@@ -190,13 +190,17 @@ void setup_seccomp_filter(scmp_filter_ctx ctx) {
190190 " block ptrace" );
191191
192192 check_seccomp (seccomp_rule_add (ctx, SCMP_ACT_ERRNO (EPERM), SCMP_SYS (prctl), 2 ,
193- SCMP_A0 (SCMP_CMP_EQ, PR_SET_DUMPABLE),
194- SCMP_A1 (SCMP_CMP_EQ, 1 )),
195- " block prctl(SET_DUMPABLE, 1 )" );
193+ SCMP_A0 (SCMP_CMP_EQ, PR_SET_DUMPABLE),
194+ SCMP_A1 (SCMP_CMP_NE, 0 )),
195+ " block prctl(SET_DUMPABLE!=0 )" );
196196
197197 check_seccomp (seccomp_rule_add (ctx, SCMP_ACT_ERRNO (EPERM), SCMP_SYS (prctl), 1 ,
198- SCMP_A0 (SCMP_CMP_EQ, PR_SET_SECCOMP)),
199- " block prctl(SET_SECCOMP)" );
198+ SCMP_A0 (SCMP_CMP_EQ, PR_SET_SECCOMP)),
199+ " block prctl(SET_SECCOMP)" );
200+
201+ check_seccomp (seccomp_rule_add (ctx, SCMP_ACT_ERRNO (EPERM), SCMP_SYS (prctl), 1 ,
202+ SCMP_A0 (SCMP_CMP_EQ, PR_SET_PTRACER)),
203+ " block prctl(SET_PTRACER)" );
200204 // TODO figure out what else we can and should block
201205 /*
202206 check_seccomp(seccomp_rule_add(ctx, SCMP_ACT_ERRNO(EPERM), SCMP_SYS(mprotect), 1,
0 commit comments