SlideShare a Scribd company logo
1 of 13
DEADLOCK
IN OS
UNDERSTANDING
DEADLOCKS IN OPERATING
SYSTEMS Yashwanth Redddy Kondakind
Sanjeevlu Buggargani
Koushik Reddy Malle
CONTENTS
• WHAT IS DEADLOCK?
• EXAMPLE OF DEADLOCK
• NECESSARY CONDITIONS FOR DEADLOCK
• DEADLOCK PREVENTION
• DEADLOCK DETECTION AND RECOVERY
• DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS
• CONCLUSION
WHAT IS
DEADLOCK?
• DEADLOCK IS A SITUATION IN WHICH
TWO OR MORE PROCESSES ARE UNABLE
TO PROCEED BECAUSE EACH IS WAITING
FOR ONE OF THE OTHERS TO COMPLETE
SOME OPERATION.
EXAMPLE
LET’S UNDERSTAND WITH A REAL-LIFE ANALOGY.
JOHN AND AMY ARE BROTHER-SISTER.
THEY BOTH ARE IN A DEADLOCK STATE AS
AMY WANTS A LAPTOP WHICH JOHN IS
HAVING AND IS NOT IN THE MOOD TO
GIVE IT TO HIS SISTER. AND AMY HAS A TV
REMOTE WHICH JOHN WANTS, BUT AMY IS
NOT GIVING IT TO HIM.
NECESSARY
CONDITIONS FOR
DEADLOCK
• MUTUAL EXCLUSION
• HOLD AND WAIT
• NO PREEMPTION
• CIRCULAR WAIT
NECESSARY CONDITIONS FOR DEADLOCK
MUTUAL EXCLUSION:
• AT LEAST ONE RESOURCE MUST BE HELD IN A NON-SHAREABLE
MODE, MEANING ONLY ONE PROCESS CAN USE THE RESOURCE
AT A TIME.
• THIS CONDITION ENSURES THAT ONCE A PROCESS HOLDS A
RESOURCE, NO OTHER PROCESS CAN ACCESS IT UNTIL THE
HOLDING PROCESS RELEASES IT.
HOLD AND WAIT:
• PROCESSES MUST HOLD RESOURCES WHILE WAITING FOR
ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY
OTHER PROCESSES.
• EACH PROCESS RETAINS AT LEAST ONE RESOURCE AND IS
WAITING TO ACQUIRE ADDITIONAL RESOURCES HELD BY
OTHER PROCESSES.
NECESSARY CONDITIONS FOR DEADLOCK
NO PREEMPTION:
• RESOURCES CANNOT BE FORCIBLY TAKEN AWAY FROM THE PROCESSES THAT
HOLD THEM.
• IF A PROCESS IS HOLDING A RESOURCE AND NEEDS ADDITIONAL RESOURCES
THAT ARE CURRENTLY HELD BY OTHER PROCESSES, IT CANNOT FORCIBLY TAKE
THOSE RESOURCES.
CIRCULAR WAIT:
• THERE MUST EXIST A SET OF WAITING PROCESSES {P1, P2, ..., PN}, WHERE P1 IS
WAITING FOR A RESOURCE HELD BY P2, P2 IS WAITING FOR A RESOURCE HELD
BY P3, ..., AND PN IS WAITING FOR A RESOURCE HELD BY P1, RESULTING IN A
CIRCULAR CHAIN OF DEPENDENCIES.
• EACH PROCESS IN THE CYCLE IS WAITING FOR A RESOURCE THAT IS HELD BY
THE NEXT PROCESS IN THE CYCLE, LEADING TO A DEADLOCK SITUATION WHERE
NO PROCESS CAN PROCEED
DEADLOCK
PREVENTION
STRATEGIES FOR PREVENTING
DEADLOCKS:
1. RESOURCE ALLOCATION
GRAPH (RAG)
2. DEADLOCK AVOIDANCE
3. RESOURCE ORDERING
4. LIMITING HOLD AND WAIT
5. PREEMPTIVE RESOURCE
ALLOCATION
