I guess it is. Because containers are 3G size and it matches with this instances on /run/user/**. Unmounting them did not help.
I execute with sudo because the container inside needs 'root'. This is an old docker container that only has a unique user root with all the files (probably i should change this in the future).
In my local machine the behaviour is correct. Tested it with -np and the behaviour is the same.
Is the master. I did "git clone
https://github.com/gmkurtzer/singularity.git" and followed the installation steps.
As a side comment, If I deploy with a unique container I don't encounter this problem. I think that when I want to mount extra containers that the SO gets crazy or maybe singularity tries to assign containers to a /dev/loop* that is busy and does not try to look for one that is available. In my final test I will need at least 16 containers in one host. Is that possible with singularity because I only see 8 loops?
Here you have the debug output:
> sudo mpirun -n 1 singularity -d exec /mnt/glusterfs/singularity/nasmpi-singularity.img true
enabling debugging
ending argument loop
+ '[' -f /usr/local/etc/singularity/init ']'
+ . /usr/local/etc/singularity/init
++ unset module
++ PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
++ HISTFILE=/dev/null
++ export PATH HISTFILE
++ '[' -n 1 ']'
++ SINGULARITY_NO_NAMESPACE_PID=1
++ export SINGULARITY_NO_NAMESPACE_PID
+ true
+ case $1 in
+ break
+ '[' -z /mnt/glusterfs/singularity/nasmpi-singularity.img ']'
+ SINGULARITY_IMAGE=/mnt/glusterfs/singularity/nasmpi-singularity.img
+ export SINGULARITY_IMAGE
+ shift
+ exec /usr/local/libexec/singularity/sexec true
VERBOSE [U=0,P=3944] message.c:46:init() : Setting messagelevel to: 5
DEBUG [U=0,P=3944] sexec.c:127:main() : Gathering and caching user info.
DEBUG [U=0,P=3944] privilege.c:43:get_user_privs() : Called get_user_privs(struct s_privinfo *uinfo)
DEBUG [U=0,P=3944] privilege.c:54:get_user_privs() : Returning get_user_privs(struct s_privinfo *uinfo) = 0
DEBUG [U=0,P=3944] sexec.c:134:main() : Checking if we can escalate privs properly.
DEBUG [U=0,P=3944] privilege.c:61:escalate_privs() : Called escalate_privs(void)
DEBUG [U=0,P=3944] privilege.c:73:escalate_privs() : Returning escalate_privs(void) = 0
DEBUG [U=0,P=3944] sexec.c:141:main() : Setting privs to calling user
DEBUG [U=0,P=3944] privilege.c:79:drop_privs() : Called drop_privs(struct s_privinfo *uinfo)
DEBUG [U=0,P=3944] privilege.c:87:drop_privs() : Dropping privileges to GID = '0'
DEBUG [U=0,P=3944] privilege.c:93:drop_privs() : Dropping privileges to UID = '0'
DEBUG [U=0,P=3944] privilege.c:103:drop_privs() : Confirming we have correct GID
DEBUG [U=0,P=3944] privilege.c:109:drop_privs() : Confirming we have correct UID
DEBUG [U=0,P=3944] privilege.c:115:drop_privs() : Returning drop_privs(struct s_privinfo *uinfo) = 0
DEBUG [U=0,P=3944] sexec.c:146:main() : Obtaining user's homedir
DEBUG [U=0,P=3944] sexec.c:150:main() : Obtaining file descriptor to current directory
DEBUG [U=0,P=3944] sexec.c:155:main() : Getting current working directory path string
DEBUG [U=0,P=3944] sexec.c:161:main() : Obtaining SINGULARITY_COMMAND from environment
DEBUG [U=0,P=3944] sexec.c:168:main() : Obtaining SINGULARITY_IMAGE from environment
DEBUG [U=0,P=3944] sexec.c:174:main() : Checking container image is a file: /mnt/glusterfs/singularity/nasmpi-singularity.img
DEBUG [U=0,P=3944] sexec.c:180:main() : Building configuration file location
