diff --git a/refpolicy/policy/modules/system/unconfined.if b/refpolicy/policy/modules/system/unconfined.if
index 23a7b97..6e12ad1 100644
--- a/refpolicy/policy/modules/system/unconfined.if
+++ b/refpolicy/policy/modules/system/unconfined.if
@@ -248,22 +248,6 @@ interface(`unconfined_dontaudit_rw_tcp_socket',`
########################################
##
-## Add the unconfined domain to the specified role.
-##
-##
-## Domain allowed access.
-##
-#
-interface(`unconfined_role',`
- gen_require(`
- type unconfined_t;
- ')
-
- role $1 types unconfined_t;
-')
-
-########################################
-##
## Add an alias type to the unconfined domain.
##
##
diff --git a/refpolicy/policy/modules/system/unconfined.te b/refpolicy/policy/modules/system/unconfined.te
index ce40afb..486a30d 100644
--- a/refpolicy/policy/modules/system/unconfined.te
+++ b/refpolicy/policy/modules/system/unconfined.te
@@ -25,6 +25,12 @@ unconfined_domain_template(unconfined_t)
logging_send_syslog_msg(unconfined_t)
ifdef(`targeted_policy',`
+ # compatibility for switching from strict
+ dominance { role secadm_r { role system_r; }}
+ dominance { role sysadm_r { role system_r; }}
+ dominance { role user_r { role system_r; }}
+ dominance { role staff_r { role system_r; }}
+
allow unconfined_t self:system syslog_read;
dontaudit unconfined_t self:capability sys_module;
@@ -120,5 +126,7 @@ ifdef(`targeted_policy',`
')
') dnl end TODO
+
+ # FIXME:
typeattribute unconfined_t direct_run_init;
')
diff --git a/refpolicy/policy/modules/system/userdomain.te b/refpolicy/policy/modules/system/userdomain.te
index a108cbd..03861f3 100644
--- a/refpolicy/policy/modules/system/userdomain.te
+++ b/refpolicy/policy/modules/system/userdomain.te
@@ -64,9 +64,6 @@ ifdef(`targeted_policy',`
files_associate_tmp(user_home_dir_t)
fs_associate_tmpfs(user_home_dir_t)
- unconfined_role(user_r)
- unconfined_role(sysadm_r)
-
# dont need to use the full role_change()
allow sysadm_r system_r;
allow sysadm_r user_r;