New device-specific sepolicy file for 'perfprofd'

Bug: http://b/19483574

Change-Id: I89791663fed939562c155c181b4e6e3ed44c748e
diff --git a/sepolicy/perfprofd.te b/sepolicy/perfprofd.te
new file mode 100644
index 0000000..4296d4d
--- /dev/null
+++ b/sepolicy/perfprofd.te
@@ -0,0 +1,6 @@
+userdebug_or_eng(`
+  # perfprofd disables mpdecision temporarily via setprop ctl.stop,
+  # then re-enables afterwards with setprop ctl.start
+  allow perfprofd ctl_mpdecision:property_service set;
+  unix_socket_connect(perfprofd, property, init)
+')
diff --git a/sepolicy/property.te b/sepolicy/property.te
index 4deda57..8483793 100644
--- a/sepolicy/property.te
+++ b/sepolicy/property.te
@@ -1 +1,2 @@
 type ctl_rmt_prop, property_type;
+type ctl_mpdecision, property_type;
diff --git a/sepolicy/property_contexts b/sepolicy/property_contexts
index 2667358..6b2dc61 100644
--- a/sepolicy/property_contexts
+++ b/sepolicy/property_contexts
@@ -1 +1,2 @@
 ctl.rmt_storage        u:object_r:ctl_rmt_prop:s0
+ctl.mpdecision         u:object_r:ctl_mpdecision:s0