{"id":47273829,"url":"https://github.com/ravindu644/Droidspaces-OSS","last_synced_at":"2026-03-29T20:00:49.539Z","repository":{"id":339203929,"uuid":"1160885886","full_name":"ravindu644/Droidspaces-OSS","owner":"ravindu644","description":"A lightweight, LXC-inspired container runtime for Android and Linux. Run full Linux distributions natively with zero performance penalty","archived":false,"fork":false,"pushed_at":"2026-03-29T08:59:55.000Z","size":13934,"stargazers_count":572,"open_issues_count":1,"forks_count":43,"subscribers_count":6,"default_branch":"main","last_synced_at":"2026-03-29T09:09:02.395Z","etag":null,"topics":["android","containerization","docker","kernelsu","lxc","namespaces","rooting"],"latest_commit_sha":null,"homepage":"https://t.me/Droidspaces","language":"Kotlin","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ravindu644.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2026-02-18T13:42:14.000Z","updated_at":"2026-03-29T08:59:59.000Z","dependencies_parsed_at":"2026-02-25T12:02:09.562Z","dependency_job_id":null,"html_url":"https://github.com/ravindu644/Droidspaces-OSS","commit_stats":null,"previous_names":["ravindu644/droidspaces-oss"],"tags_count":38,"template":false,"template_full_name":null,"purl":"pkg:github/ravindu644/Droidspaces-OSS","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ravindu644%2FDroidspaces-OSS","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ravindu644%2FDroidspaces-OSS/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ravindu644%2FDroidspaces-OSS/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ravindu644%2FDroidspaces-OSS/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ravindu644","download_url":"https://codeload.github.com/ravindu644/Droidspaces-OSS/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ravindu644%2FDroidspaces-OSS/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31162845,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-29T18:55:37.765Z","status":"ssl_error","status_checked_at":"2026-03-29T18:55:04.089Z","response_time":89,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android","containerization","docker","kernelsu","lxc","namespaces","rooting"],"created_at":"2026-03-15T15:00:34.496Z","updated_at":"2026-03-29T20:00:49.531Z","avatar_url":"https://github.com/ravindu644.png","language":"Kotlin","readme":"[![Latest release](https://img.shields.io/github/v/release/ravindu644/Droidspaces-OSS?label=Latest%20Release\u0026style=for-the-badge)](https://github.com/ravindu644/Droidspaces-OSS/releases/latest)\n[![License: GPL v3](https://img.shields.io/badge/License-GPLv3-blue.svg?style=for-the-badge)](./LICENSE)\n[![Telegram channel](https://img.shields.io/badge/Telegram-Channel-2CA5E0?style=for-the-badge\u0026logo=telegram\u0026logoColor=white)](https://t.me/Droidspaces)\n[![Android support](https://img.shields.io/badge/-Android-3DDC84?style=for-the-badge\u0026logo=android\u0026logoColor=white)](#a-android-devices)\n[![Linux desktop](https://img.shields.io/badge/-Linux-FCC624?style=for-the-badge\u0026logo=linux\u0026logoColor=black)](#b-linux-desktop)\n\n---\n\n# Droidspaces\n\n**Droidspaces** is a lightweight, portable Linux containerization tool that lets you run full Linux environments on top of Android or Linux, with complete init system support including **systemd**, **OpenRC**, and other init systems (runit, s6, etc.).\n\nWhat makes Droidspaces unique is its **zero-dependency, native execution** on both Android and Linux. It's statically compiled against musl libc. If your device runs a Linux kernel, Droidspaces runs on it. No Termux, no middlemen, no setup overhead.\n\n- **Tiny footprint:** under 260KB per platform\n- **Truly native:** runs directly on Android and Linux from the same binary\n- **Wide architecture support:** `aarch64`, `armhf`, `x86_64`, and `x86` as a single static binary\n- **Beautiful Android app:** manage unlimited containers and do everything the CLI can, all from a clean, intuitive GUI\n\n**Android** + **Linux Namespaces** = **Droidspaces**. Since Android is built on the Linux kernel, Droidspaces works seamlessly on Linux Desktop too. Both platforms are equally supported and maintained.