Pre-Patched GKI Kernel Builds for ZeroMount + SUSFS
Every kernel version. Every KSU variant. One CI pipeline.
Warning
Super-Builders is in active development. Kernel builds are provided as-is.
Flashing a custom kernel carries inherent risk. You are solely responsible for any outcome β including bootloops, data loss, or bricked devices. Review the patches, understand your device's kernel version, and make sure you know what you're doing before flashing. If in doubt, fork this repo and build the kernel yourself.
No warranty. No liability. Your device, your risk.
Super-Builders is the kernel build pipeline for ZeroMount. It takes Google's stock GKI kernel sources, applies the SUSFS + ZeroMount VFS patches, and compiles them across every supported Android version, kernel version, and KSU variant via GitHub Actions CI.
The kernels built here provide the infrastructure layer β the hiding primitives, VFS hooks, and control interfaces that the ZeroMount userspace module relies on for mountless module loading, root detection evasion, and SUSFS automation.
Super-Builders builds the engine. ZeroMount drives it.
- Path hiding β files and directories vanish from
readdirand path lookups for unprivileged apps - Kstat spoofing β file metadata (inode, device, timestamps, size) returns stock values to
stat/fstat/lstat - Maps hiding β
/proc/PID/maps,/proc/PID/mem, pagemap, andmap_filesentries blanked for flagged inodes - Mount ID spoofing β non-SU processes see fake mount IDs across
mountinfo,fdinfo,statfs - Mount hiding β KSU mount entries filtered from
/proc/PID/mountinfofor non-root processes - Uname spoofing β
uname -r/uname -vreturn stock-looking kernel version strings - Cmdline & bootconfig spoofing β
/proc/cmdlineand/proc/bootconfigshow clean boot state - AVC log suppression β SELinux audit denial messages suppressed from dmesg/logcat
- Kallsyms hiding β SUSFS and ZeroMount kernel symbols hidden from
/proc/kallsyms
- VFS path redirection β intercepts
getname()to redirect file lookups at the VFS layer, zero mount table entries - Directory entry injection β module files appear in
ls/readdirlike stock system files - d_path spoofing β
/proc/PID/fdsymlinks andd_path()return virtual paths - Mmap metadata spoofing β
/proc/PID/mapsdev/ino replaced with stock values for redirected files - SELinux xattr injection β redirected files carry correct SELinux contexts (
system_file,vendor_file, etc.) - statfs spoofing β system partitions report
EROFS_SUPER_MAGICas expected - Write protection β injected files are read-only through virtual paths, preventing source corruption
- Bloom filter β 4096-bit 3-hash pre-check rejects non-matching paths in a few CPU cycles
- ioctl control β
/dev/zeromountmiscdevice with 11 commands for userspace rule management
- Kstat redirect β single supercall maps virtual-path stat to real-path metadata
- Unicode filter β blocks filesystem path attacks using invisible/confusable unicode characters
- AS_FLAGS collision guards β
BUILD_BUG_ONprevents inode flag bit conflicts between SUSFS and ZeroMount
- Inline fast-path β root/system processes skip hiding logic entirely (zero overhead)
- Two-level readdir guard β parent directory flags enable early skip when no hidden children exist
- RCU-protected data structures β all hash tables use Read-Copy-Update for lock-free concurrent reads
- Zygote SID null guard β prevents false-positive process classification during early boot
- UID range fix β all Android app UIDs (10000β19999) correctly recognized
- Memory barriers β
WRITE_ONCE/READ_ONCEon hot-path hook flags for cross-CPU safety - strncpy null-termination β buffer overread prevention across 5+ SUSFS entry points
- EACCES removal β hidden paths return
ENOENT(indistinguishable from nonexistent) instead of leaking SUSFS presence
| Android | Kernel | Sublevels | Variants | Patches | Build |
|---|---|---|---|---|---|
| Android 12 | 5.10 | 107 β 246 | SukiSU, ReSukiSU, KSU-Next, WKSU | β | β All green |
| Android 13 | 5.10 | 107 β 246 | SukiSU, ReSukiSU, KSU-Next, WKSU | β | π In progress |
| Android 13 | 5.15 | 41 β 194 | SukiSU, ReSukiSU, KSU-Next, WKSU | β | π In progress |
| Android 14 | 5.15 | 131 β 194 | SukiSU, ReSukiSU, KSU-Next, WKSU | β | π In progress |
| Android 14 | 6.1 | 25 β 157 | SukiSU, ReSukiSU, KSU-Next, WKSU | β | π In progress |
| Android 15 | 6.6 | 30 β 118 | SukiSU, ReSukiSU, KSU-Next, WKSU | β | π In progress |
| Android 16 | 6.12 | 23 β 58 | SukiSU, ReSukiSU, KSU-Next, WKSU | β | π In progress |
| Android | Kernel | Sublevels | Variants | Patches | Build |
|---|---|---|---|---|---|
| Android 12 | 5.4 (LTS) | 302 | SukiSU, ReSukiSU | β | β All green |
KernelSU-Next and WKSU are not supported on 5.4 β they lack pre-5.7 compatibility (
TWA_RESUMEenum).
