selinux-policy-minimum-3.14.3-139.el8_10.1 > 6 6_6 3!pQp)Tξ7]mtZ`gaM ]mtZ`-fzEHaj6+TH/ZDL4mtma4{D!s\Dώ2M?-[G)}W ,*}J=9Fa*mxv+ZaA֍1 Ȧŏ/On#+CRћ1U?lz뱝}XC/Hp9c#vPS }1x>QRU5(e [:GjQ4t&Q'/W̕',nG?I[,["Ja&e!e0X/L:i%>pH٤?ٔd  - Ix| #* ! ;  S  j    Z   $ 4 oo 8 l S ()*+,-8W9W:(W= О> Ц@ ЮD жG H I. X:Y:\: ]i ^7Ubvdxexfx lx"tx< uD vL DHNِCselinux-policy-minimum3.14.3139.el8_10.1SELinux minimum base policySELinux Reference policy minimum base module.gadord1-prod-a64build002.svc.aws.rockylinux.org&XKojiRockyGPLv2+infrastructure@rockylinux.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policylinuxnoarch if [ $1 -ne 1 ] && [ -s /etc/selinux/config ]; then if [ -d /var/lib/selinux/minimum/active/modules/100/ganesha ]; then /usr/sbin/semodule -n -d ganesha; fi; . /etc/selinux/config; FILE_CONTEXT=/etc/selinux/minimum/contexts/files/file_contexts; if [ "${SELINUXTYPE}" = minimum -a -f ${FILE_CONTEXT} ]; then [ -f ${FILE_CONTEXT}.pre ] || cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.pre; fi; touch /etc/selinux/minimum/.rebuild; if [ -e /etc/selinux/minimum/.policy.sha512 ]; then POLICY_FILE=`ls /etc/selinux/minimum/policy/policy.* | sort | head -1` sha512=`sha512sum $POLICY_FILE | cut -d ' ' -f 1`; checksha512=`cat /etc/selinux/minimum/.policy.sha512`; if [ "$sha512" == "$checksha512" ] ; then rm /etc/selinux/minimum/.rebuild; fi; fi; fi; if [ $1 -ne 1 ]; then /usr/sbin/semodule -s minimum --list-modules=full | awk '{ if ($4 != "disabled") print $2; }' > /usr/share/selinux/minimum/instmodules.lst ficontribpackages=`cat /usr/share/selinux/minimum/modules-contrib.lst` basepackages=`cat /usr/share/selinux/minimum/modules-base.lst` if [ ! -d /var/lib/selinux/minimum/active/modules/disabled ]; then mkdir /var/lib/selinux/minimum/active/modules/disabled fi if [ $1 -eq 1 ]; then for p in $contribpackages; do touch /var/lib/selinux/minimum/active/modules/disabled/$p done for p in $basepackages apache dbus inetd kerberos mta nis; do rm -f /var/lib/selinux/minimum/active/modules/disabled/$p done /usr/sbin/semanage import -S minimum -f - << __eof login -m -s unconfined_u -r s0-s0:c0.c1023 __default__ login -m -s unconfined_u -r s0-s0:c0.c1023 root __eof /sbin/restorecon -R /root /var/log /var/run 2> /dev/null /usr/sbin/semodule -B -s minimum else instpackages=`cat /usr/share/selinux/minimum/instmodules.lst` for p in $contribpackages; do touch /var/lib/selinux/minimum/active/modules/disabled/$p done for p in $instpackages apache dbus inetd kerberos mta nis; do rm -f /var/lib/selinux/minimum/active/modules/disabled/$p done /usr/sbin/semodule -B -s minimum . /etc/selinux/config; FILE_CONTEXT=/etc/selinux/minimum/contexts/files/file_contexts; /usr/sbin/selinuxenabled; if [ $? = 0 -a "${SELINUXTYPE}" = minimum -a -f ${FILE_CONTEXT}.pre ]; then /sbin/fixfiles -C ${FILE_CONTEXT}.pre restore &> /dev/null > /dev/null; rm -f ${FILE_CONTEXT}.pre; fi; if /sbin/restorecon -e /run/media -R /root /var/log /var/run /etc/passwd* /etc/group* /etc/*shadow* 2> /dev/null;then continue; fi; fi exit 0if [ $1 = 0 ]; then source /etc/selinux/config if [ "$SELINUXTYPE" = "minimum" ]; then setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi fi exit 0 ?Wr$!6'JUt!J59!V2Md}>G h_If $!6'0!<N  ( >p />   d $ou Xci}MR >=. r'f N  E$ * * M V ]X  $,| 5  mr _    3}*>o JU 7  (    .O $K Wr C  66z    ^k%u ?[5 7R|#mG Y VjlaB!   |r %H  q WD R s? 2=2xX#,Y ; =2$",Pi YD| bp2R `/  ]QW }(o f&O 5}#   v6H / j7  D&_~ 4oV + wk!  _;H(PaV  Pv  P;@9c=IY O  - dv\ 0#d  3(JW e!H gRO \:A|b  H :.cK   oHIey  $!6'0!<F[N&%k -G'%` ,`(&4 ,"133>po0 2/!@>&6 ,9f 'D ,d' (4$#~o3%u(T" (X4o3c$i1}!'M'&R$`$g$'" (>$$&8=%y.'"\%T5" -4r%$?'"wf84$a /N3v .M +GE#H$;J.F#2% +x%$"o*Q **Dd M. V) ],V%p2k#X6j * $) ,'|B$) %3B 5X5#! * )dm8r( ,!_$f25 *z # -!') *3'}/&*' >5o: J+U38" 7)(s *" ,l0%9$(& +17>" # (]#! ..I$$6O: (\$B`#K! W*rC2+ C(# (S" ,%6#%^6"2O(/$z5!1R&' )$$ *Q *66('+ )S' ^#4!k%b%uIM8f ?-0 ['5#= 7-lR&#|%#$m#G#z )%#DY!""R V-& j4l(+a$(B$>!I ,| 0  )n|9rBc4% #%HH #D *q#M W,QDDO$m/3E -'R$e& s+B?"0 *#"2("=$2#x$X##,GPY": ;+ +=%r$&'':}(2%H$G#U""4,$n"9e'&P3g&_i&#: YF>cD'32(|1&+ +b%p&!2"?5WR8"0 )3`(/1* 05$ ]/"Q#@W&C) }.(oP"4 f*z&$L1;=$O1#v 5)/(1}5(D#G"& /0&D , ,v"%6H^'\?`( //$ j.@7$y ? D(H&I_8~"$W 4.Io#8'AV#&" +-' w*$%k&d!' + ),_7/;&?TH$4)(R/P&4aV' +6 P(v& (f +P&;'@=% 9ce!#=&I$Y"1 )O'P%a&- - &'i -(s d-v&\0 0*#Md& )@ 3+0(Q JW(! #FAe&!HD:' g,R"'%O&}O~ \):2A?#(z&|2b$V0t *? H+ :.,5..cZyK6 - ) o-O!HIeA큤A큤A큤A큤AA큤A큤AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagagaOgagaOgagaOgaga462f53854b72468da49bdb9b7b36954a2d9e7acc44c044c1ee14fcba3b66508c7433cf7d3d6d35d0790bbb0f49bc32986dc13483407d7eca5611cb8b2b0eedd48d2beb838d537959a01dd6026a545b8209182c1708a604489667af9ccd7e9a8a33115c8ae83b6d571d45099e1758b571209e2808eed26389ffc50c1d5409cb37f380d2bee554ce43f49b1a0ee94e83074a00d49c64149161e45942fedaaeb5ef8583ca57f622a7ef83c25b1234a40fe8ac5e89cba4e75b8f20da4f206c830a4850e3c030d2451b2871ca4084e1cb1da2fc20e1cc0d1ff717d9a86ab8c9224bf8fa9c3f7ce155c34d26ef7c05a5e87f09daa1fc705af7697f915fe48616a7c9a83e5364c67737aa18d37aa321765df8c02df87be67b593ab11e92e38e8136b22ee3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b8558f207adf1e635face28f33487992e084a45367149c1e001542a194e7202991de08062b1ce71faab6f7a21a62b6cb71a88b275e7f36fad087d29fd7e0f121d13d8564f22331cfac1d241b73064f15e1a5ffae1133f81f6592187d6d9cf673f27738987683b036cfcf99f7656992ee4eb62042bd978c8ff6742826f039c5a409093740c377103868efd081e872e3f28216ebf17b4535fd4ef3a074333915cff334e1fa3269417ef83475c62ed5fd9477da3a3f0518b699b35ad6edfb8044ef4f46dd0f14d1f02077d066f0f4b332fa4ed4ba352c560a62a6f628cb82df4de4a345c4a79bf016230fdb72a4ee61be011c3e63471c1978071f20cff3d78c36bd98546669d66bfcc2aaa964253460196d90e17244d1ca474a7e46ffb3ce986afc3efeb76cc49f30816e6ec08a4bf3f48cab11f3c0c159624e8c3abe52b52f5e6816f06a5dac6f77bd507632b1042e967c3374f32e0619365f9f1625439bf28c9355825df7577357f8bb35e2332bba3c959db0c2bd22f38f8dc5906e7f42c4581a64565dd9dd32c0629125704da29c372e56e17e766dec365585bbcacb9259ebeccbd67829739ed9feff4578eee8abcc9cb55a647bd73d189c4cc222999de2d4cddd3b7e88a2ba07eaa2b7130b7ea6ba35f124189a266844ec22baa114d54db17e999f03296b3f0d372cc054fde17cd56360fd12a18ff640d41ee907d6c43cd619a2ff03a7f6913b7375ccf9dc5a666a08a788a5c3bdc16a8aac9058c4378e2083b5250cb844e8fdb86671c44561a38c2116cc8d743f09460746fa7f53bafafcf82e978e7fb0018bd239d06926a009de845619163e8f8111596cfae0157d914ec1c10d2d74091c97b82bdc91d50b5ccde9ce59eb6565dc9a63d3bb9a2049ed72843d094762fa117dfad29fd5fbd5e51c562e237f9538204ffd1cc717e77c14e5dd6a28d2e3f01bb02058d8e6368d7e8205a8f476dda94251ebfe275673d129b5c01ec1ef53c74ff844d0b66411cecfbb3fe6e301c8a819f78864c126cdf95a15d165fecedf81a7200afb4054ab296ee3c8468e24118332b6a99f0075e2f8148f5f1d91f83702c1f209391f7b40d18c10083bffffd9ddcc55d8f27b146d87a5c55bc14e255cbe0ae3ec01b56845b0d03a121e2f2eef1815b019731507a6f19fa140f148fa9c3f7ce155c34d26ef7c05a5e87f09daa1fc705af7697f915fe48616a7c9a83e5364c67737aa18d37aa321765df8c02df87be67b593ab11e92e38e8136b22ee9400e7a5c38e6e26d352821208b985881bf20c3e9ad772dc6cdb363dfe54ea215807a3d1f1c7ea65f81cda5d9c94c1fb6567018def58954d31e187ec62173e19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf553b4ef691f3c348eb7dcea77c14e94f127b2999efb55366fe37753a733451219a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0d46f7f4989897c1387e3039977ac03a89a5bb196ddd9a006e1c945d92fa181e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfba4b17b2273017b13e3bea0576bbf751ee6993dcdbffaf5efa140be34b2a44389a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8943a25183561f677db66724ee6751d3fe05cac8b13eb10f99cf6f363da45bbb9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf86aca04e1c79f094301b7ef8deaeda3f09e9e392438af2a6e2c7d698da8a545a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff483f8d11b22f27a7a2a4692dec5ee100dbb1cd264f0226fe4a8012ce01148459a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc8615a4006087dccef8aea639d4e2bbc2b123d34491c0ca00b424e587f56746c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbc8face95ae6897403af7fcdd93586edcc0f5fe4dd6511bcde90df323c0777929a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4773ad2f5ef40ae7945fdab79581c508624caf1009ed22861f9371e50c7e067f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1ad1b0fbce699d26e39666786dd24327e7fc07973b0716624e1185d68270d89d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6052fecb4625a096a125f8c854c42de4bcb1e774d8d642de08cc3c57513796269a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1c615096eaf04f10944b65904615b828fc9c67ec9be9619ec43abb2c6b8166c99a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfde960d7111d4293aae3c34f3bfaea061e23569dcff8526be4ad2ec570d35800b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1933fc626e69efeb75d2680b31d3020abbef5a3786aecd76389bbea5d7a2c8579a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb7f924f7eee28c2ac93461a74ed55fdd0d1ccd3e50e0b1fd3b608cfe9d1bc8209a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4d6f8235981e36d75995eaef2abd3eccee0765f95c36e89cef70712728ce598e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf17c36cbe503e2a004bdefa50f6da26509bac08d96d8ca187baad3546c7c1d9b29a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1af489f9a2c55d3fb77f44bb7115da06176dbab9f66c04ed85db7d7f8e2dfa649a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd6b03731b01819a28cecd05c58e8533ddbd04d00e22919dc99d81cec790f69d69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2ab6c8d89b361a0513a4c6ef6fe7971da31b588780a5d76d869ad8a0436eaea19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfcba4a2d827f1f987f515b58618494cd343cfd623b111e1226bc54df6a07d2ecf9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4e109e39c42ad6bc4aaeebb8d8e6db4dfacb67cfdb163160ffb9585bbd57e8599a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf9d44cab3bd0da81ca33e08678e9fb4532f6b6055eba252417129b1707fd613b89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfad9df741d490c2988a583b689c9d8b90bc7dc5c74dd2828407e3c00127c9886f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfcb4958153821d143924c0119ed073e060f168478f89777db1990a343f7a4ca979a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf08f7442d0a57ed42baa48264c3be98de58196213b5415d5fed58aba62400c1329a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6fb3d1d67a2c3e396aec24e54bf47c89eade33d2122bfc02f63568c6a90601509a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb25505c83ee67fd585bce2e16f42b596094d42d84ee1249b80d71f886b43917a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf70ec3c5b1395a773033d005431b35a07ee24a15b2040352e126e8723963b19179a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfec5a9abb74725162b7cf29d95c4b3c46153f94486e5a6e0b6741d13a0c0ce38c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf99be5b91ba1faf3f35a91f640e94bc8794bcacb36eda39e48b3bdbf6ab7ebfba9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2a53ac1bc38f402f8845eff5a4bcaa69cea57481146adec6040541b2183fe3799a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6d5a590b71aa01b88bfebce57dade73a61da417016e7c49bdba231273e41676c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf08e318be5b6cb10cc2880d21bf8198385522c6f71483bc2c2729d1217dd5619a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb914cf80e70a1fd0ac4cd018475e40eb86553904fc9fda6a06fa48f2165860dc9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf86bfa9a7747dd80ee28c79403167ba10698e2fdf406f252b7cc14250b4060ea69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf262f639d6da9f9d2d32a5bb14d3a7cc28f2bde1c77e31a299e3186c81489ee689a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe13e060795f8eb9532e91449b322e4fe5b6b501b35425446dea26fb0262388c39a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe938772154e6ac1aafcde2bd8b514f2270805a522073b1105d3ed5b2baaa742a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfdd37ac73d0058acdf6a46539a8949afbb65967ce2ce09a8a45a8f17593f397509a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff8c214adc05569f38e5ce3676a8b798f970d806f4a32f8e61889df8ad87bf6739a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2c29c016e0f031da0e41462e4511c700e7e59706e3a916657044d47c5c0032e29a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf84a5b779ca0d12e64d0d0b0e3243553e23adca2e6ea51318c3335b65a96617829a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf52082d453a70322428d17c13b471d050e0ecf886e0e0c9593ec9cccbc9766ed69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4360c60cad58496d9a7db3f9a9073ab9ef151a742f859e4b2702b76de2b5e5039a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf29b97acc7a7fea503afaebd26cbe701955c56cf5a1bfffc9547419af371bbc3e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0f31cd08a13491115a14eb99945f3f31f2f8051951c19063064db5fcde36acad9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2e62c0e2c995b17e6cf948793ae0fe5b180829b7ca3589ef9b4195c5aab0da919a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff3cd9ce1acbc28c867ac87fad1551c7eb88e0e212157bf0c2f0fc8ef265b8e6e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd652f38abbd1fe64e6f39b1ce2351602317be9811d05b68b1da3798d2dd308cb9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf671e3365154b8dbef0bcabfaf3883bb5b36c1980418bc98b60d1f0854fc8e2459a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0c811d24acbb006c64df74c0c37fba4fc1e0aa0e3285a7756fb4f691715158539a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cffa48648c5953d247da0e62b2e7ea09f7a22e4993789711ed1feca373652d7b2e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf91d5c14dc7c220dbaac5e4950ddfdaffea10ff1dc6977d5979aa7f9a4429b3109a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf966fb062a481083a28d072247764757364e5c7b617f008803e2392b724b3e9829a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8dd7ec1f3afc28785857b07b3c660da7759cf71c80723c3ada6f503e91b574059a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1889504ec5b7b57f2f04b64aae701c7e52d9946e70f4adf8c5e6385497198cfd9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfff898d579c359637efaacef1207c8f10b69c9e68830bdc6446e2e85192a7b21b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6c5ff41315c9c8de444429ec871d0e512eefdc95aafa370e7049538fc2b5663e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc66cc127f21fcd5944585094b23e2372d9a6242e85d110fd19136fc82fe4278c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf272bed0d8f0377be6936fb97c11dcd7bf222227fb7118ea611df5ae342e29a0f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf116246180ddf7925f109c76ddfc27d2dee3aa8914db89788ac8e3ee28c1964b89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff1b7590dbce2e540d1c314980095615b5698263ed02280a3676c6da7a3de05b29a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0e7a988e6d125432c68c62ecb3750deddb118e0874f14f9c79654b09f57017199a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf016c092963ca91ff38c6055e33aa5eb1735a5211fcc4384b198429057d01c6419a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf5541f723aacfee162a2b457d3ccc6b3f667bb3e8885b37deb0edc1a2eb8d683b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc45b73d658c0cb39be1a926c3d7452c3d745c3570fd849f803dcfad25ab363f09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1e9d1e50b2520f751cfade4f66d0839870c24b00bc437dfa1b303bf2265366209a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf81a53a204f4dbc39387caeefd3df986fd64f3ef0cad06f98924b80f9a79701409a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf81fd4e8cd5ffe758b1cf6d9b663dc4b5726eb0f14da080a598b976db6cfd42849a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1fcfa6f832d321813277c64b9bcc448f0ec0ffa15c44f1c90c17d8a0cc3c92549a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4c2874e04a408f82ca1f7efa6e6f0b21e0d6521ab9fbba965c38c571e2a3e0819a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf001a3975d4bd6a6d0769ae3b624532f0011da433d3ba97584845301ae87670309a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf226a64e49ab9f25437c01fe825dc80a6b23be2a97a52d60523d3ce09d20bff119a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf76e51b676f107dad03bef4549e23ec976d79e4b281e832482b3c5920d8d33f679a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1a6fa139e9f0fce0b51432a52f03bc3d1e97aac96ccd54ade33b5b0d3b1b955d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4f75bb7c1d55a5afa8d98cdfaec4629bcbf86ac8bdd4e737023030fb8d9fdd3d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0c3273713154fbd29feece3a43bb84088dc0e4dba8b9342840f9e575dec967559a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf725ad80ecba378198aeedcd624f9313e200b126a21900aa01228926d355903029a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4678b92180387a89c5ac840fd7dacd00140243f95213faab42f639a387e5c63a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc3ac3f00db5ec8db007700d27c657d83480b11dcb10a5114063d2b1a8eea75649a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1736f9652ec84becd4be94fce27af29ab317229d358e24166f36b88c08670f879a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe9e6959ad7d64ca8c9b2fac9c6e171e9f87aa10feae7a2f357f9f65110f13f4e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf5f85764b529becd1698e1040a674c4818336c72142035e98ffc7681ecba543d19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff47ca8db833d16499b6f36f16014713d7a35a9d2f40d4b0c144f9598e7dbdb6d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb0f0e134f6406e02d3c9f0abd4603b9b2abcd70fb43075fdf1c69ec0b6e935e19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf03d80183e0a444d733da3241824fd4e6957c5e94909fb7f8c8438edc9b9c49619a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd41ce8b263dea6ef27ca64d22189ec82d454d0a4b5c7ecef26a79db8f6f5a4149a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa756b027d41cdd33406006816f577a9e8d2aa24154a3b0e59f92aa09047adc289a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfde79d80d04f1783be30f10b1c309efe4873566b7dba3933041020ed7fc92c0f49a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf07e2a8eb0b177d0fc5dc895d7834e9c347679c1c4bda2c316d14bac03b68fc339a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbba3b53814183c152ead6040bd0493be48d09750ad3ff2e9734c018f4e33452a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb5796719ea9efe550051195d3eceafbb296481bd49891c949e79417f6b9432899a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0d7f8fe7d7601c628fd304d33571a665e5f25be874981df1955453728a53e8479a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf577c1e05fbc5445844a1e4b472cd9110f87ccfab81ecaed51a4cfa9a51ad77359a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1e815188f0fa6ff88da316214c7c450f37303df29a08c6619f3d90b524aac4219a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb8ffc863d1ccbdf474c4534dbf04dec460ea4eb78dab6344bd297f69828053f79a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3f94d2f7390c78956eab804f52da97bec4293c8911c799b62f91810e1181c0909a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd6654ea767c3e7fee3a29856fc4488813313b4cd34b0c6652e98e5f6a034185a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf22d01f3dbdfaecc2006e77de498c0d1a51dac06898955daa8ba6d8afeff650139a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf16b20a1d0c475300a52cbe49412fa498d9e2e56e48ab8d4db07633862ec3b86c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf76ec337b5114611964483536243f4a51570a6573b33c4f0be403a705251ca4309a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa28ee77b6a5d3c8557823007f46283651afb7dd732a73ed6f15521b1695a49d69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbdbe68f6951d8b481196a65281c11f4414d66a070d43490be9f090fb5bfa67659a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf9dccfe5f8c27b7fd51ceaf0a6be430a67b923461455323bfd421ba9391c4b7f89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc0a8ef18a0a9b4fabbc5c5a9ca19f770c6ab6c7136d8cb1a4aef8a5519c187f49a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfaf1a8fa9185e34b2680ceed508c9c96450efc0ca88d77508255dab40c670893f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc70c7f599745d5748f5b7bf72e11920b58f471a0a0fec401cebba2492192a8229a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb02ffda7f9fd3be02eae05e800fc55de7407d3bb39607adb2150ac40b5d529939a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8d3baf823fc75a24556f5bf72c8e69c60f2403908e56135eb779804cf8de97c89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf96ea8bffbd9a721869154f20e2d60d7f4e6b786f38afbf88162a71491033dd3a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc064716565b2512b900950d37a3200ab46225f30a4856653f41589b7f295be519a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf17241a59148887abd5d91a08c603f5fb8df2c864b6651f1a09ff9a902e30fd589a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7ca9d785854f09729d423b770cb87254fa56b9d32d2e40457dabb55fb8e50a659a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf935a5029b6dcec0f26823b21e9d0c57933770296ab0700d09cb3577775be7a959a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf306131e68e7e3db9f59b8304ced1fb0bc8d6f820d881ce3260d0aa0332030c559a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf791b17e59cf6518fec75a25afdf4eaf94a0a76e5397ed841415f95c885f2949e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe62fd29b5237ae6948668b971ee764c6a3a26ae7bb94ac39f46132adf238a9af9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf326e165cbf9efb501d9a64bc68a55d5dc895233f70a7b2b1a06470d26e30649b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbaa49427108c7cbe29ad69795872aeb27c519818f7fa10dadb6452c2b218c1a19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf434b7c6a28f05b8221d9fade12b9abc9813629cc131a066e2435e398b078f1c19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff46c75eab0732540dc73f9e8acc13dfab0664f4b2c0e5292fb943f7b8c815e299a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfeefb8f574e21455e1c5e6f6ccd0fa1f4915f2459c60ae8682d8773c78aedc7bd9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe44da6c2405e7ae70427d1b5b1344523367c00044b3c8a10c9425dd2401ced8b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf460b53e4b7eba2e571e35238b17c26d8d36ea6be2641ecb5c648bb5f967d101d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfdaaa4bad3ccc49e62d696777f3047471cc2082b9853085f6587d06699016e1ad9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa76519ab23d549bf048178e72664f96d428a06e791f22a5249bcc761b36c33f09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf9ccd337d4e929b3319b30185224f8a45c77f24ae3fee5ab168ca014102c32e379a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb83c8093f6694a7fd64789d0c737b47970f4f3a1bd0a340873872bd00cd5856f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf29fa0fc3ff18528dde6580744a8f001b43ed977771fb7df8ed651ffc62e21ea69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfefc8eebf8743b86a8a9c5c52c2876c90ee0ff5fdf8f398f3d2d3ae9a266795b19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb699c8d807b109a5025bef71ec0562bf06efbe2d0ab14caefffced70512ff6dc9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0567a5c414f0b35efc7876591f656282836f65f887e116e45b6744bd5432453f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3909736c0977233fc18b5ba52851040358c93dc2c88f51b10405050cfd5798f09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4364727b24ab175b883330bbb49d05d1ecca37557f7508d08b10d15238629e039a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3b63e49195eaf3599cf9b94924b67668e5a7b9ead3b9efde0d27428e07090ac69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfffb71916bb0da18626182e894842f6c901e726752dda8ec646d7d134a8d9712a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf392399d5c2d4a3df2e77c0f636eebfa5b13d9b89f321fa84c2b3f6d14d4bf5039a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe7b1f9bbd73fed6c1c4bd4e5a2d38e70ec7a62137cc6b24a64c5f93666eae2929a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff79ebb44ecd8add8e0d7bd5ecc88d844847161ced028f66429f7e8c43af869f59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8486cb17b39f46d7a31003686cb4e52c4cefa48a606198279924651cf149950f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6a24585a53a597aaa04ff24ad4a2deca244a683fb36d9fe625365e27852caeda9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf296133cca4890e1615234c4fcb4da9b0a8664391b2a64b6b2842c7d8df20ea3b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf089191e2c00b8010d76d55ccee77f2e2f0b554737ddca1049c76169b636919a69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4efa15e802efc67922e7d4dc05df833985a72e4ebf75f48af483b68f938c88d09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfed24c1839d767402b7421743e3a6b61410711abc626b0a68ac6c34b6592ba88f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf878fd702fc53dfeca0ffa72556f10ad21f014a105cdee85bdcc138d551eb57a59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf385b25aad1f9f288bc32789b3db80e2b7b83a2a1a845df30a581f62b9f3c318e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf74db268677044f8fccdf6e2e608d265c20d757bacde1fb6c8156ed23d0fcbf3d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf78ce6146a55a6d128981167739be0a0db07985cf6ab330634aea9e675864f62b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf16bf768e7701c2f724d0aa6e0b369e9403612cbaf855a1aff53e6e0e316b86139a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfcc9210b85a27826d1bb9c3165145a4b64b3879fa7e796c8a0c0bb445849af65c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6c1f8c7a3f2eaff2ca9cf79bc84c627e2149bcb9487462c8e5236d65c23eeae19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3d5138f7a44f7a00743b185c035a3dea290b76e36c3241710f29e00635319dda9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd8bc3fb2f537be26e6a15144b031d754cfd6fa6289d394c9bb8b3bbd6c3859c19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf386c07b87ce07f7c9aba4d610cc66dea4b4dc0c934046f5973b787f544077dcd9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0b3e7ac26c59ac96b28b5e5689d4e9bc4c79fcaebec63ed5a83a6e093047b1139a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1d10f822eaabcf1db689686e6cf93a7d08e96ce9489ff7469481194b494405029a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1208b222465ad704ca391d1ab12d47c7311a1ab44c02dca9eb87c62f1d8a2d139a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf117d38da931cd70a0eefa1bd9426646e1bc756f567157d425e08785a0f9397649a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf98b6e4589408db828fd2aff481b86ecba06a8b03a3c4d80a6c2b4b8616b9910e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf522a57b3cdf97927647f749e0936ad794f186e6bf1fecad651a84630a51d2c169a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf979cbbd2b669fb3837315f5e2f49c9dc04c0035c9f8fdfb41fe08dd2713ac0e09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff5bbe3ffb096ccd408bc79f9b0472793bf6aa94c7119c5eb566b483c98f532479a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf30985df9cf446bbf7230651530f2c3ec52d52b53280989488664386a8bb7b0469a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf646f551293163add854b995ff8029f846205a72eaf7dbc758897549177b2ba759a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb3efe58f598329bb745b97df7b960246fcb441b9549a7a90f670467066ff2e2e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf88b43a5dcfca446770f2bb197106e318fcf7e8cfe0c594dd9809b332a849a3cf9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7eee6ae3163199b9a18a29855ad61e9e63a35b991a3ced5b2a4e002f1a2f57649a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf475fa2f5ec0393b97602c4b93c82b56235f0217f7237bb545c92cfd3613b9a5c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1388dc717e59bbc1f7ce9b94c20cbf0ef69032cc91837c2fb1b7ae2471cef5799a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2e6b3a8f8faad7ed5cd65d8d50785afd763b0b394e0cc02dface5c2ea1d552ce9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf616fb7d60e5c0ee6b125a250e0997a13595dd7f41474bc3614927e4c93953d929a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf236b93023b017a61c135365c3df88b639b1f21bec48232adce43f2daa47280949a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8730634b344c9b56e7fb4a68642d2dd41704f6ed37331400165ad7cc7380c3729a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8c2f8ac1b4019c41fd4ddd49f82bd5c7c7b5f92ebff438d8e3b34cd5f70ed7219a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe0dbb93dcdcee7613a9dce27ab651994a96afec88e058c6d6da604a34745ac379a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf644d5cda3604d39db09a80c1c7e0b3aa766b1c40914b47f70fd4ab4d8a942d629a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7893a826bb23848d1575dd25babfa3f54cda427248b396bf204861131d57a9619a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7d605741022cd8fb9ba0ff76210b703e7243b4a4bb23fba5d8e0b835ac08a6a19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf910613502a8a1d558b68ebb05e4e9b79ab3a85e5f12b250dedfd6e75b2ade5129a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf02bd089e7ae98e86181155675a82d55f274d215c5ec208f778c0598e10abf62c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa10211eee15c21589eab4ea944767b830c086f453cd779487d1b806ced6fa6649a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd0da36518a76c536637f7a2e88f0b515a80085923c53d4142652a175db6565bb9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfebd6aa7129af5c5e1b16591a56a3fb10bf90403d713ea65871608d670d9ae8909a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4bac3dc61814bc230c5fc3fb786f7f93ec7940863e7fa03b43aea44b54cf9d829a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc53ba54a64a080e4bf32aa9636ddd525ce51506bf0304f6329c3ace1384ae7759a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe6c11e83e67187dd78ea5c2d042fe8a31a2c5f5586287833fdfa4dfad388b2369a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cffa4dacb825e630bdb309f0d5af13550d9a70ea0cafb473dbce4e623f09d4277c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf57930a9681852228722a777fec3eaa8e2c611a5a86ac98b36bafcfd4c2f539679a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf24303c49014195b267643f2eee5673b835457dc74396d1e64f8fff8ab034590a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1e0d2975da706b796fb40718e2d9ae26798f5b0640dcc83688c9404b9fca874f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf70c85b2b6aeeb935e6474446edf6141fa29cd1d40de1117ea0c5220a547aec069a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc9ed5d26dbfb39ec2cbeb2190ddbf5f36c77807549ad1d7233214fc56d9573449a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfda140bfe956394f48f283887d226beed253850d1be19fd3bb9676b56a156805b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6d414494a3c8f990400f9e731a50bb5452c3fe818fa53577a642eb59674773bf9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6f9e538139bd775b99f84fb19e1d10012f7c91c6e4e28129f2a7cb1166e73aa39a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb172fbd5436df1c213de3c99eb1f13a2671417306ed6aba14c420ee270e1d6529a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe75c2bfb7a5df265a2aa3d9ca91173c710b607ce38168593b6f2baf37c843c2c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfcc0e0c392b0764fa32b82c12043274eaae3ccec82ba657fb855a800bbdf7dd719a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf9513616a205078c92e1cf865011cdfe783dc73f0a9f59e1856d581a4b38bca1e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf75b1ba4a3b85be6e5006cb1fe9744931ddfe0a2d87e6160a3cff1a709a0c822d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe2a97c84d7acf728dbe5716da70472102315dcbaf34c97e8bc31d0cab871938b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cffe52e37f3c2b8e881d20d694a34b2d9f0935b63aab88d1fae49307ff2db6291e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa78f1d7a9102ed9e45c8731f85a8aabad40cba9e28dab1c9b5c3d0876694b0189a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8348abba99026d5bb7a58ea1f7e9ccfbbb8ea86dc773c3b4f901a16c74e2024c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf069c6551a6d078238fbca76e995200b1e421fc224bac507530a44fb0a6a93f359a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6a2ab823a46bb98cd131c31fb25f0eb782e8355970b447830bd129b2b2da425d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf5bcfa2b1c697438860e6bdcc56bd1402a3341ec5054c3e4fab435fc0d88955e79a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf003da035e906e1688fdfe7d72ce524447e23c079dc478e2b41eb599d8ab382c09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc60094a0c5c495e3fb5f88874e8c060c2e0ddfefc2a53d1474936b1456bcb42b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf51f2bd65b3012509f86e9402f93c1466f0bfb56788248c3601426ca386ee27159a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7674194b296388347c4f03d9ea9fc9e47ea014ff70d3a151d10d8750ab4d890e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2ea8484717c0662abe7571eb5abc488da2b8ffedb6ebac93e67533031a393f769a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf18fb6a7dfcfbceb578aab043a6db13ba9a555778b00c3471636008f05a3994b39a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa5d5bf1ef38cc2c8dbb7a932966c4f0da0ca348d6176232838cc425e361df9c09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf71dbc0635a67c9781d0fc56fcb1363d330d59686da94d8c548facb9210f4e8d89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff1a70be00919d9c5aa7941f07a38e6430a93c0e038493d81149ab1f13e1c74fb9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf54e75c3ee2a6b6771a78f10686b9dca4c66c96baacacfc67ca410fe961efbeb89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb146fc791f956b00b5975b529f4930fd8f31e220f63d9d2d0fd542706278a8a59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf07da0752ebfe85102f13ada98fab1654d11a27e29a9f8c72d9d037fa3776a4db9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe52b7d7d6d22de876617b475d31b2ae460954244fc56f17a5625071380bd251b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf107b1ecb8b3b1d4520b21f25b721f73d9e83e52d6d43c0d7ae3d544a219cbe309a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3a42a4c95fe073211ecead25988b41b0dee423fe9b0ec5383103f88e46b65bc19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf239cacace335ae37e846e27ef37f2a8af4804b648c3fd83649f7a6f33ee0fccb9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf87c9eff9e266d71910731236cb5510d8865bd047670984112dc9ab1c3860dc829a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf49dac2fd381362f5e3c688638093cb27f4b8ee56d078c869ab5b86b75857f2429a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6ba4b64ca1d7920dab32bb33d89ba296d613419f43afefa95f5cce85c074e38b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe47c67a8977903a1ca7104588ae8a0db320b01ba0eb113a10677cf399aac77bd9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf754b5370dd63a790eb2c91b846cc4a6d9535b55cdab2ae3421e49389a92990e39a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf47cc96aaa8ab606a6910f76dcfd42c975df893516c9e1baa6af5e3c8decb08eb9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0209bd5694f4842c1b19b9ce55092e8fc4144994bb144177bfa62d5b71858b139a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf143802472e0962ba6ca940787498695c8c037552283d2573f5a16a663907b43a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3b543a25226335585b3a99fbfc7166c7296f509f9eb64c695e95fa29de785b909a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd9f5d6d3e1662828550983fef5a3d2f39e69287a725686cac73ab81646b729329a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cffe85496bb0fdbcc2cac84de46b102e10f9fc949e886e4271fa0774f423819d689a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf99f39bacb759be03934fc06a183b513474e97724e4307ff32eac09d466a1ceb39a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cffe5e5f325530e87f028d89862d3aa4bd39d26e1637d7c94e52a6965a86f4ff7e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbb602c2a9c3cb566292b56b91894a0355c13cadf02fc7f354787955a7bc6e8d59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf608c73e32760ab4c67b0d2c4922fe978c17b9eee87ed1616739793a5e936ce699a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd04cb9021fecddf2f43e1300ee95bf2ff569f13e7f2901706d53ec616151382c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff0b23fbd7959535fca8992a87c3546a03275e20c1f2d7ff797f9f45968e8de019a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4d119eaa0cfbdb9b37a88a812becbad830c1755b2d31ed1241ba7df9d932ab859a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf585ece47bbfd7b53a92ad895e7b4b3966d963b701bfba291ac8065ab7f4790579a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3d4b325283e81da9c91da60e1db0fc2332d650107681fdcf3036df6db00507fa9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6d140717219fbf4f208575a087b5b3fc874cf208b9d3c2b0e25e0ae16eb152db9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd5c19e58881ae497385296be296d564c4112e1b2861749ad944ce097c9e4c44d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfdfdc1c0f61a1c3dc4bfbe2dda47344de360447b3aa2a48276dc53f512bacc0959a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc31e79d5b261a09e2682211815a47f7a75c0c3c82b09e12051fb0ead0576196a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf355fe478657704f8a50d4ef1addb9a324e9bf47776a1865ab39713acd32db0379a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf25a83d560382d31d344f1ce47f817fd12667bf031512425d5d624ab004989cb19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0dd2a8d862517d99ec4b8b6ee5fa9511ee60fda2e9b17499b58e64a5ca041c7f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf714eb68865449ef2b9c19c20c548270366a458e08e700b8aa07a8241317702e39a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf60a77d5e9ae68966c2ffaa79a124c612bb084b212bb9ae64e5378436e8e2a81b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc4e48152c2910feceb4bdb286faab218e4fa99ccab28b414959522c5038732ce9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc426d9fb46166d8cbf90aa18621f84ebbe974bd7479a37f6a18818cba8b0e54b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf249bcc53bc15f9fbaf28622355aa345b23010ce9d8d11889e2ba170b70eece9a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7baf64b22d831afa28741054bc11551ab3361d4e7612bc3d6add4d8d84bb95059a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0e66f4d9866b0dd7fe639d6814fe21f17ee355e0ec08c8da33a0a85c5d2eec2b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf01a43b5d54c126fcfec37c7f189a080f071d7c7ea4f6b9df7eb60d2e93a824d79a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf98cf961de828a1fac8e3352595334685e4c82d07c2aaca5bae6194e19335f4119a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe3bee1b1ecb14f7090d7cc795564bc2506be917d3211306610cda0a0586f7d629a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfba39d4a6ed9afb8e3ef01cab930f253d3af74502b17ac61e9f1ddc802dab6d689a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf370f70e269887c369baa5bd818d8807af3e12d831a261d27eb8de43484c1c30d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf620a7a217da50c11a23f2046bc69d04862c7e7c5722aa11264a683f461d8c3dc9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6b3d9a1cc957957cd917da31eccd5bd1c19ac36e99fed8271d96a84ce5ee240d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf26003d7c53dc76577a59c58aa71f3ac11041be88b30e0afb8400c708cdc7af6c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb10e6be0fbfc7503d22a131a4725b0f2602ab9fc9acc13d56dd1d71bb86c132e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf716d6944b324390ec688e47b577a0748c5bacedd1da0e65b78bf9762eae5458c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf5b7834e3433d1f3a04f5ce1b815ab135e0a9b95eeb005443cdbb581c73e7b36b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0d65b115eaa4d5d553f9797fdeaa86ee8ca14e28fbc9d84d655873331393a1f19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0c0ead4394eda96e3b15eb596e355558b8a53feed0b2d5389407ac692952cb429a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6518d937413d40cd34a5329a43109f71a076c0878bd3538e2a78e019b08ec9999a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf13c9732a39fcd812c676aaab8aa194ec62d3a19ea7de95f9d8534366704c260c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfee55843195bd6ef40696e66e691bb93840351776af3b8b999fe9816ea6a750cc9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff591ead48b59f89a872191d00c8927fecdf26620c80071259a20bb01b00610549a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8eb2f10bbab70ba12adc4f72bab2919af26bcab71561cac32037da08a0cba4ac9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfcced5db13a6083925d071ea29d9caa5e1038baaf1abd4472a8e7f8ba4fda95829a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf90bea19ff27b872a83ae0b1df47e75262693d7492ec271d21ce22904852056f99a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd02866df36e836fb971bfb555fa5e57f4da46db0cbaefdfb55f2a3564d0048cf9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbcfb51a6726e4c0c6a3d6e60dd69894ed12fe9581fa222e712bf0baf603e00c89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfca6cc86e6315ff9a996af8da1b7d0752ce5ec39eb8600a879c082695016811a29a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd66f028fd9108982e67ee98ff654ac8b4ba6fc2e85e46cb415e4e80e36b15b789a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf21696e0f675e1bdc350b2db72e7c6a2a10fc14c7a25363b36fc91f99e21359db9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfdd8f0081c2ff8a749fffa13cfd3ff3d5acd996361169cd851009380a8de184d79a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2df28816f6279358dd67ecdb343d30f593bc63db907c90cdcbbd83233d54b1689a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3d59293a957fbee9c6037922516e18822b10ff755501d901590de0f0108f22009a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfff1b06ab48ccc2b75d6298c9c7e3e8306a0830b4f1f54eb09758754d9a52b3729a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cffc275e8356d1fea925c20b9d222e31875424b6497fd251df5cece4828e5131889a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf48caeb464c4b17bfc9fb241fe384b99d30ab17066f0eed71aa744c6253993b7d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc33eae384aae24378df28a9e0b738b3d34134480646d9a9978d4423b8408199f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf94ff4298f5c4b0409f1ca270f4acd2ebb3c6609582a6059a11405bcd821b08589a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbe4b867d246cacfa10bc8918b6550a5c1d234435c0fa2c71a8a923bb8735e7bd9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cffa4ef980af05b2f402f07716539546790ff137463269bc7ea426b64f7770a5279a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0a5c0545d0b346fa1f6c298e875f89f26374961d061c323536358900ee6145899a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3e4d85dbb25296fdc5564479ea0c57c1c1c08b258fe106d0e9496dfe2524c4059a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbbe93e905c67ed35192c51d6526973044e1958d38bf848eaf5edc2c8fe6b70b29a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf956031f3b222d6dc59b5274bbeb3ae272d63d893e8ab4c9ab23f8816201e9b209a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf000aad5dd07344e529830a590fc16677d18cca67fbd4fb68362f18f3a5e197949a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6582f60813db6326e48b62f1e136445d652e6aaf33e8d2f5a2f14edb678f8aaf9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd1cb4e6c1d7ea5ff107ca4bed9d5e58044be5b0542dc1d6c8072668786efa9989a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe5fff08805f2192507cddaac65482aaeacea7034c506e8c7953e7ca37baa28259a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf71ce0ee63436b36a7cb8cb02236c56e97626ac79963eeeebb00d4ee5be242e419a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf5eeac96852a5f2e8770bc454d0706d737fc91e5860c349cc5b130fa393be86c59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfed1d53cbde51bfd88ea84ac7ae88cca263b3e49e48804cfdf456c1a83e0534cc9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7bffd31464eb1b6d10a837729aa12826ed13027c86e853f4af5fc9e70861a2869a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd67bf62e85fb14593f6b96ce4e359fd3bdc2e860cdb34f3c74068df48ae145d89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa2109b32b362211347f12f91e62f5b4777db93597e46924b211f56df7e82bbd49a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf6294a7c92167a9694afb51a937b0d603b0e3c8eaef14c44e7c13435a33c55e039a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa756181b8e9706c27fd2e80ad0807b8b4a9c6ed1b6aade2ea1cb27fad60407de9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfad05766416c4d4be00d789d422ae92f0adff0a82b82880b2f2792fc7befb514a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7acf817d06bba607c38de80f189392fef264b8b55b53fdb8f7f8e23a8abe8fc89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd89aacaf4cd81ee7682a9c0d0bfca3664b638df7b4c8fc2f8c9423eb503e00169a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2996c0334556cfdb8ac726555d8d7521aede5845968cae40073cd76d293b397c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd3bf4a1d41677dd6e81924dc6cc2d6671f6814a9200d946f3635f0dd6f36e6ce9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfcaebdf624ad07ecd65dcbc0b12a36010be881c767353e63402eaab54776ea8da9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf9cc96d821abd1e7835239732f2f48a50070c66626ae236ab3bd930336983e6b59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2df7c6c4b3d101b750c50c116ec161a175b87c035e416fc2aa8ee8e2efd005a29a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfff4a5523f05dfa73748d7de8360ce5854c7757880190358269c08702fb2e33569a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa604be0ce975832ae81a4390f0e6a5c4283aa8dbba523b064eaa18c97291f23f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf158137a6f72bf68065c7e2189ab9c17c57aa8b63b0d68ec4d822c75d957896b29a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd67f99885c40ecbf8b875e156005117ec9e0e190b69da66c33d371eb1ad6f00f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf899d18c062d7dd26c086304135c8323fca831c98cc0c7d0dd606cd4d6dff7b9b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8c879c207406c9cff27969ec8d29a3e814e859e9d071c0e716ef330c960c93ec9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf40ec380a7537059a59b335bcce1b2acbb84c142068cbc910b927f3868dfb36079a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbc6ae30ddb672db29bc2b5d84a71804cdf5d5a56fa263c6d7fc8585075fde2039a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7128603e90bec23578db19f854969d359bec9034d54b2910e2cbfb45f0fba3c09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8f7f706392bff6e394dd036d2aa03881c9f8104cae648b17c15c5810d27b08fb9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8340ef91e2a714e8089027b56140012615aac550e8eb844784cff6dd099a9fd79a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8af0f4a6c5db0c920b102f1db6b5c434403ad4742dc037f9dac3490242a668fa9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff62dec384d975fa4968412d1b27e4fe8d53dddcb7308a67bbb80a5a1c471cb359a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf81ee32caa6747c7c2ca10c19bfaca4586497b228d59e93e339ea64ac8af61a449a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf07501353745aaecb06c90d0edd81c35fdde59fe406a1f8c55a2b98c86cf4c9a59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb3bd021dc54492529c2d9d6148d2a77411eb664067cd2dc5a1c4824beddba2a49a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff329c02e06ff2a6695831f1b58c49a0921a0fd6004f4d125e22867583784bda49a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfffc3a16c3aaa542c1d17449456ccedcdc833db8f876b700cd784b6ed39cd333b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1fe5879718d8e36f720c44d188f15cbf3c73f543844fa0f4f3ee5bf458e30b9c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7845064a269d5ac5a4661fae59608be855ae90081711c537358e60488614c4c69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff21134522c0be3dc1b6a17d8ed5b875e2e3133d6f28dfbda2620b9ae76cc41819a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfae0afb1a4155e84f930c26ece763c190f6f91a9edfba52b69156c57e1c7948109a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbea82a7654bff0d9784ca0e20175a837ce7f536cf7abfda9112dd0b8702ffebc9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa80c4b446eca5ad2bccb52942f1a9dc225ec4181adc431d0b2e3fa3e32fee57c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2a2ddb3891ccbf3ba2b29d813eb7540e5ab1cc83c75bcf08754c5dd39f1c32c99a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf81e0881e92c7001f5e4e466293d6099717d86f1007c4c5a545202fd771ed25929a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa407bc761923c91ec3a66ca8baa0d3ce8ca49b3949d9d34ae1166f3bde4e10049a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf5962ca8f35ce5026902131f1795203084dcf904d4d260b0bf5c7732f68d0194c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbd45ab4598be43f59971597c6d2ec78372179f55387da0ba8e8384c5ff5a6f3e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfca0370d7ba1bb51bb5827b897c5dd9b9fe053a45b3482f5e4392c4f2f0483ff59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf22fe054f0bc327b5dc514dfe0920daf06dd9c3437fec81c14cacbb44d703b7bb9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf28767c58f380ae4bdf4fc11ebd1c3c7e47edd4d245a745665e981e73d9e5d3a89a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4b06f481eac858746967b462fc39cb6b31e4fdae9eceae9561dc3319aa9e77389a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc7bf7af6769425662de8704a3d50975e189bf88cbac0fe3f0532ee0bdcda27f09a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf645e5b43c1f4382af293c1a926c734910d21a2dda353f007c8424ef23930c7f49a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cff0726d8592f145502b88f2784c7d4e83ef559ee4b36c1cadd3dba457883efcd69a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf60506327d37cc5eac31a6c08cb959506f4b83d8f0dba7534cd37ddfa973aa78e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa6ebf24dd4b00d672d8dea0c9db453d82d58f02c0dec21dbb2bd2be6035da34e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0c4d3ff13ac087f0ee607005b44cb9fc54864edbdf1717e256708da99b809b479a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfeabd0bc602dc657c3557ca9bfc2b92b39982d12ae2b55866e601ba36be4fcc089a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf56ac2bfab3d8da41bf0e8bbe12b677181c12b0044b0ef31265f0e94fa62018939a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe40951de0002fa86534183b46df75bf2e202a69e671b71fe069f60c04ceded9e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf13f08af0353945318de106c4d9b0f05fefeae46954fe6691911f4d2f1502d0799a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe03ad91c7d5aa9871a622601f3b7f31e2d865a9ceb42d63082560486972048009a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf83c495ccb1d25b5cb3e3ff81eee4aeaeeb654754a6071214a7b299c95be360a19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf74cfccf9d9cb7a4f6c04b1389d7727f8b554a81e4d97bdca6366321cb919f8829a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbd256e878cd15d382e9d08b0f8910accdc4447d05010a0680c522cb12e457b319a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf884fb5bf42c84690f1ae81af78b3286832c52abf177383fb29cf847b69e5884b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfada3b75f722572a832173c9f87f2ff2b4b481e85d905388338dc5e2674c43e579a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf45308c70ceec5d404e1615cd329ac90a2e73d33d0ab8f2deb9ddade37d12e22d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf693151249a05ada4fd448d871507f00653b17bb9e9b6af80729be57f16940b1e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf505d1c8c897987ad559894909eb162fe5b3ce48bce9b552dda3d8ed9af3e84979a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfda8a7ebbf56ab7d8307f051c8daa9bf611c9c0abf356fcf4117e2cf7c288c2fe9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf983d54aef4203372e3bee7188781782b06e66520c0b416b5ed35a93d5cfb5e909a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa405e4fb3f348c85e46cc22aadc25010d4ec6086212479e26c71cf57645c128c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf51268ad7d73b84aeddedda6fd2a61166434ea74af2d1c5c13f61aee86752ab2d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfde9c74f03e175e0ea18bd33471e2b3201347bfc74bcafad6fc1a36d0cbd9a33d9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd44ef8f20585f133ebffd9ae432e730011a466cf56cb86e457885a984ef02a069a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0bc9ff028d12370c660502e9341532513f1e579fc76b402c7ab3de903932bccd9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfcf718b7206a874c8bfd7cc8e85cc088fc315db2c644718d9966ec38cd99c3b819a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfda2199d37bcb7064aa016bfed5b4e6454dafc5a3e4e523523f35745344e519c29a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf24a15df471bd3d913574a95d2a9ffca012a0bfc36b92685fe61e2b378560e18a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbec6c6ac904cf3ec2f253e6b10b29a2d8ac14802ac1279ccaa3a40b2673cd39c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfffa253c26c1b402757597e51fc651d1f6cd74f94e86d2ab02a6d2ff1c1a3e02f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf8aaf867a82925ee6e224cdcef3fba3d3a86341968cc1f4b3642175a09f1089039a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbb0da4f4c6723cba0abaf596aa79bf9f852ace44e0999d3c4654f49c716bee969a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfda468487b59adeb3e63876754d323f1d259cc06c116a41b27ae619ef02ab9acd9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb1aeb673703e3da61801515338e1e4091e07c00f633f69ae2120e83579d7c0119a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf3d58ea957e4fe014b4a88710e0fd7ae988bcf936d4c500f48418dfb82597fb2c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa6694a32e5f8571c36925a2131563e784763496ae568dc25c7ff8828c565f7339a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd562d74fc49ee73db0fc2934010ddd176f1f9c9f9b5f0c41deaa72aa3b2b0c019a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf075a7c3accbff5048b472768c0cc27663bde81649f87eb0a3a746953a4c1c9749a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf25711e24257c040913c1258060a144ddacb705a07dbe8538fedc5e6f7a4e3c0b9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf96ac5f49c64792d6c09c03eebb88b7bef26c242389c2bc7fb7866297e3a098749a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfbc80d441a82c6b133298ee80f83479dfcc60b2178a689c7a60405f70499ac7419a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe62bc67e6bf0e2f0d416d346b46a85ee1a98ae6141babedca13fe171b604b3ad9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7ca4833f899e4ea17ee29c8ce53af1104e211f6c669590ed343ed0f10a661e279a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4756698225a6a2cfa98fa6e7cd7ec80cf6cb0e90e3f7d44de495cbe19807b24e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf94f36e9336da9b5f45c38481ef0b9420a2af3abe3cbfb5e8f47b195be39c3bd79a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfe26dd67dc95ee3494d82bd4fb6b8757ac8d85c42c45e290e2c393eae3419b4189a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf84f98f3dbe88facb0a5e5c30b4367d5a6033c99e4eaa9818a4136a8bb0ac27ce9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf65ef40dfe6c6e47e7d0638d88670702ead61583005a32f8d6369a791db54077c9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf0e3e8849e1e4afcbe26204029661fcbcf7db2c868f1914a321df5f94b4721f879a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf2882032225580bdde629b9e5b163e34a9f5ea34c2d4a4606e09e6bb032ec132e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf5fa9c73b9aaabdc65f444ff01502ac458d167e6173ef3fa4f08f6f407a98257f9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cffa6a3c7a6162acdb5947e44d5a971f48e001032e539c45224ca99947d0a9cfbe9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf77dcacb0a6c1f900f4935524648dbf4f036357c612dffe0f1c3f849eb3e96efc9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf4b80675fd40fba439ce51252aae1bbbded8a0d8b55a3fd42b8c970f6166ef6e39a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf7ec3bc2a918e95363fcd21e4bff09cdc6d8cd1db0efead72bde1bed18fd15c969a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfb17c33f9595ce55f7d93e2fcd835845620aab9f1dde7fd71b4b0edec2be0cfd99a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf5c22e9d88ef65fa7530eaf94ad544a7fd9e13fbedd5c3137bf3ca5211878b6cf9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfd88e1a5686fdadd48c1cbab6267906a2386f2a00c81472cd4b3869fe4a2352ce9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfa2a7f7ae47f4ec85298dd63f7b8ac6db104dd07abc2804a49072274b3974363e9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfddb30020fe35381c51e551056a050799f849f22948c2d8a5a25ec9af8f5018209a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf08dd8e8bd31fb406d5ada901d41d4f796ba1cd4f707d86fae7f221df649e51149a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc3144a9a8917a415d6d3fd373dd69472ea0a2be7e3625d938b70a6fb96a467879a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf38a443e4623ae2962e89870eb997f37637a90a25abd26343fce192a57900edf59a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfc1665cf825d47134b81505bddf7b9fe552f0e5bc58f8fc6786948851a1a15aea9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf569cde4677edd80ac0a9825d2e591eb7dfa0639243028387b529e595aae160c19a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cfde732d419e6b36812da67bfe2a15845981d53a953bb3cd20e17a59ca4974b43a9a2e646ef933bedfa63503f7c2484674daf9d41f7e6822983b919e5e952f83cf1926be616dc9806bfb094cfb07617175a51a3aa73371da1344acf43bb56ca2cfd2e3f01bb02058d8e6368d7e8205a8f476dda94251ebfe275673d129b5c01ec1cedf81a7200afb4054ab296ee3c8468e24118332b6a99f0075e2f8148f5f1d917336e4cf97adf5f0114759176842596133e86e735d249d5151f04b5fc35b289c78e8e53ddfb76f2e0a8e10348d2d97a4bf68043c0e9600fbffbcb49383d6481845816683d793b5c85812c2c4718eb2041c80dffe12712aa40c7e5c011f96a19f3e8497bc88566dc44468fcae9e0bd9088ad655c529f9b9dd973352456a5176c7255cbe0ae3ec01b56845b0d03a121e2f2eef1815b019731507a6f19fa140f148fa9c3f7ce155c34d26ef7c05a5e87f09daa1fc705af7697f915fe48616a7c9a83e5364c67737aa18d37aa321765df8c02df87be67b593ab11e92e38e8136b22ee9400e7a5c38e6e26d352821208b985881bf20c3e9ad772dc6cdb363dfe54ea215807a3d1f1c7ea65f81cda5d9c94c1fb6567018def58954d31e187ec62173e1f697367adcba528c9de589290256e4960398fd8d040c413c4eeb4df39c55ce15d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e553b4ef691f3c348eb7dcea77c14e94f127b2999efb55366fe37753a73345121dbefdc9f507a1bb52b837db76aa4b5727daa0754bf86410d873ad0a1c3d7e3a0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0d46f7f4989897c1387e3039977ac03a89a5bb196ddd9a006e1c945d92fa181e0d03e0f492d86c6546afd161fc9a283effbb015ddd30e54fd232965e0cb5cf42d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eba4b17b2273017b13e3bea0576bbf751ee6993dcdbffaf5efa140be34b2a4438e084cbd1db60623043191eef7f35978db42b65a3f427d08e33c0a2b562558bb6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8943a25183561f677db66724ee6751d3fe05cac8b13eb10f99cf6f363da45bbbed0b6bed8217da7210e9f38d7663ba7efaf1d05d11467a80c846824d6ef1e071d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e86aca04e1c79f094301b7ef8deaeda3f09e9e392438af2a6e2c7d698da8a545afc8316ee8b4c2045181020f098f91f7fa7d4736bea7509624771b5b3ebe1a8a5d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef483f8d11b22f27a7a2a4692dec5ee100dbb1cd264f0226fe4a8012ce0114845d3507f42dcf8e88493873b3e6e6340c8eb6dded44141743bef22c95b81f6758ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec8615a4006087dccef8aea639d4e2bbc2b123d34491c0ca00b424e587f56746cd6f6794712d32669f0898d3781b87f8ff4a95aee789a40085531798dbbe27332d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebc8face95ae6897403af7fcdd93586edcc0f5fe4dd6511bcde90df323c07779291e78ffa29e5c8f57aee586c4c00dba5c44c9e31dfe3e3dec190ecbaaa8ade5dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4773ad2f5ef40ae7945fdab79581c508624caf1009ed22861f9371e50c7e067fa6090abc6fe14ec4bc645e6a0267ecad7dcea543824dbc309f2e0754c34072fcd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1ad1b0fbce699d26e39666786dd24327e7fc07973b0716624e1185d68270d89d9f726f73b81c2e3b97f26104aaddaaa0b05985da8b995e37eb3915d5a8f72f1bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6052fecb4625a096a125f8c854c42de4bcb1e774d8d642de08cc3c575137962678627c6e002ffae2ff8bdaebe27b1d12fadff9ba313b74d8b8764ea9a6190205d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1c615096eaf04f10944b65904615b828fc9c67ec9be9619ec43abb2c6b8166c99760c9108a435f17c701f66db1779e372f9d3093d888b9890c90cc4ed2a89db8d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ede960d7111d4293aae3c34f3bfaea061e23569dcff8526be4ad2ec570d35800b0d25e8360975b6503705c8db76d5c0f584d9c92163c8c2bff583de3a10af0894d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1933fc626e69efeb75d2680b31d3020abbef5a3786aecd76389bbea5d7a2c85740aa3f6337250923fb7bdc5b80ac37ab157bae18e595c99c96210905f6e0bfe5d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb7f924f7eee28c2ac93461a74ed55fdd0d1ccd3e50e0b1fd3b608cfe9d1bc820da2dc958e1c0019df355bb2207c1bfe18c67f2db6e500434e714fc6b96a2e76ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4d6f8235981e36d75995eaef2abd3eccee0765f95c36e89cef70712728ce598ed437e09b0067429ff6970f95f3b633a32064af88a8eec4c27a9351a00584797ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e17c36cbe503e2a004bdefa50f6da26509bac08d96d8ca187baad3546c7c1d9b2123c9d19fd215dd314d7295baad3d97651f3ef95e3b5dce93eae387ba772c947d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1af489f9a2c55d3fb77f44bb7115da06176dbab9f66c04ed85db7d7f8e2dfa64a8d96951b82753e9924c149c3ea6f8f89f1d45f6f78c8ebd71adc9c371b7c1f8d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed6b03731b01819a28cecd05c58e8533ddbd04d00e22919dc99d81cec790f69d66e4ffe1038158b492979143086b1bd5e73c7767079e2e51fd78c7500eceec0aed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2ab6c8d89b361a0513a4c6ef6fe7971da31b588780a5d76d869ad8a0436eaea11c59e0f9662a5219f017033faacd60cb9c80a4fb6f5c47c08c654b6b96613978d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ecba4a2d827f1f987f515b58618494cd343cfd623b111e1226bc54df6a07d2ecf39e402037a8b5040589df61fe8eb81e2af15892298e34a8c2e0c4377e58bdf18d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4e109e39c42ad6bc4aaeebb8d8e6db4dfacb67cfdb163160ffb9585bbd57e8597d08652a51a731758ad759e0d3dc25d89d811945ac5df649806c4cc399ff9d66d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e9d44cab3bd0da81ca33e08678e9fb4532f6b6055eba252417129b1707fd613b89e3b3918d4cde904f0024fd70b4f685eabacec2575166ceada8a91f144d901ddd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ead9df741d490c2988a583b689c9d8b90bc7dc5c74dd2828407e3c00127c9886f577da83e72c77d87bc5eed3a149795b8bb39dd4b8915b6f1f6b9171e894e3edcd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ecb4958153821d143924c0119ed073e060f168478f89777db1990a343f7a4ca97cdb415df4057caabd955f27236481495ff38acfb78a2bdc64c2772855ed5264bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e08f7442d0a57ed42baa48264c3be98de58196213b5415d5fed58aba62400c132cd9f292460e3d9222555cead9b4b11850c3c0b067d8111e7649ebfbc87aae7a8d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6fb3d1d67a2c3e396aec24e54bf47c89eade33d2122bfc02f63568c6a9060150110bcd21d49594d8389e59661fffe38a2d71e1247b7d91b72a2cead6ed8f2d71d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb25505c83ee67fd585bce2e16f42b596094d42d84ee1249b80d71f886b43917a48841cbbb2bbda8881833655ae027fe9089a5f3d559ea52225f0ae15141a98c5d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e70ec3c5b1395a773033d005431b35a07ee24a15b2040352e126e8723963b19172ac2688965758e72412ae615ecdb5177e2dcf37d26c5dc1215e90c5dcc6d624ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eec5a9abb74725162b7cf29d95c4b3c46153f94486e5a6e0b6741d13a0c0ce38c674d02abbf21eb33722760392942970f823e2ba7b5cb1debd44ea0161bae635dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e99be5b91ba1faf3f35a91f640e94bc8794bcacb36eda39e48b3bdbf6ab7ebfba2b3b79a37e4a17f883d5cd249693615942eb8a6cf1dabc29e0394838cb061135d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2a53ac1bc38f402f8845eff5a4bcaa69cea57481146adec6040541b2183fe3790284c22b771fd8a6e160ce3f72012e55c24c3d6e2a82bb7aab0cfe03bfb2f41bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6d5a590b71aa01b88bfebce57dade73a61da417016e7c49bdba231273e41676c87512e44f5c0100762ad969592b9dcf1ef32e16855ab03ee47b6235b9bef0fc6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e08e318be5b6cb10cc2880d21bf8198385522c6f71483bc2c2729d1217dd5619a43bd8665bc244f4980b2217fefc9c9a287fe45914e1acfc772d3410e002e0527d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb914cf80e70a1fd0ac4cd018475e40eb86553904fc9fda6a06fa48f2165860dc207bb37edaca9004a46fd77aaba5e1120dd4545e30262ad50b990f1b3c9832a1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e86bfa9a7747dd80ee28c79403167ba10698e2fdf406f252b7cc14250b4060ea6bbddbc1eb50830b9e1cf17843467090db7eaffb842129a2634fc77567731c3d1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e262f639d6da9f9d2d32a5bb14d3a7cc28f2bde1c77e31a299e3186c81489ee687fef028c76fb61980981fb1c721b9bf7bdb3f2158d94ad047c7156253793de56d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee13e060795f8eb9532e91449b322e4fe5b6b501b35425446dea26fb0262388c381a84cbc2912c7e397b06926babcdeb4466513943776f46ac83f3197006e1c9cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee938772154e6ac1aafcde2bd8b514f2270805a522073b1105d3ed5b2baaa742ab1eeb360c3d382fae625e16dec9817615bf4949fedd7c7a057d54073cbe6a4d0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34edd37ac73d0058acdf6a46539a8949afbb65967ce2ce09a8a45a8f17593f39750d59aa46283e14914f0c8e9e632d5b2249de9053f6a4c30fee658ac075af3ca8bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef8c214adc05569f38e5ce3676a8b798f970d806f4a32f8e61889df8ad87bf673d87d4f480c87df6198bfb2d3bc5f19e58c3798d879e1d7611166a4f3516210cdd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2c29c016e0f031da0e41462e4511c700e7e59706e3a916657044d47c5c0032e2ec0178c2b1af823a044519645ec550edcb2c13daa4c05245f31124e531fa112dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e84a5b779ca0d12e64d0d0b0e3243553e23adca2e6ea51318c3335b65a9661782d4c91594e8b45b4e30183880e8c83cd52201aa822ee74b939b20f8f1f5555582d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e52082d453a70322428d17c13b471d050e0ecf886e0e0c9593ec9cccbc9766ed6be753a32e79f8cdabd827a94f6b7cadf63b0a1c3041d4a7c1188eb3c86d41001d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4360c60cad58496d9a7db3f9a9073ab9ef151a742f859e4b2702b76de2b5e503080333fe53c958d24b601718ee090d73bb4b749dcc6da9a8794096783c1b8cefd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e29b97acc7a7fea503afaebd26cbe701955c56cf5a1bfffc9547419af371bbc3e60850a997c0cb3d5562bccc757ba3ca568e08a8972af5b801053dfb0d935935ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0f31cd08a13491115a14eb99945f3f31f2f8051951c19063064db5fcde36acad43f74ee9fdf60d9c4a857ddef0aa23b781003f8cdefdc484eae2614c2090695ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2e62c0e2c995b17e6cf948793ae0fe5b180829b7ca3589ef9b4195c5aab0da91660ed2a441337fa1365b8bd1e8c1051d7f00e42e0c268f85b905242a78d45c3bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef3cd9ce1acbc28c867ac87fad1551c7eb88e0e212157bf0c2f0fc8ef265b8e6e1766574a98371c7880b175f1e327e16b7397a34aa85468017b7f01c2b1b668add53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed652f38abbd1fe64e6f39b1ce2351602317be9811d05b68b1da3798d2dd308cb9ac15a31507acea0c7343a9a45c9b5b1acf94e73af35b64811fe45ab02896b21d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e671e3365154b8dbef0bcabfaf3883bb5b36c1980418bc98b60d1f0854fc8e24512a4fe9b91d23163b722664998833ba72a6094f03c8fed71169760b12a1b75c1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0c811d24acbb006c64df74c0c37fba4fc1e0aa0e3285a7756fb4f69171515853b7566e6bff75507341806dc092532a70b590529514be55d872e3f3de3e64688ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34efa48648c5953d247da0e62b2e7ea09f7a22e4993789711ed1feca373652d7b2e23e0a22c0eacab5854ce3b95b786676cbc4a8a0c97a3f2f7863150a78c34f1c7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e91d5c14dc7c220dbaac5e4950ddfdaffea10ff1dc6977d5979aa7f9a4429b31012a3258c303bf605e2c3b051e0c6d34ecdef2fc512d547c0a0e0e01a0b41cc56d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e966fb062a481083a28d072247764757364e5c7b617f008803e2392b724b3e9829ab819f82af955e9ba0c5b6fd88353fb6c3729c79f956c5f50940b469ec44e1bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8dd7ec1f3afc28785857b07b3c660da7759cf71c80723c3ada6f503e91b5740581b6bc3d3e3831aa8bbc66c450d3c13e98b9e56a16e8fc92c5c6707124014ae7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1889504ec5b7b57f2f04b64aae701c7e52d9946e70f4adf8c5e6385497198cfdc3635140b7efe6f867b5a6a8f39fc76832b53d7363d1a5f8f864c1ea6094a37fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eff898d579c359637efaacef1207c8f10b69c9e68830bdc6446e2e85192a7b21b678fe3442dd18d402c26da0885230eac6f359ddcb096aa699a5e473592527fc1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6c5ff41315c9c8de444429ec871d0e512eefdc95aafa370e7049538fc2b5663edc188e9def32b6ab41a0d1d62b2cfd978532dc99c2584af9b270f3bc2bad9c57d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec66cc127f21fcd5944585094b23e2372d9a6242e85d110fd19136fc82fe4278cdc2c8719abe46edd1f507d2dda2717a581e638460c482c0528fb183ec89574c2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e272bed0d8f0377be6936fb97c11dcd7bf222227fb7118ea611df5ae342e29a0f3afc19abe18d94205f4c444ecaa3f45943f6b20c1555bd4590793737752fa497d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e116246180ddf7925f109c76ddfc27d2dee3aa8914db89788ac8e3ee28c1964b887cc797d7fa978f14c45a09ba0e4eff552c8f20a07d80c142dd0245363c6e96dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef1b7590dbce2e540d1c314980095615b5698263ed02280a3676c6da7a3de05b2604a64848fa4b52bf606536a6f8abcc849a90e471a60a4b8f63649ea3f3e2107d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0e7a988e6d125432c68c62ecb3750deddb118e0874f14f9c79654b09f57017197381755c360cbeccb238e7f66b6f7f0ecad2b07c70c99d20cb042bc413029fc5d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e016c092963ca91ff38c6055e33aa5eb1735a5211fcc4384b198429057d01c6414f0204b95d66eb043b9940cf6e2a230c71fc6e3895094f7c460ef52d0226d02cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e5541f723aacfee162a2b457d3ccc6b3f667bb3e8885b37deb0edc1a2eb8d683b66dc159851101e3ba1706d9818808bd264d5394965d905a48081b6aea8eaf77bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec45b73d658c0cb39be1a926c3d7452c3d745c3570fd849f803dcfad25ab363f0d3094ae30cd877ee1c9f05cb0c78486550205f81a81240adabcb354e450a22a1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1e9d1e50b2520f751cfade4f66d0839870c24b00bc437dfa1b303bf22653662055803bcb639edfea1294c4b3f99e2041562f45993d7fd4b5b5a0c6f9c9f8d31ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e81a53a204f4dbc39387caeefd3df986fd64f3ef0cad06f98924b80f9a79701409bf6c2cf92e81019e35b52b1371d297ea0631ce9b08a87fccf83aadccc448d14d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e81fd4e8cd5ffe758b1cf6d9b663dc4b5726eb0f14da080a598b976db6cfd42848ae5d345af7c1b976eaf3a2dfa3974f77b4b15de6be70e5a9fa5169b43714065d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1fcfa6f832d321813277c64b9bcc448f0ec0ffa15c44f1c90c17d8a0cc3c92548b830f5524e6909efa6675ceacee5aeb4cf5804b7b3ab9dc99ca3bb0f361efa5d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4c2874e04a408f82ca1f7efa6e6f0b21e0d6521ab9fbba965c38c571e2a3e081212526f7cef0d88de373697090459f813a27336b8ad199a0f82b2b1e1747887ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e001a3975d4bd6a6d0769ae3b624532f0011da433d3ba97584845301ae8767030b256201dd043cd566281c2b0f488cd36cec6bcd1080d15faa19eb2632d2fccc7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e226a64e49ab9f25437c01fe825dc80a6b23be2a97a52d60523d3ce09d20bff11a0cf9f5859bff03d7bf8daf7b5356f5d26a47133b83c75ea5f84b268efe14bc7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e76e51b676f107dad03bef4549e23ec976d79e4b281e832482b3c5920d8d33f670f473e8e4ebf58384f2ba1b8f56b3c708e0a90280dfca8092e4f9aad6ea73b15d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1a6fa139e9f0fce0b51432a52f03bc3d1e97aac96ccd54ade33b5b0d3b1b955dbf53cdd4825634607ba440085146aeadccf3e588265392b72b835826061f1ba6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4f75bb7c1d55a5afa8d98cdfaec4629bcbf86ac8bdd4e737023030fb8d9fdd3dc9c007b02c65f9a5d1094261e28f9c894d3a7bfebb057cb76ebe80d23d412442d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0c3273713154fbd29feece3a43bb84088dc0e4dba8b9342840f9e575dec96755d1d51d026c1d71f46b7f86d9afb9736c5fc375cc71265e884606f2b954f807aed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e725ad80ecba378198aeedcd624f9313e200b126a21900aa01228926d35590302b97d286e53636bda5092eb0a8ffde0770f2fc035e4d2459e977fca733e9b96e9d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4678b92180387a89c5ac840fd7dacd00140243f95213faab42f639a387e5c63a4fdf0193b04c4bc63402e13ac85be9961089300d49b49faf31209a9c427d7e7cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec3ac3f00db5ec8db007700d27c657d83480b11dcb10a5114063d2b1a8eea75640cb2633e03bbd2f53a52acaeb0e7302c76412f9ca423d34a6bbb1f12dde03998d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1736f9652ec84becd4be94fce27af29ab317229d358e24166f36b88c08670f87ed83f7c5f4a6953b75aebe712ddf0312bed0edd074e9d6817964d3fc3614cea1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee9e6959ad7d64ca8c9b2fac9c6e171e9f87aa10feae7a2f357f9f65110f13f4ee51018a339a0ef89807ac3ebb6f56598b57d58a752641d4f0a2c3bc484255392d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e5f85764b529becd1698e1040a674c4818336c72142035e98ffc7681ecba543d1de452eb09739378981336c5284a311344ce06f414a2d1d7fa7ea4178bd696499d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef47ca8db833d16499b6f36f16014713d7a35a9d2f40d4b0c144f9598e7dbdb6d30e9bcee87fa58b3bff8a97e2ae22df8e381f2223e96859ce924ab267306a856d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb0f0e134f6406e02d3c9f0abd4603b9b2abcd70fb43075fdf1c69ec0b6e935e16ccce0b3ba4dc7b7f4c1a8efc470d27b0fa8d61e1c2f89c1497ae4432a111af6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e03d80183e0a444d733da3241824fd4e6957c5e94909fb7f8c8438edc9b9c49611356abf48e4aad1d298193db3109d2d426b6ff83b9f384e8d03f6bf1d3f639b3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed41ce8b263dea6ef27ca64d22189ec82d454d0a4b5c7ecef26a79db8f6f5a4146dc83b06e00694c03f07d176408116de3bce13b3e44d59f2352cad71a42b403ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea756b027d41cdd33406006816f577a9e8d2aa24154a3b0e59f92aa09047adc282596ea3d062b487565eea37de7be76e30f7fd569c132da44d02e5ba9a1d587e4d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ede79d80d04f1783be30f10b1c309efe4873566b7dba3933041020ed7fc92c0f4ad58a5ad47859bb6128b33ec1f1e2cd577b9ef3b800206a80bff8b1fe19140ecd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e07e2a8eb0b177d0fc5dc895d7834e9c347679c1c4bda2c316d14bac03b68fc3363b0c4348de2db273e04befdc457029cc2075bade90c6d79a0f5ec4adbbefa9dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebba3b53814183c152ead6040bd0493be48d09750ad3ff2e9734c018f4e33452abc92ad9967e90a2840163f964610e5fb36d35793e4d527f0e97d720c47f004e2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb5796719ea9efe550051195d3eceafbb296481bd49891c949e79417f6b94328994834969dbb5bfa630b668c3bf12199bb232eedc96971ecebe9a503289d3966ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0d7f8fe7d7601c628fd304d33571a665e5f25be874981df1955453728a53e847e3278d1bb2487d9607da9555a588a8ac387c27db31b298e00ff66649a7130305d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e577c1e05fbc5445844a1e4b472cd9110f87ccfab81ecaed51a4cfa9a51ad7735129f1dcf9f5767e2b1ffbb6ea04d8f22cebcc59d7d1587225b2309609adc60bcd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1e815188f0fa6ff88da316214c7c450f37303df29a08c6619f3d90b524aac4215cb07a31b7f05c507feda64958dacd39ad9ee3821d0b9c1c2ed90d308d80f557d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb8ffc863d1ccbdf474c4534dbf04dec460ea4eb78dab6344bd297f69828053f7d5093f1c18ca6001e3f813c569f09f65fb15a4a78e7778dcdc7fdc9764e74504d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3f94d2f7390c78956eab804f52da97bec4293c8911c799b62f91810e1181c090cd43a41b2c8a1095ff39cf9e14453468f9293f4cacc361749b9c5709f0ef1802d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed6654ea767c3e7fee3a29856fc4488813313b4cd34b0c6652e98e5f6a034185a4e19edb966d148443f5c7fb67fe106bafe7eca24fd4b5c6c65646ec74ce5d856d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e22d01f3dbdfaecc2006e77de498c0d1a51dac06898955daa8ba6d8afeff65013c2548f757562727c3609f5f33c01e471154ac2bc5f92b835bbf01ca64939d135d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e16b20a1d0c475300a52cbe49412fa498d9e2e56e48ab8d4db07633862ec3b86cabd4b788c8af2ea355f29a1ed7eba04ee6d8a2877fb1eb899ff682b7b04e0f01d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e76ec337b5114611964483536243f4a51570a6573b33c4f0be403a705251ca43026dceddf9304efa1d7d6d7f2558c1506e1ef631980d8e979d0d62d0162ec471bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea28ee77b6a5d3c8557823007f46283651afb7dd732a73ed6f15521b1695a49d65955e32806591132a8cf43db2d4894c96119d7f628100c29a5f4a257047f12b4d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebdbe68f6951d8b481196a65281c11f4414d66a070d43490be9f090fb5bfa6765b82b1571b28ebf98ebbff67264985d1f570cc19f6246675d4fa936b0a7fd7d70d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e9dccfe5f8c27b7fd51ceaf0a6be430a67b923461455323bfd421ba9391c4b7f882a4a7802d2d4714c6068b448400073972a2fe488d8f2df67832e7af4342731dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec0a8ef18a0a9b4fabbc5c5a9ca19f770c6ab6c7136d8cb1a4aef8a5519c187f444037285b001676baf084bb493703af530bfc45ecc17e7cef9d7871c9083276ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eaf1a8fa9185e34b2680ceed508c9c96450efc0ca88d77508255dab40c670893ffe4973b60bd6c3a09eb0e09e3ea752f1e250ee8c656e73a8c1d4597e6fd5cdf0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec70c7f599745d5748f5b7bf72e11920b58f471a0a0fec401cebba2492192a8221af1e71a120d1aad033fed0e2f845f56d010e4a474cf2146edad82bf0af753f1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb02ffda7f9fd3be02eae05e800fc55de7407d3bb39607adb2150ac40b5d529932be8e014d9a82e1a457a2d1a42b408290c1af6e8048e1a5e0d5b6cb9b217c003d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8d3baf823fc75a24556f5bf72c8e69c60f2403908e56135eb779804cf8de97c85bc7a7d8e08ccf58a5b475e53c83597c0a3eb3005d79f895e73e5e4bbbc04dd2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e96ea8bffbd9a721869154f20e2d60d7f4e6b786f38afbf88162a71491033dd3a1b426a7d2f73aba405c14962b8b8de88348c620949b6c8a6d1f1fadf7f28148ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec064716565b2512b900950d37a3200ab46225f30a4856653f41589b7f295be5139295a56c12fadf71477608a42a05125c5e5d27294c38f81b94b8cd50b82b169d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e17241a59148887abd5d91a08c603f5fb8df2c864b6651f1a09ff9a902e30fd58abfdf3740a325ea6ff39aa1cbbd9b08e110b9d4f1ea312435dab19786308f48ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7ca9d785854f09729d423b770cb87254fa56b9d32d2e40457dabb55fb8e50a65345e39062e838f06d2e9fd9b29245959c6ff99704e5f59ce58313f357d270767d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e935a5029b6dcec0f26823b21e9d0c57933770296ab0700d09cb3577775be7a95da889689eee823bedec26828b41a7d65cb78f27dc7974343792f194c78cf548dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e306131e68e7e3db9f59b8304ced1fb0bc8d6f820d881ce3260d0aa0332030c55dce7f23bcae8aa40633810c91043aece1b21182d203f570ae15bb52815e96e15d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e791b17e59cf6518fec75a25afdf4eaf94a0a76e5397ed841415f95c885f2949ef166aea967f2967cefa7168b67ae2ef69d55d75b52a1df4dd85df6c9fb781acad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee62fd29b5237ae6948668b971ee764c6a3a26ae7bb94ac39f46132adf238a9af66a80560d14f0cb6588c5eb5b864d422688c83081158df15af91d3772ee83233d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e326e165cbf9efb501d9a64bc68a55d5dc895233f70a7b2b1a06470d26e30649b945cb5caa12f813463ac616f6db467c379838fa3f5de42c63856aedb74f0269bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebaa49427108c7cbe29ad69795872aeb27c519818f7fa10dadb6452c2b218c1a1a3b00e5e1963704d1554ba82296ee5f427372d0d600af538513be2bb211d63c0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e434b7c6a28f05b8221d9fade12b9abc9813629cc131a066e2435e398b078f1c1bbe581ff1413bb4dd593538bc13405ee49202cee173b900a8c6d31912ff07225d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef46c75eab0732540dc73f9e8acc13dfab0664f4b2c0e5292fb943f7b8c815e2974e19f8717b853af8e7139fa1d5c91befe05049d7a6e609ce9f0d2f4fd51c64fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eeefb8f574e21455e1c5e6f6ccd0fa1f4915f2459c60ae8682d8773c78aedc7bd481783cad87511100c5f8f80da1200ebcb42acc52c1dbceeaac7c2bd4b8c59e9d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee44da6c2405e7ae70427d1b5b1344523367c00044b3c8a10c9425dd2401ced8b32f8d29b2f98e0f0a67980f0d9c0b52089607a9066d7f7ce56b84fcdc9b79131d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e460b53e4b7eba2e571e35238b17c26d8d36ea6be2641ecb5c648bb5f967d101db52f53b27527b35a95a1201b0d1aee1140dab3d859b129f94c0da4869581e97fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34edaaa4bad3ccc49e62d696777f3047471cc2082b9853085f6587d06699016e1adc2f0167b80d911bdf3281e47373a560f5aba93ccc6e0ccf169b60c90db54433cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea76519ab23d549bf048178e72664f96d428a06e791f22a5249bcc761b36c33f0d7dfdf8bac8db9b9339f55369abcf87d25844f5873d5dbfb4397402ba0883cf2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e9ccd337d4e929b3319b30185224f8a45c77f24ae3fee5ab168ca014102c32e3786d03386a7ad0152ccda5f34bd31ee78a39b14140291378443f179323efce60fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb83c8093f6694a7fd64789d0c737b47970f4f3a1bd0a340873872bd00cd5856f70e03a82b1763e9b8feb96a209920b4294e45ea762f4187667ece1818abc8062d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e29fa0fc3ff18528dde6580744a8f001b43ed977771fb7df8ed651ffc62e21ea6d5ad5871296685111cbd9b56a7bda8fa1edefe27d85f13270390007d87f8a01fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eefc8eebf8743b86a8a9c5c52c2876c90ee0ff5fdf8f398f3d2d3ae9a266795b174d77285e6c79376ea74d0ece64911870de5725544d90418357e793b5ff553cbd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb699c8d807b109a5025bef71ec0562bf06efbe2d0ab14caefffced70512ff6dc26be395b4f274a08ef16fd39f5e15b8fda8f536f4c15d5ea54b70025d2a1ad82d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0567a5c414f0b35efc7876591f656282836f65f887e116e45b6744bd5432453fad1aff6d8fd226718c28efc490625f98d359be923596fe82beb8dd97e9be6297d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3909736c0977233fc18b5ba52851040358c93dc2c88f51b10405050cfd5798f0e78aac4d4a4fd2f1c99fa6af474d3e781bbb4e4fa249f90d28e0fc9dcbf40478d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4364727b24ab175b883330bbb49d05d1ecca37557f7508d08b10d15238629e03f4a85493b47aa5e23694d76483bfeef2f6caa5e9b70380451a11f9b6a1dc756ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3b63e49195eaf3599cf9b94924b67668e5a7b9ead3b9efde0d27428e07090ac6d31dc29a2645162b012c25a228717f7ed6727b5d1868577cea794d2eaecf8828d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34effb71916bb0da18626182e894842f6c901e726752dda8ec646d7d134a8d9712afb2ca27ca1df8d96672f5006d40d5d45d48403f975fdea64625c88068848a7fed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e392399d5c2d4a3df2e77c0f636eebfa5b13d9b89f321fa84c2b3f6d14d4bf503f77da158218beb98466cf4842786475eef69ee294d4953f9cf08d07dea07be85d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee7b1f9bbd73fed6c1c4bd4e5a2d38e70ec7a62137cc6b24a64c5f93666eae292ec6f740cc2e51606243fc956234a0de720a723509f5e92d54ce234428b51b6b1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef79ebb44ecd8add8e0d7bd5ecc88d844847161ced028f66429f7e8c43af869f57d527cfd599f7fb7013c9122da5850302098cc30c1aeeef66a474dd8f05eda37d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8486cb17b39f46d7a31003686cb4e52c4cefa48a606198279924651cf149950fc8ff90cd97359ce738fb5c441e0fb3e6e51e9f77ee7a22442ecfa150e87f1427d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6a24585a53a597aaa04ff24ad4a2deca244a683fb36d9fe625365e27852caeda9240dbe034d78c43748908daf51194e6c733b703d431e72720095bdf86810854d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e296133cca4890e1615234c4fcb4da9b0a8664391b2a64b6b2842c7d8df20ea3baeb1123c716b0512b662f73a2838e6c1e50ac4b94c3b9c67b635ec9ba0641945d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e089191e2c00b8010d76d55ccee77f2e2f0b554737ddca1049c76169b636919a6c58690901d3063367834008a1b9a31dd8bc35f9454ac125a0162e2722e25759dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4efa15e802efc67922e7d4dc05df833985a72e4ebf75f48af483b68f938c88d0141388b5839a69f4281387b31c46b7b9ff4b55877f7d467072cbdf2949ec807fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eed24c1839d767402b7421743e3a6b61410711abc626b0a68ac6c34b6592ba88f7ee232bb12b6d2ae1f471a47b503dba8272573532b978ed4674b3e64e68c7ea7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e878fd702fc53dfeca0ffa72556f10ad21f014a105cdee85bdcc138d551eb57a54eb3f2ada777425b51507f4b1d2ac6ca25c04112dcc4485f7afc082f625423c6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e385b25aad1f9f288bc32789b3db80e2b7b83a2a1a845df30a581f62b9f3c318e31c193d67f5ba95451707425b708a4b6227aca7dd41e4ddc2ae3160a1ca6c6fad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e74db268677044f8fccdf6e2e608d265c20d757bacde1fb6c8156ed23d0fcbf3dbd3824b7a42f69fd08fca9eee9db5ed08984f0dbbd9d60a414ed2a8a0af8cb35d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e78ce6146a55a6d128981167739be0a0db07985cf6ab330634aea9e675864f62b5172a211398660f28451f6c0ac906eb0622a29cfb3710100777347948dc5d7bfd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e16bf768e7701c2f724d0aa6e0b369e9403612cbaf855a1aff53e6e0e316b86135acef77e36f853a0b4679cf54bbe5102846cbecac8c82a5edb6afc8c1381711fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ecc9210b85a27826d1bb9c3165145a4b64b3879fa7e796c8a0c0bb445849af65ce01da1cdc728631d52ba68c299f64e6091353efd89dc7dd0ddfbbaa7e7e53e28d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6c1f8c7a3f2eaff2ca9cf79bc84c627e2149bcb9487462c8e5236d65c23eeae16e069826b55a91859b73115a15838f748d520b6b7236255d4994e6aee4bd7eb0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3d5138f7a44f7a00743b185c035a3dea290b76e36c3241710f29e00635319ddabab41cb212ff516b8008f1a0624d5c6959fd9df6b62d9aed3895b8d1eed56307d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed8bc3fb2f537be26e6a15144b031d754cfd6fa6289d394c9bb8b3bbd6c3859c1f846e830202596a76ebc39fb17fd3518b7c3a4ecfc2dc9ebe9f93be5a4e44184d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e386c07b87ce07f7c9aba4d610cc66dea4b4dc0c934046f5973b787f544077dcd13dde29627d232de91f00eb4d44a8cb9e8cff28660905e29c1db4993f52e3a02d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0b3e7ac26c59ac96b28b5e5689d4e9bc4c79fcaebec63ed5a83a6e093047b113b252de58767ad3ad21e7c97521fb6d67e2f7a6eb86aef5ddc1515e65e5fcaa82d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1d10f822eaabcf1db689686e6cf93a7d08e96ce9489ff7469481194b494405025701379563cd9a2002ff333e41bb93ef838cfbf6d3ac9d60f1a8a96282502f61d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1208b222465ad704ca391d1ab12d47c7311a1ab44c02dca9eb87c62f1d8a2d130f4c380471e30e80ca824dc339f167f23755c055c5b62524cd11b8b34946cb58d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e117d38da931cd70a0eefa1bd9426646e1bc756f567157d425e08785a0f939764826e0c05df18df4e66789afe748dc67930a6ebacf7cc5f8ebd6b57c71a522158d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e98b6e4589408db828fd2aff481b86ecba06a8b03a3c4d80a6c2b4b8616b9910e8e252ebfa8668d255f071e05e4b96258a2a332893d298ad5749e534e1c47c24fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e522a57b3cdf97927647f749e0936ad794f186e6bf1fecad651a84630a51d2c16cb0887e4f83e64f1595d15b230efa4a841ad0a9802cc12f60b6508cef4d16205d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e979cbbd2b669fb3837315f5e2f49c9dc04c0035c9f8fdfb41fe08dd2713ac0e09a252512cc007eaafbcca8bc97deccc1d0ab777ea3e88196be867251bcc0c386d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef5bbe3ffb096ccd408bc79f9b0472793bf6aa94c7119c5eb566b483c98f53247855269b83c16f870b012b0c80e29b194b5fd5573aa6eafff1c298cdad8fc60bad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e30985df9cf446bbf7230651530f2c3ec52d52b53280989488664386a8bb7b04630fdf497a49bec73114d6ba45f638b4366b7642dc6a8dd10f5438966e0e775a7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e646f551293163add854b995ff8029f846205a72eaf7dbc758897549177b2ba758e99a3b760b59b6e47c10f4bf2057346df01ddffdad6d5a89929b7dde41cde5dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb3efe58f598329bb745b97df7b960246fcb441b9549a7a90f670467066ff2e2e5537a11a43422ef7310102c5e8c8da02bb0f531b87d93d61638879f81796ea93d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e88b43a5dcfca446770f2bb197106e318fcf7e8cfe0c594dd9809b332a849a3cfc5001decea6175d38f8a28cbeec776520ba7275241586e6e6854bd0aa4195d7dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7eee6ae3163199b9a18a29855ad61e9e63a35b991a3ced5b2a4e002f1a2f57644b94305c713946f9e44472ddfcd19ce32d6e12a40a249bd17be0da0a1db74b3dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e475fa2f5ec0393b97602c4b93c82b56235f0217f7237bb545c92cfd3613b9a5c96c1ea4275dfe99f89483151c121de812a566e1f26be65720d70170b4dca440ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1388dc717e59bbc1f7ce9b94c20cbf0ef69032cc91837c2fb1b7ae2471cef579b885064abc9bf0c151138d0d01a3ace19a6c4fbc31a0cd7bf8d97a89ac33228bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2e6b3a8f8faad7ed5cd65d8d50785afd763b0b394e0cc02dface5c2ea1d552ceeed8184e04758f653abfc799be76891b546a1d73dca05fc21fbe36984264d415d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e616fb7d60e5c0ee6b125a250e0997a13595dd7f41474bc3614927e4c93953d9284c80e6b7483472aaa6887ad374cd076af57cfa122903b644fedfccf5382cc41d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e236b93023b017a61c135365c3df88b639b1f21bec48232adce43f2daa4728094aac109c31185fc2a3506f9a9c04cd3531c3031fb7306b7f308099d56db732953d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8730634b344c9b56e7fb4a68642d2dd41704f6ed37331400165ad7cc7380c372f5d06f23c08ae775afdc64b618574b84137eb55c66ab87a5e7883dbb7c6e2a57d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8c2f8ac1b4019c41fd4ddd49f82bd5c7c7b5f92ebff438d8e3b34cd5f70ed721e58c75b4741ad4da4bd9af5f476f130f5240f1a8db98f9d6367b932b3c46cf0fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee0dbb93dcdcee7613a9dce27ab651994a96afec88e058c6d6da604a34745ac374aabb135d471f88ee8f89c5b1283164d2504394f7e4ee16f5764271db7cbb3ddd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e644d5cda3604d39db09a80c1c7e0b3aa766b1c40914b47f70fd4ab4d8a942d62e6ae07933da0aa8f8ec755d2e10dfb7f228435660441143aa6c3a9c78a35e602d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7893a826bb23848d1575dd25babfa3f54cda427248b396bf204861131d57a96156014869fe90e8130331fbdd309eb736112946a23cfbeb8dd9b2be5b89858456d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7d605741022cd8fb9ba0ff76210b703e7243b4a4bb23fba5d8e0b835ac08a6a1b68cbad5af6951fa842f25377127f0ac3386d71336a3a5c899fe023b2091aaadd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e910613502a8a1d558b68ebb05e4e9b79ab3a85e5f12b250dedfd6e75b2ade512be5595a28afc7a10447799d86e6dec97bfe5630ca868da578d2b92d6e941be58d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e02bd089e7ae98e86181155675a82d55f274d215c5ec208f778c0598e10abf62c84f4cafbf43a2350d5b2fadf97a1b65de3e8229430bb34032dd8340488837ef2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea10211eee15c21589eab4ea944767b830c086f453cd779487d1b806ced6fa664ab20106e8dde62cd3e0329f523f37a6e589fd48263c33dc262c1ba2a01c3f3b7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed0da36518a76c536637f7a2e88f0b515a80085923c53d4142652a175db6565bbd1c4aad69ba5ebe5595a7b0705f70c3b7ce094b36a38a45de9ffcf65c9cf3d03d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eebd6aa7129af5c5e1b16591a56a3fb10bf90403d713ea65871608d670d9ae89094f5c915535f8a3e7cfc40c1041074edd3e49fbf30f32442de600db048f54a68d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4bac3dc61814bc230c5fc3fb786f7f93ec7940863e7fa03b43aea44b54cf9d820fd4ac91b5f32c29f09f754b440fce3853c8c8a81287de3404696fcc82be57c7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec53ba54a64a080e4bf32aa9636ddd525ce51506bf0304f6329c3ace1384ae7751ece4da3c301b64b838651756864facf9edd9a1c45534ea36735660f7edbc3a1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee6c11e83e67187dd78ea5c2d042fe8a31a2c5f5586287833fdfa4dfad388b236f6342b2f601bb091a11331ae06e384b07a30b2997ec850c793b3e40462aab2d3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34efa4dacb825e630bdb309f0d5af13550d9a70ea0cafb473dbce4e623f09d4277c83131148f6103b208f7c7e4484b626415d672e439cfc6da2407073c353e8977ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e57930a9681852228722a777fec3eaa8e2c611a5a86ac98b36bafcfd4c2f539670e61def3e68c8c423bedc60f26d3f0663f682aecf21192e754d994146d2cfb4cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e24303c49014195b267643f2eee5673b835457dc74396d1e64f8fff8ab034590afabbaa66883d7d74987356ed2f72c3e5c341d0bb587d2f4bb81d43b3678cbf1fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1e0d2975da706b796fb40718e2d9ae26798f5b0640dcc83688c9404b9fca874fb64f3f15b0427f32b5d0a82c93918a9a1d3ad1dc6fe5939259874be079c6c2abd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e70c85b2b6aeeb935e6474446edf6141fa29cd1d40de1117ea0c5220a547aec06005ea58f3e2875862786129718398962d6550c2268ef98e5f4e3a2e816657033d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec9ed5d26dbfb39ec2cbeb2190ddbf5f36c77807549ad1d7233214fc56d9573442b741209c807fd06d999af0629a78fdb2aeae69921e853c66eda42e6cac800edd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eda140bfe956394f48f283887d226beed253850d1be19fd3bb9676b56a156805b734c9d5dd57856fd59e28c0ffe4794950a5a2ddd801d25e34e6db754bd09e10ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6d414494a3c8f990400f9e731a50bb5452c3fe818fa53577a642eb59674773bf2b6d530cb4b417520092af042422946441b43da7cb689fda6dfc98ae876baecbd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6f9e538139bd775b99f84fb19e1d10012f7c91c6e4e28129f2a7cb1166e73aa3afe97bad163bc9fb2fe7668811ad1fd61b0736a3a8f9dba416e8edbec79978b0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb172fbd5436df1c213de3c99eb1f13a2671417306ed6aba14c420ee270e1d652754e1127f4e1320790fe7ff08b9e734867fee1885279c00e8ff3e761bc82acd1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee75c2bfb7a5df265a2aa3d9ca91173c710b607ce38168593b6f2baf37c843c2cfb775844a203fa50c87f6889e5c9040ba890d506f47cdb9c1c1fd8eac7875027d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ecc0e0c392b0764fa32b82c12043274eaae3ccec82ba657fb855a800bbdf7dd71efeece0bd9355c35b0b8395063a92aa9b68f9e347b3e38722e7e9cf563b77560d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e9513616a205078c92e1cf865011cdfe783dc73f0a9f59e1856d581a4b38bca1e2ddecc1d084b1b5b59ba2c4b12e0021a7a42b187138e19dc79993fec6b50a004d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e75b1ba4a3b85be6e5006cb1fe9744931ddfe0a2d87e6160a3cff1a709a0c822d2550bb3040cbe1aac46580b304787b6671c0c7dbaa3215b5fd760ef556487763d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee2a97c84d7acf728dbe5716da70472102315dcbaf34c97e8bc31d0cab871938b8129070588d23a7af6346e15fb4d270a3ad23243535534a27eff1137f200d2a1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34efe52e37f3c2b8e881d20d694a34b2d9f0935b63aab88d1fae49307ff2db6291eade2b2bfff2022df342ecf26e4380966c531c7fcacc0ee9bda9a0259a8991728d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea78f1d7a9102ed9e45c8731f85a8aabad40cba9e28dab1c9b5c3d0876694b0189e06ab2b19508d3c4cc23e9e7bb545395f2fd267c7b157c3a5f340c2b5a5968fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8348abba99026d5bb7a58ea1f7e9ccfbbb8ea86dc773c3b4f901a16c74e2024c108ca081eb10e5d742e7400174f3eee4efc7af20728df7de9e1b013a8c5385e0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e069c6551a6d078238fbca76e995200b1e421fc224bac507530a44fb0a6a93f35d03477c299f39a2112a223dd8edb0907da70ef4fc2737f29b35fb62a8857e7e6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6a2ab823a46bb98cd131c31fb25f0eb782e8355970b447830bd129b2b2da425d9498a3df3af0d1241304fa4d6d07a9194553acb5d12ee34ea86db4f6df4d1ab5d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e5bcfa2b1c697438860e6bdcc56bd1402a3341ec5054c3e4fab435fc0d88955e76c102802f85c44bbad6c724567157fe078d64533fe2a0c8a9a38fa48c6fe1acfd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e003da035e906e1688fdfe7d72ce524447e23c079dc478e2b41eb599d8ab382c05ce6d9acb612022b87c2457f588764541cb27d93b9d532bb4c13c8fff0d65002d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec60094a0c5c495e3fb5f88874e8c060c2e0ddfefc2a53d1474936b1456bcb42b9d9856922a4d483b067c8b379307b31a1ff03ceda8390681c1d8139f3a98781cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e51f2bd65b3012509f86e9402f93c1466f0bfb56788248c3601426ca386ee2715b585a0e2c4758a89b058e7d0b93dbe71b4b33e05ec239cb8464c9a0a9df73f41d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7674194b296388347c4f03d9ea9fc9e47ea014ff70d3a151d10d8750ab4d890e476239b002fed720ddd395cf359da747aa7467136cdbadd7d6361f44dd30adc8d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2ea8484717c0662abe7571eb5abc488da2b8ffedb6ebac93e67533031a393f76692589309780a665053cced94c881d06faa79c2b31eb6d5d387dff3a9a43275bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e18fb6a7dfcfbceb578aab043a6db13ba9a555778b00c3471636008f05a3994b30731cab17f010e37de7db973aeb0a40392d802a8ff082c09f212d9b5f92923c5d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea5d5bf1ef38cc2c8dbb7a932966c4f0da0ca348d6176232838cc425e361df9c0c469847d2f255a7567abac19daf35e0ae2fc6696bb3ecf9115e99203393ed7d0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e71dbc0635a67c9781d0fc56fcb1363d330d59686da94d8c548facb9210f4e8d8f09fc19ed7ac9c079b0612a5c24ac6163e012eb605d0851fbf97ecf1794daf12d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef1a70be00919d9c5aa7941f07a38e6430a93c0e038493d81149ab1f13e1c74fb402705dad66e7f026705bf45119ffe3b8b3f3f4650d89c47f7b2be6070b48e26d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e54e75c3ee2a6b6771a78f10686b9dca4c66c96baacacfc67ca410fe961efbeb8ddb34aafbf0515e77eb8025ab9b269e89acb3076a80aa02021e2e9cd87fb968bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb146fc791f956b00b5975b529f4930fd8f31e220f63d9d2d0fd542706278a8a55a00d1ca4c8e07e3ddd2a8bedc057618198227cf69223193be25cc7810d14766d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e07da0752ebfe85102f13ada98fab1654d11a27e29a9f8c72d9d037fa3776a4dbd7dd9bccfdd821a1ff37d58c6090c3353949a7e9aae2f53477095df3e45a6424d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee52b7d7d6d22de876617b475d31b2ae460954244fc56f17a5625071380bd251b2b91a8f77ba0548d80a5660beb09cc74f3856e244d06d23dd41e6b7ae46d3719d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e107b1ecb8b3b1d4520b21f25b721f73d9e83e52d6d43c0d7ae3d544a219cbe309c6576e1fe47e0163d00e3f614027de34b404af0d7385634ed827ccb2582d97fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3a42a4c95fe073211ecead25988b41b0dee423fe9b0ec5383103f88e46b65bc11cf92f7cd0f31d45701ff1210ac3346bb70cf1cc14f59d0218319951ef9597e3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e239cacace335ae37e846e27ef37f2a8af4804b648c3fd83649f7a6f33ee0fccb646844a3d4f6ce992b130c7932159bd55315e6ce2181f952f61963333dfa376cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e87c9eff9e266d71910731236cb5510d8865bd047670984112dc9ab1c3860dc826da3232519be9554778d5779715f8884042fc371680ce43cad4f884a2fe7fa2ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e49dac2fd381362f5e3c688638093cb27f4b8ee56d078c869ab5b86b75857f24245065028cc9b22c3fab76211058ac680388b77ef48094dbcbead263db3db6d2cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6ba4b64ca1d7920dab32bb33d89ba296d613419f43afefa95f5cce85c074e38b1354027332a835901367e7c895e40b5c0989d75b2b7dbdc21678a9537e42c163d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee47c67a8977903a1ca7104588ae8a0db320b01ba0eb113a10677cf399aac77bd14528d992a4ea90058ad815d60d0a023b679fda0edaaf200ec050f9ca99e315ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e754b5370dd63a790eb2c91b846cc4a6d9535b55cdab2ae3421e49389a92990e3d81b0b0cab95f4673524545610435fa1f2818aa1c0612c7a8e04e12e41fbd108d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e47cc96aaa8ab606a6910f76dcfd42c975df893516c9e1baa6af5e3c8decb08ebbf2d55a2bd06710b1ae29d0de3728a03116c4130cc38e299fcf26f620c3ef043d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0209bd5694f4842c1b19b9ce55092e8fc4144994bb144177bfa62d5b71858b13ef7df70d284500f62d2c016c8bb5915eaa0e0648cee1e610b66fa93c5e86c189d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e143802472e0962ba6ca940787498695c8c037552283d2573f5a16a663907b43a101e17ed453044aea1096eb824a8c68a491f64a12dfb82faea30d2a3240bc02cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3b543a25226335585b3a99fbfc7166c7296f509f9eb64c695e95fa29de785b90275933a5b9c09ffdcc3f220bebfb3581b57d8bf8e363cc6bc1378edef3258080d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed9f5d6d3e1662828550983fef5a3d2f39e69287a725686cac73ab81646b72932e96bc59fba8054b75ef08d06703a44c4e94b27fa073709cc7b2a79c9927be80cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34efe85496bb0fdbcc2cac84de46b102e10f9fc949e886e4271fa0774f423819d688894f154b72512f4b6aeec9e2b11c39b2e72d6fe0123b48cedd18ae18cb6a10fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e99f39bacb759be03934fc06a183b513474e97724e4307ff32eac09d466a1ceb386598f6bd1b46cdef27d680233a1583c858fb4f89974084ed6328e6c18ed9f42d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34efe5e5f325530e87f028d89862d3aa4bd39d26e1637d7c94e52a6965a86f4ff7e518cedb562de9d5c9f547ed6dbfcbfea9b571bea9193082b118b7bad5ed2468bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebb602c2a9c3cb566292b56b91894a0355c13cadf02fc7f354787955a7bc6e8d525c6e48e92d8adfe50b2bac5f036ae783d8ebb3fae54017823c0bd6b661bcb12d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e608c73e32760ab4c67b0d2c4922fe978c17b9eee87ed1616739793a5e936ce69b711b5adb691fc45920ed1ccefa1936a94551b61a931c883916cda64ce1b1d84d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed04cb9021fecddf2f43e1300ee95bf2ff569f13e7f2901706d53ec616151382cf6834004e882a55f5aff4976f30a96f4769aed89e42d079a4a81b77ab33fc19fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef0b23fbd7959535fca8992a87c3546a03275e20c1f2d7ff797f9f45968e8de01856cd8968692e58d4b1f94a5a60c1c9bd7067feebd2c827972c69395d80dba18d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4d119eaa0cfbdb9b37a88a812becbad830c1755b2d31ed1241ba7df9d932ab85e48448c66bb5609cbb2d0613531d67a27e3bea113d46fbdcb0c3821388f9e1d2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e585ece47bbfd7b53a92ad895e7b4b3966d963b701bfba291ac8065ab7f479057ed432e83896ae282b7c540206c2f451f2ecdf591016d813c20780a4d4d16b13ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3d4b325283e81da9c91da60e1db0fc2332d650107681fdcf3036df6db00507fab2aac9c29e71bb6ece4bdb0f4290df1226bdea7631d6d87d9e3d22fb588c38f4d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6d140717219fbf4f208575a087b5b3fc874cf208b9d3c2b0e25e0ae16eb152db7a2ad84cf4efaa9de6fa5faa133a346a108f7404be9c1024ed43fc4f5aec0b1bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed5c19e58881ae497385296be296d564c4112e1b2861749ad944ce097c9e4c44d4a34f35d67c0d13d7843a3478c23b930ffdfaf4d0b0f692c38385efe0bd5871ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34edfdc1c0f61a1c3dc4bfbe2dda47344de360447b3aa2a48276dc53f512bacc09544f5e84588651442aa48ceaf4ef792a676df286c63d9b8a99210e20cb807dc03d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec31e79d5b261a09e2682211815a47f7a75c0c3c82b09e12051fb0ead0576196a5f8b4ae23fc4b9f73eef0eab1a60cf2935b8db294001ba7d874d601380822c98d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e355fe478657704f8a50d4ef1addb9a324e9bf47776a1865ab39713acd32db0372be2749b8a27a20a905632ee39d52afa5d75aa1587f933d40d0302cf2cd8172bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e25a83d560382d31d344f1ce47f817fd12667bf031512425d5d624ab004989cb1f827e97f229c4e7c81bc9230272878647562a2dc8122ce9d38a2ba35a7105507d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0dd2a8d862517d99ec4b8b6ee5fa9511ee60fda2e9b17499b58e64a5ca041c7f33ccb9d20232aba0fd6c6db86232391fab665d2d36657f6f2f0a9c8699801808d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e714eb68865449ef2b9c19c20c548270366a458e08e700b8aa07a8241317702e313e0f615338af3215779ce56df5aa5a3b999b5c7fca52c0b75f006f0804e8026d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e60a77d5e9ae68966c2ffaa79a124c612bb084b212bb9ae64e5378436e8e2a81bf185ecf20e55a650ffab6d466221aa6b58b5a5661139f94ba3ae95eac85bfcbbd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec4e48152c2910feceb4bdb286faab218e4fa99ccab28b414959522c5038732ce789505090f03428167673031622dd67bc56406dc8f86ff977e0532ab54c9ffa3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec426d9fb46166d8cbf90aa18621f84ebbe974bd7479a37f6a18818cba8b0e54b016d4834d1e1ae4544a2faf9fa7fd510eda436c8e7e105f0a057cfe38bded4dbd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e249bcc53bc15f9fbaf28622355aa345b23010ce9d8d11889e2ba170b70eece9a4d6c8b94043e3e9647ee275f741095d9153f0602ef6aad4d6de3a29165dfe12dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7baf64b22d831afa28741054bc11551ab3361d4e7612bc3d6add4d8d84bb95058f13e732febd6776b595afd205a22cd3b5a32821ef577c6751af9b45dd6edca6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0e66f4d9866b0dd7fe639d6814fe21f17ee355e0ec08c8da33a0a85c5d2eec2b76e8b074506af89c093f06305a0ade3e629fd864dd4745906758a599349b3d29d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e01a43b5d54c126fcfec37c7f189a080f071d7c7ea4f6b9df7eb60d2e93a824d7094d59440c1bbf072edb864761b6989005c53768ae3233fa5702c079d6fbba17d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e98cf961de828a1fac8e3352595334685e4c82d07c2aaca5bae6194e19335f41187ad3f1339892fc83f1a21fd14200c23f46ffdf935b95b15487fea7aadc3a0b2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee3bee1b1ecb14f7090d7cc795564bc2506be917d3211306610cda0a0586f7d62f0842e9b6195ff4b56c9f982bab8f17d307977a796672cb15f07e8e42e1d7929d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eba39d4a6ed9afb8e3ef01cab930f253d3af74502b17ac61e9f1ddc802dab6d682ab505cd3d75113bc755f1e9a86cfa4f17c30270c206fecba14cdc1ad4fba0a3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e370f70e269887c369baa5bd818d8807af3e12d831a261d27eb8de43484c1c30d48797f93b05428771264fd7e6d422389ebf844de13334d1d9eee483cdfc7aab0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e620a7a217da50c11a23f2046bc69d04862c7e7c5722aa11264a683f461d8c3dc833bb5ac3dd28c5e583c13139226e5b29b4b6288d3f3cf85f9578abc839e1bd2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6b3d9a1cc957957cd917da31eccd5bd1c19ac36e99fed8271d96a84ce5ee240d50dad05352457959811345c31fda92d18dc6dd4eeb2bbaa633ac2b29ec3caa93d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e26003d7c53dc76577a59c58aa71f3ac11041be88b30e0afb8400c708cdc7af6c84490b06c085dfb8f05427df4f08747fb6d9e43bb0d84f910717198b286cdcb2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb10e6be0fbfc7503d22a131a4725b0f2602ab9fc9acc13d56dd1d71bb86c132e5e8cfbb39e7ebeaf743a2a2026c2876314c877dbd3f7b0f77b9f3ce60544b1e6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e716d6944b324390ec688e47b577a0748c5bacedd1da0e65b78bf9762eae5458ccd31cd5a76f7bcfd20d698b511e6b8f656b763485ece305ea4e000013b90bed3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e5b7834e3433d1f3a04f5ce1b815ab135e0a9b95eeb005443cdbb581c73e7b36b84acfa3550894ec626b0807536b16b203e780fbbcf38de5de1c7837145e2e4bad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0d65b115eaa4d5d553f9797fdeaa86ee8ca14e28fbc9d84d655873331393a1f1d919cbbf130066a3778082fc9c8d5183e4cbb43db00d26bb8ef0ac71c1e5079dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0c0ead4394eda96e3b15eb596e355558b8a53feed0b2d5389407ac692952cb424717b931c4231ffef983cdcbd2cedbb505af01bc16fbf13a0684e27c5ec0be81d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6518d937413d40cd34a5329a43109f71a076c0878bd3538e2a78e019b08ec9991164bafc91f84057c47ed392a53fa14b0ff78a7c6442b27f39dda94a2d68273cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e13c9732a39fcd812c676aaab8aa194ec62d3a19ea7de95f9d8534366704c260cc5d8dbefa8d9fc64c9875db08a4c9fd5a0733ce198cad6354d87d213372d2cfbd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eee55843195bd6ef40696e66e691bb93840351776af3b8b999fe9816ea6a750cc54ce45ebdd741a7996b39840c547d74f543605d45f616f37466162467f5dbaeed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef591ead48b59f89a872191d00c8927fecdf26620c80071259a20bb01b0061054ef88740507668c31dbefa0e86a7c0360c1d5fdbb5df25836e854f4f0d1c1c6ddd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8eb2f10bbab70ba12adc4f72bab2919af26bcab71561cac32037da08a0cba4ac1a0ccd1d716546b44e199b2500d0448bf2d3c191fbba7bb73baf581ca0bbbb93d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ecced5db13a6083925d071ea29d9caa5e1038baaf1abd4472a8e7f8ba4fda9582a4f9d5635fc807174ff7f012db6df9e5cf1844b0c76b00d9fd623a5c4d161d67d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e90bea19ff27b872a83ae0b1df47e75262693d7492ec271d21ce22904852056f950fda34dcf0453b1f8c1d10bc06092715a6d0e5b3d82fb07cd846fc590be6755d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed02866df36e836fb971bfb555fa5e57f4da46db0cbaefdfb55f2a3564d0048cff425520e0ee241ca7b34ced647027b816008039e9dcae540ba700ad6c33748dcd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebcfb51a6726e4c0c6a3d6e60dd69894ed12fe9581fa222e712bf0baf603e00c88979a12e30171d6ecf50fe8ea673736cbb0b4e0f0d5b7ee835bebc52f9c54881d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eca6cc86e6315ff9a996af8da1b7d0752ce5ec39eb8600a879c082695016811a25f92aa99c8b959e3528ddc0b5b477aea8b4fde5e839b6fc7a4fc1725074e78cfd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed66f028fd9108982e67ee98ff654ac8b4ba6fc2e85e46cb415e4e80e36b15b784f1bee356d039b720a5056af5bd46f12ffd041b59dce399a34293780e63d24cbd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e21696e0f675e1bdc350b2db72e7c6a2a10fc14c7a25363b36fc91f99e21359dbbd6fbcde7e49139e2aef727510699b3da0788fb3f9b87c60fd40bd18094ea889d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34edd8f0081c2ff8a749fffa13cfd3ff3d5acd996361169cd851009380a8de184d74015304a2a9f117dfe6ae821e32a87a482b41c8dbbddad6adb8abdb00f9c3393d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2df28816f6279358dd67ecdb343d30f593bc63db907c90cdcbbd83233d54b168576e76a0dc751a0f012accc1ba70737ff4d46a3aa1f912368dd0aa00d8f4a58bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3d59293a957fbee9c6037922516e18822b10ff755501d901590de0f0108f2200483974e56f960c9ddd36f67f5fae67baa5a58ea6cf49ed68986c78156ba030dfd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eff1b06ab48ccc2b75d6298c9c7e3e8306a0830b4f1f54eb09758754d9a52b372650285edbb323b7c997139da6849d330e0b850bb8ca67fc66e115f2b4eb9d303d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34efc275e8356d1fea925c20b9d222e31875424b6497fd251df5cece4828e513188189ac69550d8eac8cc4a9a86e0b05685725ccbf3d762b7a2ceb7e41f085216cbd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e48caeb464c4b17bfc9fb241fe384b99d30ab17066f0eed71aa744c6253993b7d18d6263fa1a25bb7a458531cbc35175319c5b138e4f2dcd5d596bc56f976ec1fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec33eae384aae24378df28a9e0b738b3d34134480646d9a9978d4423b8408199fa37a6e9eabdb24f42d2df08c5f0ca527a8f7ea16bad46972351367ddfc6dd593d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e94ff4298f5c4b0409f1ca270f4acd2ebb3c6609582a6059a11405bcd821b08589818e3e3ed4b73c4cc0f622ccdd202df126a1005fa9fcea8f065a52d28884815d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebe4b867d246cacfa10bc8918b6550a5c1d234435c0fa2c71a8a923bb8735e7bd0090d9924db6cebed77d396ba0b8ae0067bfc737e1e5aa70d078d4c4d7981569d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34efa4ef980af05b2f402f07716539546790ff137463269bc7ea426b64f7770a5273da9686c0a6bf5f769e58a83c2fbbc23630ba773c52c493094c7a06b48998b5dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0a5c0545d0b346fa1f6c298e875f89f26374961d061c323536358900ee614589bdd5ecbef8e4d4a213cae71989932544dbbb5d381c95e4cc2f8c7321b0705c78d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3e4d85dbb25296fdc5564479ea0c57c1c1c08b258fe106d0e9496dfe2524c405b7cfe00f78e9d9f20836235253c5e3dd87e5bb14a8fe5bc94bc3dfcabd960263d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebbe93e905c67ed35192c51d6526973044e1958d38bf848eaf5edc2c8fe6b70b2609f9e9b004f49ce643d2a0201a1c70f76f150ce59832288b171db478cb3b182d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e956031f3b222d6dc59b5274bbeb3ae272d63d893e8ab4c9ab23f8816201e9b20aec19958dd70f46e51f0747a0504a56334a3ef2ca346044559709a8baf38a395d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e000aad5dd07344e529830a590fc16677d18cca67fbd4fb68362f18f3a5e1979446c6062bb1f8da8eda85b278e6cdebfb8b85b059b24ce95302ae5987a5f9ddfad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6582f60813db6326e48b62f1e136445d652e6aaf33e8d2f5a2f14edb678f8aafae6e311d87b00db82b0edb9f52f34b1beb4537ad8324d2b71857f07ef90e5db2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed1cb4e6c1d7ea5ff107ca4bed9d5e58044be5b0542dc1d6c8072668786efa998c9e263d26023bcf46ea8a31e991c2c2b2fb71ef4a0fa615d3305520a87e193ccd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee5fff08805f2192507cddaac65482aaeacea7034c506e8c7953e7ca37baa2825c83c9c87b4ec10689bc3fb16ac805fa6a19318298a4e7cb099994e2dc339cd57d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e71ce0ee63436b36a7cb8cb02236c56e97626ac79963eeeebb00d4ee5be242e41ef173e50caa292117d9faa09da8daf926aecca4b80df1968941fef15ab84e1a1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e5eeac96852a5f2e8770bc454d0706d737fc91e5860c349cc5b130fa393be86c592c55838904e225f761baa27a40eb80d7be07ff1223452d4f25af902235cea79d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eed1d53cbde51bfd88ea84ac7ae88cca263b3e49e48804cfdf456c1a83e0534cc9f32a8d60561b78f09de80a3d47c7150a92b8b55c689cad9678cf395353ed091d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7bffd31464eb1b6d10a837729aa12826ed13027c86e853f4af5fc9e70861a286324469c79a79daf840fa8847cf9830b35437b3dd86ca07c087688f7af8ed05c7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed67bf62e85fb14593f6b96ce4e359fd3bdc2e860cdb34f3c74068df48ae145d82a891c9932ee58a02798c0d9e9de990938fbe3948a5e8782ac24e7644c430a7dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea2109b32b362211347f12f91e62f5b4777db93597e46924b211f56df7e82bbd4d29a74ece2d500be1793c2e3885f6b7a92407b643dc813fd10db2b2feb412665d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e6294a7c92167a9694afb51a937b0d603b0e3c8eaef14c44e7c13435a33c55e03c66d8d37a4094c0be15e79b5a7cbab1228e2199417f5637066696bff5aa08df8d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea756181b8e9706c27fd2e80ad0807b8b4a9c6ed1b6aade2ea1cb27fad60407dee5778f75fabeffdd3f157431a482681ca09e2d8a0631a9467be660b88964773ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ead05766416c4d4be00d789d422ae92f0adff0a82b82880b2f2792fc7befb514a341aff5ec3306bed16b85c57c3f8ac9b3fd8dd23eb45e80cb3dc901c3f812361d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7acf817d06bba607c38de80f189392fef264b8b55b53fdb8f7f8e23a8abe8fc8aa38b9aedf3e3b1674bf21c87fca6aa32f643bf2f360ef8201fa736dd88fcf5cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed89aacaf4cd81ee7682a9c0d0bfca3664b638df7b4c8fc2f8c9423eb503e0016473c648b29a50f91daeed76fbd2a91ad3b20770feb758d4e30e8947c7c23ec75d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2996c0334556cfdb8ac726555d8d7521aede5845968cae40073cd76d293b397cab9a71c5e9378081a301e7743c972aaccde3a307aae8b5f0799fd18e94a04eecd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed3bf4a1d41677dd6e81924dc6cc2d6671f6814a9200d946f3635f0dd6f36e6cea7022bea974e3fd611193081d61926022313670089c556e8f78e454bbd963a65d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ecaebdf624ad07ecd65dcbc0b12a36010be881c767353e63402eaab54776ea8da907a0afb2edd1c7ef4dea8a073e8bb24a324f99d652ee87f47bc343dad3d4f61d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e9cc96d821abd1e7835239732f2f48a50070c66626ae236ab3bd930336983e6b5ef2fdfdfde617722320f9137b18437d313bcfca19c32147a1120bcb73743fb28d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2df7c6c4b3d101b750c50c116ec161a175b87c035e416fc2aa8ee8e2efd005a2a6abaf2bd10dbd30d46fb200bf89a112062f988093e45e638d50be683cbb9704d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eff4a5523f05dfa73748d7de8360ce5854c7757880190358269c08702fb2e33568a09d4e705478c82a9b3b3cd953773a6ca2cbe16233ed2cbabaa969aaf86f55ed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea604be0ce975832ae81a4390f0e6a5c4283aa8dbba523b064eaa18c97291f23f4ee0f327b58ad711602abb10ad65c969841bbadfa91d0adf442be7fd1c24e4d0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e158137a6f72bf68065c7e2189ab9c17c57aa8b63b0d68ec4d822c75d957896b28340dcb7d71a82c353633ef23c8b09f016699f9a6b98dc8d9005d85996db757dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed67f99885c40ecbf8b875e156005117ec9e0e190b69da66c33d371eb1ad6f00f6c56ef2dd82c75342b2a7711a619e4647be20de1580390490b9f1296f6aee922d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e899d18c062d7dd26c086304135c8323fca831c98cc0c7d0dd606cd4d6dff7b9bf1f97a4c71464d07c8763d7952b10c788292a470f91c7cf98e1cff90329290ded53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8c879c207406c9cff27969ec8d29a3e814e859e9d071c0e716ef330c960c93eceff9244c20a403b8e1d0b1d8f8c786dab562ca76dcc772d164ce5f5c4f1a9eafd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e40ec380a7537059a59b335bcce1b2acbb84c142068cbc910b927f3868dfb3607f4de83bb3819538920d2a6b491519cad1a6a51c06364e1ac1c0696263ca71643d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebc6ae30ddb672db29bc2b5d84a71804cdf5d5a56fa263c6d7fc8585075fde2032c744c0e039fffe832d2f7287a8a950ac312758f35e7fc2781a77d2eb2ba6fd0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7128603e90bec23578db19f854969d359bec9034d54b2910e2cbfb45f0fba3c0a9290d9874102eafc20eaf3e082d0a7af86dd316e6c94bd70b8f1ea34fc48663d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8f7f706392bff6e394dd036d2aa03881c9f8104cae648b17c15c5810d27b08fb6db2beab8d0302300b5142c7f93ebbbe01aa0cb8372c7cecde7bfba04093679cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8340ef91e2a714e8089027b56140012615aac550e8eb844784cff6dd099a9fd7b6def7f94e6dc1d41ff3ea84fb7d6b8b23aa33dc71f161765a69f1f70dc6638dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8af0f4a6c5db0c920b102f1db6b5c434403ad4742dc037f9dac3490242a668fa5d47de33b4fb7e8f93fe2249dc34690d7e8d273de10da9c20af4e83018f63394d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef62dec384d975fa4968412d1b27e4fe8d53dddcb7308a67bbb80a5a1c471cb35d4fae1f9b4c1e4d8d1aea83d4cabc319398bb204d8bb0833e903061be7b7bd8cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e81ee32caa6747c7c2ca10c19bfaca4586497b228d59e93e339ea64ac8af61a44a66fefd1e48c50cf47cfa293ff2a8ea52dcda0d0b94446d480442425372396f2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e07501353745aaecb06c90d0edd81c35fdde59fe406a1f8c55a2b98c86cf4c9a5bd449b25a7fd56e11c609f9ab5e58e4fd1126fd1588a383d1272305fff11ad38d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb3bd021dc54492529c2d9d6148d2a77411eb664067cd2dc5a1c4824beddba2a456a481f5502dba27d27891e8ba43cb699f13b387d6cea14b5d79da95722ce9e0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef329c02e06ff2a6695831f1b58c49a0921a0fd6004f4d125e22867583784bda4cffcec268680a531ab54d3879dc2bcd888f16d9aa03a5e17358e552cf289a733d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34effc3a16c3aaa542c1d17449456ccedcdc833db8f876b700cd784b6ed39cd333b87bb2edc8fe5bf9ae2e4959164ee69f2f00ebe521316bab391665b7294fd3054d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1fe5879718d8e36f720c44d188f15cbf3c73f543844fa0f4f3ee5bf458e30b9c144aa55015476da4d5fb866b4a71e4d8bf71c4580d51c48d02c74a7ef4976367d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7845064a269d5ac5a4661fae59608be855ae90081711c537358e60488614c4c656a0ec198429c3664c120a69b25c294a131e783a0e91d1143d143c6aa53331d3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef21134522c0be3dc1b6a17d8ed5b875e2e3133d6f28dfbda2620b9ae76cc418172b18d820c57a78f3ca2f12b71352d19f09e10ecbc64844e273781a071c08226d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eae0afb1a4155e84f930c26ece763c190f6f91a9edfba52b69156c57e1c7948108a84c7a2fab3de03ba483541363d2bba5db76c567da50f491ed793386519e89ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebea82a7654bff0d9784ca0e20175a837ce7f536cf7abfda9112dd0b8702ffebca489b2387347f4637028f761e5fdcb09c85d9323a40041cc4368cde50421c5e3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea80c4b446eca5ad2bccb52942f1a9dc225ec4181adc431d0b2e3fa3e32fee57c37e1ea51600f5b5c8e52a0d31a438877af2537a013b2b28ea24972cb9526f0f0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2a2ddb3891ccbf3ba2b29d813eb7540e5ab1cc83c75bcf08754c5dd39f1c32c9039f35bf357d9c7f5bdf7f7de259431428d16a44a260d71801fb06e1b187499fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e81e0881e92c7001f5e4e466293d6099717d86f1007c4c5a545202fd771ed259200b77e9cf1a6e1523d1d9c920391a5ee17a75a99e40a1c302f773e69169073bfd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea407bc761923c91ec3a66ca8baa0d3ce8ca49b3949d9d34ae1166f3bde4e1004eba2f3d3ed35ae7b4c75dbee469bd6716827b64a80a9621d2e8b2848c37113c8d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e5962ca8f35ce5026902131f1795203084dcf904d4d260b0bf5c7732f68d0194c124c8f16149274f828381b921911bc53bb76c2e0a9888e802b21d906603f4b8fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebd45ab4598be43f59971597c6d2ec78372179f55387da0ba8e8384c5ff5a6f3ea9ad17c5a6c4728998a1052d062f25b80be9071ed2e9b31ecf8651bbb2a833bbd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eca0370d7ba1bb51bb5827b897c5dd9b9fe053a45b3482f5e4392c4f2f0483ff523d081c22d9b8e71d7d06e74658f9d44e83446f1a8e7602d6da2b6e43a41d7cfd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e22fe054f0bc327b5dc514dfe0920daf06dd9c3437fec81c14cacbb44d703b7bbc49734ef9f307cf6737e59fad170bcffe69bfc15d58eda789cc9f7f506430775d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e28767c58f380ae4bdf4fc11ebd1c3c7e47edd4d245a745665e981e73d9e5d3a8b871b61c4da61df82ff159d270d1367e4cedd1be9ef0af465393931ce18c61c6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4b06f481eac858746967b462fc39cb6b31e4fdae9eceae9561dc3319aa9e77382d16c054b7afaf685c65d85978e03b1afecb55a4cfbe42b9c22259f365c76ec1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec7bf7af6769425662de8704a3d50975e189bf88cbac0fe3f0532ee0bdcda27f096110bae20ea08127a2101a850709a7b641241c2f6fa5a99bc8bfaa5a0de6c64d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e645e5b43c1f4382af293c1a926c734910d21a2dda353f007c8424ef23930c7f4f16eb50730a4bedfb409e840ff69c235ef1cdb6bc0aeff5e17321394ef69e997d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ef0726d8592f145502b88f2784c7d4e83ef559ee4b36c1cadd3dba457883efcd63b760005088253e68ac3690a17d4d976459dbb9fcccdb1353ee1eb97bb16e2c5d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e60506327d37cc5eac31a6c08cb959506f4b83d8f0dba7534cd37ddfa973aa78e688eb842fa061a4633a933423b5dcbc419f038d28d6818911bf0a7fa5b1d55f7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea6ebf24dd4b00d672d8dea0c9db453d82d58f02c0dec21dbb2bd2be6035da34e272825c7f6eefb6c78e09c368ca78055d13c5aff620b2b741112bde26fa60f1cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0c4d3ff13ac087f0ee607005b44cb9fc54864edbdf1717e256708da99b809b4721b19f9175e9de9735fca8f8f7fe0c4cf026b9ba489b7fb599cf2ab534bb4f73d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eeabd0bc602dc657c3557ca9bfc2b92b39982d12ae2b55866e601ba36be4fcc08954a9db0769d1e3cde2f14250109939e85e04c1b46990a6d8ebc6a5116ede1b4d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e56ac2bfab3d8da41bf0e8bbe12b677181c12b0044b0ef31265f0e94fa6201893a411d85a4460caed98e92a5619b6ebcb663b053394eb7d456c896d8963903364d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee40951de0002fa86534183b46df75bf2e202a69e671b71fe069f60c04ceded9eb8fc5f790a9da540e097a4421a5aab79373bf109ba7e4f63441f6b8dacd27344d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e13f08af0353945318de106c4d9b0f05fefeae46954fe6691911f4d2f1502d0792b55145367557984a95f9fe1b28a95a499d423f0941e4759095e5348f5e1936cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee03ad91c7d5aa9871a622601f3b7f31e2d865a9ceb42d630825604869720480060219e5e41f47e05ff3e62f10d9c35dbb0e8602b6bf06f5fdb31978414882f66d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e83c495ccb1d25b5cb3e3ff81eee4aeaeeb654754a6071214a7b299c95be360a198eaa0fb3714f1e57a84106b4087f83187d30c9c200d525bc3d35366ef77aaaad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e74cfccf9d9cb7a4f6c04b1389d7727f8b554a81e4d97bdca6366321cb919f8821cd0f93214ed7df47cbb0ad68a52a2f3c0bed819029d76c3620b2ef39448808dd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebd256e878cd15d382e9d08b0f8910accdc4447d05010a0680c522cb12e457b31633eaf46c0be88a0e18729ac097d74d4a3786ce5542c58a93774eb86fa416de0d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e884fb5bf42c84690f1ae81af78b3286832c52abf177383fb29cf847b69e5884b7a30dafaa885ce29069aadb1e1edb14f297c6ec86e000dc006fa838e7f9a8077d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eada3b75f722572a832173c9f87f2ff2b4b481e85d905388338dc5e2674c43e573757a5ab0d89830bb28fa5c1349067c7bee1233199293ec07c19ea706993cb41d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e45308c70ceec5d404e1615cd329ac90a2e73d33d0ab8f2deb9ddade37d12e22dd1dbc78cd62ec3bd03af9e8ec85319854681a2cb6fc72bda0c0d61cc176042acd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e693151249a05ada4fd448d871507f00653b17bb9e9b6af80729be57f16940b1e17873cd8d74094918bd4aebe30f437bfdf46ef57e9991d6f2f5b35f9a6cd8bc9d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e505d1c8c897987ad559894909eb162fe5b3ce48bce9b552dda3d8ed9af3e8497a61b264c854f10a9163878c4e2ae7c9861ab40aa74e315cfd67e744709b89ba4d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eda8a7ebbf56ab7d8307f051c8daa9bf611c9c0abf356fcf4117e2cf7c288c2fe5d334ced0a079064807cbf62e0efb658e38047b2af6af5530d92343d664aefd7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e983d54aef4203372e3bee7188781782b06e66520c0b416b5ed35a93d5cfb5e904da96772344ebb19284eedd9f22dfddcdcb364949d05b305b1750ef4e8630fccd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea405e4fb3f348c85e46cc22aadc25010d4ec6086212479e26c71cf57645c128c5d41aa84b4bd8f3b600e4a7a0e24f61347157bbc2921179955d9cffe32a0be14d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e51268ad7d73b84aeddedda6fd2a61166434ea74af2d1c5c13f61aee86752ab2d2c0b00d05c9e0f6e78608693a4e7ea084202f8b08e45d7355236b5446fec8cb1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ede9c74f03e175e0ea18bd33471e2b3201347bfc74bcafad6fc1a36d0cbd9a33d502e674cafa8dfdad986ac9c32ae5e403d34762d9b6167ffa7440cc1bd64fafed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed44ef8f20585f133ebffd9ae432e730011a466cf56cb86e457885a984ef02a0601af6aac2430e5166ea1f872502b9bee811e1368f5ceed804f71c0ebdbe8a1d2d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0bc9ff028d12370c660502e9341532513f1e579fc76b402c7ab3de903932bccd1b3a2c20484b28f81af586cbaaa0d63b2c94c8826bfe23d0464089093b3ee320d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ecf718b7206a874c8bfd7cc8e85cc088fc315db2c644718d9966ec38cd99c3b818526cad12abfb90de0f051a620288e24c8c510562a186824be7cc6cd483f6ed7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eda2199d37bcb7064aa016bfed5b4e6454dafc5a3e4e523523f35745344e519c264cd74bffd64e67ed8abc6326dbbbbbdecbb02c077d3ad321faa95822e7608e1d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e24a15df471bd3d913574a95d2a9ffca012a0bfc36b92685fe61e2b378560e18ac8a422fd950bc5d51ef687ea567b0ae419a158dc2e3045bfdbac19e4157360e7d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebec6c6ac904cf3ec2f253e6b10b29a2d8ac14802ac1279ccaa3a40b2673cd39ca22f9d6657981fcd9e592f086a6c1cb38d21f2d08972e492f35218934fee0b7cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34effa253c26c1b402757597e51fc651d1f6cd74f94e86d2ab02a6d2ff1c1a3e02f9f7e6b1c65109540dde082dd347bdceebde8b7aaeb039c7594ca49ab7d561dc9d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e8aaf867a82925ee6e224cdcef3fba3d3a86341968cc1f4b3642175a09f1089036d47fb10427c14ac9a29045fd171a694a9f11dd1d95f1808088143f4e7d59ab6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebb0da4f4c6723cba0abaf596aa79bf9f852ace44e0999d3c4654f49c716bee96cf45f58e14f3219777c51ab7fdacbc2f1fcb83d1e41b671df7e359fd33f8e4efd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eda468487b59adeb3e63876754d323f1d259cc06c116a41b27ae619ef02ab9acd12804a915c686c93d3f638624aea07d74dac24f1e9b8a57ef6d0f6db9e221f6bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb1aeb673703e3da61801515338e1e4091e07c00f633f69ae2120e83579d7c01148b5e7f2fdd2513eeceb4d09c3644dbc99cd8d98e82cd631db9b433324a8a219d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e3d58ea957e4fe014b4a88710e0fd7ae988bcf936d4c500f48418dfb82597fb2c02154122bacb0d63de5b75b33ce9a699bef6febf821bf058b326d88efa82b1e4d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea6694a32e5f8571c36925a2131563e784763496ae568dc25c7ff8828c565f7335330988c770ba0b16ccddc07d502ec3cb048a19e8a00ad524f04ebf7c9a728c3d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed562d74fc49ee73db0fc2934010ddd176f1f9c9f9b5f0c41deaa72aa3b2b0c01e18380b4bb695067e39704b99dcd0c044e9de81b01ce7e63f898780527a044a6d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e075a7c3accbff5048b472768c0cc27663bde81649f87eb0a3a746953a4c1c9744e0c2763cd2fb285b1f0b87cf65aa8a7d6835575ab56976ccb2b1a5ab3efd572d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e25711e24257c040913c1258060a144ddacb705a07dbe8538fedc5e6f7a4e3c0bf0b17c86d1b7a1dc3b9b602882ff4eb9741826c8a13afa0afd4b880ad3a542aed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e96ac5f49c64792d6c09c03eebb88b7bef26c242389c2bc7fb7866297e3a0987463afb423f5c031380e21e17477c76701c6ae9acc822b7c06f7c28cf2798ca674d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ebc80d441a82c6b133298ee80f83479dfcc60b2178a689c7a60405f70499ac741a78eee0b6ef0c8209c53899d65a7d6af2a57471d3a5a5ba834b0ef1392d2bf5bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee62bc67e6bf0e2f0d416d346b46a85ee1a98ae6141babedca13fe171b604b3ada13ad16b30159d078220c502fc654501868640c4d3645fbb5700e59007e744c4d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7ca4833f899e4ea17ee29c8ce53af1104e211f6c669590ed343ed0f10a661e277269279b26f9582fd206a9dad39f560868ea36a746d841d5d38168e6aeb90cf9d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4756698225a6a2cfa98fa6e7cd7ec80cf6cb0e90e3f7d44de495cbe19807b24e58918f45516a00e7724e32d1dfaeb7106a07230e10cfc35ecad3c0fc70d949b9d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e94f36e9336da9b5f45c38481ef0b9420a2af3abe3cbfb5e8f47b195be39c3bd7285167adeb2e027fcc4f8b2cad474b5e5511bb5670d96b27367dc7cab47773ddd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ee26dd67dc95ee3494d82bd4fb6b8757ac8d85c42c45e290e2c393eae3419b418fd260b02b2735218ce75019669a046f87741f2356552a21381cc2abdcb96049bd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e84f98f3dbe88facb0a5e5c30b4367d5a6033c99e4eaa9818a4136a8bb0ac27cec8b660e258faf1ca868892bacca3108c5a0c2b5db958dd6b36411d7f587f7559d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e65ef40dfe6c6e47e7d0638d88670702ead61583005a32f8d6369a791db54077c07843be93d5cf18c85ed149ceb93a1083ee810b00b59150da49342b4e1fba456d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e0e3e8849e1e4afcbe26204029661fcbcf7db2c868f1914a321df5f94b4721f87e566b0a9e16395d93e19b175b5eac8eb5f09b59b85b3e553629de2dfce446dbed53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e2882032225580bdde629b9e5b163e34a9f5ea34c2d4a4606e09e6bb032ec132e0eb9263ad67a10190d18aebf9f3e036227160985b81ed6a149240c0e94ab0382d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e5fa9c73b9aaabdc65f444ff01502ac458d167e6173ef3fa4f08f6f407a98257f69d382658bb166db6f7ba4ec48db248c0e2e7b828243ddfae7659123902995e4d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34efa6a3c7a6162acdb5947e44d5a971f48e001032e539c45224ca99947d0a9cfbe6461f3eaa90ea73da6cef0938f642f59de6b276ce20bed50e3603be20259f74cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e77dcacb0a6c1f900f4935524648dbf4f036357c612dffe0f1c3f849eb3e96efc6afce282706522581398d34968466493d0d0569b6e79292b7d1805cc971ed625d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e4b80675fd40fba439ce51252aae1bbbded8a0d8b55a3fd42b8c970f6166ef6e35295f234fa58688fe05fce66f8ed30a4994283d96afb8ccc9781bc4eaa4b896cd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e7ec3bc2a918e95363fcd21e4bff09cdc6d8cd1db0efead72bde1bed18fd15c96753e82f72bc4855cf422cb2613849ef13f4c13f1fbd9057f52b6c638e9ea6055d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eb17c33f9595ce55f7d93e2fcd835845620aab9f1dde7fd71b4b0edec2be0cfd9c20ed143a58238955462a800514f318011f4c4d90a8fc1d5a4958a929eca845fd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e5c22e9d88ef65fa7530eaf94ad544a7fd9e13fbedd5c3137bf3ca5211878b6cfecf820f0176e260759c6203284b190e65243f911474097bc404a4f2bbee81249d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ed88e1a5686fdadd48c1cbab6267906a2386f2a00c81472cd4b3869fe4a2352cea03785057a382503f5565d514f0c1f45472463e3d77432b656877ec9809e05a8d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ea2a7f7ae47f4ec85298dd63f7b8ac6db104dd07abc2804a49072274b3974363e13b063afe69cc82cc509a11db4f5a3856250cdecf3026f1905c4dda38de84b05d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34eddb30020fe35381c51e551056a050799f849f22948c2d8a5a25ec9af8f5018203a380fc571f67245bfbad36b7557b2dc58ad7a11adbcd6b09e035296f75bac6ad53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e08dd8e8bd31fb406d5ada901d41d4f796ba1cd4f707d86fae7f221df649e511419f684efde981f96b8372278dbb474431fc5c17e713b641e03a127ed75af9a00d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec3144a9a8917a415d6d3fd373dd69472ea0a2be7e3625d938b70a6fb96a46787857b5b441d31bc64f727722dea381d61df5d7a12038c1cf6118005e5524a0bccd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e38a443e4623ae2962e89870eb997f37637a90a25abd26343fce192a57900edf592ebbc75dcc50240b6559921e0b18eb0d57e7472944ec11a87841925e20e0bd8d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ec1665cf825d47134b81505bddf7b9fe552f0e5bc58f8fc6786948851a1a15aea31a86d829c74544ed431f3a8aa1cf3de0ce001baa05388df386c337a0e37e6dfd53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e569cde4677edd80ac0a9825d2e591eb7dfa0639243028387b529e595aae160c193affef3ad841264d8311b3dfedce8e386c5bfacd9f708171d154995c190a007d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34ede732d419e6b36812da67bfe2a15845981d53a953bb3cd20e17a59ca4974b43a69c2e9f5c0835d58bcea395565d9a7daf07c84a1ae6fffc8f596bd41fb65ab30d53315bea08cec50d2591fcaf3b32dc5d289cdc6c16b7e8bed8c8e3f7ceaa34e1926be616dc9806bfb094cfb07617175a51a3aa73371da1344acf43bb56ca2cfd2e3f01bb02058d8e6368d7e8205a8f476dda94251ebfe275673d129b5c01ec1cedf81a7200afb4054ab296ee3c8468e24118332b6a99f0075e2f8148f5f1d917336e4cf97adf5f0114759176842596133e86e735d249d5151f04b5fc35b289ce3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855@@@@@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.3-139.el8_10.1.src.rpmconfig(selinux-policy-minimum)selinux-policy-baseselinux-policy-minimum     /bin/sh/bin/sh/bin/sh/bin/shconfig(selinux-policy-minimum)coreutilspolicycoreutils-python-utilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policyselinux-policy3.14.3-139.el8_10.12.9-193.0.4-14.6.0-14.0-15.2-13.14.3-139.el8_10.13.14.3-139.el8_10.1 container-selinuxseedit1.9.0-94.14.3if [ `ls -A /var/lib/selinux/minimum/active/modules/disabled/` ]; then rm -f /var/lib/selinux/minimum/active/modules/disabled/* fi CR=$'\n' INPUT="" for i in `find /etc/selinux/minimum/modules/active/modules/ -name \*disabled`; do module=`basename $i | sed 's/.pp.disabled//'` if [ -d /var/lib/selinux/minimum/active/modules/100/$module ]; then touch /var/lib/selinux/minimum/active/modules/disabled/$p fi done for i in `find /etc/selinux/minimum/modules/active/modules/ -name \*.pp`; do INPUT="${INPUT}${CR}module -N -a $i" done echo "$INPUT" | /usr/sbin/semanage import -S minimum -N if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi exit 0selinux-policy-minimum3.13.1-138g@eee7@eee)eyee@eKx@eSe@dd d"d@d!dr@d@doMd\dBzd7cc@ck@c@c @cEcn9@cQ8@cF@c@cd@bbb@bb@blb=bw@brjbbbN@b<]@b)@bs@b @ba@a7aNaa@aLa)@abapaZaC1a(a&0a @aj@a@`t`` @`Ȗ@`@`r`O@`OL@`@`3`-@`%@``U__H@_@__#_@_cO_BZ@_5+@_'@_!d_^^^^b^^@^^oj@^K^G@^0"@^&^ P@^@^[^g@^@^@]}@]e@]]Γ@]M@]@]]W]c@]n]y@]i]Z@]V]S]QT]J@]>]1]%@]$\F@\\ \@\ޢ@\\@\\\o@\f\ac\ac\Z@\Z@\T4\T4\P@@\I\@V>@V>@VVwV&@VVvVV<@VVpVhVetV\:@VTQ@VO @VA@V@V/g@V&,V&,V@VZVqVqV }@VBUU@U@U@UU@UȒ@UU@UUK@UUb@U'UU3@UJ@UUv@Uv@UHUB@U4@U.RU-@U#U:U@U hUT@TTE@T@T@TTT[@T T TfT T TTT@T@T}Ty@TxcTmTl@Tl@TeT`T\@TWn@TPTFJTAT=@T2@T*@T @T@TT=@T=@T@SSvS0S@SSSuSuSuS/SϣSS @S@S@SS"@SS-SDSSP@S~@S{CSr @Sj @Sj @ShSg}@SZN@SW@SQSCSCS>S:@S4S2@S1oS&S&S"@S!S L@S L@S@SS@Sz@S(S 4@S?SK@R@R@R'R'R>RRUR@R߲RR@R@RΏ@RʚRRRR@R@R@R@R@R@RiR@R|@Rz/@Rz/@RsRpRnQRi RfhR_@R_@R[RSRNRNRL RIgRB@RB@R:@R1R-@R-@R(r@R' R%@R7RRNRR@Q@QQdQQ@QQޞ@Q@QکQکQ@QzQQ4Q@@Q@QKQQ@Q@Q@Q@QQ@QQQQ@Q@QQQ@Qzl@Qw@QvwQo@Qo@QnQm=@QkQfQb@Q`@Q^QZ@QQQIQGQ@j@Q9Q8@Q4Q0@Q-@Q& @Q$QQ@QQ@Q @Qh@QsPP@P@PP@P[PP!@P8@PO@P @Pf@PPqP @PP7@P@PPPYP@P@PPPM@PPd@P@PoP{@P{@P@PP5@P@P~P}L@Px@PvPvPuc@Puc@Pr@Pmz@Pmz@Pmz@Pj@Pd?Pd?Pb@PaPaP[@PXb@PWPS@PQPO'PM@PIP@@P>@P8@P7lP2&P2&P,P,P*=P(@P#@P#@P!@P!@P@PkPw@Pw@PP