\n\n\u003cdetails\u003e\n\u003csummary\u003e\u003cb\u003eView Project's Screenshots (Linux \u0026 Android)\u003c/b\u003e\u003c/summary\u003e\n\n\u003ctable align=\"center\"\u003e\n  \u003ctr valign=\"top\"\u003e\n    \u003ctd colspan=\"3\" align=\"center\"\u003e\n      \u003cb\u003eLinux Showcase\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eUbuntu + foreground mode\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/linux/linux-showcase.png\" width=\"95%\"\u003e\u003cbr\u003e\u003cbr\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n  \u003ctr valign=\"top\"\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eAndroid Home\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eBeautiful home screen\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/1-home_page.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eAndroid Containers\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eInstalled in the container menu\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/2-containers_tab.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eConfiguration menu\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eHostname and Networking modes\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/3_container_configuration.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n  \u003ctr valign=\"top\"\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eConfiguration menu\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eIntegration \u0026 Hardware, 1st part\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/4_container_configuration.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eConfiguration menu\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eSecurity \u0026 boot, Advanced\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/5_container_configuration.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eLogging\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eContainer boot-up logs\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/6_startup_logs.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n  \u003ctr valign=\"top\"\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eAndroid Panel\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eDashboard and portal access\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/7_panel.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eContainer information\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eManage the container in 1 place\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/8_container_information.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eSystemd services\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eFull systemd management\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/9_systemd_menu.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n  \u003ctr valign=\"top\"\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eUser Picker\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eSummon up a terminal\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/10_terminal_user_picker.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eTerminal UI\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eLove fastfetch ? here it is !\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/11_terminal_fastfetch.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eIsolation checks\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eDemonstration of isolated mounts\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/12_mnt_net_isolation.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n  \u003ctr valign=\"top\"\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eSettings page\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eCheck requirements, customization\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/13_settings_screen.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003cb\u003eRequirements checker\u003c/b\u003e\u003cbr\u003e\n      \u003ci\u003eReal-time system checks\u003c/i\u003e\u003cbr\u003e\n      \u003cimg src=\"Documentation/resources/gallery/14_built_in_requirements_checker.png\" width=\"95%\"\u003e\n    \u003c/td\u003e\n    \u003ctd align=\"center\" width=\"33%\"\u003e\n      \u003c!-- Empty to balance the 3-column row --\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n\u003c/table\u003e\n\n\u003c/details\u003e\n\n---\n\n### Quick Navigation\n\n- [What is Droidspaces?](#what-is-droidspaces)\n- [Features](#features)\n- [Droidspaces vs Chroot](#droidspaces-vs-chroot)\n- [Droidspaces vs LXC/Docker on Android](#droidspaces-vs-lxcdocker-on-android)\n- [Requirements](#requirements)\n    - [Android](#a-android-devices)\n        - [Rooting Requirements](#rooting-requirements)\n        - [Android Kernel Requirements](#android-kernel-requirements)\n            - [Non-GKI (Legacy Kernels)](#non-GKI)\n            - [GKI (Modern Kernels)](#GKI)\n    - [Linux Desktop](#b-linux-desktop)\n- [Installation](#installation)\n- [Usage](#usage)\n- [Cool Things You Can Do (Tailscale, Docker, etc.)](./Documentation/Cool-things-you-can-do.md)\n- [Additional Documentation](#additional-documentation)\n- [Credits](#credits)\n\n---\n\n\u003ca id=\"what-is-droidspaces\"\u003e\u003c/a\u003e\n\n## What is Droidspaces?\n\nDroidspaces is a **container runtime** that uses Linux kernel namespaces to run full Linux distributions with a real init system (systemd, OpenRC, etc.) as PID 1.\n\nUnlike traditional chroot, which simply changes the apparent root directory, Droidspaces creates proper process isolation. Each container gets its own PID tree, its own mount table, its own hostname, its own IPC resources, and its own cgroup hierarchy. The result is a full Linux environment that feels like a lightweight virtual machine, but with zero performance overhead because it shares the host kernel directly.\n\nDroidspaces is designed to work natively on both **Android** and **Linux Desktop**. On Android, it handles all the kernel quirks, SELinux conflicts, complex networking scenarios, and encryption gotchas that break other container tools. On Linux Desktop, it works out of the box with no additional configuration needed.\n\nThe entire runtime is a **single static binary** under 260KB, compiled against musl libc with no external dependencies.\n\n---\n\n\u003ca id=\"features\"\u003e\u003c/a\u003e\n\n## Features\n\n| Feature | Description |\n|---------|-------------|\n| **Init System Support** | Run systemd, OpenRC or any other init system as PID 1. Full service management, journald logging, and proper boot/shutdown sequences. |\n| **Namespace Isolation** | Complete isolation via PID, MNT, UTS, IPC, and Cgroup namespaces. Each container has its own process tree, mount table, hostname, IPC resources, and cgroup hierarchy. |\n| **Network Isolation** | **3 Networking Modes (Host, NAT, None)**. Pure network isolation via `CLONE_NEWNET` (NAT/None modes) or shared host networking (Host mode). Works on both Android and Linux. |\n| **Port Forwarding** | Forward host ports to the container in NAT mode (e.g., `--port 22:22`). Supports TCP and UDP, as well as ranges like `1-500:1-500`. |\n| **Volatile Mode** | Ephemeral containers using OverlayFS. All changes are stored in RAM and discarded on exit. Perfect for testing and development. |\n| **Custom Bind Mounts** | Map host directories into containers at arbitrary mount points. Supports both chained (`-B a:b -B c:d`) and comma-separated (`-B a:b,c:d`) syntax. |\n| **Config File Support** | Load configurations directly from `.config` files using `--conf`. Integrates seamlessly with the CLI overrides (`--reset` is supported) and automatically syncs to the workspace for persistence. |\n| **Hardware Access Mode** | Expose host hardware (GPU, cameras, sensors, USB) to the container via devtmpfs. Enables GPU acceleration with Turnip + Zink / Panfrost on supported Android devices. PulseAudio and Virgl are also supported in Android |\n| **Multiple Containers** | Run unlimited containers simultaneously, each