First add a generic LSM_INT_VERDICT_FAULT value to indicate a system failure during checking. Second, add a LSM_INT_VERDICT_UNKNOWNKEY to signal that the payload was signed with a key other than one that exists in the secondary keyring. And finally add an LSM_INT_VERDICT_UNEXPECTED enum value to indicate that a unexpected hash value was encountered at some stage of verification. Signed-off-by: Blaise Boscaccy --- include/linux/security.h | 3 +++ 1 file changed, 3 insertions(+) diff --git a/include/linux/security.h b/include/linux/security.h index b3fd04baa78d0..4b4b8808f67de 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -106,6 +106,9 @@ enum lsm_integrity_verdict { LSM_INT_VERDICT_OK, LSM_INT_VERDICT_UNSIGNED, LSM_INT_VERDICT_PARTIALSIG, + LSM_INT_VERDICT_UNKNOWNKEY, + LSM_INT_VERDICT_UNEXPECTED, + LSM_INT_VERDICT_FAULT, LSM_INT_VERDICT_BADSIG, }; -- 2.53.0