Created
July 31, 2017 10:01
-
-
Save jbd/6b6983514e6c430d2c8db147af025f66 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Enabling debugging | |
Ending argument loop | |
Singularity version: 2.3.1-development.ga78190c8 | |
Exec'ing: /usr/local/libexec/singularity/cli/shell.exec | |
Evaluating args: 'docker://centos:6' | |
VERBOSE2 SINGULARITY_COMMAND_ASIS found as False | |
VERBOSE2 SINGULARITY_ROOTFS found as /tmp/.singularity-runtime.aihvo2qb/centos:6 | |
VERBOSE2 SINGULARITY_METADATA_FOLDER found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d | |
VERBOSE2 SINGULARITY_FIX_PERMS found as False | |
VERBOSE2 SINGULARITY_COLORIZE not defined (None) | |
VERBOSE2 SINGULARITY_DISABLE_CACHE found as False | |
VERBOSE2 SINGULARITY_CACHEDIR found as /home/jbdenis/.singularity | |
VERBOSE2 SINGULARITY_ENVIRONMENT found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/environment | |
VERBOSE2 SINGULARITY_RUNSCRIPT found as /tmp/.singularity-runtime.aihvo2qb/centos:6/singularity | |
VERBOSE2 SINGULARITY_TESTFILE found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/test | |
VERBOSE2 SINGULARITY_DEFFILE found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/Singularity | |
VERBOSE2 SINGULARITY_ENVBASE found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/env | |
VERBOSE2 SINGULARITY_LABELFILE found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/labels.json | |
VERBOSE2 SINGULARITY_INCLUDECMD found as False | |
VERBOSE2 SINGULARITY_PULLFOLDER found as /home/jbdenis | |
VERBOSE2 SHUB_NAMEBYHASH not defined (None) | |
VERBOSE2 SHUB_NAMEBYCOMMIT not defined (None) | |
VERBOSE2 SHUB_CONTAINERNAME not defined (None) | |
VERBOSE2 SINGULARITY_CONTENTS found as /tmp/.singularity-layers.1writyZF | |
VERBOSE2 SINGULARITY_PYTHREADS found as 9 | |
VERBOSE2 SINGULARITY_CONTAINER found as docker://centos:6 | |
DEBUG Found uri docker:// | |
DEBUG | |
*** STARTING DOCKER IMPORT PYTHON **** | |
DEBUG Docker layers and metadata will be written to: /tmp/.singularity-layers.1writyZF | |
VERBOSE2 SINGULARITY_DOCKER_USERNAME not defined (None) | |
VERBOSE2 SINGULARITY_DOCKER_PASSWORD found | |
DEBUG Starting Docker IMPORT, includes environment, runscript, and metadata. | |
VERBOSE Docker image: centos:6 | |
VERBOSE2 Specified Docker ENTRYPOINT as %runscript. | |
DEBUG Headers found: Content-Type,Accept | |
VERBOSE Registry: index.docker.io | |
VERBOSE Namespace: library | |
VERBOSE Repo Name: centos | |
VERBOSE Repo Tag: 6 | |
VERBOSE Version: None | |
VERBOSE Obtaining tags: https://index.docker.io/v2/library/centos/tags/list | |
DEBUG GET https://index.docker.io/v2/library/centos/tags/list | |
DEBUG Http Error with code 401 | |
DEBUG GET https://auth.docker.io/token?service=registry.docker.io&expires_in=9000&scope=repository:library/centos:pull | |
DEBUG Headers found: Content-Type,Authorization,Accept | |
VERBOSE3 Response on obtaining token is None. | |
VERBOSE Obtaining manifest: https://index.docker.io/v2/library/centos/manifests/6 | |
DEBUG GET https://index.docker.io/v2/library/centos/manifests/6 | |
DEBUG Image manifest version 2.2 found. | |
DEBUG Adding digest sha256:8b04204cfecd799ca315da5d0460363f2c114ed699bc0a2e023bb26fd85243ee | |
VERBOSE Obtaining manifest: https://index.docker.io/v2/library/centos/manifests/6 | |
DEBUG GET https://index.docker.io/v2/library/centos/manifests/6 | |
DEBUG Using 9 workers for multiprocess. | |
VERBOSE3 Found Docker command (Entrypoint) None | |
VERBOSE3 Found Docker command (Cmd) /bin/bash | |
VERBOSE3 Adding Docker CMD as Singularity runscript... | |
DEBUG /bin/bash | |
VERBOSE3 Found Docker command (Env) PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin | |
VERBOSE3 Found Docker container environment! | |
VERBOSE3 Adding Docker environment to metadata tar | |
DEBUG Found template for tarinfo | |
VERBOSE3 Found Docker command (Labels) {u'build-date': u'20170705', u'vendor': u'CentOS', u'name': u'CentOS Base Image', u'license': u'GPLv2'} | |
VERBOSE3 Found Docker container labels! | |
VERBOSE3 Adding Docker labels to metadata tar | |
DEBUG Found template for tarinfo | |
VERBOSE3 Adding Docker runscript to metadata tar | |
DEBUG Found template for tarinfo | |
DEBUG metadata file /home/jbdenis/.singularity/metadata/sha256:60e3079474b1671bcc20b340572ee6cae735ecdd5a13d6686475ca4916eb6003.tar.gz already exists will over-write. | |
VERBOSE2 Tar file with Docker env and labels: /home/jbdenis/.singularity/metadata/sha256:60e3079474b1671bcc20b340572ee6cae735ecdd5a13d6686475ca4916eb6003.tar.gz | |
VERBOSE3 Writing Docker layers files to /tmp/.singularity-layers.1writyZF | |
VERBOSE2 Writing file /tmp/.singularity-layers.1writyZF with mode w. | |
VERBOSE2 Writing file /tmp/.singularity-layers.1writyZF with mode a. | |
DEBUG *** FINISHING DOCKER IMPORT PYTHON PORTION **** | |
Docker image path: index.docker.io/library/centos:6 | |
Cache folder set to /home/jbdenis/.singularity/docker | |
Creating container runtime... | |
Importing: base Singularity environment | |
Exploding layer: sha256:8b04204cfecd799ca315da5d0460363f2c114ed699bc0a2e023bb26fd85243ee.tar.gz | |
Exploding layer: sha256:60e3079474b1671bcc20b340572ee6cae735ecdd5a13d6686475ca4916eb6003.tar.gz | |
VERBOSE [U=0,P=24268] message_init() Set messagelevel to: 5 | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Initialize configuration file: /usr/local/etc/singularity/singularity.conf | |
