A comprehensive curated list of KernelSU resources, tools, modules, and documentation
Intro Β β’ Β Prebuilt Kernels Β β’ Β Docs Β β’ Β Community
KernelSU is a kernel-based root solution for Android that delivers superior security and reliability compared to traditional rooting methods. By operating at the kernel level, it provides enhanced security isolation, maintains system integrity, and offers powerful module management with flexible mounting systems.
Important
KernelSU 3.0+ Major Changes: From version 3.0 onwards, KernelSU has removed built-in module mounting. Fresh installations now require a metamodule for modules to function. See Understanding Metamodules for details.
- Zero System Modification: Maintains system integrity and OTA compatibility by operating entirely within kernel space
- Advanced Permission Control: Granular app-level root access management with customizable profiles
- Enhanced Security Model: Kernel-level isolation prevents root detection and tampering
- Flexible Module System: Metamodule architecture supporting multiple mounting strategies (OverlayFS, Magic Mount, Hybrid)
- LKM Mode Support: Load KernelSU as a kernel module without replacing your kernel (preserves manufacturer optimizations)
- App Profile System: Customizable groups, capabilities, and SELinux rules for fine-grained root privilege control
Learn More: Comprehensive KernelSU Guide | Official Documentation
- What is KernelSU?
- Getting Started
- Installation Modes
- Understanding Metamodules
- KernelSU Variants
- Comparison
- Prebuilt Kernels
- Installation
- Documentation
- Modules and Tools
- Building from Source
- Community
- Troubleshooting β’ FAQ β’ Contributing
- Disclaimer β’ License
Before installing KernelSU, ensure you have:
- Unlocked bootloader (required for all installation methods)
- Complete data backup (always backup before modifying your device)
- ADB and Fastboot tools installed on your computer
- Compatible device (check compatibility below)
Tip
New to bootloader unlocking? Check out the comprehensive guide at Awesome-Android-Root
-
Check Compatibility
- Kernel 5.10+ for official KernelSU (Android 12+)
- Kernel 4.4-6.6 for KernelSU-Next (Android 9+)
- Kernel 3.4-5.4+ for SuKiSu-Ultra (Android 7+)
-
Choose Installation Mode
- GKI Mode: Replaces device kernel (universal compatibility, works on Samsung Knox)
- LKM Mode: Loads as kernel module (preserves optimizations, easy updates)
- See Installation Modes for detailed comparison
-
Download Manager
- Get the official KernelSU Manager for your variant
-
Install KernelSU
- Follow the installation guide for your chosen method
-
Install Metamodule
- CRITICAL: KernelSU 3.0+ requires a metamodule for modules to work
- See Understanding Metamodules section
-
Verify Installation
- Open KernelSU Manager and confirm root status
| Device Age | Kernel Version | Recommended Variant | Primary Benefits |
|---|---|---|---|
| 2021+ | 5.10+ (GKI 2.0) | KernelSU Official | Maximum stability, official support |
| 2018-2021 | 4.4-6.6 | KernelSU-Next | Enhanced features, broad compatibility |
| Pre-2018 | 3.4-5.4+ | SuKiSu-Ultra | Legacy support, advanced hiding |
After successful installation:
- Install Metamodule: Choose and install a metamodule (meta-overlayfs recommended for most users)
- Configure App Profiles: Set up App Profiles for granular root permission management
- Install Module Manager: Use MMRL for easier module management
- Setup Root Hiding: Install SuSFS module for banking/payment app compatibility
- Join Community: Connect with Telegram community for support and updates
- Create Backup: Make a backup of your patched boot image for recovery
KernelSU supports two installation modes on GKI-compatible devices, each with distinct advantages.
How it works: Replaces device's original kernel with KernelSU Generic Kernel Image.
Advantages:
- β Universal GKI device compatibility
- β Works on Samsung Knox devices
- β Independent of firmware updates
- β Better for heavily modified devices
- β More stable on custom ROMs
Disadvantages:
- β Loses manufacturer kernel optimizations
- β Requires manual fastboot flashing
- β Must reflash after major updates
Best for: Samsung devices, emulators, WSA, custom ROMs, devices without official firmware
How it works: Loads KernelSU as a kernel module without replacing the kernel.
Advantages:
- β Preserves original kernel and optimizations
- β Easy in-app updates
- β OTA-friendly (install to inactive slot)
- β No AVB/dm-verity issues
- β Can disable without reboot
- β Better performance (keeps manufacturer tuning)
Disadvantages:
- β Requires official firmware
- β May not work on all devices
- β Less compatible with modified firmwares
Best for: Most modern phones with stock/near-stock firmware
| Scenario | Recommended Mode | Reason |
|---|---|---|
| Stock firmware phones | LKM | Preserves optimizations, easy updates |
| Samsung devices | GKI | Knox compatibility |
| Custom ROMs | GKI | Better modified firmware support |
| Emulators/WSA | GKI | Universal compatibility |
| Heavily modified | GKI | More reliable |
Detailed Guide: See the complete installation modes comparison for more information.
Important
CRITICAL CHANGE IN KERNELSU 3.0+: KernelSU no longer has built-in module mounting. Fresh installations REQUIRE a metamodule for modules to function. Without a metamodule, modules will be installed but NOT mounted.
A metamodule is a special type of KernelSU module that provides core infrastructure for the module system. Unlike regular modules that modify system files, metamodules control how regular modules are installed and mounted.
