selinux-policy-mls-3.9.16-52.fc15$>R-hf>B?d $ <hl  39 9  9 9 l9 `9 b 9g9m!9s>sd9xHx x y zz z(z8z*9*:.(*=>BG9H9I9XYZ4[8\<9] 9^ bkdoltt9up9vTw9x9efCselinux-policy-mls3.9.1652.fc15SELinux mls base policySELinux Reference policy mls base module.O_ x86-17.phx2.fedoraproject.org4yFedora ProjectFedora ProjectGPLv2+Fedora ProjectSystem Environment/Basehttp://oss.tresys.com/repos/refpolicy/linuxnoarch if [ -s /etc/selinux/config ]; then . /etc/selinux/config; FILE_CONTEXT=/etc/selinux/mls/contexts/files/file_contexts; if [ "${SELINUXTYPE}" = mls -a -f ${FILE_CONTEXT} ]; then [ -f ${FILE_CONTEXT}.pre ] || cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.pre; fi fisemodule -n -s mls -r mailscanner polkit ModemManager telepathysofiasip ethereal 2>/dev/null packages=`cat /usr/share/selinux/mls/modules.lst` ( cd /usr/share/selinux/mls; semodule -b base.pp.bz2 -i $packages -s mls; ); if [ $1 -eq 1 ]; then restorecon -R /root /var/log /var/lock /var/run 2> /dev/null else . /etc/selinux/config; FILE_CONTEXT=/etc/selinux/mls/contexts/files/file_contexts; selinuxenabled; if [ $? = 0 -a "${SELINUXTYPE}" = mls -a -f ${FILE_CONTEXT}.pre ]; then fixfiles -C ${FILE_CONTEXT}.pre restore; restorecon -R /root /var/log /var/lock /var/run 2> /dev/null; rm -f ${FILE_CONTEXT}.pre; fi;fi exit 0r:+!w3F h\0*$",d!+*E0(&e18li*J!>|.,C,m4#*~6H(+ *#*}%H% (& K,*)#V4`#!!&'39%,5V% TaO5&-%;'}1:=@+$!-<19-&>&".w'0=e.3%6K1w+!<")7PE$,#7Tl(pA/<+!h*)3!(0()"!(,,d6#!-;-QE634>8'":(3b4*& < =+p-:cAD1LX(" G4L:'-,(%9'+&/+-!2j#3%#0W'7$K"AV(a!ksg;%9-@*-@* 2+B6'##j0))!V%48;&@7$;$Dp3*(#P\d(E0[U6"^2&8,Q+)&.%2%!?:M-#)dy6a#4 (h4**#()"%o ;#(% mPT&,f!\R2*)/$%)$&3)giQn(&v'AA큤A큤A큤AAA큤A큤O_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ wO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ mO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ wO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ nO_ 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@@@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.9.16-52.fc15.src.rpmconfig(selinux-policy-mls)selinux-policy-baseselinux-policy-mls     /bin/sh/bin/shconfig(selinux-policy-mls)coreutilspolicycoreutilspolicycoreutils-newrolerpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)selinux-policyselinux-policysetransdrpmlib(PayloadIsXz)3.9.16-52.fc152.0.85-262.0.85-263.0.4-14.6.0-14.0-13.9.16-52.fc153.9.16-52.fc155.2-1seedit4.9.1.2O_6ONNؽNåNåN@N@N^N/NN{#@Nm@Nf @NC@N;@N/N&@N +NN N e@MM@M@M@M{@Mߒ@M@Mc@MM‘@MM@M@M@MM@M@M@M@MMM@M@MlMM@MMTMx@Mv@MoMlMgMgMbSM[@MRMQ0@MQ0@MJMGMGMA^@M>@M9u@M6@M5M4/@M4/@M0:M,F@M$]@M@M9MMMMM\@M M M@L!L!L@LL8L@L@LOLOL[@L@L@Lr@L L,@L,@Lډ@L7LLLNL@LΫLeL|L@LB@LB@LB@L@LMLL@LdLL{L*@L@L5LLA@L@LLL@LcLzLzLzLzL)@L|L|L{@L{@LvW@LvW@Ls@Ls@LrbLrbLk@LjyLjyLe3Lc@La?@LZLYV@LXLN@LN@LMxLMxLI@LH2LF@LEL=L=L=L;L7@L LT@L@LL@L@L0LLGL@K^K^KKKj@K$@KKK@K@K@K@K]K޺K@KtK#@KKՀ@K:@KK͗@KŮ@K\K\K @KKKKK9@KK@KK@K@KKKKrKK~@K,K,K,K@KK8@KKK@K@KqKqKqK}+K{@K{@KuBKs@KqN@KjKie@Kf@K`*K`*K]KXAKTM@KPXKEKEKEKD{@KC)KA@K;@K2@K0K/c@K+nK*@K(K"4@KK>K>K>JJęJH@JH@JJJ_@JjJjJjJ@Jv@Jv@Jv@Jv@J$J$JJ0@J@J@JG@JG@J@JJ@J@J@JJJ#J@JJJ@J:J@JJQJ@J J J|@JzJyt@Jyt@Jx"JrJrJq@Jn@Jn@JmJf@Jd\@J\s@JW-@JT@JS8JKOJI@JCfJCfJB@J@J@J?r@J<@J;}J:,@J7@J67J2C@J0J/@J,@J%@JJB@JJMJ J dJ@J@J@J@J*@J*@II@IIA@IIII@I@IIIX@IX@IX@II@I@IcIIo@Io@IzI)@I@I@@I@@II@I@I@IԨIд@I̿In@I3I3I@II@I@IV@IIaIm@Im@I@I'@II2III@IIIIIIII@III@I1I@III~@I}Iy@Ix_Iw@IuItk@Itk@Io%@Ik0IeIcGIa@I`IVIO@IJ;@IHIAI>]I= @I7@I6tI3IIIIIIII IP@I@IIg@Ig@HHH@HrH~@H,H@HCHHH @H @Hf@Hf@H@H+H@H׈H׈H7@HBH@HǶH@HH|@HHH@H{@H)HHL@H@H@H@H@H}H|@Ht@HsVHr@Hl@HkmHgy@HcH`H_@H^>HQHQHQHO@HFHFH$@DX@DU@DN@DN@DLDH@DGwDGwDDD@@D?D?D;@D;@D:HD:HD2_D1@D1@D+@D+@D+@D'D!<@D!<@D!<@DDD@D@D@DDDDDD@D@D@D@D uD $@D D @D @DDDFC@C@C@C@CR@CR@CR@CR@CR@CCCCC@Ci@CC@C@CtC@C@CC:@CECCC @C @CعCعCعCعCC@C-C-C-C@C@CCǖ@C@CáCáCP@CP@C@C[C @CCg@Cg@CCC!@C~@C,C@CCCCC@CC@C@C@CZCZC @C @CCCf@Cf@Cf@C@CqC @C @C @C @C @CCC}@C7@C7@C7@CBCBCYCCCC}@CqCqMiroslav Grepl 3.9.16-52Miroslav Grepl 3.9.16-51Miroslav Grepl 3.9.16-50Miroslav Grepl 3.9.16-49Miroslav Grepl 3.9.16-48Miroslav Grepl 3.9.16-47Miroslav Grepl 3.9.16-46Miroslav Grepl 3.9.16-45Miroslav Grepl 3.9.16-44Miroslav Grepl 3.9.16-43Miroslav Grepl 3.9.16-42Miroslav Grepl 3.9.16-41Miroslav Grepl 3.9.16-40Miroslav Grepl 3.9.16-39Miroslav Grepl 3.9.16-38Miroslav Grepl 3.9.16-37Miroslav Grepl 3.9.16-36Miroslav Grepl 3.9.16-35Miroslav Grepl 3.9.16-34Miroslav Grepl 3.9.16-33Miroslav Grepl 3.9.16-32Miroslav Grepl 3.9.16-31Miroslav Grepl 3.9.16-30Miroslav Grepl 3.9.16-29Miroslav Grepl 3.9.16-28Miroslav Grepl 3.9.16-27Miroslav Grepl 3.9.16-26Miroslav Grepl 3.9.16-25Miroslav Grepl 3.9.16-24Miroslav Grepl 3.9.16-23Miroslav Grepl 3.9.16-22Dan Walsh 3.9.16-21Dan Walsh 3.9.16-20Dan Walsh 3.9.16-19Miroslav Grepl 3.9.16-18Miroslav Grepl 3.9.16-17Miroslav Grepl 3.9.16-16Miroslav Grepl 3.9.16-15Miroslav Grepl 3.9.16-14Miroslav Grepl 3.9.16-13Miroslav Grepl 3.9.16-12Miroslav Grepl 3.9.16-11Miroslav Grepl 3.9.16-10Miroslav Grepl 3.9.16-9Miroslav Grepl 3.9.16-8Miroslav Grepl 3.9.16-7Miroslav Grepl 3.9.16-6Miroslav Grepl 3.9.16-5Miroslav Grepl 3.9.16-4Miroslav Grepl 3.9.16-3Miroslav Grepl 3.9.16-1Miroslav Grepl 3.9.15-6Miroslav Grepl 3.9.15-5Miroslav Grepl 3.9.15-4Miroslav Grepl 3.9.15-3Miroslav Grepl 3.9.15-2Miroslav Grepl 3.9.15-1Fedora Release Engineering - 3.9.14-2Dan Walsh 3.9.14-1Miroslav Grepl 3.9.13-10Miroslav Grepl 3.9.13-9Dan Walsh 3.9.13-8Miroslav Grepl 3.9.13-7Miroslav Grepl 3.9.13-6Miroslav Grepl 3.9.13-5Miroslav Grepl 3.9.13-4Miroslav Grepl 3.9.13-3Miroslav Grepl 3.9.13-2Miroslav Grepl 3.9.13-1Miroslav Grepl 3.9.12-8Miroslav Grepl 3.9.12-7Miroslav Grepl 3.9.12-6Miroslav Grepl 3.9.12-5Dan Walsh 3.9.12-4Dan Walsh 3.9.12-3Dan Walsh 3.9.12-2Miroslav Grepl 3.9.12-1Dan Walsh 3.9.11-2Miroslav Grepl 3.9.11-1Miroslav Grepl 3.9.10-13Dan Walsh 3.9.10-12Miroslav Grepl 3.9.10-11Miroslav Grepl 3.9.10-10Miroslav Grepl 3.9.10-9Miroslav Grepl 3.9.10-8Miroslav Grepl 3.9.10-7Miroslav Grepl 3.9.10-6Miroslav Grepl 3.9.10-5Dan Walsh 3.9.10-4Miroslav Grepl 3.9.10-3Miroslav Grepl 3.9.10-2Miroslav Grepl 3.9.10-1Miroslav Grepl 3.9.9-4Dan Walsh 3.9.9-3Miroslav Grepl 3.9.9-2Miroslav Grepl 3.9.9-1Miroslav Grepl 3.9.8-7Dan Walsh 3.9.8-6Miroslav Grepl 3.9.8-5Miroslav Grepl 3.9.8-4Dan Walsh 3.9.8-3Dan Walsh 3.9.8-2Dan Walsh 3.9.8-1Dan Walsh 3.9.7-10Dan Walsh 3.9.7-9Dan Walsh 3.9.7-8Dan Walsh 3.9.7-7Dan Walsh 3.9.7-6Dan Walsh 3.9.7-5Dan Walsh 3.9.7-4Dan Walsh 3.9.7-3Dan Walsh 3.9.7-2Dan Walsh 3.9.7-1Dan Walsh 3.9.6-3Dan Walsh 3.9.6-2Dan Walsh 3.9.6-1Dan Walsh 3.9.5-11Dan Walsh 3.9.5-10Dan Walsh 3.9.5-9Dan Walsh 3.9.5-8Dan Walsh 3.9.5-7Dan Walsh 3.9.5-6Dan Walsh 3.9.5-5Dan Walsh 3.9.5-4Dan Walsh 3.9.5-3Dan Walsh 3.9.5-2Dan Walsh 3.9.5-1Dan Walsh 3.9.4-3Dan Walsh 3.9.4-2Dan Walsh 3.9.4-1Dan Walsh 3.9.3-4Dan Walsh 3.9.3-3Dan Walsh 3.9.3-2Dan Walsh 3.9.3-1Dan Walsh 3.9.2-1Dan Walsh 3.9.1-3Dan Walsh 3.9.1-2Dan Walsh 3.9.1-1Dan Walsh 3.9.0-2Dan Walsh 3.9.0-1Dan Walsh 3.8.8-21Dan Walsh 3.8.8-20Dan Walsh 3.8.8-19Dan Walsh 3.8.8-18Dan Walsh 3.8.8-17Dan Walsh 3.8.8-16Dan Walsh 3.8.8-15Dan Walsh 3.8.8-14Dan Walsh 3.8.8-13Dan Walsh 3.8.8-12Dan Walsh 3.8.8-11Dan Walsh 3.8.8-10Dan Walsh 3.8.8-9Dan Walsh 3.8.8-8Dan Walsh 3.8.8-7Dan Walsh 3.8.8-6Dan Walsh 3.8.8-5Dan Walsh 3.8.8-4Dan Walsh 3.8.8-3Dan Walsh 3.8.8-2Dan Walsh 3.8.8-1Dan Walsh 3.8.7-3Dan Walsh 3.8.7-2Dan Walsh 3.8.7-1Dan Walsh 3.8.6-3Miroslav Grepl 3.8.6-2Dan Walsh 3.8.6-1Dan Walsh 3.8.5-1Dan Walsh 3.8.4-1Dan Walsh 3.8.3-4Dan Walsh 3.8.3-3Dan Walsh 3.8.3-2Dan Walsh 3.8.3-1Dan Walsh 3.8.2-1Dan Walsh 3.8.1-5Dan Walsh 3.8.1-4Dan Walsh 3.8.1-3Dan Walsh 3.8.1-2Dan Walsh 3.8.1-1Dan Walsh 3.7.19-22Dan Walsh 3.7.19-21Dan Walsh 3.7.19-20Dan Walsh 3.7.19-19Dan Walsh 3.7.19-17Dan Walsh 3.7.19-16Dan Walsh 3.7.19-15Dan Walsh 3.7.19-14Dan Walsh 3.7.19-13Dan Walsh 3.7.19-12Dan Walsh 3.7.19-11Dan Walsh 3.7.19-10Dan Walsh 3.7.19-9Dan Walsh 3.7.19-8Dan Walsh 3.7.19-7Dan Walsh 3.7.19-6Dan Walsh 3.7.19-5Dan Walsh 3.7.19-4Dan Walsh 3.7.19-3Dan Walsh 3.7.19-2Dan Walsh 3.7.19-1Dan Walsh 3.7.18-3Dan Walsh 3.7.18-2Dan Walsh 3.7.18-1Dan Walsh 3.7.17-6Dan Walsh 3.7.17-5Dan Walsh 3.7.17-4Dan Walsh 3.7.17-3Dan Walsh 3.7.17-2Dan Walsh 3.7.17-1Dan Walsh 3.7.16-2Dan Walsh 3.7.16-1Dan Walsh 3.7.15-4Dan Walsh 3.7.15-3Dan Walsh 3.7.15-2Dan Walsh 3.7.15-1Dan Walsh 3.7.14-5Dan Walsh 3.7.14-4Dan Walsh 3.7.14-3Dan Walsh 3.7.14-2Dan Walsh 3.7.14-1Dan Walsh 3.7.13-4Dan Walsh 3.7.13-3Dan Walsh 3.7.13-2Dan Walsh 3.7.13-1Dan Walsh 3.7.12-1Dan Walsh 3.7.11-1Dan Walsh 3.7.10-5Dan Walsh 3.7.10-4Dan Walsh 3.7.10-3Dan Walsh 3.7.10-2Dan Walsh 3.7.10-1Dan Walsh 3.7.9-4Dan Walsh 3.7.9-3Dan Walsh 3.7.9-2Dan Walsh 3.7.9-1Dan Walsh 3.7.8-11Dan Walsh 3.7.8-9Dan Walsh 3.7.8-8Dan Walsh 3.7.8-7Dan Walsh 3.7.8-6Dan Walsh 3.7.8-5Dan Walsh 3.7.8-4Dan Walsh 3.7.8-3Dan Walsh 3.7.8-2Dan Walsh 3.7.8-1Dan Walsh 3.7.7-3Dan Walsh 3.7.7-2Dan Walsh 3.7.7-1Dan Walsh 3.7.6-1Dan Walsh 3.7.5-8Dan Walsh 3.7.5-7Dan Walsh 3.7.5-6Dan Walsh 3.7.5-5Dan Walsh 3.7.5-4Dan Walsh 3.7.5-3Dan Walsh 3.7.5-2Dan Walsh 3.7.5-1Dan Walsh 3.7.4-4Dan Walsh 3.7.4-3Dan Walsh 3.7.4-2Dan Walsh 3.7.4-1Dan Walsh 3.7.3-1Dan Walsh 3.7.1-1Dan Walsh 3.6.33-2Dan Walsh 3.6.33-1Dan Walsh 3.6.32-17Dan Walsh 3.6.32-16Dan Walsh 3.6.32-15Dan Walsh 3.6.32-13Dan Walsh 3.6.32-12Dan Walsh 3.6.32-11Dan Walsh 3.6.32-10Dan Walsh 3.6.32-9Dan Walsh 3.6.32-8Dan Walsh 3.6.32-7Dan Walsh 3.6.32-6Dan Walsh 3.6.32-5Dan Walsh 3.6.32-4Dan Walsh 3.6.32-3Dan Walsh 3.6.32-2Dan Walsh 3.6.32-1Dan Walsh 3.6.31-5Dan Walsh 3.6.31-4Dan Walsh 3.6.31-3Dan Walsh 3.6.31-2Dan Walsh 3.6.30-6Dan Walsh 3.6.30-5Dan Walsh 3.6.30-4Dan Walsh 3.6.30-3Dan Walsh 3.6.30-2Dan Walsh 3.6.30-1Dan Walsh 3.6.29-2Dan Walsh 3.6.29-1Dan Walsh 3.6.28-9Dan Walsh 3.6.28-8Dan Walsh 3.6.28-7Dan Walsh 3.6.28-6Dan Walsh 3.6.28-5Dan Walsh 3.6.28-4Dan Walsh 3.6.28-3Dan Walsh 3.6.28-2Dan Walsh 3.6.28-1Dan Walsh 3.6.27-1Dan Walsh 3.6.26-11Dan Walsh 3.6.26-10Dan Walsh 3.6.26-9Bill Nottingham 3.6.26-8Dan Walsh 3.6.26-7Dan Walsh 3.6.26-6Dan Walsh 3.6.26-5Dan Walsh 3.6.26-4Dan Walsh 3.6.26-3Dan Walsh 3.6.26-2Dan Walsh 3.6.26-1Dan Walsh 3.6.25-1Dan Walsh 3.6.24-1Dan Walsh 3.6.23-2Dan Walsh 3.6.23-1Dan Walsh 3.6.22-3Dan Walsh 3.6.22-1Dan Walsh 3.6.21-4Dan Walsh 3.6.21-3Tom "spot" Callaway 3.6.21-2Dan Walsh 3.6.21-1Dan Walsh 3.6.20-2Dan Walsh 3.6.20-1Dan Walsh 3.6.19-5Dan Walsh 3.6.19-4Dan Walsh 3.6.19-3Dan Walsh 3.6.19-2Dan Walsh 3.6.19-1Dan Walsh 3.6.18-1Dan Walsh 3.6.17-1Dan Walsh 3.6.16-4Dan Walsh 3.6.16-3Dan Walsh 3.6.16-2Dan Walsh 3.6.16-1Dan Walsh 3.6.14-3Dan Walsh 3.6.14-2Dan Walsh 3.6.14-1Dan Walsh 3.6.13-3Dan Walsh 3.6.13-2Dan Walsh 3.6.13-1Dan Walsh 3.6.12-39Dan Walsh 3.6.12-38Dan Walsh 3.6.12-37Dan Walsh 3.6.12-36Dan Walsh 3.6.12-35Dan Walsh 3.6.12-34Dan Walsh 3.6.12-33Dan Walsh 3.6.12-31Dan Walsh 3.6.12-30Dan Walsh 3.6.12-29Dan Walsh 3.6.12-28Dan Walsh 3.6.12-27Dan Walsh 3.6.12-26Dan Walsh 3.6.12-25Dan Walsh 3.6.12-24Dan Walsh 3.6.12-23Dan Walsh 3.6.12-22Dan Walsh 3.6.12-21Dan Walsh 3.6.12-20Dan Walsh 3.6.12-19Dan Walsh 3.6.12-16Dan Walsh 3.6.12-15Dan Walsh 3.6.12-14Dan Walsh 3.6.12-13Dan Walsh 3.6.12-12Dan Walsh 3.6.12-11Dan Walsh 3.6.12-10Dan Walsh 3.6.12-9Dan Walsh 3.6.12-8Dan Walsh 3.6.12-7Dan Walsh 3.6.12-6Dan Walsh 3.6.12-5Dan Walsh 3.6.12-4Dan Walsh 3.6.12-3Dan Walsh 3.6.12-2Dan Walsh 3.6.12-1Dan Walsh 3.6.11-1Dan Walsh 3.6.10-9Dan Walsh 3.6.10-8Dan Walsh 3.6.10-7Dan Walsh 3.6.10-6Dan Walsh 3.6.10-5Dan Walsh 3.6.10-4Dan Walsh 3.6.10-3Dan Walsh 3.6.10-2Dan Walsh 3.6.10-1Dan Walsh 3.6.9-4Dan Walsh 3.6.9-3Dan Walsh 3.6.9-2Dan Walsh 3.6.9-1Dan Walsh 3.6.8-4Dan Walsh 3.6.8-3Dan Walsh 3.6.8-2Dan Walsh 3.6.8-1Dan Walsh 3.6.7-2Dan Walsh 3.6.7-1Dan Walsh 3.6.6-9Dan Walsh 3.6.6-8Fedora Release Engineering - 3.6.6-7Dan Walsh 3.6.6-6Dan Walsh 3.6.6-5Dan Walsh 3.6.6-4Dan Walsh 3.6.6-3Dan Walsh 3.6.6-2Dan Walsh 3.6.6-1Dan Walsh 3.6.5-3Dan Walsh 3.6.5-1Dan Walsh 3.6.4-6Dan Walsh 3.6.4-5Dan Walsh 3.6.4-4Dan Walsh 3.6.4-3Dan Walsh 3.6.4-2Dan Walsh 3.6.4-1Dan Walsh 3.6.3-13Dan Walsh 3.6.3-12Dan Walsh 3.6.3-11Dan Walsh 3.6.3-10Dan Walsh 3.6.3-9Dan Walsh 3.6.3-8Dan Walsh 3.6.3-7Dan Walsh 3.6.3-6Dan Walsh 3.6.3-3Dan Walsh 3.6.3-2Dan Walsh 3.6.3-1Dan Walsh 3.6.2-5Dan Walsh 3.6.2-4Dan Walsh 3.6.2-3Dan Walsh 3.6.2-2Dan Walsh 3.6.2-1Dan Walsh 3.6.1-15Dan Walsh 3.6.1-14Dan Walsh 3.6.1-13Dan Walsh 3.6.1-12Dan Walsh 3.6.1-11Dan Walsh 3.6.1-10Dan Walsh 3.6.1-9Dan Walsh 3.6.1-8Dan Walsh 3.6.1-7Dan Walsh 3.6.1-4Ignacio Vazquez-Abrams - 3.6.1-2Dan Walsh 3.5.13-19Dan Walsh 3.5.13-18Dan Walsh 3.5.13-17Dan Walsh 3.5.13-16Dan Walsh 3.5.13-15Dan Walsh 3.5.13-14Dan Walsh 3.5.13-13Dan Walsh 3.5.13-12Dan Walsh 3.5.13-11Dan Walsh 3.5.13-9Dan Walsh 3.5.13-8Dan Walsh 3.5.13-7Dan Walsh 3.5.13-6Dan Walsh 3.5.13-5Dan Walsh 3.5.13-4Dan Walsh 3.5.13-3Dan Walsh 3.5.13-2Dan Walsh 3.5.13-1Dan Walsh 3.5.12-3Dan Walsh 3.5.12-2Dan Walsh 3.5.12-1Dan Walsh 3.5.11-1Dan Walsh 3.5.10-3Dan Walsh 3.5.10-2Dan Walsh 3.5.10-1Dan Walsh 3.5.9-4Dan Walsh 3.5.9-3Dan Walsh 3.5.9-2Dan Walsh 3.5.9-1Dan Walsh 3.5.8-7Dan Walsh 3.5.8-6Dan Walsh 3.5.8-5Dan Walsh 3.5.8-4Dan Walsh 3.5.8-3Dan Walsh 3.5.8-1Dan Walsh 3.5.7-2Dan Walsh 3.5.7-1Dan Walsh 3.5.6-2Dan Walsh 3.5.6-1Dan Walsh 3.5.5-4Dan Walsh 3.5.5-3Dan Walsh 3.5.5-2Dan Walsh 3.5.4-2Dan Walsh 3.5.4-1Dan Walsh 3.5.3-1Dan Walsh 3.5.2-2Dan Walsh 3.5.1-5Dan Walsh 3.5.1-4Dan Walsh 3.5.1-3Dan Walsh 3.5.1-2Dan Walsh 3.5.1-1Dan Walsh 3.5.0-1Dan Walsh 3.4.2-14Dan Walsh 3.4.2-13Dan Walsh 3.4.2-12Dan Walsh 3.4.2-11Dan Walsh 3.4.2-10Dan Walsh 3.4.2-9Dan Walsh 3.4.2-8Dan Walsh 3.4.2-7Dan Walsh 3.4.2-6Dan Walsh 3.4.2-5Dan Walsh 3.4.2-4Dan Walsh 3.4.2-3Dan Walsh 3.4.2-2Dan Walsh 3.4.2-1Dan Walsh 3.4.1-5Dan Walsh 3.4.1-3Dan Walsh 3.4.1-2Dan Walsh 3.4.1-1Dan Walsh 3.3.1-48Dan Walsh 3.3.1-47Dan Walsh 3.3.1-46Dan Walsh 3.3.1-45Dan Walsh 3.3.1-44Dan Walsh 3.3.1-43Dan Walsh 3.3.1-42Dan Walsh 3.3.1-41Dan Walsh 3.3.1-39Dan Walsh 3.3.1-37Dan Walsh 3.3.1-36Dan Walsh 3.3.1-33Dan Walsh 3.3.1-32Dan Walsh 3.3.1-31Dan Walsh 3.3.1-30Dan Walsh 3.3.1-29Dan Walsh 3.3.1-28Dan Walsh 3.3.1-27Dan Walsh 3.3.1-26Dan Walsh 3.3.1-25Dan Walsh 3.3.1-24Dan Walsh 3.3.1-23Dan Walsh 3.3.1-22Dan Walsh 3.3.1-21Dan Walsh 3.3.1-20Dan Walsh 3.3.1-19Dan Walsh 3.3.1-18Dan Walsh 3.3.1-17Dan Walsh 3.3.1-16Dan Walsh 3.3.1-15Bill Nottingham 3.3.1-14Dan Walsh 3.3.1-13Dan Walsh 3.3.1-12Dan Walsh 3.3.1-11Dan Walsh 3.3.1-10Dan Walsh 3.3.1-9Dan Walsh 3.3.1-8Dan Walsh 3.3.1-6Dan Walsh 3.3.1-5Dan Walsh 3.3.1-4Dan Walsh 3.3.1-2Dan Walsh 3.3.1-1Dan Walsh 3.3.0-2Dan Walsh 3.3.0-1Dan Walsh 3.2.9-2Dan Walsh 3.2.9-1Dan Walsh 3.2.8-2Dan Walsh 3.2.8-1Dan Walsh 3.2.7-6Dan Walsh 3.2.7-5Dan Walsh 3.2.7-3Dan Walsh 3.2.7-2Dan Walsh 3.2.7-1Dan Walsh 3.2.6-7Dan Walsh 3.2.6-6Dan Walsh 3.2.6-5Dan Walsh 3.2.6-4Dan Walsh 3.2.6-3Dan Walsh 3.2.6-2Dan Walsh 3.2.6-1Dan Walsh 3.2.5-25Dan Walsh 3.2.5-24Dan Walsh 3.2.5-22Dan Walsh 3.2.5-21Dan Walsh 3.2.5-20Dan Walsh 3.2.5-19Dan Walsh 3.2.5-18Dan Walsh 3.2.5-17Dan Walsh 3.2.5-16Dan Walsh 3.2.5-15Dan Walsh 3.2.5-14Dan Walsh 3.2.5-13Dan Walsh 3.2.5-12Dan Walsh 3.2.5-11Dan Walsh 3.2.5-10Dan Walsh 3.2.5-9Dan Walsh 3.2.5-8Dan Walsh 3.2.5-7Dan Walsh 3.2.5-6Dan Walsh 3.2.5-5Dan Walsh 3.2.5-4Dan Walsh 3.2.5-3Dan Walsh 3.2.5-2Dan Walsh 3.2.5-1Dan Walsh 3.2.4-5Dan Walsh 3.2.4-4Dan Walsh 3.2.4-3Dan Walsh 3.2.4-1Dan Walsh 3.2.4-1Dan Walsh 3.2.3-2Dan Walsh 3.2.3-1Dan Walsh 3.2.2-1Dan Walsh 3.2.1-3Dan Walsh 3.2.1-1Dan Walsh 3.1.2-2Dan Walsh 3.1.2-1Dan Walsh 3.1.1-1Dan Walsh 3.1.0-1Dan Walsh 3.0.8-30Dan Walsh 3.0.8-28Dan Walsh 3.0.8-27Dan Walsh 3.0.8-26Dan Walsh 3.0.8-25Dan Walsh 3.0.8-24Dan Walsh 3.0.8-23Dan Walsh 3.0.8-22Dan Walsh 3.0.8-21Dan Walsh 3.0.8-20Dan Walsh 3.0.8-19Dan Walsh 3.0.8-18Dan Walsh 3.0.8-17Dan Walsh 3.0.8-16Dan Walsh 3.0.8-15Dan Walsh 3.0.8-14Dan Walsh 3.0.8-13Dan Walsh 3.0.8-12Dan Walsh 3.0.8-11Dan Walsh 3.0.8-10Dan Walsh 3.0.8-9Dan Walsh 3.0.8-8Dan Walsh 3.0.8-7Dan Walsh 3.0.8-5Dan Walsh 3.0.8-4Dan Walsh 3.0.8-3Dan Walsh 3.0.8-2Dan Walsh 3.0.8-1Dan Walsh 3.0.7-10Dan Walsh 3.0.7-9Dan Walsh 3.0.7-8Dan Walsh 3.0.7-7Dan Walsh 3.0.7-6Dan Walsh 3.0.7-5Dan Walsh 3.0.7-4Dan Walsh 3.0.7-3Dan Walsh 3.0.7-2Dan Walsh 3.0.7-1Dan Walsh 3.0.6-3Dan Walsh 3.0.6-2Dan Walsh 3.0.6-1Dan Walsh 3.0.5-11Dan Walsh 3.0.5-10Dan Walsh 3.0.5-9Dan Walsh 3.0.5-8Dan Walsh 3.0.5-7Dan Walsh 3.0.5-6Dan Walsh 3.0.5-5Dan Walsh 3.0.5-4Dan Walsh 3.0.5-3Dan Walsh 3.0.5-2Dan Walsh 3.0.5-1Dan Walsh 3.0.4-6Dan Walsh 3.0.4-5Dan Walsh 3.0.4-4Dan Walsh 3.0.4-3Dan Walsh 3.0.4-2Dan Walsh 3.0.4-1Dan Walsh 3.0.3-6Dan Walsh 3.0.3-5Dan Walsh 3.0.3-4Dan Walsh 3.0.3-3Dan Walsh 3.0.3-2Dan Walsh 3.0.3-1Dan Walsh 3.0.2-9Dan Walsh 3.0.2-8Dan Walsh 3.0.2-7Dan Walsh 3.0.2-5Dan Walsh 3.0.2-4Dan Walsh 3.0.2-3Dan Walsh 3.0.2-2Dan Walsh 3.0.1-5Dan Walsh 3.0.1-4Dan Walsh 3.0.1-3Dan Walsh 3.0.1-2Dan Walsh 3.0.1-1Dan Walsh 2.6.5-3Dan Walsh 2.6.5-2Dan Walsh 2.6.4-7Dan Walsh 2.6.4-6Dan Walsh 2.6.4-5Dan Walsh 2.6.4-2Dan Walsh 2.6.4-1Dan Walsh 2.6.3-1Dan Walsh 2.6.2-1Dan Walsh 2.6.1-4Dan Walsh 2.6.1-3Dan Walsh 2.6.1-2Dan Walsh 2.6.1-1Dan Walsh 2.5.12-12Dan Walsh 2.5.12-11Dan Walsh 2.5.12-10Dan Walsh 2.5.12-8Dan Walsh 2.5.12-5Dan Walsh 2.5.12-4Dan Walsh 2.5.12-3Dan Walsh 2.5.12-2Dan Walsh 2.5.12-1Dan Walsh 2.5.11-8Dan Walsh 2.5.11-7Dan Walsh 2.5.11-6Dan Walsh 2.5.11-5Dan Walsh 2.5.11-4Dan Walsh 2.5.11-3Dan Walsh 2.5.11-2Dan Walsh 2.5.11-1Dan Walsh 2.5.10-2Dan Walsh 2.5.10-1Dan Walsh 2.5.9-6Dan Walsh 2.5.9-5Dan Walsh 2.5.9-4Dan Walsh 2.5.9-3Dan Walsh 2.5.9-2Dan Walsh 2.5.8-8Dan Walsh 2.5.8-7Dan Walsh 2.5.8-6Dan Walsh 2.5.8-5Dan Walsh 2.5.8-4Dan Walsh 2.5.8-3Dan Walsh 2.5.8-2Dan Walsh 2.5.8-1Dan Walsh 2.5.7-1Dan Walsh 2.5.6-1Dan Walsh 2.5.5-2Dan Walsh 2.5.5-1Dan Walsh 2.5.4-2Dan Walsh 2.5.4-1Dan Walsh 2.5.3-3Dan Walsh 2.5.3-2Dan Walsh 2.5.3-1Dan Walsh 2.5.2-6Dan Walsh 2.5.2-5Dan Walsh 2.5.2-4Dan Walsh 2.5.2-3Dan Walsh 2.5.2-2Dan Walsh 2.5.2-1Dan Walsh 2.5.1-5Dan Walsh 2.5.1-4Dan Walsh 2.5.1-2Dan Walsh 2.5.1-1Dan Walsh 2.4.6-20Dan Walsh 2.4.6-19Dan Walsh 2.4.6-18Dan Walsh 2.4.6-17Dan Walsh 2.4.6-16Dan Walsh 2.4.6-15Dan Walsh 2.4.6-14Dan Walsh 2.4.6-13Dan Walsh 2.4.6-12Dan Walsh 2.4.6-11Dan Walsh 2.4.6-10Dan Walsh 2.4.6-9Dan Walsh 2.4.6-8Dan Walsh 2.4.6-7Dan Walsh 2.4.6-6Dan Walsh 2.4.6-5Dan Walsh 2.4.6-4Dan Walsh 2.4.6-3Dan Walsh 2.4.6-1Dan Walsh 2.4.5-4Dan Walsh 2.4.5-3Dan Walsh 2.4.5-2Dan Walsh 2.4.5-1Dan Walsh 2.4.4-2Dan Walsh 2.4.4-2Dan Walsh 2.4.4-1Dan Walsh 2.4.3-13Dan Walsh 2.4.3-12Dan Walsh 2.4.3-11Dan Walsh 2.4.3-10Dan Walsh 2.4.3-9Dan Walsh 2.4.3-8Dan Walsh 2.4.3-7Dan Walsh 2.4.3-6Dan Walsh 2.4.3-5Dan Walsh 2.4.3-4Dan Walsh 2.4.3-3Dan Walsh 2.4.3-2Dan Walsh 2.4.3-1Dan Walsh 2.4.2-8Dan Walsh 2.4.2-7James Antill 2.4.2-6Dan Walsh 2.4.2-5Dan Walsh 2.4.2-4Dan Walsh 2.4.2-3Dan Walsh 2.4.2-2Dan Walsh 2.4.2-1Dan Walsh 2.4.1-5Dan Walsh 2.4.1-4Dan Walsh 2.4.1-3Dan Walsh 2.4.1-2Dan Walsh 2.4-4Dan Walsh 2.4-3Dan Walsh 2.4-2Dan Walsh 2.4-1Dan Walsh 2.3.19-4Dan Walsh 2.3.19-3Dan Walsh 2.3.19-2Dan Walsh 2.3.19-1James Antill 2.3.18-10James Antill 2.3.18-9Dan Walsh 2.3.18-8Dan Walsh 2.3.18-7Dan Walsh 2.3.18-6Dan