Track SELinux denial

There are untracked SELinux denials on boot:
go/how-to-track-an-selinux-denial
05-14 10:10:07.890  1716  1716 I auditd  : type=1400 audit(0.0:7): avc: denied { execute_no_trans } for comm="init" path="/vendor/bin/toybox_vendor" dev="dm-1" ino=204 scontext=u:r:init:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=0

Bug: 132695863
Test: compiles
Change-Id: Ia525ed2520ec774f22d75580a8ffdf085f1e6d46
diff --git a/sepolicy/common/bug_map b/sepolicy/common/bug_map
index 12e0778..5028019 100644
--- a/sepolicy/common/bug_map
+++ b/sepolicy/common/bug_map
@@ -1,6 +1,7 @@
 hal_wifi_default default_prop file 131598173
 hal_wifi_default vendor_default_prop property_service 131598173
 init unlabeled dir 131596633
+init vendor_toolbox_exec file 132695863
 installd device file 131595213
 kernel kernel system 131597442
 netd device file 131598170