wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Diya Singh
Aug 13, 2024
0 Likes
0 Discussions
111 Reads

What is Deadlock?

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. 

Disadvantages of Deadlock:

Deadlock is an infinite process it means that once a process goes into deadlock it will never come out of the loop and the process will enter for an indefinite amount of time. There are only detection, resolution, and prevention techniques. But, there are no Deadlock-stopping techniques.

How Deadlock can occur?

Lets consider following situation:

  • Process1 obtains Resource1
  • Process2 obtains Resource2

Process 1 requires Resource 2 to continue execution but is unable to do so because Process 2 is currently holding Resource 2. Similarly, Process 2 requires Resource 1 to continue execution but is unable to do so because Process 1 is currently holding Resource 1. Both processes are now stuck in a loop:

  • Process 1 is awaiting Resource 2 from Process 2.
  • Process 2 is awaiting Resource 1 from Process 1.

We have a deadlock because neither process can release the resource it is holding until it completes its task, and neither can proceed without the resource the other process is holding. Both processes are effectively “deadlocked,” unable to move forward. To break the deadlock and free up resources for other processes in this situation, an external intervention, such as the operating system killing one or both processes, would be required.

Necessary conditions for the occurrence of deadlock:

1) Mutual Exclusion:

Mutual Exclusion condition requires that at least one resource be held in a non-shareable mode, which means that only one process can use the resource at any given time. 

As an example:

  • Process 1 obtains Resource 1
  • Process 2 acquires Resource 2

2) Hold and Wait:

The hold and wait condition specifies that a process must be holding at least one resource while waiting for other processes to release resources that are currently held by other processes. In our example,

  • Process 1 has Resource 1 and is awaiting Resource 2.
  • Process 2 currently has Resource 2 and is awaiting Resource 1.
  • Both processes hold one resource while waiting for the other, satisfying the hold and wait condition.

3) No Preemption:

Preemption is the act of taking a resource from a process before it has finished its task. According to the no preemption condition, resources cannot be taken forcibly from a process a process can only release resources voluntarily after completing its task. 

For example – Process1 have resource1 and requesting for resource2 that is hold by process2. then process1 preempt resource1 and after some time it try to restart by requesting both resource1 and resource2.

4) Circular Wait:

This condition implies that circular processes must exist, with each process waiting for a resource held by the next process in the chain. In our scenario, Process 1 is waiting for Resource 2, which is being held by Process 2. Process 2 is awaiting Resource 1 from Process 1. This circular chain of dependencies causes a deadlock because neither process can proceed, resulting in a system shutdown.

Conclusion:

Deadlocks are major problems in computers in which two or more processes remain blocked forever, each waiting for the other to release resources. A deadlock requires four conditions: mutual exclusion, hold and wait, no preemption, and circular wait. Deadlocks consume resources and reduce system performance, hence their avoidance, detection, and resolution are critical in operating systems.


Comments ()


Sign in

Read Next

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Logical and physical address

Blog banner

Starvation

Blog banner

Concurrency management in operating systems

Blog banner

Oracle Corporation

Blog banner

Data Science & AI

Blog banner

Some facts about Technology

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Modern operating system

Blog banner

Process Description

Blog banner

Python as a tool for data analysis

Blog banner

LIMITED EDITION

Blog banner

 " Healing of Yoga "

Blog banner

Understanding Mobile Device Forensics

Blog banner

Virtual memory in Operating System

Blog banner

Why we fail after giving 100% ?

Blog banner

Memory Management

Blog banner

Types of Malware in Cyber Security

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Python as a tool for Data science task & project

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Cyber Forensics

Blog banner

NodeJs

Blog banner

10 Unknown facts about India's Independence

Blog banner

Memory Management

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Key to success in Sports

Blog banner

Evolution of operating systems

Blog banner

rupee

Blog banner

Types of Malware in Cyber Security

Blog banner

Asana

Blog banner

GIS info about Bermuda Triangle

Blog banner

Cache Memory

Blog banner

Mumbai famous street food

Blog banner

Virtual Machine

Blog banner

Twisted world

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Health and fitness in technology

Blog banner

Dudhasagar waterfall ?

Blog banner

Interrupts - Types, Working & Importance

Blog banner

My First Dream Bike

Blog banner