The intent here is to handle read only opens differently. For example, if we don't want to create the file if it doesn't exist. The problem here is that O_RDONLY is 0 and if (x & 0) {... is always false. Signed-off-by: Dan Carpenter <dan.carpenter@xxxxxxxxxx> --- This is a static checker bug, and I am not very familiar with eCryptfs. Please review carefully. diff --git a/fs/ecryptfs/kthread.c b/fs/ecryptfs/kthread.c index 69f994a..d01b364 100644 --- a/fs/ecryptfs/kthread.c +++ b/fs/ecryptfs/kthread.c @@ -149,7 +149,7 @@ int ecryptfs_privileged_open(struct file **lower_file, (*lower_file) = dentry_open(lower_dentry, lower_mnt, flags, cred); if (!IS_ERR(*lower_file)) goto out; - if (flags & O_RDONLY) { + if (!(flags & O_RDWR)) { rc = PTR_ERR((*lower_file)); goto out; } -- To unsubscribe from this list: send the line "unsubscribe kernel-janitors" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html