Skip to content

Enginex0/Super-Builders

Repository files navigation

⚑ Super-Builders

Pre-Patched GKI Kernel Builds for ZeroMount + SUSFS

Every kernel version. Every KSU variant. One CI pipeline.

Beta GKI Telegram


Warning

Super-Builders is in active development. Kernel builds are provided as-is.

Flashing a custom kernel carries inherent risk. You are solely responsible for any outcome β€” including bootloops, data loss, or bricked devices. Review the patches, understand your device's kernel version, and make sure you know what you're doing before flashing. If in doubt, fork this repo and build the kernel yourself.

No warranty. No liability. Your device, your risk.


🧬 What is Super-Builders?

Super-Builders is the kernel build pipeline for ZeroMount. It takes Google's stock GKI kernel sources, applies the SUSFS + ZeroMount VFS patches, and compiles them across every supported Android version, kernel version, and KSU variant via GitHub Actions CI.

The kernels built here provide the infrastructure layer β€” the hiding primitives, VFS hooks, and control interfaces that the ZeroMount userspace module relies on for mountless module loading, root detection evasion, and SUSFS automation.

Super-Builders builds the engine. ZeroMount drives it.


✨ What's In The Kernel Patches

SUSFS Hiding Infrastructure

  • Path hiding β€” files and directories vanish from readdir and path lookups for unprivileged apps
  • Kstat spoofing β€” file metadata (inode, device, timestamps, size) returns stock values to stat/fstat/lstat
  • Maps hiding β€” /proc/PID/maps, /proc/PID/mem, pagemap, and map_files entries blanked for flagged inodes
  • Mount ID spoofing β€” non-SU processes see fake mount IDs across mountinfo, fdinfo, statfs
  • Mount hiding β€” KSU mount entries filtered from /proc/PID/mountinfo for non-root processes
  • Uname spoofing β€” uname -r / uname -v return stock-looking kernel version strings
  • Cmdline & bootconfig spoofing β€” /proc/cmdline and /proc/bootconfig show clean boot state
  • AVC log suppression β€” SELinux audit denial messages suppressed from dmesg/logcat
  • Kallsyms hiding β€” SUSFS and ZeroMount kernel symbols hidden from /proc/kallsyms

ZeroMount VFS Engine

  • VFS path redirection β€” intercepts getname() to redirect file lookups at the VFS layer, zero mount table entries
  • Directory entry injection β€” module files appear in ls / readdir like stock system files
  • d_path spoofing β€” /proc/PID/fd symlinks and d_path() return virtual paths
  • Mmap metadata spoofing β€” /proc/PID/maps dev/ino replaced with stock values for redirected files
  • SELinux xattr injection β€” redirected files carry correct SELinux contexts (system_file, vendor_file, etc.)
  • statfs spoofing β€” system partitions report EROFS_SUPER_MAGIC as expected
  • Write protection β€” injected files are read-only through virtual paths, preventing source corruption
  • Bloom filter β€” 4096-bit 3-hash pre-check rejects non-matching paths in a few CPU cycles
  • ioctl control β€” /dev/zeromount miscdevice with 11 commands for userspace rule management

Custom Extensions (Not in Upstream SUSFS)

  • Kstat redirect β€” single supercall maps virtual-path stat to real-path metadata
  • Unicode filter β€” blocks filesystem path attacks using invisible/confusable unicode characters
  • AS_FLAGS collision guards β€” BUILD_BUG_ON prevents inode flag bit conflicts between SUSFS and ZeroMount

Performance & Safety

  • Inline fast-path β€” root/system processes skip hiding logic entirely (zero overhead)
  • Two-level readdir guard β€” parent directory flags enable early skip when no hidden children exist
  • RCU-protected data structures β€” all hash tables use Read-Copy-Update for lock-free concurrent reads
  • Zygote SID null guard β€” prevents false-positive process classification during early boot
  • UID range fix β€” all Android app UIDs (10000–19999) correctly recognized
  • Memory barriers β€” WRITE_ONCE/READ_ONCE on hot-path hook flags for cross-CPU safety
  • strncpy null-termination β€” buffer overread prevention across 5+ SUSFS entry points
  • EACCES removal β€” hidden paths return ENOENT (indistinguishable from nonexistent) instead of leaking SUSFS presence

πŸ“‹ Build Progress

GKI Kernels

Android Kernel Sublevels Variants Patches Build
Android 12 5.10 107 β†’ 246 SukiSU, ReSukiSU, KSU-Next, WKSU βœ… βœ… All green
Android 13 5.10 107 β†’ 246 SukiSU, ReSukiSU, KSU-Next, WKSU βœ… πŸ”„ In progress
Android 13 5.15 41 β†’ 194 SukiSU, ReSukiSU, KSU-Next, WKSU βœ… πŸ”„ In progress
Android 14 5.15 131 β†’ 194 SukiSU, ReSukiSU, KSU-Next, WKSU βœ… πŸ”„ In progress
Android 14 6.1 25 β†’ 157 SukiSU, ReSukiSU, KSU-Next, WKSU βœ… πŸ”„ In progress
Android 15 6.6 30 β†’ 118 SukiSU, ReSukiSU, KSU-Next, WKSU βœ… πŸ”„ In progress
Android 16 6.12 23 β†’ 58 SukiSU, ReSukiSU, KSU-Next, WKSU βœ… πŸ”„ In progress

Pre-GKI

Android Kernel Sublevels Variants Patches Build
Android 12 5.4 (LTS) 302 SukiSU, ReSukiSU βœ… βœ… All green

KernelSU-Next and WKSU are not supported on 5.4 β€” they lack pre-5.7 compatibility (TWA_RESUME enum).