The metamodule architecture provides several key benefits:
- π‘οΈ Reduced Detection Surface: KernelSU itself doesn't perform mounts, reducing detection vectors for banking apps
- π§ Flexibility: Users can choose mounting implementation (OverlayFS, Magic Mount, hybrid)
- πͺ Stability: Core KernelSU remains stable while mounting implementations can evolve independently
- π Innovation: Community can develop alternative mounting strategies
Warning
Only ONE metamodule can be installed at a time. To switch metamodules:
- Uninstall all regular modules
- Uninstall current metamodule
- Reboot device
- Install new metamodule
- Reinstall regular modules
| Metamodule | Description | Best For |
|---|---|---|
| meta-overlayfs | Official reference implementation using OverlayFS | Most users, standard setup, recommended starting point |
| mountify | OverlayFS with tmpfs/ext4 sparse support, cross-platform (APatch/Magisk) | Reduced detection, multi-root support, advanced users |
| meta-magic_mount | Magic Mount implementation (C-based) | Magisk-style mounting compatibility |
| meta-magic_mount-rs | Magic Mount implementation (Rust-based) with WebUI | Magisk-style mounting with web interface |
| meta-hybrid_mount | Hybrid OverlayFS + Magic Mount with auto-fallback | Maximum compatibility, stealth mode |
Step-by-Step Installation:
- Download metamodule ZIP from GitHub releases (meta-overlayfs recommended)
- Open KernelSU Manager > Modules
- Tap "Install from storage" (β button)
- Select the metamodule ZIP file
- Reboot device
The active metamodule will be displayed in your module list with a special designation.
With a metamodule installed:
- β Most Magisk modules work (when using compatible metamodule)
β οΈ Zygisk modules require ZygiskNext- β Growing native KernelSU module support
- β
Module metadata stored in
/data/adb/modules/ - β
Module content stored in
/data/adb/metamodule/mnt/(with meta-overlayfs)
Complete Guide: For detailed metamodule information, mounting strategies, and troubleshooting, visit the KernelSU Managing Modules Guide
The original and most stable KernelSU implementation for modern Android devices with GKI support.
π View Details
Best For: Modern flagship devices (2021+) prioritizing stability and official support
β¨ Key Features:
- Official GKI 2.0 support (kernel 5.10+)
- Battle-tested stability
- Regular security updates & maintenance
- Comprehensive official documentation
- Wide device compatibility for modern phones
- Active development by original author
Technical Specs:
- Kernel Support: 5.10+ (GKI 2.0), 4.14+ with manual compilation
- Android Version: 12+ (official), 10+ (community builds)
- Architecture: arm64-v8a, x86_64
- Special Support: WSA, ChromeOS, container-based Android
π Resources:
Enhanced fork with extended compatibility, modern UI, and innovative features.
π View Details
Best For: Power users wanting cutting-edge features and broader device compatibility
β¨ Enhanced Features:
- Extended kernel support (4.4-6.6, GKI & non-GKI)
- Dual module system (Magic Mount + OverlayFS with seamless toggle)
- Beautiful Material You UI with dynamic theming
- Advanced module management (backup/restore, bulk ops, dependencies)
- Automatic update system with rollback capability
- WebUI X framework for advanced module interfaces
- Built-in developer tools (logcat, performance monitor)
- Configurable OverlayFS options
Technical Specs:
- Kernel Support: 4.4 - 6.6 (Non-GKI & GKI)
- Android Version: 9+
- Architecture: arm64-v8a, armeabi-v7a, x86_64
- Update Frequency: Very active development with frequent updates
π Resources:
Specialized fork for legacy devices with advanced root hiding and broad compatibility.
π View Details
Best For: Legacy devices and users requiring advanced root hiding for banking apps
β¨ Unique Features:
- Broad legacy kernel compatibility (3.4-5.4+) with extensive backports
- Built on Magic Mount technology for enhanced stability
- KPM (Kernel Patch Module) integration
- SuSFS built-in for superior root hiding
- Multi-architecture including 32-bit ARM support
- Enhanced manager with SuSFS management panel
- Legacy device optimizations
- Community-maintained device database
Technical Specs:
- Kernel Support: 3.4 - 5.4+ (Non-GKI focused)
- Android Version: 7+
- Architecture: arm64-v8a, armeabi-v7a, x86_64
- Update Frequency: Active community-driven development
π Resources:
| Feature | Official KernelSU | KernelSU-Next | SuKiSu-Ultra |
|---|---|---|---|
| Kernel Support | 5.10+ (GKI 2.0) | 4.4 - 6.6 | 3.4 - 5.4+ |
| Android Version | 12+ | 9+ | 7+ |
| Architecture | arm64, x86_64 | arm64, arm, x86_64 | arm64, arm, x86_64 |
| Installation Modes | GKI / LKM | GKI / LKM | GKI |
| Module System | Metamodule (3.0+) | Dual (Magic Mount + OverlayFS) | Magic Mount + OverlayFS |
| Auto Updates | β | β | |
| Root Hiding | Metamodule-based | Advanced | SuSFS Built-in |
| UI/UX | Standard | Material You | Enhanced |
| Legacy Support | β | β Extensive | |
| Update Frequency | Regular | Very Active | Community Active |
| Best For | Modern devices | Power users | Legacy devices |
|
Choose Official KernelSU if: β
Modern device (2021+) |
Choose KernelSU-Next if: β
Kernel 4.4-6.6 |
Choose SuKiSu-Ultra if: β
Legacy device |
| Feature | KernelSU | KernelSU-Next | SuKiSu-Ultra | Magisk | APatch |
|---|---|---|---|---|---|
| Architecture | Kernel-level | Kernel-level | Kernel-level | Userspace | Kernel-level |
| Module System | Metamodule-based (OverlayFS/Magic Mount) | OverlayFS + Magic Mount | Magic Mount + OverlayFS | Magic Mount | OverlayFS |
| Installation Mode | GKI / LKM | GKI / LKM | GKI | Boot Patch | Boot Patch |
| Kernel Support | 5.10+ (GKI 2.0) | 4.4-6.6 | 3.4-5.4+ | Any | 3.18-6.1 |
| Architecture | arm64, x86_64 | arm64, arm, x86_64 | arm64, arm, x86_64 | Universal | arm64 |
| Security Model | App Profile | App Profile | App Profile | Root Toggle | SuperKey |
| Hide Capability | Metamodule-based (Advanced) | Advanced | SuSFS Integrated | Deprecated | Kernel-level |
