History log of /system/core/init/property_service.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
694636142113d91c2b9585ad28e143d4ff001584 14-Sep-2013 Nick Kralevich <nnk@google.com> property_service: better validate property names

Don't allow unexpected characters in property names.
Don't allow double dots in property names.

Bug: 10733330
Change-Id: I8d69740d697efb791f2f201f90989576e13bac81
/system/core/init/property_service.c
f14eef0c3c456bfe39f7e9d57c8f7ae4ec775972 12-Feb-2013 Greg Hackmann <ghackmann@google.com> init: move initial property area allocation into bionic

bionic's __system_property_add() now expands the property area as needed
by mapping in more pages. Rather than duplicate the mapping code, move
it inside bionic and have bionic's __system_property_area_init() set up
the first page.

Change-Id: If9917d5f775c1a82eb89be55b84635395145ca49
Signed-off-by: Greg Hackmann <ghackmann@google.com>
/system/core/init/property_service.c
88ac54a4e8d2a63e4fd9c465e115795ace316776 29-Jan-2013 Colin Cross <ccross@android.com> init: verify size of property buffers passed to property_get

Verify that the buffer passed as the value parameter to property_get
is always big enough.

Change-Id: Ie5b6fcd94bb908215cfd55d0c9b07f717ddb70b1
/system/core/init/property_service.c
9f5af635010a7ba92edf1fca543f7271cc9d75c8 24-Jan-2013 Colin Cross <ccross@android.com> init: move the system property writer implementation

Move the system property writer implementation into bionic to keep
it next to the reader implementation and allow for better testing.

Change-Id: I9026e604109e30546b2849b60cab2e7e5ff00ba5
/system/core/init/property_service.c
2deedfe0b1ac86ebd62d19cf7da9e7dcb508ab09 29-Jan-2013 Colin Cross <ccross@android.com> init: switch property_get to use __system_property_get

Change-Id: I4fc0502a1a5b331087618a4d2e3d90948743d7bd
/system/core/init/property_service.c
17775724b89e942b06c67144317697924039ad99 22-May-2013 Matthew Xie <mattx@google.com> am 5cb9a02b: am 7e723498: Merge "Add permission for bluetooth app in non-primary users" into jb-mr2-dev

* commit '5cb9a02b0322c18b48eb9ce261502c3b830c113c':
Add permission for bluetooth app in non-primary users
5cb9a02b0322c18b48eb9ce261502c3b830c113c 22-May-2013 Matthew Xie <mattx@google.com> am 7e723498: Merge "Add permission for bluetooth app in non-primary users" into jb-mr2-dev

* commit '7e72349865db83d62f98eec8bca4b170712fe0e0':
Add permission for bluetooth app in non-primary users
7e72349865db83d62f98eec8bca4b170712fe0e0 22-May-2013 Matthew Xie <mattx@google.com> Merge "Add permission for bluetooth app in non-primary users" into jb-mr2-dev
40a91a2884333e48aacf266fde53960e03fa1cc4 20-May-2013 Matthew Xie <mattx@google.com> Add permission for bluetooth app in non-primary users

bug 8954114
Change-Id: Id6a42f5a5beefa22c3cc8eecfb39a2222017a3b4
/system/core/init/property_service.c
1e47a7466868ff90f6afa2d20d1b209b7b8fcfae 21-May-2013 gcondra@google.com <gcondra@google.com> am 253e91b4: am 477e35d6: Revert "Add persistent property for SELinux enforcment status."

* commit '253e91b4ffb631b188fdac0c1624786103471f05':
Revert "Add persistent property for SELinux enforcment status."
acef650dbc11355f9792923b69d8277a4ce89fab 21-May-2013 gcondra@google.com <gcondra@google.com> am 43329bc1: am 8a387870: Revert "Reload policy after setting up the data partition."

* commit '43329bc1c99c0f5f3670a8aaab39e54df34819a1':
Revert "Reload policy after setting up the data partition."
253e91b4ffb631b188fdac0c1624786103471f05 21-May-2013 gcondra@google.com <gcondra@google.com> am 477e35d6: Revert "Add persistent property for SELinux enforcment status."

