Module 6: Deadlocks. Reading: Chapter 7

Similar documents
Chapter 7: Deadlocks

Chapter 8: Deadlocks

Chapter 8: Deadlocks. The Deadlock Problem. System Model. Bridge Crossing Example. Resource-Allocation Graph. Deadlock Characterization

Chapter 7: Deadlocks

The Deadlock Problem

Module 7: Deadlocks. The Deadlock Problem. Bridge Crossing Example. System Model

Deadlocks. Deadlock Overview

Chapter 7: Deadlocks

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition,

Chapter 8: Deadlocks. The Deadlock Problem

Chapter 7: Deadlocks. Chapter 7: Deadlocks. The Deadlock Problem. Chapter Objectives. System Model. Bridge Crossing Example

Chapter 7 : 7: Deadlocks Silberschatz, Galvin and Gagne 2009 Operating System Concepts 8th Edition, Chapter 7: Deadlocks

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

Module 7: Deadlocks. The Deadlock Problem

CSE Opera+ng System Principles

Chapter 7: Deadlocks. Operating System Concepts with Java 8 th Edition

CMSC 412. Announcements

CS307: Operating Systems

Chapter 7: Deadlocks

Deadlock Prevention. Restrain the ways request can be made. Mutual Exclusion not required for sharable resources; must hold for nonsharable resources.

Chapter 8: Deadlocks. Operating System Concepts with Java

Module 7: Deadlocks. System Model. Deadlock Characterization. Methods for Handling Deadlocks. Deadlock Prevention. Deadlock Avoidance

UNIT-5 Q1. What is deadlock problem? Explain the system model of deadlock.

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition,! Silberschatz, Galvin and Gagne 2009!

The Deadlock Problem (1)

System Model. Types of resources Reusable Resources Consumable Resources

CHAPTER 7: DEADLOCKS. By I-Chen Lin Textbook: Operating System Concepts 9th Ed.

Principles of Operating Systems

The Slide does not contain all the information and cannot be treated as a study material for Operating System. Please refer the text book for exams.

CS307 Operating Systems Deadlocks

Deadlocks. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University

Deadlocks. Dr. Yingwu Zhu

Deadlocks. Bridge Crossing Example. The Problem of Deadlock. Deadlock Characterization. Resource-Allocation Graph. System Model

Operating Systems 2015 Spring by Euiseong Seo DEAD LOCK

Lecture 7 Deadlocks (chapter 7)

COP 4610: Introduction to Operating Systems (Spring 2016) Chapter 7 Deadlocks. Zhi Wang Florida State University

Chapter 7: Deadlocks. Operating System Concepts 9th Edition DM510-14

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

The Deadlock Problem

Deadlock Risk Management

ICS Principles of Operating Systems. Lectures Set 5- Deadlocks Prof. Nalini Venkatasubramanian

Deadlock. Concepts to discuss. A System Model. Deadlock Characterization. Deadlock: Dining-Philosophers Example. Deadlock: Bridge Crossing Example

Silberschatz, Galvin and Gagne 2013! CPU cycles, memory space, I/O devices! " Silberschatz, Galvin and Gagne 2013!

Roadmap. Safe State. Deadlock Avoidance. Basic Facts. Safe, Unsafe, Deadlock State. Tevfik Koşar. CSC Operating Systems Spring 2007

Deadlocks. Operating System Concepts - 7 th Edition, Feb 14, 2005

Chapter 7: Deadlocks. Operating System Concepts 8th Edition, modified by Stewart Weiss

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

Chapter 8: Deadlocks. The Deadlock Problem

The Deadlock Problem. Chapter 8: Deadlocks. Bridge Crossing Example. System Model. Deadlock Characterization. Resource-Allocation Graph

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition,

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition! Silberschatz, Galvin and Gagne 2013!

Deadlocks. Prepared By: Kaushik Vaghani

The Deadlock Problem

Principles of Operating Systems

CSC Operating Systems Fall Lecture - XII Deadlocks - III. Tevfik Ko!ar. Louisiana State University. October 6 th, 2009

CS420: Operating Systems. Deadlocks & Deadlock Prevention

Chapter 7: Deadlocks CS370 Operating Systems

Bridge Crossing Example

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

CHAPTER 7 - DEADLOCKS

Roadmap. Deadlock Prevention. Deadlock Prevention (Cont.) Deadlock Detection. Exercise. Tevfik Koşar. CSE 421/521 - Operating Systems Fall 2012

Chapter 8: Deadlocks. The Deadlock Problem

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

Chapter - 4. Deadlocks Important Questions

Chapter 7: Deadlocks

CS370 Operating Systems

CS370 Operating Systems

Deadlocks. Minsoo Ryu. Real-Time Computing and Communications Lab. Hanyang University.

