS䂜! CK<=eBrf/^kB4ؐ^K˺՟9שrCЧ;s}z(&zncfYa %ɷ: 3L4݇C4 `^Y͔^ # XpV9bWu; QQ"HQ3`2<벡]l*,@jps̀Z/ص*GmOy;:b͚f }m~2E;e9ܧpv IZ o=ɲ!H֮7n'7ACc$];wYB5W᱿U״rXys !ߝp& s6nsAM)[s)_x<UsL>,WFJG)<蘉l}- vZG"t4m Cvż^G2R Tr%ʕ@=BpbkQ_:.osh;+jd[֟7''aM%?ЖzٝͳF&gcR5G8&BS\ J MʔQvRj+%=[ ^NTEws8%I}*CWb.עH!Hx+H&.O?aJWO­d˱xcveZɲw,b2ͽך!uul*B2xC7D/sOP1tj86 F'л4{d!3h}?M=Y+K[Ļ;/Po]agnjvXe:wՙ]S7˻II& *a_+qdͨH)z TKM?j^'JxR9b7iQ }Su}=?:xCCG+ e33`;?AkKIK)~OcZ5n4)G<0Kj5N~kg`*7ݲB -R|˰F \娜#GB7iV_(;Лso5dh+E*wd;P`$X4p]*B, +b:ݹH!q朣桉QPаʢ:GA@OVthI8]BTydcמ&,0˖NXHGB 's?R>jEZo,ie6$13gǻFTzlV"ƍGݰ-<5jx[oLXpWH$\¼ɛ9U*̲id0e ,b@Pgߝq|J%3]=bD+`֯Ōhs=&MfqdO "SYz6L`cA:O_ӆ,jSs$ {>뤎Ҙ8z2^p V bK5˖YKv*}h Aq ĉG:N'1 N"TN۔–Q7!B:[U Y d$]JKS)Q >Z_/%WMm?ٮ= %;I:Y  'd[{\lqm7__KQzdX9(殏FXVM vvuQMT#rΟan oh u\%a3COw3\H$⥟ 89h~˵dtKVp&My{,Bh#ӆ*y  uŹGRЙ8g `Y2<_Yb*C)[ ܻX]5y4e^9'Wi=̵֡"Y-pBZ]F͗v b) :o^^^\ A8M>Q[d[G>ܤN~V^z|*k?bqT6Y0"CYfؼ'ؗe nQXIE99/o ~OKzhe+TJ:߱2''@6SXHZpWwP+CBB=\?!4qDeyJ肦ygIS.O"`q ҤEv-wg&bz'Y0k%ѤlaEP/ Rۙ10w޻/ }W4=\V 26 2ԱS;'?jI(iL>>in:3RO>l7T0L4 /V}ϒo!33x`-j1X;)7KX ;Ch7Hu[/EfśJsaigPN*p xjG5$>7ekj`\+&uAІ;Ҕ=g4Wf6P&A.j7. )ophx@>-Xy}'68_uU-M"CL0~k$,faZ̴;TZqN|A&KCԽ?0ЁjCҐ) -IDP%?ؤ$V$:} H'`g $kvT~…u5R1l*d)e1RZZNp bD3IH!M gfʬpiG|<ëZcVT{N1G0km=qJ -)*p4fUUzx#6 .#C@~eJr :F}v[ ݣPLw.&H3;9i䕻Pg5I:LM٪#m&܃ш6XdLpzV WI"_Yc0ZGu] [jO:ܪv}>@֑8?6:9yíVWxpd '>wLwPeQBoZ;[q ~ y"L-I$餔UA$4g.WT4+BMQUbץq@v.a@O|~%sNjd[ć1wkE'Vk1Ć.Zq"Ȃʝ~; 4։3IdPؐےhoEɤ<%D /v)DeKӹ=Xҫ2SIr$_L27虫C̱?aZfb0 YX`aȢ+MFgд.qA G"aTI!Gt+75@w4{a=Pm,,obj{В5 L݁,:m+[ΓF?P3!2pO6`S2)HR9 K)Ѯ-;`1.>VȽ)H(uuw۬;0+6{Ip߈ip&%-݇3Xdt*cwY/nބ>Xi'߱´d6vVBeI^B;t2R`Ka[(L8 YK p/}A#^leS꽵[=N69=ё ޞ+L,ј=IW&ؕL{Peױ/]0Qapht$?xRgb1J~\m$#-I䧮gYUn 4fߢvv;VkO|ؘwXҮ 0&|fOk "ˢȥN9ي~fAm-HeQ;+N7{VEHv|9sRNr-J_T4+|LӕK8nh&pB!סI` t?N5<6Ic #/nJQdC-".f0TD:SS삪 neݜxR*atFN _f-b -jQ&x!ĆJ5씯>GPQuutt9$J 0&D3 "Fx 5e ܉'dבzyZ2!zdq˳8{Ň#|f\URj Ch+l^\6Ae1`RW# % +ț\]|pjY..>㕑A7EhE" jlւs Y<_fmȹyO k5{#$aq7eI"][%{dMjN)kͯA$ÂXcR،ȡ+ WϺuudKom6 Õ0Y")ۛ%Xܲ`炛^LrxG( >^BRk%"Zz<+49 c۱N˽`B-#5)?σ}L)91 uO@[Q Xweփ!Oƥ iTOaBۨb[W`n[d;|ӓ9>⤙, j1+hb0=ϝ^K:`"\)Շ֫TKV0~2{*"zx'C=ﵺFWnﲛ$k>,zXOCY3Rz^k8Fc%fN)4"b.o3~Kb"{Ki(G NF ԗ-< Lqyͻ^\р`˃QO~2bf~H}],kZX2NGX >x[o4cAiU%}7V@> !Cv]J9ml[V0gL[47s@lIۿ]O{zH|;&MP\,+ `0ry[6>˘uBLL\ @\܀PXB-~?.Ƀn$R]]QՔa/L{F\#\QD U%yFvl?H8mt'+LɋkGjR!<=V~_\v6V KIU $xٕ*Pٸ3~ _$Mr*KR/ߊWBt$Tl+a8;;J dti⪄ffQ=;.-V<{齸+er@Y;D8qV&dZ2IŦ]x<E;~lkwp OHurF")ϼ ct\U?sݺQD$@=n]?o11+{}4G{33F`a-R3Cͳvm`úV6p7cɣkf<tlHf|ј)M& 8>huQ" O+2DBLc`mlcω|"3ّ&W#N{$^*yV4cˆϞCmXbHQMEezF PS+#R NNXiA{1St250is̓ӑE19 (x?m#:;wofHDGU9/,#]d8SBvn{ڴMU`h T5]\:>*aj~jZ˧-!