There is a WinDBG command !ca that shows file mapping related information. I will show how to get this file mapping information for a file object (
type) by a direct access to structures.
Below all these structures for a real file object are printed from WinDBG.
0: kd> ??FileObject
struct _FILE_OBJECT * 0x8750ef80
+0x000 Type : 0n5
+0x002 Size : 0n128
+0x004 DeviceObject : 0x879c9030 _DEVICE_OBJECT
+0x008 Vpb : 0x879d5888 _VPB
+0x00c FsContext : 0x87bdde68 Void
+0x010 FsContext2 : 0x863cc188 Void
+0x014 SectionObjectPointer : 0x87bddea8 _SECTION_OBJECT_POINTERS
+0x018 PrivateCacheMap : 0x869acf90 Void
+0x01c FinalStatus : 0n0
+0x020 RelatedFileObject : (null)
+0x024 LockOperation : 0 ''
+0x025 DeletePending : 0 ''
+0x026 ReadAccess : 0 ''
+0x027 WriteAccess : 0 ''
+0x028 DeleteAccess : 0 ''
+0x029 SharedRead : 0 ''
+0x02a SharedWrite : 0 ''
+0x02b SharedDelete : 0 ''
+0x02c Flags : 0xc0012
+0x030 FileName : _UNICODE_STRING "\Sample Pictures\Chrysanthemum.jpg"
+0x038 CurrentByteOffset : _LARGE_INTEGER 0x11000
+0x040 Waiters : 0
+0x044 Busy : 1
+0x048 LastLock : (null)
+0x04c Lock : _KEVENT
+0x05c Event : _KEVENT
+0x06c CompletionContext : (null)
+0x070 IrpListLock : 0
+0x074 IrpList : _LIST_ENTRY [ 0x8750eff4 - 0x8750eff4 ]
+0x07c FileObjectExtension : 0x8774e950 Void
0: kd> ??FileObject->SectionObjectPointer
struct _SECTION_OBJECT_POINTERS * 0x87bddea8
+0x000 DataSectionObject : 0x863c1758 Void
+0x004 SharedCacheMap : 0x869acea0 Void
+0x008 ImageSectionObject : (null)
0: kd> dt nt!_CONTROL_AREA 0x863c1758
+0x000 Segment : 0xaeb311a8 _SEGMENT
+0x004 DereferenceList : _LIST_ENTRY [ 0x0 - 0x0 ]
+0x00c NumberOfSectionReferences : 1
+0x010 NumberOfPfnReferences : 0x40
+0x014 NumberOfMappedViews : 1
+0x018 NumberOfUserReferences : 0
+0x01c u : <unnamed-tag>
+0x020 FlushInProgressCount : 0
+0x024 FilePointer : _EX_FAST_REF
+0x028 ControlAreaLock : 0n0
+0x02c ModifiedWriteCount : 0
+0x02c StartingFrame : 0
+0x030 WaitingForDeletion : (null)
+0x034 u2 : <unnamed-tag>
+0x040 LockedPages : 0n1
+0x048 ViewList : _LIST_ENTRY [ 0x86a3a898 - 0x86a3a898 ]
0: kd> ??sizeof(nt!_CONTROL_AREA)
unsigned int 0x50
0: kd> dt nt!_SUBSECTION 0x863c1758+0x50
+0x000 ControlArea : 0x863c1758 _CONTROL_AREA
+0x004 SubsectionBase : 0xa8e9b008 _MMPTE
+0x008 NextSubsection : (null)
+0x00c PtesInSubsection : 0x40
+0x010 UnusedPtes : 0
+0x010 GlobalPerSessionHead : (null)
+0x014 u : <unnamed-tag>
+0x018 StartingSector : 0
+0x01c NumberOfFullSectors : 0x40
0: kd> dt nt!_SEGMENT 0xaeb311a8
+0x000 ControlArea : 0x863c1758 _CONTROL_AREA
+0x004 TotalNumberOfPtes : 0x40
+0x008 SegmentFlags : _SEGMENT_FLAGS
+0x00c NumberOfCommittedPages : 0
+0x010 SizeOfSegment : 0x40000
+0x018 ExtendInfo : (null)
+0x018 BasedAddress : (null)
+0x01c SegmentLock : _EX_PUSH_LOCK
+0x020 u1 : <unnamed-tag>
+0x024 u2 : <unnamed-tag>
+0x028 PrototypePte : 0xa8fe97e8 _MMPTE
+0x030 ThePtes : [1] _MMPTE
1: kd> dt nt!_MMPTE .
+0x000 u :
+0x000 Long : Uint8B
+0x000 VolatileLong : Uint8B
+0x000 HighLow : _MMPTE_HIGHLOW
+0x000 Flush : _HARDWARE_PTE
+0x000 Hard : _MMPTE_HARDWARE
+0x000 Proto : _MMPTE_PROTOTYPE
+0x000 Soft : _MMPTE_SOFTWARE
+0x000 TimeStamp : _MMPTE_TIMESTAMP
+0x000 Trans : _MMPTE_TRANSITION
+0x000 Subsect : _MMPTE_SUBSECTION
+0x000 List : _MMPTE_LIST
1: kd> dt nt!_MMPTE_PROTOTYPE
+0x000 Valid : Pos 0, 1 Bit
+0x000 Unused0 : Pos 1, 7 Bits
+0x000 ReadOnly : Pos 8, 1 Bit
+0x000 Unused1 : Pos 9, 1 Bit
+0x000 Prototype : Pos 10, 1 Bit
+0x000 Protection : Pos 11, 5 Bits
+0x000 Unused : Pos 16, 16 Bits
+0x000 ProtoAddress : Pos 32, 32 Bits