Chapter 8: Deadlocks. Bridge Crossing Example. The Deadlock Problem

Chapter 7: Deadlocks. Chapter 7: Deadlocks. System Model. Chapter Objectives

The Deadlock Problem. A set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set.

Chapter 7: Deadlocks. Chapter 7: Deadlocks. Deadlock Example. Chapter Objectives

Deadlock Risk Management

Operating Systems. Designed and Presented by Dr. Ayman Elshenawy Elsefy

Deadlock. Chapter Objectives

Unit-03 Deadlock and Memory Management Unit-03/Lecture-01

University of Babylon / College of Information Technology / Network Department. Operating System / Dr. Mahdi S. Almhanna & Dr. Rafah M.

Deadlock. A Bit More on Synchronization. The Deadlock Problem. Deadlock Characterization. Operating Systems 2/7/2005. CSC 256/456 - Spring

TDDB68 + TDDD82. Lecture: Deadlocks

OPERATING SYSTEMS. Prescribed Text Book. Operating System Principles, Seventh Edition. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne

CS370 Operating Systems

Operating Systems. Deadlocks. Stephan Sigg. November 30, Distributed and Ubiquitous Systems Technische Universität Braunschweig

Deadlocks. The Deadlock Problem. Bridge Crossing Example. Topics

OPERATING SYSTEMS. Deadlocks

CS370 Operating Systems

Introduction to Deadlocks

COMP 3713 Operating Systems Slides Part 3. Jim Diamond CAR 409 Jodrey School of Computer Science Acadia University

Potential Deadlock Example

Resource Allocation and Deadlock Handling

CSC 539: Operating Systems Structure and Design. Spring 2005

UNIT-3 DEADLOCKS DEADLOCKS

When Deadlock Happens

Contents. Chapter 8 Deadlocks

Deadlocks. System Model

Fall 2015 COMP Operating Systems. Lab 06

Final Exam Review. CPSC 457, Spring 2016 June 29-30, M. Reza Zakerinasab Department of Computer Science, University of Calgary

Operating Systems. Deadlock. Lecture 7 Michael O Boyle

Deadlock. Operating Systems. Autumn CS4023

Maximum CPU utilization obtained with multiprogramming. CPU I/O Burst Cycle Process execution consists of a cycle of CPU execution and I/O wait

Outlook. Deadlock Characterization Deadlock Prevention Deadlock Avoidance

Transcription:

Module 6: Deadlocks Reading: Chapter 7 Objective: To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number of different methods for preventing or avoiding deadlocks in a computer system. 1

Resource owned by other waiting process Characterization System Model Deadlocks Process waits on resource Deadlock Problem Handling Deadlocks 2

The Deadlock Problem A set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set. Recall the example with semaphores semaphores A and B, initialized to 1 P 0 P 1 wait (A); wait(b) wait (B); wait(a) Example law passed by Kansas Legislature When two trains approach each other at a crossing, both shall come to a full stop and neither shall start up again until the other has gone. 3

Instances Resources Operations Request Use Characterization Release System Model Deadlocks Resource owned by other waiting process Process waits on resource Deadlock Problem Handling Deadlocks 4

System Model 5 Resource types R 1, R 2,..., R m CPU cycles, memory space, I/O devices Each resource type R i has W i instances. 2 printers, three hard drives, etc. Each process utilizes a resource as follows (using system calls): request use release Deadlock example Three processes each hold a CD drive. Each process requires a 2 nd drive. Multithreaded programs are good candidates for deadlock Threads share many resources.

Instances Resources Operations Characterization Necessary Conditions Request Mutual Exclusion Hold and Wait Use Release System Model Deadlocks Handling Deadlocks Circular Wait Resource owned by other waiting process Process waits on resource Deadlock Problem No Preemption Resource- Allocation 6Graph Resources Processes Vertex Request Edge Assignment

Deadlock Characterization Deadlock can arise if four conditions hold simultaneously. Mutual exclusion: only one process at a time can use a resource. Hold and wait: a process holding at least one resource is waiting to acquire additional resources held by other processes. No preemption: a resource can be released only voluntarily by the process holding it, after that process has completed its task. Circular wait: there exists a set {P 0, P 1,, P n } of waiting processes such that P 0 is waiting for a resource that is held by P 1, P 1 is waiting for a resource that is held by P 2,, P n 1 is waiting for a resource that is held by P n, and P n is waiting for a resource that is held by P 0. When the first 3 conditions exist, the circular wait is an indication of a deadlock. The first 3 conditions do not imply necessarily a deadlock, since the circular wait may not occur. 7

