Deadlocks
Deadlocks
Deadlocks
Reshmi P Rajan
DEADLOCKS
EXAMPLES:
"It takes money to make money". You can't get a job without experience; you can't get experience without a job.
BACKGROUND:
The cause of deadlocks: Each process needing what another process has. This results from sharing resources such as memory, devices, links. Under normal operations, a resource allocation proceeds like this:: 1. 2. 3. Request a resource (suspend until available if necessary ). Use the resource. Release the resource.
3
DEADLOCKS
Each section of a bridge can be viewed as a resource. If a deadlock occurs, it can be resolved if one car backs up (pre empt resources and rollback). Several cars may have to be backed up if a deadlock occurs. Starvation is possible.
DEADLOCKS
DEADLOCK CHARACTERISATION
NECESSARY CONDITIONS ALL of these four must happen simultaneously for a deadlock to occur: Mutual exclusion One or more than one resource must be held by a process in a non-sharable (exclusive) mode.
Hold and Wait A process holds a resource while waiting for another resource.
No Preemption There is only voluntary release of a resource - nobody else can make a process give up a resource. Circular Wait Process A waits for Process B waits for Process C .... waits for Process A.
5
DEADLOCKS
An arrow from the process to resource indicates the process is requesting the resource. An arrow from resource to process shows an instance of the resource has been allocated to the process. Process is a circle, resource type is square; dots represent number of instances of resource in type. Request points to square, assignment comes from dot. Pi
Pi
Rj
Pi
Rj
DEADLOCKS
If the graph contains no cycles, then no process is deadlocked. If there is a cycle, then: a) If resource types have multiple instances, then deadlock MAY exist. b) If each resource type has 1 instance, then deadlock has occurred.
R3 Assigned to P3
P2 Requests P3
DEADLOCKS
Resource allocation graph with a deadlock.
Avoidance
Allow all deadlock conditions, but calculate cycles about to happen and stop dangerous operations..
Allow deadlock to happen. This requires using both: Detection Recovery Know a deadlock has occurred. Regain the resources.
9
DEADLOCKS
Do not allow one of the four conditions to occur.
Deadlock Prevention
Mutual exclusion: a) Automatically holds for printers and other non-sharables. b) Shared entities (read only files) don't need mutual exclusion (and arent susceptible to deadlock.) c) Prevention not possible, since some devices are intrinsically non-sharable. Hold and wait: a) Collect all resources before execution. b) A particular resource can only be requested when no others are being held. A sequence of resources is always collected beginning with the same one. c) Utilization is low, starvation possible.
10
DEADLOCKS
Do not allow one of the four conditions to occur. No preemption: a)
Deadlock Prevention
Release any resource already being held if the process can't get an additional resource. b) Allow preemption - if a needed resource is held by another process, which is also waiting on some resource, steal it. Otherwise wait. Circular wait: a) Number resources and only request in ascending order.
EACH of these prevention techniques may cause a decrease in utilization and/or resources. For this reason, prevention isn't necessarily the best technique. Prevention is generally the easiest to implement.
11
DEADLOCKS
Deadlock Avoidance
If we have prior knowledge of how resources will be requested, it's possible to determine if we are entering an "unsafe" state.
The rule is simple: If a request allocation would cause an unsafe state, do not honor that request.
NOTE: All deadlocks are unsafe, but all unsafes are NOT deadlocks.
12
DEADLOCKS
Deadlock Avoidance
NOTE: All deadlocks are unsafe, but all unsafe s are NOT deadlocks.
UNSAFE
SAFE DEADLOCK
Only with luck will processes avoid deadlock. O.S. can avoid deadlock.
13
DEADLOCKS
Deadlock Avoidance
Let's assume a very simple model: each process declares its maximum needs. In this case, algorithms exist that will ensure that no unsafe state is reached. Maximum needs does NOT mean it must use that many resources simply that it might do so under some circumstances. EXAMPLE: There exists a total of 12 resources. Each resource is used exclusively by a process. The current state looks like this:
Process Max Needs Allocated 5 2 3 Current Needs 5 2 7 14 There are multiple instances of the resource in these examples.
In this example, < p1, p0, p2 > is a workable sequence. Suppose p2 requests and is given one more resource. What happens then?
P0 P1 P2
10 4 9
DEADLOCKS
Safety Algorithm
Deadlock Avoidance
A method used to determine if a particular state is safe. It's safe if there exists a sequence of processes such that for all the processes, theres a way to avoid deadlock: The algorithm uses these variables: Need[I] the remaining resource needs of each process. Work - Temporary variable how many of the resource are currently available. Finish[I] flag for each process showing weve analyzed that process or not. need <= available + allocated[0] + .. + allocated[I-1] Sign of success Let work and finish be vectors of length m and n respectively.
