Use the bdrv_co_delete_file interface to delete the underlying file if qcow2 initialization fails (e.g due to bad encryption secret)
This makes the qcow2 driver behave the same way as the luks driver behaves. Buglink: https://bugzilla.redhat.com/show_bug.cgi?id=1845353 V3: addressed review feedback and reworked commit messages Best regards, Maxim Levitsky Maxim Levitsky (2): crypto: luks: Fix tiny memory leak block: qcow2: remove the created file on initialization error block/crypto.c | 2 ++ block/qcow2.c | 13 +++++++++++++ 2 files changed, 15 insertions(+) -- 2.26.2