@NNU@NNl@N@N@NåN@NNNN@NNN@N@NGNGNGN@N@NNS@NS@N^N^N @N @NNj@Nj@NN$@NN@N/N@N@NFNFN@NNN@N@N@N]Ni@Ni@Ni@N|tNyNx@Ns:@NoENoENiNf @N^"@N\N[@NTNS@NS@NC@NBrN:N98@N7N6@N2N.@N*N)f@N(N%qN$ @N@N7@N e@NpNpM@M@Md@Md@MM{@M@M۝M@M@M‘@M@M@M@My@My@M3@M@M@MMM@MMMMTMx@Mx@Mv@MlMbSM[@MRMQ0@MQ0@MJMGMGMA^@M>@M9u@M6@M5M4/@M4/@M0:M,F@M$]@M@M9MMMMM\@M M M@L!L!L@LL@L@L@LOLOL[@L@L@Lr@L L,@L,@Lډ@L7LLLNL@LΫLeL|L@LB@LB@LB@L@LMLL@LdLL{L*@L@L5LLA@LLLL@LcL@L@L@LzL)@L|L|L|L{@LvW@LvW@Ls@Ls@LrbLrbLmLk@LjyLe3Lc@La?@LZLYV@LXLN@LN@LMxLMxLI@LH2LF@LEL=L=L=L;L7@L LT@L@LL@L@L0LLGL@K^K^KKKj@K$@KKK@K@KK@K]K޺K@KtK#@KKՀ@K:@KK͗@KŮ@K\K\K @KKKKK9@KK@KK@K@KKKKrKK~@K,K,K,K@KK8@KKK@KK@KqKqK}+K{@K{@KuBKs@KqN@KjKie@Kf@Ka|@K`*K]KXAKTM@KPXKEKEKEKD{@KC)KA@K;@K2@K0K/c@K+nK*@K(K"4@KK>K>K>JJęJH@JH@JJJ_@J@JjJjJ@Jv@Jv@Jv@Jv@J$J@JJ0@J@J@JG@JG@J@JJ@J@J@JJJ#J@JJJ@J:J@JJQJ@J J J|@JzJyt@Jyt@Jx"JrJrJq@Jn@Jn@JmJhPJeJ\s@JW-@JT@JS8JKOJI@JCfJCfJB@J@J@J?r@J<@J;}J:,@J7@J67J2C@J0J/@J,@J%@JJB@JJMJ J dJ@J@JJ@J*@J*@II@IIA@IIII@I@IIIX@IX@IX@II@I@IcIIo@Io@IzI)@I@IܑI@@II@I@I@IԨIд@I̿In@I3I3I@II@I@IV@IIaIIm@I@I'@II2III@IIIIIIII@III@I1I@III~@I}Iy@Ix_Iw@IuItk@Itk@Io%@Ik0IeIcGIa@I`IVIO@IJ;@IHIAI>]I= @I7@I6tI3I-I@III9@I9@II IP@I@IIg@Ig@HHH@HrH~@H,H@HCHHH @H @Hf@Hf@H@H+H@H׈H׈H7@HBH@HǶH@HH|@HHH@H{@H)HHL@H@H@H@HnH}H|@Ht@HsVHr@Hl@HkmHgy@HcH`H_@H^>HRa@HQHQHO@HFHFH$@DX@DU@DN@DN@DLDH@DGwDGwDDD@@D?D?D;@D;@D:HD:HD2_D1@D1@D-D+@D+@D'D!<@D!<@D!<@DDD@D@D@DDDDDD@D@D@D@D uD $@D D @D @DDDFC@C@C@C@CCCCCR@CCCCC@Ci@CC@C@CtC@C@CC:@CECCC @C @CعCعCعCعCC@C-C-C-C@C@CCǖ@C@CáCáCP@CP@C[C @C @CCg@Cg@CCC!@C~@C,C@CCCCC@CC@C@C@CZCZC @C @CCCf@Cf@Cf@CC@CqCqC @C @C @CCC}@C7@C7@C7@CBCBCYC@C@CC}@CqCqZdenek Pytela - 3.14.3-139.1Zdenek Pytela - 3.14.3-139Zdenek Pytela - 3.14.3-138Zdenek Pytela - 3.14.3-137Zdenek Pytela - 3.14.3-136Zdenek Pytela - 3.14.3-135Zdenek Pytela - 3.14.3-134Zdenek Pytela - 3.14.3-133Zdenek Pytela - 3.14.3-132Zdenek Pytela - 3.14.3-131Lukas Vrabec - 3.14.3-130Lukas Vrabec - 3.14.3-129Zdenek Pytela - 3.14.3-128Zdenek Pytela - 3.14.3-127Zdenek Pytela - 3.14.3-126Zdenek Pytela - 3.14.3-125Zdenek Pytela - 3.14.3-124Zdenek Pytela - 3.14.3-123Nikola Knazekova - 3.14.3-122Zdenek Pytela - 3.14.3-121Zdenek Pytela - 3.14.3-120Zdenek Pytela - 3.14.3-119Zdenek Pytela - 3.14.3-118Zdenek Pytela - 3.14.3-117Zdenek Pytela - 3.14.3-116Zdenek Pytela - 3.14.3-115Zdenek Pytela - 3.14.3-114Zdenek Pytela - 3.14.3-113Zdenek Pytela - 3.14.3-112Zdenek Pytela - 3.14.3-111Zdenek Pytela - 3.14.3-110Zdenek Pytela - 3.14.3-109Zdenek Pytela - 3.14.3-108Zdenek Pytela - 3.14.3-107Zdenek Pytela - 3.14.3-106Zdenek Pytela - 3.14.3-105Zdenek Pytela - 3.14.3-104Zdenek Pytela - 3.14.3-103Zdenek Pytela - 3.14.3-102Zdenek Pytela - 3.14.3-101Zdenek Pytela - 3.14.3-100Zdenek Pytela - 3.14.3-99Zdenek Pytela - 3.14.3-98Nikola Knazekova - 3.14.3-97Zdenek Pytela - 3.14.3-96Zdenek Pytela - 3.14.3-95Nikola Knazekova nknazeko@redhat.com - 3.14.3-94Zdenek Pytela - 3.14.3-93Zdenek Pytela - 3.14.3-92Zdenek Pytela - 3.14.3-91Zdenek Pytela - 3.14.3-90Zdenek Pytela - 3.14.3-89Zdenek Pytela - 3.14.3-88Zdenek Pytela - 3.14.3-87Zdenek Pytela - 3.14.3-86Zdenek Pytela - 3.14.3-85Zdenek Pytela - 3.14.3-84Zdenek Pytela - 3.14.3-83Zdenek Pytela - 3.14.3-82Zdenek Pytela - 3.14.3-81Zdenek Pytela - 3.14.3-80Zdenek Pytela - 3.14.3-79Zdenek Pytela - 3.14.3-78Zdenek Pytela - 3.14.3-77Zdenek Pytela - 3.14.3-76Zdenek Pytela - 3.14.3-75Zdenek Pytela - 3.14.3-74Zdenek Pytela - 3.14.3-73Zdenek Pytela - 3.14.3-72Zdenek Pytela - 3.14.3-71Zdenek Pytela - 3.14.3-70Zdenek Pytela - 3.14.3-69Zdenek Pytela - 3.14.3-68Zdenek Pytela - 3.14.3-67Zdenek Pytela - 3.14.3-66Zdenek Pytela - 3.14.3-65Zdenek Pytela - 3.14.3-64Zdenek Pytela - 3.14.3-63Zdenek Pytela - 3.14.3-62Zdenek Pytela - 3.14.3-61Zdenek Pytela - 3.14.3-60Zdenek Pytela - 3.14.3-59Zdenek Pytela - 3.14.3-58Zdenek Pytela - 3.14.3-57Zdenek Pytela - 3.14.3-56Zdenek Pytela - 3.14.3-55Zdenek Pytela - 3.14.3-54Zdenek Pytela - 3.14.3-53Zdenek Pytela - 3.14.3-52Zdenek Pytela - 3.14.3-51Zdenek Pytela - 3.14.3-50Zdenek Pytela - 3.14.3-49Zdenek Pytela - 3.14.3-48Zdenek Pytela - 3.14.3-47Zdenek Pytela - 3.14.3-46Zdenek Pytela - 3.14.3-45Zdenek Pytela - 3.14.3-44Zdenek Pytela - 3.14.3-43Zdenek Pytela - 3.14.3-42Zdenek Pytela - 3.14.3-41Lukas Vrabec - 3.14.3-40Lukas Vrabec - 3.14.3-39Zdenek Pytela - 3.14.3-38Lukas Vrabec - 3.14.3-37Lukas Vrabec - 3.14.3-36Lukas Vrabec - 3.14.3-35Lukas Vrabec - 3.14.3-34Lukas Vrabec - 3.14.3-33Lukas Vrabec - 3.14.3-32Lukas Vrabec - 3.14.3-31Zdenek Pytela - 3.14.3-30Lukas Vrabec - 3.14.3-29Lukas Vrabec - 3.14.3-28Lukas Vrabec - 3.14.3-27Lukas Vrabec - 3.14.3-26Lukas Vrabec - 3.14.3-25Lukas Vrabec - 3.14.3-24Lukas Vrabec - 3.14.3-23Lukas Vrabec - 3.14.3-22Lukas Vrabec - 3.14.3-21Lukas Vrabec - 3.14.3-20Lukas Vrabec - 3.14.3-19Lukas Vrabec - 3.14.3-18Lukas Vrabec - 3.14.3-17Lukas Vrabec - 3.14.3-16Lukas Vrabec - 3.14.3-15Lukas Vrabec - 3.14.3-14Lukas Vrabec - 3.14.3-13Lukas Vrabec - 3.14.3-12Lukas Vrabec - 3.14.3-11Lukas Vrabec - 3.14.3-10Lukas Vrabec - 3.14.3-9Lukas Vrabec - 3.14.3-8Lukas Vrabec - 3.14.3-7Lukas Vrabec - 3.14.3-6Lukas Vrabec - 3.14.3-5Lukas Vrabec - 3.14.3-4Lukas Vrabec - 3.14.3-3Lukas Vrabec - 3.14.3-2Lukas Vrabec - 3.14.3-1Lukas Vrabec - 3.14.1-61Lukas Vrabec - 3.14.1-60Lukas Vrabec - 3.14.1-59Lukas Vrabec - 3.14.1-58Lukas Vrabec - 3.14.1-57Lukas Vrabec - 3.14.1-56Lukas Vrabec - 3.14.1-55Lukas Vrabec - 3.14.1-54Lukas Vrabec - 3.14.1-53Lukas Vrabec - 3.14.1-52Lukas Vrabec - 3.14.1-51Lukas Vrabec - 3.14.1-50Lukas Vrabec - 3.14.1-49Lukas Vrabec - 3.14.1-48Lukas Vrabec - 3.14.1-47Lukas Vrabec - 3.14.1-46Lukas Vrabec - 3.14.1-45Lukas Vrabec - 3.14.1-44Lukas Vrabec - 3.14.1-43Lukas Vrabec - 3.14.1-42Lukas Vrabec - 3.14.1-41Lukas Vrabec - 3.14.1-40Lukas Vrabec - 3.14.1-39Lukas Vrabec - 3.14.1-38Lukas Vrabec - 3.14.1-37Lukas Vrabec - 3.14.1-36Daniel Kopeček - 3.14.1-35Lukas Vrabec - 3.14.1-34Lukas Vrabec - 3.14.1-33Lukas Vrabec - 3.14.1-32Lukas Vrabec - 3.14.1-31Lukas Vrabec - 3.14.1-30Lukas Vrabec - 3.14.1-29Lukas Vrabec - 3.14.1-28Lukas Vrabec - 3.14.1-27Lukas Vrabec - 3.14.1-26Lukas Vrabec - 3.14.1-25Lukas Vrabec - 3.14.1-24Lukas Vrabec - 3.14.1-23Lukas Vrabec - 3.14.1-22Lukas Vrabec - 3.14.1-21Lukas Vrabec - 3.14.1-20Lukas Vrabec - 3.14.1-19Lukas Vrabec - 3.14.1-18Lukas Vrabec - 3.14.1-17Lukas Vrabec - 3.14.1-16Lukas Vrabec - 3.14.1-15Lukas Vrabec - 3.14.1-14Lukas Vrabec - 3.14.1-13Lukas Vrabec - 3.14.1-12Lukas Vrabec - 3.14.1-11Lukas Vrabec - 3.14.1-10Lukas Vrabec - 3.14.1-9Igor Gnatenko - 3.14.1-8Lukas Vrabec - 3.14.1-7Lukas Vrabec - 3.14.1-6Lukas Vrabec - 3.14.1-5Lukas Vrabec - 3.14.1-4Lukas Vrabec - 3.14.1-3Lukas Vrabec - 3.14.1-2Lukas Vrabec - 3.14.1-1Lukas Vrabec - 3.13.1-310Lukas Vrabec - 3.13.1-309Lukas Vrabec - 3.13.1-308Lukas Vrabec - 3.13.1-307Lukas Vrabec - 3.13.1-306Lukas Vrabec - 3.13.1-305Lukas Vrabec - 3.13.1-304Lukas Vrabec - 3.13.1-303Lukas Vrabec - 3.13.1-302Lukas Vrabec - 3.13.1-301Lukas Vrabec - 3.13.1-300Lukas Vrabec - 3.13.1-299Lukas Vrabec - 3.13.1-298Lukas Vrabec - 3.13.1-297Lukas Vrabec - 3.13.1-296Lukas Vrabec - 3.13.1-295Lukas Vrabec - 3.13.1-294Petr Lautrbach - 3.13.1-293Lukas Vrabec - 3.13.1-292Lukas Vrabec - 3.13.1-291Lukas Vrabec - 3.13.1-290Lukas Vrabec - 3.13.1-289Lukas Vrabec - 3.13.1-288Lukas Vrabec - 3.13.1-287Lukas Vrabec - 3.13.1-286Lukas Vrabec - 3.13.1-285Lukas Vrabec - 3.13.1-284Lukas Vrabec - 3.13.1-283Lukas Vrabec - 3.13.1-282Lukas Vrabec - 3.13.1-281Lukas Vrabec - 3.13.1-280Lukas Vrabec - 3.13.1-279Lukas Vrabec - 3.13.1-278Lukas Vrabec - 3.13.1-277Lukas Vrabec - 3.13.1-276Lukas Vrabec - 3.13.1-275Lukas Vrabec - 3.13.1-274Lukas Vrabec - 3.13.1-273Lukas Vrabec - 3.13.1-272Lukas Vrabec - 3.13.1-271Lukas Vrabec - 3.13.1-270Lukas Vrabec - 3.13.1-269Petr Lautrbach - 3.13.1-268Lukas Vrabec - 3.13.1-267Fedora Release Engineering - 3.13.1-266Lukas Vrabec - 3.13.1-265Lukas Vrabec - 3.13.1-264Lukas Vrabec - 3.13.1-263Lukas Vrabec - 3.13.1-262Lukas Vrabec - 3.13.1-261Lukas Vrabec - 3.13.1-260Lukas Vrabec - 3.13.1-258Lukas Vrabec - 3.13.1-257Lukas Vrabec - 3.13.1-256Lukas Vrabec - 3.13.1-255Lukas Vrabec - 3.13.1-254Lukas Vrabec - 3.13.1-253Michael Scherer - 3.13.1-252Lukas Vrabec - 3.13.1-251Lukas Vrabec - 3.13.1-250Lukas Vrabec - 3.13.1-249Adam Williamson - 3.13.1-248Lukas Vrabec - 3.13.1-247Lukas Vrabec - 3.13.1-246Lukas Vrabec - 3.13.1-245Lukas Vrabec - 3.13.1-244Lukas Vrabec - 3.13.1-243Lukas Vrabec - 3.13.1-242Lukas Vrabec - 3.13.1-241Lukas Vrabec - 3.13.1-240Lukas Vrabec - 3.13.1-239Lukas Vrabec - 3.13.1-238Lukas Vrabec - 3.13.1-237Lukas Vrabec - 3.13.1-236Lukas Vrabec - 3.13.1-235Lukas Vrabec - 3.13.1-234Lukas Vrabec - 3.13.1-233Lukas Vrabec - 3.13.1-232Lukas Vrabec - 3.13.1-231Lukas Vrabec - 3.13.1-230Lukas Vrabec - 3.13.1-229Lukas Vrabec - 3.13.1-228Lukas Vrabec - 3.13.1-227Lukas Vrabec - 3.13.1-226Lukas Vrabec - 3.13.1-225Lukas Vrabec - 3.13.1-224Lukas Vrabec - 3.13.1-223Lukas Vrabec - 3.13.1-222Miroslav Grepl - 3.13.1-221Lukas Vrabec - 3.13.1-220Lukas Vrabec - 3.13.1-219Colin Walters - 3.13.1-218Lukas Vrabec 3.13.1-216Lukas Vrabec 3.13.1-215Lukas Vrabec 3.13.1-214Lukas Vrabec 3.13.1-213Lukas Vrabec 3.13.1-212Lukas Vrabec 3.13.1-211Lukas Vrabec 3.13.1-210Lukas Vrabec 3.13.1-209Lukas Vrabec 3.13.1-208Lukas Vrabec 3.13.1-207Lukas Vrabec 3.13.1-206Lukas Vrabec 3.13.1-205Lukas Vrabec 3.13.1-204Lukas Vrabec 3.13.1-203Lukas Vrabec 3.13.1-202Lukas Vrabec 3.13.1-201Lukas Vrabec 3.13.1-200Lukas Vrabec 3.13.1-199Lukas Vrabec 3.13.1-198Lukas Vrabec 3.13.1-197Lukas Vrabec 3.13.1-196Lukas Vrabec 3.13.1-195Lukas Vrabec 3.13.1-194Lukas Vrabec 3.13.1-193Lukas Vrabec 3.13.1-192Lukas Vrabec 3.13.1-191Lukas Vrabec 3.13.1-190Lukas Vrabec 3.13.1-189Lukas Vrabec 3.13.1-188Lukas Vrabec 3.13.1-187Lukas Vrabec 3.13.1-186Lukas Vrabec 3.13.1-185Lukas Vrabec 3.13.1-184Lukas Vrabec 3.13.1-183Lukas Vrabec 3.13.1-182Lukas Vrabec 3.13.1-181Lukas Vrabec 3.13.1-180Lukas Vrabec 3.13.1-179Lukas Vrabec 3.13.1-178Lukas Vrabec 3.13.1-177Lukas Vrabec 3.13.1-176Lukas Vrabec 3.13.1-175Lukas Vrabec 3.13.1-174Lukas Vrabec 3.13.1-173Lukas Vrabec 3.13.1-172Lukas Vrabec 3.13.1-171Lukas Vrabec 3.13.1-170Lukas Vrabec 3.13.1-169Lukas Vrabec 3.13.1-168Lukas Vrabec 3.13.1-167Lukas Vrabec 3.13.1-166Lukas Vrabec 3.13.1-165Lukas Vrabec 3.13.1-164Lukas Vrabec 3.13.1-163Miroslav Grepl 3.13.1-162Lukas Vrabec 3.13.1-161Lukas Vrabec 3.13.1-160Miroslav Grepl 3.13.1-159Miroslav Grepl 3.13.1-158Miroslav Grepl 3.13.1-157Lukas Vrabec 3.13.1-156Lukas Vrabec 3.13.1-155Lukas Vrabec 3.13.1-154Lukas Vrabec 3.13.1-153Lukas Vrabec 3.13.1-152Lukas Vrabec 3.13.1-151Lukas Vrabec 3.13.1-150Lukas Vrabec 3.13.1-149Lukas Vrabec 3.13.1-148Lukas Vrabec 3.13.1-147Lukas Vrabec 3.13.1-146Lukas Vrabec 3.13.1-145Lukas Vrabec 3.13.1-144Miroslav Grepl 3.13.1-143Lukas Vrabec 3.13.1-142Lukas Vrabec 3.13.1-141Miroslav Grepl 3.13.1-140Lukas Vrabec 3.13.1-139Lukas Vrabec 3.13.1-138Lukas Vrabec 3.13.1-137Lukas Vrabec 3.13.1-136Lukas Vrabec 3.13.1-135Lukas Vrabec 3.13.1-134Lukas Vrabec 3.13.1-133Lukas Vrabec 3.13.1-132Lukas Vrabec 3.13.1-131Miroslav Grepl 3.13.1-130Miroslav Grepl 3.13.1-129Miroslav Grepl 3.13.1-128Lukas Vrabec 3.13.1-127Lukas Vrabec 3.13.1-126Lukas Vrabec 3.13.1-125Lukas Vrabec 3.13.1-124Lukas Vrabec 3.13.1-123Lukas Vrabec 3.13.1-122Lukas Vrabec 3.13.1-121Lukas Vrabec 3.13.1-120Lukas Vrabec 3.13.1-119Lukas Vrabec 3.13.1-118Lukas Vrabec 3.13.1-117Lukas Vrabec 3.13.1-116Lukas Vrabec 3.13.1-115Lukas Vrabec 3.13.1-114Lukas Vrabec 3.13.1-113Lukas Vrabec 3.13.1-112Lukas Vrabec 3.13.1-111Lukas Vrabec 3.13.1-110Lukas Vrabec 3.13.1-109Lukas Vrabec 3.13.1-108Lukas Vrabec 3.13.1-107Lukas Vrabec 3.13.1-106Lukas Vrabec 3.13.1-105Lukas Vrabec 3.13.1-104Dan Walsh 3.13.1-103Lukas Vrabec 3.13.1-101Lukas Vrabec 3.13.1-100Lukas Vrabec 3.13.1-99Lukas Vrabec 3.13.1-98Lukas Vrabec 3.13.1-97Lukas Vrabec 3.13.1-96Lukas Vrabec 3.13.1-95Lukas Vrabec 3.13.1-94Lukas Vrabec 3.13.1-93Lukas Vrabec 3.13.1-92Lukas Vrabec 3.13.1-91Lukas Vrabec 3.13.1-90Lukas Vrabec 3.13.1-89Lukas Vrabec 3.13.1-88Miroslav Grepl 3.13.1-87Lukas Vrabec 3.13.1-86Lukas Vrabec 3.13.1-85Lukas Vrabec 3.13.1-84Lukas Vrabec 3.13.1-83Miroslav Grepl 3.13.1-82Lukas Vrabec 3.13.1-81Lukas Vrabec 3.13.1-80Lukas Vrabec 3.13.1-79Lukas Vrabec 3.13.1-78Lukas Vrabec 3.13.1-77Lukas Vrabec 3.13.1-76Lukas Vrabec 3.13.1-75Kevin Fenzi - 3.13.1-74Lukas Vrabec 3.13.1-73Lukas Vrabec 3.13.1-72Miroslav Grepl 3.13.1-71Miroslav Grepl 3.13.1-70Tom Callaway 3.13.1-69Miroslav Grepl 3.13.1-68Lukas Vrabec 3.13.1-67Miroslav Grepl 3.13.1-66Lukas Vrabec 3.13.1-65Lukas Vrabec 3.13.1-64Miroslav Grepl 3.13.1-63Miroslav Grepl 3.13.1-62Miroslav Grepl 3.13.1-61Miroslav Grepl 3.13.1-60Miroslav Grepl 3.13.1-59Miroslav Grepl 3.13.1-58Miroslav Grepl 3.13.1-57Fedora Release Engineering - 3.13.1-56Miroslav Grepl 3.13.1-55Miroslav Grepl 3.13.1-54Miroslav Grepl 3.13.1-53Miroslav Grepl 3.13.1-52Miroslav Grepl 3.13.1-51Miroslav Grepl 3.13.1-50Miroslav Grepl 3.13.1-49Miroslav Grepl 3.13.1-48Miroslav Grepl 3.13.1-47Miroslav Grepl 3.13.1-46Miroslav Grepl 3.13.1-45Miroslav Grepl 3.13.1-44Miroslav Grepl 3.13.1-43Miroslav Grepl 3.13.1-42Miroslav Grepl 3.13.1-41Miroslav Grepl 3.13.1-40Miroslav Grepl 3.13.1-39Miroslav Grepl 3.13.1-38Miroslav Grepl 3.13.1-37Miroslav Grepl 3.13.1-36Miroslav Grepl 3.13.1-35Miroslav Grepl 3.13.1-34Miroslav Grepl 3.13.1-33Miroslav Grepl 3.13.1-32Miroslav Grepl 3.13.1-31Miroslav Grepl 3.13.1-30Miroslav Grepl 3.13.1-29Miroslav Grepl 3.13.1-28Miroslav Grepl 3.13.1-27Miroslav Grepl 3.13.1-26Miroslav Grepl 3.13.1-25Miroslav Grepl 3.13.1-24Miroslav Grepl 3.13.1-23Miroslav Grepl 3.13.1-22Miroslav Grepl 3.13.1-21Miroslav Grepl 3.13.1-20Miroslav Grepl 3.13.1-19Miroslav Grepl 3.13.1-18Miroslav Grepl 3.13.1-17Miroslav Grepl 3.13.1-16Miroslav Grepl 3.13.1-15Miroslav Grepl 3.13.1-14Miroslav Grepl 3.13.1-13Miroslav Grepl 3.13.1-12Miroslav Grepl 3.13.1-11Miroslav Grepl 3.13.1-10Miroslav Grepl 3.13.1-9Miroslav Grepl 3.13.1-8Miroslav Grepl 3.13.1-7Miroslav Grepl 3.13.1-6Miroslav Grepl 3.13.1-5Miroslav Grepl 3.13.1-4Miroslav Grepl 3.13.1-3Dan Walsh 3.13.1-2Miroslav Grepl 3.13.1-1Miroslav Grepl 3.12.1-100Miroslav Grepl 3.12.1-99Miroslav Grepl 3.12.1-98Miroslav Grepl 3.12.1-97Miroslav Grepl 3.12.1-96Miroslav Grepl 3.12.1-95Miroslav Grepl 3.12.1-94Miroslav Grepl 3.12.1-93Miroslav Grepl 3.12.1-92Miroslav Grepl 3.12.1-91Miroslav Grepl 3.12.1-90Miroslav Grepl 3.12.1-89Miroslav Grepl 3.12.1-88Miroslav Grepl 3.12.1-87Miroslav Grepl 3.12.1-86Miroslav Grepl 3.12.1-85Miroslav Grepl 3.12.1-84Miroslav Grepl 3.12.1-83Miroslav Grepl 3.12.1-82Miroslav Grepl 3.12.1-81Miroslav Grepl 3.12.1-80Miroslav Grepl 3.12.1-79Miroslav Grepl 3.12.1-78Miroslav Grepl 3.12.1-77Miroslav Grepl 3.12.1-76Miroslav Grepl 3.12.1-75Miroslav Grepl 3.12.1-74Miroslav Grepl 3.12.1-73Miroslav Grepl 3.12.1-72Miroslav Grepl 3.12.1-71Miroslav Grepl 3.12.1-70Miroslav Grepl 3.12.1-69Miroslav Grepl 3.12.1-68Miroslav Grepl 3.12.1-67Miroslav Grepl 3.12.1-66Miroslav Grepl 3.12.1-65Miroslav Grepl 3.12.1-64Miroslav Grepl 3.12.1-63Miroslav Grepl 3.12.1-62Miroslav Grepl 3.12.1-61Miroslav Grepl 3.12.1-60Miroslav Grepl 3.12.1-59Miroslav Grepl 3.12.1-58Miroslav Grepl 3.12.1-57Miroslav Grepl 3.12.1-56Miroslav Grepl 3.12.1-55Miroslav Grepl 3.12.1-54Miroslav Grepl 3.12.1-53Miroslav Grepl 3.12.1-52Miroslav Grepl 3.12.1-51Miroslav Grepl 3.12.1-50Miroslav Grepl 3.12.1-49Miroslav Grepl 3.12.1-48Miroslav Grepl 3.12.1-47Miroslav Grepl 3.12.1-46Miroslav Grepl 3.12.1-45Miroslav Grepl 3.12.1-44Miroslav Grepl 3.12.1-43Miroslav Grepl 3.12.1-42Miroslav Grepl 3.12.1-41Miroslav Grepl 3.12.1-40Miroslav Grepl 3.12.1-39Miroslav Grepl 3.12.1-38Miroslav Grepl 3.12.1-37Miroslav Grepl 3.12.1-36Miroslav Grepl 3.12.1-35Miroslav Grepl 3.12.1-34Miroslav Grepl 3.12.1-33Miroslav Grepl 3.12.1-32Miroslav Grepl 3.12.1-31Miroslav Grepl 3.12.1-30Miroslav Grepl 3.12.1-29Dan Walsh 3.12.1-28Dan Walsh 3.12.1-27Miroslav Grepl 3.12.1-26Miroslav Grepl 3.12.1-25Miroslav Grepl 3.12.1-24Miroslav Grepl 3.12.1-23Miroslav Grepl 3.12.1-22Miroslav Grepl 3.12.1-21Miroslav Grepl 3.12.1-20Miroslav Grepl 3.12.1-19Miroslav Grepl 3.12.1-18Miroslav Grepl 3.12.1-17Miroslav Grepl 3.12.1-16Miroslav Grepl 3.12.1-15Miroslav Grepl 3.12.1-14Miroslav Grepl 3.12.1-13Miroslav Grepl 3.12.1-12Miroslav Grepl 3.12.1-11Miroslav Grepl 3.12.1-10Miroslav Grepl 3.12.1-9Miroslav Grepl 3.12.1-8Miroslav Grepl 3.12.1-7Miroslav Grepl 3.12.1-6Miroslav Grepl 3.12.1-5Miroslav Grepl 3.12.1-4Miroslav Grepl 3.12.1-3Miroslav Grepl 3.12.1-2Miroslav Grepl 3.12.1-1Dan Walsh 3.11.1-69.1Miroslav Grepl 3.11.1-69Miroslav Grepl 3.11.1-68Miroslav Grepl 3.11.1-67Miroslav Grepl 3.11.1-66Miroslav Grepl 3.11.1-65Miroslav Grepl 3.11.1-64Miroslav Grepl 3.11.1-63Miroslav Grepl 3.11.1-62Miroslav Grepl 3.11.1-61Miroslav Grepl 3.11.1-60Miroslav Grepl 3.11.1-59Miroslav Grepl 3.11.1-58Miroslav Grepl 3.11.1-57Miroslav Grepl 3.11.1-56Miroslav Grepl 3.11.1-55Miroslav Grepl 3.11.1-54Miroslav Grepl 3.11.1-53Miroslav Grepl 3.11.1-52Miroslav Grepl 3.11.1-51Miroslav Grepl 3.11.1-50Miroslav Grepl 3.11.1-49Miroslav Grepl 3.11.1-48Miroslav Grepl 3.11.1-47Miroslav Grepl 3.11.1-46Miroslav Grepl 3.11.1-45Miroslav Grepl 3.11.1-44Miroslav Grepl 3.11.1-43Miroslav Grepl 3.11.1-42Miroslav Grepl 3.11.1-41Miroslav Grepl 3.11.1-40Miroslav Grepl 3.11.1-39Miroslav Grepl 3.11.1-38Miroslav Grepl 3.11.1-37Miroslav Grepl 3.11.1-36Miroslav Grepl 3.11.1-35Miroslav Grepl 3.11.1-34Miroslav Grepl 3.11.1-33Miroslav Grepl 3.11.1-32Miroslav Grepl 3.11.1-31Miroslav Grepl 3.11.1-30Miroslav Grepl 3.11.1-29Miroslav Grepl 3.11.1-28Miroslav Grepl 3.11.1-27Miroslav Grepl 3.11.1-26Miroslav Grepl 3.11.1-25Miroslav Grepl 3.11.1-24Miroslav Grepl 3.11.1-23Miroslav Grepl 3.11.1-22Miroslav Grepl 3.11.1-21Miroslav Grepl 3.11.1-20Miroslav Grepl 3.11.1-19Miroslav Grepl 3.11.1-18Miroslav Grepl 3.11.1-17Miroslav Grepl 3.11.1-16Dan Walsh 3.11.1-15Miroslav Grepl 3.11.1-14Dan Walsh 3.11.1-13Miroslav Grepl 3.11.1-12Miroslav Grepl 3.11.1-11Miroslav Grepl 3.11.1-10Dan Walsh 3.11.1-9Dan Walsh 3.11.1-8Dan Walsh 3.11.1-7Dan Walsh 3.11.1-6Miroslav Grepl 3.11.1-5Miroslav Grepl 3.11.1-4Miroslav Grepl 3.11.1-3Miroslav Grepl 3.11.1-2Miroslav Grepl 3.11.1-1Miroslav Grepl 3.11.1-0Miroslav Grepl 3.11.0-15Miroslav Grepl 3.11.0-14Miroslav Grepl 3.11.0-13Miroslav Grepl 3.11.0-12Fedora Release Engineering - 3.11.0-11Miroslav Grepl 3.11.0-10Miroslav Grepl 3.11.0-9Miroslav Grepl 3.11.0-8Miroslav Grepl 3.11.0-7Miroslav Grepl 3.11.0-6Miroslav Grepl 3.11.0-5Miroslav Grepl 3.11.0-4Miroslav Grepl 3.11.0-3Miroslav Grepl 3.11.0-2Miroslav Grepl 3.11.0-1Miroslav Grepl 3.10.0-128Miroslav Grepl 3.10.0-127Miroslav Grepl 3.10.0-126Miroslav Grepl 3.10.0-125Miroslav Grepl 3.10.0-124Miroslav Grepl 3.10.0-123Miroslav Grepl 3.10.0-122Miroslav Grepl 3.10.0-121Miroslav Grepl 3.10.0-120Miroslav Grepl 3.10.0-119Miroslav Grepl 3.10.0-118Miroslav Grepl 3.10.0-117Miroslav Grepl 3.10.0-116Miroslav Grepl 3.10.0-115Miroslav Grepl 3.10.0-114Miroslav Grepl 3.10.0-113Miroslav Grepl 3.10.0-112Miroslav Grepl 3.10.0-111Miroslav Grepl 3.10.0-110Miroslav Grepl 3.10.0-109Miroslav Grepl 3.10.0-108Miroslav Grepl 3.10.0-107Miroslav Grepl 3.10.0-106Miroslav Grepl 3.10.0-105Miroslav Grepl 3.10.0-104Miroslav Grepl 3.10.0-103Miroslav Grepl 3.10.0-102Miroslav Grepl 3.10.0-101Miroslav Grepl 3.10.0-100Miroslav Grepl 3.10.0-99Miroslav Grepl 3.10.0-98Miroslav Grepl 3.10.0-97Miroslav Grepl 3.10.0-96Miroslav Grepl 3.10.0-95Miroslav Grepl 3.10.0-94Miroslav Grepl 3.10.0-93Miroslav Grepl 3.10.0-92Miroslav Grepl 3.10.0-91Miroslav Grepl 3.10.0-90Miroslav Grepl 3.10.0-89Miroslav Grepl 3.10.0-88Miroslav Grepl 3.10.0-87Miroslav Grepl 3.10.0-86Miroslav Grepl 3.10.0-85Miroslav Grepl 3.10.0-84Miroslav Grepl 3.10.0-83Miroslav Grepl 3.10.0-82Dan Walsh 3.10.0-81.2Miroslav Grepl 3.10.0-81Miroslav Grepl 3.10.0-80Miroslav Grepl 3.10.0-79Miroslav Grepl 3.10.0-78Miroslav Grepl 3.10.0-77Miroslav Grepl 3.10.0-76Miroslav Grepl 3.10.0-75Dan Walsh 3.10.0-74.2Miroslav Grepl 3.10.0-74Miroslav Grepl 3.10.0-73Miroslav Grepl 3.10.0-72Miroslav Grepl 3.10.0-71Miroslav Grepl 3.10.0-70Miroslav Grepl 3.10.0-69Miroslav Grepl 3.10.0-68Miroslav Grepl 3.10.0-67Miroslav Grepl 3.10.0-66Miroslav Grepl 3.10.0-65Miroslav Grepl 3.10.0-64Miroslav Grepl 3.10.0-63Miroslav Grepl 3.10.0-59Miroslav Grepl 3.10.0-58Dan Walsh 3.10.0-57Dan Walsh 3.10.0-56Dan Walsh 3.10.0-55.2Dan Walsh 3.10.0-55.1Miroslav Grepl 3.10.0-55Dan Walsh 3.10.0-54.1Miroslav Grepl 3.10.0-54Dan Walsh 3.10.0-53.1Miroslav Grepl 3.10.0-53Miroslav Grepl 3.10.0-52Miroslav Grepl 3.10.0-51Dan Walsh 3.10.0-50.2Dan Walsh 3.10.0-50.1Miroslav Grepl 3.10.0-50Miroslav Grepl 3.10.0-49Miroslav Grepl 3.10.0-48Miroslav Grepl 3.10.0-47Dan Walsh 3.10.0-46.1Miroslav Grepl 3.10.0-46Dan Walsh 3.10.0-45.1Miroslav Grepl 3.10.0-45Miroslav Grepl 3.10.0-43Miroslav Grepl 3.10.0-42Miroslav Grepl 3.10.0-41Dan Walsh 3.10.0-40.2Miroslav Grepl 3.10.0-40Dan Walsh 3.10.0-39.3Dan Walsh 3.10.0-39.2Dan Walsh 3.10.0-39.1Miroslav Grepl 3.10.0-39Dan Walsh 3.10.0-38.1Miroslav Grepl 3.10.0-38Miroslav Grepl 3.10.0-37Dan Walsh 3.10.0-36.1Miroslav Grepl 3.10.0-36Dan Walsh 3.10.0-35Dan Walsh 3.10.0-34.7Dan Walsh 3.10.0-34.6Dan Walsh 3.10.0-34.4Miroslav Grepl 3.10.0-34.3Dan Walsh 3.10.0-34.2Dan Walsh 3.10.0-34.1Miroslav Grepl 3.10.0-34Miroslav Grepl 3.10.0-33Dan Walsh 3.10.0-31.1Miroslav Grepl 3.10.0-31Miroslav Grepl 3.10.0-29Miroslav Grepl 3.10.0-28Miroslav Grepl 3.10.0-27Miroslav Grepl 3.10.0-26Miroslav Grepl 3.10.0-25Miroslav Grepl 3.10.0-24Miroslav Grepl 3.10.0-23Miroslav Grepl 3.10.0-22Miroslav Grepl 3.10.0-21Dan Walsh 3.10.0-20Miroslav Grepl 3.10.0-19Miroslav Grepl 3.10.0-18Miroslav Grepl 3.10.0-17Miroslav Grepl 3.10.0-16Miroslav Grepl 3.10.0-14Miroslav Grepl 3.10.0-13Miroslav Grepl 3.10.0-12Miroslav Grepl 3.10.0-11Miroslav Grepl 3.10.0-10Miroslav Grepl 3.10.0-9Miroslav Grepl 3.10.0-8Miroslav Grepl 3.10.0-7Miroslav Grepl 3.10.0-6Miroslav Grepl 3.10.0-5Miroslav Grepl 3.10.0-4Miroslav Grepl 3.10.0-3Miroslav Grepl 3.10.0-2Miroslav Grepl 3.10.0-1Miroslav Grepl 3.9.16-30Dan Walsh 3.9.16-29.1Miroslav Grepl 3.9.16-29Dan Walsh 3.9.16-28.1Miroslav Grepl 3.9.16-27Miroslav Grepl 3.9.16-26Miroslav Grepl 3.9.16-25Miroslav Grepl 3.9.16-24Miroslav Grepl 3.9.16-23Miroslav Grepl 3.9.16-22Miroslav Grepl 3.9.16-21Miroslav Grepl 3.9.16-20Miroslav Grepl 3.9.16-19Miroslav Grepl 3.9.16-18Miroslav Grepl 3.9.16-17Dan Walsh 3.9.16-16.1Miroslav Grepl 3.9.16-16Miroslav Grepl 3.9.16-15Miroslav Grepl 3.9.16-14Miroslav Grepl 3.9.16-13Miroslav Grepl 3.9.16-12Miroslav Grepl 3.9.16-11Miroslav Grepl 3.9.16-10Miroslav Grepl 3.9.16-7Miroslav Grepl 3.9.16-6Miroslav Grepl 3.9.16-5Miroslav Grepl 3.9.16-4Miroslav Grepl 3.9.16-3Miroslav Grepl 3.9.16-2Miroslav Grepl 3.9.16-1Miroslav Grepl 3.9.15-5Miroslav Grepl 3.9.15-2Miroslav Grepl 3.9.15-1Fedora Release Engineering - 3.9.14-2Dan Walsh 3.9.14-1Miroslav Grepl 3.9.13-10Miroslav Grepl 3.9.13-9Dan Walsh 3.9.13-8Miroslav Grepl 3.9.13-7Miroslav Grepl 3.9.13-6Miroslav Grepl 3.9.13-5Miroslav Grepl 3.9.13-4Miroslav Grepl 3.9.13-3Miroslav Grepl 3.9.13-2Miroslav Grepl 3.9.13-1Miroslav Grepl 3.9.12-8Miroslav Grepl 3.9.12-7Miroslav Grepl 3.9.12-6Miroslav Grepl 3.9.12-5Dan Walsh 3.9.12-4Dan Walsh 3.9.12-3Dan Walsh 3.9.12-2Miroslav Grepl 3.9.12-1Dan Walsh 3.9.11-2Miroslav Grepl 3.9.11-1Miroslav Grepl 3.9.10-13Dan Walsh 3.9.10-12Miroslav Grepl 3.9.10-11Miroslav Grepl 3.9.10-10Miroslav Grepl 3.9.10-9Miroslav Grepl 3.9.10-8Miroslav Grepl 3.9.10-7Miroslav Grepl 3.9.10-6Miroslav Grepl 3.9.10-5Dan Walsh 3.9.10-4Miroslav Grepl 3.9.10-3Miroslav Grepl 3.9.10-2Miroslav Grepl 3.9.10-1Miroslav Grepl 3.9.9-4Dan Walsh 3.9.9-3Miroslav Grepl 3.9.9-2Miroslav Grepl 3.9.9-1Miroslav Grepl 3.9.8-7Dan Walsh 3.9.8-6Miroslav Grepl 3.9.8-5Miroslav Grepl 3.9.8-4Dan Walsh 3.9.8-3Dan Walsh 3.9.8-2Dan Walsh 3.9.8-1Dan Walsh 3.9.7-10Dan Walsh 3.9.7-9Dan Walsh 3.9.7-8Dan Walsh 3.9.7-7Dan Walsh 3.9.7-6Dan Walsh 3.9.7-5Dan Walsh 3.9.7-4Dan Walsh 3.9.7-3Dan Walsh 3.9.7-2Dan Walsh 3.9.7-1Dan Walsh 3.9.6-3Dan Walsh 3.9.6-2Dan Walsh 3.9.6-1Dan Walsh 3.9.5-11Dan Walsh 3.9.5-10Dan Walsh 3.9.5-9Dan Walsh 3.9.5-8Dan Walsh 3.9.5-7Dan Walsh 3.9.5-6Dan Walsh 3.9.5-5Dan Walsh 3.9.5-4Dan Walsh 3.9.5-3Dan Walsh 3.9.5-2Dan Walsh 3.9.5-1Dan Walsh 3.9.4-3Dan Walsh 3.9.4-2Dan Walsh 3.9.4-1Dan Walsh 3.9.3-4Dan Walsh 3.9.3-3Dan Walsh 3.9.3-2Dan Walsh 3.9.3-1Dan Walsh 3.9.2-1Dan Walsh 3.9.1-3Dan Walsh 3.9.1-2Dan Walsh 3.9.1-1Dan Walsh 3.9.0-2Dan Walsh 3.9.0-1Dan Walsh 3.8.8-21Dan Walsh 3.8.8-20Dan Walsh 3.8.8-19Dan Walsh 3.8.8-18Dan Walsh 3.8.8-17Dan Walsh 3.8.8-16Dan Walsh 3.8.8-15Dan Walsh 3.8.8-14Dan Walsh 3.8.8-13Dan Walsh 3.8.8-12Dan Walsh 3.8.8-11Dan Walsh 3.8.8-10Dan Walsh 3.8.8-9Dan Walsh 3.8.8-8Dan Walsh 3.8.8-7Dan Walsh 3.8.8-6Dan Walsh 3.8.8-5Dan Walsh 3.8.8-4Dan Walsh 3.8.8-3Dan Walsh 3.8.8-2Dan Walsh 3.8.8-1Dan Walsh 3.8.7-3Dan Walsh 3.8.7-2Dan Walsh 3.8.7-1Dan Walsh 3.8.6-3Miroslav Grepl 3.8.6-2Dan Walsh 3.8.6-1Dan Walsh 3.8.5-1Dan Walsh 3.8.4-1Dan Walsh 3.8.3-4Dan Walsh 3.8.3-3Dan Walsh 3.8.3-2Dan Walsh 3.8.3-1Dan Walsh 3.8.2-1Dan Walsh 3.8.1-5Dan Walsh 3.8.1-4Dan Walsh 3.8.1-3Dan Walsh 3.8.1-2Dan Walsh 3.8.1-1Dan Walsh 3.7.19-22Dan Walsh 3.7.19-21Dan Walsh 3.7.19-20Dan Walsh 3.7.19-19Dan Walsh 3.7.19-17Dan Walsh 3.7.19-16Dan Walsh 3.7.19-15Dan Walsh 3.7.19-14Dan Walsh 3.7.19-13Dan Walsh 3.7.19-12Dan Walsh 3.7.19-11Dan Walsh 3.7.19-10Dan Walsh 3.7.19-9Dan Walsh 3.7.19-8Dan Walsh 3.7.19-7Dan Walsh 3.7.19-6Dan Walsh 3.7.19-5Dan Walsh 3.7.19-4Dan Walsh 3.7.19-3Dan Walsh 3.7.19-2Dan Walsh 3.7.19-1Dan Walsh 3.7.18-3Dan Walsh 3.7.18-2Dan Walsh 3.7.18-1Dan Walsh 3.7.17-6Dan Walsh 3.7.17-5Dan Walsh 3.7.17-4Dan Walsh 3.7.17-3Dan Walsh 3.7.17-2Dan Walsh 3.7.17-1Dan Walsh 3.7.16-2Dan Walsh 3.7.16-1Dan Walsh 3.7.15-4Dan Walsh 3.7.15-3Dan Walsh 3.7.15-2Dan Walsh 3.7.15-1Dan Walsh 3.7.14-5Dan Walsh 3.7.14-4Dan Walsh 3.7.14-3Dan Walsh 3.7.14-2Dan Walsh 3.7.14-1Dan Walsh 3.7.13-4Dan Walsh 3.7.13-3Dan Walsh 3.7.13-2Dan Walsh 3.7.13-1Dan Walsh 3.7.12-1Dan Walsh 3.7.11-1Dan Walsh 3.7.10-5Dan Walsh 3.7.10-4Dan Walsh 3.7.10-3Dan Walsh 3.7.10-2Dan Walsh 3.7.10-1Dan Walsh 3.7.9-4Dan Walsh 3.7.9-3Dan Walsh 3.7.9-2Dan Walsh 3.7.9-1Dan Walsh 3.7.8-11Dan Walsh 3.7.8-9Dan Walsh 3.7.8-8Dan Walsh 3.7.8-7Dan Walsh 3.7.8-6Dan Walsh 3.7.8-5Dan Walsh 3.7.8-4Dan Walsh 3.7.8-3Dan Walsh 3.7.8-2Dan Walsh 3.7.8-1Dan Walsh 3.7.7-3Dan Walsh 3.7.7-2Dan Walsh 3.7.7-1Dan Walsh 3.7.6-1Dan Walsh 3.7.5-8Dan Walsh 3.7.5-7Dan Walsh 3.7.5-6Dan Walsh 3.7.5-5Dan Walsh 3.7.5-4Dan Walsh 3.7.5-3Dan Walsh 3.7.5-2Dan Walsh 3.7.5-1Dan Walsh 3.7.4-4Dan Walsh 3.7.4-3Dan Walsh 3.7.4-2Dan Walsh 3.7.4-1Dan Walsh 3.7.3-1Dan Walsh 3.7.1-1Dan Walsh 3.6.33-2Dan Walsh 3.6.33-1Dan Walsh 3.6.32-17Dan Walsh 3.6.32-16Dan Walsh 3.6.32-15Dan Walsh 3.6.32-13Dan Walsh 3.6.32-12Dan Walsh 3.6.32-11Dan Walsh 3.6.32-10Dan Walsh 3.6.32-9Dan Walsh 3.6.32-8Dan Walsh 3.6.32-7Dan Walsh 3.6.32-6Dan Walsh 3.6.32-5Dan Walsh 3.6.32-4Dan Walsh 3.6.32-3Dan Walsh 3.6.32-2Dan Walsh 3.6.32-1Dan Walsh 3.6.31-5Dan Walsh 3.6.31-4Dan Walsh 3.6.31-3Dan Walsh 3.6.31-2Dan Walsh 3.6.30-6Dan Walsh 3.6.30-5Dan Walsh 3.6.30-4Dan Walsh 3.6.30-3Dan Walsh 3.6.30-2Dan Walsh 3.6.30-1Dan Walsh 3.6.29-2Dan Walsh 3.6.29-1Dan Walsh 3.6.28-9Dan Walsh 3.6.28-8Dan Walsh 3.6.28-7Dan Walsh 3.6.28-6Dan Walsh 3.6.28-5Dan Walsh 3.6.28-4Dan Walsh 3.6.28-3Dan Walsh 3.6.28-2Dan Walsh 3.6.28-1Dan Walsh 3.6.27-1Dan Walsh 3.6.26-11Dan Walsh 3.6.26-10Dan Walsh 3.6.26-9Bill Nottingham 3.6.26-8Dan Walsh 3.6.26-7Dan Walsh 3.6.26-6Dan Walsh 3.6.26-5Dan Walsh 3.6.26-4Dan Walsh 3.6.26-3Dan Walsh 3.6.26-2Dan Walsh 3.6.26-1Dan Walsh 3.6.25-1Dan Walsh 3.6.24-1Dan Walsh 3.6.23-2Dan Walsh 3.6.23-1Dan Walsh 3.6.22-3Dan Walsh 3.6.22-1Dan Walsh 3.6.21-4Dan Walsh 3.6.21-3Tom "spot" Callaway 3.6.21-2Dan Walsh 3.6.21-1Dan Walsh 3.6.20-2Dan Walsh 3.6.20-1Dan Walsh 3.6.19-5Dan Walsh 3.6.19-4Dan Walsh 3.6.19-3Dan Walsh 3.6.19-2Dan Walsh 3.6.19-1Dan Walsh 3.6.18-1Dan Walsh 3.6.17-1Dan Walsh 3.6.16-4Dan Walsh 3.6.16-3Dan Walsh 3.6.16-2Dan Walsh 3.6.16-1Dan Walsh 3.6.14-3Dan Walsh 3.6.14-2Dan Walsh 3.6.14-1Dan Walsh 3.6.13-3Dan Walsh 3.6.13-2Dan Walsh 3.6.13-1Dan Walsh 3.6.12-39Dan Walsh 3.6.12-38Dan Walsh 3.6.12-37Dan Walsh 3.6.12-36Dan Walsh 3.6.12-35Dan Walsh 3.6.12-34Dan Walsh 3.6.12-33Dan Walsh 3.6.12-31Dan Walsh 3.6.12-30Dan Walsh 3.6.12-29Dan Walsh 3.6.12-28Dan Walsh 3.6.12-27Dan Walsh 3.6.12-26Dan Walsh 3.6.12-25Dan Walsh 3.6.12-24Dan Walsh 3.6.12-23Dan Walsh 3.6.12-22Dan Walsh 3.6.12-21Dan Walsh 3.6.12-20Dan Walsh 3.6.12-19Dan Walsh 3.6.12-16Dan Walsh 3.6.12-15Dan Walsh 3.6.12-14Dan Walsh 3.6.12-13Dan Walsh 3.6.12-12Dan Walsh 3.6.12-11Dan Walsh 3.6.12-10Dan Walsh 3.6.12-9Dan Walsh 3.6.12-8Dan Walsh 3.6.12-7Dan Walsh 3.6.12-6Dan Walsh 3.6.12-5Dan Walsh 3.6.12-4Dan Walsh 3.6.12-3Dan Walsh 3.6.12-2Dan Walsh 3.6.12-1Dan Walsh 3.6.11-1Dan Walsh 3.6.10-9Dan Walsh 3.6.10-8Dan Walsh 3.6.10-7Dan Walsh 3.6.10-6Dan Walsh 3.6.10-5Dan Walsh 3.6.10-4Dan Walsh 3.6.10-3Dan Walsh 3.6.10-2Dan Walsh 3.6.10-1Dan Walsh 3.6.9-4Dan Walsh 3.6.9-3Dan Walsh 3.6.9-2Dan Walsh 3.6.9-1Dan Walsh 3.6.8-4Dan Walsh 3.6.8-3Dan Walsh 3.6.8-2Dan Walsh 3.6.8-1Dan Walsh 3.6.7-2Dan Walsh 3.6.7-1Dan Walsh 3.6.6-9Dan Walsh 3.6.6-8Fedora Release Engineering - 3.6.6-7Dan Walsh 3.6.6-6Dan Walsh 3.6.6-5Dan Walsh 3.6.6-4Dan Walsh 3.6.6-3Dan Walsh 3.6.6-2Dan Walsh 3.6.6-1Dan Walsh 3.6.5-3Dan Walsh 3.6.5-1Dan Walsh 3.6.4-6Dan Walsh 3.6.4-5Dan Walsh 3.6.4-4Dan Walsh 3.6.4-3Dan Walsh 3.6.4-2Dan Walsh 3.6.4-1Dan Walsh 3.6.3-13Dan Walsh 3.6.3-12Dan Walsh 3.6.3-11Dan Walsh 3.6.3-10Dan Walsh 3.6.3-9Dan Walsh 3.6.3-8Dan Walsh 3.6.3-7Dan Walsh 3.6.3-6Dan Walsh 3.6.3-3Dan Walsh 3.6.3-2Dan Walsh 3.6.3-1Dan Walsh 3.6.2-5Dan Walsh 3.6.2-4Dan Walsh 3.6.2-3Dan Walsh 3.6.2-2Dan Walsh 3.6.2-1Dan Walsh 3.6.1-15Dan Walsh 3.6.1-14Dan Walsh 3.6.1-13Dan Walsh 3.6.1-12Dan Walsh 3.6.1-11Dan Walsh 3.6.1-10Dan Walsh 3.6.1-9Dan Walsh 3.6.1-8Dan Walsh 3.6.1-7Dan Walsh 3.6.1-4Ignacio Vazquez-Abrams - 3.6.1-2Dan Walsh 3.5.13-19Dan Walsh 3.5.13-18Dan Walsh 3.5.13-17Dan Walsh 3.5.13-16Dan Walsh 3.5.13-15Dan Walsh 3.5.13-14Dan Walsh 3.5.13-13Dan Walsh 3.5.13-12Dan Walsh 3.5.13-11Dan Walsh 3.5.13-9Dan Walsh 3.5.13-8Dan Walsh 3.5.13-7Dan Walsh 3.5.13-6Dan Walsh 3.5.13-5Dan Walsh 3.5.13-4Dan Walsh 3.5.13-3Dan Walsh 3.5.13-2Dan Walsh 3.5.13-1Dan Walsh 3.5.12-3Dan Walsh 3.5.12-2Dan Walsh 3.5.12-1Dan Walsh 3.5.11-1Dan Walsh 3.5.10-3Dan Walsh 3.5.10-2Dan Walsh 3.5.10-1Dan Walsh 3.5.9-4Dan Walsh 3.5.9-3Dan Walsh 3.5.9-2Dan Walsh 3.5.9-1Dan Walsh 3.5.8-7Dan Walsh 3.5.8-6Dan Walsh 3.5.8-5Dan Walsh 3.5.8-4Dan Walsh 3.5.8-3Dan Walsh 3.5.8-1Dan Walsh 3.5.7-2Dan Walsh 3.5.7-1Dan Walsh 3.5.6-2Dan Walsh 3.5.6-1Dan Walsh 3.5.5-4Dan Walsh 3.5.5-3Dan Walsh 3.5.5-2Dan Walsh 3.5.4-2Dan Walsh 3.5.4-1Dan Walsh 3.5.3-1Dan Walsh 3.5.2-2Dan Walsh 3.5.1-5Dan Walsh 3.5.1-4Dan Walsh 3.5.1-3Dan Walsh 3.5.1-2Dan Walsh 3.5.1-1Dan Walsh 3.5.0-1Dan Walsh 3.4.2-14Dan Walsh 3.4.2-13Dan Walsh 3.4.2-12Dan Walsh 3.4.2-11Dan Walsh 3.4.2-10Dan Walsh 3.4.2-9Dan Walsh 3.4.2-8Dan Walsh 3.4.2-7Dan Walsh 3.4.2-6Dan Walsh 3.4.2-5Dan Walsh 3.4.2-4Dan Walsh 3.4.2-3Dan Walsh 3.4.2-2Dan Walsh 3.4.2-1Dan Walsh 3.4.1-5Dan Walsh 3.4.1-3Dan Walsh 3.4.1-2Dan Walsh 3.4.1-1Dan Walsh 3.3.1-48Dan Walsh 3.3.1-47Dan Walsh 3.3.1-46Dan Walsh 3.3.1-45Dan Walsh 3.3.1-44Dan Walsh 3.3.1-43Dan Walsh 3.3.1-42Dan Walsh 3.3.1-41Dan Walsh 3.3.1-39Dan Walsh 3.3.1-37Dan Walsh 3.3.1-36Dan Walsh 3.3.1-33Dan Walsh 3.3.1-32Dan Walsh 3.3.1-31Dan Walsh 3.3.1-30Dan Walsh 3.3.1-29Dan Walsh 3.3.1-28Dan Walsh 3.3.1-27Dan Walsh 3.3.1-26Dan Walsh 3.3.1-25Dan Walsh 3.3.1-24Dan Walsh 3.3.1-23Dan Walsh 3.3.1-22Dan Walsh 3.3.1-21Dan Walsh 3.3.1-20Dan Walsh 3.3.1-19Dan Walsh 3.3.1-18Dan Walsh 3.3.1-17Dan Walsh 3.3.1-16Dan Walsh 3.3.1-15Bill Nottingham 3.3.1-14Dan Walsh 3.3.1-13Dan Walsh 3.3.1-12Dan Walsh 3.3.1-11Dan Walsh 3.3.1-10Dan Walsh 3.3.1-9Dan Walsh 3.3.1-8Dan Walsh 3.3.1-6Dan Walsh 3.3.1-5Dan Walsh 3.3.1-4Dan Walsh 3.3.1-2Dan Walsh 3.3.1-1Dan Walsh 3.3.0-2Dan Walsh 3.3.0-1Dan Walsh 3.2.9-2Dan Walsh 3.2.9-1Dan Walsh 3.2.8-2Dan Walsh 3.2.8-1Dan Walsh 3.2.7-6Dan Walsh 3.2.7-5Dan Walsh 3.2.7-3Dan Walsh 3.2.7-2Dan Walsh 3.2.7-1Dan Walsh 3.2.6-7Dan Walsh 3.2.6-6Dan Walsh 3.2.6-5Dan Walsh 3.2.6-4Dan Walsh 3.2.6-3Dan Walsh 3.2.6-2Dan Walsh 3.2.6-1Dan Walsh 3.2.5-25Dan Walsh 3.2.5-24Dan Walsh 3.2.5-22Dan Walsh 3.2.5-21Dan Walsh 3.2.5-20Dan Walsh 3.2.5-19Dan Walsh 3.2.5-18Dan Walsh 3.2.5-17Dan Walsh 3.2.5-16Dan Walsh 3.2.5-15Dan Walsh 3.2.5-14Dan Walsh 3.2.5-13Dan Walsh 3.2.5-12Dan Walsh 3.2.5-11Dan Walsh 3.2.5-10Dan Walsh 3.2.5-9Dan Walsh 3.2.5-8Dan Walsh 3.2.5-7Dan Walsh 3.2.5-6Dan Walsh 3.2.5-5Dan Walsh 3.2.5-4Dan Walsh 3.2.5-3Dan Walsh 3.2.5-2Dan Walsh 3.2.5-1Dan Walsh 3.2.4-5Dan Walsh 3.2.4-4Dan Walsh 3.2.4-3Dan Walsh 3.2.4-1Dan Walsh 3.2.4-1Dan Walsh 3.2.3-2Dan Walsh 3.2.3-1Dan Walsh 3.2.2-1Dan Walsh 3.2.1-3Dan Walsh 3.2.1-1Dan Walsh 3.1.2-2Dan Walsh 3.1.2-1Dan Walsh 3.1.1-1Dan Walsh 3.1.0-1Dan Walsh 3.0.8-30Dan Walsh 3.0.8-28Dan Walsh 3.0.8-27Dan Walsh 3.0.8-26Dan Walsh 3.0.8-25Dan Walsh 3.0.8-24Dan Walsh 3.0.8-23Dan Walsh 3.0.8-22Dan Walsh 3.0.8-21Dan Walsh 3.0.8-20Dan Walsh 3.0.8-19Dan Walsh 3.0.8-18Dan Walsh 3.0.8-17Dan Walsh 3.0.8-16Dan Walsh 3.0.8-15Dan Walsh 3.0.8-14Dan Walsh 3.0.8-13Dan Walsh 3.0.8-12Dan Walsh 3.0.8-11Dan Walsh 3.0.8-10Dan Walsh 3.0.8-9Dan Walsh 3.0.8-8Dan Walsh 3.0.8-7Dan Walsh 3.0.8-5Dan Walsh 3.0.8-4Dan Walsh 3.0.8-3Dan Walsh 3.0.8-2Dan Walsh 3.0.8-1Dan Walsh 3.0.7-10Dan Walsh 3.0.7-9Dan Walsh 3.0.7-8Dan Walsh 3.0.7-7Dan Walsh 3.0.7-6Dan Walsh 3.0.7-5Dan Walsh 3.0.7-4Dan Walsh 3.0.7-3Dan Walsh 3.0.7-2Dan Walsh 3.0.7-1Dan Walsh 3.0.6-3Dan Walsh 3.0.6-2Dan Walsh 3.0.6-1Dan Walsh 3.0.5-11Dan Walsh 3.0.5-10Dan Walsh 3.0.5-9Dan Walsh 3.0.5-8Dan Walsh 3.0.5-7Dan Walsh 3.0.5-6Dan Walsh 3.0.5-5Dan Walsh 3.0.5-4Dan Walsh 3.0.5-3Dan Walsh 3.0.5-2Dan Walsh 3.0.5-1Dan Walsh 3.0.4-6Dan Walsh 3.0.4-5Dan Walsh 3.0.4-4Dan Walsh 3.0.4-3Dan Walsh 3.0.4-2Dan Walsh 3.0.4-1Dan Walsh 3.0.3-6Dan Walsh 3.0.3-5Dan Walsh 3.0.3-4Dan Walsh 3.0.3-3Dan Walsh 3.0.3-2Dan Walsh 3.0.3-1Dan Walsh 3.0.2-9Dan Walsh 3.0.2-8Dan Walsh 3.0.2-7Dan Walsh 3.0.2-5Dan Walsh 3.0.2-4Dan Walsh 3.0.2-3Dan Walsh 3.0.2-2Dan Walsh 3.0.1-5Dan Walsh 3.0.1-4Dan Walsh 3.0.1-3Dan Walsh 3.0.1-2Dan Walsh 3.0.1-1Dan Walsh 2.6.5-3Dan Walsh 2.6.5-2Dan Walsh 2.6.4-7Dan Walsh 2.6.4-6Dan Walsh 2.6.4-5Dan Walsh 2.6.4-2Dan Walsh 2.6.4-1Dan Walsh 2.6.3-1Dan Walsh 2.6.2-1Dan Walsh 2.6.1-4Dan Walsh 2.6.1-2Dan Walsh 2.6.1-1Dan Walsh 2.5.12-12Dan Walsh 2.5.12-11Dan Walsh 2.5.12-10Dan Walsh 2.5.12-8Dan Walsh 2.5.12-5Dan Walsh 2.5.12-4Dan Walsh 2.5.12-3Dan Walsh 2.5.12-2Dan Walsh 2.5.12-1Dan Walsh 2.5.11-8Dan Walsh 2.5.11-7Dan Walsh 2.5.11-6Dan Walsh 2.5.11-5Dan Walsh 2.5.11-4Dan Walsh 2.5.11-3Dan Walsh 2.5.11-2Dan Walsh 2.5.11-1Dan Walsh 2.5.10-2Dan Walsh 2.5.10-1Dan Walsh 2.5.9-6Dan Walsh 2.5.9-5Dan Walsh 2.5.9-4Dan Walsh 2.5.9-3Dan Walsh 2.5.9-2Dan Walsh 2.5.8-8Dan Walsh 2.5.8-7Dan Walsh 2.5.8-6Dan Walsh 2.5.8-5Dan Walsh 2.5.8-4Dan Walsh 2.5.8-3Dan Walsh 2.5.8-2Dan Walsh 2.5.8-1Dan Walsh 2.5.7-1Dan Walsh 2.5.6-1Dan Walsh 2.5.5-2Dan Walsh 2.5.5-1Dan Walsh 2.5.4-2Dan Walsh 2.5.4-1Dan Walsh 2.5.3-3Dan Walsh 2.5.3-2Dan Walsh 2.5.3-1Dan Walsh 2.5.2-6Dan Walsh 2.5.2-5Dan Walsh 2.5.2-4Dan Walsh 2.5.2-3Dan Walsh 2.5.2-2Dan Walsh 2.5.2-1Dan Walsh 2.5.1-5Dan Walsh 2.5.1-4Dan Walsh 2.5.1-2Dan Walsh 2.5.1-1Dan Walsh 2.4.6-20Dan Walsh 2.4.6-19Dan Walsh 2.4.6-18Dan Walsh 2.4.6-17Dan Walsh 2.4.6-16Dan Walsh 2.4.6-15Dan Walsh 2.4.6-14Dan Walsh 2.4.6-13Dan Walsh 2.4.6-12Dan Walsh 2.4.6-11Dan Walsh 2.4.6-10Dan Walsh 2.4.6-9Dan Walsh 2.4.6-8Dan Walsh 2.4.6-7Dan Walsh 2.4.6-6Dan Walsh 2.4.6-5Dan Walsh 2.4.6-4Dan Walsh 2.4.6-3Dan Walsh 2.4.6-1Dan Walsh 2.4.5-4Dan Walsh 2.4.5-3Dan Walsh 2.4.5-2Dan Walsh 2.4.5-1Dan Walsh 2.4.4-2Dan Walsh 2.4.4-2Dan Walsh 2.4.4-1Dan Walsh 2.4.3-13Dan Walsh 2.4.3-12Dan Walsh 2.4.3-11Dan Walsh 2.4.3-10Dan Walsh 2.4.3-9Dan Walsh 2.4.3-8Dan Walsh 2.4.3-7Dan Walsh 2.4.3-6Dan Walsh 2.4.3-5Dan Walsh 2.4.3-4Dan Walsh 2.4.3-3Dan Walsh 2.4.3-2Dan Walsh 2.4.3-1Dan Walsh 2.4.2-8Dan Walsh 2.4.2-7James Antill 2.4.2-6Dan Walsh 2.4.2-5Dan Walsh 2.4.2-4Dan Walsh 2.4.2-3Dan Walsh 2.4.2-2Dan Walsh 2.4.2-1Dan Walsh 2.4.1-5Dan Walsh 2.4.1-4Dan Walsh 2.4.1-3Dan Walsh 2.4.1-2Dan Walsh 2.4-4Dan Walsh 2.4-3Dan Walsh 2.4-2Dan Walsh 2.4-1Dan Walsh 2.3.19-4Dan Walsh 2.3.19-3Dan Walsh 2.3.19-2Dan Walsh 2.3.19-1James Antill 2.3.18-10James Antill 2.3.18-9Dan Walsh 2.3.18-8Dan Walsh 2.3.18-7Dan Walsh 2.3.18-6Dan Walsh 2.3.18-5Dan Walsh 2.3.18-4Dan Walsh 2.3.18-3Dan Walsh 2.3.18-2Dan Walsh 2.3.18-1Dan Walsh 2.3.17-2Dan Walsh 2.3.17-1Dan Walsh 2.3.16-9Dan Walsh 2.3.16-8Dan Walsh 2.3.16-7Dan Walsh 2.3.16-6Dan Walsh 2.3.16-5Dan Walsh 2.3.16-4Dan Walsh 2.3.16-2Dan Walsh 2.3.16-1Dan Walsh 2.3.15-2Dan Walsh 2.3.15-1Dan Walsh 2.3.14-8Dan Walsh 2.3.14-7Dan Walsh 2.3.14-6Dan Walsh 2.3.14-4Dan Walsh 2.3.14-3Dan Walsh 2.3.14-2Dan Walsh 2.3.14-1Dan Walsh 2.3.13-6Dan Walsh 2.3.13-5Dan Walsh 2.3.13-4Dan Walsh 2.3.13-3Dan Walsh 2.3.13-2Dan Walsh 2.3.13-1Dan Walsh 2.3.12-2Dan Walsh 2.3.12-1Dan Walsh 2.3.11-1Dan Walsh 2.3.10-7Dan Walsh 2.3.10-6Dan Walsh 2.3.10-3Dan Walsh 2.3.10-1Dan Walsh 2.3.9-6Dan Walsh 2.3.9-5Dan Walsh 2.3.9-4Dan Walsh 2.3.9-3Dan Walsh 2.3.9-2Dan Walsh 2.3.9-1Dan Walsh 2.3.8-2Dan Walsh 2.3.7-1Dan Walsh 2.3.6-4Dan Walsh 2.3.6-3Dan Walsh 2.3.6-2Dan Walsh 2.3.6-1Dan Walsh 2.3.5-1Dan Walsh 2.3.4-1Dan Walsh 2.3.3-20Dan Walsh 2.3.3-19Dan Walsh 2.3.3-18Dan Walsh 2.3.3-17Dan Walsh 2.3.3-16Dan Walsh 2.3.3-15Dan Walsh 2.3.3-14Dan Walsh 2.3.3-13Dan Walsh 2.3.3-12Dan Walsh 2.3.3-11Dan Walsh 2.3.3-10Dan Walsh 2.3.3-9Dan Walsh 2.3.3-8Dan Walsh 2.3.3-7Dan Walsh 2.3.3-6Dan Walsh 2.3.3-5Dan Walsh 2.3.3-4Dan Walsh 2.3.3-3Dan Walsh 2.3.3-2Dan Walsh 2.3.3-1Dan Walsh 2.3.2-4Dan Walsh 2.3.2-3Dan Walsh 2.3.2-2Dan Walsh 2.3.2-1Dan Walsh 2.3.1-1Dan Walsh 2.2.49-1Dan Walsh 2.2.48-1Dan Walsh 2.2.47-5Dan Walsh 2.2.47-4Dan Walsh 2.2.47-3Dan Walsh 2.2.47-1Dan Walsh 2.2.46-2Dan Walsh 2.2.46-1Dan Walsh 2.2.45-3Dan Walsh 2.2.45-2Dan Walsh 2.2.45-1Dan Walsh 2.2.44-1Dan Walsh 2.2.43-4Dan Walsh 2.2.43-3Dan Walsh 2.2.43-2Dan Walsh 2.2.43-1Dan Walsh 2.2.42-4Dan Walsh 2.2.42-3Dan Walsh 2.2.42-2Dan Walsh 2.2.42-1Dan Walsh 2.2.41-1Dan Walsh 2.2.40-2Dan Walsh 2.2.40-1Dan Walsh 2.2.39-2Dan Walsh 2.2.39-1Dan Walsh 2.2.38-6Dan Walsh 2.2.38-5Dan Walsh 2.2.38-4Dan Walsh 2.2.38-3Dan Walsh 2.2.38-2Dan Walsh 2.2.38-1Dan Walsh 2.2.37-1Dan Walsh 2.2.36-2Dan Walsh 2.2.36-1James Antill 2.2.35-2Dan Walsh 2.2.35-1Dan Walsh 2.2.34-3Dan Walsh 2.2.34-2Dan Walsh 2.2.34-1Dan Walsh 2.2.33-1Dan Walsh 2.2.32-2Dan Walsh 2.2.32-1Dan Walsh 2.2.31-1Dan Walsh 2.2.30-2Dan Walsh 2.2.30-1Dan Walsh 2.2.29-6Russell Coker 2.2.29-5Dan Walsh 2.2.29-4Dan Walsh 2.2.29-3Dan Walsh 2.2.29-2Dan Walsh 2.2.29-1Dan Walsh 2.2.28-3Dan Walsh 2.2.28-2Dan Walsh 2.2.28-1Dan Walsh 2.2.27-1Dan Walsh 2.2.25-3Dan Walsh 2.2.25-2Dan Walsh 2.2.24-1Dan Walsh 2.2.23-19Dan Walsh 2.2.23-18Dan Walsh 2.2.23-17Karsten Hopp 2.2.23-16Dan Walsh 2.2.23-15Dan Walsh 2.2.23-14Dan Walsh 2.2.23-13Dan Walsh 2.2.23-12Jeremy Katz - 2.2.23-11Jeremy Katz - 2.2.23-10Dan Walsh 2.2.23-9Dan Walsh 2.2.23-8Dan Walsh 2.2.23-7Dan Walsh 2.2.23-5Dan Walsh 2.2.23-4Dan Walsh 2.2.23-3Dan Walsh 2.2.23-2Dan Walsh 2.2.23-1Dan Walsh 2.2.22-2Dan Walsh 2.2.22-1Dan Walsh 2.2.21-9Dan Walsh 2.2.21-8Dan Walsh 2.2.21-7Dan Walsh 2.2.21-6Dan Walsh 2.2.21-5Dan Walsh 2.2.21-4Dan Walsh 2.2.21-3Dan Walsh 2.2.21-2Dan Walsh 2.2.21-1Dan Walsh 2.2.20-1Dan Walsh 2.2.19-2Dan Walsh 2.2.19-1Dan Walsh 2.2.18-2Dan Walsh 2.2.18-1Dan Walsh 2.2.17-2Dan Walsh 2.2.16-1Dan Walsh 2.2.15-4Dan Walsh 2.2.15-3Dan Walsh 2.2.15-1Dan Walsh 2.2.14-2Dan Walsh 2.2.14-1Dan Walsh 2.2.13-1Dan Walsh 2.2.12-1Dan Walsh 2.2.11-2Dan Walsh 2.2.11-1Dan Walsh 2.2.10-1Dan Walsh 2.2.9-2Dan Walsh 2.2.9-1Dan Walsh 2.2.8-2Dan Walsh 2.2.7-1Dan Walsh 2.2.6-3Dan Walsh 2.2.6-2Dan Walsh 2.2.6-1Dan Walsh 2.2.5-1Dan Walsh 2.2.4-1Dan Walsh 2.2.3-1Dan Walsh 2.2.2-1Dan Walsh 2.2.1-1Dan Walsh 2.1.13-1Dan Walsh 2.1.12-3Dan Walsh 2.1.11-1Dan Walsh 2.1.10-1Jeremy Katz - 2.1.9-2Dan Walsh 2.1.9-1Dan Walsh 2.1.8-3Dan Walsh 2.1.8-2Dan Walsh 2.1.8-1Dan Walsh 2.1.7-4Dan Walsh 2.1.7-3Dan Walsh 2.1.7-2Dan Walsh 2.1.7-1Dan Walsh 2.1.6-24Dan Walsh 2.1.6-23Dan Walsh 2.1.6-22Dan Walsh 2.1.6-21Dan Walsh 2.1.6-20Dan Walsh 2.1.6-18Dan Walsh 2.1.6-17Dan Walsh 2.1.6-16Dan Walsh 2.1.6-15Dan Walsh 2.1.6-14Dan Walsh 2.1.6-13Dan Walsh 2.1.6-11Dan Walsh 2.1.6-10Dan Walsh 2.1.6-9Dan Walsh 2.1.6-8Dan Walsh 2.1.6-5Dan Walsh 2.1.6-4Dan Walsh 2.1.6-3Dan Walsh 2.1.6-2Dan Walsh 2.1.6-1Dan Walsh 2.1.4-2Dan Walsh 2.1.4-1Dan Walsh 2.1.3-1Jeremy Katz - 2.1.2-3Dan Walsh 2.1.2-2Dan Walsh 2.1.2-1Dan Walsh 2.1.1-3Dan Walsh 2.1.1-2Dan Walsh 2.1.1-1Dan Walsh 2.1.0-3Dan Walsh 2.1.0-2.Dan Walsh 2.1.0-1.Dan Walsh 2.0.11-2.Dan Walsh 2.0.11-1.Dan Walsh 2.0.9-1.Dan Walsh 2.0.8-1.Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.6-2Dan Walsh 2.0.5-4Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1- Allow setsebool_t relabel selinux data files Resolves: RHEL-55432 - Allow dirsrv-snmp map dirsv_tmpfs_t files Resolves: RHEL-32441 - Allow dirsrv_snmp_t to manage dirsrv_config_t & dirsrv_var_run_t files Resolves: RHEL-32441- Allow wdmd read hardware state information Resolves: RHEL-27507- Allow wdmd list the contents of the sysfs directories Resolves: RHEL-27507 - Allow linuxptp configure phc2sys and chronyd over a unix domain socket Resolves: RHEL-27394- Differentiate between staff and sysadm when executing crontab with sudo Resolves: RHEL-1388 - Allow su domains write login records Resolves: RHEL-2606 - Revert "Allow su domains write login records" Resolves: RHEL-2606 - Add crontab_admin_domtrans interface Resolves: RHEL-1388 - Allow gpg manage rpm cache Resolves: RHEL-11249- Transition from sudodomains to crontab_t when executing crontab_exec_t Resolves: RHEL-1388 - Fix label of pseudoterminals created from sudodomain Resolves: RHEL-1388 - Allow login_userdomain to manage session_dbusd_tmp_t dirs/files Resolves: RHEL-22500 - Label /dev/ngXnY and /dev/nvme-subsysX with nvme_device_t Resolves: RHEL-23442 - Allow admin user read/write on fixed_disk_device_t Resolves: RHEL-23434 - Only allow confined user domains to login locally without unconfined_login Resolves: RHEL-1628 - Add userdom_spec_domtrans_confined_admin_users interface Resolves: RHEL-1628 - Only allow admindomain to execute shell via ssh with ssh_sysadm_login Resolves: RHEL-1628 - Add userdom_spec_domtrans_admin_users interface Resolves: RHEL-1628 - Move ssh dyntrans to unconfined inside unconfined_login tunable policy Resolves: RHEL-1628 - Allow utempter_t use ptmx Resolves: RHEL-25002 - Dontaudit subscription manager setfscreate and read file contexts Resolves: RHEL-21639 - Don't audit crontab_domain write attempts to user home Resolves: RHEL-1388 - Add crontab_domtrans interface Resolves: RHEL-1388 - Add dbus_manage_session_tmp_files interface Resolves: RHEL-22500 - Allow httpd read network sysctls Resolves: RHEL-22748 - Allow keepalived_unconfined_script_t dbus chat with init Resolves: RHEL-22843- Label /tmp/libdnf.* with user_tmp_t Resolves: RHEL-11249 - Allow su domains write login records Resolves: RHEL-2606 - Allow gpg read rpm cache Resolves: RHEL-11249 - Allow unix dgram sendto between exim processes Resolves: RHEL-21903 - Allow hypervkvp_t write access to NetworkManager_etc_rw_t Resolves: RHEL-17687 - Add interface for write-only access to NetworkManager rw conf Resolves: RHEL-17687 - Allow conntrackd_t to use sys_admin capability Resolves: RHEL-22276- Allow syslog to run unconfined scripts conditionally Resolves: RHEL-10087 - Allow syslogd_t nnp_transition to syslogd_unconfined_script_t Resolves: RHEL-10087 - Allow collectd connect to statsd port Resolves: RHEL-19482 - Allow collectd_t read network state symlinks Resolves: RHEL-19482 - Allow collectd_t domain to create netlink_generic_socket sockets Resolves: RHEL-19482 - Allow opafm search nfs directories Resolves: RHEL-19426 - Allow mdadm list stratisd data directories Resolves: RHEL-21374- Label /dev/acpi_thermal_rel char device with acpi_device_t Resolves: RHEL-18027 - Allow sysadm execute traceroute in sysadm_t domain using sudo Resolves: RHEL-9947 - Allow sysadm execute tcpdump in sysadm_t domain using sudo Resolves: RHEL-15398 - Add support for syslogd unconfined scripts Resolves: RHEL-10087 - Label /dev/wmi/dell-smbios as acpi_device_t Resolves: RHEL-18027 - Make named_zone_t and named_var_run_t a part of the mountpoint attribute Resolves: RHEL-1954 - Dontaudit rhsmcertd write memory device Resolves: RHEL-17721- Allow sudodomain read var auth files Resolves: RHEL-16567 - Update cifs interfaces to include fs_search_auto_mountpoints() Resolves: RHEL-14072 - Allow systemd-localed create Xserver config dirs Resolves: RHEL-16715 - Label /var/run/auditd.state as auditd_var_run_t Resolves: RHEL-14376 - Allow auditd read all domains process state Resolves: RHEL-14471 - Allow sudo userdomain to run rpm related commands Resolves: RHEL-1679 - Remove insights_client_watch_lib_dirs() interface Resolves: RHEL-16185- Additional permissions for ip-vrf Resolves: RHEL-9981 - Allow ip an explicit domain transition to other domains Resolves: RHEL-9981 - Allow winbind_rpcd_t processes access when samba_export_all_* is on Resolves: RHEL-5845 - Allow system_mail_t manage exim spool files and dirs Resolves: RHEL-14186- Label msmtp and msmtpd with sendmail_exec_t Resolves: RHEL-1678 - Set default file context of HOME_DIR/tmp/.* to <> Resolves: RHEL-1099 - Improve default file context(None) of /var/lib/authselect/backups Resolves: RHEL-3539- Set default file context of /var/lib/authselect/backups to <> Resolves: RHEL-3539 - Add file context specification for /usr/libexec/realmd Resolves: RHEL-2147 - Add numad the ipc_owner capability Resolves: RHEL-2415- Allow ssh_agent_type manage generic cache home files Resolves: rhbz#2177704 - Add chromium_sandbox_t setcap capability Resolves: rhbz#2221573- Allow cloud_init create dhclient var files and init_t manage net_conf_t 3 Resolves: rhbz#2229726- Allow cloud_init create dhclient var files and init_t manage net_conf_t 1/2 Resolves: rhbz#2229726 - Label /usr/libexec/openssh/ssh-pkcs11-helper with ssh_agent_exec_t Resolves: rhbz#2177704 - Allow cloud_init create dhclient var files and init_t manage net_conf_t 2/2 Resolves: rhbz#2229726 - Make insights_client_t an unconfined domain Resolves: rhbz#2225527 - Allow insights-client create all rpm logs with a correct label Resolves: rhbz#2229559 - Allow insights-client manage generic logs Resolves: rhbz#2229559- Allow user_u and staff_u get attributes of non-security dirs Resolves: rhbz#2216151 - Allow unconfined user filetrans chrome_sandbox_home_t 1/2 Resolves: rhbz#2221573 - Allow unconfined user filetrans chrome_sandbox_home_t 2/2 Resolves: rhbz#2221573 - Allow insights-client execmem Resolves: rhbz#2225233 - Allow svnserve execute postdrop with a transition Resolves: rhbz#2004843 - Do not make postfix_postdrop_t type an MTA executable file Resolves: rhbz#2004843 - Allow samba-dcerpc service manage samba tmp files Resolves: rhbz#2210771 - Update samba-dcerpc policy for printing Resolves: rhbz#2210771- Add the files_getattr_non_auth_dirs() interface Resolves: rhbz#2076937 - Update policy for the sblim-sfcb service Resolves: rhbz#2076937 - Dontaudit sfcbd sys_ptrace cap_userns Resolves: rhbz#2076937 - Label /usr/sbin/sos with sosreport_exec_t Resolves: rhbz#2167731 - Allow sa-update manage spamc home files Resolves: rhbz#2222200 - Allow sa-update connect to systemlog services Resolves: rhbz#2222200 - Label /usr/lib/systemd/system/mimedefang.service with antivirus_unit_file_t Resolves: rhbz#2222200- Label only /usr/sbin/ripd and ripngd with zebra_exec_t Resolves: rhbz#2213606 - Allow httpd tcp connect to redis port conditionally Resolves: rhbz#2213965 - Exclude container-selinux manpage from selinux-policy-doc Resolves: rhbz#2218362- Update cyrus_stream_connect() to use sockets in /run Resolves: rhbz#2165752 - Allow insights-client map generic log files Resolves: rhbz#2214572 - Allow insights-client work with pipe and socket tmp files Resolves: rhbz#2207819 - Allow insights-client getsession process permission Resolves: rhbz#2207819 - Allow keepalived to manage its tmp files Resolves: rhbz#2179335- Update pkcsslotd policy for sandboxing 2/2 Resolves: rhbz#2208162 - Update pkcsslotd policy for sandboxing 1/2 Resolves: rhbz#2208162 - Allow abrt_t read kernel persistent storage files Resolves: rhbz#2207914 - Add allow rules for lttng-sessiond domain Resolves: rhbz#2203509 - Allow rpcd_lsad setcap and use generic ptys Resolves: rhbz#2107106 - Allow samba-dcerpcd connect to systemd_machined over a unix socket Resolves: rhbz#2107106 - Dontaudit targetd search httpd config dirs Resolves: rhbz#2203720- Allow unconfined service inherit signal state from init Resolves: rhbz#2177254 - Allow systemd-pstore delete kernel persistent storage files Resolves: rhbz#2181558 - Add fs_delete_pstore_files() interface Resolves: rhbz#2181558 - Allow certmonger manage cluster library files Resolves: rhbz#2177836 - Allow samba-rpcd work with passwords Resolves: rhbz#2107106 - Allow snmpd read raw disk data Resolves: rhbz#2160000 - Allow cluster_t dbus chat with various services Resolves: rhbz#2196524- Add unconfined_server_read_semaphores() interface Resolves: rhbz#2183351 - Allow systemd-pstore read kernel persistent storage files Resolves: rhbz#2181558 - Add fs_read_pstore_files() interface Resolves: rhbz#2181558 - Allow insights-client work with teamdctl Resolves: rhbz#2185158 - Allow insights-client read unconfined service semaphores Resolves: rhbz#2183351 - Allow insights-client get quotas of all filesystems Resolves: rhbz#2183351- Allow login_pgm setcap permission Resolves: rhbz#2172541 - Label /run/fsck with fsadm_var_run_t Resolves: rhbz#2184348 - Add boolean qemu-ga to run unconfined script Resolves: rhbz#2028762 - Allow dovecot-deliver write to the main process runtime fifo files Resolves: rhbz#2170495 - Allow certmonger dbus chat with the cron system domain Resolves: rhbz#2173289 - Allow insights-client read all sysctls Resolves: rhbz#2177607- Fix opencryptoki file names in /dev/shm Resolves: rhbz#2028637 - Allow system_cronjob_t transition to rpm_script_t Resolves: rhbz#2154242 - Revert "Allow system_cronjob_t domtrans to rpm_script_t" Resolves: rhbz#2154242 - Allow httpd work with tokens in /dev/shm Resolves: rhbz#2028637 - Allow keepalived to set resource limits Resolves: rhbz#2168638 - Allow insights-client manage fsadm pid files- Allow sysadm_t run initrc_t script and sysadm_r role access Resolves: rhbz#2039662 - Allow insights-client manage fsadm pid files Resolves: rhbz#2166802 - Add journalctl the sys_resource capability Resolves: rhbz#2136189- Fix syntax problem in redis.te Resolves: rhbz#2112228 - Allow unconfined user filetransition for sudo log files Resolves: rhbz#2164047 - Allow winbind-rpcd make a TCP connection to the ldap port Resolves: rhbz#2152642 - Allow winbind-rpcd manage samba_share_t files and dirs Resolves: rhbz#2152642 - Allow insights-client work with su and lpstat Resolves: rhbz#2134125 - Allow insights-client read nvme devices Resolves: rhbz#2143878 - Allow insights-client tcp connect to all ports Resolves: rhbz#2143878 - Allow redis-sentinel execute a notification script Resolves: rhbz#2112228- Add interfaces in domain, files, and unconfined modules Resolves: rhbz#2141311 - Allow sysadm_t read/write ipmi devices Resolves: rhbz#2148561 - Allow sudodomain use sudo.log as a logfile Resolves: rhbz#2143762 - Add insights additional capabilities Resolves: rhbz#2158779 - Allow insights client work with gluster and pcp Resolves: rhbz#2141311 - Allow prosody manage its runtime socket files Resolves: rhbz#2157902 - Allow system mail service read inherited certmonger runtime files Resolves: rhbz#2143337 - Add lpr_roles to system_r roles Resolves: rhbz#2151111- Allow systemd-socket-proxyd get attributes of cgroup filesystems Resolves: rhbz#2088441 - Allow systemd-socket-proxyd get filesystems attributes Resolves: rhbz#2088441 - Allow sysadm read ipmi devices Resolves: rhbz#2148561 - Allow system mail service read inherited certmonger runtime files Resolves: rhbz#2143337 - Add lpr_roles to system_r roles Resolves: rhbz#2151111 - Allow insights-client tcp connect to various ports Resolves: rhbz#2151111 - Allow insights-client work with pcp and manage user config files Resolves: rhbz#2151111 - Allow insights-client dbus chat with various services Resolves: rhbz#2152867 - Allow insights-client dbus chat with abrt Resolves: rhbz#2152867 - Allow redis get user names Resolves: rhbz#2112228 - Add winbind-rpcd to samba_enable_home_dirs boolean Resolves: rhbz#2143696- Allow ipsec_t only read tpm devices Resolves: rhbz#2147380 - Allow ipsec_t read/write tpm devices Resolves: rhbz#2147380 - Label udf tools with fsadm_exec_t Resolves: rhbz#1972230 - Allow the spamd_update_t domain get generic filesystem attributes Resolves: rhbz#2144501 - Allow cdcc mmap dcc-client-map files Resolves: rhbz#2144505 - Allow insights client communicate with cupsd, mysqld, openvswitch, redis Resolves: rhbz#2143878 - Allow insights client read raw memory devices Resolves: rhbz#2143878 - Allow winbind-rpcd get attributes of device and pty filesystems Resolves: rhbz#2107106 - Allow postfix/smtpd read kerberos key table Resolves: rhbz#1983308- Add domain_unix_read_all_semaphores() interface Resolves: rhbz#2141311 - Allow iptables list cgroup directories Resolves: rhbz#2134820 - Allow systemd-hostnamed dbus chat with init scripts Resolves: rhbz#2111632 - Allow systemd to read symlinks in /var/lib Resolves: rhbz#2118784 - Allow insights-client domain transition on semanage execution Resolves: rhbz#2141311 - Allow insights-client create gluster log dir with a transition Resolves: rhbz#2141311 - Allow insights-client manage generic locks Resolves: rhbz#2141311 - Allow insights-client unix_read all domain semaphores Resolves: rhbz#2141311 - Allow winbind-rpcd use the terminal multiplexor Resolves: rhbz#2107106 - Allow mrtg send mails Resolves: rhbz#2103675 - Allow sssd dbus chat with system cronjobs Resolves: rhbz#2132922 - Allow postfix/smtp and postfix/virtual read kerberos key table Resolves: rhbz#1983308- Add the systemd_connectto_socket_proxyd_unix_sockets() interface Resolves: rhbz#208441 - Add the dev_map_vhost() interface Resolves: rhbz#2122920 - Allow init remount all file_type filesystems Resolves: rhbz#2122239 - added policy for systemd-socket-proxyd Resolves: rhbz#2088441 - Allow virt_domain map vhost devices Resolves: rhbz#2122920 - Allow virt domains to access xserver devices Resolves: rhbz#2122920 - Allow rotatelogs read httpd_log_t symlinks Resolves: rhbz#2030633 - Allow vlock search the contents of the /dev/pts directory Resolves: rhbz#2122838 - Allow system cronjobs dbus chat with setroubleshoot Resolves: rhbz#2125008 - Allow ptp4l_t name_bind ptp_event_port_t Resolves: rhbz#2130168 - Allow pcp_domain execute its private memfd: objects Resolves: rhbz#2090711 - Allow samba-dcerpcd use NSCD services over a unix stream socket Resolves: rhbz#2121709 - Allow insights-client manage samba var dirs Resolves: rhbz#2132230- Add the files_map_read_etc_files() interface Resolves: rhbz#2132230 - Allow insights-client manage samba var dirs Resolves: rhbz#2132230 - Allow insights-client send null signal to rpm and system cronjob Resolves: rhbz#2132230 - Update rhcd policy for executing additional commands 4 Resolves: rhbz#2132230 - Allow insights-client connect to postgresql with a unix socket Resolves: rhbz#2132230 - Allow insights-client domtrans on unix_chkpwd execution Resolves: rhbz#2132230 - Add file context entries for insights-client and rhc Resolves: rhbz#2132230 - Allow snmpd_t domain to trace processes in user namespace Resolves: rhbz#2121084 - Allow sbd the sys_ptrace capability Resolves: rhbz#2124552 - Allow pulseaudio create gnome content (~/.config) Resolves: rhbz#2124387- Allow unconfined_service_t insights client content filetrans Resolves: rhbz#2119507 - Allow nsswitch_domain to connect to systemd-machined using a unix socket Resolves: rhbz#2119507 - Add init_status_all_script_files() interface Resolves: rhbz#2119507 - Add dev_dontaudit_write_raw_memory() and dev_read_vsock() interfaces Resolves: rhbz#2119507 - Update insights-client policy for additional commands execution 5 Resolves: rhbz#2119507 - Confine insights-client systemd unit Resolves: rhbz#2119507 - Update insights-client policy for additional commands execution 4 Resolves: rhbz#2119507 - Change rhsmcertd_t to insights_client_t in insights-client policy Resolves: rhbz#2119507 - Allow insights-client send signull to unconfined_service_t Resolves: rhbz#2119507 - Update insights-client policy for additional commands execution 3 Resolves: rhbz#2119507 - Allow journalctl read init state Resolves: rhbz#2119507 - Update insights-client policy for additional commands execution 2 Resolves: rhbz#2119507- Label 319/udp port with ptp_event_port_t Resolves: rhbz#2118628 - Allow unconfined and sysadm users transition for /root/.gnupg Resolves: rhbz#2119507 - Add the kernel_read_proc_files() interface Resolves: rhbz#2119507 - Add userdom_view_all_users_keys() interface Resolves: rhbz#2119507 - Allow system_cronjob_t domtrans to rpm_script_t Resolves: rhbz#2118362 - Allow smbd_t process noatsecure permission for winbind_rpcd_t Resolves: rhbz#2117199 - Allow chronyd bind UDP sockets to ptp_event ports Resolves: rhbz#2118628 - Allow samba-bgqd to read a printer list Resolves: rhbz#2118958 - Add gpg_filetrans_admin_home_content() interface Resolves: rhbz#2119507 - Update insights-client policy for additional commands execution Resolves: rhbz#2119507 - Allow gpg read and write generic pty type Resolves: rhbz#2119507 - Allow chronyc read and write generic pty type Resolves: rhbz#2119507 - Disable rpm verification on interface_info Resolves: rhbz#2119472- Allow networkmanager to signal unconfined process Resolves: rhbz#1918148 - Allow sa-update to get init status and start systemd files Resolves: rhbz#2011239 - Allow samba-bgqd get a printer list Resolves: rhbz#2114737 - Allow insights-client rpm named file transitions Resolves: rhbz#2104913 - Add /var/tmp/insights-archive to insights_client_filetrans_named_content Resolves: rhbz#2104913 - Use insights_client_filetrans_named_content Resolves: rhbz#2104913 - Make default file context match with named transitions Resolves: rhbz#2104913 - Allow rhsmcertd to read insights config files Resolves: rhbz#2104913 - Label /etc/insights-client/machine-id Resolves: rhbz#2104913- Do not call systemd_userdbd_stream_connect() for winbind-rpcd Resolves: rhbz#2108383 - Update winbind_rpcd_t Resolves: rhbz#2108383 - Allow irqbalance file transition for pid sock_files and directories Resolves: rhbz#2111916 - Update irqbalance runtime directory file context Resolves: rhbz#2111916- Update samba-dcerpcd policy for kerberos usage 2 Resolves: rhbz#2096825- Allow domain read usermodehelper state information Resolves: rhbz#2083504 - Remove all kernel_read_usermodehelper_state() interface calls Resolves: rhbz#2083504 - Allow samba-dcerpcd work with sssd Resolves: rhbz#2096825 - Allow winbind_rpcd_t connect to self over a unix_stream_socket Resolves: rhbz#2096825 - Update samba-dcerpcd policy for kerberos usage Resolves: rhbz#2096825 - Allow keepalived read the contents of the sysfs filesystem Resolves: rhbz#2098189 - Update policy for samba-dcerpcd Resolves: rhbz#2083504 - Remove all kernel_read_usermodehelper_state() interface calls 2/2 Resolves: rhbz#2083504 - Update insights_client_filetrans_named_content() Resolves: rhbz#2091117- Allow transition to insights_client named content Resolves: rhbz#2091117 - Add the insights_client_filetrans_named_content() interface Resolves: rhbz#2091117 - Update policy for insights-client to run additional commands 3 Resolves: rhbz#2091117- Add the init_status_config_transient_files() interface Resolves: rhbz#2091117 - Allow init_t to rw insights_client unnamed pipe Resolves: rhbz#2091117 - Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling Resolves: rhbz#2091117 - Allow insights-client get status of the systemd transient scripts Resolves: rhbz#2091117 - Allow insights-client execute its private memfd: objects Resolves: rhbz#2091117 - Update policy for insights-client to run additional commands 2 Resolves: rhbz#2091117 - Do not call systemd_userdbd_stream_connect() for insights-client Resolves: rhbz#2091117 - Use insights_client_tmp_t instead of insights_client_var_tmp_t Resolves: rhbz#2091117 - Change space indentation to tab in insights-client Resolves: rhbz#2091117 - Use socket permissions sets in insights-client Resolves: rhbz#2091117 - Update policy for insights-client to run additional commands Resolves: rhbz#2091117 - Change rpm_setattr_db_files() to use a pattern Resolves: rhbz#2091117 - Add rpm setattr db files macro Resolves: rhbz#2091117 - Fix insights client Resolves: rhbz#2091117 - Do not let system_cronjob_t create redhat-access-insights.log with var_log_t Resolves: rhbz#2091117- Update logging_create_generic_logs() to use create_files_pattern() Resolves: rhbz#2081907 - Add the auth_read_passwd_file() interface Resolves: rhbz#2083504 - Allow auditd_t noatsecure for a transition to audisp_remote_t Resolves: rhbz#2081907 - Add support for samba-dcerpcd Resolves: rhbz#2083504 - Allow rhsmcertd create generic log files Resolves: rhbz#1852086 - Allow ctdbd nlmsg_read on netlink_tcpdiag_socket Resolves: rhbz#2090800- Allow ifconfig_t domain to manage vmware logs Resolves: rhbz#1721943 - Allow insights-client manage gpg admin home content Resolves: rhbz#2060834 - Add the gpg_manage_admin_home_content() interface Resolves: rhbz#2060834 - Label /var/cache/insights with insights_client_cache_t Resolves: rhbz#2063195 - Allow insights-client search gconf homedir Resolves: rhbz#2087069 - Allow insights-client create and use unix_dgram_socket Resolves: rhbz#2087069 - Label more vdsm utils with virtd_exec_t Resolves: rhbz#2063871 - Label /usr/libexec/vdsm/supervdsmd and vdsmd with virtd_exec_t Resolves: rhbz#2063871 - Allow sblim-gatherd the kill capability Resolves: rhbz#2082677 - Allow privoxy execmem Resolves: rhbz#2083940- Allow sysadm user execute init scripts with a transition Resolves: rhbz#2039662 - Change invalid type redisd_t to redis_t in redis_stream_connect() Resolves: rhbz#1897517 - Allow php-fpm write access to /var/run/redis/redis.sock Resolves: rhbz#1897517 - Allow sssd read systemd-resolved runtime directory Resolves: rhbz#2060721 - Allow postfix stream connect to cyrus through runtime socket Resolves: rhbz#2066005 - Allow insights-client create_socket_perms for tcp/udp sockets Resolves: rhbz#2073395 - Allow insights-client read rhnsd config files Resolves: rhbz#2073395 - Allow sblim-sfcbd connect to sblim-reposd stream Resolves: rhbz#2075810 - Allow rngd drop privileges via setuid/setgid/setcap Resolves: rhbz#2076641 - Allow rngd_t domain to use nsswitch Resolves: rhbz#2076641- Create macro corenet_icmp_bind_generic_node() Resolves: rhbz#2070870 - Allow traceroute_t and ping_t to bind generic nodes. Resolves: rhbz#2070870 - Allow administrative users the bpf capability Resolves: rhbz#2070983 - Allow insights-client search rhnsd configuration directory Resolves: rhbz#2073395 - Allow ntlm_auth read the network state information Resolves: rhbz#2073349 - Allow keepalived setsched and sys_nice Resolves: rhbz#2008033 - Revert "Allow administrative users the bpf capability" Resolves: rhbz#2070983- Add interface rpc_manage_exports Resolves: rhbz#2062183 - Allow sshd read filesystem sysctl files Resolves: rhbz#2061403 - Update targetd nfs & lvm Resolves: rhbz#2062183 - Allow dhcpd_t domain to read network sysctls. Resolves: rhbz#2059509 - Allow chronyd talk with unconfined user over unix domain dgram socket Resolves: rhbz#2065313 - Allow fenced read kerberos key tables Resolves: rhbz#1964839- Allow hostapd talk with unconfined user over unix domain dgram socket Resolves: rhbz#2068007- Allow chronyd send a message to sosreport over datagram socket - Allow systemd-logind dbus chat with sosreport Resolves: rhbz#2062607- Allow systemd-networkd dbus chat with sosreport Resolves: rhbz#1949493 - Allow sysadm_passwd_t to relabel passwd and group files Resolves: rhbz#2053457 - Allow confined sysadmin to use tool vipw Resolves: rhbz#2053457 - Allow sosreport dbus chat with abrt and timedatex Resolves: rhbz#1949493 - Remove unnecessary /etc file transitions for insights-client Resolves: rhbz#2031853 - Label all content in /var/lib/insights with insights_client_var_lib_t Resolves: rhbz#2031853 - Update insights-client policy Resolves: rhbz#2031853 - Update insights-client: fc pattern, motd, writing to etc Resolves: rhbz#2031853 - Remove permissive domain for insights_client_t Resolves: rhbz#2031853 - New policy for insight-client Resolves: rhbz#2031853 - Add the insights_client module Resolves: rhbz#2031853 - Update specfile to buildrequire policycoreutils-devel >= 2.9-19 - Add modules_checksum to %files- Allow postfix_domain read dovecot certificates 1/2 Resolves: rhbz#2043599 - Dontaudit dirsrv search filesystem sysctl directories 1/2 Resolves: rhbz#2042568 - Allow chage domtrans to sssd Resolves: rhbz#2054718 - Allow postfix_domain read dovecot certificates 2/2 Resolves: rhbz#2043599 - Allow ctdb create cluster logs Resolves: rhbz#2049481 - Allow alsa bind mixer controls to led triggers Resolves: rhbz#2049730 - Allow alsactl set group Process ID of a process Resolves: rhbz#2049730 - Dontaudit mdadm list dirsrv tmpfs dirs Resolves: rhbz#2011174 - Dontaudit dirsrv search filesystem sysctl directories 2/2 Resolves: rhbz#2042568 - Revert "Label NetworkManager-dispatcher service with separate context" Related: rhbz#1989070 - Revert "Allow NetworkManager-dispatcher dbus chat with NetworkManager" Related: rhbz#1989070- Allow NetworkManager-dispatcher dbus chat with NetworkManager Resolves: rhbz#1989070- Fix badly indented used interfaces Resolves: rhbz#2030156 - Allow domain transition to sssd_t 1/2 Resolves: rhbz#2022690 - Allow confined users to use kinit,klist and etc. Resolves: rhbz#2026598 - Allow login_userdomain open/read/map system journal Resolves: rhbz#2046481 - Allow init read stratis data symlinks 2/2 Resolves: rhbz#2048514 - Label new utility of NetworkManager nm-priv-helper Resolves: rhbz#1986076 - Label NetworkManager-dispatcher service with separate context Resolves: rhbz#1989070 - Allow domtrans to sssd_t and role access to sssd Resolves: rhbz#2030156 - Creating interface sssd_run_sssd() Resolves: rhbz#2030156 - Allow domain transition to sssd_t 2/2 Resolves: rhbz#2022690 - Allow timedatex dbus chat with xdm Resolves: rhbz#2040214 - Associate stratisd_data_t with device filesystem Resolves: rhbz#2048514 - Allow init read stratis data symlinks 1/2 Resolves: rhbz#2048514 - Allow rhsmcertd create rpm hawkey logs with correct label Resolves: rhbz#1949871- Allow NetworkManager talk with unconfined user over unix domain dgram socket Resolves: rhbz#2044048 - Allow system_mail_t read inherited apache system content rw files Resolves: rhbz#1988339 - Add apache_read_inherited_sys_content_rw_files() interface Related: rhbz#1988339 - Allow rhsm-service execute its private memfd: objects Resolves: rhbz#2029873 - Allow dirsrv read configfs files and directories Resolves: rhbz#2042568 - Label /run/stratisd with stratisd_var_run_t Resolves: rhbz#1879585 - Fix path for excluding container.if from selinux-policy-devel Resolves: rhbz#1861968- Revert "Label /etc/cockpit/ws-certs.d with cert_t" Related: rhbz#1907473- Set default file context for /sys/firmware/efi/efivars Resolves: rhbz#2039458 - Allow sysadm_t start and stop transient services Resolves: rhbz#2031065 - Label /etc/cockpit/ws-certs.d with cert_t Resolves: rhbz#1907473 - Allow smbcontrol read the network state information Resolves: rhbz#2033873 - Allow rhsm-service read/write its private memfd: objects Resolves: rhbz#2029873 - Allow fcoemon request the kernel to load a module Resolves: rhbz#1940317 - Allow radiusd connect to the radacct port Resolves: rhbz#2038955 - Label /var/lib/shorewall6-lite with shorewall_var_lib_t Resolves: rhbz#2041447 - Exclude container.if from selinux-policy-devel Resolves: rhbz#1861968- Allow sysadm execute sysadmctl in sysadm_t domain using sudo Resolves: rhbz#2013749 - Allow local_login_t get attributes of tmpfs filesystems Resolves: rhbz#2015539 - Allow local_login_t get attributes of filesystems with ext attributes Resolves: rhbz#2015539 - Allow local_login_t domain to getattr cgroup filesystem Resolves: rhbz#2015539 - Allow systemd read unlabeled symbolic links Resolves: rhbz#2021835 - Allow userdomains use pam_ssh_agent_auth for passwordless sudo Resolves: rhbz#1917879 - Allow sudodomains execute passwd in the passwd domain Resolves: rhbz#1943572 - Label authcompat.py with authconfig_exec_t Resolves: rhbz#1919122 - Dontaudit pkcsslotd sys_admin capability Resolves: rhbz#2021887 - Allow lldpd connect to snmpd with a unix domain stream socket Resolves: rhbz#1991029- Allow unconfined_t to node_bind icmp_sockets in node_t domain Resolves: rhbz#2025445 - Allow rhsmcertd get attributes of tmpfs_t filesystems Resolves: rhbz#2015820 - The nfsdcld service is now confined by SELinux Resolves: rhbz#2026588 - Allow smbcontrol use additional socket types Resolves: rhbz#2027740 - Allow lldpd use an snmp subagent over a tcp socket Resolves: rhbz#2028379- Allow sysadm_t read/write pkcs shared memory segments Resolves: rhbz#1965251 - Allow sysadm_t connect to sanlock over a unix stream socket Resolves: rhbz#1965251 - Allow sysadm_t dbus chat with sssd Resolves: rhbz#1965251 - Allow sysadm_t set attributes on character device nodes Resolves: rhbz#1965251 - Allow sysadm_t read and write watchdog devices Resolves: rhbz#1965251 - Allow sysadm_t connect to cluster domains over a unix stream socket Resolves: rhbz#1965251 - Allow sysadm_t dbus chat with tuned 2/2 Resolves: rhbz#1965251 - Update userdom_exec_user_tmp_files() with an entrypoint rule Resolves: rhbz#1920883 - Allow sudodomain send a null signal to sshd processes Resolves: rhbz#1966945 - Allow sysadm_t dbus chat with tuned 1/2 Resolves: rhbz#1965251 - Allow cloud-init dbus chat with systemd-logind Resolves: rhbz#2009769 - Allow svnserve send mail from the system Resolves: rhbz#2004843 - Allow svnserve_t domain to read system state Resolves: rhbz#2004843- VQP: Include IANA-assigned TCP/1589 Resolves: rhbz#1924038 - Label port 3785/udp with bfd_echo Resolves: rhbz#1924038 - Allow sysadm_t dbus chat with realmd_t Resolves: rhbz#2000488 - Support sanlock VG automated recovery on storage access loss 1/2 Resolves: rhbz#1985000 - Revert "Support sanlock VG automated recovery on storage access loss" Resolves: rhbz#1985000 - Support sanlock VG automated recovery on storage access loss Resolves: rhbz#1985000 - radius: Lexical sort of service-specific corenet rules by service name Resolves: rhbz#1924038 - radius: Allow binding to the BDF Control and Echo ports Resolves: rhbz#1924038 - radius: Allow binding to the DHCP client port Resolves: rhbz#1924038 - radius: Allow net_raw; allow binding to the DHCP server ports Resolves: rhbz#1924038 - Support hitless reloads feature in haproxy Resolves: rhbz#2015423 - Allow redis get attributes of filesystems with extended attributes Resolves: rhbz#2015435 - Support sanlock VG automated recovery on storage access loss 2/2 Resolves: rhbz#1985000 - Revert "Support sanlock VG automated recovery on storage access loss" Resolves: rhbz#1985000- Support sanlock VG automated recovery on storage access loss Resolves: rhbz#1985000 - Allow proper function sosreport in sysadmin role Resolves: rhbz#1965251 - Allow systemd execute user bin files Resolves: rhbz#1860443 - Label /dev/crypto/nx-gzip with accelerator_device_t Resolves: rhbz#2011166 - Allow ipsec_t and login_userdomain named file transition in tmpfs Resolves: rhbz#2001599 - Support sanlock VG automated recovery on storage access loss Resolves: rhbz#1985000 - Allow proper function sosreport via iotop Resolves: rhbz#1965251 - Call pkcs_tmpfs_named_filetrans for certmonger Resolves: rhbz#2001599 - Allow ibacm the net_raw and sys_rawio capabilities Resolves: rhbz#2010644 - Support new PING_CHECK health checker in keepalived Resolves: rhbz#2010873 - Update spamassasin policy to make working /usr/share/spamassassin/sa-update.cron script Resolves: rhbz#2011239- Allow unconfined domains to bpf all other domains Resolves: rhbz#1991443 - Allow vmtools_unconfined_t domain transition to rpm_script_t Resolves: rhbz#1872245 - Allow unbound connectto unix_stream_socket Resolves: rhbz#1905441 - Label /usr/sbin/virtproxyd as virtd_exec_t Resolves: rhbz#1854332 - Allow postfix_domain to sendto unix dgram sockets. Resolves: rhbz#1920521- Allow rhsmcertd_t dbus chat with anaconda install_t Resolves: rhbz#2004990- Introduce xdm_manage_bootloader booelan Resolves: rhbz#1994096 - Rename samba_exec() to samba_exec_net() Resolves: rhbz#1855215 - Allow sssd to set samba setting Resolves: rhbz#1855215 - Allow dirsrv read slapd tmpfs files Resolves: rhbz#1843238 - Allow rhsmcertd to create cache file in /var/cache/cloud-what Resolves: rhbz#1994718- Label /usr/bin/Xwayland with xserver_exec_t Resolves: rhbz#1984584 - Label /usr/libexec/gdm-runtime-config with xdm_exec_t Resolves: rhbz#1984584 - Allow D-bus communication between avahi and sosreport Resolves: rhbz#1916397 - Allow lldpad send to kdumpctl over a unix dgram socket Resolves: rhbz#1979121 - Revert "Allow lldpad send to kdump over a unix dgram socket" Resolves: rhbz#1979121 - Allow chronyc respond to a user chronyd instance Resolves: rhbz#1993104 - Allow ptp4l respond to pmc Resolves: rhbz#1993104 - Allow lldpad send to unconfined_t over a unix dgram socket Resolves: rhbz#1993270- Revert "update libs_filetrans_named_content() to have support for /usr/lib/debug directory" Resolves: rhbz#1887739 - Allow sysadm to read/write scsi files and manage shadow Resolves: rhbz#1956302 - Allow rhsmcertd execute gpg Resolves: rhbz#1887572 - Allow lldpad send to kdump over a unix dgram socket Resolves: rhbz#1979121 - Remove glusterd SELinux module from distribution policy Resolves: rhbz#1816718- Allow login_userdomain read and map /var/lib/systemd files Resolves: rhbz#1965251 - Allow sysadm acces to kernel module resources Resolves: rhbz#1965251 - Allow sysadm to read/write scsi files and manage shadow Resolves: rhbz#1965251 - Allow sysadm access to files_unconfined and bind rpc ports Resolves: rhbz#1965251 - Allow sysadm read and view kernel keyrings Resolves: rhbz#1965251 - Allow bootloader to read tuned etc files Resolves: rhbz#1965251 - Update the policy for systemd-journal-upload Resolves: rhbz#1913414 - Allow journal mmap and read var lib files Resolves: rhbz#1965251 - Allow tuned to read rhsmcertd config files Resolves: rhbz#1965251 - Allow bootloader to read tuned etc files Resolves: rhbz#1965251 - Confine rhsm service and rhsm-facts service as rhsmcertd_t Resolves: rhbz#1846081 - Allow virtlogd_t read process state of user domains Resolves: rhbz#1797899 - Allow cockpit_ws_t get attributes of fs_t filesystems Resolves: rhbz#1979182- Add the unconfined_dgram_send() interface Resolves: rhbz#1978562 - Change dev_getattr_infiniband_dev() to use getattr_chr_files_pattern() Resolves: rhbz#1936522 - Add checkpoint_restore cap2 capability Resolves: rhbz#1973325 - Allow fcoemon talk with unconfined user over unix domain datagram socket Resolves: rhbz#1978562 - Allow hostapd bind UDP sockets to the dhcpd port Resolves: rhbz#1977676 - Allow NetworkManager read and write z90crypt device Resolves: rhbz#1938203 - Allow abrt_domain read and write z90crypt device Resolves: rhbz#1938203 - Label /usr/lib/pcs/pcs_snmp_agent with cluster_exec_t Resolves: rhbz#1937111 - Allow mdadm read iscsi pid files Resolves: rhbz#1924716- Allow dyntransition from sshd_t to unconfined_t Resolves: rhbz#1947841- Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template Resolves: rhbz#1947841 - Allow transition from xdm domain to unconfined_t domain. Resolves: rhbz#1947841 - Allow nftables read NetworkManager unnamed pipes Resolves: rhbz#1967857 - Create a policy for systemd-journal-upload Resolves: rhbz#1913414 - Add dev_getattr_infiniband_dev() interface. Resolves: rhbz#1972522 - Allow tcpdump and nmap get attributes of infiniband_device_t Resolves: rhbz#1972522 - Allow fcoemon create sysfs files Resolves: rhbz#1978562 - Allow nftables read NetworkManager unnamed pipes Resolves: rhbz#1967857 - Allow radius map its library files Resolves: rhbz#1854650 - Allow arpwatch get attributes of infiniband_device_t devices Resolves: rhbz#1936522- Allow systemd-sleep get attributes of fixed disk device nodes Resolves: rhbz#1931460 - Allow systemd-sleep create hardware state information files Resolves: rhbz#1968610 - virtiofs supports Xattrs and SELinux Resolves: rhbz#1899703 - Label 4460/tcp port as ntske_port_t Resolves: rhbz#1961207 - Add the miscfiles_map_generic_certs macro to the sysnet_dns_name_resolve macro. Resolves: rhbz#1961207 - Allow chronyd_t to accept and make NTS-KE connections Resolves: rhbz#1961207 - Dontaudit NetworkManager write to initrc_tmp_t pipes Resolves: rhbz#1963162 - Allow logrotate rotate container log files Resolves: rhbz#1892170 - Allow rhsmd read process state of all domains and kernel threads Resolves: rhbz#1878020- Allow nmap create and use rdma socket Resolves: rhbz#1844530 - Label /.k5identity file allow read of this file to rpc.gssd Resolves: rhbz#1951093 - Label /var/lib/kdump with kdump_var_lib_t Resolves: rhbz#1965985 - Label /run/libvirt/common with virt_common_var_run_t Resolves: rhbz#1966842- Allow using opencryptoki for ipsec Resolves: rhbz#1894132 - Remove all kernel_getattr_proc() interface calls Resolves: rhbz#1967125 - Allow domain stat /proc filesystem Resolves: rhbz#1967125 - Allow pkcs-slotd create and use netlink_kobject_uevent_socket Resolves: rhbz#1969725 - Label var.lib.opencryptoki.* files and create pkcs_tmpfs_filetrans() Resolves: rhbz#1894132 - Allow using opencryptoki for certmonger Resolves: rhbz#1894132 - install_t: Allow NoNewPriv transition from systemd Resolves: rhbz#1955547 - Remove all kernel_getattr_proc() interface calls Resolves: rhbz#1967125 - Allow httpd_sys_script_t read, write, and map hugetlbfs files Resolves: rhbz#1966133- Add /var/usrlocal equivalency rule Resolves: rhbz#1943381 - Label '/var/usrlocal/(.*/)?sbin(/.*)?' as bin_t Resolves: rhbz#1943381 - Label /dev/trng with random_device_t Resolves: rhbz#1934483 - Allow systemd-sleep transition to sysstat_t Resolves: rhbz#1927551 - Allow systemd-sleep transition to tlp_t Resolves: rhbz#1927551 - Allow systemd-sleep transition to unconfined_service_t on bin_t executables Resolves: rhbz#1927551 - Allow systemd-sleep execute generic programs Resolves: rhbz#1948070 - Allow systemd-sleep execute shell Resolves: rhbz#1954358 - Allow nsswitch_domain read init pid lnk_files Resolves: rhbz#1860924 - Introduce logging_syslogd_list_non_security_dirs tunable Resolves: rhbz#1823669 - Add sysstat_domtrans() to allow systemd-sleep transition to sysstat_t Resolves: rhbz#1927551 - Change param description in cron interfaces to userdomain_prefix Resolves: rhbz#1801249 - Add missing declaration in rpm_named_filetrans() Resolves: rhbz#1801249- Allow pluto IKEv2 / ESP over TCP Resolves: rhbz#1931848 - Label SDC(scini) Dell Driver Resolves: rhbz#1936882 - Add file context specification for /var/tmp/tmp-inst Resolves: rhbz#1919253 - Allow virtlogd_t to create virt_var_lockd_t dir Resolves: rhbz#1941464 - Allow cups-lpd read its private runtime socket files Resolves: rhbz#1919399- Allow systemd the audit_control capability conditionally Resolves: rhbz#1861771- Disallow user_t run su/sudo and staff_t run su Resolves: rhbz#1907517- Relabel /usr/sbin/charon-systemd as ipsec_exec_t Resolves: rhbz#1889542- Allow unconfined_t and kprop_t to create krb5_0.rcache2 with the right context Resolves: rhbz#1874527 Resolves: rhbz#1877044 - Allow rhsmcertd bind tcp sockets to a generic node Resolves: rhbz#1923985 - Allow ipsec_mgmt_t mmap ipsec_conf_file_t files Resolves: rhbz#1889542 - Allow strongswan start using swanctl method Resolves: rhbz#1889542 - Allow systemd-importd manage machines.lock file Resolves: rhbz#1788055- Allow rtkit_daemon_t domain set process nice value in user namespaces Resolves: rhbz#1910507 - Allow gpsd read and write ptp4l_t shared memory. Resolves: rhbz#1803845 - Label /var/run/pcsd-ruby.socket socket with cluster_var_run_t type Resolves: rhbz#1804626 - Allow Certmonger to use opencryptoki services Resolves: rhbz#1894132 - Dontaudit vhostmd to write in /var/lib/rpm/ dir and allow signull rpm Resolves: rhbz#1815603 - Allow rhsmcertd_t read kpatch lib files Resolves: rhbz#1895322 - Allow ipsec_t connectto ipsec_mgmt_t Resolves: rhbz#1848355 - Allow IPsec to use opencryptoki services Resolves: rhbz#1894132 - Allow systemd-importd create /run/systemd/machines.lock file Resolves: rhbz#1788055- Allow rhsmcertd_t domain transition to kpatch_t Resolves: rhbz#1895322 - Revert "Add kpatch_exec() interface" Resolves: rhbz#1895322 - Revert "Allow rhsmcertd execute kpatch" Resolves: rhbz#1895322 - Dontaudit NetworkManager_t domain to write to kdump temp pipies Resolves: rhbz#1842897 - Allow NetworkManager_t domain to get status of samba services Resolves: rhbz#1781806 - Allow openvswitch create and use xfrm netlink sockets Resolves: rhbz#1916046 - Allow openvswitch_t perf_event write permission Resolves: rhbz#1916046 - Add write_perf_event_perms object permission set Related: rhbz#1916046- Add kpatch_exec() interface Resolves: rhbz#1895322 - Allow rhsmcertd execute kpatch Resolves: rhbz#1895322 - Allow openvswitch_t perf_event open permission Resolves: rhbz#1916046 - Allow openvswitch fowner capability and create netlink sockets Resolves: rhbz#1883980 - Add net_broadcast capability to openvswitch_t domain Resolves: rhbz#1883980 - Update interface modutils_read_module_deps to allow caller domain also mmap modules_dep_t files Resolves: rhbz#1883980 - Allow machinectl to run pull-tar Resolves: rhbz#1788055- Allow wireshark create and use rdma socket Resolves: rhbz#1844370 - Allow to use nnp_transition in pulseaudio_role Resolves: rhbz#1854471 - Allow certmonger fsetid capability Resolves: rhbz#1873211 - Add rsync_sys_admin tunable to allow rsync sys_admin capability Resolves: rhbz#1889673 - Allow sysadm read and write /dev/rfkill Resolves: rhbz#1831630 - Allow staff_u run pam_console_apply Resolves: rhbz#1817690 - Label /dev/vhost-vdpa-[0-9]+ as vhost_device_t Resolves: rhbz#1907485- Add cron_dbus_chat_system_job() interface Resolves: rhbz#1883906 - Dontaudit firewalld dac_override capability Resolves: rhbz#1759010 - Allow tcsd the setgid capability Resolves: rhbz#1898694 - Allow timedatex dbus chat with cron system domain Resolves: rhbz#1883906 - Allow systemd_hostnamed_t domain to dbus chat with sosreport_t domain Resolves: rhbz#1854299 - Allow pcp-pmcd manage perf_events Resolves: rhbz#1901958 - Label /dev/isst_interface as cpu_device_t Resolves: rhbz#1902227 - Allow ipsec set the context of a SPD entry to the default context Resolves: rhbz#1880474 - Allow sysadm_u user and unconfined_domain_type manage perf_events Resolves: rhbz#1901958 - Add manage_perf_event_perms object permissions set Resolves: rhbz#1901958 - Add perf_event access vectors. Resolves: rhbz#1901958 - Remove "ipa = module" from modules-targeted-contrib.conf Resolves: rhbz#1461914- Allow kexec manage generic tmp files Resolves: rhbz#1896424 - Update systemd-sleep policy Resolves: rhbz#1850177 - Add groupadd_t fowner capability Resolves: rhbz#1884179- Allow dovecot bind to smtp ports Resolves: rhbz#1881884 - Change fetchmail temporary files path to /var/spool/mail Resolves: rhbz#1853389 - Set file context for symlinks in /etc/httpd to etc_t Resolves: rhbz#1900650 - Allow dnsmasq read public files Resolves: rhbz#1782539 - Fix range for unreserved ports Resolves: rhbz#1794531 - Introduce logging_syslogd_append_public_content tunable Resolves: rhbz#1823672 - Add files_search_non_security_dirs() interface Resolves: rhbz#1823672 - Add miscfiles_append_public_files() interface Resolves: rhbz#1823672- Let keepalived bind a raw socket Resolves: rhbz#1895130 - Add fetchmail_uidl_cache_t type for /var/mail/.fetchmail.pid Resolves: rhbz#1853389 - Allow arpwatch create and use rdma socket Resolves: rhbz#1843409 - Set correct default file context for /usr/libexec/pcp/lib/* Resolves: rhbz#1886369 - Allow systemd-logind manage efivarfs files Resolves: rhbz#1869979 - Allow systemd_resolved_t to read efivarfs Resolves: rhbz#1869979 - Allow systemd_modules_load_t to read efivarfs Resolves: rhbz#1869979 - Allow read efivarfs_t files by domains executing systemctl file Resolves: rhbz#1869979 - Introduce systemd_read_efivarfs_type attribute Resolves: rhbz#1869979- Allow init dbus chat with kernel Resolves: rhbz#1694681 - Confine systemd-sleep service Resolves: rhbz#1850177 - Add default file context for /usr/libexec/pcp/lib/* Resolves: rhbz#1886369 - Allow rtkit_daemon_t to uise sys_ptrace usernamespace capability Resolves: rhbz#1873658 - Add fstools_rw_swap_files() interface Resolves: rhbz#1850177- Allow plymouth sys_chroot capability Resolves: rhbz#1869814- Allow certmonger fowner capability Resolves: rhbz#1870596 - Define named file transition for saslauthd on /tmp/krb5_0.rcache2 Resolves: rhbz#1870300 - Label /usr/libexec/qemu-pr-helper with virtd_exec_t Resolves: rhbz#1867115- Add ipa_helper_noatsecure() interface unconditionally Resolves: rhbz#1853432 - Conditionally allow nagios_plugin_domain dbus chat with init Resolves: rhbz#1750821 - Revert "Update allow rules set for nrpe_t domain" Resolves: rhbz#1750821 - Add ipa_helper_noatsecure() interface to ipa.if Resolves: rhbz#1853432 - Allow tomcat map user temporary files Resolves: rhbz#1857675 - Allow tomcat manage user temporary files Resolves: rhbz#1857675 - Add file context for /sys/kernel/tracing Resolves: rhbz#1847331 - Define named file transition for sshd on /tmp/krb5_0.rcache2 Resolves: rhbz#1848953- Allow kadmind manage kerberos host rcache Resolves: rhbz#1863043 - Allow virtlockd only getattr and lock block devices Resolves: rhbz#1832756 - Allow qemu-ga read all non security file types conditionally Resolves: rhbz#1747960 - Allow virtlockd manage VMs posix file locks Resolves: rhbz#1832756 - Add dev_lock_all_blk_files() interface Resolves: rhbz#1832756 - Allow systemd-logind dbus chat with fwupd Resolves: rhbz#1851932 - Update xserver_rw_session macro Resolves: rhbz#1851448- Revert "Allow qemu-kvm read and write /dev/mapper/control" This reverts commit f948eaf3d010215fc912e42013e4f88870279093. - Allow smbd get attributes of device files labeled samba_share_t Resolves: rhbz#1851816 - Allow tomcat read user temporary files Resolves: rhbz#1857675 - Revert "Dontaudit and disallow sys_admin capability for keepalived_t domain" Resolves: rhbz#1815281 - Label /tmp/krb5_0.rcache2 with krb5_host_rcache_t Resolves: rhbz#1848953 - Allow auditd manage kerberos host rcache files Resolves: rhbz#1855770- Additional support for keepalived running in a namespace Resolves: rhbz#1815281 - Allow keepalived manage its private type runtime directories Resolves: rhbz#1815281 - Run ipa_helper_noatsecure(oddjob_t) only if the interface exists Resolves: rhbz#1853432 - Allow oddjob_t process noatsecure permission for ipa_helper_t Resolves: rhbz#1853432 - Allow domain dbus chat with systemd-resolved Resolves: rhbz#1852378 - Define file context for /var/run/netns directory only Related: rhbz#1815281- Allow systemd_private_tmp(dirsrv_tmp_t) instead of dirsrv_t Resolves: rhbz#1836820- Allow virtlogd_t manage virt lib files Resolves: rhbz#1832756 - Allow pdns server to read system state Resolves: rhbz#1801214 - Support systemctl --user in machinectl Resolves: rhbz#1788616 - Allow chkpwd_t read and write systemd-machined devpts character nodes Resolves: rhbz#1788616 - Allow init_t write to inherited systemd-logind sessions pipes Resolves: rhbz#1788616 - Label systemd-growfs and systemd-makefs as fsadm_exec_t Resolves: rhbz#1820798 - Allow staff_u and user_u setattr generic usb devices Resolves: rhbz#1783325 - Allow sysadm_t dbus chat with accountsd Resolves: rhbz#1828809- Fix description tag for the sssd_connect_all_unreserved_ports tunable Related: rhbz#1826748 - Allow journalctl process set its resource limits Resolves: rhbz#1825894 - Add sssd_access_kernel_keys tunable to conditionally access kernel keys Resolves: rhbz#1802062 - Make keepalived work with network namespaces Resolves: rhbz#1815281 - Create sssd_connect_all_unreserved_ports boolean Resolves: rhbz#1826748 - Allow hypervkvpd to request kernel to load a module Resolves: rhbz#1842414 - Allow systemd_private_tmp(dirsrv_tmp_t) Resolves: rhbz#1836820 - Allow radiusd connect to gssproxy over unix domain stream socket Resolves: rhbz#1813572 - Add fwupd_cache_t file context for '/var/cache/fwupd(/.*)?' Resolves: rhbz#1832231 - Modify kernel_rw_key() not to include append permission Related: rhbz#1802062 - Add kernel_rw_key() interface to access to kernel keyrings Related: rhbz#1802062 - Modify systemd_delete_private_tmp() to use delete_*_pattern macros Resolves: rhbz#1836820 - Allow systemd-modules to load kernel modules Resolves: rhbz#1823246 - Add cachefiles_dev_t as a typealias to cachefiles_device_t Resolves: rhbz#1814796- Remove files_mmap_usr_files() call for particular domains Related: rhbz#1801214 - Allow dirsrv_t list cgroup directories Resolves: rhbz#1836795 - Create the kerberos_write_kadmind_tmp_files() interface Related: rhbz#1841488 - Allow realmd_t dbus chat with accountsd_t Resolves: rhbz#1792895 - Allow nagios_plugin_domain execute programs in bin directories Resolves: rhbz#1815621 - Update allow rules set for nrpe_t domain Resolves: rhbz#1750821 - Allow Gluster mount client to mount files_type Resolves: rhbz#1753626 - Allow qemu-kvm read and write /dev/mapper/control Resolves: rhbz#1835909 - Introduce logrotate_use_cifs boolean Resolves: rhbz#1795923 - Allow ptp4l_t sys_admin capability to run bpf programs Resolves: rhbz#1759214 - Allow rhsmd mmap /etc/passwd Resolves: rhbz#1814644 - Remove files_mmap_usr_files() call for systemd_localed_t Related: rhbz#1801214 - Allow domain mmap usr_t files Resolves: rhbz#1801214 - Allow libkrb5 lib read client keytabs Resolves: rhbz#1831769 - Add files_dontaudit_manage_boot_dirs() interface Related: rhbz#1803868 - Create files_create_non_security_dirs() interface Related: rhbz#1840265 - Add new interface dev_mounton_all_device_nodes() Related: rhbz#1840265 - Add new interface dev_create_all_files() Related: rhbz#1840265 - Allow sshd write to kadmind temporary files Resolves: rhbz#1841488 - Create init_create_dirs boolean to allow init create directories Resolves: rhbz#1832231 - Do not audit staff_t and user_t attempts to manage boot_t entries Resolves: rhbz#1803868 - Allow systemd to relabel all files on system. Resolves: rhbz#1818981 - Make dbus-broker service working on s390x arch Resolves: rhbz#1840265- Make boinc_var_lib_t label system mountdir attribute Resolves: rhbz#1779070 - Allow aide to be executed by systemd with correct (aide_t) domain Resolves: rhbz#1814809 - Allow chronyc_t domain to use nsswitch Resolves: rhbz#1772852 - Allow nscd_socket_use() for domains in nscd_use() unconditionally Resolves: rhbz#1772852 - Allow gluster geo-replication in rsync mode Resolves: rhbz#1831109 - Update networkmanager_read_pid_files() to allow also list_dir_perms Resolves: rhbz#1781818 - Allow associating all labels with CephFS Resolves: bz#1814689 - Allow tcpdump sniffing offloaded (RDMA) traffic Resolves: rhbz#1834773- Update radiusd policy Resolves: rhbz#1803407 - Allow sssd read NetworkManager's runtime directory Resolves: rhbz#1781818 - Label /usr/lib/NetworkManager/dispatcher as NetworkManager_initrc_exec_t Resolves: rhbz#1777506 - Allow ipa_helper_t to read kr5_keytab_t files Resolves: rhbz#1769423 - Add ibacm_t ipc_lock capability Resolves: rhbz#1754719 - Allow opafm_t to create and use netlink rdma sockets. Resolves: rhbz#1786670 - Allow ptp4l_t create and use packet_socket sockets Resolves: rhbz#1759214 - Update ctdbd_t policy Resolves: rhbz#1735748 - Allow glusterd synchronize between master and slave Resolves: rhbz#1824662 - Allow auditd poweroff or switch to single mode Resolves: rhbz#1826788 - Allow init_t set the nice level of all domains Resolves: rhbz#1819121 - Label /etc/sysconfig/ip6?tables\.save as system_conf_t Resolves: rhbz#1776873 - Add file context entry and file transition for /var/run/pam_timestamp Resolves: rhbz#1791957- Allow ssh-keygen create file in /var/lib/glusterd Resolves: rhbz#1816663 - Update ctdbd_manage_lib_files() to also allow mmap ctdbd_var_lib_t files Resolves: rhbz#1819243 - Remove container interface calling by named_filetrans_domain. - Makefile: fix tmp/%.mod.fc target Resolves: rhbz#1821191- Allow NetworkManager read its unit files and manage services - Mark nm-cloud-setup systemd units as NetworkManager_unit_file_t Resolves: rhbz#1806894- Update virt_read_qemu_pid_files inteface Resolves: rhbz#1782925- Allow vhostmd communication with hosted virtual machines - Add and update virt interfaces Resolves: rhbz#1782925- Dontaudit timedatex_t read file_contexts_t and validate security contexts Resolves: rhbz#1779098- Make stratisd_t domain unconfined for RHEL-8.2 Resolves: rhbz#1791557 - stratisd_t policy updates Resolves: rhbz#1791557- Label /stratis as stratisd_data_t Resolves: rhbz#1791557- Allow stratisd_t domain to read/write fixed disk devices and removable devices. Resolves: rhbz#1790795- Added macro for stratisd to chat over dbus - Add dac_override capability to stratisd_t domain - Allow userdomain to chat with stratisd over dbus. Resolves: rhbz#1787298- Update files_create_var_lib_dirs() interface to allow caller domain also set attributes of var_lib_t directory Resolves: rhbz#1778126- Allow create udp sockets for abrt_upload_watch_t domains Resolves: rhbz#1777761- Allow sssd_t domain to read kernel net sysctls Resolves: rhbz#1777042- Allow userdomain dbus chat with systemd_resolved_t Resolves: rhbz#1773463 - Allow init_t read and setattr on /var/lib/fprintd Resolves: rhbz#1781696 - Allow sysadm_t dbus chat with colord_t Resolves: rhbz#1772669 - Allow confined users run fwupdmgr Resolves: rhbz#1772619 - Allow confined users run machinectl Resolves: rhbz#1772625 - Allow systemd labeled as init_t domain to create dirs labeled as var_t Resolves: rhbz#1778126 - Allow systemd labeled as init_t domain to manage faillog_t objects Resolves: rhbz#1671019 - Add fprintd_read_var_lib_dir and fprintd_setattr_var_lib_dir interfaces Resolves: rhbz#1781696 - Allow pulseaudio create .config and dgram sendto to unpriv_userdomain Resolves: rhbz#1703231 - Allow abrt_dump_oops_t domain to create udp sockets BZ(1778030) Resolves: rhbz#1777761 - Change type in transition for /var/cache/{dnf,yum} directory Resolves: rhbz#1686833 - Revert "Update zebra SELinux policy to make it work also with frr service" This reverts commit 73653250a252ad6eefcb3aae00749017e396ab8d. - Revert "Label only regular files inside /usr/lib/frr direcotry as zebra_exec_t" This reverts commit a19eb1021cbd6c637344954cead54caae081e07c. - Allow stratis_t domain to request load modules Resolves: rhbz#1726259 - Allow stratisd to connect to dbus Resolves: rhbz#1726259 - Run stratisd service as stratisd_t Resolves: rhbz#1726259 - Add support for smart card authentication in cockpit BZ(1690444) Resolves: rhbz#1771414 - cockpit: Support split-out TLS proxy Resolves: rhbz#1771414 - cockpit: Allow cockpit-session to read cockpit-tls state Resolves: rhbz#1771414 - Update cockpit policy Resolves: rhbz#1771414 - cockpit: Support https instance factory Resolves: rhbz#1771414 - cockpit: Allow cockpit-session to read cockpit-tls state directory Resolves: rhbz#1771414 - Fix nonexisting types in rtas_errd_rw_lock interface Resolves: rhbz#1744234- Allow timedatex_t domain to read relatime clock and adjtime_t files Resolves: rhbz#1771513- Update timedatex policy to add macros Resolves: rhbz#1771513- Allow timedatex_t domain dbus chat with both confined and unconfined users Resolves: rhbz#1771513 - Fix typo bugs in rtas_errd_read_lock() interface Resolves: rhbz#1750096 - Allow timedatex_t domain to systemctl chronyd domains Resolves: rhbz#1771513 - Fix typo in dev_filetrans_all_named_dev() Resolves: rhbz#1750096- New policy for rrdcached Resolves: rhbz#1726255 - Update timedatex policy - Update timedatex SELinux policy to to sychronizate time with GNOME and add new macro chronyd_service_status to chronyd.if - Add new macro systemd_timedated_status to systemd.if to get timedated service status Resolves: rhbz#1730204 - Update lldpad_t policy module Resolves: rhbz#1726246 - Dontaudit sandbox web types to setattr lib_t dirs Resolves: rhbz#1739858 - Fix typo in cachefiles device Resolves: rhbz#1750096- Allow sssd_t domain to read gnome config and named cache files Resolves: rhbz#1743907 - Allow httpd_t to signull mailman_cgi_t process Resolves: rhbz#1686462 - Update virt_read_content interface to allow caller domain mmap virt_content_t block devices and files Resolves: rhbz#1758545 - Allow cachefilesd_t domain to read/write cachefiles_device_t devices Resolves: rhbz#1750096 - Remove setting label for /dev/cachefilesd char device from cachefilesd policy. This should be added in base policy Resolves: rhbz#1750096 - Allow pcp_pmcd_t domain to bind on udp port labeled as statsd_port_t Resolves:rhbz#1746511 - Label libvirt drivers as virtd_exec_t Resolves: rhbz#1745076 - Update apache and pkcs policies to make active opencryptoki rules Resolves: rhbz#1744198 - Introduce new bolean httpd_use_opencryptoki Resolves: rhbz#1744198 - Allow gssproxy_t domain read state of all processes on system Resolves: rhbz#1752031 - Dontaudit tmpreaper_t getting attributes from sysctl_type files Resolves: rhbz#1730204 - Added macro for timedatex to chat over dbus. Resolves: rhbz#1730204 - Run timedatex service as timedatex_t Resolves: rhbz#1730204 - Run lldpd service as lldpad_t. Resolves: rhbz#1726246 - Allow abrt_upload_watch_t domain to send dgram msgs to kernel processes and stream connect to journald - Allow tmpreaper_t domain to getattr files labeled as mtrr_device_t Resolves: rhbz#1765065 - Allow rhsmcertd_t domain to read/write rtas_errd_var_lock_t files Resolves: rhbz#1744234 - Allow tmpwatch process labeled as tmpreaper_t domain to execute fuser command. Resolves: rhbz#1765065 - Update tmpreaper_t policy due to fuser command Resolves: rhbz#1765065 - Allow fail2ban_t domain to create netlink netfilter sockets. Resolves: rhbz#1766415 - Label /dev/cachefilesd as cachefiles_device_t Resolves: rhbz#1750096 - Label udp 8125 port as statsd_port_t Resolves: rhbz#1746511 - Allow systemd(init_t) to load kernel modules Resolves: rhbz#1758255 - Dontaudit sys_admin capability for auditd_t domains Resolves: rhbz#1669040 - Allow x_userdomain to dbus_chat with timedatex. Resolves: rhbz#1730204- Allow confined users to run newaliases Resolves:rhbz#1750405 - Add interface mysql_dontaudit_rw_db() Resolves: rhbz#1747926 - Label /var/lib/xfsdump/inventory as amanda_var_lib_t Resolves: rhbz#1739137 - Allow tmpreaper_t domain to read all domains state Resolves: rhbz#1765065 - Allow ipa_ods_exporter_t domain to read krb5_keytab files Resolves: rhbz#1759900 - Allow rhsmcertd_t domain to read rtas_errd lock files Resolves: rhbz#1744234 - Add new interface rtas_errd_read_lock() Resolves: rhbz#1744234 - Donaudit ifconfig_t domain to read/write mysqld_db_t files Resolves: rhbz#1747926- Label only regular files inside /usr/lib/frr direcotry as zebra_exec_t Resolves: rhbz#1714984 - Dontaudit and disallow sys_admin capability for keepalived_t domain Resolves: rhbz#1729174 - Allow processes labeled as keepalived_t domain to get process group Resolves: rhbz#1746955- Allow ldconfig_t domain to manage initrc_tmp_t link files Allow netutils_t domain to write to initrc_tmp_t fifo files Resolves: rhbz#1756006 - Allow user domains to manage user session services Resolves: rhbz#1727887 - Allow staff and user users to get status of user systemd session Resolves: rhbz#1727887- Allow user_mail_domain attribute to manage files labeled as etc_aliases_t. Resolves: rhbz#1750405 - Allow dlm_controld_t domain to read random device Resolves: rhbz#1752943 - Allow haproxy_t domain to read network state of system Resolves: rhbz#1746974 - Allow avahi_t to send msg to lpr_t Resolves: rhbz#1752843 - Create new type ipmievd_helper_t domain for loading kernel modules. Resolves: rhbz#1673804 - networkmanager: allow NetworkManager_t to create bluetooth_socket Resolves: rhbz#1747768 - Label /etc/named direcotory as named_conf_t Resolves: rhbz#1759505 - Update aide_t domain to allow this tool to analyze also /dev filesystem Resolves: rhbz#1758265 - Update zebra SELinux policy to make it work also with frr service Resolves: rhbz#1714984 - Allow chronyd_t domain to manage and create chronyd_tmp_t dirs,files,sock_file objects. Resolves: rhbz#1711909 - Allow chronyc_t domain to append to all non_security files Resolves: rhbz#1696252 - Allow httpd_t domain to read/write named_cache_t files Resolves: rhbz#1690484 - Add new interface bind_rw_cache() Resolves: rhbz#1690484 - Label /var/run/mysql as mysqld_var_run_t Resolves: rhbz#1687867 - Allow cupsd_t domain to create directory with name ppd in dirs labeled as cupsd_etc_t with label cupsd_rw_etc_t. Resolves: rhbz#1612552 - Update cron_role, cron_admin_role and cron_unconfined_role to avoid *_t_t types Resolves: rhbz#1647971 - Allow sandbox_web_type domains to sys_ptrace and sys_chroot in user namespaces Resolves: rhbz#1663874 - Update gnome_dontaudit_read_config Resolves: rhbz#1663874 - Update tomcat_can_network_connect_db boolean to allow tomcat domains also connect to redis ports Resolves: rhbz#1687499 - Update keepalived policy Resolves: rhbz#1728332 - Add sys_admin capability for keepalived_t labeled processes Resolves: rhbz#1729174 - Fix abrt_upload_watch_t in abrt policy Resolves: rhbz#1737419 - Label /dev/shm/dirsrv/ with dirsrv_tmpfs_t label Resolves: rhbz#1737550 - Allow amanda_t to manage its var lib files and read random_device_t Resolves: rhbz#1739137 - Allow zebrat_t domain to read state of NetworkManager_t processes BZ(1739983) Resolves: rhbz#1743684 - Allow pesign_t domain to read/write named cache files. Resolves: rhbz#1745429 - Allow login user type to use systemd user session Resolves: rhbz#1727887 - Allow avahi_t to send msg to xdm_t Resolves: rhbz#1755401 - Allow ldconfig_t domain to manage initrc_tmp_t objects Resolves: rhbz#1756006 - Add new interface init_write_initrc_tmp_pipes() - Add new interface init_manage_script_tmp_files() - Add new interface udev_getattr_rules_chr_files() - Run lvmdbusd service as lvm_t Resolves: rhbz#1726166 - Label 2618/tcp and 2618/udp as priority_e_com_port_t - Label 2616/tcp and 2616/udp as appswitch_emp_port_t - Label 2615/tcp and 2615/udp as firepower_port_t - Label 2610/tcp and 2610/udp as versa_tek_port_t - Label 2613/tcp and 2613/udp as smntubootstrap_port_t - Label 3784/tcp and 3784/udp as bfd_control_port_t - Allow systemd labeled as init_t domain to remount rootfs filesystem Resolves: rhbz#1698197 - Add interface files_remount_rootfs() - New interface files_append_non_security_files() - Allow domains systemd_networkd_t and systemd_logind_t to chat over dbus Resolves: rhbz#1612552 - Update userdomains to pass correct parametes based on updates from cron_*_role interfaces Resolves: rhbz#1647971 - Dontaudit sys_admin capability for iptables_t SELinux domain Resolves: rhbz#1669040 - Allow systemd labeled as init_t domain to read/write faillog_t. BZ(1723132) Resolves: rhbz#1671019 - Allow userdomains to dbus chat with policykit daemon Resolves: rhbz#1727902 - Allow ipsec_t domain to read/write named cache files Resolves: rhbz#1743777 - Add sys_admin capability for ipsec_t domain Resolves: rhbz#1753662- Label /var/log/hawkey.log as rpm_log_t and update rpm named filetrans interfaces. - Allow sysadm_t to create hawkey log file with rpm_log_t SELinux label Resolves: rhbz#1720639- Update cpucontrol_t SELinux policy Resolves: rhbz#1743930- Allow dlm_controld_t domain to transition to the lvm_t Resolves: rhbz#1732956- Label /usr/libexec/microcode_ctl/reload_microcode as cpucontrol_exec_t Resolves: rhbz#1669485 - Fix typo in networkmanager_append_log() interface Resolves: rhbz#1687460 - Update gpg policy to make ti working with confined users Resolves: rhbz#1640296- Allow audisp_remote_t domain to read kerberos keytab Resolves: rhbz#1740146- Dontaudit abrt_t domain to read root_t files Resolves: rhbz#1734403 - Allow ipa_dnskey_t domain to read kerberos keytab Resolves: rhbz#1730144 - Update ibacm_t policy - Allow dlm_controld_t domain setgid capability Resolves: rhbz#1738608 - Allow auditd_t domain to create auditd_tmp_t temporary files and dirs in /tmp or /var/tmp Resolves: rhbz#1740146 - Update systemd_dontaudit_read_unit_files() interface to dontaudit alos listing dirs Resolves: rhbz#1670139- Allow cgdcbxd_t domain to list cgroup dirs Resolves: rhbz#1651991- Allow search krb5_keytab_t dirs for interfaces kerberos_read_keytab() and kerberos_rw_keytab Resolves: rhbz#1730144 - Allow virtlockd process read virtlockd.conf file Resolves: rhbz#1733185 - Relabel /usr/sbin/virtlockd from virt_exec_t to virtlogd_exec_t. Resolves: rhbz#1733185 - Allow brltty to request to load kernel module Resolves: rhbz#1689955 - Add svnserve_tmp_t label forl svnserve temp files to system private tmp Resolves: rhbz#1729955 - Dontaudit svirt_tcg_t domain to read process state of libvirt Resolves: rhbz#1732500 - Allow mysqld_t domain to domtrans to ifconfig_t domain when executing ifconfig tool Resolves: rhbz#1732381 - Allow cyrus work with PrivateTmp Resolves: rhbz#1725023 - Make cgdcbxd_t domain working with SELinux enforcing. Resolves: rhbz#1651991 - Remove system_r role from staff_u user. Resolves: rhbz#1677052 - Add systemd_private_tmp_type attribute Resolves: rhbz#1725023 - Allow systemd to load kernel modules during boot process. Resolves: rhbz#1644805- Make working wireshark execute byt confined users staff_t and sysadm_t Resolves: rhbz#1712788 - Label user cron spool file with user_cron_spool_t Resolves: rhbz#1727342 - Allow ptp4l_t domain to write to pmc socket which is created by pmc command line tool Resolves: rhbz#1668667 - Update svnserve_t policy to make working svnserve hooks Resolves: rhbz#1729955 - Allow varnishlog_t domain to check for presence of varnishd_t domains Resolves: rhbz#1730270 - Allow lsmd_t domain to execute /usr/bin/debuginfo-install Resolves: rhbz#1720648 - Update sandboxX policy to make working firefox inside SELinux sandbox Resolves: rhbz#1663874 - Remove allow rule from svirt_transition_svirt_sandbox interface to don't allow containers to connect to random services Resolves: rhbz#1695248 - Allow httpd_t domain to read /var/lib/softhsm/tokens to allow httpd daemon to use pkcs#11 devices Resolves: rhbz#1690484 - Allow opafm_t domain to modify scheduling information of another process. Resolves: rhbz#1725874 - Allow gssd_t domain to list tmpfs_t dirs Resolves: rhbz#1674470 - Allow mdadm_t domain to read tmpfs_t files Resolves: rhbz#1669996 - Allow sbd_t domain to check presence of processes labeled as cluster_t Resolves: rhbz#1669595 - Dontaudit httpd_sys_script_t to read systemd unit files Resolves: rhbz#1670139 - Allow blkmapd_t domain to read nvme devices Resolves: rhbz#1669985 - Update cpucontrol_t domain to make working microcode service Resolves: rhbz#1669485 - Allow domain transition from logwatch_t do postfix_postqueue_t Resolves: rhbz#1669162 - Allow chronyc_t domain to create and write to non_security files in case when sysadmin is redirecting output to file e.g: 'chronyc -n tracking > /var/lib/test' Resolves: rhbz#1696252 - Allow httpd_sys_script_t domain to mmap httpdcontent Resolves: rhbz#1693137 - Allow sbd_t to manage cgroups_t files Resolves: rhbz#1715134 - Update wireshark policy to make working tshar labeled as wireshark_t Resolves: rhbz#1711005 - Update virt_use_nfs boolean to allow svirt_t domain to mmap nfs_t files Resolves: rhbz#1719083 - Allow sbd_t domain to use nsswitch Resolves: rhbz#1723498 - Allow sysadm_t and staff_t domains to read wireshark shared memory Resolves: rhbz#1712788 - Label /usr/libexec/utempter/utempter as utemper_exec_t Resolves: rhbz#1729571 - Allow unconfined_domain_type to setattr own process lnk files. Resolves: rhbz#1730500 - Add interface files_write_generic_pid_sockets() - Dontaudit writing to user home dirs by gnome-keyring-daemon Resolves: rhbz#1689797 - Allow staff and admin domains to setpcap in user namespace Resolves: rhbz#1673922 - Allow staff and sysadm to use lockdev Resolves: rhbz#1673269 - Allow staff and sysadm users to run iotop. Resolves: rhbz#1671241 - Dontaudit traceroute_t domain require sys_admin capability Resolves: rhbz#1671672 - Dontaudit dbus chat between kernel_t and init_t Resolves: rhbz#1669095 - Allow systemd labeled as init_t to create mountpoints without any specific label as default_t Resolves: rhbz#1696144- Fix minor changes to pass coverity scan Resolves: rhbz#1728578- Allow qpidd_t domain to getattr all fs_t filesystem and mmap usr_t files - Label /var/kerberos/krb5 as krb5_keytab_t Resolves: rhbz#1669975 - Allow sbd_t domain to manage cgroup dirs Resolves: rhbz#1715134 - Allow wireshark_t domain to create netlink netfilter sockets Resolves: rhbz#1711005 - Allow gpg_agent_t domain to use nsswitch Resolves: rhbz#1567073 - Allow httpd script types to mmap httpd rw content Resolves: rhbz#1693137 - Allow confined users to login via cockpit Resolves: rhbz#1718814 - Replace "-" by "_" in speechdispatcher types names - Change condor_domain declaration in condor_systemctl - Update interface networkmanager_manage_pid_files() to allow manage also dirs Resolves: rhbz#1720070 - Update virt_use_nfs() boolean to allow virt_t to mmap nfs_t files Resolves: rhbz#1719083 - Fix all interfaces which cannot by compiled because of typos Resolves: rhbz#1687460 - Allow auditd_t domain to send signals to audisp_remote_t domain Resolves: rhbz#1726659 - Allow associate efivarfs_t on sysfs_t Resolves: rhbz#1709747 - Allow userdomain attribute to manage cockpit_ws_t stream sockets Resolves: rhbz#1718814 - Allow ssh_agent_type to read/write cockpit_session_t unnamed pipes - Add interface ssh_agent_signal() - Dontaudit unpriv_userdomain to manage boot_t files Resolves: rhbz#1723773 - Allow crack_t domain read /et/passwd files Resolves: rhbz#1721132 - Allow dhcpc_t domain to manage network manager pid files Resolves: rhbz#1720070- Allow redis_t domain to read public sssd files Resolves: rhbz#1718200 - Label /usr/sbin/nft as iptables_exec_t Resolves: rhbz#1656891- Allow sbd_t domain to read tmpfs_t symlinks Resolves: rhbz#1715134- Allow kadmind_t domain to read home config data Resolves: rhbz#1664983 - Allow sbd_t domain to readwrite cgroups Resolves: rhbz#1715134 - Label /var/log/pacemaker/pacemaker as cluster_var_log_t Resolves: rhbz#1712058 - Allow certmonger_t domain to manage named cache files/dirs- Allow kadmind_t domain to read pkcs11 module configs Resolves: rhbz#1664983 - Allow kadmind_t domain to read named_cache_t files Resolves: rhbz#1703241 - Fix bind_read_cache() interface to allow only read perms to caller domains - Allow chronyc_t domain to create own tmpfiles and allow communicate send data over unix dgram sockets Resolves: rhbz#1711909 - Allow wireshark_t domain to create fifo temp files Resolves: rhbz#1711005 - Add domain transition that systemd labeled as init_t can execute spamd_update_exec_t binary to run newly created process as spamd_update_t Resolves :rhbz#1656837 - Remove allow rule for virt_qemu_ga_t to write/append user_tmp_t files Resolves: rhbz#1648854 - Label /var/run/user/*/dbus-1 as session_dbusd_tmp_t Resolves:rhbz#1688671 - Add dac_override capability to namespace_init_t domain Resolves: rhbz#1557420 - Label /usr/sbin/corosync-qdevice as cluster_exec_t Resolves: rhbz#1690925 - Label /usr/libexec/dnf-utils as debuginfo_exec_t Resolves: rhbz#1711183 - Allow rtkit_scheduled for sysadm Resolves: rhbz#1703241 - Fix find commands in Makefiles - Allow associate all filesystem_types with fs_t Resolves: rhbz#1614209 - Allow init_t to manage session_dbusd_tmp_t dirs Resolves: rhbz#1688671 - Allow systemd_gpt_generator_t to read/write to clearance Resolves: rhbz#1558573 - Allow su_domain_type to getattr to /dev/gpmctl Resolves: rhbz#1593667- Add domain transition that systemd labeled as init_t can execute spamd_update_exec_t binary to run newly created process as spamd_update_t Resolves :rhbz#1656837 - Remove allow rule for virt_qemu_ga_t to write/append user_tmp_t files Resolves: rhbz#1648854 - Label /var/run/user/*/dbus-1 as session_dbusd_tmp_t Resolves:rhbz#1688671 - Add dac_override capability to namespace_init_t domain Resolves: rhbz#1557420 - Label /usr/sbin/corosync-qdevice as cluster_exec_t Resolves: rhbz#1690925 - Label /usr/libexec/dnf-utils as debuginfo_exec_t Resolves: rhbz#1711183 - Label /usr/bin/tshark as wireshark_exec_t Resolves: rhbz#1710962 - Allow rhsmcertd_t domain to read rpm cache files Resolves: rhbz#1641648 - Allow associate all filesystem_types with fs_t Resolves: rhbz#1614209 - Allow init_t to manage session_dbusd_tmp_t dirs Resolves: rhbz#1688671 - Allow systemd_gpt_generator_t to read/write to clearance Resolves: rhbz#1558573 - Allow su_domain_type to getattr to /dev/gpmctl Resolves: rhbz#1593667 - Update userdom_login_user_template() template to make working systemd user session for guest and xguest SELinux users Resolves: rhbz#1709372- Rebase with Fedora 30 package selinux-policy-3.14.3-34.fc30 Resolves: rhbz#1673107- Rebase with Fedora 30 package selinux-policy-3.14.3-31.fc30 Resolves: rhbz#1673107- Fix interface kernel_mounton_kernel_sysctl() Resolves: rhbz#1700222- Rebase with Fedora 30 package selinux-policy-3.14.3-28.fc30 Resolves: rhbz#1673107- Add dac_override capability for sbd_t SELinux domain Resolves: rhbz#1677325 - Allow syslogd_t domain to send null signal to all domains on system Resolves: rhbz#1676923- Update kdump_manage_crash() interface to allow also manage dirs by caller domain Resolves: rhbz#1627861- Add dac_override capability to spamd_t domain Resolves: rhbz#1567073- Allow ibacm_t domain to read system state and label all ibacm sockets and symlinks as ibacm_var_run_t in /var/run Resolves: rhbz#1635674 - Update mount_read_pid_files macro to allow also list mount_var_run_t dirs Resolves: rhbz#1664448 - Allow userdomain to stop systemd user session during logout. Resolves: rhbz#1664448- Allow read network state of system for processes labeled as ibacm_t Resolves: rhbz#1635674 - Allow ibacm_t domain to send dgram sockets to kernel processes Resolves: rhbz#1635674 - Allow virt_doamin to read/write dev device Resolves: rhbz#1672188 - Update ibacm_t policy after testing lastest version of this component Resolves: rhbz#1635674 - Allow sensord_t domain to mmap own log files Resolves:rhbz#1656055 - Label /dev/sev char device as sev_device_t Resolves: rhbz#1672188- Allow virt_doamin to read/write dev device Resolves: rhbz#1672188 - Update ibacm_t policy after testing lastest version of this component Resolves: rhbz#1635674 - Allow sensord_t domain to mmap own log files Resolves:rhbz#1656055 - Add dac_override capability for ipa_helper_t Resolves: rhbz#1668168 - Allow sensord_t domain to use nsswitch and execute shell Resolves: rhbz#1656055 - Allow opafm_t domain to execute lib_t files Resolves: rhbz#1627861 - Allow opafm_t domain to manage kdump_crash_t files and dirs Resolves: rhbz#1627861 - Label /dev/sev char device as sev_device_t Resolves: rhbz#1672188- Fix broken config files because of missing level specification in user_t contexts Resolves: rhbz#1664448- Allow sensord_t domain to use nsswitch and execute shell Resolves: rhbz#1656055 - Allow opafm_t domain to execute lib_t files Resolves: rhbz#1627861- Update dbus_role_template interface to allow userdomains to accept data from userdomain dbus domains Resolves: rhbz#1664448 - Allow systemd to read selinux logind config Resolves: rhbz#1664448 - Fix userdom_admin_user_template() interface by adding bluetooth,alg,dccp create_stream_socket permissions. - Allow transition from init_t domain to user_t domain during ssh login with confined user user_u Resolves: rhbz#1664448- Fix userdom_admin_user_template() interface by adding bluetooth,alg,dccp create_stream_socket permissions. Resolves: rhbz#1557301- Allow tangd_t domain to bind on tcp ports labeled as tangd_port_t Resolves: rhbz#1664345 - Create tangd_port_t with default label tcp/7406 Resolves: rhbz#1664345 - Remove tangd_t domain from permissive domains. Resolves: rhbz#1664345- Change label of /usr/libexec/lm_sensors/sensord-service-wrapper from lsmd_exec_t to sensord_exec_t Resolves: rhbz#1656055 - Make kpatch_t domain application domain to allow users to execute kpatch in kpatch_t domain. Resolves: rhbz#1630198 - Allow confined users to use new socket classes for bluetooth, alg and tcpdiag sockets Resolves: rhbz#1557301 - Allow sysadm_t,staff_t and unconfined_t domain to execute kpatch as kpatch_t domain Resolves: rhbz#1630198- Update nslcd_t domain to allow view kernel and systemd keyrings Resolves: rhbz#1657916 - Allow arpwatch_t domains to execute shell BZ(1644568) - Allow processes labeled as ipa_otpd_t stream connect to sssd. - Add new SELinux domain pcp_plugin_t. Resolves: rhbz#1648386 - Remove all ganesha bits from gluster and rpc policy Resolves: rhbz#1639227 - Label /usr/share/spamassassin/sa-update.cron as spamd_update_exec_t Resolves: rhbz#1656837 - Add dac_override capability to ssad_t domains Resolves: rhbz#1655551 - Allow pesign_t domain to read gnome home configs Resolves: rhbz#1644796 - Label /usr/libexec/lm_sensors/sensord-service-wrapper as lsmd_exec_t Resolves: rhbz#1656055 - Allow rngd_t domains read kernel state Resolves: rhbz#1656054 - Allow certmonger_t domains to read bind cache Resolves: rhbz#1655077 - Allow ypbind_t domain to stream connect to sssd Resolves: rhbz#1583953 - Allow rngd_t domain to setsched Resolves: rhbz#1653872 - Add interface init_view_key() - Allow systemd to mmap all pidfiles Resolves: rhbz#1622548 - Add files_map_all_pids() interface - Allow passwd_t domain mamange sssd public nad lib files, read pid files and send signals to sssd_t domains Resolves: rhbz#1657291 - Update xserver_filetrans_home_content() and xserver_filetrans_admin_home_content() unterfaces to allow caller domain to create .vnc dir in users homedir labeled as xdm_home_t Resolves: rhbz#1639846 - Update logging_filetrans_named_content() to allow caller domains of this interface to create /var/log/journal/remote directory labeled as var_log_t - Add sys_resource capability to the systemd_passwd_agent_t domain Resolves: rhbz#1590981 - Allow ipsec_t domains to read bind cache Resolves: rhbz#1654692 - kernel/files.fc: Label /run/motd as etc_t - Allow systemd to stream connect to userdomain processes Resolves: rhbz#1644733- Allow sanlock_t domain to read/write sysfs_t files Resolves: rhbz#1647594 - Add dac_override capability to postfix_local_t domain - Allow ypbind_t to search sssd_var_lib_t dirs - Allow virt_qemu_ga_t domain to write to user_tmp_t files - Allow systemd_logind_t to dbus chat with virt_qemu_ga_t - Update sssd_manage_lib_files() interface to allow also mmap sssd_var_lib_t files - Label /var/lib/private/systemd/ as init_var_lib_t Resolves: rhbz#1649312 - Allow initrc_t domain to create new socket labeled as init_t - Allow audisp_remote_t domain remote logging client to read local audit events from relevant socket. Resolves: rhbz#1639675 - Add tracefs_t type to mountpoint attribute Resolves: rhbz#1647819 - Allow useradd_t and groupadd_t domains to send signals to sssd_t Resolves: rhbz#1651531 - Allow systemd_logind_t domain to remove directories labeled as tmpfs_t BZ(1648636) - Allow useradd_t and groupadd_t domains to access sssd files because of the new feature in shadow-utils Resolves: rhbz#1651531- Update pesign policy to allow pesign_t domain to read bind cache files/dirs Resolves: rhbz#1644796 - Add dac_override capability to mdadm_t domain Resolves: rhbz#1599646 - Create ibacm_tmpfs_t type for the ibacm policy Resolves: rhbz#1581715 - Dontaudit capability sys_admin for dhcpd_t domain Resolves: rhbz#1635643 - Makes rhsmcertd_t domain an exception to the constraint preventing changing the user identity in object contexts. Resolves: rhbz#1639181 - Allow abrt_t domain to mmap generic tmp_t files Resolves:rhbz#1644727 - Label /usr/sbin/wpa_cli as wpa_cli_exec_t Resolves: rhbz#1644899 - Allow sandbox_xserver_t domain write to user_tmp_t files Resolves:rhbz#1644315 - Dontaudit thumb_t domain to setattr on lib_t dirs BZ(1643672) - Dontaudit cupsd_t domain to setattr lib_t dirs BZ(1636766) - Add dac_override capability to postgrey_t domain BZ(1638954) - Allow thumb_t domain to execute own tmpfs files BZ(1643698) - Add nnp transition rule for vnstatd_t domain using NoNewPrivileges systemd feature BZ(1643063) - Allow l2tpd_t domain to mmap /etc/passwd file BZ(1638948) - Allow certutil running as ipsec_mgmt_t domain to mmap ipsec_mgmt pid files Dontaudit ipsec_mgmt_t domain to write to the all mountpoints Resolves: rhbz#1644727 - Add interface files_map_generic_tmp_files() - Add dac_override capability to the syslogd_t domain Resolves: rhbz#1644373 - Create systemd_timedated_var_run_t label - Update systemd_timedated_t domain to allow create own pid files/access init_var_lib_t files and read dbus files BZ(1646202) - Improve fs_manage_ecryptfs_files to allow caller domain also mmap ecryptfs_t files BZ(1630675) - kernel/files.fc: Label /run/motd.d(/.*)? as etc_t - Allow ipsec_mgmt_t process to send signals other than SIGKILL, SIGSTOP, or SIGCHLD to the ipsec_t domains BZ(1638949)- Add dac_override capability to ftpd_t domain Resolves: rhbz#1641049 - Allow X display manager to check status and reload services which are part of x_domain attribute Resolves: rhbz#1641082- Allow gpg_t to create own tmpfs dirs and sockets - Allow rhsmcertd_t domain to relabel cert_t files - Add SELinux policy for kpatch Resolves: rhbz#1630198 - Allow nova_t domain to use pam - sysstat: grant sysstat_t the search_dir_perms set - Allow boltd_t domain to dbus chat with fwupd_t domain BZ(1633786) - Allow caller domains using cron_*_role to have entrypoint permission on system_cron_spool_t files BZ(1625645) - Add interface cron_system_spool_entrypoint() - Bolt added d-bus API for force-powering the thunderbolt controller, so system-dbusd needs acces to boltd pipes BZ(1637676) - Add interfaces for boltd SELinux module - Add dac_override capability to modemmanager_t domain BZ(1636608) - Add interface miscfiles_relabel_generic_cert() - Make kpatch policy active - Fix userdom_write_user_tmp_dirs() to allow caller domain also read/write user_tmp_t dirs - Dontaudit sys_admin capability for netutils_t domain - Label tcp and udp ports 2611 as qpasa_agent_port_t - Allow systemd to mount boltd_var_run_t dirs BZ(1636823) - Label correctly /var/named/chroot*/dev/unrandom in bind chroot.- Update rpm macros for selinux policy from sources repository: https://github.com/fedora-selinux/selinux-policy-macros Resolves: rhbz#1633198 - Allow boltd_t to read fwupd_t processes state - Turn named_write_master_zones boolean on by default. Resolves: rhbz#1633158 - Label /etc/rhsm as rhsmcertd_config_t Resolves: rhbz#1636212 - Allow httpd_t domain to write to httpd_config_t dirs if httpd_run_ipa boolean is turned on Resolves: rhbz#1624930 - Allow dhcpd_t domain to mmap dhcpd_state_t files Resolves: rhbz#1635643 - Allow abrt_t domain to manage usr_t dirs Resolves: rhbz#1619001 - Allow certmonger_t domain to manage cockpit pid files Resolves: rhbz#1629685 - Update opafm_t domain after basic testing this service Resolves: rhbz#1627861 - Allow systemd-tty-ask to ask for password of encrypted partions during boot Resolves: rhbz#1638666 - Update sysnet_read_dhcp_config interface to allow caller domain also mmap dhcp_etc_t files - Add interface files_manage_usr_dirs()- Allow ibacm_t domain to read/write to infiniband devices Allow ibacm_t domain to getattr tmpfs_t filesystem. Resolves: rhbz#1635674 - Update SELinux policy for libreswan based on the latest rebase 3.26 Resolves: rhbz#1637089- Allow cockpit to create motd file in /var/run/cockpit Resolves: rhbz#1629678 - Allow cockpit_t domain to read systemd state Resolves: rhbz#1629588- Tomcat should not be unconfined domain - Fix typo in cockpit interfaces we have cockpit_var_run_t files not cockpit_var_pid_t - Add interface apcupsd_read_power_files() - Allow systemd labeled as init_t to execute logrotate in logrotate_t domain - Allow dac_override capability to amanda_t domain - Allow geoclue_t domain to get attributes of fs_t filesystems - Update selinux policy for rhnsd_t domain based on changes in spacewalk-2.8-client Resolves: rhbz#1629678 Resolves: rhbz#1629685 Resolves: rhbz#1626100 Resolves: rhbz#1629588 Resolves: rhbz#1630317- Tomcat should not be unconfined domain - Allow cockpit_t domain to read systemd state - Allow abrt_t domain to write to usr_t files - Allow cockpit to create motd file in /var/run/cockpit - Label /usr/sbin/pcsd as cluster_exec_t - Allow pesign_t domain to getattr all fs - Allow tomcat servers to manage usr_t files - Dontaudit tomcat serves to append to /dev/random device - Allow dirsrvadmin_script_t domain to read httpd tmp files - Allow sbd_t domain to getattr of all char files in /dev and read sysfs_t files and dirs - Revert "Allow firewalld_t domain to read random device" - Allow postfix domains to mmap system db files - Allow geoclue_t domain to execute own tmp files - Allow virt_qemu_ga_t domain to read network state BZ(1592145) - Update ibacm_read_pid_files interface to allow also reading link files - Allow zebra_t domain to create packet_sockets - Allow opafm_t domain to list sysfs - Label /usr/libexec/cyrus-imapd/cyrus-master as cyris_exec_t - Add boolean: domain_can_mmap_files. - Allow sshd_t domain to read cockpit pid files - Allow syslogd_t domain to manage cert_t files - Allow getattr as part of files_mounton_kernel_symbol_table. - Fix typo "aduit" -> "audit" - Revert "Add new interface dev_map_userio()" - Add new interface dev_map_userio() - Allow systemd to read ibacm pid files Resolves: rhbz#1615318 Resolves: rhbz#1619001 Resolves: rhbz#1627646- Merge remote-tracking branch 'fedora-contrib/f28' into rhel8.0-contrib - Tomcat should not be unconfined domain - Update ibacm_read_pid_files interface to allow also reading link files - Allow zebra_t domain to create packet_sockets - Allow opafm_t domain to list sysfs - Label /usr/libexec/cyrus-imapd/cyrus-master as cyris_exec_t - Allow tomcat Tomcat to delete a temporary file used when compiling class files for JSPs. - Allow chronyd_t domain to read virt_var_lib_t files - Allow tomcat services create link file in /tmp - Label /etc/shorewall6 as shorewall_etc_t - Allow winbind_t domain kill in user namespaces - Allow firewalld_t domain to read random device - Allow abrt_t domain to do execmem - Allow geoclue_t domain to execute own var_lib_t files - Allow openfortivpn_t domain to read system network state - Allow dnsmasq_t domain to read networkmanager lib files - sssd: Allow to limit capabilities using libcap - sssd: Remove unnecessary capability - sssd: Do not audit usage of lib nss_systemd.so - Fix bug in nsd.fc, /var/run/nsd.ctl is socket file not file - Add correct namespace_init_exec_t context to /etc/security/namespace.d/* - Update nscd_socket_use to allow caller domain to mmap nscd_var_run_t files - Allow exim_t domain to mmap bin files - Allow mysqld_t domain to executed with nnp transition - Allow svirt_t domain to mmap svirt_image_t block files - Add caps dac_read_search and dav_override to pesign_t domain - Allow iscsid_t domain to mmap userio chr files - Merge remote-tracking branch 'fedora-base/f28' into rhel8.0-base - Revert "Add new interface dev_map_userio()" - Add new interface dev_map_userio() - Allow systemd to read ibacm pid files - Allow systemd to create symlinks in for /var/lib - Add comment to show that template call also allows changing shells - Document userdom_change_password_template() behaviour - Merge remote-tracking branch 'fedora-base/f28' into rhel8.0-base - update files_mounton_kernel_symbol_table() interface to allow caller domain also mounton system_map_t file - Fix typo in logging SELinux module - Allow usertype to mmap user_tmp_type files - In domain_transition_pattern there is no permission allowing caller domain to execu_no_trans on entrypoint, this patch fixing this issue - Revert "Add execute_no_trans permission to mmap_exec_file_perms pattern" - Add boolean: domain_can_mmap_files. - Allow ipsec_t domian to mmap own tmp files - Add .gitignore file - Add execute_no_trans permission to mmap_exec_file_perms pattern - Allow sudodomain to search caller domain proc info - Allow audisp_remote_t domain to read auditd_etc_t - netlabel: Remove unnecessary sssd nsswitch related macros - Allow to use sss module in auth_use_nsswitch - Limit communication with init_t over dbus - Add actual modules.conf to the git repo - Add few interfaces to optional block - Allow sysadm_t and staff_t domain to manage systemd unit files - Add interface dev_map_userio_dev() Resolves: rhbz#1623411 Resolves: rhbz#1624648 Resolves: rhbz#1596618 Resolves: rhbz#1574878 Resolves: rhbz#1577324 Resolves: rhbz#1625202 Resolves: rhbz#1581715 Resolves: rhbz#1625127- Allow ovs-vswitchd labeled as openvswitch_t domain communicate with qemu-kvm via UNIX stream socket Resolves: rhbz#1621142 - Add interface devicekit_mounton_var_lib() - Allow httpd_t domain to mmap tmp files - Allow tcsd_t domain to have dac_override capability - Allow cupsd_t to rename cupsd_etc_t files - Allow iptables_t domain to create rawip sockets - Allow amanda_t domain to mmap own tmpfs files - Allow fcoemon_t domain to write to sysfs_t dirs - Allow dovecot_auth_t domain to have dac_override capability - Allow geoclue_t domain to mmap own tmp files - Allow chronyc_t domain to read network state - Allow apcupsd_t domain to execute itself - Allow modemmanager_t domain to stream connect to sssd - Allow chonyc_t domain to rw userdomain pipes - Update dirsrv_read_share() interface to allow caller domain to mmap dirsrv_share_t files - Update dirsrvadmin_script_t policy to allow read httpd_tmp_t symlinks - Allow nagios_script_t domain to mmap nagios_spool_t files - Allow geoclue_t domain to mmap geoclue_var_lib_t files - Allow geoclue_t domain to map generic certs - Update munin_manage_var_lib_files to allow manage also dirs - Allow nsd_t domain to create new socket file in /var/run/nsd.ctl - Fix typo in virt SELinux policy module - Allow virtd_t domain to create netlink_socket - Allow rpm_t domain to write to audit - Allow nagios_script_t domain to mmap nagios_etc_t files - Update nscd_socket_use() to allow caller domain to stream connect to nscd_t - Allow kdumpctl_t domain to getattr fixed disk device in mls - Fix typo in stapserver policy - Dontaudit abrt_t domain to write to usr_t dirs - Revert "Allow rpcbind to bind on all unreserved udp ports" - Allow rpcbind to bind on all unreserved udp ports - Allow virtlogd to execute itself - Allow stapserver several actions: - execute own tmp files - mmap stapserver_var_lib_t files - create stapserver_tmpfs_t files - Allow ypxfr_t domain to stream connect to rpcbind and allos search sssd libs - Allos systemd to socket activate ibacm service - Allow dirsrv_t domain to mmap user_t files - Allow dhcpc_t domain to read /dev/random - Allow systemd to mounton device_var_lib_t dirs - Allow systemd to mounton kernel system table - Label also chr_file /dev/mtd.* devices as fixed_disk_device_t - Allow syslogd_t domain to create netlink generic sockets - Label /dev/tpmrm[0-9]* as tpm_device_t - Update dev_filetrans_all_named_dev() to allow create event22-30 character files with label event_device_t - Update userdom_security_admin() and userdom_security_admin_template() to allow use auditctl - Allow insmod_t domain to read iptables pid files - Allow systemd to mounton /etc - Allow initrc_domain to mmap all binaries labeled as systemprocess_entry - Allow xserver_t domain to start using systemd socket activation - Tweak SELinux policy for systemd to allow DynamicUsers systemd feature - Associate several proc labels to fs_t - Update init_named_socket_activation() interface to allow systemd also create link files in /var/run- Dontaudit abrt_t domain to write to usr_t dirs - Revert "Allow rpcbind to bind on all unreserved udp ports" - Allow rpcbind to bind on all unreserved udp ports - Allow virtlogd to execute itself - Allow stapserver several actions: - execute own tmp files - mmap stapserver_var_lib_t files - create stapserver_tmpfs_t files - Allow ypxfr_t domain to stream connect to rpcbind and allos search sssd libs - Allos systemd to socket activate ibacm service - Allow dirsrv_t domain to mmap user_t files - Allow kdumpctl_t domain to manage kdumpctl_tmp_t fifo files - Allow kdumpctl to write to files on all levels - Allow httpd_t domain to mmap httpd_config_t files - Allow sanlock_t domain to connectto to unix_stream_socket - Revert "Add same context for symlink as binary" - Allow mysql execute rsync - Update nfsd_t policy because of ganesha features - Allow conman to getattr devpts_t - Allow tomcat_domain to connect to smtp ports - Allow tomcat_t domain to mmap tomcat_var_lib_t files - Allow nagios_t domain to mmap nagios_log_t files - Allow kpropd_t domain to mmap krb5kdc_principal_t files - Allow kdumpctl_t domain to read fixed disk storage - Allow xserver_t domain to start using systemd socket activation - Tweak SELinux policy for systemd to allow DynamicUsers systemd feature - Associate several proc labels to fs_t - Update init_named_socket_activation() interface to allow systemd also create link files in /var/run - Fix typo in syslogd policy - Update syslogd policy to make working elasticsearch - Label tcp and udp ports 9200 as wap_wsp_port - Allow few domains to rw inherited kdumpctl tmp pipes- Add missing tarball from sources Resolves: rhbz#1615312- Use explicit path BuildRequires to get /usr/bin/python3 inside the buildroot Resolves: rhbz#1615312- Fix issue with aliases in apache interface file Resolves: rhbz#1596618 - Add same context for symlink as binary - Allow boltd_t to send logs to journal - Allow colord_use_nfs to allow colord also mmap nfs_t files - Allow mysqld_safe_t do execute itself - Allow smbd_t domain to chat via dbus with avahi daemon - cupsd_t domain will create /etc/cupsd/ppd as cupsd_etc_rw_t - Update screen_role_template to allow caller domain to have screen_exec_t as entrypoint do new domain - Add alias httpd__script_t to _script_t to make sepolicy generate working - Allow gpg_t domain to mmap gpg_agent_tmp_t files - Allow kprop_t domain to read network state - Add support boltd policy - Allow kpropd domain to exec itself - Allow pdns_t to bind on tcp transproxy port - Add support for opafm service - Allow hsqldb_t domain to read cgroup files - Allow rngd_t domain to read generic certs - Allow innd_t domain to mmap own var_lib_t files - Update screen_role_temaplate interface - Allow chronyd_t domain to mmap own tmpfs files - Allow chronyd_t domain to mmap own tmpfs files - label /var/lib/pgsql/data/log as postgresql_log_t - Allow sysadm_t domain to accept socket - Allow systemd to manage passwd_file_t - Allow sshd_t domain to mmap user_tmp_t files - Allow systemd to mounont boltd lib dirs - Allow sysadm_t domain to create rawip sockets - Allow sysadm_t domain to listen on socket - Update sudo_role_template() to allow caller domain also setattr generic ptys- Allow sblim_sfcbd_t domain to mmap own tmpfs files - Allow nfsd_t domain to read krb5 keytab files - Allow nfsd_t domain to manage fadm pid files - Allow virt_domain to create icmp sockets BZ(1609142) - Dontaudit oracleasm_t domain to request sys_admin capability - Update logging_manage_all_logs() interface to allow caller domain map all logfiles- Allow aide to mmap all files - Revert "Allow firewalld_t do read iptables_var_run_t files" - Revert "Allow firewalld to create rawip sockets" - Allow svirt_tcg_t domain to read system state of virtd_t domains - Update rhcs contexts to reflects the latest fenced changes - Allow httpd_t domain to rw user_tmp_t files - Fix typo in openct policy - Allow winbind_t domian to connect to all ephemeral ports - Allow firewalld_t do read iptables_var_run_t files - Allow abrt_t domain to mmap data_home files - Allow glusterd_t domain to mmap user_tmp_t files - Allow mongodb_t domain to mmap own var_lib_t files - Allow firewalld to read kernel usermodehelper state - Allow modemmanager_t to read sssd public files - Allow openct_t domain to mmap own var_run_t files - Allow nnp transition for devicekit daemons - Allow firewalld to create rawip sockets - Allow firewalld to getattr proc filesystem - Dontaudit sys_admin capability for pcscd_t domain - Revert "Allow pcsd_t domain sys_admin capability" - Allow fetchmail_t domain to stream connect to sssd - Allow pcsd_t domain sys_admin capability - Allow cupsd_t to create cupsd_etc_t dirs - Allow varnishlog_t domain to list varnishd_var_lib_t dirs - Allow mongodb_t domain to read system network state BZ(1599230) - Allow zoneminder_t to getattr of fs_t - Allow tgtd_t domain to create dirs in /var/run labeled as tgtd_var_run_t BZ(1492377) - Allow iscsid_t domain to mmap sysfs_t files - Allow httpd_t domain to mmap own cache files - Add sys_resource capability to nslcd_t domain - Fixed typo in logging_audisp_domain interface - Add interface files_mmap_all_files() - Add interface iptables_read_var_run() - Allow systemd to mounton init_var_run_t files - Update policy rules for auditd_t based on changes in audit version 3 - Allow systemd_tmpfiles_t do mmap system db files - Don't setup unlabeled_t as an entry_type - Allow unconfined_service_t to transition to container_runtime_t - Improve domain_transition_pattern to allow mmap entrypoint bin file.- Allow cupsd_t domain to mmap cupsd_etc_t files - Allow kadmind_t domain to mmap krb5kdc_principal_t - Allow virtlogd_t domain to read virt_etc_t link files - Allow dirsrv_t domain to read crack db - Dontaudit pegasus_t to require sys_admin capability - Allow mysqld_t domain to exec mysqld_exec_t binary files - Allow abrt_t odmain to read rhsmcertd lib files - Allow winbind_t domain to request kernel module loads - Allow tomcat_domain to read cgroup_t files - Allow varnishlog_t domain to mmap varnishd_var_lib_t files - Allow innd_t domain to mmap news_spool_t files - Label HOME_DIR/mozilla.pdf file as mozilla_home_t instead of user_home_t - Allow fenced_t domain to reboot - Allow amanda_t domain to read network system state - Allow abrt_t domain to read rhsmcertd logs - Fix typo in radius policy - Update zoneminder policy to reflect latest features in zoneminder BZ(1592555) - Label /usr/bin/esmtp-wrapper as sendmail_exec_t - Update raid_access_check_mdadm() interface to dontaudit caller domain to mmap mdadm_exec_t binary files - Dontaudit thumb to read mmap_min_addr - Allow chronyd_t to send to system_cronjob_t via unix dgram socket BZ(1494904) - Allow mpd_t domain to mmap mpd_tmpfs_t files BZ(1585443) - Allow collectd_t domain to use ecryptfs files BZ(1592640) - Dontaudit mmap home type files for abrt_t domain - Allow fprintd_t domain creating own tmp files BZ(1590686) - Allow collectd_t domain to bind on bacula_port_t BZ(1590830) - Allow fail2ban_t domain to getpgid BZ(1591421) - Allow nagios_script_t domain to mmap nagios_log_t files BZ(1593808) - Allow pcp_pmcd_t domain to use sys_ptrace usernamespace cap - Allow sssd_selinux_manager_t to read/write to systemd sockets BZ(1595458) - Allow radiusd_t domain to mmap radius_etc_rw_t files - Allow git_script_t domain to read and mmap gitosis_var_lib_t files BZ(1591729) - Add dac_read_search capability to thumb_t domain - Add dac_override capability to cups_pdf_t domain BZ(1594271) - Add net_admin capability to connntrackd_t domain BZ(1594221) - Allow gssproxy_t domain to domtrans into gssd_t domain BZ(1575234) - Fix interface init_dbus_chat in oddjob SELinux policy BZ(1590476) - Allow motion_t to mmap video devices BZ(1590446) - Add dac_override capability to mpd_t domain BZ(1585358) - Allow fsdaemon_t domain to write to mta home files BZ(1588212) - Allow virtlogd_t domain to chat via dbus with systemd_logind BZ(1589337) - Allow sssd_t domain to write to general cert files BZ(1589339) - Allow l2tpd_t domain to sends signull to ipsec domains BZ(1589483) - Allow cockpit_session_t to read kernel network state BZ(1596941) - Allow devicekit_power_t start with nnp systemd security feature with proper SELinux Domain transition BZ(1593817) - Allows systemd to get attribues of core kernel interface BZ(1596928) - Dontaudit syslogd to watching top llevel dirs when imfile module is enabled - Revert "Allow unconfined and sysadm users to use bpftool BZ(1591440)" - Allow userdomain sudo domains to use generic ptys - Allow systemd labeled as init_t to get sysvipc info BZ(1600877) - Label /sbin/xtables-legacy-multi and /sbin/xtables-nft-multi as iptables_exec_t BZ(1600690) - Remove duplicated userdom_delete_user_home_content_files - Add systemd_dbus_chat_resolved interface - Allow load_policy_t domain to read/write to systemd sockets BZ(1582812) - Add new interface init_prog_run_bpf() - Allow unconfined and sysadm users to use bpftool BZ(1591440) - Label /run/cockpit/motd as etc_t BZ(1584167) - Allow systemd_machined_t domain to sendto syslogd_t over unix dgram sockets - Add interface userdom_dontaudit_mmap_user_home_content_files() - Allow systemd to listen bluetooth sockets BZ(1592223) - Allow systemd to remove user_home_t files BZ(1418463) - Allow xdm_t domain to mmap and read cert_t files BZ(1553761) - Allow nsswitch_domain to mmap passwd_file_t files BZ(1518655) - Allow systemd to delete user temp files BZ(1595189) - Allow systemd to mounton core kernel interface - Add dac_override capability to ipsec_t domain BZ(1589534) - Allow systemd domain to mmap lvm config files BZ(1594584) - Allow systemd to write systemd_logind_inhibit_var_run_t fifo files - Allow systemd_modules_load_t to access unabeled infiniband pkeys- Add ibacm policy - Label /usr/sbin/rhn_check-[0-9]+.[0-9]+ as rpm_exec_t - Allow kdumpgui_t domain to allow execute and mmap all binaries labeled as kdumpgui_tmp_t - Allow rpm to check if SELinux will check original protection mode or modified protection mode (read-implies-exec) for mmap/mprotect. Allow rpm to reload systemd services - Allow crond_t domain to create netlink selinux sockets and dac_override cap. - Allow radiusd_t domain to have dac_override capability - Allow amanda_t domain to have setgid capability - Allow psad domain to setrlimit. Allow psad domain to stream connect to dbus Allow psad domain to exec journalctl_exec_t binary - Update cups_filetrans_named_content() to allow caller domain create ppd directory with cupsd_etc_rw_t label - Allow abrt_t domain to write to rhsmcertd pid files - Allow pegasus_t domain to eexec lvm binaries and allow read/write access to lvm control - Add vhostmd_t domain to read/write to svirt images - Update kdump_manage_kdumpctl_tmp_files() interface to allow caller domain also mmap kdumpctl_tmp_t files - Allow sssd_t and slpad_t domains to mmap generic certs - Allow chronyc_t domain use inherited user ttys - Allow stapserver_t domain to mmap own tmp files - Update nscd_dontaudit_write_sock_file() to dontaudit also stream connect to nscd_t domain - Merge pull request #60 from vmojzis/rawhide - Allow tangd_t domain stream connect to sssd - Allow oddjob_t domain to chat with systemd via dbus - Allow freeipmi domains to mmap sysfs files - Fix typo in logwatch interface file - Allow spamd_t to manage logwatch_cache_t files/dirs - Allow dnsmasw_t domain to create own tmp files and manage mnt files - Allow fail2ban_client_t to inherit rlimit information from parent process - Allow nscd_t to read kernel sysctls - Label /var/log/conman.d as conman_log_t - Add dac_override capability to tor_t domain - Allow certmonger_t to readwrite to user_tmp_t dirs - Allow abrt_upload_watch_t domain to read general certs - Allow chornyd_t read phc2sys_t shared memory - Add several allow rules for pesign policy: - Add setgid and setuid capabilities to mysqlfd_safe_t domain - Add tomcat_can_network_connect_db boolean - Update virt_use_sanlock() boolean to read sanlock state - Add sanlock_read_state() interface - Allow zoneminder_t to getattr of fs_t - Allow rhsmcertd_t domain to send signull to postgresql_t domain - Add log file type to collectd and allow corresponding access - Allow policykit_t domain to dbus chat with dhcpc_t - Adding new boolean keepalived_connect_any() - Allow amanda to create own amanda_tmpfs_t files - Allow gdomap_t domain to connect to qdomap_port_t - /usr/libexec/bluetooth/obexd should have only obexd_exec_t instead of bluetoothd_exec_t type - Allow ntop_t domain to create/map various sockets/files. - Enable the dictd to communicate via D-bus. - Allow inetd_child process to chat via dbus with abrt - Allow zabbix_agent_t domain to connect to redis_port_t - Allow rhsmcertd_t domain to read xenfs_t files - Allow zabbix_agent_t to run zabbix scripts - Fix openvswith SELinux module - Fix wrong path in tlp context file BZ(1586329) - Update brltty SELinux module - Allow rabbitmq_t domain to create own tmp files/dirs - Allow policykit_t mmap policykit_auth_exec_t files - Allow ipmievd_t domain to read general certs - Add sys_ptrace capability to pcp_pmie_t domain - Allow squid domain to exec ldconfig - Update gpg SELinux policy module - Allow mailman_domain to read system network state - Allow openvswitch_t domain to read neutron state and read/write fixed disk devices - Allow antivirus_domain to read all domain system state - Allow targetd_t domain to red gconf_home_t files/dirs - Label /usr/libexec/bluetooth/obexd as obexd_exec_t - Allow init_t domain to create netlink rdma sockets for ibacm policy - Update corecmd_exec_shell() interface to allow caller domain to mmap shell_exec_t files - Allow lvm_t domain to write files to all mls levels - Add to su_role_template allow rule for creating netlink_selinux sockets - Allow sysadm_t domain to mmap hwdb db - Allow udev_t domain to mmap kernel modules - Allow sysadm_screen_t to have capability dac_override and chown - Allow sysadm_t domain to mmap journal - Merge branch 'rawhide' of github.com:fedora-selinux/selinux-policy into rawhide - Label /etc/systemd/system.control/ dir as systemd_unit_file_t - Merge pull request #215 from bachradsusi/merge-conf-from-fedora - Allow sysadm_t and staff_t domains to use sudo io logging - Allow sysadm_t domain create sctp sockets - Add snapperd_contexts to the policy - Use system_u:system_r:unconfined_t:s0 in userhelper_context - Remove unneeded system_u seusers mapping. - Fedora targeted default user is unconfined_u, root is unconfined_u as well - Update config to reflect changes in default context for SELinux users related to pam_selinux.so which is now used in systemd-users. - Change failsafe_context to unconfined_r:unconfined_t:s0 - Update lxc_contexts from Fedora config.tgz - Add lxc_contexts config file - Allow traceroute_t domain to exec bin_t binaries - Allow systemd_passwd_agent_t domain to list sysfs Allow systemd_passwd_agent_t domain to dac_override - Add new interface dev_map_sysfs() - Allow sshd_keygen_t to execute plymouthd - Allow systemd_networkd_t create and relabel tun sockets - Add new interface postgresql_signull() - Merge pull request #214 from wrabcak/fb-dhcpc - Allow dhcpc_t creating own socket files inside /var/run/ Allow dhcpc_t creating netlink_kobject_uevent_socket, netlink_generic_socket, rawip_socket BZ(1585971) - Allow confined users get AFS tokens - Allow sysadm_t domain to chat via dbus - Associate sysctl_kernel_t type with filesystem attribute- Fix typos in zabbix.te file - Add missing requires - Allow tomcat domain sends email - Fix typo in sge policy - Allow certmonger to sends emails - Allow tomcat_t do mmap tomcat_tmp_t files - Improve sge_rw_tcp_sockets interface - Adding new interface: sge_rw_tcp_sockets() - Update sge_execd_t domain with few rules - Add new zabbix_run_sudo boolean - Allow virtual machines to manage cephfs filesystems. - Allow rhsmcertd_t domain to read sssd public files and stream connect to sssd - Add dac_override capability to sendmail_t domain - Fix typo in netutils.te file - Update traceroute_t domain to allow create dccp sockets - Update ssh_keysign policy - Allow sshd_t domain to read/write sge tcp sockets- Update ctdb domain to support gNFS setup - Allow authconfig_t dbus chat with policykit - Allow lircd_t domain to read system state - Revert "Allow fsdaemon_t do send emails BZ(1582701)" - Typo in uuidd policy - Allow tangd_t domain read certs - Allow vpnc_t domain to read configfs_t files/dirs BZ(1583107) - Allow vpnc_t domain to read generic certs BZ(1583100) - Label /var/lib/phpMyAdmin directory as httpd_sys_rw_content_t BZ(1584811) - Allow NetworkManager_ssh_t domain to be system dbud client - Allow virt_qemu_ga_t read utmp - Add capability dac_override to system_mail_t domain - Update uuidd policy to reflect last changes from base branch - Add cap dac_override to procmail_t domain - Allow sendmail to mmap etc_aliases_t files BZ(1578569) - Add new interface dbus_read_pid_sock_files() - Allow mpd_t domain read config_home files if mpd_enable_homedirs boolean will be enabled - Allow fsdaemon_t do send emails BZ(1582701) - Allow firewalld_t domain to request kernel module BZ(1573501) - Allow chronyd_t domain to send send msg via dgram socket BZ(1584757) - Add sys_admin capability to fprint_t SELinux domain - Allow cyrus_t domain to create own files under /var/run BZ(1582885) - Allow cachefiles_kernel_t domain to have capability dac_override - Update policy for ypserv_t domain - Allow zebra_t domain to bind on tcp/udp ports labeled as qpasa_agent_port_t - Allow cyrus to have dac_override capability - Dontaudit action when abrt-hook-ccpp is writing to nscd sockets - Fix homedir polyinstantion under mls - Fixed typo in init.if file - Allow systemd to remove generic tmpt files BZ(1583144) - Update init_named_socket_activation() interface to also allow systemd create objects in /var/run with proper label during socket activation - Allow systemd-networkd and systemd-resolved services read system-dbusd socket BZ(1579075) - Fix typo in authlogin SELinux security module - Allod nsswitch_domain attribute to be system dbusd client BZ(1584632) - Allow audisp_t domain to mmap audisp_exec_t binary - Update ssh_domtrans_keygen interface to allow mmap ssh_keygen_exec_t binary file - Label tcp/udp ports 2612 as qpasa_agetn_port_t- Add dac_override to exim policy BZ(1574303) - Fix typo in conntrackd.fc file - Allow sssd_t to kill sssd_selinux_manager_t - Allow httpd_sys_script_t to connect to mongodb_port_t if boolean httpd_can_network_connect_db is turned on - Allow chronyc_t to redirect ourput to /var/lib /var/log and /tmp - Allow policykit_auth_t to read udev db files BZ(1574419) - Allow varnishd_t do be dbus client BZ(1582251) - Allow cyrus_t domain to mmap own pid files BZ(1582183) - Allow user_mail_t domain to mmap etc_aliases_t files - Allow gkeyringd domains to run ssh agents - Allow gpg_pinentry_t domain read ssh state - Allow gpg_agent_t to send msgs to syslog/journal - Add dac_override capability to dovecot_t domain - Allow nscd_t domain to mmap system_db_t files - Allow tangd_t domain to create tcp sockets and add new interface tangd_read_db_files - Allow mailman_mail_t domain to search for apache configs - Allow mailman_cgi_t domain to ioctl an httpd with a unix domain stream sockets. - Improve procmail_domtrans() to allow mmaping procmail_exec_t - Allow ptrace arbitrary processes - Allow jabberd_router_t domain read kerberos keytabs BZ(1573945) - Allow certmonger to geattr of filesystems BZ(1578755) - Allow hypervvssd_t domain to read fixed disk devices - Allow several domains to manage ecryptfs_t filesystem - Allow userdom_use_user_ttys for loadkeys_t domain - Add dac_override capability to cachefiles_kernel_t domain - Allow blueman to execute ldconfig BZ(1577581) - Allow gpg_pinentry_t domain to read state of gpg_t processes - Add dac_override capability to cgconfig_t domain BZ(1574649) - Add dac_override to glusterd_t domain BZ(1578501) - Allow fsdaemon_t to create own fsdaemon_var_lib_t dirs BZ(1569724) - Allow plymouth_t domain to read/write systemd sockets BZ(1578882) - Allow use of U2F Yubikey as authentication for a sudo command BZ(1578915) - Append map permission to apache_read_modules() interface - Allow certwatch_t domain to getattr of extended attributes fs_t filesystem - Add new interface: dirsrv_noatsecure() - Add dac_override capability to remote_login_t domain - Allow chrome_sandbox_t to mmap tmp files - Update ulogd SELinux security policy - Allow sysadm_u use xdm - Allow xdm_t domain to listen ofor unix dgram sockets BZ(1581495) - Add interface ssh_read_state() - Fix typo in sysnetwork.if file - Update dev_map_xserver_misc interface to allo mmaping char devices instead of files - Allow noatsecure permission for all domain transitions from systemd. - Allow systemd to read tangd db files - Fix typo in ssh.if file - Allow xdm_t domain to mmap xserver_misc_device_t files - Allow xdm_t domain to execute systemd-coredump binary - Add bridge_socket, dccp_socket, ib_socket and mpls_socket to socket_class_set - Improve modutils_domtrans_insmod() interface to mmap insmod_exec_t binaries - Improve iptables_domtrans() interface to allow mmaping iptables_exec_t binary - Improve auth_domtrans_login_programinterface to allow also mmap login_exec_t binaries - Improve auth_domtrans_chk_passwd() interface to allow also mmaping chkpwd_exec_t binaries. - Allow mmap dhcpc_exec_t binaries in sysnet_domtrans_dhcpc interface - Improve running xorg with proper SELinux domain even if systemd security feature NoNewPrivileges is used - Associate sysctl_vm_overcommit_t with fs_t - Allow systemd creating bluetooth sockets - Allow ssh client to read network sysctl BZ(1574170) - Allow systemd_resolved_t and systemd_networkd_t to read dbus pid files - Allow sysadm user to sys_ptrace cap_userns - Allow udev execute /usr/libexec/gdm-disable-wayland in xdm_t domain which allows create /run/gdm/custom.conf with proper xdm_var_run_t label. - Allow ssh client to read network state BZ(1574174) - Allow ssh basic client to read/write to tun tap devices BZ(1574184) - Allow ssh basic client to create tun sockets BZ(1574186) - Disable secure mode environment cleansing for dirsrv_t- Disable secure mode environment cleansing for dirsrv_t - - Allow udev execute /usr/libexec/gdm-disable-wayland in xdm_t domain which allows create /run/gdm/custom.conf with proper xdm_var_run_t label.- Add dac_override capability to remote_login_t domain - Allow chrome_sandbox_t to mmap tmp files - Update ulogd SELinux security policy - Allow rhsmcertd_t domain send signull to apache processes - Allow systemd socket activation for modemmanager - Allow geoclue to dbus chat with systemd - Fix file contexts on conntrackd policy - Temporary fix for varnish and apache adding capability for DAC_OVERRIDE - Allow lsmd_plugin_t domain to getattr lsm_t unix stream sockets - Add label for /usr/sbin/pacemaker-remoted to have cluster_exec_t - Allow nscd_t domain to be system dbusd client - Allow abrt_t domain to read sysctl - Add dac_read_search capability for tangd - Allow systemd socket activation for rshd domain - Add label for /usr/libexec/cyrus-imapd/master as cyrus_exec_t to have proper SELinux domain transition from init_t to cyrus_t - Allow kdump_t domain to map /boot files - Allow conntrackd_t domain to send msgs to syslog - Label /usr/sbin/nhrpd and /usr/sbin/pimd binaries as zebra_exec_t - Allow swnserve_t domain to stream connect to sasl domain - Allow smbcontrol_t to create dirs with samba_var_t label - Remove execstack,execmem and execheap from domains setroubleshootd_t, locate_t and podsleuth_t to increase security. BZ(1579760) - Allow tangd to read public sssd files BZ(1509054) - Allow geoclue start with nnp systemd security feature with proper SELinux Domain transition BZ(1575212) - Allow ctdb_t domain modify ctdb_exec_t files - Allow firewalld_t domain to create netlink_netfilter sockets - Allow radiusd_t domain to read network sysctls - Allow pegasus_t domain to mount tracefs_t filesystem - Allow psad_t domain to read all domains state - Allow tomcat_t domain to connect to mongod_t tcp port - Allow dovecot and postfix to connect to systemd stream sockets - Make nmbd_t domain dbus system client BZ(1569856) - Merge pull request #55 from SISheogorath/fix/tlp-policy - Merge pull request #54 from tmzullinger/rawhide - Allow also listing system_dbusd_var_run_t dirs in dbusd_read_pid_files macro BZ(1566168) - Allow gssproxy_t domain to read gssd_t state BZ(1572945) - Allow create systemd to mount pid files - Add files_map_boot_files() interface - Remove execstack,execmem and execheap from domain fsadm_t to increase security. BZ(1579760) - Fix typo xserver SELinux module - Allow systemd to mmap files with var_log_t label - Allow x_userdomains read/write to xserver session - Allow users staff and sysadm to run wireshark on own domain - Fix typos s/xserver/xdm/ for allow creating xserver misc devices - Allow systemd-bootchart to create own tmpfs files - Merge pull request #213 from tmzullinger/rawhide - Allow xdm_t domain to install Nouveau drivers BZ(1570996)- Allow unconfined_domain_type to create libs filetrans named content BZ(1513806)- Allow dnssec_trigger_t domain to read system network state BZ(1570205) - Add dac_override capability to mailman_mail_t domain - Add dac_override capability to radvd_t domain - Update openvswitch policy - Add dac_override capability to oddjob_homedir_t domain - Allow slapd_t domain to mmap slapd_var_run_t files - Rename tang policy to tangd - Allow virtd_t domain to relabel virt_var_lib_t files - Allow logrotate_t domain to stop services via systemd - Add tang policy - Allow mozilla_plugin_t to create mozilla.pdf file in user homedir with label mozilla_home_t - Allow snapperd_t daemon to create unlabeled dirs. - Make httpd_var_run_t mountpoint - Allow hsqldb_t domain to mmap own temp files - We have inconsistency in cgi templates with upstream, we use _content_t, but refpolicy use httpd__content_t. Created aliasses to make it consistence - Allow Openvswitch adding netdev bridge ovs 2.7.2.10 FDP - Add new Boolean tomcat_use_execmem - Allow nfsd_t domain to read/write sysctl fs files - Allow conman to read system state - Allow brltty_t domain to be dbusd system client - Allow zebra_t domain to bind on babel udp port - Allow freeipmi domain to read sysfs_t files - Allow targetd_t domain mmap lvm config files - Allow abrt_t domain to manage kdump crash files - gnome_data_filetrans macro should be in optional block - Allow netutils_t domain to create bluetooth sockets - Allow traceroute to bind on generic sctp node - Allow traceroute to search network sysctls - Allow systemd to use virtio console - Label /dev/op_panel and /dev/opal-prd as opal_device_t - Label /run/ebtables.lock as iptables_var_run_t - Allow udev_t domain to manage udev_rules_t char files. - Assign babel_port_t label to udp port 6696 - Add new interface lvm_map_config - Merge pull request #212 from stlaz/patch-1 - Allow local_login_t reads of udev_var_run_t context- Allow networkmanager domain to write to ecryptfs_t files BZ(1566706) - Allow l2tpd domain to stream connect to sssd BZ(1568160) - Dontaudit abrt_t to write to lib_t dirs BZ(1566784) - Allow NetworkManager_ssh_t domain transition to insmod_t BZ(1567630)- Allow certwatch to manage cert files BZ(1561418) - Allow abrt_dump_oops_t domain to mmap all non security files BZ(1565748) - Allow gpg_t domain mmap cert_t files Allow gpg_t mmap gpg_agent_t files - Allow NetworkManager_ssh_t domain use generic ptys. BZ(1565851) - Allow pppd_t domain read/write l2tpd pppox sockets BZ(1566096) - Allow xguest user use bluetooth sockets if xguest_use_bluetooth boolean is turned on. - Allow pppd_t domain creating pppox sockets BZ(1566271) - Allow abrt to map var_lib_t files - Allow chronyc to read system state BZ(1565217) - Allow keepalived_t domain to chat with systemd via dbus - Allow git to mmap git_(sys|user)_content_t files BZ(1518027) - removed boinc dev_getattr_*_dev - Allow iptables_t domain to create dirs in etc_t with system_conf_t labels - Allow x userdomain to mmap xserver_tmpfs_t files - Allow sysadm_t to mount tracefs_t - Allow unconfined user all perms under bpf class BZ(1565738) - Allow SELinux users (except guest and xguest) to using bluetooth sockets - Add new interface files_map_var_lib_files() - Allow user_t and staff_t domains create netlink tcpdiag sockets - Allow systemd-networkd to read sysctl_t files - Allow systemd_networkd_t to read/write tun tap devices - refpolicy: Update for kernel sctp support- Add new boolean redis_enable_notify() - Label /var/log/shibboleth-www(/.