current_user_ns
tmp.st_uid = from_kuid_munged(current_user_ns(), lstat->uid);
tmp.st_gid = from_kgid_munged(current_user_ns(), lstat->gid);
tmp.st_uid = from_kuid_munged(current_user_ns(), stat->uid);
tmp.st_gid = from_kgid_munged(current_user_ns(), stat->gid);
uid = make_kuid(current_user_ns(), result.uint_32);
gid = make_kgid(current_user_ns(), result.uint_32);
uid = make_kuid(current_user_ns(), result.uint_32);
gid = make_kgid(current_user_ns(), result.uint_32);
err |= put_user(from_kuid_munged(current_user_ns(), stat->uid), &statbuf->st_uid);
err |= put_user(from_kgid_munged(current_user_ns(), stat->gid), &statbuf->st_gid);
SET_UID(uid, from_kuid_munged(current_user_ns(), stat->uid));
SET_GID(gid, from_kgid_munged(current_user_ns(), stat->gid));
uid = make_kuid(current_user_ns(), who);
uid = make_kuid(current_user_ns(), who);
trd->sender_euid = from_kuid(current_user_ns(), t->sender_euid);
if ((current_user_ns() != &init_user_ns) ||
u16 jkey = from_kuid(current_user_ns(), uid) & HFI1_JKEY_MASK;
from_kuid_munged(current_user_ns(), tun->owner)))
from_kgid_munged(current_user_ns(), tun->group)))
from_kuid_munged(current_user_ns(), tun->owner)) :
from_kgid_munged(current_user_ns(), tun->group)) :
owner = make_kuid(current_user_ns(), arg);
group = make_kgid(current_user_ns(), arg);
grp = make_kgid(current_user_ns(), ns_grp);
data->perms.uid = make_kuid(current_user_ns(), result.uint_32);
data->perms.gid = make_kgid(current_user_ns(), result.uint_32);
if (from_kuid(current_user_ns(), current_uid()) == 0)
session_opts->uid = make_kuid(current_user_ns(), uid);
from_kuid_munged(current_user_ns(), ino->uid);
from_kgid_munged(current_user_ns(), ino->gid);
user_ns = current_user_ns();
if (WARN_ON(user_ns != current_user_ns()))
if (current_user_ns() != &init_user_ns)
struct user_namespace *user_ns = current_user_ns();
struct user_namespace *user_ns = current_user_ns();
if (!ns_capable(current_user_ns(), CAP_DAC_READ_SEARCH))
if (current_user_ns() != &init_user_ns) {
uid = make_kuid(current_user_ns(), result->uint_32);
gid = make_kgid(current_user_ns(), result->uint_32);
qid = make_kqid(current_user_ns(), USRQUOTA, id);
qid = make_kqid(current_user_ns(), GRPQUOTA, id);
if (!ns_capable(current_user_ns(), CAP_SYS_CHROOT))
ns = current_user_ns();
map_up = ¤t_user_ns()->uid_map;
map_up = ¤t_user_ns()->gid_map;
struct user_namespace *user_ns = current_user_ns();
!ns_capable(current_user_ns(), CAP_SYS_ADMIN))
exp.ex_anon_uid= make_kuid(current_user_ns(), an_int);
exp.ex_anon_gid= make_kgid(current_user_ns(), an_int);
struct user_namespace *user_ns = current_user_ns();
group->inotify_data.ucounts = inc_ucount(current_user_ns(),
uid = from_kuid_munged(current_user_ns(), user_ns->owner);
if (!ns_capable(current_user_ns(), CAP_SYS_CHROOT))
uid = make_kuid(current_user_ns(), user);
gid = make_kgid(current_user_ns(), group);
if (!kuid_has_mapping(current_user_ns(), ctx.stat.uid) ||
!kgid_has_mapping(current_user_ns(), ctx.stat.gid))
if (WARN_ON(fc->user_ns != current_user_ns()))
user_ns = current_user_ns();
acl = posix_acl_from_xattr(current_user_ns(), kvalue, size);
caller_userns = current_user_ns();
proc_apply_options(fs_info, fc, current_user_ns());
proc_apply_options(fs_info, fc, current_user_ns());
qid = make_kqid(current_user_ns(), type, id);
qid = make_kqid(current_user_ns(), type, id);
idq.dqb_id = from_kqid(current_user_ns(), qid);
qid = make_kqid(current_user_ns(), type, id);
if ((type == USRQUOTA && uid_eq(current_euid(), make_kuid(current_user_ns(), id))) ||
(type == GRPQUOTA && in_egroup_p(make_kgid(current_user_ns(), id))))
qid = make_kqid(current_user_ns(), type, id);
qid = make_kqid(current_user_ns(), type, id);
qid = make_kqid(current_user_ns(), type, id);
id_out = from_kqid(current_user_ns(), qid);
__le64 uid = cpu_to_le64(from_kuid(current_user_ns(), ctx->linux_uid));
__le64 gid = cpu_to_le64(from_kgid(current_user_ns(), ctx->linux_gid));
return make_kuid(current_user_ns(), uid);
return make_kgid(current_user_ns(), gid);
SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
tmp.st_uid = from_kuid_munged(current_user_ns(), stat->uid);
tmp.st_gid = from_kgid_munged(current_user_ns(), stat->gid);
tmp.stx_uid = from_kuid_munged(current_user_ns(), stat->uid);
tmp.stx_gid = from_kgid_munged(current_user_ns(), stat->gid);
SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
struct user_namespace *user_ns = current_user_ns();
uopt->uid = make_kuid(current_user_ns(), overflowuid);
uopt->gid = make_kgid(current_user_ns(), overflowgid);
kgid_t gid = make_kgid(current_user_ns(), uv);
kuid_t uid = make_kuid(current_user_ns(), uv);
if (current_user_ns() != &init_user_ns)
dst->icw_uid = make_kuid(current_user_ns(), src->eof_uid);
dst->icw_gid = make_kgid(current_user_ns(), src->eof_gid);
*qid = make_kqid(current_user_ns(), qid->type, id);
sbi->s_uid = make_kuid(current_user_ns(),
sbi->s_gid = make_kgid(current_user_ns(),
struct user_namespace *: current_user_ns(), \
!ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN))
!ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN))
info->notify_user_ns = get_user_ns(current_user_ns());
out->uid = from_kuid_munged(current_user_ns(), in->uid);
out->gid = from_kgid_munged(current_user_ns(), in->gid);
out->cuid = from_kuid_munged(current_user_ns(), in->cuid);
out->cgid = from_kgid_munged(current_user_ns(), in->cgid);
kuid_t uid = make_kuid(current_user_ns(), in->uid);
kgid_t gid = make_kgid(current_user_ns(), in->gid);
if (current_user_ns() != &init_user_ns)
f->uid = make_kuid(current_user_ns(), f_val);
f->gid = make_kgid(current_user_ns(), f_val);
uid = make_kuid(current_user_ns(), result.uint_32);
gid = make_kgid(current_user_ns(), result.uint_32);
info.created_by_uid = from_kuid_munged(current_user_ns(),
if (current_user_ns() != userns)
if (current_user_ns() == &init_user_ns)
struct user_namespace *ns = current_user_ns();
uid_t uid = from_kuid_munged(current_user_ns(), task_uid(p));
uid = from_kuid_munged(current_user_ns(), task_uid(p));
uid = from_kuid_munged(current_user_ns(), task_uid(p));
return mm_init(mm, current, current_user_ns());
struct user_namespace *user_ns = current_user_ns();
struct user_namespace *user_ns = current_user_ns();
struct user_namespace *user_ns = current_user_ns();
user_ns = new_cred ? new_cred->user_ns : current_user_ns();
new = create_new_namespaces(0, tsk, current_user_ns(), tsk->fs);
nsset->nsproxy = create_new_namespaces(0, me, current_user_ns(), me->fs);
ns = to_ns_common(current_user_ns());
!ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN))
if (current_user_ns() != t_user_ns) {
kuid_t uid = make_kuid(current_user_ns(), info->si_uid);
info.si_uid = from_kuid_munged(current_user_ns(), current_uid());
info->si_uid = from_kuid_munged(current_user_ns(),
