#2021-09-15 01:28:12: client4: createExceptionInternal: !ERROR: SyntaxException:parseError:	true:= 23;
#2021-09-15 01:28:12: client4: createExceptionInternal: !ERROR: SyntaxException:parseError:	^<identifier> or <literal> expected
#2021-09-15 01:28:12: client4: createExceptionInternal: !ERROR: SyntaxException:parseError:	false:= 24;
#2021-09-15 01:28:12: client4: createExceptionInternal: !ERROR: SyntaxException:parseError:	^<identifier> or <literal> expected
#2021-09-15 01:28:12: client5: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo 'b' may not be used before being initialized
#2021-09-15 01:28:12: client9: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo 'entry_or_exit' may not be used before being initialized
#2021-09-15 01:28:12: client10: createExceptionInternal: !ERROR: SyntaxException:parseError:	io.printi;
#2021-09-15 01:28:12: client10: createExceptionInternal: !ERROR: SyntaxException:parseError:	         ^'(' expected
#2021-09-15 01:28:12: client10: createExceptionInternal: !ERROR: SyntaxException:parseError:end foo;
#2021-09-15 01:28:12: client10: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^non matching end label
#2021-09-15 01:28:12: client10: createExceptionInternal: !ERROR: MALException:chkFlow:user.main 'i' may not be used before being initialized
#2021-09-15 01:28:12: client12: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo label 'Z' not in guarded block
#2021-09-15 01:28:12: client15: createExceptionInternal: !ERROR: MALException:chkFlow:user.main label 'X_0' not in guarded block
#2021-09-15 01:28:12: client16: createExceptionInternal: !ERROR: MALException:chkFlow:user.main label 't' not in guarded block
#2021-09-15 01:28:13: client21: createExceptionInternal: !ERROR: MALException:chkFlow:user.welcome3 invalid return target!
#2021-09-15 01:28:13: client31: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:28:13: client31: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:13: client31: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:28:13: client31: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:13: client31: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:28:13: client31: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:13: client31: createExceptionInternal: !ERROR: MALException:algebra.fetch:Illegal argument: cannot fetch a single row from an empty input
#2021-09-15 01:28:13: client31: createExceptionInternal: !ERROR: MALException:io.printf:operation failed At least 1 parameter(s) expected.
#2021-09-15 01:28:13: client37: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:28:13: client37: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:13: client37: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:28:13: client37: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:13: client42: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:28:13: client42: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:13: client55: createExceptionInternal: !ERROR: SyntaxException:parseError:return (1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0);
#2021-09-15 01:28:13: client55: createExceptionInternal: !ERROR: SyntaxException:parseError:        ^<identifier> or <literal> expected
#2021-09-15 01:28:13: client55: createExceptionInternal: !ERROR: SyntaxException:parseError:end z
#2021-09-15 01:28:13: client55: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^non matching end label
#2021-09-15 01:28:13: client59: createExceptionInternal: !ERROR: SyntaxException:parseError:i:= 1 + 1 + 1;
#2021-09-15 01:28:13: client59: createExceptionInternal: !ERROR: SyntaxException:parseError:          ^';' expected
#2021-09-15 01:28:13: client59: createExceptionInternal: !ERROR: SyntaxException:parseError:j:= 1 + + 1;
#2021-09-15 01:28:13: client59: createExceptionInternal: !ERROR: SyntaxException:parseError:        ^<term> expected
#2021-09-15 01:28:13: client64: createExceptionInternal: !ERROR: SyntaxException:parseError:----
#2021-09-15 01:28:13: client64: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:13: client64: createExceptionInternal: !ERROR: SyntaxException:parseError:nil;
#2021-09-15 01:28:13: client64: createExceptionInternal: !ERROR: SyntaxException:parseError:^<identifier> or <literal> expected
#2021-09-15 01:28:13: client75: createExceptionInternal: !ERROR: MALException:chkFlow:user.main exit-label 'v' doesnot match 't'
#2021-09-15 01:28:13: client76: createExceptionInternal: !ERROR: MALException:chkFlow:user.main exit-label 'v' doesnot match 't'
#2021-09-15 01:28:13: client77: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo label 'L' not in guarded block
#2021-09-15 01:28:13: client77: createExceptionInternal: !ERROR: SyntaxException:parseError:end foo
#2021-09-15 01:28:13: client77: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^non matching end label
#2021-09-15 01:28:13: client78: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo label 'X' not in guarded block
#2021-09-15 01:28:13: client78: createExceptionInternal: !ERROR: SyntaxException:parseError:end foo
#2021-09-15 01:28:13: client78: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^non matching end label
#2021-09-15 01:28:13: client79: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo label 'A' not in guarded block
#2021-09-15 01:28:13: client79: createExceptionInternal: !ERROR: SyntaxException:parseError:end foo
#2021-09-15 01:28:13: client79: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^non matching end label
#2021-09-15 01:28:13: client80: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo label 'L' not in guarded block
#2021-09-15 01:28:13: client80: createExceptionInternal: !ERROR: SyntaxException:parseError:end foo
#2021-09-15 01:28:13: client80: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^non matching end label
#2021-09-15 01:28:13: client81: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo label 'L' not in guarded block
#2021-09-15 01:28:13: client81: createExceptionInternal: !ERROR: SyntaxException:parseError:end foo
#2021-09-15 01:28:13: client81: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^non matching end label
#2021-09-15 01:28:13: client82: createExceptionInternal: !ERROR: MALException:chkFlow:user.foo exit-label 'F' doesnot match 'A'
#2021-09-15 01:28:13: client82: createExceptionInternal: !ERROR: SyntaxException:parseError:end foo
#2021-09-15 01:28:13: client82: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^non matching end label
#2021-09-15 01:28:13: client84: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:28:13: client84: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:13: client93: createExceptionInternal: !ERROR: MALException:chkFlow:user.main 'xif1' may not be used before being initialized
#2021-09-15 01:28:13: client94: VARconvert: !ERROR: conversion from type int to type mytype unsupported.
#2021-09-15 01:28:13: client94: createExceptionInternal: !ERROR: SyntaxException:convertConstant:coercion failed
#2021-09-15 01:28:14: client95: createExceptionInternal: !ERROR: SyntaxException:parseError:----
#2021-09-15 01:28:14: client95: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:14: client95: createExceptionInternal: !ERROR: SyntaxException:parseError:nil;
#2021-09-15 01:28:14: client95: createExceptionInternal: !ERROR: SyntaxException:parseError:^<identifier> or <literal> expected
#2021-09-15 01:28:14: client103: createExceptionInternal: !ERROR: MALException:chkFlow:user.welcome3 invalid return target!
#2021-09-15 01:28:14: client103: createExceptionInternal: !ERROR: SyntaxException:parseError:----
#2021-09-15 01:28:14: client103: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:14: client103: createExceptionInternal: !ERROR: SyntaxException:parseError:nil;
#2021-09-15 01:28:14: client103: createExceptionInternal: !ERROR: SyntaxException:parseError:^<identifier> or <literal> expected
#2021-09-15 01:28:14: client104: createExceptionInternal: !ERROR: SyntaxException:parseError:----
#2021-09-15 01:28:14: client104: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:28:14: client104: createExceptionInternal: !ERROR: SyntaxException:parseError:nil;
#2021-09-15 01:28:14: client104: createExceptionInternal: !ERROR: SyntaxException:parseError:^<identifier> or <literal> expected
#2021-09-15 01:28:14: client108: BBPrename: !ERROR: name is in use: 'mybat'.