*) as httpd_sys_rw_content_t - Add new label for vmtools scripts and label it as vmtools_unconfined_t stored in /etc/vmware-tools/ - Allow svnserve_t domain to manage kerberos rcache and read krb5 keytab - Add dac_override and dac_read_search capability to hypervvssd_t domain - Label /usr/lib/systemd/systemd-fence_sanlockd as fenced_exec_t - Allow samba to create /tmp/host_0 as krb5_host_rcache_t - Add dac_override capability to fsdaemon_t BZ(1564143) - Allow abrt_t domain to map dos files BZ(1564193) - Add dac_override capability to automount_t domain - Allow keepalived_t domain to connect to system dbus bus - Allow nfsd_t to read nvme block devices BZ(1562554) - Allow lircd_t domain to execute bin_t files BZ(1562835) - Allow l2tpd_t domain to read sssd public files BZ(1563355) - Allow logrotate_t domain to do dac_override BZ(1539327) - Remove labeling for /etc/vmware-tools to bin_t it should be vmtools_unconfined_exec_t - Add capability sys_resource to systemd_sysctl_t domain - Label all /dev/rbd* devices as fixed_disk_device_t - Allow xdm_t domain to mmap xserver_log_t files BZ(1564469) - Allow local_login_t domain to rread udev db - Allow systemd_gpt_generator_t to read /dev/random device - add definition of bpf class and systemd perms- Allow accountsd_t domain to dac override BZ(1561304) - Allow cockpit_ws_t domain to read system state BZ(1561053) - Allow postfix_map_t domain to use inherited user ptys BZ(1561295) - Allow abrt_dump_oops_t domain dac override BZ(1561467) - Allow l2tpd_t domain to run stream connect for sssd_t BZ(1561755) - Allow crontab domains to do dac override - Allow snapperd_t domain to unmount fs_t filesystems - Allow pcp processes to read fixed_disk devices BZ(1560816) - Allow unconfined and confined users to use dccp sockets - Allow systemd to manage bpf dirs/files - Allow traceroute_t to create dccp_socketsFedora Atomic host using for temp files /sysroot/tmp patch, we should label same as /tmp adding file context equivalence BZ(1559531)- Allow smbcontrol_t to mmap samba_var_t files and allow winbind create sockets BZ(1559795) - Allow nagios to exec itself and mmap nagios spool files BZ(1559683) - Allow nagios to mmap nagios config files BZ(1559683) - Fixing Ganesha module - Fix typo in NetworkManager module - Fix bug in gssproxy SELinux module - Allow abrt_t domain to mmap container_file_t files BZ(1525573) - Allow networkmanager to be run ssh client BZ(1558441) - Allow pcp domains to do dc override BZ(1557913) - Dontaudit pcp_pmie_t to reaquest lost kernel module - Allow pcp_pmcd_t to manage unpriv userdomains semaphores BZ(1554955) - Allow httpd_t to read httpd_log_t dirs BZ(1554912) - Allow fail2ban_t to read system network state BZ(1557752) - Allow dac override capability to mandb_t domain BZ(1529399) - Allow collectd_t domain to mmap collectd_var_lib_t files BZ(1556681) - Dontaudit bug in kernel 4.16 when domains requesting loading kernel modules BZ(1555369) - Add Domain transition from gssproxy_t to httpd_t domains BZ(1548439) - Allow httpd_t to mmap user_home_type files if boolean httpd_read_user_content is enabled BZ(1555359) - Allow snapperd to relabel snapperd_data_t - Improve bluetooth_stream_socket interface to allow caller domain also send bluetooth sockets - Allow tcpd_t bind on sshd_port_t if ssh_use_tcpd() is enabled - Allow insmod_t to load modules BZ(1544189) - Allow systemd_rfkill_t domain sys_admin capability BZ(1557595) - Allow systemd_networkd_t to read/write tun tap devices - Add shell_exec_t file as domain entry for init_t - Label also /run/systemd/resolved/ as systemd_resolved_var_run_t BZ(1556862) - Dontaudit kernel 4.16 bug when lot of domains requesting load kernel module BZ(1557347) - Improve userdom_mmap_user_home_content_files - Allow systemd_logind_t domain to setattributes on fixed disk devices BZ(1555414) - Dontaudit kernel 4.16 bug when lot of domains requesting load kernel module - Allow semanage_t domain mmap usr_t files - Add new boolean: ssh_use_tcpd()- Improve bluetooth_stream_socket interface to allow caller domain also send bluetooth sockets - Allow tcpd_t bind on sshd_port_t if ssh_use_tcpd() is enabled - Allow semanage_t domain mmap usr_t files - Add new boolean: ssh_use_tcpd()- Update screen_role_template() to allow also creating sockets in HOMEDIR/screen/ - Allow newrole_t dacoverride capability - Allow traceroute_t domain to mmap packet sockets - Allow netutils_t domain to mmap usmmon device - Allow netutils_t domain to use mmap on packet_sockets - Allow traceroute to create icmp packets - Allos sysadm_t domain to create tipc sockets - Allow confined users to use new socket classes for bluetooth, alg and tcpdiag sockets- Allow rpcd_t domain dac override - Allow rpm domain to mmap rpm_var_lib_t files - Allow arpwatch domain to create bluetooth sockets - Allow secadm_t domain to mmap audit config and log files - Update init_abstract_socket_activation() to allow also creating tcp sockets - getty_t should be ranged in MLS. Then also local_login_t runs as ranged domain. - Add SELinux support for systemd-importd - Create new type bpf_t and label /sys/fs/bpf with this type- allow bluetooth_t domain to create alg_socket bz(1554410) - allow tor_t domain to execute bin_t files bz(1496274) - allow iscsid_t domain to mmap kernel modules bz(1553759) - update minidlna selinux policy bz(1554087) - allow motion_t domain to read sysfs_t files bz(1554142) - allow snapperd_t domain to getattr on all files,dirs,sockets,pipes bz(1551738) - allow l2tp_t domain to read ipsec config files bz(1545348) - allow colord_t to mmap home user files bz(1551033) - dontaudit httpd_t creating kobject uevent sockets bz(1552536) - allow ipmievd_t to mmap kernel modules bz(1552535) - allow boinc_t domain to read cgroup files bz(1468381) - backport allow rules from refpolicy upstream repo - allow gpg_t domain to bind on all unereserved udp ports - allow systemd to create systemd_rfkill_var_lib_t dirs bz(1502164) - allow netlabel_mgmt_t domain to read sssd public files, stream connect to sssd_t bz(1483655) - allow xdm_t domain to sys_ptrace bz(1554150) - allow application_domain_type also mmap inherited user temp files bz(1552765) - update ipsec_read_config() interface - fix broken sysadm selinux module - allow ipsec_t to search for bind cache bz(1542746) - allow staff_t to send sigkill to mount_t domain bz(1544272) - label /run/systemd/resolve/stub-resolv.conf as net_conf_t bz(1471545) - label ip6tables.init as iptables_exec_t bz(1551463) - allow hostname_t to use usb ttys bz(1542903) - add fsetid capability to updpwd_t domain bz(1543375) - allow systemd machined send signal to all domains bz(1372644) - dontaudit create netlink selinux sockets for unpriv selinux users bz(1547876) - allow sysadm_t to create netlink generic sockets bz(1547874) - allow passwd_t domain chroot - dontaudit confined unpriviliged users setuid capability- Allow l2tpd_t domain to create pppox sockets - Update dbus_system_bus_client() so calling domain could read also system_dbusd_var_lib_t link files BZ(1544251) - Add interface abrt_map_cache() - Update gnome_manage_home_config() to allow also map permission BZ(1544270) - Allow oddjob_mkhomedir_t domain to be dbus system client BZ(1551770) - Dontaudit kernel bug when several services requesting load kernel module - Allow traceroute and unconfined domains creating sctp sockets - Add interface corenet_sctp_bind_generic_node() - Allow ping_t domain to create icmp sockets - Allow staff_t to mmap abrt_var_cache_t BZ(1544273) - Fix typo bug in dev_map_framebuffer() interface BZ(1551842) - Dontaudit kernel bug when several services requesting load kernel module- Allow vdagent_t domain search cgroup dirs BZ(1541564) - Allow bluetooth_t domain listen on bluetooth sockets BZ(1549247) - Allow bluetooth domain creating bluetooth sockets BZ(1551577) - pki_log_t should be log_file - Allow gpgdomain to unix_stream socket connectto - Make working gpg agent in gpg_agent_t domain - Dontaudit thumb_t to rw lvm pipes BZ(154997) - Allow start cups_lpd via systemd socket activation BZ(1532015) - Improve screen_role_template Resolves: rhbz#1534111 - Dontaudit modemmanager to setpgid. BZ(1520482) - Dontaudit kernel bug when systemd requesting load kernel module BZ(1547227) - Allow systemd-networkd to create netlink generic sockets BZ(1551578) - refpolicy: Define getrlimit permission for class process - refpolicy: Define smc_socket security class - Allow transition from sysadm role into mdadm_t domain. - ssh_t trying to communicate with gpg agent not sshd_t - Allow sshd_t communicate with gpg_agent_t - Allow initrc domains to mmap binaries with direct_init_entry attribute BZ(1545643) - Revert "Allow systemd_rfkill_t domain to reguest kernel load module BZ(1543650)" - Revert "Allow systemd to request load kernel module BZ(1547227)" - Allow systemd to write to all pidfile socketes because of SocketActivation unit option ListenStream= BZ(1543576) - Add interface lvm_dontaudit_rw_pipes() BZ(154997) - Add interfaces for systemd socket activation - Allow systemd-resolved to create stub-resolv.conf with right label net_conf_t BZ(1547098)- refpolicy: Define extended_socket_class policy capability and socket classes - Make bluetooth_var_lib_t as mountpoint BZ(1547416) - Allow systemd to request load kernel module BZ(1547227) - Allow ipsec_t domain to read l2tpd pid files - Allow sysadm to read/write trace filesystem BZ(1547875) - Allow syslogd_t to mmap systemd coredump tmpfs files BZ(1547761)- Fix broken cups Security Module - Allow dnsmasq_t domain dbus chat with unconfined users. BZ(1532079) - Allow geoclue to connect to tcp nmea port BZ(1362118) - Allow pcp_pmcd_t to read mock lib files BZ(1536152) - Allow abrt_t domain to mmap passwd file BZ(1540666) - Allow gpsd_t domain to get session id of another process BZ(1540584) - Allow httpd_t domain to mmap httpd_tmpfs_t files BZ(1540405) - Allow cluster_t dbus chat with systemd BZ(1540163) - Add interface raid_stream_connect() - Allow nscd_t to mmap nscd_var_run_t files BZ(1536689) - Allow dovecot_delivery_t to mmap mail_home_rw_t files BZ(1531911) - Make cups_pdf_t domain system dbusd client BZ(1532043) - Allow logrotate to read auditd_log_t files BZ(1525017) - Improve snapperd SELinux policy BZ(1514272) - Allow virt_domain to read virt_image_t files BZ(1312572) - Allow openvswitch_t stream connect svirt_t - Update dbus_dontaudit_stream_connect_system_dbusd() interface - Allow openvswitch domain to manage svirt_tmp_t sock files - Allow named_filetrans_domain domains to create .heim_org.h5l.kcm-socket sock_file with label sssd_var_run_t BZ(1538210) - Merge pull request #50 from dodys/pkcs - Label tcp and udp ports 10110 as nmea_port_t BZ(1362118) - Allow systemd to access rfkill lib dirs BZ(1539733) - Allow systemd to mamange raid var_run_t sockfiles and files BZ(1379044) - Allow vxfs filesystem to use SELinux labels - Allow systemd to setattr on systemd_rfkill_var_lib_t dirs BZ(1512231) - Allow few services to dbus chat with snapperd BZ(1514272) - Allow systemd to relabel system unit symlink to systemd_unit_file_t. BZ(1535180) - Fix logging as staff_u into Fedora 27 - Fix broken systemd_tmpfiles_run() interface- Escape macros in %changelog- Label /usr/sbin/ldap-agent as dirsrv_snmp_exec_t - Allow certmonger_t domain to access /etc/pki/pki-tomcat BZ(1542600) - Allow keepalived_t domain getattr proc filesystem - Allow init_t to create UNIX sockets for unconfined services (BZ1543049) - Allow ipsec_mgmt_t execute ifconfig_exec_t binaries Allow ipsec_mgmt_t nnp domain transition to ifconfig_t - Allow ipsec_t nnp transistions to domains ipsec_mgmt_t and ifconfig_t- Allow openvswitch_t domain to read cpuid, write to sysfs files and creating openvswitch_tmp_t sockets - Add new interface ppp_filetrans_named_content() - Allow keepalived_t read sysctl_net_t files - Allow puppetmaster_t domtran to puppetagent_t - Allow kdump_t domain to read kernel ring buffer - Allow boinc_t to mmap boinc tmpfs files BZ(1540816) - Merge pull request #47 from masatake/keepalived-signal - Allow keepalived_t create and write a file under /tmp - Allow ipsec_t domain to exec ifconfig_exec_t binaries. - Allow unconfined_domain_typ to create pppd_lock_t directory in /var/lock - Allow updpwd_t domain to create files in /etc with shadow_t label- Allow opendnssec daemon to execute ods-signer BZ(1537971)- rpm: Label /usr/share/rpm usr_t (ostree/Atomic systems) - Update dbus_role_template() BZ(1536218) - Allow lldpad_t domain to mmap own tmpfs files BZ(1534119) - Allow blueman_t dbus chat with policykit_t BZ(1470501) - Expand virt_read_lib_files() interface to allow list dirs with label virt_var_lib_t BZ(1507110) - Allow postfix_master_t and postfix_local_t to connect to system dbus. BZ(1530275) - Allow system_munin_plugin_t domain to read sssd public files and allow stream connect to ssd daemon BZ(1528471) - Allow rkt_t domain to bind on rkt_port_t tcp BZ(1534636) - Allow jetty_t domain to mmap own temp files BZ(1534628) - Allow sslh_t domain to read sssd public files and stream connect to sssd. BZ(1534624) - Consistently label usr_t for kernel/initrd in /usr - kernel/files.fc: Label /usr/lib/sysimage as usr_t - Allow iptables sysctl load list support with SELinux enforced - Label HOME_DIR/.config/systemd/user/* user unit files as systemd_unit_file_t BZ(1531864)- Merge pull request #45 from jlebon/pr/rot-sd-dbus-rawhide - Allow virt_domains to acces infiniband pkeys. - Allow systemd to relabelfrom tmpfs_t link files in /var/run/systemd/units/ BZ(1535180) - Label /usr/libexec/ipsec/addconn as ipsec_exec_t to run this script as ipsec_t instead of init_t - Allow audisp_remote_t domain write to files on all levels- Allow aide to mmap usr_t files BZ(1534182) - Allow ypserv_t domain to connect to tcp ports BZ(1534245) - Allow vmtools_t domain creating vmware_log_t files - Allow openvswitch_t domain to acces infiniband devices - Allow dirsrv_t domain to create tmp link files - Allow pcp_pmie_t domain to exec itself. BZ(153326) - Update openvswitch SELinux module - Allow virtd_t to create also sock_files with label virt_var_run_t - Allow chronyc_t domain to manage chronyd_keys_t files. - Allow logwatch to exec journal binaries BZ(1403463) - Allow sysadm_t and staff_t roles to manage user systemd services BZ(1531864) - Update logging_read_all_logs to allow mmap all logfiles BZ(1403463) - Add Label systemd_unit_file_t for /var/run/systemd/units/- Removed big SELinux policy patches against tresys refpolicy and use tarballs from fedora-selinux github organisation- Use python3 package in BuildRequires to ensure python version 3 will be used for compiling SELinux policy- auth_use_nsswitch() interface cannot be used for attributes fixing munin policy - Allow git_script_t to mmap git_user_content_t files BZ(1530937) - Allow certmonger domain to create temp files BZ(1530795) - Improve interface mock_read_lib_files() to include also symlinks. BZ(1530563) - Allow fsdaemon_t to read nvme devices BZ(1530018) - Dontaudit fsdaemon_t to write to admin homedir. BZ(153030) - Update munin plugin policy BZ(1528471) - Allow sendmail_t domain to be system dbusd client BZ(1478735) - Allow amanda_t domain to getattr on tmpfs filesystem BZ(1527645) - Allow named file transition to create rpmrebuilddb dir with proper SELinux context BZ(1461313) - Dontaudit httpd_passwd_t domain to read state of systemd BZ(1522672) - Allow thumb_t to mmap non security files BZ(1517393) - Allow smbd_t to mmap files with label samba_share_t BZ(1530453) - Fix broken sysnet_filetrans_named_content() interface - Allow init_t to create tcp sockets for unconfined services BZ(1366968) - Allow xdm_t to getattr on xserver_t process files BZ(1506116) - Allow domains which can create resolv.conf file also create it in systemd_resolved_var_run_t dir BZ(1530297) - Allow X userdomains to send dgram msgs to xserver_t BZ(1515967) - Add interface files_map_non_security_files()- Make working SELinux sandbox with Wayland. BZ(1474082) - Allow postgrey_t domain to mmap postgrey_spool_t files BZ(1529169) - Allow dspam_t to mmap dspam_rw_content_t files BZ(1528723) - Allow collectd to connect to lmtp_port_t BZ(1304029) - Allow httpd_t to mmap httpd_squirrelmail_t files BZ(1528776) - Allow thumb_t to mmap removable_t files. BZ(1522724) - Allow sssd_t and login_pgm attribute to mmap auth_cache_t files BZ(1530118) - Add interface fs_mmap_removable_files()- Allow crond_t to read pcp lib files BZ(1525420) - Allow mozilla plugin domain to mmap user_home_t files BZ(1452783) - Allow certwatch_t to mmap generic certs. BZ(1527173) - Allow dspam_t to manage dspam_rw_conent_t objects. BZ(1290876) - Add interface userdom_map_user_home_files() - Sytemd introduced new feature when journald(syslogd_t) is trying to read symlinks to unit files in /run/systemd/units. This commit label /run/systemd/units/* as systemd_unit_file_t and allow syslogd_t to read this content. BZ(1527202) - Allow xdm_t dbus chat with modemmanager_t BZ(1526722) - All domains accessing home_cert_t objects should also mmap it. BZ(1519810)- Allow thumb_t domain to dosfs_t BZ(1517720) - Allow gssd_t to read realmd_var_lib_t files BZ(1521125) - Allow domain transition from logrotate_t to chronyc_t BZ(1436013) - Allow git_script_t to mmap git_sys_content_t BZ(1517541) - Label /usr/bin/mysqld_safe_helper as mysqld_exec_t instead of bin_t BZ(1464803) - Label /run/openvpn-server/ as openvpn_var_run_t BZ(1478642) - Allow colord_t to mmap xdm pid files BZ(1518382) - Allow arpwatch to mmap usbmon device BZ(152456) - Allow mandb_t to read public sssd files BZ(1514093) - Allow ypbind_t stream connect to rpcbind_t domain BZ(1508659) - Allow qpid to map files. - Allow plymouthd_t to mmap firamebuf device BZ(1517405) - Dontaudit pcp_pmlogger_t to sys_ptrace capability BZ(1416611) - Update mta_manage_spool() interface to allow caller domain also mmap mta_spool_t files BZ(1517449) - Allow antivirus_t domain to mmap antivirus_db_t files BZ(1516816) - Allow cups_pdf_t domain to read cupd_etc_t dirs BZ(1516282) - Allow openvpn_t domain to relabel networkmanager tun device BZ(1436048) - Allow mysqld_t to mmap mysqld_tmp_t files BZ(1516899) - Update samba_manage_var_files() interface by adding map permission. BZ(1517125) - Allow pcp_pmlogger_t domain to execute itself. BZ(1517395) - Dontaudit sys_ptrace capability for mdadm_t BZ(1515849) - Allow pulseaudio_t domain to mmap pulseaudio_home_t files BZ(1515956) - Allow bugzilla_script_t domain to create netlink route sockets and udp sockets BZ(1427019) - Add interface fs_map_dos_files() - Update interface userdom_manage_user_home_content_files() to allow caller domain to mmap user_home_t files. BZ(1519729) - Add interface xserver_map_xdm_pid() BZ(1518382) - Add new interface dev_map_usbmon_dev() BZ(1524256) - Update miscfiles_read_fonts() interface to allow also mmap fonts_cache_t for caller domains BZ(1521137) - Allow ipsec_t to mmap cert_t and home_cert_t files BZ(1519810) - Fix typo in filesystem.if - Add interface dev_map_framebuffer() - Allow chkpwd command to mmap /etc/shadow BZ(1513704) - Fix systemd-resolved to run properly with SELinux in enforcing state BZ(1517529) - Allow thumb_t domain to mmap fusefs_t files BZ(1517517) - Allow userdom_home_reader_type attribute to mmap cifs_t files BZ(1517125) - Add interface fs_map_cifs_files() - Merge pull request #207 from rhatdan/labels - Merge pull request #208 from rhatdan/logdir - Allow domains that manage logfiles to man logdirs- Make ganesha nfs server- Add interface raid_relabel_mdadm_var_run_content() - Fix iscsi SELinux module - Allow spamc_t domain to read home mail content BZ(1414366) - Allow sendmail_t to list postfix config dirs BZ(1514868) - Allow dovecot_t domain to mmap mail content in homedirs BZ(1513153) - Allow iscsid_t domain to requesting loading kernel modules BZ(1448877) - Allow svirt_t domain to mmap svirt_tmpfs_t files BZ(1515304) - Allow cupsd_t domain to localization BZ(1514350) - Allow antivirus_t nnp domain transition because of systemd security features. BZ(1514451) - Allow tlp_t domain transition to systemd_rfkill_t domain BZ(1416301) - Allow abrt_t domain to mmap fusefs_t files BZ(1515169) - Allow memcached_t domain nnp_transition becuase of systemd security features BZ(1514867) - Allow httpd_t domain to mmap all httpd content type BZ(1514866) - Allow mandb_t to read /etc/passwd BZ(1514903) - Allow mandb_t domain to mmap files with label mandb_cache_t BZ(1514093) - Allow abrt_t domain to mmap files with label syslogd_var_run_t BZ(1514975) - Allow nnp transition for systemd-networkd daemon to run in proper SELinux domain BZ(1507263) - Allow systemd to read/write to mount_var_run_t files BZ(1515373) - Allow systemd to relabel mdadm_var_run_t sock files BZ(1515373) - Allow home managers to mmap nfs_t files BZ(1514372) - Add interface fs_mmap_nfs_files() - Allow systemd-mount to create new directory for mountpoint BZ(1514880) - Allow getty to use usbttys - Add interface systemd_rfkill_domtrans() - Allow syslogd_t to mmap files with label syslogd_var_lib_t BZ(1513403) - Add interface fs_mmap_fusefs_files() - Allow ipsec_t domain to mmap files with label ipsec_key_file_t BZ(1514251)- Allow pcp_pmlogger to send logs to journal BZ(1512367) - Merge pull request #40 from lslebodn/kcm_kerberos - Allow services to use kerberos KCM BZ(1512128) - Allow system_mail_t domain to be system_dbus_client BZ(1512476) - Allow aide domain to stream connect to sssd_t BZ(1512500) - Allow squid_t domain to mmap files with label squid_tmpfs_t BZ(1498809) - Allow nsd_t domain to mmap files with labels nsd_tmp_t and nsd_zone_t BZ(1511269) - Include cupsd_config_t domain into cups_execmem boolean. BZ(1417584) - Allow samba_net_t domain to mmap samba_var_t files BZ(1512227) - Allow lircd_t domain to execute shell BZ(1512787) - Allow thumb_t domain to setattr on cache_home_t dirs BZ(1487814) - Allow redis to creating tmp files with own label BZ(1513518) - Create new interface thumb_nnp_domtrans allowing domaintransition with NoNewPrivs. This interface added to thumb_run() BZ(1509502) - Allow httpd_t to mmap httpd_tmp_t files BZ(1502303) - Add map permission to samba_rw_var_files interface. BZ(1513908) - Allow cluster_t domain creating bundles directory with label var_log_t instead of cluster_var_log_t - Add dac_read_search and dac_override capabilities to ganesha - Allow ldap_t domain to manage also slapd_tmp_t lnk files - Allow snapperd_t domain to relabeling from snapperd_data_t BZ(1510584) - Add dac_override capability to dhcpd_t doamin BZ(1510030) - Allow snapperd_t to remove old snaps BZ(1510862) - Allow chkpwd_t domain to mmap system_db_t files and be dbus system client BZ(1513704) - Allow xdm_t send signull to all xserver unconfined types BZ(1499390) - Allow fs associate for sysctl_vm_t BZ(1447301) - Label /etc/init.d/vboxdrv as bin_t to run virtualbox as unconfined_service_t BZ(1451479) - Allow xdm_t domain to read usermodehelper_t state BZ(1412609) - Allow dhcpc_t domain to stream connect to userdomain domains BZ(1511948) - Allow systemd to mmap kernel modules BZ(1513399) - Allow userdomains to mmap fifo_files BZ(1512242) - Merge pull request #205 from rhatdan/labels - Add map permission to init_domtrans() interface BZ(1513832) - Allow xdm_t domain to mmap and execute files in xdm_var_run_t BZ(1513883) - Unconfined domains, need to create content with the correct labels - Container runtimes are running iptables within a different user namespace - Add interface files_rmdir_all_dirs()- Allow jabber domains to connect to postgresql ports - Dontaudit slapd_t to block suspend system - Allow spamc_t to stream connect to cyrys. - Allow passenger to connect to mysqld_port_t - Allow ipmievd to use nsswitch - Allow chronyc_t domain to use user_ptys - Label all files /var/log/opensm.* as opensm_log_t because opensm creating new log files with name opensm-subnet.lst - Fix typo bug in tlp module - Allow userdomain gkeyringd domain to create stream socket with userdomain- Merge pull request #37 from milosmalik/rawhide - Allow mozilla_plugin_t domain to dbus chat with devicekit - Dontaudit leaked logwatch pipes - Label /usr/bin/VGAuthService as vmtools_exec_t to confine this daemon. - Allow httpd_t domain to execute hugetlbfs_t files BZ(1444546) - Allow chronyd daemon to execute chronyc. BZ(1507478) - Allow pdns to read network system state BZ(1507244) - Allow gssproxy to read network system state Resolves: rhbz#1507191 - Allow nfsd_t domain to read configfs_t files/dirs - Allow tgtd_t domain to read generic certs - Allow ptp4l to send msgs via dgram socket to unprivileged user domains - Allow dirsrv_snmp_t to use inherited user ptys and read system state - Allow glusterd_t domain to create own tmpfs dirs/files - Allow keepalived stream connect to snmp- Allow zabbix_t domain to change its resource limits - Add new boolean nagios_use_nfs - Allow system_mail_t to search network sysctls - Hide all allow rules with ptrace inside deny_ptrace boolean - Allow nagios_script_t to read nagios_spool_t files - Allow sbd_t to create own sbd_tmpfs_t dirs/files - Allow firewalld and networkmanager to chat with hypervkvp via dbus - Allow dmidecode to read rhsmcert_log_t files - Allow mail system to connect mariadb sockets. - Allow nmbd_t domain to mmap files labeled as samba_var_t. BZ(1505877) - Make user account setup in gnome-initial-setup working in Workstation Live system. BZ(1499170) - Allow iptables_t to run setfiles to restore context on system - Updatre unconfined_dontaudit_read_state() interface to dontaudit also acess to files. BZ(1503466)- Label /usr/libexec/bluetooth/obexd as bluetoothd_exec_t to run process as bluetooth_t - Allow chronyd_t do request kernel module and block_suspend capability - Allow system_cronjob_t to create /var/lib/letsencrypt dir with right label - Allow slapd_t domain to mmap files labeled as slpad_db_t BZ(1505414) - Allow dnssec_trigger_t domain to execute binaries with dnssec_trigeer_exec_t BZ(1487912) - Allow l2tpd_t domain to send SIGKILL to ipsec_mgmt_t domains BZ(1505220) - Allow thumb_t creating thumb_home_t files in user_home_dir_t direcotry BZ(1474110) - Allow httpd_t also read httpd_user_content_type dirs when httpd_enable_homedirs is enables - Allow svnserve to use kerberos - Allow conman to use ptmx. Add conman_use_nfs boolean - Allow nnp transition for amavis and tmpreaper SELinux domains - Allow chronyd_t to mmap chronyc_exec_t binary files - Add dac_read_search capability to openvswitch_t domain - Allow svnserve to manage own svnserve_log_t files/dirs - Allow keepalived_t to search network sysctls - Allow puppetagent_t domain dbus chat with rhsmcertd_t domain - Add kill capability to openvswitch_t domain - Label also compressed logs in /var/log for different services - Allow inetd_child_t and system_cronjob_t to run chronyc. - Allow chrony to create netlink route sockets - Add SELinux support for chronyc - Add support for running certbot(letsencrypt) in crontab - Allow nnp trasintion for unconfined_service_t - Allow unpriv user domains and unconfined_service_t to use chronyc- Drop *.lst files from file list - Ship file_contexts.homedirs in store - Allow proper transition when systems starting pdns to pdns_t domain. BZ(1305522) - Allow haproxy daemon to reexec itself. BZ(1447800) - Allow conmand to use usb ttys. - Allow systemd_machined to read mock lib files. BZ(1504493) - Allow systemd_resolved_t to dbusd chat with NetworkManager_t BZ(1505081)- Fix typo in virt file contexts file - allow ipa_dnskey_t to read /proc/net/unix file - Allow openvswitch to run setfiles in setfiles_t domain. - Allow openvswitch_t domain to read process data of neutron_t domains - Fix typo in ipa_cert_filetrans_named_content() interface - Fix typo bug in summary of xguest SELinux module - Allow virtual machine with svirt_t label to stream connect to openvswitch. - Label qemu-pr-helper script as virt_exec_t so this script won't run as unconfined_service_t- Merge pull request #19 from RodrigoQuesadaDev/snapper-fix-1 - Allow httpd_t domain to mmap httpd_user_content_t files. BZ(1494852) - Add nnp transition rule for services using NoNewPrivileges systemd feature - Add map permission into dev_rw_infiniband_dev() interface to allow caller domain mmap infiniband chr device BZ(1500923) - Add init_nnp_daemon_domain interface - Allow nnp transition capability - Merge pull request #204 from konradwilk/rhbz1484908 - Label postgresql-check-db-dir as postgresql_exec_t- Allow boinc_t to mmap files with label boinc_project_var_lib_t BZ(1500088) - Allow fail2ban_t domain to mmap journals. BZ(1500089) - Add dac_override to abrt_t domain BZ(1499860) - Allow pppd domain to mmap own pid files BZ(1498587) - Allow webserver services to mmap files with label httpd_sys_content_t BZ(1498451) - Allow tlp domain to read sssd public files Allow tlp domain to mmap kernel modules - Allow systemd to read sysfs sym links. BZ(1499327) - Allow systemd to mmap systemd_networkd_exec_t files BZ(1499863) - Make systemd_networkd_var_run as mountpoint BZ(1499862) - Allow noatsecure for java-based unconfined services. BZ(1358476) - Allow systemd_modules_load_t domain to mmap kernel modules. BZ(1490015)- Allow cloud-init to create content in /var/run/cloud-init - Dontaudit VM to read gnome-boxes process data BZ(1415975) - Allow winbind_t domain mmap samba_var_t files - Allow cupsd_t to execute ld_so_cache_t BZ(1478602) - Update dev_rw_xserver_misc() interface to allo source domains to mmap xserver devices BZ(1334035) - Add dac_override capability to groupadd_t domain BZ(1497091) - Allow unconfined_service_t to start containers- Drop policyhelp utility BZ(1498429)- Allow cupsd_t to execute ld_so_cache_t BZ(1478602) - Allow firewalld_t domain to change object identity because of relabeling after using firewall-cmd BZ(1469806) - Allow postfix_cleanup_t domain to stream connect to all milter sockets BZ(1436026) - Allow nsswitch_domain to read virt_var_lib_t files, because of libvirt NSS plugin. BZ(1487531) - Add unix_stream_socket recvfrom perm for init_t domain BZ(1496318) - Allow systemd to maange sysfs BZ(1471361)- Switch default value of SELinux boolean httpd_graceful_shutdown to off.- Allow virtlogd_t domain to write inhibit systemd pipes. - Add dac_override capability to openvpn_t domain - Add dac_override capability to xdm_t domain - Allow dac_override to groupadd_t domain BZ(1497081) - Allow cloud-init to create /var/run/cloud-init dir with net_conf_t SELinux label.BZ(1489166)- Allow tlp_t domain stream connect to sssd_t domain - Add missing dac_override capability - Add systemd_tmpfiles_t dac_override capability- Remove all unnecessary dac_override capability in SELinux modules- Allow init noatsecure httpd_t - Allow mysqld_t domain to mmap mysqld db files. BZ(1483331) - Allow unconfined_t domain to create new users with proper SELinux lables - Allow init noatsecure httpd_t - Label tcp port 3269 as ldap_port_t- Add new boolean tomcat_read_rpm_db() - Allow tomcat to connect on mysqld tcp ports - Add new interface apache_delete_tmp() - Add interface fprintd_exec() - Add interface fprintd_mounton_var_lib() - Allow mozilla plugin to mmap video devices BZ(1492580) - Add ctdbd_t domain sys_source capability and allow setrlimit - Allow systemd-logind to use ypbind - Allow systemd to remove apache tmp files - Allow ldconfig domain to mmap ldconfig cache files - Allow systemd to exec fprintd BZ(1491808) - Allow systemd to mounton fprintd lib dir- Allow svirt_t read userdomain state- Allow mozilla_plugins_t domain mmap mozilla_plugin_tmpfs_t files - Allow automount domain to manage mount pid files - Allow stunnel_t domain setsched - Add keepalived domain setpgid capability - Merge pull request #24 from teg/rawhide - Merge pull request #28 from lslebodn/revert_1e8403055 - Allow sysctl_irq_t assciate with proc_t - Enable cgourp sec labeling - Allow sshd_t domain to send signull to xdm_t processes- Allow passwd_t domain mmap /etc/shadow and /etc/passwd - Allow pulseaudio_t domain to map user tmp files - Allow mozilla plugin to mmap mozilla tmpfs files- Add new bunch of map rules - Merge pull request #25 from NetworkManager/nm-ovs - Make working webadm_t userdomain - Allow redis domain to execute shell scripts. - Allow system_cronjob_t to create redhat-access-insights.log with var_log_t - Add couple capabilities to keepalived domain and allow get attributes of all domains - Allow dmidecode read rhsmcertd lock files - Add new interface rhsmcertd_rw_lock_files() - Add new bunch of map rules - Merge pull request #199 from mscherer/add_conntrackd - Add support labeling for vmci and vsock device - Add userdom_dontaudit_manage_admin_files() interface- Allow domains reading raw memory also use mmap.- Add rules fixing installing ipa-server-install with SELinux in Enforcing. BZ(1488404) - Fix denials during ipa-server-install process on F27+ - Allow httpd_t to mmap cert_t - Add few rules to make tlp_t domain working in enforcing mode - Allow cloud_init_t to dbus chat with systemd_timedated_t - Allow logrotate_t to write to kmsg - Add capability kill to rhsmcertd_t - Allow winbind to manage smbd_tmp_t files - Allow groupadd_t domain to dbus chat with systemd.BZ(1488404) - Add interface miscfiles_map_generic_certs()- Allow abrt_dump_oops_t to read sssd_public_t files - Allow cockpit_ws_t to mmap usr_t files - Allow systemd to read/write dri devices.- Add couple rules related to map permissions - Allow ddclient use nsswitch BZ(1456241) - Allow thumb_t domain getattr fixed_disk device. BZ(1379137) - Add interface dbus_manage_session_tmp_dirs() - Dontaudit useradd_t sys_ptrace BZ(1480121) - Allow ipsec_t can exec ipsec_exec_t - Allow systemd_logind_t to mamange session_dbusd_tmp_t dirs- Allow cupsd_t to execute ld_so_cache - Add cgroup_seclabel policycap. - Allow xdm_t to read systemd hwdb - Add new interface systemd_hwdb_mmap_config() - Allow auditd_t domain to mmap conf files labeled as auditd_etc_t BZ(1485050)- Allow couple map rules- Make confined users working - Allow ipmievd_t domain to load kernel modules - Allow logrotate to reload transient systemd unit- Allow postgrey to execute bin_t files and add postgrey into nsswitch_domain - Allow nscd_t domain to search network sysctls - Allow iscsid_t domain to read mount pid files - Allow ksmtuned_t domain manage sysfs_t files/dirs - Allow keepalived_t domain domtrans into iptables_t - Allow rshd_t domain reads net sysctls - Allow systemd to create syslog netlink audit socket - Allow ifconfig_t domain unmount fs_t - Label /dev/gpiochip* devices as gpio_device_t- Allow dirsrv_t domain use mmap on files labeled as dirsrv_var_run_t BZ(1483170) - Allow just map permission insead of using mmap_file_pattern because mmap_files_pattern allows also executing objects. - Label /var/run/agetty.reload as getty_var_run_t - Add missing filecontext for sln binary - Allow systemd to read/write to event_device_t BZ(1471401)- Allow sssd_t domain to map sssd_var_lib_t files - allow map permission where needed - contrib: allow map permission where needed - Allow syslogd_t to map syslogd_var_run_t files - allow map permission where needed- Allow tomcat_t domain couple capabilities to make working tomcat-jsvc - Label /usr/libexec/sudo/sesh as shell_exec_t- refpolicy: Infiniband pkeys and endport- Allow osad make executable an anonymous mapping or private file mapping that is writable BZ(1425524) - After fix in kernel where LSM hooks for dac_override and dac_search_read capability was swaped we need to fix it also in policy - refpolicy: Define and allow map permission - init: Add NoNewPerms support for systemd. - Add nnp_nosuid_transition policycap and related class/perm definitions.- Update for SELinux userspace release 20170804 / 2.7 - Omit precompiled regular expressions from file_contexts.bin files- After fix in kernel where LSM hooks for dac_override and dac_search_read capability was swaped we need to fix it also in policy- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Allow llpdad send dgram to libvirt - Allow abrt_t domain dac_read_search capability - Allow init_t domain mounton dirs labeled as init_var_lib_t BZ(1471476) - Allow xdm_t domain read unique machine-id generated during system installation. BZ(1467036) - Dontaudit xdm_t to setattr lib_t dirs. BZ(#1458518)- Dontaudit xdm_t to setattr lib_t dirs. BZ(#1458518)- Add new boolean gluster_use_execmem- Allow cluster_t and glusterd_t domains to dbus chat with ganesha service - Allow iptables to read container runtime files- Allow boinc_t nsswitch - Dontaudit firewalld to write to lib_t dirs - Allow modemmanager_t domain to write to raw_ip file labeled as sysfs_t - Allow thumb_t domain to allow create dgram sockets - Disable mysqld_safe_t secure mode environment cleansing - Allow couple rules needed to start targetd daemon with SELinux in enforcing mode - Allow dirsrv domain setrlimit - Dontaudit staff_t user read admin_home_t files. - Add interface lvm_manage_metadata - Add permission open to files_read_inherited_tmp_files() interface- Allow sssd_t to read realmd lib files. - Fix init interface file. init_var_run_t is type not attribute- Allow rpcbind_t to execute systemd_tmpfiles_exec_t binary files. - Merge branch 'rawhide' of github.com:wrabcak/selinux-policy-contrib into rawhide - Allow qemu to authenticate SPICE connections with SASL GSSAPI when SSSD is in use - Fix dbus_dontaudit_stream_connect_system_dbusd() interface to require TYPE rather than ATTRIBUTE for systemd_dbusd_t. - Allow httpd_t to read realmd_var_lib_t files - Allow unconfined_t user all user namespace capabilties. - Add interface systemd_tmpfiles_exec() - Add interface libs_dontaudit_setattr_lib_files() - Dontaudit xdm_t domain to setattr on lib_t dirs - Allow sysadm_r role to jump into dirsrv_t- Merge pull request #10 from mscherer/fix_tor_dac - Merge pull request #9 from rhatdan/rawhide - Merge pull request #13 from vinzent/allow_zabbix_t_to_kill_zabbix_script_t - Allow kdumpgui to read removable disk device - Allow systemd_dbusd_t domain read/write to nvme devices - Allow udisks2 domain to read removable devices BZ(1443981) - Allow virtlogd_t to execute itself - Allow keepalived to read/write usermodehelper state - Allow named_t to bind on udp 4321 port - Fix interface tlp_manage_pid_files() - Allow collectd domain read lvm config files. BZ(1459097) - Merge branch 'rawhide' of github.com:wrabcak/selinux-policy-contrib into rawhide - Allow samba_manage_home_dirs boolean to manage user content - Merge pull request #14 from lemenkov/rabbitmq_systemd_notify - Allow pki_tomcat_t execute ldconfig. - Merge pull request #191 from rhatdan/udev - Allow systemd_modules_load_t to load modules- Allow keepalived domain connect to squid tcp port - Allow krb5kdc_t domain read realmd lib files. - Allow tomcat to connect on all unreserved ports - Allow keepalived domain connect to squid tcp port - Allow krb5kdc_t domain read realmd lib files. - Allow tomcat to connect on all unreserved ports - Allow ganesha to connect to all rpc ports - Update ganesha with few allow rules - Update rpc_read_nfs_state_data() interface to allow read also lnk_files. - virt_use_glusterd boolean should be in optional block - Add new boolean virt_use_glusterd - Add capability sys_boot for sbd_t domain Allow sbd_t domain to create rpc sysctls. - Allow ganesha_t domain to manage glusterd_var_run_t pid files. - Create new interface: glusterd_read_lib_files() Allow ganesha read glusterd lib files. Allow ganesha read network sysctls - Add few allow rules to ganesha module - Allow condor_master_t to read sysctls. - Add dac_override cap to ctdbd_t domain - Add ganesha_use_fusefs boolean. - Allow httpd_t reading kerberos kdc config files - Allow tomcat_t domain connect to ibm_dt_2 tcp port. - Allow stream connect to initrc_t domains - Add pki_exec_common_files() interface - Allow dnsmasq_t domain to read systemd-resolved pid files. - Allow tomcat domain name_bind on tcp bctp_port_t - Allow smbd_t domain generate debugging files under /var/run/gluster. These files are created through the libgfapi.so library that provides integration of a GlusterFS client in the Samba (vfs_glusterfs) process. - Allow condor_master_t write to sysctl_net_t - Allow nagios check disk plugin read /sys/kernel/config/ - Allow pcp_pmie_t domain execute systemctl binary - Allow nagios to connect to stream sockets. Allow nagios start httpd via systemctl - xdm_t should view kernel keys - Hide broken symptoms when machine is configured with network bounding. - Label 8750 tcp/udp port as dey_keyneg_port_t - Label tcp/udp port 1792 as ibm_dt_2_port_t - Add interface fs_read_configfs_dirs() - Add interface fs_read_configfs_files() - Fix systemd_resolved_read_pid interface - Add interface systemd_resolved_read_pid() - Allow sshd_net_t domain read/write into crypto devices - Label 8999 tcp/udp as bctp_port_t- Dontaudit net_admin capability for domains postfix_master_t and postfix_qmgr_t - Add interface pki_manage_common_files() - Allow rngd domain read sysfs_t - Allow tomcat_t domain to manage pki_common_t files and dirs - Merge pull request #3 from rhatdan/devicekit - Merge pull request #12 from lslebodn/sssd_sockets_fc - Allow certmonger reads httpd_config_t files - Allow keepalived_t domain creating netlink_netfilter_socket. - Use stricter fc rules for sssd sockets in /var/run - Allow tomcat domain read rpm_var_lib_t files Allow tomcat domain exec rpm_exec_t files Allow tomcat domain name connect on oracle_port_t Allow tomcat domain read cobbler_var_lib_t files. - Allow sssd_t domain creating sock files labeled as sssd_var_run_t in /var/run/ - Allow svirt_t to read raw fixed_disk_device_t to make working blockcommit - ejabberd small fixes - Update targetd policy to accommodate changes in the service - Allow tomcat_domain connect to * postgresql_port_t * amqp_port_t Allow tomcat_domain read network sysctls - Allow virt_domain to read raw fixed_disk_device_t to make working blockcommit - Dontaudit net_admin capability for useradd_t domain - Allow systemd_localed_t and systemd_timedated_t create files in /etc with label locate_t BZ(1443723) - Make able deply overcloud via neutron_t to label nsfs as fs_t - Add fs_manage_configfs_lnk_files() interface- Allow svirt_t to read raw fixed_disk_device_t to make working blockcommit - ejabberd small fixes - Update targetd policy to accommodate changes in the service - Allow tomcat_domain connect to * postgresql_port_t * amqp_port_t Allow tomcat_domain read network sysctls - Allow virt_domain to read raw fixed_disk_device_t to make working blockcommit - Allow glusterd_t domain start ganesha service - Made few cosmetic changes in sssd SELinux module - Merge pull request #11 from lslebodn/sssd_kcm - Update virt_rw_stream_sockets_svirt() interface to allow confined users set socket options. - Allow keepalived_t domain read usermodehelper_t - Allow radius domain stream connec to postgresql - Merge pull request #8 from bowlofeggs/142-rawhide - Add fs_manage_configfs_lnk_files() interface- auth_use_nsswitch can call only domain not attribute - Dontaudit net_admin cap for winbind_t - Allow tlp_t domain to stream connect to system bus - Allow tomcat_t domain read pki_common_t files - Add interface pki_read_common_files() - Fix broken cermonger module - Fix broken apache module - Allow hypervkvp_t domain execute hostname - Dontaudit sssd_selinux_manager_t use of net_admin capability - Allow tomcat_t stream connect to pki_common_t - Dontaudit xguest_t's attempts to listen to its tcp_socket - Allow sssd_selinux_manager_t to ioctl init_t sockets - Improve ipa_cert_filetrans_named_content() interface to also allow caller domain manage ipa_cert_t type. - Allow pki_tomcat_t domain read /etc/passwd. - Allow tomcat_t domain read ipa_tmp_t files - Label new path for ipa-otpd - Allow radiusd_t domain stream connect to postgresql_t - Allow rhsmcertd_t to execute hostname_exec_t binaries. - Allow virtlogd to append nfs_t files when virt_use_nfs=1 - Allow httpd_t domain read also httpd_user_content_type lnk_files. - Allow httpd_t domain create /etc/httpd/alias/ipaseesion.key with label ipa_cert_t - Dontaudit _gkeyringd_t stream connect to system_dbusd_t - Label /var/www/html/nextcloud/data as httpd_sys_rw_content_t - Add interface ipa_filetrans_named_content() - Allow tomcat use nsswitch - Allow certmonger_t start/status generic services - Allow dirsrv read cgroup files. - Allow ganesha_t domain read/write infiniband devices. - Allow sendmail_t domain sysctl_net_t files - Allow targetd_t domain read network state and getattr on loop_control_device_t - Allow condor_schedd_t domain send mails. - Allow ntpd to creating sockets. BZ(1434395) - Alow certmonger to create own systemd unit files. - Add kill namespace capability to xdm_t domain - Revert "su using libselinux and creating netlink_selinux socket is needed to allow libselinux initialization." - Revert "Allow _su_t to create netlink_selinux_socket" - Allow _su_t to create netlink_selinux_socket - Allow unconfined_t to module_load any file - Allow staff to systemctl virt server when staff_use_svirt=1 - Allow unconfined_t create /tmp/ca.p12 file with ipa_tmp_t context - Allow netutils setpcap capability - Dontaudit leaked file descriptor happening in setfiles_t domain BZ(1388124)- fix #1380325, selinux-policy-sandbox always removing sandbox module on upgrade- Fix abrt module to reflect all changes in abrt release- Allow tlp_t domain to ioctl removable devices BZ(1436830) - Allow tlp_t domain domtrans into mount_t BZ(1442571) - Allow lircd_t to read/write to sysfs BZ(1442443) - Fix policy to reflect all changes in new IPA release - Allow virtlogd_t to creating tmp files with virt_tmp_t labels. - Allow sbd_t to read/write fixed disk devices - Add sys_ptrace capability to radiusd_t domain - Allow cockpit_session_t domain connects to ssh tcp ports. - Update tomcat policy to make working ipa install process - Allow pcp_pmcd_t net_admin capability. Allow pcp_pmcd_t read net sysctls Allow system_cronjob_t create /var/run/pcp with pcp_var_run_t - Fix all AVC denials during pkispawn of CA Resolves: rhbz#1436383 - Update pki interfaces and tomcat module - Allow sendmail to search network sysctls - Add interface gssd_noatsecure() - Add interface gssproxy_noatsecure() - Allow chronyd_t net_admin capability to allow support HW timestamping. - Update tomcat policy. - Allow certmonger to start haproxy service - Fix init Module - Make groupadd_t domain as system bus client BZ(1416963) - Make useradd_t domain as system bus client BZ(1442572) - Allow xdm_t to gettattr /dev/loop-control device BZ(1385090) - Dontaudit gdm-session-worker to view key unknown. BZ(1433191) - Allow init noatsecure for gssd and gssproxy - Allow staff user to read fwupd_cache_t files - Remove typo bugs - Remove /proc <> from fedora policy, it's no longer necessary- Merge pull request #4 from lslebodn/sssd_socket_activated - Remove /proc <> from fedora policy, it's no longer necessary - Allow iptables get list of kernel modules - Allow unconfined_domain_type to enable/disable transient unit - Add interfaces init_enable_transient_unit() and init_disable_transient_unit - Revert "Allow sshd setcap capability. This is needed due to latest changes in sshd" - Label sysroot dir under ostree as root_t- Put tomcat_t back in unconfined domains for now. BZ(1436434)- Make fwupd_var_lib_t type mountpoint. BZ(1429341) - Remove tomcat_t domain from unconfined domains - Create new boolean: sanlock_enable_home_dirs() - Allow mdadm_t domain to read/write nvme_device_t - Remove httpd_user_*_content_t domains from user_home_type attribute. This tighten httpd policy and acces to user data will be more strinct, and also fix mutual influente between httpd_enable_homedirs and httpd_read_user_content - Add interface dev_rw_nvme - Label all files containing hostname substring in /etc/ created by systemd_hostnamed_t as hostname_etc_t. BZ(1433555)- Label all files containing hostname substring in /etc/ created by systemd_hostnamed_t as hostname_etc_t. BZ(1433555)- Allow vdagent domain to getattr cgroup filesystem - Allow abrt_dump_oops_t stream connect to sssd_t domain - Allow cyrus stream connect to gssproxy - Label /usr/libexec/cockpit-ssh as cockpit_session_exec_t and allow few rules - Allow colord_t to read systemd hwdb.bin file - Allow dirsrv_t to create /var/lock/dirsrv labeled as dirsrc_var_lock_t - Allow certmonger to manage /etc/krb5kdc_conf_t - Allow kdumpctl to getenforce - Allow ptp4l wake_alarm capability - Allow ganesha to chat with unconfined domains via dbus - Add nmbd_t capability2 block_suspend - Add domain transition from sosreport_t to iptables_t - Dontaudit init_t to mounton modules_object_t - Add interface files_dontaudit_mounton_modules_object - Allow xdm_t to execute files labeled as xdm_var_lib_t - Make mtrr_device_t mountpoint. - Fix path to /usr/lib64/erlang/erts-5.10.4/bin/epmd- Update fwupd policy - /usr/libexec/udisks2/udisksd should be labeled as devicekit_disk_exec_t - Update ganesha policy - Allow chronyd to read adjtime - Merge pull request #194 from hogarthj/certbot_policy - get the correct cert_t context on certbot certificates bz#1289778 - Label /dev/ss0 as gpfs_device_t- Allow abrt_t to send mails.- Add radius_use_jit boolean - Allow nfsd_t domain to create sysctls_rpc_t files - add the policy required for nextcloud - Allow can_load_kernmodule to load kernel modules. BZ(1426741) - Create kernel_create_rpc_sysctls() interface- Remove ganesha from gluster module and create own module for ganesha - FIx label for /usr/lib/libGLdispatch.so.0.0.0- Dontaudit xdm_t wake_alarm capability2 - Allow systemd_initctl_t to create and connect unix_dgram sockets - Allow ifconfig_t to mount/unmount nsfs_t filesystem - Add interfaces allowing mount/unmount nsfs_t filesystem - Label /usr/lib/libGLdispatch.so.0.0.0 as textrel_shlib_t BZ(1419944)- Allow syslog client to connect to kernel socket. BZ(1419946)- Allow shiftfs to use xattr SELinux labels - Fix ssh_server_template by add sshd_t to require section.- Merge pull request #187 from rhatdan/container-selinux - Allow rhsmcertd domain signull kernel. - Allow container-selinux to handle all policy for container processes - Fix label for nagios plugins in nagios file conxtext file - su using libselinux and creating netlink_selinux socket is needed to allow libselinux initialization. Resolves: rhbz#1146987 - Add SELinux support for systemd-initctl daemon - Add SELinux support for systemd-bootchart - su using libselinux and creating netlink_selinux socket is needed to allow libselinux initialization. Resolves: rhbz#1146987 - Add module_load permission to can_load_kernmodule - Add module_load permission to class system - Add the validate_trans access vector to the security class - Restore connecto permssions for init_t- Allow kdumpgui domain to read nvme device - Add amanda_tmpfs_t label. BZ(1243752) - Fix typo in sssd interface file - Allow sssd_t domain setpgid BZ(1411437) - Allow ifconfig_t domain read nsfs_t - Allow ping_t domain to load kernel modules. - Allow systemd to send user information back to pid1. BZ(1412750) - rawhide-base: Fix wrong type/attribute flavors in require blocks- Allow libvirt daemon to create /var/chace/libvirt dir. - Allow systemd using ProtectKernelTunables securit feature. BZ(1392161) - F26 Wide change: Coredumps enabled by default. Allowing inherits process limits to enable coredumps.BZ(1341829)- After the latest changes in nfsd. We should allow nfsd_t to read raw fixed disk. For more info see: BZ(1403017) - Tighten security on containe types - Make working cracklib_password_check for MariaDB service - Label 20514 tcp/udp ports as syslogd_port_t Label 10514 tcp/udp portas as syslog_tls_port_t BZ(1410505)-Allow thumb domain sendto via dgram sockets. BZ(1398813) - Add condor_procd_t domain sys_ptrace cap_userns BZ(1411077) - Allow cobbler domain to create netlink_audit sockets BZ(1384600) - Allow networkmanager to manage networkmanager_var_lib_t lnk files BZ(1408626) - Add dhcpd_t domain fowner capability BZ(1409963) - Allow thumb to create netlink_kobject_uevent sockets. BZ(1410942) - Fix broken interfaces - Allow setfiles_t domain rw inherited kdumpctl tmp pipes BZ(1356456) - Allow user_t run systemctl --user BZ(1401625)- Add tlp_var_lib_t label for /var/lib/tlp directory BZ(1409977) - Allow tlp_t domain to read proc_net_t BZ(1403487) - Merge pull request #179 from rhatdan/virt1 - Allow tlp_t domain to read/write cpu microcode BZ(1403103) - Allow virt domain to use interited virtlogd domains fifo_file - Fixes for containers - Allow glusterd_t to bind on glusterd_port_t udp ports. - Update ctdbd_t policy to reflect all changes. - Allow ctdbd_t domain transition to rpcd_t- Allow pptp_t to read /dev/random BZ(1404248) - Allow glusterd_t send signals to userdomain. Label new glusterd binaries as glusterd_exec_t - Allow systemd to stop glusterd_t domains. - Merge branch 'rawhide-base' of github.com:fedora-selinux/selinux-policy into rawhide-base - Label /usr/sbin/sln as ldconfig_exec_t BZ(1378323) - Revert "Allow an domain that has an entrypoint from a type to be allowed to execute the entrypoint without a transition, I can see no case where this is a bad thing, and elminiates a whole class of AVCs."- Label /usr/bin/rpcbind as rpcbind_exec_t - Dontaudit mozilla plugin rawip socket creation. BZ(1275961) - Merge pull request #174 from rhatdan/netlink- Label /usr/bin/rpcbind as rpcbind_exec_t. Label /usr/lib/systemd/systemd/rpcbind.service - Allot tlp domain to create unix_dgram sockets BZ(1401233) - Allow antivirus domain to create lnk_files in /tmp - Allow cupsd_t to create lnk_files in /tmp. BZ(1401634) - Allow svnserve_t domain to read /dev/random BZ(1401827) - Allow lircd to use nsswitch. BZ(1401375) - Allow hostname_t domain to manage cluster_tmp_t files- Fix some boolean descriptions. - Add fwupd_dbus_chat() interface - Allow tgtd_t domain wake_alarm - Merge pull request #172 from vinzent/allow_puppetagent_timedated - Dontaudit logrotate_t to getattr nsfs_t BZ(1399081) - Allow systemd_machined_t to start unit files labeled as init_var_run_t - Add init_manage_config_transient_files() interface - In Atomic /usr/local is a soft symlink to /var/usrlocal, so the default policy to apply bin_t on /usr/...bin doesn't work and binaries dumped here get mislabeled as var_t. - Allow systemd to raise rlimit to all domains.BZ(1365435) - Add interface domain_setrlimit_all_domains() interface - Allow staff_t user to chat with fwupd_t domain via dbus - Update logging_create_devlog_dev() interface to allow calling domain create also sock_file dev-log. BZ(1393774) - Allow systemd-networkd to read network state BZ(1400016) - Allow systemd-resolved bind to dns port. BZ(1400023) - Allow systemd create /dev/log in own mount-namespace. BZ(1383867) - Add interface fs_dontaudit_getattr_nsfs_files() - Label /usr/lib/systemd/resolv.conf as lib_t to allow all domains read this file. BZ(1398853)- Dontaudit logrotate_t to getattr nsfs_t BZ(1399081) - Allow pmie daemon to send signal pcmd daemon BZ(1398078) - Allow spamd_t to manage /var/spool/mail. BZ(1398437) - Label /run/rpc.statd.lock as rpcd_lock_t and allow rpcd_t domain to manage it. BZ(1397254) - Merge pull request #171 from t-woerner/rawhide-contrib - Allow firewalld to getattr open search read modules_object_t:dir - Allow systemd create /dev/log in own mount-namespace. BZ(1383867) - Add interface fs_dontaudit_getattr_nsfs_files() - Label /usr/lib/systemd/resolv.conf as lib_t to allow all domains read this file. BZ(1398853) - Dontaudit systemd_journal sys_ptrace userns capability. BZ(1374187)- Adding policy for tlp - Add interface dev_manage_sysfs() - Allow ifconfig domain to manage tlp pid files.- Allow systemd_logind_t domain to communicate with devicekit_t domain via dbus bz(1393373)- Allow watching netflix using Firefox- nmbd_t needs net_admin capability like smbd - Add interface chronyd_manage_pid() Allow logrotate to manage chrony pids - Add wake_alarm capability2 to openct_t domain - Allow abrt_t to getattr on nsfs_t files. - Add cupsd_t domain wake_alarm capability. - Allow sblim_reposd_t domain to read cert_f files. - Allow abrt_dump_oops_t to drop capabilities. bz(1391040) - Revert "Allow abrt_dump_oops_t to drop capabilities. bz(1391040)" - Allow isnsd_t to accept tcp connections- Allow abrt_dump_oops_t to drop capabilities. bz(1391040) - Add named_t domain net_raw capability bz(1389240) - Allow geoclue to read system info. bz(1389320) - Make openfortivpn_t as init_deamon_domain. bz(1159899) - Allow nfsd domain to create nfsd_unit_file_t files. bz(1382487) - Merge branch 'rawhide-contrib' of github.com:fedora-selinux/selinux-policy into rawhide-contrib - Add interace lldpad_relabel_tmpfs - Merge pull request #155 from rhatdan/sandbox_nfs - Add pscsd_t wake_alarm capability2 - Allow sandbox domains to mount fuse file systems - Add boolean to allow sandbox domains to mount nfs - Allow hypervvssd_t to read all dirs. - Allow isnsd_t to connect to isns_port_t - Merge branch 'rawhide-contrib' of github.com:fedora-selinux/selinux-policy into rawhide-contrib - Allow GlusterFS with RDMA transport to be started correctly. It requires ipc_lock capability together with rw permission on rdma_cm device. - Make tor_var_lib_t and tor_var_log_t as mountpoints. - Allow systemd-rfkill to write to /proc/kmsg bz(1388669) - Allow init_t to relabel /dev/shm/lldpad.state - Merge pull request #168 from rhatdan/docker - Label tcp 51954 as isns_port_t - Lots of new domains like OCID and RKT are user container processes- Add container_file_t into contexts/customizable_types.- Disable container_runtime_typebounds() due to typebounds issues which can not be resolved during build. - Disable unconfined_typebounds in sandbox.te due to entrypoint check which exceed for sandbox domains unconfined_t domain. - Disable unconfined_typebounds due to entrypoint check which exceed for sandbox domains unconfined_t domain. - Merge pull request #167 from rhatdan/container - Add transition rules for sandbox domains - container_typebounds() should be part of sandbox domain template - Fix broken container_* interfaces - unconfined_typebounds() should be part of sandbox domain template - Fixed unrecognized characters at sandboxX module - unconfined_typebounds() should be part of sandbox domain template - svirt_file_type is atribute no type. - Merge pull request #166 from rhatdan/container - Allow users to transition from unconfined_t to container types - Add dbus_stream_connect_system_dbusd() interface. - Merge pull request #152 from rhatdan/network_filetrans - Fix typo in filesystem module - Allow nss_plugin to resolve host names via the systemd-resolved. BZ(1383473)- Dontaudit leaked file descriptors for thumb. BZ(1383071) - Fix typo in cobbler SELinux module - Merge pull request #165 from rhatdan/container - Allow cockpit_ws_t to manage cockpit_lib_t dirs and files. BZ(1375156) - Allow cobblerd_t to delete dirs labeled as tftpdir_rw_t - Rename svirt_lxc_net_t to container_t - Rename docker.pp to container.pp, causes change in interface name - Allow httpd_t domain to list inotify filesystem. - Fix couple AVC to start roundup properly - Allow dovecot_t send signull to dovecot_deliver_t - Add sys_ptrace capability to pegasus domain - Allow firewalld to stream connect to NetworkManager. BZ(1380954) - rename docker intefaces to container - Merge pull request #164 from rhatdan/docker-base - Rename docker.pp to container.pp, causes change in interface name - Allow gvfs to read /dev/nvme* devices BZ(1380951)- Revert addition of systemd service for factory reset, since it is basically worse than what we had before. BZ(1290659)- Allow devicekit to chat with policykit via DBUS. BZ(1377113) - Add interface virt_rw_stream_sockets_svirt() BZ(1379314) - Allow xdm_t to read mount pid files. BZ(1377113) - Allow staff to rw svirt unix stream sockets. BZ(1379314) - Allow staff_t to read tmpfs files BZ(1378446)- Make tor_var_run_t as mountpoint. BZ(1368621) - Fix typo in ftpd SELinux module. - Allow cockpit-session to reset expired passwords BZ(1374262) - Allow ftp daemon to manage apache_user_content - Label /etc/sysconfig/oracleasm as oracleasm_conf_t - Allow oracleasm to rw inherited fixed disk device - Allow collectd to connect on unix_stream_socket - Add abrt_dump_oops_t kill user namespace capability. BZ(1376868) - Dontaudit systemd is mounting unlabeled dirs BZ(1367292) - Add interface files_dontaudit_mounton_isid()- Allow attach usb device to virtual machine BZ(1276873) - Dontaudit mozilla_plugin to sys_ptrace - Allow nut_upsdrvctl_t domain to read udev db BZ(1375636) - Fix typo - Allow geoclue to send msgs to syslog. BZ(1371818) - Allow abrt to read rpm_tmp_t dirs - Add interface rpm_read_tmp_files() - Remove labels for somr docker sandbox files for now. This needs to be reverted after fixes in docker-selinux - Update oracleasm SELinux module that can manage oracleasmfs_t blk files. Add dac_override cap to oracleasm_t domain. - Add few rules to pcp SELinux module to make ti able to start pcp_pmlogger service - Revert "label /var/lib/kubelet as svirt_sandbox_file_t" - Remove file context for /var/lib/kubelet. This filecontext is part of docker now - Add oracleasm_conf_t type and allow oracleasm_t to create /dev/oracleasm - Label /usr/share/pcp/lib/pmie as pmie_exec_t and /usr/share/pcp/lib/pmlogger as pmlogger_exec_t - Allow mdadm_t to getattr all device nodes - Dontaudit gkeyringd_domain to connect to system_dbusd_t - Add interface dbus_dontaudit_stream_connect_system_dbusd() - Allow guest-set-user-passwd to set users password. - Allow domains using kerberos to read also kerberos config dirs - Allow add new interface to new namespace BZ(1375124) - Allow systemd to relalbel files stored in /run/systemd/inaccessible/ - Add interface fs_getattr_tmpfs_blk_file() - Dontaudit domain to create any file in /proc. This is kernel bug. - Improve regexp for power_unit_file_t files. To catch just systemd power unit files. - Add new interface fs_getattr_oracleasmfs_fs() - Add interface fs_manage_oracleasm() - Label /dev/kfd as hsa_device_t - Update seutil_manage_file_contexts() interface that caller domain can also manage file_context_t dirs- Label /var/lib/docker/vfs as svirt_sandbox_file_t in virt SELinux module - Label /usr/bin/pappet as puppetagent_exec_t - Allow amanda to create dir in /var/lib/ with amanda_var_lib_t label - Allow run sulogin_t in range mls_systemlow-mls_systemhigh.- udisk2 module is part of devicekit module now - Fix file context for /etc/pki/pki-tomcat/ca/ - new interface oddjob_mkhomedir_entrypoint() - Allow mdadm to get attributes from all devices. - Label /etc/puppetlabs as puppet_etc_t. - quota: allow init to run quota tools - Add new domain ipa_ods_exporter_t BZ(1366640) - Create new interface opendnssec_stream_connect() - Allow VirtualBox to manage udev rules. - Allow systemd_resolved to send dbus msgs to userdomains - Make entrypoint oddjob_mkhomedir_exec_t for unconfined_t - Label all files in /dev/oracleasmfs/ as oracleasmfs_t- Add new domain ipa_ods_exporter_t BZ(1366640) - Create new interface opendnssec_stream_connect() - Allow systemd-machined to communicate to lxc container using dbus - Dontaudit accountsd domain creating dirs in /root - Add new policy for Disk Manager called udisks2 - Dontaudit firewalld wants write to /root - Label /etc/pki/pki-tomcat/ca/ as pki_tomcat_cert_t - Allow certmonger to manage all systemd unit files - Allow ipa_helper_t stream connect to dirsrv_t domain - Update oracleasm SELinux module - label /var/lib/kubelet as svirt_sandbox_file_t - Allow systemd to create blk and chr files with correct label in /var/run/systemd/inaccessible BZ(1367280) - Label /usr/libexec/gsd-backlight-helper as xserver_exec_t. This allows also confined users to manage screen brightness - Add new userdom_dontaudit_manage_admin_dir() interface - Label /dev/oracleasmfs as oracleasmfs_t. Add few interfaces related to oracleasmfs_t type- Add few interfaces to cloudform.if file - Label /var/run/corosync-qnetd and /var/run/corosync-qdevice as cluster_var_run_t. Note: corosync policy is now par of rhcs module - Allow krb5kdc_t to read krb4kdc_conf_t dirs. - Update networkmanager_filetrans_named_content() interface to allow source domain to create also temad dir in /var/run. - Make confined users working again - Fix hypervkvp module - Allow ipmievd domain to create lock files in /var/lock/subsys/ - Update policy for ipmievd daemon. Contain: Allowing reading sysfs, passwd,kernel modules Execuring bin_t,insmod_t - A new version of cloud-init that supports the effort to provision RHEL Atomic on Microsoft Azure requires some a new rules that allows dhclient/dhclient hooks to call cloud-init. - Allow systemd to stop systemd-machined daemon. This allows stop virtual machines. - Label /usr/libexec/iptables/iptables.init as iptables_exec_t Allow iptables creating lock file in /var/lock/subsys/- Fix lsm SELinux module - Dontaudit firewalld to create dirs in /root/ BZ(1340611) - Label /run/corosync-qdevice and /run/corosync-qnetd as corosync_var_run_t - Allow fprintd and cluster domains to cummunicate via dbus BZ(1355774) - Allow cupsd_config_t domain to read cupsd_var_run_t sock_file. BZ(1361299) - Add sys_admin capability to sbd domain - Allow vdagent to comunnicate with systemd-logind via dbus - Allow lsmd_plugin_t domain to create fixed_disk device. - Allow opendnssec domain to create and manage own tmp dirs/files - Allow opendnssec domain to read system state - Allow systemd_logind stop system init_t - Add interface init_stop() - Add interface userdom_dontaudit_create_admin_dir() - Label /var/run/storaged as lvm_var_run_t. - Allow unconfineduser to run ipa_helper_t.- Allow cups_config_t domain also mange sock_files. BZ(1361299) - Add wake_alarm capability to fprintd domain BZ(1362430) - Allow firewalld_t to relabel net_conf_t files. BZ(1365178) - Allow nut_upsmon_t domain to chat with logind vie dbus about scheduleing a shutdown when UPS battery is low. BZ(1361802) - Allow virtual machines to use dri devices. This allows use openCL GPU calculations. BZ(1337333) - Allow crond and cronjob domains to creating mail_home_rw_t objects in admin_home_t BZ(1366173) - Dontaudit mock to write to generic certs. - Add labeling for corosync-qdevice and corosync-qnetd daemons, to run as cluster_t - Revert "Label corosync-qnetd and corosync-qdevice as corosync_t domain" - Merge pull request #144 from rhatdan/modemmanager - Allow modemmanager to write to systemd inhibit pipes - Label corosync-qnetd and corosync-qdevice as corosync_t domain - Allow ipa_helper to read network state - Label oddjob_reqiest as oddjob_exec_t - Add interface oddjob_run() - Allow modemmanager chat with systemd_logind via dbus - Allow NetworkManager chat with puppetagent via dbus - Allow NetworkManager chat with kdumpctl via dbus - Allow sbd send msgs to syslog Allow sbd create dgram sockets. Allow sbd to communicate with kernel via dgram socket Allow sbd r/w kernel sysctls. - Allow ipmievd_t domain to re-create ipmi devices Label /usr/libexec/openipmi-helper as ipmievd_exec_t - Allow rasdaemon to use tracefs filesystem - Fix typo bug in dirsrv policy - Some logrotate scripts run su and then su runs unix_chkpwd. Allow logrotate_t domain to check passwd. - Add ipc_lock capability to sssd domain. Allow sssd connect to http_cache_t - Allow dirsrv to read dirsrv_share_t content - Allow virtlogd_t to append svirt_image_t files. - Allow hypervkvp domain to read hugetlbfs dir/files. - Allow mdadm daemon to read nvme_device_t blk files - Allow systemd_resolved to connect on system bus. BZ(1366334) - Allow systemd to create netlink_route_socket and communicate with systemd_networkd BZ(1306344) - Allow systemd-modules-load to load kernel modules in early boot. BZ(1322625) - label tcp/udp port 853 as dns_port_t. BZ(1365609) - Merge pull request #145 from rhatdan/init - systemd is doing a gettattr on blk and chr devices in /run - Allow selinuxusers and unconfineduser to run oddjob_request - Allow sshd server to acces to Crypto Express 4 (CEX4) devices. - Fix typo in device interfaces - Add interfaces for managing ipmi devices - Add interfaces to allow mounting/umounting tracefs filesystem - Add interfaces to allow rw tracefs filesystem - Merge branch 'rawhide-base' of github.com:fedora-selinux/selinux-policy into rawhide-base - Merge pull request #138 from rhatdan/userns - Allow iptables to creating netlink generic sockets. - Fix filecontext for systemd shared lib.- Fix filesystem inteface file, we don't have nsfs_fs_t type, just nsfs_t- collectd: update policy for 5.5 - Allow puppet_t transtition to shorewall_t - Grant certmonger "chown" capability - Boinc updates from Russell Coker. - Allow sshd setcap capability. This is needed due to latest changes in sshd. - Revert "Allow sshd setcap capability. This is needed due to latest changes in sshd" - Revert "Fix typo in ssh policy" - Get attributes of generic ptys, from Russell Coker.- Dontaudit mock_build_t can list all ptys. - Allow ftpd_t to mamange userhome data without any boolean. - Add logrotate permissions for creating netlink selinux sockets. - Add new MLS attribute to allow relabeling objects higher than system low. This exception is needed for package managers when processing sensitive data. - Label all VBox libraries stored in /var/lib/VBoxGuestAdditions/lib/ as textrel_shlib_t BZ(1356654) - Allow systemd gpt generator to run fstools BZ(1353585) - Label /usr/lib/systemd/libsystemd-shared-231.so as lib_t. BZ(1360716) - Allow gnome-keyring also manage user_tmp_t sockets. - Allow systemd to mounton /etc filesystem. BZ(1341753)- Allow lsmd_plugin_t to exec ldconfig. - Allow vnstatd domain to read /sys/class/net/ files - Remove duplicate allow rules in spamassassin SELinux module - Allow spamc_t and spamd_t domains create .spamassassin file in user homedirs - Allow ipa_dnskey domain to search cache dirs - Allow dogtag-ipa-ca-renew-agent-submit labeled as certmonger_t to create /var/log/ipa/renew.log file - Allow ipa-dnskey read system state. - Allow sshd setcap capability. This is needed due to latest changes in sshd Resolves: rhbz#1356245 - Add interface to write to nsfs inodes - Allow init_t domain to read rpm db. This is needed due dnf-upgrade process failing. BZ(1349721) - Allow systemd_modules_load_t to read /etc/modprobe.d/lockd.conf - sysadmin should be allowed to use docker.- Allow hypervkvp domain to run restorecon. - Allow firewalld to manage net_conf_t files - Remove double graphite-web context declaration - Fix typo in rhsmcertd SELinux policy - Allow logrotate read logs inside containers. - Allow sssd to getattr on fs_t - Allow opendnssec domain to manage bind chace files - Allow systemd to get status of systemd-logind daemon - Label more ndctl devices not just ndctl0- Allow systemd_logind_t to start init_t BZ(1355861) - Add init_start() interface - Allow sysadm user to run systemd-tmpfiles - Add interface systemd_tmpfiles_run- Allow lttng tools to block suspending - Allow creation of vpnaas in openstack - remove rules with compromised_kernel permission - Allow dnssec-trigger to chat with NetworkManager over DBUS BZ(1350100) - Allow virtual machines to rw infiniband devices. Resolves: rhbz#1210263 - Update makefile to support snapperd_contexts file - Remove compromize_kernel permission Remove unused mac_admin permission Add undefined system permission - Remove duplicate declaration of class service - Fix typo in access_vectors file - Merge branch 'rawhide-base-modules-load' into rawhide-base - Add new policy for systemd-modules-load - Add systemd access vectors. - Revert "Revert "Revert "Missed this version of exec_all""" - Revert "Revert "Missed this version of exec_all"" - Revert "Missed this version of exec_all" - Revert "Revert "Fix name of capability2 secure_firmware->compromise_kernel"" BZ(1351624) This reverts commit 3e0e7e70de481589440f3f79cccff08d6e62f644. - Revert "Fix name of capability2 secure_firmware->compromise_kernel" BZ(1351624) This reverts commit 7a0348a2d167a72c8ab8974a1b0fc33407f72c48. - Revert "Allow xserver to compromise_kernel access"BZ(1351624) - Revert "Allow anyone who can load a kernel module to compromise_kernel"BZ(1351624) - Revert "add ptrace_child access to process" (BZ1351624) - Add user namespace capability object classes. - Allow udev to manage systemd-hwdb files - Add interface systemd_hwdb_manage_config() - Fix paths to infiniband devices. This allows use more then two infiniband interfaces. - corecmd: Remove fcontext for /etc/sysconfig/libvirtd - iptables: add fcontext for nftables- Fix typo in brltty policy - Add new SELinux module sbd - Allow pcp dmcache metrics collection - Allow pkcs_slotd_t to create dir in /var/lock Add label pkcs_slotd_log_t - Allow openvpn to create sock files labeled as openvpn_var_run_t - Allow hypervkvp daemon to getattr on all filesystem types. - Allow firewalld to create net_conf_t files - Allow mock to use lvm - Allow mirromanager creating log files in /tmp - Allow vmtools_t to transition to rpm_script domain - Allow nsd daemon to manage nsd_conf_t dirs and files - Allow cluster to create dirs in /var/run labeled as cluster_var_run_t - Allow sssd read also sssd_conf_t dirs - Allow opensm daemon to rw infiniband_mgmt_device_t - Allow krb5kdc_t to communicate with sssd - Allow prosody to bind on prosody ports - Add dac_override caps for fail2ban-client Resolves: rhbz#1316678 - dontaudit read access for svirt_t on the file /var/db/nscd/group Resolves: rhbz#1301637 - Allow inetd child process to communicate via dbus with systemd-logind Resolves: rhbz#1333726 - Add label for brltty log file Resolves: rhbz#1328818 - Allow snort_t to communicate with sssd Resolves: rhbz#1284908 - Add interface lttng_sessiond_tmpfs_t() - Dontaudit su_role_template interface to getattr /proc/kcore Dontaudit su_role_template interface to getattr /dev/initctl - Add interface lvm_getattr_exec_files() - Make label for new infiniband_mgmt deivices - Add prosody ports Resolves: rhbz#1304664- Label /var/lib/softhsm as named_cache_t. Allow named_t to manage named_cache_t dirs. - Allow glusterd daemon to get systemd status - Merge branch 'rawhide-contrib' of github.com:fedora-selinux/selinux-policy into rawhide-contrib - Merge pull request #135 from rhatdan/rawip_socket - Allow logrotate dbus-chat with system_logind daemon - Allow pcp_pmlogger to read kernel network state Allow pcp_pmcd to read cron pid files - Add interface cron_read_pid_files() - Allow pcp_pmlogger to create unix dgram sockets - Add interface dirsrv_run() - Remove non-existing jabberd_spool_t() interface and add new jabbertd_var_spool_t. - Remove non-existing interface salk_resetd_systemctl() and replace it with sanlock_systemctl_sanlk_resetd() - Create label for openhpid log files. - Container processes need to be able to listen on rawip sockets - Label /var/lib/ganglia as httpd_var_lib_t - Allow firewalld_t to create entries in net_conf_t dirs. - Allow journalctl to read syslogd_var_run_t files. This allows to staff_t and sysadm_t to read journals - Label /etc/dhcp/scripts dir as bin_t - Allow sysadm_role to run journalctl_t domain. This allows sysadm user to read journals.- Allow firewalld_t to create entries in net_conf_t dirs. - Allow journalctl to read syslogd_var_run_t files. This allows to staff_t and sysadm_t to read journals - Allow rhsmcertd connect to port tcp 9090 - Label for /bin/mail(x) was removed but /usr/bin/mail(x) not. This path is also needed to remove. - Label /usr/libexec/mimedefang-wrapper as spamd_exec_t. - Add new boolean spamd_update_can_network. - Add proper label for /var/log/proftpd.log - Allow rhsmcertd connect to tcp netport_port_t - Fix SELinux context for /usr/share/mirrormanager/server/mirrormanager to Label all binaries under dir as mirrormanager_exec_t. - Allow prosody to bind to fac_restore tcp port. - Fix SELinux context for usr/share/mirrormanager/server/mirrormanager - Allow ninfod to read raw packets - Fix broken hostapd policy - Allow hostapd to create netlink_generic sockets. BZ(1343683) - Merge pull request #133 from vinzent/allow_puppet_transition_to_shorewall - Allow pegasus get attributes from qemu binary files. - Allow tuned to use policykit. This change is required by cockpit. - Allow conman_t to read dir with conman_unconfined_script_t binary files. - Allow pegasus to read /proc/sysinfo. - Allow puppet_t transtition to shorewall_t - Allow conman to kill conman_unconfined_script. - Allow sysadm_role to run journalctl_t domain. This allows sysadm user to read journals. - Merge remote-tracking branch 'refs/remotes/origin/rawhide-base' into rawhide-base - Allow systemd to execute all init daemon executables. - Add init_exec_notrans_direct_init_entry() interface. - Label tcp ports:16379, 26379 as redis_port_t - Allow systemd to relabel /var and /var/lib directories during boot. - Add files_relabel_var_dirs() and files_relabel_var_dirs() interfaces. - Add files_relabelto_var_lib_dirs() interface. - Label tcp and udp port 5582 as fac_restore_port_t - Allow sysadm_t user to run postgresql-setup. - Allow sysadm_t user to dbus chat with oddjob_t. This allows confined admin run oddjob mkhomedirfor script. - Allow systemd-resolved to connect to llmnr tcp port. BZ(1344849) - Allow passwd_t also manage user_tmp_t dirs, this change is needed by gnome-keyringd- Allow conman to kill conman_unconfined_script. - Make conman_unconfined_script_t as init_system_domain. - Allow init dbus chat with apmd. - Patch /var/lib/rpm is symlink to /usr/share/rpm on Atomic, due to this change we need to label also /usr/share/rpm as rpm_var_lib_t. - Dontaudit xguest_gkeyringd_t stream connect to system_dbusd_t - Allow collectd_t to stream connect to postgresql. - Allow mysqld_safe to inherit rlimit information from mysqld - Allow ip netns to mounton root fs and unmount proc_t fs. - Allow sysadm_t to run newaliases command.- Allow svirt_sandbox_domains to r/w onload sockets - Add filetrans rule that NetworkManager_t can create net_conf_t files in /etc. - Add interface sysnet_filetrans_named_net_conf() - Rawhide fails to boot, systemd-logind needs to config transient config files - User Namespace is requires create on process domains- Add hwloc-dump-hwdata SELinux policy - Add labels for mediawiki123 - Fix label for all fence_scsi_check scripts - Allow setcap for fenced - Allow glusterd domain read krb5_keytab_t files. - Allow tmpreaper_t to read/setattr all non_security_file_type dirs - Update refpolicy to handle hwloc - Fix typo in files_setattr_non_security_dirs. - Add interface files_setattr_non_security_dirs()- Allow boinc to use dri devices. This allows use Boinc for a openCL GPU calculations. BZ(1340886) - Add nrpe_dontaudit_write_pipes() - Merge pull request #129 from rhatdan/onload - Add support for onloadfs - Merge pull request #127 from rhatdan/device-node - Additional access required for unconfined domains - Dontaudit ping attempts to write to nrpe unnamed pipes - Allow ifconfig_t to mounton also ifconfig_var_run_t dirs, not just files. Needed for: #ip netns add foo BZ(1340952)- Directory Server (389-ds-base) has been updated to use systemd-ask-password. In order to function correctly we need the following added to dirsrv.te - Update opendnssec_manage_config() interface to allow caller domain also manage opendnssec_conf_t dirs - Allow gssproxy to get attributes on all filesystem object types. BZ(1333778) - Allow ipa_dnskey_t search httpd config files. - Dontaudit certmonger to write to etc_runtime_t - Update opendnssec_read_conf() interface to allow caller domain also read opendnssec_conf_t dirs. - Add interface ipa_delete_tmp() - Allow systemd_hostanmed_t to read /proc/sysinfo labeled as sysctl_t. - Allow systemd to remove ipa temp files during uinstalling ipa. BZ(1333106)- Create new SELinux type for /usr/libexec/ipa/ipa-dnskeysyncd BZ(1333106) - Add SELinux policy for opendnssec service. BZ(1333106)- Label /usr/share/ovirt-guest-agent/ovirt-guest-agent.py as rhev_agentd_exec_t - Allow dnssec_trigger_t to create lnk_file labeled as dnssec_trigger_var_run_t. BZ(1335954) - Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus. - Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t. - Merge pull request #122 from NetworkManager/th/nm-dnsmasq-dbus - Merge pull request #125 from rhatdan/typebounds - Typebounds user domains - Allow systemd_resolved_t to check if ipv6 is disabled. - systemd added a new directory for unit files /run/systemd/transient. It should be labelled system_u:object_r:systemd_unit_file_t:s0, the same as /run/systemd/system, PID 1 will write units there. Resolves: #120 - Label /dev/xen/privcmd as xen_device_t. BZ(1334115)- Label /var/log/ganesha.log as gluster_log_t Allow glusterd_t domain to create glusterd_log_t files. Label /var/run/ganesha.pid as gluster_var_run_t. - Allow zabbix to connect to postgresql port - Label /usr/libexec/openssh/sshd-keygen as sshd_keygen_exec_t. BZ(1335149) - Allow systemd to read efivarfs. Resolve: #121- Revert temporary fix: Replace generating man/html pages with pages from actual build. This is due to broken userspace with python3 in F23/Rawhide. Please Revert when userspace will be fixed- Label tcp port 8181 as intermapper_port_t. - Label /usr/libexec/storaged/storaged as lvm_exec_t to run storaged daemon in lvm_t SELinux domain. BZ(1333588) - Label tcp/udp port 2024 as xinuexpansion4_port_t - Label tcp port 7002 as afs_pt_port_t Label tcp/udp port 2023 as xinuexpansion3_port_t- Allow stunnel create log files. BZ(1333033) - Label dev/shm/squid-cf__metadata.shm as squid_tmpfs_t. BZ(1331574) - Allow stunnel sys_nice capability. Stunnel sched_* syscalls in some cases. BZ(1332287) - Label /usr/bin/ganesha.nfsd as glusterd_exec_t to run ganesha as glusterd_t. Allow glusterd_t stream connect to rpbind_t. Allow cluster_t to create symlink /var/lib/nfs labeled as var_lib_nfs_t. Add interface rpc_filetrans_var_lib_nfs_content() Add new boolean: rpcd_use_fusefs to allow rpcd daemon use fusefs. - Allow systemd-user-sessions daemon to mamange systemd_logind_var_run_t pid files. BZ(1331980) - Modify kernel_steam_connect() interface by adding getattr permission. BZ(1331927) - Label /usr/sbin/xrdp* files as bin_t BZ(1258453) - Allow rpm-ostree domain transition to install_t domain from init_t. rhbz#1330318- Allow snapperd sys_admin capability Allow snapperd to set scheduler. BZ(1323732) - Label named-pkcs11 binary as named_exec_t. BZ(1331316) - Revert "Add new permissions stop/start to class system. rhbz#1324453" - Fix typo in module compilation message- Allow runnig php7 in fpm mode. From selinux-policy side, we need to allow httpd to read/write hugetlbfs. - Allow openvswitch daemons to run under openvswitch Linux user instead of root. This change needs allow set capabilities: chwon, setgid, setuid, setpcap. BZ(1330895) - Allow KDM to get status about power services. This change allow kdm to be able do shutdown BZ(1330970) - Add mls support for some db classes- Remove ftpd_home_dir() boolean from distro policy. Reason is that we cannot make this working due to m4 macro language limits. - Create new apache content template for files stored in user homedir. This change is needed to make working booleans: - httpd_enable_homedirs - httpd_read_user_content Resolves: rhbz#1330448 - Label /usr/lib/snapper/systemd-helper as snapperd_exec_t. rhbz#1323732 - Make virt_use_pcscd boolean off by default. - Create boolean to allow virtual machine use smartcards. rhbz#1029297 - Allow snapperd to relabel btrfs snapshot subvolume to snapperd_data_t. rhbz#1323754 - Allow mongod log to syslog. - Allow nsd daemon to create log file in /var/log as nsd_log_t - unlabeled_t can not be an entrypoint. - Modify interface den_read_nvme() to allow also read nvme_device_t block files. rhbz#1327909 - Add new permissions stop/start to class system. rhbz#1324453- Allow modemmanager to talk to logind - Dontaudit tor daemon needs net_admin capability. rhbz#1311788 - Allow GDM write to event devices. This rule is needed for GDM, because other display managers runs the X server as root, GDM instead runs the X server as the unprivileged user, within the user session. rhbz#1232042 - Xorg now writes content in users homedir.- rename several contrib modules according to their filenames - Add interface gnome_filetrans_cert_home_content() - By default container domains should not be allowed to create devices - Allow unconfined_t to create ~/.local/share/networkmanagement/certificates/ as home_cert_t instead of data_home_t. - Allow systemd_resolved_t to read /etc/passwd file. Allow systemd_resolved_t to write to kmsg_device_t when 'systemd.log_target=kmsg' option is used - Allow systemd gpt generator to read removable devices. BZ(1323458) - Allow systemd_gpt_generator_t sys_rawio capability. This access is needed to allow systemd gpt generator various device commands BZ(1323454)- Label /usr/libexec/rpm-ostreed as rpm_exec_t. BZ(1309075) - /bin/mailx is labeled sendmail_exec_t, and enters the sendmail_t domain on execution. If /usr/sbin/sendmail does not have its own domain to transition to, and is not one of several products whose behavior is allowed by the sendmail_t policy, execution will fail. In this case we need to label /bin/mailx as bin_t. BZ(1323224) - Label all run tgtd files, not just socket files. - Allow prosody to stream connect to sasl. This will allow using cyrus authentication in prosody. - Allow prosody to listen on port 5000 for mod_proxy65. BZ(1322815) - Allow targetd to read/write to /dev/mapper/control device. BZ(1241415) - Label /etc/selinux/(minimum|mls|targeted)/active/ as semanage_store_t. - Allow systemd_resolved to read systemd_networkd run files. BZ(1322921) - New cgroup2 file system in Rawhide- Allow dovecot_auth_t domain to manage also dovecot_var_run_t fifo files. BZ(1320415) - Allow colord to read /etc/udev/hwdb.bin. rhzb#1316514 - sandboxX.te: Allow sandbox domain to have entrypoint access only for executables and mountpoints. - Allow sandbox domain to have entrypoint access only for executables and mountpoints. - Allow bitlee to create bitlee_var_t dirs. - Allow CIM provider to read sssd public files. - Fix some broken interfaces in distro policy. - Allow power button to shutdown the laptop. - Allow lsm plugins to create named fixed disks. rhbz#1238066 - Allow hyperv domains to rw hyperv devices. rhbz#1241636 - Label /var/www/html(/.*)?/wp_backups(/.*)? as httpd_sys_rw_content_t. - Create conman_unconfined_script_t type for conman script stored in /use/share/conman/exec/ - Allow rsync_export_all_ro boolean to read also non_auth_dirs/files/symlinks. - Allow pmdaapache labeled as pcp_pmcd_t access to port 80 for apache diagnostics - Label nagios scripts as httpd_sys_script_exec_t. - Allow nsd_t to bind on nsf_control tcp port. Allow nsd_crond_t to read nsd pid. - Fix couple of cosmetic thing in new virtlogd_t policy. rhbz #1311576 - Merge pull request #104 from berrange/rawhide-contrib-virtlogd - Label /var/run/ecblp0 as cupsd_var_run_t due to this fifo_file is used by epson drivers. rhbz#1310336 - Dontaudit logrotate to setrlimit itself. rhbz#1309604 - Add filename transition that /etc/princap will be created with cupsd_rw_etc_t label in cups_filetrans_named_content() interface. - Allow pcp_pmie and pcp_pmlogger to read all domains state. - Allow systemd-gpt-generator to create and manage systemd gpt generator unit files. BZ(1319446) - Merge pull request #115 from rhatdan/nvidea - Label all nvidia binaries as xserver_exec_t - Add new systemd_hwdb_read_config() interface. rhbz#1316514 - Add back corecmd_read_all_executables() interface. - Call files_type() instead of file_type() for unlabeled_t. - Add files_entrypoint_all_mountpoint() interface. - Make unlabeled only as a file_type type. It is a type for fallback if there is an issue with labeling. - Add corecmd_entrypoint_all_executables() interface. - Create hyperv* devices and create rw interfaces for this devices. rhbz#1309361 - Add neverallow assertion for unlabaled_t to increase policy security. - Allow systemd-rfkill to create /var/lib/systemd/rfkill dir. rhbz#1319499 - Label 8952 tcp port as nsd_control. - Allow to log out to gdm after screen was resized in session via vdagent. Resolves: rhbz#1249020- Add filename transition that /etc/princap will be created with cupsd_rw_etc_t label in cups_filetrans_named_content() interface. - Revert "Add filename transition that /etc/princap will be created with cupsd_rw_etc_t label in cups_filetrans_named_content." - Add filename transition that /etc/princap will be created with cupsd_rw_etc_t label in cups_filetrans_named_content. - Allow pcp_pmie and pcp_pmlogger to read all domains state. - Make fwupd domain unconfined. We need to discuss solution related to using gpg. rhbz#1316717 - Merge pull request #108 from rhatdan/rkt - Merge pull request #109 from rhatdan/virt_sandbox - Add new interface to define virt_sandbox_network domains - Label /etc/redis-sentinel.conf as redis_conf_t. Allow redis_t write to redis_conf_t. Allow redis_t to connect on redis tcp port. - Fix typo in drbd policy - Remove declaration of empty booleans in virt policy. - Add new drbd file type: drbd_var_run_t. Allow drbd_t to manage drbd_var_run_t files/dirs. - Label /etc/ctdb/events.d/* as ctdb_exec_t. Allow ctdbd_t to setattr on ctdbd_exec_t files. - Additional rules to make rkt work in enforcing mode - Allow to log out to gdm after screen was resized in session via vdagent. Resolves: rhbz#1249020 - Allow ipsec to use pam. rhbz#1317988 - Allow systemd-gpt-generator to read fixed_disk_device_t. rhbz#1314968 - Allow setrans daemon to read /proc/meminfo. - Merge pull request #107 from rhatdan/rkt-base - Allow systemd_notify_t to write to kmsg_device_t when 'systemd.log_target=kmsg' option is used. - Remove bin_t label for /etc/ctdb/events.d/. We need to label this scripts as ctdb_exec_t.- Label tcp port 5355 as llmnr-> Link-Local Multicast Name Resolution - Add support systemd-resolved.- Allow spice-vdagent to getattr on tmpfs_t filesystems Resolves: rhbz#1276251 - Allow sending dbus msgs between firewalld and system_cronjob domains. - Allow zabbix-agentd to connect to following tcp sockets. One of zabbix-agentd functions is get service status of ftp,http,innd,pop,smtp protocols. rhbz#1315354 - Allow snapperd mounton permissions for snapperd_data_t. BZ(#1314972) - Add support for systemd-gpt-auto-generator. rhbz#1314968 - Add interface dev_read_nvme() to allow reading Non-Volatile Memory Host Controller devices. - Add support for systemd-hwdb daemon. rhbz#1306243- Add new boolean tmpreaper_use_cifs() to allow tmpreaper to run on local directories being shared with Samba. - Merge pull request #105 from rhatdan/NO_NEW_PRIV - Fix new rkt policy - Remove some redundant rules. - Fix cosmetic issues in interface file. - Merge pull request #100 from rhatdan/rawhide-contrib - Add interface fs_setattr_cifs_dirs(). - Merge pull request #106 from rhatdan/NO_NEW_PRIV_BASE - Fixed to make SELinux work with docker and prctl(NO_NEW_PRIVS) -Build file_contexts.bin file_context.local.bin file_context.homedir.bin during build phase. This fix issue in Fedora live images when selinux-policy-targeted is not installed but just unpackaged, since there's no .bin files, file_contexts is parsed in selabel_open(). Resolves: rhbz#1314372- Fix new rkt policy (Remove some redundant rules, Fix cosmetic issues in interface file) - Add policy for rkt services- Revert "Allow systemd-logind to create .#nologinXXXXXX labeled as systemd_logind_var_run_t in /var/run/systemd/ rhbz#1285019" - Allow systemd-logind to create .#nologinXXXXXX labeled as systemd_logind_var_run_t in /var/run/ rhbz#1285019- Allow amanda to manipulate the tape changer to load the necessary tapes. rhbz#1311759 - Allow keepalived to create netlink generic sockets. rhbz#1311756 - Allow modemmanager to read /etc/passwd file. - Label all files named /var/run/.*nologin.* as systemd_logind_var_run_t. - Add filename transition to interface systemd_filetrans_named_content() that domain will create rfkill dir labeled as systemd_rfkill_var_lib_t instead of init_var_lib_t. rhbz #1290255 - Allow systemd-logind to create .#nologinXXXXXX labeled as systemd_logind_var_run_t in /var/run/systemd/ rhbz#1285019 - Allow systemd_networkd_t to write kmsg, when kernel was started with following params: systemd.debug systemd.log_level=debug systemd.log_target=kmsg rhbz#1311444 - Allow ipsec to read home certs, when connecting to VPN. rhbz#1301319- Fix macro name from snmp_manage_snmp_var_lib_files to snmp_manage_var_lib_files in cupsd policy. - Allow hplip driver to write to its MIB index files stored in the /var/lib/net-snmp/mib_indexes. Resolves: rhbz#1291033 - Allow collectd setgid capability Resolves:#1310896 - Allow adcli running as sssd_t to write krb5.keytab file. - Allow abrt-hook-ccpp to getattr on all executables. BZ(1284304) - Allow kexec to read kernel module files in /usr/lib/modules. - Add httpd_log_t for /var/log/graphite-web rhbz#1306981 - Remove redudant rules and fix _admin interface. - Add SELinux policy for LTTng 2.x central tracing registry session daemon. - Allow create mongodb unix dgram sockets. rhbz#1306819 - Support for InnoDB Tablespace Encryption. - Dontaudit leaded file descriptors from firewalld - Add port for rkt services - Add support for the default lttng-sessiond port - tcp/5345. This port is used by LTTng 2.x central tracing registry session daemon.- Allow setroubleshoot_fixit_t to use temporary files- Allow abrt_dump_oops_t to getattr filesystem nsfs files. rhbz#1300334 - Allow ulogd_t to create netlink_netfilter sockets. rhbz#1305426 - Create new type fwupd_cert_t Label /etc/pki/(fwupd|fwupd-metadata) dirs as fwupd_cert_t Allow fwupd_t domain to read fwupd_cert_t files|lnk_files rhbz#1303533 - Add interface to dontaudit leaked files from firewalld - fwupd needs to dbus chat with policykit - Allow fwupd domain transition to gpg domain. Fwupd signing firmware updates by gpg. rhbz#1303531 - Allow abrt_dump_oops_t to check permissions for a /usr/bin/Xorg. rhbz#1284967 - Allow prelink_cron_system_t domain set resource limits. BZ(1190364) - Allow pppd_t domain to create sockfiles in /var/run labeled as pppd_var_run_t label. BZ(1302666) - Fix wrong name for openqa_websockets tcp port. - Allow run sshd-keygen on second boot if first boot fails after some reason and content is not syncedon the disk. These changes are reflecting this commit in sshd. http://pkgs.fedoraproject.org/cgit/rpms/openssh.git/commit/?id=af94f46861844cbd6ba4162115039bebcc8f78ba rhbz#1299106 - Add interface ssh_getattr_server_keys() interface. rhbz#1299106 - Added Label openqa for tcp port (9526) Added Label openqa-websockets for tcp port (9527) rhbz#1277312 - Add interface fs_getattr_nsfs_files() - Add interface xserver_exec(). - Revert "Allow all domains some process flags."BZ(1190364)- Allow openvswitch domain capability sys_rawio. - Revert "Allow NetworkManager create dhcpc pid files. BZ(1229755)" - Allow openvswitch to manage hugetlfs files and dirs. - Allow NetworkManager create dhcpc pid files. BZ(1229755) - Allow apcupsd to read kernel network state. BZ(1282003) - Label /sys/kernel/debug/tracing filesystem - Add fs_manage_hugetlbfs_files() interface. - Add sysnet_filetrans_dhcpc_pid() interface.- Label virtlogd binary as virtd_exec_t. BZ(1291940) - Allow iptables to read nsfs files. BZ(1296826)- Add fwupd policy for daemon to allow session software to update device firmware - Label /usr/libexec/ipa/oddjob/org.freeipa.server.conncheck as ipa_helper_exec_t. BZ(1289930) - Allow systemd services to use PrivateNetwork feature - Add a type and genfscon for nsfs. - Fix SELinux context for rsyslog unit file. BZ(1284173)- Allow logrotate to systemctl rsyslog service. BZ(1284173) - Allow condor_master_t domain capability chown. BZ(1297048) - Allow chronyd to be dbus bus client. BZ(1297129) - Allow openvswitch read/write hugetlb filesystem. - Revert "Allow openvswitch read/write hugetlb filesystem." - Allow smbcontrol domain to send sigchld to ctdbd domain. - Allow openvswitch read/write hugetlb filesystem. - Merge branch 'rawhide-contrib' of github.com:fedora-selinux/selinux-policy into rawhide-contrib - Label /var/log/ipareplica-conncheck.log file as ipa_log_t Allow ipa_helper_t domain to manage logs labeledas ipa_log_t Allow ipa_helper_t to connect on http and kerberos_passwd ports. BZ(1289930) - Allow keepalived to connect to 3306/tcp port - mysqld_port_t. - Merge remote-tracking branch 'refs/remotes/origin/rawhide-contrib' into rawhide-contrib - Merge remote-tracking branch 'refs/remotes/origin/rawhide-contrib' into rawhide-contrib - Merge pull request #86 from rhatdan/rawhide-contrib - Label some new nsd binaries as nsd_exec_t Allow nsd domain net_admin cap. Create label nsd_tmp_t for nsd tmp files/dirs BZ (1293146) - Added interface logging_systemctl_syslogd - Label rsyslog unit file - Added policy for systemd-coredump service. Added domain transition from kernel_t to systemd_coredump_t. Allow syslogd_t domain to read/write tmpfs systemd-coredump files. Make new domain uconfined for now.- Allow sddm-helper running as xdm_t to create .wayland-errors with correct labeling. BZ(#1291085) - Revert "Allow arping running as netutils_t sys_module capability for removing tap devices." - Allow arping running as netutils_t sys_module capability for removing tap devices. - Add userdom_connectto_stream() interface. - Allow systemd-logind to read /run/utmp. BZ(#1278662) - Allow sddm-helper running as xdm_t to create .wayland-errors with correct labeling. BZ(#1291085) - Revert "Allow arping running as netutils_t sys_module capability for removing tap devices." - Allow arping running as netutils_t sys_module capability for removing tap devices. - Add userdom_connectto_stream() interface. - Allow systemd-logind to read /run/utmp. BZ(#1278662)- Allow firewalld to create firewalld_var_run_t directory. BZ(1291243) - Add interface firewalld_read_pid_files() - Allow iptables to read firewalld pid files. BZ(1291243) - Allow the user cronjobs to run in their userdomain - Label ssdm binaries storedin /etc/sddm/ as bin_t. BZ(1288111) - Merge pull request #81 from rhatdan/rawhide-base - New access needed by systemd domains- Allow whack executed by sysadm SELinux user to access /var/run/pluto/pluto.ctl. It fixes "ipsec auto --status" executed by sysadm_t. - Add ipsec_read_pid() interface- Label /usr/sbin/lvmlockd binary file as lvm_exec_t. BZ(1287739) - Adding support for dbus communication between systemd-networkd and systemd-hostnamed. BZ(1279182) - Update init policy to have userdom_noatsecure_login_userdomain() and userdom_sigchld_login_userdomain() called for init_t. - init_t domain should be running without unconfined_domain attribute. - Add a new SELinux policy for /usr/lib/systemd/systemd-rfkill. - Update userdom_transition_login_userdomain() to have "sigchld" and "noatsecure" permissions. - systemd needs to access /dev/rfkill on early boot. - Allow dspam to read /etc/passwd- Set default value as true in boolean mozilla_plugin_can_network_connect. BZ(1286177)- Allow apcupsd sending mails about battery state. BZ(1274018) - Allow pcp_pmcd_t domain transition to lvm_t. BZ(1277779) - Merge pull request #68 from rhatdan/rawhide-contrib - Allow antivirus_t to bind to all unreserved ports. Clamd binds to random unassigned port (by default in range 1024-2048). #1248785 - Allow systemd-networkd to bind dhcpd ports if DHCP=yes in *.network conf file. BZ(#1280092) - systemd-tmpfiles performs operations on System V IPC objects which requires sys_admin capability. BZ(#1279269)- Allow antivirus_t to bind to all unreserved ports. Clamd binds to random unassigned port (by default in range 1024-2048) - Allow abrt-hook-ccpp to change SELinux user identity for created objects. - Allow abrt-hook-ccpp to get attributes of all processes because of core_pattern. - Allow setuid/setgid capabilities for abrt-hook-ccpp. - Add default labeling for /etc/Pegasus/cimserver_current.conf. It is a correct patch instead of the current /etc/Pegasus/pegasus_current.conf. - Allow fenced node dbus msg when using foghorn witch configured foghorn, snmpd, and snmptrapd. - cockpit has grown content in /var/run directory - Add support for /dev/mptctl device used to check RAID status. - Allow systemd-hostnamed to communicate with dhcp via dbus. - systemd-logind remove all IPC objects owned by a user on a logout. This covers also SysV memory. This change allows to destroy unpriviledged user SysV shared memory segments. - Add userdom_destroy_unpriv_user_shared_mem() interface. - Label /var/run/systemd/shutdown directory as systemd_logind_var_run_t to allow systemd-logind to access it if shutdown is invoked. - Access needed by systemd-machine to manage docker containers - Allow systemd-logind to read /run/utmp when shutdown is invoked.- Merge pull request #48 from lkundrak/contrib-openfortivpn - unbound wants to use ephemeral ports as a default configuration. Allow to use also udp sockets.- The ABRT coredump handler has code to emulate default core file creation The handler runs in a separate process with abrt_dump_oops_t SELinux process type. abrt-hook-ccpp also saves the core dump file in the very same way as kernel does and a user can specify CWD location for a coredump. abrt-hook-ccpp has been made as a SELinux aware apps to create this coredumps with correct labeling and with this commit the policy rules have been updated to allow access all non security files on a system. - Since /dev/log is a symlink, we need to allow relabelto also symlink. This commit update logging_relabel_devlog_dev() interface to allow it. - systemd-user has pam_selinux support and needs to able to compute user security context if init_t is not unconfined domain.- Allow fail2ban-client to execute ldconfig. #1268715 - Add interface virt_sandbox_domain() - Use mmap_file_perms instead of exec_file_perms in setroubleshoot policy to shave off the execute_no_trans permission. Based on a github communication with Dominick Grift. -all userdom_dontaudit_user_getattr_tmp_sockets instead() of usedom_dontaudit_user_getattr_tmp_sockets(). - Rename usedom_dontaudit_user_getattr_tmp_sockets() to userdom_dontaudit_user_getattr_tmp_sockets(). - Remove auth_login_pgm_domain(init_t) which has been added by accident. - init_t needs to able to change SELinux identity because it is used as login_pgm domain because of systemd-user and PAM. It allows security_compute_user() returns a list of possible context and then a correct default label is returned by "selinux.get_default_context(sel_user,fromcon)" defined in the policy user config files. - Add interface auth_use_nsswitch() to systemd_domain_template. - Revert "auth_use_nsswitch can be used with attribute systemd_domain." - auth_use_nsswitch can be used with attribute systemd_domain. - ipsec: fix stringSwan charon-nm - docker is communicating with systemd-machined - Add missing systemd_dbus_chat_machined, needed by docker- Build including docker selinux interfaces.- Allow winbindd to send signull to kernel. BZ(#1269193) - Merge branch 'rawhide-contrib-chrony' into rawhide-contrib - Fixes for chrony version 2.2 BZ(#1259636) * Allow chrony chown capability * Allow sendto dgram_sockets to itself and to unconfined_t domains. - Merge branch 'rawhide-contrib-chrony' into rawhide-contrib - Add boolean allowing mysqld to connect to http port. #1262125 - Merge pull request #52 from 1dot75cm/rawhide-base - Allow systemd_hostnamed to read xenfs_t files. BZ(#1233877) - Fix attribute in corenetwork.if.in- Allow abrt_t to read sysctl_net_t files. BZ(#1194280) - Merge branch 'rawhide-contrib' of github.com:fedora-selinux/selinux-policy into rawhide-contrib - Add abrt_stub interface. - Add support for new mock location - /usr/libexec/mock/mock. BZ(#1270972) - Allow usbmuxd to access /run/udev/data/+usb:*. BZ(#1269633) - Allow qemu-bridge-helper to read /dev/random and /dev/urandom. BZ(#1267217) - Allow sssd_t to manage samba var files/dirs to SSSD's GPO support which is enabled against an Active Directory domain. BZ(#1225200). - Add samba_manage_var_dirs() interface. - Allow pcp_pmlogger to exec bin_t BZ(#1258698) - Allow spamd to read system network state. BZ(1260234) - Allow fcoemon to create netlink scsitransport sockets BZ(#1260882) - Allow networkmanager to create networkmanager_var_lib_t files. BZ(1270201) - Allow systemd-networkd to read XEN state for Xen hypervisor. BZ(#1269916) - Add fs_read_xenfs_files() interface. - Allow systemd_machined_t to send dbus msgs to all users and read/write /dev/ptmx to make 'machinectl shell' working correctly. - Allow systemd running as init_t to override the default context for key creation. BZ(#1267850)- Allow pcp_pmlogger to read system state. BZ(1258699) - Allow cupsd to connect on socket. BZ(1258089) - Allow named to bind on ephemeral ports. BZ(#1259766) - Allow iscsid create netlink iscsid sockets. - We need allow connect to xserver for all sandbox_x domain because we have one type for all sandbox processes. - Allow NetworkManager_t and policykit_t read access to systemd-machined pid files. #1255305 - Add missing labeling for /usr/libexec/abrt-hook-ccpp as a part of #1245477 and #1242467 bugs. - Allow search dirs in sysfs types in kernel_read_security_state. - Fix kernel_read_security_state interface that source domain of this interface can search sysctl_fs_t dirs.- Update modules_filetrans_named_content() to make sure we don't get modules_dep labeling by filename transitions. - Remove /usr/lib/modules/[^/]+/modules\..+ labeling - Add modutils_read_module_deps_files() which is called from files_read_kernel_modules() for module deps which are still labeled as modules_dep_t. - Remove modules_dep_t labeling for kernel module deps. depmod is a symlink to kmod which is labeled as insmod_exec_t which handles modules_object_t and there is no transition to modules_dep_t. Also some of these module deps are placed by cpio during install/update of kernel package.- Allow acpid to attempt to connect to the Linux kernel via generic netlink socket. - Clean up pkcs11proxyd policy. - We need to require sandbox_web_type attribute in sandbox_x_domain_template(). - Revert "depmod is a symlink to insmod so it runs as insmod_t. It causes that dep kernel modules files are not created with the correct labeling modules_dep_t. This fix adds filenamtrans rules for insmod_t." - depmod is a symlink to insmod so it runs as insmod_t. It causes that dep kernel modules files are not created with the correct labeling modules_dep_t. This fix adds filenamtrans rules for insmod_t. - Update files_read_kernel_modules() to contain modutils_read_module_deps() calling because module deps labeling has been updated and it allows to avoid regressions. - Update modules_filetrans_named_content() interface to cover more modules.* files. - New policy for systemd-machined. #1255305 - In Rawhide/F24, we added pam_selinux.so support for systemd-users to have user sessions running under correct SELinux labeling. It also supports another new feature with systemd+dbus and we have sessions dbuses running with the correct labeling - unconfined_dbus_t for example. - Allow systemd-logind read access to efivarfs - Linux Kernel configuration options for UEFI systems (UEFI Runtime Variables). #1244973, #1267207 (partial solution) - Merge pull request #42 from vmojzis/rawhide-base - Add interface to allow reading files in efivarfs - contains Linux Kernel configuration options for UEFI systems (UEFI Runtime Variables)- Add few rules related to new policy for pkcs11proxyd - Added new policy for pkcs11proxyd daemon - We need to require sandbox_web_type attribute in sandbox_x_domain_template(). - Dontaudit abrt_t to rw lvm_lock_t dir. - Allow abrt_d domain to write to kernel msg device. - Add interface lvm_dontaudit_rw_lock_dir() - Merge pull request #35 from lkundrak/lr-libreswan- Update config.tgz to reflect changes in default context for SELinux users related to pam_selinux.so which is now used in systemd-users. - Added support for permissive domains - Allow rpcbind_t domain to change file owner and group - rpm-ostree has a daemon mode now and need to speak to polkit/logind for authorization. BZ(#1264988) - Allow dnssec-trigger to send generic signal to Network-Manager. BZ(#1242578) - Allow smbcontrol to create a socket in /var/samba which uses for a communication with smbd, nmbd and winbind. - Revert "Add apache_read_pid_files() interface" - Allow dirsrv-admin read httpd pid files. - Add apache_read_pid_files() interface - Add label for dirsrv-admin unit file. - Allow qpid daemon to connect on amqp tcp port. - Allow dirsrvadmin-script read /etc/passwd file Allow dirsrvadmin-script exec systemctl - Add labels for afs binaries: dafileserver, davolserver, salvageserver, dasalvager - Add lsmd_plugin_t sys_admin capability, Allow lsmd_plugin_t getattr from sysfs filesystem. - Allow rhsmcertd_t send signull to unconfined_service_t domains. - Revert "Allow pcp to read docker lib files." - Label /usr/libexec/dbus-1/dbus-daemon-launch-helper as dbusd_exec_t to have systemd dbus services running in the correct domain instead of unconfined_service_t if unconfined.pp module is enabled. BZ(#1262993) - Allow pcp to read docker lib files. - Revert "init_t needs to be login_pgm domain because of systemd-users + pam_selinux.so" - Add login_userdomain attribute also for unconfined_t. - Add userdom_login_userdomain() interface. - Label /etc/ipa/nssdb dir as cert_t - init_t needs to be login_pgm domain because of systemd-users + pam_selinux.so - Add interface unconfined_server_signull() to allow domains send signull to unconfined_service_t - Call userdom_transition_login_userdomain() instead of userdom_transition() in init.te related to pam_selinux.so+systemd-users. - Add userdom_transition_login_userdomain() interface - Allow user domains with login_userdomain to have entrypoint access on init_exec. It is needed by pam_selinux.so call in systemd-users. BZ(#1263350) - Add init_entrypoint_exec() interface. - Allow init_t to have transition allow rule for userdomain if pam_selinux.so is used in /etc/pam.d/systemd-user. It ensures that systemd user sessions will run with correct userdomain types instead of init_t. BZ(#1263350)- named wants to access /proc/sys/net/ipv4/ip_local_port_range to get ehphemeral range. BZ(#1260272) - Allow user screen domains to list directorires in HOMEDIR wit user_home_t labeling. - Dontaudit fenced search gnome config - Allow teamd running as NetworkManager_t to access netlink_generic_socket to allow multiple network interfaces to be teamed together. BZ(#1259180) - Fix for watchdog_unconfined_exec_read_lnk_files, Add also dir search perms in watchdog_unconfined_exec_t. - Sanlock policy update. #1255307 - New sub-domain for sanlk-reset daemon - Fix labeling for fence_scsi_check script - Allow openhpid to read system state Aloow openhpid to connect to tcp http port. - Allow openhpid to read snmp var lib files. - Allow openvswitch_t domains read kernel dependencies due to openvswitch run modprobe - Fix regexp in chronyd.fc file - systemd-logind needs to be able to act with /usr/lib/systemd/system/poweroff.target to allow shutdown system. BZ(#1260175) - Allow systemd-udevd to access netlink_route_socket to change names for network interfaces without unconfined.pp module. It affects also MLS. - Allow unconfined_t domains to create /var/run/xtables.lock with iptables_var_run_t - Remove bin_t label for /usr/share/cluster/fence_scsi_check\.pl- Allow passenger to getattr filesystem xattr - Revert "Allow pegasus_openlmi_storage_t create mdadm.conf.anacbak file in /etc." - Label mdadm.conf.anackbak as mdadm_conf_t file. - Allow dnssec-ttrigger to relabel net_conf_t files. BZ(1251765) - Allow dnssec-trigger to exec pidof. BZ(#1256737) - Allow blueman to create own tmp files in /tmp. (#1234647) - Add new audit_read access vector in capability2 class - Add "binder" security class and access vectors - Update netlink socket classes. - Allow getty to read network state. BZ(#1255177) - Remove labeling for /var/db/.*\.db as etc_t to label db files as system_db_t.- Allow watchdog execute fenced python script. - Added inferface watchdog_unconfined_exec_read_lnk_files() - Allow pmweb daemon to exec shell. BZ(1256127) - Allow pmweb daemon to read system state. BZ(#1256128) - Add file transition that cermonger can create /run/ipa/renewal.lock with label ipa_var_run_t. - Revert "Revert default_range change in targeted policy" - Allow dhcpc_t domain transition to chronyd_t- Allow pmlogger to create pmlogger.primary.socket link file. BZ(1254080) - Allow NetworkManager send sigkill to dnssec-trigger. BZ(1251764) - Add interface dnssec_trigger_sigkill - Allow smsd use usb ttys. BZ(#1250536) - Fix postfix_spool_maildrop_t,postfix_spool_flush_t contexts in postfix.fc file. - Revert default_range change in targeted policy - Allow systemd-sysctl cap. sys_ptrace BZ(1253926)- Add ipmievd policy creaed by vmojzis@redhat.com - Call kernel_load_module(vmware_host_t) to satisfy neverallow assertion for sys_moudle in MLS where unconfined is disabled. - Allow NetworkManager to write audit log messages - Add new policy for ipmievd (ipmitool). - mirrormanager needs to be application domain and cron_system_entry needs to be called in optional block. - Allow sandbox domain to be also /dev/mem writer - Fix neverallow assertion for sys_module capability for openvswitch. - kernel_load_module() needs to be called out of boolean for svirt_lxc_net_t. - Fix neverallow assertion for sys_module capability. - Add more attributes for sandbox domains to avoid neverallow assertion issues. - Add neverallow asserition fixes related to storage. - Allow exec pidof under hypervkvp domain. Allow hypervkvp daemon create connection to the system DBUS - Allow openhpid_t to read system state. - Add temporary fixes for sandbox related to #1103622. It allows to run everything under one sandbox type. - Added labels for files provided by rh-nginx18 collection - Dontaudit block_suspend capability for ipa_helper_t, this is kernel bug. Allow ipa_helper_t capability net_admin. Allow ipa_helper_t to list /tmp. Allow ipa_helper_t to read rpm db. - Allow rhsmcertd exec rhsmcertd_var_run_t files and rhsmcerd_tmp_t files. This rules are in hide_broken_sympthons until we find better solution. - Update files_manage_all_files to contain auth_reader_shadow and auth_writer_shadow tosatisfy neverallow assertions. - Update files_relabel_all_files() interface to contain auth_relabelto_shadow() interface to satisfy neverallow assertion. - seunshare domains needs to have set_curr_context attribute to resolve neverallow assertion issues. - Add dev_raw_memory_writer() interface - Add auth_reader_shadow() and auth_writer_shadow() interfaces - Add dev_raw_memory_reader() interface. - Add storage_rw_inherited_scsi_generic() interface. - Update files_relabel_non_auth_files() to contain seutil_relabelto_bin_policy() to make neverallow assertion working. - Update kernel_read_all_proc() interface to contain can_dump_kernel and can_receive_kernel_messages attributes to fix neverallow violated issue for proc_kcore_t and proc_kmsg_t. - Update storage_rw_inherited_fixed_disk_dev() interface to use proper attributes to fix neverallow violated issues caused by neverallow check during build process.- Allow samba_net_t to manage samba_var_t sock files. - Allow httpd daemon to manage httpd_var_lib_t lnk_files. - Allow collectd stream connect to pdns.(BZ #1191044) - Add interface pdns_stream_connect() - Merge branch 'rawhide-contrib' of github.com:fedora-selinux/selinux-policy into rawhide-contrib - Allow chronyd exec systemctl - Merge pull request #30 from vmojzis/rawhide-contrib - Hsqldb policy upgrade -Allow sock_file management - Add inteface chronyd_signal Allow timemaster_t send generic signals to chronyd_t. - Hsqldb policy upgrade. -Disallow hsqldb_tmp_t link_file management - Hsqldb policy upgrade: -Remove tmp link_file transition -Add policy summary -Remove redundant parameter for "hsqldb_admin" interface - Label /var/run/chrony-helper dir as chronyd_var_run_t. - Allow lldpad_t to getattr tmpfs_t. Label /dev/shm/lldpad.* as lldapd_tmpfs_t - Fix label on /var/tmp/kiprop_0 - Add mountpoint dontaudit access check in rhsmcertd policy. - Allow pcp_domain to manage pcp_var_lib_t lnk_files. - Allow chronyd to execute mkdir command. - Allow chronyd_t to read dhcpc state. - Label /usr/libexec/chrony-helper as chronyd_exec_t - Allow openhpid liboa_soap plugin to read resolv.conf file. - Allow openhpid liboa_soap plugin to read generic certs. - Allow openhpid use libwatchdog plugin. (Allow openhpid_t rw watchdog device) - Allow logrotate to reload services. - Allow apcupsd_t to read /sys/devices - Allow kpropd to connect to kropd tcp port. - Allow systemd_networkd to send logs to syslog. - Added interface fs_dontaudit_write_configfs_dirs - Allow audisp client to read system state. - Label /var/run/xtables.lock as iptables_var_run_t. - Add labels for /dev/memory_bandwith and /dev/vhci. Thanks ssekidde - Add interface to read/write watchdog device. - Add transition rule for iptables_var_lib_t- Allow chronyd to execute mkdir command. - Allow chronyd_t to read dhcpc state. - Label /usr/libexec/chrony-helper as chronyd_exec_t - Allow openhpid liboa_soap plugin to read resolv.conf file. - Allow openhpid liboa_soap plugin to read generic certs. - Allow openhpid use libwatchdog plugin. (Allow openhpid_t rw watchdog device) - Allow logrotate to reload services. - Allow apcupsd_t to read /sys/devices - Allow kpropd to connect to kropd tcp port. - Allow lsmd also setuid capability. Some commands need to executed under root privs. Other commands are executed under unprivileged user. - Allow snapperd to pass data (one way only) via pipe negotiated over dbus. - Add snapper_read_inherited_pipe() interface. - Add missing ";" in kerberos.te - Add support for /var/lib/kdcproxy and label it as krb5kdc_var_lib_t. It needs to be accessible by useradd_t. - Add support for /etc/sanlock which is writable by sanlock daemon. - Allow mdadm to access /dev/random and add support to create own files/dirs as mdadm_tmpfs_t. - Add labels for /dev/memory_bandwith and /dev/vhci. Thanks ssekidde - Add interface to read/write watchdog device. - Add transition rule for iptables_var_lib_t - Allow useradd add homedir located in /var/lib/kdcproxy in ipa-server RPM scriplet. - Revert "Allow grubby to manage and create /run/blkid with correct labeling" - Allow grubby to manage and create /run/blkid with correct labeling - Add fstools_filetrans_named_content_fsadm() and call it for named_filetrans_domain domains. We need to be sure that /run/blkid is created with correct labeling. - arping running as netutils_t needs to access /etc/ld.so.cache in MLS. - Allow sysadm to execute systemd-sysctl in the sysadm_t domain. It is needed for ifup command in MLS mode. - Add systemd_exec_sysctl() and systemd_domtrans_sysctl() interfaces. - Allow udev, lvm and fsadm to access systemd-cat in /var/tmp/dracut if 'dracut -fv' is executed in MLS. - Allow admin SELinu users to communicate with kernel_t. It is needed to access /run/systemd/journal/stdout if 'dracut -vf' is executed. We allow it for other SELinux users. - depmod runs as insmod_t and it needs to manage user tmp files which was allowed for depmod_t. It is needed by dracut command for SELinux restrictive policy (confined users, MLS).- firewalld needs to relabel own config files. BZ(#1250537) - Allow rhsmcertd to send signull to unconfined_service - Allow lsm_plugin_t to rw raw_fixed_disk. - Allow lsm_plugin_t to read sysfs, read hwdata, rw to scsi_generic_device - Allow openhpid to use libsnmp_bc plugin (allow read snmp lib files).- Add header for sslh.if file - Fix sslh_admin() interface - Clean up sslh.if - Fix typo in pdns.if - Allow qpid to create lnk_files in qpid_var_lib_t. - Allow httpd_suexec_t to read and write Apache stream sockets - Merge pull request #21 from hogarthj/rawhide-contrib - Allow virt_qemu_ga_t domtrans to passwd_t. - use read and manage files_patterns and the description for the admin interface - Merge pull request #17 from rubenk/pdns-policy - Allow redis to read kernel parameters. - Label /etc/rt dir as httpd_sys_rw_content_t BZ(#1185500) - Allow hostapd to manage sock file in /va/run/hostapd Add fsetid cap. for hostapd Add net_raw cap. for hostpad BZ(#1237343) - Allow bumblebee to seng kill signal to xserver - glusterd call pcs utility which calls find for cib.* files and runs pstree under glusterd. Dontaudit access to security files and update gluster boolean to reflect these changes. - Allow drbd to get attributes from filesystems. - Allow drbd to read configuration options used when loading modules. - fix the description for the write config files, add systemd administration support and fix a missing gen_require in the admin interface - Added Booleans: pcp_read_generic_logs. - Allow pcp_pmcd daemon to read postfix config files. Allow pcp_pmcd daemon to search postfix spool dirs. - Allow glusterd to communicate with cluster domains over stream socket. - fix copy paste error with writing the admin interface - fix up the regex in sslh.fc, add sslh_admin() interface - adding selinux policy files for sslh - Remove diplicate sftpd_write_ssh_home boolean rule. - Revert "Allow smbd_t and nmbd_t to manage winbind_var_run_t files/socktes/dirs." - gnome_dontaudit_search_config() needs to be a part of optinal_policy in pegasus.te - Allow glusterd to manage nfsd and rpcd services. - Add kdbus.pp policy to allow access /sys/fs/kdbus. It needs to go with own module because this is workaround for now to avoid SELinux in enforcing mode. - kdbusfs should not be accessible for now by default for shipped policies. It should be moved to kdbus.pp - kdbusfs should not be accessible for now. - Add support for /sys/fs/kdbus and allow login_pgm domain to access it. - Allow sysadm to administrate ldap environment and allow to bind ldap port to allow to setup an LDAP server (389ds). - Label /usr/sbin/chpasswd as passwd_exec_t. - Allow audisp_remote_t to read/write user domain pty. - Allow audisp_remote_t to start power unit files domain to allow halt system.- Add fixes for selinux-policy packages to reflect the latest changes related to policy module store migration. - Prepare selinux-policy package for SELinux store migration - gnome_dontaudit_search_config() needs to be a part of optinal_policy in pegasus.te - Allow glusterd to manage nfsd and rpcd services. - Allow smbd_t and nmbd_t to manage winbind_var_run_t files/socktes/dirs. - Add samba_manage_winbind_pid() interface - Allow networkmanager to communicate via dbus with systemd_hostanmed. - Allow stream connect logrotate to prosody. - Add prosody_stream_connect() interface. - httpd should be able to send signal/signull to httpd_suexec_t, instead of httpd_suexec_exec_t. - Allow prosody to create own tmp files/dirs. - Allow keepalived request kernel load module - kadmind should not read generic files in /usr - Allow kadmind_t access to /etc/krb5.keytab - Add more fixes to kerberos.te - Add labeling for /var/tmp/kadmin_0 and /var/tmp/kiprop_0 - Add lsmd_t to nsswitch_domain. - Allow pegasus_openlmi_storage_t create mdadm.conf.anacbak file in /etc. - Add fixes to pegasus_openlmi_domain - Allow Glance Scrubber to connect to commplex_main port - Allow RabbitMQ to connect to amqp port - Allow isnsd read access on the file /proc/net/unix - Allow qpidd access to /proc//net/psched - Allow openshift_initrc_t to communicate with firewalld over dbus. - Allow ctdbd_t send signull to samba_unconfined_net_t. - Add samba_signull_unconfined_net() - Add samba_signull_winbind() - Revert "Add interfaces winbind_signull(), samba_unconfined_net_signull()." - Fix ctdb policy - Label /var/db/ as system_db_t.- inn daemon should create innd_log_t objects in var_log_t instead of innd_var_run_t - Fix rule definitions for httpd_can_sendmail boolean. We need to distinguish between base and contrib.- Add samba_unconfined_script_exec_t to samba_admin header. - Add jabberd_lock_t label to jabberd_admin header. - Add rpm_var_run_t label to rpm_admin header. - Make all interfaces related to openshift_cache_t as deprecated. - Remove non exits nfsd_ro_t label. - Label /usr/afs/ as afs_files_t Allow afs_bosserver_t create afs_config_t and afs_dbdir_t dirs under afs_files_t Allow afs_bosserver_t read kerberos config - Fix *_admin intefaces where body is not consistent with header. - Allow networkmanager read rfcomm port. - Fix nova_domain_template interface, Fix typo bugs in nova policy - Create nova sublabels. - Merge all nova_* labels under one nova_t. - Add cobbler_var_lib_t to "/var/lib/tftpboot/boot(/.*)?" - Allow dnssec_trigger_t relabelfrom dnssec_trigger_var_run_t files. - Fix label openstack-nova-metadata-api binary file - Allow nova_t to bind on geneve tcp port, and all udp ports - Label swift-container-reconciler binary as swift_t. - Allow glusterd to execute showmount in the showmount domain. - Allow NetworkManager_t send signull to dnssec_trigger_t. - Add support for openstack-nova-* packages. - Allow audisp-remote searching devpts. - Label 6080 tcp port as geneve- Update mta_filetrans_named_content() interface to cover more db files. - Revert "Remove ftpd_use_passive_mode boolean. It does not make sense due to ephemeral port handling." - Allow pcp domains to connect to own process using unix_stream_socket. - Typo in abrt.te - Allow abrt-upload-watch service to dbus chat with ABRT daemon and fsetid capability to allow run reporter-upload correctly. - Add nagios_domtrans_unconfined_plugins() interface. - Add nagios_domtrans_unconfined_plugins() interface. - Add new boolean - httpd_run_ipa to allow httpd process to run IPA helper and dbus chat with oddjob. - Add support for oddjob based helper in FreeIPA. BZ(1238165) - Allow dnssec_trigger_t create dnssec_trigger_tmp_t files in /var/tmp/ BZ(1240840) - Allow ctdb_t sending signull to smbd_t, for checking if smbd process exists. BZ(1224879) - Fix cron_system_cronjob_use_shares boolean to call fs interfaces which contain only entrypoint permission. - Add cron_system_cronjob_use_shares boolean to allow system cronjob to be executed from shares - NFS, CIFS, FUSE. It requires "entrypoint" permissios on nfs_t, cifs_t and fusefs_t SELinux types. - nrpe needs kill capability to make gluster moniterd nodes working. - Revert "Dontaudit ctbd_t sending signull to smbd_t." - Fix interface corenet_tcp_connect_postgresql_port_port(prosody_t) - Allow prosody connect to postgresql port. - Fix logging_syslogd_run_nagios_plugins calling in logging.te - Add logging_syslogd_run_nagios_plugins boolean for rsyslog to allow transition to nagios unconfined plugins. - Add support for oddjob based helper in FreeIPA. BZ(1238165) - Add new interfaces - Add fs_fusefs_entry_type() interface.- Allow ctdb_t sending signull to smbd_t, for checking if smbd process exists. BZ(1224879) - Fix cron_system_cronjob_use_shares boolean to call fs interfaces which contain only entrypoint permission. - Add cron_system_cronjob_use_shares boolean to allow system cronjob to be executed from shares - NFS, CIFS, FUSE. It requires "entrypoint" permissios on nfs_t, cifs_t and fusefs_t SELinux types. - Merge remote-tracking branch 'refs/remotes/origin/rawhide-contrib' into rawhide-contrib - nrpe needs kill capability to make gluster moniterd nodes working. - Fix interface corenet_tcp_connect_postgresql_port_port(prosody_t) - Allow prosody connect to postgresql port. - Add new interfaces - Add fs_fusefs_entry_type() interface.- Cleanup permissive domains.- Rename xodbc-connect port to xodbc_connect - Dontaudit apache to manage snmpd_var_lib_t files/dirs. BZ(1189214) - Add interface snmp_dontaudit_manage_snmp_var_lib_files(). - Allow ovsdb-server to connect on xodbc-connect and ovsdb tcp ports. BZ(1179809) - Dontaudit mozilla_plugin_t cap. sys_ptrace. BZ(1202043) - Allow iscsid write to fifo file kdumpctl_tmp_t. Appears when kdump generates the initramfs during the kernel boot. BZ(1181476) - Dontaudit chrome to read passwd file. BZ(1204307) - Allow firewalld exec ldconfig. BZ(1232748) - Allow dnssec_trigger_t read networkmanager conf files. BZ(1231798) - Allow in networkmanager_read_conf() also read NetworkManager_etc_rw_t files. BZ(1231798) - Allow NetworkManager write to sysfs. BZ(1234086) - Fix bogus line in logrotate.fc. - Add dontaudit interface for kdumpctl_tmp_t - Rename xodbc-connect port to xodbc_connect - Label tcp port 6632 as xodbc-connect port. BZ (1179809) - Label tcp port 6640 as ovsdb port. BZ (1179809)- Allow NetworkManager write to sysfs. BZ(1234086) - Fix bogus line in logrotate.fc. - Add dontaudit interface for kdumpctl_tmp_t - Use userdom_rw_user_tmp_files() instead of userdom_rw_user_tmpfs_files() in gluster.te - Add postgresql support for systemd unit files. - Fix missing bracket - Pull request by ssekidde. https://github.com/fedora-selinux/selinux-policy/pull/18 - Fixed obsoleted userdom_delete_user_tmpfs_files() inteface- Allow glusterd to interact with gluster tools running in a user domain - rpm_transition_script() is called from rpm_run. Update cloud-init rules. - Call rpm_transition_script() from rpm_run() interface. - Allow radvd has setuid and it requires dac_override. BZ(1224403) - Add glusterd_manage_lib_files() interface. - Allow samba_t net_admin capability to make CIFS mount working. - S30samba-start gluster hooks wants to search audit logs. Dontaudit it. - Reflect logrotate change which moves /var/lib/logrotate.status to /var/lib/logrotate/logrotate.status. BZ(1228531) - ntop reads /var/lib/ntop/macPrefix.db and it needs dac_override. It has setuid/setgid. BZ(1058822) - Allow cloud-init to run rpm scriptlets to install packages. BZ(1227484) - Allow nagios to generate charts. - Allow glusterd to send generic signals to systemd_passwd_agent processes. - Allow glusterd to run init scripts. - Allow glusterd to execute /usr/sbin/xfs_dbin glusterd_t domain. - Calling cron_system_entry() in pcp_domain_template needs to be a part of optional_policy block. - Allow samba-net to access /var/lib/ctdbd dirs/files. - Allow glusterd to send a signal to smbd. - Make ctdbd as home manager to access also FUSE. - Allow glusterd to use geo-replication gluster tool. - Allow glusterd to execute ssh-keygen. - Allow glusterd to interact with cluster services. - Add rhcs_dbus_chat_cluster() - systemd-logind accesses /dev/shm. BZ(1230443) - Label gluster python hooks also as bin_t. - Allow sshd to execute gnome-keyring if there is configured pam_gnome_keyring.so. - Allow gnome-keyring executed by passwd to access /run/user/UID/keyring to change a password.- We need to restore contexts on /etc/passwd*,/etc/group*,/etc/*shadow* during install phase to get proper labeling for these files until selinux-policy pkgs are installed. BZ(1228489)- Add ipsec_rw_inherited_pipes() interface. - Allow ibus-x11 running as xdm_t to connect uder session buses. We already allow to connect to userdomains over unix_stream_socket. - Label /usr/libexec/Xorg.wrap as xserver_exec_t. - Allow systemd-networkd to bind dhcpc ports if DHCP=yes in *.network conf file. - Add fixes for selinux userspace moving the policy store to /var/lib/selinux. - Remove optional else block for dhcp ping (needed by CIL) - Label all gluster hooks in /var/lib/gluster as bin_t. They are not created on the fly. - Access required to run with unconfine.pp disabled - Fix selinux_search_fs() interface. - Update selinux_search_fs(domain) rule to have ability to search /etc/selinuc/ to check if /etc/selinux/config exists. - Add seutil_search_config() interface. - Make ssh-keygen as nsswitch domain to access SSSD. - Label ctdb events scripts as bin_t. - Add support for /usr/sbin/lvmpolld. - Allow gvfsd-fuse running as xdm_t to use /run/user/42/gvfs as mountpoint. - Add support for ~/.local/share/networkmanagement/certificates and update filename transitions rules. - Allow login_pgm domains to access kernel keyring for nsswitch domains. - Allow hypervkvp to read /dev/urandom and read addition states/config files. - Add cgdcbxd policy. - Allow hypervkvp to execute arping in own domain and make it as nsswitch domain. - Add labeling for pacemaker.log. - Allow ntlm_auth running in winbind_helper_t to access /dev/urandom. - Allow lsmd plugin to connect to tcp/5989 by default. - Allow lsmd plugin to connect to tcp/5988 by default. - Allow setuid/setgid for selinux_child. - Allow radiusd to connect to radsec ports. - ALlow bind to read/write inherited ipsec pipes. - Allow fowner capability for sssd because of selinux_child handling. - Allow pki-tomcat relabel pki_tomcat_etc_rw_t. - Allow cluster domain to dbus chat with systemd-logind. - Allow tmpreaper_t to manage ntp log content - Allow openvswitch_t to communicate with sssd. - Allow isnsd_t to communicate with sssd. - Allow rwho_t to communicate with sssd. - Allow pkcs_slotd_t to communicate with sssd. - Add httpd_var_lib_t label for roundcubemail - Allow puppetagent_t to transfer firewalld messages over dbus. - Allow glusterd to have mknod capability. It creates a special file using mknod in a brick. - Update rules related to glusterd_brick_t. - Allow glusterd to execute lvm tools in the lvm_t target domain. - Allow glusterd to execute xfs_growfs in the target domain. - Allow sysctl to have running under hypervkvp_t domain. - Allow smartdnotify to use user terminals. - Allow pcp domains to create root.socket in /var/lip/pcp directroy. - Allow NM to execute dnssec-trigger-script in dnssec_trigger_t domain. - Allow rpcbind to create rpcbind.xdr as a temporary file. - Allow dnssec-trigger connections to the system DBUS. It uses libnm-glib Python bindings. - Allow hostapd net_admin capability. hostapd needs to able to set an interface flag. - rsync server can be setup to send mail - Make "ostree admin upgrade -r" command which suppose to upgrade the system and reboot working again. - Remove ctdbd_manage_var_files() interface which is not used and is declared for the wrong type. - Fix samba_load_libgfapi decl in samba.te. - Fix typo in nagios_run_sudo() boolean. - remove duplicate declaration from hypervkvp.te. - Move ctdd_domtrans() from ctdbd to gluster. - Allow smbd to access /var/lib/ctdb/persistent/secrets.tdb.0. - Glusterd wants to manage samba config files if they are setup together. - ALlow NM to do access check on /sys. - Allow NetworkManager to keep RFCOMM connection for Bluetooth DUN open . Based on fixes from Lubomir Rintel. - Allow NetworkManager nm-dispacher to read links. - Allow gluster hooks scripts to transition to ctdbd_t. - Allow glusterd to read/write samba config files. - Update mysqld rules related to mysqld log files. - Add fixes for hypervkvp realed to ifdown/ifup scripts. - Update netlink_route_socket for ptp4l. - Allow glusterd to connect to /var/run/dbus/system_bus_socket. - ALlow glusterd to have sys_ptrace capability. Needed by gluster+samba configuration. - Add new boolean samba_load_libgfapi to allow smbd load libgfapi from gluster. Allow smbd to read gluster config files by default. - Allow gluster to transition to smbd. It is needed for smbd+gluster configuration. - Allow glusterd to read /dev/random. - Update nagios_run_sudo boolean to allow run chkpwd. - Allow docker and container tools to control caps, don't rely on SELinux for now. Since there is no easy way for SELinux modification of policy as far as caps. docker run --cap-add will work now - Allow sosreport to dbus chat with NM. - Allow anaconda to run iscsid in own domain. BZ(1220948). - Allow rhsmcetd to use the ypbind service to access NIS services. - Add nagios_run_pnp4nagios and nagios_run_sudo booleans to allow run sudo from NRPE utils scripts and allow run nagios in conjunction with PNP4Nagios. - Allow ctdb to create rawip socket. - Allow ctdbd to bind smbd port. - Make ctdbd as userdom_home_reader. - Dontaudit chrome-sandbox write access its parent process information. BZ(1220958) - Allow net_admin cap for dnssec-trigger to make wifi reconnect working. - Add support for /var/lib/ipsilon dir and label it as httpd_var_lib_t. BZ(1186046) - Allow gluster rpm scripletto create glusterd socket with correct labeling. This is a workaround until we get fix in glusterd. - Add glusterd_filetrans_named_pid() interface. - Allow antivirus_t to read system state info. - Dontaudit use console for chrome-sandbox. - Add support for ~/.local/share/libvirt/images and for ~/.local/share/libvirt/boot. - Clamd needs to have fsetid capability. - Allow cinder-backup to dbus chat with systemd-logind. - Update httpd_use_openstack boolean to allow httpd to bind commplex_main_port and read keystone log files. - Allow gssd to access kernel keyring for login_pgm domains. - Add more fixes related to timemaster+ntp+ptp4l. - Allow docker sandbox domains to search all mountpoiunts - update winbind_t rules to allow IPC for winbind. - Add rpm_exec_t labeling for /usr/bin/dnf-automatic,/usr/bin/dnf-2 and /usr/bin/dnf-3. - Allow inet_gethost called by couchdb to access /proc/net/unix. - Allow eu-unstrip running under abrt_t to access /var/lib/pcp/pmdas/linux/pmda_linux.so - Label /usr/bin/yum-deprecated as rpm_exec_t.- Add missing typealiases in apache_content_template() for script domain/executable. - Don't use deprecated userdom_manage_tmpfs_role() interface calliing and use userdom_manage_tmp_role() instead. - Add support for new cobbler dir locations: - Add support for iprdbg logging files in /var/log. - Add relabel_user_home_dirs for use by docker_t- allow httpd_t to read nagios lib_var_lib_t to allow rddtool generate graphs which will be shown by httpd . - Add nagios_read_lib() interface. - Additional fix for mongod_unit_file_t in mongodb.te. - Fix decl of mongod_unit_file to mongod_unit_file_t. - Fix mongodb unit file declaration. - Update virt_read_pid_files() interface to allow read also symlinks with virt_var_run_t type. - Fix labeling for /usr/libexec/mysqld_safe-scl-helper. - Add support for mysqld_safe-scl-helper which is needed for RHSCL daemons. - Allow sys_ptrace cap for sblim-gatherd caused by ps. - Add support for /usr/libexec/mongodb-scl-helper RHSCL helper script. - Add support for mongod/mongos systemd unit files. - Allow dnssec-trigger to send sigchld to networkmanager - add interface networkmanager_sigchld - Add dnssec-trigger unit file Label dnssec-trigger script in libexec - Remove duplicate specification for /etc/localtime. - Add default labeling for /etc/localtime symlink.- Define ipa_var_run_t type - Allow certmonger to manage renewal.lock. BZ(1213256) - Add ipa_manage_pid_files interface. - Add rules for netlink_socket in iotop. - Allow iotop netlink socket. - cloudinit and rhsmcertd need to communicate with dbus - Allow apcupsd to use USBttys. BZ(1210960) - Allow sge_execd_t to mamange tmp sge lnk files.BZ(1211574) - Remove dac_override capability for setroubleshoot. We now have it running as setroubleshoot user. - Allow syslogd_t to manage devlog_t lnk files. BZ(1210968)- Add more restriction on entrypoint for unconfined domains.- Allow abrtd to list home config. BZ(1199658) - Dontaudit dnssec_trigger_t to read /tmp. BZ(1210250) - Allow abrt_dump_oops_t to IPC_LOCK. BZ(1205481) - Allow mock_t to use ptmx. BZ(1181333) - Allow dnssec_trigger_t to stream connect to networkmanager. - Allow dnssec_trigger_t to create resolv files labeled as net_conf_t - Fix labeling for keystone CGI scripts.- Label /usr/libexec/mongodb-scl-helper as mongod_initrc_exec_t. BZ(1202013) - Add mongodb port to httpd_can_network_connect_db interface. BZ(1209180) - Allow mongod to work with configured SSSD. - Add collectd net_raw capability. BZ(1194169) - Merge postfix spool types(maildrop,flush) to one postfix_spool_t - Allow dhcpd kill capability. - Make rwhod as nsswitch domain. - Add support for new fence agent fence_mpath which is executed by fence_node. - Fix cloudform policy.(m4 is case sensitive) - Allow networkmanager and cloud_init_t to dbus chat - Allow lsmd plugin to run with configured SSSD. - Allow bacula access to tape devices. - Allow sblim domain to read sysctls.. - Allow timemaster send a signal to ntpd. - Allow mysqld_t to use pam.It is needed by MariDB if auth_apm.so auth plugin is used. - two 'l' is enough. - Add labeling for systemd-time*.service unit files and allow systemd-timedated to access these unit files. - Allow polkit to dbus chat with xserver. (1207478) - Add lvm_stream_connect() interface. - Set label of /sys/kernel/debug- Allow kmscon to read system state. BZ (1206871) - Label ~/.abrt/ as abrt_etc_t. BZ(1199658) - Allow xdm_t to read colord_var_lib_t files. BZ(1201985)- Allow mysqld_t to use pam. BZ(1196104) - Added label mysqld_etc_t for /etc/my.cnf.d/ dir. BZ(1203989) - Allow fetchmail to read mail_spool_t. BZ(1200552) - Dontaudit blueman_t write to all mountpoints. BZ(1198272) - Allow all domains some process flags. - Merge branch 'rawhide-base' of github.com:selinux-policy/selinux-policy into rawhide-base - Turn on overlayfs labeling for testin, we need this backported to F22 and Rawhide. Eventually will need this in RHEL- build without docker- docker watches for content in the /etc directory - Merge branch 'rawhide-contrib' of github.com:selinux-policy/selinux-policy into rawhide-contrib - Fix abrt_filetrans_named_content() to create /var/tmp/abrt with the correct abrt_var_cache_t labeling. - Allow docker to communicate with openvswitch - Merge branch 'rawhide-contrib' of github.com:selinux-policy/selinux-policy into rawhide-contrib - Allow docker to relablefrom/to sockets and docker_log_t - Allow journald to set loginuid. BZ(1190498) - Add cap. sys_admin for passwd_t. BZ(1185191) - Allow abrt-hook-ccpp running as kernel_t to allow create /var/tmp/abrt with correct labeling.- Allow spamc read spamd_etc_t files. BZ(1199339). - Allow collectd to write to smnpd_var_lib_t dirs. BZ(1199278) - Allow abrt_watch_log_t read passwd file. BZ(1197396) - Allow abrt_watch_log_t to nsswitch_domain. BZ(1199659) - Allow cups to read colord_var_lib_t files. BZ(1199765)- Turn on rolekit in F23- Allow glusterd_t exec glusterd_var_lib_t files. BZ(1198406) - Add gluster_exec_lib interface. - Allow l2tpd to manage NetworkManager pid files - Allow firewalld_t relabelfrom firewalld_rw_etc_t. BZ(1195327) - Allow cyrus bind tcp berknet port. BZ(1198347) - Add nsswitch domain for more serviecs. - Allow abrt_dump_oops_t read /etc/passwd file. BZ(1197190) - Remove ftpd_use_passive_mode boolean. It does not make sense due to ephemeral port handling. - Make munin yum plugin as unconfined by default. - Allow bitlbee connections to the system DBUS. - Allow system apache scripts to send log messages. - Allow denyhosts execute iptables. BZ(1197371) - Allow brltty rw event device. BZ(1190349) - Allow cupsd config to execute ldconfig. BZ(1196608) - xdm_t now needs to manage user ttys - Allow ping_t read urand. BZ(1181831) - Add support for tcp/2005 port. - Allow setfiles domain to access files with admin_home_t. semanage -i /root/testfile. - In F23 we are running xserver as the user, need this to allow confined users to us X- Fix source filepath for moving html files.- Xserver needs to be transitioned to from confined users - Added logging_syslogd_pid_filetrans - xdm_t now talks to hostnamed - Label new strongswan binary swanctl and new unit file strongswan-swanctl.service. BZ(1193102) - Additional fix for labeleling /dev/log correctly. - cups chats with network manager - Allow parent domains to read/write fifo files in mozilla plugin - Allow spc_t to transition to svirt domains - Cleanup spc_t - docker needs more control over spc_t - pcp domains are executed out of cron- Allow audisp to connect to system DBUS for service. - Label /dev/log correctly. - Add interface init_read_var_lib_files(). - Allow abrt_dump_oops_t read /var/lib/systemd/, Allow abrt_dump_oops_t cap. chown,fsetid,fowner, BZ(1187017)- Label /usr/libexec/postgresql-ctl as postgresql_exec_t. BZ(1191004) - Remove automatcically running filetrans_named_content form sysnet_manage_config - Allow syslogd/journal to read netlink audit socket - Allow brltty ioctl on usb_device_t. BZ(1190349) - Make sure NetworkManager configures resolv.conf correctly- Allow cockpit_session_t to create tmp files - apmd needs sys_resource when shutting down the machine - Fix path label to resolv.conf under NetworkManager- Allow search all pid dirs when managing net_conf_t files.- Fix labels, improve sysnet_manage_config interface. - Label /var/run/NetworkManager/resolv.conf.tmp as net_conf_t. - Dontaudit network connections related to thumb_t. BZ(1187981) - Remove sysnet_filetrans_named_content from fail2ban- Fix labels on new location of resolv.conf - syslog is not writing to the audit socket - seunshare is doing getattr on unix_stream_sockets leaked into it - Allow sshd_t to manage gssd keyring - Allow apps that create net_conf_t content to create .resolv.conf.NetworkManager - Posgresql listens on port 9898 when running PCP (pgpool Control Port) - Allow svirt sandbox domains to read /proc/mtrr - Allow polipo_deamon connect to all ephemeral ports. BZ(1187723) - Allow dovecot domains to use sys_resouce - Allow sshd_t to manage gssd keyring - gpg_pinentry_t needs more access in f22- Allow docker to attach to the sandbox and user domains tun devices - Allow pingd to read /dev/urandom. BZ(1181831) - Allow virtd to list all mountpoints - Allow sblim-sfcb to search images - pkcsslotd_lock_t should be an alias for pkcs_slotd_lock_t. - Call correct macro in virt_read_content(). - Dontaudit couchdb search in gconf_home_t. BZ(1177717) - Allow docker_t to changes it rlimit - Allow neutron to read rpm DB. - Allow radius to connect/bind radsec ports - Allow pm-suspend running as virt_qemu_ga to read /var/log/pm-suspend.log. - Add devicekit_read_log_files(). - Allow virt_qemu_ga to dbus chat with rpm. - Allow netutils chown capability to make tcpdump working with -w. - Label /ostree/deploy/rhel-atomic-host/deploy directory as system_conf_t. - journald now reads the netlink audit socket - Add auditing support for ipsec.- Bump release- remove duplicate filename transition rules. - Call proper interface in sosreport.te. - Allow fetchmail to manage its keyring - Allow mail munin to create udp_sockets - Allow couchdb to sendto kernel unix domain sockets- Add /etc/selinux/targeted/contexts/openssh_contexts- Allow logrotate to read hawkey.log in /var/cache/dnf/ BZ(1163438) - Allow virt_qemu_ga_t to execute kmod. - Add missing files_dontaudit_list_security_dirs() for smbd_t in samba_export_all_ro boolean - Add additionnal MLS attribute for oddjob_mkhomedir to create homedirs. - Add support for /usr/share/vdsm/daemonAdapter. - Docker has a new config/key file it writes to /etc/docker - Allow bacula to connect also to postgresql.- Allow admin SELinux users mounting / as private within a new mount namespace as root in MLS. - Fix miscfiles_manage_generic_cert_files() to allow manage link files - Allow pegasus_openlmi_storage_t use nsswitch. BZ(1172258) - Add support for /var/run/gluster. - Allow openvpn manage systemd_passwd_var_run_t files. BZ(1170085)- Add files_dontaudit_list_security_dirs() interface. - Added seutil_dontaudit_access_check_semanage_module_store interface. - Allow docker to create /root/.docker - Allow rlogind to use also rlogin ports - dontaudit list security dirs for samba domain - Dontaudit couchdb to list /var- Update to have all _systemctl() interface also init_reload_services() - Dontaudit access check on SELinux module store for sssd. - Label /var/lib/rpmrebuilddb/ as rpm_var_lib_t. BZ (1167946)- Allow reading of symlinks in /etc/puppet - Added TAGS to gitignore - I guess there can be content under /var/lib/lockdown #1167502 - Allow rhev-agentd to read /dev/.udev/db to make deploying hosted engine via iSCSI working. - Allow keystone to send a generic signal to own process. - Allow radius to bind tcp/1812 radius port. - Dontaudit list user_tmp files for system_mail_t - label virt-who as virtd_exec_t - Allow rhsmcertd to send a null signal to virt-who running as virtd_t - Add virt_signull() interface - Add missing alias for _content_rw_t - Allow .snapshots to be created in other directories, on all mountpoints - Allow spamd to access razor-agent.log - Add fixes for sfcb from libvirt-cim TestOnly bug. (#1152104) - Allow .snapshots to be created in other directories, on all mountpoints - Label tcp port 5280 as ejabberd port. BZ(1059930) - Make /usr/bin/vncserver running as unconfined_service_t - Label /etc/docker/certs.d as cert_t - Allow all systemd domains to search file systems- Allow NetworkManager stream connect on openvpn. BZ(1165110)- Allow networkmanager manage also openvpn sock pid files.- Allow openvpn to create uuid connections in /var/run/NetworkManager with NM labeling. - Allow sendmail to create dead.letter. BZ(1165443) - Allow selinux_child running as sssd access check on /etc/selinux/targeted/modules/active. - Allow access checks on setfiles/load_policy/semanage_lock for selinux_child running as sssd_t. - Label sock file charon.vici as ipsec_var_run_t. BZ(1165065) - Add additional interfaces for load_policy/setfiles/read_lock related to access checks.- Allow bumblebee to use nsswitch. BZ(1155339) - Allow openvpn to stream connect to networkmanager. BZ(1164182) - Allow smbd to create HOMEDIRS is pam_oddjob_mkhomedir in MLS. - Allow cpuplug rw virtual memory sysctl. BZ (1077831) - Docker needs to write to sysfs, needs back port to F20,F21, RHEL7- Add kdump_rw_inherited_kdumpctl_tmp_pipes() - Added fixes related to linuxptp. BZ (1149693) - Label keystone cgi files as keystone_cgi_script_exec_t. BZ(1138424 - Dontaudit policykit_auth_t to access to user home dirs. BZ (1157256) - Fix seutil_dontaudit_access_check_load_policy() - Add dontaudit interfaces for audit_access in seutil - Label /etc/strongimcv as ipsec_conf_file_t.- Added interface userdom_dontaudit_manage_user_home_dirs - Fix unconfined_server_dbus_chat() interface. - Add unconfined_server_dbus_chat() inteface. - Allow login domains to create kernel keyring with different level. - Dontaudit policykit_auth_t to write to user home dirs. BZ (1157256) - Make tuned as unconfined domain. - Added support for linuxptp policy. BZ(1149693) - make zoneminder as dbus client by default. - Allow bluetooth read/write uhid devices. BZ (1161169) - Add fixes for hypervkvp daemon - Allow guest to connect to libvirt using unix_stream_socket. - Allow all bus client domains to dbus chat with unconfined_service_t. - Allow inetd service without own policy to run in inetd_child_t which is unconfined domain. - Make opensm as nsswitch domain to make it working with sssd. - Allow brctl to read meminfo. - Allow winbind-helper to execute ntlm_auth in the caller domain. - Make plymouthd as nsswitch domain to make it working with sssd. - Make drbd as nsswitch domain to make it working with sssd. - Make conman as nsswitch domain to make ipmitool.exp runing as conman_t working. - Add support for /var/lib/sntp directory.- Add support for /dev/nvme controllerdevice nodes created by nvme driver. - Add 15672 as amqp_port_t - Allow wine domains to read user homedir content - Add fixes to allow docker to create more content in tmpfs ,and donaudit reading /proc - Allow winbind to read usermodehelper - Allow telepathy domains to execute shells and bin_t - Allow gpgdomains to create netlink_kobject_uevent_sockets - Allow abrt to read software raid state. BZ (1157770) - Fix rhcs_signull_haproxy() interface. - Add suppor for keepalived unconfined scripts and allow keepalived to read all domain state and kill capability. - Allow snapperd to dbus chat with system cron jobs. - Allow nslcd to read /dev/urandom. - Allow dovecot to create user's home directory when they log into IMAP. - Label also logrotate.status.tmp as logrotate_var_lib_t. BZ(1158835) - Allow wine domains to read user homedir content - Add fixes to allow docker to create more content in tmpfs ,and donaudit reading /proc- Allow keystone_cgi_script_t to bind on commplex_main_port. BZ (#1138424) - Allow freeipmi_bmc_watchdog rw_sem_perms to freeipmi_ipmiseld - Allow rabbitmq to read nfs state data. BZ(1122412) - Allow named to read /var/tmp/DNS_25 labeled as krb5_host_rcache_t. - Add rolekit policy - ALlow rolekit domtrans to sssd_t. - Add kerberos_tmp_filetrans_kadmin() interface. - rolekit should be noaudit. - Add rolekit_manage_keys(). - Need to label rpmnew file correctly - Allow modemmanger to connectto itself- Allow couchdb read sysctl_fs_t files. BZ(1154327) - Allow osad to connect to jabber client port. BZ (1154242) - Allow mon_statd to send syslog msgs. BZ (1077821 - Allow apcupsd to get attributes of filesystems with xattrs- Allow systemd-networkd to be running as dhcp client. - Label /usr/bin/cockpit-bridge as shell_exec_t. - Add label for /var/run/systemd/resolve/resolv.conf. - ALlow listen and accept on tcp socket for init_t in MLS. Previously it was for xinetd_t. - Allow systemd-networkd to be running as dhcp client. - Label /usr/bin/cockpit-bridge as shell_exec_t. - Add label for /var/run/systemd/resolve/resolv.conf. - ALlow listen and accept on tcp socket for init_t in MLS. Previously it was for xinetd_t.