JSRF-Decompilation/decompile/objdiff.json
KeybadeBlox 8eda56dcdf Change executable section flags to please objiff
objdiff assumes that all symbols in executable memory sections are code,
which led to misbehaviour due to .rdata and .data being marked as
executable in JSRF.  We now set these sections to non-executable in
Ghidra to work around this.
2025-12-21 19:36:09 -05:00

25 lines
No EOL
543 B
JSON

{
"custom_make": "NMAKE.EXE",
"watch_patterns": [
"*.cpp",
"*.hpp"
],
"units": [
{
"name": "JSRF/Jet2",
"target_path": "target/JSRF/Jet2.obj",
"base_path": "src/JSRF/Jet2.obj",
"metadata": {
"complete": true,
"source_path": "src/JSRF/Jet2.cpp"
},
"symbol_mappings": {
"[.rdata-0]": "[.xdata$x-0]",
"_main_funcinfo": "$T519",
"_main_handler": "$L523",
"_main_handler_unwind1": "$L515",
"_main_unwindmap": "$T525"
}
}
]
}