Grant untrusted_app dir access to asec_apk_file.

untrusted_app lost all of the domain_deprecated permissions in N,
including the ability to read asec_apk_file dirs.  This is used for
forward locked apps.

Addresses the following denials:
avc: denied { search } for name="asec" dev="tmpfs" ino=9298 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:asec_apk_file:s0 tclass=dir permissive=0
avc: denied { getattr } for path="/mnt/asec" dev="tmpfs" ino=9298 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:asec_apk_file:s0 tclass=dir permissive=0

Bug: 30082229
Change-Id: I44119f218433b9009cf8d09d0ee5f8a13cc15dd9
diff --git a/untrusted_app.te b/untrusted_app.te
index 6bc6843..4b0fd56 100644
--- a/untrusted_app.te
+++ b/untrusted_app.te
@@ -31,6 +31,7 @@
 
 # ASEC
 allow untrusted_app asec_apk_file:file r_file_perms;
+allow untrusted_app asec_apk_file:dir r_dir_perms;
 # Execute libs in asec containers.
 allow untrusted_app asec_public_file:file { execute execmod };