From nobody Sun Feb 8 18:33:02 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of redhat.com designates 205.139.110.61 as permitted sender) client-ip=205.139.110.61; envelope-from=libvir-list-bounces@redhat.com; helo=us-smtp-delivery-1.mimecast.com; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 205.139.110.61 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1592393766; cv=none; d=zohomail.com; s=zohoarc; b=f6R1iPqNTw6KeWBuWT3wbWhi6IjQp4JUlInjPzHr1Leltf6TDgS2f8NuRxNgYT2D1MrPo+E6BYDl2XK7dWKdzh/NUHzT8QkF1w8MpQjBEM+XppmxhitfffWMDKQrNzZaMaBCVks8zy+8lbCP1fELjyw3RmC14JASEi5se9HZerU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1592393766; h=Content-Type:Content-Transfer-Encoding:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=Hd3cV5X7f3QmJSV7g/1wjjVsNgjzVGBV59AKdYAkggU=; b=hW3ezUjsd0Wz+3+A7FLv0VMVCnor+AZ7QRhhSt2dk/CgTyga4TxzeuOUp8U/NPHTfzg585HSTsVXP/twOsSW/MBprRLed6RM3vSt8EqYzge2AIpGkeC6oFWqVbhy1Tr+cwhGSaPfkDp6e+VHKVm8ZlKFlRFQfJVq55vJCoEGAt4= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 205.139.110.61 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass header.from= (p=none dis=none) header.from= Return-Path: Received: from us-smtp-delivery-1.mimecast.com (us-smtp-1.mimecast.com [205.139.110.61]) by mx.zohomail.com with SMTPS id 1592393766675206.62021752784017; Wed, 17 Jun 2020 04:36:06 -0700 (PDT) Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-312-lFoEfvoVNOyRF4FXa-ES5g-1; Wed, 17 Jun 2020 07:35:59 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id BDE7181CBF3; Wed, 17 Jun 2020 11:35:54 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 9AB7C19C79; Wed, 17 Jun 2020 11:35:54 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 69D13833C9; Wed, 17 Jun 2020 11:35:54 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id 05HBZn62006760 for ; Wed, 17 Jun 2020 07:35:49 -0400 Received: by smtp.corp.redhat.com (Postfix) id B59247BA14; Wed, 17 Jun 2020 11:35:49 +0000 (UTC) Received: from localhost.localdomain (unknown [10.40.194.160]) by smtp.corp.redhat.com (Postfix) with ESMTP id 0E1F77A029 for ; Wed, 17 Jun 2020 11:35:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1592393765; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:list-id:list-help: list-unsubscribe:list-subscribe:list-post; bh=Hd3cV5X7f3QmJSV7g/1wjjVsNgjzVGBV59AKdYAkggU=; b=E52uD036tGw89opip+ScHqZMCecL65L+3hFaj0u5bXVIUbn0kPk4skBa6fD8sgTmMT7PD8 o2JLVaC+qOKIWxYdqzblm+o6C80SEejJ2SRuzbSXq8OytLCgpmZpkpvUyj1W4y/hR6vCkY PkPCZ+0W3FTNy2dJUPD4HLs6SXQ1Fpk= X-MC-Unique: lFoEfvoVNOyRF4FXa-ES5g-1 From: Michal Privoznik To: libvir-list@redhat.com Subject: [PATCH 4/6] security: Rename virSecurityManagerRestoreSavedStateLabel() Date: Wed, 17 Jun 2020 13:35:38 +0200 Message-Id: <282773573651df7f543aebec35f5eb84003bd85e.1592393425.git.mprivozn@redhat.com> In-Reply-To: References: MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-loop: libvir-list@redhat.com X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @redhat.com) Content-Type: text/plain; charset="utf-8" The new name is virSecurityManagerDomainRestorePathLabel(). Signed-off-by: Michal Privoznik Reviewed-by: Erik Skultety --- src/libvirt_private.syms | 2 +- src/qemu/qemu_security.c | 2 +- src/security/security_apparmor.c | 9 +++---- src/security/security_dac.c | 26 +++++++----------- src/security/security_driver.h | 9 +++---- src/security/security_manager.c | 46 +++++++++++++++++++------------- src/security/security_manager.h | 8 +++--- src/security/security_nop.c | 10 ------- src/security/security_selinux.c | 33 +++++++++++------------ src/security/security_stack.c | 40 +++++++++++++-------------- 10 files changed, 89 insertions(+), 96 deletions(-) diff --git a/src/libvirt_private.syms b/src/libvirt_private.syms index b93e05b43c..30f8a7421e 100644 --- a/src/libvirt_private.syms +++ b/src/libvirt_private.syms @@ -1534,6 +1534,7 @@ virSecurityDriverLookup; # security/security_manager.h virSecurityManagerCheckAllLabel; virSecurityManagerClearSocketLabel; +virSecurityManagerDomainRestorePathLabel; virSecurityManagerDomainSetPathLabel; virSecurityManagerDomainSetPathLabelRO; virSecurityManagerGenLabel; @@ -1557,7 +1558,6 @@ virSecurityManagerRestoreHostdevLabel; virSecurityManagerRestoreImageLabel; virSecurityManagerRestoreInputLabel; virSecurityManagerRestoreMemoryLabel; -virSecurityManagerRestoreSavedStateLabel; virSecurityManagerRestoreTPMLabels; virSecurityManagerSetAllLabel; virSecurityManagerSetChardevLabel; diff --git a/src/qemu/qemu_security.c b/src/qemu/qemu_security.c index d47f4cc3c0..de4df23847 100644 --- a/src/qemu/qemu_security.c +++ b/src/qemu/qemu_security.c @@ -629,7 +629,7 @@ qemuSecurityRestoreSavedStateLabel(virQEMUDriverPtr dri= ver, if (virSecurityManagerTransactionStart(driver->securityManager) < 0) goto cleanup; =20 - if (virSecurityManagerRestoreSavedStateLabel(driver->securityManager, + if (virSecurityManagerDomainRestorePathLabel(driver->securityManager, vm->def, savefile) < 0) goto cleanup; diff --git a/src/security/security_apparmor.c b/src/security/security_appar= mor.c index 30f7701975..583e872614 100644 --- a/src/security/security_apparmor.c +++ b/src/security/security_apparmor.c @@ -1069,9 +1069,9 @@ AppArmorSetPathLabel(virSecurityManagerPtr mgr, } =20 static int -AppArmorRestoreSavedStateLabel(virSecurityManagerPtr mgr, - virDomainDefPtr def, - const char *savefile G_GNUC_UNUSED) +AppArmorRestorePathLabel(virSecurityManagerPtr mgr, + virDomainDefPtr def, + const char *path G_GNUC_UNUSED) { return reload_profile(mgr, def, NULL, false); } @@ -1157,9 +1157,8 @@ virSecurityDriver virAppArmorSecurityDriver =3D { .domainSetSecurityHostdevLabel =3D AppArmorSetSecurityHostdevLabe= l, .domainRestoreSecurityHostdevLabel =3D AppArmorRestoreSecurityHostdev= Label, =20 - .domainRestoreSavedStateLabel =3D AppArmorRestoreSavedStateLabel, - .domainSetPathLabel =3D AppArmorSetPathLabel, + .domainRestorePathLabel =3D AppArmorRestorePathLabel, =20 .domainSetSecurityChardevLabel =3D AppArmorSetChardevLabel, .domainRestoreSecurityChardevLabel =3D AppArmorRestoreChardevLabel, diff --git a/src/security/security_dac.c b/src/security/security_dac.c index 2f531cb86b..afc0a9fcb9 100644 --- a/src/security/security_dac.c +++ b/src/security/security_dac.c @@ -2257,20 +2257,6 @@ virSecurityDACSetAllLabel(virSecurityManagerPtr mgr, } =20 =20 -static int -virSecurityDACRestoreSavedStateLabel(virSecurityManagerPtr mgr, - virDomainDefPtr def G_GNUC_UNUSED, - const char *savefile) -{ - virSecurityDACDataPtr priv =3D virSecurityManagerGetPrivateData(mgr); - - if (!priv->dynamicOwnership) - return 0; - - return virSecurityDACRestoreFileLabel(mgr, savefile); -} - - static int virSecurityDACSetProcessLabel(virSecurityManagerPtr mgr, virDomainDefPtr def) @@ -2570,6 +2556,15 @@ virSecurityDACDomainSetPathLabel(virSecurityManagerP= tr mgr, return virSecurityDACSetOwnership(mgr, NULL, path, user, group, true); } =20 +static int +virSecurityDACDomainRestorePathLabel(virSecurityManagerPtr mgr, + virDomainDefPtr def G_GNUC_UNUSED, + const char *path) +{ + return virSecurityDACRestoreFileLabel(mgr, path); +} + + virSecurityDriver virSecurityDriverDAC =3D { .privateDataLen =3D sizeof(virSecurityDACData), .name =3D SECURITY_DAC_NAME, @@ -2616,8 +2611,6 @@ virSecurityDriver virSecurityDriverDAC =3D { .domainSetSecurityHostdevLabel =3D virSecurityDACSetHostdevLabel, .domainRestoreSecurityHostdevLabel =3D virSecurityDACRestoreHostdevLa= bel, =20 - .domainRestoreSavedStateLabel =3D virSecurityDACRestoreSavedStat= eLabel, - .domainSetSecurityImageFDLabel =3D virSecurityDACSetImageFDLabel, .domainSetSecurityTapFDLabel =3D virSecurityDACSetTapFDLabel, =20 @@ -2626,6 +2619,7 @@ virSecurityDriver virSecurityDriverDAC =3D { .getBaseLabel =3D virSecurityDACGetBaseLabel, =20 .domainSetPathLabel =3D virSecurityDACDomainSetPathLab= el, + .domainRestorePathLabel =3D virSecurityDACDomainRestorePat= hLabel, =20 .domainSetSecurityChardevLabel =3D virSecurityDACSetChardevLabel, .domainRestoreSecurityChardevLabel =3D virSecurityDACRestoreChardevLa= bel, diff --git a/src/security/security_driver.h b/src/security/security_driver.h index 33887f4c16..bfff789552 100644 --- a/src/security/security_driver.h +++ b/src/security/security_driver.h @@ -67,9 +67,6 @@ typedef int (*virSecurityDomainSetHostdevLabel) (virSecur= ityManagerPtr mgr, virDomainDefPtr def, virDomainHostdevDefPtr de= v, const char *vroot); -typedef int (*virSecurityDomainRestoreSavedStateLabel) (virSecurityManager= Ptr mgr, - virDomainDefPtr de= f, - const char *savefi= le); typedef int (*virSecurityDomainGenLabel) (virSecurityManagerPtr mgr, virDomainDefPtr sec); typedef int (*virSecurityDomainReserveLabel) (virSecurityManagerPtr mgr, @@ -140,6 +137,9 @@ typedef int (*virSecurityDomainSetPathLabel) (virSecuri= tyManagerPtr mgr, typedef int (*virSecurityDomainSetPathLabelRO) (virSecurityManagerPtr mgr, virDomainDefPtr def, const char *path); +typedef int (*virSecurityDomainRestorePathLabel) (virSecurityManagerPtr mg= r, + virDomainDefPtr def, + const char *path); typedef int (*virSecurityDomainSetChardevLabel) (virSecurityManagerPtr mgr, virDomainDefPtr def, virDomainChrSourceDefPtr = dev_source, @@ -200,8 +200,6 @@ struct _virSecurityDriver { virSecurityDomainSetHostdevLabel domainSetSecurityHostdevLabel; virSecurityDomainRestoreHostdevLabel domainRestoreSecurityHostdevLabel; =20 - virSecurityDomainRestoreSavedStateLabel domainRestoreSavedStateLabel; - virSecurityDomainSetImageFDLabel domainSetSecurityImageFDLabel; virSecurityDomainSetTapFDLabel domainSetSecurityTapFDLabel; =20 @@ -211,6 +209,7 @@ struct _virSecurityDriver { =20 virSecurityDomainSetPathLabel domainSetPathLabel; virSecurityDomainSetPathLabelRO domainSetPathLabelRO; + virSecurityDomainRestorePathLabel domainRestorePathLabel; =20 virSecurityDomainSetChardevLabel domainSetSecurityChardevLabel; virSecurityDomainRestoreChardevLabel domainRestoreSecurityChardevLabel; diff --git a/src/security/security_manager.c b/src/security/security_manage= r.c index b2f3f1a6bb..ad1938caeb 100644 --- a/src/security/security_manager.c +++ b/src/security/security_manager.c @@ -596,24 +596,6 @@ virSecurityManagerSetHostdevLabel(virSecurityManagerPt= r mgr, } =20 =20 -int -virSecurityManagerRestoreSavedStateLabel(virSecurityManagerPtr mgr, - virDomainDefPtr vm, - const char *savefile) -{ - if (mgr->drv->domainRestoreSavedStateLabel) { - int ret; - virObjectLock(mgr); - ret =3D mgr->drv->domainRestoreSavedStateLabel(mgr, vm, savefile); - virObjectUnlock(mgr); - return ret; - } - - virReportUnsupportedError(); - return -1; -} - - int virSecurityManagerGenLabel(virSecurityManagerPtr mgr, virDomainDefPtr vm) @@ -1087,6 +1069,34 @@ virSecurityManagerDomainSetPathLabelRO(virSecurityMa= nagerPtr mgr, return 0; } =20 +/** + * virSecurityManagerDomainRestorePathLabel: + * @mgr: security manager object + * @vm: domain definition object + * @path: path to restore labels one + * + * This function is a counterpart to virSecurityManagerDomainSetPathLabel(= ) and + * virSecurityManagerDomainSetPathLabelRO() as it restores any labels set = by them. + * + * Returns: 0 on success, -1 on error. + */ +int +virSecurityManagerDomainRestorePathLabel(virSecurityManagerPtr mgr, + virDomainDefPtr vm, + const char *path) +{ + if (mgr->drv->domainRestorePathLabel) { + int ret; + virObjectLock(mgr); + ret =3D mgr->drv->domainRestorePathLabel(mgr, vm, path); + virObjectUnlock(mgr); + return ret; + } + + return 0; +} + + =20 /** * virSecurityManagerSetMemoryLabel: diff --git a/src/security/security_manager.h b/src/security/security_manage= r.h index ac50100f0f..999752ce09 100644 --- a/src/security/security_manager.h +++ b/src/security/security_manager.h @@ -104,9 +104,6 @@ int virSecurityManagerSetHostdevLabel(virSecurityManage= rPtr mgr, virDomainDefPtr def, virDomainHostdevDefPtr dev, const char *vroot); -int virSecurityManagerRestoreSavedStateLabel(virSecurityManagerPtr mgr, - virDomainDefPtr def, - const char *savefile); int virSecurityManagerGenLabel(virSecurityManagerPtr mgr, virDomainDefPtr