Kernel Stack Traceback

If you have hung processes, capture a stack traceback to show where the processes are waiting in the kernel. You will need to build your kernel with the CONFIG_MAGIC_SYSRQ option (under Kernel Hacking) to enable stack traceback.
First, look in /etc/sysctl.conf to see if kernel.sysrq is set to 1. If not, then run this command:

echo 1 > /proc/sys/kernel/sysrq

Next, trigger a stack traceback via this command:
echo t > /proc/sysrq-trigger

Look on your console or in /var/log/messages for the output.

User tags

security erase docker-compose limit_conn perlbrew drupal alien freedos dovecot vim xargs iops AMD sysresccd xfs fail2ban bug iSCSI chromium etch arping quagga sysrq LSI corosync shellshock newgrp netfilter language find Adaptec sysfs oprofile scsi core dump glusterfs ipmi gre lubuntu bind pvmove exim4 rpm dhcp dhclient debian sftp ddos tftp parallel youtube nginx ip ubuntu Salt alsa rtl8723be fido7 qcow2 encrypt bonding xhost ansible MODx leap second virtualbox cpu vtysh apache SYN LVM CPAN iowait squeeze tzdata video virsh NFS ssh ulimit numa kernel gdb X forwarding ha SSD nvidia 3Ware raid lstat Areca dstat sysctl fio htop bscan bridge lenny MegaRAID pulseaudio OpenSSL wordpress shorewall opcontrol backup route storage PXE routing tin puppet raid5 xen /etc/network/interfaces mount flash php iostat PTR lts deb boot debootstrap jackd radeon HTTPS grub StorMan docker slab idmapd openvpn chroot rkhunter taskset vrrp bash sg cpu usage glxinfo sublime usb firefox dns .htaccess Swift soa tool munin source su cpanm equalizer nfs4 APU arch build search groups initrd asoundrc SpamAssassin proxy swap exim DRBD perl ardour elliptics tiger OpenStack mysql hotplug apt iptables backtrace git vrrpd noop pacemaker conntrack virt-install mkfs rsync ps tar cfq mariadb HDFS qemu graylog2 cgroups wget keyboard cluster centos 7 rtsp java zRam sysctl.conf profiling gpg performance arp opreport dpkg mdadm top cache hdparm ipmitool KVM pam SuperMicro vlan lxc replication regex tun gtk CentOS bacula RT