[{"id":3680139,"web_url":"http://patchwork.ozlabs.org/comment/3680139/","msgid":"<CAKYAXd_BD2xzMWSTWJfWECAteng6GTDtYL3V8sfTv0C5Fsyyxw@mail.gmail.com>","list_archive_url":null,"date":"2026-04-21T23:53:52","subject":"Re: [PATCH] fs: smb: server: stop sending fake security descriptors","submitter":{"id":79386,"url":"http://patchwork.ozlabs.org/api/people/79386/","name":"Namjae Jeon","email":"linkinjeon@kernel.org"},"content":"On Wed, Apr 22, 2026 at 4:06 AM Marios Makassikis\n<mmakassikis@freebox.fr> wrote:\n>\n> in smb2_get_info_sec, a dummy security descriptor (SD) is returned if\n> the requested information is not supported.\n>\n> the code is currently wrong, as DACL_PROTECTED is set in the type field,\n> but there is no DACL is present.\n>\n> instead of faking a security, report a STATUS_NOT_SUPPORTED error.\n>\n> this seems to fix a \"Error 0x80090006: Invalid Signature\" on file\n> transfers with Windows 11 clients (25H2, build 26200.8246).\n>\n> capturing traffic shows that the client is sending a GET_INFO/SEC_INFO\n> request, with the additional_info field set to 0x20\n> (ATTRIBUTE_SECURITY_INFORMATION). Returning an empty SD\n> (with only SELF_RELATIVE set) does not fix the error.\n>\n> Signed-off-by: Marios Makassikis <mmakassikis@freebox.fr>\nApplied it to #ksmbd-for-next-next.\nThanks!","headers":{"Return-Path":"\n <linux-cifs+bounces-10991-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-cifs@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=eS+1nMmF;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-cifs+bounces-10991-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"eS+1nMmF\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0fNC4yT8z1yD5\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 09:54:35 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 8D82A3031EB2\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 23:54:07 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 2D64F3A5E8A;\n\tTue, 21 Apr 2026 23:54:06 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 08A00382373\n\tfor <linux-cifs@vger.kernel.org>; Tue, 21 Apr 2026 23:54:05 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id 8E691C2BCB6\n\tfor <linux-cifs@vger.kernel.org>; Tue, 21 Apr 2026 23:54:05 +0000 (UTC)","by mail-ed1-f50.google.com with SMTP id\n 4fb4d7f45d1cf-6729c6f0ca7so5740924a12.0\n        for <linux-cifs@vger.kernel.org>;\n Tue, 21 Apr 2026 16:54:05 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776815646; cv=none;\n b=kebw4gZvj0pDEPZiohnqnBvl4h/t2Y5dViGFtiugPdgINc1pfhdIvclAD2tpJff+i0HlomLxcY2L8m2uJAzjInkDm4EnVVKUU63G6mbZzwHDG/itTC7RGDfl3poMK2Q72f1uCVXAnvv923Op7zEZgoOfNfgFD7PaEFetW/h7vLA=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776815646; c=relaxed/simple;\n\tbh=1uoghLxmSn2t4MyPC7kZQRwuBzCyMTv08I6LlbPM1Nw=;\n\th=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject:\n\t To:Cc:Content-Type;\n b=c7TUMJVenhWHEb75z8W+k0b4SNPrIeUp4gvQefT6Twm9eJiB+ucuv5KI4srTJOXAchDRaHi0bbTqqGCdspohOtowiZQTSmE1uI2RvHBgWK3TxP4U71PPZsMF91S3BoNdLzeH2gEFNdCksOHV59wIOJRK5knB5VKdymsVPjs1jw8=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=eS+1nMmF; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1776815645;\n\tbh=1uoghLxmSn2t4MyPC7kZQRwuBzCyMTv08I6LlbPM1Nw=;\n\th=References:In-Reply-To:From:Date:Subject:To:Cc:From;\n\tb=eS+1nMmF2hK57nPiXwnyWkVpvbNSgB0L1hZ167bcL0nlXWN6fFrPOBOeFmz5CIrwf\n\t ZkxlMBFb5T4w3HSB6nwUF/+wi5litSTX0FWpHVsCLe4a2SbVZd/9xPcP6JexAQlUqr\n\t PZeHBSFFK6z7I24RGSeQVF9Yj4fMph83Mve64kRvnRPb6WKa4GLvd4K/BZN5H/BmoT\n\t sSZHhYIOG8+ufbQRl58zhJBxgFeSP2wtdGupxPMUq14N3a1KHTTHFibw39SCPMcsey\n\t fUBG0VaQTyAZ0avNHStN8EEeBHJT4YGX1OupbeOQsdhWn2RwtoLOL3kMnwd/uR/O/M\n\t V8szRebM/Ji4w==","X-Gm-Message-State":"AOJu0YxkIPxmpXhq261hgBsBllng20tUfyqb9U+VpGOPv/cUvFsNOc4C\n\tx8ElWftOvVmFSyXF6hHr6cVqXFtxZiYJzzs5zJoeuM4FHz6dzUUtVLZv5T7bFumK35X6ve1ls89\n\t+BcmoFqAd6sZCPC7PnPc6gEJpsSj8icw=","X-Received":"by 2002:a05:6402:1ec9:b0:676:9c6b:6ee5 with SMTP id\n 4fb4d7f45d1cf-6769c6b721dmr2625846a12.7.1776815644177; Tue, 