[LTP] [PATCH 1/1] doc: Remove [Description] title
Petr Vorel
pvorel@suse.cz
Tue Feb 11 23:31:56 CET 2025
It does not add any information value (it's obvious that the text
description follows), removing it makes the test catalog page shorter.
Removed with:
for i in $(git grep -l ' \* \[Description\]'); do sed -Ezr 's:[ ]*\* \[Description\]\n( \*\n)*::g' -i $i; done
Signed-off-by: Petr Vorel <pvorel@suse.cz>
---
doc/developers/test_case_tutorial.rst | 1 -
doc/old/C-Test-API.asciidoc | 1 -
include/tst_cgroup.h | 2 --
lib/newlib_tests/tst_fuzzy_sync01.c | 2 --
lib/newlib_tests/tst_fuzzy_sync02.c | 2 --
testcases/cve/cve-2014-0196.c | 2 --
testcases/cve/cve-2016-10044.c | 2 --
testcases/cve/cve-2016-7042.c | 2 --
testcases/cve/cve-2016-7117.c | 2 --
testcases/cve/cve-2017-16939.c | 2 --
testcases/cve/cve-2017-17052.c | 2 --
testcases/cve/cve-2017-17053.c | 2 --
testcases/cve/cve-2017-2618.c | 2 --
testcases/cve/cve-2017-2671.c | 2 --
testcases/cve/cve-2022-4378.c | 2 --
testcases/cve/icmp_rate_limit01.c | 2 --
testcases/cve/meltdown.c | 2 --
testcases/cve/stack_clash.c | 2 --
testcases/cve/tcindex01.c | 2 --
testcases/kernel/containers/mountns/mountns01.c | 2 --
testcases/kernel/containers/mountns/mountns02.c | 2 --
testcases/kernel/containers/mountns/mountns03.c | 2 --
testcases/kernel/containers/mountns/mountns04.c | 2 --
testcases/kernel/containers/mqns/mqns_01.c | 2 --
testcases/kernel/containers/mqns/mqns_02.c | 2 --
testcases/kernel/containers/mqns/mqns_03.c | 2 --
testcases/kernel/containers/mqns/mqns_04.c | 2 --
testcases/kernel/containers/netns/netns_netlink.c | 2 --
testcases/kernel/containers/pidns/pidns01.c | 2 --
testcases/kernel/containers/pidns/pidns02.c | 2 --
testcases/kernel/containers/pidns/pidns03.c | 2 --
testcases/kernel/containers/pidns/pidns04.c | 2 --
testcases/kernel/containers/pidns/pidns05.c | 2 --
testcases/kernel/containers/pidns/pidns06.c | 2 --
testcases/kernel/containers/pidns/pidns10.c | 2 --
testcases/kernel/containers/pidns/pidns12.c | 2 --
testcases/kernel/containers/pidns/pidns13.c | 2 --
testcases/kernel/containers/pidns/pidns16.c | 2 --
testcases/kernel/containers/pidns/pidns17.c | 2 --
testcases/kernel/containers/pidns/pidns20.c | 2 --
testcases/kernel/containers/pidns/pidns30.c | 2 --
testcases/kernel/containers/pidns/pidns31.c | 2 --
testcases/kernel/containers/pidns/pidns32.c | 2 --
testcases/kernel/containers/sysvipc/mesgq_nstest.c | 2 --
testcases/kernel/containers/sysvipc/msg_comm.c | 2 --
testcases/kernel/containers/sysvipc/sem_comm.c | 2 --
testcases/kernel/containers/sysvipc/sem_nstest.c | 2 --
testcases/kernel/containers/sysvipc/semtest_2ns.c | 2 --
testcases/kernel/containers/sysvipc/shm_comm.c | 2 --
testcases/kernel/containers/sysvipc/shmem_2nstest.c | 2 --
testcases/kernel/containers/sysvipc/shmnstest.c | 2 --
testcases/kernel/containers/userns/userns01.c | 2 --
testcases/kernel/containers/userns/userns02.c | 2 --
testcases/kernel/containers/userns/userns03.c | 2 --
testcases/kernel/containers/userns/userns04.c | 2 --
testcases/kernel/containers/userns/userns05.c | 2 --
testcases/kernel/containers/userns/userns06.c | 2 --
testcases/kernel/containers/userns/userns07.c | 2 --
testcases/kernel/containers/userns/userns08.c | 2 --
testcases/kernel/containers/utsname/utsname01.c | 2 --
testcases/kernel/containers/utsname/utsname02.c | 2 --
testcases/kernel/containers/utsname/utsname03.c | 2 --
testcases/kernel/containers/utsname/utsname04.c | 2 --
testcases/kernel/controllers/cgroup/cgroup_core01.c | 2 --
testcases/kernel/controllers/cgroup/cgroup_core02.c | 2 --
testcases/kernel/controllers/cgroup/cgroup_core03.c | 2 --
testcases/kernel/controllers/io/io_control01.c | 2 --
testcases/kernel/controllers/memcg/memcontrol01.c | 2 --
testcases/kernel/controllers/memcg/memcontrol02.c | 2 --
testcases/kernel/controllers/memcg/memcontrol03.c | 2 --
testcases/kernel/controllers/memcg/memcontrol04.c | 2 --
.../kernel/device-drivers/block/block_dev_user/block_dev.c | 2 --
testcases/kernel/device-drivers/rtc/rtc02.c | 2 --
testcases/kernel/device-drivers/zram/zram03.c | 2 --
testcases/kernel/fs/fsplough/fsplough.c | 2 --
testcases/kernel/fs/fsx-linux/fsx-linux.c | 2 --
testcases/kernel/fs/squashfs/squashfs01.c | 2 --
testcases/kernel/input/input01.c | 2 --
testcases/kernel/input/input02.c | 2 --
testcases/kernel/input/input03.c | 2 --
testcases/kernel/input/input04.c | 2 --
testcases/kernel/input/input05.c | 2 --
testcases/kernel/input/input06.c | 2 --
testcases/kernel/io/ltp-aiodio/aio-stress.c | 2 --
testcases/kernel/io/ltp-aiodio/aiocp.c | 2 --
testcases/kernel/io/ltp-aiodio/aiodio_append.c | 2 --
testcases/kernel/io/ltp-aiodio/aiodio_sparse.c | 2 --
testcases/kernel/io/ltp-aiodio/dio_append.c | 2 --
testcases/kernel/io/ltp-aiodio/dio_read.c | 2 --
testcases/kernel/io/ltp-aiodio/dio_sparse.c | 2 --
testcases/kernel/io/ltp-aiodio/dio_truncate.c | 2 --
testcases/kernel/irq/irqbalance01.c | 2 --
testcases/kernel/kvm/kvm_svm04.c | 2 --
testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c | 2 --
testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c | 2 --
testcases/kernel/mem/hugetlb/hugefork/hugefork01.c | 2 --
testcases/kernel/mem/hugetlb/hugefork/hugefork02.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c | 1 -
testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c | 2 --
testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c | 2 --
testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c | 2 --
testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c | 2 --
testcases/kernel/mem/ksm/ksm04.c | 2 --
testcases/kernel/mem/ksm/ksm06.c | 2 --
testcases/kernel/mem/ksm/ksm07.c | 2 --
testcases/kernel/mem/mmapstress/mmapstress01.c | 1 -
testcases/kernel/mem/oom/oom01.c | 2 --
testcases/kernel/mem/oom/oom02.c | 2 --
testcases/kernel/mem/oom/oom03.c | 2 --
testcases/kernel/mem/oom/oom04.c | 2 --
testcases/kernel/mem/oom/oom05.c | 2 --
testcases/kernel/mem/swapping/swapping01.c | 2 --
testcases/kernel/mem/thp/thp01.c | 2 --
testcases/kernel/mem/thp/thp02.c | 2 --
testcases/kernel/pty/ptem01.c | 2 --
testcases/kernel/pty/ptem02.c | 2 --
testcases/kernel/pty/ptem03.c | 2 --
testcases/kernel/pty/ptem04.c | 2 --
testcases/kernel/pty/ptem05.c | 2 --
testcases/kernel/pty/ptem06.c | 2 --
testcases/kernel/pty/pty01.c | 2 --
testcases/kernel/pty/pty03.c | 2 --
testcases/kernel/pty/pty06.c | 2 --
testcases/kernel/pty/pty07.c | 2 --
testcases/kernel/pty/pty08.c | 2 --
testcases/kernel/pty/pty09.c | 2 --
testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c | 2 --
testcases/kernel/sched/cfs-scheduler/starvation.c | 2 --
testcases/kernel/sched/sysctl/proc_sched_rt01.c | 2 --
testcases/kernel/security/aslr/aslr01.c | 2 --
testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c | 2 --
testcases/kernel/security/dirtypipe/dirtypipe.c | 2 --
testcases/kernel/security/kallsyms/kallsyms.c | 2 --
testcases/kernel/syscalls/abort/abort01.c | 2 --
testcases/kernel/syscalls/accept/accept01.c | 1 -
testcases/kernel/syscalls/accept/accept02.c | 2 --
testcases/kernel/syscalls/accept/accept03.c | 2 --
testcases/kernel/syscalls/access/access01.c | 2 --
testcases/kernel/syscalls/access/access02.c | 2 --
testcases/kernel/syscalls/access/access03.c | 2 --
testcases/kernel/syscalls/access/access04.c | 2 --
testcases/kernel/syscalls/acct/acct01.c | 2 --
testcases/kernel/syscalls/acct/acct02.c | 2 --
testcases/kernel/syscalls/adjtimex/adjtimex02.c | 2 --
testcases/kernel/syscalls/adjtimex/adjtimex03.c | 2 --
testcases/kernel/syscalls/alarm/alarm02.c | 2 --
testcases/kernel/syscalls/alarm/alarm03.c | 2 --
testcases/kernel/syscalls/alarm/alarm05.c | 2 --
testcases/kernel/syscalls/alarm/alarm06.c | 2 --
testcases/kernel/syscalls/alarm/alarm07.c | 2 --
testcases/kernel/syscalls/arch_prctl/arch_prctl01.c | 2 --
testcases/kernel/syscalls/bind/bind02.c | 2 --
testcases/kernel/syscalls/bpf/bpf_map01.c | 2 --
testcases/kernel/syscalls/bpf/bpf_prog01.c | 2 --
testcases/kernel/syscalls/bpf/bpf_prog02.c | 2 --
testcases/kernel/syscalls/bpf/bpf_prog03.c | 2 --
testcases/kernel/syscalls/bpf/bpf_prog04.c | 2 --
testcases/kernel/syscalls/bpf/bpf_prog05.c | 2 --
testcases/kernel/syscalls/bpf/bpf_prog06.c | 2 --
testcases/kernel/syscalls/bpf/bpf_prog07.c | 2 --
testcases/kernel/syscalls/brk/brk02.c | 2 --
testcases/kernel/syscalls/cachestat/cachestat01.c | 2 --
testcases/kernel/syscalls/cachestat/cachestat02.c | 2 --
testcases/kernel/syscalls/cachestat/cachestat03.c | 2 --
testcases/kernel/syscalls/cachestat/cachestat04.c | 2 --
testcases/kernel/syscalls/capset/capset01.c | 2 --
testcases/kernel/syscalls/capset/capset02.c | 1 -
testcases/kernel/syscalls/capset/capset03.c | 2 --
testcases/kernel/syscalls/capset/capset04.c | 2 --
testcases/kernel/syscalls/chdir/chdir04.c | 2 --
testcases/kernel/syscalls/chmod/chmod01.c | 2 --
testcases/kernel/syscalls/chmod/chmod03.c | 2 --
testcases/kernel/syscalls/chmod/chmod06.c | 2 --
testcases/kernel/syscalls/chmod/chmod08.c | 2 --
testcases/kernel/syscalls/chmod/chmod09.c | 2 --
testcases/kernel/syscalls/chown/chown01.c | 2 --
testcases/kernel/syscalls/chown/chown02.c | 2 --
testcases/kernel/syscalls/chown/chown03.c | 2 --
testcases/kernel/syscalls/chown/chown04.c | 2 --
testcases/kernel/syscalls/chown/chown05.c | 2 --
testcases/kernel/syscalls/chroot/chroot01.c | 2 --
testcases/kernel/syscalls/chroot/chroot02.c | 2 --
testcases/kernel/syscalls/chroot/chroot03.c | 2 --
testcases/kernel/syscalls/chroot/chroot04.c | 2 --
testcases/kernel/syscalls/clock_gettime/clock_gettime03.c | 2 --
testcases/kernel/syscalls/clock_gettime/clock_gettime04.c | 2 --
testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c | 2 --
testcases/kernel/syscalls/clone/clone01.c | 2 --
testcases/kernel/syscalls/clone/clone03.c | 2 --
testcases/kernel/syscalls/clone/clone04.c | 2 --
testcases/kernel/syscalls/clone/clone05.c | 2 --
testcases/kernel/syscalls/clone/clone06.c | 2 --
testcases/kernel/syscalls/clone/clone07.c | 2 --
testcases/kernel/syscalls/clone3/clone301.c | 2 --
testcases/kernel/syscalls/clone3/clone302.c | 2 --
testcases/kernel/syscalls/clone3/clone303.c | 2 --
testcases/kernel/syscalls/close/close01.c | 2 --
testcases/kernel/syscalls/close/close02.c | 2 --
testcases/kernel/syscalls/close_range/close_range01.c | 2 --
testcases/kernel/syscalls/close_range/close_range02.c | 2 --
testcases/kernel/syscalls/cma/process_vm01.c | 2 --
testcases/kernel/syscalls/cma/process_vm_readv02.c | 2 --
testcases/kernel/syscalls/cma/process_vm_readv03.c | 2 --
testcases/kernel/syscalls/cma/process_vm_writev02.c | 2 --
testcases/kernel/syscalls/confstr/confstr01.c | 2 --
testcases/kernel/syscalls/creat/creat08.c | 2 --
testcases/kernel/syscalls/creat/creat09.c | 2 --
testcases/kernel/syscalls/delete_module/delete_module01.c | 2 --
testcases/kernel/syscalls/dup/dup01.c | 2 --
testcases/kernel/syscalls/dup/dup02.c | 2 --
testcases/kernel/syscalls/dup/dup03.c | 2 --
testcases/kernel/syscalls/dup/dup04.c | 2 --
testcases/kernel/syscalls/dup/dup05.c | 2 --
testcases/kernel/syscalls/dup/dup06.c | 2 --
testcases/kernel/syscalls/dup/dup07.c | 2 --
testcases/kernel/syscalls/dup2/dup201.c | 2 --
testcases/kernel/syscalls/dup2/dup202.c | 2 --
testcases/kernel/syscalls/dup2/dup203.c | 2 --
testcases/kernel/syscalls/dup2/dup204.c | 2 --
testcases/kernel/syscalls/dup2/dup205.c | 2 --
testcases/kernel/syscalls/dup2/dup206.c | 2 --
testcases/kernel/syscalls/dup2/dup207.c | 2 --
testcases/kernel/syscalls/dup3/dup3_01.c | 2 --
testcases/kernel/syscalls/dup3/dup3_02.c | 2 --
testcases/kernel/syscalls/epoll_create/epoll_create01.c | 2 --
testcases/kernel/syscalls/epoll_create/epoll_create02.c | 2 --
testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c | 2 --
testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c | 2 --
testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c | 2 --
testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c | 2 --
testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c | 2 --
testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c | 2 --
testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c | 2 --
testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c | 2 --
testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c | 2 --
testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c | 2 --
testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c | 2 --
testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c | 2 --
testcases/kernel/syscalls/epoll_wait/epoll_wait01.c | 2 --
testcases/kernel/syscalls/epoll_wait/epoll_wait02.c | 2 --
testcases/kernel/syscalls/epoll_wait/epoll_wait03.c | 2 --
testcases/kernel/syscalls/epoll_wait/epoll_wait04.c | 2 --
testcases/kernel/syscalls/epoll_wait/epoll_wait05.c | 2 --
testcases/kernel/syscalls/epoll_wait/epoll_wait06.c | 2 --
testcases/kernel/syscalls/epoll_wait/epoll_wait07.c | 2 --
testcases/kernel/syscalls/eventfd/eventfd01.c | 2 --
testcases/kernel/syscalls/eventfd/eventfd02.c | 2 --
testcases/kernel/syscalls/eventfd/eventfd03.c | 2 --
testcases/kernel/syscalls/eventfd/eventfd04.c | 2 --
testcases/kernel/syscalls/eventfd/eventfd05.c | 2 --
testcases/kernel/syscalls/eventfd/eventfd06.c | 2 --
testcases/kernel/syscalls/eventfd2/eventfd2_01.c | 2 --
testcases/kernel/syscalls/eventfd2/eventfd2_02.c | 2 --
testcases/kernel/syscalls/eventfd2/eventfd2_03.c | 2 --
testcases/kernel/syscalls/execve/execve04.c | 2 --
testcases/kernel/syscalls/execve/execve05.c | 2 --
testcases/kernel/syscalls/execve/execve06.c | 2 --
testcases/kernel/syscalls/exit_group/exit_group01.c | 2 --
testcases/kernel/syscalls/faccessat/faccessat01.c | 2 --
testcases/kernel/syscalls/faccessat/faccessat02.c | 2 --
testcases/kernel/syscalls/faccessat2/faccessat201.c | 2 --
testcases/kernel/syscalls/faccessat2/faccessat202.c | 2 --
testcases/kernel/syscalls/fallocate/fallocate03.c | 1 -
testcases/kernel/syscalls/fallocate/fallocate06.c | 2 --
testcases/kernel/syscalls/fanotify/fanotify01.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify02.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify03.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify04.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify05.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify06.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify07.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify08.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify09.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify10.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify11.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify12.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify13.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify14.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify15.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify16.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify17.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify18.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify19.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify20.c | 2 --
testcases/kernel/syscalls/fanotify/fanotify21.c | 2 --
testcases/kernel/syscalls/fanotify/fanotify22.c | 1 -
testcases/kernel/syscalls/fanotify/fanotify23.c | 1 -
testcases/kernel/syscalls/fchmod/fchmod01.c | 2 --
testcases/kernel/syscalls/fchmod/fchmod02.c | 2 --
testcases/kernel/syscalls/fchmod/fchmod03.c | 2 --
testcases/kernel/syscalls/fchmod/fchmod04.c | 2 --
testcases/kernel/syscalls/fchmod/fchmod05.c | 2 --
testcases/kernel/syscalls/fchmodat/fchmodat01.c | 2 --
testcases/kernel/syscalls/fchmodat/fchmodat02.c | 2 --
testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c | 2 --
testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c | 2 --
testcases/kernel/syscalls/fchown/fchown01.c | 2 --
testcases/kernel/syscalls/fchown/fchown02.c | 2 --
testcases/kernel/syscalls/fchown/fchown03.c | 2 --
testcases/kernel/syscalls/fchown/fchown04.c | 2 --
testcases/kernel/syscalls/fchown/fchown05.c | 2 --
testcases/kernel/syscalls/fchownat/fchownat01.c | 2 --
testcases/kernel/syscalls/fchownat/fchownat02.c | 2 --
testcases/kernel/syscalls/fchownat/fchownat03.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl05.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl08.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl12.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl13.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl14.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl15.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl27.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl29.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl30.c | 2 --
testcases/kernel/syscalls/fcntl/fcntl39.c | 2 --
testcases/kernel/syscalls/finit_module/finit_module01.c | 2 --
testcases/kernel/syscalls/finit_module/finit_module02.c | 2 --
testcases/kernel/syscalls/flock/flock01.c | 2 --
testcases/kernel/syscalls/flock/flock02.c | 2 --
testcases/kernel/syscalls/flock/flock03.c | 2 --
testcases/kernel/syscalls/flock/flock04.c | 2 --
testcases/kernel/syscalls/flock/flock06.c | 2 --
testcases/kernel/syscalls/flock/flock07.c | 2 --
testcases/kernel/syscalls/fork/fork05.c | 2 --
testcases/kernel/syscalls/fork/fork07.c | 2 --
testcases/kernel/syscalls/fork/fork08.c | 2 --
testcases/kernel/syscalls/fork/fork10.c | 2 --
testcases/kernel/syscalls/fork/fork13.c | 2 --
testcases/kernel/syscalls/fork/fork14.c | 2 --
testcases/kernel/syscalls/fpathconf/fpathconf01.c | 2 --
testcases/kernel/syscalls/fsconfig/fsconfig03.c | 2 --
testcases/kernel/syscalls/fsetxattr/fsetxattr02.c | 2 --
testcases/kernel/syscalls/fstat/fstat02.c | 2 --
testcases/kernel/syscalls/fstatfs/fstatfs01.c | 2 --
testcases/kernel/syscalls/fstatfs/fstatfs02.c | 2 --
testcases/kernel/syscalls/ftruncate/ftruncate01.c | 2 --
testcases/kernel/syscalls/ftruncate/ftruncate03.c | 2 --
testcases/kernel/syscalls/futex/futex_cmp_requeue01.c | 2 --
testcases/kernel/syscalls/futex/futex_waitv01.c | 2 --
testcases/kernel/syscalls/futex/futex_waitv02.c | 2 --
testcases/kernel/syscalls/futex/futex_waitv03.c | 2 --
testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c | 2 --
testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c | 2 --
testcases/kernel/syscalls/getcontext/getcontext01.c | 2 --
testcases/kernel/syscalls/getcpu/getcpu01.c | 2 --
testcases/kernel/syscalls/getcpu/getcpu02.c | 2 --
testcases/kernel/syscalls/getcwd/getcwd02.c | 2 --
testcases/kernel/syscalls/getcwd/getcwd03.c | 2 --
testcases/kernel/syscalls/getdents/getdents01.c | 2 --
testcases/kernel/syscalls/getdents/getdents02.c | 2 --
testcases/kernel/syscalls/getdomainname/getdomainname01.c | 2 --
testcases/kernel/syscalls/getegid/getegid01.c | 2 --
testcases/kernel/syscalls/getegid/getegid02.c | 2 --
testcases/kernel/syscalls/getgid/getgid01.c | 2 --
testcases/kernel/syscalls/getgid/getgid03.c | 1 -
testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c | 2 --
testcases/kernel/syscalls/gethostid/gethostid01.c | 2 --
testcases/kernel/syscalls/gethostname/gethostname01.c | 2 --
testcases/kernel/syscalls/gethostname/gethostname02.c | 2 --
testcases/kernel/syscalls/getitimer/getitimer01.c | 2 --
testcases/kernel/syscalls/getitimer/getitimer02.c | 2 --
testcases/kernel/syscalls/getpagesize/getpagesize01.c | 2 --
testcases/kernel/syscalls/getpeername/getpeername01.c | 2 --
testcases/kernel/syscalls/getpgid/getpgid01.c | 2 --
testcases/kernel/syscalls/getpgid/getpgid02.c | 2 --
testcases/kernel/syscalls/getpgrp/getpgrp01.c | 2 --
testcases/kernel/syscalls/getpid/getpid01.c | 2 --
testcases/kernel/syscalls/getpid/getpid02.c | 2 --
testcases/kernel/syscalls/getppid/getppid01.c | 2 --
testcases/kernel/syscalls/getppid/getppid02.c | 2 --
testcases/kernel/syscalls/getrandom/getrandom05.c | 2 --
testcases/kernel/syscalls/getrlimit/getrlimit01.c | 2 --
testcases/kernel/syscalls/getrlimit/getrlimit02.c | 2 --
testcases/kernel/syscalls/getrusage/getrusage01.c | 2 --
testcases/kernel/syscalls/getrusage/getrusage02.c | 2 --
testcases/kernel/syscalls/getrusage/getrusage03.c | 2 --
testcases/kernel/syscalls/getrusage/getrusage03_child.c | 2 --
testcases/kernel/syscalls/getsid/getsid01.c | 2 --
testcases/kernel/syscalls/getsid/getsid02.c | 2 --
testcases/kernel/syscalls/getsockname/getsockname01.c | 1 -
testcases/kernel/syscalls/getsockopt/getsockopt01.c | 1 -
testcases/kernel/syscalls/getsockopt/getsockopt02.c | 2 --
testcases/kernel/syscalls/gettid/gettid01.c | 2 --
testcases/kernel/syscalls/gettid/gettid02.c | 2 --
testcases/kernel/syscalls/gettimeofday/gettimeofday01.c | 2 --
testcases/kernel/syscalls/gettimeofday/gettimeofday02.c | 2 --
testcases/kernel/syscalls/getuid/getuid01.c | 2 --
testcases/kernel/syscalls/getuid/getuid03.c | 2 --
testcases/kernel/syscalls/getxattr/getxattr01.c | 2 --
testcases/kernel/syscalls/getxattr/getxattr02.c | 2 --
testcases/kernel/syscalls/getxattr/getxattr03.c | 2 --
testcases/kernel/syscalls/getxattr/getxattr04.c | 2 --
testcases/kernel/syscalls/getxattr/getxattr05.c | 2 --
testcases/kernel/syscalls/init_module/init_module01.c | 2 --
testcases/kernel/syscalls/init_module/init_module02.c | 2 --
testcases/kernel/syscalls/inotify/inotify01.c | 2 --
testcases/kernel/syscalls/inotify/inotify02.c | 2 --
testcases/kernel/syscalls/inotify/inotify03.c | 2 --
testcases/kernel/syscalls/inotify/inotify04.c | 2 --
testcases/kernel/syscalls/inotify/inotify05.c | 2 --
testcases/kernel/syscalls/inotify/inotify06.c | 2 --
testcases/kernel/syscalls/inotify/inotify07.c | 2 --
testcases/kernel/syscalls/inotify/inotify08.c | 2 --
testcases/kernel/syscalls/inotify/inotify09.c | 2 --
testcases/kernel/syscalls/inotify/inotify10.c | 2 --
testcases/kernel/syscalls/inotify/inotify11.c | 2 --
testcases/kernel/syscalls/inotify/inotify12.c | 2 --
testcases/kernel/syscalls/inotify_init/inotify_init1_01.c | 2 --
testcases/kernel/syscalls/inotify_init/inotify_init1_02.c | 2 --
testcases/kernel/syscalls/io_cancel/io_cancel01.c | 2 --
testcases/kernel/syscalls/io_cancel/io_cancel02.c | 2 --
testcases/kernel/syscalls/io_destroy/io_destroy01.c | 2 --
testcases/kernel/syscalls/io_destroy/io_destroy02.c | 2 --
testcases/kernel/syscalls/io_getevents/io_getevents01.c | 2 --
testcases/kernel/syscalls/io_getevents/io_getevents02.c | 2 --
testcases/kernel/syscalls/io_setup/io_setup01.c | 2 --
testcases/kernel/syscalls/io_setup/io_setup02.c | 2 --
testcases/kernel/syscalls/io_submit/io_submit01.c | 2 --
testcases/kernel/syscalls/io_submit/io_submit02.c | 2 --
testcases/kernel/syscalls/io_submit/io_submit03.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl01.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl02.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl03.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl04.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl05.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl06.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl07.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl08.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl09.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_loop01.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_loop02.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_loop03.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_loop04.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_loop05.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_loop06.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_loop07.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ns01.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ns02.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ns03.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ns04.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ns05.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ns06.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_ns07.c | 2 --
testcases/kernel/syscalls/ioctl/ioctl_sg01.c | 2 --
testcases/kernel/syscalls/iopl/iopl01.c | 2 --
testcases/kernel/syscalls/iopl/iopl02.c | 2 --
testcases/kernel/syscalls/ioprio/ioprio_get01.c | 2 --
testcases/kernel/syscalls/ioprio/ioprio_set01.c | 2 --
testcases/kernel/syscalls/ioprio/ioprio_set02.c | 2 --
testcases/kernel/syscalls/ioprio/ioprio_set03.c | 2 --
testcases/kernel/syscalls/ipc/msgctl/msgctl05.c | 2 --
testcases/kernel/syscalls/ipc/msgctl/msgctl06.c | 2 --
testcases/kernel/syscalls/ipc/msgget/msgget01.c | 2 --
testcases/kernel/syscalls/ipc/msgget/msgget02.c | 2 --
testcases/kernel/syscalls/ipc/msgget/msgget03.c | 2 --
testcases/kernel/syscalls/ipc/msgget/msgget04.c | 2 --
testcases/kernel/syscalls/ipc/msgget/msgget05.c | 2 --
testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c | 2 --
testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c | 2 --
testcases/kernel/syscalls/ipc/msgstress/msgstress01.c | 2 --
testcases/kernel/syscalls/ipc/semctl/semctl01.c | 2 --
testcases/kernel/syscalls/ipc/semctl/semctl02.c | 2 --
testcases/kernel/syscalls/ipc/semctl/semctl03.c | 2 --
testcases/kernel/syscalls/ipc/semctl/semctl04.c | 2 --
testcases/kernel/syscalls/ipc/semctl/semctl05.c | 2 --
testcases/kernel/syscalls/ipc/semctl/semctl07.c | 2 --
testcases/kernel/syscalls/ipc/semctl/semctl08.c | 2 --
testcases/kernel/syscalls/ipc/semctl/semctl09.c | 2 --
testcases/kernel/syscalls/ipc/semget/semget01.c | 2 --
testcases/kernel/syscalls/ipc/semget/semget02.c | 2 --
testcases/kernel/syscalls/ipc/semget/semget05.c | 2 --
testcases/kernel/syscalls/ipc/semop/semop04.c | 2 --
testcases/kernel/syscalls/ipc/shmat/shmat04.c | 2 --
testcases/kernel/syscalls/ipc/shmctl/shmctl01.c | 2 --
testcases/kernel/syscalls/ipc/shmctl/shmctl02.c | 2 --
testcases/kernel/syscalls/ipc/shmctl/shmctl03.c | 2 --
testcases/kernel/syscalls/ipc/shmctl/shmctl04.c | 2 --
testcases/kernel/syscalls/ipc/shmctl/shmctl05.c | 2 --
testcases/kernel/syscalls/ipc/shmctl/shmctl06.c | 2 --
testcases/kernel/syscalls/ipc/shmctl/shmctl07.c | 2 --
testcases/kernel/syscalls/ipc/shmctl/shmctl08.c | 2 --
testcases/kernel/syscalls/ipc/shmdt/shmdt01.c | 2 --
testcases/kernel/syscalls/ipc/shmdt/shmdt02.c | 2 --
testcases/kernel/syscalls/ipc/shmget/shmget02.c | 2 --
testcases/kernel/syscalls/ipc/shmget/shmget03.c | 2 --
testcases/kernel/syscalls/ipc/shmget/shmget04.c | 2 --
testcases/kernel/syscalls/ipc/shmget/shmget05.c | 2 --
testcases/kernel/syscalls/ipc/shmget/shmget06.c | 2 --
testcases/kernel/syscalls/kcmp/kcmp01.c | 2 --
testcases/kernel/syscalls/kcmp/kcmp02.c | 2 --
testcases/kernel/syscalls/kcmp/kcmp03.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl01.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl02.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl03.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl04.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl05.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl06.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl07.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl08.c | 2 --
testcases/kernel/syscalls/keyctl/keyctl09.c | 2 --
testcases/kernel/syscalls/kill/kill13.c | 2 --
testcases/kernel/syscalls/landlock/landlock01.c | 2 --
testcases/kernel/syscalls/landlock/landlock02.c | 2 --
testcases/kernel/syscalls/landlock/landlock03.c | 2 --
testcases/kernel/syscalls/landlock/landlock04.c | 2 --
testcases/kernel/syscalls/landlock/landlock05.c | 2 --
testcases/kernel/syscalls/landlock/landlock06.c | 2 --
testcases/kernel/syscalls/landlock/landlock07.c | 2 --
testcases/kernel/syscalls/landlock/landlock08.c | 2 --
testcases/kernel/syscalls/lgetxattr/lgetxattr01.c | 2 --
testcases/kernel/syscalls/lgetxattr/lgetxattr02.c | 2 --
testcases/kernel/syscalls/link/link02.c | 2 --
testcases/kernel/syscalls/link/link04.c | 2 --
testcases/kernel/syscalls/link/link05.c | 2 --
testcases/kernel/syscalls/link/link08.c | 2 --
testcases/kernel/syscalls/listmount/listmount01.c | 2 --
testcases/kernel/syscalls/listmount/listmount02.c | 2 --
testcases/kernel/syscalls/listmount/listmount03.c | 2 --
testcases/kernel/syscalls/listmount/listmount04.c | 2 --
testcases/kernel/syscalls/listxattr/listxattr01.c | 2 --
testcases/kernel/syscalls/listxattr/listxattr02.c | 2 --
testcases/kernel/syscalls/listxattr/listxattr03.c | 2 --
testcases/kernel/syscalls/llistxattr/llistxattr01.c | 2 --
testcases/kernel/syscalls/llistxattr/llistxattr02.c | 2 --
testcases/kernel/syscalls/llistxattr/llistxattr03.c | 2 --
testcases/kernel/syscalls/lremovexattr/lremovexattr01.c | 2 --
testcases/kernel/syscalls/lstat/lstat03.c | 2 --
testcases/kernel/syscalls/madvise/madvise03.c | 2 --
testcases/kernel/syscalls/madvise/madvise06.c | 2 --
testcases/kernel/syscalls/madvise/madvise11.c | 2 --
testcases/kernel/syscalls/madvise/madvise12.c | 2 --
testcases/kernel/syscalls/mallinfo/mallinfo01.c | 2 --
testcases/kernel/syscalls/mallinfo/mallinfo02.c | 2 --
testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c | 2 --
testcases/kernel/syscalls/mallopt/mallopt01.c | 2 --
testcases/kernel/syscalls/memcmp/memcmp01.c | 2 --
testcases/kernel/syscalls/memcpy/memcpy01.c | 2 --
testcases/kernel/syscalls/memfd_create/memfd_create04.c | 2 --
testcases/kernel/syscalls/memset/memset01.c | 2 --
testcases/kernel/syscalls/mincore/mincore02.c | 2 --
testcases/kernel/syscalls/mkdir/mkdir02.c | 2 --
testcases/kernel/syscalls/mkdir/mkdir03.c | 2 --
testcases/kernel/syscalls/mkdir/mkdir09.c | 2 --
testcases/kernel/syscalls/mknod/mknod01.c | 2 --
testcases/kernel/syscalls/mknod/mknod02.c | 2 --
testcases/kernel/syscalls/mknod/mknod09.c | 2 --
testcases/kernel/syscalls/mlock/mlock01.c | 2 --
testcases/kernel/syscalls/mlock/mlock02.c | 2 --
testcases/kernel/syscalls/mlock/mlock03.c | 2 --
testcases/kernel/syscalls/mlock/mlock04.c | 2 --
testcases/kernel/syscalls/mlock/mlock05.c | 2 --
testcases/kernel/syscalls/mmap/mmap01.c | 2 --
testcases/kernel/syscalls/mmap/mmap02.c | 2 --
testcases/kernel/syscalls/mmap/mmap04.c | 2 --
testcases/kernel/syscalls/mmap/mmap05.c | 2 --
testcases/kernel/syscalls/mmap/mmap06.c | 2 --
testcases/kernel/syscalls/mmap/mmap08.c | 2 --
testcases/kernel/syscalls/mmap/mmap09.c | 2 --
testcases/kernel/syscalls/mmap/mmap13.c | 2 --
testcases/kernel/syscalls/mmap/mmap14.c | 2 --
testcases/kernel/syscalls/mmap/mmap15.c | 2 --
testcases/kernel/syscalls/mmap/mmap16.c | 2 --
testcases/kernel/syscalls/mmap/mmap19.c | 2 --
testcases/kernel/syscalls/mmap/mmap20.c | 2 --
testcases/kernel/syscalls/mount/mount01.c | 2 --
testcases/kernel/syscalls/mount/mount02.c | 2 --
testcases/kernel/syscalls/mount/mount03.c | 2 --
testcases/kernel/syscalls/mount/mount04.c | 2 --
testcases/kernel/syscalls/mount/mount05.c | 2 --
testcases/kernel/syscalls/mount/mount06.c | 2 --
testcases/kernel/syscalls/mount/mount07.c | 2 --
testcases/kernel/syscalls/mount_setattr/mount_setattr01.c | 2 --
testcases/kernel/syscalls/move_pages/move_pages04.c | 2 --
testcases/kernel/syscalls/move_pages/move_pages12.c | 2 --
testcases/kernel/syscalls/mprotect/mprotect05.c | 2 --
testcases/kernel/syscalls/mq_notify/mq_notify02.c | 2 --
testcases/kernel/syscalls/mq_notify/mq_notify03.c | 2 --
testcases/kernel/syscalls/mremap/mremap06.c | 2 --
testcases/kernel/syscalls/mseal/mseal01.c | 2 --
testcases/kernel/syscalls/mseal/mseal02.c | 2 --
testcases/kernel/syscalls/msync/msync04.c | 2 --
testcases/kernel/syscalls/munlock/munlock01.c | 2 --
testcases/kernel/syscalls/munlock/munlock02.c | 2 --
testcases/kernel/syscalls/munlockall/munlockall01.c | 2 --
.../kernel/syscalls/name_to_handle_at/name_to_handle_at01.c | 2 --
.../kernel/syscalls/name_to_handle_at/name_to_handle_at02.c | 2 --
testcases/kernel/syscalls/nanosleep/nanosleep01.c | 2 --
testcases/kernel/syscalls/nanosleep/nanosleep04.c | 2 --
testcases/kernel/syscalls/nice/nice01.c | 2 --
testcases/kernel/syscalls/nice/nice02.c | 2 --
testcases/kernel/syscalls/nice/nice03.c | 2 --
testcases/kernel/syscalls/nice/nice04.c | 2 --
testcases/kernel/syscalls/nice/nice05.c | 2 --
testcases/kernel/syscalls/open/open02.c | 2 --
testcases/kernel/syscalls/open/open03.c | 2 --
testcases/kernel/syscalls/open/open04.c | 2 --
testcases/kernel/syscalls/open/open06.c | 2 --
testcases/kernel/syscalls/open/open07.c | 2 --
testcases/kernel/syscalls/open/open08.c | 2 --
testcases/kernel/syscalls/open/open09.c | 2 --
testcases/kernel/syscalls/open/open10.c | 2 --
testcases/kernel/syscalls/open/open11.c | 2 --
testcases/kernel/syscalls/open/open15.c | 2 --
.../kernel/syscalls/open_by_handle_at/open_by_handle_at01.c | 2 --
.../kernel/syscalls/open_by_handle_at/open_by_handle_at02.c | 2 --
testcases/kernel/syscalls/openat/openat01.c | 2 --
testcases/kernel/syscalls/openat/openat04.c | 2 --
testcases/kernel/syscalls/pathconf/pathconf01.c | 2 --
testcases/kernel/syscalls/pathconf/pathconf02.c | 2 --
testcases/kernel/syscalls/personality/personality01.c | 2 --
testcases/kernel/syscalls/personality/personality02.c | 2 --
testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c | 2 --
testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c | 2 --
testcases/kernel/syscalls/pidfd_open/pidfd_open01.c | 2 --
testcases/kernel/syscalls/pidfd_open/pidfd_open02.c | 2 --
testcases/kernel/syscalls/pidfd_open/pidfd_open03.c | 2 --
testcases/kernel/syscalls/pidfd_open/pidfd_open04.c | 2 --
.../kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c | 2 --
.../kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c | 2 --
.../kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c | 2 --
testcases/kernel/syscalls/pipe/pipe03.c | 2 --
testcases/kernel/syscalls/pipe/pipe06.c | 2 --
testcases/kernel/syscalls/pipe/pipe07.c | 2 --
testcases/kernel/syscalls/pipe/pipe08.c | 2 --
testcases/kernel/syscalls/pipe/pipe10.c | 2 --
testcases/kernel/syscalls/pipe/pipe14.c | 2 --
testcases/kernel/syscalls/pipe/pipe15.c | 2 --
testcases/kernel/syscalls/pkeys/pkey01.c | 2 --
testcases/kernel/syscalls/prctl/prctl01.c | 2 --
testcases/kernel/syscalls/prctl/prctl02.c | 2 --
testcases/kernel/syscalls/prctl/prctl03.c | 2 --
testcases/kernel/syscalls/prctl/prctl05.c | 2 --
testcases/kernel/syscalls/prctl/prctl06.c | 2 --
testcases/kernel/syscalls/prctl/prctl07.c | 2 --
testcases/kernel/syscalls/prctl/prctl08.c | 2 --
testcases/kernel/syscalls/prctl/prctl09.c | 2 --
testcases/kernel/syscalls/prctl/prctl10.c | 2 --
testcases/kernel/syscalls/pread/pread01.c | 2 --
testcases/kernel/syscalls/pread/pread02.c | 2 --
testcases/kernel/syscalls/preadv/preadv01.c | 2 --
testcases/kernel/syscalls/preadv/preadv02.c | 2 --
testcases/kernel/syscalls/preadv/preadv03.c | 2 --
testcases/kernel/syscalls/preadv2/preadv201.c | 2 --
testcases/kernel/syscalls/preadv2/preadv202.c | 2 --
testcases/kernel/syscalls/process_madvise/process_madvise01.c | 2 --
testcases/kernel/syscalls/pselect/pselect02.c | 2 --
testcases/kernel/syscalls/ptrace/ptrace05.c | 2 --
testcases/kernel/syscalls/ptrace/ptrace06.c | 2 --
testcases/kernel/syscalls/ptrace/ptrace11.c | 2 --
testcases/kernel/syscalls/pwrite/pwrite01.c | 2 --
testcases/kernel/syscalls/pwrite/pwrite02.c | 2 --
testcases/kernel/syscalls/pwrite/pwrite03.c | 2 --
testcases/kernel/syscalls/pwrite/pwrite04.c | 2 --
testcases/kernel/syscalls/pwritev/pwritev01.c | 2 --
testcases/kernel/syscalls/pwritev/pwritev02.c | 2 --
testcases/kernel/syscalls/pwritev/pwritev03.c | 2 --
testcases/kernel/syscalls/pwritev2/pwritev201.c | 2 --
testcases/kernel/syscalls/pwritev2/pwritev202.c | 2 --
testcases/kernel/syscalls/quotactl/quotactl01.c | 1 -
testcases/kernel/syscalls/quotactl/quotactl02.c | 2 --
testcases/kernel/syscalls/quotactl/quotactl03.c | 2 --
testcases/kernel/syscalls/quotactl/quotactl04.c | 2 --
testcases/kernel/syscalls/quotactl/quotactl05.c | 2 --
testcases/kernel/syscalls/quotactl/quotactl06.c | 2 --
testcases/kernel/syscalls/quotactl/quotactl07.c | 2 --
testcases/kernel/syscalls/quotactl/quotactl08.c | 1 -
testcases/kernel/syscalls/quotactl/quotactl09.c | 2 --
testcases/kernel/syscalls/read/read03.c | 2 --
testcases/kernel/syscalls/read/read04.c | 2 --
testcases/kernel/syscalls/readahead/readahead01.c | 2 --
testcases/kernel/syscalls/readdir/readdir01.c | 2 --
testcases/kernel/syscalls/readdir/readdir21.c | 2 --
testcases/kernel/syscalls/readlink/readlink01.c | 2 --
testcases/kernel/syscalls/readlink/readlink03.c | 2 --
testcases/kernel/syscalls/readlinkat/readlinkat01.c | 2 --
testcases/kernel/syscalls/readlinkat/readlinkat02.c | 2 --
testcases/kernel/syscalls/readv/readv02.c | 2 --
testcases/kernel/syscalls/realpath/realpath01.c | 2 --
testcases/kernel/syscalls/reboot/reboot01.c | 2 --
testcases/kernel/syscalls/reboot/reboot02.c | 1 -
testcases/kernel/syscalls/recvmsg/recvmsg01.c | 2 --
testcases/kernel/syscalls/rename/rename01.c | 2 --
testcases/kernel/syscalls/rename/rename03.c | 2 --
testcases/kernel/syscalls/rename/rename04.c | 2 --
testcases/kernel/syscalls/rename/rename05.c | 2 --
testcases/kernel/syscalls/rename/rename06.c | 2 --
testcases/kernel/syscalls/rename/rename07.c | 2 --
testcases/kernel/syscalls/rename/rename08.c | 2 --
testcases/kernel/syscalls/rename/rename09.c | 2 --
testcases/kernel/syscalls/rename/rename10.c | 2 --
testcases/kernel/syscalls/rename/rename12.c | 2 --
testcases/kernel/syscalls/rename/rename13.c | 2 --
testcases/kernel/syscalls/rename/rename15.c | 2 --
testcases/kernel/syscalls/request_key/request_key01.c | 2 --
testcases/kernel/syscalls/request_key/request_key02.c | 2 --
testcases/kernel/syscalls/request_key/request_key03.c | 2 --
testcases/kernel/syscalls/request_key/request_key04.c | 2 --
testcases/kernel/syscalls/request_key/request_key05.c | 2 --
testcases/kernel/syscalls/request_key/request_key06.c | 2 --
testcases/kernel/syscalls/rmdir/rmdir02.c | 2 --
testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c | 2 --
testcases/kernel/syscalls/sbrk/sbrk01.c | 2 --
testcases/kernel/syscalls/sbrk/sbrk02.c | 2 --
testcases/kernel/syscalls/sbrk/sbrk03.c | 2 --
.../syscalls/sched_get_priority_max/sched_get_priority_max01.c | 2 --
.../syscalls/sched_get_priority_max/sched_get_priority_max02.c | 2 --
.../syscalls/sched_get_priority_min/sched_get_priority_min01.c | 2 --
.../syscalls/sched_get_priority_min/sched_get_priority_min02.c | 2 --
testcases/kernel/syscalls/sched_getattr/sched_getattr02.c | 2 --
testcases/kernel/syscalls/sched_getparam/sched_getparam01.c | 2 --
testcases/kernel/syscalls/sched_getparam/sched_getparam03.c | 2 --
.../kernel/syscalls/sched_getscheduler/sched_getscheduler01.c | 2 --
.../kernel/syscalls/sched_getscheduler/sched_getscheduler02.c | 2 --
.../syscalls/sched_rr_get_interval/sched_rr_get_interval01.c | 2 --
.../syscalls/sched_rr_get_interval/sched_rr_get_interval02.c | 2 --
.../syscalls/sched_rr_get_interval/sched_rr_get_interval03.c | 2 --
.../kernel/syscalls/sched_setaffinity/sched_setaffinity01.c | 2 --
testcases/kernel/syscalls/sched_setparam/sched_setparam01.c | 2 --
testcases/kernel/syscalls/sched_setparam/sched_setparam02.c | 2 --
testcases/kernel/syscalls/sched_setparam/sched_setparam03.c | 2 --
testcases/kernel/syscalls/sched_setparam/sched_setparam04.c | 2 --
testcases/kernel/syscalls/sched_setparam/sched_setparam05.c | 2 --
.../kernel/syscalls/sched_setscheduler/sched_setscheduler01.c | 2 --
.../kernel/syscalls/sched_setscheduler/sched_setscheduler02.c | 2 --
.../kernel/syscalls/sched_setscheduler/sched_setscheduler04.c | 2 --
testcases/kernel/syscalls/seccomp/seccomp01.c | 2 --
testcases/kernel/syscalls/select/select04.c | 2 --
testcases/kernel/syscalls/send/send02.c | 2 --
testcases/kernel/syscalls/sendfile/sendfile02.c | 2 --
testcases/kernel/syscalls/sendfile/sendfile03.c | 2 --
testcases/kernel/syscalls/sendfile/sendfile04.c | 2 --
testcases/kernel/syscalls/sendfile/sendfile05.c | 2 --
testcases/kernel/syscalls/sendfile/sendfile06.c | 2 --
testcases/kernel/syscalls/sendfile/sendfile07.c | 2 --
testcases/kernel/syscalls/sendfile/sendfile08.c | 2 --
testcases/kernel/syscalls/sendfile/sendfile09.c | 2 --
testcases/kernel/syscalls/sendmsg/sendmsg03.c | 2 --
testcases/kernel/syscalls/sendto/sendto02.c | 2 --
testcases/kernel/syscalls/sendto/sendto03.c | 2 --
testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c | 2 --
testcases/kernel/syscalls/set_tid_address/set_tid_address01.c | 2 --
testcases/kernel/syscalls/setegid/setegid01.c | 2 --
testcases/kernel/syscalls/setegid/setegid02.c | 2 --
testcases/kernel/syscalls/setfsgid/setfsgid01.c | 2 --
testcases/kernel/syscalls/setfsgid/setfsgid02.c | 2 --
testcases/kernel/syscalls/setfsuid/setfsuid01.c | 2 --
testcases/kernel/syscalls/setfsuid/setfsuid02.c | 2 --
testcases/kernel/syscalls/setfsuid/setfsuid03.c | 2 --
testcases/kernel/syscalls/setgid/setgid01.c | 2 --
testcases/kernel/syscalls/setgid/setgid02.c | 2 --
testcases/kernel/syscalls/setgroups/setgroups01.c | 2 --
testcases/kernel/syscalls/setgroups/setgroups02.c | 2 --
testcases/kernel/syscalls/setgroups/setgroups03.c | 2 --
testcases/kernel/syscalls/setitimer/setitimer01.c | 2 --
testcases/kernel/syscalls/setitimer/setitimer02.c | 2 --
testcases/kernel/syscalls/setpgid/setpgid01.c | 2 --
testcases/kernel/syscalls/setpgid/setpgid02.c | 2 --
testcases/kernel/syscalls/setpgid/setpgid03.c | 2 --
testcases/kernel/syscalls/setpgrp/setpgrp02.c | 2 --
testcases/kernel/syscalls/setregid/setregid01.c | 2 --
testcases/kernel/syscalls/setresgid/setresgid01.c | 2 --
testcases/kernel/syscalls/setresgid/setresgid02.c | 2 --
testcases/kernel/syscalls/setresgid/setresgid03.c | 2 --
testcases/kernel/syscalls/setresgid/setresgid04.c | 2 --
testcases/kernel/syscalls/setresuid/setresuid01.c | 2 --
testcases/kernel/syscalls/setresuid/setresuid02.c | 2 --
testcases/kernel/syscalls/setresuid/setresuid03.c | 2 --
testcases/kernel/syscalls/setresuid/setresuid04.c | 2 --
testcases/kernel/syscalls/setresuid/setresuid05.c | 2 --
testcases/kernel/syscalls/setreuid/setreuid01.c | 2 --
testcases/kernel/syscalls/setreuid/setreuid02.c | 2 --
testcases/kernel/syscalls/setreuid/setreuid03.c | 2 --
testcases/kernel/syscalls/setreuid/setreuid04.c | 2 --
testcases/kernel/syscalls/setreuid/setreuid05.c | 2 --
testcases/kernel/syscalls/setreuid/setreuid06.c | 2 --
testcases/kernel/syscalls/setreuid/setreuid07.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt01.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt02.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt03.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt04.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt05.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt06.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt07.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt08.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt09.c | 2 --
testcases/kernel/syscalls/setsockopt/setsockopt10.c | 2 --
testcases/kernel/syscalls/settimeofday/settimeofday01.c | 2 --
testcases/kernel/syscalls/settimeofday/settimeofday02.c | 2 --
testcases/kernel/syscalls/setuid/setuid01.c | 2 --
testcases/kernel/syscalls/setuid/setuid03.c | 2 --
testcases/kernel/syscalls/setxattr/setxattr01.c | 2 --
testcases/kernel/syscalls/setxattr/setxattr02.c | 2 --
testcases/kernel/syscalls/setxattr/setxattr03.c | 2 --
testcases/kernel/syscalls/shutdown/shutdown01.c | 2 --
testcases/kernel/syscalls/shutdown/shutdown02.c | 2 --
testcases/kernel/syscalls/sigaltstack/sigaltstack02.c | 2 --
testcases/kernel/syscalls/sighold/sighold02.c | 2 --
testcases/kernel/syscalls/signal/signal01.c | 2 --
testcases/kernel/syscalls/signal/signal02.c | 2 --
testcases/kernel/syscalls/signal/signal03.c | 2 --
testcases/kernel/syscalls/signal/signal04.c | 2 --
testcases/kernel/syscalls/signal/signal05.c | 2 --
testcases/kernel/syscalls/signalfd/signalfd01.c | 2 --
testcases/kernel/syscalls/signalfd/signalfd02.c | 2 --
testcases/kernel/syscalls/sigsuspend/sigsuspend01.c | 2 --
testcases/kernel/syscalls/sigsuspend/sigsuspend02.c | 2 --
testcases/kernel/syscalls/socket/socket01.c | 2 --
testcases/kernel/syscalls/socket/socket02.c | 2 --
testcases/kernel/syscalls/socketcall/socketcall01.c | 2 --
testcases/kernel/syscalls/socketpair/socketpair01.c | 2 --
testcases/kernel/syscalls/socketpair/socketpair02.c | 2 --
testcases/kernel/syscalls/splice/splice02.c | 1 -
testcases/kernel/syscalls/splice/splice03.c | 2 --
testcases/kernel/syscalls/splice/splice06.c | 2 --
testcases/kernel/syscalls/splice/splice07.c | 2 --
testcases/kernel/syscalls/splice/splice08.c | 2 --
testcases/kernel/syscalls/splice/splice09.c | 2 --
testcases/kernel/syscalls/stat/stat01.c | 2 --
testcases/kernel/syscalls/stat/stat03.c | 2 --
testcases/kernel/syscalls/stat/stat04.c | 2 --
testcases/kernel/syscalls/statfs/statfs01.c | 2 --
testcases/kernel/syscalls/statfs/statfs02.c | 2 --
testcases/kernel/syscalls/statfs/statfs03.c | 2 --
testcases/kernel/syscalls/statmount/statmount01.c | 2 --
testcases/kernel/syscalls/statmount/statmount02.c | 2 --
testcases/kernel/syscalls/statmount/statmount03.c | 2 --
testcases/kernel/syscalls/statmount/statmount04.c | 2 --
testcases/kernel/syscalls/statmount/statmount05.c | 2 --
testcases/kernel/syscalls/statmount/statmount06.c | 2 --
testcases/kernel/syscalls/statmount/statmount07.c | 2 --
testcases/kernel/syscalls/statmount/statmount08.c | 2 --
testcases/kernel/syscalls/statvfs/statvfs01.c | 2 --
testcases/kernel/syscalls/statvfs/statvfs02.c | 2 --
testcases/kernel/syscalls/statx/statx01.c | 2 --
testcases/kernel/syscalls/statx/statx02.c | 2 --
testcases/kernel/syscalls/statx/statx03.c | 2 --
testcases/kernel/syscalls/statx/statx04.c | 2 --
testcases/kernel/syscalls/statx/statx05.c | 2 --
testcases/kernel/syscalls/statx/statx06.c | 2 --
testcases/kernel/syscalls/statx/statx07.c | 2 --
testcases/kernel/syscalls/statx/statx08.c | 2 --
testcases/kernel/syscalls/statx/statx09.c | 2 --
testcases/kernel/syscalls/statx/statx10.c | 2 --
testcases/kernel/syscalls/statx/statx11.c | 2 --
testcases/kernel/syscalls/statx/statx12.c | 2 --
testcases/kernel/syscalls/swapoff/swapoff01.c | 2 --
testcases/kernel/syscalls/swapoff/swapoff02.c | 2 --
testcases/kernel/syscalls/swapon/swapon01.c | 2 --
testcases/kernel/syscalls/swapon/swapon02.c | 2 --
testcases/kernel/syscalls/swapon/swapon03.c | 2 --
testcases/kernel/syscalls/symlink/symlink02.c | 2 --
testcases/kernel/syscalls/symlink/symlink04.c | 2 --
testcases/kernel/syscalls/sync_file_range/sync_file_range01.c | 2 --
testcases/kernel/syscalls/sync_file_range/sync_file_range02.c | 2 --
testcases/kernel/syscalls/syscall/syscall01.c | 2 --
testcases/kernel/syscalls/sysfs/sysfs01.c | 2 --
testcases/kernel/syscalls/sysfs/sysfs02.c | 2 --
testcases/kernel/syscalls/sysfs/sysfs03.c | 2 --
testcases/kernel/syscalls/sysfs/sysfs04.c | 2 --
testcases/kernel/syscalls/sysfs/sysfs05.c | 2 --
testcases/kernel/syscalls/syslog/syslog11.c | 2 --
testcases/kernel/syscalls/syslog/syslog12.c | 2 --
testcases/kernel/syscalls/tee/tee02.c | 2 --
testcases/kernel/syscalls/time/time01.c | 1 -
testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c | 2 --
testcases/kernel/syscalls/timerfd/timerfd02.c | 2 --
testcases/kernel/syscalls/timerfd/timerfd_create01.c | 2 --
testcases/kernel/syscalls/times/times01.c | 2 --
testcases/kernel/syscalls/tkill/tkill01.c | 2 --
testcases/kernel/syscalls/tkill/tkill02.c | 2 --
testcases/kernel/syscalls/truncate/truncate02.c | 2 --
testcases/kernel/syscalls/truncate/truncate03.c | 2 --
testcases/kernel/syscalls/umount/umount01.c | 2 --
testcases/kernel/syscalls/umount/umount02.c | 2 --
testcases/kernel/syscalls/umount/umount03.c | 2 --
testcases/kernel/syscalls/umount2/umount2_02.c | 2 --
testcases/kernel/syscalls/unlink/unlink05.c | 2 --
testcases/kernel/syscalls/unlink/unlink07.c | 2 --
testcases/kernel/syscalls/unlink/unlink08.c | 2 --
testcases/kernel/syscalls/unlink/unlink09.c | 2 --
testcases/kernel/syscalls/unlink/unlink10.c | 2 --
testcases/kernel/syscalls/unlinkat/unlinkat01.c | 1 -
testcases/kernel/syscalls/unshare/unshare01.c | 2 --
testcases/kernel/syscalls/unshare/unshare02.c | 2 --
testcases/kernel/syscalls/utime/utime01.c | 2 --
testcases/kernel/syscalls/utime/utime02.c | 2 --
testcases/kernel/syscalls/utime/utime03.c | 2 --
testcases/kernel/syscalls/utime/utime04.c | 2 --
testcases/kernel/syscalls/utime/utime05.c | 2 --
testcases/kernel/syscalls/utime/utime06.c | 2 --
testcases/kernel/syscalls/utime/utime07.c | 2 --
testcases/kernel/syscalls/utimensat/utimensat01.c | 2 --
testcases/kernel/syscalls/utimes/utimes01.c | 2 --
testcases/kernel/syscalls/vmsplice/vmsplice02.c | 2 --
testcases/kernel/syscalls/wait/wait01.c | 2 --
testcases/kernel/syscalls/wait/wait02.c | 2 --
testcases/kernel/syscalls/wait4/wait402.c | 2 --
testcases/kernel/syscalls/wait4/wait403.c | 2 --
testcases/kernel/syscalls/waitid/waitid01.c | 2 --
testcases/kernel/syscalls/waitid/waitid02.c | 2 --
testcases/kernel/syscalls/waitid/waitid03.c | 2 --
testcases/kernel/syscalls/waitid/waitid04.c | 2 --
testcases/kernel/syscalls/waitid/waitid05.c | 2 --
testcases/kernel/syscalls/waitid/waitid06.c | 2 --
testcases/kernel/syscalls/waitid/waitid07.c | 2 --
testcases/kernel/syscalls/waitid/waitid08.c | 2 --
testcases/kernel/syscalls/waitid/waitid09.c | 2 --
testcases/kernel/syscalls/waitid/waitid10.c | 2 --
testcases/kernel/syscalls/waitid/waitid11.c | 2 --
testcases/kernel/syscalls/waitpid/waitpid01.c | 2 --
testcases/kernel/syscalls/waitpid/waitpid03.c | 2 --
testcases/kernel/syscalls/waitpid/waitpid04.c | 2 --
testcases/kernel/syscalls/write/write02.c | 2 --
testcases/kernel/syscalls/write/write04.c | 2 --
testcases/kernel/syscalls/write/write05.c | 2 --
testcases/kernel/syscalls/write/write06.c | 2 --
testcases/kernel/syscalls/writev/writev03.c | 2 --
testcases/kernel/syscalls/writev/writev07.c | 2 --
testcases/kernel/uevents/uevent01.c | 1 -
testcases/kernel/uevents/uevent02.c | 2 --
testcases/kernel/uevents/uevent03.c | 1 -
testcases/kernel/watchqueue/wqueue01.c | 2 --
testcases/kernel/watchqueue/wqueue02.c | 2 --
testcases/kernel/watchqueue/wqueue03.c | 2 --
testcases/kernel/watchqueue/wqueue04.c | 2 --
testcases/kernel/watchqueue/wqueue05.c | 2 --
testcases/kernel/watchqueue/wqueue06.c | 2 --
testcases/kernel/watchqueue/wqueue07.c | 2 --
testcases/kernel/watchqueue/wqueue08.c | 2 --
testcases/kernel/watchqueue/wqueue09.c | 2 --
testcases/lib/tst_ns_create.c | 2 --
testcases/lib/tst_ns_exec.c | 2 --
testcases/lib/tst_ns_ifmove.c | 2 --
testcases/network/can/cve/can_bcm01.c | 2 --
testcases/network/iptables/nft02.c | 2 --
testcases/network/lib6/asapi_02.c | 2 --
testcases/network/lib6/getaddrinfo_01.c | 2 --
testcases/network/lib6/in6_01.c | 2 --
testcases/network/lib6/in6_02.c | 2 --
testcases/network/nfs/nfslock01/nfs_flock.c | 2 --
testcases/network/nfs/nfslock01/nfs_flock_dgen.c | 2 --
testcases/network/sctp/sctp_big_chunk.c | 2 --
testcases/network/sockets/vsock01.c | 2 --
testcases/realtime/func/matrix_mult/matrix_mult.c | 2 --
testcases/realtime/func/sched_football/sched_football.c | 2 --
973 files changed, 1907 deletions(-)
diff --git a/doc/developers/test_case_tutorial.rst b/doc/developers/test_case_tutorial.rst
index 1464f50d70..04820f2223 100644
--- a/doc/developers/test_case_tutorial.rst
+++ b/doc/developers/test_case_tutorial.rst
@@ -111,7 +111,6 @@ kernel version if necessary. I will explain what the code does below.
