Reminders and tagger are for some reason trying to do a read on /home/phablet/.local/share/applications/ and /usr/share/applications/, but apparmor policy disallows this:
This is disallowed because allowed them would constitute a privacy leak. I'm not sure why these apps are doing it and not others-- I would guess they are trying to see if an application is installed so it can use it instead of using url dispatcher. Adding qtbase-opensource-src and url-dispatcher tasks, but feel free to adjust.
Reminders and tagger are for some reason trying to do a read on /home/phablet/ .local/ share/applicati ons/ and /usr/share/ applications/ , but apparmor policy disallows this:
apparmor="DENIED" operation="open" profile= "com.ubuntu. developer. mzanetti. tagger_ tagger_ 0.5.1.0" name="/ home/phablet/ .local/ share/applicati ons/" pid=NNN comm="tagger" requested_mask="r" denied_mask="r" fsuid=32011 ouid=32011 "com.ubuntu. developer. mzanetti. tagger_ tagger_ 0.5.1.0" name="/ usr/share/ applications/ " pid=NNN comm="tagger" requested_mask="r" denied_mask="r" fsuid=32011 ouid=0 "com.ubuntu. reminders_ reminders_ 0.5.262" name="/ home/phablet/ .local/ share/applicati ons/" pid=NNN comm="reminders" requested_mask="r" denied_mask="r" fsuid=32011 ouid=32011 "com.ubuntu. reminders_ reminders_ 0.5.262" name="/ usr/share/ applications/ " pid=NNN comm="reminders" requested_mask="r" denied_mask="r" fsuid=32011 ouid=0
apparmor="DENIED" operation="open" profile=
apparmor="DENIED" operation="open" profile=
apparmor="DENIED" operation="open" profile=
This is disallowed because allowed them would constitute a privacy leak. I'm not sure why these apps are doing it and not others-- I would guess they are trying to see if an application is installed so it can use it instead of using url dispatcher. Adding qtbase- opensource- src and url-dispatcher tasks, but feel free to adjust.