From: Daniel Borkmann <dborkman@redhat.com>
Date: Sat, 15 Dec 2012 10:12:43 +0000 (+0000)
Subject: sctp: jsctp_sf_eat_sack: fix jprobes function signature mismatch
X-Git-Url: https://git.stricted.de/?a=commitdiff_plain;h=4cb9d6eaf85ecdd266a9a5c6d825c56ca9eefc14;p=GitHub%2Fexynos8895%2Fandroid_kernel_samsung_universal8895.git

sctp: jsctp_sf_eat_sack: fix jprobes function signature mismatch

Commit 24cb81a6a (sctp: Push struct net down into all of the
state machine functions) introduced the net structure into all
state machine functions, but jsctp_sf_eat_sack was not updated,
hence when SCTP association probing is enabled in the kernel,
any simple SCTP client/server program from userspace will panic
the kernel.

Cc: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Acked-by: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
---

diff --git a/net/sctp/probe.c b/net/sctp/probe.c
index bc6cd75cc1dc..5f7518de2fd1 100644
--- a/net/sctp/probe.c
+++ b/net/sctp/probe.c
@@ -122,7 +122,8 @@ static const struct file_operations sctpprobe_fops = {
 	.llseek = noop_llseek,
 };
 
-sctp_disposition_t jsctp_sf_eat_sack(const struct sctp_endpoint *ep,
+sctp_disposition_t jsctp_sf_eat_sack(struct net *net,
+				     const struct sctp_endpoint *ep,
 				     const struct sctp_association *asoc,
 				     const sctp_subtype_t type,
 				     void *arg,