}R03%O76t6E36׃H>Cm=%[ϑ D :D,%\R~|Lylkj"){v_7SfySj!9œG }Uk''_fy+\偪F+3!]kO/(h{)g(ZTL/>2'ka\h0se+SwDܼ+_F|C*LlݐhyCtn ͆ޔ1j'FCPHeYfRLTSF Tl$VoM1y CAj&6[VPӛ6V!umvi?Dx97lynċ'!^D"E_|+Lc鄗浻8a?PKXH\q>q^6N,&*ls&U[+C7~a 0IM^g-v)ThK>Sف1Ыé$äF,s/;m!@ZȔs! &%l }5Q!ouzh&7IbpqU1Uǜa{!}ʎjsG`,wHy`s:(hj,3SZmPrkwӡyOά D%#f21k\^$gYׄi]_cK~,_%UNfOԈyD=hׅf a}`TSO ēSr2֚zH,nÎ ;iF7E75la50)dr7n9"j {msd-yo5#Ǒ-p5J4Dk+WrbB(Zń>SU9%TuQӸz}%%A *-ޮBd ئm$Thpژ6Xz\+)#q u-h56 (yhnte\CUZ~"*$J"ⰊǸv3/nBTdvg7!z6DKpT!vFǴZHs6_K|8`!#5͑ނq ޒROA7(閍[(; 5z?+æzX5iR+:#[)4DabLsZbrFʮRCr(:I֨.u^2;sJB VP4uY=uO,&%zexqSY ;Qh|b?KF'y(=H-p!]ĝ; Fy-lɏFS!GI̐Q`Y5c(fLG(ϣ9(\6D[A1ڠ&g2or+8,:h5Yt}b: _Kbͻ+ޱW-Er  :0?;bg8>r 0U%SDQmj⋍';y',a:ZΙ+X&g$ϭxb!} k>,2dM`Ƈu]VŽ74Ut`֚oWR_laG5$ 6|mJsN\,)imj 5e}B8ѥhn_<4|"':-^e4vL4DZ,@,7Dx/Lw߶2U"^ ,B+;](Q"(,o\{̒9HYAak&ΤzpQǞD3- KNJv@ew52n;n؛V‰wSO9F=ǫfuɠ띈#(3)G F)ז|S&OX,d"ꀏyG(o0(=+KށѲ⩀#+ҨFo+iM+CiLbZ4>w<=a^jFP>/3;љ$l\^ TT$RIY2z\BCa0~=7QuH ܧmMH yrV =,ׅnCaη<,sat!ۘfjި56)$]ɓߝDr eQ857 י`kQftfRsKnx(E*q&Bn;\So9q5p;CwWGG{v/*GǏUhj5"Mr ܢ Ts+N_Xֳ d//|]BE2X[ھ$vI6^G8oO'j6aJNp` nhԶٔz^G@QF0~Yuy6L}:ͩrsK”AxD1W0G&JD jsmGw ^$uT3mQl͏}GI3bRvHwct: b,gS\Y%8Umqxo)K(/ jΓs@y5F6s0_>zu-;qGsWeBsm'l8&B)i1 BЀFtwj;s9QՊ}L.x^ά.Q$UScL:cTHAf!B4č3ާʇ(Zw T^Oiͯ+V-r_(dۤ/ðW|x6R/(Xa%@.ۮMyTɫf͊4c}tAQ;|0rzS>mqlOjؽkj{S Q$o *-]SkІ'WئU6? Ԙ')8`&m8P-ukH:YO?y#.,,gҼU4LWYyy;PKy|%. MKyuZP3(ˡ*:dc/e{"[6+? +}6u 5  ;W30!Gө&LR9M'G@~z$"CEO$0GZ/_.>K=EB'ae vug!j/FIU#NK6#+4< ?5_F _JǓNjz2 qԍ(S֋^+c:1΢Kf Zi8X#(3JlΪT _ 89nN&ΈC5􂃼3 9vnXP_PlǻP;e w3zU!KI);R @Hz0.\]9Ý$qRbe}ەS 56>5zy&?Ľ~Egpy. ?S;04^m#RFxU,,uA(PI49QSR-x "wOhwW}:B={)%% 1RB"jz˚_` up;Gl-~̈q 0 3 _& v/FX7<9XsHibGt9Ahn0щM(`ɔkQps.Sbdܖ>Qs+@\oygq!=n_ YAyNqBخν=sހLUX`3ĖU,@SS\C՟ `0;EEf:C2yD2i#2.EMt|^ZRp pk@zDOi_w{u|"يZJI׽枬$N"+q@5t@[qؚ|}C |_j[b쐭2i5ɻ"I)+vxtP=Y՟ |h& XClP,UTe}/2Py-5̇Kxj*U+ єލH>ъ4S"^]X`:UHov`ľXbi @2S:Ogf6 4FuSu0#<9Ahֆ\*@#DɱY;*4Zvd=Y{SRZ-WC0#CQ y0ڡTCG+zx<,M&g$2Y=/*?uAՇq:E9%$Nwhe׌k#ԮB倍A,g&T+;_Lx^CȰ &j ;?޽j('Q_#t9h!"4=JtT&?DN T׬P)FI'J'e$XٴTds8Go(2I^gH]&h"6UdZ7qA7\qd"9WӆQKTtt!N %DK4a%AΨrĄ&`3:Wv Ͱý.m -CxM[ W?