#2021-09-14 22:36:04: client2: createExceptionInternal: !ERROR: SQLException:RAstatement2:42000!Parameter 1 has wrong SQL type, expected int, but got bigint instead
#2021-09-14 22:36:04: DFLOWworker1022: createExceptionInternal: !ERROR: SQLException:remote.exec:(mapi:monetdb://monetdb@localhost/worker_0) Parameter 1 has wrong SQL type, expected int, but got bigint instead
#2021-09-14 22:36:04: DFLOWworker1022: createExceptionInternal: !ERROR: RemoteException:assert:M0M29!Exception occurred in the remote server, please check the log there

=================================================================
==2475077==ERROR: LeakSanitizer: detected memory leaks

Direct leak of 248 byte(s) in 5 object(s) allocated from:
    #0 0x7f356f2ea667 in __interceptor_malloc (/lib64/libasan.so.6+0xb0667)
    #1 0x7f356e33a8ef in GDKmalloc_internal /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1889
    #2 0x7f356e33ab5b in GDKmalloc /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1915
    #3 0x7f356ec292cd in strCopy /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:377
    #4 0x7f356ec29a00 in cstToken /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:427
    #5 0x7f356ec2d6e0 in term /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:874
    #6 0x7f356ec36067 in parseAssign /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1721
    #7 0x7f356ec38227 in parseMAL /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_parser.c:1971
    #8 0x7f356ec4d409 in MALparser /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:654
    #9 0x7f356ec491e0 in runPhase /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
    #10 0x7f356ec49342 in runScenarioBody /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:469
    #11 0x7f356ec497fe in runScenario /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:506
    #12 0x7f356ec4c9a6 in MSserveClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:529
    #13 0x7f356ec4b81c in MSscheduleClient /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
    #14 0x7f356eddf9d8 in doChallenge /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:220
    #15 0x7f356e33997c in THRstarter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_utils.c:1638
    #16 0x7f356e430683 in thread_starter /export/scratch1/home/monet/testing/ce904debefe6-1-1-2/MonetDB/gdk/gdk_system.c:833
    #17 0x7f356d47c3f8 in start_thread (/lib64/libpthread.so.0+0x93f8)

SUMMARY: AddressSanitizer: 248 byte(s) leaked in 5 allocation(s).