21 Apr 2026\n 16:54:04 -0700 (PDT)","Precedence":"bulk","X-Mailing-List":"linux-cifs@vger.kernel.org","List-Id":"<linux-cifs.vger.kernel.org>","List-Subscribe":"<mailto:linux-cifs+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-cifs+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","References":"<20260421190619.1396589-1-mmakassikis@freebox.fr>","In-Reply-To":"<20260421190619.1396589-1-mmakassikis@freebox.fr>","From":"Namjae Jeon <linkinjeon@kernel.org>","Date":"Wed, 22 Apr 2026 08:53:52 +0900","X-Gmail-Original-Message-ID":"\n <CAKYAXd_BD2xzMWSTWJfWECAteng6GTDtYL3V8sfTv0C5Fsyyxw@mail.gmail.com>","X-Gm-Features":"AQROBzDsy45B5aHTxyEs1SBNDuYWey31yAWfAGtm8UX601FbD-IjZ_uufJkJ-Jg","Message-ID":"\n <CAKYAXd_BD2xzMWSTWJfWECAteng6GTDtYL3V8sfTv0C5Fsyyxw@mail.gmail.com>","Subject":"Re: [PATCH] fs: smb: server: stop sending fake security descriptors","To":"Marios Makassikis <mmakassikis@freebox.fr>","Cc":"linux-cifs@vger.kernel.org, smfrench@gmail.com, tom@talpey.com,\n\tsenozhatsky@chromium.org","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable"}},{"id":3680155,"web_url":"http://patchwork.ozlabs.org/comment/3680155/","msgid":"<CAH2r5mu+kn7qDq4_y6PFYsgAPwUE9WuAjNU_-4Z8Ot6s9WkCQQ@mail.gmail.com>","list_archive_url":null,"date":"2026-04-22T00:34:30","subject":"Re: [PATCH] fs: smb: server: stop sending fake security descriptors","submitter":{"id":510,"url":"http://patchwork.ozlabs.org/api/people/510/","name":"Steve French","email":"smfrench@gmail.com"},"content":"The patch generates a build warning\n\nsmb2pdu.c: In function ‘smb2_get_info_sec’:\nsmb2pdu.c:5817:1: warning: label ‘iov_pin’ defined but not used [-Wunused-label]\n 5817 | iov_pin:\n      | ^~~~~~~\n\nThe patch removes the use of that label\n...\n-               secdesclen = sizeof(struct smb_ntsd);\n-               goto iov_pin;\n+               rsp->hdr.Status = STATUS_NOT_SUPPORTED;\n+               return -EINVAL;\n        }\n\nOn Tue, Apr 21, 2026 at 2:06 PM Marios Makassikis\n<mmakassikis@freebox.fr> wrote:\n>\n> in smb2_get_info_sec, a dummy security descriptor (SD) is returned if\n> the requested information is not supported.\n>\n> the code is currently wrong, as DACL_PROTECTED is set in the type field,\n> but there is no DACL is present.\n>\n> instead of faking a security, report a STATUS_NOT_SUPPORTED error.\n>\n> this seems to fix a \"Error 0x80090006: Invalid Signature\" on file\n> transfers with Windows 11 clients (25H2, build 26200.8246).\n>\n> capturing traffic shows that the client is sending a GET_INFO/SEC_INFO\n> request, with the additional_info field set to 0x20\n> (ATTRIBUTE_SECURITY_INFORMATION). Returning an empty SD\n> (with only SELF_RELATIVE set) does not fix the error.\n>\n> Signed-off-by: Marios Makassikis <mmakassikis@freebox.fr>\n> ---\n>  fs/smb/server/smb2pdu.c | 16 ++--------------\n>  1 file changed, 2 insertions(+), 14 deletions(-)\n>\n> diff --git a/fs/smb/server/smb2pdu.c b/fs/smb/server/smb2pdu.c\n> index ee32e61b6d3c..6622efdd55e3 100644\n> --- a/fs/smb/server/smb2pdu.c\n> +++ b/fs/smb/server/smb2pdu.c\n> @@ -5745,20 +5745,8 @@ static int smb2_get_info_sec(struct ksmbd_work *work,\n>                 ksmbd_debug(SMB, \"Unsupported addition info: 0x%x)\\n\",\n>                        addition_info);\n>\n> -               pntsd = kzalloc(ALIGN(sizeof(struct smb_ntsd), 8),\n> -                               KSMBD_DEFAULT_GFP);\n> -               if (!pntsd)\n> -                       return -ENOMEM;\n> -\n> -               pntsd->revision = cpu_to_le16(1);\n> -               pntsd->type = cpu_to_le16(SELF_RELATIVE | DACL_PROTECTED);\n> -               pntsd->osidoffset = 0;\n> -               pntsd->gsidoffset = 0;\n> -               pntsd->sacloffset = 0;\n> -               pntsd->dacloffset = 0;\n> -\n> -               secdesclen = sizeof(struct smb_ntsd);\n> -               goto iov_pin;\n> +               rsp->hdr.Status = STATUS_NOT_SUPPORTED;\n> +               return -EINVAL;\n>         }\n>\n>         if (work->next_smb2_rcv_hdr_off) {\n> --\n> 2.51.1\n>","headers":{"Return-Path":"\n <linux-cifs+bounces-10993-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-cifs@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=qw7E45Ht;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=linux-cifs+bounces-10993-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=\"qw7E45Ht\"","smtp.subspace.kernel.org;\n arc=pass smtp.client-ip=209.85.219.52","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=gmail.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0gGb29bXz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 10:34:47 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 931FD3031AC8\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 00:34:44 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 16ABA125D0;\n\tWed, 22 Apr 2026 00:34:44 +0000 (UTC)","from mail-qv1-f52.google.com (mail-qv1-f52.google.com\n [209.85.219.52])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 92CA878F59\n\tfor <linux-cifs@vger.kernel.org>; Wed, 22 Apr 2026 00:34:42 +0000 (UTC)","by mail-qv1-f52.google.com with SMTP id\n 6a1803df08f44-8a151012558so53337256d6.3\n        for <linux-cifs@vger.kernel.org>;\n Tue, 21 Apr 2026 17:34:42 -0700 (PDT)"],"ARC-Seal":["i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776818084; cv=pass;\n b=uIF+qLf18fJk/+DozCrcQqHlFfsIqcT9UUI9xiSoUb3xCIdc6NfCBZB41xL5yBtIyKQhCGvawAtwBY6wyeuheEuTqYNNROKt4uPHadFTL/Zsi5+ecgTsQnDO05xqXu5QuJn28VjXBOO3i9oIJU4H/YqhiahaDiSGc5D2sW5wZQo=","i=1; a=rsa-sha256; t=1776818081; cv=none;\n        d=google.com; s=arc-20240605;\n        b=eoA4BuRjEc51IO4xSrf7dhc/e07GRHtphbQ2+enlAdWXkfxcPzgHo3tSRenVhWCuGC\n         NNbKuN2GWI8ZZ1X3xPiPa6IP9hQ3uVX/76EG+Y5BLvPgJ2pial4rmXqLEruhXS42WPkx\n         ZoGY47vCZy6Jf5G5s3OrDPOrHWRqMKZYCwpBVi4fSS9EL7dI+d2KTcgvPh3hrc1oS+Mn\n         QSXsgH8W63gskQANhDKYhE1/17EY4CHHVZkKb+YR8snZH2H8a06awJU+IKK3s2uNrJgz\n         VXigpmUCMipjT2uj4tFm4oauRaaWqgiZbBB3YNGBJ2j0xC79pg9NESa8py6A3PoVGKoi\n         4IOw=="],"ARC-Message-Signature":["i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776818084; c=relaxed/simple;\n\tbh=T84rhfPfPMeah91DmNMcVpdACGkTJ2yeF29RqqlRsy0=;\n\th=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject:\n\t To:Cc:Content-Type;\n b=OHoIqJsCC27OSg25iyymP/5Mw7U8s2wztYdYXebLNjWFzeIHZEUSGOD0p4Rd2KLzMjWWyc8OLeTpzHwehQyedG1hzX8NOqv4reWvofO4FmEc2p2l3PqR/xakv8FpDJJxjHE12nkBbKgmLKu6fx8IC5Kf/EXAT4+WSOdmAp73gBo=","i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:dkim-signature;\n        bh=a7iWeGavKHIUeJfUfxgN0PlXjETm2sJfoROjkDRTKyA=;\n        fh=+PRw39Iu0HZ3NnRj3bVR0DjPb5udgjZELhPbFY6cEpY=;\n        b=gNG37zpaCZ4M8JFZO9fV2oNi3EZWvZ8gePSEh3Pn0P6AJj+vFn5Hj4rjPmBfKumsqE\n         OBnzMTsbktlD7q2hOBJcOivmO0PAe7QtTHs+fmQfhAsPveIHx0vSdQlpMSXewf21cpeT\n         odyho5zSfy0j+suvchNIhpjPK6xPGK/c+KUD03FIO2AuazrP4nSNGcwHF1hD+3V6vkOA\n         u+FxxEGAEMCpDcQSkpQ6GadCGRKuEsiFM2IysTNcs7Su2EUL2kSQucU/BNWz6zWjii4J\n         uBMIdimx8yn6K9wpsbSTxea7sT1zSc4lLgvydB/Lc5XGTLxdUQXKTtaaIFQaFX8lSKFX\n         M52w==;\n        darn=vger.kernel.org"],"ARC-Authentication-Results":["i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com;\n spf=pass smtp.mailfrom=gmail.com;\n dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=qw7E45Ht; arc=pass smtp.client-ip=209.85.219.52","i=1; mx.google.com; arc=none"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=gmail.com; s=20251104; t=1776818081; x=1777422881;\n darn=vger.kernel.org;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=a7iWeGavKHIUeJfUfxgN0PlXjETm2sJfoROjkDRTKyA=;\n        b=qw7E45Ht+TljLSei1ayt2jvHMklswSIUvLH1+Gkws2gaUZ0gEhfCatecQ3YtwTZTPH\n         5cnPZOhf2hdM4bTOgq3FP2DVOW8asqpUIKc1Opcw3uODQMGmu0AjhYs2swcd4L9YgXXU\n         DadQ1zSAtqhZLORzfoZ68Eme9Cd+/qcHFEnIeIQO8iOxodo+DCOMFOQ1q5mXA7hhi/aD\n         ZwSPVyXVEddDuJFi0u4T74hC6kwOI+KZgSkNFQk+LcT7QxFhJ+FVdoJZEq2Xuqmvwexo\n         /PILoqdCKcALInnLfnUTVvgdBjgnDz6GUVUqIHBwrzfEQ9niYSEgvGDz3009fsen7BJI\n         k8eA==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1776818081; x=1777422881;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=a7iWeGavKHIUeJfUfxgN0PlXjETm2sJfoROjkDRTKyA=;\n        b=RQx2Q4EGhjspYvaV11pQVXF3nEp37pAo1ykEw9VBXJbofJ2NfXor/AkZsv5S+umnKK\n         mCUQajNpWdXOBy5DxEE2j6HNAMpMoY3ksk7+PONmw1IREqutXAjAK1t12OizsHYozY3g\n         U5wcKI3LoL+aM+gBxTuxbWibNSIqk46Lwinu6FwXtY8gv5VZtt6VOWqlGwtbbdHCxINb\n         vKhCXfdr/TFLjzWknxvzzaa14tfS73A8lBLLcJNNCE4AslC9KJq33vTDG6TNCF/nvVyG\n         8ycalikC/zebQsWZzZHPUlhQ7TLT+JQna/nZhU+O1SCAw+8my8843UKG6OPo5Xt6mFv9\n         i6OA==","X-Gm-Message-State":"AOJu0Yz4gGNW7KH9kHOQSBJB7EZr2ms5XO1mZU6ibbmJBjmyQu/zdnJV\n\tKiOIRlw02iEN7xlT37xPu3jZsJKdfkgrVq7DnE9S4dPW2Io+GQA6S0UNyJXLq8AlbKrBzI4LLlA\n\tYzZvSTVvnq6Teajm+4CWVYkrBxwswRUU=","X-Gm-Gg":"AeBDievjB3eb3ZNS8HS+mO62IoCwMM92pnaLl21r5zoT+uGn5qJZ1aXvyHFntueyGfI\n\tNpmjPY6TGMtyiP9lu2WxW89Ky7qh3CIYBGOtG4gA4DHNkq5qFfwwPGiF3zSHvVsyJOWIbGriYtq\n\tSrkol38q9q68TR2D9OEhQLHbvmxGQGMYoU9MQeYlMmD50+EOQ5yCwaNuVCL7rrfPqxQB51VF+7/\n\tdJJ6MOBqJ+iNtkaUw3B6oZzB3Bb+nL1PGCiZ7SY/uKwhBu+OKeUPZWdKOQeG96p0GGBo96Bvb0z\n\tfq/RJ9Sj+GbrZCem4Fogon0iQz6PtmRJocFcGqfXW+TVAkPLkFNBfvMpa14Lw7349RAZs6CGCgs\n\tQUt8lHVR09se8csj8er5iK+aYOdCs0x+ydi8/dH2Z1cWbgx5zv0L7qF83bbd+RzsG4PnaEnlkDw\n\t==","X-Received":"by 2002:a05:6214:27c3:b0:8a1:3ba4:9832 with SMTP id\n 6a1803df08f44-8b028055b1emr324001396d6.16.1776818081568; Tue, 21 Apr 2026\n 17:34:41 -0700 (PDT)","Precedence":"bulk","X-Mailing-List":"linux-cifs@vger.kernel.org","List-Id":"<linux-cifs.vger.kernel.org>","List-Subscribe":"<mailto:linux-cifs+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-cifs+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","References":"<20260421190619.1396589-1-mmakassikis@freebox.fr>","In-Reply-To":"<20260421190619.1396589-1-mmakassikis@freebox.fr>","From":"Steve French <smfrench@gmail.com>","Date":"Tue, 21 Apr 2026 19:34:30 -0500","X-Gm-Features":"AQROBzDROgFbeYiT5KLwQHfB3p1ZZt3-GH95yDZxdZQVXyCv76Tgc1nOJpmiH1U","Message-ID":"\n <CAH2r5mu+kn7qDq4_y6PFYsgAPwUE9WuAjNU_-4Z8Ot6s9WkCQQ@mail.gmail.com>","Subject":"Re: [PATCH] fs: smb: server: stop sending fake security descriptors","To":"Marios Makassikis <mmakassikis@freebox.fr>","Cc":"linux-cifs@vger.kernel.org, linkinjeon@kernel.org, tom@talpey.com,\n\tsenozhatsky@chromium.org","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable"}},{"id":3680174,"web_url":"http://patchwork.ozlabs.org/comment/3680174/","msgid":"<CAKYAXd8E7gMoKraLs-qzsEZezs6MNDxv2Sj_7mmmMVkFdy56Xg@mail.gmail.com>","list_archive_url":null,"date":"2026-04-22T01:18:53","subject":"Re: [PATCH] fs: smb: server: stop sending fake security descriptors","submitter":{"id":79386,"url":"http://patchwork.ozlabs.org/api/people/79386/","name":"Namjae Jeon","email":"linkinjeon@kernel.org"},"content":"On Wed, Apr 22, 2026 at 9:34 AM Steve French <smfrench@gmail.com> wrote:\n>\n> The patch generates a build warning\n>\n> smb2pdu.c: In function ‘smb2_get_info_sec’:\n> smb2pdu.c:5817:1: warning: label ‘iov_pin’ defined but not used [-Wunused-label]\n>  5817 | iov_pin:\n>       | ^~~~~~~\n>\n> The patch removes the use of that label\n> ...\n> -               secdesclen = sizeof(struct smb_ntsd);\n> -               goto iov_pin;\n> +               rsp->hdr.Status = STATUS_NOT_SUPPORTED;\n> +               return -EINVAL;\n>         }\nRight, I directly fixed it and pushed it again.\nThanks!\n>\n> On Tue, Apr 21, 2026 at 2:06 PM Marios Makassikis\n> <mmakassikis@freebox.fr> wrote:\n> >\n> > in smb2_get_info_sec, a dummy security descriptor (SD) is returned if\n> > the requested information is not supported.\n> >\n> > the code is currently wrong, as DACL_PROTECTED is set in the type field,\n> > but there is no DACL is present.\n> >\n> > instead of faking a security, report a STATUS_NOT_SUPPORTED error.\n> >\n> > this seems to fix a \"Error 0x80090006: Invalid Signature\" on file\n> > transfers with Windows 11 clients (25H2, build 26200.8246).