Some info we have gotten through the partner network, you question is answered further down:
Here is the VMware article:
http://kb.vmware.com/kb/2090639
Briefly, the issue is described as follows:
During vStorage API for Data Protection (VADP) style backups of VMware VMs, when incremental backups are desired the NetBackup “BLIB” option is selected. NetBackup then automatically enables the CBT mechanism for all protected VMs. If any protected VMDK(s) is extended in size past the 128GB boundary (or any power of 2 above that – e.g. 256GB, 512GB, 1024GB) after CBT is enabled, the CBT mechanism becomes corrupt. Subsequent backups of the impacted VMs won’t accurately backup the correct (in-use) blocks of data. In many cases this is exclusively extra data (blocks) but in some cases backups can miss blocks that are actually in use. Either data within the restored VM will be corrupt or the restored VM will fail to boot.
VMware has indicated that they plan on providing a fix for all currently supported versions of ESXi. VMware has not yet announced the exact nature of this fix or exactly when this fix will become available but indications are that VMware will provide this fix in the next VMware “update” release.
Some additional information:
Q: Does this issue apply if the VMDK is extended more than 128GB?
A: Yes. This issue does not necessarily impact all VMs. The issue only occurs if a VMDK is extended past the 128GB boundary (e.g. 120GB resized to 130GB) or any power of 2 above 128.
Q: Does this issue apply if my VMDK is already larger than 128GB?
A: No. The initial size of the VMDK does not matter. What matters is if the VMDK is extended beyond the affected limits after it is initially configured and CBT has been enabled.
Q: Is this issued caused by a NetBackup bug?
A: No. This is not a NetBackup bug. This is a VMware bug. Any vendor that uses VMware’s VADP for backups can be impacted by this issue.
Q: Why doesn’t NetBackup provide a fix for this?
A: NetBackup engineering has determined that there is no way a backup vendor can provide a reliable solution that covers every contingency configuration. We’ve studied competitor workarounds for this. Their solutions cover some use cases but there are still configurations where their solutions will not accurately detect and fix the issue and, in our opinion, give the user a false sense of security. We have determined that VMware must provide a fix for this. VMware agrees with this assessment.
Q: What should I tell my customer if they request an immediate solution?
A: The only solution that will insure that this issue is fixed for every VM is to manually disable CBT. This can be performed from within the vSphere interface or a PowerCLI script can be written to do this. Once CBT is disabled, NetBackup will automatically re-enable CBT during the next scheduled backup.
Q: My customer is using NetBackup Accelerator for VMware. Will running a backup enabling the “forced rescan” option take care of this issue?
A: No. Enabling “forced rescan” will not reset or disable CBT. CBT must be manually disabled.
Q: Is there a way I can test to determine if previous backups are corrupt?
A: Instant Recovery for VMware (IRV) can be used to test if the VM image is bootable. However, this will not detect if there is corruption of data inside the VM.
Q: If CBT is reset, will I ever encounter this issue again?
A: Yes. It is possible that this issue can subsequently occur after CBT is reset. If after the CBT reset the VMDK is extended past one of the affected boundaries, CBT can once again become corrupt mandating that CBT once again be reset.
Q: Will disabling CBT force a full backup of my VMs?
A: Yes. You customer should be aware that once CBT is disabled, the next backup run will force a full backup. All of the data within the VM will be backed up regardless of whether the backup schedule is a differential, cumulative or full backup schedule.
Q: Does my customer need to log a call with VMware regarding this issue?
A: We recommend that your customer does log a call with VMware. We’ve discussed this issue with VMware and have indicated that this has the potential of creating a significant data loss scenario. Having your customer log a call with VMware will reinforce our stance on this.