[0mDEBUG [U=0,P=24268] singularity_config_parse() Starting parse of configuration file /usr/local/etc/singularity/singularity.conf | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key allow setuid = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key max loop devices = '256' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key allow pid ns = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key config passwd = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key config group = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key config resolv_conf = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount proc = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount sys = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount dev = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount home = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount tmp = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount hostfs = 'no' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key bind path = '/etc/localtime' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key bind path = '/etc/hosts' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key user bind control = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key enable overlay = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount slave = 'yes' | |
[0mVERBOSE [U=0,P=24268] singularity_config_parse() Got config key sessiondir max size = '16' | |
[0mDEBUG [U=0,P=24268] singularity_config_parse() Finished parsing configuration file '/usr/local/etc/singularity/singularity.conf' | |
[0mVERBOSE [U=0,P=24268] singularity_registry_init() Initializing Singularity Registry | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'COMMAND' = 'shell' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(COMMAND, shell) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'SYSCONFDIR' = '/usr/local/etc' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(sysconfdir, /usr/local/etc) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'CLEANUPDIR' = '/tmp/.singularity-runtime.aihvo2qb' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(CLEANUPDIR, /tmp/.singularity-runtime.aihvo2qb) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'ROOTFS' = '/tmp/.singularity-runtime.aihvo2qb/centos:6' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(ROOTFS, /tmp/.singularity-runtime.aihvo2qb/centos:6) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'CONTAINER' = 'docker://centos:6' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(CONTAINER, docker://centos:6) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'VERSION' = '2.3.1-development.ga78190c8' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(version, 2.3.1-development.ga78190c8) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'IMAGE' = '/tmp/.singularity-runtime.aihvo2qb/centos:6' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(IMAGE, /tmp/.singularity-runtime.aihvo2qb/centos:6) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'MESSAGELEVEL' = '5' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(MESSAGELEVEL, 5) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'CONTENTS' = '/tmp/.singularity-layers.1writyZF' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(CONTENTS, /tmp/.singularity-layers.1writyZF) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'BINDIR' = '/usr/local/bin' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(bindir, /usr/local/bin) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'LOCALSTATEDIR' = '/usr/local/var' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(localstatedir, /usr/local/var) = 0 | |
[0mVERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'LIBEXECDIR' = '/usr/local/libexec' | |
[0mDEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(libexecdir, /usr/local/libexec) = 0 | |
[0mDEBUG [U=0,P=24268] singularity_registry_get() Returning NULL on 'HOME' | |
[0mDEBUG [U=0,P=24268] singularity_registry_get() Returning NULL on 'TARGET_UID' | |
[0mDEBUG [U=0,P=24268] singularity_registry_get() Returning NULL on 'TARGET_GID' | |
[0mDEBUG [U=0,P=24268] singularity_priv_init() Initializing user info | |
[0mDEBUG [U=0,P=24268] singularity_priv_init() Set the calling user's username to: jbdenis | |
[0mDEBUG [U=0,P=24268] singularity_priv_init() Marking uinfo structure as ready | |
[0mDEBUG [U=0,P=24268] singularity_priv_init() Obtaining home directory | |
[0mVERBOSE [U=0,P=24268] singularity_priv_init() Set home (via getpwuid()) to: /home/jbdenis | |
[0mVERBOSE [U=0,P=24268] singularity_suid_init() Running SUID program workflow | |
[0mVERBOSE [U=0,P=24268] singularity_suid_init() Checking program has appropriate permissions | |
[0mVERBOSE [U=0,P=24268] singularity_suid_init() Checking configuration file is properly owned by root | |
[0mVERBOSE [U=0,P=24268] singularity_suid_init() Checking if singularity.conf allows us to run as suid | |
[0mDEBUG [U=0,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow setuid, yes) | |
[0mDEBUG [U=0,P=24268] singularity_config_get_value_impl() Returning configuration value allow setuid='yes' | |
[0mDEBUG [U=0,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow setuid, yes) = 1 | |
[0mDEBUG [U=0,P=24268] singularity_registry_get() Returning NULL on 'NOSUID' | |
[0mVERBOSE [U=0,P=24268] singularity_priv_userns() Invoking the user namespace | |
[0mDEBUG [U=0,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow user ns, yes) | |
[0mDEBUG [U=0,P=24268] singularity_config_get_value_impl() No configuration entry found for 'allow user ns'; returning default value 'yes' | |
[0mDEBUG [U=0,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow user ns, yes) = 1 | |
[0mVERBOSE [U=0,P=24268] singularity_priv_userns() Not virtualizing USER namespace: running as SUID | |
[0mDEBUG [U=0,P=24268] singularity_priv_userns() Returning singularity_priv_init(void) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'CLEANUPDIR' = '/tmp/.singularity-runtime.aihvo2qb' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'NOSESSIONCLEANUP' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'NOCLEANUP' | |