- Dontaudit aicuu to search home config dir. BZ (#1104076) - couchdb is using erlang so it needs execmem privs - ALlow sanlock to send a signal to virtd_t. - Allow mondogdb to 'accept' accesses on the tcp_socket port. - Make sosreport as unconfined domain. - Allow nova-console to connect to mem_cache port. - Allow mandb to getattr on file systems - Allow read antivirus domain all kernel sysctls. - Allow lmsd_plugin to read passwd file. BZ(1093733) - Label /usr/share/corosync/corosync as cluster_exec_t. - ALlow sensord to getattr on sysfs. - automount policy is non-base module so it needs to be called in optional block. - Add auth_use_nsswitch for portreserve to make it working with sssd. - Fix samba_export_all_ro/samba_export_all_rw booleans to dontaudit search/read security files. - Allow openvpn to execute systemd-passwd-agent in systemd_passwd_agent_t to make openvpn working with systemd. - Allow openvpn to access /sys/fs/cgroup dir. - Allow nova-scheduler to read certs - Add support for /var/lib/swiftdirectory. - Allow neutron connections to system dbus. - Allow mongodb to manage own log files. - Allow opensm_t to read/write /dev/infiniband/umad1. - Added policy for mon_statd and mon_procd services. BZ (1077821) - kernel_read_system_state needs to be called with type. Moved it to antivirus.if. - Allow dnssec_trigger_t to execute unbound-control in own domain. - Allow all RHCS services to read system state. - Added monitor device - Add interfaces for /dev/infiniband - Add infiniband_device_t for /dev/infiniband instead of fixed_disk_device_t type. - Add files_dontaudit_search_security_files() - Add selinuxuser_udp_server boolean - ALlow syslogd_t to create /var/log/cron with correct labeling - Add support for /etc/.updated and /var/.updated - Allow iptables read fail2ban logs. BZ (1147709) - ALlow ldconfig to read proc//net/sockstat.- Allow nova domains to getattr on all filesystems. - ALlow zebra for user/group look-ups. - Allow lsmd to search own plguins. - Allow sssd to read selinux config to add SELinux user mapping. - Allow swift to connect to all ephemeral ports by default. - Allow NetworkManager to create Bluetooth SDP sockets - Allow keepalived manage snmp var lib sock files. BZ(1102228) - Added policy for blrtty. BZ(1083162) - Allow rhsmcertd manage rpm db. BZ(#1134173) - Allow rhsmcertd send signull to setroubleshoot. BZ (#1134173) - Label /usr/libexec/rhsmd as rhsmcertd_exec_t - Fix broken interfaces - Added sendmail_domtrans_unconfined interface - Added support for cpuplug. BZ (#1077831) - Fix bug in drbd policy, BZ (#1134883) - Make keystone_cgi_script_t domain. BZ (#1138424) - fix dev_getattr_generic_usb_dev interface - Label 4101 tcp port as brlp port - Allow libreswan to connect to VPN via NM-libreswan. - Add userdom_manage_user_tmpfs_files interface- Allow all domains to read fonts - Allow rabbitmq_t read rabbitmq_var_lib_t lnk files. BZ (#1147028) - Allow pki-tomcat to change SELinux object identity. - Allow radious to connect to apache ports to do OCSP check - Allow git cgi scripts to create content in /tmp - Allow cockpit-session to do GSSAPI logins.- Make sure /run/systemd/generator and system is labeled correctly on creation. - Additional access required by usbmuxd - Allow sensord read in /proc BZ(#1143799)- Allow du running in logwatch_t read hwdata. - Allow sys_admin capability for antivirus domians. - Use nagios_var_lib_t instead of nagios_lib_t in nagios.fc. - Add support for pnp4nagios. - Add missing labeling for /var/lib/cockpit. - Label resolv.conf as docker_share_t under docker so we can read within a container - Remove labeling for rabbitmqctl - setfscreate in pki.te is not capability class. - Allow virt domains to use virtd tap FDs until we get proper handling in libvirtd. - Allow wine domains to create cache dirs. - Allow newaliases to systemd inhibit pipes. - Add fixes for pki-tomcat scriptlet handling. - Allow user domains to manage all gnome home content - Allow locate to look at files/directories without labels, and chr_file and blk_file on non dev file systems - Allow usbmuxd chown capabilitiesllow locate to look at files/directories without labels, and chr_file and blk_file on non dev file systems- Label /usr/lib/erlang/erts.*/bin files as bin_t - Added changes related to rabbitmq daemon. - Fix labeling in couchdb policy - Allow rabbitmq bind on epmd port - Clean up rabbitmq policy - fix domtrans_rabbitmq interface - Added rabbitmq_beam_t and rabbitmq_epmd_t alias - Allow couchdb to getattr - Allow couchdb write to couchdb_conf files - Allow couchdb to create dgram_sockets - Added support for ejabberd- Back port workaround for #1134389 from F20. It needs to be removed from rawhide once we ship F21. - Since docker will now label volumes we can tighten the security of docker- Re-arange openshift_net_read_t rules. - Kernel is reporting random block_suspends, we should dontaudit these until the kernel is fixed in Rawhide - Allow jockey_t to use tmpfs files - Allow pppd to create sock_files in /var/run - Allow geoclue to stream connect to smart card service - Allow docker to read all of /proc - ALlow passeneger to read/write apache stream socket. - Dontaudit read init state for svirt_t. - Label /usr/sbin/unbound-control as named_exec_t (#1130510) - Add support for /var/lbi/cockpit directory. - Add support for ~/. speech-dispatcher. - Allow nmbd to read /proc/sys/kernel/core_pattern. - aLlow wine domains to create wine_home symlinks. - Allow policykit_auth_t access check and read usr config files. - Dontaudit access check on home_root_t for policykit-auth. - hv_vss_daemon wants to list /boot - update gpg_agent_env_file booelan to allow manage user tmp files for gpg-agent - Fix label for /usr/bin/courier/bin/sendmail - Allow munin services plugins to execute fail2ban-client in fail2ban_client_t domain. - Allow unconfined_r to access unconfined_service_t. - Add label for ~/.local/share/fonts - Add init_dontaudit_read_state() interface. - Add systemd_networkd_var_run_t labeling for /var/run/systemd/netif and allow systemd-networkd to manage it. - Allow udev_t mounton udev_var_run_t dirs #(1128618) - Add files_dontaudit_access_check_home_dir() inteface.- Allow unconfined_service_t to dbus chat with all dbus domains - Assign rabbitmq port. BZ#1135523 - Add new interface to allow creation of file with lib_t type - Allow init to read all config files - We want to remove openshift_t domains ability to look at /proc/net - I guess lockdown is a file not a directory - Label /var/bacula/ as bacula_store_t - Allow rhsmcertd to seng signull to sosreport. - Allow sending of snmp trap messages by radiusd. - remove redundant rule fron nova.te. - Add auth_use_nsswitch() for ctdbd. - call nova_vncproxy_t instead of vncproxy. - Allow nova-vncproxy to use varnishd port. - Fix rhnsd_manage_config() to allow manage also symlinks. - Allow bacula to create dirs/files in /tmp - Allow nova-api to use nsswitch. - Clean up nut policy. Allow nut domains to create temp files. Add nut_domain_template() template interface. - Allow usbmuxd connect to itself by stream socket. (#1135945) - I see no reason why unconfined_t should transition to crontab_t, this looks like old cruft - Allow nswrapper_32_64.nppdf.so to be created with the proper label - Assign rabbitmq port. BZ#1135523 - Dontaudit leaks of file descriptors from domains that transition to thumb_t - Fixes for usbmuxd, addition of /var/lib/lockdown, and allow it to use urand, dontaudit sys_resource - Allow unconfined_service_t to dbus chat with all dbus domains - Allow avahi_t communicate with pcp_pmproxy_t over dbus.(better way) - Allow avahi_t communicate with pcp_pmproxy_t over dbus.- Allow aide to read random number generator - Allow pppd to connect to http port. (#1128947) - sssd needs to be able write krb5.conf. - Labeli initial-setup as install_exec_t. - Allow domains to are allowed to mounton proc to mount on files as well as dirs- Label ~/tmp and ~/.tmp directories in user tmp dirs as user_tmp_t - Add a port definition for shellinaboxd - Fix labeling for HOME_DIR/tmp and HOME_DIR/.tmp directories - Allow thumb_t to read/write video devices - fail2ban 0.9 reads the journal by default. - Allow sandbox net domains to bind to rawip socket- Allow haproxy to read /dev/random and /dev/urandom. - Allow mdadm to seng signull kernel_t which is proces type of mdadm on early boot. - geoclue needs to connect to http and http_cache ports - Allow passenger to use unix_stream_sockets leaked into it, from httpd - Add SELinux policy for highly-available key value store for shared configuration. - drbd executes modinfo. - Add glance_api_can_network boolean since glance-api uses huge range port. - Fix glance_api_can_network() definition. - Allow smoltclient to connect on http_cache port. (#982199) - Allow userdomains to stream connect to pcscd for smart cards - Allow programs to use pam to search through user_tmp_t dires (/tmp/.X11-unix) - Added MLS fixes to support labeled socket activation which is going to be done by systemd - Add kernel_signull() interface. - sulogin_t executes plymouth commands - lvm needs to be able to accept connections on stream generic sockets- Rebuild for rpm bug 1131960- Allow ssytemd_logind_t to list tmpfs directories - Allow lvm_t to create undefined sockets - Allow passwd_t to read/write stream sockets - Allow docker lots more access. - Fix label for ports - Add support for arptables-{restore,save} and also labeling for /usr/lib/systemd/system/arptables.service. - Label tcp port 4194 as kubernetes port. - Additional access required for passenger_t - sandbox domains should be allowed to use libraries which require execmod - Allow qpid to read passwd files BZ (#1130086) - Remove cockpit port, it is now going to use websm port - Add getattr to the list of access to dontaudit on unix_stream_sockets - Allow sendmail to append dead.letter located in var/spool/nagios/dead.letter.- docker needs to be able to look at everything in /dev - Allow all processes to send themselves signals - Allow sysadm_t to create netlink_tcpdiag socket - sysadm_t should be allowed to communicate with networkmanager - These are required for bluejeans to work on a unconfined.pp disabled machine - docker needs setfcap - Allow svirt domains to manage chr files and blk files for mknod commands - Allow fail2ban to read audit logs - Allow cachefilesd_t to send itself signals - Allow smokeping cgi script to send syslog messages - Allow svirt sandbox domains to relabel content - Since apache content can be placed anywhere, we should just allow apache to search through any directory - These are required for bluejeans to work on a unconfined.pp disabled machin- shell_exec_t should not be in cockip.fc- Add additional fixes for abrt-dump-journal-oops which is now labeled as abrt_dump_oops_exec_t. - Allow denyhosts to enable synchronization which needs to connect to tcp/9911 port. - Allow nacl_helper_boo running in :chrome_sandbox_t to send SIGCHLD to chrome_sandbox_nacl_t. - Dontaudit write access on generic cert files. We don't audit also access check. - Add support for arptables. - Add labels and filenametrans rules for ostree repo directories which needs to be writable by subscription-manager.- fix license handling- Add new mozilla_plugin_bind_unreserved_ports boolean to allow mozilla plugin to use tcp/udp unreserved ports. There is a lot of plugins which binds ports without SELinux port type. We want to allow users to use these plugins properly using this boolean. (#1109681) - Allow smokeping cgi scripts to accept connection on httpd stream socket. - docker does a getattr on all file systems - Label all abort-dump programs - Allow alsa to create lock file to see if it fixes. - Add support for zabbix external scripts for which zabbix_script_t domain has been created. This domain is unconfined by default and user needs to run "semodule -d unconfined" to make system running without unconfined domains. The default location of these scripts is /usr/lib/zabbix/externalscripts. If a user change DATADIR in CONFIG_EXTERNALSCRIPTS then he needs to set labeling for this new location. - Add interface for journalctl_exec - Add labels also for glusterd sockets. - Change virt.te to match default docker capabilies - Add additional booleans for turning on mknod or all caps. - Also add interface to allow users to write policy that matches docker defaults - for capabilies. - Label dhcpd6 unit file. - Add support also for dhcp IPv6 services. - Added support for dhcrelay service - Additional access for bluejeans - docker needs more access, need back port to RHEL7 - Allow mdadm to connect to own socket created by mdadm running as kernel_t. - Fix pkcs, Remove pkcs_lock_filetrans and Add files_search_locks - Allow bacula manage bacula_log_t dirs - Allow pkcs_slotd_t read /etc/passwd, Label /var/lock/opencryptoki as pkcs_slotd_lock_t - Fix mistakes keystone and quantum - Label neutron var run dir - Label keystone var run dir - Fix bad labeling for /usr/s?bin/(oo|rhc)-restorer-wrapper.sh in openshift.fc. - Dontaudit attempts to access check cert dirs/files for sssd. - Allow sensord to send a signal. - Allow certmonger to stream connect to dirsrv to make ipa-server-install working. - Label zabbix_var_lib_t directories - Label conmans pid file as conman_var_run_t - Label also /var/run/glusterd.socket file as gluster_var_run_t - Fix policy for pkcsslotd from opencryptoki - Update cockpik policy from cockpit usptream. - Allow certmonger to exec ldconfig to make ipa-server-install working. - Added support for Naemon policy - Allow keepalived manage snmp files - Add setpgid process to mip6d - remove duplicate rule - Allow postfix_smtpd to stream connect to antivirus - Dontaudit list /tmp for icecast - Allow zabbix domains to access /proc//net/dev.- Allow zabbix domains to access /proc//net/dev. - Dontaudit list /tmp for icecast (#894387) - Allow postfix_smtpd to stream connect to antivirus (#1105889) - Add setpgid process to mip6d - Allow keepalived manage snmp files(#1053450) - Added support for Naemon policy (#1120789). - Allow certmonger to exec ldconfig to make ipa-server-install working. (#1122110) - Update cockpik policy from cockpit usptream.- Revert labeling back to /var/run/systemd/initctl/fifo - geoclue dbus chats with modemmanger - Bluejeans wants to connect to port 5000 - geoclue dbus chats with modemmange- Allow sysadm to dbus chat with systemd - Add logging_dontaudit_search_audit_logs() - Add new files_read_all_mountpoint_symlinks() - Fix labeling path from /var/run/systemd/initctl/fifo to /var/run/initctl/fifo. - Allow ndc to read random and urandom device (#1110397) - Allow zabbix to read system network state - Allow fprintd to execute usr_t/bin_t - Allow mailserver_domain domains to append dead.letter labeled as mail_home_t - Add glance_use_execmem boolean to have glance configured to use Ceph/rbd - Dontaudit search audit logs for fail2ban - Allow mailserver_domain domains to create mail home content with right labeling - Dontaudit svirt_sandbox_domain doing access checks on /proc - Fix files_pid_filetrans() calling in nut.te to reflect allow rules. - Use nut_domain attribute for files_pid_filetrans() for nut domains. - Allow sandbox domains read all mountpoint symlinks to make symlinked homedirs - Fix nut domains only have type transition on dirs in /run/nut directory. - Allow net_admin/net_raw capabilities for haproxy_t. haproxy uses setsockopt() - Clean up osad policy. Remove additional interfaces/rules- Allow systemd domains to check lvm status - Allow getty to execute plymouth.#1112870 - Allow sshd to send signal to chkpwd_t - initrctl fifo file has been renamed - Set proper labeling on /var/run/sddm - Fix labeling for cloud-init logs - Allow kexec to read kallsyms - Add rhcs_stream_connect_haproxy interface, Allow neutron stream connect to rhcs - Add fsetid caps for mandb. #1116165 - Allow all nut domains to read /dev/(u)?random. - Allow deltacloudd_t to read network state BZ #1116940 - Add support for KVM virtual machines to use NUMA pre-placement - Allow utilize winbind for authentication to AD - Allow chrome sandbox to use udp_sockets leaked in by its parent - Allow gfs_controld_t to getattr on all file systems - Allow logrotate to manage virt_cache - varnishd needs to have fsetid capability - Allow dovecot domains to send signal perms to themselves - Allow apache to manage pid sock files - Allow nut_upsmon_t to create sock_file in /run dir - Add capability sys_ptrace to stapserver - Mysql can execute scripts when run in a cluster to see if someone is listening on a socket, basically runs lsof - Added support for vdsm- If I can create a socket I need to be able to set the attributes - Add tcp/8775 port as neutron port - Add additional ports for swift ports - Added changes to fedora from bug bz#1082183 - Add support for tcp/6200 port - Allow collectd getattr access to configfs_t dir Fixes Bug 1115040 - Update neutron_manage_lib_files() interface - Allow glustered to connect to ephemeral ports - Allow apache to search ipa lib files by default - Allow neutron to domtrans to haproxy - Add rhcs_domtrans_haproxy() - Add support for openstack-glance-* unit files - Add initial support for /usr/bin/glance-scrubber - Allow swift to connect to keystone and memcache ports. - Fix labeling for /usr/lib/systemd/system/openstack-cinder-backup - Add policies for openstack-cinder - Add support for /usr/bin/nova-conductor - Add neutron_can_network boolean - Allow neutron to connet to neutron port - Allow glance domain to use syslog - Add support for /usr/bin/swift-object-expirer and label it as swift_exec_t- Allow swift to use tcp/6200 swift port - ALlow swift to search apache configs - Remove duplicate .fc entry for Grilo plugin bookmarks - Remove duplicate .fc entry for telepathy-gabble - Additional allow rules for docker sandbox processes - Allow keepalived connect to agentx port - Allow neutron-ns-metadata to connectto own unix stream socket - Add support for tcp/6200 port - Remove ability for confined users to run xinit - New tool for managing wireless /usr/sbin/iw- Add back MLS policy- Implement new spec file handling for *.pp modules which allows us to move a policy module out of the policy- Allow system_bus_types to use stream_sockets inherited from system_dbusd - Allow journalctl to call getpw - New access needed by dbus to talk to kernel stream - Label sm-notifypid files correctly - contrib: Add KMSCon policy module- Add mozilla_plugin_use_bluejeans boolean - Add additional interfaces needed by mozilla_plugin_use_bluejeans boolean- Allow staff_t to communicate and run docker - Fix *_ecryptfs_home_dirs booleans - Allow ldconfig_t to read/write inherited user tmp pipes - Allow storaged to dbus chat with lvm_t - Add support for storaged and storaged-lvm-helper. Labeled it as lvm_exec_t. - Use proper calling in ssh.te for userdom_home_manager attribute - Use userdom_home_manager_type() also for ssh_keygen_t - Allow locate to list directories without labels - Allow bitlbee to use tcp/7778 port - /etc/cron.daily/logrotate to execute fail2ban-client. - Allow keepalives to connect to SNMP port. Support to do SNMP stuff - Allow staff_t to communicate and run docker - Dontaudit search mgrepl/.local for cobblerd_t - Allow neutron to execute kmod in insmod_t - Allow neutron to execute udevadm in udev_t - Allow also fowner cap for varnishd - Allow keepalived to execute bin_t/shell_exec_t - rhsmcertd seems to need these accesses. We need this backported to RHEL7 and perhaps RHEL6 policy - Add cups_execmem boolean - Allow gear to manage gear service - New requires for gear to use systemctl and init var_run_t - Allow cups to execute its rw_etc_t files, for brothers printers - Add fixes to make munin and munin-cgi working. Allow munin-cgit to create files/dirs in /tmp, list munin conf dirs and manage munin logs. - Allow swift to execute bin_t - Allow swift to bind http_cache- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- Add decl for cockip port - Allow sysadm_t to read all kernel proc - Allow logrotate to execute all executables - Allow lircd_t to use tty_device_t for use withmythtv - Make sure all zabbix files direcories in /var/log have the correct label - Allow bittlebee to create directories and files in /var/log with the correct label - Label /var/log/horizon as an apache log - Add squid directory in /var/run - Add transition rules to allow rabbitmq to create log files and var_lib files with the correct label - Wronly labeled avahi_var_lib_t as a pid file - Fix labels on rabbitmq_var_run_t on file/dir creation - Allow neutron to create sock files - Allow postfix domains to getattr on all file systems - Label swift-proxy-server as swift_exec_t - Tighten SELinux capabilities to match docker capabilities - Add fixes for squid which is configured to run with more than one worker. - Allow cockpit to bind to its port- geard seems to do a lot of relabeling - Allow system_mail_t to append to munin_var_lib_t - Allow mozilla_plugin to read alsa_rw_ content - Allow asterisk to connect to the apache ports - Dontaudit attempts to read fixed disk - Dontaudit search gconf_home_t - Allow rsync to create swift_server.lock with swift.log labeling - Add labeling for swift lock files - Use swift_virt_lock in swift.te - Allow openwsman to getattr on sblim_sfcbd executable - Fix sblim_stream_connect_sfcb() to contain also sblim_tmp_t - Allow openwsman_t to read/write sblim-sfcb shared mem - Allow openwsman to stream connec to sblim-sfcbd - Allow openwsman to create tmpfs files/dirs - dontaudit acces to rpm db if rpm_exec for swift_t and sblim_sfcbd_t - Allow sblim_sfcbd to execute shell - Allow swift to create lock file - Allow openwsman to use tcp/80 - Allow neutron to create also dirs in /tmp - Allow seunshare domains to getattr on all executables - Allow ssh-keygen to create temporary files/dirs needed by OpenStack - Allow named_filetrans_domain to create /run/netns - Allow ifconfig to create /run/netns- Add missing dyntransition for sandbox_x_domain- More rules for gears and openshift - Added iotop policy. Thanks William Brown - Allow spamc to read .pyzor located in /var/spool/spampd - Allow spamc to create home content with correct labeling - Allow logwatch_mail_t to create dead.letter with correct labelign - Add labeling for min-cloud-agent - Allow geoclue to read unix in proc. - Add support for /usr/local/Brother labeling. We removed /usr/local equiv. - add support for min-cloud-agent - Allow ulogd to request the kernel to load a module - remove unconfined_domain for openwsman_t - Add openwsman_tmp_t rules - Allow openwsman to execute chkpwd and make this domain as unconfined for F20. - Allow nova-scheduler to read passwd file - Allow neutron execute arping in neutron_t - Dontaudit logrotate executing systemctl command attempting to net_admin - Allow mozilla plugins to use /dev/sr0 - svirt sandbox domains to read gear content in /run. Allow gear_t to manage openshift files - Any app that executes systemctl will attempt a net_admin - Fix path to mmap_min_addr- Add gear fixes from dwalsh- selinux_unconfined_type should not be able to set booleans if the securemode is set - Update sandbox_transition() to call sandbox_dyntrasition(). #885288.- Fix labeling for /root/\.yubico - userdom_search_admin_dir() calling needs to be optional in kernel.te - Dontaudit leaked xserver_misc_device_t into plugins - Allow all domains to search through all base_file_types, this should be back ported to RHEL7 policy - Need to allow sssd_t to manage kernel keyrings in login programs since they don't get labeled with user domains - Bootloader wants to look at init state - Add MCS/MLS Constraints to kernel keyring, also add MCS Constraints to ipc, sem.msgq, shm - init reads kdbump etc files - Add support for tcp/9697 - Fix labeling for /var/run/user//gvfs - Add support for us_cli ports - fix sysnet_use_ldap - Allow mysql to execute ifconfig if Red Hat OpenStack - ALlow stap-server to get attr on all fs - Fix mail_pool_t to mail_spool_t - Dontaudit leaked xserver_misc_device_t into plugins - Need to allow sssd_t to manage kernel keyrings in login programs since they don't get labeled with user domains - Add new labeling for /var/spool/smtpd - Allow httpd_t to kill passenger - Allow apache cgi scripts to use inherited httpd_t unix_stream_sockets - Allow nova-scheduler to read passwd/utmp files - Additional rules required by openstack, needs backport to F20 and RHEL7 - Additional access required by docker - ALlow motion to use tcp/8082 port- Fix virt_use_samba boolean - Looks like all domains that use dbus libraries are now reading /dev/urand - Add glance_use_fusefs() boolean - Allow tgtd to read /proc/net/psched - Additional access required for gear management of openshift directories - Allow sys_ptrace for mock-build - Fix mock_read_lib_files() interface - Allow mock-build to write all inherited ttys and ptys - Allow spamd to create razor home dirs with correct labeling - Clean up sysnet_use_ldap() - systemd calling needs to be optional - Allow init_t to setattr/relabelfrom dhcp state files- mongod should not be a part of cloudforms.pp - Fix labeling in snapper.fc - Allow docker to read unconfined_t process state - geoclue dbus chats with NetworkManager - Add cockpit policy - Add interface to allow tools to check the processes state of bind/named - Allow myslqd to use the tram port for Galera/MariaDB- Allow init_t to setattr/relabelfrom dhcp state files - Allow dmesg to read hwdata and memory dev - Allow strongswan to create ipsec.secrets with correct labeling in /etc/strongswan - Dontaudit antivirus domains read access on all security files by default - Add missing alias for old amavis_etc_t type - Additional fixes for instack overcloud - Allow block_suspend cap for haproxy - Allow OpenStack to read mysqld_db links and connect to MySQL - Remove dup filename rules in gnome.te - Allow sys_chroot cap for httpd_t and setattr on httpd_log_t - Add labeling for /lib/systemd/system/thttpd.service - Allow iscsid to handle own unit files - Add iscsi_systemctl() - Allow mongod also create sock_file with correct labeling in /run - Allow aiccu stream connect to pcscd - Allow rabbitmq_beam to connect to httpd port - Allow httpd to send signull to apache script domains and don't audit leaks - Fix labeling in drbd.fc - Allow sssd to connect to the smbd port for handing logins using active directory, needs back port for rhel7 - Allow all freeipmi domains to read/write ipmi devices - Allow rabbitmq_epmd to manage rabbit_var_log_t files - Allow sblim_sfcbd to use also pegasus-https port - Allow chronyd to read /sys/class/hwmon/hwmon1/device/temp2_input - Add httpd_run_preupgrade boolean - Add interfaces to access preupgrade_data_t - Add preupgrade policy - Add labeling for puppet helper scriptsRename puppet_t to puppetagent_t and used it only for puppet agent which can be started by init. Also make it as unconfined_noaudit because there is no reason to confine it but we wantto avoid init_t.- Change hsperfdata_root to have as user_tmp_t - Allow rsyslog low-level network access - Fix use_nfs_home_dirs/use_samba_home_dirs for xdm_t to allow append .xsession-errors by lightdm - Allow conman to resolve DNS and use user ptys - update pegasus_openlmi_admin_t policy - nslcd wants chown capability - Dontaudit exec insmod in boinc policy- Add labels for /var/named/chroot_sdb/dev devices - Add support for strongimcv - Add additional fixes for yubikeys based on william@firstyear.id.au - Allow init_t run /sbin/augenrules - Remove dup decl for dev_unmount_sysfs_fs - Allow unpriv SELinux user to use sandbox - Fix ntp_filetrans_named_content for sntp-kod file - Add httpd_dbus_sssd boolean - Dontaudit exec insmod in boinc policy - Add dbus_filetrans_named_content_system() - We want to label only /usr/bin/start-puppet-master to avoid puppet agent running in puppet_t - varnishd wants chown capability - update ntp_filetrans_named_content() interface - Add additional fixes for neutron_t. #1083335 - Dontaudit sandbox_t getattr on proc_kcore_t - Allow pki_tomcat_t to read ipa lib files- Merge user_tmp_t and user_tmpfs_t together to have only user_tmp_t- Turn on gear_port_t - Add gear policy and remove permissive domains. - Add labels for ostree - Add SELinux awareness for NM - Label /usr/sbin/pwhistory_helper as updpwd_exec_t- update storage_filetrans_all_named_dev for sg* devices - Allow auditctl_t to getattr on all removeable devices - Allow nsswitch_domains to stream connect to nmbd - Allow rasdaemon to rw /dev/cpu//msr - fix /var/log/pki file spec - make bacula_t as auth_nsswitch domain - Allow certmonger to manage ipa lib files - Add support for /var/lib/ipa- Manage_service_perms should include enable and disable, need backport to RHEL7 - Allow also unpriv user to run vmtools - Allow secadm to read /dev/urandom and meminfo - Add userdom_tmp_role for secadm_t - Allow postgresql to read network state - Add a new file context for /var/named/chroot/run directory - Add booleans to allow docker processes to use nfs and samba - Dontaudit net_amdin for /usr/lib/jvm/java-1.7.0-openjdk-1.7.0.51-2.4.5.1.el7.x86_64/jre-abrt/bin/java running as pki_tomcat_t - Allow puppet stream connect to mysql - Fixed some rules related to puppet policy - Allow vmware-user-sui to use user ttys - Allow talk 2 users logged via console too - Additional avcs for docker when running tests - allow anaconda to dbus chat with systemd-localed - clean up rhcs.te - remove dup rules from haproxy.te - Add fixes for haproxy based on bperkins@redhat.com - Allow cmirrord to make dmsetup working - Allow NM to execute arping - Allow users to send messages through talk - update rtas_errd policy - Add support for /var/spool/rhsm/debug - Make virt_sandbox_use_audit as True by default - Allow svirt_sandbox_domains to ptrace themselves - Allow snmpd to getattr on removeable and fixed disks - Allow docker containers to manage /var/lib/docker content- Label sddm as xdm_exec_t to make KDE working again - Allow postgresql to read network state - Allow java running as pki_tomcat to read network sysctls - Fix cgroup.te to allow cgred to read cgconfig_etc_t - Allow beam.smp to use ephemeral ports - Allow winbind to use the nis to authenticate passwords- Allow collectd to talk to libvirt - Allow chrome_sandbox to use leaked unix_stream_sockets - Dontaudit leaks of sockets into chrome_sandbox_t - If you create a cups directory in /var/cache then it should be labeled cups_rw_etc_t - Run vmtools as unconfined domains - Allow snort to manage its log files - Allow systemd_cronjob_t to be entered via bin_t - Allow procman to list doveconf_etc_t - allow keyring daemon to create content in tmpfs directories - Add proper labelling for icedtea-web - vpnc is creating content in networkmanager var run directory - unconfined_service should be allowed to transition to rpm_script_t - Allow couchdb to listen on port 6984 - Dontaudit attempts by unpriv user domain to write to /run/mount directory, caused by running mount command - Allow systemd-logind to setup user tmpfs directories - Add additional fixes for systemd_networkd_t - Allow systemd-logind to manage user_tmpfs_t - Allow systemd-logind to mount /run/user/1000 to get gdm working- Add additional fixes for systemd_networkd_t - Allow systemd-logind to manage user_tmpfs_t - Allow systemd-logind to mount /run/user/1000 to get gdm working - Dontaudit attempts to setsched on the kernel_t threads - Allow munin mail plugins to read network systcl - Fix git_system_enable_homedirs boolean - Make cimtest script 03_defineVS.py of ComputerSystem group working - Make abrt-java-connector working - Allow net_admin cap for fence_virtd running as fenced_t - Allow vmtools_helper_t to execute bin_t - Add support for /usr/share/joomla- sshd to read network sysctls - Allow vmtools_helper_t to execute bin_t - Add support for /usr/share/joomla - /var/lib/containers should be labeled as openshift content for now - Allow docker domains to talk to the login programs, to allow a process to login into the container- Add install_t for anaconda- Allow init_t to stream connect to ipsec - Add /usr/lib/systemd/systemd-networkd policy - Add sysnet_manage_config_dirs() - Add support for /var/run/systemd/network and labeled it as net_conf_t - Allow unpriv SELinux users to dbus chat with firewalld - Add lvm_write_metadata() - Label /etc/yum.reposd dir as system_conf_t. Should be safe because system_conf_t is base_ro_file_type - Add support for /dev/vmcp and /dev/sclp - Add docker_connect_any boolean - Fix zabbix policy - Allow zabbix to send system log msgs - Allow pegasus_openlmi_storage_t to write lvm metadata - Updated pcp_bind_all_unreserved_ports - Allow numad to write scan_sleep_millisecs - Turn on entropyd_use_audio boolean by default - Allow cgred to read /etc/cgconfig.conf because it contains templates used together with rules from /etc/cgrules.conf. - Allow lscpu running as rhsmcertd_t to read /proc/sysinfo- Allow numad to write scan_sleep_millisecs - Turn on entropyd_use_audio boolean by default - Allow cgred to read /etc/cgconfig.conf because it contains templates used together with rules from /etc/cgrules.conf. - Allow lscpu running as rhsmcertd_t to read /proc/sysinfo - Allow numad to write scan_sleep_millisecs - Turn on entropyd_use_audio boolean by default - Allow cgred to read /etc/cgconfig.conf because it contains templates used together with rules from /etc/cgrules.conf. - Allow lscpu running as rhsmcertd_t to read /proc/sysinfo - Fix label on irclogs in the homedir- Modify xdm_write_home to allow create files/links in /root with xdm_home_t - Add more fixes for https://fedoraproject.org/wiki/Changes/XorgWithoutRootRights - Add xserver_dbus_chat() interface - Add sysnet_filetrans_named_content_ifconfig() interface - Change userdom_use_user_inherited_ttys to userdom_use_user_ttys for systemd-tty-ask - Turn on cron_userdomain_transition by default for now. Until we get a fix for #1063503 - Allow lscpu running as rhsmcertd_t to read sysinfo - Allow virt domains to read network state - Added pcp rules - Allow ctdbd to connect own ports - Fix samba_export_all_rw booleanto cover also non security dirs - Allow swift to exec rpm in swift_t and allow to create tmp files/dirs - Allow neutron to create /run/netns with correct labeling - Allow to run ip cmd in neutron_t domain - Allow rpm_script_t to dbus chat also with systemd-located - Fix ipa_stream_connect_otpd()- Allow block_suspend cap2 for systemd-logind and rw dri device - Add labeling for /usr/libexec/nm-libreswan-service - Allow locallogin to rw xdm key to make Virtual Terminal login providing smartcard pin working - Add xserver_rw_xdm_keys() - Allow rpm_script_t to dbus chat also with systemd-located - Fix ipa_stream_connect_otpd() - update lpd_manage_spool() interface - Allow krb5kdc to stream connect to ipa-otpd - Add ipa_stream_connect_otpd() interface - Allow vpnc to unlink NM pids - Add networkmanager_delete_pid_files() - Allow munin plugins to access unconfined plugins - update abrt_filetrans_named_content to cover /var/spool/debug - Label /var/spool/debug as abrt_var_cache_t - Allow rhsmcertd to connect to squid port - Make docker_transition_unconfined as optional boolean - Allow certmonger to list home dirs- Make docker as permissive domain- Allow bumblebeed to send signal to insmod - Dontaudit attempts by crond_t net_admin caused by journald - Allow the docker daemon to mounton tty_device_t - Add addtional snapper fixes to allo relabel file_t - Allow setattr for all mountpoints - Allow snapperd to write all dirs - Add support for /etc/sysconfig/snapper - Allow mozilla_plugin to getsession - Add labeling for thttpd - Allow sosreport to execute grub2-probe - Allow NM to manage hostname config file - Allow systemd_timedated_t to dbus chat with rpm_script_t - Allow lsmd plugins to connect to http/ssh/http_cache ports by default - Add lsmd_plugin_connect_any boolea - Add support for ipset - Add support for /dev/sclp_line0 - Add modutils_signal_insmod() - Add files_relabelto_all_mountpoints() interface - Allow the docker daemon to mounton tty_device_t - Allow all systemd domains to read /proc/1 - Login programs talking to journald are attempting to net_admin, add dontaudit - init is not gettar on processes as shutdown time - Add systemd_hostnamed_manage_config() interface - Make unconfined_service_t valid in enforcing - Remove transition for temp dirs created by init_t - gdm-simple-slave uses use setsockopt - Add lvm_read_metadata()- Make unconfined_service_t valid in enforcing - Remove transition for temp dirs created by init_t - gdm-simple-slave uses use setsockopt - Treat usermodehelper_t as a sysctl_type - xdm communicates with geo - Add lvm_read_metadata() - Allow rabbitmq_beam to connect to jabber_interserver_port - Allow logwatch_mail_t to transition to qmail_inject and queueu - Added new rules to pcp policy - Allow vmtools_helper_t to change role to system_r - Allow NM to dbus chat with vmtools- Add labeling for /usr/sbin/amavi - Colin asked for this program to be treated as cloud-init - Allow ftp services to manage xferlog_t - Fix vmtools policy to allow user roles to access vmtools_helper_t - Allow block_suspend cap2 for ipa-otpd - Allow certmonger to search home content - Allow pkcsslotd to read users state - Allow exim to use pam stack to check passwords - Add labeling for /usr/sbin/amavi - Colin asked for this program to be treated as cloud-init - Allow ftp services to manage xferlog_t - Fix vmtools policy to allow user roles to access vmtools_helper_t - Allow block_suspend cap2 for ipa-otpd - Allow certmonger to search home content - Allow pkcsslotd to read users state - Allow exim to use pam stack to check passwords- Add lvm_read_metadata() - Allow auditadm to search /var/log/audit dir - Add lvm_read_metadata() interface - Allow confined users to run vmtools helpers - Fix userdom_common_user_template() - Generic systemd unit scripts do write check on / - Allow init_t to create init_tmp_t in /tmp.This is for temporary content created by generic unit files - Add additional fixes needed for init_t and setup script running in generic unit files - Allow general users to create packet_sockets - added connlcli port - Add init_manage_transient_unit() interface - Allow init_t (generic unit files) to manage rpc state date as we had it for initrc_t - Fix userdomain.te to require passwd class - devicekit_power sends out a signal to all processes on the message bus when power is going down - Dontaudit rendom domains listing /proc and hittping system_map_t - Dontauit leaks of var_t into ifconfig_t - Allow domains that transition to ssh_t to manipulate its keyring - Define oracleasm_t as a device node - Change to handle /root as a symbolic link for os-tree - Allow sysadm_t to create packet_socket, also move some rules to attributes - Add label for openvswitch port - Remove general transition for files/dirs created in /etc/mail which got etc_aliases_t label. - Allow postfix_local to read .forward in pcp lib files - Allow pegasus_openlmi_storage_t to read lvm metadata - Add additional fixes for pegasus_openlmi_storage_t - Allow bumblebee to manage debugfs - Make bumblebee as unconfined domain - Allow snmp to read etc_aliases_t - Allow lscpu running in pegasus_openlmi_storage_t to read /dev/mem - Allow pegasus_openlmi_storage_t to read /proc/1/environ - Dontaudit read gconf files for cupsd_config_t - make vmtools as unconfined domain - Add vmtools_helper_t for helper scripts. Allow vmtools shutdonw a host and run ifconfig. - Allow collectd_t to use a mysql database - Allow ipa-otpd to perform DNS name resolution - Added new policy for keepalived - Allow openlmi-service provider to manage transitient units and allow stream connect to sssd - Add additional fixes new pscs-lite+polkit support - Add labeling for /run/krb5kdc - Change w3c_validator_tmp_t to httpd_w3c_validator_tmp_t in F20 - Allow pcscd to read users proc info - Dontaudit smbd_t sending out random signuls - Add boolean to allow openshift domains to use nfs - Allow w3c_validator to create content in /tmp - zabbix_agent uses nsswitch - Allow procmail and dovecot to work together to deliver mail - Allow spamd to execute files in homedir if boolean turned on - Allow openvswitch to listen on port 6634 - Add net_admin capability in collectd policy - Fixed snapperd policy - Fixed bugsfor pcp policy - Allow dbus_system_domains to be started by init - Fixed some interfaces - Add kerberos_keytab_domain attribute - Fix snapperd_conf_t def- Dontaudit rendom domains listing /proc and hittping system_map_t - devicekit_power sends out a signal to all processes on the message bus when power is going down - Modify xdm_write_home to allow create also links as xdm_home_t if the boolean is on true - systemd_tmpfiles_t needs to _setcheckreqprot - Add unconfined_server to be run by init_t when it executes files labeled bin_t, or usr_t, allow all domains to communicate with it - Fixed snapperd policy - Fixed broken interfaces - Should use rw_socket_perms rather then sock_file on a unix_stream_socket - Fixed bugsfor pcp policy - pcscd seems to be using policy kit and looking at domains proc data that transition to it - Allow dbus_system_domains to be started by init - Fixed some interfaces - Addopt corenet rules for unbound-anchor to rpm_script_t - Allow runuser to send send audit messages. - Allow postfix-local to search .forward in munin lib dirs - Allow udisks to connect to D-Bus - Allow spamd to connect to spamd port - Fix syntax error in snapper.te - Dontaudit osad to search gconf home files - Allow rhsmcertd to manage /etc/sysconf/rhn director - Fix pcp labeling to accept /usr/bin for all daemon binaries - Fix mcelog_read_log() interface - Allow iscsid to manage iscsi lib files - Allow snapper domtrans to lvm_t. Add support for /etc/snapper and allow snapperd to manage it. - Allow ABRT to read puppet certs - Allow virtd_lxc_t to specify the label of a socket - New version of docker requires more access- Addopt corenet rules for unbound-anchor to rpm_script_t - Allow runuser to send send audit messages. - Allow postfix-local to search .forward in munin lib dirs - Allow udisks to connect to D-Bus - Allow spamd to connect to spamd port - Fix syntax error in snapper.te - Dontaudit osad to search gconf home files - Allow rhsmcertd to manage /etc/sysconf/rhn director - Fix pcp labeling to accept /usr/bin for all daemon binaries - Fix mcelog_read_log() interface - Allow iscsid to manage iscsi lib files - Allow snapper domtrans to lvm_t. Add support for /etc/snapper and allow snapperd to manage it. - Make tuned_t as unconfined domain for RHEL7.0 - Allow ABRT to read puppet certs - Add sys_time capability for virt-ga - Allow gemu-ga to domtrans to hwclock_t - Allow additional access for virt_qemu_ga_t processes to read system clock and send audit messages - Fix some AVCs in pcp policy - Add to bacula capability setgid and setuid and allow to bind to bacula ports - Changed label from rhnsd_rw_conf_t to rhnsd_conf_t - Add access rhnsd and osad to /etc/sysconfig/rhn - drbdadm executes drbdmeta - Fixes needed for docker - Allow epmd to manage /var/log/rabbitmq/startup_err file - Allow beam.smp connect to amqp port - Modify xdm_write_home to allow create also links as xdm_home_t if the boolean is on true - Allow init_t to manage pluto.ctl because of init_t instead of initrc_t - Allow systemd_tmpfiles_t to manage all non security files on the system - Added labels for bacula ports - Fix label on /dev/vfio/vfio - Add kernel_mounton_messages() interface - init wants to manage lock files for iscsi- Fix /dev/vfio/vfio labeling- Add kernel_mounton_messages() interface - init wants to manage lock files for iscsi - Add support for dey_sapi port - Fixes needed for docker - Allow epmd to manage /var/log/rabbitmq/startup_err file - Allow beam.smp connect to amqp port - drbdadm executes drbdmeta - Added osad policy - Allow postfix to deliver to procmail - Allow vmtools to execute /usr/bin/lsb_release - Allow geoclue to read /etc/passwd - Allow docker to write system net ctrls - Add support for rhnsd unit file - Add dbus_chat_session_bus() interface - Add dbus_stream_connect_session_bus() interface - Fix pcp.te - Fix logrotate_use_nfs boolean - Add lot of pcp fixes found in RHEL7 - fix labeling for pmie for pcp pkg - Change thumb_t to be allowed to chat/connect with session bus type - Add logrotate_use_nfs boolean - Allow setroubleshootd to read rpc sysctl- Allow passwd_t to use ipc_lock, so that it can change the password in gnome-keyring - Allow geoclue to create temporary files/dirs in /tmp - Add httpd_dontaudit_search_dirs boolean - Add support for winbind.service - ALlow also fail2ban-client to read apache logs - Allow vmtools to getattr on all fs- Add net_admin also for systemd_passwd_agent_t - Allow Associate usermodehelper_t to sysfs filesystem - Allow gdm to create /var/gdm with correct labeling - Allow domains to append rkhunterl lib files. #1057982 - Allow systemd_tmpfiles_t net_admin to communicate with journald - update libs_filetrans_named_content() to have support for /usr/lib/debug directory - Adding a new service script to enable setcheckreqprot - Add interface to getattr on an isid_type for any type of file - Allow initrc_t domtrans to authconfig if unconfined is enabled - Add labeling for snapper.log - Allow tumbler to execute dbusd-daemon in thumb_t - Add dbus_exec_dbusd() - Add snapperd_data_t type - Add additional fixes for snapperd - FIx bad calling in samba.te - Allow smbd to create tmpfs - Allow rhsmcertd-worker send signull to rpm process - Allow net_admin capability and send system log msgs - Allow lldpad send dgram to NM - Add networkmanager_dgram_send() - rkhunter_var_lib_t is correct type - Allow openlmi-storage to read removable devices - Allow system cron jobs to manage rkhunter lib files - Add rkhunter_manage_lib_files() - Fix ftpd_use_fusefs boolean to allow manage also symlinks - Allow smbcontrob block_suspend cap2 - Allow slpd to read network and system state info - Allow NM domtrans to iscsid_t if iscsiadm is executed - Allow slapd to send a signal itself - Allow sslget running as pki_ra_t to contact port 8443, the secure port of the CA. - Fix plymouthd_create_log() interface - Add rkhunter policy with files type definition for /var/lib/rkhunter until it is fixed in rkhunter package - Allow postfix and cyrus-imapd to work out of box - Remove logwatch_can_sendmail which is no longer used - Allow fcoemon to talk with unpriv user domain using unix_stream_socket - snapperd is D-Bus service - Allow OpenLMI PowerManagement to call 'systemctl --force reboot'- Add haproxy_connect_any boolean - Allow haproxy also to use http cache port by default - Fix /usr/lib/firefox/plugin-container decl - Allow haproxy to work as simple HTTP proxy. HAProxy For TCP And HTTP Based Applications - Label also /usr/libexec/WebKitPluginProcess as mozilla_plugin_exec_t - Fix type in docker.te - Fix bs_filetrans_named_content() to have support for /usr/lib/debug directory - Adding a new service script to enable setcheckreqprot - Add interface to getattr on an isid_type for any type of file - Allow initrc_t domtrans to authconfig if unconfined is enabled type in docker.te - Add mozilla_plugin_exec_t labeling for /usr/lib/firefox/plugin-container- init calling needs to be optional in domain.te - Allow docker and mount on devpts chr_file - Allow docker to transition to unconfined_t if boolean set - Label also /usr/libexec/WebKitPluginProcess as mozilla_plugin_exec_t - Fix type in docker.te - Add mozilla_plugin_exec_t labeling for /usr/lib/firefox/plugin-container - Allow docker to use the network and build images - Allow docker to read selinux files for labeling, and mount on devpts chr_file - Allow domains that transition to svirt_sandbox to send it signals - Allow docker to transition to unconfined_t if boolean set- New access needed to allow docker + lxc +SELinux to work together - Allow apache to write to the owncloud data directory in /var/www/html... - Cleanup sandbox X AVC's - Allow consolekit to create log dir - Add support for icinga CGI scripts - Add support for icinga - Allow kdumpctl_t to create kdump lock file - Allow kdump to create lnk lock file - Allow ABRT write core_pattern - Allwo ABRT to read core_pattern - Add policy for Geoclue. Geoclue is a D-Bus service that provides location information - Allow nscd_t block_suspen capability - Allow unconfined domain types to manage own transient unit file - Allow systemd domains to handle transient init unit files - No longer need the rpm_script_roles line since rpm_transition_script now does this for us - Add/fix interfaces for usermodehelper_t - Add interfaces to handle transient - Fixes for new usermodehelper and proc_securit_t types, added to increase security on /proc and /sys file systems- Add cron unconfined role support for uncofined SELinux user - Call kernel_rw_usermodehelper_state() in init.te - Call corenet_udp_bind_all_ports() in milter.te - Allow fence_virtd to connect to zented port - Fix header for mirrormanager_admin() - Allow dkim-milter to bind udp ports - Allow milter domains to send signull itself - Allow block_suspend for yum running as mock_t - Allow beam.smp to manage couchdb files - Add couchdb_manage_files() - Add labeling for /var/log/php_errors.log - Allow bumblebee to stream connect to xserver - Allow bumblebee to send a signal to xserver - gnome-thumbnail to stream connect to bumblebee - Fix calling usermodehelper to use _state in interface name - Allow xkbcomp running as bumblebee_t to execute bin_t - Allow logrotate to read squid.conf - Additional rules to get docker and lxc to play well with SELinux - Call kernel_read_usermodhelper/kernel_rw_usermodhelper - Make rpm_transition_script accept a role - Added new policy for pcp - Allow bumbleed to connect to xserver port - Allow pegasus_openlmi_storage_t to read hwdata- Make rpm_transition_script accept a role - Clean up pcp.te - Added new policy for pcp - Allow bumbleed to connect to xserver port - Added support for named-sdb in bind policy - Allow NetworkManager to signal and sigkill init scripts - Allow pegasus_openlmi_storage_t to read hwdata - Fix rhcs_rw_cluster_tmpfs() - Allow fenced_t to bind on zented udp port - Fix mirrormanager_read_lib_files() - Allow mirromanager scripts running as httpd_t to manage mirrormanager pid files - Dontaudit read/write to init stream socket for lsmd_plugin_t - Allow automount to read nfs link files - Allow lsm plugins to read/write lsmd stream socket - Allow svirt_lxc domains to umount dockersocket filesytem - Allow gnome keyring domains to create gnome config dirs - Allow rpm scritplets to create /run/gather with correct labeling - Add sblim_filetrans_named_content() interface - Allow ctdb to create sock files in /var/run/ctdb - Add also labeling for /var/run/ctdb - Add missing labeling for /var/lib/ctdb - ALlow tuned to manage syslog.conf. Should be fixed in tuned. #1030446 - Dontaudit hypervkvp to search homedirs - Dontaudit hypervkvp to search admin homedirs - Allow hypervkvp to execute bin_t and ifconfig in the caller domain - Dontaudit xguest_t to read ABRT conf files - Add abrt_dontaudit_read_config() - Allow namespace-init to getattr on fs - Add thumb_role() also for xguest - Add filename transitions to create .spamassassin with correct labeling - Allow apache domain to read mirrormanager pid files - Allow domains to read/write shm and sem owned by mozilla_plugin_t - Allow alsactl to send a generic signal to kernel_t - Allow plymouthd to read run/udev/queue.bin - Allow sys_chroot for NM required by iodine service - Change glusterd to allow mounton all non security - Labeled ~/.nv/GLCache as being gstreamer output - Restrict the ability to set usermodehelpers and proc security settings. - Limit the ability to write to the files that configure kernel i - usermodehelpers and security-sensitive proc settings to the init domain. i - Permissive domains can also continue to set these values. - The current list is not exhaustive, just an initial set. - Not all of these files will exist on all kernels/devices. - Controlling access to certain kernel usermodehelpers, e.g. cgroup - release_agent, will require kernel changes to support and cannot be - addressed here. - Ideas come from Stephen Smalley and seandroid - Make rpm_transition_script accept a role - Make rpm_transition_script accept a role - Allow NetworkManager to signal and sigkill init scripts - Allow init_t to work on transitient and snapshot unit files - Add logging_manage_syslog_config() - Update sysnet_dns_name_resolve() to allow connect to dnssec port- Remove file_t from the system and realias it with unlabeled_t- Add gluster fixes - Remove ability to transition to unconfined_t from confined domains - Additional allow rules to get libvirt-lxc containers working with docker- passwd to create gnome-keyring passwd socket - systemd_systemctl needs sys_admin capability - Allow cobbler to search dhcp_etc_t directory - Allow sytemd_tmpfiles_t to delete all directories - allow sshd to write to all process levels in order to change passwd when running at a level - Allow updpwd_t to downgrade /etc/passwd file to s0, if it is not running with this range - Allow apcuspd_t to status and start the power unit file - Allow udev to manage kdump unit file - Added new interface modutils_dontaudit_exec_insmod - Add labeling for /var/lib/servicelog/servicelog.db-journal - Allow init_t to create tmpfs_t lnk_file - Add label for ~/.cvsignore - Allow fprintd_t to send syslog messages - Add zabbix_var_lib_t for /var/lib/zabbixsrv, also allow zabix to connect to smtp port - Allow mozilla plugin to chat with policykit, needed for spice - Allow gssprozy to change user and gid, as well as read user keyrings - Allow sandbox apps to attempt to set and get capabilties - Label upgrades directory under /var/www as httpd_sys_rw_content_t, add other filetrans rules to label content correctly - allow modemmanger to read /dev/urand - Allow polipo to connect to http_cache_ports - Allow cron jobs to manage apache var lib content - Allow yppassword to manage the passwd_file_t - Allow showall_t to send itself signals - Allow cobbler to restart dhcpc, dnsmasq and bind services - Allow rsync_t to manage all non auth files - Allow certmonger to manage home cert files - Allow user_mail_domains to write certain files to the /root and ~/ directories - Allow apcuspd_t to status and start the power unit file - Allow cgroupdrulesengd to create content in cgoups directories - Add new access for mythtv - Allow irc_t to execute shell and bin-t files: - Allow smbd_t to signull cluster - Allow sssd to read systemd_login_var_run_t - Allow gluster daemon to create fifo files in glusterd_brick_t and sock_file in glusterd_var_lib_t - Add label for /var/spool/cron.aquota.user - Allow sandbox_x domains to use work with the mozilla plugin semaphore - Added new policy for speech-dispatcher - Added dontaudit rule for insmod_exec_t in rasdaemon policy - Updated rasdaemon policy - Allow virt_domains to read cert files - Allow system_mail_t to transition to postfix_postdrop_t - Clean up mirrormanager policy - Allow subscription-manager running as sosreport_t to manage rhsmcertd - Remove ability to do mount/sys_admin by default in virt_sandbox domains - New rules required to run docker images within libivrt - Fixed bumblebee_admin() and mip6d_admin() - Add log support for sensord - Add label for ~/.cvsignore - Change mirrormanager to be run by cron - Add mirrormanager policy - Additional fixes for docker.te - Allow cobblerd to read/write undionly.kpxe located in /var/lib/tftpboot - Add tftp_write_rw_content/tftp_read_rw_content interfaces - Allow amanda to do backups over UDP- Allow freeipmi_ipmidetectd_t to use freeipmi port - Update freeipmi_domain_template() - Allow journalctl running as ABRT to read /run/log/journal - Allow NM to read dispatcher.d directory - Update freeipmi policy - Type transitions with a filename not allowed inside conditionals - Allow tor to bind to hplip port - Make new type to texlive files in homedir - Allow zabbix_agent to transition to dmidecode - Add rules for docker - Allow sosreport to send signull to unconfined_t - Add virt_noatsecure and virt_rlimitinh interfaces - Fix labeling in thumb.fc to add support for /usr/lib64/tumbler-1/tumblerddd support for freeipmi port - Add sysadm_u_default_contexts - Add logging_read_syslog_pid() - Fix userdom_manage_home_texlive() interface - Make new type to texlive files in homedir - Add filename transitions for /run and /lock links - Allow virtd to inherit rlimit information- DRM master and input event devices are used by the TakeDevice API - Clean up bumblebee policy - Update pegasus_openlmi_storage_t policy - opensm policy clean up - openwsman policy clean up - ninfod policy clean up - Allow conman to connect to freeipmi services and clean up conman policy - Allow conmand just bind on 7890 port - Add freeipmi_stream_connect() interface - Allow logwatch read madm.conf to support RAID setup - Add raid_read_conf_files() interface - Allow up2date running as rpm_t create up2date log file with rpm_log_t labeling - add rpm_named_filetrans_log_files() interface - Added policy for conmand - Allow dkim-milter to create files/dirs in /tmp - update freeipmi policy - Add policy for freeipmi services - Added rdisc_admin and rdisc_systemctl interfaces - Fix aliases in pegasus.te - Allow chrome sandbox to read generic cache files in homedir - Dontaudit mandb searching all mountpoints - Make sure wine domains create .wine with the correct label - Add proper aliases for pegasus_openlmi_services_exec_t and pegasus_openlmi_services_t - Allow windbind the kill capability - DRM master and input event devices are used by the TakeDevice API - add dev_rw_inherited_dri() and dev_rw_inherited_input_dev() - Added support for default conman port - Add interfaces for ipmi devices - Make sure wine domains create .wine with the correct label - Allow manage dirs in kernel_manage_debugfs interface. - Allow systemctl running in ipsec_mgmt_t to access /usr/lib/systemd/system/ipsec.service - Label /usr/lib/systemd/system/ipsec.service as ipsec_mgmt_unit_file_t - Fix userdom_confined_admin_template() - Add back exec_content boolean for secadm, logadm, auditadm - Fix files_filetrans_system_db_named_files() interface - Allow sulogin to getattr on /proc/kcore - Add filename transition also for servicelog.db-journal - Add files_dontaudit_access_check_root() - Add lvm_dontaudit_access_check_lock() interface - Allow mount to manage mount_var_run_t files/dirs- Add back fixes for gnome_role_template() - Label /usr/sbin/htcacheclean as httpd_exec_t - Add missing alias for pegasus_openlmi_service_exec_t - Added support for rdisc unit file - Added new policy for ninfod - Added new policy for openwsman - Add antivirus_db_t labeling for /var/lib/clamav-unofficial-sigs - Allow runuser running as logrotate connections to system DBUS - Add connectto perm for NM unix stream socket - Allow watchdog to be executed from cron - Allow cloud_init to transition to rpm_script_t - Allow lsmd_plugin_t send system log messages - Label /var/log/up2date as rpm_log_t and allow sosreport to manage rpm log/pid/cache files which is a part of ABRT policy for sosreport running as abrt_t - Added new capabilities for mip6d policy - Label bcache devices as fixed_disk_device_t - Allow systemctl running in ipsec_mgmt_t to access /usr/lib/systemd/system/ipsec.service - label /usr/lib/systemd/system/ipsec.service as ipsec_mgmt_unit_file_t- Add lsmd_plugin_t for lsm plugins - Allow dovecot-deliver to search mountpoints - Add labeling for /etc/mdadm.conf - Allow opelmi admin providers to dbus chat with init_t - Allow sblim domain to read /dev/urandom and /dev/random - Add back exec_content boolean for secadm, logadm, auditadm - Allow sulogin to getattr on /proc/kcore- Add filename transition also for servicelog.db-journal - Add files_dontaudit_access_check_root() - Add lvm_dontaudit_access_check_lock() interface - Allow mount to manage mount_var_run_t files/dirs - Allow updapwd_t to ignore mls levels for writign shadow_t at a lower level - Make sure boot.log is created with the correct label - call logging_relabel_all_log_dirs() in systemd.te - Allow systemd_tmpfiles to relabel log directories - Allow staff_t to run frequency command - Allow staff_t to read xserver_log file - This reverts commit c0f9f125291f189271cbbca033f87131dab1e22f. - Label hsperfdata_root as tmp_t - Add plymouthd_create_log() - Dontaudit leaks from openshift domains into mail domains, needs back port to RHEL6 - Allow sssd to request the kernel loads modules - Allow gpg_agent to use ssh-add - Allow gpg_agent to use ssh-add - Dontaudit access check on /root for myslqd_safe_t - Add glusterd_brick_t files type - Allow ctdb to getattr on al filesystems - Allow abrt to stream connect to syslog - Allow dnsmasq to list dnsmasq.d directory - Watchdog opens the raw socket - Allow watchdog to read network state info - Dontaudit access check on lvm lock dir - Allow sosreport to send signull to setroubleshootd - Add setroubleshoot_signull() interface - Fix ldap_read_certs() interface - Allow sosreport all signal perms - Allow sosreport to run systemctl - Allow sosreport to dbus chat with rpm - Allow zabbix_agentd to read all domain state - Allow sblim_sfcbd_t to read from /dev/random and /dev/urandom - Allow smoltclient to execute ldconfig - Allow sosreport to request the kernel to load a module - Clean up rtas.if - Clean up docker.if - drop /var/lib/glpi/files labeling in cron.fc - Added new policy for rasdaemon - Add apache labeling for glpi - Allow pegasus to transition to dmidecode - Make sure boot.log is created with the correct label - Fix typo in openshift.te - remove dup bumblebee_systemctl() - Allow watchdog to read /etc/passwd - Allow condor domains to read/write condor_master udp_socket - Allow openshift_cron_t to append to openshift log files, label /var/log/openshift - Add back file_pid_filetrans for /var/run/dlm_controld - Allow smbd_t to use inherited tmpfs content - Allow mcelog to use the /dev/cpu device - sosreport runs rpcinfo - sosreport runs subscription-manager - Allow setpgid for sosreport - Allow browser plugins to connect to bumblebee - New policy for bumblebee and freqset - Add new policy for mip6d daemon - Add new policy for opensm daemon- Add back /dev/shm labeling- Fix gnome_role_template() interface- Add policy-rawhide-contrib-apache-content.patch to re-write apache_content_template() by dwalsh- Fix config.tgz to include lxc_contexts and systemd_contexts- Update to upstream- Fix passenger_stream_connect interface - setroubleshoot_fixit wants to read network state - Allow procmail_t to connect to dovecot stream sockets - Allow cimprovagt service providers to read network states - Add labeling for /var/run/mariadb - pwauth uses lastlog() to update system's lastlog - Allow account provider to read login records - Add support for texlive2013 - More fixes for user config files to make crond_t running in userdomain - Add back disable/reload/enable permissions for system class - Fix manage_service_perms macro - Allow passwd_t to connect to gnome keyring to change password - Update mls config files to have cronjobs in the user domains - Remove access checks that systemd does not actually do- Add support for yubikey in homedir - Add support for upd/3052 port - Allow apcupsd to use PowerChute Network Shutdown - Allow lsmd to execute various lsmplugins - Add labeling also for /etc/watchdog\.d where are watchdog scripts located too - Update gluster_export_all_rw boolean to allow relabel all base file types - Allow x86_energy_perf tool to modify the MSR - Fix /var/lib/dspam/data labeling- Add files_relabel_base_file_types() interface - Allow netlabel-config to read passwd - update gluster_export_all_rw boolean to allow relabel all base file types caused by lsetxattr() - Allow x86_energy_perf tool to modify the MSR - Fix /var/lib/dspam/data labeling - Allow pegasus to domtrans to mount_t - Add labeling for unconfined scripts in /usr/libexec/watchdog/scripts - Add support for unconfined watchdog scripts - Allow watchdog to manage own log files- Add label only for redhat.repo instead of /etc/yum.repos.d. But probably we will need to switch for the directory. - Label /etc/yum.repos.d as system_conf_t - Use sysnet_filetrans_named_content in udev.te instead of generic transition for net_conf_t - Allow dac_override for sysadm_screen_t - Allow init_t to read ipsec_conf_t as we had it for initrc_t. Needed by ipsec unit file. - Allow netlabel-config to read meminfo - Add interface to allow docker to mounton file_t - Add new interface to exec unlabeled files - Allow lvm to use docker semaphores - Setup transitons for .xsessions-errors.old - Change labels of files in /var/lib/*/.ssh to transition properly - Allow staff_t and user_t to look at logs using journalctl - pluto wants to manage own log file - Allow pluto running as ipsec_t to create pluto.log - Fix alias decl in corenetwork.te.in - Add support for fuse.glusterfs - Allow dmidecode to read/write /run/lock/subsys/rhsmcertd - Allow rhsmcertd to manage redhat.repo which is now labeled as system.conf. Allow rhsmcertd to manage all log files. - Additional access for docker - Added more rules to sblim policy - Fix kdumpgui_run_bootloader boolean - Allow dspam to connect to lmtp port - Included sfcbd service into sblim policy - rhsmcertd wants to manaage /etc/pki/consumer dir - Add kdumpgui_run_bootloader boolean - Add support for /var/cache/watchdog - Remove virt_domain attribute for virt_qemu_ga_unconfined_t - Fixes for handling libvirt containes - Dontaudit attempts by mysql_safe to write content into / - Dontaudit attempts by system_mail to modify network config - Allow dspam to bind to lmtp ports - Add new policy to allow staff_t and user_t to look at logs using journalctl - Allow apache cgi scripts to list sysfs - Dontaudit attempts to write/delete user_tmp_t files - Allow all antivirus domains to manage also own log dirs - Allow pegasus_openlmi_services_t to stream connect to sssd_t- Add missing permission checks for nscd- Fix alias decl in corenetwork.te.in - Add support for fuse.glusterfs - Add file transition rules for content created by f5link - Rename quantum_port information to neutron - Allow all antivirus domains to manage also own log dirs - Rename quantum_port information to neutron - Allow pegasus_openlmi_services_t to stream connect to sssd_t- Allow sysadm_t to read login information - Allow systemd_tmpfiles to setattr on var_log_t directories - Udpdate Makefile to include systemd_contexts - Add systemd_contexts - Add fs_exec_hugetlbfs_files() interface - Add daemons_enable_cluster_mode boolean - Fix rsync_filetrans_named_content() - Add rhcs_read_cluster_pid_files() interface - Update rhcs.if with additional interfaces from RHEL6 - Fix rhcs_domain_template() to not create run dirs with cluster_var_run_t - Allow glusterd_t to mounton glusterd_tmp_t - Allow glusterd to unmout al filesystems - Allow xenstored to read virt config - Add label for swift_server.lock and make add filetrans_named_content to make sure content gets created with the correct label - Allow mozilla_plugin_t to mmap hugepages as an executable- Add back userdom_security_admin_template() interface and use it for sysadm_t if sysadm_secadm.pp- Allow sshd_t to read openshift content, needs backport to RHEL6.5 - Label /usr/lib64/sasl2/libsasldb.so.3.0.0 as textrel_shlib_t - Make sur kdump lock is created with correct label if kdumpctl is executed - gnome interface calls should always be made within an optional_block - Allow syslogd_t to connect to the syslog_tls port - Add labeling for /var/run/charon.ctl socket - Add kdump_filetrans_named_content() - Allo setpgid for fenced_t - Allow setpgid and r/w cluster tmpfs for fenced_t - gnome calls should always be within optional blocks - wicd.pid should be labeled as networkmanager_var_run_t - Allow sys_resource for lldpad- Add rtas policy- Allow mailserver_domains to manage and transition to mailman data - Dontaudit attempts by mozilla plugin to relabel content, caused by using mv and cp commands - Allow mailserver_domains to manage and transition to mailman data - Allow svirt_domains to read sysctl_net_t - Allow thumb_t to use tmpfs inherited from the user - Allow mozilla_plugin to bind to the vnc port if running with spice - Add new attribute to discover confined_admins and assign confined admin to it - Fix zabbix to handle attributes in interfaces - Fix zabbix to read system states for all zabbix domains - Fix piranha_domain_template() - Allow ctdbd to create udp_socket. Allow ndmbd to access ctdbd var files. - Allow lldpad sys_rouserce cap due to #986870 - Allow dovecot-auth to read nologin - Allow openlmi-networking to read /proc/net/dev - Allow smsd_t to execute scripts created on the fly labeled as smsd_spool_t - Add zabbix_domain attribute for zabbix domains to treat them together - Add labels for zabbix-poxy-* (#1018221) - Update openlmi-storage policy to reflect #1015067 - Back port piranha tmpfs fixes from RHEL6 - Update httpd_can_sendmail boolean to allow read/write postfix spool maildrop - Add postfix_rw_spool_maildrop_files interface - Call new userdom_admin_user_templat() also for sysadm_secadm.pp - Fix typo in userdom_admin_user_template() - Allow SELinux users to create coolkeypk11sE-Gate in /var/cache/coolkey - Add new attribute to discover confined_admins - Fix labeling for /etc/strongswan/ipsec.d - systemd_logind seems to pass fd to anyone who dbus communicates with it - Dontaudit leaked write descriptor to dmesg- Fix gnome_read_generic_data_home_files() - allow openshift_cgroup_t to read/write inherited openshift file types - Remove httpd_cobbler_content * from cobbler_admin interface - Allow svirt sandbox domains to setattr on chr_file and blk_file svirt_sandbox_file_t, so sshd will work within a container - Allow httpd_t to read also git sys content symlinks - Allow init_t to read gnome home data - Dontaudit setroubleshoot_fixit_t execmem, since it does not seem to really need it. - Allow virsh to execute systemctl - Fix for nagios_services plugins - add type defintion for ctdbd_var_t - Add support for /var/ctdb. Allow ctdb block_suspend and read /etc/passwd file - Allow net_admin/netlink_socket all hyperv_domain domains - Add labeling for zarafa-search.log and zarafa-search.pid - Fix hypervkvp.te - Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type - Fix logging policy - Allow syslog to bind to tls ports - Update labeling for /dev/cdc-wdm - Allow to su_domain to read init states - Allow init_t to read gnome home data - Make sure if systemd_logind creates nologin file with the correct label - Clean up ipsec.te- Add auth_exec_chkpwd interface - Fix port definition for ctdb ports - Allow systemd domains to read /dev/urand - Dontaudit attempts for mozilla_plugin to append to /dev/random - Add label for /var/run/charon.* - Add labeling for /usr/lib/systemd/system/lvm2.*dd policy for motion service - Fix for nagios_services plugins - Fix some bugs in zoneminder policy - add type defintion for ctdbd_var_t - Add support for /var/ctdb. Allow ctdb block_suspend and read /etc/passwd file - Allow net_admin/netlink_socket all hyperv_domain domains - Add labeling for zarafa-search.log and zarafa-search.pid - glusterd binds to random unreserved ports - Additional allow rules found by testing glusterfs - apcupsd needs to send a message to all users on the system so needs to look them up - Fix the label on ~/.juniper_networks - Dontaudit attempts for mozilla_plugin to append to /dev/random - Allow polipo_daemon to connect to flash ports - Allow gssproxy_t to create replay caches - Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type- init reload from systemd_localed_t - Allow domains that communicate with systemd_logind_sessions to use systemd_logind_t fd - Allow systemd_localed_t to ask systemd to reload the locale. - Add systemd_runtime_unit_file_t type for unit files that systemd creates in memory - Allow readahead to read /dev/urand - Fix lots of avcs about tuned - Any file names xenstored in /var/log should be treated as xenstored_var_log_t - Allow tuned to inderact with hugepages - Allow condor domains to list etc rw dirs- Fix nscd_shm_use() - Add initial policy for /usr/sbin/hypervvssd in hypervkvp policy which should be renamed to hyperv. Also add hyperv_domain attribute to treat these HyperV services. - Add hypervkvp_unit_file_t type - Add additional fixes forpegasus_openlmi_account_t - Allow mdadm to read /dev/urand - Allow pegasus_openlmi_storage_t to create mdadm.conf and write it - Add label/rules for /etc/mdadm.conf - Allow pegasus_openlmi_storage_t to transition to fsadm_t - Fixes for interface definition problems - Dontaudit dovecot-deliver to gettatr on all fs dirs - Allow domains to search data_home_t directories - Allow cobblerd to connect to mysql - Allow mdadm to r/w kdump lock files - Add support for kdump lock files - Label zarafa-search as zarafa-indexer - Openshift cgroup wants to read /etc/passwd - Add new sandbox domains for kvm - Allow mpd to interact with pulseaudio if mpd_enable_homedirs is turned on - Fix labeling for /usr/lib/systemd/system/lvm2.* - Add labeling for /usr/lib/systemd/system/lvm2.* - Fix typos to get a new build. We should not cover filename trans rules to prevent duplicate rules - Add sshd_keygen_t policy for sshd-keygen - Fix alsa_home_filetrans interface name and definition - Allow chown for ssh_keygen_t - Add fs_dontaudit_getattr_all_dirs() - Allow init_t to manage etc_aliases_t and read xserver_var_lib_t and chrony keys - Fix up patch to allow systemd to manage home content - Allow domains to send/recv unlabeled traffic if unlabelednet.pp is enabled - Allow getty to exec hostname to get info - Add systemd_home_t for ~/.local/share/systemd directory- Fix lxc labeling in config.tgz- Fix labeling for /usr/libexec/kde4/kcmdatetimehelper - Allow tuned to search all file system directories - Allow alsa_t to sys_nice, to get top performance for sound management - Add support for MySQL/PostgreSQL for amavis - Allow openvpn_t to manage openvpn_var_log_t files. - Allow dirsrv_t to create tmpfs_t directories - Allow dirsrv to create dirs in /dev/shm with dirsrv_tmpfs label - Dontaudit leaked unix_stream_sockets into gnome keyring - Allow telepathy domains to inhibit pipes on telepathy domains - Allow cloud-init to domtrans to rpm - Allow abrt daemon to manage abrt-watch tmp files - Allow abrt-upload-watcher to search /var/spool directory - Allow nsswitch domains to manage own process key - Fix labeling for mgetty.* logs - Allow systemd to dbus chat with upower - Allow ipsec to send signull to itself - Allow setgid cap for ipsec_t - Match upstream labeling- Do not build sanbox pkg on MLS- wine_tmp is no longer needed - Allow setroubleshoot to look at /proc - Allow telepathy domains to dbus with systemd logind - Fix handling of fifo files of rpm - Allow mozilla_plugin to transition to itself - Allow certwatch to write to cert_t directories - New abrt application - Allow NetworkManager to set the kernel scheduler - Make wine_domain shared by all wine domains - Allow mdadm_t to read images labeled svirt_image_t - Allow amanda to read /dev/urand - ALlow my_print_default to read /dev/urand - Allow mdadm to write to kdumpctl fifo files - Allow nslcd to send signull to itself - Allow yppasswd to read /dev/urandom - Fix zarafa_setrlimit - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add additional alias for user_tmp_t because wine_tmp_t is no longer used - More handling of ther kernel keyring required by kerberos - New privs needed for init_t when running without transition to initrc_t over bin_t, and without unconfined domain installed- Dontaudit attempts by sosreport to read shadow_t - Allow browser sandbox plugins to connect to cups to print - Add new label mpd_home_t - Label /srv/www/logs as httpd_log_t - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add labels for apache logs under miq package - Allow irc_t to use tcp sockets - fix labels in puppet.if - Allow tcsd to read utmp file - Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to access host keys - Define svirt_socket_t as a domain_type - Take away transition from init_t to initrc_t when executing bin_t, allow init_t to run chk_passwd_t - Fix label on pam_krb5 helper apps- Allow ldconfig to write to kdumpctl fifo files - allow neutron to connect to amqp ports - Allow kdump_manage_crash to list the kdump_crash_t directory - Allow glance-api to connect to amqp port - Allow virt_qemu_ga_t to read meminfo - Add antivirus_home_t type for antivirus date in HOMEDIRS - Allow mpd setcap which is needed by pulseaudio - Allow smbcontrol to create content in /var/lib/samba - Allow mozilla_exec_t to be used as a entrypoint to mozilla_domtrans_spec - Add additional labeling for qemu-ga/fsfreeze-hook.d scripts - amanda_exec_t needs to be executable file - Allow block_suspend cap for samba-net - Allow apps that read ipsec_mgmt_var_run_t to search ipsec_var_run_t - Allow init_t to run crash utility - Treat usr_t just like bin_t for transitions and executions - Add port definition of pka_ca to port 829 for openshift - Allow selinux_store to use symlinks- Allow block_suspend cap for samba-net - Allow t-mission-control to manage gabble cache files - Allow nslcd to read /sys/devices/system/cpu - Allow selinux_store to use symlinks- Allow xdm_t to transition to itself - Call neutron interfaces instead of quantum - Allow init to change targed role to make uncofined services (xrdp which now has own systemd unit file) working. We want them to have in unconfined_t - Make sure directories in /run get created with the correct label - Make sure /root/.pki gets created with the right label - try to remove labeling for motion from zoneminder_exec_t to bin_t - Allow inetd_t to execute shell scripts - Allow cloud-init to read all domainstate - Fix to use quantum port - Add interface netowrkmanager_initrc_domtrans - Fix boinc_execmem - Allow t-mission-control to read gabble cache home - Add labeling for ~/.cache/telepathy/avatars/gabble - Allow memcache to read sysfs data - Cleanup antivirus policy and add additional fixes - Add boolean boinc_enable_execstack - Add support for couchdb in rabbitmq policy - Add interface couchdb_search_pid_dirs - Allow firewalld to read NM state - Allow systemd running as git_systemd to bind git port - Fix mozilla_plugin_rw_tmpfs_files()- Split out rlogin ports from inetd - Treat files labeld as usr_t like bin_t when it comes to transitions - Allow staff_t to read login config - Allow ipsec_t to read .google authenticator data - Allow systemd running as git_systemd to bind git port - Fix mozilla_plugin_rw_tmpfs_files() - Call the correct interface - corenet_udp_bind_ktalkd_port() - Allow all domains that can read gnome_config to read kde config - Allow sandbox domain to read/write mozilla_plugin_tmpfs_t so pulseaudio will work - Allow mdadm to getattr any file system - Allow a confined domain to executes mozilla_exec_t via dbus - Allow cupsd_lpd_t to bind to the printer port - Dontaudit attempts to bind to ports < 1024 when nis is turned on - Allow apache domain to connect to gssproxy socket - Allow rlogind to bind to the rlogin_port - Allow telnetd to bind to the telnetd_port - Allow ktalkd to bind to the ktalkd_port - Allow cvs to bind to the cvs_port- Cleanup related to init_domain()+inetd_domain fixes - Use just init_domain instead of init_daemon_domain in inetd_core_service_domain - svirt domains neeed to create kobject_uevint_sockets - Lots of new access required for sosreport - Allow tgtd_t to connect to isns ports - Allow init_t to transition to all inetd domains: - openct needs to be able to create netlink_object_uevent_sockets - Dontaudit leaks into ldconfig_t - Dontaudit su domains getattr on /dev devices, move su domains to attribute based calls - Move kernel_stream_connect into all Xwindow using users - Dontaudit inherited lock files in ifconfig o dhcpc_t- Also sock_file trans rule is needed in lsm - Fix labeling for fetchmail pid files/dirs - Add additional fixes for abrt-upload-watch - Fix polipo.te - Fix transition rules in asterisk policy - Add fowner capability to networkmanager policy - Allow polipo to connect to tor ports - Cleanup lsmd.if - Cleanup openhpid policy - Fix kdump_read_crash() interface - Make more domains as init domain - Fix cupsd.te - Fix requires in rpm_rw_script_inherited_pipes - Fix interfaces in lsm.if - Allow munin service plugins to manage own tmpfs files/dirs - Allow virtd_t also relabel unix stream sockets for virt_image_type - Make ktalk as init domain - Fix to define ktalkd_unit_file_t correctly - Fix ktalk.fc - Add systemd support for talk-server - Allow glusterd to create sock_file in /run - Allow xdm_t to delete gkeyringd_tmp_t files on logout - Add fixes for hypervkvp policy - Add logwatch_can_sendmail boolean - Allow mysqld_safe_t to handle also symlinks in /var/log/mariadb - Allow xdm_t to delete gkeyringd_tmp_t files on logout- Add selinux-policy-sandbox pkg0 - Allow rhsmcertd to read init state - Allow fsetid for pkcsslotd - Fix labeling for /usr/lib/systemd/system/pkcsslotd.service - Allow fetchmail to create own pid with correct labeling - Fix rhcs_domain_template() - Allow roles which can run mock to read mock lib files to view results - Allow rpcbind to use nsswitch - Fix lsm.if summary - Fix collectd_t can read /etc/passwd file - Label systemd unit files under dracut correctly - Add support for pam_mount to mount user's encrypted home When a user logs in and logs out using ssh - Add support for .Xauthority-n - Label umount.crypt as lvm_exec_t - Allow syslogd to search psad lib files - Allow ssh_t to use /dev/ptmx - Make sure /run/pluto dir is created with correct labeling - Allow syslog to run shell and bin_t commands - Allow ip to relabel tun_sockets - Allow mount to create directories in files under /run - Allow processes to use inherited fifo files- Add policy for lsmd - Add support for /var/log/mariadb dir and allow mysqld_safe to list this directory - Update condor_master rules to allow read system state info and allow logging - Add labeling for /etc/condor and allow condor domain to write it (bug) - Allow condor domains to manage own logs - Allow glusterd to read domains state - Fix initial hypervkvp policy - Add policy for hypervkvpd - Fix redis.if summary- Allow boinc to connect to @/tmp/.X11-unix/X0 - Allow beam.smp to connect to tcp/5984 - Allow named to manage own log files - Add label for /usr/libexec/dcc/start-dccifd and domtrans to dccifd_t - Add virt_transition_userdomain boolean decl - Allow httpd_t to sendto unix_dgram sockets on its children - Allow nova domains to execute ifconfig - bluetooth wants to create fifo_files in /tmp - exim needs to be able to manage mailman data - Allow sysstat to getattr on all file systems - Looks like bluetoothd has moved - Allow collectd to send ping packets - Allow svirt_lxc domains to getpgid - Remove virt-sandbox-service labeling as virsh_exec_t, since it no longer does virsh_t stuff - Allow frpintd_t to read /dev/urandom - Allow asterisk_t to create sock_file in /var/run - Allow usbmuxd to use netlink_kobject - sosreport needs to getattr on lots of devices, and needs access to netlink_kobject_uevent_socket - More cleanup of svirt_lxc policy - virtd_lxc_t now talks to dbus - Dontaudit leaked ptmx_t - Allow processes to use inherited fifo files - Allow openvpn_t to connect to squid ports - Allow prelink_cron_system_t to ask systemd to reloaddd miscfiles_dontaudit_access_check_cert() - Allow ssh_t to use /dev/ptmx - Make sure /run/pluto dir is created with correct labeling - Allow syslog to run shell and bin_t commands - Allow ip to relabel tun_sockets - Allow mount to create directories in files under /run - Allow processes to use inherited fifo files - Allow user roles to connect to the journal socket- selinux_set_enforce_mode needs to be used with type - Add append to the dontaudit for unix_stream_socket of xdm_t leak - Allow xdm_t to create symlinks in log direcotries - Allow login programs to read afs config - Label 10933 as a pop port, for dovecot - New policy to allow selinux_server.py to run as semanage_t as a dbus service - Add fixes to make netlabelctl working on MLS - AVCs required for running sepolicy gui as staff_t - Dontaudit attempts to read symlinks, sepolicy gui is likely to cause this type of AVC - New dbus server to be used with new gui - After modifying some files in /etc/mail, I saw this needed on the next boot - Loading a vm from /usr/tmp with virt-manager - Clean up oracleasm policy for Fedora - Add oracleasm policy written by rlopez@redhat.com - Make postfix_postdrop_t as mta_agent to allow domtrans to system mail if it is executed by apache - Add label for /var/crash - Allow fenced to domtrans to sanclok_t - Allow nagios to manage nagios spool files - Make tfptd as home_manager - Allow kdump to read kcore on MLS system - Allow mysqld-safe sys_nice/sys_resource caps - Allow apache to search automount tmp dirs if http_use_nfs is enabled - Allow crond to transition to named_t, for use with unbound - Allow crond to look at named_conf_t, for unbound - Allow mozilla_plugin_t to transition its home content - Allow dovecot_domain to read all system and network state - Allow httpd_user_script_t to call getpw - Allow semanage to read pid files - Dontaudit leaked file descriptors from user domain into thumb - Make PAM authentication working if it is enabled in ejabberd - Add fixes for rabbit to fix ##992920,#992931 - Allow glusterd to mount filesystems - Loading a vm from /usr/tmp with virt-manager - Trying to load a VM I got an AVC from devicekit_disk for loopcontrol device - Add fix for pand service - shorewall touches own log - Allow nrpe to list /var - Mozilla_plugin_roles can not be passed into lpd_run_lpr - Allow afs domains to read afs_config files - Allow login programs to read afs config - Allow virt_domain to read virt_var_run_t symlinks - Allow smokeping to send its process signals - Allow fetchmail to setuid - Add kdump_manage_crash() interface - Allow abrt domain to write abrt.socket- Add more aliases in pegasus.te - Add more fixes for *_admin interfaces - Add interface fixes - Allow nscd to stream connect to nmbd - Allow gnupg apps to write to pcscd socket - Add more fixes for openlmi provides. Fix naming and support for additionals - Allow fetchmail to resolve host names - Allow firewalld to interact also with lnk files labeled as firewalld_etc_rw_t - Add labeling for cmpiLMI_Fan-cimprovagt - Allow net_admin for glusterd - Allow telepathy domain to create dconf with correct labeling in /home/userX/.cache/ - Add pegasus_openlmi_system_t - Fix puppet_domtrans_master() to make all puppet calling working in passenger.te - Fix corecmd_exec_chroot() - Fix logging_relabel_syslog_pid_socket interface - Fix typo in unconfineduser.te - Allow system_r to access unconfined_dbusd_t to run hp_chec- Allow xdm_t to act as a dbus client to itsel - Allow fetchmail to resolve host names - Allow gnupg apps to write to pcscd socket - Add labeling for cmpiLMI_Fan-cimprovagt - Allow net_admin for glusterd - Allow telepathy domain to create dconf with correct labeling in /home/userX/.cache/ - Add pegasus_openlmi_system_t - Fix puppet_domtrans_master() to make all puppet calling working in passenger.te -httpd_t does access_check on certs- Add support for cmpiLMI_Service-cimprovagt - Allow pegasus domtrans to rpm_t to make pycmpiLMI_Software-cimprovagt running as rpm_t - Label pycmpiLMI_Software-cimprovagt as rpm_exec_t - Add support for pycmpiLMI_Storage-cimprovagt - Add support for cmpiLMI_Networking-cimprovagt - Allow system_cronjob_t to create user_tmpfs_t to make pulseaudio working - Allow virtual machines and containers to run as user doains, needed for virt-sandbox - Allow buglist.cgi to read cpu info- Allow systemd-tmpfile to handle tmp content in print spool dir - Allow systemd-sysctl to send system log messages - Add support for RTP media ports and fmpro-internal - Make auditd working if audit is configured to perform SINGLE action on disk error - Add interfaces to handle systemd units - Make systemd-notify working if pcsd is used - Add support for netlabel and label /usr/sbin/netlabelctl as iptables_exec_t - Instead of having all unconfined domains get all of the named transition rules, - Only allow unconfined_t, init_t, initrc_t and rpm_script_t by default. - Add definition for the salt ports - Allow xdm_t to create link files in xdm_var_run_t - Dontaudit reads of blk files or chr files leaked into ldconfig_t - Allow sys_chroot for useradd_t - Allow net_raw cap for ipsec_t - Allow sysadm_t to reload services - Add additional fixes to make strongswan working with a simple conf - Allow sysadm_t to enable/disable init_t services - Add additional glusterd perms - Allow apache to read lnk files in the /mnt directory - Allow glusterd to ask the kernel to load a module - Fix description of ftpd_use_fusefs boolean - Allow svirt_lxc_net_t to sys_chroot, modify policy to tighten up svirt_lxc_domain capabilties and process controls, but add them to svirt_lxc_net_t - Allow glusterds to request load a kernel module - Allow boinc to stream connect to xserver_t - Allow sblim domains to read /etc/passwd - Allow mdadm to read usb devices - Allow collectd to use ping plugin - Make foghorn working with SNMP - Allow sssd to read ldap certs - Allow haproxy to connect to RTP media ports - Add additional trans rules for aide_db - Add labeling for /usr/lib/pcsd/pcsd - Add labeling for /var/log/pcsd - Add support for pcs which is a corosync and pacemaker configuration tool- Label /var/lib/ipa/pki-ca/publish as pki_tomcat_cert_t - Add labeling for /usr/libexec/kde4/polkit-kde-authentication-agent-1 - Allow all domains that can domtrans to shutdown, to start the power services script to shutdown - consolekit needs to be able to shut down system - Move around interfaces - Remove nfsd_rw_t and nfsd_ro_t, they don't do anything - Add additional fixes for rabbitmq_beam to allow getattr on mountpoints - Allow gconf-defaults-m to read /etc/passwd - Fix pki_rw_tomcat_cert() interface to support lnk_files- Add support for gluster ports - Make sure that all keys located in /etc/ssh/ are labeled correctly - Make sure apcuspd lock files get created with the correct label - Use getcap in gluster.te - Fix gluster policy - add additional fixes to allow beam.smp to interact with couchdb files - Additional fix for #974149 - Allow gluster to user gluster ports - Allow glusterd to transition to rpcd_t and add additional fixes for #980683 - Allow tgtd working when accessing to the passthrough device - Fix labeling for mdadm unit files- Add mdadm fixes- Fix definition of sandbox.disabled to sandbox.pp.disabled- Allow mdamd to execute systemctl - Allow mdadm to read /dev/kvm - Allow ipsec_mgmt_t to read l2tpd pid content- Allow nsd_t to read /dev/urand - Allow mdadm_t to read framebuffer - Allow rabbitmq_beam_t to read process info on rabbitmq_epmd_t - Allow mozilla_plugin_config_t to create tmp files - Cleanup openvswitch policy - Allow mozilla plugin to getattr on all executables - Allow l2tpd_t to create fifo_files in /var/run - Allow samba to touch/manage fifo_files or sock_files in a samba_share_t directory - Allow mdadm to connecto its own unix_stream_socket - FIXME: nagios changed locations to /log/nagios which is wrong. But we need to have this workaround for now. - Allow apache to access smokeping pid files - Allow rabbitmq_beam_t to getattr on all filesystems - Add systemd support for iodined - Allow nup_upsdrvctl_t to execute its entrypoint - Allow fail2ban_client to write to fail2ban_var_run_t, Also allow it to use nsswitch - add labeling for ~/.cache/libvirt-sandbox - Add interface to allow domains transitioned to by confined users to send sigchld to screen program - Allow sysadm_t to check the system status of files labeled etc_t, /etc/fstab - Allow systemd_localed to start /usr/lib/systemd/system/systemd-vconsole-setup.service - Allow an domain that has an entrypoint from a type to be allowed to execute the entrypoint without a transition, I can see no case where this is a bad thing, and elminiates a whole class of AVCs. - Allow staff to getsched all domains, required to run htop - Add port definition for redis port - fix selinuxuser_use_ssh_chroot boolean- Add prosody policy written by Michael Scherer - Allow nagios plugins to read /sys info - ntpd needs to manage own log files - Add support for HOME_DIR/.IBMERS - Allow iptables commands to read firewalld config - Allow consolekit_t to read utmp - Fix filename transitions on .razor directory - Add additional fixes to make DSPAM with LDA working - Allow snort to read /etc/passwd - Allow fail2ban to communicate with firewalld over dbus - Dontaudit openshift_cgreoup_file_t read/write leaked dev - Allow nfsd to use mountd port - Call th proper interface - Allow openvswitch to read sys and execute plymouth - Allow tmpwatch to read /var/spool/cups/tmp - Add support for /usr/libexec/telepathy-rakia - Add systemd support for zoneminder - Allow mysql to create files/directories under /var/log/mysql - Allow zoneminder apache scripts to rw zoneminder tmpfs - Allow httpd to manage zoneminder lib files - Add zoneminder_run_sudo boolean to allow to start zoneminder - Allow zoneminder to send mails - gssproxy_t sock_file can be under /var/lib - Allow web domains to connect to whois port. - Allow sandbox_web_type to connect to the same ports as mozilla_plugin_t. - We really need to add an interface to corenet to define what a web_client_domain is and - then define chrome_sandbox_t, mozilla_plugin_t and sandbox_web_type to that domain. - Add labeling for cmpiLMI_LogicalFile-cimprovagt - Also make pegasus_openlmi_logicalfile_t as unconfined to have unconfined_domain attribute for filename trans rules - Update policy rules for pegasus_openlmi_logicalfile_t - Add initial types for logicalfile/unconfined OpenLMI providers - mailmanctl needs to read own log - Allow logwatch manage own lock files - Allow nrpe to read meminfo - Allow httpd to read certs located in pki-ca - Add pki_read_tomcat_cert() interface - Add support for nagios openshift plugins - Add port definition for redis port - fix selinuxuser_use_ssh_chroot boolean- Shrink the size of policy by moving to attributes, also add dridomain so that mozilla_plugin can follow selinuxuse_dri boolean. - Allow bootloader to manage generic log files - Allow ftp to bind to port 989 - Fix label of new gear directory - Add support for new directory /var/lib/openshift/gears/ - Add openshift_manage_lib_dirs() - allow virtd domains to manage setrans_var_run_t - Allow useradd to manage all openshift content - Add support so that mozilla_plugin_t can use dri devices - Allow chronyd to change the scheduler - Allow apmd to shut downthe system - Devicekit_disk_t needs to manage /etc/fstab- Make DSPAM to act as a LDA working - Allow ntop to create netlink socket - Allow policykit to send a signal to policykit-auth - Allow stapserver to dbus chat with avahi/systemd-logind - Fix labeling on haproxy unit file - Clean up haproxy policy - A new policy for haproxy and placed it to rhcs.te - Add support for ldirectord and treat it with cluster_t - Make sure anaconda log dir is created with var_log_t- Allow lvm_t to create default targets for filesystem handling - Fix labeling for razor-lightdm binaries - Allow insmod_t to read any file labeled var_lib_t - Add policy for pesign - Activate policy for cmpiLMI_Account-cimprovagt - Allow isnsd syscall=listen - /usr/libexec/pegasus/cimprovagt needs setsched caused by sched_setscheduler - Allow ctdbd to use udp/4379 - gatherd wants sys_nice and setsched - Add support for texlive2012 - Allow NM to read file_t (usb stick with no labels used to transfer keys for example) - Allow cobbler to execute apache with domain transition- condor_collector uses tcp/9000 - Label /usr/sbin/virtlockd as virtd_exec_t for now - Allow cobbler to execute ldconfig - Allow NM to execute ssh - Allow mdadm to read /dev/crash - Allow antivirus domains to connect to snmp port - Make amavisd-snmp working correctly - Allow nfsd_t to mounton nfsd_fs_t - Add initial snapper policy - We still need to have consolekit policy - Dontaudit firefox attempting to connect to the xserver_port_t if run within sandbox_web_t - Dontaudit sandbox apps attempting to open user_devpts_t - Allow dirsrv to read network state - Fix pki_read_tomcat_lib_files - Add labeling for /usr/libexec/nm-ssh-service - Add label cert_t for /var/lib/ipa/pki-ca/publish - Lets label /sys/fs/cgroup as cgroup_t for now, to keep labels consistant - Allow nfsd_t to mounton nfsd_fs_t - Dontaudit sandbox apps attempting to open user_devpts_t - Allow passwd_t to change role to system_r from unconfined_r- Don't audit access checks by sandbox xserver on xdb var_lib - Allow ntop to read usbmon devices - Add labeling for new polcykit authorizor - Dontaudit access checks from fail2ban_client - Don't audit access checks by sandbox xserver on xdb var_lib - Allow apps that connect to xdm stream to conenct to xdm_dbusd_t stream - Fix labeling for all /usr/bim/razor-lightdm-* binaries - Add filename trans for /dev/md126p1- Make vdagent able to request loading kernel module - Add support for cloud-init make it as unconfined domain - Allow snmpd to run smartctl in fsadm_t domain - remove duplicate openshift_search_lib() interface - Allow mysqld to search openshift lib files - Allow openshift cgroup to interact with passedin file descriptors - Allow colord to list directories inthe users homedir - aide executes prelink to check files - Make sure cupsd_t creates content in /etc/cups with the correct label - Lest dontaudit apache read all domains, so passenger will not cause this avc - Allow gssd to connect to gssproxy - systemd-tmpfiles needs to be able to raise the level to fix labeling on /run/setrans in MLS - Allow systemd-tmpfiles to relabel also lock files - Allow useradd to add homdir in /var/lib/openshift - Allow setfiles and semanage to write output to /run/files- Add labeling for /dev/tgt - Dontaudit leak fd from firewalld for modprobe - Allow runuser running as rpm_script_t to create netlink_audit socket - Allow mdadm to read BIOS non-volatile RAM- accountservice watches when accounts come and go in wtmp - /usr/java/jre1.7.0_21/bin/java needs to create netlink socket - Add httpd_use_sasl boolean - Allow net_admin for tuned_t - iscsid needs sys_module to auto-load kernel modules - Allow blueman to read bluetooth conf - Add nova_manage_lib_files() interface - Fix mplayer_filetrans_home_content() - Add mplayer_filetrans_home_content() - mozilla_plugin_config_roles need to be able to access mozilla_plugin_config_t - Revert "Allow thumb_t to append inherited xdm stream socket" - Add iscsi_filetrans_named_content() interface - Allow to create .mplayer with the correct labeling for unconfined - Allow iscsiadmin to create lock file with the correct labeling- Allow wine to manage wine home content - Make amanda working with socket actiovation - Add labeling for /usr/sbin/iscsiadm - Add support for /var/run/gssproxy.sock - dnsmasq_t needs to read sysctl_net_t- Fix courier_domain_template() interface - Allow blueman to write ip_forward - Allow mongodb to connect to mongodb port - Allow mongodb to connect to mongodb port - Allow java to bind jobss_debug port - Fixes for *_admin interfaces - Allow iscsid auto-load kernel modules needed for proper iSCSI functionality - Need to assign attribute for courier_domain to all courier_domains - Fail2ban reads /etc/passwd - postfix_virtual will create new files in postfix_spool_t - abrt triggers sys_ptrace by running pidof - Label ~/abc as mozilla_home_t, since java apps as plugin want to create it - Add passenger fixes needed by foreman - Remove dup interfaces - Add additional interfaces for quantum - Add new interfaces for dnsmasq - Allow passenger to read localization and send signull to itself - Allow dnsmasq to stream connect to quantum - Add quantum_stream_connect() - Make sure that mcollective starts the service with the correct labeling - Add labels for ~/.manpath - Dontaudit attempts by svirt_t to getpw* calls - sandbox domains are trying to look at parent process data - Allow courior auth to create its pid file in /var/spool/courier subdir - Add fixes for beam to have it working with couchdb - Add labeling for /run/nm-xl2tpd.con - Allow apache to stream connect to thin - Add systemd support for amand - Make public types usable for fs mount points - Call correct mandb interface in domain.te - Allow iptables to r/w quantum inherited pipes and send sigchld - Allow ifconfig domtrans to iptables and execute ldconfig - Add labels for ~/.manpath - Allow systemd to read iscsi lib files - seunshare is trying to look at parent process data- Fix openshift_search_lib - Add support for abrt-uefioops-oops - Allow colord to getattr any file system - Allow chrome processes to look at each other - Allow sys_ptrace for abrt_t - Add new policy for gssproxy - Dontaudit leaked file descriptor writes from firewalld - openshift_net_type is interface not template - Dontaudit pppd to search gnome config - Update openshift_search_lib() interface - Add fs_list_pstorefs() - Fix label on libbcm_host.so since it is built incorrectly on raspberry pi, needs back port to F18 - Better labels for raspberry pi devices - Allow init to create devpts_t directory - Temporarily label rasbery pi devices as memory_device_t, needs back port to f18 - Allow sysadm_t to build kernels - Make sure mount creates /var/run/blkid with the correct label, needs back port to F18 - Allow userdomains to stream connect to gssproxy - Dontaudit leaked file descriptor writes from firewalld - Allow xserver to read /dev/urandom - Add additional fixes for ipsec-mgmt - Make SSHing into an Openshift Enterprise Node working- Add transition rules to unconfined domains and to sysadm_t to create /etc/adjtime - with the proper label. - Update files_filetrans_named_content() interface to get right labeling for pam.d conf files - Allow systemd-timedated to create adjtime - Add clock_create_adjtime() - Additional fix ifconfing for #966106 - Allow kernel_t to create boot.log with correct labeling - Remove unconfined_mplayer for which we don't have rules - Rename interfaces - Add userdom_manage_user_home_files/dirs interfaces - Fix files_dontaudit_read_all_non_security_files - Fix ipsec_manage_key_file() - Fix ipsec_filetrans_key_file() - Label /usr/bin/razor-lightdm-greeter as xdm_exec_t instead of spamc_exec_t - Fix labeling for ipse.secrets - Add interfaces for ipsec and labeling for ipsec.info and ipsec_setup.pid - Add files_dontaudit_read_all_non_security_files() interface - /var/log/syslog-ng should be labeled var_log_t - Make ifconfig_var_run_t a mountpoint - Add transition from ifconfig to dnsmasq - Allow ifconfig to execute bin_t/shell_exec_t - We want to have hwdb.bin labeled as etc_t - update logging_filetrans_named_content() interface - Allow systemd_timedate_t to manage /etc/adjtime - Allow NM to send signals to l2tpd - Update antivirus_can_scan_system boolean - Allow devicekit_disk_t to sys_config_tty - Run abrt-harvest programs as abrt_t, and allow abrt_t to list all filesystem directories - Make printing from vmware working - Allow php-cgi from php54 collection to access /var/lib/net-snmp/mib_indexes - Add virt_qemu_ga_data_t for qemu-ga - Make chrome and mozilla able to connect to same ports, add jboss_management_port_t to both - Fix typo in virt.te - Add virt_qemu_ga_unconfined_t for hook scripts - Make sure NetworkManager files get created with the correct label - Add mozilla_plugin_use_gps boolean - Fix cyrus to have support for net-snmp - Additional fixes for dnsmasq and quantum for #966106 - Add plymouthd_create_log() - remove httpd_use_oddjob for which we don't have rules - Add missing rules for httpd_can_network_connect_cobbler - Add missing cluster_use_execmem boolean - Call userdom_manage_all_user_home_type_files/dirs - Additional fix for ftp_home_dir - Fix ftp_home_dir boolean - Allow squit to recv/send client squid packet - Fix nut.te to have nut_domain attribute - Add support for ejabberd; TODO: revisit jabberd and rabbit policy - Fix amanda policy - Add more fixes for domains which use libusb - Make domains which use libusb working correctly - Allow l2tpd to create ipsec key files with correct labeling and manage them - Fix cobbler_manage_lib_files/cobbler_read_lib_files to cover also lnk files - Allow rabbitmq-beam to bind generic node - Allow l2tpd to read ipse-mgmt pid files - more fixes for l2tpd, NM and pppd from #967072- Dontaudit to getattr on dirs for dovecot-deliver - Allow raiudusd server connect to postgresql socket - Add kerberos support for radiusd - Allow saslauthd to connect to ldap port - Allow postfix to manage postfix_private_t files - Add chronyd support for #965457 - Fix labeling for HOME_DIR/\.icedtea - CHange squid and snmpd to be allowed also write own logs - Fix labeling for /usr/libexec/qemu-ga - Allow virtd_t to use virt_lock_t - Allow also sealert to read the policy from the kernel - qemu-ga needs to execute scripts in /usr/libexec/qemu-ga and to use /tmp content - Dontaudit listing of users homedir by sendmail Seems like a leak - Allow passenger to transition to puppet master - Allow apache to connect to mythtv - Add definition for mythtv ports- Add additional fixes for #948073 bug - Allow sge_execd_t to also connect to sge ports - Allow openshift_cron_t to manage openshift_var_lib_t sym links - Allow openshift_cron_t to manage openshift_var_lib_t sym links - Allow sge_execd to bind sge ports. Allow kill capability and reads cgroup files - Remove pulseaudio filetrans pulseaudio_manage_home_dirs which is a part of pulseaudio_manage_home_files - Add networkmanager_stream_connect() - Make gnome-abrt wokring with staff_t - Fix openshift_manage_lib_files() interface - mdadm runs ps command which seems to getattr on random log files - Allow mozilla_plugin_t to create pulseaudit_home_t directories - Allow qemu-ga to shutdown virtual hosts - Add labelling for cupsd-browsed - Add web browser plugins to connect to aol ports - Allow nm-dhcp-helper to stream connect to NM - Add port definition for sge ports- Make sure users and unconfined domains create .hushlogin with the correct label - Allow pegaus to chat with realmd over DBus - Allow cobblerd to read network state - Allow boicn-client to stat on /dev/input/mice - Allow certwatch to read net_config_t when it executes apache - Allow readahead to create /run/systemd and then create its own directory with the correct label- Transition directories and files when in a user_tmp_t directory - Change certwatch to domtrans to apache instead of just execute - Allow virsh_t to read xen lib files - update policy rules for pegasus_openlmi_account_t - Add support for svnserve_tmp_t - Activate account openlmi policy - pegasus_openlmi_domain_template needs also require pegasus_t - One more fix for policykit.te - Call fs_list_cgroups_dirs() in policykit.te - Allow nagios service plugin to read mysql config files - Add labeling for /var/svn - Fix chrome.te - Fix pegasus_openlmi_domain_template() interfaces - Fix dev_rw_vfio_dev definiton, allow virtd_t to read tmpfs_t symlinks - Fix location of google-chrome data - Add support for chome_sandbox to store content in the homedir - Allow policykit to watch for changes in cgroups file system - Add boolean to allow mozilla_plugin_t to use spice - Allow collectd to bind to udp port - Allow collected_t to read all of /proc - Should use netlink socket_perms - Should use netlink socket_perms - Allow glance domains to connect to apache ports - Allow apcupsd_t to manage its log files - Allow chrome objects to rw_inherited unix_stream_socket from callers - Allow staff_t to execute virtd_exec_t for running vms - nfsd_t needs to bind mountd port to make nfs-mountd.service working - Allow unbound net_admin capability because of setsockopt syscall - Fix fs_list_cgroup_dirs() - Label /usr/lib/nagios/plugins/utils.pm as bin_t - Remove uplicate definition of fs_read_cgroup_files() - Remove duplicate definition of fs_read_cgroup_files() - Add files_mountpoint_filetrans interface to be used by quotadb_t and snapperd - Additional interfaces needed to list and read cgroups config - Add port definition for collectd port - Add labels for /dev/ptp* - Allow staff_t to execute virtd_exec_t for running vms- Allow samba-net to also read realmd tmp files - Allow NUT to use serial ports - realmd can be started by systemctl now- Remove userdom_home_manager for xdm_t and move all rules to xserver.te directly - Add new xdm_write_home boolean to allow xdm_t to create files in HOME dirs with xdm_home_t - Allow postfix-showq to read/write unix.showq in /var/spool/postfix/pid - Allow virsh to read xen lock file - Allow qemu-ga to create files in /run with proper labeling - Allow glusterd to connect to own socket in /tmp - Allow glance-api to connect to http port to make glance image-create working - Allow keystonte_t to execute rpm- Fix realmd cache interfaces- Allow tcpd to execute leafnode - Allow samba-net to read realmd cache files - Dontaudit sys_tty_config for alsactl - Fix allow rules for postfix_var_run - Allow cobblerd to read /etc/passwd - Allow pegasus to read exports - Allow systemd-timedate to read xdm state - Allow mout to stream connect to rpcbind - Add labeling just for /usr/share/pki/ca-trust-source instead of /usr/share/pki- Allow thumbnails to share memory with apps which run thumbnails - Allow postfix-postqueue block_suspend - Add lib interfaces for smsd - Add support for nginx - Allow s2s running as jabberd_t to connect to jabber_interserver_port_t - Allow pki apache domain to create own tmp files and execute httpd_suexec - Allow procmail to manger user tmp files/dirs/lnk_files - Add virt_stream_connect_svirt() interface - Allow dovecot-auth to execute bin_t - Allow iscsid to request that kernel load a kernel module - Add labeling support for /var/lib/mod_security - Allow iw running as tuned_t to create netlink socket - Dontaudit sys_tty_config for thumb_t - Add labeling for nm-l2tp-service - Allow httpd running as certwatch_t to open tcp socket - Allow useradd to manager smsd lib files - Allow useradd_t to add homedirs in /var/lib - Fix typo in userdomain.te - Cleanup userdom_read_home_certs - Implement userdom_home_reader_certs_type to allow read certs also on encrypt /home with ecryptfs_t - Allow staff to stream connect to svirt_t to make gnome-boxes working- Allow lvm to create its own unit files - Label /var/lib/sepolgen as selinux_config_t - Add filetrans rules for tw devices - Add transition from cupsd_config_t to cupsd_t- Add filetrans rules for tw devices - Cleanup bad transition lines- Fix lockdev_manage_files() - Allow setroubleshootd to read var_lib_t to make email_alert working - Add lockdev_manage_files() - Call proper interface in virt.te - Allow gkeyring_domain to create /var/run/UID/config/dbus file - system dbus seems to be blocking suspend - Dontaudit attemps to sys_ptrace, which I believe gpsd does not need - When you enter a container from root, you generate avcs with a leaked file descriptor - Allow mpd getattr on file system directories - Make sure realmd creates content with the correct label - Allow systemd-tty-ask to write kmsg - Allow mgetty to use lockdev library for device locking - Fix selinuxuser_user_share_music boolean name to selinuxuser_share_music - When you enter a container from root, you generate avcs with a leaked file descriptor - Make sure init.fc files are labeled correctly at creation - File name trans vconsole.conf - Fix labeling for nagios plugins - label shared libraries in /opt/google/chrome as testrel_shlib_t- Allow certmonger to dbus communicate with realmd - Make realmd working- Fix mozilla specification of homedir content - Allow certmonger to read network state - Allow tmpwatch to read tmp in /var/spool/{cups,lpd} - Label all nagios plugin as unconfined by default - Add httpd_serve_cobbler_files() - Allow mdadm to read /dev/sr0 and create tmp files - Allow certwatch to send mails - Fix labeling for nagios plugins - label shared libraries in /opt/google/chrome as testrel_shlib_t- Allow realmd to run ipa, really needs to be an unconfined_domain - Allow sandbox domains to use inherted terminals - Allow pscd to use devices labeled svirt_image_t in order to use cat cards. - Add label for new alsa pid - Alsa now uses a pid file and needs to setsched - Fix oracleasmfs_t definition - Add support for sshd_unit_file_t - Add oracleasmfs_t - Allow unlabeled_t files to be stored on unlabeled_t filesystems- Fix description of deny_ptrace boolean - Remove allow for execmod lib_t for now - Allow quantum to connect to keystone port - Allow nova-console to talk with mysql over unix stream socket - Allow dirsrv to stream connect to uuidd - thumb_t needs to be able to create ~/.cache if it does not exist - virtd needs to be able to sys_ptrace when starting and stoping containers- Allow alsa_t signal_perms, we probaly should search for any app that can execute something without transition and give it signal_perms... - Add dontaudit for mozilla_plugin_t looking at the xdm_t sockets - Fix deny_ptrace boolean, certain ptrace leaked into the system - Allow winbind to manage kerberos_rcache_host - Allow spamd to create spamd_var_lib_t directories - Remove transition to mozilla_tmp_t by mozilla_t, to allow it to manage the users tmp dirs - Add mising nslcd_dontaudit_write_sock_file() interface - one more fix - Fix pki_read_tomcat_lib_files() interface - Allow certmonger to read pki-tomcat lib files - Allow certwatch to execute bin_t - Allow snmp to manage /var/lib/net-snmp files - Call snmp_manage_var_lib_files(fogorn_t) instead of snmp_manage_var_dirs - Fix vmware_role() interface - Fix cobbler_manage_lib_files() interface - Allow nagios check disk plugins to execute bin_t - Allow quantum to transition to openvswitch_t - Allow postdrop to stream connect to postfix-master - Allow quantum to stream connect to openvswitch - Add xserver_dontaudit_xdm_rw_stream_sockets() interface - Allow daemon to send dgrams to initrc_t - Allow kdm to start the power service to initiate a reboot or poweroff- Add mising nslcd_dontaudit_write_sock_file() interface - one more fix - Fix pki_read_tomcat_lib_files() interface - Allow certmonger to read pki-tomcat lib files - Allow certwatch to execute bin_t - Allow snmp to manage /var/lib/net-snmp files - Don't audit attempts to write to stream socket of nscld by thumbnailers - Allow git_system_t to read network state - Allow pegasas to execute mount command - Fix desc for drdb_admin - Fix condor_amin() - Interface fixes for uptime, vdagent, vnstatd - Fix labeling for moodle in /var/www/moodle/data - Add interface fixes - Allow bugzilla to read certs - /var/www/moodle needs to be writable by apache - Add interface to dontaudit attempts to send dbus messages to systemd domains, for xguest - Fix namespace_init_t to create content with proper labels, and allow it to manage all user content - Allow httpd_t to connect to osapi_compute port using httpd_use_openstack bolean - Fixes for dlm_controld - Fix apache_read_sys_content_rw_dirs() interface - Allow logrotate to read /var/log/z-push dir - Fix sys_nice for cups_domain - Allow postfix_postdrop to acces postfix_public socket - Allow sched_setscheduler for cupsd_t - Add missing context for /usr/sbin/snmpd - Kernel_t needs mac_admin in order to support labeled NFS - Fix systemd_dontaudit_dbus_chat() interface - Add interface to dontaudit attempts to send dbus messages to systemd domains, for xguest - Allow consolehelper domain to write Xauth files in /root - Add port definition for osapi_compute port - Allow unconfined to create /etc/hostname with correct labeling - Add systemd_filetrans_named_hostname() interface- Allow httpd_t to connect to osapi_compute port using httpd_use_openstack bolean - Fixes for dlm_controld - Fix apache_read_sys_content_rw_dirs() interface - Allow logrotate to read /var/log/z-push dir - Allow postfix_postdrop to acces postfix_public socket - Allow sched_setscheduler for cupsd_t - Add missing context for /usr/sbin/snmpd - Allow consolehelper more access discovered by Tom London - Allow fsdaemon to send signull to all domain - Add port definition for osapi_compute port - Allow unconfined to create /etc/hostname with correct labeling - Add systemd_filetrans_named_hostname() interface- Fix file_contexts.subs to label /run/lock correctly- Try to label on controlC devices up to 30 correctly - Add mount_rw_pid_files() interface - Add additional mount/umount interfaces needed by mock - fsadm_t sends audit messages in reads kernel_ipc_info when doing livecd-iso-to-disk - Fix tabs - Allow initrc_domain to search rgmanager lib files - Add more fixes which make mock working together with confined users * Allow mock_t to manage rpm files * Allow mock_t to read rpm log files * Allow mock to setattr on tmpfs, devpts * Allow mount/umount filesystems - Add rpm_read_log() interface - yum-cron runs rpm from within it. - Allow tuned to transition to dmidecode - Allow firewalld to do net_admin - Allow mock to unmont tmpfs_t - Fix virt_sigkill() interface - Add additional fixes for mock. Mainly caused by mount running in mock_t - Allow mock to write sysfs_t and mount pid files - Add mailman_domain to mailman_template() - Allow openvswitch to execute shell - Allow qpidd to use kerberos - Allow mailman to use fusefs, needs back port to RHEL6 - Allow apache and its scripts to use anon_inodefs - Add alias for git_user_content_t and git_sys_content_t so that RHEL6 will update to RHEL7 - Realmd needs to connect to samba ports, needs back port to F18 also - Allow colord to read /run/initial-setup- - Allow sanlock-helper to send sigkill to virtd which is registred to sanlock - Add virt_kill() interface - Add rgmanager_search_lib() interface - Allow wdmd to getattr on all filesystems. Back ported from RHEL6- Allow realmd to create tmp files - FIx ircssi_home_t type to irssi_home_t - Allow adcli running as realmd_t to connect to ldap port - Allow NetworkManager to transition to ipsec_t, for running strongswan - Make openshift_initrc_t an lxc_domain - Allow gssd to manage user_tmp_t files - Fix handling of irclogs in users homedir - Fix labeling for drupal an wp-content in subdirs of /var/www/html - Allow abrt to read utmp_t file - Fix openshift policy to transition lnk_file, sock-file an fifo_file when created in a tmpfs_t, needs back port to RHEL6 - fix labeling for (oo|rhc)-restorer-wrapper.sh - firewalld needs to be able to write to network sysctls - Fix mozilla_plugin_dontaudit_rw_sem() interface - Dontaudit generic ipc read/write to a mozilla_plugin for sandbox_x domains - Add mozilla_plugin_dontaudit_rw_sem() interface - Allow svirt_lxc_t to transition to openshift domains - Allow condor domains block_suspend and dac_override caps - Allow condor_master to read passd - Allow condor_master to read system state - Allow NetworkManager to transition to ipsec_t, for running strongswan - Lots of access required by lvm_t to created encrypted usb device - Allow xdm_t to dbus communicate with systemd_localed_t - Label strongswan content as ipsec_exec_mgmt_t for now - Allow users to dbus chat with systemd_localed - Fix handling of .xsession-errors in xserver.if, so kde will work - Might be a bug but we are seeing avc's about people status on init_t:service - Make sure we label content under /var/run/lock as <> - Allow daemon and systemprocesses to search init_var_run_t directory - Add boolean to allow xdm to write xauth data to the home directory - Allow mount to write keys for the unconfined domain - Add unconfined_write_keys() interface- Add labeling for /usr/share/pki - Allow programs that read var_run_t symlinks also read var_t symlinks - Add additional ports as mongod_port_t for 27018, 27019, 28017, 28018 and 28019 ports - Fix labeling for /etc/dhcp directory - add missing systemd_stub_unit_file() interface - Add files_stub_var() interface - Add lables for cert_t directories - Make localectl set-x11-keymap working at all - Allow abrt to manage mock build environments to catch build problems. - Allow virt_domains to setsched for running gdb on itself - Allow thumb_t to execute user home content - Allow pulseaudio running as mozilla_plugin_t to read /run/systemd/users/1000 - Allow certwatch to execut /usr/bin/httpd - Allow cgred to send signal perms to itself, needs back port to RHEL6 - Allow openshift_cron_t to look at quota - Allow cups_t to read inhered tmpfs_t from the kernel - Allow yppasswdd to use NIS - Tuned wants sys_rawio capability - Add ftpd_use_fusefs boolean - Allow dirsrvadmin_t to signal itself- Allow localectl to read /etc/X11/xorg.conf.d directory - Revert "Revert "Fix filetrans rules for kdm creates .xsession-errors"" - Allow mount to transition to systemd_passwd_agent - Make sure abrt directories are labeled correctly - Allow commands that are going to read mount pid files to search mount_var_run_t - label /usr/bin/repoquery as rpm_exec_t - Allow automount to block suspend - Add abrt_filetrans_named_content so that abrt directories get labeled correctly - Allow virt domains to setrlimit and read file_context- Allow nagios to manage nagios spool files - /var/spool/snmptt is a directory which snmdp needs to write to, needs back port to RHEL6 - Add swift_alias.* policy files which contain typealiases for swift types - Add support for /run/lock/opencryptoki - Allow pkcsslotd chown capability - Allow pkcsslotd to read passwd - Add rsync_stub() interface - Allow systemd_timedate also manage gnome config homedirs - Label /usr/lib64/security/pam_krb5/pam_krb5_cchelper as bin_t - Fix filetrans rules for kdm creates .xsession-errors - Allow sytemd_tmpfiles to create wtmp file - Really should not label content under /var/lock, since it could have labels on it different from var_lock_t - Allow systemd to list all file system directories - Add some basic stub interfaces which will be used in PRODUCT policies- Fix log transition rule for cluster domains - Start to group all cluster log together - Dont use filename transition for POkemon Advanced Adventure until a new checkpolicy update - cups uses usbtty_device_t devices - These fixes were all required to build a MLS virtual Machine with single level desktops - Allow domains to transiton using httpd_exec_t - Allow svirt domains to manage kernel key rings - Allow setroubleshoot to execute ldconfig - Allow firewalld to read generate gnome data - Allow bluetooth to read machine-info - Allow boinc domain to send signal to itself - Fix gnome_filetrans_home_content() interface - Allow mozilla_plugins to list apache modules, for use with gxine - Fix labels for POkemon in the users homedir - Allow xguest to read mdstat - Dontaudit virt_domains getattr on /dev/* - These fixes were all required to build a MLS virtual Machine with single level desktops - Need to back port this to RHEL6 for openshift - Add tcp/8891 as milter port - Allow nsswitch domains to read sssd_var_lib_t files - Allow ping to read network state. - Fix typo - Add labels to /etc/X11/xorg.d and allow systemd-timestampd_t to manage them- Adopt swift changes from lhh@redhat.com - Add rhcs_manage_cluster_pid_files() interface - Allow screen domains to configure tty and setup sock_file in ~/.screen directory - ALlow setroubleshoot to read default_context_t, needed to backport to F18 - Label /etc/owncloud as being an apache writable directory - Allow sshd to stream connect to an lxc domain- Allow postgresql to manage rgmanager pid files - Allow postgresql to read ccs data - Allow systemd_domain to send dbus messages to policykit - Add labels for /etc/hostname and /etc/machine-info and allow systemd-hostnamed to create them - All systemd domains that create content are reading the file_context file and setfscreate - Systemd domains need to search through init_var_run_t - Allow sshd to communicate with libvirt to set containers labels - Add interface to manage pid files - Allow NetworkManger_t to read /etc/hostname - Dontaudit leaked locked files into openshift_domains - Add fixes for oo-cgroup-read - it nows creates tmp files - Allow gluster to manage all directories as well as files - Dontaudit chrome_sandbox_nacl_t using user terminals - Allow sysstat to manage its own log files - Allow virtual machines to setrlimit and send itself signals. - Add labeling for /var/run/hplip- Fix POSTIN scriptlet- Merge rgmanger, corosync,pacemaker,aisexec policies to cluster_t in rhcs.pp- Fix authconfig.py labeling - Make any domains that write homedir content do it correctly - Allow glusterd to read/write anyhwere on the file system by default - Be a little more liberal with the rsync log files - Fix iscsi_admin interface - Allow iscsid_t to read /dev/urand - Fix up iscsi domain for use with unit files - Add filename transition support for spamassassin policy - Allow web plugins to use badly formated libraries - Allow nmbd_t to create samba_var_t directories - Add filename transition support for spamassassin policy - Add filename transition support for tvtime - Fix alsa_home_filetrans_alsa_home() interface - Move all userdom_filetrans_home_content() calling out of booleans - Allow logrotote to getattr on all file sytems - Remove duplicate userdom_filetrans_home_content() calling - Allow kadmind to read /etc/passwd - Dontaudit append .xsession-errors file on ecryptfs for policykit-auth - Allow antivirus domain to manage antivirus db links - Allow logrotate to read /sys - Allow mandb to setattr on man dirs - Remove mozilla_plugin_enable_homedirs boolean - Fix ftp_home_dir boolean - homedir mozilla filetrans has been moved to userdom_home_manager - homedir telepathy filetrans has been moved to userdom_home_manager - Remove gnome_home_dir_filetrans() from gnome_role_gkeyringd() - Might want to eventually write a daemon on fusefsd. - Add policy fixes for sshd [net] child from plautrba@redhat.com - Tor uses a new port - Remove bin_t for authconfig.py - Fix so only one call to userdom_home_file_trans - Allow home_manager_types to create content with the correctl label - Fix all domains that write data into the homedir to do it with the correct label - Change the postgresql to use proper boolean names, which is causing httpd_t to - not get access to postgresql_var_run_t - Hostname needs to send syslog messages - Localectl needs to be able to send dbus signals to users - Make sure userdom_filetrans_type will create files/dirs with user_home_t labeling by default - Allow user_home_manger domains to create spam* homedir content with correct labeling - Allow user_home_manger domains to create HOMEDIR/.tvtime with correct labeling - Add missing miscfiles_setattr_man_pages() interface and for now comment some rules for userdom_filetrans_type to make build process working - Declare userdom_filetrans_type attribute - userdom_manage_home_role() needs to be called withoout usertype attribute because of userdom_filetrans_type attribute - fusefsd is mounding a fuse file system on /run/user/UID/gvfs- Man pages are now generated in the build process - Allow cgred to list inotifyfs filesystem- Allow gluster to get attrs on all fs - New access required for virt-sandbox - Allow dnsmasq to execute bin_t - Allow dnsmasq to create content in /var/run/NetworkManager - Fix openshift_initrc_signal() interface - Dontaudit openshift domains doing getattr on other domains - Allow consolehelper domain to communicate with session bus - Mock should not be transitioning to any other domains, we should keep mock_t as mock_t - Update virt_qemu_ga_t policy - Allow authconfig running from realmd to restart oddjob service - Add systemd support for oddjob - Add initial policy for realmd_consolehelper_t which if for authconfig executed by realmd - Add labeling for gnashpluginrc - Allow chrome_nacl to execute /dev/zero - Allow condor domains to read /proc - mozilla_plugin_t will getattr on /core if firefox crashes - Allow condor domains to read /etc/passwd - Allow dnsmasq to execute shell scripts, openstack requires this access - Fix glusterd labeling - Allow virtd_t to interact with the socket type - Allow nmbd_t to override dac if you turned on sharing all files - Allow tuned to created kobject_uevent socket - Allow guest user to run fusermount - Allow openshift to read /proc and locale - Allow realmd to dbus chat with rpm - Add new interface for virt - Remove depracated interfaces - Allow systemd_domains read access on etc, etc_runtime and usr files, also allow them to connect stream to syslog socket - /usr/share/munin/plugins/plugin.sh should be labeled as bin_t - Remove some more unconfined_t process transitions, that I don't believe are necessary - Stop transitioning uncofnined_t to checkpc - dmraid creates /var/lock/dmraid - Allow systemd_localed to creatre unix_dgram_sockets - Allow systemd_localed to write kernel messages. - Also cleanup systemd definition a little. - Fix userdom_restricted_xwindows_user_template() interface - Label any block devices or char devices under /dev/infiniband as fixed_disk_device_t - User accounts need to dbus chat with accountsd daemon - Gnome requires all users to be able to read /proc/1/- virsh now does a setexeccon call - Additional rules required by openshift domains - Allow svirt_lxc_domains to use inherited terminals, needed to make virt-sandbox-service execute work - Allow spamd_update_t to search spamc_home_t - Avcs discovered by mounting an isci device under /mnt - Allow lspci running as logrotate to read pci.ids - Additional fix for networkmanager_read_pid_files() - Fix networkmanager_read_pid_files() interface - Allow all svirt domains to connect to svirt_socket_t - Allow virsh to set SELinux context for a process. - Allow tuned to create netlink_kobject_uevent_socket - Allow systemd-timestamp to set SELinux context - Add support for /var/lib/systemd/linger - Fix ssh_sysadm_login to be working on MLS as expected- Rename files_rw_inherited_tmp_files to files_rw_inherited_tmp_file - Add missing files_rw_inherited_tmp_files interface - Add additional interface for ecryptfs - ALlow nova-cert to connect to postgresql - Allow keystone to connect to postgresql - Allow all cups domains to getattr on filesystems - Allow pppd to send signull - Allow tuned to execute ldconfig - Allow gpg to read fips_enabled - Add additional fixes for ecryptfs - Allow httpd to work with posgresql - Allow keystone getsched and setsched- Allow gpg to read fips_enabled - Add support for /var/cache/realmd - Add support for /usr/sbin/blazer_usb and systemd support for nut - Add labeling for fenced_sanlock and allow sanclok transition to fenced_t - bitlbee wants to read own log file - Allow glance domain to send a signal itself - Allow xend_t to request that the kernel load a kernel module - Allow pacemaker to execute heartbeat lib files - cleanup new swift policy- Fix smartmontools - Fix userdom_restricted_xwindows_user_template() interface - Add xserver_xdm_ioctl_log() interface - Allow Xusers to ioctl lxdm.log to make lxdm working - Add MLS fixes to make MLS boot/log-in working - Add mls_socket_write_all_levels() also for syslogd - fsck.xfs needs to read passwd - Fix ntp_filetrans_named_content calling in init.te - Allow postgresql to create pg_log dir - Allow sshd to read rsync_data_t to make rsync working - Change ntp.conf to be labeled net_conf_t - Allow useradd to create homedirs in /run. ircd-ratbox does this and we should just allow it - Allow xdm_t to execute gstreamer home content - Allod initrc_t and unconfined domains, and sysadm_t to manage ntp - New policy for openstack swift domains - More access required for openshift_cron_t - Use cupsd_log_t instead of cupsd_var_log_t - rpm_script_roles should be used in rpm_run - Fix rpm_run() interface - Fix openshift_initrc_run() - Fix sssd_dontaudit_stream_connect() interface - Fix sssd_dontaudit_stream_connect() interface - Allow LDA's job to deliver mail to the mailbox - dontaudit block_suspend for mozilla_plugin_t - Allow l2tpd_t to all signal perms - Allow uuidgen to read /dev/random - Allow mozilla-plugin-config to read power_supply info - Implement cups_domain attribute for cups domains - We now need access to user terminals since we start by executing a command outside the tty - We now need access to user terminals since we start by executing a command outside the tty - svirt lxc containers want to execute userhelper apps, need these changes to allow this to happen - Add containment of openshift cron jobs - Allow system cron jobs to create tmp directories - Make userhelp_conf_t a config file - Change rpm to use rpm_script_roles - More fixes for rsync to make rsync wokring - Allow logwatch to domtrans to mdadm - Allow pacemaker to domtrans to ifconfig - Allow pacemaker to setattr on corosync.log - Add pacemaker_use_execmem for memcheck-amd64 command - Allow block_suspend capability - Allow create fifo_file in /tmp with pacemaker_tmp_t - Allow systat to getattr on fixed disk - Relabel /etc/ntp.conf to be net_conf_t - ntp_admin should create files in /etc with the correct label - Add interface to create ntp_conf_t files in /etc - Add additional labeling for quantum - Allow quantum to execute dnsmasq with transition- boinc_cliean wants also execmem as boinc projecs have - Allow sa-update to search admin home for /root/.spamassassin - Allow sa-update to search admin home for /root/.spamassassin - Allow antivirus domain to read net sysctl - Dontaudit attempts from thumb_t to connect to ssd - Dontaudit attempts by readahead to read sock_files - Dontaudit attempts by readahead to read sock_files - Create tmpfs file while running as wine as user_tmpfs_t - Dontaudit attempts by readahead to read sock_files - libmpg ships badly created librarie- Change ssh_use_pts to use macro and only inherited sshd_devpts_t - Allow confined users to read systemd_logind seat information - libmpg ships badly created libraries - Add support for strongswan.service - Add labeling for strongswan - Allow l2tpd_t to read network manager content in /run directory - Allow rsync to getattr any file in rsync_data_t - Add labeling and filename transition for .grl-podcasts- mount.glusterfs executes glusterfsd binary - Allow systemd_hostnamed_t to stream connect to systemd - Dontaudit any user doing a access check - Allow obex-data-server to request the kernel to load a module - Allow gpg-agent to manage gnome content (~/.cache/gpg-agent-info) - Allow gpg-agent to read /proc/sys/crypto/fips_enabled - Add new types for antivirus.pp policy module - Allow gnomesystemmm_t caps because of ioprio_set - Make sure if mozilla_plugin creates files while in permissive mode, they get created with the correct label, user_home_t - Allow gnomesystemmm_t caps because of ioprio_set - Allow NM rawip socket - files_relabel_non_security_files can not be used with boolean - Add interface to thumb_t dbus_chat to allow it to read remote process state - ALlow logrotate to domtrans to mdadm_t - kde gnomeclock wants to write content to /tmp- kde gnomeclock wants to write content to /tmp - /usr/libexec/kde4/kcmdatetimehelper attempts to create /root/.kde - Allow blueman_t to rwx zero_device_t, for some kind of jre - Allow mozilla_plugin_t to rwx zero_device_t, for some kind of jre - Ftp full access should be allowed to create directories as well as files - Add boolean to allow rsync_full_acces, so that an rsync server can write all - over the local machine - logrotate needs to rotate logs in openshift directories, needs back port to RHEL6 - Add missing vpnc_roles type line - Allow stapserver to write content in /tmp - Allow gnome keyring to create keyrings dir in ~/.local/share - Dontaudit thumb drives trying to bind to udp sockets if nis_enabled is turned on - Add interface to colord_t dbus_chat to allow it to read remote process state - Allow colord_t to read cupsd_t state - Add mate-thumbnail-font as thumnailer - Allow sectoolm to sys_ptrace since it is looking at other proceses /proc data. - Allow qpidd to list /tmp. Needed by ssl - Only allow init_t to transition to rsync_t domain, not initrc_t. This should be back ported to F17, F18 - - Added systemd support for ksmtuned - Added booleans ksmtuned_use_nfs ksmtuned_use_cifs - firewalld seems to be creating mmap files which it needs to execute in /run /tmp and /dev/shm. Would like to clean this up but for now we will allow - Looks like qpidd_t needs to read /dev/random - Lots of probing avc's caused by execugting gpg from staff_t - Dontaudit senmail triggering a net_admin avc - Change thumb_role to use thumb_run, not sure why we have a thumb_role, needs back port - Logwatch does access check on mdadm binary - Add raid_access_check_mdadm() iterface- Fix systemd_manage_unit_symlinks() interface - Call systemd_manage_unit_symlinks(() which is correct interface - Add filename transition for opasswd - Switch gnomeclock_dbus_chat to systemd_dbus_chat_timedated since we have switched the name of gnomeclock - Allow sytstemd-timedated to get status of init_t - Add new systemd policies for hostnamed and rename gnomeclock_t to systemd_timedate_t - colord needs to communicate with systemd and systemd_logind, also remove duplicate rules - Switch gnomeclock_dbus_chat to systemd_dbus_chat_timedated since we have switched the name of gnomeclock - Allow gpg_t to manage all gnome files - Stop using pcscd_read_pub_files - New rules for xguest, dontaudit attempts to dbus chat - Allow firewalld to create its mmap files in tmpfs and tmp directories - Allow firewalld to create its mmap files in tmpfs and tmp directories - run unbound-chkconf as named_t, so it can read dnssec - Colord is reading xdm process state, probably reads state of any apps that sends dbus message - Allow mdadm_t to change the kernel scheduler - mythtv policy - Update mandb_admin() interface - Allow dsspam to listen on own tpc_socket - seutil_filetrans_named_content needs to be optional - Allow sysadm_t to execute content in his homedir - Add attach_queue to tun_socket, new patch from Paul Moore - Change most of selinux configuration types to security_file_type. - Add filename transition rules for selinux configuration - ssh into a box with -X -Y requires ssh_use_ptys - Dontaudit thumb drives trying to bind to udp sockets if nis_enabled is turned on - Allow all unpriv userdomains to send dbus messages to hostnamed and timedated - New allow rules found by Tom London for systemd_hostnamed- Allow systemd-tmpfiles to relabel lpd spool files - Ad labeling for texlive bash scripts - Add xserver_filetrans_fonts_cache_home_content() interface - Remove duplicate rules from *.te - Add support for /var/lock/man-db.lock - Add support for /var/tmp/abrt(/.*)? - Add additional labeling for munin cgi scripts - Allow httpd_t to read munin conf files - Allow certwatch to read meminfo - Fix nscd_dontaudit_write_sock_file() interfac - Fix gnome_filetrans_home_content() to include also "fontconfig" dir as cache_home_t - llow mozilla_plugin_t to create HOMEDIR/.fontconfig with the proper labeling- Allow gnomeclock to talk to puppet over dbus - Allow numad access discovered by Dominic - Add support for HOME_DIR/.maildir - Fix attribute_role for mozilla_plugin_t domain to allow staff_r to access this domain - Allow udev to relabel udev_var_run_t lnk_files - New bin_t file in mcelog- Remove all mcs overrides and replace with t1 != mcs_constrained_types - Add attribute_role for iptables - mcs_process_set_categories needs to be called for type - Implement additional role_attribute statements - Sodo domain is attempting to get the additributes of proc_kcore_t - Unbound uses port 8953 - Allow svirt_t images to compromise_kernel when using pci-passthrough - Add label for dns lib files - Bluetooth aquires a dbus name - Remove redundant files_read_usr_file calling - Remove redundant files_read_etc_file calling - Fix mozilla_run_plugin() - Add role_attribute support for more domains- Mass merge with upstream- Bump the policy version to 28 to match selinux userspace - Rebuild versus latest libsepol- Add systemd_status_all_unit_files() interface - Add support for nshadow - Allow sysadm_t to administrate the postfix domains - Add interface to setattr on isid directories for use by tmpreaper - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Add systemd_status_all_unit_files() interface - Add support for nshadow - Allow sysadm_t to administrate the postfix domains - Add interface to setattr on isid directories for use by tmpreaper - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - Allow sshd_t sys_admin for use with afs logins - Add labeling for /var/named/chroot/etc/localtim- Allow setroubleshoot_fixit to execute rpm - zoneminder needs to connect to httpd ports where remote cameras are listening - Allow firewalld to execute content created in /run directory - Allow svirt_t to read generic certs - Dontaudit leaked ps content to mozilla plugin - Allow sshd_t sys_admin for use with afs logins - Allow systemd to read/write all sysctls - init scripts are creating systemd_unit_file_t directories- systemd_logind_t is looking at all files under /run/user/apache - Allow systemd to manage all user tmp files - Add labeling for /var/named/chroot/etc/localtime - Allow netlabel_peer_t type to flow over netif_t and node_t, and only be hindered by MLS, need back port to RHEL6 - Keystone is now using a differnt port - Allow xdm_t to use usbmuxd daemon to control sound - Allow passwd daemon to execute gnome_exec_keyringd - Fix chrome_sandbox policy - Add labeling for /var/run/checkquorum-timer - More fixes for the dspam domain, needs back port to RHEL6 - More fixes for the dspam domain, needs back port to RHEL6 - sssd needs to connect to kerberos password port if a user changes his password - Lots of fixes from RHEL testing of dspam web - Allow chrome and mozilla_plugin to create msgq and semaphores - Fixes for dspam cgi scripts - Fixes for dspam cgi scripts - Allow confine users to ptrace screen - Backport virt_qemu_ga_t changes from RHEL - Fix labeling for dspam.cgi needed for RHEL6 - We need to back port this policy to RHEL6, for lxc domains - Dontaudit attempts to set sys_resource of logrotate - Allow corosync to read/write wdmd's tmpfs files - I see a ptrace of mozilla_plugin_t by staff_t, will allow without deny_ptrace being set - Allow cron jobs to read bind config for unbound - libvirt needs to inhibit systemd - kdumpctl needs to delete boot_t files - Fix duplicate gnome_config_filetrans - virtd_lxc_t is using /dev/fuse - Passenger needs to create a directory in /var/log, needs a backport to RHEL6 for openshift - apcupsd can be setup to listen to snmp trafic - Allow transition from kdumpgui to kdumpctl - Add fixes for munin CGI scripts - Allow deltacloud to connect to openstack at the keystone port - Allow domains that transition to svirt domains to be able to signal them - Fix file context of gstreamer in .cache directory - libvirt is communicating with logind - NetworkManager writes to the systemd inhibit pipe- Allow munin disk plugins to get attributes of all directories - Allow munin disk plugins to get attributes of all directorie - Allow logwatch to get attributes of all directories - Fix networkmanager_manage_lib() interface - Fix gnome_manage_config() to allow to manage sock_file - Fix virtual_domain_context - Add support for dynamic DNS for DHCPv6- Allow svirt to use netlink_route_socket which was a part of auth_use_nsswitch - Add additional labeling for /var/www/openshift/broker - Fix rhev policy - Allow openshift_initrc domain to dbus chat with systemd_logind - Allow httpd to getattr passenger log file if run_stickshift - Allow consolehelper-gtk to connect to xserver - Add labeling for the tmp-inst directory defined in pam_namespace.conf - Add lvm_metadata_t labeling for /etc/multipath- consoletype is no longer used- Add label for efivarfs - Allow certmonger to send signal to itself - Allow plugin-config to read own process status - Add more fixes for pacemaker - apache/drupal can run clamscan on uploaded content - Allow chrome_sandbox_nacl_t to read pid 1 content- Fix MCS Constraints to control ingres and egres controls on the network. - Change name of svirt_nokvm_t to svirt_tcg_t - Allow tuned to request the kernel to load kernel modules- Label /var/lib/pgsql/.ssh as ssh_home_t - Add labeling for /usr/bin/pg_ctl - Allow systemd-logind to manage keyring user tmp dirs - Add support for 7389/tcp port - gems seems to be placed in lots of places - Since xdm is running a full session, it seems to be trying to execute lots of executables via dbus - Add back tcp/8123 port as http_cache port - Add ovirt-guest-agent\.pid labeling - Allow xend to run scsi_id - Allow rhsmcertd-worker to read "physical_package_id" - Allow pki_tomcat to connect to ldap port - Allow lpr to read /usr/share/fonts - Allow open file from CD/DVD drive on domU - Allow munin services plugins to talk to SSSD - Allow all samba domains to create samba directory in var_t directories - Take away svirt_t ability to use nsswitch - Dontaudit attempts by openshift to read apache logs - Allow apache to create as well as append _ra_content_t - Dontaudit sendmail_t reading a leaked file descriptor - Add interface to have admin transition /etc/prelink.cache to the proper label - Add sntp support to ntp policy - Allow firewalld to dbus chat with devicekit_power - Allow tuned to call lsblk - Allow tor to read /proc/sys/kernel/random/uuid - Add tor_can_network_relay boolean- Add openshift_initrc_signal() interface - Fix typos - dspam port is treat as spamd_port_t - Allow setroubleshoot to getattr on all executables - Allow tuned to execute profiles scripts in /etc/tuned - Allow apache to create directories to store its log files - Allow all directories/files in /var/log starting with passenger to be labeled passenger_log_t - Looks like apache is sending sinal to openshift_initrc_t now,needs back port to RHEL6 - Allow Postfix to be configured to listen on TCP port 10026 for email from DSPAM - Add filename transition for /etc/tuned/active_profile - Allow condor_master to send mails - Allow condor_master to read submit.cf - Allow condor_master to create /tmp files/dirs - Allow condor_mater to send sigkill to other condor domains - Allow condor_procd sigkill capability - tuned-adm wants to talk with tuned daemon - Allow kadmind and krb5kdc to also list sssd_public_t - Allow accountsd to dbus chat with init - Fix git_read_generic_system_content_files() interface - pppd wants sys_nice by nmcli because of "syscall=sched_setscheduler" - Fix mozilla_plugin_can_network_connect to allow to connect to all ports - Label all munin plugins which are not covered by munin plugins policy as unconfined_munin_plugin_exec_t - dspam wants to search /var/spool for opendkim data - Revert "Add support for tcp/10026 port as dspam_port_t" - Turning on labeled networking requires additional access for netlabel_peer_t; these allow rules need to be back ported to RHEL6 - Allow all application domains to use fifo_files passed in from userdomains, also allow them to write to tmp_files inherited from userdomain - Allow systemd_tmpfiles_t to setattr on mandb_cache_t- consolekit.pp was not removed from the postinstall script- Add back consolekit policy - Silence bootloader trying to use inherited tty - Silence xdm_dbusd_t trying to execute telepathy apps - Fix shutdown avcs when machine has unconfined.pp disabled - The host and a virtual machine can share the same printer on a usb device - Change oddjob to transition to a ranged openshift_initr_exec_t when run from oddjob - Allow abrt_watch_log_t to execute bin_t - Allow chrome sandbox to write content in ~/.config/chromium - Dontaudit setattr on fontconfig dir for thumb_t - Allow lircd to request the kernel to load module - Make rsync as userdom_home_manager - Allow rsync to search automount filesystem - Add fixes for pacemaker- Add support for 4567/tcp port - Random fixes from Tuomo Soini - xdm wants to get init status - Allow programs to run in fips_mode - Add interface to allow the reading of all blk device nodes - Allow init to relabel rpcbind sock_file - Fix labeling for lastlog and faillog related to logrotate - ALlow aeolus_configserver to use TRAM port - Add fixes for aeolus_configserver - Allow snmpd to connect to snmp port - Allow spamd_update to create spamd_var_lib_t directories - Allow domains that can read sssd_public_t files to also list the directory - Remove miscfiles_read_localization, this is defined for all domains- Allow syslogd to request the kernel to load a module - Allow syslogd_t to read the network state information - Allow xdm_dbusd_t connect to the system DBUS - Add support for 7389/tcp port - Allow domains to read/write all inherited sockets - Allow staff_t to read kmsg - Add awstats_purge_apache_log boolean - Allow ksysguardproces to read /.config/Trolltech.conf - Allow passenger to create and append puppet log files - Add puppet_append_log and puppet_create_log interfaces - Add puppet_manage_log() interface - Allow tomcat domain to search tomcat_var_lib_t - Allow pki_tomcat_t to connect to pki_ca ports - Allow pegasus_t to have net_admin capability - Allow pegasus_t to write /sys/class/net//flags - Allow mailserver_delivery to manage mail_home_rw_t lnk_files - Allow fetchmail to create log files - Allow gnomeclock to manage home config in .kde - Allow bittlebee to read kernel sysctls - Allow logrotate to list /root- Fix userhelper_console_role_template() - Allow enabling Network Access Point service using blueman - Make vmware_host_t as unconfined domain - Allow authenticate users in webaccess via squid, using mysql as backend - Allow gathers to get various metrics on mounted file systems - Allow firewalld to read /etc/hosts - Fix cron_admin_role() to make sysadm cronjobs running in the sysadm_t instead of cronjob_t - Allow kdumpgui to read/write to zipl.conf - Commands needed to get mock to build from staff_t in enforcing mode - Allow mdadm_t to manage cgroup files - Allow all daemons and systemprocesses to use inherited initrc_tmp_t files - dontaudit ifconfig_t looking at fifo_files that are leaked to it - Add lableing for Quest Authentication System- Fix filetrans interface definitions - Dontaudit xdm_t to getattr on BOINC lib files - Add systemd_reload_all_services() interface - Dontaudit write access on /var/lib/net-snmp/mib_indexes - Only stop mcsuntrustedproc from relableing files - Allow accountsd to dbus chat with gdm - Allow realmd to getattr on all fs - Allow logrotate to reload all services - Add systemd unit file for radiusd - Allow winbind to create samba pid dir - Add labeling for /var/nmbd/unexpected - Allow chrome and mozilla plugin to connect to msnp ports- Fix storage_rw_inherited_fixed_disk_dev() to cover also blk_file - Dontaudit setfiles reading /dev/random - On initial boot gnomeclock is going to need to be set buy gdm - Fix tftp_read_content() interface - Random apps looking at kernel file systems - Testing virt with lxc requiers additional access for virsh_t - New allow rules requied for latest libvirt, libvirt talks directly to journald,lxc setup tool needs compromize_kernel,and we need ipc_lock in the container - Allow MPD to read /dev/radnom - Allow sandbox_web_type to read logind files which needs to read pulseaudio - Allow mozilla plugins to read /dev/hpet - Add labeling for /var/lib/zarafa-webap - Allow BOINC client to use an HTTP proxy for all connections - Allow rhsmertd to domain transition to dmidecod - Allow setroubleshootd to send D-Bus msg to ABRT- Define usbtty_device_t as a term_tty - Allow svnserve to accept a connection - Allow xend manage default virt_image_t type - Allow prelink_cron_system_t to overide user componant when executing cp - Add labeling for z-push - Gnomeclock sets the realtime clock - Openshift seems to be storing apache logs in /var/lib/openshift/.log/httpd - Allow lxc domains to use /dev/random and /dev/urandom- Add port defintion for tcp/9000 - Fix labeling for /usr/share/cluster/checkquorum to label also checkquorum.wdmd - Add rules and labeling for $HOME/cache/\.gstreamer-.