{"api_version":"1","generated_at":"2026-05-12T20:06:35+00:00","cve":"CVE-2026-43211","urls":{"html":"https://cve.report/CVE-2026-43211","api":"https://cve.report/api/cve/CVE-2026-43211.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43211","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43211"},"summary":{"title":"PCI: Fix pci_slot_trylock() error handling","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix pci_slot_trylock() error handling\n\nCommit a4e772898f8b (\"PCI: Add missing bridge lock to pci_bus_lock()\")\ndelegates the bridge device's pci_dev_trylock() to pci_bus_trylock() in\npci_slot_trylock(), but it forgets to remove the corresponding\npci_dev_unlock() when pci_bus_trylock() fails.\n\nBefore a4e772898f8b, the code did:\n\n  if (!pci_dev_trylock(dev)) /* <- lock bridge device */\n    goto unlock;\n  if (dev->subordinate) {\n    if (!pci_bus_trylock(dev->subordinate)) {\n      pci_dev_unlock(dev);   /* <- unlock bridge device */\n      goto unlock;\n    }\n  }\n\nAfter a4e772898f8b the bridge-device lock is no longer taken, but the\npci_dev_unlock(dev) on the failure path was left in place, leading to the\nbug.\n\nThis yields one of two errors:\n\n  1. A warning that the lock is being unlocked when no one holds it.\n  2. An incorrect unlock of a lock that belongs to another thread.\n\nFix it by removing the now-redundant pci_dev_unlock(dev) on the failure\npath.\n\n[Same patch later posted by Keith at\nhttps://patch.msgid.link/20260116184150.3013258-1-kbusch@meta.com]","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-06 12:16:40","updated_at":"2026-05-11 19:58:10"},"problem_types":["CWE-667"],"metrics":[{"version":"3.1","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://git.kernel.org/stable/c/a19b61fdb958ffadbba85b43c991eb9fc70c1c1c","name":"https://git.kernel.org/stable/c/a19b61fdb958ffadbba85b43c991eb9fc70c1c1c","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/9368d1ee62829b08aa31836b3ca003803caf0b72","name":"https://git.kernel.org/stable/c/9368d1ee62829b08aa31836b3ca003803caf0b72","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/0425aaf20b407d2f2cf3bf469808e4a35f9abb8b","name":"https://git.kernel.org/stable/c/0425aaf20b407d2f2cf3bf469808e4a35f9abb8b","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/bd435f4b738130d732ef64e0e57e45185f77165d","name":"https://git.kernel.org/stable/c/bd435f4b738130d732ef64e0e57e45185f77165d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/8b08ea9690b212b7bf7f12414039259cf34b1aa0","name":"https://git.kernel.org/stable/c/8b08ea9690b212b7bf7f12414039259cf34b1aa0","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/fbe06a3058114bf95a17a4941b205f4b321c6f0a","name":"https://git.kernel.org/stable/c/fbe06a3058114bf95a17a4941b205f4b321c6f0a","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/ebb27b7399ab8b9eb1f792b329aa5f6250c590d4","name":"https://git.kernel.org/stable/c/ebb27b7399ab8b9eb1f792b329aa5f6250c590d4","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/943ed56606a7ab2fe5a99cad572dd17d484310c7","name":"https://git.kernel.org/stable/c/943ed56606a7ab2fe5a99cad572dd17d484310c7","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43211","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43211","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected e2355d513b89a2cb511b4ded0deb426cdb01acd0 ebb27b7399ab8b9eb1f792b329aa5f6250c590d4 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 04e85a3285b0e5c5af6fd2c0fd6e95ffecc01945 fbe06a3058114bf95a17a4941b205f4b321c6f0a git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 7253b4fed46471cc247c6cacefac890a8472c083 943ed56606a7ab2fe5a99cad572dd17d484310c7 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 78c6e39fef5c428960aff742149bba302dd46f5a a19b61fdb958ffadbba85b43c991eb9fc70c1c1c git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a4e772898f8bf2e7e1cf661a12c60a5612c4afab 0425aaf20b407d2f2cf3bf469808e4a35f9abb8b git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a4e772898f8bf2e7e1cf661a12c60a5612c4afab bd435f4b738130d732ef64e0e57e45185f77165d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a4e772898f8bf2e7e1cf661a12c60a5612c4afab 8b08ea9690b212b7bf7f12414039259cf34b1aa0 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected a4e772898f8bf2e7e1cf661a12c60a5612c4afab 9368d1ee62829b08aa31836b3ca003803caf0b72 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0790b89c7e911003b8c50ae50e3ac7645de1fae9 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected df77a678c33871a6e4ac5b54a71662f1d702335b git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 81c68e218ab883dfa368460a59b674084c0240da git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.11","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.11 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.252 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.202 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.165 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.128 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.75 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.16 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.6 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"43211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"43211","cve":"CVE-2026-43211","epss":"0.000120000","percentile":"0.017700000","score_date":"2026-05-11","updated_at":"2026-05-12 00:01:18"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/pci/pci.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"ebb27b7399ab8b9eb1f792b329aa5f6250c590d4","status":"affected","version":"e2355d513b89a2cb511b4ded0deb426cdb01acd0","versionType":"git"},{"lessThan":"fbe06a3058114bf95a17a4941b205f4b321c6f0a","status":"affected","version":"04e85a3285b0e5c5af6fd2c0fd6e95ffecc01945","versionType":"git"},{"lessThan":"943ed56606a7ab2fe5a99cad572dd17d484310c7","status":"affected","version":"7253b4fed46471cc247c6cacefac890a8472c083","versionType":"git"},{"lessThan":"a19b61fdb958ffadbba85b43c991eb9fc70c1c1c","status":"affected","version":"78c6e39fef5c428960aff742149bba302dd46f5a","versionType":"git"},{"lessThan":"0425aaf20b407d2f2cf3bf469808e4a35f9abb8b","status":"affected","version":"a4e772898f8bf2e7e1cf661a12c60a5612c4afab","versionType":"git"},{"lessThan":"bd435f4b738130d732ef64e0e57e45185f77165d","status":"affected","version":"a4e772898f8bf2e7e1cf661a12c60a5612c4afab","versionType":"git"},{"lessThan":"8b08ea9690b212b7bf7f12414039259cf34b1aa0","status":"affected","version":"a4e772898f8bf2e7e1cf661a12c60a5612c4afab","versionType":"git"},{"lessThan":"9368d1ee62829b08aa31836b3ca003803caf0b72","status":"affected","version":"a4e772898f8bf2e7e1cf661a12c60a5612c4afab","versionType":"git"},{"status":"affected","version":"0790b89c7e911003b8c50ae50e3ac7645de1fae9","versionType":"git"},{"status":"affected","version":"df77a678c33871a6e4ac5b54a71662f1d702335b","versionType":"git"},{"status":"affected","version":"81c68e218ab883dfa368460a59b674084c0240da","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/pci/pci.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.11"},{"lessThan":"6.11","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.252","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.202","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.165","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.128","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.75","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.16","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.6","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.252","versionStartIncluding":"5.10.226","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.202","versionStartIncluding":"5.15.167","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.165","versionStartIncluding":"6.1.110","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.128","versionStartIncluding":"6.6.51","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.75","versionStartIncluding":"6.11","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.16","versionStartIncluding":"6.11","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.6","versionStartIncluding":"6.11","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.11","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.322","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.284","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10.10","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix pci_slot_trylock() error handling\n\nCommit a4e772898f8b (\"PCI: Add missing bridge lock to pci_bus_lock()\")\ndelegates the bridge device's pci_dev_trylock() to pci_bus_trylock() in\npci_slot_trylock(), but it forgets to remove the corresponding\npci_dev_unlock() when pci_bus_trylock() fails.\n\nBefore a4e772898f8b, the code did:\n\n  if (!pci_dev_trylock(dev)) /* <- lock bridge device */\n    goto unlock;\n  if (dev->subordinate) {\n    if (!pci_bus_trylock(dev->subordinate)) {\n      pci_dev_unlock(dev);   /* <- unlock bridge device */\n      goto unlock;\n    }\n  }\n\nAfter a4e772898f8b the bridge-device lock is no longer taken, but the\npci_dev_unlock(dev) on the failure path was left in place, leading to the\nbug.