#2021-09-15 01:28:14: client137: createExceptionInternal: !ERROR: MALException:user.tst[1]:new exception
#2021-09-15 01:28:14: client139: createExceptionInternal: !ERROR: MALException:user.foo[4]:Exception not caught
#2021-09-15 01:28:14: client140: createExceptionInternal: !ERROR: MALException:user.foo[1]:an exception
#2021-09-15 01:28:14: client141: createExceptionInternal: !ERROR: MALException:user.myException[1]:new exception
#2021-09-15 01:28:14: client141: createExceptionInternal: !ERROR: MALException:user.myException[4]:exception not caught
#2021-09-15 01:28:14: client142: createExceptionInternal: !ERROR: MALException:user.myException[1]:new exception
#2021-09-15 01:28:14: client142: createExceptionInternal: !ERROR: MALException:user.myException[4]:exception not caught
#2021-09-15 01:28:14: client151: createExceptionInternal: !ERROR: MALException:mdb.dummy:operation failed
#2021-09-15 01:28:14: client151: createExceptionInternal: !ERROR: MALException:mdb.dummy:operation failed
#2021-09-15 01:28:14: client151: createExceptionInternal: !ERROR: MALException:mdb.dummy:operation failed
#2021-09-15 01:28:14: client151: createExceptionInternal: !ERROR: MALException:mdb.dummy:operation failed
#2021-09-15 01:28:14: client151: createExceptionInternal: !ERROR: MALException:mdb.dummy:operation failed
#2021-09-15 01:28:14: client151: createExceptionInternal: !ERROR: MALException:mdb.dummy:operation failed
#2021-09-15 01:28:14: client154: createExceptionInternal: !ERROR: MALException:mal.interpreter:prematurely stopped client
#2021-09-15 01:28:14: client166: createExceptionInternal: !ERROR: MALException:addUser:user 'monetdb' already exists
#2021-09-15 01:28:14: client166: createExceptionInternal: !ERROR: InvalidCredentialsException:setPassword:The administrator cannot set its own password, use changePassword instead
#2021-09-15 01:28:14: client166: createExceptionInternal: !ERROR: InvalidCredentialsException:checkCredentials:invalid credentials for user 'monetdb'
#2021-09-15 01:28:14: client166: createExceptionInternal: !ERROR: InvalidCredentialsException:checkCredentials:invalid credentials for user 'monetdb'
#2021-09-15 01:28:14: client166: createExceptionInternal: !ERROR: InvalidCredentialsException:checkCredentials:invalid credentials for user 'x'
#2021-09-15 01:28:14: client173: createExceptionInternal: !ERROR: SyntaxException:parseError:d:= [+](b,c) ;;# parser bug
#2021-09-15 01:28:14: client173: createExceptionInternal: !ERROR: SyntaxException:parseError:    ^operator expected
#2021-09-15 01:28:14: client173: createExceptionInternal: !ERROR: SyntaxException:parseError:a:= b [+] b;
#2021-09-15 01:28:14: client173: createExceptionInternal: !ERROR: SyntaxException:parseError:      ^operator expected
#2021-09-15 01:28:15: client183: createExceptionInternal: !ERROR: SyntaxException:parseError:io.printi;
#2021-09-15 01:28:15: client183: createExceptionInternal: !ERROR: SyntaxException:parseError:         ^'(' expected
#2021-09-15 01:28:19: client189: createExceptionInternal: !ERROR: MALException:chkFlow:user.tst 'a' may not be used before being initialized
#2021-09-15 01:28:19: client190: createExceptionInternal: !ERROR: LoaderException:loadLibrary:Loading error could not locate library UNKNOWlib (from within file 'UNKNOWlib'): /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/install/lib64/monetdb5/lib_UNKNOWlib.so: cannot open shared object file: No such file or directory
#2021-09-15 01:28:19: client190: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:28:19: client190: createExceptionInternal: !ERROR: SyntaxException:parseError:^LoaderException:loadLibrary:Loading error could not locate library UNKNOWlib (from within file 'UNKNOWlib'): /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/install/lib64/monetdb5/lib_UNKNOWlib.so: cannot open shared object file: No such file or directory
#2021-09-15 01:28:19: client191: createExceptionInternal: !ERROR: MALException:mal.interpreter:Recursive call limit reached.

=================================================================
==2608632==ERROR: LeakSanitizer: detected memory leaks

Direct leak of 11536 byte(s) in 395 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb71784a2cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7fb71784aa00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7fb71784e6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7fb717854354 in parseArguments /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #7 0x7fb71785703d in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #8 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #9 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #10 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #11 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #12 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #13 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #14 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #15 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #16 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #17 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #18 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 1472 byte(s) in 31 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a8d2 in GDKstrdup /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1958
    #3 0x7fb717858507 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1828
    #4 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #5 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #6 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #7 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #8 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #9 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #10 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #11 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #12 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #13 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 352 byte(s) in 13 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb71784a2cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7fb71784aa00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7fb71784e6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7fb717857067 in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #7 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #8 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #9 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #10 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #11 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #12 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #13 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #14 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #15 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #16 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #17 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 264 byte(s) in 11 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a8d2 in GDKstrdup /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1958
    #3 0x7fb716c50aeb in VARconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_calc.c:16848
    #4 0x7fb717053e3b in VALconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_value.c:263
    #5 0x7fb7178267bb in convertConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #6 0x7fb71782701e in defConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #7 0x7fb71784ef62 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #8 0x7fb717854354 in parseArguments /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #9 0x7fb71785703d in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #10 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #11 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #12 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #13 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #14 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #15 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #16 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #17 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #18 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #19 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #20 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 72 byte(s) in 2 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a8d2 in GDKstrdup /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1958
    #3 0x7fb7170531ba in VALcopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_value.c:159
    #4 0x7fb717820ca0 in copyMalBlk /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:325
    #5 0x7fb7178117ad in cloneFunction /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_function.c:341
    #6 0x7fb717864470 in findFunctionType /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_resolve.c:399
    #7 0x7fb71786603f in typeChecker /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_resolve.c:521
    #8 0x7fb717867afc in chkTypes /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_resolve.c:661
    #9 0x7fb717867d11 in chkProgram /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_resolve.c:696
    #10 0x7fb717853a27 in parseEnd /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1447
    #11 0x7fb717858b28 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1881
    #12 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #13 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #14 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #15 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #16 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #17 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #18 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #19 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #20 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #21 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 72 byte(s) in 3 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a8d2 in GDKstrdup /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1958
    #3 0x7fb716c50aeb in VARconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_calc.c:16848
    #4 0x7fb717053e3b in VALconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_value.c:263
    #5 0x7fb7178267bb in convertConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #6 0x7fb71782701e in defConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #7 0x7fb71784ef62 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #8 0x7fb717857067 in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #9 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #10 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #11 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #12 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #13 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #14 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #15 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #16 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #17 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #18 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #19 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 72 byte(s) in 3 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb71784a2cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7fb71784aa00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7fb71784e6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7fb717854354 in parseArguments /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #7 0x7fb71785688c in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1671
    #8 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #9 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #10 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #11 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #12 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #13 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #14 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #15 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #16 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #17 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #18 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 64 byte(s) in 2 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb71784a2cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7fb71784aa00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7fb71784e6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7fb717854354 in parseArguments /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #7 0x7fb71785703d in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #8 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #9 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #10 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #11 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #12 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #13 0x7fb717819c88 in callString /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_import.c:478
    #14 0x7fb71794bc52 in CMDcallString /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/language.c:130
    #15 0x7fb71782f627 in runMALsequence /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:656
    #16 0x7fb71782ce74 in runMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:335
    #17 0x7fb71786f80b in MALengine /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:767
    #18 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #19 0x7fb71786a4b9 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:475
