netd: allow tcp_socket name_connect

The patch in 36a5d109e6953c63d2a865eab4c4d021aa52250b wasn't
sufficient to address DNS over TCP. We also need to allow
name_connect.

Fixes the following denial:

<5>[   82.120746] type=1400 audit(1830030.349:5): avc:  denied  { name_connect } for  pid=1457 comm="netd" dest=53 scontext=u:r:netd:s0 tcontext=u:object_r:port:s0 tclass=tcp_socket

Public Bug: https://code.google.com/p/android/issues/detail?id=62196
Bug: 11097631

(cherry picked from commit 91ebcf33326418ed9603e618ad193550646c3b04)

Change-Id: I62bba8777a5c8af1c0143e7ca2d915129ef38798
diff --git a/netd.te b/netd.te
index 7466ed1..1960aae 100644
--- a/netd.te
+++ b/netd.te
@@ -11,6 +11,7 @@
 allow netd self:{ tcp_socket udp_socket } *;
 allow netd node:{ tcp_socket udp_socket } node_bind;
 allow netd port:{ tcp_socket udp_socket } name_bind;
+allow netd port:tcp_socket name_connect;
 allow netd self:unix_stream_socket *;
 allow netd shell_exec:file rx_file_perms;
 allow netd system_file:file x_file_perms;