15
DEADLOCKS
Safety Algorithm
1. Initialize work Initialize finish[i]
Deadlock Avoidance
= available = false, for i = 1,2,3,..n
2.
Find an i such that: finish[i] == false and need[i] <= work If no such i exists, go to step 4.
3.
4.
DEADLOCKS
Safety Algorithm
Deadlock Avoidance
Do these examples: Consider a system with: five processes, P0 P4, three resource types, A, B, C. Type A has 10 instances, B has 5 instances, C has 7 instances. At time T0 the following snapshot of the system is taken. Max Needs = allocated + can-be-requested Is the system in a safe state? A P0 0 Alloc B 1 C 0 A 7
Req
C 3
A 3
Avail B 3
C 2
B 4
P1
P2 P3 P4
2
3 2 0
0
0 1 0
0
2 1 2
0
6 0 4
2
0 1 3
0
0 1 1
17
DEADLOCKS
Safety Algorithm
Deadlock Avoidance
Do these examples: Now try it again with only a slight change in the request by P1. P1 requests one additional resource of type A, and two more of type C. Request1 = (1,0,2). Is Request1 < available?
Produce the state chart as if the request is Granted and see if its safe. (Weve drawn the chart as if its granted.
A P0 P1 P2 P3 0 3# 3 2
Alloc B 1 0 0 1 C 0 2# 2 1
A 7 0 6 0
Req
C 3 0 0 1
A 1#
Avail B 3
C 0#
B 4 2 0 1
P4
18
DEADLOCKS
Need an algorithm that determines if deadlock occurred. Also need a means of recovering from that deadlock.
Deadlock Detection
SINGLE INSTANCE OF A RESOURCE TYPE Wait-for graph == remove the resources from the usual graph and collapse edges. An edge from p(j) to p(i) implies that p(j) is waiting for p(i) to release.
19
DEADLOCKS
SEVERAL INSTANCES OF A RESOURCE TYPE Complexity is of order m * n * n. We need to keep track of: available allocation request
Deadlock Detection
- records how many resources of each type are available. - number of resources of type m allocated to process n. - number of resources of type m requested by process n.
20
DEADLOCKS
Deadlock Detection
1. Initialize work[ ] = available[ ] For i = 1,2,...n, if allocation[i] != 0 then // For all n processes finish[i] = false; otherwise, finish[i] = true; 2. Find an i process such that: finish[i] == false and request[i] <= work If no such i exists, go to step 4. 3. work = work + allocation[i] finish[i] = true goto step 2
4. if finish[i] == false for some i, then the system is in deadlock state. IF finish[i] == false, then process p[i] is deadlocked.
21
DEADLOCKS
Deadlock Detection
EXAMPLE We have three resources, A, B, and C. A has 7 instances, B has 2 instances, and C has 6 instances. At this time, the allocation, etc. looks like this:
Is there a sequence that will allow deadlock to be avoided? Is there more than one sequence that will work?
Alloc B C
Req
Avail B
P0
P1 P2 P3 P4
0
2 3 2 0
1
0 0 1 0
0
0 3 1 2
0
2 0 1 0
0
0 0 0 0
0
2 0 0 2
22
DEADLOCKS
Deadlock Detection
EXAMPLE Suppose the Request matrix is changed like this. In other words, the maximum amounts to be allocated are initially declared so that this request matrix results. Is there now a sequence that will allow deadlock to be avoided?
Alloc B C
Req
Avail B
P0
USAGE OF THIS DETECTION ALGORITHM
0
2 3 2 0
1
0 0 1 0
0
0 3 1 2
0
2 0 1 0
0
0 0 0 0
0
2 1# 0 2
P1 P2 P3 P4
Frequency of check depends on how often a deadlock occurs and how many processes will be affected.
23
DEADLOCKS
Deadlock Recovery
So, the deadlock has occurred. Now, how do we get the resources back and gain forward progress? PROCESS TERMINATION: Could delete all the processes in the deadlock -- this is expensive. Delete one at a time until deadlock is broken ( time consuming ). Select who to terminate based on priority, time executed, time to completion, needs for completion, or depth of rollback In general, it's easier to preempt the resource, than to terminate the process. RESOURCE PREEMPTION:
Select a victim - which process and which resource to preempt. Rollback to previously defined "safe" state. Prevent one process from always being the one preempted ( starvation ).
24
DEADLOCKS
Deadlock Recovery
Type of resource may dictate best deadlock handling. Look at ease of implementation, and effect on performance.
In other words, there is no one best technique.
Cases include:
Preemption for memory, Preallocation for swap space,
25
DEADLOCKS
In this lecture we have: Looked at necessary conditions for a deadlock to occur. Determined how to prevent, avoid, detect and recover from deadlocks.
26
THANK YOU