Figure 2: An application that has a potential deadlock.
Back to Article