[LTP] [PATCH 1/1] doc: Remove [Description] title
Andrea Cervesato
andrea.cervesato@suse.com
Wed Feb 12 09:16:40 CET 2025
Hi!
Beware there are a couple of misspelling "[Description]": hugemmap17 and
hugemmap19.
The rest looks obviously correct. Thanks for this task.
Reviewed-by: Andrea Cervesato <andrea.cervesato@suse.com>
Andrea
On 2/11/25 23:31, Petr Vorel wrote:
> It does not add any information value (it's obvious that the text
> description follows), removing it makes the test catalog page shorter.
>
> Removed with:
> for i in $(git grep -l ' \* \[Description\]'); do sed -Ezr 's:[ ]*\* \[Description\]\n( \*\n)*::g' -i $i; done
>
> Signed-off-by: Petr Vorel <pvorel@suse.cz>
> ---
> doc/developers/test_case_tutorial.rst | 1 -
> doc/old/C-Test-API.asciidoc | 1 -
> include/tst_cgroup.h | 2 --
> lib/newlib_tests/tst_fuzzy_sync01.c | 2 --
> lib/newlib_tests/tst_fuzzy_sync02.c | 2 --
> testcases/cve/cve-2014-0196.c | 2 --
> testcases/cve/cve-2016-10044.c | 2 --
> testcases/cve/cve-2016-7042.c | 2 --
> testcases/cve/cve-2016-7117.c | 2 --
> testcases/cve/cve-2017-16939.c | 2 --
> testcases/cve/cve-2017-17052.c | 2 --
> testcases/cve/cve-2017-17053.c | 2 --
> testcases/cve/cve-2017-2618.c | 2 --
> testcases/cve/cve-2017-2671.c | 2 --
> testcases/cve/cve-2022-4378.c | 2 --
> testcases/cve/icmp_rate_limit01.c | 2 --
> testcases/cve/meltdown.c | 2 --
> testcases/cve/stack_clash.c | 2 --
> testcases/cve/tcindex01.c | 2 --
> testcases/kernel/containers/mountns/mountns01.c | 2 --
> testcases/kernel/containers/mountns/mountns02.c | 2 --
> testcases/kernel/containers/mountns/mountns03.c | 2 --
> testcases/kernel/containers/mountns/mountns04.c | 2 --
> testcases/kernel/containers/mqns/mqns_01.c | 2 --
> testcases/kernel/containers/mqns/mqns_02.c | 2 --
> testcases/kernel/containers/mqns/mqns_03.c | 2 --
> testcases/kernel/containers/mqns/mqns_04.c | 2 --
> testcases/kernel/containers/netns/netns_netlink.c | 2 --
> testcases/kernel/containers/pidns/pidns01.c | 2 --
> testcases/kernel/containers/pidns/pidns02.c | 2 --
> testcases/kernel/containers/pidns/pidns03.c | 2 --
> testcases/kernel/containers/pidns/pidns04.c | 2 --
> testcases/kernel/containers/pidns/pidns05.c | 2 --
> testcases/kernel/containers/pidns/pidns06.c | 2 --
> testcases/kernel/containers/pidns/pidns10.c | 2 --
> testcases/kernel/containers/pidns/pidns12.c | 2 --
> testcases/kernel/containers/pidns/pidns13.c | 2 --
> testcases/kernel/containers/pidns/pidns16.c | 2 --
> testcases/kernel/containers/pidns/pidns17.c | 2 --
> testcases/kernel/containers/pidns/pidns20.c | 2 --
> testcases/kernel/containers/pidns/pidns30.c | 2 --
> testcases/kernel/containers/pidns/pidns31.c | 2 --
> testcases/kernel/containers/pidns/pidns32.c | 2 --
> testcases/kernel/containers/sysvipc/mesgq_nstest.c | 2 --
> testcases/kernel/containers/sysvipc/msg_comm.c | 2 --
> testcases/kernel/containers/sysvipc/sem_comm.c | 2 --
> testcases/kernel/containers/sysvipc/sem_nstest.c | 2 --
> testcases/kernel/containers/sysvipc/semtest_2ns.c | 2 --
> testcases/kernel/containers/sysvipc/shm_comm.c | 2 --
> testcases/kernel/containers/sysvipc/shmem_2nstest.c | 2 --
> testcases/kernel/containers/sysvipc/shmnstest.c | 2 --
> testcases/kernel/containers/userns/userns01.c | 2 --
> testcases/kernel/containers/userns/userns02.c | 2 --
> testcases/kernel/containers/userns/userns03.c | 2 --
> testcases/kernel/containers/userns/userns04.c | 2 --
> testcases/kernel/containers/userns/userns05.c | 2 --
> testcases/kernel/containers/userns/userns06.c | 2 --
> testcases/kernel/containers/userns/userns07.c | 2 --
> testcases/kernel/containers/userns/userns08.c | 2 --
> testcases/kernel/containers/utsname/utsname01.c | 2 --
> testcases/kernel/containers/utsname/utsname02.c | 2 --
> testcases/kernel/containers/utsname/utsname03.c | 2 --
> testcases/kernel/containers/utsname/utsname04.c | 2 --
> testcases/kernel/controllers/cgroup/cgroup_core01.c | 2 --
> testcases/kernel/controllers/cgroup/cgroup_core02.c | 2 --
> testcases/kernel/controllers/cgroup/cgroup_core03.c | 2 --
> testcases/kernel/controllers/io/io_control01.c | 2 --
> testcases/kernel/controllers/memcg/memcontrol01.c | 2 --
> testcases/kernel/controllers/memcg/memcontrol02.c | 2 --
> testcases/kernel/controllers/memcg/memcontrol03.c | 2 --
> testcases/kernel/controllers/memcg/memcontrol04.c | 2 --
> .../kernel/device-drivers/block/block_dev_user/block_dev.c | 2 --
> testcases/kernel/device-drivers/rtc/rtc02.c | 2 --
> testcases/kernel/device-drivers/zram/zram03.c | 2 --
> testcases/kernel/fs/fsplough/fsplough.c | 2 --
> testcases/kernel/fs/fsx-linux/fsx-linux.c | 2 --
> testcases/kernel/fs/squashfs/squashfs01.c | 2 --
> testcases/kernel/input/input01.c | 2 --
> testcases/kernel/input/input02.c | 2 --
> testcases/kernel/input/input03.c | 2 --
> testcases/kernel/input/input04.c | 2 --
> testcases/kernel/input/input05.c | 2 --
> testcases/kernel/input/input06.c | 2 --
> testcases/kernel/io/ltp-aiodio/aio-stress.c | 2 --
> testcases/kernel/io/ltp-aiodio/aiocp.c | 2 --
> testcases/kernel/io/ltp-aiodio/aiodio_append.c | 2 --
> testcases/kernel/io/ltp-aiodio/aiodio_sparse.c | 2 --
> testcases/kernel/io/ltp-aiodio/dio_append.c | 2 --
> testcases/kernel/io/ltp-aiodio/dio_read.c | 2 --
> testcases/kernel/io/ltp-aiodio/dio_sparse.c | 2 --
> testcases/kernel/io/ltp-aiodio/dio_truncate.c | 2 --
> testcases/kernel/irq/irqbalance01.c | 2 --
> testcases/kernel/kvm/kvm_svm04.c | 2 --
> testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c | 2 --
> testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c | 2 --
> testcases/kernel/mem/hugetlb/hugefork/hugefork01.c | 2 --
> testcases/kernel/mem/hugetlb/hugefork/hugefork02.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c | 1 -
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c | 2 --
> testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c | 2 --
> testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c | 2 --
> testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c | 2 --
> testcases/kernel/mem/ksm/ksm04.c | 2 --
> testcases/kernel/mem/ksm/ksm06.c | 2 --
> testcases/kernel/mem/ksm/ksm07.c | 2 --
> testcases/kernel/mem/mmapstress/mmapstress01.c | 1 -
> testcases/kernel/mem/oom/oom01.c | 2 --
> testcases/kernel/mem/oom/oom02.c | 2 --
> testcases/kernel/mem/oom/oom03.c | 2 --
> testcases/kernel/mem/oom/oom04.c | 2 --
> testcases/kernel/mem/oom/oom05.c | 2 --
> testcases/kernel/mem/swapping/swapping01.c | 2 --
> testcases/kernel/mem/thp/thp01.c | 2 --
> testcases/kernel/mem/thp/thp02.c | 2 --
> testcases/kernel/pty/ptem01.c | 2 --
> testcases/kernel/pty/ptem02.c | 2 --
> testcases/kernel/pty/ptem03.c | 2 --
> testcases/kernel/pty/ptem04.c | 2 --
> testcases/kernel/pty/ptem05.c | 2 --
> testcases/kernel/pty/ptem06.c | 2 --
> testcases/kernel/pty/pty01.c | 2 --
> testcases/kernel/pty/pty03.c | 2 --
> testcases/kernel/pty/pty06.c | 2 --
> testcases/kernel/pty/pty07.c | 2 --
> testcases/kernel/pty/pty08.c | 2 --
> testcases/kernel/pty/pty09.c | 2 --
> testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c | 2 --
> testcases/kernel/sched/cfs-scheduler/starvation.c | 2 --
> testcases/kernel/sched/sysctl/proc_sched_rt01.c | 2 --
> testcases/kernel/security/aslr/aslr01.c | 2 --
> testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c | 2 --
> testcases/kernel/security/dirtypipe/dirtypipe.c | 2 --
> testcases/kernel/security/kallsyms/kallsyms.c | 2 --
> testcases/kernel/syscalls/abort/abort01.c | 2 --
> testcases/kernel/syscalls/accept/accept01.c | 1 -
> testcases/kernel/syscalls/accept/accept02.c | 2 --
> testcases/kernel/syscalls/accept/accept03.c | 2 --
> testcases/kernel/syscalls/access/access01.c | 2 --
> testcases/kernel/syscalls/access/access02.c | 2 --
> testcases/kernel/syscalls/access/access03.c | 2 --
> testcases/kernel/syscalls/access/access04.c | 2 --
> testcases/kernel/syscalls/acct/acct01.c | 2 --
> testcases/kernel/syscalls/acct/acct02.c | 2 --
> testcases/kernel/syscalls/adjtimex/adjtimex02.c | 2 --
> testcases/kernel/syscalls/adjtimex/adjtimex03.c | 2 --
> testcases/kernel/syscalls/alarm/alarm02.c | 2 --
> testcases/kernel/syscalls/alarm/alarm03.c | 2 --
> testcases/kernel/syscalls/alarm/alarm05.c | 2 --
> testcases/kernel/syscalls/alarm/alarm06.c | 2 --
> testcases/kernel/syscalls/alarm/alarm07.c | 2 --
> testcases/kernel/syscalls/arch_prctl/arch_prctl01.c | 2 --
> testcases/kernel/syscalls/bind/bind02.c | 2 --
> testcases/kernel/syscalls/bpf/bpf_map01.c | 2 --
> testcases/kernel/syscalls/bpf/bpf_prog01.c | 2 --
> testcases/kernel/syscalls/bpf/bpf_prog02.c | 2 --
> testcases/kernel/syscalls/bpf/bpf_prog03.c | 2 --
> testcases/kernel/syscalls/bpf/bpf_prog04.c | 2 --
> testcases/kernel/syscalls/bpf/bpf_prog05.c | 2 --
> testcases/kernel/syscalls/bpf/bpf_prog06.c | 2 --
> testcases/kernel/syscalls/bpf/bpf_prog07.c | 2 --
> testcases/kernel/syscalls/brk/brk02.c | 2 --
> testcases/kernel/syscalls/cachestat/cachestat01.c | 2 --
> testcases/kernel/syscalls/cachestat/cachestat02.c | 2 --
> testcases/kernel/syscalls/cachestat/cachestat03.c | 2 --
> testcases/kernel/syscalls/cachestat/cachestat04.c | 2 --
> testcases/kernel/syscalls/capset/capset01.c | 2 --
> testcases/kernel/syscalls/capset/capset02.c | 1 -
> testcases/kernel/syscalls/capset/capset03.c | 2 --
> testcases/kernel/syscalls/capset/capset04.c | 2 --
> testcases/kernel/syscalls/chdir/chdir04.c | 2 --
> testcases/kernel/syscalls/chmod/chmod01.c | 2 --
> testcases/kernel/syscalls/chmod/chmod03.c | 2 --
> testcases/kernel/syscalls/chmod/chmod06.c | 2 --
> testcases/kernel/syscalls/chmod/chmod08.c | 2 --
> testcases/kernel/syscalls/chmod/chmod09.c | 2 --
> testcases/kernel/syscalls/chown/chown01.c | 2 --
> testcases/kernel/syscalls/chown/chown02.c | 2 --
> testcases/kernel/syscalls/chown/chown03.c | 2 --
> testcases/kernel/syscalls/chown/chown04.c | 2 --
> testcases/kernel/syscalls/chown/chown05.c | 2 --
> testcases/kernel/syscalls/chroot/chroot01.c | 2 --
> testcases/kernel/syscalls/chroot/chroot02.c | 2 --
> testcases/kernel/syscalls/chroot/chroot03.c | 2 --
> testcases/kernel/syscalls/chroot/chroot04.c | 2 --
> testcases/kernel/syscalls/clock_gettime/clock_gettime03.c | 2 --
> testcases/kernel/syscalls/clock_gettime/clock_gettime04.c | 2 --
> testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c | 2 --
> testcases/kernel/syscalls/clone/clone01.c | 2 --
> testcases/kernel/syscalls/clone/clone03.c | 2 --
> testcases/kernel/syscalls/clone/clone04.c | 2 --
> testcases/kernel/syscalls/clone/clone05.c | 2 --
> testcases/kernel/syscalls/clone/clone06.c | 2 --
> testcases/kernel/syscalls/clone/clone07.c | 2 --
> testcases/kernel/syscalls/clone3/clone301.c | 2 --
> testcases/kernel/syscalls/clone3/clone302.c | 2 --
> testcases/kernel/syscalls/clone3/clone303.c | 2 --
> testcases/kernel/syscalls/close/close01.c | 2 --
> testcases/kernel/syscalls/close/close02.c | 2 --
> testcases/kernel/syscalls/close_range/close_range01.c | 2 --
> testcases/kernel/syscalls/close_range/close_range02.c | 2 --
> testcases/kernel/syscalls/cma/process_vm01.c | 2 --
> testcases/kernel/syscalls/cma/process_vm_readv02.c | 2 --
> testcases/kernel/syscalls/cma/process_vm_readv03.c | 2 --
> testcases/kernel/syscalls/cma/process_vm_writev02.c | 2 --
> testcases/kernel/syscalls/confstr/confstr01.c | 2 --
> testcases/kernel/syscalls/creat/creat08.c | 2 --
> testcases/kernel/syscalls/creat/creat09.c | 2 --
> testcases/kernel/syscalls/delete_module/delete_module01.c | 2 --
> testcases/kernel/syscalls/dup/dup01.c | 2 --
> testcases/kernel/syscalls/dup/dup02.c | 2 --
> testcases/kernel/syscalls/dup/dup03.c | 2 --
> testcases/kernel/syscalls/dup/dup04.c | 2 --
> testcases/kernel/syscalls/dup/dup05.c | 2 --
> testcases/kernel/syscalls/dup/dup06.c | 2 --
> testcases/kernel/syscalls/dup/dup07.c | 2 --
> testcases/kernel/syscalls/dup2/dup201.c | 2 --
> testcases/kernel/syscalls/dup2/dup202.c | 2 --
> testcases/kernel/syscalls/dup2/dup203.c | 2 --
> testcases/kernel/syscalls/dup2/dup204.c | 2 --
> testcases/kernel/syscalls/dup2/dup205.c | 2 --
> testcases/kernel/syscalls/dup2/dup206.c | 2 --
> testcases/kernel/syscalls/dup2/dup207.c | 2 --
> testcases/kernel/syscalls/dup3/dup3_01.c | 2 --
> testcases/kernel/syscalls/dup3/dup3_02.c | 2 --
> testcases/kernel/syscalls/epoll_create/epoll_create01.c | 2 --
> testcases/kernel/syscalls/epoll_create/epoll_create02.c | 2 --
> testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c | 2 --
> testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c | 2 --
> testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c | 2 --
> testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c | 2 --
> testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c | 2 --
> testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c | 2 --
> testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c | 2 --
> testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c | 2 --
> testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c | 2 --
> testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c | 2 --
> testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c | 2 --
> testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c | 2 --
> testcases/kernel/syscalls/epoll_wait/epoll_wait01.c | 2 --
> testcases/kernel/syscalls/epoll_wait/epoll_wait02.c | 2 --
> testcases/kernel/syscalls/epoll_wait/epoll_wait03.c | 2 --
> testcases/kernel/syscalls/epoll_wait/epoll_wait04.c | 2 --
> testcases/kernel/syscalls/epoll_wait/epoll_wait05.c | 2 --
> testcases/kernel/syscalls/epoll_wait/epoll_wait06.c | 2 --
> testcases/kernel/syscalls/epoll_wait/epoll_wait07.c | 2 --
> testcases/kernel/syscalls/eventfd/eventfd01.c | 2 --
> testcases/kernel/syscalls/eventfd/eventfd02.c | 2 --
> testcases/kernel/syscalls/eventfd/eventfd03.c | 2 --
> testcases/kernel/syscalls/eventfd/eventfd04.c | 2 --
> testcases/kernel/syscalls/eventfd/eventfd05.c | 2 --
> testcases/kernel/syscalls/eventfd/eventfd06.c | 2 --
> testcases/kernel/syscalls/eventfd2/eventfd2_01.c | 2 --
> testcases/kernel/syscalls/eventfd2/eventfd2_02.c | 2 --
> testcases/kernel/syscalls/eventfd2/eventfd2_03.c | 2 --
> testcases/kernel/syscalls/execve/execve04.c | 2 --
> testcases/kernel/syscalls/execve/execve05.c | 2 --
> testcases/kernel/syscalls/execve/execve06.c | 2 --
> testcases/kernel/syscalls/exit_group/exit_group01.c | 2 --
> testcases/kernel/syscalls/faccessat/faccessat01.c | 2 --
> testcases/kernel/syscalls/faccessat/faccessat02.c | 2 --
> testcases/kernel/syscalls/faccessat2/faccessat201.c | 2 --
> testcases/kernel/syscalls/faccessat2/faccessat202.c | 2 --
> testcases/kernel/syscalls/fallocate/fallocate03.c | 1 -
> testcases/kernel/syscalls/fallocate/fallocate06.c | 2 --
> testcases/kernel/syscalls/fanotify/fanotify01.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify02.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify03.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify04.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify05.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify06.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify07.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify08.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify09.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify10.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify11.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify12.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify13.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify14.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify15.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify16.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify17.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify18.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify19.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify20.c | 2 --
> testcases/kernel/syscalls/fanotify/fanotify21.c | 2 --
> testcases/kernel/syscalls/fanotify/fanotify22.c | 1 -
> testcases/kernel/syscalls/fanotify/fanotify23.c | 1 -
> testcases/kernel/syscalls/fchmod/fchmod01.c | 2 --
> testcases/kernel/syscalls/fchmod/fchmod02.c | 2 --
> testcases/kernel/syscalls/fchmod/fchmod03.c | 2 --
> testcases/kernel/syscalls/fchmod/fchmod04.c | 2 --
> testcases/kernel/syscalls/fchmod/fchmod05.c | 2 --
> testcases/kernel/syscalls/fchmodat/fchmodat01.c | 2 --
> testcases/kernel/syscalls/fchmodat/fchmodat02.c | 2 --
> testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c | 2 --
> testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c | 2 --
> testcases/kernel/syscalls/fchown/fchown01.c | 2 --
> testcases/kernel/syscalls/fchown/fchown02.c | 2 --
> testcases/kernel/syscalls/fchown/fchown03.c | 2 --
> testcases/kernel/syscalls/fchown/fchown04.c | 2 --
> testcases/kernel/syscalls/fchown/fchown05.c | 2 --
> testcases/kernel/syscalls/fchownat/fchownat01.c | 2 --
> testcases/kernel/syscalls/fchownat/fchownat02.c | 2 --
> testcases/kernel/syscalls/fchownat/fchownat03.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl05.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl08.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl12.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl13.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl14.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl15.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl27.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl29.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl30.c | 2 --
> testcases/kernel/syscalls/fcntl/fcntl39.c | 2 --
> testcases/kernel/syscalls/finit_module/finit_module01.c | 2 --
> testcases/kernel/syscalls/finit_module/finit_module02.c | 2 --
> testcases/kernel/syscalls/flock/flock01.c | 2 --
> testcases/kernel/syscalls/flock/flock02.c | 2 --
> testcases/kernel/syscalls/flock/flock03.c | 2 --
> testcases/kernel/syscalls/flock/flock04.c | 2 --
> testcases/kernel/syscalls/flock/flock06.c | 2 --
> testcases/kernel/syscalls/flock/flock07.c | 2 --
> testcases/kernel/syscalls/fork/fork05.c | 2 --
> testcases/kernel/syscalls/fork/fork07.c | 2 --
> testcases/kernel/syscalls/fork/fork08.c | 2 --
> testcases/kernel/syscalls/fork/fork10.c | 2 --
> testcases/kernel/syscalls/fork/fork13.c | 2 --
> testcases/kernel/syscalls/fork/fork14.c | 2 --
> testcases/kernel/syscalls/fpathconf/fpathconf01.c | 2 --
> testcases/kernel/syscalls/fsconfig/fsconfig03.c | 2 --
> testcases/kernel/syscalls/fsetxattr/fsetxattr02.c | 2 --
> testcases/kernel/syscalls/fstat/fstat02.c | 2 --
> testcases/kernel/syscalls/fstatfs/fstatfs01.c | 2 --
> testcases/kernel/syscalls/fstatfs/fstatfs02.c | 2 --
> testcases/kernel/syscalls/ftruncate/ftruncate01.c | 2 --
> testcases/kernel/syscalls/ftruncate/ftruncate03.c | 2 --
> testcases/kernel/syscalls/futex/futex_cmp_requeue01.c | 2 --
> testcases/kernel/syscalls/futex/futex_waitv01.c | 2 --
> testcases/kernel/syscalls/futex/futex_waitv02.c | 2 --
> testcases/kernel/syscalls/futex/futex_waitv03.c | 2 --
> testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c | 2 --
> testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c | 2 --
> testcases/kernel/syscalls/getcontext/getcontext01.c | 2 --
> testcases/kernel/syscalls/getcpu/getcpu01.c | 2 --
> testcases/kernel/syscalls/getcpu/getcpu02.c | 2 --
> testcases/kernel/syscalls/getcwd/getcwd02.c | 2 --
> testcases/kernel/syscalls/getcwd/getcwd03.c | 2 --
> testcases/kernel/syscalls/getdents/getdents01.c | 2 --
> testcases/kernel/syscalls/getdents/getdents02.c | 2 --
> testcases/kernel/syscalls/getdomainname/getdomainname01.c | 2 --
> testcases/kernel/syscalls/getegid/getegid01.c | 2 --
> testcases/kernel/syscalls/getegid/getegid02.c | 2 --
> testcases/kernel/syscalls/getgid/getgid01.c | 2 --
> testcases/kernel/syscalls/getgid/getgid03.c | 1 -
> testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c | 2 --
> testcases/kernel/syscalls/gethostid/gethostid01.c | 2 --
> testcases/kernel/syscalls/gethostname/gethostname01.c | 2 --
> testcases/kernel/syscalls/gethostname/gethostname02.c | 2 --
> testcases/kernel/syscalls/getitimer/getitimer01.c | 2 --
> testcases/kernel/syscalls/getitimer/getitimer02.c | 2 --
> testcases/kernel/syscalls/getpagesize/getpagesize01.c | 2 --
> testcases/kernel/syscalls/getpeername/getpeername01.c | 2 --
> testcases/kernel/syscalls/getpgid/getpgid01.c | 2 --
> testcases/kernel/syscalls/getpgid/getpgid02.c | 2 --
> testcases/kernel/syscalls/getpgrp/getpgrp01.c | 2 --
> testcases/kernel/syscalls/getpid/getpid01.c | 2 --
> testcases/kernel/syscalls/getpid/getpid02.c | 2 --
> testcases/kernel/syscalls/getppid/getppid01.c | 2 --
> testcases/kernel/syscalls/getppid/getppid02.c | 2 --
> testcases/kernel/syscalls/getrandom/getrandom05.c | 2 --
> testcases/kernel/syscalls/getrlimit/getrlimit01.c | 2 --
> testcases/kernel/syscalls/getrlimit/getrlimit02.c | 2 --
> testcases/kernel/syscalls/getrusage/getrusage01.c | 2 --
> testcases/kernel/syscalls/getrusage/getrusage02.c | 2 --
> testcases/kernel/syscalls/getrusage/getrusage03.c | 2 --
> testcases/kernel/syscalls/getrusage/getrusage03_child.c | 2 --
> testcases/kernel/syscalls/getsid/getsid01.c | 2 --
> testcases/kernel/syscalls/getsid/getsid02.c | 2 --
> testcases/kernel/syscalls/getsockname/getsockname01.c | 1 -
> testcases/kernel/syscalls/getsockopt/getsockopt01.c | 1 -
> testcases/kernel/syscalls/getsockopt/getsockopt02.c | 2 --
> testcases/kernel/syscalls/gettid/gettid01.c | 2 --
> testcases/kernel/syscalls/gettid/gettid02.c | 2 --
> testcases/kernel/syscalls/gettimeofday/gettimeofday01.c | 2 --
> testcases/kernel/syscalls/gettimeofday/gettimeofday02.c | 2 --
> testcases/kernel/syscalls/getuid/getuid01.c | 2 --
> testcases/kernel/syscalls/getuid/getuid03.c | 2 --
> testcases/kernel/syscalls/getxattr/getxattr01.c | 2 --
> testcases/kernel/syscalls/getxattr/getxattr02.c | 2 --
> testcases/kernel/syscalls/getxattr/getxattr03.c | 2 --
> testcases/kernel/syscalls/getxattr/getxattr04.c | 2 --
> testcases/kernel/syscalls/getxattr/getxattr05.c | 2 --
> testcases/kernel/syscalls/init_module/init_module01.c | 2 --
> testcases/kernel/syscalls/init_module/init_module02.c | 2 --
> testcases/kernel/syscalls/inotify/inotify01.c | 2 --
> testcases/kernel/syscalls/inotify/inotify02.c | 2 --
> testcases/kernel/syscalls/inotify/inotify03.c | 2 --
> testcases/kernel/syscalls/inotify/inotify04.c | 2 --
> testcases/kernel/syscalls/inotify/inotify05.c | 2 --
> testcases/kernel/syscalls/inotify/inotify06.c | 2 --
> testcases/kernel/syscalls/inotify/inotify07.c | 2 --
> testcases/kernel/syscalls/inotify/inotify08.c | 2 --
> testcases/kernel/syscalls/inotify/inotify09.c | 2 --
> testcases/kernel/syscalls/inotify/inotify10.c | 2 --
> testcases/kernel/syscalls/inotify/inotify11.c | 2 --
> testcases/kernel/syscalls/inotify/inotify12.c | 2 --
> testcases/kernel/syscalls/inotify_init/inotify_init1_01.c | 2 --
> testcases/kernel/syscalls/inotify_init/inotify_init1_02.c | 2 --
> testcases/kernel/syscalls/io_cancel/io_cancel01.c | 2 --
> testcases/kernel/syscalls/io_cancel/io_cancel02.c | 2 --
> testcases/kernel/syscalls/io_destroy/io_destroy01.c | 2 --
> testcases/kernel/syscalls/io_destroy/io_destroy02.c | 2 --
> testcases/kernel/syscalls/io_getevents/io_getevents01.c | 2 --
> testcases/kernel/syscalls/io_getevents/io_getevents02.c | 2 --
> testcases/kernel/syscalls/io_setup/io_setup01.c | 2 --
> testcases/kernel/syscalls/io_setup/io_setup02.c | 2 --
> testcases/kernel/syscalls/io_submit/io_submit01.c | 2 --
> testcases/kernel/syscalls/io_submit/io_submit02.c | 2 --
> testcases/kernel/syscalls/io_submit/io_submit03.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl01.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl02.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl03.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl04.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl05.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl06.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl07.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl08.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl09.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_loop01.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_loop02.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_loop03.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_loop04.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_loop05.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_loop06.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_loop07.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ns01.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ns02.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ns03.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ns04.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ns05.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ns06.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_ns07.c | 2 --
> testcases/kernel/syscalls/ioctl/ioctl_sg01.c | 2 --
> testcases/kernel/syscalls/iopl/iopl01.c | 2 --
> testcases/kernel/syscalls/iopl/iopl02.c | 2 --
> testcases/kernel/syscalls/ioprio/ioprio_get01.c | 2 --
> testcases/kernel/syscalls/ioprio/ioprio_set01.c | 2 --
> testcases/kernel/syscalls/ioprio/ioprio_set02.c | 2 --
> testcases/kernel/syscalls/ioprio/ioprio_set03.c | 2 --
> testcases/kernel/syscalls/ipc/msgctl/msgctl05.c | 2 --
> testcases/kernel/syscalls/ipc/msgctl/msgctl06.c | 2 --
> testcases/kernel/syscalls/ipc/msgget/msgget01.c | 2 --
> testcases/kernel/syscalls/ipc/msgget/msgget02.c | 2 --
> testcases/kernel/syscalls/ipc/msgget/msgget03.c | 2 --
> testcases/kernel/syscalls/ipc/msgget/msgget04.c | 2 --
> testcases/kernel/syscalls/ipc/msgget/msgget05.c | 2 --
> testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c | 2 --
> testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c | 2 --
> testcases/kernel/syscalls/ipc/msgstress/msgstress01.c | 2 --
> testcases/kernel/syscalls/ipc/semctl/semctl01.c | 2 --
> testcases/kernel/syscalls/ipc/semctl/semctl02.c | 2 --
> testcases/kernel/syscalls/ipc/semctl/semctl03.c | 2 --
> testcases/kernel/syscalls/ipc/semctl/semctl04.c | 2 --
> testcases/kernel/syscalls/ipc/semctl/semctl05.c | 2 --
> testcases/kernel/syscalls/ipc/semctl/semctl07.c | 2 --
> testcases/kernel/syscalls/ipc/semctl/semctl08.c | 2 --
> testcases/kernel/syscalls/ipc/semctl/semctl09.c | 2 --
> testcases/kernel/syscalls/ipc/semget/semget01.c | 2 --
> testcases/kernel/syscalls/ipc/semget/semget02.c | 2 --
> testcases/kernel/syscalls/ipc/semget/semget05.c | 2 --
> testcases/kernel/syscalls/ipc/semop/semop04.c | 2 --
> testcases/kernel/syscalls/ipc/shmat/shmat04.c | 2 --
> testcases/kernel/syscalls/ipc/shmctl/shmctl01.c | 2 --
> testcases/kernel/syscalls/ipc/shmctl/shmctl02.c | 2 --
> testcases/kernel/syscalls/ipc/shmctl/shmctl03.c | 2 --
> testcases/kernel/syscalls/ipc/shmctl/shmctl04.c | 2 --
> testcases/kernel/syscalls/ipc/shmctl/shmctl05.c | 2 --
> testcases/kernel/syscalls/ipc/shmctl/shmctl06.c | 2 --
> testcases/kernel/syscalls/ipc/shmctl/shmctl07.c | 2 --
> testcases/kernel/syscalls/ipc/shmctl/shmctl08.c | 2 --
> testcases/kernel/syscalls/ipc/shmdt/shmdt01.c | 2 --
> testcases/kernel/syscalls/ipc/shmdt/shmdt02.c | 2 --
> testcases/kernel/syscalls/ipc/shmget/shmget02.c | 2 --
> testcases/kernel/syscalls/ipc/shmget/shmget03.c | 2 --
> testcases/kernel/syscalls/ipc/shmget/shmget04.c | 2 --
> testcases/kernel/syscalls/ipc/shmget/shmget05.c | 2 --
> testcases/kernel/syscalls/ipc/shmget/shmget06.c | 2 --
> testcases/kernel/syscalls/kcmp/kcmp01.c | 2 --
> testcases/kernel/syscalls/kcmp/kcmp02.c | 2 --
> testcases/kernel/syscalls/kcmp/kcmp03.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl01.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl02.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl03.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl04.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl05.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl06.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl07.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl08.c | 2 --
> testcases/kernel/syscalls/keyctl/keyctl09.c | 2 --
> testcases/kernel/syscalls/kill/kill13.c | 2 --
> testcases/kernel/syscalls/landlock/landlock01.c | 2 --
> testcases/kernel/syscalls/landlock/landlock02.c | 2 --
> testcases/kernel/syscalls/landlock/landlock03.c | 2 --
> testcases/kernel/syscalls/landlock/landlock04.c | 2 --
> testcases/kernel/syscalls/landlock/landlock05.c | 2 --
> testcases/kernel/syscalls/landlock/landlock06.c | 2 --
> testcases/kernel/syscalls/landlock/landlock07.c | 2 --
> testcases/kernel/syscalls/landlock/landlock08.c | 2 --
> testcases/kernel/syscalls/lgetxattr/lgetxattr01.c | 2 --
> testcases/kernel/syscalls/lgetxattr/lgetxattr02.c | 2 --
> testcases/kernel/syscalls/link/link02.c | 2 --
> testcases/kernel/syscalls/link/link04.c | 2 --
> testcases/kernel/syscalls/link/link05.c | 2 --
> testcases/kernel/syscalls/link/link08.c | 2 --
> testcases/kernel/syscalls/listmount/listmount01.c | 2 --
> testcases/kernel/syscalls/listmount/listmount02.c | 2 --
> testcases/kernel/syscalls/listmount/listmount03.c | 2 --
> testcases/kernel/syscalls/listmount/listmount04.c | 2 --
> testcases/kernel/syscalls/listxattr/listxattr01.c | 2 --
> testcases/kernel/syscalls/listxattr/listxattr02.c | 2 --
> testcases/kernel/syscalls/listxattr/listxattr03.c | 2 --
> testcases/kernel/syscalls/llistxattr/llistxattr01.c | 2 --
> testcases/kernel/syscalls/llistxattr/llistxattr02.c | 2 --
> testcases/kernel/syscalls/llistxattr/llistxattr03.c | 2 --
> testcases/kernel/syscalls/lremovexattr/lremovexattr01.c | 2 --
> testcases/kernel/syscalls/lstat/lstat03.c | 2 --
> testcases/kernel/syscalls/madvise/madvise03.c | 2 --
> testcases/kernel/syscalls/madvise/madvise06.c | 2 --
> testcases/kernel/syscalls/madvise/madvise11.c | 2 --
> testcases/kernel/syscalls/madvise/madvise12.c | 2 --
> testcases/kernel/syscalls/mallinfo/mallinfo01.c | 2 --
> testcases/kernel/syscalls/mallinfo/mallinfo02.c | 2 --
> testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c | 2 --
> testcases/kernel/syscalls/mallopt/mallopt01.c | 2 --
> testcases/kernel/syscalls/memcmp/memcmp01.c | 2 --
> testcases/kernel/syscalls/memcpy/memcpy01.c | 2 --
> testcases/kernel/syscalls/memfd_create/memfd_create04.c | 2 --
> testcases/kernel/syscalls/memset/memset01.c | 2 --
> testcases/kernel/syscalls/mincore/mincore02.c | 2 --
> testcases/kernel/syscalls/mkdir/mkdir02.c | 2 --
> testcases/kernel/syscalls/mkdir/mkdir03.c | 2 --
> testcases/kernel/syscalls/mkdir/mkdir09.c | 2 --
> testcases/kernel/syscalls/mknod/mknod01.c | 2 --
> testcases/kernel/syscalls/mknod/mknod02.c | 2 --
> testcases/kernel/syscalls/mknod/mknod09.c | 2 --
> testcases/kernel/syscalls/mlock/mlock01.c | 2 --
> testcases/kernel/syscalls/mlock/mlock02.c | 2 --
> testcases/kernel/syscalls/mlock/mlock03.c | 2 --
> testcases/kernel/syscalls/mlock/mlock04.c | 2 --
> testcases/kernel/syscalls/mlock/mlock05.c | 2 --
> testcases/kernel/syscalls/mmap/mmap01.c | 2 --
> testcases/kernel/syscalls/mmap/mmap02.c | 2 --
> testcases/kernel/syscalls/mmap/mmap04.c | 2 --
> testcases/kernel/syscalls/mmap/mmap05.c | 2 --
> testcases/kernel/syscalls/mmap/mmap06.c | 2 --
> testcases/kernel/syscalls/mmap/mmap08.c | 2 --
> testcases/kernel/syscalls/mmap/mmap09.c | 2 --
> testcases/kernel/syscalls/mmap/mmap13.c | 2 --
> testcases/kernel/syscalls/mmap/mmap14.c | 2 --
> testcases/kernel/syscalls/mmap/mmap15.c | 2 --
> testcases/kernel/syscalls/mmap/mmap16.c | 2 --
> testcases/kernel/syscalls/mmap/mmap19.c | 2 --
> testcases/kernel/syscalls/mmap/mmap20.c | 2 --
> testcases/kernel/syscalls/mount/mount01.c | 2 --
> testcases/kernel/syscalls/mount/mount02.c | 2 --
> testcases/kernel/syscalls/mount/mount03.c | 2 --
> testcases/kernel/syscalls/mount/mount04.c | 2 --
> testcases/kernel/syscalls/mount/mount05.c | 2 --
> testcases/kernel/syscalls/mount/mount06.c | 2 --
> testcases/kernel/syscalls/mount/mount07.c | 2 --
> testcases/kernel/syscalls/mount_setattr/mount_setattr01.c | 2 --
> testcases/kernel/syscalls/move_pages/move_pages04.c | 2 --
> testcases/kernel/syscalls/move_pages/move_pages12.c | 2 --
> testcases/kernel/syscalls/mprotect/mprotect05.c | 2 --
> testcases/kernel/syscalls/mq_notify/mq_notify02.c | 2 --
> testcases/kernel/syscalls/mq_notify/mq_notify03.c | 2 --
> testcases/kernel/syscalls/mremap/mremap06.c | 2 --
> testcases/kernel/syscalls/mseal/mseal01.c | 2 --
> testcases/kernel/syscalls/mseal/mseal02.c | 2 --
> testcases/kernel/syscalls/msync/msync04.c | 2 --
> testcases/kernel/syscalls/munlock/munlock01.c | 2 --
> testcases/kernel/syscalls/munlock/munlock02.c | 2 --
> testcases/kernel/syscalls/munlockall/munlockall01.c | 2 --
> .../kernel/syscalls/name_to_handle_at/name_to_handle_at01.c | 2 --
> .../kernel/syscalls/name_to_handle_at/name_to_handle_at02.c | 2 --
> testcases/kernel/syscalls/nanosleep/nanosleep01.c | 2 --
> testcases/kernel/syscalls/nanosleep/nanosleep04.c | 2 --
> testcases/kernel/syscalls/nice/nice01.c | 2 --
> testcases/kernel/syscalls/nice/nice02.c | 2 --
> testcases/kernel/syscalls/nice/nice03.c | 2 --
> testcases/kernel/syscalls/nice/nice04.c | 2 --
> testcases/kernel/syscalls/nice/nice05.c | 2 --
> testcases/kernel/syscalls/open/open02.c | 2 --
> testcases/kernel/syscalls/open/open03.c | 2 --
> testcases/kernel/syscalls/open/open04.c | 2 --
> testcases/kernel/syscalls/open/open06.c | 2 --
> testcases/kernel/syscalls/open/open07.c | 2 --
> testcases/kernel/syscalls/open/open08.c | 2 --
> testcases/kernel/syscalls/open/open09.c | 2 --
> testcases/kernel/syscalls/open/open10.c | 2 --
> testcases/kernel/syscalls/open/open11.c | 2 --
> testcases/kernel/syscalls/open/open15.c | 2 --
> .../kernel/syscalls/open_by_handle_at/open_by_handle_at01.c | 2 --
> .../kernel/syscalls/open_by_handle_at/open_by_handle_at02.c | 2 --
> testcases/kernel/syscalls/openat/openat01.c | 2 --
> testcases/kernel/syscalls/openat/openat04.c | 2 --
> testcases/kernel/syscalls/pathconf/pathconf01.c | 2 --
> testcases/kernel/syscalls/pathconf/pathconf02.c | 2 --
> testcases/kernel/syscalls/personality/personality01.c | 2 --
> testcases/kernel/syscalls/personality/personality02.c | 2 --
> testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c | 2 --
> testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c | 2 --
> testcases/kernel/syscalls/pidfd_open/pidfd_open01.c | 2 --
> testcases/kernel/syscalls/pidfd_open/pidfd_open02.c | 2 --
> testcases/kernel/syscalls/pidfd_open/pidfd_open03.c | 2 --
> testcases/kernel/syscalls/pidfd_open/pidfd_open04.c | 2 --
> .../kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c | 2 --
> .../kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c | 2 --
> .../kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c | 2 --
> testcases/kernel/syscalls/pipe/pipe03.c | 2 --
> testcases/kernel/syscalls/pipe/pipe06.c | 2 --
> testcases/kernel/syscalls/pipe/pipe07.c | 2 --
> testcases/kernel/syscalls/pipe/pipe08.c | 2 --
> testcases/kernel/syscalls/pipe/pipe10.c | 2 --
> testcases/kernel/syscalls/pipe/pipe14.c | 2 --
> testcases/kernel/syscalls/pipe/pipe15.c | 2 --
> testcases/kernel/syscalls/pkeys/pkey01.c | 2 --
> testcases/kernel/syscalls/prctl/prctl01.c | 2 --
> testcases/kernel/syscalls/prctl/prctl02.c | 2 --
> testcases/kernel/syscalls/prctl/prctl03.c | 2 --
> testcases/kernel/syscalls/prctl/prctl05.c | 2 --
> testcases/kernel/syscalls/prctl/prctl06.c | 2 --
> testcases/kernel/syscalls/prctl/prctl07.c | 2 --
> testcases/kernel/syscalls/prctl/prctl08.c | 2 --
> testcases/kernel/syscalls/prctl/prctl09.c | 2 --
> testcases/kernel/syscalls/prctl/prctl10.c | 2 --
> testcases/kernel/syscalls/pread/pread01.c | 2 --
> testcases/kernel/syscalls/pread/pread02.c | 2 --
> testcases/kernel/syscalls/preadv/preadv01.c | 2 --
> testcases/kernel/syscalls/preadv/preadv02.c | 2 --
> testcases/kernel/syscalls/preadv/preadv03.c | 2 --
> testcases/kernel/syscalls/preadv2/preadv201.c | 2 --
> testcases/kernel/syscalls/preadv2/preadv202.c | 2 --
> testcases/kernel/syscalls/process_madvise/process_madvise01.c | 2 --
> testcases/kernel/syscalls/pselect/pselect02.c | 2 --
> testcases/kernel/syscalls/ptrace/ptrace05.c | 2 --
> testcases/kernel/syscalls/ptrace/ptrace06.c | 2 --
> testcases/kernel/syscalls/ptrace/ptrace11.c | 2 --
> testcases/kernel/syscalls/pwrite/pwrite01.c | 2 --
> testcases/kernel/syscalls/pwrite/pwrite02.c | 2 --
> testcases/kernel/syscalls/pwrite/pwrite03.c | 2 --
> testcases/kernel/syscalls/pwrite/pwrite04.c | 2 --
> testcases/kernel/syscalls/pwritev/pwritev01.c | 2 --
> testcases/kernel/syscalls/pwritev/pwritev02.c | 2 --
> testcases/kernel/syscalls/pwritev/pwritev03.c | 2 --
> testcases/kernel/syscalls/pwritev2/pwritev201.c | 2 --
> testcases/kernel/syscalls/pwritev2/pwritev202.c | 2 --
> testcases/kernel/syscalls/quotactl/quotactl01.c | 1 -
> testcases/kernel/syscalls/quotactl/quotactl02.c | 2 --
> testcases/kernel/syscalls/quotactl/quotactl03.c | 2 --
> testcases/kernel/syscalls/quotactl/quotactl04.c | 2 --
> testcases/kernel/syscalls/quotactl/quotactl05.c | 2 --
> testcases/kernel/syscalls/quotactl/quotactl06.c | 2 --
> testcases/kernel/syscalls/quotactl/quotactl07.c | 2 --
> testcases/kernel/syscalls/quotactl/quotactl08.c | 1 -
> testcases/kernel/syscalls/quotactl/quotactl09.c | 2 --
> testcases/kernel/syscalls/read/read03.c | 2 --
> testcases/kernel/syscalls/read/read04.c | 2 --
> testcases/kernel/syscalls/readahead/readahead01.c | 2 --
> testcases/kernel/syscalls/readdir/readdir01.c | 2 --
> testcases/kernel/syscalls/readdir/readdir21.c | 2 --
> testcases/kernel/syscalls/readlink/readlink01.c | 2 --
> testcases/kernel/syscalls/readlink/readlink03.c | 2 --
> testcases/kernel/syscalls/readlinkat/readlinkat01.c | 2 --
> testcases/kernel/syscalls/readlinkat/readlinkat02.c | 2 --
> testcases/kernel/syscalls/readv/readv02.c | 2 --
> testcases/kernel/syscalls/realpath/realpath01.c | 2 --
> testcases/kernel/syscalls/reboot/reboot01.c | 2 --
> testcases/kernel/syscalls/reboot/reboot02.c | 1 -
> testcases/kernel/syscalls/recvmsg/recvmsg01.c | 2 --
> testcases/kernel/syscalls/rename/rename01.c | 2 --
> testcases/kernel/syscalls/rename/rename03.c | 2 --
> testcases/kernel/syscalls/rename/rename04.c | 2 --
> testcases/kernel/syscalls/rename/rename05.c | 2 --
> testcases/kernel/syscalls/rename/rename06.c | 2 --
> testcases/kernel/syscalls/rename/rename07.c | 2 --
> testcases/kernel/syscalls/rename/rename08.c | 2 --
> testcases/kernel/syscalls/rename/rename09.c | 2 --
> testcases/kernel/syscalls/rename/rename10.c | 2 --
> testcases/kernel/syscalls/rename/rename12.c | 2 --
> testcases/kernel/syscalls/rename/rename13.c | 2 --
> testcases/kernel/syscalls/rename/rename15.c | 2 --
> testcases/kernel/syscalls/request_key/request_key01.c | 2 --
> testcases/kernel/syscalls/request_key/request_key02.c | 2 --
> testcases/kernel/syscalls/request_key/request_key03.c | 2 --
> testcases/kernel/syscalls/request_key/request_key04.c | 2 --
> testcases/kernel/syscalls/request_key/request_key05.c | 2 --
> testcases/kernel/syscalls/request_key/request_key06.c | 2 --
> testcases/kernel/syscalls/rmdir/rmdir02.c | 2 --
> testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c | 2 --
> testcases/kernel/syscalls/sbrk/sbrk01.c | 2 --
> testcases/kernel/syscalls/sbrk/sbrk02.c | 2 --
> testcases/kernel/syscalls/sbrk/sbrk03.c | 2 --
> .../syscalls/sched_get_priority_max/sched_get_priority_max01.c | 2 --
> .../syscalls/sched_get_priority_max/sched_get_priority_max02.c | 2 --
> .../syscalls/sched_get_priority_min/sched_get_priority_min01.c | 2 --
> .../syscalls/sched_get_priority_min/sched_get_priority_min02.c | 2 --
> testcases/kernel/syscalls/sched_getattr/sched_getattr02.c | 2 --
> testcases/kernel/syscalls/sched_getparam/sched_getparam01.c | 2 --
> testcases/kernel/syscalls/sched_getparam/sched_getparam03.c | 2 --
> .../kernel/syscalls/sched_getscheduler/sched_getscheduler01.c | 2 --
> .../kernel/syscalls/sched_getscheduler/sched_getscheduler02.c | 2 --
> .../syscalls/sched_rr_get_interval/sched_rr_get_interval01.c | 2 --
> .../syscalls/sched_rr_get_interval/sched_rr_get_interval02.c | 2 --
> .../syscalls/sched_rr_get_interval/sched_rr_get_interval03.c | 2 --
> .../kernel/syscalls/sched_setaffinity/sched_setaffinity01.c | 2 --
> testcases/kernel/syscalls/sched_setparam/sched_setparam01.c | 2 --
> testcases/kernel/syscalls/sched_setparam/sched_setparam02.c | 2 --
> testcases/kernel/syscalls/sched_setparam/sched_setparam03.c | 2 --
> testcases/kernel/syscalls/sched_setparam/sched_setparam04.c | 2 --
> testcases/kernel/syscalls/sched_setparam/sched_setparam05.c | 2 --
> .../kernel/syscalls/sched_setscheduler/sched_setscheduler01.c | 2 --
> .../kernel/syscalls/sched_setscheduler/sched_setscheduler02.c | 2 --
> .../kernel/syscalls/sched_setscheduler/sched_setscheduler04.c | 2 --
> testcases/kernel/syscalls/seccomp/seccomp01.c | 2 --
> testcases/kernel/syscalls/select/select04.c | 2 --
> testcases/kernel/syscalls/send/send02.c | 2 --
> testcases/kernel/syscalls/sendfile/sendfile02.c | 2 --
> testcases/kernel/syscalls/sendfile/sendfile03.c | 2 --
> testcases/kernel/syscalls/sendfile/sendfile04.c | 2 --
> testcases/kernel/syscalls/sendfile/sendfile05.c | 2 --
> testcases/kernel/syscalls/sendfile/sendfile06.c | 2 --
> testcases/kernel/syscalls/sendfile/sendfile07.c | 2 --
> testcases/kernel/syscalls/sendfile/sendfile08.c | 2 --
> testcases/kernel/syscalls/sendfile/sendfile09.c | 2 --
> testcases/kernel/syscalls/sendmsg/sendmsg03.c | 2 --
> testcases/kernel/syscalls/sendto/sendto02.c | 2 --
> testcases/kernel/syscalls/sendto/sendto03.c | 2 --
> testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c | 2 --
> testcases/kernel/syscalls/set_tid_address/set_tid_address01.c | 2 --
> testcases/kernel/syscalls/setegid/setegid01.c | 2 --
> testcases/kernel/syscalls/setegid/setegid02.c | 2 --
> testcases/kernel/syscalls/setfsgid/setfsgid01.c | 2 --
> testcases/kernel/syscalls/setfsgid/setfsgid02.c | 2 --
> testcases/kernel/syscalls/setfsuid/setfsuid01.c | 2 --
> testcases/kernel/syscalls/setfsuid/setfsuid02.c | 2 --
> testcases/kernel/syscalls/setfsuid/setfsuid03.c | 2 --
> testcases/kernel/syscalls/setgid/setgid01.c | 2 --
> testcases/kernel/syscalls/setgid/setgid02.c | 2 --
> testcases/kernel/syscalls/setgroups/setgroups01.c | 2 --
> testcases/kernel/syscalls/setgroups/setgroups02.c | 2 --
> testcases/kernel/syscalls/setgroups/setgroups03.c | 2 --
> testcases/kernel/syscalls/setitimer/setitimer01.c | 2 --
> testcases/kernel/syscalls/setitimer/setitimer02.c | 2 --
> testcases/kernel/syscalls/setpgid/setpgid01.c | 2 --
> testcases/kernel/syscalls/setpgid/setpgid02.c | 2 --
> testcases/kernel/syscalls/setpgid/setpgid03.c | 2 --
> testcases/kernel/syscalls/setpgrp/setpgrp02.c | 2 --
> testcases/kernel/syscalls/setregid/setregid01.c | 2 --
> testcases/kernel/syscalls/setresgid/setresgid01.c | 2 --
> testcases/kernel/syscalls/setresgid/setresgid02.c | 2 --
> testcases/kernel/syscalls/setresgid/setresgid03.c | 2 --
> testcases/kernel/syscalls/setresgid/setresgid04.c | 2 --
> testcases/kernel/syscalls/setresuid/setresuid01.c | 2 --
> testcases/kernel/syscalls/setresuid/setresuid02.c | 2 --
> testcases/kernel/syscalls/setresuid/setresuid03.c | 2 --
> testcases/kernel/syscalls/setresuid/setresuid04.c | 2 --
> testcases/kernel/syscalls/setresuid/setresuid05.c | 2 --
> testcases/kernel/syscalls/setreuid/setreuid01.c | 2 --
> testcases/kernel/syscalls/setreuid/setreuid02.c | 2 --
> testcases/kernel/syscalls/setreuid/setreuid03.c | 2 --
> testcases/kernel/syscalls/setreuid/setreuid04.c | 2 --
> testcases/kernel/syscalls/setreuid/setreuid05.c | 2 --
> testcases/kernel/syscalls/setreuid/setreuid06.c | 2 --
> testcases/kernel/syscalls/setreuid/setreuid07.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt01.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt02.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt03.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt04.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt05.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt06.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt07.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt08.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt09.c | 2 --
> testcases/kernel/syscalls/setsockopt/setsockopt10.c | 2 --
> testcases/kernel/syscalls/settimeofday/settimeofday01.c | 2 --
> testcases/kernel/syscalls/settimeofday/settimeofday02.c | 2 --
> testcases/kernel/syscalls/setuid/setuid01.c | 2 --
> testcases/kernel/syscalls/setuid/setuid03.c | 2 --
> testcases/kernel/syscalls/setxattr/setxattr01.c | 2 --
> testcases/kernel/syscalls/setxattr/setxattr02.c | 2 --
> testcases/kernel/syscalls/setxattr/setxattr03.c | 2 --
> testcases/kernel/syscalls/shutdown/shutdown01.c | 2 --
> testcases/kernel/syscalls/shutdown/shutdown02.c | 2 --
> testcases/kernel/syscalls/sigaltstack/sigaltstack02.c | 2 --
> testcases/kernel/syscalls/sighold/sighold02.c | 2 --
> testcases/kernel/syscalls/signal/signal01.c | 2 --
> testcases/kernel/syscalls/signal/signal02.c | 2 --
> testcases/kernel/syscalls/signal/signal03.c | 2 --
> testcases/kernel/syscalls/signal/signal04.c | 2 --
> testcases/kernel/syscalls/signal/signal05.c | 2 --
> testcases/kernel/syscalls/signalfd/signalfd01.c | 2 --
> testcases/kernel/syscalls/signalfd/signalfd02.c | 2 --
> testcases/kernel/syscalls/sigsuspend/sigsuspend01.c | 2 --
> testcases/kernel/syscalls/sigsuspend/sigsuspend02.c | 2 --
> testcases/kernel/syscalls/socket/socket01.c | 2 --
> testcases/kernel/syscalls/socket/socket02.c | 2 --
> testcases/kernel/syscalls/socketcall/socketcall01.c | 2 --
> testcases/kernel/syscalls/socketpair/socketpair01.c | 2 --
> testcases/kernel/syscalls/socketpair/socketpair02.c | 2 --
> testcases/kernel/syscalls/splice/splice02.c | 1 -
> testcases/kernel/syscalls/splice/splice03.c | 2 --
> testcases/kernel/syscalls/splice/splice06.c | 2 --
> testcases/kernel/syscalls/splice/splice07.c | 2 --
> testcases/kernel/syscalls/splice/splice08.c | 2 --
> testcases/kernel/syscalls/splice/splice09.c | 2 --
> testcases/kernel/syscalls/stat/stat01.c | 2 --
> testcases/kernel/syscalls/stat/stat03.c | 2 --
> testcases/kernel/syscalls/stat/stat04.c | 2 --
> testcases/kernel/syscalls/statfs/statfs01.c | 2 --
> testcases/kernel/syscalls/statfs/statfs02.c | 2 --
> testcases/kernel/syscalls/statfs/statfs03.c | 2 --
> testcases/kernel/syscalls/statmount/statmount01.c | 2 --
> testcases/kernel/syscalls/statmount/statmount02.c | 2 --
> testcases/kernel/syscalls/statmount/statmount03.c | 2 --
> testcases/kernel/syscalls/statmount/statmount04.c | 2 --
> testcases/kernel/syscalls/statmount/statmount05.c | 2 --
> testcases/kernel/syscalls/statmount/statmount06.c | 2 --
> testcases/kernel/syscalls/statmount/statmount07.c | 2 --
> testcases/kernel/syscalls/statmount/statmount08.c | 2 --
> testcases/kernel/syscalls/statvfs/statvfs01.c | 2 --
> testcases/kernel/syscalls/statvfs/statvfs02.c | 2 --
> testcases/kernel/syscalls/statx/statx01.c | 2 --
> testcases/kernel/syscalls/statx/statx02.c | 2 --
> testcases/kernel/syscalls/statx/statx03.c | 2 --
> testcases/kernel/syscalls/statx/statx04.c | 2 --
> testcases/kernel/syscalls/statx/statx05.c | 2 --
> testcases/kernel/syscalls/statx/statx06.c | 2 --
> testcases/kernel/syscalls/statx/statx07.c | 2 --
> testcases/kernel/syscalls/statx/statx08.c | 2 --
> testcases/kernel/syscalls/statx/statx09.c | 2 --
> testcases/kernel/syscalls/statx/statx10.c | 2 --
> testcases/kernel/syscalls/statx/statx11.c | 2 --
> testcases/kernel/syscalls/statx/statx12.c | 2 --
> testcases/kernel/syscalls/swapoff/swapoff01.c | 2 --
> testcases/kernel/syscalls/swapoff/swapoff02.c | 2 --
> testcases/kernel/syscalls/swapon/swapon01.c | 2 --
> testcases/kernel/syscalls/swapon/swapon02.c | 2 --
> testcases/kernel/syscalls/swapon/swapon03.c | 2 --
> testcases/kernel/syscalls/symlink/symlink02.c | 2 --
> testcases/kernel/syscalls/symlink/symlink04.c | 2 --
> testcases/kernel/syscalls/sync_file_range/sync_file_range01.c | 2 --
> testcases/kernel/syscalls/sync_file_range/sync_file_range02.c | 2 --
> testcases/kernel/syscalls/syscall/syscall01.c | 2 --
> testcases/kernel/syscalls/sysfs/sysfs01.c | 2 --
> testcases/kernel/syscalls/sysfs/sysfs02.c | 2 --
> testcases/kernel/syscalls/sysfs/sysfs03.c | 2 --
> testcases/kernel/syscalls/sysfs/sysfs04.c | 2 --
> testcases/kernel/syscalls/sysfs/sysfs05.c | 2 --
> testcases/kernel/syscalls/syslog/syslog11.c | 2 --
> testcases/kernel/syscalls/syslog/syslog12.c | 2 --
> testcases/kernel/syscalls/tee/tee02.c | 2 --
> testcases/kernel/syscalls/time/time01.c | 1 -
> testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c | 2 --
> testcases/kernel/syscalls/timerfd/timerfd02.c | 2 --
> testcases/kernel/syscalls/timerfd/timerfd_create01.c | 2 --
> testcases/kernel/syscalls/times/times01.c | 2 --
> testcases/kernel/syscalls/tkill/tkill01.c | 2 --
> testcases/kernel/syscalls/tkill/tkill02.c | 2 --
> testcases/kernel/syscalls/truncate/truncate02.c | 2 --
> testcases/kernel/syscalls/truncate/truncate03.c | 2 --
> testcases/kernel/syscalls/umount/umount01.c | 2 --
> testcases/kernel/syscalls/umount/umount02.c | 2 --
> testcases/kernel/syscalls/umount/umount03.c | 2 --
> testcases/kernel/syscalls/umount2/umount2_02.c | 2 --
> testcases/kernel/syscalls/unlink/unlink05.c | 2 --
> testcases/kernel/syscalls/unlink/unlink07.c | 2 --
> testcases/kernel/syscalls/unlink/unlink08.c | 2 --
> testcases/kernel/syscalls/unlink/unlink09.c | 2 --
> testcases/kernel/syscalls/unlink/unlink10.c | 2 --
> testcases/kernel/syscalls/unlinkat/unlinkat01.c | 1 -
> testcases/kernel/syscalls/unshare/unshare01.c | 2 --
> testcases/kernel/syscalls/unshare/unshare02.c | 2 --
> testcases/kernel/syscalls/utime/utime01.c | 2 --
> testcases/kernel/syscalls/utime/utime02.c | 2 --
> testcases/kernel/syscalls/utime/utime03.c | 2 --
> testcases/kernel/syscalls/utime/utime04.c | 2 --
> testcases/kernel/syscalls/utime/utime05.c | 2 --
> testcases/kernel/syscalls/utime/utime06.c | 2 --
> testcases/kernel/syscalls/utime/utime07.c | 2 --
> testcases/kernel/syscalls/utimensat/utimensat01.c | 2 --
> testcases/kernel/syscalls/utimes/utimes01.c | 2 --
> testcases/kernel/syscalls/vmsplice/vmsplice02.c | 2 --
> testcases/kernel/syscalls/wait/wait01.c | 2 --
> testcases/kernel/syscalls/wait/wait02.c | 2 --
> testcases/kernel/syscalls/wait4/wait402.c | 2 --
> testcases/kernel/syscalls/wait4/wait403.c | 2 --
> testcases/kernel/syscalls/waitid/waitid01.c | 2 --
> testcases/kernel/syscalls/waitid/waitid02.c | 2 --
> testcases/kernel/syscalls/waitid/waitid03.c | 2 --
> testcases/kernel/syscalls/waitid/waitid04.c | 2 --
> testcases/kernel/syscalls/waitid/waitid05.c | 2 --
> testcases/kernel/syscalls/waitid/waitid06.c | 2 --
> testcases/kernel/syscalls/waitid/waitid07.c | 2 --
> testcases/kernel/syscalls/waitid/waitid08.c | 2 --
> testcases/kernel/syscalls/waitid/waitid09.c | 2 --
> testcases/kernel/syscalls/waitid/waitid10.c | 2 --
> testcases/kernel/syscalls/waitid/waitid11.c | 2 --
> testcases/kernel/syscalls/waitpid/waitpid01.c | 2 --
> testcases/kernel/syscalls/waitpid/waitpid03.c | 2 --
> testcases/kernel/syscalls/waitpid/waitpid04.c | 2 --
> testcases/kernel/syscalls/write/write02.c | 2 --
> testcases/kernel/syscalls/write/write04.c | 2 --
> testcases/kernel/syscalls/write/write05.c | 2 --
> testcases/kernel/syscalls/write/write06.c | 2 --
> testcases/kernel/syscalls/writev/writev03.c | 2 --
> testcases/kernel/syscalls/writev/writev07.c | 2 --
> testcases/kernel/uevents/uevent01.c | 1 -
> testcases/kernel/uevents/uevent02.c | 2 --
> testcases/kernel/uevents/uevent03.c | 1 -
> testcases/kernel/watchqueue/wqueue01.c | 2 --
> testcases/kernel/watchqueue/wqueue02.c | 2 --
> testcases/kernel/watchqueue/wqueue03.c | 2 --
> testcases/kernel/watchqueue/wqueue04.c | 2 --
> testcases/kernel/watchqueue/wqueue05.c | 2 --
> testcases/kernel/watchqueue/wqueue06.c | 2 --
> testcases/kernel/watchqueue/wqueue07.c | 2 --
> testcases/kernel/watchqueue/wqueue08.c | 2 --
> testcases/kernel/watchqueue/wqueue09.c | 2 --
> testcases/lib/tst_ns_create.c | 2 --
> testcases/lib/tst_ns_exec.c | 2 --
> testcases/lib/tst_ns_ifmove.c | 2 --
> testcases/network/can/cve/can_bcm01.c | 2 --
> testcases/network/iptables/nft02.c | 2 --
> testcases/network/lib6/asapi_02.c | 2 --
> testcases/network/lib6/getaddrinfo_01.c | 2 --
> testcases/network/lib6/in6_01.c | 2 --
> testcases/network/lib6/in6_02.c | 2 --
> testcases/network/nfs/nfslock01/nfs_flock.c | 2 --
> testcases/network/nfs/nfslock01/nfs_flock_dgen.c | 2 --
> testcases/network/sctp/sctp_big_chunk.c | 2 --
> testcases/network/sockets/vsock01.c | 2 --
> testcases/realtime/func/matrix_mult/matrix_mult.c | 2 --
> testcases/realtime/func/sched_football/sched_football.c | 2 --
> 973 files changed, 1907 deletions(-)
>
> diff --git a/doc/developers/test_case_tutorial.rst b/doc/developers/test_case_tutorial.rst
> index 1464f50d70..04820f2223 100644
> --- a/doc/developers/test_case_tutorial.rst
> +++ b/doc/developers/test_case_tutorial.rst
> @@ -111,7 +111,6 @@ kernel version if necessary. I will explain what the code does below.
> */
>
> /*\
> - * [Description]
> *
> * All tests should start with a description of _what_ we are testing.
> * Non-trivial explanations of _how_ the code works should also go here.
> diff --git a/doc/old/C-Test-API.asciidoc b/doc/old/C-Test-API.asciidoc
> index 8a531ccb0f..3fe9cd1d9e 100644
> --- a/doc/old/C-Test-API.asciidoc
> +++ b/doc/old/C-Test-API.asciidoc
> @@ -17,7 +17,6 @@ Let's start with an example, following code is a simple test for a 'getenv()'.
> [source,c]
> -------------------------------------------------------------------------------
> /*\
> - * [Description]
> * Tests basic functionality of getenv().
> *
> * - create an env variable and verify that getenv() can get it
> diff --git a/include/tst_cgroup.h b/include/tst_cgroup.h
> index d23a8e652b..3f4d30fa7c 100644
> --- a/include/tst_cgroup.h
> +++ b/include/tst_cgroup.h
> @@ -5,8 +5,6 @@
> * Copyright (c) 2020-2021 SUSE LLC <rpalethorpe@suse.com>
> */
> /*\
> - * [Description]
> - *
> * The LTP CGroups API tries to present a consistent interface to the
> * many possible CGroup configurations a system could have.
> *
> diff --git a/lib/newlib_tests/tst_fuzzy_sync01.c b/lib/newlib_tests/tst_fuzzy_sync01.c
> index 2d440df5b0..6c361e8cc3 100644
> --- a/lib/newlib_tests/tst_fuzzy_sync01.c
> +++ b/lib/newlib_tests/tst_fuzzy_sync01.c
> @@ -3,8 +3,6 @@
> * Copyright (c) 2021 Richard Palethorpe <rpalethorpe@suse.com>
> */
> /*
> - * [Description]
> - *
> * This verifies Fuzzy Sync's basic ability to reproduce a particular
> * outcome to a data race when the critical sections are not aligned.
> *
> diff --git a/lib/newlib_tests/tst_fuzzy_sync02.c b/lib/newlib_tests/tst_fuzzy_sync02.c
> index c81ebc7eaa..0a595b1e2b 100644
> --- a/lib/newlib_tests/tst_fuzzy_sync02.c
> +++ b/lib/newlib_tests/tst_fuzzy_sync02.c
> @@ -3,8 +3,6 @@
> * Copyright (c) 2021 Richard Palethorpe <rpalethorpe@suse.com>
> */
> /*
> - * [Description]
> - *
> * This verifies Fuzzy Sync's ability to reproduce a particular
> * outcome to a data race when multiple races are present.
> *
> diff --git a/testcases/cve/cve-2014-0196.c b/testcases/cve/cve-2014-0196.c
> index cd68e596cf..5e5b55e071 100644
> --- a/testcases/cve/cve-2014-0196.c
> +++ b/testcases/cve/cve-2014-0196.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2014-0196, which was fixed in kernel v3.15:
> * 4291086b1f08 ("n_tty: Fix n_tty_write crash when echoing in raw mode").
> *
> diff --git a/testcases/cve/cve-2016-10044.c b/testcases/cve/cve-2016-10044.c
> index 31c73f5347..d8d3598bbc 100644
> --- a/testcases/cve/cve-2016-10044.c
> +++ b/testcases/cve/cve-2016-10044.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2016-10044, which was fixed in kernel v4.8:
> * 22f6b4d34fcf ("aio: mark AIO pseudo-fs noexec").
> *
> diff --git a/testcases/cve/cve-2016-7042.c b/testcases/cve/cve-2016-7042.c
> index 7611f6638e..881f891d94 100644
> --- a/testcases/cve/cve-2016-7042.c
> +++ b/testcases/cve/cve-2016-7042.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2016-7042, this regression test can crash the buggy kernel
> * when the stack-protector is enabled, and the bug was fixed in kernel v4.9:
> * 03dab869b7b2 ("KEYS: Fix short sprintf buffer in /proc/keys show function").
> diff --git a/testcases/cve/cve-2016-7117.c b/testcases/cve/cve-2016-7117.c
> index 119eb2f9a9..dbec2b28bc 100644
> --- a/testcases/cve/cve-2016-7117.c
> +++ b/testcases/cve/cve-2016-7117.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2016-7117, which was fixed in kernel v4.6:
> * 34b88a68f26a ("net: Fix use after free in the recvmmsg exit path").
> *
> diff --git a/testcases/cve/cve-2017-16939.c b/testcases/cve/cve-2017-16939.c
> index ec23f10c64..098a868411 100644
> --- a/testcases/cve/cve-2017-16939.c
> +++ b/testcases/cve/cve-2017-16939.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-16939, which was fixed in kernel v4.14:
> * 1137b5e2529a ("ipsec: Fix aborted xfrm policy dump crash").
> *
> diff --git a/testcases/cve/cve-2017-17052.c b/testcases/cve/cve-2017-17052.c
> index 598cd9b52f..700eb782e1 100644
> --- a/testcases/cve/cve-2017-17052.c
> +++ b/testcases/cve/cve-2017-17052.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-17052, which was fixed in kernel v4.13:
> * 2b7e8665b4ff ("fork: fix incorrect fput of ->exe_file causing use-after-free").
> *
> diff --git a/testcases/cve/cve-2017-17053.c b/testcases/cve/cve-2017-17053.c
> index a6cf2551e4..fe7b6d694d 100644
> --- a/testcases/cve/cve-2017-17053.c
> +++ b/testcases/cve/cve-2017-17053.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-17053, which was fixed in kernel 4.13:
> * ccd5b3235180 ("x86/mm: Fix use-after-free of ldt_struct").
> *
> diff --git a/testcases/cve/cve-2017-2618.c b/testcases/cve/cve-2017-2618.c
> index 7d1aca15c2..98a998415e 100644
> --- a/testcases/cve/cve-2017-2618.c
> +++ b/testcases/cve/cve-2017-2618.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-2618, which was fixed in kernel v4.10:
> * 0c461cb727d1 ("selinux: fix off-by-one in setprocattr").
> *
> diff --git a/testcases/cve/cve-2017-2671.c b/testcases/cve/cve-2017-2671.c
> index 3c28317e2e..5d84252488 100644
> --- a/testcases/cve/cve-2017-2671.c
> +++ b/testcases/cve/cve-2017-2671.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-2671 faulty locking on ping socket fixed in kernel v4.11:
> * 43a6684519ab ("ping: implement proper locking").
> *
> diff --git a/testcases/cve/cve-2022-4378.c b/testcases/cve/cve-2022-4378.c
> index 95c0fa5170..e7e2b9af33 100644
> --- a/testcases/cve/cve-2022-4378.c
> +++ b/testcases/cve/cve-2022-4378.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2022-4378 fixed in kernel v6.1:
> * bce9332220bd ("proc: proc_skip_spaces() shouldn't think it is working on C strings").
> *
> diff --git a/testcases/cve/icmp_rate_limit01.c b/testcases/cve/icmp_rate_limit01.c
> index f71be0e081..0305ad0954 100644
> --- a/testcases/cve/icmp_rate_limit01.c
> +++ b/testcases/cve/icmp_rate_limit01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2020-25705 fixed in kernel v5.10:
> * b38e7819cae9 ("icmp: randomize the global rate limiter").
> *
> diff --git a/testcases/cve/meltdown.c b/testcases/cve/meltdown.c
> index c2145291d0..d2c40c1220 100644
> --- a/testcases/cve/meltdown.c
> +++ b/testcases/cve/meltdown.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-5754 (Meltdown).
> *
> * https://meltdownattack.com/
> diff --git a/testcases/cve/stack_clash.c b/testcases/cve/stack_clash.c
> index 8cc2c20b5b..8471e0638f 100644
> --- a/testcases/cve/stack_clash.c
> +++ b/testcases/cve/stack_clash.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a regression test of the Stack Clash [1] vulnerability. This tests
> * that there is at least 256 PAGE_SIZE of stack guard gap which is considered
> * hard to hop above. Code adapted from the Novell's bugzilla [2].
> diff --git a/testcases/cve/tcindex01.c b/testcases/cve/tcindex01.c
> index 4e4a62fdbd..370d7de495 100644
> --- a/testcases/cve/tcindex01.c
> +++ b/testcases/cve/tcindex01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2023-1829
> *
> * Test for use-after-free after removing tcindex traffic filter with certain
> diff --git a/testcases/kernel/containers/mountns/mountns01.c b/testcases/kernel/containers/mountns/mountns01.c
> index 2205eb9689..2c1c978fdb 100644
> --- a/testcases/kernel/containers/mountns/mountns01.c
> +++ b/testcases/kernel/containers/mountns/mountns01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests a shared mount: shared mount can be replicated to as many
> * mountpoints and all the replicas continue to be exactly same.
> *
> diff --git a/testcases/kernel/containers/mountns/mountns02.c b/testcases/kernel/containers/mountns/mountns02.c
> index 56b1b4b6a2..cdc36068da 100644
> --- a/testcases/kernel/containers/mountns/mountns02.c
> +++ b/testcases/kernel/containers/mountns/mountns02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests a private mount: private mount does not forward or receive
> * propagation.
> *
> diff --git a/testcases/kernel/containers/mountns/mountns03.c b/testcases/kernel/containers/mountns/mountns03.c
> index cdceb00d05..2debfd1047 100644
> --- a/testcases/kernel/containers/mountns/mountns03.c
> +++ b/testcases/kernel/containers/mountns/mountns03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests a slave mount: slave mount is like a shared mount except that
> * mount and umount events only propagate towards it.
> *
> diff --git a/testcases/kernel/containers/mountns/mountns04.c b/testcases/kernel/containers/mountns/mountns04.c
> index 752d899205..b87fc8550d 100644
> --- a/testcases/kernel/containers/mountns/mountns04.c
> +++ b/testcases/kernel/containers/mountns/mountns04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests an unbindable mount: unbindable mount is an unbindable
> * private mount.
> *
> diff --git a/testcases/kernel/containers/mqns/mqns_01.c b/testcases/kernel/containers/mqns/mqns_01.c
> index d9f6e6c18a..30e06edf43 100644
> --- a/testcases/kernel/containers/mqns/mqns_01.c
> +++ b/testcases/kernel/containers/mqns/mqns_01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Create a mqueue inside the parent and check if it can be accessed from
> * the child namespace. Isolated and unshared process can't access to parent,
> * but plain process can.
> diff --git a/testcases/kernel/containers/mqns/mqns_02.c b/testcases/kernel/containers/mqns/mqns_02.c
> index aef83a23a6..dc1b215ddb 100644
> --- a/testcases/kernel/containers/mqns/mqns_02.c
> +++ b/testcases/kernel/containers/mqns/mqns_02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Create a mqueue with the same name in both parent and isolated/forked child,
> * then check namespace isolation.
> */
> diff --git a/testcases/kernel/containers/mqns/mqns_03.c b/testcases/kernel/containers/mqns/mqns_03.c
> index 4a0399ddbc..4d3bfc52fb 100644
> --- a/testcases/kernel/containers/mqns/mqns_03.c
> +++ b/testcases/kernel/containers/mqns/mqns_03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test mqueuefs from an isolated/forked process namespace.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/containers/mqns/mqns_04.c b/testcases/kernel/containers/mqns/mqns_04.c
> index 2d943e1b68..d28c330c4d 100644
> --- a/testcases/kernel/containers/mqns/mqns_04.c
> +++ b/testcases/kernel/containers/mqns/mqns_04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test mqueuefs manipulation from child/parent namespaces.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/containers/netns/netns_netlink.c b/testcases/kernel/containers/netns/netns_netlink.c
> index ba55ec70ad..5246b066b9 100644
> --- a/testcases/kernel/containers/netns/netns_netlink.c
> +++ b/testcases/kernel/containers/netns/netns_netlink.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests a netlink interface inside a new network namespace.
> *
> * - Unshares a network namespace (so network related actions
> diff --git a/testcases/kernel/containers/pidns/pidns01.c b/testcases/kernel/containers/pidns/pidns01.c
> index 8b856ec90b..94b8f16d82 100644
> --- a/testcases/kernel/containers/pidns/pidns01.c
> +++ b/testcases/kernel/containers/pidns/pidns01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and check:
> *
> * - child process ID must be 1
> diff --git a/testcases/kernel/containers/pidns/pidns02.c b/testcases/kernel/containers/pidns/pidns02.c
> index f23178cb60..b5e2d607de 100644
> --- a/testcases/kernel/containers/pidns/pidns02.c
> +++ b/testcases/kernel/containers/pidns/pidns02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and check:
> *
> * - child session ID must be 1
> diff --git a/testcases/kernel/containers/pidns/pidns03.c b/testcases/kernel/containers/pidns/pidns03.c
> index d2a6178b9b..31fdb3e4e7 100644
> --- a/testcases/kernel/containers/pidns/pidns03.c
> +++ b/testcases/kernel/containers/pidns/pidns03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and check if procfs mounted folder
> * belongs to the new pid namespace by looking at /proc/self .
> */
> diff --git a/testcases/kernel/containers/pidns/pidns04.c b/testcases/kernel/containers/pidns/pidns04.c
> index fdd532653e..ff106780ad 100644
> --- a/testcases/kernel/containers/pidns/pidns04.c
> +++ b/testcases/kernel/containers/pidns/pidns04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and check that child container does
> * not get kill itself with SIGKILL.
> */
> diff --git a/testcases/kernel/containers/pidns/pidns05.c b/testcases/kernel/containers/pidns/pidns05.c
> index 7843fe7a97..b1666f233a 100644
> --- a/testcases/kernel/containers/pidns/pidns05.c
> +++ b/testcases/kernel/containers/pidns/pidns05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and create many levels of child
> * containers. Then kill container init process from parent and check if all
> * containers have been killed.
> diff --git a/testcases/kernel/containers/pidns/pidns06.c b/testcases/kernel/containers/pidns/pidns06.c
> index a71c844a39..b79a5d4010 100644
> --- a/testcases/kernel/containers/pidns/pidns06.c
> +++ b/testcases/kernel/containers/pidns/pidns06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and check that parent process can't
> * be killed from child namespace.
> */
> diff --git a/testcases/kernel/containers/pidns/pidns10.c b/testcases/kernel/containers/pidns/pidns10.c
> index 7e798420ef..ab6a7a4acf 100644
> --- a/testcases/kernel/containers/pidns/pidns10.c
> +++ b/testcases/kernel/containers/pidns/pidns10.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and check that killing subprocesses
> * from child namespace will raise ESRCH error.
> */
> diff --git a/testcases/kernel/containers/pidns/pidns12.c b/testcases/kernel/containers/pidns/pidns12.c
> index 1811dbc36b..4de4e3d101 100644
> --- a/testcases/kernel/containers/pidns/pidns12.c
> +++ b/testcases/kernel/containers/pidns/pidns12.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and verifies that siginfo->si_pid is
> * set to 0 if sender (parent process) is not in the receiver's namespace.
> */
> diff --git a/testcases/kernel/containers/pidns/pidns13.c b/testcases/kernel/containers/pidns/pidns13.c
> index 65fcc4443d..5b836c01f4 100644
> --- a/testcases/kernel/containers/pidns/pidns13.c
> +++ b/testcases/kernel/containers/pidns/pidns13.c
> @@ -9,8 +9,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The pidns13.c testcase checks container init, for async I/O
> * triggered by peer namespace process.
> *
> diff --git a/testcases/kernel/containers/pidns/pidns16.c b/testcases/kernel/containers/pidns/pidns16.c
> index 313b0a097b..8867a132b5 100644
> --- a/testcases/kernel/containers/pidns/pidns16.c
> +++ b/testcases/kernel/containers/pidns/pidns16.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and verifies that siginfo->si_pid is
> * set to 0 if sender (parent process) sent the signal. Then send signal from
> * container itself and check if siginfo->si_pid is set to 1.
> diff --git a/testcases/kernel/containers/pidns/pidns17.c b/testcases/kernel/containers/pidns/pidns17.c
> index 4633ec14b4..3a85d96725 100644
> --- a/testcases/kernel/containers/pidns/pidns17.c
> +++ b/testcases/kernel/containers/pidns/pidns17.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and spawn many children inside the
> * container. Then terminate all children and check if they were signaled.
> */
> diff --git a/testcases/kernel/containers/pidns/pidns20.c b/testcases/kernel/containers/pidns/pidns20.c
> index 9148208659..aa00800003 100644
> --- a/testcases/kernel/containers/pidns/pidns20.c
> +++ b/testcases/kernel/containers/pidns/pidns20.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag, block SIGUSR1 signal before sending
> * it from parent and check if it's received once SIGUSR1 signal is unblocked.
> */
> diff --git a/testcases/kernel/containers/pidns/pidns30.c b/testcases/kernel/containers/pidns/pidns30.c
> index 4a8bc5e2b8..409b37ec18 100644
> --- a/testcases/kernel/containers/pidns/pidns30.c
> +++ b/testcases/kernel/containers/pidns/pidns30.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag, register notification on a posix
> * mqueue and send a mqueue message from the parent. Then check if signal
> * notification contains si_pid of the parent.
> diff --git a/testcases/kernel/containers/pidns/pidns31.c b/testcases/kernel/containers/pidns/pidns31.c
> index 7312f8bdcb..a8d737091d 100644
> --- a/testcases/kernel/containers/pidns/pidns31.c
> +++ b/testcases/kernel/containers/pidns/pidns31.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag, register notification on a posix
> * mqueue and send a mqueue message from the child. Then check if signal
> * notification contains si_pid of the child.
> diff --git a/testcases/kernel/containers/pidns/pidns32.c b/testcases/kernel/containers/pidns/pidns32.c
> index 0738369b1d..3798f798be 100644
> --- a/testcases/kernel/containers/pidns/pidns32.c
> +++ b/testcases/kernel/containers/pidns/pidns32.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone a process with CLONE_NEWPID flag and check for the maxium amount of
> * nested containers.
> */
> diff --git a/testcases/kernel/containers/sysvipc/mesgq_nstest.c b/testcases/kernel/containers/sysvipc/mesgq_nstest.c
> index 4b12c1ce1d..6c65c5500c 100644
> --- a/testcases/kernel/containers/sysvipc/mesgq_nstest.c
> +++ b/testcases/kernel/containers/sysvipc/mesgq_nstest.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test SysV IPC message passing through different namespaces.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/containers/sysvipc/msg_comm.c b/testcases/kernel/containers/sysvipc/msg_comm.c
> index 3762adb02a..81bd096303 100644
> --- a/testcases/kernel/containers/sysvipc/msg_comm.c
> +++ b/testcases/kernel/containers/sysvipc/msg_comm.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test SysV IPC message passing through different processes.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/containers/sysvipc/sem_comm.c b/testcases/kernel/containers/sysvipc/sem_comm.c
> index d8f0956a7a..ec67526215 100644
> --- a/testcases/kernel/containers/sysvipc/sem_comm.c
> +++ b/testcases/kernel/containers/sysvipc/sem_comm.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test SysV IPC semaphore usage between cloned processes.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/containers/sysvipc/sem_nstest.c b/testcases/kernel/containers/sysvipc/sem_nstest.c
> index 35d55cbac3..133795f067 100644
> --- a/testcases/kernel/containers/sysvipc/sem_nstest.c
> +++ b/testcases/kernel/containers/sysvipc/sem_nstest.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test SysV IPC semaphore usage between namespaces.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/containers/sysvipc/semtest_2ns.c b/testcases/kernel/containers/sysvipc/semtest_2ns.c
> index f03b18f72b..8c26dfd5ce 100644
> --- a/testcases/kernel/containers/sysvipc/semtest_2ns.c
> +++ b/testcases/kernel/containers/sysvipc/semtest_2ns.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test SysV IPC semaphore usage between namespaces and processes.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/containers/sysvipc/shm_comm.c b/testcases/kernel/containers/sysvipc/shm_comm.c
> index e7ba8c8deb..30916deddc 100644
> --- a/testcases/kernel/containers/sysvipc/shm_comm.c
> +++ b/testcases/kernel/containers/sysvipc/shm_comm.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if SysV IPC shared memory is properly working between two different
> * namespaces.
> *
> diff --git a/testcases/kernel/containers/sysvipc/shmem_2nstest.c b/testcases/kernel/containers/sysvipc/shmem_2nstest.c
> index a184cfcb4d..c984ee7269 100644
> --- a/testcases/kernel/containers/sysvipc/shmem_2nstest.c
> +++ b/testcases/kernel/containers/sysvipc/shmem_2nstest.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if SysV IPC shared memory is properly used between two namespaces.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/containers/sysvipc/shmnstest.c b/testcases/kernel/containers/sysvipc/shmnstest.c
> index 63ae62aa6d..aa576eb086 100644
> --- a/testcases/kernel/containers/sysvipc/shmnstest.c
> +++ b/testcases/kernel/containers/sysvipc/shmnstest.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if SysV IPC shared memory with a specific key is shared between
> * processes and namespaces.
> */
> diff --git a/testcases/kernel/containers/userns/userns01.c b/testcases/kernel/containers/userns/userns01.c
> index 6fe0cd6372..6ee9fa7d0c 100644
> --- a/testcases/kernel/containers/userns/userns01.c
> +++ b/testcases/kernel/containers/userns/userns01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that if a user ID has no mapping inside the namespace, user ID and
> * group ID will be the value defined in the file /proc/sys/kernel/overflowuid
> * (defaults to 65534) and /proc/sys/kernel/overflowgid (defaults to 65534). A
> diff --git a/testcases/kernel/containers/userns/userns02.c b/testcases/kernel/containers/userns/userns02.c
> index 3c8ce2133c..d71c5397ff 100644
> --- a/testcases/kernel/containers/userns/userns02.c
> +++ b/testcases/kernel/containers/userns/userns02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the user ID and group ID, which are inside a container,
> * can be modified by its parent process.
> */
> diff --git a/testcases/kernel/containers/userns/userns03.c b/testcases/kernel/containers/userns/userns03.c
> index fca858702b..8fdad59517 100644
> --- a/testcases/kernel/containers/userns/userns03.c
> +++ b/testcases/kernel/containers/userns/userns03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that /proc/PID/uid_map and /proc/PID/gid_map contains three values
> * separated by white space:
> *
> diff --git a/testcases/kernel/containers/userns/userns04.c b/testcases/kernel/containers/userns/userns04.c
> index d20041f062..1ca7bf6e3e 100644
> --- a/testcases/kernel/containers/userns/userns04.c
> +++ b/testcases/kernel/containers/userns/userns04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that if a namespace isn't another namespace's ancestor, the process in
> * first namespace does not have the CAP_SYS_ADMIN capability in the second
> * namespace and the setns() call fails.
> diff --git a/testcases/kernel/containers/userns/userns05.c b/testcases/kernel/containers/userns/userns05.c
> index e7a00af182..f94e7116c2 100644
> --- a/testcases/kernel/containers/userns/userns05.c
> +++ b/testcases/kernel/containers/userns/userns05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that if a process created via fork(2) or clone(2) without the
> * CLONE_NEWUSER flag is a member of the same user namespace as its parent.
> *
> diff --git a/testcases/kernel/containers/userns/userns06.c b/testcases/kernel/containers/userns/userns06.c
> index a270dafdcf..3a1909ce98 100644
> --- a/testcases/kernel/containers/userns/userns06.c
> +++ b/testcases/kernel/containers/userns/userns06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that when a process with non-zero user IDs performs an execve(),
> * the process's capability sets are cleared.
> * When a process with zero user IDs performs an execve(), the process's
> diff --git a/testcases/kernel/containers/userns/userns07.c b/testcases/kernel/containers/userns/userns07.c
> index 2217a5ed03..9e34a3d9bb 100644
> --- a/testcases/kernel/containers/userns/userns07.c
> +++ b/testcases/kernel/containers/userns/userns07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the kernel allows at least 32 nested levels of user namespaces.
> */
>
> diff --git a/testcases/kernel/containers/userns/userns08.c b/testcases/kernel/containers/userns/userns08.c
> index 72d7f8d12d..fbe51c8a57 100644
> --- a/testcases/kernel/containers/userns/userns08.c
> +++ b/testcases/kernel/containers/userns/userns08.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Reproducer of CVE-2018-18955; broken uid/gid mapping for nested
> * user namespaces with >5 ranges
> *
> diff --git a/testcases/kernel/containers/utsname/utsname01.c b/testcases/kernel/containers/utsname/utsname01.c
> index fc5c1a271a..a72ad1c33c 100644
> --- a/testcases/kernel/containers/utsname/utsname01.c
> +++ b/testcases/kernel/containers/utsname/utsname01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone two plain processes and check if both read the same hostname.
> */
>
> diff --git a/testcases/kernel/containers/utsname/utsname02.c b/testcases/kernel/containers/utsname/utsname02.c
> index aa90596d43..b100d212cc 100644
> --- a/testcases/kernel/containers/utsname/utsname02.c
> +++ b/testcases/kernel/containers/utsname/utsname02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone two plain processes, change hostname in the first one then check if
> * hostaname has changed inside the second one as well.
> */
> diff --git a/testcases/kernel/containers/utsname/utsname03.c b/testcases/kernel/containers/utsname/utsname03.c
> index e5a4a56dc3..0680058e79 100644
> --- a/testcases/kernel/containers/utsname/utsname03.c
> +++ b/testcases/kernel/containers/utsname/utsname03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Clone two processes using CLONE_NEWUTS, change hostname from the first
> * container and check if hostname didn't change inside the second one.
> */
> diff --git a/testcases/kernel/containers/utsname/utsname04.c b/testcases/kernel/containers/utsname/utsname04.c
> index bf97880ba9..2bcf61156d 100644
> --- a/testcases/kernel/containers/utsname/utsname04.c
> +++ b/testcases/kernel/containers/utsname/utsname04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Drop root privileges, create a container with CLONE_NEWUTS and verify that
> * we receive a permission error.
> */
> diff --git a/testcases/kernel/controllers/cgroup/cgroup_core01.c b/testcases/kernel/controllers/cgroup/cgroup_core01.c
> index 2e695deed7..11231fbf71 100644
> --- a/testcases/kernel/controllers/cgroup/cgroup_core01.c
> +++ b/testcases/kernel/controllers/cgroup/cgroup_core01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * When a task is writing to an fd opened by a different task, the perm check
> * should use the credentials of the latter task.
> *
> diff --git a/testcases/kernel/controllers/cgroup/cgroup_core02.c b/testcases/kernel/controllers/cgroup/cgroup_core02.c
> index b19bf2e58d..aba387197a 100644
> --- a/testcases/kernel/controllers/cgroup/cgroup_core02.c
> +++ b/testcases/kernel/controllers/cgroup/cgroup_core02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * When a task is writing to an fd opened by a different task, the perm check
> * should use the cgroup namespace of the latter task.
> *
> diff --git a/testcases/kernel/controllers/cgroup/cgroup_core03.c b/testcases/kernel/controllers/cgroup/cgroup_core03.c
> index c0c3485e66..49b8eff404 100644
> --- a/testcases/kernel/controllers/cgroup/cgroup_core03.c
> +++ b/testcases/kernel/controllers/cgroup/cgroup_core03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is copied from kselftest
> * tools/testing/selftests/cgroup/test_kill.c.
> *
> diff --git a/testcases/kernel/controllers/io/io_control01.c b/testcases/kernel/controllers/io/io_control01.c
> index 8b20737c97..93e6aed87e 100644
> --- a/testcases/kernel/controllers/io/io_control01.c
> +++ b/testcases/kernel/controllers/io/io_control01.c
> @@ -3,8 +3,6 @@
> * Copyright (c) 2022 SUSE LLC <rpalethorpe@suse.com>
> */
> /*\
> - *
> - * [Description]
> *
> * Perform some I/O on a file and check if at least some of it is
> * recorded by the I/O controller.
> diff --git a/testcases/kernel/controllers/memcg/memcontrol01.c b/testcases/kernel/controllers/memcg/memcontrol01.c
> index f4fadacddd..f1f5a9df44 100644
> --- a/testcases/kernel/controllers/memcg/memcontrol01.c
> +++ b/testcases/kernel/controllers/memcg/memcontrol01.c
> @@ -1,7 +1,5 @@
> // SPDX-License-Identifier: GPL-2.0-only
> /*\
> - *
> - * [Description]
> *
> * Conversion of the first kself test in cgroup/test_memcontrol.c.
> * This test creates two nested cgroups with and without enabling the
> diff --git a/testcases/kernel/controllers/memcg/memcontrol02.c b/testcases/kernel/controllers/memcg/memcontrol02.c
> index aed6410841..2d47e50427 100644
> --- a/testcases/kernel/controllers/memcg/memcontrol02.c
> +++ b/testcases/kernel/controllers/memcg/memcontrol02.c
> @@ -1,7 +1,5 @@
> // SPDX-License-Identifier: GPL-2.0-only
> /*\
> - *
> - * [Description]
> *
> * Conversion of second kself test in cgroup/test_memcontrol.c.
> *
> diff --git a/testcases/kernel/controllers/memcg/memcontrol03.c b/testcases/kernel/controllers/memcg/memcontrol03.c
> index 6d9c490b58..b5bbb99545 100644
> --- a/testcases/kernel/controllers/memcg/memcontrol03.c
> +++ b/testcases/kernel/controllers/memcg/memcontrol03.c
> @@ -1,7 +1,5 @@
> // SPDX-License-Identifier: GPL-2.0-only
> /*\
> - *
> - * [Description]
> *
> * Conversion of the third kself test in cgroup/test_memcontrol.c.
> *
> diff --git a/testcases/kernel/controllers/memcg/memcontrol04.c b/testcases/kernel/controllers/memcg/memcontrol04.c
> index 1b8d115f8c..1b5425faaa 100644
> --- a/testcases/kernel/controllers/memcg/memcontrol04.c
> +++ b/testcases/kernel/controllers/memcg/memcontrol04.c
> @@ -1,7 +1,5 @@
> // SPDX-License-Identifier: GPL-2.0-only
> /*\
> - *
> - * [Description]
> *
> * Conversion of the forth kself test in cgroup/test_memcontrol.c.
> *
> diff --git a/testcases/kernel/device-drivers/block/block_dev_user/block_dev.c b/testcases/kernel/device-drivers/block/block_dev_user/block_dev.c
> index 38ec1d6d61..cd900d8074 100644
> --- a/testcases/kernel/device-drivers/block/block_dev_user/block_dev.c
> +++ b/testcases/kernel/device-drivers/block/block_dev_user/block_dev.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test checks block device kernel API.
> */
>
> diff --git a/testcases/kernel/device-drivers/rtc/rtc02.c b/testcases/kernel/device-drivers/rtc/rtc02.c
> index dbac11b853..34509abc13 100644
> --- a/testcases/kernel/device-drivers/rtc/rtc02.c
> +++ b/testcases/kernel/device-drivers/rtc/rtc02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * RTC device set time function test.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/device-drivers/zram/zram03.c b/testcases/kernel/device-drivers/zram/zram03.c
> index 1df3325ec1..8cf26de4c6 100644
> --- a/testcases/kernel/device-drivers/zram/zram03.c
> +++ b/testcases/kernel/device-drivers/zram/zram03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * zram: generic RAM based compressed R/W block devices
> * http://lkml.org/lkml/2010/8/9/227
> *
> diff --git a/testcases/kernel/fs/fsplough/fsplough.c b/testcases/kernel/fs/fsplough/fsplough.c
> index f18a2df1b4..65db3738ea 100644
> --- a/testcases/kernel/fs/fsplough/fsplough.c
> +++ b/testcases/kernel/fs/fsplough/fsplough.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Write data into a test file using various methods and verify that file
> * contents match what was written.
> */
> diff --git a/testcases/kernel/fs/fsx-linux/fsx-linux.c b/testcases/kernel/fs/fsx-linux/fsx-linux.c
> index ac3b06ff77..2e0f17a5ec 100644
> --- a/testcases/kernel/fs/fsx-linux/fsx-linux.c
> +++ b/testcases/kernel/fs/fsx-linux/fsx-linux.c
> @@ -13,8 +13,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a complete rewrite of the old fsx-linux tool, created by
> * NeXT Computer, Inc. and Apple Computer, Inc. between 1991 and 2001,
> * then adapted for LTP. Test is actually a file system exerciser: we bring a
> diff --git a/testcases/kernel/fs/squashfs/squashfs01.c b/testcases/kernel/fs/squashfs/squashfs01.c
> index 502de419df..fbcb765826 100644
> --- a/testcases/kernel/fs/squashfs/squashfs01.c
> +++ b/testcases/kernel/fs/squashfs/squashfs01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Kernel commits
> *
> * - f37aa4c7366 (squashfs: add more sanity checks in id lookup)
> diff --git a/testcases/kernel/input/input01.c b/testcases/kernel/input/input01.c
> index 5e85133028..e57b041e22 100644
> --- a/testcases/kernel/input/input01.c
> +++ b/testcases/kernel/input/input01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that /dev/input/eventX receive events sent from a virtual device,
> * that in our case is a mouse.
> */
> diff --git a/testcases/kernel/input/input02.c b/testcases/kernel/input/input02.c
> index 8e48f12d9a..f4f6543a1d 100644
> --- a/testcases/kernel/input/input02.c
> +++ b/testcases/kernel/input/input02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that /dev/input/eventX won't receive any event sent from a virtual
> * device, that in our case is a mouse, when the event device has been grabbed
> * by an another process.
> diff --git a/testcases/kernel/input/input03.c b/testcases/kernel/input/input03.c
> index 2e6161beef..5229379cf0 100644
> --- a/testcases/kernel/input/input03.c
> +++ b/testcases/kernel/input/input03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that /dev/input/mice receive events sent from a virtual device,
> * that in our case is a mouse. The events are a sequence of mouse right click.
> */
> diff --git a/testcases/kernel/input/input04.c b/testcases/kernel/input/input04.c
> index fb13500fe6..0f05404c47 100644
> --- a/testcases/kernel/input/input04.c
> +++ b/testcases/kernel/input/input04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that /dev/input/eventX doesn't receive any event sent from a virtual
> * device, that in our case is a mouse, when relative move is (0, 0)
> */
> diff --git a/testcases/kernel/input/input05.c b/testcases/kernel/input/input05.c
> index fa37ac7acb..19cf8f1c15 100644
> --- a/testcases/kernel/input/input05.c
> +++ b/testcases/kernel/input/input05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that /dev/input/eventX doesn't receive any event sent from a virtual
> * device, that in our case is a mouse, when events not advertised in the input
> * device bits are filtered.
> diff --git a/testcases/kernel/input/input06.c b/testcases/kernel/input/input06.c
> index d3584a2b0b..969c90f636 100644
> --- a/testcases/kernel/input/input06.c
> +++ b/testcases/kernel/input/input06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that auto-repeat is working on a virtual device, that in our case
> * it's a keyboard.
> */
> diff --git a/testcases/kernel/io/ltp-aiodio/aio-stress.c b/testcases/kernel/io/ltp-aiodio/aio-stress.c
> index e84308d1d0..469769d5a1 100644
> --- a/testcases/kernel/io/ltp-aiodio/aio-stress.c
> +++ b/testcases/kernel/io/ltp-aiodio/aio-stress.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test creates a series of files and start AIO operations on them.
> * AIO is done in a rotating loop: first file1.bin gets 8 requests, then
> * file2.bin, then file3.bin etc. As each file finishes writing, test switches
> diff --git a/testcases/kernel/io/ltp-aiodio/aiocp.c b/testcases/kernel/io/ltp-aiodio/aiocp.c
> index c201505ae9..2a4afe1102 100644
> --- a/testcases/kernel/io/ltp-aiodio/aiocp.c
> +++ b/testcases/kernel/io/ltp-aiodio/aiocp.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Copy file by using an async I/O state machine.
> *
> * - Start read request
> diff --git a/testcases/kernel/io/ltp-aiodio/aiodio_append.c b/testcases/kernel/io/ltp-aiodio/aiodio_append.c
> index e6280d3e8a..f1e7025fe0 100644
> --- a/testcases/kernel/io/ltp-aiodio/aiodio_append.c
> +++ b/testcases/kernel/io/ltp-aiodio/aiodio_append.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Append zeroed data to a file using libaio while other processes are doing
> * buffered reads and check if the buffer reads always see zero.
> */
> diff --git a/testcases/kernel/io/ltp-aiodio/aiodio_sparse.c b/testcases/kernel/io/ltp-aiodio/aiodio_sparse.c
> index 8f41fdbe1e..c4878f2762 100644
> --- a/testcases/kernel/io/ltp-aiodio/aiodio_sparse.c
> +++ b/testcases/kernel/io/ltp-aiodio/aiodio_sparse.c
> @@ -10,8 +10,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Create a sparse file and write zeroes to it using libaio while other
> * processes are doing buffered reads and check if the buffer reads always see
> * zero.
> diff --git a/testcases/kernel/io/ltp-aiodio/dio_append.c b/testcases/kernel/io/ltp-aiodio/dio_append.c
> index 16bed5db2b..1febafb8e1 100644
> --- a/testcases/kernel/io/ltp-aiodio/dio_append.c
> +++ b/testcases/kernel/io/ltp-aiodio/dio_append.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Appends zeroed data to a file using O_DIRECT while a child processes are
> * doing buffered reads after seeking to the end of the file and checks if the
> * buffer reads always see zero.
> diff --git a/testcases/kernel/io/ltp-aiodio/dio_read.c b/testcases/kernel/io/ltp-aiodio/dio_read.c
> index e6d1b74383..f9587ef3de 100644
> --- a/testcases/kernel/io/ltp-aiodio/dio_read.c
> +++ b/testcases/kernel/io/ltp-aiodio/dio_read.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Create a file using buffered writes while other processes are doing
> * O_DIRECT reads and check if the buffer reads always see zero.
> */
> diff --git a/testcases/kernel/io/ltp-aiodio/dio_sparse.c b/testcases/kernel/io/ltp-aiodio/dio_sparse.c
> index 755668220b..c87e5ab1ac 100644
> --- a/testcases/kernel/io/ltp-aiodio/dio_sparse.c
> +++ b/testcases/kernel/io/ltp-aiodio/dio_sparse.c
> @@ -11,8 +11,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Create a sparse file using O_DIRECT while other processes are doing
> * buffered reads and check if the buffer reads always see zero.
> */
> diff --git a/testcases/kernel/io/ltp-aiodio/dio_truncate.c b/testcases/kernel/io/ltp-aiodio/dio_truncate.c
> index 69799e6a21..d4e7d9ea0e 100644
> --- a/testcases/kernel/io/ltp-aiodio/dio_truncate.c
> +++ b/testcases/kernel/io/ltp-aiodio/dio_truncate.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is mixing direct I/O and truncate operations checking if they can
> * be used together at the same time. Multiple children are spawned to read a
> * file that is written to using direct I/O and truncated in a loop.
> diff --git a/testcases/kernel/irq/irqbalance01.c b/testcases/kernel/irq/irqbalance01.c
> index 96bbec6a8f..f7c6b02785 100644
> --- a/testcases/kernel/irq/irqbalance01.c
> +++ b/testcases/kernel/irq/irqbalance01.c
> @@ -1,8 +1,6 @@
> // SPDX-License-Identifier: GPL-2.0-or-later
> /* Copyright (c) 2021 SUSE LLC <rpalethorpe@suse.com> */
> /*\
> - * [Description]
> - *
> * Check that something (e.g. irqbalance daemon) is performing IRQ
> * load balancing.
> *
> diff --git a/testcases/kernel/kvm/kvm_svm04.c b/testcases/kernel/kvm/kvm_svm04.c
> index e69f0d4be9..75fcbfdcfc 100644
> --- a/testcases/kernel/kvm/kvm_svm04.c
> +++ b/testcases/kernel/kvm/kvm_svm04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Functional test for VMSAVE/VMLOAD instructions in KVM environment. Verify
> * that both instructions save/load the CPU state according to CPU
> * documentation.
> diff --git a/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c b/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c
> index b7ab4e035f..53fef3ddb1 100644
> --- a/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c
> +++ b/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It tests alignment of fallocate arguments. fallocate will take non-huge
> * page aligned offsets and addresses. However, operations are only
> * performed on huge pages. This is different that than fallocate
> diff --git a/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c b/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c
> index d03f43d670..1f7c4dcc69 100644
> --- a/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c
> +++ b/testcases/kernel/mem/hugetlb/hugefallocate/hugefallocate02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It tests basic fallocate functionality in hugetlbfs. Preallocate huge
> * pages to a file in hugetlbfs, and then remove the pages via hole punch.
> */
> diff --git a/testcases/kernel/mem/hugetlb/hugefork/hugefork01.c b/testcases/kernel/mem/hugetlb/hugefork/hugefork01.c
> index 2404ffad12..54603b98b7 100644
> --- a/testcases/kernel/mem/hugetlb/hugefork/hugefork01.c
> +++ b/testcases/kernel/mem/hugetlb/hugefork/hugefork01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This checks copy-on-write semantics, specifically the semantics of a
> * MAP_PRIVATE mapping across a fork(). Some versions of the powerpc
> * kernel had a bug in huge_ptep_set_wrprotect() which would fail to
> diff --git a/testcases/kernel/mem/hugetlb/hugefork/hugefork02.c b/testcases/kernel/mem/hugetlb/hugefork/hugefork02.c
> index de495f0872..cafeaa242f 100644
> --- a/testcases/kernel/mem/hugetlb/hugefork/hugefork02.c
> +++ b/testcases/kernel/mem/hugetlb/hugefork/hugefork02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test shared memory behavior when multiple threads are attached to a
> * segment. A segment is created and then children are spawned which
> * attach, write, read (verify), and detach from the shared memory segment.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c
> index 5032e05eca..1ac989487d 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap06.c
> @@ -9,8 +9,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * There is a race condition if we map a same file on different processes.
> * Region tracking is protected by mmap_sem and hugetlb_instantiation_mutex.
> * When we do mmap, we don't grab a hugetlb_instantiation_mutex, but only
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c
> index 663d925f4b..5a965e1828 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Certain kernels have a bug where brk() does not perform the same
> * checks that a MAP_FIXED mmap() will, allowing brk() to create a
> * normal page VMA in a hugepage only address region. This can lead
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c
> index e3dd430879..b9d61dd660 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Some kernel versions after hugepage demand allocation was added used a
> * dubious heuristic to check if there was enough hugepage space available
> * for a given mapping. The number of not-already-instantiated pages in
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c
> index 2a80edca93..10f64674da 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test sanity of cow optimization on page cache. If a page in page cache
> * has only 1 ref count, it is mapped for a private mapping directly and
> * is overwritten freely, so next time we access the page, we can see
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c
> index f918d5e2e6..e1795153db 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap10.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This Test perform mmap, munmap and write operation on hugetlb file
> * based mapping. Mapping can be shared or private. and it checks for
> * Hugetlb counter (Total, Free, Reserve, Surplus) in /proc/meminfo and
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c
> index a98594af67..087e8c6914 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap11.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This Test perform Direct Write/Read from/To hugetlbfs file
> * which is mapped to process address space. The test is checking if it
> * succeeds and data written or read is not corrupted.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c
> index 848986ceaa..523ea90253 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap12.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * fadvise() on some kernels can cause the reservation counter to get
> * corrupted. The problem is that the patches are allocated for the
> * reservation but not faulted in at the time of allocation. The counters
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c
> index 06b5f8e080..ab57da546e 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap13.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * On some old ppc64 kernel, when hpage is mmaped on 32 bit boundary and
> * normal page below it, it triggers the bug caused by off-by-one error.
> *
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c
> index d262b65b20..2447d6782e 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap14.c
> @@ -5,7 +5,6 @@
> */
>
> /*\
> - * [Description]
> * On some old ppc64 kernel, when huge page is mapped at below touching
> * 32 bit boundary (4GB - hpage_size), and normal page is mmaped
> * at just above it, it triggers a bug caused by off-by-one error.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c
> index ecfd51d0c1..f9fd226940 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap15.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Older ppc64 kernels don't properly flush dcache to icache before
> * giving a cleared page to userspace. With some exceedingly
> * hairy code, this attempts to test for this bug.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c
> index e0238636bb..bd5fae5c99 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap16.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * madvise() on some kernels can cause the reservation counter to get
> * corrupted. The problem is that the patches are allocated
> * for the reservation but not faulted in at the time of allocation. The
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c
> index afd7ad3f77..45796decd4 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap18.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Just as normal mmap()s can't have an address, length or offset which
> * is not page aligned, so hugepage mmap()s can't have an address, length
> * or offset with is not hugepage aligned.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c
> index 3d3a958669..313efb4bc9 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap20.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The test checks that mlocking hugetlb areas works with all combinations
> * of MAP_PRIVATE and MAP_SHARED with and without MAP_LOCKED specified.
> */
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c
> index faebbd228d..3792cff89c 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap21.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests copy-on-write semantics of large pages where a number of threads
> * map the same file with the MAP_PRIVATE flag. The threads then write
> * into their copy of the mapping and recheck the contents to ensure they
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c
> index d9be8113ec..78e4a3bf99 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap22.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This baseline test validates that a mapping of a certain size can be
> * created, correctly. Once created, all the pages are filled with a
> * pattern and rechecked to test for corruption. The mapping is then
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c
> index 3bcba0580b..86157d262b 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap23.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test uses mprotect to change protection of hugepage mapping and
> * perform read/write operation. It checks if the operation results in
> * expected behaviour as per the protection.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c
> index ab6a3310ac..0de44d58ad 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap24.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Kernel has bug in mremap for some architecture. mremap() can cause
> * crashes on architectures with holes in the address space (like ia64)
> * and on powerpc with it's distict page size slices.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c
> index 1ad8a41418..7d9fd0b603 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap25.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The kernel has bug for mremap() on some architecture. mremap() can
> * cause crashes on architectures with holes in the address space
> * (like ia64) and on powerpc with it's distinct page size "slices".
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c
> index 21be2d376b..cd60d74035 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap26.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test Description: The kernel has bug for mremap() on some architecture.
> * mremap() can cause crashes on architectures with holes in the address
> * space (like ia64) and on powerpc with it's distinct page size "slices".
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c
> index bafae1ca86..f79258da6d 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap27.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test to preserve a reserved page against no-reserved mapping. If all
> * hugepages are reserved, access to no-reserved shared mapping cause a
> * process die, instead of stealing a hugepage which is reserved for other
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c
> index 660c93953a..48cedd158c 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap28.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test to correct handling for reserve count. If no reserved mapping is
> * created to reserved file region, it should be considered as reserve
> * mapping. Otherwise, reserve count will be overflowed.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c
> index 67857615a0..f049745006 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap29.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The test do mmap() with shared mapping and write. It matches the data
> * with private mmap() and then change it with other data. It checks
> * shared mapping data if data is not contaiminated by private mapping.
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c
> index 61b28c781d..a624f4a262 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap30.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * readahead() on some kernels can cause the reservation counter to get
> * corrupted. The problem is that the pages are allocated for the
> * reservation but not faulted in at the time of allocation. The
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c
> index 171dbb0700..57367b6419 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap31.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is basic shared mapping test. Two shared mappings are created
> * with same offset on a file. It checks if writing to one mapping can be
> * seen to other mapping or not?
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c
> index d27e5b8b2d..188ee2176b 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap32.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Before kernel version 5.10-rc7, there was a bug that resulted in a "Bad Page
> * State" error when freeing gigantic hugepages. This happened because the
> * struct page entry compound_nr, which overlapped with page->mapping in the
> diff --git a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c
> index 3b92c95654..bf2b356426 100644
> --- a/testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c
> +++ b/testcases/kernel/mem/hugetlb/hugemmap/hugemmap34.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * On PowerPC, the address space is divided into segments. These segments can
> * contain either huge pages or normal pages, but not both. All segments are
> * initially set up to map normal pages. When a huge page mapping is created
> diff --git a/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c b/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c
> index 04325ce104..bd4437b130 100644
> --- a/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c
> +++ b/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test the IPC_STAT, IPC_SET and IPC_RMID commands used by shmctl().
> */
>
> diff --git a/testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c b/testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c
> index 998b85e9ce..ca93ae6d81 100644
> --- a/testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c
> +++ b/testcases/kernel/mem/hugetlb/hugeshmget/hugeshmget06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This testcase creates shared memory segments backed by hugepages,
> * writes specific patterns to each segment, verifies pattern,
> * and detaches a shared memory segments in a loop.
> diff --git a/testcases/kernel/mem/ksm/ksm04.c b/testcases/kernel/mem/ksm/ksm04.c
> index 7b478c46db..35bbe3d720 100644
> --- a/testcases/kernel/mem/ksm/ksm04.c
> +++ b/testcases/kernel/mem/ksm/ksm04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Prerequisites:
> *
> * ksm and ksmtuned daemons need to be disabled. Otherwise, it could
> diff --git a/testcases/kernel/mem/ksm/ksm06.c b/testcases/kernel/mem/ksm/ksm06.c
> index 80fdf1e472..cd07605a20 100644
> --- a/testcases/kernel/mem/ksm/ksm06.c
> +++ b/testcases/kernel/mem/ksm/ksm06.c
> @@ -3,8 +3,6 @@
> * Copyright (C) 2013-2017 Red Hat, Inc.
> */
> /*\
> - * [Description]
> - *
> * The case is designed to test sysfs boolean knob
> * /sys/kernel/mm/ksm/merge_across_nodes.
> *
> diff --git a/testcases/kernel/mem/ksm/ksm07.c b/testcases/kernel/mem/ksm/ksm07.c
> index 619bd7b559..92b8b504ea 100644
> --- a/testcases/kernel/mem/ksm/ksm07.c
> +++ b/testcases/kernel/mem/ksm/ksm07.c
> @@ -3,8 +3,6 @@
> * Copyright (C) 2023 Red Hat, Inc.
> */
> /*\
> - * [Description]
> - *
> * Kernel Samepage Merging (KSM) for smart scan feature
> *
> * Test allocates a page and fills it with 'a' characters. It captures the
> diff --git a/testcases/kernel/mem/mmapstress/mmapstress01.c b/testcases/kernel/mem/mmapstress/mmapstress01.c
> index 5ba09208d6..a0ef9a6b58 100644
> --- a/testcases/kernel/mem/mmapstress/mmapstress01.c
> +++ b/testcases/kernel/mem/mmapstress/mmapstress01.c
> @@ -6,7 +6,6 @@
> * 10/03/2022 Refactor to LTP framework edliaw@google.com
> */
> /*\
> - * [Description]
> * This test stresses mmaps, without dealing with fragments or anything!
> * It forks a specified number of children,
> * all of whom mmap the same file, make a given number of accesses
> diff --git a/testcases/kernel/mem/oom/oom01.c b/testcases/kernel/mem/oom/oom01.c
> index ddb9044598..bc1e25159f 100644
> --- a/testcases/kernel/mem/oom/oom01.c
> +++ b/testcases/kernel/mem/oom/oom01.c
> @@ -4,8 +4,6 @@
> * Copyright (c) Linux Test Project, 2011-2023
> */
> /*\
> - * [Description]
> - *
> * Out Of Memory (OOM) test
> */
>
> diff --git a/testcases/kernel/mem/oom/oom02.c b/testcases/kernel/mem/oom/oom02.c
> index 50b514cb4a..96c51d90a4 100644
> --- a/testcases/kernel/mem/oom/oom02.c
> +++ b/testcases/kernel/mem/oom/oom02.c
> @@ -4,8 +4,6 @@
> * Copyright (c) Linux Test Project, 2011-2023
> */
> /*\
> - * [Description]
> - *
> * Out Of Memory (OOM) test for mempolicy - need NUMA system support
> */
>
> diff --git a/testcases/kernel/mem/oom/oom03.c b/testcases/kernel/mem/oom/oom03.c
> index 873a6d84c5..89984b86f8 100644
> --- a/testcases/kernel/mem/oom/oom03.c
> +++ b/testcases/kernel/mem/oom/oom03.c
> @@ -4,8 +4,6 @@
> * Copyright (c) Linux Test Project, 2011-2023
> */
> /*\
> - * [Description]
> - *
> * Out Of Memory (OOM) test for Memory Resource Controller
> */
>
> diff --git a/testcases/kernel/mem/oom/oom04.c b/testcases/kernel/mem/oom/oom04.c
> index 94e70f3c54..54efd7592f 100644
> --- a/testcases/kernel/mem/oom/oom04.c
> +++ b/testcases/kernel/mem/oom/oom04.c
> @@ -4,8 +4,6 @@
> * Copyright (c) Linux Test Project, 2011-2023
> */
> /*\
> - * [Description]
> - *
> * Out Of Memory (OOM) test for CPUSET
> */
>
> diff --git a/testcases/kernel/mem/oom/oom05.c b/testcases/kernel/mem/oom/oom05.c
> index 16e4018cf7..1a1b571608 100644
> --- a/testcases/kernel/mem/oom/oom05.c
> +++ b/testcases/kernel/mem/oom/oom05.c
> @@ -4,8 +4,6 @@
> * Copyright (c) Linux Test Project, 2014-2023
> */
> /*\
> - * [Description]
> - *
> * Out Of Memory (OOM) test for MEMCG and CPUSET
> */
>
> diff --git a/testcases/kernel/mem/swapping/swapping01.c b/testcases/kernel/mem/swapping/swapping01.c
> index df1dcdf56d..d3bdda5669 100644
> --- a/testcases/kernel/mem/swapping/swapping01.c
> +++ b/testcases/kernel/mem/swapping/swapping01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Detect heavy swapping during first time swap use.
> *
> * This case is used for testing kernel commit:
> diff --git a/testcases/kernel/mem/thp/thp01.c b/testcases/kernel/mem/thp/thp01.c
> index 69825b0f99..ce36aa9774 100644
> --- a/testcases/kernel/mem/thp/thp01.c
> +++ b/testcases/kernel/mem/thp/thp01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a reproducer of CVE-2011-0999, which fixed by mainline commit
> * a7d6e4ecdb76 ("thp: prevent hugepages during args/env copying into the user stack")
> *
> diff --git a/testcases/kernel/mem/thp/thp02.c b/testcases/kernel/mem/thp/thp02.c
> index 56568d1d18..7ae053f35a 100644
> --- a/testcases/kernel/mem/thp/thp02.c
> +++ b/testcases/kernel/mem/thp/thp02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for detecting mremap bug when THP is enabled.
> *
> * There was a bug in mremap THP support, sometimes causing crash
> diff --git a/testcases/kernel/pty/ptem01.c b/testcases/kernel/pty/ptem01.c
> index 6040ee9bc3..3c364b24ae 100644
> --- a/testcases/kernel/pty/ptem01.c
> +++ b/testcases/kernel/pty/ptem01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that it's possible to open a pseudo-terminal via /dev/ptmx, obtain a
> * slave device and configure termos/termios ioctls.
> */
> diff --git a/testcases/kernel/pty/ptem02.c b/testcases/kernel/pty/ptem02.c
> index 0fc69aa1d8..ee02d20ed4 100644
> --- a/testcases/kernel/pty/ptem02.c
> +++ b/testcases/kernel/pty/ptem02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that it's possible to open a pseudo-terminal via /dev/ptmx, obtain a
> * slave device and set/get window size.
> */
> diff --git a/testcases/kernel/pty/ptem03.c b/testcases/kernel/pty/ptem03.c
> index fb0fdf6612..d284371f80 100644
> --- a/testcases/kernel/pty/ptem03.c
> +++ b/testcases/kernel/pty/ptem03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that it's possible to open a pseudo-terminal via /dev/ptmx, obtain a
> * slave device and to send a break to both master and slave.
> */
> diff --git a/testcases/kernel/pty/ptem04.c b/testcases/kernel/pty/ptem04.c
> index 675e6b816d..14249448f4 100644
> --- a/testcases/kernel/pty/ptem04.c
> +++ b/testcases/kernel/pty/ptem04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that it's possible to open a pseudo-terminal via /dev/ptmx, obtain a
> * slave device and to check if it's possible to open it multiple times.
> */
> diff --git a/testcases/kernel/pty/ptem05.c b/testcases/kernel/pty/ptem05.c
> index 9357c469ca..7c4377c372 100644
> --- a/testcases/kernel/pty/ptem05.c
> +++ b/testcases/kernel/pty/ptem05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that it's possible to open a pseudo-terminal via /dev/ptmx, to obtain
> * a master + slave pair and to open them multiple times.
> */
> diff --git a/testcases/kernel/pty/ptem06.c b/testcases/kernel/pty/ptem06.c
> index 810b7c1d6a..6845b88fe1 100644
> --- a/testcases/kernel/pty/ptem06.c
> +++ b/testcases/kernel/pty/ptem06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that it's possible to open a pseudo-terminal via /dev/ptmx, to obtain
> * a slave device and to set baudrate to B0 (which means hang up).
> */
> diff --git a/testcases/kernel/pty/pty01.c b/testcases/kernel/pty/pty01.c
> index d804a8d635..99f8d32d3d 100644
> --- a/testcases/kernel/pty/pty01.c
> +++ b/testcases/kernel/pty/pty01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that write/read is properly working when master and slave
> * pseudo terminals communicate with each other.