*/
/*\
- * [Description]
*
* All tests should start with a description of _what_ we are testing.
* Non-trivial explanations of _how_ the code works should also go here.
diff --git a/doc/old/C-Test-API.asciidoc b/doc/old/C-Test-API.asciidoc
index 8a531ccb0f..3fe9cd1d9e 100644
--- a/doc/old/C-Test-API.asciidoc
+++ b/doc/old/C-Test-API.asciidoc
@@ -17,7 +17,6 @@ Let's start with an example, following code is a simple test for a 'getenv()'.
[source,c]
-------------------------------------------------------------------------------
/*\
- * [Description]
* Tests basic functionality of getenv().
*
* - create an env variable and verify that getenv() can get it
diff --git a/include/tst_cgroup.h b/include/tst_cgroup.h
index d23a8e652b..3f4d30fa7c 100644
--- a/include/tst_cgroup.h
+++ b/include/tst_cgroup.h
@@ -5,8 +5,6 @@
* Copyright (c) 2020-2021 SUSE LLC <rpalethorpe@suse.com>
*/
/*\
- * [Description]
- *
* The LTP CGroups API tries to present a consistent interface to the
* many possible CGroup configurations a system could have.
*
diff --git a/lib/newlib_tests/tst_fuzzy_sync01.c b/lib/newlib_tests/tst_fuzzy_sync01.c
index 2d440df5b0..6c361e8cc3 100644
--- a/lib/newlib_tests/tst_fuzzy_sync01.c
+++ b/lib/newlib_tests/tst_fuzzy_sync01.c
@@ -3,8 +3,6 @@
* Copyright (c) 2021 Richard Palethorpe <rpalethorpe@suse.com>
*/
/*
- * [Description]
- *
* This verifies Fuzzy Sync's basic ability to reproduce a particular
* outcome to a data race when the critical sections are not aligned.
*
diff --git a/lib/newlib_tests/tst_fuzzy_sync02.c b/lib/newlib_tests/tst_fuzzy_sync02.c
index c81ebc7eaa..0a595b1e2b 100644
--- a/lib/newlib_tests/tst_fuzzy_sync02.c
+++ b/lib/newlib_tests/tst_fuzzy_sync02.c
@@ -3,8 +3,6 @@
* Copyright (c) 2021 Richard Palethorpe <rpalethorpe@suse.com>
*/
/*
- * [Description]
- *
* This verifies Fuzzy Sync's ability to reproduce a particular
* outcome to a data race when multiple races are present.
*
diff --git a/testcases/cve/cve-2014-0196.c b/testcases/cve/cve-2014-0196.c
index cd68e596cf..5e5b55e071 100644
--- a/testcases/cve/cve-2014-0196.c
+++ b/testcases/cve/cve-2014-0196.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2014-0196, which was fixed in kernel v3.15:
* 4291086b1f08 ("n_tty: Fix n_tty_write crash when echoing in raw mode").
*
diff --git a/testcases/cve/cve-2016-10044.c b/testcases/cve/cve-2016-10044.c
index 31c73f5347..d8d3598bbc 100644
--- a/testcases/cve/cve-2016-10044.c
+++ b/testcases/cve/cve-2016-10044.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2016-10044, which was fixed in kernel v4.8:
* 22f6b4d34fcf ("aio: mark AIO pseudo-fs noexec").
*
diff --git a/testcases/cve/cve-2016-7042.c b/testcases/cve/cve-2016-7042.c
index 7611f6638e..881f891d94 100644
--- a/testcases/cve/cve-2016-7042.c
+++ b/testcases/cve/cve-2016-7042.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2016-7042, this regression test can crash the buggy kernel
* when the stack-protector is enabled, and the bug was fixed in kernel v4.9:
* 03dab869b7b2 ("KEYS: Fix short sprintf buffer in /proc/keys show function").
diff --git a/testcases/cve/cve-2016-7117.c b/testcases/cve/cve-2016-7117.c
index 119eb2f9a9..dbec2b28bc 100644
--- a/testcases/cve/cve-2016-7117.c
+++ b/testcases/cve/cve-2016-7117.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2016-7117, which was fixed in kernel v4.6:
* 34b88a68f26a ("net: Fix use after free in the recvmmsg exit path").
*
diff --git a/testcases/cve/cve-2017-16939.c b/testcases/cve/cve-2017-16939.c
index ec23f10c64..098a868411 100644
--- a/testcases/cve/cve-2017-16939.c
+++ b/testcases/cve/cve-2017-16939.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2017-16939, which was fixed in kernel v4.14:
* 1137b5e2529a ("ipsec: Fix aborted xfrm policy dump crash").
*
diff --git a/testcases/cve/cve-2017-17052.c b/testcases/cve/cve-2017-17052.c
index 598cd9b52f..700eb782e1 100644
--- a/testcases/cve/cve-2017-17052.c
+++ b/testcases/cve/cve-2017-17052.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2017-17052, which was fixed in kernel v4.13:
* 2b7e8665b4ff ("fork: fix incorrect fput of ->exe_file causing use-after-free").
*
diff --git a/testcases/cve/cve-2017-17053.c b/testcases/cve/cve-2017-17053.c
index a6cf2551e4..fe7b6d694d 100644
--- a/testcases/cve/cve-2017-17053.c
+++ b/testcases/cve/cve-2017-17053.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2017-17053, which was fixed in kernel 4.13:
* ccd5b3235180 ("x86/mm: Fix use-after-free of ldt_struct").
*
diff --git a/testcases/cve/cve-2017-2618.c b/testcases/cve/cve-2017-2618.c
index 7d1aca15c2..98a998415e 100644
--- a/testcases/cve/cve-2017-2618.c
+++ b/testcases/cve/cve-2017-2618.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2017-2618, which was fixed in kernel v4.10:
* 0c461cb727d1 ("selinux: fix off-by-one in setprocattr").
*
diff --git a/testcases/cve/cve-2017-2671.c b/testcases/cve/cve-2017-2671.c
index 3c28317e2e..5d84252488 100644
--- a/testcases/cve/cve-2017-2671.c
+++ b/testcases/cve/cve-2017-2671.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2017-2671 faulty locking on ping socket fixed in kernel v4.11:
* 43a6684519ab ("ping: implement proper locking").
*
diff --git a/testcases/cve/cve-2022-4378.c b/testcases/cve/cve-2022-4378.c
index 95c0fa5170..e7e2b9af33 100644
--- a/testcases/cve/cve-2022-4378.c
+++ b/testcases/cve/cve-2022-4378.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2022-4378 fixed in kernel v6.1:
* bce9332220bd ("proc: proc_skip_spaces() shouldn't think it is working on C strings").
*
diff --git a/testcases/cve/icmp_rate_limit01.c b/testcases/cve/icmp_rate_limit01.c
index f71be0e081..0305ad0954 100644
--- a/testcases/cve/icmp_rate_limit01.c
+++ b/testcases/cve/icmp_rate_limit01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2020-25705 fixed in kernel v5.10:
* b38e7819cae9 ("icmp: randomize the global rate limiter").
*
diff --git a/testcases/cve/meltdown.c b/testcases/cve/meltdown.c
index c2145291d0..d2c40c1220 100644
--- a/testcases/cve/meltdown.c
+++ b/testcases/cve/meltdown.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2017-5754 (Meltdown).
*
* https://meltdownattack.com/
diff --git a/testcases/cve/stack_clash.c b/testcases/cve/stack_clash.c
index 8cc2c20b5b..8471e0638f 100644
--- a/testcases/cve/stack_clash.c
+++ b/testcases/cve/stack_clash.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This is a regression test of the Stack Clash [1] vulnerability. This tests
* that there is at least 256 PAGE_SIZE of stack guard gap which is considered
* hard to hop above. Code adapted from the Novell's bugzilla [2].
diff --git a/testcases/cve/tcindex01.c b/testcases/cve/tcindex01.c
index 4e4a62fdbd..370d7de495 100644
--- a/testcases/cve/tcindex01.c
+++ b/testcases/cve/tcindex01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* CVE-2023-1829
*
* Test for use-after-free after removing tcindex traffic filter with certain
diff --git a/testcases/kernel/containers/mountns/mountns01.c b/testcases/kernel/containers/mountns/mountns01.c
index 2205eb9689..2c1c978fdb 100644
--- a/testcases/kernel/containers/mountns/mountns01.c
+++ b/testcases/kernel/containers/mountns/mountns01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests a shared mount: shared mount can be replicated to as many
* mountpoints and all the replicas continue to be exactly same.
*
diff --git a/testcases/kernel/containers/mountns/mountns02.c b/testcases/kernel/containers/mountns/mountns02.c
index 56b1b4b6a2..cdc36068da 100644
--- a/testcases/kernel/containers/mountns/mountns02.c
+++ b/testcases/kernel/containers/mountns/mountns02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests a private mount: private mount does not forward or receive
* propagation.
*
diff --git a/testcases/kernel/containers/mountns/mountns03.c b/testcases/kernel/containers/mountns/mountns03.c
index cdceb00d05..2debfd1047 100644
--- a/testcases/kernel/containers/mountns/mountns03.c
+++ b/testcases/kernel/containers/mountns/mountns03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests a slave mount: slave mount is like a shared mount except that
* mount and umount events only propagate towards it.
*
diff --git a/testcases/kernel/containers/mountns/mountns04.c b/testcases/kernel/containers/mountns/mountns04.c
index 752d899205..b87fc8550d 100644
--- a/testcases/kernel/containers/mountns/mountns04.c
+++ b/testcases/kernel/containers/mountns/mountns04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests an unbindable mount: unbindable mount is an unbindable
* private mount.
*
diff --git a/testcases/kernel/containers/mqns/mqns_01.c b/testcases/kernel/containers/mqns/mqns_01.c
index d9f6e6c18a..30e06edf43 100644
--- a/testcases/kernel/containers/mqns/mqns_01.c
+++ b/testcases/kernel/containers/mqns/mqns_01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Create a mqueue inside the parent and check if it can be accessed from
* the child namespace. Isolated and unshared process can't access to parent,
* but plain process can.
diff --git a/testcases/kernel/containers/mqns/mqns_02.c b/testcases/kernel/containers/mqns/mqns_02.c
index aef83a23a6..dc1b215ddb 100644
--- a/testcases/kernel/containers/mqns/mqns_02.c
+++ b/testcases/kernel/containers/mqns/mqns_02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Create a mqueue with the same name in both parent and isolated/forked child,
* then check namespace isolation.
*/
diff --git a/testcases/kernel/containers/mqns/mqns_03.c b/testcases/kernel/containers/mqns/mqns_03.c
index 4a0399ddbc..4d3bfc52fb 100644
--- a/testcases/kernel/containers/mqns/mqns_03.c
+++ b/testcases/kernel/containers/mqns/mqns_03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test mqueuefs from an isolated/forked process namespace.
*
* [Algorithm]
diff --git a/testcases/kernel/containers/mqns/mqns_04.c b/testcases/kernel/containers/mqns/mqns_04.c
index 2d943e1b68..d28c330c4d 100644
--- a/testcases/kernel/containers/mqns/mqns_04.c
+++ b/testcases/kernel/containers/mqns/mqns_04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test mqueuefs manipulation from child/parent namespaces.
*
* [Algorithm]
diff --git a/testcases/kernel/containers/netns/netns_netlink.c b/testcases/kernel/containers/netns/netns_netlink.c
index ba55ec70ad..5246b066b9 100644
--- a/testcases/kernel/containers/netns/netns_netlink.c
+++ b/testcases/kernel/containers/netns/netns_netlink.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests a netlink interface inside a new network namespace.
*
* - Unshares a network namespace (so network related actions
diff --git a/testcases/kernel/containers/pidns/pidns01.c b/testcases/kernel/containers/pidns/pidns01.c
index 8b856ec90b..94b8f16d82 100644
--- a/testcases/kernel/containers/pidns/pidns01.c
+++ b/testcases/kernel/containers/pidns/pidns01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and check:
*
* - child process ID must be 1
diff --git a/testcases/kernel/containers/pidns/pidns02.c b/testcases/kernel/containers/pidns/pidns02.c
index f23178cb60..b5e2d607de 100644
--- a/testcases/kernel/containers/pidns/pidns02.c
+++ b/testcases/kernel/containers/pidns/pidns02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and check:
*
* - child session ID must be 1
diff --git a/testcases/kernel/containers/pidns/pidns03.c b/testcases/kernel/containers/pidns/pidns03.c
index d2a6178b9b..31fdb3e4e7 100644
--- a/testcases/kernel/containers/pidns/pidns03.c
+++ b/testcases/kernel/containers/pidns/pidns03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and check if procfs mounted folder
* belongs to the new pid namespace by looking at /proc/self .
*/
diff --git a/testcases/kernel/containers/pidns/pidns04.c b/testcases/kernel/containers/pidns/pidns04.c
index fdd532653e..ff106780ad 100644
--- a/testcases/kernel/containers/pidns/pidns04.c
+++ b/testcases/kernel/containers/pidns/pidns04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and check that child container does
* not get kill itself with SIGKILL.
*/
diff --git a/testcases/kernel/containers/pidns/pidns05.c b/testcases/kernel/containers/pidns/pidns05.c
index 7843fe7a97..b1666f233a 100644
--- a/testcases/kernel/containers/pidns/pidns05.c
+++ b/testcases/kernel/containers/pidns/pidns05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and create many levels of child
* containers. Then kill container init process from parent and check if all
* containers have been killed.
diff --git a/testcases/kernel/containers/pidns/pidns06.c b/testcases/kernel/containers/pidns/pidns06.c
index a71c844a39..b79a5d4010 100644
--- a/testcases/kernel/containers/pidns/pidns06.c
+++ b/testcases/kernel/containers/pidns/pidns06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and check that parent process can't
* be killed from child namespace.
*/
diff --git a/testcases/kernel/containers/pidns/pidns10.c b/testcases/kernel/containers/pidns/pidns10.c
index 7e798420ef..ab6a7a4acf 100644
--- a/testcases/kernel/containers/pidns/pidns10.c
+++ b/testcases/kernel/containers/pidns/pidns10.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and check that killing subprocesses
* from child namespace will raise ESRCH error.
*/
diff --git a/testcases/kernel/containers/pidns/pidns12.c b/testcases/kernel/containers/pidns/pidns12.c
index 1811dbc36b..4de4e3d101 100644
--- a/testcases/kernel/containers/pidns/pidns12.c
+++ b/testcases/kernel/containers/pidns/pidns12.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and verifies that siginfo->si_pid is
* set to 0 if sender (parent process) is not in the receiver's namespace.
*/
diff --git a/testcases/kernel/containers/pidns/pidns13.c b/testcases/kernel/containers/pidns/pidns13.c
index 65fcc4443d..5b836c01f4 100644
--- a/testcases/kernel/containers/pidns/pidns13.c
+++ b/testcases/kernel/containers/pidns/pidns13.c
@@ -9,8 +9,6 @@
*/
/*\
- * [Description]
- *
* The pidns13.c testcase checks container init, for async I/O
* triggered by peer namespace process.
*
diff --git a/testcases/kernel/containers/pidns/pidns16.c b/testcases/kernel/containers/pidns/pidns16.c
index 313b0a097b..8867a132b5 100644
--- a/testcases/kernel/containers/pidns/pidns16.c
+++ b/testcases/kernel/containers/pidns/pidns16.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and verifies that siginfo->si_pid is
* set to 0 if sender (parent process) sent the signal. Then send signal from
* container itself and check if siginfo->si_pid is set to 1.
diff --git a/testcases/kernel/containers/pidns/pidns17.c b/testcases/kernel/containers/pidns/pidns17.c
index 4633ec14b4..3a85d96725 100644
--- a/testcases/kernel/containers/pidns/pidns17.c
+++ b/testcases/kernel/containers/pidns/pidns17.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and spawn many children inside the
* container. Then terminate all children and check if they were signaled.
*/
diff --git a/testcases/kernel/containers/pidns/pidns20.c b/testcases/kernel/containers/pidns/pidns20.c
index 9148208659..aa00800003 100644
--- a/testcases/kernel/containers/pidns/pidns20.c
+++ b/testcases/kernel/containers/pidns/pidns20.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag, block SIGUSR1 signal before sending
* it from parent and check if it's received once SIGUSR1 signal is unblocked.
*/
diff --git a/testcases/kernel/containers/pidns/pidns30.c b/testcases/kernel/containers/pidns/pidns30.c
index 4a8bc5e2b8..409b37ec18 100644
--- a/testcases/kernel/containers/pidns/pidns30.c
+++ b/testcases/kernel/containers/pidns/pidns30.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag, register notification on a posix
* mqueue and send a mqueue message from the parent. Then check if signal
* notification contains si_pid of the parent.
diff --git a/testcases/kernel/containers/pidns/pidns31.c b/testcases/kernel/containers/pidns/pidns31.c
index 7312f8bdcb..a8d737091d 100644
--- a/testcases/kernel/containers/pidns/pidns31.c
+++ b/testcases/kernel/containers/pidns/pidns31.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag, register notification on a posix
* mqueue and send a mqueue message from the child. Then check if signal
* notification contains si_pid of the child.
diff --git a/testcases/kernel/containers/pidns/pidns32.c b/testcases/kernel/containers/pidns/pidns32.c
index 0738369b1d..3798f798be 100644
--- a/testcases/kernel/containers/pidns/pidns32.c
+++ b/testcases/kernel/containers/pidns/pidns32.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Clone a process with CLONE_NEWPID flag and check for the maxium amount of
* nested containers.
*/
diff --git a/testcases/kernel/containers/sysvipc/mesgq_nstest.c b/testcases/kernel/containers/sysvipc/mesgq_nstest.c
index 4b12c1ce1d..6c65c5500c 100644
--- a/testcases/kernel/containers/sysvipc/mesgq_nstest.c
+++ b/testcases/kernel/containers/sysvipc/mesgq_nstest.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test SysV IPC message passing through different namespaces.
*
* [Algorithm]
diff --git a/testcases/kernel/containers/sysvipc/msg_comm.c b/testcases/kernel/containers/sysvipc/msg_comm.c
index 3762adb02a..81bd096303 100644
--- a/testcases/kernel/containers/sysvipc/msg_comm.c
+++ b/testcases/kernel/containers/sysvipc/msg_comm.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test SysV IPC message passing through different processes.
*
* [Algorithm]
diff --git a/testcases/kernel/containers/sysvipc/sem_comm.c b/testcases/kernel/containers/sysvipc/sem_comm.c
index d8f0956a7a..ec67526215 100644
--- a/testcases/kernel/containers/sysvipc/sem_comm.c
+++ b/testcases/kernel/containers/sysvipc/sem_comm.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test SysV IPC semaphore usage between cloned processes.
*
* [Algorithm]
diff --git a/testcases/kernel/containers/sysvipc/sem_nstest.c b/testcases/kernel/containers/sysvipc/sem_nstest.c
index 35d55cbac3..133795f067 100644
--- a/testcases/kernel/containers/sysvipc/sem_nstest.c
+++ b/testcases/kernel/containers/sysvipc/sem_nstest.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test SysV IPC semaphore usage between namespaces.
*
* [Algorithm]
diff --git a/testcases/kernel/containers/sysvipc/semtest_2ns.c b/testcases/kernel/containers/sysvipc/semtest_2ns.c
index f03b18f72b..8c26dfd5ce 100644
--- a/testcases/kernel/containers/sysvipc/semtest_2ns.c
+++ b/testcases/kernel/containers/sysvipc/semtest_2ns.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test SysV IPC semaphore usage between namespaces and processes.
*
* [Algorithm]
diff --git a/testcases/kernel/containers/sysvipc/shm_comm.c b/testcases/kernel/containers/sysvipc/shm_comm.c
index e7ba8c8deb..30916deddc 100644
--- a/testcases/kernel/containers/sysvipc/shm_comm.c
+++ b/testcases/kernel/containers/sysvipc/shm_comm.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test if SysV IPC shared memory is properly working between two different
* namespaces.
*
diff --git a/testcases/kernel/containers/sysvipc/shmem_2nstest.c b/testcases/kernel/containers/sysvipc/shmem_2nstest.c
index a184cfcb4d..c984ee7269 100644
--- a/testcases/kernel/containers/sysvipc/shmem_2nstest.c
+++ b/testcases/kernel/containers/sysvipc/shmem_2nstest.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test if SysV IPC shared memory is properly used between two namespaces.
*
* [Algorithm]
diff --git a/testcases/kernel/containers/sysvipc/shmnstest.c b/testcases/kernel/containers/sysvipc/shmnstest.c
index 63ae62aa6d..aa576eb086 100644
--- a/testcases/kernel/containers/sysvipc/shmnstest.c
+++ b/testcases/kernel/containers/sysvipc/shmnstest.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test if SysV IPC shared memory with a specific key is shared between
* processes and namespaces.
*/
diff --git a/testcases/kernel/containers/userns/userns01.c b/testcases/kernel/containers/userns/userns01.c
index 6fe0cd6372..6ee9fa7d0c 100644
--- a/testcases/kernel/containers/userns/userns01.c
+++ b/testcases/kernel/containers/userns/userns01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that if a user ID has no mapping inside the namespace, user ID and
* group ID will be the value defined in the file /proc/sys/kernel/overflowuid
* (defaults to 65534) and /proc/sys/kernel/overflowgid (defaults to 65534). A
diff --git a/testcases/kernel/containers/userns/userns02.c b/testcases/kernel/containers/userns/userns02.c
index 3c8ce2133c..d71c5397ff 100644
--- a/testcases/kernel/containers/userns/userns02.c
+++ b/testcases/kernel/containers/userns/userns02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that the user ID and group ID, which are inside a container,
* can be modified by its parent process.
*/
diff --git a/testcases/kernel/containers/userns/userns03.c b/testcases/kernel/containers/userns/userns03.c
index fca858702b..8fdad59517 100644
--- a/testcases/kernel/containers/userns/userns03.c
+++ b/testcases/kernel/containers/userns/userns03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that /proc/PID/uid_map and /proc/PID/gid_map contains three values
* separated by white space:
*
diff --git a/testcases/kernel/containers/userns/userns04.c b/testcases/kernel/containers/userns/userns04.c
index d20041f062..1ca7bf6e3e 100644
--- a/testcases/kernel/containers/userns/userns04.c
+++ b/testcases/kernel/containers/userns/userns04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that if a namespace isn't another namespace's ancestor, the process in
* first namespace does not have the CAP_SYS_ADMIN capability in the second
* namespace and the setns() call fails.
diff --git a/testcases/kernel/containers/userns/userns05.c b/testcases/kernel/containers/userns/userns05.c
index e7a00af182..f94e7116c2 100644
--- a/testcases/kernel/containers/userns/userns05.c
+++ b/testcases/kernel/containers/userns/userns05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that if a process created via fork(2) or clone(2) without the
* CLONE_NEWUSER flag is a member of the same user namespace as its parent.
*
diff --git a/testcases/kernel/containers/userns/userns06.c b/testcases/kernel/containers/userns/userns06.c
index a270dafdcf..3a1909ce98 100644
--- a/testcases/kernel/containers/userns/userns06.c
+++ b/testcases/kernel/containers/userns/userns06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that when a process with non-zero user IDs performs an execve(),
* the process's capability sets are cleared.
* When a process with zero user IDs performs an execve(), the process's
diff --git a/testcases/kernel/containers/userns/userns07.c b/testcases/kernel/containers/userns/userns07.c
index 2217a5ed03..9e34a3d9bb 100644
--- a/testcases/kernel/containers/userns/userns07.c
+++ b/testcases/kernel/containers/userns/userns07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that the kernel allows at least 32 nested levels of user namespaces.
*/
diff --git a/testcases/kernel/containers/userns/userns08.c b/testcases/kernel/containers/userns/userns08.c
index 72d7f8d12d..fbe51c8a57 100644
--- a/testcases/kernel/containers/userns/userns08.c
+++ b/testcases/kernel/containers/userns/userns08.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Reproducer of CVE-2018-18955; broken uid/gid mapping for nested
* user namespaces with >5 ranges
*
diff --git a/testcases/kernel/containers/utsname/utsname01.c b/testcases/kernel/containers/utsname/utsname01.c
index fc5c1a271a..a72ad1c33c 100644
--- a/testcases/kernel/containers/utsname/utsname01.c
+++ b/testcases/kernel/containers/utsname/utsname01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Clone two plain processes and check if both read the same hostname.
*/
diff --git a/testcases/kernel/containers/utsname/utsname02.c b/testcases/kernel/containers/utsname/utsname02.c
index aa90596d43..b100d212cc 100644
--- a/testcases/kernel/containers/utsname/utsname02.c
+++ b/testcases/kernel/containers/utsname/utsname02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Clone two plain processes, change hostname in the first one then check if
* hostaname has changed inside the second one as well.
*/
diff --git a/testcases/kernel/containers/utsname/utsname03.c b/testcases/kernel/containers/utsname/utsname03.c
index e5a4a56dc3..0680058e79 100644
--- a/testcases/kernel/containers/utsname/utsname03.c
+++ b/testcases/kernel/containers/utsname/utsname03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Clone two processes using CLONE_NEWUTS, change hostname from the first
* container and check if hostname didn't change inside the second one.
*/
diff --git a/testcases/kernel/containers/utsname/utsname04.c b/testcases/kernel/containers/utsname/utsname04.c
index bf97880ba9..2bcf61156d 100644
--- a/testcases/kernel/containers/utsname/utsname04.c
+++ b/testcases/kernel/containers/utsname/utsname04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Drop root privileges, create a container with CLONE_NEWUTS and verify that
* we receive a permission error.
*/
diff --git a/testcases/kernel/controllers/cgroup/cgroup_core01.c b/testcases/kernel/controllers/cgroup/cgroup_core01.c
index 2e695deed7..11231fbf71 100644
--- a/testcases/kernel/controllers/cgroup/cgroup_core01.c
+++ b/testcases/kernel/controllers/cgroup/cgroup_core01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* When a task is writing to an fd opened by a different task, the perm check
* should use the credentials of the latter task.
*
diff --git a/testcases/kernel/controllers/cgroup/cgroup_core02.c b/testcases/kernel/controllers/cgroup/cgroup_core02.c
index b19bf2e58d..aba387197a 100644
--- a/testcases/kernel/controllers/cgroup/cgroup_core02.c
+++ b/testcases/kernel/controllers/cgroup/cgroup_core02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* When a task is writing to an fd opened by a different task, the perm check
* should use the cgroup namespace of the latter task.
*
diff --git a/testcases/kernel/controllers/cgroup/cgroup_core03.c b/testcases/kernel/controllers/cgroup/cgroup_core03.c
index c0c3485e66..49b8eff404 100644
--- a/testcases/kernel/controllers/cgroup/cgroup_core03.c
+++ b/testcases/kernel/controllers/cgroup/cgroup_core03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test is copied from kselftest
* tools/testing/selftests/cgroup/test_kill.c.
*
diff --git a/testcases/kernel/controllers/io/io_control01.c b/testcases/kernel/controllers/io/io_control01.c
index 8b20737c97..93e6aed87e 100644
--- a/testcases/kernel/controllers/io/io_control01.c
+++ b/testcases/kernel/controllers/io/io_control01.c
@@ -3,8 +3,6 @@
* Copyright (c) 2022 SUSE LLC <rpalethorpe@suse.com>
*/
/*\
- *
- * [Description]
*
* Perform some I/O on a file and check if at least some of it is
* recorded by the I/O controller.
diff --git a/testcases/kernel/controllers/memcg/memcontrol01.c b/testcases/kernel/controllers/memcg/memcontrol01.c
index f4fadacddd..f1f5a9df44 100644
--- a/testcases/kernel/controllers/memcg/memcontrol01.c
+++ b/testcases/kernel/controllers/memcg/memcontrol01.c
@@ -1,7 +1,5 @@
// SPDX-License-Identifier: GPL-2.0-only
/*\
- *
- * [Description]
*
* Conversion of the first kself test in cgroup/test_memcontrol.c.
* This test creates two nested cgroups with and without enabling the
diff --git a/testcases/kernel/controllers/memcg/memcontrol02.c b/testcases/kernel/controllers/memcg/memcontrol02.c
index aed6410841..2d47e50427 100644
--- a/testcases/kernel/controllers/memcg/memcontrol02.c
+++ b/testcases/kernel/controllers/memcg/memcontrol02.c
@@ -1,7 +1,5 @@
// SPDX-License-Identifier: GPL-2.0-only
/*\
- *
- * [Description]
*
* Conversion of second kself test in cgroup/test_memcontrol.c.
*
diff --git a/testcases/kernel/controllers/memcg/memcontrol03.c b/testcases/kernel/controllers/memcg/memcontrol03.c
index 6d9c490b58..b5bbb99545 100644
--- a/testcases/kernel/controllers/memcg/memcontrol03.c
+++ b/testcases/kernel/controllers/memcg/memcontrol03.c
@@ -1,7 +1,5 @@
// SPDX-License-Identifier: GPL-2.0-only
/*\
- *
- * [Description]
*
* Conversion of the third kself test in cgroup/test_memcontrol.c.
*
diff --git a/testcases/kernel/controllers/memcg/memcontrol04.c b/testcases/kernel/controllers/memcg/memcontrol04.c
index 1b8d115f8c..1b5425faaa 100644
--- a/testcases/kernel/controllers/memcg/memcontrol04.c
+++ b/testcases/kernel/controllers/memcg/memcontrol04.c
@@ -1,7 +1,5 @@
// SPDX-License-Identifier: GPL-2.0-only
/*\
- *
- * [Description]
*
* Conversion of the forth kself test in cgroup/test_memcontrol.c.
*
diff --git a/testcases/kernel/device-drivers/block/block_dev_user/block_dev.c b/testcases/kernel/device-drivers/block/block_dev_user/block_dev.c
index 38ec1d6d61..cd900d8074 100644
--- a/testcases/kernel/device-drivers/block/block_dev_user/block_dev.c
+++ b/testcases/kernel/device-drivers/block/block_dev_user/block_dev.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test checks block device kernel API.
*/
diff --git a/testcases/kernel/device-drivers/rtc/rtc02.c b/testcases/kernel/device-drivers/rtc/rtc02.c
index dbac11b853..34509abc13 100644
--- a/testcases/kernel/device-drivers/rtc/rtc02.c
+++ b/testcases/kernel/device-drivers/rtc/rtc02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* RTC device set time function test.
*
* [Algorithm]
diff --git a/testcases/kernel/device-drivers/zram/zram03.c b/testcases/kernel/device-drivers/zram/zram03.c
index 1df3325ec1..8cf26de4c6 100644
--- a/testcases/kernel/device-drivers/zram/zram03.c
+++ b/testcases/kernel/device-drivers/zram/zram03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* zram: generic RAM based compressed R/W block devices
* http://lkml.org/lkml/2010/8/9/227
*
diff --git a/testcases/kernel/fs/fsplough/fsplough.c b/testcases/kernel/fs/fsplough/fsplough.c
index f18a2df1b4..65db3738ea 100644
--- a/testcases/kernel/fs/fsplough/fsplough.c
+++ b/testcases/kernel/fs/fsplough/fsplough.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Write data into a test file using various methods and verify that file
* contents match what was written.
*/
diff --git a/testcases/kernel/fs/fsx-linux/fsx-linux.c b/testcases/kernel/fs/fsx-linux/fsx-linux.c
index ac3b06ff77..2e0f17a5ec 100644
--- a/testcases/kernel/fs/fsx-linux/fsx-linux.c
+++ b/testcases/kernel/fs/fsx-linux/fsx-linux.c
@@ -13,8 +13,6 @@
*/
/*\
- * [Description]
- *
* This is a complete rewrite of the old fsx-linux tool, created by
* NeXT Computer, Inc. and Apple Computer, Inc. between 1991 and 2001,
* then adapted for LTP. Test is actually a file system exerciser: we bring a
diff --git a/testcases/kernel/fs/squashfs/squashfs01.c b/testcases/kernel/fs/squashfs/squashfs01.c
index 502de419df..fbcb765826 100644
--- a/testcases/kernel/fs/squashfs/squashfs01.c
+++ b/testcases/kernel/fs/squashfs/squashfs01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Kernel commits
*
* - f37aa4c7366 (squashfs: add more sanity checks in id lookup)
diff --git a/testcases/kernel/input/input01.c b/testcases/kernel/input/input01.c
index 5e85133028..e57b041e22 100644
--- a/testcases/kernel/input/input01.c
+++ b/testcases/kernel/input/input01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that /dev/input/eventX receive events sent from a virtual device,
* that in our case is a mouse.
*/
diff --git a/testcases/kernel/input/input02.c b/testcases/kernel/input/input02.c
index 8e48f12d9a..f4f6543a1d 100644
--- a/testcases/kernel/input/input02.c
+++ b/testcases/kernel/input/input02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that /dev/input/eventX won't receive any event sent from a virtual
* device, that in our case is a mouse, when the event device has been grabbed
* by an another process.
diff --git a/testcases/kernel/input/input03.c b/testcases/kernel/input/input03.c
index 2e6161beef..5229379cf0 100644
--- a/testcases/kernel/input/input03.c
+++ b/testcases/kernel/input/input03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that /dev/input/mice receive events sent from a virtual device,
* that in our case is a mouse. The events are a sequence of mouse right click.
*/
diff --git a/testcases/kernel/input/input04.c b/testcases/kernel/input/input04.c
index fb13500fe6..0f05404c47 100644
--- a/testcases/kernel/input/input04.c
+++ b/testcases/kernel/input/input04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that /dev/input/eventX doesn't receive any event sent from a virtual
* device, that in our case is a mouse, when relative move is (0, 0)
*/
diff --git a/testcases/kernel/input/input05.c b/testcases/kernel/input/input05.c
index fa37ac7acb..19cf8f1c15 100644
--- a/testcases/kernel/input/input05.c
+++ b/testcases/kernel/input/input05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that /dev/input/eventX doesn't receive any event sent from a virtual
* device, that in our case is a mouse, when events not advertised in the input
* device bits are filtered.
diff --git a/testcases/kernel/input/input06.c b/testcases/kernel/input/input06.c
index d3584a2b0b..969c90f636 100644
--- a/testcases/kernel/input/input06.c
+++ b/testcases/kernel/input/input06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that auto-repeat is working on a virtual device, that in our case
* it's a keyboard.
*/
diff --git a/testcases/kernel/io/ltp-aiodio/aio-stress.c b/testcases/kernel/io/ltp-aiodio/aio-stress.c
index e84308d1d0..469769d5a1 100644
--- a/testcases/kernel/io/ltp-aiodio/aio-stress.c
+++ b/testcases/kernel/io/ltp-aiodio/aio-stress.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test creates a series of files and start AIO operations on them.
* AIO is done in a rotating loop: first file1.bin gets 8 requests, then
* file2.bin, then file3.bin etc. As each file finishes writing, test switches
diff --git a/testcases/kernel/io/ltp-aiodio/aiocp.c b/testcases/kernel/io/ltp-aiodio/aiocp.c
index c201505ae9..2a4afe1102 100644
--- a/testcases/kernel/io/ltp-aiodio/aiocp.c
+++ b/testcases/kernel/io/ltp-aiodio/aiocp.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Copy file by using an async I/O state machine.
*
* - Start read request
diff --git a/testcases/kernel/io/ltp-aiodio/aiodio_append.c b/testcases/kernel/io/ltp-aiodio/aiodio_append.c
index e6280d3e8a..f1e7025fe0 100644
--- a/testcases/kernel/io/ltp-aiodio/aiodio_append.c
+++ b/testcases/kernel/io/ltp-aiodio/aiodio_append.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Append zeroed data to a file using libaio while other processes are doing
* buffered reads and check if the buffer reads always see zero.
*/
diff --git a/testcases/kernel/io/ltp-aiodio/aiodio_sparse.c b/testcases/kernel/io/ltp-aiodio/aiodio_sparse.c
index 8f41fdbe1e..c4878f2762 100644
--- a/testcases/kernel/io/ltp-aiodio/aiodio_sparse.c
+++ b/testcases/kernel/io/ltp-aiodio/aiodio_sparse.c
@@ -10,8 +10,6 @@
*/
/*\
- * [Description]
- *
* Create a sparse file and write zeroes to it using libaio while other
* processes are doing buffered reads and check if the buffer reads always see
* zero.
diff --git a/testcases/kernel/io/ltp-aiodio/dio_append.c b/testcases/kernel/io/ltp-aiodio/dio_append.c
index 16bed5db2b..1febafb8e1 100644
--- a/testcases/kernel/io/ltp-aiodio/dio_append.c
+++ b/testcases/kernel/io/ltp-aiodio/dio_append.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Appends zeroed data to a file using O_DIRECT while a child processes are
* doing buffered reads after seeking to the end of the file and checks if the
* buffer reads always see zero.
diff --git a/testcases/kernel/io/ltp-aiodio/dio_read.c b/testcases/kernel/io/ltp-aiodio/dio_read.c
index e6d1b74383..f9587ef3de 100644
--- a/testcases/kernel/io/ltp-aiodio/dio_read.c
+++ b/testcases/kernel/io/ltp-aiodio/dio_read.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Create a file using buffered writes while other processes are doing
* O_DIRECT reads and check if the buffer reads always see zero.
*/
diff --git a/testcases/kernel/io/ltp-aiodio/dio_sparse.c b/testcases/kernel/io/ltp-aiodio/dio_sparse.c
index 755668220b..c87e5ab1ac 100644
--- a/testcases/kernel/io/ltp-aiodio/dio_sparse.c
+++ b/testcases/kernel/io/ltp-aiodio/dio_sparse.c
@@ -11,8 +11,6 @@
*/
/*\
- * [Description]
- *
* Create a sparse file using O_DIRECT while other processes are doing
* buffered reads and check if the buffer reads always see zero.
*/
diff --git a/testcases/kernel/io/ltp-aiodio/dio_truncate.c b/testcases/kernel/io/ltp-aiodio/dio_truncate.c
index 69799e6a21..d4e7d9ea0e 100644
--- a/testcases/kernel/io/ltp-aiodio/dio_truncate.c
+++ b/testcases/kernel/io/ltp-aiodio/dio_truncate.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test is mixing direct I/O and truncate operations checking if they can
* be used together at the same time. Multiple children are spawned to read a
* file that is written to using direct I/O and truncated in a loop.
diff --git a/testcases/kernel/irq/irqbalance01.c b/testcases/kernel/irq/irqbalance01.c
index 96bbec6a8f..f7c6b02785 100644
--- a/testcases/kernel/irq/irqbalance01.c
+++ b/testcases/kernel/irq/irqbalance01.c
@@ -1,8 +1,6 @@
// SPDX-License-Identifier: GPL-2.0-or-later
/* Copyright (c) 2021 SUSE LLC <rpalethorpe@suse.com> */
/*\
- * [Description]
- *
* Check that something (e.g. irqbalance daemon) is performing IRQ
* load balancing.
*
diff --git a/testcases/kernel/kvm/kvm_svm04.c b/testcases/kernel/kvm/kvm_svm04.c
index e69f0d4be9..75fcbfdcfc 100644
--- a/testcases/kernel/kvm/kvm_svm04.c
+++ b/testcases/kernel/kvm/kvm_svm04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Functional test for VMSAVE/VMLOAD instructions in KVM environment. Verify
* that both instructions save/load the CPU state according to CPU
* documentation.
diff --git a/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c b/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c
index b7ab4e035f..53fef3ddb1 100644
--- a/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c
+++ b/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It tests alignment of fallocate arguments. fallocate will take non-huge
* page aligned offsets and addresses. However, operations are only
* performed on huge pages. This is different that than fallocate
diff --git a/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c b/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c
index d03f43d670..1f7c4dcc69 100644
--- a/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c
+++ b/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It tests basic fallocate functionality in hugetlbfs. Preallocate huge
* pages to a file in hugetlbfs, and then remove the pages via hole punch.
*/
diff --git a/testcases/kernel/mem/hugetlb/hugefork/hugefork01.c b/testcases/kernel/mem/hugetlb/hugefork/hugefork01.c
index 2404ffad12..54603b98b7 100644
--- a/testcases/kernel/mem/hugetlb/hugefork/hugefork01.c
+++ b/testcases/kernel/mem/hugetlb/hugefork/hugefork01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This checks copy-on-write semantics, specifically the semantics of a
* MAP_PRIVATE mapping across a fork(). Some versions of the powerpc
* kernel had a bug in huge_ptep_set_wrprotect() which would fail to
diff --git a/testcases/kernel/mem/hugetlb/hugefork/hugefork02.c b/testcases/kernel/mem/hugetlb/hugefork/hugefork02.c
index de495f0872..cafeaa242f 100644
--- a/testcases/kernel/mem/hugetlb/hugefork/hugefork02.c
+++ b/testcases/kernel/mem/hugetlb/hugefork/hugefork02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test shared memory behavior when multiple threads are attached to a
* segment. A segment is created and then children are spawned which
* attach, write, read (verify), and detach from the shared memory segment.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c
index 5032e05eca..1ac989487d 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c
@@ -9,8 +9,6 @@
*/
/*\
- * [Description]
- *
* There is a race condition if we map a same file on different processes.
* Region tracking is protected by mmap_sem and hugetlb_instantiation_mutex.
* When we do mmap, we don't grab a hugetlb_instantiation_mutex, but only
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c
index 663d925f4b..5a965e1828 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Certain kernels have a bug where brk() does not perform the same
* checks that a MAP_FIXED mmap() will, allowing brk() to create a
* normal page VMA in a hugepage only address region. This can lead
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c
index e3dd430879..b9d61dd660 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Some kernel versions after hugepage demand allocation was added used a
* dubious heuristic to check if there was enough hugepage space available
* for a given mapping. The number of not-already-instantiated pages in
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c
index 2a80edca93..10f64674da 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test sanity of cow optimization on page cache. If a page in page cache
* has only 1 ref count, it is mapped for a private mapping directly and
* is overwritten freely, so next time we access the page, we can see
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c
index f918d5e2e6..e1795153db 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This Test perform mmap, munmap and write operation on hugetlb file
* based mapping. Mapping can be shared or private. and it checks for
* Hugetlb counter (Total, Free, Reserve, Surplus) in /proc/meminfo and
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c
index a98594af67..087e8c6914 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This Test perform Direct Write/Read from/To hugetlbfs file
* which is mapped to process address space. The test is checking if it
* succeeds and data written or read is not corrupted.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c
index 848986ceaa..523ea90253 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* fadvise() on some kernels can cause the reservation counter to get
* corrupted. The problem is that the patches are allocated for the
* reservation but not faulted in at the time of allocation. The counters
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c
index 06b5f8e080..ab57da546e 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* On some old ppc64 kernel, when hpage is mmaped on 32 bit boundary and
* normal page below it, it triggers the bug caused by off-by-one error.
*
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c
index d262b65b20..2447d6782e 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c
@@ -5,7 +5,6 @@
*/
/*\
- * [Description]
* On some old ppc64 kernel, when huge page is mapped at below touching
* 32 bit boundary (4GB - hpage_size), and normal page is mmaped
* at just above it, it triggers a bug caused by off-by-one error.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c
index ecfd51d0c1..f9fd226940 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Older ppc64 kernels don't properly flush dcache to icache before
* giving a cleared page to userspace. With some exceedingly
* hairy code, this attempts to test for this bug.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c
index e0238636bb..bd5fae5c99 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* madvise() on some kernels can cause the reservation counter to get
* corrupted. The problem is that the patches are allocated
* for the reservation but not faulted in at the time of allocation. The
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c
index afd7ad3f77..45796decd4 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Just as normal mmap()s can't have an address, length or offset which
* is not page aligned, so hugepage mmap()s can't have an address, length
* or offset with is not hugepage aligned.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c
index 3d3a958669..313efb4bc9 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* The test checks that mlocking hugetlb areas works with all combinations
* of MAP_PRIVATE and MAP_SHARED with and without MAP_LOCKED specified.
*/
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c
index faebbd228d..3792cff89c 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests copy-on-write semantics of large pages where a number of threads
* map the same file with the MAP_PRIVATE flag. The threads then write
* into their copy of the mapping and recheck the contents to ensure they
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c
index d9be8113ec..78e4a3bf99 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This baseline test validates that a mapping of a certain size can be
* created, correctly. Once created, all the pages are filled with a
* pattern and rechecked to test for corruption. The mapping is then
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c
index 3bcba0580b..86157d262b 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test uses mprotect to change protection of hugepage mapping and
* perform read/write operation. It checks if the operation results in
* expected behaviour as per the protection.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c
index ab6a3310ac..0de44d58ad 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Kernel has bug in mremap for some architecture. mremap() can cause
* crashes on architectures with holes in the address space (like ia64)
* and on powerpc with it's distict page size slices.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c
index 1ad8a41418..7d9fd0b603 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* The kernel has bug for mremap() on some architecture. mremap() can
* cause crashes on architectures with holes in the address space
* (like ia64) and on powerpc with it's distinct page size "slices".
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c
index 21be2d376b..cd60d74035 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test Description: The kernel has bug for mremap() on some architecture.
* mremap() can cause crashes on architectures with holes in the address
* space (like ia64) and on powerpc with it's distinct page size "slices".
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c
index bafae1ca86..f79258da6d 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test to preserve a reserved page against no-reserved mapping. If all
* hugepages are reserved, access to no-reserved shared mapping cause a
* process die, instead of stealing a hugepage which is reserved for other
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c
index 660c93953a..48cedd158c 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test to correct handling for reserve count. If no reserved mapping is
* created to reserved file region, it should be considered as reserve
* mapping. Otherwise, reserve count will be overflowed.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c
index 67857615a0..f049745006 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* The test do mmap() with shared mapping and write. It matches the data
* with private mmap() and then change it with other data. It checks
* shared mapping data if data is not contaiminated by private mapping.
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c
index 61b28c781d..a624f4a262 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* readahead() on some kernels can cause the reservation counter to get
* corrupted. The problem is that the pages are allocated for the
* reservation but not faulted in at the time of allocation. The
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c
index 171dbb0700..57367b6419 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test is basic shared mapping test. Two shared mappings are created
* with same offset on a file. It checks if writing to one mapping can be
* seen to other mapping or not?
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c
index d27e5b8b2d..188ee2176b 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Before kernel version 5.10-rc7, there was a bug that resulted in a "Bad Page
* State" error when freeing gigantic hugepages. This happened because the
* struct page entry compound_nr, which overlapped with page->mapping in the
diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c
index 3b92c95654..bf2b356426 100644
--- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c
+++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* On PowerPC, the address space is divided into segments. These segments can
* contain either huge pages or normal pages, but not both. All segments are
* initially set up to map normal pages. When a huge page mapping is created
diff --git a/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c b/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c
index 04325ce104..bd4437b130 100644
--- a/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c
+++ b/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test the IPC_STAT, IPC_SET and IPC_RMID commands used by shmctl().
*/
diff --git a/testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c b/testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c
index 998b85e9ce..ca93ae6d81 100644
--- a/testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c
+++ b/testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This testcase creates shared memory segments backed by hugepages,
* writes specific patterns to each segment, verifies pattern,
* and detaches a shared memory segments in a loop.
diff --git a/testcases/kernel/mem/ksm/ksm04.c b/testcases/kernel/mem/ksm/ksm04.c
index 7b478c46db..35bbe3d720 100644
--- a/testcases/kernel/mem/ksm/ksm04.c
+++ b/testcases/kernel/mem/ksm/ksm04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Prerequisites:
*
* ksm and ksmtuned daemons need to be disabled. Otherwise, it could
diff --git a/testcases/kernel/mem/ksm/ksm06.c b/testcases/kernel/mem/ksm/ksm06.c
index 80fdf1e472..cd07605a20 100644
--- a/testcases/kernel/mem/ksm/ksm06.c
+++ b/testcases/kernel/mem/ksm/ksm06.c
@@ -3,8 +3,6 @@
* Copyright (C) 2013-2017 Red Hat, Inc.
*/
/*\
- * [Description]
- *
* The case is designed to test sysfs boolean knob
* /sys/kernel/mm/ksm/merge_across_nodes.
*
diff --git a/testcases/kernel/mem/ksm/ksm07.c b/testcases/kernel/mem/ksm/ksm07.c
index 619bd7b559..92b8b504ea 100644
--- a/testcases/kernel/mem/ksm/ksm07.c
+++ b/testcases/kernel/mem/ksm/ksm07.c
@@ -3,8 +3,6 @@
* Copyright (C) 2023 Red Hat, Inc.
*/
/*\
- * [Description]
- *
* Kernel Samepage Merging (KSM) for smart scan feature
*
* Test allocates a page and fills it with 'a' characters. It captures the
diff --git a/testcases/kernel/mem/mmapstress/mmapstress01.c b/testcases/kernel/mem/mmapstress/mmapstress01.c
index 5ba09208d6..a0ef9a6b58 100644
--- a/testcases/kernel/mem/mmapstress/mmapstress01.c
+++ b/testcases/kernel/mem/mmapstress/mmapstress01.c
@@ -6,7 +6,6 @@
* 10/03/2022 Refactor to LTP framework edliaw@google.com
*/
/*\
- * [Description]
* This test stresses mmaps, without dealing with fragments or anything!
