selinux-policy-minimum-3.9.16-52.fc15$> QZ?}?md  ( Dtx GL^ ^ ^ <^ ^ m^ n^th^{>^<^ ,  TX_(`8h*9*:=t*=>G$^H^I^XtY\^](^^ bdlt^uh^vwt^x^dehfkCselinux-policy-minimum3.9.1652.fc15SELinux minimum base policySELinux Reference policy minimum base module.O_ x86-17.phx2.fedoraproject.org9XFedora ProjectFedora ProjectGPLv2+Fedora ProjectSystem Environment/Basehttp://oss.tresys.com/repos/refpolicy/linuxnoarch if [ -s /etc/selinux/config ]; then . /etc/selinux/config; FILE_CONTEXT=/etc/selinux/minimum/contexts/files/file_contexts; if [ "${SELINUXTYPE}" = minimum -a -f ${FILE_CONTEXT} ]; then [ -f ${FILE_CONTEXT}.pre ] || cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.pre; fi fipackages="execmem.pp.bz2 unconfined.pp.bz2 unconfineduser.pp.bz2 application.pp.bz2 userdomain.pp.bz2 authlogin.pp.bz2 logging.pp.bz2 selinuxutil.pp.bz2 init.pp.bz2 systemd.pp.bz2 sysnetwork.pp.bz2 miscfiles.pp.bz2 libraries.pp.bz2 modutils.pp.bz2 sysadm.pp.bz2 locallogin.pp.bz2 dbus.pp.bz2 rpm.pp.bz2 mount.pp.bz2 fstools.pp.bz2 usermanage.pp.bz2 mta.pp.bz2" ( cd /usr/share/selinux/minimum; semodule -b base.pp.bz2 -i $packages -s minimum; );if [ $1 -eq 1 ]; then semanage -S minimum -i - << __eof login -m -s unconfined_u -r s0-s0:c0.c1023 __default__ login -m -s unconfined_u -r s0-s0:c0.c1023 root __eof restorecon -R /root /var/log /var/lock /var/run 2> /dev/null else . /etc/selinux/config; FILE_CONTEXT=/etc/selinux/minimum/contexts/files/file_contexts; selinuxenabled; if [ $? = 0 -a "${SELINUXTYPE}" = minimum -a -f ${FILE_CONTEXT}.pre ]; then fixfiles -C ${FILE_CONTEXT}.pre restore; restorecon -R /root /var/log /var/lock /var/run 2> /dev/null; rm -f ${FILE_CONTEXT}.pre; fi;fi exit 0:!J#Ba3G h_@:)#T!,#*f,)/(~I&:e07)-!S=. ++y3*5'*t 5)")$$n =(*&u+))P"3"~ *{!r2-&')2s%-+Z4%SO5%-$:'50=%(#@4+o$=2*!,;! 0,%&S"!."':/~<-%|6`1*<,!)L7E"$,j#(7`S(@.+B!)(3% s'0V(Q (d!2'+"+W6;86#H# j; &-D623=82&!('35)W 4[*?%y;-=:,*-9@0vL(r"O39,+'8*/J;+S,!5N1"'%f#/']7H#"@(= ra;w%8p-G@"* ,*w 27**6#"0()v $37n;5&!?t6#:$"C2o+*:'"\'D/F*$U.6S!2e%+*q)%2(-%1$E?k:M;-?G)5"4*'4f))"(X)E"L$ T;c#(uqi%- A%~O&{,#* !:)Qw'%2j"))4/$~$[&_2(i(nV(s@%'qAA큤A큤A큤AAA큤A큤O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ O_ 0d8859d892e0d7cac8470ddb1d17a106b9cbffea0076458363a01bc4f8dc9fc233115c8ae83b6d571d45099e1758b571209e2808eed26389ffc50c1d5409cb372193bbeb31675d218652e2563042f424ba7c9512412552c594429ce1e9464e9ba3758b5ae9519ea9ff5be8f2061eb25a61aa5486d91be5f81f951b52dff12a8150e3c030d2451b2871ca4084e1cb1da2fc20e1cc0d1ff717d9a86ab8c9224bf8e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b8551a0050ed5961729ade1aef39ffe02907e80f4022d480f3cbb132a4f26de8dfe508062b1ce71faab6f7a21a62b6cb71a88b275e7f36fad087d29fd7e0f121d13d8564f22331cfac1d241b73064f15e1a5ffae1133f81f6592187d6d9cf673f277e1fa3269417ef83475c62ed5fd9477da3a3f0518b699b35ad6edfb8044ef4f46dd0f14d1f02077d066f0f4b332fa4ed4ba352c560a62a6f628cb82df4de4a3452a0ed9a4e0b9230b99938fb36f41c42b826d064829c652563a8a7fcd667161e4c16d8b425ec6ad79e708bcf6403ab125bb66bf8c951dd1a64b4267081ef9d51e00a9188c690e3c9929aeab0807e528087cc248936f24619ed4662991a24680b3efe7b851134b5bfc25890013d9045f0ba69ae7b123e56cb85165aa0f26eb760ae3bc9be806fc9b738ebacd0313d1d166277c8b307ff1b72ecd4984496a1a96a2241a8881c02be0510da0bb52b897aefdc61b2bb23b272b81e67a51d446e764022a09046f4ae89c3fccc514a1d749d62bcf4d50a27067c77175dcd20e1274fd19db7a42138adbfc8d02f049e9b76055ff2b53e777253d5c13eecc746d0182a8e63bfd33aa83cd9bf799a851c73f13e6b1cf879767c9f8a5ba74839377f00d03cc2d74091c97b82bdc91d50b5ccde9ce59eb6565dc9a63d3bb9a2049ed72843d094762fa117dfad29fd5fbd5e51c562e237f9538204ffd1cc717e77c14e5dd6a28e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855ef53c74ff844d0b66411cecfbb3fe6e301c8a819f78864c126cdf95a15d165fee3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855a2c8f22e1bdd35ef51080bef5467b99c2040974cf25035f4d04bb5d64a4a905fb4f8d0e9f35739d0efdde3cffc6e23e70ba9be67327ca842ecb781c3e7e1a825851ec71905ef6397dd380bfbf164e82acdbc6bca166d9c75c94038a21f30612b5a249fe268062b10140a29d6371b5a1e01eebb291edb5f8fa92abe72a35100c3fcce4ab48e5ce2a769ada87371acad70d41074f48ed4cde500525a508264817959b176de22340f9ebb60d8bcbbd24a59d8c43cf577ad902aa111d712c564151a8044140924f555c3d4feba3e228554793ff7b6e7b0117fc56afba12c3ab919e7c65750a3dea3b5b6838672a3f637b3e84d16a16448fdd73f7628ca982125b510ee518b6ed040d2c594c78543a65cac3bf20b18da77d9790d3bd22779a0be082a5c3830e0c887a481c49b5d1d91401387bbee9ab34ebc783a9b098dfebd12fa1ca9948aa88792ab4d00b975e0038ec5ca3cc4ff64bbf11bd97f518697eebdf015257c194ec68d47b9ff4fa21009bb8afd2801bcc4d9b724119cd83cbd7b26c632100eef2614940f5a8bb76850a0e125e3975fcd17666055ed3bad8601207a5374ad26ab8e63810bae50e720d5d4cea898025194d823d19a9cf794d855ca131a3828e0e6776424a373f19fb38d0c78526c91bc6d03bd7baa7f09710314ba312f4d4a6064ce4bb5d4a2abcc3c23b1ab4c382c6691dbb2d425454508e5abe5fd8799fb7cc2b4ebc83e9fb27676d4e27ba74855203cd1c24d99027c23d7beb34a5a1dc88e68230ba80423582d15b4edbd80af0dd705f767fdcc9f5deddb9393c1ca6a36ff1f5860e3ffbd6ae1ead7b1791146940f198d6d37fddf3f69d1ff86393d7e0d4b6804376ddbcc0f2351567f2ae3eb1dd32bfd96d426d95534a1d2bb630fd4fa31cb59284732cf57a6d1d726a10eb5d611b4a15c847d63c6941434553996af4e74f1422de6899450450bd5a33d8a13a631da1719758d7bc7d823d8a8dd98931f53f7579e01670f9c24d39d41b21f9c826ace3b614cc6a996b4d4cb6cd80d681d1df4671941d060c0122812c4c9dd5468118e5282dbcb7b5991b3249cfa8e6e7a949875e491a78b7ba6bca557d6eeddb7ba1f9e06596fc23433c09e6cda708588c4ccf5269733d87ed185da3beb421aa9e4f5693805f7afed368b9d0eb99bb0af6119a6e09b0ceca0037cf6de234703ca60c39f961a2f88eac4596841be0f6f659dd819e6d11e477ae1b8cca326154b640e80bf978238010e634e29e6e959d5ebef477fa6b2e14251e7afc65af354b91f8e8d269dc402b54378db9b3ca64dbdc79f9f657d8c8ef9512261be71fc2222c5458858885fe4e0cdcaeccbefc18a16c16270dc6a48fd720489fb4827a199a343db3307fdc1c94bf63377beb0ee0b28367116e7b56deb808544f9c4468ad712eb7c347565c70b72071caba5cc5c5ca5c920ac260dd39ce7db86e918db0376297bc84aee7cddfa47c3232591cf3d34eaaa9513c1173e37993b07693f514c5c33d6ab5040f5d7382d7e704fa15a8a1b0e60b022e84b04ffd3fc9b55466184cafa3b435ec55f14615e3b2516ab6dee0adf8a43292e32ac6490427fcb9c2b7c81539d408209da51e7ff9ffe4ec222a077e63ce6f381e30656f0269b172d2a0a37d899338744663de6e0152f4d30430cc3b6b3c71f180ecbfbe650fd2826a42fce1fe7ec02a4f6527d4d3231f947e36da2521b045bb78478debefa2d6ca94f9753b3382e1c9f3bd1fbbce950442520ed47611ca100bcf7ce42421df04c6910f98ed5f9541b79cca5074c35aab047dc9ebddba263d92f7f49744f6088cc209e8e497fbe4603c46b09689d461a05ffaa88ae9773e4fe13db797a10b85addfbd12de904dccf41830a3d9324a11e24ee4b65d1ef927ca49927a613f7a2e693d2fdfc2f7512549a69c8701b1a967d31b790577c9b2d1d23880fd704ae0dd7f09dca2073c41f2e40dfd8b1f06c04438d7a92c8d31be9407a1f610035659e50243742974cc1fdba54339a9cedf895c1b1ab75cd58e3e931c438ed90f11fd00f179fc64db248e6907595108e184b54acde59be7699a03a6c495ae4c08b64764e6f7c90492d587c7e51728d207859de165af6936ab4654d4ddfa6a5954d8a6781a76172953c3a69ad25c112f0bd3c740644dcfef13b2d9f3e1c02f9dd121d2af707281ae36eb61820bee3a337c4d9e11667136833bd3f1bc24e1b0dbde370d10a3e1463ef6503ec81128f87339970934ff128ddf625146e3093b53879abf2096781b76dcef7332ec48694f60de1830ada974ad0d75cc06b44c1a4c7626d15a461ae01e5f45b73f97f7f95136accc8ee93f5505637c66c3fe72b9b3133d22116a842c9ba100d87b830c8a84c882458222c88715a842025dc98badae60a60e4aa134f4cbab4b21e2e7eec31c4885ed980af4728bca1cad05627c3b77d593a5b64044756c0c9eb4c4661590113a6dab2ca490d5802c68c2dd566ff768b22d1a1fd96550aef052fecb33c07f30155acc4ab04e31897f201d50bd7399928b8fd1a5328eec0a44aa50ba1c221f5021716dde269087db7c1e48998687ea8be1fb6d246910d194e8b30150f24f475df2e8d1c7dce4d8850f7318b89303f49aec5d543e0573c61cd80fb192219ca37303b3a08cf8cf0b04d41f5a6767593282d18d5fdcd228c85e9735c3684564a41042700cec2e19ac9e52fba0492b380436f79ab1029dbeebae36e01b2e70cccf07ecae0fe7bd972b4a27db48bca7d0f8ab3c94ed564f30668bfb579fc0a9239c525470498748b943006da5230d4caecd599ee03d92574f6ce5045f92a2c48e4d908ad99f14154a3436761338f2333862839faf3af95276f1eed1f51756d2c64c6ab4421eb88fa40ae3fa2a6627358481430eca62f51df119cda3223fe6cbcde4d0bfc1c0ad2b332dc39afd8c80d884f18ea8ef47d2ef1866822e62b2ed86b682b43740946523fe5624c73ba57988ae3ddf2ad59a62f78fecacebe9151a745c168f14629bc919ad5ff8228eccf3e43a23940d35dee92f361f603bf7fd0bb90d95a7c6a9b92a6ca483fe4c741aa2404c56a7f21a2af4498d6f6e87f521d63f75e08e2c4dd66f03211686ebb58c7e23cc59e11319ef3b74600c1752cecf97721e7f3c6204336e69ba65b1ece5c2a6543b250332039a50c608e0433a430709ae9d951886609eb356cc20c5212d85abc7d714e13df91c96d4df3a1cfdedad27bf8f319cc9f86795cf51da613a952226faf08bdc25709ff138f8095d6aa62cc330d5ea3fbde79912a2c4f59d603c060cc2cbc1dd29985713d5f05a19df8d42e5279f2135daa9503c9c82e214d171fc1471dedfb4c09684f77ac117e3330f015e39f7fa31a7feb79e5c56240a9094cfb3b5eb28b5ae9c220e8c6b72d82040da81dfd944e83a19e030a47163e304b1e81dd187c37ae5d478905d36cf509c18780e2746122f455ba3a14ed43047bb6e212289843261da6f2f1e93379d72c66f86ad32803c4413b80ab8c0a3e472708c7306dfcf3aba6673ec09d89125a0eeff15d7d3de708cad685009f9ce02ab2a129c40dfc733cc126b195bca13c62374e1d0d33069421c722fa77daa737f70e97b929c2702dcb3b646f56e64c663b2cdfcb42d1383e9f5bfbe8192a14b39ffd758fde85cd4221f7ec895efbb8d60c80b643b5607f4cfbc017f7bbe3975a84a49f40f553536d785b78d7971b96c1b7bb32054c9b3211b73774aae9dde610275c601d0273d9446527cac68f2721f30aa2c3dbc51a0ec3590fc6d0776f7ca6b58a6cc60c4ef511696672868da737eb1fe4929049fe6d6bc213547c735d56c58008ecc2f72fd2419514e58d8f02ede50d20aba3cabfddc8540f63bc8d451b12c6b8f6cf4f4b6c0c567604bc7be48947088dbd5eeb17f6fbf43689b1445e6c78b7621bec147c49c96181c605f04697cbfe09a294e1995c0982d5cb91fdd761fd3f52123154dbaca1b1eea27c014d9c23cac21ed15a79d587721bcf64d9fe457ddd4078d2dc21bdd13f6592e442ef77717132dad9d5b4e92b722d26d82165137553d316dcbb51e2eb51b8d2e7f338eb3087ac6316e250c1440003c0694c9505dd4d12e7bb39a153f53da7552e98ac7a8001b80341689cf89d1d72363341ab1399e2e577c5d85f31f3aa18dce74e1d9db962ddf136b97424e9e5d70b5be3f206019057f5ce8104c23aa6c279fac98e666d59d94c24913717a3784d68e6dbf7351f249e6842f717a19b009d5ed3ec6d3cf5636f72805f29861ad9445f6023794d2fa9834389d5a95eef37c2f59e73dadc01554de13cd3503316578a2b6f695458fe8afd593835e56ffec8f5a6f64e27567ca556debf29de1e2c8699d03f1afee224c1c1408c233c8d9f5a01c41d06d42e7a386c65ebcf8dc519242d1d99618ad101413b86bb80f9564faf0990f0ac4e418e7ccc6b828a23001e5938381509dcf93069e5bcd327f4724787ebbbfd8e6f6d9a14b2dc68dbf92c1840a75b9ab19bda4b20495beca32151b3e159559405f95f4146a4ca55c7bf8146ffb1f34f3edb732731912e43373a7c63f082aaa0df8f82ef2ea79d4bc50115fa7c31757824b63faf5774e5c24b3f1523587e789fc66e4ff1f160ae84dce20d2078fda42933af51b2ffea8525606084ad3f3c01cecb170256d2859f71486660318d8545f84557696c870f2e2dbc0abeea59f7b92af3b1a6c53704fa1a2ed3f0eab97f0b69156e06ec4a52ec80f0e017ebc4e7fb52aa779faf0f2640f902943c9f7ac38f445784e5ed052890ff916bd99cbbe44cb21005526cce090a44bd9cab556e4c1305a3410e9e07c10f7cca19f5e6647fe63deb8a1197f95729329df94c4cb450e81c4f82f7972466d1d060e568352f0128b919dd44bb388e657801e0c58bb2d97943f8ccf283562a7a589168b2e66e51a6048e5e69fb6ab85e03a401464635dc920e5a3f6d875cb30155c4cd315892c563b335fa2ac6251b43f7cbaf779b33fe0d7ad0dc070f5cd5bad70bc932e202c5cacece93a906e1ecccd8b66ce0bf894a379d44e2ab10f30a9122f68381e3c76643710880942751e701540f23118dc2690d93a081043989d70d148eb2e68bda1d7fc1fd9a5cb3a4b7541c54f60bf1bc91c412ddc490f036971fcacb4943f0253e963ad89ab6c5b68833ba3ac36eb6ef99ab5b84786119dde5a2a256aa4bc47d24d05155287139c99684de31271a1069445de0442e0f0cd87cf19c42d7aeead6d82fbfcd7f0faf18a137fb666cf94ae270c6ce7a854eb664b18f04136b1433ea83afe9d13397e08565bf8dc4697e93ebcd6517f1914fad2ae08b96c8c945eac5f030eaa89951c14b84026f2c7e6b46abe956476e8ab1eb2dfd7f5c03aaf7510a000dad016c3cc4f89068722e5f26a06f8ff4d495e4d5707e79b0e931dad1e2252cf4960e8ac4c5825da0ee04aec8cc46d54f44db11eaf027cafe04795fcbf7cc8e4c234cd93fe6c6be2e1ac895a5f304fce92939e6f9442929f3068b6ed55d87a546c932181664fbeb452ead18707754c638ada6ad42c83efd1a64af80f70323a87006d74532c3ea0cc48e5c64ac1b7ec3d3eef08f7d1eb809aa7b832fc2e6f7f7fe6c63c08ac73873af658c95fa0e6c57fa91cd0aa496c452718e8827f17bc41590a6aff808310b0144c000806a913154b9c024ce4dbe4ad63e5c08a7c88a60b4b1b2fe9b765f4a7139bf899562c7a516bdc9161f1f147d7bf130320275c7d7063995f2b9bd4e5caa01a11308085aafd322fcd822cc06f2f75d629edb2430f5d6e87ac3dcfb4132e7eb5a3b953c2e17f49e46e146a9e9a2502a732642a4950a71d35984b8a2067f06415fef42e1e68f105e91c2a08587fb35dd0a04d7fcd86188dac503f4f11684e31acadd9e6f3cebdae8dbaf97d4d263238a5b2158af450af71634b4d2f57167d02a112dfb7f7bd70804ee584e1a812ef02597157a53589b8a84981cd2f2c9769f1663cae7c30e505a10c3763e386fedf174b2ba85b9057e2c98b5ec1dfb7ec13f6ae8d8300d361d39812ad7f507a08553a6a28bf9c88d8add45fb7cdb9bd137b50728a082a02d7f30f306ac2d8b7c720b0f30e22b4b7fc23a53e6502434c480a258266196ca09aef69711984d4f31c4d1b1f087bca5e55528f4659283c7c8e4399520e657554e4b7d302374e360bda128b5a844c82b6f8eb4519b503958611edddd1c2ebe9273c666e2d23e9f9d3c8e8b11ddc197ecf5ea1bbfeea282c39c13e53903da96b79d6363a3c8c0cd4f6db65bfa8b2d535ba8527758eb8574ab4faa7028f19ad8222495379155576034a306919fff451ed3fbf60c7587bb529255ea3c2493480252d664053a922dab5e0ad560be6d23d50195ffec5c575c025434491630a94a0e1e7066988b12358efa582af9634804692c5a706c6f10656070d35aa7d0b3c6f65a43703a5cc6783a93853becd228012e8ec0aa7fcfa0fb57c454e0c23d6e42732b25533af4f29ceab310f54730683f915b7f0f975ef5da794bb85eb2baba940c73ca608c6f2d30ee1b9e3278387a9d563b4a0028dcd75031313987875d80e8b670d0b68c442e24f2da1411cae5003ee962df6c5a8f31c2fb69cfa660829ef0bd643b64a934b4f9799a416294c88c8bd0188b4d3fd6fac361d92ff4ed7fd7b7aa0ce5f056594f58660b03d3466ee7e3125691ded754060077af1bebb092f1f8c48773e30f6c1e16246016e8610189273a9a117ad4f177131840f4e7fe5699568cb31625d47a84a8d539a1a1e0951b5e80972f6376cc6e5bce3cb02d377d94c713321db0285f7a3ce56b4b7732348cbff8b56a876cc0b4909a1ee267ac85145a33bf62aa7d7eca267e2f1787477b827559543a99572480cfd59858874c0326b81bcd76c5a38cc9d12993144bfa1cbf8f53f5843dd1c9e1d547137f7a2f1a5178adf5cf473bcf0279c1bdd3e018fc8210e06b4d6c257f5cc3435fd371787dd40fbb9a2e8c7cc2c9080e2621fa3e7757705db20194f4ca09b14a155b628cb723057a42a6e613852743dfdf6e74a165a5adb51b1cd94f7f3725069edf6042fe7430191a0dde033b13e6ceaa6d8d1df786ffb6128cfeaeb0b67c4241b2eaac52dc65c67d745c4b95c2bd2795614720507fa092afbd3f00cbfabe0fff8fe501f4cc2ecc8a83a8b7073fea0ed4ec765e4a6e2423bc8e35599f764947055af8ed5f310c7a2bf67d160fe175c525e12ce4574bf65863fa110a2e0437eb1b86a6d4b5508d3919f905dd80bb09ef9c884fc552c9170003bcd38c1a2c72d753c48e589df308611e3a867213f6080be7a7634d7906cecf5300cc86282ead40e09327171c489f4e958a143717e37b0ccb03eb9d23601c7dfdf4b72c348d76a730ff433e156e68bd763154d29cc2ecec494254ce3ba46da030402e685f4640faa577a5f759455cdc8dcc7fbd44390bf4174cd3f3ae510e1be57d5762e952de7109ee453cbb1d02bdd1f286b8ce3c99e54548104ff7d952f57b713bd92623600f4a6808c1089f1e2a76050d57b99bbaef94be373f39a9f547efc75d9435575e711b587377dc2015a817395898333d3709a004c4995ffe4fb4f028111bccd41008ecc122d2cd9a242d5a49e91ce05127a0a5f43cc54f0638aa796c8203b85d4a83495d4984c29347ddbc6e3b80cfa8df1f33388e31dd90e59d9283ba41b098437630a419908dfa2e0829440c205f871723088646714d1960833078138bc70a5b3469c905b5b185e14eb172aa0e37e2c7c45446b12a87013b441c11c8574b6f1d1690704c61e81bdfde10a8bb1d4f1bc1f499dc0f090ef6ecd0842d212917966bc9e2ca61ec669fc8f64e4e62d36819bbe66b7c382f5a3b576d6895fbd6a3fdba285aa1adfdd755c2877500d85eed9fa5d1ddc69440bedb8ad75f5f3abdd33de80947570defc2acd70cd8c1a3e963dede48f47db3c16365ab8e33b7c4ef9aa727ec871acf36d25dde611cf665ad88ba81908db801446234535787eb38bd259c5dac19cfe26d1720fa2460107632fe577af7f9bba8ee8301edf982f4e515d035be31c343ecfb97aeac275a192c4592e541c81133749a89294063c860a4ddd45b06d54ef70d35b6dfe59680d5ef2b4640a15d493d02dda75f8a86a28ef69a210eeb85684480da8641268bf6305857bf2f50ead3aa38b04524e53d366b43a3f2cbd7501499dff65842510145d6e7565825b1eea47dc78a9c818e9fb39bc887067c3f67c00331e393c6db6f73fa2fb90405a66fdf31fd19de1206484388d2007f8711fa5f010c1b610173d4dab329735483d83094d4914a24b88016b39670d4cbcdb9abbcde9f3e6764b973c2f772ce8619a3c0d2adccd796766b3b0e1bd54957073c45a0be435ecce70756fbd26990f75b8774ba9c1ef197c9dcd115e840fed7deec97da653272b27546e99087dec7e6dc97e0649025565f68a13ad30faa47b2ac50192f88605c6f1030be1d9137a33c03de88911537376c5ba1f4591360a9588873dc3fc5b094939d17483f19e07674277a52ebce93e699911f5ec2010ffd8204a1fc01588666ce619df9322f5d40301af7b9b682f6926126cf83b108eef7f3ba4deed7844639d7589589707865c97e1f392189e2c68919f94cb5c35d78bea4344406bb02b86dfdb9bd86bee07a74c7f769c70fb67d186f2c86ac0d047ff67c83b079f5fa6e514d613a8d792b9f412a3df62d61e987fea1061b38c6e0574354b7454535b37ef2aee2128b42073f9006bf1ec1f958a0d61dfb1487382f4238e2e66c7bcb8e169ba80e22437657403015407c6fc8b231fc7b3dcbab256a7e657fdff307084dbc2b7666277d5ed9bf60b99d090df55036261e83ee6a9b2773483575076ed59b3eaedf4bb19392bd248d6a1c59d3fdc83b888de532713b6d41ededf3316425b8a74018533528bbc9be1ae9eb020040d068312c27a960c8eab64e1be004552215312ba7cfc1dff54a94215cde0149207ddaab9d29787ca8ac2b2bf818bcc939942c9a9b5eb9ef685ab65761b883a684a8744fe2512855d2491ddca9963c48171a3bb25c537c143b3d393f5c422daea1e7faaa36f746d8497152ff1654bed9d7d550487cf75fdbfc223a9e3de0b5ce7cf88397507db0c859be48c8d80bb5df730e73295fd74bafbd0e2f74f074c50978c005ea9361f347e2f895f4c62c20dfe4a1d6a31ff764109787352ff92d4b2244d87fceffdc344c8f957ba26c04971d1945575829bb0428c06c394f7ab4c19ee8fc1ecaed19544351d6dc377cb78911d71aeaeb6a92277a10fd7d5ce6ce4bf1a23fc571bd7e528b46dfde44ca4588aeabb8197212003646ef2321a124b1fa223c4bed58231255c9935619a44d743bbc6398290203e9bde75e3e38e885368d4ac445ffe24f1224b8c01da16551635ee070cf49a57f2aab614806903d18800b8dee063f9a9ad1ef6c6843af4a3c05af0680efddd6181779dd403522e2ed3b0f6362a748ace54866baa657c7837290f8cc60931b1b117beb898dba812508df6da60fb7467219e113e1b777d448a8bcfe46fd4b61051885ddcc9f18c8cdc8eb4e195c669c069cf79f28eecd8e0fe7dd094a287a885fb40e84573bf98d14357f6e3702510accd44057ed6ad97928cc3189fae455e07ea5c10a0c501b9e6aa316695defa902b65f2c8e7f2bedd3b8cec7a66d097b78bf4bae73ee10ef26116ded804d6282a7e629b57a6e3d413aed0fe78b97c35bbf1713ca7a8d3507c8342624c4d2e1b9ad84e954a9e519235a4f8d72bb24673e843607905e519cb1ea7fb1ca4df44ecee5f6a415ee45e9652a2b9888b40c5fc6b908ba5816eded5dfdbcbe7b8836ec06a3b970b32edf0d5aa7e281aad09556e4c22f8570dcdb1747e45a4ae46e56861d1b093aae4eaad0c98ff5f15e02795ade1e34cb5f4ed49e7deb542a8ca306ead37b23d8f064557e22101a81e0e1c554b0c64bf621efe19311ec10b0223b5c8454100316f747dae1170e5510391636742d23f9e525681510d6a7f4ce82fc9e4add83bcc975ea3758bff5d6032c0fcfe61d6e862e0361e46fd387c49e4e67217705b1b23f03498f44c809f0ce2defa6cefa41e4493d02bee8633838020c4a54669e2ed2148cd401a239b71b19afd19e25d95aaa3589dd8871bace924bdcd35861398555b9869e0505053f8cdc92223b38cdea4b61c219b848be2bf2bd2de505deb7cd6d125a71865f89f4b980a202029a3bc0cb05393eaa9150e873cf779b9d9e3f88cce127bad270deefc6c0c242705a4abf605f23b4df2a72bfb79c3e91cc89ae9d7237f5569d05a63cc8d57ee68579ea143139f3fdaac564783802428777d4fc414a8e57439503950da770f2f03810f79b29ae027468dfc456a1929f12eb6b3d1cca3a6738a0e018d1e39583fa0bdc31440992dec345c88f3556fea61f382a1a05d5bf47fcfca0a243ac7b89452ce1af459ff27727efadcef66e2860be041be7f93004733d6628af8f03a96790a4f518a49099e405bf38fb513807b305f5e83e381d7b2a9717eb98a1107638a72567c284b7aa697507d974d708cffcd1bb0b7df7c5a071958925e6ccad14c585a6a0bcf61a53f11d443f2a71f4f406818ea6f94f91b5c2143fee9ee88910db624837b81d53cbdf86d03d05b3fa7954ac4ea7b6d4581d51be082899df66504f7b20d65a48b47fc228c542b109fa2ad2e3ed83a62a90bf711bc11cf74524b7c871b0ead43600ee51ba0f6d731366765aac059d06b70cb96f0c705ba50b7027cb2d8bb336496e001f63b9bc4adaee13478aecb49b255f1e766493921b60b4eefc0ecb8e1ec3b5d53c94da948f18e3a0b9ad03724fa4038f240b8a44e315d9cc45ae12c37453f9199d9d24744dc0ac165d6b48378639e2f36a6e01a92c6c1bb4a8a3ec88e4bda8fe0c9b1a7934156d0988ebbe2b1c0f50c4bfdaf97941b308b48f1cc55ff6b68ce0b2ea091fe0f85af774e8286103fc9a978042069d6bd63304810091db9c73d3e230a65e0ce09be36a7bb85fbdb32a93c3a69e0ca659688f70d52f12581a0adde67d991ccafa55e4b43c371dacea5eeb74a7d0fb30a882e804007efc4f618dc39c8d2b716918bcc9602fbaea3f9555384e4a71d58ea2a1defc5d42716392f5fd5f5dbe91384a2fbab1f21c5e90228e935b2aded32329e756f7f8104d04635506d49c9038319ccbe200f12ef8bc3ee3accc76cc8369e6d8fe823206b8b81dfa92f2d7e2eed1495a4d4f403225dbf950c1cec950e018cd68b97fa50f88e29fe6ee3740bcbd4029269e9adafe3fdcdfcca4a0880e6f2c1bb62919299af349c0226dc485c9c6ae679e2fd89481423c93a8f05dd124e2da71f869a70cfe4ad88a555c02c874ba31a431899a9055d071b853f069ce62ff7bd715cf48dec2999d9cd3280e766599dd4414738da3fc6594a6fb5aad717b3774f3dbb03971f84ae7963fc5f418a4e74582de9ab1235122d00dd4728ba063493acb068c931f4d6f9ddc16dc2db6dee52a5f3940a1b6629aed0cb98dd11d00a4bccd7bfac4426c15dcf23e53197a81c24dea627721a5375c282940badcda12f2350f635a53a6cbfb177bbd51ba17116304bcd76cd9ae3f7af0b8d4ac3eb20d4fa87d39b5507a5246ba6bb2107c5c4032884afe6c23be6350f7e7019dfff2a8a5334fef423bb781cf0225e71a3f2777503c606c940f6ac52d92dc6d15f9092cf9f424c9ddb3e7754a61ea90fff4c14af7302f659ce5b85942f74e82197697b7531a840872ba6019c8895e8c0b231a7ab76cf9edbfedd42e598a73a280f4477e3d1e76298fe4cd8e638cf3aa9180c035fb1a4f555c4cc8f9893986be3595094646abe03f0110456c7e8a433d99b138714632032443f3561a3de0dc8bcf3d20acb1c52afc2ee64a0303d163dfef9c54ee748d76bcf8761623e88cdd118458e412e1f68e92c5ce6b49ec2d917e9682e3fce7a282793c3037048a28e876a04cc49e75907b8f060c7b75634a34592481b728b781de0b820787dccb0f5c973102304aa7ef0f8e199404ec9204350570d2ddb458f0df5d101fefd384dccf169001d32c7a7f14acaaad9ac5eafb11925df9424b4bc71c01c5e9fcbbd5dd8b671973c80612e8f019cb453325e1088f09ab220c988b16e3619a3c5152746f4ef63751706db035a25b0a595ee9b1414fd2c9870d82a879065f0b46d6a56352cfa4081dc5671fc55370dd7abb20248cef231384f4f177cc67e334b40dc90f72d3476da47b3b4c60991f56abf058f5cf92113ae381dcb5558b12f852d7813996127ff4baced02849e8873fd000d7d6176cbc0809fa8048f978441486a7fa9666d46acbc1b64137de415db6bde1f920e98b3fc05d226a6b1d49def4915f7ae3153746aaed6aa5c197b7868e8db452b7f2c225da8ea820bf1dddfecb1e61b47bcfb8de6fcc7902033de6d13917f5349f78d91ce362b1b03591c43dfb83dae28f4e0797f4e012f21359591496a58536b0136cfd4dc0622a16beff61de384319f622fe4967cb3560b2123f69f99d1af9902f4a557dd773e1b4d8f8705d139211e192c60b11e5b093262dc72ad58d3b9cc81d98d8879293cb89ec35f7b8dc376d3ff1402517eae267c5c0670eee51e01e5e1faf30a04cbdccfb05cb13b0859dfb521258d69951c63139d1378c1c168a986ac8291d246a80dc6d5085c09144061df21b7bda4687f0031a84edc873c6c8fbbd1bd279bcdd58d9b217eaee8bb72f7d051ad6b2d6bd046434fe108595ae27a81cb2e52bc9133fe7552fe1639a7a47eecc65fec7ae8a4f920d1c8ee586e60421c8113cb56d662b28e453d386e5e06091b2e3981edc41952bf4a4556cf13b7f2dfc28d99e60ee56d13f949235a6894f9da085b2284ad4492d19af27a0c7d02b7f77e25a7e630af21120320bcd73e4459b69a691466d17b4da2af41aab6d9a9a3763c4dd1059ff6b3331dc2b31ce5c528a054b4d0bb6fab6b3d145d6aad28b8d4beaba09d96ecd8ddf2bd7157273762d1128342191491bd9a20f1853b6730fdbe9dc5df1d2d1f9ee62b6db5efd0e130a42830c84876e9128d1e424f7bab7070efe2156482f21239d3b8c4ff5e85ea2f5a457a04a8a1b038d62da7516122784a591b1607658671adb61da92f3c8d657044eaa6412604863d371ae511ffb9134190bb7cc8ccb9a30a468905f2f2963168458657282f9c94d1537eb0a069bff6fbcfcdc81d62b7fefcbfaae23ce9eeb5a5ca7c92c61900d934f655db337235dd183ade72857338e0549bb7c7827c989e58199d2a573f1951c1a18a56a6f3ccf7d23655be226bb13b84c7a60002f44960e63805019f8ca6695a96972d73709fdb35d6e41a55934044def28eb2a90e224db72c356ccb9f1d9d1a01c536abbed4b42d49c59a9f95445c0757bed145687bad435cc9d4d8bd2e18877e46537a2cb2e9b054375b19c041007d0f94b8d67d80d835a5a2ce9dee4e50581f314b0ee881d3e091b09aeafde75210922c246bb5b9bd74b0a59e213204e97d507c3898fcc8539029973003cec6f703478e4cdb61687a4dd9de9990dcb279278bad9a1c7310df502969df05e8f8d799f08488518cdfe33efc3784336031b0cbc6efc59dbadcc15f64bfb3e481a0eaee238726d69c821d4ffb1ad6576b7964eb81008bb74e54eabfc237dd7d7e5e884267bb5f85422b7a9e7999b33349bd4ca436c93874441a959c265947d6afc8d356e5ee39db9f2e76b491305139dd7f1b15de3277512f94807008d968a535c704cb5a6d77a59a9140cf058e829df06a4f6d7ace3ee78e60efa41bf0742fa82f91ce9a060e3108c13ac72a62115ab55343e73093b5665109bae7b8c6b4d49fdb69f4dcf4b26d464276215e85dd32789a4a6798bc27eaf443ad2d8b32300888a6ec4de14ef157f48c543ee62a791a115d378fb6df58425f312489cf339e6c80b9237a06e188f33ccc26a1af970b02d7eb1859a1f8696ec79eb54d80740d722e04f03a81a0936d8617be1f7a2303ae67b32e764e3341a2c3659f8d72868983612fa53eb091ebf7c64d5caaacb8baf3c539e09b653759d495e20b73c855f1c42f93d4970b39f54ae8dba227606daf7100170be967c237853eddb8911e68f9854c1bad9654bde6b735f8451bdf0a98eeb7f78962684a10cd8a06b2922d2b7f580311f635d037352ea695c143d74fb4c55777a4088d0@@@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.9.16-52.fc15.src.rpmconfig(selinux-policy-minimum)selinux-policy-baseselinux-policy-minimum     /bin/sh/bin/shconfig(selinux-policy-minimum)coreutilspolicycoreutils-pythonrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)selinux-policyselinux-policyrpmlib(PayloadIsXz)3.9.16-52.fc152.0.85-263.0.4-14.6.0-14.0-13.9.16-52.fc153.9.16-52.fc155.2-1seedit4.9.1.2O_6ONNؽNåNåN@N@N^N/NN{#@Nm@Nf @NC@N;@N/N&@N +NN N e@MM@M@M@M{@Mߒ@M@Mc@MM‘@MM@M@M@MM@M@M@M@MMM@M@MlMM@MMTMx@Mv@MoMlMgMgMbSM[@MRMQ0@MQ0@MJMGMGMA^@M>@M9u@M6@M5M4/@M4/@M0:M,F@M$]@M@M9MMMMM\@M M M@L!L!L@LL8L@L@LOLOL[@L@L@Lr@L L,@L,@Lډ@L7LLLNL@LΫLeL|L@LB@LB@LB@L@LMLL@LdLL{L*@L@L5LLA@L@LLL@LcLzLzLzLzL)@L|L|L{@L{@LvW@LvW@Ls@Ls@LrbLrbLk@LjyLjyLe3Lc@La?