DEBUG [U=0,P=3944] sexec.c:183:main() : Config location: /usr/local/etc/singularity/singularity.conf
DEBUG [U=0,P=3944] sexec.c:185:main() : Checking Singularity configuration is a file: /usr/local/etc/singularity/singularity.conf
DEBUG [U=0,P=3944] sexec.c:191:main() : Checking Singularity configuration file is owned by root
DEBUG [U=0,P=3944] sexec.c:197:main() : Opening Singularity configuration file
DEBUG [U=0,P=3944] sexec.c:210:main() : Checking Singularity configuration for 'sessiondir prefix'
DEBUG [U=0,P=3944] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, sessiondir prefix)
DEBUG [U=0,P=3944] config_parser.c:61:config_get_key_value() : Return config_get_key_value(fp, sessiondir prefix) = NULL
DEBUG [U=0,P=3944] file.c:48:file_id() : Called file_id(/mnt/glusterfs/singularity/nasmpi-singularity.img)
VERBOSE [U=0,P=3944] file.c:58:file_id() : Generated file_id: 0.39.12911060245380037651
DEBUG [U=0,P=3944] file.c:60:file_id() : Returning file_id(/mnt/glusterfs/singularity/nasmpi-singularity.img) = 0.39.12911060245380037651
DEBUG [U=0,P=3944] sexec.c:217:main() : Set sessiondir to: /tmp/.singularity-session-0.39.12911060245380037651
DEBUG [U=0,P=3944] sexec.c:221:main() : Set containername to: nasmpi-singularity.img
DEBUG [U=0,P=3944] sexec.c:223:main() : Setting loop_dev_* paths
DEBUG [U=0,P=3944] sexec.c:229:main() : Set image mount path to: /usr/local/var/singularity/mnt
LOG [U=0,P=3944] sexec.c:231:main() : Command=exec, Container=/mnt/glusterfs/singularity/nasmpi-singularity.img, CWD=/tmp/result, Arg1=true
DEBUG [U=0,P=3944] sexec.c:236:main() : Set prompt to: Singularity/nasmpi-singularity.img>
DEBUG [U=0,P=3944] sexec.c:238:main() : Checking if we are opening image as read/write
DEBUG [U=0,P=3944] sexec.c:240:main() : Opening image as read only: /mnt/glusterfs/singularity/nasmpi-singularity.img
DEBUG [U=0,P=3944] sexec.c:247:main() : Setting shared lock on file descriptor: 6
DEBUG [U=0,P=3944] sexec.c:267:main() : Checking for namespace daemon pidfile
DEBUG [U=0,P=3944] sexec.c:301:main() : Escalating privledges
DEBUG [U=0,P=3944] privilege.c:61:escalate_privs() : Called escalate_privs(void)
DEBUG [U=0,P=3944] privilege.c:73:escalate_privs() : Returning escalate_privs(void) = 0
VERBOSE [U=0,P=3944] sexec.c:306:main() : Creating/Verifying session directory: /tmp/.singularity-session-0.39.12911060245380037651
DEBUG [U=0,P=3944] file.c:196:s_mkpath() : Creating directory: /tmp/.singularity-session-0.39.12911060245380037651
DEBUG [U=0,P=3944] sexec.c:320:main() : Setting shared lock on session directory
DEBUG [U=0,P=3944] sexec.c:331:main() : Caching info into sessiondir
DEBUG [U=0,P=3944] file.c:255:fileput() : Called fileput(/tmp/.singularity-session-0.39.12911060245380037651/image, nasmpi-singularity.img)
DEBUG [U=0,P=3944] sexec.c:337:main() : Checking for set loop device
DEBUG [U=0,P=3944] loop-control.c:52:obtain_loop_dev() : Called obtain_loop_dev(void)
DEBUG [U=0,P=3944] loop-control.c:66:obtain_loop_dev() : Found available existing loop device number: 0
VERBOSE [U=0,P=3944] loop-control.c:81:obtain_loop_dev() : Using loop device: /dev/loop0
DEBUG [U=0,P=3944] loop-control.c:95:obtain_loop_dev() : Returning obtain_loop_dev(void) = /dev/loop0
DEBUG [U=0,P=3944] loop-control.c:106:associate_loop() : Called associate_loop(image_fp, loop_fp, 1)
DEBUG [U=0,P=3944] loop-control.c:109:associate_loop() : Setting loop flags to LO_FLAGS_AUTOCLEAR
VERBOSE [U=0,P=3944] image.c:39:image_offset() : Calculating image offset
