Did you read this?
https://clang.llvm.org/docs/AddressSanitizer.html#symbolizing-the-reports
You can activate debug information also in an optimised release build to get
the filename and line number.
If you don’t optimise your build then the call stack might look nicer. But it
could be that
Hi there
We have some C++ testing applications that we run with a sanatizer (asan)
enabled build.
Now we decided to run these application in a Docker container. In the
container
asan reports some leaks that are not reported when run natively.
At a first glance the reported issues seem to be