Skip to content

Instantly share code, notes, and snippets.

@pvanheus
Created May 25, 2018 10:12
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save pvanheus/94f5cb00844907ad1fe97f40ee606937 to your computer and use it in GitHub Desktop.
Save pvanheus/94f5cb00844907ad1fe97f40ee606937 to your computer and use it in GitHub Desktop.
$ singularity --debug exec --contain --pid --ipc --userns --bind /tmp/tmpv6cVzR:/var/spool/cwl:rw --bind /tmp/tmpvRfDmI:/tmp:rw --bind /home/pvh/cwltutorial/data/dna.txt:/var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt:ro --pwd /var/spool/cwl /home/pvh/cwltutorial/pvanheus-reverse-latest.img reverse.py /var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt > /tmp/tmpv6cVzR/dna_reversed.txt
Enabling debugging
Ending argument loop
Singularity version: 2.4.5-dist
Exec'ing: /usr/local/libexec/singularity/cli/exec.exec
Evaluating args: '--contain --pid --ipc --userns --bind /tmp/tmpv6cVzR:/var/spool/cwl:rw --bind /tmp/tmpvRfDmI:/tmp:rw --bind /home/pvh/cwltutorial/data/dna.txt:/var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt:ro --pwd /var/spool/cwl /home/pvh/cwltutorial/pvanheus-reverse-latest.img reverse.py /var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt'
VERBOSE [U=1024,P=6583] message_init() Set messagelevel to: 5
DEBUG [U=1024,P=6583] fd_cleanup() Cleanup file descriptor table
VERBOSE [U=1024,P=6583] singularity_config_parse() Initialize configuration file: /usr/local/etc/singularity/singularity.conf
DEBUG [U=1024,P=6583] singularity_config_parse() Starting parse of configuration file /usr/local/etc/singularity/singularity.conf
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow setuid = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key max loop devices = '256'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow pid ns = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key config passwd = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key config group = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key config resolv_conf = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount proc = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount sys = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount dev = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount devpts = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount home = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount tmp = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount hostfs = 'no'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key bind path = '/etc/localtime'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key bind path = '/etc/hosts'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key bind path = '/data'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key bind path = '/etc/timezone'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key user bind control = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key enable overlay = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount slave = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key sessiondir max size = '16'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow container squashfs = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow container extfs = 'yes'
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow container dir = 'yes'
DEBUG [U=1024,P=6583] singularity_config_parse() Finished parsing configuration file '/usr/local/etc/singularity/singularity.conf'
VERBOSE [U=1024,P=6583] singularity_registry_init() Initializing Singularity Registry
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'CONTAIN' = '1'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(CONTAIN, 1) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'LIBEXECDIR' = '/usr/local/libexec'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(libexecdir, /usr/local/libexec) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'COMMAND' = 'exec'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(COMMAND, exec) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'MESSAGELEVEL' = '5'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(MESSAGELEVEL, 5) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'NOSUID' = '1'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(NOSUID, 1) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'VERSION' = '2.4.5-dist'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(version, 