Kernel Stack Traceback

If you have hung processes, capture a stack traceback to show where the processes are waiting in the kernel. You will need to build your kernel with the CONFIG_MAGIC_SYSRQ option (under Kernel Hacking) to enable stack traceback.
First, look in /etc/sysctl.conf to see if kernel.sysrq is set to 1. If not, then run this command:

echo 1 > /proc/sys/kernel/sysrq

Next, trigger a stack traceback via this command:
echo t > /proc/sysrq-trigger

Look on your console or in /var/log/messages for the output.

User tags

rsync StorMan route raid slab LSI corosync alien arping exim nvidia HDFS docker bug SSD arp cpanm pacemaker lenny video exim4 rtl8723be tun parallel deb sysctl.conf language SuperMicro X forwarding numa CPAN scsi tar noop hotplug netfilter top elliptics quagga munin vrrpd puppet Adaptec bacula opreport backup asoundrc cache ddos lubuntu ulimit MODx perlbrew vrrp keyboard fail2ban kernel mariadb freedos xhost SYN find bonding glxinfo iSCSI tftp idmapd shorewall APU routing shellshock profiling pulseaudio jackd conntrack perl ardour HTTPS cpu PTR proxy zRam dovecot flash raid5 tin NFS bind leap second pvmove tool xfs rtsp dns groups ubuntu limit_conn cgroups qemu openvpn vlan dstat pam mount alsa glusterfs docker-compose iowait .htaccess htop storage drupal mysql MegaRAID initrd bash OpenStack virt-install cfq ipmi dpkg iostat core dump performance gdb ha graylog2 LVM build taskset search debootstrap AMD lstat ip lxc nfs4 cluster ps soa apache virtualbox bridge usb php tiger sysresccd opcontrol swap wordpress KVM ssh iptables mdadm qcow2 sftp iops firefox apt rpm equalizer CentOS oprofile cpu usage vim tzdata security erase hdparm grub sysfs Swift xen ipmitool youtube source newgrp gtk dhcp sysrq chroot DRBD squeeze dhclient wget virsh replication vtysh rkhunter su mkfs PXE java boot arch fio git sg backtrace regex gpg lts sysctl etch Salt encrypt Areca sublime fido7 chromium /etc/network/interfaces nginx gre OpenSSL bscan RT 3Ware ansible debian radeon centos 7 xargs SpamAssassin