kernel.te: drop "auditallow kernel domain:process setsched"
This is one of the top SELinux audit messages and it's happening
A LOT. Stop auditing it until we are prepared to spend time
debugging the problem.
Change-Id: Ifb27cd8afffc40389dd4bfa28c11f2573d19a493
diff --git a/sepolicy/kernel.te b/sepolicy/kernel.te
index dd801ad..656f9ca 100644
--- a/sepolicy/kernel.te
+++ b/sepolicy/kernel.te
@@ -1,3 +1,2 @@
# TODO - root cause why the kernel generating this denial.
allow kernel domain:process setsched;
-auditallow kernel domain:process setsched;