xref: /aosp_15_r20/external/e2fsprogs/tests/f_badjour_encrypted/script (revision 6a54128f25917bfc36a8a6e9d722c04a0b4641b6)
1*6a54128fSAndroid Build Coastguard Workerif ! test -x $DEBUGFS_EXE; then
2*6a54128fSAndroid Build Coastguard Worker	echo "$test_name: $test_description: skipped (no debugfs)"
3*6a54128fSAndroid Build Coastguard Worker	return 0
4*6a54128fSAndroid Build Coastguard Workerfi
5*6a54128fSAndroid Build Coastguard Worker
6*6a54128fSAndroid Build Coastguard Workertouch $TMPFILE
7*6a54128fSAndroid Build Coastguard Worker$MKE2FS -t ext4 -b 1024 $TMPFILE 2M
8*6a54128fSAndroid Build Coastguard Worker$DEBUGFS -w -R 'set_inode_field <8> flags 0x80800' $TMPFILE
9*6a54128fSAndroid Build Coastguard Worker
10*6a54128fSAndroid Build Coastguard WorkerSKIP_GUNZIP="true"
11*6a54128fSAndroid Build Coastguard Worker. $cmd_dir/run_e2fsck
12