In the previous post, we have discussed Deadlock Prevention and Avoidance. In this post, Deadlock Detection and Recovery technique to handle deadlock is discussed.
- If resources have single instance:
In this case for Deadlock detection we can run an algorithm to check for cycle in the Resource Allocation Graph. Presence of cycle in the graph is the sufficient condition for deadlock.
In the above diagram, resource 1 and resource 2 have single instances. There is a cycle R1 → P1 → R2 → P2. So, Deadlock is Confirmed.
- If there are multiple instances of resources:
Detection of the cycle is necessary but not sufficient condition for deadlock detection, in this case, the system may or may not be in deadlock varies according to different situations.
A traditional operating system such as Windows doesn’t deal with deadlock recovery as it is time and space consuming process. Real-time operating systems use Deadlock recovery.
- Recovery method
- Killing the process: killing all the process involved in the deadlock. Killing process one by one. After killing each process check for deadlock again keep repeating the process till system recover from deadlock.
- Resource Preemption: Resources are preempted from the processes involved in the deadlock, preempted resources are allocated to other processes so that there is a possibility of recovering the system from deadlock. In this case, the system goes into starvation.
- Operating System | Deadlock detection algorithm
- Operating System | Deadlock detection in Distributed systems
- Techniques used in centralized approach of deadlock detection in distributed systems
- Deadlock, Starvation, and Livelock
- Deadlock Prevention And Avoidance
- Operating Systems | Deadlock | Question 2
- Operating Systems | Deadlock | Question 1
- DBMS | Introduction to TimeStamp and Deadlock Prevention Schemes
- Operating System | Process Management | Deadlock Introduction
- Program for Deadlock free condition in Operating System
- Operating System | Translation Lookaside Buffer (TLB)
- Operating System | The Linux Kernel
- Computer Organization | Random Access Memory (RAM) vs Hard Disk Drive (HDD)
- Operating System | Privileged and Non-Privileged Instructions
See Quiz on Deadlock.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above
Improved By : VaibhavRai3