On Fri, Aug 23, 2024 at 11:49 AM Jordan Rome <linux@xxxxxxxxxxxxxx> wrote: > > +u32 dynamic_sz = 1; .. > + > + // Make sure this passes the verifier > + ret = bpf_copy_from_user_str(data_long, dynamic_sz &= sizeof(data_long), user_ptr, 0); Did you really mean to &= into the global variable while passing it as an argument? And the compiler didn't warn?