> MemorySanitizer run-time library shares much common code with AddressSanitizer
and ThreadSanitizer libraries. At startup it makes the lower protected area
inaccessible, and maps Shadow and, optionally, Origin areas. MemorySanitizer is
currently limited to Linux / x86 64, and these memory ranges (as specified in
Figure 1) are always available at startup, provided that the application is
linked as PIE (position-independent executable), and address space layout
randomization (ASLR) is enabled.[1]
[1] https://static.googleusercontent.com/media/research.google.com/zh-CN//pubs/archive/43308.pdf