diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index b487fd4..49ac3fd 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -1584,6 +1584,24 @@ interface(`userdom_manage_user_home_content_dirs',` ######################################## ## +## Delete directories in a user home subdirectory. +## +## +## +## Domain allowed access. +## +## +# +interface(`userdom_delete_user_home_content_dirs',` + gen_require(` + type user_home_t; + ') + + allow $1 user_home_t:dir delete_dir_perms; +') + +######################################## +## ## Do not audit attempts to set the ## attributes of user home files. ## @@ -1696,6 +1714,24 @@ interface(`userdom_dontaudit_write_user_home_content_files',` ######################################## ## +## Delete files in a user home subdirectory. +## +## +## +## Domain allowed access. +## +## +# +interface(`userdom_delete_user_home_content_files',` + gen_require(` + type user_home_t; + ') + + allow $1 user_home_t:file delete_file_perms; +') + +######################################## +## ## Do not audit attempts to write user home files. ## ## @@ -1840,6 +1876,24 @@ interface(`userdom_manage_user_home_content_symlinks',` ######################################## ## +## Delete symbolic links in a user home directory. +## +## +## +## Domain allowed access. +## +## +# +interface(`userdom_delete_user_home_content_symlinks',` + gen_require(` + type user_home_t; + ') + + allow $1 user_home_t:lnk_file delete_lnk_file_perms; +') + +######################################## +## ## Create, read, write, and delete named pipes ## in a user home subdirectory. ##