ßWwF]N,b87*aŤ!CdaEu<JLHa;{EB,,FY!l5щIiFB^k(Rk<7rgfIh7fEA4u+3jI¬PO8!DJoSpUH5n0E,MY!xЅrS;l$:ɇ"IV-I_$1U3h9Wf纛Óo>DF,o}}&Kx% >m{>~M%#h.OGmek773c>)ͱESYslbY@׌vn]4Sy-h ׁS]%t, : ; 8c̙f-d\: 1+k侏-ͩu~/ڹj`۠a]c$"{yGkX#>P+ݏU':g_yBqE^M[ZHW.kX =;`<##bӿ`(GESEк}{4R4$Wr LG+3 0MI:@o۠"OuuQ+'!r/f PjnmWHBsτbbef{g'ھHG&+vw&F1M۠j[> %0@nMa~`Pؐsb%vT"LK|D7!ZX[cͼ`KaA̮,:O=©(ez@pͺO,٫WEmKb>f[`nӄarf w>XxM5bgq +qMGݺ9<~LC@RnDCK*BeSXw~jt֔OC粇'p]Ȋd?X{aEpOo;]9OY<^AEg t1բ6#NY;0oL:~P],Ŀ۬M8^HԦK;sa4XLyUIQrAٝ{BU:z({:u0u݂,t`-6.EӞ(W&cTعy.Tj|BOdI07t_U u("W /j "l6Ǯ>0f\LŏsJn0%ҊmPѹۜSVHRno9$,7-6и/inBsy ]9Gj"I4uzezbbLoB져t6@WQA [S㷑U/iռtfWcgXl<>3aoɝż{VTHR& /|Ei$h$jxf0J @[HING~P\S:fȷtᆺ6@#$ﲾ Hk^t>Gǣ$ NFYh [y@R#s !S-8ww!G 6k=N>RZw z1ӟfˮ7bW``9O֘Bz@S*~U4@#&,6߮Y**@M[}7`qGV+ԨE:,Xz5۸Ec>izFJHCYZʽdGd'.otE\pÉ8nbOjD1G>M14ׁp]y S8z 3O+T^4@vΗ8#aMA:}+Bw*WjT+$KW~oΞ >I eP!NVֻ{`ʎSy1Fz*6ޤU&TlfuAkCֶjsr9]JYۮ:VZaO,t%.{^$ ](0!rED>ipp!)t jALm䓡}TjkbFOfHJ2VӽEplRQ2H x0$6@^G]5L_A wO4߈Fsay磳Q4 Gṁj"F~S{ q g'9${*CX &DǡeaNΞ);Aj~[z{Bgmf:!F1DF7@$+Ч0:[PkV 1 w1 'D`vWd 'I6{\#V-,(;0%+.IlΎ$,*#U_w<`i2 ˶եr7yN#bw&ɺ'Wɉ2Q:,]r1h0Ey'L.:]e4^&aBu8^wjJԶCUWyK9ӕl,hㆣV պ;,]w%ʿʡ rpPqJOŒ]m ]?w;bJ\ǽEНuǐ aq͇nWa=ǩ+iH'vWV\rVpg6p yKt`X; X >ۄJ1}=M{#_|C;)ŷ{2|Nss=JXLZqLQ?@ d%}Fz;2A몳x;p, L ,uM ~ ͖6KXr{IIT+IAQ;&UU۩iP08wMOX2gʑK\K P3`r~P>Tr<ۤ hYk)vx:- s㧪s  ۔%`>>vD]- 4;{A)i1 hM2 ]KnT 叶`oÒ Pwk@aPVrk4uf]%o`T5FZF ǯt vVIk#IjEz qVl(̿8 e;rxH@[IZTkj">0YzsǽP4ܜV5_`J Ry͉̽tB ŮÅ=omĨ#%4gGSުv|o ,Jfe>~˻ߎunz*,cM KfKʛ0?i c!d]ejai !;b-}r,zMaʽԔD6xڋ]d5 0cmRxFE[q}狆lmaӌHivwB$ _wT'~ "ICb&5p-mV7E'aHv{+J*b|<5p*Х~*>_Ĥ1 UgxR$|vЉG\ X}C,=z3)kdOlw/][eZcNG A,`_.=10p>W]d4_SamAa&("/5[Tj~a__bu{š-)+dtDIk&ar";E\2)MX{y3dĩ.$%|[s` R01(.It77COQ>D#cMmM{QCO)bMH/;}Eh (.njDG;Ǩ Mi^óXu֋f%vJ\?=)F>rPۓO̩7@Ntסq58NT>guJO劄%B9V-JtClyA'0iv\diQ m:)>b*ξn:pQ/W +P"ڀHbfg*G.ZX@lAr)|<_BƒDw S`*Áh&X[&&~pj>=H:l xFr1JE)0o a"2C .LY , |/svvq`3;wWs}ƹa^]`w*K!? X&/(2 Q-H3.#Fa pS$U/eU:޲L3ɿ!v#EϏ$k `I+ "DZ*RVNO-8i@L1Z?idPVwC_m9ʉVlgq+v ђ o6୐=D_9FRfՈiv{wifoF=S_;Hj|2u@Ձ+arhF m/bs96)*)dR; Z2hnETxzʉݣ|5՞!vqw* IvrlٸZ~yə^SHl 0^]+k,e&HZ#hz)rB._$ ŋ 2)x>91b;"CZLMɬTuΧ-="${>@3oHP9Cj6X$CB@+ U@^V9WSzKzvu'5!= @r_ɕJ9h5' 5: znYe k0XEGym.8 ac7pˉ-Y( hQJIzmԙJ]u)p#iB.#,/hƠ8*n1LDoXŏIr>}GF`'QDpI:d5fHwgjKSяy$HDvŜ 3~'w3Ty L89j !X0FaSS9v\|)W!aTPmLYE*HW#lgk"p{_lG " M'pVtik M{̟ ˇJJ<tɈ堝TV&,sVRyͫ?M( STiYӦ#4nqVrrxz ZFh2%` ¾/67vqJt 0@azc㰉8gpQH?N  ZG> eDkRh;}Rmp9s$ @Q-B@kD>|B x ڷZccݎ"=hFE[}^,OA*E;(q7q3tTYX;=f4}c,$y+ xg WXiYa0B]Q~5f\1Mؼ0p@ɹ,DV^?)N5-/q6V2[ʥZGoȟݼz#]J4[`ѻ:Gf'SQB81&]6R`kS֘'qa1/ u3lքTLQ}sIɾ40A +7u'dm'!!ۄye;3y +045oЭXâQ*V*>lo$ I ^);xÜMCOC >{Cg-h%=p6Nkx=(Oeq4O5!kFWB$'PR>Y=PuB)3jE) Ŷgj`lMHf|n:f hZɗ6ᓹa]:Q+u'HxOIx$Eؾ]ɘ>A*|p1Ԇ9j'KՊK[>Gn_]-:zΙokvTOPOzҁYUWUF#J&WvZKK9Fj۝:8И٣sťljT[){3)ZZB\6T{z-]ȹ`§v)}u!젃:\)gEJޞ@ ͣ:gRs(DF?},;n0_ A9FxV*h+gӺcωLn2sKeŲ"t2Hm; U7daC.p xa#6m)n3d(2 7HPDibR aZʡ%k ;<c? +1?