bullhead/sepolicy: allow tee to create persist_data_file dir

avc: denied { create } for comm="qseecomd" name="app_g" scontext=u:r:tee:s0 tcontext=u:object_r:persist_data_file:s0 tclass=dir

Change-Id: I9a159eaffebecfe6ec0d837ea092c0086840293c
diff --git a/sepolicy/tee.te b/sepolicy/tee.te
index 864b7c4..5163cb0 100644
--- a/sepolicy/tee.te
+++ b/sepolicy/tee.te
@@ -22,7 +22,7 @@
 allow tee persist_drm_file:file create_file_perms;
 # allow tee to access persist_data_file
-allow tee persist_data_file:dir w_dir_perms;
+allow tee persist_data_file:dir create_dir_perms;
 allow tee persist_data_file:file create_file_perms;
 # allow tee to operate tee device