--- zzzz-none-000/linux-4.1.38/include/linux/seccomp.h 2017-01-18 18:48:06.000000000 +0000 +++ bcm63-7582-715/linux-4.1.38/include/linux/seccomp.h 2020-11-25 10:06:48.000000000 +0000 @@ -63,7 +63,7 @@ #ifdef CONFIG_HAVE_ARCH_SECCOMP_FILTER static inline int secure_computing(void) { return 0; } #else -static inline void secure_computing_strict(int this_syscall) { return; } +static inline void secure_computing_strict(int this_syscall __maybe_unused) { return; } #endif static inline long prctl_get_seccomp(void) @@ -71,12 +71,12 @@ return -EINVAL; } -static inline long prctl_set_seccomp(unsigned long arg2, char __user *arg3) +static inline long prctl_set_seccomp(unsigned long arg2 __maybe_unused, char __user *arg3 __maybe_unused) { return -EINVAL; } -static inline int seccomp_mode(struct seccomp *s) +static inline int seccomp_mode(struct seccomp *s __maybe_unused) { return 0; } @@ -86,11 +86,11 @@ extern void put_seccomp_filter(struct task_struct *tsk); extern void get_seccomp_filter(struct task_struct *tsk); #else /* CONFIG_SECCOMP_FILTER */ -static inline void put_seccomp_filter(struct task_struct *tsk) +static inline void put_seccomp_filter(struct task_struct *tsk __maybe_unused) { return; } -static inline void get_seccomp_filter(struct task_struct *tsk) +static inline void get_seccomp_filter(struct task_struct *tsk __maybe_unused) { return; }