--- zzzz-none-000/linux-4.1.52/include/linux/seccomp.h 2018-05-28 02:26:45.000000000 +0000 +++ bcm63-7530ax-731/linux-4.1.52/include/linux/seccomp.h 2022-03-02 11:37:13.000000000 +0000 @@ -63,7 +63,7 @@ #ifdef CONFIG_HAVE_ARCH_SECCOMP_FILTER static inline int secure_computing(void) { return 0; } #else -static inline void secure_computing_strict(int this_syscall) { return; } +static inline void secure_computing_strict(int this_syscall __maybe_unused) { return; } #endif static inline long prctl_get_seccomp(void) @@ -71,12 +71,12 @@ return -EINVAL; } -static inline long prctl_set_seccomp(unsigned long arg2, char __user *arg3) +static inline long prctl_set_seccomp(unsigned long arg2 __maybe_unused, char __user *arg3 __maybe_unused) { return -EINVAL; } -static inline int seccomp_mode(struct seccomp *s) +static inline int seccomp_mode(struct seccomp *s __maybe_unused) { return 0; } @@ -86,11 +86,11 @@ extern void put_seccomp_filter(struct task_struct *tsk); extern void get_seccomp_filter(struct task_struct *tsk); #else /* CONFIG_SECCOMP_FILTER */ -static inline void put_seccomp_filter(struct task_struct *tsk) +static inline void put_seccomp_filter(struct task_struct *tsk __maybe_unused) { return; } -static inline void get_seccomp_filter(struct task_struct *tsk) +static inline void get_seccomp_filter(struct task_struct *tsk __maybe_unused) { return; }