cd /usr/ports/lang/mono
make clean
make
make install
しかし、make の時点で恐ろしく時間がかかります。数時間?
2. インストール時のメッセージ
インストール時のメッセージは、後で影響するかもしれないので記録しておきます。
===> Installing for mono-5.10.1.47_8
===> Checking if mono already installed
===> Registering installation for mono-5.10.1.47_8
Installing mono-5.10.1.47_8...
************************************************************************
If you have build/runtime errors with Mono and Gtk# apps please try the
following first:
* Build Mono and gtk+ (x11-toolkits/gtk20) without CPUTYPE and with the
default FreeBSD CFLAGS ('-O2 -fno-strict-aliasing -pipe') as Mono has
been known to expose compiler bugs.
* Try building and running Mono with the GENERIC kernel.
- Mono requires SYSVSHM, SYSVMSG, and SYSVSEM which are part of the
GENERIC kernel.
- Removing kernel options or changing defaults to use experimental
options can adversely affect Mono's ability to build and run.
* Remove leftover semaphores / increase semaphore limits.
- Close apps which use Mono and run `ipcs -sbt`. Remove the
semaphores with MODE "--rw-------" and NSEMS "8" using ipcrm (1)
- _OR_ simply reboot which is the safest method.
- On multi-user systems the semaphore limits may need to be increased
from the defaults. The following should comfortably support 30 users.
# echo "kern.ipc.semmni=40" >> /boot/loader.conf
# echo "kern.ipc.semmns=300" >> /boot/loader.conf
* If you are in a jailed environment, ensure System V IPC are enabled.
You can rely on the security.jail.sysvipc_allowed sysctl to check
this status. The following enables this feature on the host system:
# echo "jail_sysvipc_allow=\"YES\"" >> /etc/rc.conf
* Some process information are accessed through /proc (e.g. when using
NUnit) and procfs(5) has to be mounted for these features to work:
# echo "proc /proc procfs rw 0 0" >> /etc/fstab
************************************************************************
===> SECURITY REPORT:
This port has installed the following files which may act as network
servers and may therefore pose a remote security risk to the system.
/usr/local/lib/libmono-profiler-log.so.0.0.0
/usr/local/lib/libmonoboehm-2.0.a(libmonoruntime_la-w32socket-unix.o)
/usr/local/lib/libmonoboehm-2.0.so.1.0.0
/usr/local/lib/libmonosgen-2.0.a(libmonoruntimesgen_la-w32socket-unix.o)
/usr/local/lib/libmonoboehm-2.0.a(libmini_la-debugger-agent.o)
/usr/local/bin/mono-sgen
/usr/local/lib/libmonosgen-2.0.a(libmonoruntimesgen_la-attach.o)
/usr/local/lib/libmonosgen-2.0.so.1.0.0
/usr/local/lib/libmonosgen-2.0.a(libmini_la-debugger-agent.o)
/usr/local/lib/libmonoboehm-2.0.a(libmonoruntime_la-attach.o)
/usr/local/bin/pedump
/usr/local/lib/libmono-profiler-log-static.a(log.o)
/usr/local/lib/libMonoPosixHelper.a(sys-socket.o)
/usr/local/lib/libmono-profiler-log.a(log.o)
/usr/local/lib/libMonoPosixHelper.so
/usr/local/bin/monodis
/usr/local/bin/mono-boehm
If there are vulnerabilities in these programs there may be a security
risk to the system. FreeBSD makes no guarantee about the security of
ports included in the Ports Collection. Please type 'make deinstall'
to deinstall the port if this is a concern.
For more information, and contact details about the security
status of this software, see the following webpage:
http://www.mono-project.com/