LabWindows/CVI

cancel
Showing results for 
Search instead for 
Did you mean: 

Physical Memory Access Functions with installed Security Update 5Q5FJ4QW

In my Labwindows-CVI (8.1.0) applications I use the Port-IO and Physical Memory Access Functions provided with the Utility Library to communicate directly to PCI devices. Up to now this works fine on about 50 different PCs using either only the CVI-Runtime or having different Labview or Labwindows versions installed.

 

Now I tried to install my software on a system with Labview 2011 installed. When starting my CVI-Program, it runs in a runtime-error and crashs. By searching in the Internet I found advices from NI about the Security Update 5Q5FJ4QW. In this paper NI wrote, that the functionallity of Physical Memory Access was eleminated with this update. The "UpdateValidator"-Software included in the NI paper showed me, that the appearence of this update is the reason for my software crash.

 

Here my questions:

  1.  Is it possible to do Physical Memory Accesses in another way, even on systems with the actual Labview or Labwindows runtime installed?
  2.  Is it possible to deactivate or deinstall the function of this update or the update (for example by replacing some files)?
  3.  How can I communicate directly from my CVI program to my PCI-hardware?

 

Thanks in advance for any hints to get my application running again

 

Willi

 

 

 

0 Kudos
Message 1 of 4
(3,383 Views)

Hello Willi,

 

According to this Knowledgebase:

 

Inwieweit betrifft mich das Sicherheits-Update 5Q5FJ4QW von National Instruments (NI)? (German)

 

http://digital.ni.com/public.nsf/allkb/3D3631A092D3033C8625793600572C90?OpenDocument

 

The only way of running your Applications without Runtime Errors (With the Patch installed) is to run with Administrator Privileges.

So i guess it would be best to try this Solution and run your Application with Administrator Privileges and not to try to Workaround the Patch.

 

You should be able to eather uninstall the Patch by replacing cvintdrv.sys with the unpatched Version.

Normal Windows Patches can also be deinstalled by using System Control.

 

Best Regards!

 

Moritz M.

0 Kudos
Message 2 of 4
(3,362 Views)

Hello Willi,

 

seems like i missed part of the KB, sorry about that.

 

Running your Application with Administrator Privileges wont help in this Case.

In fact using Functions that access physical Memory will always return Runtime Errors.

 

Due to security Vulnerabilitys caused by the unpatched Version of this driver,

we dont recommend to remove the patch or replace the driver with an older Version.

 

The only chance will be to write your own Version of this driver.

If you need help creating the driver i suggest to contact your local NI Branch for assistance.

 

Best Regards!

Moritz M.

 

0 Kudos
Message 3 of 4
(3,347 Views)

Hi,

 

To summerize the problem: Port-IO is only possible wtih admin privilieges.

 

To use Direct Memory Acces there are only two possiblities:

 

-Use a system wtih no NI-Software of any kind newer than the security patch from October 2011 and disable automatic updates.

 

-Write your own low level driver or look for already avialable ones

 

Sorry for the inconvenience,

 

Stefan Wimmer

 

Applications Engineer

National Instruments Germany

0 Kudos
Message 4 of 4
(3,317 Views)