"$RP$" => ")",
"$C$" => ",",
- // in theory we can demangle any unicode code point, but
+ // in theory we can demangle any Unicode code point, but
// for simplicity we just catch the common ones.
"$x20" => " ",
"$x27" => "'",
//
// An additionally oddity in this function is that we initialize the
// filename via self_exe_name() to pass to libbacktrace. It turns out
- // that on linux libbacktrace seamlessly gets the filename of the
+ // that on Linux libbacktrace seamlessly gets the filename of the
// current executable, but this fails on freebsd. by always providing
// it, we make sure that libbacktrace never has a reason to not look up
// the symbols. The libbacktrace API also states that the filename must
let bytes = path.as_vec();
if bytes.len() < LAST_FILENAME.len() {
let i = bytes.iter();
- for (slot, val) in LAST_FILENAME.mut_iter().zip(i) {
+ for (slot, val) in LAST_FILENAME.iter_mut().zip(i) {
*slot = *val as libc::c_char;
}
LAST_FILENAME.as_ptr()
None => ptr::null(),
};
STATE = backtrace_create_state(filename, 0, error_cb,
- ptr::mut_null());
+ ptr::null_mut());
return STATE
}
(val & !1) as libc::uintptr_t
}
- // This function also doesn't exist on android or arm/linux, so make it
+ // This function also doesn't exist on Android or ARM/Linux, so make it
// a no-op
#[cfg(target_os = "android")]
#[cfg(target_os = "linux", target_arch = "arm")]