Walsh 2.3.18-5Dan Walsh 2.3.18-4Dan Walsh 2.3.18-3Dan Walsh 2.3.18-2Dan Walsh 2.3.18-1Dan Walsh 2.3.17-2Dan Walsh 2.3.17-1Dan Walsh 2.3.16-9Dan Walsh 2.3.16-8Dan Walsh 2.3.16-7Dan Walsh 2.3.16-6Dan Walsh 2.3.16-5Dan Walsh 2.3.16-4Dan Walsh 2.3.16-2Dan Walsh 2.3.16-1Dan Walsh 2.3.15-2Dan Walsh 2.3.15-1Dan Walsh 2.3.14-8Dan Walsh 2.3.14-7Dan Walsh 2.3.14-6Dan Walsh 2.3.14-4Dan Walsh 2.3.14-3Dan Walsh 2.3.14-2Dan Walsh 2.3.14-1Dan Walsh 2.3.13-6Dan Walsh 2.3.13-5Dan Walsh 2.3.13-4Dan Walsh 2.3.13-3Dan Walsh 2.3.13-2Dan Walsh 2.3.13-1Dan Walsh 2.3.12-2Dan Walsh 2.3.12-1Dan Walsh 2.3.11-1Dan Walsh 2.3.10-7Dan Walsh 2.3.10-6Dan Walsh 2.3.10-3Dan Walsh 2.3.10-1Dan Walsh 2.3.9-6Dan Walsh 2.3.9-5Dan Walsh 2.3.9-4Dan Walsh 2.3.9-3Dan Walsh 2.3.9-2Dan Walsh 2.3.9-1Dan Walsh 2.3.8-2Dan Walsh 2.3.7-1Dan Walsh 2.3.6-4Dan Walsh 2.3.6-3Dan Walsh 2.3.6-2Dan Walsh 2.3.6-1Dan Walsh 2.3.5-1Dan Walsh 2.3.4-1Dan Walsh 2.3.3-20Dan Walsh 2.3.3-19Dan Walsh 2.3.3-18Dan Walsh 2.3.3-17Dan Walsh 2.3.3-16Dan Walsh 2.3.3-15Dan Walsh 2.3.3-14Dan Walsh 2.3.3-13Dan Walsh 2.3.3-12Dan Walsh 2.3.3-11Dan Walsh 2.3.3-10Dan Walsh 2.3.3-9Dan Walsh 2.3.3-8Dan Walsh 2.3.3-7Dan Walsh 2.3.3-6Dan Walsh 2.3.3-5Dan Walsh 2.3.3-4Dan Walsh 2.3.3-3Dan Walsh 2.3.3-2Dan Walsh 2.3.3-1Dan Walsh 2.3.2-4Dan Walsh 2.3.2-3Dan Walsh 2.3.2-2Dan Walsh 2.3.2-1Dan Walsh 2.3.1-1Dan Walsh 2.2.49-1Dan Walsh 2.2.48-1Dan Walsh 2.2.47-5Dan Walsh 2.2.47-4Dan Walsh 2.2.47-3Dan Walsh 2.2.47-1Dan Walsh 2.2.46-2Dan Walsh 2.2.46-1Dan Walsh 2.2.45-3Dan Walsh 2.2.45-2Dan Walsh 2.2.45-1Dan Walsh 2.2.44-1Dan Walsh 2.2.43-4Dan Walsh 2.2.43-3Dan Walsh 2.2.43-2Dan Walsh 2.2.43-1Dan Walsh 2.2.42-4Dan Walsh 2.2.42-3Dan Walsh 2.2.42-2Dan Walsh 2.2.42-1Dan Walsh 2.2.41-1Dan Walsh 2.2.40-2Dan Walsh 2.2.40-1Dan Walsh 2.2.39-2Dan Walsh 2.2.39-1Dan Walsh 2.2.38-6Dan Walsh 2.2.38-5Dan Walsh 2.2.38-4Dan Walsh 2.2.38-3Dan Walsh 2.2.38-2Dan Walsh 2.2.38-1Dan Walsh 2.2.37-1Dan Walsh 2.2.36-2Dan Walsh 2.2.36-1James Antill 2.2.35-2Dan Walsh 2.2.35-1Dan Walsh 2.2.34-3Dan Walsh 2.2.34-2Dan Walsh 2.2.34-1Dan Walsh 2.2.33-1Dan Walsh 2.2.32-2Dan Walsh 2.2.32-1Dan Walsh 2.2.31-1Dan Walsh 2.2.30-2Dan Walsh 2.2.30-1Dan Walsh 2.2.29-6Russell Coker 2.2.29-5Dan Walsh 2.2.29-4Dan Walsh 2.2.29-3Dan Walsh 2.2.29-2Dan Walsh 2.2.29-1Dan Walsh 2.2.28-3Dan Walsh 2.2.28-2Dan Walsh 2.2.28-1Dan Walsh 2.2.27-1Dan Walsh 2.2.25-3Dan Walsh 2.2.25-2Dan Walsh 2.2.24-1Dan Walsh 2.2.23-19Dan Walsh 2.2.23-18Dan Walsh 2.2.23-17Karsten Hopp 2.2.23-16Dan Walsh 2.2.23-15Dan Walsh 2.2.23-14Dan Walsh 2.2.23-13Dan Walsh 2.2.23-12Jeremy Katz - 2.2.23-11Jeremy Katz - 2.2.23-10Dan Walsh 2.2.23-9Dan Walsh 2.2.23-8Dan Walsh 2.2.23-7Dan Walsh 2.2.23-5Dan Walsh 2.2.23-4Dan Walsh 2.2.23-3Dan Walsh 2.2.23-2Dan Walsh 2.2.23-1Dan Walsh 2.2.22-2Dan Walsh 2.2.22-1Dan Walsh 2.2.21-9Dan Walsh 2.2.21-8Dan Walsh 2.2.21-7Dan Walsh 2.2.21-6Dan Walsh 2.2.21-5Dan Walsh 2.2.21-4Dan Walsh 2.2.21-3Dan Walsh 2.2.21-2Dan Walsh 2.2.21-1Dan Walsh 2.2.20-1Dan Walsh 2.2.19-2Dan Walsh 2.2.19-1Dan Walsh 2.2.18-2Dan Walsh 2.2.18-1Dan Walsh 2.2.17-2Dan Walsh 2.2.16-1Dan Walsh 2.2.15-4Dan Walsh 2.2.15-3Dan Walsh 2.2.15-1Dan Walsh 2.2.14-2Dan Walsh 2.2.14-1Dan Walsh 2.2.13-1Dan Walsh 2.2.12-1Dan Walsh 2.2.11-2Dan Walsh 2.2.11-1Dan Walsh 2.2.10-1Dan Walsh 2.2.9-2Dan Walsh 2.2.9-1Dan Walsh 2.2.8-2Dan Walsh 2.2.7-1Dan Walsh 2.2.6-3Dan Walsh 2.2.6-2Dan Walsh 2.2.6-1Dan Walsh 2.2.5-1Dan Walsh 2.2.4-1Dan Walsh 2.2.3-1Dan Walsh 2.2.2-1Dan Walsh 2.2.1-1Dan Walsh 2.1.13-1Dan Walsh 2.1.12-3Dan Walsh 2.1.11-1Dan Walsh 2.1.10-1Jeremy Katz - 2.1.9-2Dan Walsh 2.1.9-1Dan Walsh 2.1.8-3Dan Walsh 2.1.8-2Dan Walsh 2.1.8-1Dan Walsh 2.1.7-4Dan Walsh 2.1.7-3Dan Walsh 2.1.7-2Dan Walsh 2.1.7-1Dan Walsh 2.1.6-24Dan Walsh 2.1.6-23Dan Walsh 2.1.6-22Dan Walsh 2.1.6-21Dan Walsh 2.1.6-20Dan Walsh 2.1.6-18Dan Walsh 2.1.6-17Dan Walsh 2.1.6-16Dan Walsh 2.1.6-15Dan Walsh 2.1.6-14Dan Walsh 2.1.6-13Dan Walsh 2.1.6-11Dan Walsh 2.1.6-10Dan Walsh 2.1.6-9Dan Walsh 2.1.6-8Dan Walsh 2.1.6-5Dan Walsh 2.1.6-4Dan Walsh 2.1.6-3Dan Walsh 2.1.6-2Dan Walsh 2.1.6-1Dan Walsh 2.1.4-2Dan Walsh 2.1.4-1Dan Walsh 2.1.3-1Jeremy Katz - 2.1.2-3Dan Walsh 2.1.2-2Dan Walsh 2.1.2-1Dan Walsh 2.1.1-3Dan Walsh 2.1.1-2Dan Walsh 2.1.1-1Dan Walsh 2.1.0-3Dan Walsh 2.1.0-2.Dan Walsh 2.1.0-1.Dan Walsh 2.0.11-2.Dan Walsh 2.0.11-1.Dan Walsh 2.0.9-1.Dan Walsh 2.0.8-1.Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.6-2Dan Walsh 2.0.5-4Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1- Fix livecd_run() interface - Add labeling for /var/spool/postfix/dev/log * support postfix chroot - Allow sandbox_xserver_t to send signals - These are needed with CRL fetching is enabled - Razor labeling is not used no longer - Add label for /sbin/xtables-multi - Add support for winshadow port and allow iscsid to connect to this port - Allow chrome_sandbox_t to send all signals to sandbox_nacl_t - Allow sandbox_nacl to setsched on its process - Dontaudit fail2ban looking at gnome content - fix label for /usr/lib(64)/iscan/network- Fix BOINC bug- BOinc fixes - Allow mysqld_safe to delete the mysql_db_t sock_file - Dovecot has a new fifo_file /var/run/stats-mail- Allow gnomeclock to send system log msgs - Users that use X and spice need to use the virtio device - squashfs supports extended attributes - Allow system_cronjob to dbus chat with NetworkManager - Allow all postfix domains to use the fifo_file - Allow squid to check the network state - Allow spamd to send mail- Fix typo in ssh.if- Allow spamd and clamd to steam connect to each other - Allow colord to execute ifconfig - Allow smbcontrol to signal themselves - Make faillog MLS trusted to make sudo_$1_t working- Backport MCS fixes from F16 - Other chrome fixes from F16- Backport chrome fixes - Backport cloudform policy- Fixes for systemd - Add FIPS suppport for dirsrv- Allow sa-update to update rules - Allow sa-update to read spamd tmp file - Allow screen to read all domain state - Allow sa-update to execute shell - More fixes for sa-update running out of cron job - Allow initrc to manage cron system spool - Fixes for collectd policy - Fixes added during clean up bugzillas - Dontaudit fail2ban_client_t sys_tty_config capability - Fix for puppet which does execute check on passwd - ricci_modservice send syslog msgs - Fix dev_dontaudit_write_mtrr() interface- Make mta_role() active - Add additional gitweb file context labeling - Allow asterisk to connect to jabber client port - Allow sssd to read the contents of /sys/class/net/$IFACE_NAME - Allow fsdaemon dac_override- Add logging_syslogd_can_sendmail boolean - Add support for exim and confined users - support for ommail module to send logs via mail - Add execmem_execmod() to execmem role - Allow pptp to send generic signal to kernel threads - Fix kerberos_manage_host_rcache() interface- Fixes for mock- Backport F16 fixes - livecd fixes - systemd fixes- Allow hostname read network state - Allow syslog to manage all log files - Add use_fusefs_home_dirs boolean for chrome - Make vdagent working with confined users - Fix syslog port definition - Allow openvpn to set its process priority when the nice parameter is used - Restorecond should be able to watch and relabel devices in /dev - Alow hddtemp to perform DNS name resolution- Fixes for zarafa, postfix policy - Backport collect policy- Backport ABRT changes - Make tmux working with scree policy - Allow root cron jobs can't run without unconfined - add interface to dontaudit writes to urand, needed by libra - Add label for /var/cache/krb5rcache directory- Allow jabberd_router_t to read system state - Rename oracledb_port to oracle_port - Allow rgmanager executes init script files in initrc_t domain which ensure proper transitions - screen wants to manage sock file in screen home dirs - Make screen working with confined users - Allow gssd to search access on the directory /proc/fs/nfsd- More fixes for postfix policy - Allow virsh_t setsched - Add mcelog_log_t type for mcelog log file - Add virt_ptynode attribute- Add l2tpd policy - Fixes for abrt - Backport fail2ban_client policy- Allow getcap, setcap for syslogd - Fix label for /usr/lib64/opera/opera- Make mozilla_plugin_tmpfs_t as userdom_user_tmpfs_content() - Allow init to delete all pid sockets - Allow colord to read /proc/stat - Add label for /var/www/html/wordpress/wp-content/plugins directory - Allow pppd to search /var/lock dir - puppetmaster use nsswitch: #711804 - Update abrt to match rawhide policy - allow privoxy to read network data - support gecko mozilla browser plugin - Allow chrome_sandbox to execute content in nfs homedir - postfix_qmgr needs to read /var/spool/postfix/deferred - abrt_t needs fsetid- Fixes for zarafa policy - Other fixes for fail2ban - Allow keyring to drop capabilities - Allow cobblerd to send syslog messages - Allow xserver to read/write the xserver_misk device - ppp also installs /var/log/ppp and /var/run/ppp directories * remove filetrans rules - fix for pppd_lock - Allow fail2ban run ldconfig - Allow lvm to read/write pipes inherited from login programs- Fix /var/lock labeling issue- Allow ssh to execute systemctl - fail2ban fixes related to /tmp directory - Allow puppetmaster to create dirs in /var/run/puppet- Add label for /var/lock/ppp - Fixes for colord policy - Allow sys_chroot for postfix domains- Add label for dev/ati/card* - Allowe secadm to manage selinux config files- Add Dominicks patch for dccp_socket - dnsmasq needs to read nm-dns-dnsmasq.conf in /var/run/ - Colord inherits open file descriptors from the users...' - cgred needs auth_use_nsswitch() - apcupsd lock file was missing file context specificatio... - Make cron work - Allow clamav to manage amavis spool files - Use httpd_can_sendmail boolean also for httpd_suexec_t - Add fenced_can_ssh boolean - Add dev_dontaudit_read_generic_files() for hplip - Allow xauthority to create shared memory - Make postfix user domains application_domains - Allow xend to sys_admin privs - Allow mount to read usr files - Allow logrotate to connect to init script using unix stream socket - Allow nsplugin_t to getattr on gpmctl- Allow logrotate to connect to init script using unix domain stream socket - Allow shorewall read and write inherited user domain pty/tty - virt will attempt to us another virtualizations pulsesaudio tmpfs_t, ignore error - Allow colord to get the attributes of fixed disk device nodes - Allow nsplugin_t to getattr on gpmctl - Allow mozilla_plugin to connect to pcscd over an unix stream socket - Allow logrotate to execute systemctl - colord wants to read files in users homedir - Remote login should create user_tmp_t content not its own tmp files - Allow psad signal - Fix cobbler_read_lib_files interface - Allow rlogind to r/w user terminals - Allow prelink_cron_system_t to relabel content and ignore obj_id - Allow gnomeclock_systemctl_t to list init_var_run_t - Dbus domains will inherit fds from the init system- Add label for /lib/upstart/init - Allow colord to getattr on /proc/scsi/scsi - Dontaudit sys_module for ifconfig and irqbalance- Make telepathy working with confined users - Allow colord signal - prelink_cron_system_t needs to be able to detect systemd - Allow cupsd_config_t to read user's symlinks in /tmp- Fixes for colord and vnstatd policy - telepathy needs to dbus chat with unconfined_t and unconfined_dbusd_t - Remove dbus.patch and move it to policy-F15.patch- Adding in unconfined_r telepathy domains so telepathy apps will not crash on update- Fix dbus_session_domain - Stop transitiong from unconfined_t to telepathy domains or to gkeyring domains- Allow init_t getcap and setcap - Allow namespace_init_t to use nsswitch - aisexec will execute corosync - colord tries to read files off noxattr file systems- Add back transition from unconfined to telepathy domains- Allow spamd to sent mail - Needs to be able to write to its systemhigh log file - Fix aide policy to run on MLS boxes - Allow NetworkManager to manage content in /etc/NetworkManager/system-connections - Allow user_t and staff_t access to generic scsi to handle locally plugged in scanners - Allow telepath_msn_t to read /proc/PARENT/cmdline - ftpd needs kill capability - Allow telepath_msn_t to connect to sip port - keyring daemon does not work on nfs homedirs - Allow $1_sudo_t to read default SELinux context - Add label for tgtd sock file in /var/run/ - Add apache_exec_rotatelogs interface - allow all zaraha domains to signal themselves, server writes to /tmp - Allow syslog to read the process state - Add label for /usr/lib/chromium-browser/chrome - Remove the telepathy transition from unconfined_t - Dontaudit sandbox domains trying to mounton sandbox_file_t, this is caused by fuse mounts - Allow initrc_t domain to manage abrt pid files - Add support for AEOLUS project - Virt_admin should be allowed to manage images and processes - Allow plymountd to send signals to init - Change labeling of fping6- xdm_t needs getsession for switch user - Every app that used to exec init is now execing systemdctl - Allow squid to manage krb5_host_rcache_t files - Allow foghorn to connect to agentx port - Fixes for colord policy- Need to allow apps that use locks to read /var/lock if it is a symlink - Allow systemd to create tasks - Logwatch reads /etc/sysctl.conf and /proc/sys/net/ipv4/ip_forward - Fixes for foghorn policy - Add labeling for systemd unit files - Allow gnomeclok to enable ntpd service using systemctl - systemd_systemctl_t domain was added - Add label for matahari-broker.pid file - We want to remove untrustedmcsprocess from ability to read /proc/pid - Fixes for matahari policy- Allow colord to use unix_dgram_socket - Allow apps that search pids to read /var/run if it is a lnk_file - iscsid_t creates its own directory - Allow init to list var_lock_t dir - apm needs to verify user accounts auth_use_nsswitch- Add /var/run/lock /var/lock definition to file_contexts.subs - nslcd_t is looking for kerberos cc files - SSH_USE_STRONG_RNG is 1 which requires /dev/random - Fix auth_rw_faillog definition - Allow sysadm_t to set attributes on fixed disks - allow user domains to execute lsof and look at application sockets - prelink_cron job calls telinit -u if init is rewritten - Fixes to run qemu_t from staff_t- Fix label for /var/run/udev to udev_var_run_t- Add label for /run/udev - Mock needs to be able to read network state- Other fixes to make boot working- A lot of fixes making /run change working - Add subs file to equate /var/run with /run and /var/lock with /run/lock - Allow rgmanager to send the kill signal to all users - Allow ssh_t to search /root/.ssh and create it if it does not exist - dontaudit read of user_tmp_t from load_policy - Allow abrt fowner capability - Allow audit daemons to change the run level in MLS environments - Since /var/lock is moving to /run/lock. We need to allow all interfaces for lock files to search var_run_t - Add file labelfor MathKernel - Add label for /dev/dlm* - Allow systemd_tmpfiles_t to manage sandbox data - More /run directories labels - rlogind sends kill signal to chkpwd_t - systemd is now mounting on /var/lock- Make Makefile/Rules.modular run sepolgen-ifgen during build to check if files for bugs -systemd is going to be useing /run and /run/lock for early bootup files. - Fix some comments in rlogin.if - Add policy for KDE backlighthelper - sssd needs to read ~/.k5login in nfs, cifs or fusefs file systems - sssd wants to read .k5login file in users homedir - setroubleshoot reads executables to see if they have TEXTREL - Add /var/spool/audit support for new version of audit - Remove kerberos_connect_524() interface calling - Combine kerberos_master_port_t and kerberos_port_t - systemd has setup /dev/kmsg as stderr for apps it executes - Need these access so that init can impersonate sockets on unix_dgram_socket- Add syslogd_exec_t label for systemd-kmsg-syslogd - ipsec_mgmt_t wants to cause ipsec_t to dump core, needs to be allowed - Allow rythmbox and other apps to share music over daap port - Allow qemu and pulseaudio to work together - Allow httpd to create socket file in /tmp - Allow tuned to write to sysfs - Allow systemd_tmpfiles to send kernel messages - Add a dev_filetrans to readahead_manage_pid_files so any callers can create directories and files in /dev with this label - mrtg needs to be able to create /var/lock/mrtg - Add label for /usr/share/shorewall/getparams - xdm needs to read KDE config files - Smolt needs to look at urand and read hwdata - google talk plugin in nsplugin is listing the contents - Add support for KDE ksysguardprocesslist_helper - Add support for a new cluster service - foghorn - gnome-control-center reads colord lib files when monitor is plugged - Add interface for defining node_types- Fix multiple specification for boot.log - devicekit leaks file descriptors to setfiles_t - Change all all_nodes to generic_node and all_if to generic_if - Should not use deprecated interface - Switch from using all_nodes to generic_node and from all_if to generic_if - Add support for xfce4-notifyd - Fix file context to show several labels as SystemHigh - seunshare needs to be able to mounton nfs/cifs/fusefs homedirs - Add etc_runtime_t label for /etc/securetty - Fixes to allow xdm_t to start gkeyringd_USERTYPE_t directly - login.krb needs to be able to write user_tmp_t - dirsrv needs to bind to port 7390 for dogtag - Fix a bug in gpg policy - gpg sends audit messages - Allow qpid to manage matahari files- Initial policy for matahari - Add dev_read_watchdog - Allow clamd to connect clamd port - Add support for kcmdatetimehelper - Allow shutdown to setrlimit and sys_nice - Allow systemd_passwd to talk to /dev/log before udev or syslog is running - Purge chr_file and blk files on /tmp - Fixes for pads - Fixes for piranha-pulse - gpg_t needs to be able to encyprt anything owned by the user- More dontaudits of writes from readahead - Dontaudit readahead_t file_type:dir write, to cover up kernel bug - systemd_tmpfiles needs to relabel faillog directory as well as the file - Allow hostname and consoletype to r/w inherited initrc_tmp_t files handline hostname >> /tmp/myhost- Update to upstream - Fixes for telepathy - Add port defition for ssdp port - add policy for /bin/systemd-notify from Dan - Mount command requires users read mount_var_run_t - colord needs to read konject_uevent_socket - User domains connect to the gkeyring socket - Add colord policy and allow user_t and staff_t to dbus chat with it - Add lvm_exec_t label for kpartx - Dontaudit reading the mail_spool_t link from sandbox -X - systemd is creating sockets in avahi_var_run and system_dbusd_var_run- Make a lot of modules independent - Update to make new seunshare/sandbox work - allow virt_domains to use inherited noxattrs file systems - Dont allow svirt_t to send kill signals - Cleanup policy to allow less modules in base - Cleanup to allow minimal files in base policy- gpg_t needs to talk to gnome-keyring - nscd wants to read /usr/tmp->/var/tmp to generate randomziation in unixchkpwd - enforce MCS labeling on nodes - Allow arpwatch to read meminfo - Allow gnomeclock to send itself signals - init relabels /dev/.udev files on boot - gkeyringd has to transition back to staff_t when it runs commands in bin_t or shell_exec_t - nautilus checks access on /media directory before mounting usb sticks, dontaudit access_check on mnt_t - dnsmasq can run as a dbus service, needs acquire service - mysql_admin should be allowed to connect to mysql service - virt creates monitor sockets in the users home dir- Allow sysadm type people to look at usb devices - Cron needs to be able to run shutdown - virt creates monitor sockets in the users home dir- gnome-keyring-daemon needs nsswitch getpw calls - Symantic places a pipe in the /opt directory tree that it expects syslogd to be able to write to - keyringd daemon sends/recieves dbus messages from user types - sudo domains need to be able to signal all users "sysadm_t" - allow systemd-ask-passwd to create unix dgram socket - allow puppet master to read usr files - fixes for mock policy - Add mock_enable_homedirs boolean - Allow systemd to relabel /dev - Moving to only one file type sandbox_file_t - mta search /var/lib/logcheck - sssd needs to bind to random UDP ports - Allow amavis sigkill - Add systemd_passwd_agent_dev_template interface and use it for lvm- Allow usbhid-ups to read hardware state information - systemd-tmpfiles has moved - Allo cgroup to sys_tty_config - For some reason prelink is attempting to read gconf settings - Add allow_daemons_use_tcp_wrapper boolean - Add label for ~/.cache/wocky to make telepathy work in enforcing mode - Add label for char devices /dev/dasd* - Fix for apache_role - Allow amavis to talk to nslcd - allow all sandbox to read selinux poilcy config files - Allow cluster domains to use the system bus and send each other dbus messages- Update to upstream - Allow systemd-tmpfiles to getattr on all files/dirs- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Update to ref policy - cgred needs chown capability - Add /dev/crash crash_dev_t - systemd-readahead wants to use fanotify which means readahead_t needs sys_admin capability- New labeling for postfmulti #675654 - dontaudit xdm_t listing noxattr file systems - dovecot-auth needs to be able to connect to mysqld via the network as well as locally - shutdown is passed stdout to a xdm_log_t file - smartd creates a fixed disk device - dovecot_etc_t contains a lnk_file that domains need to read - mount needs to be able to read etc_runtim_t:lnk_file since in rawhide this is a link created at boot- syslog_t needs syslog capability - dirsrv needs to be able to create /var/lib/snmp - Fix labeling for dirsrv - Fix for dirsrv policy missing manage_dirs_pattern - corosync needs to delete clvm_tmpfs_t files - qdiskd needs to list hugetlbfs - Move setsched to sandbox_x_domain, so firefox can run without network access - Allow hddtemp to read removable devices - Adding syslog and read_policy permissions to policy * syslog Allow unconfined, sysadm_t, secadm_t, logadm_t * read_policy allow unconfined, sysadm_t, secadm_t, staff_t on Targeted allow sysadm_t (optionally), secadm_t on MLS - mdadm application will write into /sys/.../uevent whenever arrays are assembled or disassembled.- Add tcsd policy- ricci_modclusterd_t needs to bind to rpc ports 500-1023 - Allow dbus to use setrlimit to increase resoueces - Mozilla_plugin is leaking to sandbox - Allow confined users to connect to lircd over unix domain stream socket which allow to use remote control - Allow awstats to read squid logs - seunshare needs to manage tmp_t - apcupsd cgi scripts have a new directory- Fix xserver_dontaudit_read_xdm_pid - Change oracle_port_t to oracledb_port_t to prevent conflict with satellite - Allow dovecot_deliver_t to read/write postfix_master_t:fifo_file. * These fifo_file is passed from postfix_master_t to postfix_local_t to dovecot_deliver_t - Allow readahead to manage readahead pid dirs - Allow readahead to read all mcs levels - Allow mozilla_plugin_t to use nfs or samba homedirs- Allow nagios plugin to read /proc/meminfo - Fix for mozilla_plugin - Allow samba_net_t to create /etc/keytab - pppd_t setting up vpns needs to run unix_chkpwd, setsched its process and write wtmp_t - nslcd can read user credentials - Allow nsplugin to delete mozilla_plugin_tmpfs_t - abrt tries to create dir in rpm_var_lib_t - virt relabels fifo_files - sshd needs to manage content in fusefs homedir - mock manages link files in cache dir- nslcd needs setsched and to read /usr/tmp - Invalid call in likewise policy ends up creating a bogus role - Cannon puts content into /var/lib/bjlib that cups needs to be able to write - Allow screen to create screen_home_t in /root - dirsrv sends syslog messages - pinentry reads stuff in .kde directory - Add labels for .kde directory in homedir - Treat irpinit, iprupdate, iprdump services with raid policy- NetworkManager wants to read consolekit_var_run_t - Allow readahead to create /dev/.systemd/readahead - Remove permissive domains - Allow newrole to run namespace_init- Add sepgsql_contexts file- Update to upstream- Add oracle ports and allow apache to connect to them if the connect_db boolean is turned on - Add puppetmaster_use_db boolean - Fixes for zarafa policy - Fixes for gnomeclock poliy - Fix systemd-tmpfiles to use auth_use_nsswitch- gnomeclock executes a shell - Update for screen policy to handle pipe in homedir - Fixes for polyinstatiated homedir - Fixes for namespace policy and other fixes related to polyinstantiation - Add namespace policy - Allow dovecot-deliver transition to sendmail which is needed by sieve scripts - Fixes for init, psad policy which relate with confined users - Do not audit bootloader attempts to read devicekit pid files - Allow nagios service plugins to read /proc- Add firewalld policy - Allow vmware_host to read samba config - Kernel wants to read /proc Fix duplicate grub def in cobbler - Chrony sends mail, executes shell, uses fifo_file and reads /proc - devicekitdisk getattr all file systems - sambd daemon writes wtmp file - libvirt transitions to dmidecode- Add initial policy for system-setup-keyboard which is now daemon - Label /var/lock/subsys/shorewall as shorewall_lock_t - Allow users to communicate with the gpg_agent_t - Dontaudit mozilla_plugin_t using the inherited terminal - Allow sambagui to read files in /usr - webalizer manages squid log files - Allow unconfined domains to bind ports to raw_ip_sockets - Allow abrt to manage rpm logs when running yum - Need labels for /var/run/bittlebee - Label .ssh under amanda - Remove unused genrequires for virt_domain_template - Allow virt_domain to use fd inherited from virtd_t - Allow iptables to read shorewall config- Gnome apps list config_home_t - mpd creates lnk files in homedir - apache leaks write to mail apps on tmp files - /var/stockmaniac/templates_cache contains log files - Abrt list the connects of mount_tmp_t dirs - passwd agent reads files under /dev and reads utmp file - squid apache script connects to the squid port - fix name of plymouth log file - teamviewer is a wine app - allow dmesg to read system state - Stop labeling files under /var/lib/mock so restorecon will not go into this - nsplugin needs to read network state for google talk- Allow xdm and syslog to use /var/log/boot.log - Allow users to communicate with mozilla_plugin and kill it - Add labeling for ipv6 and dhcp- New labels for ghc http content - nsplugin_config needs to read urand, lvm now calls setfscreate to create dev - pm-suspend now creates log file for append access so we remove devicekit_wri - Change authlogin_use_sssd to authlogin_nsswitch_use_ldap - Fixes for greylist_milter policy- Update to upstream - Fixes for systemd policy - Fixes for passenger policy - Allow staff users to run mysqld in the staff_t domain, akonadi needs this - Add bin_t label for /usr/share/kde4/apps/kajongg/kajongg.py - auth_use_nsswitch does not need avahi to read passwords,needed for resolving data - Dontaudit (xdm_t) gok attempting to list contents of /var/account - Telepathy domains need to read urand - Need interface to getattr all file classes in a mock library for setroubleshoot- Update selinux policy to handle new /usr/share/sandbox/start script- Update to upstream - Fix version of policy in spec file- Allow sandbox to run on nfs partitions, fixes for systemd_tmpfs - remove per sandbox domains devpts types - Allow dkim-milter sending signal to itself- Allow domains that transition to ping or traceroute, kill them - Allow user_t to conditionally transition to ping_t and traceroute_t - Add fixes to systemd- tools, including new labeling for systemd-fsck, systemd-cryptsetup- Turn on systemd policy - mozilla_plugin needs to read certs in the homedir. - Dontaudit leaked file descriptors from devicekit - Fix ircssi to use auth_use_nsswitch - Change to use interface without param in corenet to disable unlabelednet packets - Allow init to relabel sockets and fifo files in /dev - certmonger needs dac* capabilities to manage cert files not owned by root - dovecot needs fsetid to change group membership on mail - plymouthd removes /var/log/boot.log - systemd is creating symlinks in /dev - Change label on /etc/httpd/alias to be all cert_t- Fixes for clamscan and boinc policy - Add boinc_project_t setpgid - Allow alsa to create tmp files in /tmp- Push fixes to allow disabling of unlabeled_t packet access - Enable unlabelednet policy- Fixes for lvm to work with systemd- Fix the label for wicd log - plymouthd creates force-display-on-active-vt file - Allow avahi to request the kernel to load a module - Dontaudit hal leaks - Fix gnome_manage_data interface - Add new interface corenet_packet to define a type as being an packet_type. - Removed general access to packet_type from icecast and squid. - Allow mpd to read alsa config - Fix the label for wicd log - Add systemd policy- Fix gnome_manage_data interface - Dontaudit sys_ptrace capability for iscsid - Fixes for nagios plugin policy- Fix cron to run ranged when started by init - Fix devicekit to use log files - Dontaudit use of devicekit_var_run_t for fstools - Allow init to setattr on logfile directories - Allow hald to manage files in /var/run/pm-utils/ dir which is now labeled as devicekit_var_run_t- Fix up handling of dnsmasq_t creating /var/run/libvirt/network - Turn on sshd_forward_ports boolean by default - Allow sysadmin to dbus chat with rpm - Add interface for rw_tpm_dev - Allow cron to execute bin - fsadm needs to write sysfs - Dontaudit consoletype reading /var/run/pm-utils - Lots of new privs fro mozilla_plugin_t running java app, make mozilla_plugin - certmonger needs to manage dirsrv data - /var/run/pm-utils should be labeled as devicekit_var_run_t- fixes to allow /var/run and /var/lock as tmpfs - Allow chrome sandbox to connect to web ports - Allow dovecot to listem on lmtp and sieve ports - Allov ddclient to search sysctl_net_t - Transition back to original domain if you execute the shell- Remove duplicate declaration- Update to upstream - Cleanup for sandbox - Add attribute to be able to select sandbox types- Allow ddclient to fix file mode bits of ddclient conf file - init leaks file descriptors to daemons - Add labels for /etc/lirc/ and - Allow amavis_t to exec shell - Add label for gssd_tmp_t for /var/tmp/nfs_0- Put back in lircd_etc_t so policy will install- Turn on allow_postfix_local_write_mail_spool - Allow initrc_t to transition to shutdown_t - Allow logwatch and cron to mls_read_to_clearance for MLS boxes - Allow wm to send signull to all applications and receive them from users - lircd patch from field - Login programs have to read /etc/samba - New programs under /lib/systemd - Abrt needs to read config files- Update to upstream - Dontaudit leaked sockets from userdomains to user domains - Fixes for mcelog to handle scripts - Apply patch from Ruben Kerkhof - Allow syslog to search spool dirs- Allow nagios plugins to read usr files - Allow mysqld-safe to send system log messages - Fixes fpr ddclient policy - Fix sasl_admin interface - Allow apache to search zarafa config - Allow munin plugins to search /var/lib directory - Allow gpsd to read sysfs_t - Fix labels on /etc/mcelog/triggers to bin_t- Remove saslauthd_tmp_t and transition tmp files to krb5_host_rcache_t - Allow saslauthd_t to create krb5_host_rcache_t files in /tmp - Fix xserver interface - Fix definition of /var/run/lxdm- Turn on mediawiki policy - kdump leaks kdump_etc_t to ifconfig, add dontaudit - uux needs to transition to uucpd_t - More init fixes relabels man,faillog - Remove maxima defs in libraries.fc - insmod needs to be able to create tmpfs_t files - ping needs setcap- Allow groupd transition to fenced domain when executes fence_node - Fixes for rchs policy - Allow mpd to be able to read samba/nfs files- Fix up corecommands.fc to match upstream - Make sure /lib/systemd/* is labeled init_exec_t - mount wants to setattr on all mountpoints - dovecot auth wants to read dovecot etc files - nscd daemon looks at the exe file of the comunicating daemon - openvpn wants to read utmp file - postfix apps now set sys_nice and lower limits - remote_login (telnetd/login) wants to use telnetd_devpts_t and user_devpts_t to work correctly - Also resolves nsswitch - Fix labels on /etc/hosts.* - Cleanup to make upsteam patch work - allow abrt to read etc_runtime_t- Add conflicts for dirsrv package- Update to upstream - Add vlock policy- Fix sandbox to work on nfs homedirs - Allow cdrecord to setrlimit - Allow mozilla_plugin to read xauth - Change label on systemd-logger to syslogd_exec_t - Install dirsrv policy from dirsrv package- Add virt_home_t, allow init to setattr on xserver_tmp_t and relabel it - Udev needs to stream connect to init and kernel - Add xdm_exec_bootloader boolean, which allows xdm to execute /sbin/grub and read files in /boot directory- Allow NetworkManager to read openvpn_etc_t - Dontaudit hplip to write of /usr dirs - Allow system_mail_t to create /root/dead.letter as mail_home_t - Add vdagent policy for spice agent daemon- Dontaudit sandbox sending sigkill to all user domains - Add policy for rssh_chroot_helper - Add missing flask definitions - Allow udev to relabelto removable_t - Fix label on /var/log/wicd.log - Transition to initrc_t from init when executing bin_t - Add audit_access permissions to file - Make removable_t a device_node - Fix label on /lib/systemd/*- Fixes for systemd to manage /var/run - Dontaudit leaks by firstboot- Allow chome to create netlink_route_socket - Add additional MATHLAB file context - Define nsplugin as an application_domain - Dontaudit sending signals from sandboxed domains to other domains - systemd requires init to build /tmp /var/auth and /var/lock dirs - mount wants to read devicekit_power /proc/ entries - mpd wants to connect to soundd port - Openoffice causes a setattr on a lib_t file for normal users, add dontaudit - Treat lib_t and textrel_shlib_t directories the same - Allow mount read access on virtual images- Allow sandbox_x_domains to work with nfs/cifs/fusefs home dirs. - Allow devicekit_power to domtrans to mount - Allow dhcp to bind to udp ports > 1024 to do named stuff - Allow ssh_t to exec ssh_exec_t - Remove telepathy_butterfly_rw_tmp_files(), dev_read_printk() interfaces which are nolonger used - Fix clamav_append_log() intefaces - Fix 'psad_rw_fifo_file' interface- Allow cobblerd to list cobler appache content- Fixup for the latest version of upowed - Dontaudit sandbox sending SIGNULL to desktop apps- Update to upstream-Mount command from a confined user generates setattr on /etc/mtab file, need to dontaudit this access - dovecot-auth_t needs ipc_lock - gpm needs to use the user terminal - Allow system_mail_t to append ~/dead.letter - Allow NetworkManager to edit /etc/NetworkManager/NetworkManager.conf - Add pid file to vnstatd - Allow mount to communicate with gfs_controld - Dontaudit hal leaks in setfiles- Lots of fixes for systemd - systemd now executes readahead and tmpwatch type scripts - Needs to manage random seed- Allow smbd to use sys_admin - Remove duplicate file context for tcfmgr - Update to upstream- Fix fusefs handling - Do not allow sandbox to manage nsplugin_rw_t - Allow mozilla_plugin_t to connecto its parent - Allow init_t to connect to plymouthd running as kernel_t - Add mediawiki policy - dontaudit sandbox sending signals to itself. This can happen when they are running at different mcs. - Disable transition from dbus_session_domain to telepathy for F14 - Allow boinc_project to use shm - Allow certmonger to search through directories that contain certs - Allow fail2ban the DAC Override so it can read log files owned by non root users- Start adding support for use_fusefs_home_dirs - Add /var/lib/syslog directory file context - Add /etc/localtime as locale file context- Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn off iptables from unconfined user - Allow sudo to send signals to any domains the user could have transitioned to. - Passwd in single user mode needs to talk to console_device_t - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio - locate tried to read a symbolic link, will dontaudit - New labels for telepathy-sunshine content in homedir - Google is storing other binaries under /opt/google/talkplugin - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15 - modemmanger and bluetooth send dbus messages to devicekit_power - Samba needs to getquota on filesystems labeld samba_share_t- Dontaudit attempts by xdm_t to write to bin_t for kdm - Allow initrc_t to manage system_conf_t- Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory. - Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets - Allow confined users to read xdm_etc_t files - Allow xdm_t to transition to xauth_t for lxdm program- Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home - Allow clamd to send signals to itself - Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm. - Allow haze to connect to yahoo chat and messenger port tcp:5050. Bz #637339 - Allow guest to run ps command on its processes by allowing it to read /proc - Allow firewallgui to sys_rawio which seems to be required to setup masqerading - Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba. - Add label for /var/log/slim.log- Pull in cleanups from dgrift - Allow mozilla_plugin_t to execute mozilla_home_t - Allow rpc.quota to do quotamod- Cleanup policy via dgrift - Allow dovecot_deliver to append to inherited log files - Lots of fixes for consolehelper- Fix up Xguest policy- Add vnstat policy - allow libvirt to send audit messages - Allow chrome-sandbox to search nfs_t- Update to upstream- Add the ability to send audit messages to confined admin policies - Remove permissive domain from cmirrord and dontaudit sys_tty_config - Split out unconfined_domain() calls from other unconfined_ calls so we can d - virt needs to be able to read processes to clearance for MLS- Allow all domains that can use cgroups to search tmpfs_t directory - Allow init to send audit messages- Update to upstream- Allow mdadm_t to create files and sock files in /dev/md/- Add policy for ajaxterm- Handle /var/db/sudo - Allow pulseaudio to read alsa config - Allow init to send initrc_t dbus messagesAllow iptables to read shorewall tmp files Change chfn and passwd to use auth_use_pam so they can send dbus messages to fpr intd label vlc as an execmem_exec_t Lots of fixes for mozilla_plugin to run google vidio chat Allow telepath_msn to execute ldconfig and its own tmp files Fix labels on hugepages Allow mdadm to read files on /dev Remove permissive domains and change back to unconfined Allow freshclam to execute shell and bin_t Allow devicekit_power to transition to dhcpc Add boolean to allow icecast to connect to any port- Merge upstream fix of mmap_zero - Allow mount to write files in debugfs_t - Allow corosync to communicate with clvmd via tmpfs - Allow certmaster to read usr_t files - Allow dbus system services to search cgroup_t - Define rlogind_t as a login pgm- Allow mdadm_t to read/write hugetlbfs- Dominic Grift Cleanup - Miroslav Grepl policy for jabberd - Various fixes for mount/livecd and prelink- Merge with upstream- More access needed for devicekit - Add dbadm policy- Merge with upstream- Allow seunshare to fowner- Allow cron to look at user_cron_spool links - Lots of fixes for mozilla_plugin_t - Add sysv file system - Turn unconfined domains to permissive to find additional avcs- Update policy for mozilla_plugin_t- Allow clamscan to read proc_t - Allow mount_t to write to debufs_t dir - Dontaudit mount_t trying to write to security_t dir- Allow clamscan_t execmem if clamd_use_jit set - Add policy for firefox plugin-container- Fix /root/.forward definition- label dead.letter as mail_home_t- Allow login programs to search /cgroups- Fix cert handling- Fix devicekit_power bug - Allow policykit_auth_t more access.