Unit IV
Unit IV
1
• Deadlock is a situation where a set of processes are blocked
because each process is holding a resource and waiting for
another resource acquired by some other process.
• Consider an example when two trains are coming toward each
other on same track and there is only one track, none of the
trains can move once they are in front of each other.
• Similar situation occurs in operating systems when there are
two or more processes hold some resources and wait for
resources held by other(s).
2
• For example, Process 1 is holding Resource 1
and waiting for resource 2 which is acquired
by process 2, and process 2 is waiting for
resource 1.
3
Bridge Crossing Example
4
• Deadlock can arise if following four conditions
hold simultaneously (Necessary Conditions)
1. Mutual Exclusion: One or more than one resource are
non-sharable (Only one process can use at a time)
2. Hold and Wait: A process is holding at least one resource
and waiting for resources.
3. No Preemption: A resource cannot be taken from a
process unless the process releases the resource.
4. Circular Wait: A set of processes are waiting for each
other in circular form.
5
Deadlock Prevention
Constrain the ways request can be made.
• Mutual Exclusion – not required for sharable
resources; must hold for nonsharable resources.
6
Deadlock Prevention (Cont.)
• No Preemption –
– If a process that is holding some resources and requests
another resource that cannot be immediately allocated to
it, then all resources currently being held are released.
– Preempted resources are added to the list of resources for
which the process is waiting.
– Process will be restarted only when it can regain its old
resources, as well as the new ones that it is requesting.
8
2) Deadlock detection and recovery:
• Let deadlock occur, then do preemption to
handle it once occurred.
3) Ignore the problem all together:
• If deadlock is very rare, then let it happen and
reboot the system. This is the approach that
both Windows and UNIX take.
9
10
System Model
• Resource types R1, R2, . . ., Rm
CPU cycles, memory space, I/O devices, files
• Each resource type Ri has Wi instances.
• Each process utilizes a resource as follows:
– request
– use
– release
11
Deadlock Characterization
Deadlock can arise if four conditions hold simultaneously.
• Mutual exclusion: only one process can use a resource at a time.
• Circular wait: there exists a set {P0, P1, …, Pn} of waiting processes
such that P0 is waiting for a resource held by P1, P1 is waiting for a
resource that is held by P2, …, Pn–1 is waiting for a resource that is
held by Pn, and Pn is waiting for a resource that is held by P0.
12
Resource-Allocation Graph
A set of vertices V and a set of edges E.
13
Resource-Allocation Graph (Cont.)
• Process
• Pi requests instance of Rj
Pi
Rj
• Pi is holding an instance of Rj
Pi
Rj
14
Example of a Resource Allocation Graph
15
• If graph contains no cycles, then no process in the
system is deadlocked.
• If the graph does contain a cycle , then deadlock may
exist.
• If each resource type has exactly one instance, then
cycle implies that deadlock has occurred. In this case,
cycle in the graph is both necessary and a sufficient
condition for the existence of deadlock
• If each resource type has several instances, then cycle
does not necessarily imply that deadlock has occurred.
In this case, cycle in the graph is a necessary but not a
sufficient condition for the existence of deadlock
16
Resource Allocation Graph With A Deadlock
17
Resource Allocation Graph With A Cycle But No Deadlock
18
Basic Facts
• If graph contains no cycles no deadlock.
19
Methods for Handling Deadlocks
• Ensure that the system will never enter a
deadlock state.
21
Deadlock Avoidance
Requires that the system has some additional a priori information
available.
• Simplest and most useful model requires that each process
declare the maximum number of resources of each type that it
may need.
• Sequence of processes <P1, P2, …, Pn> is safe if for each Pi, the
resources that Pi can still request can be satisfied by currently
available resources + resources held by all the Pj, with j<i.
– If Pi resource needs are not immediately available, then Pi can wait until all
Pj have finished.
– When Pj is finished, Pi can obtain needed resources, execute, return
allocated resources, and terminate.
– When Pi terminates, Pi+1 can obtain its needed resources, and so on.
23
Basic Facts
• If a system is in safe state no deadlocks.
24
Safe, Unsafe , Deadlock State
25
Resource-Allocation Graph Algorithm
• Claim edge Pi Rj indicated that process Pi may
request resource Rj; represented by a dashed
line.
28
Unsafe State In Resource-Allocation Graph
29
Banker’s Algorithm
• It is the best known of the avoidance strategies.
30
Contd…
• Multiple instances.
34
Example of Banker’s Algorithm
• 5 processes P0 through P4; 3 resource types A
(10 instances), B (5 instances), and C (7 instances).
• Snapshot at time T0:
Allocation Max Available
ABC ABC ABC
P0 0 1 0 753 332
P1 2 0 0 322
P2 3 0 2 902
P3 2 1 1 222
P4 0 0 2 433
35
Example (Cont.)
• The content of the matrix. Need is defined to be
Max – Allocation.
Need
ABC
P0 7 4 3
P1 1 2 2
P2 6 0 0
P3 0 1 1
P4 4 3 1
• The system is in a safe state since the sequence
< P1, P3, P4, P0, P2> satisfies safety criteria.
36
Example P1 Request (1,0,2) (Cont.)
• Check that Request Available (that is, (1,0,2) (3,3,2) true.
Allocation Need Available
ABC ABC ABC
P0 0 1 0 743 230
P1 3 0 2 020
P2 3 0 1 600
P3 2 1 1 011
P4 0 0 2 431
• Executing safety algorithm shows that sequence <P1, P3, P4, P0,
P2> satisfies safety requirement.
• Can request for (3,3,0) by P4 be granted?
• Can request for (0,2,0) by P0 be granted?
37
• Unit-III(Concurrency Control)
• Lecture 08
• Deadlock Detection
• The Ostrich algorithm
38
Deadlock Detection
• If system does not employ either a deadlock
prevention or a deadlock avoidance algo, then a
deadlock situation may occur.
• Detection algorithm
• Recovery scheme
39
Single Instance of Each Resource Type
40
Resource-Allocation Graph and Wait-for Graph
41
Several Instances of a Resource Type
• The wait for graph scheme is not applicable to a
resource allocation system with multiple instances
42
Several Instances of a Resource Type
• Available: A vector of length m indicates the number of
available resources of each type.
43
Detection Algorithm
1. Let Work and Finish be vectors of length m and n,
respectively. Initialize:
(a) Work = Available
(b)For i = 0,1, …, n-1, if Allocationi 0, then
Finish[i] = false; otherwise, Finish[i] = true.
2. Find an index i such that both:
(a) Finish[i] == false
(b)Requesti Work
44
Detection Algorithm (Cont.)
3. Work = Work + Allocationi
Finish[i] = true
go to step 2.
45
Example of Detection Algorithm
• Five processes P0 through P4; three resource types
A (7 instances), B (2 instances), and C (6 instances).
• Snapshot at time T0:
Allocation Request Available
ABC ABC ABC
P0 0 1 0 000 000
P1 2 0 0 202
P2 3 0 3 000
P3 2 1 1 100
P4 0 0 2 002
• Sequence <P0, P2, P3, P1, P4> will result in Finish[i] = true for
all i.
46
Example (Cont.)
• P2 requests an additional instance of type C.
Request
ABC
P0 0 0 0
P1 2 0 2
P2 0 0 1
P3 1 0 0
P4 0 0 2
• State of system?
– Can reclaim resources held by process P0, but insufficient
resources to fulfill other processes; requests.
– Deadlock exists, consisting of processes P1, P2, P3, and P4.
47
Detection-Algorithm Usage
• When, and how often, to invoke the detection
algo. depends on:
– How often a deadlock is likely to occur?
– How many processes will need to be rolled back?
• one for each disjoint cycle
49
Recovery from Deadlock: Resource
Preemption
• Selecting a victim – minimize cost.
50
Comparison
Parameters Avoidance Detection Prevention
Resource Midway Very liberal Conservative,
allocation policy between that of under commit
detection and resources
prevention
Different Manipulate to Invoke periodically Preemption,
schemes find at least one to test for resource
safe path deadlock ordering,
requesting all
resources at once
Advantages No preemption Never delays No preemption
necessary process initiation necessary
Disadvantages Process can be Inherent Delays process
blocked for long preemption losses initiation
period 51
Strategies for dealing with Deadlocks
52
The Ostrich Algorithm
• Pretend there is no problem
• Reasonable if
– deadlocks occur very rarely
– cost of prevention is high
Example of “cost”, only one process runs at a time
• UNIX and Windows takes this approach for
some of the more complex resource relationships to
manage
• It’s a trade off between
– Convenience (engineering approach)
– Correctness (mathematical approach
53