Hi Konstantin Thank you for your help! It works as expected now.
Lukas 2018-08-09 16:57 GMT+02:00 Konstantin Serebryany < [email protected]>: > Hi Lukas, > > Please try running docker with "--cap-add SYS_PTRACE". > LeakSanitizer uses ptrace and by default ptrace is disabled in docker. > If this doesn't help, please provide more details. > > --kcc > > On Thu, Aug 9, 2018 at 12:44 AM Lukas Woodtli <[email protected]> > wrote: > >> Hi there >> >> We have some C++ testing applications that we run with a sanatizer (asan) >> enabled build. >> Now we decided to run these application in a Docker container. In the >> container >> asan reports some leaks that are not reported when run natively. >> At a first glance the reported issues seem to be false positives mainly >> occuring >> in static (or thread local) data. >> >> The OS is RHEL7 (also inside of Docker) >> >> Any hints why the allocator behaves differently in these environments. >> >> Regards, >> Lukas >> >> -- >> You received this message because you are subscribed to the Google Groups >> "address-sanitizer" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to [email protected]. >> For more options, visit https://groups.google.com/d/optout. >> > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
