#2021-09-15 01:29:11: client7: createExceptionInternal: !ERROR: MALException:mdb.getStackFrame:Illegal argument Illegal depth.
#2021-09-15 01:29:17: client21: createExceptionInternal: !ERROR: MALException:bat.partition:Illegal argument Illegal piece index
#2021-09-15 01:29:17: client28: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-15 01:29:17: client28: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-15 01:29:17: client34: createExceptionInternal: !ERROR: MALException:malInclude:could not open file: tokenizer: when opening tokenizer: open failed: No such file or directory

=================================================================
==2609140==ERROR: LeakSanitizer: detected memory leaks

Direct leak of 7296 byte(s) in 191 object(s) allocated from:
    #0 0x7faa01007667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7faa00056589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7faa000567f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7faa009462cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7faa00946a00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7faa0094a6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7faa00950354 in parseArguments /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #7 0x7faa0095303d in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #8 0x7faa00955227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #9 0x7faa0096a409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #10 0x7faa009661e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #11 0x7faa00966342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #12 0x7faa009667fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #13 0x7faa009699a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #14 0x7faa0096881c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #15 0x7faa00afccdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #16 0x7faa00055616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #17 0x7faa0014c2d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #18 0x7fa9ff15f3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 120 byte(s) in 4 object(s) allocated from:
    #0 0x7faa01007667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7faa00056589 in GDKmalloc_internal /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1899
    #2 0x7faa000567f5 in GDKmalloc /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1925
    #3 0x7faa009462cd in strCopy /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7faa00946a00 in cstToken /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7faa0094a6e0 in term /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7faa00953067 in parseAssign /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #7 0x7faa00955227 in parseMAL /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #8 0x7faa0096a409 in MALparser /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #9 0x7faa009661e0 in runPhase /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #10 0x7faa00966342 in runScenarioBody /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #11 0x7faa009667fe in runScenario /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #12 0x7faa009699a6 in MSserveClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #13 0x7faa0096881c in MSscheduleClient /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #14 0x7faa00afccdc in doChallenge /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #15 0x7faa00055616 in THRstarter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_utils.c:1648
    #16 0x7faa0014c2d7 in thread_starter /export/scratch1/home/monet/testing/2c8644650f4c-1-1-2/MonetDB/gdk/gdk_system.c:833
    #17 0x7fa9ff15f3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

SUMMARY: AddressSanitizer: 7416 byte(s) leaked in 195 allocation(s).