* directory - Add support for CIM provider openlmi-networking which uses NetworkManager dbus API - Allow shorewall_t to create netlink_socket - Allow krb5admind to block suspend - Fix labels on /var/run/dlm_controld /var/log/dlm_controld - Allow krb5kdc to block suspend - gnomessytemmm_t needs to read /etc/passwd - Allow cgred to read all sysctls- Allow all domains to read /proc/sys/vm/overcommit_memory - Make proc_numa_t an MLS Trusted Object - Add /proc/numactl support for confined users - Allow ssh_t to connect to any port > 1023 - Add openvswitch domain - Pulseaudio tries to create directories in gnome_home_t directories - New ypbind pkg wants to search /var/run which is caused by sd_notify - Allow NM to read certs on NFS/CIFS using use_nfs_*, use_samba_* booleans - Allow sanlock to read /dev/random - Treat php-fpm with httpd_t - Allow domains that can read named_conf_t to be able to list the directories - Allow winbind to create sock files in /var/run/samba- Add smsd policy - Add support for OpenShift sbin labelin - Add boolean to allow virt to use rawip - Allow mozilla_plugin to read all file systems with noxattrs support - Allow kerberos to write on anon_inodefs fs - Additional access required by fenced - Add filename transitions for passwd.lock/group.lock - UPdate man pages - Create coolkey directory in /var/cache with the correct label- Fix label on /etc/group.lock - Allow gnomeclock to create lnk_file in /etc - label /root/.pki as a home_cert_t - Add interface to make sure rpcbind.sock is created with the correct label - Add definition for new directory /var/lib/os-probe and bootloader wants to read udev rules - opendkim should be a part of milter - Allow libvirt to set the kernel sched algorythm - Allow mongod to read sysfs_t - Add authconfig policy - Remove calls to miscfiles_read_localization all domains get this - Allow virsh_t to read /root/.pki/ content - Add label for log directory under /var/www/stickshift- Allow getty to setattr on usb ttys - Allow sshd to search all directories for sshd_home_t content - Allow staff domains to send dbus messages to kdumpgui - Fix labels on /etc/.pwd.lock and friends to be passwd_file_t - Dontaudit setfiles reading urand - Add files_dontaudit_list_tmp() for domains to which we added sys_nice/setsched - Allow staff_gkeyringd_t to read /home/$USER/.local/share/keyrings dir - Allow systemd-timedated to read /dev/urandom - Allow entropyd_t to read proc_t (meminfo) - Add unconfined munin plugin - Fix networkmanager_read_conf() interface - Allow blueman to list /tmp which is needed by sys_nic/setsched - Fix label of /etc/mail/aliasesdb-stamp - numad is searching cgroups - realmd is communicating with networkmanager using dbus - Lots of fixes to try to get kdump to work- Allow loging programs to dbus chat with realmd - Make apache_content_template calling as optional - realmd is using policy kit- Add new selinuxuser_use_ssh_chroot boolean - dbus needs to be able to read/write inherited fixed disk device_t passed through it - Cleanup netutils process allow rule - Dontaudit leaked fifo files from openshift to ping - sanlock needs to read mnt_t lnk files - Fail2ban needs to setsched and sys_nice- Change default label of all files in /var/run/rpcbind - Allow sandbox domains (java) to read hugetlbfs_t - Allow awstats cgi content to create tmp files and read apache log files - Allow setuid/setgid for cupsd-config - Allow setsched/sys_nice pro cupsd-config - Fix /etc/localtime sym link to be labeled locale_t - Allow sshd to search postgresql db t since this is a homedir - Allow xwindows users to chat with realmd - Allow unconfined domains to configure all files and null_device_t service- Adopt pki-selinux policy- pki is leaking which we dontaudit until a pki code fix - Allow setcap for arping - Update man pages - Add labeling for /usr/sbin/mcollectived - pki fixes - Allow smokeping to execute fping in the netutils_t domain- Allow mount to relabelfrom unlabeled file systems - systemd_logind wants to send and receive messages from devicekit disk over dbus to make connected mouse working - Add label to get bin files under libreoffice labeled correctly - Fix interface to allow executing of base_ro_file_type - Add fixes for realmd - Update pki policy - Add tftp_homedir boolean - Allow blueman sched_setscheduler - openshift user domains wants to r/w ssh tcp sockets- Additional requirements for disable unconfined module when booting - Fix label of systemd script files - semanage can use -F /dev/stdin to get input - syslog now uses kerberos keytabs - Allow xserver to compromise_kernel access - Allow nfsd to write to mount_var_run_t when running the mount command - Add filename transition rule for bin_t directories - Allow files to read usr_t lnk_files - dhcpc wants chown - Add support for new openshift labeling - Clean up for tunable+optional statements - Add labeling for /usr/sbin/mkhomedir_helper - Allow antivirus domain to managa amavis spool files - Allow rpcbind_t to read passwd - Allow pyzor running as spamc to manage amavis spool- Add interfaces to read kernel_t proc info - Missed this version of exec_all - Allow anyone who can load a kernel module to compromise kernel - Add oddjob_dbus_chat to openshift apache policy - Allow chrome_sandbox_nacl_t to send signals to itself - Add unit file support to usbmuxd_t - Allow all openshift domains to read sysfs info - Allow openshift domains to getattr on all domains- MLS fixes from Dan - Fix name of capability2 secure_firmware->compromise_kerne- Allow xdm to search all file systems - Add interface to allow the config of all files - Add rngd policy - Remove kgpg as a gpg_exec_t type - Allow plymouthd to block suspend - Allow systemd_dbus to config any file - Allow system_dbus_t to configure all services - Allow freshclam_t to read usr_files - varnishd requires execmem to load modules- Allow semanage to verify types - Allow sudo domain to execute user home files - Allow session_bus_type to transition to user_tmpfs_t - Add dontaudit caused by yum updates - Implement pki policy but not activated- tuned wants to getattr on all filesystems - tuned needs also setsched. The build is needed for test day- Add policy for qemu-qa - Allow razor to write own config files - Add an initial antivirus policy to collect all antivirus program - Allow qdisk to read usr_t - Add additional caps for vmware_host - Allow tmpfiles_t to setattr on mandb_cache_t - Dontaudit leaked files into mozilla_plugin_config_t - Allow wdmd to getattr on tmpfs - Allow realmd to use /dev/random - allow containers to send audit messages - Allow root mount any file via loop device with enforcing mls policy - Allow tmpfiles_t to setattr on mandb_cache_t - Allow tmpfiles_t to setattr on mandb_cache_t - Make userdom_dontaudit_write_all_ not allow open - Allow init scripts to read all unit files - Add support for saphostctrl ports- Add kernel_read_system_state to sandbox_client_t - Add some of the missing access to kdumpgui - Allow systemd_dbusd_t to status the init system - Allow vmnet-natd to request the kernel to load a module - Allow gsf-office-thum to append .cache/gdm/session.log - realmd wants to read .config/dconf/user - Firewalld wants sys_nice/setsched - Allow tmpreaper to delete mandb cache files - Firewalld wants sys_nice/setsched - Allow firewalld to perform a DNS name resolution - Allown winbind to read /usr/share/samba/codepages/lowcase.dat - Add support for HTTPProxy* in /etc/freshclam.conf - Fix authlogin_yubike boolean - Extend smbd_selinux man page to include samba booleans - Allow dhcpc to execute consoletype - Allow ping to use inherited tmp files created in init scripts - On full relabel with unconfined domain disabled, initrc was running some chcon's - Allow people who delete man pages to delete mandb cache files- Add missing permissive domains- Add new mandb policy - ALlow systemd-tmpfiles_t to relabel mandb_cache_t - Allow logrotate to start all unit files- Add fixes for ctbd - Allow nmbd to stream connect to ctbd - Make cglear_t as nsswitch_domain - Fix bogus in interfaces - Allow openshift to read/write postfix public pipe - Add postfix_manage_spool_maildrop_files() interface - stickshift paths have been renamed to openshift - gnome-settings-daemon wants to write to /run/systemd/inhibit/ pipes - Update man pages, adding ENTRYPOINTS- Add mei_device_t - Make sure gpg content in homedir created with correct label - Allow dmesg to write to abrt cache files - automount wants to search virtual memory sysctls - Add support for hplip logs stored in /var/log/hp/tmp - Add labeling for /etc/owncloud/config.php - Allow setroubleshoot to send analysys to syslogd-journal - Allow virsh_t to interact with new fenced daemon - Allow gpg to write to /etc/mail/spamassassiin directories - Make dovecot_deliver_t a mail server delivery type - Add label for /var/tmp/DNS25- Fixes for tomcat_domain template interface- Remove init_systemd and init_upstart boolean, Move init_daemon_domain and init_system_domain to use attributes - Add attribute to all base os types. Allow all domains to read all ro base OS types- Additional unit files to be defined as power unit files - Fix more boolean names- Fix boolean name so subs will continue to work- dbus needs to start getty unit files - Add interface to allow system_dbusd_t to start the poweroff service - xdm wants to exec telepathy apps - Allow users to send messages to systemdlogind - Additional rules needed for systemd and other boot apps - systemd wants to list /home and /boot - Allow gkeyringd to write dbus/conf file - realmd needs to read /dev/urand - Allow readahead to delete /.readahead if labeled root_t, might get created before policy is loaded- Fixes to safe more rules - Re-write tomcat_domain_template() - Fix passenger labeling - Allow all domains to read man pages - Add ephemeral_port_t to the 'generic' port interfaces - Fix the names of postgresql booleans- Stop using attributes form netlabel_peer and syslog, auth_use_nsswitch setsup netlabel_peer - Move netlable_peer check out of booleans - Remove call to recvfrom_netlabel for kerberos call - Remove use of attributes when calling syslog call - Move -miscfiles_read_localization to domain.te to save hundreds of allow rules - Allow all domains to read locale files. This eliminates around 1500 allow rules- Cleanup nis_use_ypbind_uncond interface - Allow rndc to block suspend - tuned needs to modify the schedule of the kernel - Allow svirt_t domains to read alsa configuration files - ighten security on irc domains and make sure they label content in homedir correctly - Add filetrans_home_content for irc files - Dontaudit all getattr access for devices and filesystems for sandbox domains - Allow stapserver to search cgroups directories - Allow all postfix domains to talk to spamd- Add interfaces to ignore setattr until kernel fixes this to be checked after the DAC check - Change pam_t to pam_timestamp_t - Add dovecot_domain attribute and allow this attribute block_suspend capability2 - Add sanlock_use_fusefs boolean - numad wants send/recieve msg - Allow rhnsd to send syslog msgs - Make piranha-pulse as initrc domain - Update openshift instances to dontaudit setattr until the kernel is fixed.- Fix auth_login_pgm_domain() interface to allow domains also managed user tmp dirs because of #856880 related to pam_systemd - Remove pam_selinux.8 which conflicts with man page owned by the pam package - Allow glance-api to talk to mysql - ABRT wants to read Xorg.0.log if if it detects problem with Xorg - Fix gstreamer filename trans. interface- Man page fixes by Dan Walsh- Allow postalias to read postfix config files - Allow man2html to read man pages - Allow rhev-agentd to search all mountpoints - Allow rhsmcertd to read /dev/random - Add tgtd_stream_connect() interface - Add cyrus_write_data() interface - Dontaudit attempts by sandboxX clients connectiing to the xserver_port_t - Add port definition for tcp/81 as http_port_t - Fix /dev/twa labeling - Allow systemd to read modules config- Merge openshift policy - Allow xauth to read /dev/urandom - systemd needs to relabel content in /run/systemd directories - Files unconfined should be able to perform all services on all files - Puppet tmp file can be leaked to all domains - Dontaudit rhsmcertd-worker to search /root/.local - Allow chown capability for zarafa domains - Allow system cronjobs to runcon into openshift domains - Allow virt_bridgehelper_t to manage content in the svirt_home_t labeled directories- nmbd wants to create /var/nmbd - Stop transitioning out of anaconda and firstboot, just causes AVC messages - Allow clamscan to read /etc files - Allow bcfg2 to bind cyphesis port - heartbeat should be run as rgmanager_t instead of corosync_t - Add labeling for /etc/openldap/certs - Add labeling for /opt/sartest directory - Make crontab_t as userdom home reader - Allow tmpreaper to list admin_home dir - Add defition for imap_0 replay cache file - Add support for gitolite3 - Allow virsh_t to send syslog messages - allow domains that can read samba content to be able to list the directories also - Add realmd_dbus_chat to allow all apps that use nsswitch to talk to realmd - Separate out sandbox from sandboxX policy so we can disable it by default - Run dmeventd as lvm_t - Mounting on any directory requires setattr and write permissions - Fix use_nfs_home_dirs() boolean - New labels for pam_krb5 - Allow init and initrc domains to sys_ptrace since this is needed to look at processes not owned by uid 0 - Add realmd_dbus_chat to allow all apps that use nsswitch to talk to realmd- Separate sandbox policy into sandbox and sandboxX, and disable sandbox by default on fresh installs - Allow domains that can read etc_t to read etc_runtime_t - Allow all domains to use inherited tmpfiles- Allow realmd to read resolv.conf - Add pegasus_cache_t type - Label /usr/sbin/fence_virtd as virsh_exec_t - Add policy for pkcsslotd - Add support for cpglockd - Allow polkit-agent-helper to read system-auth-ac - telepathy-idle wants to read gschemas.compiled - Allow plymouthd to getattr on fs_t - Add slpd policy - Allow ksysguardproces to read/write config_usr_t- Fix labeling substitution so rpm will label /lib/systemd content correctly- Add file name transitions for ttyACM0 - spice-vdagent(d)'s are going to log over to syslog - Add sensord policy - Add more fixes for passenger policy related to puppet - Allow wdmd to create wdmd_tmpfs_t - Fix labeling for /var/run/cachefilesd\.pid - Add thumb_tmpfs_t files type- Allow svirt domains to manage the network since this is containerized - Allow svirt_lxc_net_t to send audit messages- Make "snmpwalk -mREDHAT-CLUSTER-MIB ...." working - Allow dlm_controld to execute dlm_stonith labeled as bin_t - Allow GFS2 working on F17 - Abrt needs to execute dmesg - Allow jockey to list the contents of modeprobe.d - Add policy for lightsquid as squid_cron_t - Mailscanner is creating files and directories in /tmp - dmesg is now reading /dev/kmsg - Allow xserver to communicate with secure_firmware - Allow fsadm tools (fsck) to read /run/mount contnet - Allow sysadm types to read /dev/kmsg -- Allow postfix, sssd, rpcd to block_suspend - udev seems to need secure_firmware capability - Allow virtd to send dbus messages to firewalld so it can configure the firewall- Fix labeling of content in /run created by virsh_t - Allow condor domains to read kernel sysctls - Allow condor_master to connect to amqp - Allow thumb drives to create shared memory and semaphores - Allow abrt to read mozilla_plugin config files - Add labels for lightsquid - Default files in /opt and /usr that end in .cgi as httpd_sys_script_t, allow - dovecot_auth_t uses ldap for user auth - Allow domains that can read dhcp_etc_t to read lnk_files - Add more then one watchdog device - Allow useradd_t to manage etc_t files so it can rename it and edit them - Fix invalid class dir should be fifo_file - Move /run/blkid to fsadm and make sure labeling is correct- Fix bogus regex found by eparis - Fix manage run interface since lvm needs more access - syslogd is searching cgroups directory - Fixes to allow virt-sandbox-service to manage lxc var run content- Fix Boolean settings - Add new libjavascriptcoregtk as textrel_shlib_t - Allow xdm_t to create xdm_home_t directories - Additional access required for systemd - Dontaudit mozilla_plugin attempts to ipc_lock - Allow tmpreaper to delete unlabeled files - Eliminate screen_tmp_t and allow it to manage user_tmp_t - Dontaudit mozilla_plugin_config_t to append to leaked file descriptors - Allow web plugins to connect to the asterisk ports - Condor will recreate the lock directory if it does not exist - Oddjob mkhomedir needs to connectto user processes - Make oddjob_mkhomedir_t a userdom home manager- Put placeholder back in place for proper numbering of capabilities - Systemd also configures init scripts- Fix ecryptfs interfaces - Bootloader seems to be trolling around /dev/shm and /dev - init wants to create /etc/systemd/system-update.target.wants - Fix systemd_filetrans call to move it out of tunable - Fix up policy to work with systemd userspace manager - Add secure_firmware capability and remove bogus epolwakeup - Call seutil_*_login_config interfaces where should be needed - Allow rhsmcertd to send signal to itself - Allow thin domains to send signal to itself - Allow Chrome_ChildIO to read dosfs_t- Add role rules for realmd, sambagui- Add new type selinux_login_config_t for /etc/selinux//logins/ - Additional fixes for seutil_manage_module_store() - dbus_system_domain() should be used with optional_policy - Fix svirt to be allowed to use fusefs file system - Allow login programs to read /run/ data created by systemd_login - sssd wants to write /etc/selinux//logins/ for SELinux PAM module - Fix svirt to be allowed to use fusefs file system - Allow piranha domain to use nsswitch - Sanlock needs to send Kill Signals to non root processes - Pulseaudio wants to execute /run/user/PID/.orc- Fix saslauthd when it tries to read /etc/shadow - Label gnome-boxes as a virt homedir - Need to allow svirt_t ability to getattr on nfs_t file systems - Update sanlock policy to solve all AVC's - Change confined users can optionally manage virt content - Handle new directories under ~/.cache - Add block suspend to appropriate domains - More rules required for containers - Allow login programs to read /run/ data created by systemd_logind - Allow staff users to run svirt_t processes- Update to upstream- More fixes for systemd to make rawhide booting from Dan Walsh- Add systemd fixes to make rawhide booting- Add systemd_logind_inhibit_var_run_t attribute - Remove corenet_all_recvfrom_unlabeled() for non-contrib policies because we moved it to domain.if for all domain_type - Add interface for mysqld to dontaudit signull to all processes - Label new /var/run/journal directory correctly - Allow users to inhibit suspend via systemd - Add new type for the /var/run/inhibit directory - Add interface to send signull to systemd_login so avahi can send them - Allow systemd_passwd to send syslog messages - Remove corenet_all_recvfrom_unlabeled() calling fro policy files - Allow editparams.cgi running as httpd_bugzilla_script_t to read /etc/group - Allow smbd to read cluster config - Add additional labeling for passenger - Allow dbus to inhibit suspend via systemd - Allow avahi to send signull to systemd_login- Add interface to dontaudit getattr access on sysctls - Allow sshd to execute /bin/login - Looks like xdm is recreating the xdm directory in ~/.cache/ on login - Allow syslog to use the leaked kernel_t unix_dgram_socket from system-jounald - Fix semanage to work with unconfined domain disabled on F18 - Dontaudit attempts by mozilla plugins to getattr on all kernel sysctls - Virt seems to be using lock files - Dovecot seems to be searching directories of every mountpoint - Allow jockey to read random/urandom, execute shell and install third-party drivers - Add aditional params to allow cachedfiles to manage its content - gpg agent needs to read /dev/random - The kernel hands an svirt domains /SYSxxxxx which is a tmpfs that httpd wants to read and write - Add a bunch of dontaudit rules to quiet svirt_lxc domains - Additional perms needed to run svirt_lxc domains - Allow cgclear to read cgconfig - Allow sys_ptrace capability for snmp - Allow freshclam to read /proc - Allow procmail to manage /home/user/Maildir content - Allow NM to execute wpa_cli - Allow amavis to read clamd system state - Regenerate man pages- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Add realmd and stapserver policies - Allow useradd to manage stap-server lib files - Tighten up capabilities for confined users - Label /etc/security/opasswd as shadow_t - Add label for /dev/ecryptfs - Allow condor_startd_t to start sshd with the ranged - Allow lpstat.cups to read fips_enabled file - Allow pyzor running as spamc_t to create /root/.pyzor directory - Add labelinf for amavisd-snmp init script - Add support for amavisd-snmp - Allow fprintd sigkill self - Allow xend (w/o libvirt) to start virtual machines - Allow aiccu to read /etc/passwd - Allow condor_startd to Make specified domain MCS trusted for setting any category set for the processes it executes - Add condor_startd_ranged_domtrans_to() interface - Add ssd_conf_t for /etc/sssd - accountsd needs to fchown some files/directories - Add ICACLient and zibrauserdata as mozilla_filetrans_home_content - SELinux reports afs_t needs dac_override to read /etc/mtab, even though everything works, adding dontaudit - Allow xend_t to read the /etc/passwd file- Until we figure out how to fix systemd issues, allow all apps that send syslog messages to send them to kernel_t - Add init_access_check() interface - Fix label on /usr/bin/pingus to not be labeled as ping_exec_t - Allow tcpdump to create a netlink_socket - Label newusers like useradd - Change xdm log files to be labeled xdm_log_t - Allow sshd_t with privsep to work in MLS - Allow freshclam to update databases thru HTTP proxy - Allow s-m-config to access check on systemd - Allow abrt to read public files by default - Fix amavis_create_pid_files() interface - Add labeling and filename transition for dbomatic.log - Allow system_dbusd_t to stream connect to bluetooth, and use its socket - Allow amavisd to execute fsav - Allow tuned to use sys_admin and sys_nice capabilities - Add php-fpm policy from Bryan - Add labeling for aeolus-configserver-thinwrapper - Allow thin domains to execute shell - Fix gnome_role_gkeyringd() interface description - Lot of interface fixes - Allow OpenMPI job running as condor_startd_ssh_t to manage condor lib files - Allow OpenMPI job to use kerberos - Make deltacloudd_t as nsswitch_domain - Allow xend_t to run lsscsi - Allow qemu-dm running as xend_t to create tun_socket - Add labeling for /opt/brother/Printers(.*/)?inf - Allow jockey-backend to read pyconfig-64.h labeled as usr_t - Fix clamscan_can_scan_system boolean - Allow lpr to connectto to /run/user/$USER/keyring-22uREb/pkcs11- initrc is calling exportfs which is not confined so it attempts to read nfsd_files - Fixes for passenger running within openshift. - Add labeling for all tomcat6 dirs - Add support for tomcat6 - Allow cobblerd to read /etc/passwd - Allow jockey to read sysfs and and execute binaries with bin_t - Allow thum to use user terminals - Allow cgclear to read cgconfig config files - Fix bcf2g.fc - Remove sysnet_dns_name_resolve() from policies where auth_use_nsswitch() is used for other domains - Allow dbomatic to execute ruby - abrt_watch_log should be abrt_domain - Allow mozilla_plugin to connect to gatekeeper port- add ptrace_child access to process - remove files_read_etc_files() calling from all policies which have auth_use_nsswith() - Allow boinc domains to manage boinc_lib_t lnk_files - Add support for boinc-client.service unit file - Add support for boinc.log - Allow mozilla_plugin execmod on mozilla home files if allow_ex - Allow dovecot_deliver_t to read dovecot_var_run_t - Allow ldconfig and insmod to manage kdumpctl tmp files - Move thin policy out from cloudform.pp and add a new thin poli - pacemaker needs to communicate with corosync streams - abrt is now started on demand by dbus - Allow certmonger to talk directly to Dogtag servers - Change labeling for /var/lib/cobbler/webui_sessions to httpd_c - Allow mozila_plugin to execute gstreamer home files - Allow useradd to delete all file types stored in the users hom - rhsmcertd reads the rpm database - Add support for lightdm- Add tomcat policy - Remove pyzor/razor policy - rhsmcertd reads the rpm database - Dontaudit thumb to setattr on xdm_tmp dir - Allow wicd to execute ldconfig in the networkmanager_t domain - Add /var/run/cherokee\.pid labeling - Allow mozilla_plugin to create mozilla_plugin_tmp_t lnk files too - Allow postfix-master to r/w pipes other postfix domains - Allow snort to create netlink_socket - Add kdumpctl policy - Allow firstboot to create tmp_t files/directories - /usr/bin/paster should not be labeled as piranha_exec_t - remove initrc_domain from tomcat - Allow ddclient to read /etc/passwd - Allow useradd to delete all file types stored in the users homedir - Allow ldconfig and insmod to manage kdumpctl tmp files - Firstboot should be just creating tmp_t dirs and xauth should be allowed to write to those - Transition xauth files within firstboot_tmp_t - Fix labeling of /run/media to match /media - Label all lxdm.log as xserver_log_t - Add port definition for mxi port - Allow local_login_t to execute tmux- apcupsd needs to read /etc/passwd - Sanlock allso sends sigkill - Allow glance_registry to connect to the mysqld port - Dontaudit mozilla_plugin trying to getattr on /dev/gpmctl - Allow firefox plugins/flash to connect to port 1234 - Allow mozilla plugins to delete user_tmp_t files - Add transition name rule for printers.conf.O - Allow virt_lxc_t to read urand - Allow systemd_loigind to list gstreamer_home_dirs - Fix labeling for /usr/bin - Fixes for cloudform services * support FIPS - Allow polipo to work as web caching - Allow chfn to execute tmux- Add support for ecryptfs * ecryptfs does not support xattr * we need labeling for HOMEDIR - Add policy for (u)mount.ecryptfs* - Fix labeling of kerbero host cache files, allow rpc.svcgssd to manage host cache - Allow dovecot to manage Maildir content, fix transitions to Maildir - Allow postfix_local to transition to dovecot_deliver - Dontaudit attempts to setattr on xdm_tmp_t, looks like bogus code - Cleanup interface definitions - Allow apmd to change with the logind daemon - Changes required for sanlock in rhel6 - Label /run/user/apache as httpd_tmp_t - Allow thumb to use lib_t as execmod if boolean turned on - Allow squid to create the squid directory in /var with the correct labe - Add a new policy for glusterd from Bryan Bickford (bbickfor@redhat.com) - Allow virtd to exec xend_exec_t without transition - Allow virtd_lxc_t to unmount all file systems- PolicyKit path has changed - Allow httpd connect to dirsrv socket - Allow tuned to write generic kernel sysctls - Dontaudit logwatch to gettr on /dev/dm-2 - Allow policykit-auth to manage kerberos files - Make condor_startd and rgmanager as initrc domain - Allow virsh to read /etc/passwd - Allow mount to mount on user_tmp_t for /run/user/dwalsh/gvfs - xdm now needs to execute xsession_exec_t - Need labels for /var/lib/gdm - Fix files_filetrans_named_content() interface - Add new attribute - initrc_domain - Allow systemd_logind_t to signal, signull, sigkill all processes - Add filetrans rules for etc_runtime files- Rename boolean names to remove allow_- Mass merge with upstream * new policy topology to include contrib policy modules * we have now two base policy patches- Fix description of authlogin_nsswitch_use_ldap - Fix transition rule for rhsmcertd_t needed for RHEL7 - Allow useradd to list nfs state data - Allow openvpn to manage its log file and directory - We want vdsm to transition to mount_t when executing mount command to make sure /etc/mtab remains labeled correctly - Allow thumb to use nvidia devices - Allow local_login to create user_tmp_t files for kerberos - Pulseaudio needs to read systemd_login /var/run content - virt should only transition named system_conf_t config files - Allow munin to execute its plugins - Allow nagios system plugin to read /etc/passwd - Allow plugin to connect to soundd port - Fix httpd_passwd to be able to ask passwords - Radius servers can use ldap for backing store - Seems to need to mount on /var/lib for xguest polyinstatiation to work. - Allow systemd_logind to list the contents of gnome keyring - VirtualGL need xdm to be able to manage content in /etc/opt/VirtualGL - Add policy for isns-utils- Add policy for subversion daemon - Allow boinc to read passwd - Allow pads to read kernel network state - Fix man2html interface for sepolgen-ifgen - Remove extra /usr/lib/systemd/system/smb - Remove all /lib/systemd and replace with /usr/lib/systemd - Add policy for man2html - Fix the label of kerberos_home_t to krb5_home_t - Allow mozilla plugins to use Citrix - Allow tuned to read /proc/sys/kernel/nmi_watchdog - Allow tune /sys options via systemd's tmpfiles.d "w" type- Dontaudit lpr_t to read/write leaked mozilla tmp files - Add file name transition for .grl-podcasts directory - Allow corosync to read user tmp files - Allow fenced to create snmp lib dirs/files - More fixes for sge policy - Allow mozilla_plugin_t to execute any application - Allow dbus to read/write any open file descriptors to any non security file on the system that it inherits to that it can pass them to another domain - Allow mongod to read system state information - Fix wrong type, we should dontaudit sys_admin for xdm_t not xserver_t - Allow polipo to manage polipo_cache dirs - Add jabbar_client port to mozilla_plugin_t - Cleanup procmail policy - system bus will pass around open file descriptors on files that do not have labels on them - Allow l2tpd_t to read system state - Allow tuned to run ls /dev - Allow sudo domains to read usr_t files - Add label to machine-id - Fix corecmd_read_bin_symlinks cut and paste error- Fix pulseaudio port definition - Add labeling for condor_starter - Allow chfn_t to creat user_tmp_files - Allow chfn_t to execute bin_t - Allow prelink_cron_system_t to getpw calls - Allow sudo domains to manage kerberos rcache files - Allow user_mail_domains to work with courie - Port definitions necessary for running jboss apps within openshift - Add support for openstack-nova-metadata-api - Add support for nova-console* - Add support for openstack-nova-xvpvncproxy - Fixes to make privsep+SELinux working if we try to use chage to change passwd - Fix auth_role() interface - Allow numad to read sysfs - Allow matahari-rpcd to execute shell - Add label for ~/.spicec - xdm is executing lspci as root which is requesting a sys_admin priv but seems to succeed without it - Devicekit_disk wants to read the logind sessions file when writing a cd - Add fixes for condor to make condor jobs working correctly - Change label of /var/log/rpmpkgs to cron_log_t - Access requires to allow systemd-tmpfiles --create to work. - Fix obex to be a user application started by the session bus. - Add additional filename trans rules for kerberos - Fix /var/run/heartbeat labeling - Allow apps that are managing rcache to file trans correctly - Allow openvpn to authenticate against ldap server - Containers need to listen to network starting and stopping events- Make systemd unit files less specific- Fix zarafa labeling - Allow guest_t to fix labeling - corenet_tcp_bind_all_unreserved_ports(ssh_t) should be called with the user_tcp_server boolean - add lxc_contexts - Allow accountsd to read /proc - Allow restorecond to getattr on all file sytems - tmpwatch now calls getpw - Allow apache daemon to transition to pwauth domain - Label content under /var/run/user/NAME/keyring* as gkeyringd_tmp_t - The obex socket seems to be a stream socket - dd label for /var/run/nologin- Allow jetty running as httpd_t to read hugetlbfs files - Allow sys_nice and setsched for rhsmcertd - Dontaudit attempts by mozilla_plugin_t to bind to ssdp ports - Allow setfiles to append to xdm_tmp_t - Add labeling for /export as a usr_t directory - Add labels for .grl files created by gstreamer- Add labeling for /usr/share/jetty/bin/jetty.sh - Add jetty policy which contains file type definitios - Allow jockey to use its own fifo_file and make this the default for all domains - Allow mozilla_plugins to use spice (vnc_port/couchdb) - asterisk wants to read the network state - Blueman now uses /var/lib/blueman- Add label for nodejs_debug - Allow mozilla_plugin_t to create ~/.pki directory and content- Add clamscan_can_scan_system boolean - Allow mysqld to read kernel network state - Allow sshd to read/write condor lib files - Allow sshd to read/write condor-startd tcp socket - Fix description on httpd_graceful_shutdown - Allow glance_registry to communicate with mysql - dbus_system_domain is using systemd to lauch applications - add interfaces to allow domains to send kill signals to user mail agents - Remove unnessary access for svirt_lxc domains, add privs for virtd_lxc_t - Lots of new access required for secure containers - Corosync needs sys_admin capability - ALlow colord to create shm - .orc should be allowed to be created by any app that can create gstream home content, thumb_t to be specific - Add boolean to control whether or not mozilla plugins can create random content in the users homedir - Add new interface to allow domains to list msyql_db directories, needed for libra - shutdown has to be allowed to delete etc_runtime_t - Fail2ban needs to read /etc/passwd - Allow ldconfig to create /var/cache/ldconfig - Allow tgtd to read hardware state information - Allow collectd to create packet socket - Allow chronyd to send signal to itself - Allow collectd to read /dev/random - Allow collectd to send signal to itself - firewalld needs to execute restorecon - Allow restorecon and other login domains to execute restorecon- Allow logrotate to getattr on systemd unit files - Add support for tor systemd unit file - Allow apmd to create /var/run/pm-utils with the correct label - Allow l2tpd to send sigkill to pppd - Allow pppd to stream connect to l2tpd - Add label for scripts in /etc/gdm/ - Allow systemd_logind_t to ignore mcs constraints on sigkill - Fix files_filetrans_system_conf_named_files() interface - Add labels for /usr/share/wordpress/wp-includes/*.php - Allow cobbler to get SELinux mode and booleans- Add unconfined_execmem_exec_t as an alias to bin_t - Allow fenced to read snmp var lib files, also allow it to read usr_t - ontaudit access checks on all executables from mozilla_plugin - Allow all user domains to setexec, so that sshd will work properly if it call setexec(NULL) while running withing a user mode - Allow systemd_tmpfiles_t to getattr all pipes and sockets - Allow glance-registry to send system log messages - semanage needs to manage mock lib files/dirs- Add policy for abrt-watch-log - Add definitions for jboss_messaging ports - Allow systemd_tmpfiles to manage printer devices - Allow oddjob to use nsswitch - Fix labeling of log files for postgresql - Allow mozilla_plugin_t to execmem and execstack by default - Allow firewalld to execute shell - Fix /etc/wicd content files to get created with the correct label - Allow mcelog to exec shell - Add ~/.orc as a gstreamer_home_t - /var/spool/postfix/lib64 should be labeled lib_t - mpreaper should be able to list all file system labeled directories - Add support for apache to use openstack - Add labeling for /etc/zipl.conf and zipl binary - Turn on allow_execstack and turn off telepathy transition for final release- More access required for virt_qmf_t - Additional assess required for systemd-logind to support multi-seat - Allow mozilla_plugin to setrlimit - Revert changes to fuse file system to stop deadlock- Allow condor domains to connect to ephemeral ports - More fixes for condor policy - Allow keystone to stream connect to mysqld - Allow mozilla_plugin_t to read generic USB device to support GPS devices - Allow thum to file name transition gstreamer home content - Allow thum to read all non security files - Allow glance_api_t to connect to ephemeral ports - Allow nagios plugins to read /dev/urandom - Allow syslogd to search postfix spool to support postfix chroot env - Fix labeling for /var/spool/postfix/dev - Allow wdmd chown - Label .esd_auth as pulseaudio_home_t - Have no idea why keyring tries to write to /run/user/dwalsh/dconf/user, but we can dontaudit for now- Add support for clamd+systemd - Allow fresclam to execute systemctl to handle clamd - Change labeling for /usr/sbin/rpc.ypasswd.env - Allow yppaswd_t to execute yppaswd_exec_t - Allow yppaswd_t to read /etc/passwd - Gnomekeyring socket has been moved to /run/user/USER/ - Allow samba-net to connect to ldap port - Allow signal for vhostmd - allow mozilla_plugin_t to read user_home_t socket - New access required for secure Linux Containers - zfs now supports xattrs - Allow quantum to execute sudo and list sysfs - Allow init to dbus chat with the firewalld - Allow zebra to read /etc/passwd- Allow svirt_t to create content in the users homedir under ~/.libvirt - Fix label on /var/lib/heartbeat - Allow systemd_logind_t to send kill signals to all processes started by a user - Fuse now supports Xattr Support- upowered needs to setsched on the kernel - Allow mpd_t to manage log files - Allow xdm_t to create /var/run/systemd/multi-session-x - Add rules for missedfont.log to be used by thumb.fc - Additional access required for virt_qmf_t - Allow dhclient to dbus chat with the firewalld - Add label for lvmetad - Allow systemd_logind_t to remove userdomain sock_files - Allow cups to execute usr_t files - Fix labeling on nvidia shared libraries - wdmd_t needs access to sssd and /etc/passwd - Add boolean to allow ftp servers to run in passive mode - Allow namepspace_init_t to relabelto/from a different user system_u from the user the namespace_init running with - Fix using httpd_use_fusefs - Allow chrome_sandbox_nacl to write inherited user tmp files as we allow it for chrome_sandbox- Rename rdate port to time port, and allow gnomeclock to connect to it - We no longer need to transition to ldconfig from rpm, rpm_script, or anaconda - /etc/auto.* should be labeled bin_t - Add httpd_use_fusefs boolean - Add fixes for heartbeat - Allow sshd_t to signal processes that it transitions to - Add condor policy - Allow svirt to create monitors in ~/.libvirt - Allow dovecot to domtrans sendmail to handle sieve scripts - Lot of fixes for cfengine- /var/run/postmaster.* labeling is no longer needed - Alllow drbdadmin to read /dev/urandom - l2tpd_t seems to use ptmx - group+ and passwd+ should be labeled as /etc/passwd - Zarafa-indexer is a socket- Ensure lastlog is labeled correctly - Allow accountsd to read /proc data about gdm - Add fixes for tuned - Add bcfg2 fixes which were discovered during RHEL6 testing - More fixes for gnome-keyring socket being moved - Run semanage as a unconfined domain, and allow initrc_t to create tmpfs_t sym links on shutdown - Fix description for files_dontaudit_read_security_files() interface- Add new policy and man page for bcfg2 - cgconfig needs to use getpw calls - Allow domains that communicate with the keyring to use cache_home_t instead of gkeyringd_tmpt - gnome-keyring wants to create a directory in cache_home_t - sanlock calls getpw- Add numad policy and numad man page - Add fixes for interface bugs discovered by SEWatch - Add /tmp support for squid - Add fix for #799102 * change default labeling for /var/run/slapd.* sockets - Make thumb_t as userdom_home_reader - label /var/lib/sss/mc same as pubconf, so getpw domains can read it - Allow smbspool running as cups_t to stream connect to nmbd - accounts needs to be able to execute passwd on behalf of users - Allow systemd_tmpfiles_t to delete boot flags - Allow dnssec_trigger to connect to apache ports - Allow gnome keyring to create sock_files in ~/.cache - google_authenticator is using .google_authenticator - sandbox running from within firefox is exposing more leaks - Dontaudit thumb to read/write /dev/card0 - Dontaudit getattr on init_exec_t for gnomeclock_t - Allow certmonger to do a transition to certmonger_unconfined_t - Allow dhcpc setsched which is caused by nmcli - Add rpm_exec_t for /usr/sbin/bcfg2 - system cronjobs are sending dbus messages to systemd_logind - Thumnailers read /dev/urand- Allow auditctl getcap - Allow vdagent to use libsystemd-login - Allow abrt-dump-oops to search /etc/abrt - Got these avc's while trying to print a boarding pass from firefox - Devicekit is now putting the media directory under /run/media - Allow thumbnailers to create content in ~/.thumbails directory - Add support for proL2TPd by Dominick Grift - Allow all domains to call getcap - wdmd seems to get a random chown capability check that it does not need - Allow vhostmd to read kernel sysctls- Allow chronyd to read unix - Allow hpfax to read /etc/passwd - Add support matahari vios-proxy-* apps and add virtd_exec_t label for them - Allow rpcd to read quota_db_t - Update to man pages to match latest policy - Fix bug in jockey interface for sepolgen-ifgen - Add initial svirt_prot_exec_t policy- More fixes for systemd from Dan Walsh- Add a new type for /etc/firewalld and allow firewalld to write to this directory - Add definition for ~/Maildir, and allow mail deliver domains to write there - Allow polipo to run from a cron job - Allow rtkit to schedule wine processes - Allow mozilla_plugin_t to acquire a bug, and allow it to transition gnome content in the home dir to the proper label - Allow users domains to send signals to consolehelper domains- More fixes for boinc policy - Allow polipo domain to create its own cache dir and pid file - Add systemctl support to httpd domain - Add systemctl support to polipo, allow NetworkManager to manage the service - Add policy for jockey-backend - Add support for motion daemon which is now covered by zoneminder policy - Allow colord to read/write motion tmpfs - Allow vnstat to search through var_lib_t directories - Stop transitioning to quota_t, from init an sysadm_t- Add svirt_lxc_file_t as a customizable type- Add additional fixes for icmp nagios plugin - Allow cron jobs to open fifo_files from cron, since service script opens /dev/stdin - Add certmonger_unconfined_exec_t - Make sure tap22 device is created with the correct label - Allow staff users to read systemd unit files - Merge in previously built policy - Arpwatch needs to be able to start netlink sockets in order to start - Allow cgred_t to sys_ptrace to look at other DAC Processes- Back port some of the access that was allowed in nsplugin_t - Add definitiona for couchdb ports - Allow nagios to use inherited users ttys - Add git support for mock - Allow inetd to use rdate port - Add own type for rdate port - Allow samba to act as a portmapper - Dontaudit chrome_sandbox attempts to getattr on chr_files in /dev - New fixes needed for samba4 - Allow apps that use lib_t to read lib_t symlinks- Add policy for nove-cert - Add labeling for nova-openstack systemd unit files - Add policy for keystoke- Fix man pages fro domains - Add man pages for SELinux users and roles - Add storage_dev_filetrans_named_fixed_disk() and use it for smartmon - Add policy for matahari-rpcd - nfsd executes mount command on restart - Matahari domains execute renice and setsched - Dontaudit leaked tty in mozilla_plugin_config - mailman is changing to a per instance naming - Add 7600 and 4447 as jboss_management ports - Add fixes for nagios event handlers - Label httpd.event as httpd_exec_t, it is an apache daemon- Add labeling for /var/spool/postfix/dev/log - NM reads sysctl.conf - Iscsi log file context specification fix - Allow mozilla plugins to send dbus messages to user domains that transition to it - Allow mysql to read the passwd file - Allow mozilla_plugin_t to create mozilla home dirs in user homedir - Allow deltacloud to read kernel sysctl - Allow postgresql_t to connectto itselfAllow postgresql_t to connectto itself - Allow postgresql_t to connectto itself - Add login_userdomain attribute for users which can log in using terminal- Allow sysadm_u to reach system_r by default #784011 - Allow nagios plugins to use inherited user terminals - Razor labeling is not used no longer - Add systemd support for matahari - Add port_types to man page, move booleans to the top, fix some english - Add support for matahari-sysconfig-console - Clean up matahari.fc - Fix matahari_admin() interfac - Add labels for/etc/ssh/ssh_host_*.pub keys- Allow ksysguardproces to send system log msgs - Allow boinc setpgid and signull - Allow xdm_t to sys_ptrace to run pidof command - Allow smtpd_t to manage spool files/directories and symbolic links - Add labeling for jetty - Needed changes to get unbound/dnssec to work with openswan- Add user_fonts_t alias xfs_tmp_t - Since depmod now runs as insmod_t we need to write to kernel_object_t - Allow firewalld to dbus chat with networkmanager - Allow qpidd to connect to matahari ports - policykit needs to read /proc for uses not owned by it - Allow systemctl apps to connecto the init stream- Turn on deny_ptrace boolean- Remove pam_selinux.8 man page. There was a conflict.- Add proxy class and read access for gssd_proxy - Separate out the sharing public content booleans - Allow certmonger to execute a script and send signals to apache and dirsrv to reload the certificate - Add label transition for gstream-0.10 and 12 - Add booleans to allow rsync to share nfs and cifs file sytems - chrome_sandbox wants to read the /proc/PID/exe file of the program that executed it - Fix filename transitions for cups files - Allow denyhosts to read "unix" - Add file name transition for locale.conf.new - Allow boinc projects to gconf config files - sssd needs to be able to increase the socket limit under certain loads - sge_execd needs to read /etc/passwd - Allow denyhost to check network state - NetworkManager needs to read sessions data - Allow denyhost to check network state - Allow xen to search virt images directories - Add label for /dev/megaraid_sas_ioctl_node - Add autogenerated man pages- Allow boinc project to getattr on fs - Allow init to execute initrc_state_t - rhev-agent package was rename to ovirt-guest-agent - If initrc_t creates /etc/local.conf then we need to make sure it is labeled correctly - sytemd writes content to /run/initramfs and executes it on shutdown - kdump_t needs to read /etc/mtab, should be back ported to F16 - udev needs to load kernel modules in early system boot- Need to add sys_ptrace back in since reading any content in /proc can cause these accesses - Add additional systemd interfaces which are needed fro *_admin interfaces - Fix bind_admin() interface- Allow firewalld to read urand - Alias java, execmem_mono to bin_t to allow third parties - Add label for kmod - /etc/redhat-lsb contains binaries - Add boolean to allow gitosis to send mail - Add filename transition also for "event20" - Allow systemd_tmpfiles_t to delete all file types - Allow collectd to ipc_lock- make consoletype_exec optional, so we can remove consoletype policy - remove unconfined_permisive.patch - Allow openvpn_t to inherit user home content and tmp content - Fix dnssec-trigger labeling - Turn on obex policy for staff_t - Pem files should not be secret - Add lots of rules to fix AVC's when playing with containers - Fix policy for dnssec - Label ask-passwd directories correctly for systemd- sshd fixes seem to be causing unconfined domains to dyntrans to themselves - fuse file system is now being mounted in /run/user - systemd_logind is sending signals to processes that are dbus messaging with it - Add support for winshadow port and allow iscsid to connect to this port - httpd should be allowed to bind to the http_port_t udp socket - zarafa_var_lib_t can be a lnk_file - A couple of new .xsession-errors files - Seems like user space and login programs need to read logind_sessions_files - Devicekit disk seems to be being launched by systemd - Cleanup handling of setfiles so most of rules in te file - Correct port number for dnssec - logcheck has the home dir set to its cache- Add policy for grindengine MPI jobs- Add new sysadm_secadm.pp module * contains secadm definition for sysadm_t - Move user_mail_domain access out of the interface into the te file - Allow httpd_t to create httpd_var_lib_t directories as well as files - Allow snmpd to connect to the ricci_modcluster stream - Allow firewalld to read /etc/passwd - Add auth_use_nsswitch for colord - Allow smartd to read network state - smartdnotify needs to read /etc/group- Allow gpg and gpg_agent to store sock_file in gpg_secret_t directory - lxdm startup scripts should be labeled bin_t, so confined users will work - mcstransd now creates a pid, needs back port to F16 - qpidd should be allowed to connect to the amqp port - Label devices 010-029 as usb devices - ypserv packager says ypserv does not use tmp_t so removing selinux policy types - Remove all ptrace commands that I believe are caused by the kernel/ps avcs - Add initial Obex policy - Add logging_syslogd_use_tty boolean - Add polipo_connect_all_unreserved bolean - Allow zabbix to connect to ftp port - Allow systemd-logind to be able to switch VTs - Allow apache to communicate with memcached through a sock_file- Fix file_context.subs_dist for now to work with pre usrmove- More /usr move fixes- Add zabbix_can_network boolean - Add httpd_can_connect_zabbix boolean - Prepare file context labeling for usrmove functions - Allow system cronjobs to read kernel network state - Add support for selinux_avcstat munin plugin - Treat hearbeat with corosync policy - Allow corosync to read and write to qpidd shared mem - mozilla_plugin is trying to run pulseaudio - Fixes for new sshd patch for running priv sep domains as the users context - Turn off dontaudit rules when turning on allow_ypbind - udev now reads /etc/modules.d directory- Turn on deny_ptrace boolean for the Rawhide run, so we can test this out - Cups exchanges dbus messages with init - udisk2 needs to send syslog messages - certwatch needs to read /etc/passwd- Add labeling for udisks2 - Allow fsadmin to communicate with the systemd process- Treat Bip with bitlbee policy * Bip is an IRC proxy - Add port definition for interwise port - Add support for ipa_memcached socket - systemd_jounald needs to getattr on all processes - mdadmin fixes * uses getpw - amavisd calls getpwnam() - denyhosts calls getpwall()- Setup labeling of /var/rsa and /var/lib/rsa to allow login programs to write there - bluetooth says they do not use /tmp and want to remove the type - Allow init to transition to colord - Mongod needs to read /proc/sys/vm/zone_reclaim_mode - Allow postfix_smtpd_t to connect to spamd - Add boolean to allow ftp to connect to all ports > 1023 - Allow sendmain to write to inherited dovecot tmp files - setroubleshoot needs to be able to execute rpm to see what version of packages- Merge systemd patch - systemd-tmpfiles wants to relabel /sys/devices/system/cpu/online - Allow deltacloudd dac_override, setuid, setgid caps - Allow aisexec to execute shell - Add use_nfs_home_dirs boolean for ssh-keygen- Fixes to make rawhide boot in enforcing mode with latest systemd changes- Add labeling for /var/run/systemd/journal/syslog - libvirt sends signals to ifconfig - Allow domains that read logind session files to list them- Fixed destined form libvirt-sandbox - Allow apps that list sysfs to also read sympolicy links in this filesystem - Add ubac_constrained rules for chrome_sandbox - Need interface to allow domains to use tmpfs_t files created by the kernel, used by libra - Allow postgresql to be executed by the caller - Standardize interfaces of daemons - Add new labeling for mm-handler - Allow all matahari domains to read network state and etc_runtime_t files- New fix for seunshare, requires seunshare_domains to be able to mounton / - Allow systemctl running as logrotate_t to connect to private systemd socket - Allow tmpwatch to read meminfo - Allow rpc.svcgssd to read supported_krb5_enctype - Allow zarafa domains to read /dev/random and /dev/urandom - Allow snmpd to read dev_snmp6 - Allow procmail to talk with cyrus - Add fixes for check_disk and check_nagios plugins- default trans rules for Rawhide policy - Make sure sound_devices controlC* are labeled correctly on creation - sssd now needs sys_admin - Allow snmp to read all proc_type - Allow to setup users homedir with quota.group- Add httpd_can_connect_ldap() interface - apcupsd_t needs to use seriel ports connected to usb devices - Kde puts procmail mail directory under ~/.local/share - nfsd_t can trigger sys_rawio on tests that involve too many mountpoints, dontaudit for now - Add labeling for /sbin/iscsiuio- Add label for /var/lib/iscan/interpreter - Dont audit writes to leaked file descriptors or redirected output for nacl - NetworkManager needs to write to /sys/class/net/ib*/mode- Allow abrt to request the kernel to load a module - Make sure mozilla content is labeled correctly - Allow tgtd to read system state - More fixes for boinc * allow to resolve dns name * re-write boinc policy to use boinc_domain attribute - Allow munin services plugins to use NSCD services- Allow mozilla_plugin_t to manage mozilla_home_t - Allow ssh derived domain to execute ssh-keygen in the ssh_keygen_t domain - Add label for tumblerd- Fixes for xguest package- Fixes related to /bin, /sbin - Allow abrt to getattr on blk files - Add type for rhev-agent log file - Fix labeling for /dev/dmfm - Dontaudit wicd leaking - Allow systemd_logind_t to look at process info of apps that exchange dbus messages with it - Label /etc/locale.conf correctly - Allow user_mail_t to read /dev/random - Allow postfix-smtpd to read MIMEDefang - Add label for /var/log/suphp.log - Allow swat_t to connect and read/write nmbd_t sock_file - Allow systemd-tmpfiles to setattr for /run/user/gdm/dconf - Allow systemd-tmpfiles to change user identity in object contexts - More fixes for rhev_agentd_t consolehelper policy- Use fs_use_xattr for squashf - Fix procs_type interface - Dovecot has a new fifo_file /var/run/dovecot/stats-mail - Dovecot has a new fifo_file /var/run/stats-mail - Colord does not need to connect to network - Allow system_cronjob to dbus chat with NetworkManager - Puppet manages content, want to make sure it labels everything correctly- Change port 9050 to tor_socks_port_t and then allow openvpn to connect to it - Allow all postfix domains to use the fifo_file - Allow sshd_t to getattr on all file systems in order to generate avc on nfs_t - Allow apmd_t to read grub.cfg - Let firewallgui read the selinux config - Allow systemd-tmpfiles to delete content in /root that has been moved to /tmp - Fix devicekit_manage_pid_files() interface - Allow squid to check the network state - Dontaudit colord getattr on file systems - Allow ping domains to read zabbix_tmp_t files- Allow mcelog_t to create dir and file in /var/run and label it correctly - Allow dbus to manage fusefs - Mount needs to read process state when mounting gluster file systems - Allow collectd-web to read collectd lib files - Allow daemons and system processes started by init to read/write the unix_stream_socket passed in from as stdin/stdout/stderr - Allow colord to get the attributes of tmpfs filesystem - Add sanlock_use_nfs and sanlock_use_samba booleans - Add bin_t label for /usr/lib/virtualbox/VBoxManage- Add ssh_dontaudit_search_home_dir - Changes to allow namespace_init_t to work - Add interface to allow exec of mongod, add port definition for mongod port, 27017 - Label .kde/share/apps/networkmanagement/certificates/ as home_cert_t - Allow spamd and clamd to steam connect to each other - Add policy label for passwd.OLD - More fixes for postfix and postfix maildro - Add ftp support for mozilla plugins - Useradd now needs to manage policy since it calls libsemanage - Fix devicekit_manage_log_files() interface - Allow colord to execute ifconfig - Allow accountsd to read /sys - Allow mysqld-safe to execute shell - Allow openct to stream connect to pcscd - Add label for /var/run/nm-dns-dnsmasq\.conf - Allow networkmanager to chat with virtd_t- Pulseaudio changes - Merge patches- Merge patches back into git repository.- Remove allow_execmem boolean and replace with deny_execmem boolean- Turn back on allow_execmem boolean- Add more MCS fixes to make sandbox working - Make faillog MLS trusted to make sudo_$1_t working - Allow sandbox_web_client_t to read passwd_file_t - Add .mailrc file context - Remove execheap from openoffice domain - Allow chrome_sandbox_nacl_t to read cpu_info - Allow virtd to relabel generic usb which is need if USB device - Fixes for virt.if interfaces to consider chr_file as image file type- Remove Open Office policy - Remove execmem policy- MCS fixes - quota fixes- Remove transitions to consoletype- Make nvidia* to be labeled correctly - Fix abrt_manage_cache() interface - Make filetrans rules optional so base policy will build - Dontaudit chkpwd_t access to inherited TTYS - Make sure postfix content gets created with the correct label - Allow gnomeclock to read cgroup - Fixes for cloudform policy- Check in fixed for Chrome nacl support- Begin removing qemu_t domain, we really no longer need this domain. - systemd_passwd needs dac_overide to communicate with users TTY's - Allow svirt_lxc domains to send kill signals within their container- Remove qemu.pp again without causing a crash- Remove qemu.pp, everything should use svirt_t or stay in its current domain- Allow policykit to talk to the systemd via dbus - Move chrome_sandbox_nacl_t to permissive domains - Additional rules for chrome_sandbox_nacl- Change bootstrap name to nacl - Chrome still needs execmem - Missing role for chrome_sandbox_bootstrap - Add boolean to remove execmem and execstack from virtual machines - Dontaudit xdm_t doing an access_check on etc_t directories- Allow named to connect to dirsrv by default - add ldapmap1_0 as a krb5_host_rcache_t file - Google chrome developers asked me to add bootstrap policy for nacl stuff - Allow rhev_agentd_t to getattr on mountpoints - Postfix_smtpd_t needs access to milters and cleanup seems to read/write postfix_smtpd_t unix_stream_sockets- Fixes for cloudform policies which need to connect to random ports - Make sure if an admin creates modules content it creates them with the correct label - Add port 8953 as a dns port used by unbound - Fix file name transition for alsa and confined users- Turn on mock_t and thumb_t for unconfined domains- Policy update should not modify local contexts- Remove ada policy- Remove tzdata policy - Add labeling for udev - Add cloudform policy - Fixes for bootloader policy- Add policies for nova openstack- Add fixes for nova-stack policy- Allow svirt_lxc_domain to chr_file and blk_file devices if they are in the domain - Allow init process to setrlimit on itself - Take away transition rules for users executing ssh-keygen - Allow setroubleshoot_fixit_t to read /dev/urand - Allow sshd to relbale tunnel sockets - Allow fail2ban domtrans to shorewall in the same way as with iptables - Add support for lnk files in the /var/lib/sssd directory - Allow system mail to connect to courier-authdaemon over an unix stream socket- Add passwd_file_t for /etc/ptmptmp- Dontaudit access checks for all executables, gnome-shell is doing access(EXEC, X_OK) - Make corosync to be able to relabelto cluster lib fies - Allow samba domains to search /var/run/nmbd - Allow dirsrv to use pam - Allow thumb to call getuid - chrome less likely to get mmap_zero bug so removing dontaudit - gimp help-browser has built in javascript - Best guess is that devices named /dev/bsr4096 should be labeled as cpu_device_t - Re-write glance policy- Move dontaudit sys_ptrace line from permissive.te to domain.te - Remove policy for hal, it no longer exists- Don't check md5 size or mtime on certain config files- Remove allow_ptrace and replace it with deny_ptrace, which will remove all ptrace from the system - Remove 2000 dontaudit rules between confined domains on transition and replace with single dontaudit domain domain:process { noatsecure siginh rlimitinh } ;- Fixes for bootloader policy - $1_gkeyringd_t needs to read $HOME/%USER/.local/share/keystore - Allow nsplugin to read /usr/share/config - Allow sa-update to update rules - Add use_fusefs_home_dirs for chroot ssh option - Fixes for grub2 - Update systemd_exec_systemctl() interface - Allow gpg to read the mail spool - More fixes for sa-update running out of cron job - Allow ipsec_mgmt_t to read hardware state information - Allow pptp_t to connect to unreserved_port_t - Dontaudit getattr on initctl in /dev from chfn - Dontaudit getattr on kernel_core from chfn - Add systemd_list_unit_dirs to systemd_exec_systemctl call - Fixes for collectd policy - CHange sysadm_t to create content as user_tmp_t under /tmp- Shrink size of policy through use of attributes for userdomain and apache- Allow virsh to read xenstored pid file - Backport corenetwork fixes from upstream - Do not audit attempts by thumb to search config_home_t dirs (~/.config) - label ~/.cache/telepathy/logger telepathy_logger_cache_home_t - allow thumb to read generic data home files (mime.type)- Allow nmbd to manage sock file in /var/run/nmbd - ricci_modservice send syslog msgs - Stop transitioning from unconfined_t to ldconfig_t, but make sure /etc/ld.so.cache is labeled correctly - Allow systemd_logind_t to manage /run/USER/dconf/user- Fix missing patch from F16- Allow logrotate setuid and setgid since logrotate is supposed to do it - Fixes for thumb policy by grift - Add new nfsd ports - Added fix to allow confined apps to execmod on chrome - Add labeling for additional vdsm directories - Allow Exim and Dovecot SASL - Add label for /var/run/nmbd - Add fixes to make virsh and xen working together - Colord executes ls - /var/spool/cron is now labeled as user_cron_spool_t- Stop complaining about leaked file descriptors during install- Remove java and mono module and merge into execmem- Fixes for thumb policy and passwd_file_t- Fixes caused by the labeling of /etc/passwd - Add thumb.patch to transition unconfined_t to thumb_t for Rawhide- Add support for Clustered Samba commands - Allow ricci_modrpm_t to send log msgs - move permissive virt_qmf_t from virt.te to permissivedomains.te - Allow ssh_t to use kernel keyrings - Add policy for libvirt-qmf and more fixes for linux containers - Initial Polipo - Sanlock needs to run ranged in order to kill svirt processes - Allow smbcontrol to stream connect to ctdbd- Add label for /etc/passwd- Change unconfined_domains to permissive for Rawhide - Add definition for the ephemeral_ports- Make mta_role() active - Allow asterisk to connect to jabber client port - Allow procmail to read utmp - Add NIS support for systemd_logind_t - Allow systemd_logind_t to manage /run/user/$USER/dconf dir which is labeled as config_home_t - Fix systemd_manage_unit_dirs() interface - Allow ssh_t to manage directories passed into it - init needs to be able to create and delete unit file directories - Fix typo in apache_exec_sys_script - Add ability for logrotate to transition to awstat domain- Change screen to use screen_domain attribute and allow screen_domains to read all process domain state - Add SELinux support for ssh pre-auth net process in F17 - Add logging_syslogd_can_sendmail boolean- Add definition for ephemeral ports - Define user_tty_device_t as a customizable_type- Needs to require a new version of checkpolicy - Interface fixes- Allow sanlock to manage virt lib files - Add virt_use_sanlock booelan - ksmtuned is trying to resolve uids - Make sure .gvfs is labeled user_home_t in the users home directory - Sanlock sends kill signals and needs the kill capability - Allow mockbuild to work on nfs homedirs - Fix kerberos_manage_host_rcache() interface - Allow exim to read system state- Allow systemd-tmpfiles to set the correct labels on /var/run, /tmp and other files - We want any file type that is created in /tmp by a process running as initrc_t to be labeled initrc_tmp_t- Allow collectd to read hardware state information - Add loop_control_device_t - Allow mdadm to request kernel to load module - Allow domains that start other domains via systemctl to search unit dir - systemd_tmpfiles, needs to list any file systems mounted on /tmp - No one can explain why radius is listing the contents of /tmp, so we will dontaudit - If I can manage etc_runtime files, I should be able to read the links - Dontaudit hostname writing to mock library chr_files - Have gdm_t setup labeling correctly in users home dir - Label content unde /var/run/user/NAME/dconf as config_home_t - Allow sa-update to execute shell - Make ssh-keygen working with fips_enabled - Make mock work for staff_t user - Tighten security on mock_t- removing unconfined_notrans_t no longer necessary - Clean up handling of secure_mode_insmod and secure_mode_policyload - Remove unconfined_mount_t- Add exim_exec_t label for /usr/sbin/exim_tidydb - Call init_dontaudit_rw_stream_socket() interface in mta policy - sssd need to search /var/cache/krb5rcache directory - Allow corosync to relabel own tmp files - Allow zarafa domains to send system log messages - Allow ssh to do tunneling - Allow initrc scripts to sendto init_t unix_stream_socket - Changes to make sure dmsmasq and virt directories are labeled correctly - Changes needed to allow sysadm_t to manage systemd unit files - init is passing file descriptors to dbus and on to system daemons - Allow sulogin additional access Reported by dgrift and Jeremy Miller - Steve Grubb believes that wireshark does not need this access - Fix /var/run/initramfs to stop restorecon from looking at - pki needs another port - Add more labels for cluster scripts - Allow apps that manage cgroup_files to manage cgroup link files - Fix label on nfs-utils scripts directories - Allow gatherd to read /dev/rand and /dev/urand- pki needs another port - Add more labels for cluster scripts - Fix label on nfs-utils scripts directories - Fixes for cluster - Allow gatherd to read /dev/rand and /dev/urand - abrt leaks fifo files- Add glance policy - Allow mdadm setsched - /var/run/initramfs should not be relabeled with a restorecon run - memcache can be setup to override sys_resource - Allow httpd_t to read tetex data - Allow systemd_tmpfiles to delete kernel modules left in /tmp directory.- Allow Postfix to deliver to Dovecot LMTP socket - Ignore bogus sys_module for lldpad - Allow chrony and gpsd to send dgrams, gpsd needs to write to the real time clock - systemd_logind_t sets the attributes on usb devices - Allow hddtemp_t to read etc_t files - Add permissivedomains module - Move all permissive domains calls to permissivedomain.te - Allow pegasis to send kill signals to other UIDs- Allow insmod_t to use fds leaked from devicekit - dontaudit getattr between insmod_t and init_t unix_stream_sockets - Change sysctl unit file interfaces to use systemctl - Add support for chronyd unit file - Allow mozilla_plugin to read gnome_usr_config - Add policy for new gpsd - Allow cups to create kerberos rhost cache files - Add authlogin_filetrans_named_content, to unconfined_t to make sure shadow and other log files get labeled correctly- Make users_extra and seusers.final into config(noreplace) so semanage users and login does not get overwritten- Add policy for sa-update being run out of cron jobs - Add create perms to postgresql_manage_db - ntpd using a gps has to be able to read/write generic tty_device_t - If you disable unconfined and unconfineduser, rpm needs more privs to manage /dev - fix spec file - Remove qemu_domtrans_unconfined() interface - Make passenger working together with puppet - Add init_dontaudit_rw_stream_socket interface - Fixes for wordpress- Turn on allow_domain_fd_use boolean on F16 - Allow syslog to manage all log files - Add use_fusefs_home_dirs boolean for chrome - Make vdagent working with confined users - Add abrt_handle_event_t domain for ABRT event scripts - Labeled /usr/sbin/rhnreg_ks as rpm_exec_t and added changes related to this change - Allow httpd_git_script_t to read passwd data - Allow openvpn to set its process priority when the nice parameter is used- livecd fixes - spec file fixes- fetchmail can use kerberos - ksmtuned reads in shell programs - gnome_systemctl_t reads the process state of ntp - dnsmasq_t asks the kernel to load multiple kernel modules - Add rules for domains executing systemctl - Bogus text within fc file- Add cfengine policy- Add abrt_domain attribute - Allow corosync to manage cluster lib files - Allow corosync to connect to the system DBUS- Add sblim, uuidd policies - Allow kernel_t dyntrasition to init_t- init_t need setexec - More fixes of rules which cause an explosion in rules by Dan Walsh- Allow rcsmcertd to perform DNS name resolution - Add dirsrvadmin_unconfined_script_t domain type for 389-ds admin scripts - Allow tmux to run as screen - New policy for collectd - Allow gkeyring_t to interact with all user apps - Add rules to allow firstboot to run on machines with the unconfined.pp module removed- Allow systemd_logind to send dbus messages with users - allow accountsd to read wtmp file - Allow dhcpd to get and set capabilities- Fix oracledb_port definition - Allow mount to mounton the selinux file system - Allow users to list /var directories- systemd fixes- Add initial policy for abrt_dump_oops_t - xtables-multi wants to getattr of the proc fs - Smoltclient is connecting to abrt - Dontaudit leaked file descriptors to postdrop - Allow abrt_dump_oops to look at kernel sysctls - Abrt_dump_oops_t reads kernel ring buffer - Allow mysqld to request the kernel to load modules - systemd-login needs fowner - Allow postfix_cleanup_t to searh maildrop- Initial systemd_logind policy - Add policy for systemd_logger and additional proivs for systemd_logind - More fixes for systemd policies- Allow setsched for virsh - Systemd needs to impersonate cups, which means it needs to create tcp_sockets in cups_t domain, as well as manage spool directories - iptables: the various /sbin/ip6?tables.* are now symlinks for /sbin/xtables-multi- A lot of users are running yum -y update while in /root which is causing ldconfig to list the contents, adding dontaudit - Allow colord to interact with the users through the tmpfs file system - Since we changed the label on deferred, we need to allow postfix_qmgr_t to be able to create maildrop_t files - Add label for /var/log/mcelog - Allow asterisk to read /dev/random if it uses TLS - Allow colord to read ini files which are labeled as bin_t - Allow dirsrvadmin sys_resource and setrlimit to use ulimit - Systemd needs to be able to create sock_files for every label in /var/run directory, cupsd being the first. - Also lists /var and /var/spool directories - Add openl2tpd to l2tpd policy - qpidd is reading the sysfs file- Change usbmuxd_t to dontaudit attempts to read chr_file - Add mysld_safe_exec_t for libra domains to be able to start private mysql domains - Allow pppd to search /var/lock dir - Add rhsmcertd policy- Update to upstream- More fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git- Fix spec file to not report Verify errors- Add dspam policy - Add lldpad policy - dovecot auth wants to search statfs #713555 - Allow systemd passwd apps to read init fifo_file - Allow prelink to use inherited terminals - Run cherokee in the httpd_t domain - Allow mcs constraints on node connections - Implement pyicqt policy - Fixes for zarafa policy - Allow cobblerd to send syslog messages- Add policy.26 to the payload - Remove olpc stuff - Remove policygentool- Fixes for zabbix - init script needs to be able to manage sanlock_var_run_... - Allow sandlock and wdmd to create /var/run directories... - mixclip.so has been compiled correctly - Fix passenger policy module name- Add mailscanner policy from dgrift - Allow chrome to optionally be transitioned to - Zabbix needs these rules when starting the zabbix_server_mysql - Implement a type for freedesktop openicc standard (~/.local/share/icc) - Allow system_dbusd_t to read inherited icc_data_home_t files. - Allow colord_t to read icc_data_home_t content. #706975 - Label stuff under /usr/lib/debug as if it was labeled under /- Fixes for sanlock policy - Fixes for colord policy - Other fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log- Add rhev policy module to modules-targeted.conf- Lot of fixes * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log- Allow logrotate to execute systemctl - Allow nsplugin_t to getattr on gpmctl - Fix dev_getattr_all_chr_files() interface - Allow shorewall to use inherited terms - Allow userhelper to getattr all chr_file devices - sandbox domains should be able to getattr and dontaudit search of sysctl_kernel_t - Fix labeling for ABRT Retrace Server- Dontaudit sys_module for ifconfig - Make telepathy and gkeyringd daemon working with confined users - colord wants to read files in users homedir - Remote login should be creating user_tmp_t not its own tmp files- Fix label for /usr/share/munin/plugins/munin_* plugins - Add support for zarafa-indexer - Fix boolean description - Allow colord to getattr on /proc/scsi/scsi - Add label for /lib/upstart/init - Colord needs to list /mnt- Forard port changes from F15 for telepathy - NetworkManager should be allowed to use /dev/rfkill - Fix dontaudit messages to say Domain to not audit - Allow telepathy domains to read/write gnome_cache files - Allow telepathy domains to call getpw - Fixes for colord and vnstatd policy- Allow init_t getcap and setcap - Allow namespace_init_t to use nsswitch - aisexec will execute corosync - colord tries to read files off noxattr file systems - Allow init_t getcap and setcap- Add support for ABRT retrace server - Allow user_t and staff_t access to generic scsi to handle locally plugged in scanners - Allow telepath_msn_t to read /proc/PARENT/cmdline - ftpd needs kill capability - Allow telepath_msn_t to connect to sip port - keyring daemon does not work on nfs homedirs - Allow $1_sudo_t to read default SELinux context - Add label for tgtd sock file in /var/run/ - Add apache_exec_rotatelogs interface - allow all zaraha domains to signal themselves, server writes to /tmp - Allow syslog to read the process state - Add label for /usr/lib/chromium-browser/chrome - Remove the telepathy transition from unconfined_t - Dontaudit sandbox domains trying to mounton sandbox_file_t, this is caused by fuse mounts - Allow initrc_t domain to manage abrt pid files - Add support for AEOLUS project - Virt_admin should be allowed to manage images and processes - Allow plymountd to send signals to init - Change labeling of fping6- Add filename transitions- Fixes for zarafa policy - Add support for AEOLUS project - Change labeling of fping6 - Allow plymountd to send signals to init - Allow initrc_t domain to manage abrt pid files - Virt_admin should be allowed to manage images and processes- xdm_t needs getsession for switch user - Every app that used to exec init is now execing systemdctl - Allow squid to manage krb5_host_rcache_t files - Allow foghorn to connect to agentx port - Fixes for colord policy- Add Dan's patch to remove 64 bit variants - Allow colord to use unix_dgram_socket - Allow apps that search pids to read /var/run if it is a lnk_file - iscsid_t creates its own directory - Allow init to list var_lock_t dir - apm needs to verify user accounts auth_use_nsswitch - Add labeling for systemd unit files - Allow gnomeclok to enable ntpd service using systemctl - systemd_systemctl_t domain was added - Add label for matahari-broker.pid file - We want to remove untrustedmcsprocess from ability to read /proc/pid - Fixes for matahari policy - Allow system_tmpfiles_t to delete user_home_t files in the /tmp dir - Allow sshd to transition to sysadm_t if ssh_sysadm_login is turned on- Fix typo- Add /var/run/lock /var/lock definition to file_contexts.subs - nslcd_t is looking for kerberos cc files - SSH_USE_STRONG_RNG is 1 which requires /dev/random - Fix auth_rw_faillog definition - Allow sysadm_t to set attributes on fixed disks - allow user domains to execute lsof and look at application sockets - prelink_cron job calls telinit -u if init is rewritten - Fixes to run qemu_t from staff_t- Fix label for /var/run/udev to udev_var_run_t - Mock needs to be able to read network state- Add file_contexts.subs to handle /run and /run/lock - Add other fixes relating to /run changes from F15 policy- Allow $1_sudo_t and $1_su_t open access to user terminals - Allow initrc_t to use generic terminals - Make Makefile/Rules.modular run sepolgen-ifgen during build to check if files for bugs -systemd is going to be useing /run and /run/lock for early bootup files. - Fix some comments in rlogin.if - Add policy for KDE backlighthelper - sssd needs to read ~/.k5login in nfs, cifs or fusefs file systems - sssd wants to read .k5login file in users homedir - setroubleshoot reads executables to see if they have TEXTREL - Add /var/spool/audit support for new version of audit - Remove kerberos_connect_524() interface calling - Combine kerberos_master_port_t and kerberos_port_t - systemd has setup /dev/kmsg as stderr for apps it executes - Need these access so that init can impersonate sockets on unix_dgram_socket- Remove some unconfined domains - Remove permissive domains - Add policy-term.patch from Dan- Fix multiple specification for boot.log - devicekit leaks file descriptors to setfiles_t - Change all all_nodes to generic_node and all_if to generic_if - Should not use deprecated interface - Switch from using all_nodes to generic_node and from all_if to generic_if - Add support for xfce4-notifyd - Fix file context to show several labels as SystemHigh - seunshare needs to be able to mounton nfs/cifs/fusefs homedirs - Add etc_runtime_t label for /etc/securetty - Fixes to allow xdm_t to start gkeyringd_USERTYPE_t directly - login.krb needs to be able to write user_tmp_t - dirsrv needs to bind to port 7390 for dogtag - Fix a bug in gpg policy - gpg sends audit messages - Allow qpid to manage matahari files- Initial policy for matahari - Add dev_read_watchdog - Allow clamd to connect clamd port - Add support for kcmdatetimehelper - Allow shutdown to setrlimit and sys_nice - Allow systemd_passwd to talk to /dev/log before udev or syslog is running - Purge chr_file and blk files on /tmp - Fixes for pads - Fixes for piranha-pulse - gpg_t needs to be able to encyprt anything owned by the user- mozilla_plugin_tmp_t needs to be treated as user tmp files - More dontaudits of writes from readahead - Dontaudit readahead_t file_type:dir write, to cover up kernel bug - systemd_tmpfiles needs to relabel faillog directory as well as the file - Allow hostname and consoletype to r/w inherited initrc_tmp_t files handline hostname >> /tmp/myhost- Add policykit fixes from Tim Waugh - dontaudit sandbox domains sandbox_file_t:dir mounton - Add new dontaudit rules for sysadm_dbusd_t - Change label for /var/run/faillock * other fixes which relate with this change- Update to upstream - Fixes for telepathy - Add port defition for ssdp port - add policy for /bin/systemd-notify from Dan - Mount command requires users read mount_var_run_t - colord needs to read konject_uevent_socket - User domains connect to the gkeyring socket - Add colord policy and allow user_t and staff_t to dbus chat with it - Add lvm_exec_t label for kpartx - Dontaudit reading the mail_spool_t link from sandbox -X - systemd is creating sockets in avahi_var_run and system_dbusd_var_run- gpg_t needs to talk to gnome-keyring - nscd wants to read /usr/tmp->/var/tmp to generate randomziation in unixchkpwd - enforce MCS labeling on nodes - Allow arpwatch to read meminfo - Allow gnomeclock to send itself signals - init relabels /dev/.udev files on boot - gkeyringd has to transition back to staff_t when it runs commands in bin_t or shell_exec_t - nautilus checks access on /media directory before mounting usb sticks, dontaudit access_check on mnt_t - dnsmasq can run as a dbus service, needs acquire service - mysql_admin should be allowed to connect to mysql service - virt creates monitor sockets in the users home dir- Allow usbhid-ups to read hardware state information - systemd-tmpfiles has moved - Allo cgroup to sys_tty_config - For some reason prelink is attempting to read gconf settings - Add allow_daemons_use_tcp_wrapper boolean - Add label for ~/.cache/wocky to make telepathy work in enforcing mode - Add label for char devices /dev/dasd* - Fix for apache_role - Allow amavis to talk to nslcd - allow all sandbox to read selinux poilcy config files - Allow cluster domains to use the system bus and send each other dbus messages- Update to upstream- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Update to ref policy - cgred needs chown capability - Add /dev/crash crash_dev_t - systemd-readahead wants to use fanotify which means readahead_t needs sys_admin capability- New labeling for postfmulti #675654 - dontaudit xdm_t listing noxattr file systems - dovecot-auth needs to be able to connect to mysqld via the network as well as locally - shutdown is passed stdout to a xdm_log_t file - smartd creates a fixed disk device - dovecot_etc_t contains a lnk_file that domains need to read - mount needs to be able to read etc_runtim_t:lnk_file since in rawhide this is a link created at boot- syslog_t needs syslog capability - dirsrv needs to be able to create /var/lib/snmp - Fix labeling for dirsrv - Fix for dirsrv policy missing manage_dirs_pattern - corosync needs to delete clvm_tmpfs_t files - qdiskd needs to list hugetlbfs - Move setsched to sandbox_x_domain, so firefox can run without network access - Allow hddtemp to read removable devices - Adding syslog and read_policy permissions to policy * syslog Allow unconfined, sysadm_t, secadm_t, logadm_t * read_policy allow unconfined, sysadm_t, secadm_t, staff_t on Targeted allow sysadm_t (optionally), secadm_t on MLS - mdadm application will write into /sys/.../uevent whenever arrays are assembled or disassembled.- Add tcsd policy- ricci_modclusterd_t needs to bind to rpc ports 500-1023 - Allow dbus to use setrlimit to increase resoueces - Mozilla_plugin is leaking to sandbox - Allow confined users to connect to lircd over unix domain stream socket which allow to use remote control - Allow awstats to read squid logs - seunshare needs to manage tmp_t - apcupsd cgi scripts have a new directory- Fix xserver_dontaudit_read_xdm_pid - Change oracle_port_t to oracledb_port_t to prevent conflict with satellite - Allow dovecot_deliver_t to read/write postfix_master_t:fifo_file. * These fifo_file is passed from postfix_master_t to postfix_local_t to dovecot_deliver_t - Allow readahead to manage readahead pid dirs - Allow readahead to read all mcs levels - Allow mozilla_plugin_t to use nfs or samba homedirs- Allow nagios plugin to read /proc/meminfo - Fix for mozilla_plugin - Allow samba_net_t to create /etc/keytab - pppd_t setting up vpns needs to run unix_chkpwd, setsched its process and write wtmp_t - nslcd can read user credentials - Allow nsplugin to delete mozilla_plugin_tmpfs_t - abrt tries to create dir in rpm_var_lib_t - virt relabels fifo_files - sshd needs to manage content in fusefs homedir - mock manages link files in cache dir- nslcd needs setsched and to read /usr/tmp - Invalid call in likewise policy ends up creating a bogus role - Cannon puts content into /var/lib/bjlib that cups needs to be able to write - Allow screen to create screen_home_t in /root - dirsrv sends syslog messages - pinentry reads stuff in .kde directory - Add labels for .kde directory in homedir - Treat irpinit, iprupdate, iprdump services with raid policy- NetworkManager wants to read consolekit_var_run_t - Allow readahead to create /dev/.systemd/readahead - Remove permissive domains - Allow newrole to run namespace_init- Add sepgsql_contexts file- Update to upstream- Add oracle ports and allow apache to connect to them if the connect_db boolean is turned on - Add puppetmaster_use_db boolean - Fixes for zarafa policy - Fixes for gnomeclock poliy - Fix systemd-tmpfiles to use auth_use_nsswitch- gnomeclock executes a shell - Update for screen policy to handle pipe in homedir - Fixes for polyinstatiated homedir - Fixes for namespace policy and other fixes related to polyinstantiation - Add namespace policy - Allow dovecot-deliver transition to sendmail which is needed by sieve scripts - Fixes for init, psad policy which relate with confined users - Do not audit bootloader attempts to read devicekit pid files - Allow nagios service plugins to read /proc- Add firewalld policy - Allow vmware_host to read samba config - Kernel wants to read /proc Fix duplicate grub def in cobbler - Chrony sends mail, executes shell, uses fifo_file and reads /proc - devicekitdisk getattr all file systems - sambd daemon writes wtmp file - libvirt transitions to dmidecode- Add initial policy for system-setup-keyboard which is now daemon - Label /var/lock/subsys/shorewall as shorewall_lock_t - Allow users to communicate with the gpg_agent_t - Dontaudit mozilla_plugin_t using the inherited terminal - Allow sambagui to read files in /usr - webalizer manages squid log files - Allow unconfined domains to bind ports to raw_ip_sockets - Allow abrt to manage rpm logs when running yum - Need labels for /var/run/bittlebee - Label .ssh under amanda - Remove unused genrequires for virt_domain_template - Allow virt_domain to use fd inherited from virtd_t - Allow iptables to read shorewall config- Gnome apps list config_home_t - mpd creates lnk files in homedir - apache leaks write to mail apps on tmp files - /var/stockmaniac/templates_cache contains log files - Abrt list the connects of mount_tmp_t dirs - passwd agent reads files under /dev and reads utmp file - squid apache script connects to the squid port - fix name of plymouth log file - teamviewer is a wine app - allow dmesg to read system state - Stop labeling files under /var/lib/mock so restorecon will not go into this - nsplugin needs to read network state for google talk- Allow xdm and syslog to use /var/log/boot.log - Allow users to communicate with mozilla_plugin and kill it - Add labeling for ipv6 and dhcp- New labels for ghc http content - nsplugin_config needs to read urand, lvm now calls setfscreate to create dev - pm-suspend now creates log file for append access so we remove devicekit_wri - Change authlogin_use_sssd to authlogin_nsswitch_use_ldap - Fixes for greylist_milter policy- Update to upstream - Fixes for systemd policy - Fixes for passenger policy - Allow staff users to run mysqld in the staff_t domain, akonadi needs this - Add bin_t label for /usr/share/kde4/apps/kajongg/kajongg.py - auth_use_nsswitch does not need avahi to read passwords,needed for resolving data - Dontaudit (xdm_t) gok attempting to list contents of /var/account - Telepathy domains need to read urand - Need interface to getattr all file classes in a mock library for setroubleshoot- Update selinux policy to handle new /usr/share/sandbox/start script- Update to upstream - Fix version of policy in spec file- Allow sandbox to run on nfs partitions, fixes for systemd_tmpfs - remove per sandbox domains devpts types - Allow dkim-milter sending signal to itself- Allow domains that transition to ping or traceroute, kill them - Allow user_t to conditionally transition to ping_t and traceroute_t - Add fixes to systemd- tools, including new labeling for systemd-fsck, systemd-cryptsetup- Turn on systemd policy - mozilla_plugin needs to read certs in the homedir. - Dontaudit leaked file descriptors from devicekit - Fix ircssi to use auth_use_nsswitch - Change to use interface without param in corenet to disable unlabelednet packets - Allow init to relabel sockets and fifo files in /dev - certmonger needs dac* capabilities to manage cert files not owned by root - dovecot needs fsetid to change group membership on mail - plymouthd removes /var/log/boot.log - systemd is creating symlinks in /dev - Change label on /etc/httpd/alias to be all cert_t- Fixes for clamscan and boinc policy - Add boinc_project_t setpgid - Allow alsa to create tmp files in /tmp- Push fixes to allow disabling of unlabeled_t packet access - Enable unlabelednet policy- Fixes for lvm to work with systemd- Fix the label for wicd log - plymouthd creates force-display-on-active-vt file - Allow avahi to request the kernel to load a module - Dontaudit hal leaks - Fix gnome_manage_data interface - Add new interface corenet_packet to define a type as being an packet_type. - Removed general access to packet_type from icecast and squid. - Allow mpd to read alsa config - Fix the label for wicd log - Add systemd policy- Fix gnome_manage_data interface - Dontaudit sys_ptrace capability for iscsid - Fixes for nagios plugin policy- Fix cron to run ranged when started by init - Fix devicekit to use log files - Dontaudit use of devicekit_var_run_t for fstools - Allow init to setattr on logfile directories - Allow hald to manage files in /var/run/pm-utils/ dir which is now labeled as devicekit_var_run_t- Fix up handling of dnsmasq_t creating /var/run/libvirt/network - Turn on sshd_forward_ports boolean by default - Allow sysadmin to dbus chat with rpm - Add interface for rw_tpm_dev - Allow cron to execute bin - fsadm needs to write sysfs - Dontaudit consoletype reading /var/run/pm-utils - Lots of new privs fro mozilla_plugin_t running java app, make mozilla_plugin - certmonger needs to manage dirsrv data - /var/run/pm-utils should be labeled as devicekit_var_run_t- fixes to allow /var/run and /var/lock as tmpfs - Allow chrome sandbox to connect to web ports - Allow dovecot to listem on lmtp and sieve ports - Allov ddclient to search sysctl_net_t - Transition back to original domain if you execute the shell- Remove duplicate declaration- Update to upstream - Cleanup for sandbox - Add attribute to be able to select sandbox types- Allow ddclient to fix file mode bits of ddclient conf file - init leaks file descriptors to daemons - Add labels for /etc/lirc/ and - Allow amavis_t to exec shell - Add label for gssd_tmp_t for /var/tmp/nfs_0- Put back in lircd_etc_t so policy will install- Turn on allow_postfix_local_write_mail_spool - Allow initrc_t to transition to shutdown_t - Allow logwatch and cron to mls_read_to_clearance for MLS boxes - Allow wm to send signull to all applications and receive them from users - lircd patch from field - Login programs have to read /etc/samba - New programs under /lib/systemd - Abrt needs to read config files- Update to upstream - Dontaudit leaked sockets from userdomains to user domains - Fixes for mcelog to handle scripts - Apply patch from Ruben Kerkhof - Allow syslog to search spool dirs- Allow nagios plugins to read usr files - Allow mysqld-safe to send system log messages - Fixes fpr ddclient policy - Fix sasl_admin interface - Allow apache to search zarafa config - Allow munin plugins to search /var/lib directory - Allow gpsd to read sysfs_t - Fix labels on /etc/mcelog/triggers to bin_t- Remove saslauthd_tmp_t and transition tmp files to krb5_host_rcache_t - Allow saslauthd_t to create krb5_host_rcache_t files in /tmp - Fix xserver interface - Fix definition of /var/run/lxdm- Turn on mediawiki policy - kdump leaks kdump_etc_t to ifconfig, add dontaudit - uux needs to transition to uucpd_t - More init fixes relabels man,faillog - Remove maxima defs in libraries.fc - insmod needs to be able to create tmpfs_t files - ping needs setcap- Allow groupd transition to fenced domain when executes fence_node - Fixes for rchs policy - Allow mpd to be able to read samba/nfs files- Fix up corecommands.fc to match upstream - Make sure /lib/systemd/* is labeled init_exec_t - mount wants to setattr on all mountpoints - dovecot auth wants to read dovecot etc files - nscd daemon looks at the exe file of the comunicating daemon - openvpn wants to read utmp file - postfix apps now set sys_nice and lower limits - remote_login (telnetd/login) wants to use telnetd_devpts_t and user_devpts_t to work correctly - Also resolves nsswitch - Fix labels on /etc/hosts.* - Cleanup to make upsteam patch work - allow abrt to read etc_runtime_t- Add conflicts for dirsrv package- Update to upstream - Add vlock policy- Fix sandbox to work on nfs homedirs - Allow cdrecord to setrlimit - Allow mozilla_plugin to read xauth - Change label on systemd-logger to syslogd_exec_t - Install dirsrv policy from dirsrv package- Add virt_home_t, allow init to setattr on xserver_tmp_t and relabel it - Udev needs to stream connect to init and kernel - Add xdm_exec_bootloader boolean, which allows xdm to execute /sbin/grub and read files in /boot directory- Allow NetworkManager to read openvpn_etc_t - Dontaudit hplip to write of /usr dirs - Allow system_mail_t to create /root/dead.letter as mail_home_t - Add vdagent policy for spice agent daemon- Dontaudit sandbox sending sigkill to all user domains - Add policy for rssh_chroot_helper - Add missing flask definitions - Allow udev to relabelto removable_t - Fix label on /var/log/wicd.log - Transition to initrc_t from init when executing bin_t - Add audit_access permissions to file - Make removable_t a device_node - Fix label on /lib/systemd/*- Fixes for systemd to manage /var/run - Dontaudit leaks by firstboot- Allow chome to create netlink_route_socket - Add additional MATHLAB file context - Define nsplugin as an application_domain - Dontaudit sending signals from sandboxed domains to other domains - systemd requires init to build /tmp /var/auth and /var/lock dirs - mount wants to read devicekit_power /proc/ entries - mpd wants to connect to soundd port - Openoffice causes a setattr on a lib_t file for normal users, add dontaudit - Treat lib_t and textrel_shlib_t directories the same - Allow mount read access on virtual images- Allow sandbox_x_domains to work with nfs/cifs/fusefs home dirs. - Allow devicekit_power to domtrans to mount - Allow dhcp to bind to udp ports > 1024 to do named stuff - Allow ssh_t to exec ssh_exec_t - Remove telepathy_butterfly_rw_tmp_files(), dev_read_printk() interfaces which are nolonger used - Fix clamav_append_log() intefaces - Fix 'psad_rw_fifo_file' interface- Allow cobblerd to list cobler appache content- Fixup for the latest version of upowed - Dontaudit sandbox sending SIGNULL to desktop apps- Update to upstream-Mount command from a confined user generates setattr on /etc/mtab file, need to dontaudit this access - dovecot-auth_t needs ipc_lock - gpm needs to use the user terminal - Allow system_mail_t to append ~/dead.letter - Allow NetworkManager to edit /etc/NetworkManager/NetworkManager.conf - Add pid file to vnstatd - Allow mount to communicate with gfs_controld - Dontaudit hal leaks in setfiles- Lots of fixes for systemd - systemd now executes readahead and tmpwatch type scripts - Needs to manage random seed- Allow smbd to use sys_admin - Remove duplicate file context for tcfmgr - Update to upstream- Fix fusefs handling - Do not allow sandbox to manage nsplugin_rw_t - Allow mozilla_plugin_t to connecto its parent - Allow init_t to connect to plymouthd running as kernel_t - Add mediawiki policy - dontaudit sandbox sending signals to itself. This can happen when they are running at different mcs. - Disable transition from dbus_session_domain to telepathy for F14 - Allow boinc_project to use shm - Allow certmonger to search through directories that contain certs - Allow fail2ban the DAC Override so it can read log files owned by non root users- Start adding support for use_fusefs_home_dirs - Add /var/lib/syslog directory file context - Add /etc/localtime as locale file context- Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn off iptables from unconfined user - Allow sudo to send signals to any domains the user could have transitioned to. - Passwd in single user mode needs to talk to console_device_t - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio - locate tried to read a symbolic link, will dontaudit - New labels for telepathy-sunshine content in homedir - Google is storing other binaries under /opt/google/talkplugin - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15 - modemmanger and bluetooth send dbus messages to devicekit_power - Samba needs to getquota on filesystems labeld samba_share_t- Dontaudit attempts by xdm_t to write to bin_t for kdm - Allow initrc_t to manage system_conf_t- Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory. - Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets - Allow confined users to read xdm_etc_t files - Allow xdm_t to transition to xauth_t for lxdm program- Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home - Allow clamd to send signals to itself - Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm. - Allow haze to connect to yahoo chat and messenger port tcp:5050. Bz #637339 - Allow guest to run ps command on its processes by allowing it to read /proc - Allow firewallgui to sys_rawio which seems to be required to setup masqerading - Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba. - Add label for /var/log/slim.log- Pull in cleanups from dgrift - Allow mozilla_plugin_t to execute mozilla_home_t - Allow rpc.quota to do quotamod- Cleanup policy via dgrift - Allow dovecot_deliver to append to inherited log files - Lots of fixes for consolehelper- Fix up Xguest policy- Add vnstat policy - allow libvirt to send audit messages - Allow chrome-sandbox to search nfs_t- Update to upstream- Add the ability to send audit messages to confined admin policies - Remove permissive domain from cmirrord and dontaudit sys_tty_config - Split out unconfined_domain() calls from other unconfined_ calls so we can d - virt needs to be able to read processes to clearance for MLS- Allow all domains that can use cgroups to search tmpfs_t directory - Allow init to send audit messages- Update to upstream- Allow mdadm_t to create files and sock files in /dev/md/- Add policy for ajaxterm- Handle /var/db/sudo - Allow pulseaudio to read alsa config - Allow init to send initrc_t dbus messagesAllow iptables to read shorewall tmp files Change chfn and passwd to use auth_use_pam so they can send dbus messages to fpr intd label vlc as an execmem_exec_t Lots of fixes for mozilla_plugin to run google vidio chat Allow telepath_msn to execute ldconfig and its own tmp files Fix labels on hugepages Allow mdadm to read files on /dev Remove permissive domains and change back to unconfined Allow freshclam to execute shell and bin_t Allow devicekit_power to transition to dhcpc Add boolean to allow icecast to connect to any port- Merge upstream fix of mmap_zero - Allow mount to write files in debugfs_t - Allow corosync to communicate with clvmd via tmpfs - Allow certmaster to read usr_t files - Allow dbus system services to search cgroup_t - Define rlogind_t as a login pgm- Allow mdadm_t to read/write hugetlbfs- Dominic Grift Cleanup - Miroslav Grepl policy for jabberd - Various fixes for mount/livecd and prelink- Merge with upstream- More access needed for devicekit - Add dbadm policy- Merge with upstream- Allow seunshare to fowner- Allow cron to look at user_cron_spool links - Lots of fixes for mozilla_plugin_t - Add sysv file system - Turn unconfined domains to permissive to find additional avcs- Update policy for mozilla_plugin_t- Allow clamscan to read proc_t - Allow mount_t to write to debufs_t dir - Dontaudit mount_t trying to write to security_t dir- Allow clamscan_t execmem if clamd_use_jit set - Add policy for firefox plugin-container- Fix /root/.forward definition- label dead.letter as mail_home_t- Allow login programs to search /cgroups- Fix cert handling- Fix devicekit_power bug - Allow policykit_auth_t more access.- Fix nis calls to allow bind to ports 512-1024 - Fix smartmon- Allow pcscd to read sysfs - systemd fixes - Fix wine_mmap_zero_ignore boolean- Apply Miroslav munin patch - Turn back on allow_execmem and allow_execmod booleans- Merge in fixes from dgrift repository- Update boinc policy - Fix sysstat policy to allow sys_admin - Change failsafe_context to unconfined_r:unconfined_t:s0- New paths for upstart- New permissions for syslog - New labels for /lib/upstart- Add mojomojo policy- Allow systemd to setsockcon on sockets to immitate other services- Remove debugfs label- Update to latest policy- Fix eclipse labeling from IBMSupportAssasstant packageing- Make boot with systemd in enforcing mode- Update to upstream- Add boolean to turn off port forwarding in sshd.- Add support for ebtables - Fixes for rhcs and corosync policy-Update to upstream-Update to upstream-Update to upstream- Add Zarafa policy- Cleanup of aiccu policy - initial mock policy- Lots of random fixes- Update to upstream- Update to upstream - Allow prelink script to signal itself - Cobbler fixes- Add xdm_var_run_t to xserver_stream_connect_xdm - Add cmorrord and mpd policy from Miroslav Grepl- Fix sshd creation of krb cc files for users to be user_tmp_t- Fixes for accountsdialog - Fixes for boinc- Fix label on /var/lib/dokwiki - Change permissive domains to enforcing - Fix libvirt policy to allow it to run on mls- Update to upstream- Allow procmail to execute scripts in the users home dir that are labeled home_bin_t - Fix /var/run/abrtd.lock label- Allow login programs to read krb5_home_t Resolves: 594833 - Add obsoletes for cachefilesfd-selinux package Resolves: #575084- Allow mount to r/w abrt fifo file - Allow svirt_t to getattr on hugetlbfs - Allow abrt to create a directory under /var/spool- Add labels for /sys - Allow sshd to getattr on shutdown - Fixes for munin - Allow sssd to use the kernel key ring - Allow tor to send syslog messages - Allow iptabels to read usr files - allow policykit to read all domains state- Fix path for /var/spool/abrt - Allow nfs_t as an entrypoint for http_sys_script_t - Add policy for piranha - Lots of fixes for sosreport- Allow xm_t to read network state and get and set capabilities - Allow policykit to getattr all processes - Allow denyhosts to connect to tcp port 9911 - Allow pyranha to use raw ip sockets and ptrace itself - Allow unconfined_execmem_t and gconfsd mechanism to dbus - Allow staff to kill ping process - Add additional MLS rules- Allow gdm to edit ~/.gconf dir Resolves: #590677 - Allow dovecot to create directories in /var/lib/dovecot Partially resolves 590224 - Allow avahi to dbus chat with NetworkManager - Fix cobbler labels - Dontaudit iceauth_t leaks - fix /var/lib/lxdm file context - Allow aiccu to use tun tap devices - Dontaudit shutdown using xserver.log- Fixes for sandbox_x_net_t to match access for sandbox_web_t ++ - Add xdm_etc_t for /etc/gdm directory, allow accountsd to manage this directory - Add dontaudit interface for bluetooth dbus - Add chronyd_read_keys, append_keys for initrc_t - Add log support for ksmtuned Resolves: #586663- Allow boinc to send mail- Allow initrc_t to remove dhcpc_state_t - Fix label on sa-update.cron - Allow dhcpc to restart chrony initrc - Don't allow sandbox to send signals to its parent processes - Fix transition from unconfined_t -> unconfined_mount_t -> rpcd_t Resolves: #589136- Fix location of oddjob_mkhomedir Resolves: #587385 - fix labeling on /root/.shosts and ~/.shosts - Allow ipsec_mgmt_t to manage net_conf_t Resolves: #586760- Dontaudit sandbox trying to connect to netlink sockets Resolves: #587609 - Add policy for piranha- Fixups for xguest policy - Fixes for running sandbox firefox- Allow ksmtuned to use terminals Resolves: #586663 - Allow lircd to write to generic usb devices- Allow sandbox_xserver to connectto unconfined stream Resolves: #585171- Allow initrc_t to read slapd_db_t Resolves: #585476 - Allow ipsec_mgmt to use unallocated devpts and to create /etc/resolv.conf Resolves: #585963- Allow rlogind_t to search /root for .rhosts Resolves: #582760 - Fix path for cached_var_t - Fix prelink paths /var/lib/prelink - Allow confined users to direct_dri - Allow mls lvm/cryptosetup to work- Allow virtd_t to manage firewall/iptables config Resolves: #573585- Fix label on /root/.rhosts Resolves: #582760 - Add labels for Picasa - Allow openvpn to read home certs - Allow plymouthd_t to use tty_device_t - Run ncftool as iptables_t - Allow mount to unmount unlabeled_t - Dontaudit hal leaks- Allow livecd to transition to mount- Update to upstream - Allow abrt to delete sosreport Resolves: #579998 - Allow snmp to setuid and gid Resolves: #582155 - Allow smartd to use generic scsi devices Resolves: #582145- Allow ipsec_t to create /etc/resolv.conf with the correct label - Fix reserved port destination - Allow autofs to transition to showmount - Stop crashing tuned- Add telepathysofiasip policy- Update to upstream - Fix label for /opt/google/chrome/chrome-sandbox - Allow modemmanager to dbus with policykit- Fix allow_httpd_mod_auth_pam to use auth_use_pam(httpd_t) - Allow accountsd to read shadow file - Allow apache to send audit messages when using pam - Allow asterisk to bind and connect to sip tcp ports - Fixes for dovecot 2.0 - Allow initrc_t to setattr on milter directories - Add procmail_home_t for .procmailrc file- Fixes for labels during install from livecd- Fix /cgroup file context - Fix broken afs use of unlabled_t - Allow getty to use the console for s390- Fix cgroup handling adding policy for /cgroup - Allow confined users to write to generic usb devices, if user_rw_noexattrfile boolean set- Merge patches from dgrift- Update upstream - Allow abrt to write to the /proc under any process- Fix ~/.fontconfig label - Add /root/.cert label - Allow reading of the fixed_file_disk_t:lnk_file if you can read file - Allow qemu_exec_t as an entrypoint to svirt_t- Update to upstream - Allow tmpreaper to delete sandbox sock files - Allow chrome-sandbox_t to use /dev/zero, and dontaudit getattr file systems - Fixes for gitosis - No transition on livecd to passwd or chfn - Fixes for denyhosts- Add label for /var/lib/upower - Allow logrotate to run sssd - dontaudit readahead on tmpfs blk files - Allow tmpreaper to setattr on sandbox files - Allow confined users to execute dos files - Allow sysadm_t to kill processes running within its clearance - Add accountsd policy - Fixes for corosync policy - Fixes from crontab policy - Allow svirt to manage svirt_image_t chr files - Fixes for qdisk policy - Fixes for sssd policy - Fixes for newrole policy- make libvirt work on an MLS platform- Add qpidd policy- Update to upstream- Allow boinc to read kernel sysctl - Fix snmp port definitions - Allow apache to read anon_inodefs- Allow shutdown dac_override- Add device_t as a file system - Fix sysfs association- Dontaudit ipsec_mgmt sys_ptrace - Allow at to mail its spool files - Allow nsplugin to search in .pulse directory- Update to upstream- Allow users to dbus chat with xdm - Allow users to r/w wireless_device_t - Dontaudit reading of process states by ipsec_mgmt- Fix openoffice from unconfined_t- Add shutdown policy so consolekit can shutdown system- Update to upstream- Update to upstream- Update to upstream - These are merges of my patches - Remove 389 labeling conflicts - Add MLS fixes found in RHEL6 testing - Allow pulseaudio to run as a service - Add label for mssql and allow apache to connect to this database port if boolean set - Dontaudit searches of debugfs mount point - Allow policykit_auth to send signals to itself - Allow modcluster to call getpwnam - Allow swat to signal winbind - Allow usbmux to run as a system role - Allow svirt to create and use devpts- Add MLS fixes found in RHEL6 testing - Allow domains to append to rpm_tmp_t - Add cachefilesfd policy - Dontaudit leaks when transitioning- Change allow_execstack and allow_execmem booleans to on - dontaudit acct using console - Add label for fping - Allow tmpreaper to delete sandbox_file_t - Fix wine dontaudit mmap_zero - Allow abrt to read var_t symlinks- Additional policy for rgmanager- Allow sshd to setattr on pseudo terms- Update to upstream- Allow policykit to send itself signals- Fix duplicate cobbler definition- Fix file context of /var/lib/avahi-autoipd- Merge with upstream- Allow sandbox to work with MLS- Make Chrome work with staff user- Add icecast policy - Cleanup spec file- Add mcelog policy- Lots of fixes found in F12- Fix rpm_dontaudit_leaks- Add getsched to hald_t - Add file context for Fedora/Redhat Directory Server- Allow abrt_helper to getattr on all filesystems - Add label for /opt/real/RealPlayer/plugins/oggfformat\.so- Add gstreamer_home_t for ~/.gstreamer- Update to upstream- Fix git- Turn on puppet policy - Update to dgrift git policy- Move users file to selection by spec file. - Allow vncserver to run as unconfined_u:unconfined_r:unconfined_t- Update to upstream- Remove most of the permissive domains from F12.- Add cobbler policy from dgrift- add usbmon device - Add allow rulse for devicekit_disk- Lots of fixes found in F12, fixes from Tom London- Cleanups from dgrift- Add back xserver_manage_home_fonts- Dontaudit sandbox trying to read nscd and sssd- Update to upstream- Rename udisks-daemon back to devicekit_disk_t policy- Fixes for abrt calls- Add tgtd policy- Update to upstream release- Add asterisk policy back in - Update to upstream release 2.20091117- Update to upstream release 2.20091117- Fixup nut policy- Update to upstream- Allow vpnc request the kernel to load modules- Fix minimum policy installs - Allow udev and rpcbind to request the kernel to load modules- Add plymouth policy - Allow local_login to sys_admin- Allow cupsd_config to read user tmp - Allow snmpd_t to signal itself - Allow sysstat_t to makedir in sysstat_log_t- Update rhcs policy- Allow users to exec restorecond- Allow sendmail to request kernel modules load- Fix all kernel_request_load_module domains- Fix all kernel_request_load_module domains- Remove allow_exec* booleans for confined users. Only available for unconfined_t- More fixes for sandbox_web_t- Allow sshd to create .ssh directory and content- Fix request_module line to module_request- Fix sandbox policy to allow it to run under firefox. - Dont audit leaks.- Fixes for sandbox- Update to upstream - Dontaudit nsplugin search /root - Dontaudit nsplugin sys_nice- Fix label on /usr/bin/notepad, /usr/sbin/vboxadd-service - Remove policycoreutils-python requirement except for minimum- Fix devicekit_disk_t to getattr on all domains sockets and fifo_files - Conflicts seedit (You can not use selinux-policy-targeted and seedit at the same time.)- Add wordpress/wp-content/uploads label - Fixes for sandbox when run from staff_t- Update to upstream - Fixes for devicekit_disk- More fixes- Lots of fixes for initrc and other unconfined domains- Allow xserver to use netlink_kobject_uevent_socket- Fixes for sandbox- Dontaudit setroubleshootfix looking at /root directory- Update to upsteam- Allow gssd to send signals to users - Fix duplicate label for apache content- Update to upstream- Remove polkit_auth on upgrades- Add back in unconfined.pp and unconfineduser.pp - Add Sandbox unshare- Fixes for cdrecord, mdadm, and others- Add capability setting to dhcpc and gpm- Allow cronjobs to read exim_spool_t- Add ABRT policy- Fix system-config-services policy- Allow libvirt to change user componant of virt_domain- Allow cupsd_config_t to be started by dbus - Add smoltclient policy- Add policycoreutils-python to pre install- Make all unconfined_domains permissive so we can see what AVC's happen- Add pt_chown policy- Add kdump policy for Miroslav Grepl - Turn off execstack boolean- Turn on execstack on a temporary basis (#512845)- Allow nsplugin to connecto the session bus - Allow samba_net to write to coolkey data- Allow devicekit_disk to list inotify- Allow svirt images to create sock_file in svirt_var_run_t- Allow exim to getattr on mountpoints - Fixes for pulseaudio- Allow svirt_t to stream_connect to virtd_t- Allod hald_dccm_t to create sock_files in /tmp- More fixes from upstream- Fix polkit label - Remove hidebrokensymptoms for nss_ldap fix - Add modemmanager policy - Lots of merges from upstream - Begin removing textrel_shlib_t labels, from fixed libraries- Update to upstream- Allow certmaster to override dac permissions- Update to upstream- Fix context for VirtualBox- Update to upstream- Allow clamscan read amavis spool files- Fixes for xguest- fix multiple directory ownership of mandirs- Update to upstream- Add rules for rtkit-daemon- Update to upstream - Fix nlscd_stream_connect- Add rtkit policy- Allow rpcd_t to stream connect to rpcbind- Allow kpropd to create tmp files- Fix last duplicate /var/log/rpmpkgs- Update to upstream * add sssd- Update to upstream * cleanup- Update to upstream - Additional mail ports - Add virt_use_usb boolean for svirt- Fix mcs rules to include chr_file and blk_file- Add label for udev-acl- Additional rules for consolekit/udev, privoxy and various other fixes- New version for upstream- Allow NetworkManager to read inotifyfs- Allow setroubleshoot to run mlocate- Update to upstream- Add fish as a shell - Allow fprintd to list usbfs_t - Allow consolekit to search mountpoints - Add proper labeling for shorewall- New log file for vmware - Allow xdm to setattr on user_tmp_t- Upgrade to upstream- Allow fprintd to access sys_ptrace - Add sandbox policy- Add varnishd policy- Fixes for kpropd- Allow brctl to r/w tun_tap_device_t- Add /usr/share/selinux/packages- Allow rpcd_t to send signals to kernel threads- Fix upgrade for F10 to F11- Add policy for /var/lib/fprint-Remove duplicate line- Allow svirt to manage pci and other sysfs device data- Fix package selection handling- Fix /sbin/ip6tables-save context - Allod udev to transition to mount - Fix loading of mls policy file- Add shorewall policy- Additional rules for fprintd and sssd- Allow nsplugin to unix_read unix_write sem for unconfined_java- Fix uml files to be owned by users- Fix Upgrade path to install unconfineduser.pp when unocnfined package is 3.0.0 or less- Allow confined users to manage virt_content_t, since this is home dir content - Allow all domains to read rpm_script_tmp_t which is what shell creates on redirection- Fix labeling on /var/lib/misc/prelink* - Allow xserver to rw_shm_perms with all x_clients - Allow prelink to execute files in the users home directory- Allow initrc_t to delete dev_null - Allow readahead to configure auditing - Fix milter policy - Add /var/lib/readahead- Update to latest milter code from Paul Howarth- Additional perms for readahead- Allow pulseaudio to acquire_svc on session bus - Fix readahead labeling- Allow sysadm_t to run rpm directly - libvirt needs fowner- Allow sshd to read var_lib symlinks for freenx- Allow nsplugin unix_read and write on users shm and sem - Allow sysadm_t to execute su- Dontaudit attempts to getattr user_tmpfs_t by lvm - Allow nfs to share removable media- Add ability to run postdrop from confined users- Fixes for podsleuth- Turn off nsplugin transition - Remove Konsole leaked file descriptors for release- Allow cupsd_t to create link files in print_spool_t - Fix iscsi_stream_connect typo - Fix labeling on /etc/acpi/actions - Don't reinstall unconfine and unconfineuser on upgrade if they are not installed- Allow audioentroy to read etc files- Add fail2ban_var_lib_t - Fixes for devicekit_power_t- Separate out the ucnonfined user from the unconfined.pp package- Make sure unconfined_java_t and unconfined_mono_t create user_tmpfs_t.- Upgrade to latest upstream - Allow devicekit_disk sys_rawio- Dontaudit binds to ports < 1024 for named - Upgrade to latest upstream- Allow podsleuth to use tmpfs files- Add customizable_types for svirt- Allow setroubelshoot exec* privs to prevent crash from bad libraries - add cpufreqselector- Dontaudit listing of /root directory for cron system jobs- Fix missing ld.so.cache label- Add label for ~/.forward and /root/.forward- Fixes for svirt- Fixes to allow svirt read iso files in homedir- Add xenner and wine fixes from mgrepl- Allow mdadm to read/write mls override- Change to svirt to only access svirt_image_t- Fix libvirt policy- Upgrade to latest upstream- Fixes for iscsid and sssd - More cleanups for upgrade from F10 to Rawhide.- Add pulseaudio, sssd policy - Allow networkmanager to exec udevadm- Add pulseaudio context- Upgrade to latest patches- Fixes for libvirt- Update to Latest upstream- Fix setrans.conf to show SystemLow for s0- Further confinement of qemu images via svirt- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Allow NetworkManager to manage /etc/NetworkManager/system-connections- add virtual_image_context and virtual_domain_context files- Allow rpcd_t to send signal to mount_t - Allow libvirtd to run ranged- Fix sysnet/net_conf_t- Fix squidGuard labeling- Re-add corenet_in_generic_if(unlabeled_t)* Tue Feb 10 2009 Dan Walsh 3.6.5-2 - Add git web policy- Add setrans contains from upstream- Do transitions outside of the booleans- Allow xdm to create user_tmp_t sockets for switch user to work- Fix staff_t domain- Grab remainder of network_peer_controls patch- More fixes for devicekit- Upgrade to latest upstream- Add boolean to disallow unconfined_t login- Add back transition from xguest to mozilla- Add virt_content_ro_t and labeling for isos directory- Fixes for wicd daemon- More mls/rpm fixes- Add policy to make dbus/nm-applet work- Remove polgen-ifgen from post and add trigger to policycoreutils-python- Add wm policy - Make mls work in graphics mode- Fixed for DeviceKit- Add devicekit policy- Update to upstream- Define openoffice as an x_domain- Fixes for reading xserver_tmp_t- Allow cups_pdf_t write to nfs_t- Remove audio_entropy policy- Update to upstream- Allow hal_acl_t to getattr/setattr fixed_disk- Change userdom_read_all_users_state to include reading symbolic links in /proc- Fix dbus reading /proc information- Add missing alias for home directory content- Fixes for IBM java location- Allow unconfined_r unconfined_java_t- Add cron_role back to user domains- Fix sudo setting of user keys- Allow iptables to talk to terminals - Fixes for policy kit - lots of fixes for booting.- Cleanup policy- Rebuild for Python 2.6- Fix labeling on /var/spool/rsyslog- Allow postgresl to bind to udp nodes- Allow lvm to dbus chat with hal - Allow rlogind to read nfs_t- Fix cyphesis file context- Allow hal/pm-utils to look at /var/run/video.rom - Add ulogd policy- Additional fixes for cyphesis - Fix certmaster file context - Add policy for system-config-samba - Allow hal to read /var/run/video.rom- Allow dhcpc to restart ypbind - Fixup labeling in /var/run- Add certmaster policy- Fix confined users - Allow xguest to read/write xguest_dbusd_t- Allow openoffice execstack/execmem privs- Allow mozilla to run with unconfined_execmem_t- Dontaudit domains trying to write to .xsession-errors- Allow nsplugin to look at autofs_t directory- Allow kerneloops to create tmp files- More alias for fastcgi- Remove mod_fcgid-selinux package- Fix dovecot access- Policy cleanup- Remove Multiple spec - Add include - Fix makefile to not call per_role_expansion- Fix labeling of libGL- Update to upstream- Update to upstream policy- Fixes for confined xwindows and xdm_t- Allow confined users and xdm to exec wm - Allow nsplugin to talk to fifo files on nfs- Allow NetworkManager to transition to avahi and iptables - Allow domains to search other domains keys, coverup kernel bug- Fix labeling for oracle- Allow nsplugin to comminicate with xdm_tmp_t sock_file- Change all user tmpfs_t files to be labeled user_tmpfs_t - Allow radiusd to create sock_files- Upgrade to upstream- Allow confined users to login with dbus- Fix transition to nsplugin- Add file context for /dev/mspblk.*- Fix transition to nsplugin '- Fix labeling on new pm*log - Allow ssh to bind to all nodes- Merge upstream changes - Add Xavier Toth patches- Add qemu_cache_t for /var/cache/libvirt- Remove gamin policy- Add tinyxs-max file system support- Update to upstream - New handling of init scripts- Allow pcsd to dbus - Add memcache policy- Allow audit dispatcher to kill his children- Update to upstream - Fix crontab use by unconfined user- Allow ifconfig_t to read dhcpc_state_t- Update to upstream- Update to upstream- Allow system-config-selinux to work with policykit- Fix novel labeling- Consolodate pyzor,spamassassin, razor into one security domain - Fix xdm requiring additional perms.- Fixes for logrotate, alsa- Eliminate vbetool duplicate entry- Fix xguest -> xguest_mozilla_t -> xguest_openiffice_t - Change dhclient to be able to red networkmanager_var_run- Update to latest refpolicy - Fix libsemanage initial install bug- Add inotify support to nscd- Allow unconfined_t to setfcap- Allow amanda to read tape - Allow prewikka cgi to use syslog, allow audisp_t to signal cgi - Add support for netware file systems- Allow ypbind apps to net_bind_service- Allow all system domains and application domains to append to any log file- Allow gdm to read rpm database - Allow nsplugin to read mplayer config files- Allow vpnc to run ifconfig- Allow confined users to use postgres - Allow system_mail_t to exec other mail clients - Label mogrel_rails as an apache server- Apply unconfined_execmem_exec_t to haskell programs- Fix prelude file context- allow hplip to talk dbus - Fix context on ~/.local dir- Prevent applications from reading x_device- Add /var/lib/selinux context- Update to upstream- Add livecd policy- Dontaudit search of admin_home for init_system_domain - Rewrite of xace interfaces - Lots of new fs_list_inotify - Allow livecd to transition to setfiles_mac- Begin XAce integration- Merge Upstream- Allow amanada to create data files- Fix initial install, semanage setup- Allow system_r for httpd_unconfined_script_t- Remove dmesg boolean - Allow user domains to read/write game data- Change unconfined_t to transition to unconfined_mono_t when running mono - Change XXX_mono_t to transition to XXX_t when executing bin_t files, so gnome-do will work- Remove old booleans from targeted-booleans.conf file- Add boolean to mmap_zero - allow tor setgid - Allow gnomeclock to set clock- Don't run crontab from unconfined_t- Change etc files to config files to allow users to read them- Lots of fixes for confined domains on NFS_t homedir- dontaudit mrtg reading /proc - Allow iscsi to signal itself - Allow gnomeclock sys_ptrace- Allow dhcpd to read kernel network state- Label /var/run/gdm correctly - Fix unconfined_u user creation- Allow transition from initrc_t to getty_t- Allow passwd to communicate with user sockets to change gnome-keyring- Fix initial install- Allow radvd to use fifo_file - dontaudit setfiles reading links - allow semanage sys_resource - add allow_httpd_mod_auth_ntlm_winbind boolean - Allow privhome apps including dovecot read on nfs and cifs home dirs if the boolean is set- Allow nsplugin to read /etc/mozpluggerrc, user_fonts - Allow syslog to manage innd logs. - Allow procmail to ioctl spamd_exec_t- Allow initrc_t to dbus chat with consolekit.- Additional access for nsplugin - Allow xdm setcap/getcap until pulseaudio is fixed- Allow mount to mkdir on tmpfs - Allow ifconfig to search debugfs- Fix file context for MATLAB - Fixes for xace- Allow stunnel to transition to inetd children domains - Make unconfined_dbusd_t an unconfined domain- Fixes for qemu/virtd- Fix bug in mozilla policy to allow xguest transition - This will fix the libsemanage.dbase_llist_query: could not find record value libsemanage.dbase_llist_query: could not query record value (No such file or directory) bug in xguest- Allow nsplugin to run acroread- Add cups_pdf policy - Add openoffice policy to run in xguest- prewika needs to contact mysql - Allow syslog to read system_map files- Change init_t to an unconfined_domain- Allow init to transition to initrc_t on shell exec. - Fix init to be able to sendto init_t. - Allow syslog to connect to mysql - Allow lvm to manage its own fifo_files - Allow bugzilla to use ldap - More mls fixes- fixes for init policy (#436988) - fix build- Additional changes for MLS policy- Fix initrc_context generation for MLS- Fixes for libvirt- Allow bitlebee to read locale_t- More xselinux rules- Change httpd_$1_script_r*_t to httpd_$1_content_r*_t- Prepare policy for beta release - Change some of the system domains back to unconfined - Turn on some of the booleans- Allow nsplugin_config execstack/execmem - Allow nsplugin_t to read alsa config - Change apache to use user content- Add cyphesis policy- Fix Makefile.devel to build mls modules - Fix qemu to be more specific on labeling- Update to upstream fixes- Allow staff to mounton user_home_t- Add xace support- Add fusectl file system- Fixes from yum-cron - Update to latest upstream- Fix userdom_list_user_files- Merge with upstream- Allow udev to send audit messages- Add additional login users interfaces - userdom_admin_login_user_template(staff)- More fixes for polkit- Eliminate transition from unconfined_t to qemu by default - Fixes for gpg- Update to upstream- Fixes for staff_t- Add policy for kerneloops - Add policy for gnomeclock- Fixes for libvirt- Fixes for nsplugin- More fixes for qemu- Additional ports for vnc and allow qemu and libvirt to search all directories- Update to upstream - Add libvirt policy - add qemu policy- Allow fail2ban to create a socket in /var/run- Allow allow_httpd_mod_auth_pam to work- Add audisp policy and prelude- Allow all user roles to executae samba net command- Allow usertypes to read/write noxattr file systems- Fix nsplugin to allow flashplugin to work in enforcing mode- Allow pam_selinux_permit to kill all processes- Allow ptrace or user processes by users of same type - Add boolean for transition to nsplugin- Allow nsplugin sys_nice, getsched, setsched- Allow login programs to talk dbus to oddjob- Add procmail_log support - Lots of fixes for munin- Allow setroubleshoot to read policy config and send audit messages- Allow users to execute all files in homedir, if boolean set - Allow mount to read samba config- Fixes for xguest to run java plugin- dontaudit pam_t and dbusd writing to user_home_t- Update gpg to allow reading of inotify- Change user and staff roles to work correctly with varied perms- Fix munin log, - Eliminate duplicate mozilla file context - fix wpa_supplicant spec- Fix role transition from unconfined_r to system_r when running rpm - Allow unconfined_domains to communicate with user dbus instances- Fixes for xguest- Let all uncofined domains communicate with dbus unconfined- Run rpm in system_r- Zero out customizable types- Fix definiton of admin_home_t- Fix munin file context- Allow cron to run unconfined apps- Modify default login to unconfined_u- Dontaudit dbus user client search of /root- Update to upstream- Fixes for polkit - Allow xserver to ptrace- Add polkit policy - Symplify userdom context, remove automatic per_role changes- Update to upstream - Allow httpd_sys_script_t to search users homedirs- Allow rpm_script to transition to unconfined_execmem_t- Remove user based home directory separation- Remove user specific crond_t- Merge with upstream - Allow xsever to read hwdata_t - Allow login programs to setkeycreate- Update to upstream- Update to upstream- Allow XServer to read /proc/self/cmdline - Fix unconfined cron jobs - Allow fetchmail to transition to procmail - Fixes for hald_mac - Allow system_mail to transition to exim - Allow tftpd to upload files - Allow xdm to manage unconfined_tmp - Allow udef to read alsa config - Fix xguest to be able to connect to sound port- Fixes for hald_mac - Treat unconfined_home_dir_t as a home dir - dontaudit rhgb writes to fonts and root- Fix dnsmasq - Allow rshd full login privs- Allow rshd to connect to ports > 1023- Fix vpn to bind to port 4500 - Allow ssh to create shm - Add Kismet policy- Allow rpm to chat with networkmanager- Fixes for ipsec and exim mail - Change default to unconfined user- Pass the UNK_PERMS param to makefile - Fix gdm location- Make alsa work- Fixes for consolekit and startx sessions- Dontaudit consoletype talking to unconfined_t- Remove homedir_template- Check asound.state- Fix exim policy- Allow tmpreadper to read man_t - Allow racoon to bind to all nodes - Fixes for finger print reader- Allow xdm to talk to input device (fingerprint reader) - Allow octave to run as java- Allow login programs to set ioctl on /proc- Allow nsswitch apps to read samba_var_t- Fix maxima- Eliminate rpm_t:fifo_file avcs - Fix dbus path for helper app- Fix service start stop terminal avc's- Allow also to search var_lib - New context for dbus launcher- Allow cupsd_config_t to read/write usb_device_t - Support for finger print reader, - Many fixes for clvmd - dbus starting networkmanager- Fix java and mono to run in xguest account- Fix to add xguest account when inititial install - Allow mono, java, wine to run in userdomains- Allow xserver to search devpts_t - Dontaudit ldconfig output to homedir- Remove hplip_etc_t change back to etc_t.- Allow cron to search nfs and samba homedirs- Allow NetworkManager to dbus chat with yum-updated- Allow xfs to bind to port 7100- Allow newalias/sendmail dac_override - Allow bind to bind to all udp ports- Turn off direct transition- Allow wine to run in system role- Fix java labeling- Define user_home_type as home_type- Allow sendmail to create etc_aliases_t- Allow login programs to read symlinks on homedirs- Update an readd modules- Cleanup spec file- Allow xserver to be started by unconfined process and talk to tty- Upgrade to upstream to grab postgressql changes- Add setransd for mls policy- Add ldconfig_cache_t- Allow sshd to write to proc_t for afs login- Allow xserver access to urand- allow dovecot to search mountpoints- Fix Makefile for building policy modules- Fix dhcpc startup of service- Fix dbus chat to not happen for xguest and guest users- Fix nagios cgi - allow squid to communicate with winbind- Fixes for ldconfig- Update from upstream- Add nasd support- Fix new usb devices and dmfm- Eliminate mount_ntfs_t policy, merge into mount_t- Allow xserver to write to ramfs mounted by rhgb- Add context for dbus machine id- Update with latest changes from upstream- Fix prelink to handle execmod- Add ntpd_key_t to handle secret data- Add anon_inodefs - Allow unpriv user exec pam_exec_t - Fix trigger- Allow cups to use generic usb - fix inetd to be able to run random apps (git)- Add proper contexts for rsyslogd- Fixes for xguest policy- Allow execution of gconf- Fix moilscanner update problem- Begin adding policy to separate setsebool from semanage - Fix xserver.if definition to not break sepolgen.if- Add new devices- Add brctl policy- Fix root login to include system_r- Allow prelink to read kernel sysctls- Default to user_u:system_r:unconfined_t- fix squid - Fix rpm running as uid- Fix syslog declaration- Allow avahi to access inotify - Remove a lot of bogus security_t:filesystem avcs- Remove ifdef strict policy from upstream- Remove ifdef strict to allow user_u to login- Fix for amands - Allow semanage to read pp files - Allow rhgb to read xdm_xserver_tmp- Allow kerberos servers to use ldap for backing store- allow alsactl to read kernel state- More fixes for alsactl - Transition from hal and modutils - Fixes for suspend resume. - insmod domtrans to alsactl - insmod writes to hal log- Allow unconfined_t to transition to NetworkManager_t - Fix netlabel policy- Update to latest from upstream- Update to latest from upstream- Update to latest from upstream- Allow pcscd_t to send itself signals- Fixes for unix_update - Fix logwatch to be able to search all dirs- Upstream bumped the version- Allow consolekit to syslog - Allow ntfs to work with hal- Allow iptables to read etc_runtime_t- MLS Fixes- Fix path of /etc/lvm/cache directory - Fixes for alsactl and pppd_t - Fixes for consolekit- Allow insmod_t to mount kvmfs_t filesystems- Rwho policy - Fixes for consolekit- fixes for fusefs- Fix samba_net to allow it to view samba_var_t- Update to upstream- Fix Sonypic backlight - Allow snmp to look at squid_conf_t- Fixes for pyzor, cyrus, consoletype on everything installs- Fix hald_acl_t to be able to getattr/setattr on usb devices - Dontaudit write to unconfined_pipes for load_policy- Allow bluetooth to read inotifyfs- Fixes for samba domain controller. - Allow ConsoleKit to look at ttys- Fix interface call- Allow syslog-ng to read /var - Allow locate to getattr on all filesystems - nscd needs setcap- Update to upstream- Allow samba to run groupadd- Update to upstream- Allow mdadm to access generic scsi devices- Fix labeling on udev.tbl dirs- Fixes for logwatch- Add fusermount and mount_ntfs policy- Update to upstream - Allow saslauthd to use kerberos keytabs- Fixes for samba_var_t- Allow networkmanager to setpgid - Fixes for hal_acl_t- Remove disable_trans booleans - hald_acl_t needs to talk to nscd- Fix prelink to be able to manage usr dirs.- Allow insmod to launch init scripts- Remove setsebool policy- Fix handling of unlabled_t packets- More of my patches from upstream- Update to latest from upstream - Add fail2ban policy- Update to remove security_t:filesystem getattr problems- Policy for consolekit- Update to latest from upstream- Revert Nemiver change - Set sudo as a corecmd so prelink will work, remove sudoedit mapping, since this will not work, it does not transition. - Allow samba to execute useradd- Upgrade to the latest from upstream- Add sepolgen support - Add bugzilla policy- Fix file context for nemiver- Remove include sym link- Allow mozilla, evolution and thunderbird to read dev_random. Resolves: #227002 - Allow spamd to connect to smtp port Resolves: #227184 - Fixes to make ypxfr work Resolves: #227237- Fix ssh_agent to be marked as an executable - Allow Hal to rw sound device- Fix spamassisin so crond can update spam files - Fixes to allow kpasswd to work - Fixes for bluetooth- Remove some targeted diffs in file context file- Fix squid cachemgr labeling- Add ability to generate webadm_t policy - Lots of new interfaces for httpd - Allow sshd to login as unconfined_t- Continue fixing, additional user domains- Begin adding user confinement to targeted policy- Fixes for prelink, ktalkd, netlabel- Allow prelink when run from rpm to create tmp files Resolves: #221865 - Remove file_context for exportfs Resolves: #221181 - Allow spamassassin to create ~/.spamassissin Resolves: #203290 - Allow ssh access to the krb tickets - Allow sshd to change passwd - Stop newrole -l from working on non securetty Resolves: #200110 - Fixes to run prelink in MLS machine Resolves: #221233 - Allow spamassassin to read var_lib_t dir Resolves: #219234- fix mplayer to work under strict policy - Allow iptables to use nscd Resolves: #220794- Add gconf policy and make it work with strict- Many fixes for strict policy and by extension mls.- Fix to allow ftp to bind to ports > 1024 Resolves: #219349- Allow semanage to exec it self. Label genhomedircon as semanage_exec_t Resolves: #219421 - Allow sysadm_lpr_t to manage other print spool jobs Resolves: #220080- allow automount to setgid Resolves: #219999- Allow cron to polyinstatiate - Fix creation of boot flags Resolves: #207433- Fixes for irqbalance Resolves: #219606- Fix vixie-cron to work on mls Resolves: #207433Resolves: #218978- Allow initrc to create files in /var directories Resolves: #219227- More fixes for MLS Resolves: #181566- More Fixes polyinstatiation Resolves: #216184- More Fixes polyinstatiation - Fix handling of keyrings Resolves: #216184- Fix polyinstatiation - Fix pcscd handling of terminal Resolves: #218149 Resolves: #218350- More fixes for quota Resolves: #212957- ncsd needs to use avahi sockets Resolves: #217640 Resolves: #218014- Allow login programs to polyinstatiate homedirs Resolves: #216184 - Allow quotacheck to create database files Resolves: #212957- Dontaudit appending hal_var_lib files Resolves: #217452 Resolves: #217571 Resolves: #217611 Resolves: #217640 Resolves: #217725- Fix context for helix players file_context #216942- Fix load_policy to be able to mls_write_down so it can talk to the terminal- Fixes for hwclock, clamav, ftp- Move to upstream version which accepted my patches- Fixes for nvidia driver- Allow semanage to signal mcstrans- Update to upstream- Allow modstorage to edit /etc/fstab file- Fix for qemu, /dev/- Fix path to realplayer.bin- Allow xen to connect to xen port- Allow cups to search samba_etc_t directory - Allow xend_t to list auto_mountpoints- Allow xen to search automount- Fix spec of jre files- Fix unconfined access to shadow file- Allow xend to create files in xen_image_t directories- Fixes for /var/lib/hal- Remove ability for sysadm_t to look at audit.log- Fix rpc_port_types - Add aide policy for mls- Merge with upstream- Lots of fixes for ricci- Allow xen to read/write fixed devices with a boolean - Allow apache to search /var/log- Fix policygentool specfile problem. - Allow apache to send signals to it's logging helpers. - Resolves: rhbz#212731- Add perms for swat- Add perms for swat- Allow daemons to dump core files to /- Fixes for ricci- Allow mount.nfs to work- Allow ricci-modstorage to look at lvm_etc_t- Fixes for ricci using saslauthd- Allow mountpoint on home_dir_t and home_t- Update xen to read nfs files- Allow noxattrfs to associate with other noxattrfs- Allow hal to use power_device_t- Allow procemail to look at autofs_t - Allow xen_image_t to work as a fixed device- Refupdate from upstream- Add lots of fixes for mls cups- Lots of fixes for ricci- Fix number of cats- Update to upstream- More iSCSI changes for #209854- Test ISCSI fixes for #209854- allow semodule to rmdir selinux_config_t dir- Fix boot_runtime_t problem on ppc. Should not be creating these files.- Fix context mounts on reboot - Fix ccs creation of directory in /var/log- Update for tallylog- Allow xend to rewrite dhcp conf files - Allow mgetty sys_admin capability- Make xentapctrl work- Don't transition unconfined_t to bootloader_t - Fix label in /dev/xen/blktap- Patch for labeled networking- Fix crond handling for mls- Update to upstream- Remove bluetooth-helper transition - Add selinux_validate for semanage - Require new version of libsemanage- Fix prelink- Fix rhgb- Fix setrans handling on MLS and useradd- Support for fuse - fix vigr- Fix dovecot, amanda - Fix mls- Allow java execheap for itanium- Update with upstream- mls fixes- Update from upstream- More fixes for mls - Revert change on automount transition to mount- Fix cron jobs to run under the correct context- Fixes to make pppd work- Multiple policy fixes - Change max categories to 1023- Fix transition on mcstransd- Add /dev/em8300 defs- Upgrade to upstream- Fix ppp connections from network manager- Add tty access to all domains boolean - Fix gnome-pty-helper context for ia64- Fixed typealias of firstboot_rw_t- Fix location of xel log files - Fix handling of sysadm_r -> rpm_exec_t- Fixes for autofs, lp- Update from upstream- Fixup for test6- Update to upstream- Update to upstream- Fix suspend to disk problems- Lots of fixes for restarting daemons at the console.- Fix audit line - Fix requires line- Upgrade to upstream- Fix install problems- Allow setroubleshoot to getattr on all dirs to gather RPM data- Set /usr/lib/ia32el/ia32x_loader to unconfined_execmem_exec_t for ia32 platform - Fix spec for /dev/adsp- Fix xen tty devices- Fixes for setroubleshoot- Update to upstream- Fixes for stunnel and postgresql - Update from upstream- Update from upstream - More java fixes- Change allow_execstack to default to on, for RHEL5 Beta. This is required because of a Java compiler problem. Hope to turn off for next beta- Misc fixes- More fixes for strict policy- Quiet down anaconda audit messages- Fix setroubleshootd- Update to the latest from upstream- More fixes for xen- Fix anaconda transitions- yet more xen rules- more xen rules- Fixes for Samba- Fixes for xen- Allow setroubleshootd to send mail- Add nagios policy- fixes for setroubleshoot- Added Paul Howarth patch to only load policy packages shipped with this package - Allow pidof from initrc to ptrace higher level domains - Allow firstboot to communicate with hal via dbus- Add policy for /var/run/ldapi- Fix setroubleshoot policy- Fixes for mls use of ssh - named has a new conf file- Fixes to make setroubleshoot work- Cups needs to be able to read domain state off of printer client- add boolean to allow zebra to write config files- setroubleshootd fixes- Allow prelink to read bin_t symlink - allow xfs to read random devices - Change gfs to support xattr- Remove spamassassin_can_network boolean- Update to upstream - Fix lpr domain for mls- Add setroubleshoot policy- Turn off auditallow on setting booleans- Multiple fixes- Update to upstream- Update to upstream - Add new class for kernel key ring- Update to upstream- Update to upstream- Break out selinux-devel package- Add ibmasmfs- Fix policygentool gen_requires- Update from Upstream- Fix spec of realplay- Update to upstream- Fix semanage- Allow useradd to create_home_dir in MLS environment- Update from upstream- Update from upstream- Add oprofilefs- Fix for hplip and Picasus- Update to upstream- Update to upstream- fixes for spamd- fixes for java, openldap and webalizer- Xen fixes- Upgrade to upstream- allow hal to read boot_t files - Upgrade to upstream- allow hal to read boot_t files- Update from upstream- Fixes for amavis- Update from upstream- Allow auditctl to search all directories- Add acquire service for mono.- Turn off allow_execmem boolean - Allow ftp dac_override when allowed to access users homedirs- Clean up spec file - Transition from unconfined_t to prelink_t- Allow execution of cvs command- Update to upstream- Update to upstream- Fix libjvm spec- Update to upstream- Add xm policy - Fix policygentool- Update to upstream - Fix postun to only disable selinux on full removal of the packages- Allow mono to chat with unconfined- Allow procmail to sendmail - Allow nfs to share dosfs- Update to latest from upstream - Allow selinux-policy to be removed and kernel not to crash- Update to latest from upstream - Add James Antill patch for xen - Many fixes for pegasus- Add unconfined_mount_t - Allow privoxy to connect to httpd_cache - fix cups labeleing on /var/cache/cups- Update to latest from upstream- Update to latest from upstream - Allow mono and unconfined to talk to initrc_t dbus objects- Change libraries.fc to stop shlib_t form overriding texrel_shlib_t- Fix samba creating dirs in homedir - Fix NFS so its booleans would work- Allow secadm_t ability to relabel all files - Allow ftp to search xferlog_t directories - Allow mysql to communicate with ldap - Allow rsync to bind to rsync_port_t- Fixed mailman with Postfix #183928 - Allowed semanage to create file_context files. - Allowed amanda_t to access inetd_t TCP sockets and allowed amanda_recover_t to bind to reserved ports. #149030 - Don't allow devpts_t to be associated with tmp_t. - Allow hald_t to stat all mountpoints. - Added boolean samba_share_nfs to allow smbd_t full access to NFS mounts. - Make mount run in mount_t domain from unconfined_t to prevent mislabeling of /etc/mtab. - Changed the file_contexts to not have a regex before the first ^/[a-z]/ whenever possible, makes restorecon slightly faster. - Correct the label of /etc/named.caching-nameserver.conf - Now label /usr/src/kernels/.+/lib(/.*)? as usr_t instead of /usr/src(/.*)?/lib(/.*)? - I don't think we need anything else under /usr/src hit by this. - Granted xen access to /boot, allowed mounting on xend_var_lib_t, and allowed xenstored_t rw access to the xen device node.- More textrel_shlib_t file path fixes - Add ada support- Get auditctl working in MLS policy- Add mono dbus support - Lots of file_context fixes for textrel_shlib_t in FC5 - Turn off execmem auditallow since they are filling log files- Update to upstream- Allow automount and dbus to read cert files- Fix ftp policy - Fix secadm running of auditctl- Update to upstream- Update to upstream- Fix policyhelp- Fix pam_console handling of usb_device - dontaudit logwatch reading /mnt dir- Update to upstream- Get transition rules to create policy.20 at SystemHigh- Allow secadmin to shutdown system - Allow sendmail to exec newalias- MLS Fixes dmidecode needs mls_file_read_up - add ypxfr_t - run init needs access to nscd - udev needs setuid - another xen log file - Dontaudit mount getattr proc_kcore_t- fix buildroot usage (#185391)- Get rid of mount/fsdisk scan of /dev messages - Additional fixes for suspend/resume- Fake make to rebuild enableaudit.pp- Get xen networking running.- Fixes for Xen - enableaudit should not be the same as base.pp - Allow ps to work for all process- more xen policy fixups- more xen fixage (#184393)- Fix blkid specification - Allow postfix to execute mailman_que- Blkid changes - Allow udev access to usb_device_t - Fix post script to create targeted policy config file- Allow lvm tools to create drevice dir- Add Xen support- Fixes for cups - Make cryptosetup work with hal- Load Policy needs translock- Fix cups html interface- Add hal changes suggested by Jeremy - add policyhelp to point at policy html pages- Additional fixes for nvidia and cups- Update to upstream - Merged my latest fixes - Fix cups policy to handle unix domain sockets- NSCD socket is in nscd_var_run_t needs to be able to search dir- Fixes Apache interface file- Fixes for new version of cups- Turn off polyinstatiate util after FC5- Fix problem with privoxy talking to Tor- Turn on polyinstatiation- Don't transition from unconfined_t to fsadm_t- Fix policy update model.- Update to upstream- Fix load_policy to work on MLS - Fix cron_rw_system_pipes for postfix_postdrop_t - Allow audotmount to run showmount- Fix swapon - allow httpd_sys_script_t to be entered via a shell - Allow httpd_sys_script_t to read eventpolfs- Update from upstream- allow cron to read apache files- Fix vpnc policy to work from NetworkManager- Update to upstream - Fix semoudle polcy- Update to upstream - fix sysconfig/selinux link- Add router port for zebra - Add imaze port for spamd - Fixes for amanda and java- Fix bluetooth handling of usb devices - Fix spamd reading of ~/ - fix nvidia spec- Update to upsteam- Add users_extra files- Update to upstream- Add semodule policy- Update from upstream- Fix for spamd to use razor port- Fixes for mcs - Turn on mount and fsadm for unconfined_t- Fixes for the -devel package- Fix for spamd to use ldap- Update to upstream- Update to upstream - Fix rhgb, and other Xorg startups- Update to upstream- Separate out role of secadm for mls- Add inotifyfs handling- Update to upstream - Put back in changes for pup/zen- Many changes for MLS - Turn on strict policy- Update to upstream- Update to upstream - Fixes for booting and logging in on MLS machine- Update to upstream - Turn off execheap execstack for unconfined users - Add mono/wine policy to allow execheap and execstack for them - Add execheap for Xdm policy- Update to upstream - Fixes to fetchmail,- Update to upstream- Fix for procmail/spamassasin - Update to upstream - Add rules to allow rpcd to work with unlabeled_networks.- Update to upstream - Fix ftp Man page- Update to upstream- fix pup transitions (#177262) - fix xen disks (#177599)- Update to upstream- More Fixes for hal and readahead- Fixes for hal and readahead- Update to upstream - Apply- Add wine and fix hal problems- Handle new location of hal scripts- Allow su to read /etc/mtab- Update to upstream- Fix "libsemanage.parse_module_headers: Data did not represent a module." problem- Allow load_policy to read /etc/mtab- Fix dovecot to allow dovecot_auth to look at /tmp- Allow restorecon to read unlabeled_t directories in order to fix labeling.- Add Logwatch policy- Fix /dev/ub[a-z] file context- Fix library specification - Give kudzu execmem privs- Fix hostname in targeted policy- Fix passwd command on mls- Lots of fixes to make mls policy work- Add dri libs to textrel_shlib_t - Add system_r role for java - Add unconfined_exec_t for vncserver - Allow slapd to use kerberos- Add man pages- Add enableaudit.pp- Fix mls policy- Update mls file from old version- Add sids back in - Rebuild with update checkpolicy- Fixes to allow automount to use portmap - Fixes to start kernel in s0-s15:c0.c255- Add java unconfined/execmem policy- Add file context for /var/cvs - Dontaudit webalizer search of homedir- Update from upstream- Clean up spec - range_transition crond to SystemHigh- Fixes for hal - Update to upstream- Turn back on execmem since we need it for java, firefox, ooffice - Allow gpm to stream socket to itself- fix requirements to be on the actual packages so that policy can get created properly at install time- Allow unconfined_t to execmod texrel_shlib_t- Update to upstream - Turn off allow_execmem and allow_execmod booleans - Add tcpd and automount policies- Add two new httpd booleans, turned off by default * httpd_can_network_relay * httpd_can_network_connect_db- Add ghost for policy.20- Update to upstream - Turn off boolean allow_execstack- Change setrans-mls to use new libsetrans - Add default_context rule for xdm- Change Requires to PreReg for requiring of policycoreutils on install- New upstream releaseAdd xdm policyUpdate from upstreamUpdate from upstreamUpdate from upstream- Also trigger to rebuild policy for versions up to 2.0.7.