Merge tag 'android-14.0.0_r50' into staging/lineage-21_merge-android-14.0.0_r50

Android 14.0.0 Release 50 (AP2A.240605.024)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZmdzmwAKCRDorT+BmrEO
# eN+KAJ9+8WsgiRKrXHLrgUpfHI/xjYufKQCfaGkVpBc/mawypov8BsAaENp9imw=
# =hjvk
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Jun 11 00:43:55 2024 EEST
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2542 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Wilson Sung (9) and others
# Via Android Build Coastguard Worker (33) and others
* tag 'android-14.0.0_r50': (47 commits)
  Revert^2 "Remove persist.bootanim.color property definitions"
  Revert "Remove persist.bootanim.color property definitions"
  Remove persist.bootanim.color property definitions
  add dsim wakeup labels
  Update tcpm i2c sepolicy with new device name
  Add HWC permission to access IStats AIDL
  hal_usb_impl: Grant read permission to usb overheat files
  Allow camera_app can access priv-app symlinks
  Allow con_monitor_app to read/write the folder /data/vendor/radio
  Update error on ROM 11396046
  Allow dump_power to read sysfs directories
  Update SELinux error
  Revert "rfsd: add new property to sepolicy"
  Revert "Allow dump_power to read directories under "/sys/class/p..."
  Revert "Allow dump_power to read directories under "/sys/class/p..."
  Revert "Allow dump_power to read directories under "/sys/class/p..."
  liboemservice_proxy: Update sepolicy to hal
  Add `capacity_headroom` to gpu sysfs
  Change the type of hw_jpg_device for selinux policy so that the GCA release flavor could access hw_jpg_device
  [displayport-stats] add sysfs access permission on Zuma devices.
  ...

 Conflicts:
	sepolicy/vendor/file_contexts
	sepolicy/zuma-sepolicy.mk

Change-Id: I3faf6cc680611da752218a7355f4b355a54bf09e