ubuntu@lantea:~$ lxc-start -n vivid -F -o /dev/stdout -l debug
lxc-start 1422035718.907 INFO lxc_start_ui - lxc_start.c:main:265 - using rcfile /home/ubuntu/.local/share/lxc/vivid/config
lxc-start 1422035718.908 WARN lxc_confile - confile.c:config_pivotdir:1776 - lxc.pivotdir is ignored. It will soon become an error.
lxc-start 1422035718.908 INFO lxc_confile - confile.c:config_idmap:1384 - read uid map: type u nsid 0 hostid 100000 range 65536
lxc-start 1422035718.908 INFO lxc_confile - confile.c:config_idmap:1384 - read uid map: type g nsid 0 hostid 100000 range 65536
lxc-start 1422035718.909 WARN lxc_log - log.c:lxc_log_init:316 - lxc_log_init called with log already initialized
lxc-start 1422035718.910 WARN lxc_cgmanager - cgmanager.c:cgm_get:963 - do_cgm_get exited with error
lxc-start 1422035718.910 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 1422035718.910 INFO lxc_seccomp - seccomp.c:parse_config_v2:298 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 1422035718.910 INFO lxc_seccomp - seccomp.c:parse_config_v2:371 - Adding non-compat rule for reject_force_umount action 0
lxc-start 1422035718.910 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:192 - Setting seccomp rule to reject force umounts
lxc-start 1422035718.910 INFO lxc_seccomp - seccomp.c:parse_config_v2:382 - Adding compat rule for reject_force_umount action 0
lxc-start 1422035718.910 INFO lxc_seccomp - seccomp.c:parse_config_v2:390 - Adding non-compat rule bc nr1 == nr2 (-1, -1)
lxc-start 1422035718.910 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:192 - Setting seccomp rule to reject force umounts
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:298 - processing: .[all].
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:298 - processing: .kexec_load errno 1.
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:371 - Adding non-compat rule for kexec_load action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:382 - Adding compat rule for kexec_load action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:395 - Really adding compat rule bc nr1 == nr2 (283, 246)
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:298 - processing: .open_by_handle_at errno 1.
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:371 - Adding non-compat rule for open_by_handle_at action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:382 - Adding compat rule for open_by_handle_at action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:395 - Really adding compat rule bc nr1 == nr2 (342, 304)
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:298 - processing: .init_module errno 1.
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:371 - Adding non-compat rule for init_module action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:382 - Adding compat rule for init_module action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:395 - Really adding compat rule bc nr1 == nr2 (128, 175)
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:298 - processing: .finit_module errno 1.
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:371 - Adding non-compat rule for finit_module action 327681
lxc-start 1422035718.911 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:209 - Seccomp: got negative # for syscall: finit_module
lxc-start 1422035718.911 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:210 - This syscall will NOT be blacklisted
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:382 - Adding compat rule for finit_module action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:390 - Adding non-compat rule bc nr1 == nr2 (-10085, -10085)
lxc-start 1422035718.911 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:209 - Seccomp: got negative # for syscall: finit_module
lxc-start 1422035718.911 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:210 - This syscall will NOT be blacklisted
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:298 - processing: .delete_module errno 1.
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:371 - Adding non-compat rule for delete_module action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:382 - Adding compat rule for delete_module action 327681
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:395 - Really adding compat rule bc nr1 == nr2 (129, 176)
lxc-start 1422035718.911 INFO lxc_seccomp - seccomp.c:parse_config_v2:403 - Merging in the compat seccomp ctx into the main one
lxc-start 1422035718.912 DEBUG lxc_conf - conf.c:lxc_create_tty:3298 - allocated pty '/dev/pts/7' (5/6)
lxc-start 1422035718.912 DEBUG lxc_conf - conf.c:lxc_create_tty:3298 - allocated pty '/dev/pts/18' (7/8)
lxc-start 1422035718.912 DEBUG lxc_conf - conf.c:lxc_create_tty:3298 - allocated pty '/dev/pts/19' (9/10)
lxc-start 1422035718.912 DEBUG lxc_conf - conf.c:lxc_create_tty:3298 - allocated pty '/dev/pts/20' (11/12)
lxc-start 1422035718.912 INFO lxc_conf - conf.c:lxc_create_tty:3309 - tty's configured
lxc-start 1422035718.912 DEBUG lxc_start - start.c:setup_signal_fd:259 - sigchild handler set
lxc-start 1422035718.912 DEBUG lxc_console - console.c:lxc_console_peer_default:500 - opening /dev/tty for console peer
lxc-start 1422035718.912 INFO lxc_caps - caps.c:lxc_caps_up:101 - Last supported cap was 36
lxc-start 1422035718.912 DEBUG lxc_console - console.c:lxc_console_peer_default:506 - using '/dev/tty' as console
lxc-start 1422035718.912 DEBUG lxc_console - console.c:lxc_console_sigwinch_init:179 - 3438 got SIGWINCH fd 17
lxc-start 1422035718.912 DEBUG lxc_console - console.c:lxc_console_winsz:88 - set winsz dstfd:14 cols:79 rows:14
lxc-start 1422035719.191 INFO lxc_start - start.c:lxc_init:455 - 'vivid' is initialized
lxc-start 1422035719.191 DEBUG lxc_start - start.c:__lxc_start:1072 - Not dropping cap_sys_boot or watching utmp
lxc-start 1422035719.191 INFO lxc_start - start.c:lxc_spawn:816 - Cloning a new user namespace
lxc-start 1422035719.191 INFO lxc_cgroup - cgroup.c:cgroup_init:65 - cgroup driver cgmanager initing for vivid
lxc-start 1422035719.199 ERROR lxc_cgmanager - cgmanager.c:lxc_cgmanager_enter:694 - call to cgmanager_move_pid_sync failed: invalid request
lxc-start: cgmanager.c: lxc_cgmanager_enter: 694 call to cgmanager_move_pid_sync failed: invalid request
lxc-start 1422035719.238 ERROR lxc_start - start.c:__lxc_start:1099 - failed to spawn 'vivid'
lxc-start: start.c: __lxc_start: 1099 failed to spawn 'vivid'
lxc-start 1422035719.241 ERROR lxc_start_ui - lxc_start.c:main:345 - The container failed to start.
lxc-start: lxc_start.c: main: 345 The container failed to start.
lxc-start 1422035719.242 ERROR lxc_start_ui - lxc_start.c:main:349 - Additional information can be obtained by setting the --logfile and --logpriority options.
lxc-start: lxc_start.c: main: 349 Additional information can be obtained by setting the --logfile and --logpriority options.
Jan 23 17:55:19 lantea cgmanager[593]: cgmanager:do_create_main: pid 3438 (uid 1000 gid 1000) may not create under /run/cgmanager/fs/none,name=systemd/user.slice/user-1000.slice/session-1.scope
Jan 23 17:55:19 lantea cgmanager[593]: cgmanager: Invalid path /run/cgmanager/fs/none,name=systemd/user.slice/user-1000.slice/session-1.scope/vivid
Jan 23 17:55:19 lantea cgmanager[593]: cgmanager:per_ctrl_move_pid_main: Invalid path /run/cgmanager/fs/none,name=systemd/user.slice/user-1000.slice/session-1.scope/vivid