VERBOSE [U=0,P=3944] image.c:48:image_offset() : Found image at an offset of 31 bytes
DEBUG [U=0,P=3944] image.c:53:image_offset() : Returning image_offset(image_fp) = 31
DEBUG [U=0,P=3944] loop-control.c:114:associate_loop() : Setting image offset to: 31
VERBOSE [U=0,P=3944] loop-control.c:116:associate_loop() : Associating image to loop device
VERBOSE [U=0,P=3944] loop-control.c:122:associate_loop() : Setting loop device flags
DEBUG [U=0,P=3944] loop-control.c:130:associate_loop() : Returning associate_loop(image_fp, loop_fp, 1) = 0
DEBUG [U=0,P=3944] file.c:255:fileput() : Called fileput(/tmp/.singularity-session-0.39.12911060245380037651/loop_dev, /dev/loop0)
DEBUG [U=0,P=3944] sexec.c:375:main() : Creating container image mount path: /usr/local/var/singularity/mnt
DEBUG [U=0,P=3944] sexec.c:441:main() : Checking to see if we are joining an existing namespace
VERBOSE [U=0,P=3944] sexec.c:444:main() : Creating namespace process
DEBUG [U=0,P=3944] privilege.c:79:drop_privs() : Called drop_privs(struct s_privinfo *uinfo)
DEBUG [U=0,P=3944] privilege.c:87:drop_privs() : Dropping privileges to GID = '0'
DEBUG [U=0,P=3944] privilege.c:93:drop_privs() : Dropping privileges to UID = '0'
DEBUG [U=0,P=3944] privilege.c:103:drop_privs() : Confirming we have correct GID
DEBUG [U=0,P=3944] privilege.c:109:drop_privs() : Confirming we have correct UID
DEBUG [U=0,P=3944] privilege.c:115:drop_privs() : Returning drop_privs(struct s_privinfo *uinfo) = 0
DEBUG [U=0,P=3949] sexec.c:449:main() : Hello from namespace child process
VERBOSE [U=0,P=3949] sexec.c:461:main() : Not virtualizing PID namespace
DEBUG [U=0,P=3949] sexec.c:480:main() : Virtualizing FS namespace
DEBUG [U=0,P=3949] sexec.c:488:main() : Virtualizing mount namespace
DEBUG [U=0,P=3949] sexec.c:495:main() : Making mounts private
DEBUG [U=0,P=3949] sexec.c:505:main() : Mounting Singularity image file read/write
DEBUG [U=0,P=3949] mounts.c:48:mount_image() : Called mount_image(/dev/loop0, /usr/local/var/singularity/mnt, 0)
DEBUG [U=0,P=3949] mounts.c:50:mount_image() : Checking mount point is present
DEBUG [U=0,P=3949] mounts.c:56:mount_image() : Checking loop is a block device
DEBUG [U=0,P=3949] mounts.c:75:mount_image() : Trying to mount read only as ext4 with discard option
DEBUG [U=0,P=3949] mounts.c:88:mount_image() : Returning mount_image(/dev/loop0, /usr/local/var/singularity/mnt, 0) = 0
DEBUG [U=0,P=3949] sexec.c:518:main() : Checking if container has /bin/sh
DEBUG [U=0,P=3949] sexec.c:526:main() : Checking to see if we should do bind mounts
DEBUG [U=0,P=3949] sexec.c:530:main() : Checking configuration file for 'mount home'
DEBUG [U=0,P=3949] config_parser.c:69:config_get_key_bool() : Called config_get_key_bool(fp, mount home, 1)
DEBUG [U=0,P=3949] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, mount home)
DEBUG [U=0,P=3949] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, mount home) = yes
DEBUG [U=0,P=3949] config_parser.c:75:config_get_key_bool() : Return config_get_key_bool(fp, mount home, 1) = 1
VERBOSE [U=0,P=3949] sexec.c:536:main() : Mounting home directory base path: /root
DEBUG [U=0,P=3949] mounts.c:96:mount_bind() : Called mount_bind(/root, 19992816, 1)
DEBUG [U=0,P=3949] mounts.c:98:mount_bind() : Checking that source exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:104:mount_bind() : Checking that destination exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:110:mount_bind() : Calling mount(/root, /usr/local/var/singularity/mnt//root, ...)
DEBUG [U=0,P=3949] mounts.c:124:mount_bind() : Returning mount_bind(/root, 19992816, 1) = 0
DEBUG [U=0,P=3949] sexec.c:551:main() : Checking configuration file for 'bind path'
DEBUG [U=0,P=3949] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, bind path)
DEBUG [U=0,P=3949] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, bind path) = /etc/resolv.conf
VERBOSE [U=0,P=3949] sexec.c:566:main() : Found 'bind path' = /etc/resolv.conf, /etc/resolv.conf
VERBOSE [U=0,P=3949] sexec.c:583:main() : Binding '/etc/resolv.conf' to 'nasmpi-singularity.img:/etc/resolv.conf'
DEBUG [U=0,P=3949] mounts.c:96:mount_bind() : Called mount_bind(/etc/resolv.conf, 19995920, 1)
DEBUG [U=0,P=3949] mounts.c:98:mount_bind() : Checking that source exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:104:mount_bind() : Checking that destination exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:110:mount_bind() : Calling mount(/etc/resolv.conf, /usr/local/var/singularity/mnt//etc/resolv.conf, ...)
DEBUG [U=0,P=3949] mounts.c:124:mount_bind() : Returning mount_bind(/etc/resolv.conf, 19995920, 1) = 0
DEBUG [U=0,P=3949] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, bind path)
DEBUG [U=0,P=3949] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, bind path) = /etc/hosts
VERBOSE [U=0,P=3949] sexec.c:566:main() : Found 'bind path' = /etc/hosts, /etc/hosts
VERBOSE [U=0,P=3949] sexec.c:583:main() : Binding '/etc/hosts' to 'nasmpi-singularity.img:/etc/hosts'
DEBUG [U=0,P=3949] mounts.c:96:mount_bind() : Called mount_bind(/etc/hosts, 19998528, 1)
DEBUG [U=0,P=3949] mounts.c:98:mount_bind() : Checking that source exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:104:mount_bind() : Checking that destination exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:110:mount_bind() : Calling mount(/etc/hosts, /usr/local/var/singularity/mnt//etc/hosts, ...)
DEBUG [U=0,P=3949] mounts.c:124:mount_bind() : Returning mount_bind(/etc/hosts, 19998528, 1) = 0
DEBUG [U=0,P=3949] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, bind path)
DEBUG [U=0,P=3949] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, bind path) = /dev
VERBOSE [U=0,P=3949] sexec.c:566:main() : Found 'bind path' = /dev, /dev
VERBOSE [U=0,P=3949] sexec.c:583:main() : Binding '/dev' to 'nasmpi-singularity.img:/dev'
DEBUG [U=0,P=3949] mounts.c:96:mount_bind() : Called mount_bind(/dev, 20000832, 1)
DEBUG [U=0,P=3949] mounts.c:98:mount_bind() : Checking that source exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:104:mount_bind() : Checking that destination exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:110:mount_bind() : Calling mount(/dev, /usr/local/var/singularity/mnt//dev, ...)
DEBUG [U=0,P=3949] mounts.c:124:mount_bind() : Returning mount_bind(/dev, 20000832, 1) = 0
DEBUG [U=0,P=3949] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, bind path)
DEBUG [U=0,P=3949] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, bind path) = /tmp
VERBOSE [U=0,P=3949] sexec.c:566:main() : Found 'bind path' = /tmp, /tmp
VERBOSE [U=0,P=3949] sexec.c:583:main() : Binding '/tmp' to 'nasmpi-singularity.img:/tmp'
DEBUG [U=0,P=3949] mounts.c:96:mount_bind() : Called mount_bind(/tmp, 20003376, 1)
DEBUG [U=0,P=3949] mounts.c:98:mount_bind() : Checking that source exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:104:mount_bind() : Checking that destination exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:110:mount_bind() : Calling mount(/tmp, /usr/local/var/singularity/mnt//tmp, ...)
DEBUG [U=0,P=3949] mounts.c:124:mount_bind() : Returning mount_bind(/tmp, 20003376, 1) = 0
DEBUG [U=0,P=3949] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, bind path)
DEBUG [U=0,P=3949] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, bind path) = /var/tmp
VERBOSE [U=0,P=3949] sexec.c:566:main() : Found 'bind path' = /var/tmp, /var/tmp
VERBOSE [U=0,P=3949] sexec.c:583:main() : Binding '/var/tmp' to 'nasmpi-singularity.img:/var/tmp'
DEBUG [U=0,P=3949] mounts.c:96:mount_bind() : Called mount_bind(/var/tmp, 20005936, 1)
DEBUG [U=0,P=3949] mounts.c:98:mount_bind() : Checking that source exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:104:mount_bind() : Checking that destination exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:110:mount_bind() : Calling mount(/var/tmp, /usr/local/var/singularity/mnt//var/tmp, ...)
DEBUG [U=0,P=3949] mounts.c:124:mount_bind() : Returning mount_bind(/var/tmp, 20005936, 1) = 0
DEBUG [U=0,P=3949] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, bind path)
DEBUG [U=0,P=3949] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, bind path) = /home
VERBOSE [U=0,P=3949] sexec.c:566:main() : Found 'bind path' = /home, /home
VERBOSE [U=0,P=3949] sexec.c:583:main() : Binding '/home' to 'nasmpi-singularity.img:/home'
DEBUG [U=0,P=3949] mounts.c:96:mount_bind() : Called mount_bind(/home, 20008528, 1)
DEBUG [U=0,P=3949] mounts.c:98:mount_bind() : Checking that source exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:104:mount_bind() : Checking that destination exists and is a file or directory
DEBUG [U=0,P=3949] mounts.c:110:mount_bind() : Calling mount(/home, /usr/local/var/singularity/mnt//home, ...)
DEBUG [U=0,P=3949] mounts.c:124:mount_bind() : Returning mount_bind(/home, 20008528, 1) = 0
DEBUG [U=0,P=3949] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, bind path)
DEBUG [U=0,P=3949] config_parser.c:61:config_get_key_value() : Return config_get_key_value(fp, bind path) = NULL
VERBOSE [U=0,P=3949] sexec.c:633:main() : Not staging passwd or group (running as root)
VERBOSE [U=0,P=3949] sexec.c:638:main() : Forking exec process
DEBUG [U=0,P=3949] sexec.c:770:main() : Dropping privs...
DEBUG [U=0,P=3949] privilege.c:79:drop_privs() : Called drop_privs(struct s_privinfo *uinfo)
DEBUG [U=0,P=3949] privilege.c:87:drop_privs() : Dropping privileges to GID = '0'
DEBUG [U=0,P=3949] privilege.c:93:drop_privs() : Dropping privileges to UID = '0'
DEBUG [U=0,P=3949] privilege.c:103:drop_privs() : Confirming we have correct GID
DEBUG [U=0,P=3949] privilege.c:109:drop_privs() : Confirming we have correct UID
DEBUG [U=0,P=3949] privilege.c:115:drop_privs() : Returning drop_privs(struct s_privinfo *uinfo) = 0
VERBOSE [U=0,P=3949] sexec.c:776:main() : Waiting for Exec process...