[0mDEBUG [U=21489,P=24268] singularity_cleanupd() Creating new cleanup trigger file: /tmp/.singularity-cleanuptrigger.xupuco7z | |
[0mDEBUG [U=21489,P=24268] singularity_cleanupd() Opening cleanup trigger file: /tmp/.singularity-cleanuptrigger.xupuco7z | |
[0mDEBUG [U=21489,P=24268] singularity_cleanupd() Gaining an exclusive flock on FD 4 | |
[0mVERBOSE [U=21489,P=2949] singularity_cleanupd() Exec'ing cleanupd thread: /usr/local/libexec/singularity/bin/cleanupd | |
[0mDEBUG [U=21489,P=2949] envar_set() Setting environment variable: 'SINGULARITY_CLEANUPDIR' = '/tmp/.singularity-runtime.aihvo2qb' | |
[0mDEBUG [U=21489,P=2949] envar_set() Setting environment variable: 'SINGULARITY_CLEANUPTRIGGER' = '/tmp/.singularity-cleanuptrigger.xupuco7z' | |
[0mVERBOSE [U=21489,P=2949] message_init() Set messagelevel to: 5 | |
[0mDEBUG [U=21489,P=2949] envar_path() Checking environment variable is valid path: 'SINGULARITY_CLEANUPDIR' | |
[0mVERBOSE [U=21489,P=2949] envar_get() Checking input from environment: 'SINGULARITY_CLEANUPDIR' | |
[0mDEBUG [U=21489,P=2949] envar_get() Checking environment variable is defined: SINGULARITY_CLEANUPDIR | |
[0mDEBUG [U=21489,P=2949] envar_get() Checking environment variable length (<= 4096): SINGULARITY_CLEANUPDIR | |
[0mDEBUG [U=21489,P=2949] envar_get() Checking environment variable has allowed characters: SINGULARITY_CLEANUPDIR | |
[0mVERBOSE [U=21489,P=2949] envar_get() Obtained input from environment 'SINGULARITY_CLEANUPDIR' = '/tmp/.singularity-runtime.aihvo2qb' | |
[0mDEBUG [U=21489,P=2949] envar_path() Checking environment variable is valid path: 'SINGULARITY_CLEANUPTRIGGER' | |
[0mVERBOSE [U=21489,P=2949] envar_get() Checking input from environment: 'SINGULARITY_CLEANUPTRIGGER' | |
[0mDEBUG [U=21489,P=2949] envar_get() Checking environment variable is defined: SINGULARITY_CLEANUPTRIGGER | |
[0mDEBUG [U=21489,P=2949] envar_get() Checking environment variable length (<= 4096): SINGULARITY_CLEANUPTRIGGER | |
[0mDEBUG [U=21489,P=2949] envar_get() Checking environment variable has allowed characters: SINGULARITY_CLEANUPTRIGGER | |
[0mVERBOSE [U=21489,P=2949] envar_get() Obtained input from environment 'SINGULARITY_CLEANUPTRIGGER' = '/tmp/.singularity-cleanuptrigger.xupuco7z' | |
[0mDEBUG [U=21489,P=2949] main() Starting cleanup process | |
[0mDEBUG [U=21489,P=2949] main() Opening cleanup trigger file: /tmp/.singularity-cleanuptrigger.xupuco7z | |
[0mDEBUG [U=21489,P=2949] main() Checking to see if we need to daemonize | |
[0mVERBOSE [U=21489,P=2949] main() Daemonizing cleandir cleanup process | |
[0mDEBUG [U=21489,P=2950] main() Waiting for exclusive flock() on trigger file descriptor: 4 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_ns() Calling: _singularity_runtime_ns_pid() | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow pid ns, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value allow pid ns='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow pid ns, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'UNSHARE_PID' | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_ns_pid() Not virtualizing PID namespace on user request | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_ns() Calling: _singularity_runtime_ns_ipc() | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow ipc ns, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() No configuration entry found for 'allow ipc ns'; returning default value 'yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow ipc ns, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'UNSHARE_IPC' | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_ns_ipc() Not virtualizing IPC namespace on user request | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_ns() Calling: _singularity_runtime_ns_mnt() | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount slave, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount slave='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount slave, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mDEBUG [U=0,P=24268] singularity_runtime_ns_mnt() Virtualizing FS namespace | |
[0mDEBUG [U=0,P=24268] singularity_runtime_ns_mnt() Virtualizing mount namespace | |
[0mDEBUG [U=0,P=24268] singularity_runtime_ns_mnt() Making mounts slave | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_sessiondir() Setting sessiondir | |
[0mVERBOSE [U=21489,P=24268] singularity_sessiondir() Using session directory: /usr/local/var/singularity/mnt/session | |
[0mDEBUG [U=21489,P=24268] singularity_sessiondir() Checking for session directory: /usr/local/var/singularity/mnt/session | |
[0mDEBUG [U=21489,P=24268] singularity_sessiondir() Obtaining the default sessiondir size | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value sessiondir max size='16' | |
[0mDEBUG [U=21489,P=24268] singularity_sessiondir() Converted sessiondir size to: 16 | |
[0mDEBUG [U=21489,P=24268] singularity_sessiondir() Creating the sessiondir size mount option length | |
[0mDEBUG [U=21489,P=24268] singularity_sessiondir() Got size length of: 9 | |
[0mDEBUG [U=21489,P=24268] singularity_sessiondir() Creating the sessiondir size mount option string | |
