https://bugzilla.kernel.org/show_bug.cgi?id=202055 --- Comment #14 from Alex Williamson (alex.williamson@xxxxxxxxxx) --- Hi Dongli, you're getting an ACS violation, I wonder if it's related to an issue your colleague resolved recently: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aa667c6408d20a84c7637420bc3b7aa0abab59a2 Is there an IDT switch in your topology or is the NVMe drive connected directly to the Intel root port? If the former, perhaps James' patch doesn't account for the invalid source ID propagating upstream. If directly connected to the Intel root port, perhaps IDT isn't the only downstream port with the issue. You could try disabling Source Validation on the root port via setpci to see if we're dealing with a similar issue: # setpci -s 1b.0 ECAP_ACS+6.w=0:1 However, you're using an Intel system with a non-standard (aka broken) ACS capability, therefore the ACS capability and control registers are actually dwords, so I think the correct command would be: # setpci -s 1b.0 ECAP_ACS+8.l=0:1 Also you won't be able to trust lspci for decoding of the ACS capability. -- You are receiving this mail because: You are watching the assignee of the bug.