Is there a Dr. Watson in the house? - Veritas Backup Exec

This is a discussion on Is there a Dr. Watson in the house? - Veritas Backup Exec ; Hi Folks, I really hope someone here can be of assistance. I am running Backup Exec 8.5 on a Dell PE4300 with a DLT1 tape drive. Everything up until two days ago was great (except that my backups were working ...

+ Reply to Thread
Results 1 to 3 of 3

Thread: Is there a Dr. Watson in the house?

  1. Is there a Dr. Watson in the house?

    Hi Folks,
    I really hope someone here can be of assistance. I am running Backup
    Exec 8.5 on a Dell PE4300 with a DLT1 tape drive. Everything up until two
    days ago was great (except that my backups were working but not completing
    until I responded to the popup alerts, but that's not why I'm here)
    Everything was great until two days ago when I modified my backup
    selections. The next morning, I came in to check the success of my backup
    and upon opening Backup Exec, at the point just past the flash screen, it
    dies on me and gives me the ol' Dr. Watson. I cannot get into BE anymore. I
    check the logs and it appears it is still backup up. Anyway, I attempted to
    re-install the software, with no luck. Anyone have any suggestions. My next
    step is un-installing and re-installing. But I'd like to avoid that. Here is
    a piece of the Dr. Watson Log.

    Your help is much appreciated!!!!

    Application exception occurred:
    App: exe\BkupExec.dbg (pid=324)
    When: 8/31/2001 @ 8:57:8.421
    Exception number: c0000005 (access violation)

    *----> System Information <----*
    Computer Name: NTSERVER2
    User Name: Administrator
    Number of Processors: 2
    Processor Type: x86 Family 6 Model 7 Stepping 3
    Windows Version: 4.0
    Current Build: 1381
    Service Pack: 5
    Current Type: Multiprocessor Free
    Registered Organization: Kaestle Boos Associates, Inc.
    Registered Owner: N/A

    *----> Task List <----*
    0 Idle.exe
    2 System.exe
    25 SMSS.exe
    33 CSRSS.exe
    39 WINLOGON.exe
    45 SERVICES.exe
    48 LSASS.exe
    73 SPOOLSS.exe
    100 benser.exe
    109 LLSSRV.exe
    113 SFMSVC.exe
    117 SFMPRINT.exe
    139 NPSSVC.exe
    146 LOCATOR.exe
    156 RPCSS.exe
    159 TCPSVCS.exe
    163 ScUserAgent.exe
    170 pvlsvr.exe
    176 nsvr.exe
    182 DkService.exe
    190 DNS.exe
    199 inetinfo.exe
    203 PSTORES.exe
    206 mstask.exe
    231 alertserver.exe
    259 beserver.exe
    76 bengine.exe
    306 benetns.exe
    220 NDDEAGNT.exe
    335 EXPLORER.exe
    346 LOADWC.exe
    350 PROMon.exe
    324 bkupexec.exe
    351 DRWTSN32.exe
    0 _Total.exe

