This bug has been copied from bug #700565 and has been proposed to be backported to 5.6 z-stream (EUS).
in kernel-2.6.18-238.20.1.el5 xen-fix-x86_emulate-handling-of-imul-with-immediate-operands.patch
Verified with kernel-xen-2.6.18-238.20.1.el5. The 32 bit HVM guest works well after 100+ times of rebooting testing on the host which can reproduce the original issue (by ~10 times of guest rebooting). So change this bug to VERIFIED.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-1163.html
Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: A bug was found in the way the x86_emulate() function handled the IMUL instruction in the Xen hypervisor. On systems without support for hardware assisted paging (HAP), such as those running CPUs that do not have support for (or those that have it disabled) Intel Extended Page Tables (EPT) or AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), this bug could cause fully-virtualized guests to crash or lead to silent memory corruption. In reported cases, this issue occurred when booting fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups enabled.
Technical note updated. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. Diffed Contents: @@ -1,9 +1,2 @@ -A bug was found in the way the x86_emulate() function handled the IMUL +A bug was found in the way the x86_emulate() function handled the IMUL instruction in the Xen hypervisor. On systems that have no support for hardware assisted paging (such as those running CPUs that do not have support -instruction in the Xen hypervisor. On systems without support for hardware +for Intel Extended Page Tables or AMD Rapid Virtualization Indexing), or have it disabled, this bug could cause fully-virtualized guests to crash or lead to silent memory corruption. In reported cases, this issue occurred when booting fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups enabled.-assisted paging (HAP), such as those running CPUs that do not have support -for (or those that have it disabled) Intel Extended Page Tables (EPT) or -AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), this bug -could cause fully-virtualized guests to crash or lead to silent memory -corruption. In reported cases, this issue occurred when booting -fully-virtualized Red Hat Enterprise Linux 6.1 guests with memory cgroups -enabled.