> */
> diff --git a/testcases/kernel/pty/pty03.c b/testcases/kernel/pty/pty03.c
> index 883a539d53..229aa13934 100644
> --- a/testcases/kernel/pty/pty03.c
> +++ b/testcases/kernel/pty/pty03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test based on Syzkaller reproducer:
> * https://syzkaller.appspot.com/bug?id=680c24ff647dd7241998e19da52e8136d2fd3523
> *
> diff --git a/testcases/kernel/pty/pty06.c b/testcases/kernel/pty/pty06.c
> index 4309163550..00cc6a9848 100644
> --- a/testcases/kernel/pty/pty06.c
> +++ b/testcases/kernel/pty/pty06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test based on Syzkaller reproducer:
> * https://syzkaller.appspot.com/bug?extid=522643ab5729b0421998
> *
> diff --git a/testcases/kernel/pty/pty07.c b/testcases/kernel/pty/pty07.c
> index ebd5b16077..1a1c5871b7 100644
> --- a/testcases/kernel/pty/pty07.c
> +++ b/testcases/kernel/pty/pty07.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The VT_DISALLOCATE ioctl can free a virtual console while VT_RESIZEX ioctl is
> * still running, causing a use-after-free in vt_ioctl(). Because VT_RESIZEX ioctl
> * have not make sure vc_cons[i].d is not NULL after grabbing console_lock().
> diff --git a/testcases/kernel/pty/pty08.c b/testcases/kernel/pty/pty08.c
> index 45e99d18ba..2b8f7152e2 100644
> --- a/testcases/kernel/pty/pty08.c
> +++ b/testcases/kernel/pty/pty08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that slave pseudo-terminal fails reading/writing if master has been
> * closed.
> */
> diff --git a/testcases/kernel/pty/pty09.c b/testcases/kernel/pty/pty09.c
> index 1e477869b0..f3ade23818 100644
> --- a/testcases/kernel/pty/pty09.c
> +++ b/testcases/kernel/pty/pty09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that slave pseudo-terminal can be opened multiple times in parallel.
> */
>
> diff --git a/testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c b/testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c
> index aa137eb67d..e52858f8e2 100644
> --- a/testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c
> +++ b/testcases/kernel/sched/cfs-scheduler/cfs_bandwidth01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Creates a multi-level CGroup hierarchy with the cpu controller
> * enabled. The leaf groups are populated with "busy" processes which
> * simulate intermittent cpu load. They spin for some time then sleep
> diff --git a/testcases/kernel/sched/cfs-scheduler/starvation.c b/testcases/kernel/sched/cfs-scheduler/starvation.c
> index 27bf77f393..045254ba41 100644
> --- a/testcases/kernel/sched/cfs-scheduler/starvation.c
> +++ b/testcases/kernel/sched/cfs-scheduler/starvation.c
> @@ -2,8 +2,6 @@
> /* Copyright 2023 Mike Galbraith <efault-AT-gmx.de> */
> /* Copyright 2023 Wei Gao <wegao@suse.com> */
> /*\
> - *
> - * [Description]
> *
> * Thread starvation test. On fauluty kernel the test timeouts.
> *
> diff --git a/testcases/kernel/sched/sysctl/proc_sched_rt01.c b/testcases/kernel/sched/sysctl/proc_sched_rt01.c
> index 7c1aaccd96..df57ebcde9 100644
> --- a/testcases/kernel/sched/sysctl/proc_sched_rt01.c
> +++ b/testcases/kernel/sched/sysctl/proc_sched_rt01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Sanity tests for the /proc/sys/kernel/sched_r* files.
> *
> * - The sched_rt_period_us range is 1 to INT_MAX
> diff --git a/testcases/kernel/security/aslr/aslr01.c b/testcases/kernel/security/aslr/aslr01.c
> index 4d3c9bcdd4..6a396e29de 100644
> --- a/testcases/kernel/security/aslr/aslr01.c
> +++ b/testcases/kernel/security/aslr/aslr01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that address space layout randomization (ASLR) is sufficiently random.
> * A bug in dynamic library mmapping may reduce ASLR randomness if the library
> * file is larger than hugepage size. In 32bit compat mode, this may
> diff --git a/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c b/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
> index deb43aa6ac..64b187b35f 100644
> --- a/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
> +++ b/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a regression test for a write race that allowed unprivileged programs
> * to change readonly files located on tmpfs/shmem on the system using
> * userfaultfd "minor fault handling" (CVE-2022-2590).
> diff --git a/testcases/kernel/security/dirtypipe/dirtypipe.c b/testcases/kernel/security/dirtypipe/dirtypipe.c
> index bc9197a903..981793e64d 100644
> --- a/testcases/kernel/security/dirtypipe/dirtypipe.c
> +++ b/testcases/kernel/security/dirtypipe/dirtypipe.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Proof-of-concept exploit for the Dirty Pipe
> * vulnerability (CVE-2022-0847) caused by an uninitialized
> * "pipe_buffer.flags" variable. It demonstrates how to overwrite any
> diff --git a/testcases/kernel/security/kallsyms/kallsyms.c b/testcases/kernel/security/kallsyms/kallsyms.c
> index cf1390fb4d..45b3e18d4a 100644
> --- a/testcases/kernel/security/kallsyms/kallsyms.c
> +++ b/testcases/kernel/security/kallsyms/kallsyms.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Utilize kernel's symbol table for unauthorized address access.
> *
> * Access the system symbols with root permission to test whether it's
> diff --git a/testcases/kernel/syscalls/abort/abort01.c b/testcases/kernel/syscalls/abort/abort01.c
> index aa9ca3a2d8..05a92204e5 100644
> --- a/testcases/kernel/syscalls/abort/abort01.c
> +++ b/testcases/kernel/syscalls/abort/abort01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Checks that process which called abort() gets killed by SIGIOT and dumps core.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/accept/accept01.c b/testcases/kernel/syscalls/accept/accept01.c
> index e5db1dfecd..943af84242 100644
> --- a/testcases/kernel/syscalls/accept/accept01.c
> +++ b/testcases/kernel/syscalls/accept/accept01.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Verify that accept() returns the proper errno for various failure cases.
> */
>
> diff --git a/testcases/kernel/syscalls/accept/accept02.c b/testcases/kernel/syscalls/accept/accept02.c
> index 7cb3d69700..e50d2e7815 100644
> --- a/testcases/kernel/syscalls/accept/accept02.c
> +++ b/testcases/kernel/syscalls/accept/accept02.c
> @@ -4,8 +4,6 @@
> * Author: Christian Amann <camann@suse.com>
> */
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-8890
> *
> * In Kernels up to 4.10.15 missing commit 657831ff the multicast
> diff --git a/testcases/kernel/syscalls/accept/accept03.c b/testcases/kernel/syscalls/accept/accept03.c
> index b85ec0d9b5..bc472397dd 100644
> --- a/testcases/kernel/syscalls/accept/accept03.c
> +++ b/testcases/kernel/syscalls/accept/accept03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that accept() returns ENOTSOCK or EBADF for non-socket file
> * descriptors. The EBADF is returned in the case that the file descriptor has
> * not a file associated with it, which is for example in the case of O_PATH
> diff --git a/testcases/kernel/syscalls/access/access01.c b/testcases/kernel/syscalls/access/access01.c
> index 1c32c6d046..1da949b567 100644
> --- a/testcases/kernel/syscalls/access/access01.c
> +++ b/testcases/kernel/syscalls/access/access01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for access(2) using F_OK, R_OK, W_OK and X_OK
> */
>
> diff --git a/testcases/kernel/syscalls/access/access02.c b/testcases/kernel/syscalls/access/access02.c
> index c8fe0d0dca..67d7b70e3d 100644
> --- a/testcases/kernel/syscalls/access/access02.c
> +++ b/testcases/kernel/syscalls/access/access02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test access(2) syscall
> *
> * - check the existence or read/write/execute permissions on a file (mode argument: F_OK/R_OK/W_OK/X_OK)
> diff --git a/testcases/kernel/syscalls/access/access03.c b/testcases/kernel/syscalls/access/access03.c
> index 7cae1ec2ef..c42c062494 100644
> --- a/testcases/kernel/syscalls/access/access03.c
> +++ b/testcases/kernel/syscalls/access/access03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * access(2) test for errno(s) EFAULT as root and nobody respectively.
> */
>
> diff --git a/testcases/kernel/syscalls/access/access04.c b/testcases/kernel/syscalls/access/access04.c
> index b5764a5ddb..8a9ac5c36a 100644
> --- a/testcases/kernel/syscalls/access/access04.c
> +++ b/testcases/kernel/syscalls/access/access04.c
> @@ -9,8 +9,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * - access() fails with -1 return value and sets errno to EINVAL
> * if the specified access mode argument is invalid.
> * - access() fails with -1 return value and sets errno to ENOENT
> diff --git a/testcases/kernel/syscalls/acct/acct01.c b/testcases/kernel/syscalls/acct/acct01.c
> index 781d62261f..6249f6e2b8 100644
> --- a/testcases/kernel/syscalls/acct/acct01.c
> +++ b/testcases/kernel/syscalls/acct/acct01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that acct() returns proper errno on failure.
> */
>
> diff --git a/testcases/kernel/syscalls/acct/acct02.c b/testcases/kernel/syscalls/acct/acct02.c
> index 74019f4304..90555db9bf 100644
> --- a/testcases/kernel/syscalls/acct/acct02.c
> +++ b/testcases/kernel/syscalls/acct/acct02.c
> @@ -5,8 +5,6 @@
> * Author: Christian Amann <camann@suse.com>
> */
> /*\
> - * [Description]
> - *
> * This tests if the kernel writes correct data to the
> * process accounting file.
> *
> diff --git a/testcases/kernel/syscalls/adjtimex/adjtimex02.c b/testcases/kernel/syscalls/adjtimex/adjtimex02.c
> index 7f7fb643e5..836d49faf4 100644
> --- a/testcases/kernel/syscalls/adjtimex/adjtimex02.c
> +++ b/testcases/kernel/syscalls/adjtimex/adjtimex02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests for adjtimex() error conditions:
> *
> * - EPERM with SET_MODE as nobody
> diff --git a/testcases/kernel/syscalls/adjtimex/adjtimex03.c b/testcases/kernel/syscalls/adjtimex/adjtimex03.c
> index 9d34235e49..5521e4a3c3 100644
> --- a/testcases/kernel/syscalls/adjtimex/adjtimex03.c
> +++ b/testcases/kernel/syscalls/adjtimex/adjtimex03.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2018-11508: Test 4-byte kernel data leak via adjtimex.
> *
> * On calling the adjtimex() function call with invalid mode (let's say
> diff --git a/testcases/kernel/syscalls/alarm/alarm02.c b/testcases/kernel/syscalls/alarm/alarm02.c
> index fcf70c5f32..4f012bb228 100644
> --- a/testcases/kernel/syscalls/alarm/alarm02.c
> +++ b/testcases/kernel/syscalls/alarm/alarm02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that alarm() returns:
> *
> * - zero when there was no previously scheduled alarm
> diff --git a/testcases/kernel/syscalls/alarm/alarm03.c b/testcases/kernel/syscalls/alarm/alarm03.c
> index b010e75401..7c98db070f 100644
> --- a/testcases/kernel/syscalls/alarm/alarm03.c
> +++ b/testcases/kernel/syscalls/alarm/alarm03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that alarms created by alarm() are not inherited by children
> * created via fork.
> */
> diff --git a/testcases/kernel/syscalls/alarm/alarm05.c b/testcases/kernel/syscalls/alarm/alarm05.c
> index 82bff69cbf..f8f6269171 100644
> --- a/testcases/kernel/syscalls/alarm/alarm05.c
> +++ b/testcases/kernel/syscalls/alarm/alarm05.c
> @@ -9,8 +9,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The return value of the alarm system call should be equal to the
> * amount previously remaining in the alarm clock.
> * A SIGALRM signal should be received after the specified amount of
> diff --git a/testcases/kernel/syscalls/alarm/alarm06.c b/testcases/kernel/syscalls/alarm/alarm06.c
> index 2cfa262076..76f4226f4f 100644
> --- a/testcases/kernel/syscalls/alarm/alarm06.c
> +++ b/testcases/kernel/syscalls/alarm/alarm06.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that any pending alarm() is canceled when seconds is zero.
> */
>
> diff --git a/testcases/kernel/syscalls/alarm/alarm07.c b/testcases/kernel/syscalls/alarm/alarm07.c
> index c04745f9df..8a1e500d1f 100644
> --- a/testcases/kernel/syscalls/alarm/alarm07.c
> +++ b/testcases/kernel/syscalls/alarm/alarm07.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that SIGALRM signal scheduled by alarm() in the parent process
> * is not delivered to the child process.
> */
> diff --git a/testcases/kernel/syscalls/arch_prctl/arch_prctl01.c b/testcases/kernel/syscalls/arch_prctl/arch_prctl01.c
> index b98ef99d28..8ce905c6ce 100644
> --- a/testcases/kernel/syscalls/arch_prctl/arch_prctl01.c
> +++ b/testcases/kernel/syscalls/arch_prctl/arch_prctl01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Simple test on arch_prctl to set and get cpuid instruction of test thread.
> */
>
> diff --git a/testcases/kernel/syscalls/bind/bind02.c b/testcases/kernel/syscalls/bind/bind02.c
> index 9f5f940e95..73ebd4aa12 100644
> --- a/testcases/kernel/syscalls/bind/bind02.c
> +++ b/testcases/kernel/syscalls/bind/bind02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Make sure bind() of privileged port gives EACCESS error for non-root users.
> */
>
> diff --git a/testcases/kernel/syscalls/bpf/bpf_map01.c b/testcases/kernel/syscalls/bpf/bpf_map01.c
> index 7f2264bf52..7fcf8e00fe 100644
> --- a/testcases/kernel/syscalls/bpf/bpf_map01.c
> +++ b/testcases/kernel/syscalls/bpf/bpf_map01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Trivial Extended Berkeley Packet Filter (eBPF) test.
> *
> * Sanity check creating and updating maps.
> diff --git a/testcases/kernel/syscalls/bpf/bpf_prog01.c b/testcases/kernel/syscalls/bpf/bpf_prog01.c
> index b3846cb62c..44ee8c1c44 100644
> --- a/testcases/kernel/syscalls/bpf/bpf_prog01.c
> +++ b/testcases/kernel/syscalls/bpf/bpf_prog01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Trivial Extended Berkeley Packet Filter (eBPF) test.
> *
> * Sanity check loading and running bytecode.
> diff --git a/testcases/kernel/syscalls/bpf/bpf_prog02.c b/testcases/kernel/syscalls/bpf/bpf_prog02.c
> index 69314aea7f..8bc7996f5c 100644
> --- a/testcases/kernel/syscalls/bpf/bpf_prog02.c
> +++ b/testcases/kernel/syscalls/bpf/bpf_prog02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check if eBPF can do arithmetic with 64bits. This targets a specific
> * regression which only effects unprivileged users who are subject to extra
> * pointer arithmetic checks during verification.
> diff --git a/testcases/kernel/syscalls/bpf/bpf_prog03.c b/testcases/kernel/syscalls/bpf/bpf_prog03.c
> index 62432cc3fc..f37560c3b8 100644
> --- a/testcases/kernel/syscalls/bpf/bpf_prog03.c
> +++ b/testcases/kernel/syscalls/bpf/bpf_prog03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2017-16995
> *
> * Test for the bug fixed by kernel commit
> diff --git a/testcases/kernel/syscalls/bpf/bpf_prog04.c b/testcases/kernel/syscalls/bpf/bpf_prog04.c
> index 5c61d34b4a..35ad8dd5f7 100644
> --- a/testcases/kernel/syscalls/bpf/bpf_prog04.c
> +++ b/testcases/kernel/syscalls/bpf/bpf_prog04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE 2018-18445
> *
> * Check that eBPF verifier correctly handles 32-bit arithmetic, in particular
> diff --git a/testcases/kernel/syscalls/bpf/bpf_prog05.c b/testcases/kernel/syscalls/bpf/bpf_prog05.c
> index 0500817128..05cb34e13d 100644
> --- a/testcases/kernel/syscalls/bpf/bpf_prog05.c
> +++ b/testcases/kernel/syscalls/bpf/bpf_prog05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Compare the effects of 32-bit div/mod by zero with the "expected"
> * behaviour.
> *
> diff --git a/testcases/kernel/syscalls/bpf/bpf_prog06.c b/testcases/kernel/syscalls/bpf/bpf_prog06.c
> index 87fdd80603..f701e95990 100644
> --- a/testcases/kernel/syscalls/bpf/bpf_prog06.c
> +++ b/testcases/kernel/syscalls/bpf/bpf_prog06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * ringbuf_submit takes a pointer to a ringbuf record, but not the
> * size of this record. The verifier only validates offset ptrs[1] passed
> * to functions if the function has a size parameter. So we can
> diff --git a/testcases/kernel/syscalls/bpf/bpf_prog07.c b/testcases/kernel/syscalls/bpf/bpf_prog07.c
> index 29dfbf2cae..81435348aa 100644
> --- a/testcases/kernel/syscalls/bpf/bpf_prog07.c
> +++ b/testcases/kernel/syscalls/bpf/bpf_prog07.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The verifier did not properly restrict some *_OR_NULL pointer
> * types. Including RET_PTR_TO_ALLOC_MEM_OR_NULL which is returned by
> * ringbuf_reserve. Somehow this means they can be used to perform
> diff --git a/testcases/kernel/syscalls/brk/brk02.c b/testcases/kernel/syscalls/brk/brk02.c
> index 64931bc809..201664e806 100644
> --- a/testcases/kernel/syscalls/brk/brk02.c
> +++ b/testcases/kernel/syscalls/brk/brk02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Expand brk() by at least 2 pages to ensure there is a newly created VMA
> * and not expanding the original due to multiple anon pages. mprotect() that
> * new VMA then brk() back to the original address therefore causing a munmap of
> diff --git a/testcases/kernel/syscalls/cachestat/cachestat01.c b/testcases/kernel/syscalls/cachestat/cachestat01.c
> index 22f0071d1e..e218747d92 100644
> --- a/testcases/kernel/syscalls/cachestat/cachestat01.c
> +++ b/testcases/kernel/syscalls/cachestat/cachestat01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that cachestat() syscall is properly counting cached pages
> * written inside a file. If storage device synchronization is requested, test
> * will check if the number of dirty pages is zero.
> diff --git a/testcases/kernel/syscalls/cachestat/cachestat02.c b/testcases/kernel/syscalls/cachestat/cachestat02.c
> index e168de5a53..72428ee839 100644
> --- a/testcases/kernel/syscalls/cachestat/cachestat02.c
> +++ b/testcases/kernel/syscalls/cachestat/cachestat02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that cachestat() syscall is properly counting cached pages
> * written inside a shared memory.
> *
> diff --git a/testcases/kernel/syscalls/cachestat/cachestat03.c b/testcases/kernel/syscalls/cachestat/cachestat03.c
> index 139745c349..7c3abb3a0f 100644
> --- a/testcases/kernel/syscalls/cachestat/cachestat03.c
> +++ b/testcases/kernel/syscalls/cachestat/cachestat03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that cachestat() syscall is properly failing with relative
> * error codes according to input parameters.
> *
> diff --git a/testcases/kernel/syscalls/cachestat/cachestat04.c b/testcases/kernel/syscalls/cachestat/cachestat04.c
> index 7cef9897d4..d33769bfcd 100644
> --- a/testcases/kernel/syscalls/cachestat/cachestat04.c
> +++ b/testcases/kernel/syscalls/cachestat/cachestat04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies cachestat() for all the possible file descriptors,
> * checking that cache statistics are always zero, except for unsupported file
> * descriptors which cause EBADF to be raised.
> diff --git a/testcases/kernel/syscalls/capset/capset01.c b/testcases/kernel/syscalls/capset/capset01.c
> index 029fe7f3d5..a529ca9908 100644
> --- a/testcases/kernel/syscalls/capset/capset01.c
> +++ b/testcases/kernel/syscalls/capset/capset01.c
> @@ -10,8 +10,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test capset() with with LINUX_CAPABILITY_VERSION_{1,2,3}.
> */
>
> diff --git a/testcases/kernel/syscalls/capset/capset02.c b/testcases/kernel/syscalls/capset/capset02.c
> index 989f3e4ce1..36d7996639 100644
> --- a/testcases/kernel/syscalls/capset/capset02.c
> +++ b/testcases/kernel/syscalls/capset/capset02.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Tests basic error handling of the capset syscall.
> *
> * 1. capset() fails with errno set to EFAULT if an invalid address
> diff --git a/testcases/kernel/syscalls/capset/capset03.c b/testcases/kernel/syscalls/capset/capset03.c
> index 2b83e6ce91..a75807ff49 100644
> --- a/testcases/kernel/syscalls/capset/capset03.c
> +++ b/testcases/kernel/syscalls/capset/capset03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * capset() fails with errno set or EPERM if the new_Inheritable is
> * not a subset of old_Inheritable and old_Permitted without CAP_SETPCAP.
> */
> diff --git a/testcases/kernel/syscalls/capset/capset04.c b/testcases/kernel/syscalls/capset/capset04.c
> index 13477a4a98..abe6f8fed8 100644
> --- a/testcases/kernel/syscalls/capset/capset04.c
> +++ b/testcases/kernel/syscalls/capset/capset04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether capset() can be used to modify the capabilities of a thread
> * other than itself. Now, most linux distributions with kernel supporting
> * VFS capabilities, this should be never permitted.
> diff --git a/testcases/kernel/syscalls/chdir/chdir04.c b/testcases/kernel/syscalls/chdir/chdir04.c
> index cdbb29668c..6e53b7fef1 100644
> --- a/testcases/kernel/syscalls/chdir/chdir04.c
> +++ b/testcases/kernel/syscalls/chdir/chdir04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to test whether chdir(2) sets errno correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/chmod/chmod01.c b/testcases/kernel/syscalls/chmod/chmod01.c
> index b3b828ac32..8598acf1a9 100644
> --- a/testcases/kernel/syscalls/chmod/chmod01.c
> +++ b/testcases/kernel/syscalls/chmod/chmod01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that chmod(2) succeeds when used to change the mode permissions
> * of a file or directory.
> */
> diff --git a/testcases/kernel/syscalls/chmod/chmod03.c b/testcases/kernel/syscalls/chmod/chmod03.c
> index 3ceeae261a..d4056ac8cb 100644
> --- a/testcases/kernel/syscalls/chmod/chmod03.c
> +++ b/testcases/kernel/syscalls/chmod/chmod03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, chmod(2) will succeed to change the mode of a file or directory
> * and set the sticky bit on it if invoked by non-root (uid != 0)
> * process with the following constraints:
> diff --git a/testcases/kernel/syscalls/chmod/chmod06.c b/testcases/kernel/syscalls/chmod/chmod06.c
> index 93dd924c8e..7055f0da09 100644
> --- a/testcases/kernel/syscalls/chmod/chmod06.c
> +++ b/testcases/kernel/syscalls/chmod/chmod06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, chmod(2) returns -1 and sets errno to
> *
> * 1. EPERM if the effective user id of process does not match the owner of the
> diff --git a/testcases/kernel/syscalls/chmod/chmod08.c b/testcases/kernel/syscalls/chmod/chmod08.c
> index ec448b4094..ab80e02fc4 100644
> --- a/testcases/kernel/syscalls/chmod/chmod08.c
> +++ b/testcases/kernel/syscalls/chmod/chmod08.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test verifies that chmod() is working correctly on symlink()
> * generated files.
> */
> diff --git a/testcases/kernel/syscalls/chmod/chmod09.c b/testcases/kernel/syscalls/chmod/chmod09.c
> index 898922513a..990600886e 100644
> --- a/testcases/kernel/syscalls/chmod/chmod09.c
> +++ b/testcases/kernel/syscalls/chmod/chmod09.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for kernel commit
> * 5d1f903f75a8 ("attr: block mode changes of symlinks")
> */
> diff --git a/testcases/kernel/syscalls/chown/chown01.c b/testcases/kernel/syscalls/chown/chown01.c
> index 0301309378..18406cf16a 100644
> --- a/testcases/kernel/syscalls/chown/chown01.c
> +++ b/testcases/kernel/syscalls/chown/chown01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for chown(). Calls chown() on a file and expects it to pass.
> */
>
> diff --git a/testcases/kernel/syscalls/chown/chown02.c b/testcases/kernel/syscalls/chown/chown02.c
> index 467185831c..000433da2d 100644
> --- a/testcases/kernel/syscalls/chown/chown02.c
> +++ b/testcases/kernel/syscalls/chown/chown02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that chown(2) invoked by super-user:
> *
> * - clears setuid and setgid bits set on an executable file
> diff --git a/testcases/kernel/syscalls/chown/chown03.c b/testcases/kernel/syscalls/chown/chown03.c
> index b4ca3af732..dd0c9dd0f4 100644
> --- a/testcases/kernel/syscalls/chown/chown03.c
> +++ b/testcases/kernel/syscalls/chown/chown03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, chown(2) succeeds to change the group of a file specified
> * by path when called by non-root user with the following constraints:
> *
> diff --git a/testcases/kernel/syscalls/chown/chown04.c b/testcases/kernel/syscalls/chown/chown04.c
> index 4e91885674..f7a1513356 100644
> --- a/testcases/kernel/syscalls/chown/chown04.c
> +++ b/testcases/kernel/syscalls/chown/chown04.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * 1. Chown() returns -1 and sets errno to EPERM if the effective user id
> diff --git a/testcases/kernel/syscalls/chown/chown05.c b/testcases/kernel/syscalls/chown/chown05.c
> index 44abdc7502..612d6c1ea7 100644
> --- a/testcases/kernel/syscalls/chown/chown05.c
> +++ b/testcases/kernel/syscalls/chown/chown05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, chown(2) succeeds to change the owner and group of a file
> * specified by path to any numeric owner(uid)/group(gid) values when invoked
> * by super-user.
> diff --git a/testcases/kernel/syscalls/chroot/chroot01.c b/testcases/kernel/syscalls/chroot/chroot01.c
> index 60f3f609c6..fa5172de51 100644
> --- a/testcases/kernel/syscalls/chroot/chroot01.c
> +++ b/testcases/kernel/syscalls/chroot/chroot01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the whether chroot sets errno to EPERM.
> *
> * As a non-root user attempt to perform chroot() to a directory. The
> diff --git a/testcases/kernel/syscalls/chroot/chroot02.c b/testcases/kernel/syscalls/chroot/chroot02.c
> index b01a876604..1b4fa2f4f1 100644
> --- a/testcases/kernel/syscalls/chroot/chroot02.c
> +++ b/testcases/kernel/syscalls/chroot/chroot02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic chroot() functionality test.
> *
> * - Create a file in the temporary directory
> diff --git a/testcases/kernel/syscalls/chroot/chroot03.c b/testcases/kernel/syscalls/chroot/chroot03.c
> index 87faec3162..4fe06ec1a8 100644
> --- a/testcases/kernel/syscalls/chroot/chroot03.c
> +++ b/testcases/kernel/syscalls/chroot/chroot03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to test whether chroot(2) sets errno correctly.
> *
> * - to test whether chroot() is setting ENAMETOOLONG if the
> diff --git a/testcases/kernel/syscalls/chroot/chroot04.c b/testcases/kernel/syscalls/chroot/chroot04.c
> index ed0f66323e..c0e7afce60 100644
> --- a/testcases/kernel/syscalls/chroot/chroot04.c
> +++ b/testcases/kernel/syscalls/chroot/chroot04.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check that chroot sets errno to EACCES.
> *
> * As a non-root user attempt to perform chroot() to a directory that the user
> diff --git a/testcases/kernel/syscalls/clock_gettime/clock_gettime03.c b/testcases/kernel/syscalls/clock_gettime/clock_gettime03.c
> index b02d22a142..a4b231e693 100644
> --- a/testcases/kernel/syscalls/clock_gettime/clock_gettime03.c
> +++ b/testcases/kernel/syscalls/clock_gettime/clock_gettime03.c
> @@ -4,8 +4,6 @@
> */
>
> /*
> - * [Description]
> - *
> * After a call to unshare(CLONE_NEWTIME) a new timer namespace is created, the
> * process that has called the unshare() can adjust offsets for CLOCK_MONOTONIC
> * and CLOCK_BOOTTIME for its children by writing to the '/proc/self/timens_offsets'.
> diff --git a/testcases/kernel/syscalls/clock_gettime/clock_gettime04.c b/testcases/kernel/syscalls/clock_gettime/clock_gettime04.c
> index c279da79e0..5dce24c7a7 100644
> --- a/testcases/kernel/syscalls/clock_gettime/clock_gettime04.c
> +++ b/testcases/kernel/syscalls/clock_gettime/clock_gettime04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check time difference between successive readings and report a bug if
> * difference found to be over 5 ms.
> *
> diff --git a/testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c b/testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c
> index dfc5222789..1b097a60fc 100644
> --- a/testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c
> +++ b/testcases/kernel/syscalls/clock_nanosleep/clock_nanosleep03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that clock_nanosleep() adds correctly an offset with absolute timeout
> * and CLOCK_MONOTONIC inside of a timer namespace.
> *
> diff --git a/testcases/kernel/syscalls/clone/clone01.c b/testcases/kernel/syscalls/clone/clone01.c
> index 7e3f15671b..cbe646e676 100644
> --- a/testcases/kernel/syscalls/clone/clone01.c
> +++ b/testcases/kernel/syscalls/clone/clone01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic clone() test.
> *
> * Use clone() to create a child process, and wait for the child process to exit,
> diff --git a/testcases/kernel/syscalls/clone/clone03.c b/testcases/kernel/syscalls/clone/clone03.c
> index 2c912b9dc6..8c343b2cc5 100644
> --- a/testcases/kernel/syscalls/clone/clone03.c
> +++ b/testcases/kernel/syscalls/clone/clone03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check for equality of getpid() from a child and return value of clone(2)
> */
>
> diff --git a/testcases/kernel/syscalls/clone/clone04.c b/testcases/kernel/syscalls/clone/clone04.c
> index 74347e2b47..30edeaeb0d 100644
> --- a/testcases/kernel/syscalls/clone/clone04.c
> +++ b/testcases/kernel/syscalls/clone/clone04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that clone(2) fails with
> *
> * - EINVAL if child stack is set to NULL
> diff --git a/testcases/kernel/syscalls/clone/clone05.c b/testcases/kernel/syscalls/clone/clone05.c
> index 892a848bed..56d2f8bbad 100644
> --- a/testcases/kernel/syscalls/clone/clone05.c
> +++ b/testcases/kernel/syscalls/clone/clone05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Call clone() with CLONE_VFORK flag set. verify that
> * execution of parent is suspended until child finishes
> */
> diff --git a/testcases/kernel/syscalls/clone/clone06.c b/testcases/kernel/syscalls/clone/clone06.c
> index b32f17d93f..412ebb7a34 100644
> --- a/testcases/kernel/syscalls/clone/clone06.c
> +++ b/testcases/kernel/syscalls/clone/clone06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test to verify inheritance of environment variables by child.
> */
>
> diff --git a/testcases/kernel/syscalls/clone/clone07.c b/testcases/kernel/syscalls/clone/clone07.c
> index 8848b2b444..9ff53658ae 100644
> --- a/testcases/kernel/syscalls/clone/clone07.c
> +++ b/testcases/kernel/syscalls/clone/clone07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for a libc bug where exiting child function by returning from
> * it caused SIGSEGV.
> */
> diff --git a/testcases/kernel/syscalls/clone3/clone301.c b/testcases/kernel/syscalls/clone3/clone301.c
> index d0fadbc5d0..deed30b9f0 100644
> --- a/testcases/kernel/syscalls/clone3/clone301.c
> +++ b/testcases/kernel/syscalls/clone3/clone301.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic clone3() test.
> */
>
> diff --git a/testcases/kernel/syscalls/clone3/clone302.c b/testcases/kernel/syscalls/clone3/clone302.c
> index 48b831554c..9e98f19545 100644
> --- a/testcases/kernel/syscalls/clone3/clone302.c
> +++ b/testcases/kernel/syscalls/clone3/clone302.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic clone3() test to check various failures.
> */
>
> diff --git a/testcases/kernel/syscalls/clone3/clone303.c b/testcases/kernel/syscalls/clone3/clone303.c
> index 04c41942a0..7e5f3adb3c 100644
> --- a/testcases/kernel/syscalls/clone3/clone303.c
> +++ b/testcases/kernel/syscalls/clone3/clone303.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test case check clone3 CLONE_INTO_CGROUP flag
> *
> */
> diff --git a/testcases/kernel/syscalls/close/close01.c b/testcases/kernel/syscalls/close/close01.c
> index f2d30a693a..4e4f107ef9 100644
> --- a/testcases/kernel/syscalls/close/close01.c
> +++ b/testcases/kernel/syscalls/close/close01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that closing a file/pipe/socket works correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/close/close02.c b/testcases/kernel/syscalls/close/close02.c
> index d317cc63b6..2016453f8a 100644
> --- a/testcases/kernel/syscalls/close/close02.c
> +++ b/testcases/kernel/syscalls/close/close02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Call close(-1) and expects it to return EBADF.
> */
>
> diff --git a/testcases/kernel/syscalls/close_range/close_range01.c b/testcases/kernel/syscalls/close_range/close_range01.c
> index 941f3e4038..60e63325b6 100644
> --- a/testcases/kernel/syscalls/close_range/close_range01.c
> +++ b/testcases/kernel/syscalls/close_range/close_range01.c
> @@ -10,8 +10,6 @@
> * Copyright (c) 2021 SUSE LLC, other copyrights may apply.
> */
> /*\
> - * [Description]
> - *
> * We check that close_range()
> *
> * - closes FDs
> diff --git a/testcases/kernel/syscalls/close_range/close_range02.c b/testcases/kernel/syscalls/close_range/close_range02.c
> index 48d9a31df4..f9b0cc5a0f 100644
> --- a/testcases/kernel/syscalls/close_range/close_range02.c
> +++ b/testcases/kernel/syscalls/close_range/close_range02.c
> @@ -3,8 +3,6 @@
> * Copyright (c) 2021 SUSE LLC
> */
> /*\
> - * [Description]
> - *
> * - First check close_range works on a valid range.
> * - Then check close_range does not accept invalid paramters.
> * - Then check it accepts a large lower fd.
> diff --git a/testcases/kernel/syscalls/cma/process_vm01.c b/testcases/kernel/syscalls/cma/process_vm01.c
> index 014fd6fffe..730ae67e7c 100644
> --- a/testcases/kernel/syscalls/cma/process_vm01.c
> +++ b/testcases/kernel/syscalls/cma/process_vm01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test errno codes in process_vm_readv and process_vm_writev syscalls.
> */
>
> diff --git a/testcases/kernel/syscalls/cma/process_vm_readv02.c b/testcases/kernel/syscalls/cma/process_vm_readv02.c
> index 2bd66a49fd..1e2ac38fac 100644
> --- a/testcases/kernel/syscalls/cma/process_vm_readv02.c
> +++ b/testcases/kernel/syscalls/cma/process_vm_readv02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Fork two children, one child allocates memory and initializes it;
> * then the other one calls process_vm_readv and reads from the same
> * memory location, it then verifies if process_vm_readv returns
> diff --git a/testcases/kernel/syscalls/cma/process_vm_readv03.c b/testcases/kernel/syscalls/cma/process_vm_readv03.c
> index 4caafe8670..95d35c4226 100644
> --- a/testcases/kernel/syscalls/cma/process_vm_readv03.c
> +++ b/testcases/kernel/syscalls/cma/process_vm_readv03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Fork two children, one child mallocs randomly sized trunks of memory
> * and initializes them; the other child calls process_vm_readv with
> * the remote iovecs initialized to the original process memory
> diff --git a/testcases/kernel/syscalls/cma/process_vm_writev02.c b/testcases/kernel/syscalls/cma/process_vm_writev02.c
> index 991110d24a..aaf4c0b186 100644
> --- a/testcases/kernel/syscalls/cma/process_vm_writev02.c
> +++ b/testcases/kernel/syscalls/cma/process_vm_writev02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Fork two children, the first one allocates a chunk of memory and the
> * other one call process_vm_writev to write known data into the first
> * child. Then first child verifies that the data is as expected.
> diff --git a/testcases/kernel/syscalls/confstr/confstr01.c b/testcases/kernel/syscalls/confstr/confstr01.c
> index d5cb5a4776..103b852655 100644
> --- a/testcases/kernel/syscalls/confstr/confstr01.c
> +++ b/testcases/kernel/syscalls/confstr/confstr01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test confstr(3) 700 (X/Open 7) functionality -- POSIX 2008.
> */
>
> diff --git a/testcases/kernel/syscalls/creat/creat08.c b/testcases/kernel/syscalls/creat/creat08.c
> index 011753ac5c..ab537de986 100644
> --- a/testcases/kernel/syscalls/creat/creat08.c
> +++ b/testcases/kernel/syscalls/creat/creat08.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the group ID and setgid bit are set correctly when a new file
> * is created.
> */
> diff --git a/testcases/kernel/syscalls/creat/creat09.c b/testcases/kernel/syscalls/creat/creat09.c
> index d181657728..ac46c940c7 100644
> --- a/testcases/kernel/syscalls/creat/creat09.c
> +++ b/testcases/kernel/syscalls/creat/creat09.c
> @@ -3,8 +3,6 @@
> * Copyright (c) 2021 SUSE LLC <mdoucha@suse.cz>
> */
> /*\
> - * [Description]
> - *
> * CVE-2018-13405
> *
> * Check for possible privilege escalation through creating files with setgid
> diff --git a/testcases/kernel/syscalls/delete_module/delete_module01.c b/testcases/kernel/syscalls/delete_module/delete_module01.c
> index bcaa0763de..a64c1b63e8 100644
> --- a/testcases/kernel/syscalls/delete_module/delete_module01.c
> +++ b/testcases/kernel/syscalls/delete_module/delete_module01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for delete_module(2).
> *
> * Install dummy_del_mod.ko and delete it with delete_module(2).
> diff --git a/testcases/kernel/syscalls/dup/dup01.c b/testcases/kernel/syscalls/dup/dup01.c
> index f5cd058e8b..7a1da27247 100644
> --- a/testcases/kernel/syscalls/dup/dup01.c
> +++ b/testcases/kernel/syscalls/dup/dup01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that dup(2) syscall executes successfully and allocates
> * a new file descriptor which refers to the same open file as oldfd.
> */
> diff --git a/testcases/kernel/syscalls/dup/dup02.c b/testcases/kernel/syscalls/dup/dup02.c
> index 5391738a44..b6e270ab77 100644
> --- a/testcases/kernel/syscalls/dup/dup02.c
> +++ b/testcases/kernel/syscalls/dup/dup02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that dup(2) syscall fails with errno EBADF when called with
> * invalid value for oldfd argument.
> */
> diff --git a/testcases/kernel/syscalls/dup/dup03.c b/testcases/kernel/syscalls/dup/dup03.c
> index d59e61f2b1..1d9919ebf8 100644
> --- a/testcases/kernel/syscalls/dup/dup03.c
> +++ b/testcases/kernel/syscalls/dup/dup03.c
> @@ -5,8 +5,6 @@
> *
> */
> /*\
> - * [Description]
> - *
> * Verify that dup(2) syscall fails with errno EMFILE when the per-process
> * limit on the number of open file descriptors has been reached.
> */
> diff --git a/testcases/kernel/syscalls/dup/dup04.c b/testcases/kernel/syscalls/dup/dup04.c
> index 053fb40c21..4869f43714 100644
> --- a/testcases/kernel/syscalls/dup/dup04.c
> +++ b/testcases/kernel/syscalls/dup/dup04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for dup(2) of a system pipe descriptor.
> */
>
> diff --git a/testcases/kernel/syscalls/dup/dup05.c b/testcases/kernel/syscalls/dup/dup05.c
> index 619b4861ea..e2bc9a4a3a 100644
> --- a/testcases/kernel/syscalls/dup/dup05.c
> +++ b/testcases/kernel/syscalls/dup/dup05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for dup(2) of a named pipe descriptor.
> */
>
> diff --git a/testcases/kernel/syscalls/dup/dup06.c b/testcases/kernel/syscalls/dup/dup06.c
> index cd4cb35137..accc32d605 100644
> --- a/testcases/kernel/syscalls/dup/dup06.c
> +++ b/testcases/kernel/syscalls/dup/dup06.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for dup(2) syscall with max open file descriptors.
> */
>
> diff --git a/testcases/kernel/syscalls/dup/dup07.c b/testcases/kernel/syscalls/dup/dup07.c
> index 688ee19896..aa91d5d55a 100644
> --- a/testcases/kernel/syscalls/dup/dup07.c
> +++ b/testcases/kernel/syscalls/dup/dup07.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the file descriptor created by dup(2) syscall has the same
> * access mode as the old one.
> */
> diff --git a/testcases/kernel/syscalls/dup2/dup201.c b/testcases/kernel/syscalls/dup2/dup201.c
> index d851eea78f..9d2c7eb3fc 100644
> --- a/testcases/kernel/syscalls/dup2/dup201.c
> +++ b/testcases/kernel/syscalls/dup2/dup201.c
> @@ -5,8 +5,6 @@
> * 01/2002 Removed EMFILE test - Paul Larson
> */
> /*\
> - * [Description]
> - *
> * Negative tests for dup2() with bad fd (EBADF).
