[clang] [clang-tools-extra] [compiler-rt] [flang] [libcxx] [libcxxabi] [lld] [lldb] [llvm] [Inclusive Language] migrate "sanity" checks to "soundness" checks (PR #156995)
Rick van Voorden via llvm-commits
llvm-commits at lists.llvm.org
Fri Sep 5 13:02:49 PDT 2025
https://github.com/vanvoorden updated https://github.com/llvm/llvm-project/pull/156995
>From 25645fa404cc2c39f6a74d303600b6ddadd81f56 Mon Sep 17 00:00:00 2001
From: Rick van Voorden <rick at northbronson.com>
Date: Thu, 4 Sep 2025 17:38:09 -0700
Subject: [PATCH 1/3] inclusive language
---
bolt/lib/Passes/CMOVConversion.cpp | 2 +-
bolt/lib/Passes/IndirectCallPromotion.cpp | 2 +-
bolt/lib/Profile/YAMLProfileReader.cpp | 2 +-
bolt/lib/Rewrite/RewriteInstance.cpp | 4 ++--
bolt/runtime/instr.cpp | 2 +-
bolt/test/AArch64/hook-fini.s | 2 +-
.../binary-analysis/AArch64/gs-pacret-autiasp.s | 2 +-
bolt/test/runtime/AArch64/hook-fini.test | 2 +-
bolt/tools/merge-fdata/merge-fdata.cpp | 2 +-
.../clang-tidy/google/ExplicitMakePairCheck.cpp | 2 +-
.../clang-tidy/hicpp/MultiwayPathsCoveredCheck.cpp | 2 +-
.../clang-tidy/misc/NoRecursionCheck.cpp | 2 +-
.../FunctionCognitiveComplexityCheck.cpp | 2 +-
.../clang-tidy/readability/NamedParameterCheck.cpp | 2 +-
clang-tools-extra/clangd/CodeCompletionStrings.cpp | 4 ++--
clang-tools-extra/clangd/Compiler.cpp | 2 +-
clang-tools-extra/clangd/XRefs.cpp | 2 +-
clang-tools-extra/clangd/index/IndexAction.cpp | 2 +-
.../clangd/unittests/BackgroundIndexTests.cpp | 2 +-
clang-tools-extra/clangd/unittests/ClangdTests.cpp | 2 +-
clang-tools-extra/clangd/unittests/QualityTests.cpp | 2 +-
clang-tools-extra/clangd/unittests/RenameTests.cpp | 2 +-
.../expand-modular-headers-ppcallbacks.cpp | 2 +-
clang/docs/AutomaticReferenceCounting.rst | 2 +-
clang/docs/InternalsManual.rst | 2 +-
clang/docs/Modules.rst | 2 +-
clang/docs/UsersManual.rst | 2 +-
clang/include/clang/Sema/Sema.h | 2 +-
clang/lib/AST/ASTStructuralEquivalence.cpp | 4 ++--
clang/lib/AST/CommentSema.cpp | 2 +-
clang/lib/AST/TypePrinter.cpp | 2 +-
clang/lib/CodeGen/CGCXXABI.cpp | 2 +-
clang/lib/CodeGen/CGCall.cpp | 4 ++--
clang/lib/CodeGen/CGExpr.cpp | 2 +-
clang/lib/CodeGen/CGStmt.cpp | 2 +-
clang/lib/Driver/Driver.cpp | 2 +-
clang/lib/Frontend/PrintPreprocessedOutput.cpp | 4 ++--
clang/lib/Index/USRGeneration.cpp | 2 +-
clang/lib/Parse/ParseStmtAsm.cpp | 4 ++--
clang/lib/Sema/SemaOpenACC.cpp | 2 +-
clang/lib/Sema/SemaOverload.cpp | 4 ++--
clang/lib/Sema/SemaTemplateDeduction.cpp | 2 +-
.../StaticAnalyzer/Checkers/ArrayBoundChecker.cpp | 2 +-
.../StaticAnalyzer/Checkers/PthreadLockChecker.cpp | 2 +-
clang/test/AST/ByteCode/cxx11.cpp | 2 +-
clang/test/Analysis/return-value-guaranteed.cpp | 2 +-
clang/test/Analysis/std-variant-checker.cpp | 2 +-
clang/test/CodeGen/AArch64/inline-asm.c | 2 +-
clang/test/CodeGen/alloc-align-attr.c | 2 +-
clang/test/CodeGen/arm-target-features.c | 2 +-
clang/test/CodeGen/atomic-ops.c | 2 +-
.../test/CodeGen/strictfp-elementwise-builtins.cpp | 2 +-
clang/test/CodeGen/union-init2.c | 2 +-
.../simple-vtable-definition.cpp | 2 +-
.../test/CodeGenCXX/cxx11-user-defined-literal.cpp | 2 +-
clang/test/CodeGenCXX/type-aware-allocators.cpp | 2 +-
clang/test/CodeGenHLSL/GlobalDestructors.hlsl | 2 +-
clang/test/CodeGenHLSL/RootSignature.hlsl | 2 +-
clang/test/Driver/aix-as.c | 2 +-
clang/test/Driver/aix-ld.c | 2 +-
clang/test/Driver/as-dwarf-cie.s | 2 +-
clang/test/Driver/fopenmp.c | 2 +-
clang/test/Driver/linux-header-search.cpp | 2 +-
clang/test/Driver/linux-ld.c | 2 +-
clang/test/Driver/solaris-ld-values.c | 2 +-
clang/test/Driver/solaris-ld-values.cpp | 2 +-
clang/test/Driver/solaris-ld.c | 2 +-
clang/test/PCH/floating-literal.c | 2 +-
clang/test/SemaCXX/constant-expression-cxx11.cpp | 2 +-
clang/test/SemaCXX/constant-expression-cxx14.cpp | 2 +-
clang/test/SemaCXX/enable_if.cpp | 2 +-
.../overload-resolution-deferred-templates.cpp | 2 +-
.../vtable_pointer_authentication_attribute.cpp | 4 ++--
clang/test/SemaTemplate/canonical-expr-type.cpp | 2 +-
.../utils/update_cc_test_checks/check-globals.test | 2 +-
.../global-hex-value-regex.test | 2 +-
.../update_cc_test_checks/global-value-regex.test | 2 +-
clang/unittests/Analysis/CFGTest.cpp | 2 +-
clang/unittests/Basic/SourceManagerTest.cpp | 2 +-
clang/utils/TableGen/ClangAttrEmitter.cpp | 2 +-
cmake/Modules/EnableLanguageNolink.cmake | 4 ++--
.../cmake/Modules/CompilerRTDarwinUtils.cmake | 2 +-
compiler-rt/cmake/Modules/CompilerRTUtils.cmake | 2 +-
compiler-rt/lib/asan/asan_internal.h | 2 +-
compiler-rt/lib/asan/asan_poisoning.cpp | 6 +++---
compiler-rt/lib/asan/asan_stats.cpp | 4 ++--
compiler-rt/lib/builtins/negdi2.c | 2 +-
compiler-rt/lib/builtins/negti2.c | 2 +-
compiler-rt/lib/fuzzer/tests/FuzzerUnittest.cpp | 2 +-
compiler-rt/lib/hwasan/hwasan_linux.cpp | 2 +-
compiler-rt/lib/memprof/memprof_stats.cpp | 4 ++--
.../sanitizer_common_interceptors_ioctl.inc | 8 ++++----
.../lib/sanitizer_common/sanitizer_flag_parser.cpp | 2 +-
.../sanitizer_interceptors_ioctl_netbsd.inc | 8 ++++----
compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp | 2 +-
.../lib/sanitizer_common/sanitizer_linux.cpp | 2 +-
compiler-rt/lib/sanitizer_common/sanitizer_mac.cpp | 2 +-
.../sanitizer_common/sanitizer_posix_libcdep.cpp | 2 +-
.../lib/sanitizer_common/sanitizer_stacktrace.cpp | 4 ++--
.../sanitizer_common/sanitizer_stacktrace_sparc.cpp | 4 ++--
compiler-rt/lib/sanitizer_common/sanitizer_win.cpp | 2 +-
.../tests/sanitizer_procmaps_test.cpp | 2 +-
compiler-rt/lib/scudo/standalone/report.h | 2 +-
compiler-rt/lib/tsan/rtl/CMakeLists.txt | 2 +-
compiler-rt/lib/tsan/rtl/tsan_rtl.cpp | 6 +++---
compiler-rt/lib/tsan/rtl/tsan_rtl_access.cpp | 2 +-
compiler-rt/lib/ubsan/ubsan_type_hash.h | 2 +-
compiler-rt/lib/ubsan/ubsan_type_hash_win.cpp | 2 +-
compiler-rt/lib/xray/tests/CMakeLists.txt | 2 +-
compiler-rt/test/BlocksRuntime/byrefsanity.c | 2 +-
compiler-rt/test/asan/TestCases/Linux/syscalls.cpp | 2 +-
.../TestCases/Posix/unpoison-alternate-stack.cpp | 2 +-
.../test/asan/TestCases/sanity_check_pure_c.c | 4 ++--
compiler-rt/test/builtins/Unit/atomic_test.c | 2 +-
compiler-rt/test/builtins/Unit/lit.cfg.py | 2 +-
compiler-rt/test/fuzzer/fuzzer-custommutator.test | 2 +-
compiler-rt/test/fuzzer/reload.test | 2 +-
.../test/hwasan/TestCases/Linux/syscalls.cpp | 2 +-
.../test/hwasan/TestCases/sanitizer_malloc.cpp | 2 +-
compiler-rt/test/msan/Linux/syscalls.cpp | 2 +-
compiler-rt/test/safestack/canary.c | 2 +-
compiler-rt/utils/generate_netbsd_ioctls.awk | 6 +++---
compiler-rt/utils/generate_netbsd_syscalls.awk | 2 +-
flang-rt/unittests/Runtime/CharacterTest.cpp | 2 +-
flang-rt/unittests/Runtime/ExternalIOTest.cpp | 2 +-
flang/lib/Decimal/decimal-to-binary.cpp | 2 +-
flang/lib/Evaluate/fold-character.cpp | 2 +-
flang/lib/Evaluate/formatting.cpp | 2 +-
flang/lib/Evaluate/integer.cpp | 2 +-
flang/lib/Frontend/CompilerInstance.cpp | 2 +-
flang/lib/Lower/Bridge.cpp | 2 +-
flang/lib/Lower/ConvertVariable.cpp | 2 +-
flang/lib/Optimizer/Builder/FIRBuilder.cpp | 2 +-
flang/lib/Parser/preprocessor.cpp | 2 +-
flang/test/Driver/fopenmp.f90 | 2 +-
flang/test/Fir/convert-to-llvm.fir | 2 +-
flang/test/Semantics/modfile55.cuf | 2 +-
flang/test/Semantics/resolve59.f90 | 2 +-
flang/test/Semantics/symbol19.f90 | 2 +-
flang/unittests/Frontend/CompilerInstanceTest.cpp | 2 +-
libcxx/docs/DesignDocs/FileTimeType.rst | 4 ++--
libcxx/docs/Status/Cxx20Papers.csv | 2 +-
libcxx/include/__cxx03/__hash_table | 2 +-
libcxx/include/__cxx03/__tree | 2 +-
libcxx/include/__hash_table | 2 +-
libcxx/include/__tree | 2 +-
libcxx/test/libcxx-03/numerics/bit.ops.pass.cpp | 2 +-
.../mdspan/extents/assert.ctor_from_span.pass.cpp | 2 +-
.../mdspan/layout_stride/assert.conversion.pass.cpp | 2 +-
.../views/mdspan/mdspan/assert.size.pass.cpp | 2 +-
.../sequence_container_iterators.pass.cpp | 2 +-
.../filesystems/convert_file_time.pass.cpp | 2 +-
libcxx/test/libcxx/numerics/bit.ops.pass.cpp | 2 +-
.../atomics.lockfree/is_always_lock_free.pass.cpp | 2 +-
.../atomics.ref/is_always_lock_free.pass.cpp | 2 +-
.../concept.convertible/convertible_to.pass.cpp | 2 +-
.../concept.swappable/swappable.pass.cpp | 2 +-
.../ctor_iter_constraint.compile.pass.cpp | 2 +-
.../std/containers/sequences/array/empty.pass.cpp | 2 +-
.../containers/sequences/array/max_size.pass.cpp | 2 +-
.../views/mdspan/extents/conversion.pass.cpp | 6 +++---
.../views/mdspan/layout_left/comparison.pass.cpp | 2 +-
.../mdspan/layout_left/ctor.layout_right.pass.cpp | 4 ++--
.../views/mdspan/layout_left/ctor.mapping.pass.cpp | 6 +++---
.../views/mdspan/layout_right/comparison.pass.cpp | 2 +-
.../mdspan/layout_right/ctor.layout_left.pass.cpp | 4 ++--
.../views/mdspan/layout_right/ctor.mapping.pass.cpp | 6 +++---
.../views/mdspan/layout_stride/comparison.pass.cpp | 2 +-
.../layout_stride/ctor.strided_mapping.pass.cpp | 6 +++---
.../views/mdspan/mdspan/ctor.dh_array.pass.cpp | 6 +++---
.../views/mdspan/mdspan/ctor.dh_extents.pass.cpp | 6 +++---
.../views/mdspan/mdspan/ctor.dh_integers.pass.cpp | 8 ++++----
.../views/mdspan/mdspan/ctor.dh_map.pass.cpp | 2 +-
.../views/mdspan/mdspan/ctor.dh_map_acc.pass.cpp | 2 +-
.../views/mdspan/mdspan/ctor.dh_span.pass.cpp | 6 +++---
.../containers/views/mdspan/mdspan/types.pass.cpp | 2 +-
.../fs.op.funcs/fs.op.space/space.pass.cpp | 2 +-
.../str.allocator_propagation.pass.cpp | 2 +-
.../str.allocator_propagation.pass.cpp | 2 +-
.../str.allocator_propagation.pass.cpp | 2 +-
.../cmp.alg/compare_strong_order_fallback.pass.cpp | 2 +-
.../cmp.alg/compare_weak_order_fallback.pass.cpp | 2 +-
.../cmp/cmp.alg/strong_order.pass.cpp | 2 +-
.../cmp/cmp.alg/weak_order.pass.cpp | 2 +-
.../utf_sanity_check.pass.cpp | 2 +-
libcxx/test/std/numerics/c.math/hermite.pass.cpp | 2 +-
.../exclusive.scan/exclusive_scan.pass.cpp | 2 +-
.../inclusive.scan/inclusive_scan.pass.cpp | 2 +-
.../inclusive.scan/inclusive_scan_op.pass.cpp | 2 +-
.../inclusive.scan/inclusive_scan_op_init.pass.cpp | 2 +-
.../numeric.ops.midpoint/midpoint.float.pass.cpp | 4 ++--
.../transform_exclusive_scan_init_bop_uop.pass.cpp | 2 +-
.../transform_inclusive_scan_bop_uop.pass.cpp | 2 +-
.../transform_inclusive_scan_bop_uop_init.pass.cpp | 2 +-
.../string.view.capacity/capacity.pass.cpp | 2 +-
.../thread.lock.shared.cons/mutex.pass.cpp | 2 +-
.../thread.lock.shared.locking/lock.pass.cpp | 2 +-
.../thread.lock.shared.locking/try_lock.pass.cpp | 2 +-
.../is_always_equal.pass.cpp | 2 +-
.../meta.const.eval/is_constant_evaluated.pass.cpp | 2 +-
libcxx/test/support/filesystem_test_helper.h | 2 +-
libcxx/test/support/test_comparisons.h | 2 +-
libcxxabi/src/stdlib_new_delete.cpp | 2 +-
libcxxabi/test/guard_threaded_test.pass.cpp | 2 +-
lld/ELF/InputSection.cpp | 2 +-
lld/ELF/ScriptParser.cpp | 2 +-
lld/include/lld/Common/ErrorHandler.h | 2 +-
lld/test/COFF/guard-warnings.s | 2 +-
lld/test/ELF/gc-sections-no-undef-error.s | 2 +-
lld/test/ELF/lto/save-temps-eq.ll | 2 +-
lld/test/MachO/eh-frame-personality-dedup.s | 2 +-
lld/test/MachO/icf-only-lsda-folded.s | 2 +-
lldb/examples/summaries/cocoa/objc_runtime.py | 8 ++++----
lldb/packages/Python/lldbsuite/test/dotest.py | 2 +-
lldb/source/API/SBCommandInterpreter.cpp | 4 ++--
lldb/source/Commands/CommandCompletions.cpp | 2 +-
lldb/source/Commands/CommandObjectWatchpoint.cpp | 4 ++--
.../Commands/CommandObjectWatchpointCommand.cpp | 2 +-
lldb/source/Core/SourceManager.cpp | 2 +-
lldb/source/Expression/FunctionCaller.cpp | 2 +-
lldb/source/Expression/REPL.cpp | 2 +-
lldb/source/Plugins/ABI/Mips/ABISysV_mips64.cpp | 2 +-
lldb/source/Plugins/ABI/PowerPC/ABISysV_ppc.cpp | 2 +-
lldb/source/Plugins/ABI/X86/ABISysV_x86_64.cpp | 2 +-
lldb/source/Plugins/ABI/X86/ABIWindows_x86_64.cpp | 2 +-
.../MacOSX-DYLD/DynamicLoaderMacOS.cpp | 2 +-
.../MacOSX-DYLD/DynamicLoaderMacOSXDYLD.cpp | 2 +-
.../Clang/CppModuleConfiguration.cpp | 2 +-
.../Process/FreeBSD/NativeProcessFreeBSD.cpp | 2 +-
.../Plugins/Process/Linux/NativeProcessLinux.cpp | 2 +-
.../Plugins/Process/NetBSD/NativeProcessNetBSD.cpp | 2 +-
.../Plugins/Process/elf-core/ProcessElfCore.cpp | 2 +-
.../Plugins/Process/gdb-remote/ProcessGDBRemote.cpp | 4 ++--
.../SymbolFile/DWARF/DWARFASTParserClang.cpp | 4 ++--
.../Trace/intel-pt/TraceIntelPTBundleLoader.cpp | 2 +-
.../Plugins/TypeSystem/Clang/TypeSystemClang.cpp | 2 +-
.../UnwindAssembly/x86/UnwindAssembly-x86.cpp | 4 ++--
lldb/source/Symbol/Symbol.cpp | 4 ++--
lldb/source/Target/RegisterContextUnwind.cpp | 2 +-
lldb/source/Target/ThreadPlanStepInRange.cpp | 2 +-
lldb/source/Target/ThreadPlanStepOverRange.cpp | 4 ++--
lldb/source/Utility/ZipFile.cpp | 6 +++---
.../TestPublicAPIHeaders.py | 2 +-
.../frame/recognizer/TestFrameRecognizer.py | 2 +-
.../test/API/commands/memory/read/TestMemoryRead.py | 2 +-
.../TestDataFormatterLibcxxInvalidString.py | 2 +-
.../data-formatter/stringprinter/main.cpp | 2 +-
.../limit-debug-info/TestLimitDebugInfo.py | 4 ++--
.../process_crash_info/TestProcessCrashInfo.py | 2 +-
lldb/test/API/lang/c/array_types/TestArrayTypes.py | 10 +++++-----
.../API/lang/cpp/dynamic-value/TestDynamicValue.py | 2 +-
.../members/TestCppIncompleteTypeMembers.py | 2 +-
.../no-nlist-memory-module/TestNoNlistsDylib.py | 2 +-
.../API/macosx/simulator/TestSimulatorPlatform.py | 2 +-
.../value/linked_list/TestValueAPILinkedList.py | 4 ++--
lldb/test/API/sanity/TestModuleCacheSanity.py | 2 +-
lldb/test/API/sanity/TestReprStrEquality.py | 2 +-
lldb/test/API/sanity/TestSettingSkipping.py | 2 +-
.../memory-tagging/TestGdbRemoteMemoryTagging.py | 4 ++--
lldb/test/Shell/REPL/Basic.test | 2 +-
lldb/test/Shell/Settings/TestModuleCacheSanity.test | 2 +-
.../source/MacOSX/arm64/DNBArchImplARM64.cpp | 2 +-
.../lldb-rpc-gen/server/RPCServerSourceEmitter.cpp | 2 +-
lldb/unittests/Interpreter/TestCompletion.cpp | 2 +-
llvm/CMakeLists.txt | 2 +-
llvm/cmake/platforms/WinMsvc.cmake | 2 +-
llvm/docs/Atomics.rst | 2 +-
llvm/docs/CMake.rst | 2 +-
llvm/docs/CodingStandards.rst | 2 +-
llvm/docs/Contributing.rst | 2 +-
llvm/docs/Frontend/PerformanceTips.rst | 2 +-
llvm/docs/GettingStarted.rst | 2 +-
llvm/docs/LibFuzzer.rst | 2 +-
llvm/include/llvm-c/Core.h | 2 +-
llvm/include/llvm/ADT/APSInt.h | 2 +-
llvm/include/llvm/ADT/IntervalMap.h | 4 ++--
llvm/include/llvm/CodeGen/MachineRegisterInfo.h | 2 +-
llvm/include/llvm/CodeGen/SelectionDAG.h | 2 +-
llvm/include/llvm/DebugInfo/DWARF/DWARFDebugFrame.h | 2 +-
llvm/include/llvm/IR/IntrinsicsARM.td | 2 +-
llvm/include/llvm/ProfileData/MemProfReader.h | 6 +++---
llvm/include/llvm/Support/CommandLine.h | 2 +-
llvm/lib/Analysis/MemoryDependenceAnalysis.cpp | 2 +-
llvm/lib/Analysis/MemorySSA.cpp | 2 +-
llvm/lib/Analysis/ScalarEvolution.cpp | 2 +-
llvm/lib/Analysis/TargetLibraryInfo.cpp | 4 ++--
llvm/lib/CodeGen/CodeGenPrepare.cpp | 2 +-
llvm/lib/CodeGen/ImplicitNullChecks.cpp | 4 ++--
llvm/lib/CodeGen/MIRParser/MIRParser.cpp | 4 ++--
llvm/lib/CodeGen/MachineLoopInfo.cpp | 2 +-
llvm/lib/CodeGen/MachineVerifier.cpp | 2 +-
llvm/lib/CodeGen/SelectionDAG/LegalizeVectorOps.cpp | 2 +-
llvm/lib/CodeGen/SelectionDAG/SelectionDAGISel.cpp | 4 ++--
.../CodeGen/SelectionDAG/SelectionDAGPrinter.cpp | 2 +-
.../LogicalView/Readers/LVCodeViewReader.cpp | 2 +-
llvm/lib/ExecutionEngine/Orc/Core.cpp | 2 +-
llvm/lib/FuzzMutate/Operations.cpp | 2 +-
llvm/lib/MC/MCWin64EH.cpp | 2 +-
llvm/lib/ProfileData/MemProfReader.cpp | 4 ++--
llvm/lib/ProfileData/MemProfSummary.cpp | 3 ++-
.../Target/AArch64/AArch64Arm64ECCallLowering.cpp | 2 +-
llvm/lib/Target/AArch64/AArch64ISelLowering.cpp | 2 +-
.../Target/AArch64/AsmParser/AArch64AsmParser.cpp | 2 +-
llvm/lib/Target/AMDGPU/AMDGPUCodeGenPrepare.cpp | 2 +-
.../lib/Target/AMDGPU/AMDGPUInstructionSelector.cpp | 2 +-
llvm/lib/Target/AMDGPU/AMDGPUMachineFunction.cpp | 13 +++++++------
llvm/lib/Target/AMDGPU/SIInsertWaitcnts.cpp | 2 +-
llvm/lib/Target/ARM/ARMISelLowering.cpp | 2 +-
llvm/lib/Target/ARM/AsmParser/ARMAsmParser.cpp | 2 +-
llvm/lib/Target/AVR/AVRISelLowering.cpp | 2 +-
llvm/lib/Target/README.txt | 2 +-
llvm/lib/Target/SPIRV/SPIRVEmitIntrinsics.cpp | 2 +-
llvm/lib/Target/Sparc/SparcISelDAGToDAG.cpp | 2 +-
llvm/lib/Target/X86/X86OptimizeLEAs.cpp | 2 +-
llvm/lib/Target/X86/X86SpeculativeLoadHardening.cpp | 6 +++---
llvm/lib/TargetParser/Triple.cpp | 2 +-
.../Transforms/IPO/MemProfContextDisambiguation.cpp | 12 ++++++------
.../Transforms/InstCombine/InstCombineVectorOps.cpp | 2 +-
llvm/lib/Transforms/Scalar/LoopFlatten.cpp | 2 +-
llvm/lib/Transforms/Scalar/LoopPredication.cpp | 2 +-
llvm/lib/Transforms/Scalar/NewGVN.cpp | 2 +-
llvm/lib/Transforms/Scalar/SimpleLoopUnswitch.cpp | 2 +-
.../Transforms/Utils/ScalarEvolutionExpander.cpp | 2 +-
llvm/test/Analysis/BlockFrequencyInfo/precision.ll | 2 +-
llvm/test/Analysis/MemorySSA/function-mem-attrs.ll | 2 +-
llvm/test/Analysis/MemorySSA/multi-edges.ll | 2 +-
llvm/test/CodeGen/AArch64/arm64-promote-const.ll | 4 ++--
llvm/test/CodeGen/AArch64/arm64-simplest-elf.ll | 2 +-
.../CodeGen/AArch64/global-merge-group-by-use.ll | 4 ++--
llvm/test/CodeGen/AArch64/landingpad-ifcvt.ll | 2 +-
llvm/test/CodeGen/AArch64/local_vars.ll | 2 +-
llvm/test/CodeGen/AArch64/wineh-try-catch-cbz.ll | 2 +-
llvm/test/CodeGen/AArch64/wineh-try-catch-vla.ll | 2 +-
.../CodeGen/AMDGPU/buffer-fat-pointers-memcpy.ll | 2 +-
llvm/test/CodeGen/ARM/vext.ll | 2 +-
llvm/test/CodeGen/Hexagon/PR33749.ll | 2 +-
llvm/test/CodeGen/Hexagon/bit-bitsplit-src.ll | 2 +-
llvm/test/CodeGen/Hexagon/bit-has.ll | 2 +-
llvm/test/CodeGen/Hexagon/cfgopt-fall-through.ll | 2 +-
llvm/test/CodeGen/Hexagon/copy-to-combine-dbg.ll | 2 +-
llvm/test/CodeGen/Hexagon/hexagon-tfr-add.ll | 2 +-
.../CodeGen/Hexagon/loop-idiom/pmpy-long-loop.ll | 2 +-
.../Hexagon/loop-idiom/pmpy-shiftconv-fail.ll | 2 +-
llvm/test/CodeGen/Hexagon/rdf-cover-use.ll | 2 +-
llvm/test/CodeGen/Hexagon/rdf-def-mask.ll | 2 +-
llvm/test/CodeGen/Hexagon/regalloc-block-overlap.ll | 2 +-
llvm/test/CodeGen/M68k/Arith/mul64.ll | 2 +-
llvm/test/CodeGen/MLRegAlloc/interactive-mode.ll | 2 +-
llvm/test/CodeGen/RISCV/rvv/zve32-types.ll | 3 ++-
.../CodeGen/X86/2011-11-07-LegalizeBuildVector.ll | 2 +-
llvm/test/CodeGen/X86/frame-base.ll | 2 +-
llvm/test/CodeGen/X86/hipe-cc.ll | 2 +-
llvm/test/CodeGen/X86/hipe-cc64.ll | 2 +-
llvm/test/CodeGen/X86/misched-balance.ll | 2 +-
llvm/test/CodeGen/X86/pr23246.ll | 2 +-
llvm/test/CodeGen/X86/splat-const.ll | 2 +-
llvm/test/CodeGen/X86/x32-va_start.ll | 2 +-
llvm/test/DebugInfo/AArch64/eh_frame_personality.ll | 2 +-
.../DebugInfo/Generic/dbg-value-lower-linenos.ll | 2 +-
.../DebugInfo/X86/debug-line-in-one-fragment.ll | 2 +-
llvm/test/FileCheck/opt-color.txt | 2 +-
llvm/test/MC/AArch64/basic-a64-instructions.s | 4 ++--
llvm/test/Transforms/Coroutines/coro-debug.ll | 2 +-
.../GlobalOpt/localize-constexpr-debuginfo.ll | 2 +-
.../Transforms/InferAddressSpaces/AMDGPU/select.ll | 2 +-
llvm/test/Transforms/InstCombine/allocsize-32.ll | 2 +-
llvm/test/Transforms/JumpThreading/crash.ll | 2 +-
.../Transforms/LoopStrengthReduce/X86/bin_power.ll | 2 +-
.../tools/dsymutil/ARM/dwarf5-addrx-0x0-last.test | 2 +-
.../tools/dsymutil/X86/basic-linking-bundle.test | 4 ++--
.../tools/dsymutil/X86/remarks-linking-archive.text | 4 ++--
.../tools/dsymutil/X86/remarks-linking-bundle.test | 4 ++--
.../dsymutil/X86/remarks-linking-fat-bundle.test | 4 ++--
.../llvm-dwarfdump/X86/stats-inlining-single-cu.ll | 2 +-
llvm/tools/dsymutil/dsymutil.cpp | 2 +-
llvm/tools/lli/lli.cpp | 2 +-
llvm/tools/llvm-exegesis/lib/SnippetGenerator.h | 2 +-
llvm/tools/llvm-profgen/PerfReader.cpp | 2 +-
llvm/tools/llvm-readobj/ARMWinEHPrinter.cpp | 2 +-
llvm/tools/llvm-readobj/COFFDumper.cpp | 2 +-
llvm/tools/llvm-readobj/ELFDumper.cpp | 2 +-
llvm/unittests/ADT/APFloatTest.cpp | 4 ++--
.../DebugInfo/CodeView/TypeHashingTest.cpp | 2 +-
.../DebugInfo/DWARF/DWARFFormValueTest.cpp | 2 +-
llvm/unittests/FuzzMutate/OperationsTest.cpp | 2 +-
llvm/unittests/IR/MetadataTest.cpp | 2 +-
llvm/unittests/ProfileData/InstrProfTest.cpp | 6 +++---
llvm/unittests/Support/raw_ostream_test.cpp | 2 +-
llvm/unittests/Support/xxhashTest.cpp | 2 +-
.../Transforms/Utils/FunctionComparatorTest.cpp | 2 +-
llvm/utils/TableGen/Common/CodeGenDAGPatterns.cpp | 11 ++++++-----
llvm/utils/TableGen/GlobalISelCombinerEmitter.cpp | 2 +-
llvm/utils/abtest.py | 4 ++--
llvm/utils/bugpoint/RemoteRunSafely.sh | 2 +-
llvm/utils/lit/tests/usage.py | 2 +-
mlir/examples/toy/Ch1/include/toy/Parser.h | 2 +-
mlir/examples/toy/Ch2/include/toy/Parser.h | 2 +-
mlir/examples/toy/Ch3/include/toy/Parser.h | 2 +-
mlir/examples/toy/Ch4/include/toy/Parser.h | 2 +-
mlir/examples/toy/Ch5/include/toy/Parser.h | 2 +-
mlir/examples/toy/Ch6/include/toy/Parser.h | 2 +-
mlir/examples/toy/Ch7/include/toy/Parser.h | 2 +-
.../mlir/Dialect/SparseTensor/IR/SparseTensorOps.td | 4 ++--
mlir/include/mlir/IR/Builders.h | 2 +-
mlir/lib/Conversion/MemRefToLLVM/MemRefToLLVM.cpp | 4 ++--
mlir/lib/Dialect/Affine/Analysis/Utils.cpp | 2 +-
.../Dialect/Affine/Transforms/SuperVectorize.cpp | 2 +-
.../Dialect/GPU/TransformOps/GPUTransformOps.cpp | 2 +-
mlir/lib/Dialect/LLVMIR/IR/LLVMMemorySlot.cpp | 2 +-
.../Linalg/TransformOps/LinalgTransformOps.cpp | 2 +-
.../Linalg/Transforms/ElementwiseOpFusion.cpp | 6 +++---
mlir/lib/Dialect/Linalg/Transforms/Transforms.cpp | 4 ++--
.../lib/Dialect/Linalg/Transforms/Vectorization.cpp | 2 +-
mlir/lib/Dialect/Tosa/IR/TosaCanonicalizations.cpp | 2 +-
mlir/lib/Dialect/Utils/ReshapeOpsUtils.cpp | 2 +-
mlir/lib/Dialect/Vector/Utils/VectorUtils.cpp | 2 +-
.../Dialect/OpenMP/OpenMPToLLVMIRTranslation.cpp | 4 ++--
mlir/test/CAPI/ir.c | 2 +-
.../Dialect/Affine/memref-dependence-check.mlir | 2 +-
.../Dialect/GPU/value-bounds-op-interface-impl.mlir | 2 +-
.../CPU/microbench-linalg-async-parallel-for.mlir | 2 +-
.../CPU/microbench-scf-async-parallel-for.mlir | 2 +-
.../Dialect/SparseTensor/CPU/sparse_matmul.mlir | 2 +-
.../Dialect/SparseTensor/CPU/sparse_tensor_ops.mlir | 2 +-
.../GPU/CUDA/sm80-lt/sparse-matmul-2-4-hand.mlir | 4 ++--
.../GPU/CUDA/sm80-lt/sparse-matmul-2-4-lib.mlir | 4 ++--
.../SparseTensor/GPU/CUDA/sparse-matmul-lib.mlir | 2 +-
.../SparseTensor/GPU/CUDA/sparse-matvec-const.mlir | 2 +-
.../SparseTensor/GPU/CUDA/sparse-matvec-lib.mlir | 2 +-
.../SparseTensor/GPU/CUDA/sparse-matvec.mlir | 2 +-
.../SparseTensor/GPU/CUDA/sparse-mma-2-4-f16.mlir | 4 ++--
.../Dialect/SparseTensor/python/test_SDDMM.py | 2 +-
.../Dialect/SparseTensor/python/test_SpMM.py | 2 +-
.../X86Vector/math-polynomial-approx-avx2.mlir | 2 +-
mlir/test/python/ir/context_lifecycle.py | 2 +-
mlir/unittests/Analysis/Presburger/SimplexTest.cpp | 2 +-
offload/test/offloading/disable_default_device.c | 2 +-
offload/test/offloading/runtime_init.c | 2 +-
openmp/runtime/src/kmp_debugger.cpp | 2 +-
openmp/runtime/src/kmp_dispatch.cpp | 2 +-
openmp/runtime/src/kmp_omp.h | 2 +-
.../omptest/test/unittests/asserter-seq-test.cpp | 2 +-
polly/lib/External/isl/isl_scheduler.c | 2 +-
443 files changed, 557 insertions(+), 553 deletions(-)
diff --git a/bolt/lib/Passes/CMOVConversion.cpp b/bolt/lib/Passes/CMOVConversion.cpp
index cdd99b55207e0..10372416a9acd 100644
--- a/bolt/lib/Passes/CMOVConversion.cpp
+++ b/bolt/lib/Passes/CMOVConversion.cpp
@@ -66,7 +66,7 @@ bool isIfThenSubgraph(const BinaryBasicBlock &LHS,
if (LHS.pred_size() != 2 || RHS.pred_size() != 1)
return false;
- // Sanity check
+ // Soundness check
BinaryBasicBlock *Predecessor = *RHS.pred_begin();
assert(Predecessor && LHS.isPredecessor(Predecessor) && "invalid subgraph");
(void)Predecessor;
diff --git a/bolt/lib/Passes/IndirectCallPromotion.cpp b/bolt/lib/Passes/IndirectCallPromotion.cpp
index 8a01cb974c5da..dff1989c016b5 100644
--- a/bolt/lib/Passes/IndirectCallPromotion.cpp
+++ b/bolt/lib/Passes/IndirectCallPromotion.cpp
@@ -597,7 +597,7 @@ IndirectCallPromotion::findCallTargetSymbols(std::vector<Callsite> &Targets,
std::vector<uint64_t>({JTIndex}).swap(NewTargets.back().JTIndices);
llvm::erase(Target.JTIndices, JTIndex);
- // Keep fixCFG counts sane if more indices use this same target later
+ // Keep fixCFG counts sound if more indices use this same target later
assert(IndicesPerTarget[Target.To.Sym] > 0 && "wrong map");
NewTargets.back().Branches =
Target.Branches / IndicesPerTarget[Target.To.Sym];
diff --git a/bolt/lib/Profile/YAMLProfileReader.cpp b/bolt/lib/Profile/YAMLProfileReader.cpp
index 086e47b661e10..62190397b2be3 100644
--- a/bolt/lib/Profile/YAMLProfileReader.cpp
+++ b/bolt/lib/Profile/YAMLProfileReader.cpp
@@ -385,7 +385,7 @@ Error YAMLProfileReader::preprocessProfile(BinaryContext &BC) {
return errorCodeToError(YamlInput.error());
}
- // Sanity check.
+ // Soundness check.
if (YamlBP.Header.Version != 1)
return make_error<StringError>(
Twine("cannot read profile : unsupported version"),
diff --git a/bolt/lib/Rewrite/RewriteInstance.cpp b/bolt/lib/Rewrite/RewriteInstance.cpp
index a6e4dbc9c192f..871453b0ec5db 100644
--- a/bolt/lib/Rewrite/RewriteInstance.cpp
+++ b/bolt/lib/Rewrite/RewriteInstance.cpp
@@ -637,7 +637,7 @@ Error RewriteInstance::discoverStorage() {
// If user specified a custom address where we should start writing new
// data, honor that.
NextAvailableAddress = opts::CustomAllocationVMA;
- // Sanity check the user-supplied address and emit warnings if something
+ // Soundness check the user-supplied address and emit warnings if something
// seems off.
for (const ELF64LE::Phdr &Phdr : PHs) {
switch (Phdr.p_type) {
@@ -2985,7 +2985,7 @@ void RewriteInstance::handleRelocation(const SectionRef &RelocatedSection,
}
if (BinaryData *BD = BC->getBinaryDataContainingAddress(SymbolAddress)) {
- // Note: this assertion is trying to check sanity of BinaryData objects
+ // Note: this assertion is trying to check soundness of BinaryData objects
// but AArch64 and RISCV has inferred and incomplete object locations
// coming from GOT/TLS or any other non-trivial relocation (that requires
// creation of sections and whose symbol address is not really what should
diff --git a/bolt/runtime/instr.cpp b/bolt/runtime/instr.cpp
index 1f54a500dbf98..97b49327ac484 100644
--- a/bolt/runtime/instr.cpp
+++ b/bolt/runtime/instr.cpp
@@ -819,7 +819,7 @@ ProfileWriterContext readDescriptions() {
#endif
#if !defined(__APPLE__)
-/// Debug by printing overall metadata global numbers to check it is sane
+/// Debug by printing overall metadata global numbers to check it is sound
void printStats(const ProfileWriterContext &Ctx) {
char StatMsg[BufSize];
char *StatPtr = StatMsg;
diff --git a/bolt/test/AArch64/hook-fini.s b/bolt/test/AArch64/hook-fini.s
index 4f321d463ef32..4051546724748 100644
--- a/bolt/test/AArch64/hook-fini.s
+++ b/bolt/test/AArch64/hook-fini.s
@@ -4,7 +4,7 @@
## dynamic).
## All tests perform the following steps:
## - Compile and link for the case to be tested
-## - Some sanity-checks on the dynamic section and relocations in the binary to
+## - Some soundness-checks on the dynamic section and relocations in the binary to
## verify it has the shape we want for testing:
## - DT_FINI or DT_FINI_ARRAY in dynamic section
## - No relative relocations for non-PIE
diff --git a/bolt/test/binary-analysis/AArch64/gs-pacret-autiasp.s b/bolt/test/binary-analysis/AArch64/gs-pacret-autiasp.s
index 8e991fade2c86..c0a69a75b0d1b 100644
--- a/bolt/test/binary-analysis/AArch64/gs-pacret-autiasp.s
+++ b/bolt/test/binary-analysis/AArch64/gs-pacret-autiasp.s
@@ -272,7 +272,7 @@ lr_clobbered_nocfg:
ret
.size lr_clobbered_nocfg, .-lr_clobbered_nocfg
-/// Now do a basic sanity check on every different Authentication instruction:
+/// Now do a basic soundness check on every different Authentication instruction:
.globl f_autiasp
.type f_autiasp, at function
diff --git a/bolt/test/runtime/AArch64/hook-fini.test b/bolt/test/runtime/AArch64/hook-fini.test
index 8d23b21b6d612..43cc832e429ed 100644
--- a/bolt/test/runtime/AArch64/hook-fini.test
+++ b/bolt/test/runtime/AArch64/hook-fini.test
@@ -4,7 +4,7 @@
# dynamic).
# All tests perform the following steps:
# - Compile and link for the case to be tested
-# - Some sanity-checks on the dynamic section and relocations in the binary to
+# - Some soundness-checks on the dynamic section and relocations in the binary to
# verify it has the shape we want for testing:
# - DT_FINI or DT_FINI_ARRAY in dynamic section
# - No relative relocations for non-PIE
diff --git a/bolt/tools/merge-fdata/merge-fdata.cpp b/bolt/tools/merge-fdata/merge-fdata.cpp
index cfcb9373548a1..9e55ad39427d4 100644
--- a/bolt/tools/merge-fdata/merge-fdata.cpp
+++ b/bolt/tools/merge-fdata/merge-fdata.cpp
@@ -428,7 +428,7 @@ int main(int argc, char **argv) {
if (YamlInput.error())
report_error(InputDataFilename, YamlInput.error());
- // Sanity check.
+ // Soundness check.
if (BP.Header.Version != 1) {
errs() << "Unable to merge data from profile using version "
<< BP.Header.Version << '\n';
diff --git a/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.cpp b/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.cpp
index d911b58cb8b7e..4b8b411bcc2ef 100644
--- a/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.cpp
+++ b/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.cpp
@@ -40,7 +40,7 @@ void ExplicitMakePairCheck::check(const MatchFinder::MatchResult &Result) {
const auto *Call = Result.Nodes.getNodeAs<CallExpr>("call");
const auto *DeclRef = Result.Nodes.getNodeAs<DeclRefExpr>("declref");
- // Sanity check: The use might have overriden ::std::make_pair.
+ // Soundness check: The use might have overriden ::std::make_pair.
if (Call->getNumArgs() != 2)
return;
diff --git a/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.cpp b/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.cpp
index 3f5cd4b473903..ac66c5bc5d66a 100644
--- a/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.cpp
+++ b/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.cpp
@@ -99,7 +99,7 @@ void MultiwayPathsCoveredCheck::check(const MatchFinder::MatchResult &Result) {
bool SwitchHasDefault = false;
std::tie(SwitchCaseCount, SwitchHasDefault) = countCaseLabels(Switch);
- // Checks the sanity of 'switch' statements that actually do define
+ // Checks the soundness of 'switch' statements that actually do define
// a default branch but might be degenerated by having no or only one case.
if (SwitchHasDefault) {
handleSwitchWithDefault(Switch, SwitchCaseCount);
diff --git a/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.cpp b/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.cpp
index 712f390765957..f22118d5cb7e4 100644
--- a/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.cpp
@@ -92,7 +92,7 @@ template <typename T, unsigned SmallSize> class SmartSmallSetVector {
void populateSet() {
assert(Set.empty() && "Should not have already utilized the Set.");
// Magical growth factor prediction - to how many elements do we expect to
- // sanely grow after switching away from small-size storage?
+ // soundly grow after switching away from small-size storage?
const size_t NewMaxElts = 4 * Vector.size();
Vector.reserve(NewMaxElts);
Set.reserve(NewMaxElts);
diff --git a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp
index 2f59aaa86b157..b0e4efcbc5cba 100644
--- a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp
+++ b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp
@@ -133,7 +133,7 @@ struct CognitiveComplexity final {
"that in terms of stack usage. "
"Thus, it is good to minimize the size of the Detail struct.");
SmallVector<Detail, DefaultLimit> Details; // 25 elements is 200 bytes.
- // Yes, 25 is a magic number. This is the seemingly-sane default for the
+ // Yes, 25 is a magic number. This is the seemingly-sound default for the
// upper limit for function cognitive complexity. Thus it would make sense
// to avoid allocations for any function that does not violate the limit.
diff --git a/clang-tools-extra/clang-tidy/readability/NamedParameterCheck.cpp b/clang-tools-extra/clang-tidy/readability/NamedParameterCheck.cpp
index 6bb8c394f75cc..1aaad01dea13f 100644
--- a/clang-tools-extra/clang-tidy/readability/NamedParameterCheck.cpp
+++ b/clang-tools-extra/clang-tidy/readability/NamedParameterCheck.cpp
@@ -61,7 +61,7 @@ void NamedParameterCheck::check(const MatchFinder::MatchResult &Result) {
Parm->getType()->isSpecificBuiltinType(BuiltinType::Int))
continue;
- // Sanity check the source locations.
+ // Soundness check the source locations.
if (!Parm->getLocation().isValid() || Parm->getLocation().isMacroID() ||
!SM.isWrittenInSameFile(Parm->getBeginLoc(), Parm->getLocation()))
continue;
diff --git a/clang-tools-extra/clangd/CodeCompletionStrings.cpp b/clang-tools-extra/clangd/CodeCompletionStrings.cpp
index 9c4241b54057a..a26b36db7ecad 100644
--- a/clang-tools-extra/clangd/CodeCompletionStrings.cpp
+++ b/clang-tools-extra/clangd/CodeCompletionStrings.cpp
@@ -123,7 +123,7 @@ std::string getDeclComment(const ASTContext &Ctx, const NamedDecl &Decl) {
if (!RC)
return "";
- // Sanity check that the comment does not come from the PCH. We choose to
+ // Soundness check that the comment does not come from the PCH. We choose to
// not write them into PCH, because they are racy and slow to load.
assert(!Ctx.getSourceManager().isLoadedSourceLocation(RC->getBeginLoc()));
@@ -146,7 +146,7 @@ std::string getDeclComment(const ASTContext &Ctx, const NamedDecl &Decl) {
RC = getCompletionComment(Ctx, &Decl);
if (!RC)
return "";
- // Sanity check that the comment does not come from the PCH. We choose to
+ // Soundness check that the comment does not come from the PCH. We choose to
// not write them into PCH, because they are racy and slow to load.
assert(!Ctx.getSourceManager().isLoadedSourceLocation(RC->getBeginLoc()));
Doc = RC->getFormattedText(Ctx.getSourceManager(), Ctx.getDiagnostics());
diff --git a/clang-tools-extra/clangd/Compiler.cpp b/clang-tools-extra/clangd/Compiler.cpp
index 8b3865c8a8e5c..ba8766663c411 100644
--- a/clang-tools-extra/clangd/Compiler.cpp
+++ b/clang-tools-extra/clangd/Compiler.cpp
@@ -100,7 +100,7 @@ buildCompilerInvocation(const ParseInputs &Inputs, clang::DiagnosticConsumer &D,
std::vector<const char *> ArgStrs;
ArgStrs.reserve(Argv.size() + 1);
// In asserts builds, CompilerInvocation redundantly reads/parses cc1 args as
- // a sanity test. This is not useful to clangd, and costs 10% of test time.
+ // a soundness test. This is not useful to clangd, and costs 10% of test time.
// To avoid mismatches between assert/production builds, disable it always.
ArgStrs = {Argv.front().c_str(), "-Xclang", "-no-round-trip-args"};
for (const auto &S : Argv.drop_front())
diff --git a/clang-tools-extra/clangd/XRefs.cpp b/clang-tools-extra/clangd/XRefs.cpp
index e1c50f906de08..17141a52afc6c 100644
--- a/clang-tools-extra/clangd/XRefs.cpp
+++ b/clang-tools-extra/clangd/XRefs.cpp
@@ -972,7 +972,7 @@ class ReferenceFinder : public index::IndexDataConsumer {
llvm::dyn_cast_or_null<ObjCMethodDecl>(ASTNode.OrigD)) {
OMD->getSelectorLocs(Locs);
}
- // Sanity check: we expect the *first* token to match the reported loc.
+ // Soundness check: we expect the *first* token to match the reported loc.
// Otherwise, maybe it was e.g. some other kind of reference to a Decl.
if (!Locs.empty() && Locs.front() != Loc)
Locs.clear(); // First token doesn't match, assume our guess was wrong.
diff --git a/clang-tools-extra/clangd/index/IndexAction.cpp b/clang-tools-extra/clangd/index/IndexAction.cpp
index ed56c2a9d2e81..d9d9cd0f40942 100644
--- a/clang-tools-extra/clangd/index/IndexAction.cpp
+++ b/clang-tools-extra/clangd/index/IndexAction.cpp
@@ -106,7 +106,7 @@ struct IncludeGraphCollector : public PPCallbacks {
NodeForIncluding.first->getValue().DirectIncludes.push_back(NodeForInclude);
}
- // Sanity check to ensure we have already populated a skipped file.
+ // Soundness check to ensure we have already populated a skipped file.
void FileSkipped(const FileEntryRef &SkippedFile, const Token &FilenameTok,
SrcMgr::CharacteristicKind FileType) override {
#ifndef NDEBUG
diff --git a/clang-tools-extra/clangd/unittests/BackgroundIndexTests.cpp b/clang-tools-extra/clangd/unittests/BackgroundIndexTests.cpp
index ada14c9939318..1c443c50866e2 100644
--- a/clang-tools-extra/clangd/unittests/BackgroundIndexTests.cpp
+++ b/clang-tools-extra/clangd/unittests/BackgroundIndexTests.cpp
@@ -854,7 +854,7 @@ TEST(BackgroundQueueTest, Progress) {
using testing::AnyOf;
BackgroundQueue::Stats S;
BackgroundQueue Q([&](BackgroundQueue::Stats New) {
- // Verify values are sane.
+ // Verify values are sound.
// Items are enqueued one at a time (at least in this test).
EXPECT_THAT(New.Enqueued, AnyOf(S.Enqueued, S.Enqueued + 1));
// Items are completed one at a time.
diff --git a/clang-tools-extra/clangd/unittests/ClangdTests.cpp b/clang-tools-extra/clangd/unittests/ClangdTests.cpp
index 9ea7c3e02411d..63c92671a621a 100644
--- a/clang-tools-extra/clangd/unittests/ClangdTests.cpp
+++ b/clang-tools-extra/clangd/unittests/ClangdTests.cpp
@@ -919,7 +919,7 @@ int d;
StartSecond.wait();
Server.addDocument(FooCpp, SourceContentsWithoutErrors);
ASSERT_TRUE(Server.blockUntilIdleForTest()) << "Waiting for diagnostics";
- ASSERT_EQ(DiagConsumer.Count, 2); // Sanity check - we actually ran both?
+ ASSERT_EQ(DiagConsumer.Count, 2); // Soundness check - we actually ran both?
}
TEST(ClangdServerTest, FormatCode) {
diff --git a/clang-tools-extra/clangd/unittests/QualityTests.cpp b/clang-tools-extra/clangd/unittests/QualityTests.cpp
index 4954659a45e02..1e6d34d58fcc1 100644
--- a/clang-tools-extra/clangd/unittests/QualityTests.cpp
+++ b/clang-tools-extra/clangd/unittests/QualityTests.cpp
@@ -10,7 +10,7 @@
// For interesting cases, both exact scores and "X beats Y" are too brittle to
// make good hard assertions.
//
-// Here we test the signal extraction and sanity-check that signals point in
+// Here we test the signal extraction and soundness-check that signals point in
// the right direction. This should be supplemented by quality metrics which
// we can compute from a corpus of queries and preferred rankings.
//
diff --git a/clang-tools-extra/clangd/unittests/RenameTests.cpp b/clang-tools-extra/clangd/unittests/RenameTests.cpp
index 5d2a77b62a219..b23d62e37e068 100644
--- a/clang-tools-extra/clangd/unittests/RenameTests.cpp
+++ b/clang-tools-extra/clangd/unittests/RenameTests.cpp
@@ -1444,7 +1444,7 @@ TEST(RenameTest, IndexMergeMainFile) {
EXPECT_THAT(Results.GlobalChanges[Main].asTextEdits(),
ElementsAre(newText("xPrime")));
- // Sanity check: we do expect to see index results!
+ // Soundness check: we do expect to see index results!