Not Yet Done

Target Status Notes
non-GKI 4.19 πŸ”² Planned β€”
non-GKI 4.14 πŸ”² Planned β€”
MKSU workflow πŸ”² Planned No SUSFS branch exists upstream yet
RKSU workflow πŸ”² Planned No SUSFS integration upstream yet

Deferred

Target Status Notes
USB ADB filter (65_ patches) ⏸️ Deferred Patches archived β€” may revisit later

πŸ”§ Patch Architecture

Each kernel version directory contains the same three-layer patch system:

android12-5.10/
β”œβ”€β”€ SukiSU-Ultra/patches/
β”‚   β”œβ”€β”€ 50_enhanced_susfs-android12-5.10.patch    # SUSFS hiding infrastructure (~3900 lines)
β”‚   β”œβ”€β”€ 60_zeromount-android12-5.10.patch          # ZeroMount VFS driver (~2200 lines)
β”‚   └── 70_ksu_safety-sukisu-5.10.patch            # KSU variant-specific safety fixes
β”œβ”€β”€ KernelSU-Next/patches/
β”‚   β”œβ”€β”€ 50_enhanced_susfs-android12-5.10.patch     # same 50_ β€” variant-independent
β”‚   β”œβ”€β”€ 60_zeromount-android12-5.10.patch           # same 60_ β€” variant-independent
β”‚   └── 70_ksu_safety-kernelsu-next-5.10.patch     # different 70_ β€” variant-specific
β”œβ”€β”€ build-helpers/                                  # sublevel compat scripts
└── defconfig.fragment                              # kernel config flags

50_ (Enhanced SUSFS) β€” The core hiding infrastructure. Hooks readdir, namei, stat, proc, namespace, and more. Shared across all KSU variants β€” same patch, different forks.

60_ (ZeroMount VFS) β€” The mountless file injection driver. Intercepts getname(), injects directory entries, spoofs d_path, xattrs, and statfs. Also variant-independent.

70_ (KSU Safety) β€” Small variant-specific patches for each KSU fork. Fixes null-termination, UID ranges, zygote guards, and supercall wiring in the fork's own kernel/ directory.

build-helpers/ β€” Scripts that handle sublevel-specific compatibility issues across kernel versions. Different sublevels have different API surfaces β€” these scripts detect and adapt at build time.

defconfig.fragment β€” Kernel config flags enabling SUSFS, ZeroMount, ZRAM, BBR, and other features.

Application order: 50_ β†’ 70_ β†’ 60_ β†’ build-helpers


πŸ—οΈ KSU Variants

Variant Fork 5.4 Support
SukiSU Ultra SukiSU-Ultra βœ…
ReSukiSU ReSukiSU βœ…
KernelSU-Next KernelSU-Next πŸ”² Planned
WKSU WildKSU πŸ”² Planned

All four variants share the same 50_ and 60_ kernel patches. The 70_ patch is generated per-variant to address safety issues specific to each fork's codebase.


πŸš€ Quick Start

  1. Find your kernel version β€” check Settings β†’ About Phone β†’ Kernel version or run uname -r
  2. Download the matching build from Releases for your Android version, kernel sublevel, and preferred KSU variant
  3. Flash the kernel using your preferred method (fastboot, custom recovery, etc.)
  4. Install ZeroMount β€” the userspace module that activates the kernel features
  5. Reboot and open the ZeroMount WebUI from your KSU manager

Caution

Flashing the wrong kernel version will bootloop your device. Match your exact Android version and kernel sublevel. If you're unsure, don't flash β€” ask in the Telegram group first.


πŸ”¨ Build It Yourself

Every build runs through GitHub Actions CI. Fork this repo and trigger the workflow for your target:

# Dispatch a specific kernel build
gh workflow run kernel-a12-5.10.yml --ref main \
  -f ksu_variant=SukiSU \
  -f add_susfs=true \
  -f add_zeromount=true

# Or use kernel-custom.yml for single-sublevel builds
gh workflow run kernel-custom.yml --ref main \
  -f kernel_target="android12-5.10.107 (2022-11)" \
  -f ksu_variant=All

The CI pipeline handles kernel source checkout, patch application, build-helper execution, compilation, and artifact packaging automatically.


πŸ’¬ Community

$ super-builders --connect

 β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•β•šβ•β•β–ˆβ–ˆβ•”β•β•β•
β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘        β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•  β–ˆβ–ˆβ•‘        β–ˆβ–ˆβ•‘
β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•‘
 β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β•  β•šβ•β•β•β•β•šβ•β•  β•šβ•β•β•β•β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β•   β•šβ•β•

 [βœ“] SIGNAL    ──→  t.me/superpowers9
 [βœ“] UPLINK    ──→  kernel builds Β· bug triage Β· feature drops
 [βœ“] STATUS    ──→  OPEN β€” all operators welcome

Telegram


πŸ™ Credits

  • ZeroMount β€” the userspace module that drives these kernels
  • SUSFS by simonpunk β€” the hiding framework these patches are built on
  • SukiSU Ultra β€” SukiSU fork with builtin SUSFS
  • ReSukiSU β€” ReSukiSU fork
  • KernelSU-Next β€” next-gen KernelSU fork
  • WildKSU β€” WildKSU fork
  • KernelSU by tiann β€” the original kernel root framework
  • NoMount β€” the project that inspired the VFS approach

πŸ“„ License

This project is licensed under the GNU General Public License v3.0.


⚑ The kernel infrastructure behind πŸ‘» GHOST mode.

About

GKI Kernel Builder with KernelSU + SUSFS + ZeroMount

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors