Use the bdrv_co_delete_file interface to delete the underlying
file if qcow2 initialization fails (e.g due to bad encryption secret)
This makes the qcow2 driver behave the same way as the luks driver behaves.
Buglink: https://bugzilla.redhat.com/show_bug.cgi?id=1845353
V3: addressed review feedback and reworked commit messages
Best regards,
Maxim Levitsky
Maxim Levitsky (2):
crypto: luks: Fix tiny memory leak
block: qcow2: remove the created file on initialization error
block/crypto.c | 2 ++
block/qcow2.c | 13 +++++++++++++
2 files changed, 15 insertions(+)
--
2.26.2