DEADLOCK DETECTION AND
RECOVERY
1. DEADLOCK DETECTION:
DEFINITION:: DEADLOCK DETECTION INVOLVES PERIODICALLY CHECKING THE SYSTEM FOR THE PRESENCE OF DEADLOCK.
TECHNIQUES:
• RESOURCE ALLOCATION GRAPH (RAG) ALGORITHM
• WAIT-FOR GRAPH ALGORITHM
PROCESS::ALGORITHMS ANALYZE RESOURCE ALLOCATION AND REQUEST PATTERNS TO IDENTIFY CIRCULAR WAITS AND DETECT
DEADLOCK SITUATIONS.
2. DEADLOCK RECOVERY:
DEFINITION: DEADLOCK RECOVERY STRATEGIES INVOLVE BREAKING THE DEADLOCK ONCE IT HAS BEEN DETECTED.
TECHNIQUES:
• PROCESS TERMINATION
• RESOURCE PREEMPTION
• ROLLBACK
PROCESS: ONCE DEADLOCK IS DETECTED, RECOVERY MECHANISMS ARE INITIATED TO RESOLVE THE DEADLOCK AND RESTORE
SYSTEM FUNCTIONALITY.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
1. Windows:
Deadlock Detection:
•Windows employs a deadlock
detection mechanism to identify
and resolve deadlock situations.
Recovery Techniques:
•Once deadlock is detected,
Windows may terminate one or
more processes involved in the
deadlock to break it.
Resource Management:
•Windows uses mechanisms like
the Resource Allocation Graph
(RAG) to track resource allocation
and detect deadlock.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
2. LINUX:
DEADLOCK AVOIDANCE:
LINUX UTILIZES DEADLOCK AVOIDANCE TECHNIQUES TO PREVENT DEADLOCK
SITUATIONS.
RESOURCE PREEMPTION:
IN SOME CASES, LINUX MAY PREEMPT RESOURCES FROM PROCESSES TO RESOLVE
DEADLOCK.
KERNEL-LEVEL SUPPORT:
LINUX KERNEL PROVIDES APIS AND SYSTEM CALLS FOR MANAGING RESOURCES AND
DETECTING DEADLOCK.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
3. MACOS:
DEADLOCK PREVENTION:
MACOS FOCUSES ON PREVENTING DEADLOCK SITUATIONS BY CAREFULLY MANAGING RESOURCE
ALLOCATION.
RESOURCE ORDERING:
RESOURCES ARE ASSIGNED A PARTIAL ORDERING, AND PROCESSES MUST REQUEST RESOURCES IN A
SPECIFIC ORDER TO PREVENT CIRCULAR WAITS.
SYSTEM STABILITY:
MACOS PRIORITIZES SYSTEM STABILITY AND RELIABILITY BY MINIMIZING THE OCCURRENCE OF
DEADLOCK SITUATIONS.
CONCLUSION
• DEADLOCKS POSE A SIGNIFICANT CHALLENGE IN OPERATING SYSTEMS, BUT
WITH CAREFUL DESIGN AND IMPLEMENTATION OF PREVENTION, DETECTION,
AND RECOVERY MECHANISMS, THEY CAN BE EFFECTIVELY MANAGED.
• IT'S ESSENTIAL FOR SYSTEM ADMINISTRATORS, DEVELOPERS, AND RESEARCHERS
TO STAY ABREAST OF THE LATEST DEADLOCK HANDLING TECHNIQUES AND
BEST PRACTICES TO ENSURE THE STABILITY AND RELIABILITY OF COMPUTER
SYSTEMS IN THE FACE OF DEADLOCK SCENARIOS.

