network: 0.939 architecture: 0.890 device: 0.833 PID: 0.822 socket: 0.798 graphic: 0.760 vnc: 0.759 ppc: 0.753 permissions: 0.746 register: 0.728 kernel: 0.707 performance: 0.703 files: 0.697 semantic: 0.691 peripherals: 0.594 risc-v: 0.594 mistranslation: 0.591 debug: 0.565 TCG: 0.475 arm: 0.474 boot: 0.454 hypervisor: 0.437 VMM: 0.404 user-level: 0.337 i386: 0.326 assembly: 0.281 x86: 0.265 virtual: 0.195 KVM: 0.181 SMB sharing on FIPS enabled hosts with Samba broken Description of problem: Similar to #2593 , newer security features on GNU+Linux host OSes are continuing to break communication with guests running older OSes. QEMU executes the `smbd` process in [slirp.c](net/slirp.c) to facilitate the SMB sharing between guest and host. The host `smbd` process links in GnuTLS for authentication ciphers and algorithm primitives. When `smbd` processes SMB requests from these older OS's SMB implementations, it errors out with error lines: `Failed to setup SPNEGO negTokenInit request` `Failed to start SPNEGO handler for negprot OID list!` Steps to reproduce: 1. Access a GNU+Linux machine with GnuTLS library in FIPS mode which `smbd` links against 2. Run `qemu-system-*` with an older guest OS with a `smb` share to host 3. See errors in `/tmp/qemu.smb*/log.smbd` Additional information: #