diff --git a/Patches/LineageOS-17.1/android_bionic/0001-HM-Use_HM.patch b/Patches/LineageOS-17.1/android_bionic/0001-HM-Use_HM.patch
index 8c62d5bb..73d7d8ed 100644
--- a/Patches/LineageOS-17.1/android_bionic/0001-HM-Use_HM.patch
+++ b/Patches/LineageOS-17.1/android_bionic/0001-HM-Use_HM.patch
@@ -179,6 +179,3 @@ index 2176e634d..e2c1910d2 100644
#endif
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_bionic/0002-Symbol_Ordering.patch b/Patches/LineageOS-17.1/android_bionic/0002-Symbol_Ordering.patch
index 5f250982..7e904414 100644
--- a/Patches/LineageOS-17.1/android_bionic/0002-Symbol_Ordering.patch
+++ b/Patches/LineageOS-17.1/android_bionic/0002-Symbol_Ordering.patch
@@ -20,6 +20,3 @@ index e7ca82f92..6c753091b 100644
}
genrule {
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_bootable_recovery/0001-No_SerialNum_Restrictions.patch b/Patches/LineageOS-17.1/android_bootable_recovery/0001-No_SerialNum_Restrictions.patch
index e9d1f373..cd73b0bc 100644
--- a/Patches/LineageOS-17.1/android_bootable_recovery/0001-No_SerialNum_Restrictions.patch
+++ b/Patches/LineageOS-17.1/android_bootable_recovery/0001-No_SerialNum_Restrictions.patch
@@ -36,6 +36,3 @@ index 762c4572..6dd26123 100644
}
if (ota_type == OtaType::AB) {
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_build/0001-Restore_TTS.patch b/Patches/LineageOS-17.1/android_build/0001-Restore_TTS.patch
index 1bff22c7..77669ad4 100644
--- a/Patches/LineageOS-17.1/android_build/0001-Restore_TTS.patch
+++ b/Patches/LineageOS-17.1/android_build/0001-Restore_TTS.patch
@@ -54,6 +54,3 @@ index e5771cc941..6d2bc7c8a1 100644
PrintRecommendationService \
PrintSpooler \
ProxyHandler \
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_build/0002-OTA_Keys.patch b/Patches/LineageOS-17.1/android_build/0002-OTA_Keys.patch
index 3b8a4eea..c0189429 100644
--- a/Patches/LineageOS-17.1/android_build/0002-OTA_Keys.patch
+++ b/Patches/LineageOS-17.1/android_build/0002-OTA_Keys.patch
@@ -40,6 +40,3 @@ index 9460357ca1..be4bfec75e 100644
# Resolve and setup per-module dex-preopt configs.
DEXPREOPT_DISABLED_MODULES :=
# If a module has multiple setups, the first takes precedence.
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_build/0003-Enable_fwrapv.patch b/Patches/LineageOS-17.1/android_build/0003-Enable_fwrapv.patch
index c7961954..cc3ebfc1 100644
--- a/Patches/LineageOS-17.1/android_build/0003-Enable_fwrapv.patch
+++ b/Patches/LineageOS-17.1/android_build/0003-Enable_fwrapv.patch
@@ -21,6 +21,3 @@ index d3adee5ae2..83988bb603 100644
+ my_cflags += -fwrapv
+ endif
+endif
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_build_soong/0001-Enable_fwrapv.patch b/Patches/LineageOS-17.1/android_build_soong/0001-Enable_fwrapv.patch
index 5dfbb196..1c5f1c1d 100644
--- a/Patches/LineageOS-17.1/android_build_soong/0001-Enable_fwrapv.patch
+++ b/Patches/LineageOS-17.1/android_build_soong/0001-Enable_fwrapv.patch
@@ -47,6 +47,3 @@ index c1b055afe..147ee2d88 100644
if Bool(sanitize.Properties.Sanitize.Address) {
if ctx.Arch().ArchType == android.Arm {
// Frame pointer based unwinder in ASan requires ARM frame setup.
