From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 29008 invoked by alias); 22 Jan 2017 16:16:34 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Received: (qmail 28999 invoked by uid 89); 22 Jan 2017 16:16:33 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=3.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE,SPAM_SUBJECT1,SPF_PASS autolearn=no version=3.3.2 spammy=labs, Labs, SuSE, UD:x86-64.org X-HELO: ainaz.pair.com Received: from ainaz.pair.com (HELO ainaz.pair.com) (209.68.2.66) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Sun, 22 Jan 2017 16:16:23 +0000 Received: from anthias (vie-188-118-248-047.dsl.sil.at [188.118.248.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ainaz.pair.com (Postfix) with ESMTPSA id 73BA13F536 for ; Sun, 22 Jan 2017 11:16:21 -0500 (EST) Date: Sun, 22 Jan 2017 16:20:00 -0000 From: Gerald Pfeifer To: gcc-patches@gcc.gnu.org Subject: [wwwdocs] gcc-3.1/changes.html: http://www.x86-64.org is dead Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-IsSubscribed: yes X-SW-Source: 2017-01/txt/msg01694.txt.bz2 http://www.x86-64.org has been dead for a while, so keep the textual reference, but remove the link. Committed. Gerald Index: gcc-3.1/changes.html =================================================================== RCS file: /cvs/gcc/wwwdocs/htdocs/gcc-3.1/changes.html,v retrieving revision 1.70 diff -u -r1.70 changes.html --- gcc-3.1/changes.html 22 Aug 2016 12:27:31 -0000 1.70 +++ gcc-3.1/changes.html 22 Jan 2017 16:14:54 -0000 @@ -281,7 +281,7 @@
  • SuSE Labs developers Jan Hubicka, Bo Thorsen and Andreas Jaeger have contributed a port to the AMD x86-64 architecture. For more information on x86-64 see - http://www.x86-64.org.
  • + http://www.x86-64.org.
  • The compiler now supports MMX, 3DNow!, SSE, and SSE2 instructions. Options -mmmx, -m3dnow, -msse,