Move sensors back into permissive_or_unconfined

Like 6407bb62372b3f99578e86be3fa437ad664cf9b2, sensors is trying
to access /data/app/sensor_ctl_socket and getting denied by
SELinux policy.

<5>[   10.184184] type=1400 audit(1389722025.917:17): avc:  denied  { unlink } for  pid=193 comm="sensors.qcom" name="sensor_ctl_socket" dev="mmcblk0p28" ino=162882 scontext=u:r:sensors:s0 tcontext=u:object_r:apk_data_file:s0 tclass=sock_file
<5>[   10.184705] type=1400 audit(1389722025.917:18): avc:  denied  { write } for  pid=193 comm="sensors.qcom" name="sensor_ctl_socket" dev="mmcblk0p28" ino=162882 scontext=u:r:sensors:s0 tcontext=u:object_r:apk_data_file:s0 tclass=sock_file

Rollback to give us more time to investigate.

Bug: 12529574
Change-Id: I3fd4b264a40fa1bdadc9f7dd0f1a869772cc5fa8
diff --git a/sepolicy/sensors.te b/sepolicy/sensors.te
index 927a7c4..c5eec0c 100644
--- a/sepolicy/sensors.te
+++ b/sepolicy/sensors.te
@@ -2,6 +2,8 @@
 type sensors, domain;
 type sensors_exec, exec_type, file_type;
 
+permissive_or_unconfined(sensors)
+
 # Started by init
 init_daemon_domain(sensors)