I'm able to reproduce the OOPS by booting a Xenial VM with root on JFS:
[ 42.018954] Unable to handle kernel paging request for data at address 0x00000000 [ 42.019098] Faulting instruction address: 0xd00000000108e1cc [ 42.019501] Oops: Kernel access of bad area, sig: 11 [#1] [ 42.019611] SMP NR_CPUS=2048 NUMA pSeries [ 42.020320] Modules linked in: iscsi_tcp(+) libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 jfs btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ibmvscsi [ 42.021106] CPU: 0 PID: 1067 Comm: ureadahead Not tainted 4.4.0-96-generic #119-Ubuntu [ 42.021285] task: c00000000474e7b0 ti: c000000004c4c000 task.ti: c000000004c4c000 [ 42.021361] NIP: d00000000108e1cc LR: d00000000108e168 CTR: c0000000001196c0 [ 42.021425] REGS: c000000004c4f570 TRAP: 0300 Not tainted (4.4.0-96-generic) [ 42.021475] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 48048844 XER: 00000000 [ 42.021738] CFAR: c000000000008468 DAR: 0000000000000000 DSISR: 40000000 SOFTE: 1 GPR00: d00000000108e168 c000000004c4f7f0 d0000000010a90d0 c00000003ec8f658 GPR04: d00000000109fba0 d0000000010a2e58 0000000000005aca 0000000000000001 GPR08: 0000000000000000 0000000000000000 0000000000168660 d00000000109aad8 GPR12: c0000000001196c0 c00000000fb40000 0000000000000009 0000000000000000 GPR16: c00000003793ac20 c00000003793ab08 0000000000000000 c00000003793ad48 GPR20: c000000004c4fae0 c00000003a8059fe c000000004d06800 c000000004c4fa00 GPR24: 0000000000168660 0000000000001000 0000000000000000 d0000000010a2e38 GPR28: 0000000000168660 f00000000000d840 c000000004428e80 c00000003ec8f618 [ 42.023072] NIP [d00000000108e1cc] __get_metapage+0x1dc/0x650 [jfs] [ 42.023171] LR [d00000000108e168] __get_metapage+0x178/0x650 [jfs] [ 42.023283] Call Trace: [ 42.023435] [c000000004c4f7f0] [d00000000108e168] __get_metapage+0x178/0x650 [jfs] (unreliable) [ 42.023630] [c000000004c4f8d0] [d0000000010894e0] dtSearch+0x4c0/0xa20 [jfs] [ 42.023737] [c000000004c4f9e0] [d000000001073b68] jfs_lookup+0x88/0x100 [jfs] [ 42.024132] [c000000004c4fb10] [c0000000002f4924] lookup_real+0x64/0xe0 [ 42.024216] [c000000004c4fb50] [c0000000002fb3e4] do_last+0x9f4/0xff0 [ 42.024289] [c000000004c4fc10] [c0000000002fbbfc] path_openat+0xcc/0x3c0 [ 42.024361] [c000000004c4fc90] [c0000000002fdb1c] do_filp_open+0xfc/0x170 [ 42.024433] [c000000004c4fdb0] [c0000000002e4310] do_sys_open+0x1c0/0x3b0 [ 42.024569] [c000000004c4fe30] [c000000000009204] system_call+0x38/0xb4 [ 42.024685] Instruction dump: [ 42.024947] f91f0020 f93f0028 fbdf0030 fb9f0038 e93d0000 7927afe3 418203fc ebdd0030 [ 42.025154] 41920034 e93d0008 e95f0038 811e0000 <e9290000> 39080001 81290090 911e0000 [ 42.025744] ---[ end trace 054e73e40709cbff ]---
I'm able to reproduce the OOPS by booting a Xenial VM with root on JFS:
[ 42.018954] Unable to handle kernel paging request for data at address 0x00000000 iscsi autofs4 jfs btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ibmvscsi ME,IR,DR, RI,LE> CR: 48048844 XER: 00000000 0x1dc/0x650 [jfs] 0x178/0x650 [jfs] 0x178/0x650 [jfs] (unreliable) 0x4c0/0xa20 [jfs] 0x88/0x100 [jfs] real+0x64/ 0xe0 0xcc/0x3c0 open+0xfc/ 0x170 open+0x1c0/ 0x3b0 call+0x38/ 0xb4
[ 42.019098] Faulting instruction address: 0xd00000000108e1cc
[ 42.019501] Oops: Kernel access of bad area, sig: 11 [#1]
[ 42.019611] SMP NR_CPUS=2048 NUMA pSeries
[ 42.020320] Modules linked in: iscsi_tcp(+) libiscsi_tcp libiscsi scsi_transport_
[ 42.021106] CPU: 0 PID: 1067 Comm: ureadahead Not tainted 4.4.0-96-generic #119-Ubuntu
[ 42.021285] task: c00000000474e7b0 ti: c000000004c4c000 task.ti: c000000004c4c000
[ 42.021361] NIP: d00000000108e1cc LR: d00000000108e168 CTR: c0000000001196c0
[ 42.021425] REGS: c000000004c4f570 TRAP: 0300 Not tainted (4.4.0-96-generic)
[ 42.021475] MSR: 8000000000009033 <SF,EE,
[ 42.021738] CFAR: c000000000008468 DAR: 0000000000000000 DSISR: 40000000 SOFTE: 1
GPR00: d00000000108e168 c000000004c4f7f0 d0000000010a90d0 c00000003ec8f658
GPR04: d00000000109fba0 d0000000010a2e58 0000000000005aca 0000000000000001
GPR08: 0000000000000000 0000000000000000 0000000000168660 d00000000109aad8
GPR12: c0000000001196c0 c00000000fb40000 0000000000000009 0000000000000000
GPR16: c00000003793ac20 c00000003793ab08 0000000000000000 c00000003793ad48
GPR20: c000000004c4fae0 c00000003a8059fe c000000004d06800 c000000004c4fa00
GPR24: 0000000000168660 0000000000001000 0000000000000000 d0000000010a2e38
GPR28: 0000000000168660 f00000000000d840 c000000004428e80 c00000003ec8f618
[ 42.023072] NIP [d00000000108e1cc] __get_metapage+
[ 42.023171] LR [d00000000108e168] __get_metapage+
[ 42.023283] Call Trace:
[ 42.023435] [c000000004c4f7f0] [d00000000108e168] __get_metapage+
[ 42.023630] [c000000004c4f8d0] [d0000000010894e0] dtSearch+
[ 42.023737] [c000000004c4f9e0] [d000000001073b68] jfs_lookup+
[ 42.024132] [c000000004c4fb10] [c0000000002f4924] lookup_
[ 42.024216] [c000000004c4fb50] [c0000000002fb3e4] do_last+0x9f4/0xff0
[ 42.024289] [c000000004c4fc10] [c0000000002fbbfc] path_openat+
[ 42.024361] [c000000004c4fc90] [c0000000002fdb1c] do_filp_
[ 42.024433] [c000000004c4fdb0] [c0000000002e4310] do_sys_
[ 42.024569] [c000000004c4fe30] [c000000000009204] system_
[ 42.024685] Instruction dump:
[ 42.024947] f91f0020 f93f0028 fbdf0030 fb9f0038 e93d0000 7927afe3 418203fc ebdd0030
[ 42.025154] 41920034 e93d0008 e95f0038 811e0000 <e9290000> 39080001 81290090 911e0000
[ 42.025744] ---[ end trace 054e73e40709cbff ]---