Some devices, such as HTC add several permissions to the shell user ("android.uid.shell"), some of which may be signature|system protection level. It would be benefitial to:
See all (new) permissions assigned to the shell user (this is basically asking for diff support with sysappdb, which used to be a thing)
use sysappdb exposed as a given user. A few examples:
As the dummy application com.dtf.client:
$ dtf sysappdb exposed --user-profile com.dtf.client --all
As the shell application:
$ dtf sysappdb exposed --user-profile com.android.shell --all
As a sharedUserId (shell for example):
$ dtf sysappdb exposed --shared-id 2000 --all
Some devices, such as HTC add several permissions to the shell user ("android.uid.shell"), some of which may be signature|system protection level. It would be benefitial to:
sysappdb
, which used to be a thing)sysappdb exposed
as a given user. A few examples:As the dummy application com.dtf.client: $ dtf sysappdb exposed --user-profile com.dtf.client --all
As the shell application: $ dtf sysappdb exposed --user-profile com.android.shell --all
As a sharedUserId (shell for example): $ dtf sysappdb exposed --shared-id 2000 --all