TU.Filename = "other.cc";
Results = Rename(TU.index().get());
EXPECT_THAT(Results.GlobalChanges.keys(),
diff --git a/clang-tools-extra/test/clang-tidy/infrastructure/expand-modular-headers-ppcallbacks.cpp b/clang-tools-extra/test/clang-tidy/infrastructure/expand-modular-headers-ppcallbacks.cpp
index 4d1ca669b8d03..c846291329831 100644
--- a/clang-tools-extra/test/clang-tidy/infrastructure/expand-modular-headers-ppcallbacks.cpp
+++ b/clang-tools-extra/test/clang-tidy/infrastructure/expand-modular-headers-ppcallbacks.cpp
@@ -1,4 +1,4 @@
-// Sanity-check. Run without modules:
+// Soundness-check. Run without modules:
// RUN: rm -rf %t
// RUN: mkdir %t
// RUN: cp %S/Inputs/expand-modular-headers-ppcallbacks/* %t/
diff --git a/clang/docs/AutomaticReferenceCounting.rst b/clang/docs/AutomaticReferenceCounting.rst
index 80bbd25121148..b10e3635e1d5b 100644
--- a/clang/docs/AutomaticReferenceCounting.rst
+++ b/clang/docs/AutomaticReferenceCounting.rst
@@ -1993,7 +1993,7 @@ A program is ill-formed if it refers to the ``NSAutoreleasePool`` class.
dependencies between two calls. It is also very easy to accidentally forget
to drain an autorelease pool when using the manual API, and this can
significantly inflate the process's high-water-mark. The introduction of a
- new scope is unfortunate but basically required for sane interaction with the
+ new scope is unfortunate but basically required for sound interaction with the
rest of the language. Not draining the pool during an unwind is apparently
required by the Objective-C exceptions implementation.
diff --git a/clang/docs/InternalsManual.rst b/clang/docs/InternalsManual.rst
index bd742273f4ed5..411d3ee3ecec0 100644
--- a/clang/docs/InternalsManual.rst
+++ b/clang/docs/InternalsManual.rst
@@ -82,7 +82,7 @@ using it. From this file, :program:`tblgen` generates the unique ID of the
diagnostic, the severity of the diagnostic and the English translation + format
string.
-There is little sanity with the naming of the unique ID's right now. Some
+There is little soundness with the naming of the unique ID's right now. Some
start with ``err_``, ``warn_``, ``ext_`` to encode the severity into the name.
Since the enum is referenced in the C++ code that produces the diagnostic, it
is somewhat useful for it to be reasonably short.
diff --git a/clang/docs/Modules.rst b/clang/docs/Modules.rst
index acbe45e0be970..515f5838dbe49 100644
--- a/clang/docs/Modules.rst
+++ b/clang/docs/Modules.rst
@@ -1099,7 +1099,7 @@ The module maps will be written using the `module map language`_, which provides
Headers are often missing ``#include`` directives for headers that they actually depend on. As with the problem of conflicting definitions, this only affects unlucky users who don't happen to include headers in the right order. With modules, the headers of a particular module will be parsed in isolation, so the module may fail to build if there are missing includes.
**Headers that vend multiple APIs at different times**
- Some systems have headers that contain a number of different kinds of API definitions, only some of which are made available with a given include. For example, the header may vend ``size_t`` only when the macro ``__need_size_t`` is defined before that header is included, and also vend ``wchar_t`` only when the macro ``__need_wchar_t`` is defined. Such headers are often included many times in a single translation unit, and will have no include guards. There is no sane way to map this header to a submodule. One can either eliminate the header (e.g., by splitting it into separate headers, one per actual API) or simply ``exclude`` it in the module map.
+ Some systems have headers that contain a number of different kinds of API definitions, only some of which are made available with a given include. For example, the header may vend ``size_t`` only when the macro ``__need_size_t`` is defined before that header is included, and also vend ``wchar_t`` only when the macro ``__need_wchar_t`` is defined. Such headers are often included many times in a single translation unit, and will have no include guards. There is no sound way to map this header to a submodule. One can either eliminate the header (e.g., by splitting it into separate headers, one per actual API) or simply ``exclude`` it in the module map.
To detect and help address some of these problems, the ``clang-tools-extra`` repository contains a ``modularize`` tool that parses a set of given headers and attempts to detect these problems and produce a report. See the tool's in-source documentation for information on how to check your system or library headers.
diff --git a/clang/docs/UsersManual.rst b/clang/docs/UsersManual.rst
index 0e85c8109fd5e..cb5eb07d23b65 100644
--- a/clang/docs/UsersManual.rst
+++ b/clang/docs/UsersManual.rst
@@ -2382,7 +2382,7 @@ are listed below.
.. option:: -fno-assume-sane-operator-new
- Don't assume that the C++'s new operator is sane.
+ Don't assume that the C++'s new operator is sound.
This option tells the compiler to do not assume that C++'s global
new operator will always return a pointer that does not alias any
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index 88b67eed5fd37..ae84e31b6656c 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -6628,7 +6628,7 @@ class Sema final : public SemaBase {
/// CheckParamExceptionSpec - Check if the parameter and return types of the
/// two functions have equivalent exception specs. This is part of the
/// assignment and override compatibility check. We do not check the
- /// parameters of parameter function pointers recursively, as no sane
+ /// parameters of parameter function pointers recursively, as no sound
/// programmer would even be able to write such a function type.
bool CheckParamExceptionSpec(
const PartialDiagnostic &NestedDiagID, const PartialDiagnostic &NoteID,
diff --git a/clang/lib/AST/ASTStructuralEquivalence.cpp b/clang/lib/AST/ASTStructuralEquivalence.cpp
index 1292c30d47589..21745c6e7ee38 100644
--- a/clang/lib/AST/ASTStructuralEquivalence.cpp
+++ b/clang/lib/AST/ASTStructuralEquivalence.cpp
@@ -879,10 +879,10 @@ static bool IsStructurallyEquivalent(StructuralEquivalenceContext &Context,
// class comparison.
if (T1->getTypeClass() == Type::Enum) {
T1 = cast<EnumType>(T1)->getOriginalDecl()->getIntegerType();
- assert(T2->isBuiltinType() && !T1.isNull()); // Sanity check
+ assert(T2->isBuiltinType() && !T1.isNull()); // Soundness check
} else if (T2->getTypeClass() == Type::Enum) {
T2 = cast<EnumType>(T2)->getOriginalDecl()->getIntegerType();
- assert(T1->isBuiltinType() && !T2.isNull()); // Sanity check
+ assert(T1->isBuiltinType() && !T2.isNull()); // Soundness check
}
TC = Type::Builtin;
} else
diff --git a/clang/lib/AST/CommentSema.cpp b/clang/lib/AST/CommentSema.cpp
index 649fba94a2b76..49d8286a6a048 100644
--- a/clang/lib/AST/CommentSema.cpp
+++ b/clang/lib/AST/CommentSema.cpp
@@ -249,7 +249,7 @@ void Sema::actOnParamCommandDirectionArg(ParamCommandComment *Command,
<< ArgRange << FixItHint::CreateReplacement(ArgRange, FixedName);
} else {
Diag(ArgLocBegin, diag::warn_doc_param_invalid_direction) << ArgRange;
- Direction = ParamCommandPassDirection::In; // Sane fall back.
+ Direction = ParamCommandPassDirection::In; // Sound fall back.
}
}
Command->setDirection(Direction,
diff --git a/clang/lib/AST/TypePrinter.cpp b/clang/lib/AST/TypePrinter.cpp
index 54ca42d2035ad..baaa0ea1bd475 100644
--- a/clang/lib/AST/TypePrinter.cpp
+++ b/clang/lib/AST/TypePrinter.cpp
@@ -968,7 +968,7 @@ void TypePrinter::printFunctionProtoAfter(const FunctionProtoType *T,
if (Policy.UseHLSLTypes) {
// This is a bit of a hack because we _do_ use reference types in the
// AST for representing inout and out parameters so that code
- // generation is sane, but when re-printing these for HLSL we need to
+ // generation is sound, but when re-printing these for HLSL we need to
// skip the reference.
print(T->getParamType(i).getNonReferenceType(), OS, StringRef());
continue;
diff --git a/clang/lib/CodeGen/CGCXXABI.cpp b/clang/lib/CodeGen/CGCXXABI.cpp
index 30e5dc2b6cbd9..0364f38c5c695 100644
--- a/clang/lib/CodeGen/CGCXXABI.cpp
+++ b/clang/lib/CodeGen/CGCXXABI.cpp
@@ -196,7 +196,7 @@ bool CGCXXABI::isEmittedWithConstantInitializer(
// translation unit will emit the value as a constant. We rely on the
// variable being constant-initialized in every translation unit if it's
// constant-initialized in any translation unit, which isn't actually
- // guaranteed by the standard but is necessary for sanity.
+ // guaranteed by the standard but is necessary for soundness.
return InitDecl->hasConstantInitialization();
}
diff --git a/clang/lib/CodeGen/CGCall.cpp b/clang/lib/CodeGen/CGCall.cpp
index a94a7ed51521c..463a962f27f0b 100644
--- a/clang/lib/CodeGen/CGCall.cpp
+++ b/clang/lib/CodeGen/CGCall.cpp
@@ -2469,7 +2469,7 @@ void CodeGenModule::ConstructAttributeList(StringRef Name,
AddAttributesFromFunctionProtoType(
getContext(), FuncAttrs, Fn->getType()->getAs<FunctionProtoType>());
if (AttrOnCallSite && Fn->isReplaceableGlobalAllocationFunction()) {
- // A sane operator new returns a non-aliasing pointer.
+ // A sound operator new returns a non-aliasing pointer.
auto Kind = Fn->getDeclName().getCXXOverloadedOperator();
if (getCodeGenOpts().AssumeSaneOperatorNew &&
(Kind == OO_New || Kind == OO_Array_New))
@@ -3620,7 +3620,7 @@ static llvm::Value *tryEmitFusedAutoreleaseOfResult(CodeGenFunction &CGF,
result = call->getArgOperand(0);
InstsToKill.push_back(call);
- // Keep killing bitcasts, for sanity. Note that we no longer care
+ // Keep killing bitcasts, for soundness. Note that we no longer care
// about precise ordering as long as there's exactly one use.
while (llvm::BitCastInst *bitcast = dyn_cast<llvm::BitCastInst>(result)) {
if (!bitcast->hasOneUse())
diff --git a/clang/lib/CodeGen/CGExpr.cpp b/clang/lib/CodeGen/CGExpr.cpp
index 26fba751e6f9d..e45992a671c70 100644
--- a/clang/lib/CodeGen/CGExpr.cpp
+++ b/clang/lib/CodeGen/CGExpr.cpp
@@ -3553,7 +3553,7 @@ llvm::Constant *CodeGenFunction::EmitCheckTypeDescriptor(QualType T) {
// So we can write the exact amount of bits in TypeName after '\0'
// making it <diagnostic-like type name>.'\0'.<32-bit width>.
if (T->isSignedIntegerType() && T->getAs<BitIntType>()) {
- // Do a sanity checks as we are using 32-bit type to store bit length.
+ // Do a soundness check as we are using 32-bit type to store bit length.
assert(getContext().getTypeSize(T) > 0 &&
" non positive amount of bits in __BitInt type");
assert(getContext().getTypeSize(T) <= 0xFFFFFFFF &&
diff --git a/clang/lib/CodeGen/CGStmt.cpp b/clang/lib/CodeGen/CGStmt.cpp
index aeff73d525c10..8ba7604882742 100644
--- a/clang/lib/CodeGen/CGStmt.cpp
+++ b/clang/lib/CodeGen/CGStmt.cpp
@@ -2217,7 +2217,7 @@ static bool FindCaseStatementsForValue(const SwitchStmt &S,
// Ok, we know which case is being jumped to, try to collect all the
// statements that follow it. This can fail for a variety of reasons. Also,
// check to see that the recursive walk actually found our case statement.
- // Insane cases like this can fail to find it in the recursive walk since we
+ // Unsound cases like this can fail to find it in the recursive walk since we
// don't handle every stmt kind:
// switch (4) {
// while (1) {
diff --git a/clang/lib/Driver/Driver.cpp b/clang/lib/Driver/Driver.cpp
index f110dbab3e5a5..ef87348e1c6e6 100644
--- a/clang/lib/Driver/Driver.cpp
+++ b/clang/lib/Driver/Driver.cpp
@@ -212,7 +212,7 @@ Driver::Driver(StringRef ClangExecutable, StringRef TargetTriple,
TargetTriple(TargetTriple), Saver(Alloc), PrependArg(nullptr),
PreferredLinker(CLANG_DEFAULT_LINKER), CheckInputsExist(true),
ProbePrecompiled(true), SuppressMissingInputWarning(false) {
- // Provide a sane fallback if no VFS is specified.
+ // Provide a sound fallback if no VFS is specified.
if (!this->VFS)
this->VFS = llvm::vfs::getRealFileSystem();
diff --git a/clang/lib/Frontend/PrintPreprocessedOutput.cpp b/clang/lib/Frontend/PrintPreprocessedOutput.cpp
index 9e046633328d7..2550a46d7d8f8 100644
--- a/clang/lib/Frontend/PrintPreprocessedOutput.cpp
+++ b/clang/lib/Frontend/PrintPreprocessedOutput.cpp
@@ -1148,8 +1148,8 @@ void clang::DoPrintPreprocessedInput(Preprocessor &PP, raw_ostream *OS,
PrintPreprocessedTokens(PP, Tok, Callbacks);
*OS << '\n';
- // Remove the handlers we just added to leave the preprocessor in a sane state
- // so that it can be reused (for example by a clang::Parser instance).
+ // Remove the handlers we just added to leave the preprocessor in a sound
+ // state so that it can be reused (for example by a clang::Parser instance).
PP.RemovePragmaHandler(MicrosoftExtHandler.get());
PP.RemovePragmaHandler("GCC", GCCHandler.get());
PP.RemovePragmaHandler("clang", ClangHandler.get());
diff --git a/clang/lib/Index/USRGeneration.cpp b/clang/lib/Index/USRGeneration.cpp
index c78d66f9502dd..69a6761ac4bae 100644
--- a/clang/lib/Index/USRGeneration.cpp
+++ b/clang/lib/Index/USRGeneration.cpp
@@ -1228,7 +1228,7 @@ bool clang::index::generateUSRForMacro(StringRef MacroName, SourceLocation Loc,
llvm::raw_svector_ostream Out(Buf);
- // Assume that system headers are sane. Don't put source location
+ // Assume that system headers are sound. Don't put source location
// information into the USR if the macro comes from a system header.
bool ShouldGenerateLocation = Loc.isValid() && !SM.isInSystemHeader(Loc);
diff --git a/clang/lib/Parse/ParseStmtAsm.cpp b/clang/lib/Parse/ParseStmtAsm.cpp
index c679aa6fe7b27..a290b83bfb941 100644
--- a/clang/lib/Parse/ParseStmtAsm.cpp
+++ b/clang/lib/Parse/ParseStmtAsm.cpp
@@ -176,9 +176,9 @@ ClangAsmParserCallback::translateLocation(const llvm::SourceMgr &LSM,
unsigned TokIndex = TokOffsetPtr - AsmTokOffsets.begin();
unsigned TokOffset = *TokOffsetPtr;
- // If we come up with an answer which seems sane, use it; otherwise,
+ // If we come up with an answer which seems sound, use it; otherwise,
// just point at the __asm keyword.
- // FIXME: Assert the answer is sane once we handle .macro correctly.
+ // FIXME: Assert the answer is sound once we handle .macro correctly.
SourceLocation Loc = AsmLoc;
if (TokIndex < AsmToks.size()) {
const Token &Tok = AsmToks[TokIndex];
diff --git a/clang/lib/Sema/SemaOpenACC.cpp b/clang/lib/Sema/SemaOpenACC.cpp
index fbd8022cd68ba..33b7d24382bc9 100644
--- a/clang/lib/Sema/SemaOpenACC.cpp
+++ b/clang/lib/Sema/SemaOpenACC.cpp
@@ -2672,7 +2672,7 @@ Expr *GenerateReductionInitRecipeExpr(ASTContext &Context,
// discussions/designs are ongoing on how to express this behavior,
// particularly since they probably need the 'bounds' passed to them
// correctly. A future patch/patch set will go through all of the pointer
- // values for all of the recipes to make sure we have a sane behavior.
+ // values for all of the recipes to make sure we have a sound behavior.
// For now, this will result in a NYI during code generation for
// no-initializer.
diff --git a/clang/lib/Sema/SemaOverload.cpp b/clang/lib/Sema/SemaOverload.cpp
index 14fa8478fe317..f00c353020cb7 100644
--- a/clang/lib/Sema/SemaOverload.cpp
+++ b/clang/lib/Sema/SemaOverload.cpp
@@ -7561,8 +7561,8 @@ bool Sema::diagnoseArgDependentDiagnoseIfAttrs(const FunctionDecl *Function,
*this, Function, /*ArgDependent=*/true, Loc,
[&](const DiagnoseIfAttr *DIA) {
APValue Result;
- // It's sane to use the same Args for any redecl of this function, since
- // EvaluateWithSubstitution only cares about the position of each
+ // It's sound to use the same Args for any redecl of this function,
+ // since EvaluateWithSubstitution only cares about the position of each
// argument in the arg list, not the ParmVarDecl* it maps to.
if (!DIA->getCond()->EvaluateWithSubstitution(
Result, Context, cast<FunctionDecl>(DIA->getParent()), Args, ThisArg))
diff --git a/clang/lib/Sema/SemaTemplateDeduction.cpp b/clang/lib/Sema/SemaTemplateDeduction.cpp
index cce40c0c91f95..55a006e9018a6 100644
--- a/clang/lib/Sema/SemaTemplateDeduction.cpp
+++ b/clang/lib/Sema/SemaTemplateDeduction.cpp
@@ -6167,7 +6167,7 @@ UnresolvedSetIterator Sema::getMostSpecialized(
if (Complain) {
Diag(Loc, AmbigDiag);
- // FIXME: Can we order the candidates in some sane way?
+ // FIXME: Can we order the candidates in some sound way?
for (UnresolvedSetIterator I = SpecBegin; I != SpecEnd; ++I) {
PartialDiagnostic PD = CandidateDiag;
const auto *FD = cast<FunctionDecl>(*I);
diff --git a/clang/lib/StaticAnalyzer/Checkers/ArrayBoundChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/ArrayBoundChecker.cpp
index d35031b5c22df..60789520ec313 100644
--- a/clang/lib/StaticAnalyzer/Checkers/ArrayBoundChecker.cpp
+++ b/clang/lib/StaticAnalyzer/Checkers/ArrayBoundChecker.cpp
@@ -613,7 +613,7 @@ void ArrayBoundChecker::performCheck(const Expr *E, CheckerContext &C) const {
// TODO: Currently the analyzer ignores many casts (e.g. signed ->
// unsigned casts), so it can easily reach states where it will load a
- // signed (and negative) value from an unsigned variable. This sanity
+ // signed (and negative) value from an unsigned variable. This soundness
// check is a duct tape "solution" that silences most of the ugly false
// positives that are caused by this buggy behavior. Note that this is
// not a complete solution: this cannot silence reports where pointer
diff --git a/clang/lib/StaticAnalyzer/Checkers/PthreadLockChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/PthreadLockChecker.cpp
index 86530086ff1b2..0dc52d3c3acbf 100644
--- a/clang/lib/StaticAnalyzer/Checkers/PthreadLockChecker.cpp
+++ b/clang/lib/StaticAnalyzer/Checkers/PthreadLockChecker.cpp
@@ -477,7 +477,7 @@ void PthreadLockChecker::AcquireLockAux(const CallEvent &Call,
SVal RetVal = Call.getReturnValue();
if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) {
// FIXME: If the lock function was inlined and returned true,
- // we need to behave sanely - at least generate sink.
+ // we need to behave soundly - at least generate sink.
lockSucc = state->assume(*DefinedRetVal, false);
assert(lockSucc);
}
diff --git a/clang/test/AST/ByteCode/cxx11.cpp b/clang/test/AST/ByteCode/cxx11.cpp
index 72bc7622eb6d8..abdb8f78ff5bc 100644
--- a/clang/test/AST/ByteCode/cxx11.cpp
+++ b/clang/test/AST/ByteCode/cxx11.cpp
@@ -350,7 +350,7 @@ namespace GH150709 {
constexpr auto mp = static_cast<int (C::*)() const>(&D::f);
- // sanity checks for fix of GH150709 (unchanged behavior)
+ // soundness checks for fix of GH150709 (unchanged behavior)
static_assert((c1.*mp)() == 1, ""); // both-error {{constant expression}}
static_assert((d1.*mp)() == 1, "");
static_assert((f.*mp)() == 1, "");
diff --git a/clang/test/Analysis/return-value-guaranteed.cpp b/clang/test/Analysis/return-value-guaranteed.cpp
index 3b010ffba3600..e89a1e7a7c139 100644
--- a/clang/test/Analysis/return-value-guaranteed.cpp
+++ b/clang/test/Analysis/return-value-guaranteed.cpp
@@ -52,7 +52,7 @@ bool parseFile() {
} // namespace test_normal
-// Sanity check for the highly unlikely case where the implementation of the
+// Soundness check for the highly unlikely case where the implementation of the
// method breaks the convention.
namespace test_break {
struct MCAsmParser {
diff --git a/clang/test/Analysis/std-variant-checker.cpp b/clang/test/Analysis/std-variant-checker.cpp
index 7f136c06b19cc..a7d91b6d73838 100644
--- a/clang/test/Analysis/std-variant-checker.cpp
+++ b/clang/test/Analysis/std-variant-checker.cpp
@@ -45,7 +45,7 @@ using var_tt = var_t;
using int_t = int;
using char_t = char;
-// A quick sanity check to see that std::variant's std::get
+// A quick soundness check to see that std::variant's std::get
// is not being confused with std::pairs std::get.
void wontConfuseStdGets() {
std::pair<int, char> p{15, '1'};
diff --git a/clang/test/CodeGen/AArch64/inline-asm.c b/clang/test/CodeGen/AArch64/inline-asm.c
index 8ddee560b11da..5f1fe99131004 100644
--- a/clang/test/CodeGen/AArch64/inline-asm.c
+++ b/clang/test/CodeGen/AArch64/inline-asm.c
@@ -2,7 +2,7 @@
// The only part clang really deals with is the lvalue/rvalue
// distinction on constraints. It's sufficient to emit llvm and make
-// sure that's sane.
+// sure that's sound.
long var;
diff --git a/clang/test/CodeGen/alloc-align-attr.c b/clang/test/CodeGen/alloc-align-attr.c
index c4c4e76eaaa04..3a0d2ca771e78 100644
--- a/clang/test/CodeGen/alloc-align-attr.c
+++ b/clang/test/CodeGen/alloc-align-attr.c
@@ -71,7 +71,7 @@ __INT32_TYPE__ test4(__SIZE_TYPE__ a) {
struct Empty {};
struct MultiArgs { __INT64_TYPE__ a, b;};
// Struct parameter doesn't take up an IR parameter, 'i' takes up 1.
-// Truncation to i64 is permissible, since alignments of greater than 2^64 are insane.
+// Truncation to i64 is permissible, since alignments of greater than 2^64 are unsound.
__INT32_TYPE__ *m3(struct Empty s, __int128_t i) __attribute__((alloc_align(2)));
// CHECK-LABEL: @test5(
// CHECK-NEXT: entry:
diff --git a/clang/test/CodeGen/arm-target-features.c b/clang/test/CodeGen/arm-target-features.c
index 95ae27bd2db6c..63fd459154d0a 100644
--- a/clang/test/CodeGen/arm-target-features.c
+++ b/clang/test/CodeGen/arm-target-features.c
@@ -63,7 +63,7 @@
// CHECK-THUMB-DIV-M3: "target-features"="+armv7-m,+hwdiv,+thumb-mode"
// (The following test with no arch specified shouldn't happen; the driver
-// rewrites triples. Just make sure it does something sane.)
+// rewrites triples. Just make sure it does something sound.)
// RUN: %clang_cc1 -triple arm-linux-gnueabi -emit-llvm -o - %s | FileCheck %s --check-prefix=CHECK-ARM-NOARCH-LINUX
// CHECK-ARM-NOARCH-LINUX: "target-features"="-thumb-mode"
diff --git a/clang/test/CodeGen/atomic-ops.c b/clang/test/CodeGen/atomic-ops.c
index b6060dcc540f9..84158b85cf691 100644
--- a/clang/test/CodeGen/atomic-ops.c
+++ b/clang/test/CodeGen/atomic-ops.c
@@ -600,7 +600,7 @@ void generalWeakness(int *ptr, int *ptr2, _Bool weak) {
}
// Having checked the flow in the previous two cases, we'll trust clang to
-// combine them sanely.
+// combine them soundly.
void EMIT_ALL_THE_THINGS(int *ptr, int *ptr2, int new, _Bool weak, int success, int fail) {
__atomic_compare_exchange(ptr, ptr2, &new, weak, success, fail);
diff --git a/clang/test/CodeGen/strictfp-elementwise-builtins.cpp b/clang/test/CodeGen/strictfp-elementwise-builtins.cpp
index b250512efc5c7..076f6e9ec409a 100644
--- a/clang/test/CodeGen/strictfp-elementwise-builtins.cpp
+++ b/clang/test/CodeGen/strictfp-elementwise-builtins.cpp
@@ -6,7 +6,7 @@
typedef float float4 __attribute__((ext_vector_type(4)));
-// Sanity check we're getting constrained ops for a non-builtin.
+// Soundness check we're getting constrained ops for a non-builtin.
// CHECK-LABEL: define dso_local noundef <4 x float> @_Z11strict_faddDv4_fS_
// CHECK-SAME: (<4 x float> noundef [[A:%.*]], <4 x float> noundef [[B:%.*]]) local_unnamed_addr #[[ATTR0:[0-9]+]] {
// CHECK-NEXT: entry:
diff --git a/clang/test/CodeGen/union-init2.c b/clang/test/CodeGen/union-init2.c
index ee35e78a4f301..79f481240d0bc 100644
--- a/clang/test/CodeGen/union-init2.c
+++ b/clang/test/CodeGen/union-init2.c
@@ -1,7 +1,7 @@
// RUN: %clang_cc1 -emit-llvm %s -o - -triple i686-pc-linux-gnu | FileCheck %s
// RUN: %clang_cc1 -x c++ %s -emit-llvm -triple x86_64-linux-gnu -o - | FileCheck %s --check-prefixes=CHECK-CXX
-// Make sure we generate something sane instead of a ptrtoint
+// Make sure we generate something sound instead of a ptrtoint
// CHECK: @r, [4 x i8] zeroinitializer
union x {long long b;union x* a;} r = {.a = &r};
diff --git a/clang/test/CodeGenCXX/OmitRTTIComponentABI/simple-vtable-definition.cpp b/clang/test/CodeGenCXX/OmitRTTIComponentABI/simple-vtable-definition.cpp
index 75fd72af11d72..a2177cc9d6163 100644
--- a/clang/test/CodeGenCXX/OmitRTTIComponentABI/simple-vtable-definition.cpp
+++ b/clang/test/CodeGenCXX/OmitRTTIComponentABI/simple-vtable-definition.cpp
@@ -15,7 +15,7 @@
// RELATIVE: @_ZTV1A = unnamed_addr alias { [2 x i32] }, ptr @_ZTV1A.local
/// None of these supplementary symbols should be emitted with -fno-rtti, but
-/// as a sanity check lets make sure they're not emitted also.
+/// as a soundness check lets make sure they're not emitted also.
// RTTI-NOT: @_ZTVN10__cxxabiv117__class_type_infoE
// RTTI-NOT: @_ZTS1A
// RTTI-NOT: @_ZTI1A
diff --git a/clang/test/CodeGenCXX/cxx11-user-defined-literal.cpp b/clang/test/CodeGenCXX/cxx11-user-defined-literal.cpp
index c8ab43194350e..0073c15c0ad76 100644
--- a/clang/test/CodeGenCXX/cxx11-user-defined-literal.cpp
+++ b/clang/test/CodeGenCXX/cxx11-user-defined-literal.cpp
@@ -37,7 +37,7 @@ void f() {
123_r, 4.9_r, 0xffff\
eeee_r;
- // FIXME: This mangling is insane. Maybe we should have a special case for
+ // FIXME: This mangling is unsound. Maybe we should have a special case for
// char parameter packs?
// CHECK: call void @_Zli2_tIJLc48ELc120ELc49ELc50ELc51ELc52ELc53ELc54ELc55ELc56EEE1Sv({{.*}})
// CHECK: call void @_ZN1SD1Ev({{.*}})
diff --git a/clang/test/CodeGenCXX/type-aware-allocators.cpp b/clang/test/CodeGenCXX/type-aware-allocators.cpp
index cce9197ed0d12..839d842382184 100644
--- a/clang/test/CodeGenCXX/type-aware-allocators.cpp
+++ b/clang/test/CodeGenCXX/type-aware-allocators.cpp
@@ -19,7 +19,7 @@ namespace std {
using size_t = __SIZE_TYPE__;
-// Sanity check to esure the semantics of the selected compiler mode
+// Soundness check to esure the semantics of the selected compiler mode
// will trigger the exception handlers we are expecting, before
// involving type aware allocation.
// We duplicate the struct definitions so we don't trigger diagnostics
diff --git a/clang/test/CodeGenHLSL/GlobalDestructors.hlsl b/clang/test/CodeGenHLSL/GlobalDestructors.hlsl
index 9d8c2e65a9598..3ad8f386b3a37 100644
--- a/clang/test/CodeGenHLSL/GlobalDestructors.hlsl
+++ b/clang/test/CodeGenHLSL/GlobalDestructors.hlsl
@@ -75,7 +75,7 @@ void main(unsigned GI : SV_GroupIndex) {
// INLINE-NOT: call {{[^@]*}} @{{[^l][^l][^v][^m][^\.]}}
// INLINE: ret void
-// This is really just a sanity check I needed for myself to verify that
+// This is really just a soundness check I needed for myself to verify that
// function scope static variables also get destroyed properly.
// NOINLINE-DXIL: define internal void @_GLOBAL__D_a() [[IntAttr:\#[0-9]+]]
diff --git a/clang/test/CodeGenHLSL/RootSignature.hlsl b/clang/test/CodeGenHLSL/RootSignature.hlsl
index bc40bdd79ce59..00b2cace26e7b 100644
--- a/clang/test/CodeGenHLSL/RootSignature.hlsl
+++ b/clang/test/CodeGenHLSL/RootSignature.hlsl
@@ -101,7 +101,7 @@ void RootDescriptorsEntry() {}
[numthreads(1,1,1)]
void StaticSamplerEntry() {}
-// Sanity test to ensure no root is added for this function as there is only
+// Soundness test to ensure no root is added for this function as there is only
// two entries in !dx.roosignatures
[shader("compute")]
[numthreads(1,1,1)]
diff --git a/clang/test/Driver/aix-as.c b/clang/test/Driver/aix-as.c
index 4164348b60127..4923b59f10a6b 100644
--- a/clang/test/Driver/aix-as.c
+++ b/clang/test/Driver/aix-as.c
@@ -1,4 +1,4 @@
-// General tests that as(1) invocations on AIX targets are sane. Note that we
+// General tests that as(1) invocations on AIX targets are sound. Note that we
// only test assembler functionalities in this suite.
// Check powerpc-ibm-aix7.1.0.0, system assembler is used for assembly files, 32-bit.
diff --git a/clang/test/Driver/aix-ld.c b/clang/test/Driver/aix-ld.c
index 1dae61d91c4e3..abafbed4327e3 100644
--- a/clang/test/Driver/aix-ld.c
+++ b/clang/test/Driver/aix-ld.c
@@ -1,4 +1,4 @@
-// General tests that ld invocations on AIX targets are sane. Note that we use
+// General tests that ld invocations on AIX targets are sound. Note that we use
// sysroot to make these tests independent of the host system.
// Check powerpc-ibm-aix7.1.0.0, 32-bit.
diff --git a/clang/test/Driver/as-dwarf-cie.s b/clang/test/Driver/as-dwarf-cie.s
index 1ffb23cb05d36..d9bdcc2a96d18 100644
--- a/clang/test/Driver/as-dwarf-cie.s
+++ b/clang/test/Driver/as-dwarf-cie.s
@@ -1,5 +1,5 @@
# REQUIRES: x86-registered-target
-# Test that there is a sane default CIE version.
+# Test that there is a sound default CIE version.
# RUN: %clang -cc1as -triple i386-apple-darwin -filetype obj %s -o %t
# RUN: llvm-objdump --dwarf=frames %t | FileCheck %s
# CHECK: .debug_frame contents:
diff --git a/clang/test/Driver/fopenmp.c b/clang/test/Driver/fopenmp.c
index 7d343eeee0f3f..7c5e45efe5860 100644
--- a/clang/test/Driver/fopenmp.c
+++ b/clang/test/Driver/fopenmp.c
@@ -178,7 +178,7 @@
// CHECK-CC1-OPENMPIRBUILDER-SAME: "-fopenmp"
// CHECK-CC1-OPENMPIRBUILDER-SAME: "-fopenmp-enable-irbuilder"
//
-// We'd like to check that the default is sane, but until we have the ability
+// We'd like to check that the default is sound, but until we have the ability
// to *always* semantically analyze OpenMP without always generating runtime
// calls (in the event of an unsupported runtime), we don't have a good way to
// test the CC1 invocation. Instead, just ensure we do eventually link *some*
diff --git a/clang/test/Driver/linux-header-search.cpp b/clang/test/Driver/linux-header-search.cpp
index 70a85deac89e4..312c800d692a1 100644
--- a/clang/test/Driver/linux-header-search.cpp
+++ b/clang/test/Driver/linux-header-search.cpp
@@ -1,5 +1,5 @@
// General tests that the header search paths detected by the driver and passed
-// to CC1 are sane.
+// to CC1 are sound.
//
// Test a simulated installation of libc++ on Linux, both through sysroot and
// the installation path of Clang.
diff --git a/clang/test/Driver/linux-ld.c b/clang/test/Driver/linux-ld.c
index be3293cdc253e..f0f74d05ef6f3 100644
--- a/clang/test/Driver/linux-ld.c
+++ b/clang/test/Driver/linux-ld.c
@@ -1,5 +1,5 @@
// UNSUPPORTED: system-windows
-// General tests that ld invocations on Linux targets sane. Note that we use
+// General tests that ld invocations on Linux targets sound. Note that we use
// sysroot to make these tests independent of the host system.
//
// RUN: %clang -### -Werror %s -no-pie 2>&1 \
diff --git a/clang/test/Driver/solaris-ld-values.c b/clang/test/Driver/solaris-ld-values.c
index 6f0a5b5957f01..4de1caeebf314 100644
--- a/clang/test/Driver/solaris-ld-values.c
+++ b/clang/test/Driver/solaris-ld-values.c
@@ -1,5 +1,5 @@
// General tests that the correct versions of values-*.o are used on
-// Solaris targets sane. Note that we use sysroot to make these tests
+// Solaris targets sound. Note that we use sysroot to make these tests
// independent of the host system.
// Check sparc-sun-solaris2.11, 32bit
diff --git a/clang/test/Driver/solaris-ld-values.cpp b/clang/test/Driver/solaris-ld-values.cpp
index 566252f551d51..17115967fa3c2 100644
--- a/clang/test/Driver/solaris-ld-values.cpp
+++ b/clang/test/Driver/solaris-ld-values.cpp
@@ -1,5 +1,5 @@
// General tests that the correct versions of values-*.o are used on
-// Solaris targets sane. Note that we use sysroot to make these tests
+// Solaris targets sound. Note that we use sysroot to make these tests
// independent of the host system.
// Check sparc-sun-solaris2.11, 32bit
diff --git a/clang/test/Driver/solaris-ld.c b/clang/test/Driver/solaris-ld.c
index 5940ee2add769..ea09dbfd6895d 100644
--- a/clang/test/Driver/solaris-ld.c
+++ b/clang/test/Driver/solaris-ld.c
@@ -1,4 +1,4 @@
-// General tests that ld invocations on Solaris targets sane. Note that we use
+// General tests that ld invocations on Solaris targets sound. Note that we use
// sysroot to make these tests independent of the host system.
// Check sparc-sun-solaris2.11, 32bit
diff --git a/clang/test/PCH/floating-literal.c b/clang/test/PCH/floating-literal.c
index b5ff6fe84b88c..bb0e0c1730f76 100644
--- a/clang/test/PCH/floating-literal.c
+++ b/clang/test/PCH/floating-literal.c
@@ -10,7 +10,7 @@
long double foo = 1.0E4000L;
// CHECK: long double foo = 1.00000000000000000000000000000000004E+4000L;
-// Just as well check the others are still sane while we're here...
+// Just as well check the others are still sound while we're here...
double bar = 1.0E300;
// CHECK: double bar = 1.0000000000000001E+300;
diff --git a/clang/test/SemaCXX/constant-expression-cxx11.cpp b/clang/test/SemaCXX/constant-expression-cxx11.cpp
index 91c4ff1cb520d..a211277bcb023 100644
--- a/clang/test/SemaCXX/constant-expression-cxx11.cpp
+++ b/clang/test/SemaCXX/constant-expression-cxx11.cpp
@@ -2633,7 +2633,7 @@ namespace GH150709 {
constexpr auto mp = static_cast<int (C::*)() const>(&D::f);
- // sanity checks for fix of GH150709 (unchanged behavior)
+ // soundness checks for fix of GH150709 (unchanged behavior)
static_assert((c1.*mp)() == 1, ""); // expected-error {{constant expression}}
static_assert((d1.*mp)() == 1, "");
static_assert((f.*mp)() == 1, "");
diff --git a/clang/test/SemaCXX/constant-expression-cxx14.cpp b/clang/test/SemaCXX/constant-expression-cxx14.cpp
index 1743e0e3ac4b5..87df31b40910d 100644
--- a/clang/test/SemaCXX/constant-expression-cxx14.cpp
+++ b/clang/test/SemaCXX/constant-expression-cxx14.cpp
@@ -1234,7 +1234,7 @@ namespace ObjectsUnderConstruction {
};
constexpr Aggregate aggr1;
static_assert(aggr1.x == 1 && aggr1.y == 1, "");
- // FIXME: This is not specified by the standard, but sanity requires it.
+ // FIXME: This is not specified by the standard, but soundness requires it.
constexpr Aggregate aggr2 = {};
static_assert(aggr2.x == 1 && aggr2.y == 1, "");
diff --git a/clang/test/SemaCXX/enable_if.cpp b/clang/test/SemaCXX/enable_if.cpp
index 1c307881e5d4a..7afca4fade4b0 100644
--- a/clang/test/SemaCXX/enable_if.cpp
+++ b/clang/test/SemaCXX/enable_if.cpp
@@ -387,7 +387,7 @@ void runFoo() {
}
}
-// Ideally, we should be able to handle value-dependent expressions sanely.
+// Ideally, we should be able to handle value-dependent expressions soundly.
// Sadly, that isn't the case at the moment.
namespace dependent {
int error(int N) __attribute__((enable_if(N, ""))); // expected-note{{candidate disabled}}
diff --git a/clang/test/SemaCXX/overload-resolution-deferred-templates.cpp b/clang/test/SemaCXX/overload-resolution-deferred-templates.cpp
index 135865c8450f5..36176cb45f326 100644
--- a/clang/test/SemaCXX/overload-resolution-deferred-templates.cpp
+++ b/clang/test/SemaCXX/overload-resolution-deferred-templates.cpp
@@ -22,7 +22,7 @@ struct Invalid { static_assert(false, "instantiated Invalid"); }; // #err-invali
template <typename T>
int f(T a, Invalid<T> = {}); // #note-f
-// sanity check
+// soundness check
int e1 = f(0);
//expected-error@#err-invalid {{static assertion failed: instantiated Invalid}}
//expected-note at -2 {{in instantiation of default function argument expression for 'f<int>' required here}}
diff --git a/clang/test/SemaCXX/vtable_pointer_authentication_attribute.cpp b/clang/test/SemaCXX/vtable_pointer_authentication_attribute.cpp
index 390305f5cb73d..a1084d6393fd9 100644
--- a/clang/test/SemaCXX/vtable_pointer_authentication_attribute.cpp
+++ b/clang/test/SemaCXX/vtable_pointer_authentication_attribute.cpp
@@ -5,7 +5,7 @@ namespace basic {
#define authenticated(a, b, c...) [[clang::ptrauth_vtable_pointer(a, b, c)]]
-// Basic sanity tests
+// Basic soundness tests
#define TEST_AUTH(name, auth...) \
struct [[clang::ptrauth_vtable_pointer(auth)]] name { \
virtual ~name() {} \
@@ -90,7 +90,7 @@ UnauthedPolymorphicTemplateClass<ValidPolymorphic> test7;
UnauthedPolymorphicTemplateClass<ValidMonomorphic> test8;
// Just use a different policy from the generic macro to verify we won't complain
-// about the insanity
+// about the unsoundness
struct authenticated(process_independent, no_address_discrimination, type_discrimination) SecondAuthenticatedPolymorphic {
virtual ~SecondAuthenticatedPolymorphic(){};
};
diff --git a/clang/test/SemaTemplate/canonical-expr-type.cpp b/clang/test/SemaTemplate/canonical-expr-type.cpp
index f8d7d7ec1a271..cbd5740495ad6 100644
--- a/clang/test/SemaTemplate/canonical-expr-type.cpp
+++ b/clang/test/SemaTemplate/canonical-expr-type.cpp
@@ -12,7 +12,7 @@ void f0(T x, __typeof__((f)(x)) y) { }
template<typename U>
void f0(U u, __typeof__(f(u))) { } // expected-error{{redefinition}}
-// Test insane typeof(expr) overload set canonicalization
+// Test unsound typeof(expr) overload set canonicalization
void f(int);
void f(double);
diff --git a/clang/test/utils/update_cc_test_checks/check-globals.test b/clang/test/utils/update_cc_test_checks/check-globals.test
index 5f527fa122322..f5a5f6eb1ed22 100644
--- a/clang/test/utils/update_cc_test_checks/check-globals.test
+++ b/clang/test/utils/update_cc_test_checks/check-globals.test
@@ -31,7 +31,7 @@ RUN: rm %t/igf-again.c
RUN: cp %S/Inputs/lit.cfg.example %t/lit.cfg
# Show lit failures while avoiding confusing FileCheck input dump nesting.
RUN: %lit %t
-# Lit was successful. Sanity-check the results with deterministic test order.
+# Lit was successful. Soundness-check the results with deterministic test order.
RUN: rm %t/.lit_test_times.txt
RUN: %lit %t 2>&1 | FileCheck -check-prefix=LIT-RUN %s
diff --git a/clang/test/utils/update_cc_test_checks/global-hex-value-regex.test b/clang/test/utils/update_cc_test_checks/global-hex-value-regex.test
index 6ff06b4028d82..94d4df1d4c304 100644
--- a/clang/test/utils/update_cc_test_checks/global-hex-value-regex.test
+++ b/clang/test/utils/update_cc_test_checks/global-hex-value-regex.test
@@ -11,7 +11,7 @@ RUN: diff -u %S/Inputs/global-hex-value-regex.c.expected %t/test.c
RUN: cp %S/Inputs/lit.cfg.example %t/lit.cfg
# Show lit failures while avoiding confusing FileCheck input dump nesting.
RUN: %lit %t
-# Lit was successful. Sanity-check the results with deterministic test order.
+# Lit was successful. Soundness-check the results with deterministic test order.
RUN: rm %t/.lit_test_times.txt
RUN: %lit %t 2>&1 | FileCheck %s
diff --git a/clang/test/utils/update_cc_test_checks/global-value-regex.test b/clang/test/utils/update_cc_test_checks/global-value-regex.test
index 33103e101794d..d3b99d55038ee 100644
--- a/clang/test/utils/update_cc_test_checks/global-value-regex.test
+++ b/clang/test/utils/update_cc_test_checks/global-value-regex.test
@@ -10,7 +10,7 @@ RUN: diff -u %S/Inputs/global-value-regex.c.expected %t/test.c
RUN: cp %S/Inputs/lit.cfg.example %t/lit.cfg
# Show lit failures while avoiding confusing FileCheck input dump nesting.
RUN: %lit %t
-# Lit was successful. Sanity-check the results with deterministic test order.
+# Lit was successful. Soundness-check the results with deterministic test order.
RUN: rm %t/.lit_test_times.txt
RUN: %lit %t 2>&1 | FileCheck %s
diff --git a/clang/unittests/Analysis/CFGTest.cpp b/clang/unittests/Analysis/CFGTest.cpp
index 46a6751391cf5..83e696c26f454 100644
--- a/clang/unittests/Analysis/CFGTest.cpp
+++ b/clang/unittests/Analysis/CFGTest.cpp
@@ -141,7 +141,7 @@ TEST(CFG, ElementRefIterator) {
constexpr CFGBlock::ref_iterator::difference_type MainBlockSize = 4;
- // The rest of this test looks totally insane, but there iterators are
+ // The rest of this test looks totally unsound, but there iterators are
// templates under the hood, to it's important to instantiate everything for
// proper converage.
diff --git a/clang/unittests/Basic/SourceManagerTest.cpp b/clang/unittests/Basic/SourceManagerTest.cpp
index 04b23dd13ba3e..eb48caad2b6db 100644
--- a/clang/unittests/Basic/SourceManagerTest.cpp
+++ b/clang/unittests/Basic/SourceManagerTest.cpp
@@ -197,7 +197,7 @@ TEST_F(SourceManagerTest, isBeforeInTranslationUnitWithTokenSplit) {
// Make sure we got the tokens that we expected.
ASSERT_EQ(4U, toks.size()) << "a >> b c";
- // Sanity check their order.
+ // Soundness check their order.
for (unsigned I = 0; I < toks.size() - 1; ++I) {
EXPECT_TRUE(SourceMgr.isBeforeInTranslationUnit(toks[I].getLocation(),
toks[I + 1].getLocation()));
diff --git a/clang/utils/TableGen/ClangAttrEmitter.cpp b/clang/utils/TableGen/ClangAttrEmitter.cpp
index d63e79a5f5155..d70b814d1f071 100644
--- a/clang/utils/TableGen/ClangAttrEmitter.cpp
+++ b/clang/utils/TableGen/ClangAttrEmitter.cpp
@@ -1846,7 +1846,7 @@ enum class LateAttrParseKind { Never = 0, Standard = 1, ExperimentalExt = 2 };
static LateAttrParseKind getLateAttrParseKind(const Record *Attr) {
// This function basically does
// `Attr->getValueAsDef("LateParsed")->getValueAsInt("Kind")` but does a bunch
- // of sanity checking to ensure that `LateAttrParseMode` in `Attr.td` is in
+ // of soundness checking to ensure that `LateAttrParseMode` in `Attr.td` is in
// sync with the `LateAttrParseKind` enum in this source file.
static constexpr StringRef LateParsedStr = "LateParsed";
diff --git a/cmake/Modules/EnableLanguageNolink.cmake b/cmake/Modules/EnableLanguageNolink.cmake
index 18668c6d0476f..fdd115966de91 100644
--- a/cmake/Modules/EnableLanguageNolink.cmake
+++ b/cmake/Modules/EnableLanguageNolink.cmake
@@ -1,7 +1,7 @@
macro(llvm_enable_language_nolink)
# Set CMAKE_TRY_COMPILE_TARGET_TYPE to STATIC_LIBRARY to disable linking
- # in the compiler sanity checks. When bootstrapping the toolchain,
- # the toolchain itself is still incomplete and sanity checks that include
+ # in the compiler soundness checks. When bootstrapping the toolchain,
+ # the toolchain itself is still incomplete and soundness checks that include
# linking may fail.
set(__SAVED_TRY_COMPILE_TARGET_TYPE ${CMAKE_TRY_COMPILE_TARGET_TYPE})
set(CMAKE_TRY_COMPILE_TARGET_TYPE STATIC_LIBRARY)
diff --git a/compiler-rt/cmake/Modules/CompilerRTDarwinUtils.cmake b/compiler-rt/cmake/Modules/CompilerRTDarwinUtils.cmake
index c6777bda9f0d1..6b89b42eb47e7 100644
--- a/compiler-rt/cmake/Modules/CompilerRTDarwinUtils.cmake
+++ b/compiler-rt/cmake/Modules/CompilerRTDarwinUtils.cmake
@@ -72,7 +72,7 @@ function(find_darwin_sdk_version var sdk_name)
message(FATAL_ERROR
"Failed to determine SDK version for \"${sdk_name}\" SDK")
endif()
- # Check reported version looks sane.
+ # Check reported version looks sound.
if (NOT "${var_internal}" MATCHES "^[0-9]+\\.[0-9]+(\\.[0-9]+)?$")
message(FATAL_ERROR
"Reported SDK version \"${var_internal}\" does not look like a version")
diff --git a/compiler-rt/cmake/Modules/CompilerRTUtils.cmake b/compiler-rt/cmake/Modules/CompilerRTUtils.cmake
index 03db38fa4cdc1..d124ee3d183f5 100644
--- a/compiler-rt/cmake/Modules/CompilerRTUtils.cmake
+++ b/compiler-rt/cmake/Modules/CompilerRTUtils.cmake
@@ -275,7 +275,7 @@ function(get_compiler_rt_root_source_dir ROOT_DIR_VAR)
message(FATAL_ERROR "Path \"${ROOT_DIR}\" doesn't exist")
endif()
- # Sanity check: Make sure we can locate the current source file via the
+ # Soundness check: Make sure we can locate the current source file via the
# computed path.
set(PATH_TO_CURRENT_FILE "${ROOT_DIR}/cmake/Modules/CompilerRTUtils.cmake")
if (NOT EXISTS "${PATH_TO_CURRENT_FILE}")
diff --git a/compiler-rt/lib/asan/asan_internal.h b/compiler-rt/lib/asan/asan_internal.h
index 35c887eaf851c..129499dbb6b1e 100644
--- a/compiler-rt/lib/asan/asan_internal.h
+++ b/compiler-rt/lib/asan/asan_internal.h
@@ -91,7 +91,7 @@ bool PlatformUnpoisonStacks();
// asan_rtl.cpp
// Unpoison a region containing a stack.
-// Performs a sanity check and warns if the bounds don't look right.
+// Performs a soundness check and warns if the bounds don't look right.
// The warning contains the type string to identify the stack type.
void UnpoisonStack(uptr bottom, uptr top, const char *type);
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 897a2be13e242..85f73b496ebf9 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -494,7 +494,7 @@ void __sanitizer_annotate_contiguous_container(const void *beg_p,
old_end, new_end, &stack);
}
CHECK_LE(storage_end - storage_beg,
- FIRST_32_SECOND_64(1UL << 30, 1ULL << 40)); // Sanity check.
+ FIRST_32_SECOND_64(1UL << 30, 1ULL << 40)); // Soundness check.
if (old_end == new_end)
return; // Nothing to do here.
@@ -508,7 +508,7 @@ void __sanitizer_annotate_contiguous_container(const void *beg_p,
// uptr d2 = RoundUpTo(old_mid, granularity);
// Currently we should be in this state:
// [a, d1) is good, [d2, c) is bad, [d1, d2) is partially good.
- // Make a quick sanity check that we are indeed in this state.
+ // Make a quick soundness check that we are indeed in this state.
//
// FIXME: Two of these three checks are disabled until we fix
// https://github.com/google/sanitizers/issues/258.
@@ -568,7 +568,7 @@ void __sanitizer_annotate_double_ended_contiguous_container(
storage_beg, storage_end, old_beg, old_end, new_beg, new_end, &stack);
}
CHECK_LE(storage_end - storage_beg,
- FIRST_32_SECOND_64(1UL << 30, 1ULL << 40)); // Sanity check.
+ FIRST_32_SECOND_64(1UL << 30, 1ULL << 40)); // Soundness check.
if ((old_beg == old_end && new_beg == new_end) ||
(old_beg == new_beg && old_end == new_end))
diff --git a/compiler-rt/lib/asan/asan_stats.cpp b/compiler-rt/lib/asan/asan_stats.cpp
index 78cb30ec763d8..aa5e19270d7de 100644
--- a/compiler-rt/lib/asan/asan_stats.cpp
+++ b/compiler-rt/lib/asan/asan_stats.cpp
@@ -140,7 +140,7 @@ uptr __sanitizer_get_current_allocated_bytes() {
GetAccumulatedStats(&stats);
uptr malloced = stats.malloced;
uptr freed = stats.freed;
- // Return sane value if malloced < freed due to racy
+ // Return sound value if malloced < freed due to racy
// way we update accumulated stats.
return (malloced > freed) ? malloced - freed : 0;
}
@@ -159,7 +159,7 @@ uptr __sanitizer_get_free_bytes() {
+ stats.really_freed;
uptr total_used = stats.malloced
+ stats.malloced_redzones;
- // Return sane value if total_free < total_used due to racy
+ // Return sound value if total_free < total_used due to racy
// way we update accumulated stats.
return (total_free > total_used) ? total_free - total_used : 0;
}
diff --git a/compiler-rt/lib/builtins/negdi2.c b/compiler-rt/lib/builtins/negdi2.c
index 714ac8ca66d30..c6953b5ba921e 100644
--- a/compiler-rt/lib/builtins/negdi2.c
+++ b/compiler-rt/lib/builtins/negdi2.c
@@ -15,7 +15,7 @@
// Returns: -a
COMPILER_RT_ABI di_int __negdi2(di_int a) {
- // Note: this routine is here for API compatibility; any sane compiler
+ // Note: this routine is here for API compatibility; any sound compiler
// should expand it inline.
return -(du_int)a;
}
diff --git a/compiler-rt/lib/builtins/negti2.c b/compiler-rt/lib/builtins/negti2.c
index ab6e09ded819f..aade83074cdc6 100644
--- a/compiler-rt/lib/builtins/negti2.c
+++ b/compiler-rt/lib/builtins/negti2.c
@@ -17,7 +17,7 @@
// Returns: -a
COMPILER_RT_ABI ti_int __negti2(ti_int a) {
- // Note: this routine is here for API compatibility; any sane compiler
+ // Note: this routine is here for API compatibility; any sound compiler
// should expand it inline.
return -(tu_int)a;
}
diff --git a/compiler-rt/lib/fuzzer/tests/FuzzerUnittest.cpp b/compiler-rt/lib/fuzzer/tests/FuzzerUnittest.cpp
index 5315a8ec0167d..bf706ce0f0510 100644
--- a/compiler-rt/lib/fuzzer/tests/FuzzerUnittest.cpp
+++ b/compiler-rt/lib/fuzzer/tests/FuzzerUnittest.cpp
@@ -647,7 +647,7 @@ TEST(Corpus, Distribution) {
Hist[C->ChooseUnitIdxToMutate(Rand)]++;
}
for (size_t i = 0; i < N; i++) {
- // A weak sanity check that every unit gets invoked.