More Related Content

Similar to Understanding deadlocks in operating system

Similar to Understanding deadlocks in operating system (20)

chapter06-new.pptx
chapter06-new.pptxchapter06-new.pptx
chapter06-new.pptx
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Deadlock Slides
Deadlock SlidesDeadlock Slides
Deadlock Slides
 
3.6 Deadlock-operating system unit 3.pptx
3.6 Deadlock-operating system unit 3.pptx3.6 Deadlock-operating system unit 3.pptx
3.6 Deadlock-operating system unit 3.pptx
 
Deadlocks Part- I.pdf
Deadlocks Part- I.pdfDeadlocks Part- I.pdf
Deadlocks Part- I.pdf
 
OS 7.pptx
OS 7.pptxOS 7.pptx
OS 7.pptx
 
Unit 3 part 2(DEADLOCK)
Unit 3 part 2(DEADLOCK)Unit 3 part 2(DEADLOCK)
Unit 3 part 2(DEADLOCK)
 
Ch 4 deadlock
Ch 4 deadlockCh 4 deadlock
Ch 4 deadlock
 
7 Deadlocks
7 Deadlocks7 Deadlocks
7 Deadlocks
 
OS Presentation 1 (1).pptx
OS Presentation 1 (1).pptxOS Presentation 1 (1).pptx
OS Presentation 1 (1).pptx
 
Deadlocks 160928121516-160928183232
Deadlocks 160928121516-160928183232Deadlocks 160928121516-160928183232
Deadlocks 160928121516-160928183232
 
4.3 Deadlock [Autosaved].pptx
4.3 Deadlock [Autosaved].pptx4.3 Deadlock [Autosaved].pptx
4.3 Deadlock [Autosaved].pptx
 
Deadlock in Operating Systems
Deadlock in Operating SystemsDeadlock in Operating Systems
Deadlock in Operating Systems
 
Chapter06.ppt
Chapter06.pptChapter06.ppt
Chapter06.ppt
 
24 to 25 deadlockprevention
24 to 25 deadlockprevention24 to 25 deadlockprevention
24 to 25 deadlockprevention
 
23 deadlock
23 deadlock23 deadlock
23 deadlock
 
OS deadlock.pptx
OS deadlock.pptxOS deadlock.pptx
OS deadlock.pptx
 
DEADLOCK
DEADLOCKDEADLOCK
DEADLOCK
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Deadlocks prefinal
Deadlocks prefinalDeadlocks prefinal
Deadlocks prefinal
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Understanding deadlocks in operating system