* It forks a specified number of children,
* all of whom mmap the same file, make a given number of accesses
diff --git a/testcases/kernel/mem/oom/oom01.c b/testcases/kernel/mem/oom/oom01.c
index ddb9044598..bc1e25159f 100644
--- a/testcases/kernel/mem/oom/oom01.c
+++ b/testcases/kernel/mem/oom/oom01.c
@@ -4,8 +4,6 @@
* Copyright (c) Linux Test Project, 2011-2023
*/
/*\
- * [Description]
- *
* Out Of Memory (OOM) test
*/
diff --git a/testcases/kernel/mem/oom/oom02.c b/testcases/kernel/mem/oom/oom02.c
index 50b514cb4a..96c51d90a4 100644
--- a/testcases/kernel/mem/oom/oom02.c
+++ b/testcases/kernel/mem/oom/oom02.c
@@ -4,8 +4,6 @@
* Copyright (c) Linux Test Project, 2011-2023
*/
/*\
- * [Description]
- *
* Out Of Memory (OOM) test for mempolicy - need NUMA system support
*/
diff --git a/testcases/kernel/mem/oom/oom03.c b/testcases/kernel/mem/oom/oom03.c
index 873a6d84c5..89984b86f8 100644
--- a/testcases/kernel/mem/oom/oom03.c
+++ b/testcases/kernel/mem/oom/oom03.c
@@ -4,8 +4,6 @@
* Copyright (c) Linux Test Project, 2011-2023
*/
/*\
- * [Description]
- *
* Out Of Memory (OOM) test for Memory Resource Controller
*/
diff --git a/testcases/kernel/mem/oom/oom04.c b/testcases/kernel/mem/oom/oom04.c
index 94e70f3c54..54efd7592f 100644
--- a/testcases/kernel/mem/oom/oom04.c
+++ b/testcases/kernel/mem/oom/oom04.c
@@ -4,8 +4,6 @@
* Copyright (c) Linux Test Project, 2011-2023
*/
/*\
- * [Description]
- *
* Out Of Memory (OOM) test for CPUSET
*/
diff --git a/testcases/kernel/mem/oom/oom05.c b/testcases/kernel/mem/oom/oom05.c
index 16e4018cf7..1a1b571608 100644
--- a/testcases/kernel/mem/oom/oom05.c
+++ b/testcases/kernel/mem/oom/oom05.c
@@ -4,8 +4,6 @@
* Copyright (c) Linux Test Project, 2014-2023
*/
/*\
- * [Description]
- *
* Out Of Memory (OOM) test for MEMCG and CPUSET
*/
diff --git a/testcases/kernel/mem/swapping/swapping01.c b/testcases/kernel/mem/swapping/swapping01.c
index df1dcdf56d..d3bdda5669 100644
--- a/testcases/kernel/mem/swapping/swapping01.c
+++ b/testcases/kernel/mem/swapping/swapping01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Detect heavy swapping during first time swap use.
*
* This case is used for testing kernel commit:
diff --git a/testcases/kernel/mem/thp/thp01.c b/testcases/kernel/mem/thp/thp01.c
index 69825b0f99..ce36aa9774 100644
--- a/testcases/kernel/mem/thp/thp01.c
+++ b/testcases/kernel/mem/thp/thp01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This is a reproducer of CVE-2011-0999, which fixed by mainline commit
* a7d6e4ecdb76 ("thp: prevent hugepages during args/env copying into the user stack")
*
diff --git a/testcases/kernel/mem/thp/thp02.c b/testcases/kernel/mem/thp/thp02.c
index 56568d1d18..7ae053f35a 100644
--- a/testcases/kernel/mem/thp/thp02.c
+++ b/testcases/kernel/mem/thp/thp02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for detecting mremap bug when THP is enabled.
*
* There was a bug in mremap THP support, sometimes causing crash
diff --git a/testcases/kernel/pty/ptem01.c b/testcases/kernel/pty/ptem01.c
index 6040ee9bc3..3c364b24ae 100644
--- a/testcases/kernel/pty/ptem01.c
+++ b/testcases/kernel/pty/ptem01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that it's possible to open a pseudo-terminal via /dev/ptmx, obtain a
* slave device and configure termos/termios ioctls.
*/
diff --git a/testcases/kernel/pty/ptem02.c b/testcases/kernel/pty/ptem02.c
index 0fc69aa1d8..ee02d20ed4 100644
--- a/testcases/kernel/pty/ptem02.c
+++ b/testcases/kernel/pty/ptem02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that it's possible to open a pseudo-terminal via /dev/ptmx, obtain a
* slave device and set/get window size.
*/
diff --git a/testcases/kernel/pty/ptem03.c b/testcases/kernel/pty/ptem03.c
index fb0fdf6612..d284371f80 100644
--- a/testcases/kernel/pty/ptem03.c
+++ b/testcases/kernel/pty/ptem03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that it's possible to open a pseudo-terminal via /dev/ptmx, obtain a
* slave device and to send a break to both master and slave.
*/
diff --git a/testcases/kernel/pty/ptem04.c b/testcases/kernel/pty/ptem04.c
index 675e6b816d..14249448f4 100644
--- a/testcases/kernel/pty/ptem04.c
+++ b/testcases/kernel/pty/ptem04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that it's possible to open a pseudo-terminal via /dev/ptmx, obtain a
* slave device and to check if it's possible to open it multiple times.
*/
diff --git a/testcases/kernel/pty/ptem05.c b/testcases/kernel/pty/ptem05.c
index 9357c469ca..7c4377c372 100644
--- a/testcases/kernel/pty/ptem05.c
+++ b/testcases/kernel/pty/ptem05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that it's possible to open a pseudo-terminal via /dev/ptmx, to obtain
* a master + slave pair and to open them multiple times.
*/
diff --git a/testcases/kernel/pty/ptem06.c b/testcases/kernel/pty/ptem06.c
index 810b7c1d6a..6845b88fe1 100644
--- a/testcases/kernel/pty/ptem06.c
+++ b/testcases/kernel/pty/ptem06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that it's possible to open a pseudo-terminal via /dev/ptmx, to obtain
* a slave device and to set baudrate to B0 (which means hang up).
*/
diff --git a/testcases/kernel/pty/pty01.c b/testcases/kernel/pty/pty01.c
index d804a8d635..99f8d32d3d 100644
--- a/testcases/kernel/pty/pty01.c
+++ b/testcases/kernel/pty/pty01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that write/read is properly working when master and slave
* pseudo terminals communicate with each other.
*/
diff --git a/testcases/kernel/pty/pty03.c b/testcases/kernel/pty/pty03.c
index 883a539d53..229aa13934 100644
--- a/testcases/kernel/pty/pty03.c
+++ b/testcases/kernel/pty/pty03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test based on Syzkaller reproducer:
* https://syzkaller.appspot.com/bug?id=680c24ff647dd7241998e19da52e8136d2fd3523
*
diff --git a/testcases/kernel/pty/pty06.c b/testcases/kernel/pty/pty06.c
index 4309163550..00cc6a9848 100644
--- a/testcases/kernel/pty/pty06.c
+++ b/testcases/kernel/pty/pty06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test based on Syzkaller reproducer:
* https://syzkaller.appspot.com/bug?extid=522643ab5729b0421998
*
diff --git a/testcases/kernel/pty/pty07.c b/testcases/kernel/pty/pty07.c
index ebd5b16077..1a1c5871b7 100644
--- a/testcases/kernel/pty/pty07.c
+++ b/testcases/kernel/pty/pty07.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* The VT_DISALLOCATE ioctl can free a virtual console while VT_RESIZEX ioctl is
* still running, causing a use-after-free in vt_ioctl(). Because VT_RESIZEX ioctl
* have not make sure vc_cons[i].d is not NULL after grabbing console_lock().
diff --git a/testcases/kernel/pty/pty08.c b/testcases/kernel/pty/pty08.c
index 45e99d18ba..2b8f7152e2 100644
--- a/testcases/kernel/pty/pty08.c
+++ b/testcases/kernel/pty/pty08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that slave pseudo-terminal fails reading/writing if master has been
* closed.
*/
diff --git a/testcases/kernel/pty/pty09.c b/testcases/kernel/pty/pty09.c
index 1e477869b0..f3ade23818 100644
--- a/testcases/kernel/pty/pty09.c
+++ b/testcases/kernel/pty/pty09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that slave pseudo-terminal can be opened multiple times in parallel.
*/
diff --git a/testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c b/testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c
index aa137eb67d..e52858f8e2 100644
--- a/testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c
+++ b/testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Creates a multi-level CGroup hierarchy with the cpu controller
* enabled. The leaf groups are populated with "busy" processes which
* simulate intermittent cpu load. They spin for some time then sleep
diff --git a/testcases/kernel/sched/cfs-scheduler/starvation.c b/testcases/kernel/sched/cfs-scheduler/starvation.c
index 27bf77f393..045254ba41 100644
--- a/testcases/kernel/sched/cfs-scheduler/starvation.c
+++ b/testcases/kernel/sched/cfs-scheduler/starvation.c
@@ -2,8 +2,6 @@
/* Copyright 2023 Mike Galbraith <efault-AT-gmx.de> */
/* Copyright 2023 Wei Gao <wegao@suse.com> */
/*\
- *
- * [Description]
*
* Thread starvation test. On fauluty kernel the test timeouts.
*
diff --git a/testcases/kernel/sched/sysctl/proc_sched_rt01.c b/testcases/kernel/sched/sysctl/proc_sched_rt01.c
index 7c1aaccd96..df57ebcde9 100644
--- a/testcases/kernel/sched/sysctl/proc_sched_rt01.c
+++ b/testcases/kernel/sched/sysctl/proc_sched_rt01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Sanity tests for the /proc/sys/kernel/sched_r* files.
*
* - The sched_rt_period_us range is 1 to INT_MAX
diff --git a/testcases/kernel/security/aslr/aslr01.c b/testcases/kernel/security/aslr/aslr01.c
index 4d3c9bcdd4..6a396e29de 100644
--- a/testcases/kernel/security/aslr/aslr01.c
+++ b/testcases/kernel/security/aslr/aslr01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test that address space layout randomization (ASLR) is sufficiently random.
* A bug in dynamic library mmapping may reduce ASLR randomness if the library
* file is larger than hugepage size. In 32bit compat mode, this may
diff --git a/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c b/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
index deb43aa6ac..64b187b35f 100644
--- a/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
+++ b/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This is a regression test for a write race that allowed unprivileged programs
* to change readonly files located on tmpfs/shmem on the system using
* userfaultfd "minor fault handling" (CVE-2022-2590).
diff --git a/testcases/kernel/security/dirtypipe/dirtypipe.c b/testcases/kernel/security/dirtypipe/dirtypipe.c
index bc9197a903..981793e64d 100644
--- a/testcases/kernel/security/dirtypipe/dirtypipe.c
+++ b/testcases/kernel/security/dirtypipe/dirtypipe.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Proof-of-concept exploit for the Dirty Pipe
* vulnerability (CVE-2022-0847) caused by an uninitialized
* "pipe_buffer.flags" variable. It demonstrates how to overwrite any
diff --git a/testcases/kernel/security/kallsyms/kallsyms.c b/testcases/kernel/security/kallsyms/kallsyms.c
index cf1390fb4d..45b3e18d4a 100644
--- a/testcases/kernel/security/kallsyms/kallsyms.c
+++ b/testcases/kernel/security/kallsyms/kallsyms.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Utilize kernel's symbol table for unauthorized address access.
*
* Access the system symbols with root permission to test whether it's
diff --git a/testcases/kernel/syscalls/abort/abort01.c b/testcases/kernel/syscalls/abort/abort01.c
index aa9ca3a2d8..05a92204e5 100644
--- a/testcases/kernel/syscalls/abort/abort01.c
+++ b/testcases/kernel/syscalls/abort/abort01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Checks that process which called abort() gets killed by SIGIOT and dumps core.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/accept/accept01.c b/testcases/kernel/syscalls/accept/accept01.c
index e5db1dfecd..943af84242 100644
--- a/testcases/kernel/syscalls/accept/accept01.c
+++ b/testcases/kernel/syscalls/accept/accept01.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Verify that accept() returns the proper errno for various failure cases.
*/
diff --git a/testcases/kernel/syscalls/accept/accept02.c b/testcases/kernel/syscalls/accept/accept02.c
index 7cb3d69700..e50d2e7815 100644
--- a/testcases/kernel/syscalls/accept/accept02.c
+++ b/testcases/kernel/syscalls/accept/accept02.c
@@ -4,8 +4,6 @@
* Author: Christian Amann <camann@suse.com>
*/
/*\
- * [Description]
- *
* Test for CVE-2017-8890
*
* In Kernels up to 4.10.15 missing commit 657831ff the multicast
diff --git a/testcases/kernel/syscalls/accept/accept03.c b/testcases/kernel/syscalls/accept/accept03.c
index b85ec0d9b5..bc472397dd 100644
--- a/testcases/kernel/syscalls/accept/accept03.c
+++ b/testcases/kernel/syscalls/accept/accept03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that accept() returns ENOTSOCK or EBADF for non-socket file
* descriptors. The EBADF is returned in the case that the file descriptor has
* not a file associated with it, which is for example in the case of O_PATH
diff --git a/testcases/kernel/syscalls/access/access01.c b/testcases/kernel/syscalls/access/access01.c
index 1c32c6d046..1da949b567 100644
--- a/testcases/kernel/syscalls/access/access01.c
+++ b/testcases/kernel/syscalls/access/access01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for access(2) using F_OK, R_OK, W_OK and X_OK
*/
diff --git a/testcases/kernel/syscalls/access/access02.c b/testcases/kernel/syscalls/access/access02.c
index c8fe0d0dca..67d7b70e3d 100644
--- a/testcases/kernel/syscalls/access/access02.c
+++ b/testcases/kernel/syscalls/access/access02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test access(2) syscall
*
* - check the existence or read/write/execute permissions on a file (mode argument: F_OK/R_OK/W_OK/X_OK)
diff --git a/testcases/kernel/syscalls/access/access03.c b/testcases/kernel/syscalls/access/access03.c
index 7cae1ec2ef..c42c062494 100644
--- a/testcases/kernel/syscalls/access/access03.c
+++ b/testcases/kernel/syscalls/access/access03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* access(2) test for errno(s) EFAULT as root and nobody respectively.
*/
diff --git a/testcases/kernel/syscalls/access/access04.c b/testcases/kernel/syscalls/access/access04.c
index b5764a5ddb..8a9ac5c36a 100644
--- a/testcases/kernel/syscalls/access/access04.c
+++ b/testcases/kernel/syscalls/access/access04.c
@@ -9,8 +9,6 @@
*/
/*\
- * [Description]
- *
* - access() fails with -1 return value and sets errno to EINVAL
* if the specified access mode argument is invalid.
* - access() fails with -1 return value and sets errno to ENOENT
diff --git a/testcases/kernel/syscalls/acct/acct01.c b/testcases/kernel/syscalls/acct/acct01.c
index 781d62261f..6249f6e2b8 100644
--- a/testcases/kernel/syscalls/acct/acct01.c
+++ b/testcases/kernel/syscalls/acct/acct01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Verify that acct() returns proper errno on failure.
*/
diff --git a/testcases/kernel/syscalls/acct/acct02.c b/testcases/kernel/syscalls/acct/acct02.c
index 74019f4304..90555db9bf 100644
--- a/testcases/kernel/syscalls/acct/acct02.c
+++ b/testcases/kernel/syscalls/acct/acct02.c
@@ -5,8 +5,6 @@
* Author: Christian Amann <camann@suse.com>
*/
/*\
- * [Description]
- *
* This tests if the kernel writes correct data to the
* process accounting file.
*
diff --git a/testcases/kernel/syscalls/adjtimex/adjtimex02.c b/testcases/kernel/syscalls/adjtimex/adjtimex02.c
index 7f7fb643e5..836d49faf4 100644
--- a/testcases/kernel/syscalls/adjtimex/adjtimex02.c
+++ b/testcases/kernel/syscalls/adjtimex/adjtimex02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests for adjtimex() error conditions:
*
* - EPERM with SET_MODE as nobody
diff --git a/testcases/kernel/syscalls/adjtimex/adjtimex03.c b/testcases/kernel/syscalls/adjtimex/adjtimex03.c
index 9d34235e49..5521e4a3c3 100644
--- a/testcases/kernel/syscalls/adjtimex/adjtimex03.c
+++ b/testcases/kernel/syscalls/adjtimex/adjtimex03.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* CVE-2018-11508: Test 4-byte kernel data leak via adjtimex.
*
* On calling the adjtimex() function call with invalid mode (let's say
diff --git a/testcases/kernel/syscalls/alarm/alarm02.c b/testcases/kernel/syscalls/alarm/alarm02.c
index fcf70c5f32..4f012bb228 100644
--- a/testcases/kernel/syscalls/alarm/alarm02.c
+++ b/testcases/kernel/syscalls/alarm/alarm02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that alarm() returns:
*
* - zero when there was no previously scheduled alarm
diff --git a/testcases/kernel/syscalls/alarm/alarm03.c b/testcases/kernel/syscalls/alarm/alarm03.c
index b010e75401..7c98db070f 100644
--- a/testcases/kernel/syscalls/alarm/alarm03.c
+++ b/testcases/kernel/syscalls/alarm/alarm03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that alarms created by alarm() are not inherited by children
* created via fork.
*/
diff --git a/testcases/kernel/syscalls/alarm/alarm05.c b/testcases/kernel/syscalls/alarm/alarm05.c
index 82bff69cbf..f8f6269171 100644
--- a/testcases/kernel/syscalls/alarm/alarm05.c
+++ b/testcases/kernel/syscalls/alarm/alarm05.c
@@ -9,8 +9,6 @@
*/
/*\
- * [Description]
- *
* The return value of the alarm system call should be equal to the
* amount previously remaining in the alarm clock.
* A SIGALRM signal should be received after the specified amount of
diff --git a/testcases/kernel/syscalls/alarm/alarm06.c b/testcases/kernel/syscalls/alarm/alarm06.c
index 2cfa262076..76f4226f4f 100644
--- a/testcases/kernel/syscalls/alarm/alarm06.c
+++ b/testcases/kernel/syscalls/alarm/alarm06.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that any pending alarm() is canceled when seconds is zero.
*/
diff --git a/testcases/kernel/syscalls/alarm/alarm07.c b/testcases/kernel/syscalls/alarm/alarm07.c
index c04745f9df..8a1e500d1f 100644
--- a/testcases/kernel/syscalls/alarm/alarm07.c
+++ b/testcases/kernel/syscalls/alarm/alarm07.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that SIGALRM signal scheduled by alarm() in the parent process
* is not delivered to the child process.
*/
diff --git a/testcases/kernel/syscalls/arch_prctl/arch_prctl01.c b/testcases/kernel/syscalls/arch_prctl/arch_prctl01.c
index b98ef99d28..8ce905c6ce 100644
--- a/testcases/kernel/syscalls/arch_prctl/arch_prctl01.c
+++ b/testcases/kernel/syscalls/arch_prctl/arch_prctl01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Simple test on arch_prctl to set and get cpuid instruction of test thread.
*/
diff --git a/testcases/kernel/syscalls/bind/bind02.c b/testcases/kernel/syscalls/bind/bind02.c
index 9f5f940e95..73ebd4aa12 100644
--- a/testcases/kernel/syscalls/bind/bind02.c
+++ b/testcases/kernel/syscalls/bind/bind02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Make sure bind() of privileged port gives EACCESS error for non-root users.
*/
diff --git a/testcases/kernel/syscalls/bpf/bpf_map01.c b/testcases/kernel/syscalls/bpf/bpf_map01.c
index 7f2264bf52..7fcf8e00fe 100644
--- a/testcases/kernel/syscalls/bpf/bpf_map01.c
+++ b/testcases/kernel/syscalls/bpf/bpf_map01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Trivial Extended Berkeley Packet Filter (eBPF) test.
*
* Sanity check creating and updating maps.
diff --git a/testcases/kernel/syscalls/bpf/bpf_prog01.c b/testcases/kernel/syscalls/bpf/bpf_prog01.c
index b3846cb62c..44ee8c1c44 100644
--- a/testcases/kernel/syscalls/bpf/bpf_prog01.c
+++ b/testcases/kernel/syscalls/bpf/bpf_prog01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Trivial Extended Berkeley Packet Filter (eBPF) test.
*
* Sanity check loading and running bytecode.
diff --git a/testcases/kernel/syscalls/bpf/bpf_prog02.c b/testcases/kernel/syscalls/bpf/bpf_prog02.c
index 69314aea7f..8bc7996f5c 100644
--- a/testcases/kernel/syscalls/bpf/bpf_prog02.c
+++ b/testcases/kernel/syscalls/bpf/bpf_prog02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Check if eBPF can do arithmetic with 64bits. This targets a specific
* regression which only effects unprivileged users who are subject to extra
* pointer arithmetic checks during verification.
diff --git a/testcases/kernel/syscalls/bpf/bpf_prog03.c b/testcases/kernel/syscalls/bpf/bpf_prog03.c
index 62432cc3fc..f37560c3b8 100644
--- a/testcases/kernel/syscalls/bpf/bpf_prog03.c
+++ b/testcases/kernel/syscalls/bpf/bpf_prog03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* CVE-2017-16995
*
* Test for the bug fixed by kernel commit
diff --git a/testcases/kernel/syscalls/bpf/bpf_prog04.c b/testcases/kernel/syscalls/bpf/bpf_prog04.c
index 5c61d34b4a..35ad8dd5f7 100644
--- a/testcases/kernel/syscalls/bpf/bpf_prog04.c
+++ b/testcases/kernel/syscalls/bpf/bpf_prog04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* CVE 2018-18445
*
* Check that eBPF verifier correctly handles 32-bit arithmetic, in particular
diff --git a/testcases/kernel/syscalls/bpf/bpf_prog05.c b/testcases/kernel/syscalls/bpf/bpf_prog05.c
index 0500817128..05cb34e13d 100644
--- a/testcases/kernel/syscalls/bpf/bpf_prog05.c
+++ b/testcases/kernel/syscalls/bpf/bpf_prog05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Compare the effects of 32-bit div/mod by zero with the "expected"
* behaviour.
*
diff --git a/testcases/kernel/syscalls/bpf/bpf_prog06.c b/testcases/kernel/syscalls/bpf/bpf_prog06.c
index 87fdd80603..f701e95990 100644
--- a/testcases/kernel/syscalls/bpf/bpf_prog06.c
+++ b/testcases/kernel/syscalls/bpf/bpf_prog06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* ringbuf_submit takes a pointer to a ringbuf record, but not the
* size of this record. The verifier only validates offset ptrs[1] passed
* to functions if the function has a size parameter. So we can
diff --git a/testcases/kernel/syscalls/bpf/bpf_prog07.c b/testcases/kernel/syscalls/bpf/bpf_prog07.c
index 29dfbf2cae..81435348aa 100644
--- a/testcases/kernel/syscalls/bpf/bpf_prog07.c
+++ b/testcases/kernel/syscalls/bpf/bpf_prog07.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* The verifier did not properly restrict some *_OR_NULL pointer
* types. Including RET_PTR_TO_ALLOC_MEM_OR_NULL which is returned by
* ringbuf_reserve. Somehow this means they can be used to perform
diff --git a/testcases/kernel/syscalls/brk/brk02.c b/testcases/kernel/syscalls/brk/brk02.c
index 64931bc809..201664e806 100644
--- a/testcases/kernel/syscalls/brk/brk02.c
+++ b/testcases/kernel/syscalls/brk/brk02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Expand brk() by at least 2 pages to ensure there is a newly created VMA
* and not expanding the original due to multiple anon pages. mprotect() that
* new VMA then brk() back to the original address therefore causing a munmap of
diff --git a/testcases/kernel/syscalls/cachestat/cachestat01.c b/testcases/kernel/syscalls/cachestat/cachestat01.c
index 22f0071d1e..e218747d92 100644
--- a/testcases/kernel/syscalls/cachestat/cachestat01.c
+++ b/testcases/kernel/syscalls/cachestat/cachestat01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that cachestat() syscall is properly counting cached pages
* written inside a file. If storage device synchronization is requested, test
* will check if the number of dirty pages is zero.
diff --git a/testcases/kernel/syscalls/cachestat/cachestat02.c b/testcases/kernel/syscalls/cachestat/cachestat02.c
index e168de5a53..72428ee839 100644
--- a/testcases/kernel/syscalls/cachestat/cachestat02.c
+++ b/testcases/kernel/syscalls/cachestat/cachestat02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that cachestat() syscall is properly counting cached pages
* written inside a shared memory.
*
diff --git a/testcases/kernel/syscalls/cachestat/cachestat03.c b/testcases/kernel/syscalls/cachestat/cachestat03.c
index 139745c349..7c3abb3a0f 100644
--- a/testcases/kernel/syscalls/cachestat/cachestat03.c
+++ b/testcases/kernel/syscalls/cachestat/cachestat03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that cachestat() syscall is properly failing with relative
* error codes according to input parameters.
*
diff --git a/testcases/kernel/syscalls/cachestat/cachestat04.c b/testcases/kernel/syscalls/cachestat/cachestat04.c
index 7cef9897d4..d33769bfcd 100644
--- a/testcases/kernel/syscalls/cachestat/cachestat04.c
+++ b/testcases/kernel/syscalls/cachestat/cachestat04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies cachestat() for all the possible file descriptors,
* checking that cache statistics are always zero, except for unsupported file
* descriptors which cause EBADF to be raised.
diff --git a/testcases/kernel/syscalls/capset/capset01.c b/testcases/kernel/syscalls/capset/capset01.c
index 029fe7f3d5..a529ca9908 100644
--- a/testcases/kernel/syscalls/capset/capset01.c
+++ b/testcases/kernel/syscalls/capset/capset01.c
@@ -10,8 +10,6 @@
*/
/*\
- * [Description]
- *
* Test capset() with with LINUX_CAPABILITY_VERSION_{1,2,3}.
*/
diff --git a/testcases/kernel/syscalls/capset/capset02.c b/testcases/kernel/syscalls/capset/capset02.c
index 989f3e4ce1..36d7996639 100644
--- a/testcases/kernel/syscalls/capset/capset02.c
+++ b/testcases/kernel/syscalls/capset/capset02.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Tests basic error handling of the capset syscall.
*
* 1. capset() fails with errno set to EFAULT if an invalid address
diff --git a/testcases/kernel/syscalls/capset/capset03.c b/testcases/kernel/syscalls/capset/capset03.c
index 2b83e6ce91..a75807ff49 100644
--- a/testcases/kernel/syscalls/capset/capset03.c
+++ b/testcases/kernel/syscalls/capset/capset03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* capset() fails with errno set or EPERM if the new_Inheritable is
* not a subset of old_Inheritable and old_Permitted without CAP_SETPCAP.
*/
diff --git a/testcases/kernel/syscalls/capset/capset04.c b/testcases/kernel/syscalls/capset/capset04.c
index 13477a4a98..abe6f8fed8 100644
--- a/testcases/kernel/syscalls/capset/capset04.c
+++ b/testcases/kernel/syscalls/capset/capset04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test whether capset() can be used to modify the capabilities of a thread
* other than itself. Now, most linux distributions with kernel supporting
* VFS capabilities, this should be never permitted.
diff --git a/testcases/kernel/syscalls/chdir/chdir04.c b/testcases/kernel/syscalls/chdir/chdir04.c
index cdbb29668c..6e53b7fef1 100644
--- a/testcases/kernel/syscalls/chdir/chdir04.c
+++ b/testcases/kernel/syscalls/chdir/chdir04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Testcase to test whether chdir(2) sets errno correctly.
*/
diff --git a/testcases/kernel/syscalls/chmod/chmod01.c b/testcases/kernel/syscalls/chmod/chmod01.c
index b3b828ac32..8598acf1a9 100644
--- a/testcases/kernel/syscalls/chmod/chmod01.c
+++ b/testcases/kernel/syscalls/chmod/chmod01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that chmod(2) succeeds when used to change the mode permissions
* of a file or directory.
*/
diff --git a/testcases/kernel/syscalls/chmod/chmod03.c b/testcases/kernel/syscalls/chmod/chmod03.c
index 3ceeae261a..d4056ac8cb 100644
--- a/testcases/kernel/syscalls/chmod/chmod03.c
+++ b/testcases/kernel/syscalls/chmod/chmod03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, chmod(2) will succeed to change the mode of a file or directory
* and set the sticky bit on it if invoked by non-root (uid != 0)
* process with the following constraints:
diff --git a/testcases/kernel/syscalls/chmod/chmod06.c b/testcases/kernel/syscalls/chmod/chmod06.c
index 93dd924c8e..7055f0da09 100644
--- a/testcases/kernel/syscalls/chmod/chmod06.c
+++ b/testcases/kernel/syscalls/chmod/chmod06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, chmod(2) returns -1 and sets errno to
*
* 1. EPERM if the effective user id of process does not match the owner of the
diff --git a/testcases/kernel/syscalls/chmod/chmod08.c b/testcases/kernel/syscalls/chmod/chmod08.c
index ec448b4094..ab80e02fc4 100644
--- a/testcases/kernel/syscalls/chmod/chmod08.c
+++ b/testcases/kernel/syscalls/chmod/chmod08.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test verifies that chmod() is working correctly on symlink()
* generated files.
*/
diff --git a/testcases/kernel/syscalls/chmod/chmod09.c b/testcases/kernel/syscalls/chmod/chmod09.c
index 898922513a..990600886e 100644
--- a/testcases/kernel/syscalls/chmod/chmod09.c
+++ b/testcases/kernel/syscalls/chmod/chmod09.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for kernel commit
* 5d1f903f75a8 ("attr: block mode changes of symlinks")
*/
diff --git a/testcases/kernel/syscalls/chown/chown01.c b/testcases/kernel/syscalls/chown/chown01.c
index 0301309378..18406cf16a 100644
--- a/testcases/kernel/syscalls/chown/chown01.c
+++ b/testcases/kernel/syscalls/chown/chown01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic test for chown(). Calls chown() on a file and expects it to pass.
*/
diff --git a/testcases/kernel/syscalls/chown/chown02.c b/testcases/kernel/syscalls/chown/chown02.c
index 467185831c..000433da2d 100644
--- a/testcases/kernel/syscalls/chown/chown02.c
+++ b/testcases/kernel/syscalls/chown/chown02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that chown(2) invoked by super-user:
*
* - clears setuid and setgid bits set on an executable file
diff --git a/testcases/kernel/syscalls/chown/chown03.c b/testcases/kernel/syscalls/chown/chown03.c
index b4ca3af732..dd0c9dd0f4 100644
--- a/testcases/kernel/syscalls/chown/chown03.c
+++ b/testcases/kernel/syscalls/chown/chown03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, chown(2) succeeds to change the group of a file specified
* by path when called by non-root user with the following constraints:
*
diff --git a/testcases/kernel/syscalls/chown/chown04.c b/testcases/kernel/syscalls/chown/chown04.c
index 4e91885674..f7a1513356 100644
--- a/testcases/kernel/syscalls/chown/chown04.c
+++ b/testcases/kernel/syscalls/chown/chown04.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* 1. Chown() returns -1 and sets errno to EPERM if the effective user id
diff --git a/testcases/kernel/syscalls/chown/chown05.c b/testcases/kernel/syscalls/chown/chown05.c
index 44abdc7502..612d6c1ea7 100644
--- a/testcases/kernel/syscalls/chown/chown05.c
+++ b/testcases/kernel/syscalls/chown/chown05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, chown(2) succeeds to change the owner and group of a file
* specified by path to any numeric owner(uid)/group(gid) values when invoked
* by super-user.
diff --git a/testcases/kernel/syscalls/chroot/chroot01.c b/testcases/kernel/syscalls/chroot/chroot01.c
index 60f3f609c6..fa5172de51 100644
--- a/testcases/kernel/syscalls/chroot/chroot01.c
+++ b/testcases/kernel/syscalls/chroot/chroot01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the whether chroot sets errno to EPERM.
*
* As a non-root user attempt to perform chroot() to a directory. The
diff --git a/testcases/kernel/syscalls/chroot/chroot02.c b/testcases/kernel/syscalls/chroot/chroot02.c
index b01a876604..1b4fa2f4f1 100644
--- a/testcases/kernel/syscalls/chroot/chroot02.c
+++ b/testcases/kernel/syscalls/chroot/chroot02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic chroot() functionality test.
*
* - Create a file in the temporary directory
diff --git a/testcases/kernel/syscalls/chroot/chroot03.c b/testcases/kernel/syscalls/chroot/chroot03.c
index 87faec3162..4fe06ec1a8 100644
--- a/testcases/kernel/syscalls/chroot/chroot03.c
+++ b/testcases/kernel/syscalls/chroot/chroot03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Testcase to test whether chroot(2) sets errno correctly.
*
* - to test whether chroot() is setting ENAMETOOLONG if the
diff --git a/testcases/kernel/syscalls/chroot/chroot04.c b/testcases/kernel/syscalls/chroot/chroot04.c
index ed0f66323e..c0e7afce60 100644
--- a/testcases/kernel/syscalls/chroot/chroot04.c
+++ b/testcases/kernel/syscalls/chroot/chroot04.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check that chroot sets errno to EACCES.
*
* As a non-root user attempt to perform chroot() to a directory that the user
diff --git a/testcases/kernel/syscalls/clock_gettime/clock_gettime03.c b/testcases/kernel/syscalls/clock_gettime/clock_gettime03.c
index b02d22a142..a4b231e693 100644
--- a/testcases/kernel/syscalls/clock_gettime/clock_gettime03.c
+++ b/testcases/kernel/syscalls/clock_gettime/clock_gettime03.c
@@ -4,8 +4,6 @@
*/
/*
- * [Description]
- *
* After a call to unshare(CLONE_NEWTIME) a new timer namespace is created, the
* process that has called the unshare() can adjust offsets for CLOCK_MONOTONIC
* and CLOCK_BOOTTIME for its children by writing to the '/proc/self/timens_offsets'.
diff --git a/testcases/kernel/syscalls/clock_gettime/clock_gettime04.c b/testcases/kernel/syscalls/clock_gettime/clock_gettime04.c
index c279da79e0..5dce24c7a7 100644
--- a/testcases/kernel/syscalls/clock_gettime/clock_gettime04.c
+++ b/testcases/kernel/syscalls/clock_gettime/clock_gettime04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check time difference between successive readings and report a bug if
* difference found to be over 5 ms.
*
diff --git a/testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c b/testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c
index dfc5222789..1b097a60fc 100644
--- a/testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c
+++ b/testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test that clock_nanosleep() adds correctly an offset with absolute timeout
* and CLOCK_MONOTONIC inside of a timer namespace.
*
diff --git a/testcases/kernel/syscalls/clone/clone01.c b/testcases/kernel/syscalls/clone/clone01.c
index 7e3f15671b..cbe646e676 100644
--- a/testcases/kernel/syscalls/clone/clone01.c
+++ b/testcases/kernel/syscalls/clone/clone01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic clone() test.
*
* Use clone() to create a child process, and wait for the child process to exit,
diff --git a/testcases/kernel/syscalls/clone/clone03.c b/testcases/kernel/syscalls/clone/clone03.c
index 2c912b9dc6..8c343b2cc5 100644
--- a/testcases/kernel/syscalls/clone/clone03.c
+++ b/testcases/kernel/syscalls/clone/clone03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check for equality of getpid() from a child and return value of clone(2)
*/
diff --git a/testcases/kernel/syscalls/clone/clone04.c b/testcases/kernel/syscalls/clone/clone04.c
index 74347e2b47..30edeaeb0d 100644
--- a/testcases/kernel/syscalls/clone/clone04.c
+++ b/testcases/kernel/syscalls/clone/clone04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that clone(2) fails with
*
* - EINVAL if child stack is set to NULL
diff --git a/testcases/kernel/syscalls/clone/clone05.c b/testcases/kernel/syscalls/clone/clone05.c
index 892a848bed..56d2f8bbad 100644
--- a/testcases/kernel/syscalls/clone/clone05.c
+++ b/testcases/kernel/syscalls/clone/clone05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Call clone() with CLONE_VFORK flag set. verify that
* execution of parent is suspended until child finishes
*/
diff --git a/testcases/kernel/syscalls/clone/clone06.c b/testcases/kernel/syscalls/clone/clone06.c
index b32f17d93f..412ebb7a34 100644
--- a/testcases/kernel/syscalls/clone/clone06.c
+++ b/testcases/kernel/syscalls/clone/clone06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test to verify inheritance of environment variables by child.
*/
diff --git a/testcases/kernel/syscalls/clone/clone07.c b/testcases/kernel/syscalls/clone/clone07.c
index 8848b2b444..9ff53658ae 100644
--- a/testcases/kernel/syscalls/clone/clone07.c
+++ b/testcases/kernel/syscalls/clone/clone07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for a libc bug where exiting child function by returning from
* it caused SIGSEGV.
*/
diff --git a/testcases/kernel/syscalls/clone3/clone301.c b/testcases/kernel/syscalls/clone3/clone301.c
index d0fadbc5d0..deed30b9f0 100644
--- a/testcases/kernel/syscalls/clone3/clone301.c
+++ b/testcases/kernel/syscalls/clone3/clone301.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic clone3() test.
*/
diff --git a/testcases/kernel/syscalls/clone3/clone302.c b/testcases/kernel/syscalls/clone3/clone302.c
index 48b831554c..9e98f19545 100644
--- a/testcases/kernel/syscalls/clone3/clone302.c
+++ b/testcases/kernel/syscalls/clone3/clone302.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic clone3() test to check various failures.
*/
diff --git a/testcases/kernel/syscalls/clone3/clone303.c b/testcases/kernel/syscalls/clone3/clone303.c
index 04c41942a0..7e5f3adb3c 100644
--- a/testcases/kernel/syscalls/clone3/clone303.c
+++ b/testcases/kernel/syscalls/clone3/clone303.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test case check clone3 CLONE_INTO_CGROUP flag
*
*/
diff --git a/testcases/kernel/syscalls/close/close01.c b/testcases/kernel/syscalls/close/close01.c
index f2d30a693a..4e4f107ef9 100644
--- a/testcases/kernel/syscalls/close/close01.c
+++ b/testcases/kernel/syscalls/close/close01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test that closing a file/pipe/socket works correctly.
*/
diff --git a/testcases/kernel/syscalls/close/close02.c b/testcases/kernel/syscalls/close/close02.c
index d317cc63b6..2016453f8a 100644
--- a/testcases/kernel/syscalls/close/close02.c
+++ b/testcases/kernel/syscalls/close/close02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Call close(-1) and expects it to return EBADF.
*/
diff --git a/testcases/kernel/syscalls/close_range/close_range01.c b/testcases/kernel/syscalls/close_range/close_range01.c
index 941f3e4038..60e63325b6 100644
--- a/testcases/kernel/syscalls/close_range/close_range01.c
+++ b/testcases/kernel/syscalls/close_range/close_range01.c
@@ -10,8 +10,6 @@
* Copyright (c) 2021 SUSE LLC, other copyrights may apply.
*/
/*\
- * [Description]
- *
* We check that close_range()
*
* - closes FDs
diff --git a/testcases/kernel/syscalls/close_range/close_range02.c b/testcases/kernel/syscalls/close_range/close_range02.c
index 48d9a31df4..f9b0cc5a0f 100644
--- a/testcases/kernel/syscalls/close_range/close_range02.c
+++ b/testcases/kernel/syscalls/close_range/close_range02.c
@@ -3,8 +3,6 @@
* Copyright (c) 2021 SUSE LLC
*/
/*\
- * [Description]
- *
* - First check close_range works on a valid range.
* - Then check close_range does not accept invalid paramters.
* - Then check it accepts a large lower fd.
diff --git a/testcases/kernel/syscalls/cma/process_vm01.c b/testcases/kernel/syscalls/cma/process_vm01.c
index 014fd6fffe..730ae67e7c 100644
--- a/testcases/kernel/syscalls/cma/process_vm01.c
+++ b/testcases/kernel/syscalls/cma/process_vm01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test errno codes in process_vm_readv and process_vm_writev syscalls.
*/
diff --git a/testcases/kernel/syscalls/cma/process_vm_readv02.c b/testcases/kernel/syscalls/cma/process_vm_readv02.c
index 2bd66a49fd..1e2ac38fac 100644
--- a/testcases/kernel/syscalls/cma/process_vm_readv02.c
+++ b/testcases/kernel/syscalls/cma/process_vm_readv02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Fork two children, one child allocates memory and initializes it;
* then the other one calls process_vm_readv and reads from the same
* memory location, it then verifies if process_vm_readv returns
diff --git a/testcases/kernel/syscalls/cma/process_vm_readv03.c b/testcases/kernel/syscalls/cma/process_vm_readv03.c
index 4caafe8670..95d35c4226 100644
--- a/testcases/kernel/syscalls/cma/process_vm_readv03.c
+++ b/testcases/kernel/syscalls/cma/process_vm_readv03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Fork two children, one child mallocs randomly sized trunks of memory
* and initializes them; the other child calls process_vm_readv with
* the remote iovecs initialized to the original process memory
diff --git a/testcases/kernel/syscalls/cma/process_vm_writev02.c b/testcases/kernel/syscalls/cma/process_vm_writev02.c
index 991110d24a..aaf4c0b186 100644
--- a/testcases/kernel/syscalls/cma/process_vm_writev02.c
+++ b/testcases/kernel/syscalls/cma/process_vm_writev02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Fork two children, the first one allocates a chunk of memory and the
* other one call process_vm_writev to write known data into the first
* child. Then first child verifies that the data is as expected.
diff --git a/testcases/kernel/syscalls/confstr/confstr01.c b/testcases/kernel/syscalls/confstr/confstr01.c
index d5cb5a4776..103b852655 100644
--- a/testcases/kernel/syscalls/confstr/confstr01.c
+++ b/testcases/kernel/syscalls/confstr/confstr01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Test confstr(3) 700 (X/Open 7) functionality -- POSIX 2008.
*/
diff --git a/testcases/kernel/syscalls/creat/creat08.c b/testcases/kernel/syscalls/creat/creat08.c
index 011753ac5c..ab537de986 100644
--- a/testcases/kernel/syscalls/creat/creat08.c
+++ b/testcases/kernel/syscalls/creat/creat08.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that the group ID and setgid bit are set correctly when a new file
* is created.
*/
diff --git a/testcases/kernel/syscalls/creat/creat09.c b/testcases/kernel/syscalls/creat/creat09.c
index d181657728..ac46c940c7 100644
--- a/testcases/kernel/syscalls/creat/creat09.c
+++ b/testcases/kernel/syscalls/creat/creat09.c
@@ -3,8 +3,6 @@
* Copyright (c) 2021 SUSE LLC <mdoucha@suse.cz>
*/
/*\
- * [Description]
- *
* CVE-2018-13405
*
* Check for possible privilege escalation through creating files with setgid
diff --git a/testcases/kernel/syscalls/delete_module/delete_module01.c b/testcases/kernel/syscalls/delete_module/delete_module01.c
index bcaa0763de..a64c1b63e8 100644
--- a/testcases/kernel/syscalls/delete_module/delete_module01.c
+++ b/testcases/kernel/syscalls/delete_module/delete_module01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic test for delete_module(2).
*
* Install dummy_del_mod.ko and delete it with delete_module(2).
diff --git a/testcases/kernel/syscalls/dup/dup01.c b/testcases/kernel/syscalls/dup/dup01.c
index f5cd058e8b..7a1da27247 100644
--- a/testcases/kernel/syscalls/dup/dup01.c
+++ b/testcases/kernel/syscalls/dup/dup01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Verify that dup(2) syscall executes successfully and allocates
* a new file descriptor which refers to the same open file as oldfd.
*/
diff --git a/testcases/kernel/syscalls/dup/dup02.c b/testcases/kernel/syscalls/dup/dup02.c
index 5391738a44..b6e270ab77 100644
--- a/testcases/kernel/syscalls/dup/dup02.c
+++ b/testcases/kernel/syscalls/dup/dup02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that dup(2) syscall fails with errno EBADF when called with
* invalid value for oldfd argument.
*/
diff --git a/testcases/kernel/syscalls/dup/dup03.c b/testcases/kernel/syscalls/dup/dup03.c
index d59e61f2b1..1d9919ebf8 100644
--- a/testcases/kernel/syscalls/dup/dup03.c
+++ b/testcases/kernel/syscalls/dup/dup03.c
@@ -5,8 +5,6 @@
*
*/
/*\
- * [Description]
- *
* Verify that dup(2) syscall fails with errno EMFILE when the per-process
* limit on the number of open file descriptors has been reached.
*/
diff --git a/testcases/kernel/syscalls/dup/dup04.c b/testcases/kernel/syscalls/dup/dup04.c
index 053fb40c21..4869f43714 100644
--- a/testcases/kernel/syscalls/dup/dup04.c
+++ b/testcases/kernel/syscalls/dup/dup04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for dup(2) of a system pipe descriptor.
*/
diff --git a/testcases/kernel/syscalls/dup/dup05.c b/testcases/kernel/syscalls/dup/dup05.c
index 619b4861ea..e2bc9a4a3a 100644
--- a/testcases/kernel/syscalls/dup/dup05.c
+++ b/testcases/kernel/syscalls/dup/dup05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for dup(2) of a named pipe descriptor.
*/
diff --git a/testcases/kernel/syscalls/dup/dup06.c b/testcases/kernel/syscalls/dup/dup06.c
index cd4cb35137..accc32d605 100644
--- a/testcases/kernel/syscalls/dup/dup06.c
+++ b/testcases/kernel/syscalls/dup/dup06.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test for dup(2) syscall with max open file descriptors.
*/
diff --git a/testcases/kernel/syscalls/dup/dup07.c b/testcases/kernel/syscalls/dup/dup07.c
index 688ee19896..aa91d5d55a 100644
--- a/testcases/kernel/syscalls/dup/dup07.c
+++ b/testcases/kernel/syscalls/dup/dup07.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that the file descriptor created by dup(2) syscall has the same
* access mode as the old one.
*/
diff --git a/testcases/kernel/syscalls/dup2/dup201.c b/testcases/kernel/syscalls/dup2/dup201.c
index d851eea78f..9d2c7eb3fc 100644
--- a/testcases/kernel/syscalls/dup2/dup201.c
+++ b/testcases/kernel/syscalls/dup2/dup201.c
@@ -5,8 +5,6 @@
* 01/2002 Removed EMFILE test - Paul Larson
*/
/*\
- * [Description]
- *
* Negative tests for dup2() with bad fd (EBADF).
*
* - First fd argument is less than 0
diff --git a/testcases/kernel/syscalls/dup2/dup202.c b/testcases/kernel/syscalls/dup2/dup202.c
index 659f3a4ecd..b4dcd19510 100644
--- a/testcases/kernel/syscalls/dup2/dup202.c
+++ b/testcases/kernel/syscalls/dup2/dup202.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test whether the access mode are the same for both file descriptors.
*
* Create file with mode, dup2, [change mode], check mode
diff --git a/testcases/kernel/syscalls/dup2/dup203.c b/testcases/kernel/syscalls/dup2/dup203.c
index c8d1095f38..384662eee1 100644
--- a/testcases/kernel/syscalls/dup2/dup203.c
+++ b/testcases/kernel/syscalls/dup2/dup203.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the basic functionality of dup2().
*
* - Attempt to dup2() on an open file descriptor.
diff --git a/testcases/kernel/syscalls/dup2/dup204.c b/testcases/kernel/syscalls/dup2/dup204.c
index 112ce0c9da..dbb0233a85 100644
--- a/testcases/kernel/syscalls/dup2/dup204.c
+++ b/testcases/kernel/syscalls/dup2/dup204.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test whether the inode number are the same for both file descriptors.
*/
diff --git a/testcases/kernel/syscalls/dup2/dup205.c b/testcases/kernel/syscalls/dup2/dup205.c
index fa7b27d96c..b95a9212bc 100644
--- a/testcases/kernel/syscalls/dup2/dup205.c
+++ b/testcases/kernel/syscalls/dup2/dup205.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Negative test for dup2() with max open file descriptors.
*/
diff --git a/testcases/kernel/syscalls/dup2/dup206.c b/testcases/kernel/syscalls/dup2/dup206.c
index 17d527a1ec..549d3a9fdb 100644
--- a/testcases/kernel/syscalls/dup2/dup206.c
+++ b/testcases/kernel/syscalls/dup2/dup206.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* If oldfd is a valid file descriptor, and newfd has the same value as oldfd,
* then dup2() does nothing, and returns newfd.
*/
diff --git a/testcases/kernel/syscalls/dup2/dup207.c b/testcases/kernel/syscalls/dup2/dup207.c
index f1b184f5b2..c6c6cb480f 100644
--- a/testcases/kernel/syscalls/dup2/dup207.c
+++ b/testcases/kernel/syscalls/dup2/dup207.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test whether the file offset are the same for both file descriptors.
*/
diff --git a/testcases/kernel/syscalls/dup3/dup3_01.c b/testcases/kernel/syscalls/dup3/dup3_01.c
index 517491d44e..3f27b1c7ef 100644
--- a/testcases/kernel/syscalls/dup3/dup3_01.c
+++ b/testcases/kernel/syscalls/dup3/dup3_01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check whether dup3() supports O_CLOEXEC flag.
*/
diff --git a/testcases/kernel/syscalls/dup3/dup3_02.c b/testcases/kernel/syscalls/dup3/dup3_02.c
index 009b0037df..a618b3e98b 100644
--- a/testcases/kernel/syscalls/dup3/dup3_02.c
+++ b/testcases/kernel/syscalls/dup3/dup3_02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for various EINVAL error.
*
* - oldfd is equal to newfd without using O_CLOEXEC flag
diff --git a/testcases/kernel/syscalls/epoll_create/epoll_create01.c b/testcases/kernel/syscalls/epoll_create/epoll_create01.c
index 443554fe09..2e8e813d76 100644
--- a/testcases/kernel/syscalls/epoll_create/epoll_create01.c
+++ b/testcases/kernel/syscalls/epoll_create/epoll_create01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that epoll_create return a nonnegative file descriptor on success.
*
* The size argument informed the kernel of the number of file descriptors
diff --git a/testcases/kernel/syscalls/epoll_create/epoll_create02.c b/testcases/kernel/syscalls/epoll_create/epoll_create02.c
index 942d7afd35..2ec8e925c6 100644
--- a/testcases/kernel/syscalls/epoll_create/epoll_create02.c
+++ b/testcases/kernel/syscalls/epoll_create/epoll_create02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that epoll_create returns -1 and set errno to EINVAL if size is not
* greater than zero.
*/
diff --git a/testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c b/testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c
index 6d2bf2a30d..9e43f4d4ec 100644
--- a/testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c
+++ b/testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that epoll_create1 sets the close-on-exec flag for the returned
* file descriptor with EPOLL_CLOEXEC.
*/
diff --git a/testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c b/testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c
index 74c311694f..3a2ac988af 100644
--- a/testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c
+++ b/testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that epoll_create1 returns -1 and set errno to EINVAL with an invalid
* value specified in flags.
*/
diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c
index 298ed89cb2..bd0a2260f8 100644
--- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c
+++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the epoll_ctl:
*
* - When epoll_ctl succeeds to register fd on the epoll instance and associates
diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c
index dcf74bf770..a17148f174 100644
--- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c
+++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that epoll_ctl() fails with:
*
* - EBADF if epfd is an invalid fd.
diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c
index f617295cc1..e8d3d5f369 100644
--- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c
+++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that epoll_ctl returns zero with different combinations of events on
* success.
*/
diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
index bc015c01bc..955959b6b2 100644
--- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
+++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that the maximum number of nesting allowed inside epoll sets is 5,
* otherwise epoll_ctl fails with EINVAL.
*/
diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c
index 71e300daa2..fc59ef2563 100644
--- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c
+++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that epoll_ctl() fails with ELOOP if fd refers to an epoll instance
* and this EPOLL_CTL_ADD operation would result in a circular loop of epoll
* instances monitoring one another.
diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c
index f3ca894fb1..954e773149 100644
--- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c
+++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for epoll_pwait() and epoll_pwait2().
*
* - With a sigmask a signal is ignored and the syscall safely waits until
diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c
index 3341a2b09b..069620c5d8 100644
--- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c
+++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test for epoll_pwait and epoll_pwait2. Checks if data avaiable in a
* file descriptor are reported correctly in the syscall return value.
*/
diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c
index 94b785b1a5..8217f9f800 100644
--- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c
+++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that epoll_pwait and epoll_pwait2 timeouts correctly.
*/
diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c
index a75751db93..cc1d04e6ba 100644
--- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c
+++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, epoll_pwait() and epoll_pwait2() return -1 and set errno to
* EFAULT with a sigmask points outside user's accessible address space.
*/
diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c
index b75a995396..9ac5e82604 100644
--- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c
+++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, epoll_pwait2() return -1 and set errno to EINVAL with an
* invalid timespec.
*/
diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait01.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait01.c
index 4f84384880..2485be513f 100644
--- a/testcases/kernel/syscalls/epoll_wait/epoll_wait01.c
+++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test for epoll_wait. Check that epoll_wait works for EPOLLOUT and
* EPOLLIN events on an epoll instance and that struct epoll_event is set
* correctly.
diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait02.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait02.c
index 93ada1cf3e..9b6e932bba 100644
--- a/testcases/kernel/syscalls/epoll_wait/epoll_wait02.c
+++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that epoll_wait(2) timeouts correctly.
*/
diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait03.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait03.c
index d31e498644..e55d65ca88 100644
--- a/testcases/kernel/syscalls/epoll_wait/epoll_wait03.c
+++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for epoll_wait:
*
* - epoll_wait fails with EBADF if epfd is not a valid file descriptor.
diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait04.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait04.c
index bd8baca220..5c4a545471 100644
--- a/testcases/kernel/syscalls/epoll_wait/epoll_wait04.c
+++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that a timeout equal to zero causes epoll_wait() to return immediately.
*/
diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait05.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait05.c
index d06a024ffc..33d08c0c7f 100644
--- a/testcases/kernel/syscalls/epoll_wait/epoll_wait05.c
+++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that epoll receives EPOLLRDHUP event when we hang a reading
* half-socket we are polling on.
*/
diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait06.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait06.c
index f35e0423ae..0bf8a29dad 100644
--- a/testcases/kernel/syscalls/epoll_wait/epoll_wait06.c
+++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that edge triggering is correctly handled by epoll, for both EPOLLIN
* and EPOLLOUT.
*
diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait07.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait07.c
index dfabd0d878..329bf2a5cf 100644
--- a/testcases/kernel/syscalls/epoll_wait/epoll_wait07.c
+++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait07.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that EPOLLONESHOT is correctly handled by epoll_wait.
* We open a channel, write in it two times and verify that EPOLLIN has been
* received only once.
diff --git a/testcases/kernel/syscalls/eventfd/eventfd01.c b/testcases/kernel/syscalls/eventfd/eventfd01.c
index b66d6a55c4..4fe209a139 100644
--- a/testcases/kernel/syscalls/eventfd/eventfd01.c
+++ b/testcases/kernel/syscalls/eventfd/eventfd01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify read operation for eventfd fail with:
*
* - EAGAIN when counter is zero on non blocking fd
diff --git a/testcases/kernel/syscalls/eventfd/eventfd02.c b/testcases/kernel/syscalls/eventfd/eventfd02.c
index f028961c73..7691b165ad 100644
--- a/testcases/kernel/syscalls/eventfd/eventfd02.c
+++ b/testcases/kernel/syscalls/eventfd/eventfd02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify write operation for eventfd fail with:
*
* - EAGAIN when counter is zero on non blocking fd
diff --git a/testcases/kernel/syscalls/eventfd/eventfd03.c b/testcases/kernel/syscalls/eventfd/eventfd03.c
index 452264cad2..31761a4499 100644
--- a/testcases/kernel/syscalls/eventfd/eventfd03.c
+++ b/testcases/kernel/syscalls/eventfd/eventfd03.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test whether readfd is set by select() when eventfd() counter value is
* non-zero, then check if readfd is not set when eventfd() counter value is
* zero.
diff --git a/testcases/kernel/syscalls/eventfd/eventfd04.c b/testcases/kernel/syscalls/eventfd/eventfd04.c
index c7186ae64f..4ee67d308a 100644
--- a/testcases/kernel/syscalls/eventfd/eventfd04.c
+++ b/testcases/kernel/syscalls/eventfd/eventfd04.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test whether writefd is set by select() when eventfd() counter value is
* not the maximum value, then check if writefd is not set when eventfd()
* counter value is maximum value.
diff --git a/testcases/kernel/syscalls/eventfd/eventfd05.c b/testcases/kernel/syscalls/eventfd/eventfd05.c
index 6ea2c4138a..76806c6b53 100644
--- a/testcases/kernel/syscalls/eventfd/eventfd05.c
+++ b/testcases/kernel/syscalls/eventfd/eventfd05.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test whether eventfd() counter update in child is reflected in the parent.