\n> >\n> > capturing traffic shows that the client is sending a GET_INFO/SEC_INFO\n> > request, with the additional_info field set to 0x20\n> > (ATTRIBUTE_SECURITY_INFORMATION). Returning an empty SD\n> > (with only SELF_RELATIVE set) does not fix the error.\n> >\n> > Signed-off-by: Marios Makassikis <mmakassikis@freebox.fr>\n> > ---\n> >  fs/smb/server/smb2pdu.c | 16 ++--------------\n> >  1 file changed, 2 insertions(+), 14 deletions(-)\n> >\n> > diff --git a/fs/smb/server/smb2pdu.c b/fs/smb/server/smb2pdu.c\n> > index ee32e61b6d3c..6622efdd55e3 100644\n> > --- a/fs/smb/server/smb2pdu.c\n> > +++ b/fs/smb/server/smb2pdu.c\n> > @@ -5745,20 +5745,8 @@ static int smb2_get_info_sec(struct ksmbd_work *work,\n> >                 ksmbd_debug(SMB, \"Unsupported addition info: 0x%x)\\n\",\n> >                        addition_info);\n> >\n> > -               pntsd = kzalloc(ALIGN(sizeof(struct smb_ntsd), 8),\n> > -                               KSMBD_DEFAULT_GFP);\n> > -               if (!pntsd)\n> > -                       return -ENOMEM;\n> > -\n> > -               pntsd->revision = cpu_to_le16(1);\n> > -               pntsd->type = cpu_to_le16(SELF_RELATIVE | DACL_PROTECTED);\n> > -               pntsd->osidoffset = 0;\n> > -               pntsd->gsidoffset = 0;\n> > -               pntsd->sacloffset = 0;\n> > -               pntsd->dacloffset = 0;\n> > -\n> > -               secdesclen = sizeof(struct smb_ntsd);\n> > -               goto iov_pin;\n> > +               rsp->hdr.Status = STATUS_NOT_SUPPORTED;\n> > +               return -EINVAL;\n> >         }\n> >\n> >         if (work->next_smb2_rcv_hdr_off) {\n> > --\n> > 2.51.1\n> >\n>\n>\n> --\n> Thanks,\n>\n> Steve","headers":{"Return-Path":"\n <linux-cifs+bounces-10994-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-cifs@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=MglTkZ+S;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-cifs+bounces-10994-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"MglTkZ+S\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0hGT6pchz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 11:19:45 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id BC253300FC63\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 01:19:08 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 4EDA2233722;\n\tWed, 22 Apr 2026 01:19:08 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 2BCAC19AD5C\n\tfor <linux-cifs@vger.kernel.org>; Wed, 22 Apr 2026 01:19:07 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id C20FFC2BCB7\n\tfor <linux-cifs@vger.kernel.org>; Wed, 22 Apr 2026 01:19:07 +0000 (UTC)","by mail-ed1-f46.google.com with SMTP id\n 4fb4d7f45d1cf-67389cf78b0so8793184a12.2\n        for <linux-cifs@vger.kernel.org>;\n Tue, 21 Apr 2026 18:19:07 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776820748; cv=none;\n b=IFT7LQNAfrRFNHd+kjbUtT65Fa4Hjeps7f90p4+wzx2nskOGA/Ts9DmJenJYnXu7PqkzEYntuvwRAxaTuuukEzWLMaY3i5lmnibydQOLjr4Xkpp7H/aurbM2HhS01yWUo9ax0UZ4JJtBxMkSxJuRNdqfFqhMHMGII7KheTmw6ck=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776820748; c=relaxed/simple;\n\tbh=/jTKkPxjCUXS6fFAqKbqlFEHQVuCUBX2TYaLqiX0BVE=;\n\th=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject:\n\t To:Cc:Content-Type;\n b=imFxy4c0Ui44nSwprp3cBCZWVM/t1mPC7Yoe3fVFUON4t4nBCjvp8j0MWXA8t4FtoDWoP+pgY/zZxgEvNTZ0vKTwplJufoM0K+HoolLEucIexo3LLpVFRZyjLCZ3PGrkOAxBM2xRRl/iRQhPoDKONtvH8Y+/weX87irPeTEslR8=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=MglTkZ+S; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1776820747;\n\tbh=/jTKkPxjCUXS6fFAqKbqlFEHQVuCUBX2TYaLqiX0BVE=;\n\th=References:In-Reply-To:From:Date:Subject:To:Cc:From;\n\tb=MglTkZ+SUClyd0ProDQfnM9zWp0zOoabzz+UiOZaKI/Md9f0jfa8ixtphP6Wj+i8v\n\t lStO3wG/K7M9K/YnaGCuEXMOEGAqr3UvbQft9Sm/8FYFMRaiIDnvkNvYUn0cwI/sBy\n\t glbWt7be8cd8CUG6Pfn0g6LQ/q/X0iPs1ksz9roRfAqppBSIVBbNlFuO61qlIQssLs\n\t efgbYY4ztqOXvZ4n828/eWgJmJhIViuu8XaOMNUFSP4qcqUB1CMvBmN/DsQzO3R8oh\n\t