| Update Method | Manual / LKM | Auto-update / LKM | Manual | OTA | Manual |
| System Modification | Zero | Zero | Zero | Minimal | Zero |
| OTA Compatibility | Excellent | Excellent | Good | Good | Excellent |
| Module Mounting | Requires Metamodule (3.0+) | Built-in | Built-in | Built-in | Built-in |
| Development Status | Active | Very Active | Active | Active | Active |
| Learning Curve | Medium | Medium | Hard | Easy | Hard |
| Community Size | Growing | Medium | Small | Large | Small |
β¨ Click to expand: Detailed Advantages & Benefits
- Kernel-Level Isolation: Root access operates in kernel space, preventing userspace tampering
- App Profile System: Granular per-application permission control with temporal restrictions
- Hardware-Level Protection: Utilizes ARM TrustZone and hardware security features
- Verified Boot Compatible: Maintains system integrity verification where possible
- Advanced Hiding: Kernel-level hiding harder to detect than userspace methods
- Zero System Modification: No changes to system partitions, preserving OTA capabilities
- OverlayFS Efficiency: More efficient than bind mounting with better performance
- Future-Proof Design: Built for modern Android security models and requirements
- Developer-Friendly: Clean APIs and comprehensive documentation
- Modular Architecture: Easy to extend and customize
- Multiple Derivatives: Options for different use cases and device compatibility
- Active Development: Regular updates and feature additions across all variants
- Growing Module Repository: Expanding collection of high-quality modules
- Community Support: Knowledgeable community with expert developers
- Documentation: Comprehensive guides in multiple languages
π Click to expand: Migration from Magisk or Legacy Solutions
Advantages:
- Enhanced security and hiding capabilities
- Better performance with OverlayFS
- Future-proof architecture for modern Android
- Maintained OTA compatibility
Considerations:
- Module compatibility may require updates
- Different app profile management approach
- Learning curve for new concepts
- Some Magisk-specific features unavailable
Migration Steps:
- Backup all data and current setup
- Document installed modules and configurations
- Uninstall Magisk completely
- Flash stock boot image
- Install KernelSU using preferred method
- Reinstall compatible modules
- Configure app profiles
Essential Steps:
- Complete system restoration recommended
- Fresh start with modern practices
- Understanding of new security model
- Backup and data migration planning
Benefits:
- Dramatically improved security
- Modern Android compatibility
- Systemless approach
- Active development and support
Pre-built kernels save you from manual compilation and come optimized for specific devices. Browse by device manufacturer to find your perfect match.
Important
Safety First: Always verify kernel compatibility with your exact device model and Android version before flashing. Wrong kernels can cause bootloops or device damage.
Tip
Pro Tip: Check each kernel's release page for device-specific builds, changelogs, and installation instructions. Many provide AnyKernel3 flashable zips for hassle-free installation.
Jump to your device manufacturer:
Official kernels from KernelSU project maintainers.
|
KernelSU Official GKI Official GKI builds for modern devices with GKI 2.0 support π₯ Download: KernelSU Releases |
KernelSU-Next Enhanced Enhanced builds with extended kernel support and extra features π₯ Download: KernelSU-Next Releases |
Premium quality kernels with KernelSU and SUSFS integration for multiple device families.
π½ Click to expand Xiaomi device kernels
π½ Click to expand Samsung device kernels
| Device Model | Codename | Kernel | Features | Links |
|---|---|---|---|---|
| Galaxy A15 4G | SM-A155F | 5.10 | KernelSU-Next 1.0.9, SuSFS 1.5.9 | |
| Galaxy A12 | SM-A127F | 4.14 | KernelSU-Next, SUSFS v1.5.7, Wireguard, SELinux toggle |
| Device Model | Codename | Kernel | Features | Links |
|---|---|---|---|---|
| Galaxy Tab S10 Series | SM-X82XX/X92XX (mt6989) | 6.1 | KernelSU, MKSU, SukiSU-Ultra, LKM variants | |
| Galaxy M30s | M307F | 4.9 | KernelSU 0.9.5 (Non-GKI) |
π½ Click to expand OnePlus device kernels
π½ Click to expand Motorola device kernels
| Device Model | Codename | Kernel | Features | ROM Support | Links |
|---|---|---|---|---|---|
| Moto G20 | java | 4.14 | KernelSU 0.9.5, KernelSU-Next, SukiSU Ultra | Stock, AOSP |
π½ Click to expand Google Pixel device kernels
π½ Click to expand Huawei device kernels
| Device Model | Codename | Kernel | Features | ROM Support | Links |
|---|---|---|---|---|---|
| Huawei Nova 2 | β | 4.4 | KernelSU | LineageOS |
π½ Click to expand LG device kernels
| Device Model | Codename | Kernel | Features | ROM Support | Links |
|---|---|---|---|---|---|
| LG G7 | judyln | 4.9 | KernelSU-Next, SuSFS | LineageOS 22.1 |
Consider these factors when choosing a kernel:
| Factor | What to Check |
|---|---|
| Device Match | Exact device model and variant (not just similar models) |
| Android Version | Kernel must match your current Android version |
| Features | KernelSU version, SUSFS support, additional optimizations |
| Maintenance | Regular updates and active development |
| Community | User feedback on XDA, GitHub issues, Telegram |
| Documentation | Clear installation instructions and support |
Warning
Before Flashing: Always backup your current boot image. Keep a copy of stock boot.img for emergency recovery. Test with fastboot boot kernel.img first if possible.
- Build your own: See Building from Source section
Multiple installation methods to suit your needs and technical comfort level.
Before proceeding, ensure you have:
- Unlocked bootloader (essential!)
- Complete device backup
- ADB & Fastboot installed (Download Platform Tools)
- USB Debugging enabled (Settings β Developer Options)
- Stock boot image backup (for emergency recovery)
- Charged device (at least 50% battery)
Warning
Backup First! Installation errors can cause data loss or bootloops. Always have a recovery plan.