| Target | Status | Notes |
|---|---|---|
| non-GKI 4.19 | π² Planned | β |
| non-GKI 4.14 | π² Planned | β |
| MKSU workflow | π² Planned | No SUSFS branch exists upstream yet |
| RKSU workflow | π² Planned | No SUSFS integration upstream yet |
| Target | Status | Notes |
|---|---|---|
| USB ADB filter (65_ patches) | βΈοΈ Deferred | Patches archived β may revisit later |
Each kernel version directory contains the same three-layer patch system:
android12-5.10/
βββ SukiSU-Ultra/patches/
β βββ 50_enhanced_susfs-android12-5.10.patch # SUSFS hiding infrastructure (~3900 lines)
β βββ 60_zeromount-android12-5.10.patch # ZeroMount VFS driver (~2200 lines)
β βββ 70_ksu_safety-sukisu-5.10.patch # KSU variant-specific safety fixes
βββ KernelSU-Next/patches/
β βββ 50_enhanced_susfs-android12-5.10.patch # same 50_ β variant-independent
β βββ 60_zeromount-android12-5.10.patch # same 60_ β variant-independent
β βββ 70_ksu_safety-kernelsu-next-5.10.patch # different 70_ β variant-specific
βββ build-helpers/ # sublevel compat scripts
βββ defconfig.fragment # kernel config flags
50_ (Enhanced SUSFS) β The core hiding infrastructure. Hooks readdir, namei, stat, proc, namespace, and more. Shared across all KSU variants β same patch, different forks.
60_ (ZeroMount VFS) β The mountless file injection driver. Intercepts getname(), injects directory entries, spoofs d_path, xattrs, and statfs. Also variant-independent.
70_ (KSU Safety) β Small variant-specific patches for each KSU fork. Fixes null-termination, UID ranges, zygote guards, and supercall wiring in the fork's own kernel/ directory.
build-helpers/ β Scripts that handle sublevel-specific compatibility issues across kernel versions. Different sublevels have different API surfaces β these scripts detect and adapt at build time.
defconfig.fragment β Kernel config flags enabling SUSFS, ZeroMount, ZRAM, BBR, and other features.
Application order: 50_ β 70_ β 60_ β build-helpers
| Variant | Fork | 5.4 Support |
|---|---|---|
| SukiSU Ultra | SukiSU-Ultra | β |
| ReSukiSU | ReSukiSU | β |
| KernelSU-Next | KernelSU-Next | π² Planned |
| WKSU | WildKSU | π² Planned |
All four variants share the same 50_ and 60_ kernel patches. The 70_ patch is generated per-variant to address safety issues specific to each fork's codebase.
- Find your kernel version β check
Settings β About Phone β Kernel versionor rununame -r - Download the matching build from Releases for your Android version, kernel sublevel, and preferred KSU variant
- Flash the kernel using your preferred method (fastboot, custom recovery, etc.)
- Install ZeroMount β the userspace module that activates the kernel features
- Reboot and open the ZeroMount WebUI from your KSU manager
Caution
Flashing the wrong kernel version will bootloop your device. Match your exact Android version and kernel sublevel. If you're unsure, don't flash β ask in the Telegram group first.
Every build runs through GitHub Actions CI. Fork this repo and trigger the workflow for your target:
# Dispatch a specific kernel build
gh workflow run kernel-a12-5.10.yml --ref main \
-f ksu_variant=SukiSU \
-f add_susfs=true \
-f add_zeromount=true
# Or use kernel-custom.yml for single-sublevel builds
gh workflow run kernel-custom.yml --ref main \
-f kernel_target="android12-5.10.107 (2022-11)" \
-f ksu_variant=AllThe CI pipeline handles kernel source checkout, patch application, build-helper execution, compilation, and artifact packaging automatically.
$ super-builders --connect
βββββββ βββββββ ββββ βββββββ βββββββββββ ββββββββββββββββ
ββββββββββββββββββββββ ββββββββ ββββββββββββββββββββββββββββ
βββ βββ βββββββββ βββββββββ βββββββββ βββ βββ
βββ βββ βββββββββββββββββββββββββββββ βββ βββ
ββββββββββββββββββββ βββββββββ ββββββββββββββββββββββ βββ
βββββββ βββββββ βββ ββββββββ βββββββββββββ βββββββ βββ
[β] SIGNAL βββ t.me/superpowers9
[β] UPLINK βββ kernel builds Β· bug triage Β· feature drops
[β] STATUS βββ OPEN β all operators welcome- ZeroMount β the userspace module that drives these kernels
- SUSFS by simonpunk β the hiding framework these patches are built on
- SukiSU Ultra β SukiSU fork with builtin SUSFS
- ReSukiSU β ReSukiSU fork
- KernelSU-Next β next-gen KernelSU fork
- WildKSU β WildKSU fork
- KernelSU by tiann β the original kernel root framework
- NoMount β the project that inspired the VFS approach
This project is licensed under the GNU General Public License v3.0.
β‘ The kernel infrastructure behind π» GHOST mode.