Skip to main content

Deadlock Handling In Operating System

     ⇰ DEADLOCK AVOIDANCE :-

As we know Deadlock-prevention algorithms only prevent deadlocks by limiting how requests can be made. The limits ensure that at least one of the necessary conditions for deadlock cannot occur. Side effects of deadlock prevention are low device utilization and reduced throughput. Avoidance of deadlock require additional information about how resources are to be requested.

 For example, in a system with one tape drive and a printer, the system might need to know that process P will request first the tape drive and then the printer before releasing both resources, whereas process Q will request first the printer and then the tape drive. With this prior information of the complete sequence of requests and releases of resources the system can decide for each request whether or not the process should wait in order to avoid a possible future deadlock.

 The simplest and most useful model requires that each process declare the maximum number of resources of each type that it may need. Given this a priori information, it is possible to construct an algorithm that ensures that the system will never enter a deadlocked state. A deadlock-avoidance algorithm dynamically examines the resource-allocation state to ensure that a circular-wait condition can never exist.



     ⇰ DEADLOCK DETECTION :-

If a system does not apply either a deadlock-prevention or a deadlock avoidance algorithm, then a deadlock situation may occur. In this environment the system may provide :-
   ∘ An algorithm that examines  where a deadlock has occurred.
   ∘ An algorithm to recover from the deadlock. 

To detect deadlock, the system needs to maiontain the 'wait-for' graph and priodically invoke an algorithm that searchs for a cycle in the graph.The deadlock exists in the system if and only if the 'wait-for'graph contains a cycle. Hence, for detecting deadlock the algorithm searches for a cycle in the graph.
CPS 356 Lecture notes: Deadlock
Wait-For Graph







If deadlock occurs frequently, then the detection algorithm should  also be invoked frequently. We can invoke the deadlock detection algorithm every time a request for allocation cannot be granted immediately. By this we can identify not only the deadlocked set of processes but also the specific process that cause the deadlock.

Ofcourse, invoking the deadlock-detection algorith for every request will increase considerable overhead in computational time. A less expensive alternative is simply to invoke the algorithm at definite intervals.



   ⇰ RECOVERY FROM DEADLOCK :-


When a detection algorithm determines that a deadlock exists one possibility is to inform the operator that a deadlock has occurred and to let the operator deal with the deadlock manually. Another possibility is to let the system recover from the deadlock automatically.


 There are two options for breaking a deadlock. One is simply to abort one or more processes to break the circular wait. The other is to preempt some resources from one or more of the deadlocked processes.

To eliminate deadlocks by aborting a process, we use any of two methods. In both methods, the system reclaims all resources allocated to the terminated processes. 
• Abort all deadlocked processes. This method clearly will break the deadlock cycle, but at great expense. 
• Abort one process at a time until the deadlock cycle is eliminated. 

To eliminate deadlocks using resource preemption, we successively preempt some resources from processes and give these resources to other processes until the deadlock cycle is broken.



click here for discussion of deadlock and its characterization

Share, Follow and please comment if you find anything incorrect, or to share more information about the topic discussed above.

Comments

  1. Very good ……. We are getting a lot of help…. Like this, make it further on the new topic...Really helpful ...keep it up

    ReplyDelete

Post a Comment

Please comment.

Popular posts from this blog

Process Scheduling And Types of Process Schedular :-

        ⇰ PROCESS SCHEDULING Process Scheduling  is a task  of Operating System that schedules processes of different states like new, ready, waiting, terminated  and running.This scheduling helps in allocation of CPU time for each process, and Operating System allocates the CPU time for each procss. And the process scheduling plays important role to keep the CPU busy all the time.  ⏩   Followings are some objectives of Process Scheduling :-  i > To increase the amount of users within acceptable response times.  ii > To maintain the balance between response and utilization of system. iii > To decrease the enforce priorities and  give reference to the processes holding the key resources.      ⇰  PROCESS SCHEDULAR A scheduler carries out the pro cess scheduling work. Schedulers are often implemented so they keep all computer resources busy and  allows multiple users to share system resources  to achieve  multiprogramming .  There are  mainy three types of pro

Tokens and its types in 'C'

   Tokens are the smallest individual unit of a program or in simple words it is a main part of C program.Tokens are the building blocks of any program. The smallest individual and basic unit of a C programming is called c tokens.      *    Normally there are six types of tokens in C:- i> Keywords:-          Keywords are special words that are used to give a special meaning to the program and can't be used as variable and constant.They are basically a sequence of characters that have fixed to mean. For example:-                 auto     double      long     break                 float    short        char     if                while    continue   int       void etc. All keywords must be written in lower case.It is 32 in number. ii> Identifiers:-         The identifiers are basically a token. It can be a variable's name or a label's name. So identifiers are actually a user defined data. But there are certain rules to frame an identifier. They are as follo

Micromax 'The Indian Smart Phone Company'

Micromax  is an Indian  consumer electronics  company headquartered in  Gurgaon ,  Haryana . It was established as an  IT   Software  company operating in the  Embedded Devices   Domain . It later entered the  Mobile   Handset  business. Micromax was incorporated as Micromax Informatics Ltd. on 29 March 2000 by Zeeshan Ali Zaidi. It began selling mobile telephones in 2008,  focusing on  low pricing to compete with international brands. By 2010, Micromax was one of the largest domestic companies making handsets in the low-cost feature phone segment in India. As of Q3 2014, Micromax is the  Tenth Largest   Smart phone  vendor in the world. The company is facing stiff competition from Chinese companies that are penetrating the Indian market. The company also owns  YU Televentures , which sells its products under the brand name YU. The company has also introduced handsets with innovative features. For instance, Micromax's co-founder  Rahul Sharma  once saw a  public call