#2021-09-14 22:19:18: client2: INETfromString: !ERROR: Error while parsing, unexpected string '/0'
#2021-09-14 22:19:18: client2: createExceptionInternal: !ERROR: ParseException:inet.new:GDK reported error: INETfromString: Error while parsing, unexpected string '/0'
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: '}' expected at offset 1
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: value expected at offset 0
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: json parse failed
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: json parse failed
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: value expected at offset 0
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: value expected at offset 0
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: element expected at offset 1
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: value expected at offset 0
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: value expected at offset 0
#2021-09-14 22:19:18: client15: createExceptionInternal: !ERROR: MALException:json.parser:JSON syntax error: ',' or '}' expected at offset 14
#2021-09-14 22:19:18: client20: createExceptionInternal: !ERROR: MALException:json.path:'*' or digit expected
#2021-09-14 22:19:18: client20: createExceptionInternal: !ERROR: MALException:json.compile:Root node must be first
#2021-09-14 22:19:18: client20: createExceptionInternal: !ERROR: MALException:json.compile:Step identifier expected
#2021-09-14 22:19:18: client20: createExceptionInternal: !ERROR: MALException:json.path:'*' or digit expected

=================================================================
==2467387==ERROR: LeakSanitizer: detected memory leaks

Direct leak of 10984 byte(s) in 275 object(s) allocated from:
    #0 0x7f76826d8667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f76817288ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f7681728b5b in GDKmalloc /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1915
    #3 0x7f76820172cd in strCopy /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7f7682017a00 in cstToken /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7f768201b6e0 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7f7682021354 in parseArguments /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #7 0x7f768202403d in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #8 0x7f7682026227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #9 0x7f768203b409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #10 0x7f76820371e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #11 0x7f7682037342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #12 0x7f76820377fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #13 0x7f768203a9a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #14 0x7f768203981c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #15 0x7f76821cd9d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #16 0x7f768172797c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #17 0x7f768181e683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #18 0x7f768086a3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 112 byte(s) in 4 object(s) allocated from:
    #0 0x7f76826d8667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f76817288ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f7681728b5b in GDKmalloc /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1915
    #3 0x7f76820172cd in strCopy /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7f7682017a00 in cstToken /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7f768201b6e0 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7f7682024067 in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #7 0x7f7682026227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #8 0x7f768203b409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #9 0x7f76820371e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #10 0x7f7682037342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #11 0x7f76820377fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #12 0x7f768203a9a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #13 0x7f768203981c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #14 0x7f76821cd9d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #15 0x7f768172797c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #16 0x7f768181e683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #17 0x7f768086a3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 48 byte(s) in 2 object(s) allocated from:
    #0 0x7f76826d8667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f76817288ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f7681728c38 in GDKstrdup /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1948
    #3 0x7f7681821d6d in VALinit /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_value.c:220
    #4 0x7f7681420730 in VARconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_calc.c:16874
    #5 0x7f76818221e7 in VALconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_value.c:263
    #6 0x7f7681ff37bb in convertConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #7 0x7f7681ff401e in defConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #8 0x7f768201bf62 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #9 0x7f7682021354 in parseArguments /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #10 0x7f768202403d in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #11 0x7f7682026227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #12 0x7f768203b409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #13 0x7f76820371e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #14 0x7f7682037342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #15 0x7f76820377fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #16 0x7f768203a9a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #17 0x7f768203981c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #18 0x7f76821cd9d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #19 0x7f768172797c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #20 0x7f768181e683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #21 0x7f768086a3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 48 byte(s) in 2 object(s) allocated from:
    #0 0x7f76826d8667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f76817288ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f7681728c38 in GDKstrdup /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1948
    #3 0x7f7681420003 in VARconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_calc.c:16848
    #4 0x7f76818221e7 in VALconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_value.c:263
    #5 0x7f7681ff37bb in convertConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #6 0x7f7681ff401e in defConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #7 0x7f768201bf62 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #8 0x7f7682021354 in parseArguments /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1526
    #9 0x7f768202403d in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1713
    #10 0x7f7682026227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #11 0x7f768203b409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #12 0x7f76820371e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #13 0x7f7682037342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #14 0x7f76820377fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #15 0x7f768203a9a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #16 0x7f768203981c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #17 0x7f76821cd9d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #18 0x7f768172797c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #19 0x7f768181e683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #20 0x7f768086a3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 24 byte(s) in 1 object(s) allocated from:
    #0 0x7f76826d8667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f76817288ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f7681728c38 in GDKstrdup /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1948
    #3 0x7f7681420003 in VARconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_calc.c:16848
    #4 0x7f76818221e7 in VALconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_value.c:263
    #5 0x7f7681ff37bb in convertConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #6 0x7f7681ff401e in defConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #7 0x7f768201bf62 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #8 0x7f7682024067 in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #9 0x7f7682026227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #10 0x7f768203b409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #11 0x7f76820371e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #12 0x7f7682037342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #13 0x7f76820377fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #14 0x7f768203a9a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #15 0x7f768203981c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #16 0x7f76821cd9d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #17 0x7f768172797c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #18 0x7f768181e683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #19 0x7f768086a3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

Direct leak of 24 byte(s) in 1 object(s) allocated from:
    #0 0x7f76826d8667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f76817288ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f7681728c38 in GDKstrdup /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1948
    #3 0x7f7681821d6d in VALinit /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_value.c:220
    #4 0x7f7681420730 in VARconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_calc.c:16874
    #5 0x7f76818221e7 in VALconvert /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_value.c:263
    #6 0x7f7681ff37bb in convertConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1078
    #7 0x7f7681ff401e in defConstant /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_instruction.c:1142
    #8 0x7f768201bf62 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:912
    #9 0x7f7682024067 in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #10 0x7f7682026227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #11 0x7f768203b409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #12 0x7f76820371e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #13 0x7f7682037342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #14 0x7f76820377fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #15 0x7f768203a9a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #16 0x7f768203981c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #17 0x7f76821cd9d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #18 0x7f768172797c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #19 0x7f768181e683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #20 0x7f768086a3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

SUMMARY: AddressSanitizer: 11240 byte(s) leaked in 285 allocation(s).