Resource-Allocation Graph A set of vertices V and a set of edges E. V is partitioned into two types: 8 P = {P 1, P 2,, P n }, the set consisting of all the processes in the system. R = {R 1, R 2,, R m }, the set consisting of all resource types in the system. Edges request edge directed edge P i R j assignment edge directed edge R j P i

Resource-Allocation Graph (Cont.) Process Resource Type with 4 instances P i requests instance of R j P i R j P i is holding an instance of R j P i 9 R j

Example of a Resource Allocation Graph Is there deadlock? 10

Using the graphs Assume that the first three conditions for deadlock exist. Mutual Excl., hold and wait, no pre-emption To show a deadlock, must show that no circular wait exists. A process can terminate without any waiting on another, and then the others. <P 3, P 2, P 1 > is a termination sequence: all processes can terminate in this order. 11

Resource Allocation Graph With A Deadlock Circular waits: P1 R1 P2 R3 P3 R2 P1 P2 R3 P3 R2 P2 No proc. can terminate No possible way out. 12

13 Graph with a circular wait, but not deadlock (why?)

Basic Facts If graph contains no cycles no deadlock. If graph contains a cycle if only one instance per resource type, then deadlock. if several instances per resource type, possibility of deadlock. Must determine if a process can terminate and if so, will it allow other processes to terminate. 14

Instances Resources Operations 15 Characterization Necessary Conditions No Preemption Resource- Allocation Graph Request Mutual Exclusion Hold and Wait Use Resources Processes Vertex Release Request Edge System Model Deadlocks Handling Deadlocks Circular Wait Assignment Resource owned by other waiting process Process waits on resource Deadlock Problem Prevent Avoid No deadlocks Recovery Detection With deadlocks Ignore the problem

Methods for handling deadlocks 16 Do not enter deadlock state Deadlock prevention Disallow 1 of the 4 necessary conditions of deadlock occurrence. Difficult and restraining can lead to low device utilization and low throughput. Deadlock avoidance Do not grant a resource request if this allocation might lead to deadlock. Allow deadlocks Periodically check for the presence of deadlock and then recover from it. Ignore the problem: Ignore the problem and pretend that deadlocks never occur in the system. Used by most operating systems, including UNIX/Windows.

Deadlock Prevention: prevent at least one of the four conditions that lead to deadlock 17 Handling Deadlocks No deadlocks With deadlocks Mutual exclusion: reduce as much as possible the use of shared resources and critical sections (almost impossible). Hold and wait: a process that requests new resources cannot hold up other processes (ask for all resources at once). No pre-emption: If a process asks for resources and cannot obtain them, it is suspended and its resources already held are released. Circular wait: define an request ordering for resources, a process must ask for resources in this order (e.g. always ask for the printer before the tape drive) (see section 7.4.4 in the textbook for more details). Prevent Avoid Recovery Detection Ignore the problem

Deadlock Avoidance 18 Handling Deadlocks No deadlocks Requires that the system has some additional a priori information available. With deadlocks Simplest and most useful model requires that each process declare the maximum number of resources of each type that it may need. The deadlock-avoidance algorithm dynamically examines the resource-allocation state to ensure that there can never be a circular-wait condition. Resource-allocation state is defined by the number of available and allocated resources, and the maximum demands of the processes. Prevent Avoid Recovery Detection Ignore the problem

Safe State When a process requests an available resource, system must decide if immediate allocation leaves the system in a safe state. What is a safe state?! System is in safe state if there exists a safe sequence of all processes. 19

Basic Facts If a system is in safe state no deadlock possible. If a system is in unsafe state possibility of deadlock. Avoidance ensure that a system will never enter an unsafe state. 20

Safe Sequence 21 Safe sequence is a sequence witnessing that we can run all processes to completion P 1 is the process that can be run to completion using only the available resources P 2 is the process that can be completed when P1 completes and releases its resources Sequence <P 1, P 2,, P n > is safe if for each P i, the resources that P i can still request can be satisfied by currently available resources + resources held by all the P j, with j<i. If P i resource needs are not immediately available, then P i can wait until all P j have finished. When P j is finished, P i can obtain needed resources, execute, return allocated resources, and terminate. When P i terminates, P i+1 can obtain its needed resources, and so on.