* commit '477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6':
Revert "Add persistent property for SELinux enforcment status."
43329bc1c99c0f5f3670a8aaab39e54df34819a1 21-May-2013 gcondra@google.com <gcondra@google.com> am 8a387870: Revert "Reload policy after setting up the data partition."

* commit '8a3878700eb9cd8ecf495cd01f15face5c3879c8':
Revert "Reload policy after setting up the data partition."
477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6 17-May-2013 repo sync <gcondra@google.com> Revert "Add persistent property for SELinux enforcment status."

This reverts commit b89bdfde422eff751b3f939f10ab57e22af83eaa.
/system/core/init/property_service.c
8a3878700eb9cd8ecf495cd01f15face5c3879c8 17-May-2013 repo sync <gcondra@google.com> Revert "Reload policy after setting up the data partition."

This reverts commit fee250d27a9c03af1ba439047b976d89563b1887.
/system/core/init/property_service.c
51ef5882e79d72b03400812a4f37c32a36c80ebc 01-May-2013 Colin Cross <ccross@android.com> am 55d69a96: am 032be7a4: Merge "Log an error if property pool is exhausted"

* commit '55d69a9681061b97d6bdcc0b1b92a7de63d0a07b':
Log an error if property pool is exhausted
55d69a9681061b97d6bdcc0b1b92a7de63d0a07b 01-May-2013 Colin Cross <ccross@android.com> am 032be7a4: Merge "Log an error if property pool is exhausted"

* commit '032be7a4c5be8c015063084d162d1f394279aa3d':
Log an error if property pool is exhausted
efbe7fc6cc871e95760b9b01d674a09f7e80eb6a 01-May-2013 gcondra@google.com <gcondra@google.com> am 63577d92: am fee250d2: Reload policy after setting up the data partition.

* commit '63577d9280e7919bfb7221030d211b833e66bb1e':
Reload policy after setting up the data partition.
fee250d27a9c03af1ba439047b976d89563b1887 30-Apr-2013 repo sync <gcondra@google.com> Reload policy after setting up the data partition.

This forces a policy reload + fixcon to deal with dynamically
delivered policy changing labels on device nodes.

It's implemented as a new keyword in init.

Bug: 8702843
Change-Id: I803cf1ecf6ff8318ce25dcc5cda4f292adc9738c
/system/core/init/property_service.c
fd7ffb1089cf3ce43a33a157ed748641adb7b95b 29-Apr-2013 Johan Redestig <johan.redestig@sonymobile.com> Log an error if property pool is exhausted

Failing to set properties due to an exhausted pool leads
to difficult to debug problems. This change adds an
error log to make the situation a bit easier to handle.

Change-Id: Icc1d97a80882fb23e74428a0195f1d28dba68fa8
/system/core/init/property_service.c
ada3291c8d13a9c3896102932abefed155a5b3fe 26-Apr-2013 gcondra@google.com <gcondra@google.com> am 14ad7861: am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev

* commit '14ad786183455ad9c8298e24946d4da0f24458d7':
Add persistent property for SELinux enforcment status.
b89bdfde422eff751b3f939f10ab57e22af83eaa 24-Apr-2013 repo sync <gcondra@google.com> Add persistent property for SELinux enforcment status.

Also adds triggers for going between enforcing and
permissive status.

Bug: 8702843
Change-Id: I841d80999b96acf6b6fd0a5408fb074952d6ae72
/system/core/init/property_service.c
ca8e66a8b0f843812014a28d49208f9f6f64ecbc 18-Apr-2013 Nick Kralevich <nnk@google.com> Make init handle reboots

Move the responsibility for rebooting the system from the
reboot command to init. Init is in a better position to take
actions to bring the system down cleanly, including making sure
filesystems are mounted read-only.

The only UIDs which can perform an init triggered reboot are
root, system, and shell.

Modify the reboot command so that it calls into init to perform
the reboot. The reboot command no longer requires CAP_SYS_BOOT.

Remove the -n reboot option and code which supports it. Anyone needing
to do an unclean shutdown can just do a 'echo c > /proc/sysrq-trigger'.

Modify adb so that it calls into init to perform a shutdown.