~J)ܝtK"raÇil$-K!@Ĭ6vTUġ;{V);65~o,zH(>s Ǡcv7n>{\ ?6k]ױug Ry/2%?d1=K mEd'wc >A^ivL1sE؝exFvn}B^ȓCȡǻنO7[`E6YAʀLk'N`Mە m(Ƽx |M{ti WܞmT:trުidoC'UV-}iܢæzsN[r=D94׺H ^άIm=i#!WB% p{h󇒼+oq@PI J;Ldi<%^΍l||%Fdr,X2vU\^ ͓Dj}'Cv@o5B Lb%NwY46ʅ_Zv;2 i9?Ђg>jt% ]$!lN)?mertΚ@P,lԙvJ(†3qߏաmߑ~ֺ^J5h1eUfj c\NsO((4. Q@66yVk:pcFP%k"a4,\8Qo.*4<ϼj^%R;Zrci!6BR!,II!4&I{XI\ 53j+Y1s^ 8-oƪqurEs+Qx0w`٤ጥzq4/Y<: .&,*P-ڴ`-O~^ p\#F}P>9qS;SkΤ%? .ꇵsZs5E:D27T9]3U2*YSTS>~ɿ_{o@xMe q.UiueȨW g*!So$/Q8(3r]K4̄Rpw_u/4dU:WdHbU}l^KYuGnJzћvڛqQF4v0 U9Ѕ+m;pBm?(Ŀ>7Mw8k8?\w {x0W)I#1_f!z#3D|&ZLpL4,1%#$?sy0s1:F'+l"+]kS=1=ᐑCcC;])L"mA"tzb3sd)g[)-Gܶs>QGZ,Q)+qdkɾ$〸D1Y 巻!:vGD q΢qh e˴a棸W;SO7egnO"9-9GxyknRThgFɟE ةjEl2Wu `^3l%,SVެB|> ]"+!9* !Nz G_T^DuA5mogP ΖJYQʤ(MZEbE2GH,GZpו Xۡ`$RU }-}%u+e2$VǪ:-2 ԶGe,Dm%dmO]c܂̢ڍxEDZJ+xv? }LI=u {s9SO/u=RBڒ(if)"q4 rm^#.ᰝѧiXu&c˺,[% g73T.,|.~)+ȔLgb>nٱ LUE\(;kE :789EBoQ/QGwr0ⵔrwKjN J]Ie^./3$U^!d1{ֈ;F32OoWL]*KP @U(usؚ_&ckP/z~|6XaȊԐ.T^jiËBgVjq RRߗvi +s >u~J¬EY?wZ)94pI 6 7);84>3:]%IڀϏ"۸NSs0nV1`h1(Fwa9ZS"7魬Aȇ 1ٸ6&tNqgPFziAzNXE3n^u T~kq\p&S;8.(oxf >(80/HȢL2-:֟7Q"PC*E:s*1.0%4$+EJ 5\Q=i##~իN s=19d!#>%{O4 O6SH}g+ƾ))ĭhlh/AaOQɍ1hWifu2cvG?![V`V_ka9 ns>wE&8ym4:jMt' V4m(0\?]{vXJ}$FOL5v y1qWJlwIxEjtDI:ErXhݳ!2irc5ϴKK_O][)Z1m*gEq_ڧЬ '}K>ZCշ#Ps ܂zVt-+` .(DǦ1+81\8O"{% \|*H%%RW<]U=vKjYQ?4>ji]22jMDbː] q \aWy.nS"_<.kyu*nhCyٝw`&$wl eW MO"pyϝzO)m;(fZ@}) 8 Hr60$MI@Q<yLaclZR /ONJ]vtDfMtRUxb^FA2X1¿6PoFLPOWČ eQ {fG`S*8otIY^!+ h@A:X,%GnA3=қVtc_|{xqpHoJa~M{ǚ;Ft9z8F;:'#1nRR{FVM:[@+:$7L hnOu*TԝݨyGMm琚v+7iקUw@d?r:N/ov+f<('tMo1w?y1A"g%^2I0ĵkaN*K3ïznGssS71%FЂ%q+lLjA0w]If0YF>/ Ma+c -x{9%jܠS_A |*=J4vدh̹FiAkkt-CJ/IT=<ƪ=w%FV }Ngˑ,k HkC[,WlhqƖʩQ<;02i2fg`sqDUCc&#<+O2 j2gE#$p 8+VL!؍u5֫} )t|݂!5~L󿕼V )a*ׂTd+[JbiډD'-(6A-W<" ϩK|\;aDLn@;ΑƤS557}+Yk8WJS~p.% ؿYZ{5r>:p.D |ڒX %ގIE2ǎh~Ϳɻ bkksdWfdGLcJ<H7AUAD' ~{Y"ߪAo P=랃LpxWWz$u-kD>Cg-tʭb#/&lJ麩 p'9H~XNu6SPaҬ'{b784BCO=PhjK& b|0?c4O/ij}_V_jo&&oqŇ7.Xo YrRt7tDp,GɊ󲏱D9ĥ;3sᘈ<} RvLqLݍ2Hw7uH AVL~.:t^->B_Ƥa;Q\_ 7OպF$gdO9f @'1uǾjA/?~M!Yy{PYd`» < n5TzmapQٓj'yK,/<{ q#8[E*_E W3BmUqڡ:T )΍25m|ZJ_+a!!X2?t2 bf{|a >4?ȸ'a:dQ,YJI}ɴ2<>BMjNZ/\O7d-ӝ`(>Hg_' /*J>$]#ݔַWp,$Hyw@l=apʵ ,%/)e 9\R˛' 5C{p(>isiAo ^6l\c$*ŴW}=)39CD*5a%(4/a XO;:=ѥxtE1QpHtH0 p#lz*U,VwGo0 u5L{SL ZY{6ZJ@&[XE> " GeTC SgǠC"noz@neTtx]m#/| q >2\wbc:cë$;5Nك[a+DDzR_ZQMm)jן_$3H9'΂:0"7}6T> Vmd<B ٙd{` N%#;ҫ<o$(rX qdnH%ʢGu\LRGO]dlĤA"Aiڂd@q@5O?!'p5q*n{,x@~lH7֛߉Ǣmr:E$!۷m?