+ // A weak soundness check that every unit gets invoked.
EXPECT_GT(Hist[i], TriesPerUnit / N / 3);
}
}
diff --git a/compiler-rt/lib/hwasan/hwasan_linux.cpp b/compiler-rt/lib/hwasan/hwasan_linux.cpp
index 68651d3d39d03..c9cbfa5f55e89 100644
--- a/compiler-rt/lib/hwasan/hwasan_linux.cpp
+++ b/compiler-rt/lib/hwasan/hwasan_linux.cpp
@@ -251,7 +251,7 @@ bool InitShadow() {
// High memory starts where allocated shadow allows.
kHighMemStart = ShadowToMem(kHighShadowStart);
- // Check the sanity of the defined memory ranges (there might be gaps).
+ // Check the soundness of the defined memory ranges (there might be gaps).
CHECK_EQ(kHighMemStart % GetMmapGranularity(), 0);
CHECK_GT(kHighMemStart, kHighShadowEnd);
CHECK_GT(kHighShadowEnd, kHighShadowStart);
diff --git a/compiler-rt/lib/memprof/memprof_stats.cpp b/compiler-rt/lib/memprof/memprof_stats.cpp
index c8faebfa12de1..a3fa3470197e7 100644
--- a/compiler-rt/lib/memprof/memprof_stats.cpp
+++ b/compiler-rt/lib/memprof/memprof_stats.cpp
@@ -131,7 +131,7 @@ uptr __sanitizer_get_current_allocated_bytes() {
GetAccumulatedStats(&stats);
uptr malloced = stats.malloced;
uptr freed = stats.freed;
- // Return sane value if malloced < freed due to racy
+ // Return sound value if malloced < freed due to racy
// way we update accumulated stats.
return (malloced > freed) ? malloced - freed : 1;
}
@@ -147,7 +147,7 @@ uptr __sanitizer_get_free_bytes() {
GetAccumulatedStats(&stats);
uptr total_free = stats.mmaped - stats.munmaped + stats.really_freed;
uptr total_used = stats.malloced;
- // Return sane value if total_free < total_used due to racy
+ // Return sound value if total_free < total_used due to racy
// way we update accumulated stats.
return (total_free > total_used) ? total_free - total_used : 1;
}
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc b/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc
index 673f284b6a043..5ca5f8f48eb8e 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc
@@ -539,7 +539,7 @@ static bool ioctl_decode(unsigned req, ioctl_desc *desc) {
desc->req = req;
desc->name = "<DECODED_IOCTL>";
desc->size = IOC_SIZE(req);
- // Sanity check.
+ // Soundness check.
if (desc->size > 0xFFFF) return false;
unsigned dir = IOC_DIR(req);
switch (dir) {
@@ -560,7 +560,7 @@ static bool ioctl_decode(unsigned req, ioctl_desc *desc) {
}
// Size can be 0 iff type is NONE.
if ((desc->type == IOC_NONE) != (desc->size == 0)) return false;
- // Sanity check.
+ // Soundness check.
if (IOC_TYPE(req) == 0) return false;
return true;
}
@@ -572,8 +572,8 @@ static const ioctl_desc *ioctl_lookup(unsigned req) {
// Try stripping access size from the request id.
desc = ioctl_table_lookup(req & ~(IOC_SIZEMASK << IOC_SIZESHIFT));
- // Sanity check: requests that encode access size are either read or write and
- // have size of 0 in the table.
+ // Soundness check: requests that encode access size are either read or write
+ // and have size of 0 in the table.
if (desc && desc->size == 0 &&
(desc->type == ioctl_desc::READWRITE || desc->type == ioctl_desc::WRITE ||
desc->type == ioctl_desc::READ))
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_flag_parser.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_flag_parser.cpp
index ca37df348580a..0d12e52ddd242 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_flag_parser.cpp
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_flag_parser.cpp
@@ -120,7 +120,7 @@ void FlagParser::parse_flags(const char *env_option_name) {
parse_flag(env_option_name);
}
- // Do a sanity check for certain flags.
+ // Do a soundness check for certain flags.
if (common_flags_dont_use.malloc_context_size < 1)
common_flags_dont_use.malloc_context_size = 1;
}
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_interceptors_ioctl_netbsd.inc b/compiler-rt/lib/sanitizer_common/sanitizer_interceptors_ioctl_netbsd.inc
index 16b2a10d8b069..3ba177af11ddd 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_interceptors_ioctl_netbsd.inc
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_interceptors_ioctl_netbsd.inc
@@ -1455,7 +1455,7 @@ static bool ioctl_decode(unsigned req, ioctl_desc *desc) {
desc->req = req;
desc->name = "<DECODED_IOCTL>";
desc->size = IOC_SIZE(req);
- // Sanity check.
+ // Soundness check.
if (desc->size > 0xFFFF)
return false;
unsigned dir = IOC_DIR(req);
@@ -1478,7 +1478,7 @@ static bool ioctl_decode(unsigned req, ioctl_desc *desc) {
// Size can be 0 iff type is NONE.
if ((desc->type == IOC_NONE) != (desc->size == 0))
return false;
- // Sanity check.
+ // Soundness check.
if (IOC_TYPE(req) == 0)
return false;
return true;
@@ -1491,8 +1491,8 @@ static const ioctl_desc *ioctl_lookup(unsigned req) {
// Try stripping access size from the request id.
desc = ioctl_table_lookup(req & ~(IOC_SIZEMASK << IOC_SIZESHIFT));
- // Sanity check: requests that encode access size are either read or write and
- // have size of 0 in the table.
+ // Soundness check: requests that encode access size are either read or write
+ // and have size of 0 in the table.
if (desc && desc->size == 0 &&
(desc->type == ioctl_desc::READWRITE || desc->type == ioctl_desc::WRITE ||
desc->type == ioctl_desc::READ))
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp
index 9318066afed20..2ad2c8fa9d923 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp
@@ -296,7 +296,7 @@ uptr internal_wcsnlen(const wchar_t *s, uptr maxlen) {
}
bool mem_is_zero(const char *beg, uptr size) {
- CHECK_LE(size, 1ULL << FIRST_32_SECOND_64(30, 40)); // Sanity check.
+ CHECK_LE(size, 1ULL << FIRST_32_SECOND_64(30, 40)); // Soundness check.
const char *end = beg + size;
uptr *aligned_beg = (uptr *)RoundUpTo((uptr)beg, sizeof(uptr));
uptr *aligned_end = (uptr *)RoundDownTo((uptr)end, sizeof(uptr));
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp
index 87a18b1120af6..882e445d681aa 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp
@@ -626,7 +626,7 @@ bool FileExists(const char *filename) {
struct stat st;
if (internal_stat(filename, &st))
return false;
- // Sanity check: filename is a regular file.
+ // Soundness check: filename is a regular file.
return S_ISREG(st.st_mode);
}
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_mac.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_mac.cpp
index d4811ff4ed217..83dc2025ed35a 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_mac.cpp
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_mac.cpp
@@ -383,7 +383,7 @@ bool FileExists(const char *filename) {
struct stat st;
if (stat(filename, &st))
return false;
- // Sanity check: filename is a regular file.
+ // Soundness check: filename is a regular file.
return S_ISREG(st.st_mode);
}
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp
index b1eb2009cf157..5f7190d2effd8 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp
@@ -205,7 +205,7 @@ void UnsetAlternateSignalStack() {
stack_t altstack, oldstack;
altstack.ss_sp = nullptr;
altstack.ss_flags = SS_DISABLE;
- altstack.ss_size = GetAltStackSize(); // Some sane value required on Darwin.
+ altstack.ss_size = GetAltStackSize(); // Some sound value required on Darwin.
CHECK_EQ(0, sigaltstack(&altstack, &oldstack));
UnmapOrDie(oldstack.ss_sp, oldstack.ss_size);
}
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace.cpp
index d24fae98213aa..969818694746f 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace.cpp
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace.cpp
@@ -96,12 +96,12 @@ static inline uhwptr *GetCanonicFrame(uptr bp,
void BufferedStackTrace::UnwindFast(uptr pc, uptr bp, uptr stack_top,
uptr stack_bottom, u32 max_depth) {
- // TODO(yln): add arg sanity check for stack_top/stack_bottom
+ // TODO(yln): add arg soundness check for stack_top/stack_bottom
CHECK_GE(max_depth, 2);
const uptr kPageSize = GetPageSizeCached();
trace_buffer[0] = pc;
size = 1;
- if (stack_top < 4096) return; // Sanity check for stack top.
+ if (stack_top < 4096) return; // Soundness check for stack top.
uhwptr *frame = GetCanonicFrame(bp, stack_top, stack_bottom);
// Lowest possible address that makes sense as the next frame pointer.
// Goes up as we walk the stack.
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_sparc.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_sparc.cpp
index 74f435287af3c..71251167d0cb3 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_sparc.cpp
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_sparc.cpp
@@ -27,12 +27,12 @@ namespace __sanitizer {
void BufferedStackTrace::UnwindFast(uptr pc, uptr bp, uptr stack_top,
uptr stack_bottom, u32 max_depth) {
- // TODO(yln): add arg sanity check for stack_top/stack_bottom
+ // TODO(yln): add arg soundness check for stack_top/stack_bottom
CHECK_GE(max_depth, 2);
const uptr kPageSize = GetPageSizeCached();
trace_buffer[0] = pc;
size = 1;
- if (stack_top < 4096) return; // Sanity check for stack top.
+ if (stack_top < 4096) return; // Soundness check for stack top.
// Flush register windows to memory
#if defined(__sparc_v9__) || defined(__sparcv9__) || defined(__sparcv9)
asm volatile("flushw" ::: "memory");
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_win.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_win.cpp
index ed4f60deeffc8..2ee43e82fa456 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_win.cpp
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_win.cpp
@@ -382,7 +382,7 @@ bool MprotectReadWrite(uptr addr, uptr size) {
void ReleaseMemoryPagesToOS(uptr beg, uptr end) {
uptr beg_aligned = RoundDownTo(beg, GetPageSizeCached()),
end_aligned = RoundDownTo(end, GetPageSizeCached());
- CHECK(beg < end); // make sure the region is sane
+ CHECK(beg < end); // make sure the region is sound
if (beg_aligned == end_aligned) // make sure we're freeing at least 1 page;
return;
UnmapOrDie((void *)beg, end_aligned - beg_aligned);
diff --git a/compiler-rt/lib/sanitizer_common/tests/sanitizer_procmaps_test.cpp b/compiler-rt/lib/sanitizer_common/tests/sanitizer_procmaps_test.cpp
index 00542b944f516..e6f3fa8344877 100644
--- a/compiler-rt/lib/sanitizer_common/tests/sanitizer_procmaps_test.cpp
+++ b/compiler-rt/lib/sanitizer_common/tests/sanitizer_procmaps_test.cpp
@@ -47,7 +47,7 @@ TEST(MemoryMappingLayout, DumpListOfModules) {
bool found = false;
for (uptr i = 0; i < modules.size(); ++i) {
if (modules[i].containsAddress((uptr)&noop)) {
- // Verify that the module name is sane.
+ // Verify that the module name is sound.
if (strstr(modules[i].full_name(), binary_name) != 0)
found = true;
}
diff --git a/compiler-rt/lib/scudo/standalone/report.h b/compiler-rt/lib/scudo/standalone/report.h
index c397dd3fc9c65..333952852a66f 100644
--- a/compiler-rt/lib/scudo/standalone/report.h
+++ b/compiler-rt/lib/scudo/standalone/report.h
@@ -26,7 +26,7 @@ void NORETURN reportInvalidFlag(const char *FlagType, const char *Value);
// Chunk header related errors.
void NORETURN reportHeaderCorruption(void *Header, const void *Ptr);
-// Sanity checks related error.
+// Soundness checks related error.
void NORETURN reportSanityCheckError(const char *Field);
// Combined allocator errors.
diff --git a/compiler-rt/lib/tsan/rtl/CMakeLists.txt b/compiler-rt/lib/tsan/rtl/CMakeLists.txt
index d7d84706bfd58..bf7d2e79e6129 100644
--- a/compiler-rt/lib/tsan/rtl/CMakeLists.txt
+++ b/compiler-rt/lib/tsan/rtl/CMakeLists.txt
@@ -118,7 +118,7 @@ endif()
if(APPLE)
# Ideally we would check the SDK version for the actual platform we are
# building for here. To make our lifes easier we assume the host SDK setup is
- # sane and use the macOS SDK version as a proxy for aligned SDKs.
+ # sound and use the macOS SDK version as a proxy for aligned SDKs.
find_darwin_sdk_version(macosx_sdk_version "macosx")
if ("${macosx_sdk_version}" VERSION_LESS 10.12)
message(FATAL_ERROR "Building the TSan runtime requires at least macOS SDK 10.12 (or aligned SDK on other platforms)")
diff --git a/compiler-rt/lib/tsan/rtl/tsan_rtl.cpp b/compiler-rt/lib/tsan/rtl/tsan_rtl.cpp
index 0d7247a56a4c2..8641ee05da943 100644
--- a/compiler-rt/lib/tsan/rtl/tsan_rtl.cpp
+++ b/compiler-rt/lib/tsan/rtl/tsan_rtl.cpp
@@ -537,11 +537,11 @@ void DontNeedShadowFor(uptr addr, uptr size) {
#if !SANITIZER_GO
// We call UnmapShadow before the actual munmap, at that point we don't yet
-// know if the provided address/size are sane. We can't call UnmapShadow
+// know if the provided address/size are sound. We can't call UnmapShadow
// after the actual munmap becuase at that point the memory range can
// already be reused for something else, so we can't rely on the munmap
-// return value to understand is the values are sane.
-// While calling munmap with insane values (non-canonical address, negative
+// return value to understand is the values are sound.
+// While calling munmap with unsound values (non-canonical address, negative
// size, etc) is an error, the kernel won't crash. We must also try to not
// crash as the failure mode is very confusing (paging fault inside of the
// runtime on some derived shadow address).
diff --git a/compiler-rt/lib/tsan/rtl/tsan_rtl_access.cpp b/compiler-rt/lib/tsan/rtl/tsan_rtl_access.cpp
index b2e70475e0b73..6fa618366f7cd 100644
--- a/compiler-rt/lib/tsan/rtl/tsan_rtl_access.cpp
+++ b/compiler-rt/lib/tsan/rtl/tsan_rtl_access.cpp
@@ -554,7 +554,7 @@ static void MemoryRangeSet(uptr addr, uptr size, RawShadow val) {
return;
DCHECK_EQ(addr % kShadowCell, 0);
DCHECK_EQ(size % kShadowCell, 0);
- // If a user passes some insane arguments (memset(0)),
+ // If a user passes some unsound arguments (memset(0)),
// let it just crash as usual.
if (!IsAppMem(addr) || !IsAppMem(addr + size - 1))
return;
diff --git a/compiler-rt/lib/ubsan/ubsan_type_hash.h b/compiler-rt/lib/ubsan/ubsan_type_hash.h
index e42884b765a0a..fe96aaf3a1bc1 100644
--- a/compiler-rt/lib/ubsan/ubsan_type_hash.h
+++ b/compiler-rt/lib/ubsan/ubsan_type_hash.h
@@ -52,7 +52,7 @@ bool checkDynamicType(void *Object, void *Type, HashValue Hash);
const unsigned VptrTypeCacheSize = 128;
-/// A sanity check for Vtable. Offsets to top must be reasonably small
+/// A soundness check for Vtable. Offsets to top must be reasonably small
/// numbers (by absolute value). It's a weak check for Vtable corruption.
const int VptrMaxOffsetToTop = 1<<20;
diff --git a/compiler-rt/lib/ubsan/ubsan_type_hash_win.cpp b/compiler-rt/lib/ubsan/ubsan_type_hash_win.cpp
index 106fa1b85a558..e0fbab3ac84b1 100644
--- a/compiler-rt/lib/ubsan/ubsan_type_hash_win.cpp
+++ b/compiler-rt/lib/ubsan/ubsan_type_hash_win.cpp
@@ -47,7 +47,7 @@ __ubsan::getDynamicTypeInfoFromVtable(void *VtablePtr) {
// The virtual table may not have a complete object locator if the object
// was compiled without RTTI (i.e. we might be reading from some other global
// laid out before the virtual table), so we need to carefully validate each
- // pointer dereference and perform sanity checks.
+ // pointer dereference and perform soundness checks.
CompleteObjectLocator **obj_locator_ptr =
((CompleteObjectLocator**)VtablePtr)-1;
if (!IsAccessibleMemoryRange((uptr)obj_locator_ptr, sizeof(void*)))
diff --git a/compiler-rt/lib/xray/tests/CMakeLists.txt b/compiler-rt/lib/xray/tests/CMakeLists.txt
index 6b9d9ced9a1df..8795cb8470230 100644
--- a/compiler-rt/lib/xray/tests/CMakeLists.txt
+++ b/compiler-rt/lib/xray/tests/CMakeLists.txt
@@ -3,7 +3,7 @@ include_directories(..)
add_custom_target(XRayUnitTests)
set_target_properties(XRayUnitTests PROPERTIES FOLDER "Compiler-RT/Tests")
-# Sanity check XRAY_ALL_SOURCE_FILES_ABS_PATHS
+# Soundness check XRAY_ALL_SOURCE_FILES_ABS_PATHS
list(LENGTH XRAY_ALL_SOURCE_FILES_ABS_PATHS XASFAP_LENGTH)
if (${XASFAP_LENGTH} EQUAL 0)
message(FATAL_ERROR "XRAY_ALL_SOURCE_FILES_ABS_PATHS cannot be empty")
diff --git a/compiler-rt/test/BlocksRuntime/byrefsanity.c b/compiler-rt/test/BlocksRuntime/byrefsanity.c
index a37fa2571d472..4be3dfe360af7 100644
--- a/compiler-rt/test/BlocksRuntime/byrefsanity.c
+++ b/compiler-rt/test/BlocksRuntime/byrefsanity.c
@@ -17,7 +17,7 @@ main(int argc, char *argv[])
__block int var = 0;
void (^b)(void) = ^{ var++; };
- //sanity(b);
+ //soundness(b);
b();
printf("%s: success!\n", argv[0]);
return 0;
diff --git a/compiler-rt/test/asan/TestCases/Linux/syscalls.cpp b/compiler-rt/test/asan/TestCases/Linux/syscalls.cpp
index b4cb1a08dcfa1..2782ba4eb1ed5 100644
--- a/compiler-rt/test/asan/TestCases/Linux/syscalls.cpp
+++ b/compiler-rt/test/asan/TestCases/Linux/syscalls.cpp
@@ -10,7 +10,7 @@
#include <sanitizer/linux_syscall_hooks.h>
/* Test the presence of __sanitizer_syscall_ in the tool runtime, and general
- sanity of their behaviour. */
+ soundness of their behaviour. */
int main(int argc, char *argv[]) {
char buf[1000];
diff --git a/compiler-rt/test/asan/TestCases/Posix/unpoison-alternate-stack.cpp b/compiler-rt/test/asan/TestCases/Posix/unpoison-alternate-stack.cpp
index 8e7d5082d0b5d..6d3b0095aad42 100644
--- a/compiler-rt/test/asan/TestCases/Posix/unpoison-alternate-stack.cpp
+++ b/compiler-rt/test/asan/TestCases/Posix/unpoison-alternate-stack.cpp
@@ -99,7 +99,7 @@ void setSignalAlternateStack(void *AltStack) {
// We want to test reliably that __asan_handle_no_return can properly unpoison
// the signal alternate stack.
void *threadFun(void *AltStack) {
- // first test on default stack (sanity check), no signal alternate stack set
+ // first test on default stack (soundness check), no signal alternate stack set
testOnCurrentStack();
setSignalAlternateStack(AltStack);
diff --git a/compiler-rt/test/asan/TestCases/sanity_check_pure_c.c b/compiler-rt/test/asan/TestCases/sanity_check_pure_c.c
index 9d74996e43c55..d35b7511eddac 100644
--- a/compiler-rt/test/asan/TestCases/sanity_check_pure_c.c
+++ b/compiler-rt/test/asan/TestCases/sanity_check_pure_c.c
@@ -1,8 +1,8 @@
-// Sanity checking a test in pure C.
+// Soundness checking a test in pure C.
// RUN: %clang_asan -O2 %s -o %t
// RUN: not %run %t 2>&1 | FileCheck %s
-// Sanity checking a test in pure C with -pie.
+// Soundness checking a test in pure C with -pie.
// RUN: %clang_asan -O2 %s %pie %fPIE -o %t
// RUN: not %run %t 2>&1 | FileCheck %s
// REQUIRES: stable-runtime
diff --git a/compiler-rt/test/builtins/Unit/atomic_test.c b/compiler-rt/test/builtins/Unit/atomic_test.c
index 346c9b3be55a7..059451d267dff 100644
--- a/compiler-rt/test/builtins/Unit/atomic_test.c
+++ b/compiler-rt/test/builtins/Unit/atomic_test.c
@@ -9,7 +9,7 @@
//===----------------------------------------------------------------------===//
//
// This file performs some simple testing of the support functions for the
-// atomic builtins. All tests are single-threaded, so this is only a sanity
+// atomic builtins. All tests are single-threaded, so this is only a soundness
// check.
//
//===----------------------------------------------------------------------===//
diff --git a/compiler-rt/test/builtins/Unit/lit.cfg.py b/compiler-rt/test/builtins/Unit/lit.cfg.py
index 59da054848f3c..c87d6cde4399d 100644
--- a/compiler-rt/test/builtins/Unit/lit.cfg.py
+++ b/compiler-rt/test/builtins/Unit/lit.cfg.py
@@ -189,7 +189,7 @@ def build_invocation(compile_flags):
# Add features for available sources
builtins_source_features = config.builtins_lit_source_features.split(";")
-# Sanity checks
+# Soundness checks
if not builtins_source_features:
lit_config.fatal("builtins_source_features cannot be empty")
builtins_source_features_set = set()
diff --git a/compiler-rt/test/fuzzer/fuzzer-custommutator.test b/compiler-rt/test/fuzzer/fuzzer-custommutator.test
index 314530415746c..1082a8b40f2cd 100644
--- a/compiler-rt/test/fuzzer/fuzzer-custommutator.test
+++ b/compiler-rt/test/fuzzer/fuzzer-custommutator.test
@@ -12,7 +12,7 @@ LLVMFuzzerCustomMutatorWithLenControl: In LLVMFuzzerCustomMutator
LLVMFuzzerCustomMutatorWithLenControl: {{.*}} lim: {{[1-9][0-9]?}} {{.*}}
LLVMFuzzerCustomMutatorWithLenControl: BINGO
-# sanity check: verify that we do get long lines with verbose printing on
+# soundness check: verify that we do get long lines with verbose printing on
RUN: %cpp_compiler %S/CustomMutatorWithLongSequencesTest.cpp -o %t-CustomMutatorWithLongSequencesTest
RUN: not %run %t-CustomMutatorWithLongSequencesTest -verbosity=2 2>&1 | FileCheck %s --check-prefix=LLVMFuzzerCustomMutatorLongSequence
LLVMFuzzerCustomMutatorLongSequence: Flag: verbosity 2
diff --git a/compiler-rt/test/fuzzer/reload.test b/compiler-rt/test/fuzzer/reload.test
index 62321cec3b04f..2b74a4a441952 100644
--- a/compiler-rt/test/fuzzer/reload.test
+++ b/compiler-rt/test/fuzzer/reload.test
@@ -8,6 +8,6 @@ RUN: not %run %t-ReloadTest %t.crash 2>&1 | FileCheck %s --check-prefix=ARTIFACT
ARTIFACT: Running: {{.*}}reload.test.tmp.crash
ARTIFACT: ERROR: libFuzzer: deadly signal
-# Sanity check that altered artifact is not going to crash
+# Soundness check that altered artifact is not going to crash
RUN: echo z >> %t.crash
RUN: %run %t-ReloadTest %t.crash
diff --git a/compiler-rt/test/hwasan/TestCases/Linux/syscalls.cpp b/compiler-rt/test/hwasan/TestCases/Linux/syscalls.cpp
index 154b698989935..e7380097d97d6 100644
--- a/compiler-rt/test/hwasan/TestCases/Linux/syscalls.cpp
+++ b/compiler-rt/test/hwasan/TestCases/Linux/syscalls.cpp
@@ -15,7 +15,7 @@
#include <sanitizer/linux_syscall_hooks.h>
/* Test the presence of __sanitizer_syscall_ in the tool runtime, and general
- sanity of their behaviour. */
+ soundness of their behaviour. */
int main(int argc, char *argv[]) {
// lit.cfg.py currently sets 'disable_allocator_tagging=1'
diff --git a/compiler-rt/test/hwasan/TestCases/sanitizer_malloc.cpp b/compiler-rt/test/hwasan/TestCases/sanitizer_malloc.cpp
index cf1dc0741bead..382cee750e335 100644
--- a/compiler-rt/test/hwasan/TestCases/sanitizer_malloc.cpp
+++ b/compiler-rt/test/hwasan/TestCases/sanitizer_malloc.cpp
@@ -23,7 +23,7 @@ int main() {
sink = (void *)&__sanitizer_reallocarray;
sink = (void *)&__sanitizer_malloc;
- // sanity check
+ // soundness check
void *p = __sanitizer_malloc(100);
p = __sanitizer_realloc(p, 200);
__sanitizer_free(p);
diff --git a/compiler-rt/test/msan/Linux/syscalls.cpp b/compiler-rt/test/msan/Linux/syscalls.cpp
index e9525a5796ec4..71a199cd6d4dc 100644
--- a/compiler-rt/test/msan/Linux/syscalls.cpp
+++ b/compiler-rt/test/msan/Linux/syscalls.cpp
@@ -18,7 +18,7 @@
#include <sanitizer/msan_interface.h>
/* Test the presence of __sanitizer_syscall_ in the tool runtime, and general
- sanity of their behaviour. */
+ soundness of their behaviour. */
int main(int argc, char *argv[]) {
char buf[1000] __attribute__((aligned(8)));
diff --git a/compiler-rt/test/safestack/canary.c b/compiler-rt/test/safestack/canary.c
index 1ceaa50656f60..cdea34829fb42 100644
--- a/compiler-rt/test/safestack/canary.c
+++ b/compiler-rt/test/safestack/canary.c
@@ -18,7 +18,7 @@ __attribute__((noinline)) void f(unsigned *y) {
char *volatile p = &x;
char *volatile q = (char *)y;
assert(p < q);
- assert(q - p < 1024); // sanity
+ assert(q - p < 1024); // soundness
// This has technically undefined behavior, but we know the actual layout of
// the unsafe stack and this should not touch anything important.
memset(&x, 0xab, q - p + sizeof(*y));
diff --git a/compiler-rt/utils/generate_netbsd_ioctls.awk b/compiler-rt/utils/generate_netbsd_ioctls.awk
index 89c32ae32aa24..1a7760b52fe82 100755
--- a/compiler-rt/utils/generate_netbsd_ioctls.awk
+++ b/compiler-rt/utils/generate_netbsd_ioctls.awk
@@ -387,7 +387,7 @@ END {
pcmd(" desc->req = req;")
pcmd(" desc->name = \"<DECODED_IOCTL>\";")
pcmd(" desc->size = IOC_SIZE(req);")
- pcmd(" // Sanity check.")
+ pcmd(" // Soundness check.")
pcmd(" if (desc->size > 0xFFFF) return false;")
pcmd(" unsigned dir = IOC_DIR(req);")
pcmd(" switch (dir) {")
@@ -408,7 +408,7 @@ END {
pcmd(" }")
pcmd(" // Size can be 0 iff type is NONE.")
pcmd(" if ((desc->type == IOC_NONE) != (desc->size == 0)) return false;")
- pcmd(" // Sanity check.")
+ pcmd(" // Soundness check.")
pcmd(" if (IOC_TYPE(req) == 0) return false;")
pcmd(" return true;")
pcmd("}")
@@ -419,7 +419,7 @@ END {
pcmd("")
pcmd(" // Try stripping access size from the request id.")
pcmd(" desc = ioctl_table_lookup(req & ~(IOC_SIZEMASK << IOC_SIZESHIFT));")
- pcmd(" // Sanity check: requests that encode access size are either read or write and")
+ pcmd(" // Soundness check: requests that encode access size are either read or write and")
pcmd(" // have size of 0 in the table.")
pcmd(" if (desc && desc->size == 0 &&")
pcmd(" (desc->type == ioctl_desc::READWRITE || desc->type == ioctl_desc::WRITE ||")
diff --git a/compiler-rt/utils/generate_netbsd_syscalls.awk b/compiler-rt/utils/generate_netbsd_syscalls.awk
index 5a3be0a7d2dc9..3db3c29e0892b 100755
--- a/compiler-rt/utils/generate_netbsd_syscalls.awk
+++ b/compiler-rt/utils/generate_netbsd_syscalls.awk
@@ -45,7 +45,7 @@ BEGIN {
usage()
}
- # sanity check that the path ends with "syscall.master"
+ # soundness check that the path ends with "syscall.master"
if (ARGV[1] !~ /syscalls\.master$/) {
usage()
}
diff --git a/flang-rt/unittests/Runtime/CharacterTest.cpp b/flang-rt/unittests/Runtime/CharacterTest.cpp
index 2c7af27b9da77..e353e42577676 100644
--- a/flang-rt/unittests/Runtime/CharacterTest.cpp
+++ b/flang-rt/unittests/Runtime/CharacterTest.cpp
@@ -6,7 +6,7 @@
//
//===----------------------------------------------------------------------===//
-// Basic sanity tests of CHARACTER API; exhaustive testing will be done
+// Basic soundness tests of CHARACTER API; exhaustive testing will be done
// in Fortran.
#include "flang/Runtime/character.h"
diff --git a/flang-rt/unittests/Runtime/ExternalIOTest.cpp b/flang-rt/unittests/Runtime/ExternalIOTest.cpp
index 6c148b1de6f82..16fffe49577ba 100644
--- a/flang-rt/unittests/Runtime/ExternalIOTest.cpp
+++ b/flang-rt/unittests/Runtime/ExternalIOTest.cpp
@@ -6,7 +6,7 @@
//
//===----------------------------------------------------------------------===//
//
-// Sanity test for all external I/O modes
+// Soundness test for all external I/O modes
//
//===----------------------------------------------------------------------===//
diff --git a/flang/lib/Decimal/decimal-to-binary.cpp b/flang/lib/Decimal/decimal-to-binary.cpp
index 94c5177423739..ec35f98abe263 100644
--- a/flang/lib/Decimal/decimal-to-binary.cpp
+++ b/flang/lib/Decimal/decimal-to-binary.cpp
@@ -367,7 +367,7 @@ BigRadixFloatingPointNumber<PREC, LOG10RADIX>::ConvertToBinary() {
// Shift our perspective on the radix (& decimal) point so that
// it sits to the *left* of the digits: i.e., x = .D * 10.**E
exponent_ += digits_ * log10Radix;
- // Sanity checks for ridiculous exponents
+ // Soundness checks for ridiculous exponents
static constexpr int crazy{2 * Real::decimalRange + log10Radix};
if (exponent_ < -crazy) {
enum ConversionResultFlags flags {
diff --git a/flang/lib/Evaluate/fold-character.cpp b/flang/lib/Evaluate/fold-character.cpp
index a43742ae8dc68..e091813a741d9 100644
--- a/flang/lib/Evaluate/fold-character.cpp
+++ b/flang/lib/Evaluate/fold-character.cpp
@@ -102,7 +102,7 @@ Expr<Type<TypeCategory::Character, KIND>> FoldIntrinsicFunction(
"NCOPIES= argument to REPEAT() should be nonnegative, but is %jd"_err_en_US,
static_cast<std::intmax_t>(n));
} else if (static_cast<double>(n) * str.size() >
- (1 << 20)) { // sanity limit of 1MiB
+ (1 << 20)) { // soundness limit of 1MiB
context.Warn(common::UsageWarning::FoldingLimit,
"Result of REPEAT() is too large to compute at compilation time (%g characters)"_port_en_US,
static_cast<double>(n) * str.size());
diff --git a/flang/lib/Evaluate/formatting.cpp b/flang/lib/Evaluate/formatting.cpp
index ec5dc0baaa5cb..8c9cae8ee5fb9 100644
--- a/flang/lib/Evaluate/formatting.cpp
+++ b/flang/lib/Evaluate/formatting.cpp
@@ -292,7 +292,7 @@ llvm::raw_ostream &ProcedureRef::AsFortran(llvm::raw_ostream &o) const {
// Operator precedence formatting; insert parentheses around operands
// only when necessary.
-enum class Precedence { // in increasing order for sane comparisons
+enum class Precedence { // in increasing order for sound comparisons
DefinedBinary,
Or,
And,
diff --git a/flang/lib/Evaluate/integer.cpp b/flang/lib/Evaluate/integer.cpp
index 17a38fa17a67c..416f0cd66502c 100644
--- a/flang/lib/Evaluate/integer.cpp
+++ b/flang/lib/Evaluate/integer.cpp
@@ -18,7 +18,7 @@ template class Integer<80, isHostLittleEndian, 16, std::uint16_t, std::uint32_t,
128>;
template class Integer<128>;
-// Sanity checks against misconfiguration bugs
+// Soundness checks against misconfiguration bugs
static_assert(Integer<8>::partBits == 8);
static_assert(std::is_same_v<typename Integer<8>::Part, std::uint8_t>);
static_assert(Integer<16>::partBits == 16);
diff --git a/flang/lib/Frontend/CompilerInstance.cpp b/flang/lib/Frontend/CompilerInstance.cpp
index d97b4b8af6d61..bcdf5444dea2c 100644
--- a/flang/lib/Frontend/CompilerInstance.cpp
+++ b/flang/lib/Frontend/CompilerInstance.cpp
@@ -154,7 +154,7 @@ bool CompilerInstance::executeAction(FrontendAction &act) {
llvm::Triple targetTriple{llvm::Triple(invoc.getTargetOpts().triple)};
- // Set some sane defaults for the frontend.
+ // Set some sound defaults for the frontend.
invoc.setDefaultFortranOpts();
// Update the fortran options based on user-based input.
invoc.setFortranOpts();
diff --git a/flang/lib/Lower/Bridge.cpp b/flang/lib/Lower/Bridge.cpp
index e91fa2db15fa2..290073cfe727c 100644
--- a/flang/lib/Lower/Bridge.cpp
+++ b/flang/lib/Lower/Bridge.cpp
@@ -2202,7 +2202,7 @@ class FirConverter : public Fortran::lower::AbstractConverter {
*this, bridge.getSemanticsContext(), localSymbols, doConstruct, eval);
bool success = loopOp != nullptr;
if (success) {
- // Sanity check that the builder insertion point is inside the newly
+ // Soundness check that the builder insertion point is inside the newly
// generated loop.
assert(
loopOp->getRegion(0).isAncestor(
diff --git a/flang/lib/Lower/ConvertVariable.cpp b/flang/lib/Lower/ConvertVariable.cpp
index 88fc3128d21f7..9448839aacc36 100644
--- a/flang/lib/Lower/ConvertVariable.cpp
+++ b/flang/lib/Lower/ConvertVariable.cpp
@@ -351,7 +351,7 @@ static mlir::Value genComponentDefaultInit(
// Pointer or allocatable without initialization.
// Create deallocated/disassociated value.
// From a standard point of view, pointer without initialization do not
- // need to be disassociated, but for sanity and simplicity, do it in
+ // need to be disassociated, but for soundness and simplicity, do it in
// global constructor since this has no runtime cost.
componentValue =
fir::factory::createUnallocatedBox(builder, loc, componentTy, {});
diff --git a/flang/lib/Optimizer/Builder/FIRBuilder.cpp b/flang/lib/Optimizer/Builder/FIRBuilder.cpp
index b6501fd530992..bee9ef6388136 100644
--- a/flang/lib/Optimizer/Builder/FIRBuilder.cpp
+++ b/flang/lib/Optimizer/Builder/FIRBuilder.cpp
@@ -1185,7 +1185,7 @@ fir::factory::getTypeParams(mlir::Location loc, fir::FirOpBuilder &builder,
if (box.isDerivedWithLenParameters()) {
// This should generate code to read the type parameters from the box.
// This requires some consideration however as MutableBoxValues need to be
- // in a sane state to be provide the correct values.
+ // in a sound state to be provide the correct values.
TODO(loc, "derived type with type parameters");
}
return {};
diff --git a/flang/lib/Parser/preprocessor.cpp b/flang/lib/Parser/preprocessor.cpp
index 9176b4db3408a..340e2cd57d216 100644
--- a/flang/lib/Parser/preprocessor.cpp
+++ b/flang/lib/Parser/preprocessor.cpp
@@ -177,7 +177,7 @@ static TokenSequence TokenPasting(TokenSequence &&text) {
bool doPaste{false};
char last{before->back()};
char first{after.front()};
- // Apply basic sanity checking to pasting so avoid constructing a bogus
+ // Apply basic soundness checking to pasting so avoid constructing a bogus
// token that might cause macro replacement to fail, like "macro(".
if (IsLegalInIdentifier(last) && IsLegalInIdentifier(first)) {
doPaste = true;
diff --git a/flang/test/Driver/fopenmp.f90 b/flang/test/Driver/fopenmp.f90
index f7e83e0eeb734..11bf897d2c36a 100644
--- a/flang/test/Driver/fopenmp.f90
+++ b/flang/test/Driver/fopenmp.f90
@@ -51,7 +51,7 @@
! CHECK-LD-IOMP5MD: "{{.*}}ld{{(.exe)?}}"
! CHECK-LD-IOMP5MD: "-liomp5md"
!
-! We'd like to check that the default is sane, but until we have the ability
+! We'd like to check that the default is sound, but until we have the ability
! to *always* semantically analyze OpenMP without always generating runtime
! calls (in the event of an unsupported runtime), we don't have a good way to
! test the FC1 invocation. Instead, just ensure we do eventually link *some*
diff --git a/flang/test/Fir/convert-to-llvm.fir b/flang/test/Fir/convert-to-llvm.fir
index cd87bf8d28ed5..c7bb65fe08b2e 100644
--- a/flang/test/Fir/convert-to-llvm.fir
+++ b/flang/test/Fir/convert-to-llvm.fir
@@ -2806,7 +2806,7 @@ func.func @test_coordinate_of_tuple(%tup : !fir.ref<tuple<!fir.ref<i32>>>) {
// Test `fir.coordinate_of` conversion - items inside `!fir.ptr`. This should
// be almost identical to `!fir.ref` (i.e. it's the same code path in the code
-// gen). Instead of duplicating the tests, only one for sanity-checking is added.
+// gen). Instead of duplicating the tests, only one for soundness-checking is added.
// 6.1. `fir.array`
func.func @coordinate_array_unknown_size_1d(%arg0: !fir.ptr<!fir.array<? x i32>>, %arg1 : index) {
diff --git a/flang/test/Semantics/modfile55.cuf b/flang/test/Semantics/modfile55.cuf
index 2338b745d8355..36d4ea9d3ff09 100644
--- a/flang/test/Semantics/modfile55.cuf
+++ b/flang/test/Semantics/modfile55.cuf
@@ -1,5 +1,5 @@
! RUN: %python %S/test_modfile.py %s %flang_fc1
-! Sanity check for CUDA Fortran attributes in module files
+! Soundness check for CUDA Fortran attributes in module files
module m
attributes(device) dd
real, managed, allocatable :: md
diff --git a/flang/test/Semantics/resolve59.f90 b/flang/test/Semantics/resolve59.f90
index a598fbe1849f3..14e128ddb4189 100644
--- a/flang/test/Semantics/resolve59.f90
+++ b/flang/test/Semantics/resolve59.f90
@@ -58,7 +58,7 @@ real function rfunc(x)
!ERROR: Actual argument for 'x=' may not be a procedure
x = acos(f5)
end function
- ! Sanity test: f18 handles C1560 violation by ignoring RESULT
+ ! Soundness test: f18 handles C1560 violation by ignoring RESULT
!WARNING: The function name should not appear in RESULT; references to 'f6' inside the function will be considered as references to the result only [-Whomonymous-result]
function f6() result(f6)
end function
diff --git a/flang/test/Semantics/symbol19.f90 b/flang/test/Semantics/symbol19.f90
index 541c5ccbf9468..829f6e3e32301 100644
--- a/flang/test/Semantics/symbol19.f90
+++ b/flang/test/Semantics/symbol19.f90
@@ -25,7 +25,7 @@ subroutine expect_intrinsic
call system_clock(icount)
end subroutine
-! Sanity check that the EXTERNAL attribute is not bypassed by
+! Soundness check that the EXTERNAL attribute is not bypassed by
! implicit intrinsic resolution, even if it otherwise perfectly
! matches an intrinsic call.
diff --git a/flang/unittests/Frontend/CompilerInstanceTest.cpp b/flang/unittests/Frontend/CompilerInstanceTest.cpp
index 8621c14029c15..6600fe863f313 100644
--- a/flang/unittests/Frontend/CompilerInstanceTest.cpp
+++ b/flang/unittests/Frontend/CompilerInstanceTest.cpp
@@ -50,7 +50,7 @@ TEST(CompilerInstance, SanityCheckForFileManager) {
compInst.getAllSources().Open(testFilePath, errorStream);
// 3. Verify the content of the input file
- // This is just a sanity check to make sure that CompilerInstance is capable
+ // This is just a soundness check to make sure that CompilerInstance is capable
// of reading input files.
llvm::ArrayRef<char> fileContent = sf->content();
EXPECT_FALSE(fileContent.size() == 0);
diff --git a/libcxx/docs/DesignDocs/FileTimeType.rst b/libcxx/docs/DesignDocs/FileTimeType.rst
index 946c9e515fb9b..b3560ee46c9fa 100644
--- a/libcxx/docs/DesignDocs/FileTimeType.rst
+++ b/libcxx/docs/DesignDocs/FileTimeType.rst
@@ -82,7 +82,7 @@ and with nanosecond resolution).
To get the same range, we would need to drop our resolution to that of seconds
to come close to having the same range.
-This begs the question, is the range problem "really a problem"? Sane usages
+This begs the question, is the range problem "really a problem"? Sound usages
of file time stamps shouldn't exceed +/- 300 years, so should we care to support it?
I believe the answer is yes. We're not designing the filesystem time API, we're
@@ -110,7 +110,7 @@ to throw in cases where the user was confident the call should succeed. (See bel
assert(result != -1);
}
- // Called elsewhere to set the file time to something insane, and way
+ // Called elsewhere to set the file time to something unsound, and way
// out of the 300 year range we might expect.
void some_bad_persons_code() {
struct timespec new_times;
diff --git a/libcxx/docs/Status/Cxx20Papers.csv b/libcxx/docs/Status/Cxx20Papers.csv
index 91fcd9ee08315..07ad9d2ac7630 100644
--- a/libcxx/docs/Status/Cxx20Papers.csv
+++ b/libcxx/docs/Status/Cxx20Papers.csv
@@ -59,7 +59,7 @@
"`P0591R4 <https://wg21.link/P0591R4>`__","Utility functions to implement uses-allocator construction","2018-11 (San Diego)","|Partial|","","The changes in [mem.poly.allocator.mem] are missing"
"`P0595R2 <https://wg21.link/P0595R2>`__","std::is_constant_evaluated()","2018-11 (San Diego)","|Complete|","9",""
"`P0602R4 <https://wg21.link/P0602R4>`__","variant and optional should propagate copy/move triviality","2018-11 (San Diego)","|Complete|","8",""
-"`P0608R3 <https://wg21.link/P0608R3>`__","A sane variant converting constructor","2018-11 (San Diego)","|Complete|","9",""
+"`P0608R3 <https://wg21.link/P0608R3>`__","A sound variant converting constructor","2018-11 (San Diego)","|Complete|","9",""
"`P0655R1 <https://wg21.link/P0655R1>`__","visit<R>: Explicit Return Type for visit","2018-11 (San Diego)","|Complete|","12",""
"`P0771R1 <https://wg21.link/P0771R1>`__","std::function move constructor should be noexcept","2018-11 (San Diego)","|Complete|","6",""
"`P0896R4 <https://wg21.link/P0896R4>`__","The One Ranges Proposal","2018-11 (San Diego)","|Complete|","15",""
diff --git a/libcxx/include/__cxx03/__hash_table b/libcxx/include/__cxx03/__hash_table
index 30c0fbf4049da..eff5c2a52d8b7 100644
--- a/libcxx/include/__cxx03/__hash_table
+++ b/libcxx/include/__cxx03/__hash_table
@@ -658,7 +658,7 @@ public:
typedef typename _NodeTypes::__next_pointer __next_pointer;
private:
- // check for sane allocator pointer rebinding semantics. Rebinding the
+ // check for sound allocator pointer rebinding semantics. Rebinding the
// allocator for a new pointer type should be exactly the same as rebinding
// the pointer using 'pointer_traits'.
static_assert(is_same<__node_pointer, typename __node_traits::pointer>::value,
diff --git a/libcxx/include/__cxx03/__tree b/libcxx/include/__cxx03/__tree
index 3773fb485f488..3c7b165cfecbf 100644
--- a/libcxx/include/__cxx03/__tree
+++ b/libcxx/include/__cxx03/__tree
@@ -897,7 +897,7 @@ public:
typedef allocator_traits<__node_allocator> __node_traits;
private:
- // check for sane allocator pointer rebinding semantics. Rebinding the
+ // check for sound allocator pointer rebinding semantics. Rebinding the
// allocator for a new pointer type should be exactly the same as rebinding
// the pointer using 'pointer_traits'.
static_assert(is_same<__node_pointer, typename __node_traits::pointer>::value,
diff --git a/libcxx/include/__hash_table b/libcxx/include/__hash_table
index 91f660d3491e8..5a904e6e44ddb 100644
--- a/libcxx/include/__hash_table
+++ b/libcxx/include/__hash_table
@@ -675,7 +675,7 @@ public:
typedef typename _NodeTypes::__next_pointer __next_pointer;
private:
- // check for sane allocator pointer rebinding semantics. Rebinding the
+ // check for sound allocator pointer rebinding semantics. Rebinding the
// allocator for a new pointer type should be exactly the same as rebinding
// the pointer using 'pointer_traits'.
static_assert(is_same<__node_pointer, typename __node_traits::pointer>::value,
diff --git a/libcxx/include/__tree b/libcxx/include/__tree
index c5f52f404eff3..b0aee3e36f59c 100644
--- a/libcxx/include/__tree
+++ b/libcxx/include/__tree
@@ -814,7 +814,7 @@ public:
#endif
private:
- // check for sane allocator pointer rebinding semantics. Rebinding the
+ // check for sound allocator pointer rebinding semantics. Rebinding the
// allocator for a new pointer type should be exactly the same as rebinding
// the pointer using 'pointer_traits'.
static_assert(is_same<__node_pointer, typename __node_traits::pointer>::value,
diff --git a/libcxx/test/libcxx-03/numerics/bit.ops.pass.cpp b/libcxx/test/libcxx-03/numerics/bit.ops.pass.cpp
index 0b82f352ffe3d..4d5d36ef96c39 100644
--- a/libcxx/test/libcxx-03/numerics/bit.ops.pass.cpp
+++ b/libcxx/test/libcxx-03/numerics/bit.ops.pass.cpp
@@ -7,7 +7,7 @@
//===----------------------------------------------------------------------===//
// Test the __XXXX routines in the <bit> header.
-// These are not supposed to be exhaustive tests, just sanity checks.
+// These are not supposed to be exhaustive tests, just soundness checks.
#include <__cxx03/__bit/countl.h>
#include <__cxx03/__bit/rotate.h>
diff --git a/libcxx/test/libcxx/containers/views/mdspan/extents/assert.ctor_from_span.pass.cpp b/libcxx/test/libcxx/containers/views/mdspan/extents/assert.ctor_from_span.pass.cpp
index 650fecf62128c..e12fd6168e28e 100644
--- a/libcxx/test/libcxx/containers/views/mdspan/extents/assert.ctor_from_span.pass.cpp
+++ b/libcxx/test/libcxx/containers/views/mdspan/extents/assert.ctor_from_span.pass.cpp
@@ -36,7 +36,7 @@
int main(int, char**) {
constexpr size_t D = std::dynamic_extent;
- // working case sanity check
+ // working case soundness check
{
std::array args{1000, 5};
[[maybe_unused]] std::extents<int, D, 5> e1(std::span{args});
diff --git a/libcxx/test/libcxx/containers/views/mdspan/layout_stride/assert.conversion.pass.cpp b/libcxx/test/libcxx/containers/views/mdspan/layout_stride/assert.conversion.pass.cpp
index 7deb1215de0de..1aa7cfb357f2f 100644
--- a/libcxx/test/libcxx/containers/views/mdspan/layout_stride/assert.conversion.pass.cpp
+++ b/libcxx/test/libcxx/containers/views/mdspan/layout_stride/assert.conversion.pass.cpp
@@ -92,7 +92,7 @@ int main(int, char**) {
// required span size = (3-1)*50 + (10-1) * 3 + 1 = 128
std::extents<int, D, D> arg_exts{3, 10};
std::layout_stride::mapping<std::extents<int, D, D>> arg(arg_exts, std::array<int, 2>{50, 3});
- // sanity check:
+ // soundness check:
assert(arg.required_span_size() == 128);
// check extents would be constructible
[[maybe_unused]] std::extents<signed char, D, 10> e(arg_exts);
diff --git a/libcxx/test/libcxx/containers/views/mdspan/mdspan/assert.size.pass.cpp b/libcxx/test/libcxx/containers/views/mdspan/mdspan/assert.size.pass.cpp
index 9af82701cd4be..31154f05367e6 100644
--- a/libcxx/test/libcxx/containers/views/mdspan/mdspan/assert.size.pass.cpp
+++ b/libcxx/test/libcxx/containers/views/mdspan/mdspan/assert.size.pass.cpp
@@ -39,7 +39,7 @@ int main(int, char**) {
layout_wrapping_integral<4>::mapping<std::dextents<signed char, 2>> map(
std::dextents<signed char, 2>(100, 3), not_extents_constructible_tag());
std::mdspan<float, std::dextents<signed char, 2>, layout_wrapping_integral<4>> mds(data.data(), map);
- // sanity check
+ // soundness check
assert(map.required_span_size() == static_cast<signed char>(12));
// 100 x 3 exceeds 256
{
diff --git a/libcxx/test/libcxx/debug/containers/sequence_container_iterators.pass.cpp b/libcxx/test/libcxx/debug/containers/sequence_container_iterators.pass.cpp
index c456ff1282d4b..a594933282d3b 100644
--- a/libcxx/test/libcxx/debug/containers/sequence_container_iterators.pass.cpp
+++ b/libcxx/test/libcxx/debug/containers/sequence_container_iterators.pass.cpp
@@ -66,7 +66,7 @@ struct SequenceContainerChecks : BasicContainerChecks<Container, CT> {
private:
static void SanityTest() {
- // sanity test
+ // soundness test
Container C = {1, 1, 1, 1};
::DoNotOptimize(&C);
}
diff --git a/libcxx/test/libcxx/input.output/filesystems/convert_file_time.pass.cpp b/libcxx/test/libcxx/input.output/filesystems/convert_file_time.pass.cpp
index c501969c31167..9cfe2608ea4b4 100644
--- a/libcxx/test/libcxx/input.output/filesystems/convert_file_time.pass.cpp
+++ b/libcxx/test/libcxx/input.output/filesystems/convert_file_time.pass.cpp
@@ -289,7 +289,7 @@ int main(int, char**) {
TestTimeSpec<std::int32_t, std::int32_t> >::test()));
}
{
- // Test that insane platforms like ppc64 linux, which use long double as time_t,
+ // Test that unsound platforms like ppc64 linux, which use long double as time_t,
// at least compile.
assert((test_case<TestFileTimeT<long double>, double,
TestTimeSpec<long double, long> >::test()));
diff --git a/libcxx/test/libcxx/numerics/bit.ops.pass.cpp b/libcxx/test/libcxx/numerics/bit.ops.pass.cpp
index 7f502d6e01d1e..9ef00ca81a87a 100644
--- a/libcxx/test/libcxx/numerics/bit.ops.pass.cpp
+++ b/libcxx/test/libcxx/numerics/bit.ops.pass.cpp
@@ -7,7 +7,7 @@
//===----------------------------------------------------------------------===//
// Test the __XXXX routines in the <bit> header.