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_device_qcom_sepolicy-legacy/0001-Camera_Fix.patch b/Patches/LineageOS-17.1/android_device_qcom_sepolicy-legacy/0001-Camera_Fix.patch
index ae74cfde..13dd0121 100644
--- a/Patches/LineageOS-17.1/android_device_qcom_sepolicy-legacy/0001-Camera_Fix.patch
+++ b/Patches/LineageOS-17.1/android_device_qcom_sepolicy-legacy/0001-Camera_Fix.patch
@@ -29,6 +29,3 @@ index 1108551e..6b925655 100755
r_dir_file(mediaserver, sysfs_esoc)
#allow mediaserver system_app_data_file:file rw_file_perms;
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_av/0001-HM_A2DP_Fix.patch b/Patches/LineageOS-17.1/android_frameworks_av/0001-HM_A2DP_Fix.patch
index b48100e2..7a5d3359 100644
--- a/Patches/LineageOS-17.1/android_frameworks_av/0001-HM_A2DP_Fix.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_av/0001-HM_A2DP_Fix.patch
@@ -36,6 +36,3 @@ index 33e506f1b7..5f9f8b558c 100644
private:
void refreshTypes();
audio_devices_t mDeviceTypes;
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0003-SUPL_No_IMSI.patch b/Patches/LineageOS-17.1/android_frameworks_base/0003-SUPL_No_IMSI.patch
index fcb53703..af8c78df 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0003-SUPL_No_IMSI.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0003-SUPL_No_IMSI.patch
@@ -35,6 +35,3 @@ index 491bba2272ad..71fb465e8806 100644
native_agps_set_id(type, (setId == null) ? "" : setId);
}
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0004-Fingerprint_Lockout.patch b/Patches/LineageOS-17.1/android_frameworks_base/0004-Fingerprint_Lockout.patch
index feb4bdae..a5be5bd8 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0004-Fingerprint_Lockout.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0004-Fingerprint_Lockout.patch
@@ -20,6 +20,3 @@ index 2159f6f2f861..4e06c591a896 100644
private static final long FAIL_LOCKOUT_TIMEOUT_MS = 30 * 1000;
private static final String KEY_LOCKOUT_RESET_USER = "lockout_reset_user";
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch b/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch
index f3d9b90f..53f23939 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0006-Disable_Analytics.patch
@@ -34,6 +34,3 @@ index 861b0d922d32..a9ad5aac0f0d 100644
}
String name = sa.getNonConfigurationString(
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0007-Always_Restict_Serial.patch b/Patches/LineageOS-17.1/android_frameworks_base/0007-Always_Restict_Serial.patch
index 4ba6aebb..b6e41f5f 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0007-Always_Restict_Serial.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0007-Always_Restict_Serial.patch
@@ -27,6 +27,3 @@ index f3c2777208ab..0560b7306a4e 100644
// Check if this is a secondary process that should be incorporated into some
// currently active instrumentation. (Note we do this AFTER all of the profiling
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0008-Browser_No_Location.patch b/Patches/LineageOS-17.1/android_frameworks_base/0008-Browser_No_Location.patch
index 750db259..c31ffb9c 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0008-Browser_No_Location.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0008-Browser_No_Location.patch
@@ -49,6 +49,3 @@ index ecf66861a401..b4576b0b6827 100644
}
private String getDefaultSystemHandlerActivityPackage(String intentAction, int userId) {
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0009-SystemUI_No_Permission_Review.patch b/Patches/LineageOS-17.1/android_frameworks_base/0009-SystemUI_No_Permission_Review.patch
index 3e67c81f..f7dd4fb0 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0009-SystemUI_No_Permission_Review.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0009-SystemUI_No_Permission_Review.patch
