Not sure if this is already known, and I'm not knowledgeable enough to
    tell if this is a harmless warning or an indicator of trouble down the
    road.  (I'm assuming the prior as witness normally has a reason to
    complain, right?  :).)

    Sources from HEAD around 04:15 -0600 today.  I noticed the same thing
    with RELENG_5_0 sources from about a week ago.

    ifconfig is automatically loading the dc(4) and mii(4) modules at boot.
    The only other module loaded prior is vesa.ko as specified in
    /boot/loader.conf.

Doing initial network setup: hostname.
dc0: <Davicom DM9102A 10/100BaseTX> port 0xd400-0xd4ff mem 0xfeaffc00-0xfeaffcff irq 9 
at device 2.0 on pci2
dc0: Ethernet address: 00:08:a1:2a:2d:29
/usr/src/sys/vm/uma_core.c:1330: could sleep with "dc0" locked from 
/usr/src/sys/pci/if_dc.c:691
Debugger("witness_sleep")
Stopped at      Debugger+0x54:  xchgl   %ebx,in_Debugger.0
db> sh locks
exclusive sleep mutex dc0 (network driver) r = 0 (0xc13987bc) locked @ 
/usr/src/sys/pci/if_dc.c:691
exclusive sleep mutex Giant r = 0 (0xc03010c0) locked @ /usr/src/sys/vm/vm_object.c:435
db> trace
Debugger(c02cdca4,c02ebfea,532,c02df7e0,c11dc380) at Debugger+0x54
witness_sleep(1,0,c02ebfea,532,c5f47a5c) at witness_sleep+0x123
uma_zalloc_arg(c09d0000,0,4,c5f47a74,c09d0000) at uma_zalloc_arg+0x54
malloc(120,c0308de0,4,c136385c,0) at malloc+0x79
if_attach(c1398000,c09e8d00,c1398000,c1398000,c11d8080) at if_attach+0x23c
ether_ifattach(c1398000,c5f47b5c,c1362a10,c1362a80,ffffffff) at ether_ifattach+0x22
dc_attach(c09e8d00,c139a098,c02f7a74,c018e9b6,c0303664) at dc_attach+0xf4f
device_probe_and_attach(c09e8d00,c11d8080,c02f7a6c,c11910c0,c11d8080) at 
device_probe_and_attach+0xb0
bus_generic_driver_added(c11d8080,c1364ce8,c02f7ac4,c1364ce8,c1364d98) at 
bus_generic_driver_added+0x6e
devclass_add_driver(c09d7e80,c1364ce8,c02dcd8e,c09d7e80,c12880c0) at 
devclass_add_driver+0xe7
driver_module_handler(c12880c0,0,c1364d98,c5f47c54,c02da9b3) at 
driver_module_handler+0x85
module_register_init(c1364db0,c02da9b3,c5f47c54,c5f47c58,0) at 
module_register_init+0x81
linker_file_sysinit(c1264b00,c117dac0,c5f47c80,c117dac0,1) at linker_file_sysinit+0xa0
linker_load_file(c117dac0,c5f47ca4,0,c5f47cb4,0) at linker_load_file+0x10b
linker_load_module(0,c11d9800,0,0,c5f47cd0) at linker_load_module+0xd7
kldload(c09ec2a0,c5f47d10,c02efab9,407,1) at kldload+0x114
syscall(2f,2f,2f,bfbffdc8,0) at syscall+0x28e
Xint0x80_syscall() at Xint0x80_syscall+0x1d
--- syscall (304, FreeBSD ELF32, kldload), eip = 0x804f913, esp = 0xbfbffc7c, eb
p = 0xbfbffcf8 ---

-- 
ryan beasley                            <[EMAIL PROTECTED]>
GPG ID: 0x16EFBD48                      http://www.goddamnbastard.org           

Attachment: msg49482/pgp00000.pgp
Description: PGP signature

Reply via email to