Bug: 8646621
Change-Id: I84c0513acb549720cb0e8c9fcbda0050f5c396f5
/system/core/init/property_service.c
7ece0a862cf97e85bbe69458a32a2bd165456874 23-Jan-2013 Nick Kralevich <nnk@google.com> property_service: make /dev/__properties__ readable

Currently, system properties are passed via the environment
variable ANDROID_PROPERTY_WORKSPACE and a file descriptor passed
from parent to child. This is insecure for setuid executables,
as the environment variable can be changed by the caller.

Make the /dev/__properties__ file accessible, so an app can
get properties directly from the file, rather than relying on
environment variables.

Preserve the environment variable for compatibility with pre-existing
apps.

Bug: 8045561
Change-Id: If81e2b705eca43ddd8b491871aceff59c0e00387
/system/core/init/property_service.c
2840647b15fe91069aee02ce0e203943346bf294 22-Jan-2013 Nick Kralevich <nnk@google.com> Revert "init: make system properties more secure."

This reverts commit 51e06618dbd87c4374c56d9193a5e567aa3d02ac.

Bug: 8045561
/system/core/init/property_service.c
51e06618dbd87c4374c56d9193a5e567aa3d02ac 18-Jan-2013 Nick Kralevich <nnk@google.com> init: make system properties more secure.

Currently, system properties are passed via the environment
variable ANDROID_PROPERTY_WORKSPACE and a file descriptor passed
from parent to child. This is insecure for setuid executables,
as the environment variable can be changed by the caller.

Modify system property handling so that we get the properties
from a root owned properties file, rather than using an
environment variable.

Related to bug: 8029617

Change-Id: I18610128e11c4037ed6f4dec6eba20f69fa647eb
/system/core/init/property_service.c
6575a1625ac585b46f90c6f036db9231db50c969 23-Oct-2012 Nick Kralevich <nnk@google.com> am 8f98c4b5: Merge "Fix dirfd crash issue in property service"

* commit '8f98c4b5f011db8637ce1b9361e82d59b13434f4':
Fix dirfd crash issue in property service
e41bc3155588c2fdc23b512a959e20e896da5180 23-Oct-2012 Yi-wei Zhao <gbjc64@motorola.com> Fix dirfd crash issue in property service

In "init: harden property service" patch, dirfd() is invoked
without checking whether opendir() return successfully. It may
fail if load_persistent_properties() is invoked before userdata
partition is mounted; then dirfd(NULL) will make init crash.
This may happen if "is_charger" is true.

Change-Id: I216fb743a3c9fa050f92fcb31b62e766346d84bb
Signed-off-by: Yi-wei Zhao <gbjc64@motorola.com>
/system/core/init/property_service.c
2a36ae5608e9d655b2bb14ce538f6fbdb910cada 17-Oct-2012 Kenny Root <kroot@google.com> am 7b88a90d: Merge "Remove HAVE_SELINUX guards"

* commit '7b88a90da2a27e347fc16c14fa577f4ae1ef07fd':
Remove HAVE_SELINUX guards
b5982bf7c65b30be981ecfe1847437b05e32b2bb 17-Oct-2012 Kenny Root <kroot@google.com> Remove HAVE_SELINUX guards

Change-Id: I8272c573b3c5dc663203bafab68fad5e94d89364
/system/core/init/property_service.c
474cb0e33aa12f7ba11170ad1a6b564bde244151 04-Oct-2012 Nick Kralevich <nnk@google.com> am 33045b3d: am f9c05970: Merge "init: harden property service."

* commit '33045b3d7bd965f67e2e0b175976cf9934fb924f':
init: harden property service.
7ecfe6a94baf9f5d883e32a870e282c5b349a954 02-Oct-2012 Nick Kralevich <nnk@google.com> init: harden property service.

Don't create temporary files in a well-known location. Rather,
use mkstemp().

Don't read persistent property files from insecure files.

Change-Id: I81e2aca674a2a7ca54869f088737fb228d3af6d2
/system/core/init/property_service.c
32b9023d086e3e22886dd3271f505ef64cd84bc8 19-Sep-2012 Nick Kralevich <nnk@google.com> init: Don't read local properties if ro.debuggable=0

Bug: 7195965
Change-Id: I29fdad61aa61f2c46d49db227cf7b84d9cc6f25d
/system/core/init/property_service.c
e953e9657c482d83ad487a4b861026a16f6bbb64 15-Aug-2012 Jeonghoon lim <jeonghoon.lim@lge.com> bluetooth: bring up with bluedroid stack

- change permission of "bluetooth." property to AID_BLUETOOTH

Change-Id: Ifcd97f136cfc3372412fe500e4f800d1bbbd065c
/system/core/init/property_service.c
2fec4de5c704afe4dc2a1bb976699a0e363786dd 13-Aug-2012 Kenny Root <kroot@android.com> am 11c783f1: am 9494f297: Merge "Implement SELinux/MAC checks for property service."

* commit '11c783f1ead9f276e8854cb1adaebeed8517e8a1':
Implement SELinux/MAC checks for property service.
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa 13-Aug-2012 Kenny Root <kroot@google.com> resolved conflicts for merge of 4dcd52ab to jb-mr1-dev

Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
63207cd20f2156bec937a85e789f07de0d1afa9d 09-Aug-2012 rpcraig <rpcraig@tycho.ncsc.mil> Implement SELinux/MAC checks for property service.

This is a set of changes to the init property service
implementation to apply a SELinux check over who can
change what properties. Also included control hooks
for the 'ctl' keys.

Change-Id: I5a18809bf5536f6459a36b6bf0d622b9f5061aa0
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/core/init/property_service.c
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 01-May-2012 Stephen Smalley <sds@tycho.nsa.gov> Add support for reloading policy from /data/system.

To support runtime policy management, add support for reloading
policy from /data/system. This can be triggered by setting the
selinux.loadpolicy property to 1, whether from init.rc after
mounting /data or from the system_server (e.g. upon invocation of
a new device admin API for provisioning policy). ueventd and
installd are restarted upon policy reloads to pick up the new
policy configurations relevant to their operation.

Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/init/property_service.c
a8afd723a4bdd68eda34a552a472a6adc0c26369 02-Aug-2012 Ravi Nagarajan <nravi@broadcom.com> Allow AID_BLUETOOTH to update persist.service.bdroid

When devices are provisioned, bd address path is set in ro.bt.bdaddr_path.
On devices where this property is not present, a random bd address is
generated and saved to the property: persist.service.bdroid.bdaddr
This change allows bluetooth process to update this property
bug 6885309

Change-Id: I2e8a2471a0e890da82e6bbec6a2ef67ec8e1f8f4
/system/core/init/property_service.c
8c0350f4eedc85e37655dcfe8b6c5ec14b8c4979 03-Jul-2012 jeonghoon.lim <jeonghoon.lim@lge.com> bluetooth: add property permission for bluetooth

add property permission for bluetooth.

Change-Id: I099f325f533d06c63ad43843dd6477ea81fc9781
/system/core/init/property_service.c
45fa13f370eb5b9215a3467a211f16b3c49f19e9 28-Apr-2012 Romain Guy <romainguy@google.com> Let users with SYSTEM permission set debug. properties

Change-Id: Ieda3f7dd5dca5f6a8fc50b07822e6a875db030ad
/system/core/init/property_service.c
0dbda7e1c5bcebc501b4943cd6483122297e1834 18-Jan-2012 Nick Kralevich <nnk@google.com> Don't read /data/local.prop on user builds

Creating a root owned /data/local.prop is one of the most common
ways to root an Android device. /data/local.prop is only intended
to assist developers on debuggable devices, and is never
intended to be used on production devices.

Change-Id: Ifcfa21c2ee9914b0b54445218b4cf0fea0a98e9c
/system/core/init/property_service.c
8886112d87bcc501e89e4763656a3ebfeb58edf2 19-Dec-2011 Dima Zavin <dima@android.com> init: export all androidboot cmd line values as ro.boot.xx props

Also, clean up how we initialize the ro.xx properties and process
the kernel command line.

Change-Id: Iedda6c90e31340a189171a44b2767480403354f7
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
33901e602484d0b5f6a07746e4660ec3e9ac62f7 19-Nov-2011 Jeff Brown <jeffbrown@google.com> Delete dead code.

