In this guide, we will show you the steps to spoof your custom kernel to stock using KernelSU and SUSFS. Passing Play Integrity via Magisk [and even APatch for that matter] is a fairly easy process. You just need to flash a few modules and use an unrevoked keybox XML file [if you want to pass Strong also], and your task stands complete. However, with KernelSU, things are different and a tad bit complicated.
What makes the matter worse is the fact that some of the custom kernels tends to be blacklisted by Google, hence passing Integrity on those kernels is all the more difficult. Fortunately, there exists a nifty method using which you can spoof your custom kernel to stock using KernelSU and SUSFS. And in this guide, we will show you how to do just that. So without further ado, let’s get started.
Also Read: How to Find Kernel Version and Kernel Build Number
Table of Contents
When Can You Use This Tweak?
Well, there exists a plethora of circumstances wherein this tweak can be used and prove to be a handy approach. Some of the noteworthy ones include:
- When a root detector app detects that a custom kernel is installed.
- Some banking and payment apps might not work on your device even if you are passing Play Integrity, because you are on a custom kernel.
- If you just want to have a perfect setup, then you should definitely check this spoofing method off the list.
How to Spoof Custom Kernel to Stock using KernelSU and SUSFS

Before starting, please take a complete device backup. Droidwin and its members wouldn’t be held responsible in case of a thermonuclear war, your alarm doesn’t wake you up, or if anything happens to your device, and data by performing the below steps.
If you know the Stock Kernel’s UName
Since you have flashed a custom kernel, you can no longer go to the Settings menu and find the custom kernel’s UName. But if you have taken a screenshot of this page earlier or have noted it down somewhere, then your task will be very easy. Here’s how:
- To begin with, have the KernelSU/KernelSU Next app installed.
- Then launch it, go to Modules, hit Install, flash the SUSFS mod.
- Once done, hit Reboot. Then launch KernelSU/KernelSU Next.
- Go to Modules and tap on the arrow ▶️ icon next to the SUSFS.
- It will update the required files. Once done, hit the console icon.
- Scroll to the Kernel Uname and set it to match your stock kernel.
- It will be something along the following lines:
Kernel Version: 6.1.99-android14-11-gd6f926cfde54-ab12786694A Kernel Build: #1 Wed Dec 11 21:44:40 UTC 2024
- While it will also have the “SMP PREEMPT” keyword, you should remove it from the output.
- Finally, enable Spoof on boot and tap on Make it SUS ඞ. That’s it.
If you don’t know the Stock Kernel’s UName
If you don’t know the stock kernel’s UName and don’t have a screenshot of that page either, then you’ll have to take a slightly complicated and lengthier approach. Here’s what needs to be done in this regard:
Option A: Via Linux/Termux
- Transfer the “boot.img” file to your device’s Internal Storage.
- Then download and install the Termux app onto your device.
- Now, launch KernelSU, go to SuperUser, and enable Termux.
- After that, open Termux and type in the following command:
su /storage/emulated/0
- You’re now inside the same directory as the boot.img file.
- Run the below command to get the Kernel Version and Build:
strings boot.img | grep "Linux version"
NOTE: You should ignore ‘SMP PREEMPT’ from the Build Number - If the above command does work, then try this:
strings boot.img | grep "Linux" -A4
- You’ll get an output along the following lines:
Kernel Version: 6.1.99-android14-11-gd6f926cfde54-ab12786694A Kernel Build: #1 Wed Dec 11 21:44:40 UTC 2024
- Make sure you remove “SMP PREEMPT” from the output.
- Note them down and head over to the first method above.
Option B: When boot.img is compressed to LZ4 or GZIP?
- To begin with, download magiskboot and unzip it.
- Then move the boot.img to the same folder as magiskboot.
- Now open Terminal inside that folder and type in:
sudo chmod +x magiskboot
- Now type in:
./magiskboot --unpack boot.img
- Then type in either of the two below commands:
strings kernel | grep "Linux version" OR strings kernel | grep "Linux" -A4
- From the few lines of output, find the kernel build and the version numbers, something like below:
Kernel Version: 6.1.99-android14-11-gd6f926cfde54-ab12786694A Kernel Build: #1 Wed Dec 11 21:44:40 UTC 2024
- Note them down and head over to the first method above [“If you know the Stock Kernel’s UName”].
Option C: The Extreme Approach
If you are still not able to get hold of the UName for your kernel, then you are left with no choice but to remove the root, note down the UName of the stock kernel, and then re-root your device via KernelSU. Once that is done, you may then refer to the steps given in the above section [If you know the Stock Kernel’s UName].
That’s it. These were the steps to spoof your custom kernel to stock using KernelSU and SUSFS. If you have any queries concerning the aforementioned steps, do let us know in the comments. We will get back to you with a solution as soon as possible. [Credits go to Beast (@TOSNAMI9PRO) for simplifying these instructions].