@LZLYV@LXLN@LN@LMxLMxLI@LH2LF@LEL=L=L=L;L7@L LT@L@LL@L@L0LLGL@K^K^KKKj@K$@KKK@K@K@K@K]K޺K@KtK#@KKՀ@K:@KK͗@KŮ@K\K\K @KKKKK9@KK@KK@K@KKKKrKK~@K,K,K,K@KK8@KKK@K@KqKqKqK}+K{@K{@KuBKs@KqN@KjKie@Kf@K`*K`*K]KXAKTM@KPXKEKEKEKD{@KC)KA@K;@K2@K0K/c@K+nK*@K(K"4@KK>K>K>JJęJH@JH@JJJ_@JjJjJjJ@Jv@Jv@Jv@Jv@J$J$JJ0@J@J@JG@JG@J@JJ@J@J@JJJ#J@JJJ@J:J@JJQJ@J J J|@JzJyt@Jyt@Jx"JrJrJq@Jn@Jn@JmJf@Jd\@J\s@JW-@JT@JS8JKOJI@JCfJCfJB@J@J@J?r@J<@J;}J:,@J7@J67J2C@J0J/@J,@J%@JJB@JJMJ J dJ@J@J@J@J*@J*@II@IIA@IIII@I@IIIX@IX@IX@II@I@IcIIo@Io@IzI)@I@I@@I@@II@I@I@IԨIд@I̿In@I3I3I@II@I@IV@IIaIm@Im@I@I'@II2III@IIIIIIII@III@I1I@III~@I}Iy@Ix_Iw@IuItk@Itk@Io%@Ik0IeIcGIa@I`IVIO@IJ;@IHIAI>]I= @I7@I6tI3IIIIIIII IP@I@IIg@Ig@HHH@HrH~@H,H@HCHHH @H @Hf@Hf@H@H+H@H׈H׈H7@HBH@HǶH@HH|@HHH@H{@H)HHL@H@H@H@H@H}H|@Ht@HsVHr@Hl@HkmHgy@HcH`H_@H^>HQHQHQHO@HFHFH$@DX@DU@DN@DN@DLDH@DGwDGwDDD@@D?D?D;@D;@D:HD:HD2_D1@D1@D+@D+@D+@D'D!<@D!<@D!<@DDD@D@D@DDDDDD@D@D@D@D uD $@D D @D @DDDFC@C@C@C@CR@CR@CR@CR@CR@CCCCC@Ci@CC@C@CtC@C@CC:@CECCC @C @CعCعCعCعCC@C-C-C-C@C@CCǖ@C@CáCáCP@CP@C@C[C @CCg@Cg@CCC!@C~@C,C@CCCCC@CC@C@C@CZCZC @C @CCCf@Cf@Cf@C@CqC @C @C @C @C @CCC}@C7@C7@C7@CBCBCYCCCC}@CqCqMiroslav Grepl 3.9.16-52Miroslav Grepl 3.9.16-51Miroslav Grepl 3.9.16-50Miroslav Grepl 3.9.16-49Miroslav Grepl 3.9.16-48Miroslav Grepl 3.9.16-47Miroslav Grepl 3.9.16-46Miroslav Grepl 3.9.16-45Miroslav Grepl 3.9.16-44Miroslav Grepl 3.9.16-43Miroslav Grepl 3.9.16-42Miroslav Grepl 3.9.16-41Miroslav Grepl 3.9.16-40Miroslav Grepl 3.9.16-39Miroslav Grepl 3.9.16-38Miroslav Grepl 3.9.16-37Miroslav Grepl 3.9.16-36Miroslav Grepl 3.9.16-35Miroslav Grepl 3.9.16-34Miroslav Grepl 3.9.16-33Miroslav Grepl 3.9.16-32Miroslav Grepl 3.9.16-31Miroslav Grepl 3.9.16-30Miroslav Grepl 3.9.16-29Miroslav Grepl 3.9.16-28Miroslav Grepl 3.9.16-27Miroslav Grepl 3.9.16-26Miroslav Grepl 3.9.16-25Miroslav Grepl 3.9.16-24Miroslav Grepl 3.9.16-23Miroslav Grepl 3.9.16-22Dan Walsh 3.9.16-21Dan Walsh 3.9.16-20Dan Walsh 3.9.16-19Miroslav Grepl 3.9.16-18Miroslav Grepl 3.9.16-17Miroslav Grepl 3.9.16-16Miroslav Grepl 3.9.16-15Miroslav Grepl 3.9.16-14Miroslav Grepl 3.9.16-13Miroslav Grepl 3.9.16-12Miroslav Grepl 3.9.16-11Miroslav Grepl 3.9.16-10Miroslav Grepl 3.9.16-9Miroslav Grepl 3.9.16-8Miroslav Grepl 3.9.16-7Miroslav Grepl 3.9.16-6Miroslav Grepl 3.9.16-5Miroslav Grepl 3.9.16-4Miroslav Grepl 3.9.16-3Miroslav Grepl 3.9.16-1Miroslav Grepl 3.9.15-6Miroslav Grepl 3.9.15-5Miroslav Grepl 3.9.15-4Miroslav Grepl 3.9.15-3Miroslav Grepl 3.9.15-2Miroslav Grepl 3.9.15-1Fedora Release Engineering - 3.9.14-2Dan Walsh 3.9.14-1Miroslav Grepl 3.9.13-10Miroslav Grepl 3.9.13-9Dan Walsh 3.9.13-8Miroslav Grepl 3.9.13-7Miroslav Grepl 3.9.13-6Miroslav Grepl 3.9.13-5Miroslav Grepl 3.9.13-4Miroslav Grepl 3.9.13-3Miroslav Grepl 3.9.13-2Miroslav Grepl 3.9.13-1Miroslav Grepl 3.9.12-8Miroslav Grepl 3.9.12-7Miroslav Grepl 3.9.12-6Miroslav Grepl 3.9.12-5Dan Walsh 3.9.12-4Dan Walsh 3.9.12-3Dan Walsh 3.9.12-2Miroslav Grepl 3.9.12-1Dan Walsh 3.9.11-2Miroslav Grepl 3.9.11-1Miroslav Grepl 3.9.10-13Dan Walsh 3.9.10-12Miroslav Grepl 3.9.10-11Miroslav Grepl 3.9.10-10Miroslav Grepl 3.9.10-9Miroslav Grepl 3.9.10-8Miroslav Grepl 3.9.10-7Miroslav Grepl 3.9.10-6Miroslav Grepl 3.9.10-5Dan Walsh 3.9.10-4Miroslav Grepl 3.9.10-3Miroslav Grepl 3.9.10-2Miroslav Grepl 3.9.10-1Miroslav Grepl 3.9.9-4Dan Walsh 3.9.9-3Miroslav Grepl 3.9.9-2Miroslav Grepl 3.9.9-1Miroslav Grepl 3.9.8-7Dan Walsh 3.9.8-6Miroslav Grepl 3.9.8-5Miroslav Grepl 3.9.8-4Dan Walsh 3.9.8-3Dan Walsh 3.9.8-2Dan Walsh 3.9.8-1Dan Walsh 3.9.7-10Dan Walsh 3.9.7-9Dan Walsh 3.9.7-8Dan Walsh 3.9.7-7Dan Walsh 3.9.7-6Dan Walsh 3.9.7-5Dan Walsh 3.9.7-4Dan Walsh 3.9.7-3Dan Walsh 3.9.7-2Dan Walsh 3.9.7-1Dan Walsh 3.9.6-3Dan Walsh 3.9.6-2Dan Walsh 3.9.6-1Dan Walsh 3.9.5-11Dan Walsh 3.9.5-10Dan Walsh 3.9.5-9Dan Walsh 3.9.5-8Dan Walsh 3.9.5-7Dan Walsh 3.9.5-6Dan Walsh 3.9.5-5Dan Walsh 3.9.5-4Dan Walsh 3.9.5-3Dan Walsh 3.9.5-2Dan Walsh 3.9.5-1Dan Walsh 3.9.4-3Dan Walsh 3.9.4-2Dan Walsh 3.9.4-1Dan Walsh 3.9.3-4Dan Walsh 3.9.3-3Dan Walsh 3.9.3-2Dan Walsh 3.9.3-1Dan Walsh 3.9.2-1Dan Walsh 3.9.1-3Dan Walsh 3.9.1-2Dan Walsh 3.9.1-1Dan Walsh 3.9.0-2Dan Walsh 3.9.0-1Dan Walsh 3.8.8-21Dan Walsh 3.8.8-20Dan Walsh 3.8.8-19Dan Walsh 3.8.8-18Dan Walsh 3.8.8-17Dan Walsh 3.8.8-16Dan Walsh 3.8.8-15Dan Walsh 3.8.8-14Dan Walsh 3.8.8-13Dan Walsh 3.8.8-12Dan Walsh 3.8.8-11Dan Walsh 3.8.8-10Dan Walsh 3.8.8-9Dan Walsh 3.8.8-8Dan Walsh 3.8.8-7Dan Walsh 3.8.8-6Dan Walsh 3.8.8-5Dan Walsh 3.8.8-4Dan Walsh 3.8.8-3Dan Walsh 3.8.8-2Dan Walsh 3.8.8-1Dan Walsh 3.8.7-3Dan Walsh 3.8.7-2Dan Walsh 3.8.7-1Dan Walsh 3.8.6-3Miroslav Grepl 3.8.6-2Dan Walsh 3.8.6-1Dan Walsh 3.8.5-1Dan Walsh 3.8.4-1Dan Walsh 3.8.3-4Dan Walsh 3.8.3-3Dan Walsh 3.8.3-2Dan Walsh 3.8.3-1Dan Walsh 3.8.2-1Dan Walsh 3.8.1-5Dan Walsh 3.8.1-4Dan Walsh 3.8.1-3Dan Walsh 3.8.1-2Dan Walsh 3.8.1-1Dan Walsh 3.7.19-22Dan Walsh 3.7.19-21Dan Walsh 3.7.19-20Dan Walsh 3.7.19-19Dan Walsh 3.7.19-17Dan Walsh 3.7.19-16Dan Walsh 3.7.19-15Dan Walsh 3.7.19-14Dan Walsh 3.7.19-13Dan Walsh 3.7.19-12Dan Walsh 3.7.19-11Dan Walsh 3.7.19-10Dan Walsh 3.7.19-9Dan Walsh 3.7.19-8Dan Walsh 3.7.19-7Dan Walsh 3.7.19-6Dan Walsh 3.7.19-5Dan Walsh 3.7.19-4Dan Walsh 3.7.19-3Dan Walsh 3.7.19-2Dan Walsh 3.7.19-1Dan Walsh 3.7.18-3Dan Walsh 3.7.18-2Dan Walsh 3.7.18-1Dan Walsh 3.7.17-6Dan Walsh 3.7.17-5Dan Walsh 3.7.17-4Dan Walsh 3.7.17-3Dan Walsh 3.7.17-2Dan Walsh 3.7.17-1Dan Walsh 3.7.16-2Dan Walsh 3.7.16-1Dan Walsh 3.7.15-4Dan Walsh 3.7.15-3Dan Walsh 3.7.15-2Dan Walsh 3.7.15-1Dan Walsh 3.7.14-5Dan Walsh 3.7.14-4Dan Walsh 3.7.14-3Dan Walsh 3.7.14-2Dan Walsh 3.7.14-1Dan Walsh 3.7.13-4Dan Walsh 3.7.13-3Dan Walsh 3.7.13-2Dan Walsh 3.7.13-1Dan Walsh 3.7.12-1Dan Walsh 3.7.11-1Dan Walsh 3.7.10-5Dan Walsh 3.7.10-4Dan Walsh 3.7.10-3Dan Walsh 3.7.10-2Dan Walsh 3.7.10-1Dan Walsh 3.7.9-4Dan Walsh 3.7.9-3Dan Walsh 3.7.9-2Dan Walsh 3.7.9-1Dan Walsh 3.7.8-11Dan Walsh 3.7.8-9Dan Walsh 3.7.8-8Dan Walsh 3.7.8-7Dan Walsh 3.7.8-6Dan Walsh 3.7.8-5Dan Walsh 3.7.8-4Dan Walsh 3.7.8-3Dan Walsh 3.7.8-2Dan Walsh 3.7.8-1Dan Walsh 3.7.7-3Dan Walsh 3.7.7-2Dan Walsh 3.7.7-1Dan Walsh 3.7.6-1Dan Walsh 3.7.5-8Dan Walsh 3.7.5-7Dan Walsh 3.7.5-6Dan Walsh 3.7.5-5Dan Walsh 3.7.5-4Dan Walsh 3.7.5-3Dan Walsh 3.7.5-2Dan Walsh 3.7.5-1Dan Walsh 3.7.4-4Dan Walsh 3.7.4-3Dan Walsh 3.7.4-2Dan Walsh 3.7.4-1Dan Walsh 3.7.3-1Dan Walsh 3.7.1-1Dan Walsh 3.6.33-2Dan Walsh 3.6.33-1Dan Walsh 3.6.32-17Dan Walsh 3.6.32-16Dan Walsh 3.6.32-15Dan Walsh 3.6.32-13Dan Walsh 3.6.32-12Dan Walsh 3.6.32-11Dan Walsh 3.6.32-10Dan Walsh 3.6.32-9Dan Walsh 3.6.32-8Dan Walsh 3.6.32-7Dan Walsh 3.6.32-6Dan Walsh 3.6.32-5Dan Walsh 3.6.32-4Dan Walsh 3.6.32-3Dan Walsh 3.6.32-2Dan Walsh 3.6.32-1Dan Walsh 3.6.31-5Dan Walsh 3.6.31-4Dan Walsh 3.6.31-3Dan Walsh 3.6.31-2Dan Walsh 3.6.30-6Dan Walsh 3.6.30-5Dan Walsh 3.6.30-4Dan Walsh 3.6.30-3Dan Walsh 3.6.30-2Dan Walsh 3.6.30-1Dan Walsh 3.6.29-2Dan Walsh 3.6.29-1Dan Walsh 3.6.28-9Dan Walsh 3.6.28-8Dan Walsh 3.6.28-7Dan Walsh 3.6.28-6Dan Walsh 3.6.28-5Dan Walsh 3.6.28-4Dan Walsh 3.6.28-3Dan Walsh 3.6.28-2Dan Walsh 3.6.28-1Dan Walsh 3.6.27-1Dan Walsh 3.6.26-11Dan Walsh 3.6.26-10Dan Walsh 3.6.26-9Bill Nottingham 3.6.26-8Dan Walsh 3.6.26-7Dan Walsh 3.6.26-6Dan Walsh 3.6.26-5Dan Walsh 3.6.26-4Dan Walsh 3.6.26-3Dan Walsh 3.6.26-2Dan Walsh 3.6.26-1Dan Walsh 3.6.25-1Dan Walsh 3.6.24-1Dan Walsh 3.6.23-2Dan Walsh 3.6.23-1Dan Walsh 3.6.22-3Dan Walsh 3.6.22-1Dan Walsh 3.6.21-4Dan Walsh 3.6.21-3Tom "spot" Callaway 3.6.21-2Dan Walsh 3.6.21-1Dan Walsh 3.6.20-2Dan Walsh 3.6.20-1Dan Walsh 3.6.19-5Dan Walsh 3.6.19-4Dan Walsh 3.6.19-3Dan Walsh 3.6.19-2Dan Walsh 3.6.19-1Dan Walsh 3.6.18-1Dan Walsh 3.6.17-1Dan Walsh 3.6.16-4Dan Walsh 3.6.16-3Dan Walsh 3.6.16-2Dan Walsh 3.6.16-1Dan Walsh 3.6.14-3Dan Walsh 3.6.14-2Dan Walsh 3.6.14-1Dan Walsh 3.6.13-3Dan Walsh 3.6.13-2Dan Walsh 3.6.13-1Dan Walsh 3.6.12-39Dan Walsh 3.6.12-38Dan Walsh 3.6.12-37Dan Walsh 3.6.12-36Dan Walsh 3.6.12-35Dan Walsh 3.6.12-34Dan Walsh 3.6.12-33Dan Walsh 3.6.12-31Dan Walsh 3.6.12-30Dan Walsh 3.6.12-29Dan Walsh 3.6.12-28Dan Walsh 3.6.12-27Dan Walsh 3.6.12-26Dan Walsh 3.6.12-25Dan Walsh 3.6.12-24Dan Walsh 3.6.12-23Dan Walsh 3.6.12-22Dan Walsh 3.6.12-21Dan Walsh 3.6.12-20Dan Walsh 3.6.12-19Dan Walsh 3.6.12-16Dan Walsh 3.6.12-15Dan Walsh 3.6.12-14Dan Walsh 3.6.12-13Dan Walsh 3.6.12-12Dan Walsh 3.6.12-11Dan Walsh 3.6.12-10Dan Walsh 3.6.12-9Dan Walsh 3.6.12-8Dan Walsh 3.6.12-7Dan Walsh 3.6.12-6Dan Walsh 3.6.12-5Dan Walsh 3.6.12-4Dan Walsh 3.6.12-3Dan Walsh 3.6.12-2Dan Walsh 3.6.12-1Dan Walsh 3.6.11-1Dan Walsh 3.6.10-9Dan Walsh 3.6.10-8Dan Walsh 3.6.10-7Dan Walsh 3.6.10-6Dan Walsh 3.6.10-5Dan Walsh 3.6.10-4Dan Walsh 3.6.10-3Dan Walsh 3.6.10-2Dan Walsh 3.6.10-1Dan Walsh 3.6.9-4Dan Walsh 3.6.9-3Dan Walsh 3.6.9-2Dan Walsh 3.6.9-1Dan Walsh 3.6.8-4Dan Walsh 3.6.8-3Dan Walsh 3.6.8-2Dan Walsh 3.6.8-1Dan Walsh 3.6.7-2Dan Walsh 3.6.7-1Dan Walsh 3.6.6-9Dan Walsh 3.6.6-8Fedora Release Engineering - 3.6.6-7Dan Walsh 3.6.6-6Dan Walsh 3.6.6-5Dan Walsh 3.6.6-4Dan Walsh 3.6.6-3Dan Walsh 3.6.6-2Dan Walsh 3.6.6-1Dan Walsh 3.6.5-3Dan Walsh 3.6.5-1Dan Walsh 3.6.4-6Dan Walsh 3.6.4-5Dan Walsh 3.6.4-4Dan Walsh 3.6.4-3Dan Walsh 3.6.4-2Dan Walsh 3.6.4-1Dan Walsh 3.6.3-13Dan Walsh 3.6.3-12Dan Walsh 3.6.3-11Dan Walsh 3.6.3-10Dan Walsh 3.6.3-9Dan Walsh 3.6.3-8Dan Walsh 3.6.3-7Dan Walsh 3.6.3-6Dan Walsh 3.6.3-3Dan Walsh 3.6.3-2Dan Walsh 3.6.3-1Dan Walsh 3.6.2-5Dan Walsh 3.6.2-4Dan Walsh 3.6.2-3Dan Walsh 3.6.2-2Dan Walsh 3.6.2-1Dan Walsh 3.6.1-15Dan Walsh 3.6.1-14Dan Walsh 3.6.1-13Dan Walsh 3.6.1-12Dan Walsh 3.6.1-11Dan Walsh 3.6.1-10Dan Walsh 3.6.1-9Dan Walsh 3.6.1-8Dan Walsh 3.6.1-7Dan Walsh 3.6.1-4Ignacio Vazquez-Abrams - 3.6.1-2Dan Walsh 3.5.13-19Dan Walsh 3.5.13-18Dan Walsh 3.5.13-17Dan Walsh 3.5.13-16Dan Walsh 3.5.13-15Dan Walsh 3.5.13-14Dan Walsh 3.5.13-13Dan Walsh 3.5.13-12Dan Walsh 3.5.13-11Dan Walsh 3.5.13-9Dan Walsh 3.5.13-8Dan Walsh 3.5.13-7Dan Walsh 3.5.13-6Dan Walsh 3.5.13-5Dan Walsh 3.5.13-4Dan Walsh 3.5.13-3Dan Walsh 3.5.13-2Dan Walsh 3.5.13-1Dan Walsh 3.5.12-3Dan Walsh 3.5.12-2Dan Walsh 3.5.12-1Dan Walsh 3.5.11-1Dan Walsh 3.5.10-3Dan Walsh 3.5.10-2Dan Walsh 3.5.10-1Dan Walsh 3.5.9-4Dan Walsh 3.5.9-3Dan Walsh 3.5.9-2Dan Walsh 3.5.9-1Dan Walsh 3.5.8-7Dan Walsh 3.5.8-6Dan Walsh 3.5.8-5Dan Walsh 3.5.8-4Dan Walsh 3.5.8-3Dan Walsh 3.5.8-1Dan Walsh 3.5.7-2Dan Walsh 3.5.7-1Dan Walsh 3.5.6-2Dan Walsh 3.5.6-1Dan Walsh 3.5.5-4Dan Walsh 3.5.5-3Dan Walsh 3.5.5-2Dan Walsh 3.5.4-2Dan Walsh 3.5.4-1Dan Walsh 3.5.3-1Dan Walsh 3.5.2-2Dan Walsh 3.5.1-5Dan Walsh 3.5.1-4Dan Walsh 3.5.1-3Dan Walsh 3.5.1-2Dan Walsh 3.5.1-1Dan Walsh 3.5.0-1Dan Walsh 3.4.2-14Dan Walsh 3.4.2-13Dan Walsh 3.4.2-12Dan Walsh 3.4.2-11Dan Walsh 3.4.2-10Dan Walsh 3.4.2-9Dan Walsh 3.4.2-8Dan Walsh 3.4.2-7Dan Walsh 3.4.2-6Dan Walsh 3.4.2-5Dan Walsh 3.4.2-4Dan Walsh 3.4.2-3Dan Walsh 3.4.2-2Dan Walsh 3.4.2-1Dan Walsh 3.4.1-5Dan Walsh 3.4.1-3Dan Walsh 3.4.1-2Dan Walsh 3.4.1-1Dan Walsh 3.3.1-48Dan Walsh 3.3.1-47Dan Walsh 3.3.1-46Dan Walsh 3.3.1-45Dan Walsh 3.3.1-44Dan Walsh 3.3.1-43Dan Walsh 3.3.1-42Dan Walsh 3.3.1-41Dan Walsh 3.3.1-39Dan Walsh 3.3.1-37Dan Walsh 3.3.1-36Dan Walsh 3.3.1-33Dan Walsh 3.3.1-32Dan Walsh 3.3.1-31Dan Walsh 3.3.1-30Dan Walsh 3.3.1-29Dan Walsh 3.3.1-28Dan Walsh 3.3.1-27Dan Walsh 3.3.1-26Dan Walsh 3.3.1-25Dan Walsh 3.3.1-24Dan Walsh 3.3.1-23Dan Walsh 3.3.1-22Dan Walsh 3.3.1-21Dan Walsh 3.3.1-20Dan Walsh 3.3.1-19Dan Walsh 3.3.1-18Dan Walsh 3.3.1-17Dan Walsh 3.3.1-16Dan Walsh 3.3.1-15Bill Nottingham 3.3.1-14Dan Walsh 3.3.1-13Dan Walsh 3.3.1-12Dan Walsh 3.3.1-11Dan Walsh 3.3.1-10Dan Walsh 3.3.1-9Dan Walsh 3.3.1-8Dan Walsh 3.3.1-6Dan Walsh 3.3.1-5Dan Walsh 3.3.1-4Dan Walsh 3.3.1-2Dan Walsh 3.3.1-1Dan Walsh 3.3.0-2Dan Walsh 3.3.0-1Dan Walsh 3.2.9-2Dan Walsh 3.2.9-1Dan Walsh 3.2.8-2Dan Walsh 3.2.8-1Dan Walsh 3.2.7-6Dan Walsh 3.2.7-5Dan Walsh 3.2.7-3Dan Walsh 3.2.7-2Dan Walsh 3.2.7-1Dan Walsh 3.2.6-7Dan Walsh 3.2.6-6Dan Walsh 3.2.6-5Dan Walsh 3.2.6-4Dan Walsh 3.2.6-3Dan Walsh 3.2.6-2Dan Walsh 3.2.6-1Dan Walsh 3.2.5-25Dan Walsh 3.2.5-24Dan Walsh 3.2.5-22Dan Walsh 3.2.5-21Dan Walsh 3.2.5-20Dan Walsh 3.2.5-19Dan Walsh 3.2.5-18Dan Walsh 3.2.5-17Dan Walsh 3.2.5-16Dan Walsh 3.2.5-15Dan Walsh 3.2.5-14Dan Walsh 3.2.5-13Dan Walsh 3.2.5-12Dan Walsh 3.2.5-11Dan Walsh 3.2.5-10Dan Walsh 3.2.5-9Dan Walsh 3.2.5-8Dan Walsh 3.2.5-7Dan Walsh 3.2.5-6Dan Walsh 3.2.5-5Dan Walsh 3.2.5-4Dan Walsh 3.2.5-3Dan Walsh 3.2.5-2Dan Walsh 3.2.5-1Dan Walsh 3.2.4-5Dan Walsh 3.2.4-4Dan Walsh 3.2.4-3Dan Walsh 3.2.4-1Dan Walsh 3.2.4-1Dan Walsh 3.2.3-2Dan Walsh 3.2.3-1Dan Walsh 3.2.2-1Dan Walsh 3.2.1-3Dan Walsh 3.2.1-1Dan Walsh 3.1.2-2Dan Walsh 3.1.2-1Dan Walsh 3.1.1-1Dan Walsh 3.1.0-1Dan Walsh 3.0.8-30Dan Walsh 3.0.8-28Dan Walsh 3.0.8-27Dan Walsh 3.0.8-26Dan Walsh 3.0.8-25Dan Walsh 3.0.8-24Dan Walsh 3.0.8-23Dan Walsh 3.0.8-22Dan Walsh 3.0.8-21Dan Walsh 3.0.8-20Dan Walsh 3.0.8-19Dan Walsh 3.0.8-18Dan Walsh 3.0.8-17Dan Walsh 3.0.8-16Dan Walsh 3.0.8-15Dan Walsh 3.0.8-14Dan Walsh 3.0.8-13Dan Walsh 3.0.8-12Dan Walsh 3.0.8-11Dan Walsh 3.0.8-10Dan Walsh 3.0.8-9Dan Walsh 3.0.8-8Dan Walsh 3.0.8-7Dan Walsh 3.0.8-5Dan Walsh 3.0.8-4Dan Walsh 3.0.8-3Dan Walsh 3.0.8-2Dan Walsh 3.0.8-1Dan Walsh 3.0.7-10Dan Walsh 3.0.7-9Dan Walsh 3.0.7-8Dan Walsh 3.0.7-7Dan Walsh 3.0.7-6Dan Walsh 3.0.7-5Dan Walsh 3.0.7-4Dan Walsh 3.0.7-3Dan Walsh 3.0.7-2Dan Walsh 3.0.7-1Dan Walsh 3.0.6-3Dan Walsh 3.0.6-2Dan Walsh 3.0.6-1Dan Walsh 3.0.5-11Dan Walsh 3.0.5-10Dan Walsh 3.0.5-9Dan Walsh 3.0.5-8Dan Walsh 3.0.5-7Dan Walsh 3.0.5-6Dan Walsh 3.0.5-5Dan Walsh 3.0.5-4Dan Walsh 3.0.5-3Dan Walsh 3.0.5-2Dan Walsh 3.0.5-1Dan Walsh 3.0.4-6Dan Walsh 3.0.4-5Dan Walsh 3.0.4-4Dan Walsh 3.0.4-3Dan Walsh 3.0.4-2Dan Walsh 3.0.4-1Dan Walsh 3.0.3-6Dan Walsh 3.0.3-5Dan Walsh 3.0.3-4Dan Walsh 3.0.3-3Dan Walsh 3.0.3-2Dan Walsh 3.0.3-1Dan Walsh 3.0.2-9Dan Walsh 3.0.2-8Dan Walsh 3.0.2-7Dan Walsh 3.0.2-5Dan Walsh 3.0.2-4Dan Walsh 3.0.2-3Dan Walsh 3.0.2-2Dan Walsh 3.0.1-5Dan Walsh 3.0.1-4Dan Walsh 3.0.1-3Dan Walsh 3.0.1-2Dan Walsh 3.0.1-1Dan Walsh 2.6.5-3Dan Walsh 2.6.5-2Dan Walsh 2.6.4-7Dan Walsh 2.6.4-6Dan Walsh 2.6.4-5Dan Walsh 2.6.4-2Dan Walsh 2.6.4-1Dan Walsh 2.6.3-1Dan Walsh 2.6.2-1Dan Walsh 2.6.1-4Dan Walsh 2.6.1-3Dan Walsh 2.6.1-2Dan Walsh 2.6.1-1Dan Walsh 2.5.12-12Dan Walsh 2.5.12-11Dan Walsh 2.5.12-10Dan Walsh 2.5.12-8Dan Walsh 2.5.12-5Dan Walsh 2.5.12-4Dan Walsh 2.5.12-3Dan Walsh 2.5.12-2Dan Walsh 2.5.12-1Dan Walsh 2.5.11-8Dan Walsh 2.5.11-7Dan Walsh 2.5.11-6Dan Walsh 2.5.11-5Dan Walsh 2.5.11-4Dan Walsh 2.5.11-3Dan Walsh 2.5.11-2Dan Walsh 2.5.11-1Dan Walsh 2.5.10-2Dan Walsh 2.5.10-1Dan Walsh 2.5.9-6Dan Walsh 2.5.9-5Dan Walsh 2.5.9-4Dan Walsh 2.5.9-3Dan Walsh 2.5.9-2Dan Walsh 2.5.8-8Dan Walsh 2.5.8-7Dan Walsh 2.5.8-6Dan Walsh 2.5.8-5Dan Walsh 2.5.8-4Dan Walsh 2.5.8-3Dan Walsh 2.5.8-2Dan Walsh 2.5.8-1Dan Walsh 2.5.7-1Dan Walsh 2.5.6-1Dan Walsh 2.5.5-2Dan Walsh 2.5.5-1Dan Walsh 2.5.4-2Dan Walsh 2.5.4-1Dan Walsh 2.5.3-3Dan Walsh 2.5.3-2Dan Walsh 2.5.3-1Dan Walsh 2.5.2-6Dan Walsh 2.5.2-5Dan Walsh 2.5.2-4Dan Walsh 2.5.2-3Dan Walsh 2.5.2-2Dan Walsh 2.5.2-1Dan Walsh 2.5.1-5Dan Walsh 2.5.1-4Dan Walsh 2.5.1-2Dan Walsh 2.5.1-1Dan Walsh 2.4.6-20Dan Walsh 2.4.6-19Dan Walsh 2.4.6-18Dan Walsh 2.4.6-17Dan Walsh 2.4.6-16Dan Walsh 2.4.6-15Dan Walsh 2.4.6-14Dan Walsh 2.4.6-13Dan Walsh 2.4.6-12Dan Walsh 2.4.6-11Dan Walsh 2.4.6-10Dan Walsh 2.4.6-9Dan Walsh 2.4.6-8Dan Walsh 2.4.6-7Dan Walsh 2.4.6-6Dan Walsh 2.4.6-5Dan Walsh 2.4.6-4Dan Walsh 2.4.6-3Dan Walsh 2.4.6-1Dan Walsh 2.4.5-4Dan Walsh 2.4.5-3Dan Walsh 2.4.5-2Dan Walsh 2.4.5-1Dan Walsh 2.4.4-2Dan Walsh 2.4.4-2Dan Walsh 2.4.4-1Dan Walsh 2.4.3-13Dan Walsh 2.4.3-12Dan Walsh 2.4.3-11Dan Walsh 2.4.3-10Dan Walsh 2.4.3-9Dan Walsh 2.4.3-8Dan Walsh 2.4.3-7Dan Walsh 2.4.3-6Dan Walsh 2.4.3-5Dan Walsh 2.4.3-4Dan Walsh 2.4.3-3Dan Walsh 2.4.3-2Dan Walsh 2.4.3-1Dan Walsh 2.4.2-8Dan Walsh 2.4.2-7James Antill 2.4.2-6Dan Walsh 2.4.2-5Dan Walsh 2.4.2-4Dan Walsh 2.4.2-3Dan Walsh 2.4.2-2Dan Walsh 2.4.2-1Dan Walsh 2.4.1-5Dan Walsh 2.4.1-4Dan Walsh 2.4.1-3Dan Walsh 2.4.1-2Dan Walsh 2.4-4Dan Walsh 2.4-3Dan Walsh 2.4-2Dan Walsh 2.4-1Dan Walsh 2.3.19-4Dan Walsh 2.3.19-3Dan Walsh 2.3.19-2Dan Walsh 2.3.19-1James Antill 2.3.18-10James Antill 2.3.18-9Dan Walsh 2.3.18-8Dan Walsh 2.3.18-7Dan Walsh 2.3.18-6Dan Walsh 2.3.18-5Dan Walsh 2.3.18-4Dan Walsh 2.3.18-3Dan Walsh 2.3.18-2Dan Walsh 2.3.18-1Dan Walsh 2.3.17-2Dan Walsh 2.3.17-1Dan Walsh 2.3.16-9Dan Walsh 2.3.16-8Dan Walsh 2.3.16-7Dan Walsh 2.3.16-6Dan Walsh 2.3.16-5Dan Walsh 2.3.16-4Dan Walsh 2.3.16-2Dan Walsh 2.3.16-1Dan Walsh 2.3.15-2Dan Walsh 2.3.15-1Dan Walsh 2.3.14-8Dan Walsh 2.3.14-7Dan Walsh 2.3.14-6Dan Walsh 2.3.14-4Dan Walsh 2.3.14-3Dan Walsh 2.3.14-2Dan Walsh 2.3.14-1Dan Walsh 2.3.13-6Dan Walsh 2.3.13-5Dan Walsh 2.3.13-4Dan Walsh 2.3.13-3Dan Walsh 2.3.13-2Dan Walsh 2.3.13-1Dan Walsh 2.3.12-2Dan Walsh 2.3.12-1Dan Walsh 2.3.11-1Dan Walsh 2.3.10-7Dan Walsh 2.3.10-6Dan Walsh 2.3.10-3Dan Walsh 2.3.10-1Dan Walsh 2.3.9-6Dan Walsh 2.3.9-5Dan Walsh 2.3.9-4Dan Walsh 2.3.9-3Dan Walsh 2.3.9-2Dan Walsh 2.3.9-1Dan Walsh 2.3.8-2Dan Walsh 2.3.7-1Dan Walsh 2.3.6-4Dan Walsh 2.3.6-3Dan Walsh 2.3.6-2Dan Walsh 2.3.6-1Dan Walsh 2.3.5-1Dan Walsh 2.3.4-1Dan Walsh 2.3.3-20Dan Walsh 2.3.3-19Dan Walsh 2.3.3-18Dan Walsh 2.3.3-17Dan Walsh 2.3.3-16Dan Walsh 2.3.3-15Dan Walsh 2.3.3-14Dan Walsh 2.3.3-13Dan Walsh 2.3.3-12Dan Walsh 2.3.3-11Dan Walsh 2.3.3-10Dan Walsh 2.3.3-9Dan Walsh 2.3.3-8Dan Walsh 2.3.3-7Dan Walsh 2.3.3-6Dan Walsh 2.3.3-5Dan Walsh 2.3.3-4Dan Walsh 2.3.3-3Dan Walsh 2.3.3-2Dan Walsh 2.3.3-1Dan Walsh 2.3.2-4Dan Walsh 2.3.2-3Dan Walsh 2.3.2-2Dan Walsh 2.3.2-1Dan Walsh 2.3.1-1Dan Walsh 2.2.49-1Dan Walsh 2.2.48-1Dan Walsh 2.2.47-5Dan Walsh 2.2.47-4Dan Walsh 2.2.47-3Dan Walsh 2.2.47-1Dan Walsh 2.2.46-2Dan Walsh 2.2.46-1Dan Walsh 2.2.45-3Dan Walsh 2.2.45-2Dan Walsh 2.2.45-1Dan Walsh 2.2.44-1Dan Walsh 2.2.43-4Dan Walsh 2.2.43-3Dan Walsh 2.2.43-2Dan Walsh 2.2.43-1Dan Walsh 2.2.42-4Dan Walsh 2.2.42-3Dan Walsh 2.2.42-2Dan Walsh 2.2.42-1Dan Walsh 2.2.41-1Dan Walsh 2.2.40-2Dan Walsh 2.2.40-1Dan Walsh 2.2.39-2Dan Walsh 2.2.39-1Dan Walsh 2.2.38-6Dan Walsh 2.2.38-5Dan Walsh 2.2.38-4Dan Walsh 2.2.38-3Dan Walsh 2.2.38-2Dan Walsh 2.2.38-1Dan Walsh 2.2.37-1Dan Walsh 2.2.36-2Dan Walsh 2.2.36-1James Antill 2.2.35-2Dan Walsh 2.2.35-1Dan Walsh 2.2.34-3Dan Walsh 2.2.34-2Dan Walsh 2.2.34-1Dan Walsh 2.2.33-1Dan Walsh 2.2.32-2Dan Walsh 2.2.32-1Dan Walsh 2.2.31-1Dan Walsh 2.2.30-2Dan Walsh 2.2.30-1Dan Walsh 2.2.29-6Russell Coker 2.2.29-5Dan Walsh 2.2.29-4Dan Walsh 2.2.29-3Dan Walsh 2.2.29-2Dan Walsh 2.2.29-1Dan Walsh 2.2.28-3Dan Walsh 2.2.28-2Dan Walsh 2.2.28-1Dan Walsh 2.2.27-1Dan Walsh 2.2.25-3Dan Walsh 2.2.25-2Dan Walsh 2.2.24-1Dan Walsh 2.2.23-19Dan Walsh 2.2.23-18Dan Walsh 2.2.23-17Karsten Hopp 2.2.23-16Dan Walsh 2.2.23-15Dan Walsh 2.2.23-14Dan Walsh 2.2.23-13Dan Walsh 2.2.23-12Jeremy Katz - 2.2.23-11Jeremy Katz - 2.2.23-10Dan Walsh 2.2.23-9Dan Walsh 2.2.23-8Dan Walsh 2.2.23-7Dan Walsh 2.2.23-5Dan Walsh 2.2.23-4Dan Walsh 2.2.23-3Dan Walsh 2.2.23-2Dan Walsh 2.2.23-1Dan Walsh 2.2.22-2Dan Walsh 2.2.22-1Dan Walsh 2.2.21-9Dan Walsh 2.2.21-8Dan Walsh 2.2.21-7Dan Walsh 2.2.21-6Dan Walsh 2.2.21-5Dan Walsh 2.2.21-4Dan Walsh 2.2.21-3Dan Walsh 2.2.21-2Dan Walsh 2.2.21-1Dan Walsh 2.2.20-1Dan Walsh 2.2.19-2Dan Walsh 2.2.19-1Dan Walsh 2.2.18-2Dan Walsh 2.2.18-1Dan Walsh 2.2.17-2Dan Walsh 2.2.16-1Dan Walsh 2.2.15-4Dan Walsh 2.2.15-3Dan Walsh 2.2.15-1Dan Walsh 2.2.14-2Dan Walsh 2.2.14-1Dan Walsh 2.2.13-1Dan Walsh 2.2.12-1Dan Walsh 2.2.11-2Dan Walsh 2.2.11-1Dan Walsh 2.2.10-1Dan Walsh 2.2.9-2Dan Walsh 2.2.9-1Dan Walsh 2.2.8-2Dan Walsh 2.2.7-1Dan Walsh 2.2.6-3Dan Walsh 2.2.6-2Dan Walsh 2.2.6-1Dan Walsh 2.2.5-1Dan Walsh 2.2.4-1Dan Walsh 2.2.3-1Dan Walsh 2.2.2-1Dan Walsh 2.2.1-1Dan Walsh 2.1.13-1Dan Walsh 2.1.12-3Dan Walsh 2.1.11-1Dan Walsh 2.1.10-1Jeremy Katz - 2.1.9-2Dan Walsh 2.1.9-1Dan Walsh 2.1.8-3Dan Walsh 2.1.8-2Dan Walsh 2.1.8-1Dan Walsh 2.1.7-4Dan Walsh 2.1.7-3Dan Walsh 2.1.7-2Dan Walsh 2.1.7-1Dan Walsh 2.1.6-24Dan Walsh 2.1.6-23Dan Walsh 2.1.6-22Dan Walsh 2.1.6-21Dan Walsh 2.1.6-20Dan Walsh 2.1.6-18Dan Walsh 2.1.6-17Dan Walsh 2.1.6-16Dan Walsh 2.1.6-15Dan Walsh 2.1.6-14Dan Walsh 2.1.6-13Dan Walsh 2.1.6-11Dan Walsh 2.1.6-10Dan Walsh 2.1.6-9Dan Walsh 2.1.6-8Dan Walsh 2.1.6-5Dan Walsh 2.1.6-4Dan Walsh 2.1.6-3Dan Walsh 2.1.6-2Dan Walsh 2.1.6-1Dan Walsh 2.1.4-2Dan Walsh 2.1.4-1Dan Walsh 2.1.3-1Jeremy Katz - 2.1.2-3Dan Walsh 2.1.2-2Dan Walsh 2.1.2-1Dan Walsh 2.1.1-3Dan Walsh 2.1.1-2Dan Walsh 2.1.1-1Dan Walsh 2.1.0-3Dan Walsh 2.1.0-2.Dan Walsh 2.1.0-1.Dan Walsh 2.0.11-2.Dan Walsh 2.0.11-1.Dan Walsh 2.0.9-1.Dan Walsh 2.0.8-1.Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.6-2Dan Walsh 2.0.5-4Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1- Fix livecd_run() interface - Add labeling for /var/spool/postfix/dev/log * support postfix chroot - Allow sandbox_xserver_t to send signals - These are needed with CRL fetching is enabled - Razor labeling is not used no longer - Add label for /sbin/xtables-multi - Add support for winshadow port and allow iscsid to connect to this port - Allow chrome_sandbox_t to send all signals to sandbox_nacl_t - Allow sandbox_nacl to setsched on its process - Dontaudit fail2ban looking at gnome content - fix label for /usr/lib(64)/iscan/network- Fix BOINC bug- BOinc fixes - Allow mysqld_safe to delete the mysql_db_t sock_file - Dovecot has a new fifo_file /var/run/stats-mail- Allow gnomeclock to send system log msgs - Users that use X and spice need to use the virtio device - squashfs supports extended attributes - Allow system_cronjob to dbus chat with NetworkManager - Allow all postfix domains to use the fifo_file - Allow squid to check the network state - Allow spamd to send mail- Fix typo in ssh.if- Allow spamd and clamd to steam connect to each other - Allow colord to execute ifconfig - Allow smbcontrol to signal themselves - Make faillog MLS trusted to make sudo_$1_t working- Backport MCS fixes from F16 - Other chrome fixes from F16- Backport chrome fixes - Backport cloudform policy- Fixes for systemd - Add FIPS suppport for dirsrv- Allow sa-update to update rules - Allow sa-update to read spamd tmp file - Allow screen to read all domain state - Allow sa-update to execute shell - More fixes for sa-update running out of cron job - Allow initrc to manage cron system spool - Fixes for collectd policy - Fixes added during clean up bugzillas - Dontaudit fail2ban_client_t sys_tty_config capability - Fix for puppet which does execute check on passwd - ricci_modservice send syslog msgs - Fix dev_dontaudit_write_mtrr() interface- Make mta_role() active - Add additional gitweb file context labeling - Allow asterisk to connect to jabber client port - Allow sssd to read the contents of /sys/class/net/$IFACE_NAME - Allow fsdaemon dac_override- Add logging_syslogd_can_sendmail boolean - Add support for exim and confined users - support for ommail module to send logs via mail - Add execmem_execmod() to execmem role - Allow pptp to send generic signal to kernel threads - Fix kerberos_manage_host_rcache() interface- Fixes for mock- Backport F16 fixes - livecd fixes - systemd fixes- Allow hostname read network state - Allow syslog to manage all log files - Add use_fusefs_home_dirs boolean for chrome - Make vdagent working with confined users - Fix syslog port definition - Allow openvpn to set its process priority when the nice parameter is used - Restorecond should be able to watch and relabel devices in /dev - Alow hddtemp to perform DNS name resolution- Fixes for zarafa, postfix policy - Backport collect policy- Backport ABRT changes - Make tmux working with scree policy - Allow root cron jobs can't run without unconfined - add interface to dontaudit writes to urand, needed by libra - Add label for /var/cache/krb5rcache directory- Allow jabberd_router_t to read system state - Rename oracledb_port to oracle_port - Allow rgmanager executes init script files in initrc_t domain which ensure proper transitions - screen wants to manage sock file in screen home dirs - Make screen working with confined users - Allow gssd to search access on the directory /proc/fs/nfsd- More fixes for postfix policy - Allow virsh_t setsched - Add mcelog_log_t type for mcelog log file - Add virt_ptynode attribute- Add l2tpd policy - Fixes for abrt - Backport fail2ban_client policy- Allow getcap, setcap for syslogd - Fix label for /usr/lib64/opera/opera- Make mozilla_plugin_tmpfs_t as userdom_user_tmpfs_content() - Allow init to delete all pid sockets - Allow colord to read /proc/stat - Add label for /var/www/html/wordpress/wp-content/plugins directory - Allow pppd to search /var/lock dir - puppetmaster use nsswitch: #711804 - Update abrt to match rawhide policy - allow privoxy to read network data - support gecko mozilla browser plugin - Allow chrome_sandbox to execute content in nfs homedir - postfix_qmgr needs to read /var/spool/postfix/deferred - abrt_t needs fsetid- Fixes for zarafa policy - Other fixes for fail2ban - Allow keyring to drop capabilities - Allow cobblerd to send syslog messages - Allow xserver to read/write the xserver_misk device - ppp also installs /var/log/ppp and /var/run/ppp directories * remove filetrans rules - fix for pppd_lock - Allow fail2ban run ldconfig - Allow lvm to read/write pipes inherited from login programs- Fix /var/lock labeling issue- Allow ssh to execute systemctl - fail2ban fixes related to /tmp directory - Allow puppetmaster to create dirs in /var/run/puppet- Add label for /var/lock/ppp - Fixes for colord policy - Allow sys_chroot for postfix domains- Add label for dev/ati/card* - Allowe secadm to manage selinux config files- Add Dominicks patch for dccp_socket - dnsmasq needs to read nm-dns-dnsmasq.conf in /var/run/ - Colord inherits open file descriptors from the users...' - cgred needs auth_use_nsswitch() - apcupsd lock file was missing file context specificatio... - Make cron work - Allow clamav to manage amavis spool files - Use httpd_can_sendmail boolean also for httpd_suexec_t - Add fenced_can_ssh boolean - Add dev_dontaudit_read_generic_files() for hplip - Allow xauthority to create shared memory - Make postfix user domains application_domains - Allow xend to sys_admin privs - Allow mount to read usr files - Allow logrotate to connect to init script using unix stream socket - Allow nsplugin_t to getattr on gpmctl- Allow logrotate to connect to init script using unix domain stream socket - Allow shorewall read and write inherited user domain pty/tty - virt will attempt to us another virtualizations pulsesaudio tmpfs_t, ignore error - Allow colord to get the attributes of fixed disk device nodes - Allow nsplugin_t to getattr on gpmctl - Allow mozilla_plugin to connect to pcscd over an unix stream socket - Allow logrotate to execute systemctl - colord wants to read files in users homedir - Remote login should create user_tmp_t content not its own tmp files - Allow psad signal - Fix cobbler_read_lib_files interface - Allow rlogind to r/w user terminals - Allow prelink_cron_system_t to relabel content and ignore obj_id - Allow gnomeclock_systemctl_t to list init_var_run_t - Dbus domains will inherit fds from the init system- Add label for /lib/upstart/init - Allow colord to getattr on /proc/scsi/scsi - Dontaudit sys_module for ifconfig and irqbalance- Make telepathy working with confined users - Allow colord signal - prelink_cron_system_t needs to be able to detect systemd - Allow cupsd_config_t to read user's symlinks in /tmp- Fixes for colord and vnstatd policy - telepathy needs to dbus chat with unconfined_t and unconfined_dbusd_t - Remove dbus.patch and move it to policy-F15.patch- Adding in unconfined_r telepathy domains so telepathy apps will not crash on update- Fix dbus_session_domain - Stop transitiong from unconfined_t to telepathy domains or to gkeyring domains- Allow init_t getcap and setcap - Allow namespace_init_t to use nsswitch - aisexec will execute corosync - colord tries to read files off noxattr file systems- Add back transition from unconfined to telepathy domains- Allow spamd to sent mail - Needs to be able to write to its systemhigh log file - Fix aide policy to run on MLS boxes - Allow NetworkManager to manage content in /etc/NetworkManager/system-connections - Allow user_t and staff_t access to generic scsi to handle locally plugged in scanners - Allow telepath_msn_t to read /proc/PARENT/cmdline - ftpd needs kill capability - Allow telepath_msn_t to connect to sip port - keyring daemon does not work on nfs homedirs - Allow $1_sudo_t to read default SELinux context - Add label for tgtd sock file in /var/run/ - Add apache_exec_rotatelogs interface - allow all zaraha domains to signal themselves, server writes to /tmp - Allow syslog to read the process state - Add label for /usr/lib/chromium-browser/chrome - Remove the telepathy transition from unconfined_t - Dontaudit sandbox domains trying to mounton sandbox_file_t, this is caused by fuse mounts - Allow initrc_t domain to manage abrt pid files - Add support for AEOLUS project - Virt_admin should be allowed to manage images and processes - Allow plymountd to send signals to init - Change labeling of fping6- xdm_t needs getsession for switch user - Every app that used to exec init is now execing systemdctl - Allow squid to manage krb5_host_rcache_t files - Allow foghorn to connect to agentx port - Fixes for colord policy- Need to allow apps that use locks to read /var/lock if it is a symlink - Allow systemd to create tasks - Logwatch reads /etc/sysctl.conf and /proc/sys/net/ipv4/ip_forward - Fixes for foghorn policy - Add labeling for systemd unit files - Allow gnomeclok to enable ntpd service using systemctl - systemd_systemctl_t domain was added - Add label for matahari-broker.pid file - We want to remove untrustedmcsprocess from ability to read /proc/pid - Fixes for matahari policy- Allow colord to use unix_dgram_socket - Allow apps that search pids to read /var/run if it is a lnk_file - iscsid_t creates its own directory - Allow init to list var_lock_t dir - apm needs to verify user accounts auth_use_nsswitch- Add /var/run/lock /var/lock definition to file_contexts.subs - nslcd_t is looking for kerberos cc files - SSH_USE_STRONG_RNG is 1 which requires /dev/random - Fix auth_rw_faillog definition - Allow sysadm_t to set attributes on fixed disks - allow user domains to execute lsof and look at application sockets - prelink_cron job calls telinit -u if init is rewritten - Fixes to run qemu_t from staff_t- Fix label for /var/run/udev to udev_var_run_t- Add label for /run/udev - Mock needs to be able to read network state- Other fixes to make boot working- A lot of fixes making /run change working - Add subs file to equate /var/run with /run and /var/lock with /run/lock - Allow rgmanager to send the kill signal to all users - Allow ssh_t to search /root/.ssh and create it if it does not exist - dontaudit read of user_tmp_t from load_policy - Allow abrt fowner capability - Allow audit daemons to change the run level in MLS environments - Since /var/lock is moving to /run/lock. We need to allow all interfaces for lock files to search var_run_t - Add file labelfor MathKernel - Add label for /dev/dlm* - Allow systemd_tmpfiles_t to manage sandbox data - More /run directories labels - rlogind sends kill signal to chkpwd_t - systemd is now mounting on /var/lock- Make Makefile/Rules.modular run sepolgen-ifgen during build to check if files for bugs -systemd is going to be useing /run and /run/lock for early bootup files. - Fix some comments in rlogin.if - Add policy for KDE backlighthelper - sssd needs to read ~/.k5login in nfs, cifs or fusefs file systems - sssd wants to read .k5login file in users homedir - setroubleshoot reads executables to see if they have TEXTREL - Add /var/spool/audit support for new version of audit - Remove kerberos_connect_524() interface calling - Combine kerberos_master_port_t and kerberos_port_t - systemd has setup /dev/kmsg as stderr for apps it executes - Need these access so that init can impersonate sockets on unix_dgram_socket- Add syslogd_exec_t label for systemd-kmsg-syslogd - ipsec_mgmt_t wants to cause ipsec_t to dump core, needs to be allowed - Allow rythmbox and other apps to share music over daap port - Allow qemu and pulseaudio to work together - Allow httpd to create socket file in /tmp - Allow tuned to write to sysfs - Allow systemd_tmpfiles to send kernel messages - Add a dev_filetrans to readahead_manage_pid_files so any callers can create directories and files in /dev with this label - mrtg needs to be able to create /var/lock/mrtg - Add label for /usr/share/shorewall/getparams - xdm needs to read KDE config files - Smolt needs to look at urand and read hwdata - google talk plugin in nsplugin is listing the contents - Add support for KDE ksysguardprocesslist_helper - Add support for a new cluster service - foghorn - gnome-control-center reads colord lib files when monitor is plugged - Add interface for defining node_types- Fix multiple specification for boot.log - devicekit leaks file descriptors to setfiles_t - Change all all_nodes to generic_node and all_if to generic_if - Should not use deprecated interface - Switch from using all_nodes to generic_node and from all_if to generic_if - Add support for xfce4-notifyd - Fix file context to show several labels as SystemHigh - seunshare needs to be able to mounton nfs/cifs/fusefs homedirs - Add etc_runtime_t label for /etc/securetty - Fixes to allow xdm_t to start gkeyringd_USERTYPE_t directly - login.krb needs to be able to write user_tmp_t - dirsrv needs to bind to port 7390 for dogtag - Fix a bug in gpg policy - gpg sends audit messages - Allow qpid to manage matahari files- Initial policy for matahari - Add dev_read_watchdog - Allow clamd to connect clamd port - Add support for kcmdatetimehelper - Allow shutdown to setrlimit and sys_nice - Allow systemd_passwd to talk to /dev/log before udev or syslog is running - Purge chr_file and blk files on /tmp - Fixes for pads - Fixes for piranha-pulse - gpg_t needs to be able to encyprt anything owned by the user- More dontaudits of writes from readahead - Dontaudit readahead_t file_type:dir write, to cover up kernel bug - systemd_tmpfiles needs to relabel faillog directory as well as the file - Allow hostname and consoletype to r/w inherited initrc_tmp_t files handline hostname >> /tmp/myhost- Update to upstream - Fixes for telepathy - Add port defition for ssdp port - add policy for /bin/systemd-notify from Dan - Mount command requires users read mount_var_run_t - colord needs to read konject_uevent_socket - User domains connect to the gkeyring socket - Add colord policy and allow user_t and staff_t to dbus chat with it - Add lvm_exec_t label for kpartx - Dontaudit reading the mail_spool_t link from sandbox -X - systemd is creating sockets in avahi_var_run and system_dbusd_var_run- Make a lot of modules independent - Update to make new seunshare/sandbox work - allow virt_domains to use inherited noxattrs file systems - Dont allow svirt_t to send kill signals - Cleanup policy to allow less modules in base - Cleanup to allow minimal files in base policy- gpg_t needs to talk to gnome-keyring - nscd wants to read /usr/tmp->/var/tmp to generate randomziation in unixchkpwd - enforce MCS labeling on nodes - Allow arpwatch to read meminfo - Allow gnomeclock to send itself signals - init relabels /dev/.udev files on boot - gkeyringd has to transition back to staff_t when it runs commands in bin_t or shell_exec_t - nautilus checks access on /media directory before mounting usb sticks, dontaudit access_check on mnt_t - dnsmasq can run as a dbus service, needs acquire service - mysql_admin should be allowed to connect to mysql service - virt creates monitor sockets in the users home dir- Allow sysadm type people to look at usb devices - Cron needs to be able to run shutdown - virt creates monitor sockets in the users home dir- gnome-keyring-daemon needs nsswitch getpw calls - Symantic places a pipe in the /opt directory tree that it expects syslogd to be able to write to - keyringd daemon sends/recieves dbus messages from user types - sudo domains need to be able to signal all users "sysadm_t" - allow systemd-ask-passwd to create unix dgram socket - allow puppet master to read usr files - fixes for mock policy - Add mock_enable_homedirs boolean - Allow systemd to relabel /dev - Moving to only one file type sandbox_file_t - mta search /var/lib/logcheck - sssd needs to bind to random UDP ports - Allow amavis sigkill - Add systemd_passwd_agent_dev_template interface and use it for lvm- Allow usbhid-ups to read hardware state information - systemd-tmpfiles has moved - Allo cgroup to sys_tty_config - For some reason prelink is attempting to read gconf settings - Add allow_daemons_use_tcp_wrapper boolean - Add label for ~/.cache/wocky to make telepathy work in enforcing mode - Add label for char devices /dev/dasd* - Fix for apache_role - Allow amavis to talk to nslcd - allow all sandbox to read selinux poilcy config files - Allow cluster domains to use the system bus and send each other dbus messages- Update to upstream - Allow systemd-tmpfiles to getattr on all files/dirs- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Update to ref policy - cgred needs chown capability - Add /dev/crash crash_dev_t - systemd-readahead wants to use fanotify which means readahead_t needs sys_admin capability- New labeling for postfmulti #675654 - dontaudit xdm_t listing noxattr file systems - dovecot-auth needs to be able to connect to mysqld via the network as well as locally - shutdown is passed stdout to a xdm_log_t file - smartd creates a fixed disk device - dovecot_etc_t contains a lnk_file that domains need to read - mount needs to be able to read etc_runtim_t:lnk_file since in rawhide this is a link created at boot- syslog_t needs syslog capability - dirsrv needs to be able to create /var/lib/snmp - Fix labeling for dirsrv - Fix for dirsrv policy missing manage_dirs_pattern - corosync needs to delete clvm_tmpfs_t files - qdiskd needs to list hugetlbfs - Move setsched to sandbox_x_domain, so firefox can run without network access - Allow hddtemp to read removable devices - Adding syslog and read_policy permissions to policy * syslog Allow unconfined, sysadm_t, secadm_t, logadm_t * read_policy allow unconfined, sysadm_t, secadm_t, staff_t on Targeted allow sysadm_t (optionally), secadm_t on MLS - mdadm application will write into /sys/.../uevent whenever arrays are assembled or disassembled.- Add tcsd policy- ricci_modclusterd_t needs to bind to rpc ports 500-1023 - Allow dbus to use setrlimit to increase resoueces - Mozilla_plugin is leaking to sandbox - Allow confined users to connect to lircd over unix domain stream socket which allow to use remote control - Allow awstats to read squid logs - seunshare needs to manage tmp_t - apcupsd cgi scripts have a new directory- Fix xserver_dontaudit_read_xdm_pid - Change oracle_port_t to oracledb_port_t to prevent conflict with satellite - Allow dovecot_deliver_t to read/write postfix_master_t:fifo_file. * These fifo_file is passed from postfix_master_t to postfix_local_t to dovecot_deliver_t - Allow readahead to manage readahead pid dirs - Allow readahead to read all mcs levels - Allow mozilla_plugin_t to use nfs or samba homedirs- Allow nagios plugin to read /proc/meminfo - Fix for mozilla_plugin - Allow samba_net_t to create /etc/keytab - pppd_t setting up vpns needs to run unix_chkpwd, setsched its process and write wtmp_t - nslcd can read user credentials - Allow nsplugin to delete mozilla_plugin_tmpfs_t - abrt tries to create dir in rpm_var_lib_t - virt relabels fifo_files - sshd needs to manage content in fusefs homedir - mock manages link files in cache dir- nslcd needs setsched and to read /usr/tmp - Invalid call in likewise policy ends up creating a bogus role - Cannon puts content into /var/lib/bjlib that cups needs to be able to write - Allow screen to create screen_home_t in /root - dirsrv sends syslog messages - pinentry reads stuff in .kde directory - Add labels for .kde directory in homedir - Treat irpinit, iprupdate, iprdump services with raid policy- NetworkManager wants to read consolekit_var_run_t - Allow readahead to create /dev/.systemd/readahead - Remove permissive domains - Allow newrole to run namespace_init- Add sepgsql_contexts file- Update to upstream- Add oracle ports and allow apache to connect to them if the connect_db boolean is turned on - Add puppetmaster_use_db boolean - Fixes for zarafa policy - Fixes for gnomeclock poliy - Fix systemd-tmpfiles to use auth_use_nsswitch- gnomeclock executes a shell - Update for screen policy to handle pipe in homedir - Fixes for polyinstatiated homedir - Fixes for namespace policy and other fixes related to polyinstantiation - Add namespace policy - Allow dovecot-deliver transition to sendmail which is needed by sieve scripts - Fixes for init, psad policy which relate with confined users - Do not audit bootloader attempts to read devicekit pid files - Allow nagios service plugins to read /proc- Add firewalld policy - Allow vmware_host to read samba config - Kernel wants to read /proc Fix duplicate grub def in cobbler - Chrony sends mail, executes shell, uses fifo_file and reads /proc - devicekitdisk getattr all file systems - sambd daemon writes wtmp file - libvirt transitions to dmidecode- Add initial policy for system-setup-keyboard which is now daemon - Label /var/lock/subsys/shorewall as shorewall_lock_t - Allow users to communicate with the gpg_agent_t - Dontaudit mozilla_plugin_t using the inherited terminal - Allow sambagui to read files in /usr - webalizer manages squid log files - Allow unconfined domains to bind ports to raw_ip_sockets - Allow abrt to manage rpm logs when running yum - Need labels for /var/run/bittlebee - Label .ssh under amanda - Remove unused genrequires for virt_domain_template - Allow virt_domain to use fd inherited from virtd_t - Allow iptables to read shorewall config- Gnome apps list