[M108 Migration] Add ASLR to executables.
Address space layout randomization(ASLR) is a computer security
technique involved in preventing exploitation of memory corruption
vulnerabilities.
ASLR randomly arranges the address space positions of key data areas of
a process to prevent an attacker from reliably jumping to a particular
exploited function in memory.
This adds ASLR to ubrowser, efl_webview_app, mini_browser, and efl_webprocess.
* Output from a command in bash to check ASLR
$ hardening-check ubrowser
ubrowser:
Position Independent Executable: yes
$ file ubrowser
ubrowser: ELF 32-bit LSB shared object
Reference: https://review.tizen.org/gerrit/c/280956
Change-Id: I6e429acd73c01f85bda743c46a47cac6fc298bd4
Signed-off-by: Bakka Uday Kiran <b.kiran@samsung.com>