You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Version: Linux Malware Detect v1.6.4
OS: CentOS 7.6.1810
Upon startup, maldet does not read the contents of the ignore_inotify file, hence no --exclude parameter is appended to the inotifywait startup line.
The reason is found in internals/functions, line 1749: if [ -f "$ignore_inotify" ] && [ ! -s "$ignore_inotify" ]; then
Those two checks are combined with an AND operator but they are mutually exclusive, so they're never true. The "-s" check is true if a file exists and is not empty, but here you negate that check with "! -s".
I guess you wanted to check if the file is NOT empty, hence the code on line 1749 should be changed to: if [ -f "$ignore_inotify" ] && [ -s "$ignore_inotify" ]; then
I manually changed the code on that line and now our ignore_inotify file contents are properly processed.
The text was updated successfully, but these errors were encountered:
Version: Linux Malware Detect v1.6.4
OS: CentOS 7.6.1810
Upon startup, maldet does not read the contents of the ignore_inotify file, hence no --exclude parameter is appended to the inotifywait startup line.
The reason is found in internals/functions, line 1749:
if [ -f "$ignore_inotify" ] && [ ! -s "$ignore_inotify" ]; then
Those two checks are combined with an AND operator but they are mutually exclusive, so they're never true. The "-s" check is true if a file exists and is not empty, but here you negate that check with "! -s".
I guess you wanted to check if the file is NOT empty, hence the code on line 1749 should be changed to:
if [ -f "$ignore_inotify" ] && [ -s "$ignore_inotify" ]; then
I manually changed the code on that line and now our ignore_inotify file contents are properly processed.
The text was updated successfully, but these errors were encountered: