Ok,
I installed 3.16.0-7-586 (3.16.59-1) which allowed me to mount the
remote share using the version 3.0 protocol, but it got some console
errors and
a kernel oops in the journal, so there are still some issues here:
Oct 05 04:30:38 pentium kernel: Linux version 3.16.0-7-586
(debian-ker...@lists.debian.org) (gcc version 4.9.2 (Debian
4.9.2-10+deb8u1) ) #1 Debian 3.16.59-1 (2018-10-03)
...
Oct 05 04:35:08 pentium systemd[1]: Got automount request for
/mnt/share, triggered by 954 (mount.cifs)
Oct 05 04:35:08 pentium systemd[1]: Mounting /mnt/share...
Oct 05 04:35:08 pentium kernel: Key type dns_resolver registered
Oct 05 04:35:08 pentium kernel: FS-Cache: Netfs 'cifs' registered for
caching
Oct 05 04:35:08 pentium kernel: Key type cifs.spnego registered
Oct 05 04:35:08 pentium kernel: Key type cifs.idmap registered
Oct 05 04:35:09 pentium systemd[1]: Mounted /mnt/share.
Oct 05 04:35:09 pentium kernel: BUG: unable to handle kernel NULL
pointer dereference at 00000034
Oct 05 04:35:09 pentium kernel: IP: [<c11e84fe>]
crypto_shash_setkey+0xe/0xb0
Oct 05 04:35:09 pentium kernel: *pde = 00000000
Oct 05 04:35:09 pentium kernel: Oops: 0000 [#1]
Oct 05 04:35:09 pentium kernel: Modules linked in: arc4 ecb md4 hmac
nls_utf8 cifs dns_resolver nfsd auth_rpcgss oid_registry nfs_acl nfs
lockd fscache sunrpc ppdev snd_emu10k1 snd_util_mem snd_rawmidi
snd_hwdep snd_seq_device snd_ac97_codec snd_pcm snd_timer evdev snd
pcspkr serio_raw soundcore ac97_bus emu10k1_gp gameport parport_pc
parport processor button fuse autofs4 ext4 crc16 mbcache jbd2
hid_generic usbhid sg hid sd_mod sr_mod crc_t10dif crct10dif_generic
cdrom crct10dif_common ata_generic ata_piix uhci_hcd libata ehci_hcd
usbcore i2c_piix4 3c59x scsi_mod mii i2c_core thermal fan usb_common
thermal_sys floppy
Oct 05 04:35:09 pentium kernel: CPU: 0 PID: 954 Comm: mount.cifs Not
tainted 3.16.0-7-586 #1 Debian 3.16.59-1
Oct 05 04:35:09 pentium kernel: Hardware name: /i430TX-SMC669, BIOS
4.51 PG 07/20/98
Oct 05 04:35:09 pentium kernel: task: ccf7e5a0 ti: cc06c000 task.ti:
cc06c000
Oct 05 04:35:09 pentium kernel: EIP: 0060:[<c11e84fe>] EFLAGS: 00010296
CPU: 0
Oct 05 04:35:09 pentium kernel: EIP is at crypto_shash_setkey+0xe/0xb0
Oct 05 04:35:09 pentium kernel: EAX: 00000000 EBX: c035e8e0 ECX:
00000010 EDX: cd9630c4
Oct 05 04:35:09 pentium kernel: ESI: cc06dd18 EDI: cbffa000 EBP:
cc06dc30 ESP: cc06dc18
Oct 05 04:35:09 pentium kernel: DS: 007b ES: 007b FS: 0000 GS: 00e0 SS:
0068
Oct 05 04:35:09 pentium kernel: CR0: 8005003b CR2: 00000034 CR3:
0c03c000 CR4: 00000010
Oct 05 04:35:09 pentium kernel: Stack:
Oct 05 04:35:09 pentium kernel: 00000246 c10f0692 00011200 c035e8e0
cc06dd18 cbffa000 cc06dc7c d0ee2e39
Oct 05 04:35:09 pentium kernel: c10f0692 00000011 cc06dcd0 c035e8e0
cbffa008 c6711f1a 00000002 c15e3ac0
Oct 05 04:35:09 pentium kernel: 00000246 00000000 00000000 00000000
00000000 f439365f cdd23340 cd963000
Oct 05 04:35:09 pentium kernel: Call Trace:
Oct 05 04:35:09 pentium kernel: [<c10f0692>] ? mempool_alloc+0x42/0x120
Oct 05 04:35:09 pentium kernel: [<d0ee2e39>] ?