Resource-Allocation Graph Algorithm 22 First consider the simpler case of one-instance resources Note: in such case, a cycle in the Resource- Allocation graph implies deadlock Lets introduce claim edges: Claim edge P i R j indicates that process P j may request resource R j ; represented by a dashed line. Claim edge is converted to request edge when a process requests a resource. When a resource is released by a process, assignment edge reconverts to a claim edge. Resources must be claimed a priori in the system. The algorithm: if satisfying request creates a cycle in the modified R-A graph (including claim edges), reject the request

23 Resource-Allocation Graph with Claim Edges

24 Unsafe State In Resource-Allocation Graph

Banker s Algorithm For the case when resources have multiple instances. Again, each process must a priori claim the resources it is going to use Must also specify quantity When a process requests a resource it may have to wait, even if the resource is currently available The banker s algorithm decides whether to grant the resource Assumes that when a process gets all resources it wants, within finite amount of time it will finish and release them 25

Data Structures for the Banker s Algorithm Let n = number of processes, and m = number of resources types. Available: Vector of length m. If available[j] = k, there are k instances of resource type R j available. Max: n x m matrix. If Max[i,j] = k, then process P i may request at most k instances of resource type R j. Allocation: n x m matrix. If Allocation[i,j] = k then P i is currently allocated k instances of R j. Need: n x m matrix. If Need[i,j] = k, then P i may need k more instances of R j to complete its task. 26 Need [i,j] = Max[i,j] Allocation [i,j].

Banker s Algorithm for Process P i Describes how to respond to a resource request by process P i. Request = request vector for process P i. If Request i [ j ] = k then process P i wants k instances of resource type R j. 1. If Request i Need i go to step 2. Otherwise, raise error condition, since process has exceeded its maximum claim. 2. If Request i Available, go to step 3. Otherwise P i must wait, since resources are not available. 3. Pretend to allocate requested resources to P i by modifying the state as follows: Available = Available - Request i ; Allocation i = Allocation i + Request i ; Need i = Need i Request i ; If the resulting state is safe the resources are allocated to Pi. If unsafe Pi must wait, and the old resource-allocation state is restored 27

Safety Algorithm 28 But how do we test whether a state is safe? Remember, there must be a safe sequence in a safe state. So, we will try to find a safe sequence. Find a process that can be satisfied with the current resources, give it the resources and let it finish. (include the need ressources). This would be our P1. When P1 finishes, release its resources, and repeat How long should repeat? Until all processes are finished then the state was indeed safe. Or until the we cannot find a process to finish then the state was unsafe. Remember, this is all as-if.

Safety Algorithm 1. Let Work and Finish be vectors of length m and n, respectively. Initialize: Work = Available Finish [i] = false for i = 0,1, 2, 3,, n-1. 2. Find and i such that both: (a) Finish [ i ] = false // not yet finished process (b) Need i Work // that can be finished with available resources If no such i exists, go to step 4. 3. Work = Work + Allocation i Finish[ i ] = true go to step 2. 4. If Finish [ i ] == true for all i, then the initial state was safe, Otherwise, it was unsafe 29

Safety Algorithm 30 Great! Now I understand how it works. Too bad I don t understand why is works. We have tried only one way to find a safe sequence If we failed, a different choice of the satisfiable processes might have lead to a safe sequence, but we just made bad choices leading us to a dead end That is actually not true If we found a satisfiable process, let it run to completion and then released its resources, we are better off (more resources available) then how we started So, it does not harm us to choose any satisfiable process

Example of Banker s Algorithm 5 processes P 0 through P 4 ; 3 resource types A (10 instances), B (5 instances), and C (7 instances). Snapshot at time T 0 : Is the system safe? Allocation Max Available Need A B C A B C A B C A B C P 0 0 1 0 7 5 3??? 7 4 3 P 1 2 0 0 3 2 2 1 2 2 P 2 3 0 2 9 0 2 6 0 0 P 3 2 1 1 2 2 2??? P 4 0 0 2 4 3 3??? 31

Example: P 1 requests (1,0,2) Check that Request Need[1](i.e, (1,0,2) (1,2,2)) true. Check that Request Available (i.e, (1,0,2) (3,3,2)) true. Allocation Need Available A B C A B C A B C P 0 0 1 0 7 4 3 2 3 0 P 1 3 0 2 0 2 0 P 2 3 0 1 6 0 0 P 3 2 1 1 0 1 1 P 4 0 0 2 4 3 1 Executing safety algorithm shows that sequence <P1, P3, P4, P0, P2> satisfies safety requirement. Can request for (3,3,0) by P4 be granted? Can request for (0,2,0) by P0 be granted? 32

