summaryrefslogtreecommitdiff
path: root/HACKING
diff options
context:
space:
mode:
authorEdward Z. Yang <ezyang@mit.edu>2011-04-13 15:58:02 +0100
committerEdward Z. Yang <ezyang@mit.edu>2011-04-14 00:32:25 +0100
commit25297a13bd6be722a74ee87237498a5626b298ef (patch)
treefce5479c55e1686d2a15de641b07a6ecd03f7a52 /HACKING
parentb1cf9aae4a495b619375da716d6d14f7cb494f8e (diff)
downloadhaskell-25297a13bd6be722a74ee87237498a5626b298ef.tar.gz
Admonish the user to read the wiki page!
Signed-off-by: Edward Z. Yang <ezyang@mit.edu>
Diffstat (limited to 'HACKING')
-rw-r--r--HACKING11
1 files changed, 8 insertions, 3 deletions
diff --git a/HACKING b/HACKING
index be9eec298b..8ceff18881 100644
--- a/HACKING
+++ b/HACKING
@@ -21,10 +21,15 @@ The GHC Developer's Wiki
Quick Start for developers
http://hackage.haskell.org/trac/ghc/wiki/Building/Hacking
-
+
This section on the wiki will get you up and running with a
- serviceable build tree in no time:
-
+ serviceable build tree in no time.
+
+ Don't skip this! By default, GHC builds with all optimizations
+ and profiling; most hackers will want a quicker build, so creating
+ a mk/build.mk file and knowing how to rebuild only parts of GHC is
+ very important.
+
This is part of the "Building GHC" section of the wiki, which
has more detailed information on GHC's build system should you
need it.