diff -ruN loop-AES-v3.2e/glue.c loop-AES-v3.2e.patched/glue.c --- loop-AES-v3.2e/glue.c 2006-12-14 16:51:56.000000000 +0100 +++ loop-AES-v3.2e.patched/glue.c 2009-03-25 16:33:11.000000000 +0100 @@ -275,7 +275,7 @@ } un; #if LINUX_VERSION_CODE >= 0x20200 - if(lo->lo_key_owner != current->uid && !capable(CAP_SYS_ADMIN)) + if(lo->lo_key_owner != current->cred->uid && !capable(CAP_SYS_ADMIN)) return -EPERM; #endif diff -ruN loop-AES-v3.2e/loop.c-2.6.patched loop-AES-v3.2e.patched/loop.c-2.6.patched --- loop-AES-v3.2e/loop.c-2.6.patched 2008-11-05 19:27:56.000000000 +0100 +++ loop-AES-v3.2e.patched/loop.c-2.6.patched 2009-03-25 16:24:21.000000000 +0100 @@ -1654,7 +1654,7 @@ int err; struct loop_func_table *xfer = NULL; - if (lo->lo_encrypt_key_size && lo->lo_key_owner != current->uid && + if (lo->lo_encrypt_key_size && lo->lo_key_owner != current->cred->uid && !capable(CAP_SYS_ADMIN)) return -EPERM; if ((unsigned int) info->lo_encrypt_key_size > LO_KEY_SIZE) @@ -1710,7 +1710,7 @@ if (info->lo_encrypt_key_size) { memcpy(lo->lo_encrypt_key, info->lo_encrypt_key, info->lo_encrypt_key_size); - lo->lo_key_owner = current->uid; + lo->lo_key_owner = current->cred->uid; } lo->lo_queue->make_request_fn = loop_make_request_real; diff -ruN loop-AES-v3.2e/loop_serpent.c loop-AES-v3.2e.patched/loop_serpent.c --- loop-AES-v3.2e/loop_serpent.c 2004-11-18 17:24:23.000000000 +0100 +++ loop-AES-v3.2e.patched/loop_serpent.c 2009-03-25 16:24:39.000000000 +0100 @@ -1117,7 +1117,7 @@ extern void md5_transform_CPUbyteorder_C(u_int32_t *, u_int32_t const *); #if LINUX_VERSION_CODE >= 0x20200 - if(lo->lo_key_owner != current->uid && !capable(CAP_SYS_ADMIN)) + if(lo->lo_key_owner != current->cred->uid && !capable(CAP_SYS_ADMIN)) return -EPERM; #endif diff -ruN loop-AES-v3.2e/loop_twofish.c loop-AES-v3.2e.patched/loop_twofish.c --- loop-AES-v3.2e/loop_twofish.c 2004-11-18 17:24:23.000000000 +0100 +++ loop-AES-v3.2e.patched/loop_twofish.c 2009-03-25 16:24:52.000000000 +0100 @@ -515,7 +515,7 @@ extern void md5_transform_CPUbyteorder_C(u_int32_t *, u_int32_t const *); #if LINUX_VERSION_CODE >= 0x20200 - if(lo->lo_key_owner != current->uid && !capable(CAP_SYS_ADMIN)) + if(lo->lo_key_owner != current->cred->uid && !capable(CAP_SYS_ADMIN)) return -EPERM; #endif