_)[9'qv6r.J;Q)|^/l:[47p7DJ34<җA7m/f 4(L5oMXY6{R}Ѵ`ÃI$1Ko9?4_K:K3 [1}JԊP |v^|U炈cS}彲d=0N%+݌%,G"ᚆG @1H1j9$B,洯#Ђb2H! 5MNI[G=2U9RքRi:߽,C`b$)SB%n<#Պ_wj.EߪOA:1]̭h3of*VQbVP=:RV &bOǰ0ף]9,vRqd&Cx_0Ͷ, C:,69{2(5P9ݎ$:QG_$52Ki6G5ɴ8a~>:JhEA44hHS,Teu |v,Zc_umB42e!/2ﭝb$)PQfڊP*[;GQ$IlK`< `^mF {NZAHҪ ݙSմ̙D@.넛8<rZq ؜:)S:j[meNU&)a~A-Us4LLZe6|O%6yj7퍆D׏\?$CW.& [j$Ge!sAYpE'5d?mEGoYb{[KbRUqkMvWj*pXeْgnEdl-;]u]9Gg ?R1)E/MJ-U+nxv묁rVkr"1 DXS Ŵ;.aQ;jn^[PCV BnA5+(jSo72)}^1M q)$6ik"/JV \gT# ǀϻc]hioFw2LuT",w7R)CX{G2g>& $8S~71'߶;] n!^o˄{{ʄ/p_p/wTz# uF[.ncÜ)l1̩in72::X4X_34&2ke<@w䑞2.GTՌ;83+x"Ӹ" 4爉#np恨PӕӁ=ƹ7sk5BF,cA5:a!s^ Rߌm]ٳ7ʊS$ Kifm~;4؟[84)`gŧsvŹ&Sr|f-"A\k=?ȁAm~)b)Fley )E:f /#dsԻ)yWHЊ2A,Ș\F PIP#BN?]n#@78±/c?]XUdli?]}y]z-]_BTFF,mřzĕxr}[j_O@V _A(*RꬱSuGtҲ~ys/ V9+ANTu^>:ZgG%دBA' Up |mQYd8P(0ɝ^y<$ k>=T >Z{ gqߦ4(bz6߀A2us.ִ#BߞOS:@"-AnkuRsqR;!⥧ ["h(H~@l8xHOem]̥fT.7i:>&*}'9K5A'Q:;\ ߑ.ܭ FFFPW,hVk8`/K`N8}Lp-bTb[^䡹KhĴuf Mu%aۍ\*@~`"_Ez-f_1T|{s0l_a*"6҈*oN^w`ĎM甜ڙsӲ6\[c}|-Xh"RR f۶m43[a)Fq"~:2 So)<{ ߐ:8;߯Pq+Cű[ǝOO`,iEj lHqDz1H7x{!L:0Hg˜ٰ4/J\Ϳ"\?!z[/Ig!F_Q vNZƄȭWpE&9&qb/sXOlT%`zL O\;0 xR@sjrޱ2T`6ݦyU3>'?<ɻ(` Ưh=7>$jMZz2 CZ>A@U,\DH`2; ` @kk8H`$OMj~eXq9y'qPh@;YD ؎gq 4!0O߶f ݯ#99mi.PyWu6Ad^Z&nr0=bqF%jO)"R`{flc| Z( 7,Ѭj_OLNpPLm KTfb$tƁ,K"k'kOuJ?If5\V">F!&TȴA0.byJ1IK}FE&&Qe' R YZ̮k+YE.[E`*]\d4'8_9bL/g  !ٵFϻ?"1>ZxX1Wl_0}^0;Ig@Hc S-3冷],2kb 5cȾ^ bUi`vugaJՃ`A9]r=&n@3?<[PXҋ?\iYM%Qn(=34mǢ\QJXȜfPѨ^bzD,Iꮰ=`>L:(90R!@fBoAI @8%.REZO _W`/VFҀbd;8wG/mDo0;ll_P;So dU+݄* j.6pYvwn!7~>YI-D<-[`O'&;OgyZkG⻢-]hr/E*> sP iw3"8DaeD( hV#T1Ly6Wq{i?8CF*8[^1ޥ">LxcMT{-^1"G 8[&׵8`ksQFzCwPM!,AGFvohⱀƝM#rZ\-M=G )dЄLҪnla{|D[.pBܚ Y cb (Bq].vHtR6aU\y5dU?PQOUo $K^k~c,ovq|P* & )$KF^WOkG>)i T"!o fF}i…*.>l/?sv^FZ($R7yF~]{n%ұf8v%|ݯVjXn J]~WEui4{)Ppƪ̄5x|8#Ko0.hIA:LԱ ݉ƀ~ vzb``ly\[aO`-u `_$Yԛ*cN xYQ!;.DiR>JV.K C<"P$e0ygl&?\JRdz^p .ɓax0q8M$+&Hԍހ|>C<"  _B &CTR)n?><TFwZ~u~|-ud;]UVNS4oy[1XVϛP!Un`/cLXf:RG,? R n 4c(#*K!,nhbәr\Yzm߅ԭ2M[?+Y׶~)!*\tzM,H uGDt!9bL <(!7+y0Y'dQ02S]_'מds ̫6,(4, ѦtG>l&Ҍ%ر[ZR}5ZڎQTD>BW2 UpWSYUf-8&o"Y"gdy投1':䬾Pd,31b?4v\t㙄I; yj9r|GGĸ5L4Vx.3a?64G_<^3iCf"G W'A Xmҕ~FsZ+ Lr)aj@>DMl =IJ(#!I'$#J[e~{{dƍ1-Hy0qHYkKm2@prtUŐviM ě|vHӻ!d0d-XYOU4_`ALn&er.^ضGCedUjh-8]oaZA0ц<$+k02m% pvi-b0;='RIiDҼa 03 ȸ$E~(lp_Q\P?4)jrXi2uf:cLH tqw3T4;ɛ;DB<OY;W傩bҠ/GA4ݮuM;6߰gaLHN!Rp BKH6B!7O nMo([cꎝet\ u 8֤+v8s~(qK49I? zP"o7nOR2ZF!l*QZ螹@!\rܓ'v3ᇅb: a&q `-m%V^:i9-77wk\=`NrgO: 41%pad3zEmqγ<| (k dW3n*&mVݕݱ͐w^rZ,b]1V9]:Ũ [V:0757Q\ԂqR]!K)0}enߗ).y2KJh B#n)bT&{:a Vdk<z%é *݇FlvK 15;e m?o!:rT#@FļoȅL6K~ -d;LƁ%]kTh8u#ʺ2?W2KEJbKT̈́09-ˀJU$ mmCf?q FXh]>'Bhr|0b oKTgCfͭZ؂P̓H?rrۂI Q xPfoMiGvö.0Òp}J!"