new_rlim         1646 include/linux/lsm_hooks.h 				struct rlimit *new_rlim);
new_rlim           12 include/linux/resource.h 		struct rlimit *new_rlim, struct rlimit *old_rlim);
new_rlim          401 include/linux/security.h 		struct rlimit *new_rlim);
new_rlim         1073 include/linux/security.h 					  struct rlimit *new_rlim)
new_rlim          916 include/linux/syscalls.h 				const struct rlimit64 __user *new_rlim,
new_rlim         1528 kernel/sys.c   		struct rlimit *new_rlim, struct rlimit *old_rlim)
new_rlim         1535 kernel/sys.c   	if (new_rlim) {
new_rlim         1536 kernel/sys.c   		if (new_rlim->rlim_cur > new_rlim->rlim_max)
new_rlim         1539 kernel/sys.c   				new_rlim->rlim_max > sysctl_nr_open)
new_rlim         1552 kernel/sys.c   	if (new_rlim) {
new_rlim         1555 kernel/sys.c   		if (new_rlim->rlim_max > rlim->rlim_max &&
new_rlim         1559 kernel/sys.c   			retval = security_task_setrlimit(tsk, resource, new_rlim);
new_rlim         1564 kernel/sys.c   		if (new_rlim)
new_rlim         1565 kernel/sys.c   			*rlim = *new_rlim;
new_rlim         1574 kernel/sys.c   	 if (!retval && new_rlim && resource == RLIMIT_CPU &&
new_rlim         1575 kernel/sys.c   	     new_rlim->rlim_cur != RLIM_INFINITY &&
new_rlim         1577 kernel/sys.c   		update_rlimit_cpu(tsk, new_rlim->rlim_cur);
new_rlim         1607 kernel/sys.c   		const struct rlimit64 __user *, new_rlim,
new_rlim         1619 kernel/sys.c   	if (new_rlim) {
new_rlim         1620 kernel/sys.c   		if (copy_from_user(&new64, new_rlim, sizeof(new64)))
new_rlim         1640 kernel/sys.c   	ret = do_prlimit(tsk, resource, new_rlim ? &new : NULL,
new_rlim         1655 kernel/sys.c   	struct rlimit new_rlim;
new_rlim         1657 kernel/sys.c   	if (copy_from_user(&new_rlim, rlim, sizeof(*rlim)))
new_rlim         1659 kernel/sys.c   	return do_prlimit(current, resource, &new_rlim, NULL);
new_rlim           37 security/apparmor/include/resource.h 		      unsigned int resource, struct rlimit *new_rlim);
new_rlim          717 security/apparmor/lsm.c 		unsigned int resource, struct rlimit *new_rlim)
new_rlim          723 security/apparmor/lsm.c 		error = aa_task_setrlimit(label, task, resource, new_rlim);
new_rlim           82 security/apparmor/resource.c 			     struct rlimit *new_rlim)
new_rlim           86 security/apparmor/resource.c 	if (profile->rlimits.mask & (1 << resource) && new_rlim->rlim_max >
new_rlim           89 security/apparmor/resource.c 	return audit_resource(profile, resource, new_rlim->rlim_max, NULL, NULL,
new_rlim          105 security/apparmor/resource.c 		      unsigned int resource, struct rlimit *new_rlim)
new_rlim          126 security/apparmor/resource.c 					       new_rlim->rlim_max, peer,
new_rlim          130 security/apparmor/resource.c 				profile_setrlimit(profile, resource, new_rlim));
new_rlim         1681 security/security.c 		struct rlimit *new_rlim)
new_rlim         1683 security/security.c 	return call_int_hook(task_setrlimit, 0, p, resource, new_rlim);
new_rlim         4106 security/selinux/hooks.c 		struct rlimit *new_rlim)
new_rlim         4114 security/selinux/hooks.c 	if (old_rlim->rlim_max != new_rlim->rlim_max)