@@ -21,6 +21,3 @@ index 4df7d4902338..55104b4e0ee2 100644
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0011-Sensors.patch b/Patches/LineageOS-17.1/android_frameworks_base/0011-Sensors.patch
index d47ee4fb..208c031b 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0011-Sensors.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0011-Sensors.patch
@@ -101,6 +101,3 @@ index 77875354d732..af535f62c10b 100644
};
/**
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0012-Restore_SensorsOff.patch b/Patches/LineageOS-17.1/android_frameworks_base/0012-Restore_SensorsOff.patch
index c6580ac6..37b15451 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0012-Restore_SensorsOff.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0012-Restore_SensorsOff.patch
@@ -259,6 +259,3 @@ index 000000000000..941e1d44e145
+ refreshState(enabled);
+ }
+}
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_base/0013-Private_DNS.patch b/Patches/LineageOS-17.1/android_frameworks_base/0013-Private_DNS.patch
index 861ebaad..68ed083c 100644
--- a/Patches/LineageOS-17.1/android_frameworks_base/0013-Private_DNS.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_base/0013-Private_DNS.patch
@@ -1,4 +1,4 @@
-From ea55dc9108da5a0e24606a39e791d7f7905ed3c8 Mon Sep 17 00:00:00 2001
+From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Tad
Date: Thu, 21 Oct 2021 20:54:37 -0400
Subject: [PATCH] Add more 'Private DNS' options
@@ -21,7 +21,7 @@ Change-Id: Id75a774ce1ed109a83c6a5bf512536c643165d71
2 files changed, 170 insertions(+)
diff --git a/core/java/android/net/ConnectivityManager.java b/core/java/android/net/ConnectivityManager.java
-index 111a8c48a46c..09b445a57756 100644
+index 111a8c48a46c..12102a140947 100644
--- a/core/java/android/net/ConnectivityManager.java
+++ b/core/java/android/net/ConnectivityManager.java
@@ -757,6 +757,58 @@ public class ConnectivityManager {
@@ -226,6 +226,3 @@ index 2321afb7df43..85b5596ae688 100644
return new PrivateDnsConfig(useTls);
}
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_frameworks_native/0001-Sensors.patch b/Patches/LineageOS-17.1/android_frameworks_native/0001-Sensors.patch
index 7ee9c057..92bd36ea 100644
--- a/Patches/LineageOS-17.1/android_frameworks_native/0001-Sensors.patch
+++ b/Patches/LineageOS-17.1/android_frameworks_native/0001-Sensors.patch
@@ -79,6 +79,3 @@ index 6bb250e7bb..58297122a5 100644
// Ensure that the AppOp is allowed, or that there is no necessary app op for the sensor
if (opCode < 0 || appOpAllowed) {
canAccess = true;
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-8996.patch b/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-8996.patch
index ab171202..edbd16c7 100644
--- a/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-8996.patch
+++ b/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-8996.patch
@@ -56,6 +56,3 @@ index cd788542f..10f1eb216 100644
LISTEN_EVENT_SND_DEVICE_FREE);
}
+#endif
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-8998.patch b/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-8998.patch
index 8513c802..3bcf1137 100644
--- a/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-8998.patch
+++ b/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-8998.patch
@@ -58,6 +58,3 @@ index 4675fc39c..4a5d91a97 100644
int audio_extn_utils_get_license_params(
const struct audio_device *adev,
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-sm8150.patch b/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-sm8150.patch
index 27de6da0..a0932930 100644
--- a/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-sm8150.patch
+++ b/Patches/LineageOS-17.1/android_hardware_qcom_audio/0001-Unused-sm8150.patch
@@ -56,6 +56,3 @@ index 4675fc39c..4a5d91a97 100644
int audio_extn_utils_get_license_params(
const struct audio_device *adev,