Tip
Need help unlocking your bootloader? Visit Awesome-Android-Root Guide
| Method | Difficulty | Best For | Requirements | Time |
|---|---|---|---|---|
| GKI Mode | Easy | Modern devices (5.10+) | Fastboot, unlocked bootloader | 5-10 min |
| LKM Mode | Easy | Preserving stock kernel | Root or custom recovery | 5-10 min |
| Manager Patching | Easy | One-click solution | Unlocked bootloader | 10-15 min |
| Custom Kernel | Medium | Device-specific optimization | TWRP or fastboot | 10-20 min |
| Manual Building | Hard | Full customization | Build environment, expertise | 1-3 hours |
Best for: Modern devices with GKI 2.0 support (kernel 5.10+)
π View Installation Steps
Advantages:
- β Strong universality for modern devices
- β Official support and regular updates
- β Clean installation with minimal configuration
Step-by-Step:
# 1. Download boot.img from releases
# Visit: https://github.com/tiann/KernelSU/releases/latest
# 2. Boot device to fastboot mode
adb reboot bootloader
# 3. Flash the kernel
fastboot flash boot boot.img
# 4. Reboot device
fastboot reboot
# 5. Install KernelSU Manager APK after boot
# 6. IMPORTANT: Install a metamodule for module support
# Download meta-overlayfs and install via KernelSU ManagerMore Details: GKI Installation Guide
Best for: Users wanting to keep original kernel intact and get easy updates
π View Installation Steps
Advantages:
- β Preserves original kernel and manufacturer optimizations
- β Less intrusive modification
- β Easier to revert to stock
- β OTA-friendly (install to inactive slot)
- β Easy in-app updates
- β No AVB/dm-verity issues
Requirements:
- Stock/official firmware
- Compatible kernel version
Step-by-Step:
- Install KernelSU Manager APK on device
- Grant necessary permissions
- In Manager, select "Install" β "Select and Patch a File"
- Choose your stock boot.img file
- Manager will patch it with KernelSU (LKM mode)
- Flash patched boot via fastboot:
# Transfer patched boot to PC
adb pull /sdcard/Download/kernelsu_patched_xxxxx.img
# Boot to fastboot
adb reboot bootloader
# Flash patched image
fastboot flash boot kernelsu_patched_xxxxx.img
# Reboot
fastboot reboot- Install metamodule after first boot for module support
Complete Guide: LKM Mode Installation
Best for: Users preferring one-click solutions with boot image patching
π View Installation Steps
Advantages:
- β User-friendly, minimal PC usage
- β Automatic patching process
- β Simplest for non-technical users
- β Supports both GKI and LKM modes
Step-by-Step:
- Extract boot.img from your device firmware
- Install KernelSU Manager APK on device
- Grant necessary permissions
- Select "Install" β "Select and Patch a File"
- Choose your boot.img file
- Manager patches boot image automatically
- Flash patched boot via fastboot or custom recovery
# Flash patched boot via fastboot
adb pull /sdcard/Download/kernelsu_patched_*.img
adb reboot bootloader
fastboot flash boot kernelsu_patched_*.img
fastboot reboot- Install metamodule after first boot for module support
Detailed Tutorial: Manager Patching Guide
Best for: Device-specific optimization and features
π View Installation Steps
Advantages:
- β Device-optimized performance
- β Pre-tested stability
- β Additional features (SUSFS, optimizations)
- β No compilation required
Step-by-Step:
- Find your device in Prebuilt Kernels section
- Download appropriate kernel zip
- Flash via TWRP or fastboot:
Via TWRP:
1. Boot to TWRP recovery
2. Install β Select kernel zip
3. Swipe to flash
4. Reboot system
Via Fastboot:
adb reboot bootloader
fastboot flash boot kernel.img
fastboot reboot- Install KernelSU Manager APK
- Verify installation in Manager
Best for: Developers and advanced users
π View Installation Steps
Advantages:
- β Full customization control
- β Latest features and patches
- β Learn kernel development
Requirements:
- Linux build environment (Ubuntu 20.04+ recommended)
- Kernel source code for your device
- Cross-compiler toolchain
- Build dependencies (see Building from Source)
Quick Overview:
- Setup Linux build environment
- Clone kernel source and KernelSU repository
- Apply KernelSU patches
- Configure kernel (enable CONFIG_KSU)
- Compile kernel
- Package with AnyKernel3
- Flash to device
Full guide: See Building from Source section
Check your kernel version:
# Via ADB
adb shell uname -r
# Or on device terminal
uname -rCompatibility Matrix:
| Kernel Version | Official KernelSU | KernelSU-Next | SuKiSu-Ultra | Recommended Method |
|---|---|---|---|---|
| 5.10+ (GKI 2.0) | β Full Support | β Full Support | β Not Needed | GKI Mode / Manager Patching |
| 4.14 - 5.9 | β Full Support | β Full Support | Custom Kernel / LKM | |
| 4.4 - 4.13 | β Not Supported | β Full Support | β Full Support | Custom Kernel |
| 3.4 - 4.3 | β Not Supported | β Not Supported | β Full Support | Custom Kernel |
Important
Complete these essential steps to ensure proper functionality and security.
1. Verify Installation
# Check KernelSU version
su -c "kernelsu --version"
# Verify root access
su -c "id"
# Check kernel version
cat /proc/version | grep KernelSU
# Check installation mode
# Look for LKM or GKI indicators in kernel version2. Install Manager
- Download appropriate Manager APK
- Grant all required permissions
- Confirm root access in app
3. Install Metamodule (CRITICAL for KernelSU 3.0+)
- Download meta-overlayfs (recommended)
- Install via KernelSU Manager > Modules
- Reboot device
- See Understanding Metamodules for details
4. Configure App Profiles
- Set restrictive defaults
- Grant root only to trusted apps
- Configure time-based restrictions
5. Install Essential Modules
- Module manager (MMRL recommended)
- SuSFS for root hiding (if needed)
- Performance optimizations (optional)
Warning
Only install modules from trusted sources
6. Setup Safety Features
- Backup patched boot image
- Configure module backups
- Test SafetyNet/Play Integrity
- Document your setup
Complete Setup Guide: Post-Installation Setup
# Comprehensive verification script
# Check if KernelSU is loaded
cat /proc/version | grep KernelSU
# Test root access
su -c "whoami"
su -c "id"
# Check module directory
ls -la /data/adb/modules/
# View KernelSU logs
dmesg | grep kernelsu
# Check SELinux status
getenforce
# Verify module mounting
mount | grep overlayComprehensive guides and resources to master KernelSU.