Deadlock Detection Handling Deadlocks Prevent Avoid Recovery Detection Ignore the problem No deadlocks With deadlocks Resource access are granted to processes whenever possible. The OS needs: an algorithm to check if deadlock is present an algorithm to recover from deadlock The deadlock check can be performed at every resource request Such frequent checks consume CPU time 33

Single Instance of Each Resource Type Maintain wait-for graph Nodes are processes. P i P j if P i is waiting for P j. Periodically invoke an algorithm that searches for a cycle in the graph. Requires an order of n 2 operations, where n is the number of vertices in the graph. Don t want to run it too often 34

Resource-Allocation Graph and Wait-for Graph Resource-Allocation Graph Corresponding wait-for graph 35

Several Instances of a Resource Type Available: A vector of length m indicates the number of available resources of each type. Allocation: An n x m matrix defines the number of resources of each type currently allocated to each process. Request: An n x m matrix indicates the current request of each process. If Request [i j ] = k, then process P i is requesting k more instances of resource type. R j. 36

Detection Algorithm Idea: Reuse the ideas from the Safety algorithm Essentially, check whether it is possible from the current state to finish all processes In other words, try to construct a safe sequence if succeeded, not it deadlock (at least not yet) if failed (some processes have not been finished), these processes are deadlocked The processes that do not hold resources are considered finished (they are not blocking others, so they cannot participate in a deadlock cycle) 37

Detection Algorithm 1. Let Work and Finish be vectors of length m and n, respectively Initialize: (a) Work = Available // as-if, remember (b)for i = 1,2,, n, if Allocation i 0 or Request i 0 then Finish[i] = false; otherwise, Finish[i] = true 2. Find an index i such that both: (a) Finish[i] == false (b)request i Work If no such i exists, go to step 4. 38

Detection Algorithm (Cont.) 3. Work = Work + Allocation i Finish[i] = true go to step 2. 4. If Finish[i] == false, for some i, 1 i n, then the system is in deadlock state. Moreover, if Finish[i] == false, then P i is deadlocked. Algorithm requires an order of O(m x n 2 ) operations to detect whether the system is in deadlocked state. 39

Example of Detection Algorithm Five processes P 0 through P 4 ; three resource types A (7 instances), B (2 instances), and C (6 instances). Snapshot at time T 0 : Allocation Request Available A B C A B C A B C P 0 0 1 0 0 0 0 0 0 0 P 1 2 0 0 2 0 2 P 2 3 0 3 0 0 0 P 3 2 1 1 1 0 0 P 4 0 0 2 0 0 2 Sequence <P 0, P 2, P 3, P 1, P 4 > will result in Finish[i] = true for all i. 40

Example (Cont.) P 2 requests an additional instance of type C. State of system? Request A B C P 0 0 0 0 P 1 2 0 1 P 2 0 0 1 P 3 1 0 0 P 4 0 0 2 Can reclaim resources held by process P 0, but insufficient resources to fulfill other processes requests. Deadlock exists, consisting of processes P 1, P 2, P 3, and P 4. 41

Detection-Algorithm Usage When, and how often, to invoke depends on: How often a deadlock is likely to occur? How many processes will be affected by the deadlock when detected? 42 If detection algorithm is invoked arbitrarily, there may be many cycles in the resource graph Difficult to tell which of the many deadlocked processes caused the deadlock.

Recovery from Deadlock: Process Termination Handling Deadlocks Prevent Avoid No deadlocks Recovery Detection With deadlocks Ignore the problem Abort all deadlocked processes. Abort one process at a time until the deadlock cycle is eliminated. 43 In which order should we choose to abort? Priority of the process. How long process has computed, and how much longer to completion. Resources the process has used. Resources process needs to complete. How many processes will need to be terminated. Is process interactive or batch?

Recovery from Deadlock: Resource Preemption Selecting a victim minimize cost. Rollback return to some safe state, restart process for that state. Need to create and maintain checkpoints for rolling back to safe points Starvation same process may always be picked as victim, Include number of rollback in cost factor. 44

Instances Resources Operations 45 Characterization Necessary Conditions No Preemption Resource- Allocation Graph Request Mutual Exclusion Hold and Wait Ressources Processes Use Vertex Release Request System Model Deadlocks Handling Deadlocks Circular Wait Edge Assignment Resource owned by other waiting process Process waits on resource Deadlock Problem Prevent Avoid No deadlocks Recovery Detection With deadlocks Ignore the problem