- No longer installing policy.20 file, anaconda handles the building of the app.- Fixes for dovecot and saslauthd- Cleanup pegasus and named - Fix spec file - Fix up passwd changing applications-Update to latest from upstream- Add rules for pegasus and avahi- Start building MLS Policy- Update to upstream- Turn on bash- Initial version/bin/sh/bin/sh/bin/sh/bin/sh  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~  3.14.3-139.el8_10.13.14.3-139.el8_10.13.14.3-139.el8_10.1                   !! "" ## $$ %% && '' (( )) ** ++ ,, -- .. // 00 11 22 33 44 55 66 77 88 99 :: ;; << == >> ?? @@ AA BB CC DD EE FF GG HH II JJ KK LL MM NN OO PP QQ RR SS TT UU VV WW XX YY ZZ [[ \\ ]] ^^ __ `` aa bb cc dd eeff gg hh ii jj kk ll mm nn oo pp qq rr ss tt uu vv ww xx yy zz {{ || }} ~~                                         !! "" ## $$ %% && '' (( )) ** ++ ,, -- .. // 00 11 22 33 44 55 66 77 88 99 :: ;; << == >> ?? @@ AA BB CC DD EE FF GG HH II JJ KK LL MM NN OO PP QQ RR SS TT UU VV WW XX YY ZZ [[ \\ ]] ^^ __ `` aa bb cc dd ee ff gg hh ii jj kk ll mm nn oo pp qq rr ss tt uu vv ww xx yy zz {{ || }} ~~                                                                   !!!"""###$$$%%%&&&'''((()))***+++,,,---...///000111222333444555666777888999:::;;;<<<===>>>???@@@AAABBBCCCDDDEEEFFFGGGHHHIIIJJJKKKLLLMMMNNNOOOPPPQQQRRRSSSTTTUUUVVVWWWXXXYYYZZZ[[[\\\]]]^^^___```aaabbbcccdddeeefffggghhhiiijjjkkklllmmmnnnooopppqqqrrrssstttuuuvvvwwwxxxyyyzzz{{{|||}}}~~~                  !!!"""###$$$%%%&&&'''((()))***+++,,,---...///000111222333444555666777888999:::;;;<<<===>>>???@@@AAABBBCCCDDDEEEFFFGGGHHHIIIJJJKKKLLLMMMNNNOOOPPPQQQRRRSSSTTTminimum.policy.sha512booleans.subs_distcontextscustomizable_typesdbus_contextsdefault_contextsdefault_typefailsafe_contextfilesfile_contextsfile_contexts.binfile_contexts.homedirsfile_contexts.homedirs.binfile_contexts.localfile_contexts.local.binfile_contexts.subsfile_contexts.subs_distmediainitrc_contextlxc_contextsopenssh_contextsremovable_contextsecuretty_typessepgsql_contextssnapperd_contextssystemd_contextsuserhelper_contextusersguest_urootstaff_usysadm_uunconfined_uuser_uxguest_uvirtual_domain_contextvirtual_image_contextx_contextsloginspolicypolicy.31setrans.confseusersminimumbase.lstdefaultactivecommit_numfile_contextsfile_contexts.homedirshomedir_templatemodules100abrtcillang_extaccountsdcillang_extacctcillang_extafscillang_extaiccucillang_extaidecillang_extajaxtermcillang_extalsacillang_extamandacillang_extamtucillang_extanacondacillang_extantiviruscillang_extapachecillang_extapcupsdcillang_extapmcillang_extapplicationcillang_extarpwatchcillang_extasteriskcillang_extauditadmcillang_extauthconfigcillang_extauthlogincillang_extautomountcillang_extavahicillang_extawstatscillang_extbaculacillang_extbasecillang_extbcfg2cillang_extbindcillang_extbitlbeecillang_extblkmapdcillang_extbluemancillang_extbluetoothcillang_extboinccillang_extboltdcillang_extbootloadercillang_extbrctlcillang_extbrlttycillang_extbugzillacillang_extbumblebeecillang_extcachefilesdcillang_extcalamariscillang_extcallweavercillang_extcannacillang_extccscillang_extcdrecordcillang_extcertmastercillang_extcertmongercillang_extcertwatchcillang_extcfenginecillang_extcgdcbxdcillang_extcgroupcillang_extchromecillang_extchronydcillang_extcindercillang_extcipecillang_extclockcillang_extclogdcillang_extcloudformcillang_extcmirrordcillang_extcobblercillang_extcockpitcillang_extcollectdcillang_extcolordcillang_extcomsatcillang_extcondorcillang_extconmancillang_extconntrackdcillang_extconsolekitcillang_extcouchdbcillang_extcouriercillang_extcpucontrolcillang_extcpufreqselectorcillang_extcpuplugcillang_extcroncillang_extctdbcillang_extcupscillang_extcvscillang_extcyphesiscillang_extcyruscillang_extdaemontoolscillang_extdbadmcillang_extdbskkcillang_extdbuscillang_extdcccillang_extddclientcillang_extdenyhostscillang_extdevicekitcillang_extdhcpcillang_extdictdcillang_extdirsrvdirsrv-admincillang_extcillang_extdmesgcillang_extdmidecodecillang_extdnsmasqcillang_extdnsseccillang_extdovecotcillang_extdrbdcillang_extdspamcillang_extentropydcillang_exteximcillang_extfail2bancillang_extfcoecillang_extfetchmailcillang_extfingercillang_extfirewalldcillang_extfirewallguicillang_extfirstbootcillang_extfprintdcillang_extfreeipmicillang_extfreqsetcillang_extfstoolscillang_extftpcillang_extfwupdcillang_extgamescillang_extgdomapcillang_extgeocluecillang_extgettycillang_extgitcillang_extgitosiscillang_extglancecillang_extgnomecillang_extgpgcillang_extgpmcillang_extgpsdcillang_extgssproxycillang_extguestcillang_exthddtempcillang_exthostapdcillang_exthostnamecillang_exthsqldbcillang_exthwloccillang_exthypervkvpcillang_extibacmcillang_exticecastcillang_extinetdcillang_extinitcillang_extinncillang_extinsights_clientcillang_extiodinecillang_extiotopcillang_extipmievdcillang_extipseccillang_extiptablescillang_extirccillang_extirqbalancecillang_extiscsicillang_extisnscillang_extjabbercillang_extjettycillang_extjockeycillang_extjournalctlcillang_extkdbuscillang_extkdumpcillang_extkdumpguicillang_extkeepalivedcillang_extkerberoscillang_extkeyboarddcillang_extkeystonecillang_extkismetcillang_extkmsconcillang_extkpatchcillang_extksmtunedcillang_extktalkcillang_extl2tpcillang_extldapcillang_extlibrariescillang_extlikewisecillang_extlinuxptpcillang_extlircdcillang_extlivecdcillang_extlldpadcillang_extloadkeyscillang_extlocallogincillang_extlockdevcillang_extlogadmcillang_extloggingcillang_extlogrotatecillang_extlogwatchcillang_extlpdcillang_extlsmcillang_extlttng-toolscillang_extlvmcillang_extmailmancillang_extmailscannercillang_extman2htmlcillang_extmandbcillang_extmcelogcillang_extmediawikicillang_extmemcachedcillang_extmiltercillang_extminidlnacillang_extminissdpdcillang_extmip6dcillang_extmirrormanagercillang_extmiscfilescillang_extmockcillang_extmodemmanagercillang_extmodutilscillang_extmojomojocillang_extmon_statdcillang_extmongodbcillang_extmotioncillang_extmountcillang_extmozillacillang_extmpdcillang_extmplayercillang_extmrtgcillang_extmtacillang_extmunincillang_extmysqlcillang_extmythtvcillang_extnaemoncillang_extnagioscillang_extnamespacecillang_extncftoolcillang_extnetlabelcillang_extnetutilscillang_extnetworkmanagercillang_extninfodcillang_extniscillang_extnovacillang_extnscdcillang_extnsdcillang_extnslcdcillang_extntopcillang_extntpcillang_extnumadcillang_extnutcillang_extnxcillang_extobexcillang_extoddjobcillang_extopafmcillang_extopenctcillang_extopendnsseccillang_extopenfortivpncillang_extopenhpidcillang_extopenshiftopenshift-origincillang_extcillang_extopensmcillang_extopenvpncillang_extopenvswitchcillang_extopenwsmancillang_extoracleasmcillang_extosadcillang_extpadscillang_extpassengercillang_extpcmciacillang_extpcpcillang_extpcscdcillang_extpdnscillang_extpegasuscillang_extpesigncillang_extpingdcillang_extpiranhacillang_extpkcscillang_extpkcs11proxydcillang_extpkicillang_extplymouthdcillang_extpodsleuthcillang_extpolicykitcillang_extpolipocillang_extportmapcillang_extportreservecillang_extpostfixcillang_extpostgresqlcillang_extpostgreycillang_extpppcillang_extprelinkcillang_extpreludecillang_extprivoxycillang_extprocmailcillang_extprosodycillang_extpsadcillang_extptchowncillang_extpublicfilecillang_extpulseaudiocillang_extpuppetcillang_extpwauthcillang_extqmailcillang_extqpidcillang_extquantumcillang_extquotacillang_extrabbitmqcillang_extradiuscillang_extradvdcillang_extraidcillang_extrasdaemoncillang_extrdisccillang_extreadaheadcillang_extrealmdcillang_extrediscillang_extremotelogincillang_extrhcscillang_extrhevcillang_extrhgbcillang_extrhnsdcillang_extrhsmcertdcillang_extriccicillang_extrkhuntercillang_extrktcillang_extrlogincillang_extrngdcillang_extrolekitcillang_extroundupcillang_extrpccillang_extrpcbindcillang_extrpmcillang_extrrdcachedcillang_extrshdcillang_extrsshcillang_extrsynccillang_extrtascillang_extrtkitcillang_extrwhocillang_extsambacillang_extsambaguicillang_extsandboxXcillang_extsanlockcillang_extsaslcillang_extsbdcillang_extsblimcillang_extscreencillang_extsecadmcillang_extsectoolmcillang_extselinuxutilcillang_extsendmailcillang_extsensordcillang_extsetranscillang_extsetroubleshootcillang_extseunsharecillang_extsgecillang_extshorewallcillang_extslocatecillang_extslpdcillang_extsmartmoncillang_extsmokepingcillang_extsmoltclientcillang_extsmsdcillang_extsnappercillang_extsnmpcillang_extsnortcillang_extsosreportcillang_extsoundservercillang_extspamassassincillang_extspeech-dispatchercillang_extsquidcillang_extsshcillang_extsslhcillang_extsssdcillang_extstaffcillang_extstapservercillang_extstratisdcillang_extstunnelcillang_extsucillang_extsudocillang_extsvnservecillang_extswiftcillang_extsysadmcillang_extsysadm_secadmcillang_extsysnetworkcillang_extsysstatcillang_extsystemdcillang_exttangdcillang_exttargetdcillang_exttcpdcillang_exttcsdcillang_exttelepathycillang_exttelnetcillang_exttftpcillang_exttgtdcillang_extthincillang_extthumbcillang_exttimedatexcillang_exttlpcillang_exttmpreapercillang_exttomcatcillang_exttorcillang_exttunedcillang_exttvtimecillang_extudevcillang_extulogdcillang_extumlcillang_extunconfinedcillang_extunconfinedusercillang_extunlabelednetcillang_extunprivusercillang_extupdfstabcillang_extusbmodulescillang_extusbmuxdcillang_extuserdomaincillang_extuserhelpercillang_extusermanagecillang_extusernetctlcillang_extuucpcillang_extuuiddcillang_extvarnishdcillang_extvdagentcillang_extvhostmdcillang_extvirtcillang_extvlockcillang_extvmtoolscillang_extvmwarecillang_extvnstatdcillang_extvpncillang_extw3ccillang_extwatchdogcillang_extwdmdcillang_extwebadmcillang_extwebalizercillang_extwinecillang_extwiresharkcillang_extxencillang_extxguestcillang_extxservercillang_extzabbixcillang_extzarafacillang_extzebracillang_extzonemindercillang_extzosremotecillang_extdisabledmodules_checksumpolicy.kernseusersusers_extramodules-base.lstmodules-contrib.lstnonbasemodules.lstactivecommit_numfile_contextsfile_contexts.homedirshomedir_templatemodulesabrtcilhlllang_extaccountsdcilhlllang_extacctcilhlllang_extafscilhlllang_extaiccucilhlllang_extaidecilhlllang_extajaxtermcilhlllang_extalsacilhlllang_extamandacilhlllang_extamtucilhlllang_extanacondacilhlllang_extantiviruscilhlllang_extapachecilhlllang_extapcupsdcilhlllang_extapmcilhlllang_extapplicationcilhlllang_extarpwatchcilhlllang_extasteriskcilhlllang_extauditadmcilhlllang_extauthconfigcilhlllang_extauthlogincilhlllang_extautomountcilhlllang_extavahicilhlllang_extawstatscilhlllang_extbaculacilhlllang_extbasecilhlllang_extbcfg2cilhlllang_extbindcilhlllang_extbitlbeecilhlllang_extblkmapdcilhlllang_extbluemancilhlllang_extbluetoothcilhlllang_extboinccilhlllang_extboltdcilhlllang_extbootloadercilhlllang_extbrctlcilhlllang_extbrlttycilhlllang_extbugzillacilhlllang_extbumblebeecilhlllang_extcachefilesdcilhlllang_extcalamariscilhlllang_extcallweavercilhlllang_extcannacilhlllang_extccscilhlllang_extcdrecordcilhlllang_extcertmastercilhlllang_extcertmongercilhlllang_extcertwatchcilhlllang_extcfenginecilhlllang_extcgdcbxdcilhlllang_extcgroupcilhlllang_extchromecilhlllang_extchronydcilhlllang_extcindercilhlllang_extcipecilhlllang_extclockcilhlllang_extclogdcilhlllang_extcloudformcilhlllang_extcmirrordcilhlllang_extcobblercilhlllang_extcockpitcilhlllang_extcollectdcilhlllang_extcolordcilhlllang_extcomsatcilhlllang_extcondorcilhlllang_extconmancilhlllang_extconntrackdcilhlllang_extconsolekitcilhlllang_extcouchdbcilhlllang_extcouriercilhlllang_extcpucontrolcilhlllang_extcpufreqselectorcilhlllang_extcpuplugcilhlllang_extcroncilhlllang_extctdbcilhlllang_extcupscilhlllang_extcvscilhlllang_extcyphesiscilhlllang_extcyruscilhlllang_extdaemontoolscilhlllang_extdbadmcilhlllang_extdbskkcilhlllang_extdbuscilhlllang_extdcccilhlllang_extddclientcilhlllang_extdenyhostscilhlllang_extdevicekitcilhlllang_extdhcpcilhlllang_extdictdcilhlllang_extdirsrvdirsrv-admincilhlllang_extcilhlllang_extdmesgcilhlllang_extdmidecodecilhlllang_extdnsmasqcilhlllang_extdnsseccilhlllang_extdovecotcilhlllang_extdrbdcilhlllang_extdspamcilhlllang_extentropydcilhlllang_exteximcilhlllang_extfail2bancilhlllang_extfcoecilhlllang_extfetchmailcilhlllang_extfingercilhlllang_extfirewalldcilhlllang_extfirewallguicilhlllang_extfirstbootcilhlllang_extfprintdcilhlllang_extfreeipmicilhlllang_extfreqsetcilhlllang_extfstoolscilhlllang_extftpcilhlllang_extfwupdcilhlllang_extgamescilhlllang_extgdomapcilhlllang_extgeocluecilhlllang_extgettycilhlllang_extgitcilhlllang_extgitosiscilhlllang_extglancecilhlllang_extgnomecilhlllang_extgpgcilhlllang_extgpmcilhlllang_extgpsdcilhlllang_extgssproxycilhlllang_extguestcilhlllang_exthddtempcilhlllang_exthostapdcilhlllang_exthostnamecilhlllang_exthsqldbcilhlllang_exthwloccilhlllang_exthypervkvpcilhlllang_extibacmcilhlllang_exticecastcilhlllang_extinetdcilhlllang_extinitcilhlllang_extinncilhlllang_extinsights_clientcilhlllang_extiodinecilhlllang_extiotopcilhlllang_extipmievdcilhlllang_extipseccilhlllang_extiptablescilhlllang_extirccilhlllang_extirqbalancecilhlllang_extiscsicilhlllang_extisnscilhlllang_extjabbercilhlllang_extjettycilhlllang_extjockeycilhlllang_extjournalctlcilhlllang_extkdbuscilhlllang_extkdumpcilhlllang_extkdumpguicilhlllang_extkeepalivedcilhlllang_extkerberoscilhlllang_extkeyboarddcilhlllang_extkeystonecilhlllang_extkismetcilhlllang_extkmsconcilhlllang_extkpatchcilhlllang_extksmtunedcilhlllang_extktalkcilhlllang_extl2tpcilhlllang_extldapcilhlllang_extlibrariescilhlllang_extlikewisecilhlllang_extlinuxptpcilhlllang_extlircdcilhlllang_extlivecdcilhlllang_extlldpadcilhlllang_extloadkeyscilhlllang_extlocallogincilhlllang_extlockdevcilhlllang_extlogadmcilhlllang_extloggingcilhlllang_extlogrotatecilhlllang_extlogwatchcilhlllang_extlpdcilhlllang_extlsmcilhlllang_extlttng-toolscilhlllang_extlvmcilhlllang_extmailmancilhlllang_extmailscannercilhlllang_extman2htmlcilhlllang_extmandbcilhlllang_extmcelogcilhlllang_extmediawikicilhlllang_extmemcachedcilhlllang_extmiltercilhlllang_extminidlnacilhlllang_extminissdpdcilhlllang_extmip6dcilhlllang_extmirrormanagercilhlllang_extmiscfilescilhlllang_extmockcilhlllang_extmodemmanagercilhlllang_extmodutilscilhlllang_extmojomojocilhlllang_extmon_statdcilhlllang_extmongodbcilhlllang_extmotioncilhlllang_extmountcilhlllang_extmozillacilhlllang_extmpdcilhlllang_extmplayercilhlllang_extmrtgcilhlllang_extmtacilhlllang_extmunincilhlllang_extmysqlcilhlllang_extmythtvcilhlllang_extnaemoncilhlllang_extnagioscilhlllang_extnamespacecilhlllang_extncftoolcilhlllang_extnetlabelcilhlllang_extnetutilscilhlllang_extnetworkmanagercilhlllang_extninfodcilhlllang_extniscilhlllang_extnovacilhlllang_extnscdcilhlllang_extnsdcilhlllang_extnslcdcilhlllang_extntopcilhlllang_extntpcilhlllang_extnumadcilhlllang_extnutcilhlllang_extnxcilhlllang_extobexcilhlllang_extoddjobcilhlllang_extopafmcilhlllang_extopenctcilhlllang_extopendnsseccilhlllang_extopenfortivpncilhlllang_extopenhpidcilhlllang_extopenshiftopenshift-origincilhlllang_extcilhlllang_extopensmcilhlllang_extopenvpncilhlllang_extopenvswitchcilhlllang_extopenwsmancilhlllang_extoracleasmcilhlllang_extosadcilhlllang_extpadscilhlllang_extpassengercilhlllang_extpcmciacilhlllang_extpcpcilhlllang_extpcscdcilhlllang_extpdnscilhlllang_extpegasuscilhlllang_extpesigncilhlllang_extpingdcilhlllang_extpiranhacilhlllang_extpkcscilhlllang_extpkcs11proxydcilhlllang_extpkicilhlllang_extplymouthdcilhlllang_extpodsleuthcilhlllang_extpolicykitcilhlllang_extpolipocilhlllang_extportmapcilhlllang_extportreservecilhlllang_extpostfixcilhlllang_extpostgresqlcilhlllang_extpostgreycilhlllang_extpppcilhlllang_extprelinkcilhlllang_extpreludecilhlllang_extprivoxycilhlllang_extprocmailcilhlllang_extprosodycilhlllang_extpsadcilhlllang_extptchowncilhlllang_extpublicfilecilhlllang_extpulseaudiocilhlllang_extpuppetcilhlllang_extpwauthcilhlllang_extqmailcilhlllang_extqpidcilhlllang_extquantumcilhlllang_extquotacilhlllang_extrabbitmqcilhlllang_extradiuscilhlllang_extradvdcilhlllang_extraidcilhlllang_extrasdaemoncilhlllang_extrdisccilhlllang_extreadaheadcilhlllang_extrealmdcilhlllang_extrediscilhlllang_extremotelogincilhlllang_extrhcscilhlllang_extrhevcilhlllang_extrhgbcilhlllang_extrhnsdcilhlllang_extrhsmcertdcilhlllang_extriccicilhlllang_extrkhuntercilhlllang_extrktcilhlllang_extrlogincilhlllang_extrngdcilhlllang_extrolekitcilhlllang_extroundupcilhlllang_extrpccilhlllang_extrpcbindcilhlllang_extrpmcilhlllang_extrrdcachedcilhlllang_extrshdcilhlllang_extrsshcilhlllang_extrsynccilhlllang_extrtascilhlllang_extrtkitcilhlllang_extrwhocilhlllang_extsambacilhlllang_extsambaguicilhlllang_extsandboxXcilhlllang_extsanlockcilhlllang_extsaslcilhlllang_extsbdcilhlllang_extsblimcilhlllang_extscreencilhlllang_extsecadmcilhlllang_extsectoolmcilhlllang_extselinuxutilcilhlllang_extsendmailcilhlllang_extsensordcilhlllang_extsetranscilhlllang_extsetroubleshootcilhlllang_extseunsharecilhlllang_extsgecilhlllang_extshorewallcilhlllang_extslocatecilhlllang_extslpdcilhlllang_extsmartmoncilhlllang_extsmokepingcilhlllang_extsmoltclientcilhlllang_extsmsdcilhlllang_extsnappercilhlllang_extsnmpcilhlllang_extsnortcilhlllang_extsosreportcilhlllang_extsoundservercilhlllang_extspamassassincilhlllang_extspeech-dispatchercilhlllang_extsquidcilhlllang_extsshcilhlllang_extsslhcilhlllang_extsssdcilhlllang_extstaffcilhlllang_extstapservercilhlllang_extstratisdcilhlllang_extstunnelcilhlllang_extsucilhlllang_extsudocilhlllang_extsvnservecilhlllang_extswiftcilhlllang_extsysadmcilhlllang_extsysadm_secadmcilhlllang_extsysnetworkcilhlllang_extsysstatcilhlllang_extsystemdcilhlllang_exttangdcilhlllang_exttargetdcilhlllang_exttcpdcilhlllang_exttcsdcilhlllang_exttelepathycilhlllang_exttelnetcilhlllang_exttftpcilhlllang_exttgtdcilhlllang_extthincilhlllang_extthumbcilhlllang_exttimedatexcilhlllang_exttlpcilhlllang_exttmpreapercilhlllang_exttomcatcilhlllang_exttorcilhlllang_exttunedcilhlllang_exttvtimecilhlllang_extudevcilhlllang_extulogdcilhlllang_extumlcilhlllang_extunconfinedcilhlllang_extunconfinedusercilhlllang_extunlabelednetcilhlllang_extunprivusercilhlllang_extupdfstabcilhlllang_extusbmodulescilhlllang_extusbmuxdcilhlllang_extuserdomaincilhlllang_extuserhelpercilhlllang_extusermanagecilhlllang_extusernetctlcilhlllang_extuucpcilhlllang_extuuiddcilhlllang_extvarnishdcilhlllang_extvdagentcilhlllang_extvhostmdcilhlllang_extvirtcilhlllang_extvlockcilhlllang_extvmtoolscilhlllang_extvmwarecilhlllang_extvnstatdcilhlllang_extvpncilhlllang_extw3ccilhlllang_extwatchdogcilhlllang_extwdmdcilhlllang_extwebadmcilhlllang_extwebalizercilhlllang_extwinecilhlllang_extwiresharkcilhlllang_extxencilhlllang_extxguestcilhlllang_extxservercilhlllang_extzabbixcilhlllang_extzarafacilhlllang_extzebracilhlllang_extzonemindercilhlllang_extzosremotecilhlllang_extmodules_checksumpolicy.kernpolicy.linkedseusersseusers.linkedusers_extrausers_extra.linkedsemanage.read.LOCKsemanage.trans.LOCK/etc/selinux//etc/selinux/minimum//etc/selinux/minimum/contexts//etc/selinux/minimum/contexts/files//etc/selinux/minimum/contexts/users//etc/selinux/minimum/policy//usr/share/selinux//usr/share/selinux/minimum//usr/share/selinux/minimum/default//usr/share/selinux/minimum/default/active//usr/share/selinux/minimum/default/active/modules//usr/share/selinux/minimum/default/active/modules/100//usr/share/selinux/minimum/default/active/modules/100/abrt//usr/share/selinux/minimum/default/active/modules/100/accountsd//usr/share/selinux/minimum/default/active/modules/100/acct//usr/share/selinux/minimum/default/active/modules/100/afs//usr/share/selinux/minimum/default/active/modules/100/aiccu//usr/share/selinux/minimum/default/active/modules/100/aide//usr/share/selinux/minimum/default/active/modules/100/ajaxterm//usr/share/selinux/minimum/default/active/modules/100/alsa//usr/share/selinux/minimum/default/active/modules/100/amanda//usr/share/selinux/minimum/default/active/modules/100/amtu//usr/share/selinux/minimum/default/active/modules/100/anaconda//usr/share/selinux/minimum/default/active/modules/100/antivirus//usr/share/selinux/minimum/default/active/modules/100/apache//usr/share/selinux/minimum/default/active/modules/100/apcupsd//usr/share/selinux/minimum/default/active/modules/100/apm//usr/share/selinux/minimum/default/active/modules/100/application//usr/share/selinux/minimum/default/active/modules/100/arpwatch//usr/share/selinux/minimum/default/active/modules/100/asterisk//usr/share/selinux/minimum/default/active/modules/100/auditadm//usr/share/selinux/minimum/default/active/modules/100/authconfig//usr/share/selinux/minimum/default/active/modules/100/authlogin//usr/share/selinux/minimum/default/active/modules/100/automount//usr/share/selinux/minimum/default/active/modules/100/avahi//usr/share/selinux/minimum/default/active/modules/100/awstats//usr/share/selinux/minimum/default/active/modules/100/bacula//usr/share/selinux/minimum/default/active/modules/100/base//usr/share/selinux/minimum/default/active/modules/100/bcfg2//usr/share/selinux/minimum/default/active/modules/100/bind//usr/share/selinux/minimum/default/active/modules/100/bitlbee//usr/share/selinux/minimum/default/active/modules/100/blkmapd//usr/share/selinux/minimum/default/active/modules/100/blueman//usr/share/selinux/minimum/default/active/modules/100/bluetooth//usr/share/selinux/minimum/default/active/modules/100/boinc//usr/share/selinux/minimum/default/active/modules/100/boltd//usr/share/selinux/minimum/default/active/modules/100/bootloader//usr/share/selinux/minimum/default/active/modules/100/brctl//usr/share/selinux/minimum/default/active/modules/100/brltty//usr/share/selinux/minimum/default/active/modules/100/bugzilla//usr/share/selinux/minimum/default/active/modules/100/bumblebee//usr/share/selinux/minimum/default/active/modules/100/cachefilesd//usr/share/selinux/minimum/default/active/modules/100/calamaris//usr/share/selinux/minimum/default/active/modules/100/callweaver//usr/share/selinux/minimum/default/active/modules/100/canna//usr/share/selinux/minimum/default/active/modules/100/ccs//usr/share/selinux/minimum/default/active/modules/100/cdrecord//usr/share/selinux/minimum/default/active/modules/100/certmaster//usr/share/selinux/minimum/default/active/modules/100/certmonger//usr/share/selinux/minimum/default/active/modules/100/certwatch//usr/share/selinux/minimum/default/active/modules/100/cfengine//usr/share/selinux/minimum/default/active/modules/100/cgdcbxd//usr/share/selinux/minimum/default/active/modules/100/cgroup//usr/share/selinux/minimum/default/active/modules/100/chrome//usr/share/selinux/minimum/default/active/modules/100/chronyd//usr/share/selinux/minimum/default/active/modules/100/cinder//usr/share/selinux/minimum/default/active/modules/100/cipe//usr/share/selinux/minimum/default/active/modules/100/clock//usr/share/selinux/minimum/default/active/modules/100/clogd//usr/share/selinux/minimum/default/active/modules/100/cloudform//usr/share/selinux/minimum/default/active/modules/100/cmirrord//usr/share/selinux/minimum/default/active/modules/100/cobbler//usr/share/selinux/minimum/default/active/modules/100/cockpit//usr/share/selinux/minimum/default/active/modules/100/collectd//usr/share/selinux/minimum/default/active/modules/100/colord//usr/share/selinux/minimum/default/active/modules/100/comsat//usr/share/selinux/minimum/default/active/modules/100/condor//usr/share/selinux/minimum/default/active/modules/100/conman//usr/share/selinux/minimum/default/active/modules/100/conntrackd//usr/share/selinux/minimum/default/active/modules/100/consolekit//usr/share/selinux/minimum/default/active/modules/100/couchdb//usr/share/selinux/minimum/default/active/modules/100/courier//usr/share/selinux/minimum/default/active/modules/100/cpucontrol//usr/share/selinux/minimum/default/active/modules/100/cpufreqselector//usr/share/selinux/minimum/default/active/modules/100/cpuplug//usr/share/selinux/minimum/default/active/modules/100/cron//usr/share/selinux/minimum/default/active/modules/100/ctdb//usr/share/selinux/minimum/default/active/modules/100/cups//usr/share/selinux/minimum/default/active/modules/100/cvs//usr/share/selinux/minimum/default/active/modules/100/cyphesis//usr/share/selinux/minimum/default/active/modules/100/cyrus//usr/share/selinux/minimum/default/active/modules/100/daemontools//usr/share/selinux/minimum/default/active/modules/100/dbadm//usr/share/selinux/minimum/default/active/modules/100/dbskk//usr/share/selinux/minimum/default/active/modules/100/dbus//usr/share/selinux/minimum/default/active/modules/100/dcc//usr/share/selinux/minimum/default/active/modules/100/ddclient//usr/share/selinux/minimum/default/active/modules/100/denyhosts//usr/share/selinux/minimum/default/active/modules/100/devicekit//usr/share/selinux/minimum/default/active/modules/100/dhcp//usr/share/selinux/minimum/default/active/modules/100/dictd//usr/share/selinux/minimum/default/active/modules/100/dirsrv-admin//usr/share/selinux/minimum/default/active/modules/100/dirsrv//usr/share/selinux/minimum/default/active/modules/100/dmesg//usr/share/selinux/minimum/default/active/modules/100/dmidecode//usr/share/selinux/minimum/default/active/modules/100/dnsmasq//usr/share/selinux/minimum/default/active/modules/100/dnssec//usr/share/selinux/minimum/default/active/modules/100/dovecot//usr/share/selinux/minimum/default/active/modules/100/drbd//usr/share/selinux/minimum/default/active/modules/100/dspam//usr/share/selinux/minimum/default/active/modules/100/entropyd//usr/share/selinux/minimum/default/active/modules/100/exim//usr/share/selinux/minimum/default/active/modules/100/fail2ban//usr/share/selinux/minimum/default/active/modules/100/fcoe//usr/share/selinux/minimum/default/active/modules/100/fetchmail//usr/share/selinux/minimum/default/active/modules/100/finger//usr/share/selinux/minimum/default/active/modules/100/firewalld//usr/share/selinux/minimum/default/active/modules/100/firewallgui//usr/share/selinux/minimum/default/active/modules/100/firstboot//usr/share/selinux/minimum/default/active/modules/100/fprintd//usr/share/selinux/minimum/default/active/modules/100/freeipmi//usr/share/selinux/minimum/default/active/modules/100/freqset//usr/share/selinux/minimum/default/active/modules/100/fstools//usr/share/selinux/minimum/default/active/modules/100/ftp//usr/share/selinux/minimum/default/active/modules/100/fwupd//usr/share/selinux/minimum/default/active/modules/100/games//usr/share/selinux/minimum/default/active/modules/100/gdomap//usr/share/selinux/minimum/default/active/modules/100/geoclue//usr/share/selinux/minimum/default/active/modules/100/getty//usr/share/selinux/minimum/default/active/modules/100/git//usr/share/selinux/minimum/default/active/modules/100/gitosis//usr/share/selinux/minimum/default/active/modules/100/glance//usr/share/selinux/minimum/default/active/modules/100/gnome//usr/share/selinux/minimum/default/active/modules/100/gpg//usr/share/selinux/minimum/default/active/modules/100/gpm//usr/share/selinux/minimum/default/active/modules/100/gpsd//usr/share/selinux/minimum/default/active/modules/100/gssproxy//usr/share/selinux/minimum/default/active/modules/100/guest//usr/share/selinux/minimum/default/active/modules/100/hddtemp//usr/share/selinux/minimum/default/active/modules/100/hostapd//usr/share/selinux/minimum/default/active/modules/100/hostname//usr/share/selinux/minimum/default/active/modules/100/hsqldb//usr/share/selinux/minimum/default/active/modules/100/hwloc//usr/share/selinux/minimum/default/active/modules/100/hypervkvp//usr/share/selinux/minimum/default/active/modules/100/ibacm//usr/share/selinux/minimum/default/active/modules/100/icecast//usr/share/selinux/minimum/default/active/modules/100/inetd//usr/share/selinux/minimum/default/active/modules/100/init//usr/share/selinux/minimum/default/active/modules/100/inn//usr/share/selinux/minimum/default/active/modules/100/insights_client//usr/share/selinux/minimum/default/active/modules/100/iodine//usr/share/selinux/minimum/default/active/modules/100/iotop//usr/share/selinux/minimum/default/active/modules/100/ipmievd//usr/share/selinux/minimum/default/active/modules/100/ipsec//usr/share/selinux/minimum/default/active/modules/100/iptables//usr/share/selinux/minimum/default/active/modules/100/irc//usr/share/selinux/minimum/default/active/modules/100/irqbalance//usr/share/selinux/minimum/default/active/modules/100/iscsi//usr/share/selinux/minimum/default/active/modules/100/isns//usr/share/selinux/minimum/default/active/modules/100/jabber//usr/share/selinux/minimum/default/active/modules/100/jetty//usr/share/selinux/minimum/default/active/modules/100/jockey//usr/share/selinux/minimum/default/active/modules/100/journalctl//usr/share/selinux/minimum/default/active/modules/100/kdbus//usr/share/selinux/minimum/default/active/modules/100/kdump//usr/share/selinux/minimum/default/active/modules/100/kdumpgui//usr/share/selinux/minimum/default/active/modules/100/keepalived//usr/share/selinux/minimum/default/active/modules/100/kerberos//usr/share/selinux/minimum/default/active/modules/100/keyboardd//usr/share/selinux/minimum/default/active/modules/100/keystone//usr/share/selinux/minimum/default/active/modules/100/kismet//usr/share/selinux/minimum/default/active/modules/100/kmscon//usr/share/selinux/minimum/default/active/modules/100/kpatch//usr/share/selinux/minimum/default/active/modules/100/ksmtuned//usr/share/selinux/minimum/default/active/modules/100/ktalk//usr/share/selinux/minimum/default/active/modules/100/l2tp//usr/share/selinux/minimum/default/active/modules/100/ldap//usr/share/selinux/minimum/default/active/modules/100/libraries//usr/share/selinux/minimum/default/active/modules/100/likewise//usr/share/selinux/minimum/default/active/modules/100/linuxptp//usr/share/selinux/minimum/default/active/modules/100/lircd//usr/share/selinux/minimum/default/active/modules/100/livecd//usr/share/selinux/minimum/default/active/modules/100/lldpad//usr/share/selinux/minimum/default/active/modules/100/loadkeys//usr/share/selinux/minimum/default/active/modules/100/locallogin//usr/share/selinux/minimum/default/active/modules/100/lockdev//usr/share/selinux/minimum/default/active/modules/100/logadm//usr/share/selinux/minimum/default/active/modules/100/logging//usr/share/selinux/minimum/default/active/modules/100/logrotate//usr/share/selinux/minimum/default/active/modules/100/logwatch//usr/share/selinux/minimum/default/active/modules/100/lpd//usr/share/selinux/minimum/default/active/modules/100/lsm//usr/share/selinux/minimum/default/active/modules/100/lttng-tools//usr/share/selinux/minimum/default/active/modules/100/lvm//usr/share/selinux/minimum/default/active/modules/100/mailman//usr/share/selinux/minimum/default/active/modules/100/mailscanner//usr/share/selinux/minimum/default/active/modules/100/man2html//usr/share/selinux/minimum/default/active/modules/100/mandb//usr/share/selinux/minimum/default/active/modules/100/mcelog//usr/share/selinux/minimum/default/active/modules/100/mediawiki//usr/share/selinux/minimum/default/active/modules/100/memcached//usr/share/selinux/minimum/default/active/modules/100/milter//usr/share/selinux/minimum/default/active/modules/100/minidlna//usr/share/selinux/minimum/default/active/modules/100/minissdpd//usr/share/selinux/minimum/default/active/modules/100/mip6d//usr/share/selinux/minimum/default/active/modules/100/mirrormanager//usr/share/selinux/minimum/default/active/modules/100/miscfiles//usr/share/selinux/minimum/default/active/modules/100/mock//usr/share/selinux/minimum/default/active/modules/100/modemmanager//usr/share/selinux/minimum/default/active/modules/100/modutils//usr/share/selinux/minimum/default/active/modules/100/mojomojo//usr/share/selinux/minimum/default/active/modules/100/mon_statd//usr/share/selinux/minimum/default/active/modules/100/mongodb//usr/share/selinux/minimum/default/active/modules/100/motion//usr/share/selinux/minimum/default/active/modules/100/mount//usr/share/selinux/minimum/default/active/modules/100/mozilla//usr/share/selinux/minimum/default/active/modules/100/mpd//usr/share/selinux/minimum/default/active/modules/100/mplayer//usr/share/selinux/minimum/default/active/modules/100/mrtg//usr/share/selinux/minimum/default/active/modules/100/mta//usr/share/selinux/minimum/default/active/modules/100/munin//usr/share/selinux/minimum/default/active/modules/100/mysql//usr/share/selinux/minimum/default/active/modules/100/mythtv//usr/share/selinux/minimum/default/active/modules/100/naemon//usr/share/selinux/minimum/default/active/modules/100/nagios//usr/share/selinux/minimum/default/active/modules/100/namespace//usr/share/selinux/minimum/default/active/modules/100/ncftool//usr/share/selinux/minimum/default/active/modules/100/netlabel//usr/share/selinux/minimum/default/active/modules/100/netutils//usr/share/selinux/minimum/default/active/modules/100/networkmanager//usr/share/selinux/minimum/default/active/modules/100/ninfod//usr/share/selinux/minimum/default/active/modules/100/nis//usr/share/selinux/minimum/default/active/modules/100/nova//usr/share/selinux/minimum/default/active/modules/100/nscd//usr/share/selinux/minimum/default/active/modules/100/nsd//usr/share/selinux/minimum/default/active/modules/100/nslcd//usr/share/selinux/minimum/default/active/modules/100/ntop//usr/share/selinux/minimum/default/active/modules/100/ntp//usr/share/selinux/minimum/default/active/modules/100/numad//usr/share/selinux/minimum/default/active/modules/100/nut//usr/share/selinux/minimum/default/active/modules/100/nx//usr/share/selinux/minimum/default/active/modules/100/obex//usr/share/selinux/minimum/default/active/modules/100/oddjob//usr/share/selinux/minimum/default/active/modules/100/opafm//usr/share/selinux/minimum/default/active/modules/100/openct//usr/share/selinux/minimum/default/active/modules/100/opendnssec//usr/share/selinux/minimum/default/active/modules/100/openfortivpn//usr/share/selinux/minimum/default/active/modules/100/openhpid//usr/share/selinux/minimum/default/active/modules/100/openshift-origin//usr/share/selinux/minimum/default/active/modules/100/openshift//usr/share/selinux/minimum/default/active/modules/100/opensm//usr/share/selinux/minimum/default/active/modules/100/openvpn//usr/share/selinux/minimum/default/active/modules/100/openvswitch//usr/share/selinux/minimum/default/active/modules/100/openwsman//usr/share/selinux/minimum/default/active/modules/100/oracleasm//usr/share/selinux/minimum/default/active/modules/100/osad//usr/share/selinux/minimum/default/active/modules/100/pads//usr/share/selinux/minimum/default/active/modules/100/passenger//usr/share/selinux/minimum/default/active/modules/100/pcmcia//usr/share/selinux/minimum/default/active/modules/100/pcp//usr/share/selinux/minimum/default/active/modules/100/pcscd//usr/share/selinux/minimum/default/active/modules/100/pdns//usr/share/selinux/minimum/default/active/modules/100/pegasus//usr/share/selinux/minimum/default/active/modules/100/pesign//usr/share/selinux/minimum/default/active/modules/100/pingd//usr/share/selinux/minimum/default/active/modules/100/piranha//usr/share/selinux/minimum/default/active/modules/100/pkcs//usr/share/selinux/minimum/default/active/modules/100/pkcs11proxyd//usr/share/selinux/minimum/default/active/modules/100/pki//usr/share/selinux/minimum/default/active/modules/100/plymouthd//usr/share/selinux/minimum/default/active/modules/100/podsleuth//usr/share/selinux/minimum/default/active/modules/100/policykit//usr/share/selinux/minimum/default/active/modules/100/polipo//usr/share/selinux/minimum/default/active/modules/100/portmap//usr/share/selinux/minimum/default/active/modules/100/portreserve//usr/share/selinux/minimum/default/active/modules/100/postfix//usr/share/selinux/minimum/default/active/modules/100/postgresql//usr/share/selinux/minimum/default/active/modules/100/postgrey//usr/share/selinux/minimum/default/active/modules/100/ppp//usr/share/selinux/minimum/default/active/modules/100/prelink//usr/share/selinux/minimum/default/active/modules/100/prelude//usr/share/selinux/minimum/default/active/modules/100/privoxy//usr/share/selinux/minimum/default/active/modules/100/procmail//usr/share/selinux/minimum/default/active/modules/100/prosody//usr/share/selinux/minimum/default/active/modules/100/psad//usr/share/selinux/minimum/default/active/modules/100/ptchown//usr/share/selinux/minimum/default/active/modules/100/publicfile//usr/share/selinux/minimum/default/active/modules/100/pulseaudio//usr/share/selinux/minimum/default/active/modules/100/puppet//usr/share/selinux/minimum/default/active/modules/100/pwauth//usr/share/selinux/minimum/default/active/modules/100/qmail//usr/share/selinux/minimum/default/active/modules/100/qpid//usr/share/selinux/minimum/default/active/modules/100/quantum//usr/share/selinux/minimum/default/active/modules/100/quota//usr/share/selinux/minimum/default/active/modules/100/rabbitmq//usr/share/selinux/minimum/default/active/modules/100/radius//usr/share/selinux/minimum/default/active/modules/100/radvd//usr/share/selinux/minimum/default/active/modules/100/raid//usr/share/selinux/minimum/default/active/modules/100/rasdaemon//usr/share/selinux/minimum/default/active/modules/100/rdisc//usr/share/selinux/minimum/default/active/modules/100/readahead//usr/share/selinux/minimum/default/active/modules/100/realmd//usr/share/selinux/minimum/default/active/modules/100/redis//usr/share/selinux/minimum/default/active/modules/100/remotelogin//usr/share/selinux/minimum/default/active/modules/100/rhcs//usr/share/selinux/minimum/default/active/modules/100/rhev//usr/share/selinux/minimum/default/active/modules/100/rhgb//usr/share/selinux/minimum/default/active/modules/100/rhnsd//usr/share/selinux/minimum/default/active/modules/100/rhsmcertd//usr/share/selinux/minimum/default/active/modules/100/ricci//usr/share/selinux/minimum/default/active/modules/100/rkhunter//usr/share/selinux/minimum/default/active/modules/100/rkt//usr/share/selinux/minimum/default/active/modules/100/rlogin//usr/share/selinux/minimum/default/active/modules/100/rngd//usr/share/selinux/minimum/default/active/modules/100/rolekit//usr/share/selinux/minimum/default/active/modules/100/roundup//usr/share/selinux/minimum/default/active/modules/100/rpc//usr/share/selinux/minimum/default/active/modules/100/rpcbind//usr/share/selinux/minimum/default/active/modules/100/rpm//usr/share/selinux/minimum/default/active/modules/100/rrdcached//usr/share/selinux/minimum/default/active/modules/100/rshd//usr/share/selinux/minimum/default/active/modules/100/rssh//usr/share/selinux/minimum/default/active/modules/100/rsync//usr/share/selinux/minimum/default/active/modules/100/rtas//usr/share/selinux/minimum/default/active/modules/100/rtkit//usr/share/selinux/minimum/default/active/modules/100/rwho//usr/share/selinux/minimum/default/active/modules/100/samba//usr/share/selinux/minimum/default/active/modules/100/sambagui//usr/share/selinux/minimum/default/active/modules/100/sandboxX//usr/share/selinux/minimum/default/active/modules/100/sanlock//usr/share/selinux/minimum/default/active/modules/100/sasl//usr/share/selinux/minimum/default/active/modules/100/sbd//usr/share/selinux/minimum/default/active/modules/100/sblim//usr/share/selinux/minimum/default/active/modules/100/screen//usr/share/selinux/minimum/default/active/modules/100/secadm//usr/share/selinux/minimum/default/active/modules/100/sectoolm//usr/share/selinux/minimum/default/active/modules/100/selinuxutil//usr/share/selinux/minimum/default/active/modules/100/sendmail//usr/share/selinux/minimum/default/active/modules/100/sensord//usr/share/selinux/minimum/default/active/modules/100/setrans//usr/share/selinux/minimum/default/active/modules/100/setroubleshoot//usr/share/selinux/minimum/default/active/modules/100/seunshare//usr/share/selinux/minimum/default/active/modules/100/sge//usr/share/selinux/minimum/default/active/modules/100/shorewall//usr/share/selinux/minimum/default/active/modules/100/slocate//usr/share/selinux/minimum/default/active/modules/100/slpd//usr/share/selinux/minimum/default/active/modules/100/smartmon//usr/share/selinux/minimum/default/active/modules/100/smokeping//usr/share/selinux/minimum/default/active/modules/100/smoltclient//usr/share/selinux/minimum/default/active/modules/100/smsd//usr/share/selinux/minimum/default/active/modules/100/snapper//usr/share/selinux/minimum/default/active/modules/100/snmp//usr/share/selinux/minimum/default/active/modules/100/snort//usr/share/selinux/minimum/default/active/modules/100/sosreport//usr/share/selinux/minimum/default/active/modules/100/soundserver//usr/share/selinux/minimum/default/active/modules/100/spamassassin//usr/share/selinux/minimum/default/active/modules/100/speech-dispatcher//usr/share/selinux/minimum/default/active/modules/100/squid//usr/share/selinux/minimum/default/active/modules/100/ssh//usr/share/selinux/minimum/default/active/modules/100/sslh//usr/share/selinux/minimum/default/active/modules/100/sssd//usr/share/selinux/minimum/default/active/modules/100/staff//usr/share/selinux/minimum/default/active/modules/100/stapserver//usr/share/selinux/minimum/default/active/modules/100/stratisd//usr/share/selinux/minimum/default/active/modules/100/stunnel//usr/share/selinux/minimum/default/active/modules/100/su//usr/share/selinux/minimum/default/active/modules/100/sudo//usr/share/selinux/minimum/default/active/modules/100/svnserve//usr/share/selinux/minimum/default/active/modules/100/swift//usr/share/selinux/minimum/default/active/modules/100/sysadm//usr/share/selinux/minimum/default/active/modules/100/sysadm_secadm//usr/share/selinux/minimum/default/active/modules/100/sysnetwork//usr/share/selinux/minimum/default/active/modules/100/sysstat//usr/share/selinux/minimum/default/active/modules/100/systemd//usr/share/selinux/minimum/default/active/modules/100/tangd//usr/share/selinux/minimum/default/active/modules/100/targetd//usr/share/selinux/minimum/default/active/modules/100/tcpd//usr/share/selinux/minimum/default/active/modules/100/tcsd//usr/share/selinux/minimum/default/active/modules/100/telepathy//usr/share/selinux/minimum/default/active/modules/100/telnet//usr/share/selinux/minimum/default/active/modules/100/tftp//usr/share/selinux/minimum/default/active/modules/100/tgtd//usr/share/selinux/minimum/default/active/modules/100/thin//usr/share/selinux/minimum/default/active/modules/100/thumb//usr/share/selinux/minimum/default/active/modules/100/timedatex//usr/share/selinux/minimum/default/active/modules/100/tlp//usr/share/selinux/minimum/default/active/modules/100/tmpreaper//usr/share/selinux/minimum/default/active/modules/100/tomcat//usr/share/selinux/minimum/default/active/modules/100/tor//usr/share/selinux/minimum/default/active/modules/100/tuned//usr/share/selinux/minimum/default/active/modules/100/tvtime//usr/share/selinux/minimum/default/active/modules/100/udev//usr/share/selinux/minimum/default/active/modules/100/ulogd//usr/share/selinux/minimum/default/active/modules/100/uml//usr/share/selinux/minimum/default/active/modules/100/unconfined//usr/share/selinux/minimum/default/active/modules/100/unconfineduser//usr/share/selinux/minimum/default/active/modules/100/unlabelednet//usr/share/selinux/minimum/default/active/modules/100/unprivuser//usr/share/selinux/minimum/default/active/modules/100/updfstab//usr/share/selinux/minimum/default/active/modules/100/usbmodules//usr/share/selinux/minimum/default/active/modules/100/usbmuxd//usr/share/selinux/minimum/default/active/modules/100/userdomain//usr/share/selinux/minimum/default/active/modules/100/userhelper//usr/share/selinux/minimum/default/active/modules/100/usermanage//usr/share/selinux/minimum/default/active/modules/100/usernetctl//usr/share/selinux/minimum/default/active/modules/100/uucp//usr/share/selinux/minimum/default/active/modules/100/uuidd//usr/share/selinux/minimum/default/active/modules/100/varnishd//usr/share/selinux/minimum/default/active/modules/100/vdagent//usr/share/selinux/minimum/default/active/modules/100/vhostmd//usr/share/selinux/minimum/default/active/modules/100/virt//usr/share/selinux/minimum/default/active/modules/100/vlock//usr/share/selinux/minimum/default/active/modules/100/vmtools//usr/share/selinux/minimum/default/active/modules/100/vmware//usr/share/selinux/minimum/default/active/modules/100/vnstatd//usr/share/selinux/minimum/default/active/modules/100/vpn//usr/share/selinux/minimum/default/active/modules/100/w3c//usr/share/selinux/minimum/default/active/modules/100/watchdog//usr/share/selinux/minimum/default/active/modules/100/wdmd//usr/share/selinux/minimum/default/active/modules/100/webadm//usr/share/selinux/minimum/default/active/modules/100/webalizer//usr/share/selinux/minimum/default/active/modules/100/wine//usr/share/selinux/minimum/default/active/modules/100/wireshark//usr/share/selinux/minimum/default/active/modules/100/xen//usr/share/selinux/minimum/default/active/modules/100/xguest//usr/share/selinux/minimum/default/active/modules/100/xserver//usr/share/selinux/minimum/default/active/modules/100/zabbix//usr/share/selinux/minimum/default/active/modules/100/zarafa//usr/share/selinux/minimum/default/active/modules/100/zebra//usr/share/selinux/minimum/default/active/modules/100/zoneminder//usr/share/selinux/minimum/default/active/modules/100/zosremote//var/lib/selinux/minimum//var/lib/selinux/minimum/active//var/lib/selinux/minimum/active/modules/100//var/lib/selinux/minimum/active/modules/100/abrt//var/lib/selinux/minimum/active/modules/100/accountsd//var/lib/selinux/minimum/active/modules/100/acct//var/lib/selinux/minimum/active/modules/100/afs//var/lib/selinux/minimum/active/modules/100/aiccu//var/lib/selinux/minimum/active/modules/100/aide//var/lib/selinux/minimum/active/modules/100/ajaxterm//var/lib/selinux/minimum/active/modules/100/alsa//var/lib/selinux/minimum/active/modules/100/amanda//var/lib/selinux/minimum/active/modules/100/amtu//var/lib/selinux/minimum/active/modules/100/anaconda//var/lib/selinux/minimum/active/modules/100/antivirus//var/lib/selinux/minimum/active/modules/100/apache//var/lib/selinux/minimum/active/modules/100/apcupsd//var/lib/selinux/minimum/active/modules/100/apm//var/lib/selinux/minimum/active/modules/100/application//var/lib/selinux/minimum/active/modules/100/arpwatch//var/lib/selinux/minimum/active/modules/100/asterisk//var/lib/selinux/minimum/active/modules/100/auditadm//var/lib/selinux/minimum/active/modules/100/authconfig//var/lib/selinux/minimum/active/modules/100/authlogin//var/lib/selinux/minimum/active/modules/100/automount//var/lib/selinux/minimum/active/modules/100/avahi//var/lib/selinux/minimum/active/modules/100/awstats//var/lib/selinux/minimum/active/modules/100/bacula//var/lib/selinux/minimum/active/modules/100/base//var/lib/selinux/minimum/active/modules/100/bcfg2//var/lib/selinux/minimum/active/modules/100/bind//var/lib/selinux/minimum/active/modules/100/bitlbee//var/lib/selinux/minimum/active/modules/100/blkmapd//var/lib/selinux/minimum/active/modules/100/blueman//var/lib/selinux/minimum/active/modules/100/bluetooth//var/lib/selinux/minimum/active/modules/100/boinc//var/lib/selinux/minimum/active/modules/100/boltd//var/lib/selinux/minimum/active/modules/100/bootloader//var/lib/selinux/minimum/active/modules/100/brctl//var/lib/selinux/minimum/active/modules/100/brltty//var/lib/selinux/minimum/active/modules/100/bugzilla//var/lib/selinux/minimum/active/modules/100/bumblebee//var/lib/selinux/minimum/active/modules/100/cachefilesd//var/lib/selinux/minimum/active/modules/100/calamaris//var/lib/selinux/minimum/active/modules/100/callweaver//var/lib/selinux/minimum/active/modules/100/canna//var/lib/selinux/minimum/active/modules/100/ccs//var/lib/selinux/minimum/active/modules/100/cdrecord//var/lib/selinux/minimum/active/modules/100/certmaster//var/lib/selinux/minimum/active/modules/100/certmonger//var/lib/selinux/minimum/active/modules/100/certwatch//var/lib/selinux/minimum/active/modules/100/cfengine//var/lib/selinux/minimum/active/modules/100/cgdcbxd//var/lib/selinux/minimum/active/modules/100/cgroup//var/lib/selinux/minimum/active/modules/100/chrome//var/lib/selinux/minimum/active/modules/100/chronyd//var/lib/selinux/minimum/active/modules/100/cinder//var/lib/selinux/minimum/active/modules/100/cipe//var/lib/selinux/minimum/active/modules/100/clock//var/lib/selinux/minimum/active/modules/100/clogd//var/lib/selinux/minimum/active/modules/100/cloudform//var/lib/selinux/minimum/active/modules/100/cmirrord//var/lib/selinux/minimum/active/modules/100/cobbler//var/lib/selinux/minimum/active/modules/100/cockpit//var/lib/selinux/minimum/active/modules/100/collectd//var/lib/selinux/minimum/active/modules/100/colord//var/lib/selinux/minimum/active/modules/100/comsat//var/lib/selinux/minimum/active/modules/100/condor//var/lib/selinux/minimum/active/modules/100/conman//var/lib/selinux/minimum/active/modules/100/conntrackd//var/lib/selinux/minimum/active/modules/100/consolekit//var/lib/selinux/minimum/active/modules/100/couchdb//var/lib/selinux/minimum/active/modules/100/courier//var/lib/selinux/minimum/active/modules/100/cpucontrol//var/lib/selinux/minimum/active/modules/100/cpufreqselector//var/lib/selinux/minimum/active/modules/100/cpuplug//var/lib/selinux/minimum/active/modules/100/cron//var/lib/selinux/minimum/active/modules/100/ctdb//var/lib/selinux/minimum/active/modules/100/cups//var/lib/selinux/minimum/active/modules/100/cvs//var/lib/selinux/minimum/active/modules/100/cyphesis//var/lib/selinux/minimum/active/modules/100/cyrus//var/lib/selinux/minimum/active/modules/100/daemontools//var/lib/selinux/minimum/active/modules/100/dbadm//var/lib/selinux/minimum/active/modules/100/dbskk//var/lib/selinux/minimum/active/modules/100/dbus//var/lib/selinux/minimum/active/modules/100/dcc//var/lib/selinux/minimum/active/modules/100/ddclient//var/lib/selinux/minimum/active/modules/100/denyhosts//var/lib/selinux/minimum/active/modules/100/devicekit//var/lib/selinux/minimum/active/modules/100/dhcp//var/lib/selinux/minimum/active/modules/100/dictd//var/lib/selinux/minimum/active/modules/100/dirsrv-admin//var/lib/selinux/minimum/active/modules/100/dirsrv//var/lib/selinux/minimum/active/modules/100/dmesg//var/lib/selinux/minimum/active/modules/100/dmidecode//var/lib/selinux/minimum/active/modules/100/dnsmasq//var/lib/selinux/minimum/active/modules/100/dnssec//var/lib/selinux/minimum/active/modules/100/dovecot//var/lib/selinux/minimum/active/modules/100/drbd//var/lib/selinux/minimum/active/modules/100/dspam//var/lib/selinux/minimum/active/modules/100/entropyd//var/lib/selinux/minimum/active/modules/100/exim//var/lib/selinux/minimum/active/modules/100/fail2ban//var/lib/selinux/minimum/active/modules/100/fcoe//var/lib/selinux/minimum/active/modules/100/fetchmail//var/lib/selinux/minimum/active/modules/100/finger//var/lib/selinux/minimum/active/modules/100/firewalld//var/lib/selinux/minimum/active/modules/100/firewallgui//var/lib/selinux/minimum/active/modules/100/firstboot//var/lib/selinux/minimum/active/modules/100/fprintd//var/lib/selinux/minimum/active/modules/100/freeipmi//var/lib/selinux/minimum/active/modules/100/freqset//var/lib/selinux/minimum/active/modules/100/fstools//var/lib/selinux/minimum/active/modules/100/ftp//var/lib/selinux/minimum/active/modules/100/fwupd//var/lib/selinux/minimum/active/modules/100/games//var/lib/selinux/minimum/active/modules/100/gdomap//var/lib/selinux/minimum/active/modules/100/geoclue//var/lib/selinux/minimum/active/modules/100/getty//var/lib/selinux/minimum/active/modules/100/git//var/lib/selinux/minimum/active/modules/100/gitosis//var/lib/selinux/minimum/active/modules/100/glance//var/lib/selinux/minimum/active/modules/100/gnome//var/lib/selinux/minimum/active/modules/100/gpg//var/lib/selinux/minimum/active/modules/100/gpm//var/lib/selinux/minimum/active/modules/100/gpsd//var/lib/selinux/minimum/active/modules/100/gssproxy//var/lib/selinux/minimum/active/modules/100/guest//var/lib/selinux/minimum/active/modules/100/hddtemp//var/lib/selinux/minimum/active/modules/100/hostapd//var/lib/selinux/minimum/active/modules/100/hostname//var/lib/selinux/minimum/active/modules/100/hsqldb//var/lib/selinux/minimum/active/modules/100/hwloc//var/lib/selinux/minimum/active/modules/100/hypervkvp//var/lib/selinux/minimum/active/modules/100/ibacm//var/lib/selinux/minimum/active/modules/100/icecast//var/lib/selinux/minimum/active/modules/100/inetd//var/lib/selinux/minimum/active/modules/100/init//var/lib/selinux/minimum/active/modules/100/inn//var/lib/selinux/minimum/active/modules/100/insights_client//var/lib/selinux/minimum/active/modules/100/iodine//var/lib/selinux/minimum/active/modules/100/iotop//var/lib/selinux/minimum/active/modules/100/ipmievd//var/lib/selinux/minimum/active/modules/100/ipsec//var/lib/selinux/minimum/active/modules/100/iptables//var/lib/selinux/minimum/active/modules/100/irc//var/lib/selinux/minimum/active/modules/100/irqbalance//var/lib/selinux/minimum/active/modules/100/iscsi//var/lib/selinux/minimum/active/modules/100/isns//var/lib/selinux/minimum/active/modules/100/jabber//var/lib/selinux/minimum/active/modules/100/jetty//var/lib/selinux/minimum/active/modules/100/jockey//var/lib/selinux/minimum/active/modules/100/journalctl//var/lib/selinux/minimum/active/modules/100/kdbus//var/lib/selinux/minimum/active/modules/100/kdump//var/lib/selinux/minimum/active/modules/100/kdumpgui//var/lib/selinux/minimum/active/modules/100/keepalived//var/lib/selinux/minimum/active/modules/100/kerberos//var/lib/selinux/minimum/active/modules/100/keyboardd//var/lib/selinux/minimum/active/modules/100/keystone//var/lib/selinux/minimum/active/modules/100/kismet//var/lib/selinux/minimum/active/modules/100/kmscon//var/lib/selinux/minimum/active/modules/100/kpatch//var/lib/selinux/minimum/active/modules/100/ksmtuned//var/lib/selinux/minimum/active/modules/100/ktalk//var/lib/selinux/minimum/active/modules/100/l2tp//var/lib/selinux/minimum/active/modules/100/ldap//var/lib/selinux/minimum/active/modules/100/libraries//var/lib/selinux/minimum/active/modules/100/likewise//var/lib/selinux/minimum/active/modules/100/linuxptp//var/lib/selinux/minimum/active/modules/100/lircd//var/lib/selinux/minimum/active/modules/100/livecd//var/lib/selinux/minimum/active/modules/100/lldpad//var/lib/selinux/minimum/active/modules/100/loadkeys//var/lib/selinux/minimum/active/modules/100/locallogin//var/lib/selinux/minimum/active/modules/100/lockdev//var/lib/selinux/minimum/active/modules/100/logadm//var/lib/selinux/minimum/active/modules/100/logging//var/lib/selinux/minimum/active/modules/100/logrotate//var/lib/selinux/minimum/active/modules/100/logwatch//var/lib/selinux/minimum/active/modules/100/lpd//var/lib/selinux/minimum/active/modules/100/lsm//var/lib/selinux/minimum/active/modules/100/lttng-tools//var/lib/selinux/minimum/active/modules/100/lvm//var/lib/selinux/minimum/active/modules/100/mailman//var/lib/selinux/minimum/active/modules/100/mailscanner//var/lib/selinux/minimum/active/modules/100/man2html//var/lib/selinux/minimum/active/modules/100/mandb//var/lib/selinux/minimum/active/modules/100/mcelog//var/lib/selinux/minimum/active/modules/100/mediawiki//var/lib/selinux/minimum/active/modules/100/memcached//var/lib/selinux/minimum/active/modules/100/milter//var/lib/selinux/minimum/active/modules/100/minidlna//var/lib/selinux/minimum/active/modules/100/minissdpd//var/lib/selinux/minimum/active/modules/100/mip6d//var/lib/selinux/minimum/active/modules/100/mirrormanager//var/lib/selinux/minimum/active/modules/100/miscfiles//var/lib/selinux/minimum/active/modules/100/mock//var/lib/selinux/minimum/active/modules/100/modemmanager//var/lib/selinux/minimum/active/modules/100/modutils//var/lib/selinux/minimum/active/modules/100/mojomojo//var/lib/selinux/minimum/active/modules/100/mon_statd//var/lib/selinux/minimum/active/modules/100/mongodb//var/lib/selinux/minimum/active/modules/100/motion//var/lib/selinux/minimum/active/modules/100/mount//var/lib/selinux/minimum/active/modules/100/mozilla//var/lib/selinux/minimum/active/modules/100/mpd//var/lib/selinux/minimum/active/modules/100/mplayer//var/lib/selinux/minimum/active/modules/100/mrtg//var/lib/selinux/minimum/active/modules/100/mta//var/lib/selinux/minimum/active/modules/100/munin//var/lib/selinux/minimum/active/modules/100/mysql//var/lib/selinux/minimum/active/modules/100/mythtv//var/lib/selinux/minimum/active/modules/100/naemon//var/lib/selinux/minimum/active/modules/100/nagios//var/lib/selinux/minimum/active/modules/100/namespace//var/lib/selinux/minimum/active/modules/100/ncftool//var/lib/selinux/minimum/active/modules/100/netlabel//var/lib/selinux/minimum/active/modules/100/netutils//var/lib/selinux/minimum/active/modules/100/networkmanager//var/lib/selinux/minimum/active/modules/100/ninfod//var/lib/selinux/minimum/active/modules/100/nis//var/lib/selinux/minimum/active/modules/100/nova//var/lib/selinux/minimum/active/modules/100/nscd//var/lib/selinux/minimum/active/modules/100/nsd//var/lib/selinux/minimum/active/modules/100/nslcd//var/lib/selinux/minimum/active/modules/100/ntop//var/lib/selinux/minimum/active/modules/100/ntp//var/lib/selinux/minimum/active/modules/100/numad//var/lib/selinux/minimum/active/modules/100/nut//var/lib/selinux/minimum/active/modules/100/nx//var/lib/selinux/minimum/active/modules/100/obex//var/lib/selinux/minimum/active/modules/100/oddjob//var/lib/selinux/minimum/active/modules/100/opafm//var/lib/selinux/minimum/active/modules/100/openct//var/lib/selinux/minimum/active/modules/100/opendnssec//var/lib/selinux/minimum/active/modules/100/openfortivpn//var/lib/selinux/minimum/active/modules/100/openhpid//var/lib/selinux/minimum/active/modules/100/openshift-origin//var/lib/selinux/minimum/active/modules/100/openshift//var/lib/selinux/minimum/active/modules/100/opensm//var/lib/selinux/minimum/active/modules/100/openvpn//var/lib/selinux/minimum/active/modules/100/openvswitch//var/lib/selinux/minimum/active/modules/100/openwsman//var/lib/selinux/minimum/active/modules/100/oracleasm//var/lib/selinux/minimum/active/modules/100/osad//var/lib/selinux/minimum/active/modules/100/pads//var/lib/selinux/minimum/active/modules/100/passenger//var/lib/selinux/minimum/active/modules/100/pcmcia//var/lib/selinux/minimum/active/modules/100/pcp//var/lib/selinux/minimum/active/modules/100/pcscd//var/lib/selinux/minimum/active/modules/100/pdns//var/lib/selinux/minimum/active/modules/100/pegasus//var/lib/selinux/minimum/active/modules/100/pesign//var/lib/selinux/minimum/active/modules/100/pingd//var/lib/selinux/minimum/active/modules/100/piranha//var/lib/selinux/minimum/active/modules/100/pkcs//var/lib/selinux/minimum/active/modules/100/pkcs11proxyd//var/lib/selinux/minimum/active/modules/100/pki//var/lib/selinux/minimum/active/modules/100/plymouthd//var/lib/selinux/minimum/active/modules/100/podsleuth//var/lib/selinux/minimum/active/modules/100/policykit//var/lib/selinux/minimum/active/modules/100/polipo//var/lib/selinux/minimum/active/modules/100/portmap//var/lib/selinux/minimum/active/modules/100/portreserve//var/lib/selinux/minimum/active/modules/100/postfix//var/lib/selinux/minimum/active/modules/100/postgresql//var/lib/selinux/minimum/active/modules/100/postgrey//var/lib/selinux/minimum/active/modules/100/ppp//var/lib/selinux/minimum/active/modules/100/prelink//var/lib/selinux/minimum/active/modules/100/prelude//var/lib/selinux/minimum/active/modules/100/privoxy//var/lib/selinux/minimum/active/modules/100/procmail//var/lib/selinux/minimum/active/modules/100/prosody//var/lib/selinux/minimum/active/modules/100/psad//var/lib/selinux/minimum/active/modules/100/ptchown//var/lib/selinux/minimum/active/modules/100/publicfile//var/lib/selinux/minimum/active/modules/100/pulseaudio//var/lib/selinux/minimum/active/modules/100/puppet//var/lib/selinux/minimum/active/modules/100/pwauth//var/lib/selinux/minimum/active/modules/100/qmail//var/lib/selinux/minimum/active/modules/100/qpid//var/lib/selinux/minimum/active/modules/100/quantum//var/lib/selinux/minimum/active/modules/100/quota//var/lib/selinux/minimum/active/modules/100/rabbitmq//var/lib/selinux/minimum/active/modules/100/radius//var/lib/selinux/minimum/active/modules/100/radvd//var/lib/selinux/minimum/active/modules/100/raid//var/lib/selinux/minimum/active/modules/100/rasdaemon//var/lib/selinux/minimum/active/modules/100/rdisc//var/lib/selinux/minimum/active/modules/100/readahead//var/lib/selinux/minimum/active/modules/100/realmd//var/lib/selinux/minimum/active/modules/100/redis//var/lib/selinux/minimum/active/modules/100/remotelogin//var/lib/selinux/minimum/active/modules/100/rhcs//var/lib/selinux/minimum/active/modules/100/rhev//var/lib/selinux/minimum/active/modules/100/rhgb//var/lib/selinux/minimum/active/modules/100/rhnsd//var/lib/selinux/minimum/active/modules/100/rhsmcertd//var/lib/selinux/minimum/active/modules/100/ricci//var/lib/selinux/minimum/active/modules/100/rkhunter//var/lib/selinux/minimum/active/modules/100/rkt//var/lib/selinux/minimum/active/modules/100/rlogin//var/lib/selinux/minimum/active/modules/100/rngd//var/lib/selinux/minimum/active/modules/100/rolekit//var/lib/selinux/minimum/active/modules/100/roundup//var/lib/selinux/minimum/active/modules/100/rpc//var/lib/selinux/minimum/active/modules/100/rpcbind//var/lib/selinux/minimum/active/modules/100/rpm//var/lib/selinux/minimum/active/modules/100/rrdcached//var/lib/selinux/minimum/active/modules/100/rshd//var/lib/selinux/minimum/active/modules/100/rssh//var/lib/selinux/minimum/active/modules/100/rsync//var/lib/selinux/minimum/active/modules/100/rtas//var/lib/selinux/minimum/active/modules/100/rtkit//var/lib/selinux/minimum/active/modules/100/rwho//var/lib/selinux/minimum/active/modules/100/samba//var/lib/selinux/minimum/active/modules/100/sambagui//var/lib/selinux/minimum/active/modules/100/sandboxX//var/lib/selinux/minimum/active/modules/100/sanlock//var/lib/selinux/minimum/active/modules/100/sasl//var/lib/selinux/minimum/active/modules/100/sbd//var/lib/selinux/minimum/active/modules/100/sblim//var/lib/selinux/minimum/active/modules/100/screen//var/lib/selinux/minimum/active/modules/100/secadm//var/lib/selinux/minimum/active/modules/100/sectoolm//var/lib/selinux/minimum/active/modules/100/selinuxutil//var/lib/selinux/minimum/active/modules/100/sendmail//var/lib/selinux/minimum/active/modules/100/sensord//var/lib/selinux/minimum/active/modules/100/setrans//var/lib/selinux/minimum/active/modules/100/setroubleshoot//var/lib/selinux/minimum/active/modules/100/seunshare//var/lib/selinux/minimum/active/modules/100/sge//var/lib/selinux/minimum/active/modules/100/shorewall//var/lib/selinux/minimum/active/modules/100/slocate//var/lib/selinux/minimum/active/modules/100/slpd//var/lib/selinux/minimum/active/modules/100/smartmon//var/lib/selinux/minimum/active/modules/100/smokeping//var/lib/selinux/minimum/active/modules/100/smoltclient//var/lib/selinux/minimum/active/modules/100/smsd//var/lib/selinux/minimum/active/modules/100/snapper//var/lib/selinux/minimum/active/modules/100/snmp//var/lib/selinux/minimum/active/modules/100/snort//var/lib/selinux/minimum/active/modules/100/sosreport//var/lib/selinux/minimum/active/modules/100/soundserver//var/lib/selinux/minimum/active/modules/100/spamassassin//var/lib/selinux/minimum/active/modules/100/speech-dispatcher//var/lib/selinux/minimum/active/modules/100/squid//var/lib/selinux/minimum/active/modules/100/ssh//var/lib/selinux/minimum/active/modules/100/sslh//var/lib/selinux/minimum/active/modules/100/sssd//var/lib/selinux/minimum/active/modules/100/staff//var/lib/selinux/minimum/active/modules/100/stapserver//var/lib/selinux/minimum/active/modules/100/stratisd//var/lib/selinux/minimum/active/modules/100/stunnel//var/lib/selinux/minimum/active/modules/100/su//var/lib/selinux/minimum/active/modules/100/sudo//var/lib/selinux/minimum/active/modules/100/svnserve//var/lib/selinux/minimum/active/modules/100/swift//var/lib/selinux/minimum/active/modules/100/sysadm//var/lib/selinux/minimum/active/modules/100/sysadm_secadm//var/lib/selinux/minimum/active/modules/100/sysnetwork//var/lib/selinux/minimum/active/modules/100/sysstat//var/lib/selinux/minimum/active/modules/100/systemd//var/lib/selinux/minimum/active/modules/100/tangd//var/lib/selinux/minimum/active/modules/100/targetd//var/lib/selinux/minimum/active/modules/100/tcpd//var/lib/selinux/minimum/active/modules/100/tcsd//var/lib/selinux/minimum/active/modules/100/telepathy//var/lib/selinux/minimum/active/modules/100/telnet//var/lib/selinux/minimum/active/modules/100/tftp//var/lib/selinux/minimum/active/modules/100/tgtd//var/lib/selinux/minimum/active/modules/100/thin//var/lib/selinux/minimum/active/modules/100/thumb//var/lib/selinux/minimum/active/modules/100/timedatex//var/lib/selinux/minimum/active/modules/100/tlp//var/lib/selinux/minimum/active/modules/100/tmpreaper//var/lib/selinux/minimum/active/modules/100/tomcat//var/lib/selinux/minimum/active/modules/100/tor//var/lib/selinux/minimum/active/modules/100/tuned//var/lib/selinux/minimum/active/modules/100/tvtime//var/lib/selinux/minimum/active/modules/100/udev//var/lib/selinux/minimum/active/modules/100/ulogd//var/lib/selinux/minimum/active/modules/100/uml//var/lib/selinux/minimum/active/modules/100/unconfined//var/lib/selinux/minimum/active/modules/100/unconfineduser//var/lib/selinux/minimum/active/modules/100/unlabelednet//var/lib/selinux/minimum/active/modules/100/unprivuser//var/lib/selinux/minimum/active/modules/100/updfstab//var/lib/selinux/minimum/active/modules/100/usbmodules//var/lib/selinux/minimum/active/modules/100/usbmuxd//var/lib/selinux/minimum/active/modules/100/userdomain//var/lib/selinux/minimum/active/modules/100/userhelper//var/lib/selinux/minimum/active/modules/100/usermanage//var/lib/selinux/minimum/active/modules/100/usernetctl//var/lib/selinux/minimum/active/modules/100/uucp//var/lib/selinux/minimum/active/modules/100/uuidd//var/lib/selinux/minimum/active/modules/100/varnishd//var/lib/selinux/minimum/active/modules/100/vdagent//var/lib/selinux/minimum/active/modules/100/vhostmd//var/lib/selinux/minimum/active/modules/100/virt//var/lib/selinux/minimum/active/modules/100/vlock//var/lib/selinux/minimum/active/modules/100/vmtools//var/lib/selinux/minimum/active/modules/100/vmware//var/lib/selinux/minimum/active/modules/100/vnstatd//var/lib/selinux/minimum/active/modules/100/vpn//var/lib/selinux/minimum/active/modules/100/w3c//var/lib/selinux/minimum/active/modules/100/watchdog//var/lib/selinux/minimum/active/modules/100/wdmd//var/lib/selinux/minimum/active/modules/100/webadm//var/lib/selinux/minimum/active/modules/100/webalizer//var/lib/selinux/minimum/active/modules/100/wine//var/lib/selinux/minimum/active/modules/100/wireshark//var/lib/selinux/minimum/active/modules/100/xen//var/lib/selinux/minimum/active/modules/100/xguest//var/lib/selinux/minimum/active/modules/100/xserver//var/lib/selinux/minimum/active/modules/100/zabbix//var/lib/selinux/minimum/active/modules/100/zarafa//var/lib/selinux/minimum/active/modules/100/zebra//var/lib/selinux/minimum/active/modules/100/zoneminder//var/lib/selinux/minimum/active/modules/100/zosremote/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2noarch-redhat-linux-gnu   directoryASCII textexported SGML document, ASCII textemptyASCII text, with no line terminatorsASCII text, with very long lines (bzip2 compressed data, block size = 500k)ASCII text (bzip2 compressed data, block size = 500k)ASCII text, with very long lines, with no line terminatorscannot open `/builddir/build/BUILDROOT/selinux-policy-3.14.3-139.el8_10.1.noarch/var/lib/selinux/minimum/active/policy.linked' (No such file or directory)cannot open `/builddir/build/BUILDROOT/selinux-policy-3.14.3-139.el8_10.1.noarch/var/lib/selinux/minimum/active/seusers.linked' (No such file or directory)cannot open `/builddir/build/BUILDROOT/selinux-policy-3.14.3-139.el8_10.1.noarch/var/lib/selinux/minimum/active/users_extra.linked' (No such file or directory)utf-8625c9468e4a1d568fcbbfdaf15181acfb59978c9a2f96fe314acb97d0739f241?7zXZ !#,#] b2u jӫ`(y1igO`E&|ˁӈ4t*wѱ{ df9T6mRl 0=yF*c$p{^w{0\W֐&e >r]  8TwGnr!XAcm @Uåb 5NR GYI8I5a:0F*c?{/NkM088BFywt~S))bv"N $/E8ǀ ¦6Z@!uLW}} [r?7N na ,̳i%\_U0OW?Kۨ)JjpJu{\nI:t;*]w & n+r1\wuPUor:,soE>ur~ӶI_a N?+/z-S NOB` z +gDDzsl^D2_b"P{kβku}#DW';Q - t dg,[n:XmP$ss(g˦@|Ol>Fn'K+柝oWR9i=5znBlt,Vi!MO˩s uQڛ"K)s+m,flool>*٬Օu jkm"$!jU۶LkڭpEչE()hQhr5Rb_8,&#UۼDžaK8gMZhoz2T]p?;&]˙DZ]_ <: + ;n O_U+хe Pi6bahMI_avxDiL-FyPkE @{,zctq-!TlʘN-2.TjYe:)+tSM4ϹIVNXk=xЦIiNVӎb.`cInGa2# @dk;ߎm+$TBJ~k?gks$"$sK%fqXjȃ ME梟˱Y (a1.f4s*M]45kSvȥ¹5RHLOpdQ-Q=)G%"ޞ+LP!{z#R8LW*FuK֥nhNAEn&I7_HM@_Km뒵Rأ]{r@vy4َh9n1L zOM@ 32=AT$mYapo&˜?''ѤI=y P^ol?)0#`;6BP 𪫒is׳yϽ 0N{._/B jx:YnnaOGoA|DN ]*/RdO l4@>*4hz1 Isl1'ϠT13>Ӛ;kWF{^muV0]v^K]P44K-㏍ߗ=Bf*01jw3, Y^i֌`c^a)^%dX✚d#-ubŮuH?N*MH.o{5;a[MV5~7߼gWoh4N!NsؘscWY x fA>N:^J?H1CoWuqrcϾk9Ճ|d@+=,ŏ7+%eÊ_uR<%igG%_G4?4xDt1//Sն Yd1? dGD>PUxH^ =Wr&PxHc6|Vv#}GKaDΧ;a3Yۄٴ@Ě w-:ǀ$ډ$795f$DN(%Rq(+rtx!]͛a.*K%&V 2OXW$` D*&ŽWlO2 )WKkgh+w*vIS*;UYkpd3:!R_ɇʿ\$&P33> J$t^#^*oz~jr1 TvAR=A"G ;'?!HէIv{ASS:d"9Tk֣`&uM\=JD?TttՠyT 2krW=A'lJ` SN]W䮽~X<_ RC]?8d~‰ $8Nr"#;ǂ:!tt.Ҫl.>/Ʊ̝WS(b}I1]ܳj%NS+A 0l)NCU$/ٶŨ54ܣҋ;63d'5?}mWIYE f&Pci '<21@^> ,e@)ԇlE?bԀs*[zB2utX(VHt9aAShrjuu!֐Vۭ4xg|%,Q"$E5kgHF{/ȃDtEEFKrOotAt 1:Gٔx,~IP)ˤ/|o~(+{ݧP\2xd&Pz!EX)iJ魨txG8r22"n3IZݩ!`9r~͝G·aƚBt<@ƋϿ"UǨ;xz5{wZ:89^  V(x~M )zbHpn\toDz2!}2MܫJxƿ[&g׫+tI@(KLnߪ1eD{}nqz@˗L<#Q"Wg?Y(ѻR\lf㊆w|M'ߓx6~.qr Y1ˏE4N%t7DA7(`H l_v{,!fF+ j3D\NjvQrzEg;2"q Ux1bb3ʦ)Hln TPcg-rlLmZI eq la^LCncZS:dkIML.Mt`ނZo&|2yNJtIQ*3*ǂeD$)u.j9!P#mkw)XqJ%= 5^VKI1jgF&,)qk!sp㥳 vzˣ=g}\^!DyZaHL}᧢Ǯ ^,Se6P?dXA)OJ %5(^c3Я*Vvd9}k57,;2H9>wJ/Ƌ}ȁ6AP\pWS P)MUT" T?–4IF4P̝/y5VYߪx xdI% ɩk`DHOcu = f Nb;&aPhUC##>ЋjBH-bv]IOX@sYeΊ' Uz"u@`1{suK66b_fU0foVbzK,@W"<HV 抃 >7F}i5/i(xŝü,vpАM@]$"m5IRsciTvl0ϓrIHDL!SCRcyE]j6DNg1$0]dz Ov rxsB*TZQW;6koyA,Brr]GThx֏w-"֔cx4W'Mn7V) Z-e̿b4)*nB/;9jЁOڦ4{$G]8I2a4Pg1Er턀^np}7#Hg^UKrӲ'R6 UfbԈRx:_^77P_`?nC0@ u%HlH} fAIVJ9QrcK(2~Zr$`)4>@w ֪ Z?`-h@^93]ٝnQj0fsǛg}l^b3kny@jIHmTP%d$!NMMѱVxɥBtsC *ɦܿ9ob~gu5Xn%zl Ҥ^Û*@EKMBBq>P k`Ki 2̣B~6'Y"d6 ߰}B=sk~hnKjLGНC3P|~yFbƧ}vZزt:囎#4}_(uP؁_ΡD3bC] ~k{ 9HXМX{IC x(;xBJt"Ƌ1(nS` 3_l3TdrUsH~r:8Wye/ YZEsAȚg#A5֤25bzuK5=69yK,9ހО_Rvb*@I ^j> ٳ]}8h|LQ_A/&{b,X6,0G $lyP8޼uOrCR"y'wv1yd=t\Uc#M]g35Hzު~~xfK+'ўpIfOCW8[b&7k QvuC9|m_6Q&-4*lٮ{*.ID` OwdL1tCmΘչ(G߬v^ k L6Ԙ/W|I;EMneGG?׎P2V:>O(^iSÎi/_()^%,Őwn!I?Us uk T1|1Rs;F۱-]Ӕ$YnE"d/Ak AH]Djk=IKn#uZfr7Ϳh.N~oz+h0:+܌%&{Q6'm?B$);e^k@ۗ13UΑ;mr YMDW`ϘZ&HXSi 18]Ch.-aИE^B#$0&j+\A]EVM~SNpo·GxuEit?Rd7rHZp'WgO2.[Bv`2 .Iɕhػ Vk֗GSJ.]O=+I{C xzY9g4OȷE௉Vą~5C9dD,rPdkTE!J H9ೝqZpM㕙5 wRo{꫰1LsQ `mY@)' I Rq2n;o7{apTb8GZafI OKaԍe} U}wbe,u ܪ'-v/,mH}:5m,j(m#.?rl}3n"J>i":Cm]Sku"k,Ai~9Ugk%Kf]ΰN(/{i:\YYD+7"O0SMb>41"4&O #Q&5pyDP2 wuʬ\7laVx : VAm|4U2C/}3]9M |IBw*Mcÿ=&rBKLwi\o(D݂=OJݽO[ըzT҆v牆*D& MEpM ~s9n-W >-{黂S[OzM\z;zpQM翷CVzܵ%*^}3fq ?y1* (i}Lt܉H*bTa _lۖr۩L) ŇE1$: qRC6wGp,]GG2׹TRUTl$%[k0gXJ!º?wvVƵZB ~Ei4Y-Ep*:Z} +!ק81!DnׯV@Xe&QϘ:z*SLW5785LJ/ فSNHH-{N9%Q}uÆ9VFVu'H@> Uܭ.Ev0!mU[ m%渵Lˉ8nHW>6No0cn(A:X'э{c ?b4C3#3}/wWeyǺ*i6j* m6n>1 Mh#LTۚRDJ|}iEإ%+hO[{ 8] 5Ѡa}Pdrf!uɖH+s[gsI,فU֓vȶMTE1{3ɂJUbD >)/90%tՉ]Ch)Z3+5U2R5r/Uįc^ϯ *ԥ]=:V٫6&7 :<-r/Ǫ8F6yvRsQhGtr1mtRy*π'99$fS? fl"#e;fdL%/ UldJZ7Pwם-DPùJ* ft::oy"1A^J_xM3T>TG=IH/ᮖf'd'8j`-N oJ1P^]ث+|yx|$c T,h@a&{VdZb D7zw=`} k3ׯ\o<DM!Ep6.Үh5%BbL &^V_s`)M~OaRIq\  )\A?xT9 *17ڬ\8UΣ/ fÄ?C] kx@ PSN1YŮ./|e;1a|ߝYE/kCɘj ,tSrTTq h0kd}oɇ Q Ei34YNn_Z3hv`Q\ [zTXH;^IH7`߮im+bYn4Mry71lH*/0B@*iO =٫qxnh!%ÅwEb rhDT:N6M qTe5R8;w^$@ WnJX[ l~`AتcZҧRL;y<'?|#iDXtuK/tF/f/=UX :uz'B+?ݯUwJŗk8+ޢ`*<rT zKUMqppdE0v͊GRùs;#F=*R+KÂqQKM ޘ\yN~y"CaF,.!H[ &KS"^qCw-3WloLo``H?dNjSPLFXP@w> %u3dw'>`LCl %%ZDhbCTM+Hfu:I6q7w\S;i$Z]xD44rVn?R Yʛ{ta2t 4O%};l- u"˱F} `8 Z-˫h o͛{bh‡dm?Vٶ7 f2iBi6v "I(m"Zn AsK%P/e^lErퟚT"v1F:CAGDsPЅ`dnV1e(pF] 6D?RnCMv0'=?3q:aٟfTyqA\S,IQ&5 U +~%!P\qCd٫ؖ,☂KpMq?GsŝTKG>N|Q]HP$&5*e>J!=Op*`b̊FtfW`=RpN>[ C%61R0-$K{$S|\ŝXѹ:fM̗6йr|T~ۂ#6Qj$C27_<֥:DΎOCvr|$Hs1%~]fVx, h^0(4Z$*4Wfm;3 PJC}E^?+ni 6Tx?L:ӏi>CWYN0bq/w[8n星9w k~w=8VoQkPijg o5|}gN7eHJt=_d|a`@3PǭM5ݢY\]1C ƏJ-#i`7L}~Ǜρ#lCwI9wYuimm㜀|qGռOksj_ܝûԅ-^blHQk{-ʴ': @d}lJ2 |{jV!6]RXSTmMUFێ3> ,#WFUijByA !붜)h"/ }%cAͯ;-@D]-̼9Ml{ Hw{Js"׮וG4Din14fK/=$ri)!Ë[di\(D EUg[\l \ՐGBQnpA(Pjɐp-gi^KV^[ BV^ɂwAjwmn̺gca,y!cYIoWE+H0xz[=%8|AŘ[TWwsL!InEUZ>Pٻ͌JwǼt}&O~bҢE<*p!XJNe ,yVr"Ga{2{'1%)\+y~d.!zb<[cYo&pusNrvEݹZ)kWN|譋K^)*->Es+bStzo5ׅB) XE ^*#Ee66x=?e4YJsif&K_w7yf/4EƯ 9PH*\kU_[1P5!*SeEf+Kre HW^h'O] 1c!9F X֣9>a ES F/-Cqc>XZ D S죎F3ݦ2tFxӎ7}## '-!g bք7,\ҁ`#0%3DVI0!qM݅ob:_Wv-)RYpk$䌄s5+ICV?2.T0! [POT^\44V["~ Z5 K!cvf&s֫mrUkݥVQrџveC] wK|Js}_Z"O}/pJxPjk[3^h\ e]`Dq (|Xpu}dh<8utFYr4%TT]I( E 6qP#v_ ,Ғb|NS'v?T&_"E}SUv*;1B>Dƨ%{a!ꜹS?~7^ݳ./ L˥UüX?HchҡC)q%wlvx9Pv6V*bOMzq_-tt,luI㾘zy\ ڵe^O 1#T0&(<Ӎq䩫d)bE2[d=\^ZPΧlYfuHM?Pt+Mg |ztTQ`lR <$|}丧MSD(kiSx Fдf%YcL1XȂ)/[S @#.;B Lqėo}$Dk T-D\}KOn{A;Sa+_먍u vdҷD@$#@љ[ydbTb@!=<- qX>ri YӀKW`uFg?k+CE3!4Q6< @%$ ؛eDe*|Jh/Wޞ2wwdmT ۂ-nd;~-!(!*쎋{j kwCs1 %|'p܀Ijdpoe̶U2:ď&Fn*纅O ߻gFE|s+as6̭)*Ԝo6>Pq8` Q`# '܋cC1eZ<`f|睎%\z5bu*t X +nPp*)c:=ZAĶ~z]ݱT:|[,+]DhzN' jl0 =W_/w:ւl]u yF^w)QEƇIw"fʾ-NQ, 0XggyϹxjck )k{yX:BSJ'_쟻6XTjr]nT^!q{UNP/#_V>/qͻz !3 Ŋ987c–muzrK].Llmҗvm~M759dm])yym#lf 6@!e.=ʹ>"[VfwNAB;ґҟ[TpoGe(>dHN.\vC+5S9Ca(k%iaʞ,1m ^徭5(K GS0&2\}3-ܨ8fAc>A2?ExX#yi8(O1IfA_|/V'A3s|Lq:!M}{e(ei#W,tFI i! Px.V%0q)GxOä0ʡs AcHolAfkjg)FXT%cLyP`Ԥuk v4ޗM`j?:L()_FȬhi%f;7 +cE1պ+C0.c9svw> xM$sA]bժDQ(:Mdāi:CmuV+s$EI֕K"GgYصBX:Tr JX.daO&z{|xˀrpH+ѡ/Lf 5]"6.:؟C  <<V +̈́?(B2ĕ1S.~(uܙd(5Λc v32{ɐ 7$);$0wNKQn;vI<"ػcT*lñy4-\} j v֊Q{I2 kv?A=ӏqٓЯb?iAcoYHߏxӺYR~@ߜ,Z{]=H!z3!j"LVpS8}⤬}pzYj65a$OFm@<$l&k-拫/h> Sf-VG"OkAP~oW < }'TxF&Gm❎ axuO*?-Hz`- .P,tjezll:I$AX7@($p:Sm[x%|!2X5.wi]Ot J2NoTIvwt|tmVr*ĉ<=5%/fYpw讧x#Z D On lypF@f4T~qbRc6oK`?S:Gt/sk[^UbN덛Tg)ʮtZp(m [J[GF[)q-ggw8@*/26j㐢}&O~Ԅf5/ЃY )֢nH\:9Sv߇CmRyAVlٿi ,_icMMR<A=U ~p}O5>ڟmcc&+X[r/^$$ҩ me|yjI'Y᱅P5:.#T\g `d|[|b%bѐVHN»|:F8㦒ʙB=bcb/lq}>ٱC;pYUYGhkX2%C&҄䶽Џ1\FhWJEz'O*:Ό5/8#]pj1eC,wG@钎džΛ}l ::X(6QH͊J;xsl5E/~?]>iDhU~ڿlc oQ%S73AiV7"adJ@5Ax/`n͊Nj'd|hdi=i:@9"߳"fNRiϢ&%^PGyR YNbD${9WpXq}Gpwl÷\a"VF+&r>pT$\E^ȗ \Nr\W1ˆqɾ}.ȷYf& n&\a9]ԫ+7nA"daKb)r"ddWaƧ2 G#..\GktCE.BvG"yQZ/2vy UrF 9xqf_&9)YP!U֞ɐtroasGLZ94D6D5s(?uOQ.#Xr@>|+-'&,5@Ix^kVY3}9C0Ǭ2a.Ra҈;W(ۃ ^}0] ]RޠbXUeEz 7~!xvFE-Pw 2}R5І2[{tO m%;~bz{@ vZ.lf~䏞7'RhWX\t/ln61(+ݝw-9<'A\%s_ ϳ'c4lzqԤiv6,V>ʚY4O%+߰>i3Ijߨ/vc`pj^=* +h@ޢܩe={;S7LדђӏJc3tX{N}?RT>Bl߮^.0{}-]Bvw⑲{4kp1Z'#xeJ@Хmf}] V~E.#T!^diLEoPFbۧ^<4P貀bӊdrm1 0t(RGjb :" @d85u.-|-jb@b4գ:;6sŘ;22 rWNdM/G[E-i!pk0D钮 vZW% L]*m.F*ČZ?Zvo~j`{~EV4̠w9ꬾ&c (QlPtݞ7[tF[zݶVGh 8ykv )u!WշN7aBg %Y(}B8"!lBW^fٸx%0pVVY@7pV1ւmfOdT pDt_&FF Wgѱ._je:%~(yT +M8"P%WY6zsH4"q?lW1`&#Q{ bP{i nԵխAya)//0/*o{mXZQydN؁-`6Lk܏ܴW A{!#m,6@1] YK̮Q(4!l3.nVF2ҹoҦdI1be\8Ҫ |\LwWP)}2FL9b2#/@P\LS {ƢЅ\WWFXd26Ne3Is.\"UD.JQ6o|W1ie|v >04ɯ7 ; ;"&]7Z2 3ll@tь=Uu8GtIܺ]qGQ=Qs2^Sx4c?-lJw'q b\_wEF:cl.,#*G'}|_L-ƖK0<562ٌ J9\wf]h𓫒 2⍸cÚSs3Ԓ_֜PʪSaQKS3z&Ry\a&E]Hax\a$LO$Qt:بTK&# S}uBtCz+9<{3$liIU1\f.8~0s#oj_EX[c<șM *Si% COnf:m,ͺ)ီ7->f3e[0R+chBݓO6jޭnrbr_eZxQ= ?ucf&$ aݧRDZ8AH07kpɎ vc=k :_'b+&d0>9FLZ]|(wodJ'Ԇk/,sXn}"kJgT lH2RMLҽyV:T9X,1X>ppHl kfNڔ.kgo eӤ |˜hhI<\sSaM_3 v+ >j>zex{`_s-K i}!(3P[}*nuu>S* R N"s*5R~〚2G2($.EҊ|L!ӣ @.ԩ|5Z2?C\ EP2֊Ad'_ye;VmJnObtz-n)X)Hh(#FNYL%X hu /qo'm Uݼi:P)S*Ɲodɟ3K=PgFYv nM_ *zyDB?Ԍ:(Jr\@ZMZӻFaaRQ:j:q6x0 MV)!(~5FlΑ 2=KeJG vӻ`!f^ q kx/yvZ#uԌ) X㺧\\,( vk@1)θHns g.;S1(#XCU9e5m1SsRk>W2P=[Z ^7ҏ3k&"%~M#P|@6cgp&7>M37`0uG%g5Phq p$I HʇH٠~!GRdƑ*neL-3\7$l$ܙ:T-mw}|.=S^dEt{Lg\]˵Mek3N bئ{ rOw(i{cɮ)SdDW&ļ ,7AG9B۠+eoQOD:i3! 6v4i !Diֵ4t+wlDj5}$D|S@\ulLAWȺ!aD^̫|d^ [x pZәs3ƎW=lmr|kMO5ftk9X߬H8{%>2yC1N[t] էF&c*F)iC` ]$P VR$@S{&}Fs A\ЛOQ5Om[m~B3:!D;q7ZR1KSE 9V>})Aa=B[Gحf4xrv77 tP9z:' o7qa loi+*[!!g(emށaIaV@˃ʔ Q4[~/ Z~q||FnvO܆SRuzuT\&J++TT0`L7$~_oOQw>v]Q&ہ`k UnG.tNfpe܀N֙ (Iݯ(Fҏ/RS$lHݲ!2ym#ysHްw|aD{4$xP$iHβlAžƯNey(qUwĤȒ eQ2!9'N4 q2} {a̽UbO a(dw0xlkjhN?ݾk;#TmRF _ĩ(*!ET]ZDZIOpj6[Rx5vOIR}1+ػJ=MlqEpӑh^c v*{f e)ԨFJ=+ihi2ܿ4&sHXVp]dND6vz! db+tJ{vȇ_Gҵ2ަAR.3J%IE)~'1|q#ly\7%| 0&PzΚRJsn Vx~{@Hġ^]AL`~GLoן;^XpS\42H(D'V֒2fX hh)og1t䟛T,% F]WHlju)oaU@XI'P,3Ls2ZMSNhfz$M06~5^8Bޫy\Q٪tLLH%/H*lz΢qi|KWLF̻Λ a$`>Жro7*\QB9+F$DU~ZsS*s g7bQs|(5޹%BmqĠ,:X):?S H76-M9-GPVҐ.X{6[)7Z5W1^İa?,q3A80 41!E>d QaVL}. rj( ب^ ;,,ON"?-ӹW"]I BhAOYxQ )//\mwֻwm`L*N>LJmi2TO؍)[483"ĞՅ #UqW?_U>fJ2XbzſwWHo7TI #ō`rׅ_FG1 [ns SH++oauAuBr1=ۍHNG="C3̀'Iף$U Ӓ<ӍӪ?pS@+>vˬatP)dUC͑-&Om [mG#myPZ\'!8 QOGS4W&-)}uF2Q"d4SB>ho*_+Z;6IQGh`:$~5!E .H r )~םE9+zAO.*4^)$ctr5O+G0ˤ(BO3I)X:,Xh+>fI]&PDIMvO1cۣ~o̴-]O⵾>¤J <NWn8NUn66mmѰ_f1fZhOMrMTRsX2BR]l[MYy> ޳rRwv,7iem"Q0i3˩Z b},1H4u(`I-sdTOq|iIx7hMސgS>TG{m1_b@ |87&rޮ gaLUdrE`z ׬ŢФepė<4uS`?:2Hϐildld|0oIgw\"O.!`"ҶC[M &N?k;L'[-nbd6њ^Zrmu*}tUbdh'ry&'=޺hy_Z ȗxEIbVU3)CtS)Bӑx=ihXc!QAi8 HOǘ$wxxs,7MMc:RCc`4m/oL;EIM{X:_D(t>, R*Tv}A^0WT$ףF7lEf3z x1Bx$:9/nb-_ J1$6 N.6^FjT3Md'Hļ]2ɞQt={5t:[Ydk` &u.=KgKLQz j(pI<}~BHs4@H<Ĵt5Z^&4`Ώvrb;Դȁ;/ 4e?O(ҚQ*ƸȜ(,I',r*;C|/Lupx:[ zkNGkU4+ۧ|㲊\XH@q&@8BzI֥N3VhYȲklZx갬i!ڽ3v10^wzTG@K0.x+V|9'.Y3XH^M`]ٙ;]u9-wGe&<'Mk>Ft VXjLgg1*  d6)]"UQ+?92skonywypG"j:@4AW9{c5M'+gs!AORQutB /Efr*O)nh:cz IS`I@02c)*ޮK* A.Ʒ[99k<1yRSyaMLeIUS)X\,Z Jqz [5(jGl!pR{7)EZK *I-gzow5_z-Vx܊PΉ$.Yv.Fw8zd&_d¼K280MD2Ɔ4ݿyG8O52#-VS%w|s0c/ĘI{9nAP}":v(iwy?d:UMTVk@`!'"ɐ~m9M5TڮjMf>&HcW^"})V6_r/25Qc1Mбj#Bt{. 1Q۱Qj0 wM9TZHfbϼ- %iè0e;AOQ{}xڋ&ΉKN(phs ˴ MsGz6+r ES*,*6|['u .um~Bh27yK KdTY68p!Y^6I2oMߞXCd=u&:A4/FDoWgt@ʷj\4BNd';w 9Y!r9Qoj҄+cu35Fs4}PBo[?-fV9rM+( ]eau.0$l]Cl.\1@a /簌I|pzZ@˜|բ~pul xh,]Uaspӣ/_&JXG5[3iGaGMfx#ߢ+d纮0W|R3hnoӣd [L%Mߧ.i*F\ :j]\!_;&*uNx-Ɍax ,Ī.3UyнQƑ@LUww/MkJR2qvs CA1ܤ} 񝤦DWzKf^F[>0Xզ_9=VϾ0W 2[+c͋3v]]mmߛxNTADpԊ T>[rNpJ)%x TY]ۡ=FP+ d.az QAdl[Kg2rK{h39WIlciSXgU' T* 7ku;]-b#CS|4HBmq}/M{WwzrUˉ`>o)72B+Qyn-9(V_ן ' U O|ZV, d9,|{˭Nyjvj.n{ee<Մ1"4ØFp@)G|ޟrao=OxW <r*9"0+I8o FdЬ-nưn=j)=f]>Z lOx3஦ '[ `P3/g5cy< pXƫP[盿5nE  B*Mo2#)CqgdzёQ1LX%y3Ƈovc7ٕYֈݏy@id\AS-OrNS. P- LNl_y܈b+#GV.^wW>Sp$geqoAڊI_M#{C?\e޼T6pT B\޵ǎ \ trLf~|v7$S V.>{S9]qzC⺷TiPhs}akK~|-M% 4#Fx TzqzY/kS!4]0,(= :mȍ* &cgoN-$3Q/df2+NM\A?xrXȶ4D<{IX#5)3_ȺҨl6NY*{;TvE92kgBL+»5ף  !o5|{1t&Nz$M-fXp4#A#p8csampoL}Bt{zPi!R*'c~ %=bC?MhfGqiM/yԌgyTaBb igIr8~}K^\b:@b~wy$ƒzTF'7˷p:jG4O-~Uq%uҽ3bݙ%\ #xW+\"*= ù#55)ۣ3Sq1ݯ㖏_L/a Ά 5.rc~9~I*J ?#/??-]}h)Z ,5 NL@a`WE 5Ct:,Y70"_GDv ?FHd³6Hx=S^ B?WK_N$ɋWDy^hK&U4EK*~f!Oi^nNO|b3eFȩst2!nݛ8&Oxmf2wiUG7W9-kb-eT)n-Κluf u3 և a'.;h~`W6)ÑH!UT=^h^`WRy 8]=~ۋuP7/9>㺅{#eQ6SVDz;@ -^3n.FO4i1GefИ5iZļq'8RdOGȢdSe~dE`-U^s5ωfvc䕠 Zi_-+ilTRHc>LO=|{a~x.ΡșJ'R宺 9^Kڄe)ˣot!=5 .*`S-΢:Oap^Vƴ^0Yu9^/T̐y8a^Q,X(C0Fҕ˨f>PAVk^302nϦxdNz{A>dLZ/!D\GE~d`_yp* +Exxnv)͆5mWTFG:e1 w 5ȝds/ԑʃXj8 <^ v%ӄAPo_Ӧ4wwCbIOT'8=[]~}?~Iϵ\4ti_Ei63B(81Vb(~|:g#qQOt]W7eBJr4E/bXqFD9xǬC0Xe4G#Kac !?'_bS*'a僘 Ω{cA+lw':R3X='̈́sמH RoŇi ;&ԲKb759+N\h/_<nG#%9$gipA7WGKu}_ŏT>t >tGd]Dn-'ْ@z ^ T u['ͽm/?a\ԏU3nYKx ZZ5/s_t,JyAS.ׁg4_|\yO}b'?G\;Yb*,P,YzӢ(jNw(mAkzF^ )?WT뛟~ƭphs@X l>HJɋzՉ`ԍ% u䨵[~F 7;/=UsY.Umqa ߭N*N-@]iSIzm*|!N5H䥾uQ)j`YD6=oek^f?",BAt 37 E}#9)pJ=~5w|c+pT'1rZgI{v$0A(܌n Ei&dET0Ő4i8ssGoSŏ^ɧ~]g+Qsv6 ;*q#M1˙VrI'_g*>fPh Ho'|}_LMdD bNBpXm̴$&il 8+eKǪWe4/;6 KZϗɣtCpÆHW^3*Twcf1}VD*MnΌQئeZz`'vtـ4~~8Q]̄b Dx"~FP+2C)2q2+W&8z ƎOhiģi#5Oqq3ds_+sfZ C/Et@c-UZF+TMEq ~?%LLluzų~STlt(X|$be3YR `v֞Ik$m[G6p,7uq_zɬy~p0W:+-,a5KOtcly@"\kŠ TR}*!W!?aro&Cv|eL hIGCh} ;<`-u!9F8%2Q\Muo(%?xp$q! x,TpZ0jxG>Wsa}QaQl fJ/46ڼ6Se:w+{e1#l[lIx/ĥ=(DˬkC-;0&e 9)"et-?t5+фSe {?8ґS7m6 Q\9@QϢ%W~1|ta !n3pv"rXڬ10CB 5C'n}8QT}qݴk/)uV"].G)Mv]X-]ZT^*\=*Dqq[MVf~@\†[:϶(`E牴K00AG$%3Ps:lOoȸ\ Hqx@^n)KJZq._!Ǜ{ p1""讀 ـks'3u dgw%8fEP40k83 ɉ$?piyƫ34h[MK%o}2D}-vڕRTB87H=4U4wW{X`UݏYta1+BONBT(yU.n5$AZvn,WoW]`m{60GNP^~݉Ή$bi48Rm`۟2m=ޠP~JEuI!VwjD|rZsS)\~[p&x*>^kѰBQri7!=+8 f$g/Ac3@!O z0~Ѐ<7Z86(?ڀ_*#2)t:}N96PycG0Ae]4Wna0݂c[!μ#>a?8o6<]C aIv> r#NAਂbWu:Q1uڽPܹF|zpgqjE QTU0d5BG{+͇D8%Ae97-AiWfl{ Z㝊sUإbeJ5nf&Ia=ӫn"[YkjF#)zO+ #t voWaDM9P=ދzR)'xNg]g sz1R^1aiB@|,XhW5UЎGc.x'#ߔ" %To ,??,M>??4Z)?{ikpMkОֲ?H<Z|S)ՍG;y8+<[:3k1W.,3;RP8H֯іNѕ%di}j??p^~ Dd'L6%_ս}+Aa- }2GkҬ5VYH%^$+~}IzԪ(N4L&6ooh=K%.ߍf%aRO_tɍ.!O46+8,!!e UU?8̧?wKOS& PJ5n GkaO}P7/OvO1) @!JvSe[iNVUyjwo(Ŷ ΠEYQȱby=Yi(N#OA#MC]o{A#(c {GR/J`eI'*%;u9iNs޳4_FT/ x!]c l/@R#{00* 7tWHO4]<=ym@-1B?fv'-곲?oܷ$ D.ZKxաӛY+Pb1:k[tzzGZuΫJ%zA,[gZ~{dx,,8xEe-hv +Yw? B]]_W.Ha<$pSabh3}=L2Yez:Hu5 r Vxj9[,̗%:/1eoSe&-Ò=AR\xD_;w3+da$/K3{!/RAQ">+2gwFIE\/ۧg#aF0Nz6:UM +tކK(ckipbt3\Q}9eӣMT7]bJC,1${9:8˧/ʿsrkЅB,.r$.b*QL;Ag-FuF--} g֥ᘾjXzES+׽m-w$vjEOږ~i-voxmc櫶4{I3CiCQ*! k#JWal8A%+do]H%fBPrg+j܀BqB /KjD%ClFxaNwfU*R@„R&tM#gtMrDEY<#s+YJ{&AZ/g v|vRz7 e} 'thrtWb 73Z-;Sєh3uLw- ,bI$4Juˊԏb=CT^ 3\ʨw-=irL8b@; r_灆vО1,*|p+~? ]^i t@߈};~$fboԯc VI32Q繠;pf~X\RGLM*A.ΐvZ ':cɽ2X꫐VUBq|>Bvs (GC-~r=ڭy$Fi7> aan1%uX?$Qσä݀o Kc2z-XMי$B1G-JG!͋ѫ_S+,{ /ǙYd%uz=ja@i&N߆,Jy-NH/id yǷF\3lp҆ΟNo։t([osТQ5E] -J&A.z _zZ7=".(|:Mɿ:hXT?ƙȤ1+ +Kk;G]hfGZ,w :EJP1JAKB,)* ס6|m L(x@ 9jFĽݶQ5cBob]fh'h-U#edDG%"l6l]AP!GrD,gK?[K~];"fAaD4]@$'JD4O$3Ba 1 EqHi_dՀTDtD߰wg(ҴX7J1*})0:E@{Y~}0jcWb,T ͷo*@&o3;FjiLZ H.o 9KX O.^+W+&fy ea*{ KOFhXB8gΡ4ar)J3ݲ䐔|V ap $Q5~my`+zVF;kw>B)R(P!9d/] 82G4& m"@kIe 5<4J\=\sD=o ]n`=bt*>< 㛙'5t l[w[G}AgftK6/nAULcFL[^b6wt*,:jVWxp&< ;a"B6w G]Ą f(~)Bӏ Fc39!eeF9vM+iS n6Ip{i'̳[j_PU7S[ZV달X]g Hd1_ӈlAEv`CsA$3foT7WQŋQ\<> `T_s\z[-ٴ_Dg;W*ՙӝk~>.VR3yFs+P|Uyw7/܂}*صĤýiM(qm#@4E#s|PGo Ч=6Y̠RIz_ªTi*VPOYw*-\bh?z%N>3;Oo-O5D\@Ma q\X! ,~9짓ԣ+H,Hu0[~瀹tBbjބKɑU25 %_C㌼iSJxS﬙؇Mr#0f[`P :# f6ok^E^5єu먷*kf(V5ºqhm GUMz~u@Y t{Lы(,O\|@(E;S?`+l_xh ª,Xoq M^I#MG}QY澓Q!lI<MUS9b Z JZq&.8H*m!R|ol)|† I'L%!?a>QH`/Ȣevzjc:YݷRJ4saVhƶ){l\ -{#Oal k(zfuF~kʚ(h xFޡ~;'ã_AM,uBH< m-Oեz_ZcM,rNj ?VM}F<۵C3!x<4E.t8VqYي5֙oG %̑}jU¶_yǂl~Z [cX2}w얣F`pViX52P]+|BCP \vgv'յ,0V?m6^i.A"1j:kM{+ mb1_US]5y5gF-rcÅ~dp<%ыO{2$0ǟj'$K-_A㭰F@3-N$ W.-ϥZɶB LRx~I[*XG̾?o VO5 F{GVrM0&{?l\<:=3\VKߌ10&! iE܅/;Yi4h,1o~Bs=oMOMT쓽OV] Đld"˒iFeEY?v53OwFz[UhKnAևDlw+bjOȐbr%v -])7$GR3<3S:ٰ4o4? a;dYJ :BLxuDZv os#ȊXoߤ2M8ti$iAR:XU^y>70w&3mɇ!ͥ5a;_0h"XIfVOOBoL)RsdW+]"Y\* dV9$I)qb0[:lNaۣ31'3eDzX|o?hOZceA! D{!U5дذHWqq晇w* +$s Fjs"Npu%q 0;TN Cs-R|%44ثO+8p>Ai*Q08WS!Nj*Do|K[l Cȱ MW;cl` 3=oi(23T`,Nt^ t E)FGG;\ kd"0;\*.B4e?jՁirx_fC΅9x`tdndx _ӐE@LF8S<JyR!`4*")~׋Ez?EUoJFm5@X>\]YqqF?o ruԂ ŌIiAgη`b.PeZ²;Ʋ7=z(}B}0#!d͌ߨRU& f¼z%q-78lr0&dd{ N%|!#lC7Jv89%֔cWa\FkK7qt)5nsd+BqXb]T-# gi jఁ[;3-A,S.\k55 /Kx(C&тVLwJ͞Ѧ莨ߝBhIM7?Ci*I̮oeMNWyǀKOCAH8O qq:`3k#V⦧u7t*Mh51"0 {',ε)G!d{Zi6qڧQj6fHRXHY^:b ;Ʒ]]Ro@Rڼ%HEFNmҕR^6uc0[W! UBF.QTnכ56BǙ /=8-(qi*ճUf*r=|F'b5T』Q z਌g˭6"A-x'.h;SV7tBM UA]4;A#JF6?NJ3.#a0&xU^U#!<{*=:TbElXϲT]хD+ёh|8yxC6x55y JN*}:y$汏|h'ḧkzQD>X#exBv*6} ,+M#F~ AhO {){7ab35x> *;kEx\ N,bw VC3q_ Mr^ ;dq#ϐEដ=Ń:)018L])-E,d[H#dߑޝJ x@F9!W}፳JZv٪z?p5uRܐ|B^&rlXq#{ ܫa^p Y,I7?RK8&k2PnPk޻#WtXGXe/pa0϶җ]/8`tCg6 ln h抆U' X0CIL[~dͥ#DjxȨ^E /PfP]3hK4>^uӯTݮbze~ˊ@e^ތӤ2˨C~g(XI9Re-#35$;¸'#Gh9W4᥹UqV' qM[Yx&#s6oF5:3%h¼_V, %JAfMt X5Z!/Ju1-yE0@Tjۮcǽl͕H~7َ6M@ɼ` lu9.@S}^r I ?T:mDS\db+ j?ϐT8Td1hP0:w2ε5w2|@:a, DoǙ'Y NR?0ofO`u C:':`ʃ8C%v{eR6:MpG  *݇ji-]6Ӛ(zvLUM6GPKjA :NM*j!Aڷ[OZ3)O @]<gPa\En+A'l.qc!49"1y&p/n}2Q<?DChm"<4L's$uݘd0)ΝI>qh00 cwN Oe\"VK[bѝRۜ;x3~d Ɠ%0$nC`(p_R_+l"F Ss&y keGPPY.c=҂Gy, ¶YZjb_07%`V/@;9*SD5V`;-63 _t?:<%F nc=҈8ִֶtЕOa̶r^gl^9UGMܜ.k[BjјL-%㒧\[_*pdVE[z,\viό)v3$_O2,;(n "+M L7 /L۩_!O%ӿSebIPMҭxcdߓ7X8>TmXP55._ҷ(yms$ʲ3HPx&(O^ U3˺" ,`[z߉@\/#U&7NЦwR57W:nzce.JQ4ghe.g崓v/ š <6ܲU Ƀ K2j]<\N×7ywԎ=p<{eY xF+~ sjMw!;~ރOG'lz ^>OI@Y=ȃ޼U?z}ntKW}5t(ߠmug;PBsUitO&NȆcbWP@ڻ* ,#YmՕnիAN;ODZִ+#ϯB)؛c~[2udHEAĭXͻ;qxjC|[AcS}upG@c@Q8n*#7{P\}ސk'Hd)_CĔ6Z{!kzHnfJ5k=S3-k:a(m64$m{GZ?´=)ղ _>tTR\L< H·ٽJ.bCZKڍUV޺@A%&"mODآzւj I cTW>Gٕ6ؾL)/i4bpGFi0߿wh|75/CX݋/~eMe[*=zn5E%o|kڄ: C.h8[WZCd$cowf}?z7=]6PW006*tfybh6$Nkqs⭒IP> :}▰0x9dQJ_1n>TT%p,EsK*Yz)DԱvqOSyYv&GOtS!Mg\&Oe&@I/PEѽ4ktGYDGKj,+-䘟<{Fj&IxlP-M6jɍz'jz$DHБ±u kMc eiHӷ+Js,*H*b6?m ) ʦ.BLjjwy,3lRǮAi1. 窄rD`[3R8X=0*#7jKNuEo쒻>k*C686u^['_55j=.LmCB`F,sb+%4bӾ>[IVq5^C$2$Ή9X}Q{ē@h{mN}5Yޥ^1<[*}CyK٪F N$,پE@{?nU*oyə'q P )[q0%XxD4P\bvKhLAp3}$N}=0ys>wdt{*<6YcgH`'nJ]dG]K[{qQoH[<u~&E'ҐPk؊'_jxUIT M.iߣs$g|~I7{O7< ByYq,l'OU\UI_HX3Jz#њe̵ܨ# BJD b}E4lc sLPv&aF*/eX7!ژR )m5"B4'WI"GF3T9:w]߁ EJŧ/<ɇ%C;2p44C/ѲqyYr#EmR?cc|q­VO`ο`߮q#09*/5L@*뙗L_Сe:l)72q&f]&0~i7ct3x 6R-=䣍s9C}%@Z l7'MS`_ 1g'–1ϰ\N*hZM|(c`&pakE_@}Vk  cn.Mn'+حw:m_Y,u˔o b (9槪w `>wki{9x=njH Yh2R9?nb/ݨ/V47/݌p4;ɇzG ;?Jw§I"ANFAMh\T4^e#>߅l{\VQ&:I3l,.YT"^aR, 5pm)?~Jϓ0 <~wj֐\<,;SpgpSSA4nW?ڟ?ygGc =@Vo% >SDg98x'040ɴ%+WWo{f j=M/USh\@Hg艓! °(35LoJt }[vRhEC GѶ>>ňysSjpsDL'_ O"{4MbZla' 2ɕŶ${)Վ4ˆC+C8WDZ|? f΂x4{<-[|d(5rMHȚN3ׯ[ruy įoalM{`X'촺 ﻾|=$Zr:d]kxL˫D%\f=8/aw峆UOV^H}RЦfSO6JE>՚xL(tnvڐֹՅ(=g#*mEfPLg0arjպ%^p}nH^Y œw(dnWÎ A YgB }p]gR7T%rpkiOkڝ-ϕ3+ץʼnZf2oAH,E~cWtxpDwRǹyKeA_)W74(ղxr}1(D)9lIFe+gr!͵=3=4ĵmnR?ԗ~"GȀڏ'v 5lNtf= 2;y$T7*_ʶ}4#,;C>ɖ+m%_`@j@,ZMIM6e}_ߘ&&} =u{TĿ I]]*0)J:bK᷎*eY ?Jڋ+az5&>@8<ȸ%cA`3;ʕXB>ES8L?ӭ\qؑ;[:fĨ+.qO[Lwq ,lFJ7WG$%xzܹ=?IAofXn"sI7WܱE)fDp;W#HD5I{-^BvrFٴˉ4 $[ѸW0IPn`iYe)9_,WLʠ)?u;0s?۩1NbSmX3`~K*e4̙9|yUײAV$Ȓހ03#yɵǩX a0,\f 3~Z]%Ѻ[Wjs<)nrzʩGQ.WX*sOڸ"Ƃ ɞe]b'iYݙE73 |eqh0սRl;Ў3GO>CkKW/Du2Fn+"q,P9VESFV@%G`6 p=|od!S1FЌǃ7eBFF{-e#34 )9CSy|]τ9/" g8/>$-'#OXUpd^%[v0䝤ίO\81 UQ mœ^BkA+rV2V¥o~*LIX7/ߒ~t7"9jϵ'|(QGQ )CWU/YqtE2+CB#0vWF }͎ gݕd=N=Hl`ɂN鶶e,Ȱ:g}Alݹ09f8>ZA|3ެWwNW>.7$x~1k'IIQI&kd{+eWɗ9xtL" hVKNV6|fh.qƮGe e mkƊcSx7sFk"U,?Wa5cOQ~;/סuR]Pò3ϻ"v\mI$yxQ3*+72W?gRۏdTYt1II }Z}r\r i$6Ix`5ݤQP-ًЀ7)[*02-Z|pu%2-P)yv囍מDuIMM.&|\9ڍzXew7~P+AY-pQ8X^fwFL P;(=S}Jy DEy/풣Gך|G`v3'^(3oiaa\fwŷu=F قXkT(*XŬj۪#_z6_Q]̎$ NJ-Y$&3,cPg Ze*=rfld6`%{)%XDm7ShKCfC8%Dmf;k!HHN8^p$) RMJ6&ۆVN7Ma ghF0G ԧ;Ҹ-5LlJiQv⭔ .sGD7DZ-H<1QG:1sxK6ڷ=%Ƃ@ʥl4dBV!FInlʴTO$9J{R\<> =kdDL(ҧx_`Ӥ +P; 7* %Ęc}OYoO{b=y#}xIiRG8_ֺ;57Ό "YuAs,gJhϏgEJX 4OXW!gWTK@.)%cϹ#1euab'#.tT9ߖTTWfLn'?(Ĥ=ǫ>DX ؎H0p:4wtv 7e$:@ѧg)swHO!2JcTHAo v> 񷯦Qă Fe#אЅ;VuN@(}4S&M]Z~kE6 ٮso~!9.i1g>DNEaB2`lC4Hꖻ<F,fsLc4*d")vŨ~{ KJR+Z'QED~1UZwVBNͅ+"XŨ%D̅4Ȋ,`u`xL7bG#OͮoD[(gc64"8}Х[v\Ln6;Y36䞚3M9z:~UV@r'MX$g]1{̦ 67~.OMt${U@3@#dj':CTxp&# Yv)ĭkhKl'XoP~R$ VOM Bviq.T$pθ% +UgH&h=8O%R]CC(9'ԁ4>#)|4zĄR0)>|G_jLQ=@8qXXUa5I܆pJ.%ڲ &;kBaGÕlu+)ʗ<xIܻ=B.y IXKrlpTߖ_Bi #ݱNDg6 ) bd}h }>WUx1 /voIfP*cy5<|Ob:yc@"IM҅Eq"]WBso <$D/d jښZqcZŅ ˎmӂ}aWc~EOV- a JyEϜn!0iH~h-3 -G!M3wJ뱫h-9m.m5e_K7 i#[Rܪڻƨ(p_QZV:6TyyNsO89iXF+[,)([m4]{tD@"7gL;J,_n+>|/DQ㤣x?O3D$ W;Gw ]B~AQ_g+ga#b?MiFS$Bqkh3J V, o*ԘrɌ:PԿuJ JYNkɖ$#Ґ\pw~ DG;T~,>#%z_S}*`z^\qt$l$/f}q3Bfb cF6N`b|) "-&'Phmy(2/ vXp=KTҍ"Y9RVR# v=Ћ]K[xS}+ BaH/9+X.JݐBEJCSEj #bz1-XK/۱А?|Olئ5s)f&c1$I]j\!nj/qζB;0z:ު[[a.rQpx#)iF _ڊj(²A`m݃'o2,z}ۀq=In.8Ҿ8uH50ohH/?CG>2tJA Lm g"jxʷ$p;4 zmYl@4ѴA2"\Mۥ&u8((u+O`%ቿ<i4fmXrMl[Unu߿V?",QCbJjjz65N*8qsۮ$P%pFh_hi0>DTPnN?~vZSey6 +ͩIi 21s8,oQ|Fqv5_ =@RVj0jBqx +| G\Z8y@:,=O뵐2|ï*Y yHw;N}.m]xX`]Aס%I {Q$׍. &e\ 9 %$oga=w}2PCq'GړZR͍Q"aRFi3+Tulk;vמH<(~R*"<.X^l_2t ?rKAA(` \:t φ M{"qHnTuU"CAriaBy>)]PEԈ;:Zp}vja8#;.ϾM&'W rܶ&O??,F%eWcxZ9^(40KLt$qɟ^2'#n3Dgc_Y+TN m*6ND}d}%mre=_rc;g|bem2clmQ:00ʙe>/pm?e|TO.5['*lE%0"b3.T0pA#܋JzjcPځE;PAQ[JP-q/$ lB[Zh{RRDq8i^.Ɨ^`[ՑM5GO^QNΘ;bk-J+]Bi %TYJ/^z<=+jɁ})I~`_GP2؎*%av(,6Bs16عy͐KK0~]f3of4mAa +Ͽ~L;8cNG$)T:tLJ}4Ql\?iU1vVf,e"%Խq aڜ.o%0~)Z> eHYdLzT{Enӈ[u?[s4DNv/K*<>9ɾ>/PƘ&! Rn_Ϋ$CL 7 ǜ!+ƒI˽/~H={Pj{ u'JE|2z؍qT'Ո[1tq?; 0C$GuF9i*'ͫQQKYh}a~GK:gYhU,'z,~,ƒNv22j`ё/I̫xJقxs1ܡT2x{9l#4_%9Pk5Is v;' tƻ9C)@ -}t^K;mK~δ5}B8L<^4h>Pz7I1z;70N{(/o2+zj#:ZѪ>&Lq&vì(ql4$Qn}<.@ݟxAL#YrW4 @^ L.!}ps8w.8c{f-9x9g X'pJ9 C:i,KhXUD:JjnˡM'K&ɤ{o+&Il@ƌa$/!=AͶunw>TlOނ\vؙ<z1u!46llx<q16ωL}!gq*k-Q ĘM1f<=:Ro1d Bu/]e,~0ɔ,́2r{u^45|%iH)BJ˚v]h{?`,P``ue V2pϥN6ٖxK9J9Do2HC.wzpvf2lS:D`g˕ 7qD$ +)#10J F2& wi$)jSC&~(+yTw\KB#t#S+MswLKGe?X('xFr18\+o$GٱkdѤۧlUL K wtSrɽC. -9h%ƔUʥ:H.ޗ Hv_*-mD> .fFf*9'ajSܸLWLfl1h.G6sw;^@d^.E^.hԚxz,yTjO2['۹vvQƗ)*2TQ@)f8= '29hRAUkf/.Z {@H'@wE W3MTǔ\,YȺͬ/"h/A!?6 W5c/J,Q?Z"AOlڪ;5lY BuI(A9 v +eJy|{q]sԟj#GOhJY2V59UHd5`OswQ^CD<6h9b|8f\}{1HDAUWʤ,Lץ q*X#v9`/HJrr6Wfsag Qs`=yE% E'z6<*~TWSl|I D>pbI0OPJ&FXen392{϶-fr&=;CpDcu'ʪ>,5/aQ6~h8,at!JD.ӹ3rBU:4n|.bX]2P֮&z!k3Y\PE_ ;b(lgZ몞tꣂ ?OW47|Vk6AmMT[8ҏbHI_1>_lZY+p,~rΨP,`ݚa=#{EgHGՄOsq:|az$N~uTTCݞ7湝6~fu% R[sc5e|Ru|A;!'%mre/(Լ.W&Q+^"pGM%,U3r˒5h'GoZ!/Ғ=+G=pp&=[Qd^ܪ,{ҾEPg; 0aum^!|)cKDh`}TM/+h𘰥j&qv& .򧝂UF<|JD'_}ZU0%Hx%o/-5 y2'7q qWV>Sd|ՠ~H@H'uG[Ǟe]4 GM<H59@$.dm <s` yW]Sez-bBSd4/ώD8cBiQ#}}5P3!HLy):U*8(wPjuߣ$8DTc4{b/USѿDUYp!Fm&4궧{_zH<⊝@batwt2(VuRՊ;`&af V}a$9T=L|kI[DJO4Yr86&\u!KN6OYȅZVƓzMh+v]g0+UA4O^l'ɸjT C3NƝ }2sf*+hU'BbSwD9m)sNLQz?k航όbhp[:g }B9>pZ]U>F4H8*N YOڧ14zO |4wy(W 7^"Ƃsҧ21 'DCW_ nilzVv1܏vl M,Wi)/-(v#L7Lfldc>-+={ue~#~z" B4*[1P )X6WD?`Rꯔ nyKE>(Ö1%cNn RRE}&#(ܧK6fe$,# x}Aem'Gw7ff2Xқ!e*JKa$[qI'8uD+o%IL5HSS/kG)(XDHg[`>G ִ+=."N^(,OfiרϭR@"wSyYF jd8Ep(9:G"t|$sp\8*1ePE̐ArM`r{}|b߾aCh4e/2Ւ/h>įd źG;*$L2Ḳ+uX tɞ7=_|1jT"A5-'Z-V.:/ٳ̅;jyN1O~RpWğXDx0,`A㊚aK%Ҡ1f6da\쬹^x:yo=X{w@BьnW@u @di6/9gl;`3W )=N o%!w ;%gnS-EdzvW7uJ̈km NdV_ NؤN_MUg7H%@lCc~(n;vJ)-uM)oWCj Zv:"XeR^8Ef3P:3դ/,qd 핳6Pz.ē!` 73c@/ a]8} FM\;͇ar?gbrC$-?#{v@M6u ?#9t27P֣.+ƜjbD栞d5P*$jr?ⴓ>}|?R 2<]:2 =;M\ya24d*iL>E.Ea(ѻga0.b釐wk_bL#p/c8jw4BS]3wL+^ r Hݾ_{ntH.4,?cPpX[?,q no_gg~xS<3^}}6;a{ 7:޶5Ow,Ob zYLT1-N%1x䨝'().eK e0{ RB NZZnyQQ'L!= ./y:[H " @x(T# QOgpIOM8Ϩo,ț~9<2"ĥʉ mZn$Su{ICmg">M_v0z.xep0)qfe,FEF9ZcCk4!T l'딺[R پum'A9KP I,TU=faXJcFXhkuVh8G#H"(f?kd9"睗éOQ&۽"pD w1eKvk9vBoŎG.RMxBéS˶$.a]mY÷w釮Grsd|qM'Lu"iS"MSDL+=T|TI+@79&|_ƞĕruP;4/2B(^4'1)r*eF*{(W8c8՞P*bcudVZ{ #tLb#},Cs%מot# :|=]=cj&vLvKDG6 ~UzwS쪨aGZ0,xd꿮aq q sܬ$puj/:ְ5AQqIA} SLH eg(*Ũܻy "7.]h#JM1x51׮L1_ OCa݊˺J_X$f^;&eDh/i%/6^Qj5tcxL- d)Ji^ {7: E1.)o$r2Vb*SdmZ)3fˆ)a#j͓ݛT oɔ^9xjqs'H8cuNHAbq{4{߁;)C RdcʶH:^y[4 :ʖ p5y Vwj-0iJ1mRB= 1y1,p{EHBC`eNxV! [ =P3͵ʷ}^ir+}n4 ډəUǒfb-~O3x! R$*hA6 qu/-,D`7h|B(t>Sto' BMU`{ e.\񏋌Ah#:;Z=8SPJ 35A#')6W@uq-)&Q?KyX^AZge2C]P_svTiKDpl\PBu&c" ފ6#Ju7OKV* ۘˎqGuEy6%SSUX$! _rCih]N)؀臜t "oQ1Pq3r2)O8Y@d{! f"':;겺L{Gw Ӡ8F1<:~hxs <—f Z~e)&IƒV'{hɈS3U܃C,% D >*pj)A-jr=~#|7Pؙ% d Rd3[Ss?LHEln:@;aSN;}#9# %AeCb[:G/4Bhdm~P ͖l*+7Y[X{7`Sn%Fu SIB,1 O6> (u\*_ߚE0 50 8aDmrɲLN'Cz+P>&G ^>֔#Uy/QR#-Ʒ)XJ3ɎnԩOv떽%A}+50_]E5YLenFM IȻ&"g%%L(?eIO_} h".GnN6ՁҠY|f/C$iVp@#+)齃 ]|/ F%k QNjF6&;j;&@1t7Zd4R.f.cEjR;k Ȭޗv69f(cݢp9Δ!hFjז&?"AsT@-PIÜNpDMWnc*Q g] }e=OF\(ʚOSLØ0X91+ط 0*EQ'^S,'eo|RMY$=kXr"뙥y>D o.kbi2N͆(eSzu1<])5Bj#yXE+q5uz U@UzL4Ro%)mH0c9 m R77U@ϋLlF+Ҏ1tZY0$!@2mn{&RivoWkPٌ?0M_{-~[ 1hu{-x豑-ߥ$jF;s"ӥ6^%JIC;/gw8.0Aj5bWS)Gkr  ϊhE6XE+q g͛=2٘@gslr?S+[w͘VZ.2nԗQa(9{>QnH1hgV,e5D}PXm/osܶC$P%wr ,n1m=V#_dYzZT#۾/$|3yTL3Nl遀8CrouٍF\3~ +S yz3!8^dcHd|춇fgT~pEi9nd'#Ţuv MkI^QJNg3Ľ0y9]#*Q}SBm^`ƴ] ŃBBx&I>l<#ŏgdH1yg|9t/Yj,s>LW U#PZ^ұ+B%, DѶ%no4Qn&@mв |^ʙ6sqvopϢ ZW彅B<uX"j\҃lRϦ0^m=QI ' P/pȍzM(,=U\|lqsDIԺ= }ld"/Pw;bUpTX~_z7`+Ū1r,KJGV$a On*ny6CJڛhse5=m9To#@3U傲_Ƃ%*f~7VF X҃'H$BƜܪ(GA>0L'j-y;γ=V5o8wxtxgnBdE\ y&A S0!5i/cck Z )>_xOF V(~.oqvl`7:#xrB;Ckޖ(MM$]ّZyq jȢ}bP_ C^d_>kzw I '*=~F}h Lxt~F YS,①w+_%F\Cѷ*K'RlɉBm&*_Rccf" sNyC}믈PVaYHv57$!8Q{*wUGa;$oԹ#Zt ĥd,?РzgN}sz2/Ԓ3-, .8=8FïUizFk:U R ׯY:K[y=O}&b>qle/j9R8qYcLS5t" :"v_+ 퓦%%Cp yk ?,$䟌UgћNj^"[`-13gw o0f¢UF\z`J%R p[9.x d=`Awҳ<긴]f\7I,݈8nn]b_sYW?al`SOhy|q,øOVẙIrQ|)|47,'?>$8(s2u[U/hl39W l6 Ň*{]p/". _(KE ]Ԩc1`SN#-hM " A! |7D7BK WXg}(&nkGttvlNF D=>^On!8ŘbXf_BiLN?W붉hI8=Yo@oX'NA}nSWx{"sEqc[xJDowFf0 Ư"aj-| bi̅fSrNЃQc^f8ݑk=uY72 2^k~Ja6]_D}>lO,KL )CxSd6qkMc ~^~I&I^cJI?t`B#TBf+c5V: R jiGﴌϙQmm5s ~e";Ql͛>Sa/V|qxeMWDʞIgt+K($|v`lzHXM[m)L yQpam$*K͍ lU05#D7/J*=x;zUj4- Ɨ  ݥj,C6?4vq-,ݧxJf ~ JCV<0wu٭=u#}Ӝ*2\S[;Ҭj*dp4C<#-']G0}ɘʼiDV:j$>PezfWWYB^øFke+/?wzdiӫD{%do{:Z2T%NuG{Gj4;NUBǣ🊐F[H|WEdJ"f^Ӳ74crdϫ vtt]V7i/'*B'ӋljZ[Um5 Гh֩eB719ή*&I?!6tү B[ʺjt 5[S;@h^"6klA.dWxn= l'SXR̫ F|\D*̾Kj6+T͍>$ZeQݵ.!;$7?ڴوaLcK=7.(d v9øϥ5[Bg"QҸx6f7re$&ɼURR/KFiG~8ImփCl K>M>4yS).n~Rq11NU^ΛVcST W hd*(=¨-LFs]HYʓ-^|,I.ڏ.&H f'_=xoᅉԣ[R1,eKEe]|/>QgN$rQͧu>j0,~~$gMoay sU[B}-q9>0񕪒kZPǮ5Ű+y0iՉɚ=u `)P)!ۓa*̓ {i]b%Y2G+Ýv{hM?+eKV@:`V-v2.}i&wՀCn5e ­Yl`2H!q3tf~:F].-%f2Vb摄;B\h66ҖC s< "gVALu|)8*rg)5 1JıH;%*Ym")G2x(R/}ʼC6z3yT<\imȤ6KnWviD;X:@Sw P9r ѓ}})^i`'52!0<"4^Dyy)~n,nJx6e? #2W{V\*20Uv.{0u?Չ0)c>֘! nv鿧Ȫ(K}(WQ_.TN6 tNg`]/ꀼC{ng$DIVy3@ Չ rWG>hl'Z" Zk]l;g34A˨Gͧ&w&'??xpDwɟҷ$S*︢>4\EnW]J:UEn`SExb~,EM]ܤKLf38k\rGqZv_Ai0@*9q4%GޭٓE2ju>hMBSQn BwH.ć2aY[r;i'CPRqr_X]?Q%O,iope<1&¾'FaJaqpHmR@i^RkeÀczl6,څXeYl+ !`S?vTS,$$;i~ySlƛUH°0pvYlj]J,gaŢ,gjnt[QwN({uyՒuF"x?^r.=ȺvIFdBJr )sf| li3f [O=߂gENZ3V }U?2y?/* Iz5 ޿O6rH)a̲ sMrH^xG_Pܸ.HjS6BuOHm:: 2Vu n'㣚I&~9fpk)6"?dg`'Fwí/#H Q/Շra@K(5ѥGEu壿 CG!P,] j-5+̽H+^9mcc.YYz(qT%X70G·Lpv9?p˯rIۆ;1YnI4QꕗVNh gӍ85P, oI-+t !+ 6$N4+OlZ-}&EΓ$æ)؅srԐd{̋汌MEC06NnɭWn~ >}X;"g ?tɆܳ2#@&"zvvˌT"yO !/D?{yL|O:H2x9hć&\-¢nfcVE^ptpQ@t;{eXot|NUtESyO3:]u&Z"Չ Dh8k_8~,% ~Z0 -g.OnUNA9f$s=8+a PZwcd4Ng ߳G[0/gB=čY;v7<P~ق(o@ s 6VGŦ1fZlWVo! J,:QH\;RSuY%,M5&0WXQoLJ 8ȼS$&;e$VZ%@'tk&kFķŘxn\*k2cn0pچ[/TzO _@q=FO/n}sk["!&\JM9&PrOQZ >j`6LBTٓd6{ sœ1Hz^i1#N ShmOpL*U׊E^7F/.2d n}bz84܊g2F8֡0e,{(jWHi^rD-Ѝ}N1j8 oװ@B渤S+DzIW$)w5w'Zx(hDgKul V{۹-;I%ahiFԊ9|h3~`xմu4, qkcFY")4a>"ܔ<=4@ThcX34s"{0IqOuBP_PÝz8#(iI.^V؍CzvUzfE*QgPkAK^*#fn\}G(P9`q"-)+1o{hjdL*n@ژXNc/vkP4;XK__bꖵt,a}mueC*d!ȸ%:5#]6)!Qxu {Dui?:{p gYb_0T;>.ۮ q[mt FzD  Rӆ_&qmhi,3n \u1dƯaR^v,mÖӬS iWط;.9!?u@'I[մ8{͍x7}3Ӵ:z[?>ar(f6z&5F0W I%xʸl&[ߧ-*>.SAWcy#=ŗ+:uzrfa{W 7n#htDq){Ohe#.#?mMwē+RjК"]m/ZC}R9g{q|Ԁ2"LCbtӥLux{<ꩤf)ӨfYHs?dO5eKYSRws>ZSq@22QS}3z^%?U2 /:-cTms2>vheJRZ[fJVy;/?Dc`Un|Et{k+H?=VѬv-4a<$+2NIϖ-?+ʆ^S'w; 3 zcϚ4h$槬=.Ҵq9z?PHWhsr3s۴vTr?xe3 S 5(Z8a0w&ddW?aR+Л}#SR~&G.2ԟޔzOW-1o}yzNfI{6IgR5# ٌz몍ODPʦ7BHFot#fG6<>giē&Um0I; yʨ_DeG(wZݽAs)߄Q5g3&`l-sC_#د{h:ΑmL w+: ݮiR«DJźH;pFlgb̧jpf%wO"/HM+o.6MLWT6ϱ1G/$$kz e܁i/L5g)^?l]vP /b0Kͦ@gXI>vDj,(H*DrdЂI(UBNaLe#2["ݽ(Y mftXa{f؄v0G^uN_'7B.@V8%e8B (M!WDIeÈ#,^R$X36ZWOܮީx:0~ӵO| \aE&r]A-ƥ+x.C{u!ɞ?Qܮ#}4Kl]luq5_,%PeB|O" &tjjaY0W+>PH3/CAvyRrh]D1҅_^q}@x4]9ZϴfN^-ytѝwZ`R3fCY'`YH/~ DAbo/YLM֯h }2AvQ̤#9 iBͯ_+_'CAGC%.HxxDp=:.=I&.])EP\Zf`ȟ$JZ\l|ck:W^8bBތ'm/zӚоQOξ\!LU@DLxX| P;K>' gnU)De5,=(`YYlP՝~^QVLжΡvf~Y6[^x_ޯWWv B{2!;ojleҼ.`Iuj2b۞tБLuHTs -ʱ>elݚPfsV,¢*&A j|+'[2 =oʩ`Jʓ߅L.B76Dl 39CFsGlNL15sG[:ml>11O`$k9N3#I4(g qQd?'xJi{s/us}4Lb-" $|o8Oت2~ ޼5aM9G'Ld%N&k0^'WpӺN~{@rؐ+J/#fqJ+3k(q`LHI10݇ڣ&y`)"0T|4Irl0Fw0kN:|mr!KRqp*hK]l/-X<+ݘ=}&g>6~&9^wClb~vyֶ%[=HµܾXXT=lfk0+a {:Fp\^MMA]Js^PRT/1v߳yQh]j`ۃ ׃U<@OVuE_-~s2*'1%u#U5_?Z.|ol/vK4%=y(Ȍ I3c?}L\jjv~ ?`x髊s~*+k!ۜ͌g &;iBة{T30a +A%:X,ÍPm}㱑w2Q{%-Eծtdqx]oq)urȘjB+bDu3}MgL5*Kms2i:&hݦs<-Ɵqݾ*,uIXj^Ѷjo4\ő$¬0 M ԢɡF@IZ؂UΘS$V:ya+ݲ/+Rz8BfL?ҝ|X4C" ݻ~W0tPcN uB?WDW L4Їj'K(WE .P 10R>fGyUxW2{~(VU%!GmSo5ocjU uW65EV_n' s,+IS:xjÿU'!l=%OT?S5Zс ,8}hEJf3$+{Z r^m6V@NQiؘƑmr-/VE؁ciD^Ε1>"xmgʝWIi]xo pGM9/K181?/$J`Vu茰&Iwb<^UMxrr` w 0eݍ{:%ۚycaOnʫ6\vbҩ+';dyZN^X#g"PQ$ i伟:۸iWH[Mw~w\Btz7؜=g!&@}ÎNr:T3RLe3$ЗI+?iOSn&~2s;<3!^v.Q))t.&nj# r=XBlڜ6V~̾jl#/v*R^TphtKچᅲȀSDM~/kpZV>oW%$  ]vD?^A'QKY%W. +0E*rMoدTLW—CF/UFzz mlUᒍuva$< c /Қr$[u3ph>E +I(-w^o}^PynX4k OVlxڲK4; E.zrR4~5ܧ㿪Yƿ!os@+64? 8G'x3l:sJ_wv8W+5NF3u 55Nʺ:sDk-9s˝q8Tl JS$kso^3R'M+7ŬU{w{E\ w,F-+qO[]O2l=ŦHann0іE|6Yo}-8Y+z7`7 T94U*k*.Qxp?]o㘝2WO7{\?ΠIjsv7S^xjiz6^edS6<.N4VMmm5=ͅ7Gd翷=\4 "+N.Pwd>v ( 1-b#F{:\ӊc \xDƩ=)8j-E{A-H68I1sӟBˢ>l(#7B}hyY6;`\IvI^ ݲȨ$Y?Tvqwۘ 1pkO z3z;SS3(`Vfo-% y ~*rƳLW3?1+]'\b{D "S Sza|`::&P9L`lt,Rin5Sc*s~ɩ:qdWP'+Bl қ=[ eegplB*b-K~^ճcy@4VU_d|£ˤ%F( `^Ur>G,*A_ť|5*pe#ѪqW;ñ2kE7ͷ>!SvIEZ61Gi u0V"@8'[6EM(uc*GFc]4[*Vh;vz`L6w%44A'eq}V#CKPqV%DN\ln]J5LTAPƊcΔD[dF{㈀7cpVN<[]hc|ߚqxleA I9qY:x ydو~4c$J!b&ouzv‹{[p-4F.*4JNUT;kZԦ6%M NF{f Ha=z*rl9??qі;s.R ,Vy_8-u>V7 uguhv)u:)$wjJf_(RBF/v`gۖrMT}iFynt=;ߨ )# qfCdX%.hUae/!K(Jf%׏;S'_NɪD0[xU'h!R!P>Gow F}'O?&axkINnWWr^D&Αbǯ{;Ocg|B4WdL73 /奉և=X2$f)GyJhQ^<`<[SԮ$#0.Rq̍ZKno -ԙ_eL&O*"D%МPwz13Qإ!.װ)m_SCD'Q?vKs1= #~랋ԏکug)Lmqh} Rj@{\4&K .ڊfM-BV|2EYDKXʜi `J] ";u'1݇D>P)0Nb_ ڭiOvH'-L&O:9)QƗ鷖 ^fݘ eU;u5Q?f+ͽ 0 ]깈.G/JOt=]42ady"@/+9_"kߥ6GiSYvR!MOD hBѭ%X}ZVcC6園آ>σr\o ggbyŸG$ >}8%9- geIY_f 1 |'Dx)x) qmvAn~ŵܔh0?&H߃'O)dm!Q6:k(nGg/m/lld1.?,3zre(|ZZ)7dͶj}mr} yZ_q {Lq)̆8n@9Sx-xK cHFn ,/@͡?p8# YzpZ[uȵ5Ԡs>2wYndHGzoZlA8#%=^(1|E[[flIgMB =:!5~&d(T>!g$o24m)Qp9(tkeB]zrbf= >KYXD!!Q6sy5j劕ȼ83jn =cʹ8~>Hg]c>~~\״:5Qm% [ 's7O~ X3kH:i|O:&J$:7Szd `2Y74/y& hlA \u桢* 7x/FguTEDez$͜}dmZkcEy"ibU5iOjD0Z:\ݗ(ɄmOa^S)Sr;?Y7 marQFխ"X{/Xf+Nb|vb57[  72LK)ݞ(L/sy1}2!mj+lQz9yQfe5yQK{LH Ԫ=tSK)bPu)vn^Qh_k],ڹ\) RՄ')GPSU;5X5W۱b|2[PulO؅n)cM\X!Ŵ@f}$Dy'ybd69#ŗ 1OJ.""֟<5 L,>go#@FtAB 'KAwe\gT'R_)+?y Ff׶c j T^ƻRwTKs6;+cS ۣ?L)6J q9_TZ׼|HX(!#HWp6P'}M]DD83> ooo+bI~:ʨPda$ Iƀ?xAV!\*[sB۷WgՋB&-PgGثf/yLAjtVŠC¤jIΫn; rgX_K;;-F;]= o9&פΡ{.GB YB ͘E.@ptO2$zgzP 2,Q_ƝTVA >!j|b7fHFI6keQOpЩJ?_Zbxसjlw+a(~k*e-M@mȹELD|WH4|جQgcnP@w7yj7څOtB 6Dj4AuK:LFV/>džﶱn %+:בox@DU-۹?{IZB\wB%j/Fdz.99bƾƮ^V8fhՉD'I.E:0Q tlŅN΃vȁZ'h㼙YʝςMF Jt7ah X2"7`m|VGCeg臡JAi[>+Y ^yR`׍ (Cg O=-/*X:LGk4zRj~KigvPɭܩiHa^0jVHU=~~"G^ Gfmvf#{)$g!˳'rX x2|F1?͇# z@+هcmO#9ߤ3>5}͘A`HJ*քҘ,O5ާ )ZOx{ _7 uYmR ;CT)՟_PDO597̇}= rSR42Z <#/T濚^8ބ)%_i4\6Оr,{Wyrx@7PeꑊL"W/j"*h2%&;s~4&lNu'Nd|ryA}WNpgzf'ٽO w{4^s ǝI(\C3GJwL{#>Ii\+)\TkCD'$F#^4r50f[ y$8 l?vp6z!29.gT?0mʩig%kZrE5`QU ?CEk8pSTc9A:S zOYհ])&yũgtއ5PaU (\c /m4u&ϗ: FCDLJe{"elO#Tힲ:tbNJxXdXYUX@LgoxB'ރf'5QUQD[hܱ$ќ9Z{c~.$y4tkwi'\2숊}/4pφL;oP~N!0цBxة <98$Ni]oL id2b\# 3=['e:5Mk20{cʡGY<~㚨Q*2_=begak6^ط_`&eV5RG7HbV|sgF@{f'kagiW坢hfSu{`/M'i@[3t 2,y?f= Wi]wSۋ3NF9v@2>'!|^ԶBh&YN]NvpН$s2[0g7~V棺4ۄr %,P3zmi-R- Êxv?s Fղ+CfLoLb' 8[ =~YX*qs#` WM\l5ۇ g7 srC9[pdɋ :2ܭ[LDZD|;9(!7.3vI//$~aA{4 5+X*PbM/(;W!>SXȿX`Ε 2сjRҼh^&>vIT u ?,'cZ&=dDιΡz:6y'+OcM2޵y6/JS*F 6v1dRԽv(3X:SXt& X*?^~eaioCSs8 "vo04#Ƴtc@x@^ 0Hf7%  Ym^@<8i9;(e6_[m蹤_tEff5sMZlsD7XAvBaW 4@ňo|f:V}s\_H[Z0:x?|lZ+2_=ҍZVo`rm;"hlCb/U1lIHb¹4 PvCއ5s6Mπf8?$@f+ޠ7RHi Q @=K}ՙ-ytwa9tGl\>NbXH d 9*ɓ_n_ݥW\!T!P@ ni L{s7VLwH.?X]|A\t5c!VZB(X2$~b3Vq *Mv_%QI#B04 !MEo_U9w/)l3,~*dYJy; EZpq3{ZZ@}@y];"{@v-tHdRHet1EP;SHI(ϺN,T~--s"D}Bh ƂR:_u}`a#Stp~jtGgsW`ǶzWW"ɧFJ]#f2ô~{ʕYij%2Z3(*n+ ,힮 T5^)sv!=x pը9?j &fj}t`/1bp7u%!T91-j zO rjVjX|6{־ !#{-Dx)؊  \k~Q7A?Xa!xfP@2w"ߔ|A{נHZ1{3_n)ҀYq΀yPM3Mx\1mpRlБ11b%EJ!H4n^|Gs_#^T:%AUBE }Pݺ0䁒e;Ȭ0h L:'S"e[QsNfxu?gSʞV}3Pt`NqgsƠ67bnk2ܨc!ɫF?./-J&E8"B:迶3K"OgUf=_ZKBwNS>ߺʩ|p$Xu.5&8V_,_;ɕ\#!\XkO?_@46z50*/ r"y1Cۤ'KEi[ Ҍ$8dc Sp ~?X+T29ѷ68g3gnT(QmB)Kyb4J'H_+鄕ӧ36 <O#HnLWRڗs`|&)*mND-E՛dBZVzs5zKj+(G1&p] O F q.=IcO307q WX述.~Vz pߋ2~Ⱥk\*TN2] !CU|$. [Zܡ`q)\قn_OZd>}>̟=!|5Y g0 g$3%5A%Йp07:U D[0yDSd57;Lp$9{((`Ä⥞btCvqxt,zkcG3nkKLCk U?,$-RSEt\.o62!#Og@Yz);(5gy \0w6ŶD4Lpu)% dy^J"މO U!*lGkޣ.}H+83:{J' L6ʠl{1Uy9I/nc)hhz/:{'$@P۷!@%#c+| q"3γ]GS_!6SdD B"|@ZލS-7 {0މgLy0T H@6J6;"2"Q }1YD=C?qI/QW *ulL f=_6V>ɄC\ W O@\u%E&f 1M+&< sVV `fD:B]'b(ʓdWR`ooIuc MgyyD^Zٺ(#{#L%tq5¶U~ \17?RנT^yX$&~GnڪiRF, UyBoV&)hbmRZZ#9ݱvP=&"'^z]eD<[Lf 8$I9!٣92fQ5lۮKN(& pȷLLu4JR){$Hq2 ].D>6>~ B&6ձw'n) mFe Z@ (S1;ګa'2NR:G]4eSk s3p~vDxF4-Σ%ΏQTRKJ:l(,ͽ&m*tfar3c\JmL8m-8imM;,Бty5.1峏z[] 0}&$D[;-C ;_,Y~hxgt33.P2!eyVwYNGr㶒a8zkrTE0ya߲N[c| K AzC>#h%V6?7T*\sAo*2 8s76% i?.k#x5+IrT+.^ ^4$^G֢ƹbW?Oo4"$,%yS\V2sE $2 V8z{'#-) =Ȗ1| IrhnI]_vY1\^Ddo[E`Cbٰoɑ *u TD'K( ZTWp]+t-JCg #Q%kO#uq[^YpB^"U,X,)5ĀҬ!&I}eK9QfbdL gjQAu +/(8xy߮Y͔UH|:%{L{b!Y(ps -7cf,AƿH/ʸv'n ][Vg >LUМqy|L~ӸnF9qT2\Pq#3&XoR<4D,[ޏlxEJ6z(c i9byn- Meo-a[.`r޼?ۜu3>bȉh"Ae3]pQ-*hhuurgO5K {B0[x}ѣ}*Ȁ$'M/<پSi5Q8u._qf )/Cg1wX U~L2:]'M762ܽz^n.g U^'ٔ;$gVk7)<)kio_AԚU`:ǥ߫h;b_cwhI\}_:HC鷗d 6Y8|v~YJEI+C/G.' ^v whh(R jiWcӽ]{UFa1]*tx ]=^eFҜ[ jտ+cYr+a,2!+Y;`p"3//}d2ĐN1_&~Ah:ϵ8n<5@>g=,$-3vreVҒCy׎}۝Nu{έ  *3k)Z0Q臸Ec0puk0@kb[I4l՟NKr(`16Xt?$^^_fVQ& %1 wW~&֡H[ya3TƑc*l(]튧f=O: nx`\ڒlhiH|K|L7e1߹nf'@H@G2V%( ]vڳ.2hC.OeMsV5 n[4[ !' BcOk׉vvt$=2^LاGyd-ýu'#}.D@HuCEJPKpZJc_o K.઺۶0x=7&g*PYJڣSge&njKxnˏ| g'[ </ [J9CKY&-N@2oY%yTn#LlU2!;d&uN oPeܶ[ 1,|\<`!=QݛU5 񼝞`*ѐ&KԣxOrp45/n}G>QDMv`:Mt-H)Ae0Zgҁ 1QӇ ЈԀW&X[T ])v6; )X:;` zt^J0M+ 㸉mКp-RISm2 ^$67o(c_mb`Ag !ޠ1ym- SjX"}(Mm᠍ԮB$ r˟ry__k!8d\B[oҩ"lV@66އCyz^h<@uݱwr~Sx7K#s?$zGɣ"cU@Ry!M+F};eQ5cVaJvX1Kpkrʈ˃f`9}Mk:E64W6KurMcY:4gwF=i5s"ITwYq<@'SWѻMn47r-dCZ Ag89RAI6qMPNկi ~KbPDh=q/`pouk1NN^Q2*{eKbEz={h"4Hh[3bⲐ g> hIoh)TnӰè?W7HFhA[0@eJN+T~JB_6ENB+yIFy'D}=*f2qjU\OBXg"cD1 >W!7" xeǏu𽸞 ul1(\6_}Y>xm~)3EzL) 1O;.8oovQt.X͜4a5eeӜVA2ِ"3:"TSo3›]1 czbkOzY"F#C(IQuڔ׸T +\0u2Xt8:^e<WkODt}k$ T%Ez #NY0@ڟH=qȴx#*.y<j4ijmKLMM4ȹ#S)2g7<%9orTӘuĭ:; DanK"DzT2ڤ~s%g^ugp̤)joV~vo"B@3/)x1{*?hT/ɪ1:XO] KHpگU"<6µH 9]a,$Nciw%h_ZlVEU>+Fp)!m6ռVu&U'e"cs+V1ElN܅Ùp/E٭9]h+ @ |Z z(i.FHU eŌ늉+ 7Иi%㙞-؄jFZ?~Ap=<;Q#_!v v҃nQtu[/j(P83ʔ̂h\ $#OWuҁ,\3]dn-̓*I D5n`"sByŝ KNO6|ޑ#ݯ=y=.+;;i<4ivSn\e&@?@0aL~Zڮf׫,p];t}k\96F!q2s-&+pmdoץ!ŞX}m1LjΦ͟fO1e *纸u$- 'M~dajҪA>l#S'1e|(*R q`Nt{a'B1<t@=.5Aa+J*Y}۞%j)ACLY^U'n5v NuPG3af.ec36:=ނ}On~cڼI+t=tVbMJ'nوyڟӰ Ufcv,5Y$9ίGH -h6 oEpBTiߋ|+Í C_m=i~Pj>*dw s;TojNBdGāRg#!BxK!/ce9gGl( =jvuD36Q영t\yWG?22VR1*N(Ű/Z]b%F6|R⃾\_ G9J(?e_66e*n՜տO/vq*W]48#I=_2J_Ca>3}uAДBSC:N|2buo)J%!44tr+ d+r@ZYެ܀ᓄ8b(8VAE~]=yNgXiq#8۾≼6KsBUcd, "եrjXM5prGɣ`vb-~^S[9DJ|;'PM_E֜>\0x7x.M+G)CoDƟl\!t7|-P;UɫfyqlQ~fU@*ǴNOJa'tn5sdJ@|̆BvĄZ2PV)]EqTbk^a%]sIɺcD ؤyO?i0j$]Wu*2t, a^I֧%vX~JGt{f1trMOb?oܢ,D@/9aJIKDh/j| #l J5Q%< $L\OYy]7rl)*Vqv/}n⣢.Mj wbPt$2Љm,6 hv^bv)W17/^1sU4 u']qb}}>M׋CbNs4`>]6kTy9n?՚78Kfl _B&s$>5؛I&,'%v;]I>{v!<MR~02;cn)/iÅ.[Ԡx"%} '6XpIlT︬1GGO{hOe+y'9fٚ1"kS[Cs"hΐ41JLc#٫wOӱ^ЦKh;Lh) Rn{"!R1|0o d۱\Мg9`Zpј"+:$uB.Ϣgnf)TyԥO5E1ڲ;Gj=/+v;sUҽ nJ-ݿxlh ekcpBH쫞Cq;/GҋSF+}bK .t#7^ ̕bNdLafō* !hJH 7t|sŽqOaņ ˢz(gwN_}k CKN3SYHw0[AȖw 3W'K=ԣ${ REM!?SC{nlaC:AoHdTF:nO AV)?Ӽw"Hy19`I":FN8}q|! olx7wuaHn mBd4ݓc_$JږESkBTDM FΉ˜S1 XEww:Nɍ*D=+"RvU zi/MN94C<9 HwJ}^d.KwgcTw 3`+Aߘ8* m>8x[rc0⛉8E˪صW+@ 8u>s!s-JwB t`x\$ 㽏cpL^uC簞4}`gD}kww?0щ~6.,fs28~D9J2$UR\e̓m7 `j?BR"EP8ֿdFP_ .)Y๻|<]aScիzX ƴ֎6xbM"ƷYwp{ߝ >\ v/O(;~ݘ٧Qmj[X57n14PP^wN˪F-BY:Jێ/eL)9`9M@ۥbeV^)d(3Yqb**7p\i15NEVc:7~cJo3+*F#1<j?RrJE a>y/^ih8q4MO'd5Q67&us #x`ٍ(ɌrH_&QC5C)ּY0ۧQqWـԉRn&qpShu \eA;#VӼ&?o+~<*8KY0w*Bװ+0Jc0B=g;<4/S2}<T}a.HR`z A\~\'z h&7HC: |`h9֩ݤkY +[|JuuOOj‰s1~CЮVT$d<J遄aM|bb`Ztx3ɋ! \.32vuGJjwhgWϵ ֒l;S00tw#j(]G3La-k<";Y $&|X}C+yTp ?"/b!#ɛ8Ay5X$"|`[ۨaPږ# {fepNwWKBC9j: Sxc)Fk 9net`)Q{޻ݶLk3N&wz^23~Utǫ^aIjoCl$ Ej,E|niBn0OWbݴM~x"p#JG\L#)5 76D#0!/FUʒ5[L(K\#0y! p/"˘b~ N}9yEjRrdt4PNMifm+* 4T5V?xj=PSVfo]a:F/Q$ Y4uI%?8OQeM\]f dL kfGu R*Jvr=B2 tk/J\4GAX+E ?k+uo<Fs0EzaO 72RH|k.vuղK{|!J9KVL_hcw;gbFӸWx+PZ;g SͿznIP wPpNz]oi0֤_ukE>?G$oD^2uCjR~(/ CWCSLISH__;s&mpMAG{bcY# 3}3 ÈuWCXGpL=^nI2@Z5)n#+ c@`#M_O\ݿ?D>ycxZݖo$V*O`{YYdp*p&\ TBWb[=f'ɚȠױ$x5A9ؿ4<63:``6/ %OfD)]VK3_v$2D7 X\瀉hQ(:e108<6[g|_4цmLu O9PleˊPem8?ϛV4G`dz^ Mu&";:zǂtW1?z5WsR(HGOZ JOEwRn# OP~Vbfg12q>B[Yn|;^ݜHb;0dޏ 2BYc+Vc"( ; $Ѳ_r-|| 4)<.N]wAS?BfN. lLXQZ2G(Qs{7j9:O~q?H dV+oo5d(c,_KvQ])黩h>5,(KE߬o*nkG7d(v/.큵yS֡#(dv.-5':;ͭɒh HېylHteJ xo؝þ^+ؙH P=#$oI*bjrG~K}gOb{٭*QIhFݰsvւ9U՗ǡh2+w,מ0.}k%2 JD-E(A81qVB\>XmC^K$i712SӲp&*DrvMXWy~ULc`0Ifcg|]3_c .ԔC~d;&U%s$Un^.;ʬFߨ>aAB#gf_7 (8t|E1eh)'VܠZS(M-p=(ѳFKC_]Y?: ~xDjМ- )}Y5LfM/ם"Oq?buB'T;l5G~wWc &XI-SI%r|v H^_.eŽA>RRṄWՁ.m7&~+ƍ`/1 ?ň1 5)^rX/ZYhǖ0Nv6Iv,Ѓ(mRf"NGY{)lF7V g}FP׀ӓq' #[$l+BM'vn^7.$"yC(tӄ9#)B3;69Cpsps>');,JiyOJJ=Bj!e1 ԲAq]d[sklGDp79o0qbdI@IʺrV͹]Cϣ'Cgx2rӯeQ؉"smИnbQݿ6puSzORMuY ػR..u(6XH &Ԗ$[M-W):( Opǝض ˨re:=%N 0!~:9J]ʿ1%(.2usZ }OLnPA N(H3{nA~zR;/݇g\D ɛwszU8d)R L<4fn>._j(bj'KPtJON/[-6%jG y+ŊA- ! M _r3I!Bi +Rz&Hsh@;G|rp[ pOqh|Rz٠V+a[L(O [+z(`h dci `DȎ.cXj;>%20dkLZGn˴:QUv?U1 Ԙhi=ԝ@~uKv^K=6,"G,yVmL:UѺDyށ<`bV,ic6 F1i691*~A-48V -طTyFÃA]&H^[a8A"}~FZ܁ j+Â;!]6cc~mz΁ QϞl`nv sU%yգܮn |%'x`~QF lMު𧼼=5JFOwddJl:wO8<4t,JQ*7%g(Y ..|d^MS%0|ԏOJ{Ui8Na0öD [H=I@SFF0e'=yTFYJbi inWҗ묃7Ǒ/-[EWsQqE recLaX,Ǐ晠zQnjLrۈAv-LSy[=H-Sc1IgWhCSz$;LÛ7k 6&XT4gimׁ6,aF;.L!ny{'3-&I+|,kj48i+a!ܤ--_h[s. p> +9O1p,hlfش7UevC309Y=VI/^H evH \KFhw^^>}DdK9< `1R,9֝-A2Hdt;o':\T-#1K 5(0Qa_IHڵi#Z^G"[ZI{@b<z"{G뭶t8s.,C[ڸ`=k??E[+7)ñ2yeI@sj6`j>7;fi'"mI= v+:l ۑgyHH8k< rL~3+EkrsG4K@0En\}'L=9"{ FH{r)}y)l3OwRvUKu߫m۝?y5xW!CjLG>X1{I+Lj%Iۯ;xO2i~269#9MZa!u:4"j7Jɚ] Saү${rEk0 :Qm s~Aƺw8UlCXꄯժZ$1X˴sBj']U؊Z8qmے]'ۤX,\j%aCڧ뫡5=Z3M#w]k =VLŵ)[畢5FJ.h99#@ѣV*4PaKƉPQ?S zlruh5&G xETl2%zbys}OA3!w.80EoF K& LJ,nae[!||$V%ܲ%EC ;V-*6 (}u'Uk[E75!I6w [@DVo+n7X{ Hj.`d yė&KR CAxn6e*r2x!6ׯ17Ka*jga kߗGI嘻V2鼌?]}ԥ* :Hy5<; 9dk\l;04b%9[ڜb@3g7r =ȸݼ}}t^-hbnXՖ5,}F}FgZGh7XC-NqH#yhňu=GeP9!ZUlrwtь4)[-#/=uQyV$+2fsNc6lƓd4/l[ =ȿ|A^YK`_ʐ%SSsSD{6!3^4cBNTqg#Tq:-oB߀+w 4rW)_/i>q0/z9c%f)'#K FٻTog;b"S ݖ%zY,_FP[@{e~,A&sP32*q0wx z)Jl2Dn))BCPay 1*w=xsnnQs]ࡣ ⽪e6Tc=AN.EA[q- ;ѐe(A79m<|}x}fAP}Uv|@D!kлGG(@0ck/Ea?ij&,wl Rf]xTiIl]A&)QI_uCbzowhstKB.jV7r@N 3XH*ĦYӗ+#\%j(&쭡Ùc0ͦSvoPhAbm0>@5XY9QޥO񒡁s.unadw{%71c&*p6Vs18Y|6f㮫wW(P&Y{)\,F$V \r->p  0Ĩ`P@q8wC:_Ih@ꪯH[>У2%F؆m5;Z|_؆paYxܚ&?π4%UniȔk]RAHI`T!"NdwY!vq՚9G0/}_W6>Wy:2&_ӼC5i tKdj#0c?:jj(PG5hnE\ Yl~-< qD* 15Dcb3õDjB]*> 1(9xU}8:CQ/y9C`Sס4 _A[4\]8T#WyCB}S@Bj/K!),"ЧAMtX!aT1CR̛Aiiڐ ԝ%=蕕|D7'V6mhKɈ]dcZRA#wGK(/]gq"<63O+lV7)E՝JҶ3yHj" Q]D'CA')^L[dSf8z {Wf<:ot=l%\jǻ4SѨ`db~o1h/*ƯLzO1`ĊPޮjǛoSg:?(!>L:(o~Eڟs q$B4؄X{m ؉&UwZҊ^孻lw;q&&^=ʥi}xu qyF^DŽ/gw P!!;fVo6EHpMC^lQ,5pkY΃}aG="&zFIOF`HW#nٷxBx2R8KG76/V^$@O(EEMP׵QoovT43>.4o)6q&1i0u@Qye8U!3FE&閁Z1Hٻ:ꟃt#ꎐ(z`ߡ)fUƯ4Cn]vj/ZK8>}ӱ,0kL0OKl[?Luf!'eȯhew dk8 \Ⱦ8W7$ :Mg|>#yUmjQ:&(OWl`&oFb ʂ9gpPv̸׌sz]UH1LG0[+=Ox[~'Y \7':wZAL^\^'l5ƨuWcqQ'|Wm5+KG)TI/z6(zW_+/& t=+c k2s/\K9Q1zlwN5A{vQfz$XVDȌ̜}^-ׁAe.v>%ٖ|e99ur8Α/GgB/]M`'wOd筿gx;֧<46 B(fDf!q=A(qc!ƒQH3Klݦj#J61e1ˍ無"pك?UGYiF QR1Ѷ]ə0a:ٔ_$0g_TRxMX#yU"ɖrBF_Ϥ vO> yH㻀K>iB s͞nķ#3t S05n ~;G|ǀ0_W!%% eERV4P[hLAXƒoϠĸWX4 \rgj^@uwQj^+zCwC9]| ,\-b>cGLaBhn\z ,R=ց*6uEf#|]݅B+i,xkDjo}tjiqڳ:@nMkxӑDv7;*˧Eu}Ti,߃;HjvDi"Z.@f# L=[E *'h<Z!1KZuΞ4!n"b%w~1X_2ZCHc}x%[h>JDJɌJKm<3[4+^Vߩ8|q:ڥC |lM0+|owhTc}6">؄Ґ1zb1,Pm]e;gtr? BeA.$tRb}z~N*Y0RVCҫ#@N_@=N/#}3vXoFK+4*<1aoNN6bU nlk`K4|o~{8e[ 99@?R/1T fF)jXW**)D ,_-JLUtcQ-3w>tKۋߒ]nAMhWEYjF7 (;fS]t pLl"z\<6[uyP\hK_6O 2}2IdS*K6kvv$=Cvk¡(]NW! @Ͽ?&:'No4s y ]]z2xgqq1bGq+º~ K^ Nk,nV!Z(n #SJlr$dd̸+#סf< 'Z:q1:unNїQV݁ 08rRƚ7H}N@=7Bxhg*WR|S~7 I3A %#g`aԹe!c P|3gUp."soa$':Eg n=1LD-?J3н4ry.Wz#)Y_2Q5\7n#YT4mKVIةEY'#GՇ{a:c/ץM)M,gƽt{龳oO\4Ôה5?_l"uY`Ҿݾm4Kn n #ͭ͟oM *SIusڃ,Y*Erx;ƇY] 4lΌbZaNDٵZk'`IlJL2)vƜǬ?gIIezK}af woG\Ӿ$HQ蕫|{&{ňT$[WF]CXHkjp̣Cbcm#YlE@"gDRO귁v^-#r@cNMʨW$o5Rlģf~e0 pXq XXqmt'ZTqJT-ٵ5 xTZ{Crw8yaVǫEL8r 66xԞ&RYXF wzŭh lCYy+*h\J\TWhN!-)Yݗ+y7E [-HkCfFB1WeYEĭKG#"A}zw~a: -$c2ygIFsqo ؙ~ЂZR Y+J}IQr@m~0 e7ͱ}tS⹕ţv03%#HiJ;#C~ZQ'Mdh@{5 tm`"7BY9t`;oF˝tZ3i$9%G'>uĹI6<.CVȍ eGVX @4?1(N~!0HOdh8{%#CpxLy9)s|{6la(#(نUA(e^ɠ{%^Re> <2E"27B HZZMۉH I D!esU`dم!F;T|֒9 fޕ'ܤhxhJ E{%y pxF/c0xpB2E 5h`1ʙfF |ڽU)~bIk[I* yr*N^2.ZRV2Q*2E{WS_#Uc@#CLq,AQ~wW9,0߰-%i=B@gI!'$`m, x@CCB,ۻN*T" rnx)y <>^,Z& $!%!S,p};]EY}Oʔ2KCxt?|];hU^Q0 Ef7,d~aEfwTO+}ݾ̟bcl|' TtsOàv(p8) ijk)ܰ*1rZ?Os@bbT?NoZx?yU0dݻ0RT4*DVm/:?+c({PEnH|(9^1e-lHN:=2A! !r?Ct|^szOx7LO_ÆbFT{ DG7_.&CXc>ٕB=ŃO2M^e a6 r^BNN LAvmX5]H'.ϰN]'X$'!-p2G*wLsؤr_uWYM xd3oEꈻF$i04l7G{vԬW-9#m5Rp`0v5 >yr"h |[KQ*S:|u8}"o{#0@ I\ea|g  DLlBA]h {0E]LPcQ@g4|׵L'j.D\PYZ2h*G)Q @֫[_ wTF.cje+V]Ȑ& WUN~ngw[+S~x V4qVق;R$ky'fu!7gx0Pabb+6tk6.7 7Di% osiJ~=k^--!#!uZ B@(+(N?:n4 Q%e ?y!l{edʦRE]"QN#9ֻUyݥ Ҥ4Ԛ}+ܣv0dip16J[8[f +@Y+N?2# {ʱ&aSf~,>ȽEd2E+?L.{gP{6T!p7LE:pt,m[s!"pR8M"}P,lV<*Vd掠(zҴHԂ *cg(S.!vюxt!k7mK(/ϧs7f| ܘ²t/f.Df1 zK$Umhr.D*G EOKww@rhv~{G033MN2ւB3n ހ}@ Sf&r6I.E>u[[UxE`k+\/PPA:,۷-pr3Z #F}$ße@e ?N?ê- 9@foiRO']e t]~c,QH deĺNollZœE_`DWQyOPEzD"Lx؎ɰ-3%O?+NʥWDB ԗ*?B]gJ#9Āu|Mș7*Κ8/ɓNg4L[8z8CXw-a_X--5ؙR4TkeH Y*pqO kĐ9Ѷ.)*p-q,$1nJRp2󡬺Xh5Q jCJZU%Ů&}zyi|rߊ.V0@=χ=e opxV&ŃԋJi3o(a 8gpB}]z#pj&yWC#`*^[B0٦TPBY =T4q#y䆛X=nRIGZ309S_ 6r'My{޴60ӛ^OPMގ#ZhI9Lf6'"fXVOTC"nye9JDARmY@V1 X`*Kčd`G9vC7{n**05ys:gzock Pa׫|<&ATVW ] :|ybL@U@DP:Fh"*Z,zX|H~66@5ޕt2( (%fDzY9FJ#sCΆА,⿷iʅ^LftK*ʹ}misBS6}Ěh iǓ`( G7֔^@>1k k" 1  ૸ Z thAY!͸ВyGg-sr >a mH*S@3Po-[9=KB%bukqc*_B3Gi1rЖ9,'8f4sr\(2 @֏\ E2jk DxpZt3 [2 TdJ[UtQvMZ88Gmӈt2kqp=y4jޕ|a06d~SKZcj:t۽ޒ5 {8?I\eA+@׾vKU(* Y%^"=)/Zx|G6^Ƨgg*A)NeUM2ޫ)a6ŗ@#8PJM ʻ?~~Xa{GvlU?xxDf\:Ih:9QI ?"y$URe @|XC7mjRbȔ;pD!{/#6\cd0'/)0Rܰ=sцܞ*G"T*ky7ƎvTp'7- ݄{M5/鋋 M8 4<ٻJ_VIhoy+7܋ "jUcp?Ù΃A8ߎ&S0_] $7jNVL`kuuC6.<2?zYSJ/T= ~59૰d4- 9b<:eF'ۚ5o߮g]k&{?â[hnͣ@LhI-̗bu]QZŖ,'u2ے|9SW%\V5Qr_L#s2nE6UL"e ˷IvD b0񪮟NbhJXx5]Svd9p+O-<֬ 1MrNoGi_OjfˠFR? ΆѶ숯VTܪ]r/o!O˫C)I')Ipq,a=I$/ңlm4&9":5Jv-$j?M srnllM@}M\_(O: " mRmωL3LL|ιb(hDGo#I'+qΡ6{ErUpgAo[%-PgbhR2Q˽(`kӏuK܉Xư`@|FѢf,;"679eHý "%>Pțb_ %):caI-E{L X>g^U> `9 c8S% @ZL%1:L<ܪ!j#$.I^,!,JHpL|zA|}v^,,zv$*9f9 &~?i6rF45Fu2Ry}&3baRH.E5f/rN,]/b(eZuxɡNDVHݲ;2{Lzsbu qUB?d0):H$I--FWPm8x9v1۴B4|WH=̛}SPʷ ǰE9io8;Hɍټrѱ&<՞U 5(4K[ h4Ĕ)ƕqn[w 9E݅hm  "%^痶k@Dປ<]0>R?Te+m/=Jp T\A W鹖D5C2)`ݟ﷽4h:|Y-> b}s(]ȃ›֏%:{ywʪxa0[`mhi1V *E#QGN_LIMH')ݿKm^|8} ;7EhWΕA IAjh*RwyוjD[P3Lxm~yx 7IJY NHU=gCM6 ߳ḋQy:DYj`isBtO!T;Ɗ$ZaWXWWЪt N ALқ=~Iyc3ΎY"ʕ"4+u?պd)" W Cۼ?BUz"0o鍻s#Ը{9J*svCCW^XS:.Dq.RS`soQM ׭ &pP_.qpɱ,Cy}9DS-ah6YZãTM E,dy$2hKIn5mKw[)܍gh { ORA=n#)~6@Ϥ/(: 4K!TRF$͗_NQHU,5tr^B~kzsuTo#R i TKBH-C4˗VdO 2laRJi,׮+uKS[Py!=CB^UҵH2`\pgTAC9,S3? WS[zs׻ h@یBz~*Vڷ~?n*֮X7hAL`3H=\"5*'yՅcSkuFع@BȔ9ߟǂB,Xt\2?dF'7rB;T#~ڕ %0xQ0oQr:~^Pm:)H Kdt5m B,*t4.y: TeUO׹!UBɡD Ig;L쪛,xaVPb;V8tQY]rx`p:6NڵT8Jz9o/:V3\jTxA.G'1x!9[{@-0(\Գs/o1{ޢ /7YsHy<~P^^?~i wrҳ#8>Ka:98pvInvJ;ԀBKSi?^G:U +LgZ jigdVAKߑ0y>2ܸJ/&(ZP -g})қgcm׃CQ~9"ti!2*$K󃬾ǚ]2Ub<~_#hU@Y~*OWA eհ^^\=$XVk.Pns!u;i՘]IrhXңQ`#Ɩos?}6{뭴zL/B{K01cq En+PzTOzqZ & fbt)2 H9) 6!ouC8ո=7Re*ԟh2 ]2`M⚀=2 ID1PHk53qL[yVn}Cc+0[[K2&zVm8oƕi܋ ArpcP&02$N$`g[!Z=9U.L]Jd| . UBl*pQl_h n9mLj'qۢwM [40(_*|o^o~#իMu{뵯JwxW5}l'}Z ]6Q$NX?= r`ͽb~,̢A|Tgק3*ᰫ)MlS/">2(A6ݙ#'M#z @UET\s0hГ<-]"B`}YJbD [ kύ/Be/$떮3=^"57+>]擺v,VH'v7XeZ >݃Qãi6Q9xޘNES0$[m!`pe1;`qh5*Q6tS;oNSjru)͚"dM-FnoT&\*.BIsSʩ"QTf<Torc|:%]@<XStfwUz({]b)T:hż@ OHw'܌U vL-h5wؓ/(B@.FoQ'=?r:guYg G= (Kq֓&!IDCNߪa&>!P ?B<"X/aRUv0$qHR|Ueʌ4>822=j?DY1UHȜ*vo+ C8)@q9=Q죇JBBނc$!:58p$I[HJ-DcudzР5 'O2f]ݯ6%8F8dG:'(ՏAnnNӍ]N*6'Cϑ 5X@uK8Iy?=&#  8~Ûݐ?f/jVPE-e~mij{;$:jcLCZІuvƭdlo'U# >IةDWg/hZ6wD(n7߾u}9Ot 8t5(i^iolZzPF +J xƁΥ-;l<2IR-,q>DUJ7?Ldļ!껦r)NO[\ځY ]feu΀GC`ppVJ[þ#z%z OӲ cM=Vg!UkOņ^ؓPCgO(A;Qq<KC5}tF$em| v>`tZkoz*1?\@&۴ݟ.e9+-LĘ9b5EL ^"*Z5+<(c[+lgеXզvvP90xr;FS(wLl@VV@ׅ?5IyszwM~ /f6!ѝ^[O}OnE,'e5Wɝ65D~nkϢSO]݃|>saP_3 -xƳYIK\Z؛@-RٕԞ M &.Ox@G^B%fe0&iXৡ؂3G2>\VR`՞oLR~etHLGf0bXHaQgɱ$.?$*d1ud[l.ܑ@b_%#ʩNiv.,+ً^BoՁ ;O1,}&4 &Sĵo;u箖C WV )׮ѺqӀv&jcuZe7&;e$))nWXC"SňZ:]́!pj@IJ8gkJG&FgnP9zK d< p] 15v& $ M=?aojR &p{S~J[բDK߼(4:_5F@E\ ֍؋,I2Ta~y "1˶8ԤH\7d,,p9'A74qKWXr8:;Օ \PM=>LW9'IqK)n1_ɬIq0YLY+wS#w5(W;iH,kld,kQ$4Yb+mI6^{cUwB~b8>"5C~B`˦YL6Π.܃;dY؞T1%;|)U$ ~8hgv|*ؿM}Icar}% p* (iX.&IKnUbooӱ]ղTߟ3%BI_ 1&Aⅾ]πw@D(OjX:\JnneM2n-@9hAa,'g/*m^ 2$/韆x%d6JګIP_ztSWW5)T :X&|@%+hzl }4PS{dx7!]CI9{tL^aJE T~[v/K

D 2 k%T \ B6;P^EyؗB&XD%DM!bc)4j?Z~{WZc/%ȓoK :3yF/ n  pn,ޔSj.GDӦkNSaf-(WaJ5X3runDfWE}/tp~z2OB `_BYOgV 쿉|-r&]mگzY!v.eƭuȣr)q^kohB$カ`q.ܒeE/:6p ,zx#?|ө;9з,>U ;%j4أPe`Ys܈W]5܃U[hu!*6tZsP2]O Ή᲏o&" C9O?kNyHD&RJ=,4Ũtz{ۆD2z @J:(LA?~­<I={0D0ۓ7̾2p>=%>ԉi,ЃkDaԠ&LjKL<RdW 660(X-+;Z,Ye,젿FZG#=τ"p}_)N8ŪE!w!ܞBǙ+_0J?AȤ,x.qqHfHa;hXtjgh%qLc:x5ir.pys.VH?S9X'! 1D%¯ކlk۝Zk7[(=yf`fJL&DVBSMW?f*jC3?|t]=T*%Jemjg|]KxIbezw:f|lMV.BK~g 2z̤68W\\R6. 0f/Z'cW{t2ߜ)N`*.72D@ 5:Qg1/hiTf flƐ*J#uEl0:u/LbalyD`-[o 3LƙФW8L`'X!쓙kqNYe@VXwYMg w8؍ !y@tJc5Ɉf*R@S\CeCUZz‘8Ÿq1P< qJ5޶os6 7rAPόL@\J@R3V kBa0Q wZS raPtGxY\;tH2FjH,pbO2l~AGk ?B? "݇u8l|/9 oF@!jϜUPB)ay ,/y1[N>Zt1Anv*"ϭL KϑK;㢊ˁ$CpŽP[&Ŭ͟v<G{y˔sP 7Mwzc7Ԛ;{5+ID&ڴd~.4]2HeuaYjkG@ jYOg1禼2}|B%(x2^.;?s+>ӪGd)uumhqt%QŎ 7QpE蠶Q (O3FՍ,k[Vp KyBGz&SŜ^홾Ԏ3[[ٶG@ud_ NQGMSI1aŏJ)$U)~'鵗AJf|g7Zs^[6L+}Av?x;<_gPb >Bّw2fgWO h;:$rpUH{ @fU1dbzH4Wi'^<"Τ3F`e# bl{^/z v1JaaB%9şb7Fw\xuaFgh a\%)xm&kt !G1FWw(Ev 3F|sUUh4cbUBEOQ8]1ǟ.%7F%j? g20O.}W6m q/w5OFKc3zj }oQ l삍Ld *S fxVvwOiNKїW,}YaVMW9_װӁwA2%Sk !98Q͝uc9S;\ #7B"ڑ*U "SdDC%UƟ pQFQ*${il_T=[CD<~/@@ܓC64CBmN>\5y R8[b)Ў1%n;nL~1nuJEk0ǭ!!] -BS';Qpr z1"Aok~k5%ь@`}gesQ;]+?#0׮eۑ/X3 E#gQZ^lc+4I;Tu}8^0$efNӮ͈[5Uv{Qre]eV{M:s/'cџ@ XGT-\}Ff[F9]dc)&)z3z ۑUKׇWa":U@Y.u4_#9^RSCT:M5AkpQl5C1]6>HbՏ#ZDFVz/!?rD )Զ _%sMT]ڎJ(⭺nOLR(e#3ځO.Oݫ)/kJjRƌoޡ+eZgN1.EJHu?xtQM7%X)D/>Ǐrblg f9t.3y6Vb@/((M ԂoJPIKrv}ͪi-$bP=.XL гHj&CK (>ĩF S HY&QICϴ#,='rXȁ0 %M4+̶r@2qts VG*n`+5^f/o2Y"ˣ vKL' EϘA!:TQ~pq,7! Ύn6J/Co V|r*Qv8^0nu b*bq{oh?i+ٟ u+6 ״ ~0{C+EhO'`Eb8y[@t6ԉ<x8m/C _S[)!0)Pޖq7JI8⌾kZo8fh[Mtzb#FߑhS)9. 5 0o;CWIJ4_QIUg^LƙjF?_pͬ#8;)Dɷo"3iHA YKV Z\X3Pc5iZ bX. {\lY)FHc-'灱jը,޳eR @ &^&/Qo֥(LMd8V=cD>HlQ{6XH#/$/.1݊*ߝmy4Ԃ`qGʬ(aDuJ.$ ،61M->@^c%$z=?aXOKupo:Vjvfۗfu(B4,J(_>(7XV;zcUY5QKi!툜O-Jޏ}Cb =yڽ,Y>g j*:Dg+bc- ,QwXD{# ՞CK~ ?q3?f 0;1#Tdu<_T*, E4H!:I[JՔJM?կuG'ƛ~K3IPS;outsz. -a’E&bẲʛtB0^0(aunzf~q$bIl `Be||CN$UFwb`TmްAfWPJrŕ[&e?~\Y߁]]ːD~*'NK"2:Y/g)p~syZ\9@Fɟ :aZ.-s.a 14(+ t/ٽ9DM%A/ZM#ZiL 6m: N+rugdvaˁnH. Cv.Crܑ}( ent@6!55< ݠe<@$ :n9Ǎ埩z ÛB9KV;{~E,_gt-igePڒ~-ͺLD1 ^l ri@L,E A>~JA/D:Hך=nj}*3e.jib&ڭ2AP|/{Ǖ-t ,&  alT?e]K[NQ]fݭ-lj d٫?IJeC[S>*CYV-7D؃(3vyhE׎ ꎜ5 NEKmGL0l#} Jdn` 1om#Ȭ%`JRdYf>9-dv^/+.f+u8JeryVIAлMC#vs?Wë55^9B+3[T|7|({=ҩC!Xϻnw;cNu'UXL߼Ջ> or \u ({G{I(.y@Zز&1֕:荴HqoiҰ+&}keÎ<9:K$&™e)Ku~[k+t^Xs/xPn1SڬtKi+qwiT/fyk#,Lv'wrC/0&8N"q I'2gg4 Cu#%7'j\MZHfŵB]Ncs\. =钕kQl 9&Amiܥ6(dI/]#aqCGb8iYq$a;HlIx(KRd 9tLw`P?Su.ڣf_A;$s9|\#U,/ͺϬ5aI\zKQ%(C v gnբ'6P0C|2.,ij@ |1W_ZI;P>PV0IOk&|I K6GzVu4ڰ;] }yM?^̔>v۶PiD؝۹ExSZxM^:\nMVCmĝo GU!?w1;N*/vy+v&/1&ώjg*CjY8YG`v[7$Az#^3Q$,ČOD8"rl6ڜkE3(y]^.Zh>%ޚXȏE[ d2IM-&̠ DZ)rg|'7j>'FyYj$e#aCs`0`l~@ջFÉbJha3ng ̉(A>$EO)?eʒB]sd(#!}8+tIoG2oΑab0N9=|4Ywu`"7Ɩkg|O^p*gws+Dp껅QPeSgDhrl-@$럿77\f^EǑ2m)yKc,-\0|1l#TWl=AŢ'%PC9+MN ,`5{"ܱ +ec~נ1k %KM g:x\I"ou0|2z5(~-{V:?nSBe>nH\E]=zXƦ%tl K4 WS 9ژ w.=j ~ + pOG(v sjĩelս AWǓH;c$EEL+¦̍kc>=k@3=Ma:ޮU/+yc}8[Ck ps&7A N%tJtd0kuPR,&6y?(#^Xj3q`/54i=8k9M;|FϠLK'FN} TH/RWxBCjuxv ;B"8wǬq|b`kFcNy02E%r^{\;?8b2e0ږQ7_/-T&Q\iTjc];i>YTޘ+qz(u铤悴LzG\2P''0- ʎ{نmǎ#E t{MQLnW i1y jSˀ;0ߋ&[C-? J*= (ґ YhDj[B20~}:=LKG2uhtx`0-95!spaԨYׇ=QA>gP:ߍ6? -@m%s vQHPSfX>50MJ_a(]4 T1wtMҲvOʛ S&nHNV;q?QqRpL6N;z fRr&U 2.۵4)8Yw95'7(6r&`LJD]X I:K7shB5`i/#{fpLI23:a^sxxk[hP ']D@I?U_5ݠ=V0pح}0P1޵e$ɍg1[\1T˸EF?U1W ³e*xEcPLfq~-g! h,$0>!`҄)c[]kzH.;Vhͳ[ i|@Wj\gp.M?D9di`a ^~eFqcV6 fW_Zl9󮭏I㩝l^+kMH,yY|Woo7['@Rl[GmQ%Vr~v_4i|}P !uRz럙^\`MDTAI0 2,I\_A(ZP%; #Ѵ,ge+(N5Awz|X_Af(볭OI LfܶlBS:dzy)A}ʊ7{f *-Fڌe&MEVJ{aVkD jMb-[!,v\ވ"td\WYL" .o"uK/?q R XLG=Eá]'bo~1[MzdZ1 E ;pdz֪1 OzftDD7Ugi>LE=$2=$ݠE42lvu]ϼ'AɟP9uH1ErI7I=.M;]*M^'Vq(֯ĔLr>:49jk"~70재I|-G,Z=JߥwD:]#1aI^A:TMcDlρ4c2+ ct)8;S72{'=mWu{dt *T I-@J e K+aIy#K9GћkGk譍3jU;!F[; @WW Ep@8ͺ7Uck1X({T \؆Op-=_++Q療ώB 1vHF /Ĭ!R~.eە@+ H`!A'jvyr,A2k{(42zP-v'CwWKg 6wsgXs~ׁeLvl^~L""{dhe18V/Iڔa,guՔgaHK̓2SJ <7 F9{^RU&4W,3vpjȤ[QbŻuh⿚ޚ3 X7f.jޤQN"kg:Jnd<UYJ$9Ki $sI󗡷`&OUϏ'JsjX+ r lNmnʔt? U9 FI,8eJS Ֆ} ٺ L Za/FFջ#,clOD\3Qw" A!V(\{p!ýJ]ݧ rb Ry\SR:_Pw)MWI7=F/ۖgG?rcs2d7cH&嵢)X҄pP(_qs|6Dv#DInb0 ݪ{q'xbL0'nR ΔAX/D Dn"9٧]WaG$d3,QvSW G%l\mH?٭"d&fYv1Y;K+RBnu4L1I?R/7U é_46#g? )d8, Iz#7][BsD5|AcB5@8ǥfQʃBB Z}#ڕt+W%-?'4߄EzԛIj멇#d$OM8l9}#Y,$SFgÞI#SZf4eTӲ 0W)eyshtE8L]vԩz4~d X^@Lzo~ **s YR=Iwd#knG~\p>ytIJF Nh+˂~ZB wj8߳Rz:8W>rWbΫqm;) ]VB["斚%E?% !jwC>'dO7թKN \tIHKk<;5ƙs7MT3?XDy6ue+w_@U%hR^MTwDbvqg #$X\"+X j"jdQFn|U]XNяNQcJʠOCGhiȍHqmB,U1q7c K@9x|,ZO*0k;ix|uV9.*y˻X CVpWb#7y0Fw 6!oHv;Mr gyB0J*cRis#;#<5̈kЋmΙzBбU5AW=Q{i`hvA>Ub.VSz'qc1M >ǜOùnB2IR::'[pJV8>w2 4뒈e VKl[- >e}l+J.P)7g oprᤨtq,]*aޞfbQݯaHjRaPY" g=0y&8gpbY"KU!J R!^!mjnbr͘pgk^EpHb!gsqxyo[ #ioiŸLc4%%auȡ+r f!7v(e?}2_342wI(בҦ(t=`f5Ix1=qG֞{8q8+&j-X߶lP("KCDcc#cOL]ID%804`(;R*;QNnŸ[lWsDN 4&;vJ$[!nW•.l+b~.=,CȪv; A"Qph:61?߬8vqV=l`9d~^N 0S4]/y~wQYE-¼x+AoTZ-tY%([JеC[B5*3S|0n:4P  JM q #"f#P!WƑD_kѴ3>Bw@!OHѲe|3 4E~nV+8\xvnyh8q2Mf?rVviD Uޞc_CII1M'iT|'biٲSDV1< _! !j!YUyv7FEk,(b+9*p7EzE<0զwZ>:jnfԼ*cuDzɢE]8gBC f;-\FX #_Yt8EȨXQ68{鳂5jM@ gjѺVߎCM.** ݕ6mO|`CGP#]V.s蒜a\iȯP6-ңJWECc(2?ТM4^vw Leg 7Z jwHBgQi"lJkAS;!,{V`2bu[ |.hawy;.NFuJ%zȣÝvF2622 j+qz{E-v}nӅ\rx.v[`Nl LŁےq! 4)G9!M˂9Lrq/G06C/+mpX0trKO^1;C*+~) >|V>ozV&lNy-or:8od4OŸuIN~ܐEۖj 7ZZи⪰ܿH~߶R{(q`z@4~VhTpDZ|%jVBSR)UQxYw{SrX0MG_??}, sc!=/gkLz]G>9.\1֤VQi?$7K9F/m?Z~gA,TrsNyꦶ0ݺIEi]% .:$"V)URBGix37Px(7z zBw|#L\ӊm1/g[44\V30 H,SզgpckzeIWP+WᚎC焔M*@h,T%RJ$Ю|[&So0Qd wJ+ޥ#9~éOm:u% ׎EO^. 1ЬGwN`8;sMk!e[cX>g4K!W1'q] QiVL1Ji3! <^Jo7@]v3V(`bVdZv䱔ʙoZ#`!bW^V;^uqE.OҒ'PZ?R 6VW8[`#[pԮv9wh9|9fto0F)9y[}.>8zHBz-̵M5w`_hS,yQ(/Nv+.\!v0 Qx\ҫ|)@/xmu&o*G# ,j!ML7K@_w?DžYܬP C:CRZ:"Rl>L6+\[PJha-!e;I(֐XSҼXHTڬ!~gh(>At33oIISk{q9$m k+Üux-.iGpJR2^ ҅F+?ֻ:&buuډ'akO1^8BS5A d5zy`ywzm!E\vyO@lbFD5q? T"HKvl,Ev8, 9SKf~aɊRۗ1p@yq$&AAlqn 4, s#|ݷ/#? i+Ĥ֙ U =zsriu˦<#B`p$@-PAIEO5搬ٔɰ@q T+E' 0 Jwn7#Ekו~Xajp1aFyx<^jv{rfEqh76 9^3Ҋ5O "9lENsY @ To(Ѡk^3T%; Ao) ޲ [57% jna♧~Tʤy>4ZǼ͘}@戈_տ]XT#aMtA,I h`pbgR*4܂c.{l$dX5e*b$'@U)c΋9&RiA<. 躊NHY'-$!+4mVєvL*o'./ԣ/sf?yTSEubY58]. ـ:DQ;tfêwkdc/nDϥMЬnXd~oR i[B+]D,. r0mfܣ'_fn"qE E[&-+D M*TPpEcbxj +97 먡\a@ 1 Ɲha jG)%4 VAygHf,pQ(!LD\.4R核N&V a+u^UU`iC'xzPjiŴ}zg{gh t˅]ˏe7 Dgg{g o-^ S`SKȖ t:4İ/:zZ"MfXeQpu\m6Ǡ&&p}!x筳s:|;@Iev\sO!pz?3PKAjmeXiw1קw֨4xS11iâ}oV&hH&:=1 v4vީ-_Ki^-\[:4$S7viKKol 7 "oXNEP󢣧,jpⴈ㾹j|_uY?<*R{_'}I=y|-94 =cJB/0"Λotf.oW4W| ΟOX{$Ob\B?Ƒw[$1D3|db9]miU &G[7hh~.1sl9B HLusI 8~U7XF 8~2ne3L02pu6T;ѫpuO `#L0st~x3Z 7;A" "FlzR2?@SIi(&P!)O:CϑC`jd=7VOphtJ=nM٩M}(;p(*l6Œ}^ "#NM oSuăɗh_Z"Z!?H :]"8 vbq3D$zp'G50>j]=ѥtc&ĿbІQzU ؇1 ')e49sEܛ'9AwBjpݧӹL=hN<(,bۿmҞo[NS_[C} Ne-VIv`emNP'SgW{< LJRgTx9)нBw\pHsF^s.!Pn0dm-iUx#f"OD~k L`|-Y>g+ǐ@֭֠_{g V[o]$ոy4<)8I~,'ZvR4~M=ʯ]"uFy M(^0%:C-ʹFL L!1xm4Ţ[5; cdznX Hz_+I qɽ= D)z0YtV?4a0\~Ů@\#:`4+aT #)*L/rarE!S hZ2]p#DYUy5v`X$b ѩ[džPyKEDzP{ vŕ7h>a3̓81Bܙd>Qc'ŽX? g3rUPDVL<}T36΃] b7 6x#p4){C P mYxʙs6*?̀0{wKU1j ^n0HΓMm5V[Gxy[<,meƒ kb Xa-nߓpsM;`iMHu)XBIP 诵2?-f9!JW 轟 91\dwP}wڵM&*rZ(2L c3ĜA;y01S|+÷\$/nֆwX5nܭRY=}u!G+7+ Vr]k B;ޜjȤ`<0nA[kB}ѹi\&.6I+ &ԏvg%{.f ("8~C^C?#/=RjNk +Ix~CX-`aaf~S_K$u)vV:b0RΩv{d+Ms6#E @m>R9q CW_Wd+Ї>>Z;ۭZ?+=k 95\T^D_Wsaާ*= ZZ0S3Ksqc!)~[PB48^{lt(|] 0hZE1|q)#Toʣ*{|_&HB ?-y'޺A{" }A_s-&1pu:ڈ8`>;wu!K/;\ضyұO T$RR;)&6_ExsCQ+xVn MK% _[3G&D c@A./l+\r }ۅd ~^/xJgƺs%)mo[ 0w>YܛealWo1D5Y0rNMw y=36R`%6a}4?PZM)Ema*ECu Ѯ. 'M& %Qh? v@9 +iKӧE4T@#<ţöR9>> < }.E!}|Yi&[+_vAuz#j.mj) {<!&R_"T@lj Vȭ _|񄹻\h>|#8ؾdmxjjRS̱9Ӵuq&&p#,7nLF.h $?ճY@>^#.oWxBt0\N-J3Zm `7*RhDfV0d҂K&PYx.BT~ MI'c%{`┶OF,#qC0K#~Ô~s*ԆPx͚?OMA8UcPw/O%Pv OY 7U!V+.| Xi̋iQjf(ȖD_i0OY9h~isC FUxF}, MKӢLցYhO9fYo끼@˷A̺ OtCt¾ &OGxhx"$ǃ06xdV7"C 5=BC䆈8%T.Ϭ;=:/tE3=VM% 3%Qָ$/ \!$"8W͞xc|rN+LS30W2;ByHK(oW쐓;S Z)Fx]?F}mkxh'E|Ahp>=Nm*ʽ&"t9MM 6G5f_3=q^k^]4}غEh2b2~>`EPT4ly L-tJP-5yf;q]X "@GhMcH+4`H44 c5q;lusy W<[Y!Һ(͞".,+u0SDE6t܁{AO1!@dOpŦ 3f*-(CӾ&gNi2S|Γ3bPհ" $C:û6ZvnM'Ly< F=Dg5GXaei#Xu't@cVRndg(f5.J1Mq{$L󥅌ig[4a2a2〝'Scxf\UE-ܑ48۶Lƨ*DYEF]UYn$H,y)mHSj??]kjS ^`nЖ_\%` [VW\MM\յfZr|1$K89M /UT`eͭ͠Ylݹyfw 6mt|D5)"֏l!I@ƐqoSB$3eC,J¾a'swx /ZnwNTbsP]:̒KEx)70zH a:Wa|33޻1(F9BȢO$qT C╍Zj P̗ox4vDpฑ8dL#w璉-2th8BP(Tum2nsYS|;v\N* f פŕNf4*d3T*Ȋ`[Dž }s ڦaIڬ_TtIJ4NC{jĮDB4 _jĴ*nSVm^9Pu)M@VTvg{SmK˿{etSc^|#jXcUCEJjʣW8ںiG8OOi@}*;!XĥH%RfcQGh-/ Mw;2cQce[sQAOn1g*`߈㜡nz]3q CI`{g_ MXk [+#9Bԇ?4hl"-.96^M+z#3q9w7">vmqp EM ;J|a;ja8|$jlA&{K i:FƲ0ˆ3XF/{ޏߧNMLϋ |Qji$SK}p*^i#q; /߰0'XZȳvFuQ_HV?)A_F́tb@ThADLZE U8 jr׮  CRt!G/>ZC i-QyvoҪ)XƖ¶8cw>@Q=[|_:Y\3u4ۮ`b⪟MYsٜ!3 +}{(3TgQ-3vАyb&W, W U^2n *nG]%G| gZ+|a &*0Z>0!QR>#iԢn>%Rt/ 9역._21rp&b(zg_7B'{}-\SM4+,8q;twHHmR\Tp"qxshvSX㼈Oc9ϼ`.bS׫V,I?c2u)JQ cqTrQZCzhHL ǍWug|Aא[Ya4 $޵l=Q)ˊ %WA,eFnV1Pqu}R?ou_ngJIB:ZxԫIk:8{ueލ+Mum9+Jp`bz%̪ =r{4KPf] %t ݯ&  ρSjCix} YsNfZ_ tlǘ@EJ'08)|(Jpww˨E#Wc W6~Vhc:,:B]œFhb],"q} 4)D QKR [.wچbE.|pDCM7L Li4/\Ycp" jrF:_tr-lvXy'fT纡]6HE\brȹW̓DvlUD5Q_t xNǤogGbpW)Ugŭ잿;Mgx4 MPs D?%5D i;ir|ro"Ny-O{H_nZMar vjw'>X9r4r[`bsAi3DGWF3>M&9 dX7N5lPJPuJ=ݾ<<'erEjWOsi a%I,ʃa{K%@ 2GR^ CP3U ,le`^F^mjU ACpe"ԗY @#J@!Q!.M̎k*@zSSƊ=e:KOeoԩ*Eb߫F>S7Qn+; q`-& i(J2pG"L/4<,z21.Gd1ܯH֞283ϜY&1րg(+YsGs!ّjVQSӕφ#厰ذvq?@4 P&A~`ZWU7jYi}+KkV<85-ȠΒ\9B U4|+HK]yUx$+Kc*һ9cNҁ:*  G'Hf AU%, y\.25@{" >qP3mz5y7czH ԃ!O.NgWĤB3&r UM9J u"Z(_vE4lb2,5"3eݡs4qL9c A-jTԊ*l\Wm$~crYGRB`PhZ._ՍߤhUZzAn0cWOC|Tx}qfڔG%( (2xJ e^+,!J^ueDŽÁ K윶fʎJ~N>HTt/`j'\ 72WiSDPtɝDưWbHȿ+YqUzb8@kiz0IctEՋ3gRٻyZC9p bGGP#04L{!Rgy_-w' r:so7>=qe1]T>L$t[8-LoMXh&tGDC~ dz%~=I{2H~ n7}$M[S.P9pQCE1-a'Ae٩겚 Zt0!0ptJFtϖ|Fuzua%A/&dI2@tK[˚: ?ޥVy:c{*d|=1]'}؀ۀ48f \̂k_p)hS Kul߀6>n<9'>O+_25bWa;?ڃ˝ Ug/4#e wk'}z5XA 6Vlil5<}RYL~T{ON^G(bź'vH%\_^ћҵi ]_?ɡq~uA*}~zJ*?b*:TL2n*d1J;I\a`nrZWWTHJ/j6>?iX )auNWvy^B$A=Es/ m\um# *Q4p:fNO4~$}Kn5/L "YC3,}}#b*_ Ú/rF(ևU D2&~vYW]<߾cM0J~fc\PH+VNr i1%ao-DVҶ^K -]c*l6B8F@CXu#h4h>̅}fR4wYX¢9m.;_%B__=*U#BTrdxaט]τf/4gK㊦f̈́(bgQ|ݖ'FKv !ZXKđLO[)FP%mUX InRbά b=nT/P<%։:~ ^;ճP"@hB_U P[!MbV4q:<-gv}$3FWIDA]-t,>BuN$\FV{BȂ!_MjT2^]G^`K>Oޱo)vң`ƺM.@#X 7YL]~Z5ml#J +r yos?}I:42 I&b/F<ϒH` sŭSe3x+dƩ?.g1d,L,LLM&%kAU~%"E 6*i쓥jDnfݸQEgAgģN֥P+dTm5 o&mևErf!y{OkixE4@œsh*@"4u%L"G1^nCB'`SMO5 ٔ cQv6}ub^QFc~}Td ݃`$u7*T2߀i }[ꀍ9dnǣ _/"aCW6kSu:L£Y.G-RPC)x0F4 86{!Z]83vR#$$΅? C\囚G i~gi>E4]NaMlOCp*Vn:VJ unJ%hdzzKc]Ԡu;ʷ̱R #T~Ce'WC<%1DƩ0̟fz\2Fݕ@~쨶A(+񊅢L@0(@"yʽ'?~?Ҝ|!E! "qɹKgy:"1KzAJ@,^Kf֣P_-`tf9 l¢g8tPQYeɃ `zʱh6+|JB3V!WuXZ`Fg?d>j:bʲl▉Q p9I{[-ilH.~<(c=\}:ɼ<,n!3'1Cz6Cwr/~p?aB8`_Be18‚g~pv/—Yܬᑾ45꣋DrגNN8փ26q,.0y_K5_fixXE+|Q۔9YoG8ys=$[Nz3LĞ>@ѣeWHhsމz,mu"VBWҩAa>5@T.0Jaή8pւ_G~^N2j,zU?GugH!娿Ύ*5_tl`U#ĠκAz@(;Jm[?[q,q+SGrGʷNtTiSORMqГy {0$b-G{3 įk=+޾|J,3NBuSo(OJIjw/u}3+r%^a DRT:LX)f Wr[ /2[":pKq!2Lы=dk-. #oNOW㹴X ϸzЊ$V0bVk{!Z1bb|Ci}O4ؔy}E[gҟeyP']5OPx!&U)kXNN٧IRh| KP#\5dl! EώʞD47ADHf]Rj]7=Vfy>cX6;@m\Oe Rc*>( 4zwy<+LƆF9㍪3wv:pjXHA^?z2щ6Y:&\bg$vu\>ErCΩDp8d`kAa-H2 JqhJ2qz;i)AϲgVUH) QrrHU&sHe7E9pgQeDmޏGɅbW$[ه/q!a炈yq|BHdۀn ׷p٩=[wFp#q+GCoStPns;ӚѦțȯ$tE!kޣL+ҁawQ6؊ﻕb c8<աtDy5܂߬XPxR~<pWތRHF9dYxcTj*(""xSp-7n,كZ=45ޞuO),E}/Ƹ2qcև=eq :/;AXCut{تĭ T/&C&)qT]~ߣ>BFGyH TO:oYYW~G?7H7' I&"h"ߧk̥w('%iG 2K<I;ge%e>|E"d(&@zɳmwqbE3)v71d$murGL2Ŏ#5ۤVV-ͣqzX5U3"MrH&uCa> R.V1fGXB詟h1vOPjaEὔc:5>0ؼʌ$"n ^>d=e7#Nò\'8^{8t-|vRGWMk@`d.0:ixW-h3?P0[/Ije #G `XˑO*==Tҍ0%NٯW!vxc!j80/ߥFs嫡^F!^gk4)>G‘!~gdYIo˘|mp#:"U`Xz[VȦ;Zh;A7Rlwſ)NhaG$:otLÙ }oXó[}p?hw_0L_3%阌V6ϏݲN ĺQ`i$CjP_w0oJ}9 gc= :S ]5?ų'eG'2AzqrpLIKḾԍEJ`rEW[Dl6b") ![0j U H6ǽ S^WZy4ny)^l:}(4ʣ(3 KIjh,;Ѯq.x2>Rpؕ/VHf!(e"r}ųPdM{Ё \p85Q? 4+;ST:˕?H'1RKk*`t6$/_Y^2l_A[1x-CѷCUjX'J} V<ˌtӶ,ֱ46Ӫr~P#pwWN!T^9 .zHc(z Eg*+J\e2Jr-B !#TeTڬ5'W˫!ڬ fPչ1z*c t_I0S:}F3{Co.T)l$ Qzw$2Fvm(;r}\-hH.4RPGq#@s@l"22tr] H=R>mJY&d. TvJ[g{QCxoE 6)1srC=>/ 758cYE4 L8mV|bS-tEE҅U 9xtOPvp!>9!O5~ujn%Ln1u$rU-lpZ7}ꦬ ztˤ)X.)ʉed;g?(I{qhipcvLP2*5ZwG e!@D#,*\k3_WM 8FW&p P({ ,=b?c(^:sEh==>v#I]w\4PV:fV'0E[TSlJHZudE5-$f{rtgO|-= }+e,< .'T#j܃Bis؇ọ!i,MEEm4T K*>qtR:7d3#/ Zf/E_Iz; Q}Rs+Q|m08!u@hk.DN{ 9tGHr "U1HN0dD}Jۢ!Lb͛R`7@~mK YXBy%$J0KoZAm5О0t_Tup 4䰈aɈmקk"j¦Z-v'mwP".3 $,A̵Ol5^l v(]~\ @}}jI+7G%(v͒Ǵ_h`nb,>qdOP7F"No[*BVs ?Sp2~Vt椙- .9E p;yߎc%a5QOP)x =EFƞkpؽ)+hZAb_՛NL]kd &H諘+Mi"cF;c9+뫋y(xZq+uq;#gSo#A_&=49'z!xe/A5WܪU_Ԉ]|F*هs>g;gn#][թS?b@N ux03`G|`qE~,nݐ;ϛ-Qd 5]m,/ʗEo" ~zKAޣbU *$nxBx>z!r韞?1ra{w6^`NANꛌ t!:vӪa&o2$Taa ]16I4s50?g?oɗ~SaȖl~ ,~ !)g:z{WyǢKxUM+lG\e.VG3K3kzF8нP"Zcfq a##v8=TP<˞7m^Lp_(ok솒(ЯldUX,ldJ:+jݝpˌi(3tϗ9GH=R#  Ѥ#3K*SȮsg+ ҁ`_{BmMXNW]zJy@c`5M\g~ TDW寚 ,[QepodGCyvAĻ'T[8:4 4mI]٬ &[m$wĢi3y0+;s=Vj-8B_8r\޺'|O4GU}O,8X?7㯑]`4BXjHCϫ^LZ,UTvi|̨r]ɕ0%5 #˥BJR3i UՓ }%]Ù#7;uTmؚ#Zl &}sP?%CP:l`,{VR;S9|׍l mi)%Ɖ8V-)Zw޾_L%F[ &aG]CfUrV 3aVN1tdc.lOYIoU6[?t#T12[^uDIvL{䟦đn{wЯ\!nXQH%QVS(2 hD@Vy$9|fP<+bq:AyxS'$TZr-Mt&@"UqzK#yjpWnR#ɍy'5'%JEV_l<،BN`? 'ƲkQorIQ[G›bJUIKq 3Ա3^TOJ!*=r a`c>0C"Ds9ՋYJz+w_N؜,]QobҠt|wXe~G*nփ=0 O1 i֕Rl$?bRT?`K$ITC칩Χ$5lVYB/^ Q k#ڍ,8| Ռg҉8険vz zM>次&QJOLh憧}17 ^V5󸖫Pcw % &)u 61x|8/R)Fd ELKM!"xZzR@ LDtWf-!r9tۥ$IqYG$5 0ⷝ@a =}7 _xtsDP`ލF)I';-GhB2t[MF(|l(L,d|o6 EReX NNTsP]QQoL8][wӏX^_͠@YX&6>Dj-LpBX A8BkAPG_ΚW 3\(L#l9Fܓ'Iڡ%sE%[·C I67%Ȭ.[=j x'f"fTRm9M{Ն|n?wZyQUV2OEb4qZ_tٻƈ6*1^ڨ1ɴdHD 3Ws4:M3xeons,QDh2uA8J| x*WɆ^(eZL,|sIJ^]Potv@R@) vٔ'I3(!ću0k ~c- 9:]XߗoC׺}qSti?* 705zB猣༔ٙЃHq0˚R;uCQ5AS,S":,y -S (v.C>1@a;V7p1gZiŗS($qZOuX'Ŕ# W1Pq(hVRB]ᒨ|mOkq=Sv[M|=vHGظm!,ϐڎӿc=J|_Ht;%uұ (@:IHDKX}燎!=lR_wh_ECW%ð 3?|e;0NqfA HVsHb5N}P̍}u]܎tق#ZjOW*JQtKJt|rSyAvmf%*TvK*hZ9Y?}Ԧj \6[/o6xεJƔ%wQR4] WvS%Є. ߥ M W`~'uNGWDrxB쥫ɚOW{!*%P  Ζ{~A8&ل`1P<'sQ`"l4~[['d8Q O?%P} ),#ԐT ޜ[AHt%>\Tl !aPg͠j 5|qxŊM7,2lg|ۘķw۫-[CJA,!lohae9ߠ9T{L!Ҡܤ UcIq'>׸ 1gaP/)ˊv0;Rr\ &׀=.\>/gI j,Э{#.4ؑđ]SbggU z)չQM9dj?$t 'HhtCъ?_j/Qը%Gr_d]9'72 ZrȾkx39llA 6=݃x[1Ȏ i\i)/NszVP2㮮r,Hp*K?>##A;e['EPZ!]%v,wG^H0N,Q.v(Ӎؔa73Qbrh%6"S׻t hVJڍDˡ}56_O2sVb: ڢ:#_<^hz&bIOA0Ww\1HFM^<ǎ,A-wBn19p"~U 4j+/T=* !~9^2%f %<.,t{s CV[D[n(HC_=t[{B[>*6h },QG5^jlQ_ϷǞ O5nciE/ww2lL^4XTêS+Eֆ 2Q>ׇ_;"q$G%P]˸!;MJ/AD%o ";mP\-BzbݹVSdI}FE/fk i̜{KzTCs|̼@B:=2EJ(0sc}켇 f/cwg}Z+51~&n^3ˬ#Z$`{4S2Hw6:m} i^sZ(,Xl 顸gI8L6-r􊍏Z@td˱2Jq4m$hJẖQ}7U0I~wA5C PL$l* _RhܡcZr@nhH0mb_Sp_`l\k·cS9+;bS_.'m;[Z3퉻[FoCVyިquײA^hC0즕P]B63/09giaЄu+%/P)=8D[n9_ۆjn}㚓W Em&$y^:`gQQffqN0oا$-D.h@N`SWtq@ZF7y y)cSsw~Aυ # e kF&6Mᛶ x x^46 c\)Z4bcT ?[SL\ 6}ĤV09^p8IFQ_` Pk-# dL.LCݰu0]Tѷ2˟gT # m \#TC̙u};Q]/e>S7^KOcʛhmYF`K R&9 PϦXk߉DiJo24fNj~HJטŴ7) V;)bxoPt NEdPdd-Bup" $%CX/H:x@j김Qߝ'zofsNx#J\+=Y_eˌpWFF @Zunp y63lh!4 :F++9yх9px&[#j=ցt"dM=_wƀ:%T]ڟ"Ur!|1bcwxJ%,#ežN. 4貨gxwb(fq^eG\8-܎hj E4! ]?.d:ɨSpD:cי=8 /(Kd֗v>,<2R\$1)I2Zb;'kB9(P̳s cuƎ'ۙq8^qX( (%^B0eTmkSmulY 0\EqEohDۮF߄т#f޻.֘IO]irquh2y5oYعielAEoyFؕ2]܍bY̊,m0Ѧ+hhGbo=S܉`t6\,n)'x\+?, Y?@bv-Ad &񊂍]Cx] aҲ:P!< 6sYs I]9RYl(z7@Jփ* ȫF( 3,:~$4%)1,SXR"2!u*͖K]|Òt <,=0|a%9oց G2rm\0FP:3j2]-S;m{U>!=o=_2"Vncw[Ufb,;=MTu B8A%cr1i=@VL+r>g!MO?zA&L{ tV8`RC /̟HVݵxﵧƜGTO~xG =E/8b+K ;m*$- _]SO״rĭ9ׄS7LY)*=U:xኮ%_15E,u=jZYb4V{ѽyP,aQGdiX]!/ ZeՃf&p)n8Cs_xm$HyoJ+Pt)C;p"d/Iv&/+}IDT6C=n֛`` \LJ}SVrY=deގ8Ȩ;!fPpZd]],@\69A>w.DjN_%b,ڻww?IZRa7!LexD9[k eO֦ĺ|cBaW*B֯34t5%c5iPFpW5NeH[<;7m̒Q`TJN)qy ]4oK/Zr_0͕+f3'gj×g>.E}p$B<}C#y~u" J_@q.as~͇CFqT޻ j\J Oa5đ%CHx#ĉ8i*Z 5fjGSVE j t dN麝@]x竼 ׺n,ۂA@9)! _>N4]zI#:yAAjDYǢ5Y\ڟV}G ]VH<d?1!jooo߯#fw$ 9,ڥƾ?,ɝX|I[|ҩzڬY׌3 Gp,L2F$;>}*e4wla5Rk~N'c^1* K {>M <v"O)R O7ݒfbϰRYt e|T;]8WRKVL 鶉 $<*u9D"1}{@W199i;w-ӐX  ۫@}ݐ3-DPԱ  wu Ѕh{}kGE{eI,Q]"f"(h蒓bW̳ΑUey$ jC_QwxA3- ~8g**oJ85aoz\fXRy!h&% &ucʍ 4i;oh ;*Ԓ ^m@Ff{_%3Xa9"fpK#նCy2OGWVGhpC;ݰ;Nt"qh jLJh&vLt)`U\D %)DtJmIWIӡ&%\eE=V *Q!!6ӕJ_7+Y K, _r 2 ][΀n-;1^b̧ 20{S׶l [h$F;'>ѝ!(HJjFu,iMS  U栮dvT8a]$TV2k VHMZ Z[6o&r5g:0\5o]^}v3S9gB E{Jk-n% 4n)qcSP+gSB`H+0XNɱU+2g.<)m|l34À橯9f|z3Q6=>`@% @}Z\ػ5#a<Nǻ?B E 8{K!# X4I%$YðЫyu/L+)|֠uwNz9KA62 C shLH#jr1hcQr٧7 ڻyE!aL. Hnh!O 9@gND`O<10{uf6~;axW9k]as;%XݣQF">Fyx5uwݾrYQEI9xi0\]㜟`kϵ(Ityp+<ݺj\\En_p8gXdZdx.yINXm +CX!}k~ hcJ؀"l=3@*={2Ó<֋ P|Ls0A ♵κּluk^D j:]*=ńs\نʹqGn0'Vfvk5u;Oyq=!޵SL$)|]<̲1#xhx;ĝI;6iGkr'c: n|T7!6=6V~->ZBj*՚wwb3!8n{b'1O -hls~=2X<!^EPxj{ǠKiJt;INv=%&^ m!a4RKDd%t MHJoptl~}]DrB1Stb9*x LvI_m)b$XFq'_>Y`/:7cd ɻ I* B:n~0cSw_h1oLVR8n1hd s =Wvʓ5S8n|®24u:SI>z1 k+^E`|&>HTRҠp;f>,C!HV7=4wyWwi'+#N@᤾떨ﶆ5 2Ob5Rc Y<՟LA.&6>CI \ϸI4_X[G94Nʹ۷ZxO@IqD8kF5T+wJֳYS/15PY.׃HR1lx9#}ɘh.gXYM-?,!Cq#lQ7GØHW6K7eW!f rh6hޢH: 3'TLڎqk}lz x;^c[}T&|ό U Bo4'ovxg )n%%9 ~= 2P{]?ĖNx}>\ޯ#jv֝e?@paiک,SjEpO QuN*'*2 viӺ-A=d,zd=A bԐwۧ(kxo42(!ɳ޷U%ižԗY^QiO{P'8aY}LZ&Lb x#D <'5dLJ#lbE'`p!~Gٍ }@YPauiovR~T-wU%ʼnd3eՉ-V0)ߡ咱D#-€x&׺6E;_c!@t* lqٮ&5V>J$P[zC|7ͮ9IE7# d;uF n\\qZuo>4-nVUҔOQ@O(j Mo;a:d:DV>0r/͈tRyk oq! 0=VFR1ieѢQKY p$+ݖ[9:4B2cKhM\̾˞&8E CFuhUw|3mPgIV>CTwkw8JSIQ4|ҋɲD?o.2)?][s2WDdp`5a! -y9k!2s _ ~X Yihŋ+_v-Oe%tgEf{<1D_$_֎ fТyGLh^w$H=:}gokg$\˔bcu:Ŏ |-xւ,NBxȍ]<8ޑ{A6Q <_PٍKeFiKS 0 Ϝ12p.UyA ~2SmIYMEc0a  uG `O=#깊P62*S5Bf@T_!M͙-Wɂ1$ 3r߳HsR'{󺃨bԗczQE>b;LК>xړD=Z/Ooi爕oyMOT3{c 2d@ 2T5ccã'ZHx_"4 #E6 HR2air>Br=JΫ-pk .g<]|K|YH:8E">]rfIQ/(SD7H:U6gD%f#@ jSyi~%1I{'L˔6jr`wOV Y_ZTη9Sm}PV4H.mk)B?I 54&NH1KM{nTPَOoŒ{Poa=ӠRG p(!i dT(mia*i]6bp@;a}R0 d@ c0;FQTd;+ 긵KFi8imgLyjрFo'1; / JYh7d¶WEMp$; G=\_ o&]JoK3m]$Qq 3Q[(ć+\:Ʋh}tS$(q&BZHr,>t".DTU+rwO%qM4~#*JtpxBAeB8G,TQQ7k-VGD)-Eb1+>rW K0od؄0UN3%DlQp_gxfK0 ]y>H=s0vH6Ë-&b ys?=f[T0aB}^K:Av8T)&om0ɝGyȶ>t:*g)azqA-!7'haݕ4NQ*Wf#x_ˤw(`:tp%NIis|kLA?HeO@h'd#!U-_2I.vӠ#X_/>_mpm=x?]+ː?d 0 SZsS~}3A TOSb~B7d]i<&ԛS.-!jZYk~dE'fV aD pvs$NgV`Ǐ~gT?,<ݼm7q70*vi-4h~pIJI\b^`$q$5 rauNnn/{L1rjkl4okw{dJMbIa@Or> 7A]s&|jΝ8T˰Ϊmr߂^u!V0H5@3b&n~.@ J~&e6LўU{y(1B5 ŏ,C1=*%{Ubߔb- ?R}Gu[\eHIhg .#[p:>)IIԘq^ySMxhiEZׅ]0,1(h_96`.g*?x^;N֧uOj"<KIhqM8 /Xy1+ }:J: T7U o}rr{^gmCҌ^v}9$i:4.Kubsi]9uJf#9 JN.7S64v|_g8E󔅛)bϨJZy]R.Y݀9?m驵.˽,0D!|{NĴ}Y<lc˃rˆ5,o߮2+a18Q/JşJ}>)PHa/ GSV lX(boݦp(O͜"K<uVÀ&67^bM?{ktEXg}Ү>Vh6,t];.IW횅n% a%8RVAz i0n"8{u.>C`@t,zl(%k Z9GXhL`%7tOD̶ KQH!;=iLǍo]h~[ &5N'WD(zyVvJ'Jlųxʺhf_V &Aʙ+(2S*v,|g6pQ{)g G[ 8ktC)M\hs<<܍{'32"q&'Z羧/UJQ#@/$g[\LLl7_nhǤ)ZX9O4;Od:&dYc/f\<ÿ7 񱇁qc|A*Tz5 xz?CVU(0'y>g'mD%([wI-[IMH.cFyƒM\Sf+04`ؿ!ra]k ~čT"jgR'f:M*\}e-'PŋdyI7|,ڣ@3)-JX]9Cw懀'2lz=j K'?~z)j zYP}ɱǐQ8 []c6flSM= -&wr `9$@`s}= p"V( b1+`=v۳T0UYV1S` cfBl-W/Jevn#0*eJR}ž˖:_;6rtVfvK: %BrMD7sܽ-?@ȕ夓ft9.;*jhV tIfI@WZȼh&NVCrWpzlh^-?q#ў!Zձy/ -ߩvdqK =A> z Z ǢPpeqyId͠ E³>u.ѼiMyS>^rE”qc+mG /6Cm>?TQ=7fIOpZMazoLMÿFv"?xXIA/)fGA-2\) +|0^y2T_sno]xm(4SZK0=.- 2*IT*Uz[ٱVO7e;AS ho=vخWhqa+ yÏϐB>8OˇRƴQLvrfQw06$4YЖ_vOn6[ Fzy}/XG4ϔ۝R|k$?Uw/hqlN+tnaQu;M98j4'QoQ}\p7`.%"udR@ .)hzSu2-1ZG ab[h֔,NJ+[XC&(wH$G;4, a]jq=/AXAEUTCC@J2oU~S^Q4X|<)GJ&byGs2 *&uxA„;Ya$=[yYy 跲zxș#%oWXQ"ߊ yA%R,o欅4D0`S 'PÅIN8q[pb01\^6Y<~庭xͳ++u`a ]޷m{e"0ז- {OK5i uhj . {ܷ7lp$)G/-SgJ\#]HnKTD&4Isb*@02 D{jl)?K>,mE7P&Q5w!Jb  I#Wn$tUfPa 0/!Q@&viy(?nZSڌ[z\ʘS&̨[U l/M0vΜ>G[E塌p-w7qծœxF"Y n۴ѝAuD8K<3qK=HD{8klʬ؊;~Lf0 lYaK/fI>lg+|әNXb'n/ Z1OF)W>Ꮐ,eLOK!7 =ztU8.r.tZs>٬$e3}}֤u-g?*G&CnH%Dp<`V ]mm9cnca)5>vEKW*+z8\zl)N[I !sMr*f2t]ȔJ,kvgEѰXQOfֱ=R\_.8lcSCl F)r0A{L&Zg!;6Ս  ~O&M3UB)t)UZ: y PײmR>f VȝϭYT';wV/xvf+K*(NoXMvʘ\#pdh & !m:ݴ<_2W2rcL6n~!r+Oͼ\տPB9E +Fg.ް^K;ʪG?73"& P*ɀG, }{yN0~Jᮏ)q^>~JJ W5OHTt"j~pur 6l[ZUDJ@>D "̜Pq`_5(N\06lxXi]pb9EMSx{jj ?Au2$rpCy>ZV8gyu*\^X}͵{y!TbNE!Kݦ's&gTe[jl1?NG.Bָp S|U0Z̹ZWpCL,ޘogp( ȸFnBm#Q;8*Ë ե؉ 8Z[-/AT[\sOT1li˭|e)sIku֗cY`Tb@}{ m9:ȤVD)MYqMUUK-yD?&b^ti@CN<m[tn#g1p~P+_]φgA5`cfS[Լ?ǟvKaO,gf힖-룧-(ݝmdM!r:9-"=!߸VܡAv^J*e~#*,8OELu4yTۈ*@)l7mԔZiOFeȖ4Wi۷ׯmjr)r5gX}AsِEvf3`&28$3Qs:SV?F ^gkI_A VA>Ds*>HԢ͵ӶORAgY2% 0uJ ʋɮ uT?E _GUxNG˶Og?ƂC)_ .ۛ]QvKPK3CLome/v-ơ)1WQr_xFvvv9pM\ ?ScK+qQX)䊨:p\׎1S~=wP]ڵPA KnʒX4 7emLlS{uK]Ubg #5AP6[ks̗M$%%Ix:rBڔ'`Q_B TS'<SY)lLc^Kn vm\N M=L%ӺGU=Ew X_VV'kPA&+lKNΉD鹀ahÖ +>+gmqo\)9ź:v:42cG$Ku8V(]L/2#gc"%JZ?/ߘx'4,\sĦ\T|]]lUG}\{e˿] "A]MRkѹն:k-zv?OAf#~vtIʌq+ l)=VhU(kbzB5F|ѓ㞩2m^e}~˰>{ E$v&$ lq/5yAgVXj@(ȖO`THԽ,vnZ 8>!b wjhm^IUJQ˜HVqvd % `Ǘ{*͸#1lȣNh3~Fւ$F%B)3I8Q~ZEǐeHC؏*t,` Ecl1n<#񏆡d6C*G𠻥5FG"xZHOr TWA~[v%֍?;rU7P0~ Ncu3]RJ\}4?yX8tSЍYY3Č8͘8a\v7-C{3+/ [|"[C %L9u|9'$Mkx{Xʇΰݦ#rқX>H&wF$`WK'Wl_]r[Ij﬷)G3n@f~S]R/;S9zхjWç߫8bڍVy" ,"2];܌Fdf> M-c@ 2}#IGh"WutNj>s:檘)q UO1 r剓j_Q 7_dg @bqZ O\b\@}؉_WrDq23$Зs3@#hC'p "F&P̷6PL!-^פAH$S8cSrsLdi>‡kCNuvtb*]u (|VwKkJ.4ę^5P(1J` n"JyZr{GQZ&A;p,ƷID ('b?PU~ӃQW%$w O1.eTɎMU8*{z%Μ緦IܿϤvŷEй!tO9ՠemrzZ7?]_&+wb'A~$Pg@ڈ3E~gD+z.l[:XZk}1)@󂓌?D#qy%R6FQѿ+Q]!FgK}iB# ?Jaa]GА', &*olc qSSjd"7Rz{5TD~ Kܺ3: hC S ZG#͛U% Y,\kg[J~$H=(/0UdhsCDBL*3\& J|IfC7(pJĊc潿^Ib^os}?y39DC`~D3q7 /F:զ\1tyϿL(uƲ|!et._T# W|1q϶W0(raGcCr˦4#b\\OP$Oq<6X/ KЃ罟jK֔b!<@y>l.smlқq_(^L5L5[;I.fbǠc4L3`z!+P ϲX )._؝TN^7wfZhl4X c=IؗA}HK\o>PN\մ4|@}̳\DA):6֘2 Dt8˟_ 7RGku䤋̔+9XefӭT~i $v unN~W'0&K3/2B`LF4+|}$mP9AW!+?٭~wH.$Z `!?̄uïW 9{ZYM~sz9Tm[XJs48FU ^lm$ŃIu<KP5IUϦ\G-m;~4V;đ]\Ů(,!qss0J;#FsVr^It@/e!!:PٕLw=:qC|٭=u2Ҩ~ ޸;yg菨)Q3gqoJ8MH v9}R00\$TYĆ$`qon<~WÈMԑoЀyU(ژC=ʚ<}>d_ o]~4G]4\EU5>9TSX (: 9*䅈t77Ln2~Zōr-6a]dXLKyb[f s^ŵݲTbƭYfT~vf&MS lq{Rt}nh>, ![2耕^DJ!1{O*EFsp•Da\^i]OWz]t k6+dC؂I8 IAeƸl/ߴCJ(!ۆlļ1BsBg}:1(XB"4:}#et3518'#h=Jj{D>[M*IGֈYo| &<:z3;)$cϗOoݖ{QO܉%# yIyF Y/[To:nFz8-u D֬fFFӌ(0\W;Ȓ63V酥 XOR²H9ڐ8@R Aj Yp}>&8>^wcWnZ29Y5&!pi ų)/+Ak-µ|~'ͿIeb8, 3h9]C@Xh.H*T:oƄ-l_f$|S9ȃjn'#"2W ' Ef?漃z8rܶsѿWbo6[OpgKUVY@4[taNJ5mdjHxg\Y{xՌ鯤M/>zu ؠ%X*^?ts<Q*Zf՛ e8 u(MtJ`,!;2]P_mDRߋD3Dӻ'%%krC\<ؗcuށ@nכ`Is| Si_<~!\lne|x-`TuS*;jvҗ)MsTBvyvs͎Q]gٓ+r{GqMM Fq72ŭP=|26&l^#gsԥJ@b0CaM07=?|+eЯ-|^0B)ldCօM/nI5Jr(;%Ӫ.E|.g-+b:w[6 tԤ`"#d1xV NJDA@ҢJL8ܒkˤ+JQ$dj`7i'Jtp[BADTxT8wdQԤÇKۀ38`T`h 9bH%|YJ?!92ʥ .p/Y Ee0-U6A}疑^"Q<ޤj9@ll:XbΟdn=W\-{ όLOHf b5J?zL*Lyp^GXW?'-~OxtU?1!6R T-vO:j/WMuV69B|l۳憲<ĄO†\aO,FTJ?K&oƓfd"x5o?'%<$忞5*6~ҍ注 c$hh(gU9pa)]RyU6Ju@TZޑA_l5N+&$r*OS24jclallߔ[J,#"* 1ax9]8`5Fe+䣳|2WV`ELdJ 9:ʤ4Vvz?/閥,]R(ݡbGhA\rivjTSJ .-PH% &)+}²?T8;knKkZQ^'18_K>YSB(<.1LI[CBy'L5#lKބXqXBZg_˜\]9Wz 4  qi6Ha ƈ,r\A>X$QuԌY.퓼˦Wƹژ_tF3jlA\J͸ ԧUƭ=nz}*kc>FI,^}vfE4Z#{}PZA&4mI29*S(=tRt灆B5 0PD:C's'OMHD%"=c # U">=Ѷ& QH7GӼbuwP`Yӣd%O={)I5g |-fPB7H7SyN(\=(@Z_3L*-\%iQj!"z@ ˍ Fcg@ZKgCI/:4v;&NEl%ro)v~ٱTh ?D lV,y C1+{7v3 F*[M3rY2FgHyN(-ZvxVa(5Bd-^Ɗj2;pol.͵#E-r CKIˋ{ڶăIole՜xvV}k HphrtP܉a xuY4oC //ĦuARz-0%FVRBrjJ`F8s Z,EGvon4I"M(x5K_I9!y@Pn6aJ.ܠBE *8(>0k#{1t&)v AX0@ e%÷Ӝ.y\L5c ?N†k\c_4-YM@bǷر6PqfFQ B8JPyeߏVaFkC }N(SE_Fz[AYhضCƀr>Ac&xkR/tEV܅.ͫj~_3j>$^ҒL(a܀%F@b EOpqTwL2F{̑/&d _iMyzZzϮ%~.8OM`Ķ*0r~AK`ص`|':heve}/uKRʇB6aEY۫/CpRg~Ӆpa:ƙ,!pEp~p>)rke<ّ GN_NT?jL"Q{Ah lԚYs¦dw 2:GA @+62uS*F nWb^05M?xE*&Ǡ eרɽJك!Muo5aM\bBÌ| S66gKzyXj8^гUb Ȳ&*`l.sEYlH˭N5,cyޜGI%SGWҳYv<}/Jo_MN([g`ljDb9eϢ; C8yl@s7A=3R; td۬LGi,؃J^v EJ5c֜bJ_lwś$kD _f8nIAhϜabݑTb(':04GXC+j(cbBedfd ".¥a_u3q 6oX7WIMz=]nͧ!x:Z-eMݺ\!uo!2f\\&k3Admŏga[N7R2BY(j`mk34Y_?se2$wy?\?`w[Bmtfͅ)rH 'zM0 $ŃKH]X0f4"' ^eL7xɚ~MWCZ&8QyLKz w`wL&=S}5%J64(K$kUNmݻ񚜢='Å[&W4:Rv˗Ah9Y=ldtЍ*5yjd=RZϑ' I>B4 Ð$p] ~sV :cAئ $F_)0|.gBFԨ(圶 ٫AV]J1ۙܰci9wnAu?F*e_bS:16>7:k-Z䎰p! "XCs>~6 #*&<4g8`tnG1QFtfbFc7P$&R:T.LG~A j3[)f>)j::!rl;1b> o9ئ=;śpk]G5aI>oa,L 1d( a6#?QQh})XȤ m98Ntuַ܂Mm#>c!/wބ[ UTEؾ.CJD= _^7'>jҖOh~q]-1&9k3W7FXt {6LQ+r" >Í,f# *x ;`OKRnEpyw#[M֜ !JWm{[Dcs R`^بWMuKtS[pc寋a_? xhHɈC!FYG+U~ŚiNiG\[*ЪJa"z fwU?cDyOO;AsF3wjonN-Y^Q.B#Y.#r~K,mgH35]A,7j?}=_ ҚD$S;O7mŠ0`DS w3MK;-DyzhN2?Hn¨>fKД2~H/BYv8K^5 qo^J8yO'RPkЋ$dMh"I,:Tu*tC - Zqq=?z5sFë>hl]dr9P8&?bL, j}vEHPy>4,Kj0PXvDZsƒng@ O[!shC] 䑔? _T5P/|VϖBvb8={f*'M$vc^,oR5 6@65@&xD \6Ybgm^ܓ`%0: [ϠyXzB * Ki? ^Vt<03M,oݟu+kXMs9WƤcl٢~(?`UYͣdh!>?-;в` {|,wM6$MWҳ5rC(U/",˳1(re> jøC8*e3'-W֧_F)tխf}ƛQm(*qVU6(5Z (2p"H9 BATa`|(|nحǫ"h $$FڌW5Cs.8;.TZ)>U{0ȇŔFx6.AwY?fj.4XsBFWU|#v&C ڢ2@̼7 &X]`68DF% ШdQXa@PYp ilBOJ*}-N6^*nS9U& .|U*_FAs $puI\2k%1WLIQڸ/JY9FXGJ#o91)8 6P^Q O*·]إP_P?q8p`l{25Sy&k<0+ɮwb|imuR-a&'ÞD,~ R]iBZH NR>SVKn/G#}2id}0(+^PLk Q4P9G"q$1Rm^U' |Y—}B_]+s@w]aWYOw 19:Υ&bF`NMLT_K`6 ]O02;h_ԇT.mY:KXy7 < +8ɥ0v>Eg+愾l݉Ǜ%J}vP}\fH!M<|vm:6c6( }hmͫD"dn˫ɡ>15ZMEчWȮtcVt{y R] 4:t:z:ʈ42:-,oꁬC2vl):3|3uuq{k>1γCW|YC<1V2Aoz6%|/-Ube0R cZq| 7A`3ì+ Y`ٓw=Q]vs%T7!W;QO, ZUiu(sk+X>e״4!ɸVA`C8-OS/C(~qu@DQm؛Cc8N?-fKdI#p$%IVٍ~uZe_fUhP1::U=VNfϞ4s,ʩsy]hI4:OpVN7V7נn] Ͻ 4c\maWH+n`8F8l w5~{z]@pp5#3k6Zc6 Զ1^>a38D#o4(uf$9cm`nWPpoře^q/ߥ9DOY&ֽ!6 RKlT[Z c}:JzV DwVx{1JJg`axM#Cs,kFZvWL6-2`>Aի岂o\[H6PoZǰQԺlcTOiYKVw|dE~x@Eh dD޸3חv6u!Kd/+To̚C wc6T"EAU.9m,1gP%&'>B*n!*{m?Xp]~*Mo勞kCW?4V:MiO<)xL˨?)Wqeq7`:1w>jq.ߌUicl jZ@KexbWϗY-(Dü2)u]y*~An+׾FE&b6beeKۈb#g.۽Ҳ;@Oc^җ/ۻL_iI () 2!wGz3°D<Q^-zt8z>,Bsktf k}ʗ>T(S}gmd6d>J=wH@h_4U_vS5q^'4Ss?wL14WHɢ_\mpf/?HQû\jKθ'r KF{|'/MalR 2-ť,]q@.aL{T@N'hyUTP *џGPs6@.1?6~!K_;5J)Vm8Fc޶Q8 cR&P-BI0 pRV`Y d(zad O"u%eZt nf$ysG B#`!plڨV. u7u]ax(T mzeaG3d-.H!GDRj^=?MSAK "g{zLؑGJOw_z@=ZPt)adxt۷X3mzB1u՚xg,[K{s9 XK}6^ `B,xK @xso[wTɉjɳ+;6!Fr!Qۍ3I.;!آGcFSo1ß#lɗ|Z!ńX@X8W0ȴ) p5InW󘡌3}:pesG}'QPHzvĩݑ,;IHĶp?CNVuJ9 ‡zF3X+ /w?P6؎6͚ [u-JrmOʪ.;⟼!8%ÿJ+!`d|@-3D ]} R{GLoՃؗ8v+h.p萀SM׿BprE egI95$ގdG4"#*r9:{ҾY'"|%OXA5xoÃ-`8, &9 ɦB4(d3t87T=C &p*]pr s%2p% H掝26U\ircm5¦{Y@CQK9iלyITK)9&"Q?⿇vOu=3,F8!*XJ]ULːۻa]4jW&؜d#%H2oɚhJ>x̥JlC[f܎q0bs3xI`66 {P>uSM~xL/7n-Vb鱾ֳAO ٺJT`ucb&t˵ig.\ 8"ݸ,N ߍTV|]N/ 2 hXG@Ȯ MŲf+\--gų< BKJzJYXrP?1ZJžQiA vQ 1un$wJ[pCM2;x$MW=ӕ7{G9x^^$ ֳ I/"jply'$$BQD: '!cPHK^,R(R3PFxgw!HH<=[$_XSޥ![ $BFc~n;^b%鳂qW:6ׅpg*e]Yz$YDlzJ^R:h['eSڱnw۵6E+~`FFgZMGK&9t^xE*fjKIL_-YJ}OkLX-&ks+x1^6> /ʛu7o"DDa #pXcegW}MptR^&d!et}SW>JyؘQi椽J=@eFm:atQDj"7R{ (sXH h' U/ iw 7#ʚKx}ч(MoF!\ k~ߋA "qzۆدsXruJ,~* ֳ)LE*Xww2?ň{ j<(ru^Lc_;>HHr+ Z źT8o1կ *Q?"|E=;K-DmFzI~ L>UFӃO@9MP\A[o+q`įnJ.$$|ȂPDL+ S??`:C1FG K b7MWZUVntD͍3rDG<#=?#ܼ.`SP`ST_}"'v&l _Q(T_޳cU!ٴql1֬5Yfϡ;EKSQw ǜ˟4QvS 6)9bFf׎BU@c5vjn·2܆ဟex$ {;yrx4w*!!R<*fh~'-M.CX5Eg 0< (YND.+$KLE:wNJ(#Ƚ7Mq!B{1 ba"/]eZIׅ1-@Ar@ϮmdnGnpР1`m a8B^dG,ϙ]W:.X3dX(`b(~$ h} UcItOp{-ZM`X 4s?=k27GIHx6izeuI|fNd_ .n cJ1I.kyܶh]|!#Ϊk=uT%oOnPthepVeC7g׭}#RwQ_Ki^>VA`NkO\=FH{~֫a/}z~'*ðyFbZRe"PW voPz[Sm.t:c&ܷq{4l~u8IwUFugZʭ\Tǵ/-B20\*Gn|`dߩfI/3rq[}EOEGnPL"<>g{:EBw|'8SZ#Cf%f"N*| <\8酁m2c\$b$O&vyH^NSZ=FFMJ~ # o5`mW7ދ(M;4_#Ɨ dKѯd>K`2R(savHu4'T>R?GyU]-?<كu=Z֘,\x "y]ejnJ~"0Xs&w~iE/ncQ3I%!ӣB{3n >H+Շ;:v1nǒ=6p?Vw!Kl -*"'*of¡U\u-< Qe~yD.QfSړI43"mxb~D:SN52YM̟k=k `)SYR(a>ɾf8\b$w.Q ÑHv]pS2JD`/ٶE&T+ ߥ>JM%Uv;,3Xͤ3#܀@'l-0_gaKbD-&t`X'8}'51 ?1$[!22V@za]~;: ^ i:e5~'HGE=S"pEhﮏdr̙e7p7ظf8i$ v|Da fqȕq?9ZyP)[x^E~?@m[%T=Hp+?ЗDx&VCr'q??qXz(w|bq_0;TL(3HBƲg9|iP$Nhu W{: a*˻UXb:-'$Q@+;P!g }^neuw=ʓrxp,",)a?stѺRa1i"we ͭwko7:XpGvx^oȐ1݈vh4j4>Hi @KDq4zPq,r.8T!yٖ!N|!eآA1g)HiѼÊmQ8VDp1sgk\13"|btK|VzI_ wߔu$Qi PgyE=<4ퟨ7 >@4,>O,o %]tT%zK֕ӵ@IjS9E}13jo#J{ q &1*J{X*:Z3Ջ~hc}4}&^,8Q3C!jqEƞH#< {C'UєLF05هЃ51@tebJeRFj)y$ɣe%ѷ <_](?6W2ZJҬ̭gRk/ Z=ČFJDwqPf/PeoI7~ %5N/@ F43xHUoM{"JmwL%Jp0V M!bbe`)P~G{gbĬɤK )?^0Oa~rZ@o)E7dZq i/3HFև7CJ{x3Z8FU~arFEA ؔ`V\$>Tv5〚h"0*>S,T +X|bNCS9ھB##HOCvE]bjTJo- E=W3ҋ6F0>7GEdG/ BṎ5Td؊C[3݀^@2@hgLGRl%.l`km Ry]s~ʹfY\^A?@ {kR.RzkuNlXX)9'YhʍaBm`]HQ <1Y}jd FzTkS:k68Q`߼CH:BB\!.A+-3J:P/.ϴ{dyvq0] ar]ta8}cZ v8՟[ btⅨnP&:ES^~7aԿ!b`=)a@qxq3z_i0\ez9 Ɲ)Mn0ܟ?7=8tc{eƚ#k d~Gt%{oSdweZF(.Κ )eE%VQ -oE%.gKx/ aVXVX;-9ӹ| ȻxDAO0 Z_)I0EvXeƦ{%B$Mڧ9OM=,րO+i y6Ro3D8G{W}J/^剻bht-7PWVw3@8A0X8Քntlِ_|=&Tf7 ?Eaq}ty1_ 7Do3[2$Kw%i"#o0r[%J:qe򦘴aWF}-á*.^k/<»MԕȴMRh﫩9V=W<1lD׆O]?ڤ1xp2Tqf!`/NoG%"Vt1_d3'T։KC0"OgP+2Sy?d?~pɢcH|l<yz "kb3jY;r׌7iD*Νx0._$|EV cݣ3EcyF+2V2K,?4ǧ: eRU _UHѼ# O\kWOu$&^ʲ_mɪ? />[KHvYNYdG[ Fҧ@ >7וV))tZ4Kϫ{/OL9]>2RC$5Ūw7}N%fz'l7Pda/{r 4Sa} $M=%݀y ǨI )qr7(>$`w$5*k"-֯IhiZrN/*P}2ߠ `WuC"\b]6ɑbnWqčF ܽOo'aÆؾr|g?;zUZ(!xڧGԘvƐ= DkpTd4qs`J^\"T{N|*`;/ǯa@FwO$B&{>eOC`u6-0\иL$E2^MPt[)ypUzx+VPD J~[WS(QF&5;h7W*UɅ&r56Dua#Ɨ;R R3YVUT qv6=B{xX1b.O5W3ELĪSYtgzD?MM%P?_{gCK/1:*ABSߨȒҙqj)z#Oc"3o3ҨAס;zzn%[Ҭgeڵ0wn7sRJRԛ?}kɶ)ĂΟKgΩ[[* [*,|m> Y Ff#2{[QGSMQ !ҭ=M"vW${'ǟ#GkƱ݋OKM)n^Y7`+gR1-;7N_>(;mlkSЃH^;~Dz{G/ז/On`7Q,pK1%Bp+컘.䐺U` g7ܡ}J +NoBa9g1 adE)8tXEs~-_W7kӰcBr& OmjHWbt* {5e )];b]4HB+(P/kA|ҭ-SZ_SM3:B"~wړS_z_-3ps ҉b \-'3eKi4ltߢdo֯?w=e9Hq`NZk}*n՗w`w^IvrR7 ,R&Sv"Qt頯hֻrZi8+k.kfl{W퉊N,N:Olx+~|pK0LC&gHn3Bof_ xzLKL%tQ; *Co:MpI-3$O/";,x<Tǃ㯸~#" Ǝr'ʘm=,MT[SPg+n%Z-um#^H,W>ώb%[ 1']SFPŜr= ̲1:Um%22POe PS^1}lkйCc!DsxqIic9> |.rDŬ~=18ImM Ju  Јv-ddJ kgbA=wc߶^36Yػmj4 թq61"cM3?nai`Y^Fo05VQys:W}T{*M < xW۠NW0}uebBpfy2&ooavT/HaF `AU~[贰|}zf=|;O{]Mwî,MδW.*bSa5t`ıӐZ2B2'EhxV#tEŘ_@r0-iϚ|pJu3gEyD"0ЍΜaI-k_7qM)V$ ??`!k0cwMWzhz0b Pj2:g' *2$,qwJW##Z``T 8LMc&*a=ndW]P䟳!۹)d*\!,4TްEuݎGl۫q=j.#HM_FC !<J8 W~M?8$5AI"'z5j1Xtr憰\e&MWR?C5M$z8/NhV]C-2zդ[I+(w`HGyDpS'Nhr(W /KX[+Zzk0__v~r2{:6%]O$>~yF&z1uII-`XLNLˢ]' M\5]ytIϠd\|yw5)"xKFwR!iAP=y=QzCI7gF6W4XG5Z\@10]hW沯չ&q.GcgEuf$_g] wC|w 8#/u?(]3ۥ72-ʳ?Z᫂?忦ֲVtoABA]n̻fwfb\.HYA3IS8f Zyp4vtC.DbݏL{"@q~MsTTy\bqnagt[[pc*j}dy{sOU8qm7tocԵOw[8' @5=/ˌfxʯuƸ"ɥ!iKuf|Dmcp5WP_mXy"edgѪU ArmXEWi>{p2Nn`o4""&Эbw8h+Y0^kɱsW6UZ*ZwD9_䬖*(OW9fZPxM+3u$Iͮ!|J*X3t|;h e0jLy&<]E _pr:O:*jfA!A? eŃ}Yj.8mz5"ݱc'ֵ87ޯ3wM;5ivPf bIB|hUUj.0]H0bp(K%B[ltUOlM+~W}U/|OQ@ 2IнR)C)"}{aR ҭ 9']ZaMpgfձPD%T9J_/è vwE k8(*^A϶lyC7PU^v)~/zB &(&@_z<[{6kEV\_H=+p4>Fn\D{/Ri-gK1*wnq& b"DjOr50*Ctbl)_>eG]RBЀal-Ӂ;1~A"Y矻(+?s-jin`+/xb^Jq{k')[.)}}:4ؗ壟mg;pv+\Ú#@Y#]~B(mJcpwO[P4Vj}/G/; kགྷcd!T3O~Ph.2( /gMsiRe4 Vg-Z^TN/c]Ҋܬ0R(NvVElɶP!#Tq{)}yxvA`-k{Qyéňy[V".?pY 栥Jϐއ.Bc`K8|ߤ%g)G [SaK\P› H(!0k!=םtE#&)bdRgT);6axMF6 Vkxf -!/eSi t.`2kme 0_qf2:mɡB^WK|!H0ejhvq@"SR@x JP]W/~!s+# %P$GI>Bj j!*,;ٜ͟+ޜG2 )/l -~fh<^ H&љЎ$e bdŮ\\SQͽT$EFu%JbaHm xU,+[@\IzGo.woD)& :Emܹ,ysQ?\`jcξv~<u%Ϥ7~SJS@&vɜM)cܲe|)8mDVQU3bK3g/Czqkj#b`M!^j#pU9twg!#ŕ'xN?=o6{%>IqUPMː?/T* \L4Miڃ:}pP1 ar@B,;. ff_Rڷ>r.!X.i*'ɐn$<4gPn]I=#׬efFHj|~(pg f-ԂΥoT5s_jGXYԤ|O/%N_d4hkA%=Si!U.0Q|1S/N/w ܜ Y(';lU:i3zhF??v/Us1E4Adh:\sUVS[ǒh0s4@=N8{y}<5>k$e I*NuurOuw#űD9j3|s6IRI R  vm*ތ_ i&`& V Pk[lӡV'nB/}No$g?BUSX/`=`2I;(bJ)awbWSId% ފ&랠fds2x^W1yx؉t4"v4(cįGfj.ق ,ԓpԯ8Ch֤70 x;F^`n~E/=K AlcM7f刾nOoekzcZ8 %^N zBrB鷔?S[aMH N*.٩My[;;cHܿ}l\jPlDD ty &4[X.PFg40_0oz~a2nj>#R%8J.ﯺZ01:cY85@,>蒧 0ۚidg! BXִ&SAIFBHɝK,>pr\`^P5x=q/Csg7g8L\9l+ҕngj(2{09ae 9= j 3+PYp9}&IJ;5}QFRsߊm:V"Gc<,Pf[v /}p){EHٕtZ_7\\< jS9p6W@Ze)m9f6 樏ʐFI16k3nZ!yIfO?r"C{_(Nz ]eђos'HL[F0lXbhV^Ǧa}q Ǐ]j:` $ٵpQ#P v"HMy oF>BO`uƣĴ[PӐ-iG|𧍧u/nT1H?#eq<6XUfdx /tH[ۯO"I N6]^ &ɀԄdB?RMŋo!:Ϋ}AWIs`Y"S>n$Q vg zf Qt({} $a'fb'.OǡxXTNmi0 ey '=kEТ5_լ/ ű 聍>%YX*'ܔ]#Sˬ aԡUZknA^-<>QD`50"طkiٶ<=R]IUCİԱΕӇ|g0 )bK}zXQU<((OP`/HDYs ZF}^{7kn ~R}X'e0Mv.ԟ:5"7ۑǠLS{ڭ`_4uҹPrא6ArMon7Hnކ}4NNtmE,Cӧ8.)Wz b .W'uNQrm>/ ٱD9j/R#%pR12GB~!Wj V6*:MU1}0˼F ~ؓ\ITO) b̆B-۶0ܳsePfD7$ް:l_"|rxvdJpB嚏H@BPBvp V߄q 9WDj ۄK ePu GdZ@{BSU [cL!l߾_P}i5bkJ>PdodrVFbFKfGƮjEE}GI({[ Vk`/Cϊ;6g|h:u<"* 7gsJuaE[\.<,9!y6h|Tkĥ7aQ d!="pw"WcwSpׄĚٱCiEȗ,+PY9p ebFޅ ƲmCA<0O,G[v|ug4_RUm }-= dqI'6*6f(2WPXEX[;O1 :2r>/>(C}cc ' 1_V )"QM-4+)bU(ZQF5xd txazGeM槚q]wy%x0:dd3ۋ/n <@eps3<ձLjDgi*,ՁttfnR~ǀޔEmGLKzh!<\=Է`DG?b!+ޖ/)4_R%K ONlpИ?\T q)IíioN7JZ BN!o) D0}{ǝljvcf!+"pC[B's|IDL+^1Fw%K#Jd lMCiK"rTP6X1 ;%ΆLϹP-MKCjFc mƄ.LCGPʧlmOIGcC^ma1R9Wuɭ#,E5²r{GFuRyITJi DXF~@ Gsx`#gB q0d+}԰iaGXnl? #랡Zo` .Xݎ9|4y$Bݥ@ EmRYnsWUcձIm,,PJTOeVANac- [(M a 4P=^p/1tj@D> $\^<"W"t:~@?(ՇZXմLyb.!*9 SVvK,"u4K6JBw<@;8 `aLdU ̍G" AN)D%^M2ƑĈ>ub",Qz]d[@-egp?]4zO|5zl\W,hJ=qIZNc,:]o,( 4KzSjںDEݣg#6ەttx`z[CÖGt_eJ{yBxW>VUc9=oE{GEʛNN(qّMe$e= Og!yc8 dOZ<̈́Pe9O,n)M1d?`$T %g #&Ѻ)ϛ4Lƃu]R\oܘ!X<5Z9==Hy|S@ 9J,r iٰZ1FIBPCOZufl=>w~f;}}J˨%ΣֻKF#S9x{o~[ϤmوDm;]Xń[c.-jH!+}fA:_pk-t6Ks k=~Xp)"/D>Y'AJ0bfc|/J=U碄ok񺽢|noI:qz[]2mz>[p nvh;euSb쵎F߰0;!ԩ.~?'tQ>w=ؠJ(sIN_*3#ms1X"%ߵ)*Vsڂ1%،˒#:-2metGPPn}bAQ׾a^s܀<©?zI%S,HudO~ktR [y Фwxh1j~8R.RgV7|: MM10I3h;@ ],=T8FJ'y~ZW |d\ :2L-A8$"1mZ̩߱dxE!6v:*k:LpC4;N̢5*Xތdu4+`؂]cJ|8p+A"9- @]V/MЙW"{_5C&0KMqYgsL,[B-Oڌ|lvo ~mqrzꌍ ꗓV`df1=df>42l@19"VBj@~Tyڕ}-}on&P%-8 S='߿o|Ljbz/_5_YGWb$^S:=!)gf) s,jqIy9dt"~ǻ>c982: iSn6bE#ZuRegYEsea?m<9r<)Vi_rQ{Η(`P>Zn oZb SG,<ܞMBglIW\BrdI w!EǗ2MZTW8B{}h2 Hbky*ߞ_jmL0Œeם/y`K$nC*.bZ$@ilA jEcag襀CJ e:ҷʟP/ȭb s%]Xy29l/PA7MG2I~}ܣ!9[9iy+/#Wb|델C" }RƏ@BP ObpG|{݇V–^ʛ"LҸ$?FEZD+Q5h0zԆ>A2&F1kĽլsNS4`ˬ#F d.2/A 7>asXj3ʮ1"YQwQDv۟`y>̞s ˧o; ȴLJ:ggQ%hArF;`Љ4+/C׼" fܢ1I=s3^GNkzx7w[d$2oGM*lNb~}*I=E[Rcy۝t|Wy~8؜bR0fv~ Y${ā ZW3$-(K}4<1K r9˵bH+hԳ' =ZW_#SAISpvA*Z5t>FDBK#Dab~#"υPW-^vfH X(ᕉr4o 7ϴh3AQC8jM=S=t3H/eon%(e&ZU0ovm6/|[,|r".Ɗp7r|X[e;3m¶*c -TT"\f[4kɀwAo2۷(0C_*'j5ou˯H V:8kr4)\2nGs~j$eggK@ti';du$k㢉Qdq;.ve0USj@_Cz Ƣ; 6:js{\mߪn;RFMeC~xI[wgr1-弑V>?KUJ_>!0E"gVM*DÃsz%৉hb@ ZcCZtxTЄ<2fWI5;|JjIypN_ꅦ_>:DhJjՄ"-Yqv b'tȽn 2Sg $Y3'筢j"bZW< v΀cb8(bՊ73Ri UMHȽ q[t.Ntpç:G#,!]V-30R/ȃݮA}aBjy03̷EOPLH:15BJަoCC =66/gU`mP.nՎNhJW8kegm)H)+Ҥ vC#NA U 1a ZX'vg$jjHB-VLZG뫮327[ 'ekdCY,M Jq Gq o;B48@{5R6H+Yz5ѰйYȉd ,Arzb-/^MT!K[-$ ( _nEk#qx)n1{yA-RZ3d'RgoZ۴=-ik4l.Udcq\tC՞D ynd?KHXNjA;h!ӭXͭ"CN=]3ٿ2Ҋ7ܑsLlsmBtB6ăZpN"m') Zp(a ϸ+_NM #_C*"UfPẗ́,߅3Z-2j4!~( һ[7͉XI&L((8{8䖍}ka)k'q́ck^^W"Tp?0v_sԠN譼07dǔWiʫ8/JůU Єa7ō2 !3bHAbfh`{x+X ]|_&7/\6x;FiɎrv}ˀl0՚xiE΢ fŠiFX(==_0L bQOTr^>Yȗ囎nd~4du]y%>4&{/Mq0yaAƄ, rߦ3`'!,HnƂ`nGl^Me#•߽Ad&٭KLFU2$زژ5dift/ՒRjkziG=|8bǯv-WqO*<i;oq'09A9X柸 >U(I__蚏̺PyRɎu1*D\ѽ~ߓ?idH|ۘf47 k߸vj 4ZXB#YJU[4L1ێn[S0K/[h5TעEb)A[,K̄~U+*?)^JL*4gNᾊ T;yu@;Z-9Qe9>bTjKHXa<)XcClDLjd47C\`~(J>-DF{/l9@Pį_ 2 d!@Py)_"XKP⧋-l37|$Jь$94+>upX :zdl1CXWӲ"J!ApF,@_=Y/2)fh*Zu\MK gi5;ZukqedJҷe±`pdXq16a@$n[TT0Tc^ϲƟ=Ɇ@9k#Yc2vw?`VUI|P;D/1 t 5L+ۜp8Ϳ`J1sot7y(^^~ oab3UNt< 79^ϾpIiP˙/h DnADi^We|fg|9j.(Ul]{\3XfC%EUM;A&,njΓDA) e*'(7T Җ՜߰Ɵx''MP9$y4 L.mj-M !IU_Iap$@,cL8 uzG_٣Y0W;ʋꈑ"PJFh#)E ,1] UmVUYMiAn=gƒw6Ń c͙ݨ %&^ !|; E|ggM%٧.5Fd@>HPn!%Q۷Mli-£;-,(/΍k'ls;{L4_LTU{3 9=`ɤ"D "%Vc-b26x3S rk|jH"}33(b}{@LF*ZgjƜYXt,+1 $ܒ!jy'`hm/& /ؠH/8x5o9Y~7ZQky<}̿&D(*b ix{/}xa {I-gw8K9 pe Zs9H/ilirIsu\ba ӿj@DnO$o63uUMm޻SweVń<ΛkwsUoiroŃ* *yFFȣc00}.@z:KP7\Pt8-okJto?tFâBg=7&uK$BjNN!a>_Ԧ馵٢^8#Ǫz ;XN+5_v B<*;`.P~*4<}mpq8U `J3x5U+A NнDٓ]MZ1Z, şc_*ہAm;Ä }n1嶼lgIQ}x }g#&lŐR)X GәeNDʼVo B쬀e -3]LP>NS:`MBa2~1"%H(n$(S87TI.(}u#2"Kx \y5AӁe(=h~d.&V>}WI`QpAt!ܸHn%xB­;j'Y!7 .1}u|Rl.,Ι;&xh FE6[ſ&ߞj ~\MA 9J~n6̟ٶ.[Lԛud]d(i}7M6}gy8CDe=T'xZ2DdvJfk.c(f2Hyi'܆LŌkx p<xp.DFRD#nƬHs!pIŎd|wR.iA9A>uBULl5qGaPBT疗 է=8_ DS/vV|z;Xr@O{( v0Υlڦ\DJHl9Zo"l;mxR}{cn!kKrVv(BYvcqT{ ()EFP_ "K;5˔Ʌ#~v!%V9$81i_ʷd.lC2K (T=b{Zlj/"2wT#& Xj\zT p㡄H/ҹ7=*ً1_G9"ǽv%;V%sItCJp\˜M2ԭ|= 7o Vٜ$u'tU0bJrY 7''G'z7u&~603zf\v=Ra #J4Jۋ(ҁvc9J(pK}cD`$;`'6{ZNN4G,Д ĠWbLXUs @2^3t}7=pψ6I1Q'V:=3rt~+/N0d{*?u;\ ؝p 7_`?if+F5j9$DU-CkN*\D|!FM&+wkkXM³ΈƓkv).YB7|AU *'K4>G9HrMec$F>+U (5bᱸ4+n-/G̸mt\>pH! Z-cʍY2˞cSC31\T YZ ~xv"'J ^h\.43ZR ``H9$CE^7ڽwULȾ Qa YjGEӦns|.9f*F'|2A- y?G(A[X?ڷy##QҖA=.ba g=E8bdq3*Lf?^ox{J4ɢNG-H)CWYk^p -HLInf>:)C= UCQA5tN~aP܀ PÌEL%)6x}w[8l){گ&cɜGABW DF|Z0x$# k FS8>k8U-\r<22IzF̼:*LB RPesG["]B aD[dWca/K"n,۶S>ʄ@һbo{C$`PRGȸJ 0_1qEFsw,Q'93V|DpZ^ 'c U⽿O\Y9 #A"s8 UG=vgL>`bd"!ڷxTm.FvSJfWǓj$$4͍WOZq;z Dߍ](É74p %$^Ӭ%g 6E,k}T9R'2SCHkLbW]s(J<njg=-~c*ȯ@Hy.Hb]:A]!L`V!M(KO9Ĩ6#%V\1h3փʽ<~[T@,p>W!GM&ˢ^&z]%L+]8j CnFś9RmVTVvס7YuS+}`ϤGƋ=z+Szka~͠FU&vń:֛\>'784,yN"<|$)&rORM2L`%i|Bţz Apnj#Exh)~QLY*W$33iAE2y+~q&LjdVxC6(>#JP;q|~w gND+ʱg>윯t۟QOjP/x.>9Jk}!ɒ`!\~u~lOeYBIY\H@ϬUg?M/iщ"ߥ\Z>Y&^9SӣJHlSw8Aa b n^/YKd=(|uظ=Ew!>kY!NQ=34ĵTiӬ_yp- o&bڌ&NbeW:K79ۖNM]nt'TQU"&_9LN6H%<*I]]) ?/ohPzv;g@cf{.eT'ݒl2Fey \Z.Ed j&6Ey;sy]2= Hs]}5Gu'tHKSP%lla'M+^N1{G ?YF[ݩ~i?1 3ӠT|͋rgy#y5gڬ+$IiVcJ+Evbf#"F¸K p%J?j1.ذdž2&[ei ډ$f,~_Iq9Y]u|^/p9j[i[RfE4Dg,ʣg(o 8ݸ(\t((Ig@Yig* [gt%%*1f26R: N;I,)_#Uym5+lb,eG~w\xZfODP182yJۍIq/#w9(i+6t/`'S]2,VtŹGD&ׂ>HKcpTΞ]VS~A**nFdd#zonKM Xn ~լ%26Uh\Vg`D1_uotmeba!J)# &(/^8铗. DpI<qTϵplQ))m}2dB`?`N4qjNHPO͕dq \:t&`g2p^Z|IzOư)V`\^#p- wjt٥`"A9Nq^Cr Ę1Uxd 7!ou2~2Rw<!OfLJh1.Ú$gƓL'`w$_ ) 4 MX%%Zw<9հ 6 Sg攀2!3-@s: Q<B|Aj/܄KtA rBXK w[O.^hB Jk_0CX;M#~?2"훑]xÈ^GxoQM=Br4[\ZCn͈\<nTmԶHZxӾd5\@X؛P`]JkG 8A^o"Y8MArB$=(acDnSP/4˹(&S5҆A^*`b"+ywN)~sXX`-UsgJ˗do4 #AܡJPa565N'^>u2&H:7Q'y~8yπؐT¾>`@ `Z$?d~q7SV.tO\(Ϛ;]auZ , S0[D\| ;4UU4}Q]e,UՌHcYG p#Q˃:Y[~L|NVACyB^B'G3^ui"3'Y\ N9[>fueTb=g961F$@1S#]1#7wm qǘfD+Ҁ) -b!~7=Cvtر\_K_mV6 dT"n t(9/zV^A|ӣU`?kw =U ;籇} lu,Q?;]i/N=qvD1]U֐o2usN{*>GlS_2UjMVʰ3ј)Mo8_' c= c4(g-z!w,F;Rfodᓕʪ,,9gtNLg(ysF>oM+|eUm6l'1z< HP'9p QbJd nu]&7X-s,!z{_YvDfTm1qԒZ.d*KDXhyCXőTN4ŶViT9,sNpR]l$]|lk:h^zKMۻWɍvmגXlkBMwZt"qU.䎂v#]D_/7f\QKO:6قR D1.7UۣYӝYVA=\ H =a!9KTpW'~ E/Ø}A'"he+LnJΙf3.;Y+-a@_fw;=mk$ [G|6P~& u_ 'J!x3OdE(mПw%+gQ(kBSU ՔB=TK&q2EײnhZg$ A>HNƄJ~1۳hBKZz&$w0@B4o}/ AJL8aJݿ"yuz_pR]l%C51 ,}mil!ź[sC'@jD~M3!5ꐁ?چk/l׬-B$zMQ>p9 愍`-Zd\=[u}mjd9ÃZ(ngWBÇTkU\e.ݩ_wXp92 :CG7 #^NRJ]%w.qH1 FHrH>? H9+v)`cs1hD'! O (MPCPIbk5갭\Cۈ1+ղ#Ě#->g8Xd2;`q bBdg~#T`;2Hl 0GcqurNMxEn̫ 㽡:|sS hb`Knx> .j/;;Ô=2ӇPwiD۽8W !QQ.Xn?,pzbεy"mJ J)a`l{XӃɾɿeK jS;Hp`F\hnm]b0W^#VCK5r{ -ʯKx1&3爒ZN<fIkᚡ\.ɸ ؑwud@[diyiKhTFjݻr3 kAs $ 9,tH6gt 9ZN m q3@Bo7{ah+HVa7#B=B ?Z"\C9+^'ԎUgҶg acE3eQ0S&〝b8c][|D 2Ņ.?>i_ S)|:??xg7m‚>1ks#& kRS`24?Z\ ;T8-Ǒi#$ y*aMǀGQrE}S*..6V2-<|wYf$/~ooZړ9ВFp6y-,t VEWC͙.9,7zf{fq+䧘?Au !Z^ُ-biX;QσN*vo0wt޹e87\ 3S7Osjx\KD^#v*JrPӷ2xt5jWUIcKĴBQV| X!,[9Փ}/M u@#3dh{jfжڴ$\a[$i_RCx+I"ѭu*su#Fc$% q"-葒vg˖̲ ( 0ACfEǽW8x3"o#u#+ymRf`hxD>G-JX+Ol(f}X #.q R#`89d gi dDjTj+k 1\|$-VE>ֆ }^$-me=X"v࣏pg_^Aua](z9*ojpN+W7ΚpR o9'}_yy>()i^H+~ח |bp;,*w9+aDL!9" Ǽ5-]Te IC()sMj q̨Mj J)J U,qVB9% % ɔʀ ‹g)igD^C%.Oa+ˋZR&d>+EΡC3"O `P7;ΈTT:Vf M*%$L2bLJ1hE'qv$χ "cR*("O'~Tԕ(oDOVEK_BȬ.9"у깫 ꪲl]Ll rv[FbBuL9_Rb y?'?~⭪(tcǶx)V*'cn'c;g4|פ-9bgRC90 hn2J u|?p!w!0s[z]vBhOtv/ Yw[ڦ"aKhXvoH?qFh*:Qm_yfBrE;Idd8'Հ.t:r ɵb8"n8{_̀lY@O9-$9Uv͵+ɞZ8&Kiz 7/uӊ>cpY;2gKҁ8xiT y`K-άo[cVLcA𸠕^eo /?2>m8?> iCs5|r⑇aӁVY4e7|c\x+i< h-C1jn":CZ9n_`0m= E`mA5IH`И1Uf@uLؾ9JjȄei/KLՎzg C( 5>s+q檖a5?*N:$n7FoiwyаIS!,w? u[f[M>$T7F.?T}.2n\wɫ)q^[ tj xyFk21sKo.NGE21쬈W6- -!vg !i'eHܗ"5; >|H;NgB'0Y_vÝ*P|8xF ny2+QHvfْa5LBw*=1+d7N󉴰-_RȽif(Vpzs>D & x$E5<DptEA5R$yX$UUI<%2L1!Cc[kĄ̄&4E֬Y/@ͱߚft%@*9%L4eTz: FE96baYuFt= JkU;Jk8ˋ3XFޯWdTy,`G.x-" S/1(?;S04ٌݱ+N]<]YGSyP@"u(A$7ND]q:iJѾ=)6Az_.x늓* ~"ɶ1Z0tqZ7B~<5@bY[V`׈M5Ki-Þ؜9*\jrlY0oi%ӈ%Je (I1%@4cxk#.Gړ'eع{#@Q: $Fk8i:ǮvP52>eQ/҃<[nLBDul>wqboJSXcϋBՇ7n]=C! O}5tjH[Az{(Ġ ̖E#-' 5P\x4s.hje3WA;\S02"/Z,f+qVf<'>1sVy5'I1BW66L ,IKYVhΛ9zY5| *28"E0=)!Iw̬^)keGU5Z Hb~ ̮1F[ъ} (I' I?S\H .L&^g-k[)h-B"v9x]ڲoD7gMx 9(cZk"{JDmnѢP:;=5-N0V)$u ;43Z'ܿ~ARPV..#37"^ͫ\ލ>0 r3'ܶ ^|aHlY=27 7J79E1qsn肶-ҙwVMZusrDReo _nqY5o6UP}^|.[~q" .VłD0D wzc_[6jPu\ifeQ4 =>~BSٖ2XL 2eWT[8?H w)7RVXHoF>-Y`LLUL24`eӕV%jE-U|/I}(-c8.I"!B@jSĽjQO`  %&]$)R(bL"J+zqo rMm*зX=]4_ ]bb(U*z֙T1P*ˇ\u./iCG%ό'= V z5M*ֆj=i"سWFHx^i`Ĭ寂DBmԬr|Ҿ'hVlD6Abb<;Sݷ4+u!O)垲k]0^>5ѻK,r$@ޡ VBmvp`{DӪ', rRڜtOgY22ۑ%bBnIf cN->t@rQ:jD~iW?جA`qCL`S$ Nx%<2 n qǎ꽐vJ Wz;xu4R>aAnxoP'i؏sA``hpH$$D i2vܒr%7x TmsB{iC֣*ք?f3f"U(foT5Tʬy"p.؂)'!k,ו"[h#zYSn-e2 Ϋ@yK`03l[UP!JzJΚ 8*AHݧߠ N\jJ*閽Zo~'Cʃoha2::,&0w̽;Zj,A0Dȱ+H GuM`7w%DOz =v946pbAV򊺼{a,$iTH!o`T~eI? %ưei ,P|b}4/U4<62g)G2z=^b "fDCL$ ~]7؏_o#)U*a}!AR3msG&S*%M}8(kB#0{M=[C<Ԉ2v5 M߱ҜR-[ym;|ZlXǖs}RnV$&6QKr'ojZ@^Jk8lXTF%_8J *w` GH9Tr oˈw^iۑkt ^oe1e>U|;LTlu4_WSk[kW0X 1T dL_ /@u=v(\ӿqv>9f I?v:U~rYj,}ɖ5Vܳ\ۊzuccWT B5p~g[IY'&[+ 1FΣ:%4xd`ە d1eN-AU A!diY#h"#cuc׼gwaU]c܁PշC'g"WSc+]!nU[.[VgзK hE9p.SZ{)([LupK_s+Xaxs=b rjJXA6'ymysY,9=}$ Vta!6H8d|VD& hYWp}KRӥLRwy~XŊdY?n'$pt!eC(u]jihV$A.-NRӄVkd%lF p4[&`Uh?2fЎ?,2X@#wClk|X6_^Sm;iB\S6'd=Nh{0٥VeDXL+uwY,SmD׎whd$>q=U9|O)v[(u"۵VƆ%,cЄkހY=U;n\5(ke[0nNK8(zL 6[Z"t.tF~ RM`ٟ?MW2)8؀XkagHޭGpd䂯̼hު?›@Iv@Uz-LUl5&]Ki_崈<@(qsbyk204]M+73`~X]]Y'5^éi]Q"RI!D]jИfN/9 +DM;N_/8ATo{y;Qd(zWf+ Ro<#wЕahy<.!BB>|G  ދT(ay'b^=X,~ *72<*3NiHC ,Eg@t+Y/r"ArHH7'9J7."@Oåx[;82I$*5`- uݺWSIȞB +Q7eqAz1 /vN?Rf#qo*3B|U4B6(G!>&kƏF,{ ]/0/[nR?7 *TD4QT`O y(";y1Wfդ5xX8#B ޙdݬOu0aj$S8ٙ]``S-T L{x|bTbui 1ز Y504xx>3f-tRAuG۞}4<4\CG-[='[v3| BII$*_ˬ$Ag1 n9 \.'h]nuK\cYQe =i-6"6kR΃g|7;W.]ATnw2iw*҄e4' EOsNH>t*BP,3 L-{${l As ̮1E?{z{D Jeq; l{3:tۮzwꙧMi8r^_^6;V5&fCvq9#AƈQ0-x}oK{}~^RSrm_&k'v SDU7Z{|lf6ͥKOI!h8@Eb>&vGqPHi.B%yXx5ѱ{cdSEB}iO=-ݐ#72"7 TLv9gx@QK$ PӝK4Mz)꧟ŔPZ܋SBM 'K܃e)_Xv*<=9iK SI.8Җ%Ƹu%Lmi`EF󖠄c?L q9\Fd=s 8^tV5!0E+H+-:ƹE<#/U4c̥a949ow*aD/!rf!+5մ$mRrw?U%BO[Yˣvh[3V x%G?B%axq9`[ Ęi2RXF+eI6J#M^Y{lk 0R鏦gwys/j\3W\ƾp)bP&1+[ٯ,V@7Pl{c2,jjGmtIF> \ƼDw ŚYA2OY%$Of㒑ߙ/l|˥W֬ ve3ßl$oMXp 4Dܔx_/*#)7xV1f&VԈ[T;R,wV ] 1I4 򆽄 O21x'M*Cwzف{: Ӿ8]-B(_Jy5=By־i2O0OFBj]ƨ.ւua: 6U=ۖGlU̱mX{=> @5$ADR+=Q$>ۓ.Ȓ6P Hȃ!UByL| ݌`( |*r/Z =rH2R˄Ի剷y] 2f,`|ĀPX8 w\xI &X7-fd2`MA)0my9Sy4E"O81f6N%y5n^"S*u+:{ u|`ۅbt<:Oe<\R R \? *smܟH|ݓ!^]!#9:xŰ~jE69[0ST"ʳM/yzw5Grol$ :0a5)Dw^#rQ~Q?R+#Ã^Y֌ƺYh5U 뿅%ЧnGgv>2g= €p'"彞ppX!p14Y]{g~Id‹X /tRuo79ʼ|;򠥾މht }Q-:) =Y.x6 :+ь<.ME JZĚ\0oZيEJ2cP) qu,ӔڧN0*oצG3 s`vP.D73s0q-o:GX`:&GA`?"9 l{S?ʥSXJ>Ice'H`qD>s|$1MrHE݇a̩å_XiMER{ Tu d0'.̓R$$(![NH2 aju؈?b}w_:[Bblho,hB_֓,8vk@h'G}/z&h;cGr96/CkU; ġ]G5C6miyҶmP<5ΊdBqȧ_ VS8Gl|])_[G'duhƚp]FzORή PY4Aܚ1ŎzR^7* iB'TSMZ I7^}v.Nmר, + g/t]Fw`yjksg Ӆ2u VP.MVvd/b@6op"PǜL`d|wi\D$8ɔF YbvDxu; Z Y8\~JBKJŘ$6YQ?=Y#0H)uW܁Z%gHϧqFR)|:=)DQ6B!i:na|Ю La\q#fI PNŹ*}၏qn^f%k8r~_qe)&}! j}ZU^sJ9j-H莢QM/&nZeü쳮.(b-ֻ4`rUQ9R? P|nc/72lfS{"ufw^6H~K_ZJ=R%bњ{~u$pb1z`<~VÎ^%A%ыԱ$Qϴ>49X!'".]X;^8~JaD]eY]ftiĵ :D6eUq Dn܁W;`#1+תTVQ3QT̓kġ\Z4͇ Ÿ6肤Nm.CW /ζ`mNC^{ =!ZH#ԄLv&HoT>{VBe+}W<ץ\^a*pAaIힲpI[AU}x vǗT6۱&Ju/pãwDH`v]u4xCqJJu&[cN 殷=P?j{PkЪE-=xWYkJ3k+"^Edc91o;[뗺Awӛ1B12#APvPdΛ7bBS+St,*]fYg5YGwqr&,XdIy5wՋaFV ĺ6k>|=O'ՁM|DwJ+%5p@5}+aW |SKw [2^wZQ|$SAcabjS I}Mz*C^t*% iq'{,w 9חWůEArxLg(ͳ7[,mzS}w]])6 heNlŏm-I8F >0c"~~n 4Y.{rUq 8WE[sU]pN58t37ل殿%cƘc0Jʔw߶4, _כٞJjeϚ-^LgV i]-eMZ!ӈUŹX"p3/6PW2 l69 LB Tu=h_ixgiAҵްr6ny;f(^>a?yPW'pz v6 1୴Fϔtmx5iz) Ɛ6oH^qD]"#uL#]ȣ*a H|DچS&T30 "w~T;E#N( 1e['1dqԣ?ފsO+NwJow*æ9{rIq߇|(V^A%J3f?;oT^@ ʭ)]^`-}RΫuwVi0 7Đ%Ђ}X0_ c@N2"p%iO@1මH TnWuC(I WdP31~ աgSq:pYW@k.r3B̀"B$f /7H{LAJ A2f2y~-&ئc^53($ ̅`4Z[rs镟sH &k̯/f`-00kɻXӠj"B7rn慚- pJn\^ nI~_E!F/ch:8ץ@:IW&HoVq+sh?SFqfSj3.Qez oO#f5KAUzh!fe (9{MMQu~ڲ@Bz˘9z' 5< 5xG;+HNVUA/.=䭺Ɣpw émqD&"F -"v%Zu7 E pcD2 o|wC ŀ%*5;T>miW@6[XVW gax(/eLhZ['6k/G$Eݪm(TH@>5M~o>Q+KGͿ_a|gr'z,]w>b_Orh]vel\aǰŖ'$ع0^b)ŹijGce|uU*U|TqvKzjgu=XPz&Il&,`bS*JVvTxw=sBΊ72&%d)Z.~p4L6Ȱ4vykvҋ:& Y5䜷-sd~_%>>X(<̠si,CtO|f=uw\(cY" z~U.JAOy/K):m̝5uvENjz0ۙ 'uRO>wP:̛Ma&fK:𹟕43vETXLoN]x'_:M;XT\â'oe{AY jV"jJ`싋GTB@f) {5w0vGEѨ#-c Q}3DQooFKt+=lU\s%|~‚3ð8pjc[SIQ^Y&W}u%._} y$Rj@ #]ZmJaMdP.F҂HG38=][2{c6u;1kh]Tqn?c="źiln,d߼OQ hg&7/5` d1ȥD(Ƌh4Rm u\`(7-ӊ0Wicw#CJk{% a0J,KaY*`ueOߺ"#.RD/]]v=w2 IaU>jdt}E 7ىƸ W l>4ˆx i.4%;k&Gm;HɋЊ5W³M$,g`Mh_ tqǯ-ݠL.g^|W ςqk9"l,0͗.=?Q^4C (a0+A:0t(1јC#4>Wclғ%lқ CXEM07I7Y-|pA)Av1!sAT$d_f   #I2,.o_4oxv |\kGy߈W펏@}*2NVxeNKWYgؓkxfR~:aXp0vKCRcy,/)7wZPA+M^`(k:Ʌre8f$091e}b2ƶh)8ul,euqߗeB V?mH<`{!NΥE=v[jolb]f7ngeJz G50K/w2 I_hxG2Gy>.{q*vW5#\&çOJl)CaI:"4B 3*R!TjyE5G.w6B:yCG9A#fB'u[oBA쎺dz.<"63`LFcV9,,b]`Kx%djF p:70NmmԒ!+o"i)_nW?޺2YYTakc(buV.|Rʊ( o P3=]fRE+{fXt5lqH4C*bh9~-b$*/m;HpMA71RWR?]`ӝj\LH"N`C/ѿqXmi++iD~/Ϝ:+ p9>q$3crdԇ ѾaDdϿu0ɾBQTE$ Ho=u2Nىtݴ@ݾQ[^J؝ę}7pYr#ECa+Qr@RLkehUKg4b`!j15PW'W%}x~~q_j]\Kztե':J )oZ#;`1d5R{cd"俙Y_I+;W.6̆vݽmN`iAΑb[}/\t(qL"<9o>n`Igjzoq Fc\t?ɢ5)5~<Vf SS0l@qAhfqdf=u~/*vn-qo@!z.wȝ~т/#еp-Ȣ}MG ؒFnI묹iuOgԚD5瓬 4x0ec4OP*ڂh}xsݥˏn.ᨕ. t;WmϤr1lC7xܸǎ6$F@bǮ޾eAχlǝ葿{#4Htho,F)4 i^bCɯ8ᷯo2F94 >?oKx >v)NJy73Q|z~^Pǿ^!XCTAHW${C8ԟ e(&^EX(A岓ykO;~Fat<$ (<].VgDXS4?# "4Բ%DRiZ~^@p'C,Tѓݘo;g^њ(@Q#YSCdcu-| ?#nG_L8tS#=|lPKbǐDm4- RR4\'dT.͹U'K{5DhՄ\Hғr8[4u@2Ok3; }X= ki%mvO/c$I +rE盼%i`q~PcG|( 8XÂb=Zg;C3Jʛ_W𤾿&&Jpӷs _'Qϩe"b7rlw)yv'F] ,:͇-+R>y++}'r=1arKԺց$c3Eٿ"aT*%l]84DbH<=ޠ7b{$/Țre 0H! ]/$ M#FWRM4쵟iW,t6W2tO&8c$R |HY D80`W+IMM&St.rg.IfM?&sx=Vv+^ !v}캬,%?l(*ƣʹJ,&gWPP0stSMn d- nPSdstSgda0쌔c|UO֦ٟm(Ia2I. r%2Țuwu}}kz‰@82f3^flHj79 n6/P5;-"O[QFE__0Bz7h`i 5][E,]lknXn7/0)047?ŜKAF : gKia סpA^!3ek1*Q>d|yӛѓ,z#`VO1 l_78uW|},gP >kO[ |<ס/zbcؾg WW9=JV-ΐ,RKjhEO#pXcSQ~ #J~s#O=n6os_Al.HzMpt0ְ[Mpɿ J=/e.wZ_Wl ylU?L~2~,&g>9֌lV%JxPMfh@wO}饤SIc!w z>i@XCE%PX=5w8ŻV\vGyjG \(pG]$,OVMs0Sz6V qK_xգ7+I#Ijj+KaDHu[d_ | H/Flי,I{egcH{%hYgAuA/:`H2DK\R%u`B"GC{_ "4_;pL:6yYث1eFBzY&pFmJgj'BHw.bLu"{ %x˄c(ZZFGXӚ]80,b3įrO=)*T)vMD4y]fe9X4%q&<`sЏ'qXLJ/IF_BqQmN,w^}Rl>MN>frո-*T%7&7 }~룒ohʇ4> HDj ELB.Op㺂N1F {|ָUֽqn'AWvE_#G| HJH3/v˧I I,-P\FH+I9!ދ,,*E`tkqfY8E[4Z5:A' v[&: G C2ϝ+ |=: CgNI"J˃px\$w)}1~/LnM*W \]I!48*&"/ݼ-o0Fd/wqyj2^ 9jC77cK]RɣkBy9>7@ Uϸ`+}h1Tnn6ŵ$R)G yE;eLP3O-HzIʄl4&ɈūG x j!\%:F ( -Lɲ2i7Je Kb @aNL!~cj @Oț˪_rX&K V(.]=T^Fx[$?Y]V쎿^||¤kVZLu|'OEC evZL` V&o3Dn@TPTvnNHTVʬb+4c!oɒ^[UK9.IZli!ɝ5Y)L|;tQaɞLAwށ$0~8'(~o+Q@o%-ҭǯKz +Ns)i&a35T ̗ĉDۺ@:6Ԯb$Ei?hBHnhV7)e8MxE(^Qؐf.olsw ni@eԮt^7qn ,wZcjRa˛ȅNye !ȃ jXX'h b{gRc~J]vZ?'wEV,C0j?;ٽBv֝/t pF*;&+jR-' Mg]sdWd'pc#A[- T?5=ibrv"M^ B?>L[]րSWhldHrennh)٥$bECuB| /Vl*vL ćQ|P}^W1: B:uV(SfpvչLW0K /#BW)-'4F'cQnj}X3joczlW'խ%"mo[f Sz;VMb0 1 _[a_2@2N& i/ VЗ ?hSe{ v~6҅AYנ5fjǪ;tWĽp˚_GWĒoM!4*1F{G&_`KBϩ޵ ) AIUl#]~ Ɨ$eQŰX:H$wϻq}q g^@kO@ezjҎ{/5|aMa+&"JO=ȟjHT;J7}Ե|L]~z@Vd1G!fm짨xˇT(d"\oMϰJ|6d$jL}yh1=L>Jd~Ml9cf.\"avy<9-WZn9i1km،{gy95ۋWCy+5#h|^_qU-Լ@.6+h|romoen(/H>F| q>=V'PzD!{60b]Pjm1mhr/QlĻ\rϻ=jdxB[|Cg4ge}$"Mł >7PrSR',V-ɑSQuJ]`/prmeyPz aH W<.(=2ޒ6pMQ\PQlgA눑l:Z`2L`բ0&3cANgS>iHmv|uM Nltդ>R}i%+oAy \5< ͦb_\y;?A73&lc5~ 4|#S'.fctHTuM8vaT臙=f]z-0`,vz/Ͳ0׹׉ڟ'ȏ|. $%:&,3*q񂹤(~Ex` +!BIf|nta߯򇰇RCQ[fLjRӃ"Z 2<l$88(Lonrf` P. ӓs(Ia^$l<erwWV!Ϭז#ou|κM}SqT^Gƺ1 ~zKW,BM8$ALoz@ᆃ6fc{.L\H3Sn$(Puw0N1oa֡#zDT*?4|XmX5-|)tH=BOm #&${FAd&ఛF.w_uB`r޹F3YsrDVZL >BDF[8W(gOo_B-|BE>J`MI\`5R+dmX 6 6_ Z'ftA4 u\=5*҃ni҈C&Yl=|VfCw"+{cLM3~]0[F<#uSo*ȣΑZ}`>,ҮA4|c"\ޏZ8FUZ%\W]d[u9xwB:sWm":7b?;+u?۔EOvip0hPȐ-,3;̠88 f_`OU5Pr_'i:]}hran 7: rZVli7$>=:הr I  T0+{J䜹cί(mR/(euA T- >L/X' )SKl'ͥL#W޶ū^/W6PEӦ-5(/,b}aE?mQGh57"VL w\­[cşK0gHK,ŬeQnl) ^U&XO3+EKԳ)s\qzbWU;-tBTrU|.---T[_1KG꫾xtax ! 8y"x1'ݛoucRUv9aWn܎7yS1BE{4I@܆f`Jb@gYI Do.߽0L s;wr]-{.+AKbί;:vp˾&[FHPupBe{<6"65P 47%^ſ~F"9=WZCx깿)ag֨̽bX:Tگgd$Op#b@Z!W!UN{+5gGx5 X04a )gZ%s&IU$cBazW:sD+{mj 2Hq1PIؘ:/҄XOe!ȳ\"2H3\ջII얄;3۵&tł)/{h+DnnL;/ ]7mjvGf&]8X'`V2J I"F]*^U޿$|> uT:` ̑P*|륢R6Y*te)'2m`eF$`g/n?E-:pmv,"qN*`Xz M\^.b_A~* @C&cA4X+qO~Œ@gaU(,YdoXA>T//zGfv@j{F \B4/ϷHFcQ1zz[`7z" hB ;[cl'Gp)'j=_wfrSg/M̈́(bv[H\Tc]E}r_y hR녣QQ/H}jY*qN?s2&4Q(?ѫ5lPjh~f}?~8x:*&~$^?=.ʼn`ʕL*'pJj&/dF?lz93V˚=!J T261>>dA2m6Op }gVo 肆vEFLv^ Fi[:n؟y8D8U1MH󵽠X|hXQm=bh}E?5n3^ V{XpV_h8uu>&=FxJ7%_̦@.s(_f7IG=cM2pSi XbH\Ȗ3}m)[oY36Vz5[`h?G7.AtYb/O?pJ|jBS9PWn?x [ #( AVDH~6ǻC4fPʵ6vBq9/zu YnBtJO󽣧Yݬq};!λti |/NX-v|Ӕ`'TMkOʉ|1^jM7y/~FlI9*@FLU}W# &\sQx 5*\0'.hA)ψ߀w00Y,YI$07DׄD=q^sQ|z˝6o _5es-m@V'j{jݒ x9/ӕ眏Db)c*akVuv[hGl[ɺ/+uTᴸ'E#Uo==vXAK✉.Aub-pgD0&>MK<;~z?CkYTL. V[*R`~%+)W=; i7y7$B>WdrbjM1Gqΰ)N`a?