?|и6(`Woo$3"O -ۡʺ>Y k\c8jV>4#NwPdw>LOGW%~syM64l`P@<(FIh\78e6;V/]>ӫʁʺĺL&^?4jHV:nJdU洪{ vDm?LԍQTǰ{9zWr%;ƠlAWNk\%6NQcy1}cF"h (ӓ%̕3m 1[#KDO^r&hfw ҇mʬt zaz5N7||&~#/ ɵ\،PH.d3N9]|;1ʱ eUn1ϩ4O#4A[ZaCgbfwL-&ۘ+Xd " E P?1 ܧL D ڂaI~)csV\? %EmN&hg]c3{.zʽ6I&!t*{/OVF#e^6vak_ޒ0q\(0a~'B4phX&->I­^8Sg󗂱h6|Eڻ2+F,M 95Xz98㖒 ̧N4b`pOo1 ! NMEPvBٺ"|O{*Ee )y 䌫:p2 C[\vo˱я~iuV໬pgm].~:fZԢX~YUc& a;m U}5BD&]n'~(t>xxw!{FsyI92޾9t- D(Hn9g殿\r ]7ά{7ɵ(QqJ_嶱,;d:ivu\ƥY4֏IZʥjU7$ZryDEֈY$5EV_x je CQC~z@6u$cF|zuF.jr}Å\TMD.6UJ8A@a:,Zf]*3A1˴-w}@(y`}I#)'wJO[VK2>06a1Ge(5tZV'z9-A B{{څOn*IӾM4/pꂨћTU9IPLK'|+.Qp 1ƤU0R%YyUZnLKrb$8Fb= FbyuL|3# gq7.w_N~!D\,f W#XO6xU ~]= o+N]ҸloXP)I‰Ծ|T.v[cBՙОb'5 [)ԣtSO@ƥbzKwBQH G9 ȱ@-ug"%$aS~&znUɸ$z%vS v{-}פDfy kJµͬ?9]9,v`Se"bFK A[IosXkkdjM`z_xE|;&MxJKʨ.H6Wz#aoj~bdGqi3ݔ (:C׎An}ν, Gq,Ϲp8OiOgr Q 4aVcnAT7 edfwҭ.c{Қte\Y̝e\5TZZ(f$ViRK<<_R;)/Y4c@.I$]4jYwOOeЪ?̷f_=yd qSq -D/gcI+p5W.MAӚ%B׌|F,MlYv;9d4>:̦"_Wxp{aeR-O`!gWx%g^WyLd2Ǿ<1)s1+r.%KUM(Ϩ6Kr_ZFQ$+ٖY ՠwѡLY͐"@L@boN>V9yG2w{ulkTu׏f5Pfj^}͝JmJ"8>vGb{j[ttӵGsEȼHt|Lli#lu_ZVrG'Ȧ('\O Pm  %vAd܅9uoţ[WQ,.~%#`dF$q }Q~wL' kDr3pؔ|C:eHS҈f^҈ qgӢ,]4:cE}خw1Z1LOKyʞ3++`;"wXlk `q Rg'ΡT(! N'7FOKgNjWƥ, N=k>3)̈́_ 2d0Ȫ͈nWb@uHXp+;O|U_'=;5.w˷]R5x> p܊ Db^k;y (m(0_} D+KuDJ`zMq<&TerLCC8=#֭E G1I姕A3Yp.8Aj, C\ O2" hbi7D]BN,v[X$3In\F]CkDxs%s76mtGU k}l =&X{We'(AR}Ucaeƭa3yPsk{.A; :8C`~ TGi5b%@Y0 5"jCB.L2 }ؕM!Mh},vZ?.3 ɕP9;^Q9 O̐)ꀂIOHuaVXȉّ{NRā[4癕TKxJ+dgRcuQmi&q!f㈫hR`>PЇ%l'+8rt6reC\)y4ҊXS_'0w&?J% ;mHd,;cU @?t?qnimy%`^b5h85neb#ہSn_,t "/|ayФ)+S+ۀr.HwGvs\+˘ün.iK<)y=A'P=?5^GIl}ԨvX(89X!F~ާǥn:<%USUאl9Њh fAe~ Cpqާz Z뭥 s-=mVqqQ): igi3G r}~Jp`{UMY)GF#ؕXVF^`>0{3.}=3\Ώ;gvU6q2hEy":;w&,q.CQRٗWR:&Ro>qɶ!$g+nQa?[*/#\Vk-Z_EBh34@ -oyъ=*]8(@ >EڝlR G#Ļ4< E |2&%䱑[V$[ʒ%f5bO\XAQ37m(fhgcl+&t#bs ge*`OZfŴ{EK0ȃEn."s\ .vrVK5dY_ /IFg yf1 9-r ;fKď~ &?'\h;Vf[+|UV w۷ #YK|df"{SHv`w`>T}6–+yP+=OX&/zBM .纪Xg3Cڎn>FtSϼ_UnMŃgIP.=;-odd"Qe+ Ȉ+IU7K^89aQYՐ-1BO*&{apG)X2U/J"Z=big/DB(Om%%Gձ%b#0piWs0?Cs\ Hbo`h d耴x+Xk})EʃE@g%B{7;z Gj^VQq)\4ӝNd'}*z/|:Rzl-"(:w&[^}b^@P;e*EfPm0E{v7Rj hH\,0سl^ "{N$|a4W*qj}PծKsϟՐ4{&rYV=^ϜA㼴4R>\K'>/}䳣v0;]O -._~Qh+3~n/\_xģaΗPgɀdthXrXj3;o37@ˢL*<s:WLN֝խr4bQR04Ν,q wrp3#PRWRUS$~$ƨ:+{eFg4I.y |.*9JRs.'=KJr``/~9/&!9Ǐ(S0:"9R`nWP? **|`FUihm'75uݢqq"4ZhNA36V(>a䮤Q0!zmy#M,j_h>}6̂AsDkz2)jI(P7&#P STb$_|eai2o>=q/H4;l@☀cd7̓ā-z/pCC•X3ބ]~aV20_*<ȧ-zU猹n311 GcTE A>0IzM Cn *d{Gdw2*ƏB?^ <7m|a F>[ bS7Rᮁن츴nc+TQZ-E "\WrUPw}t[ hو.