diff --git a/policy/modules/apps/ada.fc b/policy/modules/apps/ada.fc
deleted file mode 100644
index f1502de82..000000000
--- a/policy/modules/apps/ada.fc
+++ /dev/null
@@ -1,5 +0,0 @@
-/usr/bin/gnatbind -- gen_context(system_u:object_r:ada_exec_t,s0)
-/usr/bin/gnatls -- gen_context(system_u:object_r:ada_exec_t,s0)
-/usr/bin/gnatmake -- gen_context(system_u:object_r:ada_exec_t,s0)
-
-/usr/libexec/gcc(/.*)?/gnat1 -- gen_context(system_u:object_r:ada_exec_t,s0)
diff --git a/policy/modules/apps/ada.if b/policy/modules/apps/ada.if
deleted file mode 100644
index e514e8a90..000000000
--- a/policy/modules/apps/ada.if
+++ /dev/null
@@ -1,45 +0,0 @@
-## GNAT Ada95 compiler.
-
-########################################
-##
-## Execute the ada program in the ada domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
-interface(`ada_domtrans',`
- gen_require(`
- type ada_t, ada_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, ada_exec_t, ada_t)
-')
-
-########################################
-##
-## Execute ada in the ada domain, and
-## allow the specified role the ada domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
-interface(`ada_run',`
- gen_require(`
- attribute_role ada_roles;
- ')
-
- ada_domtrans($1)
- roleattribute $2 ada_roles;
-')
diff --git a/policy/modules/apps/ada.te b/policy/modules/apps/ada.te
deleted file mode 100644
index 8d42c97ae..000000000
--- a/policy/modules/apps/ada.te
+++ /dev/null
@@ -1,27 +0,0 @@
-policy_module(ada, 1.5.0)
-
-########################################
-#
-# Declarations
-#
-
-attribute_role ada_roles;
-roleattribute system_r ada_roles;
-
-type ada_t;
-type ada_exec_t;
-application_domain(ada_t, ada_exec_t)
-role ada_roles types ada_t;
-
-########################################
-#
-# Local policy
-#
-
-allow ada_t self:process { execstack execmem };
-
-userdom_use_user_terminals(ada_t)
-
-optional_policy(`
- unconfined_domain(ada_t)
-')
diff --git a/policy/modules/system/unconfined.fc b/policy/modules/system/unconfined.fc
index 519f2bf16..075d51aa3 100644
--- a/policy/modules/system/unconfined.fc
+++ b/policy/modules/system/unconfined.fc
@@ -2,11 +2,17 @@
# e.g.:
# /usr/local/bin/appsrv -- gen_context(system_u:object_r:unconfined_exec_t,s0)
# For the time being until someone writes a sane policy, we need initrc to transition to unconfined_t
+/usr/bin/gnatbind -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
+/usr/bin/gnatls -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
+/usr/bin/gnatmake -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
+
/usr/bin/valgrind -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
/usr/bin/vncserver -- gen_context(system_u:object_r:unconfined_exec_t,s0)
/usr/lib/ia32el/ia32x_loader -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
+/usr/libexec/gcc(/.*)?/gnat1 -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
+
/usr/local/RealPlayer/realplay\.bin -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
ifdef(`distro_debian',`
diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te
index 0936dadb1..55cd2b9ea 100644
--- a/policy/modules/system/unconfined.te
+++ b/policy/modules/system/unconfined.te
@@ -16,8 +16,8 @@ userdom_manage_tmpfs_role(unconfined_r, unconfined_t)
type unconfined_exec_t;
init_system_domain(unconfined_t, unconfined_exec_t)
-type unconfined_execmem_t;
-type unconfined_execmem_exec_t;
+type unconfined_execmem_t alias ada_t;
+type unconfined_execmem_exec_t alias ada_exec_t;
init_system_domain(unconfined_execmem_t, unconfined_execmem_exec_t)
role unconfined_r types unconfined_execmem_t;
@@ -69,10 +69,6 @@ ifdef(`init_systemd',`
')
')
-optional_policy(`
- ada_domtrans(unconfined_t)
-')
-
optional_policy(`
apache_run_helper(unconfined_t, unconfined_r)
apache_role(unconfined_r, unconfined_t)