(Part 3 of 4) Roll out "-fstack-protector-strong" which replaces
"-fstack-protector-all".

Added more files to whitelist - "-fstack-protector-strong" generates
less function protection, so some files must be whitelist-ed.

Also fixed 1 bug in detecting fortify testing - "__stack_chk_fail" was
incorrectly recognized as "fortifyed signal". Fortify whitelist has
been updated also.

Chrome OS security team has reviewed the design and implementation,
which can be found here -
https://docs.google.com/document/d/1xXBH6rRZue4f296vGt9YQcuLVQHeE516stHwt8M9xyU/edit?hl=en_US&ndplr=1&pli=1

BUG=None
TEST=manually - build amd64-generic and x86-zgb from scratch.

Change-Id: I088ee61487194ea4e4407307a1c33af40d292265
Reviewed-on: https://gerrit.chromium.org/gerrit/13504
Reviewed-by: Han Shen <shenhan@chromium.org>
Tested-by: Han Shen <shenhan@chromium.org>
Commit-Ready: Han Shen <shenhan@chromium.org>
Reviewed-by: asharif <asharif@chromium.org>
3 files changed