Ё#߬Hp.,2r~+L;E>ZHp~w_Hh!DMn[$ kT_4a#50hGE%9[@Weg\b^)"vN%zwh19^KߺGƸ*ݛ=B Eͻ+4l.IUtU>[B {W6mIS0_zǼA4$U,<-QX^EJ|/ UMϫ2TjwWro#="UNEr ,[ K!0 n"9#4'àeFX3z~WVJ-ӑ-d]< P ODBRFq:,s*91y{!6ޖ yvXX5tuBaWc@%lS'.*Wdhe\BĖ ^;G?@z_y'wA:Ө}t4ߺBDʆr3l3pmHKrs Nxޟ<)Г ( @HpNx1jQEnn$ΣP}זI6\KV^:l8Z`^ب;{M,.#UHSkAZҐT#-81ڊqSi4luN Isvq _a=[x {cM iTGrToISB?tfDg3iӥZLVC'΍ߛ[:B1qЋ=9+۫5 \"p?vB`.len ((qɳbjg6 Z*L-GrkSzOY.Xy|jN- B ˨&Ui5<R y"9@sdLi*»h?3**u7 ,ɛmy?clz &T9+k: #(ΒGq^;ΦJf]V+wRݖF+EouaaP ڕ!ɚo[&P8Xn_]wgGEO*V)UG2UFR/WT r"uz1jCY'd:7 !PʘQ۠E*xB.a ]2Ul٣Ғq>2͆^@/V1}=N׎}2 ͑|daHL輹'L}RH EE;3 9HL!/'N-]?'ġFewaE8ڠb+ wgjuC- 3t^'gKtM4➼e67V%Ĩ|"JQx'ћ:Y?;6i[!luI88V ]bxpQ?~-[ Iвlxc ǹAVPMڥY`/^zOl>Lvs\nQ #ռf~K.6.[ /x.c|Z>Yi=V{=B>k6fyσ *M21c@- yگUG[O< >KP^SX x8ޜ+ i?wll =ԒDM^Y"˟-Gz)uZ}klĞ*h9tki $Tvݷ _F5;y&rJe=C6Ǡ-{v%ZCl]JbWH]`+HE0/ْz]:~IxuڷNlJ& AWPloDI ] ='dZ^\Ta[f.(WY"q &yEɱlU`Z, fWugGG ^N%D=xQWuQ>@G>ql6I b̈x&eZTyߐb]C vRS0k+Sr5 I7!M(s' s*ZŽPPnI!f0R67D>+juu}.h-]4A^ -*]=.}&#(6Jdذ2_vpx\?8H1#i]Plt8S8w(N"ВնApFi;F ǩ0IJAv8=\JDhMlc8¢n߰6(pnY_ž~AoRA>i\+P3Βm( PYX &;V51kvў Ge}vyjD+СN &Y(c=ga[DQ5*X.x0p$>{I[/3v h L7YbJcB\E0Ȗ-wl:ޱ:⯵vK^@/Dn8-5del6~״`F:S´ٮJb )I/28z.!~ڴ _xIb/4-T}󴼔s㞯}f4),ؕ o56Ak\UV*7VzcMVbhŸ\SRcd/5UTt`l;s4u| \B2Afsk͇!9\/dS /d$9,C41;)Tn<枡Y,(8Q.Þ9`@5U6Q@͔} e z{˜[ 4ѻP(dn%L쏌cQAUB`J֓+,⨙j5XB, ]AܘT'r8Mr0m ‹rkWa&V;"J:);,zjnu݀~Q>@><Yo1T"g6p?zn"c4/戴RF~ץl-@A|*2`lJm-I;a]ʗKAyx*O4Z_)Ww$川^¢~pg[jVkjSk2(oy;P$/Ъ ^ߒ8Jbِ9ʝe<|ș4Ailʌj~p<$$ȶȓ0Z=8 nSڈwE1ĩ({ʁ?0?[z;s+d IqS_PwxٲN۶uBbO7n񪠨gULcVSzOdgD ~)&Z;$ ! ",}̑Rϱ飧mo|zKLMg=5' Ry2Up=RoVOzWex'l'kx{?桭I:Ԭ=+! Nucvtfpyo{:/Er&G6:޽C9 _^4i0캑'ڝT8u&G${FyBwoa~Lu)6K$X(Rj^$(`6 8@ti T{pYC}Ѧ~ +6A. j지wBRL𛚆VdtŕY@^o_ʰnI{y4bPÓ"KE/6#r_ԎޥQtOEZUX=ѕVy~b(u$YFE`-'h7")t+.iIe ?:+ZY'_'܈iCPq[Lf1Go곗g4>HV\x0~f؃${LU6=f[lǥoF:06;^{8 xfZΡq~~)#+*unnMyu Sˋl'# 8ROtvwiR^$Yx'؀.!uR弣khQi%6tb>\FdGffֈա 3w ym $bxr!ĤM}2Xւ++(}F@ϷLE%h(^z9J㏇#NcW.Pj)9iKtEjAH}^\4~;`#߿]So0xQ ue0x䡞tg@A+Oahj?5½OK}FUj$_11\Z5")_1=!?YBRMtv̢ݝW'p7tXҊߘexU+f0&n}q[[]U(;5T L@{! %EFp~w84{2A$(ߵƬ,N[ޟ!FQB域zXz !l<OV%PHNDc'S&~*[9M4Om58rWo92cXa{Ef^u\$x#zBܙ (ZTy;Dʎ쁋'*f #lJw>z{֚UAJAfS_< g%iP)3s%4 ԈiB]؁4F?U/l@Ϗ*)Jy{ 50`֧G.W 5˸9ߪP E4!oٓ<X6NqovMm!.[mT He>vIay8PY;; KO.U-.ǏS(T s9ī*Ds0 $vjC'"!\ܬt{1ޓZ9G+zY,SIGhDd:ک%f&jNώZ"qwKdx3(SZ!1Hg݄2B@\@d[!JیՌv4<3%l[vF3Όt#Vz){`XmqߗT nRF7B6.$ߪNh/yh/XVD~ˤGDO7BJ,/鬷f9FX?-G=Ϩ?gd"}tnlbi686eC1{QS[L~!-03={i5zRjP# 5S{?  ?pa.&vfweUzQ{,KO6'tuSbiOA9[6\ ))eʾ-? nq4FB$  `H` VVv G;pczPE/Os:aD\;o MW ux2l-z:vn&BBw~3u/ӽ4K#+6nLZVxWY v"M]dZg#_pLqHYΗ^]gEfKs2ruui8Ѝqr7_[Ӑ E.p?ЙkpqL[!Hr;ЙD\VMAVC=~})n$sl_(cVv^ںq/DRn ISm-Fٝ:IO\Lkz(窒'՝x_[.&M͖Ck%@ XN w^9~!cYRL1  uQ66ti+jhAcZ|W'm0/ҏ$XML;LҨ-Pq)azGyן_%]l-MG )wjJȰ=),υ˧͢Z"{ `g'<'.Z|[ݾ}O-N㭶8FqwIiΗr+.}$ uus';V]9+ T΃ tHN iCVDd U1}nYEUr+؏R++H:ͻׇNZK^Eyuf(MӊS8 MㆲzqM֮晛FrECuKB?)٠ GO7l>e(EcٚO>xrahMKЊVԪ뙕s`M b$brÉ&,ʈ8.z$q~^>虊48rnZ@CtDb@:3HZޫ 5NOQ<\mx'G褀rLl⭋9Z nLްEP/𶆌0 ?wQwsgͯ6~|m(J?[$T8tA~;wlp6[L4Y}!":!H'UW!'IUٵ|~jnb|1l"))(Ew t{%ipyL}By4ѵƷHl1p?CS3\JuG^w)tl.7V*f=VT sPƅBǦ>hBRoUaQNn/2hHCr.CL*OM ߺ`բ`7;3[泪J"M`XKhC)0&"ǮMtyi 1W<>=rԜ)|< d)kŊN;Ar8.!iݏs-]K }Ꟙ_sȊcY E7^L A#Om9OE~d13UK&Z]+e 3A0b1y1)oX޸d.8sID[MB,:>\M7wQA#VC3IJĻTb:jac&><[bKU\7*9l]!F<1*ѦxP`EOfp'7N{sŇ{^)l 'W+J*sG7kvz:G:xު vtF\ X7cbBӊS絊V>C4T^Р3ssW$-//;-#^k@ѣ:cդ8Ɂ߸L5"q̶V2p'a1r`[?|"aՃ,YŒ?/l΅1a +?<{wǽ$}u"cD@FTL^ab#h~Ϛ9q {}ASO{yꋜ\SAbsʎ]>D_}![DKFTI1rkR+ Ρx) 4`dxTa<)ImNhivSlHotwAa*{!Xl~Ymja)}mBu, i8S5}LWϾT>*= f~v&ZFRuG 1hO c+QI# |mߙAjCG)9^y'v[ BI)@XBv&ήƙ;{DtUJcR(W󎗳pw$5bљq3>JR9JDO SkNjYlƇ桤0Nf3p$<><0,jQәO?242a\ Q'e^q}-R-Mr)GA uz=rZ̋:EHUz ;$ \K<-17# `BWG`tsZf[zpqY_ܱvJh[OQkG,VKA* V(WaSҴ4 z)qfBP ܕN=x*{e_Nx(&sN-^%[9l=w{Tb{Q|bi?6IzY]¥hߞ Lzq1d1S[49%x+(CΛbA,xQ"k%[@W@ePD;M 䛟n=V`96i}E&Pѝ U/My3ĬILYd[lXp\o162^էËha~&Mo:Dmե? :ȃpH!xMpz*#+a(}f(UE4Ţs-:)yl3c;\±0Q\ܕ$ww~}}J(z4lCr]FV]~k0x鴶xM Iq]F5 =j6l"b,\)I>zơz9UHB˖rB84Ɗ!Ia l[[SyPʑb8Q/C}O:߯t}5ӯI1@ ~=SQf, d=ߎۜ=* -ʿ8))/˖,NjA%ĀM#tcURA%[HX1)72FtQŃ(/ 4&~R:OǤf?qK4\飂B|@Vf 3. WЧg e^";H4z#&XYؽU#k*2F>f>] "ǒ XƽD4EvGNИNӏB*|nj"ߗ1slWU^Wh5 ݪ/EEC;-rZ>Dvc~gqlBE*zrNN 0?PL , $=5UĻ{ Z@ǾO4`{m;hZ'( :W~ *u/!} |?–xo˴z22Qr2XbJ ͡T?Z_/S?/1umV ]/|pt89(7c{"T*[vE7ve+ym;`0^FvHlB.~!q|^9ձsc3ƭi|쾝&_@u &JhLfq\-Dze1_E  Ϻl( YH䚡F.EHYA9)߅v Ǵ,vM0.zU Lz4.~"LGfjAZ*[)@?Ҟ``R!ZldFYY/e zbV`.DܨI*F13j5NXv!i zL ?dL℅qeϘoEFKD/O( y`Pݑ+ w5pLv.yU<}4Q͢-24ח;~Eqԅ{\&@V=dPPNf/' *Lx"x? J2DZDըM̚Nn"}9|B^+P-,1rTHy Zi)45 Sng.NneLgܭ/ 6|0r5,]~ V-fkpbV}#9,iH_p WǹyۀWbMrNfItxkY[n*G@?\h 맺XCGi#q~Yi^!1{q>vI}z%;Ɓ&'*˕ Bg{;2[: 4`dYlARa}8__2em/nd '̔Dܪ<@w?5~W6GpU4J6.I5<8vm Cb[EoXl Oq1U2C9 g>W,@/@sP_ކ}GDؐjO꒱fG<&qfVeKABAvOx_hi E4a`7\k'/J"-Pj)v l.w2|G 6V~Gű>4> ^ ߶\ Pw#{Fz<g8VsgIuGO4n8VNG-`? a`X6l4I`r;õ`{O҉xA3H_&rpHw U$ )H.?+q/Yc1%$ -Ƙw6rGJ̟LT_W`İsBV|g ,ɫ ]9j<<7VCs6iSk( LpmlO!bWga${T}/C@$q~P V͉+4Ma5V;$^RRY] #io`8|t*y5Iay4?7*9q"LUj:AР-a3p<>v|U?wZUyAu$2rusUksXoZ|wczO(~jVs1 *SȘ(iiKo++SIiV9\dEC3]KC}/ZBicgm\UXaIq 겤j"§~%b$a>ǨgbrxWojE.: 0xUcPN1LxO1xMxQ5Eyi_l=DkWa !R~j$".Lir~ kӽ @]?,wME@wI/ ~dՄ?G۱SB#9*%y{"3 dקnTVTd ^}WYJi9dدͳ'D܀ĕ׻#m;,f΃ݹSQewa9u)^$ei8>#ƪA%'(BR`ǒE[ugsP.n.tkϋD۠܃y%tA,.o(WQ>XL"\3Cj^D\coy@H!=ZZaj&3L;ChA(Ym%# W-+UX0LX%JW[p!b6d "|韷W<%]si)Qi˛ 1L6+&l4 3UwV2ysՉj1coawPoēL"@<sy;'WAbHk:%XԵiX@q~LԺW< =擓~UL$0XMǬv] YBY d辳WX~; -7OgAk_y!XښKG݁Uߴ|L[K$a·ޞGW_0CfX_obȸj;ic2g10Qt|f..ja0 fS>sr1sRS):k: _!Ke쏢k".-cn]pX}9/:B[z71ıbJ"dt`j'&T XdT5-iQ÷λpWua8$fWx[Wt4Us!ݍJn7@Od1,B Q:SAN'|H6 kƔ;UE~6vo؟BKB!\"^[gKlmzJ1@vt5`D 8GJHc[5"'X.O*MamZ3އ-_Q(Tպ91n7݈C:'%oFN?E2 K+zr˽XYCGE @|s[x?90dRvZmʊ0ۺ̣<k,tffƊ#A{g4#g7b:Ҋ S PG8D YoCs_BlJ4fߠ JujΉ2Ns rC#љYG}f0$Ф_v~1ɝ7,J>hcy -W+ G]2. =?ocϮ( y LQ?#o=;O,d$S}1?rA22ӟG <RlUEJ74 (w"-?eMY|I1P=?'oށJ'b ];OFC,eŒ*?,gFg`P_cGXǰXڟz{;},( YTv5u)MzDx:@ߚD$ `"yK"D2쵵]:t؏98d&/zbv5], d:4_$^- +s"޶줅Nf6 k>r}A, d*r顿'0 8ȓ)3tTc(σ[8x0GH2{/wKdaǹ'5 xeq*'եBG.j7?["`ԌGhK<K02lC4xNIb %\Xk9wܰdD*ܓ0LMٛKnjI5g.9c "ccw>=}MX`L+DT+ n+߭cKqͣLNg(VP|snRJLk(k7 fWs :)E@d%]ڬs+=z,=@ڞzϸ4D#jͅ4TOJx$~6s''m f>O3E"9ڹS&6(}VY9Ғx"8x\}!y-ש bN֓/͔FA;RS>ei5\8(0}pbe-1vltgr|ڶO1Ņ;I|gym#^'T-YvŇzထ%>q64P#H*m:HU 'aӖ(ooגQVxb7~ saȵj"ux̟1A'@_gG=y]{TBB髑%G@"}tgEx'WAD/]9yfgL!BU?$A˕_4~RYYgP>Je>̿hrJMH2G'mO&XҊmB{|ϓɏg>d<НIoH^SJa {EXqy M>#(JĨ*, /%]zDTe Mq(s:qPi{ #yܔM;Yq(J`bm+jS$ӜE~}^sJkJAiA)V"wy%j9 5B834ňvޮq?|˕bIibv2#}RSF]dKj%?݄D^Ui[q*rܿL ?iEʭNlLɶXB.$P촶நta]ny{5  W.'bQ"͗0'zICؿ>>kkE f f4f7|h5–K75t٫ݍGukk `H~K Ѹ^Bi r?ѡBfrg )jLU1)Yṉzh9X/!mYW汋*Jd! $j+Ood>xfZLטV Xe8`di+P}h0jRnz䆈@ywn,'q@ng;:6mxT b퓱^Q[i:23&nDyAgntȿtNpq3읝,xzb@9,Hrxh@%o[[Q3U-[V®Ь_!i9xZ'IJ֫,Dk6/* 2&:`Rk,켷#/80)iKt x A(o 4*'C3i,6I]ظGb>|B[oі5mM6FoH [0*d3HْG|(!iWZ~'EϤ%}'FRz}p)Kc\+l\V<05Ej0O4R1t%xS յG-Wcl[=vd#'_.u1lC26^0o\2iG#ktY>?uokWI/f/ʇ''5a*ߺ(5ܦ^ٽ"'Dy"}7ӑA4CobF:s6ΗET s_rg׾BBu)z1ؑ+܍Ǟ|*Xk!@(MRE$bQjjaPfTH>[+Y&AS]5X@h_Z ~耯)2,%WD%)N$yĥǞ́O$t^Z7S9Lg+Me ;~ri1e-4G$i;li1(88 gu>4ԆcY񗏂!FkmwQ\\ܣ~^ ^E h/^<R9>M&l_?4ɒ[ LkB5Ckza {2xIΑ` 8dA~zN4)hTqdEuXb|( &5,.*oy%5ڇȝH,|&G[^vPխ<*æRtCԣnhp55Lx5؊oD^]E$ P-[K)-xD%gdև~i9oXl_"ג >-FvBRlTQrQTbMԮW'GVL49kYys fWE;2 ii 0W` e_KH)Ii`ܦBoC"}Fvo̮#g8(b eg}OW%|*6amcwdS|b;Pqf >uw#>uo4Ϛ6iwGafh%zR5 ⚋"Q8,vrtG4MT8=^`-Q"f@xpc*3u "tMRt>O!;5[W EMjϔPp$Fh.aM cw̄%_ YWp@/u9vK/+Ω5kjٽfGɽs*8{>G)uHIa A%qU L%i~ y]#uMy6~a$L2og#>i./C~K1 bp5DU=QsH#SG-dB{rFڂx.n_9pd.ۂ /c, X.HotYU>yܻ ''>t*f~ZckcRw;=e@dYT Y| ҵd~mhQJz蔳@u.I]3U>CJ}h%Kq[K1r@nUhOc啽%ظH s߁p|M憺U݅W~7Er6OЈ,)ÎsL53wxs8J #KU(ZP/Ѩ滯kɄbdhK9È[`#*no\5 ;(. PuCp:8)N:7: +4ct򁱹7z2&P_O{Ud6r*68!\Dp {7W!$UBq\fi6Պgx}~RìYo+2.]fs4h- -[4}mZ\T# s!ʼnd7w<$2NTߗ rF2aw6Znx*N;VxwX.rnX+4Al'Ip%lhJC=ĕWjJ,1GX[]\4"iV @L!=vCGdUE+akz#7#EhuVW)i.MvҴ%..4p*F U+?j+ɟĕ_Kz7O0LD U[L7AT&Svaq} oAV@Q?i;,ʮ"NkKVIؓROBpJ75i=Ḇ;Ji͟[7%{@-4):JӒcfHt5Dh q>*ZEp~D߿ Ϩi|=%MvCFznAA-ll[dE(O0ʝجktmg]\ hS+جtK[/^۠QX)4+0S"s'tq~Hy} `*'IhQZRK[j躽׫@SA:T0a(mQVTLS:π=*3F0 fײ^")YQO_DK]"iB7w,<…IAFđG?; 3%" ŷj~J^#F|Ik+0ܽmouQCR ǵNI#Y;N9A 21n+,( SwWu i1cjlT eW @LBr6zIz">z+Ww-(*Hq5a+WjK9k?QoVeݛ a-_ct2DiLx9ny:UKk|҇ɋ1wGsbET̲T!?$EFΣ;AC=Mk4P?ߋB7Ta&f9;J'QvTH,`Հ^FC%.)JYބḧ́oؿM KE[ޠѢqWLVKie O<|5~z6bF(*F3BƷXE-gypjr͵X@g8D s0 j[O7H('>/Eos &Aw̷1U"!>uU(| ^nx2_w;qX(뽇9I)%p6"/6"קjϚ:$ʢ ~ SОn޽}|!޷!Oil"$|z70[m`? h4 a{:8XJ3nݶc'ׂ_-F፠;@^W EoM[05nW@Jf]ޣ`V֏hT5>J+A "vהWXw67 RL AkgmT)+A6$NEQWz٤Zk>"d|foH4~^aY*5X2bK #Òwf8ªWKTwePb{j~+ބJG aJ}SxJMQ\gӺ&7Dt/v Mhwr9BW,b-vEC>CG~`-5av̜xNb`y}\;#*W>^$6ۨQ``}]1r [^]lMyZIPMQA c5΁ B0( <%y9j+ #üQ\0?$ [9O+r<4 [-A۷yЁxxD  "c$L!ֵPy[ 2+{S|;>ypAMj?ڴ&ědQiz "L@IDJ E8IF}9#]>! =×.m\.ū ؅ɝ_Io׎> 0B31FQrz9RyC4 ƧK ziBa"8wvo}p8fy}P%V -tA@(a>]\n4E?"Sv&ڎ[&8~rӿH4 G{\PgY]F(Aʫc'JEX7Ellʔ`*®;zFćD-7c_/wd,%^fa?=Vc}~ ,Yĥemi2ݪC.=kÁ.ʴMJ*:ۢBph:ݔo&a8p8 KiHl<B8Z n}a7)(V H.htȃSP^'1 "`w ~@4M9eq&M!W )R|FD.MX'5kZ3B#_SE qIGqT^n"dbZfb-jb%BH\ ]%)1<= [aEN 4,PO.- #[)Ipx6!#џ`"5|90U0i\" qq/%v"lhQ?c#x[LS c$XLCa6QaIXP.ߡ ]}tj*$B @/l5Hc`pnhWB$zw;HT{C]vLZ-+vPFn 2ހ9 ou dYgf)'9l` Ai(*.&٥ a>a㵡]W 05d#2bZz_Ut1+-YcJnrQ(DZz~t|lp A]+{*u W2@L"=TY wg&ݗ0ME{ZS;. ؑ#ZJ?/NnH_uXxXT*qC,&'e7B4#baѾm?̡>a(>tv]Mf(#\`xaw}`@Y#Sdl-35>/TGe ~q^{v;ھ{|Ӧ +S6*(sdkG]*ȡ͍Xʮ\Ao6,?c!aS+U,r2Asώ! 7Yn+v|,8D0A60ٻyF=Ζx3a '}-2 0[jlApIZp pvT8Q0̌Gp[l@W2p:,;8@&\f%>@hջ +4*/#@ @UmNw#(kw]MMAuke# 쿨Mzy p՚bʕVh]1UFX'EBāV6\{ I6aſAC!81jV@iCn Y)[ oxu8`bceX71Rr[-ٟ .Ffy U_@2FimcXHRU]ZJ H0[(t<1{Z:ueZA ԗݟC0Y^]IQ6N#H8-MMq siru$te ?}xMF/ZWMd1XuᾱC,]w"/} A+Ms7PGj!US#S ð~Q.$rRi_p_ݠX9q}u.`&?d--;ԥEg0k(29k GU/Bf󽟿](ډ=]Fžz?rg0%h cCT'"Ã0B yjUBunT- m֫ݳA(M' j%5T#V3c%9 +FݡTB`wfY(<쯫Mi_yvz!}.>_dߛpJ-=&h'Sk6KD E?孴l#LV_-7khzmtnT@&[=qb`k)c/`<-?f&Q,t<,: ] FC,|PRRq̽K-sUܤ| ~Ra&isZDs=ϡxۇ; e,tK Q/\YuB (RÉ4mHfߓ:#]'urbv\ɋ~ 3/sBR ǀ/ԕ#Pg=OFkdo'C2 Krngtz|ԛM}#L }o".^ *鴳{;|vRĵ~Maş^mD6e|2R_5O tF#jυ}@ebՕ!2#5ym5zDC -Qϋ{~B9h0-[3JʛLhJE q Wz&NWEE07@֢^|fŜsd/SeQ"T74$b%߃DoT]dGo>\8x!g *ڥ!>*5Տ̻췏hz0BF\.ϐ_Lʨ dWidbf\1wERdjgŧ8*@'#C ` H/^cXI5/@-K#^{Z"$0ˤ *AoyGJ+iޘ&+_rbd+&#)%ƿ)+xNz_)e,`CShY1s!j.nP~ ·=C鄩+_m= eN%_PB낵-9VKcJޣoSKqroNHۉ}WAC,P: .Mo2G7ngܶ)$^̲PSDjM g܆sg+GOecd|cNs;%Wq3`ADvR4? <_³at)?1}+¦z"y,5C:#+ ˞P;Va<jM'?Ik`X<2hQA$ROSmR'Oѭ]$QQ(0ߍ, Ḧ-󔤁Ե0a1FQdݺ ];4C %`!魤I$S-݋lO~~gBFJ#GUMQVKdbSԙ4kIbJUup~0+dyьtsu\2Aܶ; ؎譈?fG@*Ձ}77i _^(,PQHFtE)4, w*iOO.[W EVM.C-2dM$\7Tg֟}\otm4O0=6^A[Nu7:]n*=߂Wf ~dXӴc9DGۣM2}-<$ 9ˣ7Pt6Vs >(('0-u @/k4rE_P}.~q_MNhaeHT+m#. =(w/ױTL4=a 'kqi|x L .VV"Z)k2?}+dwx#Cp] iMZ>#K$}lDWw^,\:c؛H٢$^;wTNyYLJк7=ktYf զ6N˲byz;!pQq j=":b(̅A?zN^9TщUead̹p+Tۇ=ڝcRc99esN$~E E ڻon^&v-]ݏT( ?r{Jܨ$?;3 V&\"s-ZB@*h8L'vAKLB+Z<}_$ u.PM. R#VX6TYm -$֢paqSí=Dl.XF,SF( mNuYlnw'R3Qu0z鯱Ɏp}!t$GEm6|F,EFѪ¼Aku)=) ⭁J-: \e&%ijUn$,efW21!h_QEiU;+ɔn @Dw{ `mmf 7.p8K,6[MQ+K.ilHkcJ}(b t()<[؂J|NczٟC[_C[jKRc_Qz3`й~uSD@8ads;erj, 9X 4;qs.o*|rp\3A' llzU>Qە͜_2:.)d,7/6hgջ PrJG8f:.ACMxt?Ȕ fL+i klAPvX%D~5ޤ ;{ӱ{QFtxKhKCGҧԫor*) SeP> j9sS(r SjRF/PkHc Jǒ~ ]Ƴ{LvxyE>JFu(~2CNå-Z(*yB:9sуӷj |cJ-Qy< LrᾈiiҐaz*6*c:8W m'6njF S۫ /e(١ S 0os:ij݊ܽ42B*$8T7Q'۹ņLY&}PsWkOU*gdudP;X&G '.ѩ:87;-0怟=kXfBY'q)(ishJ2^_TTi5ήcD~57_VtU~7"#BrO~!i0KL% n\/|*RFb!H,UOӆ۱S&ī{[̬D:eP=XSGKla$Xb6p:ɟCcNZ^]rtGy(,,@hwnt1Zlnpl[b gG`J(Ғ,x1 aQ9ScW(\(QIMꆂ4B6ER[,"nzWkP3K2 @Z}W/hZ[-l괅o`o<ʶ4](\\ϛWzo>d贾:o,B_y KICw0#)>A?,iJ$)QT[,iVtR8w^D]SKhԭIڢrmN/!TMbE 2l,? UI5bSmcqŦ)DA2Ȕ54/tFAj4zn_)eud=ESyo<P> CW(- v|j<^: d+![C.t+xj_ ERlz~wP'sq;Ε67* +GE-~-,~`@7N/9N"lsG i_ +2r2-!bt¶9c_ŘɈlN2c;1<Sp9i (p7J5pzڒEz%^kQIɈovhϔWrŀOYXVD:f$!CȨ& 2<^RPON x`JjSE?^V 6~Ϥ9i8L9KzF N 뭔n WΜ8݉?k8?:D#_l,/'CHZυtχT< .Do!hRB,Y;ZkMc%¬;-O -A;0@y2<#X~SM߈`SclZt y%"w 8K1'`OH]FG6RTo҄r!J$&o0bC'xN؀nOҦ]QCk.H lԃXE{襟 SR\c_beLxb\]]ǀ3ucWYu!<|ç\Y`4_k@٪S nB+?ٰスR4Aym/0,CFе:nd!_"jಧګ,"a,~]l'#FF: ryϵ)AJ<޼ HQyj\"b,lZegK:9Ps(SQ;Y;2TmtNkX\o((oɻ*OJ 'v])fHzl8ൿ h'ז8fg2hL]tGc=~5i\,"eU{7yq$?{y(Ve$U^q\wvB x՛-!6tA@9l$!CKtY#wig >&\:wYռkCd*|ȖDRq757{?aT~{ꬳ©s\}+*d]|)&@,@\7߀:ziɜڱ;֟=m ia~QT)j ۮ_TS䧐DR6ggThOhw糭~jK^@|?]ܙUoۀ AW_7@kM./lyKS_2ԈV>:Svw0[mNp}LN p2?ҩoJTY Z2;N9^i '٤&ÛaK܃幐IW@RP#ЬozA wcaǻ~QECI7* ,}Ez?NGZ^0X(,\n:_8¯,#4tNh Xe."x_s3dD^/:ו=D(aHt.jGUͽ4cn y8[qv;84rg6 Փ=$_ ;ğV6,P@g^Kு/*! YXlE\ EVŌ!iR:vlT\"GsyE"ogjX`l)D,ɵȲD_t"(3TEy@PXnt!^ ՀǰHV4x1!$4^)3ãzZyΩ6?JUb4q'o[D?(\ǐQ+;R jC_t24͉"gk -N}\^Tl} L,hZs>T/?? E  &jHP6Jl,+r`#>^:e hS4B$=ޡ͕NPEL/c BqEw~L#u\=ԁD]g|$*Sss}.*S=H|l5y:bοWRM=vՑ{.HhjT$]F@G` gԻ`æ.xM"s%z1zXF@cMa}rHE41RҸF+U4nk/EVٺ)`\]bVaGb~O1HؤTJ~lLo~EQ?5j=7]WpEXb<ю\\t/sJN&aClz9S-^u7NOf iX4bF? ^юa2D-{͝}5Xg r\ꌫKO *ŭ^"Q,еX dgH҅Цԁ*yX]Sƥ_Ʀ YrLSՉ ֭;/o҂Chw->`N)h: yyt&IX1 Eծ팞I,Pc:0Y-X9cs SJp 4j$M_l wN}urZ.NMVgEb:?Gg@{O)rix㷣҅ VxT\Mn$|̗CUT1? )Hi Jةk/™yp-j㸨C/9b/j,4U"Fu@ص]f:ɆcHCN ԟEhOvIy9Oc+l4p)zKV%2摘@(r1۟T)!b^Dlt)_Sxޥp&ڕkh* Z¨z T)bLrRbw۰Ssy|4 &B&QM $.'|QU(J#A7fܣ'!Q:&_|4h,<&FTKe qeڵo|)FUX(4_L>tYB0LfivZ Ov]?*'0&MmTa1晩~$Be$f.%$͊QR؇g<^R*r@4Ҩ,>oŝo:40 d}&DRǔPz-dKkN %m|mY~ٜ[W͌tsI;kU жJKuFEn>Yq :z?A{EÖp̠SG70+$i3seE}wgy Sr0 k(VòhfJg^bAO}c|G͔7/C=RhtE=..c e-(H>+k? bAsWC?B}i 8u%{cʾ@]x8 v| J󖂵SPG/Km 9[l'AJ7`ei~ܒГ2#Rl}3dJ"GTe N(/向CB al;c(s] n6H+@-~uIT_L{F;)sߋ>k2%7m O {|!l6\ޠ4o}T T߼tZaOփQDX*'䧆n!5r<] @JcK'`t-יӿD^[ ieu(.c15ٙL%Y{fC듂%l6>Eߠ[#lGD{*緷A?FhT2 NjT&>k 4hv*DEF}w86Ѳ/dtG Z%䅸&V]p;"A S(>>_MWNa )gA!W%"ЖpPG {lKSh o;LW3϶f|t>f(*6rP%u`Ai XRbE/̓T,k:uOϥ^8Ryb_lN=lLX.q3 \tЮb%d uP%*]s>ebRGy}O*"q@?{~)R`3m2ڑ,>}*YlJ> ; I~P: |Zgk93\!MQ!J/t%h13QPd $(ѩl Zth@'l#dx J}trh䇳~R^a|"f62D7**"jC=_LP\vI ]ҳ `jjӰ4gA6J'dbz#L53fAQ4&ɫ+ G)CCk-b3o ,_b~nUoOœ>6H""&j +ԨEnX`ecV's/y3>BbLwAvcxMXRyi8e4DB;pHߤ)OtyK?oGGfR ȹ4WGȫ=Vgo+ڴ{O!x:v u nC,+SHM=@ʕO L,T?OΫ^3 1ͮAmTD:XN%(E!ق#d<|[ք㫨f@X "=T%H_wzzb^ml:jqaptU'B2YAtC!?4|X%⧬SऔykaFy8<0rxtclo? < o9_U]:gRF͡=v!Fs)[q66^hULq(uōi[:]Cm Œ"YEAxWs81ȲsL9=y"dՂhEYu&Pg%A6>vqnZ_= p 7^L}[9ke{䶼y)v !%ȘGnZ*}\z)>lkOY(x{AU_)ѵЕw-x+Tthl$ wP)h"_EM D _!clu>e;ϗ#?tb3 %+M(CdG9۸yik|6*&zOY첌'ri];?5~){ykOs+w/feAFHH'\ʸ-Z-|\,p:,:~FXLM2ہb>x''n_ Qd^@-TH~EC"BKR{oPIڽU,f d#غ#ujULռs|4-3SԴtq#%{ݰ*!4._WإҗWQ/k/bޛrxn'AP$6 :/o} ]v|4@'u#0T_s(An/SVwT:.<"0G Li2ֳ :OzԺ b7hLWj_#}dE+ceHPؗC}Iʕs ,\0kwZNv"~IctD Qfq.&<мCҁ7tm"<7Z ٘}7}KUR1CVy 2h,_I) uJ4ͭ!l\eÊ c]q=\òJ`@FT:OM/rw`:%`+w$ b3uF=w VAz.%TGȩ6\~ Vo גAo "yD2*1Seqn| wBrx&+hdVڔwvq2t+X{'9AIiԦ5e|&MdPߍe i ^yu:x9?Tx•R@ɓzfKB2yU5_B<~k0@'wk:y⸞5Af in/P3o ஁ZaR-Ɇںgsаi!o<Ψ #ܐ$%OӁM/ f=#=*a{lI\e7υ=X *1w (U[OtԞ`ւ`lTT>S}(8L7{->B<㎖/u6R|W IZ,`xM0F^-m`\sbj2>SsZ 5C羲aݽ;Ntix ZifVx3E)C"hrs S &0¡!KUu$[/6ZW6G6KY/!h hi-I|7KYxxgtW嗑+ʼnd/榚&|8=dc 9zb()}HOy `v@qzhڕï򳠨QEd܉q~9e/\_Vᄋ~@\ʽ#͔灞YXHIm^%D Uo6Vw5r!WSSU#d'tCb*[f~-ABNΝ|7Qk oh/jɝ1u})'ouAR ?k/9FLb9+AAzX&MT 0뮹hdrZ.ޙ c@k%t/Sv0fN+ÏNW`{>ˬxpnԷ ~ͥ6w'!jܙ9G0GƢM-t%1KۘtFBJN' WW^ѾVCBC|[L_?Pbnl|Љ*1]J!ACc?AQJUT4rGHe4kͰrS81WJ]~w卿B]jCAsfy|d@E? B:! O3D' xY/:BA:&Z\ g-Mβ_pI w!ѾjɅ}fa YLڐe7| ct=)9)_[-W:_bxҚhES#ߜ`Sc0WuefF*:б]ͧܞ.]h`y7^Ov:Tl_sFvZh u7bЭV,d*Bbb6*2- C0qأ~DW]Z#ԥ 1= i)4@ *~"Uۮ]'Rw(!i$Hu$YcC*69߈Kk+_դ꺼3K8]|`QdN{!A3kpMq F ܎{=!:p"o(e72~+m6j}mݾq,EIEN&S3[|nt9yLcƬ5I1Pi]WCୗwEl+@#PG.1bsէ|.]$YP.Rj馈OA eܶΖ$K[88%FYnפ& ;uHzYXk }[fܒr]!4D~ <{]y"4a/jh*+t޾2|]OM$Oc)=ʹN|%?K<FZn t["4\m <,A[ɝn72blgQ9 pҽ#A7 Q>4 [aV!вE@"7wIg;[^m?( NÜӟ#?`*i]M9]ECޏ ϾyX]|c yPL@TjlP$ZbNiTDz}1Utgw_׍b߃eJkW.l"n#\3Zf{mHH,Y &&Muh*#+zflwO>&.UYĩ:OHֽ]JlzI`8цvHn?^T (0N\bJвBv,ZⒺOz- 0JP &QZ)' a:3n'#84QA8hX$_,tQi]Uk?) hsL5!G!BSd\^o<2/&|=L#E.nJ_{`$C. G~ruS>5Mm?ׄ b&-HD>=꩟_kXm#,PZf7VSu!8˜ד]L-0>s9J_`'yŀp^8&faIUb>BdJRA8Rҧ&ֈaΚXBQ"a)뚬qgZ|,(UB1&Vડ2UMhu Jki)k soJ2:WdFL=72=C@vyؼL!O>H K#s`7窞nL}#fQc,(yU~b-M.m,㻦yZ,`{GoHqW-si5쟧|FtڼK3S^~c>$wZj0&uW5Wj'ɂ:eNeOh)y A.+mv?yqܜ^/ma h=v=%yKC7 h>Ǔ OOK7tN>u՝X /P{و2ekθznG,3.Cn32jw_dD$ݴϖ(\G2v? އWF澻5򭮹iy1AS /xoŌ3c4Ȼb &9b~GAMAy[tۦ`(Ϡy:m>l`NDvGyl˔VsaSb7Ck&eK229XkT^/=4Vn~y7'1IicMW(n<ǭ`Śu24eť4MKYWZaڈEpXCN͸HTC@ט8"iY~@& L$ϔ =F$!#v-j`!͟QvtgtC,Q[ъpBokB=3%FŠ1[3ׯ?- y ܻgCzfI՗">?6L݇3ɞ'%ΌuamC҅g%Adb&}M ~M.Ԯ5)e05ɐ1è'K#8dVK-b(q-3KEԻ&98[56He^ڸ"-3u3\du~sh%mͿr쥛NR0ͺ#_zeq:; Žl@?ÔœRz UaSeV^x!j{XMQQD_)+Y5yMlIRm7Jdi2 7qH2Cj>\K2Ln49 q4M1DJힳqR;j*+ry|XGVr(R]zx9nA, n>HR3$ݗ/@K &1?ߊ4}'D4|>\c<ViIp5A2 tbo2/Ġ)גޤ*Mtz>ty<\|O1p/fBak#-Q;%' 9z[UЌO+\ E`#sgCe 83WCfa4Ks$Yښ`D^g.?lH; Y +Ο}D <,7w CҊqMvv#n53R/jlQ氊I\5 杙Olj"e G;ejM rX=>"ͺdxH4dE/46xΰFdKKjGLi\jڴTwDO1(2F'ĩȺp* nTU_)IWOѲ$֠`Q)+FUfE%? P=>^m5f砠^|-3Ц:kb%ICDh&n*1Ł ELZvgg67A!ӈc+c,eڡM2a\,ɼ:طIL`:}4"ۘTpU8pZUaPeŖ$ jAE|g+5b4(}%Df/чh:B#J`bsW Ǚ/B{,s}#t@Qۓ\8FJ*d%|Yu}mC2%z1d6],2 cAI>~ӛ2 cɬ'hYkAL@ xxFuN(P@:g:lTwXig_}$6aJ8>!'rKY@ǻ?)}-YNp*6H + !tŘ:|'7S Q `&]& [!z>OnOq1,=  U%=Gإ C ,5zvŶx?lÄޢO Kw{RRl짠tφPSO*k_U/G.?jC{I^YHUּ शEiTH=<-9^:0/䎽ݟMN_ + l 3ɸW"GϿ`e6tZ5hswf" >:9*e@4L2v~B쪘P~G yk&#F@m}JZ9skH?ze DvQpZ Umirc$mM#间03VzטdlmD]hƖ8͕aa ;PS&ULYH!['\3 F,3z/Yvx%b╻ xCX=j/>2Co,UѾỔyh.NpfLgϵ$6񀸑sADE S)Gok~±C:92Ӡx!$β9]NOf>sjbA3)An!52FK};j:(d%c. kDׅ3 }S4C~1'^] q:J#L,=~o!PU ٝ l&,f=#H,WF:.pWOi{7MN? ͑P?_]Egƪ4x  hO<$C=aZf T-rE 0>-J'x z+.L;yHG?Ϣ%Ǯܠdg-G 0$OTp qVh5JMVg%qopY!(?Aͺ8oZlmqmxc {"eI?O^*Ʌߒs c>( _RZtڞ v(DxxneMQw&鍳T%za%d-6x]C.w& Cz:"I26`&zeh`k4IۍGb w9>^Btf~A֓-6.vϺ_aʉ}FG=y0T10k#t9Uv*a_y9DɢdGL֛3]ؽzou͉;ˬCzVT'*}A?=Q/xPR 6Q\io̝ ; [;ЩM AHcy>ޑTՇ "Ў&!A0O g8rtI{2cҩ Ɍ'I-K 5RD}UAHxrvzWl8,- \ҳ!t Rʡ< CWi&gJݖ\r"L'}-2 P]D:8Zz7}L0 ^?rI`d{o75k/E' PBvx ߽4#E9bۼMFY* a^ie ڋtr$'1y!} /@z# *qz+D;I6Ez'aTgDOAfK#IUh,^aJZr#m%@j(uhUe$Ļ]n#5Jԑp~!Hҿ `eP~='U?ˇgA.WFo$J(&Zy 5Fb|{ ҙ<< 'nsIw Kt76#wΥU :3XV?pѲdL=%JO/-RAsSr/|^ 1ӱĩP'Cl-D$TjQ4waENG؝%{Rq( 60zD@>mO ^BC!( cKhX⾫[<, Nto2XJ@"$2Ibeâ2neG}u9cp h]@OjU4` {YfHbغ&QR!j(zo* GLRg\&7銑u`6ϵ+Dw&ǬB!.$Pm`i((\=h v T)'ve$OJa7GHS!?:R㖢l;W&iX]`2a_>#꟏5H 3N2F34U?3Y0KۓU\eB˧Y/^&r0sY}PH@K$ \Ԥ\_ lmv&κ6dw~Ep aLkRgĴ, @cò]&KlA@dh !4#c>7ʢ -yN|$Z1VQc+}Oxff6&iyr/g==ʡogE"`ߜ|)xc\5瀸r8>,?yNM<ۀcJ–:'{1[N\Yء'O ׇXC5q#s :fтk^4ݱ9?/P -O){_'G)S6:,3KZ:ob\|.q%]A] 3l|zf 4ɛ}wΰYrxj1/п8ڐ{9fO/q? ; ,Nq餯|" τ+}/1kA2*uA\ZpڃE}~rkH *3άJJw`$K=e%aI@ 6)L#AeFF RvϒI$s?4k zΙO@F`#wΐ)(!Nnqc=˽s9b'sl.W~ѲfӛvOWƺ}#E rû#v˄3*?+ 1Űs4¿H>Oߕt(i,l],==Jb[{iaBP,DY2Q6"_"v M`yi꯫:UAH*Xl,EyK(|s]0=j1D*(:+E"󯕪>naMeb&Dj_kw"xib s06gAVW2nfx쏊t>Z^t+,J5SlM K)Lx%ZDw .S%&'r Շ]_Nt= Kp^k%S5e<Ùic]K9.70%ߠ9kSZQxc{[b{Ȁ8BK+a@u6γcV1(w%fZL泩5@XU&%8{x * _ +OLRe]*IC,|tzŭ´յ e_jfK1 o^ ͉A:\m[٪u걏<,ܠ\(zl+)Õ*k,:d/P^9y}8.Ќ0Ȏ2dcvJPbsIk.[U8uʕ#jbc @Z)P̢6LzrgYtoËʔ &t@x*5Y6vf7T:.3DC؞ˠ->U!q#Sh3 ďjD͉l3(W?U.JXm'HˠM\+ F3‘ׂۈqc;#C R2Z}V&pu=$ ;K.TE`_Ds6:R{iE]20^j ' ?LD+_%yHkFcҹW|fxwczfc/?deP!$gSNH(cd > O]z^^⪸kx`/j^9mԻ*Bv ^#Vz)#tБf8O^o_si?RVg" p"?&n~F5Ɏ'`Oc<C8b^Trʹo}B>c(ǘ!3q!\۫RTO:"ZPۡ;~(\ (N3nY34`Nς/Um/M뿨 ;՗;%MGܲIY &k,Ggq Q0/l<΁ppT& ǜR·#Dψ&P¤6 Pd哃 Z b*W~)k N|0AI#i+"RބQ\Y0i|5 R$QO튏Tf6;BI_ďVstJ:D㭂_\vqm/'y{•3;2:xY^GqJfӽp>Ēk;I+U&ȦPxk7 V_mvʏ K_h0HBv#aRe&NB~?-4D<A#]a09B,Qq$kJJ mʉ,M*7G ?l6CNE0 b}/w#'vP7:-am\9/?FiыKjɊpuuv2fTV{玂22֥A@h/*D@vaweiZ8GVx%k d;;JjHon*K Z~_rc Y*JHE_dS9.6}럙 @轜"t6@8=MdC5g7ߠ965Toj~[Zb=ioé5qߺU3C"^⪝foPM&h[:q);h9T1f-M#k+脌' h3-Z +~?öWO2Xg@NE 0TN%ͨntVP>Dr9ӡ@o ٝ77SGj;ÿZOu9I lqJZm$o^kG.A*탷E17P3jA?.30aT4F})]vҷOqpFɈF}xHl>V v4M_S]wsޑޑ,FQ]huxn˽->6fqUTnQ^l:#^>јX:@d,RzjM'`=(̅4DIBP d Qf"$G7wpwh `~G>CxܜExƝs7q~פCyiLBLOʽ啾g 7ө|id>_#S3"xWažFHrXr1$y`֞7J9WE|x {:&^CǐN׻UHt6]N\SD5;؛2)^~i3M8=пP6'aWr/taAj&`]sl+.e݀aЦu{ي+wь؋UGJ5`_>uK/cc#3XʒK>f=ȭz/` 3!Mڃm9~-UFCޞ,/݆Ccc"܊H'S"F4ת{0sipۦrR/{r<*.#`O%QiWQ4xY2¢bAPn+}rf<8Gov8CIRA:k-sihC2(d˪ փ>@ϥ.iV6'y#KZUX#t4yOw}LBaUۤm9=AK}B$8fX))x7m"}KDZ,ck/ĴSScCsGmvu ui+.J8M$BPS$fwĢbuxyvwZ1CUHGe9ch?zQW -&#al&#K e\2 ~ "R*RJw4>UڍAd_nrQ1vG=_Nłp m[>%кE;4-ԆVV?%䠃kd8-2:t/<ck{̳_eI|"B9ܞn 7Kd,m K;:b ӝ` :祻>ft)CRQ~p P0B|Mz҄Vod>`'aUIY8(Ǘ3_8gjy]imr>F,a 8nn qy}bi+0avlgxRo3N$ |5*i*` {|v9<Ѳ,K{`WFPwqhKЙ ոkƚ/)La8&cՇ1 |eB0!xc9$|D%o{9U W×~3\^ڋ-v[d'rw!'b%cq}up3q6w'<ԣTݔ4>GQsn9j>C4O"ګ4=Ne EzJB.k9d_-3a2p)$%_}RdvDf_3] $#M!>ۻLֻ&+ JXbb Mڡf4|H7%I\`N8K+W`橹KdB v=sWnD émo5z a޼VmZA-bX=uU;obX_g6f80}%EBZjqAL#VB ,JOil'[~^몋G7(_ Z`PUx Bb'WWr8L׿$`6^@˶?9KjmG\ ł2ӯ.I\|D:GÕr ~{: lzO_?|Kq}뉗v9]#;^gee_VϢ'>F j2LSbKkPO| N;yC)`8Q=}/| z{ec꼲kdUBtЈIwо2 M@Y+_klRE-},g<$I+bÐ;@(\{{vN]EjEx);_@L~1">=g;v[pOrfSme x~)!f9b.?\r`MV-,`1樱Uy˲#rUvVῴ625;el7#^Fu3T MH rǚR>W]n5R[sG0f/("|U~ 太@ M,&,ys=#j-@T\%\A +IH`̌"K'F1MhR8c XGoQ4`E#_2u!M)Fȇ ;=9jVKgYsHV40Ttֱ;\Z5#;Te:@3IK0d?4;ԇ{!7oniQd ԿulfJ kSO%k~H ]:n<V/)-zԬ0X.zK _ɎjKC%(h#xvWN"L,7?9y-4}mW7bM1^~ՌCHM15G߶DyԎ2n*. },CkT$ZqȲ؟r$LN P:Kqq㫓OY_˂E)= ?I%US)FΈҞ}7s)Li]^L /z 35N:|+g pgPCGa&,4n&B30e=Vc|W xj>+{״̥PeCzBZ0dC $YnÄ3"į{ M@'>Y%CP)AoƐh²s.vsTK`wiR_'m{VħC) qǧuY[TY>=s}immaxsOtcw[ :TCҢ] m:QH{s Le6ԟtMe's^T!Q>8ƣO^7.d#r@uJ@ݷճ3ڻV3qmW^ovB7v*Ӵrِ0Ͱq<,WôJY8[V/ݖg>q-tLlrkW/TAzѷw?/Q>7"kgv|\TQkwHHHANWh /cyKM\TviȴEJ z1{╬@AlE!prvS|g]#E bP - u \Uz1k!0MvXnNJm`Ns|)*.-}9`1M+J8r,j~hб|Dz2}p7m+:=AV Q!|x]ܴ(VbTB {os(;Vw(dnf+ kdAJUZ:ީ@{װإ|MaonJuz<ڣ NI*R/YBiA\Xza'q:8%Esb@}_i+;f{L^P{w~;oD f|毄nP-EdS Ѐ,2o/{b&o[w "GDT&_>]˽ g GzCH9r :ʔEx5hcOWT/A^A6d9 00`D1TN/h(TMrXϼL4j(km]|喋=~qQ+pbuOdMNZ]IF ձY-.E'؞F.3u,)+ri4hyiN%$9 ފ%_o3(&w؛@k/*jg٘:2UphBI6>@9߻FX?lw _ײa2|MVVۉG{48U bT(6gv'[X8zWB`3kҎLh*1"L@o`7Ÿ*\,ֱ,A ޠs:J+(%~Ue)Ri3wGeOFŲ]AĎ8-RzYkrI d(!.&,<yze+z%ڃSkikNg$&H<:! >+,#GQ3Bdb)U$\=mL!WzXX1@znJUךSؤTI7KԩM14?7Vk(Նv>[RA/ <$fQM 7 {zE>li 8Ɨϒ է6[FYSMVev#* J+}H8a +unFj8ߧ =gǕd%rg̤xpA1LzOMiӑIh) C=#Ic<0 'kX8]p3'!?Z)AQYg2%;/r~vwx{H IMWOHv0=$6tLir0[ɤ. yԸЅ0'&WR $Eā?!N4!r"Jn͸.o%R=OY"xT7kQt^W3KIZ ֑P␂y/-^԰ 2ysj5:k^.c$59m~X3M\c w܍O) ٚbtW\\O # R3c oONqg=R_H5db!dKjEƹӊj\ON4EIIpltJDEVFqԑ\nGtT}}r%,3U^)zw#Hg!pmŌSRܡƘ+IW494WtPXW!^Nܿh]2yAGv*_~[B{Xf{2}'0^g*)bBۚ$2&FY}u?W]>c8xXv e_ۋ 1F. 4~{xI{k4z& d.`p )CҋȨw`|z$ʎA0}#! kuܞWz:Ġ*MS<~Lwm,^ 7tve& *ңc9|ek~XeKYHCMsruC?רŁcKd/:]Uhihǥ/OğkJ!G=Y#|s?չdf!I~\E:UH9Rk.}s 1>Vs^Lᆋdd/NaVT~ȒFO@+k!u85ؾ񋽑&ki+Վ\|fqbz{<+%>k'y ʱڔh/%`73ؕ~yI2'cڽjQv>Q @ ƣ)YHj0 BRqV VKA~O [)t;AjNMhAyPf`iyAHNg]Pj9z~l&ҺU~PO4V@߄dIW5o4@G7)̟ZԌk.B1& لYȶToITnWC4Kx%$/켌\BmdJzUg$ǶQs9nfV (̂Y1^:͔#Bi .I!zE|/OT!oOI~1Fn{+CE?iQ+Ӝ2z 'BGM#\Qn~ 1 K[RPNZT a+2ΣeE:;N0΅IGr 3a$rM5"f1EY؂ɚjoG҇pCiے~Z)⭱X9WQ5r4,BI@t0h@ªuMW"bn݌N{uYw1lZNqD[#T o,nuevSur04t->"xv?%οlG̫%' H!B+?׫F8,G|]Cz|$#*}w@w"#ޝ|BfW-7QUL(C`ey 0&\9}}:_%Pd'!JxTpOB8߳_ qHLM]("5n-Y`"y5YD9IWD,`C)oiZVW̾Ͷy㗔ޏd9紹n8 V[4p[gqNg~1 ۋomÉ{deghRd: 6Ҳ?|^Q|"dj_h#@:YG2|l.n ǧݕ CZId3[ G@~_1=v+}4yq &r)r #"[ĆRz);~y z[:V-^yl -Xۚ%Sˮ&'j* &4ˇ9%qNs Ukė0f)gw'D$ǻL.LKi ♨oS+\TtyixVK%чhx{4˯MWq/{ehLʡ`f'5#[թeө-N %7ElZ;M1+n|s9U?X1]'uub(Js܉Y[u1 բ$_G;_6 .LŚnקMpKttQ45=zұԉ#:+YsL@|Z %y_ [V{΃wo&3ˠBX:U2̀&l$A ]LPnμf)ՌVCivVlpyʠ4~5t r a3pB#dk::?X8'8Uj>8!k0{CǛp࿳&^/q~!aOvglrw[,ol9RhQXnfrn1TݷK_-mX^d+.eQY%CƜ[@:x<^ş%UxTk0p _ڊ uL!|oimVUYvKc3;5!Q.s?iT.85jN6Ñ}h=,A͂m'lW@~ХkQc947$'pۅ_yo쫶t0pp,}"80W}V}q٠ǀM)g[yGWbml$N&R+y5T}ͥRf 4\g}ڍ(A5DTw xHAq.3C4tS~-lW`fiC'Oo̰wlSJ/%W6{ZA! l4wy%] hpw/35;57e9%@2$EM`vPgZa`gX[@J{Z1>r_6 =7> Koˑ*j6٭gWrosxKfA@7ȁ|ۆǶm=)e;r#k 'ufZQuԡWqFpaGS5< 'Fs fo@送ңIfB>]@r6p_xI8xMXBoЩ{[`$b^b䌦;EQ"wBm,49eC~hnߺ,1Zu|ZQDvoq_w@ :>09=dK*tP)+TXT/>رOb;֎y%G4+&Bռ =o~PZ r-8\ӣ#XUR xSw8axpi>~pbMaZK(@v0?n40`\k.+G;Xkueش[| ?]W qx4g!a_nSloWzŪQm͗ Q⤺Ԯ>P3)˙[V'B5EK(8Z^Gށ ֶ|.@yAga:(wt#B yDVkzF3KK.U@Ym^f~֘Os"=뢧 1S;c\S= `'@LͲ\2Д+rT>=GY-`ݣ^B eq+!P<)OIL,CEKfqE̾23C: ̛c6Dh=WƲt ͕$qA/0<Α-"}hАTg}rH9scMHDn éa?\ t:q wHZ+ɍVZԤxaF@!2cYH--* p`l0yN 25ŕ Yhc{#i&SQUSL%%!mg/UZS\G]sFǀeum@DpelEԖHs)/=$Lj|!)#+0[ۻ~a0Y\DzJ#~bԜƎ|?SZ~+=_@K=#"v9(^b[͑cg@b\cc|ЃFF/°b13#bO)f]^_Z}jk8Sflכ^I`,KN":ݝ7-=Rkd5R LS>" >uJ ?L  Dtdj򦌗v|(=R3\uux^*QZAsNdˆ?gAյWgE]l%W&ٍκ%ۃBsu ^SJ$v[R؀WCj>ѷu Ꭷw3Ee˨"] 4x]vl˂ƍ"_Y k Pݢ$uMKyekV(#9q32npF~ud׆~[(fH.64*$>miu9]E+Q^c0DWSI'Õ7 h}1<}k:r*;:e`F&'F1 <188nQa "w,ljm? ^RJJQzV2%`=*6r/م}z1cZ9?OK V{P@:(Zk "70ãVϯzp'=]T1$"MsԻ1ƲX?|QKח]4FL6-gڜR>^MyvK')[P]2ٽmA4\:}WJ^`Xoh0L@QI'e*KI#'(|2^0{ΗOT| j$ .[%;>>$i `|LJgpSҒn| 3D<_Q-Ӽff,ש'GR[ij:NdI,'?)FAOɖ&uzbߔKUvgB-f {)54\ve:yT(  K[%*EfJ "1,fnnĞJ:j~'`v`?y[}%9OL\9$j&0O3d&J&Q5'FkP\3O<-_,_ .B3sscUSϑbQ]Wj'qJ2:z' JkMo0S.(r 3}bLL )qOe-l6>s<~H;M:5NeDU(0"!&#tmWmеjY/gcWl5|Ijv6zbiQ+1 的%I*I_OΫnՂ']Z.$'I}~X{8'^.yeGkxyr}B8iT'Wp .$R!{p<~whPQȡSܽ#iE,"M4//t<:t+*<v{sE.X͔ &Ub +rմZA2?\w\H=A MJ1kC^v1*\Tt;lrOW??h{:u*Gm*d^h4N`!i·{- s01fR7#MZz)*!l2uw[-;UUGğ||(efbhXYŠmODx 4P.X-zM7 X0E*B5bR%S4}a[dc+_)\Q ,`M ;BsJW o PkĐAq ߴl"JHP7c*ڧgP7v1cT[`]Y62a憵dw Fd}~K._06}-3|WX/eiu=a~;*\?ƃu[Bȥ=|OCa 'eU5=#!_]Tsti-W 8h|Z8c9m"rFL_~?"NjcgE}b߶)S\8 [ov`#SSC*ʅS}xg~8 «[_+JwX֩ؖ1gvdiU t2fD_: ' 왡1a>Zo M<4ھē3ڰRfҰ,amn6#yBk,2Kaϫ&1|YV;df8WTfZukc,[X|wam9'Hk0h.]y,n2Zx(.\n1uM FMfO5Ym O7FҘ 2C@KBp]vc0"k&?(,uQ- %A2ᴨޣ0"D^ s_,lO$j2wB;LM/RX/^Hb&J$oAkY⭅KU,9Ҧ? 7`ɺt&=*5K<'Ydj# Zj{Pf|>UݻN97SaI%~g9j)w֕2ʫf#ac7 GE {W5ɖ1H{b|9ݩiT4P /ecSa݁Rfz*ҹ 8bA wtLMczo6a>'-5w܉C|҂&^XuX Kۣ9'3vi/ '{f:z&}i»̽kchP{hcr[֨"z]u2 jL4{ ȗ0IO3/9!Os9m Ąb(i/rKg3gC@X7fҾ?\9 ?-.ۂQH?rHfzJC9P= 33wP宕)ܱ[ jESN-g\т)$(TԦ%K".]'w  ,o +?o@":FGUB nX:L4W`\> w>}8gKNt ?Azڣ &fVYR2n*ïZ1"y 䨧{n`z !p44a ,HGȉ6f‚n48m\e m+'5l9+QlgozŶ"wy3Wlг,pҖnUܾxhbYcrE`'h–d(P7s[PV:AT2_rJ;!bkC >e5_Ҡ-n i⭲7`5iH'B44 T'󾎻 @+k}N!;D\uON[)#\:領@<ErZuG$JH_K@(.|r`Sqn 0]P sQ;/4σgDžrquV +Nsvq՞-}{ 9a 8LviA (3%1z5o~49+l{m@LMF1 ޷8vcX. z{C3zzѓ+} !aZy[zZ^]^<QIA {k)~yT'%`$[X>#ӵ,.--&L?[%eV;wG;DUqGAkP*dxŪ✿a(iLJ~AS0`گ” X^WW RN9PGU98U@cBsI9)}Mh\<6ᖨ+B'@}Ea!_ }@VID:" I# H{8t&.!p׷gaiLg+Nrߊ(b?=Ac DWF"&Q [HpŸL%ѽ\|B՝uP:gߩbc8v)& ;D=XzߓRR\"{|@2!s, ZY^JT["ԕw,pn423zO[O3XȚA,M!.,mwe [H㉲U#/O&8141K%Lw͡Wg6|'/9ݼrUUU2wflAcBm%*X`rEnZcWE@`8d.W ($~.%5feX?TF#z┄'6Pt>ɦ %ɝt_{BܗEϬm3:^k"5̛AdvG'}qA+:ʸB򋮷:nwE쒃*"_RB?I;ĸ u`',g&zwLT#<.ft{yRΥ$4G!fN)9beypس9v&̟]mwEܭŀ*S) ?̺fk(gS=G9Ԣ8o~Y}J!t첚_ >kf4=*e$>ҫ"N[>c" 9rR\bn;knI]^=Ӹ.W(oҕcV.}UY9P~*b7 Ė}l%Iz:nx9cqKKLi sY+T%^!Ɗ>Jo[ܱ&6X7]ϐ+B&2̴FU6aHr/ “} 6deL{=,Yv"!Gu"J.b KW(M+qmΩ?R vT,Q]\q HZŞ|ulXS/inJnQOoeH+?%(MJ`c;^k=;2辿얿U"јaQ~%ρCs<Gwz+GL%L\@en͎)16uuj/N*ZNLR~dGFvLW$"_c?#UDkI&, u*oE +1]&GPD%y3[tK]@C>!*ܛ"˱){p*ƾ 4܌}) f7Ew)$J}iycPCΥ?s6yS,#V~ȃaoڂc)}OJ {cJ0Na!#8 ωkllL@K?/)jWQ1 ~z/d/:Uoɸ}2eH(ڵ\4'*z"8paeH pc4CٻuERh|n'K"tL餥(83w1e;Yw%a#EVAklD=2d8y3,j\51:ӏ)A1A\5l5'm6旯Z@:Jp EwmsUCɤhk(l \| yLk!.xd `!B+עDH؊ۅbli^P7vC3Hщܲkxc;dJLCξC.~:4-,p7t7&>aCzuDe=gBqTjiL$sPև;}M|WsQoܴZ٫ w@'ra,bݬ~:Ư(wW$C:CSU{&bEsuu{abvd}7|{h̹R[`̋qq~uP|2tXO֘J.-Y[45- hv|^u1_HWZ.{FC?R堤[;Ԍ8%ЬK1NtQ6<@ṯ‘ s{:% gu`ml(K87wJcoFiMWO oyxTYq1Y $nb-fs$~AK.ܾg!ĩ}+^",tB8DF't dO/cZa.rͨ,ie] z2Cȫ.k(r>SWx1ViQx[%S*ב^D5S=$7StrxW8"X-Z_$澲=#Ait/)n 6.kx-#igjN;2ڎP'tJ~j;AԪٔkgjn՟<N{gGb1pT]];l/KF|kU(G: 9AbL=A8 w_"m=(W`x,pEGO%\.r]0j/jF#!bn?lA%-<~mUV eJϊ f%]M 9'rM@5Lc8 L&ؤXT;D^:x5̰_TwL"-5Kc5@vPŸE䯯  N>s{`rsu`@L3E;f*.Fgىwc>}ߒq_'_9k2 '/ c@):rn{β^^)Uk[H26Q?+.UNKQsYJ^rJ0A3>M<:qڞw ǧXf } c >,oc70Ndgz JL&09}_o o]p}T^Ǚ(G qbP8 }۔3ƈ<29 7y4yuA)3Kk- CP͈e&@yks v`I7p.Fö1\#ڛSRg#n;q5 񁋁*&-)n]M_kogsl4AwWwT !t&cM_:-왛nZ{^ (%Fd* HG1yshDäs ^!kcIP } d2 Mۛ^ό[E#%Q×9r&l-W<ל/W*zvㆉ1Ni ZJ(+դ[kZT `]EG#vo{# ʞj\+#\fei|֦Ȣ/D񘆟c ÿ^ tV]Omzt,'YeQ~R2 [LHӸC-TLF.VN]F>2w-)N>$n֟Ks'i?Lgק_% а=xp Q мقX?Hw H{d̂a<Ŏ{Jydflנּ(&O-RyRDSP XX_uh_xJ{i6Dx[$ιW\ޚדl~e%_uQOZaDnyg8M-{QTs[W1ѳ~s @j pc}ֆ#mۼ*]?tFTJ_%wxXYZn&'l™Z¹[^[}(bRlЃyY@iV~􏟼b 2T]zO-ػ']"#L'Յ#=[9?+c&DbV,e&俕LI_[K_Rr{5m\ʉ%蟆i;<2(}~O;.i!1wB I<^7.ۜ)]MM5mE]53Fn,D󗺌YG{3o*&,Wqp÷BeVLՃ^$Iv$3z`鎵]jyqZ7 ,ws9]E.nǫ i2&ޠHtX 3\g0WԺEi()<\qWGPx Z7 }B}#Iai _HKneA`}t*G(c˂+6XHbN6}‡SUd(f= Eڴ?k p Aϻ8L0^z6ҽgH$T`COF!#ԨC؝pg7[ζBYLyV%L # [S)er ! 9ȷB!э?*%oң~ w6%t-~# 7u-\^HyZd +zn m7t <ʶr=D$H $z"]GzseBo@F1HsZYA[f""eUeTEn7u@,mMMވҳD؏Q'{~>VUN2t'FR0aopE`eljo5 g=ѵk%NTXpKi}>蝚qMAc:8h G2j ϔ|[q-i>>(7q:z/ o"ApPZ;^z`cV7y\\Z4jR>(cͥyOo^Ğ5Amy` VrN za`"rT<èTjV)lӯ9(YTi ?uG7Ogs揾;F['Bf4խI E)_B89A'x=GBKFhڊYex_'.)ƭ $%V/u#H!'wqΣ2?<eM`qF%YA9&%>V"U{=fKn&'`ec05n χ^7*:?+]y5"3/~YBתoI(o\CoB'xѰ[>%hKLs#:d LN3rZk2`x#0@ J%7!$}< M>GT{+#1 Rn]B*Q7 7El| BV8{g~Tj.nj1•{;cx< $S9<]\[@[}=v4A 7ج}i`bVws914P&IsOcL5-^hJ(Q4R žŕc|ED]``xw{?*-@i4E3 !r#ɾ^?`rzӑq=KP,yB4m0W+##;o6tIj2pK^$cM_r^vW|*kriN4,KO+|+'Ƚ ̩TCHH! L!u޼`J ͤU3pQ q-D!k2NqC-}Cefaց~l^,o}rJ7|U-cR NOO3r'0x{2oc~j7RDcm]FcSJ7^/Yle8#4q70Qo,б63A .Jj_OТ&اw,>r^:C"7{3QE}`^HԵ9w<> K:߭[ԋ_bl14'%6fYaYFa_Ex4LqUVQ,wgAjD.խ? q+95^ۀ d=Ʉ j6(|uñx'1h%^O $It^MͱNt'_wMv FƂ(N`[XBu]yp4VרBfZ~c<Ȃ Vƨ 3@nwIu7Yw!Qx /}V3GWv#$\IU[6]MȁO^t1ӊa5dȋLݾOo5P(\܁z.| |,رF^\`f i\GʚU7<:"FKE˄GVnuog>/1GndFy`j:?8XR:;5e3$ ۝Ҕk̚Ӟd&R6O0/aUFY;KLsMtjZN|m3di 7$l!Ap{uDڿ_$ϽoUL稣'⨐9%?zUڡwq'nh}GDo:ģ0O;ƫY9\pz|inw}[ʕZR@ XN:idR"L+D%c*uLTN#t0MBFW2UT]eQ6(9@?܅̔9 %q} $ Y4s`l[dx%f'_2OZ"lH:mslsu8[o?0lszk UpoՕjS*U3!mzB;cv Ȉh/myq *|H44>D9.j3* $S5?.Ԃ0U ŝ455k57mlR/u5<.-2Rfb#DG+61TQ)?yt!V0dph_(Cc3y X`'=6_n6G@fBy3~ 8g?6\}ܢ)ֹ=muڂ.)Z֝}fCݿC-lwocksUvcSLysZiwcxɊH'^t dE 6p>@/ԣ`j;iܻ!gO:5aw} ݏ}\%Ae5)d~FUΩ`m.  .Fwͣ/Qڇ< c\ᒿ,$1wF6,9!8Z *. l1oWS 'iW V@H0 /ʩeJ.9|0e6HK@5S_Ǥ|~A6uaQMmªEǍbnG;f zWj+F݊3h$$IIۏȡ,xOK;~qWƟdO=#DǝF(ǔCc0K"v`r:a,Ӳ:bޏ:LLÕǎC3z}Imj8 |%xx߰I: 9QY9z#lٝ69hV)hUbWNϲ>-k!3eE-V?=&VQOLnm)Dt*|k OJ.=geoxGo^-S0x\y3L1OLEsP)hMa1\oC޲}WRҔEReczCksjY,OGkPC'U ztGq+I)%P4}rjnJ>^-}oNNzu"p#$ÆxQ3=a~bT- ^~eTdM(ZјS>hA2R+ga->Ԃ2/M*@/SL3(m`n.S] Xz`$M#{lvbVX>!& ^x{p(\_[L3:|B[mH'-g̺:|@Q-aL6OXpy|sD:+'}/3B+|Mי+@t!g)Cӝ@HK4zFfj>{fpH/!"Avc(eG5ZP1)Α':TTH]įt6s֣|4F^cI.JDYQ588!:}_\D鵉#GBi@F=4om:#Cb L F˞>s"" 4oN}I Rʜ[T\Z>5ߘl:0,!,㛡@gx:&_p!ں@[1ʕ:hmC^ NAv2gx< tm1 K5D/[¹o;NW;(̄N1La!Ϳ)@!˓Y@f:(1oXGG:!.ZȄYD/a04ik!4/[raPMU?[|2ջ~̤.aCYml sN uE3>Dp)TmTh3w/SF*cdӇta VqXh(|@N[/|Xcaj)e(y _(+Zfbꕨ9OhYPL} ݋J}R:&oᦡ&;T=K|Û- i% [tflAs\7gPDX(JzOf7 lW]}`,&ZcJhm`7r+ǢIc~ދۖգKwZ+ϛ`NGWٗ{CJ!Y&^ 3r\bwwG$ mQi{RmnhAW =Ԣm% +̈́b!|W~C$%}mB5<Ĺ {% ; 8B92/y`J0Ȯ[c(lzO6&N"ԵArԦ6 o =q2I^DS`yױ܏qfWRBa_i%Y=,5 Nv]E0 e rS~b,2e^JS >\8/lA<9ᴊe.txE zz0.{@zI @+kO v͈S9o4f ^\vXV%;ӺTTxY-^~gU*@ΫB|g}QPL["\pm6{dDmTS,7jG>g rZ7si1U84Y ݳ\_3wjd9Ћ)-F|A%,xk|_lU0Ck'% k Ta>懧r㹄h{nYwOB4|]eˉN}>F$R[dPua9 Jqv0)'x΄eAHJɊ/`E?z'v7=P&?EӐaCyl<Q^k_p.h^̍ƼWq܄V"RoM-7,0yAR(Bv qs̘ 3$EǷ&v;+^iPGieMq12)q6B@< BMwҷE _8^)5NmeH}m2킰Qnz{ ’b}`;|b dƴ= ]t"Hf ʚQ˔t`5wY?"9>ըTp#_iy{紤ȨwPmh4, tr@p8)@ڂ)R_ջ鏠$ =c|o[Zg 8w{bܛɡ1Bz%lqCBz 1%)Uf.}#!:6(PsUړMNU',5 ߔFܗN'g25zHm\]mv  ;0@_,/6DS~ #nwDoބi5[//sңA kt (dɇiqժMW[~uj5_CcVD Ɲ0SS_zڄzZf}A<_{>b_hL^7 _ΨcY`qq;+۽4ɛ2iP«H-u흏~6χɓEZ:%"Rɺ xC3:>[ D&?%j:CQzpzWxX(LQt))ȇ;<7(4`K-YL-NY,4n.q5o|1B.Voo# =QcV ݟ@>2k^f:js!:tBJ Ⱦ-0)v;Deb4P8v:v*J (X3)-ShND؅WK\|m 31nT9􃳊Dw~6飢gU}~ԏ<0`\/^e-vr,FBV*pV~7懖9?zz_X[ 447X;'T9UZkߐ (GW =p^LŴ y\]BCcy{UǬ -ٶbVn$=\'a\mL<R7G87XYZ}h G7/W]9v7)^yf078ޱaw3RxXܮڧ]WGl'h%3MQBX KGL},K*&O|IɔLף[*z;q}įXwI+79BT>\#tkZ"_A^u"NB9 efUOH?_1zV)u4eی!ӇiE<r6-pU&HI^6##"I*Y/T;e߄ F$lUM] 9, Gk6-3Eie|D`2lm"$Ƈm҅I.D sKHElrW(SC"`oH9 jKB/&`]nO#A0.MZa;_@`0h#V3 (Zn}mfɐbG:1EmL s1bZ73Bws7M`o$/0P~i?.svHV}q~' ?g D38)SPAک)qpJ,ͣ$m{S#V>XSז p]A*UopOf=;,@E_eMLҼ+V:v{ཬ ^D!W(W@EL1^Y5ơ캂4)fv$wd))H~[Ym[H|Ϧlc0TY<C9_S.H ȶ"x@X(XD;@Rp!Ź3_[iPLyA,nId6O!-t;`MOBƉ!Bu;?%|P'j"!f\ثf1<:[}3DIaL/eRe5)SUb ;4.>FRİϱL|@0-)*_R&E6\# MۯICp:,LP1k!DMzFR#l,0qD ^ΡtCզ0mNa&d ʯ\[ Iİ*3 TΏsHլ,梞{0Y%:T/s&":eܐZ1mFY "| g/ĒMl\F &!4"Yy2>1}b>hD_+@m'(D>u.g^%tOSdlsI^ĕ&|w$ [[sF3L5 EBl>7t#nDY zx@Ilaȵ4ɼ|&OO6V3ŊRȃlr; AKʼnN#yP4/BFY{A{C^l֚LmW:젧K;]FcSPiZ61nl ot ^o(#bOaXPUN}i?3s44ZR?qSNg oyuc_+z}hM=q u~ii^xSk l׵1TͮkOCM9 Q@d}+Ep]K}]o6j+ R㼲Kp^$7RSrrm*V JC.YʹKW)d] -\xmThRq%W쿧@\0ت ]EgUgBYS4Fa'Q3+K^tX>yQ|/G;Tv/^](UPLSۥX=<l8{+g!AQt4 k>kk~r %xjD=[y]*##KR3MZLHT،α/}Ck ~JC<8cvO6Eb!U#Jb2S4 nu,kx ٬PnAeϒB%fհyzLfya=[O?Ԇ*,ebsXa6՞ttS դ.%vn&GCRi]j2o"kꩭ+hOll|2}J"fݸuiϞI!M.Β9(j<5'8î'V+lE"#Rߏ@+a v !szpe7^88:C5!>d43DwA Ȣ|᠍k}!va0K^Q707b!sBTXӸ,-ʅOt8?K\u`uҩx $8 kVC"o LZ.#bkOX pݔlL%=MYS{G>j%EC{e;Ͼ? ë_\KSZUp *e[KD!&ΤRKέixo ZyP!5Ig0`)`)qmMFuinm2s0s@EFx1b5u}>˥G#j4y^4;VD ֿ) ])Q3SpC27g&GH;#LgeH& VA) F \eBD_(?B}H 4qc[Z]Ғ7_r)\8֛5 th5QB?v&d+#&8)Np8++CGB a1=]nh HPY0(,v{" Ou>#h>D[k.3<V2ph#=Q:t@uk7chk)UCEz=o:y. #0Ǐfqm~a)kvhؾa=b~0cNROT9wG@U-Y|1{"9ϝ6Sr<B@/ɣ%&DE_MY?toΣA}_ !R%5q~7Sa=D |hx S3VReSWq9LQ,Gǰ.o5W7>jY-t][B? րo뚁+f m45iԝ٬bI9Cgr- YBGO#T t2v :Mq>95Zl3K8"=Z8L<;SkŭnxZBJȷT1 wJW{BN 02YZϲ{av:sSk{#vM"ԩ2>9/y&̹i 3 !e06(I KI774ٱ@Wv:!EΞ'ӊ3'\(Pl@8Vm!!j _AܒQצ\n񇗀|rhe9DGN"!\IU _>9k>@zGzY-F>s$AF߼bo-!C6A> 5p}PPEKG|;numAV)9L =<U6ik.-M1|KkB\3/:óZGPk4*I1!O_#i^fuu+=Cڎx }U{q;m+U:! >vE$+ {7PlL^8i|\a!RmX̓zlUI`3 >)-)X@4.ZT4N @uhS"DžZܠ=}so$E0!J}/;9?G d߽^Ȁ]F mA\ˬzm:kD GY^BZ ۛJAb%OpӄQط,F7w㓅@}oMTh57 fִQR79~~#ysZR\`ehPVDLNqǩD.@;UҩCp*U^Tjm|?y10mwWIt)oȹR#3j2H1 ."l #e]TmArL|[.˺hxF!p"y@2̟8r%g'1GԆFuWH$iyڢ ./X_ o>G/B|P<ځ mgٱ22N]3f<,o9yC^bA;C!(0 ታ ;uqu_NҺkfʴm v+lg )L%/$Rm~:aux(n1i d'WȂbֈ;;_/X5Y~oݟ5_a[ |} {nQMӥl8_\BԤ\ް<В2qVfVH<7wriʭ&P+=2ixXl,j/` 6*iv$ҝf]Cd5Z卑#n }&$*MoToDk./ͿB1,^$_h1;0{]If!UsNU$+x*_7b WW u!_RٟtOR4:i5x{`.e8#Ue0uO {T{ s HϜ0 |e憵D(_ VC^t!kI+h Ou%ȟ(ʌ ,d3g/2TS/`^2! qkˉ~LĝX#^o+! 2T45$MG^ᖸd4 tWڧ? J@7u~K!jjFGUId)LU_5.@aN팒eSKB D(!!+?}5gP֘%a V-CbH1Dk)],K>ͣq Gqxcshn*Ҷʑ-LU' WI 6;5fޘ^mz"t)0=(ֹF,UhlFGלsHӻ')>yO7zzPi"h+A^Q8@fүok^0I`J/!.4:Sk)GmsԸaj>\7Ƒ T- йIHLVOS6n`nMG|bOm$ ()I!SdaA?js)snlJ` p,tl*i8i Gd0[Udt`< ? Yb'l#GWNyyIխW;o2BCc{qa5Dw* Թ^,hPww٨%CPހ Džށ0,FNڔ5x1i8s%1W? !@t{m'DMXe^aaSQ#dÿi.i2=ܽWCo({E^fɿefjC:Wf"X1bUc 47Sq){:OL(e'T=]~ko@\MA`%W@a>%(rxSu zRFqPAmxB1s'_ȇa(4./V5ȱa0"f/'wr/&Wƺ"^VJIG-/`"w'XBBMǓ<@1k7$? uS̭^'+( c0\4݋[ @)ܜ4ӗ+B^>'8 zgiewBF&17eL'QA)L==wI@}$`NČZhjuz3nd]?^ׅ0+811A/o1?L^j(s}Vn,"&ך vDfxUÒR7D7^if%*3:&_Y(D゘{)8nJ%ZmL ,S*J7\<]WmsdH˓(?H~4b )5xHI˶Jw@<$l\kLE9I$!6p qQ e ]yN֔r΢=t`ir]UU8ϗ~ԌrfZj*\:ӢOlW(D/"vBilz45z3 R'ܿz D4 l)At\"JfXw\]&Em[=m,ۖelp;sq_[XMޱ{R7lSViL[YN}IN^3Xrq8,mǣ6=ՔvyAb<߁^QW9:Azr"=sKGky; ^ HԀN2`1|[_e@Ǚv.Q_Ʌ<׿ǘV Ľa8"·H - f.&6gm@:PIu82P^!Ld8qKv(/}/SC$R#;Q5=+˞( +Vr6W=6Ui`ei.qHz^56T c-Kg|SB vbRxV%ʁ{W'쾳JC娝u^ r=`M&XTv*Z)=n_'> ۰0_F`R <絋Zvgٟ :mR6;GzH5?U0GuW9J0xatfv%(d4!.u?)4-Th@)vIH|ƃλ<8k *2ԃ!2W9t䰒(_vadlaξLsf]83^jcm9x8*(Ҕ-ZsҪ3K ׷ 6{#=XL&>`f-  ȊJ t߂y/B)s69c4LhQEgyҖ.ěddcBO%^Z9>o8Q4/7)&kN/}nXǣgkS-/CԶ1rE`Lm-z%#B/q]VҐxMX>ɵ"}ҳߩ8ym1Nt8Z h9Ÿ?uԍ otc}:3e5[sE6=Vb8ᴯ6dJNR"/hx8$l#e QK~H\! I9Ϲqڛ*ԇ U;Dj:Qa->קj (KLME,Lg6a:7ih8w,m = ^ e§ wCTo WVak_4@g:b 9gkym]GʑߍiDe/ZpA~!oUzŷe]`|̥Ã^y.[Tiv7]<:ΜF4_OQtIvJ? GQ=s bq>* VgD7djQD"|DȭR )($U,fh̀~/?U_KQ9rR53,V}PB8s[ 5@ٰk`|ɌfNMDx+qHUAesU"Yٽх_Dp kQslbD#uР,(Ԥ $"e7{ƙ)6 ="+ *@`ㆶQm^RT@yA{L7#,|siS0bUkeYkRīwG  2ݬ9dt2y,3Z#H*>͢ sDmJmԔf SidWBKmNSt_cԥ -7.xXg˩n9iPf[b㫒a9LܴwTGY6 :=7f$9rTT]) '@B(\z1bꬷ,iV|;zqÞn{ޅ"d?j˄v8#v z 1qrp;׏#b픤׆N˔T p dXYՂ01^k'UstSJ {G$IvSļC(gdwR0&XӒJ$*d*S((0כ*o(q bi4ZeJM?'!3aLB |#I( ӫl'8~rCu%6h9L/$%c‰q;?k*c+PK69 "ڙ@*v  uE1TBRx#R$gMR(:3X6;v942A2eK';OKK̴UaYS (VWmVO@?/r tx^M^#s2OȀJ(34}u<v&7@Xm՚4@y:`s"6qO*~X*ęPyLTm4^/Vԟ"1Yj,8,vv!R"+VUH=*C]fu!QtA ĎdnLr| JPsOl2)Rg`a?u4|+!IOiPO; mᚕmwiJUt3/:8x))Y" MøOƵb3M~,Gm-7{,RycJly!~"([,„cp_w0^BUyOƧ GVO'wE|tfML{VV?5&_x$OiɩFG榪b7ء3TTf^0(Br]ovucWOeJX2('zDf=m2N`^6ЂoInQZZp u'623Ks\ɪ =+RA\2ްx8Ew ovf&_Z4 X7Rs2\Nky> ueNd ʡ?bb%0 (-R,`=/o{A$CR-ǥ^ml eZ~d<{yHpOueQDݨçiV6[hFZ\n*'=-aoh,zhX&U_ /d>@q}:S"MkۨbrVYubT)L9n> &|cu,*jg]h;VVe'cEoතOb̖sڀYPiwZ?6B2Uvf(pE(Ub*E!@RRWH\ @d1%Wcm]JSzS,4W lV{Q)D]@T7M } +oȮK_G7O#hAgR YI]\M>d)b'뽰x =$i70]t ZUɬa11QM,hd֎"eg9Cc׉noNOEDOZ?$:5 <,;>{v@1󷣀G 9o~O8AY Ǿgh QPOۘ9*йM#&N3JvZ>3~igu>yQ6ÊJzuvVK(?OԨr3вvh*+/S5t^F^?yhtrq+bu~!*2))Կ_O8#EUmZQxr+mbsC(#Q{$b0ӱM&SpRoNjqC\FH}#!j43+܍~+Re, v2>;7~;ZUkTkPrd@+w6 6m'FFH oLgףfUi aE L= 2Nݺ.5 $V'kG &,C*'|Y0 >ϨҒLս4ϣitt[l&713~wG8efW\Mh0cXFd٢.mB孶4HGh$%ҜWiKtOf>E$ kX8jRdvz-֤0QGUZ]>>T[eO+S4E^s6mˡG,-=_r)I;Z2z9x U$!rC`|a" {q ~A /v]`U\WRk>Zδb]Ƅ䝗owE rBٓҹ:MlBQ\sǨ !NS\lZΈ|5YB2'xHjȝH>beJh, 쪜twC#>@$9LpJiN\ 8"$A7HYߥ6uH څV W< W(ZF>]:l/ծAB*L xXC9]*;F6x^S8f 2 'f}o nòKn O$d~[\ouHwߊ8'|P?Bb xQ X0I2jaٞd! Oj!+dMQwktGĞ `=.`P0|(Qj<tFpʣv/1d6`,D$#>9 kj!n]c,~ {Ϻ /k6>\d_ $O4/}+5YW .H4d#Y6:6ȋ-|5 lC i%sCSӚqyV4qi%9) uɭ0Dǔ/{9~C D0EB i+eA0WiUՆNy^օ͍b~jFWRoWU+}e/Vgu:Z2"H'SnW`2+  _mMwm!bt)1eu|"BN,H*7^Q$?߽O"R^'%LtuXMBa>љvyou)mVSKU : lBqMG9E,,ws"d#t[҂+hsi2k$]HVFqaAˋ7N'3n04KHe8Ah 4t @+ؖ[k]bUיú|gT+!IxL:} ;200{7+7B]0b~WE477wc/瑾37+'lEz;v':?;B Q s{#ЍNBm%5^Vl2)U`YބBB~ym`ux \An |*,\6AEpj" 1KXK %`9ݙ'GSi3ސCpBӺ @ҿ H: .dШ cb,l}|R"S{!_45\z!dz`3HxpYl_'g_3e#ei1|nSU f.k{IW33JSjSOB1Ha@ c:)1 U"b: V}+*>//'hǽx6ȎjhϮw1Ɖ\+`V,Y`Aqׇ m/5bW**r9[ߙ0-trPu*z1ANR3SSnPͩ>* 9>sVIh%Ҩܟp|F+ޟ MJf V; 3'oYz@C,FϺ=('σ (R,ͦvλIh0@>MLVzB.\p)AaJ+Qe(K{r<[9#N _._ o@AgHyMdRvM[x} wC{X*pV חѫYO(cY! wGbNd.q?9`] Έ3r9xD^ ʙ2؃=KAF,tbA YL}aJ 8ǴxG3V) Cz 8aڕ\~\.nya-+§]navRHKK {x,\B,n#ZKHNl`Џv Q=03ذe8&ዏ<,UŽ&%5X*̡< \&`++)3#-݀G!ܜ|ZE[_z҄(`|Lu>68[8?<,^_Ó!3Β^ K+ ϖ|¢=)Jlv/y4@Q&@ITmoVOC ʈIW᧤b8FV%p<ろ!!`x|=C{ڼKŠ$H[NT/1teQP]sTUI?E"~-vI />2rDx~0S"]zl^,Q<,Tre&=ya6sЁ^}d#r%ͤf~+"C2^]Ə7 c;\{~S-wW')?VCiVI-R͒V/SGUeS:''nW}$>Á-?a%7s!Ѵ[M?mh};Ɂy[MLl҉giy?W EQ2I t&!t}|pkEuN@s aDbŒ}Y"\]JZ-j]ȴM(xMTgc~lXaH.dtt{)$@i(5JSy|'m,s FJqF)!P&|cBV+V5NP* e#8YQDqt&ޥ(<疄CS9/|]?޺ynŴܼ^lFU۪oi ˺>$S*.E fI<$wsoQ"ݛ[*F,VВ}WhMN8=[cWiG`s"iŧj0GMY>mROȿT+mxRqY?+h#a'dn}:*z)k.+jkMQ $P8F*ܛgq` khb-7P0᥻w ag5q6W]P6fD7Υfa–' RYhv Xş)|n}l.)Ko Vˎ621ᾶU]?</Ghǃ&Aeg2 ۫{UHOeF~\F)@3k8動4 O 92Q*- sB&V7mL:#tלIOQpTO!37O-ʅ"ld2_@mkPn(H v]xgT@;qG &GkSx"0Gq_aPv.pV/G̊iUdmEL4nl.z4DFbX{>fL11dI5eR*bFK]T,idмzS'B U?ǀN-bm'(Nj e*G=SLJNbҍ%Tƃl&Z1 |(L߉5(aGrr ұ7 1S!cޓ|Oa@*C=^Dlf?M[\%ב-'Kt`40^}]@犇-=A5<PJF/_N)T§\!^t\U8 d^d0U_*s 'ZS 6 *qmKMl.]'z 9&BH"G9bc޵I2pu<_ z%DrrW{;xʗ2 K"ըŒk%B{,5(Xy%](ANm.2#"ˣ> a=Rrj3K h{.rQZWV4 @V防Ȫ]%rQJ*yo)h hidf=59rE&XFإϤӤV&{e/ JJ0SK@VFÕٯӿ6f͙E6iG#*X]0|3 \9 '&{/\|gTIGgSXسW2nrN264ovAﱸᨘܻEDCk!(0z~Z ݴQ_ƕpRl}cW 12P@aj97/PDmOMxYcpg1ê\!ȸ9Mm(Mf{0\Py R AECB&@ivYX%,^.{W.]taNn&=L6AVM`VCGp>=d`:M~bZV$VnCc*£sc% kJ^YF[Ă2!N=vlPD˃ ЃkVwiZr:{FI(Rqh4;DjF7!#hې )&/ s'cC *KXg- fYT$ܭ^qmd ڋD)&|W'ۂ܄IaEpI 4+hp.UɃ9A"NN%r!u" DOʡ`;yۦ~QİBVwŵw'k +!QH@vir'(:rthwt?Ʈ1<"ؘDL X*<ӗZCc;0I 9iT3JMy [K?>w#u1f55u#fE֍W]!t:Y^eA%i6#nD"|D 9(O d:gnGs8]/_X!N.[Ouk0=ΜGPhoJ5lvZB.,ғ#XDbf d8I.|}?=b;b$~:h*i_o';K` <>֙jU_| UƥZ[\N$m5\ 4'e_ټwb5gB,`߉1bafWdbW oPQZ6s !X|< v=f16ūS/0sTxJBm\EKGJ޴+jݳ:LTB9^p/q޺Ѻx+O]^q VI6 :p_.k5N:RSok!PYLEϖ1ufQi`Π( )yh: blx"onąvy/L\L*‚9հΠb؟go V̢< )' :.zsy4:+a8MrxL YYȉ8mʉV:$ԃrfm tk m (\ +P}2f%@o]~c]tVeEru¼L ?g[erM`JOQ~ )9_[ۗ JpOWx6 ;'"=D2ƽ((Q3i'IyIݹ?-@BTH 2琮_&إ }D F9ܿ q< \&b 0!Q<,#9qM4Wx(\|(d;,)* K5Z4%4Pg4*0!c+R 4D,QD M.0NHs[jͪ35\D\5|%xZXЏQHSr*E#ϔԉ+926b0AIknu4,A zf%Q U3 FKA ~o{)PpԾK,"Ȃi@ tOQCM mC1NadȾ/Jӹ)>_}Ine2{P#vfpֈ\a<-_Q9 {U*EAAXoޮxGnooe"P!`5ga+xOLlxϨ=q|'`$'Oۦ[R4tDo:h74ĺ[|8>g}j` /p,TtՀA|9 buw]DCtP ;Űq(e@AW¯T^[M|yϡA|[rr85fլQΞH]~i1BHNW?4Y#iBIc@ejEa7_#S`N]LhS%]o$뻾h35 zE9^O*PE\P@k2\%b5|Xv~M7749L*!qȿkhgU ?Lc_P[D6 ;DhkX a8,UZѡ"hjhU<"`|k{fj@4FqIÛv?bQ.7{'d \vu( ^f\>i,ؚ 9Z/L;GNЛ9;ڹ^Y[78vt:AN(eAtĪ=av+&tOxH6Zb#wԺ i tĖE0YXO6PΧ-  kIm[$Ƽ8.wtlU;DDU_a ;s.q7OGf6@426酉~(]n7z8Ʌ<BJЭX+Oe@+&q)s6̊65!~;r5R[&hwc{ꖦvʂ3e)wMIoV)ب(H&6{&+vtgjb2%0ֽ&ܴ)==3Y TF˼-E\9ÆBtwܰAÿ&.\h#V9y(Gk< Ga?eT bsGksG.,`[GY%']n*_L8@/=.9m9!Oܧ2j; B.*#9FѸT{I_P '4+ 2Vx$ T`㗝Gc)>7ݚ^bS yjv^*#Ɍ: s# N2辈񴛞m˺8 /k|[[.tOZD%|%[.[gJH˯p燅.zq] M O)oބ0$k]FwaDEw_X.Oa=0|Iا)~_ȴ# ~Bl> Iw`wuMuy?Mɡ˒PjunM0 EbaHݍчg?~~jfϕ>%_ol [Y~Ɂ^2/:N !ߚVN,3(~dRb"Zc + ~EߚF_'#J^AQ(V0G2~3]EmHЗD ;\@z٢hu1EPt1CJ hUj+x Ah{ջ,Ե eOP$rD5b *ijߺp_)qQڽy!Y<30G4!7wG_sRKz퍐d{wARr5fbr|_ڈ ~Sjg*LJu{.*0hRt9B\jFb> GgpX8bitיtK#sؚ\2.ȕA(:1F}k[gX"j>E7Zʓ RcpWѠ(RrےSRU,qjY /`%t$HG Q(X dwUz9;V}+ڂ!1BW [/Sm Zyk~K-gkbͳ{[ѓw<)8=:K' $=7ˢTGQu>ǎ1ĥTaS,,xuW{#ǭ;.Q# EϸCPܸadoQ…/z=B[b;B啕_pZPdG@a05 ̛Ȯ(yw91dyq[ǛC:@<(&H}{x ZZ^$ljx5lC:DȲ:@UO M@C&K:Y=Zlr"CYr9k8+W_?SeF75 d&ѱ/ \ĮI67Zt:ULkCIv^})]|i9_,H@_r/Nv CAg_ٲ^{||_°OC 9{R OE7V$M<,<Ɨk5egQw&6*z M$RS܁([ 횳|eiPuj ^vAű_6ѝbχ,!4LpP'4!("hN%*A(oA2>RDžvp[|dٵw,]ш/W5x=v/r,T4t$DuL[ :vE{ޯ -#cTOLIrBj$YO5ѐuɤѣզ:r ƵQ4CGHw΢wY'p*>n>E$Uz/l+ R^EltgJ"IJÝw>msRDgXibhdǍIY+!Ŀ-!gS2hĦblޘE;8@/)׽]yƦ}|XGXn+:3SwU:M?Smĵv!0bs.&kg] wY Q)MC6,jb?J݇n;/,&ϸP#EZ+sZJG!@D|wzk ֚NZm\{ZCWr^I,_g1B  =w\'A*_[f7ZSbQcnkT58ZNȎg-o2dˤtUN'+R =rH8%e: s'7%o'R֜!RW,ۑ^yH׎Zi{T2Tѯ`S*^o_{m.* gː׊r{'Ύj:8˲7ρpBZ.\6;gsx'DU"DFaG_m+u:Vqb?O X7Ta1aJt"lsh^uUᏇےI\yP_he[Wvq=CrpLH%T`}3#̲ך}jH]`BDƧ|ؾtq c cg#Km@:aP' #p0w6r!"` u#$|pOCK)lr:}'cA]yTwFGbaFHCHЎ0[ P0ݻ6l,Ba},ZԢH=DLBVhNw}=sc%.c[C; @jWG"/ O29XQ(=ѩ %g+,ɐ~Nwrt멟}ZE4 n~ !_%= ͷ "PSqM-Ƽ6" v蚉 KLvvj{fTX*Y:azȭU2LБ\Mc52wuh.aw%6|iu!a_,&H nDuCMAW_{;G^qy4 &]|ٚgFHU֣¶MMu~OGS#J!E\9Ko߂C- lJty̋Vv5mG)Zl0BtiJ:7 +)Gn M$-xh5~1zT.Eq"_!w]Ֆ!bN6BjM,O"LT:ΦY%5'7Pr'!=t>qc*趛`hZXGe%y1%#ls\N? rڈuY^+WgL@ҢWO8_]5uSq;B6o Z!U#k5&BV3hEq i]*<6 }£:ǐag|nR)|)bd$Ov,,"x s)Ҭ)<1OJRalz(Άdұwz,44rme ;a\m1z\mY]-?K‚d%?rϋBڝ:8 ED}1gxN5rVP| }EڇسB 2&[[#_3_78$Aq݉v\j65O+{vWD$ew2АwLu!y0`gAꄣ}hHh : ix7qvO(o MJvS#ױJM/%$hEV{UZV Z?\6PsAN? %En""*3v0N Suy&]O&J3l ^h?m!v_eIlƗkiHxa@f7v;G~/C-,?! (AnbLQR[~yO" Mi(7W6&˸^b9+6`g̵$CqIf:OA˚j2X&vG7dFaᬱ!t E%IE< iey~paFۡNWN~ܯFW' C HdN:iO}ñ`UD'A+ɺgafiTքi-V!NuSx/#)ZЕ6V/AQbkHK;= u.dNՄEV3#)*d0{v{3ݬ7eB•% \}`tXL1^71i6&@hxt>,k߉0[q䤴ʆhj RCj}Dd8 IEǴ%͊sXaICu+̀T?\At̚=16$Xj .4mFՔM /n\oyEG y!+y04WkI&̴[f7רGɽmOVKlkx烚S,wAsŪEd(q O|0oh\{}\L0 y-I:HIAO=깰{@dٝ5un9,l̩ZggAVN - tȰ,bO4wZY/X}}&0fX;*[pt(6acsknft%uH.ZoHi TsM\nI$7G2fz̚9=R5j3OkP.J<Ilӎ3 M.ǴQ֍Bfvs`*ObT$F9Yv(1aEP䷍j؟!,D @p;Ea7HppZ{?}?CҞy'atQ,CO9 Ra3;q޼+fƩ~Utɤxق1wI!\XTF(0eѧqM6.4>oJQi@Z:Qޣ0tﲒs,FblyUr1\@屘qPdGІ=z{@ 0p ](Suּ9Kͣ T$M8R]>#B_L;`E:wkP8%p#<Ń+(;O'qOU+`&ol۝K_G 9}ZiIo:T"/vm +ڭ?I$oGz*v1Fo꺞0򼂩VtR{Qt^]y G"m^š (rͶ=0f/sΕc~7`ISM)r#+PAhЮS@lwF :TR4.` mA MN@سYCMK&fvaKK6U".A#l[ג'GOqi\vpAƴ>v@6BP~{rzwV$Hx rogrA0$=EkfQ.*"+0Eg(eHC_(tCeۃt^v`p-#hT=Dfg=WTڽ+ f&s(?Ԑ4&Bw,/p*ɞW -tFY 5Ƅ wU:.S^ذ;] rA:1Қx*o۴B̿5a"TN[ }BEf2OWh"c:_P{[*xYw0l7`ho-ۊ [#6AbF+jӖej!vBDF DV#ɡ6ָ̓{YFQ@ՊItmY7Z4084F,*H^{JhbX@ICS#9['=pt.IC9)oO$󥏅øDQ;&)TDhb.;R=6!I2]ǣ4bz+N?ޅ`Leju%Bxet_Kf| %83 D,z<(~o)/ɯ^hd睯(x~m70aF} @-Tv눘kxe 0GG3~!H.o˝QvEdBqF!'ud:{<5eOh! <^eA$eR֐^1m$I=GřV[*Cio%#aᠯR\Gl3CLlWk\m}#qh^n9m&Ϗ,W64MG$+daxJVŁER@F@{ WCj)#??T{̰0c[`4ܘ5!1[ADَRK(1n0 ⍁0qm7r3HP%D⊿/0NC+MN*Ng;*b$n8Sw)ۺG "ZZx>~K@5coa 1Ο1F3<6&w .^kRa ˋ ] u !IݬX& 11)]\aC@KK\1( 5h B]Lã0nfZ/PCqma\g~d?V-&*{IB1t'Jb堓ǿY۶ZM8?yK efh?g-\&u_C,q}}B>ybpގPT)!f:eZ}Bv'Y'Y@N (&0c=:)٫dhS `aܠ71Q KCjݱ9 ;A yRUh;_BMnc@4Ä:6T0h8d&V͏Xx4~`ϗxЉ.N~;5{eB{gd mGz> OKz* *yJjV+ 7?LE/ #"M"'V6{ݧ 66O ~BFQvH܆ h8I3mKMCun.eӤݢI0 >hgLse? e߈E3+/˞ xs:QPx;¸=#6+NDw,YZd>s b"u"xF2QT3Gn)a!esꤽIRչIY_$,Ȼ!;`TH6 KZ gp<1t/ %BpZƅJs̱\F԰h)Bw/`M|ݘ̯ܿe"F!~CDx#.#ɜ+dVM O^gp WU L1>3DUy~'xZ%RIM<]X`>QnOsݳ@rI{6&/ >~ty;jvo^r_">4BeK-ZR q_D$k*-)BQMԒH Ma)ܟ-)RNMlsڳ%߼ςqhzlw9BnNhkV<0Z1#_'xl<*sqo}Ditw9|Mf ?iBu: Nt4i\_?s-0 I}仭z>c$C1 kLYyZ;*kQӟa;|EMS@^".8Ж1,.>Ê<:Е \IpoF+:@Nn<Qe~qN_=;nwtm׭0i{ lFQ 5Fm߃ܙ|B yn-o[Kqςdƀ?LI87;_N6ȈwSu}|gsQ)Rk N|g:4@ t4ɅZ1mv?C(A8w t.ĥ}bx)c.%bē^7 Q`$, ^׀$V8?Kxn@x u- f^PM35\m*x(yWLQ~W-T7n.m, /5Ns7ܺ>v׮Js䔂"}>r d~sw|c0Tp>^!H y3@w}&Nr4i^ֱ]k;J hSUO/47j~Xf@|E9g#r<V0%=sz='d6y%`3O}&{%s|}u1jB.p&Q.QW%շS\up>&ydԕ4m<2ojgy,ik&iy2ˬ-# Rڊ8%ܺ%}#&QICns%V<9ReLbf夔}arT|aQ/*2K:ࠂ;%uV(fPM|zumuvPe4Q3]W@w ؤ~H`Ϡv$@1UM 3.BJBnHUD1'6o$)T۬dWWMS|;+&EOg,z5+JCfk)Ц-ZQ@m$V¯3<_)mpw,hZU#&{dU(:t7ht\CGT9:ldR( RU|Ð$z&ֽ̍"Hg&#ڎ|XhՒAC+!N^IҎ)`䧤:(E &ȖVSlD(j.sju#;x%!/ʹ~7+lMK9va>xxiWY2rŤdž@to}u'֕徘Q9cƺˑ|O"P?| f &b r{fYjk@K i%&6I=P&~0$<37oܩ4X)Px}zw:;=v&?_@zgHs)]r)Ibt;`#3f-p9p)x*5R~^aꠁ u4+66Z@uq@/]$5ds0t>tI]Ӭ^[VтWMmS8O jidJ˟Ic?þ>"k&˜/.V_QD7 UQޝRNO -V}Ϫw Tn\$'_d04C5hƍY"lرIi*{3Z1-\Prhj?^T\FU_i{x`s7@Y04e}gNqN}OZk[JjkR3P)9}Z>}Rןm28u:" TelW#+th tchdP }v +(s!0׍N4e׼F]]'bBq1@Iv;ҽE+zX43xþht|&cRjɮ ڹ$b i7paKnXR4d/þYK(Fƹq~mj't!ZA<CssKo J@/rߢ2gFV5YUNqzMykKdUk\Ky$?&m2vt 0>ǧ 0G>l,FI;l.BՎ9ɡh @a#wѨ0e7k;+"WȟGbHBTߞZƟI1Ś%Hpwʂ73GP?5Zd2?-+7Xw*RmlaڋU21c$Xq=djAgpT~/O 1e{PIRrEH_#}b(ثtv4xؖvZ=\]T)@L% $d*n#|V<~x >?X5RZjϭV.bۛ[[I>ΛSgiQ*$YFd%+nvCt[p1f9qn(#4ZT{g1jwBv7f(Æ%~{ψ3l@8&(6mKV;W\ 7Lc4_)(v;1y> 1fu>MtEPΠi0p*٫axRk;yN#L =ФzBf\X@ƴz-t$vSתӟ{U?TuЀu%([WJ9!b~ 8 @.?4csq WPY.[FcZ:ܲG+C]7en Yfٳ]XYkLg0-^8 %SVCwCh.~;IY[h"“:;d@+!+,?_6`y'$ R}dswUL5nż7g^-&t3/Ra~ЗO+ Nx+J~n]d #KRaygK]+?HRN50,K6a[k!]Pr)ŏF)r$`43iiBBLZO }d_Ɔϥ E0$/55 `:狐 )b>9~)x1b*yUz  .ț+w,kP!fG 8tlpsqeXq~Jh`Iis$1A"rIʤ]!=Elk|k; DC\d94J̺iٷ/)DXB:X/ѴMXTc;w`6ScomsQzax髏ʀݞmnۯ 7]U1Tѝ/ݶn{08a ] u KoV^Xq0w 70,h*qlHyԶRlVߜj뀕/Eri}wm 8p" t*n}ʷWx)͙aIX &mV(Pz{tjZr-+~14v*q8_GVd>iPa"[H7|!iȘ=v@3`Br{/s̗ē D>]yRk~iG}֪v=vݩW>ވKkޒeRSi of^Q'a}G9lAy\t G >XL}U&,'Wny%/7@~I8>wg6Erݜ4#hq(FB1kOP*pbBigƁwTxIť*T|.rmctpDsq5bjw1is#eB}4E 3PCOLUSw.F`*hx% N0iw :Sp#"/տmOxqclBCE-XC3΍]q|@PNMȮ84o.$ !D a`Ї4ݾơ.ʳ (f#P; xJ]'Uot?':=q+%/ ќ{Lk q(ꌮ`.7 Pk&.7t_nzUga3e|gH~nh;og.^+~V':bK/Mݜf ץNýðLj̗({ CHXyqIDR ;uFlNz235FE㍰_? by ӯAI'< ( iӅUZPU4vi=^bꩪRMVNƍ4^[H*G7}G)mFlWyPIح^)"1 &7Lr!)tŀY@"+&&t{ _aڬC^4Pf~β_'-Xo )dgyȡ1Q.3xx\4-ɱ䍶F] .ӦAy96=XXGV#x ~`܂M0Ftr^"y*IZ-8 4O4)d%nvWl,v į\PmtT]}C| e[3iMG^ x>L8ȪP"X[cQ%25q)eWw0>XTjHdokmjs/2 HO+T3۹8N;B~8bm5w7GbG֛ 09ڈrV]M1K70lSJqg XO Ja/=Qd KCG^[ D`~:4.߫d&x3t@h?ʓ[k)%ӂ b ptm q2t8_WR38/irɊ˝o7w S[.CvYK?_#=3Bҗ*R"u+]K~9Ө(Y ksDރdk:`ŸPư PWzFI`D*Y;LK]q̪$ `>=-rܐ?Lg֯գFӜx@(Vjߢl{pGqj{ O@##_oIM;h|q /-oUtV]~eumpȤX4<_<@\ ds| wv=Tֹ/u| Xh*@6QŽ& H;Q=?1aVcH#\|$O3!S#Im|_d4&$U_BrdI,5I#ny#SvY8-ZU;5/vO9^)ۆѷX6"XF/{9&fcAoEX P_ҬS/AmVőʎ(g3ZA%nc3niOYN00jRsE} ʒlsm-:u=bJal3Ne20)'>5r5C`DSJ5'z7Gܦ$" D~dbc0qʓGѨapI##lNmbs _ᵠ@qJTI2k&p}+lGMngҏOC .2pYV W= wARgyFΟZx7pU7 -GvXFNKL8ZuЭ|TVG;BٌKW! ]d}wm%%˒RYn!K7c%}ɴ*,5Qm"ꨡ&זӛ,TiPX6_aZoTt2'd<3hR%&gMO>/}a"l{ŀ͊.Uyq Vn?W;ۯLh84[[[-9uŨ1v6ҒxıXTqXz>m/D_~;͡uN Cj aVrȅ`zŲH^S/]N4)eSǿ5wY/ޜ钝@u!GN6rrZP 7V3#0 yd(rYR{i)BղMQU\3wV;d#,"cgIe Z* (XfR2kV#*Yz:dP7HW`s,%9#-s^cE5^aȫ5 dG9 LEꄇ[txo`-vC2N @F?HeKofaTd*=~藙$0Du˶3&5^8j @t!^~߷=|ll[ȇwoVOhOf=o>W "d)l|XݵMM0;ܕށ}FepR!;!`zNcWXǬsC .mT:(#"œ^J6NX'sw3f[fAFG 1ӚQbj=I߱pI-J,ͤz1.}l:mK`scጼ<^'1Idda9<%XЮ({u7՞h[YN7G.ҟ1jZ!%ʇ;z'պ&Fg;wTY'MH۰v+V!ɫ> ȉE9/|߯8?u8[)is:IewpPw}2e8: 0 ~vޱ)s#PE dZ"0a&j6ܠ1*s( Sϟ69wDҋ%?@Nhr\ɇ5tаY"4dٖ au $Cv'|K$=fݜduy&J:oz62 +jL僫'Eҍ?MЖ38 9 K [Bc}UIjӰ& NTpx-)3){@ǻj4vr3b$?Ιȝ5rG ! ݧ1QwG +{t?95 \1nrߩ!Gv2O@ U(!N$#?ƧѡLq ef{CR=Ãj}m&xNy'G_#.A'm[n#FVdMu5f']1ޠ|AeCiLz1`ʋJPm^N( )iZCw -_q' ~g7l<%i~?+q 60B /L'?5kc F G=w㗅_n A9PVnj3u?'U,I$`)[)1 FM@0 }Sa`#?&-fz}%#8|B@tQۥ-t #zޔ"r#nOO( Ko~QCw:Z ϖ+TE4O A 4jp60φڌR]mقeޖp-'T2,^SK| kP)8v]C&j_|詮n, ;$cڏR1gOl eW^5Rݪ8BIvڥ곳Tq/+Y#]xjkyk[Y\4UFٞ5ћd) m@O~Ŝg#M=՚rM iM7ЧSҲ&7 myAoз)>6YtQ54h\M2hܕ hYQt#n, 4Z>r H Vgʨ՗M<}\,BvYHņrG?ꗊwI^W:(ȎLȣzVKpRNJ˲٫\=㣳bVDDAtD|z~k7M\5`Wq?i%W&LBxiBU/Ch9y6*wĠ# @Ds6U!M4uCQW=YNۇvM{۠A/`e 4]%jU^Gcm?[w: ,)'A4 !P[[6"=^imvZ"Yae4,6  MݚjYeR 2 JKZ9n2VT>(%@#92-RZøjcԐ ~CLR{@og}A.SsL[5*m'SJ RܴG? c2 ~ ӣR!Yț 4/>eAO+dOd9.wOɑAR]ӿAв̜ېǖٞ5Dzut3Q8qp )^go8Dp'5ݕ*Μ! DŽ۩ Y<`KMp j/QsLzw[ah.Tw!8yA?|Ci.7rәq -G쭀)hOl:iih3ߤ/-VèrV ,pKO77(?oiG@\qgDH{J|϶2lu|V؟U< (|Wsw > ㄚ~El=pBmT Z*!P;2d:aĸy#;{E]}7mfҷ[qpUɧY+| :~San%ŊKC>A!_〢2U - 7G6a[9'* N[ˌH&Y.'Ŷy fnTA][;G1 3< wP8yZ&/[˼tZQCJH+F2.L>$xP޾8Myhx‹ >SR %- "3^q$uߵ4k2fEGFOMߔ|VVE$g= #g]+8XPurj𝚞(*ˏLm_73:ƟͷrYSk+MvB+.g]U#R Qkt&WG9m@g A8[⺔;{d\v.A,|۾9xY|qbFw8ěgXZ_I'+0JT쥜\qؽzG/ޞD?!D1zDDtjoAՔ:mY5jo[y9;ĉ=#9ai ۧJn419df#CrQ˕ʄȺE]__|z@x>&Z^58d4kS; ?},V3&`J_G(٧p#9RWAJ@6}#*J!w6gs"Rȝc>= F'3%@$[-ݥ=(^3 `;-QN&7aQL Jh)). H>pҖkC CU8F̽•,(HC( ;nM٬(oo L/|"eXSskQ!x;TI875mY~An&ςa~G%f[N@4H2A*ɞʂCq@ww -|D$x ˯D q/J& #|gz7VzUB))$#M!d]ڍ7l>^\ ^<:'d|fߍg`DJm:La븰ogAO59}oo;f~n⵵;5yOJe"_ y9PլWS*&G,:lYǺᢹ*5ɂ&4C͡xx L_TDlƋWBmHt: ㌺7,p9WP==H0n1K<08Eaf=wݾO|.Զ}ΛN}XR8<0<JN7WB%̶AjR,`5'EfhY9(8AħJ@P<6R"fAK''%d ٿD;`ݺx G>N9{B`J|2p.En7TbA=B%SNc>^ҝM'_n*t!qX)#k6MV/8@f[:Jv"PײA@e,#9xxpsXy1ܵJ&؍Xx*6,_Iִ R2Et%B &iȀڿS}QBؓGIzKwz8Kt?L]\ٍD<4"X:'ZU FOOfgp~rւ*5LD/P_@dIv Q GonVP gP(z|p2cLd;b*2kY--"7@vZKJLzlU\@`!t^J1SC4S~Q3Mʑc;L)яk}B4͒QGm-$ysԃP:X/ @9O>1%AY:-轅$ $E9m0m)T&~]M4@4RurZQ<*Y7VجlU8lSK\rǧL+jC<Ŗ# ɖNShKxڦkRKHS6X״Ku_Ѩ(/s_\U14x^uirޙE\fN c4ȭɫ/"<erjAm4{]WhqtkK볮)7~,=~D7kTj~٤Huy'o _(:dW1Nž 4sN 5B_юf#(d GU?5Ĺq2q.[)a0 I2b y\H$'dV$_UTBm>ʉ>Bh=`.M2ʛɌN,}NBꚿ^;(N+Kwe$6]"A#!%7rA haԫTxc:6 rPe}}Xo \sG4]^Zj˭е4꜉OjG|& vP:p/`4}86Yr,(xtq`0cߘ[)KE:D)Y7:xnj /RoR@UI@7Р7cxa "xzҨfB\U̴2Y|SJ &- zJcZm IK9Gs=& chLN%骵5l0A,iwiYEcpX}RL<5>f?S-Kμ,dd+%y6@ uTjum^hRxre|T8A>$骷+6C Z1 ?X.O)kTnϗ8ʝ#Iw}ܜhP%jľȯ]%gx&AH}sy4z<ݚLxy֎IZT u~#^|h =L烰 '8 -iS6~$A2ebD(͒¦ 3!͋͵He뻉֠5,[`? F0Wo\=Ī ItQimuwUניLɎgV5OzK'9.V\,lq>εM+|MJeXR Upq_V_QduL}c\`(r&F.yrS%^M~W% >B`icϢG9CO7J6LZ}:nbq@q.;Ǽv{F6N-#+ʉ1([!!sIAW󓘐jD`9 ϭ<'puwaX d=k)&:}-|y}Z}S0>K:.Yr2F\0x֗?lqX*ǑKGq8>%p槑 Cb Sr3{E[|A,O.mRB :giʹ$5~ `?}?j񛶱ѵr\||8=_G&ہ0Sʏ{IWOeBL勩+\"b}t'8M)(.!{Rfdax}hHN\;h˧d+Ƃdμj|X5ylYVJ j;%AF)rG y@vvlϔF]dy^,"R@FW:H(b!$9Q{ao8Z}d3OfuQLF/ڊ9J%C[2ĚR12*'sXoSQ<. _i_Th} IGp}r9Te$ˎh.*9v=9jP)J&xXB+-CAwd0/>I'vOnfBәƕcϫo) B3Yu,&+Q(lBxyC4i-lufq&Dv Z ~w>#C0`Y?-!LEqc^a&m\Z? ]D6+I "t8(#4bR"ij:8gBo!}B\Ȭ0ɬ!Ҩ (аOsEFⵈ-,jx~K6 UX>-JTGFԾӘZR!&Jbͥf&|?;5G4:!lE|v0Z"YU¥ͶrVe7%DĻpm,ݤ5̄s%!${ ?Dq!O4 2_B HFy|0{>, pI˹It٫q#'ͽ8 O4fv0k\䝒$?{K NzL$3KfX04U W7,c ӂXs7*_gA}vg9reX_O,ΜfUˣGJR&c$DKU2YaVj)Vnt`T ,|s&rL2-&! {iJHJHho@O uTu(fja?v7O_8\ɥUn_r,Xe鰤`|V[^`+k%C\Y/Dxc+j_G`·K2yU$hC\|lL?z2k4 K:-`ʣPXڷ bwu7 'SU}m& go}6X jm;sK񖀀 TT޷̠:j<ُ(*zv>]R[i,vOD u j`8 VG(IK2f<_{$ϼwn,ć);ނ#KY ^bԲhB=<1="bR?Js;JJq]Ws-2Tb Y3TF $ce̟"6av:SH>J=RO0eMO;bnw_>RSXEC0 j˗L>w?TP ~cV#XQBf,P, G0V[H}8_ML@ø̎(\d8/S@K9=RF"yF!S˘?D<E/U!::Pesl<%pGG%&TgQjdBg9VoA)jw*o{ {nRCbsvU<,i:QA{~݁-Mƃ! {ij]}aPNmA{CrL1F{y,,",޷f=J,0N7C%"&fxl7\zBejOD}8mYfAc%-**l8ґi0NSEK!T%WJ r*_p=Zzdy&{&?,;2$ 6Pw ȊtO;,HOqUN]&+'ߏiydpG~XFpΌP-rzw10v5H8\I A:F Qx*F͝vI!$\@=مÌ_|B~wd⛰c ~&WEM\k) W9}?FSI{H]\ x( XSFAxѫ(o$D~0rc*u8dC$QJ f ܽveV9lAsN4Oέ=dﱩj|ҡSXE5Zxe5DV'=.8;R,R[,񩄍MMVϋ6| =NAQ WP4H2̈́Iyv[ct(*J`m7>|0DB 72+.:n֍@Mԛe1vn 8~6k77>Rlm8n~_00HhG@CDe:ֺl Zj^87r2! JRb5:cp|2ʥmk۸fWnDb՝Q`C ktq5@ց/61f5mfw>zsg-.ࢉ"6ͬB~mL`'cK@ {6c QwW3yK%u] //DZTˌwhzGo"!+\,2>p`5^1km |[RP} .餈// ~cd9Bx_}-bP#!B9;XmS@qm:;'4!_99e'T~OCud{$Uk7vn8a>gKTb (<`urBM TaȺxO.d+,ٙ£\`nRHUS2LE3 ުBt02RӥҨ u 2Tň*aa+{a@;.hAma!~Q */cP"iK0,Z-gˆVۻY6.rWtˍn|ҿGtOC,҈:EIE\(%#քΡHGN\cw7 dǸ3qO CV)p)FNd5d_ * 5vúOD EݩO_''( PgA&>3G8mv*N>XSsBX) \ 7Y#߲tFcV7raA9A.V8pT`Y[ws{o]]d 89RL mK#,W#0 P;=ݧvJSXH|Zeރ?C< e#AWYm`tJ+"QyLG%1myOfUf܇vS t+(:MZamZ3$qeaJ:dԧ'A ZeΡgcuWۘӦ;:k!8,<<@(p˩aU'rK\fZr {aEVtyz!6ϕR /J o<']^V™?$Qܠa JDzSe+[$J+Ē3YfGUDv.@Z3#9{5[A#j(ZLr%Hos֫\qgaM@:LgDͫsGV-NLQ,7$|pjtyaQLt1 G`q_*ڢN $qC L- c.%}yK#g{Kh)@JEaCg4`z( >Kiʨg&/V$q Ha! xJ2g5ՐpT[9UiGIޮf3*-r]8i6ˑ6 u`.~6PZ[*3 dOce^VH 4H3%( [[_γ؏b}.#lYv} 'h놊 c]6 ;=jܕ xXIoUH4gxSL&4`\P('LDdf]@l!.gȾ* $=B?ʌ-vQHN d<OZCdKpD6]uIxi3UlVIL*ic8JGEJfd:qγ\|;KR?mt8ͽUeM2Jbtt=A {Ďla$5IZxhy|1xԲ6EçDBu 4 uFQ9긴o/͸b˘I_㊧_I},p u}أR4m.!+l"6vc}4̋ yq]̲A; ֻps) uTb_%cK GMC@2֤!{1ivقoE ۀK 2yzM'!ߋf2G5VG7/UMrJ@qE11؜/A[,1 xEz8XDxYe<7;0>)&c@}87A n#nѳ瞫=,$Ck/Z%Q~[ؕI=Ǽs^ Qzs wɒ8$~~;ws2{ ^Yô5ػ 9V1:(bBJ@QXP-նmg庝KHZ-au[6@&eN I:X*aS)l|Dl$3`򟗡(iJu7Q$3GZٶvȢPJp}ɗ eJһ•+.;;dlW%68хƱ*4ߗyp^ ,[ϩN:dH 檅ZU"_줌]/?!\7}3]9Wme͚[ 8h3D=~2~>Z.'*,x)FeQa儬ۈ0>B9o4f5Y9HTgZߵ{.y%^rY(s<)AC!pC_O=gߏvn.;0|Ԅ] ctDwnJ3?=%t*Y/k"@S<4RV 1;nٔ ,x}MKgxir=C9㤞(%"H^ bɯh-1Er0;ֳ2M8qU5҆1$nߣV4}7iePq%!P| NRC^T3ADg‘He5TM5¸72HB`R"r<8w i 7> 9A|rZ_~_畿tC=-u['x^g#rHtY2ͪдlP=)V!O!7~tkLBnTCT ٞNht%  NS7|ReD -w-r@WͯҸ2C I58tJbFU<(p)p6ܝj@aXhZ v逛\R]pJu^ ^S r+Ѩ"IM[ŚMi+EO/Qu m~06\DAN~fJ wa8 brW vucE *ɌVx.3 ?,tW!݆Me2r2&R GHlXLTݱ 4DDX5h &2{%()uIPO'Za57V^p8קR4+?jWujr8ܼaJ“F̚!:t_P̵6FsI En<%[NP$^PjPMն=шdPIюzK~[46LDYc@촧Y $6`aJ{chf{' 4]HT_(hnG|-R1[%1li*HIY?gtvM(gXB RCq} v6 ¬%ͫhyLtC Mv:K O}e,Vb,+sJdüF /*e Td+]! δc\J@mq|lxDlZpɠ}E4Λ#5}]{E#K#,뉐|^E~=@6#I-[ه#8 c#mhηO~̒%$\!Gq´}wXr6~|3I ca8wU>Tb!ؙQXF6%.hvoq!{ װo)SyJƩ;=Q-;Ta)58%4r:m.qHXW- {pl,ڿN<^Wf5FV5p[pm¶9zM65"J.UqtH@xej8C׭jR8z`FFijz`AwcRFLLDKrl1}1bXҘӖ]c/k):znc9t] 9Lm sfNU.??WGU`QDנ`,l_rd6yss!YT-g˒[݀4èn/vݥ-!ړ\_ioX5]FQoc Luadg2>W(04;>〇0=x1.5I_aj9928R1^ y E7QE>N1J\nWKaoz ˽S3>5C"r+W∺R#:CE6d!MEgC@ظơW-볙zdϏFjB`?Q%˩ ^(̨aUP`IR>>xn5p0iGؼo+MU!ިچX8pˤ Y.̙~&J*k}'y'pDiI MBvH NO!FOg{;Kyѓ7~B;.M𼭏#ʂT7=( g::DY)&)-󇷶eWxtk^y+ȏבv@J=llq)HFI5v֖Rm(/&8WQu\'鴴ax؆dp6QEq650mw,0hM|dě޲`9z2p$wKqS4`13E#*';zqPXlTd&uܸW<xcbG?2nq2שҮ -,ܩ_!$5M)%A۶ΕdJHߺ>&gXzH,֎c%+jv7_*ōe7i,1`tbt*IAD5#BZgmDPz$˗鰌fX{-Sl34:J0c(C`oNƼx gnܮ朸 9rpb⿬5жKj_̄B!oEkޞFcEcKR }3g˷oUb^HXt-bofKKB`5,5C]@4T nXGDM(+mG5]Q$l"h%&Z$nHL- $-ECtXB-`&5|QNGlbπ\qx0|HU a=*3E ,a3A ޶sJ I#Q1xrɓ>_e;ȪSV+2]"7ٚoK9㽑]dG3\uZ:{|zB|wy ($!u@)O*6_܀ .ĺF}S}>{BpLŲy9V?BU1ɟ0XkS5ԣD}T&Hpsl3ێisE:XbX$Hf) )/t<$+ s@p~C>|㓱ûP0u:~ADZYѦfфko =_:*m^}-g\48F^sVP/ȑWĢaDyi!OjC.U&4\4~^\N0Z8g ֩ Bk#$]`_H-e2ώ+ZW6_Uƕr.ɵI5Uy0T@ъĖč pƒR~ta! ?#Nc\P^Y,>2s4OУSXR||܄0\4ivüwɅaX VB޶-_IIӒQ- BDo؞ P×kCe6Õ?\h>V Y)T^r!bƅih-#T=Mҽ8m)X>Ye-I,Hӂz'.Jv52B#:\Ѵ'ٖj3Cx/6a3(.1GCMFreyIh&3O\b }:xL>6Z>i69%DVsaWbfDx$T]er?{X_؝>8:iJ.Ug 8)~<$b{_xe#N@q˕<(6;z~B~gONenޮ:H8)g]|kS nM/SsC1UpLͿ:;|J6$hb39Z&1,W=F1K_\1< H9]6yi2\~ʼPIL#H`Yw6o -f&>,~[ThE}^In.ip» Ԯ,oXB0a!tjsewphX3I͇m$'G>2}MM - R6q~iyZܭiRb @NG1Iھ/3aLH0,S$}GcpfN\y>hS%=Vg>߰`o=r/f%|n n߯KI\f ,S8٥IB?>%<m̭ {J;Qs6Ѝ:ݶ}^DF=g) C*䎙&ؑ2KNSOa#$wu ^hKUB~[rW.&~;g;l|[~|mlpˡE_kph Zۣ+JEm]'$Lg62gG׭my=gnbP۲OHٽrs|3 ̓3hQ_G$S%{KxVR%n UQ4a'ޠGabHFrP[[{`֨4 q14Ml?SH24m1ο[0cȆŪA&ޞQ^6i!BHypԙX p r4+2oPxBf|Qf*m5pZ\TZ7*]kjV"L6ZT8˷~*B) T2g<.͡@{:3GvIsukKuYKصįіHL׎Q!EE+P@3Oz]N|[&㄂-Î⨉ aY|kt}a! : QޖaM؍ixąA{u `^wX79mȒűJߝ8 cf>AhG7x#'접gE@羕hc>I)8J+͵#Wd:4Wᇊ60iK!;sPZ/<n[ye8>o+TocHC͍_dto^]1吚<0tƼmlVF#Wp\tN.s")y)$x9oiԂ#^ӐPdA\ qp$5@}&!H3Q<:3usC sb@XF%t'l=,ĸ)agkc($HoIbEONmzDhdIӄ?+ݘ_  Uz[:*Rr6X⏪ėć*?m?+oi#$*.2ڑ?Hy6ϰ2p*lh[:3k{GH=~þ?h5QZx?Q>Q&Y$ vu8׎UC'2E~?ў|=ӀFy|>] 1.=bGe&R֞Jl x@[`"A"~v̦T:Q2E&1Bkd*!_}%i鶒 L&Sľ>C<5 Els śx| QDWb<ՎukU`ar%t Cq3L`>4Ulb yq~>!;SE飶%gKUG~<`4z* j {Ϝ{J؍~k{F*4+:=ķ$ Yko!Do,*Gԏ͡>_%5[NmJ"Gm SVQtH=OQI (hwm(=\f ;$:9%-QضKv٤$/#[./xes45`c*3Q@X>arN>_E`kQULO}RW$[d|qTq"j<5xyODuvEaNePC1nT`oȱe0WS5'Eʒs_CUE]WCfh T`jӔ6DuV j{̳*̺ |?7ж*zSa!FkG0Luyj-$OBlhȽAMPN)!0 S oR/n(|+5LN:%1l;{uH o$F'Mw, Kw6|zSu* %Mp;3j /MU8 q,t:{5mhSrUbQuun ekO# UӁe$}hzDdiFY=eyW~]?[ʤs=ٜUpj*GX(V 0VY'3f;y1;ő;x*V*tw~a?"?P}/fD ձĆ{s,gjCvHc@ҡg5|vr !a2 cESx.  vq0Ri]U@I`ڽ&rqˡ}\8b".?NC4<AH@d%8Ti0W&Ge _n3ߺJi8:Fy#Dd+ !ܱ%M4dw.Pf K%$%*"A_b= œzLA0R48IEc"p D]ngq FDdO[zd pBX ?; JluK]f4OX0m.YqxB1M~X6[ M{*oqaOI^9>{kՄy 巽;m$JQ@_xv'F&J_TKc,+=ܼ$PH̀9na ˫ i6+ُu@L 0p+דҘ%]E Y0Ћ[?PO>ΔMUʖ2x0M~/D ',LJAi~a§34kKj*+*L5ruڬ1\,.q Lg mq [%ce`ni$rt=Pr.z&>K&T;ViVEZRwDF",ctt}ڥ@6osKV>lDhv)ג^\11߆O8] b Af1 ]_mzc?AxOwˇM(bЮ>(FWP2XBnpcNRE#Fwٓ{[mCǹS|agsQrzbYSj`:zLV=$*BC*=0߾AJ$ NG+)!F)p+m@֗#vݡőu`] qc UP0FG.>ƾ;adwn\zL|=;cпÂ%.RX=Ϯњ7 WؼIjifHyU?$cemGJȠj\*9}$/6i!dQհ>6u>2`ąBE^6?BL;>uuLYp$M]_̣ \lϵ) 14iP(ϬŻl"ҏ7}a!xkPqƿ6Ă(*p Ggv&U-DIֵnLu뛊]!w/BmYmXt}g+t*>{>f`?:$0gV_@TIjENve mo H'P0bGe܉+^|,T[[aL({mܶt{048٩(cL߉9d~^ttUGi^2@C-QG>Pfg ?ͧ{,sp|wݽoAdH5.X8TA*V-RmF.g7nNW̔HL4ӪZjŷcI1&|ۋfgݘpaN*Z~4ЎTΉ=Z&0M{ VMf9r})85=)77*BUj|kq'~РB;&QlS@IҬcE HW_t9غeX V`ftͺ'*UFX؁\nd.R8)_kp+`iwYZ¢ڸ&,4J+YJ< "X{4Z>a'}c5x.gqs>i"Lf2jplWS.ۂU읅[9atlQ/Q^YC~/~qS#w!5"z컱;d.Jie{UCqpٓ T H?!-h~m;*3vNy/5z83qePN,//p,*Q+Z?lO͖T|p=/S!ge~~: ðK_$<Ƨ6OzdG ޯ$H^4gw(^O5VsaUt(Z0!.iP:5ս'`RYZH$cF3*jNuu-;ؚgei[-{+veyz2أ9&;ޡZa Hލ 4RP |1Av.}j,n6}C\hpQ]G0ʒrD_pXTJ~٧>h AUiU rf)hGhA۲F*)&e!/ "*{F%6$0yR!{@҅150{F՟оfvn+8Bk%kEQ曶)[!YHRc(cDf#膪4$i?^xK7 Yf"">**@GW!p jW+2KRx[IL=FEp1|} 8؉FpZy@atNl8B$ǧN,r'UsGaCNoo+:ծ2NbNZYk[ϙX&CHEDW 2Y-1r.sx2S|M,k24jJ5+.oxҷ@{W|EGhWO?V' u'*o[f(%l6.`ա$d I^sK)D]w ӤiTտ7 %"@9r%Ф?٣w eCxB_IiqnTxtrLzP(g5rlTn1]r~m8}'xTSh϶b̵GՎSȏ[/&[Hf=Eu\}ɓ+~Y$+ef W"Zal5v ؕ>ѧBdCfp߿:%1Mx>PWE1Y|3Hb)%9nGa49 OK} OȽsHKLIfW:ʳXH8m^Na /UY-r߮eNl6Q9*9c˰6.PX< Ň:V8r* w"|ĂӻoX9K%92ⵓmʹy8" %PFH'#E^C ?P[C-l4j7qc_UsH9+HMvXûO7,XfkۅNVOL/OrkU*9Z^U 9%#^R +C4nv}ĜI#<oB'?`+Z2b#}D6[+0MM9J 5 :&$\ rPϙA|>Z%F -?\¦Xt!5`%mPWFy %oDS[=Q"i=1B `8J+_i{~'sI\3tA@Z_x3e>Knn]@%2#}t4/W}RonNesL¥] ]xqɭ̲L0뎵Z r[_5cȶaD,4ʐEo], H=ϺiFR3Kh3$tmnI)gVOBxv=X1zF*) Mr+p.'-p2T2@ʙ?:DTlS|GVv0L Y#-r-;wB9ףTp|Zi<ؘ`(܌?ܻ [CiXNYp- Mw##rN ˉQs29y^l'"O qAÜloB押hw/ߪ}NUh<;6<8JHc#=dv0 [\i"Lj=wA;?.?K<$¯y˾' 7ûBѨP(Y$rY|2!d*2k{U1վڹ5'?l&ҵ1xj`k|SS@Lk/!+rIV]6'n]Y$.;m͟wA@MbkQ47b`;sܪ9`ze=i&ЯDH}Dm0{|k6F)4s~HOSA68(z!܂N$'7%|!D6QԓJ[ l Z:Yj4R]}'s7tr=R~NUhYX瘲B )u %hFh< $JB]ZO=ߖja8ά-dlv Kh_O!zy9jlKrPۛ+TIi>}""OpVn~|G#iޣ߃~g"&+LxޏX3Z=5df:߳پ"3I%tԴPF*zèޘևR]M®3&.nwkelwfc:ڥgdk^p~2=Yt2)Nh1$iN*n+TOwj'40EH/{M< rA@y ̿`L`(wTdO_yn^(\m":tUWAV^i9uvXnO~ƶE^wѮhX2VͻHf^ȃuTS˓(rW܄3x-ٹeQl1<$U߻Tm0b{FNƮ_*|-1=9HBO^ȋ.|ON#^5lmiߣ!'+ սx9V1LtainJ++?Ц={m C8ғY,3d_8M 6FLԩcYw'w'O@.M?IzXs^'D%(XZ.״]juUfOh7uRevVJAVV0}]Y̡ڰG[1g ok׵sG%BC^sF5=n.dNeHhg."F7rs\рj9莀†A>ф+߯=6 E%=>dκƪɼO! c)3PZփyUfr"AײG)b) zDMBJWW눏?A@ q$,/!@"0ċOq prP}\K?v3W}Pç0W:ƀ[r~@m Kه?o?J=}fSH Aޯ(=U{d繮R&v,_B&f;}ua/S- ;ӏFZHG)b s{ϥ y $ׇ#@)ݫ`cP-ꩇ U*sQâuƪS ۜt;.O#IػC&_6 akaTq$˗g9+$DeCf!JZdAdݱ7Srn.vƹٽ#mk뤘+pnnwN]/{<:I$?;)1ؗi#0CK5 9uX7|9Vpv$$?աPYx.z5EɆRk]7*܌cY29?%mklz  k&TT5_|FQ#&*Rd~ƞblJ":A4ߡ~ϗ t}t-W:P&5VEK>Z~EI\ܻV(h~Pw41(> KE-3GBN}bO8ы)㹘$3gHaj'*#7#yս`g}G=I!0)~-58 UT ?M”9Cvg`cڮILjTs)!ay "QC6#nsX^֦)&4lU-0&*?|fy;hRs iNUbuqĩB_Vo:a!zW~3 ZkCe>,% Z fXchhk9_jMb,p3*WSٽnf 3ژk[(NyU40D_ cb$#20?l:CNcbRx >ۆ qb eR[X<Ol͕IQTeVrO=Fj.(QYH_, 1M.qFY@I#MH587$ I'nw=c8o&u Öel!u$ir4c < ~.yFcG"]0\y9gmkĉ^hpvYf 4CO4[+a6ȧ|a#N F pw7U cx. i>Q,k?_bgăG`O{W!NUWY@w#S| k(@$LehM, j#i} !gV0D5i[饍ͿJ#-M~0,C!Nۢ|1j7n__u(@<AIv1D8ZO F6g%ܑ|p)_#o*; f0(38Ӿ l>zȊz>KF_Zy/;Pc<5er—,,&nttHF({QF<ǧAäDΟ#M%`JIOsx.$ J|ԼkB?"V"LoÌ%Z$Ea/”&a>{f&9M="-yjcd۱Pa8l[e|/|Gyuh줩"Tɭς @Oq3>&R'^3]\9Xquzeoj8>;֔YzI[FCI%Ifxلj[}̮|RTGrtE 9s빺șۅb뎌] } )[AvPx79qز ZRՉBt-HirDGdmp3Aa i:TQ$M3N^9e!+oȋ2 e;$vi) NrIto[Ґ)GDIH)I|kf,D>nPv(l *Yajߞ Ω)gFFw ̛~iQ{5M=VbSf{ȫ{A;~ `Md&Wʼ zDg&"t9A#hp8!ND0 X NAn0 %חlC˵>vgX_qmG7$m%Z-[djQd(Q 7kۚEvDnJDz]1p]0!Sѽ1-R4G/By>Fs[9scug"cXWW 4-ع@T>RKd~F-b 8*eL$W!Բ6~c,wcwakOI"3W}-5vJvjD\C`򓧫sAK2b8{D',T-eH6 S/ ?۔ ~J߿>aYp+[lM.|A@XwXi 7=ddJ9!XXzW A7? ~"XtVW8-TG^*5{`"o-t\AˁW~p)xpҍc"]JO)]ߧM.5)$ai+ _e"cP fr51΃8抯y_Q!Jy[bqUl `*6[Px;l%v!W i]"vE~$9oD8b ~#?w[Dбa1Wz&"]WNoQF"fëЄ<* ww0Ԓ =MPٱ}Eb&%On A-|F.!(OיOǎT~ Ky2"?NGhLƂq2Rr;CNq,7=GNXWr]ɰgtrl 3F>5ws~lwڒpy6ѕ#dʩjx)z$ֱMxwU*їu'^p1uӅX d!'u\ܱ")r;_4#-ij'#)bs͞}q1,ڽp|! 6v$YiE:!h?dy_#借D~t}]jmx;c*:*Tdȥx8R-`,L MeLN-D3(G!b-?3YgLv=ctnWJ3$AڔmV=hA.,aњ]$)%(U#FLɆe/TBw~vMX>uȫ;+u>\y}k5V,T Źҙy$/`Leq0uAQ}B|Cao h GՑ_"M[>Yzonetmrv֌}۶n/zy$|7v7W٬IDpx/dύf0VT X)eɆ Y#kkD}^Mz5ƭ:,H~G閑ӝ]K+}^ fpIQ9K];V!VQ l.q`>pLQu{7ٝ=:] t>T{ti6HteY8b5!8ن IO*OflKظOB-熴LF I*κ)R-}Ӟ~8+qɀIzn}G96hcy;BXdYW y)J#'A zMV0=$bvȨL5ao(r*L}#|nG7{{lIWRL * zf[?m\d:b {a_<4oN%wkXo?wixĶr '6rޮU *U3Sb6 :L}:lΫ3[FρT׳w9S*A"˦I Q r\ aׅyк} A/ 45>AdǍBcЅ^H75 CR`]xlD"6UnV }>o|xa-a?DIN NY~l>h0Qӎ#Q7ˡjS\*:Wx[y Om m l3kԅlt;& פʲa; EO,/3#/;`o p-A\|n-fa4T$3ŸZ} $ڽrK.AkBd|%kW.fRRiٌT섢J?8*WOb~U+'=}O0y$&>`hWՠwR[MewSǜR8nFrB:>SW$ z\r^a]4}µdy}.@pjAa(z' wU<>]Ac$k= x_ПzXkW,"~|3i d`JgO v)1j4Ŀն]NfS/E<B M0\^5`z5 CHkGw xnk.-B: (gIF~^ W:Կy1f1ซgQ_@Dt ^*,<BqurDpJV ,OK݈`_Q%,zټMV!5Eфq .AAqEg^UM̡bJi=X{xȊ02Ԛ0Gd @&3509Q,A[|\4=_:oX|45-' a1aGIt*դIBd5]=[ c4! ͊CɚYa3{#N&M@$) }: -1qqyfSO$ڤ}Ǩj%GdRP:&B 윙aI淙FVugALzI4}eg_M!P}O31aj~;/]rs  2!]b^-3gY!uޢxi>Eg{2@ 8a' f\GFV39FgHvؐ$@ T󐯪 1ES{d\^%n.di宮[^hDά㣐Wp)Ҽ<[_e2.!0 B᪚:[$Xr?Rz~&a@^3>LӅRPYij]SrөZ-'* /D:8N"Ym`;H&%Dh--CģKg$C]U@NAS}*GW]TPbuD@ oޗEDqWk_ '8⟼(ChA8X'=SDSWHKB)ls\+INn.h3%_u ީƆ/+-20`Sa^,ho%h; {k .Nʅu\2.iq]]OٛB nZM;cs{,>ţ̻bVB18 .YQt2jeKMo]=T>ڼm$dW"rHŐCfTY>Y "F,Ԧb+T.VT}rZ`^k;硝4dyJWDɳiy.njڋ%- _=xY2׍ ao~q y47涞3 xȂG\Q__~e>@3Pv*ʭ+k$lF.ҟJ9+gkԁ[fD5uѕRETb_z:1 ٗaJM kz2JԤk1솄]]VN q}(bP8Guk PK&NI;^r/81 d0Fj;{0sQ=ڥ!.p5Yȡ}nfQX(ZT.o jӅKT}P]׋JDSa$AGف.u&:a rUHa6 {Xũ6&]727me`U/2T2*j"2|Hoi#K_V9P_^g/m[ ZU{P#U>El?ƳXNl'Sl~gՊ)P_:myJExnTg /7~rڂQA .P6y] ~XZ*@NR{7$9>!|~B )ߝګȤ )veB50: 0q)n8ڊ%xe~)jC! s^w7Q_aL70|E_nt 8.m8E@&Gƭ-s2kMƃM;.A9DDkhI B #4pDx^'B))uGƈ-7͡~bjIk$}pM&&c\mKw /1^˷5]\8ahMbS\vP\ E\}`W9riyr $HLI'( .#mǔV,"lBVX6k4] h|E]BwVJֺ)Z"&77g7$sR<:@q?@X ?\'\hMkO`4- y'L`>Vj5H>J{ܦ4bEjuNJ)cupqSZѴ v'w1$,+8ȓ1eq';]̴(LއcoMTsI֒bL#$BshZ&/bp76 KғgIp&0 %fqCc%i ;VOh@x-R9C%_}H@"-]9E\R *5y ŽN/.m$c9nY5ħ(5V/GMj@[ ED~u+P+Aӆh}Pگ[CYbO eM'2Hſ Aҕ $e $ k>utQl evrw81Y8 ޏj ˏ JBޑۘ|\\^8 hP>c^Xa.{@UTtb%ky煻йp7 oH tQ|V~VSbCAJK/"Ÿ).7q+ΐ4 jO::uQϜjhN4ЄF\f4QcST걾HgX* 2Z-샋+W,ZpI׌(i0@Qvչ KZ $ Xoث/>Y(laM j*4-}fVY3.3*3Ў7)N (1 ,ŘrZGI/ YN ɬdݤ()d]xJۖ-~ſT_+3pCTze}|˴/T4OZ ~*esN%X!\bI{lATz#F,y] 'M>[y{o^f ȏƥa2c).W{L1D6--.nB2ryE Hu6XmB~R}>UpNp[d,\֢ {B}h(`DErY6D-C׶[9ٙskTū:Ըw L28-x3؉rRDpڱU ԝE9Jfҏ.%U&]J˜+Z(rB!Wu(E3;3o>߳jn=f&fad., IE+G4D-qLVۿg5&I<<{yWy\ !qdv,v4^9Ekɗxe8myg/dz|L8%؍NlzLGb ɄyY' 3yJe'#&++;ifyMW_x ЧJ=Fe.х|'w]B~q!)'^͍f@iZvĠT5oo~X\1D]EJ5PUEښɺt́&cVLWjF-"L)Y-*Bvzδr9䐜xAWuػǏ=_F!Û몛j:@hht.o;CY/3.|XYKESՇQɠ1 H4X*!?oJz(ƇSS-%o=>&A'l 2ȿ_n[[ q8@֣MD񱥳Y"/EVJ7pHIA}o ; طӝF#MAS8@"opb˾{"FdYs4A/?߾0B(Xwb>7'v64J% '<\ퟭwqn(~̡ yJxMl;]Ok֑|~|$og|^#mϫȒO>=A-hw "g2$95d؀f$-O{9m;uf+4Ugh8qznN1/Ϭ0rDͧR'\zq\ִ@J׋a'aw+D]Q{S]x{f3Rs|0jճFS)oK.%$mw^^u5y@D J ; JswSZhd>zJMiԟ&I]~"9F4yc ߎ;聒陂ר:v5!EiqrN3w\M?1MOM6@P-=K/k82!)vkZH D:q3y6lyŐ{&ISI Ӎ~P"X wݓGzP>fۼ?F X~YE ͻT;f{S<(;r͈xtJk> $ bHd bt4qƷ`Xtv}EjIv$D:䞬)uBtgcN+зFiPq^q 9Ҙ[$ocY* DqkqLJە^ƪJj>@hkY> ҙp3;VTgC=|ou$:SwO&uҭWtb*TX*e\gy(Mbτ/ PIbwML({`~oj5#|v/5d5;I؊M6{+|1TˏuNQoo%ӳ2"&|; N']eX=4o@xe4?MoES1,|"[v^t'^-}x*Y|2WϴXv;GKv[ÏDŽk'S/DlW&!ٺ@{V+'t[̻vO'?'X] #6 PiM%c:;>S+ʉvLcؒwj\a/.&fGVٔ^]QŅ#BY]G`*5A8MU&YMVOI MLrF8)A'ޥ6wAt)-<RϦ ˟017zXl<#9s ir}(qtaJ<{d`geZ*}Dk j;_" 9nGׁ}TM:B^}tE!P(i>Ҟp +pk+3a>+hNIP3+z` GbX#^I!SJLWW%}i՚>Ql3Ⱥ> ʠ$O D<,۽ߠZ&(8?GPycngMtТg|-P#+D:HҳoI8 µ rI)";SL"x!U:ic59n+s+k]ZMR @FW{ >b _#k#_4\qYm9ߥ`r vddv/yo}"xΞ9Y*ד-OjKk kUߙ%bԞI9o$[R>[L0Ž v :,oMb5|$fs.7lw`Ϡ#t@kY/ɵ[͛\_r|G|gOڦ}Qdkyiњ{!7Rҕa`6Ѯt4BZ9^iur Ə'X?1;=ۉ-鍸c_y*'0Ic"@4<6y[y>0v =9iGN{{ ?[߹;n)Ժ0S.Yo0oE҅IqMS8zJӷ_+͹~coy)B#*]Bي "9aˆě|Z>8Yn{e7菟I] ^xK ǡ(~S2H\̆ !hY(#]#Nޗ*lnSQ W-1S]Pq-2W6ߥA=M/S\ ƹQӏ.bR+cb^;g\n\I>H%ϾW CO(!ԤG:m!1Ե iO\ÆN1ѕCɦ9-ףB[M{F7ۯa+ ZTpȏRLܻȟ:[Ɨ’ j .Xylt G$+0ϨQQO󳅚ұ>q#B.$p(G[+#7/S}E8}6L9$AJkyoP}Zzտق> w `R(k/k5cy*9__6KOpqWL^. 仧x6TZVfΟ Ii2SD| څ(]"$n Ho=[- +QQl*Ÿ o (I]Ԩr Xb lgAF_IMgHՏ?%l$i(_Thg/;P iӡ0Cܙ@,W2W֕sxzaHI-#} -zag_9p-QZ!j1wxa I %WN:AWs0jlE̜m'7B6 _RvUbcž4J0|^FW2H?_qn,|(xL)4/C!˗S" ]`L$>P،qCQH#1Ҧ7kI PpާЙE#Rs>,œԣeƉ9˾@ o.@^ ?Ӕ_{G+NCx oDO:ǼbpY|'SQYɪ*:v^ 3Xvytd +& QU28{2!e<"\6[d'-^R*9R7X`C%$ x+ݓ ܭ1o@hsڞhfvT?eG+[:!8T‡&S6&k6\~qx,][elWtVR nsAziY/$ڮ1QsQgk)?WT=PKDqs<هBwSu7ѹ ?%0\jN 890_b<(^:"I HmL!QK MP*Ӆxe9>sL#>XCh]- d幫[5-wo+xv:@q0c3|R[,(9ebsvw|Hp)h]trY>s {Vij@듐e}mRΰRta4p )-t.͆rTţ"ʇ|px + J7}RTA }):F`5ާ'9`GukDpGA2nOj.18p V6prXjV8Pm}j#O!{xBdNMt>^aIEgCe͐R=Bdm&4ͅD]nT; ~tNM(vWrltR1#^ ƼW-LZ![]a`Ȋ1n@<XM% H%'02^7ۢI>oQm\,(Kmhtet{Gf>\1J*c-Xj0BnTtwǁ 8ƄUDL2J^Y'd߳?q;8E0:h̆SYz5SXc S_HmB:UMG[EćCG?!4d9Uډ?*'Z%=l1/a0 i7)YЀVjvpx'JjKM>sx9cv5ٰ2ELȪ~6 yw\tMJ 63=0A joD5u\D8Iu _,g7( Ӑ9# il^]?ebă[MufΒ{*;qOtb(G2z,ѪHyIIx9$Q:ssZw(@I{gζƀzn>S^w˼IC~1|"Lfi>W} tw5\uR(7Q V|Ο}SsE^7}!{ 9:uC)*ׅs 4{/]RwKN2'=Vyd=22_St\9\* 8~;1 bBֺ-pN=Н`وMՒV֖*/(ݞlfI:yn3Yc)w>Bb ױ|'Aobyq e+hRoQ;UHt{!'+lVdQo~.Y&ʦcm5RUh)5٪6 L#{kM-gzA'p=MT@Wx1Eq5/M|E:r& >wx䗄Р9I!S-ZS Lֱ[fLۍQVg,c{e3~IgN_@|$E oH3w1-05y,3bWV)t\r+/LgS:UV oGߢ́ݕf$tHjG{y7=J/7#4\(lkoVj*22û@xuI&⬏IJ)0 wJ/ACNvz~\TD-<`ث IRaHN(QԦQLQU[opnplե̹Vsr5PD-It;e8EgIͭ kXFn}T $R(L׋=&|#ލ"t0"з~҈ީTSn\ … OWI ;)wC.롐"2&duD<'3SS̟6hn6Gd.DR])QSޛ/2x?ky!S]_z".I?D5+ýzh i:Y:ov/ .^R> N_ʽ1RߙFO+ȶt8EP/l<3|jp>4*v*#UH2iF…tHƐ#7bB} U*dDRxg;p֘(҈^9oe:݉-l%%]i;R:L.ʼK=uo0Yh&8j!GĺR=>#O5県 ^R@7$ivYo׳*fh6Q3+^j -:ȗWyP$ ^E&,}]C \$7>*ړ]lÝ{n1D(H%koMeS\89E4:9!V9ˮeƊM-SR]n&E.(=(|="6޻j9n(Tc'dN>: _1$Kv{YywS5;nawIb3/ # ETR!sNlb _#2WISjxʉ 6/Vg{2;WJdbgn :XduT?]2"j-= i~ダq2 /?mas^RIfeeT/B o@5e>M3dR6+JrmQ-A0Jl9/-aVlڃs[0Y$I$7HcT*ܐ걌_l93 BdlBuI7]&*kJEq!'j[1;'ԋS; qmMhvǏK3Gq֪tuKgK /@!vr<$l R~{Lrk\4gMeR0ψCgNbZ2xg:Yz*rW>Jޟ1?0z3?7Qw_ڄ0<8m#N.(.~>xŰ^;pb"9΀JԽXRZǛd~P`I' s83 h-k fcҥcWF$/4?),C^ʅckl,0`uaiNw\iʫS[Lyj';Z]?D2;אsfw7=>\!W~̓x3|M4 %4%e&'{v*Myh(3w=ױ ꦹ|:rPaqb/uz&JE{e7 *ڇdP[5&5[_sDžq<4} /1ʐjQ+"Ka/tE"34J.X2J"7}ҟL H%&,g~dB6;)V$c FY$xlZ:f02rcdH \Y q0'N 8A[$c5.G/hc#K?)BiNE[TEo^{0-p  dɬͻ#Chyw(p"an0VYmbߥ;Э'b528~ lv_؍$||gJvx vP6pk pvhlS̔ECL h pM=mZ׹>4X4zӫJ;5L4O{xA 68 KYe J[g`En5W2E #e{rUnCn*RuFh>,"if ?US:[>_I&U|LgGmS:Z=00I'g)3͟/h_*{}34)nNOɚ(1Đ엋hk(w-P3EΎ )`CEN7>hY$%/NT*XHa¨9R*F8li'EG=hSn7>A #ʡ > Sb=ϼgs&O߻M- l?i1)wr[K$29W&g5} ءX)߶ȵ-#x%5>`oe_.[ٺVk{~ ֈo-`y/.mfJs2+3y,Yu(" yWb #=w&?SԚת9e=*lv/Sm+~V[^d0,C5:2*목CluϨT~ Gk|y͉rCEY@.ȩ_K yk\>MHٗ;5~@*9'gFƏ3:,a@߀hhl* PLwVs$ʉ]~C~; ﹭[V5EXѥ?MܵRwzԅ(vRa{*نa~by[Vv?EKͳT'e M.˂i2f* U.b- zCĎ }H]ZU:><&5z!Y^iѽ5(d ڂ\JHe !9D]tC55qP.aQ*h!X\`#*KXfGLQۡg]a.:@)١OAݧi/B`l4iT2V&hy L.>]:Y.&XB1:>NpՠXEp\+ HN>EдTXCUf^5|ZASe&u@}vƥDZhp.cGv1mpww$T$[3薈nn0qZn /D Dxk2$1ϤK,f͗V%+Yß]I+Le,"&fZwKÓrI/,g u?>Ҹ+PW 2XVË{ᆳ-7:4DYuЎS6\!o K1u8NO9Q$sC鳃o+חRdx[[)GLHDcU󱰅nj^&Kh8o{)c *! KH]uv[և΃|}%3~i -DOՓ78QX.9vZ#7s[<nL%H#qs !r.w~Pϥ9K;&j %hAx{$q ,#!hD 1O̹kjS CS:MjTABZ\فH 5.,2\$ FZb*^/dF~PgKJ=n͖P# A1EIz~W4j,jKYubR?KY"B#3F0d| cp?^6~m3=G ~ڋnAt WcM8Ni8WLa ȅE {e[n+;jA}cL a,0rsFghk駩jp ROù TcV۝ȩlݓ[$XҺsO<'Мg.Y[ w *tWG.9+P`cpO2ˆ :H9d+`p/5hIe dI;W&&N8kfU*L_t2JJhxc)"̵m{Vmo+ëx;[5ݿt0kn\ #>~G5ܷ0f|kRJѝP0tN4GJH\k; iҙK~ui۠V<ɂ9ji>w 󕅛ƹv jf_w?x1HN`^HM'LQZ)ʫީ]NzL{fZi49ޟJ:!GUʀ%I1߯I*0N6xo3|7 "umͽ0*ݬv ayz3{u1(k <1%MMuv^=2pe1cIgg_yy⼣$DvX}Bzgm*$QCW)Wa6xZh7"ΆiC(*S1U }/FuDS߳ Qj1ey0KDHXTr"X,,*z@8X1kGFPƎ׊%='HuZG}Ebre=Tv.36[J%kU CcE[D =34EsK4'r ˗̝NʀgXnX`JB<6WM@]c 6۳z[1^؃nU`Ǎ !Vrq\CF=HB&]*MDVjj`()gEрYe? gC<}P:+7*]8fa db(e΂ݠ&#i8bDq  1.[-X7^~M{3b u~冺kZZP;aWLa(HR?G z4H;RC䓃,B tGn4%~A;,6%nixӠQ%_;3e88g.A}> ['G@{n };w.jQ}I39VܶO[q>PjicYEbpg{&k& ({ b=;$J+Ը% ^׭qk1nEn' {ù4Co3$8941s.f =" pڑ%k=-&$(BՑ&S4鬺߼I{%c >?3t7l,l:@NC >x V~@yN}y91:QI}q^1]qaÛ^ k9SY  a< >2F@H_fhqcvmɳP";6~M""V`EGGiO7t0HQvz92EKKN)Qb<΢}W5 +Ĭe)_D93l=_82\3OiRaۣ>$&q#=;|ZW\Ntw 䃉[C%=S&ql`Z~!0k`niYrxy NJu҆3'gA1|- ܛݍtg5 =/x]@&qK4ms>\K{}1n9r 2|' fOV1fPmU?fCm<2){( {LE Wܽӗdr 5I*.kJaǰ"ׅKǫ{%(=;z/:& h~z'etjkO9l`8jڬPsmVؕ{gv{/|X}.v.5bՔ:`9١a}Iڇ]MK( 6X}dx2{Q`_|toyB=Q[_p߯R1\*v5Xݨ`:r$(2е̾4< S,V{L]?r\jjz9379h(hsK{X 6ؗPAȑT7%Ŀn;ȋJ#pis-3gK%][>*EO}0YDQ*4)Zݏ gZ.s qtO\mvG[ܸuJi8,;l,l#`>F}R/Vx/_@+2ob@6,Tc}kA.e4q͙V^ZF亵Hxؘ%n:pT@N5vzTQc uQn^N79l2}N} ylo}lm:0J$Gj1u肹<:,Ȏx$Nƪ*ԒF0G g ]h [:B*{D%zHytj' [3c 1&'zb\ytܰ5K_* Zh4!F%1Hg`N}X1y u:-Oq9~`StF*V("tZ\'#T~1 #;IrʵWɩb6,m-po#";CAətZ<_|&6 _Wz-ɹr]CSװRµSeh@Y3+{ t%`5QVN0e>KNjjYAn#?Cdg0?/oߔ˝Ymԧ/.&7@ H{3dƸM.:H*.J(H۲ki k3g&; ٭(MUz^'~atUAk04~2 ArXyȤoJ#7不 M+f[C28\>Hc/"?3L H @NI.Z g6}KHTM3JV 1\[4BnLC:5%8~.t_CU1a0EsO*&S"ߟB)7p8i vm#$nz j' ̳!0~#E_kqu@0OnTbs|dcﳐ_ګΥoK"|PQ*dĿ!`n*:B~N^z÷ Oc>H |H+b.^~ySzdBiM5XP_ˋX+H[a7֑)}O@yE] [1+w [~F,Gx'=NBޢVfۨ{P>˰$ߵƴ{ B_b<*!C"<,f]|͇Mtl-܎VRT !$GXFlt; KFr\4ܷ;F{q#'ұwҿB!FI/HaTm̸zC]rv' 4hJf펋_7 *uoP6K&b6nœÝkzb$}A%>V/h wu `K1x':WeƲ jOr7DDCr_&M? Sסu8w^ؿ#,MmwZ6/xs?$Wj}*lndlJC֍Q&v8 \I8ֈLldH*,pFaO9!fÌ5 FʶdΧtq13@e˂Ik3Q4Hڪ ;W}!X:w@6m74FPpnspD%4<'Tΐh~?Wpg3]]/3Zz``SEr 0K4r-y3*{lh|s:W`9akiPKQ)G)>m>)R.&dig4, :3~J=+jH%rK\e>Fb5uRô-a:~8[l&Vӝ 190JAu'.qflFa6gqlIJ&͆~ܚG,w5r=7w;ckkb/ZsA'^d>3 384M}|&>@~`!H04nВQm@bL4:w>L;CWLHWOoi BmԽxӅAI296"ɰoJ7=v滂Ŵ$@`<=o-ƿ}6\ke"3"͍m /X5wVxO̯L Sh tVpK"bm#p*b$:& Z1's1V l}JMyCQf: 3 *9C)wS([@vnѵq;h!x=>-V Lߪ=4`24re&$^ڌGbS -Q7sU3`>G'o0+"2Hm'd 2<Ķ=4*n166S0YAx~5|Ev•^i;dwqrҦ׀GeNA jEܞ|M%g*/ 4d;3B/vذg n}'$ZPR=,od1tĞ%q Rj#o(kYߘRf9aCW_pNyY S~J hwe 6LD ×=B 9Y\Maoݡ.5 -)OL@jxx SXS= )7rwt RAsF#pѤo ^DfÙM"[3?dJۖp(v[g$cPY͋NRUZqiM跒Sf^jFV2arO\E' SC JM5 *@@%r>{D}K$FN'\dv[i$e!F>eF`qw̠kYZپ%I3E:6A,,Ǐ/I:K)=~R)/XqH>:K]e28ĠwjM?*U+r{LLz#pe?J~Q(o zW6~]:_8hCޑg'{Aޅ"=)Besʒ2ӦD@Y 8=S7"magP'vD\ e$6)Z1Ы#-7ʵlH:0}Ѡ fdXoݼt{Ps5=hhT)} ~ D4lG9cvN_9/ U_-O;$Cp)Q'kz`(v2ǹu˔Y8eNX7!C'L?ڮB^ds[ʳ3$¾bX C6i+d-RLT`l1Wkjƛn1|WcT#{j$Y]rLl1L8Fo!%V2Znb\&f#b u^3 [ׅczP@?0Aڷ3ܲ;vr[3W;k!r!#mc/حXz]0ɿF uU@så\L+_>Vl96Zu[@񁞲tK BcFuS̶^h+"EϪn5pe=S8 AQq4~S_¡ZGvÕ2Zޑ8i}?)V8Ь3NBL\ /WMd`Q0P\l=gk*t1O41d6_!u&~FR0[ 'kKC?yHѻ&Km}+ݒԪ0D ͭZ"dj+߾b7Ҏϲ\/4PKov}k)|`۩A^8bl.ᙋm(<&|=VzU!h7fF;F.-eLȀfxF 5XCe eFȀd?9@ ʝxq'rƂWr7TftDŽGK"uH٤ \-"벙PGVI-)ϫaZ)%q=UDSI] ޣ~ ;~**0&vj9{ȫh -P~i-wgþ-ɩJ  ;?ڤ(ggoY=00p >jRƎ_Ħ\v`;&r?ē$DLM_BMdz(l,!$`P7\'{w7z@gйI*X Rd3.]cu/iaOWy Psd9X5YPe~_3| ;WXgSٮ"w(MX8$[-mS<ǩW"q`#):K4~n3tc,;A`ZPv#JrQ[ } ņΝlw{O\1/2%4gpCƼ.H\W= GUoWb\iLC]Ux?e*LiFs90V31!;}ӷ KdD4\$;aɪͬfKb$.7~RFaپ $ఀh7'O0@~#N+&.Z;PUw$/w[RQlM]Ry{kSC oCqTV.v|%KXmqnݶDzG,-$FUw &h\V х@y}7`|p~+r$_1-C!\@*b}WkLTBw{Lۢ0Y8m>x p]yiqw xbSx`󄖦p7S񰑚uտJt_X_ʃ1"HSwN"4Iܮ-v p]`;ϑ&}$7Țe7-%fόo{#AjNLWu$͒>QI_~Z|%5:%Gp49 O܇~9:jIC|@ܻBLy7 Wc`YK,ǔkuCwH`u@8E:}4 12jHܻ5Ɛ d]B(%s_dR9եإK_l cLqO)3:-Fi^Bu0Mk)UJp}rC7D6upH79G@,,*7\gFz.siGZAK;xQEt?b;N_W׷m:˸3K'#Km-B}@f͑EZ`iVk~ʬ.Sϼ8v/pE818y jS؏y+۪ gY6O[e⏥6w\1V% 1pje7CXlqcn8p {-[ItgVo"Z١}0F_)<Ӆhޜ AO8{SyXIB'eu_#N30gSsjs̟] ? xKOyfHv]0 M ٹ zy|21G ~.D ݊m6,F!gΤ /;:[UEG؝. OhԾ h\ƃsH";OazOwf$R;f s}O C!6An~g‘[tNVOmYR'K/8J`.bl퇳w~7^͞L;յEa_J͝'ܟCM[ZԜ>V`ǜMRʘC.ir|P[3jQn}ď8=ߦe)/.ɦVHb)nbB_$7抭˖"%Ҳ֤6Oѓ:;;F18;W2SP/lY0{P]PR,P_aQCT d)g 09ebѩ7/blk9کX\K&} ;SicF2BR}1~_ȳAR|Yau:F}G gLDG@LTi<2 #簨dM;}y|Qkd%@Zh!Y#=vliwH8XmB2<,1On۷Q\^&,X\PՊvv: ?vbHЋ(sY)?s \m|Ҷt4ZBAgr@ Gby{};DhV*># !%q E <3L6*MG%Px i(lS 'CҿgW Q,ਧ:hS-'ev=щnBT kLnYgf2c ғGьz tp`A,^W@s7l 0ZM22N }Or\,wl13455}1jB7c92W,ϡ E ~f|(F G-SZSG>?e3XL~ab)VSN/#m^3w6"LI"h)Չs|emZH-7v;/MD)Uj ڴRz.+%/d {?' !:&'b(^}F6H  f 1SoZҘ?tG,˿:ЃLsh78M|P*E6 %x=qLג~Gɐq._*p[$V,z+ s럶B /AQ|FC"諠|]զ8UnLM_[Ŭ,cz?Q2fr9Z]OZˉmrƒiF?)6.T~>̬Qd-i7nifBY]!1𑘝,!/=_XR#(@DZzG쫂aXܹqrB ?G $0LG|%,Ǚ55Cuqr$G/?=BwQ3ǵmhd܈qg%Nݰ7q!0fjURA@~G,|)Q s1^b]MS z 7<&j{椗:+≹'o6wr28'רd+1?bj>m-th:(qA4`tr+㔈SNWsqzԇh{S;}rh~*VT͸+|G rA'l%W~p ~O쳯)q7>Yt 9Nu$= St<'FCs2XH<O9* 뺕ń0g.;{ !f' >d@oҲm~PV&\P)ھ΋ELN(2We}ל,..|>& O*0wqf:#OX՜;K0zv.4*O,.h 4ќ\7c#͜|  RR[ zpyE0(_ 115msgE'f c(YWM3ņ"կt?;O!YxffrX!lM,wP>oF4E`]Rmi:e9%n[j(ZOfj F$d\s̘!]MػV,i]o-Gd@=x ;!#[jbO\]f8ÇقI:^#˵`p{hyٙ09n郯Y9YQȈ„鳔2C @]fXmO|:) n>+ڿqC&>۠)\C&jʶ k+V>TepFAcO0LIn<Ը"y@S#qsCqd9(0Őu.N5PͫVvWSe!>[: #Ji0XQʄ0e]F>A\FMflI(ƌlU~S褆%f f*F8sV,&,8#y>*~5CQ5H`p$IBP ?1j \zR@@9,,ָd^thk &_P᾽ȋL4~{1OQ@=u9´pV滸RvR,ٍ1vIE7-x7q4Y)$]AKO)@[_!Yo dWfg?>Y,T(Zut+Ge!]^c%!#e4S;rܴEE Uybq,rj#Y xV u[Q9 %c4thrd^"7!6 Rr+")GgOޯ$Cdq!TU%B_KݍQ?흰9+%To& z?Ve)Nn[?6G !ɴ ;:9 c r*`d,/ ɽ{ץߺXEOԮnsR_bke(B(V5_h:z?tP-̉DukwRP-H( 9<=@ǛjCb@vDB:FNկa!嚀RnQU?YpzpCitBk]ɐG  P0>z4Pt6HK@2 G;)2sVRG2w?*0g/n;$݈-УCe-4șoG[o(PCek"s2r1 ㌓h ԉD/r8Ţ\`HsYϐ񮸍oπ{Y3#E#Flcn2S;)ro5]}U7:%ǧVȥp.'~qx A Q_D'rp⟅+q ^YmbŋP>Id٣: W%& {|ͤ4FQTiŚ s<| rd|ˊ#_㎖R7f4^D;ZUrm4'`p;=ZֻT٨  =9hH8B.VRKO>YpR>CVZ5k^+MGу0.m-(b\M.1ž>ݗquc6rԪBl1yXoY_q. bzz_t.mWg;)6[/ZB<6SDӞ!(:n;U ҂LL@ M vF)Hgʗs= kc9eK{֧!xwyCU|ܽ@a_&~q.q8CO֖BO5# {$y2d*21sYj9"hxYВg@z ս8 n Gd/&m;dC⥮Ld.1e_n Ċٹy t;hN$üxDH1}@G>)Tz.gi_V,)2ΟFr7h\޽/rư؝(-^ }/TLrWL;)FZƎcK%rj<vLyP[,C%PPe;zTd0{ 2!*+0O$7trK=_U&y]rR_ IW6[;(Ix.R&sKJ.Uz!\ 7g;ʱKA>eKf2`\l&뿫_+9x8{.u?g7Me%@B,1_+f@t^ :PfV]: $" U,)ҤcQ9"`=9Xիnl iZ[s?Gɾ#ly0Fr?KrMn\GZkP8O78 Qʦ⏬dm sAsA{+sR) nq#4ҁzhaKjTyM_`sE0'jPȀlM0v֡kVt m}t$NE;>qS:n6阕ȅl K3em e F>Y9o:Ii}LPNR]Ї*} ʿq lg"kAk;?h@[7aI!q`t@~8N&d;wۂIG Vld>YyoHf Ag.;Ғ <:W|"v* 7 F0k-$G!cEU-RC0kDq(m5z ^G# B"'ˑ-S@)%VNAp>T5wCeGj.y#Z0)V:| K$9!0ѴO2頖ΐ)g>/P/z||7'Tk0/}҃FCb(+ 2'Tu֟M:.Nu%9:dBI?M[A0oBgZ赧$QsB+Vrg%XRv _=*B^Wl[ǐa.|`E *sΫfѩ_[D0p7|`DŽ)-_2X̏|p25{!s6ئȘ/8ð,SʙL4+ Pf0\Ӄbf<1M!Pnt!:X&!t#2%FP\ѱ= F 8mUZƛA/Wl|UuCRbA-7ຶY3"{}G8JWy92zOLC:w=u<#Y@~uά;莐*l-aV4i,Y9hL{zO#{C߇Ij+nҬrAp`3!PPnYï8nfýV}<O0(>=k0/7&!8X>,_!z;lT Bė%FbXxЮ)}HG?%ߗrFH>2hYńe*DTm >'O0&tj&W+BV#7/[OsC-5 *JB Ce8,NVq>`n|jm^2Ϝ1$gݘ9b7K~(oւ?nXٝg: /ʒ(|ƖPg(WTf); ݻjBeUXr^W&ދELk( 6Ao4-\uzvNsƨ[i8A`k4ߠ]i^Gjɽ^ͪGPs Q{Avkн] ں@RUUu3E0 :6wޘ1;= lO34R#͚ޭF -FjaX&Zy~G$HCʕ;?xcP廚(W'uc#4V~`ttxjGם~W򣏥g 0$zmۗ9Խ :WqAY8'bzBa~3~~^d5ٌ>Cr}@863˓L6=ו̿SєzXcZUs\MnGU[x?56Sï#dhrij$#FB3j!2?eɞ,fX1(0Aq_{Q?䧿ORiם [9 S|E: WDMU?K#qu\>7Y/"H[,\p Xz~3QCӴT>FDt3H " .1s5a^aQ6=QUjnZ|JJ`|W"t+~ު*X_~f}Rv <N GO]Ӿjs?t鑕LXBuPN GMDaa윽!ݥJԨʦ5psuU&^f23hI?In CnŢ$33 ^~ =L;}{+W'ʴ ѶBdςr^bUٕurR(0TM#&ў0HeB۟o :*.72^>J+1遹{IBEj: $Yt uz裞{: ns?z0& wU$CGˡI*F'!rqaB_wNmgY2?;&dܚ%GSqU)&ةq<;67`-̜&6Fk'xay$3Ag `Z0Q|;b%d0W<}M9v} ݲ;@wϴf?.G+őV9P-JEo %QxmPc GCt_\a!&įрnIz4}>5;g2 2gY0ӫ)"ɉtoaL[@ׇ-bi;Nlq.Mˆmxj !ha¥̦$z*| I _UtQMIIL[8帶Ј;e"8?H,9ɤ?jozI Tȸw:5"a6> G1AKx0;2 jV+J!UE`š&6i?h_b~CZѻ|.^^``H>!={G248QӇ#Ix6E _J.q9TU42^M 1 .J_[" g}_BiJr_V`-8B> طHA՝G%W<Tܹr'; rBchkS}ir߇mGU;@y/:^ݹQ:Ό܅Ɯ_~KQ>8 !dI:Wq0?#qH$T#vbmr}^Z2&{>Vs}JG~ RKuQ+s-w/<ѯI#<ڈrM?0ؠ9-SJd`P"w/jCr0 Ȍmѭ,2DW!1=oUE\/ KL[z*QiWmK X>`J”c0@Hf,,:oJζuE M2jJy%[|9C S V+f)CPHؐ ߴg;[OPבߎaC[\I "|V}J*,EZo }N^JUG׮F-S_.^'L-YR/G`DTwoFSkg9 [4pĜuF~Babc:O~]aP'?D~ 9lXo.cɟ\–dm{-=b3VV(y<4 CBm H G&1/L[~^Ayeg _+͔@z5J~:u:_Gɛ3MqT| xI XK<kg>s͟H @Ng!]mA4餕1p;Va?*,J{#+# 4~lȊ/nKP=\Vy|[^yҡs׭ ۹MW2BxńU XֶՌ,yWZ-"Z RHo0 } M&a,Hf1Bdu?ߛfa x=kciiC Uׅ혎nm*Ø-{j#g88nf%wUx0T2)޹4( D\ lA`.7^3l#8oCD%_ӽZT5A],s9ނvq~CKRpUmlL*!^J8]WiL,C.3r/%K{@>=N ?ˏ>A1Hթe^aKA z&GRC$OzbYJ=yNTu~aVD{Ci^ v@EBqSE,b?8ga87kר:G8-[)kRDUNCH92'L C{ ]qc 7ʋ~աU(E\  =+,:aY,AQ*#f; ;BZ%;^bYWx˨~q\/N2] ciO?&Ybd7F"ק+SK*+#vՋIT|LzUΊ=M\L :Ͻ#I?ѯl3IC@9H Nma+ w?0.ٵG+gT\8z͹2+җv\xd#)f+y&i5\/P6rRj/Oۉ0qS`#7|g"ݙ.ɼjgdSrhDmQ>7P= _=OEkz:OA+TTc9N+ӃKg'M]0‚_s쓚0@l?ҿ;ҍ13l cU< uoInPM<79 V0ŧN!\oJY~ld6.G—BbΝR^# ^l[StB}1x7;>Vz4&)eA-Ku\3AP.w|=I'$ӹN뎄Fvu<"Gr"y#pƒc:5,`O]ƒK-.L^vvJWPدCb%=l,j1i c γAҬNxSR) ŠkC^QT] sP<]=|Cr8mڋdƾq=3^ w)þdW3H9KkY52S_Jx2)0 Qa?n<lZ zI8jG!E\B;tOn#Fxnrӄ8Bc2*bm?QaFH>X["vH wCPl2q(ŚHi7d!C^/_OzNd#nrj"7ꆸ~ue2dnnjXDC1f7Eebuud8q*g"[)yp#'XC,簵 SS]Ge"Biz1T `MjkB'8PƷq:*iReNО=2U"ѐcSA 4E9xfhY򓩒=c!TQRPWUQ{f$l< P pU~Tx"{*2?Kҳ];t ݐN PH6rv(x e*kPr?.;_2\˱j1)@v D@1'R?FDa9 Ink0m,/}ko롳+"|_9;E^Жeamh:jZxю#vqi۷G^&f]Ž”@6'qf%2c;TfR v#pgQy?J W:o ;qڔc* {Sd%5_7.+:qtrS*1˃_얃\R4sL8q=ЛuѤ ֟%\)FRqT)jj=byޢb&=.V y+JH5 PܖdFA)ef/C4/ Cb6 M.zO5H !G?38q.ԇ(RoNI+i?ie؝\|Z 2dy?p/,8ɥ[iI?@_|E>YK3/Cľ5qB<W2Win ~7/q 0 Q(q#Fb/23~q$1]N 0m(A))u8j2ih8U9ur)$S|R?E*i?Z,y}e$͎&0 c&V+jJjP|kF*1^ 1 Shu'[z+6fFTTKub_|El,Cv+GSc61` V!d ['LTҎ?v\bˆ@;w1vJ >g*^2}p: Ť&ĽqM_ΐeFì!H >!5`j;{gÒAݻapHvg\˖ˣ6 0rpK #b߆MRj͍/G5OܑT@ XIQe>l>#797ͽ2SғeW F!z |cliB3< mSNT /2X׆+c s͢T -}-)XF7ZYss#@z-J% 9mNLf:BZϏŇhֺvź`q\ڻ# b}˺1a隁uϔGNom%:O0K?+ 52$;$8JT:mIj ļJv؋]JI; 9Qe)QtG#L,MP+W$ /ڧVacpHq\1;Uţ:S5U r%$ ,U7>ytJq%2*> o,Z d~PK!\^]y}5N07 %xMhdpۯ vj T btox[J@"g #Kw|J*޻`'\BX%A8Iux QŚ/x02uüxW9aY65_v/q:!*cKVB0nQP 5EfiC悑U>ߍ9u&M8:L(]^;'wK}@IfBx^N.&S-$t$8W|_b89Tgbhv0 X&zHs-At1 Ա#HBjg^$ȋ =-̭ Q'E[񂺘 3Š؍GQpUk RD0乽Nk($Wf_oQdZז!t6d\No,-ow5of-BmE?ZBkdy~x4!'{8(4zd 0iYӓBɊ Hnzm%rZTI|T`>813闏-7#7MK(jœ~/; $=B'搨CԫroM$JǁMTBWؿY<+٠"鵹PP l|W_xdFӀd22ڃC 0!Lc[b*VM{S9X.5I9?ىJ߅/ӾMÊ4X4WŌ'4-{,Uf`_/Kݒ~3uL]9MiQ">V BЁqi7ajfNmrW F5Lx HveVf]4Q<4~"H =y8'7zx-O <;+XO'`W)'d޸Xrz!qkxG]RuimŹymoz b7q1P)D*{q  b!RޡAisэ7=ww] h-Nq/_׆- !:yFXU Hlc 4_!28cb(TdDN`[фNӕ ;G`ڳ|co/bqJ,'CpYfmI%yLX[H[MmH 4v~H,ST==,F{={{g<.x sp˯,D3(!^92-ʹPTdX֎3jI nsf:Osm]–F)t{(`?xMpq1yV>^ 7"Fo6k#H67?? R(AAvB7|woYsz6xrPG; Sup9L9 ڭ*yLT4i%iqy&)^GkI{bf.*ވV$-w_8I$ܻɀA&|&HI)v9Uh $ݚE"˖9&rrn@*JB|Y>Qك5/sfč+]LꡧT&`e`?9K,k(('gQnS:2 q@^]Fv c_Jg?ԓiLX3k81Yۨ&Ut8HwF/k3mknlо$;IZ" ^›ER5Tc (D'2Ձ?w58^rYdž4$- k1O?VjͶ=5ʩrr݄T.! =#0ѵ""*Oڗeժt;aM+ JK^Q Ln:HGPYV5y'Je.λhr*CcÅ.w|@Aw|jC#墵 6ƥi"JL09$@݁ee q)?bHz|А k/@əNv3,k?6Ȥ\'/ 1W`a~pt뺱`ƌț*GgۊR JPPpS  W Q|,I$ C-Uc0e2t!b7ψJۄH"-!)_8'ִ5hCct@he2'T4c' ;KU83+=mJ\‰R;Z*nZ ME Us}gђ͒'!+[%2-D!\24<I,'q臘yϷDo'u7&2~X9 j""h"a#Yt*ؕj3EzyP8WUQ*X\AUF3 ՕIp0հ<sT]tvEuv"ciɏUXw{MkK#0KگY ?n WsȦ]!& sca^FAyřd,j裺F y_H0)uѫHK,򬭤p 1nG^2?KZUrm8U։&ՐMB&_ \^8ش˻ q1f*E+oH_;Ыz'cOYRt\fGv[6hV? !9eam\U>=⬠I,[o*)'I;$E[OxAW IDR*s7䭑(qu:.1u-NL+^H3ḽcve:[y[Gq+'l <SCYB7rc֘^'mf߹p v~MᶑM`;4w` '΃rtD+)svjQ͗i⑅jQBF*\ñ|3bqoo}-jڨ ćD/P';&-#_V9Sne7 !J?q*8 Uo"Z$e&h#@o*?1.ؔ:1 K&} I_אrt-r 7fIwA_yE1x=RC 혷J A|yЦ5PHN_kEjiB0vr#Y5Cah/ uIo&q4݋Lj@]z!Yð?o;{whgl+Ki6$ ZEW /eڜї2 ]YHz9& &*NHwL+>CV/bHYs&?Wiӗ{#d˃'UHatδ{*Uo6T$B4? A Z=`3zh NPlpOmՓRa,;saeAi\^YNJ3e V$yKhU ]}"]%:Ed?)yJ5+.M_#F\I81mw<}7gE`:=Cv TL0=͑t:_llh&:";}0Itg$e,;2y gJlr VY էUt\,a`a^{g³˒X>65Ȑb҅& thN`@zmߢYb܄!T71ץa/bl6ձff1ﭳBRv1+WY/(0͊W|R C,JBE]6FyU"qll<:_E6g.;p@:!Ī:FDv*},Q(fzhTDUGP$,'^nP=j RYek=_۠F>UҬsV2+=CIgRM> g &fYh]> o^?a{K**3WQS ڢk w= |J de5#Yؐ;Z6TΆן27 VIxA-T̓( Ee+ i+EBr .'#f)Rn~T_XF;CE <_-֒"7 &\y$UxDQhvQ`m:Fr=Pp܀у|Ta7R /U*x^I"S^#(c1 8vFkn5hM#%֜ː- T)[-L s3P.NbRBV ^&:G b7L~ |ea_h`̩Z u*HTfj$|Nڻ?>OY8cX|\[|pM8ObIWK}C)o>s)9iV(Q so*Z@=ĠU3F%$u4U(d /`k=ଓ˧-p)5V˙u)V>V?A@x|-q99g3Xe&Ity>f9Ri{ي 01a-h  <nL,o1q5yEk -$O۞bp4#:21],̏Xrf;3YP|TxM{)U$\)LrR=Pr$ Qӥen1},-،f[7 ˢTJkfNSwK |0A[:Nc[__jp\!Uk@Jmy+%]aDB3 ČE0]cHJ F?Q3>  VG3@EH+ "HG|*m;sJ6,]ȥn(IU[vN`AeXr8!>cm0L yYIXT]jJ;>]"~ r'$,smgUbMú2D$7SQa{z]X!)ي ~G@0-ޓ6E0ގT9JNcB+pu˝a\5E3K:ؼwZArgzlJ$ԯ'؜ć_ ذAm<1p%w{/BrD fѿ (-vP !3=LdҋhCp/ʼxFLOzuV-)' :*kkW*hfL$(`i!Q{ _FyHd"qQٸ[ WS}ӗ_Mć+/}i t>Z=NZӿ7xݎ?oVF`_2m$(2Gn.*ra|t{)d)@T1zudrBtqpv9Q̅.A=D9q˲69>)-{V'0C\޳8gDR:G2o.+7uwh50N.n f, $Exhoڭی L dlS]$kO$#}N;tKN띈[|J߃ϗ}71!amv\|ԙU(,!H##Hud݃l!P_oI i2j (=#c3NF`C: hw #.R09RLJ[O7E30ߦd\^޲Jʓ>߈kM]=+6{᫭XMe$5!47erF4˹U0V)t!8+-QO |cBݩq @' 3bHCAs9[%Cl~`D8, j;׋ K\bV[H%uφφ[: ygdz;R\7njyV՜v^]V:)*DĢ3ڬ11p!kXPZL9:y$-Yd!x~BX#R qg,؉iev$_z>fZ ,DAar>v3> ‚ YW_X8=5[ZE!=b(ݺ30B/}yk췃'Z\ Z]u4 WI ^! /SB.2m܊5U10]c7h gn zf?uҦJ7-{=0-bh>zk25O ${Į-Y箲zM7gr$Cz iH/J+p+kM7zI'1HĉS*)Пޣs7v#lq;rw]ѿ+ -%-'98 ΡhMf׭;z/cxBIr ]QRZ&pl-K.2a<^N낔ԋy2Dp4f|Yߖ{A'y`S$׵%Jڅ"Ohad0 y:q|KSi/ւA5" ViH+ c&7p+ղt*Ψ *ƆWj/TyPKVYQvJԧs3[&N3ɔcƍ~K OYkp{` e8n NpM8EJgў{dRIшڐv ܨTNnb*MckkA5 t+\Po=q;/qޥai8/DXDIaF\"DZ5!сہӨs{{NwHzw+o}=NԼiDf0$Հ ,X]HC&vppoeߪQ_>Æ.{R{C#ʂPX#[ǯm Ήbcڒ ʂ}0rg ]'MX%R- y쎧& hٍo~#]7?A9|"gcrbm0䅯ªN$~B;OPFޫeٽ__w4,+"vd/(Ihxtc}F 9]NLt@*CzF?wfHEP$t83MЪSwK1o6SQٿ`]pkYOEA)tE?PR@aꝀ7q򣂹 $H|Qkm(>wG$[H&>mQOf|ntj7fS?0D+%}i /w~ro=bf᪬7M /;a+g{դԨ mR>"-(1([{(@ZX Gy&|>BVzZN.-\ץpzBEж/b71DD/_vɓgCܸU\{Ϥ\pA/2+Xy}GoX bsH4&R6W BD~u'&WOe+кrtl|D;A+n \谺9cJilO>ovq< q0)Ns IϜ6\.%&q [F "ORe]eI`jxyesʍi6:iǪ|-Duey䑹JaGa) G*mmRisxU5?f?6}@$bfN%~p/b=?w:1+Ho+LLu"TD/x\ \c$+mO2U% 18҅'w8)^\jcI߽uH &u?׍@?hhn_7 hB=EM0aΖ|b'~n@'C].#`e.#b;B*b-ejւ,v$ݦOqImy)9*q]f6\Q7:Cs*Ewj4{hQd ә@f'D9}Ndv怹hF* llS?sj5J|p|Uf%_l kAli!ϓd l޽0Hk2{_%&?QxW 跚ܱ0)ӞZފPG|K$a Ѡe1!M|%4 lYokŮ-e{?wFuL؊YcT_",S$oHÆQ F5ӡ} cp, նQc*qsy^e#.f$ "R]j圜}?-XΖ=͹ZqUR73v(.0+b'N0'-^\{_7o#Ÿu0?*3;Y״] K,%_E|^&<r:XT9a@Y ^l6 ;xgvH*SLӋmuyylm[x4+.* ` yCK@]]Š-75'h6ISSyhYĶYBnXuʂ>·Xb2հ#\d:%#H3o^"D:bgۀ.Hq<Xͬ;☧8ي@K{v1"yH%N6˥Q1Mg΅]jw^ކ5!#ͥ;GV,mRgA-Ȟd=-Z CQ/M5uDn(Y_{Vi]"\e~ >F.ݰҟOb3YmhGV'"vkL:l[Ɨ.ΛT=ҥmtTO0f< bCG0yZ)_}-dO HήKy @ݹ2zЍu\dU[ʪ/PTd#s02978JAg".Ua0D}ՒffЃAue*~U,?Pe֏F:ղ8fŬwb"%#e|&k~FL^"/Ȥxk]qE&ޑaLdW E=j2R(q/M.*$Ρ|ZeeQK{ĭֆ" M~ZA⽪ɈKfSư] `W9JHXPD2?]^5HmI'@WR%N{7nk9)8h y8xvtY<z{|q6ݳ7_Ys++})X[޴ AM`SPH1 -؃׀m=a~,` J'd27&QJr:u^KSp-`PG1<̃ǐ5/~0.aT,"P"{tDkZm&Yc+椑'A;.o&y7:?FԶR;ؑ8Zf|9]n V P9 vg0JhZ #`^L"s `ܿʼkޑɴx+]NӎgM*WPD& ?\=t7=k5GS`lV]a p5!,?hWOzF*CE{ 鲌gd$^QeЁQ&T¤Z98R謮N۳v-km*P"BK&?U ?G}<0OJ*dsãU:5/ x-4ScF4?rU6OtQ~+?~ .7:1)qYm4ј!(+Ηҥ1": ^kj9qr+޵͖6&dzƏ` %VՇ{OO؛L9봰t9,w7bJ4\,P<{uwY\<:9\_` X6c)J9^&k2:noȌ H }L2\]r*JNYIֆ.ozIi9x M"u( ~:1f &cO$>+|E~N;qq^\ ".$",O9G "J1Sa$Xw$:߭ZRnAP.t(e\eh$J`LCS _>ډ2Z47FU`aJaM "fgwOMRy$r$iBj=,e| }yqݯYEf#̪SuڿDO ΊBi؀9i܏H##Վgf#ьM.V@-2U-S ]Fied$0.8=]j;!W®PƯ* > v\՞RYwpl =4g9H".5FIt%X\|U[;i:7GN~{ e_;߅U\ap-&U+VD)?x9 ! ۫w-,H^@ni=p~=OkOA/-اK%.[,* D8Mg? ShV0Dd)w* ]>,o'D9rO /tCI Dȹ<9qi M/@ZJm e * ֶ>ZRh&}!-@#*wbc0<+]%)q2-3{pcvYp_}iMBU]ֶ5Ixp0 A>,\^-7S*ZAl2܈8ՁQn `dž)Ӻn,Ϩ; SE֙mFMK!l/i}u60W[T 橘݁; Ι| SP)yqV}ݗq:Nx1P6WVT$"r{`k%0#:siH3,QZb`zA-Yo7<~Kih j1R i|y6q1]bTz]aZl{-< ?a}+1O˼bTG}}q4Zsf7:ylj):)ٱ_NrTtVY(Al)d@i`j#T9'AsLHSHT,Kڃd=׈k/:,P'뉪cG'Lsw %ʋQ;5-|{&lhq{$tblj-^X siB'_<-z'5 lBCQOI #$3G`M@j$^ Ke S`(nQ,3."$i]!߆8aXߡ?2&g5\*rުՙbhG_z"S42hŝXnv2o,@B{ǠK _Bk}( /HpdQ{jηgúwKV1 ~9{@9yr U<[_1?~<ѬVK#LL? >ҒE lWOn(ݺlna{{od9at6йki:LJ6z5uJVBe\UjݽyrDPoC)*T3`i ǜG1!ZO363ND: kWJعU&ڒH-ZKR4aH[U<37XN3s܆2-]ZKv8kה1iZLs7|GClr{k<<{сd6-ԧ=k|an#@KMF_|e:/sdij{C$!dPOk+LZn gͶŒa@gHyҙt[ZwXצּ e^r3aDh؎|o_du/qsȰ:E|,x{]~a݅n[. ׌M~'QI2$2Zt61Vb??5\ k^ .{n97 -sZ(}{SD~~,MKٚ}))*KCM?|3~wNL2xTb[KCc('DhZFPWY,?/3:ay 8;Id.a̱ ӦLQhXEmTTGX9K; ,!1`Mod@_/ķZȦ Qe*w64UaJȸԧNNM\Pud/l%aCU.XVm%=?rxwչء@Dr"uڸ(^<%L;Hcʐ!e BT>ZO+r},pP6XFEE,@./z'z6 g9B}Ql'?-) D'WpJz4L&?ޤjD  %@Ddxy+8:o7S±jiE+(h,V4]2}k:!AONC|:x>&ajy1}2R2X  E7fs;c(*ަ*>SJQc;7+ ɩ6 h۟(zg06͇nXnyM0fvԳPh݇vɖLKK<0}9GH!c‚@JC$,fv؂I7 dn_[!PSn]@,d&Z]@-_DTH en, Pmŵ9^V/#7QS}"b,Td2`-߫:/7K*)\.-)6MV K3:C )oJ^= =o%^ Y򓇵w $Y?=k'f3č '; vҍjv#0sfwlq`N ^* KSmc*ґVݺl)X⊕AOvPS Azk {اrE㭥5b5+;+&*5i*VIi"ՑQ`Q01cV)|9ZV3@uʉtDK^X-e?dЀq WVlm sIx23@Ũ\" <4>Gt*%e&!3<,HةkdҝFB(M1.+$|keI` |S20$hiEJlQF7GCP%ҔӪ0Zަ\М^ႁ3I[920ÕL f%v*f v-ջ.*]%UȷG0 `PϞ}u4ʦUP4P'* lZ6L95tu%\;D/!a+4D:4&wB +a x+cbME (w lƴGwl +F/5-dލؖݼaAK'cu*˓ҎM_&3$O Z8® Yg&8*dBwݣC+ԛ3QQ#Elve'p77) qH{H7E ӌ8. ! ~q8SB6")y;:GjE'OC5 {SཛྷRGYqќ#q=!5^xfy`߄GPiΝq6j(ؙӦ9njv;-8UDZ)YcJn'&'Ї{ Vvƒ9fA1u #yؽQ镋9GGTؤP|/X6wH%x_dMhg?%h(fTG=cX3꥗F&$x+w3bT1# dPc"xx&@sE| ЭT ׻u%e–}{Gl)|T"jrwDƢiy>,'7+F3QW\/ԡ@))2w±ݭQ΢`b]zke7AƮĶ$.>IZIȷޤH֝M;.33T[zNyF[fnr&#SM|Ͳ"vPٝIj'L! &r=Le{kU^>$͒,94V.[+('j

Hò0iM(^'^Q{D( 9pp tw"P\@w@.@iHBA+D9P@HޞLZK*R,͋]2( 緟ſSLKJ,>b_RXwݠm,s=&բ%I~2eZQL $Lv: N4m8YMҞ:\*T,뇖F"e',X)K:z12}OFo!e~ `}u{eUޡPqt >l'H/8,thugqYN#P|.pH"]F&Y_- qѭb WwVkÎ ;{? v!/pY^ uHM9|$ǎZlѤap_N7\ߊGSiU7ǂv>0⥻,I(m]qb|y !ù NZh54A$yHH'} ;Kv/N|a(,PD|A'[Ci6'7 ]TuSD~?mq |G ކкMY *|dLw%~FS$Zw(j M͹[;Y_='Ikj(]YZ=pJ# CzuUE/oSw-tkCz'kҍ9Ά$mQnGkc$Ja7N_հ#uy8 &_\oojl#WU~fœ.Nsf|m|Q}-!82OcTҐT/`Cqm2pXdM .)(3iaa\1y:a/;q@:HR"ڿ[NV(7 D#Ŭ25jr!ShJʘ) wY eU0vNo?_#1}XNJ7R8br76Otx`pB93Bآk"E sJ:O; -Rp^J%.36; '}D9*+̏OܺڦI.'2650bt0Cyl*Z2\^EA)߬_A؉:-T~KD Vi9|ו?R_ȓOOmeSlad5sH'z[ߺI]BmLVVeX4[u`ro Eb%bn]mԾK)*M2fV^a34ճx#ͷ]E>`jyi / Vcq1ol4N%Ru'/55oFt TW*yaL²d[!'z끼C&į:nůBP\Db9xH7 IP6` P. Ԍ\{:J> _U}K'tO 2-d2:߰\nCN s藦BUm~DlĞpnf!?MY]l:pg.#`$Dx?^Dhy/\H"!xOq|)ۈLr=@hd~mk_DO!Q `Al~p\&i{-+؂G"p-;0gpѢ6)v _B*'xp0mx`!ߗ_wf-@j#|C蔏{*pWnæAyf&Wuov(zNEw$ّ $pWZB1R@b CX{ Pؕ`VowIsiO#>lnaI˭K&M^"Sd;xnŠ3xHIﯧBW"6\8j8/YFҋN*̥|`= 'gR`|kj험$Zg>n:w#L#>84ꧠ.KMT"eq,f{PJDrbkD.R}L=-R>y̳>"_Oܝ W6#'LP M6nNv d~"k[/zӅd F4QːnTO:al 5Ed7fWkB ;[GsH$QDˌ,Ug# ]6Lc_.-^M/ƖA{qv&Uzhaҩ*e]ٟ{')iS9ZQjj _^&&O9h=t$$ EX?uc_XR(;Qʻɲ[%p>B3j3S0~g `!-E[G9\#Bwt~(YR${>}~cTetG)CGlo<DrLK?%Lđ:i5uk]Ib|(/F~ s2c56:|gݰ4Q6M"nA[IfQ.)[bp/ms|KdŸ?BN_y2y:.V[V&/e&ErAݒ?J !Ŵ.Z`܌ͱ;vId[ 9">Ȯ*\(VZ|,#t8ďv[Q4 1B5=Bw ]7d< h<$oe$wClE.Ho ʽ/^~-] /ybUsmm %N;[))cE;XEI!L~/ a$RR}l(vDKDvZ6 0hՈ3rlGR2ٲ| #Y>;`^Ԇ'dYIQԸkTA%uQjpYa6fZ'ۘS 05_/́N\RPLXEvuY3HɈbڣ{$ 2ܲ;KiO`IHBrG-Aŷq&JumΰbWzK`'%m/ogU Q$l*29+Ы%1"Ygvņ k.2z}_([{ 41r%Sa_ 7?չs362e:)`wY?DJ51 PƏ !}o6!m5T4@,0"?-RO#.o=lt%=ircENݵv\R qӅi~|:#D~x0Vlw&fuP9sƋY+ JaEĜӒ4/+HWtg\? _@ ҿG-<0d7Dx< @q J;wa9mKs6GV=2\DY=]gC;Y(ic X}kDyFzYWX>KҰ^[Y*@`JRK _sMTsߤUetwp/o,~KO(_?yf):qGmK{|j[ŭۍ*xooXMaM&m $R;`%tMe0+~3UʊxoJkHù#W ) OyUO̝o:baDk۬Ɵ);Wv#}Arshtưfϳ\|\GwYv(dX6Q+jljdSUc MͨZgۻ:xծ vӧ0EY l}h2{(ȷltdf礬-%&ŗ˜D%]ۤEmutP,05'5$^ϩLE-/@ u8bV :l.dk5( <fS6uFز]4cR@A GLob6k%n|ʪYQ56[}WA͑;HvQ2[80t1vqǺn{ldc'twÛϒr|Ri"\%B+jgbʡGذy"=re~ Z\E(#hz@={JBZ\x§'p{uE){4@X~\v9B5D;X~*EeDCU ]hԆ$DIKҘ`]Ĝdj0"/[b{8TJ^=$TL0RF ",C@|,!YO^h!Q/sVȧu`i)/{+gOiStD381A :j'-;Xxo*@9]5 "D޵-ȳ?Jk|,"/ !͝HXoY47"D%R#] ҧ Yw2Ԏ,ڊIWL]Tb[/9)z2Y_`$c³wln3T>=x( K"tYv5 cVT,CI0uj$_NG=Y_xtJIa(pEmañUXRi'QW cR\x7i-ukQ;HV[%lTmrVcAz+T+ATkU&d0-f(g7_rv OvL9Zp !QjȐgD) p=KOQ~cw4= !,|1EQGc|$0AJcc6^m8=T!j0,̜*BBAM!o}yIi`)CGi_X8cR꤬صf@f9e%=z.ɐҐ^ЋM5CJE')'亾@w=)1厮p/B's>,ȑ3i`qrt5eQltn1gCrR>['=)Z`kTs#,=zEֺao⅑`ֳ1̜Ǚ=PG (,UiBˮ>D +Y#L+suNg>4 QyIT RnF[u73U+b<l`Q쪑P-ԓv{$)ci~icd!%xTP&0sH yKoJl٦j!jdm0F c 2F[X2fn}yC.F#\l([cE Y3bXFKQтb9MzOE&DRfw6%5!a".yj![J` jdfpz_D,-,p/0_98W) uUVH] Q~PNSM:#o.FlsŠgl~vPRZ?2(g$Xcx|)@vN?w2(Xb\7^=QV lRUT=quP M\lCs9#'m02yIieFY`UW@;TL:aDN?P0+^i [Ao c ͜F1qP4M|{PbˣsKt0^! .1UOQ?N[KL$+%M(`"ƕa9H0w-џz Ԁ m]JĊ>p yCk#'81-6Z2z5ga`i .8K WfCiB#j큂E-"Fup?M{'|M%#<l@` e^ISJ7L\pߗ=/4vfZ}OAkUI9z׺ݢ bvMeʖ':Lcenٲ"Py O{ح2jlRۻ?YS#fG+х\RnhX|4Mu!Ep٧ư:71Ty@q"2J)U]e}ZT%\*St2/sgޮ5"NTn7!]RhL\$w~NmʌN3Tݝ0$/!r`: 5L$C7" e@MOp8$ Ⲯq#a)<ζ ?KW/#0T;8.hQoK@3/N)N{_s1~"V^pJa"dOnqyH(%{6̯㛟5sg|+ bwC77С7evp -^vpQkGO8%OWmd̨&0sxP:7dZ202AH"L,ghCOv5j`Fh=?(֢g-D`KhSYIy D_m~>,QC=uRwӮLt{fE eYd$iSB * CbT?4 @M9TRZ6|菹(|c'6272V"<0:Ǻ%v ?s{Ɔz~ |lT+aߣP6k&ݤMuALi"JB9Xh[%b0Y$byq+k-e3c_{ Tc r.w-\Ɗ͈wXuo";bh !A{'8,8lr]ù!s>FU)T{0]\n&JPi%"ʭ@5I +qagemâuMu 3:L\5pޖP#"hnu뿚s$djrB=l(A]fkZ1~,&a=𽌮Qn[T}^T n$s09Zܓ24cP&̗`G>;!lrzz&D< b Du\`-Hwjp|57k\ޅo0(V??Z^^.X("-=G"Ե@=%lW>aLm{MIa=Jt\'<$Q(grqRT3Q>..Iq/3/(KC٠Ki v$N4W=ȃ +`g4V";!6gywDTk7m٦ h.,@TatFG'b~m횲 2 j&5]cU~Mhq+eHƪ".yun bd3rk``b.'>DޤN&K7U\/ .f&쀰52dJOt>,Of*}LY10-jNaCKN(* ֹXR.o~=$EGCJ8#t<ĒX,ȈF aHl~k_~k,aJmfb;}'j, #.ξT]l~ qJF=i I"H6n y4,, t# =Wi&%Hf*ij#J {PU=a8%ˑEPۉ0n0@a̻lj4hfs=/lUifV SCMs9sQ62x&L|9*Dv>h)XJ%!@\K5=MO}wT;.@|>}8w& F>^t?̰?}> ۴SlPAuAP%D ^UQhӴ5[VĆuT{{kGUkz=gܯF`EZ Ne㔤R`Ϸ[JZT0.1ԭTs7,]o3Q.+ʓ)4 F"cܫ%TQoe1h8T@&I〢{b80Ohƣo79UK铎)4;Vhab.neyB@15D>zJF*w)XՖA\LPNK l/ o7SF` <4~3H/ܣ<ɇq zXUr)@P@5(hYfP5}]k*Vvg4iN#W/8x``F!pG۝)hoX]?zgA={(Ra~[ߏm%߲:mp]؏% u_6fm6hЗϢkh`Mgʵ ]佰!&P@ZtiduX54A1 3{@궣:) 38Xn'cc$lyL@ Gޘhqx Ω^dR뗾(ǟsye+ pGi}/&q|q췶0DAO\j@=?țSnb&g{SJғ_(O莶TE?,u'st+ÇjKNe8\Ev&WĂ3/J] MБabiIRNҊűnW TMqzR8 pYz &HJ!k҆)넍L&$b ʢ8ڰ5$ɳO O)+mQ@? tl Pf?+nnzQM*Q}Ѱ]WXͲJQ J" G!ao$%]3A39?!>52> >!ǪFm|Hڣ+%H6>F4Yp~wi)ؒP@l㼢@:)MLnY(.:Ai47aFfݻ0#C=Q8:GYv*#=a $+cѩnPe hx1;ZfVO.X ~I^Bd[x^w;:s~<򞘀lye_] ay&(U]_NKI KaФ@CJM2,tɩza/E6IðPjTFQVgM_{cM 3tVpK#@|׭ъZFd2XY@j_fHV?{ 6V%"sX8}YOh\!XM66dm_+mJWJ鎍;*x%无'֊ *i\;}aK&m NVd8a 1<lzJ)ؙ#ROkv<4rqƏ XkRvZ"~s]".Ò+d\Wή;_@,"u<ɫ^kSBzBO,{ruaب:AF+YDYUIxg,˿[ GI.W EڟoM<΃-> *VbK Z B^ C4+@o!MXB!S%A W9ރ۪AQ,$ѪОE fXkJ+~Esj-#M[=}@U5ì=eWuR[1ER * b'W_tŽ)Z7뵻ʷ{ZxGFDȳ;+V;[J=!pl?. j `f#7[⻉ik"ASjn;EuLXxU.i7⮲DZXʵݶ$O<0߹J3bG^G(x}$L4+kRe"Ja` Fox½n}K_m6{lk̇˩HanFoE &mx"üz<I_R뿢XkXZ*q.(Rrl8izb|ȇoRF=-i|8v&B* TOQG r] ҂TDI׾x)Rr\*/_؍S:п "ZB4  $hhUT 1"#Ǜb78ʓj6~a <ΓB\ V 00]s+I6$%tQrVUitDZmʋ4֫}%Emyݓ.yǟ!KMiG{҂Vo 5vEoRtBiN^=FySU1G)A,,7n*tj{U[8.!hT"jwSds@Ņ7A$z-H%tH6ǂ>12m RQ|1u\9;*nC7F(>}yM ;[ŕq#F\}a!Q cy1'6[E(L }cSʣ>.q4!cImϔA2L'Bty=%\O85)[ m,&(s ГeM0O5DJ1}xuxPI_vf~ "|/Ŕ!V:vI`xârؾ,bW$!l*=€ƮBR[8ʀV#5´4CI0 tؠ@/V)l)w9,D :aGP|f?phg ÁX/MVyO;pt ;1/buåɪh I!B~t_1g]=\F4sX{3@JEEáܱF/.UK㭜^x}sd= .I|jw7S\X8CHDQ-H]bBP[#.!s@JSIL<_W{E((O[3D%\@7 fa'HBe"{H9qV"pvm=//Z$MF2?F4%> )~L(Nj令džx/S1 Cfz]OC u׋*/R YK&&v0[+| 3.Nߢ"dtۅgcr*"g.{<pu Ζ;Ė]:yx懢:0PVGYn]&w<u$E3|렯e?A92ӭt_G մIJX<'D@Zڟa*.kZL`Z> K.a`Jr=1v)XŢ ;c 2,'+`CCbJ |բH*х+!0`R؏n -f%@ #/)N]+wS ɫ0=wHlo[SJ9kV,V u@.,֝} _(f>C*β9!6a|CA-WS2 hS啨g i(̕ױ7КB޾27Z`i dd"L5NhjYAہОçT-&^̀N>-,8EmVDS C p'wLepǹ~+=5*x27os˫A]Y t{AlvJlO>2p#CBVeʸr忧P}`$cGgD]D ;z>`6}잩ΚT6FuqL=ɘΝ"EtY0S)S |'Us߼XR|2qRu+\g<9%4H71-&ϳQN%<ΜMgr:'Zඎ-#?id7&BG : TM/{!dg}XzR+bFrPsy2쀽CX WZl!"q[ ̖[1CNƐFa@/gDUW#!V]B%&n(d1~.?Fܭ=qC=sA.D\m  N.+zR6 +2F;FPI:u8 v06F)l$Fu52gC;ɰZ-ۥ Py~9:#awP!3YQi !5-*-pY$='g= ,TCP{ 1` c"6Zv߅tasM$D-g9ن2vk}"L/ "JzњY`1(˵BFi=!&#Vjo R;̥E'FCC1jJ3u#> 1ewgo4ܒxw&ڎ ^e%#lҿwS0ʐ8 yќ^ԴƉeZ5OƄ  kaAX: 2)X%AQ0V9Dv s8d5EBt#oM- @l֔5A/}YWތmJs,]G1yiB>[Fys{]XSp9wf7ל؁`]pէ$;]͆ #XW,!O u*gF+?8Ncg.Ať>\v[&oh܉v,ef tY)VXfgSpGlb_ޔ2P0/'Jir7*<\ <:\JsَFiMߚ2k+Y{Sj)2N&e[3nP&U;(rCgD$[ FnJK3(C`d`vSFË2Na}aex d*b-}E&PCޑRܵ^)̡ͭppPgs꽣G pWt-]/E?kwв4Iy8 m;虂%9N- ]<ʝ蒅$3*I{ݻg㼬PdaHbctL݂6<EcKj_65'08 8ɹkwA}(Nuގܜ? 6_JW$tl'j=c5+| qg8z&6@ z8Ogajr+0$#IViz(q XAؗڒ˜m -4>Z)Fx|1E;=/ ͼ‡u|#.`.js]_tߔ;#42D~t5vx! GS}̶_3*Èvꠜ ڻZFٻ 2N*u?Յ+}M=" !mWgeA/!MP2=oe2ϋȐ.0iGfHiopxCn7n(R!T@fq~,>p>sHPe5-ծ # 4R1pDm'Nq<6uqB2aWŢ! i/$)";W>OAj+/ L_wkdN9'綵BAtﲽ+_&9+}.yhu``^/)]MrY" >,D.}.CFF>XP4hM8f {  Bi<"٪_|+ȵUCM< me6܋F^}p9"*͈7lֳ k҂/^ you$-f6M8'QNaEu5VgPV =hR7@p-J46oW3a4Wy y P7G무:3=йyp 7!"P/\} TX;&"7A)]A[yQijϷykpL13NJG$AMQ5:xٿ"Jiw>%~_߯~H^% &*GUo"ƷB:\j* _qߘB #>v(5͓3؝wZR_+XVSW99 tt}G(؞~~t8ߝzmjjD׻`^02 YIL_/cAA02^6 Al)UQ1ZPDҦ- ,& ='`Kbݗ[v,(Q7*= !YrITL[p]*H, !~֛ RW# >Uhf -R9*5m 5A8 u6fpnqf4q[J?-0 0h]|! h "Ky@R!۱  (RJ'jRUϬ1m-٪Vb.1s26ខlwV^;fF Q:rZК y', ˖ "{0gK' EEfP݇),oG 0T(ΞaV9%0ry\Ⱦ6]3 !ۊwўz!a1i7$GT-' *=AXYG.C ,Yf ?V(pX"i^ )@nD!a*pr|̎x(4@im'쬄|H "^96YG4Y%WVBtKB[x heEHs.C3X 㟪vF%:||:)h0l_5`o.,L-_UW_cE;."aHJN]] F.,;ȘZIi.`ia7YӶ򊧵ݓHp&flQ,Ɯ-*Fb9QEZ^}3P!tUZ}$*敡3|l v{ LO_ 6FG :v &R8U[MEbؿBw^'9 % ?~MFSJko@Τ8P[g3&>ajΚj:,qMܭY3P|fǸDRuϤ(ɺ"먲@}| qJS6'R;9S%cbѐ, tX:UgW樜_>2q-V=O֛XΪBp9YCobOh a X8Kp+#W&pQʐJpe*JCXK`g1f消qp[!qhWV/m#wP'(/2*2.6U ֈ/Rf`L;(,:֙&RKRcS!p* Y(kfQǁxAna;1VAJvXiˊΣY< #@m#We>-ȕL%Qko3[@HubZ|j^嬽gD6n$FPn`8ـoP = g2FI `53{S5;%v᳡Zsk/y*-^W'*#,DoC-%lKn #e3{~:] hyap@MsB>PO|eӪy8LwN%&cLq8X i g.vp&} ~(T! :5[b46J)`ZtCp0a;=k:M7Ik E?bX˙ ђTaxy Go!6S| !J󗊔u>`Cpt!?TNOs  &PpAyֺzXM|P+Ňl͘1IUnj]1 mC_IcϮ&_c༂Wʊ ץсMMfX| e]Z$ L Uwq-U~=1$aꐊ,4/"~zhWQ+d.[$4"{q}gj9x D35خs 75mݷ { 8߸8t!nZ\zJSN o?{oxCqӶ;?p$镯,Ӥ`7u:* bҘMW?daG`~XJD gŔUQfgY-5'yNV(ЮN31L Zc|QhM֕w6AO EXjm!KE6= w!& v /'Bˍx|W7=h 5FH\hv@Q7dt81S BMzHe)lB>v 8w^\f[äݴ9f ",%]'"XNk"j腭P^^sǼw7p-K[Aj6v-ƈ*K~K=TѴL`Kh۹8"٭9 ?IJZzQ|tB&Qq\2 lD< D=TK -3f"(S~| )1ɦo!x ΟΤ5,zn: } \"W\=[ݜSfΰ,_w:wgeZh)d P^DTW:Sl0wfꄎe>.@\S hg@HŔr{O_mz%nJQ8Ov V8խtIXZvs1iT6$> W'QQh^2ku*.dGlEhF˨ғqL6?U#z*-c}Aɾ:WaGrLI\ InFvA7]J<}=><fCKe N& ||^V*q`rM-RWHs7aNa14Ԭrҫ*u+ۿl]佴u,HfVEb{5wW8(r} 6@SqN# M~ԧhP!SlZ lkh0P.~SPl$wmR]G-aP%A%cS[>^ogo6gO'Kbbz~ w%`jkЦ M/1fqEK@=c]8\:-k/$씼ذڻ_WS .Y6i6bkB9eSWh݁7 "8h8IbgbR䷸T#e&C4*IG|yr r?VJϮQJԂTFz4q*/!&ev=xxnHb$UiæO]5(R FXt>;ݬœB\RpM0FҨC:ʒN,*#r .^שrUz˱B?wV.H/Ӭ74nXT*ϯ1A_i\Hy tBJO \d-ryxA؇;Rܜ 4ZE Jňuc\ud ދ+ߴL}'k}o%JCѾqwOKi DҲjƉ8uhڇen/A鯥m |*k`Awq!c Kt]MЋ|(!\d0hQ\ao!m*wqu~ w)_~C uoo9kAKfrpݺfs95}NjƜ$2jcdunpj2Ŗʘ|NOT>f]NpWjܸ_q ŊdypTAFNXE/NnN;i8agV,M{6r;u9bW3LkR#j'ݲK5%1FAcP,9.?h7<'Tiɶt CȈS3av ^uqIkl9|*kym-!sOQb1 P&0 E%Gouh&#y%ЙZvPP˝_+XSӚ\v},MK=3yWOwvTc A~2*^ Dŗv9!D<{ x={"?J5ZQ][ wDpǐߗI[ğI4W+7t>irv[2H#3[ŪPy잔L?ED- \m,@1^ sT-yb`00{3oGJ5AU vb3`6u5hc2U{hS6NyaSW uqyͯ)_UzQN\-XIA$OIU&NI<-6gLTŠ!8V^W7Hְ9gE"QL:9O`EM! (xz91@*ux:RS*_oXT9uAQyόPr=A0νT/wP!?y|9w \PTƶav'|+ZqIYnu'34'edŒuۓlWfrnց9G<%6t\9%H)j=G5Ox~L+zedZUaJv_*QIy`09Ǎܯ@ (>L C1iBW@Qݏ ٰba=z/9*>Ii0kkYZǬ/%-MpbYԦQI\.[@@WUᤊa~~*!*y7μ,wS!GoeXHtO/'HY" {bB9mS!h=sEmtGjneU.('g]̃8Vt5?܁"#o >DJ $#'EJeVrasͧP".f{¶IvfIuB{yg'7ů XvF~?1oyHo )IBQef@i63dFۑ٬0AXS(掝 |EE z@#|(uIPtRzg*O<DžSAqr|/?&]h (ū=PI]Wm+,t{y a㎉qEpz&&T&]]hA]4t!<ƥ U"KΦWzU Ɩ |X7"z"j5-^ Nۓ 2k#(s)ۆ՚TOx R'?fw8T<1tY!_֞c1wKԾёa/>p4?{O0b_Iq-J@AD'wK)peayG<"GVՠ߃_:/eD/~~ }!k ß'ѩZ2A!>)\,B2 0r3%p,Btyr.a C @[ ^~Z|p{- Ca0z}fy.ԑ6 g&%Mu$ wjSh}}|[M\va&Dג4 >bQWs4LWA&w"}gkck$~JH=d 4Ic=,(0Z, Hvb$MM94+E7(3wz>]Xሲyt~cK-S(uq!wQJE?uW5r]H5 cOVfV6uHa`(z4Qv6uEdq5V\-shdt7D˝9 "& pʂXq)ʯވr}:q"pDL6%L}K.# kUundN\E1 լe%u/tsgY&!gLXV^b:_F\}bA9.3hxqrT+Ed3b>C?]gyEXQ~dA${ `0h2V{Vʩa.WGM"l$E JA9Z{Xa,0sEizQi5j'.3{ %?g5e}DArȪߚhBQ:jБ0jNK4|L+'C/@$g;q]j0"Zib]Ŧ+%X+bŷΗֽVro/B%$ ͛Zl77 A7p9׋*ex5M&ˆIɾUN+g,kfVSw5WbD.! }zWEή[8=_qoYk7)-WڮAwTeFF>1E|:e h p t( !O8>?W`](\Dq{*٤b5=a#ߍӄh'۳Ġ}t_-TyUl%YR J8Spݴruw>UF̋R_q`'twrn8BbZ\HɎB}駘_8P_E~76hQwsB^y?宷q7ܿ/R= T/9Qce섩I)? ovRFsDQ$dnlV4$O,e b̌4—gHuss8h^.#{7+5S-"x&p`B\ j^J0}5^5L̈KE i#` ޯ(f%خ- r# 75nΩIފ:@|QD{'e$S@5VoGI"\EK߼ik k'M~x(8 9)us,a̻kX. 4T&soѠ(mKmS\0@o }O)\V41G<~Eg`',sLW0456гyA"P3I t>g}I 3,Zw@n^ )=.\OYz>`])t fU8̂U0ު S0((^~UYl Ocu**}ܯt˾- $k0ƾ`0?EYD󰘞FB%v>>б3nhD'HPz6-eBgOf]r"`j^NDOw"50S<@T}֠C;R WTp_ D~j:~d{Z<҅CB&AVzs~S~VVe.a,`:6GCy,Ӂ+GT4.5 LT` q f` \V9xAa#5}SGN!ڸ>{y=i³ m0 {C#y6Ki6_W6l0xB, ﱈ"qrEjGjkk`?qX!ᘘ/`%l'lSĵG2'xfVJA@ :@G|Vm]ZU)sȾ<<),ܦ|ymT 2|/)"u1Si+gT^o@AG'"~#AB;Bn`N 3ANմ/_H)ؤsB#=E+QDO+U`C ONhT$D:pmuLT ǔ~he]n0xU(&/\HbFɳ3,I +@{E[bABg*ii41r/ZQԅGs`mW=Zi\ܩ"'.|wqx +9Xe;60)nUн`M#Q̻8Y’t.RxHYlFA5 =ׂs6 ,noьlYC; H":v`3\ἣUyrAX\;ő anү_qF`ݶَS! %{[fIVM$.\p( `AU5;%m3k$ab҂UPƫ|lknBTrn9 faapV Dt6MA%&ToC<+C/q?3?p.S|z&SRGVr𗖳@r{Dx/oAWfxsvD|inSy/o;֟W<:-p 3zlA4XTו  H R4HFйhd5oUvQK-)yr՞}|gι$ 粪gum%`QF{{ (OSO.cSϽc2; cQ֫i^6o=Ϗ)>%?F2Vj*fך֍hiB0,F 3$_{I?f"mSYi |-X.C "n% \CЮ~!ڵ8Z|>.*Bi{k&#Zl γ=ϱ>d8 G!X~,\%l%+_^a2HKpxs΢~mKSJښ;MNo&b+r\bq%Q*@Y2m^aF`. s0gJ-9QPD` Pm3?3I=x.لkGSE9g@% >ir~i ܜ8CI]6G]?Lzn:i3b+ɒSg!yIpA7T>)'O$SJ +Xߨ-/?- ~r 1g\jVs|e19Ϋ?\r|PW,-Ln1ܻh!:04&arୀA4 |iӛNT7\I_wdw5*8&s&/SEorjOJ"naԎ)MԈ |3\BlVP4)=ᤢ l#?!{q4VgrgXj9/R+bعl L_ݪ&^b$`/trjL;$F{cAWjNsA^-#57'8E9q}% sld 62$\TVCNoG=ݒOR ,}k;@DIa 'Įլ cxiAӖ:q#AQ_M2DZݕ4ѧћxyN8PN JA-ma] Y+ *^|;}fp&r9`d ick )3&7n2%`*=`ۘ׃Ny`u=^$I}^FBa;fFƯF.P& _uQ.pl@SPɧjZha S9x4J]a1LTͺ #I1qJBovLs(lsd$dE}]iZ.4|E0l >YNb~T%x*'TAڂ8@RU戧ž'f|c9uF gCt*L4-!] G|*Gf~+eEki%D\(P̽uB3N\eo5#, Q}At@.7)/.9O "9噋LkGwQAr#!,:1 }7[Tk ,eUTlSWfުo 0+b 0>7V*'~C(iZ͔Xք_4;]'qYc9G#czMq+Q?YͲj0hϯoK[V )d3H񡌝/{uW1)wVߝízT_T&UZgNk,0Oy'fo+ yM2jsԜH,PjgcnV@x2H`[ZG sl;m "MHc̏;NˆՎ؋#H[yy1ҭ熰$A6 i¨.OayɞaڒM5A;(yƨRE1Bя k&/>ǽnHˌ)wͥ 8~T"۞B J"[2=@{):^z|ftP=v[t.Z36p.yeA)sLo@MUJ{UPl2T疳a)ug&?$b(E?ɦ P0Pysт~0{@(!0x3otC,#d , ǽmD#֔oT6foo{U ]a\O xp)sBgA/d~.dL(j ˄Z%w*UWsttL:I:|8ܛFt`Ne [cCNѴ"Bhd8ɗ rxt9wCyBc2)WSơ1R[#sa th-6L7IucyIWaB8BG3{:PH,-К%MGnud."$=b6$Sy0rG|I2i?&i{X>?Mq!c_m$UR?&";B0}=4)$U ^4U"S]~$V!VeV3TқS}Q08FoNp i yFAAN@=Te}xeXS`a!1)rW GgA[EuxY$fb_lXǙK PKJAtue^r[HP\vc f<;kd,x0aRS?~J] 3>7Ub誯(CgITaJhCWL>1A1{<›`zw)90ja⏘x*dZzT qLQIS^۵^%ƘZ6O(7#ȥ2$3ԂXhmG ff&ƖoȆ@QZIp)z j d-ԾI-X?{ce jiP. =;(q d&}LԶӫ!fv~ynOc+@X*&j˹Ez/s'V) 4HX8]M2:o "3fQ?H-.VHl$ݏCgNF \@̛B )s;=f-^)Y;#Vyy;E*[Bl x&'cim7߽pwx.>m *m \,?BE=EX Bc5yl.z;ի EJrd'fu>xVۛڔ ;Az)Q]:'z*gK۟W3hRe{$t&Ӊ(Zf+/#׾fȮ+"L:lσ]奂;"%122QUu%M/`r%˱hzCw8_Vr5Kt=|0Çkwnғd} 9rk]X7D oM9c;vEWd " ",`}r邏 iKsaUxtc܃( R9x矟j=`K&b9@vvWK;(Ҏ Hq0KUΰ>BFg,"^XEY?u<DNLAJF]\4,=]jI=C+lTќYUa&$0](};r/ѕ 08.M'_9ަAC u hv)fyL'B%1tat} 7&caOjO6&03?)Y|6xlW;+tra*/NuJp"Ӄy`iHf#gKY}onJ+Q\Ŭ.Jn" Dӹ^Zq3 GmC.Jds]#WGEm"bdj\7ܣk{A|ABCr@52tc>/?>9q<%/A\)Z ߒx~'V|\DX4tN5<2 B>uJnv tQlQ"Ln4i\r"dyu[_ $Ad& 7VHKBIR>w?$Sq@7lˏg̭8$e#vkzlb86(Ah4+6mШ4EN1ax ? z?ٝxXA$Q.Y8=N1myMF7Q'HF~D% 6P=l޷|!~d)I)K7" o8KIr=(1Fhs{Cd}Ck8?^F"E-1 ӼMY"7=#ur"3x1Ɖq"W'y 3Ijꁺ^x̓ƕi/ۦȋ HEd%O ZpgŁjYF &KH:] vdFtrv7_;KpōP:uhZ &ps>{}>Wn uyetg-^.`7Z{TR"IsGjKƭj1>;=ZB9v#gB%͗/Pǜ +2xD;g Xex )%v!dj6d<\Q`h9 % ~ SPYp+1D<ge'e~C- -w׬:IXjIr!{S>巿8'bB4m"ỌKCs'.]")nLIJl bpO=~H;מ\/^'`ȇĪUuOC6*+",&dNKr3oF)ZP&7YWbxcvA1\e}ZDi@|K7|/oCyUuI>mkWW|5?ofƳ[J&ɹ*S= (>t;p^ELkC.4xj%ɑ-Ykj9{?q8t|Fi Q 2gfhL7]̱ v\ƥޒ|⮓FMMF#zlEF4@˧}rpu4zI-śPd6a[5!kYi- 9LcV0vG/ QT40Ut揵dGU$N2}5|vŋ2. kxqx=y5ADlC [ʇ\[ESPF1ݖGw*u0d u xJޟɥty,NvR+zgj;nǍ|K7"lEfʚJL_/Q85fM@jØ8cscRp'v 4"K:П&A@`e GaZ`q-ȲCС@*1a2!  3;GTl\vd?KQ K%T{d]겪呗\ho2!bАk P˟㥄:p[;(ܢg"rul?{#)'cח'n1ؔ ais~~ҥ|aVDmJB]h"P79"bi9R9BL˿,m0n2l$ɜ%U,gk+ 3VЙ2`z&螛ĄF9"_ͪcJ GcRŻ7qnRuZ7"%wvxlx'횥W- WB=E3=e#Eja-Ւ񁵨JZ v2[9: EY9R_gq6$U6UÔT $jfBkoY/\)94ሖ*IT6Cߠ52%a3ˋcj1p$5^,N5Wyf@i "hf:U<H !%´m%љڜƆ2(ms"@n%j'49ꡲ5(eDw kĻsr4B8& eHxcS0r ׽ V3ʼQ c`#U4pl8%zٲǟ0#cىYɰ݀d#VMb\ \5ZJWŠTUq0;O`jCN+(Rü?h2~mQ&s=ZA<4i_ g s*UF fn7|鼂9ޞQ"^ߺm/"#.\fz)47y3N$MNh1)Uo]dYa,NfF͚>=vјaxs, dUjK;.q4`0֘~@|K&7eҏ$lqS`D&u  d?:3Tt] 2Ai!{yH^#OB 9%y;O_ĔuBA^=zr̬inUUwRH;I1/`lt%{Q}b5L 8|*{.{sgvexGѮy,l/\m͑R`hG񳾋u`|NdW]TL("A^2 XXtw8E*L]QC;;>NyM53BEU10nCfdQM?hv j~d/.}X!yE6lfofv\L: y}ivQ@ AaH_6y( Ƙp6{iuCYpxajK &KWNhM0@A XVZoɠP;2~zO"ôQtviΜw=@i`=Rivu,g̪!gZp5 ( &cxr}'P|k8җndk!'̓UUzLMlɮVRi`kp>,n VңMNl>AQ݇9 d"2L8tP[mEgYK 2w焇pN@.]:z=>CuUQ`ܘTR:ɸ-̉G"ވuWOu_1cj/NJ=N{չt,JZ%0+2$kN7e8hKPe q;0ZTv̵GV[.bnvYj<.UwէVQhB ۹JR6$}4OC4b3A1 *GϮ 6vǠc42-\ڕĴRi?ׯRzfr< a$;D9٩1ڄa)v6+)Mkв~,\j -A/ Hص6fr[*8V]t 98Uw\-.|@/f4|R`J`afpMoԞ#s/FyGڈ4_\S#(zBÚ~ۘW[On-;:V]U4Pw}*\@ IfڙIKa*.RC/IzI"\E rH&-)7~?}`oC׋r#$ rߒVHC6)(cQ5wd+<\u"Ay:|ieyԗe:Jc3d!>ǢlyJx^^zsp{p+\jjϧ-3~$/F4՜fk&ASL4"$I )1,U9sa49U8,X*4}j֖cjάXRENЩp[PબEyS(RA)[;80Kai@"Q1.QNDE@hD*j+|֫}ql Qگ\gD4z*]K7k=Iz]6 ä*npLMC~4q&fݗUDHyKgv jFج`i² gc~?saryxR/qHg##&ORq$ AdB)V\ 66RFǛ~meia'; iMtIZo[h.wҏs6|'@޸,L`dVd~TG&Nz-P @5mF+a=# Fo !Ŀ9 I{NONu> ST3Ii֊hPjg$&U&jz['J'Ă0)zLj4*/VJ{56z*#„&UI ['lcZ1W|EM(lFt-t>̐+!HrnrB R˙W-Ld0h}̈́$@:P廙 %oۅrhH$tUTNaj}^[u.N&+-lM-+le}o8*jyE7q`n8ͶcVSQsNQfY<M{ O~Å:[ X9rr;fLJ "2<]Fw)p a$qc-LHx z(t(o+ZKZh֭mP  atސ5 UuB4u98ocT -#3jث3#`C^6՘:KOa:ÑnPv"@Aj\ }]SC3' R@&GJ ZM.D+y#-qAy֨{jR=7-29]\}HMk+Y =IAi!e\ ջMKT.q#NZ9GӋH%ɏ&T]9$ <{ا=/蟇g0Z;7AjE1)!gG@o0yg'd"oynPә>4z0R入ި0ŊmNf2!Mi9^P$v^A}0K#.r Ђcٜ/֪a4!޼q>]覞1 V Xy !fQ8 m\춋WA㲱IJ*EK [sb1#7ssES+p\(6*^EVw+moyO~^G qE QyW&Z{ϰs!q}G0T͙`{kiӅUel'%WMՓ)}؛|m#u{ BU\ n`; {5y _>r?wbxja䞄/4{oC,ԨT_jjͩ<1! }aN[90@ܶXgxt :ySOy\T[ w7l섺ܩƔS[dd҉TL5Iua\XC>ݟV&7#՗_ lrG*~c, 8]j]hpj8i㺩GUT98r+Ʒˑ~dpzHNWs`kch`K~5c7珚 m^GJD,>yz50 Tgӵ'JBf `h l oVnջN*HW&f$ "3p[Nt+ w(IF!hWPa>Ǎ Y'r Ez6Mk'c34E~4C`=c!1Y67 N&m\TkK \P+-X_Z?Ӂ*Z_ %ݝ4}!%lL Ab*mY";EPbj`7$G2|ӑU_,G90zYqn/zs5m s*Srg4r.Яi/|~rP,Q"tu_Să ?x|!:>`l9VQ=x:ϛ|N4'RJUrn>DdK* OI58?B]{A oB֖D֥U,c =sqQuS |p6wE-fmrV7Q 1xpm R ԍ2M>לV}6_O|0X*,UXU .tpne)K>3s.m?54[0sVB|`Б863Lݷ+6|N̨a8_q˓My߼}*]ytm=* \q҄q9@n8'X MMo?0aҽnK03DJޯ轛;`x Z>\=P#$bXHV[ &@K2zq4WX~[VѫָmRYgΓQc;sv1UX7v\!/[tRv2 !$:.xM*agø3(1QN"Ud~ 6 $rp\1`jny55 ISyU3T4Rm2WO濴]x +l2%]S-xHe!3 K t`+AAQc ͽyRJF"zBͧ'aPN>13b#xEq/ђ9%p~I̠10`I\L).ć7 󰞡ISW،{CqӎXLƮS[xR]wl=AaiRR27{EgeuM 8Tm!l o~+1 %"8, _fj 춨;mqԅK.8lpN.О?k*J WE M61Ju<U54oMȐUuτ&hA1P/S '?έ v44YR.`X댁F׍$=cqcԩwfly~NԱ40k_YE4vrSèt?h4R. jm eC#AV1M0za S\['9bq˒?C)*ܪt@rlr̡લ~}#? C-)^S庨4OtXȤ~3Dt%MWO?Sy, DP|e~*TG]9] uk%N.\7jNpS5Whm0PXC xU-C" &_ik&^D7aȌM& gbk-o,/i{\o6fKkBF{ L׎WE[9f"ƚ Rnܹ.WWg)\rM@(ʍq/T9:GLǞN%G=T3FT5i52UU$Z4XtŔYu8(6"D)O7 0lZ&Ҕ9A9oD^CsX m[ .S."Ua4p4Eu1RaysZL3Q%֚w\;Rkh v ʫE AфCO ,PhM8P%cp^)j s}G Jgm^[3`ܺ$ BQmWdνB6ʦ<'%(G$~byf35P~<0Qb}~nĎ&ńϲDR|v˜u'NAKV{/}c#䁐;|M;~*z?0DwZ͍!QF)Ł L aPp[[.K2E?@4M LJ` ŦldcTnX[NJtr䉤HDf zAnc"lP# M嫖 >?F3˖=M8PP.=kp_@%}K |z4ٗX'J|NN2{i)6  ~'* fDӡC[$wGBbR& иͣR^K rbT_31/H^d3| %/,h(ז;rCNS&S/u!fUx"VSaɏQTzl( 0~-t+fYQ_s˰tpzP"pӢ|N'EOɅ귣3KS[l._{Fjy8uyV3. |T^nƜM P $B8N# /2ׂ|I'ň ڷ9蜽}Mu~h8_vNeY`/|2Za"5EW${Q,Ḟuy/g!HR5i4Ip_s.?HllwE?RepKVqxjq0K3(ĝճ=puFj`W%D3p#U=+8mV莅jvz$Y[\Hpj-ơзDG:9ޭԙ׀7~-.gK5{"7ZKE.+'f9*[>$jڐ0TmӪb osAJ 3 †~Ix2,« [1X1fy$兽*F>`t1\ngS eؿȈo5I4ec6tYtLjWe'1ۍ8s`8jl˪N7ީwJu2,/xoOKodtbWiga xO3:zybM~k6w08 c|JnH}:C3 ,㔳BPgF` h%/-d[`ȥF ]z~>_=3ytD@ɑ&IsK rK05BW<ϓm%F$%p?~ί^ եT*;yM)M_T&bUT̮C zkʚiWZCQ]k0.6G?mџF38UrL-X2t"O$ 6(AÉ' Z$k;Zuϯ=8f^)n3/壏r065 Ոi-iBW̏cO^qlr;%pQ٬ФWn'fr DFw~uc8P0ARPho[pMQpo@ϐM7q"dHPt =_TÀh ) etT9DkuֆrSncV`+(F[.rڑ47VH5|9S6yi&K 2㘶^7MwK Fv{C+TOJHBi. fY W ]\ 8P50Q>6f{ۯ[*](s2V$yQܪ@&*xaHJq -ņ6Qҭ ֛{ CjW=YqCN*#ކd<'J<,2- G+2%鶝9rPSKA800K*4Dļp: ፎ@2izWdMni±\yf$W+ϵ*@z͝#- mSr>.nZU7̚_B{U;dt%3H:PP' Tx I½pM5QwTn.lKk-x\;<qwXFanuM'<:E4ŕj1wNv H?OT" )烖V]1EtB0y5?sm?}.[.;)+*wӠ w/67^up ,9xtMKUY'4-h%ςK Wy}oRpdL40KuBҫ/n|=juǚrP?ⵂ;ǓDi *] L-[7 yA_an#oݝX^_8TE]PTS4ߌG"TԢZ{aeNytp@` ӻs@%k d٠7 ,1""/ mqa Q .tFjWɜ|*$^4kb(яD*o'!b9mC|dIVBjLk@"ON]jfX<:#ZSB5,};D^0 0*b \"J!9Jr2brM#D P[K=+ِi"GpAGuczӎ򴅣q1eH>>~Iýxsh T ;}+&ŽyɿЎږeqFU'NuhX0$]4"31}=`eB P7WY2WάsTYY>'iݕQ6 e(Zp&!GÿP M[pL U'&Vv<{.v|Apqi$9o,\i8_ |7`uTx`4C}\~3q5Ј8ÔF+=U+֏ *)5%9( wbBfK9D-kKRKg^7Ubt@u-FQ|r} s,һ!:Rh8A 2*&ͭu&iCCϪEI,B:UڊGTdH `S֦R15MMcΔjjWdbưөc.T=2 i EF1m)z1$j?bh#nwO4Uۇ ]5^Îۥ;(7bnFeaơE2BP*.(a+O}`b7JB}(z5Ǝ {:葘z¶(c?>m4r FےrA miT sLV`SGv2abMwDTK9FXU'ܒc=Uj€Eǎ!&UԠ^F50s鯍ǫ!芅1NNfKo5Wd\5soZئ-LrVvT3".O7oNvHP2p9«Ѹ&=Y]̿fٓa;n@U=D)' 8cF W}:T]]uIlk-턣JBOI1t"\5o,t=A,-s@Spm΍U7O'&zf6@ 8"Rs,eypb#ji2im%2=WhqYr?d8aA|R:BZ;V$,AxвUܘ/$ru+}0{DuϾ W]5S0h+ɻ#8>(95m+vxFk@3fK^fhKJlli烰ϯMt1dy5U\S! ;픍 nK| kI7,"~Fj]<@lM?$/_x k$rY>GcryT&+[LAj'@Ϫ;%./;R (.|L_͋ݝ_mvKխ=G8"5Tګ Zd.EXAXt EhlCazkh쪶8)AbMT5> YF qsTNFvS%?[)HgB:2j;WQk38kZg}ys=h <9+צdhƃ]|*|B"DWí=o9sCIi69) cy~4ޤ%xq;P^`4-c14):B>|(j;']6q 6d& jH3>p% Zة:Lh8^9T MjBT`"F*zz\Oѥ#sj[}9˭61`g 0նw\5$@^P#b0tPJ lb^1:V W2 O?~ C((Ԣ~Rv2b,rxc[Y%~K=Rvz^Ön*ޣ%î6F;:bEX}֨G YJZɑ7v $r |My@"+p#YɒmP J tfJQ anfJ ݳ_vps7đHo c2#sCΡPb GHLN0`#p^Dig?^D @YLA)ڪVOWܾyP: b fJtU7%z;  &x jG2S9! ?lfS6 7| H%εϏ}ed!dˢXt)Irq~Ӊ%ͲmU+WXq>>\U`9/N+ӢcL) rjpEz:`5l 62oP BVڙr* Bp@N8WU&~fxD6G8GuJÀc76h߲3ۨ~ 3i`* H)G:op$@)nA8!{8`zBDW/sIҮ W|%"XgG )%+4;ڒ@ktɟK?tQ@>qŵ 2Yd>~;DGeEB$VjΖ9Y얘v|Ga*7Ʃ1[KuR{flc꜄q$dJKqr봷]"nG7ҖeM Et)~XR> FOZ[WC1w(OvOa8щ{LcuAA;YiEaU ;Ԙ%~ *Imٗ|V]iSyM B`BdkaP%?Dw1+zM)Jg(7:YU6]y_Gz8yPq;GZ9j_7fWC_HJiSa?({JV(2c$/\eK=mH3E@nCdr!'= u nO| -ewch7tWIͬj̸&He Ct 1s7Z䬝ܚ2?.l7>V~޾Z g8^q'c7Qo8:_,$Tx` lvn> #|嵹>kwb@\CC>7aM]oЗG:z&-kbyWHiP>e,a%MhJC4.V5arT͑~DLm-w">@&$:ls([}o3FU{qy]9}Cj+V9.8BV)Е Cr{t&` -*{f@gT Inh|h9)ȕ ؼi=H F^\r<_>\_A;b9"o=C(C gd o: NěSK9\0ӻ"=QIqE(!D aVGcӈe+$:G$N= mߪpOYScAЩA fb08PYc2@zň-N~6^ .^9Δ"e -Nզt&מr裒ٯj;|uޒo@ &c\{,bYM'!eb6 5uvLh-no]mx_="}{+N1΁BSٱ;+xu/4z X;RUkvRLS&d)rjsI 5-d9؊'2v hx轀R3h>vWM cY$-6~RQN&;-!ƚ'_QZOQi<`_4ڕlPC*TQvz 則Ư LgGvZdƐeIcjZw|.c{pI/_ *.1cmDWQj8v8dQM]l:H%NRZj\V xѦG%`T:t|\,mjS|մηK ģVx?=5I" pWPaUe,mN҇FmrbdC 4q2W寄3Z fek.;Be Gn [fӊz+n &e_)^keP?U^_dB`e04Sۛ0ULD?j-0A,Џqd33w)'& Ҁ0(R*܌ t:\8,[JCsF t//8 Z@gڹl}.57pvD# o~\x塞z4mV"_əL502Y6&*7=>}Un"5V0[%A_~Ӻ.hV G>C_,Ahʲ*״=3UaM% FpeRNjn(c&JS4J%ۿDż71*U>Q/odeIAa>43cy.)7b,Zr6J HrVl@#&5?3^߇rg49V$k 1t1@n6a£tɉBZԸ HBYM.h,&?N;Bs@>]Jʎ%Ț'SntBϕm4/P3ACFP|WJ2n)K aSˣWHX0Mi(:fP0Pr Y?=t`9qZIHHx>Si<]ˎ Mw9[5d{dE>-b6h3k;f[qk>wR渷UJPv:K3O`s*8*'|@4o,c>uZ(-;WJHn`ʯ@4|J'VT6lswN<QPd|`rӫGK"]KH^4$I:ah=:J.bpG>1!HۜlId6F=S+ =6&mDL$zl[1XqSkTvO-OOq[k߭]oA\`TEعβ-~aTن̓WZ6 ԼrswL0~@! ʼ(.t 2|!]f*ړ]ǧ0y!c};bʨOk,M҇';B EҼ+[zl[2teܴ۷L~jE$\ kpsiLmێ )P-PxkC.x& Ob`߰c^Z7+Hz]b#٠ie3H|xCȴa{ɔC!ۼ*GO,^<^:#!*IJ*A%/5ȋ|!bhTXc5=hI oR] 諭55G=-]$EcglX,^ಐQBp BQ"#^ nz+' 0.<賠yXV36YHvIL|Am2x?B^U '֬2,ٵё7Ŧyei`1r [Vzt]5{[/ Vۯ8Ҵ<"^[?N>!q3y줍@1J"<˭ؒSo`Av,3;(~2ӴNvB2HgQofeloW@P pao&M N7 nE#[IPW~e vqFbd`.(5C~)e b^F{ҹMl-'FdeN΅a_KWgW;r $0VCgڷm'HCa[CWK]5_5s}]=*-%SfvJ'^dAaqy P*(%5K-r]nbTz=7K*',ޢ-т Kmx)*+*Ͻ߀V~wUr<1{Mcph[3Bg '2τ4W*%=]4,;#t}wBƄ+2N}eF3'+Ty!^miMh21gÆ+]yݸ~wYAӟl+^-JXV?˯kpRW-աUbp571#tw^X=VF@-xՐ_9asBWq p`/:!$)qa`\Wp[b)'(?/0>2]I6לZKP%1#]!ƝWi< UOQU\53̓О2U3N@ڴab56*i3U釱 1ϧQ0S.rM[dB(oHK$ $ fkpySOID42ii*[m(Y@ u< IߴϔgVR5/{U+ư}L|Z8p6%tUl/_O\n(NWyܲm [L-c4zT<^ 0:ty걣QatD]lؘ|H+O!o z3f]>>| MH%-̲9ػPPҫM޻s عNVS! `/ENvτYHgc0}&qk}φrrV&? p̋g `F2_K6Dž~G&TWBZŘͪl̟3zqsGx(JiGU"οgxt.U8+ڳKښ'>EZԠME :=c35cW"cY@2T!<!Kb"`lg]kA$f`,w`t=/N&\рc>пg.7Q]gt[0h5fBKvVֹ0iyv+9 Q$>Yir 2aW AQmS9.R8j,5 eWٓu󈑯mo\P/pb7@EVgn$qYªjյpZ+iw0;{K0GF>N^Nh^Kx2ȑ[ڦh3#S[%zrVq3G_>ɠ4^M*V;M|NF&VךJ= LpeJ(vzV(f?#ˡ#YTmW/V>qXlVhu գ@PreXj3^5SO3~7 \3hq=qtH@yՅ@C5Kl!BǸm;{m}!g\ZhQh& k@ v 4玼M6-e2H JCcVkbBƁ3H:.t=(Z1,%B'% Z(֊6S>}AJr?XroHVG7r"9`ꓜH:WT{j? _ɀ?ƠׄʹH"ŬOcuU yU~|3+9_qZj2,JPN[t<;ܛ\[v1zBu/ǚ?r&}w>2\VX-nVO=~< qgO ۺUm&3`_1fqf&z#o7;")Zرh.7Է~fBAg29MHA 1K0KUkM(OlF1 d C`YEV gJGЫ #P||fхt%g#b6\C91S06Vl\c*I!Ye4LcaW0lXi K?l{PoVZ4K_U|!nq.ɀ>ѥ@:(jpqbS&d$V*= g'>Pp)[`m<3@ H-lϖN\q)WFz wMr#BS]P^ Q{ݷ[h0ٶ,c_˺.b,@F_NEM) nscqMJ*J*Xs K!,58qUrensw NLm捏(c =6VsH8?h6"}$0oޒƵm4zSzlg\AHF#ʄj̫Y;nnSQib7idADӶ9aM {z/hliS+͟Z/yߠ:rY.7{i)wvS7o_D1\|OwnOB! FF*^Cb_/4b#D/:"_O2wMM~`j< hm72z@t1:f[ .72#"W߈k$M;|Q3ƻ:qyap9]TN1h F&n!36?-y3ASK]%nB Iގ8o|nP=8ɘV941R7 =SABʩ-l8@] C 1TJɯRDyw~bkd;F|8{4}ZBD_YU,7*,1lloyݓS>r2<61P^" az{M@:_$0W,`plي葌GFħ9EhpQTfQa5>mcqT0wh_'Vm7\-wxY pN y3/i ~zTA_(j-Z }m)wQU0NeX\޻(R]np(R kgL %%pG\VBR;qy:PI^0}@;?U! 9i{C\ XtO([WUT^HNcj+;")>g o&yHgRhzlx&"rXgZ^fqO3{6'VKSN.prj#kk7MD63ږA^5&vw؉Ǝ,T4gNQ;[og=~l4K^ೃ?QqSp =2M 2zciw%zTyнo`͇u%Mh}7St C= غV#)8-wzx!6/3.5V6IQ4Hf .Ѐ5ftW/Ņx6V.{|ؽ1VݓVZne4dD% rYtSpIh`M䒰DZ`'.-B(E';ڍos)!i;TC\Gn`$` G *osu4~ }}oUHZV .E]=w@@h q"Ol}ʀhtA]xfAW ګ/=~G$ﬣhDOx:/&@>iZ?C䨋~ ;6eg! Cȱ^xӅtM,E z!.xkAч9v\.ӛ eg 8K ~U)˵QF*S?p@6`=^T^UqǼb,v%R "f'-MǑ"h^<=y#(qy c*U.? \lL>}NoMab @#ԮN^WYm&ʞh-Rb]> MS*ZHN8b[ w.=H#2 >}ca<9k e-'U6o>ỘmrLWSC!>mQi!>3#U`d_B݅/s(Sqnmz7,0D*(!lEVч T`o#${wSTR$igeQJ_īaФjD0 xm b/QrC}^#zw%Akqr(6A_. T%قWjZ˪ϴ c@[y,"hO Gwه|t?S!ՁU>m&ruo'7\mX@=^cݳO4ɂP`%䒃>&{k@&3.(.3bFc2 ?TUW7 _{e 'wdفOtˤ=+i I#C@'UzqcFTg LV__/I)F1`a-jabSi >(w| 䓎 敼|-%zawe8ǵEEz7ŕڕx U%:(etnAο@n!'fMGYs]( )%D$|6]xՓ[`;H!$: A藠^$Iٰy鋱2XPLv^o_?eU4W23?XS|=ڐҀz'}ﮘh3 t?& s#]?@޶DGd%0 lj"Swƍ)rkd|UU қ˜3lawȵb6(S}k0ij԰zԢw`l} *ebŷWԡ UZΌV0^A dͪFjR u]vbH^tCR7ɧ7`T蘺2K닯DG&Z yYJTcSw jڸNFp3Y}iFߌrQVdn6n\c1[w1Mc)D8q)f/.?yp":3 h$6y*go}ኄL5I?azCxlApYd=%HmƧk]lH„ƚ?c/HPw?,VSp$w>+@>n>"k5%Ǥ9h2~b~\xl7CȠMMׯ#ĕP{wu ꟮#I^U1w RFQkjIV'v֨h[\1!$Bu]h.,=n)O4KFgU~jʹ_W+Ǯ /av&ۻVaZ^.f6S5Jo5;8Y+N/!2~:0ro,AK5N [_F,,_O XK/ȶ^0B5f?#Jndr4B 6 ?R2 gc ?P/ Y܍Fe"lJQ6N4K{5Cil<ϋEQnR<[p&my4DuYaAR $$8VDf4ZQ"FH&a4fA3+o*u08#%2cl'9+xSMz&Rp%@JY#}v6+rkiKQ][ĺ"t2慖aI!H Ο--)@[ ; ،\`:͵SKM[ۃl.T$`O]A7E;,=I]. 6&WH+(m,F9$e?`Oz}ӛe5z}b6d!F7|RWk<ɩ,gaΏGcP@ $xfE?-J6$az|ЅB'T_qz"0D'g]n]pGAcV[Y}}3(ORڗjΙ(M9-f\y7 /s9,K0?TWHE\pbYmƟ/dA<}EyuTЏdG_3|U$7g+<(Q ,$'I|WTAC+PyK#bQ/{̘ߺiΤ~ZXӤ)~ 3j#& sGʷ_(6 I}Ѻx7 rȞ뼴3*kbWv ۅ +=u,|ǵ ~0Or|KIa'_{}',rMFP76*N4/jўP#,oxcD@+ORLY_@ԙ[PO%Po "7` O-`cy"=ȂEt["%͕dqmIHeUCRY 1n;#h/V@n)\J_Mt D:xBB S )p9@`H(/|&)X%-vfxƢMcAans>)($vʣjJ6|zqбtٯ7B\Wk cOZ8+^.@G4K@ wc2@Yi +HA!x)fnŋUaеA"!CD.=k򆯄QGAy(|QPY D긓_E">]!6v bܞU nAuG4o1iG]4f&+lU~=+ /6{?A N cC!u2(FbΡ/5/Ꭱ%~IO>вSXV+N^N_s$8h)3ՖJObڪSq\{J'erʓlsU9cZ.q#aH6خk>Maqbk:` 8B#kH'.2 s)1C3~.&|xt9 9c፜=zI)!oP$}N tOKy 1 Dؑь~dzrj.j);ue<9q\-,a d^@ˡIh 5F\9&ihOLp|]ӢA AJK$}{]6q?6Ҥer= DeLu|r~wQ:Y>m̷ *1*"#@>隿v@ n%e#FQ͔H4HXGRۍa{;MdM^ L.# ›f3`==;`CvJ cs_gre 7Sw6 nsjSN rքwcFLWF0C^[, ~\kN@( wcKj/PL.Gn3_nDU%# !$Gf;fK̵٪GHGf'Gq{FU\c2]4(R& ?zE $M6d"A*GֿQWY9L0K'%],PSɻGDw~EHw550zS=%ٜ`+?;ڹJ/@B]iSrۦ\ߓC'(^D1%Κ@9E0|3G=AZNx\ 6JǤmt, l2A-FL+-$/;*QA&LWE2N? 7GmEFUS]C8q,;S u4~0Mdׂ+)Od虙2km8 I#f/ug9MaeHugn#Eɶ4\U~)>pvuO)}KcH!á K 76b+[zXL]mSUWކQ 'gմ,pRvRAxogw٬VI@B1ym3|3/|aF́u\"e}+씺Vؖ 7`eheYVX "YOEA퍔 ȼn$2 (ǵA gJ|9@*朾{}Y& }† y*ggp4"ڵxSW Jf cKl)wPGg"D ,ZXb4sr[7 sfdm6ӥ2 Y^D!f}Le^u3 ?tx [O![AJ9 u-EVWR訯};^zA^sTQsoY޸iKE&: zMPl|]%Y^08o`hU^POyI_ e_@ )x,u B;2Q֧αlŻ1].w3 `&'k8M7H&oU{ӷ %G)Y_֚{/ GG귄0Ҫkzt)ʲLCj9]Gi8d'y[mZ@)A\JذJR;@ mjˤ%A8|f:jsr?"@prrn9E%|#U}VqοXJZJk N7۟ s6Îv",q!{={hPD!zscfqnDu S 7?%4_FC&Egt2­Hҥ/󢲃ZNi{I:k11>%[~C*yǀE@AS{)ځ0fSӼWAD߉Acb)g}PYE`u^(J`YS&7y(CRCak#~ݐLyǩ e'XrR5*yH U&i]yl1g:qɲ n[jѲv 9`#n?1᐀^7#c^!>6XmKSvj)t-UT')37& 0ak/5d/MQRgpp.#(ըnDy{:KuZ NIKvüxxS&ߍܺցJ3]bN &ĩMe2p b5F2ӄOk‚Qofs4B`Q9%pjhJ@S놜3 ʉ45f \%LanLokUmw&Qyұ5K0^PK89b7#QY ɀabg^K5TJ%w&I\B&<ᚵo< sd]g/Mn6]Fhxޓ~HMל,RДhZq3vڢ 9~f*iŒ6^hpd1!Ht1l^eڥLeIԫtv' (gAXBDnm_=OYM"HrcೢZV=QHey O?ǚR jG]"N͍`kgG2z5Z1F!̲GM׆`d\9Zi(kR[4b۟*Y8r|g3J*-qn r28]^Lod*pDmcb=, 3`BS{5?; jV:Sta؍_Ig';Zl9=MU^|DqSQͮVׂw)2qCý;@f@^jX+1 8\-Q0824rgh'y ɠQaK efwA`>kӻI|(.D-וwS8/ۍ}+AT/>+/F7Bp>,I>6н. d}DD9U3=섆=,3KeE:g ʳМ) -{ :Ѷx B36qPDA1vz4`m6Ug:\JHgFT%uă1uL!X0p(]~S,C]Z 2j aO=+.dQwG z5,7lA-*&e戳)]ngCB;hz$;CKYyfyBYīzGig`#wֶx]}܃r Z\o)}3 ޭeKԑ"ٴ@"s xj/3}x'xo3C'w򞃗!ꡟ%]M>B-Y C:t) OQ%Mckq-xoiPXht7tY~YP`c >Nx l Lg4KoC6I1ELsudȢ ?ZEo Bh>ԘFUl=伀h.]u ~y ѝMڒ@jzj )-WCׇ:ID8u=qO|N!-D!u$#p#lE&6_b4fr7ՕԾw AFJzmf2y=I*JkroĆTǤz'KPm0Vo*!ي^v4YjB#j?kBYlg<,F6 67Mۢ7C@k^qY榦 XX젞V{HC|dw!ŧOB .NK`qkWME WbCg9eAO<{I,5b\e T?rɯw/fm%jw`/.oyys.M~ 4]Rc뛬mc<VOw.;D9NwɓyYݛyP mXm7@-#W(8ΕUǓ3~oR#6&j9X;!\2*/TdօU^(7ꖻC_pU"z#4; ,E@a6MAXIk@/Czmgu@(Rp`7{1?m4‘*#{H2 WkIJyGD0E\eV(DsgvB7H;^vT4tҸ6W:!'8H\EQ:DG[H's=vEK"Tz6fܤCkhc~T^{C7~&¼}tk&ҋe +FRRQ׎=YB9C ҜynJ54Uyse$Dl0 L].m5Ƌd{o><7 >O;8  Dqvy[="lF?GҘ$Hw!xsf-~}.V0 d[f}ØLw: ɊvY"$]uCtksRTXj\Ϊ}sHV`cQ`nc"Cbc, E! C&(U*-ny޲Zcځ7Cl:0:XR^*L4}ŽnեߜÎevdW2PJy;-C 94m)ܾM1 \I23X/ 41tٞ߻1oX~rPbXNNqVxwW  ol2. (?~u{&w=&Qa+N<ۍlK6L] S_d(g$My1˜e,$3{36CCbh}˾ јhYJ'\a,~\H&;>xgl>L(o7[JXcgw0G:؋Y6 `n -'Zuռ,9+斴Qaʊ56 ./@eYάu񿜞RhEt|,=ʃ~<'Y(IUŃpISh2s/{k= u)PMޱ̐Vv}P QA4 Ѥ'jӵ5BTUZcm8 PN&: Oz>ƒy!H@M$ϥz~v9!nGeđ-`&+m>F)AM"7"B5?N$h\g+LI#5Ĝ.!ofbPt/bw{ u*E 'V88r2zi0WVD$Q9yIHlc F+H? s$ߘL4ѭ[MðHZ[cU-i.XM԰zY?ueHfs[%/[ix)џ1^԰pm"LCit>@ ju׽uLᒵo6kQF"Yra [Ra!u67cK :QL[i|ɬ{S+W׎!O~F.Po !ex~ N[7P*MW2 J\]p5LN<rQqM(KkZ%<ƒ87//B&yUZŃIfO~2XZ)g N} j)+񵠸WZ3[>G>[,AIj~le?-de&Õ 9Ӹ]juJ[$φ&^&,@r-IX^mK$Iͱ@% OJp̤)dn9J2'?>rlzͬ>/xY7/:X)sh͞MK@tO >u(tJvޛF0ވ{aV"ru<= jZgL GjxK:,ŌV+M} xvث׏F{qNG/Cl+je0"b?)Mc %8 YP@륋 Z}FL h Cg#{rҀuݩ9ƽݥR Daa!OVuWFA|۩(qkGwQJB;'hWʟa%rqg{AHrG3H!X;3t k0@Z)kSDyxq@#!{|y20@="N\}!†Ƌ;OvCf.e=VϻeH1ӥip /m䢂KSC|^ԜBa՜]KPJ*@Hj!2h/хPaq"@n8ɌyR%@L{ &Oc!H=5jʳ,*DEj7nZtc3myOj.&c#?zoFn?Xm/ס<ޕoJ|̈}o]Sfdjć y`ԟ#E9 ,EƁm%FFϞя:@`Y<Ԙث$AN~Yk㶮3X :z2*Ah)&N;2@%_` kI&exKl$ %V$ * 5#;IE9LmFDk IYO~=M.MȈ:<%&"ўVԛOWScwu^wX{x X R) P=}J$J~r ULMQ3\.0!QeL†9hRSrr%J3c3.=O^B&>t!n5QzXh2jg̵7"8p-o1C 8n=u{8u X]u yGNm\œM}EU a+ZɌ :B$rɃ:$&5.(sm(q Gߩ4UKx9]RM<41J egė4M@+IVU0s*Ȍp=r5g_=[ƕ2qۅD!9d56iPMC\=1|1kwD۔-E46EAh |v-j!QWzK9*,/3/-[^cfͥGqWX9 |qr$*vkep)PB+KUSs*{l+\̸r}SD0Uo8@gFy*4j3!z)&3Jҋ-nmdt+.C`%1rBê?}tX8:ֵ@ )X^5$.,Ysf^IqQ9}69=U׉\)]k 9k߮B(̓*x~E<Ȯ̥L}4!P7o)BT$e6\aߜ "} ^+2v&PZ,dNWZ7Y[&5%K܀&z>i㌁z 3I}+o7&4jq$ jP*jeޚ8B3npd8wljȁ\ʑt8U8Ax4\}'Zr#VkCV]_+֏?E g" u pz =:(9zlaFxnT9:$5{D{*OzwQB>umyRèV2T0M߼1c49GvJ^t#VA]9vO|i䑎( Nl¤Yhq3]vME-\L|I#(cF.76 󚓏yq<)>le_.J n6xG|<;i K·wszG@HRSƅ^z;מǟ#"DɈ0%va;ygYfGh@[?4D0*>}'YuUx(\ٹBF+T }iqAbqCyGMWj,@j`\ HmkTs LUgu0EIG\aZC&SߒT,i"۟=$%vV-_*TM&!?sC{L#cS=2cIvڙzvu!뀲yQzq?tDIxg<*4 ~&CXtףOG<+-+G2WMTh\k.2TPiKL σt!?^8+>ZpbTvk/϶84mTYݖ}5e r4e6eeQLo՝8etQ/|'&yyDo~p2~mN̾;⹙wE ؼm6}soʲiV`5aZ uoz>ЫtNႯ\d1LSaz9ς'xnMoY[Ҟc tkءvED,q$pf \a5Џ l#d[HxyUz,+NM'X.+[6&OWQEܩ02d W9RDס!٥fVS~!tfNn5鵯%i"+b-~o8$(\goU뜮u/iUkmxPXLLś2fLQ5܃2UOJ3[Gyuʎ_ Z6>P^ڂ1L.P]6S<#EiHBQOs%+5]L_3ԖRAcS6}7׻dQW~=7 >^e+6wRN܏mՄ0>bcHwrv9I2<,b%OYg,h-Dr{(˄O4-Ǯr]A}߰$Խhbok cQaFP5@CٟwK;h|QU@OSJ_ˑ0rX&}x?FKdEut9laχbt fo$.ZC|6C @T8A1G~c>1!MHcԣŭ%]78\Q VUh O6(E[b9ѯ$!:ӣWfAQsW> wrOgM_Q^bJe6m7٩M;"m 7Gt3q'!j4Rxs@L/7v(yF-Ȏ*G5Q5Ҡv(N~ބwgUUlO)=g|ԙ_c ؟8Ǖy5LAQ@H=$c=f,J4o L!F K/PM0Dl]O 5/))ǛBYn>$\֝%1 sE }Vց,!.+F؏QBc%*8:=" r%Rݐ(Uq| Ujj*l/;Z r gclyf$Vm_]Pх-{H!v݆:ڞMqlI_ĶCբ%$Y Je.8yqRghsu邗UAW䑾#)1/#bBdFി;g^&@?6 {ٙ>i}ETPu:+ 1.X 6?f6ĿZ.ivš -SaI I̭hօr5y s3a1|**/qs6!8+AWyuVMGAtU5^|1~! _9½ ~?=F}kzXB0&rbC`ezuGj\-(25({~ǓcF `EaRVmvH\,?1RqoksYpUFuMjKd "A۾a4oNk}-)UkOދj2|t0IvdUO/#8"JGvbu ɨ zjů|t480~ ZN뚵 +dwoKP7T +V(jy,'ah0~o W^&FQGȤij*j+A @:09;ifRH,GpJw9ŵ _I|="Iuj('ۚ?XszHK( \4/_]RtLsRݘ8S㣖ޑAU+.Y 3Wؐf0='j.k_iԣcbr!=K8u oO+iQc})nTU+׃MW[KQR=)&Hq` S3f8Z#K2Kg } B)>G(.Q2WWJs%rǿS+pӤ@9iH[*>c vk > OqC4~fgM~vٺ7 -bИaY&*1Ee3GK. ؐ-ƭ}.^g 4saSB^M\!u6 L2&ds~@dKA֬)vC򮌇 zE|?a xD!\cϣX|v1n?lw-&r$24 , G!KP((GA׬nmgb3\:vjފG)EQV =9B,YNX5qɝ˫`թ} ^DM?8 >){(%Yر]b ŤnؠɳQAHgQ{9 L/[;mOs_H̖C fɲ?Y X Մڽ!aCLy`~ ,Č"s)vgo) I>>LahʲrVHpNc|cYȨ߲p틁QJWo y@&[1x| Q]e" K48m53t%&p$O|l3вkYZ6@.u `XMĪQE&$gפeԻrE|Afe5be,vn!3@ЬbwdF/=fn"~5K|:y4Qȁ!-ӬM䛄g}Ռ!ިi3$D:5x *gs'!N#5rU'@{z47K9VaЃ|3Ey#LDqY u)wqǙe'2Iǯ3\x<< ==6ɼ g(z,r횘W׬XTUl]"Gz_@\]r ` FGΥ5N ĬH#`$2I-N1gsn+КϣLu62;0VDdz}ƙCJ\̹ҡi]a@8E&jw7)ǣ|5i Сxη ۗ}ąKhkMzUm9kz JݹOD6[CȎlu* zj%@Y)<#CJX4PDg(UsQV"Z`?`BNӏ92-}QÐw=6Ȧ.S2ѪX KwaPg!:i ZuH9ݶ91mK&&lk;z'ؼVh8L Ut)갃RG3_EѮ+'!h%ʒ&Z;Tv#\:7u+DQXMh e@:&2Cm:,.NQvp^<?ZlfVa-hjB'60a5χ_\D~Np=]J63ǻ#g]+t"~{"`B6˫e@0/A:g޾ǩ%hѷbJw~}tQ?m+k*>c|SSXhe}2?XGz2T1J E:P@S,15~&W6A Zdp6v8/cGJ@ 'Б~!hh=3]=[`TyG鈦@5յ簯yii(̀n.Í6/ cg)O4p?A,<utznTsT-(;Aw7^d"Ps^oWŵye<f[,!tڐpJ3WϷ_21Do>>tzT$!%,P%4/8$tt@tؒHj8#{Gbģ}fL~oKfu'5_+ጓ!wK2rj .Z˝ؿKRpEVxH)a[;Ӷ%9' ϽpNdDAlsjmJ97*Pb.龇9?CK ު1DB𔋛*48oZ7"l{LƓwÇ 1M8(#L4U1FnCŴ %x3X,9`Qk5c rB%bω<""%$MDɽFϧ/.ߒob,͒g-91)ܝmiX-\ഭYɧ54vTq ؚV643 gcy#lɲeqsDL?CFC-댂Ԝfnc pA? [?cE,QJB hQ0N-%G&u&aFMd$YswmSNcAtJS0bȫ2ЗwHl\|[,ѬDy./4߂W$J w?]}#'XGx!o©E_G3lQuJY!nqlDSenYO8м;(vu?]6bK2m3%A z{Ղ/o|cKbC&FfR ϋܬ֬ثH`Q#po iG~8u@oqQuO |XP\fԻ>%}XNW\,؞,?PHꉇbvmt '4Fl}8xX H5gӷ>G~lD.;'lQ mB}gsf 53 2 6'  s̶bu[c08 g *|_)om[cHzv4?qp0Yic HԂmnBBpI.ʪOώo~o6X$؟ D\P ԅe$4 ͒8b+ K߃ѵCŎS 6n H՚͕ΐ Dvog.\ڽ#:-RW\w/w|{YZlܛr ̐Jݧ֋KB6: %3RyFVI 67U&ȣ71m>DMk ;[O}rNK=ǐn9#0~2=K7t=KVָFS_EdC.^Yt !Nud_HBRY |%d>*0skrkg&+$>A#Mk!>y2!?1$?ҡ#!ð7%';6 8<v[693WR5x̃,FJxʻO -UМhtRꌷaIsJzbKv4Gh7-fܟp?u.װb< )z5ibL[4&ؖmۋYz8A^HIo ؍g&aýxc+,ʅzu0dmd{{>4VaG0{R&. =thCw]J׺^(Z|NkʶTT0\H'ut:(0K+xO3-jb' 5%]%,J-d>b,'u&D]\[&͔*FiZGͤW~U18@J5AJŋ3OPZ*6F6wZB(am:7#f4,ڳ#J.Dg:ú+gPw!uF Jo,lC( p.P%!mi |Ս0=q9_:|`R^k)pl@ i~ܵ"wT2'#)Yغ7vwLPQ7;wHĤ'\_\2DSA))8 BK53c 6Z&베|,P~0%#iey QFrYf!-;?㈀@-ܒ.  '(t:ٛk=,3k"TCRT)ulSU7kg'P:8hfkAS܃Mih&h>_q' mȶ !d0^"atߜþ?lU1d3#t|7{1;29c.MP|@v*G\xO>𔍑8%_9 7aH^Hx'6ԴϺT ƄDyHH/  )e,3?rdzem.E%* O Cq] @_$wTg(qZQ7W,ps_bW3|\Z%]آV>Ccojy: l - JdƱBDRsK@2 )'"kvQnrMx!+_ME= eQO] ևxOڅ4VJ>̰P([2DK.6 Ϗ8Oetj$DN:}:ϒq%‘ߧ&c8HG!RBUbC)(yyԿ0[vZ ABd~7]?U2C*J6-|Ie/kB4vvz*љG5CPK5sGiT"a+/XX"I=UՃ^FhKM1\jR9_.du|qy=(pDVy"!x̧)G1Tdӈ. "0>'obLbjgWf竊JiYtLe6w 堼}MOJ^=>-A  0W GkD}$򭋳`ڒzd#Y^?tss"ڑHBnctE_RMj`J4OwО&Ik UՏl"P3„dx[,9ݭvIvhL .̱n47Zv+k1\tԇk垕} >`;!U3y亝$ '\Χ]0/dBHSȿF]0}BiS4l 4 +l7WxP\J7aq&L^EMQf>Rfqg~ɇ"~-kL|d9 &//eN3ڠ:twbVɓ4ϿW+t64I^1~dWzـ\Lq>#;ûޱI!ڜ-椣zW970\ҹ n/^oO^hCMWm a.\2{y }P5L*w>֋1_i;Q dゔJEVhnĬ's; *`MA|^ݠ,ް1GZr2.4Π/xUajQ35sV& +ް`*pimJ6Q(QܤA+cmva+s,$M؜!G|Zu0 u,~V5۫€ _4Cۑw]Dd3%n VOT98(>SU`EzN1㕜X5W yk 1a?]OBgzOzc@5+2i`j Q 2)@\IAsŃ P3sDr J:݋kGqw| o`$1ݟ- ư5mnIgfvͮIdX|o|( U}vRH_ϫ?-Mr?tY2jo\av]TN6oe^ToysVv`a61Bq~6ƧPpU|3tfܯ~&;ZLؗE"s`y ſZZX7bdx%К| S~ڹ1b[g|)(hs*밀PBpc ؄hCOsܵ`AZ7hͽgǿ Ջָe D! ;)k n\Y6BJL?}n|m~1ÁYeOZKL*V ,ChђJC &gZD'nm``#;ݴvptMi On}A# GKcU mz-w]9^vpVc{0T,aI HU"polC5@>h#7Ddnߞ5 D5PAZkmܨ+& O"E9[S lk ܚIU&@hߍxR0%S*L"G&v#Wӗσ}fwt-vu5oR }z*BvXB?tk5>%݊ 9j1*=\n3 PUQ.I] NYAaJ#Ern ɳ沔b̉,LLu7L%gaP9Wb?z{0z *cZS<<^,+(xdR :W%f57Nmq6:'g/ oj8LÇ%$92eY^W.-]jX+v:ܟP@~0 ,AyNc䏌SpJH!VQ= l $ S'7`ʶ<&5YøY]}tLJ.8XѽG0zTYB͒0J(Bf(D>"P7Ǎ?g/~*\X&@Å] >RCTA(xf'Lldz`, j ?E1-̶uO%sΖK`ryI+Gƣj i+>p I0v2ȫ=p{?݉0Ix`aPBgBhREKl Ɯz7kSb[?sjQunɷo,&xW3vIe|wb>||LJkeN VŜłr0 … :M9+ͦg^b:#Z# Nl#g}DabI8 + #d^|N^R$ED|= 3Gca9UgP%]tӯؕ0(BNǎ$`ABlT§{mxNtaH5tR5&@ U+ѱѾθ0gB d^iVh!k =o" '(ɨR4< zCn0 @ X˄|8HYv )?KlXX-KNꘛY5EO͸~4-;YO*~DT74}1^$'#+3re pj%K_!esEK@S=mTo} q4Fbn FPKK y_UL([g 3[E 1__qB }Ns]#]]*Z@S0 cvPM"^G~}Aa."pNhZISvt &7~1e!\J\rtgtICAx>d ӀB8҂; f4J=x*^F6LZq P)yOʜyRW>Oq,}TVnpdkNz_^ś }AOgRf0憎[ACuX&^G `r ES&|CV:Rv9 ="#J.93TҊov,f{BErΆդDA?AO"~YO͸ܗyz^N.}e$-=Q_C+ƘX.d}d qb9ο'R!<CG K)2~-lʣR  I_XZM(_6'xGiy(2rI]WU#YUA"i(4(b>8t;]RH-,பsGVC (CBnLx-Xܥ5W<^C>% ktHF ʒ ]jGD<_p<KCEJ$A:Q_'ݵcObSJ=9^br@]!{!ħ_B@̤xj#Q}'W)4obEFzqA=^!.9f(}v g ߄T֝ 'ѮVei @jeWMX{̝jZml{`E')\M"U@>CӽY!N6lZ_}A@bO gLK厖J{ጰ ᰞ{J,AMJbs=vӘaZR~Ϥ ,E9Dm[XqS\]4 iHE6'}:CSqS*0Bha{㱄LJ 4y(hGp>hoa #P1Y,!jY7 |{J wb~@;^HRCafB74 NL筘@ 4.[Yr` Mw rV^(b 1[z|Պ Ȓh8,xLo>->DNDĻܥʗIH2>&x-֪K=:e'q))v6Qkiv~+]rrZ,2ɺ~p;߃l}ğpJղy7;P'V0NZ]z6xG ɸuse ~b(t6 I713Wz`I9)It3'A ͽ +Nxp[P^҃W܆AQ|$VggFnsOg E"iC]}$Y68@CiPCz.J4tZ}>ڦi\˦D! Bf=Z;jxNuna QOS0 g?[bϿ;'V rv]T}.-irv86 vz>)|D&r~O~%1ԼwTl, PUw`(qAG}[ljz%Maj_̊j" Tz,w>/$oIHŊ47|#aFrfϐ(>]H=BwYr:*ёspm'<6'D_#6,6~%sĉw{) )WPw@K’C>^LvBcRmrce^=$# %8Pf]!z@x#͛a1pX-h<.Ϝ|Hد.~`(+ﵐ+*p=2E㴷"!".^!$iߘ&܄ЇyHXGT>tUO'9^biZ "y%kZ̧M;M/w] =zsW{n嶥< NBcBv `@rP-in3T62Bai SLY8]D#";Mb j<:9}C0ct!i=ֹUs2 &SriCEe+tk+fJ6X#>р<:t򣙉+<1Ƭ䏇N*hѱ)5aM m>կUK/]rmf䎊2TkP$nɳ4!cBa-5[[V&-'rs9e~.TL0+T KnɜipLeIk';ӹ|~'G!j=Eq/Û 7CK*#xq6rd1+Q6Jh* x~D͈E@P!7 Ю*sD\㻴xoD7U.n6\2]0o6/q $5,t\v˳W)V!O~H;4^ed +4 Cݦ9'U$ u5(Xm5(y8 ޭ6,YۚRWPg2)Ab=^亩q5t|qrJ-;n n'De-yaÚ{`nv, U\BL߸O]ۘCF˦r }*1x#JWHQ==g]mu1~Gb/<#(K{-Xl}UYq4S/`4J"t&QWCO,e)浌u6LƎzw@A7ϋ5tڜKƜ[7wkISY?n$_j#>re&b8f@? lvJ2̮sgѲ RR2ik{GjBT4186r-tqdɊPF!GJfI@BAa,6e,|,KT=> ^x փpb v[vC0y "ڗ!kx6ڳ]әβz)T` m^:j`"ŵ*v0iPŕ9gx^s̫t,$J ?E>Ÿ 3&Oa-* Z:WbZM!}#R `r}_+6xG|grזVQ#(~tYX;x`DŽqrclȄI V?՗[qf|PDokL^7'E ygaDyj0L:q6Ceڥ~)7ˀʈe@DS/Y kc$kA4ӌREG˒q1P} (<ي2س0=5J- 2ԵYeb=yǺ$:Yd1΁C877MK&Y4SB IEFc& 2ir!՗D1&8CHCSF|g ;K[`5 ԊHҀ*Wɯ Ac [c"Y^_v&[74 U' 3x jǫ6I?g׃i95iʿ#r}U"jh s/7~!v]K} X:d@ `ph֋ l[Δpl>%ots|#!Bz5er MͪVa^!OP0!5ϨaOLbFkb'il/G{\g$(hL؈nWmk,D%/XZJ|g-E&d+Gs6"sGa`ҢpvPn?Țs\j7gXGdfqB^ &#9`+`YJك) rG_ خty^_Bfᮐ {fG7ۢ̽6[oqV_GhdQX҇YÚ_yKS xǚFyr1Q})2 .` `Ɓ%:FON qpYsX@/x#(w џ+e> z29SS04.xϤ;":Ԋ@Ƞ%sG9 g@$rG.Viڸ®-}]~&]霵wtg58cLڻQ8C|1JLϑH@)M` e +Pc8]E{5RBl~ FTb&CA9dλ@@b3:I/Ks5-I FFC^ݮ0*6̷N4.$y?s 8,XUQL"60R߶.COi*x줩Shv%櫝θQw_`5ȜWI𝯌&*z" nCsKJlwO6amjы4.˴R %)>ԂF%.!n=77Oc+ş4+fvū?>a^u;YWȢf]BdrCZvz8z*J8(Upy|Y>}3eB\if52ؿVCt@R\e+x6t06ЍyZ k4;EN!ۙ/m*UY)5ck{':w}wK5"RB/tJX\Ȅ\6!^ raES잵ڸiȽX'`82Y\@3dU3΄? E i:'3i/5ŪS͍kCiYgLƼp?X*X׷fÕhb"(}2%aZ 7UwpɃ:, X 29#odQfsᐍ,@ [hby |v" ީ۲+!EŎ1RZNP.U,eyZ_(RCAU넞#ʯT(KGA ^ɟGRAs2Ҡto8(vFl^܅hܢzO:0B^SxOIYC)g/vo6/? ]EJ$-}/`M{c 0Vk0|}9ԇd&)1>)>❿YQ5n|=vC*}nnSHu0Su<%fETj{E,AUt8 z>}V8 #&vL&{W$CrMQ69$ e' p Q9+>edX!d%wBC.3̱-%:'~l_ό W|mHv@[q̂)\К}ړUJ*ƌ mN"amHflg"y:".OA?[fsfϸ m. VHxHVc 5>P)iHlICFOC!S%xrKR aG]Еr8j8;79=5Fi:3#`Zյ'~TI"B/ L2/[ G9RQr:ؒXn?ɥG@LuaUvg@䖻BFJxj dYm7rx<ƾqd^k#v5ܸa%ـxk/Q@ϲ?4i瑆hޟ$ዎG^~vYVFb1"ey6%w.~~Z.=+s1q#b9,:omV"f.fynPT¨,D =;hM밌"mJX b{qpoLD&[OΈ tLrT̴iH3"D‹+oo3s sWΏa}V0 (h ̀ESPIt|&Nif:2 u-D^`2iD&$;MРWe nI9/o 6x=4b]$Gý -,J/"p ۠~AvNSEx7ulNt}斵R2=f.ł7:^*tDZ@sxMkr(~xa\ *́:U[k^\l-xP42:Ԉ($Z(hc,cV>4sJT?8aK1H C c赧\M3 W."~z,iPܮ7P1ۛGoRi 2sɴ4 p= dh[R3Il0n67_`<y{NFFTW5yz1ۙ[k zm,ҲMWc1rdCs~Y:ӗ`a\7c&lS(OFs@1 pM(K98mx %0" Wu[Unhp~1]MAwY[l.n.+O10ye #Ǖ%D1x:]gIvZ )!(5+"ҡNδ݊s4/1@QE[X糍ƾ?: /X#ƒ? !u3GJ(n@S2pSho ֳ4m)y<9] ΕoІ׫Y#; E70C̓|Z9S!(K öI=mm ˁ/x,+˥rH2Ǚغp=YsD UU[]_Ө9&=VF'cAFښj -֋itOl0߬;HWV[/D#>)pt"zN [(PS/:8z  >@۸TH1>8An^] 7nVV ,؈纞s?{+fy05 CO) ơ,< 1I`5|/2oVDXd%H|=ȯS3pkL#T x{^ok' ݋œdZ$+cx΁W u1V.TLw=pC%6>Z*D0`}0%"RDg\:r?E $ M8O(GUzv; ? yYaqCNvrFq١SorTkhpDMG6!9ByǒsL]ODX9eHW;Y #~ֺSxU'`]q鋱gHV V-؂ 9-!qXّ=X 'Ju}nAͯͅh^#@*MJca$^87x?XPCLi=Ŧ!/]!$o @}U9PC]:A@A,I>H;_S 3FP4+5T{{:N#%8b _ l(LnZ!Cʷ-Zƹ-~ )6~ Y4B1%ͯڮ ʑeW/B$T=B$&kEɮ`Mٿ A\5EpT)3J>xiqBҏ퉿d .-=ɕ]C5s#V-q QMxf:fk5 Qy@I.A=|i"P3%x9ۍj?\K Z>DٺltБ!{x"]fbIZ@Ci*9y#w] ~(xI ʰ*TOh2Qˋ;^^m||xDRJ`՘_B1>'%ue^C྆8uqצF F|#u 2eŚ@_:G_"3"B)-'Aȫ kE0iR5BԹ- lG*/&mzGb| | jx`$эZ]T0K}~Xx";NiS{ۖg%Z[-Ĥp/óGqGDڙcZIgl:V۵j#"h)dL"r]"e@J+,ߕpSXL xf*ѳe%#G*HZOg1X2=_HwCw-W\Up,xXfp:xh " ;a3#?Hwb?Urq˞R*JHBV:,jDV]M|]_,ǐ Q6g#6!(vîjisff^{\pMˎ3=J |A|TaO `tSNՊ##ybæA:'hWO^uNq6[lk2nkNS{3,rĐ=v \&,\LSǐzDo.ZQmk/wSٞI8 U+lE8Aڧvp8&iCϛmcK􈿏Kѝ\mv ~q$wLv j[m{an$̬r&$]o LXH{(5/l\ o Tin`!Z[CA( X[x# |7(XdXs"ٵ`N}Z# 3{64q 0/Tm#r]N0`>jPƟ̏EUMͮU"aF*Zh&S; _K XH C~slm5"_`DZo\9TZ}I+H:8ߖ5.v$b}WV鏪4L;W|w=ftK'soRGYڴ䚪}4#Ϲ+arG.0L:FП:m_'L=O;@R]s |<Deu-ܠ5']oÞ/'&9Ӯo.JY_kC6,eiK-"?z7AAkmS;Qg'jծB"T:2[;y#xI-$V^H"ĞU_ {˝N36fr4 *=+UQWT#")amS?PoyeE} Z+fo7EOe^r`Ǐi7PfV:QDp){`5#C).֓{.O% a^ گüVc_ދ)WpFcoRN]ҩjѡ+qBJp pL~N tK$]xbr b}ULtфjTp 8f2G7U)8оP8 ϩzʤ~Vh%ʧ0~bJ1׉j??;h"q>K9v9zӊM_ӗf$H?AX@岴OMd+U_6t}AHDYqWa149^Ω b d}Ch$q3tPf2F8iy,/mȨ2?щ'Cv嘬miSu_d ѽNUC1LL[Fq-*IƜ!1t]q6d+*зIlQt4n+7~rX#ք I&E$5FAskųH"U_$jw\6~m (m, lJ?VDE~ѝ@ ٬/zUHZ$2- <_lRҰ@*[a$n%AR J~ӌ(#qޡ6Zng[GM@>FkqhM/,io ©f:DHh[>Pkh+JER,1Hw )z=>>U69!:ai{$*-4I΁3kZ[R3̄J]'t&رLTN2By`Zvqʻ,K -Χ?>{vp-ʘ^B,` =W)8vȭA#b%io5%ّ4)k? oHFF2M2]&)/Oz6t[Ox> { ケlSec>Ҧ 8ZڞfD{AMRyD[H\=4юf 6(:dN;Lo7ӽs2PZISf&|ݨR 5J'|v54꟟-ʿ * [:crq Mwv^gV'qIj͗ A권\â*pDFL{qgIי,]ت(:8ɇ6QHF(`sgAW;mN $)GwmD[%o;zH'h˴#bCuBr:VCq07 seUSǥ-PB+>aԆ8tBc`u5bpPbuuM O#ggj<նRHifXPJ׊dnT[;=]7tiR#žArWrO!k~ʏ )`GK9dFvF0 5VֳVabϋcgwXtk) haxySe2޵?9Zi̢JKn3yl/3u?vTwF9w5 Z!@S R㸓7kBo ?44:[Ͷ)0-/{I)VԊ0+ Gѧ S a[D_a+@6"2Y4YG)JQ)_r%PFR*|S cawaoeaLôtϐR bN{G-7J;$l OޭYTMA~*hG9WYmI ánAK ZY>az0*LMR/HdC{BT*3i.dPf7`{uU ̞y 8@}6kkgM6)ϳY".ζ{]7d$HyM7;PNoΛ͉G"h+a+'qu‾HmnNs]㍁( T[r y+m yD[E̠0-6Y5zWg,"OWQ?!F[\mcYT5KZ}Z=S$܅bpЫpu4\4Uΐ#8^dwYJ\ 8G̈ Gk9^V !ˠ^< ud74U8&Ն%5RRhcK+RUnUqK !P'TZW4$>w|l>z:y(#~V,d⳧ t$M̑L桹^e@n-yL, ;!ڍjWvP*>AYct7 g<=FZugE(ğb8HK}&*k'ܾ^a!8 z!>) gY~] ^ Z0*,JDGaļN@ƺJ`Y衆R5g xZ [Yg='z%V/u3؞+!9XuB&IuJIhǂ㡈mc{ nbi>,t=Q\Y1R[Ȯ 0p6S}{!#L"R$QW!V0iݷ..yФ] ӱ_L^%qsTW&>Lx owV4TIWY&ޯkkq @/V5׳`1mnGWP$!!,Fi8$]QE1/W•śT`\U,W& mT6 J^tS` [ҘM[<#̂H"~^rtv킚~)cw,BY*"߅EeeI{tsl.A^St?zsNCGP!*6 D<9Zu%TLt"5"1KKk;eP];cG5p{`7xّ9AI-`($UaVBE{VɶTg~Z>D Q?O'㊍~{ρ1dP|~ͅ4*CbݦKPpԌU\,^O:2IlFJ`b㡁DTchr3Nf uVCfN2h[Y"bFvq!%ͺeYA9esGhpٴPfB ]"mN-?FJL7- Bxف'Yl]g*Xޢ{<7[@8c3~C;,xI>T[# ^j"#NuxFODC 2'g0!~يW}GLb5h}8Q\񲇍NT!xzcL4g˿4p8tx *0;(ڟHMytzZ' Ci5PNod0vvH?²t,H(uFM-cUYees/ W>|EcJvYkjh%2Djmwᕨ=;yu9dvY!'otG ی^7A_sh fh>w5W82F.UVtQ\\r]YJ e wχALJg@J:⪈W=%dV2mn t eڱRԋ(L#lzY?wG g; ! ob*/X Lr0p]7jm0X \~B0@pݹy@r T!9 ,^b^n|&xQ!Y8IY+c]wgEDLϩY\Yp VmҤ/0ĜJ 㚤qY gy,:ix.ȐuaβZj\/獨(b?~ _Qnџ-fD\U-4c"\VֶZ)+>$!?N(_i&Vlp6 zRc]ڝV #:~^ =pPF y܇~uSBvbY:O[Xr0Wu$A5-=DLnF/TuY02iqq8uz4Op)QOn&d3 ϐ_灱ݦ $PgUM~0յ7LԶX1Pgӯm`>ur'ccخ'5NP-yɂs5yے('X>n;Vڞ O% =@K؝zYԻbVr nTa~Geh 6wC꧘mG6Cɯ"].slFm&pVrc:/3dVn1VWm!R5}Z^˗)l}.Y֍wz:Ȯ4x|&ݺI~ϲ*i2r纚2/Wm0ȋ;MLZD+t\&ըZ|nMY 86<3ڝK|ʻzQ5'E#2A]ju! ^ OYLOW129qggGVpdHwܘ619Dxu=!@ط QTq`EQ7Q 0·Jُޅh?u$wM0SlASNIJ qO6$UB@|Dgn?ҷ`z%<(4@w>Z'j1("ԁ_A2t{OS(ڦoGߚ{qÔ;q7]9S!uPHDkRvxq^Y›a ~t;< D>ELVSҩ2d7Ji`D>m#.3 KM-@ebv3Km>8-tfHeACN1LL(!tj7|,ZoЛXž`FX %}>(]uhģ t= E6Rh7{f-Msb9nGX 8tyIS$Gy&Q(w1xĢ+"7(p&ZO̱va=fw[l@.kUK!DS JpIߖW}38qq\D@a݋ilJXD;rQK5 o$XgMl)H2f0u }tD5ϔu0zHG0n=kh۾MD'XEi2g|W[)-ៃp2ox\h̬x,kDZ|mgvJZY\f^'wb}q,78>w=j.Q8SŻ͢?yۛj421_yՐgvEEw'Y%89Nˆe5ymStӤo84\;vFV01eh,DĞ;S_ۥIN#)F Bl5E{<F #*qdt!U'̭T[D QQejzm\MF0-<;G]&<aq]KgI"FZ$ckXG*Q?UΝ,w)s9AGD6\Id߼l̞4Ydp":E^XxAxгjNbn-,83 N%Q e/Bm/-֯HEa:,=A"ۙPdE6pl1L68GXU7&gR V?mV;$TTPzrӢƒՓU":CtnB=d_CZO#y]oh\0N<C?VKNe{t5{[6r>[iOŒx~Me㉷nKxBwc#<:ƃ!.5 ~XElMD"̯_& `H5DVg3f@)O+xBpvvErh'48S 6,?\B7Ӻl_#Hk_f!E1p>uYsDL#1w*}_IƲLVt^[cCE5JX= rw5qY9֩a,$#2_8?dnCkAYݻ #EQ8H$:XC Y_X Nˣi7k 2m5)[IkIJ(nHpʼnafsuF O2Qd@+<7UZ1/=?b`9Dd-IL2fG<'0 ́hca\ը΁UںT=|bgD !&kqG)@._¼8 7ح ίAESr-<슾yF%O`O~Bʁ|6)v Uc!"]cf_[e?Hvv+^y#>_O_[dlRʘ3ڞX]KKݞBYVeMQݑf)":@ma$-K)c%Ȗ#4XR4XV<w?.s2Lg`(Ir*O&?\ҽ5{oIa͉ĬEK#Fml5?db*dR,-kiPlthe hbr%vƻY +8o`j/hX>ztzyhC[ 0.ZS>2{ك=6m"r#\\gQ( $΁?`HYS5MͥlJSB ?Fwq_ƘU_")*!ȸԒ5|0{JrӞͰ/:n9P÷|{޺Eكf4 MD:wA}Pf4w Sz֮-%D4%N\j"Iѩdex=(gSg_);k{*<88ym, ,+^im/_v BϥMSڍ$J]SX_HiNE>o\&K:MEzD&bkSfY1- af_Ӥ3OuxzH8(ZA_Q'Ǿƃx{\QxCΛ#aʧ*\ý3[ "w5'F0a틋=e_ ׬H˴(:CZvGV r;Po[eIe.u?{rhD]!}m_Q_6?D\4%GpF9(Hvc)ReT‰6=&zqd r,\zIuIlcpe2f''Wl/xjP/ƸcM =3/ͅ1Ov8 ;Bpc]tPq-SylV7d1`nBЩC]"\Xڑrc 4V(+ى dx [zʎUrԶ:d =(yTS:KdmzNKE)=/$A,qHUwnclVv:EG{b>:_v2ZЄ5I)@&1O_DS]XCnrt+Bkuk9>crv͹ΨRGhN>‰*#'sm1l>^#a<-_#h<C1C-zibRoDh׶W{/r6כ2H ;}XO?E)daZU_7`u6W5Z/?&(mK U+/&!<ިxTRA;*3sF"p)6o:S tbF0/ d@ԸdL|›}.AHR]CĬKޢLn2?芃}ư!Yþ-y~m<:r|xE,:{m6Єɐ`*c4lNt:4^N%dQ ;` .H~6e&z船g%͔1 ޝ{O^&u> J,D YMz5P*rIAN6d0nK Z|S "C@xYӪ+*LSی'd>$ؕfW0"*&K)E;l1GVSGuߡE9Þl_o.)3-9/='uwk.`"Fi;: @URKi$BYl81BˌQτl>=< Ab}y|fȁ~H*vXU,P7P_Q>: )JZDN0j%%Wݣ]_[r ]Q6\lM3>1{_CT#&냙KD, ӞyM)(ai>F@DpoՈ:w<[;Ёi<-8zDr!"nɡ  ;ː_BMzAUy`K06 鸼 qѣ-=и=D (w 9MK4z)^UAdC`X8pof;/a)nɁ&֠ǰͶ`6Nʷ7C=T@UBBrm 43X,3+#١2+4^l Lׂh:y`wcf,}B{P^Y<'PZBU>bx}6xgX ,N'yү{_Du S9! QF)@B,2|s2 \E1 >b۳TFphTo=(=cX{ VqAo|Cؕ%S:6j( p:{ ơ obaV&zA^ݦԏ5㔭J?yeJ}L-# zC܆%"}6[ȅ C`sޢ=XQ*7o\*a=W=a[Fׂ:!YX%/%q iFL͡";kB{t27O@p$䛞HGz'tG+XjTL7biCQ-t'A KQF/~0YxLXcs@ xlj:b`'2\YX)=̏˫ĝbLG6}RNsʗd@_ñ!ﶾHɯS[Cx*$$hXBbb$9W0o>]NٟҖTRq? -;10 ,$Uŗu^J"e`v)Al4W\h㧔兌3*f._qʏ8\#3d)ݕ3L-m%'Ȓf?Nど31[zs]~eXl_8jqh۪xglgBuI}Y*=vVM/2R36a 6b|۳Diq a=c $s^4v^2 /qnef^oQ Y+EYW\|U.TGeh 9].C-xLJ?sƤ1$鵧7G|]M07MB=XyFMF0b/Y~=2XկyHf'sF{BH⦐tb']0/m\nm7P5kH7(XsHi8炷,$ҕVb#.j=9]9St;S1eYhFZ7x|T mYqr/Q=y8#(YىusGŸgx )(:8vUo28 Kx4KJYgC->3mpE55Nt80VQ)~9l-k J0nTΨ<;3IBAItzvLXhVtppЩPs͛oe} PƠ/eGijM!̿sCImpDۯ=IM\qP"rАcg}8.w@ x°,n Q}V'p`70B-gGfUr2'pooqL 2b< >f'sy۵pɟ [EA'!kc$Φ_޽:/:Kfҏ#L:VuĖO/Gs%9dkyJjk[]vkTuQ_XdO8j 5KƜr(8TJn@hp1ža#" @Ivh)NhN-5S8+ᦏ-҆y ۀ ȏ#8 wF}h@Q *ɟ2;lYv#t'&p)#F`a y)TN) ۨR3.DL0&`Q}*+`b^W1kJW EU:w}jewЕct_E3h+-bV]I Ŋe%FO|_=Y PniN!eqfvBc^N- WN`U'H>#uþ^[?V*/YEڶ/VOK;RUϴ3ėa r1TsG$' I7AwZwW9޴p{:F$Dc"/z=%׾]] ںpJqi.8`xfDZ w6q e/Ov] mL!5.:P- Q88a # 15 (Yo7_Nш5M`O{1m&(z҇2zGBat~޴Go>D#|ipn P qPۄYka;&{r[\xBt˔,E7-J剰xXm12k/c̲ۤ kq[=p&\\MĨkNMj nW#O5ѰFϳf]fS!Ib-^LR;{J"x&Q_B5 <`J<==ms&穈q*h|ѫڈvėゖY8>5HD M)3_<3QƙWDa;=jzJcRڜ.,Iga7Yʌd`grĶgELxEr'@k[XD |tyM9U8{J%/gzOJ#ۘYf驪Fݽ8vb+\X <4r'0?=րYޕ/}TK? ݫNBFh9$P<ѹIk#oE&EJ|l)E!+ >&9%ԇv>t##ͨD3VMr`#\NG X2G]+pO3b7xz&Ƃ4d@r:g/ޥQŘ3wjL,_&hSG,`y*F}oO7]^ ;Od: +mXi߿2"j=^Cux>qUZXlP9\Ǻ>cpxڸ`'l[oljb?FNuLVaZOr`T5U̚újO+ia/K&7LoK :3W$V_Baơ-ضD[(v+Ǐ5z@)4ONDu>j,LpQe'Y6&njjET%ࡐoXFUfs +55Bbi߯O]g_!ίAq̈́op_53!ӣs^7;HkJ+$XX) pqIPp U,)SUk_a@fUeʽ j˞Ba̵yTc0KbX룛}M[A5T t[9$F]2GXdhzml7G,"+c~L<̹$`';sa-υ?V *d:ƦFaPm֦ʜVCKewl7b=W5%MY%Cƍ6uQ֐/r|*`G?kHccT`*㇑Z߮]|^ n :094a^vtGEpaKa&{iƕȊT^TeL_b+Eem49hYD[Q ɫ u%n62ȐK0awfkgmyRsPc쥙ȖB\(w-,bYGB`{_#-G6uGp־׀!$|&ߔ#\Moh2O%X:Ξ)rmp3#0ԵXo$M;yv zH, Q,L>b\C%l/ZE)״bn4f^9vjG$3zH0k\tUF@⶯=a9*0D6ntq;9J3d+Q|Cv/G0?T US *s%Y^jwW9k#3ߗs/ 6BDn]T(_ԂtFA7*(J6/$-Z5_^;z1s%џs<& e) E! xc8ږ/|(j$o:Ѧw"@?q=0 nJcFGMxctA țU9-@򰩄u%6^ɍJH)SQݮ,s03h% t& uDp/Fk<W0<c]Xُb)O߫\϶osA«OmuCv4`$JN;ַ']ХD)i.uAK7x1 [Y] J__nLbHTVM6-BS%O ~"!e^ZE}2+{"b=\2-|$VN"JCN+1P03aZ o&7?¦mjRTFܫ=B{*E+#vrRy;8mS?͝>e +`Dߤ >.!xh WxJ]|V 7"OI{Ik?CpʜJ .[??+5Oߐyt*7,W4#-k,al 9hȕhԬ—35Iwąhf:;\({~[eHK90V6Wxesqа1jZU90{pbq JE>_#?",l:BBK:WbdUB/0&v!'fƫY]*^.ƿ1r0|%zH/| 8?X24U<=ad^ï+ex]N)SREa7,kt4R~onT⯽(V{E@~!J?xrLMzχJ.F1y 60-Al 9.dSr+j^*Xs5}rEY<;*qƺ*("u#/\.)`'K΀Vx-AS9"ڨG_4%*KY261 4YXm3z_hXVbuqȦX[WGO.ܶپCL|~c[!,~K+Oc! #I,'=K*ʸ\Qfg: Lyg>~sJk[TT^DDbcFB_%"-_McDZ:rgK@"qJR:]mg)!{Xo3N\\Pב_ƲYܞRh~w0g<*>v rj#n?]㒙MMyT<"X8^O_!}fHfwN _wI҄b?@iM/`i!u:2"$O>8h ˚Wŀs!xC'xC71q͂-oyuSES 80^븷K\ 7@[R/Hd+Ɉ(#%6h;iE1ek [Oޝ HNe"zQ M2\I ȟ~ '&ZUQ夔m] ැOw#bE4 #}Ν3+aʂҎ'ХSJ_,d4U>)hH, [ TmO-3 }/ܺYL>glXn) Xȓu+T4)m-?=n^[J~η/:A8 H兞{VXI8Ž *p: 4xf ;‘;KvpPqT#Q!sF,1@9)xFe2&;SGiejly#u̟K`9 H/F9 ,6,^ ihK8麲&SH? Qjv\Pao g]Y͔Hk1eB_JH1Zl"Ū$0/jwu|:-3\_Xfݚiaì eE}L, P'ߚF03I%];4;TP0=LǑodxsʨ JƇ5m4?"W51=-nZH}ʚ܏HK J ˃#⮾ D{LTBRC/ \fpuJE_€F7;Da㲀fm婽gKN{%Pyο$,Ƚm.y*p+y#j>=8RPjTĨTa 8䅼#s 'Tl>UF";ISmZH?Qa0RKսҡv{]#|Οib;bȒKXVq=\"bnel"\yϒ*jXn?mv(NS];+/l+.Y%luЅD2h~Z [ VYڱP ؎{;h /aJ54JDD:6 pda8xjv3idԱwtOX%A*[@$5[YWyTZuHq,j34\qK|\ |993Km=z!'_榌4@Ŗ#Zp:ۉ)Ney7R4g '0*PE6C h}^֗O5ó/ 3nJ!8`m_wJMnD XVhq~FlJ1<6=$}θх|*Eo@h0_<h} /W:g[" ŠqC#$2&G?Y}N͍y TTcСE" [(XrX-R鐈Eq^{g .cSUQp)bpjb}$q{ En,=];QO)ea)$ەM7SVsXݫ p`rO3k&lyS'1>=bԴ,{7\]xp}vx9>껻6GX2[QtL3N ZߗACmޅyR -R҄F}^ԩqKBfXs;եdBG jΣɠZӳlN)=':z݋)Ƹ93KH{‰&.VaVI{~/bۨ$DȀ濊#4$:sc!3tw$h8H,d 1\jgkv`'hCo̍&uY}8$ ra0$-CMٕgkYe5Յp4+ǯ~_7{މ\'ղeZ#yzu\a҄` E/]X롓]EޖV/!5%h.ԏu$pї( EB>&,O 08>]:nI_gӊ>Ö;^S.h&@0bkȵuJcBFnrG'-0sa"Y&:: ;c_տ-&pSj)7Mt,9mFk*[ L7&z׬ʢB@>)Xp<7Ajt{Tx +뺶F)\]JU4do[gF ,*!݋2* "#ob5?;Wrr-VX>Лf5o@{OPlwc̘Ăy̖a‘QCUxsw4aT&n/ЊDR:y-|#ɤ ƘPD'>w2=JN??H)A!+F;4"Y\7u=ΆU O $ޚ9$ޗ=<7;ê,[fϩ؉Sxr ZTWyh~o5*LYZi9ܡcه9ܰ|GE޿kq_?ߗ"!lF\ȕ12]Vc~IkMa]$Chm|EKiPcU}W?$Mgw̧ߔ-B ;"-G*Re®P̅lΌa#?%9 9HUb?W%Ǘ+V?gٌdRrQ 5 Ze4T_-9P9RF!Hs@Wsp}k$ْڑdX}X XDKR:آ9*Gu GDoN+4%d. ,[=zDx_ ݜ-~=0Փk<[J? Xri+Y&Q 6mpr~#:[˘Ñz?W׎;J[}6u3tNk(QswS&]Sl_@nu{X^KZH^ڴ1ݠ{"p~Cپ`@q. 4!e5p1DQR{0By: K, ȳP | {kvo3={z|C/IL,/q&'bkw:-VX:h>K.:{)I8̢w%mR tk\옠-5Q6F\E(OK}͖DġJuX'dW|yQ%*Gi$KN[IZbu.V6h>\ǁ[9Y ыpWswD|N(i5 ~ h;p OE5qrA k/ТYVب2#ko:\a2Uh3ӒB0~ -YLlUhCF(Ie _U${ם?Zx_M0P1i1Ƅ/ꘞŧ{BVphUS=إ><0rVT;*k Yהՙy:PukSֽ@:cw؅]Ŭu4 CCCj=˜$sZKO/$i'2µ\t9nms- 9Y[9(ȁ7 TVǒi+8<-?/꠆çe8n\]='`XW2r뼲S1ן7#`PшQX$7SEUļQسucSYd)ԛO$k܂+u'aVod!^5 @ixAd92tJ }1+g M0Eظ ṚŻ'׶ GOHdUQ!`*P<`t_\Ks'2ѓcw N:hG+2.aA#iߕ7Yƞ IQ5Oe@4ߣ9e 5̽؄ ^$eb”.>h]k7+fmt-Z;ˌ{q+OMUUYjϲ /t* P\ƍ(JNJ59zժK4Зuxw'{d&xwFֵ嘥u> DP zwt &b:[QHne i@iXqq\'<!FK3ױÒK MS˯uUj~)f]+ꬽlIB Ci|z 󰑙A-ýc_=S[Bg!d]OE$[ ILR5:J St.ZxWnG[5Rq$lY5/׫Ԝ pUտ((WƠ1|' Ktr>& +bn qx֪)ҹLQ̵8'%U)+ } GS\Ksݭ6@ˢ{E)r8?l˒epM}1}u2rEPzvnCw)Qp%OE\^kٱ̻3j3lN!ɉGeX%K ~b$WN@qc:_a<|+=& Lz]Nm %43GGVB4E&Qd$uJr4.|=K!QÃq٭#>pR -:\c@ԩ? YS͟C",Q9S=Ma@y{ȆY%B=iXTq坅k(Hy2r35b/V_|1'x8 d?^J>y>h2%GV)'NƾQ*\ 1 ,RJÙߙ̬qw'~߶Fgw*Q>~ƽY_M6f`8ba z 5ή(2 O`ԫu/ Km gܤDjcʐ|2{+x˯Y@՛آB+=fE '%"h9I3#LˑAn`8iי*2xP\m ~iz~56\GMp3yht+\A) R, )ƒA}Y,3"D=A"SwJ~SW qILǣ-ۇ<woHqDcA7Z͞EYSPQvL15Hp;̈0`̮Q=v% $6P vo: wD=VwۊUϔӁ÷{n]}H8ꠖ!\ j&O- ARY1ӿvC.$!I-Kporv-A,vrK%ryFтtZ,*~õJ#rzO)bqC[OuDѶdU =A"^碍*. =[#n,Q勞]A\gzh>M&{1~M~9k?| 0 csoZ8fn:<M3{qƌ衩nsvĝ$dբ6NyXv˔Eզ@b،&Hʹ;F%q%SrId hh`[nͮEr1Sq[:Țny!80.F[%"}NJ-3 =Ѡ`2lu+4=_$,t3 #f0KKtY`cPQtźq6\oۇj$Isl=U% mrlМO<htEx_ XOp V z !WI_t!Ҵ\?&2\Qgw{۪*@Dr7liNo59]凕TF֌X[P/lfӅT`H{1'_X (?ǰ_0mKg[c"zƺ{Y/y=i xu@Np-rӛD7#A]4~d,ug&>I r5EWP Ud3"#4@NG=vos>WX}?`iCZzeHp|pk"t{֞5W !"Yb'1AkI~ {L6`:)WKF,%=5^]nm0SJ9,4ǁ344kQNV,CKb`'(cAIy :g(yp‚_`)!^\d3`dƢԠ&RӾ~!#- nyt'}UC}3Xo[P@XM` I | 9̛.hah"|`lA.j|V5DCb5˳VZ+@Ot&EZg]Ydsz@̥H烼G@\Xsj /uN6|20u7e )>dQl;h8WِǸoe.{q(cɲt_A۵#59}okrVm͡yD.laO*/LcY ӍƜOΫG{B_hbNz >wYJ}2H5n) VzxB#ڪ.cHI3?Ġ +s&ObrB\>W'R27[dg\URuA:}b´?(GE%E6>)IH+h0u0*OR A P42a4Qϴ|fliReoaYT; C\ *}YPqOna"vcLsȟ{?P Yl|cP`5Fs4 %+Z!ef_ ;3D IPqVZٗ>oiLӹ%Hۚdw\Tڲw=֢@S 011}b¿@~]n3!メ?#Z+t(1`Η l@T qB\D8X%oq8 4fpc}^h2#7=R+vO fϻuG.twZ[T xTR}\5 ]rp4MZ(̃Ewq[1dU ALmW s?cP#`akQ2nO1]oT4(w$e4_|B|תOLWQflTA gs_n%Rog (`%yn/BQ2c2$fBZ9#T%ku8ލ@ߜxD,cXY0!dՅ <0,.́ZE%<a .d"'y@yĞle}2E%3l{/  SQ:t)WAr!Ne34 _DNA#c]wʅ ",ހ)$"/_وivjCt%̀82HQY nA2tS,#<>[k$ˢl D)0w+ք2Ja PF~}XK@s&lBlq cNcuK6+Sƨ\wooC9u4g|2ɣ-|o>{oJϼa'P/1U(t ]z`lXY[UWjqnS:2)\P*i6N4i33S\}:n!aJj i hIe)*kJFxH=ָ;;7ɪL$I'Q?9.z-jTv}s70ja ^f$DE)2 ^G7_$o s.nT;6U1[s_;EӎDXM+}#Med7ۆ7)_HQ2p=%]8@ -%1֢Pa߄|7m_4BSk0Eu|yFÇD)/ yNM Rp/LF%zФ&VG!nI^2o)_9}m|%(Ê9G`E>hj<%555#=v6mEu:l4!7u]tA׵nz!OB"{e|Py&LU?W0my qr# eu)A}jzZʸ@=т2I#&9FcCsMi$y#GTGDOcIHJyqZPDBSgHYSD.@r_prvv N9S,h-J~a1tk/'ᘰt ai\a5t?#ݿhaOyVB(q=YQ[֊\-\(h&|-٦hvg#lQWsAb]NRIUY>̩u@)5 PM31t.Чox f=479ȃTQWsU9&|wtѣpHSl1v&-L.\˙!7} \r!L zy)X;̽JoU54`;y'Mr^$|ES[zEpq/ k!0{StB  8-G?@ My) ys{ OY@[~ ].VNJ0hJ V3b}.ˮu%jvم%U8)τ5U&G4=n6ca3׎:;7W^S$=?FH9uYa0^TR@XCqB A43#>Q _"a|k ח'R~+n ωxmo:]b.}eO6AL\]%~:$.ؓCUl0 Ojvr3K=TO`=?bgW݈RpGK+"B,jʲ\?f,~49#VHl9R8vJ}~uF`-c>X,,\"d!sSCʗlqex z4w6£96wHQ;@䖃{ dk^` ?^nZ=)31 76D9k*(cJ_~iRhGGJ0 ; %<ʗ놃#,$w9߮\D #tOj:`H*>!X5qfБBԈ/j@jͮP-Unͷ(Ds!a}+{$ѪYI lj!:KT|ZjЅO21)`.ɤr\04` 2l sS/C{:Hu8K׏X`Gޢ,, s4t&? 22㼁~MSHK`9PH)[Wl{BQKdY/NXOuzʔ2%>|&Ku{nQ@ٽ+V7|~/`x=k,i!;Ր x k2<ݡ nLo >f=OM kǘɥCGGUA5+0&Z732\(_Jwdw /#\8g|dv%qd5oE_J!yFFn 8L^eBp_AݥwpK}_&h_YR٘m} o?ݻ*|٬|H^7]jWW)XH[뱼PСm]FSDljj 5mv5~#m|kqV"ք; щ4Y/dԁm$Q}:~;ތ( W6yxi"kI{P[uGh+@4%#6ax$gvs-ɍ,ŸJQ "ɨj aF,\*c!I*n&GDʚ ] ySnP%^I7-I ^NY {0}RۭrLmjf晿 #! ٵ3ZEI<^T`7;n#;Knۗ|ՠF mr /7 bLwr=O҂\$Y"9576x BV\`e:ЭX۔l#q(y7;i~=c#y]ܤt -^)^BiGo@kcc(,`#=[{)Cgi5όאH QQbw ;bJ|S3 HJ6XȐTM@! ,EfncRd_ wGY-ϼj 8l 1l7{`f` ǘ@n8[`M3EDAi}&I%u|G{0:b8%Eb_[fA>4JL$N%Au !yw0V{ h C>e\ڞ['{?z9J~j^וm|VDIR|yx2LGG `#2+eh|I;q,}.ն/|d #'9;vjGq[ÏkXA]h /QMzK]V,ތN s* ilYS_42/`EJS hiFL?. ӣc>i{b@=yKh~nR׽xQ5WMYHx`$ А \HyJtNjyLA`sV/wg]ޮ~AaTE@_(=^_}>)Zܦy2&!izF.nwC*+p' y";+-ߌX\`O!X? ޙly^4~=Q86R,*̴N;ſ9lqWМ 37ø1O]քL'sm5XF0tϔ5 j)]6 a7&tN}6? F` T8.N%c""l X#V xh%n>k+0/7o1Gv?9(zaQrO-b;>a&W^7,i&db7MD*_OyN&v䃩 kH<ʸ4Pi3݄WlKpR':9?p}ߤQXbwࢭo11'$XZ 5e:ޔXiWgyĺ^XzpDK>{ :PS*5 ޥ-|X9@$*p͍]I6la_S'AԀ3 !It0u7Ѿ űtO6b`# )b"Ƞ\rq4'zXr9Iȅvlt2͡SA<6a:ٝ;MS1OO.eRԖRy"**N]\1(|o#j yĕ sH)X5tyTHL͛ 4ODi=\ڷVy+ /t4ޙ\[g+M:u*Y:W8C5a|w8[+$y<}>E_"mQ/ۄ MJCo(MːK\ŧB־ 8*e8eeJ4ɛ F'(t"Gc9:p̭獗S~#V6^$ϭbVG֓= hD D=foZJhލ#a?1ZjX_MG&[j~FΝZB\o7UʓF́Ҧ4zm~u0Ӡfm8DlK+r!a(P]@$r&?$i]O r O# =xJ ?;0`?-$-: eޖ7CT&R$F0 9M>$__͟|:fՠ:GG6!QP>ſtYaڼQA<  LO}ox^X[vxh)po-؁L7!^+V 7V[L<5ѳ %CY-ӧ-fEU)|j&{_뛌Oad XYq%]QجNuE (Hn3*/oiUМ3啳_6Nj뚷u<=pJLߚ0gjFBi<ѻ7 t4Bz[LlIO6}DSL!4ѓ6z'0ޤE*?D9 \ w'T! #{ٮKw1EhiA~cPVixjIe6v@H$ Z%-2-s7,m C Lﻺnv9uV?ǥq#-^ E/H>[k50R*;\ł SLGi#[៺t1!?ni3/f.R]71 f0 f=0 #% 75#°_ gwFbluK'\63H}K?ͶcFYq|K։R:4 οwZyc/[lC6>,{Q[ܾy@4LGxv U&%/idPxe/wFɬ&&1ZZ+' LCHQ$NFnY "/z| ɖOYMf`!@QDQ:1uwŻ"=/ Kt, ?a>s0PoZWt3/w}[FBavvupXdYLcb2ҵ^`̹䜹HJ! 7t眥mm!8dj.?SQQ܆rw>"">e!#9ͱWw-,8,sE]hnZ=A=W FA PxhCފxdy`#^?vnp2|ډz899ΦXCվ!iWh(61D~g1W+"nf\q lwɚ(7yC٬x0{Y&~)c )Ni;HnHpƿ?>ީ[vCT7dpOC@eyxS̟. # @[?)by_mm.^ӘꍾhkD+u%p`wK:c08w!y٬ԝJICrOp>L#ۑMR (j[ʡ15N/vSIo?g 6Sa@kYkL5Z~=@)zfL/&k1$w=6o@5@0WhE6u䙅`Ju0}#ܑQii,%~93|!8$my.Ϡ8 ǓvH/z14%fbfLdږD?4 ZIٳItѕzϴBa1&@`F2W7oyԓZ_;ݑ cH8ZL#T 2'+:,$so3w6 &(wJbmsTrhM;ؑ?8Lٵw͇@)sa9r6FE!Nxxz! Fsdܵ]} :wr#HjSVFhA#0ɵ&l)Ucߩ&u: ާe~dZӆhm  CIu@ -=EGRCWco1˿HanL{qV[Gmq/Me{_nXYHy d3M).eSzd8Jq*%~Q 1/yL7`#%BK- OB>v 6ëRO o"# {sX)x- -qN~Vۜ*= AH3~v;l/z1˰AKц?f< 'nekZy  ӡNW[&W-$4,i» {C=;p^[+q?Q6WolSs8xB&>iK0\Ǐ=$wbܔ/P:tmf%hwښ#J8:[X).@2mp˜ :jRH #6fX{l"}FFm=ʑir3U915*+@(|gp;sv!It8iQ.n \0`$nOm< FW]S5٩ClĚDLrGuW?jް#Ei;a3rdYPHj]VrUu#CFp i!ф+?eg1Bسm-^(Q5_gʛGV(YO5״tzjr_8WNK(pl'"Ύ/m߹i#=܋!B3#40籷/I-`8JXH& Vq`$Ccꅯ#\D+K9ԫSC.(Xa}/vGXR|FD#:!j_+@~vt|X?m I,tee(~pP$Xƺ^ 14ф%׏j>>rXLloc&?9mvQPbQՀzyLJɟTxfF Jlx?capB; uRX =z!%t?8i?rQ 2J' #]`MQJ%YFFd7 xWC 5Q-bu9oCwbY [FFqD $slShgZg$'[Ң4HL,_916t3jLKuW^4fex N #t y=/EVdt{گ*=eDatg[Rp{"5ᡸwV[ܳbWq'bʅj+ڱHCІ4,hMk+B(  g>-GT RېO]e1z? TͳB/vgVe8>ĸyMe=r=FQ *ox:sX U츐LuH1$xuG7+cDĭ_Y&$TNa)Pؿup*k*F !@#E_Ő{f̅|urjF⽨J^=o(kq _|!aK];e5dr M㑲*JOU޾=8lqmHr&e> A# -dOOfi(0ȯƦ58t^  JŮTPRwCO&, R3NXkhfCq5-X#q0 1.5'-PywƃN?]:/2H:M< JVM$п5XŔ?{ZS#ȍt Tż$SlwUm"Ʒfjzl&SР*GΡ Wjڎց#^bn 7j)5LπᯪwsCHZXh!Gڜ[JfmL#v/6~uй L=/.w8ZÓؙEypJNPwKb_eIaS-4Jj&HgY_kBDRP^ >('2ucM6:cHO>̑D!ILM:Ou (4btFWXx au E m&f#k)!F!MZ5N K~lja\ev&F{pI@xN`,{*%w:%V؟ϔ.c?PE?,Y1 $ l@lTh2}Ƴ ,APMn-Tg|q7ɣBSd3Jļu:{o-bI.? 0 ^FcGo'TiPWIp/{꽃P8%(wlݸh\%-.UO z}*v>5sD9ZZL %bDCH @^΍(|.nT輙&StJ߂ϼ}}Y3\1"pr!O6W_A넹_RvK|h2 %LP/ k2nԘx2Y"@JlY;>~p@j12Fk\`͋S/v|Сc<_b?v.LCRZø& eQR@C0"23>reP ֌_$HDoc 4-vFf3[v =L̨66Yw(t^X~wͯ8ZaPg=X8&h!v>ew zTvFǕGUpfs3L'{a_=YT,@ZwTN#6ւ&PiyƸĀ56ޱOio^ݨc jp֭e<|#PLqr}R̼cla!ƌiKC+KX3~}z U^]wkgpYA~>#]/]c-3ثp@nc⊥*94쬰!*M&18tF#pΌZ8K# D}R%KZb=Wy>iڊK[b)DklWn 'MR쓔bQxvyc k]q"w'H{ak]IpEn_]\tY3Xa I|`"%[q:-9Efb32`LJe jI|BSPek=WajI QCf)k!PRQI卖$񉴮_$~PunTV"DAoEW9gЀ*LR9YKEsz($fglD[{@FH =rm߰+%!&?[2jF[TϬQCl&\g\!nlXTN!d ޱb6C>}RQm<@X认fY5 wM{P:*$F/z,߰3>Ԩ Dv; \\h. o55NKzmts[*p 2ӭC$OCH^U.O}K|C*o( kQ"6ւL*'dAS(Nc@5QVr`py떋+wan_S}kx3OS_ګǍPYq@peJXqi,>2k?Ν1^IBTn4NM4<')`i!6V+*D;Q@jy # ]#׻)D\l9<%AB!,GՀ%ja>5¨͋r5oGPN_| %RޖbhmnTC ^0UFQ@jrL G0Я ?mҜ4S>2ƺNC|Q]M1uD,V v:<(=s~hEv> 3cC}kD{m%͖Z?KT*\?zzJc>~EλAYrSGib*IF~?Jʿ7[|Jiu~"0X魵NE+5M}   ٹbeSJUhnL{6xBb5~<І&A@!:>3o)yqB! c<h*V5JtkxOXNr,P/;RyH/AkۼaCo=kۄl֛n_vldב l'߻,*̋!D-?#kVY˭( },.n2o c]rSOyFSz2⃐~$FYΖФFJ߀Ԗ8'7܍kxu\bn2Z10 )n(M.! }[/ocY=0]PXc4셪U cGk\I<+D@my11Rv<#&՗Ď+GB[BFD/9v$4jn\tha,Wne2/B$ޕ] wOowύP hFdz񺪓Y(cfIQ~Y7l oq׽ʜ?6"tS;F+u,PW$2su&qeh b8|0mp"~]$Eȿ ~tCעI'*?rx/m3CY E"h t];Yi^v? o|[C?حte=;;LPm΁}+C}4@xpi/^Xzm֟uAH34$lujw<@9'q\5Ll[Z8EI-+}@2$_Cҫ,J{}vrRfuh:$c?|xChA%•jiao ˱6?7[]S¿7 5iQdWqߟ$jpQ?.CD?'dJ *"l("+.9~Q>5,C ʤs+*:3 %G@1LJ罭h><ۺ0jS="ڊ-rXn@9|*s[%< ~QZ*n",hQ^"B3T6 8-ݷyg2Y%DaE<~:shxE Fl[!^RICBlp^qxx/ c?JF,^Q$šu۩EźrOIJu)!hE@&[c܍6fA>5I⬟~`H:I{ѱ)&e%@ ".^BPyU@][/OapE|mG{MF?q0 퉑?ͥT%֖l<,i"mX`WI7F7 2} @L`vy-#GRccГ"u(<Q44O.HTVIu> YėׄE8bPc'KҥrQv\ Vs_~)! ³ߎ@vf*}*5?iņm~ 3L+[I|CX~WXX5|Ts(ܘbW*nA7@fYE?![6̨@^ԄPSK i7@aW0c6gէ[a~-#/qoGLWN@)$F& &N]E5`{=q99D=C<xbkj5$\v+3Y9|1Og*;Z]9 ,ݶw\U ~Ehx96{(S*-օ(9vnd V'M%et$SfF"OgOJp[u6ia Kg輸6sB+|Ч Q+gK2Pݘ4"j.5q>L-pex2o|sFVcE8`-Bc\yt;*HH1q"-}85"[wDcǓP{.yF=Һƶeĝ"~7d Aa\Utp?6u [-R0{tJ9qH7gÖv:1MDzȹ)MtAX /*PbVve9x`;uH^)٥{ +;~R٠r, G  w ~cXI&D y}$J7[GDgdz 0)R{Ͳکi̜RmUbf Їh2-jf%A0Ě2Dn3b~nyȁEt$Y9J;QSoד4 uU m=ȓ3U+TF!"O9좘Q*贅 @=0oZw'B{;ChgABLU^$΍1+wߋajwю)v9{n qD)LPiHDԑdz8VJT)^5\."TMFN*v܉ѽ+}&vocn@gV|A >}tlJvm5Z;]Kʸ`ORQ-p0#7`FIݤ[CذDR<# HR՚tU+Jq#u=ғEܘi+2\E2IsfDyTOE3DUet1\5!u>>J]KXn(=Qn\kDRXWߡKV9Zk3Nn;fN[,9rYmy9?6EE!c{\'| A!pl~*`D1ԮoȽ@M5XH1$HkfB[@wn s i(k8ۚ= &""cS)Shɡ=iCUH!nw{b.(J *L $G*޿`$MN!K+F,'KnZYS"􊣆x?&uSHKgurWcLLLc?VC+c=N+R-pGb?"#=TvN]-3wHf\W6aB5Rqo5CƤ 1{xf py"oKJ:)Wεӡ+V܅{-rermC w^iS"!#l>*4b)f>4+u-WǷC];+Y==C %Øz' <3}jD d񁨒μӄdӕ6L6&%};Ǣ_1mjߣݟ{`T7)c^ݙ+?#ZQL1DhMfBL [,=+Jо0r6oסּ+ [3sKXy*NyzWJKeKhk7梊PFCwוF &ANt١Tݭddf\j ^HgTGCx5gˡhoy#]EG UA{bXx>!ؙLBSx i(3"7 `Yؤ:I9x~ >&*ҿ%1|Xsz&%3^BMi W6s<\?"6Xi]4ᇅghK$,T]ϒ4Ƽ|Dߨ7k/X0~ g&rErU{D{#rTJ9擨r^]lyHɑC}D)Be|2hR+^ r@_Gb)¨!w TV0)\t)B 9$Ub_ DF>%ydL,D3mH7fOh:۷G9vzlVI,UG_ Qc$O+ޙ/a e4bT -TTZYOې1UnM n2:Dp,a9JPzT bMъ}F)PIFiKw g(Gz_1w r6/61JoI1J&|:PL\ # Le9eEWu_V$N't4v 2'͑g 4{qERfU~s3i~wef dz=bIomCX8Ƕ j5uh.]֐ 2y)=A HiKWY[.ĀX\5[GF'ud5@OB4B;a4Q(o,IxVH˄j{ LVx:X,1 @Ec e],l3 ]i唭. o-hj麚*Q,p%ؽ}Y tӒ +s g栭JaOK8 m)  7OݩY6`i“h+f )W @8vs(G+o=ew`C,7 <܃[ùw:.tRzN\k z{!c-_1OS 푍\tlOTv˝b b|( S-5}|9K =]2bjyW J=Ϻo)舥6+<Jrg602<+o+Un$-U;ʖ)EsEf\{4`u1zK $p0)&W4#IVYۇ"q0Vg *D (_ 3,@zX4.ӿ`7.<ϜOcE 0#@9X [J:J JeI$~%hÒqQ`ko,水u՟3~ϔTKkޯpA~?3,rq?Sgc &Lg22!H&2ݖ.%^7߈]iKčVǝ H3h{J|s>_fL Z0/ܧ Ͻkh-X;ӂ~}V &5BKÿS?e&j5nuZ$youi]{KR5$`-qhX$@Zl<\ 51K/*r&b-=iLPZ7SU",#W9ziE4ZكLK\BxSKv(; (K+'>ۨߦ֠{ B @S)D^C3'\u/^lr{D,%}rV/d_a*f$*_>yo+#} EljY{JAŧ?3{gZJƱdAiGoqtYUS|a꣢`s_ Ǝ>VbA#k&dk$SC3Rј%E(+va px\";?aݐ..6>DSNW7F& m.If*k6w>ջú7Kzw9*zFd>h̳aHd@p`n}+ <#C4~#?Ж%@#U~p[h١<]FҴڝEN!1TAf }tt|3<Ш1wd@O}Xk8y $J8_t $7m6 i]|!fnU0簉Y1f,v[(2 d?{:0ZU:s[<,þvnԸ-YhR ﹑{)|.>c@awΊ~_n-lV;y$pZGas-{m^a/XKF]%W+ DzA 8u\ʊˍȷVLh]DEEaѰPy}Z؟Ӑ6)ԺQ"*̼&S,| );p xHTh`%ƃ@xUpqASr#!+$j(pgp w+&{%Q S$XlwLFYxg?-gS؛[%4]jM*$\O?ZXosk'-WA,2 VmmWM`о136ߤ%rZ@9!-@ yK*G~{EwA⚹y15”IA4QJ 6/CO,QAŸe]9.c>g/c ֐J?˺E5蟄8eP$ɉQYM&I1mqEKX9,d+=5?p.*yI|Y qRRoj(hBVdRݞ^ʫ6L"hMqM\ ^m[X)yK9Ae;\_.`~ּ1N'*-k|)!+*Zs Fo/n *OYErw:o}Sh&0׉kƯF'0/LPBUC?TYA|g9,D˂0LݤVs6ageb2ɣ}5>ȷF{_Yc 1NwG(-GJ /Ea75&%GP~q>R@`x*ykÂX F>F fI-8D»:L'Q9+uZV N$i]ykս%T{e=:4Qas|8(v.̕aG'Ka0a%nxcϣy)\[̚dĈ4EXTE{v&ǚ✒6'Ұ PRHI|ϖ5]p8b m*]2zQM'09ph[> 5djljʏo\w$dIe 5pOЉ2],x ),MI 3bӖI*Msh@*|cWJd0]`B?5 m8~yIC}He1P\q'/k5@]zڦu4YеO"!N.xա ]a4Z,]瑨T4B<ӡ42))7xXSğKujC^Ķxa߁&}|a4S MٓMINݎ[7dj;ABX,T'48s<-ܚ!RmԯaR3{\cN ˝qkw0KUfɘDz(ܿ!}$wkkA $^&췆Z-TҶ}{Ntb29EL7ZM.9}$1h47=.o +U!,.R1OH.¼qqSW`%&!􉺔/Q>[7|S/Ώ{$+$CxED3]vq $ BO+a3rEeػ=Z)C`YDƑ Tjj޿K-RoO fʼn)<_b_zu}'5IGp%-4Q4hM!Gu9tJN`V e1=CKNynPg Q%G( ʋxDbf|1ёVUz LCԜy’}{˖O!:q<1Hs`wQHm{F'em)^ۂMסDzpYO)"Ywl Uh)S>0k(DZ_PˁA0YkIx5167~^5⡲w34/~el~(ŠyAo 3طY"tM 4CTl8=OrJ Ox&l&IN3!L-l3@o-n۠(u& 7fci:u=AӮ-~_N*dݢoL%G_@({BdCwHfms%eŚ)38bZܯ9j¸ݩ:#|E0j€d Ex_frgS|>-\*/rL[ًl_ '˱P7JDu*4WHuI\UGl W gǼO.Dqa FN/g$y8RXٶݢ[,+H.e|b{cjP @.(=Nx $% ₶] $!Ś#/L׈-@6w[14*hTT7XQy !Wt*XJWR;FnM|kIPt,+=@_YX%ܐ'E]9d7P+ڌ)/mטmbNe/n^a .vuƴCWKDvoއ _4{"8L6"m#~"Ā_uTWX3*RApoPTTcg@+[ l:{L0NFlQ*7Z8:G 5$4II

N|5s/pkXʼc*}ܓs[ RΛNBdvUML*qm_ŖGsxb ^ʕ dD 3 &(z^۱oszCTC0W^) Y/5GfLBqm^紥c 5-ش=mKKӡ(HiL;X5G e2tן02k*&@jK&W/MXl8h@C5J8y{3})1_AϿpḆZ-tT;g13Qi<,$$BmJF:bѣ̻聾{F3 Ǜ<+yCyN+ҏy/Y#e[r*y\P\,R/`?+)3+Oҁ-FVn璙K`dPɿҌ8 9?k3":Ab 9>#ūW>- oNWuo>qT Ѫ{ :[vug5@ŀdlY#˰Fg{Xziz_;n}7bQÞA5|VPa6 8A(T/̵gAl6! _ٿb+D5赇I$-EI1'd>=[vƸb`@Ա" R dLk_ - >QJ5a!*|>0͞Idy-O+QFXcVx.UwCMt8k~DŽz>ҹ{DjGTӪ ql՞RΏgq*;x_L+4Yi,R  Dt[^EMp/_e1a5ԼZ7ju @5l+\tHR--U=u汴*?.1Zv$%'+QY*ТNG4O@ )axewmC,vT{B͜uie 8,oս,@'؄..ՕLL6X}A%&]7NRT%|x(of$8>A^D/)H{R[ϧ2A*tUFWrbJ+>5}s Zi9W}{rakՋE>WYlUD[+bzUl{?|@a~˿ 3~&## %xVKc9˚K9&aN0.F\# 4"^ScIF.h 0J{~NM:R a΄o_4b:B0CDn}6U9c2bVyɞR'm*E X 48ˆ7lkɠxƹډgp1 \hl@a>R7L*%:./>[/ &|ٌ ̸ ;۫dB ~۬˻WX wB_ί;R&,PHƭ(ZFԏ[oN$ɃY` 0^`[K? zue߶67} v!c*[Ƒ?ଇyfUnXe>NF[8pL9! ((1 5UmM}ĵ}Ի0\f[[sdN ~/gB)47K7>FIM8FD6 +iOcjz%yJОF`)UmY( @zuDSSk}WA~rA1;Unkŵvs2~V";=ÇZ*4m$q!ϺB<^}1\}T 9i_n 6eA)79ƮJM|[-mOoO?lS4qUuRiΤNɖBx2m̀jW^([pA@1~~yhƲ-Wd?5 Oz7ŬPKceD67ÖH]'y*i+/V4!N Xfϖ>::I|^-j ¹TAg*WeWI_Q+R}dܥ,6T1?^)qM:5Exk( 33I2T\,@3Qh֥͈i7M{>a04)1SЫ~|iqjbQ4 Q76x(mO[-} (|;ژd°Da-G%hW@\fzH%֐ jFĻV4J 4mg[nQ75[ڭfmMU3(sMpxԶɐx2%/*Ϲ啍XD`5w#tƭR+)S֌mr7acQݝ-?mi|Ōd=@FBF[($S.%qI{+ScHVl6OF9d &cōVG& Zs<̷> hv =(rX4d^1* C{Ϝ{W >׀fzQ}(r%fg$cW"rX\vd( 2yXeU5u@ÖW#NYKd 1ME':]GXv6ld+ZLDTɋY^A;cj0/o77d R;ڇNYKA#irs4).:>nگ@%> #34b,CŲd \u Lk@u[]ŴNfˢ^z#g x=.bs/..2o$Ž'!A wv>`6/!Ȗ=wcwo˸z)80Ƙ[ݍ6١4NއN"g qtыfj14<e^sD`SRf0co UI~.AxJaQ&-.qkbKˆJlc! W*Fc,딮\<6%%߀> ;\i\,323 ԥbp5 3@4hnIx_f#>^'~.7\NcN͹K_ۜ'd)ޗ8UhdJvuVk2CR?$]^(BDӰIJS!}ki:5"]`t| _fX#[I63 SGi eV޾$UNi.YfxV"qAseװ^vʐ2zLLn-ˈ[>9R߬xK4يQ  .1;kԚ ^ _xZ7`|e"Xw[.?rHc';Oݼ3؃-dS2X4v+KȺ|Q~LkE'ki o$4A@r%z岬^(4+RglQvr}@DELH4퇭R 1E՛>V6MzҸdߩ@~q'W.ԱbXfcftsz:K–sfZ$:x?LcD?FRIv"YJo!O|aOOx_t7 +$찌dQA*z#D@ wY (6qxPo)K/QlYa 4 =Y%.Goc/OpP 6=T۸o95ūm #C,atMtgÅ5I#Su9I~Q4!~nRS\ ,ivgA^ץ' L LHSmGNv6O`9GH^D_HG'[M3v͌9“kF[ R؉ y;+Q?.q:T7G"_Mp-]j 墧#rv" {1$Ce޶{M e7ww/`DY#Yge{nP,,{L)lr?IZՔ;m=%GmA` P]?'nAV.=6F| w v!/O6DD (.l-7]R HJyWsT"Y.m&H"hlH,OvwT+vmUD"{ѯJLpӇ}aP.iSPJr̛kM>>`bcvh*E‰@w "^&ݺ(mEYAZk^x|K!Jᩢ& ;B¶:8jă||珨=- x˴Ia" `p`T&(~oj8xImJ[|ǃ :.z/&;* S&yI}Ό(^״|Q,_|8/ssn,0Xz؈(p빽#Mpy g+l}|QzdCrHI1;ÑM2ivڕaQ-C*4"LX;{W/5pjiL=ƋD:L6tW` iVBRmAˮ@,WZ/'pn V%ǡM) %SySDփGUJ-»*3z B g (XO{_gNϺ7/ȘX^#3S50~tOv^M(9eN dmֱV#G􉐜6O%'?~06J8?NFpeK..n@Rq>ҥ5wZ,ʱ+ ը8\+?[@%XiIk)BɻLAL@u'2>rR* lP\ 0:;LPRQryeq#կj"VC"I+/ep2Gj GբBYCᒡT^;(621w%9_Xح}D`@ ']U춖 se^%)oc?K;i?uGW@t1I\}RT~A?(Ig<+l}QﵷZkn.^"9yʮ\Ivmk<5Xa⌷6}lRVxCI14mHwu I4S~f28QF`/ ]n`d@Wv7lLvG,2#4iC66GO%@EAk(|Z:Pmt:Jvjjzq]68sF%=?x7h3"N9-N}su `EGW(KI eew^{"RV W:7{zxkIxC9_I>K擆SHj7x)'#A]mhݣmK3fX`/Z2貥ZAZc= @X4 ?R2:h͗U"oABx7#?Kӧ,"<|e:q_@I1ǍZ[0 ]`5޾qV +هh=/%ɺ; ,'Q^oSpLsRAmT[b,O;sHc:%[TxEMځ, y!]V'u 1JTn"mE02Z5blr|׿*}dtޕ| B99uEp.vjpɋy( )S ]݆LD3SYҭB[y;ӈ?#t6scGW4-,I4V)] یG:}VQ0C al~ܯ )EݑNuhCxD@q^rp=I0|?ߐ#y#}Ѝ4TN/?vb]zVF (}|z};ޗjps˯;aDܚ+_o!7V1-/l@XH4Lo'#507c2-Q4)[~O``6 Q;+b-Os-O}L7]s#$5RiU4* |%r*͹!Fpf^ ݯSVj9:Ԍ>X$pQO?{,U˧M,KmjE>N7i;EqNj; M "E9iiF>U\ kit|Pm&.eU/tY{kw;%cl(p#ڗ5w1]?ן8tS.@;GbSR?*&zH?^JX h>'<8N|e?$k0tM-tͮl!O^\oк/4x̪]> oJt@*_BW*"dbMS:=,{Fk)(h[=oY%G߭C08%tM7-~gAчUKNKQ|.땄x#F OVM f* uE>ZCS[Bt-#5T=ꑯf_>K4Guy+`?r\g9o;RHq&Ujit0RAPg :MRxYɺ4»!eSk`H֋VAl9g՛!"h„s," UhsiSJ _,F̴57AT4`/D6=;Ah%(tľk=x֛SNlQFC|>Sm tLDeD?鵣{\3/i[9sm}lf B]Zί 5+`/&)x,/6vB"JlXI0"|q׃Gs1PQa.]Z_ˀdeTSN™A\KX)&2JwFy꺂X)'-; Q񖈻q]d ~qA=3|3"nltA$ۻx- *vlkvbL_ Bv66&5!?Cσ۸DDea8=}ph쫡ʪ [e[]F]l}ڱm k7;#tȓ 'cb]ǥ huؐo_+j؀%R"+5`l(?̎#CN2aK麮YlYJ~:C&Pujjٗ0a$r9?gfѿao,-%?9\rs1Dxq<3PWգ>;(H)g\ǠX q )"VL@#9r"HG/2L_-2ZWO{=F`F(BЍ /J5c !ff.hN=1 A=.#@Iぐ@>wmhZ!5m~JGZҍ:0CʌkM>"N/,A8Dà'%q܅|Q 3cBKh1p#xY] rc]bFu3 z신X ױ'2e!g{_HiW{cJҠ# JK ̦j;$c>STz:0-MQµ<^F~WYY`6 7lz! l:~7VklqXie)>D7 ʕHVGs=uGq[$=(9!ނ9UIh"7Ț52)U#DiYPjh 2g=_,$̟ezw](HtPnbvY!E'X(e=j[+A:x)BX]:^lb;a?]A yM^Dj۰O䠜@Q8 8/֗N7@e* |ur^>s;f$WOjo`MX3]{"/3'_+Ĉu.奱n2(HԠ]xk r xfm:E|y{Zc ꗣI'^&!ZO{&<" ߧMz_*H#:ʣEohS bNaYo/y<}| bHqM?,+1Q x\xB$"vyaC=*<=J b2)&m$UTD @ʊ'0k ʀ9?^-DQw04&Q\#]Xi\YlR #Sk'w&:/866,3L7@T ʈqDünJ;]4*{/[:. & GP)4F`g"xXTaSQLcGm*Z1[g֥UR7B2qRx;z_a=Jkz\/p%*O5fGil4ıxOѿA$_͢or/Zm\8t[yKmw؃](J u8l3\¬bnR{ 憓 wD#bO Ҩ9lj"!b{KhFx !xSy_z&E=L9^3cCXI٬㠥62A:H‚ U`.|H1 -a'kӛ}2'[)LHbT "TC{"ɢ15|8J# Ƀ.pGn&]_q8խuJM>pA&I=sdܢۧhMvXSsg1&z>ĵ SO6hQ@3[3_~.KSK2Lw5"*N]CWj, )7_1\J*Dm ƻmQ R4#ӕ ]O[d^VO]6{x(GUU!am$ f[%^]x׫8Ȫ_՛R+uG#``"TNyΒǟ}^%g޹hFVEZv^W%M DF'qaAbT؅q>D7S~ȢS"*R & Y72NšsQKhHCW0YXd2k9{ʒma}Ll~8>t̉СvYJW}{K͈Ro hX-`]򕫴[)TS!Kè(Ekp u_Һw=[Dz:PVVTP^K `nRƿKx>$?*s]Zr=Ӝ 3-9 oSPfa{WYF$~Ha2)p7zr Cr<-9DLfʡ~]$uyDId&7H͖AD ' ![J|EDjT*ʽ/5CʵpB Z M zITtv􅤭5?feiK@c5^mj_o)TzilɎPCߕgՂKNR12fMkaT ق0;:RPMy0j3߆c鰟+seI:lJgEDfXI2ٞ*^.8?6L,X1Qgº}n"VŦv\ :/"t2B30nӧ\; \*9f4ƁtjNNU58i{ V;lp#KR{(Cq0)XK6VqzHfa6z5WX0>JHd5NOf6?EB1{㧟}- Qk 8\|9QsN$rNQ-ڸYMSj"y_G]?)>ND+*ݦȂW}#dMBA}C*~f»-TaLb_h-pcY/;sԣہih̖~As'F:/[J!--,8En"d3*.M$Y<qc1gSBUFqa^]D17e]E]ߋu1&Jܠ9ץaډCE.k~ms'؊K;q88wlb3c$33Ǯ3S?4vzs 1{5JWR>}0};a3+gƯ`US\TCQ 1G*NIOT$3#APWE69>ήvݓW$dԒR:ص;>0$wW@um^xj"IsmQ*kP f|Cx6ZX]tb. 4?9[{M`$ [&XR,#WS/U* e3$,1J[jl-9vETӢt9le`rSod7` exɨFZf7BƳ-pQಃ$Nsy "il`(|wj~ٚ2[VZ e{'lVY5nH4rMÅc:0r~7Dc&GZ>s?VZt7}͓KyY`)tbrȞ7ci`IP ޿qmz+dI,N=# ]ȍ0ܦMf2΄gO-.`6ƅ0Rc6|ÏDkM#/` '}a=8l[tP& =_4wM p4xu _pPﳩk^cW%#\\}ފǍR[h_cR@`m"̧?IP`0|9 9URPe IukEcuQu˶<4Sc@CFU;QG 0~6gWhk(NJ5Ͳ)\UnOWqF T%wsZƉߦCpt %(_N`A|zŻ|Ml!Qx<4{&#XoҎi gQ;_-1%v UʲNmb234h$gW:m0},,cJ(D`7xut^u"67jЖC9렰TV,%g| w?RΡD H\~A Bڋ4HvwhrZT I"lR:zJ1o񔏬Hbdoγӕiެָib$Ҭi!f~@Ӑii*+MsGx}ۥiݲ{rǀ<2a<> PQt|E Q!n//)x^K=cgܥnMߛL =ujM3V|--XLsVoR *vGF"IY^ܹC`GkUoPX:9gssMi/\j\GVƼY kE|ڟ )@Z-Gn\(慗1rWxj7co'Yh٨1 ߔ4樓z9Q=a7S,ϽЈq\0^tp̢uŲBq=dzʱ&H)"]#]e>r@Q7,aX{+(fd05/>opQ-z4kmDz04E ?DՕفx "zfHoA!_eH\KHyO52(ÂXA{yJZ8ԭk98gx?+"$/ p9Nd9>@rbx0@W%!”Q6H9FT%ڂ^aPOkطkt3!ӝYcvyR=WK؁P/4D*L?* Vf&&M<>aKHKdvlp$^p)*nXݍaӼs^';.Cz+p*5Pjͷ7y@8%)3 %kaKc=RAZ)cI} 0H.&_X̓wa wdº$@6*`Bdi,GWr@N\ G`MAM\(h;|]#2̶|R7<Ɩ0vŒ YXMXL7@D_gWB£$&2=_N+02okre %D0jϵNFIc S>|8MiEd`Ryx"#~BB߮oтpr~GӉ7!-=ሦ[W Ϲ|!X|A<#& nG?;7s}Jg җ\N)EJ~ŨN¨,;ZQ [ѝ5ΈUjͤ#:_m7Ny|Қ;o#Ub.>N!2MNUJ&#'2 סSBG Dyzj_ ؕ1;\3ݿ<+)GsrMI¡*(2ZWZ{kVwcJlaeY+h֖0ekW9ʏh8# U~ 1EL.Ey")SdW5o-L.RjZCsk ~.m;VY:7h!uW$.Y~Ѕ2GBhD 5/v'Vxpy'{櫇w?XC;T}z6,!mL\JDD6(W΅8^lB%QVR3JR5quU&Y ۾ Cw|塉DO8BgwI8ڟ9޹{W2p+Ae̚MDf57A.c*A:xɬAo~dzF{R.|ޕУ=^գ4Xq|eN'(6ͦizf+B3hMd=n5ʾ^y=84`|U^ ='[a΍ f7f}/O4 -@xoZj>taZ^l##Hzp|S-a$lt}֠<_CȊNn-׬kbUL1Xv?ui22o#YјM$l,@ p32wN+{ʚRlm|7pR5ɡ$pDh3d:ƸmǃC?c[09M1K %P3peUW8|ऺ3 jR\rZ@Z$4/aAJN!pŤK 7\{j΍w[5q>g&CMC=_U@|́A/r[zj̟ +qV[*J EF>^t9_Z=(t]`I2N)wO9AC8ʭLޤ=ρ'er򷠳7)m@  ̸x"4KqvhTm7ǰXogꉡ"kal'ȍ7_R|Pq#!Cs)Y@KGK7IFbOu3!S$Ŀ2l5ӮSø{*{f.?X 䪬{7/ߡn:>G֜882R{TnKerAM叹"r$krF~3vkzwEi+.x"")28U\ z^cd*M_P z/@DA~RC\Dj/*OSV%x5jPژ|BpvYL:Y-t#kO_XY@z%\?xPk5ZMd>]fDpT oeT F0HZE}{Ǽ j BX_y> \=272c"Қ^2L)Dcr7qxM$W(ʢwdZV9fQ*8MT6YI*عu-V=ίO[ pN`4R}g&S~+Q6QHiVIE8v }&T3)<Ȕ{Bƹ|}R)!$aU"A|vU2QG'P#e .bg:Hdf7ǣ0HZ1f_)(\wI7J ֙1gmwWn.W9ݥ)f#˼q!;?21b<%9fI#<]14>L0O=XB:0m[OSvv$קlKőa(s?`U|ZRU\g;|D؆)kbѰJ/$ZzZ @zLf:.{+C:SR%d :]<3m ; t:?sH~4G,Y z% L=S(嫘<`Z\SV/QR 5ƈX$z0H &+GC{&>d:] җHC̃,Eɀn!ȑhH|6+1*z_6GQ&OGdoU/AH#p&^Xܞ5\ Ev؇6-zn~̂>v:'NY=yL3Ϙ-% >9M,/LN)V-zΫ4ש?j-yLx7bkN#s GE U 銦8 <UHH#JڡO-%u+'3PIPrDz*Avy%_U/,2$~MD=D5Dv} 0E6li >Lt_918:\G o x&ϐQwwEe)N;F-۴*1M{I+ReKKR>j#:eJ  a[c^Rf'tV'y2WW~ECi5 }[p2m>G==)PdX8jr' SV>?%wƑ1/Gf"$%\Bʛhu)`;#,$BW'MXu}o^U5XVi_Tr܌QLޖ*dm;apa%|7n :4j)uH-bF7-R1Wŷz(a}bpɘ2/G@%ͣQDﮗQy:eoJѤǶzS VW XS˚Q"աm6_۷"Ν2qn]yz?G֟z -tTj_>KF㹔SHVe۫}J8SB &\. +/IBxWYBV(45}\ d&oZ,у}L5c&2ls=@XlI<96\d7x]Z?\x5Bf ׺ֱZ<➯ylO|9Haeʼn:׀@" *U[p+D"r7?Qmy^Pt*-UnN?,z@Oe?q1oVo]˜K^j1n &EEVXGȼg]0^y d BabRp4隷R?cӚeq6&0/CS.\@,eoyų C|}tuDxnQ4pkB|CBA:d<.2 䝆K}S%tq1)L5eU}⓸Hjۄ4NQ϶܀d !#xX! ()oV{H'SG  = !Y=3e 쏎%H}I^ $w]{< Zkk~!B[R0qs k#>͔?p5k&'LQ5QFz "_uj4ai4=}81d1?ԣڧH ݎ$bSYp~Ox%"'=}YM˷~ 8B,041;!W/ɯbZV06+LJEHL$[] lu$ lmT;?ie9lm67QgW6D3Vnp*!_6u=aË7U;UײTO`C535f Hڧgf_q@jWu=1%&U|:& s`ٽFSbM$l(QSq R}^"L4ݐ=ZCA} /*N(K] ]Ö} kJ4rKH"R')D`k rqwKW5Eh~tF'9TćqztFĝ2VؽRna؇0+& =eޮD'R_e74ʡa*4Ta H*z9 KUf2J!_P0DUeVS:X?Ų0>U-`gL-rԓ}8l8. LJhqG6Dү5W'j W%O s*@yZ[2Ҭ"M9}:7Ht/"[h( sXe<V5Y`[(F{K~!+m8EYJd+c؛c s>iôu]=b|]]fdF* 01w*FSKMP t+t\ζ;n?}reIF`m*P'Xofn]2M[4d`&+0Q=}s7*k¹ дjWKQO\XoocХÙ^wytn@% $0pyo}4NV]>9{n8}xEYS _;kn`?YB.]vr]Qw#)TnDM/:x#}H>ށza`aJ#Z05W$닄 ɂό|^ڞ6FS2c"ju?1^P Z_m.#'J? jwFX&S[6{~aNfoVlwX*l? |7-}ȸ@Jtg{LE+k),Oo50,ܐBй,,*B6~@:j 7K`&(r}~b &?mKZ!6%_}cT︁iCsgtز=OG*yO/0#Cy嗨/o8X_m?w]9QƅSM'22H$x2&ሧ/: ֕n{5?RsN/d|^,qTcxe%Zo}\!zᅴ:wֿtͳ1҇tԻ˨U5)=!tU5x\V Rf_vy?]ɤk>EPz%|@8 ,K.qR=zǎߙD{C/hm\HhmhLдoz98#U,cHȑ]?KJ ږhG\lxw~Nd,w_vk wlX(<zqͺ] h/EpeD[fD"~:>^Û⺹OtZO@5\"Bw]W#5jO<RtIƓ\p@}Nب1LΘxeum3=g<<򌭨1pe3-=&y(0mD@v~4xs?cҪڅu={p$.Mo*𾫿2NCAvv ];(Z$eӬQkVZ`Gt*ۡ9 $UcV!԰P`s׊iVԌ-5xM/"{ Tۿ"ƳA ll٪{odRhb/4;`A;hiNjnY; 1lrӴPޔZr`tu-a8LDR#\ֲrE@Xop*ÌU?ە&Тm!3C;za?*a6u#SQ[n)3:ӯ+m%bmco@+GX߫9ej+%t,v0Ȏ`lg$ <ݚavuH]Ŧ}%}l%QmuTD8HEI\nA1`41I8@7Ϳ^/ULc@IVƨ(Di xWdqXEdmW{R5J;F)cr 2?bhLEǰFjr@ici>bs&-I9.cl X`ng_ fhǗ}֒j t[:!05>"V8V->j% )!ʱQO:SU EWʒ*>*{G+S3[Gcw3 INDˋ]:aڦ* t8(QW #hƲd-φ6 e kb|*;ёl*V>ɲ`wUk[^I)1ED8K2[cd~ζ<my?\4RM3?cv\Il\t% IyJ*pN6J3X;mjtM]NN-ޕS&ϓiƹ&"]lKx+uDZ計 =՘k_#k=9qS׆G* `0rw8@7x>QͬjMsmUnGw֐=qx`;|Ö[JO5nDy8k@&?/ѤV{ۅ2w{Am3Śh-E*33?J0bd+VUX#N\*U8]mHp[V8ƍCݘt^ {ž}]s^BE3E&CyEAj 5a1`v NYslg|l򋶺vkZo*%`6|/I6[w6dX'=: hqp}@T Oh|Kɓ19F(ågȂ<ԃU\XT]B 8"ُKۭܸi"v6D'n1\=d"xFJy//c΁tXV؟_իfLlL2? \@u[ \"!rs3[$ >4gY 77hʾFj=)5F>vӶ<9d =rr;t$m[Hz yx3g3]K$&SvP.ߘFAĄH0ʡD PaV!#[Mdٝ 69g Y\^T4 -SJgeIvG´zMCw~-yzpos5|E~7gL `y±3Z$1eˋ*b\^24ty,fPo[rx <].r%6ӟ.d580%؞V׺hEtZ$EjrOZRL(]1n)<&,&hSu$ {r6#@~t&xg$+ѵà%-#O}2)S}`蒀uuihjw"&;Nzb[54 u3T-ƈZTUVڝ:峄JsE]|4[woQ=]M% #()=iZ,VH J[*d_VXcm㹪ѫ#|]vC KKS;w y![g Eg RI(LRCsiT 0*ܷl}l+WꛘWNBMz*t?nO ]BBBnSD!3ŤU)F\pUS),[eWkIs_\VXdEp.ʃy+JK0a `WWq n! WJ٢+rM&9p/8PdT|eb*YE  7uV$EdA\^ ytiuzDa $l@c#ڤaDDaҫ]aHp( @ wq# ԗ)3S\D*:ehw> 0FyUh/s|1s *6:w!7@Fw| fd-bOλ2! SaRTMșu>sdt1s8p }$91sXB7(]-g$@Wsx~*d۹yR9s cop`.q吂NneRP_) ckyw@:ݾNA,|DŽe.8R'KDj+3^]! )|A^'=ž#!0BdoW4O:=hǎd/11A喊55(lO%Hܬ{/a'6SHSu WWg:#9Zj1#)\n]\H }V`:Q|bE8=$XhbOJuw+PFrJ>VFG^;h8›JcbZ/OkJҭ@dEJ y'c$lPZu]=:qr}8w 4^q&p欴hFwWyq>B J>zC Ǵ,stK, \y6}5&/8tX*|sZ+F_= ҦJPo: B@D'N]|Ϙ#ɱ:sD+(Zߍ/,\gf4Пv NXM )Fەb"OT`q2hTkU69[Q]j.}N4IoVV:5 'qqWgʝn|,`;l+dqgec$$iM='^5-UULp"]T=~&3%e~įM{.񜳾X^([a|j5HJlNlU=i]F]H2M7њW6n>te)|@9 ~8y՛NɌᇀgN5#س݈#9!zh_7'u× ~mg9ݢܢ !絭+4_|SP (9,Tb!>U KMPCg馾-|Ɂ9u]ۗWBo+LDtǀ+ x{K8:;p#LZul.BH},Vmu1/kPE$N6 G Igz5]+VF*)?J@XMeG~*r7Ybwp1ٲahS^jZ 6v*k)XV&2CF[%@*y"m_>3ѻ5R/0 ߒW@PZ$ U=qe%i)܅Y P.j8ݮ_=vEKu)by]_40yjjo^HQ2(ӘI!r\6:.uDsʙbл?K#\QnOL3-pe $ NzZ6@ +I61 LG=כM?57 *8mҺBt ҉]Ʉ# LY?{Ȫ{i,[#rJ.wߪ7ϒbN,@WN2?k|WHL$e֨AUGGz'1_He߉fs"Va4{P$ 7a'[SΡ~q{aݐX +.Qh|Z7&qJA3) 6$%TH O pi?S5Lu Oa5Ą :iiCKmU-d ?H) s3uKO&JXξAA{[v3> 3QcOҐß! 4S#{~].5ǁAn7IC((UgkyF@Sd1z[]nK$k9DT+݄ 1 dXԣ ZcT|,`Leaa³" .E,z8V2Wy2l4W 7Ǒ'8>vZ~{%8кKdq_,I*zYUeY!5ӨD1ϑ(5aY8Y)lh` /䜊AXBI/"+{4ڵ9>'#E$_yٯbB6Fd}y{6`!D] *bP [~yNOiug+qL$srklFY ю'Ɉ38#\m>SyD <6ՐޕWtp)z(ҔU,nxJn`<&0udˀj¬pV_wUg{{sDL)ZY p۴ƯH=Jig+6i*e#WDsv{CF8Ij*TK\{gR #Ih w6& +TL<ܞre5(٬l,XNLxR_>η01@C2ZÑn-[wο0v#:D}ƇJ%c,0lRkJ/uK$3+c!B~N(>ek(j(6=si݁YJ"gբɪ9{_pWhA}8_20fLOI/#~8Zq衮yN8]2{ޙh&<>a3XS~cό'EīR|Դb`wp[qaJv;U7ě#ꚶ5Zt씧%t)9.D] :c ڡSIYTWN>^y- cYs1$3z[ӥ^||fIp2cΫ܀׫.đk=gh(Fgp#R;avLמU%c[0LSu4X1K Xbq"3N >p-#r-i)r I'KrPwdW3VBthDLyX(.x~ӱ-mNjdu>n (2\1VWw[ҟ< m=QjDWy#xZ\>[Gȋ7n%*APAsr~(YjЉ Ҙc9.7c(,Ú)=4D/܎Ґ VVY%Ǩ]%?#1mg7Vu`8`Zm' OkoZQ,C"$I @A9znȃ;zܦ*0#fʣ v9)70SJk,ʕ8" ]{K@MBSt$vFNNc:inwKTeeqר>D#ٚ9)4`b/dڈpHdoG :(jH/^SZL5]Sr\+xR%'?ޢj 7!&[B)kp + ]^nTA ߃!]dV*]6-:ȆC4 6Y1R;nzCU^F(SonZ/lښ@n3fqLL(7`L-| \+,l$=۫_oÌ`))1#՚:x'+bva+6f:餏ԻBf2`ɸˣЇӎ@$kV?-ulM%` D+A3G"n,AJ|U԰'O"Ol(VW!$|lx%-,2~6h_[9n}Ck[(8K?mW^@"x̆8a=|{PWچ 60?OH̊^p7Gi~VњAOU_T&ϧ?3rtH%W1hiT+q*?7/*kq[ Ğ㟀Wl,X_$SQm>wdڈHxnµ@$Wi*u$zһbmcMz7?b2Usf.^Ģ$Xq{&}XM)jAXln٢CkqPg̻.J{!NVV{<>]n{{#PvA("hrV1`&Z!,~EicI$\4/7ch(nj_05ˡҕg0v1z8Lިj\~dltQ } jAHDqw6A+] c) "/?qa% A<90b>T0#}s@ŝ:T x[Փx>|t›8{XؾB*jN/(RFA,Mq}/1+=}є| ;)i}.^ g(6l]=Ag&]s#J F,,v.+j<\ÁpL2Q]ޘzj$Yj(2_vr~Neu]S.hlSS/n1g0XKr&dBD*ql DX\>i?R NT^u?ԯqT̚ q&23U=4DZ^Oz@&#q"T]aOK)ϊC9i|V/V/ezy{f' Ģ2^:./1toKezj ' #pFHS 8&Th*txVۢ "\8/q+&aD$vMzBRrrמ!̣YM?MruE̙Ť }?3cWUB27};3'$ylC֏d׋$mˋKb\ٙ2u } EihDS$G(2U/:8Xׁ?.Y4NLm/LL8S\?cHZsvvUPsЛ*%ii`kWw>}EIq#.­jҒ4 |kb,ݖ/Oap/JОCfw! f b%ySYaE 4]sw÷C V"6=H &I3>z12y[l3pyvWgW]ka!zXNȗ({ {![bA'GJ yCrZCϺӶ q<^b)8Nhw[1CvYz+`S-ڭ]\ +{z󤁹?fvM̄'1C[n_HE+wZ}/w^\:q:IU*FA^wQ~31QJ6Qw1oh&0_cvLsKz~ޟKۨjʭ~pIwۅ$ S?No]?1djBf"+tg=>FuН%/|9[ȳ%t1Yhކ-xx{* :(lFS^ToA+Qp{GLgP[ÏG;6~EFF ߖIG&Nk,ms)~s"O<{'RQH_Të'::pCfVpiIj J;zgCPL[6gӉ$ͽ bx QEJto d9޾v3$.1Gwvo }v;P=:Ԁg*0{ARXHbu'zcؠkjSVsVYB=!yI"*E)iY*G$q)Ɋۗ܂):iGVOnEǥP`&d۬FDC0٥X0¯CMYK#Iܯ&f 3hlCHL T ːP( 9WM[n uzWAOpsϗV*X$އ'`s)Bn#n6DR<!|J^iє2 0~GGߢs0L`! TEFZۍ(jw*$Ӎī`v%[[!SZb6YAkISb!sLqj. s%.Û(xVyk 8gW^(& ez?,BmJyrѧ.T4*K{b>an0*&iKΕ*ἚY'BANlh&CƎ\>П6PI-f@ A_R rf(KL)[_7~^;ΆbKgEaBK 6!]\[(Tvf[nu=~`G7JS4^ѝH%ȁ! !/-S]թ41cҒX}$,;3,%j(=,;\t:5JO=[n[<{lRB=h}vRl"^@ \gƧ#XGacku1 /gȩBդu"*8Bg.7_g Jh+NIA|^"xPrircU^B1G%C*W nryZ_'ZR<YQB Bj)< j  ׎X_CRƹP8^Q*jJoW!p"p E.i"s7Gd@#Nh.omev}|Fh0"o{qvfFq \Zh#{ъH!wWkNSva$lǻo8rP %_HմtayLioį TǝXR@w $ SF#v~C]A-r4~{GC62_:X&N5[MqܡeJF0ZO԰agWK *Xm^Oi!^1&wݡJ:!7_cMvuQB\-\?#99:lX uӭ+Ǹ1' pr+9ш`mVƧT5 H؄ч WQhl E\Pюhz/mun7SJ? {v’"r4ȜSy/'3;l&a6Kx7)!ر旙ŔOifqT*)bGQ} ڸ ]Vxrqw 6e8ތۿ6qGޘ]f{؝W[fMtxJb8M @"= =SŃ'b-ap݌ iH ˳H'/jwX mWs \hproSg:N1ah7U,,~_ q=U";n=&sHr=J|tpN-Y_# CMd<ҘA(r`$BO#@ WlM5"oi`cR7R1{*>qVIiպiy$:ۗigQF>M*J.X -(V5^ۋl2QTĺZ2v P66mi:uK&+ eԐ9 -#9p{8 yePN(a9m- Kp7^ Lա3$*QG+v !..]S`r?k/&rp+ C3y/4RL`+ xwn,ya-1,ز˖ޠ[Q/Bkk L؅$| dD眉P 1P0m&8t#;w7e A/¦$!>QGj4dg6R̦Ow'ӻ9`{σdjPSgMX§,?N~pqׂ ?[1|" ;HUΦ31_^2դuDM tsiQ!>x7Glq]Ҷ1A퐁$Dg4?Q[9SB+)uwـuՔPq QUbV>UMWW~W5\uĀjŀf0kÍ " P!"3ٙ>=')ֲ av#w2y3fPL/yR($CQyȭ@ZDsף"5km"}4&fOw6R:G1;*W:QkH"8KFFEWr؎5,N2:h$tTiIJ/7EXKn>zj HYVnbj]`hϫ*λxLgōBg]ZB?ĒGQV?mWkBCڸ|z_K/PB挺dLF粎i)R'zq˒m='um 0 L&\ym4a :TXj\{B Lys$ۦ\C}j7yCALdމSGMp1SM޺-#y<"7֐T:p!1naGTK/ f' q&ze]Z8*מ7cY.SeE P 9W<2<qZ;ri-r{#UE*80We!SPN|Ou ڿ3k{[7KӮ/ʵcqBpP͉ąv%]Sb&qkEs ^{[:y8[p~KC4FD7 @h!߀u<̄a"f۷GC3` _@:dk?-O0X~) 6|rT7;Rт5̑B Ӱ: -ԒWɬK\*D/RyՏ3_\0d \uf9 /{Z6i_׫YA8ڹ ל3>my~&ܨ#K RSވXGxJ^ cR}8K-Rzv@1,dlotT% aw,˼W*m:&Q9؊`@Ϻ9 ZE>>yzr\%32[䓤EQz:e'_t@=Cb{g^9rn鳭[{5T"؏\T3]%ϖ}X$9g;,sX$nv턇q(^Ѻ%lG >k'ԈH4,1+Hea(d6-IZxet(z'80xgqW1{Y]yO_PpV^G-I9`KE=n"{R&͓lIe>=fbBk]N4?I7դiAGz3nC/ؒtԜJmw# 9ZZa?A/y6<>JkMn~ubǧ/pDцj|?͸͖եM=fO&Zի`TwRͭJ1,D m;kh]+eQJqy K?"ȅI^en6Znt#9v(]͡KwHF˛nMeGIJ&,86JҾ('):\ vV}lDLN^Z s-EXp)^*zL Ey}PqJlWq>Ҫ69鲀P;nfK;3|IINN;`˜A4#p%b!'&iC:.4KV%i-r]#$reFKeKDnr[(rqKq?1LDgB_[S&B&asm d:<ϒ4qWrb4* 7n|j^+,'QSz[DB;ٚ%' 2S-4ˊ̴gCܥL|{Ca^Ii03r@2FF+=7/x0NxG |\:8w7%1qAUndu"H!/r[ς aD}WG@ F\: V 2AZ]EP>旴-VFw.*' {u |E*O@v> ޢmnKۭ̭_T1*afyTQKMmA*'}E3BX`kz88F/8&LG -_S:[&?AqIHOQ*6Awrt!;qGVO- i`H~{7`eNZ>3: f`}66z.{Ƒ? Xv|kw~!Zaij '4+v߀Op L P}#{&1~5Qސqc#{7'HN5x| @E}5aZ=(0ЉވfXE&ɑa ~^.Qc1N d1Xx}kK\YC?3CNQ>JJٿz+]D=<1}ߎJQ`e<ԔNRBcT c(r+-] Σ9v܃ϽbT9xiT⟃ȮNL &k"Vylt 6m &)4&'LlO;aj. .?@+z)V:;p8Q~a SѠ1Pٞ<^m@VDjRi?u0Ńw>Y4Z2e(`I$dv&;-s:G"tdt}5f/8ӝq d*T/~X$ y͔w2KA; wn0XS Bbc1b2lrgG7p ((l%H1) {嘯nCeFU?1t}9p&MRY'e3.nNgL2CHWjvM_!*E a}Dbf'Zz0ݰE %hՑ|j-ӪiO_<K8:B%moH^pUPƒ{cu aK;>eҹ,gd1 = F:%fv  Jt TZxX Fua+00JxqwQ gv*xu^ގ&a,/ m7ɕc]q ]MnxW߰Rh5ת^mZԬQ 6 h cc^ +=` $+B7m"YV( Eq|@.קׅ-_ e|z/k&9ĉRAe:xt--%,:Q{{0ĀXw& uU`8.'i<}+~fb'HD.Ph9e{fd='ζJkۋfyr8kdP<ƔAW16G$rz&VQ.Co95)J3] 8@Sm'^ +tinvXKr)Or( C}Q 6|Oc HN`VS<­?gi+Q/O ޕs/~)VD-f*D`}6`}16"&A}ؑ<\5\u@ ^pdeap+%&|lMY'& @wML8 :R<6]ykgPz*kYnE ۻsG+%i|.B` v̆CtQEg7N3PaݮX"#qL}=wXl*zFťy2_=CDBU{_.TSWínOSi?5[˷V8֩<\ȓmW0%}w:hI4{7wbP.YX1#[dttr>d;d2bo_\0.+I\TD5{UTt]2 zq4Ii(NK)Dcs{_;!hKڨDVhq*lNқtY_ʡ}i÷D9n.|vf2]p`>{D[ Tm;֏jk9=܇K-Rmjb*W e/ЄM+OK:[=\]9J-`odS\QIʓ Б'j}_z報VҝAbpXbSz6})}ˆ j)ʮ*{||E.ŋ1MH ;5vL؆&{, ]Q=T})4'U jƝ%)VY91F =SUEsƺ(R;4WQF`#z f b.t!Cp ! 0b& .8cޘod\٘U8LXR `z cGq8|aáOR2 ok&HWv~|'k<ܺi CEȯh8*\P%Ti 1Y({f\q#||CiFܜN,HQx4B?6J/'eK/Od5^ް#JH*z}\6VJŷ]R&pߩdyV4Hdž|PD研8U+3y:Q Xs1UF%4꩑~UjLn}'N00V3TR85A#{㘜Yn; !YV.~KK#Lt,.ON<[C.:7c.)Idz2'Jbn] `_S͗2!4!M6 i^YU h{H7uL_< %`%-?E2hr4`X]dQY)R8;ߔnFպP+;-\qT=S#|  'g҆O¯/~Mbf(8]~Vʻ 8k4ߢP\K -ߕ%aKFcLNztӭRYRԄX!QZ =v "77Ae(ԡYw1,F1b~1n43&6Kp$R$SK Ag]/<އ0TX#eوU!_>37ęm 2T2`odG[OfDI-6MkgT=Z}{LN2ѐy;c+ȉra¢9nM]/2s3!6DAB~|"YFT &c -O`~lqRؤAWi5x%HtFk-OO/bkk'HkoP>LCmw*k݋O blgLr`*=2.nX*/>BtDu0%gl"~#*v>, iuh.Est7nE*#K !s.U}XZ^e!j+nNU6l ΀h8\NLw2ѿ i gvi 'r ;JRN A6bJ;y=_יH~4+k< [qZ`@WL^(CdI/~V]w/Gji}fre+Z$Niy߮#ݪ»p:&;WIeoP7Oc0̊˰{'B;QfsڧEiu ZmTHO? \IL'`E0) `j*UeHB '=R`|S^i]γLj zIٹdi'nˆ=)jQꑄKCr[{~`?`2`RƍmjVsf"ي>|Rtp:ܘKߒ IܜΐVEo,&W]Hp1ı3g46nf D 4&=7d^it;Cx?Uh#n+Q.`)`qUX]ze ZMBGY̥A6-SO]U$stwlJUd|ldNJ/RM02X3C:NjW/T{ݸ7G3VZ"_ 8%"a?9  )LE$GW/ai{=N%}qg<4X Xdئ qZ`qIZ_}u}(UipRogB ۱9 $J@X:C}"b\dzj(r(+֙=6ov~9iF9Ŕ=rD1jjQAyxf-I(1>-:kT-)sݡ#[L@Eb Y.Yfٿm Ҵo-E#߁!OoRDS]sUVջLtWޣ[FƼ~BS+/@QHH~l&&6Iv+ .3jdL3f[PMp6p#1v76=:zf>ۘiu{/B(i%@M_EZW- LYAY^D ᆕP- ՝))l§k<&,o~YlQ .Sr;3r` Lu*)A"E6[a܇oA>n@KpeGV=s 09?k>b~̇40,8B\AG-OEPewzǞ4ch(yS2qY+q6$;Xm'Oy/x oH8)oɧ,oK%U{v"GjrvrmeA$ooֽG\OE:)pvL9J[<*74: bdS${e,s|g^!%R[Fg=*Gni\6>CQiuO`d݉θqDdJ:3`Uַ$[q_E 0e:H]3`kKWƠ:0O sQxB|U*F#qa2'*^q ;W%s,NR4( UER9T w+*Za [%b\$Ѐ: M"!z1l3B0G>oT!!s9eyagG /eufE0geo{:e[Ljj)BgQ=Qz3ޖ)I.mAu&Ou _} 3nS3*2UcY ؂ C\yL*%ИWLfy2 мАx"tjb\18]p'{c<_UyۏyjYa-TUE|:UzD" RxCS>AK |A}ɼhտ&u#uuoݶAHH I)1ɯuCey >_W{gܘ Lz4DckpͰՎϣ5Y%fŚLw7 &_.vEL;rAd^&B55DbJRJ19T(gǂM~{3`D4U{nV^°+Q8 $HYi]*Z<>p$p3B*iy៕9v@l.v[,t !͚щp^hETq:i9x`G%"ױF>i'F 'tVH@oe*Pu!eѐKg[FڬIt$Wf"F! bJDkM K_V)?!E^^k$^;e_£7dH [FgW% CIbuKAtP$Cn5 U :xD{0,ܥn]jN)r %`4D-|QL!6͠ MpX]c1p Z*l6>Jcf; *unZ 5@{{%^'R{ʒeLPÌϹ}Z+)xD߭AW/ZO~18!Y7= +5JY_؝i0G_ rh 32М*a%L?^<2]6oȵR+9MU<0F+ÿZ"dG"nu7M"8t:6Z!PM|(M#iaC=Ýp@ i<DjLxg<؄8K]&km+#{Z*ݠ43?@,"AK`h/!SjS22]u\`a"Re@|OAkf91;9.twڦЭZ*QSqY4gkN8E>/Qs0!Çj1A0󷖇JƎ.'Sb}"~%o"faX+r}]*8lPj\6w7x^F Q R^(/A~)t@[Жu"Q >  "8ӧ#}G5@а wo'Y@KZFekEĘ.dX9LXwC8Qw-6N20gh%QA1`O-+QJQuL']CQ)D!7!hAMd J/U!r69֏yݍ6.?=um}EB3L|o;3mOFf LBޗm _/}sWa[,}m(J!բX4~`m#Fe5FZqe],66!8atWp(M$[HΈU朝( ;B/9.Iu'9O+)#:-b^fYQ>yo8uJB)uy$';ӼS9A$ @8mQڴ& V'& +AJ?!}+&] @5Bc?>OĄ<{6Ó pqL>*En%d$gYkyp6C~B:劮;_xϰ:JF ]Y^T:Yd![t!yT fRDsՃʽB5" QXbii-%a+g!MXK>G8sަlIcC{7OӜ2lpw$H PмoBs4Ǫ.W]En)*'~ $ҹ3&7,70}|`)H/9 >0Ō1\FWnBy< n}M`7b9Bu3ؠ[Z7׭wPi'eR H}FilPZKsm$i{ |@+U`Gܿ"o^E$)4}S rgI=ZmD #@@R>m2d۰K!C|csW)`K-m[Z}a PRRXGB6"ȬHKYS>gMk)"OX Cy ,ҵ^xz#N[t\r{rU+@ ~ P_k[|/`1>2NV4>,͈KՄ(yev,yCՃop)O"Őay $wIL@K>e| v =kOhZrKذQ}Ԕ.tSk|XqHp~l@E8HEz#E.qJ@%Z6:nS/R>{v0mzv;Qsy<˯)64x6P厇uLc bxku)mT<׉M\6z_ Tyko]bں>"qKO7zj C:ŧ9bt1*ǭ 4șxd+G1E/ Zy ).|=F(õTؼ-dTN[0 ã(qg9NZk^SMrۨޔs  hd&~C \Z˹P/GYR4zӖY c;s[PCfd.}{.Rj6dC7jp-Tʞ֮u$8t5YU7 ?QNuLM>P a7CcrQI[_ PW{ξ^р"M1ihMy v}X΢/)WXh lJBcW&GܶH11Vb FԢUrל*W/U fإW'4IѮ}O 8.np{ 뫨5IsiNsU^?mʺ\ɩ%ZnR4-TRW%!l><dpʕ#oMм?4XN>y#0Tvz4{f+҇wЩGa@)O"}*=?^4hA2J-[`/ sDCGH+E." 祝[ThCDFЙl\c~v3P@?P}rd\C,ƁvbczI5چa2TwcXQn-m>5,=I%A#FO{a|)!9xMQ6ER#jtXmJ*%Ȇme ap>,ww)şR 1E">iPa(e}i?Ͽow-Uk&!($WN"ᅎxYt1L{ Bs&N$OZDwHK-Na仑%Pa2|(KFݠbm2fS#Ju&*lX%,LK3:&4?c[2w o<'Ɲ-b="|+-'QD N-z]2$LuAOJ!F:jDtXP{ <P`${A#j0uDȯ]m)WcQi~:۫R# T| t쭬3FNPX47F6^s;!\b^j㜸57j0QWlv#Y?"_=唫29&~vzBܶ@ʰO@gl&_.c0Xi*ZdB Hޠ dYG>KVb_0yz ,ojQvׄ)vFi`9iLS\!eъ&Ş 6t}˜97 GQO6ж%0 _ T4w+IX>DW8;5Ec)!lC)׺-0Roci.+A^&@LF"Mܣմ{I%kdNY K2[5ۭD^ԍ,U#;vCJV#~L꾄h:pfnH@MMzMƹ:B4k9L]; \rQEzJ.D@)eՎo+Ɍ1L*X̓1gNRdMW ;u5$gDU񛩝1}G 1{@ &v]cŶGűY,&pϡW-%k0"˚fy!B,ȹ~ @:h;MEQ D%9]NЕ*zb%}F_i!zb@5P%0@=4͡g 6\ֻLFtaRvM=x1<.`56Mr]'"j3Tc$~uvZ{ihʫ31[[2Lm8+e #&*duօ`0Ib u&e~S\40**w;9=glDtM]}hxҘVv, .DW'җIUT ؋:zgc;q+3HnE/qh Ix^Ŷ0*r1\yHRŚa[DCd hNBaJc+έ+iD}'SK>xDS}NNX^7 X%sF#͔aL IUnv >Rv;QPЈ}}-wd4U(4i"ރ`@֟z]X<[L3+P,c'?(9\n>E_v)Nv:_, 1.H#O^>c{5/î,[pؼ JK]c0mzʟEM`_HP7W\n kRæb]*b ǜaCjYozyJmkjm'> Zs ~Z{˻Un:V ni%ԣL+aC×਌E&{)$r/gE.dƀCq@M$ Vit#lֻMsgȪW ع+1Ƀ>|u.Nfz^KOn4 UiՓpG;o" *$Wg& AdBYRj@.8,U'8D7<%)7+g u6!̥OJfn֎}$sZ/?۠ T`z Q]n9z 29|Ҽ~S)Ch acA̖ DZfȔh^UW p`Kj{pU?'rd<3 H7U/R tǗg#N'+5裊}Nǰ`)h(htAS!gRBUK,<哞]|m0:e\  ~ޥAb&2m}+nguHV/862KN4ZG'bs j&aE3N?MsqnJPdmj[ImȩA@lK1ϒ)<n17J*QI0k ~fq B b~umKL:@N\\W;b}oLJӰn,ɃN'Z>Ǫ׽y!cR-6ѫ%UI~랣daDFsko63DDw@gصgO~Шprr /V@3 @7!"'Q6iW]f6%,zz<٣nHQ7Q} /\w-CD.lTt00͢|-*?X*8΋[zRoIH_}+NVj"HJ b<4R N2aa/6z+cnBݠ;“ [JODsiֆtvֿp xdJJ(xh}th:@j `p3lFIkFqrgObR;(2$t`:ldNxU‡H.1aTc-aly>KWުNUc93=P(*C(^6 {+koD{(y#՘"odh`tQQ993jK\^nkbC-fF0&S#un=$B_YJj4S&k|&]PUؕZb vdF='ĺɡmkkyIZWlvbls|@ }{^é= ˺k%j~(LLܩ0k@DQTqՂܷI-NOc4|O9a'RDleɁfn`o޴ @xFt` JOs;#4r5܀EJ36ҊŨYtHcߟv6lWSHEyִ8EC܋?><c*13) F tC/TIԍ eP0,I;YN\dM٩W#eD~*q,K@D25!߻KaLgFl!7˓efUEᬛĭA׽H/e8 0QQx1>Ѯc7\{oN.nn38kį }jrPϸ& D‹"d{oR-u!VeI꣇\F,$hA1/PF=wf~ }4,lB S7Т/~DEDon25 WxCBr0pdp]EMl!j͂,F%oM47 ש\S2uؐE+t!qzBDAHX29i>b<ٿ]Nd UҼjzH +p'l`e-cK8.$\Tw3tջ0|cVL|Q Ukn NjRݱQ=/~7 =ҴA.cHK̉ON 4RyYC~+wgӜWOdߍ}U2knX k!Ő8H둫Ɲcq?q5PȖ3S5L 0=9 oFoKDR4v6uv| /C6 nmnQOMn>":%4}#-ۡ:ϥu;3c1Ȥw2&Ana6u50(_ ;Z3+4dCz|g`گ^L>VB^;%8UM܀M( Mnbq5 Pkǖo0sÃ~u-U4MoBRX~==,-نԭ|~sf2CIl6(Ӭn ){m6,&hnLjz{Nj7n}AGFyPx.gmzwuF4yN1StE6ų_%cdX,r9Xx؍m{  R/FHwnUQzp[K ob^NU."3}BQkEOa{\rǍ-).s2`c3cnFXC8`B/+ X /;s|#AǘPekʞ'Y@@ؚeJLWMi@Zg…ziG(Q!5۴RⲉDZ=prz#Q'/CDfts˨k1( +I)Kq6*RhJ2(B/ٝOhXa~/Y* }N^ow+*}ZVas6lu\d7&LU8eed hv0[Jޒj䪠ϕrhI? Gк1ddZ 2#0_ &)˂I1JT6ETTyAkU1Ћ۝ɫ_2,R]b#R};%b*rWzJe X1C jxgIAJ~Kf@0 9uէJW+b=d_467DC|-::99P&tIJġ\qN@ "R0%NYhHS$Q4ۗr:T(++N\CV)"fZ穝p(@R.+Ou #R%b\| }Uqj>"X86խevn LG]A8~P`v*vF8'n>éK{dIOVXRp x`1(Ue3&qxn.atߋ @,Ng i| u":K)fr ʥp B6%j>T˗#J[`|w$9콚{+u&wQ6XPm{J߃&ͅL"-/pI~{sM8[R ]ȭUy:LO;c?^]M2MMiv'U~͝nK{jh([8k=k~B los{hi9S9im#(r1E5Qwk=̅?TXf,^$W{/fhYj6t[;>brrt{ GZ~^;fGOkT8 .1j8-s]˜GϑK^dщ?ym(=XzEخDG69%ER@@u^ xT]QBj&|9|b1)sw8-OK,\%=^{+0C|)@ EO>]h >ʥ"J aݒɞ J_@x9h-A.my=2Z&y΀4cf3lZE(ɉVX>XVmVva(gf*62G:_iy)(/ҏfu2|6,7:1; '9SD BINtS=8xRjtf A-tTdׇQpv\%aߚ̈́GAD5rA%Fdcc&xX6#ԘbS?-,!6]b{4r{u4j9({ _!'E6FRBgX0Svq{ R A *, (@ݴCgRXuѲ ݔx, "T?ܐ1glqIx3S̋k 0,myeԩ_B0A geXZn~Ė   j3 oL,MJ2@-W?bc_F#S9?Y"ݾ839"x:{o3Ye<–DֈBϺ_m3Y!퍇:sv19P%6S8g4^}Lc9l+Sh7GsK귨>ihge`k#ؠ.PK~de0gkNAcezxJjf㸷DP6q^2G:e& ]+݀`7ad:h3>N)hVK?sڴ#}e@FFv1,(4fOS.XI\B:"fH#atoPUC6)3Q] nfUlhj5d[sZ_z}嘾FYeI"+֌\sr"[Pa6%w8fΖpJ|:9Ka&-Sɰ#>q}M?A핐IFEdb{̡b8$p^joT|_.+v)sf.v1:~$.TZ0Ieb>ͧ" T,=ۉU*?)`.\8PQB}NX%Uu?ARC*|U'ᮎ6k؈ԣMVIdEO}№_N#ˠWvbt Qt?v, JKrFxF#E*XCIz!qPIȉDٕzR%K vDn T9ra''lWw>F4̅y"n X_z +-)7m>j|95І#l1U\46Vy~L18Ij2yw*+茪{dł$ Hhpmjp@v=.{b䦻g EΉU !/bT<ˢ@VLbCz3=[g@L~!b6K]Ɠybl:YV%ӶԠȠeWKIfrin֧d_0N](fXbCnh]E8Ah8#:E*}T[{)G+~ lAsG (s?,<7Sg@w/pb 檠8_r,E]+A06Ҥ$yA7LSGP֩C"ɸ5;X0;CH4. ?-BsjFy,ȃ3_E]ZC n Ӳf ٔ ٙ5KD*Q/w1ޫnM8+pWlK<$phVOmG`" s䔍SU3<ƖO$}3t!2LcϡtbYxeX6!w&%ʗg\h~EMjΓ)z珿Ò2,_LTbjݷ(VFJ  ; uFN*9 LNd;ҩy$0Mg6F@YO~?% P"OaJRb婩ɹ@]ɞ `#G^#>4jq?o l/'`C=!v,P vQSْcyrm&2ى;O3…AR!u,B->;jRbX؇.Ê7+m{]p[192E\nv͹z0,ɧɃcy/3!%,%Qߠ$O}+ ,𴟇Tw0g|x^PR ׶Ad(9nF %U&i[Jݏ4{y/pg/J:{gld!u5$\$PI7Q$H{ ;[`JFo34lk۴'w^'T|H[X`/6:_ hXw`ŘԢvzf$(ʰU5*4Px lu^^G Mn'80.|%-W[kzFL+cݐ5"!;zplz"ߛ %G]h͢X|b ԽWk"c##mNHZ.^"dU˛K8 Yhsbkj7@'fH還Sһric~ؙgEeŗ? eĊne.ʎW*K :Y8րZ @_r\\Q G:%f}9=Jԅ07u{ضk_ǬDLQWa1tZZFL obžq[Lf ˉ*%vR'cE#E"M+%ac{@j6D_f%-\䠑 /  "t{G]_sMS)_y]lS$4Ϊܶ퇴ޫ:wQUZvbhuQ^.-ND8A9r QEq&0Ha+R&`x̧XE$d9ve FiުOm ؎ursIL k|L}g `4[4H5eγ\Osy`+ yyB/ ˚M2|E䕴t_o+p끹$;قkiz`WK]@7~w"U]v즪.jߓΫ^3cq+bU7<$+#*}h4TuZ(}.4(8_ Os>߯]#RC~a_m^?S,:€=KfN6̔qCʡWL~T-OKS mU 9CǮ,z duUobUG&}@0e:BLR).OMT|8;oJ4ӎihlROՆTmP'Vil1,w\tژd"DgFκNL1U0=_eR|h`*-b RU$ :#NLA ,,-̥ܩ\wڹ3CO)s1pӇRX Q/)Zဘ3cKrxՃ Y;O);t.)0Aྸ/@-sGms태]5 ENwYE癘/A 3~@S.n7 i/@ x][ݯNs:^߆:c;$9% 01ep"Da&e٫Lﶪؒ2- , %Fy}H]&0zQV_ -6sW-g3Q ^ "-}ffĿq@O;(+pԣwu{TQ9t*,71[Yƒ o:65_oKI7?hDv_HwwWM/P?G ò*(2A; sr>lP%oE `Qjj8!{#6͛jA[<J'i5 ˘%䄇244cv!W~Qg^:fWi1T!0.R[~[iR1bSƱ<ȐR+nyf^3ג MSښc`PBNT HYu뒷[I.iChX 1͵|hd1-DC"O@(aFE XeDòQxS&1i%,|-M8'e3 SӰ+UM|ltΓف:#o M-:]? @xa(K{}`/5٬c{TTa17.}Gtj$摄dQ9>NQ>3OJ4ck͊7!Զ0u\˳"9{.qi1K鐻;_"; qEfrb<\v5Ȗ0`:Td,XJBgȒ?O Wv6F{ۃ]ߓ;P6_$]=7|֦2ǍOÒP!eXv)w4Y^En̓>-eBJ+9UzRIxaR?[.e>dc1(}l\Q_;Jq9'jEb>߯߸̈X4Th֠z6dɱ&1~I)%y$>9LW&8uT8؄ Vp^C)M a+R n;gT5b;^~*;ԧa-6bIL}ql-k3¨1ԿęDBsTCp+1W47liG}MqW ޡ4P䕀?jPw?-Lg ]${ɲH h`aF% SAϱTg-a5iFgPlpN8U6u6d+vH^"A V0 qQm񸜘0ʯc=oʳԤ-pjB[68.^&o|obXQ=5UxRQzvj|ɽU=o .AdPJƌgG7>=p6ߚQx~(g NNOfx{ x{G34RDΖ'f斘'}ѻNߏ .—+W#gNx#VܩBZnSjck;E8q$YR72DuJ؍=0|yYl;ҧ Sx)NV4vEQ^.^1l[v\'M D;YK)ZyWT@/9nȇB' u&QҶ);4oe 5$ x{swW,g!}ZCR/a4vV'u}"bA~;x|* .IvN>q0SvXCȨ2T6++&>*=SӚ4(Vę &f ݨ f!yX)q(OךgI6rP/2PFߞXI}c.S"R$NZv%Gӹ n9g]Xq@1$x8kF5Z=y9߂5H?Ci߮s?C{*#n`-|YTrdbpT ?_!^H_8)&S/(m5QgQ+ (,FFGAFFY[|z%YuT2z/1hc?"ilݻԣ']U6!Nɯq?V$,IyEءrڮz^b^l`Qf-:VxD2JɠXm4幆MJq{阖%ӭ 4+2}X Yb&Ŋ0%=껧wn4PZΰ4$aDE/zQJËh۬c={7 .`;v kW qV亂lѷ釗 QHL`tt %qycD?(\YA:ѓ@ uip瑱 K %IHU$On|;̓t!'{xC>VR'0ֶO!rAo̠!|mzBW |nzJ fљbN41El;ޟm$%0s) '@N7N/O!p F$7 r`|ig⠖fOrP.jl?iEh?PȤӓi8]ߎ;bm'WKmspFp;.$r8eoֺhݙQ}f@@C?H)fG@ŭnb-M@CWD']Ef&vYnaJ_fW!wh.hVKA]Ja ]FOo/RʭBXNycJKQRUtsi݆.l͛*,) Pooz {vv-2[(r8 8Z4/S: AZb2v%JQSS"<)ڳTZܹҎbe/A z&M vgf=S`3t}b9xF-2o6vIQk/#?m&3Gй`:ۚhliQL*ܐZݱr]#R8+t8Iה]sm\eO9@ = et9x쉰j(s4rp Аo}гξA25QBzp+eiyFimxUR#z-@>wd >p@k+R2`q7tN)(EQG+;8A5[f `aE€_ʎ\o0ea EبENHE&}vG7+rjgsp5zN Q*7*]Sh b`V5@ɝ6]IY22t`t7>[~߫j 7#!Hڶ`{2&.p>P֬~ ThC1nV%5Ȭ3O'gܠq>%HgJj"z(4Xyǘl+(偽<^ w쵰cI~d5mRF(=ћ*u ˍ1 wuW& =W` ww(wq'YD!Ƥ;rLqB -0mچŇobIs'U Խ ۷B,ϱX#8>g;^Ӑ-~As)ky|T1IeQdqMr4-}i*-DXnJ%x ;dU5{COȖwbj"G$,4.BREKq77b/W8Ԣ![WhN@{L|/=7,U9?ᜪS×8ʴދZx:i͑0a@f3P((l\G KX^|VNb ? U?"v٢D`Fp)߂(.unx,{¥h;Y?T'e:V؄d3#޿ !#lI5:+8k -K±_ZUx\;|wD00-T۱ۜFCq$V"[ԒbfMxq_B:T s(s>%YGڄP7EzӚ\]blF lW KgF~UmZs8kZRU̶`uIYprÆc6R *NhmV/$b)M/rHejP·hQ5ND^ƶLf!De3b^Hc?v7$8 Ph$jn ًu%0MȿƋhU8wъcoT>)|)sEsP' <qp>n_>*)iS}"-6B\bpZ4=~/8B!A(#E(Er/[?7BVFmRt7 40,)JtuoH0{n[pdE/EAFbo0CiJ+[΅oKnJ홌.b3L8j&Ne6 Z%. CCv# p/9Ƒ$>o.04,vI3_ߝx`*'s=Q)-OOgYqeS:,J>& sNd5^D("ڗIYIsx|bTqJyg$AU\QU+tO>ӞX|;]M:(J7q .g-/YKd'V"2O T{O]ZRjqOJ~aax&./}6'ŵ4#1X1#a=I9qE"Uܿ#AVW<{6*sh Q}wpCEV+"!fK12X/65Z5籎m 5wZ2'vF{sHQI'ta8!