proc_mem.force_override=ptrace
This essentially prevents a process from directly modifying its own memory mappings unless it is privileged.
a13xp0p0v/kernel-hardening-checker#201
https://lwn.net/Articles/983169/
While kernel.yama.ptrace_scope effectively protects other processes, it does not prevent a compromised process from modifying its own protected memory pages. This creates a security gap, as self-modification can be exploited to trigger race condition vulnerabilities (e.g., CVE-2022-2590)!