Linux sandbox: split linux_seccomp. in three.

This splits linux_seccomp.h into three logical parts:

- system_headers/linux_seccomp.h: things that are define by the kernel header.
- bpf_dsl/linux_syscall_ranges.h: MIN / MAX syscall numbers
- bpf_dsl/seccomp_macros.h: seccomp macros (that probably shouldn't be macros)

BUG=449357

Review URL: https://codereview.chromium.org/890343004

Cr-Commit-Position: refs/heads/master@{#316158}
diff --git a/sandbox/linux/BUILD.gn b/sandbox/linux/BUILD.gn
index ed4e697..92add58 100644
--- a/sandbox/linux/BUILD.gn
+++ b/sandbox/linux/BUILD.gn
@@ -155,10 +155,12 @@
     "bpf_dsl/cons.h",
     "bpf_dsl/dump_bpf.cc",
     "bpf_dsl/dump_bpf.h",
+    "bpf_dsl/linux_syscall_ranges.h",
     "bpf_dsl/policy.cc",
     "bpf_dsl/policy.h",
     "bpf_dsl/policy_compiler.cc",
     "bpf_dsl/policy_compiler.h",
+    "bpf_dsl/seccomp_macros.h",
     "bpf_dsl/syscall_set.cc",
     "bpf_dsl/syscall_set.h",
     "bpf_dsl/trap_registry.h",
@@ -166,7 +168,6 @@
     "seccomp-bpf/die.h",
     "seccomp-bpf/errorcode.cc",
     "seccomp-bpf/errorcode.h",
-    "seccomp-bpf/linux_seccomp.h",
     "seccomp-bpf/sandbox_bpf.cc",
     "seccomp-bpf/sandbox_bpf.h",
     "seccomp-bpf/syscall.cc",
@@ -279,13 +280,14 @@
 
 source_set("sandbox_services_headers") {
   sources = [
-    "system_headers/android_arm_ucontext.h",
     "system_headers/android_arm64_ucontext.h",
+    "system_headers/android_arm_ucontext.h",
     "system_headers/android_futex.h",
-    "system_headers/android_ucontext.h",
     "system_headers/android_i386_ucontext.h",
-    "system_headers/arm_linux_syscalls.h",
+    "system_headers/android_ucontext.h",
     "system_headers/arm64_linux_syscalls.h",
+    "system_headers/arm_linux_syscalls.h",
+    "system_headers/linux_seccomp.h",
     "system_headers/linux_syscalls.h",
     "system_headers/x86_32_linux_syscalls.h",
     "system_headers/x86_64_linux_syscalls.h",