const struct qstr *qstr, const char **name,
                                     void **value, size_t *len)
 {
+       struct task_smack *tsp = smack_cred(current_cred());
        struct inode_smack *issp = smack_inode(inode);
-       struct smack_known *skp = smk_of_current();
+       struct smack_known *skp = smk_of_task(tsp);
        struct smack_known *isp = smk_of_inode(inode);
        struct smack_known *dsp = smk_of_inode(dir);
        int may;
                *name = XATTR_SMACK_SUFFIX;
 
        if (value && len) {
-               rcu_read_lock();
-               may = smk_access_entry(skp->smk_known, dsp->smk_known,
-                                      &skp->smk_rules);
-               rcu_read_unlock();
+               /*
+                * If equal, transmuting already occurred in
+                * smack_dentry_create_files_as(). No need to check again.
+                */
+               if (tsp->smk_task != tsp->smk_transmuted) {
+                       rcu_read_lock();
+                       may = smk_access_entry(skp->smk_known, dsp->smk_known,
+                                              &skp->smk_rules);
+                       rcu_read_unlock();
+               }
 
                /*
-                * If the access rule allows transmutation and
-                * the directory requests transmutation then
-                * by all means transmute.
+                * In addition to having smk_task equal to smk_transmuted,
+                * if the access rule allows transmutation and the directory
+                * requests transmutation then by all means transmute.
                 * Mark the inode as changed.
                 */
-               if (may > 0 && ((may & MAY_TRANSMUTE) != 0) &&
-                   smk_inode_transmutable(dir)) {
-                       isp = dsp;
+               if ((tsp->smk_task == tsp->smk_transmuted) ||
+                   (may > 0 && ((may & MAY_TRANSMUTE) != 0) &&
+                    smk_inode_transmutable(dir))) {
+                       /*
+                        * The caller of smack_dentry_create_files_as()
+                        * should have overridden the current cred, so the
+                        * inode label was already set correctly in
+                        * smack_inode_alloc_security().
+                        */
+                       if (tsp->smk_task != tsp->smk_transmuted)
+                               isp = dsp;
                        issp->smk_flags |= SMK_INODE_CHANGED;
                }
 
                 * providing access is transmuting use the containing
                 * directory label instead of the process label.
                 */
-               if (may > 0 && (may & MAY_TRANSMUTE))
+               if (may > 0 && (may & MAY_TRANSMUTE)) {
                        ntsp->smk_task = isp->smk_inode;
+                       ntsp->smk_transmuted = ntsp->smk_task;
+               }
        }
        return 0;
 }