Add CTS test for DISALLOW_DEBUGGING_FEATURES user restriction

Once the restriction is applied, certain adb commands should not work on the secondary user.

Bug: 17875884
Change-Id: I2f763441b1ead03bb6ef21dc404368111dc275ce
diff --git a/tests/expectations/knownfailures.txt b/tests/expectations/knownfailures.txt
index b4c9ebb..40a66d2 100644
--- a/tests/expectations/knownfailures.txt
+++ b/tests/expectations/knownfailures.txt
@@ -91,19 +91,6 @@
   bug: 17496766
 },
 {
-  description: "As per new CTS test case adding policy",
-  names: [
-    "com.android.cts.managedprofile.PrimaryUserTest#testAddCrossProfileIntentFilter_primary",
-    "com.android.cts.managedprofile.PrimaryUserTest#testAddCrossProfileIntentFilter_all",
-    "com.android.cts.managedprofile.PrimaryUserTest#testAddCrossProfileIntentFilter_managed",
-    "com.android.cts.managedprofile.ManagedProfile#testClearCrossProfileIntentFilters",
-    "com.android.cts.managedprofile.ManagedProfile#testAddCrossProfileIntentFilter_primary",
-    "com.android.cts.managedprofile.ManagedProfile#testAddCrossProfileIntentFilter_all",
-    "com.android.cts.managedprofile.ManagedProfile#testAddCrossProfileIntentFilter_managed"
-  ],
-  bug: 15900074
-},
-{
   description: "these tests locks the screen with an emtpy password or swipe-to-unlock, blocking subsequent test to dismiss keyguard",
   names: [
     "com.android.cts.devicepolicy.DeviceOwnerTest#testKeyManagement"
@@ -128,7 +115,8 @@
     "com.android.cts.devicepolicy.ManagedProfileTest#testManagedProfileSetup",
     "com.android.cts.devicepolicy.ManagedProfileTest#testWipeData",
     "com.android.cts.devicepolicy.ManagedProfileTest#testCrossProfileIntentFilters",
-    "com.android.cts.devicepolicy.ManagedProfileTest#testCrossProfileContent"
+    "com.android.cts.devicepolicy.ManagedProfileTest#testCrossProfileContent",
+    "com.android.cts.devicepolicy.ManagedProfileTest#testNoDebuggingFeaturesRestriction"
   ]
 },
 {