A process can hang for a few minutes, when it reads from
/dev/random. Typically this occurs for secure socket connections, and when the kernel cannot get random events from mouse moves or key presses. So, clearly, this can happen when running a test suite with multiple test cases.
The size of the entropy pool can be retrieved with:
Another clue can be to look at whether any of the files the AUT has open includes
/dev/random. This can be done as follows (and where
Remember to ssh into the machine, so that the entropy pool isn’t affected by your typing.
It is possible to feed the pool with pseudo-random numbers using
rngd as root:
On Debian systems,
rngd is in the
rng-tools package; on Red Hat systems (including Fedora), it is in the