A process can hang for a few minutes, when it reads from /dev/random. Typically this occurs for secure socket connections, and when the kernel cannot get random events from mouse moves or key presses. So, clearly, this can happen when running a test suite with multiple test cases.
The size of the entropy pool can be retrieved with:
cat /proc/sys/kernel/random/entropy_availAnother clue can be to look at whether any of the files the AUT has open includes /dev/random. This can be done as follows (and where
ls -l /proc/<pid>/fdRemember to ssh into the machine, so that the entropy pool isn't affected by your typing.
It is possible to feed the pool with pseudo-random numbers using rngd as root:
rngd -r /dev/urandom -o /dev/random -f -t 1On Debian systems, rngd is in the rng-tools package; on Red Hat systems (including Fedora), it is in the rng-utils package.