The Linux Kernel
Development process
Submitting patches
Code of conduct
Maintainer handbook
All development-process docs
Core API
Driver APIs
Subsystems
Core subsystems
Human interfaces
Networking interfaces
Storage interfaces
Other subsystems
Accounting
CPUFreq - CPU frequency and voltage scaling code in the Linux(TM) kernel
FPGA
I2C/SMBus Subsystem
Industrial I/O
PCMCIA
Serial Peripheral Interface (SPI)
1-Wire Subsystem
Watchdog Support
Virtualization Support
Hardware Monitoring
Compute Accelerators
Security Documentation
Credentials in Linux
Confidential Computing in Linux for x86 virtualization
IMA Template Management Mechanism
Kernel Keys
Linux Security Modules: General Security Hooks for Linux
Linux Security Module Development
Linux Secure Attention Key (SAK) handling
SCTP
Kernel Self-Protection
SipHash - a short input PRF
HalfSipHash - SipHash’s insecure younger cousin
Trusted Platform Module documentation
TPM Event Log
TPM Security
Null Primary Key Certification in Userspace
TPM FIFO interface driver
Virtual TPM Proxy Driver for Linux Containers
Virtual TPM interface for Xen
Firmware TPM Driver
Digital Signature Verification API
Landlock LSM: kernel documentation
Secrets documentation
Integrity Policy Enforcement (IPE) - Kernel Documentation
Crypto API
BPF Documentation
USB support
PCI Bus Subsystem
Assorted Miscellaneous Devices Documentation
PECI Subsystem
WMI Subsystem
TEE Subsystem
Locking
Licensing rules
Writing documentation
Development tools
Testing guide
Hacking guide
Tracing
Fault injection
Livepatching
Rust
Administration
Build system
Reporting issues
Userspace tools
Userspace API
Firmware
Firmware and Devicetree
CPU architectures
Unsorted documentation
Translations
The Linux Kernel
Kernel subsystem documentation
Security Documentation
Trusted Platform Module documentation
View page source
Trusted Platform Module documentation
¶
TPM Event Log
Introduction
UEFI event log
References
TPM Security
Introduction
Snooping and Alteration Attacks against the bus
Measurement (PCR) Integrity
Secrets Guarding
Establishing Initial Trust with the TPM
Stacking Trust
Session Properties
Protection Types
Null Primary Key Certification in Userspace
TPM FIFO interface driver
References
Virtual TPM Proxy Driver for Linux Containers
Introduction
Design
UAPI
Virtual TPM interface for Xen
Introduction
Design Overview
Integration With Xen
Firmware TPM Driver
Introduction
Design