- Fix nis calls to allow bind to ports 512-1024 - Fix smartmon- Allow pcscd to read sysfs - systemd fixes - Fix wine_mmap_zero_ignore boolean- Apply Miroslav munin patch - Turn back on allow_execmem and allow_execmod booleans- Merge in fixes from dgrift repository- Update boinc policy - Fix sysstat policy to allow sys_admin - Change failsafe_context to unconfined_r:unconfined_t:s0- New paths for upstart- New permissions for syslog - New labels for /lib/upstart- Add mojomojo policy- Allow systemd to setsockcon on sockets to immitate other services- Remove debugfs label- Update to latest policy- Fix eclipse labeling from IBMSupportAssasstant packageing- Make boot with systemd in enforcing mode- Update to upstream- Add boolean to turn off port forwarding in sshd.- Add support for ebtables - Fixes for rhcs and corosync policy-Update to upstream-Update to upstream-Update to upstream- Add Zarafa policy- Cleanup of aiccu policy - initial mock policy- Lots of random fixes- Update to upstream- Update to upstream - Allow prelink script to signal itself - Cobbler fixes- Add xdm_var_run_t to xserver_stream_connect_xdm - Add cmorrord and mpd policy from Miroslav Grepl- Fix sshd creation of krb cc files for users to be user_tmp_t- Fixes for accountsdialog - Fixes for boinc- Fix label on /var/lib/dokwiki - Change permissive domains to enforcing - Fix libvirt policy to allow it to run on mls- Update to upstream- Allow procmail to execute scripts in the users home dir that are labeled home_bin_t - Fix /var/run/abrtd.lock label- Allow login programs to read krb5_home_t Resolves: 594833 - Add obsoletes for cachefilesfd-selinux package Resolves: #575084- Allow mount to r/w abrt fifo file - Allow svirt_t to getattr on hugetlbfs - Allow abrt to create a directory under /var/spool- Add labels for /sys - Allow sshd to getattr on shutdown - Fixes for munin - Allow sssd to use the kernel key ring - Allow tor to send syslog messages - Allow iptabels to read usr files - allow policykit to read all domains state- Fix path for /var/spool/abrt - Allow nfs_t as an entrypoint for http_sys_script_t - Add policy for piranha - Lots of fixes for sosreport- Allow xm_t to read network state and get and set capabilities - Allow policykit to getattr all processes - Allow denyhosts to connect to tcp port 9911 - Allow pyranha to use raw ip sockets and ptrace itself - Allow unconfined_execmem_t and gconfsd mechanism to dbus - Allow staff to kill ping process - Add additional MLS rules- Allow gdm to edit ~/.gconf dir Resolves: #590677 - Allow dovecot to create directories in /var/lib/dovecot Partially resolves 590224 - Allow avahi to dbus chat with NetworkManager - Fix cobbler labels - Dontaudit iceauth_t leaks - fix /var/lib/lxdm file context - Allow aiccu to use tun tap devices - Dontaudit shutdown using xserver.log- Fixes for sandbox_x_net_t to match access for sandbox_web_t ++ - Add xdm_etc_t for /etc/gdm directory, allow accountsd to manage this directory - Add dontaudit interface for bluetooth dbus - Add chronyd_read_keys, append_keys for initrc_t - Add log support for ksmtuned Resolves: #586663- Allow boinc to send mail- Allow initrc_t to remove dhcpc_state_t - Fix label on sa-update.cron - Allow dhcpc to restart chrony initrc - Don't allow sandbox to send signals to its parent processes - Fix transition from unconfined_t -> unconfined_mount_t -> rpcd_t Resolves: #589136- Fix location of oddjob_mkhomedir Resolves: #587385 - fix labeling on /root/.shosts and ~/.shosts - Allow ipsec_mgmt_t to manage net_conf_t Resolves: #586760- Dontaudit sandbox trying to connect to netlink sockets Resolves: #587609 - Add policy for piranha- Fixups for xguest policy - Fixes for running sandbox firefox- Allow ksmtuned to use terminals Resolves: #586663 - Allow lircd to write to generic usb devices- Allow sandbox_xserver to connectto unconfined stream Resolves: #585171- Allow initrc_t to read slapd_db_t Resolves: #585476 - Allow ipsec_mgmt to use unallocated devpts and to create /etc/resolv.conf Resolves: #585963- Allow rlogind_t to search /root for .rhosts Resolves: #582760 - Fix path for cached_var_t - Fix prelink paths /var/lib/prelink - Allow confined users to direct_dri - Allow mls lvm/cryptosetup to work- Allow virtd_t to manage firewall/iptables config Resolves: #573585- Fix label on /root/.rhosts Resolves: #582760 - Add labels for Picasa - Allow openvpn to read home certs - Allow plymouthd_t to use tty_device_t - Run ncftool as iptables_t - Allow mount to unmount unlabeled_t - Dontaudit hal leaks- Allow livecd to transition to mount- Update to upstream - Allow abrt to delete sosreport Resolves: #579998 - Allow snmp to setuid and gid Resolves: #582155 - Allow smartd to use generic scsi devices Resolves: #582145- Allow ipsec_t to create /etc/resolv.conf with the correct label - Fix reserved port destination - Allow autofs to transition to showmount - Stop crashing tuned- Add telepathysofiasip policy- Update to upstream - Fix label for /opt/google/chrome/chrome-sandbox - Allow modemmanager to dbus with policykit- Fix allow_httpd_mod_auth_pam to use auth_use_pam(httpd_t) - Allow accountsd to read shadow file - Allow apache to send audit messages when using pam - Allow asterisk to bind and connect to sip tcp ports - Fixes for dovecot 2.0 - Allow initrc_t to setattr on milter directories - Add procmail_home_t for .procmailrc file- Fixes for labels during install from livecd- Fix /cgroup file context - Fix broken afs use of unlabled_t - Allow getty to use the console for s390- Fix cgroup handling adding policy for /cgroup - Allow confined users to write to generic usb devices, if user_rw_noexattrfile boolean set- Merge patches from dgrift- Update upstream - Allow abrt to write to the /proc under any process- Fix ~/.fontconfig label - Add /root/.cert label - Allow reading of the fixed_file_disk_t:lnk_file if you can read file - Allow qemu_exec_t as an entrypoint to svirt_t- Update to upstream - Allow tmpreaper to delete sandbox sock files - Allow chrome-sandbox_t to use /dev/zero, and dontaudit getattr file systems - Fixes for gitosis - No transition on livecd to passwd or chfn - Fixes for denyhosts- Add label for /var/lib/upower - Allow logrotate to run sssd - dontaudit readahead on tmpfs blk files - Allow tmpreaper to setattr on sandbox files - Allow confined users to execute dos files - Allow sysadm_t to kill processes running within its clearance - Add accountsd policy - Fixes for corosync policy - Fixes from crontab policy - Allow svirt to manage svirt_image_t chr files - Fixes for qdisk policy - Fixes for sssd policy - Fixes for newrole policy- make libvirt work on an MLS platform- Add qpidd policy- Update to upstream- Allow boinc to read kernel sysctl - Fix snmp port definitions - Allow apache to read anon_inodefs- Allow shutdown dac_override- Add device_t as a file system - Fix sysfs association- Dontaudit ipsec_mgmt sys_ptrace - Allow at to mail its spool files - Allow nsplugin to search in .pulse directory- Update to upstream- Allow users to dbus chat with xdm - Allow users to r/w wireless_device_t - Dontaudit reading of process states by ipsec_mgmt- Fix openoffice from unconfined_t- Add shutdown policy so consolekit can shutdown system- Update to upstream- Update to upstream- Update to upstream - These are merges of my patches - Remove 389 labeling conflicts - Add MLS fixes found in RHEL6 testing - Allow pulseaudio to run as a service - Add label for mssql and allow apache to connect to this database port if boolean set - Dontaudit searches of debugfs mount point - Allow policykit_auth to send signals to itself - Allow modcluster to call getpwnam - Allow swat to signal winbind - Allow usbmux to run as a system role - Allow svirt to create and use devpts- Add MLS fixes found in RHEL6 testing - Allow domains to append to rpm_tmp_t - Add cachefilesfd policy - Dontaudit leaks when transitioning- Change allow_execstack and allow_execmem booleans to on - dontaudit acct using console - Add label for fping - Allow tmpreaper to delete sandbox_file_t - Fix wine dontaudit mmap_zero - Allow abrt to read var_t symlinks- Additional policy for rgmanager- Allow sshd to setattr on pseudo terms- Update to upstream- Allow policykit to send itself signals- Fix duplicate cobbler definition- Fix file context of /var/lib/avahi-autoipd- Merge with upstream- Allow sandbox to work with MLS- Make Chrome work with staff user- Add icecast policy - Cleanup spec file- Add mcelog policy- Lots of fixes found in F12- Fix rpm_dontaudit_leaks- Add getsched to hald_t - Add file context for Fedora/Redhat Directory Server- Allow abrt_helper to getattr on all filesystems - Add label for /opt/real/RealPlayer/plugins/oggfformat\.so- Add gstreamer_home_t for ~/.gstreamer- Update to upstream- Fix git- Turn on puppet policy - Update to dgrift git policy- Move users file to selection by spec file. - Allow vncserver to run as unconfined_u:unconfined_r:unconfined_t- Update to upstream- Remove most of the permissive domains from F12.- Add cobbler policy from dgrift- add usbmon device - Add allow rulse for devicekit_disk- Lots of fixes found in F12, fixes from Tom London- Cleanups from dgrift- Add back xserver_manage_home_fonts- Dontaudit sandbox trying to read nscd and sssd- Update to upstream- Rename udisks-daemon back to devicekit_disk_t policy- Fixes for abrt calls- Add tgtd policy- Update to upstream release- Add asterisk policy back in - Update to upstream release 2.20091117- Update to upstream release 2.20091117- Fixup nut policy- Update to upstream- Allow vpnc request the kernel to load modules- Fix minimum policy installs - Allow udev and rpcbind to request the kernel to load modules- Add plymouth policy - Allow local_login to sys_admin- Allow cupsd_config to read user tmp - Allow snmpd_t to signal itself - Allow sysstat_t to makedir in sysstat_log_t- Update rhcs policy- Allow users to exec restorecond- Allow sendmail to request kernel modules load- Fix all kernel_request_load_module domains- Fix all kernel_request_load_module domains- Remove allow_exec* booleans for confined users. Only available for unconfined_t- More fixes for sandbox_web_t- Allow sshd to create .ssh directory and content- Fix request_module line to module_request- Fix sandbox policy to allow it to run under firefox. - Dont audit leaks.- Fixes for sandbox- Update to upstream - Dontaudit nsplugin search /root - Dontaudit nsplugin sys_nice- Fix label on /usr/bin/notepad, /usr/sbin/vboxadd-service - Remove policycoreutils-python requirement except for minimum- Fix devicekit_disk_t to getattr on all domains sockets and fifo_files - Conflicts seedit (You can not use selinux-policy-targeted and seedit at the same time.)- Add wordpress/wp-content/uploads label - Fixes for sandbox when run from staff_t- Update to upstream - Fixes for devicekit_disk- More fixes- Lots of fixes for initrc and other unconfined domains- Allow xserver to use netlink_kobject_uevent_socket- Fixes for sandbox- Dontaudit setroubleshootfix looking at /root directory- Update to upsteam- Allow gssd to send signals to users - Fix duplicate label for apache content- Update to upstream- Remove polkit_auth on upgrades- Add back in unconfined.pp and unconfineduser.pp - Add Sandbox unshare- Fixes for cdrecord, mdadm, and others- Add capability setting to dhcpc and gpm- Allow cronjobs to read exim_spool_t- Add ABRT policy- Fix system-config-services policy- Allow libvirt to change user componant of virt_domain- Allow cupsd_config_t to be started by dbus - Add smoltclient policy- Add policycoreutils-python to pre install- Make all unconfined_domains permissive so we can see what AVC's happen- Add pt_chown policy- Add kdump policy for Miroslav Grepl - Turn off execstack boolean- Turn on execstack on a temporary basis (#512845)- Allow nsplugin to connecto the session bus - Allow samba_net to write to coolkey data- Allow devicekit_disk to list inotify- Allow svirt images to create sock_file in svirt_var_run_t- Allow exim to getattr on mountpoints - Fixes for pulseaudio- Allow svirt_t to stream_connect to virtd_t- Allod hald_dccm_t to create sock_files in /tmp- More fixes from upstream- Fix polkit label - Remove hidebrokensymptoms for nss_ldap fix - Add modemmanager policy - Lots of merges from upstream - Begin removing textrel_shlib_t labels, from fixed libraries- Update to upstream- Allow certmaster to override dac permissions- Update to upstream- Fix context for VirtualBox- Update to upstream- Allow clamscan read amavis spool files- Fixes for xguest- fix multiple directory ownership of mandirs- Update to upstream- Add rules for rtkit-daemon- Update to upstream - Fix nlscd_stream_connect- Add rtkit policy- Allow rpcd_t to stream connect to rpcbind- Allow kpropd to create tmp files- Fix last duplicate /var/log/rpmpkgs- Update to upstream * add sssd- Update to upstream * cleanup- Update to upstream - Additional mail ports - Add virt_use_usb boolean for svirt- Fix mcs rules to include chr_file and blk_file- Add label for udev-acl- Additional rules for consolekit/udev, privoxy and various other fixes- New version for upstream- Allow NetworkManager to read inotifyfs- Allow setroubleshoot to run mlocate- Update to upstream- Add fish as a shell - Allow fprintd to list usbfs_t - Allow consolekit to search mountpoints - Add proper labeling for shorewall- New log file for vmware - Allow xdm to setattr on user_tmp_t- Upgrade to upstream- Allow fprintd to access sys_ptrace - Add sandbox policy- Add varnishd policy- Fixes for kpropd- Allow brctl to r/w tun_tap_device_t- Add /usr/share/selinux/packages- Allow rpcd_t to send signals to kernel threads- Fix upgrade for F10 to F11- Add policy for /var/lib/fprint-Remove duplicate line- Allow svirt to manage pci and other sysfs device data- Fix package selection handling- Fix /sbin/ip6tables-save context - Allod udev to transition to mount - Fix loading of mls policy file- Add shorewall policy- Additional rules for fprintd and sssd- Allow nsplugin to unix_read unix_write sem for unconfined_java- Fix uml files to be owned by users- Fix Upgrade path to install unconfineduser.pp when unocnfined package is 3.0.0 or less- Allow confined users to manage virt_content_t, since this is home dir content - Allow all domains to read rpm_script_tmp_t which is what shell creates on redirection- Fix labeling on /var/lib/misc/prelink* - Allow xserver to rw_shm_perms with all x_clients - Allow prelink to execute files in the users home directory- Allow initrc_t to delete dev_null - Allow readahead to configure auditing - Fix milter policy - Add /var/lib/readahead- Update to latest milter code from Paul Howarth- Additional perms for readahead- Allow pulseaudio to acquire_svc on session bus - Fix readahead labeling- Allow sysadm_t to run rpm directly - libvirt needs fowner- Allow sshd to read var_lib symlinks for freenx- Allow nsplugin unix_read and write on users shm and sem - Allow sysadm_t to execute su- Dontaudit attempts to getattr user_tmpfs_t by lvm - Allow nfs to share removable media- Add ability to run postdrop from confined users- Fixes for podsleuth- Turn off nsplugin transition - Remove Konsole leaked file descriptors for release- Allow cupsd_t to create link files in print_spool_t - Fix iscsi_stream_connect typo - Fix labeling on /etc/acpi/actions - Don't reinstall unconfine and unconfineuser on upgrade if they are not installed- Allow audioentroy to read etc files- Add fail2ban_var_lib_t - Fixes for devicekit_power_t- Separate out the ucnonfined user from the unconfined.pp package- Make sure unconfined_java_t and unconfined_mono_t create user_tmpfs_t.- Upgrade to latest upstream - Allow devicekit_disk sys_rawio- Dontaudit binds to ports < 1024 for named - Upgrade to latest upstream- Allow podsleuth to use tmpfs files- Add customizable_types for svirt- Allow setroubelshoot exec* privs to prevent crash from bad libraries - add cpufreqselector- Dontaudit listing of /root directory for cron system jobs- Fix missing ld.so.cache label- Add label for ~/.forward and /root/.forward- Fixes for svirt- Fixes to allow svirt read iso files in homedir- Add xenner and wine fixes from mgrepl- Allow mdadm to read/write mls override- Change to svirt to only access svirt_image_t- Fix libvirt policy- Upgrade to latest upstream- Fixes for iscsid and sssd - More cleanups for upgrade from F10 to Rawhide.