config_home_t - mpd creates lnk files in homedir - apache leaks write to mail apps on tmp files - /var/stockmaniac/templates_cache contains log files - Abrt list the connects of mount_tmp_t dirs - passwd agent reads files under /dev and reads utmp file - squid apache script connects to the squid port - fix name of plymouth log file - teamviewer is a wine app - allow dmesg to read system state - Stop labeling files under /var/lib/mock so restorecon will not go into this - nsplugin needs to read network state for google talk- Allow xdm and syslog to use /var/log/boot.log - Allow users to communicate with mozilla_plugin and kill it - Add labeling for ipv6 and dhcp- New labels for ghc http content - nsplugin_config needs to read urand, lvm now calls setfscreate to create dev - pm-suspend now creates log file for append access so we remove devicekit_wri - Change authlogin_use_sssd to authlogin_nsswitch_use_ldap - Fixes for greylist_milter policy- Update to upstream - Fixes for systemd policy - Fixes for passenger policy - Allow staff users to run mysqld in the staff_t domain, akonadi needs this - Add bin_t label for /usr/share/kde4/apps/kajongg/kajongg.py - auth_use_nsswitch does not need avahi to read passwords,needed for resolving data - Dontaudit (xdm_t) gok attempting to list contents of /var/account - Telepathy domains need to read urand - Need interface to getattr all file classes in a mock library for setroubleshoot- Update selinux policy to handle new /usr/share/sandbox/start script- Update to upstream - Fix version of policy in spec file- Allow sandbox to run on nfs partitions, fixes for systemd_tmpfs - remove per sandbox domains devpts types - Allow dkim-milter sending signal to itself- Allow domains that transition to ping or traceroute, kill them - Allow user_t to conditionally transition to ping_t and traceroute_t - Add fixes to systemd- tools, including new labeling for systemd-fsck, systemd-cryptsetup- Turn on systemd policy - mozilla_plugin needs to read certs in the homedir. - Dontaudit leaked file descriptors from devicekit - Fix ircssi to use auth_use_nsswitch - Change to use interface without param in corenet to disable unlabelednet packets - Allow init to relabel sockets and fifo files in /dev - certmonger needs dac* capabilities to manage cert files not owned by root - dovecot needs fsetid to change group membership on mail - plymouthd removes /var/log/boot.log - systemd is creating symlinks in /dev - Change label on /etc/httpd/alias to be all cert_t- Fixes for clamscan and boinc policy - Add boinc_project_t setpgid - Allow alsa to create tmp files in /tmp- Push fixes to allow disabling of unlabeled_t packet access - Enable unlabelednet policy- Fixes for lvm to work with systemd- Fix the label for wicd log - plymouthd creates force-display-on-active-vt file - Allow avahi to request the kernel to load a module - Dontaudit hal leaks - Fix gnome_manage_data interface - Add new interface corenet_packet to define a type as being an packet_type. - Removed general access to packet_type from icecast and squid. - Allow mpd to read alsa config - Fix the label for wicd log - Add systemd policy- Fix gnome_manage_data interface - Dontaudit sys_ptrace capability for iscsid - Fixes for nagios plugin policy- Fix cron to run ranged when started by init - Fix devicekit to use log files - Dontaudit use of devicekit_var_run_t for fstools - Allow init to setattr on logfile directories - Allow hald to manage files in /var/run/pm-utils/ dir which is now labeled as devicekit_var_run_t- Fix up handling of dnsmasq_t creating /var/run/libvirt/network - Turn on sshd_forward_ports boolean by default - Allow sysadmin to dbus chat with rpm - Add interface for rw_tpm_dev - Allow cron to execute bin - fsadm needs to write sysfs - Dontaudit consoletype reading /var/run/pm-utils - Lots of new privs fro mozilla_plugin_t running java app, make mozilla_plugin - certmonger needs to manage dirsrv data - /var/run/pm-utils should be labeled as devicekit_var_run_t- fixes to allow /var/run and /var/lock as tmpfs - Allow chrome sandbox to connect to web ports - Allow dovecot to listem on lmtp and sieve ports - Allov ddclient to search sysctl_net_t - Transition back to original domain if you execute the shell- Remove duplicate declaration- Update to upstream - Cleanup for sandbox - Add attribute to be able to select sandbox types- Allow ddclient to fix file mode bits of ddclient conf file - init leaks file descriptors to daemons - Add labels for /etc/lirc/ and - Allow amavis_t to exec shell - Add label for gssd_tmp_t for /var/tmp/nfs_0- Put back in lircd_etc_t so policy will install- Turn on allow_postfix_local_write_mail_spool - Allow initrc_t to transition to shutdown_t - Allow logwatch and cron to mls_read_to_clearance for MLS boxes - Allow wm to send signull to all applications and receive them from users - lircd patch from field - Login programs have to read /etc/samba - New programs under /lib/systemd - Abrt needs to read config files- Update to upstream - Dontaudit leaked sockets from userdomains to user domains - Fixes for mcelog to handle scripts - Apply patch from Ruben Kerkhof - Allow syslog to search spool dirs- Allow nagios plugins to read usr files - Allow mysqld-safe to send system log messages - Fixes fpr ddclient policy - Fix sasl_admin interface - Allow apache to search zarafa config - Allow munin plugins to search /var/lib directory - Allow gpsd to read sysfs_t - Fix labels on /etc/mcelog/triggers to bin_t- Remove saslauthd_tmp_t and transition tmp files to krb5_host_rcache_t - Allow saslauthd_t to create krb5_host_rcache_t files in /tmp - Fix xserver interface - Fix definition of /var/run/lxdm- Turn on mediawiki policy - kdump leaks kdump_etc_t to ifconfig, add dontaudit - uux needs to transition to uucpd_t - More init fixes relabels man,faillog - Remove maxima defs in libraries.fc - insmod needs to be able to create tmpfs_t files - ping needs setcap- Allow groupd transition to fenced domain when executes fence_node - Fixes for rchs policy - Allow mpd to be able to read samba/nfs files- Fix up corecommands.fc to match upstream - Make sure /lib/systemd/* is labeled init_exec_t - mount wants to setattr on all mountpoints - dovecot auth wants to read dovecot etc files - nscd daemon looks at the exe file of the comunicating daemon - openvpn wants to read utmp file - postfix apps now set sys_nice and lower limits - remote_login (telnetd/login) wants to use telnetd_devpts_t and user_devpts_t to work correctly - Also resolves nsswitch - Fix labels on /etc/hosts.* - Cleanup to make upsteam patch work - allow abrt to read etc_runtime_t- Add conflicts for dirsrv package- Update to upstream - Add vlock policy- Fix sandbox to work on nfs homedirs - Allow cdrecord to setrlimit - Allow mozilla_plugin to read xauth - Change label on systemd-logger to syslogd_exec_t - Install dirsrv policy from dirsrv package- Add virt_home_t, allow init to setattr on xserver_tmp_t and relabel it - Udev needs to stream connect to init and kernel - Add xdm_exec_bootloader boolean, which allows xdm to execute /sbin/grub and read files in /boot directory- Allow NetworkManager to read openvpn_etc_t - Dontaudit hplip to write of /usr dirs - Allow system_mail_t to create /root/dead.letter as mail_home_t - Add vdagent policy for spice agent daemon- Dontaudit sandbox sending sigkill to all user domains - Add policy for rssh_chroot_helper - Add missing flask definitions - Allow udev to relabelto removable_t - Fix label on /var/log/wicd.log - Transition to initrc_t from init when executing bin_t - Add audit_access permissions to file - Make removable_t a device_node - Fix label on /lib/systemd/*- Fixes for systemd to manage /var/run - Dontaudit leaks by firstboot- Allow chome to create netlink_route_socket - Add additional MATHLAB file context - Define nsplugin as an application_domain - Dontaudit sending signals from sandboxed domains to other domains - systemd requires init to build /tmp /var/auth and /var/lock dirs - mount wants to read devicekit_power /proc/ entries - mpd wants to connect to soundd port - Openoffice causes a setattr on a lib_t file for normal users, add dontaudit - Treat lib_t and textrel_shlib_t directories the same - Allow mount read access on virtual images- Allow sandbox_x_domains to work with nfs/cifs/fusefs home dirs. - Allow devicekit_power to domtrans to mount - Allow dhcp to bind to udp ports > 1024 to do named stuff - Allow ssh_t to exec ssh_exec_t - Remove telepathy_butterfly_rw_tmp_files(), dev_read_printk() interfaces which are nolonger used - Fix clamav_append_log() intefaces - Fix 'psad_rw_fifo_file' interface- Allow cobblerd to list cobler appache content- Fixup for the latest version of upowed - Dontaudit sandbox sending SIGNULL to desktop apps- Update to upstream-Mount command from a confined user generates setattr on /etc/mtab file, need to dontaudit this access - dovecot-auth_t needs ipc_lock - gpm needs to use the user terminal - Allow system_mail_t to append ~/dead.letter - Allow NetworkManager to edit /etc/NetworkManager/NetworkManager.conf - Add pid file to vnstatd - Allow mount to communicate with gfs_controld - Dontaudit hal leaks in setfiles- Lots of fixes for systemd - systemd now executes readahead and tmpwatch type scripts - Needs to manage random seed- Allow smbd to use sys_admin - Remove duplicate file context for tcfmgr - Update to upstream- Fix fusefs handling - Do not allow sandbox to manage nsplugin_rw_t - Allow mozilla_plugin_t to connecto its parent - Allow init_t to connect to plymouthd running as kernel_t - Add mediawiki policy - dontaudit sandbox sending signals to itself. This can happen when they are running at different mcs. - Disable transition from dbus_session_domain to telepathy for F14 - Allow boinc_project to use shm - Allow certmonger to search through directories that contain certs - Allow fail2ban the DAC Override so it can read log files owned by non root users- Start adding support for use_fusefs_home_dirs - Add /var/lib/syslog directory file context - Add /etc/localtime as locale file context- Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn off iptables from unconfined user - Allow sudo to send signals to any domains the user could have transitioned to. - Passwd in single user mode needs to talk to console_device_t - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio - locate tried to read a symbolic link, will dontaudit - New labels for telepathy-sunshine content in homedir - Google is storing other binaries under /opt/google/talkplugin - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15 - modemmanger and bluetooth send dbus messages to devicekit_power - Samba needs to getquota on filesystems labeld samba_share_t- Dontaudit attempts by xdm_t to write to bin_t for kdm - Allow initrc_t to manage system_conf_t- Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory. - Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets - Allow confined users to read xdm_etc_t files - Allow xdm_t to transition to xauth_t for lxdm program- Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home - Allow clamd to send signals to itself - Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm. - Allow haze to connect to yahoo chat and messenger port tcp:5050. Bz #637339 - Allow guest to run ps command on its processes by allowing it to read /proc - Allow firewallgui to sys_rawio which seems to be required to setup masqerading - Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba. - Add label for /var/log/slim.log- Pull in cleanups from dgrift - Allow mozilla_plugin_t to execute mozilla_home_t - Allow rpc.quota to do quotamod- Cleanup policy via dgrift - Allow dovecot_deliver to append to inherited log files - Lots of fixes for consolehelper- Fix up Xguest policy- Add vnstat policy - allow libvirt to send audit messages - Allow chrome-sandbox to search nfs_t- Update to upstream- Add the ability to send audit messages to confined admin policies - Remove permissive domain from cmirrord and dontaudit sys_tty_config - Split out unconfined_domain() calls from other unconfined_ calls so we can d - virt needs to be able to read processes to clearance for MLS- Allow all domains that can use cgroups to search tmpfs_t directory - Allow init to send audit messages- Update to upstream- Allow mdadm_t to create files and sock files in /dev/md/- Add policy for ajaxterm- Handle /var/db/sudo - Allow pulseaudio to read alsa config - Allow init to send initrc_t dbus messagesAllow iptables to read shorewall tmp files Change chfn and passwd to use auth_use_pam so they can send dbus messages to fpr intd label vlc as an execmem_exec_t Lots of fixes for mozilla_plugin to run google vidio chat Allow telepath_msn to execute ldconfig and its own tmp files Fix labels on hugepages Allow mdadm to read files on /dev Remove permissive domains and change back to unconfined Allow freshclam to execute shell and bin_t Allow devicekit_power to transition to dhcpc Add boolean to allow icecast to connect to any port- Merge upstream fix of mmap_zero - Allow mount to write files in debugfs_t - Allow corosync to communicate with clvmd via tmpfs - Allow certmaster to read usr_t files - Allow dbus system services to search cgroup_t - Define rlogind_t as a login pgm- Allow mdadm_t to read/write hugetlbfs- Dominic Grift Cleanup - Miroslav Grepl policy for jabberd - Various fixes for mount/livecd and prelink- Merge with upstream- More access needed for devicekit - Add dbadm policy- Merge with upstream- Allow seunshare to fowner- Allow cron to look at user_cron_spool links - Lots of fixes for mozilla_plugin_t - Add sysv file system - Turn unconfined domains to permissive to find additional avcs- Update policy for mozilla_plugin_t- Allow clamscan to read proc_t - Allow mount_t to write to debufs_t dir - Dontaudit mount_t trying to write to security_t dir- Allow clamscan_t execmem if clamd_use_jit set - Add policy for firefox plugin-container- Fix /root/.forward definition- label dead.letter as mail_home_t- Allow login programs to search /cgroups- Fix cert handling- Fix devicekit_power bug - Allow policykit_auth_t more access.- Fix nis calls to allow bind to ports 512-1024 - Fix smartmon- Allow pcscd to read sysfs - systemd fixes - Fix wine_mmap_zero_ignore boolean- Apply Miroslav munin patch - Turn back on allow_execmem and allow_execmod booleans- Merge in fixes from dgrift repository- Update boinc policy - Fix sysstat policy to allow sys_admin - Change failsafe_context to unconfined_r:unconfined_t:s0- New paths for upstart- New permissions for syslog - New labels for /lib/upstart- Add mojomojo policy- Allow systemd to setsockcon on sockets to immitate other services- Remove debugfs label- Update to latest policy- Fix eclipse labeling from IBMSupportAssasstant packageing- Make boot with systemd in enforcing mode- Update to upstream- Add boolean to turn off port forwarding in sshd.- Add support for ebtables - Fixes for rhcs and corosync policy-Update to upstream-Update to upstream-Update to upstream- Add Zarafa policy- Cleanup of aiccu policy - initial mock policy- Lots of random fixes- Update to upstream- Update to upstream - Allow prelink script to signal itself - Cobbler fixes- Add xdm_var_run_t to xserver_stream_connect_xdm - Add cmorrord and mpd policy from Miroslav Grepl- Fix sshd creation of krb cc files for users to be user_tmp_t- Fixes for accountsdialog - Fixes for boinc- Fix label on /var/lib/dokwiki - Change permissive domains to enforcing - Fix libvirt policy to allow it to run on mls- Update to upstream- Allow procmail to execute scripts in the users home dir that are labeled home_bin_t - Fix /var/run/abrtd.lock label- Allow login programs to read krb5_home_t Resolves: 594833 - Add obsoletes for cachefilesfd-selinux package Resolves: #575084- Allow mount to r/w abrt fifo file - Allow svirt_t to getattr on hugetlbfs - Allow abrt to create a directory under /var/spool- Add labels for /sys - Allow sshd to getattr on shutdown - Fixes for munin - Allow sssd to use the kernel key ring - Allow tor to send syslog messages - Allow iptabels to read usr files - allow policykit to read all domains state- Fix path for /var/spool/abrt - Allow nfs_t as an entrypoint for http_sys_script_t - Add policy for piranha - Lots of fixes for sosreport- Allow xm_t to read network state and get and set capabilities - Allow policykit to getattr all processes - Allow denyhosts to connect to tcp port 9911 - Allow pyranha to use raw ip sockets and ptrace itself - Allow unconfined_execmem_t and gconfsd mechanism to dbus - Allow staff to kill ping process - Add additional MLS rules- Allow gdm to edit ~/.gconf dir Resolves: #590677 - Allow dovecot to create directories in /var/lib/dovecot Partially resolves 590224 - Allow avahi to dbus chat with NetworkManager - Fix cobbler labels - Dontaudit iceauth_t leaks - fix /var/lib/lxdm file context - Allow aiccu to use tun tap devices - Dontaudit shutdown using xserver.log- Fixes for sandbox_x_net_t to match access for sandbox_web_t ++ - Add xdm_etc_t for /etc/gdm directory, allow accountsd to manage this directory - Add dontaudit interface for bluetooth dbus - Add chronyd_read_keys, append_keys for initrc_t - Add log support for ksmtuned Resolves: #586663- Allow boinc to send mail- Allow initrc_t to remove dhcpc_state_t - Fix label on sa-update.cron - Allow dhcpc to restart chrony initrc - Don't allow sandbox to send signals to its parent processes - Fix transition from unconfined_t -> unconfined_mount_t -> rpcd_t Resolves: #589136- Fix location of oddjob_mkhomedir Resolves: #587385 - fix labeling on /root/.shosts and ~/.shosts - Allow ipsec_mgmt_t to manage net_conf_t Resolves: #586760- Dontaudit sandbox trying to connect to netlink sockets Resolves: #587609 - Add policy for piranha- Fixups for xguest policy - Fixes for running sandbox firefox- Allow ksmtuned to use terminals Resolves: #586663 - Allow lircd to write to generic usb devices- Allow sandbox_xserver to connectto unconfined stream Resolves: #585171- Allow initrc_t to read slapd_db_t Resolves: #585476 - Allow ipsec_mgmt to use unallocated devpts and to create /etc/resolv.conf Resolves: #585963- Allow rlogind_t to search /root for .rhosts Resolves: #582760 - Fix path for cached_var_t - Fix prelink paths /var/lib/prelink - Allow confined users to direct_dri - Allow mls lvm/cryptosetup to work- Allow virtd_t to manage firewall/iptables config Resolves: #573585- Fix label on /root/.rhosts Resolves: #582760 - Add labels for Picasa - Allow openvpn to read home certs - Allow plymouthd_t to use tty_device_t - Run ncftool as iptables_t - Allow mount to unmount unlabeled_t - Dontaudit hal leaks- Allow livecd to transition to mount- Update to upstream - Allow abrt to delete sosreport Resolves: #579998 - Allow snmp to setuid and gid Resolves: #582155 - Allow smartd to use generic scsi devices Resolves: #582145- Allow ipsec_t to create /etc/resolv.conf with the correct label - Fix reserved port destination - Allow autofs to transition to showmount - Stop crashing tuned- Add telepathysofiasip policy- Update to upstream - Fix label for /opt/google/chrome/chrome-sandbox - Allow modemmanager to dbus with policykit- Fix allow_httpd_mod_auth_pam to use auth_use_pam(httpd_t) - Allow accountsd to read shadow file - Allow apache to send audit messages when using pam - Allow asterisk to bind and connect to sip tcp ports - Fixes for dovecot 2.0 - Allow initrc_t to setattr on milter directories - Add procmail_home_t for .procmailrc file- Fixes for labels during install from livecd- Fix /cgroup file context - Fix broken afs use of unlabled_t - Allow getty to use the console for s390- Fix cgroup handling adding policy for /cgroup - Allow confined users to write to generic usb devices, if user_rw_noexattrfile boolean set- Merge patches from dgrift- Update upstream - Allow abrt to write to the /proc under any process- Fix ~/.fontconfig label - Add /root/.cert label - Allow reading of the fixed_file_disk_t:lnk_file if you can read file - Allow qemu_exec_t as an entrypoint to svirt_t- Update to upstream - Allow tmpreaper to delete sandbox sock files - Allow chrome-sandbox_t to use /dev/zero, and dontaudit getattr file systems - Fixes for gitosis - No transition on livecd to passwd or chfn - Fixes for denyhosts- Add label for /var/lib/upower - Allow logrotate to run sssd - dontaudit readahead on tmpfs blk files - Allow tmpreaper to setattr on sandbox files - Allow confined users to execute dos files - Allow sysadm_t to kill processes running within its clearance - Add accountsd policy - Fixes for corosync policy - Fixes from crontab policy - Allow svirt to manage svirt_image_t chr files - Fixes for qdisk policy - Fixes for sssd policy - Fixes for newrole policy- make libvirt work on an MLS platform- Add qpidd policy- Update to upstream- Allow boinc to read kernel sysctl - Fix snmp port definitions - Allow apache to read anon_inodefs- Allow shutdown dac_override- Add device_t as a file system - Fix sysfs association- Dontaudit ipsec_mgmt sys_ptrace - Allow at to mail its spool files - Allow nsplugin to search in .pulse directory- Update to upstream- Allow users to dbus chat with xdm - Allow users to r/w wireless_device_t - Dontaudit reading of process states by ipsec_mgmt- Fix openoffice from unconfined_t- Add shutdown policy so consolekit can shutdown system- Update to upstream- Update to upstream- Update to upstream - These are merges of my patches - Remove 389 labeling conflicts - Add MLS fixes found in RHEL6 testing - Allow pulseaudio to run as a service - Add label for mssql and allow apache to connect to this database port if boolean set - Dontaudit searches of debugfs mount point - Allow policykit_auth to send signals to itself - Allow modcluster to call getpwnam - Allow swat to signal winbind - Allow usbmux to run as a system role - Allow svirt to create and use devpts- Add MLS fixes found in RHEL6 testing - Allow domains to append to rpm_tmp_t - Add cachefilesfd policy - Dontaudit leaks when transitioning- Change allow_execstack and allow_execmem booleans to on - dontaudit acct using console - Add label for fping - Allow tmpreaper to delete sandbox_file_t - Fix wine dontaudit mmap_zero - Allow abrt to read var_t symlinks- Additional policy for rgmanager- Allow sshd to setattr on pseudo terms- Update to upstream- Allow policykit to send itself signals- Fix duplicate cobbler definition- Fix file context of /var/lib/avahi-autoipd- Merge with upstream- Allow sandbox to work with MLS- Make Chrome work with staff user- Add icecast policy - Cleanup spec file- Add mcelog policy- Lots of fixes found in F12- Fix rpm_dontaudit_leaks- Add getsched to hald_t - Add file context for Fedora/Redhat Directory Server- Allow abrt_helper to getattr on all filesystems - Add label for /opt/real/RealPlayer/plugins/oggfformat\.so- Add gstreamer_home_t for ~/.gstreamer- Update to upstream- Fix git- Turn on puppet policy - Update to dgrift git policy- Move users file to selection by spec file. - Allow vncserver to run as unconfined_u:unconfined_r:unconfined_t- Update to upstream- Remove most of the permissive domains from F12.