> *
> * - First fd argument is less than 0
> diff --git a/testcases/kernel/syscalls/dup2/dup202.c b/testcases/kernel/syscalls/dup2/dup202.c
> index 659f3a4ecd..b4dcd19510 100644
> --- a/testcases/kernel/syscalls/dup2/dup202.c
> +++ b/testcases/kernel/syscalls/dup2/dup202.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether the access mode are the same for both file descriptors.
> *
> * Create file with mode, dup2, [change mode], check mode
> diff --git a/testcases/kernel/syscalls/dup2/dup203.c b/testcases/kernel/syscalls/dup2/dup203.c
> index c8d1095f38..384662eee1 100644
> --- a/testcases/kernel/syscalls/dup2/dup203.c
> +++ b/testcases/kernel/syscalls/dup2/dup203.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the basic functionality of dup2().
> *
> * - Attempt to dup2() on an open file descriptor.
> diff --git a/testcases/kernel/syscalls/dup2/dup204.c b/testcases/kernel/syscalls/dup2/dup204.c
> index 112ce0c9da..dbb0233a85 100644
> --- a/testcases/kernel/syscalls/dup2/dup204.c
> +++ b/testcases/kernel/syscalls/dup2/dup204.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether the inode number are the same for both file descriptors.
> */
>
> diff --git a/testcases/kernel/syscalls/dup2/dup205.c b/testcases/kernel/syscalls/dup2/dup205.c
> index fa7b27d96c..b95a9212bc 100644
> --- a/testcases/kernel/syscalls/dup2/dup205.c
> +++ b/testcases/kernel/syscalls/dup2/dup205.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Negative test for dup2() with max open file descriptors.
> */
>
> diff --git a/testcases/kernel/syscalls/dup2/dup206.c b/testcases/kernel/syscalls/dup2/dup206.c
> index 17d527a1ec..549d3a9fdb 100644
> --- a/testcases/kernel/syscalls/dup2/dup206.c
> +++ b/testcases/kernel/syscalls/dup2/dup206.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * If oldfd is a valid file descriptor, and newfd has the same value as oldfd,
> * then dup2() does nothing, and returns newfd.
> */
> diff --git a/testcases/kernel/syscalls/dup2/dup207.c b/testcases/kernel/syscalls/dup2/dup207.c
> index f1b184f5b2..c6c6cb480f 100644
> --- a/testcases/kernel/syscalls/dup2/dup207.c
> +++ b/testcases/kernel/syscalls/dup2/dup207.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether the file offset are the same for both file descriptors.
> */
>
> diff --git a/testcases/kernel/syscalls/dup3/dup3_01.c b/testcases/kernel/syscalls/dup3/dup3_01.c
> index 517491d44e..3f27b1c7ef 100644
> --- a/testcases/kernel/syscalls/dup3/dup3_01.c
> +++ b/testcases/kernel/syscalls/dup3/dup3_01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check whether dup3() supports O_CLOEXEC flag.
> */
>
> diff --git a/testcases/kernel/syscalls/dup3/dup3_02.c b/testcases/kernel/syscalls/dup3/dup3_02.c
> index 009b0037df..a618b3e98b 100644
> --- a/testcases/kernel/syscalls/dup3/dup3_02.c
> +++ b/testcases/kernel/syscalls/dup3/dup3_02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for various EINVAL error.
> *
> * - oldfd is equal to newfd without using O_CLOEXEC flag
> diff --git a/testcases/kernel/syscalls/epoll_create/epoll_create01.c b/testcases/kernel/syscalls/epoll_create/epoll_create01.c
> index 443554fe09..2e8e813d76 100644
> --- a/testcases/kernel/syscalls/epoll_create/epoll_create01.c
> +++ b/testcases/kernel/syscalls/epoll_create/epoll_create01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that epoll_create return a nonnegative file descriptor on success.
> *
> * The size argument informed the kernel of the number of file descriptors
> diff --git a/testcases/kernel/syscalls/epoll_create/epoll_create02.c b/testcases/kernel/syscalls/epoll_create/epoll_create02.c
> index 942d7afd35..2ec8e925c6 100644
> --- a/testcases/kernel/syscalls/epoll_create/epoll_create02.c
> +++ b/testcases/kernel/syscalls/epoll_create/epoll_create02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that epoll_create returns -1 and set errno to EINVAL if size is not
> * greater than zero.
> */
> diff --git a/testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c b/testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c
> index 6d2bf2a30d..9e43f4d4ec 100644
> --- a/testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c
> +++ b/testcases/kernel/syscalls/epoll_create1/epoll_create1_01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that epoll_create1 sets the close-on-exec flag for the returned
> * file descriptor with EPOLL_CLOEXEC.
> */
> diff --git a/testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c b/testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c
> index 74c311694f..3a2ac988af 100644
> --- a/testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c
> +++ b/testcases/kernel/syscalls/epoll_create1/epoll_create1_02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that epoll_create1 returns -1 and set errno to EINVAL with an invalid
> * value specified in flags.
> */
> diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c
> index 298ed89cb2..bd0a2260f8 100644
> --- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c
> +++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the epoll_ctl:
> *
> * - When epoll_ctl succeeds to register fd on the epoll instance and associates
> diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c
> index dcf74bf770..a17148f174 100644
> --- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c
> +++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that epoll_ctl() fails with:
> *
> * - EBADF if epfd is an invalid fd.
> diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c
> index f617295cc1..e8d3d5f369 100644
> --- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c
> +++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that epoll_ctl returns zero with different combinations of events on
> * success.
> */
> diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
> index bc015c01bc..955959b6b2 100644
> --- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
> +++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the maximum number of nesting allowed inside epoll sets is 5,
> * otherwise epoll_ctl fails with EINVAL.
> */
> diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c
> index 71e300daa2..fc59ef2563 100644
> --- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c
> +++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that epoll_ctl() fails with ELOOP if fd refers to an epoll instance
> * and this EPOLL_CTL_ADD operation would result in a circular loop of epoll
> * instances monitoring one another.
> diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c
> index f3ca894fb1..954e773149 100644
> --- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c
> +++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for epoll_pwait() and epoll_pwait2().
> *
> * - With a sigmask a signal is ignored and the syscall safely waits until
> diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c
> index 3341a2b09b..069620c5d8 100644
> --- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c
> +++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for epoll_pwait and epoll_pwait2. Checks if data avaiable in a
> * file descriptor are reported correctly in the syscall return value.
> */
> diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c
> index 94b785b1a5..8217f9f800 100644
> --- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c
> +++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that epoll_pwait and epoll_pwait2 timeouts correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c
> index a75751db93..cc1d04e6ba 100644
> --- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c
> +++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, epoll_pwait() and epoll_pwait2() return -1 and set errno to
> * EFAULT with a sigmask points outside user's accessible address space.
> */
> diff --git a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c
> index b75a995396..9ac5e82604 100644
> --- a/testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c
> +++ b/testcases/kernel/syscalls/epoll_pwait/epoll_pwait05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, epoll_pwait2() return -1 and set errno to EINVAL with an
> * invalid timespec.
> */
> diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait01.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait01.c
> index 4f84384880..2485be513f 100644
> --- a/testcases/kernel/syscalls/epoll_wait/epoll_wait01.c
> +++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for epoll_wait. Check that epoll_wait works for EPOLLOUT and
> * EPOLLIN events on an epoll instance and that struct epoll_event is set
> * correctly.
> diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait02.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait02.c
> index 93ada1cf3e..9b6e932bba 100644
> --- a/testcases/kernel/syscalls/epoll_wait/epoll_wait02.c
> +++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that epoll_wait(2) timeouts correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait03.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait03.c
> index d31e498644..e55d65ca88 100644
> --- a/testcases/kernel/syscalls/epoll_wait/epoll_wait03.c
> +++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for epoll_wait:
> *
> * - epoll_wait fails with EBADF if epfd is not a valid file descriptor.
> diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait04.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait04.c
> index bd8baca220..5c4a545471 100644
> --- a/testcases/kernel/syscalls/epoll_wait/epoll_wait04.c
> +++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that a timeout equal to zero causes epoll_wait() to return immediately.
> */
>
> diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait05.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait05.c
> index d06a024ffc..33d08c0c7f 100644
> --- a/testcases/kernel/syscalls/epoll_wait/epoll_wait05.c
> +++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that epoll receives EPOLLRDHUP event when we hang a reading
> * half-socket we are polling on.
> */
> diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait06.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait06.c
> index f35e0423ae..0bf8a29dad 100644
> --- a/testcases/kernel/syscalls/epoll_wait/epoll_wait06.c
> +++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that edge triggering is correctly handled by epoll, for both EPOLLIN
> * and EPOLLOUT.
> *
> diff --git a/testcases/kernel/syscalls/epoll_wait/epoll_wait07.c b/testcases/kernel/syscalls/epoll_wait/epoll_wait07.c
> index dfabd0d878..329bf2a5cf 100644
> --- a/testcases/kernel/syscalls/epoll_wait/epoll_wait07.c
> +++ b/testcases/kernel/syscalls/epoll_wait/epoll_wait07.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that EPOLLONESHOT is correctly handled by epoll_wait.
> * We open a channel, write in it two times and verify that EPOLLIN has been
> * received only once.
> diff --git a/testcases/kernel/syscalls/eventfd/eventfd01.c b/testcases/kernel/syscalls/eventfd/eventfd01.c
> index b66d6a55c4..4fe209a139 100644
> --- a/testcases/kernel/syscalls/eventfd/eventfd01.c
> +++ b/testcases/kernel/syscalls/eventfd/eventfd01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify read operation for eventfd fail with:
> *
> * - EAGAIN when counter is zero on non blocking fd
> diff --git a/testcases/kernel/syscalls/eventfd/eventfd02.c b/testcases/kernel/syscalls/eventfd/eventfd02.c
> index f028961c73..7691b165ad 100644
> --- a/testcases/kernel/syscalls/eventfd/eventfd02.c
> +++ b/testcases/kernel/syscalls/eventfd/eventfd02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify write operation for eventfd fail with:
> *
> * - EAGAIN when counter is zero on non blocking fd
> diff --git a/testcases/kernel/syscalls/eventfd/eventfd03.c b/testcases/kernel/syscalls/eventfd/eventfd03.c
> index 452264cad2..31761a4499 100644
> --- a/testcases/kernel/syscalls/eventfd/eventfd03.c
> +++ b/testcases/kernel/syscalls/eventfd/eventfd03.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether readfd is set by select() when eventfd() counter value is
> * non-zero, then check if readfd is not set when eventfd() counter value is
> * zero.
> diff --git a/testcases/kernel/syscalls/eventfd/eventfd04.c b/testcases/kernel/syscalls/eventfd/eventfd04.c
> index c7186ae64f..4ee67d308a 100644
> --- a/testcases/kernel/syscalls/eventfd/eventfd04.c
> +++ b/testcases/kernel/syscalls/eventfd/eventfd04.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether writefd is set by select() when eventfd() counter value is
> * not the maximum value, then check if writefd is not set when eventfd()
> * counter value is maximum value.
> diff --git a/testcases/kernel/syscalls/eventfd/eventfd05.c b/testcases/kernel/syscalls/eventfd/eventfd05.c
> index 6ea2c4138a..76806c6b53 100644
> --- a/testcases/kernel/syscalls/eventfd/eventfd05.c
> +++ b/testcases/kernel/syscalls/eventfd/eventfd05.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether eventfd() counter update in child is reflected in the parent.
> */
>
> diff --git a/testcases/kernel/syscalls/eventfd/eventfd06.c b/testcases/kernel/syscalls/eventfd/eventfd06.c
> index 46d7f73d3a..0ac48b2c84 100644
> --- a/testcases/kernel/syscalls/eventfd/eventfd06.c
> +++ b/testcases/kernel/syscalls/eventfd/eventfd06.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether counter overflow is detected and handled correctly.
> *
> * It is not possible to directly overflow the counter using the
> diff --git a/testcases/kernel/syscalls/eventfd2/eventfd2_01.c b/testcases/kernel/syscalls/eventfd2/eventfd2_01.c
> index 3a80379a39..9c63891cb4 100644
> --- a/testcases/kernel/syscalls/eventfd2/eventfd2_01.c
> +++ b/testcases/kernel/syscalls/eventfd2/eventfd2_01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that eventfd2 correctly set FD_CLOEXEC flag on file when
> * EFD_CLOEXEC flag is used.
> */
> diff --git a/testcases/kernel/syscalls/eventfd2/eventfd2_02.c b/testcases/kernel/syscalls/eventfd2/eventfd2_02.c
> index 430cdb33cc..4d837804da 100644
> --- a/testcases/kernel/syscalls/eventfd2/eventfd2_02.c
> +++ b/testcases/kernel/syscalls/eventfd2/eventfd2_02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that eventfd2 correctly set O_NONBLOCK flag on file when
> * EFD_NONBLOCK flag is used.
> */
> diff --git a/testcases/kernel/syscalls/eventfd2/eventfd2_03.c b/testcases/kernel/syscalls/eventfd2/eventfd2_03.c
> index e1949fd323..058e5734fb 100644
> --- a/testcases/kernel/syscalls/eventfd2/eventfd2_03.c
> +++ b/testcases/kernel/syscalls/eventfd2/eventfd2_03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that eventfd2 semaphore-like support is properly working.
> */
>
> diff --git a/testcases/kernel/syscalls/execve/execve04.c b/testcases/kernel/syscalls/execve/execve04.c
> index 7bbfece859..7b475dd1af 100644
> --- a/testcases/kernel/syscalls/execve/execve04.c
> +++ b/testcases/kernel/syscalls/execve/execve04.c
> @@ -9,8 +9,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Attempt to execve(2) a file which is being opened by another process for
> * writing fails with ETXTBSY.
> */
> diff --git a/testcases/kernel/syscalls/execve/execve05.c b/testcases/kernel/syscalls/execve/execve05.c
> index 530c7cc890..ec0fc102a3 100644
> --- a/testcases/kernel/syscalls/execve/execve05.c
> +++ b/testcases/kernel/syscalls/execve/execve05.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This tests the functionality of the execve(2) system call by spawning
> * a few children, each of which would execute "execve_child" simultaneously,
> * and finally the parent ensures that they terminated correctly.
> diff --git a/testcases/kernel/syscalls/execve/execve06.c b/testcases/kernel/syscalls/execve/execve06.c
> index a000892655..f0ce990d6f 100644
> --- a/testcases/kernel/syscalls/execve/execve06.c
> +++ b/testcases/kernel/syscalls/execve/execve06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that kernel adds dummy argv[0] if empty argument list was passed to
> * execve(). This fixes at least one CVE where userspace programs start to
> * process argument list blindly from argv[1] such as polkit pkexec
> diff --git a/testcases/kernel/syscalls/exit_group/exit_group01.c b/testcases/kernel/syscalls/exit_group/exit_group01.c
> index 6407a20e8f..585bb7cdb4 100644
> --- a/testcases/kernel/syscalls/exit_group/exit_group01.c
> +++ b/testcases/kernel/syscalls/exit_group/exit_group01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test checks if exit_group() correctly ends a spawned child and all its
> * running threads.
> */
> diff --git a/testcases/kernel/syscalls/faccessat/faccessat01.c b/testcases/kernel/syscalls/faccessat/faccessat01.c
> index 6be2b4bb73..2c54fe2bd1 100644
> --- a/testcases/kernel/syscalls/faccessat/faccessat01.c
> +++ b/testcases/kernel/syscalls/faccessat/faccessat01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the faccessat() system call.
> *
> * - faccessat() passes if dir_fd is file descriptor to the directory
> diff --git a/testcases/kernel/syscalls/faccessat/faccessat02.c b/testcases/kernel/syscalls/faccessat/faccessat02.c
> index 1add695c1f..3f79a25948 100644
> --- a/testcases/kernel/syscalls/faccessat/faccessat02.c
> +++ b/testcases/kernel/syscalls/faccessat/faccessat02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * - faccessat() fails with ENOTDIR if dir_fd is file descriptor to the file
> * and pathname is relative path of the file.
> *
> diff --git a/testcases/kernel/syscalls/faccessat2/faccessat201.c b/testcases/kernel/syscalls/faccessat2/faccessat201.c
> index 1be6e9aa06..0fa807e394 100644
> --- a/testcases/kernel/syscalls/faccessat2/faccessat201.c
> +++ b/testcases/kernel/syscalls/faccessat2/faccessat201.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of faccessat2().
> *
> * Minimum Linux version required is v5.8.
> diff --git a/testcases/kernel/syscalls/faccessat2/faccessat202.c b/testcases/kernel/syscalls/faccessat2/faccessat202.c
> index a60db2bf81..0878457eb7 100644
> --- a/testcases/kernel/syscalls/faccessat2/faccessat202.c
> +++ b/testcases/kernel/syscalls/faccessat2/faccessat202.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test basic error handling of faccessat2 syscall:
> *
> * - faccessat2() fails with EFAULT if pathname is a bad pathname point.
> diff --git a/testcases/kernel/syscalls/fallocate/fallocate03.c b/testcases/kernel/syscalls/fallocate/fallocate03.c
> index b3e6b38172..dc15b8764e 100644
> --- a/testcases/kernel/syscalls/fallocate/fallocate03.c
> +++ b/testcases/kernel/syscalls/fallocate/fallocate03.c
> @@ -8,7 +8,6 @@
> */
>
> /*\
> - * [Description]
> * Test fallocate() on sparse file for different offsets, with a total of 8 test cases
> */
>
> diff --git a/testcases/kernel/syscalls/fallocate/fallocate06.c b/testcases/kernel/syscalls/fallocate/fallocate06.c
> index 0e1509ace6..3730bddc0b 100644
> --- a/testcases/kernel/syscalls/fallocate/fallocate06.c
> +++ b/testcases/kernel/syscalls/fallocate/fallocate06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests misaligned fallocate()
> *
> * Test scenario:
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify01.c b/testcases/kernel/syscalls/fanotify/fanotify01.c
> index c7e759166d..fa0d5e84ad 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify01.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify01.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify work for a file.
> */
>
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify02.c b/testcases/kernel/syscalls/fanotify/fanotify02.c
> index 19854064a6..34c77967f7 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify02.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify02.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify work for children of a directory.
> */
>
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify03.c b/testcases/kernel/syscalls/fanotify/fanotify03.c
> index 64c933c190..6a0042fd42 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify03.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify03.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify permission events work.
> */
>
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify04.c b/testcases/kernel/syscalls/fanotify/fanotify04.c
> index 378bc57c0d..9625e6f9be 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify04.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify04.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check various fanotify special flags.
> */
>
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify05.c b/testcases/kernel/syscalls/fanotify/fanotify05.c
> index f43332fedf..5eddb5d77d 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify05.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify05.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify overflow event is properly generated.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify06.c b/testcases/kernel/syscalls/fanotify/fanotify06.c
> index b4992afa0f..2e93840f0f 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify06.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify06.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify properly merges ignore mask of an inode and mountpoint.
> */
>
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify07.c b/testcases/kernel/syscalls/fanotify/fanotify07.c
> index 34aa810c7d..7734b1858d 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify07.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify07.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify permission events are handled properly on instance destruction.
> */
>
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify08.c b/testcases/kernel/syscalls/fanotify/fanotify08.c
> index 405965f7f7..abbf0b8a75 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify08.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify08.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Sanity check fanotify_init flag FAN_CLOEXEC by fcntl.
> */
>
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify09.c b/testcases/kernel/syscalls/fanotify/fanotify09.c
> index 45303c31e7..2ed3d1eb7b 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify09.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify09.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify handles events on children correctly when both parent and
> * subdir or mountpoint marks exist.
> */
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify10.c b/testcases/kernel/syscalls/fanotify/fanotify10.c
> index 23e9554b39..ccb4f55df3 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify10.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify10.c
> @@ -8,7 +8,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify properly merges ignore mask of a mount mark
> * with a mask of an inode mark on the same group. Unlike the
> * prototype test fanotify06, do not use FAN_MODIFY event for the
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify11.c b/testcases/kernel/syscalls/fanotify/fanotify11.c
> index ce46913b17..594d5f9daf 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify11.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify11.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * After fanotify_init adds flags FAN_REPORT_TID,
> * check whether the program can accurately identify which thread id
> * in the multithreaded program triggered the event.
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify12.c b/testcases/kernel/syscalls/fanotify/fanotify12.c
> index 60ba27e168..e5624835a8 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify12.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify12.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Validate that the newly introduced FAN_OPEN_EXEC mask functions as expected.
> * The idea is to generate a sequence of open related actions to ensure that
> * the correct event flags are being set depending on what event mask was
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify13.c b/testcases/kernel/syscalls/fanotify/fanotify13.c
> index 840018fa7f..32b2b8238b 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify13.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify13.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Validate that the values returned within an event when FAN_REPORT_FID is
> * specified matches those that are obtained via explicit invocation to system
> * calls statfs(2) and name_to_handle_at(2).
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify14.c b/testcases/kernel/syscalls/fanotify/fanotify14.c
> index b17bffd184..a00ca9758d 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify14.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify14.c
> @@ -7,7 +7,6 @@
> */
>
> /*\
> - * [Description]
> * This test file has been designed to ensure that the fanotify
> * system calls fanotify_init(2) and fanotify_mark(2) return the
> * correct error code to the calling process when an invalid flag or
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify15.c b/testcases/kernel/syscalls/fanotify/fanotify15.c
> index bacf05049f..2218dd6669 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify15.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify15.c
> @@ -7,7 +7,6 @@
> */
>
> /*\
> - * [Description]
> * Test file that has been purposely designed to verify FAN_REPORT_FID
> * functionality while using newly defined dirent events.
> */
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify16.c b/testcases/kernel/syscalls/fanotify/fanotify16.c
> index 6ab3609849..d4ad65bceb 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify16.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify16.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check fanotify directory entry modification events, events on child and
> * on self with group init flags:
> *
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify17.c b/testcases/kernel/syscalls/fanotify/fanotify17.c
> index 3ecb31b6e7..f6e282e7fc 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify17.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify17.c
> @@ -8,7 +8,6 @@
> */
>
> /*\
> - * [Description]
> * Check that fanotify groups and marks limits are enforced correctly.
> * If user ns is supported, verify that global limit and per user ns
> * limits are both enforced.
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify18.c b/testcases/kernel/syscalls/fanotify/fanotify18.c
> index 07b064b921..4fd9974601 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify18.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify18.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * This set of tests is to ensure that the unprivileged listener feature of
> * fanotify is functioning as expected. The objective this test case file
> * is to validate whether any forbidden flags that are passed by an
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify19.c b/testcases/kernel/syscalls/fanotify/fanotify19.c
> index 63fc4ee0c0..80790955f1 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify19.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify19.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * This set of tests is to ensure that the unprivileged listener feature of
> * fanotify is functioning as expected. The objective of this test file is
> * to generate a sequence of events and ensure that the returned events
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify20.c b/testcases/kernel/syscalls/fanotify/fanotify20.c
> index 1d249ac9cf..82d2049255 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify20.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify20.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This source file contains a test case which ensures that the fanotify API
> * returns an expected error code when provided an invalid initialization flag
> * alongside FAN_REPORT_PIDFD. Additionally, it checks that the operability with
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify21.c b/testcases/kernel/syscalls/fanotify/fanotify21.c
> index 8765767f20..c95895c93a 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify21.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify21.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * A test which verifies whether the returned struct
> * fanotify_event_info_pidfd in FAN_REPORT_PIDFD mode contains the
> * expected set of information.
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify22.c b/testcases/kernel/syscalls/fanotify/fanotify22.c
> index 1c72101369..2fbb6fa404 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify22.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify22.c
> @@ -7,7 +7,6 @@
> */
>
> /*\
> - * [Description]
> * Check fanotify FAN_ERROR_FS events triggered by intentionally
> * corrupted filesystems:
> *
> diff --git a/testcases/kernel/syscalls/fanotify/fanotify23.c b/testcases/kernel/syscalls/fanotify/fanotify23.c
> index 957eba19a5..896a8a850a 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify23.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify23.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Check evictable fanotify inode marks.
> */
>
> diff --git a/testcases/kernel/syscalls/fchmod/fchmod01.c b/testcases/kernel/syscalls/fchmod/fchmod01.c
> index 417ea0a70c..e23dcded89 100644
> --- a/testcases/kernel/syscalls/fchmod/fchmod01.c
> +++ b/testcases/kernel/syscalls/fchmod/fchmod01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that fchmod() can succeed to change the mode permissions of a file specified
> * by file descriptor.
> */
> diff --git a/testcases/kernel/syscalls/fchmod/fchmod02.c b/testcases/kernel/syscalls/fchmod/fchmod02.c
> index d6abeffce8..e25739bcf6 100644
> --- a/testcases/kernel/syscalls/fchmod/fchmod02.c
> +++ b/testcases/kernel/syscalls/fchmod/fchmod02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, fchmod(2) will succeed to change the mode of a file/directory
> * set the sticky bit on it if invoked by root (uid = 0) process with
> * the following constraints:
> diff --git a/testcases/kernel/syscalls/fchmod/fchmod03.c b/testcases/kernel/syscalls/fchmod/fchmod03.c
> index bdd720c37b..028ec15575 100644
> --- a/testcases/kernel/syscalls/fchmod/fchmod03.c
> +++ b/testcases/kernel/syscalls/fchmod/fchmod03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, fchmod(2) will succeed to change the mode of a file
> * and set the sticky bit on it if invoked by non-root (uid != 0)
> * process with the following constraints:
> diff --git a/testcases/kernel/syscalls/fchmod/fchmod04.c b/testcases/kernel/syscalls/fchmod/fchmod04.c
> index 4fa69e2270..5276870250 100644
> --- a/testcases/kernel/syscalls/fchmod/fchmod04.c
> +++ b/testcases/kernel/syscalls/fchmod/fchmod04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, fchmod(2) will succeed to change the mode of a directory
> * and set the sticky bit on it if invoked by non-root (uid != 0) process
> * with the following constraints:
> diff --git a/testcases/kernel/syscalls/fchmod/fchmod05.c b/testcases/kernel/syscalls/fchmod/fchmod05.c
> index 9b29cea20b..0489cb6a89 100644
> --- a/testcases/kernel/syscalls/fchmod/fchmod05.c
> +++ b/testcases/kernel/syscalls/fchmod/fchmod05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, fchmod(2) will succeed to change the mode of a directory
> * but fails to set the setgid bit on it if invoked by non-root (uid != 0)
> * process with the following constraints:
> diff --git a/testcases/kernel/syscalls/fchmodat/fchmodat01.c b/testcases/kernel/syscalls/fchmodat/fchmodat01.c
> index 7ca65648fd..672fbff5f4 100644
> --- a/testcases/kernel/syscalls/fchmodat/fchmodat01.c
> +++ b/testcases/kernel/syscalls/fchmodat/fchmodat01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the fchmodat() system call.
> *
> * - fchmodat() passes if dir_fd is file descriptor to the directory
> diff --git a/testcases/kernel/syscalls/fchmodat/fchmodat02.c b/testcases/kernel/syscalls/fchmodat/fchmodat02.c
> index 117865a8f9..b871546301 100644
> --- a/testcases/kernel/syscalls/fchmodat/fchmodat02.c
> +++ b/testcases/kernel/syscalls/fchmodat/fchmodat02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the fchmodat() syscall.
> *
> * - fchmodat() fails with ENOTDIR if dir_fd is file descriptor
> diff --git a/testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c b/testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c
> index e58be31c42..dcf67cd5ef 100644
> --- a/testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c
> +++ b/testcases/kernel/syscalls/fchmodat2/fchmodat2_01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that fchmodat2() syscall is properly working with
> * regular files, symbolic links and directories. AT_SYMLINK_NOFOLLOW is a
> * special feature that is blocked by VFS since 5d1f903f75a8 and any of its
> diff --git a/testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c b/testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c
> index f8497d8a84..0da65f40a2 100644
> --- a/testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c
> +++ b/testcases/kernel/syscalls/fchmodat2/fchmodat2_02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that fchmodat2() syscall properly raises errors with
> * invalid values.
> */
> diff --git a/testcases/kernel/syscalls/fchown/fchown01.c b/testcases/kernel/syscalls/fchown/fchown01.c
> index 4ab5a2f38a..946cff0c9d 100644
> --- a/testcases/kernel/syscalls/fchown/fchown01.c
> +++ b/testcases/kernel/syscalls/fchown/fchown01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for fchown(). Call fchown() on a fd and expect it to pass.
> */
>
> diff --git a/testcases/kernel/syscalls/fchown/fchown02.c b/testcases/kernel/syscalls/fchown/fchown02.c
> index bd1baf3bb7..6d6c4c170a 100644
> --- a/testcases/kernel/syscalls/fchown/fchown02.c
> +++ b/testcases/kernel/syscalls/fchown/fchown02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that fchown(2) invoked by super-user:
> *
> * - clears setuid and setgid bits set on an executable file
> diff --git a/testcases/kernel/syscalls/fchown/fchown03.c b/testcases/kernel/syscalls/fchown/fchown03.c
> index 97d6c9d342..cda3234f9d 100644
> --- a/testcases/kernel/syscalls/fchown/fchown03.c
> +++ b/testcases/kernel/syscalls/fchown/fchown03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, fchown(2) succeeds to change the group of a file specified
> * by path when called by non-root user with the following constraints:
> *
> diff --git a/testcases/kernel/syscalls/fchown/fchown04.c b/testcases/kernel/syscalls/fchown/fchown04.c
> index a7af3aae7f..56b91304df 100644
> --- a/testcases/kernel/syscalls/fchown/fchown04.c
> +++ b/testcases/kernel/syscalls/fchown/fchown04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * 1. fchown() returns -1 and sets errno to EPERM if the effective user id
> diff --git a/testcases/kernel/syscalls/fchown/fchown05.c b/testcases/kernel/syscalls/fchown/fchown05.c
> index 47ee171222..97992565fc 100644
> --- a/testcases/kernel/syscalls/fchown/fchown05.c
> +++ b/testcases/kernel/syscalls/fchown/fchown05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, fchown() succeeds to change the owner and group of a file
> * specified by file descriptor to any numeric owner(uid)/group(gid) values
> * when invoked by super-user.
> diff --git a/testcases/kernel/syscalls/fchownat/fchownat01.c b/testcases/kernel/syscalls/fchownat/fchownat01.c
> index fedcb8ab2f..5c0aa1a8e3 100644
> --- a/testcases/kernel/syscalls/fchownat/fchownat01.c
> +++ b/testcases/kernel/syscalls/fchownat/fchownat01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that fchownat() succeeds to change file's ownership if the file
> * descriptor is AT_FDCWD or set by opening a directory.
> */
> diff --git a/testcases/kernel/syscalls/fchownat/fchownat02.c b/testcases/kernel/syscalls/fchownat/fchownat02.c
> index 10b4f5e3c0..e2e4c3765e 100644
> --- a/testcases/kernel/syscalls/fchownat/fchownat02.c
> +++ b/testcases/kernel/syscalls/fchownat/fchownat02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that fchownat() will operate on symbolic links when
> * AT_SYMLINK_NOFOLLOW is used.
> */
> diff --git a/testcases/kernel/syscalls/fchownat/fchownat03.c b/testcases/kernel/syscalls/fchownat/fchownat03.c
> index 06928490bb..5219ca655d 100644
> --- a/testcases/kernel/syscalls/fchownat/fchownat03.c
> +++ b/testcases/kernel/syscalls/fchownat/fchownat03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that,
> * - fchownat() returns -1 and sets errno to EACCES if there is no permission
> to access to the file.
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl05.c b/testcases/kernel/syscalls/fcntl/fcntl05.c
> index 7835d1e356..29cb20f4ab 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl05.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl05.c
> @@ -15,8 +15,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for fcntl(2) using F_GETLK argument.
> *
> * If the lock could be placed, fcntl() does not actually place it, but
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl08.c b/testcases/kernel/syscalls/fcntl/fcntl08.c
> index ea7602d9ee..5061974827 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl08.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl08.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for fcntl(2) using F_SETFL with flags O_NDELAY | O_APPEND | O_NONBLOCK.
> */
>
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl12.c b/testcases/kernel/syscalls/fcntl/fcntl12.c
> index ccd57da903..93b861e040 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl12.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl12.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the fcntl syscall.
> *
> * - EMFILE when cmd is F_DUPFD and the per-process limit on the number of open
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl13.c b/testcases/kernel/syscalls/fcntl/fcntl13.c
> index 1bc414cca3..6935e3906f 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl13.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl13.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the fcntl syscall.
> *
> * - EFAULT when lock is outside your accessible address space
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl14.c b/testcases/kernel/syscalls/fcntl/fcntl14.c
> index 21dbede5c3..c2f2e28232 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl14.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl14.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is checking fcntl() syscall locking mechanism between two
> * processes.
> * The test sets a random starting position on file using lseek(), it randomly
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl15.c b/testcases/kernel/syscalls/fcntl/fcntl15.c
> index 8c17144fb2..79184e0c1e 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl15.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl15.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that file locks are removed when a file descriptor is closed, three
> * different tests are implemented.
> *
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl27.c b/testcases/kernel/syscalls/fcntl/fcntl27.c
> index 6dbf58feb1..07a63ebc09 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl27.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl27.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for fcntl(2) using F_SETLEASE and F_RDLCK argument,
> * testing O_RDWR and O_WRONLY.
> */
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl29.c b/testcases/kernel/syscalls/fcntl/fcntl29.c
> index 24d3983edf..836ca30e92 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl29.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl29.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for fcntl(2) using F_DUPFD_CLOEXEC and getting FD_CLOEXEC.
> */
>
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl30.c b/testcases/kernel/syscalls/fcntl/fcntl30.c
> index 725385b39a..4d1b7e627a 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl30.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl30.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, fetching and changing the capacity of a pipe works as
> * expected with fcntl(2) syscall using F_GETPIPE_SZ, F_SETPIPE_SZ arguments.
> */
> diff --git a/testcases/kernel/syscalls/fcntl/fcntl39.c b/testcases/kernel/syscalls/fcntl/fcntl39.c
> index 30aada2aa1..1142e1a684 100644
> --- a/testcases/kernel/syscalls/fcntl/fcntl39.c
> +++ b/testcases/kernel/syscalls/fcntl/fcntl39.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that dnotify DN_RENAME event is reported only on rename inside same parent.
> */
>
> diff --git a/testcases/kernel/syscalls/finit_module/finit_module01.c b/testcases/kernel/syscalls/finit_module/finit_module01.c
> index ea00e48356..397d5a1ae4 100644
> --- a/testcases/kernel/syscalls/finit_module/finit_module01.c
> +++ b/testcases/kernel/syscalls/finit_module/finit_module01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic finit_module() tests.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/finit_module/finit_module02.c b/testcases/kernel/syscalls/finit_module/finit_module02.c
> index e16164ee25..78dc741008 100644
> --- a/testcases/kernel/syscalls/finit_module/finit_module02.c
> +++ b/testcases/kernel/syscalls/finit_module/finit_module02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic finit_module() failure tests.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/flock/flock01.c b/testcases/kernel/syscalls/flock/flock01.c
> index 4c37e07f97..c8e5aac1ec 100644
> --- a/testcases/kernel/syscalls/flock/flock01.c
> +++ b/testcases/kernel/syscalls/flock/flock01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for flock(2), uses LOCK_SH, LOCK_UN, LOCK_EX locks.
> */
>
> diff --git a/testcases/kernel/syscalls/flock/flock02.c b/testcases/kernel/syscalls/flock/flock02.c
> index 5c27c81a25..a8ca7c88ad 100644
> --- a/testcases/kernel/syscalls/flock/flock02.c
> +++ b/testcases/kernel/syscalls/flock/flock02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify flock(2) returns -1 and set proper errno:
> *
> * - EBADF if the file descriptor is invalid
> diff --git a/testcases/kernel/syscalls/flock/flock03.c b/testcases/kernel/syscalls/flock/flock03.c
> index dec6e73440..be6475f134 100644
> --- a/testcases/kernel/syscalls/flock/flock03.c
> +++ b/testcases/kernel/syscalls/flock/flock03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that flock(2) cannot unlock a file locked by another task.
> *
> * Fork a child processes. The parent flocks a file with LOCK_EX. Child waits
> diff --git a/testcases/kernel/syscalls/flock/flock04.c b/testcases/kernel/syscalls/flock/flock04.c
> index 1649b45c2e..da354a653b 100644
> --- a/testcases/kernel/syscalls/flock/flock04.c
> +++ b/testcases/kernel/syscalls/flock/flock04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test verifies that flock() behavior with different locking combinations along
> * with LOCK_SH and LOCK_EX:
> *
> diff --git a/testcases/kernel/syscalls/flock/flock06.c b/testcases/kernel/syscalls/flock/flock06.c
> index 7e9da8acdd..363dc5bf78 100644
> --- a/testcases/kernel/syscalls/flock/flock06.c
> +++ b/testcases/kernel/syscalls/flock/flock06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test verifies that flock locks held on one file descriptor conflict with
> * flock locks held on a different file descriptor.
> *
> diff --git a/testcases/kernel/syscalls/flock/flock07.c b/testcases/kernel/syscalls/flock/flock07.c
> index 368147370c..6b6848b91c 100644
> --- a/testcases/kernel/syscalls/flock/flock07.c
> +++ b/testcases/kernel/syscalls/flock/flock07.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that flock(2) fails with errno EINTR when waiting to acquire a lock,
> * and the call is interrupted by a signal.
> */
> diff --git a/testcases/kernel/syscalls/fork/fork05.c b/testcases/kernel/syscalls/fork/fork05.c
> index b5146d27b9..22edefc368 100644
> --- a/testcases/kernel/syscalls/fork/fork05.c
> +++ b/testcases/kernel/syscalls/fork/fork05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that LDT is propagated correctly from parent process to
> * the child process.
> *
> diff --git a/testcases/kernel/syscalls/fork/fork07.c b/testcases/kernel/syscalls/fork/fork07.c
> index 43b92c8057..266f0ffbc4 100644
> --- a/testcases/kernel/syscalls/fork/fork07.c
> +++ b/testcases/kernel/syscalls/fork/fork07.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that all children inherit parent's file descriptor.
> *
> * Parent opens a file and forks children. Each child reads a byte and checks
> diff --git a/testcases/kernel/syscalls/fork/fork08.c b/testcases/kernel/syscalls/fork/fork08.c
> index 34af476fc7..6a56cda70a 100644
> --- a/testcases/kernel/syscalls/fork/fork08.c
> +++ b/testcases/kernel/syscalls/fork/fork08.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that the parent's file descriptors will not be affected by being
> * closed in the child.
> */
> diff --git a/testcases/kernel/syscalls/fork/fork10.c b/testcases/kernel/syscalls/fork/fork10.c
> index 790e7b386e..d6dc05d46a 100644
> --- a/testcases/kernel/syscalls/fork/fork10.c
> +++ b/testcases/kernel/syscalls/fork/fork10.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies inheritance of file descriptors from parent to child
> * process. We open a file from parent, then we check if file offset changes
> * accordingly with file descriptor usage.
> diff --git a/testcases/kernel/syscalls/fork/fork13.c b/testcases/kernel/syscalls/fork/fork13.c
> index 3e96d0d420..3da698e33d 100644
> --- a/testcases/kernel/syscalls/fork/fork13.c
> +++ b/testcases/kernel/syscalls/fork/fork13.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * A race in pid generation that causes pids to be reused immediately
> *
> * From the mainline commit 5fdee8c4a5e1800489ce61963208f8cc55e42ea1:
> diff --git a/testcases/kernel/syscalls/fork/fork14.c b/testcases/kernel/syscalls/fork/fork14.c
> index d61864b529..ad3c0a9e76 100644
> --- a/testcases/kernel/syscalls/fork/fork14.c
> +++ b/testcases/kernel/syscalls/fork/fork14.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is a reproducer for kernel 3.5:
> * 7edc8b0ac16c ("mm/fork: fix overflow in vma length when copying mmap on clone")
> *
> diff --git a/testcases/kernel/syscalls/fpathconf/fpathconf01.c b/testcases/kernel/syscalls/fpathconf/fpathconf01.c
> index a328f972fc..d3654dd352 100644
> --- a/testcases/kernel/syscalls/fpathconf/fpathconf01.c
> +++ b/testcases/kernel/syscalls/fpathconf/fpathconf01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the fpathconf(2) system call.
> */
>
> diff --git a/testcases/kernel/syscalls/fsconfig/fsconfig03.c b/testcases/kernel/syscalls/fsconfig/fsconfig03.c
> index 5037536360..add54769e0 100644
> --- a/testcases/kernel/syscalls/fsconfig/fsconfig03.c
> +++ b/testcases/kernel/syscalls/fsconfig/fsconfig03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2022-0185.