-// These are not supposed to be exhaustive tests, just sanity checks.
+// These are not supposed to be exhaustive tests, just soundness checks.
#include <__bit/bit_log2.h>
#include <__bit/countl.h>
diff --git a/libcxx/test/std/atomics/atomics.lockfree/is_always_lock_free.pass.cpp b/libcxx/test/std/atomics/atomics.lockfree/is_always_lock_free.pass.cpp
index abb12d6a3c247..03b20a0edae68 100644
--- a/libcxx/test/std/atomics/atomics.lockfree/is_always_lock_free.pass.cpp
+++ b/libcxx/test/std/atomics/atomics.lockfree/is_always_lock_free.pass.cpp
@@ -49,7 +49,7 @@ void check_always_lock_free(std::atomic<T> const& a) {
}
}
- // In all cases, also sanity-check it based on the implication always-lock-free => lock-free.
+ // In all cases, also soundness-check it based on the implication always-lock-free => lock-free.
if (is_always_lock_free) {
auto is_lock_free = a.is_lock_free();
ASSERT_SAME_TYPE(decltype(is_lock_free), bool);
diff --git a/libcxx/test/std/atomics/atomics.ref/is_always_lock_free.pass.cpp b/libcxx/test/std/atomics/atomics.ref/is_always_lock_free.pass.cpp
index 78e46c0397951..da7c3e36110fc 100644
--- a/libcxx/test/std/atomics/atomics.ref/is_always_lock_free.pass.cpp
+++ b/libcxx/test/std/atomics/atomics.ref/is_always_lock_free.pass.cpp
@@ -43,7 +43,7 @@ void check_always_lock_free(std::atomic_ref<T> const& a) {
}
}
- // In all cases, also sanity-check it based on the implication always-lock-free => lock-free.
+ // In all cases, also soundness-check it based on the implication always-lock-free => lock-free.
if (is_always_lock_free) {
std::same_as<bool> decltype(auto) is_lock_free = a.is_lock_free();
assert(is_lock_free);
diff --git a/libcxx/test/std/concepts/concepts.lang/concept.convertible/convertible_to.pass.cpp b/libcxx/test/std/concepts/concepts.lang/concept.convertible/convertible_to.pass.cpp
index acc3758944034..df0c593d9739b 100644
--- a/libcxx/test/std/concepts/concepts.lang/concept.convertible/convertible_to.pass.cpp
+++ b/libcxx/test/std/concepts/concepts.lang/concept.convertible/convertible_to.pass.cpp
@@ -38,7 +38,7 @@ void CheckNotConvertibleTo() {
template <class T, class U>
void CheckIsConvertibleButNotConvertibleTo() {
- // Sanity check T is either implicitly xor explicitly convertible to U.
+ // Soundness check T is either implicitly xor explicitly convertible to U.
static_assert(std::is_convertible_v<T, U>);
static_assert(std::is_convertible_v<const T, U>);
static_assert(std::is_convertible_v<T, const U>);
diff --git a/libcxx/test/std/concepts/concepts.lang/concept.swappable/swappable.pass.cpp b/libcxx/test/std/concepts/concepts.lang/concept.swappable/swappable.pass.cpp
index ee8283501569d..b3088d088a7f7 100644
--- a/libcxx/test/std/concepts/concepts.lang/concept.swappable/swappable.pass.cpp
+++ b/libcxx/test/std/concepts/concepts.lang/concept.swappable/swappable.pass.cpp
@@ -200,7 +200,7 @@ static_assert(std::swappable<union_swap::adl_swappable&>);
static_assert(std::swappable<union_swap::adl_swappable&&>);
// All tests for std::swappable<T> are implicitly confirmed by `check_swap`, so we only need to
-// sanity check for a few positive cases.
+// soundness check for a few positive cases.
static_assert(std::swappable<int volatile&>);
static_assert(std::swappable<int&&>);
static_assert(std::swappable<int (*)()>);
diff --git a/libcxx/test/std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_constraint.compile.pass.cpp b/libcxx/test/std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_constraint.compile.pass.cpp
index 913e944b3f04c..7c47e27bc2e4f 100644
--- a/libcxx/test/std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_constraint.compile.pass.cpp
+++ b/libcxx/test/std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_constraint.compile.pass.cpp
@@ -29,7 +29,7 @@
#include <type_traits>
#include <vector>
-// Sanity-check that std::vector is constructible from two ints...
+// Soundness-check that std::vector is constructible from two ints...
static_assert(std::is_constructible<std::vector<int>, int*, int*>::value, "");
static_assert(std::is_constructible<std::vector<int>, int, int >::value, "");
diff --git a/libcxx/test/std/containers/sequences/array/empty.pass.cpp b/libcxx/test/std/containers/sequences/array/empty.pass.cpp
index a2289760b2e96..3d8eea1ecf7d2 100644
--- a/libcxx/test/std/containers/sequences/array/empty.pass.cpp
+++ b/libcxx/test/std/containers/sequences/array/empty.pass.cpp
@@ -41,7 +41,7 @@ int main(int, char**) {
#endif
#if TEST_STD_VER >= 11
- // Sanity check for constexpr in C++11
+ // Soundness check for constexpr in C++11
{
constexpr std::array<int, 3> array = {};
static_assert(!array.empty(), "");
diff --git a/libcxx/test/std/containers/sequences/array/max_size.pass.cpp b/libcxx/test/std/containers/sequences/array/max_size.pass.cpp
index af6f25559b8dd..db97b6bfa440f 100644
--- a/libcxx/test/std/containers/sequences/array/max_size.pass.cpp
+++ b/libcxx/test/std/containers/sequences/array/max_size.pass.cpp
@@ -41,7 +41,7 @@ int main(int, char**) {
#endif
#if TEST_STD_VER >= 11
- // Sanity check for constexpr in C++11
+ // Soundness check for constexpr in C++11
{
constexpr std::array<int, 3> array = {};
static_assert(array.max_size() == 3, "");
diff --git a/libcxx/test/std/containers/views/mdspan/extents/conversion.pass.cpp b/libcxx/test/std/containers/views/mdspan/extents/conversion.pass.cpp
index 4b6b1a63b80f9..ac21948594923 100644
--- a/libcxx/test/std/containers/views/mdspan/extents/conversion.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/extents/conversion.pass.cpp
@@ -75,7 +75,7 @@ constexpr void test_conversion() {
constexpr void test_no_implicit_conversion() {
constexpr size_t D = std::dynamic_extent;
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<std::extents<int, D>, std::extents<int, 5>>, "");
static_assert(std::is_convertible_v<std::extents<int, 5>, std::extents<int, D>>, "");
@@ -83,7 +83,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<std::extents<int, 5>, std::extents<int, D>>, "");
static_assert(!std::is_convertible_v<std::extents<int, D>, std::extents<int, 5>>, "");
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<std::extents<int, D, 7>, std::extents<int, 5, 7>>, "");
static_assert(std::is_convertible_v<std::extents<int, 5, 7>, std::extents<int, D, 7>>, "");
@@ -91,7 +91,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<std::extents<int, 5, 7>, std::extents<int, D, 7>>, "");
static_assert(!std::is_convertible_v<std::extents<int, D, 7>, std::extents<int, 5, 7>>, "");
- // Sanity check that smaller index_type to larger index_type conversion works
+ // Soundness check that smaller index_type to larger index_type conversion works
static_assert(std::is_constructible_v<std::extents<size_t, 5>, std::extents<int, 5>>, "");
static_assert(std::is_convertible_v<std::extents<int, 5>, std::extents<size_t, 5>>, "");
diff --git a/libcxx/test/std/containers/views/mdspan/layout_left/comparison.pass.cpp b/libcxx/test/std/containers/views/mdspan/layout_left/comparison.pass.cpp
index 6db8fa48f5def..57bf172c515be 100644
--- a/libcxx/test/std/containers/views/mdspan/layout_left/comparison.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/layout_left/comparison.pass.cpp
@@ -46,7 +46,7 @@ template <class T1, class T2>
constexpr void test_comparison_different_rank() {
constexpr size_t D = std::dynamic_extent;
- // sanity check same rank
+ // soundness check same rank
static_assert(compare_layout_mappings(std::extents<T1, D>(5), std::extents<T2, D>(5)));
static_assert(compare_layout_mappings(std::extents<T1, 5>(), std::extents<T2, D>(5)));
static_assert(compare_layout_mappings(std::extents<T1, D>(5), std::extents<T2, 5>()));
diff --git a/libcxx/test/std/containers/views/mdspan/layout_left/ctor.layout_right.pass.cpp b/libcxx/test/std/containers/views/mdspan/layout_left/ctor.layout_right.pass.cpp
index f7ea39acf0179..853a1cf9c5156 100644
--- a/libcxx/test/std/containers/views/mdspan/layout_left/ctor.layout_right.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/layout_left/ctor.layout_right.pass.cpp
@@ -72,7 +72,7 @@ using ll_mapping_t = std::layout_left::mapping<std::extents<IdxT, Extents...>>;
constexpr void test_no_implicit_conversion() {
constexpr size_t D = std::dynamic_extent;
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<ll_mapping_t<int, D>, lr_mapping_t<int, 5>>);
static_assert(std::is_convertible_v<lr_mapping_t<int, 5>, ll_mapping_t<int, D>>);
@@ -80,7 +80,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<ll_mapping_t<int, 5>, lr_mapping_t<int, D>>);
static_assert(!std::is_convertible_v<lr_mapping_t<int, D>, ll_mapping_t<int, 5>>);
- // Sanity check that smaller index_type to larger index_type conversion works
+ // Soundness check that smaller index_type to larger index_type conversion works
static_assert(std::is_constructible_v<ll_mapping_t<size_t, 5>, lr_mapping_t<int, 5>>);
static_assert(std::is_convertible_v<lr_mapping_t<int, 5>, ll_mapping_t<size_t, 5>>);
diff --git a/libcxx/test/std/containers/views/mdspan/layout_left/ctor.mapping.pass.cpp b/libcxx/test/std/containers/views/mdspan/layout_left/ctor.mapping.pass.cpp
index 28749327033aa..01e3a1ed5e37f 100644
--- a/libcxx/test/std/containers/views/mdspan/layout_left/ctor.mapping.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/layout_left/ctor.mapping.pass.cpp
@@ -77,7 +77,7 @@ using mapping_t = std::layout_left::mapping<std::extents<IdxT, Extents...>>;
constexpr void test_no_implicit_conversion() {
constexpr size_t D = std::dynamic_extent;
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<mapping_t<int, D>, mapping_t<int, 5>>);
static_assert(std::is_convertible_v<mapping_t<int, 5>, mapping_t<int, D>>);
@@ -85,7 +85,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<mapping_t<int, 5>, mapping_t<int, D>>);
static_assert(!std::is_convertible_v<mapping_t<int, D>, mapping_t<int, 5>>);
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<mapping_t<int, D, 7>, mapping_t<int, 5, 7>>);
static_assert(std::is_convertible_v<mapping_t<int, 5, 7>, mapping_t<int, D, 7>>);
@@ -93,7 +93,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<mapping_t<int, 5, 7>, mapping_t<int, D, 7>>);
static_assert(!std::is_convertible_v<mapping_t<int, D, 7>, mapping_t<int, 5, 7>>);
- // Sanity check that smaller index_type to larger index_type conversion works
+ // Soundness check that smaller index_type to larger index_type conversion works
static_assert(std::is_constructible_v<mapping_t<size_t, 5>, mapping_t<int, 5>>);
static_assert(std::is_convertible_v<mapping_t<int, 5>, mapping_t<size_t, 5>>);
diff --git a/libcxx/test/std/containers/views/mdspan/layout_right/comparison.pass.cpp b/libcxx/test/std/containers/views/mdspan/layout_right/comparison.pass.cpp
index bcf26e0f53866..7f0e747217665 100644
--- a/libcxx/test/std/containers/views/mdspan/layout_right/comparison.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/layout_right/comparison.pass.cpp
@@ -46,7 +46,7 @@ template <class T1, class T2>
constexpr void test_comparison_different_rank() {
constexpr size_t D = std::dynamic_extent;
- // sanity check same rank
+ // soundness check same rank
static_assert(compare_layout_mappings(std::extents<T1, D>(5), std::extents<T2, D>(5)));
static_assert(compare_layout_mappings(std::extents<T1, 5>(), std::extents<T2, D>(5)));
static_assert(compare_layout_mappings(std::extents<T1, D>(5), std::extents<T2, 5>()));
diff --git a/libcxx/test/std/containers/views/mdspan/layout_right/ctor.layout_left.pass.cpp b/libcxx/test/std/containers/views/mdspan/layout_right/ctor.layout_left.pass.cpp
index 8f49b37732616..5083222474d02 100644
--- a/libcxx/test/std/containers/views/mdspan/layout_right/ctor.layout_left.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/layout_right/ctor.layout_left.pass.cpp
@@ -72,7 +72,7 @@ using ll_mapping_t = std::layout_left::mapping<std::extents<IdxT, Extents...>>;
constexpr void test_no_implicit_conversion() {
constexpr size_t D = std::dynamic_extent;
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<lr_mapping_t<int, D>, ll_mapping_t<int, 5>>);
static_assert(std::is_convertible_v<ll_mapping_t<int, 5>, lr_mapping_t<int, D>>);
@@ -80,7 +80,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<lr_mapping_t<int, 5>, ll_mapping_t<int, D>>);
static_assert(!std::is_convertible_v<ll_mapping_t<int, D>, lr_mapping_t<int, 5>>);
- // Sanity check that smaller index_type to larger index_type conversion works
+ // Soundness check that smaller index_type to larger index_type conversion works
static_assert(std::is_constructible_v<lr_mapping_t<size_t, 5>, ll_mapping_t<int, 5>>);
static_assert(std::is_convertible_v<ll_mapping_t<int, 5>, lr_mapping_t<size_t, 5>>);
diff --git a/libcxx/test/std/containers/views/mdspan/layout_right/ctor.mapping.pass.cpp b/libcxx/test/std/containers/views/mdspan/layout_right/ctor.mapping.pass.cpp
index 7a08f694f3103..eed5c4dda5436 100644
--- a/libcxx/test/std/containers/views/mdspan/layout_right/ctor.mapping.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/layout_right/ctor.mapping.pass.cpp
@@ -77,7 +77,7 @@ using mapping_t = std::layout_right::mapping<std::extents<IdxT, Extents...>>;
constexpr void test_no_implicit_conversion() {
constexpr size_t D = std::dynamic_extent;
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<mapping_t<int, D>, mapping_t<int, 5>>);
static_assert(std::is_convertible_v<mapping_t<int, 5>, mapping_t<int, D>>);
@@ -85,7 +85,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<mapping_t<int, 5>, mapping_t<int, D>>);
static_assert(!std::is_convertible_v<mapping_t<int, D>, mapping_t<int, 5>>);
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<mapping_t<int, D, 7>, mapping_t<int, 5, 7>>);
static_assert(std::is_convertible_v<mapping_t<int, 5, 7>, mapping_t<int, D, 7>>);
@@ -93,7 +93,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<mapping_t<int, 5, 7>, mapping_t<int, D, 7>>);
static_assert(!std::is_convertible_v<mapping_t<int, D, 7>, mapping_t<int, 5, 7>>);
- // Sanity check that smaller index_type to larger index_type conversion works
+ // Soundness check that smaller index_type to larger index_type conversion works
static_assert(std::is_constructible_v<mapping_t<size_t, 5>, mapping_t<int, 5>>);
static_assert(std::is_convertible_v<mapping_t<int, 5>, mapping_t<size_t, 5>>);
diff --git a/libcxx/test/std/containers/views/mdspan/layout_stride/comparison.pass.cpp b/libcxx/test/std/containers/views/mdspan/layout_stride/comparison.pass.cpp
index 37e20a3061f5f..80d4a473ea2de 100644
--- a/libcxx/test/std/containers/views/mdspan/layout_stride/comparison.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/layout_stride/comparison.pass.cpp
@@ -44,7 +44,7 @@ template <class T1, class T2>
constexpr void test_comparison_different_rank() {
constexpr size_t D = std::dynamic_extent;
- // sanity check same rank
+ // soundness check same rank
static_assert(layout_mapping_comparable<std::extents<T1, D>, std::extents<T2, D>>);
static_assert(layout_mapping_comparable<std::extents<T1, 5>, std::extents<T2, D>>);
static_assert(layout_mapping_comparable<std::extents<T1, D>, std::extents<T2, 5>>);
diff --git a/libcxx/test/std/containers/views/mdspan/layout_stride/ctor.strided_mapping.pass.cpp b/libcxx/test/std/containers/views/mdspan/layout_stride/ctor.strided_mapping.pass.cpp
index 66946d2b77b65..92741a603a5ca 100644
--- a/libcxx/test/std/containers/views/mdspan/layout_stride/ctor.strided_mapping.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/layout_stride/ctor.strided_mapping.pass.cpp
@@ -115,7 +115,7 @@ template <class FromL>
constexpr void test_no_implicit_conversion() {
constexpr size_t D = std::dynamic_extent;
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<ToM<int, D>, FromM<FromL, int, 5>>);
static_assert(std::is_convertible_v<FromM<FromL, int, 5>, ToM<int, D>>);
@@ -123,7 +123,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<ToM<int, 5>, FromM<FromL, int, D>>);
static_assert(!std::is_convertible_v<FromM<FromL, int, D>, ToM<int, 5>>);
- // Sanity check that one static to dynamic conversion works
+ // Soundness check that one static to dynamic conversion works
static_assert(std::is_constructible_v<ToM<int, D, 7>, FromM<FromL, int, 5, 7>>);
static_assert(std::is_convertible_v<FromM<FromL, int, 5, 7>, ToM<int, D, 7>>);
@@ -131,7 +131,7 @@ constexpr void test_no_implicit_conversion() {
static_assert(std::is_constructible_v<ToM<int, 5, 7>, FromM<FromL, int, D, 7>>);
static_assert(!std::is_convertible_v<FromM<FromL, int, D, 7>, ToM<int, 5, 7>>);
- // Sanity check that smaller index_type to larger index_type conversion works
+ // Soundness check that smaller index_type to larger index_type conversion works
static_assert(std::is_constructible_v<ToM<size_t, 5>, FromM<FromL, int, 5>>);
static_assert(std::is_convertible_v<FromM<FromL, int, 5>, ToM<size_t, 5>>);
diff --git a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_array.pass.cpp b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_array.pass.cpp
index f4ceb862d66bc..770869e9a4b49 100644
--- a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_array.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_array.pass.cpp
@@ -117,12 +117,12 @@ constexpr void mixin_layout(const H& handle, const A& acc) {
mixin_extents<true, ac>(handle, std::layout_left(), acc);
mixin_extents<true, ac>(handle, std::layout_right(), acc);
- // Sanity check that this layouts mapping is constructible from extents (via its move constructor)
+ // Soundness check that this layouts mapping is constructible from extents (via its move constructor)
static_assert(std::is_constructible_v<layout_wrapping_integral<8>::mapping<std::extents<int>>, std::extents<int>>);
static_assert(
!std::is_constructible_v<layout_wrapping_integral<8>::mapping<std::extents<int>>, const std::extents<int>&>);
mixin_extents<true, ac>(handle, layout_wrapping_integral<8>(), acc);
- // Sanity check that this layouts mapping is not constructible from extents
+ // Soundness check that this layouts mapping is not constructible from extents
static_assert(!std::is_constructible_v<layout_wrapping_integral<4>::mapping<std::extents<int>>, std::extents<int>>);
static_assert(
!std::is_constructible_v<layout_wrapping_integral<4>::mapping<std::extents<int>>, const std::extents<int>&>);
@@ -153,7 +153,7 @@ constexpr bool test() {
// test non-constructibility from wrong array type
constexpr size_t D = std::dynamic_extent;
using mds_t = std::mdspan<float, std::extents<unsigned, 3, D, D>>;
- // sanity check
+ // soundness check
static_assert(std::is_constructible_v<mds_t, float*, std::array<int, 3>>);
static_assert(std::is_constructible_v<mds_t, float*, std::array<int, 2>>);
// wrong size
diff --git a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_extents.pass.cpp b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_extents.pass.cpp
index 4b94dcfed169b..a26711964bc83 100644
--- a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_extents.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_extents.pass.cpp
@@ -82,12 +82,12 @@ constexpr void mixin_layout(const H& handle, const A& acc) {
mixin_extents<true, ac>(handle, std::layout_right(), acc);
// Use weird layout, make sure it has the properties we want to test
- // Sanity check that this layouts mapping is constructible from extents (via its move constructor)
+ // Soundness check that this layouts mapping is constructible from extents (via its move constructor)
static_assert(std::is_constructible_v<layout_wrapping_integral<8>::mapping<std::extents<int>>, std::extents<int>>);
static_assert(
!std::is_constructible_v<layout_wrapping_integral<8>::mapping<std::extents<int>>, const std::extents<int>&>);
mixin_extents<false, ac>(handle, layout_wrapping_integral<8>(), acc);
- // Sanity check that this layouts mapping is not constructible from extents
+ // Soundness check that this layouts mapping is not constructible from extents
static_assert(!std::is_constructible_v<layout_wrapping_integral<4>::mapping<std::extents<int>>, std::extents<int>>);
static_assert(
!std::is_constructible_v<layout_wrapping_integral<4>::mapping<std::extents<int>>, const std::extents<int>&>);
@@ -118,7 +118,7 @@ constexpr bool test() {
// test non-constructibility from wrong extents type
constexpr size_t D = std::dynamic_extent;
using mds_t = std::mdspan<float, std::extents<int, 3, D, D>>;
- // sanity check
+ // soundness check
static_assert(std::is_constructible_v<mds_t, float*, std::extents<int, 3, D, D>>);
// wrong size
static_assert(!std::is_constructible_v<mds_t, float*, std::extents<int, D, D>>);
diff --git a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_integers.pass.cpp b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_integers.pass.cpp
index ebed92da74138..264241884a982 100644
--- a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_integers.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_integers.pass.cpp
@@ -62,7 +62,7 @@ constexpr void test_mdspan_types(const H& handle, const M& map, const A&, Idxs..
}
}
- // sanity check that concept works
+ // soundness check that concept works
static_assert(check_mdspan_ctor_implicit<MDS, H, std::array<typename MDS::index_type, MDS::rank_dynamic()>>);
// check that the constructor from integral is explicit
static_assert(!check_mdspan_ctor_implicit<MDS, H, Idxs...>);
@@ -105,12 +105,12 @@ constexpr void mixin_layout(const H& handle, const A& acc) {
mixin_extents<true, ac>(handle, std::layout_right(), acc);
// Use weird layout, make sure it has the properties we want to test
- // Sanity check that this layouts mapping is constructible from extents (via its move constructor)
+ // Soundness check that this layouts mapping is constructible from extents (via its move constructor)
static_assert(std::is_constructible_v<layout_wrapping_integral<8>::mapping<std::extents<int>>, std::extents<int>>);
static_assert(
!std::is_constructible_v<layout_wrapping_integral<8>::mapping<std::extents<int>>, const std::extents<int>&>);
mixin_extents<true, ac>(handle, layout_wrapping_integral<8>(), acc);
- // Sanity check that this layouts mapping is not constructible from extents
+ // Soundness check that this layouts mapping is not constructible from extents
static_assert(!std::is_constructible_v<layout_wrapping_integral<4>::mapping<std::extents<int>>, std::extents<int>>);
static_assert(
!std::is_constructible_v<layout_wrapping_integral<4>::mapping<std::extents<int>>, const std::extents<int>&>);
@@ -141,7 +141,7 @@ constexpr bool test() {
// test non-constructibility from wrong integer types
constexpr size_t D = std::dynamic_extent;
using mds_t = std::mdspan<float, std::extents<int, 3, D, D>>;
- // sanity check
+ // soundness check
static_assert(std::is_constructible_v<mds_t, float*, int, int, int>);
static_assert(std::is_constructible_v<mds_t, float*, int, int>);
// wrong number of arguments
diff --git a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_map.pass.cpp b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_map.pass.cpp
index 2260e679aa288..b0a8b8bc675a1 100644
--- a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_map.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_map.pass.cpp
@@ -106,7 +106,7 @@ constexpr bool test() {
constexpr size_t D = std::dynamic_extent;
using mds_t = std::mdspan<float, std::extents<int, 3, D, D>>;
- // sanity check
+ // soundness check
static_assert(std::is_constructible_v<mds_t, float*, mapping_t<std::extents<int, 3, D, D>>>);
// test non-constructibility from wrong mapping type
diff --git a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_map_acc.pass.cpp b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_map_acc.pass.cpp
index 8ca1bf5eafb57..200d3cff81c66 100644
--- a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_map_acc.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_map_acc.pass.cpp
@@ -102,7 +102,7 @@ constexpr bool test() {
using mds_t = std::mdspan<float, std::extents<int, 3, D, D>>;
using acc_t = std::default_accessor<float>;
- // sanity check
+ // soundness check
static_assert(std::is_constructible_v<mds_t, float*, mapping_t<std::extents<int, 3, D, D>>, acc_t>);
// test non-constructibility from wrong accessor
diff --git a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_span.pass.cpp b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_span.pass.cpp
index 383a490082d73..b6ebe517e8656 100644
--- a/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_span.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/mdspan/ctor.dh_span.pass.cpp
@@ -118,12 +118,12 @@ constexpr void mixin_layout(const H& handle, const A& acc) {
mixin_extents<true, ac>(handle, std::layout_left(), acc);
mixin_extents<true, ac>(handle, std::layout_right(), acc);
- // Sanity check that this layouts mapping is constructible from extents (via its move constructor)
+ // Soundness check that this layouts mapping is constructible from extents (via its move constructor)
static_assert(std::is_constructible_v<layout_wrapping_integral<8>::mapping<std::extents<int>>, std::extents<int>>);
static_assert(
!std::is_constructible_v<layout_wrapping_integral<8>::mapping<std::extents<int>>, const std::extents<int>&>);
mixin_extents<true, ac>(handle, layout_wrapping_integral<8>(), acc);
- // Sanity check that this layouts mapping is not constructible from extents
+ // Soundness check that this layouts mapping is not constructible from extents
static_assert(!std::is_constructible_v<layout_wrapping_integral<4>::mapping<std::extents<int>>, std::extents<int>>);
static_assert(
!std::is_constructible_v<layout_wrapping_integral<4>::mapping<std::extents<int>>, const std::extents<int>&>);
@@ -154,7 +154,7 @@ constexpr bool test() {
// test non-constructibility from wrong span type
constexpr size_t D = std::dynamic_extent;
using mds_t = std::mdspan<float, std::extents<unsigned, 3, D, D>>;
- // sanity check
+ // soundness check
static_assert(std::is_constructible_v<mds_t, float*, std::span<int, 3>>);
static_assert(std::is_constructible_v<mds_t, float*, std::span<int, 2>>);
// wrong size
diff --git a/libcxx/test/std/containers/views/mdspan/mdspan/types.pass.cpp b/libcxx/test/std/containers/views/mdspan/mdspan/types.pass.cpp
index b576419828b71..04de5df482821 100644
--- a/libcxx/test/std/containers/views/mdspan/mdspan/types.pass.cpp
+++ b/libcxx/test/std/containers/views/mdspan/mdspan/types.pass.cpp
@@ -166,7 +166,7 @@ int main(int, char**) {
mixin_accessor<MinimalElementType>();
mixin_accessor<const MinimalElementType>();
- // sanity checks for triviality
+ // soundness checks for triviality
check_triviality<std::mdspan<int, std::extents<int>>, false, true, true, true, true, true>();
check_triviality<std::mdspan<int, std::dextents<int, 1>>, false, true, true, true, true, true>();
check_triviality<std::mdspan<int, std::dextents<int, 1>, std::layout_right, checked_accessor<int>>,
diff --git a/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.space/space.pass.cpp b/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.space/space.pass.cpp
index 60e9ac778967e..4fa3839f27da9 100644
--- a/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.space/space.pass.cpp
+++ b/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.space/space.pass.cpp
@@ -83,7 +83,7 @@ static void basic_space_test()
// All the test cases should reside on the same filesystem and therefore
// should have the same expected result. Compute this expected result
- // one and check that it looks semi-sane.
+ // one and check that it looks semi-sound.
const std::uintmax_t bad_value = static_cast<std::uintmax_t>(-1);
std::uintmax_t expect_capacity;
std::uintmax_t expect_free;
diff --git a/libcxx/test/std/input.output/string.streams/istringstream/istringstream.members/str.allocator_propagation.pass.cpp b/libcxx/test/std/input.output/string.streams/istringstream/istringstream.members/str.allocator_propagation.pass.cpp
index 0effb69be2272..014d4f35c8e9c 100644
--- a/libcxx/test/std/input.output/string.streams/istringstream/istringstream.members/str.allocator_propagation.pass.cpp
+++ b/libcxx/test/std/input.output/string.streams/istringstream/istringstream.members/str.allocator_propagation.pass.cpp
@@ -43,7 +43,7 @@ void test_soccc_behavior() {
assert(ss.rdbuf()->get_allocator().count_ == 10);
assert(copied.empty());
- // sanity-check that SOCCC does in fact work
+ // soundness-check that SOCCC does in fact work
assert(S(copied).get_allocator().count_ == 11);
// [stringbuf.members]/10 doesn't specify the allocator to use,
diff --git a/libcxx/test/std/input.output/string.streams/ostringstream/ostringstream.members/str.allocator_propagation.pass.cpp b/libcxx/test/std/input.output/string.streams/ostringstream/ostringstream.members/str.allocator_propagation.pass.cpp
index dc57c912121dd..a3f5c6986f6eb 100644
--- a/libcxx/test/std/input.output/string.streams/ostringstream/ostringstream.members/str.allocator_propagation.pass.cpp
+++ b/libcxx/test/std/input.output/string.streams/ostringstream/ostringstream.members/str.allocator_propagation.pass.cpp
@@ -42,7 +42,7 @@ void test_soccc_behavior() {
assert(ss.rdbuf()->get_allocator().count_ == 10);
assert(copied.empty());
- // sanity-check that SOCCC does in fact work
+ // soundness-check that SOCCC does in fact work
assert(S(copied).get_allocator().count_ == 11);
// [stringbuf.members]/10 doesn't specify the allocator to use,
diff --git a/libcxx/test/std/input.output/string.streams/stringstream/stringstream.members/str.allocator_propagation.pass.cpp b/libcxx/test/std/input.output/string.streams/stringstream/stringstream.members/str.allocator_propagation.pass.cpp
index 7aa51254974fe..46924870ec21c 100644
--- a/libcxx/test/std/input.output/string.streams/stringstream/stringstream.members/str.allocator_propagation.pass.cpp
+++ b/libcxx/test/std/input.output/string.streams/stringstream/stringstream.members/str.allocator_propagation.pass.cpp
@@ -43,7 +43,7 @@ void test_soccc_behavior() {
assert(ss.rdbuf()->get_allocator().count_ == 10);
assert(copied.empty());
- // sanity-check that SOCCC does in fact work
+ // soundness-check that SOCCC does in fact work
assert(S(copied).get_allocator().count_ == 11);
// [stringbuf.members]/10 doesn't specify the allocator to use,
diff --git a/libcxx/test/std/language.support/cmp/cmp.alg/compare_strong_order_fallback.pass.cpp b/libcxx/test/std/language.support/cmp/cmp.alg/compare_strong_order_fallback.pass.cpp
index e1e7bc37b1d79..1ec941378bebc 100644
--- a/libcxx/test/std/language.support/cmp/cmp.alg/compare_strong_order_fallback.pass.cpp
+++ b/libcxx/test/std/language.support/cmp/cmp.alg/compare_strong_order_fallback.pass.cpp
@@ -134,7 +134,7 @@ constexpr bool test_1_3()
static_assert(std::size(v) == 14);
- // Sanity-check that array 'v' is indeed in the right order.
+ // Soundness-check that array 'v' is indeed in the right order.
for (int i=0; i < 14; ++i) {
for (int j=0; j < 14; ++j) {
auto naturalOrder = (v[i] <=> v[j]);
diff --git a/libcxx/test/std/language.support/cmp/cmp.alg/compare_weak_order_fallback.pass.cpp b/libcxx/test/std/language.support/cmp/cmp.alg/compare_weak_order_fallback.pass.cpp
index 07b5fcd0a6d17..e69b2d8041189 100644
--- a/libcxx/test/std/language.support/cmp/cmp.alg/compare_weak_order_fallback.pass.cpp
+++ b/libcxx/test/std/language.support/cmp/cmp.alg/compare_weak_order_fallback.pass.cpp
@@ -133,7 +133,7 @@ constexpr bool test_1_3()
static_assert(std::size(v) == 14);
- // Sanity-check that array 'v' is indeed in the right order.
+ // Soundness-check that array 'v' is indeed in the right order.
for (int i=0; i < 14; ++i) {
for (int j=0; j < 14; ++j) {
auto naturalOrder = (v[i] <=> v[j]);
diff --git a/libcxx/test/std/language.support/cmp/cmp.alg/strong_order.pass.cpp b/libcxx/test/std/language.support/cmp/cmp.alg/strong_order.pass.cpp
index e384ea289bb5b..d8404e491fb8a 100644
--- a/libcxx/test/std/language.support/cmp/cmp.alg/strong_order.pass.cpp
+++ b/libcxx/test/std/language.support/cmp/cmp.alg/strong_order.pass.cpp
@@ -134,7 +134,7 @@ constexpr bool test_1_3()
static_assert(std::size(v) == 14);
- // Sanity-check that array 'v' is indeed in the right order.
+ // Soundness-check that array 'v' is indeed in the right order.
for (int i=0; i < 14; ++i) {
for (int j=0; j < 14; ++j) {
auto naturalOrder = (v[i] <=> v[j]);
diff --git a/libcxx/test/std/language.support/cmp/cmp.alg/weak_order.pass.cpp b/libcxx/test/std/language.support/cmp/cmp.alg/weak_order.pass.cpp
index 09d720196e0b2..2f172d8302e6d 100644
--- a/libcxx/test/std/language.support/cmp/cmp.alg/weak_order.pass.cpp
+++ b/libcxx/test/std/language.support/cmp/cmp.alg/weak_order.pass.cpp
@@ -133,7 +133,7 @@ constexpr bool test_1_3()
static_assert(std::size(v) == 14);
- // Sanity-check that array 'v' is indeed in the right order.
+ // Soundness-check that array 'v' is indeed in the right order.
for (int i=0; i < 14; ++i) {
for (int j=0; j < 14; ++j) {
auto naturalOrder = (v[i] <=> v[j]);
diff --git a/libcxx/test/std/localization/locale.categories/category.ctype/locale.codecvt/locale.codecvt.members/utf_sanity_check.pass.cpp b/libcxx/test/std/localization/locale.categories/category.ctype/locale.codecvt/locale.codecvt.members/utf_sanity_check.pass.cpp
index 62fce70052c2a..16b5ece284237 100644
--- a/libcxx/test/std/localization/locale.categories/category.ctype/locale.codecvt/locale.codecvt.members/utf_sanity_check.pass.cpp
+++ b/libcxx/test/std/localization/locale.categories/category.ctype/locale.codecvt/locale.codecvt.members/utf_sanity_check.pass.cpp
@@ -19,7 +19,7 @@
// template <> class codecvt<char16_t, char8_t, mbstate_t> // C++20
// template <> class codecvt<char32_t, char16_t, mbstate_t> // extension
-// sanity check
+// soundness check
#include <locale>
#include <codecvt>
diff --git a/libcxx/test/std/numerics/c.math/hermite.pass.cpp b/libcxx/test/std/numerics/c.math/hermite.pass.cpp
index 2905950942581..55cff3e8de4c6 100644
--- a/libcxx/test/std/numerics/c.math/hermite.pass.cpp
+++ b/libcxx/test/std/numerics/c.math/hermite.pass.cpp
@@ -277,7 +277,7 @@ void test() {
}
}
- { // sanity checks: hermite polynoms need to change signs at (simple) roots. checked upto order n<=20.
+ { // soundness checks: hermite polynoms need to change signs at (simple) roots. checked upto order n<=20.
// root tolerance: must be smaller than the smallest difference between adjacent roots
Real tol = []() -> Real {
diff --git a/libcxx/test/std/numerics/numeric.ops/exclusive.scan/exclusive_scan.pass.cpp b/libcxx/test/std/numerics/numeric.ops/exclusive.scan/exclusive_scan.pass.cpp
index f6cac33e94438..3297cba9d7cb0 100644
--- a/libcxx/test/std/numerics/numeric.ops/exclusive.scan/exclusive_scan.pass.cpp
+++ b/libcxx/test/std/numerics/numeric.ops/exclusive.scan/exclusive_scan.pass.cpp
@@ -58,7 +58,7 @@ test()
constexpr std::size_t triangle(size_t n) { return n*(n+1)/2; }
-// Basic sanity
+// Basic soundness
TEST_CONSTEXPR_CXX20 void
basic_tests()
{
diff --git a/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan.pass.cpp b/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan.pass.cpp
index 1c79eebb8ee2c..2fc57c76501c2 100644
--- a/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan.pass.cpp
+++ b/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan.pass.cpp
@@ -59,7 +59,7 @@ test()
constexpr std::size_t triangle(size_t n) { return n*(n+1)/2; }
-// Basic sanity
+// Basic soundness
TEST_CONSTEXPR_CXX20 void
basic_tests()
{
diff --git a/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan_op.pass.cpp b/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan_op.pass.cpp
index fb39b4f06ece7..9081bd255f391 100644
--- a/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan_op.pass.cpp
+++ b/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan_op.pass.cpp
@@ -64,7 +64,7 @@ test()
constexpr std::size_t triangle(size_t n) { return n*(n+1)/2; }
-// Basic sanity
+// Basic soundness
TEST_CONSTEXPR_CXX20 void
basic_tests()
{
diff --git a/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan_op_init.pass.cpp b/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan_op_init.pass.cpp
index 4e07306c29311..d622043c0fd77 100644
--- a/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan_op_init.pass.cpp
+++ b/libcxx/test/std/numerics/numeric.ops/inclusive.scan/inclusive_scan_op_init.pass.cpp
@@ -64,7 +64,7 @@ test()
constexpr std::size_t triangle(size_t n) { return n*(n+1)/2; }
-// Basic sanity
+// Basic soundness
TEST_CONSTEXPR_CXX20 void
basic_tests()
{
diff --git a/libcxx/test/std/numerics/numeric.ops/numeric.ops.midpoint/midpoint.float.pass.cpp b/libcxx/test/std/numerics/numeric.ops/numeric.ops.midpoint/midpoint.float.pass.cpp
index 0d28cff511dee..9e15631bb9138 100644
--- a/libcxx/test/std/numerics/numeric.ops/numeric.ops.midpoint/midpoint.float.pass.cpp
+++ b/libcxx/test/std/numerics/numeric.ops/numeric.ops.midpoint/midpoint.float.pass.cpp
@@ -91,8 +91,8 @@ void fp_test()
T d1 = T(3.14);
T d0 = std::nextafter(d1, T(2));
T d2 = std::nextafter(d1, T(5));
- assert(d0 < d1); // sanity checking
- assert(d1 < d2); // sanity checking
+ assert(d0 < d1); // soundness checking
+ assert(d1 < d2); // soundness checking
#if defined(__PPC__) && (defined(__LONG_DOUBLE_128__) && __LONG_DOUBLE_128__) && \
!(defined(__LONG_DOUBLE_IEEE128__) && __LONG_DOUBLE_IEEE128__)
diff --git a/libcxx/test/std/numerics/numeric.ops/transform.exclusive.scan/transform_exclusive_scan_init_bop_uop.pass.cpp b/libcxx/test/std/numerics/numeric.ops/transform.exclusive.scan/transform_exclusive_scan_init_bop_uop.pass.cpp
index 7e1017d4e3040..2a7947eaff1fd 100644
--- a/libcxx/test/std/numerics/numeric.ops/transform.exclusive.scan/transform_exclusive_scan_init_bop_uop.pass.cpp
+++ b/libcxx/test/std/numerics/numeric.ops/transform.exclusive.scan/transform_exclusive_scan_init_bop_uop.pass.cpp
@@ -89,7 +89,7 @@ test()
constexpr std::size_t triangle(size_t n) { return n*(n+1)/2; }
-// Basic sanity
+// Basic soundness
TEST_CONSTEXPR_CXX20 void
basic_tests()
{
diff --git a/libcxx/test/std/numerics/numeric.ops/transform.inclusive.scan/transform_inclusive_scan_bop_uop.pass.cpp b/libcxx/test/std/numerics/numeric.ops/transform.inclusive.scan/transform_inclusive_scan_bop_uop.pass.cpp
index 1dd7661bb42ed..c01f7e16de723 100644
--- a/libcxx/test/std/numerics/numeric.ops/transform.inclusive.scan/transform_inclusive_scan_bop_uop.pass.cpp
+++ b/libcxx/test/std/numerics/numeric.ops/transform.inclusive.scan/transform_inclusive_scan_bop_uop.pass.cpp
@@ -78,7 +78,7 @@ test()
constexpr std::size_t triangle(size_t n) { return n*(n+1)/2; }
-// Basic sanity
+// Basic soundness
TEST_CONSTEXPR_CXX20 void
basic_tests()
{
diff --git a/libcxx/test/std/numerics/numeric.ops/transform.inclusive.scan/transform_inclusive_scan_bop_uop_init.pass.cpp b/libcxx/test/std/numerics/numeric.ops/transform.inclusive.scan/transform_inclusive_scan_bop_uop_init.pass.cpp
index 1269c3f68236b..fb11807260d09 100644
--- a/libcxx/test/std/numerics/numeric.ops/transform.inclusive.scan/transform_inclusive_scan_bop_uop_init.pass.cpp
+++ b/libcxx/test/std/numerics/numeric.ops/transform.inclusive.scan/transform_inclusive_scan_bop_uop_init.pass.cpp
@@ -91,7 +91,7 @@ test()
constexpr std::size_t triangle(size_t n) { return n*(n+1)/2; }
-// Basic sanity
+// Basic soundness
TEST_CONSTEXPR_CXX20 void
basic_tests()
{
diff --git a/libcxx/test/std/strings/string.view/string.view.capacity/capacity.pass.cpp b/libcxx/test/std/strings/string.view/string.view.capacity/capacity.pass.cpp
index 05dad28b71786..4f42caeb44c4e 100644
--- a/libcxx/test/std/strings/string.view/string.view.capacity/capacity.pass.cpp
+++ b/libcxx/test/std/strings/string.view/string.view.capacity/capacity.pass.cpp
@@ -47,7 +47,7 @@ void test1() {
assert(sv1.max_size() > sv1.size());
}
- // Sanity check max_size() -- a string_view can't store more bytes than a single object
+ // Soundness check max_size() -- a string_view can't store more bytes than a single object
// can contain. Any implementation that fails this check is certainly lying.
{
typedef typename SV::value_type CharT;
diff --git a/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.cons/mutex.pass.cpp b/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.cons/mutex.pass.cpp
index 45d694ed5c257..7f9e8ef920bd6 100644
--- a/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.cons/mutex.pass.cpp
+++ b/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.cons/mutex.pass.cpp
@@ -48,7 +48,7 @@ struct TrackedMutex {
template <class Mutex>
void test() {
- // Basic sanity test
+ // Basic soundness test
{
Mutex mutex;
std::vector<std::thread> threads;
diff --git a/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/lock.pass.cpp b/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/lock.pass.cpp
index d36ca1d38f8f1..3e5990ec42a17 100644
--- a/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/lock.pass.cpp
+++ b/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/lock.pass.cpp
@@ -46,7 +46,7 @@ struct TrackedMutex {
template <class Mutex>
void test() {
- // Basic sanity test
+ // Basic soundness test
{
Mutex mutex;
std::vector<std::thread> threads;
diff --git a/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/try_lock.pass.cpp b/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/try_lock.pass.cpp
index b6146680b6e35..59296f9db89ca 100644
--- a/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/try_lock.pass.cpp
+++ b/libcxx/test/std/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/try_lock.pass.cpp
@@ -47,7 +47,7 @@ struct TrackedMutex {
template <class Mutex>
void test() {
- // Basic sanity test
+ // Basic soundness test
{
Mutex mutex;
std::vector<std::thread> threads;
diff --git a/libcxx/test/std/utilities/allocator.adaptor/allocator.adaptor.types/is_always_equal.pass.cpp b/libcxx/test/std/utilities/allocator.adaptor/allocator.adaptor.types/is_always_equal.pass.cpp
index a091647a69002..64f85c00ab11a 100644
--- a/libcxx/test/std/utilities/allocator.adaptor/allocator.adaptor.types/is_always_equal.pass.cpp
+++ b/libcxx/test/std/utilities/allocator.adaptor/allocator.adaptor.types/is_always_equal.pass.cpp
@@ -23,7 +23,7 @@
#include "min_allocator.h"
int main(int, char**) {
- // sanity checks
+ // soundness checks
static_assert((std::is_same< std::allocator_traits<A1<int>>::is_always_equal, std::false_type>::value), "");
static_assert((std::is_same< std::allocator_traits<min_allocator<int>>::is_always_equal, std::true_type>::value), "");
diff --git a/libcxx/test/std/utilities/meta/meta.const.eval/is_constant_evaluated.pass.cpp b/libcxx/test/std/utilities/meta/meta.const.eval/is_constant_evaluated.pass.cpp
index 832fda32975c2..462ff8bcb050e 100644
--- a/libcxx/test/std/utilities/meta/meta.const.eval/is_constant_evaluated.pass.cpp
+++ b/libcxx/test/std/utilities/meta/meta.const.eval/is_constant_evaluated.pass.cpp
@@ -39,7 +39,7 @@ int main(int, char**)
constexpr bool p = std::is_constant_evaluated();
assert(p);
}
- // Test the return value of the builtin for basic sanity only. It's the
+ // Test the return value of the builtin for basic soundness only. It's the
// compiler's job to test the builtin for correctness.
{
static_assert(std::is_constant_evaluated(), "");
diff --git a/libcxx/test/support/filesystem_test_helper.h b/libcxx/test/support/filesystem_test_helper.h
index 2ad9efb32c60f..e7c796043e8d4 100644
--- a/libcxx/test/support/filesystem_test_helper.h
+++ b/libcxx/test/support/filesystem_test_helper.h
@@ -641,7 +641,7 @@ inline fs::path GetWindowsInaccessibleDir() {
for (const auto &ent : fs::directory_iterator(root, ec)) {
if (ent != dir)
continue;
- // Basic sanity checks on the directory_entry
+ // Basic soundness checks on the directory_entry
if (!ent.exists() || !ent.is_directory()) {
std::fprintf(stderr, "The expected inaccessible directory \"%s\" was found "
"but doesn't behave as expected, skipping tests "
diff --git a/libcxx/test/support/test_comparisons.h b/libcxx/test/support/test_comparisons.h
index e37ab44828c70..2f5f0c7ea9632 100644
--- a/libcxx/test/support/test_comparisons.h
+++ b/libcxx/test/support/test_comparisons.h
@@ -174,7 +174,7 @@ TEST_NODISCARD constexpr bool testOrderValues(Param val1, Param val2) {
#endif
-// Test all two comparison operations for sanity
+// Test all two comparison operations for soundness
template <class T, class U = T>
TEST_NODISCARD TEST_CONSTEXPR_CXX14 bool testEquality(const T& t1, const U& t2, bool isEqual)
{
diff --git a/libcxxabi/src/stdlib_new_delete.cpp b/libcxxabi/src/stdlib_new_delete.cpp
index b5ed59958d17e..6914a481ae9da 100644
--- a/libcxxabi/src/stdlib_new_delete.cpp
+++ b/libcxxabi/src/stdlib_new_delete.cpp
@@ -14,7 +14,7 @@
#include <cstdlib>
#include <new>
-// Perform a few sanity checks on libc++ and libc++abi macros to ensure that
+// Perform a few soundness checks on libc++ and libc++abi macros to ensure that
// the code below can be an exact copy of the code in libcxx/src/new.cpp.
#if !defined(_THROW_BAD_ALLOC)
# error The _THROW_BAD_ALLOC macro should be already defined by libc++
diff --git a/libcxxabi/test/guard_threaded_test.pass.cpp b/libcxxabi/test/guard_threaded_test.pass.cpp
index 78dafba7f7ecd..264f2f3273252 100644
--- a/libcxxabi/test/guard_threaded_test.pass.cpp
+++ b/libcxxabi/test/guard_threaded_test.pass.cpp
@@ -379,7 +379,7 @@ void test_futex_syscall() {
int main(int, char**) {
// Test each multi-threaded implementation with real threads.
test_all_impls();
- // Test the basic sanity of the futex syscall wrappers.
+ // Test the basic soundness of the futex syscall wrappers.
test_futex_syscall();
return 0;
diff --git a/lld/ELF/InputSection.cpp b/lld/ELF/InputSection.cpp
index 784ff7cc79912..56b9f6114276a 100644
--- a/lld/ELF/InputSection.cpp
+++ b/lld/ELF/InputSection.cpp
@@ -101,7 +101,7 @@ InputSectionBase::InputSectionBase(ObjFile<ELFT> &file,
getFlags(file.ctx, hdr.sh_flags), hdr.sh_link,
hdr.sh_info, hdr.sh_addralign, hdr.sh_entsize,
getSectionContents(file, hdr), sectionKind) {
- // We reject object files having insanely large alignments even though
+ // We reject object files having unsoundly large alignments even though
// they are allowed by the spec. I think 4GB is a reasonable limitation.
// We might want to relax this in the future.
if (hdr.sh_addralign > UINT32_MAX) {
diff --git a/lld/ELF/ScriptParser.cpp b/lld/ELF/ScriptParser.cpp
index ddfa24d9cacf5..45772e1b0607d 100644
--- a/lld/ELF/ScriptParser.cpp
+++ b/lld/ELF/ScriptParser.cpp
@@ -555,7 +555,7 @@ void ScriptParser::readSearchDir() {
// This reads an overlay description. Overlays are used to describe output
// sections that use the same virtual memory range and normally would trigger
-// linker's sections sanity check failures.
+// linker's sections soundness check failures.
// https://sourceware.org/binutils/docs/ld/Overlay-Description.html#Overlay-Description
SmallVector<SectionCommand *, 0> ScriptParser::readOverlay() {
Expr addrExpr;
diff --git a/lld/include/lld/Common/ErrorHandler.h b/lld/include/lld/Common/ErrorHandler.h
index 4db1fec268d76..0bb6f79d59f9e 100644
--- a/lld/include/lld/Common/ErrorHandler.h
+++ b/lld/include/lld/Common/ErrorHandler.h
@@ -42,7 +42,7 @@
// as if it were alignment 1 (which is the simplest reasonable value).
//
// Note that you should not continue with an invalid value; that breaks the
-// internal consistency. You need to maintain all variables have some sane
+// internal consistency. You need to maintain all variables have some sound
// value even after an error occurred. So, when you have to continue with
// some value, always use a dummy value.
//
diff --git a/lld/test/COFF/guard-warnings.s b/lld/test/COFF/guard-warnings.s
index 092871597d1f8..4722b7cbe21b0 100644
--- a/lld/test/COFF/guard-warnings.s
+++ b/lld/test/COFF/guard-warnings.s
@@ -44,7 +44,7 @@
# RUN: lld-link %t/main.obj %t/loadcfg-full.obj -guard:cf,longjmp,ehcont -out:%t.exe -entry:main %basename_t-exp.lib 2>&1 | FileCheck %s --check-prefix=NOWARN --allow-empty
# NOWARN-NOT: warning
-# Sanity check to make sure the no-warn version has the expected data.
+# Soundness check to make sure the no-warn version has the expected data.