[0mDEBUG [U=21489,P=24268] singularity_sessiondir() Checking to make sure the string was allocated correctly | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mDEBUG [U=0,P=24268] singularity_sessiondir() Mounting sessiondir tmpfs: /usr/local/var/singularity/mnt/session | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mVERBOSE [U=21489,P=24268] singularity_registry_set() Adding value to registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_set() Returning singularity_registry_set(SESSIONDIR, /usr/local/var/singularity/mnt/session) = 0 | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'IMAGE' = '/tmp/.singularity-runtime.aihvo2qb/centos:6' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'WRITABLE' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() No configuration entry found for 'limit container owners'; returning default value 'NULL' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() No configuration entry found for 'limit container paths'; returning default value 'NULL' | |
[0mDEBUG [U=21489,P=24268] singularity_image_open() Opening file descriptor to image: /tmp/.singularity-runtime.aihvo2qb/centos:6 | |
[0mVERBOSE [U=21489,P=24268] singularity_image_check() Checking what kind of image we are mounting | |
[0mVERBOSE [U=21489,P=24268] singularity_image_check_image() Image is a directory, returning retval=1: /tmp/.singularity-runtime.aihvo2qb/centos:6 | |
[0mDEBUG [U=21489,P=24268] singularity_image_check_squashfs() Image does not appear to be of type '.sqsh': /tmp/.singularity-runtime.aihvo2qb/centos:6 | |
[0mDEBUG [U=21489,P=24268] singularity_image_check_dir() Checking if image is a directory | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value max loop devices='256' | |
[0mDEBUG [U=21489,P=24268] singularity_image_bind() Entered singularity_image_bind() | |
[0mDEBUG [U=21489,P=24268] singularity_image_bind() Converting max_loop_devs_string to int: '256' | |
[0mDEBUG [U=21489,P=24268] singularity_image_bind() Converted max_loop_devs_string to int: '256' -> 256 | |
[0mDEBUG [U=21489,P=24268] singularity_image_bind() Checking if this image has been properly opened | |
[0mDEBUG [U=21489,P=24268] singularity_image_bind() Checking if image is valid file | |
[0mVERBOSE [U=21489,P=24268] singularity_image_bind() Skipping image bind, container is not a file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_rootfs() Set container directory to: /usr/local/var/singularity/mnt/container | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Checking for container directory | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container | |
[0mDEBUG [U=21489,P=24268] chk_mode() Checking exact mode (40755) on: /usr/local/var/singularity/mnt/container | |
[0mDEBUG [U=21489,P=24268] chk_mode() Found appropriate mode on file: /usr/local/var/singularity/mnt/container | |
[0mVERBOSE [U=21489,P=24268] singularity_image_mount() Checking what kind of image we are mounting | |
[0mVERBOSE [U=21489,P=24268] singularity_image_mount() Attempting to mount as directory image | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mDEBUG [U=0,P=24268] singularity_image_mount_dir_mount() Mounting container directory /tmp/.singularity-runtime.aihvo2qb/centos:6->/usr/local/var/singularity/mnt/container | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container | |
[0mDEBUG [U=21489,P=24268] action_ready() Checking if container is valid at: /usr/local/var/singularity/mnt/container | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_overlayfs() Checking if overlayfs should be used | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(enable overlay, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value enable overlay='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(enable overlay, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'DISABLE_OVERLAYFS' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'WRITABLE' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_overlayfs() OverlayFS enabled by host build | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_overlayfs() Setting up overlay mount options | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_overlayfs() Checking for existance of overlay directory: /usr/local/var/singularity/mnt/overlay | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mDEBUG [U=0,P=24268] singularity_runtime_overlayfs() Mounting overlay tmpfs: /usr/local/var/singularity/mnt/overlay | |
[0mDEBUG [U=0,P=24268] singularity_runtime_overlayfs() Creating upper overlay directory: /usr/local/var/singularity/mnt/overlay/upper | |
[0mDEBUG [U=0,P=24268] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/overlay/upper | |
[0mDEBUG [U=0,P=24268] singularity_runtime_overlayfs() Creating overlay work directory: /usr/local/var/singularity/mnt/overlay/work | |
[0mDEBUG [U=0,P=24268] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/overlay/work | |
[0mDEBUG [U=0,P=24268] singularity_runtime_overlayfs() Creating overlay_final directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=0,P=24268] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_overlayfs() Mounting overlay with options: lowerdir=/usr/local/var/singularity/mnt/container,upperdir=/usr/local/var/singularity/mnt/overlay/upper,workdir=/usr/local/var/singularity/mnt/overlay/work | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mVERBOSE [U=21489,P=24268] singularity_registry_set() Adding value to registry: 'OVERLAYFS_ENABLED' = '1' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_set() Returning singularity_registry_set(OVERLAYFS_ENABLED, 1) = 0 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_overlayfs() Updating the containerdir to: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Setting container_directory = '/usr/local/var/singularity/mnt/overlay/final' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_mounts() Running all mount components | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount hostfs, no) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount hostfs='no' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount hostfs, no) = 0 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_hostfs() Not mounting host file systems per configuration | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_binds() Checking configuration file for 'bind path' | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_mount_binds() Found 'bind path' = /etc/localtime, /etc/localtime | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_binds() Checking if bind point is already mounted: /etc/localtime | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts | |
[0mDEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_mount_binds() Binding '/etc/localtime' to '/usr/local/var/singularity/mnt/overlay/final//etc/localtime' | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_mount_binds() Found 'bind path' = /etc/hosts, /etc/hosts | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_binds() Checking if bind point is already mounted: /etc/hosts | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts | |
[0mDEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_mount_binds() Binding '/etc/hosts' to '/usr/local/var/singularity/mnt/overlay/final//etc/hosts' | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_kernelfs() Checking configuration file for 'mount proc' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount proc, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount proc='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount proc, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'PIDNS_ENABLED' | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_mount_kernelfs() Bind-mounting host /proc | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_kernelfs() Checking configuration file for 'mount sys' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount sys, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount sys='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount sys, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_mount_kernelfs() Mounting /sys | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount dev='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_dev() Checking configuration file for 'mount dev' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount dev, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount dev='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount dev, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_mount_dev() Bind mounting /dev | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount home, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount home='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount home, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking that home directry is configured: /home/jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking if SINGULARITY_CONTAIN is set | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking if home directories are being influenced by user | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'HOME' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking ownership of home directory source: /home/jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking to make sure home directory destination is a full path: /home/jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking if home directory is already mounted: /home/jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts | |
[0mDEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking if overlay is enabled | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'OVERLAYFS_ENABLED' = '1' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Binding home directory direct (no staging) | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Setting home directory source to: '/home/jbdenis' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Setting home directory dest to: '/usr/local/var/singularity/mnt/overlay/final' + '/home/jbdenis' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Creating home directry within container: /usr/local/var/singularity/mnt/overlay/final/home/jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mDEBUG [U=0,P=24268] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/overlay/final/home/jbdenis | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_home() Created home directory within the container: /usr/local/var/singularity/mnt/overlay/final/home/jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_mount_home() Mounting home directory source into container: /home/jbdenis -> /usr/local/var/singularity/mnt/overlay/final/home/jbdenis | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'HOME' = '/home/jbdenis' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_userbinds() Checking for environment variable 'SINGULARITY_BINDPATH' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'BINDPATH' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_userbinds() No user bind mounts specified. | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount tmp, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount tmp='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount tmp, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts | |
[0mDEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts | |
[0mDEBUG [U=21489,P=24268] s_mkpath() Directory exists, returning '0': /tmp | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_mount_tmp() Mounting directory: /tmp | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts | |
[0mDEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts | |
[0mDEBUG [U=21489,P=24268] s_mkpath() Directory exists, returning '0': /var/tmp | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_mount_tmp() Mounting directory: /var/tmp | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_scratch() Getting SINGULARITY_SCRATCHDIR from environment | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'SCRATCHDIR' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_scratch() Not mounting scratch directory: Not requested | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_cwd() Checking to see if we should mount current working directory | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_cwd() Getting current working directory | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_cwd() Checking if current directory exists in container | |
[0mDEBUG [U=21489,P=24268] file_devino() Called file_devino(/home/jbdenis) | |
[0mDEBUG [U=21489,P=24268] file_devino() Returning file_devino(/home/jbdenis) = 65025.1610612929 | |
[0mDEBUG [U=21489,P=24268] file_devino() Called file_devino(/usr/local/var/singularity/mnt/overlay/final/home/jbdenis) | |
[0mDEBUG [U=21489,P=24268] file_devino() Returning file_devino(/usr/local/var/singularity/mnt/overlay/final/home/jbdenis) = 65025.1610612929 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_mount_cwd() Checking if container's cwd == host's cwd | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_mount_cwd() Not mounting current directory: location already available within container | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files() Running file components | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_files_passwd() Called singularity_file_passwd_create() | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_files_passwd() Checking configuration option: 'config passwd' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(config passwd, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value config passwd='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(config passwd, yes) = 1 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_passwd() Checking for template passwd file: /usr/local/var/singularity/mnt/overlay/final/etc/passwd | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_passwd() Creating template of /etc/passwd | |
[0mDEBUG [U=21489,P=24268] copy_file() Called copy_file(/usr/local/var/singularity/mnt/overlay/final/etc/passwd, /usr/local/var/singularity/mnt/session/passwd) | |
[0mDEBUG [U=21489,P=24268] copy_file() Opening source file: /usr/local/var/singularity/mnt/overlay/final/etc/passwd | |
[0mDEBUG [U=21489,P=24268] copy_file() Opening destination file: /usr/local/var/singularity/mnt/session/passwd | |
[0mDEBUG [U=21489,P=24268] copy_file() Calling fstat() on source file descriptor: 8 | |
[0mDEBUG [U=21489,P=24268] copy_file() Cloning permission string of source to dest | |
[0mDEBUG [U=21489,P=24268] copy_file() Copying file data... | |
[0mDEBUG [U=21489,P=24268] copy_file() Done copying data, closing file pointers | |
[0mDEBUG [U=21489,P=24268] copy_file() Returning copy_file(/usr/local/var/singularity/mnt/overlay/final/etc/passwd, /usr/local/var/singularity/mnt/session/passwd) = 0 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_passwd() Creating template passwd file and appending user data: /usr/local/var/singularity/mnt/session/passwd | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] container_file_bind() Called file_bind(/usr/local/var/singularity/mnt/session/passwd, /etc/passwd() | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] container_file_bind() Binding file '/usr/local/var/singularity/mnt/session/passwd' to '/usr/local/var/singularity/mnt/overlay/final/etc/passwd' | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'HOME' = '/home/jbdenis' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_files_group() Called singularity_file_group_create() | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_files_group() Checking configuration option: 'config group' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(config group, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value config group='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(config group, yes) = 1 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Creating template of /etc/group for containment | |
[0mDEBUG [U=21489,P=24268] copy_file() Called copy_file(/usr/local/var/singularity/mnt/overlay/final/etc/group, /usr/local/var/singularity/mnt/session/group) | |
[0mDEBUG [U=21489,P=24268] copy_file() Opening source file: /usr/local/var/singularity/mnt/overlay/final/etc/group | |
[0mDEBUG [U=21489,P=24268] copy_file() Opening destination file: /usr/local/var/singularity/mnt/session/group | |
[0mDEBUG [U=21489,P=24268] copy_file() Calling fstat() on source file descriptor: 8 | |
[0mDEBUG [U=21489,P=24268] copy_file() Cloning permission string of source to dest | |
[0mDEBUG [U=21489,P=24268] copy_file() Copying file data... | |
[0mDEBUG [U=21489,P=24268] copy_file() Done copying data, closing file pointers | |
[0mDEBUG [U=21489,P=24268] copy_file() Returning copy_file(/usr/local/var/singularity/mnt/overlay/final/etc/group, /usr/local/var/singularity/mnt/session/group) = 0 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Updating group file with user info | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_files_group() Getting supplementary group info | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 24 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('cdrom') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 25 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('floppy') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 27 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('sudo') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 29 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('audio') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 30 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('dip') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 44 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('video') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 46 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('plugdev') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 108 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('netdev') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 112 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('lpadmin') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 113 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('scanner') info to template group file | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 126 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('libvirt') info to template group file | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_files_group() Skipping duplicate supplementary group | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 64055 | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('libvirt-qemu') info to template group file | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] container_file_bind() Called file_bind(/usr/local/var/singularity/mnt/session/group, /etc/group() | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] container_file_bind() Binding file '/usr/local/var/singularity/mnt/session/group' to '/usr/local/var/singularity/mnt/overlay/final/etc/group' | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_files_resolvconf() Checking configuration option | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(config resolv_conf, yes) | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value config resolv_conf='yes' | |
[0mDEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(config resolv_conf, yes) = 1 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] container_file_bind() Called file_bind(/etc/resolv.conf, /etc/resolv.conf() | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] container_file_bind() Binding file '/etc/resolv.conf' to '/usr/local/var/singularity/mnt/overlay/final/etc/resolv.conf' | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAINLIBS' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mVERBOSE [U=21489,P=24268] singularity_runtime_enter() Containing all rootfs components | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mVERBOSE [U=0,P=24268] singularity_runtime_enter_chroot() Entering container file system root: /usr/local/var/singularity/mnt/overlay/final | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs) | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_enter_chroot() Changing dir to '/' within the new root | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Cloning environment | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Counted 57 environment elements | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CLEANENV' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Cleaning environment | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_COMMAND=shell | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_COMMAND | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc=01;31:*.arj=01;31:*.taz=01;31:*.lha=01;31:*.lz4=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.tzo=01;31:*.t7z=01;31:*.zip=01;31:*.z=01;31:*.Z=01;31:*.dz=01;31:*.gz=01;31:*.lrz=01;31:*.lz=01;31:*.lzo=01;31:*.xz=01;31:*.zst=01;31:*.tzst=01;31:*.bz2=01;31:*.bz(TRUNCATED...) | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_sysconfdir=/usr/local/etc | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_sysconfdir | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: LANG=en_US.UTF-8 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: GDM_LANG=en_US.UTF-8 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: PROFILEHOME= | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: DISPLAY=:0 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: OLDPWD=/usr/local | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SHELL_SESSION_ID=d1e7c8c96cab445d95feda2ab3fd6dfd | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITYENV_PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: COLORTERM=truecolor | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: USERNAME=jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_CLEANUPDIR=/tmp/.singularity-runtime.aihvo2qb | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_CLEANUPDIR | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_VTNR=2 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SSH_AUTH_SOCK=/tmp/ssh-cnDAwFU4WJii/agent.1207 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: S_COLORS=auto | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_SESSION_ID=4 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: USER=jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_ROOTFS=/tmp/.singularity-runtime.aihvo2qb/centos:6 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_ROOTFS | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: DESKTOP_SESSION=i3 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_CONTAINER=docker://centos:6 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_CONTAINER | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_version=2.3.1-development.ga78190c8 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_version | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: PWD=/home/jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: HOME=/home/jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: JOURNAL_STREAM=9:22298 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SSH_AGENT_PID=1262 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: QT_ACCESSIBILITY=1 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_SESSION_TYPE=x11 