Port-vax archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Bountysource campaign for gcc-vax



On Sat, 23 May 2020 at 19:36, John Paul Adrian Glaubitz
<glaubitz%physik.fu-berlin.de@localhost> wrote:
>
> Hi!
>
> I have seen the discussion on this mailing list regarding a Bountysource campaign
> to convert the VAX backend in GCC from cc0 to MODE_CC [1].
>
> Since nothing has come out of it and VAX is one of the last two backends that
> are currently not being taken care of [2] (AVR and H8300 are being worked on,
> CRIS and M68K are done), I thought it might be a good idea to help with the
> efforts.
>
> Since using Bountysource works pretty neatly for this kind of effort, I would
> suggest using it for the VAX backend as well.
>
> The critical point is to be able to gain enough supporters so that we can collect
> at least $2000. Plus, it should be easily possible to install NetBSD/VAX inside
> an emulator. The latter requirement seems to have been fulfilled already [3,4],
> so I think we should just create an issue in the GCC bug tracker and link that
> to Bountysource.
>
> Then we just need to spread the word (reddit, Twitter etc).
>
> Adrian
>
> > [1] http://mail-index.netbsd.org/port-vax/2020/04/16/msg003460.html
> > [2] https://gcc.gnu.org/legacy-ml/gcc-patches/2019-09/msg01256.html
> > [3] http://mail-index.netbsd.org/port-vax/2020/04/18/msg003481.html
> > [4] http://www.netbsd.org/ports/vax/emulator-howto.html

Excellent stuff. I was wary about bountysource as they take 10% IIRC,
but on balance that is a case of the perfect being the enemy of the
good!

Have added 2^8-1 to the pot.

Thanks

David


Home | Main Index | Thread Index | Old Index