shamu: Allow rild to parse through procfs

Cherry-pick of commit 9573ae22f50c9afdaf16fb91cf8ea0185e89a39b.

rild needs to obtain the pid of netmgrd to establish unicast
netlink message communication with netmgrd. rild does this
currently by parsing through procfs and hence needs access
to netmgrd domain.

Also suppress other audit logs triggered by this procfs search
until the underlying mechanism is replaced.

Addresses the following denials:

   type=1400 audit(2567.649:197): avc: denied { search } for pid=1190 comm="rild" name="1" dev="proc" ino=11739 scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=dir permissive=0
   type=1400 audit(1548.919:122): avc: denied { read } for pid=1181 comm="rild" name="stat" dev="proc" ino=14756 scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
   type=1400 audit(2167.259:82): avc: denied { open } for pid=1183 comm="rild" path="/proc/1/stat" dev="proc" ino=4086 scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
   type=1400 audit(2587.889:125): avc: denied { getattr } for pid=1164 comm="rild" path="/proc/1/stat" dev="proc" ino=25356 scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
   type=1400 audit(2587.889:1257): avc: denied { search } for pid=1164 comm="rild" name="2" dev="proc" ino=25252 scontext=u:r:rild:s0 tcontext=u:r:kernel:s0 tclass=dir permissive=0
   type=1400 audit(3925.959:261): avc: denied { search } for pid=1176 comm="rild" name="297" dev="proc" ino=10500 scontext=u:r:rild:s0 tcontext=u:r:ueventd:s0 tclass=dir permissive=0

Bug: 18173330
Change-Id: Id36d838fa03c4c7b7d9dbd417549f0294ca2183e
diff --git a/sepolicy/rild.te b/sepolicy/rild.te
index ebf438e..222013c 100644
--- a/sepolicy/rild.te
+++ b/sepolicy/rild.te
@@ -17,3 +17,8 @@
 allow rild audio_cutback_data_file:sock_file create_file_perms;
 # why?
 allow rild audio_cutback_data_file:dir setattr;
+# rild needs to parse through /proc to obtain pid of netmgrd
+r_dir_file(rild, netmgrd)
+# b/18352920 suppress denials until the procfs lookup is removed
+dontaudit rild domain:dir r_dir_perms;