*/
diff --git a/testcases/kernel/syscalls/eventfd/eventfd06.c b/testcases/kernel/syscalls/eventfd/eventfd06.c
index 46d7f73d3a..0ac48b2c84 100644
--- a/testcases/kernel/syscalls/eventfd/eventfd06.c
+++ b/testcases/kernel/syscalls/eventfd/eventfd06.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test whether counter overflow is detected and handled correctly.
*
* It is not possible to directly overflow the counter using the
diff --git a/testcases/kernel/syscalls/eventfd2/eventfd2_01.c b/testcases/kernel/syscalls/eventfd2/eventfd2_01.c
index 3a80379a39..9c63891cb4 100644
--- a/testcases/kernel/syscalls/eventfd2/eventfd2_01.c
+++ b/testcases/kernel/syscalls/eventfd2/eventfd2_01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that eventfd2 correctly set FD_CLOEXEC flag on file when
* EFD_CLOEXEC flag is used.
*/
diff --git a/testcases/kernel/syscalls/eventfd2/eventfd2_02.c b/testcases/kernel/syscalls/eventfd2/eventfd2_02.c
index 430cdb33cc..4d837804da 100644
--- a/testcases/kernel/syscalls/eventfd2/eventfd2_02.c
+++ b/testcases/kernel/syscalls/eventfd2/eventfd2_02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that eventfd2 correctly set O_NONBLOCK flag on file when
* EFD_NONBLOCK flag is used.
*/
diff --git a/testcases/kernel/syscalls/eventfd2/eventfd2_03.c b/testcases/kernel/syscalls/eventfd2/eventfd2_03.c
index e1949fd323..058e5734fb 100644
--- a/testcases/kernel/syscalls/eventfd2/eventfd2_03.c
+++ b/testcases/kernel/syscalls/eventfd2/eventfd2_03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that eventfd2 semaphore-like support is properly working.
*/
diff --git a/testcases/kernel/syscalls/execve/execve04.c b/testcases/kernel/syscalls/execve/execve04.c
index 7bbfece859..7b475dd1af 100644
--- a/testcases/kernel/syscalls/execve/execve04.c
+++ b/testcases/kernel/syscalls/execve/execve04.c
@@ -9,8 +9,6 @@
*/
/*\
- * [Description]
- *
* Attempt to execve(2) a file which is being opened by another process for
* writing fails with ETXTBSY.
*/
diff --git a/testcases/kernel/syscalls/execve/execve05.c b/testcases/kernel/syscalls/execve/execve05.c
index 530c7cc890..ec0fc102a3 100644
--- a/testcases/kernel/syscalls/execve/execve05.c
+++ b/testcases/kernel/syscalls/execve/execve05.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* This tests the functionality of the execve(2) system call by spawning
* a few children, each of which would execute "execve_child" simultaneously,
* and finally the parent ensures that they terminated correctly.
diff --git a/testcases/kernel/syscalls/execve/execve06.c b/testcases/kernel/syscalls/execve/execve06.c
index a000892655..f0ce990d6f 100644
--- a/testcases/kernel/syscalls/execve/execve06.c
+++ b/testcases/kernel/syscalls/execve/execve06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test that kernel adds dummy argv[0] if empty argument list was passed to
* execve(). This fixes at least one CVE where userspace programs start to
* process argument list blindly from argv[1] such as polkit pkexec
diff --git a/testcases/kernel/syscalls/exit_group/exit_group01.c b/testcases/kernel/syscalls/exit_group/exit_group01.c
index 6407a20e8f..585bb7cdb4 100644
--- a/testcases/kernel/syscalls/exit_group/exit_group01.c
+++ b/testcases/kernel/syscalls/exit_group/exit_group01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* This test checks if exit_group() correctly ends a spawned child and all its
* running threads.
*/
diff --git a/testcases/kernel/syscalls/faccessat/faccessat01.c b/testcases/kernel/syscalls/faccessat/faccessat01.c
index 6be2b4bb73..2c54fe2bd1 100644
--- a/testcases/kernel/syscalls/faccessat/faccessat01.c
+++ b/testcases/kernel/syscalls/faccessat/faccessat01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the faccessat() system call.
*
* - faccessat() passes if dir_fd is file descriptor to the directory
diff --git a/testcases/kernel/syscalls/faccessat/faccessat02.c b/testcases/kernel/syscalls/faccessat/faccessat02.c
index 1add695c1f..3f79a25948 100644
--- a/testcases/kernel/syscalls/faccessat/faccessat02.c
+++ b/testcases/kernel/syscalls/faccessat/faccessat02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* - faccessat() fails with ENOTDIR if dir_fd is file descriptor to the file
* and pathname is relative path of the file.
*
diff --git a/testcases/kernel/syscalls/faccessat2/faccessat201.c b/testcases/kernel/syscalls/faccessat2/faccessat201.c
index 1be6e9aa06..0fa807e394 100644
--- a/testcases/kernel/syscalls/faccessat2/faccessat201.c
+++ b/testcases/kernel/syscalls/faccessat2/faccessat201.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of faccessat2().
*
* Minimum Linux version required is v5.8.
diff --git a/testcases/kernel/syscalls/faccessat2/faccessat202.c b/testcases/kernel/syscalls/faccessat2/faccessat202.c
index a60db2bf81..0878457eb7 100644
--- a/testcases/kernel/syscalls/faccessat2/faccessat202.c
+++ b/testcases/kernel/syscalls/faccessat2/faccessat202.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test basic error handling of faccessat2 syscall:
*
* - faccessat2() fails with EFAULT if pathname is a bad pathname point.
diff --git a/testcases/kernel/syscalls/fallocate/fallocate03.c b/testcases/kernel/syscalls/fallocate/fallocate03.c
index b3e6b38172..dc15b8764e 100644
--- a/testcases/kernel/syscalls/fallocate/fallocate03.c
+++ b/testcases/kernel/syscalls/fallocate/fallocate03.c
@@ -8,7 +8,6 @@
*/
/*\
- * [Description]
* Test fallocate() on sparse file for different offsets, with a total of 8 test cases
*/
diff --git a/testcases/kernel/syscalls/fallocate/fallocate06.c b/testcases/kernel/syscalls/fallocate/fallocate06.c
index 0e1509ace6..3730bddc0b 100644
--- a/testcases/kernel/syscalls/fallocate/fallocate06.c
+++ b/testcases/kernel/syscalls/fallocate/fallocate06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Tests misaligned fallocate()
*
* Test scenario:
diff --git a/testcases/kernel/syscalls/fanotify/fanotify01.c b/testcases/kernel/syscalls/fanotify/fanotify01.c
index c7e759166d..fa0d5e84ad 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify01.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify01.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check that fanotify work for a file.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify02.c b/testcases/kernel/syscalls/fanotify/fanotify02.c
index 19854064a6..34c77967f7 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify02.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify02.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check that fanotify work for children of a directory.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify03.c b/testcases/kernel/syscalls/fanotify/fanotify03.c
index 64c933c190..6a0042fd42 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify03.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify03.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check that fanotify permission events work.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify04.c b/testcases/kernel/syscalls/fanotify/fanotify04.c
index 378bc57c0d..9625e6f9be 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify04.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify04.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check various fanotify special flags.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify05.c b/testcases/kernel/syscalls/fanotify/fanotify05.c
index f43332fedf..5eddb5d77d 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify05.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify05.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check that fanotify overflow event is properly generated.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/fanotify/fanotify06.c b/testcases/kernel/syscalls/fanotify/fanotify06.c
index b4992afa0f..2e93840f0f 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify06.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify06.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check that fanotify properly merges ignore mask of an inode and mountpoint.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify07.c b/testcases/kernel/syscalls/fanotify/fanotify07.c
index 34aa810c7d..7734b1858d 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify07.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify07.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check that fanotify permission events are handled properly on instance destruction.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify08.c b/testcases/kernel/syscalls/fanotify/fanotify08.c
index 405965f7f7..abbf0b8a75 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify08.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify08.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Sanity check fanotify_init flag FAN_CLOEXEC by fcntl.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify09.c b/testcases/kernel/syscalls/fanotify/fanotify09.c
index 45303c31e7..2ed3d1eb7b 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify09.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify09.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check that fanotify handles events on children correctly when both parent and
* subdir or mountpoint marks exist.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify10.c b/testcases/kernel/syscalls/fanotify/fanotify10.c
index 23e9554b39..ccb4f55df3 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify10.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify10.c
@@ -8,7 +8,6 @@
*/
/*\
- * [Description]
* Check that fanotify properly merges ignore mask of a mount mark
* with a mask of an inode mark on the same group. Unlike the
* prototype test fanotify06, do not use FAN_MODIFY event for the
diff --git a/testcases/kernel/syscalls/fanotify/fanotify11.c b/testcases/kernel/syscalls/fanotify/fanotify11.c
index ce46913b17..594d5f9daf 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify11.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify11.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* After fanotify_init adds flags FAN_REPORT_TID,
* check whether the program can accurately identify which thread id
* in the multithreaded program triggered the event.
diff --git a/testcases/kernel/syscalls/fanotify/fanotify12.c b/testcases/kernel/syscalls/fanotify/fanotify12.c
index 60ba27e168..e5624835a8 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify12.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify12.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Validate that the newly introduced FAN_OPEN_EXEC mask functions as expected.
* The idea is to generate a sequence of open related actions to ensure that
* the correct event flags are being set depending on what event mask was
diff --git a/testcases/kernel/syscalls/fanotify/fanotify13.c b/testcases/kernel/syscalls/fanotify/fanotify13.c
index 840018fa7f..32b2b8238b 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify13.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify13.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Validate that the values returned within an event when FAN_REPORT_FID is
* specified matches those that are obtained via explicit invocation to system
* calls statfs(2) and name_to_handle_at(2).
diff --git a/testcases/kernel/syscalls/fanotify/fanotify14.c b/testcases/kernel/syscalls/fanotify/fanotify14.c
index b17bffd184..a00ca9758d 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify14.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify14.c
@@ -7,7 +7,6 @@
*/
/*\
- * [Description]
* This test file has been designed to ensure that the fanotify
* system calls fanotify_init(2) and fanotify_mark(2) return the
* correct error code to the calling process when an invalid flag or
diff --git a/testcases/kernel/syscalls/fanotify/fanotify15.c b/testcases/kernel/syscalls/fanotify/fanotify15.c
index bacf05049f..2218dd6669 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify15.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify15.c
@@ -7,7 +7,6 @@
*/
/*\
- * [Description]
* Test file that has been purposely designed to verify FAN_REPORT_FID
* functionality while using newly defined dirent events.
*/
diff --git a/testcases/kernel/syscalls/fanotify/fanotify16.c b/testcases/kernel/syscalls/fanotify/fanotify16.c
index 6ab3609849..d4ad65bceb 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify16.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify16.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check fanotify directory entry modification events, events on child and
* on self with group init flags:
*
diff --git a/testcases/kernel/syscalls/fanotify/fanotify17.c b/testcases/kernel/syscalls/fanotify/fanotify17.c
index 3ecb31b6e7..f6e282e7fc 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify17.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify17.c
@@ -8,7 +8,6 @@
*/
/*\
- * [Description]
* Check that fanotify groups and marks limits are enforced correctly.
* If user ns is supported, verify that global limit and per user ns
* limits are both enforced.
diff --git a/testcases/kernel/syscalls/fanotify/fanotify18.c b/testcases/kernel/syscalls/fanotify/fanotify18.c
index 07b064b921..4fd9974601 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify18.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify18.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* This set of tests is to ensure that the unprivileged listener feature of
* fanotify is functioning as expected. The objective this test case file
* is to validate whether any forbidden flags that are passed by an
diff --git a/testcases/kernel/syscalls/fanotify/fanotify19.c b/testcases/kernel/syscalls/fanotify/fanotify19.c
index 63fc4ee0c0..80790955f1 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify19.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify19.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* This set of tests is to ensure that the unprivileged listener feature of
* fanotify is functioning as expected. The objective of this test file is
* to generate a sequence of events and ensure that the returned events
diff --git a/testcases/kernel/syscalls/fanotify/fanotify20.c b/testcases/kernel/syscalls/fanotify/fanotify20.c
index 1d249ac9cf..82d2049255 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify20.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify20.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* This source file contains a test case which ensures that the fanotify API
* returns an expected error code when provided an invalid initialization flag
* alongside FAN_REPORT_PIDFD. Additionally, it checks that the operability with
diff --git a/testcases/kernel/syscalls/fanotify/fanotify21.c b/testcases/kernel/syscalls/fanotify/fanotify21.c
index 8765767f20..c95895c93a 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify21.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify21.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* A test which verifies whether the returned struct
* fanotify_event_info_pidfd in FAN_REPORT_PIDFD mode contains the
* expected set of information.
diff --git a/testcases/kernel/syscalls/fanotify/fanotify22.c b/testcases/kernel/syscalls/fanotify/fanotify22.c
index 1c72101369..2fbb6fa404 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify22.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify22.c
@@ -7,7 +7,6 @@
*/
/*\
- * [Description]
* Check fanotify FAN_ERROR_FS events triggered by intentionally
* corrupted filesystems:
*
diff --git a/testcases/kernel/syscalls/fanotify/fanotify23.c b/testcases/kernel/syscalls/fanotify/fanotify23.c
index 957eba19a5..896a8a850a 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify23.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify23.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Check evictable fanotify inode marks.
*/
diff --git a/testcases/kernel/syscalls/fchmod/fchmod01.c b/testcases/kernel/syscalls/fchmod/fchmod01.c
index 417ea0a70c..e23dcded89 100644
--- a/testcases/kernel/syscalls/fchmod/fchmod01.c
+++ b/testcases/kernel/syscalls/fchmod/fchmod01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that fchmod() can succeed to change the mode permissions of a file specified
* by file descriptor.
*/
diff --git a/testcases/kernel/syscalls/fchmod/fchmod02.c b/testcases/kernel/syscalls/fchmod/fchmod02.c
index d6abeffce8..e25739bcf6 100644
--- a/testcases/kernel/syscalls/fchmod/fchmod02.c
+++ b/testcases/kernel/syscalls/fchmod/fchmod02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that, fchmod(2) will succeed to change the mode of a file/directory
* set the sticky bit on it if invoked by root (uid = 0) process with
* the following constraints:
diff --git a/testcases/kernel/syscalls/fchmod/fchmod03.c b/testcases/kernel/syscalls/fchmod/fchmod03.c
index bdd720c37b..028ec15575 100644
--- a/testcases/kernel/syscalls/fchmod/fchmod03.c
+++ b/testcases/kernel/syscalls/fchmod/fchmod03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that, fchmod(2) will succeed to change the mode of a file
* and set the sticky bit on it if invoked by non-root (uid != 0)
* process with the following constraints:
diff --git a/testcases/kernel/syscalls/fchmod/fchmod04.c b/testcases/kernel/syscalls/fchmod/fchmod04.c
index 4fa69e2270..5276870250 100644
--- a/testcases/kernel/syscalls/fchmod/fchmod04.c
+++ b/testcases/kernel/syscalls/fchmod/fchmod04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that, fchmod(2) will succeed to change the mode of a directory
* and set the sticky bit on it if invoked by non-root (uid != 0) process
* with the following constraints:
diff --git a/testcases/kernel/syscalls/fchmod/fchmod05.c b/testcases/kernel/syscalls/fchmod/fchmod05.c
index 9b29cea20b..0489cb6a89 100644
--- a/testcases/kernel/syscalls/fchmod/fchmod05.c
+++ b/testcases/kernel/syscalls/fchmod/fchmod05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, fchmod(2) will succeed to change the mode of a directory
* but fails to set the setgid bit on it if invoked by non-root (uid != 0)
* process with the following constraints:
diff --git a/testcases/kernel/syscalls/fchmodat/fchmodat01.c b/testcases/kernel/syscalls/fchmodat/fchmodat01.c
index 7ca65648fd..672fbff5f4 100644
--- a/testcases/kernel/syscalls/fchmodat/fchmodat01.c
+++ b/testcases/kernel/syscalls/fchmodat/fchmodat01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the fchmodat() system call.
*
* - fchmodat() passes if dir_fd is file descriptor to the directory
diff --git a/testcases/kernel/syscalls/fchmodat/fchmodat02.c b/testcases/kernel/syscalls/fchmodat/fchmodat02.c
index 117865a8f9..b871546301 100644
--- a/testcases/kernel/syscalls/fchmodat/fchmodat02.c
+++ b/testcases/kernel/syscalls/fchmodat/fchmodat02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the fchmodat() syscall.
*
* - fchmodat() fails with ENOTDIR if dir_fd is file descriptor
diff --git a/testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c b/testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c
index e58be31c42..dcf67cd5ef 100644
--- a/testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c
+++ b/testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that fchmodat2() syscall is properly working with
* regular files, symbolic links and directories. AT_SYMLINK_NOFOLLOW is a
* special feature that is blocked by VFS since 5d1f903f75a8 and any of its
diff --git a/testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c b/testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c
index f8497d8a84..0da65f40a2 100644
--- a/testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c
+++ b/testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that fchmodat2() syscall properly raises errors with
* invalid values.
*/
diff --git a/testcases/kernel/syscalls/fchown/fchown01.c b/testcases/kernel/syscalls/fchown/fchown01.c
index 4ab5a2f38a..946cff0c9d 100644
--- a/testcases/kernel/syscalls/fchown/fchown01.c
+++ b/testcases/kernel/syscalls/fchown/fchown01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic test for fchown(). Call fchown() on a fd and expect it to pass.
*/
diff --git a/testcases/kernel/syscalls/fchown/fchown02.c b/testcases/kernel/syscalls/fchown/fchown02.c
index bd1baf3bb7..6d6c4c170a 100644
--- a/testcases/kernel/syscalls/fchown/fchown02.c
+++ b/testcases/kernel/syscalls/fchown/fchown02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that fchown(2) invoked by super-user:
*
* - clears setuid and setgid bits set on an executable file
diff --git a/testcases/kernel/syscalls/fchown/fchown03.c b/testcases/kernel/syscalls/fchown/fchown03.c
index 97d6c9d342..cda3234f9d 100644
--- a/testcases/kernel/syscalls/fchown/fchown03.c
+++ b/testcases/kernel/syscalls/fchown/fchown03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, fchown(2) succeeds to change the group of a file specified
* by path when called by non-root user with the following constraints:
*
diff --git a/testcases/kernel/syscalls/fchown/fchown04.c b/testcases/kernel/syscalls/fchown/fchown04.c
index a7af3aae7f..56b91304df 100644
--- a/testcases/kernel/syscalls/fchown/fchown04.c
+++ b/testcases/kernel/syscalls/fchown/fchown04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* 1. fchown() returns -1 and sets errno to EPERM if the effective user id
diff --git a/testcases/kernel/syscalls/fchown/fchown05.c b/testcases/kernel/syscalls/fchown/fchown05.c
index 47ee171222..97992565fc 100644
--- a/testcases/kernel/syscalls/fchown/fchown05.c
+++ b/testcases/kernel/syscalls/fchown/fchown05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, fchown() succeeds to change the owner and group of a file
* specified by file descriptor to any numeric owner(uid)/group(gid) values
* when invoked by super-user.
diff --git a/testcases/kernel/syscalls/fchownat/fchownat01.c b/testcases/kernel/syscalls/fchownat/fchownat01.c
index fedcb8ab2f..5c0aa1a8e3 100644
--- a/testcases/kernel/syscalls/fchownat/fchownat01.c
+++ b/testcases/kernel/syscalls/fchownat/fchownat01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that fchownat() succeeds to change file's ownership if the file
* descriptor is AT_FDCWD or set by opening a directory.
*/
diff --git a/testcases/kernel/syscalls/fchownat/fchownat02.c b/testcases/kernel/syscalls/fchownat/fchownat02.c
index 10b4f5e3c0..e2e4c3765e 100644
--- a/testcases/kernel/syscalls/fchownat/fchownat02.c
+++ b/testcases/kernel/syscalls/fchownat/fchownat02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that fchownat() will operate on symbolic links when
* AT_SYMLINK_NOFOLLOW is used.
*/
diff --git a/testcases/kernel/syscalls/fchownat/fchownat03.c b/testcases/kernel/syscalls/fchownat/fchownat03.c
index 06928490bb..5219ca655d 100644
--- a/testcases/kernel/syscalls/fchownat/fchownat03.c
+++ b/testcases/kernel/syscalls/fchownat/fchownat03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that,
* - fchownat() returns -1 and sets errno to EACCES if there is no permission
to access to the file.
diff --git a/testcases/kernel/syscalls/fcntl/fcntl05.c b/testcases/kernel/syscalls/fcntl/fcntl05.c
index 7835d1e356..29cb20f4ab 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl05.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl05.c
@@ -15,8 +15,6 @@
*/
/*\
- * [Description]
- *
* Basic test for fcntl(2) using F_GETLK argument.
*
* If the lock could be placed, fcntl() does not actually place it, but
diff --git a/testcases/kernel/syscalls/fcntl/fcntl08.c b/testcases/kernel/syscalls/fcntl/fcntl08.c
index ea7602d9ee..5061974827 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl08.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl08.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Basic test for fcntl(2) using F_SETFL with flags O_NDELAY | O_APPEND | O_NONBLOCK.
*/
diff --git a/testcases/kernel/syscalls/fcntl/fcntl12.c b/testcases/kernel/syscalls/fcntl/fcntl12.c
index ccd57da903..93b861e040 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl12.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl12.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the fcntl syscall.
*
* - EMFILE when cmd is F_DUPFD and the per-process limit on the number of open
diff --git a/testcases/kernel/syscalls/fcntl/fcntl13.c b/testcases/kernel/syscalls/fcntl/fcntl13.c
index 1bc414cca3..6935e3906f 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl13.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl13.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the fcntl syscall.
*
* - EFAULT when lock is outside your accessible address space
diff --git a/testcases/kernel/syscalls/fcntl/fcntl14.c b/testcases/kernel/syscalls/fcntl/fcntl14.c
index 21dbede5c3..c2f2e28232 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl14.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl14.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test is checking fcntl() syscall locking mechanism between two
* processes.
* The test sets a random starting position on file using lseek(), it randomly
diff --git a/testcases/kernel/syscalls/fcntl/fcntl15.c b/testcases/kernel/syscalls/fcntl/fcntl15.c
index 8c17144fb2..79184e0c1e 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl15.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl15.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Check that file locks are removed when a file descriptor is closed, three
* different tests are implemented.
*
diff --git a/testcases/kernel/syscalls/fcntl/fcntl27.c b/testcases/kernel/syscalls/fcntl/fcntl27.c
index 6dbf58feb1..07a63ebc09 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl27.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl27.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic test for fcntl(2) using F_SETLEASE and F_RDLCK argument,
* testing O_RDWR and O_WRONLY.
*/
diff --git a/testcases/kernel/syscalls/fcntl/fcntl29.c b/testcases/kernel/syscalls/fcntl/fcntl29.c
index 24d3983edf..836ca30e92 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl29.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl29.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for fcntl(2) using F_DUPFD_CLOEXEC and getting FD_CLOEXEC.
*/
diff --git a/testcases/kernel/syscalls/fcntl/fcntl30.c b/testcases/kernel/syscalls/fcntl/fcntl30.c
index 725385b39a..4d1b7e627a 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl30.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl30.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, fetching and changing the capacity of a pipe works as
* expected with fcntl(2) syscall using F_GETPIPE_SZ, F_SETPIPE_SZ arguments.
*/
diff --git a/testcases/kernel/syscalls/fcntl/fcntl39.c b/testcases/kernel/syscalls/fcntl/fcntl39.c
index 30aada2aa1..1142e1a684 100644
--- a/testcases/kernel/syscalls/fcntl/fcntl39.c
+++ b/testcases/kernel/syscalls/fcntl/fcntl39.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that dnotify DN_RENAME event is reported only on rename inside same parent.
*/
diff --git a/testcases/kernel/syscalls/finit_module/finit_module01.c b/testcases/kernel/syscalls/finit_module/finit_module01.c
index ea00e48356..397d5a1ae4 100644
--- a/testcases/kernel/syscalls/finit_module/finit_module01.c
+++ b/testcases/kernel/syscalls/finit_module/finit_module01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic finit_module() tests.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/finit_module/finit_module02.c b/testcases/kernel/syscalls/finit_module/finit_module02.c
index e16164ee25..78dc741008 100644
--- a/testcases/kernel/syscalls/finit_module/finit_module02.c
+++ b/testcases/kernel/syscalls/finit_module/finit_module02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic finit_module() failure tests.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/flock/flock01.c b/testcases/kernel/syscalls/flock/flock01.c
index 4c37e07f97..c8e5aac1ec 100644
--- a/testcases/kernel/syscalls/flock/flock01.c
+++ b/testcases/kernel/syscalls/flock/flock01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test for flock(2), uses LOCK_SH, LOCK_UN, LOCK_EX locks.
*/
diff --git a/testcases/kernel/syscalls/flock/flock02.c b/testcases/kernel/syscalls/flock/flock02.c
index 5c27c81a25..a8ca7c88ad 100644
--- a/testcases/kernel/syscalls/flock/flock02.c
+++ b/testcases/kernel/syscalls/flock/flock02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify flock(2) returns -1 and set proper errno:
*
* - EBADF if the file descriptor is invalid
diff --git a/testcases/kernel/syscalls/flock/flock03.c b/testcases/kernel/syscalls/flock/flock03.c
index dec6e73440..be6475f134 100644
--- a/testcases/kernel/syscalls/flock/flock03.c
+++ b/testcases/kernel/syscalls/flock/flock03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that flock(2) cannot unlock a file locked by another task.
*
* Fork a child processes. The parent flocks a file with LOCK_EX. Child waits
diff --git a/testcases/kernel/syscalls/flock/flock04.c b/testcases/kernel/syscalls/flock/flock04.c
index 1649b45c2e..da354a653b 100644
--- a/testcases/kernel/syscalls/flock/flock04.c
+++ b/testcases/kernel/syscalls/flock/flock04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test verifies that flock() behavior with different locking combinations along
* with LOCK_SH and LOCK_EX:
*
diff --git a/testcases/kernel/syscalls/flock/flock06.c b/testcases/kernel/syscalls/flock/flock06.c
index 7e9da8acdd..363dc5bf78 100644
--- a/testcases/kernel/syscalls/flock/flock06.c
+++ b/testcases/kernel/syscalls/flock/flock06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test verifies that flock locks held on one file descriptor conflict with
* flock locks held on a different file descriptor.
*
diff --git a/testcases/kernel/syscalls/flock/flock07.c b/testcases/kernel/syscalls/flock/flock07.c
index 368147370c..6b6848b91c 100644
--- a/testcases/kernel/syscalls/flock/flock07.c
+++ b/testcases/kernel/syscalls/flock/flock07.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that flock(2) fails with errno EINTR when waiting to acquire a lock,
* and the call is interrupted by a signal.
*/
diff --git a/testcases/kernel/syscalls/fork/fork05.c b/testcases/kernel/syscalls/fork/fork05.c
index b5146d27b9..22edefc368 100644
--- a/testcases/kernel/syscalls/fork/fork05.c
+++ b/testcases/kernel/syscalls/fork/fork05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that LDT is propagated correctly from parent process to
* the child process.
*
diff --git a/testcases/kernel/syscalls/fork/fork07.c b/testcases/kernel/syscalls/fork/fork07.c
index 43b92c8057..266f0ffbc4 100644
--- a/testcases/kernel/syscalls/fork/fork07.c
+++ b/testcases/kernel/syscalls/fork/fork07.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Check that all children inherit parent's file descriptor.
*
* Parent opens a file and forks children. Each child reads a byte and checks
diff --git a/testcases/kernel/syscalls/fork/fork08.c b/testcases/kernel/syscalls/fork/fork08.c
index 34af476fc7..6a56cda70a 100644
--- a/testcases/kernel/syscalls/fork/fork08.c
+++ b/testcases/kernel/syscalls/fork/fork08.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that the parent's file descriptors will not be affected by being
* closed in the child.
*/
diff --git a/testcases/kernel/syscalls/fork/fork10.c b/testcases/kernel/syscalls/fork/fork10.c
index 790e7b386e..d6dc05d46a 100644
--- a/testcases/kernel/syscalls/fork/fork10.c
+++ b/testcases/kernel/syscalls/fork/fork10.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies inheritance of file descriptors from parent to child
* process. We open a file from parent, then we check if file offset changes
* accordingly with file descriptor usage.
diff --git a/testcases/kernel/syscalls/fork/fork13.c b/testcases/kernel/syscalls/fork/fork13.c
index 3e96d0d420..3da698e33d 100644
--- a/testcases/kernel/syscalls/fork/fork13.c
+++ b/testcases/kernel/syscalls/fork/fork13.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* A race in pid generation that causes pids to be reused immediately
*
* From the mainline commit 5fdee8c4a5e1800489ce61963208f8cc55e42ea1:
diff --git a/testcases/kernel/syscalls/fork/fork14.c b/testcases/kernel/syscalls/fork/fork14.c
index d61864b529..ad3c0a9e76 100644
--- a/testcases/kernel/syscalls/fork/fork14.c
+++ b/testcases/kernel/syscalls/fork/fork14.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test is a reproducer for kernel 3.5:
* 7edc8b0ac16c ("mm/fork: fix overflow in vma length when copying mmap on clone")
*
diff --git a/testcases/kernel/syscalls/fpathconf/fpathconf01.c b/testcases/kernel/syscalls/fpathconf/fpathconf01.c
index a328f972fc..d3654dd352 100644
--- a/testcases/kernel/syscalls/fpathconf/fpathconf01.c
+++ b/testcases/kernel/syscalls/fpathconf/fpathconf01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the fpathconf(2) system call.
*/
diff --git a/testcases/kernel/syscalls/fsconfig/fsconfig03.c b/testcases/kernel/syscalls/fsconfig/fsconfig03.c
index 5037536360..add54769e0 100644
--- a/testcases/kernel/syscalls/fsconfig/fsconfig03.c
+++ b/testcases/kernel/syscalls/fsconfig/fsconfig03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2022-0185.
*
* References links:
diff --git a/testcases/kernel/syscalls/fsetxattr/fsetxattr02.c b/testcases/kernel/syscalls/fsetxattr/fsetxattr02.c
index 39265af366..18490a8658 100644
--- a/testcases/kernel/syscalls/fsetxattr/fsetxattr02.c
+++ b/testcases/kernel/syscalls/fsetxattr/fsetxattr02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify basic fsetxattr(2) syscall functionality:
*
* - Set attribute to a regular file, fsetxattr(2) should succeed.
diff --git a/testcases/kernel/syscalls/fstat/fstat02.c b/testcases/kernel/syscalls/fstat/fstat02.c
index 2768317575..68cbe82f0e 100644
--- a/testcases/kernel/syscalls/fstat/fstat02.c
+++ b/testcases/kernel/syscalls/fstat/fstat02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests if fstat() returns correctly and reports correct file information
* using the stat structure.
*/
diff --git a/testcases/kernel/syscalls/fstatfs/fstatfs01.c b/testcases/kernel/syscalls/fstatfs/fstatfs01.c
index 044ab65488..d952388998 100644
--- a/testcases/kernel/syscalls/fstatfs/fstatfs01.c
+++ b/testcases/kernel/syscalls/fstatfs/fstatfs01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that fstatfs() syscall executes successfully for all
* available filesystems.
*/
diff --git a/testcases/kernel/syscalls/fstatfs/fstatfs02.c b/testcases/kernel/syscalls/fstatfs/fstatfs02.c
index f801c9f5fa..dcb9589eb9 100644
--- a/testcases/kernel/syscalls/fstatfs/fstatfs02.c
+++ b/testcases/kernel/syscalls/fstatfs/fstatfs02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check if fstatfs() sets errno correctly.
*/
diff --git a/testcases/kernel/syscalls/ftruncate/ftruncate01.c b/testcases/kernel/syscalls/ftruncate/ftruncate01.c
index ea97edb1da..13f915bee1 100644
--- a/testcases/kernel/syscalls/ftruncate/ftruncate01.c
+++ b/testcases/kernel/syscalls/ftruncate/ftruncate01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, ftruncate() succeeds to truncate a file to a certain length,
* if the file previously is smaller than the truncated size, ftruncate()
* shall increase the size of the file.
diff --git a/testcases/kernel/syscalls/ftruncate/ftruncate03.c b/testcases/kernel/syscalls/ftruncate/ftruncate03.c
index f2fa96dce5..368186e26a 100644
--- a/testcases/kernel/syscalls/ftruncate/ftruncate03.c
+++ b/testcases/kernel/syscalls/ftruncate/ftruncate03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that ftruncate(2) system call returns appropriate error number:
*
* 1. EINVAL -- the file is a socket
diff --git a/testcases/kernel/syscalls/futex/futex_cmp_requeue01.c b/testcases/kernel/syscalls/futex/futex_cmp_requeue01.c
index bf4c3813a8..946e4e949e 100644
--- a/testcases/kernel/syscalls/futex/futex_cmp_requeue01.c
+++ b/testcases/kernel/syscalls/futex/futex_cmp_requeue01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify the basic functionality of futex(FUTEX_CMP_REQUEUE).
*
* futex(FUTEX_CMP_REQUEUE) can wake up the number of waiters specified
diff --git a/testcases/kernel/syscalls/futex/futex_waitv01.c b/testcases/kernel/syscalls/futex/futex_waitv01.c
index 17b96738cd..bbea664823 100644
--- a/testcases/kernel/syscalls/futex/futex_waitv01.c
+++ b/testcases/kernel/syscalls/futex/futex_waitv01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies EINVAL for futex_waitv syscall.
*/
diff --git a/testcases/kernel/syscalls/futex/futex_waitv02.c b/testcases/kernel/syscalls/futex/futex_waitv02.c
index ccea5eb5e7..6b210d38d2 100644
--- a/testcases/kernel/syscalls/futex/futex_waitv02.c
+++ b/testcases/kernel/syscalls/futex/futex_waitv02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies futex_waitv syscall using private data.
*/
diff --git a/testcases/kernel/syscalls/futex/futex_waitv03.c b/testcases/kernel/syscalls/futex/futex_waitv03.c
index c674f52d8d..1d367ed001 100644
--- a/testcases/kernel/syscalls/futex/futex_waitv03.c
+++ b/testcases/kernel/syscalls/futex/futex_waitv03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies futex_waitv syscall using shared data.
*/
diff --git a/testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c b/testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c
index 23f62091a3..3c854d1096 100644
--- a/testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c
+++ b/testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c
@@ -12,8 +12,6 @@
*/
/*\
- * [Description]
- *
* Verify that get_mempolicy() returns a proper return value and errno for various cases.
*/
diff --git a/testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c b/testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c
index 4a855596d9..79ff5d94f8 100644
--- a/testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c
+++ b/testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c
@@ -12,8 +12,6 @@
*/
/*\
- * [Description]
- *
* Verify that get_mempolicy() returns a proper return errno for failure cases.
*/
diff --git a/testcases/kernel/syscalls/getcontext/getcontext01.c b/testcases/kernel/syscalls/getcontext/getcontext01.c
index 5896c38004..0d8955e321 100644
--- a/testcases/kernel/syscalls/getcontext/getcontext01.c
+++ b/testcases/kernel/syscalls/getcontext/getcontext01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for getcontext().
*
* Calls a getcontext() then jumps back with a setcontext().
diff --git a/testcases/kernel/syscalls/getcpu/getcpu01.c b/testcases/kernel/syscalls/getcpu/getcpu01.c
index 152f91d32b..19d8c9d813 100644
--- a/testcases/kernel/syscalls/getcpu/getcpu01.c
+++ b/testcases/kernel/syscalls/getcpu/getcpu01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* The test process is affined to a CPU. It then calls getcpu and
* checks that the CPU and node (if supported) match the expected
* values.
diff --git a/testcases/kernel/syscalls/getcpu/getcpu02.c b/testcases/kernel/syscalls/getcpu/getcpu02.c
index 048758b3d0..954151c048 100644
--- a/testcases/kernel/syscalls/getcpu/getcpu02.c
+++ b/testcases/kernel/syscalls/getcpu/getcpu02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that getcpu(2) fails with EFAULT if cpu_id or node_id points outside
* the calling process address space.
*/
diff --git a/testcases/kernel/syscalls/getcwd/getcwd02.c b/testcases/kernel/syscalls/getcwd/getcwd02.c
index e3df22ceb8..4950c2d25c 100644
--- a/testcases/kernel/syscalls/getcwd/getcwd02.c
+++ b/testcases/kernel/syscalls/getcwd/getcwd02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the basic functionality of the getcwd(2) system call.
*
* 1. getcwd(2) works fine if buf and size are valid.
diff --git a/testcases/kernel/syscalls/getcwd/getcwd03.c b/testcases/kernel/syscalls/getcwd/getcwd03.c
index 9e3828a93f..4ea4e3ad1b 100644
--- a/testcases/kernel/syscalls/getcwd/getcwd03.c
+++ b/testcases/kernel/syscalls/getcwd/getcwd03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the basic functionality of the getcwd(2)
* system call on a symbolic link.
*
diff --git a/testcases/kernel/syscalls/getdents/getdents01.c b/testcases/kernel/syscalls/getdents/getdents01.c
index d6c4b49792..6a88e305af 100644
--- a/testcases/kernel/syscalls/getdents/getdents01.c
+++ b/testcases/kernel/syscalls/getdents/getdents01.c
@@ -7,8 +7,6 @@
*/
/*\
- *
- * [Description]
*
* Basic getdents() test that checks if directory listing is correct and
* complete.
diff --git a/testcases/kernel/syscalls/getdents/getdents02.c b/testcases/kernel/syscalls/getdents/getdents02.c
index 71c3332f47..98254e12fb 100644
--- a/testcases/kernel/syscalls/getdents/getdents02.c
+++ b/testcases/kernel/syscalls/getdents/getdents02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* - getdents() fails with EBADF if file descriptor fd is invalid
diff --git a/testcases/kernel/syscalls/getdomainname/getdomainname01.c b/testcases/kernel/syscalls/getdomainname/getdomainname01.c
index 17a9392e55..34c5526445 100644
--- a/testcases/kernel/syscalls/getdomainname/getdomainname01.c
+++ b/testcases/kernel/syscalls/getdomainname/getdomainname01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test for getdomainname(2)
*
* This is a Phase I test for the getdomainname(2) system call.
diff --git a/testcases/kernel/syscalls/getegid/getegid01.c b/testcases/kernel/syscalls/getegid/getegid01.c
index 46cdc680bf..429991960d 100644
--- a/testcases/kernel/syscalls/getegid/getegid01.c
+++ b/testcases/kernel/syscalls/getegid/getegid01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test checks if getegid() returns the effective group id.
*/
diff --git a/testcases/kernel/syscalls/getegid/getegid02.c b/testcases/kernel/syscalls/getegid/getegid02.c
index 2f64bd8697..32635e83d3 100644
--- a/testcases/kernel/syscalls/getegid/getegid02.c
+++ b/testcases/kernel/syscalls/getegid/getegid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test checks if getegid() returns the same effective group given by
* passwd entry via getpwuid().
*/
diff --git a/testcases/kernel/syscalls/getgid/getgid01.c b/testcases/kernel/syscalls/getgid/getgid01.c
index 3d914f73fa..2481b14989 100644
--- a/testcases/kernel/syscalls/getgid/getgid01.c
+++ b/testcases/kernel/syscalls/getgid/getgid01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Call getgid() and expects that the gid returned correctly.
*/
diff --git a/testcases/kernel/syscalls/getgid/getgid03.c b/testcases/kernel/syscalls/getgid/getgid03.c
index eb302ad329..3e406ce64e 100644
--- a/testcases/kernel/syscalls/getgid/getgid03.c
+++ b/testcases/kernel/syscalls/getgid/getgid03.c
@@ -5,7 +5,6 @@
*/
/*\
- * [Description]
* Testcase to check the basic functionality of getgid().
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c b/testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c
index 6059753070..e4c0cb716e 100644
--- a/testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c
+++ b/testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test for GHOST: glibc vulnerability (CVE-2015-0235).
*
* https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
diff --git a/testcases/kernel/syscalls/gethostid/gethostid01.c b/testcases/kernel/syscalls/gethostid/gethostid01.c
index 3fc280327a..e5cf201abb 100644
--- a/testcases/kernel/syscalls/gethostid/gethostid01.c
+++ b/testcases/kernel/syscalls/gethostid/gethostid01.c
@@ -19,8 +19,6 @@
*/
/*\
- * [Description]
- *
* Test the basic functionality of the sethostid() and gethostid() system call.
*/
diff --git a/testcases/kernel/syscalls/gethostname/gethostname01.c b/testcases/kernel/syscalls/gethostname/gethostname01.c
index 5d882514a1..6ef8a634a5 100644
--- a/testcases/kernel/syscalls/gethostname/gethostname01.c
+++ b/testcases/kernel/syscalls/gethostname/gethostname01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test is checking that gethostname() succeeds.
*/
diff --git a/testcases/kernel/syscalls/gethostname/gethostname02.c b/testcases/kernel/syscalls/gethostname/gethostname02.c
index f792371ed5..c56fcb800a 100644
--- a/testcases/kernel/syscalls/gethostname/gethostname02.c
+++ b/testcases/kernel/syscalls/gethostname/gethostname02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that gethostname(2) fails with
*
* - ENAMETOOLONG when len is smaller than the actual size
diff --git a/testcases/kernel/syscalls/getitimer/getitimer01.c b/testcases/kernel/syscalls/getitimer/getitimer01.c
index 6b0cfba1c2..a32a2860be 100644
--- a/testcases/kernel/syscalls/getitimer/getitimer01.c
+++ b/testcases/kernel/syscalls/getitimer/getitimer01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that a correct call to getitimer() succeeds.
*/
diff --git a/testcases/kernel/syscalls/getitimer/getitimer02.c b/testcases/kernel/syscalls/getitimer/getitimer02.c
index 8ddbaec427..8bf8453eac 100644
--- a/testcases/kernel/syscalls/getitimer/getitimer02.c
+++ b/testcases/kernel/syscalls/getitimer/getitimer02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that getitimer() call fails:
*
* 1. EFAULT with invalid itimerval pointer
diff --git a/testcases/kernel/syscalls/getpagesize/getpagesize01.c b/testcases/kernel/syscalls/getpagesize/getpagesize01.c
index c88071ba44..3e810978bd 100644
--- a/testcases/kernel/syscalls/getpagesize/getpagesize01.c
+++ b/testcases/kernel/syscalls/getpagesize/getpagesize01.c
@@ -10,8 +10,6 @@
*/
/*\
- * [Description]
- *
* Verify that getpagesize(2) returns the number of bytes in a
* memory page as expected.
*/
diff --git a/testcases/kernel/syscalls/getpeername/getpeername01.c b/testcases/kernel/syscalls/getpeername/getpeername01.c
index 0f2600beed..945b83d2b2 100644
--- a/testcases/kernel/syscalls/getpeername/getpeername01.c
+++ b/testcases/kernel/syscalls/getpeername/getpeername01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that getpeername() returns the proper errno for various failure cases:
*
* - EBADF on invalid address.
diff --git a/testcases/kernel/syscalls/getpgid/getpgid01.c b/testcases/kernel/syscalls/getpgid/getpgid01.c
index 4c614e0b94..169ea3d642 100644
--- a/testcases/kernel/syscalls/getpgid/getpgid01.c
+++ b/testcases/kernel/syscalls/getpgid/getpgid01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify the basic functionality of getpgid(2) syscall.
*/
diff --git a/testcases/kernel/syscalls/getpgid/getpgid02.c b/testcases/kernel/syscalls/getpgid/getpgid02.c
index 30d0129bc2..2836160d0e 100644
--- a/testcases/kernel/syscalls/getpgid/getpgid02.c
+++ b/testcases/kernel/syscalls/getpgid/getpgid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that getpgid(2) fails with errno ESRCH when
* pid does not match any process.
*/
diff --git a/testcases/kernel/syscalls/getpgrp/getpgrp01.c b/testcases/kernel/syscalls/getpgrp/getpgrp01.c
index fe2e0c5825..06a6e0ae36 100644
--- a/testcases/kernel/syscalls/getpgrp/getpgrp01.c
+++ b/testcases/kernel/syscalls/getpgrp/getpgrp01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that getpgrp(2) syscall executes successfully.
*/
diff --git a/testcases/kernel/syscalls/getpid/getpid01.c b/testcases/kernel/syscalls/getpid/getpid01.c
index 314c45d094..d9ba0953c9 100644
--- a/testcases/kernel/syscalls/getpid/getpid01.c
+++ b/testcases/kernel/syscalls/getpid/getpid01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that getpid() system call returns process ID in range <2, PID_MAX>.
*/
diff --git a/testcases/kernel/syscalls/getpid/getpid02.c b/testcases/kernel/syscalls/getpid/getpid02.c
index 86ad5a29f5..3da853d48b 100644
--- a/testcases/kernel/syscalls/getpid/getpid02.c
+++ b/testcases/kernel/syscalls/getpid/getpid02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Check that:
*
* - fork() in parent returns the same pid as getpid() in child
diff --git a/testcases/kernel/syscalls/getppid/getppid01.c b/testcases/kernel/syscalls/getppid/getppid01.c
index 614eea9fdd..3f05aed37c 100644
--- a/testcases/kernel/syscalls/getppid/getppid01.c
+++ b/testcases/kernel/syscalls/getppid/getppid01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test whether parent process id that getppid() returns is out of range.
*/
diff --git a/testcases/kernel/syscalls/getppid/getppid02.c b/testcases/kernel/syscalls/getppid/getppid02.c
index cbc7ae76c9..7497eba12e 100644
--- a/testcases/kernel/syscalls/getppid/getppid02.c
+++ b/testcases/kernel/syscalls/getppid/getppid02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Check that getppid() in child returns the same pid as getpid() in parent.
*/
diff --git a/testcases/kernel/syscalls/getrandom/getrandom05.c b/testcases/kernel/syscalls/getrandom/getrandom05.c
index c4886b886f..f05a4fa807 100644
--- a/testcases/kernel/syscalls/getrandom/getrandom05.c
+++ b/testcases/kernel/syscalls/getrandom/getrandom05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that getrandom(2) fails with
*
* - EFAULT when buf address is outside the accessible address space
diff --git a/testcases/kernel/syscalls/getrlimit/getrlimit01.c b/testcases/kernel/syscalls/getrlimit/getrlimit01.c
index f14c8e6aa7..589b14880c 100644
--- a/testcases/kernel/syscalls/getrlimit/getrlimit01.c
+++ b/testcases/kernel/syscalls/getrlimit/getrlimit01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that getrlimit(2) call will be successful for all possible resource
* types.
*/
diff --git a/testcases/kernel/syscalls/getrlimit/getrlimit02.c b/testcases/kernel/syscalls/getrlimit/getrlimit02.c
index 9f5b2bf9cd..20c247a0e0 100644
--- a/testcases/kernel/syscalls/getrlimit/getrlimit02.c
+++ b/testcases/kernel/syscalls/getrlimit/getrlimit02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for checking error conditions for getrlimit(2):
*
* 1. getrlimit(2) returns -1 and sets errno to EFAULT if an invalid
diff --git a/testcases/kernel/syscalls/getrusage/getrusage01.c b/testcases/kernel/syscalls/getrusage/getrusage01.c
index 83275dd34b..78b8e57a03 100644
--- a/testcases/kernel/syscalls/getrusage/getrusage01.c
+++ b/testcases/kernel/syscalls/getrusage/getrusage01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test that getrusage() with RUSAGE_SELF and RUSAGE_CHILDREN succeeds.
*/
diff --git a/testcases/kernel/syscalls/getrusage/getrusage02.c b/testcases/kernel/syscalls/getrusage/getrusage02.c
index 7676630903..5138d96e03 100644
--- a/testcases/kernel/syscalls/getrusage/getrusage02.c
+++ b/testcases/kernel/syscalls/getrusage/getrusage02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that getrusage() fails with:
*
* - EINVAL with invalid who
diff --git a/testcases/kernel/syscalls/getrusage/getrusage03.c b/testcases/kernel/syscalls/getrusage/getrusage03.c
index c8e974567c..bc196c15ee 100644
--- a/testcases/kernel/syscalls/getrusage/getrusage03.c
+++ b/testcases/kernel/syscalls/getrusage/getrusage03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test ru_maxrss behaviors in struct rusage.
*
* This test program is backported from upstream commit: 1f10206cf8e9, which
diff --git a/testcases/kernel/syscalls/getrusage/getrusage03_child.c b/testcases/kernel/syscalls/getrusage/getrusage03_child.c
index 18627a98cb..1c6a19e32f 100644
--- a/testcases/kernel/syscalls/getrusage/getrusage03_child.c
+++ b/testcases/kernel/syscalls/getrusage/getrusage03_child.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Child program executed by getrusage03.
*/
diff --git a/testcases/kernel/syscalls/getsid/getsid01.c b/testcases/kernel/syscalls/getsid/getsid01.c
index 89f6a72915..e0201d4fc1 100644
--- a/testcases/kernel/syscalls/getsid/getsid01.c
+++ b/testcases/kernel/syscalls/getsid/getsid01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that session IDs returned by getsid() (with argument pid=0)
* are same in parent and child process.
*/
diff --git a/testcases/kernel/syscalls/getsid/getsid02.c b/testcases/kernel/syscalls/getsid/getsid02.c
index 14b634727f..8a25dcafda 100644
--- a/testcases/kernel/syscalls/getsid/getsid02.c
+++ b/testcases/kernel/syscalls/getsid/getsid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that getsid(2) fails with ESRCH errno when there is no
* process found with process ID pid.
*/
diff --git a/testcases/kernel/syscalls/getsockname/getsockname01.c b/testcases/kernel/syscalls/getsockname/getsockname01.c
index becd7133ae..108d7fe1a4 100644
--- a/testcases/kernel/syscalls/getsockname/getsockname01.c
+++ b/testcases/kernel/syscalls/getsockname/getsockname01.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Verify that getsockname() returns the proper errno for various failure cases:
*
* - EBADF on a not open file
diff --git a/testcases/kernel/syscalls/getsockopt/getsockopt01.c b/testcases/kernel/syscalls/getsockopt/getsockopt01.c
index 9effbf30ca..2c1d371f2f 100644
--- a/testcases/kernel/syscalls/getsockopt/getsockopt01.c
+++ b/testcases/kernel/syscalls/getsockopt/getsockopt01.c
@@ -7,7 +7,6 @@
*/
/*\
- * [Description]
* Verify that getsockopt() returns the proper errno for various failure cases:
*
* - EBADF on a not open file
diff --git a/testcases/kernel/syscalls/getsockopt/getsockopt02.c b/testcases/kernel/syscalls/getsockopt/getsockopt02.c
index d24e9b693d..68575799ae 100644
--- a/testcases/kernel/syscalls/getsockopt/getsockopt02.c
+++ b/testcases/kernel/syscalls/getsockopt/getsockopt02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test getsockopt(2) for retrieving peer credentials (SO_PEERCRED).
*/
diff --git a/testcases/kernel/syscalls/gettid/gettid01.c b/testcases/kernel/syscalls/gettid/gettid01.c
index 22ba15016c..108b8266e6 100644
--- a/testcases/kernel/syscalls/gettid/gettid01.c
+++ b/testcases/kernel/syscalls/gettid/gettid01.c
@@ -4,8 +4,6 @@
* Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
*/
/*\
- * [Description]
- *
* This test checks if parent pid is equal to tid in single-threaded
* application.
*/
diff --git a/testcases/kernel/syscalls/gettid/gettid02.c b/testcases/kernel/syscalls/gettid/gettid02.c
index ef44761c41..88505068b8 100644
--- a/testcases/kernel/syscalls/gettid/gettid02.c
+++ b/testcases/kernel/syscalls/gettid/gettid02.c
@@ -3,8 +3,6 @@
* Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
*/
/*\
- * [Description]
- *
* This test spawns multiple threads, then check for each one of them if the
* parent ID is different AND if the thread ID is different from all the other
* spwaned threads.
diff --git a/testcases/kernel/syscalls/gettimeofday/gettimeofday01.c b/testcases/kernel/syscalls/gettimeofday/gettimeofday01.c
index 887a366886..645cc6d3cb 100644
--- a/testcases/kernel/syscalls/gettimeofday/gettimeofday01.c
+++ b/testcases/kernel/syscalls/gettimeofday/gettimeofday01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for gettimeofday error.
*
* - EFAULT: tv pointed outside the accessible address space
diff --git a/testcases/kernel/syscalls/gettimeofday/gettimeofday02.c b/testcases/kernel/syscalls/gettimeofday/gettimeofday02.c
index a58a3cb4f2..1e0c957324 100644
--- a/testcases/kernel/syscalls/gettimeofday/gettimeofday02.c
+++ b/testcases/kernel/syscalls/gettimeofday/gettimeofday02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check if gettimeofday() is monotonous during 10s:
*
* - Call gettimeofday() to get a t1 (fist value)
diff --git a/testcases/kernel/syscalls/getuid/getuid01.c b/testcases/kernel/syscalls/getuid/getuid01.c
index 206ca0c529..a25eb8d86b 100644
--- a/testcases/kernel/syscalls/getuid/getuid01.c
+++ b/testcases/kernel/syscalls/getuid/getuid01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the getuid() system call.
*/
diff --git a/testcases/kernel/syscalls/getuid/getuid03.c b/testcases/kernel/syscalls/getuid/getuid03.c
index a5deebf2b9..1de03d4ea3 100644
--- a/testcases/kernel/syscalls/getuid/getuid03.c
+++ b/testcases/kernel/syscalls/getuid/getuid03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that getuid() return value matches value from /proc/self/status.
*/
diff --git a/testcases/kernel/syscalls/getxattr/getxattr01.c b/testcases/kernel/syscalls/getxattr/getxattr01.c
index 50b00c0a57..241cc1eabd 100644
--- a/testcases/kernel/syscalls/getxattr/getxattr01.c
+++ b/testcases/kernel/syscalls/getxattr/getxattr01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic tests for getxattr(2) and make sure getxattr(2) handles error
* conditions correctly.
*
diff --git a/testcases/kernel/syscalls/getxattr/getxattr02.c b/testcases/kernel/syscalls/getxattr/getxattr02.c
index 593ad7b8c7..7bc3bf22ad 100644
--- a/testcases/kernel/syscalls/getxattr/getxattr02.c
+++ b/testcases/kernel/syscalls/getxattr/getxattr02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* In the user.* namespace, only regular files and directories can
* have extended attributes. Otherwise getxattr(2) will return -1
* and set errno to ENODATA.
diff --git a/testcases/kernel/syscalls/getxattr/getxattr03.c b/testcases/kernel/syscalls/getxattr/getxattr03.c
index 85f26402af..e1f7bb6aae 100644
--- a/testcases/kernel/syscalls/getxattr/getxattr03.c
+++ b/testcases/kernel/syscalls/getxattr/getxattr03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* An empty buffer of size zero can be passed into getxattr(2) to
* return the current size of the named extended attribute.