DEBUG [U=0,P=3959] sexec.c:642:main() : Hello from exec child process
VERBOSE [U=0,P=3959] sexec.c:644:main() : Entering container file system space
DEBUG [U=0,P=3959] sexec.c:649:main() : Changing dir to '/' within the new root
DEBUG [U=0,P=3959] sexec.c:657:main() : Checking configuration file for 'mount proc'
DEBUG [U=0,P=3959] config_parser.c:69:config_get_key_bool() : Called config_get_key_bool(fp, mount proc, 1)
DEBUG [U=0,P=3959] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, mount proc)
DEBUG [U=0,P=3959] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, mount proc) = yes
DEBUG [U=0,P=3959] config_parser.c:75:config_get_key_bool() : Return config_get_key_bool(fp, mount proc, 1) = 1
VERBOSE [U=0,P=3959] sexec.c:661:main() : Mounting /proc
DEBUG [U=0,P=3959] sexec.c:674:main() : Checking configuration file for 'mount sys'
DEBUG [U=0,P=3959] config_parser.c:69:config_get_key_bool() : Called config_get_key_bool(fp, mount sys, 1)
DEBUG [U=0,P=3959] config_parser.c:43:config_get_key_value() : Called config_get_key_value(fp, mount sys)
DEBUG [U=0,P=3959] config_parser.c:54:config_get_key_value() : Return config_get_key_value(fp, mount sys) = yes
DEBUG [U=0,P=3959] config_parser.c:75:config_get_key_bool() : Return config_get_key_bool(fp, mount sys, 1) = 1
VERBOSE [U=0,P=3959] sexec.c:678:main() : Mounting /sys
VERBOSE [U=0,P=3959] sexec.c:692:main() : Dropping all privileges
DEBUG [U=0,P=3959] privilege.c:121:drop_privs_perm() : Called drop_privs_perm(struct s_privinfo *uinfo)
DEBUG [U=0,P=3959] privilege.c:129:drop_privs_perm() : Resetting supplementary groups
DEBUG [U=0,P=3959] privilege.c:135:drop_privs_perm() : Dropping real and effective privileges to GID = '0'
DEBUG [U=0,P=3959] privilege.c:141:drop_privs_perm() : Dropping real and effective privileges to UID = '0'
DEBUG [U=0,P=3959] privilege.c:151:drop_privs_perm() : Confirming we have correct GID
DEBUG [U=0,P=3959] privilege.c:157:drop_privs_perm() : Confirming we have correct UID
DEBUG [U=0,P=3959] privilege.c:163:drop_privs_perm() : Returning drop_privs_perm(struct s_privinfo *uinfo) = 0
VERBOSE [U=0,P=3959] sexec.c:699:main() : Changing to correct working directory: /tmp/result
DEBUG [U=0,P=3959] sexec.c:713:main() : Setting environment variable 'SINGULARITY_CONTAINER=1'
VERBOSE [U=0,P=3959] sexec.c:732:main() : COMMAND=exec
DEBUG [U=0,P=3959] container_actions.c:59:container_exec() : Called container_exec(2, **argv)
VERBOSE [U=0,P=3959] container_actions.c:65:container_exec() : Exec'ing program: true
VERBOSE [U=0,P=3949] sexec.c:785:main() : Exec parent process returned: 0
VERBOSE [U=0,P=3944] sexec.c:804:main() : Starting cleanup...
DEBUG [U=0,P=3944] sexec.c:955:main() : Checking to see if we are the last process running in this sessiondir
DEBUG [U=0,P=3944] sexec.c:959:main() : Escalating privs to clean session directory
DEBUG [U=0,P=3944] privilege.c:61:escalate_privs() : Called escalate_privs(void)
DEBUG [U=0,P=3944] privilege.c:73:escalate_privs() : Returning escalate_privs(void) = 0
VERBOSE [U=0,P=3944] sexec.c:964:main() : Cleaning sessiondir: /tmp/.singularity-session-0.39.12911060245380037651
DEBUG [U=0,P=3944] file.c:212:s_rmdir() : Removing dirctory: /tmp/.singularity-session-0.39.12911060245380037651
DEBUG [U=0,P=3944] loop-control.c:138:disassociate_loop() : Called disassociate_loop(loop_fp)
VERBOSE [U=0,P=3944] loop-control.c:140:disassociate_loop() : Disassociating image from loop device
DEBUG [U=0,P=3944] loop-control.c:146:disassociate_loop() : Returning disassociate_loop(loop_fp) = 0
DEBUG [U=0,P=3944] privilege.c:79:drop_privs() : Called drop_privs(struct s_privinfo *uinfo)
DEBUG [U=0,P=3944] privilege.c:87:drop_privs() : Dropping privileges to GID = '0'
DEBUG [U=0,P=3944] privilege.c:93:drop_privs() : Dropping privileges to UID = '0'
DEBUG [U=0,P=3944] privilege.c:103:drop_privs() : Confirming we have correct GID
DEBUG [U=0,P=3944] privilege.c:109:drop_privs() : Confirming we have correct UID
DEBUG [U=0,P=3944] privilege.c:115:drop_privs() : Returning drop_privs(struct s_privinfo *uinfo) = 0
VERBOSE [U=0,P=3944] sexec.c:981:main() : Cleaning up...
Thanks,