diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index b487fd4..49ac3fd 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -1584,6 +1584,24 @@ interface(`userdom_manage_user_home_content_dirs',`
########################################
##
+## Delete directories in a user home subdirectory.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`userdom_delete_user_home_content_dirs',`
+ gen_require(`
+ type user_home_t;
+ ')
+
+ allow $1 user_home_t:dir delete_dir_perms;
+')
+
+########################################
+##
## Do not audit attempts to set the
## attributes of user home files.
##
@@ -1696,6 +1714,24 @@ interface(`userdom_dontaudit_write_user_home_content_files',`
########################################
##
+## Delete files in a user home subdirectory.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`userdom_delete_user_home_content_files',`
+ gen_require(`
+ type user_home_t;
+ ')
+
+ allow $1 user_home_t:file delete_file_perms;
+')
+
+########################################
+##
## Do not audit attempts to write user home files.
##
##
@@ -1840,6 +1876,24 @@ interface(`userdom_manage_user_home_content_symlinks',`
########################################
##
+## Delete symbolic links in a user home directory.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`userdom_delete_user_home_content_symlinks',`
+ gen_require(`
+ type user_home_t;
+ ')
+
+ allow $1 user_home_t:lnk_file delete_lnk_file_perms;
+')
+
+########################################
+##
## Create, read, write, and delete named pipes
## in a user home subdirectory.
##