1 / 50

CH 3 Deadlock

CH 3 Deadlock. When 2 (or more) processes remain blocked forever !. Process a Down x Gets x Down y Blocks. Process b Down y Gets y Down x Blocks. How can this happen?. Both are blocked forever !. Resources. Things for which we request exclusive access.

benjy
Download Presentation

CH 3 Deadlock

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CH 3 Deadlock When 2 (or more) processes remain blocked forever!

  2. Process a Down x Gets x Down y Blocks Process b Down y Gets y Down x Blocks How can this happen? Both are blocked forever!

  3. Resources • Things for which we request exclusive access. • Ex. db, files, shared memory, printer, cd/dvd writer, tape drive, etc. • Types • Preemptable – can be taken away w/out ill effects • Non preemptable – cannot be take away w/out causing a failure!

  4. Resource examples • Memory – preemptable • CPU – preemptable • CD writing – non preemptable • Printing – non preemptable • We will only consider non preemptable (the harder problem).

  5. Using a semaphore to protect one resource.

  6. Using two semaphores to protect two resource.

  7. Deadlock • A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause.

  8. Conditions for deadlock • Mutual exclusion • Hold and wait • No preemption • Circular wait (Need all of these (all necessary).)

  9. Resource allocation graph resource process

  10. (Directed)Graphs • A graph G = (V,E) where V = vertex set and E = edge set • Ordered pairs of vertices • Ex. Let G = (V,E) where V = { C, D, T, U } and E = { <D,U>, <U,C>, <C,T>, <T,D> }

  11. Representing digraphs • The simplest method is to use a 2D array where g[i][j] = 1 indicates that an edge exists from i to j. • Initially, set all elements of g to 0. • Let processes be represented by a single, lowercase letter: a..z. • Let resources be represented by integers in the range [1..50].

  12. 10 a Representing digraphs b 2 • The simplest method is to use a 2D array where g[i][j] = 1 indicates that an edge exists from i to j. • Input to your program consists of lines read in from an ASCII text file. Edges in the graph are represented by each line in the file. For example, consider the following: 10 a b 2 • The line 10 a is an edge from resource 10 to process a in the graph indicating that process a holds resource 10. • The line b 2 is an edge from process b to resource 2 in the graph indicating that process b wants (is requesting) resource 2. • Note that this graph does not contain any cycles. • So how do we use g to represent this graph?

  13. 10 a Representing digraphs b 2 • The simplest method is to use a 2D array where g[i][j] = 1 indicates that an edge exists from i to j. • Input to your program consists of lines read in from an ASCII text file. Edges in the graph are represented by each line in the file. For example, consider the following: 10 a b 2 • The line 10 a is an edge from resource 10 to process a in the graph indicating that process a holds resource 10. • The line b 2 is an edge from process b to resource 2 in the graph indicating that process b wants (is requesting) resource 2. • Note that this graph does not contain any cycles. • So how do we use g to represent this graph? g[10][‘a’] = 1; g[‘b’][2] = 1;

  14. Another example 1 c Here is another example: d 1 1 c c 2 2 d which could also be represented by: c 2 d 1 1 c 2 d Note that the order of lines in the input file is arbitrary. These graphs contain a cycle. d 2

  15. Dealing w/ deadlock • Ignore it (ostrich algorithm). • Detect and recover. • Avoid by careful resource allocation. • Disallow one or more of the conditions necessary for deadlock.

  16. 1. Ostrich algorithm • Ignore it; pretend it doesn’t happen!

  17. 2. Detect and recover • Detection with one resource of each type • Detection with multiple resources of each type

  18. Detection with one resource of each type • Detect cycle in digraph • For each vertex v in graph, • search the subtree rooted at v • see if we visit any vertex twice (by keeping a record of already visited vertices).

  19. T

  20. Detection with multiple resources of each type • Skip.

  21. Recovery • Preemption • Rollback (using checkpoints) • Kill process

  22. Recovery: preemption • Temporarily take back needed resource • Ex. Printer • Pause at end of page k • Start printing other job • Resume printing original job starting at page k+1

  23. Recovery: rollback • Checkpoint – save entire process state (typically right before the resource was allocated) • When deadlock is detected, we kill the checkpointed process, freeing the resource, and then later restart the killed process starting at the checkpoint. • Requires apps that can be restarted in this manner.