- Add pulseaudio, sssd policy - Allow networkmanager to exec udevadm- Add pulseaudio context- Upgrade to latest patches- Fixes for libvirt- Update to Latest upstream- Fix setrans.conf to show SystemLow for s0- Further confinement of qemu images via svirt- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Allow NetworkManager to manage /etc/NetworkManager/system-connections- add virtual_image_context and virtual_domain_context files- Allow rpcd_t to send signal to mount_t - Allow libvirtd to run ranged- Fix sysnet/net_conf_t- Fix squidGuard labeling- Re-add corenet_in_generic_if(unlabeled_t)* Tue Feb 10 2009 Dan Walsh 3.6.5-2 - Add git web policy- Add setrans contains from upstream- Do transitions outside of the booleans- Allow xdm to create user_tmp_t sockets for switch user to work- Fix staff_t domain- Grab remainder of network_peer_controls patch- More fixes for devicekit- Upgrade to latest upstream- Add boolean to disallow unconfined_t login- Add back transition from xguest to mozilla- Add virt_content_ro_t and labeling for isos directory- Fixes for wicd daemon- More mls/rpm fixes- Add policy to make dbus/nm-applet work- Remove polgen-ifgen from post and add trigger to policycoreutils-python- Add wm policy - Make mls work in graphics mode- Fixed for DeviceKit- Add devicekit policy- Update to upstream- Define openoffice as an x_domain- Fixes for reading xserver_tmp_t- Allow cups_pdf_t write to nfs_t- Remove audio_entropy policy- Update to upstream- Allow hal_acl_t to getattr/setattr fixed_disk- Change userdom_read_all_users_state to include reading symbolic links in /proc- Fix dbus reading /proc information- Add missing alias for home directory content- Fixes for IBM java location- Allow unconfined_r unconfined_java_t- Add cron_role back to user domains- Fix sudo setting of user keys- Allow iptables to talk to terminals - Fixes for policy kit - lots of fixes for booting.- Cleanup policy- Rebuild for Python 2.6- Fix labeling on /var/spool/rsyslog- Allow postgresl to bind to udp nodes- Allow lvm to dbus chat with hal - Allow rlogind to read nfs_t- Fix cyphesis file context- Allow hal/pm-utils to look at /var/run/video.rom - Add ulogd policy- Additional fixes for cyphesis - Fix certmaster file context - Add policy for system-config-samba - Allow hal to read /var/run/video.rom- Allow dhcpc to restart ypbind - Fixup labeling in /var/run- Add certmaster policy- Fix confined users - Allow xguest to read/write xguest_dbusd_t- Allow openoffice execstack/execmem privs- Allow mozilla to run with unconfined_execmem_t- Dontaudit domains trying to write to .xsession-errors- Allow nsplugin to look at autofs_t directory- Allow kerneloops to create tmp files- More alias for fastcgi- Remove mod_fcgid-selinux package- Fix dovecot access- Policy cleanup- Remove Multiple spec - Add include - Fix makefile to not call per_role_expansion- Fix labeling of libGL- Update to upstream- Update to upstream policy- Fixes for confined xwindows and xdm_t- Allow confined users and xdm to exec wm - Allow nsplugin to talk to fifo files on nfs- Allow NetworkManager to transition to avahi and iptables - Allow domains to search other domains keys, coverup kernel bug- Fix labeling for oracle- Allow nsplugin to comminicate with xdm_tmp_t sock_file- Change all user tmpfs_t files to be labeled user_tmpfs_t - Allow radiusd to create sock_files- Upgrade to upstream- Allow confined users to login with dbus- Fix transition to nsplugin- Add file context for /dev/mspblk.*- Fix transition to nsplugin '- Fix labeling on new pm*log - Allow ssh to bind to all nodes- Merge upstream changes - Add Xavier Toth patches- Add qemu_cache_t for /var/cache/libvirt- Remove gamin policy- Add tinyxs-max file system support- Update to upstream - New handling of init scripts- Allow pcsd to dbus - Add memcache policy- Allow audit dispatcher to kill his children- Update to upstream - Fix crontab use by unconfined user- Allow ifconfig_t to read dhcpc_state_t- Update to upstream- Update to upstream- Allow system-config-selinux to work with policykit- Fix novel labeling- Consolodate pyzor,spamassassin, razor into one security domain - Fix xdm requiring additional perms.- Fixes for logrotate, alsa- Eliminate vbetool duplicate entry- Fix xguest -> xguest_mozilla_t -> xguest_openiffice_t - Change dhclient to be able to red networkmanager_var_run- Update to latest refpolicy - Fix libsemanage initial install bug- Add inotify support to nscd- Allow unconfined_t to setfcap- Allow amanda to read tape - Allow prewikka cgi to use syslog, allow audisp_t to signal cgi - Add support for netware file systems- Allow ypbind apps to net_bind_service- Allow all system domains and application domains to append to any log file- Allow gdm to read rpm database - Allow nsplugin to read mplayer config files- Allow vpnc to run ifconfig- Allow confined users to use postgres - Allow system_mail_t to exec other mail clients - Label mogrel_rails as an apache server- Apply unconfined_execmem_exec_t to haskell programs- Fix prelude file context- allow hplip to talk dbus - Fix context on ~/.local dir- Prevent applications from reading x_device- Add /var/lib/selinux context- Update to upstream- Add livecd policy- Dontaudit search of admin_home for init_system_domain - Rewrite of xace interfaces - Lots of new fs_list_inotify - Allow livecd to transition to setfiles_mac- Begin XAce integration- Merge Upstream- Allow amanada to create data files- Fix initial install, semanage setup- Allow system_r for httpd_unconfined_script_t- Remove dmesg boolean - Allow user domains to read/write game data- Change unconfined_t to transition to unconfined_mono_t when running mono - Change XXX_mono_t to transition to XXX_t when executing bin_t files, so gnome-do will work- Remove old booleans from targeted-booleans.conf file- Add boolean to mmap_zero - allow tor setgid - Allow gnomeclock to set clock- Don't run crontab from unconfined_t- Change etc files to config files to allow users to read them- Lots of fixes for confined domains on NFS_t homedir- dontaudit mrtg reading /proc - Allow iscsi to signal itself - Allow gnomeclock sys_ptrace- Allow dhcpd to read kernel network state- Label /var/run/gdm correctly - Fix unconfined_u user creation- Allow transition from initrc_t to getty_t- Allow passwd to communicate with user sockets to change gnome-keyring- Fix initial install- Allow radvd to use fifo_file - dontaudit setfiles reading links - allow semanage sys_resource - add allow_httpd_mod_auth_ntlm_winbind boolean - Allow privhome apps including dovecot read on nfs and cifs home dirs if the boolean is set- Allow nsplugin to read /etc/mozpluggerrc, user_fonts - Allow syslog to manage innd logs. - Allow procmail to ioctl spamd_exec_t- Allow initrc_t to dbus chat with consolekit.- Additional access for nsplugin - Allow xdm setcap/getcap until pulseaudio is fixed- Allow mount to mkdir on tmpfs - Allow ifconfig to search debugfs- Fix file context for MATLAB - Fixes for xace- Allow stunnel to transition to inetd children domains - Make unconfined_dbusd_t an unconfined domain- Fixes for qemu/virtd- Fix bug in mozilla policy to allow xguest transition - This will fix the libsemanage.dbase_llist_query: could not find record value libsemanage.dbase_llist_query: could not query record value (No such file or directory) bug in xguest- Allow nsplugin to run acroread- Add cups_pdf policy - Add openoffice policy to run in xguest- prewika needs to contact mysql - Allow syslog to read system_map files- Change init_t to an unconfined_domain- Allow init to transition to initrc_t on shell exec. - Fix init to be able to sendto init_t. - Allow syslog to connect to mysql - Allow lvm to manage its own fifo_files - Allow bugzilla to use ldap - More mls fixes- fixes for init policy (#436988) - fix build- Additional changes for MLS policy- Fix initrc_context generation for MLS- Fixes for libvirt- Allow bitlebee to read locale_t- More xselinux rules- Change httpd_$1_script_r*_t to httpd_$1_content_r*_t- Prepare policy for beta release - Change some of the system domains back to unconfined - Turn on some of the booleans- Allow nsplugin_config execstack/execmem - Allow nsplugin_t to read alsa config - Change apache to use user content- Add cyphesis policy- Fix Makefile.devel to build mls modules - Fix qemu to be more specific on labeling- Update to upstream fixes- Allow staff to mounton user_home_t- Add xace support- Add fusectl file system- Fixes from yum-cron - Update to latest upstream- Fix userdom_list_user_files- Merge with upstream- Allow udev to send audit messages- Add additional login users interfaces - userdom_admin_login_user_template(staff)- More fixes for polkit- Eliminate transition from unconfined_t to qemu by default - Fixes for gpg- Update to upstream- Fixes for staff_t- Add policy for kerneloops - Add policy for gnomeclock- Fixes for libvirt- Fixes for nsplugin- More fixes for qemu- Additional ports for vnc and allow qemu and libvirt to search all directories- Update to upstream - Add libvirt policy - add qemu policy- Allow fail2ban to create a socket in /var/run- Allow allow_httpd_mod_auth_pam to work- Add audisp policy and prelude- Allow all user roles to executae samba net command- Allow usertypes to read/write noxattr file systems- Fix nsplugin to allow flashplugin to work in enforcing mode- Allow pam_selinux_permit to kill all processes- Allow ptrace or user processes by users of same type - Add boolean for transition to nsplugin- Allow nsplugin sys_nice, getsched, setsched- Allow login programs to talk dbus to oddjob- Add procmail_log support - Lots of fixes for munin- Allow setroubleshoot to read policy config and send audit messages- Allow users to execute all files in homedir, if boolean set - Allow mount to read samba config- Fixes for xguest to run java plugin- dontaudit pam_t and dbusd writing to user_home_t- Update gpg to allow reading of inotify- Change user and staff roles to work correctly with varied perms- Fix munin log, - Eliminate duplicate mozilla file context - fix wpa_supplicant spec- Fix role transition from unconfined_r to system_r when running rpm - Allow unconfined_domains to communicate with user dbus instances- Fixes for xguest- Let all uncofined domains communicate with dbus unconfined- Run rpm in system_r- Zero out customizable types- Fix definiton of admin_home_t- Fix munin file context- Allow cron to run unconfined apps- Modify default login to unconfined_u- Dontaudit dbus user client search of /root- Update to upstream- Fixes for polkit - Allow xserver to ptrace- Add polkit policy - Symplify userdom context, remove automatic per_role changes- Update to upstream - Allow httpd_sys_script_t to search users homedirs- Allow rpm_script to transition to unconfined_execmem_t- Remove user based home directory separation- Remove user specific crond_t- Merge with upstream - Allow xsever to read hwdata_t - Allow login programs to setkeycreate- Update to upstream- Update to upstream- Allow XServer to read /proc/self/cmdline - Fix unconfined cron jobs - Allow fetchmail to transition to procmail - Fixes for hald_mac - Allow system_mail to transition to exim - Allow tftpd to upload files - Allow xdm to manage unconfined_tmp - Allow udef to read alsa config - Fix xguest to be able to connect to sound port- Fixes for hald_mac - Treat unconfined_home_dir_t as a home dir - dontaudit rhgb writes to fonts and root- Fix dnsmasq - Allow rshd full login privs- Allow rshd to connect to ports > 1023- Fix vpn to bind to port 4500 - Allow ssh to create shm - Add Kismet policy- Allow rpm to chat with networkmanager- Fixes for ipsec and exim mail - Change default to unconfined user- Pass the UNK_PERMS param to makefile - Fix gdm location- Make alsa work- Fixes for consolekit and startx sessions- Dontaudit consoletype talking to unconfined_t- Remove homedir_template- Check asound.state- Fix exim policy- Allow tmpreadper to read man_t - Allow racoon to bind to all nodes - Fixes for finger print reader- Allow xdm to talk to input device (fingerprint reader) - Allow octave to run as java- Allow login programs to set ioctl on /proc- Allow nsswitch apps to read samba_var_t- Fix maxima- Eliminate rpm_t:fifo_file avcs - Fix dbus path for helper app- Fix service start stop terminal avc's- Allow also to search var_lib - New context for dbus launcher- Allow cupsd_config_t to read/write usb_device_t - Support for finger print reader, - Many fixes for clvmd - dbus starting networkmanager- Fix java and mono to run in xguest account- Fix to add xguest account when inititial install - Allow mono, java, wine to run in userdomains- Allow xserver to search devpts_t - Dontaudit ldconfig output to homedir- Remove hplip_etc_t change back to etc_t.- Allow cron to search nfs and samba homedirs- Allow NetworkManager to dbus chat with yum-updated- Allow xfs to bind to port 7100- Allow newalias/sendmail dac_override - Allow bind to bind to all udp ports- Turn off direct transition- Allow wine to run in system role- Fix java labeling- Define user_home_type as home_type- Allow sendmail to create etc_aliases_t- Allow login programs to read symlinks on homedirs- Update an readd modules- Cleanup spec file- Allow xserver to be started by unconfined process and talk to tty- Upgrade to upstream to grab postgressql changes- Add setransd for mls policy- Add ldconfig_cache_t- Allow sshd to write to proc_t for afs login- Allow xserver access to urand- allow dovecot to search mountpoints- Fix Makefile for building policy modules- Fix dhcpc startup of service- Fix dbus chat to not happen for xguest and guest users- Fix nagios cgi - allow squid to communicate with winbind- Fixes for ldconfig- Update from upstream- Add nasd support- Fix new usb devices and dmfm- Eliminate mount_ntfs_t policy, merge into mount_t- Allow xserver to write to ramfs mounted by rhgb- Add context for dbus machine id- Update with latest changes from upstream- Fix prelink to handle execmod- Add ntpd_key_t to handle secret data- Add anon_inodefs - Allow unpriv user exec pam_exec_t - Fix trigger- Allow cups to use generic usb - fix inetd to be able to run random apps (git)- Add proper contexts for rsyslogd- Fixes for xguest policy- Allow execution of gconf- Fix moilscanner update problem- Begin adding policy to separate setsebool from semanage - Fix xserver.if definition to not break sepolgen.if- Add new devices- Add brctl policy- Fix root login to include system_r- Allow prelink to read kernel sysctls- Default to user_u:system_r:unconfined_t- fix squid - Fix rpm running as uid- Fix syslog declaration- Allow avahi to access inotify - Remove a lot of bogus security_t:filesystem avcs- Remove ifdef strict policy from upstream- Remove ifdef strict to allow user_u to login- Fix for amands - Allow semanage to read pp files - Allow rhgb to read xdm_xserver_tmp- Allow kerberos servers to use ldap for backing store- allow alsactl to read kernel state- More fixes for alsactl - Transition from hal and modutils - Fixes for suspend resume. - insmod domtrans to alsactl - insmod writes to hal log- Allow unconfined_t to transition to NetworkManager_t - Fix netlabel policy- Update to latest from upstream- Update to latest from upstream- Update to latest from upstream- Allow pcscd_t to send itself signals-- Fixes for unix_update - Fix logwatch to be able to search all dirs- Upstream bumped the version- Allow consolekit to syslog - Allow ntfs to work with hal- Allow iptables to read etc_runtime_t- MLS Fixes- Fix path of /etc/lvm/cache directory - Fixes for alsactl and pppd_t - Fixes for consolekit- Allow insmod_t to mount kvmfs_t filesystems- Rwho policy - Fixes for consolekit- fixes for fusefs- Fix samba_net to allow it to view samba_var_t- Update to upstream- Fix Sonypic backlight - Allow snmp to look at squid_conf_t- Fixes for pyzor, cyrus, consoletype on everything installs- Fix hald_acl_t to be able to getattr/setattr on usb devices - Dontaudit write to unconfined_pipes for load_policy- Allow bluetooth to read inotifyfs- Fixes for samba domain controller. - Allow ConsoleKit to look at ttys- Fix interface call- Allow syslog-ng to read /var - Allow locate to getattr on all filesystems - nscd needs setcap- Update to upstream- Allow samba to run groupadd- Update to upstream- Allow mdadm to access generic scsi devices- Fix labeling on udev.tbl dirs- Fixes for logwatch- Add fusermount and mount_ntfs policy- Update to upstream - Allow saslauthd to use kerberos keytabs- Fixes for samba_var_t- Allow networkmanager to setpgid - Fixes for hal_acl_t- Remove disable_trans booleans - hald_acl_t needs to talk to nscd- Fix prelink to be able to manage usr dirs.- Allow insmod to launch init scripts- Remove setsebool policy- Fix handling of unlabled_t packets- More of my patches from upstream- Update to latest from upstream - Add fail2ban policy- Update to remove security_t:filesystem getattr problems- Policy for consolekit- Update to latest from upstream- Revert Nemiver change - Set sudo as a corecmd so prelink will work, remove sudoedit mapping, since this will not work, it does not transition. - Allow samba to execute useradd- Upgrade to the latest from upstream- Add sepolgen support - Add bugzilla policy- Fix file context for nemiver- Remove include sym link- Allow mozilla, evolution and thunderbird to read dev_random. Resolves: #227002 - Allow spamd to connect to smtp port Resolves: #227184 - Fixes to make ypxfr work Resolves: #227237- Fix ssh_agent to be marked as an executable - Allow Hal to rw sound device- Fix spamassisin so crond can update spam files - Fixes to allow kpasswd to work - Fixes for bluetooth- Remove some targeted diffs in file context file- Fix squid cachemgr labeling- Add ability to generate webadm_t policy - Lots of new interfaces for httpd - Allow sshd to login as unconfined_t- Continue fixing, additional user domains- Begin adding user confinement to targeted policy- Fixes for prelink, ktalkd, netlabel- Allow prelink when run from rpm to create tmp files Resolves: #221865 - Remove file_context for exportfs Resolves: #221181 - Allow spamassassin to create ~/.spamassissin Resolves: #203290 - Allow ssh access to the krb tickets - Allow sshd to change passwd - Stop newrole -l from working on non securetty Resolves: #200110 - Fixes to run prelink in MLS machine Resolves: #221233 - Allow spamassassin to read var_lib_t dir Resolves: #219234- fix mplayer to work under strict policy - Allow iptables to use nscd Resolves: #220794- Add gconf policy and make it work with strict- Many fixes for strict policy and by extension mls.- Fix to allow ftp to bind to ports > 1024 Resolves: #219349- Allow semanage to exec it self. Label genhomedircon as semanage_exec_t Resolves: #219421 - Allow sysadm_lpr_t to manage other print spool jobs Resolves: #220080- allow automount to setgid Resolves: #219999- Allow cron to polyinstatiate - Fix creation of boot flags Resolves: #207433- Fixes for irqbalance Resolves: #219606- Fix vixie-cron to work on mls Resolves: #207433Resolves: #218978- Allow initrc to create files in /var directories Resolves: #219227- More fixes for MLS Resolves: #181566- More Fixes polyinstatiation Resolves: #216184- More Fixes polyinstatiation - Fix handling of keyrings Resolves: #216184- Fix polyinstatiation - Fix pcscd handling of terminal Resolves: #218149 Resolves: #218350- More fixes for quota Resolves: #212957- ncsd needs to use avahi sockets Resolves: #217640 Resolves: #218014- Allow login programs to polyinstatiate homedirs Resolves: #216184 - Allow quotacheck to create database files Resolves: #212957- Dontaudit appending hal_var_lib files Resolves: #217452 Resolves: #217571 Resolves: #217611 Resolves: #217640 Resolves: #217725- Fix context for helix players file_context #216942- Fix load_policy to be able to mls_write_down so it can talk to the terminal- Fixes for hwclock, clamav, ftp- Move to upstream version which accepted my patches- Fixes for nvidia driver- Allow semanage to signal mcstrans- Update to upstream- Allow modstorage to edit /etc/fstab file- Fix for qemu, /dev/- Fix path to realplayer.bin- Allow xen to connect to xen port- Allow cups to search samba_etc_t directory - Allow xend_t to list auto_mountpoints- Allow xen to search automount- Fix spec of jre files- Fix unconfined access to shadow file- Allow xend to create files in xen_image_t directories- Fixes for /var/lib/hal- Remove ability for sysadm_t to look at audit.log- Fix rpc_port_types - Add aide policy for mls- Merge with upstream- Lots of fixes for ricci- Allow xen to read/write fixed devices with a boolean - Allow apache to search /var/log- Fix policygentool specfile problem. - Allow apache to send signals to it's logging helpers. - Resolves: rhbz#212731- Add perms for swat- Add perms for swat- Allow daemons to dump core files to /- Fixes for ricci- Allow mount.nfs to work- Allow ricci-modstorage to look at lvm_etc_t- Fixes for ricci using saslauthd- Allow mountpoint on home_dir_t and home_t- Update xen to read nfs files- Allow noxattrfs to associate with other noxattrfs- Allow hal to use power_device_t- Allow procemail to look at autofs_t - Allow xen_image_t to work as a fixed device- Refupdate from upstream- Add lots of fixes for mls cups- Lots of fixes for ricci- Fix number of cats- Update to upstream- More iSCSI changes for #209854- Test ISCSI fixes for #209854- allow semodule to rmdir selinux_config_t dir- Fix boot_runtime_t problem on ppc. Should not be creating these files.- Fix context mounts on reboot - Fix ccs creation of directory in /var/log- Update for tallylog- Allow xend to rewrite dhcp conf files - Allow mgetty sys_admin capability- Make xentapctrl work- Don't transition unconfined_t to bootloader_t - Fix label in /dev/xen/blktap- Patch for labeled networking- Fix crond handling for mls- Update to upstream- Remove bluetooth-helper transition - Add selinux_validate for semanage - Require new version of libsemanage- Fix prelink- Fix rhgb- Fix setrans handling on MLS and useradd- Support for fuse - fix vigr- Fix dovecot, amanda - Fix mls- Allow java execheap for itanium- Update with upstream- mls fixes- Update from upstream- More fixes for mls - Revert change on automount transition to mount- Fix cron jobs to run under the correct context- Fixes to make pppd work- Multiple policy fixes - Change max categories to 1023- Fix transition on mcstransd- Add /dev/em8300 defs- Upgrade to upstream- Fix ppp connections from network manager- Add tty access to all domains boolean - Fix gnome-pty-helper context for ia64- Fixed typealias of firstboot_rw_t- Fix location of xel log files - Fix handling of sysadm_r -> rpm_exec_t- Fixes for autofs, lp- Update from upstream- Fixup for test6- Update to upstream- Update to upstream- Fix suspend to disk problems- Lots of fixes for restarting daemons at the console.- Fix audit line - Fix requires line- Upgrade to upstream- Fix install problems- Allow setroubleshoot to getattr on all dirs to gather RPM data- Set /usr/lib/ia32el/ia32x_loader to unconfined_execmem_exec_t for ia32 platform - Fix spec for /dev/adsp- Fix xen tty devices- Fixes for setroubleshoot- Update to upstream- Fixes for stunnel and postgresql - Update from upstream- Update from upstream - More java fixes- Change allow_execstack to default to on, for RHEL5 Beta. This is required because of a Java compiler problem. Hope to turn off for next beta- Misc fixes- More fixes for strict policy- Quiet down anaconda audit messages- Fix setroubleshootd- Update to the latest from upstream- More fixes for xen- Fix anaconda transitions- yet more xen rules- more xen rules- Fixes for Samba- Fixes for xen- Allow setroubleshootd to send mail- Add nagios policy- fixes for setroubleshoot- Added Paul Howarth patch to only load policy packages shipped with this package - Allow pidof from initrc to ptrace higher level domains - Allow firstboot to communicate with hal via dbus- Add policy for /var/run/ldapi- Fix setroubleshoot policy- Fixes for mls use of ssh - named has a new conf file- Fixes to make setroubleshoot work- Cups needs to be able to read domain state off of printer client- add boolean to allow zebra to write config files- setroubleshootd fixes- Allow prelink to read bin_t symlink - allow xfs to read random devices - Change gfs to support xattr- Remove spamassassin_can_network boolean- Update to upstream - Fix lpr domain for mls- Add setroubleshoot policy- Turn off auditallow on setting booleans- Multiple fixes- Update to upstream- Update to upstream - Add new class for kernel key ring- Update to upstream- Update to upstream- Break out selinux-devel package- Add ibmasmfs- Fix policygentool gen_requires- Update from Upstream- Fix spec of realplay- Update to upstream- Fix semanage- Allow useradd to create_home_dir in MLS environment- Update from upstream- Update from upstream- Add oprofilefs- Fix for hplip and Picasus- Update to upstream- Update to upstream- fixes for spamd- fixes for java, openldap and webalizer- Xen fixes- Upgrade to upstream- allow hal to read boot_t files - Upgrade to upstream- allow hal to read boot_t files- Update from upstream- Fixes for amavis- Update from upstream- Allow auditctl to search all directories- Add acquire service for mono.- Turn off allow_execmem boolean - Allow ftp dac_override when allowed to access users homedirs- Clean up spec file - Transition from unconfined_t to prelink_t- Allow execution of cvs command- Update to upstream- Update to upstream- Fix libjvm spec- Update to upstream- Add xm policy - Fix policygentool- Update to upstream - Fix postun to only disable selinux on full removal of the packages- Allow mono to chat with unconfined- Allow procmail to sendmail - Allow nfs to share dosfs- Update to latest from upstream - Allow selinux-policy to be removed and kernel not to crash- Update to latest from upstream - Add James Antill patch for xen - Many fixes for pegasus- Add unconfined_mount_t - Allow privoxy to connect to httpd_cache - fix cups labeleing on /var/cache/cups- Update to latest from upstream- Update to latest from upstream - Allow mono and unconfined to talk to initrc_t dbus objects- Change libraries.fc to stop shlib_t form overriding texrel_shlib_t- Fix samba creating dirs in homedir - Fix NFS so its booleans would work- Allow secadm_t ability to relabel all files - Allow ftp to search xferlog_t directories - Allow mysql to communicate with ldap - Allow rsync to bind to rsync_port_t- Fixed mailman with Postfix #183928 - Allowed semanage to create file_context files. - Allowed amanda_t to access inetd_t TCP sockets and allowed amanda_recover_t to bind to reserved ports. #149030 - Don't allow devpts_t to be associated with tmp_t. - Allow hald_t to stat all mountpoints. - Added boolean samba_share_nfs to allow smbd_t full access to NFS mounts. - Make mount run in mount_t domain from unconfined_t to prevent mislabeling of /etc/mtab. - Changed the file_contexts to not have a regex before the first ^/[a-z]/ whenever possible, makes restorecon slightly faster. - Correct the label of /etc/named.caching-nameserver.conf - Now label /usr/src/kernels/.+/lib(/.*)? as usr_t instead of /usr/src(/.*)?/lib(/.*)? - I don't think we need anything else under /usr/src hit by this. - Granted xen access to /boot, allowed mounting on xend_var_lib_t, and allowed xenstored_t rw access to the xen device node.- More textrel_shlib_t file path fixes - Add ada support- Get auditctl working in MLS policy- Add mono dbus support - Lots of file_context fixes for textrel_shlib_t in FC5 - Turn off execmem auditallow since they are filling log files- Update to upstream- Allow automount and dbus to read cert files- Fix ftp policy - Fix secadm running of auditctl- Update to upstream- Update to upstream- Fix policyhelp- Fix pam_console handling of usb_device - dontaudit logwatch reading /mnt dir- Update to upstream- Get transition rules to create policy.20 at SystemHigh- Allow secadmin to shutdown system - Allow sendmail to exec newalias- MLS Fixes dmidecode needs mls_file_read_up - add ypxfr_t - run init needs access to nscd - udev needs setuid - another xen log file - Dontaudit mount getattr proc_kcore_t- fix buildroot usage (#185391)- Get rid of mount/fsdisk scan of /dev messages - Additional fixes for suspend/resume- Fake make to rebuild enableaudit.pp- Get xen networking running.- Fixes for Xen - enableaudit should not be the same as base.pp - Allow ps to work for all process- more xen policy fixups- more xen fixage (#184393)- Fix blkid specification - Allow postfix to execute mailman_que- Blkid changes - Allow udev access to usb_device_t - Fix post script to create targeted policy config file- Allow lvm tools to create drevice dir- Add Xen support- Fixes for cups - Make cryptosetup work with hal- Load Policy needs translock- Fix cups html interface- Add hal changes suggested by Jeremy - add policyhelp to point at policy html pages- Additional fixes for nvidia and cups- Update to upstream - Merged my latest fixes - Fix cups policy to handle unix domain sockets- NSCD socket is in nscd_var_run_t needs to be able to search dir- Fixes Apache interface file- Fixes for new version of cups- Turn off polyinstatiate util after FC5- Fix problem with privoxy talking to Tor- Turn on polyinstatiation- Don't transition from unconfined_t to fsadm_t- Fix policy update model.- Update to upstream- Fix load_policy to work on MLS - Fix cron_rw_system_pipes for postfix_postdrop_t - Allow audotmount to run showmount- Fix swapon - allow httpd_sys_script_t to be entered via a shell - Allow httpd_sys_script_t to read eventpolfs- Update from upstream- allow cron to read apache files- Fix vpnc policy to work from NetworkManager- Update to upstream - Fix semoudle polcy- Update to upstream - fix sysconfig/selinux link- Add router port for zebra - Add imaze port for spamd - Fixes for amanda and java- Fix bluetooth handling of usb devices - Fix spamd reading of ~/ - fix nvidia spec- Update to upsteam- Add users_extra files- Update to upstream- Add semodule policy- Update from upstream- Fix for spamd to use razor port- Fixes for mcs - Turn on mount and fsadm for unconfined_t- Fixes for the -devel package- Fix for spamd to use ldap- Update to upstream- Update to upstream - Fix rhgb, and other Xorg startups- Update to upstream- Separate out role of secadm for mls- Add inotifyfs handling- Update to upstream - Put back in changes for pup/zen- Many changes for MLS - Turn on strict policy- Update to upstream- Update to upstream - Fixes for booting and logging in on MLS machine- Update to upstream - Turn off execheap execstack for unconfined users - Add mono/wine policy to allow execheap and execstack for them - Add execheap for Xdm policy- Update to upstream - Fixes to fetchmail,- Update to upstream- Fix for procmail/spamassasin - Update to upstream - Add rules to allow rpcd to work with unlabeled_networks.- Update to upstream - Fix ftp Man page- Update to upstream- fix pup transitions (#177262) - fix xen disks (#177599)- Update to upstream- More Fixes for hal and readahead- Fixes for hal and readahead- Update to upstream - Apply- Add wine and fix hal problems- Handle new location of hal scripts- Allow su to read /etc/mtab- Update to upstream- Fix "libsemanage.parse_module_headers: Data did not represent a module." problem- Allow load_policy to read /etc/mtab- Fix dovecot to allow dovecot_auth to look at /tmp- Allow restorecon to read unlabeled_t directories in order to fix labeling.- Add Logwatch policy- Fix /dev/ub[a-z] file context- Fix library specification - Give kudzu execmem privs- Fix hostname in targeted policy- Fix passwd command on mls- Lots of fixes to make mls policy work- Add dri libs to textrel_shlib_t - Add system_r role for java - Add unconfined_exec_t for vncserver - Allow slapd to use kerberos- Add man pages- Add enableaudit.pp- Fix mls policy- Update mls file from old version- Add sids back in - Rebuild with update checkpolicy- Fixes to allow automount to use portmap - Fixes to start kernel in s0-s15:c0.c255- Add java unconfined/execmem policy- Add file context for /var/cvs - Dontaudit webalizer search of homedir- Update from upstream- Clean up spec - range_transition crond to SystemHigh- Fixes for hal - Update to upstream- Turn back on execmem since we need it for java, firefox, ooffice - Allow gpm to stream socket to itself- fix requirements to be on the actual packages so that policy can get created properly at install time- Allow unconfined_t to execmod texrel_shlib_t- Update to upstream - Turn off allow_execmem and allow_execmod booleans - Add tcpd and automount policies- Add two new httpd booleans, turned off by default * httpd_can_network_relay * httpd_can_network_connect_db- Add ghost for policy.20- Update to upstream - Turn off boolean allow_execstack- Change setrans-mls to use new libsetrans - Add default_context rule for xdm- Change Requires to PreReg for requiring of policycoreutils on install- New upstream releaseAdd xdm policyUpdate from upstreamUpdate from upstreamUpdate from upstream- Also trigger to rebuild policy for versions up to 2.0.7.- No longer installing policy.20 file, anaconda handles the building of the app.- Fixes for dovecot and saslauthd- Cleanup pegasus and named - Fix spec file - Fix up passwd changing applications-Update to latest from upstream- Add rules for pegasus and avahi- Start building MLS Policy- Update to upstream- Turn on bash- Initial version/bin/sh/bin/shselinux-policy-mls-sources                                                                                                                                                                                                                                                                                                                          a b m i c d f q    r e h n j g s t x v y w u p o k { | } ~ z   H                                                                                                                                    `             ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _3.9.16-52.fc153.9.16-52.fc153.9.16-52.fc152mlscontextscustomizable_typesdbus_contextsdefault_contextsdefault_typefailsafe_contextfilesfile_contextsfile_contexts.homedirsfile_contexts.subsmediainitrc_contextremovable_contextsecuretty_typessepgsql_contextsuserhelper_contextusersguest_urootstaff_uunconfined_uuser_uxguest_uvirtual_domain_contextvirtual_image_contextx_contextsmodulesactivesemanage.read.LOCKsemanage.trans.LOCKpolicypolicy.24setrans.confseusersmlsaccountsd.pp.bz2acct.pp.bz2ada.pp.bz2afs.pp.bz2aide.pp.bz2aisexec.pp.bz2alsa.pp.bz2amanda.pp.bz2amavis.pp.bz2amtu.pp.bz2anaconda.pp.bz2apache.pp.bz2apcupsd.pp.bz2apm.pp.bz2application.pp.bz2arpwatch.pp.bz2audioentropy.pp.bz2auditadm.pp.bz2authlogin.pp.bz2automount.pp.bz2avahi.pp.bz2awstats.pp.bz2base.pp.bz2bind.pp.bz2bitlbee.pp.bz2bluetooth.pp.bz2boinc.pp.bz2bootloader.pp.bz2brctl.pp.bz2bugzilla.pp.bz2cachefilesd.pp.bz2calamaris.pp.bz2canna.pp.bz2ccs.pp.bz2cdrecord.pp.bz2certmaster.pp.bz2certmonger.pp.bz2certwatch.pp.bz2cgroup.pp.bz2chrome.pp.bz2chronyd.pp.bz2cipe.pp.bz2clamav.pp.bz2clock.pp.bz2clogd.pp.bz2cmirrord.pp.bz2colord.pp.bz2comsat.pp.bz2consolekit.pp.bz2consoletype.pp.bz2corosync.pp.bz2courier.pp.bz2cpucontrol.pp.bz2cpufreqselector.pp.bz2cron.pp.bz2cups.pp.bz2cvs.pp.bz2cyphesis.pp.bz2cyrus.pp.bz2daemontools.pp.bz2dbadm.pp.bz2dbskk.pp.bz2dbus.pp.bz2dcc.pp.bz2devicekit.pp.bz2dhcp.pp.bz2dictd.pp.bz2dmesg.pp.bz2dmidecode.pp.bz2dnsmasq.pp.bz2dovecot.pp.bz2exim.pp.bz2fail2ban.pp.bz2fetchmail.pp.bz2finger.pp.bz2firewallgui.pp.bz2firstboot.pp.bz2fprintd.pp.bz2fstools.pp.bz2ftp.pp.bz2games.pp.bz2getty.pp.bz2git.pp.bz2gitosis.pp.bz2gnome.pp.bz2gnomeclock.pp.bz2gpg.pp.bz2gpm.pp.bz2gpsd.pp.bz2guest.pp.bz2hal.pp.bz2hostname.pp.bz2hotplug.pp.bz2howl.pp.bz2inetd.pp.bz2init.pp.bz2inn.pp.bz2ipsec.pp.bz2iptables.pp.bz2irc.pp.bz2irqbalance.pp.bz2iscsi.pp.bz2jabber.pp.bz2java.pp.bz2kdump.pp.bz2kdumpgui.pp.bz2kerberos.pp.bz2kerneloops.pp.bz2kismet.pp.bz2ksmtuned.pp.bz2ktalk.pp.bz2kudzu.pp.bz2ldap.pp.bz2libraries.pp.bz2lircd.pp.bz2loadkeys.pp.bz2locallogin.pp.bz2lockdev.pp.bz2logadm.pp.bz2logging.pp.bz2logrotate.pp.bz2logwatch.pp.bz2lpd.pp.bz2lvm.pp.bz2mailman.pp.bz2matahari.pp.bz2mcelog.pp.bz2memcached.pp.bz2milter.pp.bz2miscfiles.pp.bz2modemmanager.pp.bz2modules.lstmodutils.pp.bz2mojomojo.pp.bz2mono.pp.bz2mount.pp.bz2mozilla.pp.bz2mplayer.pp.bz2mrtg.pp.bz2mta.pp.bz2munin.pp.bz2mysql.pp.bz2nagios.pp.bz2namespace.pp.bz2ncftool.pp.bz2netlabel.pp.bz2netutils.pp.bz2networkmanager.pp.bz2nis.pp.bz2nscd.pp.bz2nslcd.pp.bz2nsplugin.pp.bz2ntop.pp.bz2ntp.pp.bz2nx.pp.bz2oddjob.pp.bz2openct.pp.bz2openoffice.pp.bz2openvpn.pp.bz2pads.pp.bz2pcmcia.pp.bz2pcscd.pp.bz2pegasus.pp.bz2pingd.pp.bz2piranha.pp.bz2plymouthd.pp.bz2podsleuth.pp.bz2policykit.pp.bz2portmap.pp.bz2portreserve.pp.bz2postfix.pp.bz2postgresql.pp.bz2postgrey.pp.bz2ppp.pp.bz2prelink.pp.bz2prelude.pp.bz2privoxy.pp.bz2procmail.pp.bz2psad.pp.bz2ptchown.pp.bz2publicfile.pp.bz2pulseaudio.pp.bz2qemu.pp.bz2qmail.pp.bz2qpidd.pp.bz2quota.pp.bz2radius.pp.bz2radvd.pp.bz2raid.pp.bz2rdisc.pp.bz2readahead.pp.bz2remotelogin.pp.bz2rgmanager.pp.bz2rhcs.pp.bz2rhgb.pp.bz2ricci.pp.bz2rlogin.pp.bz2roundup.pp.bz2rpc.pp.bz2rpcbind.pp.bz2rpm.pp.bz2rshd.pp.bz2rsync.pp.bz2rtkit.pp.bz2rwho.pp.bz2samba.pp.bz2sambagui.pp.bz2sandbox.pp.bz2sasl.pp.bz2screen.pp.bz2secadm.pp.bz2selinuxutil.pp.bz2sendmail.pp.bz2setrans.pp.bz2setroubleshoot.pp.bz2seunshare.pp.bz2shorewall.pp.bz2shutdown.pp.bz2slocate.pp.bz2smartmon.pp.bz2snmp.pp.bz2snort.pp.bz2sosreport.pp.bz2soundserver.pp.bz2spamassassin.pp.bz2squid.pp.bz2ssh.pp.bz2sssd.pp.bz2staff.pp.bz2storage.pp.bz2stunnel.pp.bz2su.pp.bz2sudo.pp.bz2sysadm.pp.bz2sysnetwork.pp.bz2sysstat.pp.bz2systemd.pp.bz2tcpd.pp.bz2tcsd.pp.bz2telepathy.pp.bz2telnet.pp.bz2tftp.pp.bz2tgtd.pp.bz2tmpreaper.pp.bz2tor.pp.bz2tuned.pp.bz2tvtime.pp.bz2tzdata.pp.bz2udev.pp.bz2ulogd.pp.bz2uml.pp.bz2unlabelednet.pp.bz2unprivuser.pp.bz2updfstab.pp.bz2usbmodules.pp.bz2userdomain.pp.bz2userhelper.pp.bz2usermanage.pp.bz2usernetctl.pp.bz2uucp.pp.bz2vbetool.pp.bz2virt.pp.bz2vmware.pp.bz2vpn.pp.bz2w3c.pp.bz2webadm.pp.bz2webalizer.pp.bz2wine.pp.bz2wireshark.pp.bz2wm.pp.bz2xen.pp.bz2xfs.pp.bz2xguest.pp.bz2xserver.pp.bz2zabbix.pp.bz2zebra.pp.bz2zosremote.pp.bz2/etc/selinux//etc/selinux/mls//etc/selinux/mls/contexts//etc/selinux/mls/contexts/files//etc/selinux/mls/contexts/users//etc/selinux/mls/modules//etc/selinux/mls/policy//usr/share/selinux//usr/share/selinux/mls/-O2drpmnoarch-redhat-linux-gnuASCII textASCII text, with very long lines, with no line terminatorsHTML document, ASCII textdirectoryemptyexported SGML document, ASCII textxz2?7zXZ !PH6y]"k%QkhuLq PţQ~z,g=yz85IfɀZ..PNApI=E~(]#,7+f#y|r(ꎏ0g$SSbNLX@c#1K*ȟ q& x 8l:cSZmolSzJ'CDVu7+ڌ1eԌ=ȞbḰs7AY B!iYW[Xo\N\ tᴑ/!U{5C 1qӏ-<]r΂sW(x ;뜀c$n6`(zY9ZcˮlrFTra*2>I5ZBZ%9"EOѠz$?l"ސSk0U WMrʒRPh>4u bcu@C{b 0?9Ȋf b[MZCQF,EggB_8պrNҗf|uͯ+(\t w4˻J6 9%dkhCީH ,M<~9=U w3f֜ބݐ7\OyȨ,^Pcm,գ/X˿7kPGq-hH>J)K"`|ю7-N(\k7T#Y.Yve0nD05i|tHx ]  Nx0Ѥlj~:ټsʊS7 \Z YvϟO2d0j朴mDpzCP=B9ȵC oZK5{7~.BA:L(+}ܾ4LGR?9;1݁6K̡p~~q܍W~%n.