kernel.te: drop "auditallow kernel domain:process setsched"

This is one of the top SELinux audit messages and it's happening
A LOT. Stop auditing it until we are prepared to spend time
debugging the problem.

Change-Id: Ifb27cd8afffc40389dd4bfa28c11f2573d19a493
diff --git a/sepolicy/kernel.te b/sepolicy/kernel.te
index dd801ad..656f9ca 100644
--- a/sepolicy/kernel.te
+++ b/sepolicy/kernel.te
@@ -1,3 +1,2 @@
 # TODO - root cause why the kernel generating this denial.
 allow kernel domain:process setsched;
-auditallow kernel domain:process setsched;