    (00400000 - 00731000) exe\BkupExec.dbg
    (77f60000 - 77fbe000) dll\ntdll.dbg
    (10000000 - 10000000)
    (00230000 - 00230000)
    (77f00000 - 77f5e000) dll\kernel32.dbg
    (5f400000 - 5f4f2000)
    (78000000 - 78040000)
    (77ed0000 - 77efc000) dll\gdi32.dbg
    (77e70000 - 77ec4000) dll\user32.dbg
    (77dc0000 - 77dff000) dll\advapi32.dbg
    (77e10000 - 77e67000) dll\rpcrt4.dbg
    (77c00000 - 77c18000) drv\winspool.dbg
    (71590000 - 71617000) COMCTL32.dbg
    (77930000 - 77951000) dll\oledlg.dbg
    (77b20000 - 77bd6000) dll\ole32.dbg
    (65340000 - 653d2000) oleaut32.dbg
    (03900000 - 0390d000) dll\shuie.dbg
    (01200000 - 01213000) dll\bebsdu.dbg
    (01400000 - 0144e000) dll\beclass.dbg
    (776d0000 - 776d8000) dll\wsock32.dbg
    (776b0000 - 776c4000) dll\ws2_32.dbg
    (776a0000 - 776a7000) dll\ws2help.dbg
    (77670000 - 77685000) dll\mswsock.dbg
    (77720000 - 77731000) dll\mpr.dbg
    (77800000 - 7783a000) dll\netapi32.dbg
    (77840000 - 77849000) dll\NetRap.dbg
    (777e0000 - 777ed000) dll\samlib.dbg
    (77a90000 - 77a9b000) dll\version.dbg
    (77c40000 - 77d7c000) dll\shell32.dbg
    (779c0000 - 779c8000) dll\lz32.dbg
    (780c0000 - 78121000)
    (02e00000 - 02e0b000) dll\bestdutl.dbg
    (01600000 - 0160f000) dll\bedscomn.dbg
    (02600000 - 02607000) dll\benetapi.dbg
    (02a00000 - 02a05000) dll\benetutl.dbg
    (01100000 - 01107000) dll\ansapi.dbg
    (5f000000 - 5f011000)
    (5f800000 - 5f8f2000)
    (77d80000 - 77db2000) dll\comdlg32.dbg
    (77bf0000 - 77bf7000) dll\rpcltc1.dbg
    (71190000 - 71197000) dll\msidle.dbg
    (03a00000 - 03ab8000) ocx\storex.dbg
    (1f700000 - 1f735000) dll\ODBC32.dbg
    (1f7f0000 - 1f804000) dll\ODBCINT.dbg
    (5f300000 - 5f329000) olepro32.dbg
    (01300000 - 0135b000) dll\BeCatDrv.dbg

    State Dump for Thread Id 0x140

    eax=a000a10f ebx=00000020 ecx=f0e97cf8 edx=f0e97f04 esi=01010049
    edi=00000020
    eip=77ed3802 esp=0012f3f8 ebp=0012f868 iopl=0 nv up ei pl zr na po
    nc
    cs=001b ss=0023 ds=7cf0 es=f658 fs=0038 gs=f703
    efl=00000246


    function: CreateCompatibleBitmap
    77ed37e5 51 push ecx
    77ed37e6 56 push esi
    77ed37e7 e8fe680000 call CreateDIBSection (77eda0ea)
    77ed37ec eb95 jmp CreateCompatibleBitmap+0x78
    (77ed3783)
    77ed37ee 6a12 push 0x12
    77ed37f0 e8000e0000 call GetStockObject (77ed45f5)
    77ed37f5 eb8c jmp CreateCompatibleBitmap+0x78
    (77ed3783)
    77ed37f7 b811100000 mov eax,0x1011
    77ed37fc 8d542404 lea edx,[esp+0x4]
    ss:0138ddff=????????
    77ed3800 cd2e int 2e
    77ed3802 c20c00 ret 0xc

    *----> Stack Back Trace <----*

    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    0012f868 77e78d7e 01010049 00000020 00000020 00000020
    gdi32!CreateCompatibleBitmap
    0012f89c 77e79323 00000020 00000020 00000001 00000008 user32!GetMenu
    0012f8e4 77e79573 00000020 00000020 00000001 00000008 user32!ChangeMenuA
    0012f92c 77e7e6b0 001578d0 00000000 00000000 00000000 user32!ChangeMenuA
    0012f958 77e9c394 130502b2 00000000 00000000 00000000 user32!DrawIconEx
    0012f9fc 7159c9f6 0012fa14 0012fd9c 0012fd9c 004bce02
    user32!CreateIconIndirect
    0012fa3c 004bcf00 00154a38 00000004 00000000 00000000
    COMCTL32!ImageList_GetIcon
    0012fad4 00525b4f 00000005 5f801bdf 0012fd9c 0012fd9c BkupExec!
    (FPO: [0,34,2])
    0012fb54 5f801914 0000000f 00000000 00419dc0 0012fb70 BkupExec!
    0012fb74 5f80189d 0000000f 00000000 00000000 009be380 !Ordinal6370
    0012fbd4 5f801825 00000000 000101b0 0000000f 00000000 !Ordinal1108
    0012fbf0 5f8017e4 000101b0 0000000f 00000000 00000000 !Ordinal1571
    0012fc1c 77e719d0 000101b0 0000000f 00000000 00000000 !Ordinal1572
    0012fc34 77e71982 009be380 0000000f 00000000 00000000 user32!OffsetRect
    0012fc60 77f763a3 0012fc70 00000018 009be380 0000000f user32!OffsetRect
    005569e4 00000000 0257c1f6 000001d5 00000110 00000000
    ntdll!KiUserCallbackDispatcher
    00000000 00000000 00000000 00000000 00000000 00000000 BkupExec!