- Add cobbler policy from dgrift- add usbmon device - Add allow rulse for devicekit_disk- Lots of fixes found in F12, fixes from Tom London- Cleanups from dgrift- Add back xserver_manage_home_fonts- Dontaudit sandbox trying to read nscd and sssd- Update to upstream- Rename udisks-daemon back to devicekit_disk_t policy- Fixes for abrt calls- Add tgtd policy- Update to upstream release- Add asterisk policy back in - Update to upstream release 2.20091117- Update to upstream release 2.20091117- Fixup nut policy- Update to upstream- Allow vpnc request the kernel to load modules- Fix minimum policy installs - Allow udev and rpcbind to request the kernel to load modules- Add plymouth policy - Allow local_login to sys_admin- Allow cupsd_config to read user tmp - Allow snmpd_t to signal itself - Allow sysstat_t to makedir in sysstat_log_t- Update rhcs policy- Allow users to exec restorecond- Allow sendmail to request kernel modules load- Fix all kernel_request_load_module domains- Fix all kernel_request_load_module domains- Remove allow_exec* booleans for confined users. Only available for unconfined_t- More fixes for sandbox_web_t- Allow sshd to create .ssh directory and content- Fix request_module line to module_request- Fix sandbox policy to allow it to run under firefox. - Dont audit leaks.- Fixes for sandbox- Update to upstream - Dontaudit nsplugin search /root - Dontaudit nsplugin sys_nice- Fix label on /usr/bin/notepad, /usr/sbin/vboxadd-service - Remove policycoreutils-python requirement except for minimum- Fix devicekit_disk_t to getattr on all domains sockets and fifo_files - Conflicts seedit (You can not use selinux-policy-targeted and seedit at the same time.)- Add wordpress/wp-content/uploads label - Fixes for sandbox when run from staff_t- Update to upstream - Fixes for devicekit_disk- More fixes- Lots of fixes for initrc and other unconfined domains- Allow xserver to use netlink_kobject_uevent_socket- Fixes for sandbox- Dontaudit setroubleshootfix looking at /root directory- Update to upsteam- Allow gssd to send signals to users - Fix duplicate label for apache content- Update to upstream- Remove polkit_auth on upgrades- Add back in unconfined.pp and unconfineduser.pp - Add Sandbox unshare- Fixes for cdrecord, mdadm, and others- Add capability setting to dhcpc and gpm- Allow cronjobs to read exim_spool_t- Add ABRT policy- Fix system-config-services policy- Allow libvirt to change user componant of virt_domain- Allow cupsd_config_t to be started by dbus - Add smoltclient policy- Add policycoreutils-python to pre install- Make all unconfined_domains permissive so we can see what AVC's happen- Add pt_chown policy- Add kdump policy for Miroslav Grepl - Turn off execstack boolean- Turn on execstack on a temporary basis (#512845)- Allow nsplugin to connecto the session bus - Allow samba_net to write to coolkey data- Allow devicekit_disk to list inotify- Allow svirt images to create sock_file in svirt_var_run_t- Allow exim to getattr on mountpoints - Fixes for pulseaudio- Allow svirt_t to stream_connect to virtd_t- Allod hald_dccm_t to create sock_files in /tmp- More fixes from upstream- Fix polkit label - Remove hidebrokensymptoms for nss_ldap fix - Add modemmanager policy - Lots of merges from upstream - Begin removing textrel_shlib_t labels, from fixed libraries- Update to upstream- Allow certmaster to override dac permissions- Update to upstream- Fix context for VirtualBox- Update to upstream- Allow clamscan read amavis spool files- Fixes for xguest- fix multiple directory ownership of mandirs- Update to upstream- Add rules for rtkit-daemon- Update to upstream - Fix nlscd_stream_connect- Add rtkit policy- Allow rpcd_t to stream connect to rpcbind- Allow kpropd to create tmp files- Fix last duplicate /var/log/rpmpkgs- Update to upstream * add sssd- Update to upstream * cleanup- Update to upstream - Additional mail ports - Add virt_use_usb boolean for svirt- Fix mcs rules to include chr_file and blk_file- Add label for udev-acl- Additional rules for consolekit/udev, privoxy and various other fixes- New version for upstream- Allow NetworkManager to read inotifyfs- Allow setroubleshoot to run mlocate- Update to upstream- Add fish as a shell - Allow fprintd to list usbfs_t - Allow consolekit to search mountpoints - Add proper labeling for shorewall- New log file for vmware - Allow xdm to setattr on user_tmp_t- Upgrade to upstream- Allow fprintd to access sys_ptrace - Add sandbox policy- Add varnishd policy- Fixes for kpropd- Allow brctl to r/w tun_tap_device_t- Add /usr/share/selinux/packages- Allow rpcd_t to send signals to kernel threads- Fix upgrade for F10 to F11- Add policy for /var/lib/fprint-Remove duplicate line- Allow svirt to manage pci and other sysfs device data- Fix package selection handling- Fix /sbin/ip6tables-save context - Allod udev to transition to mount - Fix loading of mls policy file- Add shorewall policy- Additional rules for fprintd and sssd- Allow nsplugin to unix_read unix_write sem for unconfined_java- Fix uml files to be owned by users- Fix Upgrade path to install unconfineduser.pp when unocnfined package is 3.0.0 or less- Allow confined users to manage virt_content_t, since this is home dir content - Allow all domains to read rpm_script_tmp_t which is what shell creates on redirection- Fix labeling on /var/lib/misc/prelink* - Allow xserver to rw_shm_perms with all x_clients - Allow prelink to execute files in the users home directory- Allow initrc_t to delete dev_null - Allow readahead to configure auditing - Fix milter policy - Add /var/lib/readahead- Update to latest milter code from Paul Howarth- Additional perms for readahead- Allow pulseaudio to acquire_svc on session bus - Fix readahead labeling- Allow sysadm_t to run rpm directly - libvirt needs fowner- Allow sshd to read var_lib symlinks for freenx- Allow nsplugin unix_read and write on users shm and sem - Allow sysadm_t to execute su- Dontaudit attempts to getattr user_tmpfs_t by lvm - Allow nfs to share removable media- Add ability to run postdrop from confined users- Fixes for podsleuth- Turn off nsplugin transition - Remove Konsole leaked file descriptors for release- Allow cupsd_t to create link files in print_spool_t - Fix iscsi_stream_connect typo - Fix labeling on /etc/acpi/actions - Don't reinstall unconfine and unconfineuser on upgrade if they are not installed- Allow audioentroy to read etc files- Add fail2ban_var_lib_t - Fixes for devicekit_power_t- Separate out the ucnonfined user from the unconfined.pp package- Make sure unconfined_java_t and unconfined_mono_t create user_tmpfs_t.- Upgrade to latest upstream - Allow devicekit_disk sys_rawio- Dontaudit binds to ports < 1024 for named - Upgrade to latest upstream- Allow podsleuth to use tmpfs files- Add customizable_types for svirt- Allow setroubelshoot exec* privs to prevent crash from bad libraries - add cpufreqselector- Dontaudit listing of /root directory for cron system jobs- Fix missing ld.so.cache label- Add label for ~/.forward and /root/.forward- Fixes for svirt- Fixes to allow svirt read iso files in homedir- Add xenner and wine fixes from mgrepl- Allow mdadm to read/write mls override- Change to svirt to only access svirt_image_t- Fix libvirt policy- Upgrade to latest upstream- Fixes for iscsid and sssd - More cleanups for upgrade from F10 to Rawhide.- Add pulseaudio, sssd policy - Allow networkmanager to exec udevadm- Add pulseaudio context- Upgrade to latest patches- Fixes for libvirt- Update to Latest upstream- Fix setrans.conf to show SystemLow for s0- Further confinement of qemu images via svirt- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Allow NetworkManager to manage /etc/NetworkManager/system-connections- add virtual_image_context and virtual_domain_context files- Allow rpcd_t to send signal to mount_t - Allow libvirtd to run ranged- Fix sysnet/net_conf_t- Fix squidGuard labeling- Re-add corenet_in_generic_if(unlabeled_t)* Tue Feb 10 2009 Dan Walsh 3.6.5-2 - Add git web policy- Add setrans contains from upstream- Do transitions outside of the booleans- Allow xdm to create user_tmp_t sockets for switch user to work- Fix staff_t domain- Grab remainder of network_peer_controls patch- More fixes for devicekit- Upgrade to latest upstream- Add boolean to disallow unconfined_t login- Add back transition from xguest to mozilla- Add virt_content_ro_t and labeling for isos directory- Fixes for wicd daemon- More mls/rpm fixes- Add policy to make dbus/nm-applet work- Remove polgen-ifgen from post and add trigger to policycoreutils-python- Add wm policy - Make mls work in graphics mode- Fixed for DeviceKit- Add devicekit policy- Update to upstream- Define openoffice as an x_domain- Fixes for reading xserver_tmp_t- Allow cups_pdf_t write to nfs_t- Remove audio_entropy policy- Update to upstream- Allow hal_acl_t to getattr/setattr fixed_disk- Change userdom_read_all_users_state to include reading symbolic links in /proc- Fix dbus reading /proc information- Add missing alias for home directory content- Fixes for IBM java location- Allow unconfined_r unconfined_java_t- Add cron_role back to user domains- Fix sudo setting of user keys- Allow iptables to talk to terminals - Fixes for policy kit - lots of fixes for booting.- Cleanup policy- Rebuild for Python 2.6- Fix labeling on /var/spool/rsyslog- Allow postgresl to bind to udp nodes- Allow lvm to dbus chat with hal - Allow rlogind to read nfs_t- Fix cyphesis file context- Allow hal/pm-utils to look at /var/run/video.rom - Add ulogd policy- Additional fixes for cyphesis - Fix certmaster file context - Add policy for system-config-samba - Allow hal to read /var/run/video.rom- Allow dhcpc to restart ypbind - Fixup labeling in /var/run- Add certmaster policy- Fix confined users - Allow xguest to read/write xguest_dbusd_t- Allow openoffice execstack/execmem privs- Allow mozilla to run with unconfined_execmem_t- Dontaudit domains trying to write to .xsession-errors- Allow nsplugin to look at autofs_t directory- Allow kerneloops to create tmp files- More alias for fastcgi- Remove mod_fcgid-selinux package- Fix dovecot access- Policy cleanup- Remove Multiple spec - Add include - Fix makefile to not call per_role_expansion- Fix labeling of libGL- Update to upstream- Update to upstream policy- Fixes for confined xwindows and xdm_t- Allow confined users and xdm to exec wm - Allow nsplugin to talk to fifo files on nfs- Allow NetworkManager to transition to avahi and iptables - Allow domains to search other domains keys, coverup kernel bug- Fix labeling for oracle- Allow nsplugin to comminicate with xdm_tmp_t sock_file- Change all user tmpfs_t files to be labeled user_tmpfs_t - Allow radiusd to create sock_files- Upgrade to upstream- Allow confined users to login with dbus- Fix transition to nsplugin- Add file context for /dev/mspblk.*- Fix transition to nsplugin '- Fix labeling on new pm*log - Allow ssh to bind to all nodes- Merge upstream changes - Add Xavier Toth patches- Add qemu_cache_t for /var/cache/libvirt- Remove gamin policy- Add tinyxs-max file system support- Update to upstream - New handling of init scripts- Allow pcsd to dbus - Add memcache policy- Allow audit dispatcher to kill his children- Update to upstream - Fix crontab use by unconfined user- Allow ifconfig_t to read dhcpc_state_t- Update to upstream- Update to upstream- Allow system-config-selinux to work with policykit- Fix novel labeling- Consolodate pyzor,spamassassin, razor into one security domain - Fix xdm requiring additional perms.- Fixes for logrotate, alsa- Eliminate vbetool duplicate entry- Fix xguest -> xguest_mozilla_t -> xguest_openiffice_t - Change dhclient to be able to red networkmanager_var_run- Update to latest refpolicy - Fix libsemanage initial install bug- Add inotify support to nscd- Allow unconfined_t to setfcap- Allow amanda to read tape - Allow prewikka cgi to use syslog, allow audisp_t to signal cgi - Add support for netware file systems- Allow ypbind apps to net_bind_service- Allow all system domains and application domains to append to any log file- Allow gdm to read rpm database - Allow nsplugin to read mplayer config files- Allow vpnc to run ifconfig- Allow confined users to use postgres - Allow system_mail_t to exec other mail clients - Label mogrel_rails as an apache server- Apply unconfined_execmem_exec_t to haskell programs- Fix prelude file context- allow hplip to talk dbus - Fix context on ~/.local dir- Prevent applications from reading x_device- Add /var/lib/selinux context- Update to upstream- Add livecd policy- Dontaudit search of admin_home for init_system_domain - Rewrite of xace interfaces - Lots of new fs_list_inotify - Allow livecd to transition to setfiles_mac- Begin XAce integration- Merge Upstream- Allow amanada to create data files- Fix initial install, semanage setup- Allow system_r for httpd_unconfined_script_t- Remove dmesg boolean - Allow user domains to read/write game data- Change unconfined_t to transition to unconfined_mono_t when running mono - Change XXX_mono_t to transition to XXX_t when executing bin_t files, so gnome-do will work- Remove old booleans from targeted-booleans.conf file- Add boolean to mmap_zero - allow tor setgid - Allow gnomeclock to set clock- Don't run crontab from unconfined_t- Change etc files to config files to allow users to read them- Lots of fixes for confined domains on NFS_t homedir- dontaudit mrtg reading /proc - Allow iscsi to signal itself - Allow gnomeclock sys_ptrace- Allow dhcpd to read kernel network state- Label /var/run/gdm correctly - Fix unconfined_u user creation- Allow transition from initrc_t to getty_t- Allow passwd to communicate with user sockets to change gnome-keyring- Fix initial install- Allow radvd to use fifo_file - dontaudit setfiles reading links - allow semanage sys_resource - add allow_httpd_mod_auth_ntlm_winbind boolean - Allow privhome apps including dovecot read on nfs and cifs home dirs if the boolean is set- Allow nsplugin to read /etc/mozpluggerrc, user_fonts - Allow syslog to manage innd logs. - Allow procmail to ioctl spamd_exec_t- Allow initrc_t to dbus chat with consolekit.- Additional access for nsplugin - Allow xdm setcap/getcap until pulseaudio is fixed- Allow mount to mkdir on tmpfs - Allow ifconfig to search debugfs- Fix file context for MATLAB - Fixes for xace- Allow stunnel to transition to inetd children domains - Make unconfined_dbusd_t an unconfined domain- Fixes for qemu/virtd- Fix bug in mozilla policy to allow xguest transition - This will fix the libsemanage.dbase_llist_query: could not find record value libsemanage.dbase_llist_query: could not query record value (No such file or directory) bug in xguest- Allow nsplugin to run acroread- Add cups_pdf policy - Add openoffice policy to run in xguest- prewika needs to contact mysql - Allow syslog to read system_map files- Change init_t to an unconfined_domain- Allow init to transition to initrc_t on shell exec. - Fix init to be able to sendto init_t. - Allow syslog to connect to mysql - Allow lvm to manage its own fifo_files - Allow bugzilla to use ldap - More mls fixes- fixes for init policy (#436988) - fix build- Additional changes for MLS policy- Fix initrc_context generation for MLS- Fixes for libvirt- Allow bitlebee to read locale_t- More xselinux rules- Change httpd_$1_script_r*_t to httpd_$1_content_r*_t- Prepare policy for beta release - Change some of the system domains back to unconfined - Turn on some of the booleans- Allow nsplugin_config execstack/execmem - Allow nsplugin_t to read alsa config - Change apache to use user content- Add cyphesis policy- Fix Makefile.devel to build mls modules - Fix qemu to be more specific on labeling- Update to upstream fixes- Allow staff to mounton user_home_t- Add xace support- Add fusectl file system- Fixes from yum-cron - Update to latest upstream- Fix userdom_list_user_files- Merge with upstream- Allow udev to send audit messages- Add additional login users interfaces - userdom_admin_login_user_template(staff)- More fixes for polkit- Eliminate transition from unconfined_t to qemu by default - Fixes for gpg- Update to upstream- Fixes for staff_t- Add policy for kerneloops - Add policy for gnomeclock- Fixes for libvirt- Fixes for nsplugin- More fixes for qemu- Additional ports for vnc and allow qemu and libvirt to search all directories- Update to upstream - Add libvirt policy - add qemu policy- Allow fail2ban to create a socket in /var/run- Allow allow_httpd_mod_auth_pam to work- Add audisp policy and prelude- Allow all user roles to executae samba net command- Allow usertypes to read/write noxattr file systems- Fix nsplugin to allow flashplugin to work in enforcing mode- Allow pam_selinux_permit to kill all processes- Allow ptrace or user processes by users of same type - Add boolean for transition to nsplugin- Allow nsplugin sys_nice, getsched, setsched- Allow login programs to talk dbus to oddjob- Add procmail_log support - Lots of fixes for munin- Allow setroubleshoot to read policy config and send audit messages- Allow users to execute all files in homedir, if boolean set - Allow mount to read samba config- Fixes for xguest to run java plugin- dontaudit pam_t and dbusd writing to user_home_t- Update gpg to allow reading of inotify- Change user and staff roles to work correctly with varied perms- Fix munin log, - Eliminate duplicate mozilla file context - fix wpa_supplicant spec- Fix role transition from unconfined_r to system_r when running rpm - Allow unconfined_domains to communicate with user dbus instances- Fixes for xguest- Let all uncofined domains communicate with dbus unconfined- Run rpm in system_r- Zero out customizable types- Fix definiton of admin_home_t- Fix munin file context- Allow cron to run unconfined apps- Modify default login to unconfined_u- Dontaudit dbus user client search of /root- Update to upstream- Fixes for polkit - Allow xserver to ptrace- Add polkit policy - Symplify userdom context, remove automatic per_role changes- Update to upstream - Allow httpd_sys_script_t to search users homedirs- Allow rpm_script to transition to unconfined_execmem_t- Remove user based home directory separation- Remove user specific crond_t- Merge with upstream - Allow xsever to read hwdata_t - Allow login programs to setkeycreate- Update to upstream- Update to upstream- Allow XServer to read /proc/self/cmdline - Fix unconfined cron jobs - Allow fetchmail to transition to procmail - Fixes for hald_mac - Allow system_mail to transition to exim - Allow tftpd to upload files - Allow xdm to manage unconfined_tmp - Allow udef to read alsa config - Fix xguest to be able to connect to sound port- Fixes for hald_mac - Treat unconfined_home_dir_t as a home dir - dontaudit rhgb writes to fonts and root- Fix dnsmasq - Allow rshd full login privs- Allow rshd to connect to ports > 1023- Fix vpn to bind to port 4500 - Allow ssh to create shm - Add Kismet policy- Allow rpm to chat with networkmanager- Fixes for ipsec and exim mail - Change default to unconfined user- Pass the UNK_PERMS param to makefile - Fix gdm location- Make alsa work- Fixes for consolekit and startx sessions- Dontaudit consoletype talking to unconfined_t- Remove homedir_template- Check asound.state- Fix exim policy- Allow tmpreadper to read man_t - Allow racoon to bind to all nodes - Fixes for finger print reader- Allow xdm to talk to input device (fingerprint reader) - Allow octave to run as java- Allow login programs to set ioctl on /proc- Allow nsswitch apps to read samba_var_t- Fix maxima- Eliminate rpm_t:fifo_file avcs - Fix dbus path for helper app- Fix service start stop terminal avc's- Allow also to search var_lib - New context for dbus launcher- Allow cupsd_config_t to read/write usb_device_t - Support for finger print reader, - Many fixes for clvmd - dbus starting networkmanager- Fix java and mono to run in xguest account- Fix to add xguest account when inititial install - Allow mono, java, wine to run in userdomains- Allow xserver to search devpts_t - Dontaudit ldconfig output to homedir- Remove hplip_etc_t change back to etc_t.