Merge "Allow failing app through seccomp policy" am: d0ff90afef am: 50e88dc5b3
am: ac1e8d916e

Change-Id: Iadb5f9f7cd34d298c6208e9a9233b6abe78b84ea
diff --git a/init/seccomp.cpp b/init/seccomp.cpp
index 92f30e8..6c85217 100644
--- a/init/seccomp.cpp
+++ b/init/seccomp.cpp
@@ -208,17 +208,21 @@
     AllowSyscall(f, 190); // __NR_vfork
 
     // Needed for strace
-    AllowSyscall(f, 238);  // __NR_tkill
+    AllowSyscall(f, 238); // __NR_tkill
 
     // Needed for kernel to restart syscalls
-    AllowSyscall(f, 0);  // __NR_restart_syscall
+    AllowSyscall(f, 0);   // __NR_restart_syscall
 
     // Needed for debugging 32-bit Chrome
-    AllowSyscall(f, 42); // __NR_pipe
+    AllowSyscall(f, 42);  // __NR_pipe
 
     // b/34732712
     AllowSyscall(f, 364); // __NR_perf_event_open
 
+    // b/34651972
+    AllowSyscall(f, 33);  // __NR_access
+    AllowSyscall(f, 195); // __NR_stat64
+
     // arm32-on-arm64 only filter - autogenerated from bionic syscall usage
     for (size_t i = 0; i < arm_filter_size; ++i)
         f.push_back(arm_filter[i]);