KVcoHXpnvPFubj0jJ21Xl5SDrjBm2lh2sWQGhyQGrTCtC7j16nHL6UzF5Bp1iUpX3z\n\t 8Y1TuSnhRzaEw==","X-Forwarded-Encrypted":"i=1;\n AFNElJ+0Cb9KzoZSXR9CjzKiktiP3QuKKavpqTW23/dSGIIyj8h8YECGGICSskGbaHQpXpoGAKYG9H/mtxiX@vger.kernel.org","X-Gm-Message-State":"AOJu0Yw10GSeoGdb2N4oBKpX1HG6kittRH6mVhnIzbD0XYULBYLK0K7P\n\tk7pdj/9D148jivPuW0onh03SkZyVKIBiPTonDAdrgW6pRPIN2Gp+wZeQjx6ocRfBcsdqhrTbPlS\n\tyARVJS+msHztkj79FlUVs+sameMHWvDI=","X-Received":"by 2002:a05:6402:4041:10b0:676:9c6d:5c4d with SMTP id\n 4fb4d7f45d1cf-6769c6d5ed5mr2213385a12.17.1776820746303; Tue, 21 Apr 2026\n 18:19:06 -0700 (PDT)","Precedence":"bulk","X-Mailing-List":"linux-cifs@vger.kernel.org","List-Id":"<linux-cifs.vger.kernel.org>","List-Subscribe":"<mailto:linux-cifs+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-cifs+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","References":"<20260421190619.1396589-1-mmakassikis@freebox.fr>\n <CAH2r5mu+kn7qDq4_y6PFYsgAPwUE9WuAjNU_-4Z8Ot6s9WkCQQ@mail.gmail.com>","In-Reply-To":"\n <CAH2r5mu+kn7qDq4_y6PFYsgAPwUE9WuAjNU_-4Z8Ot6s9WkCQQ@mail.gmail.com>","From":"Namjae Jeon <linkinjeon@kernel.org>","Date":"Wed, 22 Apr 2026 10:18:53 +0900","X-Gmail-Original-Message-ID":"\n <CAKYAXd8E7gMoKraLs-qzsEZezs6MNDxv2Sj_7mmmMVkFdy56Xg@mail.gmail.com>","X-Gm-Features":"AQROBzDf8QuYzgsX6iI8pRKkYNg9sLoLe-Yp-Fv2VzP89ImFxgEBBJOn16US8w8","Message-ID":"\n <CAKYAXd8E7gMoKraLs-qzsEZezs6MNDxv2Sj_7mmmMVkFdy56Xg@mail.gmail.com>","Subject":"Re: [PATCH] fs: smb: server: stop sending fake security descriptors","To":"Steve French <smfrench@gmail.com>","Cc":"Marios Makassikis <mmakassikis@freebox.fr>, linux-cifs@vger.kernel.org,\n tom@talpey.com,\n\tsenozhatsky@chromium.org","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable"}},{"id":3680194,"web_url":"http://patchwork.ozlabs.org/comment/3680194/","msgid":"<CAH2r5mvhW0pTVtmgJRb4n8-cSUa+du1A9OxTa7oR_MiBKif9HA@mail.gmail.com>","list_archive_url":null,"date":"2026-04-22T02:27:41","subject":"Re: [PATCH] fs: smb: server: stop sending fake security descriptors","submitter":{"id":510,"url":"http://patchwork.ozlabs.org/api/people/510/","name":"Steve French","email":"smfrench@gmail.com"},"content":"merged updated patch to ksmbd-for-next\n\nOn Tue, Apr 21, 2026 at 8:19 PM Namjae Jeon <linkinjeon@kernel.org> wrote:\n>\n> On Wed, Apr 22, 2026 at 9:34 AM Steve French <smfrench@gmail.com> wrote:\n> >\n> > The patch generates a build warning\n> >\n> > smb2pdu.c: In function ‘smb2_get_info_sec’:\n> > smb2pdu.c:5817:1: warning: label ‘iov_pin’ defined but not used [-Wunused-label]\n> >  5817 | iov_pin:\n> >       | ^~~~~~~\n> >\n> > The patch removes the use of that label\n> > ...\n> > -               secdesclen = sizeof(struct smb_ntsd);\n> > -               goto iov_pin;\n> > +               rsp->hdr.Status = STATUS_NOT_SUPPORTED;\n> > +               return -EINVAL;\n> >         }\n> Right, I directly fixed it and pushed it again.\n> Thanks!\n> >\n> > On Tue, Apr 21, 2026 at 2:06 PM Marios Makassikis\n> > <mmakassikis@freebox.fr> wrote:\n> > >\n> > > in smb2_get_info_sec, a dummy security descriptor (SD) is returned if\n> > > the requested information is not supported.\n> > >\n> > > the code is currently wrong, as DACL_PROTECTED is set in the type field,\n> > > but there is no DACL is present.\n> > >\n> > > instead of faking a security, report a STATUS_NOT_SUPPORTED error.\n> > >\n> > > this seems to fix a \"Error 0x80090006: Invalid Signature\" on file\n> > > transfers with Windows 11 clients (25H2, build 26200.8246).\n> > >\n> > > capturing traffic shows that the client is sending a GET_INFO/SEC_INFO\n> > > request, with the additional_info field set to 0x20\n> > > (ATTRIBUTE_SECURITY_INFORMATION). Returning an empty SD\n> > > (with only SELF_RELATIVE set) does not fix the error.