Mountless Module Loading for Rooted Android
Your modules. Stock mount tables. Zero traces.
English | 简体中文 | 繁體中文 | Türkçe | Português (Brasil) | 한국어 | Français | Bahasa Indonesia | Русский | Українська | ภาษาไทย | Tiếng Việt | Italiano | Polski | Български | 日本語 | Español | العربية | हिन्दी | Deutsch | Nederlands | Ελληνικά | Svenska | Norsk | Dansk
Warning
ZeroMount is currently in beta and under heavy active development.
Features are being added, tested, and refined continuously. The core functionality has been tested end-to-end on personal devices, but edge cases are expected — different devices, ROMs, and kernel configurations behave differently across brands and models.
If something breaks, open an issue. Response times may vary as development is the priority.
ZeroMount is a ground-up reimplementation of mountless module loading for rooted Android. Instead of bind mounts or overlayfs — which leave traces in /proc/mounts and /proc/self/mountinfo — ZeroMount intercepts the kernel's VFS layer directly, redirecting file paths at the getname() level before the filesystem even knows something changed.
The result: module files appear at their stock system paths with absolutely zero mount table pollution. Detection apps that scan mount tables, stat file metadata, or inspect /proc/PID/maps see a completely stock device.
This is not a port of NoMount. ZeroMount shares the same goal — kernel-level VFS redirection without mount pollution — but the architecture is entirely different in every layer: a custom kernel driver, a Rust userspace binary, SUSFS integration, a WebUI, and a multi-phase boot pipeline. Built from scratch.
🛡️ Bootloop Protection — Volume keys trigger safe mode. Three failed boots auto-rollback your config. You can always recover.
👻 Truly Invisible — No mount table entries, no metadata leaks. Detection apps see a stock device.
🎛️ Full WebUI — Configure everything from your KSU manager. No terminal needed.
🔄 Works Without a Custom Kernel — VFS is the primary engine, but ZeroMount falls back to OverlayFS or MagicMount if needed.
📦 Manages All Your Modules — Install and uninstall modules normally. ZeroMount intercepts and loads everything mountlessly.
Core VFS Engine
- VFS path redirection — module files load at stock system paths, zero mount table entries
- Directory entry injection — module files appear in
lsandreaddirlike they're stock - d_path & mmap spoofing —
/proc/PID/mapsand fd symlinks show clean metadata - SELinux context injection — redirected files carry correct labels, no AVC denials
- statfs spoofing — system partitions report expected EROFS magic
- 3 mount strategies — VFS (preferred) → OverlayFS (fallback) → MagicMount (last resort)
SUSFS Integration
- Deep SUSFS integration — path hiding, kstat spoofing, mount hiding, maps hiding, uname/cmdline spoofing, and more — all toggleable from the WebUI
WebUI
- Full WebUI dashboard — real-time status, module manager with hot load/unload, app exclusion by UID, and a complete settings panel
- Themeable — dark, light, AMOLED, custom accent colors, glass effects
Safety & Reliability
- Bootloop guard — boot counter + marker thresholds with automatic config rollback and recovery
- Vol-combo safe mode — hold both volume keys during boot as a hardware escape hatch
- Peer module orchestration — intercepts other module installs/uninstalls for VFS compatibility
- Config backup — automatic backup before every pipeline run, restored on boot failures
Extras
- Custom emoji fonts — replace system emoji with your own NotoColorEmoji
- Property spoofing — build props, verified boot state, cmdline, uname
- Process camouflage — ZeroMount process appears as
[kworker/...]inps - Performance tuner — optional CPU/IO governor optimization daemon
- OTA updates — in-manager update support via
updateJson - ADB root — root shell access in ADB without modifying global system properties
ZeroMount communicates with the kernel through two interfaces: a custom miscdevice for VFS control and SUSFS supercalls for hiding features.
Ioctl commands issued to the ZeroMount miscdevice (magic 0x5A):
| Ioctl | Code | Description |
|---|---|---|
ADD_RULE |
0x5A01 |
Register a VFS path redirection rule |
DEL_RULE |
0x5A02 |
Remove a VFS redirection rule |
CLEAR_ALL |
0x5A03 |
Clear all active redirection rules |
GET_VERSION |
0x5A04 |
Query the driver version |
ADD_UID |
0x5A05 |
Exclude a UID from VFS redirection |
DEL_UID |
0x5A06 |
Re-include a UID in VFS redirection |
GET_LIST |
0x5A07 |
List all active redirection rules |
ENABLE |
0x5A08 |
Enable the VFS engine |
DISABLE |
0x5A09 |
Disable the VFS engine |
REFRESH |
0x5A0A |
Flush dcache to apply rule changes |
GET_STATUS |
0x5A0B |
Query whether the engine is active |
Important
ZeroMount's VFS engine requires a custom kernel with the ZeroMount driver and SUSFS patches compiled in. Without the patched kernel, the module still works using OverlayFS or MagicMount fallback — but you won't get the mountless VFS redirection that makes ZeroMount special.
You need:
- A rooted Android device with an unlocked bootloader
- A supported root manager (see compatibility below)
- A kernel built with ZeroMount + SUSFS patches → Super-Builders
| Android Version | Kernel | Status |
|---|---|---|
| Android 12 | 5.10.209 | ✅ Tested |
| Android 15 | 6.6.66 | ✅ Tested |
| Manager | Status | Notes |
|---|---|---|
| KernelSU | ✅ Tested | Full metamodule support |
| APatch | Should work — metamodule hooks present but not verified | |
| Magisk | Fallback mount pipeline exists but not verified on device |
More kernels and devices will be tested as development continues. If you test on an unlisted combo, let us know!
- Build or download a kernel with ZeroMount + SUSFS patches from Super-Builders
- Flash the kernel to your device
- Install ZeroMount — download the module ZIP and install via your root manager
- Reboot your device
- Open the WebUI from KSU Manager → ZeroMount → ⚙️
The WebUI will show your engine status, detected kernel capabilities, and loaded modules.
$ zeromount --connect
██████╗ ██████╗ ███╗ ██╗███╗ ██╗███████╗ ██████╗████████╗
██╔════╝██╔═══██╗████╗ ██║████╗ ██║██╔════╝██╔════╝╚══██╔══╝
██║ ██║ ██║██╔██╗ ██║██╔██╗ ██║█████╗ ██║ ██║
██║ ██║ ██║██║╚██╗██║██║╚██╗██║██╔══╝ ██║ ██║
╚██████╗╚██████╔╝██║ ╚████║██║ ╚████║███████╗╚██████╗ ██║
╚═════╝ ╚═════╝ ╚═╝ ╚═══╝╚═╝ ╚═══╝╚══════╝ ╚═════╝ ╚═╝
[✓] SIGNAL ──→ t.me/superpowers9
[✓] UPLINK ──→ kernel builds · bug triage · feature drops
[✓] STATUS ──→ OPEN — all operators welcome- NoMount — the project that inspired ZeroMount's approach to mountless module loading
- BRENE — SUSFS automation
- Hybrid Mount by Hybrid Mount Org — metamodule architecture and frontend/backend structural design
- HymoFS by Anatdx — hybrid mounting and kernel-level path manipulation
- Mountify by backslashxx — mount solution and module management
- Magisk by topjohnwu — the root solution that started it all
- KernelSU by tiann — next-gen kernel root and module framework
This project is licensed under the GNU General Public License v3.0.
👻 GHOST mode — because the best mounts are the ones nobody can find.