# RUN: llvm-readobj --file-headers --coff-load-config %t.exe | FileCheck --check-prefix=CHECK %s
# CHECK: ImageBase: 0x140000000
# CHECK: LoadConfig [
diff --git a/lld/test/ELF/gc-sections-no-undef-error.s b/lld/test/ELF/gc-sections-no-undef-error.s
index d142998b7f501..350ca466726b9 100644
--- a/lld/test/ELF/gc-sections-no-undef-error.s
+++ b/lld/test/ELF/gc-sections-no-undef-error.s
@@ -2,7 +2,7 @@
# RUN: llvm-mc -filetype=obj -triple=x86_64-pc-linux %s -o %t.o
-# Sanity check that the link will fail with the undefined error without
+# Soundness check that the link will fail with the undefined error without
# gc-sections.
# RUN: not ld.lld %t.o -o /dev/null 2>&1 | FileCheck %s
# CHECK: error: undefined symbol: undefined
diff --git a/lld/test/ELF/lto/save-temps-eq.ll b/lld/test/ELF/lto/save-temps-eq.ll
index 9befc99af9253..f4062211d65aa 100644
--- a/lld/test/ELF/lto/save-temps-eq.ll
+++ b/lld/test/ELF/lto/save-temps-eq.ll
@@ -15,7 +15,7 @@
;; with the output from individualized save-temps later
; RUN: ld.lld main.o thin1.o --save-temps -o %t/all/a.out
; RUN: mv a.out.lto.* *.o.*.bc %t/all
-;; Sanity check that everything got moved
+;; Soundness check that everything got moved
; RUN: ls | count 2
;; Check precedence if both --save-temps and --save-temps= are present
diff --git a/lld/test/MachO/eh-frame-personality-dedup.s b/lld/test/MachO/eh-frame-personality-dedup.s
index 8a2cabb369a10..1d2e4dcb9914d 100644
--- a/lld/test/MachO/eh-frame-personality-dedup.s
+++ b/lld/test/MachO/eh-frame-personality-dedup.s
@@ -4,7 +4,7 @@
# RUN: llvm-mc -filetype=obj -triple=x86_64-apple-darwin19.0.0 -emit-compact-unwind-non-canonical=true %t/cu.s -o %t/cu.o
# RUN: %lld -dylib %t/cu.o %t/eh-frame.o -o %t/out
-## Sanity check: we want our input to contain a section (and not symbol)
+## Soundness check: we want our input to contain a section (and not symbol)
## relocation for the personality reference.
# RUN: llvm-readobj --relocations %t/cu.o | FileCheck %s --check-prefix=SECT-RELOC
# SECT-RELOC: Section __compact_unwind {
diff --git a/lld/test/MachO/icf-only-lsda-folded.s b/lld/test/MachO/icf-only-lsda-folded.s
index fb4296d3d3774..a84b49b8a7bc2 100644
--- a/lld/test/MachO/icf-only-lsda-folded.s
+++ b/lld/test/MachO/icf-only-lsda-folded.s
@@ -16,7 +16,7 @@
# RUN: llvm-objdump --macho --syms --unwind-info %t/test | FileCheck %s
# CHECK: SYMBOL TABLE:
-## Sanity check: Verify that the LSDAs are dedup'ed
+## Soundness check: Verify that the LSDAs are dedup'ed
# CHECK-NEXT: [[#%.16x, EXC:]] l O __TEXT,__gcc_except_tab _exception0
# CHECK-NEXT: [[#EXC]] l O __TEXT,__gcc_except_tab _exception1
## But that the functions themselves aren't
diff --git a/lldb/examples/summaries/cocoa/objc_runtime.py b/lldb/examples/summaries/cocoa/objc_runtime.py
index 4299e57b81f6c..d25ee6aaff0fe 100644
--- a/lldb/examples/summaries/cocoa/objc_runtime.py
+++ b/lldb/examples/summaries/cocoa/objc_runtime.py
@@ -143,7 +143,7 @@ def __init__(self, rot_pointer, params):
logger >> "Marking as invalid - name is invalid"
self.valid = 0
- # perform sanity checks on the contents of this class_ro_t
+ # perform soundness checks on the contents of this class_ro_t
def check_valid(self):
self.valid = 1
# misaligned pointers seem to be possible for this field
@@ -214,7 +214,7 @@ def __init__(self, rwt_pointer, params):
# self.rot = self.valobj.CreateValueFromAddress("rot",self.roPointer,self.sys_params.types_cache.addr_ptr_type).AddressOf()
self.data = RoT_Data(self.rot, self.sys_params)
- # perform sanity checks on the contents of this class_rw_t
+ # perform soundness checks on the contents of this class_rw_t
def check_valid(self):
logger = lldb.formatters.Logger.Logger()
self.valid = 1
@@ -264,7 +264,7 @@ def __init__(self, isa_pointer, params):
# self.rwt = self.valobj.CreateValueFromAddress("rwt",self.dataPointer,self.sys_params.types_cache.addr_ptr_type).AddressOf()
self.data = RwT_Data(self.rwt, self.sys_params)
- # perform sanity checks on the contents of this class_t
+ # perform soundness checks on the contents of this class_t
# this call tries to minimize the amount of data fetched- as soon as we have "proven"
# that we have an invalid object, we stop reading
def check_valid(self):
@@ -441,7 +441,7 @@ def __init__(self, isa_pointer, params):
logger >> "Marking as invalid - name is not valid"
self.valid = 0
- # perform sanity checks on the contents of this class_t
+ # perform sanisoundnessty checks on the contents of this class_t
def check_valid(self):
logger = lldb.formatters.Logger.Logger()
self.valid = 1
diff --git a/lldb/packages/Python/lldbsuite/test/dotest.py b/lldb/packages/Python/lldbsuite/test/dotest.py
index 2966ac04227cb..6b0425b2fc264 100644
--- a/lldb/packages/Python/lldbsuite/test/dotest.py
+++ b/lldb/packages/Python/lldbsuite/test/dotest.py
@@ -760,7 +760,7 @@ def getVersionForSDK(sdk):
def checkCompiler():
- # Add some intervention here to sanity check that the compiler requested is sane.
+ # Add some intervention here to soundness check that the compiler requested is sound.
# If found not to be an executable program, we abort.
c = configuration.compiler
if which(c):
diff --git a/lldb/source/API/SBCommandInterpreter.cpp b/lldb/source/API/SBCommandInterpreter.cpp
index 4ea79d336e08d..655a0e577692d 100644
--- a/lldb/source/API/SBCommandInterpreter.cpp
+++ b/lldb/source/API/SBCommandInterpreter.cpp
@@ -247,8 +247,8 @@ int SBCommandInterpreter::HandleCompletionWithDescriptions(
LLDB_INSTRUMENT_VA(this, current_line, cursor, last_char, match_start_point,
max_return_elements, matches, descriptions);
- // Sanity check the arguments that are passed in: cursor & last_char have to
- // be within the current_line.
+ // Soundness check the arguments that are passed in: cursor & last_char have
+ // to be within the current_line.
if (current_line == nullptr || cursor == nullptr || last_char == nullptr)
return 0;
diff --git a/lldb/source/Commands/CommandCompletions.cpp b/lldb/source/Commands/CommandCompletions.cpp
index b2fc893e13fe3..ad695cca2cb62 100644
--- a/lldb/source/Commands/CommandCompletions.cpp
+++ b/lldb/source/Commands/CommandCompletions.cpp
@@ -238,7 +238,7 @@ class SymbolCompleter : public Completer {
ConstString func_name = sc.GetFunctionName(Mangled::ePreferDemangled);
// Ensure that the function name matches the regex. This is more than
- // a sanity check. It is possible that the demangled function name
+ // a soundness check. It is possible that the demangled function name
// does not start with the prefix, for example when it's in an
// anonymous namespace.
if (!func_name.IsEmpty() && m_regex.Execute(func_name.GetStringRef()))
diff --git a/lldb/source/Commands/CommandObjectWatchpoint.cpp b/lldb/source/Commands/CommandObjectWatchpoint.cpp
index e79c3b8939fa6..2266989c9f8f0 100644
--- a/lldb/source/Commands/CommandObjectWatchpoint.cpp
+++ b/lldb/source/Commands/CommandObjectWatchpoint.cpp
@@ -820,7 +820,7 @@ corresponding to the byte size of the data type.");
m_option_watchpoint.watch_type = OptionGroupWatchpoint::eWatchModify;
}
- // We passed the sanity check for the command. Proceed to set the
+ // We passed the soundness check for the command. Proceed to set the
// watchpoint now.
size_t size = 0;
@@ -1014,7 +1014,7 @@ class CommandObjectWatchpointSetExpression : public CommandObjectRaw {
m_option_watchpoint.watch_type = OptionGroupWatchpoint::eWatchModify;
}
- // We passed the sanity check for the command. Proceed to set the
+ // We passed the soundness check for the command. Proceed to set the
// watchpoint now.
lldb::addr_t addr = 0;
size_t size = 0;
diff --git a/lldb/source/Commands/CommandObjectWatchpointCommand.cpp b/lldb/source/Commands/CommandObjectWatchpointCommand.cpp
index 32cb80b421fd6..e79458697d4fc 100644
--- a/lldb/source/Commands/CommandObjectWatchpointCommand.cpp
+++ b/lldb/source/Commands/CommandObjectWatchpointCommand.cpp
@@ -386,7 +386,7 @@ are no syntax errors may indicate that a function was declared but never called.
uint32_t cur_wp_id = valid_wp_ids.at(i);
if (cur_wp_id != LLDB_INVALID_WATCH_ID) {
Watchpoint *wp = target.GetWatchpointList().FindByID(cur_wp_id).get();
- // Sanity check wp first.
+ // Soundness check wp first.
if (wp == nullptr)
continue;
diff --git a/lldb/source/Core/SourceManager.cpp b/lldb/source/Core/SourceManager.cpp
index f786866a18137..9af2fa23399e8 100644
--- a/lldb/source/Core/SourceManager.cpp
+++ b/lldb/source/Core/SourceManager.cpp
@@ -653,7 +653,7 @@ size_t SourceManager::File::DisplaySourceLines(uint32_t line,
if (!s)
return 0;
- // Sanity check m_data_sp before proceeding.
+ // Soundness check m_data_sp before proceeding.
if (!m_data_sp)
return 0;
diff --git a/lldb/source/Expression/FunctionCaller.cpp b/lldb/source/Expression/FunctionCaller.cpp
index 6c93d94f691cb..d26f28e469c50 100644
--- a/lldb/source/Expression/FunctionCaller.cpp
+++ b/lldb/source/Expression/FunctionCaller.cpp
@@ -196,7 +196,7 @@ bool FunctionCaller::WriteFunctionArguments(
}
for (size_t i = 0; i < num_args; i++) {
- // FIXME: We should sanity check sizes.
+ // FIXME: We should soundness check sizes.
uint64_t offset = m_member_offsets[i + 1]; // Clang sizes are in bytes.
Value *arg_value = arg_values.GetValueAtIndex(i);
diff --git a/lldb/source/Expression/REPL.cpp b/lldb/source/Expression/REPL.cpp
index 92017d271a2df..4952b154892f4 100644
--- a/lldb/source/Expression/REPL.cpp
+++ b/lldb/source/Expression/REPL.cpp
@@ -25,7 +25,7 @@ using namespace lldb_private;
char REPL::ID;
REPL::REPL(Target &target) : m_target(target) {
- // Make sure all option values have sane defaults
+ // Make sure all option values have sound defaults
Debugger &debugger = m_target.GetDebugger();
debugger.SetShowProgress(false);
auto exe_ctx = debugger.GetCommandInterpreter().GetExecutionContext();
diff --git a/lldb/source/Plugins/ABI/Mips/ABISysV_mips64.cpp b/lldb/source/Plugins/ABI/Mips/ABISysV_mips64.cpp
index baefbfc363d99..f105b790ee436 100644
--- a/lldb/source/Plugins/ABI/Mips/ABISysV_mips64.cpp
+++ b/lldb/source/Plugins/ABI/Mips/ABISysV_mips64.cpp
@@ -1001,7 +1001,7 @@ ValueObjectSP ABISysV_mips64::GetReturnValueObjectImpl(
copy_from_extractor = &f2_data;
}
- // Sanity check to avoid crash
+ // Soundness check to avoid crash
if (!copy_from_extractor ||
*field_byte_width > copy_from_extractor->GetByteSize())
return return_valobj_sp;
diff --git a/lldb/source/Plugins/ABI/PowerPC/ABISysV_ppc.cpp b/lldb/source/Plugins/ABI/PowerPC/ABISysV_ppc.cpp
index e4bdc44c59c10..719cf3383a057 100644
--- a/lldb/source/Plugins/ABI/PowerPC/ABISysV_ppc.cpp
+++ b/lldb/source/Plugins/ABI/PowerPC/ABISysV_ppc.cpp
@@ -815,7 +815,7 @@ ValueObjectSP ABISysV_ppc::GetReturnValueObjectImpl(
}
}
- // These two tests are just sanity checks. If I somehow get the type
+ // These two tests are just soundness checks. If I somehow get the type
// calculation wrong above it is better to just return nothing than to
// assert or crash.
if (!copy_from_extractor)
diff --git a/lldb/source/Plugins/ABI/X86/ABISysV_x86_64.cpp b/lldb/source/Plugins/ABI/X86/ABISysV_x86_64.cpp
index 7646ccda010d0..cae7059bc11aa 100644
--- a/lldb/source/Plugins/ABI/X86/ABISysV_x86_64.cpp
+++ b/lldb/source/Plugins/ABI/X86/ABISysV_x86_64.cpp
@@ -817,7 +817,7 @@ ValueObjectSP ABISysV_x86_64::GetReturnValueObjectImpl(
}
}
}
- // These two tests are just sanity checks. If I somehow get the type
+ // These two tests are just soundness checks. If I somehow get the type
// calculation wrong above it is better to just return nothing than to
// assert or crash.
if (!copy_from_extractor)
diff --git a/lldb/source/Plugins/ABI/X86/ABIWindows_x86_64.cpp b/lldb/source/Plugins/ABI/X86/ABIWindows_x86_64.cpp
index 56df6f6b5e97c..0c1e79cb64819 100644
--- a/lldb/source/Plugins/ABI/X86/ABIWindows_x86_64.cpp
+++ b/lldb/source/Plugins/ABI/X86/ABIWindows_x86_64.cpp
@@ -696,7 +696,7 @@ ValueObjectSP ABIWindows_x86_64::GetReturnValueObjectImpl(
copy_from_offset = used_bytes;
used_bytes += field_byte_width;
}
- // These two tests are just sanity checks. If I somehow get the type
+ // These two tests are just soundness checks. If I somehow get the type
// calculation wrong above it is better to just return nothing than to
// assert or crash.
if (!copy_from_extractor) {
diff --git a/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/DynamicLoaderMacOS.cpp b/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/DynamicLoaderMacOS.cpp
index efb9ccc76b507..7762417a16dc1 100644
--- a/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/DynamicLoaderMacOS.cpp
+++ b/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/DynamicLoaderMacOS.cpp
@@ -249,7 +249,7 @@ bool DynamicLoaderMacOS::NotifyBreakpointHit(void *baton,
ExecutionContext exe_ctx(context->exe_ctx_ref);
Process *process = exe_ctx.GetProcessPtr();
- // This is a sanity check just in case this dyld_instance is an old dyld
+ // This is a soundness check just in case this dyld_instance is an old dyld
// plugin's breakpoint still lying around.
if (process != dyld_instance->m_process)
return false;
diff --git a/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/DynamicLoaderMacOSXDYLD.cpp b/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/DynamicLoaderMacOSXDYLD.cpp
index f839948660aa0..dfe1d48b23aa7 100644
--- a/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/DynamicLoaderMacOSXDYLD.cpp
+++ b/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/DynamicLoaderMacOSXDYLD.cpp
@@ -349,7 +349,7 @@ bool DynamicLoaderMacOSXDYLD::NotifyBreakpointHit(
ExecutionContext exe_ctx(context->exe_ctx_ref);
Process *process = exe_ctx.GetProcessPtr();
- // This is a sanity check just in case this dyld_instance is an old dyld
+ // This is a soundness check just in case this dyld_instance is an old dyld
// plugin's breakpoint still lying around.
if (process != dyld_instance->m_process)
return false;
diff --git a/lldb/source/Plugins/ExpressionParser/Clang/CppModuleConfiguration.cpp b/lldb/source/Plugins/ExpressionParser/Clang/CppModuleConfiguration.cpp
index f3aabc12f92b7..aa309937631f3 100644
--- a/lldb/source/Plugins/ExpressionParser/Clang/CppModuleConfiguration.cpp
+++ b/lldb/source/Plugins/ExpressionParser/Clang/CppModuleConfiguration.cpp
@@ -109,7 +109,7 @@ bool CppModuleConfiguration::hasValidConfig() {
if (!m_c_inc.Valid() || !m_std_inc.Valid())
return false;
- // Do some basic sanity checks on the directories that we don't activate
+ // Do some basic soundness checks on the directories that we don't activate
// the module when it's clear that it's not usable.
const std::vector<std::string> files_to_check = {
// * Check that the C library contains at least one random C standard
diff --git a/lldb/source/Plugins/Process/FreeBSD/NativeProcessFreeBSD.cpp b/lldb/source/Plugins/Process/FreeBSD/NativeProcessFreeBSD.cpp
index a22083a8a0903..e15fe409f9fd8 100644
--- a/lldb/source/Plugins/Process/FreeBSD/NativeProcessFreeBSD.cpp
+++ b/lldb/source/Plugins/Process/FreeBSD/NativeProcessFreeBSD.cpp
@@ -607,7 +607,7 @@ Status NativeProcessFreeBSD::GetMemoryRegionInfo(lldb::addr_t load_addr,
for (auto it = m_mem_region_cache.begin(); it != m_mem_region_cache.end();
++it) {
MemoryRegionInfo &proc_entry_info = it->first;
- // Sanity check assumption that memory map entries are ascending.
+ // Soundness check assumption that memory map entries are ascending.
assert((proc_entry_info.GetRange().GetRangeBase() >= prev_base_address) &&
"descending memory map entries detected, unexpected");
prev_base_address = proc_entry_info.GetRange().GetRangeBase();
diff --git a/lldb/source/Plugins/Process/Linux/NativeProcessLinux.cpp b/lldb/source/Plugins/Process/Linux/NativeProcessLinux.cpp
index 9c798cb1cc8f2..32042acb0075c 100644
--- a/lldb/source/Plugins/Process/Linux/NativeProcessLinux.cpp
+++ b/lldb/source/Plugins/Process/Linux/NativeProcessLinux.cpp
@@ -1230,7 +1230,7 @@ Status NativeProcessLinux::GetMemoryRegionInfo(lldb::addr_t load_addr,
++it) {
MemoryRegionInfo &proc_entry_info = it->first;
- // Sanity check assumption that /proc/{pid}/maps entries are ascending.
+ // Soundness check assumption that /proc/{pid}/maps entries are ascending.
assert((proc_entry_info.GetRange().GetRangeBase() >= prev_base_address) &&
"descending /proc/pid/maps entries detected, unexpected");
prev_base_address = proc_entry_info.GetRange().GetRangeBase();
diff --git a/lldb/source/Plugins/Process/NetBSD/NativeProcessNetBSD.cpp b/lldb/source/Plugins/Process/NetBSD/NativeProcessNetBSD.cpp
index 8fb15d83117f4..6b95e717d8dbd 100644
--- a/lldb/source/Plugins/Process/NetBSD/NativeProcessNetBSD.cpp
+++ b/lldb/source/Plugins/Process/NetBSD/NativeProcessNetBSD.cpp
@@ -639,7 +639,7 @@ Status NativeProcessNetBSD::GetMemoryRegionInfo(lldb::addr_t load_addr,
for (auto it = m_mem_region_cache.begin(); it != m_mem_region_cache.end();
++it) {
MemoryRegionInfo &proc_entry_info = it->first;
- // Sanity check assumption that memory map entries are ascending.
+ // Soundness check assumption that memory map entries are ascending.
assert((proc_entry_info.GetRange().GetRangeBase() >= prev_base_address) &&
"descending memory map entries detected, unexpected");
prev_base_address = proc_entry_info.GetRange().GetRangeBase();
diff --git a/lldb/source/Plugins/Process/elf-core/ProcessElfCore.cpp b/lldb/source/Plugins/Process/elf-core/ProcessElfCore.cpp
index 88eeddf178788..23768e6143868 100644
--- a/lldb/source/Plugins/Process/elf-core/ProcessElfCore.cpp
+++ b/lldb/source/Plugins/Process/elf-core/ProcessElfCore.cpp
@@ -695,7 +695,7 @@ llvm::Error ProcessElfCore::parseNetBSDNotes(llvm::ArrayRef<CoreNote> notes) {
bool had_nt_regs = false;
// To be extracted from struct netbsd_elfcore_procinfo
- // Used to sanity check of the LWPs of the process
+ // Used to soundness check of the LWPs of the process
uint32_t nlwps = 0;
uint32_t signo = 0; // killing signal
uint32_t siglwp = 0; // LWP target of killing signal
diff --git a/lldb/source/Plugins/Process/gdb-remote/ProcessGDBRemote.cpp b/lldb/source/Plugins/Process/gdb-remote/ProcessGDBRemote.cpp
index 91f3a6ce383b1..fe1d55603dac7 100644
--- a/lldb/source/Plugins/Process/gdb-remote/ProcessGDBRemote.cpp
+++ b/lldb/source/Plugins/Process/gdb-remote/ProcessGDBRemote.cpp
@@ -2703,7 +2703,7 @@ size_t ProcessGDBRemote::DoReadMemory(addr_t addr, void *buf, size_t size,
? m_max_memory_size
: m_max_memory_size / 2;
if (size > max_memory_size) {
- // Keep memory read sizes down to a sane limit. This function will be
+ // Keep memory read sizes down to a sound limit. This function will be
// called multiple times in order to complete the task by
// lldb_private::Process so it is ok to do this.
size = max_memory_size;
@@ -2943,7 +2943,7 @@ size_t ProcessGDBRemote::DoWriteMemory(addr_t addr, const void *buf,
// M and m packets take 2 bytes for 1 byte of memory
size_t max_memory_size = m_max_memory_size / 2;
if (size > max_memory_size) {
- // Keep memory read sizes down to a sane limit. This function will be
+ // Keep memory read sizes down to a sound limit. This function will be
// called multiple times in order to complete the task by
// lldb_private::Process so it is ok to do this.
size = max_memory_size;
diff --git a/lldb/source/Plugins/SymbolFile/DWARF/DWARFASTParserClang.cpp b/lldb/source/Plugins/SymbolFile/DWARF/DWARFASTParserClang.cpp
index 0f1f41baced86..b4c37ec859d66 100644
--- a/lldb/source/Plugins/SymbolFile/DWARF/DWARFASTParserClang.cpp
+++ b/lldb/source/Plugins/SymbolFile/DWARF/DWARFASTParserClang.cpp
@@ -2763,8 +2763,8 @@ DWARFASTParserClang::MemberAttributes::MemberAttributes(
// DW_AT_bit_size( 0x40 )
// DW_AT_bit_offset( 0xffffffffffffffc0 )
//
- // So check the bit offset to make sure it is sane, and if the values
- // are not sane, remove them. If we don't do this then we will end up
+ // So check the bit offset to make sure it is sound, and if the values
+ // are not sound, remove them. If we don't do this then we will end up
// with a crash if we try to use this type in an expression when clang
// becomes unhappy with its recycled debug info.
if (byte_size.value_or(0) == 0 && bit_offset < 0) {
diff --git a/lldb/source/Plugins/Trace/intel-pt/TraceIntelPTBundleLoader.cpp b/lldb/source/Plugins/Trace/intel-pt/TraceIntelPTBundleLoader.cpp
index c00eebc823a8c..9d9bd63612398 100644
--- a/lldb/source/Plugins/Trace/intel-pt/TraceIntelPTBundleLoader.cpp
+++ b/lldb/source/Plugins/Trace/intel-pt/TraceIntelPTBundleLoader.cpp
@@ -267,7 +267,7 @@ StringRef TraceIntelPTBundleLoader::GetSchema() {
"loadAddress": integer | string decimal | hex string,
// Lowest address of the sections of the module loaded on memory.
"uuid"?: string,
- // Build UUID for the file for sanity checks.
+ // Build UUID for the file for soundness checks.
}
]
}
diff --git a/lldb/source/Plugins/TypeSystem/Clang/TypeSystemClang.cpp b/lldb/source/Plugins/TypeSystem/Clang/TypeSystemClang.cpp
index 39aacdb58e694..093ce6df51b05 100644
--- a/lldb/source/Plugins/TypeSystem/Clang/TypeSystemClang.cpp
+++ b/lldb/source/Plugins/TypeSystem/Clang/TypeSystemClang.cpp
@@ -801,7 +801,7 @@ TypeSystemClang::GetBuiltinTypeForEncodingAndBitSize(Encoding encoding,
break;
case eEncodingVector:
- // Sanity check that bit_size is a multiple of 8's.
+ // Soundness check that bit_size is a multiple of 8's.
if (bit_size && !(bit_size & 0x7u))
return GetType(ast.getExtVectorType(ast.UnsignedCharTy, bit_size / 8));
break;
diff --git a/lldb/source/Plugins/UnwindAssembly/x86/UnwindAssembly-x86.cpp b/lldb/source/Plugins/UnwindAssembly/x86/UnwindAssembly-x86.cpp
index f5279758a147c..487b7ebc0d0ab 100644
--- a/lldb/source/Plugins/UnwindAssembly/x86/UnwindAssembly-x86.cpp
+++ b/lldb/source/Plugins/UnwindAssembly/x86/UnwindAssembly-x86.cpp
@@ -133,8 +133,8 @@ bool UnwindAssembly_x86::AugmentUnwindPlanFromCallSite(
if (last_row_pc_loc.IsAtCFAPlusOffset() &&
first_row_pc_loc.GetOffset() == last_row_pc_loc.GetOffset()) {
- // One last sanity check: Is the unwind rule for getting the caller
- // pc value "deref the CFA-4" or "deref the CFA-8"?
+ // One last soundness check: Is the unwind rule for getting the
+ // caller pc value "deref the CFA-4" or "deref the CFA-8"?
// If so, we have an UnwindPlan that already describes the epilogue
// and we don't need to modify it at all.
diff --git a/lldb/source/Symbol/Symbol.cpp b/lldb/source/Symbol/Symbol.cpp
index 40497dbccc5c3..6bc3a5fa7c915 100644
--- a/lldb/source/Symbol/Symbol.cpp
+++ b/lldb/source/Symbol/Symbol.cpp
@@ -363,8 +363,8 @@ uint32_t Symbol::GetPrologueByteSize() {
break;
}
- // Sanity check - this may be a function in the middle of code that
- // has debug information, but not for this symbol. So the line
+ // Soundness check - this may be a function in the middle of code
+ // that has debug information, but not for this symbol. So the line
// entries surrounding us won't lie inside our function. In that
// case, the line entry will be bigger than we are, so we do that
// quick check and if that is true, we just return 0.
diff --git a/lldb/source/Target/RegisterContextUnwind.cpp b/lldb/source/Target/RegisterContextUnwind.cpp
index bcf1297f2114f..e7933ac390f04 100644
--- a/lldb/source/Target/RegisterContextUnwind.cpp
+++ b/lldb/source/Target/RegisterContextUnwind.cpp
@@ -450,7 +450,7 @@ void RegisterContextUnwind::InitializeNonZerothFrame() {
ReadFrameAddress(row_register_kind, row->GetAFAValue(), m_afa);
- // A couple of sanity checks..
+ // A couple of soundness checks..
if (m_cfa == LLDB_INVALID_ADDRESS || m_cfa == 0 || m_cfa == 1) {
UnwindLogMsg("could not find a valid cfa address");
m_frame_type = eNotAValidFrame;
diff --git a/lldb/source/Target/ThreadPlanStepInRange.cpp b/lldb/source/Target/ThreadPlanStepInRange.cpp
index 0e93691de68af..a8a385c4e6e9c 100644
--- a/lldb/source/Target/ThreadPlanStepInRange.cpp
+++ b/lldb/source/Target/ThreadPlanStepInRange.cpp
@@ -300,7 +300,7 @@ void ThreadPlanStepInRange::SetAvoidRegexp(const char *name) {
}
void ThreadPlanStepInRange::SetDefaultFlagValue(uint32_t new_value) {
- // TODO: Should we test this for sanity?
+ // TODO: Should we test this for soundness?
ThreadPlanStepInRange::s_default_flag_values = new_value;
}
diff --git a/lldb/source/Target/ThreadPlanStepOverRange.cpp b/lldb/source/Target/ThreadPlanStepOverRange.cpp
index 643ee827c865c..fd36496e0ac7c 100644
--- a/lldb/source/Target/ThreadPlanStepOverRange.cpp
+++ b/lldb/source/Target/ThreadPlanStepOverRange.cpp
@@ -109,8 +109,8 @@ bool ThreadPlanStepOverRange::IsEquivalentContext(
language->AreEqualForFrameComparison(context, m_addr_context))
return *maybe_equivalent;
// Match as much as is specified in the m_addr_context: This is a fairly
- // loose sanity check. Note, sometimes the target doesn't get filled in so I
- // left out the target check. And sometimes the module comes in as the .o
+ // loose soundness check. Note, sometimes the target doesn't get filled in so
+ // I left out the target check. And sometimes the module comes in as the .o
// file from the inlined range, so I left that out too...
if (m_addr_context.comp_unit) {
if (m_addr_context.comp_unit != context.comp_unit)
diff --git a/lldb/source/Utility/ZipFile.cpp b/lldb/source/Utility/ZipFile.cpp
index b8ed956cbfcb2..24c615da01aae 100644
--- a/lldb/source/Utility/ZipFile.cpp
+++ b/lldb/source/Utility/ZipFile.cpp
@@ -93,7 +93,7 @@ const EocdRecord *FindEocdRecord(lldb::DataBufferSP zip_data) {
auto eocd = reinterpret_cast<const EocdRecord *>(p);
if (::memcmp(eocd->signature, EocdRecord::kSignature,
sizeof(EocdRecord::kSignature)) == 0) {
- // Found the end of central directory. Sanity check the values.
+ // Found the end of central directory. Soundness check the values.
if (eocd->cd_records * sizeof(CdRecord) > eocd->cd_size ||
zip_data->GetBytes() + eocd->cd_offset + eocd->cd_size > p)
return nullptr;
@@ -141,7 +141,7 @@ bool FindFile(lldb::DataBufferSP zip_data, const EocdRecord *eocd,
sizeof(CdRecord::kSignature)) != 0)
return false;
- // Sanity check the file name values.
+ // Soundness check the file name values.
auto file_name = reinterpret_cast<const char *>(cd + 1);
size_t file_name_length = cd->file_name_length;
if (file_name + file_name_length >= reinterpret_cast<const char *>(eocd) ||
@@ -158,7 +158,7 @@ bool FindFile(lldb::DataBufferSP zip_data, const EocdRecord *eocd,
cd = reinterpret_cast<const CdRecord *>(
reinterpret_cast<const char *>(cd) + sizeof(CdRecord) +
cd->file_name_length + cd->extra_field_length + cd->comment_length);
- // Sanity check the pointer.
+ // Soundness check the pointer.
if (reinterpret_cast<const char *>(cd) >=
reinterpret_cast<const char *>(eocd))
return false;
diff --git a/lldb/test/API/api/check_public_api_headers/TestPublicAPIHeaders.py b/lldb/test/API/api/check_public_api_headers/TestPublicAPIHeaders.py
index 60ca8557d60b9..366fadeec2b7b 100644
--- a/lldb/test/API/api/check_public_api_headers/TestPublicAPIHeaders.py
+++ b/lldb/test/API/api/check_public_api_headers/TestPublicAPIHeaders.py
@@ -30,7 +30,7 @@ def test_sb_api_directory(self):
self.sanity_check_executable(exe_name)
def sanity_check_executable(self, exe_name):
- """Sanity check executable compiled from the auto-generated program."""
+ """Soundness check executable compiled from the auto-generated program."""
exe = self.getBuildArtifact(exe_name)
self.runCmd("file %s" % exe, CURRENT_EXECUTABLE_SET)
diff --git a/lldb/test/API/commands/frame/recognizer/TestFrameRecognizer.py b/lldb/test/API/commands/frame/recognizer/TestFrameRecognizer.py
index 3e9dbfe6d8555..f4e80c097892d 100644
--- a/lldb/test/API/commands/frame/recognizer/TestFrameRecognizer.py
+++ b/lldb/test/API/commands/frame/recognizer/TestFrameRecognizer.py
@@ -168,7 +168,7 @@ def test_frame_recognizer_hiding(self):
target, process, thread, _ = lldbutil.run_to_name_breakpoint(self, "nested")
frame = thread.selected_frame
- # Sanity check.
+ # Soundness check.
self.expect(
"thread backtrace", patterns=["frame.*nested", "frame.*baz", "frame.*main"]
)
diff --git a/lldb/test/API/commands/memory/read/TestMemoryRead.py b/lldb/test/API/commands/memory/read/TestMemoryRead.py
index 67b28ee79067b..450925d7f84db 100644
--- a/lldb/test/API/commands/memory/read/TestMemoryRead.py
+++ b/lldb/test/API/commands/memory/read/TestMemoryRead.py
@@ -150,7 +150,7 @@ def check_file_content(expected):
expected = [s.strip() for s in expected]
self.assertEqual(lines, expected)
- # Sanity check.
+ # Soundness check.
self.runCmd("memory read -f d -c 1 -o '{}' `&argc`".format(memory_read_file))
check_file_content([golden_output])
diff --git a/lldb/test/API/functionalities/data-formatter/data-formatter-stl/libcxx/invalid-string/TestDataFormatterLibcxxInvalidString.py b/lldb/test/API/functionalities/data-formatter/data-formatter-stl/libcxx/invalid-string/TestDataFormatterLibcxxInvalidString.py
index ae8e0ac08c2b0..861750adfee0d 100644
--- a/lldb/test/API/functionalities/data-formatter/data-formatter-stl/libcxx/invalid-string/TestDataFormatterLibcxxInvalidString.py
+++ b/lldb/test/API/functionalities/data-formatter/data-formatter-stl/libcxx/invalid-string/TestDataFormatterLibcxxInvalidString.py
@@ -1,5 +1,5 @@
"""
-Test lldb behaves sanely when formatting corrupted `std::string`s.
+Test lldb behaves soundly when formatting corrupted `std::string`s.
"""
import lldb
diff --git a/lldb/test/API/functionalities/data-formatter/stringprinter/main.cpp b/lldb/test/API/functionalities/data-formatter/stringprinter/main.cpp
index 6b39e4bf6e846..d0f266f1b8c0b 100644
--- a/lldb/test/API/functionalities/data-formatter/stringprinter/main.cpp
+++ b/lldb/test/API/functionalities/data-formatter/stringprinter/main.cpp
@@ -81,6 +81,6 @@ int main (int argc, char const *argv[])
//% self.expect_var_path('charwithtabs', summary='"Hello\t\tWorld\nI am here\t\tto say hello\n"')
//% self.assertTrue(self.frame().FindVariable('longstring').GetSummary().endswith('"...'))
//% self.assertTrue(self.frame().FindVariable('longconstcharstar').GetSummary().endswith('"...'))
- // FIXME: make "b.data" and "c.data" work sanely
+ // FIXME: make "b.data" and "c.data" work soundly
}
diff --git a/lldb/test/API/functionalities/limit-debug-info/TestLimitDebugInfo.py b/lldb/test/API/functionalities/limit-debug-info/TestLimitDebugInfo.py
index 18371669462e2..22f1c2b5838db 100644
--- a/lldb/test/API/functionalities/limit-debug-info/TestLimitDebugInfo.py
+++ b/lldb/test/API/functionalities/limit-debug-info/TestLimitDebugInfo.py
@@ -24,8 +24,8 @@ def _check_type(self, target, name):
def _check_debug_info_is_limited(self, target):
# Without other shared libraries we should only see the member declared
- # in the derived class. This serves as a sanity check that we are truly
- # building with limited debug info.
+ # in the derived class. This serves as a soundness check that we are
+ # truly building with limited debug info.
self._check_type(target, "InheritsFromOne")
self._check_type(target, "InheritsFromTwo")
diff --git a/lldb/test/API/functionalities/process_crash_info/TestProcessCrashInfo.py b/lldb/test/API/functionalities/process_crash_info/TestProcessCrashInfo.py
index c143da2bf94fb..19b7ee19e26cb 100644
--- a/lldb/test/API/functionalities/process_crash_info/TestProcessCrashInfo.py
+++ b/lldb/test/API/functionalities/process_crash_info/TestProcessCrashInfo.py
@@ -82,7 +82,7 @@ def test_api(self):
@skipIfDarwinEmbedded
def test_on_sane_process(self):
"""Test that lldb doesn't fetch the extended crash information
- dictionary from a 'sane' stopped process."""
+ dictionary from a 'sound' stopped process."""
self.build()
target, _, _, _ = lldbutil.run_to_line_breakpoint(
self, lldb.SBFileSpec(self.source), self.line
diff --git a/lldb/test/API/lang/c/array_types/TestArrayTypes.py b/lldb/test/API/lang/c/array_types/TestArrayTypes.py
index fc234f5842508..6490cacba617b 100644
--- a/lldb/test/API/lang/c/array_types/TestArrayTypes.py
+++ b/lldb/test/API/lang/c/array_types/TestArrayTypes.py
@@ -92,7 +92,7 @@ def test_and_python_api(self):
breakpoint = target.BreakpointCreateByLocation("main.c", self.line)
self.assertTrue(breakpoint, VALID_BREAKPOINT)
- # Sanity check the print representation of breakpoint.
+ # Soundness check the print representation of breakpoint.
bp = str(breakpoint)
self.expect(
bp,
@@ -112,7 +112,7 @@ def test_and_python_api(self):
process = target.LaunchSimple(None, None, self.get_process_working_directory())
self.assertTrue(process, PROCESS_IS_VALID)
- # Sanity check the print representation of process.
+ # Soundness check the print representation of process.
proc = str(process)
self.expect(
proc,
@@ -125,7 +125,7 @@ def test_and_python_api(self):
thread = lldbutil.get_stopped_thread(process, lldb.eStopReasonBreakpoint)
self.assertIsNotNone(thread)
- # Sanity check the print representation of thread.
+ # Soundness check the print representation of thread.
thr = str(thread)
# TODO(zturner): Whether the TID is printed in hex or decimal should be controlled by a setting,
# and this test should read the value of the setting. This check is currently hardcoded to
@@ -154,7 +154,7 @@ def test_and_python_api(self):
substrs=["file = 'main.c'", "line = %d" % self.line, "locations = 1"],
)
- # Sanity check the print representation of frame.
+ # Soundness check the print representation of frame.
frame = thread.GetFrameAtIndex(0)
frm = str(frame)
self.expect(
@@ -164,7 +164,7 @@ def test_and_python_api(self):
substrs=["#%d" % frame.GetFrameID()],
)
- # Lookup the "strings" string array variable and sanity check its print
+ # Lookup the "strings" string array variable and soundness check its print
# representation.
variable = frame.FindVariable("strings")
var = str(variable)
diff --git a/lldb/test/API/lang/cpp/dynamic-value/TestDynamicValue.py b/lldb/test/API/lang/cpp/dynamic-value/TestDynamicValue.py
index a230d07219b9a..bf13ed4daa721 100644
--- a/lldb/test/API/lang/cpp/dynamic-value/TestDynamicValue.py
+++ b/lldb/test/API/lang/cpp/dynamic-value/TestDynamicValue.py
@@ -317,7 +317,7 @@ def test_from_core_file(self):
self.target().LoadCore(core, error)
self.assertSuccess(error)
- # Sanity check -- the process should be able to read the object but not
+ # Soundness check -- the process should be able to read the object but not
# its vtable..
self.process().ReadPointerFromMemory(a, error)
self.assertSuccess(error)
diff --git a/lldb/test/API/lang/cpp/incomplete-types/members/TestCppIncompleteTypeMembers.py b/lldb/test/API/lang/cpp/incomplete-types/members/TestCppIncompleteTypeMembers.py
index 35a8a87cec8ea..07db03cc731fd 100644
--- a/lldb/test/API/lang/cpp/incomplete-types/members/TestCppIncompleteTypeMembers.py
+++ b/lldb/test/API/lang/cpp/incomplete-types/members/TestCppIncompleteTypeMembers.py
@@ -17,7 +17,7 @@ def test(self):
self, "// break here", lldb.SBFileSpec("f.cpp")
)
- # Sanity check that we really have to debug info for this type.
+ # Soundness check that we really have to debug info for this type.
this = self.expect_var_path("this", type="A *")
self.assertEqual(
this.GetType().GetPointeeType().GetNumberOfFields(), 0, str(this)
diff --git a/lldb/test/API/macosx/no-nlist-memory-module/TestNoNlistsDylib.py b/lldb/test/API/macosx/no-nlist-memory-module/TestNoNlistsDylib.py
index 9216cf2eab164..fc96f294bbb0e 100644
--- a/lldb/test/API/macosx/no-nlist-memory-module/TestNoNlistsDylib.py
+++ b/lldb/test/API/macosx/no-nlist-memory-module/TestNoNlistsDylib.py
@@ -62,7 +62,7 @@ def test_no_nlist_symbols(self):
self.assertFalse(m_has_nlist.IsFileBacked())
self.assertGreater(m_has_nlist.GetNumSymbols(), 0)
- # And as a sanity check, get the main binary's module,
+ # And as a soundness check, get the main binary's module,
# test that it is file backed and that it has more than
# zero symbols.
m_exe = target.FindModule(lldb.SBFileSpec("a.out"))
diff --git a/lldb/test/API/macosx/simulator/TestSimulatorPlatform.py b/lldb/test/API/macosx/simulator/TestSimulatorPlatform.py
index b17ee83ea04fe..1c334e8caec1b 100644
--- a/lldb/test/API/macosx/simulator/TestSimulatorPlatform.py
+++ b/lldb/test/API/macosx/simulator/TestSimulatorPlatform.py
@@ -9,7 +9,7 @@ class TestSimulatorPlatformLaunching(TestBase):
NO_DEBUG_INFO_TESTCASE = True
def check_load_commands(self, expected_load_command):
- """sanity check the built binary for the expected number of load commands"""
+ """soundness check the built binary for the expected number of load commands"""
load_cmds = subprocess.check_output(
["otool", "-l", self.getBuildArtifact()]
).decode("utf-8")
diff --git a/lldb/test/API/python_api/value/linked_list/TestValueAPILinkedList.py b/lldb/test/API/python_api/value/linked_list/TestValueAPILinkedList.py
index 2053583c04475..b1b187e2846de 100644
--- a/lldb/test/API/python_api/value/linked_list/TestValueAPILinkedList.py
+++ b/lldb/test/API/python_api/value/linked_list/TestValueAPILinkedList.py
@@ -67,7 +67,7 @@ def test(self):
print(cvf.format(t))
list.append(int(t.GetChildMemberWithName("id").GetValue()))
- # Sanity checks that the we visited all the items (no more, no less).
+ # Soundness checks that the we visited all the items (no more, no less).
if self.TraceOn():
print("visited IDs:", list)
self.assertEqual(visitedIDs, list)
@@ -98,7 +98,7 @@ def eol(val):
print(cvf.format(t))
list.append(int(t.GetChildMemberWithName("id").GetValue()))
- # Sanity checks that the we visited all the items (no more, no less).
+ # Soundness checks that the we visited all the items (no more, no less).
if self.TraceOn():
print("visited IDs:", list)
self.assertEqual(visitedIDs, list)
diff --git a/lldb/test/API/sanity/TestModuleCacheSanity.py b/lldb/test/API/sanity/TestModuleCacheSanity.py
index 1d3a6b3158898..ce81efce08e4f 100644
--- a/lldb/test/API/sanity/TestModuleCacheSanity.py
+++ b/lldb/test/API/sanity/TestModuleCacheSanity.py
@@ -1,5 +1,5 @@
"""
-This is a sanity check that verifies that the module cache path is set
+This is a soundness check that verifies that the module cache path is set
correctly and points inside the default test build directory.
"""
diff --git a/lldb/test/API/sanity/TestReprStrEquality.py b/lldb/test/API/sanity/TestReprStrEquality.py
index 96eeacdd07480..8d54de6263cb1 100644
--- a/lldb/test/API/sanity/TestReprStrEquality.py
+++ b/lldb/test/API/sanity/TestReprStrEquality.py
@@ -1,5 +1,5 @@
"""
-This is a sanity check that verifies that `repr(sbobject)` and `str(sbobject)`
+This is a soundness check that verifies that `repr(sbobject)` and `str(sbobject)`
produce the same string.
"""
diff --git a/lldb/test/API/sanity/TestSettingSkipping.py b/lldb/test/API/sanity/TestSettingSkipping.py
index f0d4d266073e0..ca6b959094ddb 100644
--- a/lldb/test/API/sanity/TestSettingSkipping.py
+++ b/lldb/test/API/sanity/TestSettingSkipping.py
@@ -1,5 +1,5 @@
"""
-This is a sanity check that verifies that test can be skipped based on settings.
+This is a soundness check that verifies that test can be skipped based on settings.
"""
import lldb
diff --git a/lldb/test/API/tools/lldb-server/memory-tagging/TestGdbRemoteMemoryTagging.py b/lldb/test/API/tools/lldb-server/memory-tagging/TestGdbRemoteMemoryTagging.py
index 87507583724e6..f7f438215ac51 100644
--- a/lldb/test/API/tools/lldb-server/memory-tagging/TestGdbRemoteMemoryTagging.py
+++ b/lldb/test/API/tools/lldb-server/memory-tagging/TestGdbRemoteMemoryTagging.py
@@ -88,7 +88,7 @@ def test_tag_read_qMemTags_packets(self):
"""Test that qMemTags packets are parsed correctly and/or rejected."""
buf_address, page_size = self.prep_memtags_test()
- # Sanity check that address is correct
+ # Soundness check that address is correct
self.check_tag_read("{:x},20:1".format(buf_address), "m0001")
# Invalid packets
@@ -158,7 +158,7 @@ def test_tag_write_QMemTags_packets(self):
"""Test that QMemTags packets are parsed correctly and/or rejected."""
buf_address, page_size = self.prep_memtags_test()
- # Sanity check that address is correct
+ # Soundness check that address is correct
self.check_tag_write("{:x},10:1:0e".format(buf_address), "OK")
self.check_tag_read("{:x},10:1".format(buf_address), "m0e")
diff --git a/lldb/test/Shell/REPL/Basic.test b/lldb/test/Shell/REPL/Basic.test
index 39791133d5f2c..98d6226416831 100644
--- a/lldb/test/Shell/REPL/Basic.test
+++ b/lldb/test/Shell/REPL/Basic.test
@@ -1,4 +1,4 @@
-// Basic sanity checking of the REPL.
+// Basic soundness checking of the REPL.
// RUN: %lldb --repl --repl-language c++ 2>&1 | FileCheck %s --check-prefix=CPP
// CPP: error: must have a target to create a REPL
diff --git a/lldb/test/Shell/Settings/TestModuleCacheSanity.test b/lldb/test/Shell/Settings/TestModuleCacheSanity.test
index f16f40d47a6bf..cd865d2db7b2b 100644
--- a/lldb/test/Shell/Settings/TestModuleCacheSanity.test
+++ b/lldb/test/Shell/Settings/TestModuleCacheSanity.test
@@ -1,4 +1,4 @@
-# This is a sanity check that verifies that the module cache path is set
+# This is a soundness check that verifies that the module cache path is set
# correctly and points inside the default test build directory.
RUN: %lldb -o 'settings show symbols.clang-modules-cache-path' | FileCheck %s
CHECK: lldb-test-build.noindex{{.*}}module-cache-lldb
diff --git a/lldb/tools/debugserver/source/MacOSX/arm64/DNBArchImplARM64.cpp b/lldb/tools/debugserver/source/MacOSX/arm64/DNBArchImplARM64.cpp
index e30e02a911529..0b65e92a77643 100644
--- a/lldb/tools/debugserver/source/MacOSX/arm64/DNBArchImplARM64.cpp
+++ b/lldb/tools/debugserver/source/MacOSX/arm64/DNBArchImplARM64.cpp
@@ -1569,7 +1569,7 @@ uint32_t DNBArchMachARM64::GetHardwareWatchpointHit(nub_addr_t &addr) {
}
if (is_bas_watchpoint) {
- // Sanity check the bas_bits
+ // Soundness check the bas_bits
uint32_t lsb = LowestBitSet(bas_bits);
if (lsb < 0)
continue;
diff --git a/lldb/tools/lldb-rpc-gen/server/RPCServerSourceEmitter.cpp b/lldb/tools/lldb-rpc-gen/server/RPCServerSourceEmitter.cpp
index a6d2528fe2c3c..c645ce9e8ba4e 100644
--- a/lldb/tools/lldb-rpc-gen/server/RPCServerSourceEmitter.cpp
+++ b/lldb/tools/lldb-rpc-gen/server/RPCServerSourceEmitter.cpp
@@ -463,7 +463,7 @@ void RPCServerSourceEmitter::EmitCallbackFunction(const Method &method) {
IndentLevel++;
// Emit Function Body
- EmitLine("// RPC connection setup and sanity checking");
+ EmitLine("// RPC connection setup and soundness checking");
EmitLine("CallbackInfo *callback_info = (CallbackInfo *)baton;");
EmitLine("rpc_common::ConnectionSP connection_sp = "
"rpc_common::Connection::GetConnectionFromID(callback_info->"
diff --git a/lldb/unittests/Interpreter/TestCompletion.cpp b/lldb/unittests/Interpreter/TestCompletion.cpp
index 3d4942787fdf5..637a881017c06 100644
--- a/lldb/unittests/Interpreter/TestCompletion.cpp
+++ b/lldb/unittests/Interpreter/TestCompletion.cpp
@@ -155,7 +155,7 @@ TEST_F(CompletionTest, DirCompletionAbsolute) {
// When a directory is specified that doesn't end in a slash, it searches
// for that directory, not items under it.
- // Sanity check that the path we complete on exists and isn't too long.
+ // Soundness check that the path we complete on exists and isn't too long.
CommandCompletions::DiskDirectories(Twine(BaseDir) + "/fooa", Results,
Resolver);
ASSERT_EQ(1u, Results.GetSize());
diff --git a/llvm/CMakeLists.txt b/llvm/CMakeLists.txt
index b98192968a3ab..a7685b1e52573 100644
--- a/llvm/CMakeLists.txt
+++ b/llvm/CMakeLists.txt
@@ -459,7 +459,7 @@ if(WIN32 AND NOT UNIX)
endif()
include(CPack)
-# Sanity check our source directory to make sure that we are not trying to
+# Soundness check our source directory to make sure that we are not trying to
# generate an in-source build (unless on MSVC_IDE, where it is ok), and to make
# sure that we don't have any stray generated files lying around in the tree
# (which would end up getting picked up by header search, instead of the correct
diff --git a/llvm/cmake/platforms/WinMsvc.cmake b/llvm/cmake/platforms/WinMsvc.cmake
index dfaac5048fa7a..75f73933c4bac 100644
--- a/llvm/cmake/platforms/WinMsvc.cmake
+++ b/llvm/cmake/platforms/WinMsvc.cmake
@@ -207,7 +207,7 @@ else()
message(SEND_ERROR "Unknown host architecture ${HOST_ARCH}. Must be aarch64 (or arm64), armv7 (or arm), i686 (or x86), or x86_64 (or x64).")
endif()
-# Do some sanity checking to make sure we can find a native toolchain and
+# Do some soundness checking to make sure we can find a native toolchain and
# that the Windows SDK / MSVC STL directories look kosher.
if(NOT EXISTS "${LLVM_NATIVE_TOOLCHAIN}/bin/clang-cl" OR
NOT EXISTS "${LLVM_NATIVE_TOOLCHAIN}/bin/lld-link")
diff --git a/llvm/docs/Atomics.rst b/llvm/docs/Atomics.rst
index 4dee3e6bd9f4f..d6966c3130b28 100644
--- a/llvm/docs/Atomics.rst
+++ b/llvm/docs/Atomics.rst
@@ -185,7 +185,7 @@ Unordered
---------
Unordered is the lowest level of atomicity. It essentially guarantees that races
-produce somewhat sane results instead of having undefined behavior. It also
+produce somewhat sound results instead of having undefined behavior. It also
guarantees the operation to be lock-free, so it does not depend on the data
being part of a special atomic structure or depend on a separate per-process
global lock. Note that code generation will fail for unsupported atomic
diff --git a/llvm/docs/CMake.rst b/llvm/docs/CMake.rst
index ce83552919315..a3b5802f7119a 100644
--- a/llvm/docs/CMake.rst
+++ b/llvm/docs/CMake.rst
@@ -60,7 +60,7 @@ We use here the command-line, non-interactive CMake interface.
a list of build parameters that you can modify.