> *
> * References links:
> diff --git a/testcases/kernel/syscalls/fsetxattr/fsetxattr02.c b/testcases/kernel/syscalls/fsetxattr/fsetxattr02.c
> index 39265af366..18490a8658 100644
> --- a/testcases/kernel/syscalls/fsetxattr/fsetxattr02.c
> +++ b/testcases/kernel/syscalls/fsetxattr/fsetxattr02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify basic fsetxattr(2) syscall functionality:
> *
> * - Set attribute to a regular file, fsetxattr(2) should succeed.
> diff --git a/testcases/kernel/syscalls/fstat/fstat02.c b/testcases/kernel/syscalls/fstat/fstat02.c
> index 2768317575..68cbe82f0e 100644
> --- a/testcases/kernel/syscalls/fstat/fstat02.c
> +++ b/testcases/kernel/syscalls/fstat/fstat02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests if fstat() returns correctly and reports correct file information
> * using the stat structure.
> */
> diff --git a/testcases/kernel/syscalls/fstatfs/fstatfs01.c b/testcases/kernel/syscalls/fstatfs/fstatfs01.c
> index 044ab65488..d952388998 100644
> --- a/testcases/kernel/syscalls/fstatfs/fstatfs01.c
> +++ b/testcases/kernel/syscalls/fstatfs/fstatfs01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that fstatfs() syscall executes successfully for all
> * available filesystems.
> */
> diff --git a/testcases/kernel/syscalls/fstatfs/fstatfs02.c b/testcases/kernel/syscalls/fstatfs/fstatfs02.c
> index f801c9f5fa..dcb9589eb9 100644
> --- a/testcases/kernel/syscalls/fstatfs/fstatfs02.c
> +++ b/testcases/kernel/syscalls/fstatfs/fstatfs02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check if fstatfs() sets errno correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/ftruncate/ftruncate01.c b/testcases/kernel/syscalls/ftruncate/ftruncate01.c
> index ea97edb1da..13f915bee1 100644
> --- a/testcases/kernel/syscalls/ftruncate/ftruncate01.c
> +++ b/testcases/kernel/syscalls/ftruncate/ftruncate01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, ftruncate() succeeds to truncate a file to a certain length,
> * if the file previously is smaller than the truncated size, ftruncate()
> * shall increase the size of the file.
> diff --git a/testcases/kernel/syscalls/ftruncate/ftruncate03.c b/testcases/kernel/syscalls/ftruncate/ftruncate03.c
> index f2fa96dce5..368186e26a 100644
> --- a/testcases/kernel/syscalls/ftruncate/ftruncate03.c
> +++ b/testcases/kernel/syscalls/ftruncate/ftruncate03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that ftruncate(2) system call returns appropriate error number:
> *
> * 1. EINVAL -- the file is a socket
> diff --git a/testcases/kernel/syscalls/futex/futex_cmp_requeue01.c b/testcases/kernel/syscalls/futex/futex_cmp_requeue01.c
> index bf4c3813a8..946e4e949e 100644
> --- a/testcases/kernel/syscalls/futex/futex_cmp_requeue01.c
> +++ b/testcases/kernel/syscalls/futex/futex_cmp_requeue01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the basic functionality of futex(FUTEX_CMP_REQUEUE).
> *
> * futex(FUTEX_CMP_REQUEUE) can wake up the number of waiters specified
> diff --git a/testcases/kernel/syscalls/futex/futex_waitv01.c b/testcases/kernel/syscalls/futex/futex_waitv01.c
> index 17b96738cd..bbea664823 100644
> --- a/testcases/kernel/syscalls/futex/futex_waitv01.c
> +++ b/testcases/kernel/syscalls/futex/futex_waitv01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies EINVAL for futex_waitv syscall.
> */
>
> diff --git a/testcases/kernel/syscalls/futex/futex_waitv02.c b/testcases/kernel/syscalls/futex/futex_waitv02.c
> index ccea5eb5e7..6b210d38d2 100644
> --- a/testcases/kernel/syscalls/futex/futex_waitv02.c
> +++ b/testcases/kernel/syscalls/futex/futex_waitv02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies futex_waitv syscall using private data.
> */
>
> diff --git a/testcases/kernel/syscalls/futex/futex_waitv03.c b/testcases/kernel/syscalls/futex/futex_waitv03.c
> index c674f52d8d..1d367ed001 100644
> --- a/testcases/kernel/syscalls/futex/futex_waitv03.c
> +++ b/testcases/kernel/syscalls/futex/futex_waitv03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies futex_waitv syscall using shared data.
> */
>
> diff --git a/testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c b/testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c
> index 23f62091a3..3c854d1096 100644
> --- a/testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c
> +++ b/testcases/kernel/syscalls/get_mempolicy/get_mempolicy01.c
> @@ -12,8 +12,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that get_mempolicy() returns a proper return value and errno for various cases.
> */
>
> diff --git a/testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c b/testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c
> index 4a855596d9..79ff5d94f8 100644
> --- a/testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c
> +++ b/testcases/kernel/syscalls/get_mempolicy/get_mempolicy02.c
> @@ -12,8 +12,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that get_mempolicy() returns a proper return errno for failure cases.
> */
>
> diff --git a/testcases/kernel/syscalls/getcontext/getcontext01.c b/testcases/kernel/syscalls/getcontext/getcontext01.c
> index 5896c38004..0d8955e321 100644
> --- a/testcases/kernel/syscalls/getcontext/getcontext01.c
> +++ b/testcases/kernel/syscalls/getcontext/getcontext01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for getcontext().
> *
> * Calls a getcontext() then jumps back with a setcontext().
> diff --git a/testcases/kernel/syscalls/getcpu/getcpu01.c b/testcases/kernel/syscalls/getcpu/getcpu01.c
> index 152f91d32b..19d8c9d813 100644
> --- a/testcases/kernel/syscalls/getcpu/getcpu01.c
> +++ b/testcases/kernel/syscalls/getcpu/getcpu01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The test process is affined to a CPU. It then calls getcpu and
> * checks that the CPU and node (if supported) match the expected
> * values.
> diff --git a/testcases/kernel/syscalls/getcpu/getcpu02.c b/testcases/kernel/syscalls/getcpu/getcpu02.c
> index 048758b3d0..954151c048 100644
> --- a/testcases/kernel/syscalls/getcpu/getcpu02.c
> +++ b/testcases/kernel/syscalls/getcpu/getcpu02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getcpu(2) fails with EFAULT if cpu_id or node_id points outside
> * the calling process address space.
> */
> diff --git a/testcases/kernel/syscalls/getcwd/getcwd02.c b/testcases/kernel/syscalls/getcwd/getcwd02.c
> index e3df22ceb8..4950c2d25c 100644
> --- a/testcases/kernel/syscalls/getcwd/getcwd02.c
> +++ b/testcases/kernel/syscalls/getcwd/getcwd02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the basic functionality of the getcwd(2) system call.
> *
> * 1. getcwd(2) works fine if buf and size are valid.
> diff --git a/testcases/kernel/syscalls/getcwd/getcwd03.c b/testcases/kernel/syscalls/getcwd/getcwd03.c
> index 9e3828a93f..4ea4e3ad1b 100644
> --- a/testcases/kernel/syscalls/getcwd/getcwd03.c
> +++ b/testcases/kernel/syscalls/getcwd/getcwd03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the basic functionality of the getcwd(2)
> * system call on a symbolic link.
> *
> diff --git a/testcases/kernel/syscalls/getdents/getdents01.c b/testcases/kernel/syscalls/getdents/getdents01.c
> index d6c4b49792..6a88e305af 100644
> --- a/testcases/kernel/syscalls/getdents/getdents01.c
> +++ b/testcases/kernel/syscalls/getdents/getdents01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - *
> - * [Description]
> *
> * Basic getdents() test that checks if directory listing is correct and
> * complete.
> diff --git a/testcases/kernel/syscalls/getdents/getdents02.c b/testcases/kernel/syscalls/getdents/getdents02.c
> index 71c3332f47..98254e12fb 100644
> --- a/testcases/kernel/syscalls/getdents/getdents02.c
> +++ b/testcases/kernel/syscalls/getdents/getdents02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * - getdents() fails with EBADF if file descriptor fd is invalid
> diff --git a/testcases/kernel/syscalls/getdomainname/getdomainname01.c b/testcases/kernel/syscalls/getdomainname/getdomainname01.c
> index 17a9392e55..34c5526445 100644
> --- a/testcases/kernel/syscalls/getdomainname/getdomainname01.c
> +++ b/testcases/kernel/syscalls/getdomainname/getdomainname01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for getdomainname(2)
> *
> * This is a Phase I test for the getdomainname(2) system call.
> diff --git a/testcases/kernel/syscalls/getegid/getegid01.c b/testcases/kernel/syscalls/getegid/getegid01.c
> index 46cdc680bf..429991960d 100644
> --- a/testcases/kernel/syscalls/getegid/getegid01.c
> +++ b/testcases/kernel/syscalls/getegid/getegid01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test checks if getegid() returns the effective group id.
> */
>
> diff --git a/testcases/kernel/syscalls/getegid/getegid02.c b/testcases/kernel/syscalls/getegid/getegid02.c
> index 2f64bd8697..32635e83d3 100644
> --- a/testcases/kernel/syscalls/getegid/getegid02.c
> +++ b/testcases/kernel/syscalls/getegid/getegid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test checks if getegid() returns the same effective group given by
> * passwd entry via getpwuid().
> */
> diff --git a/testcases/kernel/syscalls/getgid/getgid01.c b/testcases/kernel/syscalls/getgid/getgid01.c
> index 3d914f73fa..2481b14989 100644
> --- a/testcases/kernel/syscalls/getgid/getgid01.c
> +++ b/testcases/kernel/syscalls/getgid/getgid01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Call getgid() and expects that the gid returned correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/getgid/getgid03.c b/testcases/kernel/syscalls/getgid/getgid03.c
> index eb302ad329..3e406ce64e 100644
> --- a/testcases/kernel/syscalls/getgid/getgid03.c
> +++ b/testcases/kernel/syscalls/getgid/getgid03.c
> @@ -5,7 +5,6 @@
> */
>
> /*\
> - * [Description]
> * Testcase to check the basic functionality of getgid().
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c b/testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c
> index 6059753070..e4c0cb716e 100644
> --- a/testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c
> +++ b/testcases/kernel/syscalls/gethostbyname_r/gethostbyname_r01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for GHOST: glibc vulnerability (CVE-2015-0235).
> *
> * https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
> diff --git a/testcases/kernel/syscalls/gethostid/gethostid01.c b/testcases/kernel/syscalls/gethostid/gethostid01.c
> index 3fc280327a..e5cf201abb 100644
> --- a/testcases/kernel/syscalls/gethostid/gethostid01.c
> +++ b/testcases/kernel/syscalls/gethostid/gethostid01.c
> @@ -19,8 +19,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test the basic functionality of the sethostid() and gethostid() system call.
> */
>
> diff --git a/testcases/kernel/syscalls/gethostname/gethostname01.c b/testcases/kernel/syscalls/gethostname/gethostname01.c
> index 5d882514a1..6ef8a634a5 100644
> --- a/testcases/kernel/syscalls/gethostname/gethostname01.c
> +++ b/testcases/kernel/syscalls/gethostname/gethostname01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test is checking that gethostname() succeeds.
> */
>
> diff --git a/testcases/kernel/syscalls/gethostname/gethostname02.c b/testcases/kernel/syscalls/gethostname/gethostname02.c
> index f792371ed5..c56fcb800a 100644
> --- a/testcases/kernel/syscalls/gethostname/gethostname02.c
> +++ b/testcases/kernel/syscalls/gethostname/gethostname02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that gethostname(2) fails with
> *
> * - ENAMETOOLONG when len is smaller than the actual size
> diff --git a/testcases/kernel/syscalls/getitimer/getitimer01.c b/testcases/kernel/syscalls/getitimer/getitimer01.c
> index 6b0cfba1c2..a32a2860be 100644
> --- a/testcases/kernel/syscalls/getitimer/getitimer01.c
> +++ b/testcases/kernel/syscalls/getitimer/getitimer01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that a correct call to getitimer() succeeds.
> */
>
> diff --git a/testcases/kernel/syscalls/getitimer/getitimer02.c b/testcases/kernel/syscalls/getitimer/getitimer02.c
> index 8ddbaec427..8bf8453eac 100644
> --- a/testcases/kernel/syscalls/getitimer/getitimer02.c
> +++ b/testcases/kernel/syscalls/getitimer/getitimer02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that getitimer() call fails:
> *
> * 1. EFAULT with invalid itimerval pointer
> diff --git a/testcases/kernel/syscalls/getpagesize/getpagesize01.c b/testcases/kernel/syscalls/getpagesize/getpagesize01.c
> index c88071ba44..3e810978bd 100644
> --- a/testcases/kernel/syscalls/getpagesize/getpagesize01.c
> +++ b/testcases/kernel/syscalls/getpagesize/getpagesize01.c
> @@ -10,8 +10,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getpagesize(2) returns the number of bytes in a
> * memory page as expected.
> */
> diff --git a/testcases/kernel/syscalls/getpeername/getpeername01.c b/testcases/kernel/syscalls/getpeername/getpeername01.c
> index 0f2600beed..945b83d2b2 100644
> --- a/testcases/kernel/syscalls/getpeername/getpeername01.c
> +++ b/testcases/kernel/syscalls/getpeername/getpeername01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getpeername() returns the proper errno for various failure cases:
> *
> * - EBADF on invalid address.
> diff --git a/testcases/kernel/syscalls/getpgid/getpgid01.c b/testcases/kernel/syscalls/getpgid/getpgid01.c
> index 4c614e0b94..169ea3d642 100644
> --- a/testcases/kernel/syscalls/getpgid/getpgid01.c
> +++ b/testcases/kernel/syscalls/getpgid/getpgid01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the basic functionality of getpgid(2) syscall.
> */
>
> diff --git a/testcases/kernel/syscalls/getpgid/getpgid02.c b/testcases/kernel/syscalls/getpgid/getpgid02.c
> index 30d0129bc2..2836160d0e 100644
> --- a/testcases/kernel/syscalls/getpgid/getpgid02.c
> +++ b/testcases/kernel/syscalls/getpgid/getpgid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getpgid(2) fails with errno ESRCH when
> * pid does not match any process.
> */
> diff --git a/testcases/kernel/syscalls/getpgrp/getpgrp01.c b/testcases/kernel/syscalls/getpgrp/getpgrp01.c
> index fe2e0c5825..06a6e0ae36 100644
> --- a/testcases/kernel/syscalls/getpgrp/getpgrp01.c
> +++ b/testcases/kernel/syscalls/getpgrp/getpgrp01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getpgrp(2) syscall executes successfully.
> */
>
> diff --git a/testcases/kernel/syscalls/getpid/getpid01.c b/testcases/kernel/syscalls/getpid/getpid01.c
> index 314c45d094..d9ba0953c9 100644
> --- a/testcases/kernel/syscalls/getpid/getpid01.c
> +++ b/testcases/kernel/syscalls/getpid/getpid01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getpid() system call returns process ID in range <2, PID_MAX>.
> */
>
> diff --git a/testcases/kernel/syscalls/getpid/getpid02.c b/testcases/kernel/syscalls/getpid/getpid02.c
> index 86ad5a29f5..3da853d48b 100644
> --- a/testcases/kernel/syscalls/getpid/getpid02.c
> +++ b/testcases/kernel/syscalls/getpid/getpid02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that:
> *
> * - fork() in parent returns the same pid as getpid() in child
> diff --git a/testcases/kernel/syscalls/getppid/getppid01.c b/testcases/kernel/syscalls/getppid/getppid01.c
> index 614eea9fdd..3f05aed37c 100644
> --- a/testcases/kernel/syscalls/getppid/getppid01.c
> +++ b/testcases/kernel/syscalls/getppid/getppid01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether parent process id that getppid() returns is out of range.
> */
>
> diff --git a/testcases/kernel/syscalls/getppid/getppid02.c b/testcases/kernel/syscalls/getppid/getppid02.c
> index cbc7ae76c9..7497eba12e 100644
> --- a/testcases/kernel/syscalls/getppid/getppid02.c
> +++ b/testcases/kernel/syscalls/getppid/getppid02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that getppid() in child returns the same pid as getpid() in parent.
> */
>
> diff --git a/testcases/kernel/syscalls/getrandom/getrandom05.c b/testcases/kernel/syscalls/getrandom/getrandom05.c
> index c4886b886f..f05a4fa807 100644
> --- a/testcases/kernel/syscalls/getrandom/getrandom05.c
> +++ b/testcases/kernel/syscalls/getrandom/getrandom05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getrandom(2) fails with
> *
> * - EFAULT when buf address is outside the accessible address space
> diff --git a/testcases/kernel/syscalls/getrlimit/getrlimit01.c b/testcases/kernel/syscalls/getrlimit/getrlimit01.c
> index f14c8e6aa7..589b14880c 100644
> --- a/testcases/kernel/syscalls/getrlimit/getrlimit01.c
> +++ b/testcases/kernel/syscalls/getrlimit/getrlimit01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getrlimit(2) call will be successful for all possible resource
> * types.
> */
> diff --git a/testcases/kernel/syscalls/getrlimit/getrlimit02.c b/testcases/kernel/syscalls/getrlimit/getrlimit02.c
> index 9f5b2bf9cd..20c247a0e0 100644
> --- a/testcases/kernel/syscalls/getrlimit/getrlimit02.c
> +++ b/testcases/kernel/syscalls/getrlimit/getrlimit02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for checking error conditions for getrlimit(2):
> *
> * 1. getrlimit(2) returns -1 and sets errno to EFAULT if an invalid
> diff --git a/testcases/kernel/syscalls/getrusage/getrusage01.c b/testcases/kernel/syscalls/getrusage/getrusage01.c
> index 83275dd34b..78b8e57a03 100644
> --- a/testcases/kernel/syscalls/getrusage/getrusage01.c
> +++ b/testcases/kernel/syscalls/getrusage/getrusage01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that getrusage() with RUSAGE_SELF and RUSAGE_CHILDREN succeeds.
> */
>
> diff --git a/testcases/kernel/syscalls/getrusage/getrusage02.c b/testcases/kernel/syscalls/getrusage/getrusage02.c
> index 7676630903..5138d96e03 100644
> --- a/testcases/kernel/syscalls/getrusage/getrusage02.c
> +++ b/testcases/kernel/syscalls/getrusage/getrusage02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getrusage() fails with:
> *
> * - EINVAL with invalid who
> diff --git a/testcases/kernel/syscalls/getrusage/getrusage03.c b/testcases/kernel/syscalls/getrusage/getrusage03.c
> index c8e974567c..bc196c15ee 100644
> --- a/testcases/kernel/syscalls/getrusage/getrusage03.c
> +++ b/testcases/kernel/syscalls/getrusage/getrusage03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test ru_maxrss behaviors in struct rusage.
> *
> * This test program is backported from upstream commit: 1f10206cf8e9, which
> diff --git a/testcases/kernel/syscalls/getrusage/getrusage03_child.c b/testcases/kernel/syscalls/getrusage/getrusage03_child.c
> index 18627a98cb..1c6a19e32f 100644
> --- a/testcases/kernel/syscalls/getrusage/getrusage03_child.c
> +++ b/testcases/kernel/syscalls/getrusage/getrusage03_child.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Child program executed by getrusage03.
> */
>
> diff --git a/testcases/kernel/syscalls/getsid/getsid01.c b/testcases/kernel/syscalls/getsid/getsid01.c
> index 89f6a72915..e0201d4fc1 100644
> --- a/testcases/kernel/syscalls/getsid/getsid01.c
> +++ b/testcases/kernel/syscalls/getsid/getsid01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that session IDs returned by getsid() (with argument pid=0)
> * are same in parent and child process.
> */
> diff --git a/testcases/kernel/syscalls/getsid/getsid02.c b/testcases/kernel/syscalls/getsid/getsid02.c
> index 14b634727f..8a25dcafda 100644
> --- a/testcases/kernel/syscalls/getsid/getsid02.c
> +++ b/testcases/kernel/syscalls/getsid/getsid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that getsid(2) fails with ESRCH errno when there is no
> * process found with process ID pid.
> */
> diff --git a/testcases/kernel/syscalls/getsockname/getsockname01.c b/testcases/kernel/syscalls/getsockname/getsockname01.c
> index becd7133ae..108d7fe1a4 100644
> --- a/testcases/kernel/syscalls/getsockname/getsockname01.c
> +++ b/testcases/kernel/syscalls/getsockname/getsockname01.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Verify that getsockname() returns the proper errno for various failure cases:
> *
> * - EBADF on a not open file
> diff --git a/testcases/kernel/syscalls/getsockopt/getsockopt01.c b/testcases/kernel/syscalls/getsockopt/getsockopt01.c
> index 9effbf30ca..2c1d371f2f 100644
> --- a/testcases/kernel/syscalls/getsockopt/getsockopt01.c
> +++ b/testcases/kernel/syscalls/getsockopt/getsockopt01.c
> @@ -7,7 +7,6 @@
> */
>
> /*\
> - * [Description]
> * Verify that getsockopt() returns the proper errno for various failure cases:
> *
> * - EBADF on a not open file
> diff --git a/testcases/kernel/syscalls/getsockopt/getsockopt02.c b/testcases/kernel/syscalls/getsockopt/getsockopt02.c
> index d24e9b693d..68575799ae 100644
> --- a/testcases/kernel/syscalls/getsockopt/getsockopt02.c
> +++ b/testcases/kernel/syscalls/getsockopt/getsockopt02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test getsockopt(2) for retrieving peer credentials (SO_PEERCRED).
> */
>
> diff --git a/testcases/kernel/syscalls/gettid/gettid01.c b/testcases/kernel/syscalls/gettid/gettid01.c
> index 22ba15016c..108b8266e6 100644
> --- a/testcases/kernel/syscalls/gettid/gettid01.c
> +++ b/testcases/kernel/syscalls/gettid/gettid01.c
> @@ -4,8 +4,6 @@
> * Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
> */
> /*\
> - * [Description]
> - *
> * This test checks if parent pid is equal to tid in single-threaded
> * application.
> */
> diff --git a/testcases/kernel/syscalls/gettid/gettid02.c b/testcases/kernel/syscalls/gettid/gettid02.c
> index ef44761c41..88505068b8 100644
> --- a/testcases/kernel/syscalls/gettid/gettid02.c
> +++ b/testcases/kernel/syscalls/gettid/gettid02.c
> @@ -3,8 +3,6 @@
> * Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
> */
> /*\
> - * [Description]
> - *
> * This test spawns multiple threads, then check for each one of them if the
> * parent ID is different AND if the thread ID is different from all the other
> * spwaned threads.
> diff --git a/testcases/kernel/syscalls/gettimeofday/gettimeofday01.c b/testcases/kernel/syscalls/gettimeofday/gettimeofday01.c
> index 887a366886..645cc6d3cb 100644
> --- a/testcases/kernel/syscalls/gettimeofday/gettimeofday01.c
> +++ b/testcases/kernel/syscalls/gettimeofday/gettimeofday01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for gettimeofday error.
> *
> * - EFAULT: tv pointed outside the accessible address space
> diff --git a/testcases/kernel/syscalls/gettimeofday/gettimeofday02.c b/testcases/kernel/syscalls/gettimeofday/gettimeofday02.c
> index a58a3cb4f2..1e0c957324 100644
> --- a/testcases/kernel/syscalls/gettimeofday/gettimeofday02.c
> +++ b/testcases/kernel/syscalls/gettimeofday/gettimeofday02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check if gettimeofday() is monotonous during 10s:
> *
> * - Call gettimeofday() to get a t1 (fist value)
> diff --git a/testcases/kernel/syscalls/getuid/getuid01.c b/testcases/kernel/syscalls/getuid/getuid01.c
> index 206ca0c529..a25eb8d86b 100644
> --- a/testcases/kernel/syscalls/getuid/getuid01.c
> +++ b/testcases/kernel/syscalls/getuid/getuid01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the getuid() system call.
> */
>
> diff --git a/testcases/kernel/syscalls/getuid/getuid03.c b/testcases/kernel/syscalls/getuid/getuid03.c
> index a5deebf2b9..1de03d4ea3 100644
> --- a/testcases/kernel/syscalls/getuid/getuid03.c
> +++ b/testcases/kernel/syscalls/getuid/getuid03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that getuid() return value matches value from /proc/self/status.
> */
>
> diff --git a/testcases/kernel/syscalls/getxattr/getxattr01.c b/testcases/kernel/syscalls/getxattr/getxattr01.c
> index 50b00c0a57..241cc1eabd 100644
> --- a/testcases/kernel/syscalls/getxattr/getxattr01.c
> +++ b/testcases/kernel/syscalls/getxattr/getxattr01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic tests for getxattr(2) and make sure getxattr(2) handles error
> * conditions correctly.
> *
> diff --git a/testcases/kernel/syscalls/getxattr/getxattr02.c b/testcases/kernel/syscalls/getxattr/getxattr02.c
> index 593ad7b8c7..7bc3bf22ad 100644
> --- a/testcases/kernel/syscalls/getxattr/getxattr02.c
> +++ b/testcases/kernel/syscalls/getxattr/getxattr02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * In the user.* namespace, only regular files and directories can
> * have extended attributes. Otherwise getxattr(2) will return -1
> * and set errno to ENODATA.
> diff --git a/testcases/kernel/syscalls/getxattr/getxattr03.c b/testcases/kernel/syscalls/getxattr/getxattr03.c
> index 85f26402af..e1f7bb6aae 100644
> --- a/testcases/kernel/syscalls/getxattr/getxattr03.c
> +++ b/testcases/kernel/syscalls/getxattr/getxattr03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * An empty buffer of size zero can be passed into getxattr(2) to
> * return the current size of the named extended attribute.
> */
> diff --git a/testcases/kernel/syscalls/getxattr/getxattr04.c b/testcases/kernel/syscalls/getxattr/getxattr04.c
> index 27059fef09..1fb5928823 100644
> --- a/testcases/kernel/syscalls/getxattr/getxattr04.c
> +++ b/testcases/kernel/syscalls/getxattr/getxattr04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a regression test for the race between getting an existing
> * xattr and setting/removing a large xattr. This bug leads to that
> * getxattr() fails to get an existing xattr and returns ENOATTR in xfs
> diff --git a/testcases/kernel/syscalls/getxattr/getxattr05.c b/testcases/kernel/syscalls/getxattr/getxattr05.c
> index d9717a6950..5f0aac51d0 100644
> --- a/testcases/kernel/syscalls/getxattr/getxattr05.c
> +++ b/testcases/kernel/syscalls/getxattr/getxattr05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that:
> *
> * - Without a user namespace, getxattr(2) should get same data when
> diff --git a/testcases/kernel/syscalls/init_module/init_module01.c b/testcases/kernel/syscalls/init_module/init_module01.c
> index 850f826e62..a0d4792c95 100644
> --- a/testcases/kernel/syscalls/init_module/init_module01.c
> +++ b/testcases/kernel/syscalls/init_module/init_module01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic init_module() tests.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/init_module/init_module02.c b/testcases/kernel/syscalls/init_module/init_module02.c
> index c3979c08aa..3fb1e87158 100644
> --- a/testcases/kernel/syscalls/init_module/init_module02.c
> +++ b/testcases/kernel/syscalls/init_module/init_module02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic init_module() failure tests.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/inotify/inotify01.c b/testcases/kernel/syscalls/inotify/inotify01.c
> index e0fa0ba50d..4f7fa70e9e 100644
> --- a/testcases/kernel/syscalls/inotify/inotify01.c
> +++ b/testcases/kernel/syscalls/inotify/inotify01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for inotify events on file.
> */
>
> diff --git a/testcases/kernel/syscalls/inotify/inotify02.c b/testcases/kernel/syscalls/inotify/inotify02.c
> index d75395baee..709a928308 100644
> --- a/testcases/kernel/syscalls/inotify/inotify02.c
> +++ b/testcases/kernel/syscalls/inotify/inotify02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for inotify events on directory.
> */
>
> diff --git a/testcases/kernel/syscalls/inotify/inotify03.c b/testcases/kernel/syscalls/inotify/inotify03.c
> index 4ee5e94613..9bb95addbc 100644
> --- a/testcases/kernel/syscalls/inotify/inotify03.c
> +++ b/testcases/kernel/syscalls/inotify/inotify03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that inotify get IN_UNMOUNT event and don't block the umount command.
> */
>
> diff --git a/testcases/kernel/syscalls/inotify/inotify04.c b/testcases/kernel/syscalls/inotify/inotify04.c
> index 120e73b916..1db38ddf28 100644
> --- a/testcases/kernel/syscalls/inotify/inotify04.c
> +++ b/testcases/kernel/syscalls/inotify/inotify04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for inotify IN_DELETE_SELF event.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/inotify/inotify05.c b/testcases/kernel/syscalls/inotify/inotify05.c
> index 38b30878c1..d9bfb05f1d 100644
> --- a/testcases/kernel/syscalls/inotify/inotify05.c
> +++ b/testcases/kernel/syscalls/inotify/inotify05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that inotify overflow event is properly generated.
> */
>
> diff --git a/testcases/kernel/syscalls/inotify/inotify06.c b/testcases/kernel/syscalls/inotify/inotify06.c
> index b0eb8cafbb..42837ea093 100644
> --- a/testcases/kernel/syscalls/inotify/inotify06.c
> +++ b/testcases/kernel/syscalls/inotify/inotify06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for inotify mark destruction race.
> *
> * Kernels prior to 4.2 have a race when inode is being deleted while
> diff --git a/testcases/kernel/syscalls/inotify/inotify07.c b/testcases/kernel/syscalls/inotify/inotify07.c
> index bcfc569a8d..66a2f4d372 100644
> --- a/testcases/kernel/syscalls/inotify/inotify07.c
> +++ b/testcases/kernel/syscalls/inotify/inotify07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that inotify work for an overlayfs directory after copy up and
> * drop caches.
> *
> diff --git a/testcases/kernel/syscalls/inotify/inotify08.c b/testcases/kernel/syscalls/inotify/inotify08.c
> index 149a0a1f81..4cbb16ce0d 100644
> --- a/testcases/kernel/syscalls/inotify/inotify08.c
> +++ b/testcases/kernel/syscalls/inotify/inotify08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that inotify work for an overlayfs file after copy up and
> * drop caches.
> *
> diff --git a/testcases/kernel/syscalls/inotify/inotify09.c b/testcases/kernel/syscalls/inotify/inotify09.c
> index e999dac39d..5c9ff3a3ba 100644
> --- a/testcases/kernel/syscalls/inotify/inotify09.c
> +++ b/testcases/kernel/syscalls/inotify/inotify09.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for inotify mark connector destruction race.
> *
> * Kernels prior to 4.17 have a race when the last fsnotify mark on the inode
> diff --git a/testcases/kernel/syscalls/inotify/inotify10.c b/testcases/kernel/syscalls/inotify/inotify10.c
> index 6a9a0a4368..a78572dff3 100644
> --- a/testcases/kernel/syscalls/inotify/inotify10.c
> +++ b/testcases/kernel/syscalls/inotify/inotify10.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that event is reported to watching parent and watching child
> * based on their interest.
> *
> diff --git a/testcases/kernel/syscalls/inotify/inotify11.c b/testcases/kernel/syscalls/inotify/inotify11.c
> index 2e571f3a0c..5af9cdb9bf 100644
> --- a/testcases/kernel/syscalls/inotify/inotify11.c
> +++ b/testcases/kernel/syscalls/inotify/inotify11.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test opening files after receiving IN_DELETE.
> *
> * Kernel v5.13 has a regression allowing files to be open after IN_DELETE.
> diff --git a/testcases/kernel/syscalls/inotify/inotify12.c b/testcases/kernel/syscalls/inotify/inotify12.c
> index 208263b178..5390b4c0ec 100644
> --- a/testcases/kernel/syscalls/inotify/inotify12.c
> +++ b/testcases/kernel/syscalls/inotify/inotify12.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test special inotify mask flags.
> *
> * Regression test for kernel commit:
> diff --git a/testcases/kernel/syscalls/inotify_init/inotify_init1_01.c b/testcases/kernel/syscalls/inotify_init/inotify_init1_01.c
> index b2f582f8ef..04c66be547 100644
> --- a/testcases/kernel/syscalls/inotify_init/inotify_init1_01.c
> +++ b/testcases/kernel/syscalls/inotify_init/inotify_init1_01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that inotify_init1() returns a file descriptor and sets
> * the close-on-exec (FD_CLOEXEC) flag on the new file descriptor
> * only when called with IN_CLOEXEC.
> diff --git a/testcases/kernel/syscalls/inotify_init/inotify_init1_02.c b/testcases/kernel/syscalls/inotify_init/inotify_init1_02.c
> index 3baf35e754..4c8d883a69 100644
> --- a/testcases/kernel/syscalls/inotify_init/inotify_init1_02.c
> +++ b/testcases/kernel/syscalls/inotify_init/inotify_init1_02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that inotify_init1() returns a file descriptor and sets the
> * O_NONBLOCK file status flag on the open file description referred
> * to by the new file descriptor only when called with IN_NONBLOCK.
> diff --git a/testcases/kernel/syscalls/io_cancel/io_cancel01.c b/testcases/kernel/syscalls/io_cancel/io_cancel01.c
> index f7e8bd061e..699eb2a68a 100644
> --- a/testcases/kernel/syscalls/io_cancel/io_cancel01.c
> +++ b/testcases/kernel/syscalls/io_cancel/io_cancel01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_cancel invoked via syscall(2) with one of pointers set to invalid
> * address and expects it to return EFAULT.
> */
> diff --git a/testcases/kernel/syscalls/io_cancel/io_cancel02.c b/testcases/kernel/syscalls/io_cancel/io_cancel02.c
> index 92ec651192..0394e308d4 100644
> --- a/testcases/kernel/syscalls/io_cancel/io_cancel02.c
> +++ b/testcases/kernel/syscalls/io_cancel/io_cancel02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_cancel invoked via libaio with one of the data structures points
> * to invalid data and expects it to return -EFAULT.
> */
> diff --git a/testcases/kernel/syscalls/io_destroy/io_destroy01.c b/testcases/kernel/syscalls/io_destroy/io_destroy01.c
> index 79c685faab..ce4158c260 100644
> --- a/testcases/kernel/syscalls/io_destroy/io_destroy01.c
> +++ b/testcases/kernel/syscalls/io_destroy/io_destroy01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_destroy invoked via libaio with invalid ctx and expects it to
> * return -EINVAL.
> */
> diff --git a/testcases/kernel/syscalls/io_destroy/io_destroy02.c b/testcases/kernel/syscalls/io_destroy/io_destroy02.c
> index c8cc63818b..84868f3111 100644
> --- a/testcases/kernel/syscalls/io_destroy/io_destroy02.c
> +++ b/testcases/kernel/syscalls/io_destroy/io_destroy02.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_destroy invoked via syscall(2) with an invalid ctx and expects
> * it to return EINVAL.
> */
> diff --git a/testcases/kernel/syscalls/io_getevents/io_getevents01.c b/testcases/kernel/syscalls/io_getevents/io_getevents01.c
> index e8a426ab6a..0806ea9120 100644
> --- a/testcases/kernel/syscalls/io_getevents/io_getevents01.c
> +++ b/testcases/kernel/syscalls/io_getevents/io_getevents01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_getevents invoked via syscall(2) with invalid ctx and expects it to
> * return EINVAL.
> */
> diff --git a/testcases/kernel/syscalls/io_getevents/io_getevents02.c b/testcases/kernel/syscalls/io_getevents/io_getevents02.c
> index 09eedd4f61..6257ca82e8 100644
> --- a/testcases/kernel/syscalls/io_getevents/io_getevents02.c
> +++ b/testcases/kernel/syscalls/io_getevents/io_getevents02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_getevents invoked via libaio with invalid ctx and expects it to
> * return -EINVAL.
> */
> diff --git a/testcases/kernel/syscalls/io_setup/io_setup01.c b/testcases/kernel/syscalls/io_setup/io_setup01.c
> index ed99f38799..3536b068f6 100644
> --- a/testcases/kernel/syscalls/io_setup/io_setup01.c
> +++ b/testcases/kernel/syscalls/io_setup/io_setup01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_setup invoked via libaio:
> *
> * - io_setup succeeds if both nr_events and ctxp are valid.
> diff --git a/testcases/kernel/syscalls/io_setup/io_setup02.c b/testcases/kernel/syscalls/io_setup/io_setup02.c
> index f297979209..14a89d6020 100644
> --- a/testcases/kernel/syscalls/io_setup/io_setup02.c
> +++ b/testcases/kernel/syscalls/io_setup/io_setup02.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_setup invoked via syscall(2):
> *
> * - io_setup fails and returns EFAULT if ctxp is NULL.
> diff --git a/testcases/kernel/syscalls/io_submit/io_submit01.c b/testcases/kernel/syscalls/io_submit/io_submit01.c
> index 616380b93e..a76a5b3249 100644
> --- a/testcases/kernel/syscalls/io_submit/io_submit01.c
> +++ b/testcases/kernel/syscalls/io_submit/io_submit01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_submit() invoked via libaio:
> *
> * - io_submit fails and returns -EINVAL if ctx is invalid.
> diff --git a/testcases/kernel/syscalls/io_submit/io_submit02.c b/testcases/kernel/syscalls/io_submit/io_submit02.c
> index 6ba4d99a5d..36e9c29f93 100644
> --- a/testcases/kernel/syscalls/io_submit/io_submit02.c
> +++ b/testcases/kernel/syscalls/io_submit/io_submit02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_submit invoked via syscall(2):
> *
> * 1. io_submit() returns the number of iocbs submitted.
> diff --git a/testcases/kernel/syscalls/io_submit/io_submit03.c b/testcases/kernel/syscalls/io_submit/io_submit03.c
> index 90780c0e44..45903107d7 100644
> --- a/testcases/kernel/syscalls/io_submit/io_submit03.c
> +++ b/testcases/kernel/syscalls/io_submit/io_submit03.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test io_submit invoked via syscall(2):
> *
> * 1. io_submit fails and returns EINVAL if ctx is invalid.
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl01.c b/testcases/kernel/syscalls/ioctl/ioctl01.c
> index d7886f3586..42b93ac9b3 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl01.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the errnos set by the ioctl(2) system call.
> *
> * - EBADF: Pass an invalid fd to ioctl(fd, ...) and expect EBADF
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl02.c b/testcases/kernel/syscalls/ioctl/ioctl02.c
> index 9337da384a..7ef55af681 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl02.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test TCGETA/TCGETS and TCSETA/TCSETS ioctl implementations for tty driver.
> *
> * In this test, the parent and child open the parentty and the childtty
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl03.c b/testcases/kernel/syscalls/ioctl/ioctl03.c
> index 890238f7d5..8a868a98e6 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl03.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl03.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether all the valid IFF flags are returned properly by implementation
> * of TUNGETFEATURES ioctl.
> */
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl04.c b/testcases/kernel/syscalls/ioctl/ioctl04.c
> index f96b22f0ce..952450ba99 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl04.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for the BLKROSET and BLKROGET ioctls.
> *
> * - Set the device read only, read the value back.
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl05.c b/testcases/kernel/syscalls/ioctl/ioctl05.c
> index 8e3abf14fe..586322e026 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl05.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for the BLKGETSIZE and BLKGETSIZE64 ioctls.
> *
> * - BLKGETSIZE returns size in 512 byte blocks BLKGETSIZE64 in bytes
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl06.c b/testcases/kernel/syscalls/ioctl/ioctl06.c
> index 754d4acfc5..4e4177ca41 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl06.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for the BLKRASET and BLKRAGET ioctls.
> *
> * Sets device read-ahead, reads it back and compares the values.
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl07.c b/testcases/kernel/syscalls/ioctl/ioctl07.c
> index ea88cf73bc..59ef893da5 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl07.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl07.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Very basic test for the RND* ioctls.
> *
> * Reads the entropy available from both /proc and the ioctl and compares
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl08.c b/testcases/kernel/syscalls/ioctl/ioctl08.c
> index 14f9354c9b..115ad33235 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl08.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests the ioctl functionality to deduplicate fileranges using
> * btrfs filesystem.
> *
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl09.c b/testcases/kernel/syscalls/ioctl/ioctl09.c
> index 0d1f1072d3..4e61f3bc9b 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl09.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for the BLKRRPART ioctl, it is the same as blockdev
> * --rereadpt command.
> */
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
> index 2574bb6a26..a30fa92290 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that ioctl() FICLONE feature clones file content from
> * one file to an another.
