HF46392069

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Rev A

07 Feb 2019

HF46392069 Release Notes

Hot Fix for CCS Network Drivers and Software

Contents
1 About this Hot Fix.................................................................................................................................. 2
1.1 New in this Hot Fix ........................................................................................................................ 2
1.2 Supersedes .................................................................................................................................... 2
2 Installation ............................................................................................................................................ 2
2.1 Hot Fix Launch Conditions ............................................................................................................ 2
2.2 Pre-Installation Preparation .......................................................................................................... 3
2.3 Installation of Hot Fix on Workstation .......................................................................................... 4
2.3.1 To Install ................................................................................................................................ 4
2.3.2 To Uninstall ........................................................................................................................... 4
3 Deliverables Affected by this Hot Fix .................................................................................................... 5
4 Product Updates ................................................................................................................................... 5
4.1 Promiscuous Mode ....................................................................................................................... 5
4.2 NIC Selection on Virtual Machines (VMs) ..................................................................................... 6
4.3 Address Resolution Protocol (ARP) Table ..................................................................................... 6
4.4 Hosts Files ..................................................................................................................................... 6
5 Known Issues and Product Limitations ................................................................................................. 6
6 Appendix A ............................................................................................................................................ 6
7 Who to Contact if you Need Assistance.............................................................................................. 10

1|Page
Rev A
07 Feb 2019

1 About this Hot Fix


Release Date: February 2019

This Hot Fix makes the latest network drivers and software changes available for I/A Series
version 8.8, and Control Core Services versions 9.0 through 9.4.

In addition to the specific fixes addressed in this document, these changes include:

• memory hardening to prevent BSOD crashes from use-after-free errors in 3rd party
drivers,
• stability enhancements for startup and shutdown, and
• performance improvements.

For these reasons, it is recommended that all customers upgrade to this hot fix.

1.1 New in this Hot Fix


Schneider Reference ID Issue
Case 46392069 AIM Historian AW’s Mesh NICs went into a mode where they were
broadcasting but not listening to replies.
Case 46931214 All of a V91's VM AW images became islanded when the backup root
switch failed, although another V91's VMs were fine.
Case 49923886 There is a bug in the V9.4 Day 1 regarding the ARP cache.
Case 44389460 The hosts file is empty after a CCS 9.3 installation when ENS is
installed on the station.
Case 49579915 When McAfee ENS is installed on a I/A station at V8.8 or V9.0, the
Firewall will prevent a Day 0 or Day 1 from updating the "hosts" or
"lmhosts" file.
Case 55483407 After a Day 1 installation, AWs will not communicate to new CPs for
Image Updates, Self-Hosting, etc. (any IP communication).

1.2 Supersedes
QF1302226C

2 Installation
2.1 Hot Fix Launch Conditions
This Hot Fix only applies to the following stations

• Stations with I/A Series 8.8 or CCS 9.0 to 9.4

WARNING: This Hot Fix should not be installed on any other station except as described above.

2|Page
Rev A
07 Feb 2019

2.2 Pre-Installation Preparation


HF52792031 must be installed before this Hot Fix. The Release Notes of HF52792031 documents
Microsoft Windows updates that must be applied on Windows 7 and Windows Server 2008 R2.
HF52792031 installs the latest Schneider Electric code signing certificates on all platforms.

⚠ WARNING ⚠
If the updates are not applied or the certificates are not installed, Windows will not recognize
the digital signatures on the drivers, silently refuse to load them, and put the workstation into
a reboot loop.

If QF1250552 or QF1259689 are present on the workstation (review QF_INFO file for currently
installed fixes), installing this Hot Fix install will produce the “WARNING: There are file version
conflicts…”

To prevent the warning, move RestoreQuickFixFiles.exe and StoreQuickFixFiles.exe from


D:\usr\fox\system32 to the desktop before installing this Hot Fix. After installing the Hot Fix,
rename RestoreQuickFixFiles.exe to RestoreQuickFixFiles.exe.old, rename StoreQuickFixFiles.exe
to StoreQuickFixFiles.exe.old, and move the two files from the desktop back to
D:\usr\fox\system32.

(You may also click the checkbox to Overwrite existing files, then Install with no loss of
functionality.)

