wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in operating system

profile
Dhruv Koladiya
Aug 11, 2024
0 Likes
0 Discussions
84 Reads

A deadlock in an operating system is a situation where a set of processes become stuck because each process is waiting for a resource that another process holds. Since no process can proceed until the resource it needs becomes available, and the resources are all tied up, the system effectively "locks up.

Conditions for Deadlock

For a deadlock to occur, four conditions must hold simultaneously:

Mutual Exclusion: At least one resource must be held in a non-shareable mode; only one process can use the resource at a time.

Hold and Wait: A process holding at least one resource is waiting to acquire additional resources that are currently being held by other processes.

No Preemption: Resources cannot be forcibly removed from the processes holding them until the process voluntarily releases the resource.

Circular Wait: There must be a circular chain of processes where each process holds at least one resource and is waiting for a resource held by the next process in the chain.

Example of Deadlock

Imagine two processes, P1 and P2, and two resources, R1 and R2

P1 holds R1 and is waiting to acquire R2.

P2 holds R2 and is waiting to acquire R1.


Comments ()


Sign in

Read Next

Jira service Management

Blog banner

E-Governance

Blog banner

What is service level Agreement?

Blog banner

Deadlock and Starvation

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Memory input output management

Blog banner

Rain

Blog banner

Deadlock

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Mumbai

Blog banner

I/O Management and Disk Scheduling

Blog banner

MODERN OPERATING SYSTEM

Blog banner

BUFFER OVERFLOW_142

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Music helps reduce stress

Blog banner

Service transistion under difficult conditions

Blog banner

What are Virtual Machines

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

What is Data, Information and Knowledge?

Blog banner

Operating Systems

Blog banner

Caching windows

Blog banner

Visualization in Data Science

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Virtual Machine

Blog banner

Balance

Blog banner

Memory management

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

DATA WRANGLING

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Paginng In OS

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

 " Healing of Yoga "

Blog banner

Threat management

Blog banner

Heart Fulness Meditation

Blog banner

Operating system

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

The functions of operating system

Blog banner

The Right way of cooking

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

"Mahakali cave"

Blog banner