2.4.5-dist) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'LOCALSTATEDIR' = '/usr/local/var'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(localstatedir, /usr/local/var) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'TARGET_PWD' = '/var/spool/cwl'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(TARGET_PWD, /var/spool/cwl) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'SYSCONFDIR' = '/usr/local/etc'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(sysconfdir, /usr/local/etc) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'BINDPATH' = ',/tmp/tmpv6cVzR:/var/spool/cwl:rw,/tmp/tmpvRfDmI:/tmp:rw,/home/pvh/cwltutorial/data/dna.txt:/var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt:ro'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(BINDPATH, ,/tmp/tmpv6cVzR:/var/spool/cwl:rw,/tmp/tmpvRfDmI:/tmp:rw,/home/pvh/cwltutorial/data/dna.txt:/var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt:ro) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'UNSHARE_PID' = '1'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(UNSHARE_PID, 1) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'BINDIR' = '/usr/local/bin'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(bindir, /usr/local/bin) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'UNSHARE_IPC' = '1'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(UNSHARE_IPC, 1) = 0
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'IMAGE' = '/home/pvh/cwltutorial/pvanheus-reverse-latest.img'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(IMAGE, /home/pvh/cwltutorial/pvanheus-reverse-latest.img) = 0
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'HOME'
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'TARGET_UID'
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'TARGET_GID'
DEBUG [U=1024,P=6583] singularity_priv_init() Initializing user info
DEBUG [U=1024,P=6583] singularity_priv_init() Set the calling user's username to: pvh
DEBUG [U=1024,P=6583] singularity_priv_init() Marking uinfo structure as ready
DEBUG [U=1024,P=6583] singularity_priv_init() Obtaining home directory
VERBOSE [U=1024,P=6583] singularity_priv_init() Set home (via getpwuid()) to: /home/pvh
VERBOSE [U=1024,P=6583] singularity_suid_init() Running NON-SUID program workflow
DEBUG [U=1024,P=6583] singularity_suid_init() Checking program has appropriate permissions
VERBOSE [U=1024,P=6583] singularity_priv_userns() Invoking the user namespace
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow user ns, yes)
DEBUG [U=1024,P=6583] singularity_config_get_value_impl() No configuration entry found for 'allow user ns'; returning default value 'yes'
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow user ns, yes) = 1
DEBUG [U=1024,P=6583] singularity_priv_userns() Attempting to virtualize the USER namespace
DEBUG [U=65534,P=6583] singularity_priv_userns() Enabled user namespaces
DEBUG [U=65534,P=6583] singularity_priv_userns() Setting setgroups to: 'deny'
DEBUG [U=65534,P=6583] singularity_priv_userns() Updating setgroups: /proc/6583/setgroups
DEBUG [U=65534,P=6583] singularity_priv_userns() Setting GID map to: '1009 1009 1'
DEBUG [U=65534,P=6583] singularity_priv_userns() Updating the parent gid_map: /proc/6583/gid_map
DEBUG [U=65534,P=6583] singularity_priv_userns() Setting UID map to: '1024 1024 1'
DEBUG [U=65534,P=6583] singularity_priv_userns() Updating the parent uid_map: /proc/6583/uid_map
DEBUG [U=1024,P=6583] singularity_priv_userns() Returning singularity_priv_init(void)
DEBUG [U=1024,P=6583] singularity_priv_drop() Not dropping privileges, user namespace enabled
DEBUG [U=1024,P=6583] singularity_config_get_value_multi_impl() No configuration entry found for 'autofs bug path'; returning default value ''
VERBOSE [U=1024,P=6583] singularity_runtime_autofs() No autofs bug path in configuration, skipping
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_START'
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_JOIN'
DEBUG [U=1024,P=6583] singularity_daemon_init() Not joining a daemon, daemon join not set
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'WRITABLE'
VERBOSE [U=1024,P=6583] main() Instantiating read only container image object
DEBUG [U=1024,P=6583] singularity_registry_get() Returning value from registry: 'IMAGE' = '/home/pvh/cwltutorial/pvanheus-reverse-latest.img'
DEBUG [U=1024,P=6583] singularity_image_init() Calling image_init for each file system module
DEBUG [U=1024,P=6583] singularity_image_dir_init() Opening file descriptor to directory: /home/pvh/cwltutorial/pvanheus-reverse-latest.img
DEBUG [U=1024,P=6583] singularity_image_dir_init() This is not a directory based image
DEBUG [U=1024,P=6583] singularity_image_squashfs_init() Checking if writable image requested
DEBUG [U=1024,P=6583] singularity_image_squashfs_init() Opening file descriptor to image: /home/pvh/cwltutorial/pvanheus-reverse-latest.img
VERBOSE [U=1024,P=6583] singularity_image_squashfs_init() Checking that file pointer is a Singularity image
DEBUG [U=1024,P=6583] singularity_image_squashfs_init() Checking for magic in the top of the file
VERBOSE [U=1024,P=6583] singularity_image_squashfs_init() File is a valid SquashFS image
DEBUG [U=1024,P=6583] singularity_image_init() got image_init type for squashfs
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow container squashfs, yes)
DEBUG [U=1024,P=6583] singularity_config_get_value_impl() Returning configuration value allow container squashfs='yes'
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow container squashfs, yes) = 1
DEBUG [U=1024,P=6583] singularity_suid_enabled() Executable is not root owned
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_JOIN'
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'CLEANUPDIR'
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'CLEANUPD_FD' = '-1'
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(CLEANUPD_FD, -1) = 0
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_JOIN'
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'NOSESSIONCLEANUP'
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'NOCLEANUP'
DEBUG [U=1024,P=6583] singularity_cleanupd() Not running a cleanup thread, no 'SINGULARITY_CLEANUPDIR' defined
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_JOIN'
DEBUG [U=1024,P=6583] singularity_runtime_ns() Calling: _singularity_runtime_ns_ipc()
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow ipc ns, yes)
DEBUG [U=1024,P=6583] singularity_config_get_value_impl() No configuration entry found for 'allow ipc ns'; returning default value 'yes'
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow ipc ns, yes) = 1
DEBUG [U=1024,P=6583] singularity_registry_get() Returning value from registry: 'UNSHARE_IPC' = '1'
DEBUG [U=1024,P=6583] singularity_runtime_ns_ipc() Using IPC namespace: CLONE_NEWIPC
DEBUG [U=1024,P=6583] singularity_priv_escalate() Not escalating privileges, user namespace enabled
DEBUG [U=1024,P=6583] singularity_runtime_ns_ipc() Virtualizing IPC namespace
DEBUG [U=1024,P=6583] singularity_priv_drop() Not dropping privileges, user namespace enabled
DEBUG [U=1024,P=6583] singularity_runtime_ns() Calling: _singularity_runtime_ns_pid()
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow pid ns, yes)
DEBUG [U=1024,P=6583] singularity_config_get_value_impl() Returning configuration value allow pid ns='yes'
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow pid ns, yes) = 1
DEBUG [U=1024,P=6583] singularity_registry_get() Returning value from registry: 'UNSHARE_PID' = '1'
DEBUG [U=1024,P=6583] singularity_runtime_ns_pid() Using PID namespace: CLONE_NEWPID
DEBUG [U=1024,P=6583] singularity_runtime_ns_pid() Virtualizing PID namespace
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_START'
DEBUG [U=1024,P=6583] prepare_fork() Creating parent/child coordination pipes.
VERBOSE [U=1024,P=6583] singularity_fork() Forking child process
DEBUG [U=1024,P=6583] singularity_priv_escalate() Not escalating privileges, user namespace enabled
DEBUG [U=1024,P=6583] singularity_priv_drop() Not dropping privileges, user namespace enabled
VERBOSE [U=1024,P=6583] singularity_fork() Hello from parent process
DEBUG [U=1024,P=6583] install_generic_signal_handle() Assigning generic sigaction()s
DEBUG [U=1024,P=6583] install_generic_signal_handle() Creating generic signal pipes
DEBUG [U=1024,P=6583] install_sigchld_signal_handle() Assigning SIGCHLD sigaction()
DEBUG [U=1024,P=6583] install_sigchld_signal_handle() Creating sigchld signal pipes
DEBUG [U=1024,P=6583] singularity_signal_go_ahead() Sending go-ahead signal: 0
DEBUG [U=1024,P=6583] wait_child() Parent process is waiting on child process
DEBUG [U=1024,P=1] singularity_priv_drop() Not dropping privileges, user namespace enabled
VERBOSE [U=1024,P=1] singularity_fork() Hello from child process
DEBUG [U=1024,P=1] singularity_wait_for_go_ahead() Waiting for go-ahead signal
DEBUG [U=1024,P=1] singularity_wait_for_go_ahead() Received go-ahead signal: 0
VERBOSE [U=1024,P=1] singularity_registry_set() Adding value to registry: 'PIDNS_ENABLED' = '1'
DEBUG [U=1024,P=1] singularity_registry_set() Returning singularity_registry_set(PIDNS_ENABLED, 1) = 0
DEBUG [U=1024,P=1] singularity_runtime_ns() Calling: _singularity_runtime_ns_net()
DEBUG [U=1024,P=1] singularity_registry_get() Returning NULL on 'UNSHARE_NET'
VERBOSE [U=1024,P=1] singularity_runtime_ns_net() Not virtualizing network namespace on user request
DEBUG [U=1024,P=1] singularity_runtime_ns() Calling: _singularity_runtime_ns_mnt()
DEBUG [U=1024,P=1] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount slave, yes)
DEBUG [U=1024,P=1] singularity_config_get_value_impl() Returning configuration value mount slave='yes'
DEBUG [U=1024,P=1] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount slave, yes) = 1
DEBUG [U=1024,P=1] singularity_priv_escalate() Not escalating privileges, user namespace enabled
DEBUG [U=1024,P=1] singularity_runtime_ns_mnt() Virtualizing FS namespace
DEBUG [U=1024,P=1] singularity_runtime_ns_mnt() Virtualizing mount namespace
DEBUG [U=1024,P=1] singularity_priv_drop() Not dropping privileges, user namespace enabled
DEBUG [U=1024,P=1] singularity_runtime_ns_mnt() Making mounts slave
DEBUG [U=1024,P=1] singularity_registry_get() Returning NULL on 'DAEMON_JOIN'
DEBUG [U=1024,P=1] singularity_sessiondir() Setting sessiondir
VERBOSE [U=1024,P=1] singularity_sessiondir() Using session directory: /usr/local/var/singularity/mnt/session
DEBUG [U=1024,P=1] singularity_sessiondir() Checking for session directory: /usr/local/var/singularity/mnt/session
DEBUG [U=1024,P=1] singularity_sessiondir() Obtaining the default sessiondir size
DEBUG [U=1024,P=1] singularity_config_get_value_impl() Returning configuration value sessiondir max size='16'
DEBUG [U=1024,P=1] singularity_sessiondir() Converted sessiondir size to: 16
DEBUG [U=1024,P=1] singularity_sessiondir() Creating the sessiondir size mount option length
DEBUG [U=1024,P=1] singularity_sessiondir() Got size length of: 9
DEBUG [U=1024,P=1] singularity_sessiondir() Creating the sessiondir size mount option string
DEBUG [U=1024,P=1] singularity_sessiondir() Checking to make sure the string was allocated correctly
DEBUG [U=1024,P=1] singularity_sessiondir() Mounting sessiondir tmpfs: /usr/local/var/singularity/mnt/session
VERBOSE [U=1024,P=1] singularity_registry_set() Adding value to registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session'
DEBUG [U=1024,P=1] singularity_registry_set() Returning singularity_registry_set(SESSIONDIR, /usr/local/var/singularity/mnt/session) = 0
DEBUG [U=1024,P=1] singularity_registry_get() Returning NULL on 'DAEMON_JOIN'
DEBUG [U=1024,P=1] singularity_image_mount() Figuring out which mount module to use...
DEBUG [U=1024,P=1] singularity_image_mount() Calling squashfs_mount
DEBUG [U=1024,P=1] singularity_config_get_value_impl() Returning configuration value max loop devices='256'
DEBUG [U=1024,P=1] singularity_image_bind() Entered singularity_image_bind()
DEBUG [U=1024,P=1] singularity_image_bind() Converting max_loop_devs_string to int: '256'
DEBUG [U=1024,P=1] singularity_image_bind() Converted max_loop_devs_string to int: '256' -> 256
DEBUG [U=1024,P=1] singularity_image_bind() Checking if this image has been properly opened
DEBUG [U=1024,P=1] singularity_priv_escalate() Not escalating privileges, user namespace enabled
DEBUG [U=1024,P=1] singularity_image_bind() Finding next available loop device...
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop0: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop1: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop2: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop3: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop4: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop5: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop6: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop7: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop8: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop9: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop10: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop11: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop12: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop13: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop14: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop15: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop16: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop17: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop18: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop19: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop20: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop21: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop22: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop23: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop24: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop25: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop26: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop27: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop28: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop29: Permission denied
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop30: Permission denied
DEBUG [U=1024,P=1] singularity_image_bind() Instantiating loop device: /dev/loop31
ERROR [U=1024,P=1] singularity_image_bind() Could not create /dev/loop31: Permission denied
ABORT [U=1024,P=1] singularity_image_bind() Retval = 255
DEBUG [U=1024,P=6583] wait_child() SIGCHLD raised, parent is exiting
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment