#2021-09-14 20:23:58: client11: createExceptionInternal: !ERROR: SQLException:sql.catalog:42000!CREATE TABLE: 'foo' name conflicts
#2021-09-14 20:23:58: client11: createExceptionInternal: !ERROR: SQLException:sql.execute:25005!Current transaction is aborted (please ROLLBACK)
#2021-09-14 20:23:58: client11: createExceptionInternal: !ERROR: SQLException:sql.execute:25005!Current transaction is aborted (please ROLLBACK)

!Mtimeout: Timeout: mserver5 --debug=0 --set gdk_nr_threads=0 --set mapi_listenaddr=all --set mapi_port=0 --set mapi_usock=/tmp/mtest-2247893/.s.monetdb.${PORT} --forcemito --dbpath=/export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/tests/sql/dbfarm/mTests_sql_test_bincopy --set gdk_vm_maxsize=8589934592

[New LWP 2305095]
[New LWP 2305096]
[New LWP 2305097]
[New LWP 2305141]
[New LWP 2305269]
[New LWP 2305270]
[New LWP 2305271]
[New LWP 2305282]
[New LWP 2305283]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
0x00007fb4f2eff451 in clock_nanosleep@GLIBC_2.2.5 () from /lib64/libc.so.6

Thread 10 (Thread 0x7fb4c198a640 (LWP 2305283)):
#0  0x00007fb4f30140d4 in do_futex_wait.constprop () from /lib64/libpthread.so.0
No symbol table info available.
#1  0x00007fb4f30141d8 in __new_sem_wait_slow.constprop.0 () from /lib64/libpthread.so.0
No symbol table info available.
#2  0x00007fb4f48c88bd in q_dequeue (q=0x60f0000122f0, cntxt=0x62f000000410) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:228
        r = 0x0
        s = 0x0
        __func__ = "q_dequeue"
#3  0x00007fb4f48c9238 in DFLOWworker (T=0x7fb4f4e595c0 <workers>) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:352
        t = 0x7fb4f4e595c0 <workers>
        flow = 0x611000644150
        fe = 0x61500004ce90
        fnxt = 0x0
        tid = 4
        error = 0x0
        i = 0
        last = 0
        claim = 0
        cntxt = 0x62f000000410
        p = 0x60e000e5e930
        __func__ = "DFLOWworker"
#4  0x00007fb4f3d414c4 in THRstarter (a=0x60b000041b80) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_utils.c:1638
        t = 0x60b000041b80
        func = 0x7fb4f48c8f0d <DFLOWworker>
        arg = 0x7fb4f4e595c0 <workers>
        __func__ = "THRstarter"
#5  0x00007fb4f3e36f4f in thread_starter (arg=0x617000065880) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x617000065880
        data = 0x60b000041b80
        __func__ = "thread_starter"
#6  0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#7  0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 9 (Thread 0x7fb4c16c8640 (LWP 2305282)):
#0  0x00007fb4f30140d4 in do_futex_wait.constprop () from /lib64/libpthread.so.0
No symbol table info available.
#1  0x00007fb4f30141d8 in __new_sem_wait_slow.constprop.0 () from /lib64/libpthread.so.0
No symbol table info available.
#2  0x00007fb4f48c88bd in q_dequeue (q=0x60f000044ed0, cntxt=0x0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:228
        r = 0x0
        s = 0x0
        __func__ = "q_dequeue"
#3  0x00007fb4f48cc904 in DFLOWscheduler (flow=0x611000644150, w=0x7fb4f4e595c0 <workers>) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:713
        last = 4
        i = 0
        j = 7
        p = 0x60e000778b70
        tasks = 4
        actions = 5
        ret = 0x0
        fe = 0x61500004ce90
        f = 0x61500004cf90
        __func__ = "DFLOWscheduler"
#4  0x00007fb4f48ce0f1 in runMALdataflow (cntxt=0x62f000000410, mb=0x611000696310, startpc=2, stoppc=8, stk=0x62000008c090) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:910
        flow = 0x611000644150
        msg = 0x0
        size = 31
        ret = 0x62000008cd80 ""
        i = 0
        __func__ = "runMALdataflow"
#5  0x00007fb4f49d9d58 in MALstartDataflow (cntxt=0x62f000000410, mb=0x611000696310, stk=0x62000008c090, pci=0x60e000779890) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/modules/mal/language.c:157
        ret = 0x62000008cd80 ""
        pc = 2
#6  0x00007fb4f48c2013 in runMALsequence (cntxt=0x62f000000410, mb=0x611000696310, startpc=1, stoppc=0, stk=0x62000008c090, env=0x0, pcicaller=0x0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:645
        lhs = 0x7fb4c16c7280
        rhs = 0x7fb4c16c71a0
        v = 0x7fb4c16c72e0
        i = 1
        k = 32692
        pci = 0x60e000779890
        exceptionVar = -1
        ret = 0x0
        localGDKerrbuf = 0x62600015f110 ""
        backups = {{val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 2}, {val = {ival = 64, oval = 64, shval = 64, btval = 64 '@', mval = 64, fval = 8.96831017e-44, pval = 0x40, bval = 64, sval = 0x40 <error: Cannot access memory at address 0x40>, dval = 3.1620201333839779e-322, lval = 64, hval = 2590202661839092056992497841209408, uval = {h = 2590202661839092056992497841209408, u = "@\000\000\000\000\000\000\000\340t0\364\264\177\000"}}, len = 28602880, vtype = -2145628160}, {val = {ival = -1049857088, oval = 140414315951040, shval = 29632, btval = -64 '\300', mval = 192, fval = -14.7782593, pval = 0x7fb4c16c73c0, bval = -1049857088, sval = 0x7fb4c16c73c0 "", dval = 6.9373889695707424e-310, lval = 140414315951040, hval = 150558686179918820861127143215166419904, uval = {h = 150558686179918820861127143215166419904, u = "\300sl\301\264\177\000\000\000P\034\200W\214Dq"}}, len = 140414315950832, vtype = -204195660}, {val = {ival = -1049856832, oval = 140414315951296, shval = 29888, btval = -64 '\300', mval = 192, fval = -14.7785034, pval = 0x7fb4c16c74c0, bval = -1049856832, sval = 0x7fb4c16c74c0 "@ul\301\264\177", dval = 6.9373889695833905e-310, lval = 140414315951296, hval = 1968661509559460749910131967030464, uval = {h = 1968661509559460749910131967030464, u = "\300tl\301\264\177\000\000\020ci\000\020a\000"}}, len = 489626271761, vtype = 6906640}, {val = {ival = -1049857232, oval = 140414315950896, shval = 29488, btval = 48 '0', mval = 48, fval = -14.7781219, pval = 0x7fb4c16c7330, bval = -1049857232, sval = 0x7fb4c16c7330 "", dval = 6.9373889695636279e-310, lval = 140414315950896, hval = 150558686179918820861127143215166419760, uval = {h = 150558686179918820861127143215166419760, u = "0sl\301\264\177\000\000\000P\034\200W\214Dq"}}, len = 140414315950944, vtype = -192188297}, {val = {ival = -1049857088, oval = 76259554240, shval = 29632, btval = -64 '\300', mval = 192, fval = -14.7782593, pval = 0x11c16c73c0, bval = -1049857088, sval = 0x11c16c73c0 "", dval = 3.7677225917151171e-313, lval = 76259554240, hval = 76259554240, uval = {h = 76259554240, u = "\300sl\301\021\000\000\000\000\000\000\000\000\000\000"}}, len = 0, vtype = 6906640}, {val = {ival = 88, oval = 489626271832, shval = 88, btval = 88 'X', mval = 88, fval = 1.23314265e-43, pval = 0x7200000058, bval = 88, sval = 0x7200000058 "", dval = 2.4190752021351882e-312, lval = 489626271832, hval = 2595162925037966898163684999256, uval = {h = 2595162925037966898163684999256, u = "X\000\000\000r\000\000\000@ul\301 \000\000"}}, len = 140414315951200, vtype = -2145628160}, {val = {ival = -1049857136, oval = 140414315950992, shval = 29584, btval = -112 '\220', mval = 144, fval = -14.7782135, pval = 0x7fb4c16c7390, bval = -1049857136, sval = 0x7fb4c16c7390 "", dval = 6.9373889695683709e-310, lval = 140414315950992, hval = 2590202771875101048431104957903760, uval = {h = 2590202771875101048431104957903760, u = "\220sl\301\264\177\000\000\350y\213\364\264\177\000"}}, len = 73016631568, vtype = -1049856928}, {val = {ival = -1049857088, oval = 140414315951040, shval = 29632, btval = -64 '\300', mval = 192, fval = -14.7782593, pval = 0x7fb4c16c73c0, bval = -1049857088, sval = 0x7fb4c16c73c0 "", dval = 6.9373889695707424e-310, lval = 140414315951040, hval = 150558686179918820861127143215166419904, uval = {h = 150558686179918820861127143215166419904, u = "\300sl\301\264\177\000\000\000P\034\200W\214Dq"}}, len = 140414315951104, vtype = -192175925}, {val = {ival = -1049856832, oval = 140414315951296, shval = 29888, btval = -64 '\300', mval = 192, fval = -14.7785034, pval = 0x7fb4c16c74c0, bval = -1049856832, sval = 0x7fb4c16c74c0 "@ul\301\264\177", dval = 6.9373889695833905e-310, lval = 140414315951296, hval = 2590186950636779162170722853090496, uval = {h = 2590186950636779162170722853090496, u = "\300tl\301\264\177\000\000`tl\301\264\177\000"}}, len = 76259554368, vtype = 6906640}, {val = {ival = -1049857024, oval = 140414315951104, shval = 29696, btval = 0 '\000', mval = false, fval = -14.7783203, pval = 0x7fb4c16c7400, bval = -1049857024, sval = 0x7fb4c16c7400 "\340tl\301\264\177", dval = 6.9373889695739044e-310, lval = 140414315951104, hval = 9071658835595534634063607133184, uval = {h = 9071658835595534634063607133184, u = "\000tl\301\264\177\000\000\000P\034\200r\000\000"}}, len = 106515196782224, vtype = 6906640}, {val = {ival = -1049856832, oval = 140414315951296, shval = 29888, btval = -64 '\300', mval = 192, fval = -14.7785034, pval = 0x7fb4c16c74c0, bval = -1049856832, sval = 0x7fb4c16c74c0 "@ul\301\264\177", dval = 6.9373889695833905e-310, lval = 140414315951296, hval = 356560959026457498773772596416, uval = {h = 356560959026457498773772596416, u = "\300tl\301\264\177\000\000\000P\034\200\004\000\000"}}, len = 140414315951168, vtype = -2145628160}, {val = {ival = -1049856800, oval = 140414315951328, shval = 29920, btval = -32 '\340', mval = 224, fval = -14.7785339, pval = 0x7fb4c16c74e0, bval = -1049856800, sval = 0x7fb4c16c74e0 "\360vl\301\264\177", dval = 6.9373889695849715e-310, lval = 140414315951328, hval = 2590202768777449996597502212338912, uval = {h = 2590202768777449996597502212338912, u = "\340tl\301\264\177\000\000\364\351\210\364\264\177\000"}}, len = 140414315951456, vtype = 6906640}, {val = {ival = -1049856976, oval = 140414315951152, shval = 29744, btval = 48 '0', mval = 48, fval = -14.7783661, pval = 0x7fb4c16c7430, bval = -1049856976, sval = 0x7fb4c16c7430 "\220\246w", dval = 6.9373889695762759e-310, lval = 140414315951152, hval = 9071658835595534634063607133232, uval = {h = 9071658835595534634063607133232, u = "0tl\301\264\177\000\000\000P\034\200r\000\000"}}, len = 106515196782224, vtype = -1049856832}, {val = {ival = 1102416563, oval = 1102416563, shval = -30029, btval = -77 '\263', mval = 179, fval = 22.6927242, pval = 0x41b58ab3, bval = 1102416563, sval = 0x41b58ab3 <error: Cannot access memory at address 0x41b58ab3>, dval = 5.4466615118468226e-315, lval = 1102416563, hval = 2590202838132706708051017944369843, uval = {h = 2590202838132706708051017944369843, u = "\263\212\265A\000\000\000\000\200H\302\364\264\177\000"}}, len = 140415173453301, vtype = 863}, {val = {ival = 0, oval = 9223372036854775808, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x8000000000000000, bval = 0, sval = 0x8000000000000000 <error: Cannot access memory at address 0x8000000000000000>, dval = -0, lval = -9223372036854775808, hval = 2590202650719108804827237629034496, uval = {h = 2590202650719108804827237629034496, u = "\000\000\000\000\000\000\000\200 B'\364\264\177\000"}}, len = 0, vtype = 0}}
        backup = 0x7fb4c16c7280
        garbages = {-1, -1, -1, -1, 0 <repeats 12 times>}
        garbage = 0x7fb4c16c7220
        stkpc = 2
        runtimeProfile = {ticks = 1631643716589538}
        runtimeProfileFunction = {ticks = 1631643716589529}
        lastcheck = 1631643716589530
        startedProfileQueue = 1
        __func__ = "runMALsequence"
#7  0x00007fb4f48bf963 in runMAL (cntxt=0x62f000000410, mb=0x611000696310, mbcaller=0x0, env=0x0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:334
        stk = 0x62000008c090
        i = 0
        lhs = 0x7fb4c16c7a20
        rhs = 0xff6982d8f44
        ret = 0x7fb4c16c7a20 "\263\212\265A"
#8  0x00007fb4edb15aed in SQLrun (c=0x62f000000410, m=0x631001298810) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/backends/monet5/sql_execute.c:249
        msg = 0x0
        mb = 0x611000696310
        __func__ = "SQLrun"
#9  0x00007fb4edb18a97 in SQLengineIntern (c=0x62f000000410, be=0x60d0003cc3a0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/backends/monet5/sql_execute.c:688
        msg = 0x0
        oldlang = 83 'S'
        m = 0x631001298810
#10 0x00007fb4edb13655 in SQLengine (c=0x62f000000410) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/backends/monet5/sql_scenario.c:1304
        be = 0x60d0003cc3a0
#11 0x00007fb4f48fba26 in runPhase (c=0x62f000000410, phase=4) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:449
        msg = 0x0
#12 0x00007fb4f48fbcff in runScenarioBody (c=0x62f000000410, once=0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:475
        msg = 0x0
#13 0x00007fb4f48fc090 in runScenario (c=0x62f000000410, once=0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_scenario.c:507
        msg = 0x0
#14 0x00007fb4f48fec38 in MSserveClient (c=0x62f000000410) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:501
        mb = 0x611000696310
        msg = 0x0
#15 0x00007fb4f48fe0ab in MSscheduleClient (command=0x62500007d110 "LIT", challenge=0x7fb4c16c7b40 "LDmCErS8", fin=0x60600038fde0, fout=0x61a0000b5280, protocol=PROTOCOL_9, blocksize=8190) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_session.c:388
        user = 0x62500007d114 "monetdb"
        algo = 0x62500007d11d "RIPEMD160"
        passwd = 0x62500007d127 "cc38e395248601accd93bd4c9ba2b7cdacbf2591"
        lang = 0x62500007d150 "sql"
        handshake_opts = 0x62500007d176 "auto_commit=1,reply_size=-1,size_header=0,columnar_protocol=0,time_zone=7200"
        database = 0x62500007d154 "mTests_sql_test_bincopy"
        s = 0x0
        dbname = 0x626000005210 "mTests_sql_test_bincopy"
        msg = 0x0
        filetrans = true
        c = 0x62f000000410
#16 0x00007fb4f4a87443 in doChallenge (data=0x60400001a720) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:212
        buf = 0x62500007d110 "LIT"
        challenge = "LDmCErS8\000\000\000\000"
        fdin = 0x61a0000b5880
        fdout = 0x61a0000b5280
        bs = 0x60600038fde0
        len = 180
        protocol = PROTOCOL_9
        buflen = 8190
        __func__ = "doChallenge"
#17 0x00007fb4f3d414c4 in THRstarter (a=0x60b00003b670) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_utils.c:1638
        t = 0x60b00003b670
        func = 0x7fb4f4a86e5b <doChallenge>
        arg = 0x60400001a720
        __func__ = "THRstarter"
#18 0x00007fb4f3e36f4f in thread_starter (arg=0x617000087a80) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x617000087a80
        data = 0x60b00003b670
        __func__ = "thread_starter"
#19 0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#20 0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 8 (Thread 0x7fb4c14b1640 (LWP 2305271)):
#0  0x00007fb4f30140d4 in do_futex_wait.constprop () from /lib64/libpthread.so.0
No symbol table info available.
#1  0x00007fb4f30141d8 in __new_sem_wait_slow.constprop.0 () from /lib64/libpthread.so.0
No symbol table info available.
#2  0x00007fb4f48c88bd in q_dequeue (q=0x60f0000122f0, cntxt=0x62f000000410) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:228
        r = 0x0
        s = 0x0
        __func__ = "q_dequeue"
#3  0x00007fb4f48c9238 in DFLOWworker (T=0x7fb4f4e59648 <workers+136>) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:352
        t = 0x7fb4f4e59648 <workers+136>
        flow = 0x611000697490
        fe = 0x62300030fcd0
        fnxt = 0x0
        tid = 6
        error = 0x0
        i = 0
        last = 95
        claim = 2250000
        cntxt = 0x62f000000410
        p = 0x60e0006b8990
        __func__ = "DFLOWworker"
#4  0x00007fb4f3d414c4 in THRstarter (a=0x60b000041ad0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_utils.c:1638
        t = 0x60b000041ad0
        func = 0x7fb4f48c8f0d <DFLOWworker>
        arg = 0x7fb4f4e59648 <workers+136>
        __func__ = "THRstarter"
#5  0x00007fb4f3e36f4f in thread_starter (arg=0x617000066a00) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x617000066a00
        data = 0x60b000041ad0
        __func__ = "thread_starter"
#6  0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#7  0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 7 (Thread 0x7fb4b9db8640 (LWP 2305270)):
#0  0x00007fb4f4f681c8 in __sanitizer::mem_is_zero(char const*, unsigned long) () from /lib64/libasan.so.6
No symbol table info available.
#1  0x00007fb4f4f5437a in __asan_region_is_poisoned () from /lib64/libasan.so.6
No symbol table info available.
#2  0x00007fb4f4ed96ec in memcpy () from /lib64/libasan.so.6
No symbol table info available.
#3  0x00007fb4f3d427a9 in GDKstrdup (s=0x7fb4ac5a6008 "int000000", 'a' <repeats 191 times>...) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_utils.c:1950
        size = 280010
        p = 0x7fb4b585a810 '\276' <repeats 200 times>...
#4  0x00007fb4f3e3a654 in VALinit (d=0x60700003d910, tpe=17, s=0x7fb4ac5a6008) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_value.c:220
No locals.
#5  0x00007fb4f3c98101 in BATsetprop_nolock (b=0x614000357050, idx=GDK_MIN_VALUE, type=17, v=0x7fb4ac5a6008) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_batop.c:2834
        p = 0x60700003d900
#6  0x00007fb4f3e15f07 in BUNappendmulti (b=0x614000357050, values=0x7fb4b9db70b0, count=1, force=false) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_bat.c:1255
        atomcmp = 0x7fb4f3d438b4 <strCmp>
        minpos = 0
        maxpos = 450601
        minvalp = 0x7fb4ac5a6008
        maxvalp = 0x7fb4bee1019a
        atomnil = 0x7fb4f4276900 <str_nil>
        prop = 0x60700003da60
        bi = {b = 0x614000357050, h = 0x60d0005404d0, base = 0x7fb4af9bf000, vh = 0x60d00064f450, count = 450601, width = 4, shift = 2 '\002', type = 17 '\021', tseq = 9223372036854775808, hfree = 1802404, vhfree = 17394210, {tvid = 0, tmsk = false}}
        p = 450602
        __func__ = "BUNappendmulti"
        t = 0x7fb4bee1019a
#7  0x00007fb4f3e163d9 in BUNappend (b=0x614000357050, t=0x0, force=false) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_bat.c:1290
No locals.
#8  0x00007fb4edc6ad01 in append_text (bat=0x614000357050, start=0x7fb4bee1019a "int450601") at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/backends/monet5/sql_bincopyfrom.c:385
        msg = 0x0
#9  0x00007fb4edc6aec6 in load_zero_terminated_text (bat=0x614000357050, s=0x61a0000b5880, eof_reached=0x7fb4b9db72f0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/backends/monet5/sql_bincopyfrom.c:422
        buf_end = 0x7fb4bee6d800 ""
        end = 0x7fb4bee101a3 ""
        nread = 991360
        buf_start = 0x7fb4bed6d800 "int440000", 'a' <repeats 191 times>...
        start = 0x7fb4bee1019a "int450601"
        msg = 0x0
        bs = 0x606000326360
#10 0x00007fb4edc6b209 in load_column (rec=0x7fb4ee115180 <type_recs+384>, name=0x60d000658900 "/export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/tests/sql/mTests/sql/test/bincopy/bincopy_large_strings.bin", bat=0x614000357050, s=0x61a0000b5880, byteswap=false, rows_estimate=1000000, eof_reached=0x7fb4b9db72f0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/backends/monet5/sql_bincopyfrom.c:523
        msg = 0x0
        orig_count = 0
        new_count = 8161802732141563904
        rows_added = 140414189007680
#11 0x00007fb4edc6bfae in importColumn (be=0x60d0003cc3a0, ret=0x62000008c340, retcnt=0x62000008cc20, method=0x60300b81c7e0 "str", byteswap=false, path=0x60d000658900 "/export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/tests/sql/mTests/sql/test/bincopy/bincopy_large_strings.bin", onclient=1, nrows=1000000) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/backends/monet5/sql_bincopyfrom.c:660
        msg = 0x0
        gdk_type = 17
        bat = 0x614000357050
        stream_to_close = 0x0
        do_finish_mapi = true
        eof_reached = -1
        s = 0x61a0000b5880
        rec = 0x7fb4ee115180 <type_recs+384>
#12 0x00007fb4edc6c760 in mvc_bin_import_column_wrap (cntxt=0x62f000000410, mb=0x611000696310, stk=0x62000008c090, pci=0x60e000778d30) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/backends/monet5/sql_bincopyfrom.c:717
        ret = 0x62000008c340
        retcnt = 0x62000008cc20
        method = 0x60300b81c7e0 "str"
        byteswap = 0 '\000'
        path = 0x60d000658900 "/export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/tests/sql/mTests/sql/test/bincopy/bincopy_large_strings.bin"
        onclient = 1
        nrows = 1000000
        be = 0x60d0003cc3a0
#13 0x00007fb4f48c2013 in runMALsequence (cntxt=0x62f000000410, mb=0x611000696310, startpc=5, stoppc=6, stk=0x62000008c090, env=0x0, pcicaller=0x0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_interpreter.c:645
        lhs = 0x7fb4b9db7600
        rhs = 0x0
        v = 0x0
        i = 7
        k = 0
        pci = 0x60e000778d30
        exceptionVar = -1
        ret = 0x0
        localGDKerrbuf = 0x626000141110 ""
        backups = {{val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 5}, {val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 7}, {val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 5}, {val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 0}, {val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 0}, {val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 0}, {val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 0}, {val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 2590203079158252156765566157193216, uval = {h = 2590203079158252156765566157193216, u = "\000\000\000\000\000\000\000\000\245\247\211\365\264\177\000"}}, len = 586533585, vtype = 1}, {val = {ival = -217952580, oval = 140415147855548, shval = 20156, btval = -68 '\274', mval = 188, fval = -1.03240282e+31, pval = 0x7fb4f3024ebc, bval = -217952580, sval = 0x7fb4f3024ebc "\320\312\365\"\a\323q\f\241U\rz;c*\r\226\356Ϧ\234\260\027\326OЩ\371Ĵ4 '\277\060[\245+\246+\375\362\023\267\204z\264;\023\246\271j\316\\L\006\277\027WQ\341W\217\353\370\352U\005\203\243\330\372\016\312\325\025\263w\364\241\265\261y\n\030\232\066eC\212\315\320Դ4 \223\370\025\321\334g\313&\330b?x}\177ĴN\232\023\323_]\237\361\367\214\372\030\223\023\242ˎ.\241 \021\275o\364\343\357$ܭ\004~\b\362\347̀5\336K\001\375\257\021\300.\345M\001S\277\200\352\334$\320vM\371\236ٲ\212\367J\247m\240\210\325#˩=\352T)j\vq\275)\003o8G\345ƿ"..., dval = 6.9374300711145447e-310, lval = 140415147855548, hval = 2590202741647528339487686129766076, uval = {h = 2590202741647528339487686129766076, u = "\274N\002\363\264\177\000\000\370xr\364\264\177\000"}}, len = 5, vtype = -175526796}, {val = {ival = 354, oval = 354, shval = 354, btval = 98 'b', mval = 98, fval = 4.96059656e-43, pval = 0x162, bval = 354, sval = 0x162 <error: Cannot access memory at address 0x162>, dval = 1.7489923862780128e-321, lval = 354, hval = 2590202296962937000875335905968482, uval = {h = 2590202296962937000875335905968482, u = "b\001\000\000\000\000\000\000X\243\002\363\264\177\000"}}, len = 140415168385024, vtype = -1176799320}, {val = {ival = -1176799324, oval = 140414189008804, shval = 30628, btval = -92 '\244', mval = 164, fval = -0.000418600743, pval = 0x7fb4b9db77a4, bval = -1176799324, sval = 0x7fb4b9db77a4 "", dval = 6.937382697790961e-310, lval = 140414189008804, hval = 140414189008804, uval = {h = 140414189008804, u = "\244w۹\264\177\000\000\000\000\000\000\000\000\000"}}, len = 0, vtype = 0}, {val = {ival = -217930920, oval = 140415147877208, shval = -23720, btval = 88 'X', mval = 88, fval = -1.03502136e+31, pval = 0x7fb4f302a358, bval = -217930920, sval = 0x7fb4f302a358 "", dval = 6.9374300721846909e-310, lval = 140415147877208, hval = 2590202296598134190214070961087320, uval = {h = 2590202296598134190214070961087320, u = "X\243\002\363\264\177\000\000\030V\002\363\264\177\000"}}, len = 140415172023024, vtype = 586533585}, {val = {ival = 9164587, oval = 9164587, shval = -10453, btval = 43 '+', mval = 43, fval = 1.28423217e-38, pval = 0x8bd72b, bval = 9164587, sval = 0x8bd72b <error: Cannot access memory at address 0x8bd72b>, dval = 4.5279075950232921e-317, lval = 9164587, hval = 2590184608962888046539218325591851, uval = {h = 2590184608962888046539218325591851, u = "+\327\213\000\000\000\000\000\244w۹\264\177\000"}}, len = 107545981104768, vtype = -1176799120}, {val = {ival = -193824520, oval = 140415171983608, shval = 30968, btval = -8 '\370', mval = 248, fval = -7.68426134e+31, pval = 0x7fb4f47278f8, bval = -193824520, sval = 0x7fb4f47278f8 "8\036", dval = 6.9374312631990994e-310, lval = 140415171983608, hval = 2590184608966356034565490884114680, uval = {h = 2590184608966356034565490884114680, u = "\370xr\364\264\177\000\000`x۹\264\177\000"}}, len = 121, vtype = 0}, {val = {ival = 0, oval = 0, shval = 0, btval = 0 '\000', mval = false, fval = 0, pval = 0x0, bval = 0, sval = 0x0, dval = 0, lval = 0, hval = 0, uval = {h = 0, u = '\000' <repeats 15 times>}}, len = 0, vtype = 586533585}, {val = {ival = -175575192, oval = 140415190232936, shval = -4248, btval = 104 'h', mval = 104, fval = -3.47171928e+32, pval = 0x7fb4f588ef68, bval = -175575192, sval = 0x7fb4f588ef68 "`ԋ\365\264\177", dval = 6.9374321648357019e-310, lval = 140415190232936, hval = 2590202742374625203897021858639720, uval = {h = 2590202742374625203897021858639720, u = "h\357\210\365\264\177\000\000\360\022s\364\264\177\000"}}, len = 140414189009160, vtype = -1176799136}}
        backup = 0x7fb4b9db75e0
        garbages = {-1, -1, -1, -1, -1, -1, -1, 0, 0, 0, 0, 0, 0, 0, 0, 0}
        garbage = 0x7fb4b9db7580
        stkpc = 5
        runtimeProfile = {ticks = 1631643716608349}
        runtimeProfileFunction = {ticks = 0}
        lastcheck = 1631643716608349
        startedProfileQueue = 0
        __func__ = "runMALsequence"
#14 0x00007fb4f48c98a0 in DFLOWworker (T=0x7fb4f4e59758 <workers+408>) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:398
        t = 0x7fb4f4e59758 <workers+408>
        flow = 0x611000644150
        fe = 0x61500004cf10
        fnxt = 0x0
        tid = 8
        error = 0x0
        i = 2
        last = 1
        claim = 4000000
        cntxt = 0x0
        p = 0x60e000778d30
        __func__ = "DFLOWworker"
#15 0x00007fb4f3d414c4 in THRstarter (a=0x60b0000416b0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_utils.c:1638
        t = 0x60b0000416b0
        func = 0x7fb4f48c8f0d <DFLOWworker>
        arg = 0x7fb4f4e59758 <workers+408>
        __func__ = "THRstarter"
#16 0x00007fb4f3e36f4f in thread_starter (arg=0x617000068600) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x617000068600
        data = 0x60b0000416b0
        __func__ = "thread_starter"
#17 0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#18 0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 6 (Thread 0x7fb4c129a640 (LWP 2305269)):
#0  0x00007fb4f30140d4 in do_futex_wait.constprop () from /lib64/libpthread.so.0
No symbol table info available.
#1  0x00007fb4f30141d8 in __new_sem_wait_slow.constprop.0 () from /lib64/libpthread.so.0
No symbol table info available.
#2  0x00007fb4f48c88bd in q_dequeue (q=0x60f0000122f0, cntxt=0x0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:228
        r = 0x0
        s = 0x0
        __func__ = "q_dequeue"
#3  0x00007fb4f48c9238 in DFLOWworker (T=0x7fb4f4e596d0 <workers+272>) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_dataflow.c:352
        t = 0x7fb4f4e596d0 <workers+272>
        flow = 0x611000644150
        fe = 0x61500004cf90
        fnxt = 0x0
        tid = 7
        error = 0x0
        i = 0
        last = 4
        claim = 0
        cntxt = 0x0
        p = 0x60c0001faed0
        __func__ = "DFLOWworker"
#4  0x00007fb4f3d414c4 in THRstarter (a=0x60b000041600) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_utils.c:1638
        t = 0x60b000041600
        func = 0x7fb4f48c8f0d <DFLOWworker>
        arg = 0x7fb4f4e596d0 <workers+272>
        __func__ = "THRstarter"
#5  0x00007fb4f3e36f4f in thread_starter (arg=0x617000068d00) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x617000068d00
        data = 0x60b000041600
        __func__ = "thread_starter"
#6  0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#7  0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 5 (Thread 0x7fb4c1083640 (LWP 2305141)):
#0  0x00007fb4f2eff451 in clock_nanosleep@GLIBC_2.2.5 () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007fb4f2f04997 in nanosleep () from /lib64/libc.so.6
No symbol table info available.
#2  0x00007fb4f3e3d5cd in MT_sleep_ms (ms=100) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_posix.c:922
No locals.
#3  0x00007fb4edcde3d2 in store_manager (store=0x62e000000410) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/storage/store.c:2314
        res = 1900317783
        sleeptime = 100
        __func__ = "store_manager"
#4  0x00007fb4eddb17c3 in mvc_logmanager (store=0x62e000000410) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/sql/server/sql_mvc.c:421
No locals.
#5  0x00007fb4f3d414c4 in THRstarter (a=0x60b00001fb00) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_utils.c:1638
        t = 0x60b00001fb00
        func = 0x7fb4eddb179c <mvc_logmanager>
        arg = 0x62e000000410
        __func__ = "THRstarter"
#6  0x00007fb4f3e36f4f in thread_starter (arg=0x61700008d580) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x61700008d580
        data = 0x60b00001fb00
        __func__ = "thread_starter"
#7  0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#8  0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 4 (Thread 0x7fb4c1c0b640 (LWP 2305097)):
#0  0x00007fb4f2f2d3ff in poll () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007fb4f4efe312 in poll () from /lib64/libasan.so.6
No symbol table info available.
#2  0x00007fb4f4a879a0 in SERVERlistenThread (Sock=0x60300001e320) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/modules/mal/mal_mapi.c:247
        msgsock = -1
        npfd = 2
        isusock = false
        pfd = {{fd = 5, events = 1, revents = 0}, {fd = 6, events = 1, revents = 0}, {fd = 0, events = 0, revents = 0}}
        name = "client10\000\303\366\364\264\177\000\000\000\300\240\301\"\000\000\000\000P\034\200W\214Dq"
        msg = 0x0
        retval = 0
        socks = {5, -1, 6}
        data = 0x60400001a720
        tid = 82
        s = 0x61a0000b5280
        i = 3
        __func__ = "SERVERlistenThread"
#3  0x00007fb4f3e36f4f in thread_starter (arg=0x617000002e00) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x617000002e00
        data = 0x60300001e320
        __func__ = "thread_starter"
#4  0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#5  0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 3 (Thread 0x7fb4ee3bb640 (LWP 2305096)):
#0  0x00007fb4f2eff451 in clock_nanosleep@GLIBC_2.2.5 () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007fb4f2f04997 in nanosleep () from /lib64/libc.so.6
No symbol table info available.
#2  0x00007fb4f3e3d5cd in MT_sleep_ms (ms=10) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_posix.c:922
No locals.
#3  0x00007fb4f48f284d in profilerHeartbeat (dummy=0x0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/monetdb5/mal/mal_profiler.c:973
        t = -298079088
        timeout = 10
#4  0x00007fb4f3e36f4f in thread_starter (arg=0x617000000400) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x617000000400
        data = 0x0
        __func__ = "thread_starter"
#5  0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#6  0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 2 (Thread 0x7fb4ee5bc640 (LWP 2305095)):
#0  0x00007fb4f2eff451 in clock_nanosleep@GLIBC_2.2.5 () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007fb4f2f04997 in nanosleep () from /lib64/libc.so.6
No symbol table info available.
#2  0x00007fb4f3e3d5cd in MT_sleep_ms (ms=100) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_posix.c:922
No locals.
#3  0x00007fb4f3d15b5f in BBPmanager (dummy=0x0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_bbp.c:1137
        i = 71
        n = 100
        n = 0
        cur = 80730200
        __func__ = "BBPmanager"
#4  0x00007fb4f3d414c4 in THRstarter (a=0x60b0000003c0) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_utils.c:1638
        t = 0x60b0000003c0
        func = 0x7fb4f3d1577a <BBPmanager>
        arg = 0x0
        __func__ = "THRstarter"
#5  0x00007fb4f3e36f4f in thread_starter (arg=0x617000000080) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_system.c:789
        p = 0x617000000080
        data = 0x60b0000003c0
        __func__ = "thread_starter"
#6  0x00007fb4f300b3f9 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#7  0x00007fb4f2f384c3 in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 1 (Thread 0x7fb4f217ad80 (LWP 2305094)):
#0  0x00007fb4f2eff451 in clock_nanosleep@GLIBC_2.2.5 () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007fb4f2f04997 in nanosleep () from /lib64/libc.so.6
No symbol table info available.
#2  0x00007fb4f3e3d5cd in MT_sleep_ms (ms=100) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/gdk/gdk_posix.c:922
No locals.
#3  0x00000000004078d4 in main (argc=14, av=0x7fff2c3feed8) at /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/MonetDB/tools/mserver/mserver5.c:834
        prog = 0x7fff2c3fff4e "mserver5"
        set = 0x612000000040
        grpdebug = 553648128
        debug = 0
        setlen = 11
        err = 0x0
        prmodpath = "/export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/install/lib64/monetdb5\000\000\000S\345td\004\000\000\000\250\002\000\000\000\000\000\000\250\002\000\000\000\000\000\000\250\002\000\000\000\000\000\000\060\000\000\000\000\000\000\000\060\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000P\345td\004\000\000\000\240\367\b\000\000\000\000\000\240\367\b\000\000\000\000\000\320\335?,\377\177\000\000\003\000\000\000\000\000\000\000\311l\355\364\264\177\000\000Y\030\302\364\264\177\000\000\216\b\212\365\264\177", '\000' <repeats 42 times>...
        modpath = 0x7fff2c3fdd20 "/export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/install/lib64/monetdb5"
        binpath = 0x416740 <_bin_path> "/export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/install"
        dbpath = 0x60b0000001b0 "/export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/tests/sql/dbfarm/mTests_sql_test_bincopy"
        dbextra = 0x0
        dbtrace = 0x0
        inmemory = false
        readpwdxit = false
        long_options = {{name = 0x40cc00 "config", has_arg = 1, flag = 0x0, val = 99}, {name = 0x40c600 "dbextra", has_arg = 1, flag = 0x0, val = 0}, {name = 0x40c520 "dbpath", has_arg = 1, flag = 0x0, val = 0}, {name = 0x40c6a0 "dbtrace", has_arg = 1, flag = 0x0, val = 0}, {name = 0x40d8a0 "debug", has_arg = 2, flag = 0x0, val = 100}, {name = 0x40d8e0 "help", has_arg = 0, flag = 0x0, val = 63}, {name = 0x40c4e0 "in-memory", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40d920 "readonly", has_arg = 0, flag = 0x0, val = 114}, {name = 0x40d960 "set", has_arg = 1, flag = 0x0, val = 115}, {name = 0x40c780 "single-user", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40c840 "version", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40c880 "algorithms", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40c8c0 "forcemito", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40c900 "heaps", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40c940 "io", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40c980 "memory", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40c9c0 "modules", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40ca00 "performance", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40ca40 "properties", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40ca80 "threads", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40cac0 "transactions", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40cb00 "read-password-initialize-and-exit", has_arg = 0, flag = 0x0, val = 0}, {name = 0x40cb60 "loadmodule", has_arg = 1, flag = 0x0, val = 0}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        modules = {0x40c140 "sql", 0x40c180 "generator", 0x40c1c0 "opt_sql_append", 0x40c200 "geom", 0x40c240 "rapi", 0x40c280 "capi", 0x40c2c0 "udf", 0x40c300 "fits", 0x40c340 "netcdf", 0x40c380 "shp", 0x0, 0x3000 <error: Cannot access memory at address 0x3000>, 0x2070 <error: Cannot access memory at address 0x2070>, 0x2070 <error: Cannot access memory at address 0x2070>, 0x0, 0x1 <error: Cannot access memory at address 0x1>, 0x3000 <error: Cannot access memory at address 0x3000>, 0x6e000 <error: Cannot access memory at address 0x6e000>, 0x6dc21 <error: Cannot access memory at address 0x6dc21>, 0x6dc21 <error: Cannot access memory at address 0x6dc21>, 0x3000 <error: Cannot access memory at address 0x3000>, 0x5 <error: Cannot access memory at address 0x5>, 0x6e000 <error: Cannot access memory at address 0x6e000>, 0x97000 <error: Cannot access memory at address 0x97000>, 0x966ec <error: Cannot access memory at address 0x966ec>, 0x966ec <error: Cannot access memory at address 0x966ec>, 0x6e000 <error: Cannot access memory at address 0x6e000>, 0x1 <error: Cannot access memory at address 0x1>, 0x97000 <error: Cannot access memory at address 0x97000>, 0x99000 <error: Cannot access memory at address 0x99000>, 0x98160 <error: Cannot access memory at address 0x98160>, 0x98248 <error: Cannot access memory at address 0x98248>, 0x96000 <error: Cannot access memory at address 0x96000>}
        mods = 11
[Inferior 1 (process 2305094) detached]

#2021-09-14 20:24:00: DFLOWworker2: createExceptionInternal: !ERROR: SQLException:BATattach_stream:42000!malformed utf-8 byte sequence
#2021-09-14 20:24:18: DFLOWworker0: createExceptionInternal: !ERROR: MALException:sql.importColumn:42000!inconsistent row count in /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/tests/sql/mTests/sql/test/bincopy/bincopy_bools.bin: expected 1000000, got 250000
#2021-09-14 20:24:18: client11: createExceptionInternal: !ERROR: SQLException:sql.execute:25005!Current transaction is aborted (please ROLLBACK)
#2021-09-14 20:24:19: DFLOWworker2: createExceptionInternal: !ERROR: MALException:sql.importColumn:42000!inconsistent row count in /export/scratch1/home/monet/testing/1bf5d1ec834c-1-1-2/tests/sql/mTests/sql/test/bincopy/bincopy_bools.bin: expected 1000000, got 250000
#2021-09-14 20:24:19: client12: createExceptionInternal: !ERROR: SQLException:sql.execute:25005!Current transaction is aborted (please ROLLBACK)