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_packages_apps_Dialer/0001-Not_Private_Banner.patch b/Patches/LineageOS-17.1/android_packages_apps_Dialer/0001-Not_Private_Banner.patch
index c2a7b27e..2792383a 100644
--- a/Patches/LineageOS-17.1/android_packages_apps_Dialer/0001-Not_Private_Banner.patch
+++ b/Patches/LineageOS-17.1/android_packages_apps_Dialer/0001-Not_Private_Banner.patch
@@ -183,6 +183,3 @@ index 5b65cc3d9..19e7fdc4f 100644
- @android:color/transparent
- true
- @color/dialer_theme_color_dark
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_packages_apps_LineageParts/0001-Remove_Analytics.patch b/Patches/LineageOS-17.1/android_packages_apps_LineageParts/0001-Remove_Analytics.patch
index 86077d36..56e453a7 100644
--- a/Patches/LineageOS-17.1/android_packages_apps_LineageParts/0001-Remove_Analytics.patch
+++ b/Patches/LineageOS-17.1/android_packages_apps_LineageParts/0001-Remove_Analytics.patch
@@ -138,6 +138,3 @@ index bdb1aa7..0097a52 100644
Date: Thu, 21 Oct 2021 21:09:38 -0400
Subject: [PATCH] Add more 'Private DNS' options
@@ -136,7 +136,7 @@ index 641905dc01..3614dd7cd8 100644
android:id="@+id/private_dns_mode_opportunistic"
android:text="@string/private_dns_mode_opportunistic"
diff --git a/res/values/cm_strings.xml b/res/values/cm_strings.xml
-index 12ad48e683..9ed50db5ad 100644
+index 44fad8e762..fb2c7377cd 100644
--- a/res/values/cm_strings.xml
+++ b/res/values/cm_strings.xml
@@ -104,6 +104,21 @@
@@ -252,7 +252,7 @@ index 1655c69cea..0beef5fc13 100644
mMode = PRIVATE_DNS_MODE_OPPORTUNISTIC;
break;
diff --git a/src/com/android/settings/network/PrivateDnsPreferenceController.java b/src/com/android/settings/network/PrivateDnsPreferenceController.java
-index 47c3a95c9f..1ab3293cfb 100644
+index 47c3a95c9f..5f4e0937c2 100644
--- a/src/com/android/settings/network/PrivateDnsPreferenceController.java
+++ b/src/com/android/settings/network/PrivateDnsPreferenceController.java
@@ -17,6 +17,19 @@
@@ -334,6 +334,3 @@ index 47c3a95c9f..1ab3293cfb 100644
case PRIVATE_DNS_MODE_OPPORTUNISTIC:
// TODO (b/79122154) : create a string specifically for this, instead of
// hijacking a string from notifications. This is necessary at this time
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch b/Patches/LineageOS-17.1/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch
index 57e223b4..8cae7071 100644
--- a/Patches/LineageOS-17.1/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch
+++ b/Patches/LineageOS-17.1/android_packages_apps_SetupWizard/0001-Remove_Analytics.patch
@@ -181,6 +181,3 @@ index 5b32720..acb5018 100644
public static final String DISABLE_NAV_KEYS = "disable_nav_keys";
public static final String KEY_BUTTON_BACKLIGHT = "pre_navbar_button_backlight";
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_packages_apps_Updater/0001-Server.patch b/Patches/LineageOS-17.1/android_packages_apps_Updater/0001-Server.patch
index 2698dc16..fdc6c8d3 100644
--- a/Patches/LineageOS-17.1/android_packages_apps_Updater/0001-Server.patch
+++ b/Patches/LineageOS-17.1/android_packages_apps_Updater/0001-Server.patch
@@ -31,6 +31,3 @@ index caf80c9..048d865 100644
}
public static String getUpgradeBlockedURL(Context context) {
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_packages_apps_Updater/0002-Tor_Support.patch b/Patches/LineageOS-17.1/android_packages_apps_Updater/0002-Tor_Support.patch
index fd10aaa5..38e935de 100644
--- a/Patches/LineageOS-17.1/android_packages_apps_Updater/0002-Tor_Support.patch
+++ b/Patches/LineageOS-17.1/android_packages_apps_Updater/0002-Tor_Support.patch
@@ -379,6 +379,3 @@ index 048d865..d1b5a74 100644
return server + "?base=LineageOS&device=" + device + "&inc=" + incrementalVersion;
}
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_system_core/0001-Harden.patch b/Patches/LineageOS-17.1/android_system_core/0001-Harden.patch
