Expand seccomp whitelist

Add syscalls required by sanitizers.

Bug: 34606909
Test: Make sure Android boots when built with SANITIZE_TARGET='address'
Change-Id: Ifa223fb663a4ff43c8b8df9b7bf9452e41079e2e
diff --git a/init/seccomp.cpp b/init/seccomp.cpp
index b0688f3..608c4e7 100644
--- a/init/seccomp.cpp
+++ b/init/seccomp.cpp
@@ -234,6 +234,11 @@
     // b/34817266
     AllowSyscall(f, 252); // __NR_epoll_wait
 
+    // Needed by sanitizers (b/34606909)
+    // 5 (__NR_open) and 195 (__NR_stat64) are also required, but they are
+    // already allowed.
+    AllowSyscall(f, 85);  // __NR_readlink
+
     // arm32-on-arm64 only filter - autogenerated from bionic syscall usage
     for (size_t i = 0; i < arm_filter_size; ++i)
         f.push_back(arm_filter[i]);