\n> > >\n> > > Signed-off-by: Marios Makassikis <mmakassikis@freebox.fr>\n> > > ---\n> > >  fs/smb/server/smb2pdu.c | 16 ++--------------\n> > >  1 file changed, 2 insertions(+), 14 deletions(-)\n> > >\n> > > diff --git a/fs/smb/server/smb2pdu.c b/fs/smb/server/smb2pdu.c\n> > > index ee32e61b6d3c..6622efdd55e3 100644\n> > > --- a/fs/smb/server/smb2pdu.c\n> > > +++ b/fs/smb/server/smb2pdu.c\n> > > @@ -5745,20 +5745,8 @@ static int smb2_get_info_sec(struct ksmbd_work *work,\n> > >                 ksmbd_debug(SMB, \"Unsupported addition info: 0x%x)\\n\",\n> > >                        addition_info);\n> > >\n> > > -               pntsd = kzalloc(ALIGN(sizeof(struct smb_ntsd), 8),\n> > > -                               KSMBD_DEFAULT_GFP);\n> > > -               if (!pntsd)\n> > > -                       return -ENOMEM;\n> > > -\n> > > -               pntsd->revision = cpu_to_le16(1);\n> > > -               pntsd->type = cpu_to_le16(SELF_RELATIVE | DACL_PROTECTED);\n> > > -               pntsd->osidoffset = 0;\n> > > -               pntsd->gsidoffset = 0;\n> > > -               pntsd->sacloffset = 0;\n> > > -               pntsd->dacloffset = 0;\n> > > -\n> > > -               secdesclen = sizeof(struct smb_ntsd);\n> > > -               goto iov_pin;\n> > > +               rsp->hdr.Status = STATUS_NOT_SUPPORTED;\n> > > +               return -EINVAL;\n> > >         }\n> > >\n> > >         if (work->next_smb2_rcv_hdr_off) {\n> > > --\n> > > 2.51.1\n> > >\n> >\n> >\n> > --\n> > Thanks,\n> >\n> > Steve","headers":{"Return-Path":"\n <linux-cifs+bounces-10995-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-cifs@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=b5HPvavI;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-cifs+bounces-10995-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=\"b5HPvavI\"","smtp.subspace.kernel.org;\n arc=pass smtp.client-ip=209.85.219.42","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=gmail.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0jrJ5lgMz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 12:30:40 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 5D3D93046534\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 02:28:09 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 2E4AA3630B0;\n\tWed, 22 Apr 2026 02:28:07 +0000 (UTC)","from mail-qv1-f42.google.com (mail-qv1-f42.google.com\n [209.85.219.42])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id CFCA835F5E7\n\tfor <linux-cifs@vger.kernel.org>; Wed, 22 Apr 2026 02:27:56 +0000 (UTC)","by mail-qv1-f42.google.com with SMTP id\n 6a1803df08f44-8a154cc6a48so57107726d6.0\n        for <linux-cifs@vger.kernel.org>;\n Tue, 21 Apr 2026 19:27:56 -0700 (PDT)"],"ARC-Seal":["i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776824885; cv=pass;\n b=QPAVQ3O+SHNSr21SbVoCbFKm6N0RztdAzB9SQM6H0tw5to2ZzBaz8UmcuZa7fC2dqoyzibJTlu7v5dJcC27jbLdl0Int26ef47T6F2qTdOERa99ojRjjbt3+WasXxkBNaIuu/NNH9zmKKegjtPZDeElffHQOlgCfdIzV4FASxSs=","i=1; a=rsa-sha256; t=1776824874; cv=none;\n        d=google.com; s=arc-20240605;\n        b=eF7W5356bfaWqy892lo05N6idoscM+rgfXDdtNF4sbVGX6Mzd0DdcVpxdSmiqvaeBb\n         olU2n2bwoogjTRDi3Qg28ABBTZn1nJgUo1O4hxQZ9XGJ8h2yfBNPHgCCb/2LZmJPI9kD\n         D8PMXlxerDRKT4UoAfELRXATgEYpN9ARhByvXODGUzZR5KbcFkV3DHaSE+vSQI76Ci5a\n         BZTiq5sCLAyv3WERw0b3dmIg+oCxirF5T2cuv6Fc1QSft4/e15zoVqhscZG2L9slhP43\n         kCpHfy06mCUF05PbNbqz/qx8vSlBccW3pG5FxtiuWnQUXQ9bNTj9aHfxAYZUI9AHeg6H\n         fTzg=="],"ARC-Message-Signature":["i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776824885; c=relaxed/simple;\n\tbh=IkcywboLEQ6ZH4kYu8JPpkMp9w0TSHmZItRMZtWRuAo=;\n\th=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject:\n\t To:Cc:Content-Type;\n b=cJfrSH+xN6pQyLvEREhMn/lHxPQCyfyLy2lR23nS6j5ghgXuFF+riDtrb1MvW44DSYp8O6U1yKhDk0Fvsmii+8T3q7AD0iHZsyESZGbIGJEBxZAManUCujuLs1cDtNh4qsFS0VM0RqR8lt8MBEK7pk2PJBD9WI4c/zH8YpYi7Y4=","i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:dkim-signature;\n        bh=W2ALRJpj9H2zlqlYputDOhmwNHTAhuill0cT5yrnU+8=;\n        fh=y+JHyQL1d5Z239s/yN1PTwATWpqwxY3S+Q0cxZn10ng=;\n        b=Ca9QSxvRAAf3o9GsJaPNPa3cJYAU8e+LhjgZtwvaJqKpGXgtvZO7SZ42RqbVi24JUX\n         72ScA56AGz7bmgXvw8aAVNPgwxQWSF+N7dNSc6k8V9xlWV5Rl9sPVqKtnADtHskmxc3e\n         bvA2jGXpEqA4zjridk9RHeCcWTN0f0ZnqLcmJbZTQ/mX/+FfNns9Pj9yeg7tm/9CZVHs\n         hQ95P8EabDUI3cMV4gMh37wkgURfsRT8Q1RlRuCH3FCFwGiY5iWHF9kcaCCmvdrhrqTq\n         M26jAmb0inNIGs/D9axMdfro+QFJ2COSlkeHWCR29DLOBxP3dWGdMEJ5V2+eZZQmPV0B\n         97fA==;\n        darn=vger.kernel.org"],"ARC-Authentication-Results":["i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com;\n spf=pass smtp.mailfrom=gmail.com;\n dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=b5HPvavI; arc=pass smtp.client-ip=209.85.219.42","i=1; mx.google.com; arc=none"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=gmail.com; s=20251104; t=1776824874; x=1777429674;\n darn=vger.kernel.org;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=W2ALRJpj9H2zlqlYputDOhmwNHTAhuill0cT5yrnU+8=;\n        b=b5HPvavIHoR4zIpfE8N6OWN34corpSmJvlARMQyINbP9hy+D5Yo4XDS2NKujaL6AqU\n         AXPuLtkujHv+w5zIjKCUUfriIx0MPyDXP9VzbaLqy10olbOUHNMPFX/4VnQKrwY19yGA\n         ewrNCLy+oCpymM2UB/uyqDErJI9GRr86ksI4BfDnlZp6nvDGRsAABqVUrlGC4NJX/QT8\n         tpJly7rP84tlOA9GYxEntuCAbAgVWJBF3X1Yg5Vyk1Fgay4E95cwID5jX7dC6MjAPl4A\n         4AETFT7gD/cdwCy6xqBebrYe1KXjmdFrA8owYoLQbJrnHk887CIU0ybRKcBlggl4BpOS\n         e3cQ==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1776824874; x=1777429674;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=W2ALRJpj9H2zlqlYputDOhmwNHTAhuill0cT5yrnU+8=;\n        b=NYkQMKkryJLz8JwKs6YmzJZ95Ctoy9c1t0lm2id0CBqJ03tYr3CLcusB0I8uzVmcdw\n         RWHvLLSGt1/MWg/Om90DrZw12a0sNiLB+kWh+pTTIfmZxoyW/2/GhbBUv6/8jBGbpR7K\n         CG9zUplQ3BRcyivevS1bUg9FWKmj1Pu5HNCALaYoAjMIsc7/+uaYv1Dd+ABqbgVg/HeT\n         RHYlMol5hes6L1omJuxOPviqydy6E/NMWkQs0qH4c2fj2FTeSwAax1kwSTxqInnRq3Gf\n         ksikIK9s3SSi693aVmE3433+UnEeKqPFMYNL01O66qx4NWCXfuNpb36UyaAPJQD/95jz\n         /Qrw==","X-Forwarded-Encrypted":"i=1;\n AFNElJ8LCcOK1Zm07oSakZ8x2VVPFfgE/go+PxDuhEF7h4df2DM/PotafD3GhkGslHOvSUcoH7VswAQAH/M5@vger.kernel.org","X-Gm-Message-State":"AOJu0Yxy3X+K65qSG28411J5XF0bwWD9n1nW59iiiW+fdn+JaTFgwAxn\n\tHp9QiIRgaAZJAuZHf+L6jjdxLDWu7fqht1nx2cvHtUM+J7kAAInKp/s6ayY+eaLU4I25j/pKXrK\n\tSjoyfO/21nGkjRYLNiy09zMZ8xKTYPMo=","X-Gm-Gg":"AeBDieuQxZ2/6XcMlVuI36ZM8iPFhLbIgBSvzu1urd0QvlsMQRKoD0M9J6Dzf6HG8iy\n\t2CLLX/BYdMCJv4D2YqtX5mTRL5zwlv2bgSP4n6ZsR4392EPJ/Qgb9mY+88p8qnJCrqdV3962nLz\n\tM55JqtBw9qf2luDKG4atdK/IVT360FN1RqvdOnn9tTMQ6l4ZjR0NlDPmrw3Y/PJX18ovXXdJi1t\n\tv55vfwWLl+v1xt2lLHe5LJMrbzTzFVW6mKocRtEUT1rjNINJ570reul6Jc+qR0UVffcb2b6httW\n\tD50FPmIy4EclwhCZ8ddfKg7OGjg03+VuiE37Lf2lYgGEYDwh8IkGQnC8Svs1kSwTLzIQIsX3Ahu\n\tG66Tr3ur7Gv9RuX8blRStmPc8pH43iNm/q0i2HlfLBRNewPPLoFMAc5QipfznF0IBfvwhDB6/6A\n\t==","X-Received":"by 2002:a05:6214:5294:b0:8b0:2b9e:9636 with SMTP id\n 6a1803df08f44-8b02b9e9cd4mr307045956d6.18.1776824873706; Tue, 21 Apr 2026\n 19:27:53 -0700 (PDT)","Precedence":"bulk","X-Mailing-List":"linux-cifs@vger.kernel.org","List-Id":"<linux-cifs.vger.kernel.org>","List-Subscribe":"<mailto:linux-cifs+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-cifs+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","References":"<20260421190619.1396589-1-mmakassikis@freebox.fr>\n <CAH2r5mu+kn7qDq4_y6PFYsgAPwUE9WuAjNU_-4Z8Ot6s9WkCQQ@mail.gmail.com>\n <CAKYAXd8E7gMoKraLs-qzsEZezs6MNDxv2Sj_7mmmMVkFdy56Xg@mail.gmail.com>","In-Reply-To":"\n <CAKYAXd8E7gMoKraLs-qzsEZezs6MNDxv2Sj_7mmmMVkFdy56Xg@mail.gmail.com>","From":"Steve French <smfrench@gmail.com>","Date":"Tue, 21 Apr 2026 21:27:41 -0500","X-Gm-Features":"AQROBzA8Oncc42SB20VJX05sBfR5Sli6m46Ja2re1iHu5q95O8vdqQBcfxws0X0","Message-ID":"\n <CAH2r5mvhW0pTVtmgJRb4n8-cSUa+du1A9OxTa7oR_MiBKif9HA@mail.gmail.com>","Subject":"Re: [PATCH] fs: smb: server: stop sending fake security descriptors","To":"Namjae Jeon <linkinjeon@kernel.org>","Cc":"Marios Makassikis <mmakassikis@freebox.fr>, linux-cifs@vger.kernel.org,\n tom@talpey.com,\n\tsenozhatsky@chromium.org","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable"}}]