Fix crosvm sepolicy for >4.4 kernels

Bug: 28053261
Change-Id: I03aacaa865ba6aa6c832d2ff16c86a7f982662a1
diff --git a/shared/sepolicy/socket_vsock_proxy.te b/shared/sepolicy/socket_vsock_proxy.te
index c21a6a6..eaca909 100644
--- a/shared/sepolicy/socket_vsock_proxy.te
+++ b/shared/sepolicy/socket_vsock_proxy.te
@@ -4,8 +4,8 @@
 init_daemon_domain(socket_vsock_proxy)
 
 allow socket_vsock_proxy self:global_capability_class_set { net_admin net_raw };
-allow socket_vsock_proxy self:socket { create read write listen accept bind };
+allow socket_vsock_proxy self:{ socket vsock_socket } { create read write listen accept bind };
 
 # TODO: socket returned by accept() has unlabeled context on it. Give it a
 # specific label.
-allow socket_vsock_proxy unlabeled:socket { getopt read write shutdown};
+allow socket_vsock_proxy unlabeled:{ socket vsock_socket } { getopt read write shutdown };