The Linux Kernel
Development process
Submitting patches
Code of conduct
Maintainer handbook
All development-process docs
Core API
Driver APIs
Subsystems
Core subsystems
Human interfaces
Networking interfaces
Storage interfaces
Other subsystems
Accounting
CPUFreq - CPU frequency and voltage scaling code in the Linux(TM) kernel
FPGA
I2C/SMBus Subsystem
Industrial I/O
PCMCIA
Serial Peripheral Interface (SPI)
1-Wire Subsystem
Watchdog Support
Virtualization Support
Hardware Monitoring
Compute Accelerators
Security Documentation
Credentials in Linux
Confidential Computing in Linux for x86 virtualization
IMA Template Management Mechanism
Kernel Keys
Linux Security Modules: General Security Hooks for Linux
Linux Security Module Development
Linux Secure Attention Key (SAK) handling
SCTP
Kernel Self-Protection
SipHash - a short input PRF
HalfSipHash - SipHash’s insecure younger cousin
Trusted Platform Module documentation
Digital Signature Verification API
Landlock LSM: kernel documentation
Secrets documentation
Confidential Computing secrets
Integrity Policy Enforcement (IPE) - Kernel Documentation
Crypto API
BPF Documentation
USB support
PCI Bus Subsystem
Assorted Miscellaneous Devices Documentation
PECI Subsystem
WMI Subsystem
TEE Subsystem
Locking
Licensing rules
Writing documentation
Development tools
Testing guide
Hacking guide
Tracing
Fault injection
Livepatching
Rust
Administration
Build system
Reporting issues
Userspace tools
Userspace API
Firmware
Firmware and Devicetree
CPU architectures
Unsorted documentation
Translations
The Linux Kernel
Kernel subsystem documentation
Security Documentation
Secrets documentation
View page source
Secrets documentation
¶
Confidential Computing secrets
Introduction
Secret data flow
Application usage example
References