#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:----
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:^';' expected
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:nil;
#2021-09-14 22:19:03: client3: createExceptionInternal: !ERROR: SyntaxException:parseError:^<identifier> or <literal> expected

=================================================================
==2466945==ERROR: LeakSanitizer: detected memory leaks

Direct leak of 1568 byte(s) in 30 object(s) allocated from:
    #0 0x7fa424203667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fa4232538ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7fa423253b5b in GDKmalloc /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1915
    #3 0x7fa423b422cd in strCopy /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7fa423b42a00 in cstToken /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7fa423b466e0 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7fa423b4c354 in parseArguments /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #7 0x7fa423b4f03d in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #8 0x7fa423b51227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #9 0x7fa423b66409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #10 0x7fa423b621e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #11 0x7fa423b62342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #12 0x7fa423b627fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #13 0x7fa423b659a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #14 0x7fa423b6481c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #15 0x7fa423cf89d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #16 0x7fa42325297c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #17 0x7fa423349683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #18 0x7fa4223953f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 24 byte(s) in 1 object(s) allocated from:
    #0 0x7fa424203667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7fa4232538ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7fa423253c38 in GDKstrdup /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1948
    #3 0x7fa422f4b003 in VARconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_calc.c:16848
    #4 0x7fa42334d1e7 in VALconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_value.c:263
    #5 0x7fa423b1e7bb in convertConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #6 0x7fa423b1f01e in defConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #7 0x7fa423b46f62 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #8 0x7fa423b4c354 in parseArguments /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #9 0x7fa423b4f03d in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #10 0x7fa423b51227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #11 0x7fa423b66409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #12 0x7fa423b621e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #13 0x7fa423b62342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #14 0x7fa423b627fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #15 0x7fa423b659a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #16 0x7fa423b6481c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #17 0x7fa423cf89d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #18 0x7fa42325297c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #19 0x7fa423349683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #20 0x7fa4223953f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

SUMMARY: AddressSanitizer: 1592 byte(s) leaked in 31 allocation(s).