mirror of
https://codeberg.org/KeybadeBlox/JSRF-Decompilation.git
synced 2026-02-20 02:07:02 +03:00
objdiff assumes that all symbols in executable memory sections are code, which led to misbehaviour due to .rdata and .data being marked as executable in JSRF. We now set these sections to non-executable in Ghidra to work around this.
25 lines
No EOL
543 B
JSON
25 lines
No EOL
543 B
JSON
{
|
|
"custom_make": "NMAKE.EXE",
|
|
"watch_patterns": [
|
|
"*.cpp",
|
|
"*.hpp"
|
|
],
|
|
"units": [
|
|
{
|
|
"name": "JSRF/Jet2",
|
|
"target_path": "target/JSRF/Jet2.obj",
|
|
"base_path": "src/JSRF/Jet2.obj",
|
|
"metadata": {
|
|
"complete": true,
|
|
"source_path": "src/JSRF/Jet2.cpp"
|
|
},
|
|
"symbol_mappings": {
|
|
"[.rdata-0]": "[.xdata$x-0]",
|
|
"_main_funcinfo": "$T519",
|
|
"_main_handler": "$L523",
|
|
"_main_handler_unwind1": "$L515",
|
|
"_main_unwindmap": "$T525"
|
|
}
|
|
}
|
|
]
|
|
} |