wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Diya Singh
Aug 13, 2024
0 Likes
0 Discussions
111 Reads

What is Deadlock?

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. 

Disadvantages of Deadlock:

Deadlock is an infinite process it means that once a process goes into deadlock it will never come out of the loop and the process will enter for an indefinite amount of time. There are only detection, resolution, and prevention techniques. But, there are no Deadlock-stopping techniques.

How Deadlock can occur?

Lets consider following situation:

  • Process1 obtains Resource1
  • Process2 obtains Resource2

Process 1 requires Resource 2 to continue execution but is unable to do so because Process 2 is currently holding Resource 2. Similarly, Process 2 requires Resource 1 to continue execution but is unable to do so because Process 1 is currently holding Resource 1. Both processes are now stuck in a loop:

  • Process 1 is awaiting Resource 2 from Process 2.
  • Process 2 is awaiting Resource 1 from Process 1.

We have a deadlock because neither process can release the resource it is holding until it completes its task, and neither can proceed without the resource the other process is holding. Both processes are effectively “deadlocked,” unable to move forward. To break the deadlock and free up resources for other processes in this situation, an external intervention, such as the operating system killing one or both processes, would be required.

Necessary conditions for the occurrence of deadlock:

1) Mutual Exclusion:

Mutual Exclusion condition requires that at least one resource be held in a non-shareable mode, which means that only one process can use the resource at any given time. 

As an example:

  • Process 1 obtains Resource 1
  • Process 2 acquires Resource 2

2) Hold and Wait:

The hold and wait condition specifies that a process must be holding at least one resource while waiting for other processes to release resources that are currently held by other processes. In our example,

  • Process 1 has Resource 1 and is awaiting Resource 2.
  • Process 2 currently has Resource 2 and is awaiting Resource 1.
  • Both processes hold one resource while waiting for the other, satisfying the hold and wait condition.

3) No Preemption:

Preemption is the act of taking a resource from a process before it has finished its task. According to the no preemption condition, resources cannot be taken forcibly from a process a process can only release resources voluntarily after completing its task. 

For example – Process1 have resource1 and requesting for resource2 that is hold by process2. then process1 preempt resource1 and after some time it try to restart by requesting both resource1 and resource2.

4) Circular Wait:

This condition implies that circular processes must exist, with each process waiting for a resource held by the next process in the chain. In our scenario, Process 1 is waiting for Resource 2, which is being held by Process 2. Process 2 is awaiting Resource 1 from Process 1. This circular chain of dependencies causes a deadlock because neither process can proceed, resulting in a system shutdown.

Conclusion:

Deadlocks are major problems in computers in which two or more processes remain blocked forever, each waiting for the other to release resources. A deadlock requires four conditions: mutual exclusion, hold and wait, no preemption, and circular wait. Deadlocks consume resources and reduce system performance, hence their avoidance, detection, and resolution are critical in operating systems.


Comments ()


Sign in

Read Next

Study of Backdoor and Trojan tools

Blog banner

Street foods

Blog banner

Memory management and virtual memory

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Security Threats Faced and Countermeasures adopted by Organizations to avoid them

Blog banner

Different types of scam Fraud

Blog banner

Travel: Everything Everywhere!

Blog banner

virtual machines and virtualization

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Texting is actually better than talking in person

Blog banner

Functions Of Operating Systems

Blog banner

RAID - LEVELS OF RAID

Blog banner

Memory Management in Operating System

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Smartsheet

Blog banner

Europe Through My Lens

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

MOVEMBER

Blog banner

Sage business cloud accounting

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

What type of stock broker do I need?

Blog banner

The launch of UniMap by HERE

Blog banner

Google App Engine

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

ASANA- A Management System.

Blog banner

Supervised and unsupervised learning

Blog banner

How to make Pancakes

Blog banner

Mariana Trench: The deepest depths

Blog banner

Education: Key to your Prosperity

Blog banner

Modern Operating Systems

Blog banner

Mesh Topology

Blog banner

E-commerce

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Know your Processors!

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Culture Of Ladakh

Blog banner