with its own name, PID file, and configuration. Start, stop, enter, and manage them independently. |\n| **In-container Reboot Support** | Handles in-container `reboot(2)` syscalls via a strict 3-level PID hierarchy to autonomously reinitialize the container sequence - TL;DR: you can restart the container remotely without touching Droidspaces! |\n| **Android Storage** | Bind-mount `/storage/emulated/0` into the container for direct access to the device's shared storage. |\n| **PTY/Console Support** | Full PTY isolation. Foreground mode provides an interactive console with proper terminal resize handling (binary only with the `-f` flag) |\n| **Multi-DNS Support** | Configure custom DNS servers (comma-separated) to bypass the host's default DNS lookup. If you don't specify any DNS servers, it falls back to your ISP's default DNS. |\n| **SELinux Permissive Mode** | Optionally set SELinux to permissive mode during container boot if needed. |\n| **Rootfs Image Support** | Boot containers from ext4 `.img` files with automatic loop mounting, filesystem checks, and SELinux context hardening if needed. **The Android app also supports creating portable containers in rootfs.img mode** [ [How to create an ext4 rootfs.img manually ? ](./Documentation/Installation-Linux.md#option-b-create-an-ext4-image-recommended)] |\n| **Auto-Recovery** | Automatic stale PID file cleanup, container scanning for orphaned processes, and robust config resurrection via in-memory metadata syncing from `/run/droidspaces`. |\n| **Cgroup Isolation (v1/v2)** | Per-container cgroup hierarchies (`/sys/fs/cgroup/droidspaces/\u003cname\u003e`) with full systemd compatibility. Supports both legacy v1 and modern v2 hierarchies. |\n| **Adaptive Security \u0026 Deadlock Shield** | Kernel-aware BPF filters resolve FBE keyring conflicts automatically on legacy kernels. A manual **Deadlock Shield** toggle is available to fix the specific VFS `grab_super()` deadlock on affected legacy devices (e.g., kernel 4.14.113). When the shield is disabled (default), Droidspaces grants full namespace freedom enabling features like **nested containers/Docker** natively on all kernels. |\n\n---\n\n\u003ca id=\"droidspaces-vs-chroot\"\u003e\u003c/a\u003e\n\n## Droidspaces vs Chroot\n\n| Feature | Chroot | Droidspaces |\n|---------|--------|-------------|\n| Init System | No. Cannot run systemd or OpenRC. | Yes. Full systemd/OpenRC, etc support as PID 1. |\n| Process Isolation | None. Shares the host PID space. | Full. Private PID namespace with its own PID tree. |\n| Filesystem Isolation | Partial. Only changes the apparent root. | Full. Uses `pivot_root` with a private mount namespace. |\n| Mount Isolation | None. Mount events propagate to the host. | Full. `MS_PRIVATE` prevents mount propagation. |\n| Cgroup Support | None. | Yes. Per-container cgroup hierarchies. |\n| Resource Accounting | None. | Yes. Via cgroup isolation. |\n| Service Management | Manual. Must start services individually. | Automatic. Init manages the full service lifecycle. |\n| Hostname Isolation | None. Shares the host hostname. | Yes. UTS namespace provides independent hostname. |\n| IPC Isolation | None. Shares System V IPC. | Yes. IPC namespace for semaphores and shared memory. |\n| Ephemeral Containers | Not possible. | Yes. Volatile mode via OverlayFS. |\n\n---\n\n\u003ca id=\"droidspaces-vs-lxcdocker-on-android\"\u003e\u003c/a\u003e\n\n## Droidspaces vs LXC/Docker on Android\n\n| Aspect | LXC/Docker | Droidspaces |\n|--------|------------|-------------|\n| Dependencies | Many (liblxc, runc, containerd, etc.) | Zero. Single static binary. |\n| Setup Complexity | High. Requires Termux, cross-compiled libraries, manual config files. | Low. Download and install the APK, then run it on Android; download, extract, and run it on Linux. |\n| Older kernels Support | Spotty. Many features break on older kernels. | Full. Adaptive seccomp shield handles kernel quirks. |\n| **Network Isolation** | **Broken on Android**. Even with all kernel configs enabled, network isolation with internet access