¥DdL*8KG:nZZlX@DR48nƫ__l4Ws CjMZKҲϋ ڔ%짨=Y[`mRkv$Kӡ| [xE-Jqnod>݉˗p㤑h4tȼa:U_F e&ʬw=EZOe$O~矀'{4@W2"G )LJ|l˩R|n)z _QuF``60אm1)T aCgIrͫpH1K_$ h;e?,@ЫN]_@[|}9GKX-3umAOO׮e '.x}J7%5(n` qbiI%sכkb׃Z_. G.9?7px^mz(?7ϕL6n5EJv #Bh# sy I@aq4""2spCM)ѨQYCە {GABw`n2vdMfVe ! C:$S){H "⃎PaNy{%'a ,U .4 鱔0  wSXĠ5=U2k7&g= R%^ƙ\7̐UHH5Zr&Y6/$#0_j D~}!($" =IdȨl6(au Z:>r '-%蓷_!`Zr+6l2T,{x KqknO%V,,n8,㲪ϯw{to`_l%5G\yi7V坶$x# jK/҇5tTρEMaP- ]߀£JQ;$7HA#w̪z V^' 擇V d R\g|Ghc{:,Ufn $hF `RDˤS&{~(,㌴zLbt2fۊ¼%ݛh.hVFgi6夡֏ #Zi_h˩TMap: զ,h.eqQ>zѳ4>aAdދ^aP"GekaZUN`)3őN .r=dp? O"ƼW4n= ܅_\kÿWVlbs2H9,f*gW0j`.Q7ưԜ$qq:ÿ:`uն0yz@p ck)'w(9`,@KrME+?7tDcN a5 3s$إF=/@y6o̭ ڧ:bdޔx9 eV`JOAYז )y8/YG^k6U+jV"O[jJC2uVn؂Հ@b%1سɞoݽߊvfX1%O4Kq۞[nb}bUhLJ1#Vǝ*BM{BG[6`zM9s|(\ #b;s7.@;u'|M`luo~ya&dyj^ J G$loQR($:B+ w^F&3W]Aݝ+q\x32*R NF~׽$k]r?{M5"\\%.yΚ j?缲7.B}A\K_ʔP4N۳U^PNDŽ0tgjFlIMG= kFXnܔh4ӝazod-I%|tM2drq+=@3E"Lcwɞ9c&A{W @Sbn[$<?ͧL{Sq6o7K;D[$$ /qƼc`5]kCD8Yv3Qt E*))*A!,p9:+) CK0T`L3bLQk}$e< 3ؽ"UhH\Hg^~Ξ^>DEN}XLus }|ϯ#p`d4 k$jqFsWZh+iTm=g>'zRaK1m|-⌖e7n{Kw2>zuMjd.4P{4a;3 $>NS^uw,mX@ l@.Pz_i@[Tl[~*5l`d 5&u`eC?Jt\ `?XQ@>4] cS\i/F"{z#kxp>eջoE/5al[P-˙Wr%pk|%$gH9&!3d+f}{ba$'SN- SlPI^Dgܢ zy|bl <3$b6t qXOV 0 e>MEle}c]Qcw,?+3ryE$[) OYGb]!G T>@vPU6Q(evAd/t曝Gjt>"ҼʭS"}BH$4b HuUg2>hEa1קjА-+)lXHv LV)nj>ϐ)huաIe@ҰGōi39g|"s֤keHn1uӳ2u;&_Ho~2r% `zxRI#q;R<°BQ:֞'N&FTd/*ߧiHpiB%6mOn%o; ƝVW~|dUzXɧƷ?~'WHʟJG Yt1/k-+^|e{ zI L!v D-W5 {AE?J^2xhRIiq} !ƫ';jE;b1%0 Z Xk%{UԘ8 ǵg- +/{;X,֒;^#L5YeNc8,Y?4rgDxz>n}]{m_Σ+yuy4jK#,~0itj Z'L|[зi9&:z{y $[$xj fLj̘O^w(1-'/Bn+;j@ s,iH& E^ca7h z }d=(+*RMGRݣ:boNSSK8uYSxf.JaNI݅6KFk*R[O|g 6NAəykiځ@℮B|Nk,u ҁ48D5MaWɰP0 ?:1zw'^2RK2ie7"I㴣CaOfh j8.|qll.7IY_~rf0!x^Y_-Ętg#ʨY Zp׮ΎېMB4PөM>2Bh:ҲSw*  Mcuг$TE޺IIx_:zvpj.S\L9@??~ȱۤ.qzIA,c=.)4nxo]F#_bKE.C9EQѷE2o[ J{\ )ʀAwK`$lJX?w[ 3˝#S+Xv~?}u;b6kІ;_?7]_L2} 'P /n7,C;F5*0K O2 gCU6UTɼW`?lEK\;_?+*zu {̩PjM޸_eMB}LvJF w9p &( n? O-};r׍Px pjO$#2Ii}D3n3z*%ߝѮ#XK䢴6ٯ3,۝ mB'x-ӏ/Xre["Npߣ۾9eΐє i9mo]K7 4"|-=邬z` PBP4~?~򤄩B>Ad$|D1%mI[/װ %B1Uz֕ ]23׹z ozEgq=Kѐׂ 2yfHmX)NpKb#C U=6ٍPD.0mp]QvMv@c:( !A(T忪piO ;IepċJηG8 [g\l) rgnٴ)g<\&F!>F3(+26f^(O09ZYJh$[fx~|${` |r#A0`@6RTH'oԏ.vӦrk(RkÇA+Cg~`CyDy !r$^\w'BҴ3;kA,q/^fcUR:ռ|Տ~”gѢSCN6IpKN;3Sξ(R@V|fzSaoƨCmǧY2iųZ:Q[jלR~ɖoŕ)x(fD|:OfP ߯ջѠx\AS܈fNqT&((Vu!QAԠ K#?5cznGk*qBNY B `gfePK1YdEX)bvM5£LUg\@4`N7s֒pLC*ƹNL%")oWXd8fۺ1 ni(?sit?`+r:~YwTZiOh~QٯT}%^ڸ{܊/)yX<#VXt£uT'_WXΪ@FT#Df1e@gqL0j~H0aNbS_~X28"oA 2gPD78G(8V6{ϲ9́2 Bi?Z yb[#]Ҭ,ُʙ@V>bxǖӫA/ɯƁo|ªo*"UZ.#e<_:飈W; ddNS\t%g%L ORY0U=i[BhSc*1?5\^Ax_!\Cld =(2Ji\`(R-v}jrgGC:kXcRgTCS|34m_#YRXxY+%y9`"goRK!fؗ pK" X̵#JҠB&Hұ6 cbfivHr||*@Y{| 7@#w{Id~m&bnHG67FLb2#I8ՁV\*X|jq!%|*A"Kabӆ w'+iJ+,O$;f,Z |2O6WuXx avɚ-3_yo/ Rt~OpIrfoS+F}Sj9b-{vQqǗ}35Ry~eAnajN,,PI>AFՏ-7@+_NvCw &kKֱ+dF&љ dOn8J#E9ip} ሡ0L ˀ-s}^luGwX**DBaN,;Vd 4 ai$P/2ɴ[iq#*mWѰCWg={L0na_MpO B MIAW57v)/KP(ptc|Q\2 e1Ib]r{NM,2;r0"}A/[cgG̱&]y`' g`Ԝ& .Ӗdgw|IhAsC*2e}wu}dm.O0Bi`av-]l rۺmH\\Y-`D2Iͫp؏JS7fX$~LxֿP<,Wy:,vEu9O*i* $>A}A] Q?*>Xw5@sMɤq]3oc៌XVSSDiWNdfi s&!(MT>PĪ'ZB|<1*gtoNԱPfE*'oM~ʻ&Cͦb#G k|P(Շ$p[8-XMrlqܘ=V#gq8xtX]~$X^tJ56jlxrgQ},V],4=4~?8WFڂ +oHJVn*jړAuKkg "feX3X yoQ'+80[|RBwIaũJk&\B[vW4m^QX'&,7!(P)!&zkL3~XedE|#xS< In`kP+sqHftrTD-j>җċv*)OO7}]w<., ~XK(C6WŐ okjnv%1f9Fl1_ /_4P}3}Ad\dMZa=^.5 g FXF[+2hKh$y4h+^M^p!#6+$~eK>HΠD za8k_;06;Ώv+!!E*n߄DxCPk\ dγQ.oWT};[QH1S W $ov~| EQcIWݿjn\xFq$v4Jrxq AC֕ (-YOOrF|;ͨ 1'_gJ2З|/gӝ"l#R+bTue$%21GAgBSOhQ{~r@r4e]0UK`3dʼn~\:NV1L:JܴqO6ƀ ANե_諃a#z*b5fgaXxM0V&Xf뿦!*7pϪu.eѡO<:jB5/YQo7^ R^Kh !Kv˂IzPǴ`k} X+wT˧MfKr37;%ܺBND>8×lpc#$#~w2iҗߋ>9$_t?@M_*M(Lxc GdzSU-Q|z$%-c@T,x6L]*=ҽ}2E ~Ñ[=I.վdL"ϑIжEG_6Wtimx{t7Si~ 9Kc*.Aދ1ƬeOh2sl=5)Rh´}>NAC6jKuD7Je$K-#c0l5P-<0K~@U5btHL1R[FJR.LЩ*{LҐ0mGxX We0zLBazTv+E@ѧir^lkb 3ު*( &$MBYË6FZ5ƀJ3{T1 L)O6;bLj 6jڲTV(ǾuGjHYt^[x1E7ڶb&Rߤ6S!g,ux{NVn. P2`~a@ee2U;ǵJ(o:7NPA*4{iS# gj알G&+*?[`ዜɇa܂j. {M,'=hUvkvQ=ӥqgf>X8R.s" QwdtQoD#Bv ~ Jsג=o8]!CAX8  ̙Y WƱ[h[c7G!c+mRAF4>ۀ1etT f2 }C|XUQc) hw+c$62/ N] 3KIp?(U>w,QDL8 Er-#>z߇]FV=&pjxsksKԬBB(IbVh2y|(@㔪I-hdLw Y:gD1G51C@K^Z%K,Q\D|{%{ 4I7$9zMa mosFfɧ,̛+VJ]ҭ T `=dgˬ^7wff +ůϓ ۑ؋+`ab_@SszBb` hc)U$* W̞MPKTXN$LEWGWg Ŏa$">~PxÙMI -t*Js/ .McZ Eδ/cJ<Ȏ*XSƌGU_晀zJR"n8TXm66Z.&=Uqkײ\)ԫ`Fq˶)HNn Cv9-CjܵC[5cwU"hQHd`)s|yr h=D-<'&~ w"D^׶P(FQ-KIh0iِ.ϮV#dar: i]I߾o([ B A9,q-O+<^X#ԗHju  mT4RP 0UspRJdeF`.]N~g:H9Tt[jlľ =O0&fض́U]rN;$U7D[1$a[Hk1 <^DޡWXWD|Zs,K R~U$PE9XBz@9 QN, T b-Qz6𵥟\DhؿfiP:b(/}ݎHSa#Ds0VۃKNIi3ov7;zŗ) *j}Y93ą0皁dIz cx.p7mE Q nXh"dkV@;\w˗G6q4dqm{|z-9KKpg. ~۾ H<ِDNT@[E@ )'ͿqK%8~UbtG_gn(Vך ŷ^M# a&3:\Ok kb6Z}EH3V6$`&BŤ%L`&31Mۦ? :`n["m*Qn*CÈb1K! C,g^m'uɈ Ϝ7E"XXCjM(ʌTbj-'dzhCH#ƳP<Ƃ8^q䟆/GFhQ$+LgF\taHZG' LJs du7KW0sGl٤环2-?#QiPzc낥 !-՗O9yd`-cjצXa 60&]e3܋x -=ĜFJgg̣Mӛ.^v=y؛%"k|axeܲjUCW-vC[{Q#OUǎLiQb< ´ЈTn5- DB!jx Ҙ8AYT }lDVI9ԞV=!U1596!QRk-kDؠCCs@W&ѵgf) L,+"\1=,n %g0!~fS"Mnג%eފɕgCvUsbf4_A>7 |E(t>nDa7[jЊ1+пո##FVTB[71T*"IDra(k-wg$i֑><ml*˚cpaW0X'.Oq r|P! &|+QGAHi]_(J%qc&C5`;y@l/m)CFA$}Ӟ47;_HJzQ?" 1~z.\%*ŕΟ{~P]%:,f? X >qˌw׫MiJSX 08H'K~ڊid`y3N`Uy7ױ @T %6lhb%(F.K.}y͍ţdk(Yȯ/wRNwփ`';=R"&R)(U|S{rBu`+Mg\U scdtur{? #gtBdJBx-lXW8TӊPW(Zݗ!)>h5Y[(/Kq~®yQr)7jxg *0pyqmD~B.gЗ3bW$dLS)OnL(Qn~ 8Tՠ]OH.Ȃ8EQN!eT>PŞNf}b;Z|>&X-=]^LDxl(<_#]EpO2Vd v5"(M ?yjCн~O\F}{k6@sòH_.=6ئ*򃟓@b(,r>hg-ÉֳSq]k>;S{zmE? @ggX+ܯKkۨ7||e;+%ƠKJ-A>YH|'U%9H>GDC/Lхs6"ff\VY5xW̾ z)ɭou&ѮBQJь[bpI#ňz1aۢEfoI{4G5opwsxjȘvVM47I Mq!xvpxGWj"gCR3ixZ `d]2pYJ%&mWL:ĘԴGF%Ԇ91^KIx֤6Ŗ6K}qWIbʵ2.`gSP!Ȗme,MZzLp;5(,F.&)AXi9p\||7 n E $ad EKHӣPx6pU 171–L`Ԙ;Q(r R- {px(]mݥQW@SC#_:P,9Mi.e곳_w>[V>'S=e^>*Nun8 brΓLx~Q{R8f%V`z`ДΆ9dho&C/ݻ> \.WW}(uWk1H.¯v4K ݔPT5'XAڜZ^9Wu,Ю2LLferzKWklErs(r ׏c++hh}fn0 ?`e=iV)AY!s^k8pZX lEG"P6b dc&#5V%X(H(W,HZ7J9 fvskl&F ]o)XqlB_JB5;p|ϣv; :Otŵ˵əd\$$yO' Ox'Fi~C^-/0К5qHꎐ@ѣoA˜wo6=^kӌƟ5SǞ]rr,4 #n?,UM*l˘ ƀ\ֺ.˙![ g,;{@&.%0W&,Xyp0u;ސ &j= ;#gW?/:{wkk1l KM,2?p{Äؚ́=7託T3ݿ ޘPfn=SVQ4H7~2/a)J{'%E|7mLITT{J~E9Z^1l7ߝSz|)jW Icbr786rFK?b>#%mTI6 duoȱfNDAi?< g/g{P2{nQ ;kpkhGHk%c@ShtzjKdf@YJ_Nlь;ő:PrYzYlIBi7>r[01 svyVbȞ"0~p9[ Mg%P j WJ#u"g £k:}th0!1.#B#8A:T/g*傏Ț{Kƈ= O9ю4x/;_}Wcyz]L6(dB1p#(W05Vs'7p :pb3ET#@ܪLnBtqqkyn hʄ@)7>+DBS|[Ѫi$e_ } ~V5M籣<]^Ә][*>< pw؅fd4W n7.h!‹Z~=zsic~~6&GR=u{)ausSR{' m! y ŐRGmKXY慣\2:5J c1 *D{fٴ$ z%`- *nR,LD$׻z;-lDk”Fk}0Q؁[K!rGq 6Sym|[l`o-\*N_4(RDPj`۲^ ?\ac:iVLZ_de-pMBva}oO\T<>` պro刕LrKc7:pw?Rᅽ9<%ő/hh>m*wwddlUjhx.L9h/~'Pp!A9 tšVT6gj·Ӹ !?Bwʦҡ~N>(k97_]>-@2rm^KsF 5BL-? I!qJnǡ%Q "FfRwrWOV~6̥W|ߘqWɨu/sPR YAp4=O霦wko/bh3;}qЋÇ*pJh_p>Ào R m|Osd\OxVo_3xQP[D>1Hk2 `vN l>q_+>w ?]VTi)AH9n60rKr @c.)vi>: &ܴtORzԉe1O?\guv !^ 1=%G"̭y\ H2:*5㕸VBBФIʷۣ:cSu5VA'N6[u.12VШ\|Кys#`H/9mHFd0 x9HċRLM$ ~ ?YmM3q ;ӡCJwDKFH GW4#5h얕2sϯRŠkT?[mlŏk(hjDc},R'|h uJ,ݭ[?k([)ov2 q`f6Wr\cu!cZ_"y=>D݀|g*IѢ; ۻkJׁ"G:yG{W1_+5/?F 0b8yadPZG,̼h%kn 3XQxf~ݣESD5(**xxljmqܯrsd 3lAd;Y.aPr#e_R:Yg ӷQo4]w|UjNmЕo;P0v dX #R>O`~kFZ{D/< 'Bco=gJ8tMc p3Ք#uk`}+ZMiCR65sV'xDP>bfJf=hH>a~CH?Q= !lҀ7p(L, ;#\=-V'6B=d@Z `::GY3(;m&]*DQQ긍K)2<i}8cs6 W#|hSLh`c*HW1y/L*nu\5@F "* t'ꬪ[Hyo',g0mNnbaJ@¶M<ݤ,$}(_l5.:S'$ WNl " J=%/ 10 ďhv'q3lBFdTs)ٛwؿs-y/ĪՌHpkg+!Ϲ`>`(.<[J}RB~H}zHƳxvqCE([4yq@rܟ$ŷ/R#as z{Il`4CSJn|ٱׇ̍6Q.ܽӭMnEvHIKH3o * ƫ6"!dJxM3S;ƌY]zvh$*q#z՗JVIjXDF1"_ =i\ 9햸[U!ܭ0_T1qtkѹmϐCbJAꉙ¬ (kᘱ:KHf)[M@g/voCQJ` Djf5T)~ ~i82FmUОn֠ePHzrډL(P % LK5yT@q-v~tGcid .!2_JvUW $ReɗˬJT5ہTVi j_duS5(t@Ӥ7#3%[0&r$ bL65qvZ ]]M*9^?*8H$bm.iωr=CF;R2*JJYpio[(<^ql ҕ'S+ !/ydk̖t~r>Y&O ""&ύ1T+Ec>02V dMc73>mSxu'Vu\ԩy;/4DJ6o*۶_Uq t8THj¨<$;ٶ饂6p6ѓiFAqX_qt((H\ $="Vv֞e.̔x*xyo+J|᧶ Q >7G[yC V çY6G7 2ںU.*_,#\ ƁP]R5^rHBs WI P[WiN4|z*)9QQ2{bx750b+QބTLҥC;E}l~m4 |Cѹb3|Baw7^-TʥYQ$8/ݡIz8釹}E@GRUT9> ɷ")R1fpJuuƋ!CP ȳ>ҫ_)2DXם?}"_o0L|׹'?F/"+#'S%P, ?۪#ʃop?HZIvX4koO+ޠJW *ynҧ+oSiX5ȗ/E%ov6uA}rdJ0RT>[b[ JWL zOC^nCFj 2ϐW8 =27ΩN;5KD~j6T"ٵwW}9i WH+/Ɏ{9[k-I?xF"\6cgK@wa+qT!%~ng =An*6gӉp,]}}СG0ꐖ h} my`k$ϥQ脜|Te'@īuWĈ| (I%*3y A"&I">A D:.LzKZ599vP? X?)R@*{hQU-~8:z,>Gv8pAZOzju;KA` TC =);zf~)P|~Gwsgf~MUo֠F3:4s!Lf~Z HEUfS=ߵq#l)Og< hC05D&k_H[ GZ+:VdDYJ5QDy{] f/2,0_HHvZ`s %Q}EjW*wziWg !l';j4ddt]Hrt'wV,V $/ƉW`"s|^$:AZ|Xa ]f 2Ⱦ =7.7 Ddg8'*"xny` a\⬕s<%^\ŞrokúsX(*q S7 '09[~wN=OM@ b[kVl ,-2 Y:"Ԙ@5"YNi(&K ,m /,.PH_Jnݫ,H٧V ;g~#)fop3W.e'岗AITIng0cC3M a j5ӔBbQ-J^+5"g[_ z}sUk]v9=+eAueaD]q EY~/+W)9;zl[Ew孶bN5&{.sc.6~3KhT87.sl^iæO`|<_1,P>ۦ%k3}ɱ/zpBe#7WJT(ʫ,cMnmjPW6GFn8KS "rAܔ?_-9X*C97;=9@uZ'!ϒ9|Ey.:kF/6xͻ"jTjbRr\LA26^kO  u\g z_V,Y_D4ъkbA!??b_ަ|wVsB@{9t;%Sj_c~:;-2 Nߙsb?c{D MHqHQH}XpK*?5|YL$bZGy:cU_3ȍH98P?WJg9$m@ tLB1-(Iޖ+жr[&w(TN;,Z7׶=Mű IYؕ+ir4̯4 9=-+.hϋhV ZڥF9aD[32őN\x'}",f伷7G$ߴjhrThi>>'c&Z$h\9@⧇2`__X)0 $(.TfYa-*Op69="ixSsj,щL|%}iLԁ:y^fw\ ߭2mQnmtg/s8<ҨTnPA"?9*,KꊭoF6Ts7$'W_VBG0|"ROy=@L_ ĈB͎xw7TjA4Dijim$[zt՘6yZ YyG:83j~eVͫΖ<' ]cܩ3ޕ; E(OhEmb>~yĶA+6YLGyȕ=ö6L"CV@7㩜Y\eIm:HgSW'3h?KcGt;Zԁ]>CǞ9 T?yY&kY̳U^_95[89,E\ $y`Yte>* 47#`>RƗqJqKY`͖ OzvVep aw5i.7UP0gd؝ӼI{A^A:"w@DIv :baR:!?%Q3.Đ$&M&΂2UF>i":{aOZBŕO}]c(@I~šDLm>!1D!y.YBEz{&:b|5: "\G vmW䲹8YWʮV{n{&*oyR X&.e zĐQ;1CFKvvHc}DVXXnW3^UEf[f.`tOaw(Et _z]B]#yjiS!nrC/>B2bK}$Ʋ+E巌([@@&O8żW}:>|jG%+>swSg+\bŁ5\,lАiI{cF 3PKx.,/{voC8*ûF!70"Un Ze|[E?@eܔﴅms-EV``Tɪg7g|Wqmza5Ռ\vp&H\r=cZ ؤb1/픸}Y>9C4aF)1oaIwb%JVG2`Έǒ%U#fmn0 َF`vY>}Y'*Z @&An7}ҺKjzkNhI֒ЅFmŏg qou4Bk|9r F[Y$aN'ׄOԝ\gh@.g; 6oۈһ)lt,`gYsC)IUYijխ&{x eRֆYBӸ"+pe G{%''ff Xk$! Vsؙ GfO Ļ,P}@-L۟ENxIB6MT;8֒qIã<4]u7@ Ĕ#,"71K=X]u zP9 9QSWɞU11ħ xJg e"c;~SbPWp=5~9ttRS J xE퓽;XN1td(yzY1)(I .B߂(tis@iZXScv7J[¢vm< DpuS(vش (Su;1dڲ7ߦnZW HϞwXeIy]. \Djw!*жy$ ֏_b('#|Hfo$xk(9[{$cЦ-\}v,SX@~8'8 [>0;}F2΍Lx(1a$i>3Vo[! {G݈|+-l],o5ƻڙ4 @.}AԯGPs֌g s,H&Zj4jho5 hIncaQVH%IxsW3ur_K;#[=]zCD 9uv3G|11X<}%1%"%;5izsBNC5;owypyyITxhQ~)X ڒaŁv!uK-2s8!@ZSSOږ9_̃4&%/uML 8݂h$""6f o7bTk9[G[d o+uJ72SydK۠= .{tmi- G!G6Q^(vԘx#d㠍م7UV_0r툔N!DkkP Ev073=_;&R.Sp;F;k"$\Z}*B>@JE|УA^ OxCpޠ_-#[ fۋ#F0 l/){kvF*jЏ5ˬl7ILk_V~jxЅpbדstK/Bn2P69 v~'y6)o}(BayK,*7q{BaiWYlB@!%*;m dNߒ%NQ O~U.lj+٨C3[֪1Z)w.SY|Ѕ("XEq_a"m6)HKĩTt}.yIحtKI\Y 3m7g)sH+.1 }QSP`L?kpP{{O r` .x=gyT+Ї~2SR;;}AxwJl [(R&TA}\um#C =AdR_?M0R',$S&"@r.ݹ%yNP]הoݑ39;9slqVxhpx`pP >Q}5gC *GGdHq#vi,_n5 %=2$fzD&Z68NPu\̟w ad޳+k|_(@e#W6^0az}exO͓ZXs 1v?yuwx%r7-KR${Յ9m @sOP):Bfw&INٜ|q{N;zחq_y!MM"?4HpSQo[?&x 9A#}m܁DDdCi@ 46ApϲfTTҷ0eyؼ""$ !RǍx>4}j`0H~)QsN*]/M},]Ek=949Ixkg|?NPJx(B-i[~r0@$15O}^ p, _}g Gx CĮx\ަ+C3=; ̭ȕjY{ PCGB+ZhTۅOFCd0 -tqvG=q݁M`8ghH9}?]NrAYSC1,r$ddenFfsGGʊ4y@e] lMRr 8hh1&S3f=cTPNR:j:^yv^Puxf;`$ba6pti`Z7d FǁiT0ɡTBf2ӷam~&}SZv/ ap^%Rԅ4'ʭ!A{Ev$F\?!_h-[-Q,*H=o ,ä|[zp{7JjLzs`}k1Rdӛf6޻4&E49^ʹN]#|>x&qzV! x@6ݧWحdS97D>!66Wi2mڙ B;i<&wCߢק0.{񛼱{烼2LB2ߴncϺ^^mI29`.Pkr++/ v*I}S OaS߂߅w.9q'#ڧϽ>X{;mrY#4}!/ڛ /o͠ڛ%2m/}&^Fa"OT 0@W~Nso]]@cөmyΪh63AGfY֖E R=$P=v&Gڨmr_T񘒗W5R9{W{ To7 s0Q{ v \_B.C,/bŻ5[F-ҵ.g(9@aaݰ◓Vm*bϓXr8$Ņ9MP. cxЛfb+I:VE\BiqVLYqm%`[$Iv9[e?e\X@VW1T>3b?btdy|N[mtCD+]ӡ`oVGr2T*Jz쪮*N v_4M~U□+ZHل_#=a!NxpR)+m8ї>ڻ  A\),-sý^w oomy9ilvJsR}神f;I^Ѻ,gp3Iry_XF9k!ĐjhxBת߯({3]/ KM@f Ǚ|;dGvwufOVv1*1]KyB3FMϢ EޠhnJ^P4`iք%_~ iZ{8vεiRg!&M}z[ПQhjR  DKcZ6a|ZYr`' 6.<\i3(pE)õ'?& waJY&sb$Bsz~FIWFa0 Sm0:Gï.|L<x맭) |d**(ti=&tfl޷YE|p ˝s|vu\UY;;7X3lJD3 pNVsx̟q cN1d㳣׷O`}627(JU=L-O߁R~0M&YY̴{h/٤.; ݚVAw_. lB3h3oS_,TD ,_0]eV)'g`;_{0FplRyFK7y(+-*%Qj<-(!5eV=LԾҘiڈ*I~O 1}hoj̊oa8p~,?* 3*0+Ve*KT"Kq尴X.vBz6ɪ-=ÃR:l2;=ů)-7%3kcK&0Lj[{ kKno'mnk,'s<;vBu4ݹdX2 :@5E\ab[GQE@·\4>X2+]j14ʇ5c1蒼hD]™ 4Ks0|`bbHT^ѕ .k4)&ئPJӶ&/CvJ%Z? Rp#{de.rTP@য;I|:ngn1;n2@,E$2_+3wS#9]ao(W &:"iLRlrһL߲' ԅϳ%g[ u~o Oh"2c&{ 9:]uBv;c5ۨآccq<_?z+&r%A2vljqksT 7fv/~SUꞒР@-Gci'ơfI 0(ڭxUL?KM:y ql^sM/H6#XS_ d;s0YK6fdKK%F? I[ 'Qm\w vo ".ZAY[*a}C+~(Z覇ofo!K)88/zx^dE䱊ϧ!GYe|/2G fM87b<^b#j:0O }j"KFGfp3n-7APjmqy):z N""p-ãp\>uvY!Ep1&6V)+1XeA>a@Mv?Ȗ[nonG2}aV`d5i[ĐW_~g} O z*5jNӿpy!RI#BŔEpl#Wˎ|=-Cz*+gXQbܱHAIoG.y~ wkppC!.3/qБsLa ()/^`x}{SFwwUN&=ې麹AQTFhD{uW^riӆˡǂŅw* d] lI%+SX=*ԩbYfBeZm:E#TčyX`#2=f[[)yNڅN[հ^AEVÁ}t2\ڢ |Щğ7oIty8j1LAzEÊY$ d7\jO_9Q+3ƾN łmz56Zg{Oؿ0{t61<1JA&! XxM[t,dKR7 ]Ѝx5ƕ$F cOۥ )mwJ Uʞ䊰<ѽivJ)% ȥM?sgBqE-uev/[˧'Zt 'T:Z,,T%Vd&mA%g|4fJ3@`a 6+V#TfDڠ ?}(V6PK0A d#<(UmCygK8/ ?4]5I|e Nt#.5KJjaRh'xUz }w˟djn=p}IA*>Ay-[pn"Ə0{n:Ʊr~xyǍOuIX74vc}w2Fxծ$Wx=Qy-.@e ?ӫQ dX.hG` HZ1IYQ4w8?gJZ '57XhQt0QT'f&t0E2K%/Js90%N\Tb,2Rw`V< Llm=֊J6pi;LWh3rY*j'{j)J\bvO8y ~\qűuջCU8pE({G0xmmrq9V/F8O'[]\RJ3p5#>zC8s`}@f8ˣhy#{h;^H!$7W)Qvq1_U` S_U˧߮6W霶4;6Lg9|F'7 rtLni=_ rHZAcSƛgDn*A`T*^ysl8-S5ޕn=2TPZ`:FuSzOgK~O=עǬ SKd]ցm`6haEo+|ch>v lZbN3dVYޜ~Sj+L6`#ea'#m?W!@534fiˋx~ҹ1 qeH"-oع+M.<Ȧ@lﯚY,RDѶ 2+`/ d_ ް[5rςKҐ#nJ6a."D(a *ۻϏ=SkH@B)(0'$N&l^֏e_һ/0Q#de UCS09g&?մ _-L/Y诈כ{.kQ]K4zС G+7 өiS,?Etq t$k|lbs5+,Q'(y $`b1;8)WaG^ARx[lɑ|rA KvY]K&U0;Oʖ*Mt-3:&p3j ]C$_R}zMKr+}7=g*wyTBŸ%5k'C"_A0\qûÏtHJ̤\3pki;pߢ3% D&J 0\rI2paƼˮ}Xf^prEm;$( :J-LYo]myr0{e>lh ]22= 8g&w4fNR[(KG{F[jU; 7)uS$h#ܝuT$dMi>A3C`˂A@ Z;mէy\CGٰ<|/"ߊ0wI'](h1˰VOdF(8nq8+e_CNP=3.]9,_xH4_FqXgZV]+w)3 (A^017}|Dn $Ld& yK}PT`[GR9ԓwY[2XrD}`=TQ  bfYɋ{}^yYWu靡:Ai,zy9?mhKfӑ X[7@ ~].!H^tGJ>/9hOBq,,kIB;,xz# 8{@E'NsYu`^^3zi$ 3q]ފ<`@ќD蝐wC4x&Pe.7r)KzEO⁡XR/{$7HHn8BccRT n1^7MZ/2dߛ!^ QG=+izZ CO' 21#H{L%*rJJJ+O~SμBY @'ȏ-‚Ӌns`:CmZ#"%V_pT^w-C}D9ΚB666*DqUBV>ӾPf=ĸR@Is WحX>BH3ػ\ ѤDQV]FKOHl𔩄s)g"F(z۝+_ݗ|[ UJVs> |Qj=QpadP)LNJuޛAO:޷CҝF_qޢ&IG~qwۖsשF,=9@ 8~ zALZvhiO)g+7RʡkAL&9Z!9GJ^PHG>*ntoE罖!mF_I9=M]1(_oCS:,cy(m*&Kqn-Jҡr&H?)=]Wsg-i!~fkKhdP)&[iSC2M0`?,yKe*:*hA7? ِP6NP|MK sƈix!,k1gan.t(cT{1u:mǣ)gA* Du-sIXueӲptu <͎u$jfbGL.Jϝ-dsG(-"ؔ3Lw2|PIBKn+hƭ"*'ëwAmlH́@jMB7 hT?[ҀtM "8˦2+nK02']f$e rC4u U l#ڴZ:Eo4rś-MqA.w4ƽKR;0^ڥ.Q"'qǶ꣆ļ+3vr_cRF !gXKp(F-a5!BO4ȒB yx+M ;q$AU.m0EjL qb]D%ò+dEjc66b`:zy:StGw80Jr?-͆0`ρ|m,͞WO`KɢS<* oa;Pv {5ۀ9PBa, އ5H8o1S-I ,*h;j*EVi41 @AVf=5,[yK($x1[f4k!؉ט NHg^6HWnI[H)%0>.%qzH 0F=&MSET u\:TY L?vw5pmAn9wG"c?Vǀ  d5@.oՀZ& 䎲gWyӃaYCȃ>&{:{XD3!񊶭g]?W5emt ɛ!Ac9\Jq[EVPeIDdBCycH-$$eW6(χDO>yk¼DLcPA^d5в CSFZlD}P{dߺ_UlE0rjE-k@еÈxM݅qį~ q!=5q(Pó8 Mm毨 *͛g X4Q W[&w%XCn0T7g{%ɓ4WQHҟxwx'ٳI܋,o.Ͽwfh ᦦpa 2NwaJnq,]כW8$a bVÆ%TpR:M)`=q'@t]kf)GF*>_~QQ~1t׫<+yڣ}Z6JÎnGѿ؞5*>㳹rԹ kG3Q`[@ 2*T^0p~ bUy|6NǍUZFtTV? UZ3#&? ^ӓ Sw\<))A[p,BdPn>SQΕhn*=,4Vγs(I,pw ?ќK @VJ(=:*Yۘ-[xseh,2,N|ϥ 3fH=ťΞEyB5~Fz.tEYU ߴWgI-ٖԻWL (#S' d^\} 32}%Əhq6b .TG_ iMQ[hy*hSk19 62P bEͬ"(vH,' vrXF9l}pK+Ne71Br` Xd y&hN/+:PMX6R^DX?F@-.|+3T ^K;e X;Y3[Dz /qaU!;:p#z?tX^tc4weǻQ`Q8"qjmyK2 f$_ L:MrM:#r@@Hоhq<.0nբT:7 {U%R*,apB34}@FNIKSy X cof:?a|!^lS⾉-Xi:5mj=EK,Pg zsz,Վ ɫ[S1$?G#Z϶&Uoq @Y@ݘ)dzM dpnv0R$ad+P=5CN fSm{>(w73~3)]#YAd ZCQ'PBAZo͉,К<}x$4!"=(\ov.\Qq7 W ċfQ_C((GZ|*&٪9$v0*EvckK6kMz*&_em2y8_9MC14iD4_[ o',#ORݢۀÓ| _yJIFIj>ƻ Ud5-cdS%yHIq ]@LI9W,8:/2tᖅquJ{uyV}GQ}M8$mm0EJ?D IeU YSA :mZ֐UE▯fjAPAUCY= ]9 õQIୋ@vӴlՏ4(܎)aQx n+-_n|`bα3ΤotzȬ9BȿuuIUV6,4__Qο!74q3tFPh!rL(FȕS.JoؾO#nYligAy 7SہQ\u=PQPPBؗi2N֏"=C829!dU#g]N" ޘ4VQB4ҟ?_/G eA x9\px$CA4;Yw&EڡY_:4i&#5ji\᭦I dpfhSb/SkE c"bPm^tcF olun;ZSzA\*3N6^69[bT Xnk-xeBk{#$­+UI4;ogg>P+ys;[0;|7@aĠo}UY 8BbaӬn 8EduoRNo$hE)!10ui`Ȝ/BfFD4e6Et,Q>($=/c8+"eV\=^=@R>Ptjnoŏ ѹcl_̇b\JSOysJU|gcSV쿊`w \Xiym:UCmxb*N)57z]ĎN"U_7Aj6jTtB(qzzK3RA9"y %"He0ȬAz6~j(|e }Ec%&9Z@xT|ZTE1BsԦ5l||yOpզD$Z4mA"ܟ Z^gi>X\ 3]ӑdp Z6LV76a0I_>io&P[H 5rdFNĿwіݎ 53Ͼ o_Q8&>wraF/q'/OUٞ&Q ,B1kr6k!nՅDY0O;qߣZ6C I+k\}IPj|A{dta9+飀U l J\22DBu)vS4Gz".0%9\aʏ3~r$?n5ɀa([tZMmu˥jcOscq K}&]jnh_.gZvPRj#b:xQw J\"'ɪeQm/k&J=8fq1IrY+k {5 _Ka?ܺV%'/kuwJ/ߺ)0 0xji\IxXM~1/EH?BRVe<O~Z(6Un(Cā]7h[e'AbT9s,I^[!7VQ˂fO!5a+vR(X҉bBzN8?\߲!$tZ2E"'!۫[|6<Ŕic >!X׼mQ19H,`Gpu-quܴyM3&eXJ)FTw◅X}>݊@̻#S^IB*6t.aAۈn]c-`DHRp,Ughl%UDXTeUk iZAgEt&\Waw?L$;`)o?}Í٭ݴuC\=:EOylm6 \0v.b !*Cd~'@Nj)C!UG땎Ψj&WzZfxbׂ[l_!% /$QU[qKsGl5h+Wnz;<-늅3C&19Pu$ Z|s{!?e=ܩ?%Z`AjaE[)gfyдC qf=FXhe=9r{`}F\)\YÓEH ^#; ^*#ga(Bq Ы$rc4XU.|{|a`{%d;☶I+qFfF\&j0L?z6oIW.rzHc[, XBGQƏ!I^K6裶(+4ulVH =V"a ~ 2}8q23QQVS> ~/y7e{F) tn.6bNRݫ~?l]3OHhBP5sk"]{%!goT\(;9 {ĺ eڍ#^k Wkwwm?Z)#*FgUޝ:LBb_X.inRht]roeإ^qkEI1!s ƙ!-TQMJJ/.8gt6]]E{ebI ersu \@ʎ+%/ޙH8ks> ~${Gy{嶺 tιKmmH/J^ vP~zwI &p }IeŹ.j-ŪeeI|458) 4(rPW _L+ WaR=Ϯ 0 .o+tۋEݣ#huZbj~!m1(p0?Eحm9 I~/G!Ӹ6Q]S9C(Jwc2}gI[pm7̓s)w*4Y=V4%˭5nA4_sv &H|L t#;eZ鿽Uz* PDNt?{sF\*#?mjRcjl;] 5Be{q8I/SY-ȉDwƣi}ծϐ:i~]D2zwH!iEqq F' /F%kLn5MM)i6LTUaQ$cVkܽlS5GlK]pa¼߀JaVi- N0' yZ*JDU=%HASHdm4HݳUw항;1 CӾZ̉g ٠w0VoDaU sE'؞G߷}taK]9jg?'Ga6#z:f\2?$ 6ˋrVqkcZY,`;UJff6~ԶJL P1x%, 6q4I=835B1m9MOg9Fe@Z#V04c˸Ӵe`RO DE?b$nO\ ! 5vq;d ژ&͈RGeeP T b^aɭzJWҢ<_tW80w$ro/b=pz0JҪRED/cBx$]hIX]hC%lpY%a>:MOo3'ktx"5л`e y<ʛudZ-cLOTkYҿeܨ7bIEGJq0J?OdJ_s@\-pڏ؋Y=%5x< ߾oXt1/ S.=0]#Ҭ&fJX5@Ji(cMG^?&e&HUODJ .h±TvޗUI iAƆf${M0$fʁ}u9 ࢣc#5H0LAi>fԩWA!BXNAXHN -w`%vl:u}^#(dmհt&`? D,ӣks#kGj ZK<7w7ҞxWw'ɕd0ZcaAik,Ō$Gz2WJ]D:פ6Uq҉^2'sʀ%Ebަ<b|Y%hO<r2D$jSMTiGT%2`]Ƚ,Mc_PR-3~k3#yg 5&6luΞYV/; t-8'+`x+-'hSƲ@0'iqǭPސcoeҖH*9?a d6ҐQkn  ʮ~0!*Ki-ZS0drL9| `9 3XfuJ6yCݮ+*F[j-E`V(hܰ~H@m2!нȡCUl^T(J5IGRWD K^ἢ]j>ȵ{6BBպY4Ow~qb<w7O3$42^w*Aeqz2#nml2rd$]+mKbG˃ 9@N1ބAep$-!L ~FW6f1e)#u4aN6Q+(sÌ4(D> $!fZjƨvEPT*nfx/X֣zyTI`K'ny(D֮ =VGga0.. 5L*FNe)[Ou[9Ǿ {z  :x`&K8PAylLjᔽ: 8 zT.n41\sg2}d_T7?GSN}P,Ыs-Jaf{ FXAЦlzA6 1aw0Cz?} ,d9epX} ҖA{5Y%097೹zBހ<4b}/}?hǑuOQ=A-O6/va*֩*3s6dؖ9մXhVU=u=w테l*=*sz@ha4쁐ǕR&ͩ}c9}FXX1 16x0ìZ4)`X1Q277.\bh-gϻK9Dݘ`Ey_dF&D#|r1?jCfX! šumQ&"E\xlIo.ِ3u2p1 7~8Xv'/}KBl&!xӽ?H}jj^U y"8?<Tv#+U[=oTz(~bLaRΨ{&p\ 6dVw͑SRЯ Ler 7OPjī<<u'4Azo$C3PFH?p\I;ՌAIJ(lSyPSe$@ɛէT)1=H&xRQ] ptWsأ6w 0(|  ([&"Xy|)#}3vBN_o$OGH݇eb8*^ޮdt=~˱⨫(Xo"!S^o%s"=# VѶ*}ɩ;Z#>޼y̎) P`Σn26N.8nW&lG `\|j/۟ʧ _(gkevU%2%+CP?n?#پr_OhW7FԎ\G>raym,ʙ<ɓf)VyOoz6{~+>Qe8OhKAb.j~R]߸d^h(B7`oϕlWM|31rԚ)%qA{&gѤ h/KcErXCĜ׳4kΤo9 LJ?{<и\xi֓EmB($=Clc8U' {tt2NY{cmS ռ!f*PP쏾:3gۂ_v Ja$\N֎,7 N'Ŝj?*X3VaذC>& "> 0F?Vb88K$ƒ3~{׸rw?n~l͓(7'ߡ}PR<{ r$)*a^/cMwŶsf9MtkՇoUA4ͅJi::tZ2ʝq8ǞRzŇzHe8C%/p\=;nDH)FT9rtn yB1=,H.Yml kDk}epO4eQʞ=RímR81ND ~4/KmUN1l$䕡zJ֫``{T\>_e95DOp`>IYfQ]8Dq Y= ]x*آ$=66i;MƓГ99ȏܕϢOFecsx,CeEv[vf,ǹ.7dȢݖnd%bYZ}2j-Lkm匈Y9&|sCu.Yyq唸ٴ;xYהIT˰Z~uJ*'P9Zw%^֚$U!P{놔u4'%Y-bˮ9Ո9@=-D>>pZ`@6bp!.:Ϙ}^YHSd+'a`Lix6:VN c tU̜[^Rnv:?i9Ϛ3eN0T _eYОQ6~tg=6-LbA3ʑTlRɚNQ=MVx{,&K\+G6|)}oo:=FFdde'߸u$HHn%vT8Qc ~Ds(8|+PS-6ubGWȵV kwۚR:R`#"o0Gywe>[9;{,#f#!;!k{QF!ld*tU!?vXrלA6$vQR PǂuluN܍h3!V[ Fw 7VdCh󅐖-. CQ>_CIJcSmB޲+_U"p2 =5{Dx}`>^vPYYFY2>~‘I98Xz!O̵L0iȊ Гi[|m'%Nyk|w J#66/u<^qK~ <@o0ѦPH|Ta}-U*Agf @ -2+Z YFבBAA,7 R]Tl{UD\?D9p@&$̡&3aN ٳ Ho;[WPdfüυ(xKepIܠί 4@w`4- (*1Sjl;Ɔ~C"gTwz=^ԁiøfg%V-b!˓W5C'€53H1>f;oH_ݐ)z6~١ =jdyK?%'믃N G]^}l4ұ2Xfĉ$%t'~E49 @!!knYjL̸0S+Q  ]VT)݇34X5:-:1)4EYrՕTuyy0yՊ{-] PRh>k <"2pګ3J"eh'ލQ}?L*iqBn2DNjv>bɬ،сq}^k^ޟ@[U& Eih<$ejX_UdY> E$hTgT}*=bN(hyќY'כyKmnEaMٷ}Y8~#~ϑxC` [\MgKZn}C zP1Ǽ4cLAl+ƤJ._ඵ}6!^:ϼtú)l7 -/h;P.MS*|mym0v%&:ţя*J!=]x+ufV=|~#&%ug~1}I{S E/9N$+1@hI}b5T&=̧-t!{eeAC"Ld8-Ca_ղӶ$yؘ+Ղ,>wtmô-g)Iñ񾨡_@]ݐʘOl4K"~tJ6U`n$ݰ̆RuOy`DJaϯWui oPOպ k>BR9.3V0 J 7KS^m%N$cOr **z^zaCH#X ClzCV0P`C;Ny(A&10y[^F% KPe_zOV:)ZFgBK9@jZҊt_h\=ѧ>R3sOfݨkdU>]\эͷ֠L,dDlnW\pboS_x2APF_4,e̕@#9EUoM,L:YfPxدﮬ^Lq6&Muø8\ue*W2{?Xo:T`Q! _X38:DSQ]}0d$%w 6^FV:"v 8d;K*Er_t!h{  ͮB1X=:rYݸc<BYwM2s{z͎3}0̰6H[{*MSzHh.a$Qf,5/پ65bHxXd)s_14:q vsmKQh{6Zʋ'hɟJ؎E^۟R\՜YTz8 S62/Ɇ8 D`W)Y;c2G* ԡ5KrJ(v[vvsՅB D^)ԗjw̌ˈQFBWgV=*.Fmj\)`0-ci2t`M[+nT\9!wal eZ O@>H)~>Qw*," T@5kMw!Qi"O{sWrk1~ w1QU~1?otEr;OKO:&R ̴:9>OXP;Ok 0jVSS.ʮZ) ݅[v<{^F?Hv9aRcg$ Ӷriy `}RS F~Z6G7q\nY#YYʟ: Q,بV:~S)ztkl{gi(f9,e(>2,jAk*npQԸ33[~]3)-(Gc{?oؠg+eKJVAoB3_-ةҤTRAB.5!9} =2/݉2:A]zNB5&׮ag*z QPĜz0@q&afoe3nj]o6*6"ǷцQ{c^TiQEI}>b4UVr x0*Sd溃SB@Kaw.xWhǔP0e *A I'igSpGhc>"X36ve{11F4n}=޶ku M%slp;\x3d u72v]ؠ#A>2RUq͕ٯ MP9dܙQ!0K B_)h+%R';mUuxq8*?1 !/"D"_ZC%-2FߗXnh)_shV'Yo!HMz\&V~]>j#d+֘Ŋ:ڑdU|2y {}8 h- ޒgZ"!k&pe!0ecdЃ5%2"ŃC"8*N:KdJk a "ާa}1`7cL3DeMcLuIl!=gfSkBڀy_0v%nrTm \^R*ߩQmOrݪdR]501oA#BM|ޓBHlH.JXX40Lq -Bc6Ŧ9d×CExlO(k˭Upop%pY('6v[ӹ5#.N|y+xG| C{57ۄ$lFt׬ʼn["\9t^ p#aBn4yO l~ Y05?|BQC"i zj,~4 L!%gk0 =,K.%#7 ZItA'ߕ 1e@z=X۶4$G,b5eK22\B9ؘ7,ǢbT(y$U%ljwYl?@gtؠS2j|nu T-3G0;i@?VM<)<FbY=~3s3+1S}*" /fWv/$PzOuޯ.~";_FxRFhBAs9V&5Uw#g|ډUƥR^+N2AGQ]jTIH(}(F4F * 9zѺ~[T{&JFJn/o?h(#o "rc؇ ^V}&HH 1@H-m{&,ɱ-`Mi' qܻ%w*$\&]VӜۃ"Q%ÌaUn;"TLvBN,zL NM]RGJ&Ŷ [u>mٷRdexh/w<).MƓ$qGFC#٘lκ;~AOYJ.n"c} UE#ʒbL`xij\,j@bޓn;DHY"sA<O9I! i_91^1'JI|mMMJ] )Wk S0)I"Ht0_v|<@ V^0ͣM t)IԄ|9q{!!OJ9iq6?3V@6]DB9 Yr#oU:[IWGVs֨5+FUr#s.eMzGD: vPbFO˶39ZZJF4n4s5 [-*Egu@6q ])5RX"2~0&s:LTm%*'IKlLiL!:7&fV1 G>ku/Tg?v|EI>pHލ﷝$p_idnjgowd28=`g[aE?I%%n8-(oS9Y9~x-(HE;`~v n dy֚WFNd%p [3;0U[7ʘѴbҠpBZk1ő;(ȡr*3Z8J'? 4Jɦt*k!6T4|!n4/V$ʚN+qQ>$oMf(%.3߻>!_ q~vKH։(0zP/T+TLgBVdh,Ofm?4~Isrls' B-7he1`TY@MƌJ M$@A1l+`(*lFܿIv`6ʰDEJlz@ny)ְCEu Q Ml |g-lm|AiOc9awv߉ ɐX>638&'Rb CBETD k8HylgOaZЂ8Ͻw*4Qg ƱV(AwnvKH~aZUzMx%*: \)L0btŌeU9o 4GXK/08{lĽ;FBgY'|~H.h`vph#8 *Abߞ֣ G;NS~HAWcg T.^ۧyQ LM@@S=N2=:[zq\ʼn%sI& _q>&^m|`)֩Jj=7?h5RαlX _sN_lOk |o|~Dm89D W9sٜӠTY':A4U}zaZ>6CF{s44C"b_Lѳ!K}:gOm`iOmYS !ǚz1Vb/" wh,Ǔ",cuxa,g!|xDQ| Z"SNl][(c<s.F\J\3H#_AZ)e6|8 xIph ]<.lّw? %jcJie\wT!HÓQ7鈇O9k:,j@1zEPTB$QէJfFs3̻=y JXtypө%I! ԆHCaP7Ƥqz+xl.ZX*=8cX< &R4< k+Y/Oe|؆u/Ig{Z]nttߝ1¥e8@uЦ,Z'܎$dS3K; SX验cB/iRzP9VcXBZ?jD1\*N jwc&nI> %"kJiv0H,B3e^!N"M3Ա,%r8KkE[  s431WP3lfa|^r9_^ЈЛ Pptb,mlqϷGZR@%BaKjjZx#,:mw5,3[Pxx9C~4EES>Wj'1]͈3b.iMiO 4'?5Hi \_}P#@NL92p9jk+$lX}JK Z+ =+d0ZFrhم+NNgBN8b<3Y^ 淈+/b%I`'URI;0"{. YwLdkȈ`EU]62mp~DC/*i2M@8ѷ50-2ံk (rlLaWd`s;чǚ,pɛA7f+Q5۬[`jӨGVFdzْ֧0F@υ5uݐge+.׼Ua2?i6?P<7h|L֧&߬Vfft&E?-1j?5coҌYpʞDA@,`]C)g.';m% |# d~̰ 4^9TطHc D0H5~W m\b|o>jov 83I}6d3hyɴebs4>L]Jv]wwvQpvUb!˹9ŀlNI =TV 6iu(RL,eX6"hoq||ƨ.w"M3;iҶ\wqu +Ga~Ct3ť]LJ,ֲvu%;@?v ;,ZkSDD0sq]]ɧ 2Dt'hXnYBC'IL3xNٟ`:UJ P hpV:) brwD˜,ϳ)?;Uo n%:y.8zԔųFB7,<֒zY-.)ʺߵ% ꌼZGeT鋄UV7B꣤:Zݝc2p <('Om"&g )ZS xpi蘕o Pp]JCS)A$^-*B$kc-BĕCow켟8{YXC)߲3JQ~Ӫir]"V e<ͩ %s+|Ħ`>#P8y-O,:ʳywp?Y&̦;n|x>iB?MHV-30!Դ3(9C\uz|0Y4)廢aȭpū7֭D3o|R? Z+Թ|6yԱ/B3/[ r訃ّכYy&E [O <,ҡ 泊<+s,sM)STB5Bdx4"]w"D@Y{;e?4wWCp "t2II)$@ytJrIcr8zD:jv<=*d{pC ȈxhtˊzC +t9ef)9[ǂDnMarMFvM} f#O|>; "~*Ya.sHa3K~ұIo7bޑ!o{n(kLǜ\<~aBm!9! *"SdBgNS 밿Vauf쎅7*#NaU4CsO8j~fl0uk1U'S?CS(Btr~ͳbi]{ʊ}R IBd=i3mm%Ý}@'[uy>Gt2&Z| WsSd\2,xVfc_8A1+Ҥ} G'8Yeerx'-O'FgC> +f:?(>xaS\LWu~cQϿ8o߹NQ(Rm5QV ko K|^V zq+h!W!80N,m5"^o'=i">Ύ -w&m+7h%D&CQحE@35'zBǫaW~~qcm^t*E[QT@MWNJcX*qr2h^e^0v2_LK0&I|X-ý9[E-UUVWV.镧*WSd_"2d._et'FjNϞ ^I4L ]mp^AXIAm+ &O7B*S:oziVTGˎe| YTp7ލ0z8Tw#tQ=+3fo8$X.T ^y`P!\r|BSA ցt/,rj:$c 48yy`|tcjJ EXP.l6;p} 1̔njC@,PZDAT:Zl'UPǺbՅ-bhf&I֯W9᧫_H3ؕM9dd^㎅9}~Hp̨v%Sz9MS8\ Mû>-_, S|3!p&-:/ԌE {:YrP~/!s5 CTZfk7ם\(]a|> ! \yt<%AiUmƚP:,J;mXat64sheNj^P}Dh]' /@Vg 3mxQJ:g?'w?]ۊ_ğ3JL=L 5.O,ʧ,/xE`DoR/ 2`DYML(*!B,@J(_7?LD`AJcCH}l)K.v#.vZTu>(Y/,^[sΌ1}0 ွ֔K QI#}Hbk^ٵ0GMթĬSqI3Ww DB~$q:]]k2(T+,$wnyaJxKĈ[8z. ^qd\%v3e'ztd4,hYiA3b^ˁ(Ufmt}wɼ@$iaLgtiEtX! "bL=o(8Z=9.>4?+s/z"/”ʿZy @tv>M; %X@ũ6^a)z3s ;f%*zKA aܡK}W әͩ归 fOvt]+SPߣDUۡ9ĖobKʤwB?IQWd>͎c==2e/DXs!8/ dSsMj.%>|[-_pTe,4Y颧ACֽzX3i<:@HLNNr5ţtI #rh &h-74/2 r-l߹\3,ժd { km꠫65~iMA0}+ 6Jx/ÅQXvO[4<{4.dj[Càc"KTK+Z`BA ,c9ӄQXI#xU-P*Qn=Y =,+]MB'8NP7Nޟz;._ئ M uDFXyhYOPyDdBuxwJw] n"n-YOf̓ y8eՓ h`q3P"hZ_I٣f24 N.s#4xn\A%NY'z[GsMгߊl'CvM[_KO1DBJi5ktָosmUn7Lqyyy*^4΄MDn&bN;g;^`GG{;;Cįؖr -5>YWm °EPV /DTVCqԔ{ )ul43'sgmw-E\+ g ׅN3t*.;EE%+8bt'שW6[9+wD5$<հ8sg˓|jiS`=ʓj1^ A>D6Or_|Q22o=0̼`οSD_풋: OM&1B!XWѯi&Z sN=Z{ )"`l *^} %H9ZUqwU&p&uZDN/fc2W8K[֊Eh1}K3SduCOa+֜:d?h11Ʉ`ٺ*Oը⻬chU4rS !S\`C$]T>9[ǫn6lE(jhd V4/11Ggi@V?¹s)q&Ћ_b,bq[^p w u.Ud>mf3wҨkl ϯI(Gb^PЯlA:5<h fI@ģ?xLAྂѦ}XP<E㈥rԌWJckJ19 CK .Bː|kz󒐷5:wKoB0oRR֤S5e-,4%\+s퍱7F@zc@$b^9 LyTJiB)D|4 GQ<Y)CWG~"Hc)R6/IZbWX_F}Djk]OI K-y!Y.;]mcu K wo}.6Pћv ?Ty-Ux5"Cg7w &;eڌFz{[U Ma1ԩުsY.cwJ_Z O\ۑ,ng67OCtEM w•I}qoRxVg8Cn![I]wZv͇#xhB&e :7sHeMyO! -!iGZsZ(g;Y,F&Ĕ8w7L0b4Co ]UΞd!ELk)fx rT_HtAޓW!w%Q聁I ?p aDgb~ 8%(*t5 p?s5 p7`16-dQ*j)!h7,% )bgx~;eȭJKh >G9PplC&5J v8N[L;&r0m6ZlaUø|?`pKisb3n`B9e7ȱLqHްy^u#;_V<3`?̾r\ҪYía>sC0.rkܙ.A!{'?r=&'ʑGN3!Ԗ W?p , (NgX1bƙi]Zrs33ö=C0"WOtR5MnZd-80,>ȾOzt@7{ dMn넄rRo.ÝIUNˡ415阎ڸscL`IXXtK3z I1R/mLL&=v9kI6(a)$D8Pc[Tz0]l+w9_pNj4R-fW< q+Կf <;o|S0荥zE҈PצE.̆Ջ6?} ONrؔ Pa-Q7s L75f[YTϺVˆ-@ptVL2!v}!ekd*nje wP-﯊>8"Zez{t:9LY{TҘFjT7x0%Ow.7cyRJrxZ;X;)VHjZb+ܕlw!>[w(yDnr wq5t|6~| KbCf_Fq|Sڰ@L(&c?(fP|%9{_ {qwqRi{GVs ÞZ#Y[]Bzst7x!2^!|QsXW36Z@q)f,~ډ2U>Ig/R"B´8 O{g>zūR#GD~4֢9 5%jְ~$LQIRm2>:1m95-%K0(ٜqš+43=Hg{"Ӣbݍ8PgHlcs~5pmOLND*%9` <4S+R#C_k*#k^> 'GmH s=J2o#%qK4$u=4Gr*ާ鹮9SG:hOj5;n&KVzܫHM3.6k?HPh92_{i n ?|A3/7o}nжQeZGeBZoN6EޗB4{31%2$h%Gp199(u4бH|dpP vñ7!Y;!^^(ȩKNJb2 N?b(.(ЯRIk=m7r")V|Lzf5:oLzo/g@wk;]mi&7/$K͗N'Y%4|XO4-j5}|Lӂٰܸ?Z^5YI6N h$,hJ2$~4mȂ"٥zAq0`'$1BT2Tۥ Mdx\nXu}B! \thk]Hh8̑;T.̬Y{ob3 :<M6J~s8k1_*Nߛ }W҄Hko*-ze(s;:J>[UV+ s̭x%pn2 j8 A^ZqK`."TP]>i}~}ZE,= pJ[!}2lW2a徙ef'q 4) u2H[~OS;pw|T|GR'(a,%5EwQ`)^0!4r94%Wny8QDet0K= O!K^nm$ݯs)"y;3I%Ŏx| F_c@f-2*>y 3GJJ;X;w֘jrEiW#9~8|Sȯ fIRvmͷ Er"tamLhB V8f2/tpX`?..]l$ʣ*1J*y#+Epv7/j Ů1/s9/e\%]BIhP^H()='9hǼ͛K瀸LxQD,׿S~(0k#^ϔ1 fm: ,(ѻ[Q;W1`"zz4zm:[;+kf5,D:%Vs[݃&'n;t]=ZL,JTe*(^=O) N?LEUVi ަZ7G,x8t'ͳ_ {iR ;7՛nk? ,*_Px-CgREWi#x$uꓭB%+TJҔ"pPZB*z~`2s 0WD8`J9od{vXkX_E|-=Od%OcDex;Z#yGJ(TǫC#V;+HWH_[B^WKwNiqxCd6Szj,q7n'᪐hCI&J @X`[X#fӳҾ%wD` OM0j*fX'񛜉'U{o+n9Mfiњ{6cnD]/ǹ@d;,ԃ: d OƫŮ5ffW\Cᶹ əHt.9h\3(Ѓ}S=<oʙ7vAiFz*^8J(DUe ҏ%/fC*/dƄz50X?GBӝF vTk;3h'1<|ٺSx+r_rؒǜ45=®a;nilY}hqtK4b._p^vSfDĝqAر˨A4x)_BG_Jo $MKzEZhvaF~8бt~5;?b/{_U`| |1 8EtPXp)Way և@2RcsTmL-/;+^l76A SkR9ָSGeom/8'|#uvЇj. {M刘s%#e8>]I7;&5YW8pn~LaGwY_8 8K8hynܮTbr@y coaݬ1ts- vs YH10lזzĭW"<tLO}0I3P]+m6%zq>Z- )2)8 ! .vN Ogaj[|ZvQt}qp& :zՄyp'[9a>V˔bdjzc: `(LjtW#}~3BX;qqwM/ѩR4v/#EVKmJh|e4Jr3̃\/euq )nMqI+.@ ")Wq;؎ԯtox nBJDgJ'.5MBfQRj4\?F`^|OB(J>nXc,ujUU6n@:IV'Z~!1(m5c~W"rٗp{#s Ya6.sruKRQxx|O-S2#I{71^)fcQ`!)z\HJQPwWCZ(t4B싱/m7^ BpyJҠNtkCޏ[=E IH~hCxn8@0Hp:hDO]B!R V0 fJүÿrc9pXުEI]oc9Ej/ʝ}bx#FnSMPk{17 ΌFNUZa"Y*3K>O>_D0]3%}L)(oF >~l3yKF}kU6fGo+nN(BݰE)h졤cnN~o_ |́ k8/JNL:$/ ]2p*/ilFOJSW(i9<~abl99 y!'+ieB /Ld}"ѤDrDjmƁW2F82bAI J*_ϨGB8f3M%89;FB~]1k˿!^҅xd svVu3!/x?̼^8^)UqSj? U"r 8pu6V}IB_0B7O|$ Ái.iҰB%f0wT1 4 /_[c}G^ -} f(|sFuk:Iq) EKۤ-6}S.쬠־ƩP߰?:^^[zF7\4އjbڪ-{):Xw( 1H12ta* '\ |m#gL%T [* \?]ۃK@*`}hnB"6ݦAG 15q.Fk.n )o3M~Ѓ no1GY)5S;%6O<tqe 6Rn嵃%q/;wiwe^~/Z*dk5-@E:9#2hB<ϐ0+)U3MUѣ0ytQx5!o}?:'@T. ?Eui5<'!{J_tB1wås8=&3Vp|[#rWE.%LhThI5+cNv^$vO@s̯(,x,3gT=d Yai!cD\wg{yJ7ߣ'v@WU O #!Ԉ2 l!<24I}wXIc{ uY集i]&hK2 G_* ud^ܩ|ҙςNI>`s?_pȷ#Da!\ZS-,s~|@Pʣp3LYS0{ѹ=WFY*BlIx aF-IΆؙ#GX7biBd9} q=R)AT]][te=<~쁤wjcW w߆N9*=CJصJMw1uᷴ_M]Wbv֌p7,-+eDgB-5 ?0@w ;u08<::>E{y*T ۶P@?HuXRrQBr e8x)7fT1<>\FL96GF $̸Hy0.cu}&,@tžʠ/4j7:2D&7 vjy}C bTu-ӥm\xT~'Yl-;pH]wvq#tErQ(nIhJX8I1bFXI8 A,|z2?4(wQ֕]wp-_;Rf :ad|޴:%O U_LMn"jfyOuXJZEĕTx$SoȄ>!r3ފff|Xy3Z#?nNiHX̩u9e\iMw#l:LRos-\''CnBdLƓ,Ѿ- }1,M9P6I[)cDJ}ՕuZ JD|5&cX⒲ {<e ǾUғE(,6Tlkcj(_o^z;@^%!Iv>6k ϫai>Jʇ7o?UD|h{\kh)F 2:êAw&rʚH` V#eq^W@t3K4SKHf:19bxhTK5!7K;+'+&\E\,]0B!7qQ6D+EF4m" fonU : }wԇ6b%n4kt+>̠ujryZ؀'g0- QvI\&7eQg08\/R[tT;УA_snџIqG?3,Z.:ͱo`鰎8Fޑ_nǡ .LOp(MŒsEfRཟ>}$vd'0`#Y7+L$(&_hI`R \a ǚ 5R.Vyhm #JbXES:W.T?~ܖ|jR0Q_&T5)0Gb!oŗ^v'du|6JlM^ ђ#=+bẽ5qz|Sρ 3K-}Lbyy8pQ I5w6_?ߩD1`(;ѦmZCHer*6`f]t~_W@C|K07hEx?=S~8kjAjp7Lܐ 4o@_Ht_Vc.K@06.]Z#%f}Q =I IRΧ1W/ۼ;g.P?('cդC`Q{89$S2(J8.òd'?.F) $=Q# H"D/$lx{hYSҜIs(v]},].$\zLч:ѩKK?T) ?Ӕ#Jg:{q+1l/Zwf@w{j&FFNp0ꂤG/PI=RKx|ډks6D",ɱ&S@ı RMA^(K؎^B|-Zn05YWfʕ(/BU&-3 XqW֊fN'qۆdu3ʉn]gc;OR+nwфd?L~d̻?BWjh dMG xp 򳋞ޓ:cRE/ OF8k&=?/Ju*(qK+D:b9^ hJP~LD#VoYoYX9,1t$!qŹG4Iɜau]"pVe Ӹ,<}=.ϚW\],[A :+P>*Z&V;KoT"D`yhGѲ#%O`Vfͷa\F|J"lǛ3inp&-lwxc"F|:M1dXIXo ҁ u$6|ض< 3^'ev^{j&k#H,3V-x!1Z` ,JSǰMTB177zTv e@?jnx3cL LX Uo<}gQ< ?d68h*QY,&pMm OODe׈7X>ב88,ZC1r' Gr/\pϾ'*>D9GỊf׋ˠ6$6o"<]J\c #I1]qQ^@KJހAME.qHj~)SoL뤣1:n]Tkb+zϼ~?8 L\N #Zo#9W7+>h&ΓfedUѺr*VϔjdG9Lco?5m s׻AWϺ9QLʀ1 |1c;ۘX$b 0 C軕QCf3 +5VrhQ>*4[-ՂE麰=(XZP~u}jP[d U/+sj-Ϊ^c&1iC}/d@Fa8T_POZ?rD&͜k` Kጧʨ ә;wU@9ZKuaeV9̇Ku:>׷\#)`htva^ZedRP/I(*>0r4PQM}8FiJ_:|B7b#\ C*mW={à3\kJ/:fm¿&nVP>?W^Vӳ?KsbB':`|d͎@WacL&ԓRNI7_ _E5avdYP7D_Hc[{)80J{x6Zad2NLRl%o[5'`7hzɛ  S䈋FM!qK9H$C/b)|ZguvN홉",yoFz¿3FzԌ({AMދfmRQIP9PyO 0ؿc`+kX5k/&T@; x{&_ځi|]3=9['fǪ̤}@ڵ9"h r%T]H֯Ă9 XXC&V:Vh z7([~sIk40H7Sk|\lث?OkħZv+aL"IeF'$%Kg>~!3KTl>#_7 $qm?}E KID%" +WۀӁ/CrY|.%z ł#_'*Ni8ٓ07;h#l3miVKR( K;tv?A#VihmَHHFCzcQyB2p,Y 0jJ ͍ I,t؄L.|o\[Y{\7~.?+I20]J!}t)2Y!ظR Z\/Nųp- \,= GU5ף "BQ[\_8|%6MEI>v~p#*゚ ׼bGյt:&$tF(M OGq}a`UEjS.G>h1 ~UqM`StɣۉHpY[kqճ|I''EH}j tnkj [A.@Ot3BqUWFTFC9 JHHlkg'q(&f"$-Ьf5YQ@z>>k86&LTա$tL Q"K$^l'Eo#X5{0Pҁ\VZ{J=2e0%ّ¥Uʣ[ɧ * CʦN:HJH~TYD`e`}hn}CѪpu "߾}&u;jp֡'Tvm?n}7QCnG3mS4e iL"R xbh6ecż )1`NG3ɳSmc u;iВ:*Mr'UvB5=&VJRo+lc65)~SK?p~^@-4zO/3 J_ U0"/r!d^th|:tOڏupa TUS{[ ׌o )uG$>N8뵗Qq2~z;pY1=2D}Qī(im^fAZB}Ja#hD;u>E{CxvO2ǫ'܁CI -;;Gѳ~c.S"ˋ4d<)s^z%:<⪂["aj"ßKC攓iÚVh ːt!n+1"qY/xkKMuGX&X4&+_m XnhO hԥ4O(W`s)B'40{ଏœ6u~d)n<iZw8u VfSCFp`}UXKAun*sَsGRgx?C*bl%~>&W c8 3?|Lg`ovA 1h!{ EAÆoe?;ĹR`:W\/TCt|4Y? >V~‡~u ʪSxrn/QP^2yO/!BEIvǦQeV[M,&1I'OIw =/gb EUp2i5lvKӀv,CpGK*E99$ 'O٭WT?y{Cb>c=繱ɿH8XCxz{ֻYM\3X$oH+\֟j5"ȃIjWMˢ4F7 ;w buA= =4aU䵕~{ t\/GdZ>M[Uv(v wsz}"|R]-]sҾ c lHL0u圑ʿgB.Fė=Os@J5옡̕9GUi֮ڡEcW͆@bZe(;8)ƒsL _ *VJ KA7غ|ؘ0KY P94d<}f7yMF#[o;~>CvWsa:#`:g lc0%*JI;bW2u%_K&r);R ] >|DxG=Zل 0i j-P:JG呛ۭ/EC"zjP_OuZh2p@pÃkK)Ù :MikwݗwcT#j؜ej-,79f٦ Joq? 4$3vfn+hӗ9(>5[FN)kU 8%03ZQ p\F+f9-1C5uvFHWjwC6sg#EL$L ^&^@Ō84a$bXC.rD_8ZJ"SYWx=\ ,(>i" 61.=rtƒ^MVs7Oֲw?spCxFo!dAZWĸv>xܩ?JtPIsAZU qI5g4F*~Ibb]ӳX_*߻;}aRג1B9:r~`\/ʯ')T$]-yA@˳>rBCU=ѧD蛯1!Jcؒ+rҒyky6~ 兌YY'C*djﺖJoPjOzmwvx\pt]O"gW8qbC+^a>߅\ ym^Pw6ebB yGV~Wr7D'kέ{<FF@S厶 +#X3Fּ)¶\-ZQs!Yh.}m6LXx<vE~,rpiYeXOJZFV+d9F5 g[G fnz'tebyi`) gaduu:df";eU9Tl>f\R3[IE!e~Vjv ]^-WT^C{N*m?{QC{Q#՚v+0H.`4 *nPt^? M8;e`zFuS\+[xoe;d$b YH=Ufn[s[**eä%!= kLWMp0G6.m<畀sa2~6ftt0!%Pcg*7{=rRb 3Xϰ|nq'lOZ̶GC zW#2KGk\FM`0;ȸ;N 3[kyi@&'Daatևlo6gnJufp%CBm{%'{v,Tdp8?Jvdl\1cѡ,M7!@W,quC+;7g5.9[RA @TW{.x?,tEM?Pw=ݻ$sWJτwRtEG#k&ʇL[m&rƯ-Z + B|wQxZ8F0F;֦-6 239+xjgGoxྏZ ¹wlARj_8"8}w"7rҿC Qf6Ms8>3iVǙ#nЬ bg5G1"\"b3u%CH< i/ޥX%1BmnaD?޸hIWf\!PQ2vr;:݌tMO!ޗfe~%!5 <Ms߹M{m_̾u#t.ĬbjkLM@8#ƇE{K V|Y7;(~@w$~E<-"\Hn:{JbYI1][ƭ Ǫ1+ \+&A8k B>5~ wJ+4<1mӱu0eI+fweTWܝ3_TD{IJ{JUu hHsga[ e0ߚvduks7m-AOs{]qL<6H߱: 31F.7_]q[ki!F B5yrF7r/*gxE1Q.x(R%f+'U HYT;0D= 腬%߈!,| .4Y'eG+ *m_DRiNx[y T_D5#NhLܰW`$"LJ6cg+505_i*S;zlef_|q=.MG)?3Qo HdfksOhI k5ߏΎFU*%J@yZZloޑqF"0n9"Ze=ftjm-2T)=JȮʋ6TB`lޙ{e0~\ z @Dka[]D-~O4}*j->PomL4A(B`ĞKE߂BQd{ +{RBԌIے56x{хO`v8%Gh;&nϩ ~= .<Ɗs7;m8 I,52ɯz,TN1=p L=ҭyF%|\ 7C?Q30g߽7ŗfʞ-: 7,_n1ݼ6& gyIK"*HLXUDxj?!{p^1-: [Ӽ2{׏f_pK4ނdTާz?(\6fmom=,n =B>Ae7Lkҷ%)oQj]Q-GtHF [9)ayۣDbϻeYgJR4iyfvi1H0ߨ׭fې Kjcs!N^r *Apg$$z?cTt*BxQr_٧eќ-w(^LDYgQP>C]a/~_]ڛ37?8OVh^c]H{#Ͽx+q='G斒CJ~7C82f.+Z|}j1-Wҳ"S3f|L4c,a3pHt;҈ĭk %Ty/B)\Х7>&\B* KIƼZ22 UNg.A9AF8ydK^7+$+|o VR'o60z&ơ9t!0tU FSv./ۣB٢FL81<WLaՋ_CjtDp:Qw'}"x(]0qtb?*{~L{#Kvad+I-2ӳ!Ր̞+l#k3 ʃVqdΓt$GDQI\9C*1˽`/ ![{VYWВO[ahB/ sGn EմQ1C_^ֆ,Jw|fې&'հIިddI,C*ꔂP$A7 C(ҵWzg8-c47;{~).D =@3C@IN&BM4;GSIލI~9##U*&UkduÀ݁Cu$-⏙Ոf0O78hCfOBr4iIН~Į# ߼'Msy}4.WnI}ߖ{Vp'ґ-;YV#8grEe=0@޽B%a(+B1|]G5p׊Euh]U7z7'|Lej}`2eiXߓUWFωI]ckoQ  n> A+>`. qd9r_j Stx(>wd!A$(cT'5⎈65(>؞*F@&,3,Faa}`^OA1+nb2@k.=]E+8{$/ ^B]%խ.MS%aaZ{+8}-9FaG2FЮ}j3Q%ni@wR2Eo LkA mQ0%aF粴6;⩦.Nf ÎϯR~3zuFՅks؉||A `}%Rd%9:&^^"MNPn$4$x%Q8fZ,ܪ c n{LqC0xc:ef288п~K. vDS31m]*ac򲐼 CKڇN@8ҭ~6gF1rx4qHsSG@:lOӈPeX',j|ap>KC/'"WWvMGi?ɂ -+C?gF  =A gz1Nkuv/6NNv [ B97_ܯ6wzfNi#= Vo0Kp_6^D)qR?*eY q:[m"=(<{TAi6fGΎeY9si%RҢ3"9{U]%3nW&6tcvc1pC2tSn3AыOE&V+MRELwc^p-C28}Q.aT6vlަU}wމJEk  ū r3鼊+ /F.W띘384"B;ƿw_5=UB#@PZiWn>αGMP_]\=sG[9*]FtP>Vz"<_GMY{kfWAM_0# u"#cͣJHv.N鎶Ie`(LR*eyJUN`4`˨]˧)u5H`iȊ79eӇ,ie?do quZCl'x?r$ȑt?%sZ'̶cFhˤύNyb"%z"wߧ[,t}g*! xkξ".@mkccnU-pJ?ӛ́鈵홮JqlO?>>&ʟ)[>6C+,]CzAQ=FbjeJ ωtB<]a@ &EƙK/ Α-TP&:w0h㏳5kۤ@WUyaڕHesFtN'$vqpɖ3EH[w+8b%?V~*Uz:\b;4=?Oa 8@uSLw5aCl Є U6#Z.A>SN0b܂e iW)&Mj߅*QވC„@f@NVBC~L|5ȝjTy LuÀ5 q+xn4}?Vߜ-\&kt[?N$:e|紿3"vGg~+*H8~OT4bz}|דᤥt9g!oT婃a'D `\z EeHY@>[a2e~zm`r]0]V![6tL7r51N4KM)v'ihVDd$`w؉D뼯u±T[XsVޜȥm7G=-@\loVFmBd`UzB E*ds]dR .5ƶUWq;bޛ>.Uo,s> }ʁ>ZPrv` 5d?0 k_ $?{*PuъU~jtPC!)e,flzfH{ j6])Qr#$zb0y@ X&3$Gȸo(5I4+72 (Cu6'ꎀsPL܋-i֖g狂҂)DJ!RTY~ -XBns"3zV,XHsM3ތ:OQ&VWtNeݲܭKWnO#J߽JΏ3n:xK m ӡ]V5P21.h~OymR (:!FՔS1#Q"UeV$F6S[-I\RH&8gs;yk8iKFH]3>n*IxEHǀۉzHKbYPN`@<('ǘ 86O):6jwAsH ʝd)L;xٳؚnS~6ʭͲHy~DdT f>HpLNE_åAmG!tr=y g/<{w egM*n*]]Xyu wK3o|oYj\#Q`R3, _F]9|uЫKE*!c1V7͓Tk. JKK" P)nI6h jۡM6{- +U3kfWAFr ž5:Qu6U8ޣF k6dW 챺E\ ^`eS\ H=ޥ0wG{}2e jS2xp6a mu)z8f=1޽횮S7i/cNJ8h%!.Ek8fBͮ&ĶfӰ46U/;Ļגz6xy!:"n7{s380di)`rl};=+o@ODO |Fcv6Fgtktd7S9+Ƣsy6enͅJ&DFA!@ Iː/^k8_^0!lݮ_3QM+(FtW,׍?h$0)g].L;f~p z z)3 !e(;/,^ԠBPM<9r<F?4tt*75z81T1PJ܁뚆SL2A%dHn r<U= 3EXSto'i\2/ƱVlxlU`O1NT1B#Ļ.G ٦(R!jU/zhE/&`*H@aѣsK@"Ѥwco9!ٯ^^eu͖4н֪XT#g\"pʌRQ(S:S%a]he+0jJ&#ipx br2In#x~Jv1I!+rC1nn5x)tmc*ntja99v&ղXZ>Yng @ݞp>FI_x`D[|y*G@BA^ ;7np` D*IЦtP`x \\&D; rYfo_MB" ({F+~#zB{2&:BJ}d%{G+T966tX5tS=Z)z0MX4|)IC)Sx|冹~fx#X(ц<]qMfc UZEb[p$9xvJU2 Ȏ]彔~qXr8ӝWp[7/qy`غpR\Me6VXwSr@aP.LW$)KKI<>2\K[c.}b/|^E_{..aZ6q ٙDC'q5y>т|*ֲ2v \!f)1p/ ~O큘Xt;jMityT &X 4|cfҗ+>Sbm튣\I(2m@B4K[I7ىu#gO*6L~ c|p%WncZڢle;AjTR^PW·Z%ϱ9$k0chZAweB` W,g?DY[_f@ϗ"Rqɛ0.@vgڣkq*)Cd\p!FW7v~n1ueмܝW61 ֩> 6w)9x h8r/?i-v4hM8\Z[[&l孝w#v]th|սt@)>r3 j*@jɯIqaՀKL*EL!%bI2 =F#(r^~Q6S Ro_*G둫dXt+f$c8my6d-37jT)&kr, ba h%`[oG1Ize%LT$7䶁#`c_3GeS ݫTKA_7 \@e}'E\WCȋ`8w竫hlu#6c fDLґ8Ln <ῖxȑcZHM]/HWGNjI<] ˅\/1 Oٙ M]Yz@=tqWLU_*1A1 q2,F*R޺3d?5RdaYj'c%t.Hz2|q^1 tm5ckk*/̳N\oisG8פ b:HRۣecq4o;y!A9:^,Zp1Y;O5s-Մ$F w Nؿr2Pz*,誷R/Ο;(6I+^:kQP[rLz E[RA\$N5!z^QP $^;32QH\\ϖN;f'dAN}p%X! dT1+j5Mb_md;gZbgP@mWiH>[K4Cvz.oⶈ!"Fu{{+/&Sܐp[FʪQ-3wQ\gN"#>Iyb{!qE' D72.ViCٓlX"Y"E'UP,~C{`&kc6G`{Hl@3 B1Bw Fqb&07s k& CbmîZ0 v+Wo#Vj lvҝo/&[rq'gr ^#H; '@$~CGnCq0% Qyz;*ļBsbnM|.7*uVurE.n=zIp*w,7''I~!W.|*j8&̯*19;fǁD1ҩ}D}/؅:Âl3Ir_68e0j֘?ucQDQ?B.gU74Lr x㜛:WONbՆsoKSԯ/Cj p ڢ.k]Ӗӡ.{c/!oĒ6!yf jL  d!"r>kƲOۡpfRj}tNH` .cA wIz?@ *=2s|'`}CϲkFY`*XRSAvBXe5U8u-'PZ x'I? PJWp㍇6Yj(P&ZUVz*+ `SkWnSt]`{Z-<{ F?EF-!fzU~JPrd5-LJ2i/h/WpzhV쿨WGߩ7(hUt//e=- J>߾w'kFf/^ ٜ_w#DQ:Wi$ <[# >LGRyLL&CD%Pi pDz8 T_69 99q0c&:'ዙP%9J$CA8S'vq棏k^.heQm'l`wmeic>m'lo,œȉm׈u8[5R_n'c+Y%bp\'>l8-##J)gz1¥p~ǃ^U Y~7 ñXԁ1G5W)GCG=#n+yyߞkDg;(y]E8$rW< gp:T F8/H&Ư Q!aUuf5sfyOU7G榣z <QeaFh-GؘVCK~/MqI#e2i]4kJ'!*38}w$N*2J_Zg͊ˣV*W0|<|^Dt-#znGRFpiF-%MjdUC,qY-F 79HUShKkVQڌ @8 QuLl}gN⾎W5:S}jG!S|m(_^N=xG|ZaF>a݀L<(,I?kL/ڋEY7sͲ=;5 DFхLx}[ v_{:!D*(Ou+E?ĻtM55 =?Q ?foP1<46h_I*y':]l i?Go6:4a / d˰@o,$@ w-4[w)*jkh#6V)rwQ"ݴ, 50:9HNOWe~'w:AZUGm'1[3ykɄKHs=#,9=%+ZL9I'$~qI)O]X\x\I [gx! $rVcMa y!?< N]ԫf=kIOqCT {m|ͷJn뛀UF2 , sK+mKnc[.S˅6-/Nsd~MO~*.n%Y#? -pA=4KϩZg9g u ~|xMrvSMNwo IGخЃǤoVS¤:_P6( KJjיj[iuwiǰwrLUO8mȒ3d׫`WP8 FпzI{RzVpiK%ڢC((}d1H\ՍkO@8HiR=aBn{a2OdTj Om91a 5\01܀TM|x'F1󣁰IҤ<-/OG\+j Oa/qy5⌏@ y)Of2}J/sxRyOnEr\2xBuJYctreBGUDq|#?1CΏ1 u `-.7 gث,$Z4X.DP ͳBV#]*y%##.I|tj(ٟ*bE~o)p$I 6oe֠ɳ73Q O)`M 7 %4Hؾ(W$x\oTBVܚ)` ]a V\4/V cC6Sˏs`ٮSYgZ)).h7@/Xc[[sHr훪!Ba" Xa'0đ+R2KHR2ˡUKDi\,٬ݧ#RՒIe$3prhDMgY7Dt@F28B!@ɣN( |FuKR?{Pr0H$ak 'E5nj|Fvm),u5!.I~'B1KR9\`feqذRP}߅It~Z.B,/ ،A9yfs(+J_W-5v<˄"Fۢ)U]yÏ%Qj鲷OQ#Ћ$& `jlYѦIq$e8Pv{Nuӯ媏ɩbWAm}YX@_> mOmNQOml2Xc-MB qDu>a)fTȪG-z}5X:}}@ɼ*;ͭ I kӖ+WB7-FѶ#if61De^b9:yIel+Tf)s_zQ塚ӖaGD -T~"~d)5o#K!>!zYG"#Z]Yj'ߕ9=܀+(ҳTxm*!$nc s IczRNӲ%zn?nyPhD1&_'q4ꟳBH6JM2#7UK=V_JʟάZv cbr''6dS< 3Mp+k#7\l𔒢 4pZ6ڤdO@6y< 9=.QI bWpu?.tэ vvl *]a"x}?#Y h_:{ GnLCצh54B*Tk$ŢaK_`?Q-xLm\(Oڶr>čx ]%Wv&:}d9}$c/ػ:-cN w?۟Rf+8=/O$eq{i,x>]n =Zr 8{ VdRgʞoҢK6s캥J㕔Aw1Ic*ˬztP$^:V<MgC0EG+&}(9ڢƲlUk?.~:FaεmPʟE SETq1;1iKꁹQCKk+<>z3HFN_Z!-B3ӚL{ ҁHGkhyѦ2%#18?ASr'4 W "bm9cJ Ԯ4\ 7^ZD&s /r-as^M];z-yrz#& s(q_m,ƀ?(M_w`hsu8Ŏ,  5*ز'2J 2,WMU4%CZQBPW,( F`jiSiiZh''d D ^ 2UWWkY)%s&*dF5q^N0Rn)W6el2D5;0;_hmh7Akv.b]|}!+4`; FxqR "&9$T?S3UbxtjR,Π[E.vNY.rVec1\Oz+$(' 9̓/*HqhM(:$x4b\xe]nklc*֭*mUUdG6i˪hb@ fŨr|yv:\7p+ ~^~ ےP+kd:6:{)w#pϹ _x#QNyHBM[Euqgl?v`#՘] F>cFhrK4ԝFH O%tDb^i5nv}V[+EV8F_]Q]J037:dkQ㥑sC1U9v:X^^?q"ahsN4G h@ƽ?0t^-o:o#V!8= @ii8D}PPanzf2>]:ްi,0O9}QqtK}W| fq})' g c,ŽKWDs'hSrVCzDt"azd]sxA `6PH)$UIjjS]xx U 8uʄ=X6F-~|7 ;r93Rܺwpk1l!)g=KRGnh+l/yjehJf[U93]Ğtb=h*KO}84*ozOz_wL1P :ZYQXآۧ8Zl˛Ic)/ 疆t% /O !oE' "Os9J`t CSe$gzF"(`cY+ !T9x,EGoH*A>i][8T\ب&0SL>ӅQyq2=rFNȅyA,U }0=i~jvK]ikrq2}{b i5e;9t,q SbE4+Y\XX Z"R(oHgz2A~CAX`¿ 5w-$h+;G"<Ix[NtLq֜(a#2d:Fng*:iHM7ܼ;,m^s;wQ;Pܕ(Y=O!qF5lȘ`R(k]2޵7uF-OJu`pn5Dм{G\I].^I`,y0y[b 6r@ғa?$ϒ`q85YsrC $ V\|V1"!5WwM\bg[omxD~XafE]8 {T x!yO5 ]UsLe(t o! Z< jY*$vO˿҇ز BAI_Oi܅Ka+܁26e "YaAѮ%z< 8}@!!%ʏ,??eo~^gp̱G3sUD'SƮ-jR *٦ڷ? U}N54kCfbht?$|8gn<=t, uTb91TSbSC4?aI9SB_ ZׄF?CF`rɄC%:'gi*qhCq.ľ5b]C FlUg70'p2JHI ܄ qT /su 5`C3W8 aeh}i/QBCc!!!R{-OXGFnpnsPƓ!'>:< 鲰j8!3why_ ka"f_ 6't*cA=\/8[0 ͞)r|9Vd&aef1E;N]G_UK d.?uNcɩciH ̏I%Ȋ|.Tؼ[Pk3Ҵ־4#HRlc *5=ᄾe Lh-_G`:-%7-.V7xE5dgMfu|,aՔoA<64i-NcqEIܐ4e{$ѽ<rTB!76Gt-l} }n yI %]4h1 ;,r4W57qC~HE@Ɨ7KC''=NG5s4CFb E?d18j9o8TQ2'D^cG~=\ȽeSCD6ӥr'b貈Vhb fFJ.+d=3z9 %/BmS[AԿ#w)?v3kМCs .kNRaP ? 8lU۟RB:.lMiD'Ŋ~e,kAYe/Ef^ƙEh{yъe IrB;Mb$|9u`#~Y&&V|/÷f쎋QUwW ̓:hRc5Æށ7GH ނ'0Pmd::lN9Ip3J]} Dxd*ݰL7rY!+,z6hzh3,7~`eeyp_%n 5,`82L x ]?֘8K)&n\oܙ8N<ޡtWK0șqDS)qu<)Dzֹ&pnJDT|.$mf^\O{L e7˖il5`lP3S~h>cP񲪸L}fMgUycYw1W ]xW%fl^<-AuXڕfג5UT"Hom} RutL;jh<N8j/.6 `au W;vu|68|OV3%o"x??BqwSqQSLjTRD;o NiGQ6wSJ9/u.qk0Z9d3onLe*2&'ɪLG^{rFeVxZNqnon>IVd/ JIVW 14s'd&"?% {RRϜv#3o<g+d#Kռ{6{6}Ri޶`RkH\vC]3r`u8PKTXUCbS,NiIjXًa*oME+B8ý1uXqɬ#jUSǔw䊏>n0xK島`{7R>b|ܶI/V2|x+"A#Nx`U\j[2\x8L# m,b̽]@I:|_U}9+᥼ByAl;8X9PzL.Tهa\,DPֹ囬{D!?him[ø/| F_Dvt2oB˘եB2B/LB%ᙟ}[* yv~ 5kv+|^tZ h?Q? ф`+Z'~Oۡ5ouhTؖNM D*ii`[+qw{<œsfCWfꃍx 6pP?!W' LZ. }K7]*VHkTʅ2$ _+Ht)Xn:87-<:k ՟E;1sIKLN'KF =~dE7s9H b:YAMmcxV?L y!sKQbE,6zǾ - [UBNN,9;H\]Or<6s4(.Ӊ@nta%W֦B$$Qi(_A53hR{㒾hR[t]x/H jHEkVX4C]j#'gN3k0ʖ4@ЄdIf#0 F+$kW4(\$^P\\hs}֟vju*bKq*"/ ;+݄ymvaC&g*HN8S30ǥ` ?uv7̡ov|>>1̎oDws0Mzm.$3Dq8dGm FPcRGY,>nVW<]RzK5l$vUᱰ\Rby-jlK( .xO d3x(R&2cGҋ@VYq^RdDLe/b hmfKѥ.e tdBj`FE%rf?f5O*T8cg3 ng'z?/.ExV_ |N fFSxD9vwY2 C1j*"^4VC[ՌasT_ZSa dۖbR#,5+$nkOp[e3@:wD+ #;puINHzh_kE_X픠!f* Q>̛]X zjr[)TB%ڤ1ٮ!ܦ%]K6aR Dq"hE/o/ z0ki&#OC\;x mg htMVx4~gkt߽WxLwd`srTz;,ѵ[!ވrd?ޱL+tD#RZS@'C0qߦu EdFdpqy`R3-HsxVڐ|@mEס6]}ybF@}^?"GZDz):(VdFMNVW oЄng򊄈?O} +7̄FJ>Ίgӑy"~@{u=.=AUN%Pkɮs u,\,TL.vAVR25וr}bu8v]d~BL;~AHcpdVwbʲe{-WVz\nhL-IfIӍ\tar=b/nSo|\^~BtL$֏n^֏Ԫ1b]NfBI/ ;L.A,Fc>p)R |cQL:%?[Rf 2TyBWx|6xZT_΢SOv4`av Eim^@FÊ ruMSڶe@F|Lx爚7* Y<8 .)B[9{e2Kʦ# D9ko~itk( ߲dBV!IpyY#3VzCA Vwr]:6WY(eāRWN;!n r%87d> jd}g@݈E[fJU 7@SCG.VGpIp-+XpMMcشվbCm+Xꂅ|3[ӎ6*򡇧 6lFaU?-;g9m̜{qgoO&U.@!c Qõ쯪tqĶSS/74n4)rӨH e=Gs'p)o>.- _yXy>XXFfyuk8n~}62d7U$n_[25;nBՐTz\&ɮ|0NwvFVK=.߶RXcѿߢ'y?w1IXF(ai TϹ @K3E3;g[)f'l 8^ֹm(\Ɏ5w">͓4k%7':^ p X[C歂cAdgó0#x L_[k3BZ}`qrΑ=%;uMUmz:[*>ka:ݕQ&rG9+e <_pjɣ\?^FΘ+\]@L 9Qh~agYHyL/H=3"rkU>9 yE]q6 ۂ_|,l4-bݔO2{s4A(~5R- MGJF 7EFFgQJسyt̥$E{-=LJ^25Xݺ&DD J~Y5i  0IĹxRk2 9!3V:z*Bnl!׫@Pj#(FlOp#a9!onrʕި}/ ~TݡnO$|.JՄ .-!&*>oo" JI" l*Iu R}h؍F(-q4^[+g|=l&Ixɻҏ ^p,VP_/hi IhoҶѳR I`kV$#OѸM8Qx@"㋂,~GMm}N ՛w(czlES?lj$̈́iAj+QL7Vz\UQNlj;!z}H=] :|9yO̴QZ^M[X3ά0Ht0a.àK!p^P%/hJe.11c16&$;@ w3Va!x #eYF qǼc%nMLݘ >z#vl Xn%keF˪[\2HAg?f²h`3Ƭi;$*VA)Lje\UϕӃwA ,r8[]-kjOUe'Ĝ+2ϵZqAd2"g&47_Lgz*(Q[ %۪ӧJy<6s]2gnj?KI'&vZ4FWH#ՇkWŨ?+Cx_l93n Ψ& J_ P|LkB9{ƞrNyn_e g5d~ˉJd#X!(SY. K@QSlVu(@~a{k.}7 >m-YhzU!A?LGq'v * *]o'V1)m妇>T*qc'FF&j i?QI|ױ2BZC5٣-!E)QG%M9N=lƧsL:]2vy#d^c~C v=gW2+9t~tUœCፁ++S*<VmD g%ޙIT}c jsљ4玅FzYojaB y;5$?Hq3` &+ Ce"S˒)|&峣M`pj?jXlƴ%{ò$p/#Q=u4DfRa]W/d9(|$aos?x\rHRp_Ȅ?H|*H|IDe]K׭7K0{A)l3Ӕ)o}ɍHBlre:+6NӮ0}yN;]tk{NR|GPM 4##}2}NډkŲ!R _L9L5_o%\?zq0<~J(s+5*8˼ $2IGҥ\Pa{O?2+WCF #- z]j~ȳј颇䖢Mq]y8uS#I{`u77Ta6RMߋ+{/m['}bAaxɣif$Qc{4E\p\̽U=ڽԖdB.Rj ע.2?(Ks Vmg7QdInpېJyr[R1p  JmW]2O?Qq ־/ECh?Iȭ'z=Wzbql3'1 @h`^WHy\l"+>pޭء,7%}e'R  I2 ~ $G6v]a7UyQ怴״rzVY|SEu("QuAxt#n#r-A`SCưT>Q:\Ƀ`qlA8l@n,v\`|ë.-f0|HJZ k|Ixz+$U.4xP٧&ݪ8i=ᮘ _DۏX<~@t:7&6Y& y&#nTlv϶9< OIimo.N>NA<]x'џVx&J1f"5_-7xM`W藊O9hkk- LJ]Ǥy`]1 [;MŊH%C42>jEiVqL5`oʲ#3Elϔ=O;;@If.@gRUWzX;Ǩ{G6+%qpFܻª`eԋ{峛qws+Hobcty UӎKƷEډ5%k=~Ř"Z Cg@\- INJ4OuG KnuL@9b7 lU{ G}&2 9Qǁz8ۓ~1X{vN؞4_S֪ЂN<-̲? tl?'$ekџ y=miej /|]||1zLkX+ x576'~lPŲJ0#$ ~i4lZi!Ub1gr-6u.s`XcRX&{^Zn׾-~!Ԗ$['ѓ; -nb$)7dy$3U ^G̡8vխ>Eڣm[4AHH[ O۲NV^x7Ӂ+C#\B'UME5і.\i_2셙PAXtEQAq?3\BوmqebOa._lx,/ezx܍ e#))ޣ-_8i =d:X-L[/Dfp;۫ 4h3#:YJcaR@iuaG7l9)͆Iw5ekkgkKBffKa)싞EoKO:wU\5Y+ FFcZl$1f(ʤF)eI!x$~{\QYVQ/B84}*˸{:У;tzIv^d"k KBBg3P6/TWjA%o/U-jTBzoFX.r^D /VHfD\"7"3+_ePq9bEoɖH `\iI?; 7$$w]FЁD%!4ҟi![~zVy3]9,h|FWvnz˝fԸaʦՅ:j Y@l 4tJQRlFM 2^]ְ i;aH?Μjt3<0\V^\ۆ:A\|+W(VmT©{a.=re[vXMRǎhb{tR:#q|~ɝ?HOvVATp4hhKk⵱R]^/9 Ou_!`Zcϧه@DmKT8`Yl(Xf ]ejf KDShB- $"ACs+d)q10ab#>[&<^a *.ơ1,/0^~9=eJjbN(_`qWf2IImfTGx19󅡢o:fc s%=1eyƒ}=80(*[ͥLfxqQ;a._Kv|RBBO"k*xB )jv#BG9W+8]ڹcklLƈC`5lMlG{,5WN҉X#B-LJ#̊)vM13lijz׸oX0.ܞt'FeWxp듮9F ʂy>yX#& )eh?,wKd;Wr^8&]!0 {Ӿl"+YISJSEvw U h@KL]\u%Shx< zLͯJѢɴrG{lWSN^M/KTtEh%-l#{0_\^9P: ݢ[X x d7qQ#rX%4ST z'0d1y&)Vm!=}];mb<~k+|x@`u)'<ꤎI 4 *Hбo! o+1`Ǽ#FhdPk3q#ba*Z[] dN(Wv蠬X"Fm땝h`]{ .8ƒ7u90܊[| F K$w>n0pbz+uHnDRo'w:o1D-']Yn p.^Kj zC`{#NDOu9IIo p-V$c8ͶdǐP%)'h=eIR(;eu9ն: )S/˥ckګ6w*y$V ft 59 6(]e zKHhdt#}iЊSbdDԿu s pv'#x ?b>X\]*vl4_@%hxP`N%918PHW |jSZ=͋'VH\Dq uB-@ml遡 [A=uKˈJL;g0PҮAWr Klm7EcHѰiv~4 ?ϦAP63mXtZ4$=v8VΈn)F $hB|1\q Y:{wqrRU$Z|y tM8W$_\H#2!!ǒDi2RO riZ{$\鈧zWVE{98;+ŧ]v/Nm/:60U O!cKL%ޞ JX +ZG*v!iQ9lO>ge6JwF y2%(ᦧ$W 6>V 4,ԼO`V7.th.hM}0W`A|Q‚۩s9u h |bl bѳ|*Amo1mx6V<UN kʹwy+ b˙35|tT&PK>k|[G3[)s°`%X 9BCں0ձOJ|!Ǣtw¼n*@RƧ?$~*Vg&ޱ?,tIIDlcX@ڍ FF[tϣ n&#{&}QKsփ$P ^ܫl~`:G~Iֳ==NAuҶVEp_ %Z$(OSL5~(uo@)NOzA#E4 N<'~.q~4SO>cZ`$Roz}cC=q5p {e9JmGU}RvRoi-B.Ԣɢ1|:.oिPO60IgZ\HMQ CCYCK 7c ވ@4/kXBesK3D﷘#tɫC9URL͡)^ZD]y"}&pٯ FdԺLJ!<:5w\sͼ^nѠ4J.V -©0XB&ѕPer'q@|vN aN)K4>5w. laum0zƚI D4d$0D`'n3UT#YEXܰx'ߡ#\c\*!zC @&tm_6xq7PM "d\7 bg#Ѱ4n=p`5VZx:ƾ<4¦)~9|xݢݦ30Y]Wj?@<j4FxC>cs\X ߲K x cP0dJZX~[T$B?8h'h o76s /}`G ݧўRIׯMyr{;R\M̉ӱbWq=ʝ3RDw?)&znx{s:aڟF1Xςpg;.med~^[d9 RG}<%$a mA-}vGIh%x  -nʓś$0ϪX,@9; Eob6WK &giW@I}^ ٲT'7;Nt =\oL\55pE 0_=co5B_vBpx$_q.7?wBkR+wؙc{՞*;6QlY<^f'&gy"/cI&rfiq=3z3nDJg21n+[m^J+n`_(є#O$Mp pJKBBeM}x0/enA.ڕ&Xh`|0mIiP}d кRUu#2G<)QE`U}فG׊Np)11r$yV񌋞f:@ Ka"=ZQCִ=Iw[XSrfJg~Ԉ#J<0Li^^r.rH'ta{&fp?MGЕȼ90!ܖ;5 %uT01'+Ѹ33Bju{D؎TL4^^K7O.#wx/F*39kMKĊ#'9ALjw~{hPjɚB?WN3E';$:z% G@˿Mƭas#B 9@f:mn_7`Gx O?2ǼvwK_%p_#b$cb vpѨG*QKm!veKĩV2 Y.ݺfwPjXʅfj&4p, -M.D3#hd* "5ڔprٮ0W/̐l΀ CꔞDhDҭ*-g$9s4:XGa[w­xqJNO)(cزGg3A&OYֈ ˏa;Aq0DBIGVsWɃ:vhfE/|q* 5T]zӓ3FOz5>bejVT~zK(Jy lGMCvR &~r{Gb]aG$2/a4a"ԇtn/N{Cd}gK 'DgmktC](V.Kb\~ /~%) ٚ.iʑiA7R\l*3JYdI=X*N]5sT6~pS. ]o>=/ pU ˋt'*x#jH]RѲj;J,7e@U!zGpy*oô;8ƑѼPJ2 0h}M&#M A{{{&r=y ]Y|Dg(NghY-: BuP)_"!v"MZԴKI$@WZyiGכoBrQ-w^~SM C3i4b8E34'X}tеA`!D4"6(y@[^8B$w+J!ԇ{۬զւE@-x 3;4'PO;_yyv48^&4DFS OP-Hyc8 >Ad:2h_Q*<l/AP[/F OAfB_,@&CSKZ Os,@$_J=ȘV|70K(N;#jޥkX*7Uiu~(7E!^,ػUO<-{U@J]诋YVK`ix@ 9ӟqpI4zL&4L!fz= %}޽ܜ_̣:HryٗX!؂BW`]}! N9`X˺/rPig^#++ enc ,qpo+<˵r*cMLdORn&Ga%F'5VpmcC֍Ƒs?gkTF0x"ςMӦ.m xX1_դְF>c 얝<W~ΐMnn6w 8oPKk! A"-hж)Y ?6' 9-G"zE#ֶ֕ 1GZ&DGhԄnuBH.la.Nds`9z3[QvAFSL8 PLYG %v4LfP[i vrP!?rLBj߇iMPg>YcjHɡIFCWd06!i}u94S-`GY`݅}D:Cs{|_HS m!)4@NA 2rZ ݐꂛqy6^dj!]=D(9{ zxRz&,R9!l~3FT*yaZ3Wvgb[nwB]P{v-O\2P w"o*J)U=g)MbЈqAzl{H-/if RH"u' fٗbT Ѣ#2Pz W?w~f> C|笧OJW q/me9WB zy*Ӌ_9u:9W{ܜXC1L"h ziQxW[bAkp$<^ɭ\Qҍ ziC*b~؃fF ?+>&5C~5}m!>F=eCqؑGd0wMjgjam $~tp&b$ T-EnBiιzv󸳓6qk5*7czdpJ͵a!̧c: M`L4~cIqT!-b2&ǛUlimfUkA˩CW(Liőa?6yw,VDL CؿmFbH~sfwL -"8;qr絬tYxQTvg݈xTUK6h 9Vx>RĹ ; Tl.~unu'zuH)0"0 7֖g튇]me˴"/ƜX"Q.;k\'e{hGlf!kmK8ٝgnT/֖ڕK!Rk~^rDߟڽEZrw ?L2azZIGQY9ʎ{V 鸦@5eG ^n, A1\X*HbG5CKs(b|<0dLZ7Q' ~=&2rMK4cF 5JhxT-#Rq\SjDccv]Z/S/,Xl:ޥ >ca錋,ZcfӮE'U]P#q*܎$xt6,O ub$Bɋ1~n Bh('``Xg'Veߚt fPq&Ff"I_Zg5ϴ,l)`@-w?&FYQ۪a]D ߒ5LdmDf yי=wBXvrh 8qP*;hDv= ^,nPWwRH=U$txpřApjy+ԉ8$gL̛p\6w]Y5bDĪ<V;8>IU$ 92sYU܎⨩^-ӗ&B>ЂN!TftJkU-)T 'nH!dulaVPYNSm qUMUضZx|IN薊f l9Ya阁ґ}=5393wug +A!gͅcBY 6Ywfd O%(?CqVE+ sj(?v#|Fa͆4VÑً 54lP:&S v#Іk zojvR ($&{yz GT;pkVlTfT;ֲ|ȹ#y#l-)4{|Sr?FPE:dE!A]NS23 MVH|!zWfx2~gg\]'tcgz3MN;*L310:#obbT$h^^6=m9{ :\&A={bzY:aj QP{1L] ۩4`+;9!.Y-NtO)E8}--Ta4w{Xt0*:vL/fj3x> @췭*:g[ݮsgutC⦊rg͍J4QSb$B :lr 3 b2 ne3T,Y;kwa '1iǕpG5<;эdE{! $"R(0mc ؍E?C$ɷdָ{wĒ3Ζl?.Vnx|h [δ>_'TQ+D Е6:HFF{_?'F.5d )4SAȬOT;|ĀNŀ'պ[ 9J۰p*%ըi}AorcPRHl]x&>`alAAZ*oR.'6əRUDDIAMMUB'xOjZJ7 izL&Mwo)wʸzD?@|?y*L!}G:)(7hcN'9ZyB d@M > F|"Y86&pgf#FSNLw4 ._)8sc(Y"Ϡ.+A}Uhd۰ٱVB0+û=ս;5νyȗbAXK䇊. A8!:h>C[g~(6bQUG,XhXWBߚ3Ul>[Iү*sG?q*)QqCKS*c*x65ibß( Tu҄ dV"l]n=QaMd_a( Nט#,փ_ZvP0_sF@%k~s$bꫮ Q! x/>Q(bK܁9EӼoYuW3$jRH1 5elL uR=8UmHw=7،XTQ=/*`d,cQ%M`(4/G-|sIC=we2w.^d8TKz2R/*l=@iwnAv<7֠F fD~;U2ÕFKhH=:xOW4g w{11SCZ _r!].?{TLӬ#akhNc١]V_'D뗄("[E{[Tt} I8li:\sO9e~,H ՝gj?SJLyhYy'"*}vIKz+^CNVRʹLa^)=NzI ;<璝%'rLjaؚ'!lD6}a4guub,?E/V3OAly۬DqY|q+p,C-bCNt{4gQQCyTQlg$ 1c󣽘:rF~ldR@|Nb=HuN G|On"lG!-! XsFt{hG `-;IsdgoL$ )&,potL^t[_N|?j W>ʢ?euH[wB3kɒiS޸M _ܘl^ ns02Tv=z>HboJTFG8[F]/MPҙ`Ne}V~E c3vt]ؐ;9YEPΟfJM>4K3Ǧ >Pp -Wxjrc\#kVv"3xdHXܨ+6.Eؓ[C$qYJCw*zķ_⃜;V:qU OL2w VR۫DRWk[ ĞL߷#;ZRJ;7WB5kb|W>yMewBmD^vD/#$F}bN3k$Zeo~-xٹʦB/) [|R%'GMmnMP+f^p>ݦaִ Xc:iw |&@vrw-ixɿ`T,<"-#ma(uV3M']v2*"4",bюbWEK^iE;@(BLtV-]uJq?|5^,A6#KS* % U@|_W(Y:A.pBg7 #8;@ `O8eG!'_)QV/N5QNv5<8"d /\EiBhϔ@xϷ>AfGʼnQ,G~UcY6F6?$$@ W}I&egf#SQZ Sd; \OaE ,.0K M/WЏBN`/3B/P&J] .c`YDf`&/mHvZoY 7I6KuBDHK-~dtH3ha^nѬAeE[$nOٵ:|>6Z $|\V]2\7Q¦̀7AӢqtN[T 5yRH4K}pPY)3 S"ܷñU 0cLVAIݝi ?D aS؍|b5U]w*-`QY҇WWJm/qomL& fE/]DmwݘWj@0Iʖ|irTW}mg9cd>oT#2a?0tnVۤ `y TGv< >TȀOԝ/[Si-y @bG i(Y%ڹȔ@ZFp85_bL?ɔ2C?۔ᄎ?Nhޜ' ŸU,Z?>+i _҅_˲ ̤Ɵ/wyQ\/K430{ޏ$T{0^1ܻ`lbX3xL)96w/I'*tL`օ<}XgR7т o.S-W\dᅣ鿤F=ơ6/JqO2 \ 7˿EnKVQ^iΐuNԳnA(" olp35u+@%vS< -=UةP%m p "w!4cXn7dM3$ 4r-cI.ZWJMfνͱ=x=k#i0:{DI+pvn;esrZ>4|*鯴/OɴMLǘ :)ƋSȣH<,"ϟq!Mn:MWzza=*i&%Q0}m >GE7yale\I@;y`+%}'3N~=N2jDSn`񷒷 _g|NT$}fNo0B*nR8x;S5x[M#nZ%Xj-!_1Ujx.ݵضp5'>c,ۡ,}k٣bj\? NHOAyQa\նkpe_TXL烳4ofJ+a҂5gR2 Y=qݪr=t޴*7EtSb ?BbEh D c! E]d0z>"y +W7ΦMeűd[2)YLky\ Xt" 1q?2^|΃3 cx:Kx!Phivc:-2uiS5I5Q6eCHMW cv:|w.!`QRv]_US݄LdÑ%]uOJQ-3Z Ʀ0@:׋0^_:A~yM|i+x1<p*ʋ&AJ1fbB&^ /H,}~ۼ \G^_vEx7.P;_#A |NFuD\>m'9Rb\j@c xDc2,~6;:dߌXfs|ZGd."bR[u77`kΧgcsT͈o`U"uZTVܳcUp ZXBtәB9Zd=O4RDmmyhvO a.π70+T@䖇,)vVݝ>8ɚ hiYln6 Şi!UP1FQ8mt3|&\q_~Up5y<3U?oFv2Eu$Hr66 `|r9|aP߄kQVY!}sv>raWv^oH"[7πMi3ЄP +MvG00Onj{'my>{mU(\=W|1OK0=. >**kcshJjm( ʚp)F3ߐ:`%4Q$e:`mu>8h {sQ5Y\C}9c9_v~zR FC܎T SX4e$"Qݕ/˽f$AKbs! },-]E[ sEhZ9xuwf&Z^4vGzX"o1((s`/je 5-9(ex˂hw &ffP K}/X%VlY0{gx] pN2LbVcNݯukoŌ-}X Aʉ *g?S;Gk"D;I!儧(\I~}>ogVMmo;0@vr-TUsLR%w -!^-ԨSVq(Wбm4が[+&o7y= ]I&Ih(N|P-6,+TOlk#uG!eV5ew?A9-QVw ?czrF :ފV3(ϋL0S3|tf>Yj™H[/c"p3. TIR5%Tשj4ٌZȄə~ݢ CBaw$JŭT|B)Xa}>r/U:.d0 uPSB`6_G\(hLwo(Ɩ@>6qGn)#C]L=$Wb$FZڒبNG0oCJcȝ^a}(LD_5p-eikZ17B>rq+|<V#_SnzB+N_/UX} D.P}C6iLJM <|1ӕ`a#o^%[VgO0<&]'{5,7h1-/XeNiZEp6Cʌk[cg,: mxr(<5>ާl[HzL {`};,ڗ e~T8NwS./vv@c}E#8 7fyN' vckˍZ/$w vW>fѭEݣ䏬E*[i-Fqk: 3j%sٗo1?I?2vjf;Hgб.z ri%~]AU탽Ɯg6_}])D}vu;Dn[Ȇd9YmuѰ?gDZWE:M.?L}O?6kq $nե)rXŪVʁ5(./'WZcץߢ;~UK\ ZLQ/q/trdZعb'e$l0`7M(l I{ɓ9g6ށ{50]{i{!xJ DOQ؝taP\ϗ6, ,Yi}wX¼qPwTBl!m0mn54ދ=wh"L3ws Qxf]曎yv0v22Om7:6B?}˱Z&ʦPz柰*f{{3g&L+b}ظxH65#c p Ea4tN0ۻ%a E]hVˬ^t }:s}/ZS yaъYDYAy4)J;aadnɜ@L~ǀ8z"9eReG8N][@8& 23-Fs6k%KM ?~;B2 ;F'3'i^ZR'%ejI=11j_@6#%ԴWI(F)^UѦ\! a˜b&.e4T2mՅ^iz48IxP8`uP>~l0*`b!<4k=M?{AS] UM6/~ T;X7kbA ^B,+>EJ%@P˼}c(fl< B!iue|>}TY\ƟJxMJ۾.85%aMJC> 9^eN_s2fYJ O胊+rʧ+A!t?+C{k:28Kl!/oe߹[M`3]82|$IXXǧN!n5y*>rMTE Teqjpf?` @?j`ՄE%?~^_jX%ߒJOV_r #(0;YDK6St8< 3b+8,¨\/b}dR= <7eX|*f?[f*ʲF9]:+$ls8!Gj6OiT9ApMɰJ1ۅ=q]bl9+RToQuMUR0S_} VU8(@]Lo%ytMmȕ5AO9@WP: Xs3 j (ODZjc\ YZW0$LiZ7YD<3?3 xWNFYk y[X":4Z2#$N>o@FAW ~1ʄ{QM]:Ń'p D\X$0q42HU`ZLA*)!3U՝2ƕQ=FV|>5f\( 7 DR1BOcq&6v# `B#g4~2 n{6|Hyfu3̽M͉1Y)p"w=RO&hAr(_u6՝4-T$A{K0)<q!S >PMv2 ί 5Wo>L_'oEVԉK޳Tr4u Ǎ oMzoZt0p$4gUq: ;# oIn0(byyZ!_+qvt#ZP.ppP>(%q ZA!ɷ=j(bNR|*ZFjS0V0Ʊs |pk8Bd)PeFOr> hK;+Y*iP[$IXnb7s;~~UN絍*+S+ F6mw&4Eb /H҂vOOTm$bG$RyĔg&=`Yv']32(ler wYs6Rsz2麟|aм>O2veoLwWʩآ;Ar|{ei(dggjNս}qQAJ \Nķ>ݽ? 51!`(s%)hG~vW|ͫ.%5#EƤv_;9NU6S cY l:`;U&GG|g.! 8[KӬf EJQ{uTО9hͶP{vQؼaezV! 5/H>t~?* zxuʛEuGᅥ* $2z>i.lɯxB*  FE84MJSg"{0ua*Egp.X}b]` HEJ{w69q+D umxY&IHQRAn2~Ac8`R2D7| 2c7} ;M#~(jz\RA&3:#<~Nr}9KPvFVfOV}~nPΪV)TT4s4UڦX0P E }(6@A >F.J2>(ҳLjyȽ@celk #C֗1걾6FsR>1lכS$zWp YƟ{}kqi^w <l?u"C% ;%RB2-KFͭ&,2#PgNClYJ'>|uǰA+hCN 4޹4ќ@ZaC7 ԛc`Hz5-x׊2fNԗrsH~;~j R´Q,rxar !%yR<cG ՠy )d ͟T*FaJǸ90)}gv<thEW,yզ#ĩj a9\dhΕ~dY >_ wy#1b8^h# ZkG uyW/QMAxpN{Lݙ2/#]e;ɭ ;`JvPqQ@)Z: BwEGI3whgI>5ۭԵkfo3J13'Q-ŴTLh2Io=qlx$Kbӻ܎kP:fҀK8GUXDIA?xNp!:h+`4h ƶ9̹ r)Y(_"KI*kp;)N\Jo4j\ zVҦHe_񵳡 dۤwWClL Kg* ,2hXzhVvPo9ȫS-`/n{s:7!O':Ca_77AAVӞG >,ж蕒l %şP@!OmjbSNnM&v g׉)?[_j<`ԭ'n{Ƿ1XokB5 jXr߄bM#ȵ3Pyּ\vjR 1HK f1MM''!ˊ{e}.-5IS(`&4<@!!z΍ȮmF7f=# эOn?6}Hػ钰 a5ta-Bhx"g-1E|ab݂riP2ƆOT3P >韛MWtj[u R_i8\_9J6jH>iX1YY{=-rE9%z=D*[Z?Jˌj633#耩X|n-|4I ˘-u [@5zB^+O>,6UX#E })Q 9k&7024ޫ^F~A\}~`eS b1-LYĎu3(m6ȢD܀M[>8lA8Lk#E j%4Θxw+!쀊1J[f;VH }vlWt)finiK0N~3^WID>Cb4K5q:d<[sşeX8#$Mv/.aU|GwiĒ`XAwc72B)qYd,Vm3ĸWM dXlԫNE+bf{ }Ȓ,=h{oĕZEg 2븣ϼQ&RD^4ZCśӅav-Q?Rk`IBY=^B|;RY($Ӱ/5Uom/K82_^M\56v 6S45}:*6CTy?H"fAK@̡WAգ(M[t@g3>Gg9 9N6texg}F0z{ep/l}4EfǡZ%q܄UYp F-=CߟyҵmYmF/C3aM( n*^X tڱq5 qcq%=xz]$1U+s_ڤzhg, "I-=mAZ iEr?owNȭ5| hڃΘxQq,dI9.y1?(TjV}n峼pH |krLW፡J2JpTIl8VgrS!B2E?]\q.;zߩtI1eM: $fC?В`_P"f:g5mCԬ]2<1.Qp - 군bo;Fh?*Ǵ!Ѹ/\gcl{gqշ8R<~s>d䰎-Js3څFF EϘA %18W);c[ZI_v5f2@ʺgٴn*+Szap;"QJh"#(;]SU~e<XC: 2d=Ƕ (^z<[ݳE NQ"6:mi*0G-:%,3o앶e8.V+W݉e}0g/ i*qޘǫ;ɂ}ۙKKq/g\\m lOq8qfx-Ne0+3*s<@r|<_jQyۚk脧L&J[( ?vx,_.;N8@=c!/ɉZ(~o ;\msJ¾7VHb)߃.a ֋ y f3|YzՑҿl0IA'o+?jE{y `[_(drX'g1嬞)$7m.+A]lEvT^ @lW.~:N񲁇5/YUtfOq\V͍рNs#"f22h_aJ&,scĮ'gK=q@)w4e}:rUiQS7}X7hQ[U?pdqdʩ?9^Ί_\蹑rQH> Ȣ m*1aּ8̔6nNH 43!oyi Q#m3nZd5~q 5E\gin'\!#H[}0o8/mRy &ND|h L*`dq VvhXUư%*K8o--I%-rupts U."zzQޫ؇~`ETe_a{},gB5 On$>(ap򁝸N0p8DwFBm ]0U>DB~Q?*;ƯXJ l:`s\sfI^dM;%S;27WMGHS$: mC̈́ヌ`OV;oH3R5pqUjů/ɸ(J\r=ޣᝨ"$g}|,G~ّꅿDyF׺=j֐i*FWDBC4M@y/u#g s(GU=$bXx9uC (0o\N O|E3O529&;f~v'wZ#ldA$_h 1Crkt~vw }p[B%~_U/y6\ÖL2S@+2]Ŷ.zJ[-ʄ3/>ǽN>ʐ<ϢѥaysZ!Xs!O!Q xNO=u)Mr:c~<2 ckr~RXĜB^ZTkclyz GGMgNRz6۬uIbZ*ä a +D8Wx0alB}qp`?۶>p{n~`nyqsW D*+ 7ѤXbfYR0"^ozK5^"-͹ApaE@8M)X:Yi"#0sѵomfO"1˲yk٧U UWA8K=!g88Ο4ٛT;1DzKx?s/QvuưG'ѹu{0r bE5$ jCQ߃(alnCmVI׉~=bi-ﷴAǃDs'3a~@o>V*kb$¤"U/@vASSa=h0@oünz1ٝIvK.b+$xvcR@nln:L@: YPHn4F`ӛV3сN)YFw!,̫kJw vM3٩J`4LX[EV fHy=@  8l4xHS{]@E+eж2ՠRظIDŽoUcLc?r-1T;x$KW{9iz#8 I{Ha]GWgj'_0J%>oW&w2H, A`(^ez](\R0Cit-;uJ!HOJ kHXԛhZGny?0%ux\*WoGהO[=g@t$R}+s\CF0 p'v\菿D>- ,o}QP2,C}*q;` |G0TmPv'q-6%".}(_!ܨ:5Kdl֜TxcgJ^K5J0e1"&=2F5{epCeԎJSfZssv K L:`r| C|Gԙx7k Y8\"^d&mfí($!Wh_؏2OR7jOX_Id=Qw,:.|UԞ+ntE7{Ǫw4$#6q 6)Ti[T:`?x=֗{_Jݐx{˷~_ik#o2.މ-C#߸?XYr8q)XIU {IX[%z*^=GI"GqMd塨%Km jBd{W+to{n=̷27D6KMa}?_HigfE=5\-lW3r7}W _of/:/ ZbE@gOV IZ }ùI ]Zs#Rx ~*TY5v"t6{HMCJmiӅyQt?~o@?WI{R*}jJZ@8|OT_Y\=WV٘DauW\sD zp~ O )Sc(@B;B_ Gy6 ;Td@l됏JtPp'h6 W[Ch+^ q7 ݶ"8mz9"yA"t ͢0jK.ٖ.ÏnR͐V~x\a_牾UE&|ZA(n)OL,-92Ya$2vHHiO``P[.R{R:bQtۿr299 X.PA8's!D9l!kB/]X&O%F[iػ(n.o,&.`6I1/WaSG'Z]W9,ԓEfc ?FGÛTؤ`;Om*hKʺ̃AZl繁@t m*!CdUD i Q8 2We>A?YD: A`*e-tq3-FY.zSH[Rڀ +ŃxdI-P;,iROY {_C k1$xǣ* F""\Sq7C>o#NF/Eaߋ H9c4ͼ%cI?GRT+pI4D`esrB| ~Oov―. I/dl1܂j[xLu5xRe9IDgܻa"]?wSRS[v~AurE"mz`|յ706J~K=6;.EShRՖ ‹vYşH($x&1}]JLhTd i[T;1+nS'eb $R.7JЏ7$[bЛЎ-Wĸez_8d&wxlNݱϖ *5𾊔RI`Z%LGȖ/ 8QQ/J*Vtzɬ对'E*`eb ff/!y0 T_TrSgߐK(4+o;Oݑ-{)Ǝ"K@~û\klYMSؽʇ酄m5$ˉpCy!dp:a! ϤWM W@[A{<΍/Ns10'yn_-kE J令07g2M`ۧ+7{$Q-@(M32gv vP Dq=K1yAҨJJG/Ts)H ZNbD$/^ڈl() @ #Jw6TZ UDͧ= 8]B_T  *PX*elFf|vf/keAF j@ֶ4P>#۩Yr+27t=TXWhuX3=Pb@pнKI \B)F"t 'UO1~#y^b$c{ƽlq(ё-tX8DYfAΊ ,)ߓA}i#X_"k,_ؖ@htO s$ͥ 5{wԦ84lZgMc#4W\nW4;/wMlG8/+Mf vùRs֟! \ZP`]| k#pV;]놸eaՆ󥋺Dr«4~T\ /$~߰r5ȦΫ RIƽwA.!#xzW]e@żBMW)hR,"EV%PQ)m%-cWQ!4Gdi+,ި]XRºW{\T9;LS:b[ ' y(itmܤa_6~Ckͅ g0MJ?Nzd5R_Htl`X>|Bx⬧w_k5'R˙; ZF ovVgP?E2+ޮ\abYZeKq/M VVLp^f$5D$6&]hB *%l+h|[Jgʐ ϚÈc&1;yzc6cUGx˜A75;Lڪ]N^r=>!*WArvh}MsϿYM#ӓdQ[U`@(: E\?Ou#ШT ຿Mbێj|EGIT+:[wi6a8py A Wa 5(B#_(c mU!aOV0UfckPKQu`0!C +"P{u>yE"XW"Seo >zM`,L <"6WULu ! CXWC/f~lFJ#JMYH#:L Y 񼭫jOc-I/.rM{G\:/_ Q&6^.L9ނgQ#ϵWx-31^x;m[ 7䗫02Z 0 * j `!lH+՛3, zNUIg-w!xt+I4ic"t#]X Ì,٫ߗ'],tAˑ`.{*5T/qf;[Rt[#S&dVVh5ݠ\% g!T璴Y~!Vt7Vޝr13R`?FV%se],n#QQ ?vM\+^.<I3W[HVJQJ75ֆxBckC7YW,,;rCr0շ Dr.Yh A(#Ѧ MfYy'q*2"ez x;HPkneJ|k2ޡ~[Y|/"BgP%,m 1hXYh%ѡqͥ bfTt];Ljv=:8T́ˎӣ#ne/!Oڢ 4/boՄE gj+`(X\p ]sn8I>74i WNM)4_bHF;Vx2`ju?uW]5A,B2[c*R/l<:Qt#8̰vFϓt!K6>n0\jŦ1!"EP{ȚxŒ^"N)9=<֛GwOa?B*4v]\kC>Ī$]]q0hDo*{u0J'H 67gs sZ5iMjQc:N4D  :ڦՄ3BTc|sѠl)ʈ&.s(ϫmbD 1&鹔 s(uiLSw(m!\cr8uXMOx:ʚF3' 3pm@rNwm$r8vK PɫMw><5@& M/%rSrJ=-'l]L *]U]!w[R c %$fSh9T s'\ YK}03cntPb"wX{kdMdHf܆|t9{5¬qN"gg$ER#uϖ^P9R46]lOh 8lU }-lO``xx0z }p a1u:q  4 3lf'+UR^׏ǴTlwnOs& ꥁ WƠpGEWQp 'P ?7Fz-FVBMٴP E'q j#M5T:9HxX,.-RvXv Sݱd6v+gDKRNdRiY??ɻ=OdO&j] }8n&KEtmͯcERDo y0+S24KGg]2щ4._zCnӍV|֔1&_P:i] tGqN?ĊKA;{tr1'|V]]!uYK7L>P=.ŷTOZ"^G;k/{m;H4pס](C l439#v#>9'n%ТLZç2K#Li#k&S#m>)g ] A+5!h& ~fQW0Adյн#rCתzFe[; miiK޸ecv05,ӹVF2qZ,as`QBg0H70׶yӣ,$*r e@'F-oQ+gsk.q%w)E|NQ'NBǹ0_A9uM.odAږ p3hD==j9L?{|dK[&F%FC؋Nqd=fz:fq}F~Z:toqaݸIuBc$Q$c ͺzH ZF2I֓}BA~9'E4Ɂ"M ʎ` ?`u$0FjWash/QHZHc;g]*;TMKIQ#4ԑO *7s"EQs7drnCSt@tHt6"?ԝl!$Q@w^ˇ)^Dt`ܺ4pJ&=Mns7:͊t Qg Sw>ͮlMfնl d s{~A}xܫ=/1G/oI.J[vڬ ocx[7yptgqvpګCz = ]-peWd:{^yň5mqx)"q > |&2B-/唃Ҁ=aӉٟT+YSʐ8 uFFI`O)`PܤQbݾ$IƼ 3LߙǗ8urXڙ8Oy^*i,@6 J,A{o[!?86 K/#XzWXmĪ٨KkMʴ&-T?A(w|Ib-'ʮŵ1_D}{vJ@O61C3xΨdK1O $m [>:ҺC2կt%V)mPJj8h L;|cX/Š\+ Q3lcʢfɮe*l(}, S^oz rMbް H ֖4Z)@APl"XG5[(~Z!̸0N|?DEE%x(?,nڣW=3|B&mr vkh́ۢ[%6: 3?*m ϡKZDwSny+{Sʉtm%ɤ\43pQ#c̋YЇ6&C$w;bx2Z8.~(6Uc<DRy_ͽtPb[hG}zeX,M'eIJm;\:<|5&V)^I ָX(BqTyq e̘յ[+qxc 鼥ѭC1_ 4>ЌZ+>jh?$mi/nBJk;5v[,;eOPYZ⻽ش۾_+ HAJWrleeLُN׊#;}77w;CcV<ϊ&og#Mc0Q(V>DM?seS)e2t4Q_u L&WτMN?=|E1Kp"ͱčuP%,.Is[f>!H5M"&&0\ddq* iQ5qwP>n %j8.xOt`*r!X?.;w܍nè cLF6"iIg>-SQhS4/bt%ʊ`#rC`g=O҉jvvr Gռ/~MdMjX[WCb!rbgFϪI":Z9QxQnhF@AJO 2nD =-iJ+g,.nw)uӧ@M+`BymDXiT.c{~P5cV5X tG㳒 _+%> %O՟(9/J\Ͽ2Wmzp;Q/{GBӐ֥fƪZ傦d;t@+:wϗ+I6*0ȏBc<2d1ߗ`tC[ <[b:BYbmKl.5Y9U3W 8+koٟQףez3Dw'"X oS$xCb=7š¾!o\7dXsgt`9/=?2--e" ;UyeF`ceܠUq=+[ Y$SFz{w ̨10StB8&y EZM3»HIf ū>k- NY͞xB,i1Q_vӂsy_dMAsnypsk5Rj|jJz 睚nL -rT]# kK- g Pw ,~('p3l7H%?鵑h4 /evP_m՛(OE M+baZG0uyٽ8bϫfv bW@运Agq17!K%R$KvZ Hos'hO*5&e35b'u Ѥ Ip8Å a9~@ZwWJ.;sƄp#+b>LT VE95OT #S,hr"o,eYOQ9qjړZ+!H)qZ^z#mLjɝAD*(U$devj7;vKƵN`Sǟ8Z; EkFQqT!ۼ@Q;ZPp%U1]y!\Wr )n6ipyrW~vR~U-26}4}.]܀x ׫Ȁ.nÁ}|eIFk>E`1+߫ 夘6"c ϶o84{9e\}kljޟ}saF3=};C}XeM /!)=)~g}8]M?n˔XjOtq|ؖ8I+HAWy\aaO eao\"|0u%`y &E)emG@PyzDg2 B*Y,5>|5\U!!W2ZlN$룝H,xEB&JI.]CjrnbM(.%r6w}m ׮E^[ 7? Gv]4~0{Ń  KgldڦęQM3D.'p.{FQiuoڠ W%L<^*w;XlXfHw7FA?V45vGwh-{Wj_v8ZJ]%NH;ĠNo2nxbऄWe acjkAFR4CׇNL>}5N%*nk5sw׉t2+z;~z$(Pa'ʚ1fplE9Wf7ٹU,yWĵؠ~[fD%é8oe`e #:)Ŵ= yZ=QIbف`ȇ;Ħ`L'rU-8v*,[# vv!cR]Ni!y:-IP6Ra=ߕ0̲S4yk3wY-*"#8wœ5ut,{1j*m)ݜnRYɏ0d%S .Z"+)Gvq&]/!ecoPH|y0+uP&dԁ&qSF*2X6Ξy)0+9S]HbįQdZ<< 45V9L/λR^H N Regh5݉O~tSr@^x[落z$4 PY9K!&9n=;e1LRF LQm}h&C3U4E W,bL8+Qz̐+|#܄6 -9% #3F?\Ӏz8Fۭ"K HQF5KFϼO1OuLj%եAmY s,V\EDPL: ]#+WكS=bcwk| RhS!gtf|儊7dޛ(8JX>py|P+VPuwx*Z>kr0* ڎ6KU4'C {#s%2XA@"x~Ӛpi=ȝ$"GuiA SغedR?۫%WuTe YMw`5N)}R{B,pvv!su$*M DxŦ5Ǘ,[]{{yw'r*Q8AHCǤovh:ijN5{n)V;܎w5 .R2ol1:T4?@8W5s'eMT 4G/:"0y77Fh?\9_G_Z7ɑLvrVp/X0#vgWrŁTU0w$]/mb✙N kuRR-7~?'4^9Ek|TBcw@uN\!ZG7`;E ?=Cy!XȦsyqHM[K nX.b{}+QZ[Z!;D]>(Jc7ݔ *;MW7G&%G:&4UIuv |S=XYM8KAXG i|S~ƦQVbwJ !ګǹ.:A'ubc~惚(m/>j #"U$hF Z'Igy nz Sn6#,X+#n#Z:^!SsuvD{P^)R)yx WQ,mc-Khv##$8Lk6xwȯfufg;<]}31VgeP:,GZ!I'~Y*)0 xpz^=\=K{"m y6@NsCSU S8qO /Kt" 0༥G?CX \I OL<‚;T7^4耋,qxJP8& ͻ4itTVܱ\ hZL&I[6%sj fմ}jQv.ޱ]Ir=V6O6|GV*ft% tJTUKM̨F~vY/_Fd;: v蚗y ^֮ Pr*Ba.fYn͕5/=mّfAD3T:b8f?7}cwl凟>?3/DŅ+=^>Cr67J D ic5ck.uA; pq&@Gaӗ 8N/ 9{3F JF"TFU>8AteC&">[zR:.9Bz9ȕx4lFm '! phR0JYqOd3s^dGa؂zİh^.i^"o4,|搇T mR؄?4l?:\PޝĮH |y!RuYAz'e0hj9g1aG+De?;͞.|K!>f; V8cĶ\">51Ojs|=aP`7GbUnY# ּ mZJ * =:޶G߱*EQ=A%C8CaRf 0HQ~?Z,NPp|r YHDLn==b4ף?noK6I V+ 7 Pf$0 0(1aj#VI%ܨwqp`z,&tJuY x9娊ɹZ 5G7l_٬e̝Z|~yGC{=ȃ}GOKEV?v+#ٍ{2z΅YvO՜'1E6HEs!f|N×&9?WA8ޔpzq˜f!׏`5|@i$4%;}j[s ^ Bo&{巳A:Ƙ˙ CEJCU|$ Qaw\~(ATףfiȪ9!@[flx-Ix &M=3Y6x=6[0sʵZ 8w}:Ak*1dX,FGa&6c9~osVͼXFo""`w┪6puuHx hlx^LAxgbu{߼]qyر6޵-cSP)`i6sd)=۱\)HQi+jsӐ `tpQڋ0HDGWbU߭r7gÖˤk@m{䀞0EpD*ˊc;ğYW! o6 X?gU"ԤM-&W|C =8s*eMJ97摮K@AD,,byr+ȒzˎAr҄m0';KCYEJZFGسm@ĩ3mIz>˻3^QT+jY"azu=?{0j̿w,Z}?b3s+i$tݱlt 9֗ :Xm| ^j[~_{  4x:#%CMK=Rl. >V3 sRVU7V*"'|1nTntմ{G I(#uP(# S@f(M>/g(Zl gl?m){2ͮmiI`ZN!twzF#y1:aEY}UsXGk(a"K`jfѲ [~ȡ :q }MYQ mvEJxdarй*L6Jw`pUL}Q7\UUS?Ö m7NΔL,gX^49ὸLV"=ˏyOB]A\OדY*\Ky#=xNP%Y)h|mv71KQlF׋k/o EaW]HN2V m{BeD7s7?ԀCT||(uKVEq7tU,(n:).pIۺ^WR=mF!8%/Cy!^ QE:VFS3N z\؈e2N>pnay:L~ slD$ֻ+h)-X3 !oX"ank^!,Oѥ E>Y"=JNIHFnbא9dU9?ƁV*tBx_XȫнR*, :o1|`w=|f6{1[HcJb@>~TΙ :Y+R450FխH{6n杘+;ltA\D+R8t͔(厶qLi3 ´!Z-clO< `L7$f:曹9P:cx%yaDSW~x\`f\|F33hgUj!X)kv۾V \FFnCVus>O%xdX+MwKwtǙ#9,4H2T4#io=͍Ë$Q^gS`i3" 1l$;.?Il3YַYN$5Dll\CX/EЇ龴AJW!י^=1mG1SS{P*|0FTϷ'$a!_vrg@x3|wmRkfQ}%YFUm"gȥTP0Ҋ. #%R YĖˢb6-&@eWh_%'{W 8u\W{T("Dk$_,kUeZwywsļD }s b˥z]X= |O p6UN(@N䆿 Cph4YLT ] fw!J0.F%:҅n!@@IB\%D_0)aARwLy~{OrB'tn6$՗++*,nA|Ѐ`rtOG] iEcy:F[/6^&tKp>9gLID3]O\ _OItHj|/X-L4 hnWkĝ{t4RuҾnua[0 (k6IJb$WiebnJ0[R[o$trHmA-PV#9xT_$f>Ƭ4\"bt1XüYc(4UGHiMm0sĮprdW}ؽKMVFsjZ vxSW""RnxAF)@g3{i g )91dQbcIpux1ЛX 䚊=q Ӳ&gIV4AszauC_Ꮼ@8f.8Nu%"_t"Uj@W'J4m܏Xj2C-|{ 0;}ZF)n%.C`YgdW ]e߃}] x@x=kH/e]QGOݲLGo)uJZ@Jxi7c"ZIDՌ[dΥDىaq]%-#p}kjྎzdhPgr3"qqy;GߧOvH,&h;D4)z-WR5Pq>Dbg! 1/`Yꪩ?\NisEk7:Bǣk ;+iisJ t=3/qMΌGLپ>&>DO1ltk͉םS^x)[g%v5݌aA9 V5,Z<nSbL( [H[Dy&$샐ѺoF"Q+Q Ȉ@2 L>oD TY}T2Lv=S7}}OEV@ug_g%x v:dqs!` lWGPj8+#4 }z:-2]BVRy]{-o:Ub1 '%0ixp-/bD\kdžD~sO~ Fej쌗a{mZZ<{:^| 82LNGffպ{5MIHc81F!VD_W A:RZ{|7uiT \j6{kG3W^ r QG?%j=7g,Rxm;UWp40<\jHNmYʈ!G[bjg2+:N:j,x$$`uٶtњ̊a РuA0%J6/O%8ي;u0|צ$~woa#aKbRfE>zsz^҆l)U⿙2rLfZGl [kuZ5'Vg+TIvXlϺOm,*un9ly|PǷ?,)19:m8X yjmdw,dN'9RMaN/yHe({qp޺:H0 +U0׵>ys ~GE|zh}mCv16-[*6D4t⁂ )/J7X wnwhx{Ӂ.y{I0 jp7DlFCIձpTPv)P9??kwn䂢C_$hP8tw(l z ElUb9Y dc;BƏn%֘M"p6iuZEoWFUPwߨ6h]%6` nK|Oc \h,O+k2< %[T_&-d W'tcgL .dtx:8v2\ČAk760_P # b pS`~5ܭ$xpBUoi;/`Ԣ# 'Ec舘x eKfj"1R~19<#L_,>$×JYoCEJUAObv^/dOh:)<7w:bL"ޛsjXc+ގEz/+zg>B&jL:2K`J$~y n&nV;}ː^ďvעk .h* -ifF%C񗯅6YZ2߀R$d1pğ?KQ 8@P}8kV^%vVFZr9`e*`,aٟBtcϞsf `OX/P]?5gA1co~/ku_H}NA;H~Rc=q3u2%J`qho% ><0J*ٕxxZACAU~H #ԣ bZ64F̒Ԗt'j6j佒Toi|U*,vEG VtY皬lrzѫG+,|{W,l~C5Uhc~2s$ᭊIл}I8fC4 P+f/A.ؒ2սK]$S,2u^{[0BzF>K?ڬq4u7h`#8Kt@LL^iF2#Fec>@th#=KҹHX\|i!;ܚDNXMVY:֓<9)$r.69G#rYm{TdH<q$>K #:>V~u#&q|l*hawG"[,MC}%M>`?1>0{;V׶oRnDb! t, U>oi̋Zh_' EWF +PuGbtS!-!hScnY\>V_VHu)3ݲHn@jqUc=zZ.`|4l"cy!e]?m] X,K9MD,\Ct&[msO#uDŽ #]{A8FfCۻ(Un&2FA+2zzjHHE߷KtmY6yFd{$viVnD3}`C2$A #vFvwB׳f̾6)'$H+ ~k{2 B ǧtaۮ9 >6RYpk墎3cr9g>m&ORBf֞`3Y~)ԧLZG]hׅpxKP~&b'VQm+._ݬiMc >>dud[=A>KX jX{~]lq^~q*:px7DCƦwz}~)B%,WF7ams.]Rs5=//i(!$ZiCf DīKG+>P C' ҊW~ڶ)c^'DFdĒ>q0BkNH "#eAzrlUr{bzևdi@Q3;/TJ{:@hoB3Jzcpbh6wW] p Y&V[l _6Ù%|Eam培_oT#&^Xe"H"Yz]Ik2rV0ùdnbY/٪E*Kv9& ?#XC?X7{N; LOK#=YD[ɀ^v*`ڹ@DJpdt:ޝ'1K *?mY|"8S5ES3$f9`F#:5 va❮\?5aEf#dm^cBAݪ_|y%#yU[W5>@Qlz̟+1Ӭ?X와(t92_"P?9L ꁪXY-Fс'ߖ.; .y-4F,ץ6G$(L,ۚk~pG[A:/cW\B״~ n;:א˗V*X`M&Mю(Q/"K`_6'v&Nd_-8i\LQ8sR&Mb9F+ί|T.gzO]nT:ÑFz ͙'Leslr?wC f3&*2G/r̢G ):[|1Fc@}NIJW%)*JOd,0vAlsb[[0OJ Vp*Vp iŁˌFewk|Ka/^ Z^,/^~K[vuK]DU'X\L Pz,( |ˆ-cP;SO#U\5W򧥪xH)16?~/;>6{eF33 5FE,K7 R!{VPI&)DM; ދlOX0 !2-&K5G1+ gFz7*#mBuQ/z߀uyu5\ i$}(C-6{R'>Ed뷡oVh ^"?5֍Ġ6$2˶~4ʤ_{1cyOX.0f=vA11{ᑈAդ :vjU|GCHlʤGeﯜg B9 5&W_lՉB=@{ΈT6!;a>E5X3DX8#wtG6d <>۞^gJb@e#rxQ{lWwҧyp3u\ 5h4_1ET"kޙhr{اGLv)H/vN=Zȁd"{>" ƽ,=y24ƽ*:wҌ\:֚J3#-WOhϵ<9ZpK'jӚF;,ʂ̭0EyXƐT;9ÜB{W[ڙQSt8ogϿ! *64yX\.u&ƌPIx8מ@ 2]"f_$dz +hF͌wshX#eʪxEmNANN|m+ɒՕ`uֺY_h.F&NmF@ErpJ8w7mQDi!qOeVхJMjOߓ9u8H{ʼ,%w U9vFX_I lwioİc6C# eŘm ĞD Ʌ\K4[k(F4Dòֳ7e.cdm>X>ٲ>?f ߆mR<:O4 ZVJcld[=, :5> yvņ87],*s'T`E#jh>3֠y' )YPˣ-x`uHjH"%ƂJvI%F! (rjo@ƙ<\sjzҠ F̟N N1%jNT#TB Qpw\ڸ^BC*ktuEn6e#l4&71as0>G!4<E˴'C@ΝQ2x.^C{M =ǐQ/8qI#,,"uT1Pk]iM"WM zHcH 0i E:nh!ptaånoYDajnI,<,ԻѬ"n&_ pz%:2:}9$է\?\sȭj]-t{+]Q~5f*"VslRpqoZDkɬ-zay4&,3Whu$M=-Xkm¦h[I}PIym<ZET,F-sf#j7dJWĈVx- f}\NqL6-)kjX:~n=8ƨsa-l+6# 'A\j$a_X_Rp *rD2ѹu]dhP:Wpfd]z8d皷X˂Z%A&&򴉉؎IןPɡ"okX*apeIv)ʴZ\~oH gHtۧ*q-ՅZ$$Y%i$G^^DzdM_I&ޯ|yi)p4ޚ::quqg$ ,u(3{U0/=#꓍zi\:uGՓB]iHR'sw-mFQU({-d} _"!0%$X.6`b!WgasDRjwKu2D aۢ`GkA^ik\d)-xM }އb(JJ~0TŤ!5CA-t'*gkR +{I#[P={⾝5͒g z^2[%;mb?A ЈDKB$}00B}XExUT5+/mO=9cYĶ%;r`w<3G4^$1^V6+͈+pUBT(=s%bk: ؜Qz}CBX2MokzogNl[yB*WRV .h~k/'#fC4SW8lMS)ZھIDiq,x@nʬ*pq=o hdѕrmHb,6hlQ]A 2WQ^ZR%4 6n*Yɛ_iZ',Y^\K\p:\ ٮ/LS@g od47+óq<,JC8i:dSL%`ŇfgGѹCo6`.A^gykh-*Y+ A+9أtO/0t4C 6̐G"cSw*a[ jȶk)[aj9G rbE PځO^M̏0P%ړa\TZc$>Z/Ǩ;&XhO3(rw38ϡ&+e;ľK6-ۋmN4=].2@Tc`*AQiɊf]F-I-?5Ɇ}œ,l&HyGtH-rk_*poҵQɗؐ[YUp[ {>:=)Ωϼ`ƥ7;&h}\gdu]/p(q Pw %Է rfyu➳=noW9axBSY)r9ʖP@#}V Tq 'WS]QlTQ @ٌ=e,sad/{ g>_CӐQikJ*y?1;7_n77жH5^YQmEH eOו>V}.((|™1Ǿc337|՗wNc`B))ܾ쮥WVe)vo@TxZuvl/Gp(Tb6ZQ 6H|gyAT $+e@ `J6A4IY~i1z? h,^Ł>'}wUH:Bzj>5`5bigAQqɔ=KƃAJ j 0/Nid3 m{ S8o86vLal5 nnj}(*\wFU@e|۬bbbs8 ND&)󙪣1@+TWDo5 a0/ S8fjvQQv"|DVE>!/U+-SA8vl{_/q%2yF%=8_W lԭZB˵1x!3(5TKDq7+߇o,\HXjDmG[li%ae|62~g5k`l5[m&ߵxЀbmH:jѥoQAB}x0\<~=Hn2_zkP้&Ȯ:یp?%CbDmЖ'އ\fc6cm »a& q{HCb_N>4(#pnfq %ݍcqL&!LvmpܬHA#kZϓ)<+F%{v|3cNOx=M^t57K: ݮ]K~5ƿ=!"Rd=)jJ%^;^E-Nb$ۊ2/ PPU<~"2:3`p24xNY65-Nzۄ"z{1 Em(X/ T8=xc|GKf_@}! ~8< =3nr?qlwH2ήt7~F 7D=9{=q+5\k}e"X]pO)g#Cj A׈U9yenFCWK >eXR]4m_>9wmM:Zř)A3U#O޳Pnw~COLk]ΏkNl '^o%6Hc<,8 EE1@O|!y5ITXTWjD Wv8[d;<&ǟA. !ׁ^;AדP0cϔ a%cgRRk ?ncC nxOdDj*Pu "4c:CGkvq(5pJf6e  7^O ?Nj%@9nm{X<6ۡ00bV)sy.jAp[J wEOFXf _`Bwxb1.̤s4e 䓐Oj9>_C;BT?Τ4"N-peT}I4~Cj8;6 "\76#X\V/{eS@ƒgNnDPSd,-\'Dgr8ofb%T"nG1x`Of1a`ƹ_z "kJ̫ !uUZEhDʽƴ1YL}/[|^{6CM,ri[VCKd.Ԣv:Bv啟!\ui[Xb[=v'b܄Q$)l0S>XnsV#-'N'Gj!J{E"lu} l5ە5986SOe 2픨%hp0W=lm$C IF`%Cs$rFZO9Cη:HASk(7z F['2% KY[ asjy*q^9K:$ #<iK2~B8<:+|T+ wBA,K<րeKGF=^_4qN adwYȖa/VoL|Ԡw5Qdў̵Ѫu{I`-H, O{ko P?Lm~w)TZlxPTxGEzRڂPR]_+$22ˡ 1e(,?Z^2Jg" qe  l 7.$?c=á+4ڃp+~mʱQ+ 4YSmkJZIV~,/p!:%9)!y >HaoȐi$M^u pJ[¥JAQ ,b4@;'i E+[Ol4Z9Ӵ< =gӛX9J}tiҙqrfAjd0K}~W!L^;Hmqx1*3-d<+/\`  ۣ6LI˖e0/\33Dk)V7X_D 9|o%$8o.Hw $k 3|FC9soQϽ0Ku]!iH\׆0Ę4 ^ H7&Z Mu&n̋] Qk>.͑OA*JUin¨6VT7a5T$(ՈUݮ 6f9eApʭy6UDd!~<i[$!}4..8 mB%Y*t0;;cm5B{JoKp`j;MDp[dž鳭;2{x,Tp쳐}!K$QgB1*9Z&ţ],y{[0Z ܾ f&Rh֙ygo7qʗ 4Ml cf{#޲Nى؀ϰ-NvW N|>6M[d,Ka/ɤ9.G`T@G%Ӆ>.Ac 8m\6ZYOxJS5#TfT&E;Lߛ07}TDo}e?ᮞSRLsP`RX̰|qfJɢ4GBRXmWh:QF); ԟ>AMAĊ(aNZ`؅W+PԋEP[,cs{[4^_,x cLʟeo0,c c=^QN35 Zc,}c tkN7G%$\_Ajj<jgu{բ??G򻷐xw)T8נè=UUN+F0Q+4@&rpNE\9etCC|XVo ]aYvef>ү}x)+17-e5QjAc%.pz:SAℤ8h\#H pZ-.<;:RN@ڳ/L"+Fg-:KDpq<{.P<0ccTX<-q\0'C2ûiB(|z07@7р,!6z֌8Ӳlnee;EgtYѰAF'*$^HୄmR!J?&XFR=pz b,㎋XYF=KPlfeO]L, ԕJ'y>lv?ElqeAw&e>S;.R0AU3_t!)Ǖl!K%*eYwΎRFe2G6C#zRxĥ^}& ѕ )ܙa~9c^C)>7)eLӅ*(R{>%B|t% =uaT@Q]y c_aB_a\$.ym"H*m5- S왷$v$F<.4A `ڸ:];Ꜿ/X(DzwQYEbb*Qu۵P7ahu8H%:",êD>vcj- :s|J[y$CqhߞE-{1 YGN Q|VɽKv!>sIƠ ?(hsP-)OMxJ@ї4ٟ{\ 5Vlsh|1ͼ;qЮ.{Moqe̽IpL~3nϣ[sz 6sIၿv+•47: GUęH?*+t)%?igL|+k -5>wU X|"ʑR#jeᴉwNb>^7a2dQna2q|0c"ĕP1 D`_YϰʨLm.ޒ .v}\5Вtż :JV4Pxm}2: ɾl4D^iyqcjۼFdk٧pO>4MEU2iT{zVx<; <Δ~T]ݭ)}iFx{SKБ&ŀ؅^PߋȦf+4!VJ.W>Y#k€RrY mTL>Y{zl`\%Uk-/Z]f{+w-?JocxvJJp[Z>7w3IIn1ήHc9`֪r:cM'nә]sNg{LRlڇE5Wt<,nʀAyE7[zH*CRW 7-#cqӵ#=Lm3'UÌ; Qnl# pܘԨ7N'?ŞhF,r5CH7 IKҝLk!{/ qI϶8:pk/iJ47p) -S)q%;74R퀜]B$9w RDdnpWˀJl'Ϻٔ%YSQ7 }3_p[AnkaQ~YGK 8K# ),~0٠ʳdf! )$ea8p3䂉}ϝ4}S,6Fc}_ˍ 7k(6^R.]Op8š~>68JX6^WlC?RϠb>SjAy4=}C0 8=Sl0ާK< RDx")p!_ rvVY rW}Q|+,b=B`p?7MZ .5`Fm*qDeG'ձ U*wVFyUid $z/7`):`#I;f T\; L1*|dms5`R8_m-;g#DucED]V"ӷJc(l;_n +-ԃ]P X &- oQ/%dƉrRuL?7 +Zz2GuAo2h.H^BcrNwd9,&St-D8D1;W E26\Rq~ڤ3_s٬Ui$LkkqtȺɹHV4n)!*!D/u7G?.)< *XML:ԎVPa6/TnM*ǎy%BmwAQdm?ې >| S i}ѬZ{~/azS7>!N`%K}q/-!Iœd25Kȉd)qD-D55k*]8{j>y3 >] 4$A0:b-}֎ԦO $R{M8ZWG;u?"SuW;Pm;1XO};U<.J5\.8f4uT vAeP o"Ptrz2P3 -iֹ3vŎP:Wߒ\Q{M7 [sY1-v\RaN 'Z@Wh),DE>(4iw"Cpx(vx|f(V.xDL}n [w2tF/yZS'\&ke۱=U*)0gNWOK%IS63/+Բ<^0I)$}Mj{KUt/Z]kGwe5>ĿB (Y.WHkA^-K?6*cTGudQzj &hXRZn GA[d-68xӋ0)Z#32O%2DE. h> eB"r?BV?0J()tG1 e{&m S^\d؄+4y3#dDPըJ l%*+9 BRqu "^rj?dcȽȃNK>E {P4q8!pUtRΌцZN~yyѿD&%-1U~7MI'8n6 ~SYglr/]R`ʶz#po$%qj7%Rt}Q(L Z2Teh^Tq^K T++ƌMx5jkZ}y+ 9N@w!^`!ш x*E N{7oBQ%{`y.CO).e_Q]p}a9FLDΐ~W03S+G$ѿK TR2VEf86AD!_0og7"..A^:J-3XE\6fDj }3ݏ("8ߗ-vn'bbOp T^io+$:fcmJ^CPH.j%KjtQЭowTJ'"`;?MISS8`Ё\̚8Fìpq6rw. N6pmŬ^KC+vb,AY^dªme=ƧvHx93>QJgz3՞xlaG}`kh'jCit5徙#k$`s\MBC>~ԳeHt}9"rשj>"mH{FT.©Q}WmTo:P suEm? 6_\z= ` lQ l,Ƿ \_f _omQx˸եsQأEkKP{Jɜ'7^|p'&NA,Z|SF| L\_ґB=:'M5@!J((N7B#A_ӀO.|vsQ^ z&"-}k j{D9fk o GulXв{izRCHd!fԶQjJ( !i5VW 쎺(Nuw, *|x)´v-s; z92 t+NS{6;Aylj@@똤39@N97x|0<[̠V lSU L MȕN3},W7\ ! pNJj~vH%<<\Po[gX?t`prod%v!_Lp4V(!T,V*k66^vD ܿ#6GzAPaC !BoY*A1 }9- IauZ bYPW?6me^j!AْӦ>Lk<81䲞K@=9zX'b*j\k)U#?HWsQJmLCA4]!Cf %{]GxA֬ _^'1CXzA_q瘜_Ȃm}!RP /,Ovq-D63 IX^{@#mU&~1 UC1mQv/;u$Ng=v>YYW&[ &7W,?G쁈XExlERӴ`0񳚻[>((S0,S` O"T, bD1?+"M6{3 ]-CS"Lgb97"uMn=Qٟp( ?e$g+_*,ΐJ <`>rr+\^Pu2v&mimB-{z\*b#g d0{ >s<_G kϡB%g0c؝DBb?l՗o4<+ Ac? ?.58J]|./Δ'=M>QߠB+(+i)e*="GC3.lU6h8:U glZwWUiXe~OdG#1I"I8ro"vR ݩ7PJhRP"_o_ xH*_)F.B!>qgműOqٻ= ,FG3η4u!Nj% r:E蒀`(8Fm*?rnh﬌qǎ j\hcS  ܰ_;2sQM}Uy/(J?A.̘#-X{Tp;n&:Hŷ׸G7TK8d;j}wNoPV$qIq8v!f~dlt(*(1 su&HU!^!邰~'4G^XvI97ٔK?i'Spwuy!eΉm3ZIro#mCծ)O1 nA?%4gh.+1uHF4Hr,!pwZm*HyGGTF+ڕAl6M^As[TKgLxuy_?:Jԭ`~iUZ¤"j@侭 B+pMCoѭ⧌2iAҼ7@#2;rE2RT˹p1m%2}a^E#~oR I?$lf_zE. MT, Fo$;A3Bע4=,IT;Ә( &ļ֕1=xpt7NHW.>zo?J|;бx[X*4 dVBlrS&Dq[^"0j 0XeCڦ%_.H۟zؾj͊ғCv ea_ϧ :>RASr?;wqq*ĺ]җD]/`~m9e8_8AS"U^*383\Q#s=~˃cMKb?L, L%$Z؁v#EX@ԗUo(h봈SY.> GY|2kz+Zp9s.HEk N椓8}HiSqprֲ(Aߺb@ڲ1^sޡ0 =yHe 04H#A{cVjx%ŰhPbU#*^ 1Yn5O"#-J8gR0Y-@%iܪ7&\!FEgW H?WCPx_}pֲeZU):,+]:Aw'h8x;XA2uoP[CٜY]'\w:Yؐz!̞AS%ީu_ {(j!ntCslDoZl|9ƗBQS$ L^,{s7N}vv_G)1w2F\7f 12XxuC ,MN:o& Db=Ovx,i}8r#z ԽW2J f$SvEG]BkSz/۷h]$ASx-,U5 7A'R.ʗɖt8t =KZ;)\mڣ~5+WA.$_‘Da 4Q~u);ѸxFJ+љj (!G˕<21,i6kEйz !us BiP 71`hks}E#vugNh\"U;,o\.E4Ufơ6(`{n+,]~zn{4 BzBW4fZ{| G&;pB:Q{GZ^M}M9'PqA'aOR>E"NGŰ;@فR/Gj[ͨ6{VkԵRĺ!R](Ǒ+yLg.6 H`~E6ˤYbdH^ jMt*kmf/{u4zywSFN&M&}՞%0*.Y6ׄѬF}"_Q@4k .o\+_M~ OP 51 OطW"`026ӭhlhMq>^rβtv峵W_#Ys(F ׭2 UpCqf녹c5CDj =|Mf!.j-aq ?1Zf I'w`#@ wKt[H2Y2j3ZoJcL`ȪvT߇&{FcmZ7%ߺb?B*(!;/z̥zƁ4u{~houU* !E)Fbyȣt{hMLs%,P_.#|O5ql!d(â$ z U9 U! KQ4m Oŧ~[(s{*t.Ll5QLTU <ҽ;-7~a~͵ͬ@|񴗂F;B%x@QjGjf?U]N#C3aJ&cK_X ̊6b AFn'd0ft9JY'we.u`eG+U'gᵢ3PW3tEtŘubtz]}qMQ3xg[\ ezᘌ} qɖ$k[? 7CLoը_}5FRٽQ/M4̓1@&N,DJښe=D h|`_QRݶ*تm,=s$o"`]1p3'E^I˛^OFB3jue LOnp;SlV@,aG 4}7êTF^#Sm"ߢ%Ub-/v!'rG}O-I͞74Nn\&*{Z21c;sNEx-cW+籾 %, 0) x|pr?zN̷Z0MN TF1ה^qkK^w+sVxUPԩ%1|{tS )MEغU +u/ n-оUD[U+ŜQ !b>, v_9gi}C>9 Iu]+lxpsΘӴP>sy?zbT%KY+7Ȏ3;xY 2o؋{#-\a,ZOl Rwx{?1(&PYVlRU?RdAkԪu`-m#[孝]@qYKʤcY+2on%ϐOC=|fs3~۴Y#rϒ|gOs|Ӿ@/8{=2YMTə-XbO=Bj%5 xЏOpEg)A;[mK Fajֈ[3 }O&(=UG[s\LE L1pfr"qNyklI)_˟$)|gӄ2}r%EOfFW-qI͙nQ)ZlDC{=EP"맞kNl9cb"J4_ $_"lV 9AS|gm֣,YYAB}N`a$&Y,:Kl%=)JK"T[BQ[_ʗl% 3Mvp ۻOuaҨpYΎؙFF۴ o%l}B(vLYxy`)~pOp2b_OA2rVnc5xꟷ0˞Tn( *pxe;-Zo=h8S{5 m"xϹ5ӛWQuɯ1a?_;Eڿ=}Vǟ9]ͺ}'~Q>ETI2,mYf[ 4?0ٿ͞ݜB:dXoՔI+~DRQNi{pgK2#ЮPf9H_>>4n 6F/Լڶ&bkm~+lGjQf|qҷb;&H0(`-o D,2&+,h\sٱDTVD*oS5zō]m8O{8*IIYB])y38zӵ8Yq;Ѻ^7PmJ]& q $C.a#^D ܞn@7 ,&-'ЭiG}W{ƙL{⋣\jD(ЙbT ?Ÿ.< /zw yXA*SH;62n>0>(7kxGw[P` ivdva]Of@ DU2Y} gQ;6K } N8.x`[ьS%h1iTnD ?H3_Yp/#/~rFɯ LTiZXE et&~z-@pИ\ .4)qٛWpU)xq͊1kA 2 >k*n>/aXqJM"PΞ;K'l,XOa<2$z-@K qlߓ͹=&"]Y"j@KxXvS)biytrx:#+!:/j ~xPU/-S=EFщrbEQ6049!Rpv[viKk<4pBoRZdcHf*F鰚D$j+I6(mI,OO d%·go2݉q]Bц[f&=+oՑMgze)cp~O9}SͿ:7P;Fz_!'{(8?Bŀ)/( o\]~g s)]4+n6OokA:8^{JƜHjߌ[C>i0)C $Qx&$ިn\okhHY?*.WzW|PL+"j?VvljQ W O-o\4ֲF}YY,;ENC,:H%4@CcɅDϯim{h*@q3vd:oU`_ =t qW'zU?AR{F(s{ X\I/Es|GkJѐ$]>N@.:J(I`?)K|Fq,~ Q՟변1ua{ xgͅ`QGfh6sh FT&"Y̹/+DpKJUL5g@2a/ 5MR;לtTbk'79|U^2IF3d->kbK hmbM! ]2;x\_.4I3!,bj8J-I,7m>.ۘcDbEkT4@oH&14_c|]-M=ᒜ$v;pF$G P+珈)f綅Ui21=+ۻ ([*SfyAX,~e+8ҏ&XͱV} - _ ʏ0oEcMplt$cZe\l@hv_5ȢfxpR-';V[#S_ATŮf*9bX^ּ[筲waӋ^YҼKrid~G {H\TI$OAUtKoH@jpV|]>X ʐKN1mR %o^g*t߯a&lW%N+D` x6:H%n%^X/ΑcK+QDd%p _'wXXx9g^ f%P-pXr8x,^vhsՍ->"n>:ۣnya*Bb*r\naxQrRB xUqYⒿ]iJ>^av3ܫ$$[:$L!ju}J7$4u9Ԟ*ڠҀmQ0 !Kx{-6hM﷏!m.e6?SFi[+;U.̀AQ^ըS%GsyF3QJ|'?}vA>m&[d0ueu#@a+;=Y@ |9XTgc.V `ӉL|@I@:caADyf8pEL˟Mw2ە2و:K殟_nbHs7wXɨ7JCfHp=6!c,&ʝ cBl1}Uիw_x#XbM:D8F >1d!7࢟>do>@$)RI`G^D56Pk"U]!Z ^˩%g+bq@PK *RזWvEBǐ(x٠64nǙCOi**Q9Ǐ^yoi&e :Oje&cg2فxxE-DTRLS:BmUW}p,FFVT\My f/TII~/Թټv㍒ U/YjQ':c">CeV ċӮ-I@$6w0{9@!,V[zK]S7Wœ,k4|-b =RǰןLBu2&yhK_FL|A8M Dq8A EKT 0"PmP%)%IA#U9C=IY. :POרk5\/ㅚ ijH- +u7^dlpkɧ*Wuҧ._|ўSEei S:*-/p^ '\(qEUԼF&$!FV?F*(8tm Yqp8%A3r}I A[Mn[#A쪰sP w~tm1 [dzFφR(fu GExM樳zdȨm(d9ÃZ~#;F;s 6m_k2Hg@-'c}0GE&hLf^8 =,|YRLWR hp+WU2*34!i"4OQ5]8nLkWlP.Y@;g+04Ũ aށV7繟w"pӥFxl٤>0qc\A>$f6]\i!U{ee 幗v ZXK>S,7 XSR%H14KIwiNw8sL]J){5W{J2Vq2z$f<-;S,o% OĴ%W:ɁvJ QuY $„VP#|yPtfdi64ٗOVpx1 w)=[rG!s ^"0Ej5LDyov=>CLPEMbdFLcP|k}2M;pw·*?\ft%zrF%j[F@tk-nJOb88|c?cC"&E pOqEB@c2U+y> ºW C狭 |pO['ZVB ;g9 ^ #,c X EJ8n<:8W:;!vݛA˛P):R Zs `z?@iJ<1Kqj>#cD'㽉@Q]Tjיk +[\ yy1Vlnr6rN?H<h'{f3S gLb߫oVԁW 5!89e:0q>XA]=Ov xo8wd"-h@yѺtZ(Ï3XvݕqDK ]=Ҁl[rŜݎFI]k<6[nmV-p8my8-KfªD0/a:~? )6 ZGS.fr #EI5}6׃kPDNm5%{kH!P-g_ĝijMK?x3;7NOJ:imhG Yk7╀ѽ|&p]Rzy6DFD:ӈ8^PbkWN]H>36x'p~e˕t~Ύj:sҼlx:vK @0'|:,]?>Vu#%4cVؑ+BUZ}xKao_]V0ST=You r0VET?c⫅c<jQB#va_1\XU_+%bb2Z+e*~)bm8F;P5_3Z>fAӮO\l4P@-Z$_W ~k>\R~RT8[ͤAӡ95Fara`܉u0cp[c4Nd^<`l1n; KzMA lƒf&.۹`oCYrObpKc׸Tvܔqi<TO2iiwEm`cnvL]YK\[1+wKDgLᚪX0|Žl3K.c$ iѕFRRJ̤tz#c+f6 , O,5~;{+U+w~6h~pY;aa_s,mg0Yb55KZ횞(/JXV[ 5SBt}L\&8G pXxN,,l͍ozތs·Tp)|U]6{Y : F@ f˂ֆoX#?KXދߊ盛Jt0)X,7u:=-q.KN:veҖ 2YcݖfF>GWH;[bƎJc'F$R01(Q$ME4.,{6:J# `3|&NDzAHnxkg-io{qR I+0'"M,uoHMVW6}nS԰VaZ|^Ŋ1V5t1I ^S-xvkKzvP㔪&\rwS(.<~s@RʉuSȸixuC zFVkd(ѥLt nFJLdj8<26x%B(a'e/#O 0yU|P4ThnADoG0h ]a l E][fS$U WT~,`ӏ*39 9/pJcfY)|$?kc.Lk6ƚ_/Nek!nF?mNy^_-Eb!˵aN a07I$aU*|GBMw&rQkZ%4WX,ܶ:2Ƭ"/x6F D 8)aE5UW)$ⸯEȽℴƻb4de=U>v<v\O=RcV_\!QyKxiRyLk8 YC)1%֨ε N.K0q5rx'XA9*iL(ѓ`NI^$ưkd>,31Q j^'$ b+k>E 6dž]7 'gbݭFC",v%:;mXQUIxiɁkT>&L8@"^Dpt^lВH],l$6nܱ XA&ϑiTBvK V?:9cBҥWAyNHd++!9.*a̞caIBKs})SDC\oK1 n^f0`+vވ. %פNm"$nb( ^dPK^ J?.QWlm*ǣNI=G@A.75Zb*p2Ȍjo#ćNȔD@'$8*-(_,_ :*h5o-]vux\_Ԃ&>aBeZs7Y; տ]v^>@;tHgl*& K!ڂeHc;.xŇ]{?8۾{2J8oL 5!Qs7L-k#%6_MPԢ#(<m10ehM޷L- nzRq::˜ާS0pK6{<éք1,Ju} qmW(TR)uĺ! (6FÕ\j=Jg`]Qt]"NrhkDz-pwޘiu^3>-sd6.(S%.>9>?Pݴ`E37_OƖZ2D̈́&LWXHâ EC7\R(y}<7D)6gv5r+h ~D% 2|{d"햷`@:umix^V6y\X@_q͂C$& Vu5c*2N|4!$T+L+f+hΗ/9KD=!, mq{&3q?Lj&o!y& C6/Y@\ ڜF4!(JA#;kE{H= 3 h=Q~Un1'ãI(?{:愎SLK?B ٢.dPӓ]T4:'u gCǒhyL- Mp}:c[RV5]zXwV'/:0^"H1 Qh|6 qe#)hCHϚX e<𫚓en.Ih!m/MYv͒Y^޸'9(u"[{ȄeDS+4Vې [|OD$lY4t}o̅o/H<8 oe TtI|H>xAٵC)%+D Prޏ~}請h/$`[m"[\0Ok>ы77}᏷iXvtEpka +b@5ː4:XNjwlԀ= B~xdnK#9S(6C: 9&>m j!-sjL)֩RUdXů`k m 7B5=\vo4˼12bK@džJu]OT)Α7/݋ͅzfCRkIaʚ҇che)Z|cR.YYЌfv}cx߹={KdFGp-&s{B0#)`B4?xH+N[FyaimM#q'%%<c Mrf@Ӟɺ|Chcr #YaڻVJTŝw-8v^ȗs:dk܂&JnĈM 1'pv6!!ġv+.|BXv9 9:ܒ=5]oKc7BRTb u F5VAKbK.:uW4CDCLXC=g#;i}?WOuwqxPΤҮH\) A=~nKk2'#' (TjŎ'ƚ  awxaﲉyZ˺eDHHEMi`+(Hݦ!eTUA7ٶ'} KG CVpP1x}8mO:SELrW'J_"c'1nBq=m >^t<11;ir$ca Y^Cfhb**:ByۄBO`@㱒 aT H?yb@/N0j (RT';,)k*Lte$քҘxvYcctc&m@ ?ی7<,5 f IMf\!Kk E>|CP`˗Tmc qD\H!CC6QU?Kśl\m2JTX^a45 sGQ0I)"Dr#͔+-0$)1B\y * VFR` /bP[3sv4~;ki ys^p%+= rQ0^?NI^(lOG甈l/e?ݛ D@=|tM.+{40M r8 oM`fhFPe,5iq|}j쉕kj&E)ĭ]r?*D˔@$pg‡w@/|L MԨ^pNUDP$\`d}î)B-FMнyC\[N8{" >"+'D #4ɐ 9Z$IK) ,!R0+,L?}3##M﹂˹+V">L]?)YٖP#nJ1trkpFnk,6)cEֶK]P7>!mMoYEtas׍px/HP|Wrzb pwdzVVxx>qXg!ށ =BH ڹ$.ib!/?A^\׬&@RVkQ'eܞju*qc -w>Tc ;!J6*`յBa_.^),vA()$jR.9nhE0UE e*- PK]1 g?kߥ.% bCi۸/h a4}ʂU48Rv^Pu>ɜmAx3F J;X >+ aUyG'uL(V,#AAFA+'.M(\eU$0ˈO ijG}erJNE)j-oAm?pjuf@A )l> |cԬu-]6"|G:PԱ 1y4#Uvz8̴'<_9n ІFGi@ ^j(n%eFb %HO1٠{eTѧ 1KH }]ܭNfD<0DCq풡$YU <58G|{e?:^r;- ǩLge<2V6DdDH/…Q 7u .dxE 4i~"`R^$_V8gЏSd_9造uؽwy we#u^ DxKΪg,%agNS4rIKB;j'38?=Xkq1.Qu ,f|`N}k:̓jiѐk6OOSZޫ5Y:M>F;_s6]TmqYw17~V H)堁I.f$<5) b}4C9*a>{gbP~%JMҵ˱}Y'?{*0Vj&&J@L}i6 `F\KR'V,yVyϲBʹ2$bYBқll䆱 KݮbbQeARm&08S=5*aCu^A9*^orh \e,T#1_[/~Y]WĻuAQd&#@N_ͥȺZo"C<:&c4Pm3գJL=)Y^1Щ(HcO#V7Iw#/xo4k}5-XW7#Q2QCray)7ZƍVK&iǡyo9 H xUbtbC"JUgYd`'G&hCS]:dleg_+QP$l'=>,ZScY[B8~u]:OXwpT~b}ʹda$xE{g9ViEC ܷ o]E\׵QvBHx"y{t&?a- j;ߖJ+:\DrAw=&BM_Qy*=q=?Ywj1/_`uw)F};H%Is]]\S:a - zYc5эHoZVlvLZK.j0?{oG=u7 $`!#;٘qǦ#+ wTZmhS">mb?{p24-miJZaD`u<|P#}$U^{qCb]/2.5VƭiۘPT#bof-N5I@+7a l6c[ڵk~2 \ODŽ0[Sp4N1o^(}…;+(t4^yh4]{𧂘b PH=ԥDqQtjZPŮf{%7c Vu X󪥼QO ͤ""x1j ['7S?G 2(-[r$n6/='$];j{I 3?U 0ON[UJ9c4ՇNHØlNhI3#HU"(%\o0"@3gB"^AKGC-@`V r(fV"İ/Ĉ>BLr{}6W cdUx7)ƛq~7tAlC9YL*ez+ig{DviV74S? )Ryyeu {oq+l^0B^[(22E5zFk{)`Z'׵o"݄[ԤNOH[|E2x&IrFd0!T̤S7D8x:S(dCr"|yڴ_dրKj2dU6̆ Îw OӭԮOI~TwDNNq Snjfφݚn?"Dπ2Ʉޟ>G\q/m^Nsy:9MԂt‧F,t[KHu2CRzhjw8PkH sK>Hx9`ʒ׳d9#ClE3ms %4_evTAɖ OK,b"qtiڧNc'B~_wx4Q;xk#^ CwJX<-b=%{:sq( ~3TS I߈5"Z~Cx`0mY ƝM^zVQÐ%׶N~KOh&nj~"ET#M5xd5[mqSs'ḅ! S섊]*ݲpe=:u+`x LvN.P|:OɖY4Eb7B@`z]no"E!A$4|(uO|:\N ZbY]eaEo.h Wf2g$ҠizK@?> 5 gY) ;ܿ3zܥc?UIC to:D|3g}&3ТPpLj#-bnŦLX3_/( *~M-@s+r AzPVB6L9y{3W7`;}C y\ᒷtMѡo}'%OpYHOEv-i@8U ǣ%thg4v,ľ ?&ݟg5m@bܡfϳKچaG)i<_T!]W(Ve<;&&ʇɆx8`<}75Mk&ik?|FȽJu[ nq`L=vhcV:6*m ͯ8Պ[˜q[HNu4mzHe>fP˸حn|\M62io&}k ]pwҧ^ģ / 6/*n6\@ݡK,/-Ǖ1zId8 ˸%'WºyN4RAKZQk*1AW]x@~[?/{KgWZ[rEPNB$8o5FBRg-us찂!S Cq{r U hAQ\c t>.GPTc-T'F,OZ?pt;Dey1 Ic:K$ش94MEHf2 l1XqOX$!iL/sX),%ؔ2 D Hd3~ Ȃ>RR $戺ɹ@ёӏ6,ćy^8<:l˭NE>q}(W].d!>ݔyUf+K8WҷpPO61 MTnxrCɔu#&kZPzQ2ow28ݟRʟUQ?yM=W NW׹Vՠwgb x _߲<km{/HzSNs| 5bp ;#j(Z -{JQW#_ ~D5qj,8$5_.̮|7+#lpcX >Jv-GY f+@O~:Z{-yTdO&<|Se-KF#"M1PQӃ\k×54RI5΍[ޥ CPyT t,RXsawW+|efnhܯ* 5dQ(F20+2F_3N! T$.]LƵ̪(Sa_ }<>Քo-Wtjotֆ䒊}J;=\T ?F9z4Y'<ʂx='\r>g))U{ԹWPh(D;dk|X #19t5䚅.N.0(\!wش/1+ , RjN{D{ڍAZOl}Kz8hRa,͆>Λi >mWn !P0C.]ӵ1bz@Hc@Ҽ!J} ӅdS >> _ ,H9p .e{䯪X;CFvwFJjx1FRuԣ o:"+V5TfANnbKX%^*W֢U,U5;&rCS[ђOEiwW=VI@_гGtiqktOɭu-_} Pܣ{N$:|w` |_]v}X\HZ`N! K7D~ B~f/ml66ﻫIvEٔ ^`:VhD&ff *X";٭dE;$)4d[\w&)56i }ve#39۰B$XVKg-Fz~zSم m-Jz x4bd: J Y?[.}3MzQǜS d?WL'*0AxN¸Z=ȭӫ)7M^u(=ӝLN׺E`u2\x0rوͫO"[u뢷qgh{X=AYibۂ Wz,qqФ󽷹7N&處ulTI̤Fܕ{c1ʽsx}/GGJ,GS8@rpj &LLˀ4(C1u'4/ž.lEA3LDL): m|zxҠ*oG;8 Bn?=l 4-$0҈$~VS4^MJV-h)|; UwVsa(nӎgԊ5hkɇ99pMYrNKFbkffy+w*@L#[ElkG{]G'IN  ?r$SRKTݳK?Wu}>7Ƿˆ1?iފ ^i ?;SatCurD{D^"?0zK̽<ҲH`DZ AR~ $ 9F0X/6x)m$-#bۦBp*W߆}޶wuNt({ńw+;wqy$A#'E1 &/=U`H>̫WA3S8Ί7wMF^BR$tH0͚ K}e1M#guN/%EBO$ IDSvpyJ>|QA04~1oxw;\vqe*5B 4*St e޺k*O.yA׉67[)j!^ /uxY4d48 >6Fۊnn{waت12_guh9zzD!X+ -GR=^sue.FZ&;m#y&BP;>zX<|{iTh3gfU]G{{2~֔  +gisF iq|)><|4g|k[S3UWθT<hQ+ɣnQj9^f>sim%LVG|/dq&h|bI/v->#H~)%xAw.31FPsnzJ(7b?Ĕ,?:"ne7)쓣/`65:d>_28Tj͛~aҌii sViN0)0ӅIt,(wOEo}3`Ĕp%e" btu8tNy@$BzTNpl!6s]XMXrh8Z!B-~ZV3Uf,sbf_&C5AZfo<_p߂&*B_/P_jtZ6I'+>=2;8w' Z=j1o+`Ew5vk;S*LΈcD+@͕`lP@'.d9=(<ѠIyXFL}ed+(>YL U> a[@/\CjO?K(W0=yG&ozЩ.=78#T]O3y ݏk! x_1omvrK[`J*eYF4Tkwih+3zݧS8'd7Gwnwl=$:+0ϖb0dy!ڃ=x;޳vv^fPRΐ3`jku!|IqhqEE8ʒw9j:vX{LZ@{t<+@wkH%N0HbЉI2 3_(ډMA.l >s9Wj`FyEW Efh6uϡ{{cYɒ GVyVF6NGpF">ZfY֑F/1H";\GjuSzR-LE3 ű]jC⡠uאqzkIξPEh~{gIa*#;WKz~1غGIR%i\V@YfJ ȦDwkHa?r[[E0x'4rWq%lL~EG^0NʍI?x$1*Y|dLeily1ad! '_A"3O?nnO~{V<b`q#KT~ \7USP (_X !A61D$IR4^DRA촁A ]e#GRH#jǖ62k[&0pbpaVՁd mpG`ã7Gz̧D)*pUD]}!6;,fhhPƠG.e*x,װC4..ܗ9&VU3Z7 y+:@\QON}*q+\[IU9`ię a3D,&M~T|`Pr(7X'ǛO=|?{A絇n1X 2fWT3N"xq} ~gJNa9 b:föe66god~e [ВG$~*,=wj< ^MW}\|Si8VڔB8ɼ >|O>2?B̐E|pY}Y6Zq|9n'IV(K%f8T=/D_{kHB;v,'!*~K) Q,&.OuӵBSU-`zd~{XzՍ +bc0v_N`=j .LU>v^D}/ 0Ǵ x)ZԺØz=ET9gAU qͶގ n8øM<| #p2!ӮӾF[90|M3(_AtE >k7k5oRQ=HAL< g1NGfZڻdle^y7<暴h ?QJOtSB$AEk`w2tIys .L=V'~Nzi[o<MXМb'T'bCvsKo Ԭ|zs/&P˿3eAB f#"LG8՟8e9rh4K ~H%g/W53ކ&fZѷ¸="TZx՘z%KUbX3`"%Z֡v850] +dxHlo ށs.Y"ir=?9lk;<^Eˆ@̬w7Ueqy!: ~4~[+p)HcL^I+`7m{_(Cf2hgX➥D!.=9PUTB:$⒛$*#=) ?N܊ .(╩;4 5gO{c(6?zI1Pd@hz9#]8 IHtj3&Tq1dB ]Gf2 o;Puc;~2+m%, 0/휔񥌪ޏɖd۰VT7 Uqö_5]'],tU.,c9(~w[at˱)*DHKttݴKﱡ)~%;M%=/mt1R ̈R9v57='6i3fĹ`.*/^>Ckrj饯6 9~h,=*#0 ؃gcp o"vgm$U&QhR DcCLχ R~wPS!x$DƐ =a6£'SjbO|Lo\A9wZ9tP}UBV$$hN%τZ)ȍ~*ZúT4ek▜rSO-?Āu ^KA]~Ng8i/GVx`5tt^NFvT?\ lv KЅE[Ap6ٝj$NV͇JmY48+P>V$J@hrЮs]$|;-;I:$b3ABp^9](S,\G/J<ìÝWW@ g.&Ĥ84}.t$y1G-ys 1{&6{g H-Gs]8(D(d[,>dˊ #o{Qj 0?!ķZpBE6DȾ}4.״{ӊa`a]NenfbN=ղR  {U~R ѕWxĴݱ5;6j Y?n(jLK*ؘ۵hfHT qhhT^`6' 8W˯"sgyw·>/?llH(O=.QfMvLX%8/sM/rd-AثrJ:M3nlg- ig5K6PSJ28ԭ.&ga2(f_A,L@VXp)dr_sf'-F)q!|a ?u7Zق@2z*"xiP*dxu؞ĬziJs\5oL_p|e3E]g8(an84+!I,NCE o0ۏ]1cV+]M>*tphR@(Kx(rIbPTPUN,MѬ/ }*?JRBuzM^&_<(D)WhV4&; 2mL Cڟ"O9zksh え꼭gV:dfV8EHllAs㻌w`-4D\Z㤬D^^iZ0d$ D,8 'y VmJxBwj&G#حc, ,41i,oTG<-9󊔇GJ9aDk~6s +gfdQåЭNJs/c 8gCXiBtu ߸[ R9{~韀3ɝU d| !Q:ilScϓj5HC ^$2zfWK-6[v?ivhOAr߂`6m* ~GPL\A2t\W*`E⦸' 6K OkU`\Ϊkn#-oqimR|7yH:%ryN6쫌4ǒ(dXM:϶Uܯ@v<[jϛsߔ;Ѓ*f :cׇQ/jy+Uj'AKtdͦZ<H P!POhJ YF㫃fϬ2$'ut|c/O&VBqy4\Uc+φϾ.0棚[pR k-:n5@%cژ1'*)=_xۺvmtUyog3GQ!C[(f*| &.c^]=ònvTh\il&m|VxQ@I<6/ڴKM#,[rPt-\~jlzG[,v;x}_ǣLi\A"8ipVɈ+Q{ D(ŶY4q[yvLK ! `[HW`KrbŰzA~Tʡ+5(Y,/BRQC*H 汸Pvgg@]oR&w D#%2#@<**ݪ;l.X9ԓ!wfDꊷ+X}LAFp~cH^/M;AoU 4IY :KťU{U=[7gGǘ)A+& l|Dzu @mo9)aN9qO0#MT| enuV-eh9i\jO8_/j(Р[Ly _,W(mD<)aN}[byI &}i\*E)LZo1$n!+|u@Igv}0OVT Ω;cԒ्$6@$4 Уc|UGR,KQAG p:O97*5z <ѲcUQ#&8;(27b 0 hJ0ix^6eԵhx((HpbʼnV\A`n吘Z)t=$68oMO`|,fe$?KIE9_ ܚL[$p*ylGkK5dL[o@m\6LQ:ʕJ. 1eu`tx@ 1!!K“܌N08viZBHǁ= >49s'NXG60e-xhHw!u,f4P}^5IJs;thmnmYu3J/ê|7ut {7^(C#G2Aw.0;wQyNUܬI)wmUhк+0LI呂tyVa, v(͘HTv+K ^3 Q MӪXZ?'Lp:гyQ=! H;{ ~\QIzGbq vi K{.w[uA'tVuEi;*'ޖ% k )N7EV4Kk-d @}4v4 tRNEVk:q+Ȍn}n"2/vDs׸]E$Ex!⾌ j;$}Z<ϒ7h2٩zZY|(QL *z/e$I@dږ'B/%A?gÿ$!IfCm1$}nD+.szh%Y}GI6J,\kY@1mr"S]TF^?57bfbug`G_W-?%zlEe׉rgH Sl/vT+9Lौ:;V=eRK L:Oؚ?jIVh0HfI3:PgaR!RwO~L߀Tu'?+}xbC{Lp4[+B?7ąeh|T}CT|0Dw1sݺ%W$aVģE,(R Ii$6@ j)@c8y "_w@ƹg۪B%S Xa0Ck_ټsM3VmU/8bM1WHroiRinmp^Rq>T"uv7T80yKDT[F/?LkࢲT |ݿޜ*YcK9Qm,Խʿ)*v\A$>&HMAP=%\`2Djϴ.CoQU6kЩ*j7Ȑe  7rgtGb9m?9|ځ 4L=& (l0')#{ CkR[sN_ZIؒǠ략 w-g |g๚*(qjdp"-<vZzpvwnl> D"iH$ Zsѿ=.5SIk'E.2}.vÓXܞ df͒ܚoUMa> )%!W|߷UQsQ,ҝMlFf:?JRwhs7+PE}$o 5t <*MsUFEŝe=kbvf|^h_|% \D`ΡJÀA);4 Ph{?E`֬2==jvENxyX$9v;/ӆ[e|$b]j^)c?A?ZJީ3ަYA<6,`J-#*Qnc=%?\CmHj yy>4M+^Agv9> 'ȃvp+wĐ.B{w8w6C/L%R<p'zȁXM ,.,5el߬F6hJ+ɋF!*t|5oXfLF9"߲ RJ8 `{̜Qę9TA݃ٷm(ogK+w^r} |bn. ٱ\flp *{LBﶍ&['R U!gJǍG mFb&%k2bT&'WtT=RX bS%ra~ӓ84fdk[}mW7Pq蔱eceZJQCBukFN#ꍴRXjD SM+ s{̟GƭVyacbd/cqNf0 #Hp& Vޟtԕ~PJ҇$t?S:~6ZjpM`fDՅ(*IJATVB v"37Nj>q=MF~Vܶ1f^fKlj/dFkG&fFij\?#w3Rwh 7eg5EWKURck3R φ#Ȓ7l-GzM#?1P湣/;aM ~?XS!]\ل$Y?(OFpJ/T PmXW%}C99`[yb&!t<C A704nґ_P9d=k~Sք_r:j Ng<[{l4M=NEYn}CF:ºh$NOqrBr ";55 *~w{)zP'.Fp K]TW8jCM^^wxyI?j5MW$6ꂂ0=l? w]zG!JbbjKo45!BX4Ѐ籡J1 kMe^g]Rm|%WyZ/b:X4w>7%PC4z >UIThVҠXBqE`AN [6Z@pSI"|G QXtS6 !<<~ DӍeT;jD ?*Ŭ,͡|ʲ䠗K#M'-y(> !l@S{>8.l]bu1WU_+`|}{SwdS߶e,ziNZK,O\M$1 b|,0#j,J!QɈc.zΦ\sW ,@ʪId-eWѬ#雓a?x 0s[bޮr Pu|ޮ0"hH-D3CH43gH-5zqRR꧘l b$ZRrf=Im.HKkHsr%{\ԯfLIؘg#Q?-fAqkNy=6'b)zɀVN*%t5t/5Q|mZc=Hr_>naKA(Si$*;kZϠS. ͗UM4ZDmWo4 ڤ$ ӒOKپҫ4(x9P$o-ŝqMTNYtQ+{s*+/ wQl޿:oJ <;\GmLм( QMLYFs>}.aRj);zad75Xj e#HwW5T7?/+vA63bE¸MgZq,W ѻ?%_Dgȡv& ~֪}1Lri.~迀 ^4ƚL眗W^k4*EOq㠝^c9ۜQq~K@ )DZCtpZs^ bA(owdlj]خp[[騸\ 9z(FrAࣩ}ň8,pLkXA%5?VyFPmg$/o}ƄީmP7+L09dJ2n䩃9,-iǤ䡸??SB2AbVQl7w12jf@Epinn&ձk\ER <Wc(D} `!%{tq'ٚ~h|l<ƫ h3VH5(_1hN^mbb~\s[((d߾U;)*ޣΌt.a995~+qۇߩőf1^UCNM V(>M}62a Fx+o1#?dEė ?1&Q7J $~z+3>jھ&ST"{R߆Ը M|V5uGȐ?> S=܌ L]GNaI*kDbZ vڨ!YI!ջj "- YW-M`襤W*wՂF͢14o .WGuQYK|E搀Σ7Ut>ڙk1Б)؝A1bjFN@i<,ayΎMHZj^~ro8?4)$ͧ#O80az &AXqZD,rP@n*mjUJUk ( fj0~Va[,j9Tr~*b.R.dț2Y *XJ|r4<~ tnV=;d2Iӟ 6ǽ蕦Gx7Xgԟf_X5XԌ\#O/4lLY'c: OEqevH;>>/l6DK v' 4ٷ&T/bi/H ̨\@3 !7c?wd?z|?B(?r27zӋ^ XA2'E Vʷ0 @H6\ l%!/VuKyfE?G-R)$Xy1 3c <duӻ(e -?.ӘZCKKWXXeh۾8qÅBHsM'<#~!z؆G<'1Ytړ=5ɆOM%=+d4&w|ÍFsǿ;U ű'p<_kzS/lp ULbZjd%|~ԦG|F ƆCqK\ `kE`/c:*^쭝 /3M@2_ḑhޱ+Ӄ2xh}8-|u_hԴF!:]جt/2>ɛ#A'4bl:Mr;A7T缤fdFYX|ezBjEHIN%+u#=zQ##Y咺:9QS݊Β$'*jY<:#ʠ^ܶ /D­gLX" j,v#ѷ6=z*߸hK&Lz875"@u6ßQJ@NivdQeN I9;^{L|77[s(H]_5Hײ> x"FRΜczKgulPϹ` DF-+Sg񉥙wىk`0tOR?s뚡Ȅ8 AziGuN"v.9S0vCBQ'WmqD̮!򽿪_KG\U@^Rw^ڪil՝V"P&% @aHk}}h}`V }#Ѷ ݣ .5Q1~ Ryt;*ʩ¦u}iNHq]Oq%y+cCc6}$Ɠ_#ڏ#A/Gȭȗ﮳9y,̽e\Q4 Ø<+SaEpc~3ts\ Hbmx8b` NT"y0:md&s<5ܪ׈%I2EF7ciP ֎Z6X8qбo,Gփٌ= 㜙W2+b8#c:rC5$<{)lZhYК"LG\eD9pG@#D%?z M GjggIYFG~ӰT 4V^Oʯ:U>޿ng%P=I9!A@GiDžp? ;[#g9J4!PDFLBڏ/I)!|g J3A EC³)dW~ϻk  ib&^T %F8FX9yH8 ɛOxLF ߅`uxʼJ]>Wq6iRY9~> 7=S : ] N4mevJ4B%XO_|*?[#,'㸾IDHߧfj/Ѯ|P gx/ifWiZw)er#M]kyu ΤF¥-N(6ĵތO&?tf]XkxzQwAnM oN(rvo#eqT3{W^Qh 'O]B7mBt"/;<<=[Os%JZJtilKjJB=8HHĦByZh I/8Fr-!zԶSg&m_ԚT&}1飄>'%lvq@c4.|0aL&MȁsN咂4F%e[#$Ę0D^)eA*~9m-]ࠍDmFfwd|,GHrEEEB;}_ܹ<*sz>"#=O5ko/B(}H bʧ(PZF3L܎bq%]we|>}'Mn4vIa|p~YjۂŒR~}/ "5"3H:}ZLQA;+"@w ;hPj0?Zk<ȌO]Gt*6daE~c'>Z zAr@U#iҽ T!E4XJz4oF޸ӑ1jX#k6PsmnÀQHɢL%Μݔ GHKڷwTyc_d}gbR~Ecth? 41pW,M@/V r#'k1p&  ՋLGH >tW<l?&p "S9m9T $3oDyXD a%|D=Kݡ0 ]\ cɀ K}ȢtA gdh!&3a2*'Z ~"5E{5j}ﰾ̟xx*Gk1Y YP֋PhvZLXǃJ|G4Z/ZԑUg{X4?`E_ر&W]  D .i? ?i'uƺ,~8$C|wPcxӋ :8L SFIPo \Tp[; .2oķqRbpAhTC/?wigvBi%$ SjCG|Y6p  %#Riĺm"0 9]~l!*d  $mrTEצ#\d#Z%",3 S<vTSO₠"7d,kFgη"IpXv]gU\CB|tEE^u=QzEV9ә^7گۮ M3U)>įmSp_u P8BK8XUZ>$xcX%7,f)u+ R Z%u '}PB*sDN+︲&"E+nXƟn2Q9H Nf\4rºJ}GjT9y]-wy<ً)XQ/rN뾄nFf@SLa%O6s`ؤfl.3vqNl.#h :Em)\i5GVQ68\4a6'zt-M2 gؓX5`:C()Q!MCxdI*$Ņ9?`eɌz]yY(Q&x%sgq8^⟷1ּj0sŚ~D\[$# |!5341.32,rAj$UZ{9ƕEuS 5:/7ZCm⎃9!ާ8x?a2)'ԌO0ՠ"dyY|Kr.+m0ijEZ5]NwPf>dj<}o; A4ߴG#B^Jd8ˇ{ m Ob8XG^Qo)}; ǿd>jzڒJqy="D\dcL㳠u ?_H/S9r]&OazHW@r]QU*)PR&.@:83;Us`Y*ZO +w>YF p'WJ*Yp^vYJ޾G:@@>l ۧ ]뉿оk 1Av3>O1t, )d{]uƹց>QP_ۍ2oL*ӄ}y*/5UەgfL.ypbOԆ$~? ^0Ӎ/dհ8\AV~w@I&D5`M:`٬Al ӝ֏09z Wezh"8^II:m~ 0 !/j} Y2޾&´[SKeu11A0-kμf*˹^YaⰀ&l%#(Np{$Kx55fY_mCoi(SZծP/XB^e1u!GX&Yf/׍Y7$̐wÌ4r?QȯB_cjlJ7؟pTlz2)C:%'];"~ߜKi*CFS/;uKekHVTT7'OkΖ4py)YL}gP$J WRҩg3ɴ:?c|JgbwcI G=_; ھyDLc%d:N>Fa]( ۴>) '3)K? EebVjˢ#2$ukʘi(Zh.L, S8~NoţPZ)DNpI8]`Q3aM$tTEIKj[Zv}ڜ rVxl(-"Jn[]]5r)""w;%vA!GZϖ*O͆6?G"p)j6\UT,|Vp!Qts~e v&+lnDI<4 k- cS׃NxCYj3;DkjpHX4' dpђ'c2V<}0Hܦ*>4ǂ0K@;m gCLJVv`CkN/ xh.!f:NYȹ~>śT^%H );UMkw_!zof<]tYL߶*[I#ܕE/`Ƙ2H}B ч.--y@oVbGmsɍ%l˜ iCCfd2rNnwDsjőq%խV\Nt lzXܵ lҲ" xa0 ~BkYK7 !&?35m24zu8(oiv'FW6?zɣ9H :#oF#Vyt.p(\u9Xߕ x19k:mJ%|"'i MtiRmCDdn@e̫N.U @TD?_8?89 I8hh5g5`+LOHaMV"_dt>)\."Q[iUiń֩2t*^hF=,@|ZgxM4}ˁOj|ַ)Z[@ͰeTv'27S8v#y|:(ռ3Y~5 =j.@@ _yH~n-Nn) +I4g1s7jr>,W tqh]֬ͺx8,*zb.{ 6*#CfngA/zHm2LK fn30vCmO _Қ;#1,r2s2,j\Srʇȶώ)U|h>!xY'd#,p𥸾`"H8|:˩8](Kco;"HH+X7y[ImkÄok{ޝv.y <~RV-֫x Y!-*/7ރ &ΥMźKjZfWOO= `lVzkaL QWS S7rst!KY'Y7ЪWFۯ2_վ]HJ:Pel`hwOc&TJȜ:ŗ:hPYV 8o۞>|[r|Bjx sf5j Y]B}׷ɨQ/Dm}%{t0('R~֘aC0=fw<$%< vXǬt_,igVp[×գ: ؄ HE˂R{ ykBGVp=e{J,Ϡ-VAu5}u@,_Ec7BR4]j 6oߜXs YRw |=ƹ{o'zq.A1D[ˁfjV<+`p6a#n 䞩̝x|bA,_V vmfszih~-?>V F"ڗM*\|b2w]i? 99b *4g7٢T -K}O쪭 Bxu^cqu~Z_H/u8D-v;%{ Q9rM0!'ȊZ`wsJo/+~o,Zrq4ܳE畸Z-א'lcNsXDj }laxP +v,Z<#Fh4> >u7Puxr6 -ԿDBtte}CiilJS7Xʹ+ [3kz"h!D8'|KDSjquh8M[&V.,7vIx;ފ:,"" S֟uo8W?!AFLY-فrWrɯ9\Oh7ϲmZ&%;%eLQX4 % ;+|67[ j%=G5˗Dx%ؽSڴtA8# TM`BosT1MEh0-[̝XEz~Mƒx\18'F;|ERׄ+J?(d&lQ?-&: Jb@ fY޻'lro]GCR48DVΌ(%tH?;\q:179{sKCU[lW˖@[>uy`\߫x;6jc&bQ]tf xlaGHw qIC׵E0c(:? &8UfqOM`EU$3.'L-IYEB-@G0wUVHQvf#7_.$nQtWұwWgZƊrgzA2ӫSo2EN׸}3TaJֆ;EIf XW]HܕՈOaŽF (GF Mըa&f5U!~-ܦm`ù2G9m3:q#-#|}&2A[`Q"+~iO?B]g@z*~1F>e;k[}}f̎nE;4tp(,HZ%ɳ_mFIZgDFZoCQ{ܙ3N2Y|rd*>z=TET=2A-vђQ`ez(ztXw˃dJ4+}=9JjSV;cU`Vx0DL)u6@# %˕J0 U<hDٌ1ZVr{P IFZ-شź!&m5 Wuh\]4s MYl%4>44g4qRA^2{°KSX,cC.C7!5>Kc%/~m4%ź_a;ė$r!.|Dh ]ݧ+re&*ضtWwM]a;>.w■n( kiRZ$O)0ahpzY=`2+gӢK65ԧ`FDͤ 5GⴛY;L.=Y88]˟I1VV9sh9zH캉*/"m ZD@WX)9lLܕ@B̷N`^Vએ߄=+_C\j3 ,|Yu+Pxeo\Ix Yr9T2RKUF}j6F8_]ރ`GG7Bv;gÅj-Kjj2u|j}7(T'sxgMqOħ$ʴ^\ /"o6h y$/XIʍ^.R")l)WԂ .S~8b㚦ʛʢt.Y2!8`I6t*TayEx=q_z>29F|%"ۏaܻ # eI5y:D?I2_+f_-|k -P~21 :wqLN02TK`Ŀh?-Rp|}> Wv @Z3\k5;D'IT-a0rKlh+W`=eVM<睂,-$LgW҆F杤cd3CDM_ (akĠ@zX1| AnK3+Հ4\ ʆ{8ꂅ[d ^pdd 2m1a؞C}lB/>(kNk%8cP}mR*?MnlUftd5&Tv"r.zkC ΪWE0R :rm 7iuwԫ"/koۨ]e뇔S7ٿk[rO;vf~C^_nG_8D|wIeޭa Q*y$'&:/Yjv.z|Z/41pj5 ِg;Vw$̵t54I#ZnV8H Ë2WL l@' h,id6zbԾOAg+mS͆ݡ';xW@$ FsBʌ|YEJ:C7+ ̺"(zb #hsZ7b.C_' O>8cu-}do^6̵(J *ud_T +'j߆y"jM۳Ѓr+I0yXLJ Eh/9I 1:Y6チ$ȁ&왾pCf0.oPzzE vE|ir)^_ meK'|:aDo Hk~CI,,:ƼTsʘ>!36vNGH:x7b@m_^͟'Ǹ4t hC)VLsːG$E~5(SG~uPy *f=r#2޴xRX;u&K_9}ݤpl@q2;UយUB,0}aNQV[EQ _'~%:og Ю VJ7Kء!Aũ]FblR=RL;yߜE*@1D^ɻUM~&7Q!F?M}pWh@Htza3;}h}}6z.3R  #NH_T1PXi5EjG?F(ԸF!;cf=fɥ+eޘJ$\`HL-mUmCTd닯c 73HyAg+ m3y}lA*Ņ ~&z$8*]t_=1LJVyMIJob0qXǼ5!NKQqxp+?"d,'il^Zrtsf%@dE'҉9)k'_ '<Դ^_A_$Π{khItӢt8 )Շ&F)!0KlΦW>~Ҽ7 a76 sĚG ԙwQ5rL{mECn^st!c4>/Ι#2,BtOTs:c{[EdqoJ4;f4dE@G ݭBwH@|rI&[$dK/pE 1M;ZJbJQȝ[a4fԠ nz!|p6McEϝ[I 2D903-ރ៕9!&ƚ>?/-fL7)ʣ vu)ǪT ñw:iMfOD͛5}7-Cԍژlq\/5hL] M"S7] ~.<bs=VsXD)J|cӏ9`e5Kl̞o,zp,# $10r]\4)g>׌WjM~|8z}l^-Lܩv}E0-s.VTwb,'AxuBHG~TB{&]S2PtȾ5{DY yZѣRaJ|zpq6] 5w)-e%g`׋y;g l?bX(@fF1gIpj" :G^%H^T0 {ճW S,`2P` Ux@Gn*$DcSb(: sՇ'\)ǐōZ_mo[B =3$DiJ:$ O; uݨ%SA8̷Pk&2'Uھ@F~ptd0j]c1)ڐ>& Qwpv!hYCLPPms  Bufj|5@AFкb*ɟwc EBSocs`Vov!_`q%}N;*YNNKqYѰCJ[\u^'v͒/f4v|"y?˽#.4*Bc] S.1*e s~%ʡ(~L ,(U_ B( m =kQPcYJ:H(6\hl%x `[7<8Umf 9?-AB&@u_OK0o∵hm/M'Ԩ< 0|v Od#3U9%6.[ץFa`uD%|݈ 8ZNI 1qe)*.ɹ&Nc(t3K^_`XǛQOncXG r[WtGw:VSǺq,BgYx J48|1vgκ:\#?@f^(k h4}h ~'2k86 EQd83/H{LS#K "`L$mQ&1yKÛ1fHO< "8ܑf12t"xȅnF?|(,׮[ (,$^331/i_*}vS8؊v,`]KUZ@X`^ԫqc+UC RR$"!$rߌ3ዋ$<=ˤ.Kf (r* /_2*~M/_1U'9wȏetc^]z:i /QRo"]ͩrr &p|0^|p?JjPzo9+- uq^u^䕔C$FGZ1%A9'SIcr݊eh2KhH\M4D-=<ܡPU8"OYB'OC*us` J|MI!o]պY1a%_>j[Ђ\P4p:s(W8+XS]:?%h .zEYZxCL9~U{21$c17AN1)$ RDX\*q?(c-GbY"~GьiCWQ1 u|u&馬>$owum׀ئ wEkv)H]2Z?DzѪuJ+=* ^fִs{= ͸AD7hѷ :HbƝKt-iG!P (OC5#B}x<Ԅq"8,jz(pq_\:7Үo^{q 9,?Z#Kzl]X~|~,zr1*zuDq&W2;SAm2 uLZ  Y֜H3F}>p?諄5{ gY5Dc&_BeI0V;Nl%J41yCm=,I%M-TS8.c8m@q902Jd cH((Wɍ|U9F8וmCwF6h,.ʇ,0rEAVw]0ϧ ҽL6K R9 | z /l::P0d)3-ِP](&L@|s,tPܧ s\Dě}.Z3R-`nT w_I^gT79Q(bL\Td_KeB%k'\#NxչD!{ w ?9E[W.L.o2"X AM @jx^iE4=ctGi Եlř–fK[ d[Noزqĭ8R.$<@!;UɳA-h^ $^)ѫb;N5`3TΒDDػdwK`vV! MyI&H/hS.rNիA7ίh7ǾgRɔH gqQx ()1(&Vu84k*kmBb )P3 (ABܣ{xoQKfhIY>=DOt'>i_W؀5? 7h 3L(NOn!q:eZ,L BEs^(߲[>B+{ijZSХpԵVLtzgݤJDM=B}43R7CB$+\ "P#뺝v1«LF]o3hd^)t"Ɏf~/i)Tt߸cxg_x(‚ X5_D {*ʭY͈:3.AE<)>)'օ0a)e(v?ꥱha_dWn[mzK@0h؄[qGdFf:Rt5"2i"@/v|Wt^ <2!5f)YN\ᎻrPmv&9[)3d#۝5&fKm[kϱrP#GQ 3P״f$39R^uEB.2"7+1ն[LdjaK)g5G0Pm\ m?~m7$|2+*ЌI:*)MF3>; S43‘kX~_q EK )ubrD7Yy*Zݬ]Z,Z6Xƴ(X4^u=FYt)d%"Y hg\APi5 epڽ=[#58eÚ61ϋ[a|ȸ5͚c,.FHHYo(iNu&{v;Tō!O_޾= f"@v02/@!Z28ϐPD[ޯf `E /80gϻ5/ȽTL]k>FNT.ːqJG=6r矰qTmA4/|Q쌿<ܥC쏑TqPP[4 08m##x6̖ڃۣRUj< QÎb>0bl7."+Eg߅][_7Yb ,̫ž$;@=T9ኔeճ7?Ch~(ً'=;HH/W5Kh##2-i|-#q#q#ȿ˖ޏ|Lx os UqS=XxG~kz<3@EuάNM0!0*$x'DT;)⏃{dD? ɜIz=[= }n˘"2]GE#t%T/)R0 M,bpUU*3 ImZ#Ti>~r?_dԝhOZg[,S:4˚[0]@ ̨/ΑZD˒f:&ۂKF-sg[@>/fظ^ph\J>Wq "=]Viwb($kWJ.j]A"I㟜`Q8+wLV3|L-pB6FO4J .]iqk-|=vX7 ]uj3̝5~ C 5ʠ v5Y;@#Na^X)VzuD8>a[NIQ7V5 `zTΟ@X3^S<),?TLU} lں$QA@ٱ|=:!a U_D*4nH{X'}^;[d .r &zI~O@x k%^NPҌBVݺ9`>Ip=TW[t_ A 9xvBt8DZT\o[R\zs5y'] OtEQ6^H6RCoLZdP`&԰ qy/hbxD6*y[@ޙ# x>afo[ڟlN@wH;4yZg2c0(%<[{팘*,W5k:ms-I[Rp7qSGwPE,+*i"{\!c}k`)6\T7Ti]76x d85~EiG(Ap sbrIL/P![UľeSױ}WKēwJ7ͤWuqTՕu7 ">k\\EOxF.?q ]FNog랜{ y+FZi!-dp]&bRϪkQ+:dY&yEdI_UM7qo6,aeڦ5݋{MD=StN)'QXІ\0j~nyѱiu8 O4عr/1Q6G`S hfELؽm _곣W w;ʼnΔeGY|x1#X{eo܉d0-[2y(/5\W:ZK[ޖS\^=J;Mpw6}!m4N.m9{gP_r a-cv\DY6(y?X4=SLz|fwU9^TQT҈[+;mё9mL\#Z?Ġ7{퀍RU!VِϜ5f9GI4 /=(|ug*2bRm$P 5"`-@It^v_8'n Zk<]zQor8%U9Q>Ow;]r欫/C*rA ^R6Masi\\:=l9LTdS/CMUb@)F4"1T;4F!aXi:LʉdnRU4{&#cvxzNC{鯴nCd-,vKƩM_6ǁF~ 2yҪm0Rk4!5|e9tL L\xXcS\ü*FaShW!1yضԚ1X)d7@&gAy8CmInw%ԑ(,q)}"wAjR 8oO듖H .w,%d>,Ce6ܦwke l`Z4oԨӋP=wL7K8fbQ 79ɊDSb Ǎ@<؂2Γ{p%K<X&Xg/|Ѳ-^Fv u{!\dT3_1=^2V8gP7> { `瓻~5M51yMޘt$6JU(Q.!0bSkA+/:֜mW8^ LBnz>j e7}*P60kݲB3^:Q.ȧjwSZK/r舖Q/`4x^onLC;Q^SHt׫g $o`-~ w!r2\0=7Cud7a.zJҷClo3BZHt4XČCS/t#\Pf#T߲ 8O!9nx07Wq3uٗ~'*hg͂Oj][X Eqy3O;Z4ƅgd/|J 0=qvf]KM\t2& $ԅiDb|W*c>ҋ!Eۣq"N mD@]J '.* &@#_fƂ.5= O.7VPA#GgD_O`iJ̶rITPI!Js'G 2/|0%9m8x"Q"h3|!S1`r$hamliH̚7v*_/<;HXnW98Vv0ѻMN)>z*=GRpB,pB,[XgX_4,˲oq [Ҫ\9zӋK%Cȶej9e߹W'wNT/'0Zw{+b||.(oWxLlj8 .i3Ys]?z>٤.yKS3KBH wHk0֚%]Ù\7SjE`#"%JdU⍤lgB]0Y@q\i 󚐤j J+7 ,5 '\Ps.kHteD=+i/ s5/^YMD-0+|z?t]X>IG>`TE`?.3|ԮE9pHƙKƱSbtK/bz*SüQ?EgNAZɵnRhj Sۢ:B/١}EUKNs`kn];A.Z|fq ۇ +dMLp5e!\ 9LsM50G#37GP76ڬVCkX ~(*ן'swށ}ZQ?i+ECl+ J2ˏ=V Zc#K<=ſ&SqrIw"S[4@1'2~/%`tAM/IM8oC (am)l,J /+({{ ,-Q>Υ_jZ{_Snpl(ꓘՠST/1ZRmU uo(%|Nc)O/|tDw!?\5lpngIdW&q 2 jRh#%0Fo:e*2>?EȌclEsfE Q|Q!h2[# EjRK@u˥i>g71ꋾTV" k_;:6|6> -eclVҳ$`UٿX^DP]Mwj FHdN{Sqgqw' J­OSXҁ63YfdJ7O®6}Dg@0P3o7ǯX]T.mJ7cߵ'nnZi9-%tпg9*;Vӡ"J#·WMm2`^*|&` dbG9f+vHؑ$;EÂ1 %] cֻlZuUՅX//{ wmyJqsІoK5PyKUmkv ;^C)uc$6lptco g΄h(8d[hD-b2 6 s3h žvVX{ #Mh#Lj0cBL Pѫ)w2*\渇`Le/>~_̠OS<{ Z:y:kKm_0y*](!If[P:GbE'>3.K(M̓^ISE:Kp: NM* Hl y( [g㘵'se/7/6NWU .QC 8BAsJJX Oku *`e$ʿ=I2ʩ}ߐ^cbrhb"-HiB)Wq Jz^_f9ޜh%@ ħ[h#~Iuɺ (Z}EZ^&ն`2wءFˁ~ȼ&,sEPðAT_2濾g|A%nsSu/t)9@bD$/q喇y̢hĦN. 9*Iݎ#Կi\ngbSaf=Z۩?zO4Ox82e:4 H0*1YEe,88`؎ofһI/VxRzS>)But<@GQc[m.Ë5OAPfGm03fs50ҝO0G㹥&Sϝp-zAy`CN 08I&i)ˆ aD`(+Eieh_NuԪs=q=Bx؀VNN5޽u'k+X%t&#q я9إ`+B9{.5[E`oLq= tR8\Ȅ_)ju?[j'; P6ra JF#f;2BU-%#_`e)p!|Qw1 e3ĖFa6CkbKBzNhQ*W 3 ڊpOu@ H 6* eU.~Tc aOtqSur R$eAjS3)F_ srRi>8!uG &$'.t6uo<spݏR@o'ŮgG^!nk n%)p|hzg o(o䒁'tH TZFE7!۝|UwR(يv'q;6zlb N*6y笒#3jθyU_Eh<#d's;0 ʟ{yG)z_=3a L{#N%<NuK8ʹ4tr2<;Y%}m8ˤ$PB. j_M,=mB Z0P3 lPrZTsCJ.0q_4?F8"d54l'imeAŔh),^@xIjUYۅ8u{ WXrG[2_"[!徛 KwrA\l]+RV܊J5rs V=Vwx!f/UJ]pK&qeozR!jjTJ2♬Nиp 3{jwJN@w&S˼]"6gCF~ĺR֦AV(Q1MF"D-J~|Zsw !Gޤٜ3Wc Hƥ_h=xQ&+0[+ݳ@:xw D Ayo,>yX<,dTgH65'%&{ l~p&/65^*"陈F˨r_FfYSkS۳O'q;:5Oܓ+/W%+҇9j_ 9OST鲳E~.;Y7Zt Ec]zmM+TLCw"D> ʫbb4yp/aIRzHE*@Y0f[vsmdwzFQm2)N5fhUFS0`I  /HUWdHvHkTfw VGY0a~)뮍Kֈ%, ]1.5T֟Ck%aWV1 u˦F^4vEN]=%voQ97T! WQ/p 0 [TY #D:xvVOP]C߼,զ@uvH']" `]OpoN!&P2k\<ޥUA͏kjGu+}Y0/A# |*qS8S?ƒjo~  "y6R0c8ʰ~,7| OPQ8*:Լ݌c] LjcGlu0@LTq%#j:uob}@-g)E[*8;ԉKpɶr)͔,"$ؼ ;Cs82Qx-8rx~e)4\ZƷW*LĬNFd%TEc! 6Cbn=.݃.t,0>㍽+0|.YhUž"6{g:|N3c7uv-pE`G,?.?9V_LLը_Z&we΢Y15jCG ]crld7k&)jR#Q1CbyYWQw- ?wubB_/ALJIjg9éU}ĥm˙8YTih0&/KE_8B,44?MF"WTLT uONlAm'-EQxRX78^} dO y̋ !_T`>|<0]<+v&{r@̘Gr!*RTNѲԦUѸ XaJPcU-ur}EuVZp~/gW,( /CrX' 8Ab<q:>a՝kE~{]eӺ$r }18N,./2z}%}Uԁ_"_|eՈ69,[ " Yml6~%h'U\Ihh5 nsϬ97Ydˊ-\^?gZf-45Co ~V0g+g 6P5ZYk6CE2K&\=)SMQ⩜pN(K jbF>AOP}Y̫TA]ya6EaRc2୚sR J(dPe@Ƌv!s|5u`~j6( ƋÄxv%YUJ-,fQkDySsW[btPLxCVjIg l+'q:"6'I.qԮwyT\V}/`s]qڹ^hR-ߪؠh}yJ{9G="InfDu)iCXx逶_!CN{Azg0^鱞Ci5jUyOqbT dm=̿,Ne{?R Ѳgl=4TWɸ\sJzb7ԣHCDڭTipN* +riZ &a+5 oMu5Qh;6ܑVyGI>ȭ&xcre%; V`M ҍ)qgn}'/~ۯqJm*҉59@3GԎ(v ʵ6뢏9nziŷ=3 SA" OS% =o92ܛ(.5tSBaAP;B8y5T(WFP -Dۺ Ij5!&}9B3@zSQJ6 zƾU&>ZQ-؃fQ\g]*N, ]\[MrhPy2~hMY,81]ӱolx.40n 'Zs4;gYdd#ȂeKg@;5EViR@'עPHm -T`|9]5f:@}EZdF҇u-5VrJ2j&CmKM)PRG+(!J6QS`@}ūʬ"X y~W+I +8!nGq&J>,ns6q񖥜RP[=@Z$岟VQ/.kh쪶: ۂ!*6)"MY]fmϷ%Z|D VfsJ'4AWPyK1Պo,8>;pm詫ԶtӴ^lrBxKwUղRBV^l!v6߱q&tOS ul%'1uT,U)P]F0\'?P(Y ncωAKMb@B5*2UY]xW6D LJן ٷL4/XS0!%Hj>\D^!{x;9&% #{tO+CNo lRaC(Ru/L_>f3[+ ZV<>Mc6/(!ld3zJC~vm@BZ8iy#Y<5U:7V@n# 3zίX\~ߡfi_KekSp!KgCnhĺQDx|䄺{^aZ׮mȍSؒ2Q'7 >:lsO=Z60Y!mguLsef%qNNA*/3>=xo+  xqdޓOEtcz-7%tLx Z4x<;)Xֿ7Ub qYvPRTq|a*ܰ Ztrv݊=xUa߰.#Cbc$=c+fDž@8* #5-1P ](mG< ͉ ud'r}YLY"Rccq~6](<}eXhgЙ$Ddt֛Ϋy!ypJR{9t5̌ b%S]ht`]"r8.:KV*P2V5ŏ)/{IgP'I7G,ۘqȨi[7V_Uy/̖5jJ*Y\0?dWlN|NnQ4!-F O%V*vއرroZj@O-PX\QQQeΔ3c0tGׯiJ:gb˟x6Rk`+m !y8~ d:E9naąpn)O\e" SCg{_,u4kɹl.^uA8i #El/|ze4иD k7:ޔnVff#^.lL/ch &pS*7k/fiz+@Yq` f#Ufu}] \[ {68gAPMtx|l2d0QZ~{")eViogoh=Q6P6>DpÄy[*̈́t{QϦSysz{)U)y3'*A9Nr﨑i+Jaذb=HBkͫ?M> 8t%*SlB*pܐ~أW!G~ljA'NR7aabn*1zZ>ΘB{Ji5bR-mUC]Ϟd,!kxXOdb+G|$Ƞ84GBZqa b-;䓑m`Ldhf&xB< moSx r7E4M88 ;& 딉Z̽ȯk T@_xa}W.4 UOE)Mޥ!(AfS^"wb(mp|V?7 3wR4^He"/5]gb|#/ tbh%h!A}`;I|wLEo ke/th*78f 5"uf?VьT4݌%$oS,"%e;(A[&r++, `' lZl(,6,>eEW]='Z]L҄Eԏ8M;KY8moj6le uUiߓNmFe.J;c@Qñ^!G#h֗1'ПLc n\AN Oǹ00=w^sRuH}<82Rեb2i6w.[U( =ۍφZwl4(?eACIB%}/[D<3~O piadi@pڊۨ(sB3 uSK 8`V*lx U h*l qOe^=%iXpYh̼?Eir ?~,4}͸@պ$*\@~=xO[-[%t?vv>cshK[x̣09R߿.bxf p|N/VKfe2=#(1Χn@(X;5=MJfup\JV+L l%t(O7ֱpKr\熚 "BC/pyĬ^@.7;Ip; w_ECOо TYۨB(pqӿPyyIZ}]yy w A]7l#O_%N< UѼpgN7QdMP.w{̷zfc&8*ƾɴd%#^c%^ķ]:_rZM=Lڜr{?&:5 =ėނ̥=9(1ω>-F1N;ϏLjN;/FRDy@'r:y`C9#Nf7ԗx uՌb'mS kOjxO2IM͛$G+Ҫ+wYH ]@[Š;qjӇ| 4uni4o bm32Voc xdwV1(|ӎ4h<#jF9ۼTs18 D{Tos;ظ4R%GDb}P<344&ke/o'}oREąG.tV[NTRϨ*<ϪRav?@gl~Ur@жVrpZ^'ղv&J_գ[4<>,3㞫K0 Ń{-Rh2p!SŪ)/8hh7CpjUO+?qY1эIEjbc<鴽)q`V3D/&'Z 4!ƎV'feZ*z`Aj T-ǟxoD!yq.{p32ܘb1!|rc0ho uE|`Eu]2N=ȼQ5kU]YS}ӳ盨T4O}0 Khgr8FOU7$))gR9u.':ň@RLN@a*1MQ DKk^\*>ԯ<ʠqTS/zjx7: %NX$(N2Tށs1l&ޑس\Kp83&OMpyiL$*Gm?{OT+4Nj =%'֧+"E" +Jp4Zd"̲Tf֍aL*3l#n5x1]]kt/ɴGB5NLXz2bm٫suCo[|:O jGy/-ͻg+a^l(?5\gছ#[As>̯;q\ש{ $ R'0Ed&pfFe4UHɴ;WlB?M'u)Ȯ`m>O]ʭۂn$k)J.Q#$$e(յP 47-\ I WN첗z:GB4 BM%_r:@53$l&GK&AHCk7>SИσ`(qlFKڌF[)#C TlEHg ]A|W'7-Ob{uv9qd ,*G"dZ dS02)cۏ; b;f~PO'J1À:NQ(f`soal0O(W_fMUJ,; 2hmUQzk%$ì)ԩ)`I$Z"emn=z 'uisR$ΐW19Y!4v':ittZǓ'p~IUD2%ҝtHZvEqy$?7o]]4eho͂~uڬmg3Tݍc_2TBƪ҆DPtCmYXb#](T4}V|*|],۝>]A z,t\z~ Mk ɢuhēF%_'ҏ͸PLj{Um~j"uQ9;EcjI+.XavW6M;"js5ي@b3$p  %ꕕu-%3&{yRi PSXVn;F]bdg1'ʊ Ҙ܃ҠI%*[@IWpC t\Is&}9܉oJg.`':queifrYrtPV~ ~g5?'S,'_^7rQ֟DB<TVGF/MHHHj_i5 (%TȪY"ó ?0{ *j+KɞGep=H8֔ _) >'SEhYlO (`٢>v!VuwpN"%RM6xxџb@kn;}n:lθKdhv|oѝj iQUvћQ"kTswoB][A(,&TpO+Pr7EiGӲpý q\QT_ܚ8t.łL])cq\"m׍ȬӚDC]|Z֥BX12r\ GpOS0h43Y14ኰ ֘11{~5lOUιA=ȣ]Q3:O74,&HVHy!e}B1xu-M9ҫ9]b Ot K@jPWs,U F=Жҷ sH{8>yĬcRd&=[Q,FyJtyt³ T#jBH`&)#z.؞'ZVWkn*aT"^A>gz(<6$<;a"F oJ&&U Fo/ls3PT=eҮ69{:Rn*Ʉ CB0ʮ4G\`r{;454r )Űs:siXp+Q${m7Fm^z|@?ȕ(P,D)0eb>OWГ,D,ΔY;Bj>Wی{u-d:%&y rgpǙc,krI5_; o3RZy_f9=WrV\.Ǫ=mA)mm2QRNg'LxR9wqi x*:c(ɪFB`ɷwʬ*Ѹhؚusdz|u(omIi|~7r$Yh(ZeFGj~#Y/1SE=’!Z#W (.Ժ3C1٧0ߊg$GJEbZ0iD#tG ^{) B( DvYL\ WC/taA8C\&GZ,PK:Z|k~KńG~4Rf#{^vlң '$tQA"|Q.>!A?^4-۱T܍,U4[ 04gvxJ΢u jsSXm~5T+$ ǔ~(W5VҏxOC2~Mˡİ276__u%LY]jCe'n+yyKvZ@e&V7Rbn]ݙE zZѸ`e}"g?& V1sćpS:^f*9ǔ8Ȋĉ a7l><V֫PCMjn-|}{fi;<3@I 4 |&'$ =Kk7d2*[`YzÀ}A VK>5f`}gn5rlK^_pxV :Jd(>]NYp/A2Ďsʧ2|)RǾ":X5=OzՀ6)hV[< "iI1ﶫpsKwy]:x5vB R`E74b:j9^PI>sw{QtK#ƣOkg/{|w"t<w4.4]7O1e «ǢjMЖ[o~BlNP]⛯ *e$z AQx90_w܅٠ T,$RQ`2{27rM v1Jӓ;a`(UsmhVjOe2/QTu{N7C&)*rsyi`7K2KOɤL6UM7ˁ6[W Q]wzK|S8.}Dv4"cJYYƨzPb̮tA_h)DBEL-K1Cd:ذ Ďݞ"Ywۭ-'loHȜgCrOkG7%JI(e.ƧPjyhNV;LF[gO]UBsOأ+6vD>0=P{9԰DcsGur+BݢMM a Vn==CQ?b4Nq4}zXNs,'@:Hs?Cc~Bމ K,gbqi RϖxPOUeVKyh yjPm#=sn'}hc[S0+hf?H_}F@}2'RZc=U`lⳳ8QYvniRM=Hw°8W-(h!cKrF>^qS@`! V䷽_+jV{fdܐO%INF7ũ>UpzO05 (^bX9b4H}GJ{'I|a.`t@=P- si﨧ճkE2TCaIR)K`1@+$~KwTy5Aw-S|vM^(-&KDA}#qzvt\bR_~ *%id< g' B@(t鹼Tͺx7ԉjҨ-&6>`=/_5Tq|.:c .UxٗefB}?n3Ҟ.R+]&Wqהf,CfF-*Wi1Cҍ'*͕h'oHh`krzU*d`y|}e?hf!ѣ2!#0oFv(KX-267#tL R}Ջ1;3Pх! ],rX/Դw(HGXKAm`K3O;KI1q :" ՝v|kX'aZU~8`l_*qwB-[=f8a(JҧB3&[#2"\f(4`gW|{ثU.M6E҄&cz7G4:>*}RCPO1'0õwOPn^k ?J|B>(2ֱ0s,zfhz^ BuXTriKbX 1kl;]o"n.vm4m{@%I_n6/rƄZ&Ӏ2TE~-P6=&KyA\tm(REFP 0u((=[ u')~̈́i?,Xw*^P f<]RjAۢQm.*wBr5lR-^.@TnBsTFzGlO"Y|\|nJ"b7<\Do&Bqkt6fH Ԟ(*]pҍ|mdwkv/)sq'm5*CqbMbP+#qjAȞԹ-/9D{?nZnv: k?\"q+܀D'D?.-R9]es= B]e@t .# @Ht7v$wSd#n; ykJZdjl;NxT3z(9xHrˉKDԻ G,`HX4b^q;PuSR{WM,<0R0,etZ:Ae,v\8Lʠ|pcxpk]VJ: VCx_p\nJ2)AB! վ^Hn"CB+\rZ8T$nw>2%TYS Ddn>5CM0U9bZ8`nfYy#-f+l,m○ȋۖXt#$H(w_oqջvWăMz[G) 7kOSTsr Ί-}G 㑒{Ր3 ]W 9&֌NZZoyS:r0jX{;Rz;G4jrjkq _V΂֭шZ.ξN$mo; gV/WjG'4#>GIM0L6C}ƸFmfAJIP0$oш]<L XH? 7*+Ư%l w Qch%j ϼXxTJBļC!ZWh,:^8c=zPXӝ?d ӣ𯆱UpqolrY߶wTJ2+:1-^%*nwkO:!'P@ 3q$^j1dY-Gs>Jʰگd/U؝<>L=LI`pJ l_2lrrX,qE-t$ŎΈy:9?:H DncƏoz&lRg&_?-k9"ٷ=Z| 7D1/%o::y逆*C8n&DQ}u"A G2 ծlEMiD XBz.4{WPX*p&?RD-?A*KE2g%5=ӷ%$.?*1ѻIOU"1wP]( o /W8 b]gm}ÁbHLC s*I*p a+ջj+жIrh~s<46^yR4- 8-;p}mZQ\J^Z$*Χob#+ʨAq ±"X 1*0!qA2[[Op1XGJ?wq^[ա{\vMI⡀.hcw\rL V ?OoRm U6`ؠPn/;ME~YgĦ$P2d_ڼ^d?uD_Wdh1#qg]h8+|q!f&3z:uJ~CKQg="bydk +5AhT6@8|;iȵg2)2 Peߏ֩6Uܾ LSNVxzxfҷQcEv O V}@晽:-s V;Zͭso:`ʽD6cFDe:NW~HoD>`o@(?1 {7 G>"oml%rYU35ͷ>wl 㛑QK%=+>zݡ//vMX{9Xu6Zͩ:j$596B򶉓՞TYLLd_%5 5&1WGAV\(?._l%D'U&oP~VaNؙ'I ZVO( P>sp-KEF>NH⋊Mbh؜W4ͦS>n9^B)<=mPB@m<^Ep7v_#mݟk4(!59Ƹo5t͗'ova:ơ`#ޅIA12bZ,5s)R4ʝ訶MGp X&dP֑g#tlk8S6r/݈u7f!oWjxQ߬rA]Ɍč.#Z8aNZ ?^Xq?f\ ϾЫ|+c)<%#~i#oGH-d;o3"-[z^U qE-f?tܓ8RN9T`a'+B&|eΖL"f,*qu) l2lն0$MpO|Ҡ2l3WYz~oGuYqZ4cNCl ~W])(覎u(1t=l-K{̙|{Y鄀.#¶Ao-chR5PJ//WCi]IV#^` KM*8JMn#(Ԛ6jz*M){b l>R؟Xp; LtRrh/6ȱZ3C0Dil %iP2ymD2zqFEĮ'd`C٤r@-4Gy(EjLN;ǽH%. ShU>z_^@Ŵ3#|ٌhBϠ&GD˾œ%wNpH(sO:_#1 ӡSS+I{ع(\<n̵&AQe)t+df㘡&/Bգ| K'epN(xy,]+qBrsyfem1>;Q3ÿbK rgʑ9Fk&UßE;krv/Sxu8s 5CjaȗC?x3r!gukOtI5\<%; Y@d誟{T97ghed;s˅iKi ;Ki8Ug\w՞(}xXu&[5l" EmoNP)ƾ, *Лu]y)B m7 s) %G`B=4׹RMf;=*$,-vnlTqoqttŁ]ꢄk. Glց9Y`A\=6nms1?: f@uPpdPnpju)h{/(?kjq/.pԽ@M.9 e8Йi$ϑ~Y kY"V]N9z %t7@CAq6.& L`'c ?HQjTvνh⑎>e}!Z%iٜX+B[u%X%EPZUVU Ndr1jmNDCU`jТբ'c btJX?r) RFVUVqY/Ecs*9.!u@ #[2p>z@) \7BE^, aP 0:4 C=&@gxlNrh{x$C0B,]K1tKn32<7B[[֐癗[0~J̡`s!"`RW3\}#`;}7a^ak7KVn {Â\y,Yr G3PSdg"["- d͚-0᱉"2-b Hǫ(#SI'MI%џ.;٧ #j6 STMq:3`NOrx}U{ēq(-pC~̯x52og*Ђ!XR,qRP  T ,p-;{EhCd ?0)oEճuh,|pŘI"ƻ!#ldV币Gܜ\E<wv8‡gvڋt޽V{|ocV95O:@vwO5]o=l5vE$ݗYW'+, tlʤ-3jkdA*L:%MSGy_%p: 7ԬPxSd[lGec7n Y(54Dŭ.~:tjJ0 c';+e*cNRZ6Db( S^Sw ^aެaRK$.MY_4z:86nx'@'l\B7I9WݮJ 5ٮDWղʓcןj&RT:_G.w9Fř`A[U<>$+Rfk_JxAY[<].-&5/tPo*PH~sIuR$MbbmR; F^C%ċU{"r sT.27f#L"6 u*U)m0XS1&R #[O2X ^O֜)sNMä!F}'a Iy0Q\T<}(/E^עg9aORMiSb}:h#p¾׉3wn$Ӛ|9@nCg/ %A}yD9FЬzH0f:RoyNДrXHz`O-( *>qFw|j?I˧_T^L[VK%P}?(r,!\V&b3-!2-dړ5X[r'G5=.s 3;r]E"Y`p(۷-lb?+%0,`UAm(g/<`V s:t+f0Ico 6N/Gj?) lv\43_8 Ul,?]BA,mePqcw{W i%(0Œ:Ih4?s|d 1Ux+4 k"{^ۧYjKnI3wWc_QZۃɟ齐s=P=lplZ,s,h^_+;>oЅR<7mR2b6=7z[sIN) $0Mu_QLJ" Us+|S!- 8 &]^<& 42. ]Uh <2ݒp-Q+SxKihpug$N Pon6a.ǽAb3c94!ފqK;? V!_t6h2@S0ChP&iN'˵[AOx <P$ 0OK#5V?w&@1BfDZɜJ ujtAE3fX~2-n)7ѧ]+!]ߠDĻS_ D7-G4ur,T`Ưt$G4| :ZwCnpE-+ 9\vlboI}Lٹ7.@&U( 9:=Vz庫RhзM OޙbHEa6uHu&xpqW'aN?F\0ɐS[u@p3U}+q 84cX6sq9l+R6W8OX;Ah*剈wxJ 3<+ ޝ)3,8}NuLCy]h \:8 ?z;ǓHe"SH(.䘷.lQЅ| -r 7dV;7{ƒJYNm*m 6=X*pM0&CWcQ&{]q{TrѪ&֕ |.!Pi:3c"F11FԄf*$bpF:,>F LcݬISYvYV? h̨b)φ׉:Cʟ`ұI-?7oaTTDmmbP_I" y\#n N%"C>DDajUլ[:̙H~[L.m6)#Xy k毼@,|oGd<|6f/Q6q Z^2VhX]<ZM~sE4dn&7iSΤx\bm6׈&.PaVu YQs1bZ.7E:f}9ɤ?ݭ%IqGtpN) uu,ֹOw}p11R%R+oAS*ԯg}x\#"G)A2i}4~fn|Glb J^[fJ˾lS$tZz%C)X\Vmvv [($1:tZp]!ZϮ%Saic\n.bQ s̐ǧUDHWGQ(,>ԭIf*4Ey1VŇNaHҌGt^`&VK ܙOO3ٹk4vWAT=tY6Q J|2:#ߤ^Fǀ%Ej}fՆ⪾i\7ȡz6ݼZ60ŸP#6E8g9n2;YprNdOq}ldIFg[0 !/?[e; LLy^r.~ި(KS /.0+ ~j^:Ѱ"߾Sc8B*>dra (fDzv]=bWft<lzU1)hzl(.xXRSܙ.dаr#'[?H{ck t R' m_ 3(9KѦ p>u 9)HG=ͪ;nZ4-T``?u%p ,iO#4Y7{MU=9V {C< QؔZ  <$L$ ogYDݼ/=4 _[Z]&vϥ~'QQJ}M!A0bde#\y{`Z? ELyָed;9|(*)P=dvloK)uaNEe ^E Fk67n\'F:=\GQ2dtT?/ #ŀtN!o{!$5|mnQ0T\ȡ$HP js#3nBp*#$sR" 2@pIO70佡%kj-"IJ*bԖDB*A{m05;oFQ̼sdqIy Ch|^N.Cqm3Uė #~rڌ+מ/+:rcFWFPjvZ!yVY DڵH6hx.8{AF@(hDNBv_h3rYnpܑ:1z8EɚoV-= !dGT&"nw_VH=MƊ}W:S1C-k<Im%E)h0L켉c&*"UfCNnJELt^dRkVŰEFkB;3Ψºch𲸈|"nGݰUParrt) Vn #S/νTᡥeU@Pvct(+bE%).rYD@<2J $ǐč^ 3gITLˁ_? 7mGݮkQ+liGT&lo=ЬV-ьw&J{ƙ Mƌw+~ V>ZuIVD\bf/xN%%b! ! \8+J{ QyWV$1TT7Y: b2_\Ru]E_<Х>si+ MB*ncR GTLI JL̛lOikNms ƲocKQ}SI'GtuRBEK>F/%cTWaާ?SGRUڨ_H H|u@pk3tE5Z묥 2:3 +VAX64)L2SoxFOt_] #]/$cR &$ @)`}+G>*85mzwywx8Š!%tANZc;* k/8Qq%HOݮE >?qH4"02י ֋!-~+ Y^E˺ʼn9-OP0h d|ԩsQqү@4wzWcS@P~_Z5LS &,qde3k(B?S6ddw?tB-q1 A_ y-#Cj5"Ӝ,aX2IVQsCx`Lĕ+^-%/!"Z\{ys`3`No8T۱_BFG[>nhM_.o5"(ABrS֐վhQr]!KzB*w8ok]'c%Wi U}dr%Ƙc 'ڢ,̮]֤pʭRs䮬EVS3 7gڂ6R2_-<8I7f!,-d{jB >~e0JVW(,i\ޫvf,Ѱ^GxWU<[l~Q摀㎵+%0fkI%#fqj|2 [bGAMO3Uff-=BkD,67A9ӢNzwJZk Z7©g,B4MїlUғhBw ^=P(h-͐X Tr% Þҳ|b5ؓ@sKsn}2֫<+ȸF}8;Vi࿇b7B=NuLJv3eѨCVYڤU" @j*^^68E/zsER9LWl.ڣ,.7w2b[z<@}<$`hAz|]ePaC8#)Da-֥+ `؛uhd DŚh<&u=fӞhuM9Mxz=Gv,I2g:T,_0YF(X|{*Rn챣hWTqDkF@ɮws , 88k}-qN"(v$UX0 㫯kM.$^y}=l,m03#)0g[ro~-L$LFM2Q!݌9XNЬm bdHlӈ9-sGvgHH;kqQBr#ž8uWr#E(AS")p쨍e żn}X "'rsفybuCz$|+ڂd4bFn4)?x1U[%T'PPC"rqv` ~눪9 +eg>FXBn :S1G1?hRŜIssm3EF@uza"#ۮ:iBV$kv |#UVv Yr=91j6 ߟuF=sy54tG?k<|j LewcuG2|3?#xmThP5?=oIoNV DPw׎u3p]C # '@w˨lr(ڤ:搒U3U Lrtr;Pf7idȕD)r1V1; ݾeiPnOsOPPl*"N)a هpb}ܶ59U12ؒo o1 wJ,,b?C{fUV~!z1X:Mcu=^[ۗ 5Qr0|˧cIZbX@e*7'`d6:ZpNIFW|tĹ/Ɗ4ޭ!9\N{BG@2USLh3ٹoE~QեLfSy9Uy ZfIOB+JJ0 3}+ݚPhC=3Kϐz wX\OՙB;΋xwO%M`,㑜6њxhiș=ԩ4]<1SL,nSɤ[&%fټ do6* ꐺkNP>_۬OL~:<=Q,5|{+*1f _F:pNOj+ p-t.űl(x WbN}O{bh H9c5[𵅩Eb;vi (=GIgpK3$ӓQ"\R}ESk$m}cnճX{~C) %md~Iy6obm4]Q\ҝrYR%), t(3~x\N,`;ⲉAceUPn cV|w[" ^\0Ic|˔gr ?GMi{rdu_>Gci6T5 N5kew/,E5 i .+4E He3Ezq^?9'3G]pɃx>38Omfؿ[7/%{>EI|C-;ٯ-m|`$?T88af]ODQBMEl[TkW0k#K?aDNUQoפQ 7o@:~.S&ٰ9LP{mv1xuAy~ {Wg,~5vqZB[/roņ=h-؍z9T-?lTjK母Ѓ\zġn4ul9qE.{)C`,l?]MoRx'pXˍ{ ?-6TQ%KKizjXoOhvx RKNnpB˦!+#!?^eo c;Zu2C\MNO/]:c7ÉPDŽqˏ,=8"Tŀ8[4~.*0*oc`d\-0V Q-Ne_.r]¸Е)ƺ\i2{;w뚷*AyXsK_~02}"Da忋!UŸn*a&*:.P7۰A( KW@32| D6*sh؈(W_{zE5^f^v5C}$I:Az;_tR'6pt,=a79#Bz;wP[sw{.H)*ԉC+U!B`yK |EBUnp>͇ PKߔ >R%[lߺ v)V)-jUr3-C~K(H[+1yHJs1y$aѭ޹ ٽw]c*2ɅƑr2-yቑ nm |.INc_{p)26&"S44N5YT@0H~D[~=ryW> ,O t)_O$Gv:eteQ±.Rb<q *\YJ(lWQeCFV4JkU4p V_*t?FX`#vCf`f Yd(1؂-J ڐ7BHEzY`ɀُi4hu$t<(ZOrQ_KhS}Q3T.a7yZ?F4D`|XVTo3bHD9 gcUQ_G0۠9|n4(b$e+ m:҈Y\ -ْ_kr%<"ݭv AdӔBT|ٻ滑❓Tz:S Pi(b:NA[ { L J29%!m],Z!&R&CveX;Vo `6'JQQ=Хbsx(0j%  (Ů % vRgz,kw)#!q-My~K9}@,lG7NzSiY9:MklnX>T_^vVV!iޣck,r9Q/XpeFr3;S%;v`Y<7'XLPC ҦzMdqnW_AFUNX˗A)RMo"hhI-(Vh4mF1S(޵ي癖y"'RUlt nq"[P'DL7qxʲc M>/@35㐆~Qofulw1V"U|Juσڤ+kë5!,lw3Sf/OrM)1S~CIF",X:GPm E` Qȸq d)tkX$vQ\|xf{Ғىޑop(N|2j# o"HǍ" _V~dW%1 !Gn6= }&pBYPĬO2R]x晆 Uw3y=QݖߤS21-xg<>3? <9l_E@w(I#Ο*6h4߄%/[2@YϷ:CsMN>l]8槎Eo&)HrEj>ŏ:=|ɱ pbKk j&ЍRoDoRm~ؑe`Ђʞ'o #Զ3Jhܙ[(&1 &\Exk4Q=f>MKl7/+vv;QI7X? z$`AzqXY8_  9ԇLiUF y$螫#Jؕ58N_g벹B )2[v-xdt uPg pvioriXZE$MZcFLOB?9_"58};`Bl0,F>y*--{gM*,a`)Zz :I+ 0~0 l7~59%đ[x s -͞'_WJŗߺZNyd}i0COfȨLf+R#9QH37,ؔn " xldY_Son6Rg~ҦL3r5)p p]61wLq?;}:LJH{-Ʋ# Ǿ9f bΛUzrr3%|"]v4g|#xjΪ=U~cQ5˜BBhrE:eȐf3c dqÙuڴW[e+,%8>poYIVM^PVʦl|dY TwiI.\&2Fվ ibb*Bg=wor'#]Ɵ`-]?Aӵ-qb Ô#4y6D\zJ"H#Av˖ۯ@BtnUsO*!}%R&(WtVXOu:P0p EMyf < c. ׀: L9}1[s1B%现FnޛXudZyۅ!'5zoCg[9Mr.]1d2 ?cx)j!_Zi+݌zb\ޣj4Zt`g ~Wct1O#.AD3Zwd `d^s @VƸ`Xd8\l~=kR #tA@TaZ5<9ͥ԰I n0*(ZQ j{K?yOa,?O<8t _B6je` ?Oc1wlK6+JMg0̴>Od}oenI P& _@/U>Ghow%_WOiaJ*|̝JKUܫǻ0]U+jrKեfSKv,L̂aF Mb<淔M+ ^Rc )(n}LK/ƣ.mRk[sd?tji{ǬAU|/'3VxmK TYax"NqR8=K )X]W( WPmV$ %rW3CA1}*pT=@/ݱV>E^7C#TW6 @wA:$XgcH{8Y>iOY?C0¬ǚ L\`Xnʹf+?f}n,>wKp2t,3(PGl}X  zDVW.0qhUQ>E(V @=X݋Q!jْe:>-KZ{^ X-Xwyg"~7Ԗ!p]G)e֗cu6> Ʒ UƛVMȥ:P<{  r"LN84٩p ސ{YeOb\|_Y+UI^H` -P.9x]M YUተ"ʲ)=՚t(E)wR#ӝ^;-Hҋ_>WmιdMkS)P* ȁ#F= /@r ^ɍHl ߥ{CeEe.XM;l|fc r%M3w9_rs^iHk(ė $Z u'sβ=#pBf(+>LP~N%W>6^$:2aN@pr`fם+͘=W#z$Z{HP!1AD r:3B4ʒ= ? Oq>}oU`Ӵ:vU,OЉv>E޺Wn33@zsuՂ>=>'quo h'B(N)ߌ w٪h&8Y9g`=9ICM]U9]҆. 2]A->*/@Ojot C(*IL{T“yt C$"oU! `P)#F ߙʾ rHs9;/PwbW!nòtS@Aszl.e7fMcK%?1w*4UrJ5o?X좑-ExK^d2&-\ii^]?%I5LYn ֦ٗCp|!*?-ȜD淬P%ul5ImJ9 Fh^COS2Qpj_)(Wm)-1)[Dт!gD$zHgZ#|Z5k.:ݓ#)8)^(ڠ-w761AV{`pc(ßA}wp*;t_@uj7 Hee1 &o@ v m·[;_aI DHr$G[֔9T<"Z,WlS٫1 R[2M}<SdPV\75J&GCo(T\[ּJzrUDw_*;찮a٫viE U15Q3T}<w|bpwBV=-47K]}`8E V, k;GRsuA$' }$fh".E,2>pŢՙϷ:vFnnoqۋHIDkA+.{>h{( ۫{[ ϸ?=]@ eto\x|{]DVnKEس 0m QJâε Դw}Ɯ1gaBn6i Rɠs;,rb?F  o$MfV%6{mDÒ˵[8'`aCA Ksɮl\\:-4/dS1\T&AQ{rŠ?aIՅSI/Mp:If o3@)-mdoN#XM4~( YxC ʛ #HW{{2|T|= a NO&_@ID+i惡SK\ꨈbZėF_A٫e$4vs[PdG+R8Pu2lDŽj᫪|.+Y0 7^N,rMvVk#@Z==KKm#0qm LD##v{/|\Jw‡P''F#>aQЭ.EDZ[}"Ø6/-o݀& T"-Bc>^%t8hU?:%ȱ?6Z-Ox&u5C=x]ͼh+Me5t);."x: ЩO_A]ڝ V\AA|o'hЕ5`1 !pw=/k>:6.ʑ#OrQM0Ϧ$Yè.hBQp|AzIюß>?.hRH5Kuَ2cK`1P=HЏ f2k\`8k)\hDk.#v:i)O(8Ybi91㱖2"xU8Ԅ^FӍlAc LpB*{7zZmF%p^Ib~gz8_:(>2, R84  GX+nGCUc)͕x\xY]AK74M(pB|IZgre%" nbKJoI(4Sa/8>J.4#0Dc Ϩ^у0u$!uu~;ELE)),HbGrd?!;x1QԚ:Z86 w+&>0Z(- F'[86Uȫs%9 -`^'Xtyr)&i9P^&X~T9{Oى{ib1O%)lqePL1Gw5aDEmW#@] =EBhexUN|;edgw(7')8:5} ␆Vg?li uuNh* FvF\{u,X,qFꞃ/P%iE0bɡM!MU93sm.ږUQW}nA郉UY=u-=(D$|*qơs8ہm[&^`2(8 &--1{mַ"p 5%܋qOI*+ 6Jߎ_ 5oYĕeH^_lض c6jjL=J$Vhə=6dcdz 1 U$ɰʦ!='\Q3ϱ֧ Ԓ*ۢ=%c;ykY|؊̀`F B6SaT0Զv "sl00^r®kdZllKU|+pv]6b|wi #(g;C P,ZݒS\3|ђ:HoKz}=`VNnEfoOL7wzWiۋx|W3MvUiSGkGߕc 7L0\ 9yi^1j+TX#B#`}e9|ͺ}@ v1R1:B'ڑ{Ω(d˺{Hpl;Ȗ9@e1}`JSMw'v<>!s 7\Q'_M]`<~lҸu R3lIt-igOP=9l:ct?B@[λTs_=_R3`S#|~) :p"?kWOL' .>5#N?2 :O[uާwR\6wj\6v#n?0=xC܈ e?CzL}JP!,‘_? _r>ig) g)ǤhU.QA҉;8H^Zi|G`Q~ѱtL{IO.Fѡ_l:0gaJ&-a:ksb)3\aO" Icj4(olէB~Q8CO]M$$/v&2\Ӳ!]ZӄmbSƺ | e*ʰvd9`XYRLɮmjH<':~bkr]4M';K9B0F*T/ D*}K :w$RFqy=Rg 0)+̮2S9&cI^~ Ӡ*-P =,~+ wokX[j@GG"aGe!xT5?.UE!^]6ʟM55y]hli4NI*M@P1+XN%e/3;L^ ؞;Ӟ۬Ynq'w?(v6)eTL :aeʲI(A^"+HpvOny, cqHLDS[zg6s%ܬ;U{t I& >w:V3%Kfp2{U='`W}@{ZX`{&E"Yx~ugxشr}>/Eu;ڐWjR ؠ=OX 5_tulH"31aQ8 7 aQi@CER,֞ tX7cP l̯OwPC>p` OP׽51*|W2|ݖNF ]8~l_}%9/-]5Ѭ"U- OgY17Ѡ&3at5/JviX|kX&2_eIF+N۠Q4r:#H1^4*)w*,x KδC^aY~a`ŝs %+5F;EXu$/"\%kd'?\DwU@ )$?5xSVxiH]+PzDv#iLmhZzvSInB,k>p'XX7gND,$ҥZDʲG6B,ue 2i{6]w?KU?/PM4 ߭lfcm|8!2Kf(2_+lVN%jumDXb.Bj}2"'%i^ h`l@FZ<.K_G9`N૫*yCȯ3ěc#v&*9F}e',rW+uóc]K^ԮOG._W{N38lJm;2!O͝D/`qLP%]@9\.^FDK@*e}Hnfvibf "=y\ry•{ N-IdVm,CBGj*xP 2OTZ)*,>Ȱ8B kHX #߻eeҾDie0\ |+wxbIKf p2#m4 gK.2ӣMz[ُOƑᝪ4r1BP"Rcx0d+CO-HA@n KI pϗH_Db&*іy 1{ d @\u g>sVM%g;:\c:Q6=AT zvolzDܓN R݅G}>3gfDB0-h .cWƆ#gΪ}tJ?pFTY ^WLKHG`=Wu۰y"R^IR_%HX&+$%FADn,G;[25߸'wATj퍍["I-[|3$40P@HA,aȤ@Jh׿0̍ z)p&p%a<iF(0[(#qFg}赗O 1G[~+XbB :$(#k\l+yy52e}ut>5-UEԝ9WJ9"jZ^~ B jʬz2*Yv(rXjzߑ"r@41\8EC 3rUN}N;/ ]|Oj ^R2RY2;9mNy`z,l O:uL緬() U;(Z>C*رsHƜņ\ >g1.}8r6>^h{m[?ħ֕.'E#17-)nՆ/rՏq[*)$o'Cgm+*٨a B|z拄hSVf0z;Nm6m;O+ $L/5&F Ŋ(fw8UHr:U07FʑGx_ZCEx}FvJQ: iYO&#1^~,'Ln ax#uE>H#٘חN\AZ׾iLV,2ȭ?R"( IR艄;eE$۸5Bʈ㦤jqeZ X[ןN?$^|R!0i󁖼±>) !ւV "ꙒfALtơlHd9,[VMgG;RU5\z{u+yKO蒭qM^M#X{UЦǯ)/ng~Gœ)w`=e5۫hsG~ݽWtJi⿏P݄?EL\q ^ Yո KǗ3TI@cs=^LZ .6Gt=nλOvYd9NREl+lq;YD*1Dubho7)}aV. rR=8?uنG(Dt0 >#׃@ݬl=9ZӸۜ~o"! o. j 2^]!crCHY:-!9;ޣI:PtvA>x[+yeOD W@Ax(AC~5~We#'EnML= E}aV˜m'sXa!ɔ;Ob`(f%VQydLLEsV,VX+c/eΠ3t)"iIb/7 (DHަֿz6J*hX>-z9Aͺ=x LiQbhnT >XC~+[~ɚݯEO}QEt =^ ! i6k֤{<~xvq.y$(hjIFd̽T}|QꜷmA9+. 7,ҋ \O'F}̩%(L!lzl4.7&KӅ</ di Ε[S8$!D.o71ܦKG2T‘9!Z.qLFUhiʝ[xw Qgxxud5{|$ u!/`lfPTg=W12 P|_ ^`%QocnyƟur@u{u[ٕ ({y0P NWk7|͒9Tnw,Q3y4 Q'm W?\Q@!sg3jY{v V@1=,,(t?XJg- )jpv]6`ANFj hyO4ۦ΁A0o YǺG走ƇɃDL8K0 v=˓8;:\yHkA/8ev1Bֵ3|Wxջuv刔6uTLZ2_s42ʚQdkc5AkE*q[KD܊sz>3hy|eXI;m ..&y1مĈK)YlB;(i4SgJy5&+)OO(Ff*{?S|MEfj7IgLWcq fK"3g5`P]^(AfW\TMkrŬ}KÒ?$.{#qpeq%jz$SU p C4)Ͼw+͡N9 0NRYb5{▻Pޣ~T{_~ _IRğH1aP((x4 Twrg{7~24^,Q+(9 ړ!8/V̮r7j{K (SP7!~1Gw{dZBޘ*̦:aݫVx]*pX\mKI0ݞ)Xkmg~VYB9:f=/LӊGcY; '>V41$^/ m'<4OGJFiGT)_>Il{c=aUX$8 {峎a˾o2p THx$olLc98 @,S—nYudi`=KǍХ.BAe`py*IS)&М{NdPv=fG<0R7?':?4U#dw0z"p{'V`$[zx~[* )I iU_5rZ/l.:?&kB &9%QbӘ;(Q)3>ܱ*?ɲ:Yxr$Ns﷕KT`- FeE5~_=D#ÔՒ{PgpAoy[.ݟLN 5!l.v=K,ŭqgoq_ V(@4%E|SGK<PBex|L \^ 6Wq,\qB.aΙJ9;c]diԎy.g Ay:kĹƷ|[f8>#񂩎/KW6IEŢ(:z8~ ͦ2! ;gCzyZy@¹j:0k{ hI:+Z-++O*"6r/X@ݵOԪY)^tw2vd3MUgNV >2ߎZ Gǝseܛޘ͈O!REBf'IIZ ~6]+"qvs_8ܩcK+D,} =I<λ-Gm:#Tr,A="դҮSP)`x'Y#1C[kyГq4׿mm! Ygv 2u?]h|bn\|ժDQl:hQ~wv[![0 BoS~<[նnYUÖn(G`^J_/ \jLBTZ׏J\%[4}yOt)?+(V1;}e( r|Z-[XMO R1lݴ6딧$Ɂ/X맭2>}7aIPZҵp-2!+HiW,Bza" 'M sg9PM玑BH2GpH.f[ޙaS@um*Q4}WM>8]}XGB,_ et+-DWHg4ǡ+!'J;憭3 uQ@:BR5U a/̾Dw!6Hj&mmAr)(zVQA O#2PM7dHM) ͬ9n%n e1wWq 왚T#Nŷg0Y*5A0!4ӣ8_Z 㽧H*kdkԱFֻp-K ؗS-[|竎m"gZ8<M"/j+}oj'jY[\\IfߪΚ|Uj6 H;mtE5hXa\TVK~+8nd(tF$2Y̎e٤p9&X⺮!S V̱q8%GH;.AmE;ކ8>u[?k]*L;omsha4.ܸ*IRf+:}Ό( GP]ۛ7$"{ōAV]!,(Juujw1z>ģbx?q-2k hp?fQSIu+XAj-UyBioĥ3Tm Rȅ45v8XKםl[&]ѧl5H/sj !P::_)=͞  + OiL"-Z Oo 8f!q_"2RPyh>sПBPXz$O1*]6h  EߟG˚ G[$J>TN=z2@]7VĽoix5{1{1pb՜њweU#e`[~PrĒدmu4L ](jYUo 졉PO24 ?FJk\S Okp WP$Mø.~? 96&dh@WŨOf9BF( B J㚁4rLi7r4Dj}QqA%QXP kmo$t\5:psYQ&c poB'J$7#QAj x.`Lv #뉜d>.fؔXju3~~mM/Ġ%6'/j.3y#9SIzh,볥‘;3T^f(îNU, I?=J Qp'^8 ' Xu<),9/Xy^c^H\B-5 >qs-{@ 4O6u"{W |T}ЀF#,λۃB; VKlni`.n}:)i@@j(Nۿce׾/vB,Yaȵ4(ƣۙ"cCB:@̴ȓ K&4SUe @Y 살ʲ+Z*:Vu8|p>.7,^)UqǵW cV:ceZ$>w&m1v*L;{t;{.{P]2~y˴bF:cQ3WS]4cAf֑֝_-}AD')-~}pS|!ZQ1G4v2V&_  p|j4 7+桂:œ[uYpqbя5y1Y=1" @S vIF`"ǮY#*̧ss|ٲ# f$ gK+EF!h ;)D]EUrXTH) q]]zĊدUgębrՠLf'd0L9OE%av(ykp_GPrVІÇ3 f2V~#{MtA#Egɞ.RϋYdSJCFiWg=L"Lwo H~6nGnʎ#aQ(&gW Nw8m(>u,*EJJ$x_$w$A70_/.mSii}5y׾qf#`1Tm]G[֑Lc+=iA GACF-Y^uKBTUmA^}9VbقdOq{/ QGms)ptu34MG_[oD)6Y3Z$0SV !Vds9񟼕|!A^%Ђ8b1=80*Ffp%w:'lUS]>eILm^ }V&Cb1Ჽ.m՜6vߜk& g=f‰#G \-=Vk8pJάh_-hQq!|nR.Yge.2f4X[/ 30ZJS ,>7np:7 /ۓ&9D 1-uWR}=RK=Iomo?e5CgnmM]M/Gi}61-V?s4ygL"0X&gkPe[~4RxX3#!`!UXJP&`׋zՋs/y̐98kr`St>{ 7.'IћNWއ.sr[]~-Jl-?d Z"كw13?Ol&/c6V);."򉩞elňbn ~N[޵CWJ {F~:NT ٗ?(䓐 ~.I [>Lrg س̔ZP$lg[V\u]x5>koAi_qʈ4亝XqZXQUqe5Ap_Oa~8aԘe}ଖ@U[R6f\6j'7)"Dk))~hS2<鶄dx]-a)/OsYt~S2&xu$]ȼ6;sCϽg߸Ui~%5i7pݑ%o|#6ԕ I)[Xy q'=t=0AGCf'.Л Oa4ҐV[kjGw#Ypgn>o.7_v_A9j q4=@ \ 6 q~Á*rZ_T!Pț&on^y6BQS\bCP4?l7sXnݫdULKSZD\.ڪ1A?tYgÓ~.8ar*0`>ƹɿw9gZvZ6b+wo|˱zqZ@֐q+%XHK34;VK̜͘) ztcXUُ.Ihq'&EZ ua=V9bs6) 4s]3uN JOjEF7@!80D3%} ֨& _[) rA礤qSRNB7qZǻ4aj3>L$Y\׆tH6;HwZɄLa)WHU3]a?\Xj9$CToz4SʨjUݍ XG$q>O3A?GQp>B}à)M%p{YV]]2}_w&>TA4vZկ\<30'zF',S3h;KY>:K'H oiUa2-VkxռZ޼~̀ n0Q>x|WўU԰ޫ]2u{Ι I8*ȆTy+"&\YEpܫ?rzh@Āg4(ӣ0x)]8-4^ڵȯue @ F,Zh"U!)˻l^$2&A~:sj+$;î95ѿ1=#h^^K+\]Xgܽq:'/{=&ҝ=dRlWY̋8=*bHD* 佹;(N> p&=:XoduͽuzoA z@~pY;خc$P~TtT{PF]a.PT  /P|3HFRQmCa sZ6PJ?ňc)1lNYXd˳ -4K;9]Mf;[̆7ߖ "e]Ug}̓J!F;c)xU7?#sřĨa -ضOꭶs| eT gกVvgȜZ_IZ%h 0C"$Sr<[> [C+#?՟kF;ޗ*?DK;MFZAH10H,3hDX&11p=a#C OGxm] {N.IEZqaJg U@"NR;l:dFqV|+|j2Ҡzh}lI԰BЋ"e N p摙_e|{/!De/%\a%qe4 z5@[C;J9Ʊj:+0>fp (L%KKvrpXbx*#[Re@m)9Ht,,V.4#bn؈^nXߚLR[Ryf/kzNBTU^DniAxD-(x+>+~5 ; ̾Q 3.Ȕf7$1U?k "B^#d*? 11[* ;Ѓf+>){Y$Id 5 c`ኔ5úv??Һ뇃8;DTMJJ-'呎ec2= o~;ّ z;$g8WY>C?Pbm]OPtnH)M{9?æArLqwo}zxղ ]Sh.ZZP"բasF![fCv2ͳo,gOdZz3}9i*&W0wmQ)+va#M;)ҏ.-\yN \+%HDLrsɾ͛כxqV'ũ{ϭ$. N )60j: xDrfY*R o;7_ez(_#S5|y{t*gXүOalĵsKIo$VM e[fZV6%i-|tlր/rUM$:kH$s, 7\6ud$^. %f#!2=IxM(cŇ9|CyU=tJć=/7D>y=p|*P=[]C%>fI^Eo"6**RWo+ Pߩh{ E,"0 hMqZ)j`/+XΔr*t}X,dqz>(߬F}5' C>)E¸d/nV"r/ M\ggɴ*GOシ.=]I:~O9RJ){p=?1ܰsY}tiB K+ (g5.Ē rUO0QѾ5^ tD_*~!@D*;1j*MXSm ߅Cd$Gel@F{a(ɺO]ͦ8`f0kk]-J@+r2İ-ifEJyeic,Νx2e98DAX_ ֐p:JxohSw[+\O &Z O92TU2m8Acם:p[AIM u{$x_|y .N C)QEN<<+k,sKpseWdwUޫH,>tUD\FEg ͳȏ N(K *'`NLUﲬwԔxrŹ9'j#]#A/ZajraLz "2U*8(bHp:§%HvRXc3iErw9MzfVfH7;a Bw,`@Aٴj*LPؙQmLa4L7*F3"LZ-]{ɡRHV3o *]G!Ɠ4F0ۊ>_p~>ǵC4G*"̙_,1i (iOQg%Hn%аFU2oR~6TgŸ͈ `SIW;?Jݘ.#:ζbs*>f݁g.6 bUW}˜.J :1ҷt|@NC|AT4}Ml 2N.TtܴWw'uJ(b #1n)ղ3lktB1U>Ú4-l#`ltrҁӕiWXk?s9@XY%庇587a Ku||&ۀ,3Za qPa ,ĽX<@wN#$a@? 6}Rbx:ک[Fv` $cUqA->%ӠʓFOf=h^ɃKsxGK*}%g&/Ahn?a:G.y8TR )"lReP~Gv, { rD풋Ke,Ʃ,ԈڧR-{? ~\wߌ 8i6O.uFSF5鷇)`m UH |싮՛[i=ѻm_KG{u@y5_0ex_$Im~ʦ> to݉B`DR^ήL]*;ʡۀ5hαbIML<tIH$ʡFV$AV,ۼ`e[ewBD%V6F)%Pv2OdALx;d2Hɣ糬sËa͌sy8- 6]xJ\Z&u ,K,Xip٫f'HYqCI)SN["x.0(m[ZS֞N"P^dDמ3!*OЙQjlpS/:{8ֱH%Ii,S+C`!i+ "kߚ7=injRbZc7W.Iw12NOJ\0rM4Ë!"^t N-,+!;t@Y}])D޵,{+y'@].7OBKT#.N3 Sk]qW I HZo"(Map78͊՜ dr*d§ %͏ OhVU7-7lPdIϧVsZD6=GXv[IgʳlZj?[ i\oD)3Hh:e:2˫ᠺ1sG$IXI$r@O$arhMS UثdQܳBP!YŞhyZ3a#j3NX &s1\mhUj]9w2|'í:r"fܴ,Dy| aѼh+Ȕ?(]:챴 Epɼ.sTM&Y$Eq-PD2Mbև=(/BdFԧu/ZZ=FYq[Ɗk-%NZnPIYGd@71ZKmv}ƿ~ TrKjH(O#uȡ8eMjzї)|i>rs"D!3͊0,HTRwz J8ߢT}̈́싘%фO[d$sw[[ \͌3S9 ZS؛:5) zP0>=XDԱqǓ%!"p oHѻjq蟪8GxM4:vPh̗X[PzQ6FA CtqqNE9{)yLB:덹T#ܩ0ðaO# ||_@k 겞eg>$OZUzAWClsPf:i! ;˭H7K Dx3-FIiWPʠZ?:Dg5?])4sݣpTXdZk$hOTP J LElBOc̩f_ }S~LWo"lJ5.9y_g7-R5y鋴n/ꊨIɟ@6)^a;uu? =ȉq("j \ F\+6 2 _Ց `Ÿh9Ǭ=Xh[$ Q%>6d4C Yuv=ITFX _6Zh̚0u4WЎcT>ӵB TW}$Iބ*hSb,^(wLn6 jWMb7NSQjŧ)-^jy,7xt^cT(Y 7*[I%iBtR\+d#ӛ^V-1Ew1#&C^pM(siF(aPHBxrOK@F 5Hf]RW8{emvlE@;8W X׌K^3tu,weTq4Fv9c>kd7:VWp׳%V}x 9:rg#t`ς^tFPӃ_H1YV\n`XHA< j"n?%KI\u䮂4E26~l=蘳T6t?B VW@92"'fkk6Ux%DbvşØ}qÙ Nt+A)لzmKdmC\3Sa u)mǨ_mSt6ώ ^S/WKl6d^K_Y/b0L1ACX`Ka9%WΝЫǐCU i Q?XDscr]c3KTH,OqL/|" ?x&iJ/νp$Z@m,[c伂[No=x1ƉV)\Qrv .a t|:B`9aR!ycPZc)l 8$#θ,#0z {^/v:D GCA2s ip6퓛;xDTYKݠFJ{Ww+IQMbu_{OȕZ EWNF:,W> f}'*}ŀq  wp$0z5wķJ}q%74B7PHfh 14mw0%)Eտ#jҁWzHԝRptJRN4rk>|5N-qa -]Rj;Q 8H5T^cv4=,)n71"z= 1,Ka:YkP~9 M~jU+s$qs OeT{Bh*ZW|X^ )YIi*a` J?BO$3(8i){EH{&êG3 XcD*q7 efh[}In 3+!3YpvGܷlM 8~/mgYg^SxAݬvtcÆ!F +ZǭuE߆PJ-LGr|V,HugHdvx0!$!bMHu]I}kĴc^T@b?u#?6b%O^CQO &(%!%A"j K}"os,P(B |䈝W:ld*&/ b'jj|p|=}娯KNΰ.PŎM7BH{>N@v)^׼$"ĆU%la21[_!W%w7Ė!}Db2){n\+~N!T|;' l=ASͷ :k2jVTVSYjgɹ?YE5BVlʂjG/AZ(qB0?Heʕ KCRfQӼr!N?*j@Nn햽bO2#.f ͗7uێH*p }oNM2f뚸X1,06xE8nA纪()bЀW#PRh%j2jNRjxNLԙwF34>1a4ѵẂ dk7&PW)6aEA*w#![JE:~Cխ.W; > Q8إVgt^t!Ob%|"Is1`,܇Jk~{CB!Z}8@08O>Ed;*#6NΒq^0kG/b/b i^J;`'_kR+Q孠HhjCtA&zy@lR #2u?D |UoΖtӍ+n[2,C6v"Dd/Eٷ<[yKGqd ov) *"a^jm)Nȗ־^ ()(3 h9rNnz n+W^Ŷ|J\I*=S Cnz\U!пZ['IVMYkpP,^a 6ZR}Tx`o쫚_T83،75&QHdKi2տ̏'>5_ {,#D_&5l#qATʠ*gTE,H]ٜW+ݘʸS*aйRu\Ld>!9ו 9JXKJbzM`lQ!iG5X|!=S52oaGȀFӸբ 2(^Ip(.|T43hg4WtL!T*T=a2ZP {SzkFCiJ:7XbRrg3opV6@=hN~}#ȨPo?`&5#ŖE>*&iJ7&"5"{ ʅthb!ee=NJLfyۧhf9Ch]MWb]2glN3vXjbG5LIJy-PFatU͢\6HG=a|a{_2P/$9gʑnqziƨ ~M[/hLtEAʥ8%M:Qض+$sB@VD*WS"rBàӻZU;$H 5悍zBѷ~|x-2$rl]Ty?ii@$xnlQ]A.27uR nrKy & AZd08gT>16As֐+|EfKM&e0Ž 7W{48 Lrmf$weh 9D6ZGS"nG+2xVn bv̮Zq~ ָxժOyJDRodֈ]U)f^-fc7J{x  $c3>+l @H8Z $X (FS"]|g1<6E*=T9/)a=2*2~n c:.l꼀 sN2+Ϧ )s^ bG#VFIT 1yRD".U,H(}%/ NkR9SviCUw\}1Vy13Nð6T [qd^$dʯuA>DV~Of|ɈSS9aA}6c%!!$[H;7C ` S盹_޸ćVHlvsH}QfwbA9 3hqd|+p.|2F6oh2;_^?fS;;v;j퓖dNY&s|Lm&BP hc)G"D+˴A2nJ'׋Y،i@!+"Š8 s| pd! *A`;uF@WuyV cD0͋q7`nօu,*԰I#gJBnfQa|fhT/iJO;굾6S-b#%b0<}-<1Q.7qZ;8 <+C9͞y*r@l!оMrb/7X9$):{)km3b+f}4r\z|XtQaT= yx@,lK4zç~J{oһ4!ʕҊ ٕ؂fc8b7 z.& hTks\7l9H첇m7AT=e#B86 YzIA֟fWVkܿ://&]>%NjN%$Y t~߈vz-/CB+cG _qIz:Pe i#PZ^z܉iw#])_ݥ8 BAn"倚ڹe+'xvoϡ5 n?b}{b=2RJIeuZ=3쯌j~73y>]ijqW?Vѩ4^"bN SW^M ]|ڳ1Lݿp#s i ff(3@P6{gr|Vys7C^׻0>Wzi- &x7wy;&ca= sy{Ik;~D=l=[qQ$ngTs] 4Ys] b'"y}H!QyΤNq͢!@m{y^uBq Ls'$:,{%t w5e`m:SJΓu>^Pcdu(5ײs_&"?lD'O#+ <)n>g{*]a#t0;c蹨ϧ&sm[ATqBW[sTBeqIcC5Hf]8@v'V'?{UwjTkk1+N\goT HH O{g,ѹ%3v牽erP\d|GTCK_9g DdCkpe} 6 DC7wiMzz7~eUE>)8݆Xae|S'F^׌`?7=̙.nyyF,O!R p$JVGH 8&kRu.0NԈ[ǵ |ٲPEU_[TsNEvwx9%nzx*05@FV}nCaVW45Ax]磦V\yKUva˔8Mm@oǽsxng]}ȊضWrv`G~)"aVzo`E‡v N6z*9@8Auc;seV&(=zm37gkw]S6ڍ;ouy/ZƸZ*֕mtBR(b ;Q PĹ%.ԕXlGn5# \IO2+aI!td@+𹍜i >.^Dңw8qeVm[ ]? ٵD6BPW(0x3j"t0/J%˅i8;S=T%g8KXN#GnƎ>MwˇnZqKt\xZpkpS^o0ZQ<cRy+^nw7/:Cp*-J~M)Rj{ig ~|;a/8l:[b>|;"Eri{+ӳuQI.a\|wuc&Kw؉,DIK79s)#3&7ƞ'at ՛QI|ϫ TJ~[68 Q>{6,a=~Kʻ8a3[sTX W5|ZT4= >^6H\z*I|nV{O3e1BA.)MR1[<$X2.r@d./e׊z,J4:0 "1`+E_WKЪ\j<0kI9/E r=,%S/aMIb-%/mm_KtFPmu q!VTe|4R> 9?Ϲ?)I?"S^]vkfg6o;_Qeϸ'"8 :=zY )6~NYs9z_UP5! ;V (>Ԓ7M&nr$1ٞ*oD]}kq[X uo>UqHwpߣvi,-Wb#o l{Bf5:żoHB+%/?2 v]̡o1b_+pJD\09AFBY߿e[gnlPX_@=,a ѨbW\Wy=O9(U\{;|qǕ=1:, dI+%;'Ӯ)}kE% X\je4?I[蹽Bȝnݷqŗ `1UXΠS%x}بZ%:Ņ9Db(SuP4}BJ|w@*h-)62=롐h~ib s:Oʺ@?W:p%֥6@fWe?ѱ+4$}@`в dBظ~ƹi5Ϗm-b ʶ_yfNEOYԣL o+/PkvQ/t3G kS+P@HO#tq=}5Z/}7j8GSzR1U-SMHW pm`oZu"ԣEZj:7}K:Tn-gdxٶ+܀=BY\VH(XdRT^lTk KouHCɣ@ڷf=  ٹ G,wG?3 dg6) 0!^ނs"nJSvu}"ϥ>iUD}Rf$h02;ShMf*HD h7``AI^^==UAt \eX]3DpжYOQ&VDW9^0 Y)=%ݞffJeFЗͨޙ©pĭѲ>nIFDY={vII*zxZݢx>3PG'4I:|w8_._a>O7uDHYb͇Qb*b>? M8,zn#Uۦ.!DǎZ<ȓnwi0F5ۭ3 9\0IŒ药Py`{^;(Bj=^Vg~b<³ FBH yz`kx 4qU]Oy8=?L藳q7$+)ɺ(ʯtwr& ~(*Ӈ8 iNbE)Jc.zp7w{|M+,DLJ<1?{ߙ*/φ s'u?Mq}oAj^Ua3L`43Xi!lgJgh暮Hdx3F|?vm4YX7=H{Ӄ5kcW\*sQ^(?mOJE-?dDA06[* /w\:J U"Rd:7Lldٔ@PֈŪD3NKL:H:G7-JQ0GD"%ײ:=ո_#8:Ǡn]p4ѥ_a6]XZ~Iĸ~ubu7[d>>y7/=gΎ:M%-i;'hY=rt?0^ Q?쳔[CnKa4t}lmF'Ӹ!SÎUm#T!OJȒLuo 7xl)%kc홷R5 l4=8h؝ zJk!)U6,µfyh@ "2h1v_`@h6 N{@ˢqgI.-;sWCndh[WD(!,{_cP/CwuFDŧrbyP1UǻlC ~4-[@v F>fBZUcAz|F+xDGNTv!}[,)#a܂l_lߙ] Ib :6GQ((KjBI%<#p0x210AM6hyTp=;3OߖzHi u9CeK7BR%2jNl(mpAC>sN컾cS!GxT !pϴf91O9[CikMB4a՛8)JUTk{N)X*6K0ۂUMxr^c[_2'ks vA(-,y|B*xMoh-cBat!A="9FQ~nx@p!ҔW;ƶ0>DA +/4W9Ht&m/RCu[VihȂ.* B~*LN2V"%?`7N-,|mD>\0.TMSkBcτ֬'Cm٭9!]VrfFe7g+?~vrY 7N.w9Kow=@;X5R2_rWI&7v!.)JͅhP['ɇoׯ 1;䢗qh;-:%4%- J0 y4=$օyRShԵmJ!(yjbeh>}I 2/\h5B(F)TqPf_AXaG/n7Oc 9|1d爃o*u oq54O)fT6d5xF'N9feWSJ gKt,]Vi>Xse{OmR6:?`"lR4a8?$pǓrXT!5@LrB\xdTǚ 4 dϨuЃZHJȳ!u!%enșO>$YÍ8cSMj >*(x+:'=24.)C n ;j)pi;!}D::*1ӄ 8 f#Zg6lwV.Y^aDTmnvԁxǃеgnVɫxmcV> x"=F;brdJk5]gB TP@ݡW=01,=;Th8Rf\|=;}Br"6XO:Q igS[Sx NT-2:+fRoB+8[v*:h`Wr$Qv4u[韅,h)AvB5 65j"5rη!E\ΟGX`7B#:F. fgwTgwgXm^_غo^G[h$ P 6mһs)C=`8;cS&ҊۉX8EC± u#~8b>KǧW+"_S2bqKq7٦BG֛ye, _I? OR?2 ܓ77v˱=CӘ{9,b 놓/j|R+N6#5,)LL=yT3syd&mR NˉS0!NO^ żEE^5y4ƦQn5?(-'A*[^@X:vj(?JKطԘ ٓҲtfu]ثHɹ!0] iifK!IXTy`m-RS\9u ̮!.Ґ1,B[,js0klZ JUR/n`_!1WЂ#fc$q-a ~ u4 Do:U*OQg{ \]D|ubH+=V0@r맣<>֨mCt?D'rࢡD+Eo҈b7|@ ,k:,.RJ4u]PtD &Q y- JOۗ 0d2FޣTRIA31j3Zb2DP@z1EĎX#a՜!պlȠ[̸wl=ԁL6HBϊKmKt"׈ܳǺ  _+̓Aɧq ]\L {;WiZ jHP_冉z+@,fd)mxڥ=h+3eApL(mD]udBвI8 9c88vj#w22adO#2Cg 4@4=ILR[(CGiz )Ec%G*B&_YʈOեq-*GSD|D#dB`(@ꪇv8H*mH50 ]uތgXh,W6`xX.T ^S(!?;~@h[cŬb3 3}똺>H4`y+ "-ginAō*D|5*CzЋ Q@}%ɡ/R3N˳߁r֌!3nz) ?^zGR84aɄxCC_) CklUP :fᴿTb'/f̞]ui2 Cٟh_wD  L}C/5hg}ˤsKVӴ}~*bn|vYڹ(Jn %f=B$^h0.G:$yշf*Q!] ú PjbK3yShOv*."q;q|87^](i+e>BytLP#ftup>?OF Qz@ߍ/X:b3/BQĽ\~./^T'ի'*JJU5jəҘ=$"KĈRՕLJ%rVWܔk&ot0D+`,5k#Eei9۹1j8f}¼ JX00yυ+'q#m /ij)ݩە 쩿]>΋ySRd(f)h[FnWVD7)7?;pfJlGORv _2Ujl^i=AԃPU*M]٭ 5`EQ3usWYFqK U*Z7s!pm08DV; yh/ ޿-Z1pg(6݀@#SOɴ3+ ƃEu;'H~W#ӽ{ Y?\ < /^K?[Wdkg4>ʈIk;Q T4m8˭Y /b/ `巸< b.`q%9N9>@;6N0S{;PNa:"#\w[!i 5-NMC 5zv9$IΆ>4!WJ̿$P)ZPzG-|έA>mnW(3x2 ^gC'LM!8P:1VN# ʴoփhΒvz-'sNgxFMꖗ OI9>9&TNC/6NDd?*ꂏL6c#҄7YGblyZ{a- XU Qh"(}3Q[Sզ_]BqJh0 =pt*݄zK<&duUm@tD "Y_4A2V#qh wؿ箒38 sYDYy(wJk53K(*َͫZ`v sN3 /sZrTTQ7Gl2p"gjg= ~VƝnEڜ(,z%TyH#2i]m=lH|'{Pֈ;wkL u=/x=3sbcَ?ijΈ7 r\B#by.1Z,JlC(ߤ%@hF? sXRu"#:rzf]wI@!(Uk?3I=O7Ϳ$&'\x ¼z0{L!˓/_=@(>?Lv#jXv\Y;KǮݎ)K޷DDKqu*BAu)YxԫyU)13eyf!ٗon¶э֜T%ED{o&MDco4Fx(P Ο((G\wkԐ^ {F_AIm r# ޝR+I|y*"z{>t'==쨪$mfD̗9\|ٽ־1}y?oHDȁpй TjٍrN<j,mؤ7ѡ0wTHr𻷑X!j~;r6٨Xe,&@>flF(fy>Q??O3MYt}mHWRw,*ET!c*i3l_۱G(Y U)Xmvb :,c`f-Lr?b@QR!oW e7Q͇OAxw Fh,b>V$T晦@ᩉji6ki b"3fa3\Du1ۨb$nj[uUjvc@.W?\Y M] f25L1ڧyMƋ_F}]Lm\ET:ª,Z'/[m'JtI#3V5닢vD'/r¹' b9h\|':iSנȵnt=rJ`W=6gLb Ssg;CPQܠ<?3 #"E+RKrhةg"ђ{p!5} H }_D0|4ٮTo؝I)eW~ujUZ=_i[=6|3Z q8JԑN/? Ŋ  Y 5 .6S,ϟ%<㣐+֚cohiyxmc͝yQ޷a9C*?݆l1@%@ֻMv(+ D\F2.V`!@\kXa> 1`D;[ ʘSP` X?~TmToN#=)[x Ղ5!$U+Usݪڕ֯ľ忄qfuvrSk'EOy. OM5x~G(tʓ"y꜀ק~{Gl5L c o+^/LyyDҌ\{# Ơ y*A \B7>_.!igyR+(:l#{ :66#@uEۺ̹?EmZiqfb PBi t_;C+{՟ilCn B0X2ɞKn$ =@#)(eɫݧBೄc}sn="-ZqZ7WLC+)Jkqt6 6[<.ǶReF'%$; u@lU uXm roN5+! CER 40ˀn=7ѐ6e-[tj|%d2]@C޻[H07RDarOլe];{R8V1>Qg2hBsBJ;PCN.{e*{ /!{=6,T?JNL.TݶisVT֬*5~ifIJ_$4'Emv-8f[ٹ2&cp w@i搵qd.9nqЬSu✇ %OA8b--?7>xnZe7oЛNKO˙ 1} \1j*4D'ba x>;@q%;KUM\ 8]ArgUy &|9D7J [V"m1SpؙBs=nu.Wer|!Mzx2}x,XQgډ. *fDr_(Wȹf*et JP>OORT`δP 0\ yt5lTw#rz@̚4:y>H+%bt'Hgn?=ɝ_;4x<-c汊DŽ8JYwTQ ~В83M>up90b J|vC 3k;v6Ko` yLE"TFI I% Lay6W뢋I-ب+$0!t\@^ʼoA) %ڸe۷P[fG^ћY=IEmYR DsN _t-̷ Ă!6 T ۷CŸU}cS x8lgAJy@gq~IHcU8ǍPvhL䬉DfaqGPBdM]nhFkyMo:(Z%?З],Խ=M;+nLn_166Is?nQ?]4Pq y>`Rz>C*N7m0]3cJWkV9G$Lw16(7l*xgW@ͻȜ-]jeWLZx%~šUb ւ8#$F*R1%S+xm{"YM➍>:@yl~KF:kKUNMIc-\2sv! v0[f\m1E0E kz۞Vݒs()xO GpPD4|53< 6XCRdeݟc딼cX `ٯmmSfu>v0*'Q iRx@4?&fMթo4wRTsiVXKK5=UX8P0~+اYN;?))A -ZsfAVP4\E^7 ,`CyŜ*@2Q5c6ch/3,sSzjTc(צPb[XYuz<@ǴHtYh4PZY?*9D0if2Y`8Xe"WqSc*ZxQ+ m8^ ?]fҨZ{ .=[6g"pGVqn ))-}O.=XLF@ ${Pm:jRx %_`f.ПDg%}pл hg坢 IQm_Er> ROJFj[up_ V^cSɇ F?]Yq֡̍ZQ3O4_gBTP$Yל2IũZ%l"ܟ=n:3wqncK ze)NEX|k*; d5M(|__,{rL0վqwKf=ReIU`:^/X1CQEOi~-Z@LdޯB/+ 5 wwg偡HZYw@]Tgb_^ew<]6ր+ \N1f#)In3Mw8GJy},#ݣCjkU*4o9z4Ɇ.Wɗ;n*b7(Kj90YWTWDQ g/1c41ԆK=䵁ٞZM ŎMYŬ'̀ьfYՄ-҄1g[["$d~aTھ5%u`wO8@7ɛ86NJPg]^4= B?8vȚeCj$?qGݎb9"8}u4e[/.?-oXBK%dț)dbulR'_O>EH !h,UY͖rzu4<"6.a%x!KZ2Eש6Yz|+ g8% y =ѿ\QG 6D\LLuniM&K Hia@n]Δ˞eO/3Nh*4_!b><bAI{u⬻K.f']LoDttf!io~̌'&MP'a,b$T ,"%VlXEt_TEj #|!n-p RJL h\zZNk{v[qUP@37Dh;EWm0YD(7J;Q qEx68F"-X(hC_8WA# %X%a 7q>MDfI@_ml{UH"axN'յEYYy@DK#W0Tu3hx{3gwLCe bsArxld>#lb4eTkN!)bG.(oant=П j5+j^װj4Xxf#%s Z ;( 6Y?s!42SBsgDyv97j y`n إH2|H@BG;F0=zgi7 ϕ-xx)#+E<",bq#[%{c] 2ΤO,kA@}r$i>D4#CNdZ@4=^ ^n~TP¢]m3"VNt%LkBg\YQDe&i߶B=[oƒR $A^Ju\@xSА&KA:!L|k/k#I,+sjCnu$wL^^Y Y,9 6<ڏXm̓nu}ubխ lv fa#u#\ُpZ$8A[񥣢4o>%8 N\ ֌YS"*7}ۜ>RMhUWmI/ЌxqޅQ6oHɩtLBk[٦(,:p^5ʶzmWl W]Rk&bj)=1FFCn8BH.`ql/ c.xF]Tcjwhզ\ۂFddHDM6V|ag(*j׏jL.;pr2Zrދ#~0B)0\>fՁ‘γd\7Lkt ŵg݃tSN`n*L{vuhەNBl1J7Ud@'9dlju(`$RyȖII=`r+MןwQd1卅7R.Eg]P 6粠(|{Bu[,FggO#s;jnʗ P%U3BHOy4u5mág+ÎV@lϘNӅ<3 ϵp/V*(6$2~aZdS&(7pj"m.0YZ/kic]%"=WfC &Zj:&W7>2ێWFo O| a(C~d3ZV-]Fփ }̕$j`Lâg> 9[؇^|L!dM$;ײt:AR>"V.G=e:E+%vU;IO,Jn!"sO@q@L#f4-sÊ sډroyU7 ,h$8Z6Q[mH`QyXfa̷X=^zN Z%woĐ^N@n?mOFT 9Ѭ~nHKc9 L-ؽ lV }|c14y6K؉@!@z!&kt=oC!cW| cZ?)>Nx֏gİлf(@B1Z1uIrq餳Ե,pk=?) $1ٌD70[ӑ!Ozk0 icϪ=h5_} TXYqknҫd@VqR9. A}0?]D쏜*67じxG\K:ʨOPI߻a9c^i֒12݆*ժSH2leݵ-1#5tvWZ9@Gtp v ?LZUrd7 ùhFEbTNkDF~e+nJ&e ̐Am:2ԙ; ]n*rؗXa pV`lZTaAbb#.5\Z=țe_`pH{LM낻~<*1-CkW:B ݔߨ]Ѧ5~-A(QRpSi5ĹKhE6g!BmEC%lV"۲AN i|Xdӷ~?7r;NЫ*9U&C `o T>U~<1Eͪ9Jqc鉭[_9U&- M`viQQSRGh!#4"0&gEޯA_oֿ0MV(x1x`5N5v I׶xe΅TH!ց&V'e]!vemLqy H??yH 1i@ttF!A"X a.`pgN"t>&60"e,QBIz&|H:"r۝L-oSZpr{ 8 7. *, sqVD^"_w7}k ln{Pn9s=2ې2,jaT\0/!O9WmA'U>-D{j;o~QskE $$yo2t0#/ށ~1-BoclVUܼB$. #@s "ٕ HR@Ogc?}ÉN협orˊWzDbbtVzLEg#8/Zӻ I# ?JPpm6w>bu<* $vEB't H> 8ŠA? dY#/M,:µ 8@5$}z>D& S ?n0rdWC[ygRG#P =}g1>Z8RV,&g[i$d vl>VOT"dԟHjOtV>m>LsiY s5rf(ɻ;LlW׻FɼyR"P2(q"~gcHsOW lIqXya%sT0b]?Wg _p``Xܦ!4^mN>%lp+2V K1[qjPΙC; NIsحr3mF)X̻2/D =aZ7 !P6nfPKdItStō*xN?^>6r?h5 d[,ؙ?iĻMeRnH它g\XIܐ^ (zz`0W(qP3Q B xj9&|I˄=W{V{,$lҪl ^Z>aZ,7,w*B22ӒT(#qYZl,882/bi&N,eVRbiKf*R> 4˺ gH=Ž*zW񽣒e rdGIF28X VUya?ޫ gWljb,]~}MAb ux{A)t#:pq}[r >{&l%/qeفn`ch`uVˁ`WV)/S.)-w(%@}54ڡy8cc QǙ[lvGMs~,CJ>}K,M-ѕo-X_7-V}PynZXծ|(m?1Ȣ=LK|d5ΆVbJ ۢ{]J4cHYbyp&' V~LxW#~;Vc )M1 A-tŤE̍)!!?!#zSۑ6@'禞1~_|CS;^(' %=ކA ^ZT$G4P-Wi\u0~t`ҖvmdɒIyU߀= SȾKm|SmR_Pf"qc PLfg~Bsڷ عN6Erxk8ٖHuEC@w;K3s㏣n3*Xwe#v@qY~ҒI#|>uls+Tƅ*tp]u5T6 \r>MkvH$XEF`viU(NNP%9aRh{r@ܸ{wU0 ;<˺|[Z&Gb N;5WS7fu!`OEߓ+/`G{ FdM" 2&2rcpw$Fƌy ڂn}V]I5phI,;1աƄpCEﵸ,B'$>]{[:[F*oe$m~Ԟ?of"!ϔIn2D@=b A1I]~gt5= ˁqV.Y \]RՊոrJ͙qP"_|3>(ș5Wq4W wVA5=ώ+eowAI]䞱BJlH7T^qS;k'hXi]6\>Ε'45Ll1>[D' 4Cz'ghi2h1&SVSon3j> "6:tG Ũf"CU)-+H 8반۔I b\!V(;S12dJ!"jQwm=}җ~Oaǎ)J$-˭ҳ@H`!S.)i\@6= X] Y%m̌S9{fg*z8" ׿o.U44ϐTq73!;5\-Bes݆pASiOT`͚V΀͖X08|q.o&VCp-b9BfL,2׶Xh֊,a(B3َ$%K׻DvMvo]zߋ;oB@ R{DUtBﵫtp%$;GH-)q<#)e7t_`HV+C xE,BAGsI­nH>ҽ2s(><4wGLj~=~x>V[+JȔGDK-:u= xה/GG5CԚ]d^L#JdD}ENkԤyl="; aia6)xJL= &!DGZ[ll wriϧ%CNr[mC`4FLCܰuׇϸ L,4AZ̫=PoKTt{*/un*'^ 1ԝ;WD YRY:tab#j fHN]놲jf1do@b 3Td2~PY}O}FT2+U6'X'أgOYWϓ~3pFمdɌ0*OfEs lӘrގ:jza( %/+>nKvJfq+(a hhpfW O[0qHL%Mrt;kې<9_~;ܷ;0+#Im$ai~%TS, +\B~{ȑ T+~  dDmux'C ljTvK(ZSMFp)ܛOn[;_BzzSblX4;ܰ( %@1 r7E#h $+Tj{,*K@ St S |2Aڶ#8W夵H֟xP8.y:ӜAKG`uq/-;}vs,|-iVM _[U4'x%& )ns?Ca)QfG!>I9$ո-ZO?kU|듳*MŹCA|%“-unE[y+=5L;ㇶ GCWp'Tnk9v]&A5Zȭ6_P'qhEWvk(Y/wnGDkF\ieȂ M{М_k[ܞPKK ,Rռ9 'k hԥބЮv;e|k_ m ]+•h^6JW" \] /Z$l,g| -L㣶b*?<~ij%.TwH-?<)s1;- 5!P͝{v]j7[AEs`M=}'`0=3ow'}83w =Aot '#ye& |dNPnO:'J# `SQpTPF⦵@YQM"kEw/c҇7n3a7v&Is:~Y F՚؇.ʨrXqLwTmM'CC +O#ǗνTN*J61psf:!Ds Cn?(&9o7=!x1d:_m? 0 a|&KȄ/M|W17Na=}ƶM4SMW3s=uQB372u.)ask=[ .Rw2@DM{7D}1W;LBlzӌ)ܑۅ!Qӝ;ah}x ,X|Rr2>FlWDHi;,?-^mUn*%*p3Iث2y5kڎ*ވ [GquŐ?EkOP^V[V+_jɪӲ,keOg @|| d.}* ߥOwk ^c+щN_h Tj0B2)qEISs9gd s('x$?+A+EC>M\uGh:gW:m3~<6|iƥA0J3F.Ȉ0X ,'TZ!m,׹'sǃ$ෑ+xP_Mkϙ+ĻiJ4aӢH3}_jBeY6r.T=T!,~w>'kqkw%kXRiKNS4_|a6ՏBb9DV7-9[gDgヸ.EZŠveF%{ھ!_Иwb&0J%k SZa0I2xV?oznz%L=g ~3pw+U&d>JϦOeVڠї»:T1FrdQRחs@ ,j _pU)pEIbv1u 8Sel1 G^@u=ˍx,& B Pw-|e9{ .y+T:P+>v>c!G3(c9ߔHdd_C '苣^ <haݻ--I5UU=z~o6:bNztxc$P#15Ќ#_Ĩ]AjPԒ[^F!\al42LFP0TH+hXxo K̬<WRgۿ( JOXJ6% =Cp֐S^_c J)'7J#؟fH U-)Zv溥a]iyK c Ok+ٝΣ"| OJ*C4nsL!~ix%d\ Mt$!gd1.T%Cƻ5[.Y9j`2+Lb|@6dH>[Y \} &G,2dN#<@k_N ]̄n;T~41 ,"D8NqVЌUVנ_nA %e_  pA Nfƶ{DÝ|7,ڢXmhQa5 HϵX;^սFL.z]'bA`V[Z{{`;P 鼈M6,3;fɒڋIgagd9@6ð/1N@3ϻS8'kvwmQV&x&d'J*JZx=#?ƽ"ūl$IL4Xk~4zaUqvckXG E*Kg%ĊI8UY%86 xiRd?J5/a<{Q,lK?SFL'CN[PSx|pnk](}A{2kjgѱk#K{o6Ȩ^?n lKY0$1>zkY!4_Ց8qIBA(n) p$i{5VCtn@%ڥ14!/rH,WWz\39r~x/ \kdf8pd m[d.To@ ZuvR-U LBz)ja9[`0z4hH2ue?=v&@W6c;hei؊@!;ۘ/@@{+LfM' :8;DTM.e"*JCt}&C ,rLJG(T8Cl n(^4 xBX5Q G ox )\0,;pDej9㥄,$" |pM0=䴵/ #F΢Bp)AjaCW|)'#*Ξ=ʜ-G+rzk[j^Tv0O-f^LU]-0oJ C#"Q/eeHw9k񶕭~/a0ƙ) qC9l*W)Q9>׫%缸CY'T{4U!kL.2bl/;K`L8zSX_U*'fVC!VĀ@_gmPuvҮ>F ?͢acv}EXNɵFɞ9ΙxrN%ZQEcvrF*~UzVV6(Hhˇvؓl$K/O؝85X=*Hs+ȍl(9QK]g+h:I!t6 Sz{q6 wU+{'k TV35sH[9fjrΕ]5Dr9a77 } qTMڢoT00, D7&:m WuAp9y'J_;;,8Xdz+yoYgdbn"%(x09GkKn5dbh qttJMFBH-$lXu:Nm`yW|\N]U*a'4Vx8| vid 5b|Su(k(f7WpdiWƬvr4lBhGxoށNκy+tL qTsAr/q{9=A=:8̖Qћ\k?-^g29^^[~=7s-~l\@Ґļw4|=>+-cFS^ b?ɕҝ߭D8 YY.T'ĻC0@ 燴ߍN0íCzl&{TXdn! ؈>zZDIN0%d)=b0',ܷ.(Y%});UOj?YpGWߠ%z; Sx8ogl%+E3 Ξ 7iS"MZ2M5LxqV.¶jW]P6HbQSRNk~$ 8S҆[\MGsKVC/8P֯XcPH9C  B0=*6X? OLm٘Yn1 [^/E!ڤIOLgH'mOq t?Ktq00 #xbu|@*&*FLoIԭ/r)qx8{OkІFghf4A.*uE)(4_zQ"3)ao""5aق$>w̋|W@ 2b7gC1n I?I=duådR -5c~'9aKŎ0&ͬ {9)d7Ti&I,_Ws,{3$hn w=%^r$OaR[SFTT$f 1YlpS>BCE5Vxߕ;og7sk|5%\E TZΟ ;%{H"e3xS$ l$:rS.hlp20ky%3c1qKGsMDG8}ۛ_G76abcdZo2hlGN^:+? gI=)\nhqw?ܻ$*uˍBQq_3r7) p$k}j,k* 㻋ܥhRZj떛6bd]zHmj|qy?*@pzq @ ܵ5BSoऒO'5 >{CYfCyRjni> שo u\ᚅjv 1iÌ4b3gq]HTĭI-߯] ?ӫFv?@H8Q g}M}ZÑ˙,MlZg,B TAjn4YwNrIRy&7x]PFTH2q=Z+\R PfMxo8d=?79=[q@t0>eZ3jZȓ9 2_2c9'%{ۆIVP ` KG(;x)\^VF̾lkHӡOE\d.f!*Q>` lԕ+i9x]kgVڿj9u H܆;kكr%!Z>YŰJ:~k@\ uL`[m\g9s1p.dp^bDvjխ" U~$>\kFNj|l$CUKbI{BaT,IK1swk+"z/ W`ZcVl lEG%Љ27ɒ)% BS[__/Q:_a:Q'] џ^rDu|ʈgTߖ) 7Dҟo`$z؇ ΥiPDljC { &:T~|ߦto|eLoc%7}!݅*35q':#rsS؎w Ykћ^r8z+-TFݺiᨲۺrXԉ~NB;k"Mn|Bl4g>h}\ WGUc?'fgK]T^"YFxo8Ouw'sWcDn|Xfn(VM44 O+ g;o:,&%8I&VqJO2D=wv͋VbdZzCbY KLah^> -dCݐy0{ CaEGP4m?vPa2%##uU{4醂  V֭Z[Tc)i.B}ߊ栠  O.휻QI%JFy/aoڡ)'GM,GEQţSd HҢh=hYg-ɌA+֨Z3p)bt8K@Bwl&kB?:T.\QvAȜ JGprϲ}@~Ю"Mfm3v:-Jk6 U:_㱓t7^p4|ޓMk0@Dk,Ü'0:tuBprq"% 2XU gv_#VMSRvCʮp Ɔ b}-  '6ߩ~ S೹ MIn1/Ot6+9eV{\ vH]&&w:s^)fרَQTgCЋ[ c9Nت&V-T7/P >gJ>^ 8NdpvQ ](Uf^pnsa.ۓ61T=Վ"n.4ۡeI 6/Ҳ |㒵f @].Y`ܦě f37ZH?&6#IMK8܅|wvcR94/BT\fG^Æw"r]ͩbYOž:O ~0f r pިi% u9ݜdWkcRS~ػƜ4#6K,]yP1<^ĪeFśX\(oy uݑ,3TKkFU&;dApߦPtz% s餪/OM:q -'aɈţl崡 sф 1Ҳ(E52gӼ̊L< Py$#3ƬTtaV+2@(!pڞ)&u!Tca%P I}R=c# (O܃w|]'i,6,U{/7HG}ɾU(HrE){] w/KrAsrE7zޙ՟#g!&gZgzء?}=bzY36{eıR >K:x7(V+ޞAL^u]n)u =X~=-?^$>ۿz]NbȯO/O#|iÎj,w[ž*?r[tK[G9rVUo*@ \=$(x]̕%nb=XH!ڗIFq?RϷOH'/!xʚfngB{Ҁ6aqymW ?c>,窊x\i](t;@b]QvE$S9EɑJd c'CdGn9}25Z.nzo(!+z44 H ?nc%B3 Q;1@KkZeVmDԒ }z@0{?_?6hXJ(T&`BʶQ{r)da a*%|*ƞ,.}=ȓoEDShGij\#ģ^ǵ+7G9&FRՍnĂc B ^pp 1c"R'pK Q㹇Cczj5f;Xnd+@5sG:zӓHK _q|Z~=t1tC;0 ,A~э3щc8ѽ89Ǒ&qj9=Ed \h C1}Ie,դDDecKNQROQ   c]@nSH ҃~.gͯ3u jmVQ9<Ȧ?'owh>baT@Ʉ`%'euZo;m@#dO~8oQcN }[88?Z%$Qh9UlZHwS@DS@&5y䆌tA!7 urI.rm]]v` ןV;F-KzuWQ/).Q5dƮ ~ka뿯Pt薳2A!cGV+W&应cb$2L>fM`Ē0B,"JB&̓%7r -oCuy/!Sqz1v^8ЦA%츓ў$.`10ǺGHXIQd)tfYsб.N;9:}\Ks.5SM^,D_[󩀖gDB Avk[፫Qc";dh -ނ `O$`w[,SR IąiUⳮ]vqft&x#WiNWGԀNiMPAX/— "y1=nV27hHU9h8]Cas "y6or5HѾw\UzgIu\\A$w;E掼Ϟ@ |J'wMҥu\~88|'_=p>bS6-)SU^bY) ~O B/S? 3QK^OZ!N !{zaRf.ى1q"YV{h=!Z}!ŸΤ&S\YRm}*GXWzUc?>@oR1eĢr7)ʕc;Rɵj|+`B f!pٝ}6SI%I 8ζ5 {CإT4e]LgDUP^a ] F@kZ%'[}}xjN4s"SJwX=? j, vNɪ(>.Zp=`EOIy;7cYu[x $,.Chrnizz:L46ʳUUz V adZ !1d(Qs7JhNA{r3 pej0螓5HAU51t3YS&4xIW24i "'st,G]hW(2vois[Ƚ&&}{Qċlq<~VU&Ơ.,ks)F>@F//{׬['"lp)5$u '}<ì55`pU5@&*+E7}MLulC!:g ԯVӒnR!zq/Ĭ]LvHs]玮%+cm=B.eguL.{bLZ= #H'ȩ+Q+.̘)9Cr>pix%_W ￰#]R5TSa O;h8"F luN|{>IEXor!z5~![,6O0m?$\i w89 7 5X1_AG8 1 ev,91*f=ۡ7Gjҡ~"oDA.ͩ:4+s(?>bL~mѰ:IKA{Mv2i\ؾtAa!4Lx@>v[Ǻ hdӿ:/}'ZNCG t+%P9^lON3<%H,,լA=Ǝ/\JQkV79QݸeG_mP{5NPo+<ި}FP;i-yhCc@@W<5`;<*&5/0!/MLOo ݖ.k,zP&A^ B4s ipFIs(vu[T}KŽ$JMl/^ MQ&raB s'.rAr94a*JM+!Jj*t<&k0^;MF(=T! $ xwJ&03r[c/<ī !\$r5^i $82,f)2q؁gMP??NUS{mx̚ (QZ%-jrt+{H / 'e!Ld XQ#:BsO cZ~wKtRt|h W8Ypd.D_yY 53|'9DY}VpL5%i/Uvs\1BMCa^V)¯z*Χc|;aF S]5dW >0+=ۓ! Q4RΏ9WǦ43$ׁ"V =^X\$"} i$JBnGaQ1*+%</vhvɟ'_ (/ι =k'?<"(L3[ K 'zAvK AxV.w#[xl|mbI@דo='B%:pM|[I6. _bP˘B|+)8$ s@ۘ>1ӯ+9dB9X:ewoZ &`ΑrFY|ʠR6f3 \+|-^zi5k ERE_ѱ,!B,:j͝Ɇ͈2%!.6Lj'3RN@dsnhvS2 n-uaN.aD:rY  ^&hE7MUgtJWLmiM` eznL7ip?%+ԀCGuU2ɒ_{4{p!3\k9ÅjC^ Ѹr$^S 4= );baR{O.+7b7wo.=|| ,Kv2Px_;O HTjK؃9"q UEshӐ"ɕ'%\Wg=D #Ϡ[M)}\d1VvR]_4`#,ݨ.W/(H~*~ΰcài+a(B1HYߙz5Ʊ @=v-Ĥcw'8sЌ/ /}szጹ-WÌAى zEv03Ӎ YϢ2 \oŒ;sTf^ ^wyǟLΪ%DV;x袩o>ٔc(`FmwQ`+Zs$@*T'G|XFg R`Ҵ*_:let֨_y5{~صdpޓmnG!5—>H=$q(/oë }raX&)xs"oæP2X ͒5̺_]^q] gVkyE[gH5Ҽ lv(JVƞBk.V8xJ44a$Ѿ|DZ+kR5qkqWŖBW9@Š瘆7) >}Kv`^oz}~Xyv]0iKt2|6y??+G+ͥOcDpd s{URGw}(@ U w6yjj¿s'ADK`mO&q}4ʝ:~8[~xd&K-j{ӛ*W0i6];lTlZr2e_{b0 nQq`p?_fUpzBȣBSU֍UPPw,b}݁/3Öl3r*|ߒԅ1>z|U7` [և3ׂB # ̘۽jrqe5qd R}W]"BYN)`7ҿgeM 8Y, :UY!蹵VI%Jz$]bktCw@j-Ҥ,>l`:M"Ḧ [U tգ4ޭxg$1E4-9qX;^q֒kd,4+@{>nQ"8^h&_oy͌d#Dr9hULcJ tߩW 9 ǥU7 iq4y\Lux(gzKJ̝kX5V 9zN53$G.7JR-4m=: " AƙM.Ab*̓տPaAoV` ` W/R8p#W$zPp+f.{%1CC"9N5OXy*Эdy^H:0:!Yi0z FI$qdR_8bEL43VDCYIϗ)i  MM#2E4. YQÄ i}dnV˘lʓ%5/ĸ>%$ڄ>S75N-[^KN\^0] YpO{vvHxƪ<"({ 0X fPO#^r89Vom+2kLdXqq!8k!R-pZ FUO6Fg]b7gĩG/f=Q^ ɄwC_qy^vFi8 qg%N[f`h,¸˕M2$QCצ^vG #ɱtqW1=G|-K{1l$ƪ#~)pa+ sP#^_aBF$ٺW'Nmq#@+=G8%3<ש?`r/_;rmh žoj.IӦ#Ey)|Ӹ*8e[p**UQy{ˍ/sM̤*Y "H\"`SJ0?0 / =06b  &ߗpÞ_/ s/+jU3Р[ ]sw2 Q٠"MFpx ze frU1]f[ΐl|~(xvK-B;D6^ɕ.k-$/@׵_ q;'O5@ ]wR|ϻ#:?ʥ [32-˜۩a)_W+qwfی&gӜ 2I=@4`G]ga"t^)o<ϝ/4 '9aÄڐv shct/F/: \ђ5%Q*;);)- Ϣ(.t[.Y~4 2)½\SG"*?hS<^BM*4C CȲtbr,њ/oQ Lw$@ʠE #L뷹O,;U\[(%?Gв!?ע-mLTl]C ,=+T"}}a{_׶8v;FN*&T1EֈK-ҏK2䜼(jLYr-;uTsW_T ̲e,4Dt}M\ Wѕ(oP lxą#U2WD2 la&_ژ!ޯDvsr+;RsZMWu7ہ`u#^hwmHx޿e1TnymKT8&f`{}y-d4Y@B6r LƳtk儦^th,ɡt\|NIKNOW[>P1ZC)ǔRv{Q) M'aIh >Fkۧ=r>@mi}֌#v諡.!?k2ɃK() n HѸ?sB Z+{T[c۪%Gg=eeP~SX>T[Je A#w@/{o6~]S9+Zԟ<@ /&."'#;Eڈjcny$si@쾫_b H<=r~ !7EFg18&V[ͷ?eKR^iZ+cL_L1Rpr@>$9+,tA,dI1ײq0"C [}R4Y!WS_3('ӖWwݦ?0p1'4ʼnקlT!vGRŽM-+6|!ف%¿~΢\' *Hgx*OZ:LNyk4,Dg#WtfwGqVóB " $ۮ !bwU= dG}hIO,_rh3PNi oP}Z)a@p$(5r>ܒ*yz&3ua7 _zT+&  gi8 ;;U JS>˹X7C̪F!Fs΢Ң#N{F?mcn02*ފguW<0_K ?mb%J3"L1쩿˾=#zȩgdH dxʄ7QGAq!ڻ?"Pjlk# u3jGZST-fYQ.+Nl12A(w{'R .2!(9ͣø 8=n""Dk`7os'/ }v&M~,͏⾐TL| <\;MY7"_KԪQR|Ìx؅ SBG%az|`؟ꉳ‘C 5Z a־ Ue㴷Bɸ=K)G{Pt㐄Bu%f?'{ن[ |m;Za hY8#@-=u-,k+ɪD{9p5AkR Jv|kaaq+ײfLi/=;'s*880 vWٲSCGVL}{8Ő!KTlF>1k5yRh2z>,6a.| 0qiiRQ-+HV/xppJW$ F`cl 0*DžUؙî V{_~%?ynN G\o9Ή-Ƹ&k%x*R& ڻ Z*S | @rVms82EMi`*=?%6OjҁwT glzAb?d `]T^ 5 y[΅^Gq$iRފD܄ ED֛^b̩ W +I0E CH4`M.L8yv祁/H4XMRDT' EcUիy` 怜@xweRsŰNI6!3Ďπ3LlJA&jB~$cʢb=tJސ_E/*+ "< a1P@CfmV\O$l`^VOzbԙ 2N}Q9P7h:4;{T%"nm-KrNd/>/)y>\qawO_K#v[pdNg_$r1> Yp 0D&Vwŧ߹^ u^o҈3leդ'`^72:Z(wWVz)|JDfr<㤟%l,6Ҥ6u s<$uj)wu|P`5j654'7<6{5MUQkB TF75'&L 6v9(?sxL--Px42ܦ ;Q;UrcB #}yfCer눂6c:m Ц,m`ޡD[-S?$Yp!רc: a x [ɷ%EEMxS +"ћՙTB~Zj5gBʶMe 5 ^ nL;grThXAl"5H]pIE=k|8>r?F(^Wyc ݌NRbu0R4vtÒQ{jچyAB͆b< [ףSDɾ닂|Ђ ڸwHU,c`~ {,kE'²~갯Ɏ8Gsmz h"5Şjp!iLst 5#_&k@,IƊtP9? oN[ùd .-3gOVfiVA&ۏ^q˔=˶B rfOB#%R`K>ʇQpdf 8 }J$|Erj C ,A4f8xO%IyFJg $hؤND,UA[V?Ɩ)]VtܰQTV`{l#=2%+7"%*wƷ/D1 /|x)?:'b{lXCz:R^tCC |;Ld&ZDN!N [k]$~2e*(󣮽UD-͋f*M/+ȑFktj#ǀքIH\ѵ\i",$%a4煈7ִ==_waѦ)`1-|Ue#%Dj+8Yy]/yZww5)ߗ41KZ9h.Ե]:jT{R"~0>kp/1{CaȬA_tw[Ws&O=*1 'nOxmtp3>!Rdbd0oKPKֱg3>諐>?`:kGg=01"< eq=>D[TǓ0?ebBl+קzz;0.ڝQ^}HA1b13{fCGHl0-+y0];Y^GK7NWڌnwDyԑW *M(~$Mӎe(7b&gPS2$2XEO0@7^+]q4+&<(ךz9KXL\MHKQ!Hi:vj8v kߪzP{3!~$[^4-Wg"Ԧůg)R#yS[el˛Q!wt6by3;`tj{-6rDeEMh].}LF!+7HǴaIsueRl%§n$p (G0QJ7C}I٤ȬɊd<1an]fRa0+?:g[UܿRRq !W.Ԙ$ qgm oHͶN;y#ץP4? )nO5c,_FcXuTb5 {˥I J};҃ ~os0bFak49"9+֖s^%A5 L4ܝJR/aL{l}2By{\ɪ@PHjDƬM`.:MV6h m=U5?S ]~2w 2 ZqLR㭁_p;tm=UC"[ˏ;Wʘ_c 轈H5~Ծ&˜|`Gtq}{ s UԻ:>-N-wJJ2_B#pfw(!Vr⻐06Ub.u5,c4?RT4_U3f}?u&g As[D0/3v.1FA&XCO JTk|c$7#*5/r8B|(2I"~HG=@wn07yiaM #o}PvG%{ìAh@e6VmÔ~_dw=0e?#.է[?8eii'E= 8$I f2"FF }<] o!*F2h7+jRp6#_'Gwm ˇ(6CD^3*1*/υ1y41Dyy<(9F4KC¦b`}ϣ>@fl"[-v) VXTo첍IݐS/X*9+MgfXd&Cnfwy֯HLP]c%KFhhD@W~K­A CsivXseGL6U{BWÇԢ0 1|ZϣeFfȦ۟wPߋZ(%gDi$dsӖ3xՂo) zU_ky`@,7/f55AV?:0}0?}_>Y2=>nT*Ij'qBA`~9{H[dR@FZ=ⓇD7M2ܱIcbcH5ei+ZlL. EMWla7'C̮}^&=`{X."n9V?wOb3.1QЎZ`o f9MlkbAR/ &,ξ(|DSY#"'$:: 2֬h;&-{j`]PaQw$#oI"Wne̘G63U_/Gс* ֊\+rL>%U\i) uX5qP;w b$ˇB3'Bk]eİ{/мP 8(T%p-EddH]p_:UBj)5 -$yss`Ĥq4\ˑtXy@4Î敄Ыqpd|U^[&i%fԧ9J !@ br`?? )1; Tq㛦%|(,(>B*(ct.l w[ɢzƟ~F1$l Ԏ)c<)q =ˤF-1!Ŕ51GѮ]ѯ2M7b`9G{VvW<gW2[#dJt!o쒉wˮPu1 *wEj3yJ,25Kվeqn%j.}<=s?x3@!z&ɶ5|\!0@|.,`f@YqDk/h'6͢9spL@-ܸ݋6s7?o~UyEűQ%F\6"txy'UK),25|bkYig0C'i?C^"Q>ܤ.m\"7-I$q>Lw+Qsa K*T:1eO:3N/,*]PFAUm<7JIB.l:neS] 8݀gJ!tb{Z pkz5pכi%v= S[yegd^kN][CWG[j>KǮU#Y:4.C~_c9h ^JgN`C( |viZ|ɬԑo '*M\^e=#Y)w cy Fh,I@#[dsbeS7jӚYh:"V$$4O.KQHY 7ؾ%E$].Fzy*ĨOⓒ~Z=1ZhfSn*;@FӜ(#P#n+όr~^J<K-As+\-J>Atn>QT.Y=y˓B 䘾~NY GcsLzN k,ځF2S;'Ɓ&=&3{q^j:|x[!nϰ*'f=6 /N07 1CHMP(*lry :ǿ6 𢧑vr\Ǻ_ 1C,)РH4:/ozd/'nZaQDn'H*_UA ^|ΝN7Gx -[::bDňVg̮"[W[l⵩|NNA)97S⽈m/7G&6Jh]8\m.8ְ&]_5˵yT;&H#0~X!o(#jMa(rKPLӾ(\ԁcj | cji3+W/>T%6+ <Ի^#!yR"XDz1W^;?~%n@f#,jdkN(Od)#GPM*F"ߟM6S&ֺPe |ed+X~C\<嚽ɢXzd_ y\ ΫW)KΟƦ2s L<$H/d0rV꒒|lp[. 8gO3אO6<6r C\?5 AqeKQ@0] M`v;ŏwr,ó+mbS߈1XSXFOCrrz";/lOKFme\Hu1c^]+m v}eX)M2|Gs*ZFmk?o ֎F|+MS|vEAQkibmx #{B,j 3xƍ.V) u)Vv P_Mu/WPi-sOos"z۹qc/T֑<>}RlǎSr O Fhz35 ]^a06{oB~d|G?鼷DZ2HGv)a6e L3FCt%R 7"'R@|=bU+ MRꃢO@jsށ!N_XSk ذ@H| _lH :tޯ։]<=#C,m]nώ=B稷V,[pg/Y V^l7V+c5@t *b"#.9W!g0H1Bm.uB_#zŽ-yj Z\{PaP?yE֍wtw@V-UNuu:a2̹A/:\nH3)fSŌw_ 1 iAy/BQƶ^ƂXퟺFj$-NU@wߓb zds>EF#ԪxU%!sATe*}N z6bTsS7c ~$g*ڃq<4cشkD{+ۀTKv8}Ĺ]V~cUňٖo'"q_ؔ)pna$7 /LNANiGsBuv«ΏPxbQޓy"ʪīJ$zLWFk3Omh"^xsJ;NTVE9a8ƀHwmZNt$,K߶c(qkB0ʌoHZt^M"6Bc<` n !+JA*F<:;YW ;Ҫqp.{HEY~dN*N-_<㋆£P:)(5܄I):<߿rv_/9NJE˙4Z7iiKw{_.Ļ k?0E PVLs}ם7ܢIRĄ gKK1-{sL>@&7RBC_ٙ@cr-Y6@S ۓ CE!r%H@RswDRF&([VVμ6 :@$ *+E玎V7S<.KLW.VV{͈md§)\hdgvnAc!^}yu32'êz0YdTGX k Y.ϑ5~զ94* h|s(uxC6WOs4\pHK/=TLg|gx+jOaoz.4!`grtɒ:/@^5C" Tc(X{ֹGĦ +8ٸtrx\zps$эdvDSżUm?']lٽi)t Nt* oxe::k2 Ѷ#"whT-E#K ࿠4i,_~ӇE'^KУ/wVQ%m ܂M2^^( rgcxBRU,-;fvVQ=/#X?۠p'6rh#m4I˫ cfFq&c:V߽\ gtOF*(^4}`%p-auXvk(9NFYolDJ â}CS'TU* X1mssPkw$(B9`B k񎃐~\|3weD>+ɐzq=&{lZg+t14\ewSqG~6xYpkjK-QvQܿ{ğ#fB)΅C: ',n]/5X]/Vn]گbG`rѿnR|`R79~lٕ)" G!^mƏ+2?QܠBPL(I:x2E} [)o|}I ݹEC"N3.;X`]lyuR#[lv V1䎜7W.6-"]}4a^穣M$I|7u$Ι, + &dt.-2jkD/zՌ+7MpSiǥ4߆J |y2'O'ZIre>qWa H5ߋU,w6(#$ Xי`fNiNz]>Z;T?WX8 9ڏ$EgVJX59vyΫ*ч'ҠsaO΃Ca."NЍ܇:TKAjlT!;ׯ [W~s>HdվȮ=ƹ_cG8Nޓ1%3)vF#Hz9Bt`#}]qy&k5ں-u{`%SL6kV6#Fw@ abvH5nQW&Yb(@cxc@$WDJBf'Ҥ |d7_-X{wN!|UN4qUTi Ƨ3gi +62̣DKu̽WZVS@gU[]D~iJD PLhǦx?vCVW9mhn $WzNڼ.}e.pi*;'yF ؾu=)̪PEf#,PD ==nyGuBWzC:dž2f [}=>3`)#$$:됺~ ń ϰJ4Ka#1ȧAvr +fXSCRM"_bSm8ӟϯl8296STeue}ݨ*c+C`5"o(7U~N-˝tdIU))'zFGSC/_rͻ4WkAQf q#sQgPZ#Сje됁73pN my}lf+s#QMb %zb@V, w>4(Ѫծ#lm.귛gh"ڐ+~ Ls|$Nb;AC9❍ij6UÌ`N`UI˹Q ې8=ߨZ20ma3RK& *JkG?(!ДU\e &I?$m.gxWSHV<*3Q)aՕ9eekooT4^aUįmT-%Дr]- emC? ©Y zavփR|9hMU$\2$5W~y98R)">-BХT2_{ؙ`;Cb 5Qy>߯_$~SU -VN;!K$Mz+AQe7TW{,|;Yg-eA+=LaT/t`gA+f@YN@PCD{iג 8i1fr ͭ3|B"U=h؇Rj ~pl8{ydF&~G(>eY>8ꝑ/㤨|{Q^&IœKG8x2IK<ᅲWsa[w>g7ļip1Qm4I\ @JiȗrV!HI=ktXd{?8)uzpJ)Vw4=۽}8K^?4CP|$FLZݫzgTwF {LWp^ 2EڪzK+8?t~u}HaTMef[$Vbn\V\K\ʕ>O?[@z}54 D,2NǎܔȢرyxV`#If˺سoAWd³7hxr&  9E|"RU;!v&Ogh\CX-h>.*] eӂ=X| Õ'?}RNTw7Tp_PrHœ~8lk-מ 2yHy|AK$I#iV4ݯ.q5((lJ_ QaK.ƒ|}O)rv]h]#n*x\m,<&K#њCX-[ȦrާfHlB ]d+25 =\pN+n8紤\ww hhҶ`K$%\c&O|?3uAKNoUS_&4kwn Nce)"oLIU"$rsNf(ȱBhjۼVC 1G]%7lR~#N'" 'H^<9I aR{#gϱZ9 afת}\DXBQ&am|1UXPf:\J"/ ̲Qy^Z3پr7[5*wp+^ӳ7ڡ7[~tgl2wј.lijz0nPXXץf$e!ؘbǪbSa`\>@5;ZFH3_X$B9l [Ei΅jڧ[c"5Nir&x\c)d:GYb漓S˃NƩ">Q׀Q5R/|hwtM8 T6Ctx:GZL†n}v]|VL>8G(2#Z|Bi9 56ӄF8\"!"AG"c6HS~'m43UBBZӄ_rmPޭoO'a-yBβgYX-:r"rAb=bW.hi]MiPpxֽMW QK>KmV(rC+?B ϼ1 pm!?(f>YG>Rӡ *TR>~TݲgRml8 xnXp(;`BXOʠ9F#bzg/ZM*I.xdds-#!`W{ nܖ)h.}xa^)wfIrJb~!Y履tQ@*5YIpI{TM5fp`3ɝ R4X/q-wE<daH>dQЍ>݆pA?' S(,dԔ8wKAV0i/V;XN"el bTS}̃cv\ Mge*_dՊJa?[! i*hLx)NXӴK櫯2()1Hzx?QԷc*ZQ;b(+HMpg̈́3N.!1i-M,JTdjnƷKnFJxz+HG-9B!H L?T8D*Eɐ :4RHսF(eS 5aB|9.㬓 o#Ibr 9n9>" ANOcA"&$V \Ϸ;Sj>xJQrJJike5{=R|ro;H-|w~b[("H*U 0rz Kݮ {W[5wŵdPpO}Z JEiAM9p|>C-]S[]=}E.gFk&8pg)$δ.̦0Yi\+cNg;٫0iwNb`Sx= Rȇu. \ Uj0o7nKyc?;6YJwmH3X=SL YtE7'd<0ws1,Š{$WjFuIx~Hb=PhWiٱY"8N4\w"8:`>.k0Yfkw TL$KIZE3:N/Rn H5E@~'TORSɔ8]Tz ዣj452zܞV6Kj6~ޘ;BUL,"vQ^Y2c8-A[t/Վ_wr^ۂ6n攙%agX. l=\}p?lO"s7Ef9rgZw`~V5c0+&!FɌJߩm qso NuR-czD LNT&3l ^uX2!dxBPܨ cMGʢwI‹ Q"WPQ\w[wLy* /`IL.Aa4GQ)NNW9)ƒ"L“ģ^Ag'}^B3ْ5t)g;tq; p`bߤBQE 3X xz)G+UB yb~L?5ޘ$ n`dK~ILaX$>nfڮjsnsxXGF4TiO٘ E!/i1}`0.OIET\R#[a˂m!ꉓfBCJAnTPAG&*CEqSq?;{BGzց9u=C(J\@ĺPNA V c`^)ĕ_QWW"g/M[f|H)6^tWؕれwy61B#IsH fbjJo wꗟӷKD|XiZ ?tE1"9w'` (ؾz#NHǨo $p"7S*:#Ֆj  {5ꪄXkg y8ЊUG{(_Aܞ]R!b8|\$D3΅j'S<:1nP&.=qOI{4gv˫%z>m +9v gzrڗM3vlIv~ޔ4;aqI]˗u)f $1WYkNylbv!7cOT>,QT{aV$'I+vP_:AE]ymK ye|(?.sm:au:_I[f˜X($b|闒!~(^y&dE&~@ DSBUJi#!}~ i1A"G93?;MOi{;va 6Lg}'NXd*d7q"-P!#iHLk<B4((l7b⵰2ńJjת_nE 6YvéHCX96Idh5 ~%x^ YNڤa"{;ͷ8SU(dέ.[q'.L_,Ooq503>+y1qdN8!K8NXZi--Vt򾣪 >\IKy&Σ%(ֆaA ec((c;!82\кH]l8.#7?H,j|3 VlNj̩n;]' H2ەGq:.ŅLW'JF%t7_KnSLS=8[Ƽ.Jr!Fb+B3ΐY Qrc'3DN}Vn_^BWBc t/=KH(Вox z;;yA!ÜVV|Amrŝ!!qN|GyNtqeQ}ajR¢ , 1 U28!*pN}8v2 %Xďt-h܌IdiG<:3TzP,_FeviK䅜 Y|I 1y[4b#[lh"\i& n!TEt@|x'p i<*q:XkKܪuTmij' H`?e)*_.]M}^^ac$ld7g{^\1՟lZukwVlm@ ˟8%:v%y0Y^t+t[`5Z~g˙HE$F_^oI?t(SmwX3]e1"%1EmwK 5Ǡ_نݮ S]z3p ddi'D* 05r5)e-ԍQUwJ>Q3IjV3Af*3G7_RyPɄ>dO^Qm1 N=s pTKlnsL/fJ9.gi"'>g|rBCW$g.Eme Ƹ`u9Sf̡AbيF"ֿ4 Q0vN4r_`MU߹ѽ{s: R_DPI%,/L4J1b\IZ5BhrӚ |DsӠ0T(p%`C9TģDzT@6ɹ_!SM krMҦa]цFQSO5QiQ/涁UhDi""=uޓD:.i۶!#zc0B]I ѡe]4] 5!U]SR,C. ICpZ6ۿ =ܿG̞mkm ,TֵUZ]C%Ĕ8a?owį!?C+{MtHMbCs VAH `O9Qx>M!Hnm&8"8|L%x{ ѻ,~.QDPw"Ҫ=ac k;۔NKk8J\TxoF;T-D\3#L^2+B$w@}|aAjDSDm(z8t=NċTT}J ´#73n]x=bxGsÀsh6ĀэI[זHkqz C)H+KԨmnOF'Eڞ|?PÏWg>(5T,m8\tS*GGز^S N'*B(CmR <;c2Zbw/jI;jif!{L8\:"Tirɉ32yވ['0X *tTBl̅7)TƌkBjT]0Ƴ`umAkf0ҝRiS}&b0tI UUxw'o^u~̋wYxdkps#p[?*Ν/j|ᏣG6y{* DigK)"ZBG}w֯N!"aNxۢt Us<ću&Way[nl-o"_JzZȴD SVnNGS WN۩::MX`Ix=ZH2K*@C+S`D=%Tad6& ^>a(ŪuabT&8  w(Ӈ7d# 0/4ЁG~޿d^-mK&,pA tߟ0~9՘h|mh&O0`pҨ"B 'q.RPJDMݒPc^7 !F(6N6m);/kp!Yڹ]ʷ.tMI Ww{t#ZB[5rnͫ]kU`NIii '} AS0za{,c ("lܽ;AHq]/tƘRԎ][)4~RDX֓^1YB9&5(:V1xp8S巌T0TfWU$hEoQmֆi͏tKna P4iaw%"ҁl? 7bdM6#$Dk'mfdnfBc*g C{dޟJ-hAxiou"b[G@{:|a}6#WdL}ɢ~ֲC!}F/*vhJeab2H<|&[NFV})KG"i]а0?^J<B?o,]QLI.kQ=TEʟk)E : ɥ= SP=ttR7x|wq}"i*Ry2dQ&#k{s}-i$,3Tx ]Zq/͝32Gv6:cІj"ZDaO UUBH3#X2~'38"$݋ùx^]z\,S eZ=2 r/eJ| $C_rF k(K:X*hFM5T];b^kp:W޲Jߕj\QrW%n/%@AVoee4S:eڒ-1[0r!1|S[T=SʨwI|Pʨh8?s!>|$)35q^sgdKuᥙdjBkk,C[W_"֛SW3n}tTTVJ@5K:V((J4${"|kשjQȡAIj0fy=SHcڬB}"03"i(گy`Bv`ǕA%QLVpU>P}^qg)w$m4Toi嘯!̾$v=38ʤo+OerAucYghn=~9\E7*jGU 27x#yӷd >կ-U@g5M,r;O- \yKbOH?G? k'bN#AĎnjV#tlu1DL'Z:h}PGOa+7Pzi'8/B 5\La[GpkE{`l 11(_'`YVEOm ~|)TRed ˉǨ,t.'RF>52DlN= vt9V:1ni}'T1J<]E |Ο3+ڂ'9:'W vp ͧaDAvZzo!Zu4奈!gPW- 2Jhgjs;,A* Zr%DgϋȇynP*Gڪce멒۝DM[J0vN_hNK}3Y9M 7+Ň!.,t9jjYEhjI0^Ak4 ##51kl[nlT!Kgݟ%F5߾┘e{$B*VFzǬ/X:E2^"<.uz"ѽ(nt=wVgXIs]ڦs?7}e\:]F'q/Mf2'_̃/H*_KSf]sM;3I4mBau ٕki7Ω Mm˸,f(-m뻕9jڑ[bLē `WLl*hfKgN{tv{,3\a9oLdxEe+ &CVoD.~#'!6I",BjP(פ.e/] {;Ko '8¾ 2ŏur1sIAO !qǎ<{5@[:0~@ʷy5~Z!]m_S܍8ɛ1m ZT 0@}1 r!]se6C#U9Ҁ|k"X~NdB"WibasSTHRh} "`WODU( Y,_lurWLv҄) .]x:2sb?*DNK pxRIE/i偞1z^]gci vlB-H'IM;)}eV4cz]tቭ*j=qҎCsVx}^hΗ[›8652<*#CQׄhB"TJT~+}Bt8.$R{ }HJ]Vފ}\8ryurdct-}|شo xW&! j{"Ca:kZd>>F;'Uq,X8l.k*i|)F~6r#EE|KvZn5% JF,o ;n]Cya}Fۇk\j"Pim]]-Εr?xesi3pKu>EC-FBF/<"KTrJzpϲ0J ٘rΌ(vn+3fGm7wƾvbn&l$c`m)8E='+ 2CKMB+, r6~$Fɡx ͆a?X%ϤcCVX@d<Γ=`/U,© }Ƽ T^=3sZv4Al&ȿK@r_Բ/Hse'9DK+x*Sh_mvg±KpO#t?Qobˣ no1i|?3,'elM@2m['E>Lx,l$f:oem7hiędv/\#d-CV[aڅ ~mUg#C͛"|`Nc[68i-hK/e>ǝtGz^c>l_5޾Bxx]OO6O[Fϧ_gn75cw>Tio3ڕkkvE?v"!l3oH) Ctbbt]Y b? X٠m ZMcGuЫ ֕Mާ+Pr5V3404M6\\'ic^PFR̫Xw<[tZ} 9h\F:M}Xv~iW*tKNoVc5 :eH>]Q6ckIC; $ioRL˔_WQTBSp`f"EijCFW{^։nu+2ji^эP剙07hG0O&5U-}]m|r@5tVh ]@OZo*߻~:}WOgyiI9imW&Bc=x}Hi=)PgM":z4[,o$LܽYwQa{8ƪ0O!X@eZ/7 *\WlS?!N0}E~P)y=y7 K푙bBVȢPŤڋ}evHd})'I773%ORq7gxi@ gX%N%$`hKyMYK78.(I-7?";}aPX BhA~[Pw _omb|1VDgWqkJss<ft2 r3|DAmqW3C&CO/iڕQdoq)&8ꡌt6ˊ 9y GBJ߁0́{gJJokD{*},9kS{`2톥 jk+Rx^:pRbr*=򑺘jJ'O,$h岌H/?G Q1(#IIX6'|uX Fۈ q$6"Mj_¢(|2f%n$k,Go3wIPwPql!g=EjHCYnL'7p+bۓsS,zH[<6L05dǵQᾉxڂQ[jZqGb?:*mLo;ROwCܦǨM2F0#*ϰ|1q}T?w`7q0v؍SHP3뀪Z^vcYl\ANڡm.#.gk艟Y#lُqd  $Z%nN>HMD` r<3fcˡyi:LdShw6A0VQ> (Z6elW1{ eb["ۇMH|5-"rс1BeTw jy+#qX)(Qc!ݰrTo@{8YT]EsS'2R/v44aG3m(^W {I Dn؟vzyaA":;HgTlƷտPAKס+bٔ@kj]MYDo?d3NO/_)6b\ ?dwFgB 4}Q]y=FFW&<;BOiЍưg;!QMt@Ijx|!0! JgBQh&J\ #kj:3W/UK<ս ^yk̢ow"!s_*C|a+ڌYp%U bfEީwƊ'C/62Ĭf\ YzE_yBjL*HFs@ K> Oьq!UNʳaY .RVr^pIUJYit{Ϲt幇!^g'i瑰"T,}*u)?D.:l.cB6{QD,ֵK^t& ;,S 5y1bmF,]~]A%èy|!%9pџ]2R<3ՀYƬ6Kt7~=$ş*i2..A-V̧R(0X % ZAKWv0吻)h!~;<N,+JZd6*B84Q2D"'9A7_\|?< /"~&ȓVe}NFłW ʤXu$Uty$sVJ!MFd$j"XsxgfL!r돛$35 TXj(Zon[3"@b(vb}@4oG94Mww.t,~ V{>4ڐu)>j72V'+(*8lK&l|EOl% /B]<%^\eMR@"o@CIΆ8Kl,!'g>X.RLZ(pl0f 6^Zٹ @ > #~;sJ] q7X'9o21`9^ ]TCGͭ\ͥʥ{)IPy_|טo -{lYbm5k;L} A:4!!WUf/V@w 0.O`xP5a!SnRN!4bm)Ux}5'piH"䛥KXg嶺˲qS+Õ[$і= YA pY1"#H++'Ş9)b">B9mq؍d?m %W1"\A;~4tQ2Xe4\[DZ/ќ;o{BHe{ 9r]uNGw UAhwv|A4/NN˜u >hCkAʵB &߷\nlkX}?bb /ta'Vrwj!.w-=q-_W2*vzH-  AG@7 b lcyf[P5ދH31x{ː K37sca `\ ZRێS)Na0I/Qyy]KqE)J [¹[U$y4"9FM@],ܶyDj ^6RV!O[,S>d+*2>A3 nҠ>3biJd 8D3EꙘ 7>z2(|!9)`W6흑p⊲_tqO5k𡍵YVRynCڙj5)7т*\;ǑQ~3ԬSK& L7"Yǽm ?EW}OlUn0JOK%>>8ӊ"q[&Im't&4 #mk}=ږ4+uG.+gKK4b&o&w긺:OM)ITx$!dcJ9GP[ 1Qq\l3 x5B C ɗ b`>!^(TPnUME!<~K$Mg֒!SɆ"#4Ii3>9Ԟnޑ -a絉qC6A[V[RRaeJ2mPdYf;uyS ƬGWꑶ&I.;UdiЃ= FTD2}A$3:->g@m}/7섥O=rbL4=R]mZ@@ [e$mB>|hUB-Ԛ&ŝȇC@?TU( rcEtaB'"Z y&F(v{&ʊǗ=|Z$JyFhodo&)98a21ar>+ܞff#~F# )ao{rEԁ9%H!_f7RvA=Aml\=x]$mWT53Qs7=&իMvfd{tA\:juBjrմ0d<}5yY(o6B}x~y̞~1cf(0t.8{ x^ (cpzr'/6h"'nGge?\ +0[j5Mk ZA8ڔ+GYjIvr7sg-`+cE?U6Ůǁ-QRh$v)%7s]$1 V8,sOJ7ia(*” ڮOs 0<q$#x' aH/ݏAe괶bz;WjyQTC|ntY*Lڶ1XQ7#Pպt:'!))N*N mR'ڊt𤃝ثց=t0zBr̮u |-^ &N+#N( lVs$sVZ`Exv;6Y! Y^fZ_tz(IVmL#\CľmˈwZ5,tjm3nPoU%I9H܈*9 auFߥDp^A#/95!ՒeBLn~QmƘCvѾM{MZ bI EV%-8>{9eua we{YylΑCTt}dff]] Lٗ|R~Y8}([yM. :wH^=U(J1CyuPw2RMzU , sU1Fbɭ.;6eg$ZV%s~b*g^͹G8Qs׫ GlsjQ.?n9XZ:rI0 ϻ!,rV!BV$ 7vу"o2 ;އY3k+YB'բy͎j84o[x; M+bOc ouxGgOinTn:(p{ڥעG_(UtPYH:$JP"1%IB'c 5vOg|CvUfir/ٔujG%wXH¯a.(`&GJo AFnAc))ŌƳX/Gv aݏjܡUY\V ^Ε<,H)<qcf!>y"ApqpK6eZ9/g!ƻȜ6@O8BMFR-I.8\'?eE~mi<ap_AkF\{ޒ\Untː;M|[fp>?7g )9:)IojB2V^QpX™mRu&u6@䑺۴>Ok7m.[2lBV@QG.!%l,ȤT?̝xKqZd#6@ ҷp,#_v(OwwDg-Zavr僱L[{6Szwl|Q L@^s7{ oj$D齥ܴ5\܌I@[!ަ~]8;5hkAc̽l0dQ~%=R)8,ڢ0f;eqtq7X.T@ vZ6HI2 `N]!ޔ) x♇  Ҽo@j^rh;+haN=7k@U[cRt3 58]2YSXjZy 66ӴqlC'hHiŔ׋m'2tq4_~zAbm6@QLue1-!|tߔ+Pr12zcLDx[ޯ;}  =TzkF֎%D(-QdPH%|{ˠ-?ةg#%8X)҇< VfE/.)$ !7RO|Uz?&N8rSŝNe5Yf7]G 8imc˯go,-$ <٢S]*"klPYim|=@8k4]et7J>~=15vx:3hPK*E69zu%z;_+dU/Zfc5zgE0,|ArWtHlg 8D sh;f1u>6vn t*sqZ7R KDLRV6WݮZBwZ9k۬ɒ5P9̱2=>T' x㫻 +003K#9)9Ƹ݊?ne@ѯ@0 GUWLH>0 r!ڞd̈́<Ǜ" [4~07|&"'.~aKuoT8^:osNC &vWt4:@{)'hقa/ q]r8>CCΡ>dqn٪MnXz$=~tHm㖞(3)M/ Z4^3qP~_).3n/hhT09zyV%َ6Xm 8 ;F%J`lu77L{n5S]#eI{; "|1tBuˁTUo5D2|V$(3ъEm#'kީ?Vn6i&f1)gɾL9ު 1w5J[4\`'٥<)6?Gjߩ<"ۣ\0gEYH]3ze <4kr܏Leʽ(̉^irVKR9`c&Tigb;٬>};qzC\3l֚eAqwl$*=]a"% ۥøs'9kGu~&%Kn-< >B+#Ctxf""m8Nq؞{ mpgz R5womQ4FgQK%EV^NAmsYx l˅leXe'2VֵW2' Ube?(cbQID{H+7awFc+C7K['̗Q jjx[U^zyE=թ$V&}}!8%ʂEVŷK~L&9[7jWH3`eR:G޴MLw7\ Ɓ@zu:h^ӵ=젧Rd=^KpV'@6:(͒v9]rrKB4 O /2j6g۫GR/er#SDq\6ETN"&!8ؓ6(eg ;_l93]o3ىD1KEsCL}̘ . j,FGa}z d$fKk=p\\?ڢ~Ny<sN`^ٛY^Zq% {[81u !/%4>]!< u2x5gEVq<%ir;-E+w[Dqd?`!E˦}M\}dzJF \0Fdu`%UW׌=nIQz9 7ں[,?vߪOy~6G3H!&n+~_= _W8C覮i]{E∳"r8@UVgLǪM+xJدg^LezGc.i?WݹRйfd8$I0.n@t \nv`sd"$ynJ]t܏i2:j_ 8A&F\Ig.7ڑ0ߩuڣpu'c!{;kK4ޛ)v&G,"%_gJ=`674 %0|LB>Ang_H˓Tvik#- %nGS\*_[OeNGz(‰O.VNcPՎAav-oiv,yhv'Z;Emkn#$W6^W}&"Re0XC\{ʡlxʵ5QJ^rq3z;ߤje6aMo}Sk#Uabh-jT?2^Q|HI5W^ϭlC?PfW6:+Kna#.?|e8ÅOnPRSUҁh>v&ajp81B%*!i\0G.&^aȘcחg_S@] T!?`4h!aa{B.aZ܀\ZG#~IJ @:ZܵI b;FS:?P !N'D\9 |J*-\5hʼԊdݩ8υ y'HwzMvcAatp1YO f9=|"r3/n(q[Y(2phaaEj4=F11yNv#?O.Di#V'?R9ӓA̳*?<U"=5x/usd6,Tá= v8)ȩb3ZҤrݹG<-40|rT9>.)bV|O}_' P9n}c$t3St2ڔ{ AZ4Xq QYF(,a2Z".4[մ`@'({[ 0d0JO)έqa<9#'d.v'q>?*ӕxtDdc3n$6BdGMYUsN-]£TQ9ł6M?,˚yΏ{7 V^x`Gdi(GzT$vp @05Cʾ^R!y!բ4 *{qyktTY}2r\/ciF\QHkbdxOCb!XarGȽ[.-1Zި)@ ,U*gS8 Vdsm<7XA#c]yde@SkسL+R}>ڷjDטIѧD\_ex2'Vv~ cɡ*)j?]"}7^Q[OQlێ-.n0ey0]"8"?KC;(h#0(01N/o6uB]j%piD;%yKBgMIJX)CHڜ oIS>R!;Al~_Q.kxBVtEH&`S ba FqӸeu.Ļz 0?1)c*mX~I Caՠtt}!]w &H}+*},9(# /Կ)xZ@ؔ0`-.jLc)9lk e:3"œ-'7V] v/"Az] e n}/5sҬAf[ &U @He+E0kz$@K΃I #Q , RBSqgsegX8VbWjݝY%֖I|{]}Ф¿lq>yt"Puպmxt 9 !V':5hSۥ;-~! {X .'۩XJg@dP)y?W~ꎺX1$#qmC]SnQG*=iĭvv{ 0k]b4u)* (]ѻYї0ڣf\Z1 ):t+$&mAAg7Y\4-~ umk^F/ L\<]b<qi-\4='$ PY3of.kL 3Mӛ^}Ǥ"Z>(} <_V[F$5x~*N2i ?KwQ#ٝ^8GǬv]2P\Ȗ@c;l+gNܷA8L?]۸rE+kk`shŀt쵵SDSVIBv8lw&%z( C 8Zndf!,u>wX L2SCIº!~#>/3LvbG~8+~^= (L0џ K88 wή< tg,rՖeSڐ^FB'Vr߈1rƜ#+beu# 9 v>Ae^˂T?j$:*o$ !r@io |8B'õ:?[ "}.&掺]`;%jV48K#Q5DZ O4\2F/}܄cZVK7TX/q1äsտyFp@1G4;.krǚpf6$J} ULjo\M۷ޅ PYv8Ⱗ̘%{Ml;AҬwn?M E`.Ζ1;(0* ,\,c_hē45O>Ò?)wJ(V?ހ>5Q44*-{V?hѠ"K|_y)S{` Y#:^(..ۺ]OҹY}H<-xM@a.z5Q%ok] Sq1c0ȖY8X,wG iPliI)}jlvnbO#3wky pql1PJ~qw+)hcB`t4-+uܰm=V 3[To~Wt+q[x`E5n=̆Lx@{[q!݈ᷝN.zbwԪ/2q%,rSN·6oLi x|Y%Aiщ&Ie!h{i'O a|?d5xK8.z1iH?vDlH#fg>Cm*&(0fg))K&1g8ҟ\z=TdOTK#.640WI%%Lϒkr (pnT#8b8{\~BpHןYI3w;e{NZO4S8N-);ɛ.?9:J:e:5~/o#PFA̭jDdaƭ!2#Rn&Яt\E`&V@7td;ǩ£8(fWg7Bn1. IwlCpCbK*5QwfB?J5F,oh ^:Cvn2bTv]]UEӈ`H7!r调8XGuf+$ęŀ}1ҘݱkS k̑>(L<ŘЗko?U,gYQ`zp.#:rTSg~T|fBrfMycstvрC";ⓆZ.kQjf}D~;])kS--(߹ĵDU6}D]U0iiӶ=\Zŭ \\ZŦ-L& ͙؏e膪m#~ϴ_4,Mԍڴ]>so{(Lck=u6y"zDY4F>L|{Ԡ%X VL14x,EM 1:{IqNyVEdW\vB<"`63&CZqgAk7o b|iBzZ~N;=G֜l9@qyyiRE"?֖WGR[0kY,0gg*z=}8<L&Pwf + " `3qHvņ$Gq 6hмxn *rO@x(<d\ֲAcB5ucv1Li3(ի~ȮIi*z2ICT0sJT řBe.3CI8^ʫ:Z:=/^1,ͯu(dnF>TP. S9n}4~'af 0Yj1 䒂$/ɚq\D64"H fX4AYem8o*WRa 4QvA>J¯W ]f5`˺uA/i`[v!w\|%|Vć\u/;1`ZV\s3xB*RJ,Ӧ=Sz[nNhpu1˾<ղ> ]M*v"ju^w%*?qշ oI?*5!qn+9Z|RVhlZ`h(Lç $fF*L:o_bAZp%&9l6'eLG26+ @o!5x5Úضhs ȬU"'Me2PwGtzcD:sȱbx›~6ThO0Z6||#K% !nMos|D=Y|{!ex-G*էs~bb% {Yp&ȧiӸS[V6S@OCD%"TtA]l(ǚ}J#Ss44p!<8O;*=KK@NhCrZow+`yOِB Q6nn6]dg1]q5\QN8u /<.[i*s@++0 /W#IMtrI#/I I }W*P~w5 ZQDvDD30A'-k"jx])M(wveT o'΃o Ջ0]Dҋ7Wn)R#D4|`YL. lHd(aIWV2UH_na |Y]BW?̶th2?r HP ~ 9^Dl#6⾁v Xu<%K2$+TW7 ]jpIDg8]@=Q}Xa}UJ%u{4~X>mL-u#N'[`فӬwȇlɿLVWWO.P=Nc#s>P wIQi`P諗|V~k{nLacjCYD /<S;,愜9KEO%%pl׌!o&Rd3ͫ.)(?z=+o wv35o@L)x#&6UÂ!t~p*hJC9J寃%v3@h8 ³5(HΓ0* A7~`Yh%&)/+ rGRۿ218ZWo4d3c:^ݥ&z<%TH`e\e505arbټlʋvwcR`\C IhYC(.4Ibf[I $+H]V5oϵ%2B'w 1 ^ Nˉ.NHfBݞb(!sRKDG~W32Cw\l؉:0?qI*APPO2 z}Dg0O'B(*tVɯ!hiĩ,u dl5{* :Y]ji- ٿ((S52'a߻Ma2ȽmbJ1NaRr/u#6e>Dy]6L0$/q}޻Q(m_ {gӝeIl#Gb@F& qoB$~KӰP=iYAnsΐJIC1x,O ?eu+O\;jJUƃq!;KwM? s^2V~ ^4IZGZӤlVL5ȓ܋W]K x*ovg=g/;bmu}*dhкu48nȀm7c{NB!} >I}) gQ W A(ooCQ0-aNԷFمbWݱ PdIhH4ZTT4U\(:VyLZBZZ~,|־Ą#(Wr~l;warnܕ AMQāCtqn7yBVG\ORGw#xJINjy d ]sDJUqwԙ aA.1NӋVSt rQju%`Sl&;]%I}6 7SXKgq,@1Q3.' cq ie_漩,/`\K+Yu>ύdIWZSe"64ợ8 WM(ԄM 귧 ǑQ*$OޅFG-h8g L>K.|þ4MI V/. 60J0axq5cTj&Z~tK S|&5:`r5xv4 %J]<[vqZ jJ30˲`t|\ǽ/|"JO^3fyT OHOoṐ?ÿfٓ}82+tTUvSE5pGp]18-X`_`ۉuZ|}k1;iִ!ʲk"v*RvP?ۍg63{B_6\YGQ DS=Ar%!LӇ\' ,y%DRquOF8U@VJ_XdPZl'-sA G"$?O.G:dA6R\}5u>3) 9yC&0o)}<[i㾝ҪDjJ9`>QO"!er B`]%U@YHٙJOO0iҕ<ߣ˼/ڀw#{Ɯm 6@>֠FYG' \F'AKIOvrs=/⠱V3 T{!UL) rVH`@la Eˠ:UG.tU-KY!noG]Yj-:qs[SZ 0eJ/Gb6<I9 RH60(\'xAN#rx>@4bWe @6ЙhyM&clOVWڊ^hG v¬8XT7OΪ9αs] ZX F4x<)<(nnuk!Y?}tjʫh%@>eir7XدA۝=*b\[1'6Bfct$a;kGCJ-Z_y=6q]!0Q;05J UG{즴zGbMw{$$ƎD[t ⚥e A]T:1w"aݭw7/ᎢDU! |dQ`5+NyߣAqɚ1iJT%rV9#r:Ia i2UqeHV|򫚪wUP\G,XoA]䇒R]ꓩsZ \ǂGa E^Qxὴv}*uyGדeǬF[KFYHs o{@5oG+PS a$qclBR1Q|JZ@JXK?/ͻIm|Ta< -^يO@^:Z4\BzA6G#ԫvf{3hғ6v8YJ1Y"ۼIߦckc ,$gґE)wSrR&[fܾC$ tf> V!־i [<D:є239:k5|CڼKWvĤ{%ϛi#e%ÄŋY;tN08mZx0)3r^9T__4 l\Nb sAFTF ?xcHGCAQQ~{C>geBuOv0f [> o5H\  ǙQ8jZ>pV Ȅ*lZV~6Tͩ= ԋ Ê偋b a #Nňjw|wu8j݀/?w@YS~Gzf6eL=-xhiB| o @\a-(ǝvlJ'<}kIK-51 w>2&=EzM k{kG4ثOOV4ӶUv/Cs[ ljcOtb:md,Na>Vcj{4fŠp_ /];" |D^pta@C>H/E6"T,rl_`@u!8YenUH}̈[5"z_vw2# _ͺH\uKLTە2Sb!UdYK6(vs1=Q3#sy'S1@*03ILq?),>˃Tw0OUGq#g;Vk,LV[Z:X8 @bQgH_܁hk+PoGMFd`ۯg 1y@NsOZ,<*C1ڃ|T׍Cݠ=XwYNʏSϴ- b\!GV3;+`{'ҷJ=C g!, ,>³)'HGH[cm ɸ5^7S6gj>['#!cv#M\b8z5l =Gş;ot@J}(30i8*[CŻJGt">y8!?U"] #OuX:pM9mH0[G2Ev#:|vw]:SNijB[LrO$rʃע DF1k[6rL@y *]\(-rHu[#%젮JԘu]{SK4Q=BEKC ?*#Q]`00L|g.%Tezj)J 0AB -mSVxKJ99n1+>6$Yy?HFSb ukG1;d51>tߔhɒAl8BE&,6!煋@ f̉7_rL;r;R%L?M<^* 8coɚSt,'M%Ҫ޶Q%r+1|^SJJ#tb$qUƐբtDŽȼ&;QU] xtk1PB{qvk!J|K&hǝG%Dux<z٘LqQтI^Mцe-Iey*M4u]I!rbU "SQ ؠ MڦFyvܒJ\25CdF䨘m= mU3ext-a%aeRuˇkW@ c|ds>?v6lQ*Tic[ElSz,V7tbTMa&po+GDP3B|^ULh8]=ѯ9$WKxl=AWg5|x!fRFDϺ>z^NAe Li׿s|-s'p⺥a.bfv_ɩs.Wf&͝S(糍ŶÕ=?T L_oSM& }<–l3JKH S($G֪A8#P BĚ*JS.9XKy:6G o (ݭy̕ 1_w?J L͆0e&T6EęplΗyP>#zaw@sIpJVE0 K-ِ}4d/_,l.48T#$| -Xt4TX8Lz{v=&F420[t8hqWBAT>ݴp兩eE9sId/_J թ*%)&݊WtѬ"tV$D:"014qU) raйpP鑱VO2jd3kO5g|Irg>|؇LT^~JgŽM5 b>K9%.vR@CV4^P7my,f"uPx r*"xŖ_D" oU+_BjK|n/,' 3L/_Cat }IR!q(pzq1qޖ@鎧)w0ţZKFBDUӒ[Es޻Syd"J[(Z'+TVOpBG[1Ky bU&(gj/l->\oQ;ʊ'ח6됅FE櫎J$L}efem{ŸBkJ:PE-Ra\'.686Y2V{)u \^8J(5MZ o1Φ" bKyb8;~%*c{UcK=+ѸMCD^݉M,/e 7fS7ȏ~4n"9W2=3yHc{Yr |YDJoGD.V#M9l1fDNZ'irP;;lӱ*,*fbF oʱCpۯ؎IJRό7+#r&M3&5. E *q4N=LajYҙ1.yJJ3a;8zY S> eWӨJ{O|(.߉~8dh E/n|nb{Hn5u'GH4ί1m' u`| *1g2):U m+4S@|ϻmoIbX%X'0>`gWK3{i ?Ɔ|DQ_ eګS7m]$_ ިc5,f 8zH)ٰfl5wpkRӀB&x?>JIf?XXsqdqSJ&_B&okyPnT~=\_ܬ29cvNT}J.mد#PWR0\ IcR6+ҏVby7&fc~^wRKR!JnC`g [#鯹 ,?kyޝix׋0#-2ngǸzm{NV?H@<+&FT8P;V^L.cs3׫QhfȲQ-LVd`:.g9/%l'L4%GA'U4QXbʨ5aNW;$za&ߦP罫IvɸMۮ|YVWMz-KRH7|?vSqReN?C2sbD1Џ=#~_Wf]3 iAaSm#\lYE^' )CQyPNJp1]X&GU.ۀOqG+P'u˓(4p60JMV/Mݝݪ]c :n†~2|a i/gZd_T0Yv[*ū20?!p.e(䆏@#k.H8U'd˦w @/="w3 I"a^ mwh!$Ȓ2E_g8ٙճʁfmUW 8ܞw,-r4Ģ͂mNIM^_vBh%r|#;ب$? G@Rɢ-BciD}p'jZ+ Ue?# k[K9hƒױ`RZ y¾e9SUGWɪjǍKC p-Ԃ+6Q+J3`bsFX,gtԮQN=F~2er2`=R-إ ]tWNU@-V|/kbK˾,(i}p漣 9 P"r|h')~#yF1'V_2S )M1ci/Tye:4=$QQ:rMa3aB&*,~bzO!sAܛyG#m>-Ӿ$c 'r'=rT^d& V2TK$9IAtKeU:h-QY3>7F=_ eKRd\b_}6DEo)E]a"9մF[ ,LוNfa'kۨN@7$p[q'$ 2&+チ܉jV+."(]*YX.]-}٩+ign̗zչ[f}=O+H3<=o3 &C4wT{e Q̥s*Eox20IkGQ; qi s6ZBbX,ZRt|"xe4KX/EEϙ 2O"eBbZGXd)W^Kɖ})UIeiў]ziϔ2I/Zv.l@ITMg܍H7_h1ӍI6^V`nm?'Hvw z#c,+=s`$L$Ff&♏9 ـu|=# ȣ-ߗ zpp=<ᜑ;A!_ oN=se<.=TTy~ָ'c`s_bgo |oDZ~y3D 왳f| K6`%ׯZU:e;doOw _hj@%`_Ė#-iy4i1%1|iF䝡~HĔh@Ӌ PlM.<]0tPы<0!-/cH uA0"7tԫ)B(^icÑ]q5 FT${c|)A'J{?9r-ݐN{7.MyTaZͤA³ro-rm̀ '?.8kv]ʋ!)ȋCKϡmv͢hYK@ܞXu*ֻ v'MULF1n}Suôd8Y7\ڈx@dبVкt6pO5XaCϘ]d'gsS;+a%.KLG՝(,{u1Gcf9e"f}'—%Ʉ;#Uv#6~=V\N:O'yػ䷩6rY^ݣY"Y ռqm*DweL\X)֪ _&Mb w;"52zΈ].`I@ &$M?8VfK&CaHj8_J@ #Z2|ɪ.~A'j{`\ "57/J޲N;Ǥ 3q ؎NO=홟3(Qe`fn_ODxM,vZ4DZX.@\i߃P<p[/ iʎ- &[B6tɨzِ/ t +|ΚuqbFvSVhgЌ8V1%!pƵf?Y'6fPM ۝n1G=Lpja0[ fQzHM]O ;ԉqqhV&@,aᱲn7SIR 6?lӞज&٬KvaH5Xyף)4i ;In.B? qұY{zN_P-cTs$7l=^&'/x]L(beڍ7*].Dñײ<@ ~&2CQk2k pZ.99>NjN@ ʴXȶMp'&Spk0X]Cv fD[Io˲مm%)$xXF@ 'KLK`PtK0Ѐ4A>Ӕ%cYu=qf_ ٔŔ'vkQk)^GQ]MxRF4iC[xCm `uk*8C:BIJK0Ade2㑃D6aqcc*7Ti%E2᧡1#'gkfm&<XRJZt]9<6{,S򩻼nkSHRޙ;t6h*HU8"IzJUBP/'u>! E7[JX ? u5 u3JMQ\cq]9Y->q'$u9,1@V,\Lȋ1G~1k6{Y(2vl]~z5P6;wi+DɎl\A:Cq]T4lu?wY[9|L|b7{93Ji:1Z1) Wkҝ*Ps5^K۔VPRӉ$F 3mlz7]s'p3v4 "EКUprFjelw- 7wI, r,j m4TMupUmp5>fEKɱ.y,^n|k\A)|E!e,Ȁ=*!b+_J,yN\<#) u1΢)Q?gCcyX+ ՔK_EDZ6RC&M1pIA* Nݙ c@qx)F^GE&DX]X85''+_mRZ]Y;7d ihT ^TlQUbִ >{R7:ˤ=kQNFy<`@XG9:?OwX;O0u)UC'%\$|vs;2eR=Q/>9+%/@uhǓbmaAdwap#1Ʀ??HS:"_BP9"W`\gA6ZY0X+m1H4Q'+4KS~g<5iF,S@ǽ% ۗh"ZI@pLrp_cb$7!s$oIiM3,Cr/"|-ث%|Wg[ 8ƕ$2ߐ/vq߽i-}fG/?% sqعNuw2ymg䳔8"UDcIѧGHQ0c5=߉%,;ByzMRG_!Sx9cUP:,O XfVȦG#2staUqQv=,IGJk h8n(EAFSXOE}heA+_%!Wu0zs(4IЁv8ۍ5gz>0 Oq'^g!L@hW&[V)~lR)(YuoaL^%47,+d …28FQо*}%1-@WIU75TSoE8YV4xIIE< ǒ6V9nm<oSE) (A0d|sEkJjw2E\Z}Px{l70vZ;S8I 'UbXNtEMnŐ —97<6%Xwշ4~uKwk)$EU9iV7B-2l'&d۔[ ӿ`9r->=Y%։PTCX B"UqP?f^P0K֏*U~,!cBY|^F6% aRyO lϼn],ΘҦSVqhky5f}Ւc-FxmFPpB/PF9 s8ԫ -DM]2αHP!S 윔r ' K~IRT1EH!p滪@ji@ӽ/LQeMw $"$#Ap}$ ;ơFW3%}k}̰Ķĝ${9>΢-v|QPLhkw1q45,WU/x]hqQ6x"zHj(uj(1:͉/|Thzh#,) Vu>ZnwBTk;PV8Jz8j[@=x.%= lePc`"\IE(Fޘ_2;l2Ø|j' g;$ 2oJ_Q~2?̱\hॱ|c}I8㩋?"i" <:iw; ^؉@љ\o voð!3oļP ؿ,lG5aE4{ hQxqr (T =Ȉ7L3abAK3ܲh~s! 2F~O(9S4dD R%[-RrjGH/7I됲OQ4wCkNBG%-_pGhu. ѷkV< gwq᪵ӵ!> }MEg}A/VHV:Yrxl(rݑ"':@;\yb{<9Kњ?D^'{dHݷY?!kJTϾ|f!M =q5 .$\iT\ά =f2ci;#!eY`?+ ՜h}:?[$^ـ}8Zy0Urw8bmW fL;Z(ԢVں UqS 65; H0%]6Y a@u<&` |^jQ= kIȑyp\y&TC(&$V5݇A24MON?*Vlm 8,*UT_$*ˎGubWQ>LH(YOjAK̅C$ݬ+*i@ɍ;2 #Ssb0{`7٦NppykG"O)vjw~FM^+ytk]@z`ȆVlk*QRMdg|=$SpDBg|;P0}suz*:EŶm*X[)~rQORY|78@Pt ZZU'd7jE6(+KYA"M- c eiͳ9<4(⛥.G .4O\W)4ZԞP/?=U]^tUSܜ5^͝xI;x9QmAx:0[ <~e{M8e/-ݙE|-gqWdg[[M?K;I}by/ oפrlE^\L O^5?K(톸hnt6:6Qb=E&$ם?&O("Btb#r?(olv]栰hyA<o\Jmۼ.ق!6R2Qs19ZYvaʀWbBqҟxs Ġ?|M V8呓(qXWxx e h>Rg/Bf%7t?ެQ-rhl!gsA96?V\` 1j+ [YZAMSAK((u菀WK[,1GE; !%OcwaPSl411Ut[,^Uu[w#/qx_ob ھXQ7Z5b]S`w>q|rmjֻO%zp[CYjh[q]",k B|n\8Mw?8 +ŞAGj5g;CŵN\",9Dq𧚵[^J>/"˝J^kQN1*]gJKJ"m_# bK T~e,2 :ݜnʷX@|AJom?ImK-V3n$:ΝIJuUyk 98? 4D)KFh^➴^QNN8OSTjVd|!}ki}Y UyQPC(=k7|GO7KXEC$U% 0 43QAYkKnO pMxQ[Evč(q s}QOMΖ%R: tǥEZx8ڮq2~/87" ש͟8FC+,Q8KM089(GS3l_"ƪٺ$/ҍ dfCzh6=U ˗?Q({Yl \i\C1pya720ҁ|\OO+(\iKYdjG/ʌw\ D_CO*R Pׁ}[܅ x NDW?*|XvӉK2NhQ%2% vg}cCnCA`7WIrh \;%">hL}J3l`aXz/Ȱv炕=#]$) k.vY-Z;*Z!7V7E8'm]1DK.UYRҚ`EvpٹbKuYBi Mf6&IoOg]RFki}F0vR -b^&536沕>c qѡ` imi<e:\ZၪxxilN r&i(y,]ճs"4JugI߯&sظ5e)Z:aXf-Ԁ*'YÁrMoMt2ޔXrIp2F'EC̲srr: ?VQ”WiN RiPy`B}YY1w8^pY'r + XrtlC}Q}SOA m;i$IP'g`\ڜ+%JJ| vc#/F1qőaA&y$Is]>:+X'e឵uf*W`7 7bRY`h[iͺJ}4;l{dG{,Gzgb=D-Q~_l}!@ Okˌot(袡MPqn>@k ZCPh_8E(ҙБ_x8cdM7{ϝĮG v?DILh`.K᧗ʬ{vx_j;E)h9/)q7waѩwH:= :hk: 7j\ѣ&{^C *Vv`',S/!-L_i{"_E!"?j.܇%^HSIu:G"3ҤJ-ژ4U:J5ӗD6m)&UDG,6SKQ"@A%ؗ35Іpi@8$.*`^*ĜY V"WH4®P{R|Ğ)+ mpȰsڒ\ʛKƩEHBYrʄlW5 ~M;Y07Zqά۽g}u$({ :XWȗ~^y@6fGcO-xE.V%ۧL`w,2rrNAjx|,o*fyΪr𶳮lA L,Z Ĩh4#l/Fx{t &A˸lP(eFj}q*ߺ阵/*}Z$~6u";Ʀ FVCol5@!?蘓xϱmz+T\ Z$G#50(%p*` i".ix<֊f{e81$G*u=Q0W\:  W,M0^58Ok3 vXVY%^fB&0R#䙕-7x][DDTTC~Υx2hUm\m%l u :805 Jnц7HL-0vjUj]0r ʟow(YS

!%wn/֋IIB *H^*R+X;V0bl+ E[gxͣ9EoxtFK.K5ⴳ>r/5mK!OQlg5sj }yt}@.~9/WG'&5=@q +/";R{c:B+<%)v -7}ZϝA$>5k⣳W/&=H ,dp Z.,vhˑKg\^Rytca+5KwOؽX0xu;Hr+٦nntk[18 (<D&ZnqhRp{TS ڝk.腾4$=OZsl\xj7N]Kϖ:88%oX\t/R^y^uh=emO系OGи;'V0<ܦP'ƽG&qty@ aCގ@K =;an:,Ůy,QdA3 @mjcI#{KXjS>9\:^l)G?}-_`܁-n j)WfaS+093qH(\V 4NqJf|Pc"h>'lkܧ X}y'**td&~uSDFY,YJB4E!kf*7gS0z* s33ap52F$Roa8fC3qcx]I6޼!+ul"q'a^tC2AƮH,Fdf|%eH/ F99!eeԛw!n=̉ Po8UKNA`U{aS Ȫx6lKrƼ9>z.8t=8hS;n uVJ@륤iqHʢڏu01ZܶAR뚮u 1a%n`gAA 9N .3_=̀r2L.XޔS9Ip0Tf}Tj?/Aͷ ՄמJU {P@`U,2͈A|dV$Q|-rڟ"5ȷۉKjh]/q!@x{Q7uB#R4/OZrY8:*hn'ΘOfث@f퀷.B*M񰰤D'"uF yµ2J('Vb<%4m9Gar8U]-Od7+8Չ]Z2s0L _v!vT'r)FM.+Vc &5qYr: w6 -{а3g\s es(D /["į}W߸behjN+ݷ!Wj-,iCpzwkY25ۓc7Ҽ{($0P9%7Hr/5KⱉBڵ;iBAA(`^;SWuO@7fMDKh3:/{n y8e{K1<99]0o4ΔE8"6_7m/~HyKp_PwOA0WGͪ9J2V/3ԑש*iyo4 t".!ƨ©b~8gs2b׉c}DX<+8ԇ ?wЍZ 0BhڴڡPaI?;1'+fjFf;uY\s733*sgՉK|uT @AD ̉C qQ1ZX(Ak9][]$agE(02_ PruՅ_ZMӜԧajNz+rOSaT7W^J&]ÄXǀb 8kdl0JAnƨ*;NׅӰeϯmOZZ I/.m1kwo]kڵ!DN^{K)NJ: wh!JZI]bdI(t) =x߅ XMrX6[t 5ՅtbCmqHڷHԯ>[V6< yH~K(p J6gϣ/k~fBڶ!Z0}h/K#ҌZv"!tLIe@:bXg@` Sa< h6PS;Q"(-og^leMY~TPR3Ml925vkdgJ` 翃_'A&ƫ"(28jvNrqk o1Kc`Y&rXUVf\VIiV i97W0P>UHh!B$2_#x$E&RP%gO=9I^h7;gEa,JwǁJYŚܿ}"7\QGBVk8nq.bH#$("é:¨P xvL kn#]%֋2 I봳iC%'"23 ֵ5OݮQ g&'Wwt@,va2W-S`yԑ >:{bW0 19g:j).K.%4wx j }k6.xmaDȕUWIBD3Gʆ<)R 0Bb|b4`[r(H.eq[Z]SX|y|gֹku^?UN`O4trtb&t9vD`M6޹331L!k5p[nOg,6W_bPm'3JGAm'"lf.P\  d4ֱ ]]1dž+dC$AjPB]Q?& GXA-oD3E ڣƨ#:>L=fQƽ;}ul0);Fy5;W> hA&BKޖLωh'ȗ;n9娵/N1+98l`H(NzYAPeRث;u`VF9#cƑv6G3aˆQ5Kw W$%WKWY^g'SJV,; tK fOFaᠬJUzB{a~i > \'$B/_6f/FvS1 J `j-ytPHEE@YMܸsin!^G}i PSsmᾚPݛr }"[EKTƹ>ɥ!u-P1ܫԝ拯P#ӞTlfkR֖,%tciTdm^Ŷ4Ξc)ioԔD:is5~Qag 끽l @k-'Z7'*C>+4Jl^P%5֠cV s4qVy"-P%QDAXCLȩny5ʤ袂i3-;EGV ŏlՄٯh=;8DQ]d!/hqg}¥?)-ԣ*?E@!,QӲNNk#hdXRx׵t(#YEhwlh0KpiRrwvJ/i&e89w Yqcqj:LW ּ..h2@q]]|`E /KT6qq̸hoMھi3xyYO|\*Zr2*/h1*O Q%Qӷn7 _Vyg+ B6rXC1^ i#$\4fZ..qi \:W),N<@†\C] Ov&1?^ibLt2dJaۓ-;:L?r?r'O:-ECљwjT]2HOE&61qZ qn)NۃٺچaVWZf0 }s#Ge}7\2[Uw2fyUvM#T;ti="J*4a.uUz:'Q Omd,j\X}e\7j/M8wfS5qMKi,z, vA5Bx%~T!yg׍X45&k09I.FZJ,z/ҙP_n< Iok0!YsFxa89aO=k!!=2Nw6> U,_ւv+ 0/i`F#06J^k\*b)-FAj Z6@H}Aah2UC@WADr#4J IӦ\ͬvf1RQ,6{ؒQ e#/wL<> {nmСj \CFg/i88a_S#J3PTB#G3T~wx/jN\,-_%RyKRci͡Xͺ+ `tKt" VS-"l2RE<#>;05+sXNŌ CۛLTIV>Oe9!Yi:?=Zq6g<<Jil)³.2v>L@mɎb+;p( { 74`8]Z} j=z-Iwh" aLӅ:WIEʛu% RP3"d č>oVkzn2 {?rtrMWJU ֊[{2dVAaNWrRes;9N\;x,;#CbMs2RvWUAHUnxEs!Wsj~Nx1@`tz8Uz)鶴Y.0;x8 Y}Rk -i 뾀]|zf~T1_uN R~}j`OI7X)+.f5vbzl΁{❛"3A&ϓ<'^ܰ enO ^NDŲ/lJҳ{eHk^*f5wW弓T1g|Bk"or#I|=aqx1Ib~ wiK_aZ c5DI0s_$=N rw$ڵ v[錟XTV:JkEs\H&:)<`Y)8XB|[o##$}Yͦ^}":PF \+V&g}`؁`/$E Ofӕ$/}w!t55nXΏ:r+eM!? NE11ce;^+|4Q[}O_ԠoCcT#`xݛo] lՕR UIMWchOƕه$Q)f"DW)8c^mR}r싂SLޭiB}IPAUF8OC8a$8 :jg`u\Fܹ^i:ddXcV/Kwj+)vglݿB*ctue`ex@?Yo^/N6UT`dU8Y=s nXGzU!0-ϴ=9],+_Ҳ 4U4xO;(Y4jEppbSA~z{,K nMk lIRx4Q} JD@{\[o1-i3όcg{ 077Y Wg\|mϸ/c-Y=P)3-,NBnLh<'MuToᚱLq֥pwBz kQO݃m^W"[ 䱽TIV!dbqrljR%{xO ˛1Qg8haC[ژ<|]|v?Sĩ$9Jb.s"2V\)-cwc1!S5LjVc:o6 zPYC0[Yfp2BW~# ӄY(ds>| nLE2=ɤT0F ϳP[pp+ 9p-azOF&F3o8OdcY9xqT呫*0Yp,RFv$@<կnç[*Evԕjzh|z} ɕoP(á1 / Lqm omѮOv~2*O/bõ< g9GGBVr5* .%5OL S;$++%Rԁ~KnTGVYUCFңZ3P"lckuLr"~#8pAV2xe-!`(&EgXL-;(-,\֩,׬c. S4YWaT1p# :Y '^=чLl,R6ښcs], $lfK脿C- !ERq{[O-ػ ;aipZHYr^1R@l6KP:g#gmJptg252?Y4_FoonTE^JTGxVqcHvjC8uw.&Vq5_]G7$ٖ,mfeŐ.'6`c@Z tܳi}EJn}=E)Zbu+%zv毻{bJڝ>jwOO^zyTK,H׉dut:׾BΧf0|e7)S5##TmW\چ^c\`s$m0 \^$n`Ơy%JPQH;MsnYӇVJ+ʟ_drF!E\ˮ1 HV|vvG -Kw/L_l[ ;k5ͭ A0.>j~%3'ڸN$eywJ(-6nJUfTz*nPCN_56$w(3mxbJk QMbGcǎcaHQ_& 4Wgk!ARu,]zg.q k94`@jZѺlK(]cp'BLp;s*D&U~ a$n0C\\7v3X?.p+i{8=={YJ^8H'O1Hd}|KZv8:XvR>@ bE螼ht'wNS ,cvLϓt\W=oڐ|RzYHL$olu^ّJЅ k_Ʋ5i Խ!V"TZ65wNi[޸EcWXEt FZVQ{&P@^A޾YNu+3=OA4KBԯ%ctᨏNp.֧45؊ʍZIWouߴmIh6S.wd7؟ Y5|)s4d6$׌6UJLPP;LIapPjYb*FOiPAyeӯ-_sq ?/g>XV Z7ݗ!CIї+vV!GQyXCRJ:TpPze8lA9K&!/v};MS؊@ IQ6 ђ',sxvϒ=A(~+5Ck=ʫ_"~Io~(9CF9puAN"+0SF-@_mg1w YW c>Qծ"brVb flw޶\~L5= mNF 4R9 y40,eGhR< !`26䲇n$0@=Ru|LT:oX#b׬\h0MHL&ضJT@N ] Ҹi<Ű J"`>?itǿi6 ]F߀jɽ"K>hUѫq f+_XIs৻@V*(8 Ǘ+bז0/$6T=o[_Uʐ/ftCavOvY$ BW+pRVJ|5D%fr'lj>#XR'oYO~OfDWi‡Y"cD *bn9}{g:\ޛ&4?Tc=()_$]Ci 9Gد WXqAL2jU-7y~z̪RJEt:޶8u_ǥp/?2; A)!kۺ,X}_X5p;:DΛ 5y2'0(̀VҐb*T4QΖjH>OD,˜G`,]Hzw9Dj]݊DGRAEoZnړsCX3PIWGB%!3_YJ20tO$3*`|h#0V*M="6JN)\=F:I$SZ). q+!6w(Pǐ_4%`TgOɖDDvh}NpW8= EȌv`"'-7;}T"l7D~SGCGl3ʢo&>8#I]7թ+;jO;=1@‘/ 5fԼER+p"!.rT([B2"hI}ȹξ_ /Ds*֭>bE.Dad*EƶCbm< 6\zooLьl]ߕ!;%w7 :"S /I9 c_,g\BscpȲ~؇// ncg;oJƁY5X2( Mȏ7@1N }At1$_W1!d=QXxSi¹ٓxQ@Eo&eܽ+!=zn2YSZTWʎm,W=:Yjj-368R!{ PYei[ipVi6>TJ?.qfHYC(23*O lD>N3>DcytJ8cvnuWAjoK%~ շ@#TZHg/@S[ʕ1?OYMhfYeh+',/XySG%E( HaGK XA~eтleܩW+_#_ӫSajH/Iu,ȔߎFhAX@MP,X{j6I0jfd$tKsyM̌ !Y{?+ioy% zpΈp$JQRyYO7[^$4ADCa^B8=.s{KOڻtj)1 7Fh]6-Y/vHlYrjء 8V hxPC8g$X,,]Fko|k2O,sPܖqqmnW/Z!{q:qI|\V֏ [^cuiC>,SKc󋗾<[Ϥ2x܄|ebѽG=*J&6abRCӤx*tH֖@Z2HA{g˧ëJ ׃mJ!e 0lN:6ZPoSC(M1eq_c3Q1ϡH[%8d(B5 BeNB*ݜ i Ttnx+Dg سI^#E^9I˙Jo^kcoF1sb^C|7a]vLXxxYyHu/Ϊjcx 3S)&ujUXVl)̣_Lr OxˎjjKk@]:\R-D/L_GWeI "eobk[1KJy,G:`Wr޽[kt1}k 6s !tAa6uU *"z]|n |b1R>wV:H#NBnFZsYc.+[MO`9%սJ,)cw.arg9݂7ˆXF{4[:!sBnKKTLp?`׹˜67P}.SےT(d)G)ljn0L%;4C^rPw&HNlJ_4-ת"L pg g|pYPOaj CĐ#M.K Ւޑ;jT͆0:NAnRI. B.vv필t 2U߿h *Z–}aFb;*/)e(f`AV(ވ\@Ӹpr%XDP gKtgne8 4 t $c_u3K9Jt{w|5h4tvE,jU_>QOYA sW֧cȃhSXA5, '|i'aC X-0nҕKw>Ê$f|`0+Qx3U=k l TwxpEӵf={?LēH闛vE"Oju`fx]CEZ^VϚiu[>}fM6SYkQpy\ڮa΂|-[P}Vl2tՌa/~YբpL43c!4z:wnq 3ܾ2ePS[ "mxW(~C]-X>;xiw$=%h0.*n96.1,Yo<|:x1ѿ4Lݕ1[z477?H[ 0J[K d|qm-\ Pل(Jv˭=& ǽ{f5 T2ӆURn{y-M2I ma_o#}|vv5ٴߖ`ZJ%\xA|{@[iÌĴ\ mwqwh$sN0%[. b*5hhZyЦb=SSz6ze'ۅ·6g'1Q>o ~d79h*S"%V!RmF6 on;MmrG^( n31 r A:XM ^atNF"QI9>}ǁxSDNQأia̻5=,16.=o},=W2EjLN+:jn EK-2>W}[% %3 %c л_7EkE$Ya}!Cp9;x"O 7%q18nzMj3r0'gVKM70Tǚ%Y4s8bgWw:`+_btSD$jRV_iv" :u^D 9?0#o~\S.9Yk[ L=GT{@;I)n5,@_iWH]=HF~ׇKh^^=oM@IG0@ [ oF;=Ww`vay|ךr-:dMOM H]sbB,SXtx<~LGQYaHC-,,&{ʭQf=350 *=wxq꣛׉y }n06!CPx2K)XR,#ݎ2aGFJNg%jl&%*L` -W*-@!Q|NH-ٷv&r6zsX/埵u9+'rbcu0u84~]g нgP}TDSE`I^bXxLj?Yt0&UK$GOݲ74.Q*%5ՓD湹In@CO&N%ps*#G'j= 7 ? G^SI/ˊOZ7|ջHpnw }HsXwRoή.cOR):,sq8}i\xҵ2TL{\+[soJ>2{1 ͸IB^ MDz,~aRoHetx{(,߲Tڣ|KD,jwReC^mdԤVNbNSG?3 Wfa0|@GVkQɇgT e{wPzP4+} ?יAOIQ'$w :*uqI "YxgI= 1BK}۠U>u9K&J#&V,C#XH%l$%З"K„ azڿF];m. 0Gzۂ,K O i5E7d:`sg qK:fvcj:Y"Z /Ӳ4(CQg棨ch0wÑYXT9py9hPVCr甹8z[ S#i%rmBExΦ)]eFȆ;},]Æ9>7[s5Rm6-{\Ny_yL 4e%=-[Tg =NNbn ЋoQPh5oh8c**^?<\.'1sDvryFQ O2qPGJOlȣK@C GsVElpqV-I?|dÌw>ą/n!'s;MaMP2}| $Fx .u-3oKZ><5Q,y~xU2VPeB}k*Vk QroO__`T4;c^O|#N=$ϿX'@Mna(Lk2c.o~k6uzd_GzS ^!V0 yDnY~hIà;.)˄;bwmX |ƙm}i%-T(bFa'1SzfQix,SFmٜգ5)N?;淤$yvG8;: FuŠ[@" L`j6 ʉeg.גTŻH-o2~F HeoZUn: iFЮW {fr4$TL%SIN|2wJV=QjPy"{zqE"k_^־@֟I73{tQvT>3\8ymڃxrtiOoȊ;AW.rݎoU+-{Xgͮ3{:iYL\]׫MuYBtrdK@b}~Nn!(Ttg Y:uzƶvX@F$;ˊO,^sZ֬>w+iL@m²0}i$6\% [Nw󁚡z:3ClO_VƮeG4ՆW+8JY8z/.1t;y].<M0pXl6P ɭ@uCdqU$R@^jKUyެW*a>!Z\L6{ۚ)w:7&'z»3wiltPӶiQqQ3-6H D{$Y(Ѿ w3NXNWp5AK^`GJRcM-J\ \aab[W_yNa,0Cfd',KGFB,^;>00FS"m>' u *tɧ/08yͥXhlb~Ǜ@V=>ۺdV!!PHUf97NPI#՛MԵ ˒NӲaSP/ Kc0混<̰P5flR늬—+е|>A1"\\ALf*|@+ YU% ZJvhXkDFDD'sF侊oƔ!,ɘi p \/ܫ˝`zAB+JHt:rߓSy)w._hGB;Sry Z @m&[./ȏL(G` Q! U ecj"$~6qW"xO_qǼQH&kEꔪMeʪi55:Vn QIps!x\s7| y}&`~BkJڏ@OIyXԖos|~ ϕW8z)M@if<.%  K-[D[?JqQ 7"d)f8ʏhZjx|6aޚwSSvH#fܲb K[9F{ir u=4@83;I7(45 YgIARZbr+MC 7QY2wMx^ԢdUۨmbT r ssXCvǾ, h1t Y6|Z8R-OQ]$=*V-%<0kۃ\SaP':gu_B~deup#ڢKɣKLFf<k Ox->y߼=OXgh%$)Hlִ6?S#?'·gPV~ސ%_r*ֿcu QvImҕ$ XmBfћXo!*\ט_|ABr۽"0]b'89P6{) 3O7G|;Т(.5ȣLAx%t=Ԥ?~_{C۫ XJ[Gh"7u1ݥ*t OA 8Wǭ*f uPpbWt9~ cK؋ ' 1tBGxpu e'h.@?AT%6KE+?!^8G1VP]xֶW:^;IR0x!Kҙk7oj3 1+q@4sl=3e"j氵/7&PWBxqAg ys J}B@:z.Di IZ=% q xaJYwK`ylh]gW!gehzOk^#1 ]?_T" 5/gu)J){5n4qdNs޹bގN"U {oL C䷍v.onBĝ*C/X%XPAa@lJt+ZhN޵%Rs`g$!-9̛Pp9'hX_IW==Dvi= UvWuCDXt+DjrsvX 0 ?R(̳;נ Qz {6{DCg Pl҄qIr>1:~ɶ$ZuS7Uo\Z8)-yqJ]ċ/| C~H՗ߕjK,t#LGzauP?ާ.ޕBw۷R.Qܯqi 6|iH啒>dBWPh DO$|i-;m)9>3T3I£ QQf iZm4aͰ侲| $86$VDqжu>22p4#>0ob{\,Ќ!=Ž.=o\q {i!$DJs$0%>3=~R3v[ jIz O9+2] %TLTP~=-+RֹGզ!3OJEd}9ȵxpjӠs+B?Q՘_YFB%ptѓ\\#Ϝ6~k- !`e"^ leF3G1Z9ĞzZg͈q}hjzpt̯cj4/R]顮m=,|Ї#eGl 6LxS,5(^$T"l̍%,1'ьbZL{QU,ƌ4b*?s-k44sx5W,<&ޯr1]9$Sp7Sy1+8r=E$uW7{K9o'qG2tM2Y/P=MƉԕw:@Z녻ț=n_yɛi+ /ӼEJM_dd֒}p$DŽ,F |Gv/b=dFE=8 ׌I_i7%z1`{E^Wِi2pFet7!6]p7aF%=yL(wj( yesϾuޯe{lo~'9:RE)r޲aj<5 BTobi5j1O=;b¨EeECx= -W|s6^g_?GZt2YY ڙFc1/CZ%HpcAH tuIiA[s -2ͷ^MRNOG7(XaF3v0Q^Y"cڻJ=Yl)P$yu\`O%>KC'7kp29|弒^bJ΃çu'T@`٬^&1SmW3Ֆ{\2D̓4MiVn+|m@{gPc!+I¥(KoRo}R@uJ2ςXAz`Oݩ$_لyp` G`vh|++NSWqPaV(05ùTy=&a1zqիD48˱`xNwcv/k*܎\/-&f9- ]t6;qLa{m-Y^FrJ.K"?_N ķkګ̸?d>hDfvv񀡏l{-RM֜Iåbu=&Q커u j6/0< &~l 0~Ԫa"s),orW 9h%$H08`9h޼:`s $;'kS$\^$!U],ػ. EGjU9\\to`#ַܶ, %P4X6?hmfrt4DJQ^u.٘U12ٖIn(ϫγTid։`d3v*}*\a6!fKO3m?:`^rDo[e$Œcί l[8$4 8.Ar$&hJR{\@Zbut԰YBM(4!c [Ty/j_0j^U[epjPⳟSt&b,wu^fZx\@ӹxiuɔ<88r,E@OS0"M/-IhT Ԯ x@7ldE| \ Й#;eh^1u@PBjAܾq૚!ttI3ph=x!}_fi0H[PϐAOஏ .W`?݈Hm.}*on y^[O“Zb^9ld 6(MhՎ/>Y{JYT%a|آZh "Ug?1y8DbPd޿3əNHζ,%SHX\+[ ۧ敜D,^um$>'i6/Fev*;pFs^dicLqs24WR!E,};In?6Lٜ/وY;p jϦE{:ThI]jQ\I ?w8r!~sܢ3x8yC̩%UK'瀡J8#0 /gʞJ}R "b#%gKhO>urwpR դihf)ا9Z'~vkͯХ ic1Fxʪ,}r EL%I2H5h|^띦0#J>O9"G6#ր]QKq+L Z]GQ"pѳ5c2F$oPC1uiݵL$h$t*uoT(4Mn13ōk=zŔ@dl4^)6]-7WO,3i30,/_cDpTc}WUc8Mr* VBB!q w`1w)^&|L[5N˜l)aU/̊pA ےCrS+?%9ϩBT'0 -A\:B!dcۤI=T?¼_"AM>99O795N,!^-I2^g?T1/`k^εyzDN1j|r8کg1o9 j뱓$gڪG8hBh7v~*F2aٝR͛f~P.RyB @I8(4$3z|jsȸWk /Eľ%<"Z!E"PXiba(U|و.dVbB^1:u*x"M<3 C0oαX+% `>ރp 1xiL>DsT;ۯUDL7Іxy[ Ed^|6rR:^.|iKH8ʾA^Z@`c,52sr`d5/vQ:%pnr(_XvTܯYUGP+%x}y.AċU%2߫q;VX,AGUDDSj7=È$MϷky{Rck_>"ƓF gbw1Pko.hc>{ºؖ;`E ?zC Ji1.4=#Wo_`>6nc l]JAab'F(nm~xYD tnR+^-q(yBa"+7c߼r>-GCvkNmta<_K\ a77)3]dL^5d &sӕVWfv('[Ѡ9~A5"("8~21@C~[nK4:X3վ8MPGbSC@MY|f_i7OGx_G;d,j_neӂ?s#i5LJV'NZ=b0"}8ш,pс0pm gJPr1SD?Z0?*ժ^E8^&:$6l!kyy$*AR[qQcA!|fV&9poZC+aUK΢yȶez]s.h^~ zs~ 9cQO|,W$8owާWP9R4 *Tn : e51W5JkžX_^=ztsqfn~'p R X;jAK! Ъ^"]7As=ʰU`.cbdY뛫 Xx`RI غټI;n5΁;.=;P[tI2wokI+;nlbZuI^:1 zx.n4u$|0T`ɽuݧ=#Ux1$y4V[0, q%3 sX CfhU6C# ]@nR(gN``ɆzlT+'Ŝ0:&woVjt7 <~V|/4b->&S@ncY)?VC~Sjv49m)yN FbM>WKv0,6U̮iU 9ȴ[횄3n\ftש$\j$/!.,td) 7/umT%fft*hyqQP!󎬣ѐE% Y$wY ?aA[3Br_IIy !W47FN "cnnb(<Ɏ_,~TJ8.UMym'NHO8@ ȘBFrfon ~>ါz09Fuݓ{2jô.ccxOwLB,yF{^2ZRalgݵ'g )-sJA(Go2/48!N1<^TKS`($J:L?\@qNؓe$Vk -{"ؤb7)A4|ʍ0Zװ/ky/:8D LqǾPCڱ4Ά4 d'/u1_ !=|7\cBSΓi.`*WcnYVÉз6ւﰛvFJs:|~zpn܉؅{t 2';s_a߰^0% cV嫣#tڗtۯ' 0]Tg28Dr=X_:Wm1;=y';Huʋ\p"mcQ)*VS[ؙ.G6wnTL봛SA+6ӇʛqC+-բJ(asƊIYԍQUI@$>43}7~;Q$XJ:0(4;%y62!ug5 [.r8 )=km1yᕊ PUTN^^6Sw iusIg^c[r } зNmV/W.9ܟ9efI qJb9Y }> ]gS6ge}qFPcrگh:NE;g=vC͡/'ȀNU^=?![PV>a `^4v穑swBWN~?[<+B<{ir)Z{VX-5+^3E+%`/-uij#5-)kqYf1`+^i$ mK=A) mc@=Q/@vij X/)`OCu0HzY!RE.[&/g0- */%eA]aZ8xCYS:α*&ަ$]&āUFHxa;8&[o0x%YDZnIrͦ(cSn N~zN\ZoT@#E6ZR?Ѥƪ=9w ]xâD@Yn GzPޔ|5lYG_b_m,TxPi}?i=2D{+^„!XmOΫRѶ YmEtY m }LAeGvp\ 3%.\+gz{ s]l.6Ul/T5dF28uU1UMPb"{9+oߊ Ghf3rw]t^X'B5 ^?7%ke *<|fL>upfm8ʠ أluLJC#8пu/ %!w YukkUZLl%fL!,غ!Y|?NIJR`A]>pef:?1A+Gsm-B(pl&ȥi!ЙK2eTUZ50gI$ & 22Y`,I(o 8cs p\ صB"ws%ofگ aŦM˦K4pn|;kUJ?UE#3VV!^KFX~,fsTEkj ̑dLVa. y^BV܄es2|^̡#(ÎTQ*scղII"'7H+<ѰG'=]qx |p~ @G.O7ZiL kDsf#h I69C T[cUD" Kq1v;q,֮?KV[I!F2Qz!< GE5Xno`A b%ޓ`IzL71iތF-eCNh*MQG 'N:@ Gݩr#>FعFW%qwy{KWobuKoHz̾}_u@븢?s;M.!'vANFR<m2V]^xO8i"l%QC O/yFu?x5X o=,nW?72'jW>nTh[-8P2v] )(; N=\8KkhL;.Uk7#J5MٚqpMd ai&H ̳Ib34M6 FI'lb~)[/l)H5 $':{uX~QO)[g߿8av8Y n8ȇyrBOÏ H(4_. XiQrA]HQeqdt[!OLڇ#y`gn]b@)閤]JEBŝnss̔ Z2,A]"H,A _춥loE1 :GjLlkolPO8JYQX\6x&ކ|<=TY% 4W}' 8ĝ]ǚ{9b۩ݮ{5($*gXsjXc>D=d\3JlktKdxXL7`jڳ2_#mS-fYS,  aKZZ[XGŪ^N,:hսw44J>$NtSy 6?}`\#hftJpȗWg0qE̲ĥZ3LQ'٭J!]|h)q 9jV0H!vyw70ʁ]wBݒ>1kF$P26+fDK+.cbcZHj*,K-K)Eb,+c0| DK:=tWzwoKX:&ޥh=~ 8pvg+Al* Ct' LAwHL uHnl܌DS/Hi=:(-tw$ؽ"BqǽF/6{b0QhGF^^?,NK9HYTsԆ qv6tId]OɃurQ JQΏ ]_P%s%"d1LR.uĽ3X͇}483٬@~TbG>u5hbKS=7Fm{mol}(FYÏh@AG!C+C 37X5>5S6L5'*k ~Ƞ=wSĿS1aK _ G~7uOScy7 6?R04J/x z` ,w7?._Tu\5}MY$ml;{p #\V?)NjWન]{t3IrbŽpMrxV3+V@UÐc^yX~Rx` w %b"a`YXUiQyrS[L,B;)hQiUV&IEY@eEqT>0-nȲ?*\X c~M=KXmY\Q x"1mMh24f,Q q߸-|Z:@|`5hms:ӹo}̕J]$ h~.ؼd?eā'VmA+%lDoNƒlBF0s(A\ѭǖc0id69]XYn`?F@xT-5;ڎ:se:EMO2ylO=P0ly