wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Darshan Somaiya
Aug 16, 2024
1 Like
0 Discussions
149 Reads

DEADLOCK


Deadlock is a situation in an operating system where a set of processes become stuck because each process in the set is waiting for another process to release resources. This leads to a cascade of dependencies where nothing can really progress, thus halting everything.


Four Conditions for Deadlock 

A deadlock can only occur when the following four conditions are met simultaneously:


1. Mutual Exclusion: At least one resource must be held in a non-sharable mode, and only one process can use the resource at a time.


2. Hold and Wait: A process holding at least one resource is waiting to acquire additional resources that are currently held by other processes.


3. No Preemption: Resources cannot be preempted from the process holding them; they can only be released voluntarily by the process.


4. Circular Wait: There is a set of processes such that each process in the chain is waiting for another which is ahead, forming a circle.


Example Scenario:

Suppose there are two processes and two resources. P1 process requests R1, and P2 requests R1 & holds R2. Neither process will release the resources it currently holds, and neither can proceed until it is able to acquire a resource that both processes are waiting on for completion. Therefore, both stall simultaneously, giving rise to deadlock.


Deadlock Prevention and Avoidance 

Operating systems employ various strategies to prevent or avoid deadlock:


- Deadlock Prevention: This is a set of methods for ensuring that at least one of the necessary conditions cannot hold. It can be done by requiring all processes to ask for resources at once or by preventing circular wait, etc.


- Deadlock Avoidance: It employs algorithms like the Banker’s Algorithm, which dynamically check the state of resource allocation to make sure a system will never enter an unsafe state where deadlock can happen.


Some systems may allow deadlocks to occur but have standby algorithms in place for detection and recovery, such as terminating one or more processes involved to free up resources.


Comments ()


Sign in

Read Next

Chicken Dum Biryani

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

An Overivew Of Cache Memory

Blog banner

Blockchain

Blog banner

Virtual Memory

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Digital Forensics Challenges and Tools

Blog banner

therapist blog

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Memory Management - operating system

Blog banner

Banaras

Blog banner

Vulnerability Assessment

Blog banner

I/O buffer and its techniques

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Introduction my self

Blog banner

SQL Injection

Blog banner

Session Vulnerabilities

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Service Catalogue Management

Blog banner

OS assignment 3

Blog banner

Health and fitness

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Indian Culture and Tradition

Blog banner

History of Money

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Odoo

Blog banner

K-means use cases

Blog banner

Have You Explored India Yet?

Blog banner

Semaphores

Blog banner

Some web vulnerabilities

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Evolution of Operating System

Blog banner

SPAM

Blog banner

What is Data, Information and Knowledge?

Blog banner

Short note on Microsoft office

Blog banner

Threads in OS

Blog banner