Track SELinux denial
There are untracked SELinux denials on boot:
go/how-to-track-an-selinux-denial
05-14 10:10:07.890 1716 1716 I auditd : type=1400 audit(0.0:7): avc: denied { execute_no_trans } for comm="init" path="/vendor/bin/toybox_vendor" dev="dm-1" ino=204 scontext=u:r:init:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=0
Bug: 132695863
Test: compiles
Change-Id: Ia525ed2520ec774f22d75580a8ffdf085f1e6d46
diff --git a/sepolicy/common/bug_map b/sepolicy/common/bug_map
index 12e0778..5028019 100644
--- a/sepolicy/common/bug_map
+++ b/sepolicy/common/bug_map
@@ -1,6 +1,7 @@
hal_wifi_default default_prop file 131598173
hal_wifi_default vendor_default_prop property_service 131598173
init unlabeled dir 131596633
+init vendor_toolbox_exec file 132695863
installd device file 131595213
kernel kernel system 131597442
netd device file 131598170