  • 1. DEADLOCK IN OS UNDERSTANDING DEADLOCKS IN OPERATING SYSTEMS Yashwanth Redddy Kondakind Sanjeevlu Buggargani Koushik Reddy Malle
  • 2. CONTENTS • WHAT IS DEADLOCK? • EXAMPLE OF DEADLOCK • NECESSARY CONDITIONS FOR DEADLOCK • DEADLOCK PREVENTION • DEADLOCK DETECTION AND RECOVERY • DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS • CONCLUSION
  • 3. WHAT IS DEADLOCK? • DEADLOCK IS A SITUATION IN WHICH TWO OR MORE PROCESSES ARE UNABLE TO PROCEED BECAUSE EACH IS WAITING FOR ONE OF THE OTHERS TO COMPLETE SOME OPERATION.
  • 4. EXAMPLE LET’S UNDERSTAND WITH A REAL-LIFE ANALOGY. JOHN AND AMY ARE BROTHER-SISTER. THEY BOTH ARE IN A DEADLOCK STATE AS AMY WANTS A LAPTOP WHICH JOHN IS HAVING AND IS NOT IN THE MOOD TO GIVE IT TO HIS SISTER. AND AMY HAS A TV REMOTE WHICH JOHN WANTS, BUT AMY IS NOT GIVING IT TO HIM.
  • 5. NECESSARY CONDITIONS FOR DEADLOCK • MUTUAL EXCLUSION • HOLD AND WAIT • NO PREEMPTION • CIRCULAR WAIT
  • 6. NECESSARY CONDITIONS FOR DEADLOCK MUTUAL EXCLUSION: • AT LEAST ONE RESOURCE MUST BE HELD IN A NON-SHAREABLE MODE, MEANING ONLY ONE PROCESS CAN USE THE RESOURCE AT A TIME. • THIS CONDITION ENSURES THAT ONCE A PROCESS HOLDS A RESOURCE, NO OTHER PROCESS CAN ACCESS IT UNTIL THE HOLDING PROCESS RELEASES IT. HOLD AND WAIT: • PROCESSES MUST HOLD RESOURCES WHILE WAITING FOR ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY OTHER PROCESSES. • EACH PROCESS RETAINS AT LEAST ONE RESOURCE AND IS WAITING TO ACQUIRE ADDITIONAL RESOURCES HELD BY OTHER PROCESSES.
  • 7. NECESSARY CONDITIONS FOR DEADLOCK NO PREEMPTION: • RESOURCES CANNOT BE FORCIBLY TAKEN AWAY FROM THE PROCESSES THAT HOLD THEM. • IF A PROCESS IS HOLDING A RESOURCE AND NEEDS ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY OTHER PROCESSES, IT CANNOT FORCIBLY TAKE THOSE RESOURCES. CIRCULAR WAIT: • THERE MUST EXIST A SET OF WAITING PROCESSES {P1, P2, ..., PN}, WHERE P1 IS WAITING FOR A RESOURCE HELD BY P2, P2 IS WAITING FOR A RESOURCE HELD BY P3, ..., AND PN IS WAITING FOR A RESOURCE HELD BY P1, RESULTING IN A CIRCULAR CHAIN OF DEPENDENCIES. • EACH PROCESS IN THE CYCLE IS WAITING FOR A RESOURCE THAT IS HELD BY THE NEXT PROCESS IN THE CYCLE, LEADING TO A DEADLOCK SITUATION WHERE NO PROCESS CAN PROCEED
  • 8. DEADLOCK PREVENTION STRATEGIES FOR PREVENTING DEADLOCKS: 1. RESOURCE ALLOCATION GRAPH (RAG) 2. DEADLOCK AVOIDANCE 3. RESOURCE ORDERING 4. LIMITING HOLD AND WAIT 5. PREEMPTIVE RESOURCE ALLOCATION
  • 9. DEADLOCK DETECTION AND RECOVERY 1. DEADLOCK DETECTION: DEFINITION:: DEADLOCK DETECTION INVOLVES PERIODICALLY CHECKING THE SYSTEM FOR THE PRESENCE OF DEADLOCK. TECHNIQUES: • RESOURCE ALLOCATION GRAPH (RAG) ALGORITHM • WAIT-FOR GRAPH ALGORITHM PROCESS::ALGORITHMS ANALYZE RESOURCE ALLOCATION AND REQUEST PATTERNS TO IDENTIFY CIRCULAR WAITS AND DETECT DEADLOCK SITUATIONS. 2. DEADLOCK RECOVERY: DEFINITION: DEADLOCK RECOVERY STRATEGIES INVOLVE BREAKING THE DEADLOCK ONCE IT HAS BEEN DETECTED. TECHNIQUES: • PROCESS TERMINATION • RESOURCE PREEMPTION • ROLLBACK PROCESS: ONCE DEADLOCK IS DETECTED, RECOVERY MECHANISMS ARE INITIATED TO RESOLVE THE DEADLOCK AND RESTORE SYSTEM FUNCTIONALITY.
  • 10. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 1. Windows: Deadlock Detection: •Windows employs a deadlock detection mechanism to identify and resolve deadlock situations. Recovery Techniques: •Once deadlock is detected, Windows may terminate one or more processes involved in the deadlock to break it. Resource Management: •Windows uses mechanisms like the Resource Allocation Graph (RAG) to track resource allocation and detect deadlock.
  • 11. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 2. LINUX: DEADLOCK AVOIDANCE: LINUX UTILIZES DEADLOCK AVOIDANCE TECHNIQUES TO PREVENT DEADLOCK SITUATIONS. RESOURCE PREEMPTION: IN SOME CASES, LINUX MAY PREEMPT RESOURCES FROM PROCESSES TO RESOLVE DEADLOCK. KERNEL-LEVEL SUPPORT: LINUX KERNEL PROVIDES APIS AND SYSTEM CALLS FOR MANAGING RESOURCES AND DETECTING DEADLOCK.
  • 12. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 3. MACOS: DEADLOCK PREVENTION: MACOS FOCUSES ON PREVENTING DEADLOCK SITUATIONS BY CAREFULLY MANAGING RESOURCE ALLOCATION. RESOURCE ORDERING: RESOURCES ARE ASSIGNED A PARTIAL ORDERING, AND PROCESSES MUST REQUEST RESOURCES IN A SPECIFIC ORDER TO PREVENT CIRCULAR WAITS. SYSTEM STABILITY: MACOS PRIORITIZES SYSTEM STABILITY AND RELIABILITY BY MINIMIZING THE OCCURRENCE OF DEADLOCK SITUATIONS.
  • 13. CONCLUSION • DEADLOCKS POSE A SIGNIFICANT CHALLENGE IN OPERATING SYSTEMS, BUT WITH CAREFUL DESIGN AND IMPLEMENTATION OF PREVENTION, DETECTION, AND RECOVERY MECHANISMS, THEY CAN BE EFFECTIVELY MANAGED. • IT'S ESSENTIAL FOR SYSTEM ADMINISTRATORS, DEVELOPERS, AND RESEARCHERS TO STAY ABREAST OF THE LATEST DEADLOCK HANDLING TECHNIQUES AND BEST PRACTICES TO ENSURE THE STABILITY AND RELIABILITY OF COMPUTER SYSTEMS IN THE FACE OF DEADLOCK SCENARIOS.