It seems to work at least on my build system.
I've set up a definition like this. But on the cluster I get an error ...
Increasing verbosity level (6)
Singularity version: 2.3.1-dist
Exec'ing: /usr/local/libexec/singularity/cli/run.exec
Evaluating args: '-B .meteor/local:/usr/local/mindcontrol/.meteor/local mindcontrol.img'
VERBOSE [U=0,P=60628] message_init() Set messagelevel to: 6
VERBOSE [U=0,P=60628] singularity_config_parse() Initialize configuration file: /usr/local/etc/singularity/singularity.conf
DEBUG [U=0,P=60628] singularity_config_parse() Starting parse of configuration file /usr/local/etc/singularity/singularity.conf
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key allow setuid = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key max loop devices = '256'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key allow pid ns = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key config passwd = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key config group = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key config resolv_conf = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key mount proc = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key mount sys = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key mount dev = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key mount home = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key mount tmp = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key mount hostfs = 'no'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key bind path = '/etc/localtime'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key bind path = '/etc/hosts'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key user bind control = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key enable overlay = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key mount slave = 'yes'
VERBOSE [U=0,P=60628] singularity_config_parse() Got config key sessiondir max size = '16'
DEBUG [U=0,P=60628] singularity_config_parse() Finished parsing configuration file '/usr/local/etc/singularity/singularity.conf'
VERBOSE [U=0,P=60628] singularity_registry_init() Initializing Singularity Registry
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'LIBEXECDIR' = '/usr/local/libexec'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(libexecdir, /usr/local/libexec) = 0
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'COMMAND' = 'run'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(COMMAND, run) = 0
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'MESSAGELEVEL' = '6'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(MESSAGELEVEL, 6) = 0
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'VERSION' = '2.3.1-dist'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(version, 2.3.1-dist) = 0
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'LOCALSTATEDIR' = '/usr/local/var'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(localstatedir, /usr/local/var) = 0
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'SYSCONFDIR' = '/usr/local/etc'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(sysconfdir, /usr/local/etc) = 0
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'BINDPATH' = ',.meteor/local:/usr/local/mindcontrol/.meteor/local'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(BINDPATH, ,.meteor/local:/usr/local/mindcontrol/.meteor/local) = 0
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'BINDIR' = '/usr/local/bin'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(bindir, /usr/local/bin) = 0
VERBOSE [U=0,P=60628] singularity_registry_set() Adding value to registry: 'IMAGE' = 'mindcontrol.img'
DEBUG [U=0,P=60628] singularity_registry_set() Returning singularity_registry_set(IMAGE, mindcontrol.img) = 0
DEBUG [U=0,P=60628] singularity_registry_get() Returning NULL on 'HOME'
DEBUG [U=0,P=60628] singularity_registry_get() Returning NULL on 'TARGET_UID'
DEBUG [U=0,P=60628] singularity_registry_get() Returning NULL on 'TARGET_GID'
DEBUG [U=0,P=60628] singularity_priv_init() Initializing user info
DEBUG [U=0,P=60628] singularity_priv_init() Set the calling user's username to: p158-uxscti
DEBUG [U=0,P=60628] singularity_priv_init() Marking uinfo structure as ready
DEBUG [U=0,P=60628] singularity_priv_init() Obtaining home directory
VERBOSE [U=0,P=60628] singularity_priv_init() Set home (via getpwuid()) to: /tsd/p158/home/p158-uxscti
VERBOSE [U=0,P=60628] singularity_suid_init() Running SUID program workflow
VERBOSE [U=0,P=60628] singularity_suid_init() Checking program has appropriate permissions
VERBOSE [U=0,P=60628] singularity_suid_init() Checking configuration file is properly owned by root
VERBOSE [U=0,P=60628] singularity_suid_init() Checking if singularity.conf allows us to run as suid
DEBUG [U=0,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow setuid, yes)
DEBUG [U=0,P=60628] singularity_config_get_value_impl() Returning configuration value allow setuid='yes'
DEBUG [U=0,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow setuid, yes) = 1
DEBUG [U=0,P=60628] singularity_registry_get() Returning NULL on 'NOSUID'
VERBOSE [U=0,P=60628] singularity_priv_userns() Invoking the user namespace
DEBUG [U=0,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow user ns, yes)
DEBUG [U=0,P=60628] singularity_config_get_value_impl() No configuration entry found for 'allow user ns'; returning default value 'yes'
DEBUG [U=0,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow user ns, yes) = 1
VERBOSE [U=0,P=60628] singularity_priv_userns() Not virtualizing USER namespace: running as SUID
DEBUG [U=0,P=60628] singularity_priv_userns() Returning singularity_priv_init(void)
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'CLEANUPDIR'
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'NOSESSIONCLEANUP'
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'NOCLEANUP'
DEBUG [U=1947,P=60628] singularity_cleanupd() Not running a cleanup thread, no 'SINGULARITY_CLEANUPDIR' defined
DEBUG [U=1947,P=60628] singularity_runtime_ns() Calling: _singularity_runtime_ns_pid()
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow pid ns, yes)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value allow pid ns='yes'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow pid ns, yes) = 1
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'UNSHARE_PID'
VERBOSE [U=1947,P=60628] singularity_runtime_ns_pid() Not virtualizing PID namespace on user request
DEBUG [U=1947,P=60628] singularity_runtime_ns() Calling: _singularity_runtime_ns_ipc()
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow ipc ns, yes)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() No configuration entry found for 'allow ipc ns'; returning default value 'yes'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow ipc ns, yes) = 1
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'UNSHARE_IPC'
VERBOSE [U=1947,P=60628] singularity_runtime_ns_ipc() Not virtualizing IPC namespace on user request
DEBUG [U=1947,P=60628] singularity_runtime_ns() Calling: _singularity_runtime_ns_mnt()
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount slave, yes)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value mount slave='yes'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount slave, yes) = 1
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=60628] singularity_runtime_ns_mnt() Virtualizing FS namespace
DEBUG [U=0,P=60628] singularity_runtime_ns_mnt() Virtualizing mount namespace
DEBUG [U=0,P=60628] singularity_runtime_ns_mnt() Making mounts slave
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=1947,P=60628] singularity_sessiondir() Setting sessiondir
VERBOSE [U=1947,P=60628] singularity_sessiondir() Using session directory: /usr/local/var/singularity/mnt/session
DEBUG [U=1947,P=60628] singularity_sessiondir() Checking for session directory: /usr/local/var/singularity/mnt/session
DEBUG [U=1947,P=60628] singularity_sessiondir() Obtaining the default sessiondir size
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value sessiondir max size='16'
DEBUG [U=1947,P=60628] singularity_sessiondir() Converted sessiondir size to: 16
DEBUG [U=1947,P=60628] singularity_sessiondir() Creating the sessiondir size mount option length
DEBUG [U=1947,P=60628] singularity_sessiondir() Got size length of: 9
DEBUG [U=1947,P=60628] singularity_sessiondir() Creating the sessiondir size mount option string
DEBUG [U=1947,P=60628] singularity_sessiondir() Checking to make sure the string was allocated correctly
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=60628] singularity_sessiondir() Mounting sessiondir tmpfs: /usr/local/var/singularity/mnt/session
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
VERBOSE [U=1947,P=60628] singularity_registry_set() Adding value to registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session'
DEBUG [U=1947,P=60628] singularity_registry_set() Returning singularity_registry_set(SESSIONDIR, /usr/local/var/singularity/mnt/session) = 0
DEBUG [U=1947,P=60628] singularity_registry_get() Returning value from registry: 'IMAGE' = 'mindcontrol.img'
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'WRITABLE'
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() No configuration entry found for 'limit container owners'; returning default value 'NULL'
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() No configuration entry found for 'limit container paths'; returning default value 'NULL'
DEBUG [U=1947,P=60628] singularity_image_open() Opening file descriptor to image: mindcontrol.img
VERBOSE [U=1947,P=60628] singularity_image_check() Checking what kind of image we are mounting
VERBOSE [U=1947,P=60628] singularity_image_check_image() Checking that file pointer is a Singularity image
DEBUG [U=1947,P=60628] singularity_image_check_image() First line of image(fd=4): #!/usr/bin/env run-singularity
DEBUG [U=1947,P=60628] singularity_image_check_image() Checking if first line matches key
VERBOSE [U=1947,P=60628] singularity_image_check_image() File is a valid Singularity image
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value max loop devices='256'
DEBUG [U=1947,P=60628] singularity_image_bind() Entered singularity_image_bind()
DEBUG [U=1947,P=60628] singularity_image_bind() Converting max_loop_devs_string to int: '256'
DEBUG [U=1947,P=60628] singularity_image_bind() Converted max_loop_devs_string to int: '256' -> 256
DEBUG [U=1947,P=60628] singularity_image_bind() Checking if this image has been properly opened
DEBUG [U=1947,P=60628] singularity_image_bind() Checking if image is valid file
DEBUG [U=1947,P=60628] singularity_image_bind() Checking if image is already bound to a loop device
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'WRITABLE'
DEBUG [U=1947,P=60628] singularity_image_bind() Setting loopdev open to: O_RDONLY
DEBUG [U=1947,P=60628] singularity_image_bind() Setting LO_FLAGS_AUTOCLEAR
DEBUG [U=1947,P=60628] singularity_image_bind() Calculating image offset
VERBOSE [U=1947,P=60628] singularity_image_check() Checking what kind of image we are mounting
VERBOSE [U=1947,P=60628] singularity_image_check_image() Checking that file pointer is a Singularity image
DEBUG [U=1947,P=60628] singularity_image_check_image() First line of image(fd=4): #!/usr/bin/env run-singularity
DEBUG [U=1947,P=60628] singularity_image_check_image() Checking if first line matches key
VERBOSE [U=1947,P=60628] singularity_image_check_image() File is a valid Singularity image
VERBOSE [U=1947,P=60628] singularity_image_offset() Calculating image offset
VERBOSE [U=1947,P=60628] singularity_image_offset() Found image at an offset of 31 bytes
DEBUG [U=1947,P=60628] singularity_image_offset() Returning image_offset(image_fp) = 31
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=60628] singularity_image_bind() Finding next available loop device...
VERBOSE [U=0,P=60628] singularity_image_bind() Found available loop device: /dev/loop0
DEBUG [U=0,P=60628] singularity_image_bind() Setting loop device flags
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
VERBOSE [U=1947,P=60628] singularity_image_bind() Using loop device: /dev/loop0
VERBOSE [U=1947,P=60628] singularity_runtime_rootfs() Set container directory to: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Checking for container directory
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] chk_mode() Checking exact mode (40755) on: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] chk_mode() Found appropriate mode on file: /usr/local/var/singularity/mnt/container
VERBOSE [U=1947,P=60628] singularity_image_mount() Checking what kind of image we are mounting
VERBOSE [U=1947,P=60628] singularity_image_mount() Attempting to mount as singularity image
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'WRITABLE'
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=60628] singularity_image_mount_image_mount() Mounting /dev/loop0 in read/only to: /usr/local/var/singularity/mnt/container
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] action_ready() Checking if container is valid at: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] singularity_runtime_overlayfs() Checking if overlayfs should be used
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(enable overlay, yes)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value enable overlay='yes'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(enable overlay, yes) = 1
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'DISABLE_OVERLAYFS'
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'WRITABLE'
VERBOSE [U=1947,P=60628] singularity_runtime_overlayfs() OverlayFS not supported by host build
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
VERBOSE [U=1947,P=60628] singularity_runtime_mounts() Running all mount components
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount hostfs, no)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value mount hostfs='no'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount hostfs, no) = 0
DEBUG [U=1947,P=60628] singularity_runtime_mount_hostfs() Not mounting host file systems per configuration
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'CONTAIN'
DEBUG [U=1947,P=60628] singularity_runtime_mount_binds() Checking configuration file for 'bind path'
VERBOSE [U=1947,P=60628] singularity_runtime_mount_binds() Found 'bind path' = /etc/localtime, /etc/localtime
DEBUG [U=1947,P=60628] singularity_runtime_mount_binds() Checking if bind point is already mounted: /etc/localtime
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] check_mounted() Opening /proc/mounts
DEBUG [U=1947,P=60628] check_mounted() Iterating through /proc/mounts
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=60628] singularity_runtime_mount_binds() Binding '/etc/localtime' to '/usr/local/var/singularity/mnt/container//etc/localtime'
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
VERBOSE [U=1947,P=60628] singularity_runtime_mount_binds() Found 'bind path' = /etc/hosts, /etc/hosts
DEBUG [U=1947,P=60628] singularity_runtime_mount_binds() Checking if bind point is already mounted: /etc/hosts
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] check_mounted() Opening /proc/mounts
DEBUG [U=1947,P=60628] check_mounted() Iterating through /proc/mounts