- Allow cron to search nfs and samba homedirs- Allow NetworkManager to dbus chat with yum-updated- Allow xfs to bind to port 7100- Allow newalias/sendmail dac_override - Allow bind to bind to all udp ports- Turn off direct transition- Allow wine to run in system role- Fix java labeling- Define user_home_type as home_type- Allow sendmail to create etc_aliases_t- Allow login programs to read symlinks on homedirs- Update an readd modules- Cleanup spec file- Allow xserver to be started by unconfined process and talk to tty- Upgrade to upstream to grab postgressql changes- Add setransd for mls policy- Add ldconfig_cache_t- Allow sshd to write to proc_t for afs login- Allow xserver access to urand- allow dovecot to search mountpoints- Fix Makefile for building policy modules- Fix dhcpc startup of service- Fix dbus chat to not happen for xguest and guest users- Fix nagios cgi - allow squid to communicate with winbind- Fixes for ldconfig- Update from upstream- Add nasd support- Fix new usb devices and dmfm- Eliminate mount_ntfs_t policy, merge into mount_t- Allow xserver to write to ramfs mounted by rhgb- Add context for dbus machine id- Update with latest changes from upstream- Fix prelink to handle execmod- Add ntpd_key_t to handle secret data- Add anon_inodefs - Allow unpriv user exec pam_exec_t - Fix trigger- Allow cups to use generic usb - fix inetd to be able to run random apps (git)- Add proper contexts for rsyslogd- Fixes for xguest policy- Allow execution of gconf- Fix moilscanner update problem- Begin adding policy to separate setsebool from semanage - Fix xserver.if definition to not break sepolgen.if- Add new devices- Add brctl policy- Fix root login to include system_r- Allow prelink to read kernel sysctls- Default to user_u:system_r:unconfined_t- fix squid - Fix rpm running as uid- Fix syslog declaration- Allow avahi to access inotify - Remove a lot of bogus security_t:filesystem avcs- Remove ifdef strict policy from upstream- Remove ifdef strict to allow user_u to login- Fix for amands - Allow semanage to read pp files - Allow rhgb to read xdm_xserver_tmp- Allow kerberos servers to use ldap for backing store- allow alsactl to read kernel state- More fixes for alsactl - Transition from hal and modutils - Fixes for suspend resume. - insmod domtrans to alsactl - insmod writes to hal log- Allow unconfined_t to transition to NetworkManager_t - Fix netlabel policy- Update to latest from upstream- Update to latest from upstream- Update to latest from upstream- Allow pcscd_t to send itself signals-- Fixes for unix_update - Fix logwatch to be able to search all dirs- Upstream bumped the version- Allow consolekit to syslog - Allow ntfs to work with hal- Allow iptables to read etc_runtime_t- MLS Fixes- Fix path of /etc/lvm/cache directory - Fixes for alsactl and pppd_t - Fixes for consolekit- Allow insmod_t to mount kvmfs_t filesystems- Rwho policy - Fixes for consolekit- fixes for fusefs- Fix samba_net to allow it to view samba_var_t- Update to upstream- Fix Sonypic backlight - Allow snmp to look at squid_conf_t- Fixes for pyzor, cyrus, consoletype on everything installs- Fix hald_acl_t to be able to getattr/setattr on usb devices - Dontaudit write to unconfined_pipes for load_policy- Allow bluetooth to read inotifyfs- Fixes for samba domain controller. - Allow ConsoleKit to look at ttys- Fix interface call- Allow syslog-ng to read /var - Allow locate to getattr on all filesystems - nscd needs setcap- Update to upstream- Allow samba to run groupadd- Update to upstream- Allow mdadm to access generic scsi devices- Fix labeling on udev.tbl dirs- Fixes for logwatch- Add fusermount and mount_ntfs policy- Update to upstream - Allow saslauthd to use kerberos keytabs- Fixes for samba_var_t- Allow networkmanager to setpgid - Fixes for hal_acl_t- Remove disable_trans booleans - hald_acl_t needs to talk to nscd- Fix prelink to be able to manage usr dirs.- Allow insmod to launch init scripts- Remove setsebool policy- Fix handling of unlabled_t packets- More of my patches from upstream- Update to latest from upstream - Add fail2ban policy- Update to remove security_t:filesystem getattr problems- Policy for consolekit- Update to latest from upstream- Revert Nemiver change - Set sudo as a corecmd so prelink will work, remove sudoedit mapping, since this will not work, it does not transition. - Allow samba to execute useradd- Upgrade to the latest from upstream- Add sepolgen support - Add bugzilla policy- Fix file context for nemiver- Remove include sym link- Allow mozilla, evolution and thunderbird to read dev_random. Resolves: #227002 - Allow spamd to connect to smtp port Resolves: #227184 - Fixes to make ypxfr work Resolves: #227237- Fix ssh_agent to be marked as an executable - Allow Hal to rw sound device- Fix spamassisin so crond can update spam files - Fixes to allow kpasswd to work - Fixes for bluetooth- Remove some targeted diffs in file context file- Fix squid cachemgr labeling- Add ability to generate webadm_t policy - Lots of new interfaces for httpd - Allow sshd to login as unconfined_t- Continue fixing, additional user domains- Begin adding user confinement to targeted policy- Fixes for prelink, ktalkd, netlabel- Allow prelink when run from rpm to create tmp files Resolves: #221865 - Remove file_context for exportfs Resolves: #221181 - Allow spamassassin to create ~/.spamassissin Resolves: #203290 - Allow ssh access to the krb tickets - Allow sshd to change passwd - Stop newrole -l from working on non securetty Resolves: #200110 - Fixes to run prelink in MLS machine Resolves: #221233 - Allow spamassassin to read var_lib_t dir Resolves: #219234- fix mplayer to work under strict policy - Allow iptables to use nscd Resolves: #220794- Add gconf policy and make it work with strict- Many fixes for strict policy and by extension mls.- Fix to allow ftp to bind to ports > 1024 Resolves: #219349- Allow semanage to exec it self. Label genhomedircon as semanage_exec_t Resolves: #219421 - Allow sysadm_lpr_t to manage other print spool jobs Resolves: #220080- allow automount to setgid Resolves: #219999- Allow cron to polyinstatiate - Fix creation of boot flags Resolves: #207433- Fixes for irqbalance Resolves: #219606- Fix vixie-cron to work on mls Resolves: #207433Resolves: #218978- Allow initrc to create files in /var directories Resolves: #219227- More fixes for MLS Resolves: #181566- More Fixes polyinstatiation Resolves: #216184- More Fixes polyinstatiation - Fix handling of keyrings Resolves: #216184- Fix polyinstatiation - Fix pcscd handling of terminal Resolves: #218149 Resolves: #218350- More fixes for quota Resolves: #212957- ncsd needs to use avahi sockets Resolves: #217640 Resolves: #218014- Allow login programs to polyinstatiate homedirs Resolves: #216184 - Allow quotacheck to create database files Resolves: #212957- Dontaudit appending hal_var_lib files Resolves: #217452 Resolves: #217571 Resolves: #217611 Resolves: #217640 Resolves: #217725- Fix context for helix players file_context #216942- Fix load_policy to be able to mls_write_down so it can talk to the terminal- Fixes for hwclock, clamav, ftp- Move to upstream version which accepted my patches- Fixes for nvidia driver- Allow semanage to signal mcstrans- Update to upstream- Allow modstorage to edit /etc/fstab file- Fix for qemu, /dev/- Fix path to realplayer.bin- Allow xen to connect to xen port- Allow cups to search samba_etc_t directory - Allow xend_t to list auto_mountpoints- Allow xen to search automount- Fix spec of jre files- Fix unconfined access to shadow file- Allow xend to create files in xen_image_t directories- Fixes for /var/lib/hal- Remove ability for sysadm_t to look at audit.log- Fix rpc_port_types - Add aide policy for mls- Merge with upstream- Lots of fixes for ricci- Allow xen to read/write fixed devices with a boolean - Allow apache to search /var/log- Fix policygentool specfile problem. - Allow apache to send signals to it's logging helpers. - Resolves: rhbz#212731- Add perms for swat- Add perms for swat- Allow daemons to dump core files to /- Fixes for ricci- Allow mount.nfs to work- Allow ricci-modstorage to look at lvm_etc_t- Fixes for ricci using saslauthd- Allow mountpoint on home_dir_t and home_t- Update xen to read nfs files- Allow noxattrfs to associate with other noxattrfs- Allow hal to use power_device_t- Allow procemail to look at autofs_t - Allow xen_image_t to work as a fixed device- Refupdate from upstream- Add lots of fixes for mls cups- Lots of fixes for ricci- Fix number of cats- Update to upstream- More iSCSI changes for #209854- Test ISCSI fixes for #209854- allow semodule to rmdir selinux_config_t dir- Fix boot_runtime_t problem on ppc. Should not be creating these files.- Fix context mounts on reboot - Fix ccs creation of directory in /var/log- Update for tallylog- Allow xend to rewrite dhcp conf files - Allow mgetty sys_admin capability- Make xentapctrl work- Don't transition unconfined_t to bootloader_t - Fix label in /dev/xen/blktap- Patch for labeled networking- Fix crond handling for mls- Update to upstream- Remove bluetooth-helper transition - Add selinux_validate for semanage - Require new version of libsemanage- Fix prelink- Fix rhgb- Fix setrans handling on MLS and useradd- Support for fuse - fix vigr- Fix dovecot, amanda - Fix mls- Allow java execheap for itanium- Update with upstream- mls fixes- Update from upstream- More fixes for mls - Revert change on automount transition to mount- Fix cron jobs to run under the correct context- Fixes to make pppd work- Multiple policy fixes - Change max categories to 1023- Fix transition on mcstransd- Add /dev/em8300 defs- Upgrade to upstream- Fix ppp connections from network manager- Add tty access to all domains boolean - Fix gnome-pty-helper context for ia64- Fixed typealias of firstboot_rw_t- Fix location of xel log files - Fix handling of sysadm_r -> rpm_exec_t- Fixes for autofs, lp- Update from upstream- Fixup for test6- Update to upstream- Update to upstream- Fix suspend to disk problems- Lots of fixes for restarting daemons at the console.- Fix audit line - Fix requires line- Upgrade to upstream- Fix install problems- Allow setroubleshoot to getattr on all dirs to gather RPM data- Set /usr/lib/ia32el/ia32x_loader to unconfined_execmem_exec_t for ia32 platform - Fix spec for /dev/adsp- Fix xen tty devices- Fixes for setroubleshoot- Update to upstream- Fixes for stunnel and postgresql - Update from upstream- Update from upstream - More java fixes- Change allow_execstack to default to on, for RHEL5 Beta. This is required because of a Java compiler problem. Hope to turn off for next beta- Misc fixes- More fixes for strict policy- Quiet down anaconda audit messages- Fix setroubleshootd- Update to the latest from upstream- More fixes for xen- Fix anaconda transitions- yet more xen rules- more xen rules- Fixes for Samba- Fixes for xen- Allow setroubleshootd to send mail- Add nagios policy- fixes for setroubleshoot- Added Paul Howarth patch to only load policy packages shipped with this package - Allow pidof from initrc to ptrace higher level domains - Allow firstboot to communicate with hal via dbus- Add policy for /var/run/ldapi- Fix setroubleshoot policy- Fixes for mls use of ssh - named has a new conf file- Fixes to make setroubleshoot work- Cups needs to be able to read domain state off of printer client- add boolean to allow zebra to write config files- setroubleshootd fixes- Allow prelink to read bin_t symlink - allow xfs to read random devices - Change gfs to support xattr- Remove spamassassin_can_network boolean- Update to upstream - Fix lpr domain for mls- Add setroubleshoot policy- Turn off auditallow on setting booleans- Multiple fixes- Update to upstream- Update to upstream - Add new class for kernel key ring- Update to upstream- Update to upstream- Break out selinux-devel package- Add ibmasmfs- Fix policygentool gen_requires- Update from Upstream- Fix spec of realplay- Update to upstream- Fix semanage- Allow useradd to create_home_dir in MLS environment- Update from upstream- Update from upstream- Add oprofilefs- Fix for hplip and Picasus- Update to upstream- Update to upstream- fixes for spamd- fixes for java, openldap and webalizer- Xen fixes- Upgrade to upstream- allow hal to read boot_t files - Upgrade to upstream- allow hal to read boot_t files- Update from upstream- Fixes for amavis- Update from upstream- Allow auditctl to search all directories- Add acquire service for mono.- Turn off allow_execmem boolean - Allow ftp dac_override when allowed to access users homedirs- Clean up spec file - Transition from unconfined_t to prelink_t- Allow execution of cvs command- Update to upstream- Update to upstream- Fix libjvm spec- Update to upstream- Add xm policy - Fix policygentool- Update to upstream - Fix postun to only disable selinux on full removal of the packages- Allow mono to chat with unconfined- Allow procmail to sendmail - Allow nfs to share dosfs- Update to latest from upstream - Allow selinux-policy to be removed and kernel not to crash- Update to latest from upstream - Add James Antill patch for xen - Many fixes for pegasus- Add unconfined_mount_t - Allow privoxy to connect to httpd_cache - fix cups labeleing on /var/cache/cups- Update to latest from upstream- Update to latest from upstream - Allow mono and unconfined to talk to initrc_t dbus objects- Change libraries.fc to stop shlib_t form overriding texrel_shlib_t- Fix samba creating dirs in homedir - Fix NFS so its booleans would work- Allow secadm_t ability to relabel all files - Allow ftp to search xferlog_t directories - Allow mysql to communicate with ldap - Allow rsync to bind to rsync_port_t- Fixed mailman with Postfix #183928 - Allowed semanage to create file_context files. - Allowed amanda_t to access inetd_t TCP sockets and allowed amanda_recover_t to bind to reserved ports. #149030 - Don't allow devpts_t to be associated with tmp_t. - Allow hald_t to stat all mountpoints. - Added boolean samba_share_nfs to allow smbd_t full access to NFS mounts. - Make mount run in mount_t domain from unconfined_t to prevent mislabeling of /etc/mtab. - Changed the file_contexts to not have a regex before the first ^/[a-z]/ whenever possible, makes restorecon slightly faster. - Correct the label of /etc/named.caching-nameserver.conf - Now label /usr/src/kernels/.+/lib(/.*)? as usr_t instead of /usr/src(/.*)?/lib(/.*)? - I don't think we need anything else under /usr/src hit by this. - Granted xen access to /boot, allowed mounting on xend_var_lib_t, and allowed xenstored_t rw access to the xen device node.- More textrel_shlib_t file path fixes - Add ada support- Get auditctl working in MLS policy- Add mono dbus support - Lots of file_context fixes for textrel_shlib_t in FC5 - Turn off execmem auditallow since they are filling log files- Update to upstream- Allow automount and dbus to read cert files- Fix ftp policy - Fix secadm running of auditctl- Update to upstream- Update to upstream- Fix policyhelp- Fix pam_console handling of usb_device - dontaudit logwatch reading /mnt dir- Update to upstream- Get transition rules to create policy.20 at SystemHigh- Allow secadmin to shutdown system - Allow sendmail to exec newalias- MLS Fixes dmidecode needs mls_file_read_up - add ypxfr_t - run init needs access to nscd - udev needs setuid - another xen log file - Dontaudit mount getattr proc_kcore_t- fix buildroot usage (#185391)- Get rid of mount/fsdisk scan of /dev messages - Additional fixes for suspend/resume- Fake make to rebuild enableaudit.pp- Get xen networking running.- Fixes for Xen - enableaudit should not be the same as base.pp - Allow ps to work for all process- more xen policy fixups- more xen fixage (#184393)- Fix blkid specification - Allow postfix to execute mailman_que- Blkid changes - Allow udev access to usb_device_t - Fix post script to create targeted policy config file- Allow lvm tools to create drevice dir- Add Xen support- Fixes for cups - Make cryptosetup work with hal- Load Policy needs translock- Fix cups html interface- Add hal changes suggested by Jeremy - add policyhelp to point at policy html pages- Additional fixes for nvidia and cups- Update to upstream - Merged my latest fixes - Fix cups policy to handle unix domain sockets- NSCD socket is in nscd_var_run_t needs to be able to search dir- Fixes Apache interface file- Fixes for new version of cups- Turn off polyinstatiate util after FC5- Fix problem with privoxy talking to Tor- Turn on polyinstatiation- Don't transition from unconfined_t to fsadm_t- Fix policy update model.- Update to upstream- Fix load_policy to work on MLS - Fix cron_rw_system_pipes for postfix_postdrop_t - Allow audotmount to run showmount- Fix swapon - allow httpd_sys_script_t to be entered via a shell - Allow httpd_sys_script_t to read eventpolfs- Update from upstream- allow cron to read apache files- Fix vpnc policy to work from NetworkManager- Update to upstream - Fix semoudle polcy- Update to upstream - fix sysconfig/selinux link- Add router port for zebra - Add imaze port for spamd - Fixes for amanda and java- Fix bluetooth handling of usb devices - Fix spamd reading of ~/ - fix nvidia spec- Update to upsteam- Add users_extra files- Update to upstream- Add semodule policy- Update from upstream- Fix for spamd to use razor port- Fixes for mcs - Turn on mount and fsadm for unconfined_t- Fixes for the -devel package- Fix for spamd to use ldap- Update to upstream- Update to upstream - Fix rhgb, and other Xorg startups- Update to upstream- Separate out role of secadm for mls- Add inotifyfs handling- Update to upstream - Put back in changes for pup/zen- Many changes for MLS - Turn on strict policy- Update to upstream- Update to upstream - Fixes for booting and logging in on MLS machine- Update to upstream - Turn off execheap execstack for unconfined users - Add mono/wine policy to allow execheap and execstack for them - Add execheap for Xdm policy- Update to upstream - Fixes to fetchmail,- Update to upstream- Fix for procmail/spamassasin - Update to upstream - Add rules to allow rpcd to work with unlabeled_networks.- Update to upstream - Fix ftp Man page- Update to upstream- fix pup transitions (#177262) - fix xen disks (#177599)- Update to upstream- More Fixes for hal and readahead- Fixes for hal and readahead- Update to upstream - Apply- Add wine and fix hal problems- Handle new location of hal scripts- Allow su to read /etc/mtab- Update to upstream- Fix "libsemanage.parse_module_headers: Data did not represent a module." problem- Allow load_policy to read /etc/mtab- Fix dovecot to allow dovecot_auth to look at /tmp- Allow restorecon to read unlabeled_t directories in order to fix labeling.- Add Logwatch policy- Fix /dev/ub[a-z] file context- Fix library specification - Give kudzu execmem privs- Fix hostname in targeted policy- Fix passwd command on mls- Lots of fixes to make mls policy work- Add dri libs to textrel_shlib_t - Add system_r role for java - Add unconfined_exec_t for vncserver - Allow slapd to use kerberos- Add man pages- Add enableaudit.pp- Fix mls policy- Update mls file from old version- Add sids back in - Rebuild with update checkpolicy- Fixes to allow automount to use portmap - Fixes to start kernel in s0-s15:c0.c255- Add java unconfined/execmem policy- Add file context for /var/cvs - Dontaudit webalizer search of homedir- Update from upstream- Clean up spec - range_transition crond to SystemHigh- Fixes for hal - Update to upstream- Turn back on execmem since we need it for java, firefox, ooffice - Allow gpm to stream socket to itself- fix requirements to be on the actual packages so that policy can get created properly at install time- Allow unconfined_t to execmod texrel_shlib_t- Update to upstream - Turn off allow_execmem and allow_execmod booleans - Add tcpd and automount policies- Add two new httpd booleans, turned off by default * httpd_can_network_relay * httpd_can_network_connect_db- Add ghost for policy.20- Update to upstream - Turn off boolean allow_execstack- Change setrans-mls to use new libsetrans - Add default_context rule for xdm- Change Requires to PreReg for requiring of policycoreutils on install- New upstream releaseAdd xdm policyUpdate from upstreamUpdate from upstreamUpdate from upstream- Also trigger to rebuild policy for versions up to 2.0.7.- No longer installing policy.20 file, anaconda handles the building of the app.- Fixes for dovecot and saslauthd- Cleanup pegasus and named - Fix spec file - Fix up passwd changing applications-Update to latest from upstream- Add rules for pegasus and avahi- Start building MLS Policy- Update to upstream- Turn on bash- Initial version/bin/sh/bin/sh                                                                                                                                                                                                                                                                                                                                                                                                 J                                                                                                                          ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ?  @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                                                                                  3.9.16-52.fc153.9.16-52.fc153.9.16-52.fc15minimumcontextscustomizable_typesdbus_contextsdefault_contextsdefault_typefailsafe_contextfilesfile_contextsfile_contexts.homedirsfile_contexts.subsmediainitrc_contextremovable_contextsecuretty_typessepgsql_contextsuserhelper_contextusersguest_urootstaff_uunconfined_uuser_uxguest_uvirtual_domain_contextvirtual_image_contextx_contextsmodulesactivesemanage.read.LOCKsemanage.trans.LOCKpolicypolicy.24setrans.confseusersminimumabrt.pp.bz2accountsd.pp.bz2acct.pp.bz2ada.pp.bz2afs.pp.bz2aiccu.pp.bz2aide.pp.bz2aisexec.pp.bz2ajaxterm.pp.bz2alsa.pp.bz2amanda.pp.bz2amavis.pp.bz2amtu.pp.bz2anaconda.pp.bz2apache.pp.bz2apcupsd.pp.bz2apm.pp.bz2application.pp.bz2arpwatch.pp.bz2asterisk.pp.bz2audioentropy.pp.bz2authlogin.pp.bz2automount.pp.bz2avahi.pp.bz2awstats.pp.bz2base.pp.bz2bind.pp.bz2bitlbee.pp.bz2bluetooth.pp.bz2boinc.pp.bz2bootloader.pp.bz2brctl.pp.bz2bugzilla.pp.bz2cachefilesd.pp.bz2calamaris.pp.bz2canna.pp.bz2ccs.pp.bz2cdrecord.pp.bz2certmaster.pp.bz2certmonger.pp.bz2certwatch.pp.bz2cgroup.pp.bz2chrome.pp.bz2chronyd.pp.bz2cipe.pp.bz2clamav.pp.bz2clock.pp.bz2clogd.pp.bz2cloudform.pp.bz2cmirrord.pp.bz2cobbler.pp.bz2collectd.pp.bz2colord.pp.bz2comsat.pp.bz2consolekit.pp.bz2consoletype.pp.bz2corosync.pp.bz2courier.pp.bz2cpucontrol.pp.bz2cpufreqselector.pp.bz2cron.pp.bz2cups.pp.bz2cvs.pp.bz2cyphesis.pp.bz2cyrus.pp.bz2daemontools.pp.bz2dbadm.pp.bz2dbskk.pp.bz2dbus.pp.bz2dcc.pp.bz2ddclient.pp.bz2denyhosts.pp.bz2devicekit.pp.bz2dhcp.pp.bz2dictd.pp.bz2dirsrv-admin.pp.bz2dirsrv.pp.bz2dmesg.pp.bz2dmidecode.pp.bz2dnsmasq.pp.bz2dovecot.pp.bz2drbd.pp.bz2execmem.pp.bz2exim.pp.bz2fail2ban.pp.bz2fetchmail.pp.bz2finger.pp.bz2firewalld.pp.bz2firewallgui.pp.bz2firstboot.pp.bz2fprintd.pp.bz2fstools.pp.bz2ftp.pp.bz2games.pp.bz2getty.pp.bz2git.pp.bz2gitosis.pp.bz2gnome.pp.bz2gnomeclock.pp.bz2gpg.pp.bz2gpm.pp.bz2gpsd.pp.bz2guest.pp.bz2hal.pp.bz2hddtemp.pp.bz2hostname.pp.bz2hotplug.pp.bz2howl.pp.bz2icecast.pp.bz2inetd.pp.bz2init.pp.bz2inn.pp.bz2ipsec.pp.bz2iptables.pp.bz2irc.pp.bz2irqbalance.pp.bz2iscsi.pp.bz2jabber.pp.bz2java.pp.bz2kdump.pp.bz2kdumpgui.pp.bz2kerberos.pp.bz2kerneloops.pp.bz2keyboardd.pp.bz2kismet.pp.bz2ksmtuned.pp.bz2ktalk.pp.bz2kudzu.pp.bz2l2tpd.pp.bz2ldap.pp.bz2libraries.pp.bz2likewise.pp.bz2lircd.pp.bz2livecd.pp.bz2loadkeys.pp.bz2locallogin.pp.bz2lockdev.pp.bz2logadm.pp.bz2logging.pp.bz2logrotate.pp.bz2logwatch.pp.bz2lpd.pp.bz2lvm.pp.bz2mailman.pp.bz2matahari.pp.bz2mcelog.pp.bz2mediawiki.pp.bz2memcached.pp.bz2milter.pp.bz2miscfiles.pp.bz2mock.pp.bz2modemmanager.pp.bz2modules.lstmodutils.pp.bz2mojomojo.pp.bz2mono.pp.bz2mount.pp.bz2mozilla.pp.bz2mpd.pp.bz2mplayer.pp.bz2mrtg.pp.bz2mta.pp.bz2munin.pp.bz2mysql.pp.bz2nagios.pp.bz2namespace.pp.bz2ncftool.pp.bz2netlabel.pp.bz2netutils.pp.bz2networkmanager.pp.bz2nis.pp.bz2nscd.pp.bz2nslcd.pp.bz2nsplugin.pp.bz2ntop.pp.bz2ntp.pp.bz2nut.pp.bz2nx.pp.bz2oddjob.pp.bz2openct.pp.bz2openoffice.pp.bz2openvpn.pp.bz2pads.pp.bz2passenger.pp.bz2pcmcia.pp.bz2pcscd.pp.bz2pegasus.pp.bz2pingd.pp.bz2piranha.pp.bz2plymouthd.pp.bz2podsleuth.pp.bz2policykit.pp.bz2portmap.pp.bz2portreserve.pp.bz2postfix.pp.bz2postgresql.pp.bz2postgrey.pp.bz2ppp.pp.bz2prelink.pp.bz2prelude.pp.bz2privoxy.pp.bz2procmail.pp.bz2psad.pp.bz2ptchown.pp.bz2publicfile.pp.bz2pulseaudio.pp.bz2puppet.pp.bz2pyzor.pp.bz2qemu.pp.bz2qmail.pp.bz2qpidd.pp.bz2quota.pp.bz2radius.pp.bz2radvd.pp.bz2raid.pp.bz2razor.pp.bz2rdisc.pp.bz2readahead.pp.bz2remotelogin.pp.bz2rgmanager.pp.bz2rhcs.pp.bz2rhgb.pp.bz2ricci.pp.bz2rlogin.pp.bz2roundup.pp.bz2rpc.pp.bz2rpcbind.pp.bz2rpm.pp.bz2rshd.pp.bz2rssh.pp.bz2rsync.pp.bz2rtkit.pp.bz2rwho.pp.bz2samba.pp.bz2sambagui.pp.bz2sandbox.pp.bz2sasl.pp.bz2screen.pp.bz2sectoolm.pp.bz2selinuxutil.pp.bz2sendmail.pp.bz2setrans.pp.bz2setroubleshoot.pp.bz2seunshare.pp.bz2shorewall.pp.bz2shutdown.pp.bz2slocate.pp.bz2smartmon.pp.bz2smokeping.pp.bz2smoltclient.pp.bz2snmp.pp.bz2snort.pp.bz2sosreport.pp.bz2soundserver.pp.bz2spamassassin.pp.bz2squid.pp.bz2ssh.pp.bz2sssd.pp.bz2staff.pp.bz2stunnel.pp.bz2su.pp.bz2sudo.pp.bz2sysadm.pp.bz2sysnetwork.pp.bz2sysstat.pp.bz2systemd.pp.bz2tcpd.pp.bz2tcsd.pp.bz2telepathy.pp.bz2telnet.pp.bz2tftp.pp.bz2tgtd.pp.bz2tmpreaper.pp.bz2tor.pp.bz2tuned.pp.bz2tvtime.pp.bz2tzdata.pp.bz2udev.pp.bz2ulogd.pp.bz2uml.pp.bz2unconfined.pp.bz2unconfineduser.pp.bz2unlabelednet.pp.bz2unprivuser.pp.bz2updfstab.pp.bz2usbmodules.pp.bz2usbmuxd.pp.bz2userdomain.pp.bz2userhelper.pp.bz2usermanage.pp.bz2usernetctl.pp.bz2uucp.pp.bz2varnishd.pp.bz2vbetool.pp.bz2vdagent.pp.bz2vhostmd.pp.bz2virt.pp.bz2vlock.pp.bz2vmware.pp.bz2vnstatd.pp.bz2vpn.pp.bz2w3c.pp.bz2webadm.pp.bz2webalizer.pp.bz2wine.pp.bz2wireshark.pp.bz2xen.pp.bz2xfs.pp.bz2xguest.pp.bz2xserver.pp.bz2zabbix.pp.bz2zarafa.pp.bz2zebra.pp.bz2zosremote.pp.bz2/etc/selinux//etc/selinux/minimum//etc/selinux/minimum/contexts//etc/selinux/minimum/contexts/files//etc/selinux/minimum/contexts/users//etc/selinux/minimum/modules//etc/selinux/minimum/policy//usr/share/selinux//usr/share/selinux/minimum/-O2drpmnoarch-redhat-linux-gnuASCII textASCII text, with very long lines, with no line terminatorsHTML document, ASCII textdirectoryemptyexported SGML document, ASCII textxz2?7zXZ !PH6]"k%khu[zv<' ~n '"nOჄi~DXM@6Xn/:7%a~5c,OB%}gt*F|H="O2nhFOa#l¤IJХQ{ML ҏl|.yKWl8nЙ"ڐkKN*dO̔w`KuO[%sm LIZFk` i(/?c׉`|#Ipu .NcAEmeUM9Di`yb"k ACVu6uV/@8y'Z=ʧ6FǃH2kزO>AvT|%tuJcPO"qM–hTvyO@Kv[W+a~}rHa7$t=?߫Agg2ǔT9Ŝ }+eQ[?azU]g4vZ|MsI x31-P^%UT(>o1,d5!oWYl0֒@PRyc5ETiQ=ގ6sQ,@~< ĉw  @UΫcY,W:ʗC蕨ʄZZz8Xl{xi(y>k+EbD;onYeJIl`&DIr9yʿaBjjvNAMDDɚcqQj\,\˅,oԷ]ZMuWQ Ghn-`t\s5_~s;*ہҤ_0XDzT}W$~ +/ nVqy4NIg/kx9ěoNV$Qp @UiTԎ[0!gҜC6Ks}C7 5'&=H1o S̛]uvola7O!Fd`XpsCP('1xVOϨWg7FT񐸳j s$ow,;+۲ ;*eqHu_$ 3'l Aas-N'j42&Üb_ ͼ!kYGO/>z-8g]`ʣ |sky_ 86gZU  QVW6Gir|XXQ6 C[EuOޛ8"6CΣ$s.qw%,Q\2kw&di ˬ ڍ$ϒ7_C+{VZZ;ed gS&'V0CY}XOB XI}֩OYGk>\hqgjf.S|UȨZmі7 -#Y8]a8ԿzsMR'= q(kJN?6zB'W`o7 F_N]ȋDtxjb&MP oZ% ,ḌTSxƄ2i9:%x%~Wa<:d&ȓDp2o4rebsMsz&Bc2o#`e~8DaӛHfhܻӻ a2;?8wK $%P^*|2P2X&ȳb;p@tܔȅ{dmwZ WR#fOp~m o9$䆥@rJQ}KP.+p>4HSga/^LUf/<(o,L#8:JoNA V1Ia JQ$ھ*8^$Nd6JD /6C`nI>ǡCf=$Im<ݦY*@hDϼRh"ih:f GܷV wsw R1;k/نm<+hj 0.aЌ{Իmt7SrqZB-4݄N5 h$^J~&;lïP#ٝװ % (Dw0eE<;hlDڐPp"],R(k_#Ñ̈́-T=tBLC*ENYC8Q8VL!\Þ(C 2"̓ {#Ƣ#Uc3oNi=T2@i@O0А01H='6>q+72]fN {2R'.(G,-i알֫;ƀcC̀@_fo?/ˢkDz:ΤBp}e NLkd]OJ Ak,j*%Xxa:,. /d%]cz~,=V,.CҢV+ %$°|&#"5SrC8rN_^ܠ3ƄqX$ }l-ӱ^mBeNXP-%jNY`(QzYPثj3hs!oiY^i a2qV\Ĺ֗yS.S?AjJax"ng,~R;0H`v3F LXVnI~PJK(؉=иu3@~Ɯ< @8L@?SN6J|T.MΗF ٯ vfC6`m(B}Ǖ6޷M )/q`/ rp8xb7ÀI2zraC^^Td~刿nx`6 ];ɧ-=e(IV$_s9)<{_K'G(FdM5O)mFH?'2 ܳ(uW?r߲RL"0 8\[^UA/QbaEɡ8 Lod:YHacsqAmji4ow6X7<!i-P[y-4A PCԖ$_` 4uF~c_򪍾A5 H/2%ƅU6*_/Q<=j)2J=ڳ<%NQM۳x_"^]]TZbgDIȭQ{xv#r9g8_^R.;ߝKF@@ceoK JX/♇wzD;6ZdȂMamiLP_v,s{AД-'wvXh;ڈHH<6ce G3hf"H|_Hgaj6,&! ]lhe^AlļMݾոς?O5JdqkYbzTx#Wt0hTRHKvGr>'O[#eݭ=c2s%DŽ6 X:=kt W|u]!X1TP>\ϪRl0el Ƶ侕2ޖO1ƅzl%Є oEEDOSnItf]v*nE}<. atP/0uz¢t-F>;zZ?k^')͸ܫﶥܚt[V ğY9ȳxb j,/{TsfVfe1?S{r$uTmNA~abPzEO CtomvUIMG8 e"O L5L{ W/&\{xD|o'wF,=ޗҰepqZaFy!p+gcx;X6W9e~^$xv`?D"7ϭi{6;4:@ JDC?/fet䅻m˫`Pڰ 1hBJq%=p҇DxB!gFږMZ54#55LP2hOuUپs(| cci¹-{0ꠣFg BQ7:) *R LO4$Q kcLj?Xq#Ca]ⶋ&f0 QHfKzV= \wlp%#SF哲P'^ʽОn(Ubzi ;T]M.\Gu4 3KYL"諞$@mL5D!fv(t Z6Ajcہ_&!kqL/$Lm'ԁ\E!QwMGIYc5Wj۾8r.A雋3M'ՉNgԤ*6ySI!R6ѿ<0B9`/RqIA1Sҏ[~3W&`{ ]Rpax>dYq<\sg}ۣꄟɧ0%i{䚛d,CxJ&g_ *,e Zu vWP(czZ{M.@ټ7ip8f!Bd\ YjM}P0j 1[z/2~hOO|h [ZosAK @8F g^.|5R:SO ™B'Lj|9U]UB7 #ٽhTόi} Q :A܄)ƃ;M塭M 9VE v!*Ƈ&US^XM>@(gm1O>CjqjZkd2픆$Ŀd,%@l׃T*̑ǜG & 8#aRua\E 1|M'eNg+d;ݪ |Zu#~T OgKK}pr'dq%O՗gxW "6•\iُ& Cg5p vSAͶu"7킱r8/ǴrTH'9'!IU%4y18%dW*=fYrZ;wƪnhIHV_tOZ`#"F˿x23[UJ!gurB@޷6H`uy~*9NJ >b{>,>Թϰ=+`MBbb[or<%<ۅ^{!Yă1*l(kR}`Q y uNƀyi"o)Q 7neeV'Ͷk%]Y頭eO8vYqڱda?Khn6d586dgCΞ rBk)2&5O[OƤx]%O$ԡ A1,qH'{`lN/"撡^#Xk@HA^<0`\!>8UAꦧ ) ZCe_Lre d-ܕ+Q@*Xƾ ٔQkll]'!v|U"Se.5Q;6Or^wU7oba]W.b:guR1-(L1n3Y?.>kO-`Uɂ 鹮A# 6ã]ȈE\87{_:6q{u|WC#w}LZiAQ"y5 2o!1ȡ5_ڏH_nq>qa; "h;npt>`׽\77QpvA=+1\/@isKYƋ_~8E`~tn 7/6~r]=tQӌ;g(emjW52$N+#AowX7[Ǖ3>vv |~(mM&w:pIHY 8@?JSʗT@5'/Qn:6i{Q+W̙2O1vj-{Ą5dNsxkeԎF:` 8]]r *B44 Iԉ`_%geꆿNWehKW'=,|d[D<߻c EkYy 9LMnb I2aܘvjC &%A%P;e:g;=+vRPS>âs1qd܍ #n]F.F)5O=ZUJ%Qp`rrNg٤yED3Z y1 Pޠ;}@ELmO&f tXdOP "/VVh1QZ7OE4LN$NQw\%fm XcI'[l"9eWὬy_V8?-x S#n=E>b!z9{D *t>fkD; ;p}3ݒ0yֈPx.qY.{ £dfEpkr_!P&@U(?&+Tpz.+X*^[ڄ2_6gsP/dPO3?+ShOIOy܈>#jۈ 5݀/GwuFrz\Z~uB#HpΛYH_;$<*9?$ ->fϱotK@<~K o ]&Ƚ̷Ԩ9ay~Jpbp62mJ vR:Un̔Qz@S ܢNqf_͂Ju>k>؇s%7` S`,M[J39uŦXm=ܒS9ɡo Fhm%.iW)-RT>ʺ6Pˊ40/&F-(wnI&D O)z1oQJ:T$]]I6C) Euc@"/K׫Aw_ qe#ґ RQWƐ RЁ~3S\!Kg'oY#Nbm\b4g0(SU 8;o5@Pj*VDs"+וrˋ\|D"@ґm (NƒS#ǜdIuY,cCl~N_ IҊD;k[# Yź,E}q.zCQ?/ן[^ekցX> 07qX}ˑOPbUqvbԤ2eqaV&^ShmbeH3l$&Yj86F°m)V' $jK=/Reu$oJM PR!my_ a b杙P QBvHF KCn 0{k" ˱x6|sL&0 )Is5!+fSJ=/F0?jY.^/WVF8VI/b# fSFAs8a5ђnؙjMOEUǰ3Wu<,T&k\brU{Va4D/mp|W"x˷?A${;ɂJk,ucSwb٘KwM$8*_һǹ6.XSh^pxD>w ԈfH\,˟L)XUJ'  MaƫoiB v 1d,: )5x {>JQP!H G c>Kd#6ܦ.6"-$/%:=F61_5BzV^*o.KW*j5yXDz+ )C,Ċ㏰xR\-oZ $)yh3P;J">4:wÖ. HH'TO?SwE[u eQ}l$kkBy¬2iztP<0-Nb^Eq"gxyg@d[fmp#:x"63 ʳ'ePfk2xt,];LՅ~uY~.yxwŹqB8[n=z`ؘidQ)P4Y<ūO&ڦ"#uN+?y$~NR+CįqT 5dd nn-AՔtCIugO`@, kpeFtXB݈Q)yrۿؙz( ߯ºX\J5)#5 ;3cAeʼ=h}6ꘌJ*]߁Q< €B~MWe<7/0K=m(t}R TK5Ϟ"q _:5Eh*qh)j\j q=vQ89 6ATwBܽOJvAa㚊93I1}uE۸}̎3T2Z褐Xd c9\P 'gW& O0UDB@%PMl^ԹUo* E|۞5fuN=3E. Vt$Jc=eo( u(|J%nuGBY~(N8y^lXiNM꺓Cᬧ}ޫbEqR+^9 M]MXv0hĵ{Ao l)֎iL%O=QC'4$&ԛ{wUI2O*9NTqg\y5impc:`ͬ_YwE^3>~lDsL!d9HwƦT.cM yѶ.IpUW41K~B.FGTҞEgWE؎*;6o,3c:L~Jhw2P%3sȔ_b 8?Z+j9MCD/1{ڟ&[՜ kWI Y"!!S鉽e^ƻaA4ۏfu8DX{}u3%(g,_?1N-P뮣J+&t@/1,?\ͯ>%92~2{ T\TlKb@ȅJ/h *aYx4߉_#6!MEry0 JRmr``iwɲP4UUFq9K|6>(;<2Ds&c?!Uj <KXV}.#*RH_shQ; D)}*d `mO3P)SiA-mUfY_#MSzQQ.4q^mod)T%#۾61EtM2kڴ/woYӫ٭jHcy%p¥O/>kZZ-s2-{dx.[b(۞$c ]y;f8W=UdGXͧC93Kt^1Uy> pⳝ?t+>( _=?.%0 *lPz[g)7$TvW(F taıɤ|WaU9Jh`/XK"X{/I ؐL]1;| 6 h͝|TOnk?oM{YqBw`Esnvq/ZR@?ٟ7`A)/5`!y(D O>ojY&Ӳ0?D 0kXc @Q'rld ObddxV`Jx$'('rw3"#|]K|t$dQY{!-lPsM(_+k =7k;c9m+\<ԇ Y´b BYTD|u,lխWu%W]Bj+64/2%gAGSC6Wi49 M3yĬc[0RNnʶڜ['k5lˠ"؊'[P=OaiO$׭^) ņyM_>"m/Js$AN! ] 7pIsA<#!$ %_BGgŤ[J'c`؃0PtlBĭ{͙:O‡n P:PKdi Zz Ҵ"ch?uGάD@>&81TX6A|F_rE?yqXBP6j*dJvQgkc,߀t-jt.)"RcceZl+9 ?5ĘQMR?ǒxkoxĦ~7vSgy נI;aG-SZEa!"߳ֆi!˿bzrlW/ GE}%Oڵ#1¥03Աb D*;%ts!(b7u Bq2%wgy縥fk֢Cd[Bmݚ_&[gdit`K"D1VѼY5bB^> '^5 1e/Uv鞩Ʋ ,j#=7+2뜿]UHh/" R QCL.@lie C*\)W :&HʧwV^оV~-&#OJz!`hyx'E tP1{$7wgoU+7* "sOifT;D# ]j-,oý!{VlJDN?ϰec9Q,+Єb2 LE>oGqY pʯ6OjJ'tPzt˶ON!Tn2>V3/b5>GC?a^~;{擻+,Ar}7OM4IFyhcD/&?ehys%>.Qw$͐DtuCt񂴽?)w[[] n)Xutloy58^cl! (?GA;4̧ N cYYZs JiAwxr[?3̠B&4S>N2֤F3 qns,P1FtfDs Sm~>^UN$Q$c 68"wcJDmJ ^[y@0wհSaift 1ŏ/Y|Zbuir"'DS0̪Jؗ%)rňI-uώzR=rt1tt֘ IX3GLXOW|\8%ob4UPimP{>mo?Zp0hM ?ܻҫY +[@G=JM{ KJe'&2%Xx &%Ih Ax "i ޻b1)ŨDkAuYD\سʖ Q A ):O؜dMmRڦ: UϭK20tG̫=l"J=7N0(Ik"QMIM UtmY*&nN"o$!iKW߽~Y뿒-vAyeT8$l !ގR866K؟ xJ(ލBU6'I4%e6|RP]!ԉ6TKjk!<*^ait$w ͿS: KkuKA2-&Xul܌+Oz ;b_;WFے( Np/WX360M @F&QbGqv:pqC7`Vϣ-A4.,z 4ᣱ6Y=z дìB VJjPt_ODVt1g*( Y%?rC;]uR ]Kb.'53%kct*k㼽9~LzZqIJ'L~9P~इ.6(s {LF'$:*&ɀIsxUL~[wsDR"0.yg3:<^-V6OdteP_ 0 7YckҶ] *l}ӏ%f-+ɹ+Q>YFEF,KRB_(^9 Wևe}7gzZiH*A(' ">:$vAgBw1\#,ݣN>x$Dnҷ3Ī %\3 I|qr#VUծh6 gRx'3ӭŌ2G+ ,*8ejG[42+5"BiFnU^gmڲ]y+`\6x<_[R}<"Aػ}cmt"#$Wq8*uT( > B!ݗo.0돟H' rj|j^lV/chxPu(kr![![xŸR*+qs\ m!JS1l(]\X)\QU-*Ae. &h)`1.ȡ=-,hWtPUWihד܋*6y=6 ]ƨ$9>J^TX= _$k/g0=N|ߝ~uHz)E "a!Vlqn${u'!"1REgcޟ'&@p?Ϩ}4|t z3BH0PM$MV0XR wOگ}H>oE.dZc+XEy,9@ȨSH;Ƽ]ZY)7=ł>)wzz7%l 0]0R Ns hY ],2 (w<rJRa!_Wj⟥R> e1йPbGeM5iG8*MAaP\{:dm_.qr5 - /do Y+p)6Twal-=:asKu?i{Rƿ䅅 k߀l˟2=a^$vrlဿIjdp]_A ҥΕ7/ϡsI I %ߩ4疜5;?w"zyč/%b-JA>bS P9Z̩S"#Tb_5B5NFȯwsl+/}N"cLC3ڪ5),! &`e\_~D-xHu/տV"5ʖ> unL^O8mI IPWt <@A4'qk rb3}E|Fphch̘vX #^ZSS}4Gi0)x8ƚJU.apbݗhz!}@WY&&-FʚlWYmVL( 07 XS|\ ]{jΉdW5D%,Ah"΀ߊV:^ˈ ΅xZo Pq<4{c6i]{-PWIk];j?Gqq!*A*^+U%6Ѽl}"Yi4~vQA8cEK`X#[ղd72 йZU7c#{CD?f6".H{r Èz\f̼IgR}eSMp.tx$Og,Պr#H qJnM3 \0`X/$&O% zl-ise.FϱXӦ#1oz59V+WF"oiceƲRu!Yl7ReRH-(me> 4ߣ]A)?7tܸxt$f0BOǖvSVLdQ a1}A(B?!Ɔ+|49]wP2ӰGꟀ$f  WGPaYb,C͜@J z>FG<&PX u7TFPoFi @XTͧaNt;IWǥ>"V R'KbONj{ 'tX;ҵ qNw`KȸcuVo`ss^8CrAd/Ba"2u7w([597(ڀ"3o!*7_39cCIЏ>rX^KBuAxd+Z9]R$vs p o:{cH^In9}Q8pz GIf-~ڛP+y4_TQXK"P-jI@E11ș+4!nxiem2J||Yws_șV3) hId OUcQ$qgMj Jzju`mҼNR*K~ dKTWM[Ox殀y[j ;0[Zr /UQyeQ,dTN%~v4\+yΙc;#ch-zO$b?թ\ggL*)iSЖL DGtx~`'1jwHƷ2|A D/];_p09mN nxcTtV ]a~M85NQCLn6*:)jB<Oټ#pg%tu5ΨB@U:zh:M%n|IlLYS,`b41Zd!t] c/vv]?};6YYm'xd(H*-ho#a-u mk| r Lq%CFfj&| HָTqrYР?ᬲ|x{:@dqCZ4gTaHs 'OՆ@MT];dZT:~րf{ʹ'8d*^wƙ7"en`O+f%x/jp$gn3XƍB~ |mhGHzL1;r,DU>bZN@Ճja't9cM HQՌF?L5HJ4[m U\<}PcvaȜU)zM7A5zgx?!X]lDf'gUZ`wg(Zq9rn]u|x*5o>e$T!y:~X6h,8!&bDzy82/Xx1GOY?h7bݱYz_USpX.ߖ$p=Ju I(ڂ?&*hwQ}ۆh)\_ 52Rƈwƶ o͡pgل"c>g;FHQrIبTYPyHQ`s\Ģu+0SC_aâ ֟Ͼ,#[uLiy;wv jn-B~^\>;%Ǩh͵]Tz-&"ѦHTpb=-|ߜCif.]xj*b92UzV˿WFNqcb6Tnԗ:Y[SJ;6xWn0<%cwL93Ȇ"p=U.px\RN)ܧvUB+3m~҂^V(5Q!,+Ƿ:à ǩLc,WQ2~;gYa4x -eVǭp3^AٓB}Ulf͋iPMh鈩9}ꩮXvXV &OtQ+v 2돮shk&՛,2~e,01ePq 8^LǪp]f$d䯻|k$+O)0(uIe5$KF DrAxƉB>L\~%DNr~o ;FB&!{6OArx拗4[)xҏ*fIsߥ# 8!9[YRϔ F`P/[# cS~a+GENTL?)nDOC,; vvURܰx8j>H|ƦTl.B: L,}xvFxWqޢfاmkȸ]4pC>ݣ/R]ш/R_S2/E'3\S8^K,$F"csBmpsYXTHLj XzRvyaZ,[wE)?PO1?om\mi64v}1MbC`4vNrT;tE<^ (>^ }lvG[76!8cu,wHj C!2Tv9GLϧ̟1G>17͈|n4ER[/(xֹs-+Lшyy X U!*h=xYS8OKd`h+z4 CNDUvͦӗk3Rz o B]t UzhPUe̓eKu'2*;Iۡ##D\ܐeZO= DG[ %6ŁA7铃*4N>S64|!'.K4f@n]<8Ny.HR!O0ďdBO`iKgՙ+J0<\t ݆sr8|@ypf3 b?!^C[d?# wSYGS3gJ2 :F$3px9Lz)8֟lԛGdp!rV"?UXA[M`p+K/O-d^6pzç]_); O荫h孞;oli~6@%yV×o q]t =vlY9 ~I-<Χx8[ DcN B$Ĉ@aYޥê.NN]zMr#CWC\R˼|}PGHc6'yW"_߾DU(x X€.{WأqBLUi_GgWVV#5x iUdJ_(hF{47#͍ƓYƊ"cr\Q~}|I+˯h8~v LYC_Ċz+֮; @~&e_Di@b[='^Xx̰iW=T:W&0 eǪ`5g7pD\ȺuZя5zwIPگIz"coG`=:lEϹ+6\UbѮ7Ougk܄PXCCL~tK9VI3A=M2U+s#;_UOR8 Rw>t->t!ii%4f$JKx?r 8rʿ6 ж^I H|S;>q5 T :3Yd0Ao,Ezb U=VE͔>)GU[ xS[ޭpT$Pt a |;bK gVψuEu ldΦ{9I&.DL\â0,ubo|q]H^Ϧc1/R H?3s?y԰(UJsks@-ZqrgPX؝!3A †=Y gY==%z^eZdh.Muؼėŵ 5H{rcyV9 y7p&N'5nPf3Pd6BiR'%4ߎ[4RmgjsE$O+Q+wKא6) n ²i- 2n[|%Yg4}u9,KGi]eUM첰c [D] zprǛC XqSA:zPW[9ԩ1t3`2,y ~aؼ94.º. VSGeMouLm՞ƺ1#4j/V\u{- ,V Qy/o3M7g3Ku8: Y &B|H{4L!_?oOU֭'Oroq[GH Ρ< xi!] P&A=cz!ci|TM_7&q e7<9Map'1"E~$USsTJ-w,ћc  ZpR|b_/Ɍ{f)K do] HmQ6]2uZ\=%X{󣺴V+ac$0'Y<$e.MDy+#g 6B 9Lѹ2j}9/e~$Ganpa/LEҴ0Mn%M8E[,.ym؈H`B `i6p9sQoiCт4גv[ hl &ciҜKׇ،@b:Kj_KKs{Ŋ&,98'25^0n( V@p R%\ `={y;TYuLjm0Op4vҹNG ǩf"[BKcԄ܇g)(o]%6Mkd llrCK|k )9MKpoaUeaإQ7KmFOZKKn)ƈF >YAӬ#K9 mz5`:#h:}R}ܰ:7WH/L'0X ZEqڼhQRqu} G~ɩ,x|\p넷l*h Is|p΂ЩJ{u{_ +$: -cɕ0@F4P(u&A? pnjT)_>ԟLfK9^xoefjfp2nsx iDFX|I$  >B$U7ä hD5߾z팞^צ0|o#6/!Edwi&(\aIƵj ($>l4irR2dd"}m |%=+pL##Klѝޡj6>/\q9_A|PݏL4/ (TnNiAܮX˶<(x,ݩ3Z&j {Pf3rξz` Lz^&Tϋ:Z^E{)7Tc`ʌ t3AVA`=k|0I]XS`R~v=(Hg5ml6tNV`bsھAz0D x+.n.(evl$zNiN.=il}_1e!y}$ @ 9N`T"hu9ld%=k8Jo+^>~OH^$FT xUMf<2q هp s,XQik]cF s-THJۮKK5L䎵Bi%}nh6B^Q7BW}hd9gk@|Oкq5RO޷FHo dE t8^,Z#l97/-SU)9z~H;U->䒏|%ݠˆl}g_Q^U~oKg(%K4=s[3^Z8߯ hDAa:\V=jc&7 `)7$)E91ނK!W>l 73YFr#-iE 1,ҡvܾFL0.$ً9mͣX"<-0:|GےO,,A)2Hxo ((l3 G.zIGE?Z؛:4`)kkҷc;-bʥIL-h2&b"#eb]? /j OI ztrЩxM}mRE| j{6p5 QbyPϓI<ۄP0쳒8{!W<8|N(em|HdgR/X_^f[}U]UQn0xIP5cu 6oh/ j`t`$.8b4&hGTHM=%x˲WL$QDvhߦm&zl9JLl=uNf?bG/X( љ2")f} f9/W:S.5OlIⱄL{- ©Ue#%oqxdtׇ x>`R4Mt_OzG1Sq[MdSKo{OLa,a:bUT@xh W"l8ɮPq5q]ܐD7(m}1Q!l1s$]JD"=Z뉬zj=[d_q?8%Nb Qͦ^ob|dm=anh;^-͓Go td ͵UTHCB,0,?;?wVr&cBliW;d,W*hyG؁m>`:j H:~ЕI[O{<($+wlQ|Wǡ@vb߰@4GoSFTP}ۜ~C쓳=#uV~}*< IuD@j4pVjXZ[W]%|n QAkrzx XĨZް@YIbBAFݬ G2>[['з2&۠ r'?R$=5x;4Y*~T_owM&>Ef]iO,l(\# `9Uo#͓fe͓ח@Ĝ=wT6#57UDŃ+{wW#ؚ`>ncS:2 $N з$0y:8G /˽#rDiNŊYqw<GϠ,p5ݴ}n!j~lRn֯"SY!x`Yd!ԅe❚oȊ$Be frߴpg^EH0fH"dSX~yᰞuc7KYRTItԂX֏:!c4}g7M UoQQD lkfg'V9,[L$[kG׊akTįM|Hw˃؎OʧK|{ߔ ?εM]4P-2G.L(x?uTf5ŁU5jB#sʄzo .L{{J^/8=gyPPMkR}Mb<5EM𫣾jI,"$#0!N\H)+S]@%PUMmV-(6c.F)EFKX7u^KCܻFaCn~5R%Ytr/Mg~IOuQDϗ6̣U|q呐S`3:E\*@?0!P^W"DdU2{.]FE\9T+{OWVyMzi7SN2u|٣,Nuv^:jKk|K\n`|;hˠ-;8l٘l!+@WW!YF%)0 {/,#`k,+d>˦nh^s:ގ!} gGJKꉯذBTfV>w3R O91Mp`p:'&5d؄eB8:,&Ӛ8eVNB;M7wcۤ:0?z*cEDwvRN_YZ)Mqsdiwshrr, /ѫHbf8t%F9[2!M>Ӌ5&+mȋJzp3k ϞcE>PY^MYY]B;Qx[ 8V6,-4=#αIRh.lr;JImf?O\9T k. yQ9HC)hG gnh*sx= \B Xc(b^_DxjDuufã3c$xSǐg X>;qzXX2e <{Y$kSȜd$a מn=Opphd/y}c͵.ZIlշx cH ;)Ǥ0"rAYHX[qL .Ql 5piנ'AWc{jWSZ'QOK_TM=qӯRߥ?st' <ֺ /L3]G e` {odU;ݾOS7QuUMJǒR|5^Qc߶.;Pj[Q8u .\';Zc!¬0ܑ&fL nxKTKZBՏbin*'nӵ5ŹKs*')uW\QDPhpB8%kgA=5 ^=Dޫxrm*-쾊6>С,H~ fQg_5"]e?A.94gf$m88"*w޼vyƻ:`aSED5=whG-t tŢgBٗ<}&M{MNxuA+/ڷ=z DR_xoEiҢcAIw|?̊/z#նqЉ$[҅kT 9RYi,<)_`K۷6%CgeƟ 6rkтWjtF:^P'v҂֪{ݒ ݾHN GϚjK7b1Pg;Vp>m3٤fmMO:60꫎@ϴ(5}]?1G%xǷzq4'V/P؟28REY@O 'Xߔ([*`tP"^ /^mF,Gec.BexY xnBNtkd>wܣAՓmdiZa1;5;zND;O^YNbAØ=`sw02/PIq%Z;J̎od~6;OT`z+=inx f{$֝o~1ek Ň`{w8ݩUlUmTn Q WSp^":ʄpUPxXh WZ(W_ >[ZBs)sSNj5h;|X`e vM.aPRpn %IJ!nrX.$FGݠ .TI.^ɂ~Pם^A1_}Y*bd^W6Γ}+]@dտb*K6`)wV66-ع;TMxRFA~ݭ{ݢ`DRу>rJQ|Jc#h,o` n)c/;*|}pJrtw_,˪+l)3`IFG1l*o;MN*~bΚtH# % k_LLɇ"=3`\Vt9HR^]JHTV"{})lAc=xխ0Bc8>xs@C} mB[eN "-줶x0MI~$NTt9h?L-7j>`Bؑhtq,>KJ!t$,L,b*#@\!9qj>W謴`ZIQt#;vwUxȇɲl?eoKl,AYL}ۣQ6zOȎ]`N(OeZ8{B^*;j)Ysѧ'e5*\';_S5gL2YjAcQe4,sg>?ƱI47OaLf'0}%"D™!rA)*ZmE@Y*Q/Rñ)lO0{Ou.2IvaWle^Ƌeh{1)9%ʣci}UM' +}N `-br,^ަZ70Ґ d״F4XEUFTiO7c{+^2OArL~S:摾s&P"_TqE(}"Kɐ!&W6t)d!^^W8r萴ȗ+o @emlS+^:pxkV&^X'P )`I>|$1LsQ xWC ("5R>*2)֣Re8]iEhXzlPӗ$s+ -UzZqOmPgƚ 6T*c>6 g6ۥ7鍟&>kNR9P(禅A%5 *}2\8~t32EnX&r@s/Iu3띖]9Zqg7d/ 'Atl6swcYS!tg(I[7`ZjdՅx@9QQfWgzhdžI ^R?9_& j{C.]v&LS~jڶ]ʩM;nuc+'P}R:%?Tl#]PvE5ۮ~3c_I uK䳊@D>DI\ůOL c>DW?09V $(y<"(f'TdWIA7ur1DO=em?x v*XP]P}fw;/[6T,Z'n?_{aZu|A/ssah:SPztr\ (r7 iFp`6쵘n"G\ JgeL^&B:ĂniK"7/ \;}U,V C ԄÄMM˾Xg33كpWD8GOMM\vu'jhr_3豺_v;J 㓘a]ɤ.x\6Su L\׷+s0A +.#oٰP `3 QPnEA 6K{bxn$cti1fJr94cRq@tBGI#g%1(#PZj?*xR-9dԾlW1Tg>{)Ŷ@^݂jU6څFzĜN'zs ^!H6 O]=yC~MGâ+bt_.=q8"bL7%'-W](a[PHr77{!<.r[1k \x|GзϾ;o NMJ%! ܲFo')7&R٫?B\u }N;.P~Jճ?(ZSS]3_-[!6?`I\Ļ4;^czJwHZ/c}x`1M'tדx}Au9_1MP~%ML-t'QQat dL"RVQŘDG;83Q^Iq^JB$TT{f'k,gwxsEFQ.W5:df<]!"ğDCfE^R.+M37)E17 g~X/T]@D,'ʹSO羉lY qp(1_ v2`hT?dLy^_c5-/6})_3X /X&)kǓUa?k^߫'YW|S7?:֝ m3%)g-nyX u8s IcЌFKHTI3j5c#`h98PJ!zgIV]8}-͗6=T#7om0TI’qo1D/"/ald ',1RtE-=:C"СęP\ӜOyrW xe姟?@` Fk6ZA^ku/8$ R'<I[@XMA 6pg+]V1 &$<'w'mt .7wi.d&镶g-5srUν/Ly٫6@T.;Pm>6}Ⱥ/~EjwU7GltZ  q}3B~seϻџJk{kٳȜ,=h )t %9|͉/Jyj?:DNX. 3>A RۏE㘊udp}.I WnI0CtUaW5Q "Or`$55~~VOTUTmǮ%/H!|=3,A@Fp- Ϯ㈶Ⱥz퓄SL4,{&|늪/@n=iժB:n&٥eipyB&+4j`=va)ś>y# jd$%NA=GW b p1Æ/ 'Rv: DA6-j `H4-* ]F8=McWiH%9л 6UsO(xC#s2HmD0T9|!QmdFըA$/[w! ([\-|yvFF6vqW/UՔLczS͆vBrҩ[.:TCS C[ ߏk}VS&5`8M㸵G9 HR[on:ݦA3KmV9ejDvx}8Gjo^c8jX2曄'~Hlb*2O.&4?ٯtH| ZSl4F(!Ҡiug80|k;o^Y &\gM4OJgP.ccUy<{33^x)֐g4:|Ϯ䆛u-E7Sϩ:3;jC⁔Z;+=11zR_.J5e#gß6r>ubkqR߄6 JYE2d3~W-'}sZWmJ;hDO%Bt7)]MBz܍ )'^) '򊹯),R~9|Ӳk#p^U)}`OZd{@\ 4 ! 5ͦ${gbc=d.(A|[)5!Tdrb*wK+p f #8F>vkշY==aao?ܫJN Q?`df*F ձZWLٔӤA SEzb\۽@OJG~s^UH!²PȥNu%hS/wO56ԋ+6N8@P7Il掠Vw}4jkǛZO,.UGd]QNiJrI3R]uCSi+l{*7rơ׵b#l13_mZ*5#E{{A{/pja xYAmƺ^5Pp_mI4̌%1 v2 [jl!.e X|Sʗ\(" ٬yǽӴ oeU(OM_m$pxhr&2bcYϰZleClN2UMp8@2O'҇r}-}ŘטiѹC|ˤ{Mu GW9|s&VZ<~͎0EK}CU> .{{@{B.'I 0͂[PnXhed:A³F)Wp6f?ΧL<7Fj6;i.5CkE^^犭X\ 6=^H&-niݘx+Vdd+>|L~vWzyaD[^' w]""y\ {J$P)OG5j<7\Ⱥ˛jzE+3ߺfT0kZfzҜ2m<$W^kg~c-ztĨ_`ohd9O eSSt(Wh4|>J 9 76Ti4_cEoqQB\nGD@ $qQidpȹ5w$F#JJɀ8^D[+qĶp~?рFer׊`,d$HL2E|R8"Ask?X\r/8LKqj뒷e13.QbG-% ƈ#&h$(JK6PWO 8;{BZT@._;XXsW A{zwO>\w }"bsa^JKCYD)qiΟyǬ%AM8C GS,>'?7ή[NpQ*Կ !~FLxq7Mndf_%@{(džܙտm퐸uČ,^n?ptǤ"ZʳX`e.д=mu~֖P"[?J Tƾ?$TT&0*״^i7 _x{TD_]u;]c[=G3B^rCF81$8IaL#1XW!236;_J.o`覭4#DGKD"WjŖΎ+4\bjdܥgԥnM8GKH~X\vE˲ɂ9cP>ˎyIGԣu\|xÛ`}@IvRyG^ P ={1Q\B #~fR0h xaHBN rf,f6>uWdL& 1Nϥ$xjt ߖ |NRV;6 |٨e;۠*į'F^ 'h+g"PM2tm! w gؖ"yc jo3SQQCL;M2VhSCcI?M0?+Fdв,ދ~;1+NQJsVev> 43Bp'x_=.PWd$?a)SAokA-,/M5o &4pq*w1G+ ۽au_U а DNAv ~dek;h1"]gV+[qpfM[(^{VE/|rB)) '$ ^s~I6QO+o35vزP "=`>66ftE2G^cdYF@ף5UUJ9hCPcDxUX\!o&gBxT\^ґz0Φ^f¢aKAD=BLn,bl/[3,OQT?S-orE`_[F }UNhqY @!/LXYm\H =P$|9:H虐t)$&mgNUo p.!v`z;wn8!zg,򘸖ϵq:~OO*<3U-4F/GcԮ& oQwxkJvTQF֐1G_!7JF3vĠGxLH 5V%),(@@#, ,.qKY^ = 53ϘSx 91\vM^F<,Ri_Ne&&JBfzc]lj,2&Bez<+З/g=9\*U/Z|}?z!쵠ߩ jo3+Pl\P-%;eW`*]q' BmO&?֧?\ֆ "y:I:ɁN*=K= ⚟Lwyoܼi8S\)J\M%!ť~߄A?NmŶ}24?4ԮTO8^-ag L7JFW=-J10'Z&pL6^gln>zƮx50٫\mǟFZCi+b]Cf"TB4Ht"C'%]>ǫQG%yUgwP pCK6dEUÆX#tGxS)Nunz7mU1,ccRqBUN@ Lz4V+rc [r\@l褆4(b8 ڮG Y&%i'̃hiqbd/pj7ڙȡ4瞵>D` :m|^p(!,7W< KQ9$ěHE9~(᳏a|'uM#γa-.jŦťӉ*?Хk;5ʄsȭ]xΥVqPɔr߾+3Lf803K7+̢OdJ5N'JnJ>m%c.IZ@sFD? 3Zaa[r^:M5Rr9tu8:nf?Gt@B;Ъ/A/oU5^낰Ã/H93.(eKpVg6ċ2X^;gVm%gYs=6Xa|c*{2LPlϿ]2ֶ ![Y[/z !ۓ L2AU\Uw~P]!*)b68GGnˍP+Zm 5B\oFmGC]rDe[ef~}tR>=Q*v4YY"|k*( ͥ[A@L.&WtK'I}>ʥr=r-wU, d7..m@X>د*aAyK;ח hg2s>TJf-l^,'3)ӎ$,| εCy%l>ѿ־x2KWI֟Fήp9V8{*攒 >^iE"\5G#,-⩰[v86Mݻ-{j'F+\'KuihA y8{yi]t'Ft~_gKTb_h DBD- B, =)!7īmkӝSҶ? D9^I/)gܰT7i?}/lv]Őθy{zڭ<! 1# ~:d7St]1DȈgbQ}/,?90L yurC=8qG9K',)s3F07-sdW(/T>ӴUHL\Ȥ2ՈD~(A}:-eɢ;4͍c\Rpw )0bIL&AcXx{X+'C{ .p^kRzF8!'R Z 1l&FoXب"eEќūmz'{ s:NV(u{o؁nk/.]z| a8i@>r5֥&79QW矈oGB+}it$>$S4nn> #^u`&V *Ft!u5{Ӝ8t8q J 5?C w/^#ӛ~?(jGo)T0+ܶFߊ4ŁLU9_FrA@zWA (QLdp<ƻze;BTKڙ1LzMU;6pJKEL`d!WqLPr\W`%~\*OW~COBPmve;>p`m\i&[X[lO<NIk@gn >auԻ)"[nNu7V+kFx|cJ< mJO[iV _g/z[ тS$nDB Tft귥B9TBS{E+@hcҪЬ w霝~{IͽjynOxymZVJ \y*u ,90tsa[z9E;/śaBNQ֚'_mxsHhU(6 Z=Ò3 IPI|4$mq]-ScaDN-63[| Y#;L"Ogy8R3+V-߿P6j^?oٰ." eHWX4η#uu1aXN oM]X$N17)'=جgzikNC>ɞM8ڪ1(|1?7Ibq*MQNZjJITX-0"9ݤH(I`CYTգ=S%Mxȭg`#:]6-W]w }GLY]OS\k~"W6di 'LS׶8oqoַP!N+7„?)mt z~tO-1-aSEݧurߒ᷌U[~ɀ&k b67嶻Q t (-?#fLvN_`w!( .vSѯ9EemOGHѥqf}߱cK6vBGOR I״6lR 0 tK 'eddUM`ouS'>?JXD;uol w.:et'eT{/Wpyq6ii? 84[#n"nY sj+ [9ںJ>dpQBHsR\KsN6t, >%Z(Z.|Z;![7;` pȰn۽V~ x&pKZ֍QCk ~ |e~H&Q(7i@@e%x>5罬 1EVX_>#fd u;swF!"73i-pl9N_Ta: ge 3Lq[cQ˛syKPi5wZJN6-U}+("?q@FGc"Z>`\tnH7S ;(\Q'6\1q2INQ+<-cX֋g~v̩T]^o`??F- A>BQXi4*s4c[S㘶c OIkwT9h;Έx2BQeh62 Zwf?LF|,w'vtLR^֑S m53FG8,5^/l;V*CuY|&(YyնrC\y;[ȧeaNSd+ m;zam?K@k D\>-HG Jȯ*eL>Sc!*l0Bba*Tbdƭ?Ԭ4 aî_Y4:`?x8:26e}ݾ.|oh9h L= ` ^mq$$awTQS-+ ԰^T0IT z#Ʉ/Ƕ贚T no^փ+ώʋҼWG12"KWǦ9(ga Q *JhD=6$^pi2;]LKepWཚ#AcAk~9/*}; > j)^|߱8.hJnfcLh'ԢQh|3>9PSm31^BSɦQvS+N+&Q/귑J9wmM$7_F\gʹ=5y#%9f5ջey|^ȼJ'U&oOcM,M[+ cK0h{$ fa86i.`4:)D:29r#o"r%2L>^/\rb5 H[,A;О'w_@O3o@g̛ խ8_cId阣O\iI\3WVлdA0?>Y!Ҕ#or]M!R|ǥSړ3rq8YL!b`U_Udږ~il(rAc)fDSDƷTaG;ɯ"#&ׅ.rr?"؅IB#d< 򿃚vEAFA ,(j1Q&\#/)Bd9FPoRPCL`4z&:ss@etC«u&r[)_1NE5mx4?4 pS ^ ecFJ@8&ۯ|m!<Q4j9@"(Y4Lj=Oeelxì=-J9Θ#g ~q']߁wS4\Fv$AVw_\Y/޾Eyޒg-h .(>9S} cO}$J8_8I#7 HOO}벢48BW!m3@0Riʝ(42*@l{`@I $_69Ccyc;e=x7Aw9{+M6y r!Oo{y}kFBЙxf;uJjzU-a@)KF2#Dx'/T˺gMyA|\+Ut'"].Gq  `^q=I׮ o1p N{[fa |I%K*GdX1-U@?}xC+L+y#֔ڙ)'U2hvղw!וqC\Q?nGklE% ʖ-0w|/ = 8fgf:)Sv[Kー=%(>5K U o`M 2bgTVK6xQܿ0C"AWK?xC%2rwPdta.c;Wn Wga}ӸJ4ܘO<]lG0%+uMf}%3Q!eR?&enۿRz`r]_%GEQ֩pQ{1H1;^e cMпeKO PYgfҦ!"2xljdպx d[Ӏs-<]MeVCvى*8T"=m(.[MzUH8]qdA#*~E֩N}_=JoZ(~ gp7m%!\l_ =kܜr&~[2m'C{f>M}] <* 4k[Z)JS:nnL@SyPTYxS}dv E/CQ`~DX։_Ie{!)$70C4pJ4{+[fOr+8T#Z,*Lĝ=#&&3(rs~]Z Ct~;R0>Q~IG͑[3={{Ќ@֐0k+0IםeqeSr#98|Pq#fZu:4KRН[O؀W/݈%'!9?2bGuv`~+dd,Ak Me8Y$&ΒǶyzN.F(pu =Xt%2T"ZjE52v;۫d3,ғ+sf5jME %&n:aYHrX 4<$h<}G i;_bDDVb+LN3u?xuyu!VMk>2_/dLݢT||峲=M+P^NŖ9LvEɯp>Ij _aչIxV/IuG뢨(yW%Q+"}Ci>)^oX'@}D,ynua]r3 iN$7j;^Qp!AEu:5ė6$UW,AX H@FPB jlW@C!2EA;K&_œ$qfaכ6QƒFy? t)齣2o~cyُkGu7YV#wyB:5 †v/^Jwt|omšw` Q WOHJ"J@b]gn+J1Xhd YSt.V)OYUcڠS,B>" HIK[=ɻ -_k84ai^t6MCX϶/R0l\@y'#9ɭڏ\0Cyy / kV#l> C/[d ɻi4xx-6T$!!Uꊺ# 4Bsf}4=*)ᬫmAzyUS:sk۟ntft+8Co'Z:}T*;<DZ68,2n;yU 4҃9۬9]Uc &IFhj ;$iEa; ~&qR,KOkwo>3q5ZӶŅF][ܙ AMh0FJֲmF~4֘,Z~o_;u@(X 2g͊nH~mY' [(V5s|)4"ِЩ8Y<)اY˒ B; z0G=A+@|5RsOޖ1^VǢFhJs\XYÅ4\b#A4i\ZΟ#_粰! ) )Vw!kU9:6= X%ܠ/ [~%liOPc\ʧۋE)^B DȶFg7`_ږ[j!}V<>,MKPq$&;9zЭ2 qRJxr8]h}.`VX=f= 9SGpXN5CD -\!dv#>@ 9>!?chU*Xe%+auj-+fxhY(+PČitucD.P *,^ѢG&=."( 0kP.0_"@Y<^x2Q- q(i99_^z0]1l3h^'IH?B<25#H)_΋'O}1@Iu OKjj Б>iGlbafM^JhX㹒}Kw`*t')$'( X F]k+?w?\K.Y*r2WMwa^-gm/ AtmsS Qq?Lx7i_olh?3J ̃W?$,`'_b\g3Ca4c J kX|QGۅXd^&ϫ(~޽ϴqpgWR7$\k_x~dX2Ye0nQ^97/JT.!LDk5GJu_#e4{%vVs/5)9*aPdSJ)mLRnAZJmxIjp'hdr;aS]>æv5=aP2x lȘ!U7D | s!=O#G u U]X.#8X;>j 5¤=~!K:3flFJ3NʸEF+]8 i S ŰH*TR?د-7uTMv~@?j}Ż8I~|! 7NAWÎ4N?/[V 6>|>a6_T$oϿU:2GFWL1ҹLK ?-yS\P1Guth͈:/Ap JWwO1Xm:@Ytn՜r+@#$!/WExb@U`AZ"n!tøʯk] bh"ʨâF*bl.ϦUf>(Lk>4(БJuvqmB7Q='62x2-;XxNrG2r8@lLJ 色4 fHDIg]uz^${kٟmS#C@-oNWόOd@/܈* $_ ~[(gmꎜCQ1OJmZÔ ktcSfwr/(DI\8T)s]Wu09b>,t#~2V!tܥQ3MnEcS1M ϻiR+BaBOяk8Z"Wy1_i(w`?,m.FȥN,[Z '-%tV4Hj[?p6"Z?5eԘˋVRX-J'a4~^%Z-kP_G[StV3B (^@ Wi1ذNeθ&MKU'.X)" L'd(K(s~w{mmd{{V,78,Hq{i_GpŠHZN 4DO&:nq;X785DWTcBO,|Ɓ38?AG6+bZipSWIx*;:1lv={Ř]lZ`@Ij/A';h jIǎ))Зv.pNT ?r[!Wh&h܃F:ho{/PUzbWF-%S~m곢!ƹۺ/f[z=-šDC<]"ġJ:|HlARrUl0)M7JD'PvΟ?Y?ހlJQ>;+u"2of{ɰO!-Ю(zdwE_ Ю"K^Fe:"$  ԴUy;r}-E#Zeu%󨤳SA{s)CKTq4"oT=Vn>Vi;|!|,b<{:mϏq`eBhk>dv%!{򏧛$nZ054Z:A#wMIkgDᶗ~J1/s߀k "ܖq]4ϜfDy5*ZԪrO&xzCyӄUZ'n` ?Æ 嘰ZUDb{STV~ m߯2yeNF /Q0)틏栻ze' d4#)(eXt*#8ؖ2A:DSdJ8NbV6`u7noL-&헛/Pd;R= XpKw2ǭpCvO17b9aPimj&0"Nǩ<vjTgL#a^Q;8X8 2dpEv$RNZ=)Lձ_6CV͗NcUt65N4}$$M_%a(?Ą[^q/:tjZ\L qm10^6!{3 VA BӁcF5LT"ωm`ڢU7lTѥP6tG)SM Xp1z.d-k :R]VI٤=V~j@PsKfbxTD`T!&= .[Hm;i F".MS'p\0%ȷò!HhP5d]IQAb?Ag Cy}ϱb]wU܏_j9 N|^)'iE>LmN52f; ϣ Sh |WdS84/'0A_ $x=fIl|'u?];}*vȲ(pTW/IQ(R\PA&ZM_k}iSSFk\_ kerӿ UN\u&=+ 9&IO(/qwvN$\e5j#̄t2p]iOo.-vlԣAwuuѢ~Q3ز*Bո'+ Ğ׭tx^FE8<-j({Գ*Q.^J%*0uKX!H?wEۇ-IiZ}ǵh)kWp', jJsMǯOߪGa$J O\)P(ʽ-wQu/l̙@rOղ*!갆RlJno{JēKR0Eq|J[ZT5CDL@[:=h! FŪ{hʹKXa7Yۄx3m(m Qx1@$':#!n_1T3Vi$ JETTK#fR)"XU> FQ@_zr+c-p|È2Nr!F&<(HOZXK :U~#4S&B7`+x1 # Z4i4|ف/4|<([}2G8V Y2 mF֌dg(S@"v.˱5"ߣh꣫}sBjlDnFE>x2yZ$ؼQ=N6Z'iE!7.BDáַTIՃVȴ1%'WxKoը"tĢj%6t)@0*uJl9ȥ<,vIIcD! ݮ{f&:-XXyFH)C,SBٗ4\ô0oW\Y5ZeL 8G \1aOQA7aR/{'¹P.