> *
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
> index e5d4be96f7..76a6bb8a20 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that ioctl() FICLONE/FICLONERANGE feature correctly raises
> * EOPNOTSUPP when an unsupported filesystem is used. In particular, filesystems
> * which don't support copy-on-write.
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
> index b0a0f8d63f..6a9d270d9f 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that ioctl() FICLONE/FICLONERANGE feature correctly raises
> * exceptions when it's supposed to.
> */
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
> index 1dcf4f05c1..96f9d5831c 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlone04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that ioctl() FICLONE/FICLONERANGE feature raises the right
> * error according with bad file descriptors.
> */
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
> index 7072707651..5b51f1d120 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that ioctl() FICLONERANGE feature clones file content from
> * one file to an another.
> *
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
> index cc1d0e0319..6c93d8dc3b 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ficlonerange02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that ioctl() FICLONERANGE feature correctly raises
> * EINVAL when:
> * - filesystem does not support overlapping reflink ranges in the same file
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop01.c b/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
> index c3fb9f583f..c9137bf1e7 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_loop01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests ioctl() on loopdevice with LO_FLAGS_AUTOCLEAR and LO_FLAGS_PARTSCAN flags.
> *
> * For LO_FLAGS_AUTOCLEAR flag, only checks autoclear field value in sysfs
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop02.c b/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
> index dc983ac5f6..6026af1e26 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_loop02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests ioctl() on loopdevice with LO_FLAGS_READ_ONLY (similar as losetup -r) and
> * LOOP_CHANGE_FD flags.
> *
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop03.c b/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
> index a7b0230e1f..dc39dbbb63 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_loop03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests ioctl() on loopdevice with LOOP_CHANGE_FD flag.
> *
> * Tests whether LOOP_CHANGE_FD can not succeed (get EINVAL error)
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop04.c b/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
> index f1021cc77d..839648f265 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_loop04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests ioctl() on loopdevice with LOOP_SET_CAPACITY flag.
> *
> * Tests whether LOOP_SET_CAPACITY can update a live
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop05.c b/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
> index 184462464b..0ced7eda12 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_loop05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests ioctl() on loopdevice with LOOP_SET_DIRECT_IO flag.
> *
> * Tests whether LOOP_SET_DIRECT_IO can update a live loop device dio mode.
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop06.c b/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
> index 317f693a04..573871bc12 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_loop06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests invalid block size of loopdevice by using ioctl() with
> * LOOP_SET_BLOCK_SIZE and LOOP_CONFIGURE flags.
> */
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_loop07.c b/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
> index 68db79558f..be136fe0d4 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_loop07.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests ioctl() on loopdevice with LOOP_SET_STATUS64 and LOOP_GET_STATUS64 flags.
> *
> * Tests lo_sizelimit field. If lo_sizelimit is 0, it means max
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns01.c b/testcases/kernel/syscalls/ioctl/ioctl_ns01.c
> index 06c81ba1b6..c2c9567368 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ns01.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ns01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test ioctl_ns with NS_GET_PARENT request.
> *
> * Parent process tries to get parent of initial namespace, which should
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns02.c b/testcases/kernel/syscalls/ioctl/ioctl_ns02.c
> index 3c958c14af..c6849b53fe 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ns02.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ns02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test ioctl_ns with NS_GET_PARENT request.
> *
> * Test tries to get namespace parent for UTS namespace, which
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns03.c b/testcases/kernel/syscalls/ioctl/ioctl_ns03.c
> index bdd80585ac..395423b061 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ns03.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ns03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test ioctl_ns with NS_GET_OWNER_UID request.
> *
> * Calls ioctl for a UTS namespace, which isn't a user namespace.
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns04.c b/testcases/kernel/syscalls/ioctl/ioctl_ns04.c
> index 8c5c9f961b..4385b6e344 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ns04.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ns04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test ioctl_ns with NS_GET_USERNS request.
> *
> * Owning user namespace of process calling ioctl is out of scope,
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns05.c b/testcases/kernel/syscalls/ioctl/ioctl_ns05.c
> index 36e41c468c..e84af38b67 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ns05.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ns05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test ioctl_ns with NS_GET_PARENT request.
> *
> * Child cloned with the CLONE_NEWPID flag is created in a new pid namespace.
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns06.c b/testcases/kernel/syscalls/ioctl/ioctl_ns06.c
> index 45fc01ce72..a37ad6273b 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ns06.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ns06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test ioctl_ns with NS_GET_USERNS request.
> *
> * After the call to clone with the CLONE_NEWUSER flag,
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_ns07.c b/testcases/kernel/syscalls/ioctl/ioctl_ns07.c
> index 9cfa57fb1b..b0a5d0b1c2 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_ns07.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_ns07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test ioctl_ns with NS_GET_* request for file descriptors
> * that aren't namespaces.
> *
> diff --git a/testcases/kernel/syscalls/ioctl/ioctl_sg01.c b/testcases/kernel/syscalls/ioctl/ioctl_sg01.c
> index 1c5039cf0f..fba3816c34 100644
> --- a/testcases/kernel/syscalls/ioctl/ioctl_sg01.c
> +++ b/testcases/kernel/syscalls/ioctl/ioctl_sg01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2018-1000204
> *
> * Test ioctl(SG_IO) and check that kernel doesn't leak data. Requires
> diff --git a/testcases/kernel/syscalls/iopl/iopl01.c b/testcases/kernel/syscalls/iopl/iopl01.c
> index 0b7e8823f2..227344aa4e 100644
> --- a/testcases/kernel/syscalls/iopl/iopl01.c
> +++ b/testcases/kernel/syscalls/iopl/iopl01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a basic test for iopl(2) system call.
> *
> * Test the system call for possible privilege levels.
> diff --git a/testcases/kernel/syscalls/iopl/iopl02.c b/testcases/kernel/syscalls/iopl/iopl02.c
> index 1a588590e9..bf3e0206dd 100644
> --- a/testcases/kernel/syscalls/iopl/iopl02.c
> +++ b/testcases/kernel/syscalls/iopl/iopl02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for iopl(2) system call error.
> *
> * - iopl(2) fail with EINVAL when privilege level greater than 3.
> diff --git a/testcases/kernel/syscalls/ioprio/ioprio_get01.c b/testcases/kernel/syscalls/ioprio/ioprio_get01.c
> index f1325be31f..a0c919e23d 100644
> --- a/testcases/kernel/syscalls/ioprio/ioprio_get01.c
> +++ b/testcases/kernel/syscalls/ioprio/ioprio_get01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic ioprio_get() test. Gets the current process I/O priority and
> * checks that the values are sane.
> */
> diff --git a/testcases/kernel/syscalls/ioprio/ioprio_set01.c b/testcases/kernel/syscalls/ioprio/ioprio_set01.c
> index 0868cea7c8..a69b28ec5a 100644
> --- a/testcases/kernel/syscalls/ioprio/ioprio_set01.c
> +++ b/testcases/kernel/syscalls/ioprio/ioprio_set01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic ioprio_set() test. Gets the current process I/O priority and
> * bumps it up one notch, then down two notches and checks that the
> * new priority is reported back correctly.
> diff --git a/testcases/kernel/syscalls/ioprio/ioprio_set02.c b/testcases/kernel/syscalls/ioprio/ioprio_set02.c
> index 37db7bf429..39ef38a86f 100644
> --- a/testcases/kernel/syscalls/ioprio/ioprio_set02.c
> +++ b/testcases/kernel/syscalls/ioprio/ioprio_set02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Extended ioprio_set() test.
> * Tests to set all 8 priority levels for best effort priority, then
> * switches to test all 8 priority levels for idle priority.
> diff --git a/testcases/kernel/syscalls/ioprio/ioprio_set03.c b/testcases/kernel/syscalls/ioprio/ioprio_set03.c
> index 6efcacc1ce..6a072c6c70 100644
> --- a/testcases/kernel/syscalls/ioprio/ioprio_set03.c
> +++ b/testcases/kernel/syscalls/ioprio/ioprio_set03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Negative ioprio_set() test. Test some non-working priorities to make
> * sure they don't work.
> */
> diff --git a/testcases/kernel/syscalls/ipc/msgctl/msgctl05.c b/testcases/kernel/syscalls/ipc/msgctl/msgctl05.c
> index 721b08c587..7e059d7f0d 100644
> --- a/testcases/kernel/syscalls/ipc/msgctl/msgctl05.c
> +++ b/testcases/kernel/syscalls/ipc/msgctl/msgctl05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Cross verify the _high fields being set to 0 by the kernel.
> */
> #include <sys/msg.h>
> diff --git a/testcases/kernel/syscalls/ipc/msgctl/msgctl06.c b/testcases/kernel/syscalls/ipc/msgctl/msgctl06.c
> index c1264b71e0..2e22f37fe0 100644
> --- a/testcases/kernel/syscalls/ipc/msgctl/msgctl06.c
> +++ b/testcases/kernel/syscalls/ipc/msgctl/msgctl06.c
> @@ -4,8 +4,6 @@
> * Author: Feiyu Zhu <zhufy.jy@cn.fujitsu.com>
> */
> /*\
> - * [Description]
> - *
> * Call msgctl() with MSG_INFO flag and check that:
> *
> * * The returned index points to a valid MSG by calling MSG_STAT_ANY
> diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget01.c b/testcases/kernel/syscalls/ipc/msgget/msgget01.c
> index 2ab34ff9db..dd5a5ad73c 100644
> --- a/testcases/kernel/syscalls/ipc/msgget/msgget01.c
> +++ b/testcases/kernel/syscalls/ipc/msgget/msgget01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Create a message queue, write a message to it and
> * read it back.
> */
> diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget02.c b/testcases/kernel/syscalls/ipc/msgget/msgget02.c
> index 1885599d16..ef9ab34b89 100644
> --- a/testcases/kernel/syscalls/ipc/msgget/msgget02.c
> +++ b/testcases/kernel/syscalls/ipc/msgget/msgget02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for EEXIST, ENOENT, EACCES errors.
> *
> * - msgget(2) fails if a message queue exists for key and msgflg
> diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget03.c b/testcases/kernel/syscalls/ipc/msgget/msgget03.c
> index 9e6c66cb49..bd06539737 100644
> --- a/testcases/kernel/syscalls/ipc/msgget/msgget03.c
> +++ b/testcases/kernel/syscalls/ipc/msgget/msgget03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for ENOSPC error.
> *
> * ENOSPC - All possible message queues have been taken (MSGMNI)
> diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget04.c b/testcases/kernel/syscalls/ipc/msgget/msgget04.c
> index a01ecea85e..28cbb3352b 100644
> --- a/testcases/kernel/syscalls/ipc/msgget/msgget04.c
> +++ b/testcases/kernel/syscalls/ipc/msgget/msgget04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It is a basic test for msg_next_id.
> * msg_next_id specifies desired id for next allocated IPC message. By
> * default it's equal to -1, which means generic allocation logic.
> diff --git a/testcases/kernel/syscalls/ipc/msgget/msgget05.c b/testcases/kernel/syscalls/ipc/msgget/msgget05.c
> index 817c8486e8..edcb307c65 100644
> --- a/testcases/kernel/syscalls/ipc/msgget/msgget05.c
> +++ b/testcases/kernel/syscalls/ipc/msgget/msgget05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It is a basic test for msg_next_id.
> * When the message queue identifier that msg_next_id stored is already in use,
> * call msgget with different key just use another unused value in range
> diff --git a/testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c b/testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c
> index e6b659f155..60936be8a3 100644
> --- a/testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c
> +++ b/testcases/kernel/syscalls/ipc/msgsnd/msgsnd01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that msgsnd(2) enqueues a message correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c b/testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c
> index 13db01c8a1..887bfdef2a 100644
> --- a/testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c
> +++ b/testcases/kernel/syscalls/ipc/msgsnd/msgsnd05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that msgsnd(2) fails and sets correct errno:
> *
> * - EAGAIN if the message can't be sent due to the msg_qbytes limit for the
> diff --git a/testcases/kernel/syscalls/ipc/msgstress/msgstress01.c b/testcases/kernel/syscalls/ipc/msgstress/msgstress01.c
> index 2ceea58465..ae637e5d7a 100644
> --- a/testcases/kernel/syscalls/ipc/msgstress/msgstress01.c
> +++ b/testcases/kernel/syscalls/ipc/msgstress/msgstress01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Stress test for SysV IPC. We send multiple messages at the same time,
> * checking that we are not loosing any byte once we receive the messages
> * from multiple children.
> diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl01.c b/testcases/kernel/syscalls/ipc/semctl/semctl01.c
> index ff691adf86..92a36bff07 100644
> --- a/testcases/kernel/syscalls/ipc/semctl/semctl01.c
> +++ b/testcases/kernel/syscalls/ipc/semctl/semctl01.c
> @@ -3,8 +3,6 @@
> * Copyright (c) International Business Machines Corp., 2001
> */
> /*\
> - * [Description]
> - *
> * Test the 13 possible semctl() commands
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl02.c b/testcases/kernel/syscalls/ipc/semctl/semctl02.c
> index 3134dde576..6ca63472c2 100644
> --- a/testcases/kernel/syscalls/ipc/semctl/semctl02.c
> +++ b/testcases/kernel/syscalls/ipc/semctl/semctl02.c
> @@ -5,8 +5,6 @@
> * 03/2001 - Written by Wayne Boyer
> */
> /*\
> - * [Description]
> - *
> * Test for semctl() EACCES error.
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl03.c b/testcases/kernel/syscalls/ipc/semctl/semctl03.c
> index f9f335e4a8..11530b2013 100644
> --- a/testcases/kernel/syscalls/ipc/semctl/semctl03.c
> +++ b/testcases/kernel/syscalls/ipc/semctl/semctl03.c
> @@ -6,8 +6,6 @@
> * 03/2001 - Written by Wayne Boyer
> */
> /*\
> - * [Description]
> - *
> * Test for semctl() EINVAL and EFAULT errors
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl04.c b/testcases/kernel/syscalls/ipc/semctl/semctl04.c
> index 015850a3bf..f6fa361b27 100644
> --- a/testcases/kernel/syscalls/ipc/semctl/semctl04.c
> +++ b/testcases/kernel/syscalls/ipc/semctl/semctl04.c
> @@ -6,8 +6,6 @@
> * 03/2001 - Written by Wayne Boyer
> */
> /*\
> - * [Description]
> - *
> * Test for semctl() EPERM error
> *
> * Runs IPC_SET and IPC_RMID from unprivileged child process.
> diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl05.c b/testcases/kernel/syscalls/ipc/semctl/semctl05.c
> index 69df087502..5feee00821 100644
> --- a/testcases/kernel/syscalls/ipc/semctl/semctl05.c
> +++ b/testcases/kernel/syscalls/ipc/semctl/semctl05.c
> @@ -7,8 +7,6 @@
> * 03/2001 - Written by Wayne Boyer
> */
> /*\
> - * [Description]
> - *
> * Test for semctl() ERANGE error
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl07.c b/testcases/kernel/syscalls/ipc/semctl/semctl07.c
> index 1b203ef5e9..588fb2436c 100644
> --- a/testcases/kernel/syscalls/ipc/semctl/semctl07.c
> +++ b/testcases/kernel/syscalls/ipc/semctl/semctl07.c
> @@ -10,8 +10,6 @@
> * to conflict with other instances of the same test.
> */
> /*\
> - * [Description]
> - *
> * Basic tests for semctl().
> *
> * - semctl() with IPC_STAT where we check the semid_ds buf content
> diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl08.c b/testcases/kernel/syscalls/ipc/semctl/semctl08.c
> index aefa83da9c..f4549adf43 100644
> --- a/testcases/kernel/syscalls/ipc/semctl/semctl08.c
> +++ b/testcases/kernel/syscalls/ipc/semctl/semctl08.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Cross verify the _high fields being set to 0 by the kernel.
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl09.c b/testcases/kernel/syscalls/ipc/semctl/semctl09.c
> index efbc67f33d..32b411efd9 100644
> --- a/testcases/kernel/syscalls/ipc/semctl/semctl09.c
> +++ b/testcases/kernel/syscalls/ipc/semctl/semctl09.c
> @@ -4,8 +4,6 @@
> * Author: Feiyu Zhu <zhufy.jy@cn.fujitsu.com>
> */
> /*\
> - * [Description]
> - *
> * Call semctl() with SEM_INFO flag and check that:
> *
> * * The returned index points to a valid SEM by calling SEM_STAT_ANY
> diff --git a/testcases/kernel/syscalls/ipc/semget/semget01.c b/testcases/kernel/syscalls/ipc/semget/semget01.c
> index 872acabd32..3c05517e45 100644
> --- a/testcases/kernel/syscalls/ipc/semget/semget01.c
> +++ b/testcases/kernel/syscalls/ipc/semget/semget01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This case checks that semget() correclty creates a semaphore set.
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/semget/semget02.c b/testcases/kernel/syscalls/ipc/semget/semget02.c
> index 4273c84c74..d381bbd69f 100644
> --- a/testcases/kernel/syscalls/ipc/semget/semget02.c
> +++ b/testcases/kernel/syscalls/ipc/semget/semget02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This basic error handing of the semget syscall.
> *
> * - EACCES - a semaphore set exists for key, but the calling process does not
> diff --git a/testcases/kernel/syscalls/ipc/semget/semget05.c b/testcases/kernel/syscalls/ipc/semget/semget05.c
> index b49e5653c7..0e41a15280 100644
> --- a/testcases/kernel/syscalls/ipc/semget/semget05.c
> +++ b/testcases/kernel/syscalls/ipc/semget/semget05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for ENOSPC error.
> *
> * ENOSPC - a semaphore set exceed the maximum number of semaphore sets(SEMMNI)
> diff --git a/testcases/kernel/syscalls/ipc/semop/semop04.c b/testcases/kernel/syscalls/ipc/semop/semop04.c
> index 1f49e77408..f1fa549e89 100644
> --- a/testcases/kernel/syscalls/ipc/semop/semop04.c
> +++ b/testcases/kernel/syscalls/ipc/semop/semop04.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Creates a semaphore and two processes. The processes
> * each go through a loop where they semdown, delay for a
> * random amount of time, and semup, so they will almost
> diff --git a/testcases/kernel/syscalls/ipc/shmat/shmat04.c b/testcases/kernel/syscalls/ipc/shmat/shmat04.c
> index 9dda5c77a7..7b7b802cbc 100644
> --- a/testcases/kernel/syscalls/ipc/shmat/shmat04.c
> +++ b/testcases/kernel/syscalls/ipc/shmat/shmat04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * When debugging issues with a workload using SysV shmem, Michal Hocko has
> * come up with a reproducer that shows how a series of mprotect()
> * operations can result in an elevated shm_nattch and thus leak of the
> diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl01.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl01.c
> index e631b7b217..1eec079893 100644
> --- a/testcases/kernel/syscalls/ipc/shmctl/shmctl01.c
> +++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that shmctl() IPC_STAT and SHM_STAT reports correct data.
> *
> * The shm_nattach is excercised by:
> diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c
> index 5c6dc5333a..0b12944ce8 100644
> --- a/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c
> +++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c
> @@ -9,8 +9,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for EACCES, EFAULT and EINVAL errors.
> *
> * * EACCES - segment has no read or write permissions
> diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl03.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl03.c
> index 199ee41052..a3291c37f1 100644
> --- a/testcases/kernel/syscalls/ipc/shmctl/shmctl03.c
> +++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Call shmctl() with IPC_INFO flag and check that the data are consistent with
> * /proc/sys/kernel/shm*.
> */
> diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl04.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl04.c
> index b244026ce3..da73863dd6 100644
> --- a/testcases/kernel/syscalls/ipc/shmctl/shmctl04.c
> +++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Call shmctl() with SHM_INFO flag and check that:
> *
> * * The returned index points to a valid SHM by calling SHM_STAT_ANY
> diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl05.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl05.c
> index 6d9a53b9b9..84d512cfde 100644
> --- a/testcases/kernel/syscalls/ipc/shmctl/shmctl05.c
> +++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for commit
> * 3f05317d9889 (ipc/shm: fix use-after-free of shm file via remap_file_pages()).
> *
> diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl06.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl06.c
> index 92aaa38e26..63e7f843d4 100644
> --- a/testcases/kernel/syscalls/ipc/shmctl/shmctl06.c
> +++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Cross verify the _high fields being set to 0 by the kernel.
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl07.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl07.c
> index 15af7b4526..1cc07ead21 100644
> --- a/testcases/kernel/syscalls/ipc/shmctl/shmctl07.c
> +++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl07.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for a SHM_LOCK and SHM_UNLOCK.
> */
>
> diff --git a/testcases/kernel/syscalls/ipc/shmctl/shmctl08.c b/testcases/kernel/syscalls/ipc/shmctl/shmctl08.c
> index bb2abca4c9..f72f9f9e5e 100644
> --- a/testcases/kernel/syscalls/ipc/shmctl/shmctl08.c
> +++ b/testcases/kernel/syscalls/ipc/shmctl/shmctl08.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for a SHM_SET.
> *
> * The test clears the group and others bits from the shm_perm.mode and checks
> diff --git a/testcases/kernel/syscalls/ipc/shmdt/shmdt01.c b/testcases/kernel/syscalls/ipc/shmdt/shmdt01.c
> index 551daac9cc..0a6d4096c8 100644
> --- a/testcases/kernel/syscalls/ipc/shmdt/shmdt01.c
> +++ b/testcases/kernel/syscalls/ipc/shmdt/shmdt01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This case check whether we get SIGSEGV when write a value to a detached
> * shared memory resource.
> */
> diff --git a/testcases/kernel/syscalls/ipc/shmdt/shmdt02.c b/testcases/kernel/syscalls/ipc/shmdt/shmdt02.c
> index 782c6f4882..a3b20f8ff4 100644
> --- a/testcases/kernel/syscalls/ipc/shmdt/shmdt02.c
> +++ b/testcases/kernel/syscalls/ipc/shmdt/shmdt02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handing of the shmdt syscall.
> *
> * -EINVAL there is no shared memory segment attached at shmaddr.
> diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget02.c b/testcases/kernel/syscalls/ipc/shmget/shmget02.c
> index 10b8c92925..8a0961b04c 100644
> --- a/testcases/kernel/syscalls/ipc/shmget/shmget02.c
> +++ b/testcases/kernel/syscalls/ipc/shmget/shmget02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for ENOENT, EEXIST, EINVAL, EACCES, EPERM errors.
> *
> * - ENOENT - No segment exists for the given key and IPC_CREAT was not specified.
> diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget03.c b/testcases/kernel/syscalls/ipc/shmget/shmget03.c
> index 8b157e4397..092f2170e5 100644
> --- a/testcases/kernel/syscalls/ipc/shmget/shmget03.c
> +++ b/testcases/kernel/syscalls/ipc/shmget/shmget03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for ENOSPC error.
> *
> * ENOSPC - All possible shared memory segments have been taken (SHMMNI).
> diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget04.c b/testcases/kernel/syscalls/ipc/shmget/shmget04.c
> index 0e48b09542..2a6a676cd6 100644
> --- a/testcases/kernel/syscalls/ipc/shmget/shmget04.c
> +++ b/testcases/kernel/syscalls/ipc/shmget/shmget04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for EACCES error.
> *
> * Create a shared memory segment without read or write permissions under
> diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget05.c b/testcases/kernel/syscalls/ipc/shmget/shmget05.c
> index 42a115474a..d96a98546d 100644
> --- a/testcases/kernel/syscalls/ipc/shmget/shmget05.c
> +++ b/testcases/kernel/syscalls/ipc/shmget/shmget05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It is a basic test for shm_next_id.
> *
> * shm_next_id specifies desired id for next allocated IPC shared memory. By
> diff --git a/testcases/kernel/syscalls/ipc/shmget/shmget06.c b/testcases/kernel/syscalls/ipc/shmget/shmget06.c
> index d91b7b6354..f4bd61bca0 100644
> --- a/testcases/kernel/syscalls/ipc/shmget/shmget06.c
> +++ b/testcases/kernel/syscalls/ipc/shmget/shmget06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It is a basic test for shm_next_id.
> *
> * When the shared memory segment identifier that shm_next_id stored is already
> diff --git a/testcases/kernel/syscalls/kcmp/kcmp01.c b/testcases/kernel/syscalls/kcmp/kcmp01.c
> index c8fd48466d..50544f46e2 100644
> --- a/testcases/kernel/syscalls/kcmp/kcmp01.c
> +++ b/testcases/kernel/syscalls/kcmp/kcmp01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that
> *
> * 1. kcmp() returns 0 with two process and two file descriptors refering to the
> diff --git a/testcases/kernel/syscalls/kcmp/kcmp02.c b/testcases/kernel/syscalls/kcmp/kcmp02.c
> index d5696b70c3..cf76e2cc82 100644
> --- a/testcases/kernel/syscalls/kcmp/kcmp02.c
> +++ b/testcases/kernel/syscalls/kcmp/kcmp02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, kcmp() returns -1 and sets errno to
> *
> * 1. ESRCH if pid does not exist
> diff --git a/testcases/kernel/syscalls/kcmp/kcmp03.c b/testcases/kernel/syscalls/kcmp/kcmp03.c
> index 37d5118d55..a3133335c9 100644
> --- a/testcases/kernel/syscalls/kcmp/kcmp03.c
> +++ b/testcases/kernel/syscalls/kcmp/kcmp03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, kcmp() returns 0 if the processes
> *
> * 1. share the same file system information
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl01.c b/testcases/kernel/syscalls/keyctl/keyctl01.c
> index 674094eec7..181e37dd10 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl01.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests the keyctl(2) syscall.
> *
> * Manipulate the kernel's key management facility.
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl02.c b/testcases/kernel/syscalls/keyctl/keyctl02.c
> index 788e9657cd..3c5a2501e6 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl02.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for the race between keyctl_read() and
> * keyctl_revoke(), if the revoke happens between keyctl_read()
> * checking the validity of a key and the key's semaphore being taken,
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl03.c b/testcases/kernel/syscalls/keyctl/keyctl03.c
> index 563ee96a96..da97b24c2f 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl03.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for commit
> * f05819df10d7 ("KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring")
> */
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl04.c b/testcases/kernel/syscalls/keyctl/keyctl04.c
> index 50c9244deb..aff95a576c 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl04.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for commit c9f838d104fe ("KEYS: fix
> * keyctl_set_reqkey_keyring() to not leak thread keyrings"), a.k.a.
> * CVE-2017-7472. This bug could be used to exhaust kernel memory, though it
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl05.c b/testcases/kernel/syscalls/keyctl/keyctl05.c
> index 0ad106774c..cd738fb3c0 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl05.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for commit 63a0b0509e70 ("KEYS: fix freeing uninitialized
> * memory in key_update()"). Try to reproduce the crash in two different ways:
> *
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl06.c b/testcases/kernel/syscalls/keyctl/keyctl06.c
> index 4564601d1c..3e23e91425 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl06.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for commit:
> *
> * e645016abc80 ("KEYS: fix writing past end of user-supplied buffer in keyring_read()")
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl07.c b/testcases/kernel/syscalls/keyctl/keyctl07.c
> index 8b10ee8033..e4e0ff570f 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl07.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for commit 37863c43b2c6 ("KEYS: prevent KEYCTL_READ on
> * negative key"). This is CVE-2017-12192.
> */
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl08.c b/testcases/kernel/syscalls/keyctl/keyctl08.c
> index 30e077c50a..e038123ef5 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl08.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2016-9604, checks that keys beginning with "." are disallowed.
> *
> * See commit
> diff --git a/testcases/kernel/syscalls/keyctl/keyctl09.c b/testcases/kernel/syscalls/keyctl/keyctl09.c
> index 1f24f804a3..00ff61dafb 100644
> --- a/testcases/kernel/syscalls/keyctl/keyctl09.c
> +++ b/testcases/kernel/syscalls/keyctl/keyctl09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that encrypted keys can be instantiated using user-provided decrypted
> * data that is hex-ascii encoded.
> */
> diff --git a/testcases/kernel/syscalls/kill/kill13.c b/testcases/kernel/syscalls/kill/kill13.c
> index 66ae37bc0f..ca281ca6c9 100644
> --- a/testcases/kernel/syscalls/kill/kill13.c
> +++ b/testcases/kernel/syscalls/kill/kill13.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Reproducer of CVE-2018-10124; INT_MIN negation.
> *
> * On most two's complement CPUs negation of INT_MIN will result in
> diff --git a/testcases/kernel/syscalls/landlock/landlock01.c b/testcases/kernel/syscalls/landlock/landlock01.c
> index d0d68c8e4d..bf206dae77 100644
> --- a/testcases/kernel/syscalls/landlock/landlock01.c
> +++ b/testcases/kernel/syscalls/landlock/landlock01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that landlock_create_ruleset syscall fails with the right
> * error codes:
> *
> diff --git a/testcases/kernel/syscalls/landlock/landlock02.c b/testcases/kernel/syscalls/landlock/landlock02.c
> index e1e3228b54..60010f554b 100644
> --- a/testcases/kernel/syscalls/landlock/landlock02.c
> +++ b/testcases/kernel/syscalls/landlock/landlock02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that landlock_add_rule syscall fails with the right
> * error codes:
> *
> diff --git a/testcases/kernel/syscalls/landlock/landlock03.c b/testcases/kernel/syscalls/landlock/landlock03.c
> index 150c8cc4e5..3c0cd56b0a 100644
> --- a/testcases/kernel/syscalls/landlock/landlock03.c
> +++ b/testcases/kernel/syscalls/landlock/landlock03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that landlock_restrict_self syscall fails with the right
> * error codes:
> *
> diff --git a/testcases/kernel/syscalls/landlock/landlock04.c b/testcases/kernel/syscalls/landlock/landlock04.c
> index 2faba7a2b8..737fdbf244 100644
> --- a/testcases/kernel/syscalls/landlock/landlock04.c
> +++ b/testcases/kernel/syscalls/landlock/landlock04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that all landlock filesystem rules are working properly.
> * The way we do it is to verify that all disabled syscalls are not working but
> * the one we enabled via specifc landlock rules.
> diff --git a/testcases/kernel/syscalls/landlock/landlock05.c b/testcases/kernel/syscalls/landlock/landlock05.c
> index 3d5048f0ab..ad5e932b07 100644
> --- a/testcases/kernel/syscalls/landlock/landlock05.c
> +++ b/testcases/kernel/syscalls/landlock/landlock05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies LANDLOCK_ACCESS_FS_REFER access in the
> * landlock sandbox.
> *
> diff --git a/testcases/kernel/syscalls/landlock/landlock06.c b/testcases/kernel/syscalls/landlock/landlock06.c
> index 74237d1165..c2ac20d593 100644
> --- a/testcases/kernel/syscalls/landlock/landlock06.c
> +++ b/testcases/kernel/syscalls/landlock/landlock06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies LANDLOCK_ACCESS_FS_IOCTL_DEV access in the
> * landlock sandbox by creating a pipe and testing that ioctl() can be executed
> * on it. The test is also verifying that some of the I/O operations can be
> diff --git a/testcases/kernel/syscalls/landlock/landlock07.c b/testcases/kernel/syscalls/landlock/landlock07.c
> index 8ee6148563..7ef0f756ac 100644
> --- a/testcases/kernel/syscalls/landlock/landlock07.c
> +++ b/testcases/kernel/syscalls/landlock/landlock07.c
> @@ -4,8 +4,6 @@
> */
>
> /**
> - * [Description]
> - *
> * CVE-2024-42318
> *
> * Test to check if system is affected by Landlock Houdini bug:
> diff --git a/testcases/kernel/syscalls/landlock/landlock08.c b/testcases/kernel/syscalls/landlock/landlock08.c
> index c3c320c340..7c498e6d58 100644
> --- a/testcases/kernel/syscalls/landlock/landlock08.c
> +++ b/testcases/kernel/syscalls/landlock/landlock08.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the landlock support for bind()/connect() syscalls in IPV4 and IPV6
> * protocols. In particular, check that bind() is assigning the address only on
> * the TCP port enforced by LANDLOCK_ACCESS_NET_BIND_TCP and check that
> diff --git a/testcases/kernel/syscalls/lgetxattr/lgetxattr01.c b/testcases/kernel/syscalls/lgetxattr/lgetxattr01.c
> index 221f9157a4..f98d11d8f0 100644
> --- a/testcases/kernel/syscalls/lgetxattr/lgetxattr01.c
> +++ b/testcases/kernel/syscalls/lgetxattr/lgetxattr01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the lgetxattr(2).
> *
> * In the case of a symbolic link, lgetxattr(2) only gets the value of the
> diff --git a/testcases/kernel/syscalls/lgetxattr/lgetxattr02.c b/testcases/kernel/syscalls/lgetxattr/lgetxattr02.c
> index db94890c4b..459c1bf7a7 100644
> --- a/testcases/kernel/syscalls/lgetxattr/lgetxattr02.c
> +++ b/testcases/kernel/syscalls/lgetxattr/lgetxattr02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, lgetxattr(2) returns -1 and sets errno to
> *
> * 1. ENODATA if the named attribute does not exist.
> diff --git a/testcases/kernel/syscalls/link/link02.c b/testcases/kernel/syscalls/link/link02.c
> index 3d265d6eb1..248e2c5b3b 100644
> --- a/testcases/kernel/syscalls/link/link02.c
> +++ b/testcases/kernel/syscalls/link/link02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests that link(2) succeeds.
> */
>
> diff --git a/testcases/kernel/syscalls/link/link04.c b/testcases/kernel/syscalls/link/link04.c
> index 9940ac665c..1647785be2 100644
> --- a/testcases/kernel/syscalls/link/link04.c
> +++ b/testcases/kernel/syscalls/link/link04.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Negative test cases for link(2).
> *
> * This test program should contain test cases where link will fail regardless
> diff --git a/testcases/kernel/syscalls/link/link05.c b/testcases/kernel/syscalls/link/link05.c
> index b6c49bccaa..f3f282377a 100644
> --- a/testcases/kernel/syscalls/link/link05.c
> +++ b/testcases/kernel/syscalls/link/link05.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests that link(2) succeeds with creating 1000 links.
> */
>
> diff --git a/testcases/kernel/syscalls/link/link08.c b/testcases/kernel/syscalls/link/link08.c
> index 92d5074890..713001a33e 100644
> --- a/testcases/kernel/syscalls/link/link08.c
> +++ b/testcases/kernel/syscalls/link/link08.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * - link() fails with EPERM if the old path is a directory.
> diff --git a/testcases/kernel/syscalls/listmount/listmount01.c b/testcases/kernel/syscalls/listmount/listmount01.c
> index 604e5ce926..5090ae7bcf 100644
> --- a/testcases/kernel/syscalls/listmount/listmount01.c
> +++ b/testcases/kernel/syscalls/listmount/listmount01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that listmount() is properly recognizing a mounted
> * root directory using LSMT_ROOT flag.
> *
> diff --git a/testcases/kernel/syscalls/listmount/listmount02.c b/testcases/kernel/syscalls/listmount/listmount02.c
> index 4b831b615b..a8ee037ff3 100644
> --- a/testcases/kernel/syscalls/listmount/listmount02.c
> +++ b/testcases/kernel/syscalls/listmount/listmount02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that listmount() is properly reading groups of mount IDs,
> * checking that both oneshoot and iterator API for listmount() return the same
> * array.
> diff --git a/testcases/kernel/syscalls/listmount/listmount03.c b/testcases/kernel/syscalls/listmount/listmount03.c
> index befe0edaf4..dfbf2bdd25 100644
> --- a/testcases/kernel/syscalls/listmount/listmount03.c
> +++ b/testcases/kernel/syscalls/listmount/listmount03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that listmount() raises EPERM when mount point is not accessible.
> */
>
> diff --git a/testcases/kernel/syscalls/listmount/listmount04.c b/testcases/kernel/syscalls/listmount/listmount04.c
> index d38408d2c2..503346de8d 100644
> --- a/testcases/kernel/syscalls/listmount/listmount04.c
> +++ b/testcases/kernel/syscalls/listmount/listmount04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that listmount() raises the correct errors according with
> * invalid data:
> *
> diff --git a/testcases/kernel/syscalls/listxattr/listxattr01.c b/testcases/kernel/syscalls/listxattr/listxattr01.c
> index d3c3794cd7..73489a7701 100644
> --- a/testcases/kernel/syscalls/listxattr/listxattr01.c
> +++ b/testcases/kernel/syscalls/listxattr/listxattr01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for listxattr(2) system call.
> *
> * listxattr(2) retrieves the list of extended attribute names
> diff --git a/testcases/kernel/syscalls/listxattr/listxattr02.c b/testcases/kernel/syscalls/listxattr/listxattr02.c
> index 0dc83cb404..78b48821d1 100644
> --- a/testcases/kernel/syscalls/listxattr/listxattr02.c
> +++ b/testcases/kernel/syscalls/listxattr/listxattr02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for listxattr error.
> *
> * - ERANGE - the size of the list buffer is too small to hold the result.
> diff --git a/testcases/kernel/syscalls/listxattr/listxattr03.c b/testcases/kernel/syscalls/listxattr/listxattr03.c
> index 31125e8cd0..0fe072b8bb 100644
> --- a/testcases/kernel/syscalls/listxattr/listxattr03.c
> +++ b/testcases/kernel/syscalls/listxattr/listxattr03.c
> @@ -6,8 +6,6 @@
> */
>
> /*
> - * [Description]
> - *
> * Test for returning the current size of the list of extended attribute names,
> * with size specified as zero.
> */
> diff --git a/testcases/kernel/syscalls/llistxattr/llistxattr01.c b/testcases/kernel/syscalls/llistxattr/llistxattr01.c
> index 5002fe96fb..e36f244c94 100644
> --- a/testcases/kernel/syscalls/llistxattr/llistxattr01.c
> +++ b/testcases/kernel/syscalls/llistxattr/llistxattr01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for llistxattr(2), retrieves the list of extended attribute names
> * associated with the link itself in the filesystem.
> */
> diff --git a/testcases/kernel/syscalls/llistxattr/llistxattr02.c b/testcases/kernel/syscalls/llistxattr/llistxattr02.c
> index c91d05f359..6d7f716e5d 100644
> --- a/testcases/kernel/syscalls/llistxattr/llistxattr02.c
> +++ b/testcases/kernel/syscalls/llistxattr/llistxattr02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify llistxattr(2) returns -1 and set proper errno:
> *
> * - ERANGE if the size of the list buffer is too small to hold the result
> diff --git a/testcases/kernel/syscalls/llistxattr/llistxattr03.c b/testcases/kernel/syscalls/llistxattr/llistxattr03.c
> index cbf8da026b..11b3243cd5 100644
> --- a/testcases/kernel/syscalls/llistxattr/llistxattr03.c
> +++ b/testcases/kernel/syscalls/llistxattr/llistxattr03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that llistxattr(2) call with zero size returns the current size of the
> * list of extended attribute names, which can be used to determine the size of
> * the buffer that should be supplied in a subsequent llistxattr(2) call.
> diff --git a/testcases/kernel/syscalls/lremovexattr/lremovexattr01.c b/testcases/kernel/syscalls/lremovexattr/lremovexattr01.c
> index ec27bbbc78..5761b1429a 100644
> --- a/testcases/kernel/syscalls/lremovexattr/lremovexattr01.c
> +++ b/testcases/kernel/syscalls/lremovexattr/lremovexattr01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * lremovexattr(2) removes the extended attribute identified by a name and
> * associated with a given path in the filesystem. Unlike removexattr(2),
> * lremovexattr(2) removes the attribute from the symbolic link only, and not
> diff --git a/testcases/kernel/syscalls/lstat/lstat03.c b/testcases/kernel/syscalls/lstat/lstat03.c
> index d48af180b0..a0ff4dc9b5 100644
> --- a/testcases/kernel/syscalls/lstat/lstat03.c
> +++ b/testcases/kernel/syscalls/lstat/lstat03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that lstat() provides correct information according
> * with device, access time, block size, ownership, etc.
> * The implementation provides a set of tests which are specific for each one
> diff --git a/testcases/kernel/syscalls/madvise/madvise03.c b/testcases/kernel/syscalls/madvise/madvise03.c
> index cd63affc14..d27bc7cb29 100644
> --- a/testcases/kernel/syscalls/madvise/madvise03.c
> +++ b/testcases/kernel/syscalls/madvise/madvise03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that successful madvise(2) MADV_DONTNEED operation will result in
> * zero-fill-on-demand pages for anonymous private mappings.