never works. | **First-in-Class**. Perfectly handles network isolation with internet access on Android out of the box. |\n| Binary Size | 10MB+ (plus dependencies) | Under 260KB per architecture. |\n| Android Optimizations | None. Not designed for Android. | Yes. SELinux handling, FBE keyring management, storage integration, networking fixes |\n| Termux Required | Often. Used as the execution environment. | Never. Runs directly as a native binary. Android app does have a built-in Terminal! |\n| Nested Containers | Complex setup required. | Supported natively on all kernels out of the box. |\n| Init System | LXC = yes, Docker = no. | Always. systemd/OpenRC as PID 1 by default. |\n\n---\n\n\u003ca id=\"requirements\"\u003e\u003c/a\u003e\n\n## Requirements\n\n\u003ca id=\"a-android-devices\"\u003e\u003c/a\u003e\n\n### A. Android Devices\n\nDroidspaces supports Android devices running Linux kernel **3.18 and above**:\n\n| Kernel Version | Support Level | Notes |\n|----------------|---------------|-------|\n| 3.18 | Supported | **Legacy.** Minimum floor. Basic namespace support. systemd-based distros may be unstable; **Alpine** is recommended. |\n| 4.4 - 4.19 | Stable | **Hardened.** [Full support upto modern distros with systemd older than v258](./Documentation/Troubleshooting.md#modern-distros). Nested containers (Docker/Podman) are natively supported. If you encounter systemd hangs on specific kernels (like 4.14.113) due to the VFS deadlock bug, manually enable the **Deadlock Shield** [[more info](./Documentation/Features.md#vfs-deadlock)]. |\n| 5.4 - 5.10 | Recommended | **Mainline.** Full feature support including nested containers and Cgroup v2. |\n| 5.15+ | Premium | **Full.** Best performance and maximum compatibility with all modern distributions. |\n\n\u003ca id=\"rooting-requirements\"\u003e\u003c/a\u003e\n\n#### Rooting Requirements\n\nYour device must be rooted. The following rooting methods have been tested:\n\n| Root Method | Status | Notes |\n|-------------|--------|-------|\n| **KernelSU** | Fully Supported | Tested and stable. **Recommended**. Since Droidspaces requires a custom kernel anyway, we recommend adding KernelSU to your kernel. |\n| **APatch** | Partially Supported. Not Recommended | Init fails to start due to a seccomp block related to the `u:r:magisk:s0` SELinux domain. This happens only on some devices, while some users run Droidspaces with APatch successfully [[more info](https://github.com/ravindu644/Droidspaces-OSS/issues/11#issuecomment-4036688816)]. |\n| **Magisk** | Partially Supported. Not Recommended | Same situation as APatch. Some users succeed, while others do not. [[more info](https://github.com/ravindu644/Droidspaces-OSS/issues/11#issuecomment-4036688816)]|\n\n\u003e [!CAUTION]\n\u003e\n\u003e **GrapheneOS is not supported** - because it blocks critical syscalls used for namespace isolation and containerization, making it impossible to run a userspace runtime like Droidspaces even with root access.\n\u003e\n\u003e **SuSFS is not supported** - DO NOT REPORT ANY BUGS WHEN USING SUSFS. If you must use SuSFS with Droidspaces, ensure that \"HIDE SUS MOUNTS FOR ALL PROCESSES\" is disabled in your SuSFS4KSU settings to avoid container boot failures.\n\n\u003ca id=\"android-kernel-requirements\"\u003e\u003c/a\u003e\n\n#### Android Kernel Requirements\n\nAndroid kernels are often heavily modified and may have critical container features disabled. Your kernel must have specific configuration options enabled (Namespaces, Cgroups, Seccomp, etc.) to run Droidspaces.\n\n\u003ca id=\"non-GKI\"\u003e\u003c/a\u003e\n\n##### Non-GKI (Legacy Kernels)\nCovers kernels: **3.18, 4.4, 4.9, 4.14, 4.19**. These kernels work plug-and-play after adding the required config fragments.\nSee: [Legacy Kernel Configuration](Documentation/Kernel-Configuration.md#configuring-non-gki-kernels-legacy-kernels)\n\n\u003ca id=\"GKI\"\u003e\u003c/a\u003e\n\n##### GKI (Modern Kernels)\nCovers kernels: **5.4, 5.10, 5.15, 6.1+**. These kernels require additional steps to handle ABI breakage caused by configuration changes.