Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Changed CSC binary examiner mask to enable ALCT CRC checks - CMSSW_10_2_X #24294

Merged

Conversation

barvic
Copy link
Contributor

@barvic barvic commented Aug 15, 2018

EventFilter/CSCRawToDigi - Changed CSC binary examiner mask to enable ALCT CRC checks.
It should prevent passing of corrupted (bad ALCT) CSC event data to main CSC data unpacking code.
Related to request from HLT group, which was investigating random HLT crashes in run 320917

@cmsbuild
Copy link
Contributor

cmsbuild commented Aug 15, 2018

A new Pull Request was created by @barvic (Victor Barashko) for CMSSW_10_2_X.

It involves the following packages:

EventFilter/CSCRawToDigi

@perrotta, @cmsbuild, @slava77 can you please review it and eventually sign? Thanks.
@Martin-Grunewald, @ptcox this is something you requested to watch as well.
@davidlange6, @slava77, @fabiocos you are the release manager for this.

cms-bot commands are listed here

@perrotta
Copy link
Contributor

please test

@cmsbuild
Copy link
Contributor

cmsbuild commented Aug 16, 2018

The tests are being triggered in jenkins.
https://cmssdt.cern.ch/jenkins/job/ib-any-integration/29883/console Started: 2018/08/16 16:37

@perrotta
Copy link
Contributor

backport of #24295

@perrotta
Copy link
Contributor

Thank you @barvic for the explanations you provided in #24295 (comment) .

About your last point [1], could you please elaborate here a bit more? If we merge this backport, we should understand whether any difference with the previous recorded data is expected, or if it is really only on the handling of corrupted data. Do you have any slide or presentation that explains what we should expect in detail?

[1]
"I don't expect effects on normal non-corrupted data. Only expected effect is additional unpacking rejection of corrupted data for this particular rare type of detected errors, which should be handled this way for the unpacking stability purposes initially".

@cmsbuild
Copy link
Contributor

@cmsbuild
Copy link
Contributor

Comparison job queued.

@cmsbuild
Copy link
Contributor

Comparison is ready
https://cmssdt.cern.ch/SDT/jenkins-artifacts/pull-request-integration/PR-24294/29883/summary.html

Comparison Summary:

  • No significant changes to the logs found
  • Reco comparison results: 4 differences found in the comparisons
  • DQMHistoTests: Total files compared: 31
  • DQMHistoTests: Total histograms compared: 2892884
  • DQMHistoTests: Total failures: 1
  • DQMHistoTests: Total nulls: 0
  • DQMHistoTests: Total successes: 2892693
  • DQMHistoTests: Total skipped: 190
  • DQMHistoTests: Total Missing objects: 0
  • DQMHistoSizes: Histogram memory added: 0.0 KiB( 30 files compared)
  • Checked 129 log files, 14 edm output root files, 31 DQM output files

@barvic
Copy link
Contributor Author

barvic commented Aug 16, 2018

@perrotta Don't really have any slides. This crash issue popped up just this Monday.
My understanding is that if raw data will be reprocessed with this patch applied, then in runs, where this type of corruption were not present there will be no changes in the output at all. In that particular problematic run, the problematic portion of the HLT crashing event data (actual scope is the single CSC chamber) will not be passed to the main CSC data unpacking code, preventing unpredictable data unpacking behavior.
I will be away till August 28, so not sure if additional explanations are still needed till then.

@perrotta
Copy link
Contributor

@Martin-Grunewald, @ptcox (since @barvic is away in these days): do you have an idea how this mask works, and at which level? Or do you know who can we ask about it?

For the possible backport I think one should better understand whether regular data taking can be affected at all, with differences in the expected event output, and the explanation in #24294 (comment) looks a bit too much generic (at least for me). I must admit that I tried to dig a bit in the code, but I was not able to find a clear answer to that question...

Thank you.

@ptcox
Copy link
Contributor

ptcox commented Aug 20, 2018 via email

@perrotta
Copy link
Contributor

perrotta commented Aug 20, 2018 via email

@perrotta
Copy link
Contributor

+1

  • One additional bit gets masked in CSC binary examiner mask of EventFilter/CSCRawToDigi
  • That dditional bit must remain activated to enable ALCT CRC checks and prevent unpacking data when there are errors
  • Jenkins test pass with no effect on reco quantities; no effect at all is expected when running on normal non-corrupted data

@cmsbuild
Copy link
Contributor

This pull request is fully signed and it will be integrated in one of the next CMSSW_10_2_X IBs (tests are also fine) and once validation in the development release cycle CMSSW_10_3_X is complete. This pull request will now be reviewed by the release team before it's merged. @davidlange6, @slava77, @smuzaffar, @fabiocos (and backports should be raised in the release meeting by the corresponding L2)

@kpedro88
Copy link
Contributor

+1

@cmsbuild cmsbuild merged commit 63fe485 into cms-sw:CMSSW_10_2_X Aug 31, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants