Merge tag 'android-14.0.0_r50' into staging/lineage-21_merge-android-14.0.0_r50
Android 14.0.0 Release 50 (AP2A.240605.024)
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZmdzmwAKCRDorT+BmrEO
# eN+KAJ9+8WsgiRKrXHLrgUpfHI/xjYufKQCfaGkVpBc/mawypov8BsAaENp9imw=
# =hjvk
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Jun 11 00:43:55 2024 EEST
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2542 signatures in the past
# 2 years. Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg: It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78
# By Wilson Sung (9) and others
# Via Android Build Coastguard Worker (33) and others
* tag 'android-14.0.0_r50': (47 commits)
Revert^2 "Remove persist.bootanim.color property definitions"
Revert "Remove persist.bootanim.color property definitions"
Remove persist.bootanim.color property definitions
add dsim wakeup labels
Update tcpm i2c sepolicy with new device name
Add HWC permission to access IStats AIDL
hal_usb_impl: Grant read permission to usb overheat files
Allow camera_app can access priv-app symlinks
Allow con_monitor_app to read/write the folder /data/vendor/radio
Update error on ROM 11396046
Allow dump_power to read sysfs directories
Update SELinux error
Revert "rfsd: add new property to sepolicy"
Revert "Allow dump_power to read directories under "/sys/class/p..."
Revert "Allow dump_power to read directories under "/sys/class/p..."
Revert "Allow dump_power to read directories under "/sys/class/p..."
liboemservice_proxy: Update sepolicy to hal
Add `capacity_headroom` to gpu sysfs
Change the type of hw_jpg_device for selinux policy so that the GCA release flavor could access hw_jpg_device
[displayport-stats] add sysfs access permission on Zuma devices.
...
Conflicts:
sepolicy/vendor/file_contexts
sepolicy/zuma-sepolicy.mk
Change-Id: I3faf6cc680611da752218a7355f4b355a54bf09e