}eT٤v>:Qr},jĄְ0%֯s> ͩLǐ@`{ Y3mgusb&kv+m̆f-<ǽ4(;>1vA#EgsNǖFO&iK%JPdj&%Hƚm|@^[ YVh",x,c-Ee;Ҫ;/ܦpj_/v~!FiN*t@ ɪZt]ŀr9@R6F/zVF.sXNmܙ(2~,6ޗrhE!v =\9nz?]6^/A6(ы\pl ҫٵ~ץgf$i99gf;/Py޸{Df\i1êa6Đum̈́~v9w-Ƨ\T9*jtۑ(;5b Oj UĹ[½h#74L x;P9a 42i:We/ =dyx nU~\w>͢(Qu #7 M]:y&zUjjuchWxX(NpT}RpVuJj)zgd)WY‰a6e`׃g:ߞ{02 BgqTBN0WË9>\F`6@E-"-b~J@@u4ْ]`]t6:4͡JCm9*tJmc(;.HЃhF?)6D7^Jت .u4F{8IP{/68NİW4]#q ԫk3ᤁz;A$$2)P*Bk7-Lh" b(((CjL]ȣ_rLw/:_]1dw3z mċ%lxJY^s l̃Þ}z-a|e,}ℌ4M Nx&xR:'1~em%W$c8k~9^lYBLSpR Em6$~ס%k<_ 8YW\:5SmaTx;k(PbUUIoܬ!ދۥC1C&C ɡx uIֳ + ؙcTxrp8f逅84FJ.R-e $T%W݋jK%"X?z}Xc)D U-E`[Q;τ >FzԅG[9\`dny-lOH< X8KG=}aHZ֠ v I%8r \pL䞘06o z {e`Vhfǯ%!~hޜ.DP rMd_Ag87!saz;Ԙr]pZE?*>Ȟ) Nn`6ВTpGtL;۷Ͱ^ں/ko ի֬o9-=ةOKM>b% MT+SNhaZӫ[D2 &!lo Ulsa׿!F@J.9VGDYji4I&+Uqc@s= PVxo]69[emLeD2q{l"da꿄M$-iB7ъ#68sI*iY5F\ڭߏ9̘S Yui!jcuޫFxFZJG 62nh~e$7=/% ~񴬿nApfV˶AEQeIN\jx(4ۯ^Hhf} ߘ]R~[]ljTnlqk!}< 0 UY@g4P f7 fiy4<Ӆ֗#|A-({c׬xe6zINV>Lk$Bᱰu"Ppaέ`059@a܉OcUM RE)V<}4eE4&$k@4pP xf_&f+`]?A)F\\Y;g,σYqs7F౗قl6rO ՇnawOq Gkĉs#!H!uRC diAn\tdǩf+5;1xEaFY}֨9'mGW?ꕱs6HwMٶÒ J!o > 3H8{qC{]YtHxnܜ }V3^lcϤT廤l]N",OGh:2鮎tU.1F*R&d `D36G[V`'9WBEY:XʗcY}vFp6fU\ M"\HB(9ngVj'(ъK˳r{k=K8ф4}DQ6YYjflo9K2uiZ|+fVD-F\SDGF$#}Ilvu10a. 365J6 9<'Vy[9겚v";4;v=/9> V n -9ǿ->BHD+rҳ SyfA3^غҥ٦rS`Sefc`j["J89n6Á]A]CNeOU6+J M8wQ(҆sB 7;0F}opr>M,h1Bz%vPo1:-[wD#埦5JW4FGݟ&[jΩ^ef)HC3Pkg' tq2o5?[nKud2[GS]f\]0Ds:C1=c"/䚽3 *[nOV'ޏrEv`A"B9px K!acVXI`BTK2M`av@ kr@U頋Cǜr!ܧ,aKtļi`Bylo:o9.}Qv)};㠚VfJ-~)'A ‚l^rOq]Ey⫱mxF=DVSi] M!iT,GS`mN!ލ\Gj-?r^8]=6.q PH$6"?r#fM/䦷t~6 v/3.g34} 4|Qc\b*=!Uxjh}<cK}|%b.,|wևa,  g{:sA dІfg7x{}=Gֻ0VH8Αb:F}&a-0A*8OGb3&%g6`Zk H@*C~gJ(|T^L"k#: [J'/~bpIH8G8~pA[n^=/Xlhi6EwYh 6d>TlW hN$H]seGzFK.ǡQ @ $^Qvx`DénW1fvs!gS1P_?Nor ~湾N@I(MS ]i73ޏ_6GO_Y;#b :JK<.k֜Tl̙WG3Á6n͈E"S?\%#9C? G-fr,Q-.Ӳ%#O{Vف.tYJ9%I#h*!kOvO)@ZdL)nWBmUϗ+eBm܆Fm7ۛ?9@bR#S7.&-L%: SͤJY|`G90uCoHiJ8A#lu釕5UAfMV'S(r\=_qLC=#.Lodraƞ:$옃W氦= *P}̓ba -ĿY*lX0GVW0CZٺxRg#Z %TY,Z93k [pfuFEʷn#Rj޽Nj$+JHvȤ(")SfgWJ[lB">LdSʐ=܈Jrʄ#8IL6oIƼMc6DgŅǢKA_P8IdV _ }4G 8ON,IGNWu[Fۼ>@8ed )5]8R q:sO:ȶ_LaCU6é6F "#An&ryۅn6+eZ@hvL'1_},t#jf8V .c_;p#v>0޼ؼ<J`};)P>NjlED܋v[r,rGNkFWȑ?s֨5K; ?vaG:;'e:(8PaS }q*HD@ \Ͱ 5IWBa#tC^%kKiw" 2scB@™wʏfZgo >s$J1oov8Xu*d8ս1K~ٹjUMΟǝLġ`LǓLuG0q@V9dOE,#-P i'FS/n0I%U}fڗ8-g/Pn?-qˡUq0d_>:"Y? i5ULYs^4N>ٶ,Yޯ|]H)fHocТgV ǡP^0`'TuyA=1Gw)z=T pw`1f)2Փnѻ#:2URÆ\ /IZ͂qaUP>>gW5jƕㅦD R$|;uU_QnU7SݩJnzf y@|x 6Uxe <ǐxEB9TY$U[Ci2Uwتeܩ`]?LF'#/h|&If67CۦS+`8e \uvͲ0cbWMZEMكCCr,VOL=&t]@;acuCeN$2/0͔9Hn SXP1v ɐXiISDkIfEmqǿ?e]juQ_YL*@X߉+tN?(z+燁A xMn ,}@LJu|J<0*KH'0Hqj^өM J6=3gF+$7Z/4E5/51r+z_joAyeal29i(^v/zD.Z#"⑲Ik0m,ѕv'X_)b)+" !3cꄖVw@0E]A=*|Ijrs8Yu(7%6jXJ f}A,([kԖ$f縋?7ȫ |uH~`:Q>=aNzt3 )?xxp0GPwi#f2-N=ntC?7~Jh[_5iCln8unTwa7ȯc0qd PQFcrkSjpzK/1`US]nˮ`DD*o?͙' 9򪿡*5:^Ѡ<+JXӀ 'lb>+]+-cbFW~-0̂8j=E{[nBM=-5{ɑ^} URr$_BfLܴɫ/$9=Auh楛Sqf'oaJ3C7+c7󏏰9Q11eWUXDI2EYe-|kb 4gǚ5n'V88dwaIO9u*0b%kBfFFKE08[(+0vd ڟO9*FL5kH=?on=# "`W6Ay 8 iFpKJBcW##aDF+E;[Gjn I ~Za:GHjhXKus ڨLQݽX޸۽n|7ÀQ0j>()_S#2|rib2B/X:_pl>>pϤ o99y&\ASà'aֹ. K,s 1Fgtjk?8Ya<4=[.z2*\ā60W;a`[eDav8qsöceޟ T搆b+'!{ovQNQtTg O/ P(L:#T}f3[l4A3UWŭ  w9l2RNoe+VMIsSNdG6ݺH[S2) v:] CnVer%ذDck),~o3`r]ZQ%G{qkhI&["$yQAF:5fv(I`-L# JτNFa2ᔗ ?̫h2qn.kꛞ,%OKb㧊`&sds3mڲ ?G57#@($ Qq˰s`,-ZsVTΤޙM;~j?9/fokrpwԽ,8'L7C7ѩ֜y:bApEӞtpnnuB`ytl:^4Ɗ/Tԡ`0@1NwQT..oU3 1zhR1rJ%\E'FAaPyމJC!S zy4EUdaaLd#~M#2;MoT]4(ihrmXGOFO2 }(0,?тq!UԽp"&abb ;6ق2$Mߝ5y7R [Bщ-eR JS#K>iS|Xi=jZ 4@=_P XVo@k!_YiG7FxZ\2 <ȉQB#9]CWZO`x!^eJΏH$9t縰Р{o[j>0SW8:]ѫރgI@\:OPV:\F8X.MBfөˢ$ qMXT` ޣ@x#iUqq!DûK4LP\mc|cHݏdI#'Mǿ CyhLk\G>IL- ()[,(p)S,K5PQ\\c-Ǡn7+aQ?3NJ,\(#X+ُڟ"N6HT*"s?T8B=,j;Q m(M5Pz=| $IS*A;)I1-BI94myG#:!Epqp!TW{Fl$F(p k@.al‡ Q<\nEXd ONҸPecϛ? yf$7%+ZqxI/luj*"R1kqWq9jh|B mVf0m[÷f9a3gr ޴<,Ú(K3)Zgb,tjh{hREi`\°]֨x1ەk"r;Cǁ i۝2ll/tۑcth;͵aVk\d-3"d}$ :ig'(fƫ=BKZûȍg܃3 Ym`EWOψrx둈|.DZ\(}+0ڽֆ] +/ q`.٣ZKHPovs&c[7NFnZuD;!p_b =/ umرesOć@*Z@;t(X#Y?F]8^_ f[?cpz;nl}۱Tj޹3ϙ{/w|zi-H/j]kYFctѦ%ɏ/B:7k Lx ANѯ;1N$8U}XO=uY!&0gXDM{0"Dd|?[e=y m̎RKV_Fa0deРO+ "3Ƭ~E:fM20%ILѸ؃s~s70=f(7^Cu0OSv Hf}$AT+%n. @adւ`l o0gk'^_yhq~$I`\I^LMp!E84]0YzF*?^;uR`gqDZ)q@@ݭč Ps޹Af0 Dݬ 29)u7É zduىI&;3#6 YCK&SV>D#) 0ȊV ƍ ic(`|Q' /*'amMf{"즧3!sJ.N \tc،P XP +fT<Ƌi<[ʐ?'IxtMt@aG̾6Þ~Ҫ{;ڿ+k[ 82 _\x(GhwPlKqt=I⃳%j͂Mpb_J+Fa;߯|@T$JAΩC,B3}vӥܳ kUTQ~r ^,Q_y2[1dlc?R؄_e!!`'}=7#)πgX꼚4O?DuDgMlt6) XSQ_Fڊ5(HtfA'G@.pbJں. >loXVqd34 _F,P*Wm!K#򬇅ZdԖhqRO9s#Ə:Q˞G _d& O#lALJ7yw.8_BjUS,^IMdoUJ[Xye]fk-&8,JAߎX(&Eߓ6yU qKMJ/z_L~dg9YҷUhHͬdnJf] C7Z}/q4gXe8+|OCϔF0A^h.%s!#4'_)7 ;FՇҦ<\_8 v'H:4C$6Vjt7# swƬ+T?9QU5 Dz>f(2wr˘sbUy~e:mj%p_ Pt<⥩]ar0(ȇRZqv֙3@gIW$ C>qSODkâW@bև sxȮ"].> "D5;jE@ZK??Bܺx y0]8Y:l+)fٰ2Xۮ#y7 Ң!Xy²]D/@NE eVwhoyL_Ƌ@l4 ! P Ja\ؒG>m8-љaa'lEeFn2ڞ7[5֑0aZ7ӓRB) <s;DQP~}t$$1OTa0%х|v&>یsEr2"=a0KpAO5Brg:B6⚲bvQifvbߍUDHQYB?:9~^?BPZc:Vew,tXh㬌(R_Z̽)ߙCKg8Cu[mM!?}r)n,($N$ -/-;0@n4}_\nk9 ƳE``3lIz s+OhkN7ubh%w@cU8GF=V7l x%!;0)seGX$U@#\wqqTFtTi슝ZMc.:joM$&BOMC({J|e7Z(j譢ޚe LhMr'S*ɴ\oѾѐ4/2$P:+>KV}"l}[Ҧc*/ˉ`0 zD$,a!9_َ/1BA1FYxK]`{"v1z֎:V7~nUĉRX=S[> %9EV Gg^ Pkm0 bb ּT%۝tV.b@89qSSsbxRԇM@k8 }o 7v`߼1|t5D]ZTJ%G8v $a