sec); int virSecurityManagerReserveLabel(virSecurityManagerPtr mgr, @@ -190,6 +187,11 @@ int virSecurityManagerDomainSetPathLabelRO(virSecurity= ManagerPtr mgr, virDomainDefPtr vm, const char *path); =20 +int virSecurityManagerDomainRestorePathLabel(virSecurityManagerPtr mgr, + virDomainDefPtr def, + const char *path); + + int virSecurityManagerSetChardevLabel(virSecurityManagerPtr mgr, virDomainDefPtr def, virDomainChrSourceDefPtr dev_source, diff --git a/src/security/security_nop.c b/src/security/security_nop.c index d5720ee495..de5da1ee1c 100644 --- a/src/security/security_nop.c +++ b/src/security/security_nop.c @@ -94,14 +94,6 @@ virSecurityDomainSetHostdevLabelNop(virSecurityManagerPt= r mgr G_GNUC_UNUSED, return 0; } =20 -static int -virSecurityDomainRestoreSavedStateLabelNop(virSecurityManagerPtr mgr G_GNU= C_UNUSED, - virDomainDefPtr vm G_GNUC_UNUSE= D, - const char *savefile G_GNUC_UNU= SED) -{ - return 0; -} - static int virSecurityDomainGenLabelNop(virSecurityManagerPtr mgr G_GNUC_UNUSED, virDomainDefPtr sec G_GNUC_UNUSED) @@ -308,8 +300,6 @@ virSecurityDriver virSecurityDriverNop =3D { .domainSetSecurityHostdevLabel =3D virSecurityDomainSetHostdevLab= elNop, .domainRestoreSecurityHostdevLabel =3D virSecurityDomainRestoreHostde= vLabelNop, =20 - .domainRestoreSavedStateLabel =3D virSecurityDomainRestoreSavedS= tateLabelNop, - .domainSetSecurityImageFDLabel =3D virSecurityDomainSetFDLabelNop, .domainSetSecurityTapFDLabel =3D virSecurityDomainSetFDLabelNop, =20 diff --git a/src/security/security_selinux.c b/src/security/security_selinu= x.c index 02b1100420..4cc2707c3b 100644 --- a/src/security/security_selinux.c +++ b/src/security/security_selinux.c @@ -2858,21 +2858,6 @@ virSecuritySELinuxReleaseLabel(virSecurityManagerPtr= mgr, } =20 =20 -static int -virSecuritySELinuxRestoreSavedStateLabel(virSecurityManagerPtr mgr, - virDomainDefPtr def, - const char *savefile) -{ - virSecurityLabelDefPtr secdef; - - secdef =3D virDomainDefGetSecurityLabelDef(def, SECURITY_SELINUX_NAME); - if (!secdef || !secdef->relabel) - return 0; - - return virSecuritySELinuxRestoreFileLabel(mgr, savefile, true); -} - - static int virSecuritySELinuxVerify(virSecurityManagerPtr mgr G_GNUC_UNUSED, virDomainDefPtr def) @@ -3428,6 +3413,21 @@ virSecuritySELinuxDomainSetPathLabelRO(virSecurityMa= nagerPtr mgr, return virSecuritySELinuxSetFilecon(mgr, path, data->content_context, = false); } =20 +static int +virSecuritySELinuxDomainRestorePathLabel(virSecurityManagerPtr mgr, + virDomainDefPtr def, + const char *path) +{ + virSecurityLabelDefPtr secdef; + + secdef =3D virDomainDefGetSecurityLabelDef(def, SECURITY_SELINUX_NAME); + if (!secdef || !secdef->relabel) + return 0; + + return virSecuritySELinuxRestoreFileLabel(mgr, path, true); +} + + /* * virSecuritySELinuxSetFileLabels: * @@ -3620,8 +3620,6 @@ virSecurityDriver virSecurityDriverSELinux =3D { .domainSetSecurityHostdevLabel =3D virSecuritySELinuxSetHostdevLa= bel, .domainRestoreSecurityHostdevLabel =3D virSecuritySELinuxRestoreHostd= evLabel, =20 - .domainRestoreSavedStateLabel =3D virSecuritySELinuxRestoreSaved= StateLabel, - .domainSetSecurityImageFDLabel =3D virSecuritySELinuxSetImageFDLa= bel, .domainSetSecurityTapFDLabel =3D virSecuritySELinuxSetTapFDLabe= l, =20 @@ -3630,6 +3628,7 @@ virSecurityDriver virSecurityDriverSELinux =3D { =20 .domainSetPathLabel =3D virSecuritySELinuxDomainSetPat= hLabel, .domainSetPathLabelRO =3D virSecuritySELinuxDomainSetPat= hLabelRO, + .domainRestorePathLabel =3D virSecuritySELinuxDomainRestor= ePathLabel, =20 .domainSetSecurityChardevLabel =3D virSecuritySELinuxSetChardevLa= bel, .domainRestoreSecurityChardevLabel =3D virSecuritySELinuxRestoreChard= evLabel, diff --git a/src/security/security_stack.c b/src/security/security_stack.c index 8e04b4fcfe..379c9302bc 100644 --- a/src/security/security_stack.c +++ b/src/security/security_stack.c @@ -394,24 +394,6 @@ virSecurityStackRestoreAllLabel(virSecurityManagerPtr = mgr, } =20 =20 -static int -virSecurityStackRestoreSavedStateLabel(virSecurityManagerPtr mgr, - virDomainDefPtr vm, - const char *savefile) -{ - virSecurityStackDataPtr priv =3D virSecurityManagerGetPrivateData(mgr); - virSecurityStackItemPtr item =3D priv->itemsHead; - int rc =3D 0; - - for (; item; item =3D item->next) { - if (virSecurityManagerRestoreSavedStateLabel(item->securityManager= , vm, savefile) < 0) - rc =3D -1; - } - - return rc; -} - - static int virSecurityStackSetProcessLabel(virSecurityManagerPtr mgr, virDomainDefPtr vm) @@ -814,6 +796,25 @@ virSecurityStackDomainSetPathLabelRO(virSecurityManage= rPtr mgr, } =20 =20 +static int +virSecurityStackDomainRestorePathLabel(virSecurityManagerPtr mgr, + virDomainDefPtr vm, + const char *path) +{ + virSecurityStackDataPtr priv =3D virSecurityManagerGetPrivateData(mgr); + virSecurityStackItemPtr item =3D priv->itemsHead; + int rc =3D 0; + + for (; item; item =3D item->next) { + if (virSecurityManagerDomainRestorePathLabel(item->securityManager, + vm, path) < 0) + rc =3D -1; + } + + return rc; +} + + static int virSecurityStackDomainSetChardevLabel(virSecurityManagerPtr mgr, virDomainDefPtr def, @@ -963,8 +964,6 @@ virSecurityDriver virSecurityDriverStack =3D { .domainSetSecurityHostdevLabel =3D virSecurityStackSetHostdevLabe= l, .domainRestoreSecurityHostdevLabel =3D virSecurityStackRestoreHostdev= Label, =20 - .domainRestoreSavedStateLabel =3D virSecurityStackRestoreSavedSt= ateLabel, - .domainSetSecurityImageFDLabel =3D virSecurityStackSetImageFDLabe= l, .domainSetSecurityTapFDLabel =3D virSecurityStackSetTapFDLabel, =20 @@ -974,6 +973,7 @@ virSecurityDriver virSecurityDriverStack =3D { =20 .domainSetPathLabel =3D virSecurityStackDomainSetPathL= abel, .domainSetPathLabelRO =3D virSecurityStackDomainSetPathL= abelRO, + .domainRestorePathLabel =3D virSecurityStackDomainRestoreP= athLabel, =20 .domainSetSecurityChardevLabel =3D virSecurityStackDomainSetChard= evLabel, .domainRestoreSecurityChardevLabel =3D virSecurityStackDomainRestoreC= hardevLabel, --=20 2.26.2