3|Page
Rev A
07 Feb 2019

2.3 Installation of Hot Fix on Workstation


Install Notes:

For a secure workstation that has I/A Series 8.8 or CCS 9.0 to 9.4 installed, you need to be
logged in as a member of 'IA Plant Maintenance' to install this Hot Fix.

For a Secure workstation that has I/A Series 8.8 installed, do not logon and install the Hot Fix
with user accounts 'IAInstaller' or 'IADomainadmin'.

2.3.1 To Install
Note that a reboot of the workstation will be required to complete the install.

1 Copy the file HF46392069.msi included as part of this Hot Fix to removable media.
2 Insert the media into the target workstation.
3 Open Windows Explorer and navigate to the location of the Hot Fix installer:
HF46392069.msi.
4 Verify that HF52792031 is installed on the target workstation. Refer to Appendix A.
5 Double-click HF46392069.msi to launch the Hot Fix installer. If the User Account
Control dialog references Publisher: Unknown instead of Verified Publisher: Schneider
Electric, HF52792031 has not been installed.
6 Follow the on-screen prompts to complete the Hot Fix installation.
7 Check QF_INFO file in /usr/fox/sp/lastinst for Controlled Distribution entry. Or, from
the Control Panel, double click 'Add or Remove Programs' on Windows XP/Server 2003
or 'Programs and Features' on Windows 7/Server 2008 and verify that the Controlled
Distribution was installed.
8 Checksums of files (identified in section 4) should be verified after installation.

2.3.2 To Uninstall
Note that a reboot of the workstation will be required to complete the uninstall.

On workstations running I/A Series 8.8 or CCS 9.0 to 9.3, the host files must be manually edited
before uninstalling the Hot Fix:

1. Open C:\Windows\System32\drivers\etc\hosts with a text editor Run as administrator


2. Replace the two instances of “Foxboro hosts” with “I/A hosts”
3. Repeat steps 1 and 2 for C:\Windows\System32\drivers\etc\lmhosts

To uninstall the Hot Fix:

1. Open the Windows Control Panel.


2. In the Control Panel double click 'Add or Remove Programs' on Windows XP/Server 2003
or 'Programs and Features' on Windows 7/Server 2008.
3. Select Foxboro HF46392069
4. With the Hot Fix selected, click the 'Remove' or ‘Uninstall’ button.
5. Follow the on-screen prompts to complete the Hot Fix uninstall.

4|Page
Rev A
07 Feb 2019

3 Deliverables Affected by this Hot Fix


File Name Location File Version Checksum
arp_cfg.bat D:\usr\fox\exten n/a 10316 1
ccsc.exe D:\usr\fox\exten 1.1.115.0 46196 33
cfgarp.awk D:\usr\fox\exten n/a 9779 1
post_nt.ksh D:\usr\fox\swi n/a 20384 31
WriteHosts.exe D:\usr\fox\swi 1.1.105.0 19628 36
parse.dll D:\usr\fox\system32 1.3.576.0 6678 31
RestoreQuickFixFiles.exe D:\usr\fox\system32 1.1.41.0 47469 34
StoreQuickFixFiles.exe D:\usr\fox\system32 1.2.41.0 3839 40
swi_util.dll D:\usr\fox\system32 5.2.576.0 13312 44
swi_util64.dll D:\usr\fox\system32 5.2.576.0 43641 55
verifier.exe D:\usr\local 1.4.576.0 5452 52
foxboro.cat C:\Drivers\Schneider Electric n/a 15815 19
foxboro.inf C:\Drivers\Schneider Electric n/a 48546 12
foxboro.sys C:\Drivers\Schneider Electric 9.5.84.0 25487 349
mesh_netcfg.exe C:\Drivers\Schneider Electric 9.12.110.0 48452 133
redl.cat C:\Drivers\Schneider Electric n/a 5708 18
redl.sys C:\Drivers\Schneider Electric 2.8.91.0 20582 236
Redl_Miniport.inf C:\Drivers\Schneider Electric n/a 31676 5
Redl_Protocol.inf C:\Drivers\Schneider Electric n/a 58547 6
redlnotify.cat C:\Drivers\Schneider Electric n/a 34223 20
RedlNotify.dll C:\Drivers\Schneider Electric 2.0.91.0 13718 269
RedlNotify.dll C:\windows\system32 2.0.91.0 13718 269
foxboro.sys C:\windows\system32\drivers 9.5.84.0 25487 349
redl.sys C:\windows\system32\drivers 2.8.91.0 20582 236

4 Product Updates
4.1 Promiscuous Mode
Indication: The Redundant Ethernet Data Link (REDL) driver was passing uninitialized data in
asynchronous requests to the Mesh NICs. Requests to place a NIC into promiscuous mode failed
when there was non-zero data in one of the fields.

If REDL has selected the “B” NIC but failed to put the NIC into promiscuous mode, the station
will be able to receive multicasts, but not unicast packets.

Solution: Initialize all fields in asynchronous requests. This ensures both Mesh NICs are in
promiscuous mode for redundant operation.

Schneider Reference ID: Case 46392069

5|Page
Rev A
07 Feb 2019

4.2 NIC Selection on Virtual Machines (VMs)


Indication: When a Mesh NIC isn’t in promiscuous mode the problem is exacerbated on VMs,
which can’t detect the link state of their host NICs.

Solution: Update REDL’s port recovery logic: if a NIC has never received a packet from a
controller (including broadcast or flooded packets not addressed specifically to the VM), don’t
use that NIC for network communications; only use it for diagnostics.

When this logic is combined with the promiscuous mode fix, we have not been able to
reproduce VM islanding issue.

Schneider Reference ID: Case 46931214

4.3 Address Resolution Protocol (ARP) Table


Indication: When performing a Day 1 on CCS 9.4, the ARP table is not updated with the latest
addresses in the commit files.

Solution: In CCS 9.4, the location of the Mesh Configurator (which maintains the ARP table)
moved from C:\Drivers\Invensys to C:\Drivers\Schneider Electric. Update the logic invoked
during a Day 1 to reflect this new location.

Schneider Reference ID: Case 49923886, Case 55483407

4.4 Hosts Files


Indication: The McAfee ENS firewall module can prevent access to the
C:\Windows\System32\drivers\etc\hosts and C:\Windows\System32\drivers\etc\lmhosts files,
even when the module is disabled.

Solution: Use a digitally signed executable to update the host files, instead of a script.

Schneider Reference ID: Case 44389460, Case 49579915

5 Known Issues and Product Limitations


None.

6 Appendix A

Verifying Installation of Required Microsoft Windows Updates and the Latest Schneider
Electric Code Signing Certificates

To verify the required Microsoft Windows updates have been installed:

1. Right-click HF46392069.msi included as part of this Hot Fix and select Properties.

6|Page
Rev A
07 Feb 2019

2. From the Properties panel, click the Digital Signatures tab. Select “Schneider Electric…”
from the Signature list and click Details
3. The Digital Signature Information should show “This digital signature is OK.” If it shows
any other value, the required updates have not been installed.

Expected Digital Signature Details:

7|Page
Rev A
07 Feb 2019

Invalid Digital Signature Details:

The above dialog indicates the required updates have not been installed. First install
HF52792031.

To verify the latest Schneider Electric code signing certificates have been installed, install this
Hot Fix normally, but confirm the User Account Control dialog shows a Verified publisher of
Schneider Electric. If it shows any other value, the required certificates have not been installed.

8|Page
Rev A
07 Feb 2019

Expected User Account Control dialog:

Invalid User Account Control dialog:

The above dialog indicates the required certificates have not been installed. Click No
and stop installation of the Hot Fix. First install HF52792031.

9|Page
Rev A
07 Feb 2019

7 Who to Contact if you Need Assistance


If you have any questions regarding this Hot Fix, please contact your local Service Representative or the
Schneider Electric Support Center at:

GCS Center Americas GCS Asia Pacific GCS EMEA GCS


Location Foxboro MA USA Shanghai CN Baarn NL
Phone +1 866 746 6477 +86 400 810 1315 +31-3554-84125
International +1 508 549 2424 +86 21 3718 0086
Fax +1 508 549 4999 +86 21 3718 0199 +31-3554-84230
Email Americas GCS Asia Pacific GCS EMEA GCS

10 | P a g e

You might also like