)]}'
{
  "commit": "82bbd447199ff1441031d2eaf9afe041550cf525",
  "tree": "292e2762b88320af684b83886ce5df57546468d4",
  "parents": [
    "bab8e90bca64a87dd058527ae1d02596d35dc601"
  ],
  "author": {
    "name": "Stefan Berger",
    "email": "stefanb@linux.ibm.com",
    "time": "Wed Mar 25 17:33:49 2026 -0400"
  },
  "committer": {
    "name": "Mimi Zohar",
    "email": "zohar@linux.ibm.com",
    "time": "Wed Apr 01 10:16:53 2026 -0400"
  },
  "message": "evm: Enforce signatures version 3 with new EVM policy \u0027bit 3\u0027\n\nEnable the configuration of EVM so that it requires that asymmetric\nsignatures it accepts are of version 3 (sigv3). To enable this, introduce\nbit 3 (value 0x0008) that the user may write to EVM\u0027s securityfs policy\nconfiguration file \u0027evm\u0027 for sigv3 enforcement.\n\nMention bit 3 in the documentation.\n\nSigned-off-by: Stefan Berger \u003cstefanb@linux.ibm.com\u003e\nSigned-off-by: Mimi Zohar \u003czohar@linux.ibm.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "44750a933db498a833791aa29a461a2623aab39c",
      "old_mode": 33188,
      "old_path": "Documentation/ABI/testing/evm",
      "new_id": "db3007babb58cbf268028a65c867236ca3791e8f",
      "new_mode": 33188,
      "new_path": "Documentation/ABI/testing/evm"
    },
    {
      "type": "modify",
      "old_id": "51aba5a542750d33b0435366a369731716f1f291",
      "old_mode": 33188,
      "old_path": "security/integrity/evm/evm.h",
      "new_id": "694552aceaf8da2ce149b46096faf72fac2f36e0",
      "new_mode": 33188,
      "new_path": "security/integrity/evm/evm.h"
    },
    {
      "type": "modify",
      "old_id": "b15d9d933b8463faedbd5c0bfd114d28e7cdb631",
      "old_mode": 33188,
      "old_path": "security/integrity/evm/evm_main.c",
      "new_id": "b59e3f121b8a89edb14d811351ec393a69de8ff7",
      "new_mode": 33188,
      "new_path": "security/integrity/evm/evm_main.c"
    }
  ]
}
