This can be used to help profiling tools (e.g. vmmap) identify the sources of mappings more specifically.