Created
May 25, 2018 10:12
-
-
Save pvanheus/94f5cb00844907ad1fe97f40ee606937 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ singularity --debug exec --contain --pid --ipc --userns --bind /tmp/tmpv6cVzR:/var/spool/cwl:rw --bind /tmp/tmpvRfDmI:/tmp:rw --bind /home/pvh/cwltutorial/data/dna.txt:/var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt:ro --pwd /var/spool/cwl /home/pvh/cwltutorial/pvanheus-reverse-latest.img reverse.py /var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt > /tmp/tmpv6cVzR/dna_reversed.txt | |
Enabling debugging | |
Ending argument loop | |
Singularity version: 2.4.5-dist | |
Exec'ing: /usr/local/libexec/singularity/cli/exec.exec | |
Evaluating args: '--contain --pid --ipc --userns --bind /tmp/tmpv6cVzR:/var/spool/cwl:rw --bind /tmp/tmpvRfDmI:/tmp:rw --bind /home/pvh/cwltutorial/data/dna.txt:/var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt:ro --pwd /var/spool/cwl /home/pvh/cwltutorial/pvanheus-reverse-latest.img reverse.py /var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt' | |
VERBOSE [U=1024,P=6583] message_init() Set messagelevel to: 5 | |
DEBUG [U=1024,P=6583] fd_cleanup() Cleanup file descriptor table | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Initialize configuration file: /usr/local/etc/singularity/singularity.conf | |
DEBUG [U=1024,P=6583] singularity_config_parse() Starting parse of configuration file /usr/local/etc/singularity/singularity.conf | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow setuid = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key max loop devices = '256' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow pid ns = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key config passwd = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key config group = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key config resolv_conf = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount proc = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount sys = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount dev = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount devpts = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount home = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount tmp = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount hostfs = 'no' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key bind path = '/etc/localtime' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key bind path = '/etc/hosts' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key bind path = '/data' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key bind path = '/etc/timezone' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key user bind control = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key enable overlay = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key mount slave = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key sessiondir max size = '16' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow container squashfs = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow container extfs = 'yes' | |
VERBOSE [U=1024,P=6583] singularity_config_parse() Got config key allow container dir = 'yes' | |
DEBUG [U=1024,P=6583] singularity_config_parse() Finished parsing configuration file '/usr/local/etc/singularity/singularity.conf' | |
VERBOSE [U=1024,P=6583] singularity_registry_init() Initializing Singularity Registry | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'CONTAIN' = '1' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(CONTAIN, 1) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'LIBEXECDIR' = '/usr/local/libexec' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(libexecdir, /usr/local/libexec) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'COMMAND' = 'exec' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(COMMAND, exec) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'MESSAGELEVEL' = '5' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(MESSAGELEVEL, 5) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'NOSUID' = '1' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(NOSUID, 1) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'VERSION' = '2.4.5-dist' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(version, 2.4.5-dist) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'LOCALSTATEDIR' = '/usr/local/var' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(localstatedir, /usr/local/var) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'TARGET_PWD' = '/var/spool/cwl' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(TARGET_PWD, /var/spool/cwl) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'SYSCONFDIR' = '/usr/local/etc' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(sysconfdir, /usr/local/etc) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'BINDPATH' = ',/tmp/tmpv6cVzR:/var/spool/cwl:rw,/tmp/tmpvRfDmI:/tmp:rw,/home/pvh/cwltutorial/data/dna.txt:/var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt:ro' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(BINDPATH, ,/tmp/tmpv6cVzR:/var/spool/cwl:rw,/tmp/tmpvRfDmI:/tmp:rw,/home/pvh/cwltutorial/data/dna.txt:/var/lib/cwl/stgff5e1981-06d7-4a4c-a7c6-e958a8889599/dna.txt:ro) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'UNSHARE_PID' = '1' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(UNSHARE_PID, 1) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'BINDIR' = '/usr/local/bin' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(bindir, /usr/local/bin) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'UNSHARE_IPC' = '1' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(UNSHARE_IPC, 1) = 0 | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'IMAGE' = '/home/pvh/cwltutorial/pvanheus-reverse-latest.img' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(IMAGE, /home/pvh/cwltutorial/pvanheus-reverse-latest.img) = 0 | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'HOME' | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'TARGET_UID' | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'TARGET_GID' | |
DEBUG [U=1024,P=6583] singularity_priv_init() Initializing user info | |
DEBUG [U=1024,P=6583] singularity_priv_init() Set the calling user's username to: pvh | |
DEBUG [U=1024,P=6583] singularity_priv_init() Marking uinfo structure as ready | |
DEBUG [U=1024,P=6583] singularity_priv_init() Obtaining home directory | |
VERBOSE [U=1024,P=6583] singularity_priv_init() Set home (via getpwuid()) to: /home/pvh | |
VERBOSE [U=1024,P=6583] singularity_suid_init() Running NON-SUID program workflow | |
DEBUG [U=1024,P=6583] singularity_suid_init() Checking program has appropriate permissions | |
VERBOSE [U=1024,P=6583] singularity_priv_userns() Invoking the user namespace | |
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow user ns, yes) | |
DEBUG [U=1024,P=6583] singularity_config_get_value_impl() No configuration entry found for 'allow user ns'; returning default value 'yes' | |
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow user ns, yes) = 1 | |
DEBUG [U=1024,P=6583] singularity_priv_userns() Attempting to virtualize the USER namespace | |
DEBUG [U=65534,P=6583] singularity_priv_userns() Enabled user namespaces | |
DEBUG [U=65534,P=6583] singularity_priv_userns() Setting setgroups to: 'deny' | |
DEBUG [U=65534,P=6583] singularity_priv_userns() Updating setgroups: /proc/6583/setgroups | |
DEBUG [U=65534,P=6583] singularity_priv_userns() Setting GID map to: '1009 1009 1' | |
DEBUG [U=65534,P=6583] singularity_priv_userns() Updating the parent gid_map: /proc/6583/gid_map | |
DEBUG [U=65534,P=6583] singularity_priv_userns() Setting UID map to: '1024 1024 1' | |
DEBUG [U=65534,P=6583] singularity_priv_userns() Updating the parent uid_map: /proc/6583/uid_map | |
DEBUG [U=1024,P=6583] singularity_priv_userns() Returning singularity_priv_init(void) | |
DEBUG [U=1024,P=6583] singularity_priv_drop() Not dropping privileges, user namespace enabled | |
DEBUG [U=1024,P=6583] singularity_config_get_value_multi_impl() No configuration entry found for 'autofs bug path'; returning default value '' | |
VERBOSE [U=1024,P=6583] singularity_runtime_autofs() No autofs bug path in configuration, skipping | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_START' | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_JOIN' | |
DEBUG [U=1024,P=6583] singularity_daemon_init() Not joining a daemon, daemon join not set | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'WRITABLE' | |
VERBOSE [U=1024,P=6583] main() Instantiating read only container image object | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning value from registry: 'IMAGE' = '/home/pvh/cwltutorial/pvanheus-reverse-latest.img' | |
DEBUG [U=1024,P=6583] singularity_image_init() Calling image_init for each file system module | |
DEBUG [U=1024,P=6583] singularity_image_dir_init() Opening file descriptor to directory: /home/pvh/cwltutorial/pvanheus-reverse-latest.img | |
DEBUG [U=1024,P=6583] singularity_image_dir_init() This is not a directory based image | |
DEBUG [U=1024,P=6583] singularity_image_squashfs_init() Checking if writable image requested | |
DEBUG [U=1024,P=6583] singularity_image_squashfs_init() Opening file descriptor to image: /home/pvh/cwltutorial/pvanheus-reverse-latest.img | |
VERBOSE [U=1024,P=6583] singularity_image_squashfs_init() Checking that file pointer is a Singularity image | |
DEBUG [U=1024,P=6583] singularity_image_squashfs_init() Checking for magic in the top of the file | |
VERBOSE [U=1024,P=6583] singularity_image_squashfs_init() File is a valid SquashFS image | |
DEBUG [U=1024,P=6583] singularity_image_init() got image_init type for squashfs | |
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow container squashfs, yes) | |
DEBUG [U=1024,P=6583] singularity_config_get_value_impl() Returning configuration value allow container squashfs='yes' | |
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow container squashfs, yes) = 1 | |
DEBUG [U=1024,P=6583] singularity_suid_enabled() Executable is not root owned | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_JOIN' | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'CLEANUPDIR' | |
VERBOSE [U=1024,P=6583] singularity_registry_set() Adding value to registry: 'CLEANUPD_FD' = '-1' | |
DEBUG [U=1024,P=6583] singularity_registry_set() Returning singularity_registry_set(CLEANUPD_FD, -1) = 0 | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_JOIN' | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'NOSESSIONCLEANUP' | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'NOCLEANUP' | |
DEBUG [U=1024,P=6583] singularity_cleanupd() Not running a cleanup thread, no 'SINGULARITY_CLEANUPDIR' defined | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_JOIN' | |
DEBUG [U=1024,P=6583] singularity_runtime_ns() Calling: _singularity_runtime_ns_ipc() | |
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow ipc ns, yes) | |
DEBUG [U=1024,P=6583] singularity_config_get_value_impl() No configuration entry found for 'allow ipc ns'; returning default value 'yes' | |
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow ipc ns, yes) = 1 | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning value from registry: 'UNSHARE_IPC' = '1' | |
DEBUG [U=1024,P=6583] singularity_runtime_ns_ipc() Using IPC namespace: CLONE_NEWIPC | |
DEBUG [U=1024,P=6583] singularity_priv_escalate() Not escalating privileges, user namespace enabled | |
DEBUG [U=1024,P=6583] singularity_runtime_ns_ipc() Virtualizing IPC namespace | |
DEBUG [U=1024,P=6583] singularity_priv_drop() Not dropping privileges, user namespace enabled | |
DEBUG [U=1024,P=6583] singularity_runtime_ns() Calling: _singularity_runtime_ns_pid() | |
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow pid ns, yes) | |
DEBUG [U=1024,P=6583] singularity_config_get_value_impl() Returning configuration value allow pid ns='yes' | |
DEBUG [U=1024,P=6583] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow pid ns, yes) = 1 | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning value from registry: 'UNSHARE_PID' = '1' | |
DEBUG [U=1024,P=6583] singularity_runtime_ns_pid() Using PID namespace: CLONE_NEWPID | |
DEBUG [U=1024,P=6583] singularity_runtime_ns_pid() Virtualizing PID namespace | |
DEBUG [U=1024,P=6583] singularity_registry_get() Returning NULL on 'DAEMON_START' | |
DEBUG [U=1024,P=6583] prepare_fork() Creating parent/child coordination pipes. | |
VERBOSE [U=1024,P=6583] singularity_fork() Forking child process | |
DEBUG [U=1024,P=6583] singularity_priv_escalate() Not escalating privileges, user namespace enabled | |
DEBUG [U=1024,P=6583] singularity_priv_drop() Not dropping privileges, user namespace enabled | |
VERBOSE [U=1024,P=6583] singularity_fork() Hello from parent process | |
DEBUG [U=1024,P=6583] install_generic_signal_handle() Assigning generic sigaction()s | |
DEBUG [U=1024,P=6583] install_generic_signal_handle() Creating generic signal pipes | |
DEBUG [U=1024,P=6583] install_sigchld_signal_handle() Assigning SIGCHLD sigaction() | |
DEBUG [U=1024,P=6583] install_sigchld_signal_handle() Creating sigchld signal pipes | |
DEBUG [U=1024,P=6583] singularity_signal_go_ahead() Sending go-ahead signal: 0 | |
DEBUG [U=1024,P=6583] wait_child() Parent process is waiting on child process | |
DEBUG [U=1024,P=1] singularity_priv_drop() Not dropping privileges, user namespace enabled | |
VERBOSE [U=1024,P=1] singularity_fork() Hello from child process | |
DEBUG [U=1024,P=1] singularity_wait_for_go_ahead() Waiting for go-ahead signal | |
DEBUG [U=1024,P=1] singularity_wait_for_go_ahead() Received go-ahead signal: 0 | |
VERBOSE [U=1024,P=1] singularity_registry_set() Adding value to registry: 'PIDNS_ENABLED' = '1' | |
DEBUG [U=1024,P=1] singularity_registry_set() Returning singularity_registry_set(PIDNS_ENABLED, 1) = 0 | |
DEBUG [U=1024,P=1] singularity_runtime_ns() Calling: _singularity_runtime_ns_net() | |
DEBUG [U=1024,P=1] singularity_registry_get() Returning NULL on 'UNSHARE_NET' | |
VERBOSE [U=1024,P=1] singularity_runtime_ns_net() Not virtualizing network namespace on user request | |
DEBUG [U=1024,P=1] singularity_runtime_ns() Calling: _singularity_runtime_ns_mnt() | |
DEBUG [U=1024,P=1] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount slave, yes) | |
DEBUG [U=1024,P=1] singularity_config_get_value_impl() Returning configuration value mount slave='yes' | |
DEBUG [U=1024,P=1] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount slave, yes) = 1 | |
DEBUG [U=1024,P=1] singularity_priv_escalate() Not escalating privileges, user namespace enabled | |
DEBUG [U=1024,P=1] singularity_runtime_ns_mnt() Virtualizing FS namespace | |
DEBUG [U=1024,P=1] singularity_runtime_ns_mnt() Virtualizing mount namespace | |
DEBUG [U=1024,P=1] singularity_priv_drop() Not dropping privileges, user namespace enabled | |
DEBUG [U=1024,P=1] singularity_runtime_ns_mnt() Making mounts slave | |
DEBUG [U=1024,P=1] singularity_registry_get() Returning NULL on 'DAEMON_JOIN' | |
DEBUG [U=1024,P=1] singularity_sessiondir() Setting sessiondir | |
VERBOSE [U=1024,P=1] singularity_sessiondir() Using session directory: /usr/local/var/singularity/mnt/session | |
DEBUG [U=1024,P=1] singularity_sessiondir() Checking for session directory: /usr/local/var/singularity/mnt/session | |
DEBUG [U=1024,P=1] singularity_sessiondir() Obtaining the default sessiondir size | |
DEBUG [U=1024,P=1] singularity_config_get_value_impl() Returning configuration value sessiondir max size='16' | |
DEBUG [U=1024,P=1] singularity_sessiondir() Converted sessiondir size to: 16 | |
DEBUG [U=1024,P=1] singularity_sessiondir() Creating the sessiondir size mount option length | |
DEBUG [U=1024,P=1] singularity_sessiondir() Got size length of: 9 | |
DEBUG [U=1024,P=1] singularity_sessiondir() Creating the sessiondir size mount option string | |
DEBUG [U=1024,P=1] singularity_sessiondir() Checking to make sure the string was allocated correctly | |
DEBUG [U=1024,P=1] singularity_sessiondir() Mounting sessiondir tmpfs: /usr/local/var/singularity/mnt/session | |
VERBOSE [U=1024,P=1] singularity_registry_set() Adding value to registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session' | |
DEBUG [U=1024,P=1] singularity_registry_set() Returning singularity_registry_set(SESSIONDIR, /usr/local/var/singularity/mnt/session) = 0 | |
DEBUG [U=1024,P=1] singularity_registry_get() Returning NULL on 'DAEMON_JOIN' | |
DEBUG [U=1024,P=1] singularity_image_mount() Figuring out which mount module to use... | |
DEBUG [U=1024,P=1] singularity_image_mount() Calling squashfs_mount | |
DEBUG [U=1024,P=1] singularity_config_get_value_impl() Returning configuration value max loop devices='256' | |
DEBUG [U=1024,P=1] singularity_image_bind() Entered singularity_image_bind() | |
DEBUG [U=1024,P=1] singularity_image_bind() Converting max_loop_devs_string to int: '256' | |
DEBUG [U=1024,P=1] singularity_image_bind() Converted max_loop_devs_string to int: '256' -> 256 | |
DEBUG [U=1024,P=1] singularity_image_bind() Checking if this image has been properly opened | |
DEBUG [U=1024,P=1] singularity_priv_escalate() Not escalating privileges, user namespace enabled | |
DEBUG [U=1024,P=1] singularity_image_bind() Finding next available loop device... | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop0: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop1: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop2: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop3: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop4: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop5: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop6: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop7: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop8: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop9: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop10: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop11: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop12: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop13: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop14: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop15: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop16: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop17: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop18: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop19: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop20: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop21: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop22: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop23: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop24: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop25: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop26: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop27: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop28: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop29: Permission denied | |
VERBOSE [U=1024,P=1] singularity_image_bind() Could not open loop device /dev/loop30: Permission denied | |
DEBUG [U=1024,P=1] singularity_image_bind() Instantiating loop device: /dev/loop31 | |
ERROR [U=1024,P=1] singularity_image_bind() Could not create /dev/loop31: Permission denied | |
ABORT [U=1024,P=1] singularity_image_bind() Retval = 255 | |
DEBUG [U=1024,P=6583] wait_child() SIGCHLD raised, parent is exiting |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment