@@ -149,7 +149,7 @@ mod mut_ptr;
149149/// again. [`write()`] can be used to overwrite data without causing it to be
150150/// dropped.
151151///
152- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
152+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
153153///
154154/// [valid]: self#safety
155155///
@@ -315,7 +315,7 @@ pub const fn slice_from_raw_parts_mut<T>(data: *mut T, len: usize) -> *mut [T] {
315315///
316316/// * Both `x` and `y` must be properly aligned.
317317///
318- /// Note that even if `T` has size `0`, the pointers must be non-NULL and properly aligned.
318+ /// Note that even if `T` has size `0`, the pointers must be non-null and properly aligned.
319319///
320320/// [valid]: self#safety
321321///
@@ -394,7 +394,7 @@ pub const unsafe fn swap<T>(x: *mut T, y: *mut T) {
394394/// beginning at `y` with the same size.
395395///
396396/// Note that even if the effectively copied size (`count * size_of::<T>()`) is `0`,
397- /// the pointers must be non-NULL and properly aligned.
397+ /// the pointers must be non-null and properly aligned.
398398///
399399/// [valid]: self#safety
400400///
@@ -540,7 +540,7 @@ const unsafe fn swap_nonoverlapping_bytes(x: *mut u8, y: *mut u8, len: usize) {
540540///
541541/// * `dst` must point to a properly initialized value of type `T`.
542542///
543- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
543+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
544544///
545545/// [valid]: self#safety
546546///
@@ -588,7 +588,7 @@ pub const unsafe fn replace<T>(dst: *mut T, mut src: T) -> T {
588588///
589589/// * `src` must point to a properly initialized value of type `T`.
590590///
591- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
591+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
592592///
593593/// # Examples
594594///
@@ -713,7 +713,7 @@ pub const unsafe fn read<T>(src: *const T) -> T {
713713/// whether `T` is [`Copy`]. If `T` is not [`Copy`], using both the returned
714714/// value and the value at `*src` can [violate memory safety][read-ownership].
715715///
716- /// Note that even if `T` has size `0`, the pointer must be non-NULL .
716+ /// Note that even if `T` has size `0`, the pointer must be non-null .
717717///
718718/// [read-ownership]: read#ownership-of-the-returned-value
719719/// [valid]: self#safety
@@ -818,7 +818,7 @@ pub const unsafe fn read_unaligned<T>(src: *const T) -> T {
818818/// * `dst` must be properly aligned. Use [`write_unaligned`] if this is not the
819819/// case.
820820///
821- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
821+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
822822///
823823/// [valid]: self#safety
824824///
@@ -910,7 +910,7 @@ pub const unsafe fn write<T>(dst: *mut T, src: T) {
910910///
911911/// * `dst` must be [valid] for writes.
912912///
913- /// Note that even if `T` has size `0`, the pointer must be non-NULL .
913+ /// Note that even if `T` has size `0`, the pointer must be non-null .
914914///
915915/// [valid]: self#safety
916916///
@@ -1024,7 +1024,7 @@ pub const unsafe fn write_unaligned<T>(dst: *mut T, src: T) {
10241024/// However, storing non-[`Copy`] types in volatile memory is almost certainly
10251025/// incorrect.
10261026///
1027- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
1027+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
10281028///
10291029/// [valid]: self#safety
10301030/// [read-ownership]: read#ownership-of-the-returned-value
@@ -1094,7 +1094,7 @@ pub unsafe fn read_volatile<T>(src: *const T) -> T {
10941094///
10951095/// * `dst` must be properly aligned.
10961096///
1097- /// Note that even if `T` has size `0`, the pointer must be non-NULL and properly aligned.
1097+ /// Note that even if `T` has size `0`, the pointer must be non-null and properly aligned.
10981098///
10991099/// [valid]: self#safety
11001100///
@@ -1496,7 +1496,7 @@ fnptr_impls_args! { A, B, C, D, E, F, G, H, I, J, K, L }
14961496///
14971497/// Note, however, that the `expr` in `addr_of!(expr)` is still subject to all
14981498/// the usual rules. In particular, `addr_of!(*ptr::null())` is Undefined
1499- /// Behavior because it dereferences a NULL pointer.
1499+ /// Behavior because it dereferences a null pointer.
15001500///
15011501/// # Example
15021502///
@@ -1536,7 +1536,7 @@ pub macro addr_of($place:expr) {
15361536///
15371537/// Note, however, that the `expr` in `addr_of_mut!(expr)` is still subject to all
15381538/// the usual rules. In particular, `addr_of_mut!(*ptr::null_mut())` is Undefined
1539- /// Behavior because it dereferences a NULL pointer.
1539+ /// Behavior because it dereferences a null pointer.
15401540///
15411541/// # Examples
15421542///
0 commit comments