system_server: replace sys_resource with sys_ptrace

Commit https://android.googlesource.com/kernel/common/+/f0ce0eee added
CAP_SYS_RESOURCE as a capability check which would allow access to
sensitive /proc/PID files. However, in an SELinux based world, allowing
this access causes CAP_SYS_RESOURCE to duplicate what CAP_SYS_PTRACE
(without :process ptrace) already provides.

Use CAP_SYS_PTRACE instead of CAP_SYS_RESOURCE.

Test: Device boots, functionality remains identical, no sys_resource
denials from system_server.
Bug: 34951864
Bug: 38496951
Change-Id: I04d745b436ad75ee1ebecf0a61c6891858022e34
(cherry picked from commit 448669540c0b7c22ee8b8293217818f8f92238b6)
(cherry picked from commit 3d8dde0e2e7ae6d6901ec3a708c8b891eacf1631)
1 file changed
tree: 9d4616d136d69bbfa0868d5afcda44045478fbab
  1. tools/
  2. access_vectors
  3. adbd.te
  4. Android.mk
  5. app.te
  6. atrace.te
  7. attributes
  8. audioserver.te
  9. autoplay_app.te
  10. binderservicedomain.te
  11. blkid.te
  12. blkid_untrusted.te
  13. bluetooth.te
  14. bluetoothdomain.te
  15. boot_control_hal.te
  16. bootanim.te
  17. bootstat.te
  18. cameraserver.te
  19. clatd.te
  20. CleanSpec.mk
  21. cppreopts.te
  22. debuggerd.te
  23. device.te
  24. dex2oat.te
  25. dhcp.te
  26. dnsmasq.te
  27. domain.te
  28. domain_deprecated.te
  29. drmserver.te
  30. dumpstate.te
  31. file.te
  32. file_contexts
  33. file_contexts_asan
  34. fingerprintd.te
  35. fs_use
  36. fsck.te
  37. fsck_untrusted.te
  38. gatekeeperd.te
  39. genfs_contexts
  40. global_macros
  41. gpsd.te
  42. hci_attach.te
  43. healthd.te
  44. hostapd.te
  45. idmap.te
  46. init.te
  47. initial_sid_contexts
  48. initial_sids
  49. inputflinger.te
  50. install_recovery.te
  51. installd.te
  52. ioctl_defines
  53. ioctl_macros
  54. isolated_app.te
  55. kernel.te
  56. keys.conf
  57. keystore.te
  58. lmkd.te
  59. logd.te
  60. mac_permissions.xml
  61. mdnsd.te
  62. mediacodec.te
  63. mediadrmserver.te
  64. mediaextractor.te
  65. mediaserver.te
  66. mls
  67. mls_macros
  68. MODULE_LICENSE_PUBLIC_DOMAIN
  69. mtp.te
  70. net.te
  71. netd.te
  72. neverallow_macros
  73. nfc.te
  74. NOTICE
  75. otapreopt_chroot.te
  76. otapreopt_slot.te
  77. perfprofd.te
  78. platform_app.te
  79. policy_capabilities
  80. port_contexts
  81. postinstall.te
  82. postinstall_dexopt.te
  83. ppp.te
  84. preopt2cachename.te
  85. priv_app.te
  86. profman.te
  87. property.te
  88. property_contexts
  89. racoon.te
  90. radio.te
  91. README
  92. recovery.te
  93. recovery_persist.te
  94. recovery_refresh.te
  95. rild.te
  96. roles
  97. runas.te
  98. sdcardd.te
  99. seapp_contexts
  100. security_classes
  101. service.te
  102. service_contexts
  103. servicemanager.te
  104. sgdisk.te
  105. shared_relro.te
  106. shell.te
  107. slideshow.te
  108. su.te
  109. surfaceflinger.te
  110. system_app.te
  111. system_server.te
  112. te_macros
  113. tee.te
  114. toolbox.te
  115. tzdatacheck.te
  116. ueventd.te
  117. uncrypt.te
  118. untrusted_app.te
  119. update_engine.te
  120. update_engine_common.te
  121. update_verifier.te
  122. users
  123. vdc.te
  124. vold.te
  125. watchdogd.te
  126. wpa.te
  127. zygote.te