arm64 (and some x86_64 if I remember well) has execute-only enforced in hardware. It means that the memory where the executable code is, isn't readable.
it was enforced in 7.3.
Regarding sbcl, a thread on ports@ mailing-list mentioned it: https://marc.info/?l=openbsd-ports&m=167483553608781&w=2.
Passing --no-execute-only to the linked is the simpler fix. The (better) other way would be to make sbcl to not required to read the code segment.
arm64 (and some x86_64 if I remember well) has execute-only enforced in hardware. It means that the memory where the executable code is, isn't readable.
it was enforced in 7.3.
Regarding sbcl, a thread on ports@ mailing-list mentioned it: https:/ /marc.info/ ?l=openbsd- ports&m= 167483553608781 &w=2.
Passing --no-execute-only to the linked is the simpler fix. The (better) other way would be to make sbcl to not required to read the code segment.