Fix sepolicy denials for imsdatadaemon

04-03 19:07:45.885  1240  1240 I auditd  : type=1400 audit(0.0:612): avc: denied { read write } for comm="imsdatadaemon" name="diag" dev="tmpfs" ino=28065 scontext=u:r:ims:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file permissive=0
04-03 19:07:45.985  1240  1240 I auditd  : type=1400 audit(0.0:613): avc: denied { read write } for comm="imsdatadaemon" name="diag" dev="tmpfs" ino=28065 scontext=u:r:ims:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file permissive=0
04-03 19:07:45.985  1240  1240 W imsdatadaemon: type=1400 audit(0.0:613): avc: denied { read write } for name="diag" dev="tmpfs" ino=28065 scontext=u:r:ims:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file permissive=0
04-03 19:07:45.985  1240  1240 W imsdatadaemon: type=1400 audit(0.0:617): avc: denied { read write } for name="diag" dev="tmpfs" ino=28065 scontext=u:r:ims:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file permissive=0
04-03 19:07:45.985  1240  1240 I auditd  : type=1400 audit(0.0:617): avc: denied { read write } for comm="imsdatadaemon" name="diag" dev="tmpfs" ino=28065 scontext=u:r:ims:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file permissive=0

Bug: 140759525
Test: Check sepolicy denials on boot up
Change-Id: Iddee22f35116fb49487e7ead0e4b6f6958b3801a
diff --git a/vendor/qcom/common/ims.te b/vendor/qcom/common/ims.te
index c8aea1e..871069b 100644
--- a/vendor/qcom/common/ims.te
+++ b/vendor/qcom/common/ims.te
@@ -42,3 +42,5 @@
 binder_call(ims, cnd)
 
 dontaudit ims kernel:system module_request;
+
+dontaudit ims diag_device:chr_file rw_file_perms;