This can fail if CMake can't detect your toolset, or if it thinks that the
- environment is not sane enough. In this case, make sure that the toolset that
+ environment is not sound enough. In this case, make sure that the toolset that
you intend to use is the only one reachable from the shell, and that the shell
itself is the correct one for your development environment. CMake will refuse
to build MinGW makefiles if you have a POSIX shell reachable through the PATH
diff --git a/llvm/docs/CodingStandards.rst b/llvm/docs/CodingStandards.rst
index e48af0ee3054f..7a301010daf89 100644
--- a/llvm/docs/CodingStandards.rst
+++ b/llvm/docs/CodingStandards.rst
@@ -1557,7 +1557,7 @@ Namespace Indentation
In general, we strive to reduce indentation wherever possible. This is useful
because we want code to `fit into 80 columns`_ without excessive wrapping, but
also because it makes it easier to understand the code. To facilitate this and
-avoid some insanely deep nesting on occasion, don't indent namespaces. If it
+avoid some unsoundly deep nesting on occasion, don't indent namespaces. If it
helps readability, feel free to add a comment indicating what namespace is
being closed by a ``}``. For example:
diff --git a/llvm/docs/Contributing.rst b/llvm/docs/Contributing.rst
index 28b28ffda4290..25d441cda7764 100644
--- a/llvm/docs/Contributing.rst
+++ b/llvm/docs/Contributing.rst
@@ -173,7 +173,7 @@ Please ask for help if you're having trouble with your particular git workflow.
Git pre-push hook
^^^^^^^^^^^^^^^^^
-We include an optional pre-push hook that run some sanity checks on the revisions
+We include an optional pre-push hook that run some soundness checks on the revisions
you are about to push and ask confirmation if you push multiple commits at once.
You can set it up (on Unix systems) by running from the repository root:
diff --git a/llvm/docs/Frontend/PerformanceTips.rst b/llvm/docs/Frontend/PerformanceTips.rst
index b81df707a31a6..79c1be93ab44c 100644
--- a/llvm/docs/Frontend/PerformanceTips.rst
+++ b/llvm/docs/Frontend/PerformanceTips.rst
@@ -289,7 +289,7 @@ couple specific suggestions:
#. If your language uses range checks, consider using the IRCE pass. It is not
currently part of the standard pass order.
-#. A useful sanity check to run is to run your optimized IR back through the
+#. A useful soundness check to run is to run your optimized IR back through the
-O2 pipeline again. If you see noticeable improvement in the resulting IR,
you likely need to adjust your pass order.
diff --git a/llvm/docs/GettingStarted.rst b/llvm/docs/GettingStarted.rst
index 8d0adf3585a78..1ca35ef815fc0 100644
--- a/llvm/docs/GettingStarted.rst
+++ b/llvm/docs/GettingStarted.rst
@@ -881,7 +881,7 @@ build system.
``llvm/test``
-------------
-Feature and regression tests and other sanity checks on LLVM infrastructure. These
+Feature and regression tests and other soundness checks on LLVM infrastructure. These
are intended to run quickly and cover a lot of territory without being exhaustive.
``test-suite``
diff --git a/llvm/docs/LibFuzzer.rst b/llvm/docs/LibFuzzer.rst
index 2137740896ddb..2ef56c7e99c3f 100644
--- a/llvm/docs/LibFuzzer.rst
+++ b/llvm/docs/LibFuzzer.rst
@@ -118,7 +118,7 @@ LibFuzzer will work without any initial seeds, but will be less
efficient if the library under test accepts complex,
structured inputs.
-The corpus can also act as a sanity/regression check, to confirm that the
+The corpus can also act as a soundness/regression check, to confirm that the
fuzzing entrypoint still works and that all of the sample inputs run through
the code under test without problems.
diff --git a/llvm/include/llvm-c/Core.h b/llvm/include/llvm-c/Core.h
index d02cf984167c9..515571eb51d71 100644
--- a/llvm/include/llvm-c/Core.h
+++ b/llvm/include/llvm-c/Core.h
@@ -334,7 +334,7 @@ typedef enum {
typedef enum {
LLVMAtomicOrderingNotAtomic = 0, /**< A load or store which is not atomic */
LLVMAtomicOrderingUnordered = 1, /**< Lowest level of atomicity, guarantees
- somewhat sane results, lock free. */
+ somewhat sound results, lock free. */
LLVMAtomicOrderingMonotonic = 2, /**< guarantees that if you take all the
operations affecting a specific address,
a consistent ordering exists */
diff --git a/llvm/include/llvm/ADT/APSInt.h b/llvm/include/llvm/ADT/APSInt.h
index 88a7a6e71c817..732f853d2a1e2 100644
--- a/llvm/include/llvm/ADT/APSInt.h
+++ b/llvm/include/llvm/ADT/APSInt.h
@@ -90,7 +90,7 @@ class [[nodiscard]] APSInt : public APInt {
bool isRepresentableByInt64() const {
// For unsigned values with 64 active bits, they technically fit into a
// int64_t, but the user may get negative numbers and has to manually cast
- // them to unsigned. Let's not bet the user has the sanity to do that and
+ // them to unsigned. Let's not bet the user has the soundness to do that and
// not give them a vague value at the first place.
return isSigned() ? isSignedIntN(64) : isIntN(63);
}
diff --git a/llvm/include/llvm/ADT/IntervalMap.h b/llvm/include/llvm/ADT/IntervalMap.h
index cb5943dc60e0e..1c28594330c95 100644
--- a/llvm/include/llvm/ADT/IntervalMap.h
+++ b/llvm/include/llvm/ADT/IntervalMap.h
@@ -554,7 +554,7 @@ class NodeRef {
//
// These constraints are always satisfied:
//
-// - Traits::stopLess(start(i), stop(i)) - Non-empty, sane intervals.
+// - Traits::stopLess(start(i), stop(i)) - Non-empty, sound intervals.
//
// - Traits::stopLess(stop(i), start(i + 1) - Sorted.
//
@@ -696,7 +696,7 @@ insertFrom(unsigned &Pos, unsigned Size, KeyT a, KeyT b, ValT y) {
//
// When all of the leaf nodes from all the subtrees are concatenated, they must
// satisfy the same constraints as a single leaf node. They must be sorted,
-// sane, and fully coalesced.
+// sound, and fully coalesced.
//
//===----------------------------------------------------------------------===//
diff --git a/llvm/include/llvm/CodeGen/MachineRegisterInfo.h b/llvm/include/llvm/CodeGen/MachineRegisterInfo.h
index 27b30bd5929ff..060bbcf4e1db4 100644
--- a/llvm/include/llvm/CodeGen/MachineRegisterInfo.h
+++ b/llvm/include/llvm/CodeGen/MachineRegisterInfo.h
@@ -262,7 +262,7 @@ class MachineRegisterInfo {
LLVM_ABI void moveOperands(MachineOperand *Dst, MachineOperand *Src,
unsigned NumOps);
- /// Verify the sanity of the use list for Reg.
+ /// Verify the soundness of the use list for Reg.
LLVM_ABI void verifyUseList(Register Reg) const;
/// Verify the use list of all registers.
diff --git a/llvm/include/llvm/CodeGen/SelectionDAG.h b/llvm/include/llvm/CodeGen/SelectionDAG.h
index 8a834315646a1..25b3f7a481326 100644
--- a/llvm/include/llvm/CodeGen/SelectionDAG.h
+++ b/llvm/include/llvm/CodeGen/SelectionDAG.h
@@ -523,7 +523,7 @@ class SelectionDAG {
/// FileName expects absolute path. If provided
/// without any path separators then the file
/// will be created in the current directory.
- /// Error will be emitted if the path is insane.
+ /// Error will be emitted if the path is unsound.
#if !defined(NDEBUG) || defined(LLVM_ENABLE_DUMP)
LLVM_DUMP_METHOD void dumpDotGraph(const Twine &FileName, const Twine &Title);
#endif
diff --git a/llvm/include/llvm/DebugInfo/DWARF/DWARFDebugFrame.h b/llvm/include/llvm/DebugInfo/DWARF/DWARFDebugFrame.h
index 65189916b41f1..0506fdeb05bc2 100644
--- a/llvm/include/llvm/DebugInfo/DWARF/DWARFDebugFrame.h
+++ b/llvm/include/llvm/DebugInfo/DWARF/DWARFDebugFrame.h
@@ -194,7 +194,7 @@ class DWARFDebugFrame {
const Triple::ArchType Arch;
// True if this is parsing an eh_frame section.
const bool IsEH;
- // Not zero for sane pointer values coming out of eh_frame
+ // Not zero for sound pointer values coming out of eh_frame
const uint64_t EHFrameAddress;
std::vector<std::unique_ptr<dwarf::FrameEntry>> Entries;
diff --git a/llvm/include/llvm/IR/IntrinsicsARM.td b/llvm/include/llvm/IR/IntrinsicsARM.td
index 1219ce2f86da8..2423a2a7e1d15 100644
--- a/llvm/include/llvm/IR/IntrinsicsARM.td
+++ b/llvm/include/llvm/IR/IntrinsicsARM.td
@@ -581,7 +581,7 @@ def int_arm_neon_vpminu : Neon_2Arg_Intrinsic;
// shifts, where the constant is replicated. For consistency with VSHL (and
// other variable shift instructions), left shifts have positive shift counts
// and right shifts have negative shift counts. This convention is also used
-// for constant right shift intrinsics, and to help preserve sanity, the
+// for constant right shift intrinsics, and to help preserve soundness, the
// intrinsic names use "shift" instead of either "shl" or "shr". Where
// applicable, signed and unsigned versions of the intrinsics are
// distinguished with "s" and "u" suffixes. A few NEON shift instructions,
diff --git a/llvm/include/llvm/ProfileData/MemProfReader.h b/llvm/include/llvm/ProfileData/MemProfReader.h
index 25578ecd06f12..5d4a1c2f34577 100644
--- a/llvm/include/llvm/ProfileData/MemProfReader.h
+++ b/llvm/include/llvm/ProfileData/MemProfReader.h
@@ -122,8 +122,8 @@ class LLVM_ABI RawMemProfReader final : public MemProfReader {
// a raw binary memprof profile.
static bool hasFormat(const StringRef Path);
- // Create a RawMemProfReader after sanity checking the contents of the file at
- // \p Path or the \p Buffer. The binary from which the profile has been
+ // Create a RawMemProfReader after soundness checking the contents of the file
+ // at \p Path or the \p Buffer. The binary from which the profile has been
// collected is specified via a path in \p ProfiledBinary.
static Expected<std::unique_ptr<RawMemProfReader>>
create(const Twine &Path, StringRef ProfiledBinary, bool KeepName = false);
@@ -222,7 +222,7 @@ class YAMLMemProfReader final : public MemProfReader {
// buffer.
LLVM_ABI static bool hasFormat(const StringRef Path);
- // Create a YAMLMemProfReader after sanity checking the contents of the file
+ // Create a YAMLMemProfReader after soundness checking the contents of the file
// at \p Path or the \p Buffer.
LLVM_ABI static Expected<std::unique_ptr<YAMLMemProfReader>>
create(const Twine &Path);
diff --git a/llvm/include/llvm/Support/CommandLine.h b/llvm/include/llvm/Support/CommandLine.h
index ca725b8ac8712..0be2537987732 100644
--- a/llvm/include/llvm/Support/CommandLine.h
+++ b/llvm/include/llvm/Support/CommandLine.h
@@ -2049,7 +2049,7 @@ LLVM_ABI void printBuildConfig(raw_ostream &OS);
/// llvm::cl::ParseCommandLineOptions().
///
/// Hopefully this API can be deprecated soon. Any situation where options need
-/// to be modified by tools or libraries should be handled by sane APIs rather
+/// to be modified by tools or libraries should be handled by sound APIs rather
/// than just handing around a global list.
LLVM_ABI StringMap<Option *> &
getRegisteredOptions(SubCommand &Sub = SubCommand::getTopLevel());
diff --git a/llvm/lib/Analysis/MemoryDependenceAnalysis.cpp b/llvm/lib/Analysis/MemoryDependenceAnalysis.cpp
index 67c2cfadb6533..47b1db88eb73e 100644
--- a/llvm/lib/Analysis/MemoryDependenceAnalysis.cpp
+++ b/llvm/lib/Analysis/MemoryDependenceAnalysis.cpp
@@ -1370,7 +1370,7 @@ bool MemoryDependenceResults::getNonLocalPointerDepFromBB(
continue;
PredTranslationFailure:
- // The following code is "failure"; we can't produce a sane translation
+ // The following code is "failure"; we can't produce a sound translation
// for the given block. It assumes that we haven't modified any of
// our datastructures while processing the current block.
diff --git a/llvm/lib/Analysis/MemorySSA.cpp b/llvm/lib/Analysis/MemorySSA.cpp
index ab373386da579..0c2cb844d0e81 100644
--- a/llvm/lib/Analysis/MemorySSA.cpp
+++ b/llvm/lib/Analysis/MemorySSA.cpp
@@ -2557,7 +2557,7 @@ MemoryAccess *MemorySSA::ClobberWalkerBase::getClobberingMemoryAccessBase(
}
const Instruction *I = StartingAccess->getMemoryInst();
- // We can't sanely do anything with a fence, since they conservatively clobber
+ // We can't soundly do anything with a fence, since they conservatively clobber
// all memory, and have no locations to get pointers from to try to
// disambiguate.
if (!isa<CallBase>(I) && I->isFenceLike())
diff --git a/llvm/lib/Analysis/ScalarEvolution.cpp b/llvm/lib/Analysis/ScalarEvolution.cpp
index 09b126d35bde0..48aac43ec8e55 100644
--- a/llvm/lib/Analysis/ScalarEvolution.cpp
+++ b/llvm/lib/Analysis/ScalarEvolution.cpp
@@ -920,7 +920,7 @@ static const SCEV *BinomialCoefficient(const SCEV *It, unsigned K,
// extra arithmetic, so it's not an obvious win, and it gets
// much more complicated for K > 3.)
- // Protection from insane SCEVs; this bound is conservative,
+ // Protection from unsound SCEVs; this bound is conservative,
// but it probably doesn't matter.
if (K > 1000)
return SE.getCouldNotCompute();
diff --git a/llvm/lib/Analysis/TargetLibraryInfo.cpp b/llvm/lib/Analysis/TargetLibraryInfo.cpp
index 6e9276669eb70..90c7f3d88ac96 100644
--- a/llvm/lib/Analysis/TargetLibraryInfo.cpp
+++ b/llvm/lib/Analysis/TargetLibraryInfo.cpp
@@ -180,7 +180,7 @@ static void initializeBase(TargetLibraryInfoImpl &TLI, const Triple &T) {
/// Initialize the set of available library functions based on the specified
/// target triple. This should be carefully written so that a missing target
-/// triple gets a sane set of defaults.
+/// triple gets a sound set of defaults.
static void initializeLibCalls(TargetLibraryInfoImpl &TLI, const Triple &T,
ArrayRef<StringLiteral> StandardNames) {
// Set IO unlocked variants as unavailable
@@ -950,7 +950,7 @@ static void initializeLibCalls(TargetLibraryInfoImpl &TLI, const Triple &T,
/// Initialize the set of available library functions based on the specified
/// target triple. This should be carefully written so that a missing target
-/// triple gets a sane set of defaults.
+/// triple gets a sound set of defaults.
static void initialize(TargetLibraryInfoImpl &TLI, const Triple &T,
ArrayRef<StringLiteral> StandardNames) {
initializeBase(TLI, T);
diff --git a/llvm/lib/CodeGen/CodeGenPrepare.cpp b/llvm/lib/CodeGen/CodeGenPrepare.cpp
index 9db4c9e5e2807..5d928cfc722c1 100644
--- a/llvm/lib/CodeGen/CodeGenPrepare.cpp
+++ b/llvm/lib/CodeGen/CodeGenPrepare.cpp
@@ -632,7 +632,7 @@ bool CodeGenPrepare::_run(Function &F) {
EverMadeChange |= splitBranchCondition(F, ModifiedDT);
// Split some critical edges where one of the sources is an indirect branch,
- // to help generate sane code for PHIs involving such edges.
+ // to help generate sound code for PHIs involving such edges.
EverMadeChange |=
SplitIndirectBrCriticalEdges(F, /*IgnoreBlocksWithoutPHI=*/true);
diff --git a/llvm/lib/CodeGen/ImplicitNullChecks.cpp b/llvm/lib/CodeGen/ImplicitNullChecks.cpp
index b585ce491f62a..d2d96beb6315d 100644
--- a/llvm/lib/CodeGen/ImplicitNullChecks.cpp
+++ b/llvm/lib/CodeGen/ImplicitNullChecks.cpp
@@ -454,12 +454,12 @@ ImplicitNullChecks::isSuitableMemoryOp(const MachineInstr &MI,
// calculation, otherwise we do not know whether the Displacement is made up
// by some symbolic values.
// This matters because we do not want to incorrectly assume that load from
- // falls in the zeroth faulting page in the "sane offset check" below.
+ // falls in the zeroth faulting page in the "sound offset check" below.
if ((BaseReg && BaseReg != PointerReg && !BaseRegIsConstVal) ||
(ScaledReg && ScaledReg != PointerReg && !ScaledRegIsConstVal))
return SR_Unsuitable;
- // We want the mem access to be issued at a sane offset from PointerReg,
+ // We want the mem access to be issued at a sound offset from PointerReg,
// so that if PointerReg is null then the access reliably page faults.
if (!(-PageSize < Displacement && Displacement < PageSize))
return SR_Unsuitable;
diff --git a/llvm/lib/CodeGen/MIRParser/MIRParser.cpp b/llvm/lib/CodeGen/MIRParser/MIRParser.cpp
index bb70e7805e818..21a6f8630b14f 100644
--- a/llvm/lib/CodeGen/MIRParser/MIRParser.cpp
+++ b/llvm/lib/CodeGen/MIRParser/MIRParser.cpp
@@ -415,8 +415,8 @@ bool MIRParserImpl::computeFunctionProperties(
}
}
- // Helper function to sanity-check and set properties that are computed, but
- // may be explicitly set from the input MIR
+ // Helper function to soundness-check and set properties that are computed,
+ // but may be explicitly set from the input MIR
auto ComputedPropertyHelper =
[&Properties](std::optional<bool> ExplicitProp, bool ComputedProp,
MachineFunctionProperties::Property P) -> bool {
diff --git a/llvm/lib/CodeGen/MachineLoopInfo.cpp b/llvm/lib/CodeGen/MachineLoopInfo.cpp
index fdb1a470493ce..addfee702234e 100644
--- a/llvm/lib/CodeGen/MachineLoopInfo.cpp
+++ b/llvm/lib/CodeGen/MachineLoopInfo.cpp
@@ -162,7 +162,7 @@ MachineLoopInfo::findLoopPreheader(MachineLoop *L, bool SpeculativePreheader,
for (MachineBasicBlock *P : HB->predecessors()) {
if (P == LB)
continue;
- // Sanity.
+ // Soundness.
if (Preheader)
return nullptr;
Preheader = P;
diff --git a/llvm/lib/CodeGen/MachineVerifier.cpp b/llvm/lib/CodeGen/MachineVerifier.cpp
index 01703fe09b79a..5cfb87fba83a9 100644
--- a/llvm/lib/CodeGen/MachineVerifier.cpp
+++ b/llvm/lib/CodeGen/MachineVerifier.cpp
@@ -710,7 +710,7 @@ void MachineVerifier::visitMachineFunctionBefore() {
report("MBB has duplicate entries in its successor list.", &MBB);
}
- // Check that the register use lists are sane.
+ // Check that the register use lists are sound.
MRI->verifyUseLists();
if (!MF->empty()) {
diff --git a/llvm/lib/CodeGen/SelectionDAG/LegalizeVectorOps.cpp b/llvm/lib/CodeGen/SelectionDAG/LegalizeVectorOps.cpp
index 8e423c4f83b38..e88ac907c6e12 100644
--- a/llvm/lib/CodeGen/SelectionDAG/LegalizeVectorOps.cpp
+++ b/llvm/lib/CodeGen/SelectionDAG/LegalizeVectorOps.cpp
@@ -2265,7 +2265,7 @@ bool VectorLegalizer::tryExpandVecMathCall(SDNode *Node, RTLIB::Libcall LC,
LLVM_DEBUG(dbgs() << "Found vector variant " << VD->getVectorFnName()
<< "\n");
- // Sanity check just in case OptVFInfo has unexpected parameters.
+ // Soundness check just in case OptVFInfo has unexpected parameters.
if (OptVFInfo->Shape.Parameters.size() !=
Node->getNumOperands() + VD->isMasked())
return false;
diff --git a/llvm/lib/CodeGen/SelectionDAG/SelectionDAGISel.cpp b/llvm/lib/CodeGen/SelectionDAG/SelectionDAGISel.cpp
index e61558c59bf0d..b63a7b03eabce 100644
--- a/llvm/lib/CodeGen/SelectionDAG/SelectionDAGISel.cpp
+++ b/llvm/lib/CodeGen/SelectionDAG/SelectionDAGISel.cpp
@@ -347,7 +347,7 @@ bool SelectionDAGISelLegacy::runOnMachineFunction(MachineFunction &MF) {
if (MF.getProperties().hasSelected())
return false;
- // Do some sanity-checking on the command-line options.
+ // Do some soundness-checking on the command-line options.
if (EnableFastISelAbort && !Selector->TM.Options.EnableFastISel)
reportFatalUsageError("-fast-isel-abort > 0 requires -fast-isel");
@@ -417,7 +417,7 @@ SelectionDAGISelPass::run(MachineFunction &MF,
if (MF.getProperties().hasSelected())
return PreservedAnalyses::all();
- // Do some sanity-checking on the command-line options.
+ // Do some soundness-checking on the command-line options.
if (EnableFastISelAbort && !Selector->TM.Options.EnableFastISel)
reportFatalUsageError("-fast-isel-abort > 0 requires -fast-isel");
diff --git a/llvm/lib/CodeGen/SelectionDAG/SelectionDAGPrinter.cpp b/llvm/lib/CodeGen/SelectionDAG/SelectionDAGPrinter.cpp
index ac28f62894788..62d95e24b680f 100644
--- a/llvm/lib/CodeGen/SelectionDAG/SelectionDAGPrinter.cpp
+++ b/llvm/lib/CodeGen/SelectionDAG/SelectionDAGPrinter.cpp
@@ -166,7 +166,7 @@ void SelectionDAG::viewGraph() {
/// FileName expects absolute path. If provided
/// without any path separators then the file
/// will be created in the current directory.
-/// Error will be emitted if the path is insane.
+/// Error will be emitted if the path is unsound.
#if !defined(NDEBUG) || defined(LLVM_ENABLE_DUMP)
LLVM_DUMP_METHOD void SelectionDAG::dumpDotGraph(const Twine &FileName,
const Twine &Title) {
diff --git a/llvm/lib/DebugInfo/LogicalView/Readers/LVCodeViewReader.cpp b/llvm/lib/DebugInfo/LogicalView/Readers/LVCodeViewReader.cpp
index 2ff70816b4bf1..43e12e30fa59f 100644
--- a/llvm/lib/DebugInfo/LogicalView/Readers/LVCodeViewReader.cpp
+++ b/llvm/lib/DebugInfo/LogicalView/Readers/LVCodeViewReader.cpp
@@ -701,7 +701,7 @@ Error LVCodeViewReader::traverseSymbolSection(StringRef SectionName,
case DebugSubsectionKind::Lines:
// Holds a PC to file:line table. Some data to parse this subsection
- // is stored in the other subsections, so just check sanity and store
+ // is stored in the other subsections, so just check soundness and store
// the pointers for deferred processing.
// Collect function and ranges only if we need to print logical lines.
diff --git a/llvm/lib/ExecutionEngine/Orc/Core.cpp b/llvm/lib/ExecutionEngine/Orc/Core.cpp
index f47b7ecdcc7bb..bd445adfc1092 100644
--- a/llvm/lib/ExecutionEngine/Orc/Core.cpp
+++ b/llvm/lib/ExecutionEngine/Orc/Core.cpp
@@ -3576,7 +3576,7 @@ ExecutionSession::IL_failSymbols(JITDylib &JD,
// Move the symbol into the error state.
Sym.setFlags(Sym.getFlags() | JITSymbolFlags::HasError);
- // FIXME: Come up with a sane mapping of state to
+ // FIXME: Come up with a sound mapping of state to
// presence-of-MaterializingInfo so that we can assert presence / absence
// here, rather than testing it.
auto MII = JD.MaterializingInfos.find(Name);
diff --git a/llvm/lib/FuzzMutate/Operations.cpp b/llvm/lib/FuzzMutate/Operations.cpp
index c9cad7d142760..a18fe1c8d569d 100644
--- a/llvm/lib/FuzzMutate/Operations.cpp
+++ b/llvm/lib/FuzzMutate/Operations.cpp
@@ -340,7 +340,7 @@ static SourcePred validShuffleVectorIndex() {
auto *FirstTy = cast<VectorType>(Cur[0]->getType());
auto *Int32Ty = Type::getInt32Ty(Cur[0]->getContext());
// TODO: It's straighforward to make up reasonable values, but listing them
- // exhaustively would be insane. Come up with a couple of sensible ones.
+ // exhaustively would be unsound. Come up with a couple of sensible ones.
return std::vector<Constant *>{
PoisonValue::get(VectorType::get(Int32Ty, FirstTy->getElementCount()))};
};
diff --git a/llvm/lib/MC/MCWin64EH.cpp b/llvm/lib/MC/MCWin64EH.cpp
index 8111ccb8bc69c..7d89d72041a6d 100644
--- a/llvm/lib/MC/MCWin64EH.cpp
+++ b/llvm/lib/MC/MCWin64EH.cpp
@@ -400,7 +400,7 @@ bool MCUnwindV2EpilogTargetExpr::evaluateAsRelocatableImpl(
return false;
}
- // Sanity check that all epilogs are the same size.
+ // Soundness check that all epilogs are the same size.
auto Size = GetOptionalAbsDifference(*Asm, EpilogEnd, UnwindV2Start);
if (Size != (EpilogSize - 1)) {
Asm->getContext().reportError(
diff --git a/llvm/lib/ProfileData/MemProfReader.cpp b/llvm/lib/ProfileData/MemProfReader.cpp
index 3fc0dbfd8e69d..e28c7479218a2 100644
--- a/llvm/lib/ProfileData/MemProfReader.cpp
+++ b/llvm/lib/ProfileData/MemProfReader.cpp
@@ -347,7 +347,7 @@ bool RawMemProfReader::hasFormat(const StringRef Path) {
bool RawMemProfReader::hasFormat(const MemoryBuffer &Buffer) {
if (Buffer.getBufferSize() < sizeof(uint64_t))
return false;
- // Aligned read to sanity check that the buffer was allocated with at least 8b
+ // Aligned read to soundness check that the buffer was allocated with at least 8b
// alignment.
const uint64_t Magic = alignedRead(Buffer.getBufferStart());
return Magic == MEMPROF_RAW_MAGIC_64;
@@ -405,7 +405,7 @@ Error RawMemProfReader::initialize(std::unique_ptr<MemoryBuffer> DataBuffer) {
}
// Check whether the profiled binary was built with position independent code
- // (PIC). Perform sanity checks for assumptions we rely on to simplify
+ // (PIC). Perform soundness checks for assumptions we rely on to simplify
// symbolization.
auto *Elf64LEObject = llvm::cast<llvm::object::ELF64LEObjectFile>(ElfObject);
const llvm::object::ELF64LEFile &ElfFile = Elf64LEObject->getELFFile();
diff --git a/llvm/lib/ProfileData/MemProfSummary.cpp b/llvm/lib/ProfileData/MemProfSummary.cpp
index f620b7a74b244..c33ccdce0f789 100644
--- a/llvm/lib/ProfileData/MemProfSummary.cpp
+++ b/llvm/lib/ProfileData/MemProfSummary.cpp
@@ -39,7 +39,8 @@ void MemProfSummary::write(ProfOStream &OS) const {
OS.write(MaxColdTotalSize);
OS.write(MaxWarmTotalSize);
OS.write(MaxHotTotalSize);
- // Sanity check that the number of fields was kept in sync with actual fields.
+ // Soundness check that the number of fields was kept in sync with actual
+ // fields.
assert((OS.tell() - StartPos) / 8 == MemProfSummary::getNumSummaryFields());
}
diff --git a/llvm/lib/Target/AArch64/AArch64Arm64ECCallLowering.cpp b/llvm/lib/Target/AArch64/AArch64Arm64ECCallLowering.cpp
index 1169f26a2ae37..d4168abad5a80 100644
--- a/llvm/lib/Target/AArch64/AArch64Arm64ECCallLowering.cpp
+++ b/llvm/lib/Target/AArch64/AArch64Arm64ECCallLowering.cpp
@@ -258,7 +258,7 @@ void AArch64Arm64ECCallLowering::getThunkRetType(
return;
}
if (SRetAttr0.isValid()) {
- // FIXME: Sanity-check the sret type; if it's an integer or pointer,
+ // FIXME: Soundness-check the sret type; if it's an integer or pointer,
// we'll get screwy mangling/codegen.
// FIXME: For large struct types, mangle as an integer argument and
// integer return, so we can reuse more thunks, instead of "m" syntax.
diff --git a/llvm/lib/Target/AArch64/AArch64ISelLowering.cpp b/llvm/lib/Target/AArch64/AArch64ISelLowering.cpp
index a5746684308c9..df1249c3e2237 100644
--- a/llvm/lib/Target/AArch64/AArch64ISelLowering.cpp
+++ b/llvm/lib/Target/AArch64/AArch64ISelLowering.cpp
@@ -17848,7 +17848,7 @@ bool AArch64TargetLowering::lowerInterleavedStore(Instruction *Store,
auto Mask = SVI->getShuffleMask();
- // Sanity check if all the indices are NOT in range.
+ // Soundness check if all the indices are NOT in range.
// If mask is `poison`, `Mask` may be a vector of -1s.
// If all of them are `poison`, OOB read will happen later.
if (llvm::all_of(Mask, [](int Idx) { return Idx == PoisonMaskElem; })) {
diff --git a/llvm/lib/Target/AArch64/AsmParser/AArch64AsmParser.cpp b/llvm/lib/Target/AArch64/AsmParser/AArch64AsmParser.cpp
index 3641e22e6f76a..8cf3c93ee972a 100644
--- a/llvm/lib/Target/AArch64/AsmParser/AArch64AsmParser.cpp
+++ b/llvm/lib/Target/AArch64/AsmParser/AArch64AsmParser.cpp
@@ -5354,7 +5354,7 @@ bool AArch64AsmParser::parseInstruction(ParseInstructionInfo &Info,
//
// '{ ZA }' or '{ <ZAt><HV>.<BHSDQ>[<Wv>, #<imm>] }'
//
- // It's someone else's responsibility to make sure these tokens are sane
+ // It's someone else's responsibility to make sure these tokens are sound
// in the given context!
if (parseOptionalToken(AsmToken::RBrac))
diff --git a/llvm/lib/Target/AMDGPU/AMDGPUCodeGenPrepare.cpp b/llvm/lib/Target/AMDGPU/AMDGPUCodeGenPrepare.cpp
index 24bef82464495..ceb237e8253f7 100644
--- a/llvm/lib/Target/AMDGPU/AMDGPUCodeGenPrepare.cpp
+++ b/llvm/lib/Target/AMDGPU/AMDGPUCodeGenPrepare.cpp
@@ -1559,7 +1559,7 @@ static bool isInterestingPHIIncomingValue(const Value *V) {
const auto *Idx = dyn_cast<ConstantInt>(IE->getOperand(2));
// Non constant index/out of bounds index -> folding is unlikely.
- // The latter is more of a sanity check because canonical IR should just
+ // The latter is more of a soundness check because canonical IR should just
// have replaced those with poison.
if (!Idx || Idx->getZExtValue() >= FVT->getNumElements())
return false;
diff --git a/llvm/lib/Target/AMDGPU/AMDGPUInstructionSelector.cpp b/llvm/lib/Target/AMDGPU/AMDGPUInstructionSelector.cpp
index 12915c7344426..89feca0b13a4c 100644
--- a/llvm/lib/Target/AMDGPU/AMDGPUInstructionSelector.cpp
+++ b/llvm/lib/Target/AMDGPU/AMDGPUInstructionSelector.cpp
@@ -297,7 +297,7 @@ bool AMDGPUInstructionSelector::selectPHI(MachineInstr &I) const {
if (DefTy == LLT::scalar(1))
return false;
- // TODO: Verify this doesn't have insane operands (i.e. VGPR to SGPR copy)
+ // TODO: Verify this doesn't have unsound operands (i.e. VGPR to SGPR copy)
const RegClassOrRegBank &RegClassOrBank =
MRI->getRegClassOrRegBank(DefReg);
diff --git a/llvm/lib/Target/AMDGPU/AMDGPUMachineFunction.cpp b/llvm/lib/Target/AMDGPU/AMDGPUMachineFunction.cpp
index 664a15ca55f53..82a2add5cc688 100644
--- a/llvm/lib/Target/AMDGPU/AMDGPUMachineFunction.cpp
+++ b/llvm/lib/Target/AMDGPU/AMDGPUMachineFunction.cpp
@@ -129,12 +129,13 @@ unsigned AMDGPUMachineFunction::allocateLDSGlobal(const DataLayout &DL,
}
if (isModuleEntryFunction()) {
- // If this is a module entry function, we can also sanity check against
- // the static frame. Strictly it would be better to check against the
- // attribute, i.e. that the variable is within the always-allocated
- // section, and not within some other non-absolute-address object
- // allocated here, but the extra error detection is minimal and we would
- // have to pass the Function around or cache the attribute value.
+ // If this is a module entry function, we can also soundness check
+ // against the static frame. Strictly it would be better to check
+ // against the attribute, i.e. that the variable is within the always-
+ // allocated section, and not within some other non-absolute-address
+ // object allocated here, but the extra error detection is minimal and
+ // we would have to pass the Function around or cache the attribute
+ // value.
uint32_t ObjectEnd =
ObjectStart + DL.getTypeAllocSize(GV.getValueType());
if (ObjectEnd > StaticLDSSize) {
diff --git a/llvm/lib/Target/AMDGPU/SIInsertWaitcnts.cpp b/llvm/lib/Target/AMDGPU/SIInsertWaitcnts.cpp
index b163a274396ff..a17298d6c43f8 100644
--- a/llvm/lib/Target/AMDGPU/SIInsertWaitcnts.cpp
+++ b/llvm/lib/Target/AMDGPU/SIInsertWaitcnts.cpp
@@ -1024,7 +1024,7 @@ void WaitcntBrackets::updateByEvent(const SIInstrInfo *TII,
if (updateVMCntOnly(Inst)) {
// updateVMCntOnly should only leave us with VGPRs
// MUBUF, MTBUF, MIMG, FlatGlobal, and FlatScratch only have VGPR/AGPR
- // defs. That's required for a sane index into `VgprMemTypes` below
+ // defs. That's required for a sound index into `VgprMemTypes` below
assert(TRI->isVectorRegister(*MRI, Op.getReg()));
VmemType V = getVmemType(Inst);
unsigned char TypesMask = 1 << V;
diff --git a/llvm/lib/Target/ARM/ARMISelLowering.cpp b/llvm/lib/Target/ARM/ARMISelLowering.cpp
index 601806dacf092..950d3febb618e 100644
--- a/llvm/lib/Target/ARM/ARMISelLowering.cpp
+++ b/llvm/lib/Target/ARM/ARMISelLowering.cpp
@@ -8124,7 +8124,7 @@ SDValue ARMTargetLowering::ReconstructShuffle(SDValue Op,
Source->MaxElt = std::max(Source->MaxElt, EltNo);
}
- // Currently only do something sane when at most two source vectors
+ // Currently only do something sound when at most two source vectors
// are involved.
if (Sources.size() > 2)
return SDValue();
diff --git a/llvm/lib/Target/ARM/AsmParser/ARMAsmParser.cpp b/llvm/lib/Target/ARM/AsmParser/ARMAsmParser.cpp
index 0e974838a7c6b..d0e2bc2519569 100644
--- a/llvm/lib/Target/ARM/AsmParser/ARMAsmParser.cpp
+++ b/llvm/lib/Target/ARM/AsmParser/ARMAsmParser.cpp
@@ -4579,7 +4579,7 @@ ParseStatus ARMAsmParser::parseCoprocOptionOperand(OperandVector &Operands) {
static MCRegister getNextRegister(MCRegister Reg) {
// If this is a GPR, we need to do it manually, otherwise we can rely
// on the sort ordering of the enumeration since the other reg-classes
- // are sane.
+ // are sound.
if (!ARMMCRegisterClasses[ARM::GPRRegClassID].contains(Reg))
return Reg + 1;
switch (Reg.id()) {
diff --git a/llvm/lib/Target/AVR/AVRISelLowering.cpp b/llvm/lib/Target/AVR/AVRISelLowering.cpp
index 545bc3af05383..fbf94b0a72b5e 100644
--- a/llvm/lib/Target/AVR/AVRISelLowering.cpp
+++ b/llvm/lib/Target/AVR/AVRISelLowering.cpp
@@ -2114,7 +2114,7 @@ static void insertMultibyteShift(MachineInstr &MI, MachineBasicBlock *BB,
}
if (ShiftAmt != 0) {
- llvm_unreachable("don't know how to shift!"); // sanity check
+ llvm_unreachable("don't know how to shift!"); // soundness check
}
}
diff --git a/llvm/lib/Target/README.txt b/llvm/lib/Target/README.txt
index adf75c3368677..35afacca5dffc 100644
--- a/llvm/lib/Target/README.txt
+++ b/llvm/lib/Target/README.txt
@@ -831,7 +831,7 @@ Should fold to "a". Currently not optimized with "clang -emit-llvm-bc
//===---------------------------------------------------------------------===//
int a(int a, int b, int c) {return (a&&b) || (!a&&c);}
-Should fold to "a ? b : c", or at least something sane. Currently not
+Should fold to "a ? b : c", or at least something sound. Currently not
optimized with "clang -emit-llvm-bc | opt -O3".
//===---------------------------------------------------------------------===//
diff --git a/llvm/lib/Target/SPIRV/SPIRVEmitIntrinsics.cpp b/llvm/lib/Target/SPIRV/SPIRVEmitIntrinsics.cpp
index f5a49e2b47363..f21baea08b991 100644
--- a/llvm/lib/Target/SPIRV/SPIRVEmitIntrinsics.cpp
+++ b/llvm/lib/Target/SPIRV/SPIRVEmitIntrinsics.cpp
@@ -1612,7 +1612,7 @@ void SPIRVEmitIntrinsics::insertAssignPtrTypeTargetExt(
TargetExtType *AssignedType, Value *V, IRBuilder<> &B) {
Type *VTy = V->getType();
- // A couple of sanity checks.
+ // A couple of soundness checks.
assert((isPointerTy(VTy)) && "Expect a pointer type!");
if (Type *ElemTy = getPointeeType(VTy))
if (ElemTy != AssignedType)
diff --git a/llvm/lib/Target/Sparc/SparcISelDAGToDAG.cpp b/llvm/lib/Target/Sparc/SparcISelDAGToDAG.cpp
index 55bf40e185ff4..4a26e8b576e7e 100644
--- a/llvm/lib/Target/Sparc/SparcISelDAGToDAG.cpp
+++ b/llvm/lib/Target/Sparc/SparcISelDAGToDAG.cpp
@@ -159,7 +159,7 @@ bool SparcDAGToDAGISel::SelectADDRrr(SDValue Addr, SDValue &R1, SDValue &R2) {
// Note: This function was copied from, and is essentially identical
// to ARMISelDAGToDAG::SelectInlineAsm. It is very unfortunate that
// such hacking-up is necessary; a rethink of how inline asm operands
-// are handled may be in order to make doing this more sane.
+// are handled may be in order to make doing this more sound.
//
// TODO: fix inline asm support so I can simply tell it that 'i64'
// inputs to asm need to be allocated to the IntPair register type,
diff --git a/llvm/lib/Target/X86/X86OptimizeLEAs.cpp b/llvm/lib/Target/X86/X86OptimizeLEAs.cpp
index 8dcd4b8cf7551..ceefbc145fbed 100644
--- a/llvm/lib/Target/X86/X86OptimizeLEAs.cpp
+++ b/llvm/lib/Target/X86/X86OptimizeLEAs.cpp
@@ -539,7 +539,7 @@ bool X86OptimizeLEAPass::removeRedundantAddrCalc(MemOpMap &LEAs) {
MBB->insert(MachineBasicBlock::iterator(&MI), DefMI);
InstrPos[DefMI] = InstrPos[&MI] - 1;
- // Make sure the instructions' position numbers are sane.
+ // Make sure the instructions' position numbers are sound.
assert(((InstrPos[DefMI] == 1 &&
MachineBasicBlock::iterator(DefMI) == MBB->begin()) ||
InstrPos[DefMI] >
diff --git a/llvm/lib/Target/X86/X86SpeculativeLoadHardening.cpp b/llvm/lib/Target/X86/X86SpeculativeLoadHardening.cpp
index 4cc456ece77e0..e1b664861d28b 100644
--- a/llvm/lib/Target/X86/X86SpeculativeLoadHardening.cpp
+++ b/llvm/lib/Target/X86/X86SpeculativeLoadHardening.cpp
@@ -1824,9 +1824,9 @@ MachineInstr *X86SpeculativeLoadHardeningPass::sinkPostLoadHardenedInst(
if (UseMI.getDesc().getNumDefs() > 1)
return {};
- // If this register isn't a virtual register we can't walk uses of sanely,
- // just bail. Also check that its register class is one of the ones we
- // can harden.
+ // If this register isn't a virtual register we can't walk uses of
+ // soundly, just bail. Also check that its register class is one of the
+ // ones we can harden.
Register UseDefReg = UseMI.getOperand(0).getReg();
if (!canHardenRegister(UseDefReg))
return {};
diff --git a/llvm/lib/TargetParser/Triple.cpp b/llvm/lib/TargetParser/Triple.cpp
index ec15f235b8624..68e55f45baaec 100644
--- a/llvm/lib/TargetParser/Triple.cpp
+++ b/llvm/lib/TargetParser/Triple.cpp
@@ -2162,7 +2162,7 @@ bool Triple::isMacOSXVersionLT(unsigned Major, unsigned Minor,
unsigned Micro) const {
assert(isMacOSX() && "Not an OS X triple!");
- // If this is OS X, expect a sane version number.
+ // If this is OS X, expect a sound version number.
if (getOS() == Triple::MacOSX)
return isOSVersionLT(Major, Minor, Micro);
diff --git a/llvm/lib/Transforms/IPO/MemProfContextDisambiguation.cpp b/llvm/lib/Transforms/IPO/MemProfContextDisambiguation.cpp
index b8c99f1f33891..c9a4f3228ddd7 100644
--- a/llvm/lib/Transforms/IPO/MemProfContextDisambiguation.cpp
+++ b/llvm/lib/Transforms/IPO/MemProfContextDisambiguation.cpp
@@ -856,7 +856,7 @@ class CallsiteContextGraph {
/// Owner of all ContextNode unique_ptrs.
std::vector<std::unique_ptr<ContextNode>> NodeOwner;
- /// Perform sanity checks on graph when requested.
+ /// Perform soundness checks on graph when requested.
void check() const;
/// Keeps track of the last unique context id assigned.
@@ -3948,14 +3948,14 @@ void CallsiteContextGraph<DerivedCCG, FuncTy, CallTy>::identifyClones(
else
Clone = moveEdgeToNewCalleeClone(CallerEdge, CallerEdgeContextsForAlloc);
- // Sanity check that no alloc types on clone or its edges are None.
+ // Soundness check that no alloc types on clone or its edges are None.
assert(Clone->AllocTypes != (uint8_t)AllocationType::None);
}
// We should still have some context ids on the original Node.
assert(!Node->emptyContextIds());
- // Sanity check that no alloc types on node or edges are None.
+ // Soundness check that no alloc types on node or edges are None.
assert(Node->AllocTypes != (uint8_t)AllocationType::None);
if (VerifyNodes)
@@ -5195,7 +5195,7 @@ bool MemProfContextDisambiguation::initializeIndirectCallPromotionInfo(
}
#ifndef NDEBUG
-// Sanity check that the MIB stack ids match between the summary and
+// Soundness check that the MIB stack ids match between the summary and
// instruction metadata.
static void checkAllocContextIds(
const AllocInfo &AllocNode, const MDNode *MemProfMD,
@@ -5460,7 +5460,7 @@ bool MemProfContextDisambiguation::applyImport(Module &M) {
// If there is only one version that means we didn't end up
// considering this function for cloning, and in that case the alloc
// will still be none type or should have gotten the default NotCold.
- // Skip that after calling clone helper since that does some sanity
+ // Skip that after calling clone helper since that does some soundness
// checks that confirm we haven't decided yet that we need cloning.
// We might have a single version that is cold due to the
// MinClonedColdBytePercent heuristic, make sure we don't skip in that
@@ -5538,7 +5538,7 @@ bool MemProfContextDisambiguation::applyImport(Module &M) {
auto &StackNode = *(SI++);
#ifndef NDEBUG
- // Sanity check that the stack ids match between the summary and
+ // Soundness check that the stack ids match between the summary and
// instruction metadata.
auto StackIdIndexIter = StackNode.StackIdIndices.begin();
for (auto StackId : CallsiteContext) {
diff --git a/llvm/lib/Transforms/InstCombine/InstCombineVectorOps.cpp b/llvm/lib/Transforms/InstCombine/InstCombineVectorOps.cpp
index b17cf17db1580..177ea9522817b 100644
--- a/llvm/lib/Transforms/InstCombine/InstCombineVectorOps.cpp
+++ b/llvm/lib/Transforms/InstCombine/InstCombineVectorOps.cpp
@@ -1158,7 +1158,7 @@ Instruction *InstCombinerImpl::foldAggregateConstructionIntoAggregateReuse(
if (!FoundSrcAgg)
return nullptr;
- // Do some sanity check if we need to add insertvalue into predecessors.
+ // Do some soundness check if we need to add insertvalue into predecessors.
auto OrigBB = OrigIVI.getParent();
for (auto &It : SourceAggregates) {
if (Describe(It.second) == AggregateDescription::Found)
diff --git a/llvm/lib/Transforms/Scalar/LoopFlatten.cpp b/llvm/lib/Transforms/Scalar/LoopFlatten.cpp
index 04039b885f3c5..4caee30ab0983 100644
--- a/llvm/lib/Transforms/Scalar/LoopFlatten.cpp
+++ b/llvm/lib/Transforms/Scalar/LoopFlatten.cpp
@@ -44,7 +44,7 @@
// track of all of this in bookkeeping struct FlattenInfo.
// We assume the loops to be canonical, i.e. starting at 0 and increment with
// 1. This makes RHS of the compare the loop tripcount (with the right
-// predicate). We use SCEV to then sanity check that this tripcount matches
+// predicate). We use SCEV to then soundness check that this tripcount matches
// with the tripcount as computed by SCEV.
//
//===----------------------------------------------------------------------===//
diff --git a/llvm/lib/Transforms/Scalar/LoopPredication.cpp b/llvm/lib/Transforms/Scalar/LoopPredication.cpp
index 1797a2f2366af..f644bc53c739f 100644
--- a/llvm/lib/Transforms/Scalar/LoopPredication.cpp
+++ b/llvm/lib/Transforms/Scalar/LoopPredication.cpp
@@ -222,7 +222,7 @@ static cl::opt<bool>
// This is the scale factor for the latch probability. We use this during
// profitability analysis to find other exiting blocks that have a much higher
// probability of exiting the loop instead of loop exiting via latch.
-// This value should be greater than 1 for a sane profitability check.
+// This value should be greater than 1 for a sound profitability check.
static cl::opt<float> LatchExitProbabilityScale(
"loop-predication-latch-probability-scale", cl::Hidden, cl::init(2.0),
cl::desc("scale factor for the latch probability. Value should be greater "
diff --git a/llvm/lib/Transforms/Scalar/NewGVN.cpp b/llvm/lib/Transforms/Scalar/NewGVN.cpp
index 9d4fb79416596..aa1ea76629f34 100644
--- a/llvm/lib/Transforms/Scalar/NewGVN.cpp
+++ b/llvm/lib/Transforms/Scalar/NewGVN.cpp
@@ -3282,7 +3282,7 @@ void NewGVN::verifyMemoryCongruency() const {
"a single argument phi");
}
} else if (auto *FirstMP = dyn_cast<MemoryPhi>(KV.first)) {
- // We can only sanely verify that MemoryDefs in the operand list all have
+ // We can only soundly verify that MemoryDefs in the operand list all have
// the same class.
auto ReachableOperandPred = [&](const Use &U) {
return ReachableEdges.count(
diff --git a/llvm/lib/Transforms/Scalar/SimpleLoopUnswitch.cpp b/llvm/lib/Transforms/Scalar/SimpleLoopUnswitch.cpp
index 9b40fc03da6bb..71b67c50f7e3e 100644
--- a/llvm/lib/Transforms/Scalar/SimpleLoopUnswitch.cpp
+++ b/llvm/lib/Transforms/Scalar/SimpleLoopUnswitch.cpp
@@ -2524,7 +2524,7 @@ static void unswitchNontrivialInvariants(
// This transformation has a high risk of corrupting the dominator tree, and
// the below steps to rebuild loop structures will result in hard to debug
- // errors in that case so verify that the dominator tree is sane first.
+ // errors in that case so verify that the dominator tree is sound first.
// FIXME: Remove this when the bugs stop showing up and rely on existing
// verification steps.
assert(DT.verify(DominatorTree::VerificationLevel::Fast));
diff --git a/llvm/lib/Transforms/Utils/ScalarEvolutionExpander.cpp b/llvm/lib/Transforms/Utils/ScalarEvolutionExpander.cpp
index 3e3d51bffff33..6f9d59e41c585 100644
--- a/llvm/lib/Transforms/Utils/ScalarEvolutionExpander.cpp
+++ b/llvm/lib/Transforms/Utils/ScalarEvolutionExpander.cpp
@@ -599,7 +599,7 @@ Value *SCEVExpander::visitMulExpr(const SCEVMulExpr *S) {
// into this power.
uint64_t Exponent = 0;
const uint64_t MaxExponent = UINT64_MAX >> 1;
- // No one sane will ever try to calculate such huge exponents, but if we
+ // No one sound will ever try to calculate such huge exponents, but if we
// need this, we stop on UINT64_MAX / 2 because we need to exit the loop
// below when the power of 2 exceeds our Exponent, and we want it to be
// 1u << 31 at most to not deal with unsigned overflow.
diff --git a/llvm/test/Analysis/BlockFrequencyInfo/precision.ll b/llvm/test/Analysis/BlockFrequencyInfo/precision.ll
index 7408d002d065d..3ef170a7300b1 100644
--- a/llvm/test/Analysis/BlockFrequencyInfo/precision.ll
+++ b/llvm/test/Analysis/BlockFrequencyInfo/precision.ll
@@ -1,5 +1,5 @@
; RUN: opt < %s -disable-output -passes="print<block-freq>" 2>&1 | FileCheck %s
-; Sanity check precision for small-ish min/max spread.
+; Soundness check precision for small-ish min/max spread.
@g = global i32 0
diff --git a/llvm/test/Analysis/MemorySSA/function-mem-attrs.ll b/llvm/test/Analysis/MemorySSA/function-mem-attrs.ll
index f3f9faf53a306..172a328303f24 100644
--- a/llvm/test/Analysis/MemorySSA/function-mem-attrs.ll
+++ b/llvm/test/Analysis/MemorySSA/function-mem-attrs.ll
@@ -1,6 +1,6 @@
; RUN: opt -aa-pipeline=basic-aa -passes='print<memoryssa>,verify<memoryssa>' -disable-output < %s 2>&1 | FileCheck %s
;
-; Test that various function attributes give us sane results.
+; Test that various function attributes give us sound results.
@g = external global i32
diff --git a/llvm/test/Analysis/MemorySSA/multi-edges.ll b/llvm/test/Analysis/MemorySSA/multi-edges.ll
index cb76944eaa968..f4ba7f545b125 100644
--- a/llvm/test/Analysis/MemorySSA/multi-edges.ll
+++ b/llvm/test/Analysis/MemorySSA/multi-edges.ll
@@ -1,6 +1,6 @@
; RUN: opt -aa-pipeline=basic-aa -passes='print<memoryssa>,verify<memoryssa>' -disable-output < %s 2>&1 | FileCheck %s
;
-; Makes sure we have a sane model if both successors of some block is the same
+; Makes sure we have a sound model if both successors of some block is the same
; block.
define i32 @foo(i1 %a) {
diff --git a/llvm/test/CodeGen/AArch64/arm64-promote-const.ll b/llvm/test/CodeGen/AArch64/arm64-promote-const.ll
index 1531615e42584..044caea5beafa 100644
--- a/llvm/test/CodeGen/AArch64/arm64-promote-const.ll
+++ b/llvm/test/CodeGen/AArch64/arm64-promote-const.ll
@@ -99,7 +99,7 @@ if.end: ; preds = %if.else, %if.then
ret <16 x i8> %add.i12
}
-; Two different uses of the sane constant in two different basic blocks,
+; Two different uses of the sound constant in two different basic blocks,
; none dominates the other
define <16 x i8> @test4(<16 x i8> %arg, i32 %path) {
; PROMOTED-LABEL: test4:
@@ -128,7 +128,7 @@ if.end: ; preds = %entry, %if.then
ret <16 x i8> %ret.0
}
-; Two different uses of the sane constant in two different basic blocks,
+; Two different uses of the sound constant in two different basic blocks,
; one is in a phi.
define <16 x i8> @test5(<16 x i8> %arg, i32 %path) {
; PROMOTED-LABEL: test5:
diff --git a/llvm/test/CodeGen/AArch64/arm64-simplest-elf.ll b/llvm/test/CodeGen/AArch64/arm64-simplest-elf.ll
index be8f53f47dd89..f1fcae47a83a8 100644
--- a/llvm/test/CodeGen/AArch64/arm64-simplest-elf.ll
+++ b/llvm/test/CodeGen/AArch64/arm64-simplest-elf.ll
@@ -9,7 +9,7 @@ define void @foo() nounwind {
; CHECK: foo: // @foo
; CHECK: ret
- ; Similarly make sure ELF output works and is vaguely sane: aarch64 target
+ ; Similarly make sure ELF output works and is vaguely sound: aarch64 target
; machine with correct section & symbol names.
