diff --git a/policy/modules/apps/games.if b/policy/modules/apps/games.if
index c136e1f..7ac736d 100644
--- a/policy/modules/apps/games.if
+++ b/policy/modules/apps/games.if
@@ -30,3 +30,22 @@ interface(`games_role',`
ps_process_pattern($2, games_t)
allow $2 games_t:process signal_perms;
')
+
+########################################
+##
+## Allow the specified domain to read/write
+## games data.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`games_rw_data',`
+ gen_require(`
+ type games_data_t;
+ ')
+
+ rw_files_pattern($1, games_data_t, games_data_t)
+')
diff --git a/policy/modules/apps/games.te b/policy/modules/apps/games.te
index b090917..c1e48d6 100644
--- a/policy/modules/apps/games.te
+++ b/policy/modules/apps/games.te
@@ -1,5 +1,5 @@
-policy_module(games, 2.0.1)
+policy_module(games, 2.0.2)
########################################
#
diff --git a/policy/modules/apps/loadkeys.te b/policy/modules/apps/loadkeys.te
index e7aa67d..bd75a77 100644
--- a/policy/modules/apps/loadkeys.te
+++ b/policy/modules/apps/loadkeys.te
@@ -1,5 +1,5 @@
-policy_module(loadkeys, 1.5.0)
+policy_module(loadkeys, 1.5.1)
########################################
#
@@ -40,6 +40,7 @@ locallogin_use_fds(loadkeys_t)
miscfiles_read_localization(loadkeys_t)
userdom_use_user_ttys(loadkeys_t)
+userdom_list_user_home_dirs(loadkeys_t)
optional_policy(`
nscd_dontaudit_search_pid(loadkeys_t)
diff --git a/policy/modules/apps/mplayer.fc b/policy/modules/apps/mplayer.fc
index ab54284..e1fe850 100644
--- a/policy/modules/apps/mplayer.fc
+++ b/policy/modules/apps/mplayer.fc
@@ -8,6 +8,7 @@
#
/usr/bin/mplayer -- gen_context(system_u:object_r:mplayer_exec_t,s0)
/usr/bin/mencoder -- gen_context(system_u:object_r:mencoder_exec_t,s0)
+/usr/bin/vlc -- gen_context(system_u:object_r:mplayer_exec_t,s0)
/usr/bin/xine -- gen_context(system_u:object_r:mplayer_exec_t,s0)
HOME_DIR/\.mplayer(/.*)? gen_context(system_u:object_r:mplayer_home_t,s0)
diff --git a/policy/modules/apps/mplayer.if b/policy/modules/apps/mplayer.if
index 8944655..1f9adca 100644
--- a/policy/modules/apps/mplayer.if
+++ b/policy/modules/apps/mplayer.if
@@ -67,6 +67,25 @@ interface(`mplayer_domtrans',`
########################################
##
+## Execute mplayer in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+#
+interface(`mplayer_exec',`
+ gen_require(`
+ type mplayer_exec_t;
+ ')
+
+ can_exec($1, mplayer_exec_t)
+')
+
+########################################
+##
## Read mplayer per user homedir
##
##
diff --git a/policy/modules/apps/mplayer.te b/policy/modules/apps/mplayer.te
index 83c177c..fe54f00 100644
--- a/policy/modules/apps/mplayer.te
+++ b/policy/modules/apps/mplayer.te
@@ -1,5 +1,5 @@
-policy_module(mplayer, 2.0.0)
+policy_module(mplayer, 2.0.1)
########################################
#
diff --git a/policy/modules/apps/slocate.te b/policy/modules/apps/slocate.te
index 01915af..17914c9 100644
--- a/policy/modules/apps/slocate.te
+++ b/policy/modules/apps/slocate.te
@@ -1,5 +1,5 @@
-policy_module(slocate, 1.8.0)
+policy_module(slocate, 1.8.1)
#################################
#
@@ -22,7 +22,7 @@ files_type(locate_var_lib_t)
#
allow locate_t self:capability { chown dac_read_search dac_override fowner fsetid };
-allow locate_t self:process { execmem execheap execstack };
+allow locate_t self:process { execmem execheap execstack signal };
allow locate_t self:fifo_file rw_fifo_file_perms;
allow locate_t self:unix_stream_socket create_socket_perms;
@@ -46,6 +46,8 @@ files_read_etc_files(locate_t)
fs_getattr_all_fs(locate_t)
fs_getattr_all_files(locate_t)
+fs_getattr_all_pipes(locate_t)
+fs_getattr_all_symlinks(locate_t)
fs_list_all(locate_t)
fs_list_inotifyfs(locate_t)