Explicitly mark properties readable

Start explicitly marking device-specific properties as readable.
This is needed to support a future change where not all properties
are readable.

Change-Id: I678beb1a2291f0f21962311b672ebe9c96cd3935
diff --git a/sepolicy/init-qseecomd-sh.te b/sepolicy/init-qseecomd-sh.te
index 4e1bbfb..d8a40d4 100644
--- a/sepolicy/init-qseecomd-sh.te
+++ b/sepolicy/init-qseecomd-sh.te
@@ -3,6 +3,8 @@
 
 init_daemon_domain(init-bullhead-qseecomd-sh)
 
+get_prop(init-bullhead-qseecomd-sh, qseecomtee_prop)
+
 allow init-bullhead-qseecomd-sh shell_exec:file rx_file_perms;
 
 # execute toybox/toolbox
diff --git a/sepolicy/keystore.te b/sepolicy/keystore.te
new file mode 100644
index 0000000..17d3606
--- /dev/null
+++ b/sepolicy/keystore.te
@@ -0,0 +1 @@
+get_prop(keystore, qseecomtee_prop)
diff --git a/sepolicy/vold.te b/sepolicy/vold.te
index 0164b40..1710605 100644
--- a/sepolicy/vold.te
+++ b/sepolicy/vold.te
@@ -5,5 +5,7 @@
 # See system/vold commit 66270a21df1058434e4d63691221f11ff5387a0f
 dontaudit vold proc_irq:dir { read open };
 
+get_prop(vold, qseecomtee_prop)
+
 # Allow vold to access zram
 allow vold swap_block_device:blk_file getattr;