+ipݟdSuy$S=R^TUǛ1@: fJ3RP54D,i2%?G9[*<UBiy0 `EՑ{|7ˎ #2s/3904*&lQ)H**$gG{;+]Ii32K\j[N ͍iiLXu zuP8&PXm,yП$5thoͤpRg1@t0<ۡoޢ6O4ϯ?JMe P"b˰$;CuZʠtD(nJ*6,5GqP$$Xcv CF|r!mσ|{9Oa$eQ9;1dde(APVAvh,n ZJو:TZdN^PPq|f 2*>N', /J( e48D1J?w{Q)u svyx` 6$(x^d9jX˹ϐ[o$"?.oB VB95by&2#i)y`0a8p_, m|fn !kMw1)eHpE/t:o,/;^cTurI=緟Ŭ>@)d3i}KdtE#y)8'|/Щ)-! \WNV jwqvBQwAxYkAOwVO߽oKIk[%qFe,|QYq#v,fWwwi2즊,"<(sGR07DiMƔkj^VDV<@]aj5Wd4O 텍x ^i F4"wT R,t; ,rۭ@0LNO%ky5:<36kHvuB Vť']t潯vǘ3 @~C-K3}Ẑuq. "ZSF;;]q.:7LB0$ʫ? " aJ(e-WW]yGtl+~^?[y I,{ 660T5^"U?N³@,.1ye䬥gĵ8c @ RfthH6>)iM˼<;/ԯa87jfNITN#@]κKh>&k FOڏ6\/ \󍪵=(95os'UďFN9ތ9m`kq)h/d8UO0saN>YJX0m ʺ"eKoTC( 1 QPH7W.F:=_h)l%: Ζ͐DS InsVJVc+DH.6^~EC%:cdM jj6nhp {8YU'flON |?M, 4-Hyܕg捃\QdCTa\>@ٷWj 0c-"wY&!3W{2Kj4Q)bsb߼?c#<ٜ7)=l5DW`;qU(EH6fH c&epʋ(K8{]^tzv5GC! Q.*,4}Nlzp>,'zH7TF&sMyQ55Ή70;/a,3TD1 CZ},z寠|4~fn)M(8U٫} k`!`ݯAr7#'I{p t"UzNqjbTXMfIPAʧ';Dw4V i e>Lʩ1=5bQ %nRMd#ZĞ) ]}b믤FwxX,AzʛGSB˰&;"I @P'BF {p8BE/"ϯSĀA% -w)E{V `Dqr%m E }/7%g3pZx0E =|j<h)OK`Tω?qMH7PMztrs8oZȏFܶ*%O{do rą)nƢ]WreW "6vm Q ~a@M14ߩ~}ۑ m{ӯnQInᅙdK.'$_E(d=x O՜qnN|) a9ƛC @ W]Z+V`8 5[|zaon \c谽:s Un8>?Rqj1~9*@/yONMh5X_.9J8iKnMǹZ|q* ~\(!%kn&=}+f{nr8+)$N >]L]4. { H(lb$8&Q)q&&I=tX]ꄈdG'c/Mo/b3N+)fPl6TgS@RW )XbWP>8_u|v*`)ӊDHO+S|జԢ"Ypͧ D[~s7f5[ G0T Ww6UA±Fj@M1w9~0HCk'5*sd ei2Gz7TcD&hBj1z +Q~7A<K D"wRΐ/R+A͚4Dc6.gMYYF4e[=PyW]%^ S@ B1=/!#quG}dR|bfİ&N:P@B^NMo4zu|vL`JI ,Лk= )'yG1W.=m mIte?X$.xJ 9)tHǾz`iW-3Jl^85.Em34VT2]E`'"SW'ZB\ޤIFãFh1:j ցڶV^" YR^z?Ow5FTA RC`=6![1g "y Hx4FJ-z$rn:5gol4O[a$Ù3pw7G/rZrjIR2eȤ8\U{uͷPi4#9=睌*tAsNi3n)1sկ~fԜ'<Wj͓Tւz"Ȱ[E9JYjLoߜ0N)Φ4>!u n&A(7l쬼X90F]X=&^̓P:cA 82F>WZ,j3/3Kzv67nq]۝PXO:;NG%-kSY^(ͲL:'WRyuZ ߷Vf0Yj}Qժ]Sm rhSZ*t-X`Ӝq;k%7vmɴw&j]w U3.F5)Դ?2ܗRTD:|וF}B0E<6 >~q&C00TLIF F7;Big̨Y|ņ}RiqJGM;ICH}A\ƍ:s%eɪk^WsOݕUiw_^ Rhƙ!6͔a'=?p!n3p?=-4+ҮL,2@â张]// Nidu ;M=FH@ge鹏ˮ)fMԓVHK͓MDiCK,x,3A6NHnz\M#bumfwh^ìYZ]~q={1f= ^,W;R۾m=#Z;xD/^s4+2*B?\,ώj7X*ȝ.%ȱ%d?0L'!G[? &  qnf6K?T% Pԋe_"+')K-. dҶ8r>ۯ;k&cvJ ݎxe 5x}3yGR1!*F9k (~m- 2uz[k775$f|]xKa" *Yi&+;DdUc:,N*$W!< QĬEQD?^|vlTч?h;9 ;d^/ ,N~[VrwI۟>;Z2jyAMm]Lru[[vTtX^3vC}"@ 0ї8ehkTr:mp>X>@۱S!fCߣX$Hr#ea 3aQ@pDs'SDRTvt)EAN# zzft_zO1ڭ0h OeG;gmn0_LUҒ&ʍ Dhv\ |3j!sɇҍ6-B@/ JyDxHӃNwBՃy$GJUBw`~HJBn߇Eb&݋xl=O^ximDlwO=)h|L jG 6̍h~7,o/=ˏ>ԎAgAi*("Ry^v-H'V^r02HЉM,]jXh|?q"N|S@Tge☋ *|YWz46>8=6 _7 {+V.u Aֻu;'nLu$ݞs&F/G[C_oXJ_}+I2\m;[WKa#E$[G h0GŜpQbn5kfWN +GfH-o XܧMsgY0Ql<@cIZ5ʼ;ͼ]+~jpS}h"Jg:r !?@-I2ϿfPB0T 0_MY>0i ; :sr$9|MfobW@ge2Qi2 C #xu̦ ֓)dzo2 B{£GӋHz_!'vLajÓ:ۅ>+#tW,]ckoȳNŘ9Rՠ9̓AԭŢRnE Ʋ_)e|H8Q1žIJg2^sa,TcоmDq[ x/o=~p ~5p XviOIjn6qB|c[PM&ʿu4#8)g<$[{ qi~38U=<)=6_rXK/'6 ,gA_{py@._{QЗX$C^=() ?&H웞|[NJkC#}Q<"9tLI}eav/mMr)IP=^ug &75N8F'$t;clB3Y6(NР{XL:]7AqsރǬT6>؁`mblej; HRjۭ~8( O"H%PEK HXh&F^tF$X8!A K"7;0ԌpUmOȞH<>g1j m8/qߢgυHG6=W6 ב+,0^|)N]n!# ,rl alF 2>!+ "31.mDbO8 j$y Oyۈo&PvJLb@h\xJ& dę  n!sMGc4ܰac.<0s z|OJ֖\c8 D[Qmʨ}l} .;aC'b,ƻ+aJn Iź_ARP<;η!5}Ͼ %fm. Nx։Cx|ÝzuFE=#4coOLpR}3tȯa <}\ӞGN(VJ*v[<+Nj j_Fx;H&7aiV^]_Wtեkw$yņh@䲴cP?'/YZkP4HSF?dXj 77|@Z)gx!C{fN9+c aSz\UNJfwOIOMM~[㾯쩽ԘL{2߲DDG"fi;S=:(P5!YiwG;vve:`_ +,i=J|x&2 l5NznJjcL n,ծa"i@qx!WZ[@\L_vn-`/DnMH2uF+$D#9T#G~2>30 |J6p7?37_VsOP% ^.T'{RR>&il5lb{mo' Z`TEnvZ (Fҡ$Moi'}Ch7 ݂ 1J~<zR8j^CLo|۹x/B#[| EK?I4 q@F!9fSgdzQOyp`_qP-WWn VxzbaAw?X@LpU/kNCЩ%OOjI`P PDͧ7Tgz/cVyi>de-b؄T!y϶,=j4p3,"LvM9dR/ π9.'Iӓ0KeVBU?Py0\[~p@da_/kX)P>y $E &b%C.|:sYO?[4=Y Qp1nE,"q8X􀏶n"d 88+`LMG KЩZP0m*ɾΆ/ ot3D Jݼ\w$ےct͋)y_mp@Ϳ05?ŁnqdTǪ$tկ>>b6v[1ñǡn `pXV*ZW g% %^4M./!V'>WQ^Um:ql%jچ Ȧ16@uwz4 A6 LaOeC DØڤaCb̍ɔS3悋BG׿*ZImoi >VV"vzVպgTAz{җk|hUZb@ "V)@祔` >[Ӝ8Jj iGaXơJ$A 8+e\{Hn)9uX&&QyXj$SuX?ۭ\"l MD+[B)vδ?|ts/M|~|޵u82XvjJNnVESP$Fs^{JW~@^.RwɤsgCܦbȇœ;!er|mgK6Ge(.S K#Q2k`kyAHcmKFO#؞tu=\@.uxf{R}0qiԌ1hSNP],7 ɝ+L^ Uk-bι'=c\3-ي]UB'J3d7B!vnW=ܭ=xAU_}ҙ 7cg`6=(`^ 5nSǮ{;_lF,eRbƹ}b)9P?^_W' fX }3`Hok ΎT.,RU.Rf~ ބwlآ[l< 8SżFy*,kec9xSQwB4ܱQC!<ZHO*ͼ^ќb݄Lcv`οrTs5%(|uS ܽ|qW34֏k36wFcR:u\]7FI'V)ya;J[ҢEXX42^wUy.5w}^+)_?\L+],hʑž<`=k-3&_7Y=R8B2Mg ii$I E/RR~p/!b I2[[{S&ޗjqC,2,g5ܹS&W;Nj]M?&E~j&ͧ?:A׍μ&ZÔaNR+Y/ eGܥ8Nؽ}޻%~cK>ԯz"f?oȨ:{,_͇|3;'*0dYǝ؞Xf(*_UR%7"syג/SfqMY*c.)i9U"zRݜ2&,;\jHq0[-ۢ@"WSN1XgѦcw8h$zTensc/8Oნj2 U _p*] sAT^(6LyQɢ-t>gc͏Rtx0h2MP7q8??>LeQpSbGtS>kFqE1V68F! K,}ݽƧI}z/2ÚQZH$\YbV4)p\Z; vrz(Qj_`T<]H"ݗgu L]THkKUվ+UJwlVAkp iw n8.{t\RA6.ܦlR w):O b\2ƾ~^*nF?6:\ lp_&SqvaGS~ ыcb3=9*~௵ЦeID` 4"ߤ[I+ɎYlvV4>/YY@DqNvYR;+ߧܺiZFϊVTfoayqPە'#J޽*qu='rFo32W0@;i<~r'@!Ik慜|(=V hقC Z{>֔MS+ VsHJIqqYNJL--Lmʌy)h`D'tU<\(l">*^4"ϑV+zp"WR_;ձ*\vX7 a =V~u14#`ʈYP.mkon`}/>>tAB(?]ZSSA_9027:?1_nR`K/WNR?s`I.k;_–Wk]xB.l`?"J9O>|u#~?V%*h25KoLuJd>{B3ߨЩœ,VHg|GOny1r4tPdzڎSXr}V JI%Doc3wRږd)ۨأAo*/Ӿ@jWxh)dUP>Bi7@FC+D9]Tf/1N0z+c-vGZpya'Ii/SGSB^xFje /c.YSd ״`nEyfFc215]GaMϙpl#1L)Aв|1a} qɴs%YlԨTxU+c?TgI8,B>K#)*_b!|ѠPKf!rrIÔs~o~Kh^l}~j'A>\68@8`a31IޚCqdPRw3PC uV6P1;*g8bi}<|ys#32' !xVcӠbq#^F%>rZ@ OmgL ̛#+N/dE}k` VJ+:]| Qui>5̵cz!c N7@uP/$[U8Rտw Z2Wqdj-'Q2[܍i}T5KT"Cm2+~bЄc1 H;o{62h;l(iD6bUs6) >tiţT ?<#X.Ӕ-_q|;+V%8*t8@x ԧ_rp0U3ш'y0Ceo ݗCoHᤗ\j<Ü4뾔oC~w-hg{٠`%Fc)N MC Lx\ ]ך0.&xv؅m`(U-6|!P;ŐZHB_ A˪ oCcL"މA0F@\S92PTtZ@Ѿ\ JC{b h#圎h 49hŐ+h WCQHsuŹɂɫ7FXK|bZl @B62O0HؗQ %qĵ˲Ӗ{Pn%47 A:%NGJ9Wi3I @@\,4W=-]4a)b'n);a|s%B~ c'*ml/iCO(@;̈́ߔ0ü0e۾h*^66.p%ߺl.*OuI{tÁ8lvH!Qd<@Мԡ!KoBPp&*(*߳XrUmFSbUkٶNQg 4&t?pF1hNr3VSexxX^SGf!h1q͎2O݅Xr;}G&'nfpg"9B\!t #9;P Mu97*A34y_W?=o&?Ა/qd4|ū`o,^. TCcf ^v&59IY&pr(@5̇avT{=]q:ë뤄V?,r7~~HՙMp_  A SYaT_ZX0:dlF 9쟡m_[RAM~nj-&Rp|=A.1dؑ!-HIt4wXnM{PxMڒP8`b]-b6tzA4Vo0[V[k8F gF4!LMhjg2~쮱1oykNfYaHF5itF\"4o4kb5%@ag/7ǦYSQz7'Ƕ3HhoxMNmḚp)v,^~!*]2;0̄ h J'(Zh1;5-C3Aܵ*ÿ=š-Zy? G8?ċ84cT_\$2x lrQH}h, ߫Jz{l)#k)Dl!yqK$z_}k׌~GbBtq*(}AXre{f 㒺#\}T{814Q]$_QH5*ehIQZ4h^^K9epX_)!קg1 Ȳ:ҽq NB2c\qsk +_¼ftݬbWyL6+wU@0kPMYXiG(m2lX@?jQ.rTcJV R0@d ;gssz"~Gmf Fsd8\nI yIK:c o#S䝰#_Iv fgWQPZZ탭c]Ub[8&pvRϕTjjZ1FpNMKX7E4Ϡ8tB>tpPm|W$#ֺm-Wtf]] NHr6zU9mvhO xh _:)̓_܋?wTZ .Ue:P#V(d6ӥ pP qr,#emIZF3ș~Ϋ\K ,D+\]]\XXv䙥B|Fx[h6@)Ry+K؛oFIG!cB 8V)~]c#+j:'C9 6`>gR_)>Te- LcTp#"&kνpt5N?cg mh ^BB׊) Q8j.Na@/ Ic"ȷM)+U?W:#Ŋ _5\fUcc0ԽjҐm/ 4vE" `ሟߩ'!@kȷJ~a+"A'& fZ_<r97EfAÉj\ayP<η|Ο޾*p>c& j9OTag6Uo"5' }5A.-tU}*:mԎ(ję}*?(Wt0t=ޞ06;EQ(U`L}>>-{81>_PxcЧ e2SƟfQ7Ysq[ oxP89ұwɖ;R˳4Ǔyl *HJ676!:b14,K6< "߄ƀ)T%i]iM/JC4vu3FbcT[Vf,Epede  JsIrZC6'VxY{LCeI\] PSʈ=!2Py˃!J -er\FRO}U&g0#3p~$`WJSZB?,dH`8Ȭt߽9+wB&d\Az]H6^S,-/{g O8 z _Hr qqsTMmw:rKF j&;Et `*ɝ4l'K)>_)'0O#FDzK*g+'8pkdQ\E7™8A&PTGCǐU= g (۹DY^%Ʋ (3$?v E_V<=* d5I׏Dc4%.'&!:"/5X!1KP#:p ѧ F$j"2GvH Ge'F):ZE\Xx{*.Jn݅_]  CQ;Q{|獥J ~ɸu%Ltvِ \cRpVņ]wI0 $<#Xi09~#A&̶RYx# lH jg{k%yqZ|6򆘖h pj#$=,k h_Oʝd]ɏRwSTX` _ =]#|H^ h;ݦ'`:;-վϴ~\Kg`)_1W7Ui|G2wL19aauݭ[Y><ޝ qrΕՏxp_x]r+x `@JWd(Vh2y"ƭ;DǢ/֜f;5M7[)IX_X ڳU3S;\`SJ6r! ).7vʋA#ŕQRoO1^#nF01 M>1 TC[p62˜翭]%Jvq@D_)dMwPǟ` J<0xG.TcQx)AP3/ků"%}3@#U3w*s~d ayc5.$ a7c;b)]?nZw wYue{"$-k8@~*@S*y;LcpԻU/Jk!s_cŊ$S Y=1YΟ8]Nƭbg܀kyVe yXԖl*u{HZ I"ԼP`#бP]q1K?5,¬y> ܃Rl12J8A :z i}K64LU%-mwv6ѰMúI%D_ 8Gfsw/z|;j.6 v+GXzY߰ה2^ }P!~bxr#ƁF.H݂0k?q/:`v`5#?UricA4Xn6g+[%/}\y%Uݰ )pT9$CT+Oңk+<ުލ!Tz.u:a2t^xG{kx[VP&>}qmzϑ/#VV=!` Z7f+YJ">0R0VumCVqGә0pH4>xB ¤εúJ8lՓқ'S!Ys7j[T:P{6:Df#f|r1! 8%HHs}c둛>9mrw%?D94V1/ VbZ,֤j 1+=X5nZs״ӓ^OD^I|Y~-P};.V`EWV'$W#τ7657~E *m=Mذ^dcZ,Or1KP4d[B'‚7ԴXڐ@WBn}~1&6vqK{yAf3[QPRnmGZ -rXO7(yY>h* K3P,i:. B|*}Nw$AL:x0pS * Ʈ/[v7t2ӥkB_Tj:u0"A~ֽKU}Z'oӂ$>n`j+/R8Bvg"2^+V2r3 vb vxr%jJ~^@^rc_1mSiKdڻTPGb6 N"VHG߿}]N "Uk1˪CVo 5 SʪΕcOaCդoJY)_ ة5iK%4(s(p~ҎTp8 }ZYJvPbUu_=3${|'-~4Te@pݐeɜGe'gvd7CrdD>R\M?=7i$vHMkSs'jOhF>9vfd ;HE0_<Fw\3Y-?j#<êeά7PZNК {Dn52(/P1#R䡏%zOBBOaE7[:)2 cW3M(m,dun@@Gd>:XMT!B4\yUOc)5/wG. ʿ N}=G"Wf2։*R֝E߁E(!·pxK!ʋ)]DʘNlŭ:5S.O6..>h\3:+r@~f.M#F;\QĿ(YrΞq= 35Jas]`BTiţ(Iȝ ጰ9DCd<Ż%%/Ӿ .G^U`ŧr]bH2ʒfrq-iFV62:|neZvDq^Re|3<Ћ=l'IK62.s֘v۠*m HPL4IgG!G/MJJT,i+ *hL& E/\<~o||BJ,iXnUt|fեw fBh~X >P.3ܝOQ7(',G뺛Zelx[sW1}VƍjP曄#@bBOO/:L\e?T[=o\k꒔ī)xL;\sɯL&g8vTпho_(4歀59 o'T}fFkܰV'ٟh_it13LwDT+c*)w!͞h\ѣjsY4NтwZQ@(GBBpRfˈ  W+w|]:a3P15l}Pc,V)Y~֗2 a+~ąXpUd?)e.Y*%v'd&A3PjBfUC>f M\Zrp'0@jI{*pl5xv QQg4vGRc+Fzvg5(&tm[A7 Sޠc]9_~tz]]jarW Z꓀fqJı8$n2dOHwY"k%^D'B6[F_^y_7ɺ7TՏO*̥FH5m4O˯cZ/H+ *V0ت5rSqr^Si^:E*?8hKedxF C{`ȰM;MZ}ԓ%qB3RS><)/(DxSf֔)Xm0WXT_.,3i}>TPO>: "2Ɲ~.C  hLp$5t yȥ&yᥝ+>W'{}aR0'C!wb(n!9ĖIsQe>D KYoawgl`=j:vJmf5r[[2Y.K+/=EH 'aIcm&6M!a BCz!jioOͪTHWֶخP+.J /W6=m B !6v dò Jyh}W/4LڰցT7!Rpb b@ wyϩXlݘ[ mLL_ĻsflHEd^$7鱼}]ktc,kvfيNiO`#XhYL Ħ\mW]|3xGhjQlmd"t3ӖM;6xåʆrXm3ׇ¶j m2~01( E~"o~_@D7퍎gyML.6*$OϮ^B)~sbY"}E@Eq ~+-; %-)TT:ogz(}S+HXlb۝Acξ(JMU7Ps|4Nld :h [۸1)[kuʮ%UX4UњS3; sK\~VFUA=Di<- Bx nӷ}S!y'u8j~}hh1kn} uK=57@<xK#^e+2uq P)}ꨊ# z>828Oh<^N;yҼ'xMhYI k |{TtY = kyEeR/p)Έ;EJBlk5vt8l{֞1 T tU"\g4WmV8 Fy2k,Ty,S)zgC\IЅ0 i⠯=+B#`o;:|R =2=|M\˘pƭ+ y1u"z I$rq{N4^8 Nj9tCbԑR6+~E 4vФ,I;FdňFkq~֙ȭCxeOʫxؓf2345+Eg1|h['I~'>nRg%S6MJ53& } { W<ǒX廈iݟ-y A|$+ǝe]#I?!RwF>'" `Xq8KD*7'6Dmx=o98<!U¦:϶9dZQBY,_r"P{&2[FO:r ܬ90yD f3/=#'0EMP4hvvVuuY|Ř#x֬bY)ͷ qkW0vb(t$Gf:.ts|rNP׎ sX/D (WVDS:L0Ji@Ղa;B>0lySi>s+=oR`<_BeQ-ns} =)W! 84q&$c^0PtftV.tITK)"0wsR]1mANʳ "&rDŽoż[(. LxH6&XTQ[|*w&MIϞUF#(K)毵b}=tF=}[UNH9:CR^4B)[od/10$PO`xK Tta߳wS9z/t:`֠srW.xSne4z_B[r3G &[Y4%(@`bx|Bu)c6!Z|ʹUj֪)[Mpgnq,])>pRT =03,]!JtNuM5ot0ʂbˑfK4F*ʓC[J_sz# KuС03};`GrQ:| NbKҮaFaNr{$S@7#eaIbng7;cCW3Zu>L4-| B]WE½~\4I>-D#m m0(WbR5#,pMϱqکJy0WiߋJꭋ_XQ?7q._uo\1gKok=% tL0W/ pQl|{35-3xv0X1PLK+׏E`޸px0\d$h+ą/p@p-Cfƺ\Ġrvǭ51yuwrR- zNnѿCʦ1U;h oגK/mӍ@EbYx8,B4\j`@c״)s"hSgA0')y5۞jxqrHK_ۘ:`aH?Sꪗ+jw6$otW?.=V9EkWR-4`diqπ$p~ i̗%h[0u wë`Kyqw74+er9fin)Szt҄XlփxHz]CL PDIjJ"dSH߁!3=a6elю<#(a~MB~< v?`!}6/)!l`5ʺe1yZ8* #̤3FnY ᄍN|||=&2jҀC'o$ii]j{>PrA@jvN늼 #Eኮ>n-,Q>S5j[k\I>K80ߊC}V( LjtYOM~ɨBE;8$seTO`}P=Ɇ3['3s) )MmDV =MjD*\ p$rѕvnҸ4 E轶xB_grX[R5, AzS>giW dC[}37(_l%[ ĽqADvv6v[&$?L0t%Y„.a)]mtb?v1k ?ŧK ?T4RA4A;lGd>wh4; g[N*cLAEC.J_EL, L/:ZF6ʚ ْ|䇙(c/=|Q/]-{|4& GR!9hSZ܍SFJNRzA+_3 LNe),ٻ6YMэ[=%V*؂+ޛ#_>,qlM%nBFfގֳ.֊^W$ g>ڗqoT=Kl(&l;$B{aL `^ƼU) iW.v;zobaMW=rA$e37`౎=jwenuă̐LY涤ws6?(:wMJoV'0ETܾ= i}ۛ) AK0_m s4SQs;Hs'^Af qG)b42aIP?(Qզnm-5O DZ.Oy@zqx+k%d g*wӰ{u'(U3- .+ҞkRv77urwUpg:i4E[D0?&[P; 4̌U='H7 }ɸu+R?4.2'Ž*nޱҒZh|\|w#Q|#ӊ]lGu7;&c~!BFйҏq%o΍_DC!Go,]PgHi@%^ H PiMgrG0TI{r2&NͣRg]+EX!JߙXQ`M.ckjˤ[$2<^Mu-.|e)(1Z+o5bZ/Yh?<1Cw:t%(' Al)Xܼo*FL~KVge%pΓD&cTĿ u1A( k vDFl҅D48WyRfRjz+Ds;Un>tȶmW@Q2B"؏9M *I U#mHZ'4Qc&$>t@.A qnM&7 { Xo&}3e{*ٻ>Yj9F,ȷ4ϡˎjQU7'+b. #=ǡ/+4X%eȁ]*mPED>- *\_ƝßM ]t@$ BWk // ӯq<:NޯńҖ!>R(r-25vIr}F\E[#xZRNsg|ܐ]i+Z9 NGX ZI̓Qe3(,XE L yON _g7$N7O*_|jpdh'CQ#¨ߌ _tya6k_ E($7XV>-1T:R) Ǐ[, 4$% "2 Mɣ Y\#D.-}S&KSDkne }5*LPfJOĈ}luL%PJ{Ht(#zP'B:mn"iAJ:1+)4@9F5{o_?9*,2GXiVri:z@Q!,H-W++_H_%ގk3捈ax{! e hC^F/]uC}f֙YŠNOЬr?%}>Žed,D=LM){%r1U349/9Č Ѱn3radhV`J%CJ32ebXc)ɏL'ﯙ1Y#QO{toHd}p%0\:o8GV 7Үk8U|vAD2Dgֶ^+ T@&{{o@}{6#žz$Qv!>Pݰ <`2ғQ Qg582Ιc}F-Gx5t'в+i#*@_H[u xԏ&{K]Cy"XNF=!>o2CuHgT6ЩQz`Zg}=7G[eA:[kUQ9 wջ_(dk.YI52[Y13@+l nS梌*Kil2*YQ|. G;:3%$&/.YGǽlh<ɓ|wYr|!lp ~ɗfg ;W_Y5$tJJSB_g9>9EL"]O~L6K[}e*_xq)|[7 //u(9jK?;7jbO~9@-5!eZhƒk+;2?"~Zχ쫪aIsv:c@vCtHd60]}BkC@19 +W$x2S%LfZ"p'˱) ?],l",KBD|DcH"zejuKtEb0o_t`h t|&їF[\uuӿ dU:ė0`k1MӅʹ8!^ym@!-o6L?Wp LL Q$OTi~6m9:/3M ^0`ɠcu48}_PhNp#{Szhf/=;JkaTAKM(|QqPUOP1HCX@t)Rqh]㉈F_?Rh֧]*H/Bɺ}̉Q܆ a`̶ 0;!G@gQ}aATXN2roYy}e>3T+$^L>V aGcΑ75 '31W}7&JP]_̈vSP]&/nOh&͉؞F ˎM.2GX"&;.OG-]87c)>!sX{D R>‚a'͢ qQJ3/Xma=2ϕE@7o8X[]sݴ03}Eﺉm +u #W'L\\h@DB[ ,bKuV(:J헟/<8y`Ri<KM.@ýQc zYkݖcA6=>AqrJas98$Rs9Mc,H3cn-nꇕJ#Ɣy&vKޖl*&\`M< 29cuΝH;y"{p>SAӥK?hÕ\&QtWQƣEWIEF>Zo = \>?03Ɩ8LߨAOJE *li]"tJRH2M #sJ8fZhY_c21Va^l}w10&rZ[tDI|3 0f3edoR^hV`e|!1[>Y/2 &O?VQ}%QPxAxҲF2CO5.?4gFQ+)aJ +*rpLliq!XĮ"jSil@ayQN%< ~տ* mˑ&?zSkO^`*n{a1oGa He.`YSpDȏIqc2,PUf᱘=c+lS+;b6t4+) <ՋkT!W2=_2ϭ1j,"H:4͞L.pULO`([]nk)]3:vC,fWOcs~pkRe}T9-{΂LV艅ɌG(褌s"qv 7G@J;$.r@kWaH;f P rz|J fJL =[ZDh-m;KWٽ:8s^ɿY6c R#at1mED6yb5B,ZktK'1 0= V=|mhvE.\mT |UuTqEc>j Cf[.ny.cs=#x;uI?%M-M040A7؏w<{ xWW\sNxqA1LO:␟5IG_Rl/ui.I;I8ׂss#șHl p4 `E;m,gOPX`ؠrS _O餘'<@?9I׫MDT,CsRf@xB72cu_8=vz41b"5y5rOjcEJ]•qo։yt|sl&yNʁ̑O ҹ_ 42r{\)|1n5A$GPM/r{i*z'DD]׿ y+h1?דkΙO~`˧;yOO'v(x?gS'A[V kbj] `s5YMkpe]Qtѯ.<8&jvjNxr?GrǣgQ_ciw"TGmEZiKUDkývCꑄ?ov9gtlbR'I'QLW8밑PPٌo)lUX""v<&P`z<-^j#_NGgqh 7Vh5Au VKƿ6 tk闛#C$J'p/` ,D'G!ǡ.O譗! kT$IcŸaaA > b+ax%}qsU>}\>ب!rGM`e%JEm2Ychr8:kXrؚj`~ulz NxTwL ݲ|~|>%٥y Y-bG5M\t~49wD5G* _leC-[ͽ چP"@h2T 1szE]opF+]D5mľ:֚$dfw7ƥ]]fۼ}2@|ycbrKF2ݴBC=ۧ߭d:5)PU&, "<^:^DHQllFIO8UC+#wbFC;\8Y !8%-][zMĈU$^6Z9N.8I%BU.\4D ҡA!Ry||:@.X=Ca $f;#*JfP2s,: ͷAM933¯ HmNy dbK^ { zRs $gH'Z h 朖. 79[Rc%"f҆Ԗg/cUzŠj\Ba^mgR[hZ2[~rGKUN`^%JQ-bVwRVCw]j+ i37"Vel(/3`?Uwgjyɯd^riZ~y,?iXQkh^*CgBz][] nj%N%ژNv&3K2; ЮsF ^-֧+46B;˪skUqp ¯.2BV&T/%g۵{DQYN6Dbddmֹ(V6?rƂis(tezǗ8MޒL=& b/E o7QMXr]-B-mmƸ׏>)@hbX??jܭvq5jTnMwU*YI\7DWqă+EYz-T,&~L#͕3/_u]1 ` w0JI8]SڨD:ǺV)BTibsD7U)_Wߒ~Qe7Fs2mwM"84*|ڦUbK-us\*NVs T`O7AwB#P ثrU݀H}0~2NC;u\31ƥV2U1o-Q<qX|U,W`_5 ( 3Rl[LZE%.#/V[^7#ę% Yl P/ʫ]LrhU&!+( 1agQXzyw}SX[eEP0܋, uzI2 <0#B>b mM3Kln ٯ5c]jyf=@˥+-yR~3AᱳK+tZmȯIJ쉞BQM.C`|Ǵ?'XA ŭ#$ODћs|{ߞڒMtalrS`ǢXl2t5hbfww֢;ymΊ'1C/wKYOtE.d տOusԙ[gzӾvxovc | KxL=oQ?2P@n0o{l+2\6O4*\{O'a + ff)Һ+@V3@z(YU:vS:iqcx Bv9=Qۼ)PjCaeD/}q&%-,L""/|aeI>{ܠ@<l_:6rגּ2"ߊ+U YdP;qwQá=/QL3r_׽1QC$)RN͇*|Bl3O/$ⲝ'2H5E E/>e yj|V6pZ.5( X_@]˅:$ǒ}lJi$Ѣ3m 076vsژk5W9=KP(=~uq8ĈXtbH71DK&#e[uwl,N{dVRƠ@YWCP^@q$s;dow+O%+JUĻ݆yO0k\442mW~0?:OwHC xQG.ͨ:^Ha <{yUenY`w)m*+KĆVhe(9S2h=Yor_"A:jDP_{8R9¢(/ ^->'oE_L OWN Dd#aI*ACX-wT2 4eB익udW+f9DL>,ps31{bBWmNTD5dXO'A'Bn 5a<?8O)-=ļqT,h#OGj$fPj$71R1={d=[NYޓ|vm:mLaj\ܢ{`V砰ȑG1 syVa9``U q&y"qm+]rQڥu=}T=G}or PzT+% 0ޣ\<L\CzբΫ+0 /qI%׶ڬI vN? (4%-R H?A$)d~oO p G ׵L_0CWOƫ.bVB+7{eGHZHL" 6'/n-sC}i!BuduDh+ta'Y+I)-E m=t^fQG1E~1M: X\k؂8SV8{>չZgG[ ~9btX97>q3j'ۥ\=bsQ{?4H)W`s qD\bru~L JZu#;:+rd)<]!}_NOHω8g,(%vtz=ts\ ;/4[CfJώGafJۍ>fG6z-(PPW=zVH3&`QnNH =SF瘝ZB\% tZԓvI%$+zȍDMNXJîh„pP&̩mwpMCPЄU:l :ɝQElq2yy_}ۦm?kLwhp ^3 )0]93E0whJ*qI ǷV%{C Dv-ۻ͸?ق;;\Lg||u.J.I(Y9xfUFحU{[ y%3n%ӳ%"hO#M.Mطs12c&]ڃL' /SSSh7j.Σ8 b fNC B9M ȋ;vѩ9 gn9Ur_^;qnX"j}}N7rE1U:L. E7tH#.~^-7%.>3BW\Q:I[WP59C[Hoq!Tݨ&2j1^ۍ-Nmx&;ج 5# r)M/ck}C>y\{ ZboXmJy:oq7>SSlRL城ttr #%+5Uofh PP8Q+Z]m{x^+R`S3.W/:,k$}t/hb<0(ǯ8X15/|߆jӗ{yq*吊㤕2#|Aэ'ZSx:<ĿFD`1]qlY&=fXsZJ8_dwF.f0TqF[G8q#6XNGR>jm2 Kc/~&7NōNS 09!!d_\$Q ӗt5  h ;YzGۥK˟"\ENFt4 .U7Um'kרPDkɮSAuLO?j;yHG`Eut9f?Wrf\TRNȎg7*Xu%3#2a <#Hx vOr'EXaT{'z!}YfJցrj(9M{<{d%?k1z("\jȆG֠M֯?@3c1t-=ls?΅mʐB77F܅O3OL^ 20ZW-?#cCUT8hp^/쯉) AN^"a'*Hk o^aN7Ex!ӛlmx^EO: H'3 x]dS`6m.(/wciϜj$I i"|j7jYx$_,:Qi@!^DCǥ=s*KICg..nOˆ IiN2KX zIul  Qn["`[&U:/`g IKnt}na);/ΏA5ehi7"T&5['Cy.E\ Ar}/wK6BUH|_\Ŋ5KaĩSn#]w`|`< A>|c׵cb &\<ܻ8yg3b=\JlJ0R].Hn$mH :qtN+n.Z@J{$_E9XN[5%Nno(L.QI(˿5ګ=`vo6y1e2k֏JK}TcBi͔9)VVv=y{$ZU&*(>ʚBay=&=Ȏ5{~ҞnYUsq/<&&2AtƮՋpqR: {ە1 o_t 7ի6d:ena~L_^;]hxcpYG*z0 ^Ba{`w1"m:J]'e~FtH+A4(iu([N( rses܉awM2CD{}sV± W0gqv==χh{&q,N,sEjIiǗ,A{WS.Ljk$biW=L^X6 휇 3[\?.3wzfM !OG|=xl9*RZL)aY;_O 92~M+ AvG+Gflu\w$Q|qb&vܨQ T{*.'#wUHXD`M<c_uf)TQ̑ND!02dp  nK;ÿ' `.Q{#tzgL$uŽC( tp@dɗ@j$hר!b͒pJeuBz!1k  |үB+D5ݕo;|L䤦2ve0-]<дՉfwg\!RSIl60{,(u:Xs*I˺uÿy񡩧:tDV>D #s$%^OJc:=glX1wtLȑ/:*/xs =<[pzt_,ZLlk^+ߛ{ż9]?uLln9!@G%f1U<΀yE q sm40\xǠMG ٲstbobxoFgII$Z]FT֖O45&*QEan[+lCDN1GaAKi uqU\qIT0uYU!O3 34#nZ:wwIIAQU @{W0x䃕p{r]sP3?+G-& T| *^?Ig5-'͠XK̖3Gx=*Br:([?ضLgXWz.$Xn4SO| -&!HVpP~#;ěڌZbDö<Ue8d@,:hs+ EyAi8 7(&zƓUH42(Il4RޛznsD|ffKXEǵu~I ZOmoqFzthd|*+9Lo1r478!bcIIuױ u =#ţAڧ7u@;lx0uENz\XTM&WÝ?U*}e#T. 3A/rDe>p)@7V|ПdjQT{6 3NYB*W*#qP`[pޝ!f/.8pL(C-kLf8$rWwq]Bb>+U.C{.PO{9#%zf#k: վS9&:wp.ʵ1i [Jj#OKQ7{+qnsnU"lvt,5<ӴO =2=Dښj-qFB;>if[w8 u4h>T,ƃ@ @$=,<=Ii #bziR>pHysif :htϭI}>{ KmBf](A76mK/<=hnz PKUmɗf\Û)ªYHXE Wz0 .~8wbRs&̳7;8K]ԫiA@):ֳkkjs@m>_Bh, E$_"]<5ci"|?5߱s޵ox-qQk%Db-y"ʳ lTʌ߃*4b/ߊ.9ft c" ޼opRM@o !ՖmƼھ|v Nɚ;odΰz2 @h5ݶ1J 6}[/z%h.(%J\ZqpTWB?ik3DÅ\%MNil, )݁jD hGR~B 39:2okKHOc"loS1p@)N38j:_\3I1YZX̞;^ 3өhMo^lFcc/U ߃͟Q QsEh#Dlp) R]\lX;jdd&1E&KĂloYo]p1#p!^sTΖʼnGoEYoJ(j~g%mڄ&?Hir^x+ުK)c'65!b3(%e&G)8G!/8SIC{JTѹ>Fc{k,~0*!;հp=hp;o_0J#Sp*XOIvJ]Ĭ>%V㶍!08F/EE2gl?!klTrn b͠T PM a&20DT=T~EN,V|¼k,#R-ȥۼ/uRADT8j#[dI[ ƕ!Ϲ*3C p(!٢ϯP&,f-- !Mɍ8;ii m\,\_Sf^ʲk+ot1bN d<57J>WJԎGr.5K5 &PcuUg*,R y ƽ|WC*4ad6:aarzExHH, ^޾6Cry4 V`&8SaʱWSedZf6y!GS&9'W qF: * ]x*IK1Q[M?8ZY-lOo-BE3RIG94X࿽]m?mҹ3~Y" `G‚"$񫕂ˤ\hhՕ,%f]U>A=ʡo2QJt M 'Ρ1O.rRX_"x`ZST]?=Kum -7K{0C8Uid)2ZGF2%ڷROC5.$biʚ 9 N%>90էL34ԁ( *&]mX dچ!Ό$τcPOg5I]Q[[.abty9*HUP[۵(I0+&Oi@ۂ4(V- ad&e 骡YViGd^}ܬV1RM!C4D`mhHe pw1*x%rf,"o"_vP,c&UxX>;~.Yk\\JɲH  B-khfA6pھm-3 /a hU&k8NRU::T t"P/Ce'Qh' 2ڦtItȳDƸ{% }g7>̈tŠ+%2/k7\yZD;W}cU_uӁ4|FyC)/2hP4}1ZR1X!A>?|G??\lR# "Bӓ&?:Pry:ĥ) ]&ƞsYڰ3q}Xk&Ϝn`3 tsjc^#8 8pS1hx򫮗PM|;JV:D;"{3R0ڎ bsGV_B2ib.p?2A]&&'%:Wq@D̔hbgиDLJ'`:br(]5ƓYt ߏZTXMgh$0VݠDl7K[Xu6UBh ӛk /` Jߚe%GV_c x_#&F -;&; 5U=AN^+ )<:Hl a.֎|Dd+*ؤj #MXp߼A*A 7jFrEPক Hd[O]s{Z=&vb櫳f鵉pLVi+J>N}Y'G#_s+gF_ʥ uf 0jx]FL/2R#[Rc-; ~Ḧ́;- *Mc#9/U8`4XWZK a| =0xhg&g;e1yƈcA GT^o;栵u|=No˚}ZP/5'03ٟq:ϩ:JMMQo@ٲ?kHo4,b} _eஉ<шXUI /S %&cD';4)NeGK+$Кu%?؅oa+9&W1UznwYk[tOHǖ9Z&kcmAT 3@HGm1R[\,:HTC`al;k{K6ۯl 'Dapp9  AZ:к}<{C1C]kw-rD`ZH})9?̌Bqaަ 8s/ib+^EM&y "TzZ &˟P`j^/$V:͝CBs]JA'_J@/IltV_1W7pW37׮:sYfn$"zn9@j䈫QY_҃إH $F|^W wouE[ߍӧ`%H0514 E>jb I ;%L!_݊tʈ)Wb\$x/lѿ0ʼ3-Z{pYFL|٩]&+ G_ E>a0n]c+{E_L%VSCMFc=VѽAVWL#!AA|WKގ'Xƹ96$I5_j4=Ȅϰo7z[&@&6sլ=UM}ձXia,Ov5>m.SPi LOqEhs;x@m-I{1xoEǑ\,sTH°huz[L\`5^˴+=x`!׊Q.R~" uԐ} , )QsWORt9Jw:}xȈSsŝo}GV$8(CB!Ӯ轑/:F7V=z3Jf&u`Ƞgp4z6y&$^s` 攬ê9cq4'Q˻} Ln)Gz  ,OBTN5K@GQQxJ)5(BgPß@~Avne?@pSEs0sTVS]J&-}Pk6'3 Glp>BiO4o%4򨳱LHuVBK};j5v\U_2 ֥sQm(@ DSOՆKuL䛚_tP)b$(RD ֋I\i# `p6Lzf0>)mQJ ؤmU8*q(D툾F,៨07 KN4ږ!f79ł fB{$…"ͣmc wSˉUE#F xpmAr8we]TWT2e7u90 w]SLS DpqʿfhKW>{:8@ /iz"WIĺQ ٌ=ab~-=HSm44#o37>K #hK@D昊߫uXh?pfE'vGc%>aH2 Ine?G jzʙԗ( S5$5!x: .`;@i9!zN D7 ۨy?Y?h (hm^CVO4l|^h$8 b+ l*( qkPSAy9aT6l6S7mN2K?",P 浥#C+2:s\ҘsY@Zi} e 'L~ f1o_S.9"[ ?\PJ֧*rP]?X?DXa 9 +wMxcϻPh!v6?9]8u6HM,"UlV <ݕL9!mN߱FCf9#p NS5ulCSr= %&:YYrZǖ4mR"ֵ3ڟ>aaΰZ@ex ‡D][ɯK^& (=0t `$a3$#ѥQ9d9څo[zb_1&9cXK'\e?8,nHgweF:c "X".:5X(5촿ӈ{cϯ)u,&E^8Ag丘X<.tR7rY'dF{.+2s#ս%fu>Of*g3-W&ky2|W g{PYß%蠶 ?SpOmfh(?d ɻ}w=ZLC a3ը%D*E7w4' tR`* D$S玘ЪW +&&(ʆ~35qieJUOQ0oC;TÖ(fπR g}|WU%}Iz݌E"یk^>@dI_9y|*f, m,Yc>xU{0N~We4i͚<\ ?7j-drRUWxtjZeU[X(ڧ7'P@=G8rѻ]nV_;5yB W*F DK PI3{3[ЈKczsE+p[a8f]k thy(K:09]Oj%xMMG Oq9=Z?c[L2Qu^rbQzsIlvҐ$ vxL;4ڥad^ s+;z̗}پӣt ƯMGH.]%@͈p9ḅX|^ 3{C%825m +hb }";6b{ *bط]Ha)zЄ A"T];%)$"1~ w,q㤋vQ~qZbstD_) MǨjwNKGAAeb}bh%P%t. r`$G q/&/_쀉! 2ض;̭Ru0Itjp{#RyUh"hiĂ;O+GCFe%uT!gBt(c/Ǐa}>BrrK5KaoU 'lMVx~RX~=Ы K%{;l m9Fư\|YW 8?,O}lj_=ʐ~y|ᒃw}l.$7rC6ɷk-M<7䭅;Foԁ:h\?/X"ȷ/Җ4_ڽ\˓L*IZ##cvrmw{ہx%>]P;S[<)"=޷87D>[,\Ga=h};Kf`GWh8w辠d"lc*ʠg[9,TE4pQM 0nL<7y棖׵qMOV oJK@[kkZ멾+2?B2@"GזYMܗOBbOA 594'/0hL@ AeoqRZoyXsd =$z~t=:]1FBH9``-} rqs +Cy-8 JPzcKY=5dڃ(}DP5*7~YNc+'x{]^z{s6f)a1C @ŨF9,>gB>YV+?k}VY!ջ{<~l^L~D4?a 4=$d?e!zcQ>%q!GN`" .BD8b [,1@::lL j:3FA?.]nQCvmq~.*#3N%)s 6%{]ηiz?jX>3+_߲@Z&t (M.+ .=>Lx0PZ/ ZȠk| qXfgo,’*$슉rzs7OXBW Z_/Qy]soo˰ՙ4pxз[_^;Fc@h#ٷo3]<j$",J/Θ%nUiA}ĩ|dvh?{hTUXS<QEZ/ ޏEa,|gF ږK ͍:N;Ǚ)Q_d/sN31gc\A8>I|q֠z /dClga7 o`l6Ν1!C-^ixYTxJ\<)i Uһc=8Gz7c%wL#Ν% OiY9%zT=ABC>=(3=7\'ًvsŸ]L;ɖe9L@4MQccX.]t8;vqc4=0<` XxԻ>`[;;'ɺ! ׫ 'B/z{b-3hZu(IX1캟G-1$+EJ u&kHB|1lmԘCik'T`Z 4&-qVkZ5_ = h$W\^|a\xINSuEccu!O5HW l;s[opԡYhV_ѯ0E㖞/Dc5gKu)|sti=2Q1׻- ,a&a5>[f t\(Cbs70NKBa4Ջ7ʫɺ :cI {9y}/A`(t\Fpx(Fyʗ(HEc7] oI)Nj`B,7&DӲ+(F̭edeupU觭Mlj!Y\X ń%rlᯭ?Am\_Ԕ;a(HB3$u~229_:y Jzd/blUH 2t$UyR+G%{;gnn=ٹH{ud/o (ɒIm&!>fw^@$oPVV}HjޔܵK73iy̲.$쀋ٰ?^R#I):ZOIB]ByL={Y͔|*坓#Ah֣p3(3_{g.IYJA[_BM`1(ț\l`09U\\mU1E!za dOv,dYS%k#S4mifTM B`+?_s 3[!'.Z~w?tfNl!} 8,bqF6#c+36=f_$9U[Hu1{ q +'f g^F'ǔ3N#!Pw񍺽ݖGe*miM2;n`t VqvW;:lZWcqA.[ph|/; oDm?h_"eG5U,X[kSn%T陭E5zƨM5Cj"MޚpÊX": =}(,m.cv*^$uc4#Bs g0jώ*d9Z#@\C`.Zv yS}A@+UNaJ^$:[#NnLuBk$Juϡĝ}螼(6ςR5{kaw*~7TfHx#qH׬9wk[ x))BE)sڌ{a!Q s~q#?+\Kx5*u%MhJ*5ކs!ט`V50~C`'[j(Q7L;G~+)gVVcpY߻ ?ܴBS6nH8QbI *a;'V ǫ#K:+,/+3턩3pT)CuꟂa:˛ A=Æn7z{: MFk8EiA"8S#ټ\\Y='ziM:*1 _H,A*U{۞c6/pSgEaR \Q@<ѱ.8C@;XM쭚I/sx@^.}1C; =$^Ɲ'Y(5MRF¤d7V2ުb2*yAKE׼5.+meJ؃g<9eu9:}Z8EZJUiMыwDLE`2K\u+Bǚ|X(3_Bn7C8m_]c 6wh.OjO,[~jmH̻LlbV${X_~at҆@!&1cwu䅠>0`}j^"Nm8Ŀb>] Uqwl4D%nن%ԗ#xeERbbRvy"=$^f~!8ӽe254(x#-d]a MЄ錨c 7\k9;j#0 pJyd]h${ kKi8zS"LȨƖlc97* nYٳ՚xwQ9ǛK?6ˡTh LSuٝ#%ށt5DbzCO8o2׏ɽ-9[ߪ6Fgڈ>+Y0 Z)9.w(q+[`)Z{b ,Q4KQ%^'D-m ~XnIpY}&+䒺7#Dن#`x^1v-OP4Vhŀ|.,i{14%3M_cౄ ^SuPkfTpʎ;ev8} |8FX\lzu5q}_o0V{WLp>#5l0 h^Lj`0#jΞ*Ney=2-DmUcy|ݸ:呀Gz➐yNwCOkօxO@cm9n}BZDfWh\z ,$Nǵi(df% >F]˻gjݐK'ks5htԗ%"̉U80!L(7_#IIsjm.ɧXBXz)t&kh ~ev)FB*y ?஍wk5 wY~ K Hдgȧ&ǫo?4>:YMVQ5v&*ӫ+rD4 E3m9Ei'eDFZeHS cz-E _h9GlD&tQIU:\t)oYR"Cy `H$S #ĂJSKbrovZ[aN(¢JE4W,YjR3KJj*:I o*.^\ _j#@QEWu+YE u\D&ipUKj0} fv(Ku2Z$| 3Kɍ.XJ{a;FG?mu<Y*c0>  1MSA8P.Mz=NB]2^_'HiR/i`Ѡi-k}.rkvkE Y wz{sk )4/us Yz&7'~%Fw>Rw˾JogSn#[dt\j1v'L^{;lgcy*;IG/<w(BH)ևѡhW qP񺆬 t'>)Mw=G2KS%ƅ.n pw" T&N1hn:>Z ɬNh@^'I%Ɋ%AN.P M?ZetdxŶI Ƈ)VA){:lD(ꋍH42Bi1ʇ*s 8NXY#dIa# )7JZ{ɴozkDd֑( G!̷(2/Z$Z쨥g51?jg7HmI#l= M-؎!$Apܹ0\ŘĴ` 5Q.rk)ܦ/D}Ya6h";\cq60<]g.&}Rz+V@hӓ笤.\לӹu:CS "W𙫧&8=u c8B dx'ti Y^_-'{2 i8DR$v:N\qѧM!fg$ R <kwh3ԋ3@ Sq I/k?@!d+ R fx_;)wIxF0 yv%?d_C8x~qJXf77㋛ D7tszZBW2>7zvs?pf wt]^d)৯ӎ0=dCde.zbpꀙkQE$~PKl⹃>_9HPڃ(p$Ň6a7qIriqDS%TTp^\0_&G0*aY% е8LZ^ũk+]KMW⋲OED2Pd<0`5 ߒIJs@ЎMbO=RpY'WkdIe8*~d-;7`Vp z*Dq:( )gՏRΩ|)[ k˓AQ8q3=v19ct{jCW6 5!`[ ]&(oڼb#g҄u/Qp[ӍD\RDQbh4"f'`wn}nà:t HY!lX$^`@WBnϡj^1 o-u4g)[}kQ3j=9Y_ chJ}Sg@vP\g/#~Pnݖ4]dRDF:Z Aة1f\b9Zs;?S5%?&gԜ"=6C2QC=[bIs!nlOV*-%I!>+ǚ'd#?뻒FJ+Evԕ6#>K0?nǬwk_-g-m=(%μNۋHQ&0@}xA[l/;Mn*&%׌`FF5xrg-LqF`.6>,gvr;C<~,*cw;V3'T$)(@Z\ h" -&mn 's>M ;gGOгY }4J>4".>NT ymS ͪ4TY ےBc4lv#^@ 3۩U <QI![p x)>C90D* Кv4]sϲr|#xRu.K}4^){!ZeuB!n!f A)b 7pн$"#-HiKz1Bh]]YQK:V)xwi{R\m1G |[[#kp 4zl ;Ӣk1zpn̓|Ī$EkFF)5V4]}7i|#$`W^~GUwiQ%J.oGE.K/}ؼ;Oܙ~E/O *hܠ6 &2d/8֭9+w[FVyœtY/j UV:5qu^E<]YȘ Iqk[.y]uk{=e9PKxz^#IܳUSvzMSӻny6g]YvƱ읭$s#`8w^H"KpISjzzt03ec+ 抅_Nۺ2>xT*9ߥX#.maEn!88mݪw<%M,,;)JU}G}[&bj)*pR1&'{9Ρw{}+K}S{֒F 7{4{XG:HrF sHO͸)qa۳U{pAmDVu`=-6,TɞQҁP &A`Ej]r]zY?2 Vk1\P(THHsutlq8ʿ6mɲ(9X~1%T@}EaٓZsfKQک+%z1,#, if1X)wI3zsُT\:le=B|@`-Hm7\6 3ZHf(@THrb\XS-~m^T5yS tѶ #^\t+TW}ݲ&Ҟo7hҎ!Cİ1A8+ oy;N#G^rD4؃lbt8eM^±0`sZU[ ]3@NF|bCwjf8JތOtSif7 *:ud=¸6iz.sRI9ӓB$.:40CPm f JA{-r3h5G*~D]\ayrƆ qe:m*͟-zJ[I:D U\$Hmd3y//D,MoHbt(3I[|ӷNv2ŁW'F&%rJ#=ڎ]6XU'i[b!G'gs}xJX{+f2ZV8Kwk#J0Yt mN3?]WW5]wb]?W_Mgbn >Etw_D dp2>;"(*JEN xh^:X4]lū͖jCPGZ&4<%uO]ۭ]>)O.Z[7xhȧŤ&NiJj=ě­Lsb| ) )a>| =Ko>vKrԊgݠޠDFn^ *p Wuwj>4|0+' 2Lv>t2'=+X"O+eaڑ쵄|-xv/ |K@!Ԣ:Pwsߚl.5V:QkR {Roje8(_v aM;ܿ"yM~d b'Ok,20xq# >A*9NWjQd}ٲGOý(dr%nd)`-H^c7d (ۿ\mGX0^dXMRCǢg'V+㟐3jaMɁ33?_0Ͽ\I篵 $5);H7;kd %2qC=ژX5S!ѩ†ehKFypFy:)a{!ۛ(&V4;@y~裂в‹R)9@B} B貖~KU8]pm̐k31%M 2vδ/cI Kh׿#`JFGxa]XhW/ݔCpBx3iק 1n.B + WrRoӀJ$g [_iY߲ 6tX7^&9oIy0<,6&Ժ죔E+>?c蓰sh/^g`->$|_\܃>tgɯ~ lSSA]{|Fi-F P>}/K|=>.R:|tk1GK_ۏ|12RKbľD;p87% d@H :r͗wlnh@&Ӻ+-i^m";|nBv[%n93xU: p{TOUvR2|()#Pɏ~fIitUc`r>sکHEHmΤY_HrWT;? ?q5x P(/, q.N o>\i Id,1k`' AX8PS~uf 4wHkk G9oh8lFW)"3(s.lP!<\?'h>7Q1J EPqTY~ULϡݮB2a8-$}Oݨ >>G*;}%)< ]('PzYB6g luENLGΐ7=)M$y-g͝8C>!'Pj;dSr/_,NXm'WpXk T+7W A^+4X]RwĬޏLRxiє'+™i wk |HFͯS rcTC=_J;ddAӜan)E v WvcvE >+*@sbg+!*+=D5]yGkڻ{k5FUE}Bż[p1&ggt]9A~:/+h\__@]s\o}3 ht( (HflhPg? #"3Y =)y[ oMә<[U%QڶGGjbwzZe?Wn=a+=| i)ULHv FK?/4:Gj VyHK@2RR%$oon (ءN4__PWԯ v& u*{Oqk Q{3_Uʇ+F"*sckudv 93(t\ r"Ѯ-$RUG$ ,>TWջM\$cY"U0 Fx,YhR4rq/MOnOc؉urЕo q29+ tLj ߇krw=(℮^fZ=6+Qrrgl ,ĉ _H>#֖o03 HY,%I7[Mk Om/!|%f`-i,?ԼDžCds ];򗹆Tz䂬T8AϜ<-xv)LBe奘2"}eEG@^:$<qjXY0[@)p jjNnj\LA:AJ!%Tv=4^ =_yȯ* ˜ӌd% I]]+/ d%4}Q"@]obM31f1C!^%͛sT{$WXA^F/QI@I. +&y72JMgmG*j}ZlΨĪMiZ)BbeMp/jTdrmbKIUx:HL= XӶ!60@g³B9.+=ަ-G k5@9꛰89(_"@SCQfÎ`xn ձ%Y9Ci̍>eG=B5KA|ˊgD'q7kF}mQGT+Z&dhrci5wYJÖhNO+00qG2!QNwTNsxeӅ?X,D {_9D4LFc6^;hRzN_KX% }͢ kH)2l  w(k\hFgPt'T 8>xDs9ᤤ+R$۽ 7_߼e>[$d`=+az2*7h4lzSS!woj#ЧN !fUv=/|C`{:")7#4@m(}W>'֌WuhQ;ӖGM;|}(Y5, 񦘙 ڰ54ͧ)׸t3js6Qfol)Eӳ.Ԫ ƚvI]L݋p8m^ 6A``RT>/Lb"P>~<ۺg3iy;1դZٔ:ҫ\sp-Ɠ2S76pDn7Qnsw{]7 JnUP}7[p0v SJ~  eEǶ+o:*HS3Qe^͢%',th!dx/0&!QJǣR;^c4Qkkb*H?Y)`_6kStrʹhX,bxsP8d@>|A4?apNK"ɑnLJsYOwACkߘK= eLDX;%pɋmJwPCMɗp'Lu4j`)Pz1K   YZ