}
 
 static int sctp_setsockopt_ecn_supported(struct sock *sk,
-                                        char __user *optval,
+                                        struct sctp_assoc_value *params,
                                         unsigned int optlen)
 {
-       struct sctp_assoc_value params;
        struct sctp_association *asoc;
        int retval = -EINVAL;
 
-       if (optlen != sizeof(params))
-               goto out;
-
-       if (copy_from_user(¶ms, optval, optlen)) {
-               retval = -EFAULT;
+       if (optlen != sizeof(*params))
                goto out;
-       }
 
-       asoc = sctp_id2assoc(sk, params.assoc_id);
-       if (!asoc && params.assoc_id != SCTP_FUTURE_ASSOC &&
+       asoc = sctp_id2assoc(sk, params->assoc_id);
+       if (!asoc && params->assoc_id != SCTP_FUTURE_ASSOC &&
            sctp_style(sk, UDP))
                goto out;
 
-       sctp_sk(sk)->ep->ecn_enable = !!params.assoc_value;
+       sctp_sk(sk)->ep->ecn_enable = !!params->assoc_value;
        retval = 0;
 
 out:
                retval = sctp_setsockopt_auth_supported(sk, kopt, optlen);
                break;
        case SCTP_ECN_SUPPORTED:
-               retval = sctp_setsockopt_ecn_supported(sk, optval, optlen);
+               retval = sctp_setsockopt_ecn_supported(sk, kopt, optlen);
                break;
        case SCTP_EXPOSE_POTENTIALLY_FAILED_STATE:
                retval = sctp_setsockopt_pf_expose(sk, optval, optlen);