Which interface to use to reload udev rules from configure hook

Hi, i have a snap where i add udev rules using configure hook and i want to reload rules after it. how do i do it? is there an interface i have to connect before?

Modern udev actually monitors its rules directories for changes and automatically reloads, but if you want to force it anyway, you should be able to use “udevadm trigger” to have it reprocess all its uevents and rules…

can i use “udevadm trigger” inside the configure hook?

i tried and i get

Failed to send reload request: Permission denied
Extraneous argument: trigger

When i run only "udevadm trigger " it doesnt reload the rules.

I have to run

udevadm control --reload-rules
udevadm trigger

Can i do this inside a configure hook?

make sure to run snappy-debug alongside your install to see what interfaces it suggests … and indeed add the correct interface plugs to your hooks definition in your snapcraft.yaml …

(you might need to pre-connect them from the brand store or gadget.yaml if it is in a hook)

this is the snappy-debug output:

kernel.printk_ratelimit = 0
= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/proc/1/environ" pid=3967 comm="udevadm" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
File: /proc/1/environ (read)
Suggestions:
* adjust program to not access '@{PROC}/@{pid}/environ'
* do nothing if using systemd utility (eg, timedatectl): https://forum.snapcraft.io/t/managing-time-date-and-timezone-in-ubuntu-core/408/44
* do nothing if program otherwise works properly

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="ptrace" profile="snap.turftank-mk2m-sw.hook.configure" pid=3967 comm="udevadm" requested_mask="read" denied_mask="read" peer="unconfined"
Ptrace: peer=unconfined (read)
Suggestions:
* add 'system-observe' to 'plugs'
* do nothing if program otherwise works properly

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="connect" profile="snap.turftank-mk2m-sw.hook.configure" name="/run/udev/control" pid=3967 comm="udevadm" requested_mask="wr" denied_mask="wr" fsuid=0 ouid=0
File: /run/udev/control (write)
Suggestions:
* adjust program to use $SNAP_DATA
* adjust program to use /run/shm/snap.$SNAP_NAME.*
* adjust program to use /run/snap.$SNAP_NAME.*
* adjust snap to use snap layouts (https://forum.snapcraft.io/t/snap-layouts/7207)

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="sendmsg" profile="snap.turftank-mk2m-sw.hook.configure" name="/run/systemd/notify" pid=3967 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /run/systemd/notify (write)
Suggestions:
* adjust program to use $SNAP_DATA
* adjust program to use /run/shm/snap.$SNAP_NAME.*
* adjust program to use /run/snap.$SNAP_NAME.*
* adjust snap to use snap layouts (https://forum.snapcraft.io/t/snap-layouts/7207)

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/proc/1/environ" pid=3967 comm="udevadm" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
File: /proc/1/environ (read)
Suggestions:
* adjust program to not access '@{PROC}/@{pid}/environ'
* do nothing if using systemd utility (eg, timedatectl): https://forum.snapcraft.io/t/managing-time-date-and-timezone-in-ubuntu-core/408/44
* do nothing if program otherwise works properly

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="ptrace" profile="snap.turftank-mk2m-sw.hook.configure" pid=3967 comm="udevadm" requested_mask="read" denied_mask="read" peer="unconfined"
Ptrace: peer=unconfined (read)
Suggestions:
* add 'system-observe' to 'plugs'
* do nothing if program otherwise works properly

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="connect" profile="snap.turftank-mk2m-sw.hook.configure" name="/run/udev/control" pid=3967 comm="udevadm" requested_mask="wr" denied_mask="wr" fsuid=0 ouid=0
File: /run/udev/control (write)
Suggestions:
* adjust program to use $SNAP_DATA
* adjust program to use /run/shm/snap.$SNAP_NAME.*
* adjust program to use /run/snap.$SNAP_NAME.*
* adjust snap to use snap layouts (https://forum.snapcraft.io/t/snap-layouts/7207)

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="sendmsg" profile="snap.turftank-mk2m-sw.hook.configure" name="/run/systemd/notify" pid=3967 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /run/systemd/notify (write)
Suggestions:
* adjust program to use $SNAP_DATA
* adjust program to use /run/shm/snap.$SNAP_NAME.*
* adjust program to use /run/snap.$SNAP_NAME.*
* adjust snap to use snap layouts (https://forum.snapcraft.io/t/snap-layouts/7207)

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/proc/1/environ" pid=3968 comm="udevadm" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
File: /proc/1/environ (read)
Suggestions:
* adjust program to not access '@{PROC}/@{pid}/environ'
* do nothing if using systemd utility (eg, timedatectl): https://forum.snapcraft.io/t/managing-time-date-and-timezone-in-ubuntu-core/408/44
* do nothing if program otherwise works properly

= AppArmor =
Time: Oct 17 09:21:07
Log: apparmor="DENIED" operation="ptrace" profile="snap.turftank-mk2m-sw.hook.configure" pid=3968 comm="udevadm" requested_mask="read" denied_mask="read" peer="unconfined"
Ptrace: peer=unconfined (read)
Suggestions:
* add 'system-observe' to 'plugs'
* do nothing if program otherwise works properly

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/armv8_cortex_a72/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/armv8_cortex_a72/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/armv8_cortex_a72/uevent'
* adjust program to not access '/sys/devices/armv[0-9]*_cortex_a[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/breakpoint/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/breakpoint/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/breakpoint/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/kprobe/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/kprobe/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/kprobe/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/armv8_cortex_a72/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/armv8_cortex_a72/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/armv8_cortex_a72/uevent'
* adjust program to not access '/sys/devices/armv[0-9]*_cortex_a[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/breakpoint/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/breakpoint/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/breakpoint/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/kprobe/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/kprobe/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/kprobe/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name=2F7379732F646576696365732F706C6174666F726D2F4669786564204D44494F206275732E302F756576656E74 pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/Fixed MDIO bus.0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.0/uevent'
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name=2F7379732F646576696365732F706C6174666F726D2F4669786564204D44494F206275732E302F6D64696F5F6275732F66697865642D302F756576656E74 pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/Fixed MDIO bus.0/mdio_bus/fixed-0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.0/mdio_bus/fixed-0/uevent'
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.[0-9]*/mdio_bus/fixed-[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name=2F7379732F646576696365732F706C6174666F726D2F4669786564204D44494F206275732E302F6D64696F5F6275732F66697865642D302F66697865642D303A31662F756576656E74 pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/Fixed MDIO bus.0/mdio_bus/fixed-0/fixed-0:1f/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.0/mdio_bus/fixed-0/fixed-0:1f/uevent'
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.[0-9]*/mdio_bus/fixed-[0-9]*/fixed-[0-9]*:[0-9]*f/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/arm-pmu/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/arm-pmu/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/platform/arm-pmu/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/cpufreq-dt/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/cpufreq-dt/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/platform/cpufreq-dt/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/leds/mmc0::/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/leds/mmc0::/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/leds/mmc0::/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/leds/mmc[0-9]*::/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*boot[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*boot[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*p[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*p[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*p[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*p[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/mmcblk0rpmb/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/mmcblk0rpmb/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/mmcblk0rpmb/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/mmcblk[0-9]*rpmb/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/fixedregulator_3v3/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/fixedregulator_3v3/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/fixedregulator_3v3/uevent'
* adjust program to not access '/sys/devices/platform/fixedregulator_[0-9]*v[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/fixedregulator_3v3/regulator/regulator.1/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/fixedregulator_3v3/regulator/regulator.1/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/fixedregulator_3v3/regulator/regulator.1/uevent'
* adjust program to not access '/sys/devices/platform/fixedregulator_[0-9]*v[0-9]*/regulator/regulator.[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/fixedregulator_5v0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/fixedregulator_5v0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/fixedregulator_5v0/uevent'
* adjust program to not access '/sys/devices/platform/fixedregulator_[0-9]*v[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/fixedregulator_5v0/regulator/regulator.2/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/fixedregulator_5v0/regulator/regulator.2/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/fixedregulator_5v0/regulator/regulator.2/uevent'
* adjust program to not access '/sys/devices/platform/fixedregulator_[0-9]*v[0-9]*/regulator/regulator.[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/kgdboc/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/kgdboc/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/platform/kgdboc/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name=2F7379732F646576696365732F706C6174666F726D2F4669786564204D44494F206275732E302F756576656E74 pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/Fixed MDIO bus.0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.0/uevent'
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name=2F7379732F646576696365732F706C6174666F726D2F4669786564204D44494F206275732E302F6D64696F5F6275732F66697865642D302F756576656E74 pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/Fixed MDIO bus.0/mdio_bus/fixed-0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.0/mdio_bus/fixed-0/uevent'
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.[0-9]*/mdio_bus/fixed-[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name=2F7379732F646576696365732F706C6174666F726D2F4669786564204D44494F206275732E302F6D64696F5F6275732F66697865642D302F66697865642D303A31662F756576656E74 pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/Fixed MDIO bus.0/mdio_bus/fixed-0/fixed-0:1f/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.0/mdio_bus/fixed-0/fixed-0:1f/uevent'
* adjust program to not access '/sys/devices/platform/Fixed MDIO bus.[0-9]*/mdio_bus/fixed-[0-9]*/fixed-[0-9]*:[0-9]*f/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/arm-pmu/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/arm-pmu/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/platform/arm-pmu/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/cpufreq-dt/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/cpufreq-dt/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/platform/cpufreq-dt/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/leds/mmc0::/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/leds/mmc0::/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/leds/mmc0::/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/leds/mmc[0-9]*::/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*boot[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*boot[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*p[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*p[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*p[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/block/mmcblk[0-9]*/mmcblk[0-9]*p[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/mmcblk0rpmb/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/mmcblk0rpmb/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/emmc2bus/fe340000.emmc2/mmc_host/mmc0/mmc0:0001/mmcblk0rpmb/uevent'
* adjust program to not access '/sys/devices/platform/emmc[0-9]*bus/fe[0-9]*.emmc[0-9]*/mmc_host/mmc[0-9]*/mmc[0-9]*:[0-9]*/mmcblk[0-9]*rpmb/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/fixedregulator_3v3/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/fixedregulator_3v3/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/fixedregulator_3v3/uevent'
* adjust program to not access '/sys/devices/platform/fixedregulator_[0-9]*v[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/fixedregulator_3v3/regulator/regulator.1/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/fixedregulator_3v3/regulator/regulator.1/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/fixedregulator_3v3/regulator/regulator.1/uevent'
* adjust program to not access '/sys/devices/platform/fixedregulator_[0-9]*v[0-9]*/regulator/regulator.[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/fixedregulator_5v0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/fixedregulator_5v0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/fixedregulator_5v0/uevent'
* adjust program to not access '/sys/devices/platform/fixedregulator_[0-9]*v[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/platform/fixedregulator_5v0/regulator/regulator.2/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/platform/fixedregulator_5v0/regulator/regulator.2/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/platform/fixedregulator_5v0/regulator/regulator.2/uevent'
* adjust program to not access '/sys/devices/platform/fixedregulator_[0-9]*v[0-9]*/regulator/regulator.[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptype/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptype/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/virtual/tty/ptype/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptypf/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptypf/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/virtual/tty/ptypf/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq0/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq1/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq1/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq1/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq2/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq2/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq2/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq3/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq3/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq3/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq4/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq4/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq4/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq5/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq5/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq5/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq6/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq6/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq6/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq7/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq7/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq7/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq8/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq8/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq8/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyq9/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyq9/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyq9/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyq[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyqa/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyqa/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/virtual/tty/ptyqa/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyqb/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyqb/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/virtual/tty/ptyqb/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyqc/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyqc/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/virtual/tty/ptyqc/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyqd/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyqd/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/virtual/tty/ptyqd/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyqe/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyqe/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/virtual/tty/ptyqe/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyqf/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyqf/uevent (write)
Suggestion:
* adjust program to not access '/sys/devices/virtual/tty/ptyqf/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyr0/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyr0/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyr0/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyr[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyr1/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyr1/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyr1/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyr[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyr2/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyr2/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyr2/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyr[0-9]*/uevent'

= AppArmor =
Time: Oct 17 09:21:08
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/sys/devices/virtual/tty/ptyr3/uevent" pid=3968 comm="udevadm" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
File: /sys/devices/virtual/tty/ptyr3/uevent (write)
Suggestions:
* adjust program to not access '/sys/devices/virtual/tty/ptyr3/uevent'
* adjust program to not access '/sys/devices/virtual/tty/ptyr[0-9]*/uevent'

^C
kernel.printk_ratelimit = 5

the confiugure hook :

#!/bin/sh

echo 'SUBSYSTEM=="gpio", KERNEL=="gpiochip[0-4]", MODE="0660", TAG+="snap_turftank-mk2-sw_mk2m"' > /etc/udev/rules.d/turftank-mk2m-sw-gpio.rules

# Reload udev rules

udevadm control --reload-rules

udevadm trigger

snapcraft.yaml

configure:
    plugs:
    - network
    - network-bind
    - gpio-rules
    - hardware-observe
plugs:
gpio-rules:
    interface: system-files
    write:
    - /etc/udev/rules.d/turftank-mk2m-sw-gpio.rules

Even after this, the udev rules are not reloaded and i have to type in manually after i ssh into it to reload them

so you at least want system-observe here … and you will require a hooks: section in your snapcraft.yaml to set these plugs … i’d also limit the set of rules it reloads (i.e. you likely dont want to reload all the EMMc rules) IIRC udevadm allows to filter by subsystem here …

I have added the system-observer plug

snappy-debug output:

kernel.printk_ratelimit = 0
= AppArmor =
Time: Oct 17 10:26:15
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/proc/1/environ" pid=3828 comm="udevadm" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
File: /proc/1/environ (read)
Suggestions:
* adjust program to not access '@{PROC}/@{pid}/environ'
* do nothing if using systemd utility (eg, timedatectl): https://forum.snapcraft.io/t/managing-time-date-and-timezone-in-ubuntu-core/408/44
* do nothing if program otherwise works properly

= AppArmor =
Time: Oct 17 10:26:16
Log: apparmor="DENIED" operation="open" profile="snap.turftank-mk2m-sw.hook.configure" name="/proc/1/environ" pid=3830 comm="udevadm" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
File: /proc/1/environ (read)
Suggestions:
* adjust program to not access '@{PROC}/@{pid}/environ'
* do nothing if using systemd utility (eg, timedatectl): https://forum.snapcraft.io/t/managing-time-date-and-timezone-in-ubuntu-core/408/44
* do nothing if program otherwise works properly

the udev rules still doesnt reload inside the configure hook, although there are no error when installing the snap.

i changed the configure hook to do :

 !/bin/sh

echo 'SUBSYSTEM=="gpio", KERNEL=="gpiochip[0-4]", MODE="0660", TAG+="snap_turftank-mk2m-sw_state-manager"

SUBSYSTEM=="gpio", KERNEL=="gpiochip[0-4]", MODE="0660", TAG+="snap_turftank-mk2m-sw_mk2l"

SUBSYSTEM=="gpio", KERNEL=="gpiochip[0-4]", MODE="0660", TAG+="snap_turftank-mk2m-sw_mk2m"

SUBSYSTEM=="gpio", KERNEL=="gpiochip[0-4]", MODE="0660", TAG+="snap_turftank-mk2m-sw_gpio-test"' > /etc/udev/rules.d/turftank-mk2m-sw-gpio.rules

udevadm trigger --subsystem-match=gpio

But the udevadm trigger command doesnt work