index 67c31eb6..eb14d1d9 100644
--- a/Patches/LineageOS-17.1/android_system_core/0001-Harden.patch
+++ b/Patches/LineageOS-17.1/android_system_core/0001-Harden.patch
@@ -54,6 +54,3 @@ index c80acdf51..e9fba7989 100644
write /proc/sys/kernel/randomize_va_space 2
write /proc/sys/vm/mmap_min_addr 32768
write /proc/sys/net/ipv4/ping_group_range "0 2147483647"
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_system_core/0002-HM-Increase_vm_mmc.patch b/Patches/LineageOS-17.1/android_system_core/0002-HM-Increase_vm_mmc.patch
index f9b662a0..4260fd7e 100644
--- a/Patches/LineageOS-17.1/android_system_core/0002-HM-Increase_vm_mmc.patch
+++ b/Patches/LineageOS-17.1/android_system_core/0002-HM-Increase_vm_mmc.patch
@@ -20,6 +20,3 @@ index e9fba7989..c175bc4ac 100644
# F2FS tuning. Set cp_interval larger than dirty_expire_centisecs, 30 secs,
# to avoid power consumption when system becomes mostly idle. Be careful
# to make it too large, since it may bring userdata loss, if they
---
-2.31.1
-
diff --git a/Patches/LineageOS-17.1/android_system_extras/0001-ext4_pad_filenames.patch b/Patches/LineageOS-17.1/android_system_extras/0001-ext4_pad_filenames.patch
index bdcd859d..71ef1196 100644
--- a/Patches/LineageOS-17.1/android_system_extras/0001-ext4_pad_filenames.patch
+++ b/Patches/LineageOS-17.1/android_system_extras/0001-ext4_pad_filenames.patch
@@ -67,6 +67,3 @@ index adeb66aa..7b707b9f 100644
LOG(ERROR) << "Failed to find matching encryption policy for " << directory;
return false;
}
---
-2.31.1
-
diff --git a/Scripts/LineageOS-17.1/Patch.sh b/Scripts/LineageOS-17.1/Patch.sh
index a51f3d4c..5c02c483 100644
--- a/Scripts/LineageOS-17.1/Patch.sh
+++ b/Scripts/LineageOS-17.1/Patch.sh
@@ -315,11 +315,18 @@ fi;
if enterAndClear "device/motorola/clark"; then
echo "recovery_only('" >> sepolicy/recovery.te; #304224: Allow recovery to unzip and chmod modem firmware
echo " allow firmware_file labeledfs:filesystem associate;" >> sepolicy/recovery.te;
-echo " allow recovery firmware_file:dir search;" >> sepolicy/recovery.te;
-echo " allow recovery firmware_file:file { open write };" >> sepolicy/recovery.te;
+echo " allow recovery firmware_file:dir rw_dir_perms;" >> sepolicy/recovery.te;
+echo " allow recovery firmware_file:file create_file_perms;" >> sepolicy/recovery.te;
+echo "')" >> sepolicy/recovery.te;
+fi;
+
+if enterAndClear "device/motorola/msm8916-common"; then
+rm sepolicy/recovery.te;
+echo "recovery_only('" >> sepolicy/recovery.te; #304224: Allow recovery to unzip and chmod modem firmware
+echo " allow firmware_file labeledfs:filesystem associate;" >> sepolicy/recovery.te;
+echo " allow recovery firmware_file:dir rw_dir_perms;" >> sepolicy/recovery.te;
+echo " allow recovery firmware_file:file create_file_perms;" >> sepolicy/recovery.te;
echo "')" >> sepolicy/recovery.te;
-#sed -i '2isetenforce 0' releasetools/extract_firmware.sh;
-#echo "setenforce 1" >> releasetools/extract_firmware.sh;
fi;
if enterAndClear "device/oneplus/avicii"; then
diff --git a/Scripts/LineageOS-18.1/Patch.sh b/Scripts/LineageOS-18.1/Patch.sh
index 96e1ce3a..90a64c88 100644
--- a/Scripts/LineageOS-18.1/Patch.sh
+++ b/Scripts/LineageOS-18.1/Patch.sh
@@ -370,6 +370,7 @@ echo "allow hwaddrs self:capability { fowner };" >> sepolicy/hwaddrs.te;
echo "allow hwaddrs block_device:lnk_file { open };" >> sepolicy/hwaddrs.te;
echo "allow hwaddrs misc_block_device:blk_file { open read };" >> sepolicy/hwaddrs.te;
sed -i '1itypeattribute wcnss_service misc_block_device_exception;' sepolicy/wcnss_service.te;
+echo "/sys/devices/qpnp-rtc-[a-f0-9]+/rtc/rtc0(/.*)? u:object_r:sysfs_rtc:s0" >> sepolicy/file_contexts; #https://gitlab.com/LineageOS/issues/android/-/issues/3889
fi;
if enterAndClear "device/lge/mako"; then