Not sure if this is already known, and I'm not knowledgeable enough to tell if this is a harmless warning or an indicator of trouble down the road. (I'm assuming the prior as witness normally has a reason to complain, right? :).)
Sources from HEAD around 04:15 -0600 today. I noticed the same thing with RELENG_5_0 sources from about a week ago. ifconfig is automatically loading the dc(4) and mii(4) modules at boot. The only other module loaded prior is vesa.ko as specified in /boot/loader.conf. Doing initial network setup: hostname. dc0: <Davicom DM9102A 10/100BaseTX> port 0xd400-0xd4ff mem 0xfeaffc00-0xfeaffcff irq 9 at device 2.0 on pci2 dc0: Ethernet address: 00:08:a1:2a:2d:29 /usr/src/sys/vm/uma_core.c:1330: could sleep with "dc0" locked from /usr/src/sys/pci/if_dc.c:691 Debugger("witness_sleep") Stopped at Debugger+0x54: xchgl %ebx,in_Debugger.0 db> sh locks exclusive sleep mutex dc0 (network driver) r = 0 (0xc13987bc) locked @ /usr/src/sys/pci/if_dc.c:691 exclusive sleep mutex Giant r = 0 (0xc03010c0) locked @ /usr/src/sys/vm/vm_object.c:435 db> trace Debugger(c02cdca4,c02ebfea,532,c02df7e0,c11dc380) at Debugger+0x54 witness_sleep(1,0,c02ebfea,532,c5f47a5c) at witness_sleep+0x123 uma_zalloc_arg(c09d0000,0,4,c5f47a74,c09d0000) at uma_zalloc_arg+0x54 malloc(120,c0308de0,4,c136385c,0) at malloc+0x79 if_attach(c1398000,c09e8d00,c1398000,c1398000,c11d8080) at if_attach+0x23c ether_ifattach(c1398000,c5f47b5c,c1362a10,c1362a80,ffffffff) at ether_ifattach+0x22 dc_attach(c09e8d00,c139a098,c02f7a74,c018e9b6,c0303664) at dc_attach+0xf4f device_probe_and_attach(c09e8d00,c11d8080,c02f7a6c,c11910c0,c11d8080) at device_probe_and_attach+0xb0 bus_generic_driver_added(c11d8080,c1364ce8,c02f7ac4,c1364ce8,c1364d98) at bus_generic_driver_added+0x6e devclass_add_driver(c09d7e80,c1364ce8,c02dcd8e,c09d7e80,c12880c0) at devclass_add_driver+0xe7 driver_module_handler(c12880c0,0,c1364d98,c5f47c54,c02da9b3) at driver_module_handler+0x85 module_register_init(c1364db0,c02da9b3,c5f47c54,c5f47c58,0) at module_register_init+0x81 linker_file_sysinit(c1264b00,c117dac0,c5f47c80,c117dac0,1) at linker_file_sysinit+0xa0 linker_load_file(c117dac0,c5f47ca4,0,c5f47cb4,0) at linker_load_file+0x10b linker_load_module(0,c11d9800,0,0,c5f47cd0) at linker_load_module+0xd7 kldload(c09ec2a0,c5f47d10,c02efab9,407,1) at kldload+0x114 syscall(2f,2f,2f,bfbffdc8,0) at syscall+0x28e Xint0x80_syscall() at Xint0x80_syscall+0x1d --- syscall (304, FreeBSD ELF32, kldload), eip = 0x804f913, esp = 0xbfbffc7c, eb p = 0xbfbffcf8 --- -- ryan beasley <[EMAIL PROTECTED]> GPG ID: 0x16EFBD48 http://www.goddamnbastard.org
msg49482/pgp00000.pgp
Description: PGP signature