  24. Rdb’s & commit/rollback From p. 62, http://www.postgresql.org/files/documentation/pdf/8.0/postgresql-8.0-US.pdf

  25. Recovery: kill process • Requires apps that can be restarted from the beginning.

  26. Deadlock avoidance

  27. Deadlock avoidance • Safe state = not deadlocked and there exists some scheduling order in which every process can run to completion even if all of them suddenly request their max number of resources immediately • Unsafe != deadlocked

  28. Safe states

  29. Unsafe states With only 4 free, neither A nor C can be completely satisfied.

  30. Banker’s algorithm (SR = for single resource type)

  31. Banker’s algorithm (SR) • Grant only those requests that lead to safe states. • Requires future information.

  32. Banker’s algorithm (SR) • (b) is safe because from (b) we can give C 2 more (free=0) then C completes (free=4) then give either B or D . . .

  33. Banker’s algorithm (SR) • (c) is unsafe because no max can be satisfied

  34. Banker’s algorithm (MR = for multiple resource types)

  35. Banker’s algorithm (MR) N: (need) E=existing (total); constant P=possessed (allocated/held) A=available (free) ∑

  36. Banker’s algorithm (MR) To check for a safe state: • Look for a row, R, in N <= A. • Assume the process of the chosen row requests all resources, runs to completion, and terminates (giving back all of its resources to A). • Repeat steps 1 and 2 until either all processes either terminate (indicating that the initial state was safe) or deadlock occurs.

  37. Banker’s algorithm (MR) To check for a safe state: • Look for a row, R, in N <= A. A (available) can completely satisfy D’s needs.

  38. Banker’s algorithm (MR) Previous: E=(6342) P=(5322) A=(1020) To check for a safe state: • Look for a row, R, in N <= A. • Assume the process of the chosen row requests all resources, runs to completion, and terminates (giving back all of its resources to A). After D terminates: E=(6342) P=(4221) A=(2121)

  39. Banker’s algorithm (MR) Previous: E=(6342) P=(5322) A=(1020) To check for a safe state: • Look for a row, R, in N <= A. E=(6342) P=(4221) A=(2121)

  40. Banker’s algorithm (MR) Previous: E=(6342) P=(4221) A=(2121) To check for a safe state: • Look for a row, R, in N <= A. • Assume the process of the chosen row requests all resources, runs to completion, and terminates (giving back all of its resources After A terminates: E=(6342) P=(1210) A=(5132)

  41. Banker’s algorithm (MR) Previous: E=(6342) P=(4221) A=(2121) To check for a safe state: • Look for a row, R, in N <= A. E=(6342) P=(1210) A=(5132)

  42. Banker’s algorithm (MR) Previous: E=(6342) P=(1210) A=(5132) To check for a safe state: • Look for a row, R, in N <= A. E=(6342) P=(1110) A=(5232)

  43. Banker’s algorithm (MR) Previous: E=(6342) P=(1210) A=(5132) To check for a safe state: • Look for a row, R, in N <= A. E=(6342) P=(1110) A=(5232)

  44. Deadlock prevention

  45. Deadlock prevention • Attack (disallow): • Mutual exclusion • Hold and wait • No preemption • Circular wait

  46. Deadlock prevention: attack mutex • Ex. Use spooling instead of mutex on printer • Not all problems lend themselves to spooling • Still have contention for disk space with spooling

  47. Deadlock prevention: attack hold & wait • Request (wait for) all resources prior to process execution • Problems: • We may not know a priori. • We tie up resources for entire time. • Before requesting a resource, we must first temporarily release all allocated resources and then try to acquire all of them again.

  48. Deadlock prevention: attack no preemption • Tricky at best. • Impossible at worst.

  49. Deadlock prevention: attack circular wait • Only allow one resource at a time. • Request all resources in (some globally assigned) numerical order. • But no numerical ordering may exist!

More Related