Export more symbols for init

Following symbols from libselinux are used by init. They need to be
exposed in order for the init to dynamically link to libselinux.

Note that this does not affect symbols visibility to vendor, which is
controlled by other map file, exported_vendor.map.

Bug: 63673171
Test: m -j
Test: adb reboot recovery
Change-Id: Ic149801b60fc739ab99f29711a522d460001a293
diff --git a/libselinux/exported.map b/libselinux/exported.map
index 781ced8..ebef964 100644
--- a/libselinux/exported.map
+++ b/libselinux/exported.map
@@ -1,8 +1,8 @@
 {
   global:
     fgetfilecon;
-    fsetfilecon;
     freecon;
+    fsetfilecon;
     getcon;
     getfilecon;
     getpeercon;
@@ -10,31 +10,38 @@
     is_selinux_enabled;
     lgetfilecon;
     lsetfilecon;
+    security_compute_create;
+    security_get_initial_context;
+    security_getenforce;
+    security_load_policy;
+    security_policyvers;
+    security_setenforce;
     selabel_close;
     selabel_lookup;
+    selabel_lookup_best_match;
     selabel_open;
     selinux_android_file_context_handle;
+    selinux_android_hw_service_context_handle;
+    selinux_android_load_policy;
+    selinux_android_load_policy_from_fd;
     selinux_android_prop_context_handle;
     selinux_android_restorecon;
     selinux_android_restorecon_pkgdir;
-    selinux_android_setcontext;
-    selinux_android_set_sehandle;
     selinux_android_service_context_handle;
-    selinux_android_hw_service_context_handle;
+    selinux_android_set_sehandle;
+    selinux_android_setcontext;
     selinux_android_vendor_service_context_handle;
     selinux_check_access;
-    security_getenforce;
-    security_get_initial_context;
-    security_setenforce;
-    security_load_policy;
-    security_policyvers;
     selinux_log_callback;
     selinux_set_callback;
     selinux_status_open;
     selinux_status_updated;
+    set_selinuxmnt;
     setcon;
     setexeccon;
     setfilecon;
     setfscreatecon;
+    setsockcreatecon;
+    string_to_security_class;
   local: *;
 };