Merge "Allow failing app through seccomp policy" am: d0ff90afef am: 50e88dc5b3
am: ac1e8d916e
Change-Id: Iadb5f9f7cd34d298c6208e9a9233b6abe78b84ea
diff --git a/init/seccomp.cpp b/init/seccomp.cpp
index 92f30e8..6c85217 100644
--- a/init/seccomp.cpp
+++ b/init/seccomp.cpp
@@ -208,17 +208,21 @@
AllowSyscall(f, 190); // __NR_vfork
// Needed for strace
- AllowSyscall(f, 238); // __NR_tkill
+ AllowSyscall(f, 238); // __NR_tkill
// Needed for kernel to restart syscalls
- AllowSyscall(f, 0); // __NR_restart_syscall
+ AllowSyscall(f, 0); // __NR_restart_syscall
// Needed for debugging 32-bit Chrome
- AllowSyscall(f, 42); // __NR_pipe
+ AllowSyscall(f, 42); // __NR_pipe
// b/34732712
AllowSyscall(f, 364); // __NR_perf_event_open
+ // b/34651972
+ AllowSyscall(f, 33); // __NR_access
+ AllowSyscall(f, 195); // __NR_stat64
+
// arm32-on-arm64 only filter - autogenerated from bionic syscall usage
for (size_t i = 0; i < arm_filter_size; ++i)
f.push_back(arm_filter[i]);