    *----> Raw Stack Dump <----*
    0012f3f8 83 37 ed 77 49 00 01 01 - 20 00 00 00 20 00 00 00 .7.wI... ...
    ....
    0012f408 08 00 00 00 49 00 01 01 - 20 81 15 00 83 37 ed 77 ....I...
    .....7.w
    0012f418 48 00 01 01 20 00 00 00 - 20 00 00 00 20 00 00 00 H... ... ...
    ....
    0012f428 00 00 00 00 48 00 01 01 - 01 00 00 00 01 00 00 00
    .....H...........
    0012f438 00 00 00 00 00 00 00 00 - b0 01 01 00 34 fd 12 00
    .............4...
    0012f448 2c 0b 00 00 00 00 40 00 - 01 00 00 00 01 00 6f 00
    ,.....@.......o.
    0012f458 01 00 00 00 48 f4 12 00 - 34 fd 12 00 2c f5 12 00
    .....H...4...,...
    0012f468 a4 1f f9 77 a0 f4 12 00 - 50 06 13 00 f1 e4 f8 77
    ....w....P......w
    0012f478 00 00 13 00 03 00 00 00 - 50 06 13 00 00 00 00 00
    .........P.......
    0012f488 78 f4 12 00 7a 01 02 00 - a0 f5 12 00 a4 1f f9 77
    x...z..........w
    0012f498 40 d8 f9 77 00 00 00 00 - a0 0f 00 00 38 04 00 00
    @..w........8...
    0012f4a8 56 09 00 00 20 00 00 00 - 00 f9 12 00 8d 96 e7 77 V...
    ...........w
    0012f4b8 00 00 13 00 00 00 00 00 - 2c 04 00 00 00 00 00 00
    .........,.......
    0012f4c8 b2 02 05 13 d0 78 15 00 - 00 00 00 00 4e 00 00 00
    ......x......N...
    0012f4d8 f8 ff 00 00 d4 1f 80 5f - f0 1d 77 00 50 2c 76 00
    ........_..w.P,v.
    0012f4e8 00 00 00 00 08 f5 12 00 - ac 2b 80 5f 0f 00 00 00
    ..........+._....
    0012f4f8 d0 07 3f 01 06 00 00 00 - 48 a7 14 00 00 00 00 00
    ...?.....H.......
    0012f508 00 00 00 00 00 00 00 00 - 00 00 00 00 48 f6 12 00
    .............H...
    0012f518 71 22 ed 77 d0 07 3f 01 - 48 a7 14 00 70 f6 12 00
    q".w..?.H...p...
    0012f528 06 00 00 00 87 22 ed 77 - d0 67 ef 77 06 00 00 00
    ......".w.g.w....

    State Dump for Thread Id 0x160

    eax=01417950 ebx=00000000 ecx=77f6b686 edx=00000000 esi=000000d0
    edi=00000000
    eip=77f6829b esp=021eff6c ebp=021eff90 iopl=0 nv up ei pl zr na po
    nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
    efl=00000246


    function: NtWaitForSingleObject
    77f68290 b8c5000000 mov eax,0xc5
    77f68295 8d542404 lea edx,[esp+0x4]
    ss:0344e973=????????
    77f68299 cd2e int 2e
    77f6829b c20c00 ret 0xc
    77f6829e 8bc0 mov eax,eax

    *----> Stack Back Trace <----*

    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    021eff90 77f04f41 000000d0 ffffffff 00000000 01417982
    ntdll!NtWaitForSingleObject
    021effec 00000000 01417950 00763170 00000000 ffffffff
    kernel32!WaitForSingleObject
    00000000 00000000 00000000 00000000 00000000 00000000 BkupExec!

    *----> Raw Stack Dump <----*
    021eff6c bc cc f1 77 d0 00 00 00 - 00 00 00 00 00 00 00 00
    ....w............
    021eff7c 70 31 76 00 d0 00 00 00 - 32 4f f0 77 00 00 00 00
    p1v.....2O.w....
    021eff8c 02 00 18 00 ec ff 1e 02 - 41 4f f0 77 d0 00 00 00
    .........AO.w....
    021eff9c ff ff ff ff 00 00 00 00 - 82 79 41 01 d0 00 00 00
    ..........yA.....
    021effac ff ff ff ff 38 ee 12 00 - 4d b4 f6 77 70 31 76 00
    .....8...M..wp1v.
    021effbc e8 4e f0 77 70 31 76 00 - 38 ee 12 00 4d b4 f6 77
    ..N.wp1v.8...M..w
    021effcc 70 31 76 00 4d b4 f6 77 - c4 ff 1e 02 d0 ed 12 00
    p1v.M..w........
    021effdc ff ff ff ff 44 b7 f3 77 - 38 d2 f3 77 00 00 00 00
    .....D..w8..w....
    021effec 00 00 00 00 00 00 00 00 - 50 79 41 01 70 31 76 00
    .........PyA.p1v.
    021efffc 00 00 00 00 ff ff ff ff - ff ff ff ff 00 00 00 00
    .................
    021f000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
    .................
    021f001c 00 00 00 00 ff 88 88 88 - 88 88 88 ff 00 00 00 00
    .................
    021f002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
    .................
    021f003c 00 00 00 00 f8 88 88 88 - 88 88 88 ff 00 00 00 00
    .................
    021f004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
    .................
    021f005c 00 00 00 00 f8 f7 f7 f7 - f7 f7 88 ff 00 00 00 00
    .................
    021f006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
    .................
    021f007c 00 00 00 00 f8 7f 8f 7f - 7f 7f 88 ff 00 00 00 00
    .................
    021f008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
    .................
    021f009c 00 00 00 00 f8 f8 88 f7 - f7 f7 88 ff 00 00 00 00
    .................

    State Dump for Thread Id 0x16c

    eax=77e167ce ebx=00000000 ecx=00130fe0 edx=00000000 esi=00147b08
    edi=00147c28
    eip=77f67f67 esp=0330fdf0 ebp=0330ff90 iopl=0 nv up ei pl nz na po
    nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
    efl=00000206


    function: ZwReplyWaitReceivePort
    77f67f5c b890000000 mov eax,0x90
    77f67f61 8d542404 lea edx,[esp+0x4]
    ss:0456e7f7=????????
    77f67f65 cd2e int 2e
    77f67f67 c21000 ret 0x10
    77f67f6a 8bc0 mov eax,eax

    *----> Stack Back Trace <----*

    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    0330ff90 77e15fa2 77e16821 00147b08 0330ffec 77f9d840
    ntdll!ZwReplyWaitReceivePort
    00003a98 00000000 00000000 00000000 00000000 00000000
    rpcrt4!NdrVaryingArrayFree

    State Dump for Thread Id 0x8d

    eax=00778000 ebx=00777ff8 ecx=00777ffc edx=0000ffff esi=00777e20
    edi=780015c8
    eip=780015d5 esp=00e7edc8 ebp=039084a8 iopl=0 nv up ei ng nz na po
    nc
    cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
    efl=00000286


    function: wcslen
    780015c8 8b4c2404 mov ecx,[esp+0x4]
    ss:020dd7cf=????????
    780015cc 66833900 cmp word ptr [ecx],0x0
    ds:00777ffc=ffff
    780015d0 8d4102 lea eax,[ecx+0x2]
    ds:019d6a02=????????
    780015d3 740a jz wcslen+0x17 (780015df)
    FAULT ->780015d5 668b10 mov dx,[eax]
    ds:00778000=????
    780015d8 40 inc eax
    780015d9 40 inc eax
    780015da 6685d2 test dx,dx
    780015dd 75f6 jnz wcslen+0xd (780015d5)
    780015df 2bc1 sub eax,ecx
    780015e1 d1f8 sar eax,1
    780015e3 48 dec eax
    780015e4 c3 ret

    *----> Stack Back Trace <----*

    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    039084a8 00000144 fedcba98 89abcdef 00000000 00000000 !wcslen