*/
diff --git a/testcases/kernel/syscalls/getxattr/getxattr04.c b/testcases/kernel/syscalls/getxattr/getxattr04.c
index 27059fef09..1fb5928823 100644
--- a/testcases/kernel/syscalls/getxattr/getxattr04.c
+++ b/testcases/kernel/syscalls/getxattr/getxattr04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This is a regression test for the race between getting an existing
* xattr and setting/removing a large xattr. This bug leads to that
* getxattr() fails to get an existing xattr and returns ENOATTR in xfs
diff --git a/testcases/kernel/syscalls/getxattr/getxattr05.c b/testcases/kernel/syscalls/getxattr/getxattr05.c
index d9717a6950..5f0aac51d0 100644
--- a/testcases/kernel/syscalls/getxattr/getxattr05.c
+++ b/testcases/kernel/syscalls/getxattr/getxattr05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that:
*
* - Without a user namespace, getxattr(2) should get same data when
diff --git a/testcases/kernel/syscalls/init_module/init_module01.c b/testcases/kernel/syscalls/init_module/init_module01.c
index 850f826e62..a0d4792c95 100644
--- a/testcases/kernel/syscalls/init_module/init_module01.c
+++ b/testcases/kernel/syscalls/init_module/init_module01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic init_module() tests.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/init_module/init_module02.c b/testcases/kernel/syscalls/init_module/init_module02.c
index c3979c08aa..3fb1e87158 100644
--- a/testcases/kernel/syscalls/init_module/init_module02.c
+++ b/testcases/kernel/syscalls/init_module/init_module02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic init_module() failure tests.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/inotify/inotify01.c b/testcases/kernel/syscalls/inotify/inotify01.c
index e0fa0ba50d..4f7fa70e9e 100644
--- a/testcases/kernel/syscalls/inotify/inotify01.c
+++ b/testcases/kernel/syscalls/inotify/inotify01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test for inotify events on file.
*/
diff --git a/testcases/kernel/syscalls/inotify/inotify02.c b/testcases/kernel/syscalls/inotify/inotify02.c
index d75395baee..709a928308 100644
--- a/testcases/kernel/syscalls/inotify/inotify02.c
+++ b/testcases/kernel/syscalls/inotify/inotify02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test for inotify events on directory.
*/
diff --git a/testcases/kernel/syscalls/inotify/inotify03.c b/testcases/kernel/syscalls/inotify/inotify03.c
index 4ee5e94613..9bb95addbc 100644
--- a/testcases/kernel/syscalls/inotify/inotify03.c
+++ b/testcases/kernel/syscalls/inotify/inotify03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that inotify get IN_UNMOUNT event and don't block the umount command.
*/
diff --git a/testcases/kernel/syscalls/inotify/inotify04.c b/testcases/kernel/syscalls/inotify/inotify04.c
index 120e73b916..1db38ddf28 100644
--- a/testcases/kernel/syscalls/inotify/inotify04.c
+++ b/testcases/kernel/syscalls/inotify/inotify04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for inotify IN_DELETE_SELF event.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/inotify/inotify05.c b/testcases/kernel/syscalls/inotify/inotify05.c
index 38b30878c1..d9bfb05f1d 100644
--- a/testcases/kernel/syscalls/inotify/inotify05.c
+++ b/testcases/kernel/syscalls/inotify/inotify05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that inotify overflow event is properly generated.
*/
diff --git a/testcases/kernel/syscalls/inotify/inotify06.c b/testcases/kernel/syscalls/inotify/inotify06.c
index b0eb8cafbb..42837ea093 100644
--- a/testcases/kernel/syscalls/inotify/inotify06.c
+++ b/testcases/kernel/syscalls/inotify/inotify06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for inotify mark destruction race.
*
* Kernels prior to 4.2 have a race when inode is being deleted while
diff --git a/testcases/kernel/syscalls/inotify/inotify07.c b/testcases/kernel/syscalls/inotify/inotify07.c
index bcfc569a8d..66a2f4d372 100644
--- a/testcases/kernel/syscalls/inotify/inotify07.c
+++ b/testcases/kernel/syscalls/inotify/inotify07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that inotify work for an overlayfs directory after copy up and
* drop caches.
*
diff --git a/testcases/kernel/syscalls/inotify/inotify08.c b/testcases/kernel/syscalls/inotify/inotify08.c
index 149a0a1f81..4cbb16ce0d 100644
--- a/testcases/kernel/syscalls/inotify/inotify08.c
+++ b/testcases/kernel/syscalls/inotify/inotify08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that inotify work for an overlayfs file after copy up and
* drop caches.
*
diff --git a/testcases/kernel/syscalls/inotify/inotify09.c b/testcases/kernel/syscalls/inotify/inotify09.c
index e999dac39d..5c9ff3a3ba 100644
--- a/testcases/kernel/syscalls/inotify/inotify09.c
+++ b/testcases/kernel/syscalls/inotify/inotify09.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test for inotify mark connector destruction race.
*
* Kernels prior to 4.17 have a race when the last fsnotify mark on the inode
diff --git a/testcases/kernel/syscalls/inotify/inotify10.c b/testcases/kernel/syscalls/inotify/inotify10.c
index 6a9a0a4368..a78572dff3 100644
--- a/testcases/kernel/syscalls/inotify/inotify10.c
+++ b/testcases/kernel/syscalls/inotify/inotify10.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that event is reported to watching parent and watching child
* based on their interest.
*
diff --git a/testcases/kernel/syscalls/inotify/inotify11.c b/testcases/kernel/syscalls/inotify/inotify11.c
index 2e571f3a0c..5af9cdb9bf 100644
--- a/testcases/kernel/syscalls/inotify/inotify11.c
+++ b/testcases/kernel/syscalls/inotify/inotify11.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test opening files after receiving IN_DELETE.
*
* Kernel v5.13 has a regression allowing files to be open after IN_DELETE.
diff --git a/testcases/kernel/syscalls/inotify/inotify12.c b/testcases/kernel/syscalls/inotify/inotify12.c
index 208263b178..5390b4c0ec 100644
--- a/testcases/kernel/syscalls/inotify/inotify12.c
+++ b/testcases/kernel/syscalls/inotify/inotify12.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test special inotify mask flags.
*
* Regression test for kernel commit:
diff --git a/testcases/kernel/syscalls/inotify_init/inotify_init1_01.c b/testcases/kernel/syscalls/inotify_init/inotify_init1_01.c
index b2f582f8ef..04c66be547 100644
--- a/testcases/kernel/syscalls/inotify_init/inotify_init1_01.c
+++ b/testcases/kernel/syscalls/inotify_init/inotify_init1_01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that inotify_init1() returns a file descriptor and sets
* the close-on-exec (FD_CLOEXEC) flag on the new file descriptor
* only when called with IN_CLOEXEC.
diff --git a/testcases/kernel/syscalls/inotify_init/inotify_init1_02.c b/testcases/kernel/syscalls/inotify_init/inotify_init1_02.c
index 3baf35e754..4c8d883a69 100644
--- a/testcases/kernel/syscalls/inotify_init/inotify_init1_02.c
+++ b/testcases/kernel/syscalls/inotify_init/inotify_init1_02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that inotify_init1() returns a file descriptor and sets the
* O_NONBLOCK file status flag on the open file description referred
* to by the new file descriptor only when called with IN_NONBLOCK.
diff --git a/testcases/kernel/syscalls/io_cancel/io_cancel01.c b/testcases/kernel/syscalls/io_cancel/io_cancel01.c
index f7e8bd061e..699eb2a68a 100644
--- a/testcases/kernel/syscalls/io_cancel/io_cancel01.c
+++ b/testcases/kernel/syscalls/io_cancel/io_cancel01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test io_cancel invoked via syscall(2) with one of pointers set to invalid
* address and expects it to return EFAULT.
*/
diff --git a/testcases/kernel/syscalls/io_cancel/io_cancel02.c b/testcases/kernel/syscalls/io_cancel/io_cancel02.c
index 92ec651192..0394e308d4 100644
--- a/testcases/kernel/syscalls/io_cancel/io_cancel02.c
+++ b/testcases/kernel/syscalls/io_cancel/io_cancel02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test io_cancel invoked via libaio with one of the data structures points
* to invalid data and expects it to return -EFAULT.
*/
diff --git a/testcases/kernel/syscalls/io_destroy/io_destroy01.c b/testcases/kernel/syscalls/io_destroy/io_destroy01.c
index 79c685faab..ce4158c260 100644
--- a/testcases/kernel/syscalls/io_destroy/io_destroy01.c
+++ b/testcases/kernel/syscalls/io_destroy/io_destroy01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test io_destroy invoked via libaio with invalid ctx and expects it to
* return -EINVAL.
*/
diff --git a/testcases/kernel/syscalls/io_destroy/io_destroy02.c b/testcases/kernel/syscalls/io_destroy/io_destroy02.c
index c8cc63818b..84868f3111 100644
--- a/testcases/kernel/syscalls/io_destroy/io_destroy02.c
+++ b/testcases/kernel/syscalls/io_destroy/io_destroy02.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Test io_destroy invoked via syscall(2) with an invalid ctx and expects
* it to return EINVAL.
*/
diff --git a/testcases/kernel/syscalls/io_getevents/io_getevents01.c b/testcases/kernel/syscalls/io_getevents/io_getevents01.c
index e8a426ab6a..0806ea9120 100644
--- a/testcases/kernel/syscalls/io_getevents/io_getevents01.c
+++ b/testcases/kernel/syscalls/io_getevents/io_getevents01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test io_getevents invoked via syscall(2) with invalid ctx and expects it to
* return EINVAL.
*/
diff --git a/testcases/kernel/syscalls/io_getevents/io_getevents02.c b/testcases/kernel/syscalls/io_getevents/io_getevents02.c
index 09eedd4f61..6257ca82e8 100644
--- a/testcases/kernel/syscalls/io_getevents/io_getevents02.c
+++ b/testcases/kernel/syscalls/io_getevents/io_getevents02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test io_getevents invoked via libaio with invalid ctx and expects it to
* return -EINVAL.
*/
diff --git a/testcases/kernel/syscalls/io_setup/io_setup01.c b/testcases/kernel/syscalls/io_setup/io_setup01.c
index ed99f38799..3536b068f6 100644
--- a/testcases/kernel/syscalls/io_setup/io_setup01.c
+++ b/testcases/kernel/syscalls/io_setup/io_setup01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test io_setup invoked via libaio:
*
* - io_setup succeeds if both nr_events and ctxp are valid.
diff --git a/testcases/kernel/syscalls/io_setup/io_setup02.c b/testcases/kernel/syscalls/io_setup/io_setup02.c
index f297979209..14a89d6020 100644
--- a/testcases/kernel/syscalls/io_setup/io_setup02.c
+++ b/testcases/kernel/syscalls/io_setup/io_setup02.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Test io_setup invoked via syscall(2):
*
* - io_setup fails and returns EFAULT if ctxp is NULL.
diff --git a/testcases/kernel/syscalls/io_submit/io_submit01.c b/testcases/kernel/syscalls/io_submit/io_submit01.c
index 616380b93e..a76a5b3249 100644
--- a/testcases/kernel/syscalls/io_submit/io_submit01.c
+++ b/testcases/kernel/syscalls/io_submit/io_submit01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test io_submit() invoked via libaio:
*
* - io_submit fails and returns -EINVAL if ctx is invalid.
diff --git a/testcases/kernel/syscalls/io_submit/io_submit02.c b/testcases/kernel/syscalls/io_submit/io_submit02.c
index 6ba4d99a5d..36e9c29f93 100644
--- a/testcases/kernel/syscalls/io_submit/io_submit02.c
+++ b/testcases/kernel/syscalls/io_submit/io_submit02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test io_submit invoked via syscall(2):
*
* 1. io_submit() returns the number of iocbs submitted.
diff --git a/testcases/kernel/syscalls/io_submit/io_submit03.c b/testcases/kernel/syscalls/io_submit/io_submit03.c
index 90780c0e44..45903107d7 100644
--- a/testcases/kernel/syscalls/io_submit/io_submit03.c
+++ b/testcases/kernel/syscalls/io_submit/io_submit03.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test io_submit invoked via syscall(2):
*
* 1. io_submit fails and returns EINVAL if ctx is invalid.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl01.c b/testcases/kernel/syscalls/ioctl/ioctl01.c
index d7886f3586..42b93ac9b3 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the errnos set by the ioctl(2) system call.
*
* - EBADF: Pass an invalid fd to ioctl(fd, ...) and expect EBADF
diff --git a/testcases/kernel/syscalls/ioctl/ioctl02.c b/testcases/kernel/syscalls/ioctl/ioctl02.c
index 9337da384a..7ef55af681 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test TCGETA/TCGETS and TCSETA/TCSETS ioctl implementations for tty driver.
*
* In this test, the parent and child open the parentty and the childtty
diff --git a/testcases/kernel/syscalls/ioctl/ioctl03.c b/testcases/kernel/syscalls/ioctl/ioctl03.c
index 890238f7d5..8a868a98e6 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl03.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl03.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Test whether all the valid IFF flags are returned properly by implementation
* of TUNGETFEATURES ioctl.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl04.c b/testcases/kernel/syscalls/ioctl/ioctl04.c
index f96b22f0ce..952450ba99 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl04.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic test for the BLKROSET and BLKROGET ioctls.
*
* - Set the device read only, read the value back.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl05.c b/testcases/kernel/syscalls/ioctl/ioctl05.c
index 8e3abf14fe..586322e026 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl05.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic test for the BLKGETSIZE and BLKGETSIZE64 ioctls.
*
* - BLKGETSIZE returns size in 512 byte blocks BLKGETSIZE64 in bytes
diff --git a/testcases/kernel/syscalls/ioctl/ioctl06.c b/testcases/kernel/syscalls/ioctl/ioctl06.c
index 754d4acfc5..4e4177ca41 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl06.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic test for the BLKRASET and BLKRAGET ioctls.
*
* Sets device read-ahead, reads it back and compares the values.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl07.c b/testcases/kernel/syscalls/ioctl/ioctl07.c
index ea88cf73bc..59ef893da5 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl07.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl07.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Very basic test for the RND* ioctls.
*
* Reads the entropy available from both /proc and the ioctl and compares
diff --git a/testcases/kernel/syscalls/ioctl/ioctl08.c b/testcases/kernel/syscalls/ioctl/ioctl08.c
index 14f9354c9b..115ad33235 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl08.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests the ioctl functionality to deduplicate fileranges using
* btrfs filesystem.
*
diff --git a/testcases/kernel/syscalls/ioctl/ioctl09.c b/testcases/kernel/syscalls/ioctl/ioctl09.c
index 0d1f1072d3..4e61f3bc9b 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl09.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test for the BLKRRPART ioctl, it is the same as blockdev
* --rereadpt command.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
index 2574bb6a26..a30fa92290 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that ioctl() FICLONE feature clones file content from
* one file to an another.
*
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
index e5d4be96f7..76a6bb8a20 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that ioctl() FICLONE/FICLONERANGE feature correctly raises
* EOPNOTSUPP when an unsupported filesystem is used. In particular, filesystems
* which don't support copy-on-write.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
index b0a0f8d63f..6a9d270d9f 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that ioctl() FICLONE/FICLONERANGE feature correctly raises
* exceptions when it's supposed to.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
index 1dcf4f05c1..96f9d5831c 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that ioctl() FICLONE/FICLONERANGE feature raises the right
* error according with bad file descriptors.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
index 7072707651..5b51f1d120 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that ioctl() FICLONERANGE feature clones file content from
* one file to an another.
*
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
index cc1d0e0319..6c93d8dc3b 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that ioctl() FICLONERANGE feature correctly raises
* EINVAL when:
* - filesystem does not support overlapping reflink ranges in the same file
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop01.c b/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
index c3fb9f583f..c9137bf1e7 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests ioctl() on loopdevice with LO_FLAGS_AUTOCLEAR and LO_FLAGS_PARTSCAN flags.
*
* For LO_FLAGS_AUTOCLEAR flag, only checks autoclear field value in sysfs
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop02.c b/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
index dc983ac5f6..6026af1e26 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests ioctl() on loopdevice with LO_FLAGS_READ_ONLY (similar as losetup -r) and
* LOOP_CHANGE_FD flags.
*
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop03.c b/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
index a7b0230e1f..dc39dbbb63 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests ioctl() on loopdevice with LOOP_CHANGE_FD flag.
*
* Tests whether LOOP_CHANGE_FD can not succeed (get EINVAL error)
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop04.c b/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
index f1021cc77d..839648f265 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests ioctl() on loopdevice with LOOP_SET_CAPACITY flag.
*
* Tests whether LOOP_SET_CAPACITY can update a live
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop05.c b/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
index 184462464b..0ced7eda12 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests ioctl() on loopdevice with LOOP_SET_DIRECT_IO flag.
*
* Tests whether LOOP_SET_DIRECT_IO can update a live loop device dio mode.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop06.c b/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
index 317f693a04..573871bc12 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests invalid block size of loopdevice by using ioctl() with
* LOOP_SET_BLOCK_SIZE and LOOP_CONFIGURE flags.
*/
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop07.c b/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
index 68db79558f..be136fe0d4 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests ioctl() on loopdevice with LOOP_SET_STATUS64 and LOOP_GET_STATUS64 flags.
*
* Tests lo_sizelimit field. If lo_sizelimit is 0, it means max
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns01.c b/testcases/kernel/syscalls/ioctl/ioctl_ns01.c
index 06c81ba1b6..c2c9567368 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ns01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ns01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test ioctl_ns with NS_GET_PARENT request.
*
* Parent process tries to get parent of initial namespace, which should
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns02.c b/testcases/kernel/syscalls/ioctl/ioctl_ns02.c
index 3c958c14af..c6849b53fe 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ns02.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ns02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test ioctl_ns with NS_GET_PARENT request.
*
* Test tries to get namespace parent for UTS namespace, which
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns03.c b/testcases/kernel/syscalls/ioctl/ioctl_ns03.c
index bdd80585ac..395423b061 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ns03.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ns03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test ioctl_ns with NS_GET_OWNER_UID request.
*
* Calls ioctl for a UTS namespace, which isn't a user namespace.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns04.c b/testcases/kernel/syscalls/ioctl/ioctl_ns04.c
index 8c5c9f961b..4385b6e344 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ns04.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ns04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test ioctl_ns with NS_GET_USERNS request.
*
* Owning user namespace of process calling ioctl is out of scope,
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns05.c b/testcases/kernel/syscalls/ioctl/ioctl_ns05.c
index 36e41c468c..e84af38b67 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ns05.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ns05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test ioctl_ns with NS_GET_PARENT request.
*
* Child cloned with the CLONE_NEWPID flag is created in a new pid namespace.
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns06.c b/testcases/kernel/syscalls/ioctl/ioctl_ns06.c
index 45fc01ce72..a37ad6273b 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ns06.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ns06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test ioctl_ns with NS_GET_USERNS request.
*
* After the call to clone with the CLONE_NEWUSER flag,
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns07.c b/testcases/kernel/syscalls/ioctl/ioctl_ns07.c
index 9cfa57fb1b..b0a5d0b1c2 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_ns07.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_ns07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test ioctl_ns with NS_GET_* request for file descriptors
* that aren't namespaces.
*
diff --git a/testcases/kernel/syscalls/ioctl/ioctl_sg01.c b/testcases/kernel/syscalls/ioctl/ioctl_sg01.c
index 1c5039cf0f..fba3816c34 100644
--- a/testcases/kernel/syscalls/ioctl/ioctl_sg01.c
+++ b/testcases/kernel/syscalls/ioctl/ioctl_sg01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* CVE-2018-1000204
*
* Test ioctl(SG_IO) and check that kernel doesn't leak data. Requires
diff --git a/testcases/kernel/syscalls/iopl/iopl01.c b/testcases/kernel/syscalls/iopl/iopl01.c
index 0b7e8823f2..227344aa4e 100644
--- a/testcases/kernel/syscalls/iopl/iopl01.c
+++ b/testcases/kernel/syscalls/iopl/iopl01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This is a basic test for iopl(2) system call.
*
* Test the system call for possible privilege levels.
diff --git a/testcases/kernel/syscalls/iopl/iopl02.c b/testcases/kernel/syscalls/iopl/iopl02.c
index 1a588590e9..bf3e0206dd 100644
--- a/testcases/kernel/syscalls/iopl/iopl02.c
+++ b/testcases/kernel/syscalls/iopl/iopl02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test for iopl(2) system call error.
*
* - iopl(2) fail with EINVAL when privilege level greater than 3.
diff --git a/testcases/kernel/syscalls/ioprio/ioprio_get01.c b/testcases/kernel/syscalls/ioprio/ioprio_get01.c
index f1325be31f..a0c919e23d 100644
--- a/testcases/kernel/syscalls/ioprio/ioprio_get01.c
+++ b/testcases/kernel/syscalls/ioprio/ioprio_get01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic ioprio_get() test. Gets the current process I/O priority and
* checks that the values are sane.
*/
diff --git a/testcases/kernel/syscalls/ioprio/ioprio_set01.c b/testcases/kernel/syscalls/ioprio/ioprio_set01.c
index 0868cea7c8..a69b28ec5a 100644
--- a/testcases/kernel/syscalls/ioprio/ioprio_set01.c
+++ b/testcases/kernel/syscalls/ioprio/ioprio_set01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic ioprio_set() test. Gets the current process I/O priority and
* bumps it up one notch, then down two notches and checks that the
* new priority is reported back correctly.
diff --git a/testcases/kernel/syscalls/ioprio/ioprio_set02.c b/testcases/kernel/syscalls/ioprio/ioprio_set02.c
index 37db7bf429..39ef38a86f 100644
--- a/testcases/kernel/syscalls/ioprio/ioprio_set02.c
+++ b/testcases/kernel/syscalls/ioprio/ioprio_set02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Extended ioprio_set() test.
* Tests to set all 8 priority levels for best effort priority, then
* switches to test all 8 priority levels for idle priority.
diff --git a/testcases/kernel/syscalls/ioprio/ioprio_set03.c b/testcases/kernel/syscalls/ioprio/ioprio_set03.c
index 6efcacc1ce..6a072c6c70 100644
--- a/testcases/kernel/syscalls/ioprio/ioprio_set03.c
+++ b/testcases/kernel/syscalls/ioprio/ioprio_set03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Negative ioprio_set() test. Test some non-working priorities to make
* sure they don't work.
*/
diff --git a/testcases/kernel/syscalls/ipc/msgctl/msgctl05.c b/testcases/kernel/syscalls/ipc/msgctl/msgctl05.c
index 721b08c587..7e059d7f0d 100644
--- a/testcases/kernel/syscalls/ipc/msgctl/msgctl05.c
+++ b/testcases/kernel/syscalls/ipc/msgctl/msgctl05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Cross verify the _high fields being set to 0 by the kernel.
*/
#include <sys/msg.h>
diff --git a/testcases/kernel/syscalls/ipc/msgctl/msgctl06.c b/testcases/kernel/syscalls/ipc/msgctl/msgctl06.c
index c1264b71e0..2e22f37fe0 100644
--- a/testcases/kernel/syscalls/ipc/msgctl/msgctl06.c
+++ b/testcases/kernel/syscalls/ipc/msgctl/msgctl06.c
@@ -4,8 +4,6 @@
* Author: Feiyu Zhu <zhufy.jy@cn.fujitsu.com>
*/
/*\
- * [Description]
- *
* Call msgctl() with MSG_INFO flag and check that:
*
* * The returned index points to a valid MSG by calling MSG_STAT_ANY
diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget01.c b/testcases/kernel/syscalls/ipc/msgget/msgget01.c
index 2ab34ff9db..dd5a5ad73c 100644
--- a/testcases/kernel/syscalls/ipc/msgget/msgget01.c
+++ b/testcases/kernel/syscalls/ipc/msgget/msgget01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Create a message queue, write a message to it and
* read it back.
*/
diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget02.c b/testcases/kernel/syscalls/ipc/msgget/msgget02.c
index 1885599d16..ef9ab34b89 100644
--- a/testcases/kernel/syscalls/ipc/msgget/msgget02.c
+++ b/testcases/kernel/syscalls/ipc/msgget/msgget02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for EEXIST, ENOENT, EACCES errors.
*
* - msgget(2) fails if a message queue exists for key and msgflg
diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget03.c b/testcases/kernel/syscalls/ipc/msgget/msgget03.c
index 9e6c66cb49..bd06539737 100644
--- a/testcases/kernel/syscalls/ipc/msgget/msgget03.c
+++ b/testcases/kernel/syscalls/ipc/msgget/msgget03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for ENOSPC error.
*
* ENOSPC - All possible message queues have been taken (MSGMNI)
diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget04.c b/testcases/kernel/syscalls/ipc/msgget/msgget04.c
index a01ecea85e..28cbb3352b 100644
--- a/testcases/kernel/syscalls/ipc/msgget/msgget04.c
+++ b/testcases/kernel/syscalls/ipc/msgget/msgget04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It is a basic test for msg_next_id.
* msg_next_id specifies desired id for next allocated IPC message. By
* default it's equal to -1, which means generic allocation logic.
diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget05.c b/testcases/kernel/syscalls/ipc/msgget/msgget05.c
index 817c8486e8..edcb307c65 100644
--- a/testcases/kernel/syscalls/ipc/msgget/msgget05.c
+++ b/testcases/kernel/syscalls/ipc/msgget/msgget05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It is a basic test for msg_next_id.
* When the message queue identifier that msg_next_id stored is already in use,
* call msgget with different key just use another unused value in range
diff --git a/testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c b/testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c
index e6b659f155..60936be8a3 100644
--- a/testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c
+++ b/testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that msgsnd(2) enqueues a message correctly.
*/
diff --git a/testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c b/testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c
index 13db01c8a1..887bfdef2a 100644
--- a/testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c
+++ b/testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that msgsnd(2) fails and sets correct errno:
*
* - EAGAIN if the message can't be sent due to the msg_qbytes limit for the
diff --git a/testcases/kernel/syscalls/ipc/msgstress/msgstress01.c b/testcases/kernel/syscalls/ipc/msgstress/msgstress01.c
index 2ceea58465..ae637e5d7a 100644
--- a/testcases/kernel/syscalls/ipc/msgstress/msgstress01.c
+++ b/testcases/kernel/syscalls/ipc/msgstress/msgstress01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Stress test for SysV IPC. We send multiple messages at the same time,
* checking that we are not loosing any byte once we receive the messages
* from multiple children.
diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl01.c b/testcases/kernel/syscalls/ipc/semctl/semctl01.c
index ff691adf86..92a36bff07 100644
--- a/testcases/kernel/syscalls/ipc/semctl/semctl01.c
+++ b/testcases/kernel/syscalls/ipc/semctl/semctl01.c
@@ -3,8 +3,6 @@
* Copyright (c) International Business Machines Corp., 2001
*/
/*\
- * [Description]
- *
* Test the 13 possible semctl() commands
*/
diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl02.c b/testcases/kernel/syscalls/ipc/semctl/semctl02.c
index 3134dde576..6ca63472c2 100644
--- a/testcases/kernel/syscalls/ipc/semctl/semctl02.c
+++ b/testcases/kernel/syscalls/ipc/semctl/semctl02.c
@@ -5,8 +5,6 @@
* 03/2001 - Written by Wayne Boyer
*/
/*\
- * [Description]
- *
* Test for semctl() EACCES error.
*/
diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl03.c b/testcases/kernel/syscalls/ipc/semctl/semctl03.c
index f9f335e4a8..11530b2013 100644
--- a/testcases/kernel/syscalls/ipc/semctl/semctl03.c
+++ b/testcases/kernel/syscalls/ipc/semctl/semctl03.c
@@ -6,8 +6,6 @@
* 03/2001 - Written by Wayne Boyer
*/
/*\
- * [Description]
- *
* Test for semctl() EINVAL and EFAULT errors
*/
diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl04.c b/testcases/kernel/syscalls/ipc/semctl/semctl04.c
index 015850a3bf..f6fa361b27 100644
--- a/testcases/kernel/syscalls/ipc/semctl/semctl04.c
+++ b/testcases/kernel/syscalls/ipc/semctl/semctl04.c
@@ -6,8 +6,6 @@
* 03/2001 - Written by Wayne Boyer
*/
/*\
- * [Description]
- *
* Test for semctl() EPERM error
*
* Runs IPC_SET and IPC_RMID from unprivileged child process.
diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl05.c b/testcases/kernel/syscalls/ipc/semctl/semctl05.c
index 69df087502..5feee00821 100644
--- a/testcases/kernel/syscalls/ipc/semctl/semctl05.c
+++ b/testcases/kernel/syscalls/ipc/semctl/semctl05.c
@@ -7,8 +7,6 @@
* 03/2001 - Written by Wayne Boyer
*/
/*\
- * [Description]
- *
* Test for semctl() ERANGE error
*/
diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl07.c b/testcases/kernel/syscalls/ipc/semctl/semctl07.c
index 1b203ef5e9..588fb2436c 100644
--- a/testcases/kernel/syscalls/ipc/semctl/semctl07.c
+++ b/testcases/kernel/syscalls/ipc/semctl/semctl07.c
@@ -10,8 +10,6 @@
* to conflict with other instances of the same test.
*/
/*\
- * [Description]
- *
* Basic tests for semctl().
*
* - semctl() with IPC_STAT where we check the semid_ds buf content
diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl08.c b/testcases/kernel/syscalls/ipc/semctl/semctl08.c
index aefa83da9c..f4549adf43 100644
--- a/testcases/kernel/syscalls/ipc/semctl/semctl08.c
+++ b/testcases/kernel/syscalls/ipc/semctl/semctl08.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Cross verify the _high fields being set to 0 by the kernel.
*/
diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl09.c b/testcases/kernel/syscalls/ipc/semctl/semctl09.c
index efbc67f33d..32b411efd9 100644
--- a/testcases/kernel/syscalls/ipc/semctl/semctl09.c
+++ b/testcases/kernel/syscalls/ipc/semctl/semctl09.c
@@ -4,8 +4,6 @@
* Author: Feiyu Zhu <zhufy.jy@cn.fujitsu.com>
*/
/*\
- * [Description]
- *
* Call semctl() with SEM_INFO flag and check that:
*
* * The returned index points to a valid SEM by calling SEM_STAT_ANY
diff --git a/testcases/kernel/syscalls/ipc/semget/semget01.c b/testcases/kernel/syscalls/ipc/semget/semget01.c
index 872acabd32..3c05517e45 100644
--- a/testcases/kernel/syscalls/ipc/semget/semget01.c
+++ b/testcases/kernel/syscalls/ipc/semget/semget01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This case checks that semget() correclty creates a semaphore set.
*/
diff --git a/testcases/kernel/syscalls/ipc/semget/semget02.c b/testcases/kernel/syscalls/ipc/semget/semget02.c
index 4273c84c74..d381bbd69f 100644
--- a/testcases/kernel/syscalls/ipc/semget/semget02.c
+++ b/testcases/kernel/syscalls/ipc/semget/semget02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This basic error handing of the semget syscall.
*
* - EACCES - a semaphore set exists for key, but the calling process does not
diff --git a/testcases/kernel/syscalls/ipc/semget/semget05.c b/testcases/kernel/syscalls/ipc/semget/semget05.c
index b49e5653c7..0e41a15280 100644
--- a/testcases/kernel/syscalls/ipc/semget/semget05.c
+++ b/testcases/kernel/syscalls/ipc/semget/semget05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for ENOSPC error.
*
* ENOSPC - a semaphore set exceed the maximum number of semaphore sets(SEMMNI)
diff --git a/testcases/kernel/syscalls/ipc/semop/semop04.c b/testcases/kernel/syscalls/ipc/semop/semop04.c
index 1f49e77408..f1fa549e89 100644
--- a/testcases/kernel/syscalls/ipc/semop/semop04.c
+++ b/testcases/kernel/syscalls/ipc/semop/semop04.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Creates a semaphore and two processes. The processes
* each go through a loop where they semdown, delay for a
* random amount of time, and semup, so they will almost
diff --git a/testcases/kernel/syscalls/ipc/shmat/shmat04.c b/testcases/kernel/syscalls/ipc/shmat/shmat04.c
index 9dda5c77a7..7b7b802cbc 100644
--- a/testcases/kernel/syscalls/ipc/shmat/shmat04.c
+++ b/testcases/kernel/syscalls/ipc/shmat/shmat04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* When debugging issues with a workload using SysV shmem, Michal Hocko has
* come up with a reproducer that shows how a series of mprotect()
* operations can result in an elevated shm_nattch and thus leak of the
diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl01.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl01.c
index e631b7b217..1eec079893 100644
--- a/testcases/kernel/syscalls/ipc/shmctl/shmctl01.c
+++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that shmctl() IPC_STAT and SHM_STAT reports correct data.
*
* The shm_nattach is excercised by:
diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c
index 5c6dc5333a..0b12944ce8 100644
--- a/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c
+++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c
@@ -9,8 +9,6 @@
*/
/*\
- * [Description]
- *
* Test for EACCES, EFAULT and EINVAL errors.
*
* * EACCES - segment has no read or write permissions
diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl03.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl03.c
index 199ee41052..a3291c37f1 100644
--- a/testcases/kernel/syscalls/ipc/shmctl/shmctl03.c
+++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Call shmctl() with IPC_INFO flag and check that the data are consistent with
* /proc/sys/kernel/shm*.
*/
diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl04.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl04.c
index b244026ce3..da73863dd6 100644
--- a/testcases/kernel/syscalls/ipc/shmctl/shmctl04.c
+++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Call shmctl() with SHM_INFO flag and check that:
*
* * The returned index points to a valid SHM by calling SHM_STAT_ANY
diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl05.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl05.c
index 6d9a53b9b9..84d512cfde 100644
--- a/testcases/kernel/syscalls/ipc/shmctl/shmctl05.c
+++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Regression test for commit
* 3f05317d9889 (ipc/shm: fix use-after-free of shm file via remap_file_pages()).
*
diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl06.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl06.c
index 92aaa38e26..63e7f843d4 100644
--- a/testcases/kernel/syscalls/ipc/shmctl/shmctl06.c
+++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Cross verify the _high fields being set to 0 by the kernel.
*/
diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl07.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl07.c
index 15af7b4526..1cc07ead21 100644
--- a/testcases/kernel/syscalls/ipc/shmctl/shmctl07.c
+++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl07.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for a SHM_LOCK and SHM_UNLOCK.
*/
diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl08.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl08.c
index bb2abca4c9..f72f9f9e5e 100644
--- a/testcases/kernel/syscalls/ipc/shmctl/shmctl08.c
+++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl08.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for a SHM_SET.
*
* The test clears the group and others bits from the shm_perm.mode and checks
diff --git a/testcases/kernel/syscalls/ipc/shmdt/shmdt01.c b/testcases/kernel/syscalls/ipc/shmdt/shmdt01.c
index 551daac9cc..0a6d4096c8 100644
--- a/testcases/kernel/syscalls/ipc/shmdt/shmdt01.c
+++ b/testcases/kernel/syscalls/ipc/shmdt/shmdt01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This case check whether we get SIGSEGV when write a value to a detached
* shared memory resource.
*/
diff --git a/testcases/kernel/syscalls/ipc/shmdt/shmdt02.c b/testcases/kernel/syscalls/ipc/shmdt/shmdt02.c
index 782c6f4882..a3b20f8ff4 100644
--- a/testcases/kernel/syscalls/ipc/shmdt/shmdt02.c
+++ b/testcases/kernel/syscalls/ipc/shmdt/shmdt02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handing of the shmdt syscall.
*
* -EINVAL there is no shared memory segment attached at shmaddr.
diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget02.c b/testcases/kernel/syscalls/ipc/shmget/shmget02.c
index 10b8c92925..8a0961b04c 100644
--- a/testcases/kernel/syscalls/ipc/shmget/shmget02.c
+++ b/testcases/kernel/syscalls/ipc/shmget/shmget02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test for ENOENT, EEXIST, EINVAL, EACCES, EPERM errors.
*
* - ENOENT - No segment exists for the given key and IPC_CREAT was not specified.
diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget03.c b/testcases/kernel/syscalls/ipc/shmget/shmget03.c
index 8b157e4397..092f2170e5 100644
--- a/testcases/kernel/syscalls/ipc/shmget/shmget03.c
+++ b/testcases/kernel/syscalls/ipc/shmget/shmget03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for ENOSPC error.
*
* ENOSPC - All possible shared memory segments have been taken (SHMMNI).
diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget04.c b/testcases/kernel/syscalls/ipc/shmget/shmget04.c
index 0e48b09542..2a6a676cd6 100644
--- a/testcases/kernel/syscalls/ipc/shmget/shmget04.c
+++ b/testcases/kernel/syscalls/ipc/shmget/shmget04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for EACCES error.
*
* Create a shared memory segment without read or write permissions under
diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget05.c b/testcases/kernel/syscalls/ipc/shmget/shmget05.c
index 42a115474a..d96a98546d 100644
--- a/testcases/kernel/syscalls/ipc/shmget/shmget05.c
+++ b/testcases/kernel/syscalls/ipc/shmget/shmget05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It is a basic test for shm_next_id.
*
* shm_next_id specifies desired id for next allocated IPC shared memory. By
diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget06.c b/testcases/kernel/syscalls/ipc/shmget/shmget06.c
index d91b7b6354..f4bd61bca0 100644
--- a/testcases/kernel/syscalls/ipc/shmget/shmget06.c
+++ b/testcases/kernel/syscalls/ipc/shmget/shmget06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It is a basic test for shm_next_id.
*
* When the shared memory segment identifier that shm_next_id stored is already
diff --git a/testcases/kernel/syscalls/kcmp/kcmp01.c b/testcases/kernel/syscalls/kcmp/kcmp01.c
index c8fd48466d..50544f46e2 100644
--- a/testcases/kernel/syscalls/kcmp/kcmp01.c
+++ b/testcases/kernel/syscalls/kcmp/kcmp01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that
*
* 1. kcmp() returns 0 with two process and two file descriptors refering to the
diff --git a/testcases/kernel/syscalls/kcmp/kcmp02.c b/testcases/kernel/syscalls/kcmp/kcmp02.c
index d5696b70c3..cf76e2cc82 100644
--- a/testcases/kernel/syscalls/kcmp/kcmp02.c
+++ b/testcases/kernel/syscalls/kcmp/kcmp02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, kcmp() returns -1 and sets errno to
*
* 1. ESRCH if pid does not exist
diff --git a/testcases/kernel/syscalls/kcmp/kcmp03.c b/testcases/kernel/syscalls/kcmp/kcmp03.c
index 37d5118d55..a3133335c9 100644
--- a/testcases/kernel/syscalls/kcmp/kcmp03.c
+++ b/testcases/kernel/syscalls/kcmp/kcmp03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, kcmp() returns 0 if the processes
*
* 1. share the same file system information
diff --git a/testcases/kernel/syscalls/keyctl/keyctl01.c b/testcases/kernel/syscalls/keyctl/keyctl01.c
index 674094eec7..181e37dd10 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl01.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Tests the keyctl(2) syscall.
*
* Manipulate the kernel's key management facility.
diff --git a/testcases/kernel/syscalls/keyctl/keyctl02.c b/testcases/kernel/syscalls/keyctl/keyctl02.c
index 788e9657cd..3c5a2501e6 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl02.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Regression test for the race between keyctl_read() and
* keyctl_revoke(), if the revoke happens between keyctl_read()
* checking the validity of a key and the key's semaphore being taken,
diff --git a/testcases/kernel/syscalls/keyctl/keyctl03.c b/testcases/kernel/syscalls/keyctl/keyctl03.c
index 563ee96a96..da97b24c2f 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl03.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Regression test for commit
* f05819df10d7 ("KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring")
*/
diff --git a/testcases/kernel/syscalls/keyctl/keyctl04.c b/testcases/kernel/syscalls/keyctl/keyctl04.c
index 50c9244deb..aff95a576c 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl04.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Regression test for commit c9f838d104fe ("KEYS: fix
* keyctl_set_reqkey_keyring() to not leak thread keyrings"), a.k.a.
* CVE-2017-7472. This bug could be used to exhaust kernel memory, though it
diff --git a/testcases/kernel/syscalls/keyctl/keyctl05.c b/testcases/kernel/syscalls/keyctl/keyctl05.c
index 0ad106774c..cd738fb3c0 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl05.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Regression test for commit 63a0b0509e70 ("KEYS: fix freeing uninitialized
* memory in key_update()"). Try to reproduce the crash in two different ways:
*
diff --git a/testcases/kernel/syscalls/keyctl/keyctl06.c b/testcases/kernel/syscalls/keyctl/keyctl06.c
index 4564601d1c..3e23e91425 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl06.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Regression test for commit:
*
* e645016abc80 ("KEYS: fix writing past end of user-supplied buffer in keyring_read()")
diff --git a/testcases/kernel/syscalls/keyctl/keyctl07.c b/testcases/kernel/syscalls/keyctl/keyctl07.c
index 8b10ee8033..e4e0ff570f 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl07.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Regression test for commit 37863c43b2c6 ("KEYS: prevent KEYCTL_READ on
* negative key"). This is CVE-2017-12192.
*/
diff --git a/testcases/kernel/syscalls/keyctl/keyctl08.c b/testcases/kernel/syscalls/keyctl/keyctl08.c
index 30e077c50a..e038123ef5 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl08.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2016-9604, checks that keys beginning with "." are disallowed.
*
* See commit
diff --git a/testcases/kernel/syscalls/keyctl/keyctl09.c b/testcases/kernel/syscalls/keyctl/keyctl09.c
index 1f24f804a3..00ff61dafb 100644
--- a/testcases/kernel/syscalls/keyctl/keyctl09.c
+++ b/testcases/kernel/syscalls/keyctl/keyctl09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test that encrypted keys can be instantiated using user-provided decrypted
* data that is hex-ascii encoded.
*/
diff --git a/testcases/kernel/syscalls/kill/kill13.c b/testcases/kernel/syscalls/kill/kill13.c
index 66ae37bc0f..ca281ca6c9 100644
--- a/testcases/kernel/syscalls/kill/kill13.c
+++ b/testcases/kernel/syscalls/kill/kill13.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Reproducer of CVE-2018-10124; INT_MIN negation.
*
* On most two's complement CPUs negation of INT_MIN will result in
diff --git a/testcases/kernel/syscalls/landlock/landlock01.c b/testcases/kernel/syscalls/landlock/landlock01.c
index d0d68c8e4d..bf206dae77 100644
--- a/testcases/kernel/syscalls/landlock/landlock01.c
+++ b/testcases/kernel/syscalls/landlock/landlock01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that landlock_create_ruleset syscall fails with the right
* error codes:
*
diff --git a/testcases/kernel/syscalls/landlock/landlock02.c b/testcases/kernel/syscalls/landlock/landlock02.c
index e1e3228b54..60010f554b 100644
--- a/testcases/kernel/syscalls/landlock/landlock02.c
+++ b/testcases/kernel/syscalls/landlock/landlock02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that landlock_add_rule syscall fails with the right
* error codes:
*
diff --git a/testcases/kernel/syscalls/landlock/landlock03.c b/testcases/kernel/syscalls/landlock/landlock03.c
index 150c8cc4e5..3c0cd56b0a 100644
--- a/testcases/kernel/syscalls/landlock/landlock03.c
+++ b/testcases/kernel/syscalls/landlock/landlock03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that landlock_restrict_self syscall fails with the right
* error codes:
*
diff --git a/testcases/kernel/syscalls/landlock/landlock04.c b/testcases/kernel/syscalls/landlock/landlock04.c
index 2faba7a2b8..737fdbf244 100644
--- a/testcases/kernel/syscalls/landlock/landlock04.c
+++ b/testcases/kernel/syscalls/landlock/landlock04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that all landlock filesystem rules are working properly.
* The way we do it is to verify that all disabled syscalls are not working but
* the one we enabled via specifc landlock rules.
diff --git a/testcases/kernel/syscalls/landlock/landlock05.c b/testcases/kernel/syscalls/landlock/landlock05.c
index 3d5048f0ab..ad5e932b07 100644
--- a/testcases/kernel/syscalls/landlock/landlock05.c
+++ b/testcases/kernel/syscalls/landlock/landlock05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies LANDLOCK_ACCESS_FS_REFER access in the
* landlock sandbox.
*
diff --git a/testcases/kernel/syscalls/landlock/landlock06.c b/testcases/kernel/syscalls/landlock/landlock06.c
index 74237d1165..c2ac20d593 100644
--- a/testcases/kernel/syscalls/landlock/landlock06.c
+++ b/testcases/kernel/syscalls/landlock/landlock06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies LANDLOCK_ACCESS_FS_IOCTL_DEV access in the
* landlock sandbox by creating a pipe and testing that ioctl() can be executed
* on it. The test is also verifying that some of the I/O operations can be
diff --git a/testcases/kernel/syscalls/landlock/landlock07.c b/testcases/kernel/syscalls/landlock/landlock07.c
index 8ee6148563..7ef0f756ac 100644
--- a/testcases/kernel/syscalls/landlock/landlock07.c
+++ b/testcases/kernel/syscalls/landlock/landlock07.c
@@ -4,8 +4,6 @@
*/
/**
- * [Description]
- *
* CVE-2024-42318
*
* Test to check if system is affected by Landlock Houdini bug:
diff --git a/testcases/kernel/syscalls/landlock/landlock08.c b/testcases/kernel/syscalls/landlock/landlock08.c
index c3c320c340..7c498e6d58 100644
--- a/testcases/kernel/syscalls/landlock/landlock08.c
+++ b/testcases/kernel/syscalls/landlock/landlock08.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify the landlock support for bind()/connect() syscalls in IPV4 and IPV6
* protocols. In particular, check that bind() is assigning the address only on
* the TCP port enforced by LANDLOCK_ACCESS_NET_BIND_TCP and check that
diff --git a/testcases/kernel/syscalls/lgetxattr/lgetxattr01.c b/testcases/kernel/syscalls/lgetxattr/lgetxattr01.c
index 221f9157a4..f98d11d8f0 100644
--- a/testcases/kernel/syscalls/lgetxattr/lgetxattr01.c
+++ b/testcases/kernel/syscalls/lgetxattr/lgetxattr01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the lgetxattr(2).
*
* In the case of a symbolic link, lgetxattr(2) only gets the value of the
diff --git a/testcases/kernel/syscalls/lgetxattr/lgetxattr02.c b/testcases/kernel/syscalls/lgetxattr/lgetxattr02.c
index db94890c4b..459c1bf7a7 100644
--- a/testcases/kernel/syscalls/lgetxattr/lgetxattr02.c
+++ b/testcases/kernel/syscalls/lgetxattr/lgetxattr02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, lgetxattr(2) returns -1 and sets errno to
*
* 1. ENODATA if the named attribute does not exist.
diff --git a/testcases/kernel/syscalls/link/link02.c b/testcases/kernel/syscalls/link/link02.c
index 3d265d6eb1..248e2c5b3b 100644
--- a/testcases/kernel/syscalls/link/link02.c
+++ b/testcases/kernel/syscalls/link/link02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Tests that link(2) succeeds.
*/
diff --git a/testcases/kernel/syscalls/link/link04.c b/testcases/kernel/syscalls/link/link04.c
index 9940ac665c..1647785be2 100644
--- a/testcases/kernel/syscalls/link/link04.c
+++ b/testcases/kernel/syscalls/link/link04.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Negative test cases for link(2).
*
* This test program should contain test cases where link will fail regardless
diff --git a/testcases/kernel/syscalls/link/link05.c b/testcases/kernel/syscalls/link/link05.c
index b6c49bccaa..f3f282377a 100644
--- a/testcases/kernel/syscalls/link/link05.c
+++ b/testcases/kernel/syscalls/link/link05.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Tests that link(2) succeeds with creating 1000 links.
*/
diff --git a/testcases/kernel/syscalls/link/link08.c b/testcases/kernel/syscalls/link/link08.c
index 92d5074890..713001a33e 100644
--- a/testcases/kernel/syscalls/link/link08.c
+++ b/testcases/kernel/syscalls/link/link08.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* - link() fails with EPERM if the old path is a directory.
diff --git a/testcases/kernel/syscalls/listmount/listmount01.c b/testcases/kernel/syscalls/listmount/listmount01.c
index 604e5ce926..5090ae7bcf 100644
--- a/testcases/kernel/syscalls/listmount/listmount01.c
+++ b/testcases/kernel/syscalls/listmount/listmount01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that listmount() is properly recognizing a mounted
* root directory using LSMT_ROOT flag.
*
diff --git a/testcases/kernel/syscalls/listmount/listmount02.c b/testcases/kernel/syscalls/listmount/listmount02.c
index 4b831b615b..a8ee037ff3 100644
--- a/testcases/kernel/syscalls/listmount/listmount02.c
+++ b/testcases/kernel/syscalls/listmount/listmount02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that listmount() is properly reading groups of mount IDs,
* checking that both oneshoot and iterator API for listmount() return the same
* array.
diff --git a/testcases/kernel/syscalls/listmount/listmount03.c b/testcases/kernel/syscalls/listmount/listmount03.c
index befe0edaf4..dfbf2bdd25 100644
--- a/testcases/kernel/syscalls/listmount/listmount03.c
+++ b/testcases/kernel/syscalls/listmount/listmount03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that listmount() raises EPERM when mount point is not accessible.
*/
diff --git a/testcases/kernel/syscalls/listmount/listmount04.c b/testcases/kernel/syscalls/listmount/listmount04.c
index d38408d2c2..503346de8d 100644
--- a/testcases/kernel/syscalls/listmount/listmount04.c
+++ b/testcases/kernel/syscalls/listmount/listmount04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that listmount() raises the correct errors according with
* invalid data:
*
diff --git a/testcases/kernel/syscalls/listxattr/listxattr01.c b/testcases/kernel/syscalls/listxattr/listxattr01.c
index d3c3794cd7..73489a7701 100644
--- a/testcases/kernel/syscalls/listxattr/listxattr01.c
+++ b/testcases/kernel/syscalls/listxattr/listxattr01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test for listxattr(2) system call.
*
* listxattr(2) retrieves the list of extended attribute names
diff --git a/testcases/kernel/syscalls/listxattr/listxattr02.c b/testcases/kernel/syscalls/listxattr/listxattr02.c
index 0dc83cb404..78b48821d1 100644
--- a/testcases/kernel/syscalls/listxattr/listxattr02.c
+++ b/testcases/kernel/syscalls/listxattr/listxattr02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test for listxattr error.
*
* - ERANGE - the size of the list buffer is too small to hold the result.
diff --git a/testcases/kernel/syscalls/listxattr/listxattr03.c b/testcases/kernel/syscalls/listxattr/listxattr03.c
index 31125e8cd0..0fe072b8bb 100644
--- a/testcases/kernel/syscalls/listxattr/listxattr03.c
+++ b/testcases/kernel/syscalls/listxattr/listxattr03.c
@@ -6,8 +6,6 @@
*/
/*
- * [Description]
- *
* Test for returning the current size of the list of extended attribute names,
* with size specified as zero.
*/
diff --git a/testcases/kernel/syscalls/llistxattr/llistxattr01.c b/testcases/kernel/syscalls/llistxattr/llistxattr01.c
index 5002fe96fb..e36f244c94 100644
--- a/testcases/kernel/syscalls/llistxattr/llistxattr01.c
+++ b/testcases/kernel/syscalls/llistxattr/llistxattr01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test for llistxattr(2), retrieves the list of extended attribute names
* associated with the link itself in the filesystem.
*/
diff --git a/testcases/kernel/syscalls/llistxattr/llistxattr02.c b/testcases/kernel/syscalls/llistxattr/llistxattr02.c
index c91d05f359..6d7f716e5d 100644
--- a/testcases/kernel/syscalls/llistxattr/llistxattr02.c
+++ b/testcases/kernel/syscalls/llistxattr/llistxattr02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify llistxattr(2) returns -1 and set proper errno:
*
* - ERANGE if the size of the list buffer is too small to hold the result
diff --git a/testcases/kernel/syscalls/llistxattr/llistxattr03.c b/testcases/kernel/syscalls/llistxattr/llistxattr03.c
index cbf8da026b..11b3243cd5 100644
--- a/testcases/kernel/syscalls/llistxattr/llistxattr03.c
+++ b/testcases/kernel/syscalls/llistxattr/llistxattr03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that llistxattr(2) call with zero size returns the current size of the
* list of extended attribute names, which can be used to determine the size of
* the buffer that should be supplied in a subsequent llistxattr(2) call.
diff --git a/testcases/kernel/syscalls/lremovexattr/lremovexattr01.c b/testcases/kernel/syscalls/lremovexattr/lremovexattr01.c
index ec27bbbc78..5761b1429a 100644
--- a/testcases/kernel/syscalls/lremovexattr/lremovexattr01.c
+++ b/testcases/kernel/syscalls/lremovexattr/lremovexattr01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* lremovexattr(2) removes the extended attribute identified by a name and
* associated with a given path in the filesystem. Unlike removexattr(2),
* lremovexattr(2) removes the attribute from the symbolic link only, and not
diff --git a/testcases/kernel/syscalls/lstat/lstat03.c b/testcases/kernel/syscalls/lstat/lstat03.c
index d48af180b0..a0ff4dc9b5 100644
--- a/testcases/kernel/syscalls/lstat/lstat03.c
+++ b/testcases/kernel/syscalls/lstat/lstat03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that lstat() provides correct information according
* with device, access time, block size, ownership, etc.
* The implementation provides a set of tests which are specific for each one
diff --git a/testcases/kernel/syscalls/madvise/madvise03.c b/testcases/kernel/syscalls/madvise/madvise03.c
index cd63affc14..d27bc7cb29 100644
--- a/testcases/kernel/syscalls/madvise/madvise03.c
+++ b/testcases/kernel/syscalls/madvise/madvise03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that successful madvise(2) MADV_DONTNEED operation will result in
* zero-fill-on-demand pages for anonymous private mappings.
*/
diff --git a/testcases/kernel/syscalls/madvise/madvise06.c b/testcases/kernel/syscalls/madvise/madvise06.c
index 9cc64ceb58..51861a5daa 100644
--- a/testcases/kernel/syscalls/madvise/madvise06.c
+++ b/testcases/kernel/syscalls/madvise/madvise06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Page fault occurs in spite that madvise(WILLNEED) system call is called
* to prefetch the page. This issue is reproduced by running a program
* which sequentially accesses to a shared memory and calls madvise(WILLNEED)
diff --git a/testcases/kernel/syscalls/madvise/madvise11.c b/testcases/kernel/syscalls/madvise/madvise11.c
index cfe9d7f170..fd721ecad2 100644
--- a/testcases/kernel/syscalls/madvise/madvise11.c
+++ b/testcases/kernel/syscalls/madvise/madvise11.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Stress a possible race condition between memory pages allocation
* and soft-offline of unrelated pages as explained in the commit:
* d4ae9916ea29 (mm: soft-offline: close the race against page allocation)
diff --git a/testcases/kernel/syscalls/madvise/madvise12.c b/testcases/kernel/syscalls/madvise/madvise12.c
index 19f9f9d10b..8a8be5f1da 100644
--- a/testcases/kernel/syscalls/madvise/madvise12.c
+++ b/testcases/kernel/syscalls/madvise/madvise12.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that MADV_GUARD_INSTALL is causing SIGSEGV when someone is accessing
* memory advised with it.
*
diff --git a/testcases/kernel/syscalls/mallinfo/mallinfo01.c b/testcases/kernel/syscalls/mallinfo/mallinfo01.c
index 48fce0132f..c5c7d406f7 100644
--- a/testcases/kernel/syscalls/mallinfo/mallinfo01.c
+++ b/testcases/kernel/syscalls/mallinfo/mallinfo01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic mallinfo() test. Refer to glibc test mallinfo2 test
* https://sourceware.org/git/?p=glibc.git;a=blob;f=malloc/tst-mallinfo2.c
*/
diff --git a/testcases/kernel/syscalls/mallinfo/mallinfo02.c b/testcases/kernel/syscalls/mallinfo/mallinfo02.c
index 6012b4e223..867079a3dd 100644
--- a/testcases/kernel/syscalls/mallinfo/mallinfo02.c
+++ b/testcases/kernel/syscalls/mallinfo/mallinfo02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic mallinfo() test for malloc() using sbrk or mmap.
* It size > MMAP_THRESHOLD, it will use mmap. Otherwise, use sbrk.
*/
diff --git a/testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c b/testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c
index 51783fc22b..60e0e8af75 100644
--- a/testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c
+++ b/testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic mallinfo2() test.
*
* Test hblkhd member of struct mallinfo2 whether overflow when setting 2G size.
diff --git a/testcases/kernel/syscalls/mallopt/mallopt01.c b/testcases/kernel/syscalls/mallopt/mallopt01.c
index 8ff4649e3d..77cd18a704 100644
--- a/testcases/kernel/syscalls/mallopt/mallopt01.c
+++ b/testcases/kernel/syscalls/mallopt/mallopt01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic mallinfo() and mallopt() testing.
*/
diff --git a/testcases/kernel/syscalls/memcmp/memcmp01.c b/testcases/kernel/syscalls/memcmp/memcmp01.c
index 836cf4043e..38f121bdbb 100644
--- a/testcases/kernel/syscalls/memcmp/memcmp01.c
+++ b/testcases/kernel/syscalls/memcmp/memcmp01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* The testcase for buffer comparison by check boundary conditions.
*/
diff --git a/testcases/kernel/syscalls/memcpy/memcpy01.c b/testcases/kernel/syscalls/memcpy/memcpy01.c
index 0b64d70e66..b19f4145e7 100644
--- a/testcases/kernel/syscalls/memcpy/memcpy01.c
+++ b/testcases/kernel/syscalls/memcpy/memcpy01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* The testcase for buffer copy by check boundary conditions.
*/
diff --git a/testcases/kernel/syscalls/memfd_create/memfd_create04.c b/testcases/kernel/syscalls/memfd_create/memfd_create04.c
index 585f17e161..8a12a72ff3 100644
--- a/testcases/kernel/syscalls/memfd_create/memfd_create04.c
+++ b/testcases/kernel/syscalls/memfd_create/memfd_create04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Validating memfd_create() with MFD_HUGETLB and MFD_HUGE_x flags.
*
* Attempt to create files in the hugetlbfs filesystem using different huge page
diff --git a/testcases/kernel/syscalls/memset/memset01.c b/testcases/kernel/syscalls/memset/memset01.c
index 17ae42c017..5a34eb40c6 100644
--- a/testcases/kernel/syscalls/memset/memset01.c
+++ b/testcases/kernel/syscalls/memset/memset01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* The testcase for test setting of buffer by check boundary conditions.
*/
diff --git a/testcases/kernel/syscalls/mincore/mincore02.c b/testcases/kernel/syscalls/mincore/mincore02.c
index 1918d6c083..af3549ac3d 100644
--- a/testcases/kernel/syscalls/mincore/mincore02.c
+++ b/testcases/kernel/syscalls/mincore/mincore02.c
@@ -9,8 +9,6 @@
*/
/*\
- * [Description]
- *
* This test case provides a functional validation for mincore system call.
* We mmap a file of known size (multiple of page size) and lock it in
* memory. Then we obtain page location information via mincore and compare
diff --git a/testcases/kernel/syscalls/mkdir/mkdir02.c b/testcases/kernel/syscalls/mkdir/mkdir02.c
index 7fa055b8df..519c243ec7 100644
--- a/testcases/kernel/syscalls/mkdir/mkdir02.c
+++ b/testcases/kernel/syscalls/mkdir/mkdir02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that new directory created by mkdir(2) inherites the group ID from
* the parent directory and S_ISGID bit, if the S_ISGID bit is set in the
* parent directory.
diff --git a/testcases/kernel/syscalls/mkdir/mkdir03.c b/testcases/kernel/syscalls/mkdir/mkdir03.c
index 85d46801eb..7bbb76e9e5 100644
--- a/testcases/kernel/syscalls/mkdir/mkdir03.c
+++ b/testcases/kernel/syscalls/mkdir/mkdir03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check mkdir() with various error conditions that should produce
* EFAULT, ENAMETOOLONG, EEXIST, ENOENT, ENOTDIR, ELOOP and EROFS.
*
diff --git a/testcases/kernel/syscalls/mkdir/mkdir09.c b/testcases/kernel/syscalls/mkdir/mkdir09.c
index 44a2348be8..8f995c9699 100644
--- a/testcases/kernel/syscalls/mkdir/mkdir09.c
+++ b/testcases/kernel/syscalls/mkdir/mkdir09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Create multiple processes which create subdirectories in the
* same directory multiple times within test time.
*/
diff --git a/testcases/kernel/syscalls/mknod/mknod01.c b/testcases/kernel/syscalls/mknod/mknod01.c
index f800b996da..fe0a1cfa6a 100644
--- a/testcases/kernel/syscalls/mknod/mknod01.c
+++ b/testcases/kernel/syscalls/mknod/mknod01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that mknod(2) successfully creates a filesystem node with
* various modes.
*/
diff --git a/testcases/kernel/syscalls/mknod/mknod02.c b/testcases/kernel/syscalls/mknod/mknod02.c
index b1885fed13..89dd1d8740 100644
--- a/testcases/kernel/syscalls/mknod/mknod02.c
+++ b/testcases/kernel/syscalls/mknod/mknod02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that if mknod(2) creates a filesystem node in a directory which
* does not have the set-group-ID bit set, new node will not inherit the
* group ownership from its parent directory and its group ID will be the
diff --git a/testcases/kernel/syscalls/mknod/mknod09.c b/testcases/kernel/syscalls/mknod/mknod09.c
index e3b5dceae1..bb6e58a93d 100644
--- a/testcases/kernel/syscalls/mknod/mknod09.c
+++ b/testcases/kernel/syscalls/mknod/mknod09.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Verify that mknod() fails with -1 and sets errno to EINVAL if the mode is
* different than a normal file, device special file or FIFO.
*/
diff --git a/testcases/kernel/syscalls/mlock/mlock01.c b/testcases/kernel/syscalls/mlock/mlock01.c
index 0b079f8be8..007cffa2e7 100644
--- a/testcases/kernel/syscalls/mlock/mlock01.c
+++ b/testcases/kernel/syscalls/mlock/mlock01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test mlock with various valid addresses and lengths.
*/
diff --git a/testcases/kernel/syscalls/mlock/mlock02.c b/testcases/kernel/syscalls/mlock/mlock02.c
index 921ddeeae7..799a2276b5 100644
--- a/testcases/kernel/syscalls/mlock/mlock02.c
+++ b/testcases/kernel/syscalls/mlock/mlock02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test for ENOMEM, EPERM errors.
*
* 1) mlock(2) fails with ENOMEM if some of the specified address range
diff --git a/testcases/kernel/syscalls/mlock/mlock03.c b/testcases/kernel/syscalls/mlock/mlock03.c
index 602bb65d8a..0ac5112d92 100644
--- a/testcases/kernel/syscalls/mlock/mlock03.c
+++ b/testcases/kernel/syscalls/mlock/mlock03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This case is a regression test on old RHEL5.
*
* Stack size mapping is decreased through mlock/munlock call.
diff --git a/testcases/kernel/syscalls/mlock/mlock04.c b/testcases/kernel/syscalls/mlock/mlock04.c
index 64f1bc5a03..226c4e2559 100644
--- a/testcases/kernel/syscalls/mlock/mlock04.c
+++ b/testcases/kernel/syscalls/mlock/mlock04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This is a reproducer copied from one of LKML patch submission
* which subject is
*
diff --git a/testcases/kernel/syscalls/mlock/mlock05.c b/testcases/kernel/syscalls/mlock/mlock05.c
index 8e805736dc..4e432fc8db 100644
--- a/testcases/kernel/syscalls/mlock/mlock05.c
+++ b/testcases/kernel/syscalls/mlock/mlock05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify mlock() causes pre-faulting of PTEs and prevent memory to be swapped out.
*
* Find the new mapping in /proc/$pid/smaps and check Rss and Locked fields after
diff --git a/testcases/kernel/syscalls/mmap/mmap01.c b/testcases/kernel/syscalls/mmap/mmap01.c
index 05802bceba..9a0c01aa6b 100644
--- a/testcases/kernel/syscalls/mmap/mmap01.c
+++ b/testcases/kernel/syscalls/mmap/mmap01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that mmap() succeeds when used to map a file where size of the
* file is not a multiple of the page size, the memory area beyond the end
* of the file to the end of the page is accessible. Also, verify that
diff --git a/testcases/kernel/syscalls/mmap/mmap02.c b/testcases/kernel/syscalls/mmap/mmap02.c
index 7ffe61fa38..21cac4b444 100644
--- a/testcases/kernel/syscalls/mmap/mmap02.c
+++ b/testcases/kernel/syscalls/mmap/mmap02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, mmap() call with PROT_READ and a file descriptor which is
* open for read only, succeeds to map a file creating mapped memory with
* read access.
diff --git a/testcases/kernel/syscalls/mmap/mmap04.c b/testcases/kernel/syscalls/mmap/mmap04.c
index fa85deed12..4a050b7b50 100644
--- a/testcases/kernel/syscalls/mmap/mmap04.c
+++ b/testcases/kernel/syscalls/mmap/mmap04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, after a successful mmap() call, permission bits of the new
* mapping in /proc/pid/maps file matches the prot and flags arguments in
* mmap() call.
diff --git a/testcases/kernel/syscalls/mmap/mmap05.c b/testcases/kernel/syscalls/mmap/mmap05.c
index 7abddaa9e4..445b5a33e7 100644
--- a/testcases/kernel/syscalls/mmap/mmap05.c
+++ b/testcases/kernel/syscalls/mmap/mmap05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, mmap() call with 'PROT_NONE' and a file descriptor which is
* open for read and write, succeeds to map the file creating mapped memory,
* but any attempt to access the contents of the mapped region causes the
diff --git a/testcases/kernel/syscalls/mmap/mmap06.c b/testcases/kernel/syscalls/mmap/mmap06.c
index 9d983250c8..3c2ca0d056 100644
--- a/testcases/kernel/syscalls/mmap/mmap06.c
+++ b/testcases/kernel/syscalls/mmap/mmap06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, mmap() call fails with errno:
*
* - EACCES, when a file mapping is requested but the file descriptor is not open for reading.
diff --git a/testcases/kernel/syscalls/mmap/mmap08.c b/testcases/kernel/syscalls/mmap/mmap08.c
index 18db0b46f7..4cb9a46f9a 100644
--- a/testcases/kernel/syscalls/mmap/mmap08.c
+++ b/testcases/kernel/syscalls/mmap/mmap08.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, mmap() calls fails with errno EBADF when a file mapping
* is requested but the fd is not a valid file descriptor.
*/
diff --git a/testcases/kernel/syscalls/mmap/mmap09.c b/testcases/kernel/syscalls/mmap/mmap09.c
index 16634dc302..8c6b514ab8 100644
--- a/testcases/kernel/syscalls/mmap/mmap09.c
+++ b/testcases/kernel/syscalls/mmap/mmap09.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that truncating a mmaped file works correctly.
*
* Use ftruncate to:
diff --git a/testcases/kernel/syscalls/mmap/mmap13.c b/testcases/kernel/syscalls/mmap/mmap13.c
index 7298f5de53..34ac1a5329 100644
--- a/testcases/kernel/syscalls/mmap/mmap13.c
+++ b/testcases/kernel/syscalls/mmap/mmap13.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, mmap() call succeeds to create a file mapping with length
* argument greater than the file size but any attempt to reference the
* memory region which does not correspond to the file causes SIGBUS signal.
diff --git a/testcases/kernel/syscalls/mmap/mmap14.c b/testcases/kernel/syscalls/mmap/mmap14.c
index de35982f91..7bded88cc7 100644
--- a/testcases/kernel/syscalls/mmap/mmap14.c
+++ b/testcases/kernel/syscalls/mmap/mmap14.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify basic functionality of mmap(2) with MAP_LOCKED.
*
* mmap(2) should succeed returning the address of the mapped region,
diff --git a/testcases/kernel/syscalls/mmap/mmap15.c b/testcases/kernel/syscalls/mmap/mmap15.c
index 2128e0b57e..6681617a32 100644
--- a/testcases/kernel/syscalls/mmap/mmap15.c
+++ b/testcases/kernel/syscalls/mmap/mmap15.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that, a normal page cannot be mapped into a high memory region,
* and mmap() call fails with either ENOMEM or EINVAL errno.
*/
diff --git a/testcases/kernel/syscalls/mmap/mmap16.c b/testcases/kernel/syscalls/mmap/mmap16.c
index 6b1708dff9..2b8b36c5bc 100644
--- a/testcases/kernel/syscalls/mmap/mmap16.c
+++ b/testcases/kernel/syscalls/mmap/mmap16.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This is a regression test for a silent data corruption for a mmaped file
* when filesystem gets out of space.
*
diff --git a/testcases/kernel/syscalls/mmap/mmap19.c b/testcases/kernel/syscalls/mmap/mmap19.c
index 90b3f45b1f..e622539c32 100644
--- a/testcases/kernel/syscalls/mmap/mmap19.c
+++ b/testcases/kernel/syscalls/mmap/mmap19.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* If the kernel fails to correctly flush the TLB entry, the second mmap
* will not show the correct data.
*
diff --git a/testcases/kernel/syscalls/mmap/mmap20.c b/testcases/kernel/syscalls/mmap/mmap20.c
index 02d150e457..09dea8c41d 100644
--- a/testcases/kernel/syscalls/mmap/mmap20.c
+++ b/testcases/kernel/syscalls/mmap/mmap20.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test mmap(2) with MAP_SHARED_VALIDATE flag.
*
* Test expected EOPNOTSUPP errno when testing mmap(2) with MAP_SHARED_VALIDATE
diff --git a/testcases/kernel/syscalls/mount/mount01.c b/testcases/kernel/syscalls/mount/mount01.c
index 588e7c5673..a513e0fba7 100644
--- a/testcases/kernel/syscalls/mount/mount01.c
+++ b/testcases/kernel/syscalls/mount/mount01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test that checks mount() syscall works on multiple filesystems.
*/
diff --git a/testcases/kernel/syscalls/mount/mount02.c b/testcases/kernel/syscalls/mount/mount02.c
index ae3884f98c..734c93b77c 100644
--- a/testcases/kernel/syscalls/mount/mount02.c
+++ b/testcases/kernel/syscalls/mount/mount02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Check for basic errors returned by mount(2) system call.
*
* - ENODEV if filesystem type not configured
diff --git a/testcases/kernel/syscalls/mount/mount03.c b/testcases/kernel/syscalls/mount/mount03.c
index c3202574fc..98be3dc0a6 100644
--- a/testcases/kernel/syscalls/mount/mount03.c
+++ b/testcases/kernel/syscalls/mount/mount03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check mount(2) system call with various flags.
*
* Verify that mount(2) syscall passes for each flag setting and validate
diff --git a/testcases/kernel/syscalls/mount/mount04.c b/testcases/kernel/syscalls/mount/mount04.c
index 5eb5ee11bf..fe0ceaef44 100644
--- a/testcases/kernel/syscalls/mount/mount04.c
+++ b/testcases/kernel/syscalls/mount/mount04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that mount(2) returns -1 and sets errno to EPERM if the user
* is not root.
*/
diff --git a/testcases/kernel/syscalls/mount/mount05.c b/testcases/kernel/syscalls/mount/mount05.c
index 616eeee79d..66e102a322 100644
--- a/testcases/kernel/syscalls/mount/mount05.c
+++ b/testcases/kernel/syscalls/mount/mount05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for feature MS_BIND of mount, which performs a bind mount, making a file
* or a directory subtree visible at another point within a file system.
*/
diff --git a/testcases/kernel/syscalls/mount/mount06.c b/testcases/kernel/syscalls/mount/mount06.c
index 05d6fdf868..1e06cd5808 100644
--- a/testcases/kernel/syscalls/mount/mount06.c
+++ b/testcases/kernel/syscalls/mount/mount06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for feature MS_MOVE of mount, which moves an existing mount point to
* a new location.
*/
diff --git a/testcases/kernel/syscalls/mount/mount07.c b/testcases/kernel/syscalls/mount/mount07.c
index 8994d0f347..30fd308059 100644
--- a/testcases/kernel/syscalls/mount/mount07.c
+++ b/testcases/kernel/syscalls/mount/mount07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It is a basic test for MS_NOSYMFOLLOW mount option and is copied
* from kernel selftests nosymfollow-test.c.
*
diff --git a/testcases/kernel/syscalls/mount_setattr/mount_setattr01.c b/testcases/kernel/syscalls/mount_setattr/mount_setattr01.c
index e500df28e9..eb32cd91a7 100644
--- a/testcases/kernel/syscalls/mount_setattr/mount_setattr01.c
+++ b/testcases/kernel/syscalls/mount_setattr/mount_setattr01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic mount_setattr() test.
* Test whether the basic mount attributes are set correctly.
*
diff --git a/testcases/kernel/syscalls/move_pages/move_pages04.c b/testcases/kernel/syscalls/move_pages/move_pages04.c
index cde1f3120e..e1ee733f0d 100644
--- a/testcases/kernel/syscalls/move_pages/move_pages04.c
+++ b/testcases/kernel/syscalls/move_pages/move_pages04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that move_pages() properly reports failures when the memory area is
* not valid, no page is mapped yet or the shared zero page is mapped.
*
diff --git a/testcases/kernel/syscalls/move_pages/move_pages12.c b/testcases/kernel/syscalls/move_pages/move_pages12.c
index 78f17f99b0..879a89b6fd 100644
--- a/testcases/kernel/syscalls/move_pages/move_pages12.c
+++ b/testcases/kernel/syscalls/move_pages/move_pages12.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* *Test 1*
*
* This is a regression test for the race condition between move_pages()
diff --git a/testcases/kernel/syscalls/mprotect/mprotect05.c b/testcases/kernel/syscalls/mprotect/mprotect05.c
index 2b15f5bebb..cd6d81a0d6 100644
--- a/testcases/kernel/syscalls/mprotect/mprotect05.c
+++ b/testcases/kernel/syscalls/mprotect/mprotect05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the mprotect(2) system call split and merge.
*
* https://bugzilla.kernel.org/show_bug.cgi?id=217061
diff --git a/testcases/kernel/syscalls/mq_notify/mq_notify02.c b/testcases/kernel/syscalls/mq_notify/mq_notify02.c
index d979a4e9d7..5192494324 100644
--- a/testcases/kernel/syscalls/mq_notify/mq_notify02.c
+++ b/testcases/kernel/syscalls/mq_notify/mq_notify02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that mq_notify() fails with EINVAL when invalid input
* arguments are given.
*/
diff --git a/testcases/kernel/syscalls/mq_notify/mq_notify03.c b/testcases/kernel/syscalls/mq_notify/mq_notify03.c
index bf6898cd80..30e94ab14d 100644
--- a/testcases/kernel/syscalls/mq_notify/mq_notify03.c
+++ b/testcases/kernel/syscalls/mq_notify/mq_notify03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test for NULL pointer dereference in mq_notify(CVE-2021-38604)
*
* References links:
diff --git a/testcases/kernel/syscalls/mremap/mremap06.c b/testcases/kernel/syscalls/mremap/mremap06.c
index d18da199b6..5820ad75fd 100644
--- a/testcases/kernel/syscalls/mremap/mremap06.c
+++ b/testcases/kernel/syscalls/mremap/mremap06.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Bug reproducer for 7e7757876f25 ("mm/mremap: fix vm_pgoff in vma_merge() case 3")
*/
diff --git a/testcases/kernel/syscalls/mseal/mseal01.c b/testcases/kernel/syscalls/mseal/mseal01.c
index 00454a766f..1b3e4c94a0 100644
--- a/testcases/kernel/syscalls/mseal/mseal01.c
+++ b/testcases/kernel/syscalls/mseal/mseal01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This is a smoke test that verifies if mseal() protects specific VMA portions
* of a process. According to documentation, the syscall should protect memory
* from the following actions:
diff --git a/testcases/kernel/syscalls/mseal/mseal02.c b/testcases/kernel/syscalls/mseal/mseal02.c
index 62eeb25b21..e11d7dbf40 100644
--- a/testcases/kernel/syscalls/mseal/mseal02.c
+++ b/testcases/kernel/syscalls/mseal/mseal02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Check various errnos for mseal(2).
*
* - mseal() fails with EINVAL if flags is invalid.
diff --git a/testcases/kernel/syscalls/msync/msync04.c b/testcases/kernel/syscalls/msync/msync04.c
index 1af781a978..781a49ddb0 100644
--- a/testcases/kernel/syscalls/msync/msync04.c
+++ b/testcases/kernel/syscalls/msync/msync04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify msync() after writing into mmap()-ed file works.
*
* Write to mapped region and sync the memory back with file. Check the page
diff --git a/testcases/kernel/syscalls/munlock/munlock01.c b/testcases/kernel/syscalls/munlock/munlock01.c
index 65a49d7ee3..1ffa8c0a83 100644
--- a/testcases/kernel/syscalls/munlock/munlock01.c
+++ b/testcases/kernel/syscalls/munlock/munlock01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test munlock with various valid addresses and lengths.
*/
diff --git a/testcases/kernel/syscalls/munlock/munlock02.c b/testcases/kernel/syscalls/munlock/munlock02.c
index 55e313c95f..3380ab9bee 100644
--- a/testcases/kernel/syscalls/munlock/munlock02.c
+++ b/testcases/kernel/syscalls/munlock/munlock02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for ENOMEM error.
*
* munlock(2) fails with ENOMEM if some of the specified address range
diff --git a/testcases/kernel/syscalls/munlockall/munlockall01.c b/testcases/kernel/syscalls/munlockall/munlockall01.c
index 86469107e7..6ec028d2e9 100644
--- a/testcases/kernel/syscalls/munlockall/munlockall01.c
+++ b/testcases/kernel/syscalls/munlockall/munlockall01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that munlockall(2) unlocks all previously locked memory.
*/
diff --git a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
index 6535fdf5c0..db6951e1a0 100644
--- a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
+++ b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic name_to_handle_at() tests.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
index afd9cd0662..53e26f2ace 100644
--- a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
+++ b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Failure tests for name_to_handle_at().
*/
diff --git a/testcases/kernel/syscalls/nanosleep/nanosleep01.c b/testcases/kernel/syscalls/nanosleep/nanosleep01.c
index bd9ae0caa6..d3c29db9f4 100644
--- a/testcases/kernel/syscalls/nanosleep/nanosleep01.c
+++ b/testcases/kernel/syscalls/nanosleep/nanosleep01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that nanosleep() should return with value 0 and the process should be
* suspended for time specified by timespec structure.
*/
diff --git a/testcases/kernel/syscalls/nanosleep/nanosleep04.c b/testcases/kernel/syscalls/nanosleep/nanosleep04.c
index 3582a3fb23..9308621b40 100644
--- a/testcases/kernel/syscalls/nanosleep/nanosleep04.c
+++ b/testcases/kernel/syscalls/nanosleep/nanosleep04.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Verify that nanosleep() returns -1 and sets errno to EINVAL when failing to suspend the
* execution of a process if the specified pause time is invalid.
*/
diff --git a/testcases/kernel/syscalls/nice/nice01.c b/testcases/kernel/syscalls/nice/nice01.c
index bc58ad14c7..94f25f3bb4 100644
--- a/testcases/kernel/syscalls/nice/nice01.c
+++ b/testcases/kernel/syscalls/nice/nice01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that root can provide a negative value to nice() system call and hence
* root can decrease the nice value of the process using nice().
*/
diff --git a/testcases/kernel/syscalls/nice/nice02.c b/testcases/kernel/syscalls/nice/nice02.c
index b08e1d751e..0196169006 100644
--- a/testcases/kernel/syscalls/nice/nice02.c
+++ b/testcases/kernel/syscalls/nice/nice02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that any user can successfully increase the nice value of
* the process by passing a higher increment value (> max. applicable limits)
* to nice() system call.
diff --git a/testcases/kernel/syscalls/nice/nice03.c b/testcases/kernel/syscalls/nice/nice03.c
index 061592e6c3..7f642e0b97 100644
--- a/testcases/kernel/syscalls/nice/nice03.c
+++ b/testcases/kernel/syscalls/nice/nice03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that any user can successfully increase the nice value of
* the process by passing an increment value (< max. applicable limits) to
* nice() system call.
diff --git a/testcases/kernel/syscalls/nice/nice04.c b/testcases/kernel/syscalls/nice/nice04.c
index ac156008e5..052eed8d7e 100644
--- a/testcases/kernel/syscalls/nice/nice04.c
+++ b/testcases/kernel/syscalls/nice/nice04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, nice(2) fails when, a non-root user attempts to increase
* the priority of a process by specifying a negative increment value.
*/
diff --git a/testcases/kernel/syscalls/nice/nice05.c b/testcases/kernel/syscalls/nice/nice05.c
index 2701713171..b4d8965575 100644
--- a/testcases/kernel/syscalls/nice/nice05.c
+++ b/testcases/kernel/syscalls/nice/nice05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* 1. Create a high nice thread and a low nice thread, the main
* thread wake them at the same time
* 2. Both threads run on the same CPU
diff --git a/testcases/kernel/syscalls/open/open02.c b/testcases/kernel/syscalls/open/open02.c
index 3c9cc7e171..72f02d9495 100644
--- a/testcases/kernel/syscalls/open/open02.c
+++ b/testcases/kernel/syscalls/open/open02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* 1. open a new file without O_CREAT, ENOENT should be returned.
* 2. open a file with O_RDONLY | O_NOATIME and the caller was not
* privileged, EPERM should be returned.
diff --git a/testcases/kernel/syscalls/open/open03.c b/testcases/kernel/syscalls/open/open03.c
index 5521dfef26..275ca84f09 100644
--- a/testcases/kernel/syscalls/open/open03.c
+++ b/testcases/kernel/syscalls/open/open03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check open() with O_RDWR | O_CREAT.
*/
diff --git a/testcases/kernel/syscalls/open/open04.c b/testcases/kernel/syscalls/open/open04.c
index 24ef52a29a..3dc3486d3b 100644
--- a/testcases/kernel/syscalls/open/open04.c
+++ b/testcases/kernel/syscalls/open/open04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that open(2) fails with EMFILE when per-process limit on the number
* of open file descriptors has been reached.
*/
diff --git a/testcases/kernel/syscalls/open/open06.c b/testcases/kernel/syscalls/open/open06.c
index e167c2b6b9..7b5bd62495 100644
--- a/testcases/kernel/syscalls/open/open06.c
+++ b/testcases/kernel/syscalls/open/open06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that open(2) fails with ENXIO when
* O_NONBLOCK | O_WRONLY is set, the named file is a FIFO,
* and no process has the FIFO open for reading.
diff --git a/testcases/kernel/syscalls/open/open07.c b/testcases/kernel/syscalls/open/open07.c
index 0c53798e37..a03d751178 100644
--- a/testcases/kernel/syscalls/open/open07.c
+++ b/testcases/kernel/syscalls/open/open07.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test functionality and error conditions of open(O_NOFOLLOW) system call.
*/
diff --git a/testcases/kernel/syscalls/open/open08.c b/testcases/kernel/syscalls/open/open08.c
index 0af455b556..ad868b0ecc 100644
--- a/testcases/kernel/syscalls/open/open08.c
+++ b/testcases/kernel/syscalls/open/open08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that open() fails with:
*
* - EEXIST when pathname already exists and O_CREAT and O_EXCL were used
diff --git a/testcases/kernel/syscalls/open/open09.c b/testcases/kernel/syscalls/open/open09.c
index 0e89a87f85..36158b3c1d 100644
--- a/testcases/kernel/syscalls/open/open09.c
+++ b/testcases/kernel/syscalls/open/open09.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that a file opened with O_RDONLY can't be writable
* and it verifies that a file opened with O_WRONLY can't be readable.
*/
diff --git a/testcases/kernel/syscalls/open/open10.c b/testcases/kernel/syscalls/open/open10.c
index 916357158a..5e27a75dd9 100644
--- a/testcases/kernel/syscalls/open/open10.c
+++ b/testcases/kernel/syscalls/open/open10.c
@@ -4,8 +4,6 @@
* Copyright (c) 2021 SUSE LLC <mdoucha@suse.cz>
*/
/*\
- * [Description]
- *
* Verify that the group ID and setgid bit are set correctly when a new file
* is created.
*/
diff --git a/testcases/kernel/syscalls/open/open11.c b/testcases/kernel/syscalls/open/open11.c
index 3431efc2ca..6f89d558dc 100644
--- a/testcases/kernel/syscalls/open/open11.c
+++ b/testcases/kernel/syscalls/open/open11.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic tests for open(2) and make sure open(2) works and handles error
* conditions correctly.
*
diff --git a/testcases/kernel/syscalls/open/open15.c b/testcases/kernel/syscalls/open/open15.c
index 4fa243e94e..4917937adf 100644
--- a/testcases/kernel/syscalls/open/open15.c
+++ b/testcases/kernel/syscalls/open/open15.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that open() is working correctly on symlink()
* generated files. We generate a file via symlink, then we read both from file
* and symlink, comparing that data has been correctly written.
diff --git a/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at01.c b/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at01.c
index 6171229f0b..29a0d83c38 100644
--- a/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at01.c
+++ b/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic open_by_handle_at() tests.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at02.c b/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at02.c
index a505deeb10..b445f1adc0 100644
--- a/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at02.c
+++ b/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Failure tests for open_by_handle_at().
*/
#define _GNU_SOURCE
diff --git a/testcases/kernel/syscalls/openat/openat01.c b/testcases/kernel/syscalls/openat/openat01.c
index ad400b47fa..2e63bc2b9d 100644
--- a/testcases/kernel/syscalls/openat/openat01.c
+++ b/testcases/kernel/syscalls/openat/openat01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test case will verify basic function of openat.
*
* - pathname is relative, then it is interpreted relative to the directory
diff --git a/testcases/kernel/syscalls/openat/openat04.c b/testcases/kernel/syscalls/openat/openat04.c
index df5956cd84..d3f840ec4b 100644
--- a/testcases/kernel/syscalls/openat/openat04.c
+++ b/testcases/kernel/syscalls/openat/openat04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check setgid strip logic whether works correctly when creating tmpfile under
* filesystem without POSIX ACL supported(by using noacl mount option). Test it
* with umask S_IXGRP and also check file mode whether has filtered S_IXGRP.
diff --git a/testcases/kernel/syscalls/pathconf/pathconf01.c b/testcases/kernel/syscalls/pathconf/pathconf01.c
index 280709a910..5af45e4176 100644
--- a/testcases/kernel/syscalls/pathconf/pathconf01.c
+++ b/testcases/kernel/syscalls/pathconf/pathconf01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the pathconf(2) system call.
*/
diff --git a/testcases/kernel/syscalls/pathconf/pathconf02.c b/testcases/kernel/syscalls/pathconf/pathconf02.c
index a7af980ec6..8c4bf578fa 100644
--- a/testcases/kernel/syscalls/pathconf/pathconf02.c
+++ b/testcases/kernel/syscalls/pathconf/pathconf02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that,
*
* - pathconf() fails with ENOTDIR if a component used as a directory
diff --git a/testcases/kernel/syscalls/personality/personality01.c b/testcases/kernel/syscalls/personality/personality01.c
index 47fb66256a..05a0e17f89 100644
--- a/testcases/kernel/syscalls/personality/personality01.c
+++ b/testcases/kernel/syscalls/personality/personality01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Tries to set different personalities.
*
* We set the personality in a child process since it's not guaranteed that we
diff --git a/testcases/kernel/syscalls/personality/personality02.c b/testcases/kernel/syscalls/personality/personality02.c
index e080284f49..7c718dba35 100644
--- a/testcases/kernel/syscalls/personality/personality02.c
+++ b/testcases/kernel/syscalls/personality/personality02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test checks if select() timeout is not updated when personality with
* STICKY_TIMEOUTS is used.
*/
diff --git a/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c b/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c
index 60cf6702d1..57e96405cd 100644
--- a/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c
+++ b/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic pidfd_getfd() test:
*
* - the close-on-exec flag is set on the file descriptor returned by
diff --git a/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c b/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c
index 3431a0930e..a1ede7a929 100644
--- a/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c
+++ b/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the pidfd_open syscall.
*
* - EBADF pidfd is not a valid PID file descriptor
diff --git a/testcases/kernel/syscalls/pidfd_open/pidfd_open01.c b/testcases/kernel/syscalls/pidfd_open/pidfd_open01.c
index ce07e6717a..a07259d173 100644
--- a/testcases/kernel/syscalls/pidfd_open/pidfd_open01.c
+++ b/testcases/kernel/syscalls/pidfd_open/pidfd_open01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic pidfd_open() test:
*
* - Fetch the PID of the current process and try to get its file descriptor.
diff --git a/testcases/kernel/syscalls/pidfd_open/pidfd_open02.c b/testcases/kernel/syscalls/pidfd_open/pidfd_open02.c
index 9d6c9321dd..9c382260fb 100644
--- a/testcases/kernel/syscalls/pidfd_open/pidfd_open02.c
+++ b/testcases/kernel/syscalls/pidfd_open/pidfd_open02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the pidfd_open syscall.
*
* - ESRCH the process specified by pid does not exist
diff --git a/testcases/kernel/syscalls/pidfd_open/pidfd_open03.c b/testcases/kernel/syscalls/pidfd_open/pidfd_open03.c
index 16a8442f59..2a09de00c7 100644
--- a/testcases/kernel/syscalls/pidfd_open/pidfd_open03.c
+++ b/testcases/kernel/syscalls/pidfd_open/pidfd_open03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This program opens the PID file descriptor of the child process created with
* fork(). It then uses poll to monitor the file descriptor for process exit, as
* indicated by an EPOLLIN event.
diff --git a/testcases/kernel/syscalls/pidfd_open/pidfd_open04.c b/testcases/kernel/syscalls/pidfd_open/pidfd_open04.c
index 0e8ab69562..7e106ab5ed 100644
--- a/testcases/kernel/syscalls/pidfd_open/pidfd_open04.c
+++ b/testcases/kernel/syscalls/pidfd_open/pidfd_open04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that the PIDFD_NONBLOCK flag works with pidfd_open() and
* that waitid() with a non-blocking pidfd returns EAGAIN.
*/
diff --git a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c
index 4715850258..ab2990dbfc 100644
--- a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c
+++ b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests if the pidfd_send_signal syscall behaves
* like rt_sigqueueinfo when a pointer to a siginfo_t
* struct is passed.
diff --git a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c
index a3bf994f92..31e8a1129b 100644
--- a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c
+++ b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the pidfd_send_signal
* system call.
*
diff --git a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c
index 20d96b1182..e1b1372746 100644
--- a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c
+++ b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test checks if the pidfd_send_signal syscall wrongfully sends
* a signal to a new process which inherited the PID of the actual
* target process.
diff --git a/testcases/kernel/syscalls/pipe/pipe03.c b/testcases/kernel/syscalls/pipe/pipe03.c
index d20867b2bf..50f49b8e1e 100644
--- a/testcases/kernel/syscalls/pipe/pipe03.c
+++ b/testcases/kernel/syscalls/pipe/pipe03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, an attempt to write to the read end of a pipe fails with EBADF
* and an attempt to read from the write end of a pipe also fails with EBADF.
*/
diff --git a/testcases/kernel/syscalls/pipe/pipe06.c b/testcases/kernel/syscalls/pipe/pipe06.c
index 0c6bc03bd6..29dbbdbd78 100644
--- a/testcases/kernel/syscalls/pipe/pipe06.c
+++ b/testcases/kernel/syscalls/pipe/pipe06.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that, pipe(2) syscall fails with errno EMFILE when
* limit on the number of open file descriptors has been reached.
*/
diff --git a/testcases/kernel/syscalls/pipe/pipe07.c b/testcases/kernel/syscalls/pipe/pipe07.c
index 8098007c29..d179020217 100644
--- a/testcases/kernel/syscalls/pipe/pipe07.c
+++ b/testcases/kernel/syscalls/pipe/pipe07.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that, pipe(2) syscall can open the maximum number of
* file descriptors permitted.
*/
diff --git a/testcases/kernel/syscalls/pipe/pipe08.c b/testcases/kernel/syscalls/pipe/pipe08.c
index 28088cf618..f86774d5ec 100644
--- a/testcases/kernel/syscalls/pipe/pipe08.c
+++ b/testcases/kernel/syscalls/pipe/pipe08.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, on any attempt to write to a pipe which is closed for
* reading will generate a SIGPIPE signal and write will fail with
* EPIPE errno.
diff --git a/testcases/kernel/syscalls/pipe/pipe10.c b/testcases/kernel/syscalls/pipe/pipe10.c
index 018e653daf..30cd983b26 100644
--- a/testcases/kernel/syscalls/pipe/pipe10.c
+++ b/testcases/kernel/syscalls/pipe/pipe10.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, when a parent process opens a pipe, a child process can
* read from it.
*/
diff --git a/testcases/kernel/syscalls/pipe/pipe14.c b/testcases/kernel/syscalls/pipe/pipe14.c
index 2d2969d820..66d94cffaf 100644
--- a/testcases/kernel/syscalls/pipe/pipe14.c
+++ b/testcases/kernel/syscalls/pipe/pipe14.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that, if the write end of a pipe is closed, then a process reading
* from the pipe will see end-of-file (i.e., read() returns 0) once it has
* read all remaining data in the pipe.
diff --git a/testcases/kernel/syscalls/pipe/pipe15.c b/testcases/kernel/syscalls/pipe/pipe15.c
index ebdb195b36..94b0cb1010 100644
--- a/testcases/kernel/syscalls/pipe/pipe15.c
+++ b/testcases/kernel/syscalls/pipe/pipe15.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This is a regression test for hangup on pipe operations. See
* https://www.spinics.net/lists/linux-api/msg49762.html for
* additional context. It tests that pipe operations do not block
diff --git a/testcases/kernel/syscalls/pkeys/pkey01.c b/testcases/kernel/syscalls/pkeys/pkey01.c
index 444799670e..8cbe2d6b5a 100644
--- a/testcases/kernel/syscalls/pkeys/pkey01.c
+++ b/testcases/kernel/syscalls/pkeys/pkey01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Memory Protection Keys for Userspace (PKU aka PKEYs) is a Skylake-SP
* server feature that provides a mechanism for enforcing page-based
* protections, but without requiring modification of the page tables
diff --git a/testcases/kernel/syscalls/prctl/prctl01.c b/testcases/kernel/syscalls/prctl/prctl01.c
index 939ca38c09..ca3f39a6b1 100644
--- a/testcases/kernel/syscalls/prctl/prctl01.c
+++ b/testcases/kernel/syscalls/prctl/prctl01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Basic test for PR_SET_PDEATHSIG/PR_GET_PDEATHSIG
*
* Use PR_SET_PDEATHSIG to set SIGUSR2 signal and PR_GET_PDEATHSIG should
diff --git a/testcases/kernel/syscalls/prctl/prctl02.c b/testcases/kernel/syscalls/prctl/prctl02.c
index 1cd33f88ca..8d865fb067 100644
--- a/testcases/kernel/syscalls/prctl/prctl02.c
+++ b/testcases/kernel/syscalls/prctl/prctl02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* - EINVAL when an invalid value is given for option
* - EINVAL when option is PR_SET_PDEATHSIG & arg2 is not zero or a valid
* signal number
diff --git a/testcases/kernel/syscalls/prctl/prctl03.c b/testcases/kernel/syscalls/prctl/prctl03.c
index bac918e890..cd70c39a43 100644
--- a/testcases/kernel/syscalls/prctl/prctl03.c
+++ b/testcases/kernel/syscalls/prctl/prctl03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test PR_SET_CHILD_SUBREAPER and PR_GET_CHILD_SUBREAPER of prctl(2).
*
* - If PR_SET_CHILD_SUBREAPER marks a process as a child subreaper, it
diff --git a/testcases/kernel/syscalls/prctl/prctl05.c b/testcases/kernel/syscalls/prctl/prctl05.c
index dd596630e5..a014ba89e9 100644
--- a/testcases/kernel/syscalls/prctl/prctl05.c
+++ b/testcases/kernel/syscalls/prctl/prctl05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test PR_GET_NAME and PR_SET_NAME of prctl(2).
*
* - Set the name of the calling thread, the name can be up to 16 bytes
diff --git a/testcases/kernel/syscalls/prctl/prctl06.c b/testcases/kernel/syscalls/prctl/prctl06.c
index a9b35b2464..087b2935ee 100644
--- a/testcases/kernel/syscalls/prctl/prctl06.c
+++ b/testcases/kernel/syscalls/prctl/prctl06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test PR_GET_NO_NEW_PRIVS and PR_SET_NO_NEW_PRIVS of prctl(2).
*
* - Return the value of the no_new_privs bit for the calling thread.
diff --git a/testcases/kernel/syscalls/prctl/prctl07.c b/testcases/kernel/syscalls/prctl/prctl07.c
index dd1d2c0641..e7f3f94815 100644
--- a/testcases/kernel/syscalls/prctl/prctl07.c
+++ b/testcases/kernel/syscalls/prctl/prctl07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test the PR_CAP_AMBIENT of prctl(2).
*
* Reads or changes the ambient capability set of the calling thread,
diff --git a/testcases/kernel/syscalls/prctl/prctl08.c b/testcases/kernel/syscalls/prctl/prctl08.c
index f090623b21..8c27df3894 100644
--- a/testcases/kernel/syscalls/prctl/prctl08.c
+++ b/testcases/kernel/syscalls/prctl/prctl08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test PR_GET_TIMERSLACK and PR_SET_TIMERSLACK of prctl(2).
*
* - Each thread has two associated timer slack values: a "default"
diff --git a/testcases/kernel/syscalls/prctl/prctl09.c b/testcases/kernel/syscalls/prctl/prctl09.c
index c0696fcd81..5c962318f7 100644
--- a/testcases/kernel/syscalls/prctl/prctl09.c
+++ b/testcases/kernel/syscalls/prctl/prctl09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This is a timer sample test that timer slack is 200us.
*/
diff --git a/testcases/kernel/syscalls/prctl/prctl10.c b/testcases/kernel/syscalls/prctl/prctl10.c
index b77268c02a..d7868f13ae 100644
--- a/testcases/kernel/syscalls/prctl/prctl10.c
+++ b/testcases/kernel/syscalls/prctl/prctl10.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic test to test behaviour of PR_GET_TSC and PR_SET_TSC.
*
* Set the state of the flag determining whether the timestamp counter can
diff --git a/testcases/kernel/syscalls/pread/pread01.c b/testcases/kernel/syscalls/pread/pread01.c
index d11ca58f83..36a93a3f99 100644
--- a/testcases/kernel/syscalls/pread/pread01.c
+++ b/testcases/kernel/syscalls/pread/pread01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify the functionality of pread() by writing known data using pwrite()
* to the file at various specified offsets and later read from the file from
* various specified offsets, comparing the data read against the data written.
diff --git a/testcases/kernel/syscalls/pread/pread02.c b/testcases/kernel/syscalls/pread/pread02.c
index 04c7d0371a..d38daa4c87 100644
--- a/testcases/kernel/syscalls/pread/pread02.c
+++ b/testcases/kernel/syscalls/pread/pread02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the pread syscall.
*
* - ESPIPE when attempted to read from an unnamed pipe
diff --git a/testcases/kernel/syscalls/preadv/preadv01.c b/testcases/kernel/syscalls/preadv/preadv01.c
index d5e5bd95f1..68e8d28c39 100644
--- a/testcases/kernel/syscalls/preadv/preadv01.c
+++ b/testcases/kernel/syscalls/preadv/preadv01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the basic functionality of the preadv(2).
*
* Preadv(2) should succeed to read the expected content of data
diff --git a/testcases/kernel/syscalls/preadv/preadv02.c b/testcases/kernel/syscalls/preadv/preadv02.c
index 19b194314b..0dc16f4a84 100644
--- a/testcases/kernel/syscalls/preadv/preadv02.c
+++ b/testcases/kernel/syscalls/preadv/preadv02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* - EINVAL when iov_len is invalid.
* - EINVAL when the vector count iovcnt is less than zero.
* - EINVAL when offset is negative.
diff --git a/testcases/kernel/syscalls/preadv/preadv03.c b/testcases/kernel/syscalls/preadv/preadv03.c
index 997e7a07c2..b6ec0a6080 100644
--- a/testcases/kernel/syscalls/preadv/preadv03.c
+++ b/testcases/kernel/syscalls/preadv/preadv03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the preadv(2) for the file
* opened with O_DIRECT in all filesystem.
*
diff --git a/testcases/kernel/syscalls/preadv2/preadv201.c b/testcases/kernel/syscalls/preadv2/preadv201.c
index 32ed7862a2..6065112833 100644
--- a/testcases/kernel/syscalls/preadv2/preadv201.c
+++ b/testcases/kernel/syscalls/preadv2/preadv201.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify the basic functionality of the preadv2(2):
*
* 1. If the file offset argument is not -1, preadv2() should succeed
diff --git a/testcases/kernel/syscalls/preadv2/preadv202.c b/testcases/kernel/syscalls/preadv2/preadv202.c
index f7279e0adf..c0e3f13a50 100644
--- a/testcases/kernel/syscalls/preadv2/preadv202.c
+++ b/testcases/kernel/syscalls/preadv2/preadv202.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, preadv2(2) fails and sets errno to
*
* 1. EINVAL if iov_len is invalid.
diff --git a/testcases/kernel/syscalls/process_madvise/process_madvise01.c b/testcases/kernel/syscalls/process_madvise/process_madvise01.c
index ca314c4da4..14ab1d8332 100644
--- a/testcases/kernel/syscalls/process_madvise/process_madvise01.c
+++ b/testcases/kernel/syscalls/process_madvise/process_madvise01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Allocate anonymous memory pages inside child and reclaim it with
* MADV_PAGEOUT. Then check if memory pages have been swapped out by looking
* at smaps information.
diff --git a/testcases/kernel/syscalls/pselect/pselect02.c b/testcases/kernel/syscalls/pselect/pselect02.c
index 391a31bb17..e5396077d8 100644
--- a/testcases/kernel/syscalls/pselect/pselect02.c
+++ b/testcases/kernel/syscalls/pselect/pselect02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that pselect() fails with:
*
* - EBADF if a file descriptor that was already closed
diff --git a/testcases/kernel/syscalls/ptrace/ptrace05.c b/testcases/kernel/syscalls/ptrace/ptrace05.c
index 276faa77be..a44eb417c8 100644
--- a/testcases/kernel/syscalls/ptrace/ptrace05.c
+++ b/testcases/kernel/syscalls/ptrace/ptrace05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test ptraces itself as per arbitrarily specified signals,
* over 0 to SIGRTMAX range.
*/
diff --git a/testcases/kernel/syscalls/ptrace/ptrace06.c b/testcases/kernel/syscalls/ptrace/ptrace06.c
index fa3f07fa10..573a957992 100644
--- a/testcases/kernel/syscalls/ptrace/ptrace06.c
+++ b/testcases/kernel/syscalls/ptrace/ptrace06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check out-of-bound/unaligned addresses given to
*
* - {PEEK,POKE}{DATA,TEXT,USER}
diff --git a/testcases/kernel/syscalls/ptrace/ptrace11.c b/testcases/kernel/syscalls/ptrace/ptrace11.c
index 90154852f8..7f08aa996a 100644
--- a/testcases/kernel/syscalls/ptrace/ptrace11.c
+++ b/testcases/kernel/syscalls/ptrace/ptrace11.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Before kernel 2.6.26 we could not trace init(1) process and ptrace() would
* fail with EPERM. This case just checks whether we can trace init(1) process
* successfully.
diff --git a/testcases/kernel/syscalls/pwrite/pwrite01.c b/testcases/kernel/syscalls/pwrite/pwrite01.c
index 8f7ad2fb84..0c3689ce0e 100644
--- a/testcases/kernel/syscalls/pwrite/pwrite01.c
+++ b/testcases/kernel/syscalls/pwrite/pwrite01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify the functionality of pwrite() by writing known data using pwrite()
* to the file at various specified offsets and later read from the file from
* various specified offsets, comparing the data written aganist the data
diff --git a/testcases/kernel/syscalls/pwrite/pwrite02.c b/testcases/kernel/syscalls/pwrite/pwrite02.c
index 9a40eddc87..d9ffac4886 100644
--- a/testcases/kernel/syscalls/pwrite/pwrite02.c
+++ b/testcases/kernel/syscalls/pwrite/pwrite02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test basic error handling of the pwrite syscall.
*
* - ESPIPE when attempted to write to an unnamed pipe
diff --git a/testcases/kernel/syscalls/pwrite/pwrite03.c b/testcases/kernel/syscalls/pwrite/pwrite03.c
index ae572c1e9e..406c59d2c6 100644
--- a/testcases/kernel/syscalls/pwrite/pwrite03.c
+++ b/testcases/kernel/syscalls/pwrite/pwrite03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests for a special case NULL buffer with size 0 is expected to return 0.
*/
diff --git a/testcases/kernel/syscalls/pwrite/pwrite04.c b/testcases/kernel/syscalls/pwrite/pwrite04.c
index 859955394b..c22e444f7d 100644
--- a/testcases/kernel/syscalls/pwrite/pwrite04.c
+++ b/testcases/kernel/syscalls/pwrite/pwrite04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test the pwrite() system call with O_APPEND.
*
* Writing 2k data to the file, close it and reopen it with O_APPEND.
diff --git a/testcases/kernel/syscalls/pwritev/pwritev01.c b/testcases/kernel/syscalls/pwritev/pwritev01.c
index 1a4f672bf9..0aa5cb47a2 100644
--- a/testcases/kernel/syscalls/pwritev/pwritev01.c
+++ b/testcases/kernel/syscalls/pwritev/pwritev01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the basic functionality of the pwritev(2).
*
* pwritev(2) should succeed to write the expected content of data
diff --git a/testcases/kernel/syscalls/pwritev/pwritev02.c b/testcases/kernel/syscalls/pwritev/pwritev02.c
index 25eb242f53..b1ba423505 100644
--- a/testcases/kernel/syscalls/pwritev/pwritev02.c
+++ b/testcases/kernel/syscalls/pwritev/pwritev02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* - EINVAL when iov_len is invalid.
* - EINVAL when the vector count iovcnt is less than zero.
* - EINVAL when offset is negative.
diff --git a/testcases/kernel/syscalls/pwritev/pwritev03.c b/testcases/kernel/syscalls/pwritev/pwritev03.c
index 81ccee9be2..2655697dd4 100644
--- a/testcases/kernel/syscalls/pwritev/pwritev03.c
+++ b/testcases/kernel/syscalls/pwritev/pwritev03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the pwritev(2) for the file
* opened with O_DIRECT in all filesystem.
*
diff --git a/testcases/kernel/syscalls/pwritev2/pwritev201.c b/testcases/kernel/syscalls/pwritev2/pwritev201.c
index ae9047cdd7..b74bf9186a 100644
--- a/testcases/kernel/syscalls/pwritev2/pwritev201.c
+++ b/testcases/kernel/syscalls/pwritev2/pwritev201.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the basic functionality of the pwritev2(2).
*
* - If the file offset argument is not -1, pwritev2() should succeed
diff --git a/testcases/kernel/syscalls/pwritev2/pwritev202.c b/testcases/kernel/syscalls/pwritev2/pwritev202.c
index e4d80070d2..b17d840676 100644
--- a/testcases/kernel/syscalls/pwritev2/pwritev202.c
+++ b/testcases/kernel/syscalls/pwritev2/pwritev202.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check various errnos for pwritev2(2).
*
* - pwritev2() fails and sets errno to EINVAL if iov_len is invalid.
diff --git a/testcases/kernel/syscalls/quotactl/quotactl01.c b/testcases/kernel/syscalls/quotactl/quotactl01.c
index 7b7fb63604..9dcf74ceb2 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl01.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl01.c
@@ -7,7 +7,6 @@
*/
/*\
- * [Description]
* This testcases checks that quotactl(2) on ext4 filesystem succeeds to:
*
* - turn on quota with Q_QUOTAON flag for user
diff --git a/testcases/kernel/syscalls/quotactl/quotactl02.c b/testcases/kernel/syscalls/quotactl/quotactl02.c
index f837165568..d6f54708b3 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl02.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This testcases checks that quotactl(2) on xfs filesystem succeeds to:
*
* - turn off xfs quota and get xfs quota off status for user
diff --git a/testcases/kernel/syscalls/quotactl/quotactl03.c b/testcases/kernel/syscalls/quotactl/quotactl03.c
index 78d9a5458e..3ee15289c6 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl03.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* quotactl(2) with XGETNEXTQUOTA looks for the next active quota for an user
* equal or higher to a given ID, in this test the ID is specified to a value
* close to UINT_MAX(max value of unsigned int). When reaching the upper limit
diff --git a/testcases/kernel/syscalls/quotactl/quotactl04.c b/testcases/kernel/syscalls/quotactl/quotactl04.c
index 91f15eb5dd..d2d7b3f3e4 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl04.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This testcase checks that quotactl(2) on ext4 filesystem succeeds to:
*
* - turn on quota with Q_QUOTAON flag for project
diff --git a/testcases/kernel/syscalls/quotactl/quotactl05.c b/testcases/kernel/syscalls/quotactl/quotactl05.c
index d19c729f85..e9f99d96f3 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl05.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This testcases checks that quotactl(2) on xfs filesystem succeeds to:
*
* - turn off xfs quota and get xfs quota off status for project
diff --git a/testcases/kernel/syscalls/quotactl/quotactl06.c b/testcases/kernel/syscalls/quotactl/quotactl06.c
index 86b0d95d2e..110a3aa9bf 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl06.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the quotactl syscall with visible quota files
* (cover two formats, vfsv0 and vfsv1):
*
diff --git a/testcases/kernel/syscalls/quotactl/quotactl07.c b/testcases/kernel/syscalls/quotactl/quotactl07.c
index c6e44b0a71..66505a308f 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl07.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This is not only a functional test but also a error test for Q_XQUOTARM.
*
* It is a regresstion test for kernel commit 3dd4d40b4208
diff --git a/testcases/kernel/syscalls/quotactl/quotactl08.c b/testcases/kernel/syscalls/quotactl/quotactl08.c
index 85a2f47316..63087345fe 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl08.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl08.c
@@ -5,7 +5,6 @@
*/
/*\
- * [Description]
* This testcases checks that quotactl(2) on ext4 filesystem succeeds to:
*
* - turn on quota with Q_QUOTAON flag for user
diff --git a/testcases/kernel/syscalls/quotactl/quotactl09.c b/testcases/kernel/syscalls/quotactl/quotactl09.c
index 4ddcbd659f..673666347a 100644
--- a/testcases/kernel/syscalls/quotactl/quotactl09.c
+++ b/testcases/kernel/syscalls/quotactl/quotactl09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests basic error handling of the quotactl syscall without visible quota files
* (use quotactl and quotactl_fd syscall):
*
diff --git a/testcases/kernel/syscalls/read/read03.c b/testcases/kernel/syscalls/read/read03.c
index ee92a329e6..bb2fc5223c 100644
--- a/testcases/kernel/syscalls/read/read03.c
+++ b/testcases/kernel/syscalls/read/read03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check if read() successfully sets errno to EAGAIN when read from
* a pipe (fifo, opened in O_NONBLOCK mode) without writing to it.
*/
diff --git a/testcases/kernel/syscalls/read/read04.c b/testcases/kernel/syscalls/read/read04.c
index 154cbf47df..f7d9a65daa 100644
--- a/testcases/kernel/syscalls/read/read04.c
+++ b/testcases/kernel/syscalls/read/read04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check if read() returns the number of bytes read correctly.
*/
diff --git a/testcases/kernel/syscalls/readahead/readahead01.c b/testcases/kernel/syscalls/readahead/readahead01.c
index aed8e7f310..fdf1bb0440 100644
--- a/testcases/kernel/syscalls/readahead/readahead01.c
+++ b/testcases/kernel/syscalls/readahead/readahead01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that readahead() syscall fails with:
*
* - EBADF when fd is not a valid file descriptor or is not open for reading.
diff --git a/testcases/kernel/syscalls/readdir/readdir01.c b/testcases/kernel/syscalls/readdir/readdir01.c
index 2dc8f916d3..96db689923 100644
--- a/testcases/kernel/syscalls/readdir/readdir01.c
+++ b/testcases/kernel/syscalls/readdir/readdir01.c
@@ -14,8 +14,6 @@
*/
/*\
- * [Description]
- *
* The test for the readdir(2) system call.
