Analyze vphone600 kernel artifacts using the local symbol database and XNU source tree. Use when working on kernel reverse engineering, address-to-symbol lookup, release-vs-research kernel comparison, or patch analysis for vphone600 variants in this repository.
Use the local research/kernel_info dataset as the first source of truth for symbol lookup.
Use research/reference/xnu as the source-level reference for semantics and structure.
research/kernel_info/kernel_symbols.dbresearch/kernel_info/kernel_index.tsvresearch/kernel_info/json/kernelcache.release.vphone600.bin.symbols.jsonresearch/kernel_info/json/kernelcache.research.vphone600.bin.symbols.jsonresearch/reference/xnuIf research/reference/xnu is missing, create it with a shallow clone:
mkdir -p research/reference
git clone --depth 1 https://github.com/apple-oss-distributions/xnu.git research/reference/xnu
vphone600 only.kernel_symbols.dbreleaseresearchresearch/reference/xnu.sqlite3 research/kernel_info/kernel_symbols.db "select kernel_name, json_path from kernel_symbols order by kernel_name;"sqlite3 research/kernel_info/kernel_symbols.db "select * from kernel_symbols where kernel_name='kernelcache.release.vphone600';"rg -n 'symbol_name_fragment' research/kernel_info/json/kernelcache.release.vphone600.bin.symbols.jsonrg -n '0xfffffe00...' research/kernel_info/json/kernelcache.research.vphone600.bin.symbols.jsonkernelcache.release.vphone600 or kernelcache.research.vphone600.references/kernel-info-queries.md for reusable SQL and shell query snippets.