@@ -149,7 +149,7 @@ mod mut_ptr;
149
149
/// again. [`write()`] can be used to overwrite data without causing it to be
150
150
/// dropped.
151
151
///
152
- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
152
+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
153
153
///
154
154
/// [valid]: self#safety
155
155
///
@@ -315,7 +315,7 @@ pub const fn slice_from_raw_parts_mut<T>(data: *mut T, len: usize) -> *mut [T] {
315
315
///
316
316
/// * Both `x` and `y` must be properly aligned.
317
317
///
318
- /// Note that even if `T` has size `0`, the pointers must be non-NULL and properly aligned.
318
+ /// Note that even if `T` has size `0`, the pointers must be non-null and properly aligned.
319
319
///
320
320
/// [valid]: self#safety
321
321
///
@@ -394,7 +394,7 @@ pub const unsafe fn swap<T>(x: *mut T, y: *mut T) {
394
394
/// beginning at `y` with the same size.
395
395
///
396
396
/// Note that even if the effectively copied size (`count * size_of::<T>()`) is `0`,
397
- /// the pointers must be non-NULL and properly aligned.
397
+ /// the pointers must be non-null and properly aligned.
398
398
///
399
399
/// [valid]: self#safety
400
400
///
@@ -540,7 +540,7 @@ const unsafe fn swap_nonoverlapping_bytes(x: *mut u8, y: *mut u8, len: usize) {
540
540
///
541
541
/// * `dst` must point to a properly initialized value of type `T`.
542
542
///
543
- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
543
+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
544
544
///
545
545
/// [valid]: self#safety
546
546
///
@@ -588,7 +588,7 @@ pub const unsafe fn replace<T>(dst: *mut T, mut src: T) -> T {
588
588
///
589
589
/// * `src` must point to a properly initialized value of type `T`.
590
590
///
591
- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
591
+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
592
592
///
593
593
/// # Examples
594
594
///
@@ -713,7 +713,7 @@ pub const unsafe fn read<T>(src: *const T) -> T {
713
713
/// whether `T` is [`Copy`]. If `T` is not [`Copy`], using both the returned
714
714
/// value and the value at `*src` can [violate memory safety][read-ownership].
715
715
///
716
- /// Note that even if `T` has size `0`, the pointer must be non-NULL .
716
+ /// Note that even if `T` has size `0`, the pointer must be non-null .
717
717
///
718
718
/// [read-ownership]: read#ownership-of-the-returned-value
719
719
/// [valid]: self#safety
@@ -818,7 +818,7 @@ pub const unsafe fn read_unaligned<T>(src: *const T) -> T {
818
818
/// * `dst` must be properly aligned. Use [`write_unaligned`] if this is not the
819
819
/// case.
820
820
///
821
- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
821
+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
822
822
///
823
823
/// [valid]: self#safety
824
824
///
@@ -910,7 +910,7 @@ pub const unsafe fn write<T>(dst: *mut T, src: T) {
910
910
///
911
911
/// * `dst` must be [valid] for writes.
912
912
///
913
- /// Note that even if `T` has size `0`, the pointer must be non-NULL .
913
+ /// Note that even if `T` has size `0`, the pointer must be non-null .
914
914
///
915
915
/// [valid]: self#safety
916
916
///
@@ -1024,7 +1024,7 @@ pub const unsafe fn write_unaligned<T>(dst: *mut T, src: T) {
1024
1024
/// However, storing non-[`Copy`] types in volatile memory is almost certainly
1025
1025
/// incorrect.
1026
1026
///
1027
- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
1027
+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
1028
1028
///
1029
1029
/// [valid]: self#safety
1030
1030
/// [read-ownership]: read#ownership-of-the-returned-value
@@ -1094,7 +1094,7 @@ pub unsafe fn read_volatile<T>(src: *const T) -> T {
1094
1094
///
1095
1095
/// * `dst` must be properly aligned.
1096
1096
///
1097
- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
1097
+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
1098
1098
///
1099
1099
/// [valid]: self#safety
1100
1100
///
@@ -1496,7 +1496,7 @@ fnptr_impls_args! { A, B, C, D, E, F, G, H, I, J, K, L }
1496
1496
///
1497
1497
/// Note, however, that the `expr` in `addr_of!(expr)` is still subject to all
1498
1498
/// the usual rules. In particular, `addr_of!(*ptr::null())` is Undefined
1499
- /// Behavior because it dereferences a NULL pointer.
1499
+ /// Behavior because it dereferences a null pointer.
1500
1500
///
1501
1501
/// # Example
1502
1502
///
@@ -1536,7 +1536,7 @@ pub macro addr_of($place:expr) {
1536
1536
///
1537
1537
/// Note, however, that the `expr` in `addr_of_mut!(expr)` is still subject to all
1538
1538
/// the usual rules. In particular, `addr_of_mut!(*ptr::null_mut())` is Undefined
1539
- /// Behavior because it dereferences a NULL pointer.
1539
+ /// Behavior because it dereferences a null pointer.
1540
1540
///
1541
1541
/// # Examples
1542
1542
///
0 commit comments