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: KONSOLE_DBUS_SESSION=/Sessions/1 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_SESSION_DESKTOP=i3 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: KONSOLE_DBUS_WINDOW=/Windows/1 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_IMAGE=/tmp/.singularity-runtime.aihvo2qb/centos:6 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_IMAGE | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: WINDOWPATH=2 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: TERM=xterm-256color | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SHELL=/bin/bash | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: KONSOLE_DBUS_SERVICE=:1.198 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_MESSAGELEVEL=5 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_MESSAGELEVEL | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_CONTENTS=/tmp/.singularity-layers.1writyZF | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_CONTENTS | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_CURRENT_DESKTOP=i3 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: GPG_AGENT_INFO=/run/user/21489/gnupg/S.gpg-agent:0:1 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: KONSOLE_PROFILE_NAME=Profile 6 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: QT_LINUX_ACCESSIBILITY_ALWAYS_ON=1 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SHLVL=1 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: COLORFGBG=15;0 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_SEAT=seat0 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: LANGUAGE= | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_bindir=/usr/local/bin | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_bindir | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: WINDOWID=50331654 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: GDMSESSION=i3 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: LOGNAME=jbdenis | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/21489/bus | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_RUNTIME_DIR=/run/user/21489 | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XAUTHORITY=/run/user/21489/gdm/Xauthority | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: PATH=/bin:/usr/bin:/usr/local/bin:/sbin:/usr/sbin:/usr/local/sbin | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_localstatedir=/usr/local/var | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_localstatedir | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITYENV_HISTFILE= | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_libexecdir=/usr/local/libexec | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_libexecdir | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Transposing environment | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Converting envar 'SINGULARITYENV_PATH' to 'PATH' = '/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin' | |
[0mDEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'PATH' = '/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin' | |
[0mDEBUG [U=21489,P=24268] singularity_runtime_environment() Converting envar 'SINGULARITYENV_HISTFILE' to 'HISTFILE' = '(null)' | |
[0mDEBUG [U=21489,P=24268] envar_set() Unsetting environment variable: HISTFILE | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop_perm() Called singularity_priv_drop_perm(void) | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop_perm() Escalating permissison so we can properly drop permission | |
[0mDEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489) | |
[0mDEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs. | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop_perm() Resetting supplementary groups | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop_perm() Dropping to group ID '1000' | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop_perm() Dropping real and effective privileges to GID = '1000' | |
[0mDEBUG [U=0,P=24268] singularity_priv_drop_perm() Dropping real and effective privileges to UID = '21489' | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop_perm() Confirming we have correct GID | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop_perm() Confirming we have correct UID | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop_perm() Setting NO_NEW_PRIVS to prevent future privilege escalations. | |
[0mDEBUG [U=21489,P=24268] singularity_priv_drop_perm() Finished dropping privileges | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'TARGET_PWD' | |
[0mDEBUG [U=21489,P=24268] main() Attempting to chdir to CWD: /home/jbdenis | |
[0mDEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'SINGULARITY_CONTAINER' = 'centos:6' | |
[0mDEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'SINGULARITY_NAME' = 'centos:6' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'SHELL' | |
[0mDEBUG [U=21489,P=24268] envar_set() Unsetting environment variable: SINGULARITY_SHELL | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'COMMAND' = 'shell' | |
[0mDEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'COMMAND' = 'shell' | |
[0m[34mLOG [U=21489,P=24268] main() USER=jbdenis, IMAGE='centos:6', COMMAND='shell' | |
[0mINFO [U=21489,P=24268] action_shell() Singularity: Invoking an interactive shell within container... | |
[0mDEBUG [U=21489,P=24268] action_shell() Exec'ing /.singularity.d/actions/shell | |
[0mVERBOSE [U=21489,P=2950] main() Cleaning directory: /tmp/.singularity-runtime.aihvo2qb | |
[0mDEBUG [U=21489,P=2950] s_rmdir() Removing directory: /tmp/.singularity-runtime.aihvo2qb | |
[0m |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment