## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Deadlocks

System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock Combined Approach to Deadlock Handling

**The Deadlock Problem
**

A set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set. Example System has 2 tape drives. P1 and P2 each hold one tape drive and each needs another one. Example

semaphores A and B, initialized to 1 P0 P1 wait (A); wait (B); wait(B) wait(A)

Bridge Crossing Example

Traffic only in one direction. Each section of a bridge can be viewed as a resource. If a deadlock occurs, it can be resolved if one car backs up (preempt resources and rollback). Several cars may have to be backed up if a deadlock occurs. Starvation is possible.

Rm CPU cycles. . . Each process utilizes a resource as follows: request use release .. memory space. . I/O devices Each resource type Ri has Wi instances. R2.System Model Resource types R1.

….Deadlock Characterization Deadlock can arise if four conditions hold simultaneously. P1. No preemption: a resource can be released only voluntarily by the process holding it. Mutual exclusion: only one process at a time can use a resource. Hold and wait: a process holding at least one resource is waiting to acquire additional resources held by other processes. …. and P0 is waiting for a resource that is held by P0. . P0} of waiting processes such that P0 is waiting for a resource that is held by P1. P1 is waiting for a resource that is held by P2. after that process has completed its task. Pn–1 is waiting for a resource that is held by Pn. Circular wait: there exists a set {P0.

R = {R1.Resource-Allocation Graph A set of vertices V and a set of edges E. R2. V is partitioned into two types: P = {P1. …. Rm}. the set consisting of all the processes in the system. request edge – directed edge P1 → Rj assignment edge – directed edge Rj → Pi . Pn}. P2. …. the set consisting of all resource types in the system.

Resource-Allocation Graph (Cont.) Process Resource Type with 4 instances Pi Rj Pi requests instance of Rj Pi Rj Pi is holding an instance of Rj .

Example of a Resource Allocation Graph .

Resource Allocation Graph With A Deadlock .

Resource Allocation Graph With A Cycle But No Deadlock .

If graph contains a cycle ⇒ if only one instance per resource type. then deadlock. if several instances per resource type. . possibility of deadlock.Basic Facts If graph contains no cycles ⇒ no deadlock.

used by most operating systems.Methods for Handling Deadlocks Ensure that the system will never enter a deadlock state. . including UNIX. Allow the system to enter a deadlock state and then recover. Ignore the problem and pretend that deadlocks never occur in the system.

Mutual Exclusion – not required for sharable resources. Require process to request and be allocated all its resources before it begins execution. Hold and Wait – must guarantee that whenever a process requests a resource. it does not hold any other resources. .Deadlock Prevention Restrain the ways request can be made. or allow process to request resources only when the process has none. starvation possible. Low resource utilization. must hold for nonsharable resources.

as well as the new ones that it is requesting. Circular Wait – impose a total ordering of all resource types. Preempted resources are added to the list of resources for which the process is waiting. and require that each process requests resources in an increasing order of enumeration. then all resources currently being held are released. Process will be restarted only when it can regain its old resources.) No Preemption – If a process that is holding some resources requests another resource that cannot be immediately allocated to it. .Deadlock Prevention (Cont.

Deadlock Avoidanceinformation Requires that the system has some additional a priori available. . The deadlock-avoidance algorithm dynamically examines the resource-allocation state to ensure that there can never be a circular-wait condition. and the maximum demands of the processes. Simplest and most useful model requires that each process declare the maximum number of resources of each type that it may need. Resource-allocation state is defined by the number of available and allocated resources.

and so on. Pn> is safe if for each Pi. …. execute. system must decide if immediate allocation leaves the system in a safe state. with j<I. If Pi resource needs are not immediately available. Pi can obtain needed resources. the resources that Pi can still request can be satisfied by currently available resources + resources held by all the Pj. then Pi can wait until all Pj have finished. return allocated resources. When Pi terminates.Safe State When a process requests an available resource. When Pj is finished. and terminate. P2. . System is in safe state if there exists a safe sequence of all processes. Pi+1 can obtain its needed resources. Sequence <P1.

Avoidance ⇒ ensure that a system will never enter an unsafe state. If a system is in unsafe state ⇒ possibility of deadlock.Basic Facts If a system is in safe state ⇒ no deadlocks. .

Unsafe .Safe. Deadlock State .

When a resource is released by a process. . assignment edge reconverts to a claim edge. Resources must be claimed a priori in the system. Claim edge converts to request edge when a process requests a resource.Resource-Allocation Graph Algorithm Claim edge Pi → Rj indicated that process Pj may request resource Rj. represented by a dashed line.

Resource-Allocation Graph For Deadlock Avoidance .

Unsafe State In Resource-Allocation Graph .

Banker’s Algorithm Multiple instances. When a process requests a resource it may have to wait. . When a process gets all its resources it must return them in a finite amount of time. Each process must a priori claim maximum use.

Data Structures for the Banker’s Algorithm Let n = number of processes. . then Pi may need k more instances of Rj to complete its task.j] = k. Allocation: n x m matrix.j] = k then Pi is currently allocated k instances of Rj.j] = Max[i. If available [j] = k.j] – Allocation [i.j] = k. Need [i. If Max [i. and m = number of resources types. then process Pi may request at most k instances of resource type Rj. If Allocation[i.j]. Max: n x m matrix. Need: n x m matrix. If Need[i. Available: Vector of length m. there are k instances of resource type Rj available.

Work = Work + Allocationi Finish[i] = true go to step 2.3. then the system is in a safe state.1. ….Safety Algorithm 1. 2. 4. If Finish [i] == true for all i. 3. n. respectively. Let Work and Finish be vectors of length m and n. . go to step 4. Find and i such that both: (a) Finish [i] = false (b) Needi ≤ Work If no such i exists. Initialize: Work = Available Finish [i] = false for i .

Allocationi = Allocationi + Requesti. If Requesti [j] = k then process Pi wants k instances of resource type Rj. If Requesti ≤ Needi go to step 2. 3. go to step 3.Resource-Request Algorithm for Process Pi Request = request vector for process Pi. Otherwise. since resources are not available. Pretend to allocate requested resources to Pi by modifying the state as follows: Available = Available = Requesti. Otherwise Pi must wait. since process has exceeded its maximum claim. Needi = Needi – Requesti. and the old resource-allocation state is restored . raise error condition.. 1. • If unsafe ⇒ Pi must wait. • If safe ⇒ the resources are allocated to Pi. If Requesti ≤ Available. 2.

Example of Banker’s Algorithm 5 processes P0 through P4. and C (7 instances). B (5instances. Snapshot at time T0: Allocation Max Available ABC ABC ABC P0 0 1 0 753 332 P1 2 0 0 322 P2 3 0 2 902 P3 2 1 1 222 P4 0 0 2 433 . 3 resource types A (10 instances).

Example (Cont. . P2. Need ABC P0 7 4 3 P1 1 2 2 P2 6 0 0 P3 0 1 1 P4 4 3 1 The system is in a safe state since the sequence < P1. P4. Need is defined to be Max – Allocation.) The content of the matrix. P3. P0> satisfies safety criteria.

Can request for (3. P4.0. P0.3.0) by P0 be granted? Example P1 Request (1.2) ⇒ true. (1.Check that Request ≤ Available (that is. P3.0.2) (Cont.3. P2> satisfies safety requirement. Allocation Need Available ABC ABC ABC P0 0 1 0 743 230 P1 3 0 2 020 P2 3 0 1 600 P3 2 1 1 011 P4 0 0 2 431 Executing safety algorithm shows that sequence <P1.) .2.2) ≤ (3.0) by P4 be granted? Can request for (0.

Deadlock Detection Allow system to enter deadlock state Detection algorithm Recovery scheme .

Single Instance of Each Resource Type Maintain wait-for graph Nodes are processes. Pi → Pj if Pi is waiting for Pj. An algorithm to detect a cycle in a graph requires an order of n2 operations. . Periodically invoke an algorithm that searches for a cycle in the graph. where n is the number of vertices in the graph.

Resource-Allocation Graph and Wait-for Graph Resource-Allocation Graph Corresponding wait-for graph .

Request: An n x m matrix indicates the current request of each process. . Allocation: An n x m matrix defines the number of resources of each type currently allocated to each process.Several Instances of a Resource Type Available: A vector of length m indicates the number of available resources of each type. Rj. then process Pi is requesting k more instances of resource type. If Request [ij] = k.

2. respectively Initialize: (a) Work = Available (b)For i = 1. if Allocationi ≠ 0. Let Work and Finish be vectors of length m and n. Finish[i] = true. Find an index i such that both: (a)Finish[i] == false (b)Requesti ≤ Work If no such i exists.otherwise. . go to step 4.2.Detection Algorithm 1. then Finish[i] = false. n. ….

Moreover. 1 ≤ i ≤ n. 4.Detection Algorithm (Cont. for some i.) 3. . Algorithm requires an order of O(m x n2) operations to detect whether the system is in deadlocked state. if Finish[i] == false. Work = Work + Allocationi Finish[i] = true go to step 2. then the system is in deadlock state. then Pi is deadlocked. If Finish[i] == false.

Snapshot at time T0: Allocation Request Available ABC ABC ABC 000 000 P0 0 1 0 P1 2 0 0 202 000 P2 3 0 3 P3 2 1 1 100 P4 0 0 2 002 Sequence <P0. and C (6 instances). three resource types A (7 instances). P2.Example of Detection Algorithm Five processes P0 through P4. P1. P3. P4> will result in Finish[i] = true for all i. B (2 instances). .

P3. . and P4. requests. Request ABC P0 0 0 0 P1 2 0 1 P2 0 0 1 P3 1 0 0 P4 0 0 2 State of system? Can reclaim resources held by process P0. consisting of processes P1.Example (Cont. P2.) P2 requests an additional instance of type C. but insufficient resources to fulfill other processes. Deadlock exists.

. to invoke depends on: How often a deadlock is likely to occur? How many processes will need to be rolled back? one for each disjoint cycle If detection algorithm is invoked arbitrarily. and how often.Detection-Algorithm Usage When. there may be many cycles in the resource graph and so we would not be able to tell which of the many deadlocked processes “caused” the deadlock.

How long process has computed. Resources the process has used. In which order should we choose to abort? Priority of the process. Abort one process at a time until the deadlock cycle is eliminated.Recovery from Deadlock: Process Termination Abort all deadlocked processes. Is process interactive or batch? . Resources process needs to complete. and how much longer to completion. How many processes will need to be terminated.

. include number of rollback in cost factor.Recovery from Deadlock: Resource Preemption Selecting a victim – minimize cost. Starvation – same process may always be picked as victim. Rollback – return to some safe state. restart process for that state.

Use most appropriate technique for handling deadlocks within each class. .Combined Approach to Deadlock Handling Combine the three basic approaches prevention avoidance detection allowing the use of the optimal approach for each of resources in the system. Partition resources into hierarchically ordered classes.

Traffic Deadlock for Exercise 8.4 .

- Artificial Neural Network
- Deadlock Avoidance
- Memory Structure
- OS-08
- ch06
- OS-09
- chapter 7
- cachemem
- Neural Networks
- Artificial Neural Networks
- Architecture of Neural Nw
- Lecture-35-CS210-2012.pptx
- OS-07
- Improved Deadlock Prevention Algorithms in Distributed Systems
- Cache Memory
- 6565786 Distributed Deadlock
- discrete time quantum walk
- Spontaneous Discrimination (Peski, Szentes)
- e21-2x2
- Gen Comb
- Calculating the Smarandache Numbers
- 106
- Mathematicians
- Interaksi 3 Graph Theory
- Algorithmic Graph Theory - David Joyner, Minh Van Nguyen, Nathann Cohen
- GATE - 2013 - Computer Science - Question Paper - Paper Code A
- zuff_SharpGP2D12
- GenFam Algo and Meeting Notes
- GATE CS Question 2013
- 10-Graphs

- tmpDE32.tmp
- A System for Efficient Retrieval of the Images from Large Datasets using Ripplet Transform and Edge Histogram Detector
- Implementation of Feed Forward Neural Network for Image Compression on FPGA
- 68537_1985-1989
- tmp2A0A.tmp
- A Review on Image Inpainting with K-Nearest Neighbor (KNN) Method
- Optimization of Water Distribution Network for Dharampeth Area
- tmpC8D2.tmp
- Personalized Gesture Recognition with Hidden Markove Model and Dynamic Time Warping
- 63607_2010-2014
- Image Processing Techniques For Quality Checking In Food Industry
- Digital Image Watermarking Based on LSB for RGB Image
- Weighted Density based Error Optimization for Classical Dataset
- tmpDBB7.tmp
- An Algorithm to Improve Accuracy of Recommendation System
- Review on Advanced Prediction of Difficult Keyword Queries Over Databases
- Analyzing Sentiment at Sentence-Level on Tweets using Hybrid Systems

- Scheduling Resources In a Hetero-Gene Cloud Using Genetic Algorithm
- Content-Based Image Retrieval Using Features Extracted From Block Truncation Coding
- OCR for Gujarati Numeral using Neural Network
- Voice Recognition System using Template Matching
- tmpDF60.tmp
- tmpAA72
- tmp5056.tmp
- Principles of parallel algorithm models and their objectives
- UT Dallas Syllabus for se3345.502.07f taught by Ivor Page (ivor)
- As 2805.5.1-1992 Electronic Funds Transfer - Requirements for Interfaces Ciphers - Data Encipherment Algorith
- Analysis & Design Algorithm MCQ'S
- tmpCB3F.tmp
- Comparison of different Sub-Band Adaptive Noise Canceller with LMS and RLS
- Comparative Analysis of Optimization Algorithms Based on Hybrid Soft Computing Algorithm
- A Survey of Modern Data Classification Techniques
- Hashing Algorithm
- UT Dallas Syllabus for opre7313.001.08f taught by Milind Dawande (milind)
- A review on Development of novel algorithm by combining Wavelet based Enhanced Canny edge Detection and Adaptive Filtering Method for Human Emotion Recognition
- UT Dallas Syllabus for cs2305.002 05f taught by Timothy Farage (tfarage)
- A Survey on Gesture Recognition
- UT Dallas Syllabus for cs3345.501 05s taught by Greg Ozbirn (ozbirn)
- Cluster Analysis Techniques in Data Mining
- UT Dallas Syllabus for opre7313.001.11s taught by Milind Dawande (milind)
- Determining the shortest path for Travelling Salesman Problem using Nearest Neighbor Algorithm
- UT Dallas Syllabus for cs6363.002.08s taught by Balaji Raghavachari (rbk)
- Appraisal of PSO Algorithm over Genetic Algorithm in WSN Using NS2
- The Optimizing Multiple Travelling Salesman Problem Using Genetic Algorithm
- Simulation of Single and Multilayer of Artificial Neural Network using Verilog
- Introduction to Multi-Objective Clustering Ensemble
- tmp8BC6

Sign up to vote on this title

UsefulNot usefulClose Dialog## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Close Dialog## This title now requires a credit

Use one of your book credits to continue reading from where you left off, or restart the preview.

Loading