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=60628] singularity_runtime_mount_binds() Binding '/etc/hosts' to '/usr/local/var/singularity/mnt/container//etc/hosts'
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] singularity_runtime_mount_kernelfs() Checking configuration file for 'mount proc'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount proc, yes)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value mount proc='yes'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount proc, yes) = 1
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'PIDNS_ENABLED'
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=60628] singularity_runtime_mount_kernelfs() Bind-mounting host /proc
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=1947,P=60628] singularity_runtime_mount_kernelfs() Checking configuration file for 'mount sys'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount sys, yes)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value mount sys='yes'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount sys, yes) = 1
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=60628] singularity_runtime_mount_kernelfs() Mounting /sys
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'CONTAIN'
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value mount dev='yes'
DEBUG [U=1947,P=60628] singularity_runtime_mount_dev() Checking configuration file for 'mount dev'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount dev, yes)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value mount dev='yes'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount dev, yes) = 1
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=60628] singularity_runtime_mount_dev() Bind mounting /dev
DEBUG [U=0,P=60628] singularity_priv_drop() Dropping privileges to UID=1947, GID=2712 (5 supplementary GIDs)
DEBUG [U=0,P=60628] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=1947,P=60628] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount home, yes)
DEBUG [U=1947,P=60628] singularity_config_get_value_impl() Returning configuration value mount home='yes'
DEBUG [U=1947,P=60628] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount home, yes) = 1
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking that home directry is configured: /tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking if SINGULARITY_CONTAIN is set
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'CONTAIN'
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking if home directories are being influenced by user
DEBUG [U=1947,P=60628] singularity_registry_get() Returning NULL on 'HOME'
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking ownership of home directory source: /tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking to make sure home directory destination is a full path: /tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking if home directory is already mounted: /tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=1947,P=60628] check_mounted() Opening /proc/mounts
DEBUG [U=1947,P=60628] check_mounted() Iterating through /proc/mounts
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking if overlay is enabled
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Staging home directory
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking if sessiondir/tmpdir is set
DEBUG [U=1947,P=60628] singularity_registry_get() Returning value from registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session'
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Identifying the base home directory: /tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] basedir() Obtaining basedir for: /tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] basedir() Iterating basedir: /tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] basedir() Iterating basedir: /tsd/p158/home
DEBUG [U=1947,P=60628] basedir() Iterating basedir: /tsd/p158
DEBUG [U=1947,P=60628] basedir() Iterating basedir: /tsd
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Checking home directory base exists in container: /tsd
DEBUG [U=1947,P=60628] singularity_runtime_mount_home() Creating temporary directory to stage home: /usr/local/var/singularity/mnt/session/tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/session/tsd
DEBUG [U=1947,P=60628] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/session/tsd/p158
DEBUG [U=1947,P=60628] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/session/tsd/p158/home
DEBUG [U=1947,P=60628] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/session/tsd/p158/home/p158-uxscti
DEBUG [U=1947,P=60628] singularity_priv_escalate() Temporarily escalating privileges (U=1947)
DEBUG [U=0,P=60628] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=60628] singularity_runtime_mount_home() Mounting home directory source to stage: /tsd/p158/home/p158-uxscti -> /usr/local/var/singularity/mnt/session/tsd/p158/home/p158-uxscti
ERROR [U=0,P=60628] singularity_runtime_mount_home() Failed to mount home directory /tsd/p158/home/p158-uxscti -> /usr/local/var/singularity/mnt/session/tsd/p158/home/p158-uxscti: Permission denied
ABORT [U=0,P=60628] singularity_runtime_mount_home() Retval = 255