Getting Started
Advanced Topics
- Non-GKI Integration - For custom kernels 4.14 and earlier
- GKI Integration - Generic Kernel Image integration
- Building from Source - Complete compilation guide
- Kernel Requirements - Prerequisites and compatibility
- Unofficially Supported Devices - Manual compilation for older kernels
- Module Development Guide - Creating KernelSU modules
- Module WebUI Guide - Building web interfaces
- Module Examples - Community examples on GitHub
- FAQ - Frequently asked questions
- Bootloop Recovery - Emergency recovery procedures
- Log Analysis - Understanding system logs
Essential modules and tools to enhance your KernelSU experience.
Important
KernelSU 3.0+ Requirement: You must first install a metamodule before regular modules will work. Fresh installations require this step!
First-Time Users: Start with meta-overlayfs for the best balance of compatibility and ease of use.
| Metamodule | Purpose | Download |
|---|---|---|
| meta-overlayfs | Official OverlayFS implementation - recommended for most users | |
| mountify | Advanced OverlayFS with cross-platform support | |
| meta-magic_mount | Magisk-style Magic Mount (C-based) | |
| meta-magic_mount-rs | Magisk-style Magic Mount with WebUI (Rust-based) | |
| meta-hybrid_mount | Hybrid OverlayFS + Magic Mount with auto-fallback |
| Module | Purpose | Key Features |
|---|---|---|
| SuSFS4KSU | Advanced root hiding | Customizable profiles, filesystem manipulation, banking app support |
| Shamiko | DenyList bypass | Enhanced hiding, SafetyNet/Play Integrity bypass |
| Tricky Store | Key attestation bypass | Banking and payment app compatibility |
| Module | Purpose | Benefits |
|---|---|---|
| Universal GMS Doze | Battery optimization | Aggressive Google Play Services battery savings |
Tip
Discover More Modules: Explore the extensive collection at Awesome Android Root - KernelSU Modules
| Framework | Purpose | Features |
|---|---|---|
| LSPosed | Xposed framework | Module support via Zygisk integration |
| ZygiskNext | Standalone Zygisk | Independent Zygisk implementation |
| ReZygisk | Transparent Zygisk | Improved Zygisk implementation |
The all-in-one solution for KernelSU module management.
π½ View MMRL Features
β¨ Key Features:
- β Built-in module repository with 100+ modules
- β Automatic module updates
- β Module backup/restore functionality
- β Dependency management
- β WebUI support for advanced modules
- β Material You design language
- β Dark/Light theme support
- β Detailed module information and changelogs
π₯ Download: MMRL Latest Release
| App | Purpose | Download |
|---|---|---|
| KernelSU Manager | Official manager for KernelSU | |
| SukiSU Manager | Manager for SuKiSu-Ultra | |
| Franco Kernel Manager | Kernel tweaking & monitoring | |
| SmartPack-Kernel Manager | Open-source kernel management |
| Tool | Purpose | Use Case |
|---|---|---|
| Root Checker | Verify root status | Confirm successful installation |
| Logcat Reader | System log viewer | Debugging and troubleshooting |
| Termux | Terminal emulator | Full Linux environment on Android |
Note
This section covers building KernelSU from source. For ready-to-use kernels, see the Premade Kernels section.
- KernelSU Source - Official KernelSU source code for integration
- KernelSU-Next Source - Enhanced fork with extended support
- Kernel Build Action - Automated building via GitHub Actions
Tip
Always use official kernel sources from your device manufacturer for best compatibility.
- OnePlus Kernel Sources - Official OnePlus kernel sources
- Xiaomi Kernel Sources - Official Xiaomi kernel sources
- Google AOSP Kernels - Android Open Source Project kernels
- Samsung Opensource - Samsung kernel sources
- Universal Patcher - Automated kernel patching scripts
- KernelSU Builder - CI/CD building system with GitHub Actions
- β AnyKernel3 - Universal kernel flasher and packaging tool
- Manual Build Guide - Step-by-step building instructions
Click to expand: Detailed Build Instructions
[!IMPORTANT] Building kernels requires significant disk space (50GB+) and time. Ensure you have a proper Linux environment.
# Install dependencies (Ubuntu/Debian)
sudo apt update
sudo apt install -y git build-essential kernel-package fakeroot libncurses5-dev \
libssl-dev ccache bison flex libelf-dev bc python3
# Install cross-compiler
sudo apt install -y gcc-aarch64-linux-gnu gcc-arm-linux-gnueabihf
# Clone KernelSU
git clone https://github.com/tiann/KernelSU[!TIP] Use
ccacheto speed up subsequent builds. Enable it withexport USE_CCACHE=1andexport CCACHE_DIR=~/.ccache.
# 1. Clone your device kernel source
git clone <kernel_source_url> kernel
# 2. Apply KernelSU patches
cd kernel
curl -LSs "https://raw.githubusercontent.com/tiann/KernelSU/main/kernel/setup.sh" | bash -
# 3. Configure kernel
make ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- <defconfig>
# 4. Enable KernelSU in config
./scripts/config --file .config -e CONFIG_KSU
# 5. Build kernel
make ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- -j$(nproc)
# 6. Package with AnyKernel3
# Copy Image.gz-dtb or Image to AnyKernel3 directory
# Zip and flash[!WARNING] Building with wrong toolchain or configuration can produce non-bootable kernels. Always test on non-critical devices first.
- arm64-v8a: Primary support (64-bit ARM) - most modern devices
- x86_64: Intel/AMD 64-bit (emulators, some tablets)
- armeabi-v7a: 32-bit ARM (legacy devices, SuKiSu-Ultra only)
name: Build Kernel
on:
push:
branches: [ main ]
workflow_dispatch:
jobs:
build:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Build Kernel with KernelSU
uses: dabao1955/kernel_build_action@main
with:
kernel-url: <your_kernel_repo>
branch: <branch_name>
config: <defconfig_name>
arch: arm64Connect with thousands of KernelSU users worldwide for support, discussion, and latest updates.
Telegram
| Channel | Purpose | Link |
|---|---|---|
| KernelSU Channel | Official announcements | |
| KernelSU Group | Community support | |
| KernelSU-Next | Enhanced variant | |
| SuKiSu | Legacy devices |
GitHub
| Platform | Purpose | Link |
|---|---|---|
| Discussions | Technical Q&A | |
| Issues | Bug reports | |
| KSU-Next Discussions | Enhanced fork |
Note
Before troubleshooting, ensure you have a backup of your stock boot image. This is crucial for recovery.
| Issue | Possible Cause | Solution |
|---|---|---|
| Bootloop | Incompatible kernel/module | Flash stock boot.img via fastboot, disable modules |
| App Crashes | SELinux policy conflicts | Check and adjust SELinux policies in app profiles |
| Module Not Working | Incompatible module version | Verify module compatibility, check installation logs |
| Root Not Detected | Manager not installed properly | Reinstall KernelSU Manager, verify kernel version |
| SafetyNet Failing | Root detection | Install Shamiko or SuSFS, configure hiding properly |
| Update Failed | Insufficient storage/corrupt download | Clear cache, re-download, ensure adequate storage |
| Banking Apps Not Working | Root detection | Configure app profiles, install hiding modules |
| System Unstable | Conflicting modules | Disable modules one by one to identify culprit |
Warning
If your device is in a bootloop, follow these steps immediately to restore functionality.
π¨ Click to expand: Bootloop Recovery & Emergency Procedures
Immediate Steps:
# 1. Enter fastboot mode (Power + Volume Down)
# 2. Connect device to PC
# 3. Flash stock boot image
fastboot flash boot stock_boot.img
# 4. If needed, clear cache
fastboot erase cache
# 5. Reboot
fastboot rebootAlternative via Recovery:
- Boot into TWRP/custom recovery
- Flash stock boot image from recovery
- Wipe cache and dalvik cache
- Reboot system
Prevention:
- Always keep stock boot image backup
- Test kernels with temporary boot first:
fastboot boot test_boot.img - Create TWRP backups before major changes
- Keep emergency download mode access available
Safe Mode Boot:
- Create file
/data/adb/modules/.disable_modulesbefore boot - This disables all modules for troubleshooting
- Remove problematic modules
- Delete the disable file and reboot
Commands:
# Disable all modules
adb shell su -c "touch /data/adb/modules/.disable_modules"
adb reboot
# Remove specific module
adb shell su -c "rm -rf /data/adb/modules/[module_name]"
adb reboot
# View module logs
adb shell su -c "cat /data/adb/modules/[module_name]/install.log"π Click to expand: Debug Commands & Diagnostics
# Check KernelSU status
cat /proc/version | grep KernelSU
su -c "kernelsu --version"
# Kernel logs
dmesg > /sdcard/dmesg.log
cat /proc/last_kmsg > /sdcard/last_kmsg.log
# KernelSU specific logs
logcat -s "KernelSU" > /sdcard/kernelsu.log
logcat -b all > /sdcard/full_logcat.log
# Module installation logs
cat /data/adb/modules/*/install.log > /sdcard/module_logs.log
# Check SELinux status
getenforce
sestatus
# List loaded modules
ls -la /data/adb/modules/
cat /data/adb/modules/*/module.prop
# Check mount points
mount | grep overlay
mount | grep /system
# Verify root access
su -c "id"
su -c "whoami"
# Check kernel config
zcat /proc/config.gz | grep KSU
# Monitor system resources
top -n 1
free -h
df -hπ± Click to expand: Device-Specific Troubleshooting
- Knox Triggered: Some Samsung devices trip Knox warranty bit (irreversible)
- Secure Boot: May need to disable secure boot verification in kernel
- Encryption Issues: Some kernels incompatible with Samsung encryption
- OEM Unlock: Ensure OEM unlocking is enabled in Developer Options
- Fastboot Commands: Use
fastboot oem unlockfor bootloader - Color OS Migration: Recent devices need special handling for OxygenOS vs ColorOS
- Parallel Apps: OxygenOS parallel apps may conflict with root
- Slot System: A/B partition devices need careful slot management
- Anti-Rollback: Be careful with MIUI version downgrades (brick risk)
- Bootloader Unlock: Xiaomi requires waiting period (up to 168 hours)
- MIUI Optimizations: Some MIUI features conflict with KernelSU
- Vendor Mismatch: Ensure kernel matches vendor version
- Hardware Attestation: Strong SafetyNet enforcement on newer Pixels
- Verified Boot: Orange state warning on boot (normal)
- Titan M Security: Hardware security module affects root hiding
- OTA Updates: Easy to re-root after OTAs with KernelSU
β‘ Click to expand: Performance Troubleshooting
Diagnosis:
- Identify problematic modules: Disable modules one by one
- Check CPU throttling: Monitor thermals and frequency scaling
- Review I/O performance: OverlayFS overhead on slow storage
- Analyze system logs: Look for kernel errors or warnings
Commands:
# Monitor CPU usage
top -m 10
# Check I/O stats
iostat -x 1 10
# View thermal zones
cat /sys/class/thermal/thermal_zone*/temp
# Check for errors
dmesg | grep -i error
logcat | grep -i errorTroubleshooting:
- Check kernel logs:
dmesgand/proc/last_kmsg - Monitor memory usage: Look for OOM (Out Of Memory) killer activity
- Verify hardware stability: Stress test without KernelSU
- Test minimal config: Remove all modules temporarily
Prevention:
- Avoid aggressive kernel tweaks
- Monitor temperature during stress tests
- Ensure adequate RAM for modules
- Use stable kernel versions
π¦ Click to expand: Banking & Gaming App Compatibility
Solutions:
- Configure app profiles: Restrict root access for sensitive apps
- Enable advanced hiding: Install SuSFS or Shamiko modules
- Check SafetyNet: Use YASNAC or Play Integrity API tester
- Hardware attestation: Some devices use hardware-based detection (harder to bypass)
Recommended Setup:
# Install hiding modules
# 1. Install Shamiko module
# 2. Install SuSFS4KSU module
# 3. Configure DenyList in manager
# 4. Reboot device
# 5. Test with SafetyNet checkerAnti-cheat Detection:
- Some games detect root and ban accounts
- Use hiding modules carefully
- Configure app profiles to deny root access
- Consider using non-rooted profiles for gaming
π¬ Click to expand: Support Resources & Log Collection
When seeking help, include:
- Device Information: Model, Android version, kernel version
- KernelSU Variant: Official, Next, or SuKiSu-Ultra + version number
- Installation Method: How you installed KernelSU
- Reproduction Steps: Detailed steps to reproduce the issue
- Logs: Relevant log files (dmesg, logcat, module logs)
- Module List: All installed modules and versions
#!/system/bin/sh
# Collect comprehensive logs for troubleshooting
LOGDIR="/sdcard/kernelsu_logs_$(date +%Y%m%d_%H%M%S)"
mkdir -p "$LOGDIR"
# System info
getprop > "$LOGDIR/system_props.txt"
uname -a > "$LOGDIR/kernel_info.txt"
cat /proc/version > "$LOGDIR/kernel_version.txt"
# KernelSU info
su -c "kernelsu --version" > "$LOGDIR/kernelsu_version.txt" 2>&1
# Logs
dmesg > "$LOGDIR/dmesg.log"
logcat -d > "$LOGDIR/logcat.log"
cat /proc/last_kmsg > "$LOGDIR/last_kmsg.log" 2>/dev/null
# Module info
ls -laR /data/adb/modules > "$LOGDIR/modules_list.txt"
cat /data/adb/modules/*/module.prop > "$LOGDIR/modules_props.txt" 2>/dev/null
# Mount info
mount > "$LOGDIR/mount_points.txt"
df -h > "$LOGDIR/disk_usage.txt"
echo "Logs collected in: $LOGDIR"- Official Documentation: Check kernelsu.org FAQ
- GitHub Discussions: Search existing issues and discussions
- Telegram Groups: Ask in appropriate variant-specific group
- XDA Forums: Device-specific threads
- Reddit: r/KernelSU for general questions
Frequently asked questions about KernelSU - Quick answers to common queries.
What is a Metamodule and why do I need one?
From KernelSU 3.0+, the built-in module mounting system was removed. A metamodule is now required to provide module mounting infrastructure.
Why this change?
- Reduced detection: KernelSU itself doesn't mount modules, making it harder to detect
- Flexibility: Choose your preferred mounting method (OverlayFS, Magic Mount, Hybrid)
- Stability: Core KernelSU remains stable while mounting systems evolve
Quick Start:
- Download meta-overlayfs (recommended for beginners)
- Install via KernelSU Manager > Modules
- Reboot device
- Now you can install regular modules
See Understanding Metamodules for complete details.
What is KernelSU and how does it differ from Magisk?
KernelSU is a kernel-based root solution operating in kernel space, while Magisk operates in userspace.
Key Differences:
| Aspect | KernelSU | Magisk |
|---|---|---|
| Architecture | Kernel-level | Userspace |
| Security | Superior isolation | Good but less isolated |
| Module System | Metamodule-based (3.0+) | Magic Mount (built-in) |
| Installation | GKI / LKM modes | Boot patching |
| Compatibility | Requires compatible kernel | Universal |
| Future-proof | Built for modern Android | Legacy support focus |
Which installation mode should I use: GKI or LKM?
Choose based on your device and needs:
LKM Mode (Recommended for most):
- β Keeps manufacturer kernel optimizations
- β Easy updates via app
- β OTA-friendly
- β Works with stock firmware
β οΈ Requires official firmware
GKI Mode:
- β Universal compatibility
- β Works on Samsung Knox devices
- β Better for custom ROMs
β οΈ Loses manufacturer optimizationsβ οΈ Manual updates required
See Installation Modes for detailed comparison.
Which KernelSU variant should I use?
Quick Selection Guide:
- Modern devices (Android 12+, kernel 5.10+) β Official KernelSU
- Mid-range devices (Android 9-11, kernel 4.4-6.6) β KernelSU-Next
- Legacy devices (Android 7-8, kernel 3.4-5.4) β SuKiSu-Ultra
See KernelSU Variants for detailed comparison.
Is KernelSU safer than Magisk?
Yes, in several ways:
- β Kernel-level operation prevents userspace attacks
- β App Profile system for granular permission control
- β Zero system modification maintains integrity
- β Hardware security integration (ARM TrustZone)
- β Metamodule architecture reduces detection surface
However, both are safe when properly configured.
Can I use Magisk modules with KernelSU?
Compatibility varies:
| Module Type | Compatibility |
|---|---|
| Simple modules | β Most work without changes (with metamodule) |
| Complex modules | |
| Zygisk modules | |
| Hardware-specific | β Usually compatible |
Remember: You must install a metamodule first for any modules to work on KernelSU 3.0+.
Will KernelSU break OTA updates?
Generally no:
- β System partition remains unmodified
β οΈ Boot partition may need re-patching after OTA- β LKM mode has OTA survival features
β οΈ Manual re-installation may be required for major updates
Always keep your patched boot image backup!
What changed in KernelSU 3.0 and how does it affect me?
Major Changes in KernelSU 3.0+:
β οΈ Module mounting removed from core: Fresh installations now require a metamodule for modules to work- β LKM mode improvements: Better stability and OTA support
- π‘οΈ Reduced detection surface: Harder for banking apps to detect
- π§ Flexible mounting: Choose between OverlayFS, Magic Mount, or hybrid approaches
What you need to do:
- Fresh installations: Must install a metamodule before modules will work
- Existing installations: Continue to work normally (no action needed)
- Upgrading: May need to install a metamodule if modules stop working
Recommended metamodule: meta-overlayfs for most users
See Understanding Metamodules for complete details.
How do I check if my device is compatible?
Check your kernel version:
# Via ADB
adb shell uname -r
# On device terminal
uname -rThen refer to the Compatibility Matrix to find the right variant.
Do I need to uninstall Magisk before installing KernelSU?
Yes, strongly recommended:
- β Uninstall all Magisk modules
- β Uninstall Magisk completely
- β Flash stock boot image
- β Then install KernelSU
They will conflict if installed together.
Can I have both Magisk and KernelSU installed?
No. They modify the boot process differently and will conflict. Choose one solution for your device.
How do I backup before installing?
Essential backups:
- πΎ Full TWRP backup (if available)
- πΎ Backup stock boot.img (critical!)
- π Document installed modules
- πΎ Export app data
- πΎ Save important files to external storage
Where can I find KernelSU modules?
Top Sources:
- MMRL - Modern module manager with repository
- Awesome Android Root - Curated collection
- GitHub - Search "kernelsu module"
- Telegram - Community-shared modules
- XDA Forums - Device-specific modules
My modules aren't working after installing KernelSU 3.0+, why?
You need a metamodule!
KernelSU 3.0+ removed built-in module mounting. Fresh installations require a metamodule to provide mounting infrastructure.
Solution:
- Download meta-overlayfs (recommended)
- Install via KernelSU Manager > Modules
- Reboot device
- Now regular modules will work
See Understanding Metamodules for details and alternatives.
Can I switch between different metamodules?
Yes, but with caution:
To switch:
- Uninstall all regular modules
- Uninstall current metamodule
- Reboot device
- Install new metamodule
- Reboot again
- Reinstall regular modules
Popular choices:
- meta-overlayfs: Official, recommended for most
- mountify: Advanced, cross-platform support
- meta-hybrid_mount: Maximum compatibility with auto-fallback
What are App Profiles and how do I use them?
App Profiles provide granular root permission control:
- βοΈ Custom UID/GID assignment
- π Capability restrictions
- π‘οΈ SELinux context customization
- β° Time-based access control
- π Namespace isolation
Configure in KernelSU Manager under each app's settings.
Learn more: App Profile System Guide
My device is in bootloop, what do I do?
Emergency recovery:
# 1. Enter fastboot mode (Power + Volume Down)
# 2. Connect to PC
# 3. Flash stock boot image
fastboot flash boot stock_boot.img
# 4. Reboot
fastboot rebootThis is why you ALWAYS keep a stock boot.img backup!
Banking apps aren't working, how do I fix this?
Root hiding setup:
- Install Shamiko or SuSFS module
- Configure DenyList in KernelSU Manager
- Add banking apps to DenyList
- Hide KernelSU Manager app
- Test with SafetyNet checker
See Troubleshooting for detailed steps.
How do I verify KernelSU is working?
Quick verification:
# Check kernel
cat /proc/version | grep KernelSU
# Test root
su -c "id"
# Or open KernelSU Manager and check statusModules aren't loading, what's wrong?
Common causes:
- β No metamodule installed (KernelSU 3.0+)
- β Incompatible module version
- β Insufficient permissions
- β Module conflicts
- β Mounting system not supported
Solutions:
-
Check if metamodule is installed (KernelSU 3.0+ requirement)
- Open KernelSU Manager > Modules
- Look for active metamodule (e.g., meta-overlayfs)
- If missing, install one from Understanding Metamodules
-
Check module logs:
/data/adb/modules/[module]/install.log -
Verify module compatibility with your KernelSU version
How do I build KernelSU for my device?
Quick steps:
- Setup Linux build environment
- Clone kernel source
- Apply KernelSU patches
- Configure kernel (enable CONFIG_KSU)
- Compile kernel
- Package with AnyKernel3
See Building from Source for detailed guide.
Can I contribute to KernelSU?
Absolutely! Contributions welcome:
- π Report bugs on GitHub
- π» Submit pull requests
- π¦ Create and share modules
- π Improve documentation
- π¬ Help in community support
- π§ͺ Test beta versions
- π Complete KernelSU Installation Guide - Comprehensive tutorial with detailed explanations
- π Official FAQ - Official documentation
- π¬ Telegram Community - Real-time support
- π GitHub Discussions - Technical discussions
- π XDA Forums - Community forum
Help make this the most comprehensive KernelSU resource! All contributions are welcome.
How to Contribute:
- Fork this repository
- Add or update resources
- Follow formatting standards
- Test all links
- Submit pull request
What We Need:
- New tools & modules
- Device-specific kernels
- Documentation improvements
- Translations
- Bug fixes & updates
- Tutorials & guides
π See CONTRIBUTING.md
- Check existing issues and PRs
- Open a discussion
Important legal information - Please read carefully before proceeding.
Caution
Proceed at Your Own Risk: Rooting and kernel modification can void warranties, brick devices, and expose security vulnerabilities. Users assume all risks and responsibilities.
Educational Purpose Only
This documentation is provided for educational and informational purposes only. Users are solely responsible for:
- Understanding and complying with local laws
- Following device warranty terms
- Maintaining device security
- Device modifications and consequences
No Warranty or Liability
Contributors and maintainers are NOT liable for:
- β Device damage or bricking
- β Data loss or corruption
- β Warranty violations
- β Legal consequences
- β Security vulnerabilities
π‘οΈ Click to expand: Essential Safety Guidelines
Always Do:
| Action | Why It Matters |
|---|---|
| β Create complete backups | Essential for recovery |
| β Read documentation thoroughly | Understand before acting |
| β Test on non-critical devices | Avoid daily driver risks |
| β Keep stock firmware | Emergency recovery option |
| β Research device-specific issues | Know your device limitations |
| β Understand security implications | Protect your data |
Never Do:
| Action | Risk |
|---|---|
| β Proceed without backups | Irreversible data loss |
| β Grant root to untrusted apps | Security compromise |
| β Install unknown modules | Malware/instability |
| β Ignore security warnings | Serious vulnerabilities |
| β Modify without understanding | System damage |
Important
KernelSU and its derivatives are independent, community-driven projects. They are not affiliated with, endorsed by, or connected to Google, Android, device manufacturers, or any other commercial entities.
This project is licensed under the MIT License.
Special thanks to all contributors who made KernelSU possible.
Project Creators
- tiann - Creator of KernelSU, visionary behind kernel-based root solutions
- topjohnwu - Magisk creator, inspiration for systemless modifications
Derivative Maintainers
- KernelSU-Next Team - Enhanced fork development and innovation
- SuKiSu-Ultra Team - Legacy device support and compatibility
Community Contributors
- Module developers creating useful tools
- Documentation translators and writers
- Community moderators and support staff
- Everyone who shares knowledge
Special Recognition
- All kernel developers maintaining device-specific builds
- Community members providing support
- Contributors to this awesome list