[?h[3lI:. k cү )TY /F;^glWy^:/vH]7/ͼK٭Nfpq3q+ʎY>V]b~{յIH|43\+\{m(HQ^)ѿ9|Jt0ß*3كOG$G&hc.1\ l|q%l}Z}d\Ỷp~/>_?`!^AF`fUCVĴaluKw²rN`,-pOP4`8<bc_c)@F[Zؔ"Zt&A([ng0b[0f ]eOOP&w1__agUX䷹flgл^ŝ=7_|Qٝi[c-STټOPwV'DKw@w1l3Tу>iGIU諡UH<щ-TQf~E߅Ekv4bYuM(YQ &c5QuI'T3ȕm=s,uM{Qʍμim$~3DB0:qB;,Gnzs\KӤiQ8_\1NpJO~!A }ܻf.ɳAQwRTp탵&D~ l6q봅Dde3:!Jtnu!57w<}9޲]<؄nL3zA54ɻy+bR5KB >upߧ *noO\!(g/9oC ًH_,ʹƅ !QLs#SꃨTwngU뉖L1B5epvv!)`=R.`*fM\Cy^@1*nrm4Ge/=Bb<*MESd&fz\zeTTI}_[Stn;̣&i@e`;ЦufN #8>2AX.>Jϖ:s@,"qbҧ7bwE4ҙe;GaؐX[q$&Kp[ 8_4*KRZ | 2bGmo >@Y%ՀpSO ^$\~ W-5ӓOjb>G"%^mR$4ԂwJt}9nSW1a9$-x󍌢{;i9_ apgEת2dLɍ3N?!݈-_ 'J0[NBc\mSg*Y$ P#R8O{TC2Yϒr?+.ᓭDpT~ċ3/bZtr'T"@әmV04T8nTī`D!? vXPl-|.9"gcWMvv5\&`mPYt=ymy&Fe]7`j={|r1[ Mf~Shx%Ck橾f)J+޾$R!ܥʕ`Džg0D&"촁J߶{c_rZ_݂z?"WoJlby<늇h>vKof]HVFL `5?FTTmʍL1en}vy-ޝ܁r5ғ| Ʊ,}X@ ρěA5nPl&(Cx%W0w'܎)lv9$V*S p6BemԖ`۱?`0j(DФ{{J{w=zf8@|/﯐K"5Lft} '0&\&X)KwmJ~dqNTT;wW1*=*7Zp1͠J G2k InX(15A_Sg m{/p-s] k{%T܏a(Ίj]ϳ>tXGr@-N׺ # E_籭4uj8`8f*\doLWf2?']FJՉvܭPnNamh?w-A `|o_| AXܚ-Qp\KerTBaj BqIM'"풇;]ɫn5zZ!TFu[TąE*b oXzCpi @yeJU;z0ئct[mNp位I>aj?|ʖ@\6 ̾ll]6>W8õX얮mkQCd-byxvXܹ`AMaʠ@#%Л{=4ڊZneY >\#+92&(:ҏsӀ"j^fVS˳WV5*TP4w̔{|z^J }`:j$I~m.鎔_uωRaJm/b2i8RQ( SocW6J\lƒI Ç- >4 )F*tUFϳI£4иFQB7R^?ztquU̐ͿB9e ¯gՅUĞQ{; /7Y"+l\ 6D=˂r6֗_,)H*t%%#AvasѢ4غi, DCjF==!`7$SU<*tU㜻4T@5i;B&K"'@u?Jv N驻6ch\"{YitBxI2}W19Do l0x@69ÝВ \HEt^Jr8XN^y(o0dO0Ν3muʊhE ib<#]v!?m͸ADRXU_C+j×t3w`ٷRD2<Ԣ͖|E^\vye@M84R*'-n2 FX YɹgM eD[>yﱞ=uXvkhPt) 62?.Ή I)DcU^ofh'R;CeAr_&ᬇ-h= {k}`}.[̎ގ`e]N;(CSC5Zs+fR#оK{o'PcvP +2x ^Pqu7 ?% ;wq3zl'}ƻ4'+KGNJѰU,%ZY{nuEah9Gk(Y[ʬ`b]2`{DUx4, 5&сDaggLOц .Bڸ5]e( o1 _`Ü A~'n(AR4 h؝AszvdZU\)7q#FT0zyj38^BΑ-::g ߅\zE "vӏy rb3#dΩ'̏Z 9.ⲐvAXc=в e]K/ڋ2zxnCИ>L 3@ tmhUmʇ]'ȆeY'}ҵ-׫c?v$i2JsWX-|хb5238yԂL+)$nǗ@GXgc`:'[" ƞru)U>uJS zXsMb67koV.uCxeTTo7(2$W{20NJP\8LsGQq♟cbbD%GJp懡jr(;X@*2&| q} Q3ߍ}<3%vg}OLVC C^>,RX 8bsL7sm%oE<@za5ΜhY&.niruG-(<~R͟둌yؿ&Ҳ|++92Bq@MV\h ] qgޑ(7_F}ȳ4S./_w $/HfJTRwJ^TedVxmDk(?_qհmG/tH WDWa&P =ɴ;J/ ºU80Fxd򯾙u;nU?p <~<Ӊ\hW 4Z#,'fI'8i L;մ.҆rI2ۿu[&LA0q-UIŐa 0\Yin#np,U/*A,3R%r~JCsh` SSI*+ 64m;0v>occw'uk Vߔr7$1y@ ;0S32s %KeTK#P^|ybLjy"!Dĵ8`Po7fo+u= }5QB]yI8μ.pt%f>VH҂cC4Qw>}En!v5\bDKᱢoGV`r =KbU /#[(oLnw-ع98+i~'~j^d.ܜ j7L?qCuH?:ULmg-uܯٷlC}s+ǧsV[ցV5CtE Ix"lVujĠ&M sv_YD~;]*h|k.,;"җo@J`c2˩B՜Ѷ4j6)pQ8S<+r@;'fduEa~i/)x-+(&" =`<3HeyaXjtd;Nڝ!XMg!^d*V<'z$qS61SStd IQjPG&4K[X!2Eިbgm;4űinw}yȈ3n_8lm<*^œd}hhA6\9ͬMqWCUj>y uF@SI=iA!5J1e3= q)LcUQ@h֚mX$9A ?o:[vg1IDU4vEf1}"X|}s^:G//F~VeSqIF\:䠕nȷ$w2AʶLн y7og XxH8R6D+6^Ӓ:7U"ʹ3-]jJ R $PD6va|2W*5-{4͏^HmYXC_{fcf`婗zf eiP>ҵ[nnF8.CUƾHG`ir0spDؘ½ɪx:@tpPi8Ieҵ& ƪjv HGxF gc& Xdw078͘F(^%r][7^{ !7Å_j S"pZ'c %l@1-%GRDb- 1 !qd;En=y<*Ǖ9Y̹8{QD/qf"^6={LA-$åe`EKU"B甮̔H @Ua_[,/"BK 8 {V ~Mw{/򩌞yM@Rw<נrsJ`n'B9ܨ"d\˱oZ .#P9`h- YةJ6XD x2I31P3- ZMpX S\yi[u$MLwwԬMj gBaۅoNO.B9 7\8:[K[ WbIVp=|)QCf6 :˂a&TqLj79bP]9Yy#۳( i*Q9=u`&Ul>T^u!hξ1-erNgU`^9H%}4za;"y.Ce12 ?,z6+֛K?ՍK%Ly Ib`@恕vb&JXѾ[^3aQǭW<{=Ci,W!E5+aok$!K7 PII D83Ui@>u8Puu[DGFwhxHzC¶6w\1VǷHIcEr4iքZt'xtdT)-ЪZ_l%Px߷ew&'bpz-jVlLwGcN/!շx? "Dc7TՋŦ[\jsHǥly8dH<:&0Jm,:zfmkKm(/p\ HѼڒIaNbP\?&f{GxrkA1MFC$,G}1Ǒ^M"'Lۂ9rt67Do1zK|ݴ2+ i;䴬'?Z=iw,K:bLg= TRZ:C.)Ӻ5Wn_x%1֗[D.o.jhr%+yڇnQًu:. 8lHEѷt N=@e{N ׍LrQ,m?}GW#0Ƽo$cAexooZxŠXǏkǫA073"p8^G0(Hg%cgzp%vCWë\h>~HO@ƱmzSR_aD\nSڋ)iAB1L.kZH \{9򌳗o<"BD>熡I+ \-æa (&g8>.vr8O!e1>~Ol8j); }5LІY2 XYP8LqPx O̙Ϩ=``:+L> 39*t'׮7剨t je46Isl|*&x]nJ+l4BSo#Rj_ F p:ؠ}e=ցٸ`ϤSgqiG=f<|)~C]wMsa|HecDV_=;92 k"gI9=(}t{|◽KS Jr6w#4YɇS=?WgޕJx>%3-ڊMT[h3Xh<9 K 8$ O0(܁M|ܰC!'x^A8%ҕQɾ {~$>c#,Ӕ#C]1?AB52btA\x>1`AJt.ԃkQgCT}G;JAXJ`sm/9ffAڸ E0T| sn8.{֝Y?HĬѶׁcD;?SFBZ|=V1~iWiތLMV?"q l=@uxMxLĒױM1]>)Q-I;>5NXfd+ '(3UI| 羰pGFhw!D+Y~,8>2c]vuW#tqi[ 1)fah&385 )Hh^9}(Wm{~b%x!ZyҶ .ˌLG{ Ɵ˾6vLH*ʝ,_E` N67$"+ 犾ol0@yN^P%oљT5iAC{tmb Xe~zN_>ħT1 *>r)6aQ4}!%d Kkda%AhK(E66?9x)9`2{s˟礽g^?mtjB Jh ^]ﶃ\4wWl_ KvS cg,ay&{u-z//QbsȷD) 2EdR'81;yhhBN6Cz+z5-kAM"w>>cA{f>9f(* }a(w| !2\D6?3LխOkn1Skh5[%36̺.wGP%X*ipc5e4w3}N;@.g(C+)rpweC\,%KXU}6//@M 3%L({5lh^(>m v.N@f3O1 ZU6:bwJD#Տ勠T:y=wlqu5Q˄@6&@͛㡆E]$nJ@<]\ VR`l5)[jߨ *"A}Z?A޸5kQ&8К="1XGe孆EUHoAtOZcM}Jȩ˸jCeoJp+/}`h/n.K=8 C8l#N\,{:0<[} ȹYI_scu^)7z-79 (j Cv-~yB}%%r:">SINj_xPGij}- fmB_)xc{e)q4r@ Q/1(![D΅:(]:fcntSjd͍|ǒk-"GMz~BiAZ wp/Ȝp32k'EFeO̊UCG3%!V֦Gu (?4ڨx> hQelD>#;eoC LЂewz+K 9dފO_wשkƮU"/ЇFGyPm=DD.Wx ;lNNO܄6bhծ+"mÌ[ej>u0pS5 xnָF C%] 8Fl L>jq.#$X9K 1 `4$Ӧ;N7yUZpylC7K/\Բ"0ߨ[bߝE ^6,ufOT\F!,ȭ6|[b~ 8w3P!x%\2Z>(3dl=-_`؎m)]ތj򟂸<T(~Em>УzXf vT-'L//~Bjx=3zإr7!Rn(|Vo!diD -jpwtxc-|n "z_UI9mcssrdO^%%ȉ űpK隵ʥH&5~fnF(H=.19Ń6REfLTj?Nu_$5dWzRFuyu`UZؗ'2ܽ>/ zyʎDFuf=j \W]c+jŲ7vv6"`Vظzөxʃ)g*elJEY<_xL2{x #,H9]B( 3.g",.}u# Hϙ:3{.QMq&+P>ӫ 5%czXqrbd_$54 s$6a01]="dm"&7U2bwW`rd.i?tS@0RRVg$#{%h!~!Zڊ& N~h!~l/k1C-v3&7eQ(Ԫ{yk;mp"Oj aS2Q9PlF*\qFeBRH px*('<+Y}u4a#w1ljRD[cYDhm5vr!H[S Vzݐh\dWuUu&.ј=Ѫ} ЎFHyrw~ԛsLO % Bǭ6!~*}#sF5YM}''u,-L΃#~}ԭ*Bh9oU;:VdT>1[k'Ҩ98uVV2|dK;(l#x*0ss퍸3ς d +q 5x0bR$P Y1+! sDDx ݡ_) &gFn8Mi%*'iG5<_L]{D4&ln1^qK@ Fc=x!iQ3*7x9͝>vdQ;m8#(&H(KH≾H&/gU*UBFOѓjI%o}0m{m /X)vD D`,8)&$犗E.yAOjG@ Ǚ[\in M4ݷƹ#.ՊC.Vϲz&?`͋Ćwh{[~Ax&͎O((7[qX >0MPA< k{;cS#t$ R8B!_p30iMvyh4;oE¸!HL6; #"t9E9lvI[~KHt3%Z( W*h#䟒⸱K ΌܶQ5iUî Ӏ]=; b@LPb!WBwDvuRZym'_x_eb)[ {jߴ* q^4* ޻CǗ6ЄQ@;}ηb•5d{ӈEE"@̦ S.bv"ؒ:\ZC*1@. *ʺe&<7%WP6W1A䖽s@š^`eg`&a$wҩ;W(d *~Rc u5F'f^5W[' ;l 7ɼldUD1*≠ [7"Fd3! 6zx<9.G?,dv=UN_>wwhY&*LHDEokH:x?럙HMBnO-42!gLtψv1Ul+Dv/[e=p3}FS,XNԴH=MΗ&`SM?a"׷h6V^͌fimzrSy־Ռ_ݽ#QuDo [NrްBN͔cZU< 4 ^Ffn-xPHA<LƦ"v)x2PjFZ?BUYlwz@b-쪆uITTlNW"Ÿr nJ8NB)M`;n|D(cWN+HȥP{4$ tҽbQOq Yfy= u>~X|J~^BS\Tr}3;kiѦmn{tb׵7&]d*D`ayxCMW\m <_sE>Шt󉂅TRvcv2W;o{M53wfe`7-.=r.=քP ޙ  /p]pEU`[D) )Y;Ps2R $<FЯ^xġ*MsoN 6x^kˉ'|uw4>LS؀3MGնC|?Blw5 \'(!4 )iXQܒul}d1pt{R@M+ݏ8mmdQ ?:)I^Bi/דȡkV}Qٔ&Jo܈qӍTU96 #ႂOGd>%((Ce)!QS&YxȕEax ^v PS7C|ճ[KX"-1UЖNF k790r > En IFW_Ա>b6ׅk' JK`DŽ~VbJOOp3XFI٭~h3h1r msbEŎJ+42u[`@oBT ,X]S G>IB7QmIUYeO7{82CL+O>[g*vtB-gN#f9Z֨s-"p:}xXkQ# l̢L|V񆒄}Ņ|N{–XQ`)_O2 U}pIT\ꁅ HJѕi4Қo N/$j?8 L覈",'W +G,ibV=!;n'FuK!;Kn7&_ːy<a?t].; l]ĊZG])v{bX {/I qJ {'.n:Ehck8v|*KQCvNcEnc+>S.0C'+Z|&ldDhܓĊ h kgBK"~(T<(#Ҫ6~cryD]O\ a6C3c ^DS 'dbɋ% G%XJ}]&5=wSًT܏7xFG,6r% )*n;)3$tzNb1po+DE9Ns`F~ᣏ@.۴f&A{\_Ѕ 5!#HW@ۘٷŸ pscC 42 2]Wo /Z]dGl88 g0HР,lԍp6ʩ{?NHщ0ҳR)hSJ?ޟka:'OzΠ=]ndl iO'XtԨZ'As9UDv]\HwTO~.d`kZ!g*m_q Ձ&/(,\DZMuA OW\JLaLZ0ɽP ^GbS#"6glwoCDa LNێ@J4"iQ٢ Tb/{Ĺ[p W&rrG2Gf)aG^#=qo*~C z7"'0j@^Iq笁ѵOR.5Aڭ?or<1`tpnWF!Ȥ/Zd lwj;,Cᄞʵ f@;}KRd 1^"(#"BG;5KtL17ʷ#'MXXι)nZ[(Dk=Fhz>q>BZVl Tu z]bg$>1U3iJ>rHC]\om:k>f(F\P;g|4pAдF[|Xd_7PEwscT: 2:4p)x@y̾BT kւd5a=F2渄5tHh V{N^: j߶M'\&!;ZGubz*Z"í-\dj䮅B"N0iz&Ic;;y9xخ$>ޭYk9S`1h^燐^ :E{+8d N;,|cc#IH #uڄ(5Դ׷%l;}fsmri"lѵlڅ(ed$m\w1I@ٹWX}xDJY #[KEx& L.AnG[quVd5)ad^A`֋\~1$Db)x=h;M"+pI=y #K;"c> f]z!`.Ay`#vQ{tE5(d!FhZB칈_o6HCD 0P-1rV@q뿥L9H3[vÆoei/([3EO3;ޕ6=GWYM(Up\X^&դډ7p]QWO^*%5,Y?q4Qa=L `Ы#0[ f>A̦oR Tfv2&ԁbWnz L>tm3 T|?Q'V1'9]rC ::%!QIһkOw0RODhAb1jRvJ]F?R9 =M"ۉ e?"m?a@6v0 @Gױ.5 R%@]69ɷC=^mN@ Gl5[&!3}O4 u9J$֋ƓtXfcueϊEJ 7?˞7E+:Le5=4gn./}ۑDaA .ҩR4k8Vz"3 <%Ln`gSz*Xe+§TVi2P潹dx@~Gd\ϩkN I>:} ٞr쁓O׭lQMd5>}F33V$nk8.RB<&j duqA܆>?!kE,jUF9h?8, ov؜jC|88d6歾xB! oK?ts7>QZp,g"'trWu.mL_THՇcB'êcp0P~M۝Bmc>hH ۶]̆GV:@%8Mλ6V{4(hòVAU:u͖j>@f\=X;+=p]@,xsY jI ށc&o13n+񄿭qt|eoQW]RaE;xkfM3k~k&.21g2*kT9h%,t|$%,>Dk|L@ Rv mxyFx[4. lſn]$3#Xj})"C,fm7t.R/z5`.{(s5oX1ĤȎS|'7ik7Ta7C]߾oym!TaB%Ham*WHea `87; {`TFc:{y,+@<1 {)\]ځT;Dœ*{i?:zhfI50Bؓ)YJrKHx<Ў9;PօD,z=V|xDvi11nl$LbD{,X=r&Wp_@bB;YϏ=BJ7zndρ;T,.sqꐫu%88d8>2C̟S7= \:P"D-rD;7 zse57uF.̇q@c Vgx^m)3Qd`%١;&y5~Q7hwA҇^L:4  Kal2g%%)P">DaR&yqopz8=D@]++ئ^BM~=ɒ -uYeMnhDP eG rWm(aRL6IdyΠ@@BXsPkL;OP-,~w m<'oD ~SHb)xh\heJ$䘅Ɲa~xs(=I%h߁ 8si]//ףԳA0ԺVZZl#0X7 xS@5AKxv8 Ħw`{66Lp פlä\ᄁO,TZO e_#qbBϊ_Dž n5?.xPbk5Bp\|3I1f7'r4l ~՚Vez[~gz0i3 5L ]:Y,e!KDLOӥR6Br?L?Z@tTUp8=O Wf#Ֆ>amQ37$V pnD) 8^~&i"+q1Y38<n QI}Y7ƅ+ZD6v~}@yңOITZW`y.yHL{%4Pςw'wkKt `t&s!ZeNEw7) F7F>Ҩ :ULԞ}Fp "?,ġ߯ /*sD$lH_gȭ9((1I{"^ F! ǗדJMgГ]FN`pԸUPT֢# h@h^qõ U{-\ef*NQR9 eK~mP3(T^Gojooy=be1`$ EoQ,#yb)!&+RIl/~cםcNTي=E"cQ(32E#Tãf˷#`WWQ> ~+0IY$8dւ_byуK%*l>8b=Xn.;#DV{u؃VGrV@C[*hhxצM{>$l.+fhA?Y qPE>i%'W 7Hmiw&ȶ>z O \a{C4g TormHA8ufv ,]Iefuש l?'[T>8v?7Q$0g(VN^ H& Y_TF>iNJWܓ`hZZg>kpC2}rBlLAjռE TcJ>T$C B;Dx}Ζ(Q]x (01-`9pȽw`i`V@;j"u.ia( puśo4B. Q+Ar&s9aWvO{F"Gk VkU* _4~on(bµሚ݊.ZTDq qA7å_܈6+M6eD;Pd;s6ŪlܠE<sQЈ"7GrQ穩 έ~z6I.%Ӕ-qMTJMfEӛYF>e4; X:n%""ga,2{ZfzT}L*=ffraO" pyN b3Ǻv#N*v0 + @#:?G#\VA;Q=.vNˑbhBE[=z+-4J{h muW˃o9зWY.n fc~uO#zs2q6P?Z&~*QBt^Rs  ̨?*8$3c-d_@ZZVpKյ7 H{҈8<]%۫CT8.H-syt́ZF~Ș7 ~𞩿"\lux{qvK'8C$59V -ŘзWoo>z>?Pmv-Efp><)R~&>JJ9 i;QĹJM^J`R~ltS+f$dn0T4sIʏSV*^zc1~ΪNlo-G0Is "q7zV ߖCГp]͊U>&D)B2e 0Σ6id@R5'Ļ[[:>d)# EMW8LpM /?L[f.|C^M╇ BJNKhnkULJD^%(^ W|E*H‹xaՒp1P:pk.n 'A ϱ{/ct+ta5jq0#ȯZlOtH`9k:ZJ!n.4YFjhcԝQHKM߻8?!oE쪈\cTw (mYNVpKIDC=0Ĥ%RtoP0`+{#_&tWu RA­`r=w9wr5pp?p•H*$NBA$Cg׆V"`/W_19 8@^ *3@֔j/"vR-<_1%}Od;C°!2[O䀾IYSf=~3[us"{3-ygf!dk"aɐd0uK PU{G(Epk fHco3oZYpFo(\' Jz9{|E=FHK#e $JMrMpɅ4y1k73>4"XE\TP&@^ no"|+y&k/eSzEW<Ȃ< aJg(87}zY[cewbNK:cyB UXz? | 5L"EHԊkm(-%:׉:]x"y؉Fr :fuI$ fC:<1*t\h h\=RnH\aT)E,F*饟\b=09ԧվw\Gy ѳSt  Drl* K7&ǩMEFV3/Q_i/ĥyQ$ɸz@~$'uDDBjnhh/>\%ک=%3mY!؋7HKmSaR3uT%SZ>325 Z,@CB!ۈ&Z KczKЙxuu2 _ƹ1q?3B㵸 ?~uK;(_uPu}ebS)?/IvOc YpqxgxҚIrqsiZ,'A37SLlm[C"J+UAɧcPwP@O/^+&ײN 9'XqOLQf&KB)$R0 ȏaA*A0%JЧaK$O>d<\%ʎ,60oK1,7$0br`R艝v M:H5UcԾsy&3޸{r)t$}M1!?g$TƷ|k5T<;.-|鉧#<_?(N:UѠӀ,Q$cCLKg[Ibi.l1XW ʈ7=P}@FN꺂W{UQcۥpum76Kړ<$Y暅U.Hb |q5FCA-E%ib~K23pNw=t:r|R+0*ȖzoRB$cQ@H4YOV/$QtSJ?fPN5o}QHUY0gKjӤ ZRM%8?+ZJc޶0"/wbC_,i+63#=;9JpqYfJE%˄t3%J6O>7\[,M_}YR{&)!bh-v ؜X5;kbtbדz%0񂸔Lzby"&KU-c9DAX4wUͲCbH\iW)pБp;`kN[ꊰ`'/jhbAh <^`Хy1]&G ;I^ ={xfE&He!v Cl< rvXb븮jO!p(6HVh3dMn,IR%@r&66$-(Rd8_6Di GIVI?5;ԙ/GyƝG^{Bɪ]tw>HI8Q'aR%R1Vr$'KU ޾<(h fI~,`yܬ9~#E!Jt Sy S|8>!rdqIr}+>qLq`٠ˌE8JHN(O>P 2np,љa?NEC OMժPW56olb{Z(Iܲ K֢5Lؔ5# Σui/%uN$-)TRkn[cn -nez d/Lk3'l,)$[HYpwNhZvuaqnPƇo{3֡7͒V./+?R4.9!HEX(pB`.-e-tUum(%OMY'O ƞN#ʟxG#2;eF0'i_ o GgEo ,e ᡁRMh`n?J֜{U˃c&u.QN9Ȟ /zLEKu^ve ɩw{\\8GOC~)єnU~F4s)˿޲ iN] Lm2`؏#ĉEm}:BID+Ů(^|BQw)?IlGCsN`Y[Ʋx|\0Swӳ@ߎW[{:6/3PhviR#y[2J96$0K h8S64!  ܏h}j-<3?fZ'c8nZq{"pz we~p.Hp~\'V}ͼ@-.'A2+(N>ZV$šUw g2V 3O"h1l_'C 6f {'EG$_KPT9, ^wZ@RmA\})LӁ:[3l`]! .y ⾗қ/eVƽģ趦Z*ssg3 BKjz,0 PWgy#f//iY>&{|g?v5 ϑ%̪Z@V |5{۪t0 ץl%8_NdSh F \]t.MkGƩ fz)dCQYlgרWpJɼi7C65Jf3s? эimpҢGs,52yt A ܙR89@vNBiVa<7Н w|ZfyIQNW8UȀWS +>U#֓w)3ﰖd)snj(ADrՄqc}@z2w)a}Zo޸ &hd >TWC:?6gʃ:"I% |?T)5/C}gu#FQ!8z.(n ;@kokn JoEbEz+ǻ=th]E鱞i ԗ"12ȤwhC|Bo$JAgʢKGJDv ;O}!W! @_N1!?( ^{J 3L ZKG 8~: T84!UR;נ^2܄uezE)뎨W ZҢ }YzHUjHZuKcǼj7? cq/kڇǪxlI@`d'@-15-p!V&"݄k3}Zk.'C4\݅3N|gs *GRN᚞Q [uwד̇`W՝?92T0e;dtѹۥ2^o\ B|F]g0R03.,h*|CFEMg6nCw\+!# 26wӐMP?屛=5&Q뒰0^WK6rCHNﭭTN ̖CPpn̊ߕ.0Q(=כo)rRhmyTX!oSϊ'^.d8Ш^H7`p23qz*ey-O޸'Nދ %T=bim}d?~nbswmYNEzS]э0ASXSI.VWwk!J @1@, Yʖy&Rca`˥Gp glJ\ybr/M>ApL,K9H\H:m ;E$X]RRLL F2suĞU7U ,dCg%@!( $RUϿc!, 1-d~MֹwRAlzW BC_ԉ&=v^ٶ)Ksǁ?-!RQ,FCOJW΂:oPir@#)MOSw~IŬb]%{Κ- uY~Q_:ʺb>@2ncA/(RC]xՕ@]BwEXƮlj6U1wdֶX'XL`VvK8вaӎ;@ZϦGJ09h~n^})ɿvԱs[E^TGf'F]P1Փy8|XOTO>j$WE|=)ڼҠ (qsgY_L ~;4?q~(;] 8\}&a*N6SZBb69TfPݾ$ꐎE,AaP^7(Ҟ┿[+*G&SxͬBR2Ll>-.'x*ndrQgcvr)dm{+*+/D+2hg3%n*|dT?dF^uMCV+۵' Vb@P0#آ'1/97 bVP{$oѽp}.5)}[nm-c2Dj0 6(J!d ";u29_4p;0FWFA '|Є sߕZu\/#}0ے44Iewݺϐ&`<4 ;S SOf_$ggdS^*lΔ4i¨Wv fvS -և, '$ rP$r0♼jTo0^Ԣʅmg\RBkq#-TIQV@m({H?Oa eV\h$QlN::#We{#;v[j { GX8:C% ;{LJW]am3.i0Sc0)Abv JS,yPc|WrzRTBj{srsA|f%~=ى-xT&?g%^޼`;W\lnjƝ';|uZz0vy7tP6X7Q;IFT]A*#ܦCOA.szUax1G2"| a sRa\]`?q$xǁQ 5Z "Q@2fA!C6Q ԉv↹%nY@ 0B5*ϠaU+g׼9ly֘ A`2luΜo=4"\3%=|'h00+ѕD{e"VO]zfp8.g-1f:kUqQ`\r cgQn}pvhmg8?osғj =/Pu8X1W⨌?Odަ\fO#XlCnEՄ4S1e"Dp#pكS*VL_;7(ͯP*3Kϛ;abVLMU X]PQsT #')/>|Đ㐤#U|\Dk31@A(Qm",kZ#Wv?]o6j:6^Ӝ3cERC,=K۝@ϖB;!cWDv(o4OA&ӄQ15&5I:GW37Κtm.|r)ʦ 2![z )2=yi0{fH("7)"&V4r-rHO}ZEI \ͿI 7 ~rozE[&@7:ue"4>&|(ZjC'suӶo Ѩl+2u3! 0㰵&.?74SÀ$ ϐC}w? hRl HVy,-Iǫ-l]~c9t)lO5҉nYu.^_0ս~=Eԓ(ʅk6\1}dj$ڄR nʓPF}+bBGnudd/4o@IwUr°bVQܯ[DYK*C^n]0RX4򂚡SO,HQ]xK?SY@L#LdiP_ZO~e;<L;!{* :l`صqjE c)*0;vb֑A?~ ŻzHN"8T[95{Fn+Nz\*hI_]1+ G]4рLqc9Dj,,oGʫ M6*5֯&.P_3?CWv4Mfv׬j^ke5S-1+.#&6(R|d07.2QqW4tóKWKF~:gk{gY9HN~x qW@+)E-呧ۏ!sSıX_!p4Dme ̌b10 6pg5wLIZ;+pْ;FTgZgnPAS e h+&QO>U+-W(b ^E0FS2R^b߉B'^"Mˋ` ^ h*]w8,F.kAgÒtZLddk_Ç" ۿP]@vJ6Z3u^e#ce ^*z.+{caי1\@bg>"G0GR`R: C:YO6(I8vN!/"d AOʻ\񟯘˰W7nZ֖B]jZ) 0y!T72oLx %,3H1^fGx5g%nQVk+wI WPm {R<j }ƼZ:em|PD2y{Ø`7\j|<3eyJ"cN$cFIu0 ǞN A+BEmђsI~l0ȸ1%7+ThƗwϒ|P(꣊#Mv,Pqߜ>PŪԹg0.ҔoK2x!z&%_b!GiqKhp5$ {E|??MkzaD-} ǮXе01@6{sxy))/H(A^$c5m%w"aŁ!HRT6ç1xFm.*jeY`>իEM@(KGe|p!d,*~2 i踂$?$L7CcrmqOvU7^>j$pH5,pPhd`D9\T`g"Fo,\ mMLWeD? DVn)W7םǫ}@yZ|)W}J*LBD*_%**QE˛{0bY;WQW1YI.m /ùA^y(A<%:f\EҎwZ6T?&Q@$NѰq[D~gZEmۺn( ̙BxmpK'&rPC ~2o1\O_,LPɁ +xq̢S-A ]k<D#Zw^~87]YdZ;ℙeӦ 58F!SH6lu v͔NLAJ6f;>\U:YNno6H W!NE YY۩5,k:7Pj!4 {div ;7d100%ͧ!OR׵}u\)|I1C3ĸ[qbV{} cZGcШCJf;G|@f$DTm@c|%9-^܄hn!3/zMfgӕb_ VNp63 &D6WW?XAR…//[I پ5MQq͜mޝ޽df-k4ydwRޞuf¯P,FF|C8%P8B ٭( B&I Ma7ʷ@]%%ԖMT׶I_m#ǎtO~^_L&gJ o)& è؅nﳡ3kfW"?\wʶNU10 ýxq('m5jfP=H⫠F$.FP;6`GQ jbjȂvGw.p^rZ[pq]?*i%V+%ir{ _{ɆIrzH1dI" @&gD؝ذ^B_,# HNɛ 8mӓo!ޯنEt9uGRM*#aO9`!=ƒB9{jٔFA-8?V9nP^ *蓵ΝT6&bH5|Fldda+ad2s6]070U0yX{̔#$Dfc\FOCJCK(X(>UQvGbT}Kv `&lǦ1i=i"@|COZ8m2.҇C'˷BVox&P_/:[S[9oi) { RwVK~4TXuV.fPnѧB~I{ !jP iЏl>?n%2W[mA!@j1%io=;[-$K:Q)18CPzeBB:zHYqDXpHD.v_XVnQ8S<]O15+ μ{HgB< +\fmkn 5=)s%U%2UTuDŚ\N50m/sB=`?7F1yc( S+6=hmHX]-3 $iN-vA5Fj( YA|Z @qsD')@"TP$l;XһtWr[Q~9SM6q{BiN+_T?.)Nɴz;ߢlǭ2U6OiG 5Q\+]2W:k#Sy24`/ЂVZ)Cr&Q@ NZ2!҂(mQB#}afVY?:yh*Ǟ˫>񂢟(KU\#eoߏ,?s<\wGt;J΀̬T6L܃6ID$6͑+O4q(b;<>O 's;˧6mZfƾ=RWe<&f9ޗw%zթrkene^i ϖv(D#~,DS<:~͖)։umBt6Zpɱ1@&#v Ahqf&ԋr*qH&s2b S ?p]_P}<;%9i@Ky\mzZ D6ؚ0 97q 2PcIO(33x^fu` [dN3dO{̱&a{RFrOVXKUSl`JmouFk|cdr q)qH *I6\Nr2,d[]E=qRx%*PNfN Ґ.<>ɞw Meaa%qB.D_9vIY N v LX@s':d1P^2SZ(9G?'N-wӉ 'ĭ]VAD%P'gavQ?k!߶LˈZ*y7n0c׉%cnph|J M cZ%c،MC5U`%{ WS\`jOg0{Un߉^eTxąY1\JgYCv?!JɈ *.vGHz_EDAԗˁVAwhE׎`  {snѼ$.`#O$穆+"ږ,(pgqIb l jlr y(!MV@,ϓITF[lc7b_uÙcYo_.ʐrmտ=meA}][5+G'6 /v #ØSvl9$% 00Diٺ6cO9A83T,3H 7=vZME'A' 8暎scP%K]F"eW e+/_%>/ 7큕 Zᶌ5"JoWc5I"2 L'a;f[v i|klBI.\; g%uo@Hp7X葂 &;3>in22lAs eMFD벜0LkйW#L\/bn$FمI{i{z8A4ľRFF\0S?%5|FenYCrۯK?9,2SANƑjP?06DէiO'AoMXd#VR2zd ܶV] h+lk $m{ebrSReNM0T6R0Pc1ζpROO a3p; P^.g6?jͪ8e׆~򃹺?Ov\ 'PPˌ~_E0VP8:x|l*?aJ:T*5mՌtO yԡaӸ JDn( =O :B[ 'w=7K#T} uw{˗qiyp= VeXM!LD$iW!."yY1c@8`8 G m=7Ǜ Bу]Q,G"J{Lb8ۮY4t S4i +u,'Wc,,xŭ0oƴ3YtbQ$a.cVr4[5#iYj(3̩^Б{BҝJ^LRHgZ4Y߯gt'YO[|1]Zs г$9oRe~yK뮇B:rI+G|He9TM}Q:Ծ၁ J`l$<(NJU7FYGʔ-Φρ-ųc>Bc/-XG#)V03CTp.*ѝ4\sO(aT{]7w]cYEZ/bTiho^%+f+3ڼG {g`0lxHgڼv5N{8x7؇6&Z }'ެV0;SdKx DlN3F]f~!l@HvKPmbB_:ܻ LXD83vE?~"7J";x4ySvhnPFJ[T ?>~?˥,*;N aܲuc+l&iEaVLH5$3RbCeY}Q}#!\Ҧ3J9c-he5{}w]&2 6<}=|#Rsz?eya i#NIqXqʲlw:%\6޺ܪ RiqNB9'Eޞ@^r%?[ܽ?ɗȊ p7l"x dr˱㺑8X _}XRaY @7YP願 FyBx 1EJ:[/yH_bXe<kTր(I NO\+CeB>3gk0@-JQ=$aw 6P:/ { WڊkĘ4 y4YPɒNd1_fU;>N) ?ֈ_4ߡ6C T m($DR"}i >k(i~W;d]Q`͗W~^xSƝf tIia*cS܈vS^;.E3P 0EޯBP -} < tǚWlyTH@ юzݠ裛m?)jY8z'tnp_85f,Fbҳ{W_lWLT9n. r$S+`J+<_Rs9CN*+)_?O|BiMf9 | Nl>¹ݦLv!d3LY]0M+CeBW4/fb}[1z*v`l!d!lw kO=j[Vb̬,\8 hC_puc֥ ecN`FDC'^MQno.`TXtMUylV~fdT˭#hqiR)>2 JJ Eb41(\i6~x$qsL2L*dxzYcOekj[Pi3m*@x'AHwGIaYC9BmP,J|"4=H,^H] L)W@t*&kJcDl^~-?J &hA<iP ky|yi85> D7׏S1^L˻74v㥝at6uOdM2t[I}'qj2.bDf%8FZV7 :w 8$?͇ ΠZ}$H^Cae?ZT }kC[wCw3wL?əI*rA OVIbN-2_utmޮSlon}e ukSըR.l;dOV5OUh1m]fs|0i~0俦~b\5uEĿJY& #+7W<߈}%Wk\P]MmקOdL(ЬfIH߄N J*Y {nc:J3,(-#Q,k̞?[?~Oԫ~QN2Ը/=l)⥻M8"'̀[1ăc92 S|i;ֆc{KvEL _hh5j^V/}<0~"0Rx": G> E3>nX_!nbvb̰ߓ7l3Ndp*ƻ4~*%;%íE$\<| H_k̏Tk/˵L Y5 NjFGaWlҧQcwh?ȮLp Y=rvۚl  "-T9%k`zleWj}AIuaSR#s$oY!, yi+cE)(">{IN >i:W vBX@׮*ujlN,hp`r'w01)D*9w"Exw!5-v;zӢ&fj߯9܃:>,O>΋L jJ& )8=8<֊x$::7̟&'K77b_z 5% ^֩+ⶰ=Y?%@)Z|JQgΔ( -ʼn :v'-Q?)bXKd65=DX Nmz`{X%Bm,Ϻۀ-J7b\Ah_-w><֑LOro w,2mzr623Tyw$ǓG$ H8 ]v-z -4FEiaMqR(/,\(}t"I?U9)@%hqVYaO=II ,?L ݖ^R ÊMK 'B1Ua{2-# cPJ.$q*Y3AkIۅ@}N?%Qs⦻ $bd7L0[ֺo$PID[rLlt\l`!=:5+UyvKy{t/ "U&yuPXNK;a1J&Ź"K=.υ59kem)?hlK7<] >&o_Rf4NZ\')g2܃sv0#/9 V7DQBa+ОjF9Ubwމ3l]L=;-c@CTr; EbXȷ_aT$ۂOFGohWBJԝ߄|9 NV8no-"AQ݌=L*Rn^0u@gk7HJ{?$7Tq}lm4CƔc/)җ|,}_=I5Ζ=r8~N/P/!: IXT}#wJI xx7M!jU@T+P21_>gW1:$ {ރr9# 2/tӼXJg[i WA@4{ՙIv|ڑp&r57@=fgz2(637qUw4>_4fDiRjZ6~h%Rnhu/8&䨦!c#%4pv$֒]u>З1 =E1 tV",>̡>!Ůkц.:UšNq)t:Ȱѡc:u޳cbh`ɩB!׃m-++J3jeD+p`H]f+\ϥ=s!BjT|$ h) F]Rgwl&UZzzp-eq2"p® *X n)}acrl0ťpf ARMץ <1ɓe{OI]-EP%flZ+\UU$b% (` Cݰ-#CNHCyT~ioM02#%D욱⼍Ll˥Qp'URL/1܆)b-W*eHv X,F}6aG7r*fU.V0ґK^ . sAd*gcQs@ܶHO_|/^,Ӱ ,T(PH|8C]1%[{q_"bLӶ &x l^|$b3=l?+eZ3 Su{T kjS$eрI?3ePle_w0' -;îض5WoCipmjnbhr/ K;؏XݓF lsHFH+"-Uy&ZH|< 4:R#^~oa4IgEkyŨ(zZv6JOT&AZ@I ^h+goԳ7)!%Gɪ@R~[CWy͚sC*,]:nkͶyg,O/ ʹX3E. 7&GgO;j\w_kMjLY4ij{(T.eBۓ&/1(<7V߄@T(* y-ǿ$! tF2os+6qfLms.m2U@]XQssU|긛U1 0AiyQX?IAUKoǪz_nIl$`48ܙrS*.H*=Ï,TWgʪLt ҲvgDVƾ^.'B|Q,.!}},u=`##G餈ڿ3Xy 1pL1*#Ich)^m9Y1,;r|H :KG.')Jfd`1pLYr>0(pLe:I9~bڗz~dBRj]4L榺ʐsm"E?g0<>)k3&@s 5(jMO>t rŠyB6l_{q GY-S#}K`{{ .4߼c+1("N\`$j? ʥH)1A/]4$P0^|ʯut !(SJ" u.W#q9=cdTh5Js"7Ͽ䍮]c}S`if쉗&1@SWRWJ%֡$ax)#W^p{--QY"(}c8tūq\ 5SX}hZ$l)v]tR2H"4Y2I5̙UUH^5t%®/q3~|%PozF#b#qxCBY=L12ʥru6+T/Ǖ:%*$(zo1HIGS>!*UH?vm_QOLJ}WG; IS8=Wlxh2SCoHkDƊ,z搖\"HKvHc# ٗxOYu&$ kf>qG3}*x\:{q(42ߡWH(Y0)A܈{4o: n{ bZP>pI`H +G J/{nJfpxPCe~R;w#S I\D뼆澁2%LdAnl/*sn@W<PrCOS8Ɇ Q Fٴ45 C;sݠ7{@τ<FbJxG{o7JkCʱzp2JU)[ y/qŒp,bGbIg mަ_d~pr&vj*Y00YI9ES#ʢ2DŁSW*KG"ŞJ GM[n?\mbGt y> gCpi<26WBmd%m?Sk+ g\aIcW*o$JΜKyZ%w=,IyҊaK(Y%;*J1J͔Ͷ0}:>a7]dG2L̐h|Ѡņ1*|-C{7*ZtrE['Қ]~FW|n.eVw[Be@> 9W`]xP(J9/ɾ, i;woG{8VU=>$G )l{d_Qs=0|!Βɚq8)B%<P QO;Uc35+Y:ݍ{8gӼJG<d]:I\rcs 5nv(bﳮ{mm,gb1oG,^N=ZDkvB,vy&^=Dw=x2^.|iӵ/j+Gdg,^9[({s¶0NX`1nfޅbju.#L(BS32mqJ^uPI!xY56%iEl{JR@QPTD.md3 r( Fڃo!y]Uؤ9'>>k29l¹Ė̐,y?6j%PWaG :ZTur#t/I,bw"6kEb]@'6ou] Oȫ@XfG DB< #q$)ct$;GX!\ +(B},35 QÂCnt^HxVyDw[dkC/'{YF腋wH@ⵞyJ[qcp#MX[-hF֨9̸5'*tZB3Ig8妆BE{"$IS;-r.偀س^z䢊^8 $XlGg8+EOR/dgA7 ʬuZ$;ͩoԴ"Ty } 긡2 VPֱ<6@ 3f^LGc*NV.Ήl"D&kx@ F1o|ziWynM\;[嫰#![ApژԏS jQMzL%@wj6.;%$U(sIҦKt,i1'4յ߾أS(#73J0Yi7kt\'!AqbDCֈ>~AWvUGykg Tmd<N^z^kp4WԄ2B bؗ`P mo-;7rAn``!|$4^|'%]mj|BrBcy;g+FYQ_RvO=9z,K: \Л_U( KJwŃ)hy!ѵTJaحO;o0jgl%HhT%U{(yoB :f1{y̧ZP%:_+qE(Ӳ /`CN A20xGᙟ'#ϻe#s آ`/jI`.]_N'eE$q\Ez UM{W):מMb#<*N`~_ϐBĉO|vf&E˂Tw+ἳBr8nS9eBlo~ ?2Sw?[Z'>거8b<JlqȬv/9lE؃/=8"S:z@lL2*sE{P]0wࣨwK6 i㐻CAex߰ݭw~:KR#Xؔ\y:hN">lZ0Hq z?~EЪȳbCٲ,hd>纘NhKM׶/sn2cr 6.RaVi{ Y{ $xڐ'r 隁5ϑ/`9MQ79Z30.x=j juXLG4 eJQG0:2Nn09i"OG$#^@jW!bI"2bbE;!5Dp yZ=;H(p I´u|g&·>SQO$x.KDp(!Or(R:m59I,TH r.vuETzi7M\h0L QGC/1~m5$pa,?gLfp6+AnW*/HpYp*]r0'm 96*GRm$ 0b*^ ՊÝ [KS2yK|0Loj͏HΎ ۠ip \2.FWɘw/q692y6i ŇZߝb88\Q;aM1&]t d],oxl4Tچ k&^4uoßn\*>AŚbTK6MJ9#Cb7$:?;>Jg-Rz"UDy)}),e4P';sc*:Ruߵ˭\ϲjqҩϐ{ʳMMʮUEq5BVBp,+؉Ŷ1˰`[UyPBZna]8:u""3CppWe8 >@++JGyOaAL.+ep—q=- ~֮e>BZ(!w_# 6a bA#id'ٲ=;6*D+"5e<Rpr&+c96x q(,-g^s*! ѭn <3u6ܞF7u εGTf׬3b4.uQj+N)҆s}v\,Z]ס9E%cg],H\h1xE]ɚ0VE;j..$c\UDBخaA{ub{lw RpLP Ja?nvak/cIov[dx2ڠ~PH䫉?Yx=F?s{sm6@)E*l~(5v*:IL9jZ BPFq^]qSzV(4\AhE4 1Dkk.Y#U.nl|Y{ݧ3eք3-.00D¬[B.qF }EzQ$rL* a@zGN~zZ꣥F ȓ*J@ވ㬂k r˔P9i=4lQr+}StÊ 3kX|ڥm]Z@)`l]P_λz0˻1ԋ?O)inAp f(l1K˙ <,{YK4kJp`c"n4Y\Cc4`w9.X}d Le!R(>9o<Ɋ^WU| y6x~_f Rsr (V2 wn ύҲ=`x$68c]4`|_?v-$R`SqJQ_NCC//킟+W7ZktSF`DJ/3>TenW}_Kͬ^_R5.Yg W`CL.ߣ˺T\#xwFXEeW~zÉGn6Ww'rL RKm.Ɩ'r0"toTwtt@A=5J# ψf*.${:BCMXlg$<xy!|Ov|n'zy 0ZnZ\Żʺjܞo[nAÄF8Yn ڧJ@9s>xhI/%"Ɇ:nGe xYp;i*OCauIaweO)u3BoI"m>hG>?wLzO: .):bW+{bcld1(7hpdϬɓ0t.FBdqأQnO{CIpQwp5mJ ~Nt0IG=;r#. 9N$v\wY|- VdxXɖtP]QHWsqsW(YCȗ[xSo ysJڻ ˆ H~J8-!^8l(@ɔʎsG-1X1pQw՜ yngͥ_66}18W)%&2v>ypJkZ5/Q/TQ,adZ~[droz:WƖzlQ-&~6=Yەl]3h/?Qv&Qձ,]i뎄ISMr  ɑ^[(UlMMQLb+ݽ~u3IEWji3}<?6q:!׀3 Cp7|u;1{TPd!c<=+4Z3DM85> Wm_zz+ O"3!dÞlEy R97fKlDMyhWt4",7tّa*AJ[X-h}P#_s(phCb: V [DzSZ/7SX} 5`lAm' ̖ PM=Qqեc&4^"& 5ԲC@'Obd1ۙ7@(t[QHB#xbD,.JOpT+#kVОdbbΙ͏;n7M#0x/K.GiX܅^ck3xn=a U-@0$L6(Qfhݸk-o+h{$X:njXg:q^Bm|%0i^mci,h[e>LEC8#0 $etc2K%HB&]mI@TQ28<*/6hD8C38bWޤ893&t+Wgt*KKFd wj  uyr5)9qXN}E rc-iKD"0Pf>y^a,Clz6oHo]w?TG&\D)$Ay 9pԥQE-DD\\j!PT|E[K[ej5"]kna {ĭ(\n }[[&dsg,ΜFʦzq鳅Z%VbTBƱ X}G}XUGX,嚏RCayc9-3!`6Kbw FdB.'u YiIg? 0 |<'&sܟr2l)8r ?uV(e\pH<XYgH?֊/4Hj;WSsf͖ܸrxA;#Lʴe]fH1.2I؁},SfZ^69iځj^԰pRMlR98K8[0YƦ?xqDqzF=AgLO#-(UX1ntR$EE|$#4+_ 4.99?dx'VmCTݚ/.C}^r Z$ݙ(PT 0La/[{m\n:s/"jfs_:K~7C,7K01y7melyPm;(S9TS4H,TP]Þj$0OKZп_}3VJK\&zrR7њUb_ jVj(}>'3/V.4ܯ"ZUt~ٸGv"Th[T[dB:pl֓Q~sOM'rM8U&Ƥ=Z'^]3kOz 6@ }0+e2rRWHZ7<\fn2LGx{Xc{x '$'%|B!"7fxٽL.N'_T[dUN2 Xp3utNxFŅqm2+k= θᎄJ)7^܇ &(U79r.?Qq~׭h#ISD&\2I/8 Xı 0KOۣFڨk2<d7?+'C*(U\>/U}x] xзdo3Z2P*o2t欭}NZr)Z$vrO0 ] /.Ma,,LK{li0)~-1s(͂& JOȶo,<ܙ~(rYvmĬٗ)@](b@Z.);tTi= ~5Wm_37oN%FQȄş _n6j+Yep6;w+ĥ3}4oϭ͸푄SkngA 6Ct5k8-PG@ #gj[Gh`p!+U[)c`_ 8@"dqz.| t"U&:SN[CaHф9Iڌ/.&՗Dgc+q+v(?m^gG3>E5=U:N*`J#$ FaD& s$)F{/nj[/ׅ?1{2Ace޸މ)nln[U+@A+li7 c,6$FDu!ս(] Xot݅B& W-;ߨz[f9_AKмvc38*12{ ]53{ |6?I~ðkvajImy׆KS6OԶNj=|ZCn{kɽf+&=(/0_M:>}oSg PSMB^Ѳ$i"U+3*sӾ{[Tݜvnxzvf#p*I ZgqTWj̙UaYR%wM vSRmdu݉I`~ vjɩjJkؽq/FE g7BON&o4~vʷS!yʛD)Vp 2t1X#ܓP⦚Ճ6e cB/L8 </)mEt*t}e Ŭ[IqwCnAc9B~m~N)pNٛdj-t6rTiηZ?6MEmso"D @o4ROQ|0qa#1,@hyY? $*{s4Zv/[| 鈍&kA[8-mBԌ!*uWP0މ ܵ>tj@XDOm*3RE[,Wgg>wNCd\͆8kyltAY;h2iPkeerFH^~_74ߘB^)w^]o{kV_Å j̜&Ct7:߅AK'4):3x eydʚÑsNSh} {az۹ @0xq)cБ$ky0>^*zAP^ZDHhn/.Fd8>wmqhntS U(In: ֔TmMq_lI;]]S ȧik9{{UǕj 40zT}iW |@dY'`fت@dH욅a.:4\3/6)`QFAhRgbzGhJ5Ƭ2#Va7 DZmӎ\iH(xP0eVXNd$reJil&ϪMZ:AZ}]ۉ2͛ LOx mO0ʺO$1䬀. $#{,lI2D72#99rYTh=ҽsyZ\ jycqk$}9@w!{ď ½jqdDHRK&yM$II?KAэ5T"#hϱ*B"MF4 c%]8xyK EC"U*rT"EJ~7Bٜ\\aX^\qM;D|lI$NdBϓbFDBA`kJKC8}N[Nv4F!I",{9'3Tt;M+R'sۙ)uPM%{"8N,Ox?"nrd / ,ea3Y 4 Tý0(ѯ y_D-ٛ! 9_r v/SEN4Gk6As དྷ( _`M39׽GDRq եDnuþ56^bQD]1ءXYK" n!\}=ݲ=L{|ѡ-btx)6"䩇NI. I*݃NظvJv'C"y3q] U y{48OGyS79"4>a``ZH6;J+<]{8FDh+ۓV9BovUQs7%qzatYt!O}?C6G$1!x't>C}d` Zw4x.4tS{V ;/Zsըtj?6RH?R_%-s/yDgZ(bYI뀁EBLA[sl]G+O1qm7M;ZB ^#tH^wI󚽈E byӓ}ѳoESB(xy`㼺~O@[*ЗkHn}]!Z+J'hl͇˛"ejG1o@:z蕋7vunh0=S1ݨYNIb:g=H1bWke' >b$0O""w6%S70-_ K"60dh ̫\COvֽ XNm-L&~7FL`9gH{H X7X2FǗkG|d5ֹ cnhf ݽpiAv&<E}y;FKmf;{>v$R]R=-nUuh& uJKA]*|#iabD'[}g>ъ,RXn#AQ5n<F%ݘ Z1UBm+FH`:ڜ2SsUK(aS.ա^2"rn9d<L_=%HuH34h4L+F5,1X(5J0Eɶ ,UwSh(4Joka wZzl񏛜л΄$afՐ#nI˵pG_Sd#nmB6Ng%Dž9O2 jxmw"J:BI ɓ kUZ/W91+4xE$o z'4pt.)-ݯj׀`n;:"}Gnq[!rƵbs?enU5 . #s.oUG{%yq 2 \$rFJy$,wYy@M*\0 /!;qLuE^H aަv^ i]BAj M.B$"h'gnK@]YAAx`uz$c"zު)Ze[9ib .yXXz=y]=8K=Ë.&s (- 52QMDny?x"I-R o {X6d̔-:_+'Y܌*@Tڪ_e<:1\{.SrbϷ]T,OdEؕ";$9_AdۅV vsb#,4 NrGnJgiHmnӼ@40ވ"[W[ϹYj`> +B H 9_O2Bd{MŎj_A0 kk|Nu5R2u%rd$a"V^QM{YcSas+7͞ 7ߧql#۩x,0.P5erFBx,(9A!,#]42ɢ]t 3Y[7^pԹ&pwĩ<zĒLsKr)h>p.VrNqb'.b&0:DmNNߊxBy@0wP0:A,"p>?,MJ2RP4fzEO2GWC_-kIx$Ji0ж&$0s(PCo z:~PBu'0_m)oq+[;+t8&kLK>8ղi4D7Q*5m>9z:`ɴ rOa4pF|oJuE7])B2v,6' `(_A+*Y dsmNJ aXV@LW$͂^$mVWEf_px#>wHuq<,i m"r~ܲa+#H'(lisn$e-rodںy棦jC8^2֜L쨿QPլWagFU[/,ὦ~12xqr @V9?9WB"L=؊O8.GWL'9  λVy>ӏsЪ&#Ʀ0P æ1LVml\|rb@pEQ Qm`0ckIPx_?pflOoъB"8q^wb'\jPϞBZeYVfX1"g.SYPֺrVN-Uަa -AL\+^L )VVI4Z܉57{N;2EV0}aI[dO^`pO`0iW-W"f)V[íY|/2YUh X /Tƈ`wi$zCݺK(18f+_殠c-(r<>})t%1V6hD4+Io0F7|9^eSP YV+ QA4ig8r@X)pD=HkI S *W%ә? NmѿCBu'A y}- NˇkJ3KfQY9n3Ф -(Jɍ3Xg傠-b?/{E 3ZqRaL'<4 LiܝFUFꜹ| XWR8Ʀ)O|ost='K Ƅuf f6 QO$g֙F8@dakmo8t5O$x.*m udǀKĭLAhE\,|(,C!;]+6XKRH_-4(St-a]&E;BrZ)l$CKB6W pǔ"86N$"CPփwfGvC!-9v^xqeedR dÛ{J2Ӝ-Q!z W>ZF-XR]ʂ"`Q p<,܉ (cu\G5QhHSUY6O$xE$aRŪY`M(dhcbf%1g@lᓣ? _2 )+v,d ->ӯKցФR֊&rgFɭt(ZX d-+X2&{d ~W. zA5'Kb|: )Ig=)>eeLIh8%3n&jo@\/鸡ڬ,m MX/dԐ|;_È[vy s;/>@ >y! B+|Ð 7n- 1(Z}leZMN9NlS?u>,$Y2ĿPUiؓN1% ڛloC.dRAi6)&7NupMe&KȾ<8u\Qe29;p*ڼf:BcK_kWqI S~8Wj0 5ݰ>܊MFhדAanLگ x[Z-~j@N(P&%.ukt*mhh){ RI'wn(aK/Qj^z]bk-^_upV_4ŕoWQ?h_ӷ` 527YO\! (Zé?FZT?)-x>MoVOdi,0K@cfkc g*@؂`"8pd$-oMek쇁Ą˷篂?`91a{௴zj ;.\KLJ?Sh N(,AZ`HΏpvwVU':RkFU#}Xna8sT=Q upxJÈͶN є;W4}{EL1Q)]n3 xMIAV2ɍ!~{UȦ9% t[EBcjjCV+/,V/17i]?0z^&7TNU%a"WCPEkM]0E#8^֩ s?n&B<5QnFu*4*;9߀Q6K$r]J vѲS*12WU8!'lJIJOWա+$}v=:l̶~5> +MQ $ո [ Ԑ4LnZX#ȭq=3YIҟ"m_ȳzBkf@-"|TT|l ~<;b(}Äs-o$f3,04`^3wr䰾wFA%TnB ϔsm /|j{)Aٓ2IgWKOm <?5R ,u@ y\'ÆL2 8cl6Tµѣhz9ԄS ֨q@cLlLѮvzjo2 X;L**GBD3XpAW $:Y6ҍ<2 jd#_ZY7-8 <`ktҵx8FqB?Vx (n=J:~v'KBON w\>cgfF `Q]NWK4'dxnsar'gM o۽:ǐ&3bĝI͔n$U'8[cYLI4Qt!@X H'v8s7}04x[S"voj2 ue,}}WLX6XYc)[$='-֩P!Eըe&tӸ02s"¿Cm^?<~EM0*:WƳ*U0/5%?ΊsgRV)_X䜶KD9"yki}ub6.[ "S(/(#hbf|)GûXt`q+;tPIk=WkU-HZ|ЫM#m=K1$6G@Ǟi4 twϻYX5[S>E%W 5VP}zׅB[ =)\ b$kFg෥.|bKst nopMO1XMZH5j M&_ɧܙQEC(O sd@,*U _X-v~yi #a)3Fǀj(*sUXKo}?& R*|r|^ELp a#j"TglH-6geqn7*E k/&3Q+L/Jk{߲LJ A!kJCMGN9܍;؄xMFӧΛ38U -@TD|$ujZxeb0ꮻnMTڨR7CZh ߌfEN?a}ĤǮ[ܟ1&HJX2Mc #% p!Vv˲YmD2Y)i`^Z63O[j콝:+VPGSUd^" ?Q_jOO/3ߙ[>%;Qm}$mtJ2dd5:J"K9o}B_ɌOg_@Xߛ-~&;b#2C\}6Cա#>#6xEԴRȆHo`[=-j3x._jG}{.' 5!@{/VI7 . G i%ֺ䬀|k5U9AN%mL4$4;n+E>L%$SygX+jwci͏O†nϠ4j'Ėe в f=u0ɜGDzC䐰{GQz٦6rHаOȈ-$I?e(6 ۍ`]-_滅Iu>}Gޥ [K! fM>_hۛ@=WZhV6(O#dS~t#TC [{]/~&;C2u9B\<3%H8nC.Hw*~56RU/7;ָ1[2K7*WPʇfڛp7J&F{BCS6qZ7WQ{-NiL&|::GX:^Bnٓ' sb؋oFwt_5ĢRc!>+Zr a\VzX<4T=Jxo Q|+x ͑Y3m#(yeaE>=*UI흷M4‘4d;rGIjQ P;:uSnp5aM’Dx[nz@Y<'bif)N]~zݩ8f/2mc4mP3W}t8(HQS%z=ǯLlr縑{Z"}y9:{z~{85<+g׺Lz4ڔC[հrѮpȧ'6jw#{ބ.S𿮨C4`rX{!jo٧p )A|̊gj>UX,p 0&WfO';ccF?Jh/@;B0W~<ͣPc/l'gvʼnsD!vjQt|f{_mԿb  ;YӛK{tyx"&hk2mNotY[P.k)8iYe6{fg>ME=wcrd+ CrdBsfM:"B)]Ӭԋmqh{/m;zP3'eql U՜1-4K{u%m4S}ܼ"uL)$+Rדh1;>w O/2A-&g ċ6{AZ@.ʡђi;H ъ~% h*u;/=a.۾t1ΔӚ\>&RHyp=pyv֞bZ%?VЉq2dy"ժN8@@;ts)`pA{Hy$#3.=Ay:G#NS!Rue5nf\ђz,X֛rLMpbɣH3)F]ƥlm*كmˬ-wbSnyD :{찑8BnJ6n3 Ť,~| Ѯlsβeqz `צ?srNv0>TI2U}+9:Q4,*Sm抢KmE5|;0Y/M}`K^ŐW$4MdebR1-nCmK"9mU˜-acEYM "<Uz$Iw;Pr{-l  빲yI~.e*+}C PStMVW2n`?$4FM}6z ;Vdz':mE&*l4,. fD8%$Ʒ94G./,) Hnqkjo07*;4>c<|2=Lz;J\;V,Y;zR6EؤIM!j|L4jiΠHj/AJ${zԓ4Z'p%T'oעXnwK#|lK5ϞEى`)%Z[hBWW$ed [cxVU]u^RK}y}TBhV; r:^>lq8pCS ~]_[nF* {Ht!eŅ5y,+Ø 07RSճfkZu+e#:[7Al&(*vAmuKo_A h݈Gͻ))UP!dܡNWK+`8ǡA?\˞H=Jq=+',:!Ϸ,[Zq|TPiْSD&l{<sD͖҆P5.y'z% 8vyx 3/#.F%,0?R{hi2Q8yĐ5}ߋ (ARDcs2K"VH Q~9} ץ"~Y"Bh.XF@&&Nt9L"b;퐵v%7^rB]wЅT:7"ߙ>(=xs ݭ~#o- *߮/''POڷ͡o>C3W] r0qtHveI>@H 'hmr: :TLT`IU9l{1(,ɳկiF! l(&68CbX7# s٤IquH@F+oJ $i}c2k9$Ѻ!X/"B*A}nw=XfȵU<1Ό֖M3ݱ|v瀾l鑄zq1~g^ߧ`))9&\|e)Q>C̟GnoԽ!S& N&5)uuZA- rlktkxVJ+ ôϻh&"%1vq&]u@0tt8W$+FQD{KMd)#=ʂ)'C<']H1pb2>hKWqc 3AO,ֱ>27ܑۙ.<ޘwpM,urSBq[Jrdrrm-.ޡy#O KYd9~ E%3 YM4R3v"pvW%4Ձb h4eS`=e!#rh62J[E!ͻ2' U `DshlHq pX .쫴c6uG2Ź~X*=DO]{z^bÈ'RGr(4lR2ڱxץ*=zMmY_ΏB/@\xSxא,rfD_ogxIA5:J[WEZG(;taЈYd}yN+p Dck-(ߊ0'm0⒵wOLCa\lɟK䳸xKLț'ↂ&qP5 )X5W PmH`5uw cbVժb=I3f@RuVȼ5^_ı̵FJr-kPZv~w5p{4ˬ>x}u8XCRCbBȁ4<hЬ؀! i&/w8oeeGy*l8{yjؿJ}QCOa66B2Iб"Z5Yבg#QϜU=Q˔uD1+kF|Al)9}I(f$z`R@N#8ƤHts˭W2,)L=nu&*ևRIirx΁`Մ{Q5IؿXa#W 3Vi Xa}H^zTS{G=Pr IJnv!5<!q!l;W&SaAkH8rd^Ǡ{靬I|f*\>FيJOʹS<Nr1v)[:R· $ yFߔY^z]1kCs uH*6{ J?6?ô-$̝P(㣧\Y\9 (8SV'li^P\_lSš^]o9@%UeFҖ# <惈(tWzhE7OdZ5o½>{J3zg+t:,NrqF6(ֲ 5ʜ/"w.#/V?a/kt#2萘o?̙ 7hzkF#^ȨA_aj#/N1?>aJ{!dr^ 5DΑFFmsnR9Ӡ@jK7qhlYʱ;HpI@i*uait +CGw#C`7@rcZj-wchƢQĔE%(i%zǪW1$22]K\G1=YL]CmWզ M&đ nPVW;rlvUɼ PQuBwl&ӾǬKJag5J[K"Qm,j[/)“i#bPMՊYG8#R{)̭,}hg0R[Us\t4Q" 9\,cϩ'W* bL¿p#P0+G;5;ј@fNj8PVˑ19mHC׳|Pb/kQr_K;7A-/>ާB'~i~HnPRL:C @E4.{J`qS_`+3F+p!l'ޗmI5R ^ 9,י5x<ޠaJUXBv&,3V`E~_nwpƬ ,##o45xK}<[NvDZ`1$H9Vū-) & Ocj~0Ñ5m{Lu?K(UH+k`ls}#0{ydeGRf$w%j3$,BG\~l;K%d寞? A$lI'PD]~$43 B(O^>}?,9EX cgs8#עsZ̾=%d}:ËlaNs5sKNy_Z%Rkq'P7L@{i 3: :!{c[z3G9ڊPNnĻ1;@4$vob۔rڦrf~G[yysd_>Y*ULgA2Pwp-TR^Ӿ%\qHtgsb5fTudĴ74o]W[5}f^ZG @ z"Ѳ4Bivgߓ'ynZͲ:R/*uɥeNCt,XU>L"~eW3n=X3آl* 3Ӡ^H"[ÿ|$6yQ>ӯ7-CC%)zAwb1t[)>.u- 'H5oH}"@n;t']A[McNciHs骰-FCϾrR-H9{{9֓-vR_d8O[L #Tl̮۠G,v [GXv6KDhg\[R0T(]@Ņ!}e>隽FW`%IN!Xvk Xa?׭3*bS#d+I AԹ2rDym 79%Lqz6} QPVSjfh Ά+d8?}8[{u/E%aJ Yh[ sLɔNp8O ?OEPUqQKZm蠮gDH6[A`2eoAm}s y=0G--ҫ_}MpjMC}u?i`1(eFѻAU_wÿxJKۀI9h53A+q."9ivI9UxvSe&<֯gVΟ/mJpF^˱zX?ciѼq~0k>N,ɡls |pjyqV{8p :eWQ-BJw1gtQ\_iM4jwͧ/4Nj%Ø{T/{ez\ 2߃ޗ M`ba`u/vY)d>Xd<6LebyIZ[񝉔\am4f/c uWWu))1Oh*q %X^C9,/5*?qrȎ1t<{^RPtV[Pj5bx]kiTYY{yA.|7Vi(@ÅI!]oK  E\xb' bgd[ F] h|b*P兀UFbA);[MԱ&fH'6uD)%͢Ej 0T2#ld.$:bNJ I6ٔOukXB-<u{?2$mM 6)"QE|TU{/Gnvw`TYp~9icet9ȁhH]rQTV <~mAQg婇 ԕ_AdFVk=FZ1Y1y )A0aޛf'E!Px_ǶEnH}"ad#' Qdz.^O ]UZē{'=MOUƃ|536:*fB>ʮ{a/S&h;yrf 5ӱ0ФƚJI'3t&GR F`M&0J͍{T,էe4S$,[D_e`2{i e/$AJBDT"珈ɂ7z<ZCkkʳE!ZK%՘v6Z [fj0wyOu8"Cv8Nvlb` t6̪FP6XLԳ<5U.οv=|_՟T2_4@/sP QWTqX(ނ rI&wCn)2u&-tVRb2;4 xvHlJ[E5ʆC` +iAeK5ntݒ1ʆq(Hbxau6+h0ʞ 4R3IcY'[uO%U:Sdp)--ބo;녘Rc0)ӷK@1Qn \ImcIFU.)vcWL3%#&̋<<`rh\Ī҈HSяֈp\4yRY&LD':Y~a*Y1Gmuu\RߺlV04+5'[:>+lRX<2||R .0vJt"G\a2 &~ʛᩪ ."-ΞC!Wh'KgRĽZF6T϶Tn/op49=-5Z/^88M:fmRqҋ{|EVEm(r2E&!:)pO: lA*)Vz !hr4kuQFgLׄ>;Pr"~<\gr'+;j]^mv-KzuBh]W~+gW-b~R=KCmcׅP s7Iww};q6=ep_+aޤ|ė?_t?pc6vLXc d:] $XP  UJV8~aA7m ܍&B,[{.Zfo P g0lΘ,5e%s.e*o׃(Oݳ^dyg;b#C̬q8㊣Cm,\y\jqhUy4Z^OBsZhq+"pAY$>48<6(rZNqGs2v>୪ ;zkVqBWZWRpLe+8 @YPyɏQ^D&|F]|Y/F4,y_T#FtLoJ_XNF1y,XA(, 3v4( W캯ܪXPMz 6E}DJzȏwj5=6ҳbWj>U&% o+Q.Oqy)^xq FI6d@Dv7J` ~7MAi"*[wzݎ^{)*m2P@;z{/&bwaՃdLɘיӒX.@J! Er&UWs3Pz+=zgn>UrfXdrfD](?6lU Y!dFC/5itu3gxDA31>d9>&ρۻԳ ~Dg>v/LkkW6[ bQgwCy9$;Ѻ:;n\Kf\ ?U.C 3axTNRPqy͂|!ykϾ`4d%}<S/SM\!ժk"jDN lG܌<']&i!󢾱e&σ'hUwEtT[^~%WsٻssH >g5|{v3*t1a59 w4~mV!A`(w[GѶ?daVڃrrGzyIyq4hMGcŴuqcB@g%S'38"v/KẔNޡyr e& 7'uYƑ0 G򓉎gIb Ǖ V+?u' i lP>ki۱Lu6Lyn!͋{5)uߛIn;v?JC/^{y0Ǭ|LG&3J (3^ݩ/W5f#UihNe }Cq8y;@sySYU&{/&DݜC[H7F|N[8Xd6Gqv#BuvwTy; $ok =򟭚l,.əTnhzj,:C]ʌtyV>mczUp^41A-Fbw D1u/i>MF=j1Vڒ V70)RPqzRf᧻bKeыh8&z: <M"עG6#Ɉ&_O*)J[c -4.NjEqx;6V\O S&"/wT>J9 MTzߚ+9f>^țO棽&P Ʃk57klEs=ۋ#Ҝsb2~FypBO3q8E~p]D Z(l wЬpQXMj 8.F)TNqH[rz~zZ1BtBU-uy ƶ o[SCq#KӋsS15T;d5Lo7>eIӆI##C*P S\̍r-6'3{~z娦2yHZT 98m]o)j < Ɵ)Wncԉ 0ElG@:n?wr 0Je휏>fnl=ā8 cK| r\  crRհ4Uʋ\ f)ҫh$OV<'EjnkLW7xEяc]d :b_BX|VG=mCrKWuְ+ ǫ/RfTM>^G7ׯ2c"3naj,;+k;p6c-䄡g1&<\6m)NC~lCΤ_Hhߛ76_eb؄A8v"pDW2@nfA&_W& \P&% ,rGϟ GiG#)|\ !+ݙ{(;>?2+R}{Zқvh¢ϱ8}0V5' :GH{cҮЬƬ⋉lQfٻ=uc~֡'t$5voiipw.Ow.a8SwL!.SozN_.Gڙ\ZL)F6ּ07-[ 9n:oGyS:mKk;1@'*Q ^C\j0r98 ٫z. "tf0w) itqˠP^n;EU[_plj;Aj[~R[O OzF#.5p!VVk(J0R/dǐ|Kn([%/aw[i)?ނ YO]SY@]L4EaMTrlN\[2:3Ua1[;]z7[DA~xY kmj)yj鯾"ގcU&=m=Z%":xlGO-[ bƿuƽXQ1VJfҬ8u6ʌX=XGB ;d=sZI7kvQ[V|һF(' C * -$x]nsF;tڽ>0ɘ}fK@[,n%AtytZ߲_n}Y})Vkk-7_Q_ňPEνHY͙FTRκ!BrkE~mїu0\tf/YҬ iûCp%E!csWw3Bp E _(]?2<^W2jiji 0̥[X嵭l?"=/ d]ǀAX?Pved14ymi<("aqz9/9Q*Q&=W.1+i׷Y+H_;fJryࡩ~[1m%,>(5ls?`:ԩA E/iEP)?R%كVrI)e).K pb1(۱ [kOC:dB=a~:Յ9)!9U(FHٹc}jfY$O3ؖR]:$Ӡnħ9ggz%eE']&,INႊxFL07Vw:Yf3 DO EU5qF h*ʲ\•&1Ŷ3wHQqW&k?̐Alb}sI! %1pIem%mX1ω3a" ji"aM6i6sPl*  dHXq`FKwE1zҠ Iiys# ~ly|[Kȹ\CR#avs#1fU8H\|IEs!YءE8;Π[x6>P.D' =*\~;V.C=׏" 0 3TG퉊>_(}o\Gq8ά6CrOzW uiނ\ Q׬c "a6v~cQ/T l6?phq껨@,> ]:lyP7`] =DYqǻHYXu raO 2] i' 12$r+I"ԏt;E$V>L(Ad.- [RS.AFvx{Dt 2|h`@["uE'KF& avQX- X))Q*Ap$ Tdh%b]d]&mh뮔3=+~G+ d[{C1B !pG^]>#&N7K؅TqGr]ohɩ).֍Y!5fӖ KOS}g{~ mcH598r$c!D}~]jWT)]K zvDɭ¢Ytɯ/Gz_LXثh+Kq8we#!fI .} StS'81O4F*eVeZy.n\7qFX7UBMV}"s dsŤC68sf+y@h7-'EЫr&x66`D̘A1 Kv7"YW7*"AqÛOF|ku+>v]gE|mR!~x'#~Ï!p2LY(^kD¡wrh Wݪ1>ſp_8B "_EċM $]/G_Ռi%KQ_!/;=}& L>n,w;I{ }:h })gҺen^flfӷUDrA犝܁܆Aͫsq6̫[]R ؃k z]{Ƅ7Q$`ܯR!,~$kEu3 ͢k3`9<7Dƴ\.Yfq2Z=nAaUWp4p.{y|x"K,g]*UiU18qkv %ؿaS\ V){쀞?vR23"\7`bbid3\ݸc֢ mDs )W]Й݁d(XO\w^됀hasӳr~@O{՞v_s2 K+8Kl ټNi )S?asY/c )d3æ>&;͎P?#y.%9E6Ad^ڝT]p !V!,BN;_U3qhH V=ZdK6Q\!="ޘA_oGLZo΃ZWoXis]^xsvKA+NREEwGKł.1$(>]ކ$9B'؀NµIc`-֗\[=7?6~[m‡i>mhHJe쾞4ĊP)2xv[ . y܅VDdm{8Z C7@s!IsJ5{#yi4 &&f]VHLUښG#W5q62%~Py鑬T3FӀ̞^L'-tYi#c8M@av7qjL6\g_atϕ gB<#0xhӽ`UGl5\iP?|ٝUYudߕ puإ _~|C1 6C}I5>FVe@O&G*lTI6,1-z6{8HɒC*vf}GC'TmMbq$=fp'C1)Y'\jPգwyaY2Å)5>ij64Nɦf/Q'mT*:3@ Ӻ`yC~or*:C?{gsZ#ÍʢÿگHqA8$ 4\pu٨KM^nz2⎎,`drrGowuat"!" ΀z2>mF te۱WOFYvP""iҒtO˫ӑ*ɰJ]r ҏ b 4B{%4]0y&hRjwFGQ5Hf者z= gbόq[dDSP_<ɗQW!4-&Cb(lsݪ#Cy,6ǢG%4VЊQп9|O5}F!qZhȷd0>"0#Y}mt&W)ᰤBB6s54fĘ1ѝReDN&`אBG5# GW¹5l,[@tK^8=l8c" pqNle?[Ħ.);ᐳY>sXڷ9{a !7 wճ.I]_bE0J-)wsK+wo.r|#-$<;:~=N\tI0G~qm^6w 3gtWIHsF- #/0s <s&yׇWJD Q VT^@KGQ٭i *Ju,RLr@;ܽ8vRā5əfl`~jhw>Y2ΉdoD缥~m8G D bSC!fv-:XQ}ҁ.!PTu$:Q7ƚ,Kҫ8-Ik1{! q!TlՖQC߰&{YM4 Q# m2Pa^r' 7-4ᵈ\?@]:k-_EFU 5nGd-%Wq.&& Η~bMn1IMHZڟЬqS=`)5n,׊o(|/G)evpcZW*v= p}Bd+r]d%Ҫ%-k:h'v) d|pR2< bWi!6LޘeL%ŗ`ZDG)F{s{.']$UVo2#uf$vsMVa*ƚ eڴ@|°s.#"+蹝 hLtq"KЗdU'lh,!TmGU9Qy4nJ\5;,0nyf3-Ť$;8'v&'{k8AP&FKK̏M 4?k@3jj)@;Euo rfH &gɃJ7(fA3+A_oћᦣ qTuH\.*;@ܭf,_v)!TAjks=X‹KҐ'*)CNj' :o"**PfEp=ދ #6[98Bi'RR:X0Ā YٺcY[ȋ)W#E> ֺ!g^~%m~&{:Kc>vۘOOyS!VD4\NϊE-̞&sy-&rI?>Zo ?͘hM #& /y}^4;E1鲚mvoZWO,ǿ1uoԳ< LV"1ӥ0;w)PS!G[(~)C a`,=iFe`uxkG0ɡ"t$`JMt9t̤H C L\rMT/XΘ ٺ7t@|4CMYcyZ&Ԕqm˩o2֬/} )~s5SdtV&H ύ!{\sL5o} CD1ɹ7 :e$77tު[)ny|W`ݠV5V}uR6ce-nHb#t29qGe, 1lIN❠ʝWqQ8tG'c,PJ,~ Q ;y98g^,IW~6S)II]]&>;M*b?AK@1&sn kUw U!CGd$F5MAXM⤢ X6_=mݹ9j\evj頻ěDǪsY {r:{=F;*tV Χ}. RT% 3ntVMQK!ln:+Y[|=v;Qۋ3nȊA#Ͽܩ)8)?aNv)+lC,:tC]ŀ@fAW{hf8UzAǧ3 ( I |OP§ QIG6۞C`=,?27E:ED׭wBM 3zwBx^{V+x_? BhWT\Df'7LԄIQUOs;aTjفY66 P^҃$RX~UE/U2!5rl KabgZ6AA6iZА8Y,H?6j-ƞYtk # vPJCޞ2@㰍?%WY\ $pMK%+r#@~s|aV.BOKTe$;%CuT>%+JeQHr45?Xdc/ zI,s|8Iu듎 ]!}=ti:NjgHGNodܨ?l@\h>ͷ86O̊}qo|h4hx5ڙcmiA8-^hBRl -GD )^.i|lKBlږR6C?YT)EEQAiOvx`_}!OM<|zv9.FmP6c!n\ |Z2@%LjO,vM&ҝl*x o6Bs(Ki@<#}.Tt:t+E_ ;wrTu7)HvHǖHejPGć=v -įљ,Tww$U0[b@cѧDy5lSzg+ 058Mg @p\^7>vnn7/)bC>CI:hbtyiJDGn0X@htBIcMpPymnC ^ؙ !ESu p*,\eBp",xhu}qk)VdŤT$_;?Xrr#ֻ1Z3AG 7@x' P3Oj,3TsdH{v1=h6S iAI6M9Qݭa2YCh1%QC^. B~L6UJ~Ʀ@GMq?;!K҃y㸑6(+Βl=ӕdl!>+egJMFo'x ρ&4LkJ|0vXZ #Z{ 2x?i.3H[2 >ca'/ss{SD&E(]lˉMکl*hv`,0+5I:B2?3uNSFsXQGQ`b~b 򂰗k>ɺ:0|'rUMCJq'K&F|֣c\qxͭ|j^O-ws䠷4avMϸ/7P(5Ѕk7A? L:zk,>]TP͂ ,l X;$mAHe"oQZW>M% &sv4…u7D MUyXߒorìPuA{.Wb;$/wHyY"}X{RaBcuUxZ5r~|뚳A$>7 n~(/X?+dkwI;>\^s$xoFɉ{eL٪d93V=PS ;i^m @9(LtEe'` gRʙ{}Q*42rW<ὼ0WD<)+n|oz힊5pZB40@X}dS`%9&:h2ӇԙB\G*{-kCeDFo>8r4laƆIzK_F56Iӕ2Z.j̀JE(O ' Ol@4[df}[ KiW&5oLER?Y&هIDloth0F_dIfni% KQ)vVȆӐQ٨+"Oo³(?jٶ=4g(A$ T#&|OֺXaDrks3iSoX}Q.qp|u'dM_plAfc7_ =!BRB.<kJe5Eٹ. )|wvWr"mƌ>LJZeTp0%֬Llz'({C"6OӁ'HV5e{ÌO &\~#HZu=b&lh]SmYO,|sSdKw#+[0DD(Wc>ZlK:DAׯ7,fNHPaƵ{h_msxsK!ߓ~E} Һ=ﷀFB 1b>6Ad*zT&ܸ)y1>љ钃M!/gT|\=1kYl _Hzo~t'kd-܁?I"NHa~*8*&IuK.O{+'ZM {l'~bw:VkBgd'Yx, a1Ebִ<$YE߆`k733K J. G;( .GI~B^$N噘3yB"1 ؽ'6TjXXƤגO8Jh6?~ӡ>ʱe=L0qɆ%#"]Eh(s Cncd$ǎ;ռXk*@!_f\0v8WJv#h i{/L,v-%]{Dx0`U|ѐ~4e,$x4e< ?F/=F9i#q`}(RÔvzg#?KՏY\p{ϼS~gV?l}4CWz[n"CȫEdj=taO^W7%tDdGY8Eg!;fZV4WYztڢ7N6ьì tHBfIG[0՟{DtF߇=)K:w٪{k]$TËaNJ-PV^=l|J{s'ic\D͢xJys!Swb}-?LU6zo! > ,^|Id.~ "۽FjqV]O 2Wr9 ʮR~+5SPղ{'g@Ε؞vu\4*/P`$bZE9wY(sh<LΜI.۟m?ӆb'Чݩqd4-G[vYZ-\fU= {MM Kf4WHu:ۭSEG*9$ZqBg( wSZ,0ڱ*kTnWr טKSzx  Oy$XJ0ϫN P sX;Q1_6#&6򱟻ߙn<Ox&EA!8F 3n^zO(¥NO׍؝`E1Vw-7q5w?5MgP菱 6B!C%D j HŹxm.bPc/hDs==0x2nl܂U:"Ѭ4[fvjONZ BQ/0,mqˢ̎Y泳~᱄ "iP'#萯+1 Йee+CWD෮6.C U`j[̣jL~Q 3s;BQî! 2@|oJFZ}ĺhT^Dq^7d(͸/X=}J2d@EN 7z5 %-1l7K߯@4B-H !(o8F Kcך DW?'Z XkiǒwZ+aA:hl!@jWIJR)-rLD} .3ĎN؈Źpq`Əi[8g}' q铀0)m= /*;a!Eyfzٽ(Ku^c}P9c$}JҟlpVٽ[бZ NKWGgfPF$ $9ZI cT-\,A,q4n*Q^p绳f{YL:D ~Mζ&٩ÜLŰ M:L(SFH_iU2dV:oqMFX%/g w+?ݑZfԐ409ubV(فR? gaG0k a (+_KUrFy쐒dߤsk#gU .48>?54ǰf*V{RĞ5c Åu]r.ȥ!FQ]`+)GrQ+e>aG'vm 4ӭscnh6q8jߖSIX;xzQڅa&RT_dFZJ4"!}5Xf|S4|~g<4}bg4$/եXx1R?Pg 0!N,\˟(r2j 1€BMly"2MB2%~4:;}$<>8*\+ NP\0(=s|!l jQq_ '|zk-BYjTT><(y`6M3>ZLʬqH`yXss׷H|K_Zz u D.ȥxI?ŚZ,"E55BvlCD(tn#{Toj|kf̓pn>=D@o3P/`+yIVЅj)5A X{'sܶ`I1'{?,'g.'8ɫ5ZEsB`0U(!XjJ;KYRܱ4"UԂTgdwV$5[\[Q=k( lu[Ihc3=k )yA&ޮAќmk?s=zY %#TLoHoj" ğq>٪+2NDsOoAQ,7Ϟz]l+yHCմb \QB=OR0X NX=B:E2l]/)l gQW8Avo5/8fxBe/:5>CH\חhpTv· \цNds짧^ר j*P<VifrÚJj9!M= eT%az=BV.%چ 0Sh"`^0Uz<6`݁ G??p",U n,˾>,}3 evY~$l{YbSGqPJñZXVc; NZeSC*R m_@t3#35)5;#`[z#9^O!/pyGo2~JRuncjRf,lŐ!Z8Xj)rw"2A Wڰ3vyFn*VR{$u^=O< :[h_!q ܃qP A6c0nS Ԟ,;Lb)UEڀ'SRNa~DmDҧd^ Hƣ^鉉w{9@ulВ @R\ kTs]&9sB s-n Dؾpa$M2ar )& THI!>KuAGUUVK1[*xV)ТNA. C؀! UgJRU4oפ?wk7FyA֮LĘ-bCgޱWC+~M fޥcihK"~>;Z%W͸߻ݢVds#/69Cxc<Z@jTwTS&ƖAZQ͘ 10+4BhGvm}%agކV,#|f.o*kuhΊ:VckQ@Oᥩ@6MCriS^#o~̟c$d/8hq Y3Qu0%M 9^&˿08ϗt f.PwǕUo4j0e/^c?{HbA%ݙaXc|BslA1 `P?lʄ`y(K>=ӹv0ܱ1k vC@ӳJ6z6J%Dz#^J]swAx 9ֻ[" 7br$=Z,ނժ c?COrZ4{HWu?zpeBg'_K=lhڏjm& gSd8q j]Fy2뎴b)ʉ~hi,"ug9&仴e`znh! m` =e (&C1kvʉ̳9偼?!VO#s&=ܡaN,؟20LZ>tuY(hXqXd1* oC=̆j{fTJ0OŰ6vR/jYޢߒCai׵ o7Z3ڊeNfQۂȉl:?"0[Vv/3[,*!6V+xG&ONktI[ߵ3"n.hլ"5s'+Lqv4W;c9bkbAOtAf/RACQa"V=E7[K kn4 23ń6RX͞'ty]מvn dXר#tUւI%Š8- g?k<@H{aӆ{CJm6ף(2KD0*MqBmRغB,T\Vxm8t"h{ƞtK_^_ _GrjInx+/7XQ 6~܉ ڛ1kbV﫲,oIuZ\E'{}hV⛻rxyߕ3rH%C~%VPmO~šAlbֻ"|HV7UfLy zkaHTvk7lޮ*"_H|[7X&HJ툒S__}@"-Eh%nߧ\Ig='!6_GismNqnjQ*FMëM4$#rm1XzZGw4\EJ+4)E_w^+RAS![O?~xHTꙞg[6SW-Y4xं=D;łRW R ]>"x%I44%w)㏛ۆki櫴fy/ր2Rh\w7 o$Eg̎?zmmM ԝLAc)A$, pvG DFͲeh&D&1M^ZrH0Vs~v#7Z40+v_xQQê%7TF86ӷӲѵv{a.Y1 kFCFnrԷB;CC}˾R/w!\QP}wlų:=.Vs]kxŔ .bjU<T Ćp )ZJꇤk>n U U8x-QK; {QVPE2Pm"GǎU.|3nܬ#b{8X2۫}%쁖w"C҄Uzc0 4ɟ-g )M7U>eNq!jӰ!ԙZ="-"j(զ)9*Ȯo 4)RY"Wu q;r T3|: $#.~cK~u 45c}'9Dcd"`7up|zË\Ā3[[`涑@x4>1Ls9S^A[[_?p'a6sXS"o07i*RNVP5d h"w!\nӣގ5Pm 4xc1s([A;kC.v:)b oGH0!,dy%m5*Kr `$ |utގ2 dBRkб )_J/(acXOc*`ɽ\lY{10reNb?)΋;t?%z? 5j>,Kt5BJ><AQ8VyR`oDؕq:Ps#F0eҭaoL|\*/"d~nm(R9H\]aĠAxN=h(㓰Gg/EZBEOkVqaC,Qn>6^?ntrPkIv@5 f\}+=K Q̖w^ 0JvESXDV["n`Yy~لM-6Tق`i+j9)tm&gj)t0BP-j2OLLsELwT ] ȅ@_-*n2V\2-(kW Eovt8)+UE+0!wؑ ;ng&a?nKF?a/(?_M6RC+w8zCo뷳@rMB\UcQly^'/"7ьgÔ<6%}*kE8>It'fthWL{=`Zr(lFj}MZ*[9x8[V(Ѫxs©_XYR2+oZW<_ Vv".[yЕ"_.(t} =@4H[I+JiT0f#]Pû,wL7ۺBֿ*K/xra44}9f,}"N9GGW}b&b2#ed_OE?OP(nƃ$LT`VY (ǹo$x%f Fy0E5K̾(ynxCxu:߶ygcUNtׂrcȨvIjWPuݎ5 )8r4 tb)z"uD}Wĵٕ`vҩl< 6\H$9;~^ p8[$%=r mTV o%BKifձ, _?pұ1ʍ:~-B dfک$U'"c[ojSo_ac9!!jn0N 2]LF~V w|K.' Q jlxdZg{'=xn}o"4$ *]z)&v? iqe|jFix^EM:+bΌ[Ξrat8( =d%Jo=d30VOz Q- >Fјiޫ'utꚱsӔ1r*10Sb vNCi 8q)V0LpoNLK`5_͘Эxzg KW[%mF1pv,TF k!UgLWkZiz_$œKfH[&G^ib@>"P1]Z<Jf;r(ͲP\TEe> t)QP$0+KdDPt8y*@9CQ5~1X W`xO-'h>cllJ/]R @2Y׳xIB{a2J2| r( }"J8')n/ VNo}Dݮ$$ / 4|7z  ME?'YC7-d3=j;O'́z\ڠM_M_ M/3'njb9!ljKlAV5@`[4M r٢4d{\6Y| [rdNvb<Ǿ=S i9̑"fЌ `Iq5&^[UGbM†$Oޑ!~̪0VRp ӷ g)RP\ Ghwuk4s9ZvKVn ynPzi"<=hD /kn. `NGߴ p9ɮ**0)!"f*m޹7d~ïpŭ^$Ǖ_l4u0"1AUbAlEncz3'{?pV4 =صP*F_K165Vqf$o ֕ :nK%~=P~LQ9xF܏s}j!8ݴyz w,ʙ8Mfk; b*X,ԣcXUSNjP~/' "d%Y9> |#5?q9 0@'(x8;"wܓ:jQL] U}c8pL[?fF׺?%lXs۔" sLUAX@f:+@7|UM'HުCl"#/]=Q\]M(6%+^ 丗9aD="%oKJp;2P`SQh/ȯ4}`YnG[AvHF16 woe`Ķ C;$C.R-XBIW;DZŸ- J1.4>z*ȼ肄xWH(m4Q~)4}e5.HЯoE8}ॳފʈKoϻpUSfc)A!7Em.EF;$身υPĢG%95~t}rĿ 4 ӷ{mv*r(e/*W%Uʷ,tקIFf"{>Ɲ[ֶ&>Z&;MVpw3` DiX fd82~RZ%h7rݔrbCrEZ`}Xu%LlnsHZ`"fY!t{1( "֝t,̑8H)+ogqmor!y(ngyKYcLF;^`*&9ۈ+c8Cxm-戁(F<}1%FZ`oBʗ*D&RӐ HQ@Uu#tM3{tbL55ȼ fS6|-T1BJ![IR3~,3h_/pW[3f <\) 7gS)ʵ#V&ݹ`5#t<{1\B %L3\\ix:}1 ph⊭s:?VU|$l qgfL}S4Dd|>X}nIT#I:Hy "R(+/gE4a20@ p#L&9Zw*MLUrX˖te3?s 8"Z3xqA6a}vz6.RogZ^f@dlƝm*T= ` BQA8QIo^#7sXܵBaiޯG&M$ٜo1&mla(8yO9l> !{Nn(,v,=չַPV3 1F^`U Xl}0r%krhp`ۼQ.ou?Fs &xЯIe 8 8NKh9g}zLmP?2H"2ad [؆Ƭz(.){}yC4=*pнagM MtUKй,<P M$ȘvڴɆl lF,{Op~7Bhh 7O+<ǹۯ1kPd@{&JtTАF|(ۅ@xW/"=\ބ ;ȁVcNK1Q5O6oC1ZEiAi2,[褠-jmum3,pj % ȊJX 6;~EOT!65}q˛ Cr8JZ|A5(R&> iY~b3H؂ .$_#&` XЭ_Tm  ?#\ƵZ.S7|Nh|28Fd{0׬%G[QDMv\ ]5'C`#$|&A؇*\(}ȕKd*4KE ($ d++>9V>1u,w,QJ m)yS|k;w_Z38_(,Eyq6'~5V-ʺqv7jqfzt BlX,>봲Tb u7o )R=QU;?V)CfEQI`VeG -Ar"jA& DBm!`W7Z߻f{,H^ a5z?6^ć_zb NG-WA$(:WQ!ﻶ s;AΗ{ ?uT[1#kħ+ܺ:**drxr7=[>Z8ce@>r ֑g"BkW,z&WJ SgL\J_[$;*-^~6N6! ^8\&` @:ګP4+(_a-%rpvnp3\Cgutr8MUːŽfٺ l !$6,%FL^[^k_/n/Xd&=";D`tgȳU񤵛S5<Ƅ+w\ifh G^6F9GNj 7zfR =>|0*TlmdQy݃06ww먙N &*TG`n 5CQl1^C͜8Z-!F!;@||~)TrJQ>,a6Z8e֪:v$`jH)b y8*bТw шB d9cx_=mLhJ ڨAPD|X[_;ʻJfmD( f4܉(NfTi\Su1yuZ]U @`iouLiv1oZtlg&?n$ F YW_X. J#>J>pXs3 A]gl%й,/Ʃܤ1KUId!R8T\b\Pmu#++UTĹlo戄ޤ?0upݖzJ)U_XBcJ1H qi8I5TEPZ!P0nT%EY*s-'ƸS<`j;C6ɟSb??^ti.g