An alternative workaround is to downgrade the connection to SMB2 (mount option vers=2.0) as the bug only affects SMB2.1 and SMB3 code.
Regarding the second issue (BUG: unable to handle kernel NULL pointer dereference at 0000000000000038) it is likely that it is triggered by a racecondition aswell, which isn't yet fixed.
There is now a kernel patch for cifs that is supposed to fix the buffer overflow in strcat.
Details see https:/ /patchwork. kernel. org/patch/ 10931327/
An alternative workaround is to downgrade the connection to SMB2 (mount option vers=2.0) as the bug only affects SMB2.1 and SMB3 code.
Regarding the second issue (BUG: unable to handle kernel NULL pointer dereference at 0000000000000038) it is likely that it is triggered by a racecondition aswell, which isn't yet fixed.