VxHunter Ghidra script can analyze Vxworks image load address and symbols automatically.
You can found some example VxWorks firmware at here, in this document we chose image_vx5_ppc_big_endian.bin.
Load VxWorks image to Ghidra with correct processor type with default load address zero.
Don't analyze image this time, since we don't known the correct load address.
Run VxHunter vxhunter_firmware_init.py in script manager, this script will rebase image to correct load address and fix the function name.
All done, you can start analyze the firmware, have fun.