    #20 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #21 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #22 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #23 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #24 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #25 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #26 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 48 byte(s) in 2 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb71784a2cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7fb71784aa00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7fb71784e6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7fb717857639 in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1736
    #7 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #8 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #9 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #10 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #11 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #12 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #13 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #14 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #15 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #16 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #17 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 32 byte(s) in 1 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb71784a2cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7fb71784aa00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7fb71784e6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7fb717857067 in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #7 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #8 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #9 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #10 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #11 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #12 0x7fb717819c88 in callString /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_import.c:478
    #13 0x7fb71794bc52 in CMDcallString /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/language.c:130
    #14 0x7fb71782f627 in runMALsequence /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:656
    #15 0x7fb71782ce74 in runMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:335
    #16 0x7fb71786f80b in MALengine /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:767
    #17 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #18 0x7fb71786a4b9 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:475
    #19 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #20 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #21 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #22 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #23 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #24 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #25 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 24 byte(s) in 1 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb717053b24 in VALinit /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_value.c:232
    #4 0x7fb716c51218 in VARconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_calc.c:16874
    #5 0x7fb717053e3b in VALconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_value.c:263
    #6 0x7fb7178267bb in convertConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #7 0x7fb71782701e in defConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #8 0x7fb71784ef62 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #9 0x7fb717857067 in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #10 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #11 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #12 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #13 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #14 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #15 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #16 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #17 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #18 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #19 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #20 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 24 byte(s) in 1 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb71784a2cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7fb71784aa00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7fb71784e6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7fb717854354 in parseArguments /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #7 0x7fb71785703d in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #8 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #9 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #10 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #11 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #12 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #13 0x7fb717819c88 in callString /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_import.c:478
    #14 0x7fb71794bc52 in CMDcallString /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/language.c:130
    #15 0x7fb71782f627 in runMALsequence /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:656
    #16 0x7fb71782ce74 in runMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:335
    #17 0x7fb71786f80b in MALengine /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:767
    #18 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #19 0x7fb71786a4b9 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:475
    #20 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #21 0x7fb717819c88 in callString /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_import.c:478
    #22 0x7fb71794bc52 in CMDcallString /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/language.c:130
    #23 0x7fb71782f627 in runMALsequence /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:656
    #24 0x7fb71782ce74 in runMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:335
    #25 0x7fb71786f80b in MALengine /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:767
    #26 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #27 0x7fb71786a4b9 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:475
    #28 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #29 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529

Direct leak of 24 byte(s) in 1 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a7f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7fb717053b24 in VALinit /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_value.c:232
    #4 0x7fb716c51218 in VARconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_calc.c:16874
    #5 0x7fb717053e3b in VALconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_value.c:263
    #6 0x7fb7178267bb in convertConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #7 0x7fb71782701e in defConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #8 0x7fb71784ef62 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #9 0x7fb717854354 in parseArguments /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #10 0x7fb71785703d in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #11 0x7fb717859227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #12 0x7fb71786e409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #13 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #14 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #15 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #16 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #17 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #18 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #19 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #20 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #21 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 24 byte(s) in 1 object(s) allocated from:
    #0 0x7fb717f0b667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fb716f5a589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7fb716f5a8d2 in GDKstrdup /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1958
    #3 0x7fb716c50aeb in VARconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_calc.c:16848
    #4 0x7fb717053e3b in VALconvert /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_value.c:263
    #5 0x7fb7178267bb in convertConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #6 0x7fb71782701e in defConstant /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #7 0x7fb717866bb8 in typeChecker /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_resolve.c:609
    #8 0x7fb717867afc in chkTypes /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_resolve.c:661
    #9 0x7fb717867d11 in chkProgram /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_resolve.c:696
    #10 0x7fb71786ea83 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:679
    #11 0x7fb71786a1e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #12 0x7fb71786a342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #13 0x7fb71786a7fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #14 0x7fb71786d9a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #15 0x7fb71786c81c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #16 0x7fb717a00cdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #17 0x7fb716f59616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #18 0x7fb7170502d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #19 0x7fb7160633f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

SUMMARY: AddressSanitizer: 14080 byte(s) leaked in 467 allocation(s).