smb3_calc_signature+0xb9/0x2a0 [cifs]
Oct 05 04:35:09 pentium kernel: [<c10f0692>] ? mempool_alloc+0x42/0x120
Oct 05 04:35:09 pentium kernel: [<d0ee24cf>] ? smb2_sign_rqst+0x2f/0x60
[cifs]
Oct 05 04:35:09 pentium kernel: [<d0ee32dc>] ?
smb2_setup_request+0x8c/0x130 [cifs]
Oct 05 04:35:09 pentium kernel: [<d0ed2ccc>] ? SendReceive2+0xac/0x3f0
[cifs]
Oct 05 04:35:09 pentium kernel: [<c1069d42>] ? set_next_entity+0x52/0x70
Oct 05 04:35:09 pentium kernel: [<d0ee6b73>] ? SMB2_ioctl+0x133/0x2e0
[cifs]
Oct 05 04:35:09 pentium kernel: [<d0ee6e43>] ?
smb3_validate_negotiate+0x123/0x310 [cifs]
Oct 05 04:35:09 pentium kernel: [<d0ee4ae1>] ? SMB2_tcon+0x261/0x480 [cifs]
Oct 05 04:35:09 pentium kernel: [<c110536a>] ? kstrdup+0x3a/0x50
Oct 05 04:35:09 pentium kernel: [<d0ee4880>] ?
smb2_writev_callback+0xe0/0xe0 [cifs]
Oct 05 04:35:09 pentium kernel: [<d0eb9a92>] ?
cifs_get_tcon+0x192/0x400 [cifs]
Oct 05 04:35:09 pentium kernel: [<d0ebec4d>] ? cifs_mount+0x49d/0xc40
[cifs]
Oct 05 04:35:09 pentium kernel: [<d0eab7b9>] ? cifs_do_mount+0xc9/0x5b0
[cifs]
Oct 05 04:35:09 pentium kernel: [<d0eab6f0>] ?
cifs_drop_inode+0x40/0x40 [cifs]
Oct 05 04:35:09 pentium kernel: [<c113a096>] ? mount_fs+0x36/0x190
Oct 05 04:35:10 pentium kernel: [<c110536a>] ? kstrdup+0x3a/0x50
Oct 05 04:35:10 pentium kernel: [<c1151c28>] ? vfs_kern_mount+0x48/0xf0
Oct 05 04:35:10 pentium kernel: [<c1154688>] ? do_mount+0x1e8/0xa60
Oct 05 04:35:10 pentium kernel: [<c1105629>] ? strndup_user+0x39/0xc0
Oct 05 04:35:10 pentium kernel: [<c11542df>] ?
copy_mount_options+0x2f/0x1c0
Oct 05 04:35:10 pentium kernel: [<c11551cc>] ? SyS_mount+0x9c/0xf0
Oct 05 04:35:10 pentium kernel: [<c1452dcd>] ? syscall_call+0x10/0x10
Oct 05 04:35:10 pentium kernel: Code: 26 00 8b 55 f0 83 c4 10 5b 5e 89
d0 5f 5d c3 8d b4 26 00 00 00 00 8d bc 27 00 00 00 00 55 89 e5 57 56 53
83 ec 0c 3e 8d 74 26 00 <8b> 78 34 89 4d f0 89 c3 89 d6 8b 4f 1c 85 ca
74 59 89 c8 ba d0
Oct 05 04:35:10 pentium kernel: EIP: [<c11e84fe>]
crypto_shash_setkey+0xe/0xb0 SS:ESP 0068:cc06dc18
Oct 05 04:35:10 pentium kernel: CR2: 0000000000000034
Oct 05 04:35:10 pentium kernel: ---[ end trace eebba2ce5b45dfbc ]---
However I was able to see the remote share, and copy this journal log to it.
Regards
Andrew