diff --git a/policy-f25-base.patch b/policy-f25-base.patch
index 8e59d9a..068de1a 100644
--- a/policy-f25-base.patch
+++ b/policy-f25-base.patch
@@ -50313,7 +50313,7 @@ index db7597682..c54480a1d 100644
+/var/tmp/hsperfdata_root gen_context(system_u:object_r:user_tmp_t,s0)
+
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
-index 9dc60c6c0..dfb1d27b5 100644
+index 9dc60c6c0..3a90e5469 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
@@ -53614,7 +53614,7 @@ index 9dc60c6c0..dfb1d27b5 100644
## Create keys for all user domains.
##
##
-@@ -3435,4 +4633,1817 @@ interface(`userdom_dbus_send_all_users',`
+@@ -3435,4 +4633,1835 @@ interface(`userdom_dbus_send_all_users',`
')
allow $1 userdomain:dbus send_msg;
@@ -53842,6 +53842,24 @@ index 9dc60c6c0..dfb1d27b5 100644
+
+########################################
+##
++## dontaudit manage files /root
++##
++##
++##
++## Domain to not audit.
++##
++##
++#
++interface(`userdom_dontaudit_manage_admin_files',`
++ gen_require(`
++ type admin_home_t;
++ ')
++
++ dontaudit $1 admin_home_t:file manage_file_perms;
++')
++
++########################################
++##
+## RW unpriviledged user SysV sempaphores.
+##
+##