info->si_uid = from_kuid_munged(current_user_ns(), current_uid());
return from_kuid_munged(current_user_ns(), current_uid());
return from_kuid_munged(current_user_ns(), current_euid());
return from_kgid_munged(current_user_ns(), current_gid());
return from_kgid_munged(current_user_ns(), current_egid());
if (!checkpoint_restore_ns_capable(current_user_ns()))
struct user_namespace *ns = current_user_ns();
struct user_namespace *ns = current_user_ns();
struct user_namespace *ns = current_user_ns();
struct user_namespace *ns = current_user_ns();
struct user_namespace *ns = current_user_ns();
struct user_namespace *ns = current_user_ns();
fill_stats(current_user_ns(), task_active_pid_ns(current), tsk, stats);
if (current_user_ns() != &init_user_ns)
return ¤t_user_ns()->set;
return ¤t_user_ns()->set == set;
struct user_namespace *user_ns = current_user_ns();
struct user_namespace *user_ns = current_user_ns();
return high2lowuid(from_kuid_munged(current_user_ns(), current_uid()));
return high2lowuid(from_kuid_munged(current_user_ns(), current_euid()));
return high2lowgid(from_kgid_munged(current_user_ns(), current_gid()));
return high2lowgid(from_kgid_munged(current_user_ns(), current_egid()));
return in_userns(target_ns, current_user_ns());
if (user_ns == current_user_ns())
struct user_namespace *my_user_ns = current_user_ns();
(current_user_ns() != &init_user_ns))
res = from_kuid_munged(current_user_ns(), ax25_uid->uid);
sax25_kuid = make_kuid(current_user_ns(), sax->sax25_uid);
out.start = make_kuid(current_user_ns(), in->start);
out.end = make_kuid(current_user_ns(), in->end);
from_kuid_munged(current_user_ns(), range->start),
from_kuid_munged(current_user_ns(), range->end)
if (current_user_ns() != net->user_ns) {
uid = make_kuid(current_user_ns(), creds.uid);
gid = make_kgid(current_user_ns(), creds.gid);
struct user_namespace *current_ns = current_user_ns();
struct user_namespace *current_ns = current_user_ns();
struct user_namespace *user_ns = current_user_ns();
from_kuid_munged(current_user_ns(),
uid = make_kuid(current_user_ns(), nla_get_u32(tb[RTA_UID]));
struct user_namespace *user_ns = current_user_ns();
fl6.flowi6_uid = make_kuid(current_user_ns(),
(current_user_ns() != net->user_ns))
uid = make_kuid(current_user_ns(), id);
rsci.cred.cr_uid = make_kuid(current_user_ns(), id);
rsci.cred.cr_gid = make_kgid(current_user_ns(), id);
kgid = make_kgid(current_user_ns(), id);
uid = make_kuid(current_user_ns(), id);
kgid = make_kgid(current_user_ns(), gid);
return current_user_ns();
if (!ns_capable(current_user_ns(), CAP_SETPCAP))
return kuid_root_in_ns(kuid, current_user_ns());
mappedroot = from_kuid(current_user_ns(), vfsuid_into_kuid(vfsroot));
struct user_namespace *task_ns = current_user_ns(),
entry->uid = make_kuid(current_user_ns(),
entry->gid = make_kgid(current_user_ns(),
entry->fowner = make_kuid(current_user_ns(),
entry->fgroup = make_kgid(current_user_ns(),
from_kuid_munged(current_user_ns(), key->uid),
from_kgid_munged(current_user_ns(), key->gid),
uid = make_kuid(current_user_ns(), user);
gid = make_kgid(current_user_ns(), group);
struct user_namespace *ns = current_user_ns();
struct user_namespace *ns = current_user_ns();
struct user_namespace *ns = current_user_ns();
struct user_namespace *user_ns = current_user_ns();
!ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN))
if (!has_ns_capability(parent, current_user_ns(), CAP_SYS_PTRACE))