* Create n files and check that readdir() finds n files
*/
diff --git a/testcases/kernel/syscalls/readdir/readdir21.c b/testcases/kernel/syscalls/readdir/readdir21.c
index 7b747dbd3b..bb508a4b0a 100644
--- a/testcases/kernel/syscalls/readdir/readdir21.c
+++ b/testcases/kernel/syscalls/readdir/readdir21.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that readdir will fail with:
*
* - ENOENT when passed a fd to a deleted directory
diff --git a/testcases/kernel/syscalls/readlink/readlink01.c b/testcases/kernel/syscalls/readlink/readlink01.c
index 8165547d49..a721436e2c 100644
--- a/testcases/kernel/syscalls/readlink/readlink01.c
+++ b/testcases/kernel/syscalls/readlink/readlink01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests basic functionality of readlink(2).
*
* - readlink() will succeed to read the contents of the symbolic link
diff --git a/testcases/kernel/syscalls/readlink/readlink03.c b/testcases/kernel/syscalls/readlink/readlink03.c
index dce6366643..8348387378 100644
--- a/testcases/kernel/syscalls/readlink/readlink03.c
+++ b/testcases/kernel/syscalls/readlink/readlink03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, readlink(2) returns -1 and sets errno to
*
* 1. EACCES if search/write permission is denied in the directory where the
diff --git a/testcases/kernel/syscalls/readlinkat/readlinkat01.c b/testcases/kernel/syscalls/readlinkat/readlinkat01.c
index 9f238ff0ac..c3ff8f9b6b 100644
--- a/testcases/kernel/syscalls/readlinkat/readlinkat01.c
+++ b/testcases/kernel/syscalls/readlinkat/readlinkat01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the readlinkat() system call.
*
* - readlinkat() passes if dirfd is directory file descriptor
diff --git a/testcases/kernel/syscalls/readlinkat/readlinkat02.c b/testcases/kernel/syscalls/readlinkat/readlinkat02.c
index 64afb898f3..e2eaaed7be 100644
--- a/testcases/kernel/syscalls/readlinkat/readlinkat02.c
+++ b/testcases/kernel/syscalls/readlinkat/readlinkat02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* - readlinkat() fails with EINVAL if the bufsiz is 0.
*
* - readlinkat() fails with EINVAL if the named file is not a symbolic link.
diff --git a/testcases/kernel/syscalls/readv/readv02.c b/testcases/kernel/syscalls/readv/readv02.c
index c09e69bc8e..2ba23d4c60 100644
--- a/testcases/kernel/syscalls/readv/readv02.c
+++ b/testcases/kernel/syscalls/readv/readv02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Tests readv() failures:
*
* - EINVAL the sum of the iov_len values overflows an ssize_t value
diff --git a/testcases/kernel/syscalls/realpath/realpath01.c b/testcases/kernel/syscalls/realpath/realpath01.c
index e65debd58e..9c8e85a906 100644
--- a/testcases/kernel/syscalls/realpath/realpath01.c
+++ b/testcases/kernel/syscalls/realpath/realpath01.c
@@ -9,8 +9,6 @@
*/
/*\
- * [Description]
- *
* CVE-2018-1000001 realpath buffer underflow.
*
* Based on glibc test io/tst-getcwd-abspath.c:
diff --git a/testcases/kernel/syscalls/reboot/reboot01.c b/testcases/kernel/syscalls/reboot/reboot01.c
index 098b287b6a..28fae8bb0c 100644
--- a/testcases/kernel/syscalls/reboot/reboot01.c
+++ b/testcases/kernel/syscalls/reboot/reboot01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test of libc wrapper of reboot(2) system call.
*
* Test LINUX_REBOOT_CMD_CAD_ON, LINUX_REBOOT_CMD_CAD_OFF commands,
diff --git a/testcases/kernel/syscalls/reboot/reboot02.c b/testcases/kernel/syscalls/reboot/reboot02.c
index 2e95fd0635..5682b78e06 100644
--- a/testcases/kernel/syscalls/reboot/reboot02.c
+++ b/testcases/kernel/syscalls/reboot/reboot02.c
@@ -6,7 +6,6 @@
*/
/*\
- * [Description]
* Test whether libc wrapper of reboot(2) system call returns appropriate
* error number for invalid cmd parameter or invalid user.
*/
diff --git a/testcases/kernel/syscalls/recvmsg/recvmsg01.c b/testcases/kernel/syscalls/recvmsg/recvmsg01.c
index a265bc3bd7..378be8ca21 100644
--- a/testcases/kernel/syscalls/recvmsg/recvmsg01.c
+++ b/testcases/kernel/syscalls/recvmsg/recvmsg01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that recvmsg() returns the proper errno for various failure cases.
*/
diff --git a/testcases/kernel/syscalls/rename/rename01.c b/testcases/kernel/syscalls/rename/rename01.c
index 159341d095..2bbb70b2cc 100644
--- a/testcases/kernel/syscalls/rename/rename01.c
+++ b/testcases/kernel/syscalls/rename/rename01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify rename() when the newpath file or directory does not exist.
*/
diff --git a/testcases/kernel/syscalls/rename/rename03.c b/testcases/kernel/syscalls/rename/rename03.c
index 652fa3bdb3..f0c277cbe2 100644
--- a/testcases/kernel/syscalls/rename/rename03.c
+++ b/testcases/kernel/syscalls/rename/rename03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify rename(2) functions correctly when the newpath
* file or directory (empty) exists.
*/
diff --git a/testcases/kernel/syscalls/rename/rename04.c b/testcases/kernel/syscalls/rename/rename04.c
index 598ecd6fe2..44b4d37d24 100644
--- a/testcases/kernel/syscalls/rename/rename04.c
+++ b/testcases/kernel/syscalls/rename/rename04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that rename() fails with EEXIST or ENOTEMPTY when
* newpath is a non-empty directory.
*/
diff --git a/testcases/kernel/syscalls/rename/rename05.c b/testcases/kernel/syscalls/rename/rename05.c
index 7894a92147..2567a52524 100644
--- a/testcases/kernel/syscalls/rename/rename05.c
+++ b/testcases/kernel/syscalls/rename/rename05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that rename(2) fails with EISDIR when
* oldpath is not a directory and newpath is an existing directory.
*/
diff --git a/testcases/kernel/syscalls/rename/rename06.c b/testcases/kernel/syscalls/rename/rename06.c
index 82665d1c2d..06ca8bf127 100644
--- a/testcases/kernel/syscalls/rename/rename06.c
+++ b/testcases/kernel/syscalls/rename/rename06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that rename(2) fails with EINVAL when
* an attempt is made to make a directory a subdirectory of itself.
*/
diff --git a/testcases/kernel/syscalls/rename/rename07.c b/testcases/kernel/syscalls/rename/rename07.c
index 51338dbf42..dabba77f9b 100644
--- a/testcases/kernel/syscalls/rename/rename07.c
+++ b/testcases/kernel/syscalls/rename/rename07.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that rename(2) fails with ENOTDIR, when
* oldpath is a directory and newpath exists but is not a directory.
*
diff --git a/testcases/kernel/syscalls/rename/rename08.c b/testcases/kernel/syscalls/rename/rename08.c
index 8a9a9b344c..c4cd3f48ea 100644
--- a/testcases/kernel/syscalls/rename/rename08.c
+++ b/testcases/kernel/syscalls/rename/rename08.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that rename(2) fails with EFAULT, when
* oldpath or newpath points outside of accessible address space.
*/
diff --git a/testcases/kernel/syscalls/rename/rename09.c b/testcases/kernel/syscalls/rename/rename09.c
index 927b36f271..202efa1d67 100644
--- a/testcases/kernel/syscalls/rename/rename09.c
+++ b/testcases/kernel/syscalls/rename/rename09.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that renaming/moving a file from directory where the current user does
* not have write permissions fails with EACCES.
*/
diff --git a/testcases/kernel/syscalls/rename/rename10.c b/testcases/kernel/syscalls/rename/rename10.c
index 5b5f79073e..129cecf46b 100644
--- a/testcases/kernel/syscalls/rename/rename10.c
+++ b/testcases/kernel/syscalls/rename/rename10.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that rename(2) fails with ENAMETOOLONG, when
* oldpath or newpath is too long.
*/
diff --git a/testcases/kernel/syscalls/rename/rename12.c b/testcases/kernel/syscalls/rename/rename12.c
index d6e1ccbe93..3e717f2494 100644
--- a/testcases/kernel/syscalls/rename/rename12.c
+++ b/testcases/kernel/syscalls/rename/rename12.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that rename() fails with EPERM or EACCES when the directory
* containing oldpath has the sticky bit (S_ISVTX) set and the caller
* is not privileged.
diff --git a/testcases/kernel/syscalls/rename/rename13.c b/testcases/kernel/syscalls/rename/rename13.c
index 51490db75b..069971d1b9 100644
--- a/testcases/kernel/syscalls/rename/rename13.c
+++ b/testcases/kernel/syscalls/rename/rename13.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that rename() does nothing and returns a success status when
* oldpath and newpath are existing hard links referring to the same file.
*/
diff --git a/testcases/kernel/syscalls/rename/rename15.c b/testcases/kernel/syscalls/rename/rename15.c
index d08b1e67f0..1ef5807353 100644
--- a/testcases/kernel/syscalls/rename/rename15.c
+++ b/testcases/kernel/syscalls/rename/rename15.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test suite validates the behavior of the `rename()` system call on
* symbolic links under three scenarios:
*
diff --git a/testcases/kernel/syscalls/request_key/request_key01.c b/testcases/kernel/syscalls/request_key/request_key01.c
index f349cd50dd..97121533da 100644
--- a/testcases/kernel/syscalls/request_key/request_key01.c
+++ b/testcases/kernel/syscalls/request_key/request_key01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test basic functionality of the request_key(2).
*
* request_key(2) asks the kernel to find a key which matches the
diff --git a/testcases/kernel/syscalls/request_key/request_key02.c b/testcases/kernel/syscalls/request_key/request_key02.c
index 48bb978dda..2d35aceeee 100644
--- a/testcases/kernel/syscalls/request_key/request_key02.c
+++ b/testcases/kernel/syscalls/request_key/request_key02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic request_key(2) failure checking. request_key(2) should return -1 and
* set expected errno:
*
diff --git a/testcases/kernel/syscalls/request_key/request_key03.c b/testcases/kernel/syscalls/request_key/request_key03.c
index 3837993efa..bacfbe9888 100644
--- a/testcases/kernel/syscalls/request_key/request_key03.c
+++ b/testcases/kernel/syscalls/request_key/request_key03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Regression test for two related bugs:
*
* 1. CVE-2017-15299, fixed by commit 60ff5b2f547a ("KEYS: don't let add_key()
diff --git a/testcases/kernel/syscalls/request_key/request_key04.c b/testcases/kernel/syscalls/request_key/request_key04.c
index 4a454731aa..404233ad58 100644
--- a/testcases/kernel/syscalls/request_key/request_key04.c
+++ b/testcases/kernel/syscalls/request_key/request_key04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Regression test for commit 4dca6ea1d943 ("KEYS: add missing permission check
* for request_key() destination"), or CVE-2017-17807. This bug allowed adding
* a key to a keyring given only Search permission to that keyring, rather than
diff --git a/testcases/kernel/syscalls/request_key/request_key05.c b/testcases/kernel/syscalls/request_key/request_key05.c
index 35f326f505..8c20bab30a 100644
--- a/testcases/kernel/syscalls/request_key/request_key05.c
+++ b/testcases/kernel/syscalls/request_key/request_key05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2017-6951, original reproducer:
* http://www.spinics.net/lists/keyrings/msg01845.html
*
diff --git a/testcases/kernel/syscalls/request_key/request_key06.c b/testcases/kernel/syscalls/request_key/request_key06.c
index bd872867bf..34cc31fa05 100644
--- a/testcases/kernel/syscalls/request_key/request_key06.c
+++ b/testcases/kernel/syscalls/request_key/request_key06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that request_key(2) fails with
*
* - EFAULT when type points outside the process's accessible address space
diff --git a/testcases/kernel/syscalls/rmdir/rmdir02.c b/testcases/kernel/syscalls/rmdir/rmdir02.c
index b545e9cd2d..308f864447 100644
--- a/testcases/kernel/syscalls/rmdir/rmdir02.c
+++ b/testcases/kernel/syscalls/rmdir/rmdir02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that, rmdir(2) returns -1 and sets errno to
*
* 1. ENOTEMPTY when removing a non-empty directory
diff --git a/testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c b/testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c
index ab30c2abdc..ee12bbb879 100644
--- a/testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c
+++ b/testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, rt_sigqueueinfo(2) sets errno to
*
* - EINVAL if sig is invalid
diff --git a/testcases/kernel/syscalls/sbrk/sbrk01.c b/testcases/kernel/syscalls/sbrk/sbrk01.c
index 39e92094bd..b6a34d0fd6 100644
--- a/testcases/kernel/syscalls/sbrk/sbrk01.c
+++ b/testcases/kernel/syscalls/sbrk/sbrk01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that sbrk() successfully increments or decrements the program's
* data break.
*/
diff --git a/testcases/kernel/syscalls/sbrk/sbrk02.c b/testcases/kernel/syscalls/sbrk/sbrk02.c
index 08cbdf367c..7990196ed2 100644
--- a/testcases/kernel/syscalls/sbrk/sbrk02.c
+++ b/testcases/kernel/syscalls/sbrk/sbrk02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that sbrk() on failure sets errno to ENOMEM.
*/
diff --git a/testcases/kernel/syscalls/sbrk/sbrk03.c b/testcases/kernel/syscalls/sbrk/sbrk03.c
index 00536c757c..5c22a39984 100644
--- a/testcases/kernel/syscalls/sbrk/sbrk03.c
+++ b/testcases/kernel/syscalls/sbrk/sbrk03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Total s390 2^31 addr space is 0x80000000.
*
* 0x80000000 - 0x10000000 = 0x70000000
diff --git a/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max01.c b/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max01.c
index 9d0ebc2848..c0b2f5eada 100644
--- a/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max01.c
+++ b/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for the sched_get_priority_max(2) system call.
*
* Obtain different maximum priority for different schedulling policies and
diff --git a/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max02.c b/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max02.c
index bf1db294e0..d3a93a591e 100644
--- a/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max02.c
+++ b/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that given an invalid scheduling policy, sched_get_priority_max(2)
* returns -1 with errno EINVAL.
*/
diff --git a/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min01.c b/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min01.c
index 05cb9d1d5c..26e16a9408 100644
--- a/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min01.c
+++ b/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for the sched_get_priority_min(2) system call.
*
* Obtain different minimum priority for different schedulling policies and
diff --git a/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min02.c b/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min02.c
index 57e49ffd4a..077beb7f96 100644
--- a/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min02.c
+++ b/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that given an invalid scheduling policy, sched_get_priority_min(2)
* returns -1 with errno EINVAL.
*/
diff --git a/testcases/kernel/syscalls/sched_getattr/sched_getattr02.c b/testcases/kernel/syscalls/sched_getattr/sched_getattr02.c
index 4b99cdb66d..e2c0bf43be 100644
--- a/testcases/kernel/syscalls/sched_getattr/sched_getattr02.c
+++ b/testcases/kernel/syscalls/sched_getattr/sched_getattr02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, sched_getattr(2) returns -1 and sets errno to:
*
* 1. ESRCH if pid is unused.
diff --git a/testcases/kernel/syscalls/sched_getparam/sched_getparam01.c b/testcases/kernel/syscalls/sched_getparam/sched_getparam01.c
index a357264870..2c56286d67 100644
--- a/testcases/kernel/syscalls/sched_getparam/sched_getparam01.c
+++ b/testcases/kernel/syscalls/sched_getparam/sched_getparam01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* sched_getparam(2) gets correct scheduling parameters for
diff --git a/testcases/kernel/syscalls/sched_getparam/sched_getparam03.c b/testcases/kernel/syscalls/sched_getparam/sched_getparam03.c
index f1c635edf1..7192b0170d 100644
--- a/testcases/kernel/syscalls/sched_getparam/sched_getparam03.c
+++ b/testcases/kernel/syscalls/sched_getparam/sched_getparam03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* - sched_getparam(2) returns -1 and sets errno to ESRCH if the
diff --git a/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler01.c b/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler01.c
index 4191f09c0d..7edb594816 100644
--- a/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler01.c
+++ b/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check sched_getscheduler() returns correct return value.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler02.c b/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler02.c
index 98818ff480..fbd5d66e50 100644
--- a/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler02.c
+++ b/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Pass an unused pid to sched_getscheduler() and test for ESRCH.
*/
diff --git a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval01.c b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval01.c
index 40ff6e988d..b4d75bdcca 100644
--- a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval01.c
+++ b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval01.c
@@ -4,8 +4,6 @@
* AUTHOR : Saji Kumar.V.R <saji.kumar@wipro.com>
*/
/*\
- * [Description]
- *
* Gets round-robin time quantum by calling sched_rr_get_interval() and
* checks that the value is sane.
*
diff --git a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval02.c b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval02.c
index a61e2969b5..789e5ff10f 100644
--- a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval02.c
+++ b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval02.c
@@ -4,8 +4,6 @@
* AUTHOR : Saji Kumar.V.R <saji.kumar@wipro.com>
*/
/*\
- * [Description]
- *
* Verify that for a process with scheduling policy SCHED_FIFO,
* sched_rr_get_interval() writes zero into timespec structure
* for tv_sec & tv_nsec.
diff --git a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval03.c b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval03.c
index 731c500823..5e2f4ed7ea 100644
--- a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval03.c
+++ b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval03.c
@@ -4,8 +4,6 @@
* AUTHOR : Saji Kumar.V.R <saji.kumar@wipro.com>
*/
/*\
- * [Description]
- *
* Verify that:
*
* - sched_rr_get_interval() fails with errno set to EINVAL for an
diff --git a/testcases/kernel/syscalls/sched_setaffinity/sched_setaffinity01.c b/testcases/kernel/syscalls/sched_setaffinity/sched_setaffinity01.c
index acd9b77bef..22fef40203 100644
--- a/testcases/kernel/syscalls/sched_setaffinity/sched_setaffinity01.c
+++ b/testcases/kernel/syscalls/sched_setaffinity/sched_setaffinity01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Check various errnos for sched_setaffinity():
*
* 1. EFAULT, if the supplied memory address is invalid.
diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam01.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam01.c
index df789e93dc..6222b0f8ee 100644
--- a/testcases/kernel/syscalls/sched_setparam/sched_setparam01.c
+++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for sched_setparam(2)
*
* Call sched_setparam(2) with pid=0 so that it will
diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam02.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam02.c
index b71c51c6ae..d71e2c6d69 100644
--- a/testcases/kernel/syscalls/sched_setparam/sched_setparam02.c
+++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Checks functionality for sched_setparam(2)
*
* This test changes the scheduling priority for current process
diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam03.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam03.c
index ffa92a3bf9..a8effcadb9 100644
--- a/testcases/kernel/syscalls/sched_setparam/sched_setparam03.c
+++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Checks functionality for sched_setparam(2) for pid != 0
*
* This test forks a child and changes its parent's scheduling priority.
diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam04.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam04.c
index 26477e4556..aa47a8610d 100644
--- a/testcases/kernel/syscalls/sched_setparam/sched_setparam04.c
+++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* 1. sched_setparam(2) returns -1 and sets errno to ESRCH if the
diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam05.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam05.c
index 0a49ecc4d0..e5fc8b04d7 100644
--- a/testcases/kernel/syscalls/sched_setparam/sched_setparam05.c
+++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that sched_setparam() fails if the user does not have proper
* privileges.
*/
diff --git a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler01.c b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler01.c
index 4e48de8890..32a1a37acb 100644
--- a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler01.c
+++ b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase to test whether sched_setscheduler(2) sets the errnos
* correctly.
*
diff --git a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler02.c b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler02.c
index 66f7270bd7..425c0ce267 100644
--- a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler02.c
+++ b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase to test whether sched_setscheduler(2) sets the errnos
* correctly.
*
diff --git a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler04.c b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler04.c
index 828d1ec09e..abdd4c6dcb 100644
--- a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler04.c
+++ b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler04.c
@@ -4,8 +4,6 @@
*/
/*
- * [Description]
- *
* Testcases that test if sched_setscheduler with flag
* SCHED_RESET_ON_FORK restores children policy to
* SCHED_NORMAL.
diff --git a/testcases/kernel/syscalls/seccomp/seccomp01.c b/testcases/kernel/syscalls/seccomp/seccomp01.c
index 16abca78fa..88f2fbef89 100644
--- a/testcases/kernel/syscalls/seccomp/seccomp01.c
+++ b/testcases/kernel/syscalls/seccomp/seccomp01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test PR_GET_SECCOMP and PR_SET_SECCOMP with both prctl(2) and seccomp(2).
* The second one is called via __NR_seccomp using tst_syscall().
*
diff --git a/testcases/kernel/syscalls/select/select04.c b/testcases/kernel/syscalls/select/select04.c
index f7a463ee1b..4706901b59 100644
--- a/testcases/kernel/syscalls/select/select04.c
+++ b/testcases/kernel/syscalls/select/select04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test to check if fd set bits are cleared by select().
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/send/send02.c b/testcases/kernel/syscalls/send/send02.c
index 3a735d3be4..25d841bfae 100644
--- a/testcases/kernel/syscalls/send/send02.c
+++ b/testcases/kernel/syscalls/send/send02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Check that the kernel correctly handles send()/sendto()/sendmsg() calls
* with MSG_MORE flag.
*/
diff --git a/testcases/kernel/syscalls/sendfile/sendfile02.c b/testcases/kernel/syscalls/sendfile/sendfile02.c
index 8e88dec20f..c88b93b121 100644
--- a/testcases/kernel/syscalls/sendfile/sendfile02.c
+++ b/testcases/kernel/syscalls/sendfile/sendfile02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test the basic functionality of the sendfile() system call:
*
* 1. Call sendfile() with offset = 0.
diff --git a/testcases/kernel/syscalls/sendfile/sendfile03.c b/testcases/kernel/syscalls/sendfile/sendfile03.c
index 85a3b0f357..bd6e9a8f42 100644
--- a/testcases/kernel/syscalls/sendfile/sendfile03.c
+++ b/testcases/kernel/syscalls/sendfile/sendfile03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase to test that sendfile(2) system call returns EBADF when passing
* wrong out_fd or in_fd.
*
diff --git a/testcases/kernel/syscalls/sendfile/sendfile04.c b/testcases/kernel/syscalls/sendfile/sendfile04.c
index 4fa7481377..f74db177af 100644
--- a/testcases/kernel/syscalls/sendfile/sendfile04.c
+++ b/testcases/kernel/syscalls/sendfile/sendfile04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Testcase to test that sendfile(2) system call returns EFAULT when passing
* wrong offset pointer.
*
diff --git a/testcases/kernel/syscalls/sendfile/sendfile05.c b/testcases/kernel/syscalls/sendfile/sendfile05.c
index 691ed9730a..865d83c370 100644
--- a/testcases/kernel/syscalls/sendfile/sendfile05.c
+++ b/testcases/kernel/syscalls/sendfile/sendfile05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Testcase to test that sendfile(2) system call returns EINVAL when passing
* negative offset.
*
diff --git a/testcases/kernel/syscalls/sendfile/sendfile06.c b/testcases/kernel/syscalls/sendfile/sendfile06.c
index 2168da7279..9b2d8ff561 100644
--- a/testcases/kernel/syscalls/sendfile/sendfile06.c
+++ b/testcases/kernel/syscalls/sendfile/sendfile06.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test that sendfile() system call updates file position of in_fd correctly
* when passing NULL as offset.
*/
diff --git a/testcases/kernel/syscalls/sendfile/sendfile07.c b/testcases/kernel/syscalls/sendfile/sendfile07.c
index f9cbb7b85b..47d312a3b9 100644
--- a/testcases/kernel/syscalls/sendfile/sendfile07.c
+++ b/testcases/kernel/syscalls/sendfile/sendfile07.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Testcase to test that sendfile(2) system call returns EAGAIN
* when passing full out_fd opened with O_NONBLOCK.
*/
diff --git a/testcases/kernel/syscalls/sendfile/sendfile08.c b/testcases/kernel/syscalls/sendfile/sendfile08.c
index 66fd40cae8..1efff97c2c 100644
--- a/testcases/kernel/syscalls/sendfile/sendfile08.c
+++ b/testcases/kernel/syscalls/sendfile/sendfile08.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Bug in the splice code has caused the file position on the write side
* of the sendfile system call to be incorrectly set to the read side file
* position. This can result in the data being written to an incorrect offset.
diff --git a/testcases/kernel/syscalls/sendfile/sendfile09.c b/testcases/kernel/syscalls/sendfile/sendfile09.c
index eeef44519c..82feaeba03 100644
--- a/testcases/kernel/syscalls/sendfile/sendfile09.c
+++ b/testcases/kernel/syscalls/sendfile/sendfile09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Testcase copied from sendfile02.c to test the basic functionality of
* the sendfile() system call on large file. There is a kernel bug which
* introduced by commit 8f9c0119d7ba9 and fixed by commit 5d73320a96fcc.
diff --git a/testcases/kernel/syscalls/sendmsg/sendmsg03.c b/testcases/kernel/syscalls/sendmsg/sendmsg03.c
index 2edccb8d97..4a9943a3bc 100644
--- a/testcases/kernel/syscalls/sendmsg/sendmsg03.c
+++ b/testcases/kernel/syscalls/sendmsg/sendmsg03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* CVE-2017-17712
*
* Test for race condition vulnerability in sendmsg() on SOCK_RAW sockets.
diff --git a/testcases/kernel/syscalls/sendto/sendto02.c b/testcases/kernel/syscalls/sendto/sendto02.c
index a24a696dd6..0acbb97469 100644
--- a/testcases/kernel/syscalls/sendto/sendto02.c
+++ b/testcases/kernel/syscalls/sendto/sendto02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* When SCTP protocol created wih socket(2) and buffer is invalid,
* sendto(2) should fail and set errno to EFAULT, but it sets errno
* to ENOMEM.
diff --git a/testcases/kernel/syscalls/sendto/sendto03.c b/testcases/kernel/syscalls/sendto/sendto03.c
index 59caffb9aa..622de64747 100644
--- a/testcases/kernel/syscalls/sendto/sendto03.c
+++ b/testcases/kernel/syscalls/sendto/sendto03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* CVE-2020-14386
*
* Check for vulnerability in tpacket_rcv() which allows an unprivileged user
diff --git a/testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c b/testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c
index 9cc83e6422..65061bf3d8 100644
--- a/testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c
+++ b/testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c
@@ -3,8 +3,6 @@
* Copyright (C) 2021 SUSE LLC <rpalethorpe@suse.com>
*/
/*\
- *
- * [Description]
*
* This will reproduce an information leak in the set_mempolicy 32-bit
* compat syscall. The catch is that the 32-bit compat syscall is not
diff --git a/testcases/kernel/syscalls/set_tid_address/set_tid_address01.c b/testcases/kernel/syscalls/set_tid_address/set_tid_address01.c
index 0b68f70f32..1234e7f540 100644
--- a/testcases/kernel/syscalls/set_tid_address/set_tid_address01.c
+++ b/testcases/kernel/syscalls/set_tid_address/set_tid_address01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify the basic functionality of set_tid_address() syscall.
*/
diff --git a/testcases/kernel/syscalls/setegid/setegid01.c b/testcases/kernel/syscalls/setegid/setegid01.c
index eef66311ba..871b4172bf 100644
--- a/testcases/kernel/syscalls/setegid/setegid01.c
+++ b/testcases/kernel/syscalls/setegid/setegid01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that setegid() sets the effective UID of the calling process
* correctly, and does not modify the saved GID and real GID.
*/
diff --git a/testcases/kernel/syscalls/setegid/setegid02.c b/testcases/kernel/syscalls/setegid/setegid02.c
index 66a8a07fb3..825809fcf4 100644
--- a/testcases/kernel/syscalls/setegid/setegid02.c
+++ b/testcases/kernel/syscalls/setegid/setegid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setegid() fails with EPERM when the calling process is not
* privileged and egid does not match the current real group ID,
* current effective group ID, or current saved set-group-ID.
diff --git a/testcases/kernel/syscalls/setfsgid/setfsgid01.c b/testcases/kernel/syscalls/setfsgid/setfsgid01.c
index 5b594b2d47..4724b5be58 100644
--- a/testcases/kernel/syscalls/setfsgid/setfsgid01.c
+++ b/testcases/kernel/syscalls/setfsgid/setfsgid01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setfsgid() correctly updates the filesystem group ID
* to the value given in fsgid argument.
*/
diff --git a/testcases/kernel/syscalls/setfsgid/setfsgid02.c b/testcases/kernel/syscalls/setfsgid/setfsgid02.c
index 2a0b0c5593..c1930edbcf 100644
--- a/testcases/kernel/syscalls/setfsgid/setfsgid02.c
+++ b/testcases/kernel/syscalls/setfsgid/setfsgid02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Testcase for setfsgid() syscall to check that
*
* - privileged user can change a filesystem group ID different from saved
diff --git a/testcases/kernel/syscalls/setfsuid/setfsuid01.c b/testcases/kernel/syscalls/setfsuid/setfsuid01.c
index 9805e38b6c..b23300f4a3 100644
--- a/testcases/kernel/syscalls/setfsuid/setfsuid01.c
+++ b/testcases/kernel/syscalls/setfsuid/setfsuid01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setfsuid() correctly updates the filesystem user ID
* to the value given in fsuid argument.
*/
diff --git a/testcases/kernel/syscalls/setfsuid/setfsuid02.c b/testcases/kernel/syscalls/setfsuid/setfsuid02.c
index b81f307f7e..6f46a98215 100644
--- a/testcases/kernel/syscalls/setfsuid/setfsuid02.c
+++ b/testcases/kernel/syscalls/setfsuid/setfsuid02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that setfsuid() syscall fails if an invalid fsuid is given.
*/
diff --git a/testcases/kernel/syscalls/setfsuid/setfsuid03.c b/testcases/kernel/syscalls/setfsuid/setfsuid03.c
index ee06e9376a..b7f941bb17 100644
--- a/testcases/kernel/syscalls/setfsuid/setfsuid03.c
+++ b/testcases/kernel/syscalls/setfsuid/setfsuid03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setfsuid() correctly updates the filesystem uid
* when caller is a non-root user and provided fsuid matches
* caller's real user ID.
diff --git a/testcases/kernel/syscalls/setgid/setgid01.c b/testcases/kernel/syscalls/setgid/setgid01.c
index 4e225b13e1..65c1622867 100644
--- a/testcases/kernel/syscalls/setgid/setgid01.c
+++ b/testcases/kernel/syscalls/setgid/setgid01.c
@@ -6,8 +6,6 @@
* CO-PILOT : Dave Fenner
*/
/*\
- * [Description]
- *
* Calls setgid() with current gid and expects success.
*/
diff --git a/testcases/kernel/syscalls/setgid/setgid02.c b/testcases/kernel/syscalls/setgid/setgid02.c
index ff6791a1a3..93684ef8e8 100644
--- a/testcases/kernel/syscalls/setgid/setgid02.c
+++ b/testcases/kernel/syscalls/setgid/setgid02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test if setgid() system call sets errno to EPERM correctly.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/setgroups/setgroups01.c b/testcases/kernel/syscalls/setgroups/setgroups01.c
index 9a5b77e936..f8e7d301ad 100644
--- a/testcases/kernel/syscalls/setgroups/setgroups01.c
+++ b/testcases/kernel/syscalls/setgroups/setgroups01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the setgroups() system call.
*/
diff --git a/testcases/kernel/syscalls/setgroups/setgroups02.c b/testcases/kernel/syscalls/setgroups/setgroups02.c
index 2b7f95c870..e636442ea9 100644
--- a/testcases/kernel/syscalls/setgroups/setgroups02.c
+++ b/testcases/kernel/syscalls/setgroups/setgroups02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that root process can setgroups() supplementary group ID and verify
* that getgroups() returns the previously set ID.
*/
diff --git a/testcases/kernel/syscalls/setgroups/setgroups03.c b/testcases/kernel/syscalls/setgroups/setgroups03.c
index fbf8de0bb2..8d17f5ba42 100644
--- a/testcases/kernel/syscalls/setgroups/setgroups03.c
+++ b/testcases/kernel/syscalls/setgroups/setgroups03.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Test for EINVAL, EPERM, EFAULT errors.
*
* - setgroups() fails with EINVAL if the size argument value is > NGROUPS.
diff --git a/testcases/kernel/syscalls/setitimer/setitimer01.c b/testcases/kernel/syscalls/setitimer/setitimer01.c
index 94ee51c6a6..22b89e4712 100644
--- a/testcases/kernel/syscalls/setitimer/setitimer01.c
+++ b/testcases/kernel/syscalls/setitimer/setitimer01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Spawn a child, verify that setitimer() syscall passes and it ends up
* counting inside expected boundaries. Then verify from the parent that
* the syscall sent the correct signal to the child.
diff --git a/testcases/kernel/syscalls/setitimer/setitimer02.c b/testcases/kernel/syscalls/setitimer/setitimer02.c
index c545f6288b..7c38ad9f65 100644
--- a/testcases/kernel/syscalls/setitimer/setitimer02.c
+++ b/testcases/kernel/syscalls/setitimer/setitimer02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that setitimer() call fails:
*
* 1. EFAULT with invalid itimerval pointer
diff --git a/testcases/kernel/syscalls/setpgid/setpgid01.c b/testcases/kernel/syscalls/setpgid/setpgid01.c
index c976c3a513..59ec372aa5 100644
--- a/testcases/kernel/syscalls/setpgid/setpgid01.c
+++ b/testcases/kernel/syscalls/setpgid/setpgid01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify basic setpgid() functionality, re-setting group ID inside both parent
* and child. In the first case, we obtain getpgrp() and set it. In the second
* case, we use setpgid(0, 0).
diff --git a/testcases/kernel/syscalls/setpgid/setpgid02.c b/testcases/kernel/syscalls/setpgid/setpgid02.c
index b380d7df48..fac8836daa 100644
--- a/testcases/kernel/syscalls/setpgid/setpgid02.c
+++ b/testcases/kernel/syscalls/setpgid/setpgid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setpgid(2) syscall fails with:
*
* - EINVAL when given pgid is less than 0.
diff --git a/testcases/kernel/syscalls/setpgid/setpgid03.c b/testcases/kernel/syscalls/setpgid/setpgid03.c
index 9ce2603d8a..7f360f6320 100644
--- a/testcases/kernel/syscalls/setpgid/setpgid03.c
+++ b/testcases/kernel/syscalls/setpgid/setpgid03.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Tests setpgid(2) errors:
*
* - EPERM The process specified by pid must not be a session leader.
diff --git a/testcases/kernel/syscalls/setpgrp/setpgrp02.c b/testcases/kernel/syscalls/setpgrp/setpgrp02.c
index f58f494e73..732364e601 100644
--- a/testcases/kernel/syscalls/setpgrp/setpgrp02.c
+++ b/testcases/kernel/syscalls/setpgrp/setpgrp02.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Testcase to check the basic functionality of the setpgrp(2) syscall.
*/
diff --git a/testcases/kernel/syscalls/setregid/setregid01.c b/testcases/kernel/syscalls/setregid/setregid01.c
index 2750208d44..58f874953e 100644
--- a/testcases/kernel/syscalls/setregid/setregid01.c
+++ b/testcases/kernel/syscalls/setregid/setregid01.c
@@ -16,8 +16,6 @@
*/
/*\
- * [Description]
- *
* Verify the basic functionality of setregid(2) system call.
*/
diff --git a/testcases/kernel/syscalls/setresgid/setresgid01.c b/testcases/kernel/syscalls/setresgid/setresgid01.c
index 2301a6771e..facb918cc7 100644
--- a/testcases/kernel/syscalls/setresgid/setresgid01.c
+++ b/testcases/kernel/syscalls/setresgid/setresgid01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that setresgid() syscall correctly sets real user ID, effective user
* ID and the saved set-user ID in the calling process.
*/
diff --git a/testcases/kernel/syscalls/setresgid/setresgid02.c b/testcases/kernel/syscalls/setresgid/setresgid02.c
index 2893aa5422..cca4c46b6b 100644
--- a/testcases/kernel/syscalls/setresgid/setresgid02.c
+++ b/testcases/kernel/syscalls/setresgid/setresgid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setresgid() will successfully set the expected GID when called
* by root with the following combinations of arguments:
*
diff --git a/testcases/kernel/syscalls/setresgid/setresgid03.c b/testcases/kernel/syscalls/setresgid/setresgid03.c
index 4f6bc6aafe..8d827d17b1 100644
--- a/testcases/kernel/syscalls/setresgid/setresgid03.c
+++ b/testcases/kernel/syscalls/setresgid/setresgid03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setresgid() fails with EPERM if unprivileged user tries to set
* process group ID which requires higher permissions.
*/
diff --git a/testcases/kernel/syscalls/setresgid/setresgid04.c b/testcases/kernel/syscalls/setresgid/setresgid04.c
index 1eedb883ae..9ba013eb63 100644
--- a/testcases/kernel/syscalls/setresgid/setresgid04.c
+++ b/testcases/kernel/syscalls/setresgid/setresgid04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setresgid() syscall always sets the file system GID to the same
* value as the new effective GID.
*/
diff --git a/testcases/kernel/syscalls/setresuid/setresuid01.c b/testcases/kernel/syscalls/setresuid/setresuid01.c
index 196e03766d..b3cebcbd8c 100644
--- a/testcases/kernel/syscalls/setresuid/setresuid01.c
+++ b/testcases/kernel/syscalls/setresuid/setresuid01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test setresuid() when executed by root.
*/
diff --git a/testcases/kernel/syscalls/setresuid/setresuid02.c b/testcases/kernel/syscalls/setresuid/setresuid02.c
index 0931d2a24c..6bd7a22dbc 100644
--- a/testcases/kernel/syscalls/setresuid/setresuid02.c
+++ b/testcases/kernel/syscalls/setresuid/setresuid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test that a non-root user can change the real, effective and saved uid
* values through the setresuid system call.
*/
diff --git a/testcases/kernel/syscalls/setresuid/setresuid03.c b/testcases/kernel/syscalls/setresuid/setresuid03.c
index f1518c75c9..f2ff0b7a22 100644
--- a/testcases/kernel/syscalls/setresuid/setresuid03.c
+++ b/testcases/kernel/syscalls/setresuid/setresuid03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test that the setresuid system call sets the proper errno values when
* a non-root user attempts to change the real, effective or saved uid
* to a value other than one of the current uid, the current effective uid
diff --git a/testcases/kernel/syscalls/setresuid/setresuid04.c b/testcases/kernel/syscalls/setresuid/setresuid04.c
index 57b290f378..cf10bad4b3 100644
--- a/testcases/kernel/syscalls/setresuid/setresuid04.c
+++ b/testcases/kernel/syscalls/setresuid/setresuid04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that setresuid() behaves correctly with file permissions.
* The test creates a file as ROOT with permissions 0644, does a setresuid
* to change euid to a non-root user and tries to open the file with RDWR
diff --git a/testcases/kernel/syscalls/setresuid/setresuid05.c b/testcases/kernel/syscalls/setresuid/setresuid05.c
index 3a0eb47083..4193afdc4d 100644
--- a/testcases/kernel/syscalls/setresuid/setresuid05.c
+++ b/testcases/kernel/syscalls/setresuid/setresuid05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that after updating euid with setresuid(), any file creation
* also gets the new euid as its owner user ID.
*/
diff --git a/testcases/kernel/syscalls/setreuid/setreuid01.c b/testcases/kernel/syscalls/setreuid/setreuid01.c
index 5398246a61..9442e7c501 100644
--- a/testcases/kernel/syscalls/setreuid/setreuid01.c
+++ b/testcases/kernel/syscalls/setreuid/setreuid01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify the basic functionality of setreuid(2) system call when executed
* as non-root user.
*/
diff --git a/testcases/kernel/syscalls/setreuid/setreuid02.c b/testcases/kernel/syscalls/setreuid/setreuid02.c
index 2fa4cbc800..8f110ef727 100644
--- a/testcases/kernel/syscalls/setreuid/setreuid02.c
+++ b/testcases/kernel/syscalls/setreuid/setreuid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test setreuid() when executed by root.
*/
diff --git a/testcases/kernel/syscalls/setreuid/setreuid03.c b/testcases/kernel/syscalls/setreuid/setreuid03.c
index e83a3586a5..f21a141d63 100644
--- a/testcases/kernel/syscalls/setreuid/setreuid03.c
+++ b/testcases/kernel/syscalls/setreuid/setreuid03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test setreuid() when executed by an unpriviledged user.
*/
diff --git a/testcases/kernel/syscalls/setreuid/setreuid04.c b/testcases/kernel/syscalls/setreuid/setreuid04.c
index 06ffa32b0b..7407fa0176 100644
--- a/testcases/kernel/syscalls/setreuid/setreuid04.c
+++ b/testcases/kernel/syscalls/setreuid/setreuid04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that root user can change the real and effective uid to an
* unprivileged user.
*/
diff --git a/testcases/kernel/syscalls/setreuid/setreuid05.c b/testcases/kernel/syscalls/setreuid/setreuid05.c
index 4c1c94ee8b..9ab1f21de2 100644
--- a/testcases/kernel/syscalls/setreuid/setreuid05.c
+++ b/testcases/kernel/syscalls/setreuid/setreuid05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test the setreuid() feature, verifying the role of the saved-set-uid
* and setreuid's effect on it.
*/
diff --git a/testcases/kernel/syscalls/setreuid/setreuid06.c b/testcases/kernel/syscalls/setreuid/setreuid06.c
index 0a094fdc9b..5566357001 100644
--- a/testcases/kernel/syscalls/setreuid/setreuid06.c
+++ b/testcases/kernel/syscalls/setreuid/setreuid06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setreuid(2) syscall fails with EPERM errno when the calling
* process is not privileged and a change other than
* (i) swapping the effective user ID with the real user ID, or
diff --git a/testcases/kernel/syscalls/setreuid/setreuid07.c b/testcases/kernel/syscalls/setreuid/setreuid07.c
index 62b9ec4cdc..1bb2d8428d 100644
--- a/testcases/kernel/syscalls/setreuid/setreuid07.c
+++ b/testcases/kernel/syscalls/setreuid/setreuid07.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Check if setreuid behaves correctly with file permissions.
* The test creates a file as ROOT with permissions 0644, does a setreuid
* and then tries to open the file with RDWR permissions.
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt01.c b/testcases/kernel/syscalls/setsockopt/setsockopt01.c
index d8c70cbc5d..1ded0cda5a 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt01.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that setsockopt() fails and set errno:
*
* - EBADF on invalid file descriptor
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt02.c b/testcases/kernel/syscalls/setsockopt/setsockopt02.c
index 23e56ee7e0..15d86ae178 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt02.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2017-7308 on a raw socket's ring buffer
*
* Try to set tpacket_req3.tp_sizeof_priv to a value with the high bit set. So
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt03.c b/testcases/kernel/syscalls/setsockopt/setsockopt03.c
index 82d5aebf1d..90d5466115 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt03.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for CVE-2016-4997
*
* For a full explanation of how the vulnerability works see:
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt04.c b/testcases/kernel/syscalls/setsockopt/setsockopt04.c
index a4c0a371e0..7916314c75 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt04.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt04.c
@@ -4,8 +4,6 @@
* Author: Christian Amann <camann@suse.com>
*/
/*\
- * [Description]
- *
* CVE-2016-9793
*
* With kernels between version 3.11 and 4.8 missing commit b98b0bc8 it
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt05.c b/testcases/kernel/syscalls/setsockopt/setsockopt05.c
index 68a093694c..35a3d1bd3d 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt05.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* CVE-2017-1000112
*
* Check that UDP fragmentation offload doesn't cause memory corruption
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt06.c b/testcases/kernel/syscalls/setsockopt/setsockopt06.c
index 1c2421fe92..3f266123fb 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt06.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* CVE-2016-8655
*
* Check for race condition between packet_set_ring() and tp_version. On some
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt07.c b/testcases/kernel/syscalls/setsockopt/setsockopt07.c
index ed80d2c503..ea3dead0fb 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt07.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt07.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* CVE-2017-1000111
*
* Check for race condition between packet_set_ring() and tp_reserve.
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt08.c b/testcases/kernel/syscalls/setsockopt/setsockopt08.c
index a246cfdddf..1d50bd6cbb 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt08.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This will reproduce the bug on x86_64 in 32bit compatibility
* mode. It is most reliable with KASAN enabled. Otherwise it relies
* on the out-of-bounds write corrupting something which leads to a
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt09.c b/testcases/kernel/syscalls/setsockopt/setsockopt09.c
index 9ed80e46b1..a4b6b9315f 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt09.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt09.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check for possible double free of rx_owner_map after switching packet
* interface versions aka CVE-2021-22600.
*
diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt10.c b/testcases/kernel/syscalls/setsockopt/setsockopt10.c
index 4e7e449383..e52c6cd933 100644
--- a/testcases/kernel/syscalls/setsockopt/setsockopt10.c
+++ b/testcases/kernel/syscalls/setsockopt/setsockopt10.c
@@ -3,8 +3,6 @@
* Copyright (C) 2023 SUSE LLC Richard Palethorpe <rpalethorpe@suse.com>
*/
/*\
- * [Description]
- *
* Reproducer for CVE-2023-0461 which is an exploitable use-after-free
* in a TLS socket. In fact it is exploitable in any User Level
* Protocol (ULP) which does not clone its context when accepting a
diff --git a/testcases/kernel/syscalls/settimeofday/settimeofday01.c b/testcases/kernel/syscalls/settimeofday/settimeofday01.c
index e523b5b979..e403fe4030 100644
--- a/testcases/kernel/syscalls/settimeofday/settimeofday01.c
+++ b/testcases/kernel/syscalls/settimeofday/settimeofday01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of settimeofday().
*/
diff --git a/testcases/kernel/syscalls/settimeofday/settimeofday02.c b/testcases/kernel/syscalls/settimeofday/settimeofday02.c
index 06021b9536..4be44df720 100644
--- a/testcases/kernel/syscalls/settimeofday/settimeofday02.c
+++ b/testcases/kernel/syscalls/settimeofday/settimeofday02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that settimeofday() sets errnos correctly.
*/
diff --git a/testcases/kernel/syscalls/setuid/setuid01.c b/testcases/kernel/syscalls/setuid/setuid01.c
index c136444c73..d7b44d790e 100644
--- a/testcases/kernel/syscalls/setuid/setuid01.c
+++ b/testcases/kernel/syscalls/setuid/setuid01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that setuid(2) returns 0 and effective uid has
* been set successfully as a normal or super user.
*/
diff --git a/testcases/kernel/syscalls/setuid/setuid03.c b/testcases/kernel/syscalls/setuid/setuid03.c
index 06934f142d..1f96e04f99 100644
--- a/testcases/kernel/syscalls/setuid/setuid03.c
+++ b/testcases/kernel/syscalls/setuid/setuid03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test will switch to nobody user for correct error code collection.
* Verify setuid returns errno EPERM when it switches to root_user.
*/
diff --git a/testcases/kernel/syscalls/setxattr/setxattr01.c b/testcases/kernel/syscalls/setxattr/setxattr01.c
index de3ea67ec4..a405bf42ee 100644
--- a/testcases/kernel/syscalls/setxattr/setxattr01.c
+++ b/testcases/kernel/syscalls/setxattr/setxattr01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests for setxattr(2) and make sure setxattr(2) handles error
* conditions correctly.
*
diff --git a/testcases/kernel/syscalls/setxattr/setxattr02.c b/testcases/kernel/syscalls/setxattr/setxattr02.c
index 18afc031b4..9f5f998da9 100644
--- a/testcases/kernel/syscalls/setxattr/setxattr02.c
+++ b/testcases/kernel/syscalls/setxattr/setxattr02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* In the user.* namespace, only regular files and directories can
* have extended attributes. Otherwise setxattr(2) will return -1
* and set errno to EPERM.
diff --git a/testcases/kernel/syscalls/setxattr/setxattr03.c b/testcases/kernel/syscalls/setxattr/setxattr03.c
index 52cec07887..0b5b48a55e 100644
--- a/testcases/kernel/syscalls/setxattr/setxattr03.c
+++ b/testcases/kernel/syscalls/setxattr/setxattr03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* setxattr(2) to immutable and append-only files should get EPERM
*
* - Set attribute to a immutable file
diff --git a/testcases/kernel/syscalls/shutdown/shutdown01.c b/testcases/kernel/syscalls/shutdown/shutdown01.c
index 91e4378059..48b1a22566 100644
--- a/testcases/kernel/syscalls/shutdown/shutdown01.c
+++ b/testcases/kernel/syscalls/shutdown/shutdown01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies the following shutdown() functionalities:
*
* - SHUT_RD should enable send() ops but disable recv() ops
diff --git a/testcases/kernel/syscalls/shutdown/shutdown02.c b/testcases/kernel/syscalls/shutdown/shutdown02.c
index 33f7488147..2c488416d2 100644
--- a/testcases/kernel/syscalls/shutdown/shutdown02.c
+++ b/testcases/kernel/syscalls/shutdown/shutdown02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies the following shutdown() errors:
*
* - EBADF sockfd is not a valid file descriptor
diff --git a/testcases/kernel/syscalls/sigaltstack/sigaltstack02.c b/testcases/kernel/syscalls/sigaltstack/sigaltstack02.c
index 5a34851c01..e5412b2dac 100644
--- a/testcases/kernel/syscalls/sigaltstack/sigaltstack02.c
+++ b/testcases/kernel/syscalls/sigaltstack/sigaltstack02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that sigaltstack() fails with return value -1 and set expected errno:
*
* - EINVAL on invalid value.
diff --git a/testcases/kernel/syscalls/sighold/sighold02.c b/testcases/kernel/syscalls/sighold/sighold02.c
index 2807bf67e0..11515558d6 100644
--- a/testcases/kernel/syscalls/sighold/sighold02.c
+++ b/testcases/kernel/syscalls/sighold/sighold02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* This test checks following conditions:
*
* 1. sighold action to turn off the receipt of all signals was done without error.
diff --git a/testcases/kernel/syscalls/signal/signal01.c b/testcases/kernel/syscalls/signal/signal01.c
index 277661597a..20031af311 100644
--- a/testcases/kernel/syscalls/signal/signal01.c
+++ b/testcases/kernel/syscalls/signal/signal01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Test SIGKILL for these items:
* 1. SIGKILL can not be set to be ignored, errno:EINVAL (POSIX).
* 2. SIGKILL can not be reset to default, errno:EINVAL (POSIX).
diff --git a/testcases/kernel/syscalls/signal/signal02.c b/testcases/kernel/syscalls/signal/signal02.c
index 54948646ff..187e6301c2 100644
--- a/testcases/kernel/syscalls/signal/signal02.c
+++ b/testcases/kernel/syscalls/signal/signal02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test that we get an error using illegal signals.
*/
diff --git a/testcases/kernel/syscalls/signal/signal03.c b/testcases/kernel/syscalls/signal/signal03.c
index 8118af4b4f..339fbbbf13 100644
--- a/testcases/kernel/syscalls/signal/signal03.c
+++ b/testcases/kernel/syscalls/signal/signal03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Set signals to be ignored.
*/
diff --git a/testcases/kernel/syscalls/signal/signal04.c b/testcases/kernel/syscalls/signal/signal04.c
index 27826ad483..598666c3c5 100644
--- a/testcases/kernel/syscalls/signal/signal04.c
+++ b/testcases/kernel/syscalls/signal/signal04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Restore signals to default behavior.
*/
diff --git a/testcases/kernel/syscalls/signal/signal05.c b/testcases/kernel/syscalls/signal/signal05.c
index f3480f0ab0..b64f17b502 100644
--- a/testcases/kernel/syscalls/signal/signal05.c
+++ b/testcases/kernel/syscalls/signal/signal05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Set the signal handler to our own function.
*/
diff --git a/testcases/kernel/syscalls/signalfd/signalfd01.c b/testcases/kernel/syscalls/signalfd/signalfd01.c
index e54d4a6069..47f5eed758 100644
--- a/testcases/kernel/syscalls/signalfd/signalfd01.c
+++ b/testcases/kernel/syscalls/signalfd/signalfd01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that signalfd() works as expected.
*
* - signalfd() can create fd, and fd can receive signal.
diff --git a/testcases/kernel/syscalls/signalfd/signalfd02.c b/testcases/kernel/syscalls/signalfd/signalfd02.c
index fdd15781cd..332b5f5964 100644
--- a/testcases/kernel/syscalls/signalfd/signalfd02.c
+++ b/testcases/kernel/syscalls/signalfd/signalfd02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that signalfd(2) fails with:
*
* - EBADF when fd is invalid
diff --git a/testcases/kernel/syscalls/sigsuspend/sigsuspend01.c b/testcases/kernel/syscalls/sigsuspend/sigsuspend01.c
index 4d9edcbed2..66307f8011 100644
--- a/testcases/kernel/syscalls/sigsuspend/sigsuspend01.c
+++ b/testcases/kernel/syscalls/sigsuspend/sigsuspend01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify the basic sigsuspend(2) syscall functionality:
*
* - sigsuspend(2) can replace process's current signal mask by the specified
diff --git a/testcases/kernel/syscalls/sigsuspend/sigsuspend02.c b/testcases/kernel/syscalls/sigsuspend/sigsuspend02.c
index cfe95393f9..d809bacc86 100644
--- a/testcases/kernel/syscalls/sigsuspend/sigsuspend02.c
+++ b/testcases/kernel/syscalls/sigsuspend/sigsuspend02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that sigsuspend(2) fails with
*
* - EFAULT mask points to memory which is not a valid part of the
diff --git a/testcases/kernel/syscalls/socket/socket01.c b/testcases/kernel/syscalls/socket/socket01.c
index ca47315638..9563e19f92 100644
--- a/testcases/kernel/syscalls/socket/socket01.c
+++ b/testcases/kernel/syscalls/socket/socket01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test creating TCP, UDP, and Unix doman dgram sockets with socket() syscall.
*
* Also verify that socket() fails and set proper errno
diff --git a/testcases/kernel/syscalls/socket/socket02.c b/testcases/kernel/syscalls/socket/socket02.c
index 957a257019..30f7690899 100644
--- a/testcases/kernel/syscalls/socket/socket02.c
+++ b/testcases/kernel/syscalls/socket/socket02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test socket() with SOCK_CLOEXEC and SOCK_NONBLOCK flags.
*/
diff --git a/testcases/kernel/syscalls/socketcall/socketcall01.c b/testcases/kernel/syscalls/socketcall/socketcall01.c
index 85ffd9d1e6..55d1e165d0 100644
--- a/testcases/kernel/syscalls/socketcall/socketcall01.c
+++ b/testcases/kernel/syscalls/socketcall/socketcall01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic test for the socketcall(2) raw syscall.
*
* Test creating TCP, UDP, raw socket and unix domain dgram.
diff --git a/testcases/kernel/syscalls/socketpair/socketpair01.c b/testcases/kernel/syscalls/socketpair/socketpair01.c
index b1e140a55a..6463485310 100644
--- a/testcases/kernel/syscalls/socketpair/socketpair01.c
+++ b/testcases/kernel/syscalls/socketpair/socketpair01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that socketpair(2) fails and set proper errno
*
* - EAFNOSUPPORT on invalid domain
diff --git a/testcases/kernel/syscalls/socketpair/socketpair02.c b/testcases/kernel/syscalls/socketpair/socketpair02.c
index b43cf7295e..1a6f13317b 100644
--- a/testcases/kernel/syscalls/socketpair/socketpair02.c
+++ b/testcases/kernel/syscalls/socketpair/socketpair02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test socket() with SOCK_CLOEXEC and SOCK_NONBLOCK flags.
*/
diff --git a/testcases/kernel/syscalls/splice/splice02.c b/testcases/kernel/syscalls/splice/splice02.c
index 1da1186b2a..e9aba47cce 100644
--- a/testcases/kernel/syscalls/splice/splice02.c
+++ b/testcases/kernel/syscalls/splice/splice02.c
@@ -5,7 +5,6 @@
*/
/*\
- * [Description]
* Original reproducer for kernel fix
* bf40d3435caf NFS: add support for splice writes
* from v2.6.31-rc1.
diff --git a/testcases/kernel/syscalls/splice/splice03.c b/testcases/kernel/syscalls/splice/splice03.c
index 26beb562a7..32a683dc3a 100644
--- a/testcases/kernel/syscalls/splice/splice03.c
+++ b/testcases/kernel/syscalls/splice/splice03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, splice(2) returns -1 and sets errno to
*
* 1. EBADF if the file descriptor fd_in is not valid
diff --git a/testcases/kernel/syscalls/splice/splice06.c b/testcases/kernel/syscalls/splice/splice06.c
index 0cb5dec291..e64d32deda 100644
--- a/testcases/kernel/syscalls/splice/splice06.c
+++ b/testcases/kernel/syscalls/splice/splice06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test is cover splice() on proc files.
*
*/
diff --git a/testcases/kernel/syscalls/splice/splice07.c b/testcases/kernel/syscalls/splice/splice07.c
index d3b527a4ff..2228e2f269 100644
--- a/testcases/kernel/syscalls/splice/splice07.c
+++ b/testcases/kernel/syscalls/splice/splice07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Iterate over all kinds of file descriptors and feed splice() with all possible
* combinations where at least one file descriptor is invalid. We do expect the
* syscall to fail either with EINVAL or EBADF.
diff --git a/testcases/kernel/syscalls/splice/splice08.c b/testcases/kernel/syscalls/splice/splice08.c
index 6f22094681..3f9a070b7d 100644
--- a/testcases/kernel/syscalls/splice/splice08.c
+++ b/testcases/kernel/syscalls/splice/splice08.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for splicing from /dev/zero and /dev/full.
*
* The support for splicing from /dev/zero and /dev/full was removed in:
diff --git a/testcases/kernel/syscalls/splice/splice09.c b/testcases/kernel/syscalls/splice/splice09.c
index 9c63fb03cf..8863a01342 100644
--- a/testcases/kernel/syscalls/splice/splice09.c
+++ b/testcases/kernel/syscalls/splice/splice09.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test for splicing to /dev/zero and /dev/null these two devices discard all
* data written to them.
*
diff --git a/testcases/kernel/syscalls/stat/stat01.c b/testcases/kernel/syscalls/stat/stat01.c
index 365cdac8a6..86aaa253c5 100644
--- a/testcases/kernel/syscalls/stat/stat01.c
+++ b/testcases/kernel/syscalls/stat/stat01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that, stat(2) succeeds to get the status of a file and fills the
* stat structure elements regardless of whether process has or doesn't
* have read access to the file.
diff --git a/testcases/kernel/syscalls/stat/stat03.c b/testcases/kernel/syscalls/stat/stat03.c
index 369e6d79f1..6e08f507e3 100644
--- a/testcases/kernel/syscalls/stat/stat03.c
+++ b/testcases/kernel/syscalls/stat/stat03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* check stat() with various error conditions that should produce
* EACCES, EFAULT, ENAMETOOLONG, ENOENT, ENOTDIR, ELOOP
*/
diff --git a/testcases/kernel/syscalls/stat/stat04.c b/testcases/kernel/syscalls/stat/stat04.c
index 05ace606ad..09a9a68231 100644
--- a/testcases/kernel/syscalls/stat/stat04.c
+++ b/testcases/kernel/syscalls/stat/stat04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test checks that stat() executed on file provide the same information
* of symlink linking to it.
*/
diff --git a/testcases/kernel/syscalls/statfs/statfs01.c b/testcases/kernel/syscalls/statfs/statfs01.c
index 62e1d00edf..e88d5a3034 100644
--- a/testcases/kernel/syscalls/statfs/statfs01.c
+++ b/testcases/kernel/syscalls/statfs/statfs01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that statfs() syscall executes successfully on all
* available filesystems.
*/
diff --git a/testcases/kernel/syscalls/statfs/statfs02.c b/testcases/kernel/syscalls/statfs/statfs02.c
index ee9dba0cdc..c0444d7599 100644
--- a/testcases/kernel/syscalls/statfs/statfs02.c
+++ b/testcases/kernel/syscalls/statfs/statfs02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests for failures:
*
* - ENOTDIR A component of the pathname, which is not a directory.
diff --git a/testcases/kernel/syscalls/statfs/statfs03.c b/testcases/kernel/syscalls/statfs/statfs03.c
index 2afdbbf044..62b8044c09 100644
--- a/testcases/kernel/syscalls/statfs/statfs03.c
+++ b/testcases/kernel/syscalls/statfs/statfs03.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Verify that statfs(2) fails with errno EACCES when search permission
* is denied for a component of the path prefix of path.
*/
diff --git a/testcases/kernel/syscalls/statmount/statmount01.c b/testcases/kernel/syscalls/statmount/statmount01.c
index 73b9a59b01..fcf73e6ae4 100644
--- a/testcases/kernel/syscalls/statmount/statmount01.c
+++ b/testcases/kernel/syscalls/statmount/statmount01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that statmount() is working with no mask flags.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/statmount/statmount02.c b/testcases/kernel/syscalls/statmount/statmount02.c
index 4e23c69797..504c558a11 100644
--- a/testcases/kernel/syscalls/statmount/statmount02.c
+++ b/testcases/kernel/syscalls/statmount/statmount02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that statmount() is correctly reading basic filesystem
* info using STATMOUNT_SB_BASIC.
* The btrfs validation is currently skipped due to the lack of support for VFS.
diff --git a/testcases/kernel/syscalls/statmount/statmount03.c b/testcases/kernel/syscalls/statmount/statmount03.c
index dface528f6..36250c1c0d 100644
--- a/testcases/kernel/syscalls/statmount/statmount03.c
+++ b/testcases/kernel/syscalls/statmount/statmount03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that statmount() is correctly reading mount information
* (mount id, parent mount id, mount attributes etc.) using STATMOUNT_MNT_BASIC.
*
diff --git a/testcases/kernel/syscalls/statmount/statmount04.c b/testcases/kernel/syscalls/statmount/statmount04.c
index 509fdf6a17..7fd4fe8c5e 100644
--- a/testcases/kernel/syscalls/statmount/statmount04.c
+++ b/testcases/kernel/syscalls/statmount/statmount04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that statmount() is correctly reading propagation from
* what mount in current namespace using STATMOUNT_PROPAGATE_FROM.
*
diff --git a/testcases/kernel/syscalls/statmount/statmount05.c b/testcases/kernel/syscalls/statmount/statmount05.c
index 95e674c069..a517f82123 100644
--- a/testcases/kernel/syscalls/statmount/statmount05.c
+++ b/testcases/kernel/syscalls/statmount/statmount05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies STATMOUNT_MNT_ROOT and STATMOUNT_MNT_POINT functionalities
* of statmount(). In particular, STATMOUNT_MNT_ROOT will give the mount root
* (i.e. mount --bind /mnt /bla -> /mnt) and STATMOUNT_MNT_POINT will
diff --git a/testcases/kernel/syscalls/statmount/statmount06.c b/testcases/kernel/syscalls/statmount/statmount06.c
index 73740407ea..fe41d5b87e 100644
--- a/testcases/kernel/syscalls/statmount/statmount06.c
+++ b/testcases/kernel/syscalls/statmount/statmount06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that statmount() is correctly reading name of the
* filesystem type using STATMOUNT_FS_TYPE.
*
diff --git a/testcases/kernel/syscalls/statmount/statmount07.c b/testcases/kernel/syscalls/statmount/statmount07.c
index fc4f204795..2053dcc6e4 100644
--- a/testcases/kernel/syscalls/statmount/statmount07.c
+++ b/testcases/kernel/syscalls/statmount/statmount07.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that statmount() is raising the correct errors according
* with invalid input values.
*/
diff --git a/testcases/kernel/syscalls/statmount/statmount08.c b/testcases/kernel/syscalls/statmount/statmount08.c
index 21b8b73420..b77116f058 100644
--- a/testcases/kernel/syscalls/statmount/statmount08.c
+++ b/testcases/kernel/syscalls/statmount/statmount08.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Verify that statmount() raises EPERM when mount point is not accessible.
*/
diff --git a/testcases/kernel/syscalls/statvfs/statvfs01.c b/testcases/kernel/syscalls/statvfs/statvfs01.c
index 1aafe5e4b2..4e901a0a20 100644
--- a/testcases/kernel/syscalls/statvfs/statvfs01.c
+++ b/testcases/kernel/syscalls/statvfs/statvfs01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that statvfs() executes successfully for all
* available filesystems. Verify statvfs.f_namemax field
* by trying to create files of valid and invalid length names.
diff --git a/testcases/kernel/syscalls/statvfs/statvfs02.c b/testcases/kernel/syscalls/statvfs/statvfs02.c
index 506a35fea7..5ed30d31d9 100644
--- a/testcases/kernel/syscalls/statvfs/statvfs02.c
+++ b/testcases/kernel/syscalls/statvfs/statvfs02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that statvfs() fails with:
*
* - EFAULT when path points to an invalid address.
diff --git a/testcases/kernel/syscalls/statx/statx01.c b/testcases/kernel/syscalls/statx/statx01.c
index f9c2748d23..dc63659cbd 100644
--- a/testcases/kernel/syscalls/statx/statx01.c
+++ b/testcases/kernel/syscalls/statx/statx01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This code tests the functionality of statx system call.
*
* The metadata for normal file are tested against expected values:
diff --git a/testcases/kernel/syscalls/statx/statx02.c b/testcases/kernel/syscalls/statx/statx02.c
index 5ed80894d5..c8cb8987a5 100644
--- a/testcases/kernel/syscalls/statx/statx02.c
+++ b/testcases/kernel/syscalls/statx/statx02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This code tests the following flags with statx syscall:
*
* - AT_EMPTY_PATH
diff --git a/testcases/kernel/syscalls/statx/statx03.c b/testcases/kernel/syscalls/statx/statx03.c
index 2465d87730..4877a3e49f 100644
--- a/testcases/kernel/syscalls/statx/statx03.c
+++ b/testcases/kernel/syscalls/statx/statx03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test basic error handling of statx syscall:
*
* - EBADF - Bad file descriptor
diff --git a/testcases/kernel/syscalls/statx/statx04.c b/testcases/kernel/syscalls/statx/statx04.c
index c2ed52deb2..af30a200ef 100644
--- a/testcases/kernel/syscalls/statx/statx04.c
+++ b/testcases/kernel/syscalls/statx/statx04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test whether the kernel properly advertises support for statx() attributes:
*
* - STATX_ATTR_COMPRESSED: The file is compressed by the filesystem.
diff --git a/testcases/kernel/syscalls/statx/statx05.c b/testcases/kernel/syscalls/statx/statx05.c
index 2411f3f9fe..2a46032260 100644
--- a/testcases/kernel/syscalls/statx/statx05.c
+++ b/testcases/kernel/syscalls/statx/statx05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test statx syscall with STATX_ATTR_ENCRYPTED flag, setting a key is required
* for the file to be encrypted by the filesystem.
*
diff --git a/testcases/kernel/syscalls/statx/statx06.c b/testcases/kernel/syscalls/statx/statx06.c
index d3dd9b9cf7..9795740c45 100644
--- a/testcases/kernel/syscalls/statx/statx06.c
+++ b/testcases/kernel/syscalls/statx/statx06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test the following file timestamps of statx syscall:
*
* - btime - The time before and after the execution of the create system call is noted.
diff --git a/testcases/kernel/syscalls/statx/statx07.c b/testcases/kernel/syscalls/statx/statx07.c
index 9681743307..770a55ea2a 100644
--- a/testcases/kernel/syscalls/statx/statx07.c
+++ b/testcases/kernel/syscalls/statx/statx07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This code tests the following flags:
*
* - AT_STATX_FORCE_SYNC
diff --git a/testcases/kernel/syscalls/statx/statx08.c b/testcases/kernel/syscalls/statx/statx08.c
index 64b36986d2..caced5d3d7 100644
--- a/testcases/kernel/syscalls/statx/statx08.c
+++ b/testcases/kernel/syscalls/statx/statx08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This case tests whether the attributes field of statx received expected value
* by using flags in the stx_attributes_mask field of statx.
* File set with following flags by using SAFE_IOCTL:
diff --git a/testcases/kernel/syscalls/statx/statx09.c b/testcases/kernel/syscalls/statx/statx09.c
index 864e35c7d1..ee4be42507 100644
--- a/testcases/kernel/syscalls/statx/statx09.c
+++ b/testcases/kernel/syscalls/statx/statx09.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This code tests if STATX_ATTR_VERITY flag in the statx attributes is set correctly.
*
* The statx() system call sets STATX_ATTR_VERITY if the file has fs-verity
diff --git a/testcases/kernel/syscalls/statx/statx10.c b/testcases/kernel/syscalls/statx/statx10.c
index 42106285e5..079fb67a67 100644
--- a/testcases/kernel/syscalls/statx/statx10.c
+++ b/testcases/kernel/syscalls/statx/statx10.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It is a basic test for STATX_DIOALIGN mask on ext4 and xfs filesystem.
*
* - STATX_DIOALIGN Want stx_dio_mem_align and stx_dio_offset_align value
diff --git a/testcases/kernel/syscalls/statx/statx11.c b/testcases/kernel/syscalls/statx/statx11.c
index 653050855f..5465c265bb 100644
--- a/testcases/kernel/syscalls/statx/statx11.c
+++ b/testcases/kernel/syscalls/statx/statx11.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It is a basic test for STATX_DIOALIGN mask on block device.
*
* - STATX_DIOALIGN Want stx_dio_mem_align and stx_dio_offset_align value
diff --git a/testcases/kernel/syscalls/statx/statx12.c b/testcases/kernel/syscalls/statx/statx12.c
index 432f1cb771..8b5393aab9 100644
--- a/testcases/kernel/syscalls/statx/statx12.c
+++ b/testcases/kernel/syscalls/statx/statx12.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* It is a basic test for STATX_ATTR_MOUNT_ROOT flag.
*
* This flag indicates whether the path or fd refers to the root of a mount
diff --git a/testcases/kernel/syscalls/swapoff/swapoff01.c b/testcases/kernel/syscalls/swapoff/swapoff01.c
index e97ff2c626..bf097ac1aa 100644
--- a/testcases/kernel/syscalls/swapoff/swapoff01.c
+++ b/testcases/kernel/syscalls/swapoff/swapoff01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Check that swapoff() succeeds.
*/
diff --git a/testcases/kernel/syscalls/swapoff/swapoff02.c b/testcases/kernel/syscalls/swapoff/swapoff02.c
index 0ab8338c51..b6c4289891 100644
--- a/testcases/kernel/syscalls/swapoff/swapoff02.c
+++ b/testcases/kernel/syscalls/swapoff/swapoff02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test case checks whether swapoff(2) system call returns
* 1. EINVAL when the path does not exist
* 2. ENOENT when the path exists but is invalid
diff --git a/testcases/kernel/syscalls/swapon/swapon01.c b/testcases/kernel/syscalls/swapon/swapon01.c
index 7d1ec70702..a214bc9dbf 100644
--- a/testcases/kernel/syscalls/swapon/swapon01.c
+++ b/testcases/kernel/syscalls/swapon/swapon01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Checks that swapon() succeds with swapfile.
* Testing on all filesystems which support swap file.
*/
diff --git a/testcases/kernel/syscalls/swapon/swapon02.c b/testcases/kernel/syscalls/swapon/swapon02.c
index 73cc3bb44f..625d463f72 100644
--- a/testcases/kernel/syscalls/swapon/swapon02.c
+++ b/testcases/kernel/syscalls/swapon/swapon02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test case checks whether swapon(2) system call returns:
*
* - ENOENT when the path does not exist
diff --git a/testcases/kernel/syscalls/swapon/swapon03.c b/testcases/kernel/syscalls/swapon/swapon03.c
index 436f864eba..0068560fea 100644
--- a/testcases/kernel/syscalls/swapon/swapon03.c
+++ b/testcases/kernel/syscalls/swapon/swapon03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test case checks whether swapon(2) system call returns:
*
* - EPERM when there are more than MAX_SWAPFILES already in use.
diff --git a/testcases/kernel/syscalls/symlink/symlink02.c b/testcases/kernel/syscalls/symlink/symlink02.c
index d2226501e0..e5cf1c8ac6 100644
--- a/testcases/kernel/syscalls/symlink/symlink02.c
+++ b/testcases/kernel/syscalls/symlink/symlink02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the symlink() system call.
*/
diff --git a/testcases/kernel/syscalls/symlink/symlink04.c b/testcases/kernel/syscalls/symlink/symlink04.c
index c43a03a264..b8aca24126 100644
--- a/testcases/kernel/syscalls/symlink/symlink04.c
+++ b/testcases/kernel/syscalls/symlink/symlink04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that a symbolic link may point to an existing file or
* to a nonexistent one.
*/
diff --git a/testcases/kernel/syscalls/sync_file_range/sync_file_range01.c b/testcases/kernel/syscalls/sync_file_range/sync_file_range01.c
index 47188aa487..ead4314a66 100644
--- a/testcases/kernel/syscalls/sync_file_range/sync_file_range01.c
+++ b/testcases/kernel/syscalls/sync_file_range/sync_file_range01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic error conditions test for sync_file_range() system call, tests for:
*
* - EBADFD Wrong filedescriptor
diff --git a/testcases/kernel/syscalls/sync_file_range/sync_file_range02.c b/testcases/kernel/syscalls/sync_file_range/sync_file_range02.c
index 28a8156c8f..761a396feb 100644
--- a/testcases/kernel/syscalls/sync_file_range/sync_file_range02.c
+++ b/testcases/kernel/syscalls/sync_file_range/sync_file_range02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tests if sync_file_range() does sync a test file range with a many dirty pages
* to a block device. Also, it tests all supported filesystems on a test block
* device.
diff --git a/testcases/kernel/syscalls/syscall/syscall01.c b/testcases/kernel/syscalls/syscall/syscall01.c
index 356eb8f0d4..deb8a4e5dc 100644
--- a/testcases/kernel/syscalls/syscall/syscall01.c
+++ b/testcases/kernel/syscalls/syscall/syscall01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Basic test for syscall().
*
* Compare raw get{g,p,u}id results with their glibc wrappers.
diff --git a/testcases/kernel/syscalls/sysfs/sysfs01.c b/testcases/kernel/syscalls/sysfs/sysfs01.c
index 3a91fcb0b4..a83053df88 100644
--- a/testcases/kernel/syscalls/sysfs/sysfs01.c
+++ b/testcases/kernel/syscalls/sysfs/sysfs01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test is run for option 1 for sysfs(2).
* Translate the filesystem identifier string fsname into a filesystem type index.
*/
diff --git a/testcases/kernel/syscalls/sysfs/sysfs02.c b/testcases/kernel/syscalls/sysfs/sysfs02.c
index b6d8103649..4bca516163 100644
--- a/testcases/kernel/syscalls/sysfs/sysfs02.c
+++ b/testcases/kernel/syscalls/sysfs/sysfs02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test is run for option 2 for sysfs(2).
* Translate the filesystem type index fs_index into a null-terminated filesystem
* identifier string. This string will be written to the buffer pointed to by buf.
diff --git a/testcases/kernel/syscalls/sysfs/sysfs03.c b/testcases/kernel/syscalls/sysfs/sysfs03.c
index b679d78097..aae962f8eb 100644
--- a/testcases/kernel/syscalls/sysfs/sysfs03.c
+++ b/testcases/kernel/syscalls/sysfs/sysfs03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test is run for option 3 for sysfs(2).
* Return the total number of filesystem types currently present in the kernel.
*/
diff --git a/testcases/kernel/syscalls/sysfs/sysfs04.c b/testcases/kernel/syscalls/sysfs/sysfs04.c
index ffda51bf38..ef504b9320 100644
--- a/testcases/kernel/syscalls/sysfs/sysfs04.c
+++ b/testcases/kernel/syscalls/sysfs/sysfs04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test case checks whether sysfs(2) system call returns
* appropriate error number for invalid option.
*/
diff --git a/testcases/kernel/syscalls/sysfs/sysfs05.c b/testcases/kernel/syscalls/sysfs/sysfs05.c
index bfcead7dbe..922c4630d3 100644
--- a/testcases/kernel/syscalls/sysfs/sysfs05.c
+++ b/testcases/kernel/syscalls/sysfs/sysfs05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* This test case checks whether sysfs(2) system call returns appropriate
* error number for invalid option and for invalid filesystem name and fs index out of bounds.
*/
diff --git a/testcases/kernel/syscalls/syslog/syslog11.c b/testcases/kernel/syscalls/syslog/syslog11.c
index 733da5f963..28a6fdf494 100644
--- a/testcases/kernel/syscalls/syslog/syslog11.c
+++ b/testcases/kernel/syscalls/syslog/syslog11.c
@@ -5,8 +5,6 @@
*/
/*
- * [Description]
- *
* Verify that, syslog(2) is successful for type ranging from 1 to 8
*/
diff --git a/testcases/kernel/syscalls/syslog/syslog12.c b/testcases/kernel/syscalls/syslog/syslog12.c
index e8b39a1150..9d519b548d 100644
--- a/testcases/kernel/syscalls/syslog/syslog12.c
+++ b/testcases/kernel/syscalls/syslog/syslog12.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that syslog(2) system call fails with appropriate error number:
*
* 1. EINVAL -- invalid type/command
diff --git a/testcases/kernel/syscalls/tee/tee02.c b/testcases/kernel/syscalls/tee/tee02.c
index 945261223b..0ee94000d3 100644
--- a/testcases/kernel/syscalls/tee/tee02.c
+++ b/testcases/kernel/syscalls/tee/tee02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, tee(2) returns -1 and sets errno to:
*
* 1. EINVAL if fd_in does not refer to a pipe.
diff --git a/testcases/kernel/syscalls/time/time01.c b/testcases/kernel/syscalls/time/time01.c
index d8625c04d0..7085f19896 100644
--- a/testcases/kernel/syscalls/time/time01.c
+++ b/testcases/kernel/syscalls/time/time01.c
@@ -4,7 +4,6 @@
*/
/*\
- * [Description]
* - Basic test for the time(2) system call. It is intended to provide a
* limited exposure of the system call.
* - Verify that time(2) returns the value of time in seconds since the Epoch
diff --git a/testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c b/testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c
index 57c2147bf4..a015cbe4c4 100644
--- a/testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c
+++ b/testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c
@@ -10,8 +10,6 @@
*/
/*\
- * [Description]
- *
* This test checks base timer_getoverrun() functionality.
*/
diff --git a/testcases/kernel/syscalls/timerfd/timerfd02.c b/testcases/kernel/syscalls/timerfd/timerfd02.c
index 3dabfb5c06..f89d41502e 100644
--- a/testcases/kernel/syscalls/timerfd/timerfd02.c
+++ b/testcases/kernel/syscalls/timerfd/timerfd02.c
@@ -5,8 +5,6 @@
* Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
*/
/*\
- * [Description]
- *
* This test verifies that:
* - TFD_CLOEXEC sets the close-on-exec file status flag on the new open file
* - TFD_NONBLOCK sets the O_NONBLOCK file status flag on the new open file
diff --git a/testcases/kernel/syscalls/timerfd/timerfd_create01.c b/testcases/kernel/syscalls/timerfd/timerfd_create01.c
index 18a2335867..2a658f0674 100644
--- a/testcases/kernel/syscalls/timerfd/timerfd_create01.c
+++ b/testcases/kernel/syscalls/timerfd/timerfd_create01.c
@@ -5,8 +5,6 @@
* Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
*/
/*\
- * [Description]
- *
* This test verifies that:
* - clockid argument is neither CLOCK_MONOTONIC nor CLOCK_REALTIME,
* EINVAL would return.
diff --git a/testcases/kernel/syscalls/times/times01.c b/testcases/kernel/syscalls/times/times01.c
index 408b91c9c8..4c809aa625 100644
--- a/testcases/kernel/syscalls/times/times01.c
+++ b/testcases/kernel/syscalls/times/times01.c
@@ -3,8 +3,6 @@
* Copyright (c) 2000 Silicon Graphics, Inc. All Rights Reserved.
*/
/*\
- * [Description]
- *
* This is a Phase I test for the times(2) system call. It is intended to
* provide a limited exposure of the system call.
*/
diff --git a/testcases/kernel/syscalls/tkill/tkill01.c b/testcases/kernel/syscalls/tkill/tkill01.c
index 15f2dfb3e9..d97ed0b941 100644
--- a/testcases/kernel/syscalls/tkill/tkill01.c
+++ b/testcases/kernel/syscalls/tkill/tkill01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic tests for the tkill syscall.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/tkill/tkill02.c b/testcases/kernel/syscalls/tkill/tkill02.c
index 6cd60923bd..30823f61b2 100644
--- a/testcases/kernel/syscalls/tkill/tkill02.c
+++ b/testcases/kernel/syscalls/tkill/tkill02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic tests for the tkill() errors.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/truncate/truncate02.c b/testcases/kernel/syscalls/truncate/truncate02.c
index 8d7f9a6fab..2ed6f18e6c 100644
--- a/testcases/kernel/syscalls/truncate/truncate02.c
+++ b/testcases/kernel/syscalls/truncate/truncate02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* - truncate(2) truncates a file to a specified length successfully.
diff --git a/testcases/kernel/syscalls/truncate/truncate03.c b/testcases/kernel/syscalls/truncate/truncate03.c
index 2607e7d63e..a017ee4b62 100644
--- a/testcases/kernel/syscalls/truncate/truncate03.c
+++ b/testcases/kernel/syscalls/truncate/truncate03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that:
*
* - truncate(2) returns -1 and sets errno to EACCES if search/write
diff --git a/testcases/kernel/syscalls/umount/umount01.c b/testcases/kernel/syscalls/umount/umount01.c
index 264c8f7d7e..a8f34e7a15 100644
--- a/testcases/kernel/syscalls/umount/umount01.c
+++ b/testcases/kernel/syscalls/umount/umount01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the umount(2) system call.
*/
diff --git a/testcases/kernel/syscalls/umount/umount02.c b/testcases/kernel/syscalls/umount/umount02.c
index acc35e8a4f..e7fe246eb9 100644
--- a/testcases/kernel/syscalls/umount/umount02.c
+++ b/testcases/kernel/syscalls/umount/umount02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Check for basic errors returned by umount(2) system call.
*
* Verify that umount(2) returns -1 and sets errno to
diff --git a/testcases/kernel/syscalls/umount/umount03.c b/testcases/kernel/syscalls/umount/umount03.c
index 3260312f7f..c181e63d92 100644
--- a/testcases/kernel/syscalls/umount/umount03.c
+++ b/testcases/kernel/syscalls/umount/umount03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that umount(2) returns -1 and sets errno to EPERM if the user
* is not the super-user.
*/
diff --git a/testcases/kernel/syscalls/umount2/umount2_02.c b/testcases/kernel/syscalls/umount2/umount2_02.c
index f4b228f975..ff0bdf911a 100644
--- a/testcases/kernel/syscalls/umount2/umount2_02.c
+++ b/testcases/kernel/syscalls/umount2/umount2_02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test for feature MNT_EXPIRE of umount2():
*
* - EINVAL when flag is specified with either MNT_FORCE or MNT_DETACH
diff --git a/testcases/kernel/syscalls/unlink/unlink05.c b/testcases/kernel/syscalls/unlink/unlink05.c
index 81afeebf52..b270269601 100644
--- a/testcases/kernel/syscalls/unlink/unlink05.c
+++ b/testcases/kernel/syscalls/unlink/unlink05.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check the basic functionality of the unlink(2):
*
* - unlink(2) can delete regular file successfully.
diff --git a/testcases/kernel/syscalls/unlink/unlink07.c b/testcases/kernel/syscalls/unlink/unlink07.c
index b7bbd8d19b..ea99392d28 100644
--- a/testcases/kernel/syscalls/unlink/unlink07.c
+++ b/testcases/kernel/syscalls/unlink/unlink07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that unlink(2) fails with
*
* - ENOENT when file does not exist
diff --git a/testcases/kernel/syscalls/unlink/unlink08.c b/testcases/kernel/syscalls/unlink/unlink08.c
index 1fe6e89f71..6d3ab261f8 100644
--- a/testcases/kernel/syscalls/unlink/unlink08.c
+++ b/testcases/kernel/syscalls/unlink/unlink08.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that unlink(2) fails with
*
* - EACCES when no write access to the directory containing pathname
diff --git a/testcases/kernel/syscalls/unlink/unlink09.c b/testcases/kernel/syscalls/unlink/unlink09.c
index 55bc4ab27c..e2ee062cb9 100644
--- a/testcases/kernel/syscalls/unlink/unlink09.c
+++ b/testcases/kernel/syscalls/unlink/unlink09.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that unlink(2) fails with EPERM when target file is marked as
* immutable or append-only.
*/
diff --git a/testcases/kernel/syscalls/unlink/unlink10.c b/testcases/kernel/syscalls/unlink/unlink10.c
index 861f24a50e..453dd5c754 100644
--- a/testcases/kernel/syscalls/unlink/unlink10.c
+++ b/testcases/kernel/syscalls/unlink/unlink10.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that unlink(2) fails with EROFS when target file is on a read-only
* filesystem.
*/
diff --git a/testcases/kernel/syscalls/unlinkat/unlinkat01.c b/testcases/kernel/syscalls/unlinkat/unlinkat01.c
index 7dba1d6414..9374466f5f 100644
--- a/testcases/kernel/syscalls/unlinkat/unlinkat01.c
+++ b/testcases/kernel/syscalls/unlinkat/unlinkat01.c
@@ -7,7 +7,6 @@
*/
/*\
- * [Description]
* Basic unlinkat() test.
*/
diff --git a/testcases/kernel/syscalls/unshare/unshare01.c b/testcases/kernel/syscalls/unshare/unshare01.c
index ad26a908d9..6e6315b114 100644
--- a/testcases/kernel/syscalls/unshare/unshare01.c
+++ b/testcases/kernel/syscalls/unshare/unshare01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic tests for the unshare() syscall.
*
* [Algorithm]
diff --git a/testcases/kernel/syscalls/unshare/unshare02.c b/testcases/kernel/syscalls/unshare/unshare02.c
index 3783e8e9ad..436b0c3b50 100644
--- a/testcases/kernel/syscalls/unshare/unshare02.c
+++ b/testcases/kernel/syscalls/unshare/unshare02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Basic tests for the unshare(2) errors.
*
* - EINVAL on invalid flags
diff --git a/testcases/kernel/syscalls/utime/utime01.c b/testcases/kernel/syscalls/utime/utime01.c
index 0cc9822e71..2a74f8952d 100644
--- a/testcases/kernel/syscalls/utime/utime01.c
+++ b/testcases/kernel/syscalls/utime/utime01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that the system call utime() successfully changes the last
* access and modification times of a file to the current time if the
* times argument is NULL and the user ID of the process is "root".
diff --git a/testcases/kernel/syscalls/utime/utime02.c b/testcases/kernel/syscalls/utime/utime02.c
index fdcd40f660..52185d839e 100644
--- a/testcases/kernel/syscalls/utime/utime02.c
+++ b/testcases/kernel/syscalls/utime/utime02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that the system call utime() successfully changes the last
* access and modification times of a file to the current time,
* under the following constraints:
diff --git a/testcases/kernel/syscalls/utime/utime03.c b/testcases/kernel/syscalls/utime/utime03.c
index 734f4897b7..564e1de3dd 100644
--- a/testcases/kernel/syscalls/utime/utime03.c
+++ b/testcases/kernel/syscalls/utime/utime03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that the system call utime() successfully sets the modification
* and access times of a file to the current time, under the following
* constraints:
diff --git a/testcases/kernel/syscalls/utime/utime04.c b/testcases/kernel/syscalls/utime/utime04.c
index 7b820ab061..0728454bbb 100644
--- a/testcases/kernel/syscalls/utime/utime04.c
+++ b/testcases/kernel/syscalls/utime/utime04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that the system call utime() successfully changes the last
* access and modification times of a file to the values specified by
* times argument, under the following constraints:
diff --git a/testcases/kernel/syscalls/utime/utime05.c b/testcases/kernel/syscalls/utime/utime05.c
index 941a3ccee8..045e275b9b 100644
--- a/testcases/kernel/syscalls/utime/utime05.c
+++ b/testcases/kernel/syscalls/utime/utime05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that the system call utime() successfully changes the last
* access and modification times of a file to the values specified by
* times argument, under the following constraints:
diff --git a/testcases/kernel/syscalls/utime/utime06.c b/testcases/kernel/syscalls/utime/utime06.c
index 3ba62a3162..c03b1d8527 100644
--- a/testcases/kernel/syscalls/utime/utime06.c
+++ b/testcases/kernel/syscalls/utime/utime06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Verify that system call utime() fails with
*
* - EACCES when times argument is NULL and user does not have rights to modify
diff --git a/testcases/kernel/syscalls/utime/utime07.c b/testcases/kernel/syscalls/utime/utime07.c
index 8889b3a6d1..e44b246dcd 100644
--- a/testcases/kernel/syscalls/utime/utime07.c
+++ b/testcases/kernel/syscalls/utime/utime07.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test verifies that utime() is working correctly on symlink()
* generated files.
*
diff --git a/testcases/kernel/syscalls/utimensat/utimensat01.c b/testcases/kernel/syscalls/utimensat/utimensat01.c
index f9f5d7f6cd..c113279622 100644
--- a/testcases/kernel/syscalls/utimensat/utimensat01.c
+++ b/testcases/kernel/syscalls/utimensat/utimensat01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Basic utimnsat() test.
*/
diff --git a/testcases/kernel/syscalls/utimes/utimes01.c b/testcases/kernel/syscalls/utimes/utimes01.c
index 3c97c40532..b66f39b654 100644
--- a/testcases/kernel/syscalls/utimes/utimes01.c
+++ b/testcases/kernel/syscalls/utimes/utimes01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that, utimes(2) returns -1 and sets errno to
*
* 1. EACCES if times is NULL, the caller's effective user ID does not match
diff --git a/testcases/kernel/syscalls/vmsplice/vmsplice02.c b/testcases/kernel/syscalls/vmsplice/vmsplice02.c
index 24ff3c0f85..94c98fb13b 100644
--- a/testcases/kernel/syscalls/vmsplice/vmsplice02.c
+++ b/testcases/kernel/syscalls/vmsplice/vmsplice02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that, vmsplice(2) returns -1 and sets errno to:
*
* - EBADF if fd is not valid.
diff --git a/testcases/kernel/syscalls/wait/wait01.c b/testcases/kernel/syscalls/wait/wait01.c
index 8245898dd2..685da14bc3 100644
--- a/testcases/kernel/syscalls/wait/wait01.c
+++ b/testcases/kernel/syscalls/wait/wait01.c
@@ -4,8 +4,6 @@
* Author: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
*/
/*\
- * [Description]
- *
* Check that if the calling process does not have any unwaited-for children
* wait() will return ECHILD.
*/
diff --git a/testcases/kernel/syscalls/wait/wait02.c b/testcases/kernel/syscalls/wait/wait02.c
index 806557c1ba..d5d721f68c 100644
--- a/testcases/kernel/syscalls/wait/wait02.c
+++ b/testcases/kernel/syscalls/wait/wait02.c
@@ -5,8 +5,6 @@
* CO-PILOT : Dave Fenner
*/
/*\
- * [Description]
- *
* For a terminated child, test whether wait(2) can get its pid
* and exit status correctly.
*/
diff --git a/testcases/kernel/syscalls/wait4/wait402.c b/testcases/kernel/syscalls/wait4/wait402.c
index 36fba73784..18ed0814f4 100644
--- a/testcases/kernel/syscalls/wait4/wait402.c
+++ b/testcases/kernel/syscalls/wait4/wait402.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Check for ECHILD errno when call wait4(2) with an invalid pid value.
*/
diff --git a/testcases/kernel/syscalls/wait4/wait403.c b/testcases/kernel/syscalls/wait4/wait403.c
index 8746794e5a..c610a9fa1d 100644
--- a/testcases/kernel/syscalls/wait4/wait403.c
+++ b/testcases/kernel/syscalls/wait4/wait403.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Check wait4(INT_MIN, ...) is not allowed. The pid is negated before
* searching for a group with that pid. Negating INT_MIN is not
* defined so UBSAN will be triggered if enabled. Also see kill13.
diff --git a/testcases/kernel/syscalls/waitid/waitid01.c b/testcases/kernel/syscalls/waitid/waitid01.c
index 136eec8a69..cb444d19a8 100644
--- a/testcases/kernel/syscalls/waitid/waitid01.c
+++ b/testcases/kernel/syscalls/waitid/waitid01.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test is checking if waitid() syscall does wait for WEXITED and check for
* the return value.
*/
diff --git a/testcases/kernel/syscalls/waitid/waitid02.c b/testcases/kernel/syscalls/waitid/waitid02.c
index f13a4ed00f..ea0d261277 100644
--- a/testcases/kernel/syscalls/waitid/waitid02.c
+++ b/testcases/kernel/syscalls/waitid/waitid02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests if waitid() returns EINVAL when passed invalid options flag value.
*/
diff --git a/testcases/kernel/syscalls/waitid/waitid03.c b/testcases/kernel/syscalls/waitid/waitid03.c
index ef3fd73763..4e70c401fb 100644
--- a/testcases/kernel/syscalls/waitid/waitid03.c
+++ b/testcases/kernel/syscalls/waitid/waitid03.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests if waitid() syscall returns ECHILD when the calling process has no
* child processes.
*/
diff --git a/testcases/kernel/syscalls/waitid/waitid04.c b/testcases/kernel/syscalls/waitid/waitid04.c
index 96c1cf8b19..0d4b16118f 100644
--- a/testcases/kernel/syscalls/waitid/waitid04.c
+++ b/testcases/kernel/syscalls/waitid/waitid04.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* This test if waitid() syscall leaves the si_pid set to 0 with WNOHANG flag
* when no child was waited for.
*/
diff --git a/testcases/kernel/syscalls/waitid/waitid05.c b/testcases/kernel/syscalls/waitid/waitid05.c
index 1b9186dc13..db9d3b22d7 100644
--- a/testcases/kernel/syscalls/waitid/waitid05.c
+++ b/testcases/kernel/syscalls/waitid/waitid05.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests if waitid() filters children correctly by the group ID.
*
* - waitid() with GID + 1 returns ECHILD
diff --git a/testcases/kernel/syscalls/waitid/waitid06.c b/testcases/kernel/syscalls/waitid/waitid06.c
index 5f51c81c81..ed6404bf67 100644
--- a/testcases/kernel/syscalls/waitid/waitid06.c
+++ b/testcases/kernel/syscalls/waitid/waitid06.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests if waitid() filters children correctly by the PID.
*
* - waitid() with PID + 1 returns ECHILD
diff --git a/testcases/kernel/syscalls/waitid/waitid07.c b/testcases/kernel/syscalls/waitid/waitid07.c
index d607dbd8f3..e5df1cc426 100644
--- a/testcases/kernel/syscalls/waitid/waitid07.c
+++ b/testcases/kernel/syscalls/waitid/waitid07.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test if waitid() filters children killed with SIGSTOP.
*/
diff --git a/testcases/kernel/syscalls/waitid/waitid08.c b/testcases/kernel/syscalls/waitid/waitid08.c
index 2da680e640..519ccf7801 100644
--- a/testcases/kernel/syscalls/waitid/waitid08.c
+++ b/testcases/kernel/syscalls/waitid/waitid08.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test if waitid() filters children killed with SIGCONT.
*/
diff --git a/testcases/kernel/syscalls/waitid/waitid09.c b/testcases/kernel/syscalls/waitid/waitid09.c
index 115c2e672d..3a3080bc45 100644
--- a/testcases/kernel/syscalls/waitid/waitid09.c
+++ b/testcases/kernel/syscalls/waitid/waitid09.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Test that waitid() fails with ECHILD with process that is not child of the
* current process. We fork() one child just to be sure that there are unwaited
* for children available while the test runs.
diff --git a/testcases/kernel/syscalls/waitid/waitid10.c b/testcases/kernel/syscalls/waitid/waitid10.c
index 9100cc2d7a..14d4ba76bf 100644
--- a/testcases/kernel/syscalls/waitid/waitid10.c
+++ b/testcases/kernel/syscalls/waitid/waitid10.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test is checking if waitid() syscall recognizes a process that ended
* with division by zero error.
*/
diff --git a/testcases/kernel/syscalls/waitid/waitid11.c b/testcases/kernel/syscalls/waitid/waitid11.c
index e3754bb1d6..63d011e6d5 100644
--- a/testcases/kernel/syscalls/waitid/waitid11.c
+++ b/testcases/kernel/syscalls/waitid/waitid11.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* This test is checking if waitid() syscall recognizes a process that has been
* killed with SIGKILL.
*/
diff --git a/testcases/kernel/syscalls/waitpid/waitpid01.c b/testcases/kernel/syscalls/waitpid/waitpid01.c
index 1e38863e6c..cb65d1e20f 100644
--- a/testcases/kernel/syscalls/waitpid/waitpid01.c
+++ b/testcases/kernel/syscalls/waitpid/waitpid01.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Check that when a child kills itself with one of the standard signals,
* the waiting parent is correctly notified.
*
diff --git a/testcases/kernel/syscalls/waitpid/waitpid03.c b/testcases/kernel/syscalls/waitpid/waitpid03.c
index b2ee0549c5..12a2a214d8 100644
--- a/testcases/kernel/syscalls/waitpid/waitpid03.c
+++ b/testcases/kernel/syscalls/waitpid/waitpid03.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Check that waitpid() returns the exit status of a specific child process
* and repeated call on the same process will fail with ECHILD.
*/
diff --git a/testcases/kernel/syscalls/waitpid/waitpid04.c b/testcases/kernel/syscalls/waitpid/waitpid04.c
index 7e60ef6ab3..ee8e8daad3 100644
--- a/testcases/kernel/syscalls/waitpid/waitpid04.c
+++ b/testcases/kernel/syscalls/waitpid/waitpid04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test to check the error conditions in waitpid() syscall.
*/
diff --git a/testcases/kernel/syscalls/write/write02.c b/testcases/kernel/syscalls/write/write02.c
index ab38dce77e..a5855c8d6a 100644
--- a/testcases/kernel/syscalls/write/write02.c
+++ b/testcases/kernel/syscalls/write/write02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Tests for a special case NULL buffer with size 0 is expected to return 0.
*/
diff --git a/testcases/kernel/syscalls/write/write04.c b/testcases/kernel/syscalls/write/write04.c
index a5d62e0f54..41bd35a101 100644
--- a/testcases/kernel/syscalls/write/write04.c
+++ b/testcases/kernel/syscalls/write/write04.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify that write(2) fails with errno EAGAIN when attempt to write to fifo
* opened in O_NONBLOCK mode.
*/
diff --git a/testcases/kernel/syscalls/write/write05.c b/testcases/kernel/syscalls/write/write05.c
index b907624a8e..96988b0d0b 100644
--- a/testcases/kernel/syscalls/write/write05.c
+++ b/testcases/kernel/syscalls/write/write05.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Check the return value, and errnos of write(2)
*
* - when the file descriptor is invalid - EBADF
diff --git a/testcases/kernel/syscalls/write/write06.c b/testcases/kernel/syscalls/write/write06.c
index aac1e6f7c9..068aaa584f 100644
--- a/testcases/kernel/syscalls/write/write06.c
+++ b/testcases/kernel/syscalls/write/write06.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Test the write() system call with O_APPEND.
*
* The full description of O_APPEND is in open(2) man-pages:
diff --git a/testcases/kernel/syscalls/writev/writev03.c b/testcases/kernel/syscalls/writev/writev03.c
index 7074a418a9..f2326095ec 100644
--- a/testcases/kernel/syscalls/writev/writev03.c
+++ b/testcases/kernel/syscalls/writev/writev03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Check for potential issues in writev() if the first iovec entry is NULL
* and the next one is not present in RAM. This can result in a brief window
* where writev() first writes uninitialized data into the file (possibly
diff --git a/testcases/kernel/syscalls/writev/writev07.c b/testcases/kernel/syscalls/writev/writev07.c
index 3dda1caa4e..0798296a72 100644
--- a/testcases/kernel/syscalls/writev/writev07.c
+++ b/testcases/kernel/syscalls/writev/writev07.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Verify writev() behaviour with partially valid iovec list.
* Kernel <4.8 used to shorten write up to first bad invalid
* iovec. Starting with 4.8, a writev with short data (under
diff --git a/testcases/kernel/uevents/uevent01.c b/testcases/kernel/uevents/uevent01.c
index a1f9941509..09ef424128 100644
--- a/testcases/kernel/uevents/uevent01.c
+++ b/testcases/kernel/uevents/uevent01.c
@@ -5,7 +5,6 @@
*/
/*\
- * [Description]
* Very simple uevent netlink socket test.
*
* We fork a child that listens for a kernel events while parents attaches and
diff --git a/testcases/kernel/uevents/uevent02.c b/testcases/kernel/uevents/uevent02.c
index daa1b4f12c..abae4f88ed 100644
--- a/testcases/kernel/uevents/uevent02.c
+++ b/testcases/kernel/uevents/uevent02.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Very simple uevent netlink socket test.
*
* We fork a child that listens for a kernel events while parents creates and
diff --git a/testcases/kernel/uevents/uevent03.c b/testcases/kernel/uevents/uevent03.c
index f7072db1c5..126c924f18 100644
--- a/testcases/kernel/uevents/uevent03.c
+++ b/testcases/kernel/uevents/uevent03.c
@@ -5,7 +5,6 @@
*/
/*\
- * [Description]
* Very simple uevent netlink socket test.
*
* We fork a child that listens for a kernel events while parents creates and
diff --git a/testcases/kernel/watchqueue/wqueue01.c b/testcases/kernel/watchqueue/wqueue01.c
index 904e512af1..2f621ebc1a 100644
--- a/testcases/kernel/watchqueue/wqueue01.c
+++ b/testcases/kernel/watchqueue/wqueue01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test if keyctl update is correctly recognized by watch queue.
*/
diff --git a/testcases/kernel/watchqueue/wqueue02.c b/testcases/kernel/watchqueue/wqueue02.c
index 0c3e947d15..943a62674f 100644
--- a/testcases/kernel/watchqueue/wqueue02.c
+++ b/testcases/kernel/watchqueue/wqueue02.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test if keyctl unlink is correctly recognized by watch queue.
*/
diff --git a/testcases/kernel/watchqueue/wqueue03.c b/testcases/kernel/watchqueue/wqueue03.c
index c17fc14525..d36a201e21 100644
--- a/testcases/kernel/watchqueue/wqueue03.c
+++ b/testcases/kernel/watchqueue/wqueue03.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test if keyctl revoke is correctly recognized by watch queue.
*/
diff --git a/testcases/kernel/watchqueue/wqueue04.c b/testcases/kernel/watchqueue/wqueue04.c
index fc880064bf..5cb28eb1d6 100644
--- a/testcases/kernel/watchqueue/wqueue04.c
+++ b/testcases/kernel/watchqueue/wqueue04.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test if keyctl link is correctly recognized by watch queue.
*/
diff --git a/testcases/kernel/watchqueue/wqueue05.c b/testcases/kernel/watchqueue/wqueue05.c
index 78a4c702ec..9ef1b58142 100644
--- a/testcases/kernel/watchqueue/wqueue05.c
+++ b/testcases/kernel/watchqueue/wqueue05.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test if keyctl invalidate is correctly recognized by watch queue.
*/
diff --git a/testcases/kernel/watchqueue/wqueue06.c b/testcases/kernel/watchqueue/wqueue06.c
index 2cb6a966d7..524ba9960d 100644
--- a/testcases/kernel/watchqueue/wqueue06.c
+++ b/testcases/kernel/watchqueue/wqueue06.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test if keyctl clear is correctly recognized by watch queue.
*/
diff --git a/testcases/kernel/watchqueue/wqueue07.c b/testcases/kernel/watchqueue/wqueue07.c
index 6c4d1e92ad..4189600ba9 100644
--- a/testcases/kernel/watchqueue/wqueue07.c
+++ b/testcases/kernel/watchqueue/wqueue07.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test if keyctl setperm is correctly recognized by watch queue.
*/
diff --git a/testcases/kernel/watchqueue/wqueue08.c b/testcases/kernel/watchqueue/wqueue08.c
index 4ed9522da2..21fbd246b9 100644
--- a/testcases/kernel/watchqueue/wqueue08.c
+++ b/testcases/kernel/watchqueue/wqueue08.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Test if key watch removal is correctly recognized by watch queue.
*/
diff --git a/testcases/kernel/watchqueue/wqueue09.c b/testcases/kernel/watchqueue/wqueue09.c
index 9f077b35be..dfda0cc6f3 100644
--- a/testcases/kernel/watchqueue/wqueue09.c
+++ b/testcases/kernel/watchqueue/wqueue09.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Fill the watch queue and wait for a notification loss.
*/
diff --git a/testcases/lib/tst_ns_create.c b/testcases/lib/tst_ns_create.c
index bd7633b0bc..90862d9dee 100644
--- a/testcases/lib/tst_ns_create.c
+++ b/testcases/lib/tst_ns_create.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Creates a child process in the new specified namespace(s), child is then
* daemonized and is running in the background. PID of the daemonized child
* process is printed on the stdout. As the new namespace(s) is(are) maintained
diff --git a/testcases/lib/tst_ns_exec.c b/testcases/lib/tst_ns_exec.c
index 5d34e9ad5d..d5011231e5 100644
--- a/testcases/lib/tst_ns_exec.c
+++ b/testcases/lib/tst_ns_exec.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Enters the namespace(s) of a process specified by a PID and then executes
* the indicated program inside that namespace(s).
*/
diff --git a/testcases/lib/tst_ns_ifmove.c b/testcases/lib/tst_ns_ifmove.c
index 03531fc9bb..ba1d23400f 100644
--- a/testcases/lib/tst_ns_ifmove.c
+++ b/testcases/lib/tst_ns_ifmove.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Moves a network interface to the namespace of a process specified by a PID.
*/
diff --git a/testcases/network/can/cve/can_bcm01.c b/testcases/network/can/cve/can_bcm01.c
index 30d85ad62e..e316a8deb5 100644
--- a/testcases/network/can/cve/can_bcm01.c
+++ b/testcases/network/can/cve/can_bcm01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* CVE-2021-3609
*
* Test for race condition vulnerability in CAN BCM. Fixed in:
diff --git a/testcases/network/iptables/nft02.c b/testcases/network/iptables/nft02.c
index 8b7248c69b..5f0671c5d3 100644
--- a/testcases/network/iptables/nft02.c
+++ b/testcases/network/iptables/nft02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* CVE-2023-31248
*
* Test for use-after-free when adding a new rule to a chain deleted
diff --git a/testcases/network/lib6/asapi_02.c b/testcases/network/lib6/asapi_02.c
index 7808b2c3a7..55588c3310 100644
--- a/testcases/network/lib6/asapi_02.c
+++ b/testcases/network/lib6/asapi_02.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Basic test for ICMP6_FILTER.
*
* For ICMP6_FILTER usage, refer to: https://man.openbsd.org/icmp6.
diff --git a/testcases/network/lib6/getaddrinfo_01.c b/testcases/network/lib6/getaddrinfo_01.c
index 1974021413..61a4aad508 100644
--- a/testcases/network/lib6/getaddrinfo_01.c
+++ b/testcases/network/lib6/getaddrinfo_01.c
@@ -8,8 +8,6 @@
*/
/*\
- * [Description]
- *
* Basic getaddrinfo() tests.
*
* The test adds LTP specific addresses and names to /etc/hosts to avoid
diff --git a/testcases/network/lib6/in6_01.c b/testcases/network/lib6/in6_01.c
index 823d3cac7a..b5066a5847 100644
--- a/testcases/network/lib6/in6_01.c
+++ b/testcases/network/lib6/in6_01.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* Verify that in6 and sockaddr fields are present.
*/
diff --git a/testcases/network/lib6/in6_02.c b/testcases/network/lib6/in6_02.c
index e9630d7049..71bfe71886 100644
--- a/testcases/network/lib6/in6_02.c
+++ b/testcases/network/lib6/in6_02.c
@@ -7,8 +7,6 @@
*/
/*\
- * [Description]
- *
* IPv6 name to index and index to name function tests.
*/
diff --git a/testcases/network/nfs/nfslock01/nfs_flock.c b/testcases/network/nfs/nfslock01/nfs_flock.c
index 02f105b22c..dbe5ffe31e 100644
--- a/testcases/network/nfs/nfslock01/nfs_flock.c
+++ b/testcases/network/nfs/nfslock01/nfs_flock.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Program for testing file locking. The original data file consists of
* characters from 'A' to 'Z'. The data file after running this program
* would consist of lines with 1's in even lines and 0's in odd lines.
diff --git a/testcases/network/nfs/nfslock01/nfs_flock_dgen.c b/testcases/network/nfs/nfslock01/nfs_flock_dgen.c
index 6ecdcdc4fe..d050e5e581 100644
--- a/testcases/network/nfs/nfslock01/nfs_flock_dgen.c
+++ b/testcases/network/nfs/nfslock01/nfs_flock_dgen.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Tool to generate data for testing file locking.
* Used in nfslock01.sh.
*/
diff --git a/testcases/network/sctp/sctp_big_chunk.c b/testcases/network/sctp/sctp_big_chunk.c
index 4674868467..6e2d6f2fff 100644
--- a/testcases/network/sctp/sctp_big_chunk.c
+++ b/testcases/network/sctp/sctp_big_chunk.c
@@ -5,8 +5,6 @@
*/
/*\
- * [Description]
- *
* Regression test for the crash caused by over-sized SCTP chunk,
* fixed by upstream commit 07f2c7ab6f8d ("sctp: verify size of a new
* chunk in _sctp_make_chunk()").
diff --git a/testcases/network/sockets/vsock01.c b/testcases/network/sockets/vsock01.c
index 7eecebdfcb..416bd65d0e 100644
--- a/testcases/network/sockets/vsock01.c
+++ b/testcases/network/sockets/vsock01.c
@@ -4,8 +4,6 @@
*/
/*\
- * [Description]
- *
* Reproducer of CVE-2021-26708
*
* Based on POC https://github.com/jordan9001/vsock_poc.
diff --git a/testcases/realtime/func/matrix_mult/matrix_mult.c b/testcases/realtime/func/matrix_mult/matrix_mult.c
index e028952be8..dfee3827a0 100644
--- a/testcases/realtime/func/matrix_mult/matrix_mult.c
+++ b/testcases/realtime/func/matrix_mult/matrix_mult.c
@@ -6,8 +6,6 @@
* Dinakar Guniguntala <dino@in.ibm.com>
*/
/*\
- * [Description]
- *
* Compare running sequential matrix multiplication routines
* to running them in parallel to judge multiprocessor
* performance
diff --git a/testcases/realtime/func/sched_football/sched_football.c b/testcases/realtime/func/sched_football/sched_football.c
index 5ffc1ff461..b89970542a 100644
--- a/testcases/realtime/func/sched_football/sched_football.c
+++ b/testcases/realtime/func/sched_football/sched_football.c
@@ -6,8 +6,6 @@
*/
/*\
- * [Description]
- *
* Scheduler test that uses a football analogy.
*
* The premise is that we want to make sure that lower priority threads
--
2.47.2
More information about the ltp
mailing list