Analyzing disk accesses via Docker and real operating system

I am working with a docker image and try to run some programs for some analyses. Assume, I have an Ubuntu image and I am able to run the programs in side the image.

Thing is, I want to extract disk accesses (the block addresses) for analyses. My question is, are the traces from docker image the same as the traces of a real linux operating system?

Let me state in another way. Assume, on a local Ubuntu-14.04 (real hardware), I ran a bzip2 command and trace the disk accesses with blktrace. In another try, I run the same bzip2 command on a docker image which is another Ubuntu-14.04. Do I get equal traces?