; CHECK-ELF: file format elf64-littleaarch64
diff --git a/llvm/test/CodeGen/AArch64/global-merge-group-by-use.ll b/llvm/test/CodeGen/AArch64/global-merge-group-by-use.ll
index ab2b4324ccece..76fe61d513a53 100644
--- a/llvm/test/CodeGen/AArch64/global-merge-group-by-use.ll
+++ b/llvm/test/CodeGen/AArch64/global-merge-group-by-use.ll
@@ -42,8 +42,8 @@ define void @f2(i32 %a1, i32 %a2, i32 %a3) #0 {
ret void
}
-; Sanity-check (don't worry about cost models) that we pick the biggest subset
-; of all global used "together" directly or indirectly. Here, that means
+; Soundness-check (don't worry about cost models) that we pick the biggest
+; subset of all global used "together" directly or indirectly. Here, that means
; merging n3, m4, and n4 together, but ignoring m3.
@m3 = internal global i32 0, align 4
diff --git a/llvm/test/CodeGen/AArch64/landingpad-ifcvt.ll b/llvm/test/CodeGen/AArch64/landingpad-ifcvt.ll
index c6dd152d7ff54..5805c5045b890 100644
--- a/llvm/test/CodeGen/AArch64/landingpad-ifcvt.ll
+++ b/llvm/test/CodeGen/AArch64/landingpad-ifcvt.ll
@@ -1,6 +1,6 @@
; RUN: llc < %s | FileCheck %s
-; Make sure this doesn't crash (and the output is sane).
+; Make sure this doesn't crash (and the output is sound).
; CHECK: // %__except.ret
; CHECK-NEXT: $ehgcr_0_2:
; CHECK-NEXT: mov x0, xzr
diff --git a/llvm/test/CodeGen/AArch64/local_vars.ll b/llvm/test/CodeGen/AArch64/local_vars.ll
index e321b35a5425d..e6f935e23fae7 100644
--- a/llvm/test/CodeGen/AArch64/local_vars.ll
+++ b/llvm/test/CodeGen/AArch64/local_vars.ll
@@ -1,7 +1,7 @@
; RUN: llc -verify-machineinstrs < %s -mtriple=aarch64-none-linux-gnu | FileCheck %s
; RUN: llc -verify-machineinstrs < %s -mtriple=aarch64-none-linux-gnu -frame-pointer=all | FileCheck -check-prefix CHECK-WITHFP-ARM64 %s
-; Make sure a reasonably sane prologue and epilogue are
+; Make sure a reasonably sound prologue and epilogue are
; generated. This test is not robust in the face of an frame-handling
; evolving, but still has value for unrelated changes, I
; believe.
diff --git a/llvm/test/CodeGen/AArch64/wineh-try-catch-cbz.ll b/llvm/test/CodeGen/AArch64/wineh-try-catch-cbz.ll
index 1d1e262ac014e..d385f6d0dbcb6 100644
--- a/llvm/test/CodeGen/AArch64/wineh-try-catch-cbz.ll
+++ b/llvm/test/CodeGen/AArch64/wineh-try-catch-cbz.ll
@@ -1,6 +1,6 @@
; RUN: llc < %s | FileCheck %s
-; Make sure the prologue is sane. (Doesn't need to exactly match this,
+; Make sure the prologue is sound. (Doesn't need to exactly match this,
; but the original issue only reproduced if the cbz was immediately
; after the frame setup.)
diff --git a/llvm/test/CodeGen/AArch64/wineh-try-catch-vla.ll b/llvm/test/CodeGen/AArch64/wineh-try-catch-vla.ll
index 46e5f2403f2ae..099906ae76074 100644
--- a/llvm/test/CodeGen/AArch64/wineh-try-catch-vla.ll
+++ b/llvm/test/CodeGen/AArch64/wineh-try-catch-vla.ll
@@ -4,7 +4,7 @@
; CHECK-LABEL: "?a@@YAXXZ":
; CHECK-NOT: x19
-; Make sure the prologue and epilogue are sane. Make sure the
+; Make sure the prologue and epilogue are sound. Make sure the
; frame index is relative to the FP, since there is no base pointer.
; (Funclets aren't allowed to contain dynamic allocas.)
; CHECK-LABEL: "?catch$2@?0??a@@YAXXZ at 4HA":
diff --git a/llvm/test/CodeGen/AMDGPU/buffer-fat-pointers-memcpy.ll b/llvm/test/CodeGen/AMDGPU/buffer-fat-pointers-memcpy.ll
index 3c991cfb7a1aa..93a74bf85ced5 100644
--- a/llvm/test/CodeGen/AMDGPU/buffer-fat-pointers-memcpy.ll
+++ b/llvm/test/CodeGen/AMDGPU/buffer-fat-pointers-memcpy.ll
@@ -8,7 +8,7 @@
; lower-buffer-fat-pointers-mem-transfer.ll to verify the IR produced by
; the lowering.
;
-; This file is a sanity check to make sure that the code generated
+; This file is a soundness check to make sure that the code generated
; for buffer-related memcpy() calls turns into something reasonable in
; the backend, despite the wide intermediate vectors
diff --git a/llvm/test/CodeGen/ARM/vext.ll b/llvm/test/CodeGen/ARM/vext.ll
index 46f778d3c2c91..8e2349ce20719 100644
--- a/llvm/test/CodeGen/ARM/vext.ll
+++ b/llvm/test/CodeGen/ARM/vext.ll
@@ -177,7 +177,7 @@ entry:
; One vector needs vext, the other can be handled by extract_subvector
; Also checks interleaving of sources is handled correctly.
-; Essence: a vext is used on %A and something saner than stack load/store for final result.
+; Essence: a vext is used on %A and something sounder than stack load/store for final result.
define <4 x i16> @test_interleaved(ptr %A, ptr %B) nounwind {
; CHECK-LABEL: test_interleaved:
; CHECK: @ %bb.0:
diff --git a/llvm/test/CodeGen/Hexagon/PR33749.ll b/llvm/test/CodeGen/Hexagon/PR33749.ll
index ec5c25e2d5523..e18fa5ae49bdb 100644
--- a/llvm/test/CodeGen/Hexagon/PR33749.ll
+++ b/llvm/test/CodeGen/Hexagon/PR33749.ll
@@ -1,6 +1,6 @@
; RUN: llc -mtriple=hexagon < %s | FileCheck %s
; This testcase used to fail with "cannot select 'i1 = add x, y'".
-; Check for some sane output:
+; Check for some sound output:
; CHECK: xor(p{{[0-3]}},p{{[0-3]}})
target datalayout = "e-m:e-p:32:32:32-a:0-n16:32-i64:64:64-i32:32:32-i16:16:16-i1:8:8-f32:32:32-f64:64:64-v32:32:32-v64:64:64-v512:512:512-v1024:1024:1024-v2048:2048:2048"
diff --git a/llvm/test/CodeGen/Hexagon/bit-bitsplit-src.ll b/llvm/test/CodeGen/Hexagon/bit-bitsplit-src.ll
index a1b33fdca415d..21f77c97b1acb 100644
--- a/llvm/test/CodeGen/Hexagon/bit-bitsplit-src.ll
+++ b/llvm/test/CodeGen/Hexagon/bit-bitsplit-src.ll
@@ -1,7 +1,7 @@
; RUN: llc -mtriple=hexagon < %s | FileCheck %s
; REQUIRES: asserts
-; This used to crash. Check for some sane output.
+; This used to crash. Check for some sound output.
; CHECK: call printf
target triple = "hexagon"
diff --git a/llvm/test/CodeGen/Hexagon/bit-has.ll b/llvm/test/CodeGen/Hexagon/bit-has.ll
index 4485af409d1ee..e32d7f3b26a92 100644
--- a/llvm/test/CodeGen/Hexagon/bit-has.ll
+++ b/llvm/test/CodeGen/Hexagon/bit-has.ll
@@ -1,7 +1,7 @@
; RUN: llc -mtriple=hexagon -hexagon-initial-cfg-cleanup=0 < %s | FileCheck %s
; REQUIRES: asserts
-; This used to crash. Check for some sane output.
+; This used to crash. Check for some sound output.
; CHECK: sath
target triple = "hexagon"
diff --git a/llvm/test/CodeGen/Hexagon/cfgopt-fall-through.ll b/llvm/test/CodeGen/Hexagon/cfgopt-fall-through.ll
index 050af3e75d25a..7d7e5d6a24ba7 100644
--- a/llvm/test/CodeGen/Hexagon/cfgopt-fall-through.ll
+++ b/llvm/test/CodeGen/Hexagon/cfgopt-fall-through.ll
@@ -1,7 +1,7 @@
; RUN: llc -mtriple=hexagon -verify-machineinstrs -hexagon-initial-cfg-cleanup=0 < %s | FileCheck %s
; REQUIRES: asserts
-; Check for some sane output. This test used to crash.
+; Check for some sound output. This test used to crash.
; CHECK: jumpr r31
diff --git a/llvm/test/CodeGen/Hexagon/copy-to-combine-dbg.ll b/llvm/test/CodeGen/Hexagon/copy-to-combine-dbg.ll
index db198fce1428c..7579e28e90148 100644
--- a/llvm/test/CodeGen/Hexagon/copy-to-combine-dbg.ll
+++ b/llvm/test/CodeGen/Hexagon/copy-to-combine-dbg.ll
@@ -1,5 +1,5 @@
; RUN: llc -mtriple=hexagon < %s | FileCheck %s
-; Check for some sane output (original problem was a crash).
+; Check for some sound output (original problem was a crash).
; CHECK: DEBUG_VALUE: fred:Count <- 0
target triple = "hexagon"
diff --git a/llvm/test/CodeGen/Hexagon/hexagon-tfr-add.ll b/llvm/test/CodeGen/Hexagon/hexagon-tfr-add.ll
index 740834151f4c6..23c14b1eaf577 100644
--- a/llvm/test/CodeGen/Hexagon/hexagon-tfr-add.ll
+++ b/llvm/test/CodeGen/Hexagon/hexagon-tfr-add.ll
@@ -87,7 +87,7 @@ declare zeroext i8 @f1(ptr) #1
declare void @f2(i32) #1
; The pass that used to crash doesn't do anything on this testcase anymore,
-; but check for sane output anyway.
+; but check for sound output anyway.
; CHECK-ADDI: ##g0
; Function Attrs: nounwind optsize ssp
define zeroext i8 @f3() #2 {
diff --git a/llvm/test/CodeGen/Hexagon/loop-idiom/pmpy-long-loop.ll b/llvm/test/CodeGen/Hexagon/loop-idiom/pmpy-long-loop.ll
index 07536c7f4a508..8dc6a594054f2 100644
--- a/llvm/test/CodeGen/Hexagon/loop-idiom/pmpy-long-loop.ll
+++ b/llvm/test/CodeGen/Hexagon/loop-idiom/pmpy-long-loop.ll
@@ -7,7 +7,7 @@
; testcase shows a legitimate case where this limit was exceeded.
; Instead of crashing, gracefully abort the simplification.
;
-; Check for sane output.
+; Check for sound output.
; CHECK: define void @fred
target datalayout = "e-m:e-p:32:32:32-a:0-n16:32-i64:64:64-i32:32:32-i16:16:16-i1:8:8-f32:32:32-f64:64:64-v32:32:32-v64:64:64-v512:512:512-v1024:1024:1024-v2048:2048:2048"
diff --git a/llvm/test/CodeGen/Hexagon/loop-idiom/pmpy-shiftconv-fail.ll b/llvm/test/CodeGen/Hexagon/loop-idiom/pmpy-shiftconv-fail.ll
index a0fcba15c35da..504dbdfde4108 100644
--- a/llvm/test/CodeGen/Hexagon/loop-idiom/pmpy-shiftconv-fail.ll
+++ b/llvm/test/CodeGen/Hexagon/loop-idiom/pmpy-shiftconv-fail.ll
@@ -2,7 +2,7 @@
; RUN: opt -p hexagon-loop-idiom -S < %s | FileCheck %s
; REQUIRES: asserts
;
-; Check for sane output, this used to crash.
+; Check for sound output, this used to crash.
; CHECK: define void @fred
; The conversion of shifts from right to left failed, but the return
diff --git a/llvm/test/CodeGen/Hexagon/rdf-cover-use.ll b/llvm/test/CodeGen/Hexagon/rdf-cover-use.ll
index 5ebd8b38630ce..393ca061cc103 100644
--- a/llvm/test/CodeGen/Hexagon/rdf-cover-use.ll
+++ b/llvm/test/CodeGen/Hexagon/rdf-cover-use.ll
@@ -1,6 +1,6 @@
; RUN: llc -mtriple=hexagon -verify-machineinstrs < %s | FileCheck %s
-; Check for sane output.
+; Check for sound output.
; CHECK: vmpyweh
target triple = "hexagon"
diff --git a/llvm/test/CodeGen/Hexagon/rdf-def-mask.ll b/llvm/test/CodeGen/Hexagon/rdf-def-mask.ll
index db25b64bd74f8..da03eae0b0c31 100644
--- a/llvm/test/CodeGen/Hexagon/rdf-def-mask.ll
+++ b/llvm/test/CodeGen/Hexagon/rdf-def-mask.ll
@@ -1,7 +1,7 @@
; RUN: llc -mtriple=hexagon -O3 -verify-machineinstrs < %s | FileCheck %s
; REQUIRES: asserts
-; Check for sane output. This testcase used to crash.
+; Check for sound output. This testcase used to crash.
; CHECK: jumpr r31
target triple = "hexagon"
diff --git a/llvm/test/CodeGen/Hexagon/regalloc-block-overlap.ll b/llvm/test/CodeGen/Hexagon/regalloc-block-overlap.ll
index a421ea02c2462..eabaa0555e1f3 100644
--- a/llvm/test/CodeGen/Hexagon/regalloc-block-overlap.ll
+++ b/llvm/test/CodeGen/Hexagon/regalloc-block-overlap.ll
@@ -1,6 +1,6 @@
; RUN: llc -mtriple=hexagon < %s | FileCheck %s
-; Check for a sane output. This testcase used to cause a crash.
+; Check for a sound output. This testcase used to cause a crash.
; CHECK: vlut16
target triple = "hexagon-unknown--elf"
diff --git a/llvm/test/CodeGen/M68k/Arith/mul64.ll b/llvm/test/CodeGen/M68k/Arith/mul64.ll
index 12967025ab46d..6ac301fb60894 100644
--- a/llvm/test/CodeGen/M68k/Arith/mul64.ll
+++ b/llvm/test/CodeGen/M68k/Arith/mul64.ll
@@ -2,7 +2,7 @@
; RUN: llc < %s -mtriple=m68k-linux -verify-machineinstrs | FileCheck %s
; Currenlty making the libcall is ok, x20 supports i32 mul/div which
-; yields saner expansion for i64 mul
+; yields sounder expansion for i64 mul
define i64 @foo(i64 %t, i64 %u) nounwind {
; CHECK-LABEL: foo:
; CHECK: ; %bb.0:
diff --git a/llvm/test/CodeGen/MLRegAlloc/interactive-mode.ll b/llvm/test/CodeGen/MLRegAlloc/interactive-mode.ll
index 51af5891c4e0f..6ed6f59612e02 100644
--- a/llvm/test/CodeGen/MLRegAlloc/interactive-mode.ll
+++ b/llvm/test/CodeGen/MLRegAlloc/interactive-mode.ll
@@ -9,7 +9,7 @@
; RUN: llc -mtriple=x86_64-linux-unknown -regalloc=greedy -regalloc-enable-advisor=release -interactive-model-runner-echo-reply \
; RUN: -regalloc-evict-interactive-channel-base=%t.channel-basename %S/Inputs/two-large-fcts.ll -o /dev/null | FileCheck %s
-;; Make sure we see both contexts. Also sanity-check that the advice is the
+;; Make sure we see both contexts. Also soundness-check that the advice is the
;; expected one - the index of the first legal register
; CHECK: context: SyFgets
; CHECK-NEXT: observation: 0
diff --git a/llvm/test/CodeGen/RISCV/rvv/zve32-types.ll b/llvm/test/CodeGen/RISCV/rvv/zve32-types.ll
index e4dfdb2c72c02..03a7a7a4b0d35 100644
--- a/llvm/test/CodeGen/RISCV/rvv/zve32-types.ll
+++ b/llvm/test/CodeGen/RISCV/rvv/zve32-types.ll
@@ -4,7 +4,8 @@
; RUN: sed 's/iXLen/i64/g' %s | llc -mtriple=riscv64 -mattr=+zve32f,+f,+zvl64b \
; RUN: -verify-machineinstrs | FileCheck %s --check-prefixes=CHECK
-; Sanity check that type legalization kicks in for vscale x 1 types with Zve32.
+; Soundness check that type legalization kicks in for vscale x 1 types with
+; Zve32.
; NOTE: The load and store are widened by using VP_LOAD/STORE. The add/fadd are
; widened by using the next larger LMUL and operating on the whole vector. This
diff --git a/llvm/test/CodeGen/X86/2011-11-07-LegalizeBuildVector.ll b/llvm/test/CodeGen/X86/2011-11-07-LegalizeBuildVector.ll
index da819084a2344..17910f191ad34 100644
--- a/llvm/test/CodeGen/X86/2011-11-07-LegalizeBuildVector.ll
+++ b/llvm/test/CodeGen/X86/2011-11-07-LegalizeBuildVector.ll
@@ -1,6 +1,6 @@
; RUN: llc < %s -mtriple=i686-- -mattr=+avx | FileCheck %s
-; We don't really care what this outputs; just make sure it's somewhat sane.
+; We don't really care what this outputs; just make sure it's somewhat sound.
; CHECK: legalize_test
; CHECK: vmovups
define void @legalize_test(i32 %x, ptr %p) nounwind {
diff --git a/llvm/test/CodeGen/X86/frame-base.ll b/llvm/test/CodeGen/X86/frame-base.ll
index 72c062b77a5ee..4f117f3dd14a9 100644
--- a/llvm/test/CodeGen/X86/frame-base.ll
+++ b/llvm/test/CodeGen/X86/frame-base.ll
@@ -1,7 +1,7 @@
; RUN: llc -mtriple=x86_64-apple-macosx -o - %s | FileCheck %s
; The issue here was a conflict between forming a %rip-relative lea and a
-; FrameIndex lea. The %rip sanity-checks didn't consider that a base register
+; FrameIndex lea. The %rip soundness-checks didn't consider that a base register
; had been set if we'd already matched a FrameIndex, when it has in reality.
@var = global i32 0
diff --git a/llvm/test/CodeGen/X86/hipe-cc.ll b/llvm/test/CodeGen/X86/hipe-cc.ll
index a7bcd17b23275..95d9afebaec99 100644
--- a/llvm/test/CodeGen/X86/hipe-cc.ll
+++ b/llvm/test/CodeGen/X86/hipe-cc.ll
@@ -90,7 +90,7 @@ define cc 11 void @baz() nounwind {
ret void
}
-; Sanity-check the tail call sequence. Number of arguments was chosen as to
+; Soundness-check the tail call sequence. Number of arguments was chosen as to
; expose a bug where the tail call sequence clobbered the stack.
define cc 11 { i32, i32, i32 } @tailcaller(i32 %hp, i32 %p) nounwind {
; CHECK-LABEL: tailcaller:
diff --git a/llvm/test/CodeGen/X86/hipe-cc64.ll b/llvm/test/CodeGen/X86/hipe-cc64.ll
index d8505641cd789..98fb07b0013e9 100644
--- a/llvm/test/CodeGen/X86/hipe-cc64.ll
+++ b/llvm/test/CodeGen/X86/hipe-cc64.ll
@@ -102,7 +102,7 @@ define cc 11 void @baz() nounwind {
ret void
}
-; Sanity-check the tail call sequence. Number of arguments was chosen as to
+; Soundness-check the tail call sequence. Number of arguments was chosen as to
; expose a bug where the tail call sequence clobbered the stack.
define cc 11 { i64, i64, i64 } @tailcaller(i64 %hp, i64 %p) #0 {
; CHECK-LABEL: tailcaller:
diff --git a/llvm/test/CodeGen/X86/misched-balance.ll b/llvm/test/CodeGen/X86/misched-balance.ll
index 02d1425360159..19d9258f5a7f8 100644
--- a/llvm/test/CodeGen/X86/misched-balance.ll
+++ b/llvm/test/CodeGen/X86/misched-balance.ll
@@ -1,6 +1,6 @@
; RUN: llc < %s -mtriple=x86_64-unknown-linux-gnu -mcpu=core2 -pre-RA-sched=source -enable-misched -verify-machineinstrs | FileCheck %s
;
-; Verify that misched resource/latency balancy heuristics are sane.
+; Verify that misched resource/latency balancy heuristics are sound.
define void @unrolled_mmult1(ptr %tmp55, ptr %tmp56, ptr %pre, ptr %pre94,
ptr %pre95, ptr %pre96, ptr %pre97, ptr %pre98, ptr %pre99,
diff --git a/llvm/test/CodeGen/X86/pr23246.ll b/llvm/test/CodeGen/X86/pr23246.ll
index da3246a917ea3..d644580c2008b 100644
--- a/llvm/test/CodeGen/X86/pr23246.ll
+++ b/llvm/test/CodeGen/X86/pr23246.ll
@@ -4,7 +4,7 @@
target datalayout = "e-m:o-i64:64-f80:128-n8:16:32:64-S128"
; PR23246
-; We're really only interested in doing something sane with the shuffle.
+; We're really only interested in doing something sound with the shuffle.
define <2 x i64> @test(<1 x i64> %a) #0 {
; CHECK-LABEL: test:
diff --git a/llvm/test/CodeGen/X86/splat-const.ll b/llvm/test/CodeGen/X86/splat-const.ll
index b9fd29658367f..442ddba863193 100644
--- a/llvm/test/CodeGen/X86/splat-const.ll
+++ b/llvm/test/CodeGen/X86/splat-const.ll
@@ -2,7 +2,7 @@
; RUN: llc < %s -mcpu=penryn | FileCheck %s --check-prefix=SSE
; RUN: llc < %s -mcpu=sandybridge | FileCheck %s --check-prefix=AVX
; RUN: llc < %s -mcpu=haswell | FileCheck %s --check-prefix=AVX2
-; This checks that lowering for creation of constant vectors is sane and
+; This checks that lowering for creation of constant vectors is sound and
; doesn't use redundant shuffles. (fixes PR22276)
target triple = "x86_64-unknown-unknown"
diff --git a/llvm/test/CodeGen/X86/x32-va_start.ll b/llvm/test/CodeGen/X86/x32-va_start.ll
index 31c8aee3fddec..09f7c6838258a 100644
--- a/llvm/test/CodeGen/X86/x32-va_start.ll
+++ b/llvm/test/CodeGen/X86/x32-va_start.ll
@@ -4,7 +4,7 @@
; RUN: llc < %s -mtriple=i386-linux-gnux32 | FileCheck %s -check-prefix=X32BITABI
; RUN: llc < %s -mtriple=i686-linux-gnux32 | FileCheck %s -check-prefix=X32BITABI
;
-; Verifies that x32 va_start lowering is sane. To regenerate this test, use
+; Verifies that x32 va_start lowering is sound. To regenerate this test, use
; cat <<EOF |
; #include <stdarg.h>
;
diff --git a/llvm/test/DebugInfo/AArch64/eh_frame_personality.ll b/llvm/test/DebugInfo/AArch64/eh_frame_personality.ll
index 2ee65a8450811..7b781d14aeda5 100644
--- a/llvm/test/DebugInfo/AArch64/eh_frame_personality.ll
+++ b/llvm/test/DebugInfo/AArch64/eh_frame_personality.ll
@@ -24,7 +24,7 @@ clean:
; 0020 1c000000 24000000 00000000 24000000 ....$.......$...
; 0030 08000000 00000000 00440c1f 10449e02 .........D...D..
-; The key test here is that the personality routine is sanely encoded (under the
+; The key test here is that the personality routine is soundly encoded (under the
; small memory model it must be an 8-byte value for full generality: code+data <
; 4GB, but you might need both +4GB and -4GB depending on where things end
; up. However, for completeness:
diff --git a/llvm/test/DebugInfo/Generic/dbg-value-lower-linenos.ll b/llvm/test/DebugInfo/Generic/dbg-value-lower-linenos.ll
index b6879e3f827a8..cebf609828a7f 100644
--- a/llvm/test/DebugInfo/Generic/dbg-value-lower-linenos.ll
+++ b/llvm/test/DebugInfo/Generic/dbg-value-lower-linenos.ll
@@ -8,7 +8,7 @@
; In the second function here, LowerDbgDeclare will promote various variable
; accesses of a dbg.declare'd alloca into dbg.values. Check that their line
-; numbers are sane too. (IR copied from DebugInfo/X86/formal_parameter.ll).
+; numbers are sound too. (IR copied from DebugInfo/X86/formal_parameter.ll).
; CHECK-LABEL: define i32 @foo
diff --git a/llvm/test/DebugInfo/X86/debug-line-in-one-fragment.ll b/llvm/test/DebugInfo/X86/debug-line-in-one-fragment.ll
index 776674d53533d..d3914ca08ea82 100644
--- a/llvm/test/DebugInfo/X86/debug-line-in-one-fragment.ll
+++ b/llvm/test/DebugInfo/X86/debug-line-in-one-fragment.ll
@@ -10,7 +10,7 @@
;; multiple fragments so that they can linker-relax the linetable, but x86
;; doesn't.
;;
-;; First, sanity check that the linetable output is as expected,
+;; First, soundness check that the linetable output is as expected,
; LINES: Address Line Column File ISA Discriminator OpIndex Flags
; LINES-NEXT: ------------------ ------ ------ ------ --- ------------- ------- -------------
diff --git a/llvm/test/FileCheck/opt-color.txt b/llvm/test/FileCheck/opt-color.txt
index b12fa768881fe..8b41651ee3942 100644
--- a/llvm/test/FileCheck/opt-color.txt
+++ b/llvm/test/FileCheck/opt-color.txt
@@ -11,7 +11,7 @@
; RUN: FileCheck -check-prefix NO-COLOR %s < %t.no-color
; RUN: FileCheck -check-prefix COLOR %s < %t.color
-; Make sure our NO-COLOR and COLOR patterns are sane: they don't match the
+; Make sure our NO-COLOR and COLOR patterns are sound: they don't match the
; opposite cases.
; RUN: not FileCheck -check-prefix COLOR %s < %t.no-color
; RUN: not FileCheck -check-prefix NO-COLOR %s < %t.color
diff --git a/llvm/test/MC/AArch64/basic-a64-instructions.s b/llvm/test/MC/AArch64/basic-a64-instructions.s
index b2ec5b6ac3678..1ef5a670c3243 100644
--- a/llvm/test/MC/AArch64/basic-a64-instructions.s
+++ b/llvm/test/MC/AArch64/basic-a64-instructions.s
@@ -283,7 +283,7 @@ _func:
// CHECK: add wsp, wsp, #1104 // encoding: [0xff,0x43,0x11,0x11]
// CHECK: add wsp, w30, #4084 // encoding: [0xdf,0xd3,0x3f,0x11]
-// A few checks on the sanity of 64-bit versions
+// A few checks on the soundness of 64-bit versions
add x0, x24, #291
add x3, x24, #4095, lsl #12
add x8, sp, #1074
@@ -347,7 +347,7 @@ _func:
// CHECK: mov x11, sp // encoding: [0xeb,0x03,0x00,0x91]
// CHECK: mov w24, wsp // encoding: [0xf8,0x03,0x00,0x11]
-// A relocation check (default to lo12, which is the only sane relocation anyway really)
+// A relocation check (default to lo12, which is the only sound relocation anyway really)
add x0, x4, #:lo12:var
// CHECK: add x0, x4, :lo12:var // encoding: [0x80,0bAAAAAA00,0b00AAAAAA,0x91]
// CHECK: // fixup A - offset: 0, value: :lo12:var, kind: fixup_aarch64_add_imm12
diff --git a/llvm/test/Transforms/Coroutines/coro-debug.ll b/llvm/test/Transforms/Coroutines/coro-debug.ll
index 5f8e9c9c1d16d..2e09532d2f1da 100644
--- a/llvm/test/Transforms/Coroutines/coro-debug.ll
+++ b/llvm/test/Transforms/Coroutines/coro-debug.ll
@@ -1,4 +1,4 @@
-; Tests that debug information is sane after coro-split
+; Tests that debug information is sound after coro-split
; RUN: opt < %s -passes='cgscc(coro-split),simplifycfg,early-cse' -S | FileCheck %s
source_filename = "simple-repro.c"
diff --git a/llvm/test/Transforms/GlobalOpt/localize-constexpr-debuginfo.ll b/llvm/test/Transforms/GlobalOpt/localize-constexpr-debuginfo.ll
index 9bae10081c48d..6f811fa7e61b7 100644
--- a/llvm/test/Transforms/GlobalOpt/localize-constexpr-debuginfo.ll
+++ b/llvm/test/Transforms/GlobalOpt/localize-constexpr-debuginfo.ll
@@ -9,7 +9,7 @@ define i32 @main(i32 %argc, ptr %argv) norecurse !dbg !18 {
; CHECK: define i32 @main
; Make sure we localized the global.
; CHECK: alloca ptr
-; Make sure the metadata is sane. Currently, we just drop the metadata,
+; Make sure the metadata is sound. Currently, we just drop the metadata,
; so it points to nothing.
; CHECK: #dbg_value(ptr poison,
; CHECK: !2 = !{}
diff --git a/llvm/test/Transforms/InferAddressSpaces/AMDGPU/select.ll b/llvm/test/Transforms/InferAddressSpaces/AMDGPU/select.ll
index 019ca8a8759dc..5d61fea834101 100644
--- a/llvm/test/Transforms/InferAddressSpaces/AMDGPU/select.ll
+++ b/llvm/test/Transforms/InferAddressSpaces/AMDGPU/select.ll
@@ -1,7 +1,7 @@
; RUN: opt -S -mtriple=amdgcn-amd-amdhsa -passes=infer-address-spaces %s | FileCheck %s
; Instcombine pulls the addrspacecast out of the select, make sure
-; this doesn't do something insane on non-canonical IR.
+; this doesn't do something unsound on non-canonical IR.
; CHECK-LABEL: define ptr @return_select_group_flat(
; CHECK-SAME: i1 [[C:%.*]], ptr addrspace(3) [[GROUP_PTR_0:%.*]], ptr addrspace(3) [[GROUP_PTR_1:%.*]]) #[[ATTR0:[0-9]+]] {
diff --git a/llvm/test/Transforms/InstCombine/allocsize-32.ll b/llvm/test/Transforms/InstCombine/allocsize-32.ll
index 589561dfbc4a5..6f6edab3a2ccf 100644
--- a/llvm/test/Transforms/InstCombine/allocsize-32.ll
+++ b/llvm/test/Transforms/InstCombine/allocsize-32.ll
@@ -1,6 +1,6 @@
; RUN: opt < %s -passes=instcombine -S | FileCheck %s
;
-; The idea is that we want to have sane semantics (e.g. not assertion failures)
+; The idea is that we want to have sound semantics (e.g. not assertion failures)
; when given an allocsize function that takes a 64-bit argument in the face of
; 32-bit pointers.
diff --git a/llvm/test/Transforms/JumpThreading/crash.ll b/llvm/test/Transforms/JumpThreading/crash.ll
index 4fab807864db8..a70a90af85cfe 100644
--- a/llvm/test/Transforms/JumpThreading/crash.ll
+++ b/llvm/test/Transforms/JumpThreading/crash.ll
@@ -565,7 +565,7 @@ declare ptr @PR14233.f1()
declare ptr @PR14233.f2()
-; Make sure the following compiles in a sane amount of time, as opposed
+; Make sure the following compiles in a sound amount of time, as opposed
; to taking exponential time.
; (CHECK to make sure the condition doesn't get simplified somehow;
; if it does, the testcase will need to be revised.)
diff --git a/llvm/test/Transforms/LoopStrengthReduce/X86/bin_power.ll b/llvm/test/Transforms/LoopStrengthReduce/X86/bin_power.ll
index c9781241c9699..ac6dd95ccc14b 100644
--- a/llvm/test/Transforms/LoopStrengthReduce/X86/bin_power.ll
+++ b/llvm/test/Transforms/LoopStrengthReduce/X86/bin_power.ll
@@ -167,7 +167,7 @@ exit: ; preds = %loop
}
; The output here is reasonably big, we just check that the amount of expanded
-; instructions is sane.
+; instructions is sound.
define i32 @test_05(i32 %a) {
; CHECK-LABEL: @test_05
; CHECK: entry:
diff --git a/llvm/test/tools/dsymutil/ARM/dwarf5-addrx-0x0-last.test b/llvm/test/tools/dsymutil/ARM/dwarf5-addrx-0x0-last.test
index c9d15603f0e16..a06a0c5a77fa5 100644
--- a/llvm/test/tools/dsymutil/ARM/dwarf5-addrx-0x0-last.test
+++ b/llvm/test/tools/dsymutil/ARM/dwarf5-addrx-0x0-last.test
@@ -13,7 +13,7 @@ int main (int argc, char const *argv[])
$ clang -gdwarf-5 dwarf5-addrx-0x0-last.c -c -o dwarf5-addrx-0x0-last.o
$ clang dwarf5-addrx-0x0-last.o -o dwarf5-addrx-0x0-last.out
-# Sanity check: make sure main's low PC (0x0) requires an index computation
+# Soundness check: make sure main's low PC (0x0) requires an index computation
# into the .debug_addr section.
RUN: llvm-dwarfdump -debug-addr %p/../Inputs/private/tmp/dwarf5/dwarf5-addrx-0x0-last.o | FileCheck %s --check-prefix DEBUGADDR
diff --git a/llvm/test/tools/dsymutil/X86/basic-linking-bundle.test b/llvm/test/tools/dsymutil/X86/basic-linking-bundle.test
index 685c86a375e2a..d4d3eb8e3172b 100644
--- a/llvm/test/tools/dsymutil/X86/basic-linking-bundle.test
+++ b/llvm/test/tools/dsymutil/X86/basic-linking-bundle.test
@@ -4,7 +4,7 @@ RUN: cp %p/../Inputs/basic.macho.x86_64 %t/basic.macho.x86_64
RUN: dsymutil -accelerator=Pub -oso-prepend-path=%p/.. %t/basic.macho.x86_64
-Check that the object file in the bundle exists and is sane:
+Check that the object file in the bundle exists and is sound:
RUN: llvm-dwarfdump -a %t/basic.macho.x86_64.dSYM/Contents/Resources/DWARF/basic.macho.x86_64 | FileCheck %S/basic-linking-x86.test
Check that we don't create an empty Remarks directory if there are no remarks.
@@ -28,7 +28,7 @@ RUN: cp %p/../Inputs/basic.macho.x86_64 %t/basic.macho.x86_64
RUN: dsymutil --linker parallel -accelerator=Pub -oso-prepend-path=%p/.. %t/basic.macho.x86_64
-Check that the object file in the bundle exists and is sane:
+Check that the object file in the bundle exists and is sound:
RUN: llvm-dwarfdump -a %t/basic.macho.x86_64.dSYM/Contents/Resources/DWARF/basic.macho.x86_64 | FileCheck %S/basic-linking-x86.test
Check that we don't create an empty Remarks directory if there are no remarks.
diff --git a/llvm/test/tools/dsymutil/X86/remarks-linking-archive.text b/llvm/test/tools/dsymutil/X86/remarks-linking-archive.text
index 47f9df82296fe..dc5910a91778f 100644
--- a/llvm/test/tools/dsymutil/X86/remarks-linking-archive.text
+++ b/llvm/test/tools/dsymutil/X86/remarks-linking-archive.text
@@ -4,12 +4,12 @@ RUN: cat %p/../Inputs/remarks/basic.macho.remarks.archive.x86_64 > %t/basic.mach
RUN: dsymutil -oso-prepend-path=%p/../Inputs -remarks-prepend-path=%p/../Inputs %t/basic.macho.remarks.archive.x86_64
-Check that the remark file in the bundle exists and is sane:
+Check that the remark file in the bundle exists and is sound:
RUN: llvm-bcanalyzer -dump %t/basic.macho.remarks.archive.x86_64.dSYM/Contents/Resources/Remarks/basic.macho.remarks.archive.x86_64 | FileCheck %s
RUN: dsymutil --linker parallel -oso-prepend-path=%p/../Inputs -remarks-prepend-path=%p/../Inputs %t/basic.macho.remarks.archive.x86_64
-Check that the remark file in the bundle exists and is sane:
+Check that the remark file in the bundle exists and is sound:
RUN: llvm-bcanalyzer -dump %t/basic.macho.remarks.archive.x86_64.dSYM/Contents/Resources/Remarks/basic.macho.remarks.archive.x86_64 | FileCheck %s
Check that we don't error if we're missing remark files from an archive, but we warn instead.
diff --git a/llvm/test/tools/dsymutil/X86/remarks-linking-bundle.test b/llvm/test/tools/dsymutil/X86/remarks-linking-bundle.test
index d85cd54c8f640..976208603c648 100644
--- a/llvm/test/tools/dsymutil/X86/remarks-linking-bundle.test
+++ b/llvm/test/tools/dsymutil/X86/remarks-linking-bundle.test
@@ -4,12 +4,12 @@ RUN: cat %p/../Inputs/remarks/basic.macho.remarks.x86_64 > %t/basic.macho.remark
RUN: dsymutil -oso-prepend-path=%p/../Inputs -remarks-prepend-path=%p/../Inputs %t/basic.macho.remarks.x86_64
-Check that the remark file in the bundle exists and is sane:
+Check that the remark file in the bundle exists and is sound:
RUN: llvm-bcanalyzer -dump %t/basic.macho.remarks.x86_64.dSYM/Contents/Resources/Remarks/basic.macho.remarks.x86_64 | FileCheck %s
RUN: dsymutil --linker parallel -oso-prepend-path=%p/../Inputs -remarks-prepend-path=%p/../Inputs %t/basic.macho.remarks.x86_64
-Check that the remark file in the bundle exists and is sane:
+Check that the remark file in the bundle exists and is sound:
RUN: llvm-bcanalyzer -dump %t/basic.macho.remarks.x86_64.dSYM/Contents/Resources/Remarks/basic.macho.remarks.x86_64 | FileCheck %s
Now emit it in a different format: YAML.
diff --git a/llvm/test/tools/dsymutil/X86/remarks-linking-fat-bundle.test b/llvm/test/tools/dsymutil/X86/remarks-linking-fat-bundle.test
index 79302e87a59f6..231287f429c35 100644
--- a/llvm/test/tools/dsymutil/X86/remarks-linking-fat-bundle.test
+++ b/llvm/test/tools/dsymutil/X86/remarks-linking-fat-bundle.test
@@ -6,14 +6,14 @@ RUN: cat %p/../Inputs/remarks/fat.macho.remarks.x86 > %t/fat.macho.remarks.x86
RUN: dsymutil -oso-prepend-path=%p/../Inputs -remarks-prepend-path=%p/../Inputs %t/fat.macho.remarks.x86
-Check that the remark files in the bundle exist and are all sane:
+Check that the remark files in the bundle exist and are all sound:
RUN: llvm-bcanalyzer -dump %t/fat.macho.remarks.x86.dSYM/Contents/Resources/Remarks/fat.macho.remarks.x86-x86_64h | FileCheck %s
RUN: llvm-bcanalyzer -dump %t/fat.macho.remarks.x86.dSYM/Contents/Resources/Remarks/fat.macho.remarks.x86-x86_64 | FileCheck %s
RUN: llvm-bcanalyzer -dump %t/fat.macho.remarks.x86.dSYM/Contents/Resources/Remarks/fat.macho.remarks.x86-i386 | FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-i386
RUN: dsymutil --linker parallel -oso-prepend-path=%p/../Inputs -remarks-prepend-path=%p/../Inputs %t/fat.macho.remarks.x86
-Check that the remark files in the bundle exist and are all sane:
+Check that the remark files in the bundle exist and are all sound:
RUN: llvm-bcanalyzer -dump %t/fat.macho.remarks.x86.dSYM/Contents/Resources/Remarks/fat.macho.remarks.x86-x86_64h | FileCheck %s
RUN: llvm-bcanalyzer -dump %t/fat.macho.remarks.x86.dSYM/Contents/Resources/Remarks/fat.macho.remarks.x86-x86_64 | FileCheck %s
RUN: llvm-bcanalyzer -dump %t/fat.macho.remarks.x86.dSYM/Contents/Resources/Remarks/fat.macho.remarks.x86-i386 | FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-i386
diff --git a/llvm/test/tools/llvm-dwarfdump/X86/stats-inlining-single-cu.ll b/llvm/test/tools/llvm-dwarfdump/X86/stats-inlining-single-cu.ll
index 25f81f31d18ac..2ce420f678439 100644
--- a/llvm/test/tools/llvm-dwarfdump/X86/stats-inlining-single-cu.ll
+++ b/llvm/test/tools/llvm-dwarfdump/X86/stats-inlining-single-cu.ll
@@ -1,7 +1,7 @@
; RUN: llc -O0 %s -o - -filetype=obj \
; RUN: | llvm-dwarfdump -statistics - | FileCheck %s
-; This test serves as a baseline / sanity-check for stats-inlining-multi-cu.ll
+; This test serves as a baseline / soundness-check for stats-inlining-multi-cu.ll
; The results for both tests should be identical.
; CHECK: "#functions": 4,
diff --git a/llvm/tools/dsymutil/dsymutil.cpp b/llvm/tools/dsymutil/dsymutil.cpp
index 913077eb0b06d..752e78e80f030 100644
--- a/llvm/tools/dsymutil/dsymutil.cpp
+++ b/llvm/tools/dsymutil/dsymutil.cpp
@@ -287,7 +287,7 @@ static Expected<DWARFVerify> getVerifyKind(opt::InputArgList &Args) {
}
/// Parses the command line options into the LinkOptions struct and performs
-/// some sanity checking. Returns an error in case the latter fails.
+/// some soundness checking. Returns an error in case the latter fails.
static Expected<DsymutilOptions> getOptions(opt::InputArgList &Args) {
DsymutilOptions Options;
diff --git a/llvm/tools/lli/lli.cpp b/llvm/tools/lli/lli.cpp
index 875ec1b7fe64a..768e7e41c01f2 100644
--- a/llvm/tools/lli/lli.cpp
+++ b/llvm/tools/lli/lli.cpp
@@ -640,7 +640,7 @@ int main(int argc, char **argv, char * const *envp) {
int Result = -1;
- // Sanity check use of remote-jit: LLI currently only supports use of the
+ // Soundness check use of remote-jit: LLI currently only supports use of the
// remote JIT on Unix platforms.
if (RemoteMCJIT) {
#ifndef LLVM_ON_UNIX
diff --git a/llvm/tools/llvm-exegesis/lib/SnippetGenerator.h b/llvm/tools/llvm-exegesis/lib/SnippetGenerator.h
index 770e4e8d1f42d..40ae8895de6ed 100644
--- a/llvm/tools/llvm-exegesis/lib/SnippetGenerator.h
+++ b/llvm/tools/llvm-exegesis/lib/SnippetGenerator.h
@@ -107,7 +107,7 @@ Error randomizeUnsetVariables(const LLVMState &State,
const BitVector &ForbiddenRegs,
InstructionTemplate &IT);
-// Sanity check generated instruction.
+// Soundness check generated instruction.
Error validateGeneratedInstruction(const LLVMState &State, const MCInst &Inst);
} // namespace exegesis
diff --git a/llvm/tools/llvm-profgen/PerfReader.cpp b/llvm/tools/llvm-profgen/PerfReader.cpp
index 9a805f2941753..049fe6e4ea62e 100644
--- a/llvm/tools/llvm-profgen/PerfReader.cpp
+++ b/llvm/tools/llvm-profgen/PerfReader.cpp
@@ -287,7 +287,7 @@ bool VirtualUnwinder::unwind(const PerfSample *Sample, uint64_t Repeat) {
// Capture initial state as starting point for unwinding.
UnwindState State(Sample, Binary);
- // Sanity check - making sure leaf of LBR aligns with leaf of stack sample
+ // Soundness check - making sure leaf of LBR aligns with leaf of stack sample
// Stack sample sometimes can be unreliable, so filter out bogus ones.
if (!State.validateInitialState())
return false;
diff --git a/llvm/tools/llvm-readobj/ARMWinEHPrinter.cpp b/llvm/tools/llvm-readobj/ARMWinEHPrinter.cpp
index c6e409c63ef3a..ce7433921b302 100644
--- a/llvm/tools/llvm-readobj/ARMWinEHPrinter.cpp
+++ b/llvm/tools/llvm-readobj/ARMWinEHPrinter.cpp
@@ -1090,7 +1090,7 @@ bool Decoder::dumpXDataRecord(const COFFObjectFile &COFF,
const ulittle32_t *Data =
reinterpret_cast<const ulittle32_t *>(Contents.data() + Offset);
- // Sanity check to ensure that the .xdata header is present.
+ // Soundness check to ensure that the .xdata header is present.
// A header is one or two words, followed by at least one word to describe
// the unwind codes. Applicable to both ARM and AArch64.
if (Contents.size() - Offset < 8)
diff --git a/llvm/tools/llvm-readobj/COFFDumper.cpp b/llvm/tools/llvm-readobj/COFFDumper.cpp
index 73115fbb7e55e..8a43d39acfebb 100644
--- a/llvm/tools/llvm-readobj/COFFDumper.cpp
+++ b/llvm/tools/llvm-readobj/COFFDumper.cpp
@@ -1265,7 +1265,7 @@ void COFFDumper::printCodeViewSymbolSection(StringRef SectionName,
case DebugSubsectionKind::Lines: {
// Holds a PC to file:line table. Some data to parse this subsection is
- // stored in the other subsections, so just check sanity and store the
+ // stored in the other subsections, so just check soundness and store the
// pointers for deferred processing.
if (SubSectionSize < 12) {
diff --git a/llvm/tools/llvm-readobj/ELFDumper.cpp b/llvm/tools/llvm-readobj/ELFDumper.cpp
index a440bad130f4c..6b47e0b5892d3 100644
--- a/llvm/tools/llvm-readobj/ELFDumper.cpp
+++ b/llvm/tools/llvm-readobj/ELFDumper.cpp
@@ -1905,7 +1905,7 @@ void ELFDumper<ELFT>::loadDynamicTable() {
}
// At this point we have tables found from the section header and from the
- // dynamic segment. Usually they match, but we have to do sanity checks to
+ // dynamic segment. Usually they match, but we have to do soundness checks to
// verify that.
if (FromPhdr.Addr != FromSec.Addr)
diff --git a/llvm/unittests/ADT/APFloatTest.cpp b/llvm/unittests/ADT/APFloatTest.cpp
index 141282ea254b4..536dedb4ab79b 100644
--- a/llvm/unittests/ADT/APFloatTest.cpp
+++ b/llvm/unittests/ADT/APFloatTest.cpp
@@ -5336,7 +5336,7 @@ TEST(APFloatTest, PPCDoubleDoubleMultiply) {
TEST(APFloatTest, PPCDoubleDoubleDivide) {
using DataType = std::tuple<uint64_t, uint64_t, uint64_t, uint64_t, uint64_t,
uint64_t, APFloat::roundingMode>;
- // TODO: Only a sanity check for now. Add more edge cases when the
+ // TODO: Only a soundness check for now. Add more edge cases when the
// double-double algorithm is implemented.
DataType Data[] = {
// 1 / 3 = 1/3
@@ -5434,7 +5434,7 @@ TEST(APFloatTest, PPCDoubleDoubleMod) {
}
TEST(APFloatTest, PPCDoubleDoubleFMA) {
- // Sanity check for now.
+ // Soundness check for now.
APFloat A(APFloat::PPCDoubleDouble(), "2");
A.fusedMultiplyAdd(APFloat(APFloat::PPCDoubleDouble(), "3"),
APFloat(APFloat::PPCDoubleDouble(), "4"),
diff --git a/llvm/unittests/DebugInfo/CodeView/TypeHashingTest.cpp b/llvm/unittests/DebugInfo/CodeView/TypeHashingTest.cpp
index bf09cff090caa..a3e361fa800f9 100644
--- a/llvm/unittests/DebugInfo/CodeView/TypeHashingTest.cpp
+++ b/llvm/unittests/DebugInfo/CodeView/TypeHashingTest.cpp
@@ -142,7 +142,7 @@ TEST(TypeHashingTest, ContentHash) {
ASSERT_EQ(0x1004U, Args[1].getIndex());
ASSERT_EQ(0x1005U, Proc[1].getIndex());
- // Sanity check to make sure all same-ordering hashes are different
+ // Soundness check to make sure all same-ordering hashes are different
// from each other.
verifyHashUniqueness(Hashes1);
verifyHashUniqueness(Hashes2);
diff --git a/llvm/unittests/DebugInfo/DWARF/DWARFFormValueTest.cpp b/llvm/unittests/DebugInfo/DWARF/DWARFFormValueTest.cpp
index 29d4db44e7cf9..a2b01a0fe1faf 100644
--- a/llvm/unittests/DebugInfo/DWARF/DWARFFormValueTest.cpp
+++ b/llvm/unittests/DebugInfo/DWARF/DWARFFormValueTest.cpp
@@ -96,7 +96,7 @@ TEST(DWARFFormValue, SignedConstantForms) {
EXPECT_EQ(*UMax.getAsSignedConstant(), LLONG_MAX);
EXPECT_EQ(TooBig.getAsSignedConstant().has_value(), false);
- // Sanity check some other forms.
+ // Soundness check some other forms.
auto Data1 = createDataXFormValue<uint8_t>(DW_FORM_data1, 120);
auto Data2 = createDataXFormValue<uint16_t>(DW_FORM_data2, 32000);
auto Data4 = createDataXFormValue<uint32_t>(DW_FORM_data4, 2000000000);
diff --git a/llvm/unittests/FuzzMutate/OperationsTest.cpp b/llvm/unittests/FuzzMutate/OperationsTest.cpp
index 666931c9f40f4..02b1613a982db 100644
--- a/llvm/unittests/FuzzMutate/OperationsTest.cpp
+++ b/llvm/unittests/FuzzMutate/OperationsTest.cpp
@@ -416,7 +416,7 @@ TEST(OperationsTest, ExtractAndInsertValue) {
auto EVOp = fuzzerop::extractValueDescriptor(1);
auto IVOp = fuzzerop::insertValueDescriptor(1);
- // Sanity check the source preds.
+ // Soundness check the source preds.
Constant *SVal = PoisonValue::get(StructTy);
Constant *OVal = PoisonValue::get(OpaqueTy);
Constant *AVal = PoisonValue::get(ArrayTy);
diff --git a/llvm/unittests/IR/MetadataTest.cpp b/llvm/unittests/IR/MetadataTest.cpp
index 7425703606381..96986028ec24e 100644
--- a/llvm/unittests/IR/MetadataTest.cpp
+++ b/llvm/unittests/IR/MetadataTest.cpp
@@ -689,7 +689,7 @@ TEST_F(MDNodeTest, handleChangedOperandRecursion) {
N2->replaceOperandWith(1, nullptr);
// If all has gone well, N2 and N3 will have been RAUW'ed and deleted from
- // under us. Just check that the other nodes are sane.
+ // under us. Just check that the other nodes are sound.
//
// !1 = !{!4, null}
// !4 = !{!1}
diff --git a/llvm/unittests/ProfileData/InstrProfTest.cpp b/llvm/unittests/ProfileData/InstrProfTest.cpp
index dd17844aef8a6..2782b721057b3 100644
--- a/llvm/unittests/ProfileData/InstrProfTest.cpp
+++ b/llvm/unittests/ProfileData/InstrProfTest.cpp
@@ -1321,7 +1321,7 @@ TEST(ValueProfileReadWriteTest, value_prof_data_read_write) {
InstrProfRecord Record({1ULL << 31, 2});
VPData->deserializeTo(Record, nullptr);
- // Now read data from Record and sanity check the data
+ // Now read data from Record and soundness check the data
ASSERT_EQ(6U, Record.getNumValueSites(IPVK_IndirectCallTarget));
auto Cmp = [](const InstrProfValueData &VD1, const InstrProfValueData &VD2) {
@@ -1468,7 +1468,7 @@ TEST(ValueProfileReadWriteTest, symtab_mapping) {
VPData->deserializeTo(Record, &Symtab);
- // Now read data from Record and sanity check the data
+ // Now read data from Record and soundness check the data
ASSERT_EQ(Record.getNumValueSites(IPVK_IndirectCallTarget), 6U);
// Look up the value correpsonding to the middle of a vtable in symtab and
@@ -1499,7 +1499,7 @@ TEST(ValueProfileReadWriteTest, symtab_mapping) {
// callee5 does not have a mapped value -- default to 0.