\n\nThis yields one of two errors:\n\n  1. A warning that the lock is being unlocked when no one holds it.\n  2. An incorrect unlock of a lock that belongs to another thread.\n\nFix it by removing the now-redundant pci_dev_unlock(dev) on the failure\npath.\n\n[Same patch later posted by Keith at\nhttps://patch.msgid.link/20260116184150.3013258-1-kbusch@meta.com]"}],"metrics":[{"cvssV3_1":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"providerMetadata":{"dateUpdated":"2026-05-08T12:41:17.709Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/ebb27b7399ab8b9eb1f792b329aa5f6250c590d4"},{"url":"https://git.kernel.org/stable/c/fbe06a3058114bf95a17a4941b205f4b321c6f0a"},{"url":"https://git.kernel.org/stable/c/943ed56606a7ab2fe5a99cad572dd17d484310c7"},{"url":"https://git.kernel.org/stable/c/a19b61fdb958ffadbba85b43c991eb9fc70c1c1c"},{"url":"https://git.kernel.org/stable/c/0425aaf20b407d2f2cf3bf469808e4a35f9abb8b"},{"url":"https://git.kernel.org/stable/c/bd435f4b738130d732ef64e0e57e45185f77165d"},{"url":"https://git.kernel.org/stable/c/8b08ea9690b212b7bf7f12414039259cf34b1aa0"},{"url":"https://git.kernel.org/stable/c/9368d1ee62829b08aa31836b3ca003803caf0b72"}],"title":"PCI: Fix pci_slot_trylock() error handling","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43211","datePublished":"2026-05-06T11:28:14.423Z","dateReserved":"2026-05-01T14:12:55.993Z","dateUpdated":"2026-05-08T12:41:17.709Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-06 12:16:40","lastModifiedDate":"2026-05-11 19:58:10","problem_types":["CWE-667"],"metrics":{"cvssMetricV31":[{"source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.322","versionEndExcluding":"4.20","matchCriteriaId":"A3FCD7A0-ABE5-49E8-A47C-F0169215C4B7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.284","versionEndExcluding":"5.5","matchCriteriaId":"69E2B19B-E681-4963-ABD2-D4141E9A6B64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.226","versionEndExcluding":"5.10.252","matchCriteriaId":"46ED7BB3-F580-4BF5-AF52-3D115F1A672E"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.167","versionEndExcluding":"5.15.202","matchCriteriaId":"CA8574EF-E0E5-423A-A5D7-CEDCF7FDEB8C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.110","versionEndExcluding":"6.1.165","matchCriteriaId":"D575C1E8-668C-41F9-8A8F-30FDF5C45F1A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.51","versionEndExcluding":"6.6.128","matchCriteriaId":"E939C709-7387-4CDF-B846-AD633A16F152"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10.10","versionEndExcluding":"6.12.75","matchCriteriaId":"FF19907D-B1E9-49EB-8A88-5F3EF276ADDE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.18.16","matchCriteriaId":"B4B8CDA9-BADF-4CF5-8B3B-702DE8EEA40B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.19","versionEndExcluding":"6.19.6","matchCriteriaId":"373EEEDA-FAA1-4FB4-B6ED-DB4DD99DBE67"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43211","Ordinal":"1","Title":"PCI: Fix pci_slot_trylock() error handling","CVE":"CVE-2026-43211","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43211","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix pci_slot_trylock() error handling\n\nCommit a4e772898f8b (\"PCI: Add missing bridge lock to pci_bus_lock()\")\ndelegates the bridge device's pci_dev_trylock() to pci_bus_trylock() in\npci_slot_trylock(), but it forgets to remove the corresponding\npci_dev_unlock() when pci_bus_trylock() fails.\n\nBefore a4e772898f8b, the code did:\n\n  if (!pci_dev_trylock(dev)) /* <- lock bridge device */\n    goto unlock;\n  if (dev->subordinate) {\n    if (!pci_bus_trylock(dev->subordinate)) {\n      pci_dev_unlock(dev);   /* <- unlock bridge device */\n      goto unlock;\n    }\n  }\n\nAfter a4e772898f8b the bridge-device lock is no longer taken, but the\npci_dev_unlock(dev) on the failure path was left in place, leading to the\nbug.\n\nThis yields one of two errors:\n\n  1. A warning that the lock is being unlocked when no one holds it.\n  2. An incorrect unlock of a lock that belongs to another thread.\n\nFix it by removing the now-redundant pci_dev_unlock(dev) on the failure\npath.\n\n[Same patch later posted by Keith at\nhttps://patch.msgid.link/20260116184150.3013258-1-kbusch@meta.com]","Type":"Description","Title":"PCI: Fix pci_slot_trylock() error handling"}]}}}