__task_cred
pcred = __task_cred(p);
tcred = __task_cred(task);
cred = __task_cred(task);
uid = task ? __task_cred(task)->euid : GLOBAL_ROOT_UID;
cred = __task_cred(p);
cred = __task_cred(p);
cred = __task_cred(p);
pcred = __task_cred(parent);
cred = __task_cred(p);
cred = __task_cred(task);
if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) {
if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) {
___val = __task_cred((task))->xxx; \
ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NONE);
ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NOAUDIT);
cred = __task_cred((task));
is_capable &= ns_capable(__task_cred(task)->user_ns, CAP_KILL);
user_ns = get_user_ns(__task_cred(tsk)->user_ns);
tcred = __task_cred(task);
if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE))
pcred = __task_cred(p);
const struct cred *pcred = __task_cred(target);
const struct cred *tcred = __task_cred(t);
tcred = __task_cred(task);
const struct cred *cred = current_cred(), *pcred = __task_cred(p);
tcred = __task_cred(tsk);
user_ns = get_user_ns(__task_cred(task)->user_ns);
cred = __task_cred(target);
peer = aa_get_newest_cred_label(__task_cred(task));
p = aa_get_newest_cred_label(__task_cred(task));
is_subset = cap_issubset(__task_cred(p)->cap_permitted,
if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE))
child_cred = __task_cred(child);
cred = __task_cred(parent);
cred = __task_cred(target);
pcred = __task_cred(parent);
return landlock_cred(__task_cred(task))->domain;
parent_subject = landlock_cred(__task_cred(parent));
sid = cred_sid(__task_cred(task));
crsec = selinux_cred(__task_cred(p));
cred = __task_cred(t);
tcred = __task_cred(tsk);
tracercred = __task_cred(tracer);
!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))
if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))