\nSee: [Modern GKI Kernel Configuration](Documentation/Kernel-Configuration.md#configuring-gki-kernels-modern-kernels)\n\n**Next Steps for Kernel Support:**\n- **Check automatically**: Use the built-in requirements checker in the Android app (**Settings** -\u003e **Requirements**).\n- **Full Technical Guide**: [Kernel Configuration Guide](Documentation/Kernel-Configuration.md)\n\n\u003e [!TIP]\n\u003e\n\u003e **Need help compiling a kernel?** Check out this guide:\n\u003e\n\u003e https://github.com/ravindu644/Android-Kernel-Tutorials\n\n---\n\n\u003ca id=\"b-linux-desktop\"\u003e\u003c/a\u003e\n\n### B. Linux Desktop\n\nMost modern Linux desktop distributions already include all the requirements needed by Droidspaces by default. **No additional configuration is needed.**\n\nJust download the tarball from the [GitHub Releases](https://github.com/ravindu644/Droidspaces-OSS/releases/latest), extract it, and use the binary for your CPU architecture.\n\nYou can verify your system meets all requirements by running:\n\n```bash\nsudo ./droidspaces check\n```\n\n---\n\n\u003ca id=\"installation\"\u003e\u003c/a\u003e\n\n## Installation\n\n- [Android Installation Guide](Documentation/Installation-Android.md)\n- [Linux Installation Guide](Documentation/Installation-Linux.md)\n\n---\n\n\u003ca id=\"usage\"\u003e\u003c/a\u003e\n\n## Usage\n\n- [Android App Usage](Documentation/Usage-Android-App.md)\n- [Linux CLI Usage](Documentation/Linux-CLI.md)\n\n---\n\n\u003ca id=\"additional-documentation\"\u003e\u003c/a\u003e\n\n## Additional Documentation\n\n| Document | Description |\n|----------|-------------|\n| [Feature Deep Dives](Documentation/Features.md) | Detailed explanation of each major feature. |\n| [Cool Things You Can Do](Documentation/Cool-things-you-can-do.md) | Advanced setups like Secure Mobile Server with Tailscale. |\n| [Troubleshooting](Documentation/Troubleshooting.md) | Common issues and their solutions. |\n| [Uninstallation Guide](Documentation/Uninstallation.md) | How to remove Droidspaces from your system. |\n\n---\n\n## License\n\nDroidspaces is licensed under the [GNU General Public License v3.0](./LICENSE).\n\nCopyright (C) 2026 [ravindu644](https://github.com/ravindu644) and contributors.\n\n---\n\n## Contributing\n\nContributions are welcome. Please open an issue or pull request on the [GitHub repository](https://github.com/ravindu644/Droidspaces-OSS).\n\nFor questions or support, join the [Telegram channel](http://t.me/Droidspaces).\n\n---\n\n\u003ca id=\"credits\"\u003e\u003c/a\u003e\n\n## Credits \u0026 Acknowledgments\n\nDroidspaces is built upon the incredible work of the open-source community. Special thanks to these projects for their inspiration and contributions:\n\n*   **[LXC](https://github.com/lxc/lxc)** - For the core architectural vision and inspiration for modern Linux containerization.\n*   **[Brutal-Busybox](https://github.com/feravolt/Brutal_busybox)** - For the statically-linked BusyBox binaries used in the Android userspace app to perform certain operations.\n*   **[Magisk](https://github.com/topjohnwu/Magisk)** - For the `magiskpolicy` utility, providing the core engine for live SELinux patching.\n*   **[KernelSU-Next](https://github.com/KernelSU-Next/KernelSU-Next)**, **[MMRL](https://github.com/MMRLApp/MMRL)**, and **[LSPatch](https://github.com/LSPosed/LSPatch)** - For inspiring our modern UI design language and Android user experience.\n*   **[ReTerminal](https://github.com/RohitKushvaha01/ReTerminal)**, **[Termux](https://github.com/termux/termux-app)** , **[LXC-Manager](https://github.com/Container-On-Android/LXC-Manager)** - Terminal Backend for the built-in Terminal emulator.\n\n---\n","funding_links":[],"categories":["Developer Tools"],"sub_categories":["Themes and Visual Mods"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fravindu644%2FDroidspaces-OSS","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fravindu644%2FDroidspaces-OSS","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fravindu644%2FDroidspaces-OSS/lists"}