ASSERT_EQ(VD_0[4].Value, 0ULL);
- // Sanity check the vtable value data
+ // Soundness check the vtable value data
ASSERT_EQ(Record.getNumValueSites(IPVK_VTableTarget), 4U);
{
diff --git a/llvm/unittests/Support/raw_ostream_test.cpp b/llvm/unittests/Support/raw_ostream_test.cpp
index fbeff37d26a35..f95dd636f94b4 100644
--- a/llvm/unittests/Support/raw_ostream_test.cpp
+++ b/llvm/unittests/Support/raw_ostream_test.cpp
@@ -440,7 +440,7 @@ TEST(raw_ostreamTest, flush_tied_to_stream_on_write) {
TiedStream.SetUnbuffered();
TiedStream.tie(&TiedTo);
- // Sanity check that the stream hasn't already been flushed.
+ // Soundness check that the stream hasn't already been flushed.
EXPECT_EQ("", TiedToBuffer);
// Empty string doesn't cause a flush of TiedTo.
diff --git a/llvm/unittests/Support/xxhashTest.cpp b/llvm/unittests/Support/xxhashTest.cpp
index 84308ce130e72..adf4dde210706 100644
--- a/llvm/unittests/Support/xxhashTest.cpp
+++ b/llvm/unittests/Support/xxhashTest.cpp
@@ -18,7 +18,7 @@ using namespace llvm;
/*
* Fills a test buffer with pseudorandom data.
*
- * This is used in the sanity check - its values must not be changed.
+ * This is used in the soundness check - its values must not be changed.
*/
static void fillTestBuffer(uint8_t *buffer, size_t len) {
uint64_t byteGen = PRIME32;
diff --git a/llvm/unittests/Transforms/Utils/FunctionComparatorTest.cpp b/llvm/unittests/Transforms/Utils/FunctionComparatorTest.cpp
index cd2b4e8046b2e..418411e662aff 100644
--- a/llvm/unittests/Transforms/Utils/FunctionComparatorTest.cpp
+++ b/llvm/unittests/Transforms/Utils/FunctionComparatorTest.cpp
@@ -104,7 +104,7 @@ class TestComparator : public FunctionComparator {
}
};
-/// A sanity check for the FunctionComparator API.
+/// A soundness check for the FunctionComparator API.
TEST(FunctionComparatorTest, TestAPI) {
LLVMContext C;
Module M("test", C);
diff --git a/llvm/utils/TableGen/Common/CodeGenDAGPatterns.cpp b/llvm/utils/TableGen/Common/CodeGenDAGPatterns.cpp
index c3b406a545072..001352efb4c49 100644
--- a/llvm/utils/TableGen/Common/CodeGenDAGPatterns.cpp
+++ b/llvm/utils/TableGen/Common/CodeGenDAGPatterns.cpp
@@ -2604,7 +2604,8 @@ bool TreePatternNode::ApplyTypeConstraints(TreePattern &TP, bool NotRegisters) {
if (getOperator()->isSubClassOf("SDNode")) {
const SDNodeInfo &NI = CDP.getSDNodeInfo(getOperator());
- // Check that the number of operands is sane. Negative operands -> varargs.
+ // Check that the number of operands is sound.
+ // Negative operands -> varargs.
if (NI.getNumOperands() >= 0 &&
getNumChildren() != (unsigned)NI.getNumOperands()) {
TP.error(getOperator()->getName() + " node requires exactly " +
@@ -2821,9 +2822,9 @@ static bool OnlyOnRHSOfCommutative(const TreePatternNode &N) {
/// canPatternMatch - If it is impossible for this pattern to match on this
/// target, fill in Reason and return false. Otherwise, return true. This is
-/// used as a sanity check for .td files (to prevent people from writing stuff
-/// that can never possibly work), and to prevent the pattern permuter from
-/// generating stuff that is useless.
+/// used as a soundness check for .td files (to prevent people from writing
+/// stuff that can never possibly work), and to prevent the pattern permuter
+/// from generating stuff that is useless.
bool TreePatternNode::canPatternMatch(std::string &Reason,
const CodeGenDAGPatterns &CDP) const {
if (isLeaf())
@@ -4081,7 +4082,7 @@ static void FindNames(TreePatternNode &P,
void CodeGenDAGPatterns::AddPatternToMatch(TreePattern *Pattern,
PatternToMatch &&PTM) {
- // Do some sanity checking on the pattern we're about to match.
+ // Do some soundness checking on the pattern we're about to match.
std::string Reason;
if (!PTM.getSrcPattern().canPatternMatch(Reason, *this)) {
PrintWarning(Pattern->getRecord()->getLoc(),
diff --git a/llvm/utils/TableGen/GlobalISelCombinerEmitter.cpp b/llvm/utils/TableGen/GlobalISelCombinerEmitter.cpp
index f62b26587cf4b..5b5920fa2a2f7 100644
--- a/llvm/utils/TableGen/GlobalISelCombinerEmitter.cpp
+++ b/llvm/utils/TableGen/GlobalISelCombinerEmitter.cpp
@@ -952,7 +952,7 @@ void CombineRuleBuilder::verify() const {
", Pat name: " + Pat->getName());
}
- // Sanity check: the map should point to the same data as the Pattern.
+ // Soundness check: the map should point to the same data as the Pattern.
// Both strings are allocated in the pool using insertStrRef.
if (Name.data() != Pat->getName().data()) {
dbgs() << "Map StringRef: '" << Name << "' @ "
diff --git a/llvm/utils/abtest.py b/llvm/utils/abtest.py
index a799c8764b290..62dfededeec94 100755
--- a/llvm/utils/abtest.py
+++ b/llvm/utils/abtest.py
@@ -398,7 +398,7 @@ def main():
info("%d bisection choices" % len(choices))
- # "Checking whether build environment is sane ..."
+ # "Checking whether build environment is sound ..."
if not config.insane:
if not os.access(LINKTEST, os.X_OK):
error("Expect '%s' to be present and executable" % (LINKTEST,))
@@ -418,7 +418,7 @@ def main():
if name not in known_good:
stderr.write("%s\n" % name)
else:
- # This shouldn't happen when the sanity check works...
+ # This shouldn't happen when the soundness check works...
# Maybe link_test isn't deterministic?
stderr.write("Could not identify failing parts?!?")
diff --git a/llvm/utils/bugpoint/RemoteRunSafely.sh b/llvm/utils/bugpoint/RemoteRunSafely.sh
index 302c0db4e3fac..4d8bcafbd98ee 100644
--- a/llvm/utils/bugpoint/RemoteRunSafely.sh
+++ b/llvm/utils/bugpoint/RemoteRunSafely.sh
@@ -77,7 +77,7 @@ shift 1
#DEBUG: echo 'WORKING_DIR='$WORKING_DIR
#DEBUG: echo 'ARGS='$*
-# Sanity check
+# Soundness check
if [ "$RHOST" = "" -o "$PROGRAM" = "" ]; then
printUsageAndExit
fi
diff --git a/llvm/utils/lit/tests/usage.py b/llvm/utils/lit/tests/usage.py
index 77b3573c53750..afb219d9b8d05 100644
--- a/llvm/utils/lit/tests/usage.py
+++ b/llvm/utils/lit/tests/usage.py
@@ -1,4 +1,4 @@
-# Basic sanity check for `--help` and `--version` options.
+# Basic soundness check for `--help` and `--version` options.
#
# RUN: %{lit} --help | FileCheck %s --check-prefix=HELP
# RUN: %{lit} --version 2>&1 | FileCheck %s --check-prefix=VERSION
diff --git a/mlir/examples/toy/Ch1/include/toy/Parser.h b/mlir/examples/toy/Ch1/include/toy/Parser.h
index 1f20616ac6b4e..028e770d188a0 100644
--- a/mlir/examples/toy/Ch1/include/toy/Parser.h
+++ b/mlir/examples/toy/Ch1/include/toy/Parser.h
@@ -139,7 +139,7 @@ class Parser {
auto firstDims = firstLiteral->getDims();
dims.insert(dims.end(), firstDims.begin(), firstDims.end());
- // Sanity check that shape is uniform across all elements of the list.
+ // Soundness check that shape is uniform across all elements of the list.
for (auto &expr : values) {
auto *exprLiteral = llvm::cast<LiteralExprAST>(expr.get());
if (!exprLiteral)
diff --git a/mlir/examples/toy/Ch2/include/toy/Parser.h b/mlir/examples/toy/Ch2/include/toy/Parser.h
index 1f20616ac6b4e..028e770d188a0 100644
--- a/mlir/examples/toy/Ch2/include/toy/Parser.h
+++ b/mlir/examples/toy/Ch2/include/toy/Parser.h
@@ -139,7 +139,7 @@ class Parser {
auto firstDims = firstLiteral->getDims();
dims.insert(dims.end(), firstDims.begin(), firstDims.end());
- // Sanity check that shape is uniform across all elements of the list.
+ // Soundness check that shape is uniform across all elements of the list.
for (auto &expr : values) {
auto *exprLiteral = llvm::cast<LiteralExprAST>(expr.get());
if (!exprLiteral)
diff --git a/mlir/examples/toy/Ch3/include/toy/Parser.h b/mlir/examples/toy/Ch3/include/toy/Parser.h
index 1f20616ac6b4e..028e770d188a0 100644
--- a/mlir/examples/toy/Ch3/include/toy/Parser.h
+++ b/mlir/examples/toy/Ch3/include/toy/Parser.h
@@ -139,7 +139,7 @@ class Parser {
auto firstDims = firstLiteral->getDims();
dims.insert(dims.end(), firstDims.begin(), firstDims.end());
- // Sanity check that shape is uniform across all elements of the list.
+ // Soundness check that shape is uniform across all elements of the list.
for (auto &expr : values) {
auto *exprLiteral = llvm::cast<LiteralExprAST>(expr.get());
if (!exprLiteral)
diff --git a/mlir/examples/toy/Ch4/include/toy/Parser.h b/mlir/examples/toy/Ch4/include/toy/Parser.h
index 1f20616ac6b4e..028e770d188a0 100644
--- a/mlir/examples/toy/Ch4/include/toy/Parser.h
+++ b/mlir/examples/toy/Ch4/include/toy/Parser.h
@@ -139,7 +139,7 @@ class Parser {
auto firstDims = firstLiteral->getDims();
dims.insert(dims.end(), firstDims.begin(), firstDims.end());
- // Sanity check that shape is uniform across all elements of the list.
+ // Soundness check that shape is uniform across all elements of the list.
for (auto &expr : values) {
auto *exprLiteral = llvm::cast<LiteralExprAST>(expr.get());
if (!exprLiteral)
diff --git a/mlir/examples/toy/Ch5/include/toy/Parser.h b/mlir/examples/toy/Ch5/include/toy/Parser.h
index 1f20616ac6b4e..028e770d188a0 100644
--- a/mlir/examples/toy/Ch5/include/toy/Parser.h
+++ b/mlir/examples/toy/Ch5/include/toy/Parser.h
@@ -139,7 +139,7 @@ class Parser {
auto firstDims = firstLiteral->getDims();
dims.insert(dims.end(), firstDims.begin(), firstDims.end());
- // Sanity check that shape is uniform across all elements of the list.
+ // Soundness check that shape is uniform across all elements of the list.
for (auto &expr : values) {
auto *exprLiteral = llvm::cast<LiteralExprAST>(expr.get());
if (!exprLiteral)
diff --git a/mlir/examples/toy/Ch6/include/toy/Parser.h b/mlir/examples/toy/Ch6/include/toy/Parser.h
index 1f20616ac6b4e..028e770d188a0 100644
--- a/mlir/examples/toy/Ch6/include/toy/Parser.h
+++ b/mlir/examples/toy/Ch6/include/toy/Parser.h
@@ -139,7 +139,7 @@ class Parser {
auto firstDims = firstLiteral->getDims();
dims.insert(dims.end(), firstDims.begin(), firstDims.end());
- // Sanity check that shape is uniform across all elements of the list.
+ // Soundness check that shape is uniform across all elements of the list.
for (auto &expr : values) {
auto *exprLiteral = llvm::cast<LiteralExprAST>(expr.get());
if (!exprLiteral)
diff --git a/mlir/examples/toy/Ch7/include/toy/Parser.h b/mlir/examples/toy/Ch7/include/toy/Parser.h
index 7ba7b8f8d8e79..39bc2d4a9fd6b 100644
--- a/mlir/examples/toy/Ch7/include/toy/Parser.h
+++ b/mlir/examples/toy/Ch7/include/toy/Parser.h
@@ -154,7 +154,7 @@ class Parser {
auto firstDims = firstLiteral->getDims();
dims.insert(dims.end(), firstDims.begin(), firstDims.end());
- // Sanity check that shape is uniform across all elements of the list.
+ // Soundness check that shape is uniform across all elements of the list.
for (auto &expr : values) {
auto *exprLiteral = llvm::cast<LiteralExprAST>(expr.get());
if (!exprLiteral)
diff --git a/mlir/include/mlir/Dialect/SparseTensor/IR/SparseTensorOps.td b/mlir/include/mlir/Dialect/SparseTensor/IR/SparseTensorOps.td
index a61d90a0c39b1..ff383cbaaf348 100644
--- a/mlir/include/mlir/Dialect/SparseTensor/IR/SparseTensorOps.td
+++ b/mlir/include/mlir/Dialect/SparseTensor/IR/SparseTensorOps.td
@@ -75,7 +75,7 @@ def SparseTensor_AssembleOp : SparseTensor_Op<"assemble", [Pure]> {
This operation can be used to assemble a sparse tensor from an
external source; e.g., by passing numpy arrays from Python. It
is the user's responsibility to provide input that can be correctly
- interpreted by the sparsifier, which does not perform any sanity
+ interpreted by the sparsifier, which does not perform any soundness
test to verify data integrity.
Example:
@@ -115,7 +115,7 @@ def SparseTensor_DisassembleOp : SparseTensor_Op<"disassemble", [Pure, SameVaria
back to Python. It is the user's responsibility to allocate large enough
buffers of the appropriate types to hold the sparse tensor contents.
The sparsifier simply copies all fields of the sparse tensor into the
- user-supplied buffers without any sanity test to verify data integrity.
+ user-supplied buffers without any soundness test to verify data integrity.
Example:
diff --git a/mlir/include/mlir/IR/Builders.h b/mlir/include/mlir/IR/Builders.h
index 9d8d81a839fcb..632bdf75a62eb 100644
--- a/mlir/include/mlir/IR/Builders.h
+++ b/mlir/include/mlir/IR/Builders.h
@@ -483,7 +483,7 @@ class OpBuilder : public Builder {
MutableArrayRef<std::unique_ptr<Region>> regions = {});
private:
- /// Helper for sanity checking preconditions for create* methods below.
+ /// Helper for soundness checking preconditions for create* methods below.
template <typename OpT>
RegisteredOperationName getCheckRegisteredInfo(MLIRContext *ctx) {
std::optional<RegisteredOperationName> opName =
diff --git a/mlir/lib/Conversion/MemRefToLLVM/MemRefToLLVM.cpp b/mlir/lib/Conversion/MemRefToLLVM/MemRefToLLVM.cpp
index 262e0e7a30c63..636be96fbd72a 100644
--- a/mlir/lib/Conversion/MemRefToLLVM/MemRefToLLVM.cpp
+++ b/mlir/lib/Conversion/MemRefToLLVM/MemRefToLLVM.cpp
@@ -985,8 +985,8 @@ struct MemRefCastOpLowering : public ConvertOpToLLVMPattern<memref::CastOp> {
// memref::CastOp reduce to bitcast in the ranked MemRef case and can be
// used for type erasure. For now they must preserve underlying element type
// and require source and result type to have the same rank. Therefore,
- // perform a sanity check that the underlying structs are the same. Once op
- // semantics are relaxed we can revisit.
+ // perform a soundness check that the underlying structs are the same. Once
+ // op semantics are relaxed we can revisit.
if (isa<MemRefType>(srcType) && isa<MemRefType>(dstType))
if (typeConverter->convertType(srcType) !=
typeConverter->convertType(dstType))
diff --git a/mlir/lib/Dialect/Affine/Analysis/Utils.cpp b/mlir/lib/Dialect/Affine/Analysis/Utils.cpp
index 99ea20bf13b49..402a28775fb8c 100644
--- a/mlir/lib/Dialect/Affine/Analysis/Utils.cpp
+++ b/mlir/lib/Dialect/Affine/Analysis/Utils.cpp
@@ -1918,7 +1918,7 @@ AffineForOp mlir::affine::insertBackwardComputationSlice(
SmallVector<AffineForOp, 4> sliceSurroundingLoops;
getAffineForIVs(*sliceInst, &sliceSurroundingLoops);
- // Sanity check.
+ // Soundness check.
unsigned sliceSurroundingLoopsSize = sliceSurroundingLoops.size();
(void)sliceSurroundingLoopsSize;
assert(dstLoopDepth + numSrcLoopIVs >= sliceSurroundingLoopsSize);
diff --git a/mlir/lib/Dialect/Affine/Transforms/SuperVectorize.cpp b/mlir/lib/Dialect/Affine/Transforms/SuperVectorize.cpp
index 50a0f3dc74781..a611c3f77292b 100644
--- a/mlir/lib/Dialect/Affine/Transforms/SuperVectorize.cpp
+++ b/mlir/lib/Dialect/Affine/Transforms/SuperVectorize.cpp
@@ -1537,7 +1537,7 @@ static Operation *vectorizeAffineYieldOp(AffineYieldOp yieldOp,
// do one-off logic here; ideally it would be TableGen'd.
static Operation *vectorizeOneOperation(Operation *op,
VectorizationState &state) {
- // Sanity checks.
+ // Soundness checks.
assert(!isa<vector::TransferReadOp>(op) &&
"vector.transfer_read cannot be further vectorized");
assert(!isa<vector::TransferWriteOp>(op) &&
diff --git a/mlir/lib/Dialect/GPU/TransformOps/GPUTransformOps.cpp b/mlir/lib/Dialect/GPU/TransformOps/GPUTransformOps.cpp
index c766539f9d91a..ee2fad002e397 100644
--- a/mlir/lib/Dialect/GPU/TransformOps/GPUTransformOps.cpp
+++ b/mlir/lib/Dialect/GPU/TransformOps/GPUTransformOps.cpp
@@ -804,7 +804,7 @@ getThreadIdBuilder(std::optional<TransformOpInterface> transformOp,
forallOp.getDeviceMappingAttrs().front();
bool useLinearMapping = mappingAttr.isLinearMapping();
- // Sanity checks that may result in runtime verification errors.
+ // Soundness checks that may result in runtime verification errors.
auto numParallelIterations =
getConstantIntValues((forallOp.getMixedUpperBound()));
if (!forallOp.isNormalized() || !numParallelIterations.has_value()) {
diff --git a/mlir/lib/Dialect/LLVMIR/IR/LLVMMemorySlot.cpp b/mlir/lib/Dialect/LLVMIR/IR/LLVMMemorySlot.cpp
index ef3802758cc23..3f6c13f4e91ed 100644
--- a/mlir/lib/Dialect/LLVMIR/IR/LLVMMemorySlot.cpp
+++ b/mlir/lib/Dialect/LLVMIR/IR/LLVMMemorySlot.cpp
@@ -160,7 +160,7 @@ static bool areConversionCompatible(const DataLayout &layout, Type targetType,
uint64_t targetSize = layout.getTypeSize(targetType);
uint64_t srcSize = layout.getTypeSize(srcType);
- // Pointer casts will only be sane when the bitsize of both pointer types is
+ // Pointer casts will only be sound when the bitsize of both pointer types is
// the same.
if (isa<LLVM::LLVMPointerType>(targetType) &&
isa<LLVM::LLVMPointerType>(srcType))
diff --git a/mlir/lib/Dialect/Linalg/TransformOps/LinalgTransformOps.cpp b/mlir/lib/Dialect/Linalg/TransformOps/LinalgTransformOps.cpp
index f0c1f4485b054..9b119b84e78fb 100644
--- a/mlir/lib/Dialect/Linalg/TransformOps/LinalgTransformOps.cpp
+++ b/mlir/lib/Dialect/Linalg/TransformOps/LinalgTransformOps.cpp
@@ -1805,7 +1805,7 @@ transform::PackTransposeOp::apply(transform::TransformRewriter &rewriter,
return DiagnosedSilenceableFailure::success();
}
- // Step 2. Bunch of runtime sanity check and error messages.
+ // Step 2. Bunch of runtime soundness check and error messages.
// Step 2.1. Fail on multi-op handles.
if (!llvm::hasSingleElement(packOrUnpackOps) ||
!llvm::hasSingleElement(linalgOps)) {
diff --git a/mlir/lib/Dialect/Linalg/Transforms/ElementwiseOpFusion.cpp b/mlir/lib/Dialect/Linalg/Transforms/ElementwiseOpFusion.cpp
index 3bd763ea00cd7..25853339519dc 100644
--- a/mlir/lib/Dialect/Linalg/Transforms/ElementwiseOpFusion.cpp
+++ b/mlir/lib/Dialect/Linalg/Transforms/ElementwiseOpFusion.cpp
@@ -298,8 +298,8 @@ static void generateFusedElementwiseOpRegion(
Value replacement =
mapper.lookupOrDefault(producerYieldOp.getOperand(producerResultNumber));
- // Sanity checks, if replacement is not already in the mapper then it must be
- // produced outside.
+ // Soundness checks, if replacement is not already in the mapper then it must
+ // be produced outside.
if (replacement == producerYieldOp.getOperand(producerResultNumber)) {
if (auto bb = dyn_cast<BlockArgument>(replacement))
assert(bb.getOwner() != &producerBlock &&
@@ -330,7 +330,7 @@ static void generateFusedElementwiseOpRegion(
fusedYieldValues.push_back(mapper.lookupOrDefault(consumerYieldVal));
YieldOp::create(rewriter, fusedOp.getLoc(), fusedYieldValues);
- // Sanity checks.
+ // Soundness checks.
assert(fusedBlock->getNumArguments() == fusedOp.getNumOperands() &&
"Ill-formed GenericOp region");
}
diff --git a/mlir/lib/Dialect/Linalg/Transforms/Transforms.cpp b/mlir/lib/Dialect/Linalg/Transforms/Transforms.cpp
index e9a8b253eea35..078d37393bf31 100644
--- a/mlir/lib/Dialect/Linalg/Transforms/Transforms.cpp
+++ b/mlir/lib/Dialect/Linalg/Transforms/Transforms.cpp
@@ -611,10 +611,10 @@ static RankedTensorType permuteShape(RankedTensorType tensorType,
static LinalgOp transposeOneLinalgOperandAndReplace(
RewriterBase &rewriter, LinalgOp linalgOp, OpOperand &opOperand,
ArrayRef<int64_t> permutation, Value transposedValue) {
- // Sanity check the operand.
+ // Soundness check the operand.
assert(linalgOp == opOperand.getOwner() && "linalg op must own the operand");
- // Sanity check of the expected transposed tensor type.
+ // Soundness check of the expected transposed tensor type.
auto tensorType = permuteShape(
cast<RankedTensorType>(opOperand.get().getType()), permutation);
(void)tensorType;
diff --git a/mlir/lib/Dialect/Linalg/Transforms/Vectorization.cpp b/mlir/lib/Dialect/Linalg/Transforms/Vectorization.cpp
index 406f05c1b08ef..48d9e066a30e8 100644
--- a/mlir/lib/Dialect/Linalg/Transforms/Vectorization.cpp
+++ b/mlir/lib/Dialect/Linalg/Transforms/Vectorization.cpp
@@ -2081,7 +2081,7 @@ vectorizeDynamicLinalgOpPrecondition(linalg::LinalgOp op,
/// (1) If the input-vector-sizes are empty, then the vector sizes will be
/// infered. This is only possible when all shapes are static.
/// (2) If the input-vector-sizes are non-empty (i.e. user provided), then
-/// carry out basic sanity-checking.
+/// carry out basic soundness-checking.
static LogicalResult
vectorizeUnPackOpPrecondition(linalg::UnPackOp unpackOp,
ArrayRef<int64_t> inputVectorSizes) {
diff --git a/mlir/lib/Dialect/Tosa/IR/TosaCanonicalizations.cpp b/mlir/lib/Dialect/Tosa/IR/TosaCanonicalizations.cpp
index 8d636460c667e..8162f8f8e1413 100644
--- a/mlir/lib/Dialect/Tosa/IR/TosaCanonicalizations.cpp
+++ b/mlir/lib/Dialect/Tosa/IR/TosaCanonicalizations.cpp
@@ -178,7 +178,7 @@ struct FoldPadToTensorOp : public OpRewritePattern<OpTy> {
return rewriter.notifyMatchFailure(tensorOp,
"Producer must be a tosa::PadOp.");
- // Validate that tensor operation has sane padding
+ // Validate that tensor operation has sound padding
const std::vector<int64_t> &tensorOpPad = tensorOp.getPad().vec();
if (tensorOpPad.size() != 4) // pad_top, pad_bottom, pad_left, pad_right
return rewriter.notifyMatchFailure(
diff --git a/mlir/lib/Dialect/Utils/ReshapeOpsUtils.cpp b/mlir/lib/Dialect/Utils/ReshapeOpsUtils.cpp
index 7b2734d8c22fc..8600de37f408e 100644
--- a/mlir/lib/Dialect/Utils/ReshapeOpsUtils.cpp
+++ b/mlir/lib/Dialect/Utils/ReshapeOpsUtils.cpp
@@ -226,7 +226,7 @@ findReassociationRangesForCollapse(ArrayRef<int64_t> sourceShape,
sourceShape, sourceDimIdx, targetSize, shouldMatchGreedily);
}
- // Run sanity checks on the returned index range.
+ // Run soundness checks on the returned index range.
if (failed(sourceRange) || failed(sourceRange->verify()) ||
!sourceRange->isInRange(sourceShapeAsRange))
return failure();
diff --git a/mlir/lib/Dialect/Vector/Utils/VectorUtils.cpp b/mlir/lib/Dialect/Vector/Utils/VectorUtils.cpp
index 841e1384e03b3..b41acfa728df7 100644
--- a/mlir/lib/Dialect/Vector/Utils/VectorUtils.cpp
+++ b/mlir/lib/Dialect/Vector/Utils/VectorUtils.cpp
@@ -239,7 +239,7 @@ bool matcher::operatesOnSuperVectorsOf(Operation &op,
auto ratio =
computeShapeRatio(superVectorType.getShape(), subVectorType.getShape());
- // Sanity check.
+ // Soundness check.
assert((ratio || !mustDivide) &&
"vector.transfer operation in which super-vector size is not an"
" integer multiple of sub-vector size");
diff --git a/mlir/lib/Target/LLVMIR/Dialect/OpenMP/OpenMPToLLVMIRTranslation.cpp b/mlir/lib/Target/LLVMIR/Dialect/OpenMP/OpenMPToLLVMIRTranslation.cpp
index a7046e304dfeb..5f6470c742bbd 100644
--- a/mlir/lib/Target/LLVMIR/Dialect/OpenMP/OpenMPToLLVMIRTranslation.cpp
+++ b/mlir/lib/Target/LLVMIR/Dialect/OpenMP/OpenMPToLLVMIRTranslation.cpp
@@ -5536,7 +5536,7 @@ convertOmpTarget(Operation &opInst, llvm::IRBuilderBase &builder,
// The MapInfoOp defining the map var isn't really needed later.
// So, we don't store it in any datastructure. Instead, we just
- // do some sanity checks on it right now.
+ // do some soundness checks on it right now.
auto mapInfoOp = mappedValue.getDefiningOp<omp::MapInfoOp>();
[[maybe_unused]] Type varType = mapInfoOp.getVarType();
@@ -5547,7 +5547,7 @@ convertOmpTarget(Operation &opInst, llvm::IRBuilderBase &builder,
varType == privVar.getType() &&
"Type of private var doesn't match the type of the mapped value");
- // Ok, only 1 sanity check for now.
+ // Ok, only 1 soundness check for now.
// Record the block argument corresponding to this mapvar.
mappedPrivateVars.insert(
{privVar,
diff --git a/mlir/test/CAPI/ir.c b/mlir/test/CAPI/ir.c
index c2caae4e795f3..e7424763928be 100644
--- a/mlir/test/CAPI/ir.c
+++ b/mlir/test/CAPI/ir.c
@@ -421,7 +421,7 @@ static void printFirstOfEach(MlirContext ctx, MlirOperation operation) {
fprintf(stderr, "\n");
// CHECK: Get attr "value": 0 : index
- // Get a non-existing attribute and assert that it is null (sanity).
+ // Get a non-existing attribute and assert that it is null (soundness).
fprintf(stderr, "does_not_exist is null: %d\n",
mlirAttributeIsNull(mlirOperationGetDiscardableAttributeByName(
operation, mlirStringRefCreateFromCString("does_not_exist"))));
diff --git a/mlir/test/Dialect/Affine/memref-dependence-check.mlir b/mlir/test/Dialect/Affine/memref-dependence-check.mlir
index f272277cc7904..1948d46c4d95e 100644
--- a/mlir/test/Dialect/Affine/memref-dependence-check.mlir
+++ b/mlir/test/Dialect/Affine/memref-dependence-check.mlir
@@ -687,7 +687,7 @@ func.func @loop_nest_depth() {
}
// -----
-// Test case to exercise sanity when flattening multiple expressions involving
+// Test case to exercise soundness when flattening multiple expressions involving
// mod/div's successively.
// CHECK-LABEL: func @mod_div_3d() {
func.func @mod_div_3d() {
diff --git a/mlir/test/Dialect/GPU/value-bounds-op-interface-impl.mlir b/mlir/test/Dialect/GPU/value-bounds-op-interface-impl.mlir
index 6facf1e22aab9..6905226d776fd 100644
--- a/mlir/test/Dialect/GPU/value-bounds-op-interface-impl.mlir
+++ b/mlir/test/Dialect/GPU/value-bounds-op-interface-impl.mlir
@@ -15,7 +15,7 @@ func.func @launch_func(%arg0 : index) {
gpu.launch blocks(%block_id_x, %block_id_y, %block_id_z) in (%grid_dim_x = %arg0, %grid_dim_y = %c4, %grid_dim_z = %c2)
threads(%thread_id_x, %thread_id_y, %thread_id_z) in (%block_dim_x = %c64, %block_dim_y = %c4, %block_dim_z = %c2) {
- // Sanity checks:
+ // Soundness checks:
// expected-error @below{{unknown}}
"test.compare" (%thread_id_x, %c1) {cmp = "EQ"} : (index, index) -> ()
// expected-remark @below{{false}}
diff --git a/mlir/test/Integration/Dialect/Async/CPU/microbench-linalg-async-parallel-for.mlir b/mlir/test/Integration/Dialect/Async/CPU/microbench-linalg-async-parallel-for.mlir
index 1561e6853ae70..8e02e3100320f 100644
--- a/mlir/test/Integration/Dialect/Async/CPU/microbench-linalg-async-parallel-for.mlir
+++ b/mlir/test/Integration/Dialect/Async/CPU/microbench-linalg-async-parallel-for.mlir
@@ -65,7 +65,7 @@ func.func @entry() {
%cN = arith.constant 50 : index
//
- // Sanity check for the function under test.
+ // Soundness check for the function under test.
//
%LHS10 = memref.alloc() {alignment = 64} : memref<1x10xf32>
diff --git a/mlir/test/Integration/Dialect/Async/CPU/microbench-scf-async-parallel-for.mlir b/mlir/test/Integration/Dialect/Async/CPU/microbench-scf-async-parallel-for.mlir
index 4543dca2207c8..c1b6fc2219e75 100644
--- a/mlir/test/Integration/Dialect/Async/CPU/microbench-scf-async-parallel-for.mlir
+++ b/mlir/test/Integration/Dialect/Async/CPU/microbench-scf-async-parallel-for.mlir
@@ -89,7 +89,7 @@ func.func @entry() {
%cN = arith.constant 50 : index
//
- // Sanity check for the function under test.
+ // Soundness check for the function under test.
//
%LHS10 = memref.alloc() {alignment = 64} : memref<1x10xf32>
diff --git a/mlir/test/Integration/Dialect/SparseTensor/CPU/sparse_matmul.mlir b/mlir/test/Integration/Dialect/SparseTensor/CPU/sparse_matmul.mlir
index 357b9af854d3a..9029614c2a962 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/CPU/sparse_matmul.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/CPU/sparse_matmul.mlir
@@ -141,7 +141,7 @@ module {
%b4 = sparse_tensor.convert %sb : tensor<8x4xf64> to tensor<8x4xf64, #DCSR>
//
- // Sanity check before going into the computations.
+ // Soundness check before going into the computations.
//
// CHECK: ---- Sparse Tensor ----
// CHECK-NEXT: nse = 32
diff --git a/mlir/test/Integration/Dialect/SparseTensor/CPU/sparse_tensor_ops.mlir b/mlir/test/Integration/Dialect/SparseTensor/CPU/sparse_tensor_ops.mlir
index 2b65cf5538b8c..a3d596b873f0e 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/CPU/sparse_tensor_ops.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/CPU/sparse_tensor_ops.mlir
@@ -92,7 +92,7 @@ module {
%0 = call @tensor_scale(%st) : (tensor<?x?x?xf64, #ST1>) -> tensor<?x?x?xf64, #ST2>
//
- // Sanity check on stored values.
+ // Soundness check on stored values.
//
// CHECK: ---- Sparse Tensor ----
// CHECK-NEXT: nse = 5
diff --git a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sm80-lt/sparse-matmul-2-4-hand.mlir b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sm80-lt/sparse-matmul-2-4-hand.mlir
index 661639c50266f..6ea433fcc9336 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sm80-lt/sparse-matmul-2-4-hand.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sm80-lt/sparse-matmul-2-4-hand.mlir
@@ -117,7 +117,7 @@ module {
}
//
- // Sanity check on 16x32 full 2:4 input matrix A.
+ // Soundness check on 16x32 full 2:4 input matrix A.
//
//
// CHECK: ( 1, 0, 2, 0, 3, 0, 4, 0, 5, 0, 6, 0, 7, 0, 8, 0, 9, 0, 10, 0, 11, 0, 12, 0, 13, 0, 14, 0, 15, 0, 16, 0 )
@@ -143,7 +143,7 @@ module {
}
//
- // Sanity check on input matrix 32x16 B.
+ // Soundness check on input matrix 32x16 B.
//
// CHECK-NEXT: ( 0, 1, 2, 3, 4, 5, 6, 7, 0, 1, 2, 3, 4, 5, 6, 7 )
// CHECK-NEXT: ( -1, 0, 1, 2, 3, 4, 5, 6, -1, 0, 1, 2, 3, 4, 5, 6 )
diff --git a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sm80-lt/sparse-matmul-2-4-lib.mlir b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sm80-lt/sparse-matmul-2-4-lib.mlir
index bfe4f75d16bc5..3770bca0aca34 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sm80-lt/sparse-matmul-2-4-lib.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sm80-lt/sparse-matmul-2-4-lib.mlir
@@ -101,7 +101,7 @@ module {
//
- // Sanity check on 16x32 full 2:4 input matrix A.
+ // Soundness check on 16x32 full 2:4 input matrix A.
//
//
// CHECK: ( 1, 0, 2, 0, 3, 0, 4, 0, 5, 0, 6, 0, 7, 0, 8, 0, 9, 0, 10, 0, 11, 0, 12, 0, 13, 0, 14, 0, 15, 0, 16, 0 )
@@ -127,7 +127,7 @@ module {
}
//
- // Sanity check on input matrix 32x16 B.
+ // Soundness check on input matrix 32x16 B.
//
// CHECK-NEXT: ( 0, 1, 2, 3, 4, 5, 6, 7, 0, 1, 2, 3, 4, 5, 6, 7 )
// CHECK-NEXT: ( -1, 0, 1, 2, 3, 4, 5, 6, -1, 0, 1, 2, 3, 4, 5, 6 )
diff --git a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matmul-lib.mlir b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matmul-lib.mlir
index 282ee1cd3ad46..6fdb38821302a 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matmul-lib.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matmul-lib.mlir
@@ -132,7 +132,7 @@ module {
tensor<8x8xf32>) -> tensor<8x8xf32>
//
- // Sanity check on results.
+ // Soundness check on results.
//
// CHECK: ( 140, 168, 196, 224, 252, 280, 308, 336 )
// CHECK-NEXT: ( 168, 204, 240, 276, 312, 348, 384, 420 )
diff --git a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec-const.mlir b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec-const.mlir
index 4cb959557f15b..24f22d76de834 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec-const.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec-const.mlir
@@ -51,7 +51,7 @@ module {
%0 = call @matvec(%A, %x, %y) : (tensor<1024x64xf64, #CSR>, tensor<64xf64>, tensor<1024xf64>) -> tensor<1024xf64>
//
- // Sanity check on results.
+ // Soundness check on results.
//
// CHECK: ( 2016, 2080, 2144, 2208, 2272, 2336, 2400, 2464, 2528, 2592, 2656, 2720, 2784, 2848, 2912, 2976, 3040, 3104, 3168, 3232, 3296, 3360, 3424, 3488, 3552, 3616, 3680, 3744, 3808, 3872, 3936, 4000, 4064, 4128, 4192, 4256, 4320, 4384, 4448, 4512, 4576, 4640, 4704, 4768, 4832, 4896, 4960, 5024, 5088, 5152, 5216, 5280, 5344, 5408, 5472, 5536, 5600, 5664, 5728, 5792, 5856, 5920, 5984, 6048 )
//
diff --git a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec-lib.mlir b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec-lib.mlir
index 452bd0d89682c..6384df66c245e 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec-lib.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec-lib.mlir
@@ -124,7 +124,7 @@ module {
tensor<?xf64>) -> tensor<?xf64>
//
- // Sanity check on the results.
+ // Soundness check on the results.
//
// CHECK-COUNT-3: ( 87360, 89440, 91520, 93600, 95680, 97760, 99840, 101920, 104000, 106080, 108160, 110240, 112320, 114400, 116480, 118560, 120640, 122720, 124800, 126880, 128960, 131040, 133120, 135200, 137280, 139360, 141440, 143520, 145600, 147680, 149760, 151840, 153920, 156000, 158080, 160160, 162240, 164320, 166400, 168480, 170560, 172640, 174720, 176800, 178880, 180960, 183040, 185120, 187200, 189280, 191360, 193440, 195520, 197600, 199680, 201760, 203840, 205920, 208000, 210080, 212160, 214240, 216320, 218400 )
//
diff --git a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec.mlir b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec.mlir
index 32d48f7155bdf..5246b1fa922e4 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-matvec.mlir
@@ -59,7 +59,7 @@ module {
%0 = call @matvec(%A, %x, %y) : (tensor<?x?xf64, #CSR>, tensor<?xf64>, tensor<?xf64>) -> tensor<?xf64>
//
- // Sanity check on results.
+ // Soundness check on results.
//
// CHECK: ( 87360, 89440, 91520, 93600, 95680, 97760, 99840, 101920, 104000, 106080, 108160, 110240, 112320, 114400, 116480, 118560, 120640, 122720, 124800, 126880, 128960, 131040, 133120, 135200, 137280, 139360, 141440, 143520, 145600, 147680, 149760, 151840, 153920, 156000, 158080, 160160, 162240, 164320, 166400, 168480, 170560, 172640, 174720, 176800, 178880, 180960, 183040, 185120, 187200, 189280, 191360, 193440, 195520, 197600, 199680, 201760, 203840, 205920, 208000, 210080, 212160, 214240, 216320, 218400 )
//
diff --git a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-mma-2-4-f16.mlir b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-mma-2-4-f16.mlir
index d8d7c1c39db91..e32227f1af7f3 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-mma-2-4-f16.mlir
+++ b/mlir/test/Integration/Dialect/SparseTensor/GPU/CUDA/sparse-mma-2-4-f16.mlir
@@ -293,7 +293,7 @@ module attributes {gpu.container_module} {
}
//
- // Sanity check on **compressed** input matrix A.
+ // Soundness check on **compressed** input matrix A.
//
// Note that it really is a 16x32 matrix:
// | 1 0 2 0 3 0 ...
@@ -323,7 +323,7 @@ module attributes {gpu.container_module} {
}
//
- // Sanity check on input matrix 32x8 B.
+ // Soundness check on input matrix 32x8 B.
// Note that this is really shown as B^T
//
// CHECK-NEXT: ( 0, -1, -2, -3, -4, -5, -6, -7, -8, -9, -10, -11, -12, -13, -14, -15, -16, -17, -18, -19, -20, -21, -22, -23, -24, -25, -26, -27, -28, -29, -30, -31 )
diff --git a/mlir/test/Integration/Dialect/SparseTensor/python/test_SDDMM.py b/mlir/test/Integration/Dialect/SparseTensor/python/test_SDDMM.py
index b6f61a47dec1e..c31d002183db6 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/python/test_SDDMM.py
+++ b/mlir/test/Integration/Dialect/SparseTensor/python/test_SDDMM.py
@@ -110,7 +110,7 @@ def build_compile_and_run_SDDMMM(attr: st.EncodingAttr, compiler):
# Built-in bufferization uses in-out buffers.
engine.invoke("main", mem_out, mem_a, mem_b, mem_c)
- # Sanity check on computed result. Only a few elements
+ # Soundness check on computed result. Only a few elements
# are sampled from the full dense matrix multiplication.
full_matmul = np.matmul(a, b)
expected = np.zeros((8, 8), np.float64)
diff --git a/mlir/test/Integration/Dialect/SparseTensor/python/test_SpMM.py b/mlir/test/Integration/Dialect/SparseTensor/python/test_SpMM.py
index bf2e62b653339..b17107f839246 100644
--- a/mlir/test/Integration/Dialect/SparseTensor/python/test_SpMM.py
+++ b/mlir/test/Integration/Dialect/SparseTensor/python/test_SpMM.py
@@ -98,7 +98,7 @@ def build_compile_and_run_SpMM(attr: st.EncodingAttr, compiler):
# Built-in bufferization uses in-out buffers.
engine.invoke("main", mem_out, mem_a, mem_b, mem_c)
- # Sanity check on computed result.
+ # Soundness check on computed result.
expected = np.matmul(a, b)
c = rt.ranked_memref_to_numpy(mem_out[0])
if np.allclose(c, expected):
diff --git a/mlir/test/mlir-runner/X86Vector/math-polynomial-approx-avx2.mlir b/mlir/test/mlir-runner/X86Vector/math-polynomial-approx-avx2.mlir
index e79d0b6f6f12e..55f397df05ce9 100644
--- a/mlir/test/mlir-runner/X86Vector/math-polynomial-approx-avx2.mlir
+++ b/mlir/test/mlir-runner/X86Vector/math-polynomial-approx-avx2.mlir
@@ -18,7 +18,7 @@
// -------------------------------------------------------------------------- //
func.func @rsqrt() {
- // Sanity-check that the scalar rsqrt still works OK.
+ // Soundness-check that the scalar rsqrt still works OK.
// CHECK: inf
%0 = arith.constant 0.0 : f32
%rsqrt_0 = math.rsqrt %0 : f32
diff --git a/mlir/test/python/ir/context_lifecycle.py b/mlir/test/python/ir/context_lifecycle.py
index 230db8277c8e7..5cca0bdc08695 100644
--- a/mlir/test/python/ir/context_lifecycle.py
+++ b/mlir/test/python/ir/context_lifecycle.py
@@ -1,5 +1,5 @@
# RUN: %PYTHON %s
-# Standalone sanity check of context life-cycle.
+# Standalone soundness check of context life-cycle.
import gc
import mlir.ir
diff --git a/mlir/unittests/Analysis/Presburger/SimplexTest.cpp b/mlir/unittests/Analysis/Presburger/SimplexTest.cpp
index 63d0243808555..f10da07c16d93 100644
--- a/mlir/unittests/Analysis/Presburger/SimplexTest.cpp
+++ b/mlir/unittests/Analysis/Presburger/SimplexTest.cpp
@@ -258,7 +258,7 @@ TEST(SimplexTest, getSamplePointIfIntegral) {
.has_value());
}
-/// Some basic sanity checks involving zero or one variables.
+/// Some basic soundness checks involving zero or one variables.
TEST(SimplexTest, isMarkedRedundant_no_var_ge_zero) {
Simplex simplex(0);
addInequality(simplex, {0}); // 0 >= 0.
diff --git a/offload/test/offloading/disable_default_device.c b/offload/test/offloading/disable_default_device.c
index 4f7d7617aa088..5ba4bd0153b9a 100644
--- a/offload/test/offloading/disable_default_device.c
+++ b/offload/test/offloading/disable_default_device.c
@@ -4,7 +4,7 @@
#include <omp.h>
#include <stdio.h>
-// Sanity checks to make sure that this works and is thread safe.
+// Soundness checks to make sure that this works and is thread safe.
int main() {
// CHECK: number of devices 0
printf("number of devices %d\n", omp_get_num_devices());
diff --git a/offload/test/offloading/runtime_init.c b/offload/test/offloading/runtime_init.c
index 96fd50f51da1e..97c5a1f226ab7 100644
--- a/offload/test/offloading/runtime_init.c
+++ b/offload/test/offloading/runtime_init.c
@@ -10,7 +10,7 @@
extern void __tgt_rtl_init(void);
extern void __tgt_rtl_deinit(void);
-// Sanity checks to make sure that this works and is thread safe.
+// Soundness checks to make sure that this works and is thread safe.
int main() {
// CHECK: Init offload library!
// CHECK: Deinit offload library!
diff --git a/openmp/runtime/src/kmp_debugger.cpp b/openmp/runtime/src/kmp_debugger.cpp
index 0abdb0f444c31..15de8a7df2266 100644
--- a/openmp/runtime/src/kmp_debugger.cpp
+++ b/openmp/runtime/src/kmp_debugger.cpp
@@ -52,7 +52,7 @@ kmp_omp_struct_info_t __kmp_omp_debug_struct_info = {
/* Change this only if you make a fundamental data structure change here */
KMP_OMP_VERSION,
- /* sanity check. Only should be checked if versions are identical
+ /* soundness check. Only should be checked if versions are identical
* This is also used for backward compatibility to get the runtime
* structure size if it the runtime is older than the interface */
sizeof(kmp_omp_struct_info_t),
diff --git a/openmp/runtime/src/kmp_dispatch.cpp b/openmp/runtime/src/kmp_dispatch.cpp
index 3b4a1f34df040..154f1cbe50e05 100644
--- a/openmp/runtime/src/kmp_dispatch.cpp
+++ b/openmp/runtime/src/kmp_dispatch.cpp
@@ -787,7 +787,7 @@ void __kmp_dispatch_init_algorithm(ident_t *loc, int gtid,
} // while
cross = right;
}
- /* assert sanity of computed crossover point */
+ /* assert soundness of computed crossover point */
KMP_ASSERT(cross && __kmp_pow<UT>(x, cross - 1) > target &&
__kmp_pow<UT>(x, cross) <= target);
diff --git a/openmp/runtime/src/kmp_omp.h b/openmp/runtime/src/kmp_omp.h
index 995241ff65cdf..6150d7bb4cb54 100644
--- a/openmp/runtime/src/kmp_omp.h
+++ b/openmp/runtime/src/kmp_omp.h
@@ -57,7 +57,7 @@ typedef struct {
/* Change this only if you make a fundamental data structure change here */
kmp_int32 lib_version;
- /* sanity check. Only should be checked if versions are identical
+ /* soundness check. Only should be checked if versions are identical
* This is also used for backward compatibility to get the runtime
* structure size if it the runtime is older than the interface */
kmp_int32 sizeof_this_structure;
diff --git a/openmp/tools/omptest/test/unittests/asserter-seq-test.cpp b/openmp/tools/omptest/test/unittests/asserter-seq-test.cpp
index 32a223c0da832..9332b57e9d001 100644
--- a/openmp/tools/omptest/test/unittests/asserter-seq-test.cpp
+++ b/openmp/tools/omptest/test/unittests/asserter-seq-test.cpp
@@ -115,7 +115,7 @@ TEST_F(OmptSequencedAsserterTest, AddEvent) {
/*Name=*/"DevFini", /*Group=*/"", /*Expected=*/OS::Always,
/*DeviceNum=*/7);
SeqAsserter->insert(std::move(ExpectedEvent));
- // Sanity check: Notifications should not be triggered
+ // Soundness check: Notifications should not be triggered
ASSERT_EQ(SeqAsserter->getNotificationCount(), 0);
// Adding an expected event must change the event count but not the state
ASSERT_EQ(SeqAsserter->getRemainingEventCount(), 1);
diff --git a/polly/lib/External/isl/isl_scheduler.c b/polly/lib/External/isl/isl_scheduler.c
index ddd4a16d6bc3f..fdbf77b802a04 100644
--- a/polly/lib/External/isl/isl_scheduler.c
+++ b/polly/lib/External/isl/isl_scheduler.c
@@ -4536,7 +4536,7 @@ static int carries_dependences(__isl_keep isl_vec *sol, int n_edge)
/* Return the lexicographically smallest rational point in "lp",
* assuming that all variables are non-negative and performing some
- * additional sanity checks.
+ * additional soundness checks.
* If "want_integral" is set, then compute the lexicographically smallest
* integer point instead.
* In particular, "lp" should not be empty by construction.
>From 9ec687574eae8d7f896523b59953449b5468e01b Mon Sep 17 00:00:00 2001
From: Rick van Voorden <rick at northbronson.com>
Date: Fri, 5 Sep 2025 12:54:51 -0700
Subject: [PATCH 2/3] revert citation title
---
libcxx/docs/Status/Cxx20Papers.csv | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/libcxx/docs/Status/Cxx20Papers.csv b/libcxx/docs/Status/Cxx20Papers.csv
index 07ad9d2ac7630..91fcd9ee08315 100644
--- a/libcxx/docs/Status/Cxx20Papers.csv
+++ b/libcxx/docs/Status/Cxx20Papers.csv
@@ -59,7 +59,7 @@
"`P0591R4 <https://wg21.link/P0591R4>`__","Utility functions to implement uses-allocator construction","2018-11 (San Diego)","|Partial|","","The changes in [mem.poly.allocator.mem] are missing"
"`P0595R2 <https://wg21.link/P0595R2>`__","std::is_constant_evaluated()","2018-11 (San Diego)","|Complete|","9",""
"`P0602R4 <https://wg21.link/P0602R4>`__","variant and optional should propagate copy/move triviality","2018-11 (San Diego)","|Complete|","8",""
-"`P0608R3 <https://wg21.link/P0608R3>`__","A sound variant converting constructor","2018-11 (San Diego)","|Complete|","9",""
+"`P0608R3 <https://wg21.link/P0608R3>`__","A sane variant converting constructor","2018-11 (San Diego)","|Complete|","9",""
"`P0655R1 <https://wg21.link/P0655R1>`__","visit<R>: Explicit Return Type for visit","2018-11 (San Diego)","|Complete|","12",""
"`P0771R1 <https://wg21.link/P0771R1>`__","std::function move constructor should be noexcept","2018-11 (San Diego)","|Complete|","6",""
"`P0896R4 <https://wg21.link/P0896R4>`__","The One Ranges Proposal","2018-11 (San Diego)","|Complete|","15",""
>From 092feab057048fcb23ba5fc1a4b5baba6212e2da Mon Sep 17 00:00:00 2001
From: Rick van Voorden <rick at northbronson.com>
Date: Fri, 5 Sep 2025 12:56:50 -0700
Subject: [PATCH 3/3] correct typo
---
lldb/examples/summaries/cocoa/objc_runtime.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lldb/examples/summaries/cocoa/objc_runtime.py b/lldb/examples/summaries/cocoa/objc_runtime.py
index d25ee6aaff0fe..0c43eb391cc8a 100644
--- a/lldb/examples/summaries/cocoa/objc_runtime.py
+++ b/lldb/examples/summaries/cocoa/objc_runtime.py
@@ -441,7 +441,7 @@ def __init__(self, isa_pointer, params):
logger >> "Marking as invalid - name is not valid"
self.valid = 0
- # perform sanisoundnessty checks on the contents of this class_t
+ # perform soundness checks on the contents of this class_t
def check_valid(self):
logger = lldb.formatters.Logger.Logger()
self.valid = 1
More information about the llvm-commits
mailing list