FPII-1886:CR:935198-Several information exposure vulnerabilities in Mediaserver can permit a bypass of security checks.

1. Made changes to clear config before reading it from parcel in IAudioFlinger
2. Added initialization of variables and ensure no info leak when writing them to Parcel.
3. Added initialization of local variables to avoid data leak
Files affected
media/libmedia/IAudioFlinger.cpp
media/libmedia/IAudioPolicyService.cpp
Bug: 23540907
Change-Id:Ie8eb867ffc52251446e12b712cb28ddc95429fcd
diff --git a/tests/tests/security/jni/CtsSecurityJniOnLoad.cpp b/tests/tests/security/jni/CtsSecurityJniOnLoad.cpp
index ca8e841..75ebf66 100644
--- a/tests/tests/security/jni/CtsSecurityJniOnLoad.cpp
+++ b/tests/tests/security/jni/CtsSecurityJniOnLoad.cpp
@@ -27,6 +27,7 @@
 extern int register_android_security_cts_SELinuxTest(JNIEnv*);
 extern int register_android_security_cts_MMapExecutableTest(JNIEnv* env);
 extern int register_android_security_cts_AudioPolicyBinderTest(JNIEnv* env);
+extern int register_android_security_cts_AudioEffectBinderTest(JNIEnv* env);
 
 jint JNI_OnLoad(JavaVM *vm, void *reserved) {
     JNIEnv *env = NULL;
@@ -75,5 +76,9 @@
         return JNI_ERR;
     }
 
+    if (register_android_security_cts_AudioEffectBinderTest(env)) {
+        return JNI_ERR;
+    }
+
     return JNI_VERSION_1_4;
 }