current_fsuid
inode->i_uid = current_fsuid();
sock_init_data_uid(&q->sock, &q->sk, current_fsuid());
sock_init_data_uid(&tfile->socket, &tfile->sk, current_fsuid());
uid = current_fsuid();
inode->i_uid = current_fsuid();
if (vfsuid_eq_kuid(vfsuid, current_fsuid())) {
if (vfsuid_eq_kuid(vfsuid, current_fsuid()) &&
if (!uid_eq(cii->c_uid, current_fsuid())) {
cii->c_uid = current_fsuid();
uid_eq(cii->c_uid, current_fsuid()) &&
inp->ih.uid = from_kuid(&init_user_ns, current_fsuid());
if (!vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid())) {
mk_identifier, __kuid_val(current_fsuid()));
current_fsuid(), current_gid(), current_cred(),
kuid_t ptmx_uid = current_fsuid();
inode->i_uid = opts->setuid ? opts->uid : current_fsuid();
current_fsuid())) {
!uid_eq(sbi->s_resuid, current_fsuid()) &&
inode->i_uid = current_fsuid();
if (uid_eq(sbi->s_resuid, current_fsuid()) ||
if (uid_eq(F2FS_OPTION(sbi).s_resuid, current_fsuid()))
current_fsuid())) {
fsuid = no_idmap ? current_fsuid() : mapped_fsuid(idmap, fc->user_ns);
req->in.h.uid = from_kuid_munged(fc->user_ns, current_fsuid());
!uid_eq(dip->i_inode.i_uid, current_fsuid()) &&
!uid_eq(ip->i_inode.i_uid, current_fsuid()) && !capable(CAP_FOWNER))
else if (!uid_eq(dip->i_inode.i_uid, current_fsuid()))
inode->i_uid = current_fsuid();
inode->i_uid = current_fsuid();
if (!uid_eq(result->i_uid, current_fsuid()) ||
result->i_uid = current_fsuid();
if (!uid_eq(result->i_uid, current_fsuid()) ||
result->i_uid = current_fsuid();
result->i_uid = current_fsuid();
result->i_uid = current_fsuid();
ctx->uid = current_fsuid();
if (vfsuid_eq_kuid(vfsuid, current_fsuid()))
ri->uid = cpu_to_je16(from_kuid(&init_user_ns, current_fsuid()));
inode->i_uid = current_fsuid();
if ((!vfsuid_eq_kuid(vfsuid, current_fsuid())) && !capable(CAP_LEASE))
if (vfsuid_eq_kuid(vfsuid, current_fsuid()))
if (vfsuid_eq_kuid(i_vfsuid, current_fsuid()))
kuid_t fsuid = current_fsuid();
if (likely(vfsuid_eq_kuid(vfsuid, current_fsuid()))) {
kuid_t task_uid = current_fsuid();
if (!uid_eq(current_fsuid(), GLOBAL_ROOT_UID))
inode->i_uid, inode->i_gid, current_fsuid(), current_fsgid());
uid_eq(inode->i_uid, current_fsuid()))
if (!uid_eq(current_fsuid(), inode->i_uid) && !capable(CAP_CHOWN))
uid_eq(wr->uid, current_fsuid()) &&
wr->uid = current_fsuid();
wr->uid = current_fsuid();
wr->uid = current_fsuid();
if (uid_eq(wr->uid, current_fsuid()) &&
wr->uid = current_fsuid();
if (uid_eq(ORANGEFS_I(inode)->attr_uid, current_fsuid()) &&
ORANGEFS_I(inode)->attr_uid = current_fsuid();
current_fsuid());
sys_attr.owner = from_kuid(&init_user_ns, current_fsuid()); \
fsuid = from_kuid(&init_user_ns, current_fsuid());
inode->i_uid = current_fsuid();
if (vfsuid_eq_kuid(vfsuid, current_fsuid()))
if (vfsuid_eq_kuid(vfsuid, current_fsuid()))
return uid_eq(current_fsuid(), warn->w_dq_id.uid);
if (vfsuid_eq_kuid(i_uid_into_vfsuid(idmap, inode), current_fsuid()))
.ia_uid = current_fsuid(),
from_kuid(&init_user_ns, current_fsuid())); \
kuid_t fsuid = current_fsuid();
args.uid = current_fsuid();
newinode->i_uid = current_fsuid();
if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
cfile->uid = current_fsuid();
args.uid = current_fsuid();
inode->i_uid = current_fsuid();
stat->uid = current_fsuid();
if (uid_eq(cifs_sb->ctx->backupuid, current_fsuid()))
kuid_t uid = current_fsuid();
args.uid = current_fsuid();
sids->owner.SubAuthorities[2] = cpu_to_le32(current_fsuid().val);
cifs_dbg(FYI, "owner S-1-5-88-1-%d, group S-1-5-88-2-%d\n", current_fsuid().val, current_fsgid().val);
if (uid_eq(current_fsuid(), c->rp_uid) || capable(CAP_SYS_RESOURCE) ||
return from_vfsuid(idmap, fs_userns, VFSUIDT_INIT(current_fsuid()));
inode->i_uid = current_fsuid();
opts->uid = current_fsuid();
current_fsuid(), current_fsgid(),
current_fsuid(), current_fsgid(),
ctx->uid = current_fsuid();
fid->uid = current_fsuid();
inode->i_uid = current_fsuid();
tmp = *(aa_lookup_condperms(current_fsuid(),
*perms = *(aa_lookup_condperms(current_fsuid(), rules->file, state,
tmp = *(aa_lookup_condperms(current_fsuid(), rules->file, state,
tmp = *(aa_lookup_condperms(current_fsuid(), rules->file, state,
*perms = *(aa_lookup_condperms(current_fsuid(), file_rules, state,
kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid();
struct path_cond cond = { current_fsuid(), mode };
if (uid_eq(key->uid, current_fsuid()) || capable(CAP_SYS_ADMIN)) {
user = key_user_lookup(current_fsuid());
from_kuid(&init_user_ns, current_fsuid()),
value = from_kuid(&init_user_ns, current_fsuid());