I assume that if some process is submitting messages then some other process is receiving messages, is the receiving program a user program, or an MQ program ? (e.g. an MCA). The queue manager treats the buffer size provided by the receiving application as a hint as to how big the message is likely to be, this causes overheads if the app specifies a very large buffer size unnecessarily. If the receiving process specifies a very large buffer size then the agent will allocate a buffer into which the message could be read, while if the application specifies a reasonable buffer size then the agent will read the message directly into shared memory from where it can be copied to the application process.
Andy. David Awerbuch <[EMAIL PROTECTED]>@AKH-WIEN.AC.AT> on 06/13/2002 10:05:26 PM Please respond to MQSeries List <[EMAIL PROTECTED]> Sent by: MQSeries List <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] cc: Subject: vms process for amqzlaa0.exe over-paging Hello, I have a simple MQ installation here, on a VAX 7000-650. I have an application that is submitting 1000 byte messages, one at a tine, persistent, CMIT after each one. I noticed that while my application is running, an agent process running AMQZLAA0.EXE is regularly soft-paging about 450 pages per second - this coming from polycenter performance graphs generated from data collected realtime, as well as from watching a "show proc /cont". It is not hard-paging. The process consistently uses 31760 virtual pages, with regular jumps to about 32900 and then drops back to 31760. Does anyone have any ideas why the ZAA0 executable is soft-paging so much? We've been writing off as an artifact of the way AMQZLAA0 is handling messages; that it acquires a buffer, copies the messages into it and build control blocks, then releases it again. But, given a message size of 1000 bytes (that 2-3 pages), and a current throughput of only about 1 message per second, I can;t see how that many pages would be acquired and released per second to process a single message. I hope someone in IBM can help me out here. Thanks, Dave A. Here is the "show process" for AAZ0. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 13-JUN-2002 16:52:40.70 User: MQADMIN Process ID: 24016D05 Node: VAXP Process name: "VAXPQM_AG_5" Terminal: User Identifier: [MQSERIES,MQS_SERVER] Base priority: 4 Default file spec: Not available Process Quotas: Account name: SYSTEM CPU limit: Infinite Direct I/O limit: 250 Buffered I/O byte count quota: 169280 Buffered I/O limit: 500 Timer queue entry quota: 233 Open file quota: 284 Paging file quota: 942280 Subprocess quota: 92 Default page fault cluster: 64 AST quota: 247 Enqueue quota: 4739 Shared file limit: 0 Max detached processes: 0 Max active jobs: 0 Accounting information: Buffered I/O count: 542 Peak working set size: 5567 Direct I/O count: 188 Peak virtual size: 32732 Page faults: 29680 Mounted volumes: 0 Images activated: 1 Elapsed CPU time: 0 00:00:06.68 Connect time: 0 00:00:24.50 Authorized privileges: ACNT ALLSPOOL ALTPRI AUDIT BUGCHK BYPASS CMEXEC CMKRNL DETACH DIAGNOSE DOWNGRADE EXQUOTA GROUP GRPNAM GRPPRV IMPORT LOG_IO MOUNT NETMBX OPER PFNMAP PHY_IO PRMCEB PRMGBL PRMMBX PSWAPM READALL SECURITY SETPRV SHARE SHMEM SYSGBL SYSLCK SYSNAM SYSPRV TMPMBX UPGRADE VOLPRO WORLD Process privileges: ACNT may suppress accounting messages ALLSPOOL may allocate spooled device ALTPRI may set any priority value AUDIT may direct audit to system security audit log BUGCHK may make bug check log entries BYPASS may bypass all object access controls CMEXEC may change mode to exec CMKRNL may change mode to kernel DETACH may create detached processes DIAGNOSE may diagnose devices DOWNGRADE may downgrade object secrecy EXQUOTA may exceed disk quota GROUP may affect other processes in same group GRPNAM may insert in group logical name table GRPPRV may access group objects via system protection IMPORT may set classification for unlabeled object LOG_IO may do logical i/o MOUNT may execute mount acp function NETMBX may create network device OPER may perform operator functions PFNMAP may map to specific physical pages PHY_IO may do physical i/o PRMCEB may create permanent common event clusters PRMGBL may create permanent global sections PRMMBX may create permanent mailbox PSWAPM may change process swap mode READALL may read anything as the owner SECURITY may perform security administration functions SETPRV may set any privilege bit SHARE may assign