    *----> Raw Stack Dump <----*
    00e7edc8 c1 26 90 03 fc 7f 77 00 - f8 7f 77 00 f6 7f 77 00
    ..&....w...w...w.
    00e7edd8 f4 7f 77 00 f2 7f 77 00 - f0 7f 77 00 ee 7f 77 00
    ...w...w...w...w.
    00e7ede8 ec 7f 77 00 ea 7f 77 00 - e8 7f 77 00 e6 7f 77 00
    ...w...w...w...w.
    00e7edf8 e4 7f 77 00 e2 7f 77 00 - b4 7f 77 00 f4 7f 77 00
    ...w...w...w...w.
    00e7ee08 20 7e 77 00 2c 86 90 03 - 3c 29 90 03 20 7e 77 00 ~w.,...<)..
    ~w.
    00e7ee18 7e 03 00 00 84 04 00 00 - 30 b0 5e 00 00 3f e0 02
    ~.......0.^..?..
    00e7ee28 65 2e 90 03 a8 84 90 03 - 84 01 00 00 08 00 00 00
    e...............
    00e7ee38 32 00 00 00 44 2c 02 78 - 8f 68 f0 77 84 01 00 00
    2...D,.x.h.w....
    00e7ee48 0a 00 00 00 08 00 00 00 - 32 00 00 00 00 00 00 00
    .........2.......
    00e7ee58 d2 27 90 03 32 00 00 00 - a0 a5 75 00 bc fe e7 00
    ..'..2.....u.....
    00e7ee68 b8 2f 43 00 4f 1d 00 78 - a0 a5 75 00 01 00 00 00
    ../C.O..x..u.....
    00e7ee78 02 00 00 00 58 0b 8d 5f - 01 00 00 00 08 00 00 00
    .....X.._........
    00e7ee88 32 00 00 00 08 00 00 00 - 32 00 00 00 90 66 77 00
    2.......2....fw.
    00e7ee98 5c 00 5c 00 2e 00 00 00 - 00 00 00 00 00 00 00 00
    \.\.............
    00e7eea8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
    .................
    00e7eeb8 38 00 2e 00 35 00 30 00 - 00 00 00 00 00 00 00 00
    8...5.0.........
    00e7eec8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
    .................
    00e7eed8 00 00 00 00 00 00 00 00 - d1 07 06 00 02 00 1a 00
    .................
    00e7eee8 00 00 00 00 00 00 00 00 - 3c 00 00 00 fb ff ff ff
    .........<.......
    00e7eef8 03 00 00 00 6f 04 00 20 - 90 00 00 00 30 00 30 00 ....o..
    .....0.0.

    State Dump for Thread Id 0x15c

    eax=77e57210 ebx=00000000 ecx=0014b740 edx=00000000 esi=00f8ff3c
    edi=77f1cecd
    eip=77f678df esp=00f8ff28 ebp=00f8ff44 iopl=0 nv up ei pl nz na po
    nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
    efl=00000206


    function: NtDelayExecution
    77f678d4 b827000000 mov eax,0x27
    77f678d9 8d542404 lea edx,[esp+0x4]
    ss:021ee92f=????????
    77f678dd cd2e int 2e
    77f678df c20800 ret 0x8
    77f678e2 8bc0 mov eax,eax

    *----> Stack Back Trace <----*

    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    00f8ff44 77f1ced8 000003e8 00000000 0050e2e7 000003e8 ntdll!NtDelayExecution
    00f8ffb8 77f04ee8 00776ae0 00142868 00000004 00776ae0 kernel32!Sleep
    00f8ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW
    00000000 00000000 00000000 00000000 00000000 00000000 BkupExec!

    --
    Jim Bednarz - Asst. PC Systems Coordinator
    Kaestle Boos Associates, Inc.
    Web: www.kba-architects.com



  2. Re: Is there a Dr. Watson in the house?


    I wish I had the answer, because I am having the same problem.
    Please let me know how you resolved it.



  3. Re: Is there a Dr. Watson in the house?


    I fixed the problem on my system by deleting the scripts.uni file from the
    data directory. This caused me to re-create by backup selections, but everything
    else remained.

    "Jerome Staszewski" wrote:
    >
    >I wish I had the answer, because I am having the same problem.
    >Please let me know how you resolved it.
    >
    >



+ Reply to Thread