Change-Id: Icfb9bcee2c524026ecbeb7e30e943d8ca299a33a
/system/core/init/property_service.c
ebf46586f57e580d0195a06c32103ea393314f01 06-Sep-2011 Dima Zavin <dima@android.com> init: do not load default.prop from ramdisk in charger mode

Change-Id: Ic471b891829d7f857674b925c9948954972d9ecb
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
5da93589f106646203d6633e2e927aba01fbdb9f 22-Aug-2011 Benoit Goby <benoit@android.com> Allow radio to set sys.usb.config

This allows the ril to put the phone into diagnostic mode

Change-Id: Iafc8164991550e7ab0ffda8b8da1d58e34a4225b
/system/core/init/property_service.c
22bfc4cca03197036c3b49e7c2cf47a0a23fce87 29-Jul-2011 Benoit Goby <benoit@android.com> Allow radio to set net.cdma* properties

Change-Id: I656abde9d06175eb158e84de4d08ede42620b46a
/system/core/init/property_service.c
7100f640deabb9e746e41eac54707f1ca531f2db 26-Jul-2011 Benoit Goby <benoit@android.com> Allow radio to set net.lte* properties

Change-Id: I4b7a280ba4c773673b28db8cfbbffcb360ee717f
/system/core/init/property_service.c
9bb4d411e01c8e6330b5c27c489485592360576b 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> init: update permissions for VPN.

VPN no longer uses system properties to keep network parameters.
Besides, profiles are now stored and encrypted by keystore.

Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
/system/core/init/property_service.c
d18678f882eed5677c28d03a86a8ab43300acd4e 01-Jul-2011 Mike Lockwood <lockwood@android.com> init: Handle EINTR in handle_property_set_fd()

Change-Id: I5a6f1791eaf11e98b1d81697112d78c99822fba5
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
71ead1835317af5305f9ef87ce06ebdf9cff92e6 01-Apr-2011 Brad Fitzpatrick <bradfitz@android.com> Close the client socket early for ctl.* properties.

Bug: 4199411
Change-Id: I3bf335e16e0df8405c538989a8f4f6db7795fa36
/system/core/init/property_service.c
9f1e0e3ae3108086948b74ce58af32df92ff8331 30-Mar-2011 Brad Fitzpatrick <bradfitz@android.com> Close the property socket *after* updating properties.

Also remove some dead code.

Bionic update is in change I3e80cecf

Bug: 4185486
Change-Id: I28e06197ff7a452c70b89b9fc5e2bcf0d9d54bbe
/system/core/init/property_service.c
c5c51033c86353d1a448c72e0e9388906eed7114 09-Mar-2011 Ken Sumrall <ksumrall@android.com> Load the persistent properties after decrypting the /data partition

Fix for bug 3415286. The persistent properties are normally read early
in the boot process after /data is mounted. However, for an encrypted
system, at that point /data is a tmpfs ramdisk. This change adds a new
command to init (load_persist_props) to read the persistent properties,
and adds an action to init.rc to load the persistent properties. This
action is triggered by setting a property in vold, but that's in a
different CL.

Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
/system/core/init/property_service.c
cf01597121c1c08780966f22e2a62386d0e1a08f 19-Feb-2011 Amol Bhatkar <amolbhatkar@motorola.com> property_service: Give radio permission to set net.qmi*

Change-Id: I771ef22859799b863ab79de9d3248ef610af4dd8
/system/core/init/property_service.c
58aa5b0ee0ec67d4e0f3b12e27cd58279bef0dee 10-Dec-2010 Mike Lockwood <lockwood@android.com> init: Allow non-root adbd to switch between TCP and USB modes

Change-Id: I9e93ceefadfaa2a4f8ec25cfa05fa4821fd98093
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
cfa0d8439384a1aaa53d31fb720c234cabf796ee 03-Oct-2010 Wink Saville <wink@google.com> Allow AID_RADIO to restart the ril-daemon.

This enhances robustness by allowing the Telephony Framework to restart
ril-daemon if it notices some catastrophic failure.

Added setprop ctl.restart.
Added ril-daemon to setprop control_perms and allow users/groups
with the AID_RADIO ID to control it.

Change-Id: I195abdd754a731ce0b77e8f71ab47fde8c3e7977
/system/core/init/property_service.c
25b15be9120bcdaa0aba622c67ad2c835d9e91ca 14-Jul-2010 Brian Swetland <swetland@google.com> init: use tmpfs/ftruncate for properties backing store instead of ashmem

This removes the need for ashmem for early bringup and avoids an issue
with permissions enforcement.

Change-Id: I405b080660934d73048c79d614b6b2ebc43ab182
Signed-off-by: Brian Swetland <swetland@google.com>
/system/core/init/property_service.c
3294bbbad9494eb4ca534624b96e39f8ed15aaf2 20-Apr-2010 Colin Cross <ccross@android.com> init: Allow services to start before property triggers are up

Change-Id: I4f87657123bea88b7b5c537781868908d8d66b01
/system/core/init/property_service.c
ed8a7d84428ec945c48b6b53dc5a3a18fabaf683 20-Apr-2010 Colin Cross <ccross@android.com> init: Move list and log handling to list.h and log.h

Change-Id: I298f575c590d0f28b7ad78747f3ebdbba56b7a27
/system/core/init/property_service.c
3899e9fc01cf608f19f716749c54cc5c4d17e766 14-Apr-2010 Colin Cross <ccross@android.com> init: Move prototypes for util.c into util.h

Change-Id: I46a91849ce5297eb2597dd6134412f817564ec24
/system/core/init/property_service.c
d11beb2b1516144327c3f730f75e6b4bc65f1374 14-Apr-2010 Colin Cross <ccross@android.com> init: Move property_set_fd to property_service.c

Change-Id: Ic7a19073eae8f353d48cabee80fa9722b35a82b5
/system/core/init/property_service.c
ef4e21520cef69aaa7b488a3f44b2490dc2e3eb5 12-Nov-2009 Oscar Montemayor <oam@google.com> Encrypted File SYstems project. Enabling EFS security properties.
This change enables persist.security.* flags in the device, allowing oly the system to modify them.
Change is necessary to allow for further progress in the project, as this is an ideal location for access both from the
framework as well as from the recovery mode / transition.
/system/core/init/property_service.c
c5e7ef24308f5a993ecfd5ac438d347e786f5e42 03-Sep-2009 Mike Lockwood <lockwood@android.com> init: Add support for enforcing setprop by caller's group.

Change-Id: Ic96e139c4c596882adb38b8863ac6157e0ac17b5
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
3dfe6c66646865a78449a435239145deeaeab3ba 26-Aug-2009 Tammo Spalink <tammo@google.com> Add persistent radio prop perms ; cleanup ws and typos.

Change-Id: I7d6b51bbb8a9658179bd01c4ff3b5356ec8b4b6c
/system/core/init/property_service.c
0ab3a93abaac2d44d1db064c91c275f0e38925de 25-Aug-2009 Robert Greenwalt <robdroid@android.com> Allow radio to modify net.ppp* properties for dns

The radio bringup script was changed from operating as root to operating as radio. This is
preventing it from adding the "net.ppp0.dns0" and "net.ppp0.dns1" properties that
ConnectivityService needs to correctly set dns.

bug: 2077628
/system/core/init/property_service.c
88dc657d50cb3289a9011828c497eee996ed958c 19-Jun-2009 Chia-chi Yeh <chiachi@android.com> Add device, property, directory, and file permissions for VPN.
/system/core/init/property_service.c
b3779558dcfbe99f0b9c1ef796e3728edad25672 08-May-2009 Mike Lockwood <lockwood@android.com> init: Fix some broken code that did not cause problems until switching to gcc 4.4

Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
e037fd7e193ecccbb5c0888e49f6d58c224bc11d 13-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake_rel/...@138607
/system/core/init/property_service.c
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
e54eebbf1a908d65ee8cf80bab62821c05666d70 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
35237d135807af84bf9b0e5b8d7f8633e58db6f5 18-Dec-2008 The Android Open Source Project <initial-contribution@android.com> Code drop from //branches/cupcake/...@124589
/system/core/init/property_service.c
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
/system/core/init/property_service.c