channels to non-shared devices SHMEM may create/delete objects in shared memory SYSGBL may create system wide global sections SYSLCK may lock system wide resources SYSNAM may insert in system logical name table SYSPRV may access objects via system protection TMPMBX may create temporary mailbox UPGRADE may upgrade object integrity VOLPRO may override volume protection WORLD may affect other processes in the world Process rights: INTERACTIVE REMOTE MQM resource System rights: SYS$NODE_VAXP Auto-unshelve: on Image Dump: off There are 9 processes in this job: VAXPQM_EC VAXPQM_LG VAXPQM_CP VAXPQM_AG_1 VAXPQM_AG_2 VAXPQM_AG_3 VAXPQM_AG_4 VAXPQM_AG VAXPQM_AG_5 (*) =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= here is the "show process" for my application: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= $ show proc st400_tna2030 13-JUN-2002 16:55:02.92 User: ST400533TST Process ID: 240180C3 Node: VAXP Process name: "ST400_TNA2030" Terminal: TNA2030: (Host: vaxp Port: 2017 ) User Identifier: [ST400533TST] Base priority: 4 Default file spec: Not available Devices allocated: VAXP$TNA2030: $ show proc st400_tna2030/all 13-JUN-2002 16:55:10.15 User: ST400533TST Process ID: 240180C3 Node: VAXP Process name: "ST400_TNA2030" Terminal: TNA2030: (Host: vaxp Port: 2017 ) User Identifier: [ST400533TST] Base priority: 4 Default file spec: Not available Devices allocated: VAXP$TNA2030: Process Quotas: Account name: CPU limit: Infinite Direct I/O limit: 1024 Buffered I/O byte count quota: 1498464 Buffered I/O limit: 1024 Timer queue entry quota: 511 Open file quota: 508 Paging file quota: 997012 Subprocess quota: 256 Default page fault cluster: 64 AST quota: 1019 Enqueue quota: 1987 Shared file limit: 0 Max detached processes: 0 Max active jobs: 0 Accounting information: Buffered I/O count: 88757 Peak working set size: 1685 Direct I/O count: 59630 Peak virtual size: 32138 Page faults: 4511 Mounted volumes: 0 Images activated: 15 Elapsed CPU time: 0 00:04:56.18 Connect time: 0 00:52:13.44 Authorized privileges: ACNT ALLSPOOL ALTPRI BUGCHK CMEXEC CMKRNL DETACH DIAGNOSE EXQUOTA GROUP GRPNAM GRPPRV LOG_IO MOUNT NETMBX OPER PFNMAP PHY_IO PRMCEB PRMGBL PRMMBX PSWAPM READALL SECURITY SETPRV SHARE SHMEM SYSGBL SYSLCK SYSNAM SYSPRV TMPMBX VOLPRO WORLD Process privileges: ACNT may suppress accounting messages ALLSPOOL may allocate spooled device ALTPRI may set any priority value AUDIT may direct audit to system security audit log BUGCHK may make bug check log entries BYPASS may bypass all object access controls CMEXEC may change mode to exec CMKRNL may change mode to kernel DETACH may create detached processes DIAGNOSE may diagnose devices DOWNGRADE may downgrade object secrecy EXQUOTA may exceed disk quota GROUP may affect other processes in same group GRPNAM may insert in group logical name table GRPPRV may access group objects via system protection IMPORT may set classification for unlabeled object LOG_IO may do logical i/o MOUNT may execute mount acp function NETMBX may create network device OPER may perform operator functions PFNMAP may map to specific physical pages PHY_IO may do physical i/o PRMCEB may create permanent common event clusters PRMGBL may create permanent global sections PRMMBX may create permanent mailbox PSWAPM may change process swap mode READALL may read anything as the owner SECURITY may perform security administration functions SETPRV may set any privilege bit SHARE may assign channels to non-shared devices SHMEM may create/delete objects in shared memory SYSGBL may create system wide global sections SYSLCK may lock system wide resources SYSNAM may insert in system logical name table SYSPRV may access objects via system protection TMPMBX may create temporary mailbox UPGRADE may upgrade object integrity VOLPRO may override volume protection WORLD may affect other processes in the world Process rights: INTERACTIVE REMOTE ST400_000232 ST400_DEDICATED_PRINTER ST400_SHAREABLE_PRINTER ST400_CARD_READER MQM resource System rights: SYS$NODE_VAXP Auto-unshelve: on Image Dump: off There is 1 process in this job: ST400_TNA2030 (*) =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ===== David A. Awerbuch, IBM Certified MQSeries Specialist APC Consulting Services, Inc. Providing Automated Solutions to Business Challenges West Hempstead, NY (516) 481-6440 [EMAIL PROTECTED] __________________________________________________ Do You Yahoo!? Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive