diff --git a/refpolicy/policy/modules/system/unconfined.if b/refpolicy/policy/modules/system/unconfined.if index 23a7b97..6e12ad1 100644 --- a/refpolicy/policy/modules/system/unconfined.if +++ b/refpolicy/policy/modules/system/unconfined.if @@ -248,22 +248,6 @@ interface(`unconfined_dontaudit_rw_tcp_socket',` ######################################## ## -## Add the unconfined domain to the specified role. -## -## -## Domain allowed access. -## -# -interface(`unconfined_role',` - gen_require(` - type unconfined_t; - ') - - role $1 types unconfined_t; -') - -######################################## -## ## Add an alias type to the unconfined domain. ## ## diff --git a/refpolicy/policy/modules/system/unconfined.te b/refpolicy/policy/modules/system/unconfined.te index ce40afb..486a30d 100644 --- a/refpolicy/policy/modules/system/unconfined.te +++ b/refpolicy/policy/modules/system/unconfined.te @@ -25,6 +25,12 @@ unconfined_domain_template(unconfined_t) logging_send_syslog_msg(unconfined_t) ifdef(`targeted_policy',` + # compatibility for switching from strict + dominance { role secadm_r { role system_r; }} + dominance { role sysadm_r { role system_r; }} + dominance { role user_r { role system_r; }} + dominance { role staff_r { role system_r; }} + allow unconfined_t self:system syslog_read; dontaudit unconfined_t self:capability sys_module; @@ -120,5 +126,7 @@ ifdef(`targeted_policy',` ') ') dnl end TODO + + # FIXME: typeattribute unconfined_t direct_run_init; ') diff --git a/refpolicy/policy/modules/system/userdomain.te b/refpolicy/policy/modules/system/userdomain.te index a108cbd..03861f3 100644 --- a/refpolicy/policy/modules/system/userdomain.te +++ b/refpolicy/policy/modules/system/userdomain.te @@ -64,9 +64,6 @@ ifdef(`targeted_policy',` files_associate_tmp(user_home_dir_t) fs_associate_tmpfs(user_home_dir_t) - unconfined_role(user_r) - unconfined_role(sysadm_r) - # dont need to use the full role_change() allow sysadm_r system_r; allow sysadm_r user_r;