> */
> diff --git a/testcases/kernel/syscalls/madvise/madvise06.c b/testcases/kernel/syscalls/madvise/madvise06.c
> index 9cc64ceb58..51861a5daa 100644
> --- a/testcases/kernel/syscalls/madvise/madvise06.c
> +++ b/testcases/kernel/syscalls/madvise/madvise06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Page fault occurs in spite that madvise(WILLNEED) system call is called
> * to prefetch the page. This issue is reproduced by running a program
> * which sequentially accesses to a shared memory and calls madvise(WILLNEED)
> diff --git a/testcases/kernel/syscalls/madvise/madvise11.c b/testcases/kernel/syscalls/madvise/madvise11.c
> index cfe9d7f170..fd721ecad2 100644
> --- a/testcases/kernel/syscalls/madvise/madvise11.c
> +++ b/testcases/kernel/syscalls/madvise/madvise11.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Stress a possible race condition between memory pages allocation
> * and soft-offline of unrelated pages as explained in the commit:
> * d4ae9916ea29 (mm: soft-offline: close the race against page allocation)
> diff --git a/testcases/kernel/syscalls/madvise/madvise12.c b/testcases/kernel/syscalls/madvise/madvise12.c
> index 19f9f9d10b..8a8be5f1da 100644
> --- a/testcases/kernel/syscalls/madvise/madvise12.c
> +++ b/testcases/kernel/syscalls/madvise/madvise12.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that MADV_GUARD_INSTALL is causing SIGSEGV when someone is accessing
> * memory advised with it.
> *
> diff --git a/testcases/kernel/syscalls/mallinfo/mallinfo01.c b/testcases/kernel/syscalls/mallinfo/mallinfo01.c
> index 48fce0132f..c5c7d406f7 100644
> --- a/testcases/kernel/syscalls/mallinfo/mallinfo01.c
> +++ b/testcases/kernel/syscalls/mallinfo/mallinfo01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic mallinfo() test. Refer to glibc test mallinfo2 test
> * https://sourceware.org/git/?p=glibc.git;a=blob;f=malloc/tst-mallinfo2.c
> */
> diff --git a/testcases/kernel/syscalls/mallinfo/mallinfo02.c b/testcases/kernel/syscalls/mallinfo/mallinfo02.c
> index 6012b4e223..867079a3dd 100644
> --- a/testcases/kernel/syscalls/mallinfo/mallinfo02.c
> +++ b/testcases/kernel/syscalls/mallinfo/mallinfo02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic mallinfo() test for malloc() using sbrk or mmap.
> * It size > MMAP_THRESHOLD, it will use mmap. Otherwise, use sbrk.
> */
> diff --git a/testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c b/testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c
> index 51783fc22b..60e0e8af75 100644
> --- a/testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c
> +++ b/testcases/kernel/syscalls/mallinfo2/mallinfo2_01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic mallinfo2() test.
> *
> * Test hblkhd member of struct mallinfo2 whether overflow when setting 2G size.
> diff --git a/testcases/kernel/syscalls/mallopt/mallopt01.c b/testcases/kernel/syscalls/mallopt/mallopt01.c
> index 8ff4649e3d..77cd18a704 100644
> --- a/testcases/kernel/syscalls/mallopt/mallopt01.c
> +++ b/testcases/kernel/syscalls/mallopt/mallopt01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic mallinfo() and mallopt() testing.
> */
>
> diff --git a/testcases/kernel/syscalls/memcmp/memcmp01.c b/testcases/kernel/syscalls/memcmp/memcmp01.c
> index 836cf4043e..38f121bdbb 100644
> --- a/testcases/kernel/syscalls/memcmp/memcmp01.c
> +++ b/testcases/kernel/syscalls/memcmp/memcmp01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The testcase for buffer comparison by check boundary conditions.
> */
>
> diff --git a/testcases/kernel/syscalls/memcpy/memcpy01.c b/testcases/kernel/syscalls/memcpy/memcpy01.c
> index 0b64d70e66..b19f4145e7 100644
> --- a/testcases/kernel/syscalls/memcpy/memcpy01.c
> +++ b/testcases/kernel/syscalls/memcpy/memcpy01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The testcase for buffer copy by check boundary conditions.
> */
>
> diff --git a/testcases/kernel/syscalls/memfd_create/memfd_create04.c b/testcases/kernel/syscalls/memfd_create/memfd_create04.c
> index 585f17e161..8a12a72ff3 100644
> --- a/testcases/kernel/syscalls/memfd_create/memfd_create04.c
> +++ b/testcases/kernel/syscalls/memfd_create/memfd_create04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Validating memfd_create() with MFD_HUGETLB and MFD_HUGE_x flags.
> *
> * Attempt to create files in the hugetlbfs filesystem using different huge page
> diff --git a/testcases/kernel/syscalls/memset/memset01.c b/testcases/kernel/syscalls/memset/memset01.c
> index 17ae42c017..5a34eb40c6 100644
> --- a/testcases/kernel/syscalls/memset/memset01.c
> +++ b/testcases/kernel/syscalls/memset/memset01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The testcase for test setting of buffer by check boundary conditions.
> */
>
> diff --git a/testcases/kernel/syscalls/mincore/mincore02.c b/testcases/kernel/syscalls/mincore/mincore02.c
> index 1918d6c083..af3549ac3d 100644
> --- a/testcases/kernel/syscalls/mincore/mincore02.c
> +++ b/testcases/kernel/syscalls/mincore/mincore02.c
> @@ -9,8 +9,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test case provides a functional validation for mincore system call.
> * We mmap a file of known size (multiple of page size) and lock it in
> * memory. Then we obtain page location information via mincore and compare
> diff --git a/testcases/kernel/syscalls/mkdir/mkdir02.c b/testcases/kernel/syscalls/mkdir/mkdir02.c
> index 7fa055b8df..519c243ec7 100644
> --- a/testcases/kernel/syscalls/mkdir/mkdir02.c
> +++ b/testcases/kernel/syscalls/mkdir/mkdir02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that new directory created by mkdir(2) inherites the group ID from
> * the parent directory and S_ISGID bit, if the S_ISGID bit is set in the
> * parent directory.
> diff --git a/testcases/kernel/syscalls/mkdir/mkdir03.c b/testcases/kernel/syscalls/mkdir/mkdir03.c
> index 85d46801eb..7bbb76e9e5 100644
> --- a/testcases/kernel/syscalls/mkdir/mkdir03.c
> +++ b/testcases/kernel/syscalls/mkdir/mkdir03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check mkdir() with various error conditions that should produce
> * EFAULT, ENAMETOOLONG, EEXIST, ENOENT, ENOTDIR, ELOOP and EROFS.
> *
> diff --git a/testcases/kernel/syscalls/mkdir/mkdir09.c b/testcases/kernel/syscalls/mkdir/mkdir09.c
> index 44a2348be8..8f995c9699 100644
> --- a/testcases/kernel/syscalls/mkdir/mkdir09.c
> +++ b/testcases/kernel/syscalls/mkdir/mkdir09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Create multiple processes which create subdirectories in the
> * same directory multiple times within test time.
> */
> diff --git a/testcases/kernel/syscalls/mknod/mknod01.c b/testcases/kernel/syscalls/mknod/mknod01.c
> index f800b996da..fe0a1cfa6a 100644
> --- a/testcases/kernel/syscalls/mknod/mknod01.c
> +++ b/testcases/kernel/syscalls/mknod/mknod01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that mknod(2) successfully creates a filesystem node with
> * various modes.
> */
> diff --git a/testcases/kernel/syscalls/mknod/mknod02.c b/testcases/kernel/syscalls/mknod/mknod02.c
> index b1885fed13..89dd1d8740 100644
> --- a/testcases/kernel/syscalls/mknod/mknod02.c
> +++ b/testcases/kernel/syscalls/mknod/mknod02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that if mknod(2) creates a filesystem node in a directory which
> * does not have the set-group-ID bit set, new node will not inherit the
> * group ownership from its parent directory and its group ID will be the
> diff --git a/testcases/kernel/syscalls/mknod/mknod09.c b/testcases/kernel/syscalls/mknod/mknod09.c
> index e3b5dceae1..bb6e58a93d 100644
> --- a/testcases/kernel/syscalls/mknod/mknod09.c
> +++ b/testcases/kernel/syscalls/mknod/mknod09.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that mknod() fails with -1 and sets errno to EINVAL if the mode is
> * different than a normal file, device special file or FIFO.
> */
> diff --git a/testcases/kernel/syscalls/mlock/mlock01.c b/testcases/kernel/syscalls/mlock/mlock01.c
> index 0b079f8be8..007cffa2e7 100644
> --- a/testcases/kernel/syscalls/mlock/mlock01.c
> +++ b/testcases/kernel/syscalls/mlock/mlock01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test mlock with various valid addresses and lengths.
> */
>
> diff --git a/testcases/kernel/syscalls/mlock/mlock02.c b/testcases/kernel/syscalls/mlock/mlock02.c
> index 921ddeeae7..799a2276b5 100644
> --- a/testcases/kernel/syscalls/mlock/mlock02.c
> +++ b/testcases/kernel/syscalls/mlock/mlock02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for ENOMEM, EPERM errors.
> *
> * 1) mlock(2) fails with ENOMEM if some of the specified address range
> diff --git a/testcases/kernel/syscalls/mlock/mlock03.c b/testcases/kernel/syscalls/mlock/mlock03.c
> index 602bb65d8a..0ac5112d92 100644
> --- a/testcases/kernel/syscalls/mlock/mlock03.c
> +++ b/testcases/kernel/syscalls/mlock/mlock03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This case is a regression test on old RHEL5.
> *
> * Stack size mapping is decreased through mlock/munlock call.
> diff --git a/testcases/kernel/syscalls/mlock/mlock04.c b/testcases/kernel/syscalls/mlock/mlock04.c
> index 64f1bc5a03..226c4e2559 100644
> --- a/testcases/kernel/syscalls/mlock/mlock04.c
> +++ b/testcases/kernel/syscalls/mlock/mlock04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a reproducer copied from one of LKML patch submission
> * which subject is
> *
> diff --git a/testcases/kernel/syscalls/mlock/mlock05.c b/testcases/kernel/syscalls/mlock/mlock05.c
> index 8e805736dc..4e432fc8db 100644
> --- a/testcases/kernel/syscalls/mlock/mlock05.c
> +++ b/testcases/kernel/syscalls/mlock/mlock05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify mlock() causes pre-faulting of PTEs and prevent memory to be swapped out.
> *
> * Find the new mapping in /proc/$pid/smaps and check Rss and Locked fields after
> diff --git a/testcases/kernel/syscalls/mmap/mmap01.c b/testcases/kernel/syscalls/mmap/mmap01.c
> index 05802bceba..9a0c01aa6b 100644
> --- a/testcases/kernel/syscalls/mmap/mmap01.c
> +++ b/testcases/kernel/syscalls/mmap/mmap01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that mmap() succeeds when used to map a file where size of the
> * file is not a multiple of the page size, the memory area beyond the end
> * of the file to the end of the page is accessible. Also, verify that
> diff --git a/testcases/kernel/syscalls/mmap/mmap02.c b/testcases/kernel/syscalls/mmap/mmap02.c
> index 7ffe61fa38..21cac4b444 100644
> --- a/testcases/kernel/syscalls/mmap/mmap02.c
> +++ b/testcases/kernel/syscalls/mmap/mmap02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, mmap() call with PROT_READ and a file descriptor which is
> * open for read only, succeeds to map a file creating mapped memory with
> * read access.
> diff --git a/testcases/kernel/syscalls/mmap/mmap04.c b/testcases/kernel/syscalls/mmap/mmap04.c
> index fa85deed12..4a050b7b50 100644
> --- a/testcases/kernel/syscalls/mmap/mmap04.c
> +++ b/testcases/kernel/syscalls/mmap/mmap04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, after a successful mmap() call, permission bits of the new
> * mapping in /proc/pid/maps file matches the prot and flags arguments in
> * mmap() call.
> diff --git a/testcases/kernel/syscalls/mmap/mmap05.c b/testcases/kernel/syscalls/mmap/mmap05.c
> index 7abddaa9e4..445b5a33e7 100644
> --- a/testcases/kernel/syscalls/mmap/mmap05.c
> +++ b/testcases/kernel/syscalls/mmap/mmap05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, mmap() call with 'PROT_NONE' and a file descriptor which is
> * open for read and write, succeeds to map the file creating mapped memory,
> * but any attempt to access the contents of the mapped region causes the
> diff --git a/testcases/kernel/syscalls/mmap/mmap06.c b/testcases/kernel/syscalls/mmap/mmap06.c
> index 9d983250c8..3c2ca0d056 100644
> --- a/testcases/kernel/syscalls/mmap/mmap06.c
> +++ b/testcases/kernel/syscalls/mmap/mmap06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, mmap() call fails with errno:
> *
> * - EACCES, when a file mapping is requested but the file descriptor is not open for reading.
> diff --git a/testcases/kernel/syscalls/mmap/mmap08.c b/testcases/kernel/syscalls/mmap/mmap08.c
> index 18db0b46f7..4cb9a46f9a 100644
> --- a/testcases/kernel/syscalls/mmap/mmap08.c
> +++ b/testcases/kernel/syscalls/mmap/mmap08.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, mmap() calls fails with errno EBADF when a file mapping
> * is requested but the fd is not a valid file descriptor.
> */
> diff --git a/testcases/kernel/syscalls/mmap/mmap09.c b/testcases/kernel/syscalls/mmap/mmap09.c
> index 16634dc302..8c6b514ab8 100644
> --- a/testcases/kernel/syscalls/mmap/mmap09.c
> +++ b/testcases/kernel/syscalls/mmap/mmap09.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that truncating a mmaped file works correctly.
> *
> * Use ftruncate to:
> diff --git a/testcases/kernel/syscalls/mmap/mmap13.c b/testcases/kernel/syscalls/mmap/mmap13.c
> index 7298f5de53..34ac1a5329 100644
> --- a/testcases/kernel/syscalls/mmap/mmap13.c
> +++ b/testcases/kernel/syscalls/mmap/mmap13.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, mmap() call succeeds to create a file mapping with length
> * argument greater than the file size but any attempt to reference the
> * memory region which does not correspond to the file causes SIGBUS signal.
> diff --git a/testcases/kernel/syscalls/mmap/mmap14.c b/testcases/kernel/syscalls/mmap/mmap14.c
> index de35982f91..7bded88cc7 100644
> --- a/testcases/kernel/syscalls/mmap/mmap14.c
> +++ b/testcases/kernel/syscalls/mmap/mmap14.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify basic functionality of mmap(2) with MAP_LOCKED.
> *
> * mmap(2) should succeed returning the address of the mapped region,
> diff --git a/testcases/kernel/syscalls/mmap/mmap15.c b/testcases/kernel/syscalls/mmap/mmap15.c
> index 2128e0b57e..6681617a32 100644
> --- a/testcases/kernel/syscalls/mmap/mmap15.c
> +++ b/testcases/kernel/syscalls/mmap/mmap15.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, a normal page cannot be mapped into a high memory region,
> * and mmap() call fails with either ENOMEM or EINVAL errno.
> */
> diff --git a/testcases/kernel/syscalls/mmap/mmap16.c b/testcases/kernel/syscalls/mmap/mmap16.c
> index 6b1708dff9..2b8b36c5bc 100644
> --- a/testcases/kernel/syscalls/mmap/mmap16.c
> +++ b/testcases/kernel/syscalls/mmap/mmap16.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a regression test for a silent data corruption for a mmaped file
> * when filesystem gets out of space.
> *
> diff --git a/testcases/kernel/syscalls/mmap/mmap19.c b/testcases/kernel/syscalls/mmap/mmap19.c
> index 90b3f45b1f..e622539c32 100644
> --- a/testcases/kernel/syscalls/mmap/mmap19.c
> +++ b/testcases/kernel/syscalls/mmap/mmap19.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * If the kernel fails to correctly flush the TLB entry, the second mmap
> * will not show the correct data.
> *
> diff --git a/testcases/kernel/syscalls/mmap/mmap20.c b/testcases/kernel/syscalls/mmap/mmap20.c
> index 02d150e457..09dea8c41d 100644
> --- a/testcases/kernel/syscalls/mmap/mmap20.c
> +++ b/testcases/kernel/syscalls/mmap/mmap20.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test mmap(2) with MAP_SHARED_VALIDATE flag.
> *
> * Test expected EOPNOTSUPP errno when testing mmap(2) with MAP_SHARED_VALIDATE
> diff --git a/testcases/kernel/syscalls/mount/mount01.c b/testcases/kernel/syscalls/mount/mount01.c
> index 588e7c5673..a513e0fba7 100644
> --- a/testcases/kernel/syscalls/mount/mount01.c
> +++ b/testcases/kernel/syscalls/mount/mount01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test that checks mount() syscall works on multiple filesystems.
> */
>
> diff --git a/testcases/kernel/syscalls/mount/mount02.c b/testcases/kernel/syscalls/mount/mount02.c
> index ae3884f98c..734c93b77c 100644
> --- a/testcases/kernel/syscalls/mount/mount02.c
> +++ b/testcases/kernel/syscalls/mount/mount02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check for basic errors returned by mount(2) system call.
> *
> * - ENODEV if filesystem type not configured
> diff --git a/testcases/kernel/syscalls/mount/mount03.c b/testcases/kernel/syscalls/mount/mount03.c
> index c3202574fc..98be3dc0a6 100644
> --- a/testcases/kernel/syscalls/mount/mount03.c
> +++ b/testcases/kernel/syscalls/mount/mount03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check mount(2) system call with various flags.
> *
> * Verify that mount(2) syscall passes for each flag setting and validate
> diff --git a/testcases/kernel/syscalls/mount/mount04.c b/testcases/kernel/syscalls/mount/mount04.c
> index 5eb5ee11bf..fe0ceaef44 100644
> --- a/testcases/kernel/syscalls/mount/mount04.c
> +++ b/testcases/kernel/syscalls/mount/mount04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that mount(2) returns -1 and sets errno to EPERM if the user
> * is not root.
> */
> diff --git a/testcases/kernel/syscalls/mount/mount05.c b/testcases/kernel/syscalls/mount/mount05.c
> index 616eeee79d..66e102a322 100644
> --- a/testcases/kernel/syscalls/mount/mount05.c
> +++ b/testcases/kernel/syscalls/mount/mount05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for feature MS_BIND of mount, which performs a bind mount, making a file
> * or a directory subtree visible at another point within a file system.
> */
> diff --git a/testcases/kernel/syscalls/mount/mount06.c b/testcases/kernel/syscalls/mount/mount06.c
> index 05d6fdf868..1e06cd5808 100644
> --- a/testcases/kernel/syscalls/mount/mount06.c
> +++ b/testcases/kernel/syscalls/mount/mount06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for feature MS_MOVE of mount, which moves an existing mount point to
> * a new location.
> */
> diff --git a/testcases/kernel/syscalls/mount/mount07.c b/testcases/kernel/syscalls/mount/mount07.c
> index 8994d0f347..30fd308059 100644
> --- a/testcases/kernel/syscalls/mount/mount07.c
> +++ b/testcases/kernel/syscalls/mount/mount07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It is a basic test for MS_NOSYMFOLLOW mount option and is copied
> * from kernel selftests nosymfollow-test.c.
> *
> diff --git a/testcases/kernel/syscalls/mount_setattr/mount_setattr01.c b/testcases/kernel/syscalls/mount_setattr/mount_setattr01.c
> index e500df28e9..eb32cd91a7 100644
> --- a/testcases/kernel/syscalls/mount_setattr/mount_setattr01.c
> +++ b/testcases/kernel/syscalls/mount_setattr/mount_setattr01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic mount_setattr() test.
> * Test whether the basic mount attributes are set correctly.
> *
> diff --git a/testcases/kernel/syscalls/move_pages/move_pages04.c b/testcases/kernel/syscalls/move_pages/move_pages04.c
> index cde1f3120e..e1ee733f0d 100644
> --- a/testcases/kernel/syscalls/move_pages/move_pages04.c
> +++ b/testcases/kernel/syscalls/move_pages/move_pages04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that move_pages() properly reports failures when the memory area is
> * not valid, no page is mapped yet or the shared zero page is mapped.
> *
> diff --git a/testcases/kernel/syscalls/move_pages/move_pages12.c b/testcases/kernel/syscalls/move_pages/move_pages12.c
> index 78f17f99b0..879a89b6fd 100644
> --- a/testcases/kernel/syscalls/move_pages/move_pages12.c
> +++ b/testcases/kernel/syscalls/move_pages/move_pages12.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * *Test 1*
> *
> * This is a regression test for the race condition between move_pages()
> diff --git a/testcases/kernel/syscalls/mprotect/mprotect05.c b/testcases/kernel/syscalls/mprotect/mprotect05.c
> index 2b15f5bebb..cd6d81a0d6 100644
> --- a/testcases/kernel/syscalls/mprotect/mprotect05.c
> +++ b/testcases/kernel/syscalls/mprotect/mprotect05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the mprotect(2) system call split and merge.
> *
> * https://bugzilla.kernel.org/show_bug.cgi?id=217061
> diff --git a/testcases/kernel/syscalls/mq_notify/mq_notify02.c b/testcases/kernel/syscalls/mq_notify/mq_notify02.c
> index d979a4e9d7..5192494324 100644
> --- a/testcases/kernel/syscalls/mq_notify/mq_notify02.c
> +++ b/testcases/kernel/syscalls/mq_notify/mq_notify02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that mq_notify() fails with EINVAL when invalid input
> * arguments are given.
> */
> diff --git a/testcases/kernel/syscalls/mq_notify/mq_notify03.c b/testcases/kernel/syscalls/mq_notify/mq_notify03.c
> index bf6898cd80..30e94ab14d 100644
> --- a/testcases/kernel/syscalls/mq_notify/mq_notify03.c
> +++ b/testcases/kernel/syscalls/mq_notify/mq_notify03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for NULL pointer dereference in mq_notify(CVE-2021-38604)
> *
> * References links:
> diff --git a/testcases/kernel/syscalls/mremap/mremap06.c b/testcases/kernel/syscalls/mremap/mremap06.c
> index d18da199b6..5820ad75fd 100644
> --- a/testcases/kernel/syscalls/mremap/mremap06.c
> +++ b/testcases/kernel/syscalls/mremap/mremap06.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Bug reproducer for 7e7757876f25 ("mm/mremap: fix vm_pgoff in vma_merge() case 3")
> */
>
> diff --git a/testcases/kernel/syscalls/mseal/mseal01.c b/testcases/kernel/syscalls/mseal/mseal01.c
> index 00454a766f..1b3e4c94a0 100644
> --- a/testcases/kernel/syscalls/mseal/mseal01.c
> +++ b/testcases/kernel/syscalls/mseal/mseal01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a smoke test that verifies if mseal() protects specific VMA portions
> * of a process. According to documentation, the syscall should protect memory
> * from the following actions:
> diff --git a/testcases/kernel/syscalls/mseal/mseal02.c b/testcases/kernel/syscalls/mseal/mseal02.c
> index 62eeb25b21..e11d7dbf40 100644
> --- a/testcases/kernel/syscalls/mseal/mseal02.c
> +++ b/testcases/kernel/syscalls/mseal/mseal02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check various errnos for mseal(2).
> *
> * - mseal() fails with EINVAL if flags is invalid.
> diff --git a/testcases/kernel/syscalls/msync/msync04.c b/testcases/kernel/syscalls/msync/msync04.c
> index 1af781a978..781a49ddb0 100644
> --- a/testcases/kernel/syscalls/msync/msync04.c
> +++ b/testcases/kernel/syscalls/msync/msync04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify msync() after writing into mmap()-ed file works.
> *
> * Write to mapped region and sync the memory back with file. Check the page
> diff --git a/testcases/kernel/syscalls/munlock/munlock01.c b/testcases/kernel/syscalls/munlock/munlock01.c
> index 65a49d7ee3..1ffa8c0a83 100644
> --- a/testcases/kernel/syscalls/munlock/munlock01.c
> +++ b/testcases/kernel/syscalls/munlock/munlock01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test munlock with various valid addresses and lengths.
> */
>
> diff --git a/testcases/kernel/syscalls/munlock/munlock02.c b/testcases/kernel/syscalls/munlock/munlock02.c
> index 55e313c95f..3380ab9bee 100644
> --- a/testcases/kernel/syscalls/munlock/munlock02.c
> +++ b/testcases/kernel/syscalls/munlock/munlock02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for ENOMEM error.
> *
> * munlock(2) fails with ENOMEM if some of the specified address range
> diff --git a/testcases/kernel/syscalls/munlockall/munlockall01.c b/testcases/kernel/syscalls/munlockall/munlockall01.c
> index 86469107e7..6ec028d2e9 100644
> --- a/testcases/kernel/syscalls/munlockall/munlockall01.c
> +++ b/testcases/kernel/syscalls/munlockall/munlockall01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that munlockall(2) unlocks all previously locked memory.
> */
>
> diff --git a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
> index 6535fdf5c0..db6951e1a0 100644
> --- a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
> +++ b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic name_to_handle_at() tests.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
> index afd9cd0662..53e26f2ace 100644
> --- a/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
> +++ b/testcases/kernel/syscalls/name_to_handle_at/name_to_handle_at02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Failure tests for name_to_handle_at().
> */
>
> diff --git a/testcases/kernel/syscalls/nanosleep/nanosleep01.c b/testcases/kernel/syscalls/nanosleep/nanosleep01.c
> index bd9ae0caa6..d3c29db9f4 100644
> --- a/testcases/kernel/syscalls/nanosleep/nanosleep01.c
> +++ b/testcases/kernel/syscalls/nanosleep/nanosleep01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that nanosleep() should return with value 0 and the process should be
> * suspended for time specified by timespec structure.
> */
> diff --git a/testcases/kernel/syscalls/nanosleep/nanosleep04.c b/testcases/kernel/syscalls/nanosleep/nanosleep04.c
> index 3582a3fb23..9308621b40 100644
> --- a/testcases/kernel/syscalls/nanosleep/nanosleep04.c
> +++ b/testcases/kernel/syscalls/nanosleep/nanosleep04.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that nanosleep() returns -1 and sets errno to EINVAL when failing to suspend the
> * execution of a process if the specified pause time is invalid.
> */
> diff --git a/testcases/kernel/syscalls/nice/nice01.c b/testcases/kernel/syscalls/nice/nice01.c
> index bc58ad14c7..94f25f3bb4 100644
> --- a/testcases/kernel/syscalls/nice/nice01.c
> +++ b/testcases/kernel/syscalls/nice/nice01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that root can provide a negative value to nice() system call and hence
> * root can decrease the nice value of the process using nice().
> */
> diff --git a/testcases/kernel/syscalls/nice/nice02.c b/testcases/kernel/syscalls/nice/nice02.c
> index b08e1d751e..0196169006 100644
> --- a/testcases/kernel/syscalls/nice/nice02.c
> +++ b/testcases/kernel/syscalls/nice/nice02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that any user can successfully increase the nice value of
> * the process by passing a higher increment value (> max. applicable limits)
> * to nice() system call.
> diff --git a/testcases/kernel/syscalls/nice/nice03.c b/testcases/kernel/syscalls/nice/nice03.c
> index 061592e6c3..7f642e0b97 100644
> --- a/testcases/kernel/syscalls/nice/nice03.c
> +++ b/testcases/kernel/syscalls/nice/nice03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that any user can successfully increase the nice value of
> * the process by passing an increment value (< max. applicable limits) to
> * nice() system call.
> diff --git a/testcases/kernel/syscalls/nice/nice04.c b/testcases/kernel/syscalls/nice/nice04.c
> index ac156008e5..052eed8d7e 100644
> --- a/testcases/kernel/syscalls/nice/nice04.c
> +++ b/testcases/kernel/syscalls/nice/nice04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, nice(2) fails when, a non-root user attempts to increase
> * the priority of a process by specifying a negative increment value.
> */
> diff --git a/testcases/kernel/syscalls/nice/nice05.c b/testcases/kernel/syscalls/nice/nice05.c
> index 2701713171..b4d8965575 100644
> --- a/testcases/kernel/syscalls/nice/nice05.c
> +++ b/testcases/kernel/syscalls/nice/nice05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * 1. Create a high nice thread and a low nice thread, the main
> * thread wake them at the same time
> * 2. Both threads run on the same CPU
> diff --git a/testcases/kernel/syscalls/open/open02.c b/testcases/kernel/syscalls/open/open02.c
> index 3c9cc7e171..72f02d9495 100644
> --- a/testcases/kernel/syscalls/open/open02.c
> +++ b/testcases/kernel/syscalls/open/open02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * 1. open a new file without O_CREAT, ENOENT should be returned.
> * 2. open a file with O_RDONLY | O_NOATIME and the caller was not
> * privileged, EPERM should be returned.
> diff --git a/testcases/kernel/syscalls/open/open03.c b/testcases/kernel/syscalls/open/open03.c
> index 5521dfef26..275ca84f09 100644
> --- a/testcases/kernel/syscalls/open/open03.c
> +++ b/testcases/kernel/syscalls/open/open03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check open() with O_RDWR | O_CREAT.
> */
>
> diff --git a/testcases/kernel/syscalls/open/open04.c b/testcases/kernel/syscalls/open/open04.c
> index 24ef52a29a..3dc3486d3b 100644
> --- a/testcases/kernel/syscalls/open/open04.c
> +++ b/testcases/kernel/syscalls/open/open04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that open(2) fails with EMFILE when per-process limit on the number
> * of open file descriptors has been reached.
> */
> diff --git a/testcases/kernel/syscalls/open/open06.c b/testcases/kernel/syscalls/open/open06.c
> index e167c2b6b9..7b5bd62495 100644
> --- a/testcases/kernel/syscalls/open/open06.c
> +++ b/testcases/kernel/syscalls/open/open06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that open(2) fails with ENXIO when
> * O_NONBLOCK | O_WRONLY is set, the named file is a FIFO,
> * and no process has the FIFO open for reading.
> diff --git a/testcases/kernel/syscalls/open/open07.c b/testcases/kernel/syscalls/open/open07.c
> index 0c53798e37..a03d751178 100644
> --- a/testcases/kernel/syscalls/open/open07.c
> +++ b/testcases/kernel/syscalls/open/open07.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test functionality and error conditions of open(O_NOFOLLOW) system call.
> */
>
> diff --git a/testcases/kernel/syscalls/open/open08.c b/testcases/kernel/syscalls/open/open08.c
> index 0af455b556..ad868b0ecc 100644
> --- a/testcases/kernel/syscalls/open/open08.c
> +++ b/testcases/kernel/syscalls/open/open08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that open() fails with:
> *
> * - EEXIST when pathname already exists and O_CREAT and O_EXCL were used
> diff --git a/testcases/kernel/syscalls/open/open09.c b/testcases/kernel/syscalls/open/open09.c
> index 0e89a87f85..36158b3c1d 100644
> --- a/testcases/kernel/syscalls/open/open09.c
> +++ b/testcases/kernel/syscalls/open/open09.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that a file opened with O_RDONLY can't be writable
> * and it verifies that a file opened with O_WRONLY can't be readable.
> */
> diff --git a/testcases/kernel/syscalls/open/open10.c b/testcases/kernel/syscalls/open/open10.c
> index 916357158a..5e27a75dd9 100644
> --- a/testcases/kernel/syscalls/open/open10.c
> +++ b/testcases/kernel/syscalls/open/open10.c
> @@ -4,8 +4,6 @@
> * Copyright (c) 2021 SUSE LLC <mdoucha@suse.cz>
> */
> /*\
> - * [Description]
> - *
> * Verify that the group ID and setgid bit are set correctly when a new file
> * is created.
> */
> diff --git a/testcases/kernel/syscalls/open/open11.c b/testcases/kernel/syscalls/open/open11.c
> index 3431efc2ca..6f89d558dc 100644
> --- a/testcases/kernel/syscalls/open/open11.c
> +++ b/testcases/kernel/syscalls/open/open11.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic tests for open(2) and make sure open(2) works and handles error
> * conditions correctly.
> *
> diff --git a/testcases/kernel/syscalls/open/open15.c b/testcases/kernel/syscalls/open/open15.c
> index 4fa243e94e..4917937adf 100644
> --- a/testcases/kernel/syscalls/open/open15.c
> +++ b/testcases/kernel/syscalls/open/open15.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that open() is working correctly on symlink()
> * generated files. We generate a file via symlink, then we read both from file
> * and symlink, comparing that data has been correctly written.
> diff --git a/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at01.c b/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at01.c
> index 6171229f0b..29a0d83c38 100644
> --- a/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at01.c
> +++ b/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic open_by_handle_at() tests.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at02.c b/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at02.c
> index a505deeb10..b445f1adc0 100644
> --- a/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at02.c
> +++ b/testcases/kernel/syscalls/open_by_handle_at/open_by_handle_at02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Failure tests for open_by_handle_at().
> */
> #define _GNU_SOURCE
> diff --git a/testcases/kernel/syscalls/openat/openat01.c b/testcases/kernel/syscalls/openat/openat01.c
> index ad400b47fa..2e63bc2b9d 100644
> --- a/testcases/kernel/syscalls/openat/openat01.c
> +++ b/testcases/kernel/syscalls/openat/openat01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test case will verify basic function of openat.
> *
> * - pathname is relative, then it is interpreted relative to the directory
> diff --git a/testcases/kernel/syscalls/openat/openat04.c b/testcases/kernel/syscalls/openat/openat04.c
> index df5956cd84..d3f840ec4b 100644
> --- a/testcases/kernel/syscalls/openat/openat04.c
> +++ b/testcases/kernel/syscalls/openat/openat04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check setgid strip logic whether works correctly when creating tmpfile under
> * filesystem without POSIX ACL supported(by using noacl mount option). Test it
> * with umask S_IXGRP and also check file mode whether has filtered S_IXGRP.
> diff --git a/testcases/kernel/syscalls/pathconf/pathconf01.c b/testcases/kernel/syscalls/pathconf/pathconf01.c
> index 280709a910..5af45e4176 100644
> --- a/testcases/kernel/syscalls/pathconf/pathconf01.c
> +++ b/testcases/kernel/syscalls/pathconf/pathconf01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the pathconf(2) system call.
> */
>
> diff --git a/testcases/kernel/syscalls/pathconf/pathconf02.c b/testcases/kernel/syscalls/pathconf/pathconf02.c
> index a7af980ec6..8c4bf578fa 100644
> --- a/testcases/kernel/syscalls/pathconf/pathconf02.c
> +++ b/testcases/kernel/syscalls/pathconf/pathconf02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that,
> *
> * - pathconf() fails with ENOTDIR if a component used as a directory
> diff --git a/testcases/kernel/syscalls/personality/personality01.c b/testcases/kernel/syscalls/personality/personality01.c
> index 47fb66256a..05a0e17f89 100644
> --- a/testcases/kernel/syscalls/personality/personality01.c
> +++ b/testcases/kernel/syscalls/personality/personality01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tries to set different personalities.
> *
> * We set the personality in a child process since it's not guaranteed that we
> diff --git a/testcases/kernel/syscalls/personality/personality02.c b/testcases/kernel/syscalls/personality/personality02.c
> index e080284f49..7c718dba35 100644
> --- a/testcases/kernel/syscalls/personality/personality02.c
> +++ b/testcases/kernel/syscalls/personality/personality02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test checks if select() timeout is not updated when personality with
> * STICKY_TIMEOUTS is used.
> */
> diff --git a/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c b/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c
> index 60cf6702d1..57e96405cd 100644
> --- a/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c
> +++ b/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic pidfd_getfd() test:
> *
> * - the close-on-exec flag is set on the file descriptor returned by
> diff --git a/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c b/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c
> index 3431a0930e..a1ede7a929 100644
> --- a/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c
> +++ b/testcases/kernel/syscalls/pidfd_getfd/pidfd_getfd02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the pidfd_open syscall.
> *
> * - EBADF pidfd is not a valid PID file descriptor
> diff --git a/testcases/kernel/syscalls/pidfd_open/pidfd_open01.c b/testcases/kernel/syscalls/pidfd_open/pidfd_open01.c
> index ce07e6717a..a07259d173 100644
> --- a/testcases/kernel/syscalls/pidfd_open/pidfd_open01.c
> +++ b/testcases/kernel/syscalls/pidfd_open/pidfd_open01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic pidfd_open() test:
> *
> * - Fetch the PID of the current process and try to get its file descriptor.
> diff --git a/testcases/kernel/syscalls/pidfd_open/pidfd_open02.c b/testcases/kernel/syscalls/pidfd_open/pidfd_open02.c
> index 9d6c9321dd..9c382260fb 100644
> --- a/testcases/kernel/syscalls/pidfd_open/pidfd_open02.c
> +++ b/testcases/kernel/syscalls/pidfd_open/pidfd_open02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the pidfd_open syscall.
> *
> * - ESRCH the process specified by pid does not exist
> diff --git a/testcases/kernel/syscalls/pidfd_open/pidfd_open03.c b/testcases/kernel/syscalls/pidfd_open/pidfd_open03.c
> index 16a8442f59..2a09de00c7 100644
> --- a/testcases/kernel/syscalls/pidfd_open/pidfd_open03.c
> +++ b/testcases/kernel/syscalls/pidfd_open/pidfd_open03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This program opens the PID file descriptor of the child process created with
> * fork(). It then uses poll to monitor the file descriptor for process exit, as
> * indicated by an EPOLLIN event.
> diff --git a/testcases/kernel/syscalls/pidfd_open/pidfd_open04.c b/testcases/kernel/syscalls/pidfd_open/pidfd_open04.c
> index 0e8ab69562..7e106ab5ed 100644
> --- a/testcases/kernel/syscalls/pidfd_open/pidfd_open04.c
> +++ b/testcases/kernel/syscalls/pidfd_open/pidfd_open04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the PIDFD_NONBLOCK flag works with pidfd_open() and
> * that waitid() with a non-blocking pidfd returns EAGAIN.
> */
> diff --git a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c
> index 4715850258..ab2990dbfc 100644
> --- a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c
> +++ b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests if the pidfd_send_signal syscall behaves
> * like rt_sigqueueinfo when a pointer to a siginfo_t
> * struct is passed.
> diff --git a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c
> index a3bf994f92..31e8a1129b 100644
> --- a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c
> +++ b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the pidfd_send_signal
> * system call.
> *
> diff --git a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c
> index 20d96b1182..e1b1372746 100644
> --- a/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c
> +++ b/testcases/kernel/syscalls/pidfd_send_signal/pidfd_send_signal03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test checks if the pidfd_send_signal syscall wrongfully sends
> * a signal to a new process which inherited the PID of the actual
> * target process.
> diff --git a/testcases/kernel/syscalls/pipe/pipe03.c b/testcases/kernel/syscalls/pipe/pipe03.c
> index d20867b2bf..50f49b8e1e 100644
> --- a/testcases/kernel/syscalls/pipe/pipe03.c
> +++ b/testcases/kernel/syscalls/pipe/pipe03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, an attempt to write to the read end of a pipe fails with EBADF
> * and an attempt to read from the write end of a pipe also fails with EBADF.
> */
> diff --git a/testcases/kernel/syscalls/pipe/pipe06.c b/testcases/kernel/syscalls/pipe/pipe06.c
> index 0c6bc03bd6..29dbbdbd78 100644
> --- a/testcases/kernel/syscalls/pipe/pipe06.c
> +++ b/testcases/kernel/syscalls/pipe/pipe06.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, pipe(2) syscall fails with errno EMFILE when
> * limit on the number of open file descriptors has been reached.
> */
> diff --git a/testcases/kernel/syscalls/pipe/pipe07.c b/testcases/kernel/syscalls/pipe/pipe07.c
> index 8098007c29..d179020217 100644
> --- a/testcases/kernel/syscalls/pipe/pipe07.c
> +++ b/testcases/kernel/syscalls/pipe/pipe07.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, pipe(2) syscall can open the maximum number of
> * file descriptors permitted.
> */
> diff --git a/testcases/kernel/syscalls/pipe/pipe08.c b/testcases/kernel/syscalls/pipe/pipe08.c
> index 28088cf618..f86774d5ec 100644
> --- a/testcases/kernel/syscalls/pipe/pipe08.c
> +++ b/testcases/kernel/syscalls/pipe/pipe08.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, on any attempt to write to a pipe which is closed for
> * reading will generate a SIGPIPE signal and write will fail with
> * EPIPE errno.
> diff --git a/testcases/kernel/syscalls/pipe/pipe10.c b/testcases/kernel/syscalls/pipe/pipe10.c
> index 018e653daf..30cd983b26 100644
> --- a/testcases/kernel/syscalls/pipe/pipe10.c
> +++ b/testcases/kernel/syscalls/pipe/pipe10.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, when a parent process opens a pipe, a child process can
> * read from it.
> */
> diff --git a/testcases/kernel/syscalls/pipe/pipe14.c b/testcases/kernel/syscalls/pipe/pipe14.c
> index 2d2969d820..66d94cffaf 100644
> --- a/testcases/kernel/syscalls/pipe/pipe14.c
> +++ b/testcases/kernel/syscalls/pipe/pipe14.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, if the write end of a pipe is closed, then a process reading
> * from the pipe will see end-of-file (i.e., read() returns 0) once it has
> * read all remaining data in the pipe.
> diff --git a/testcases/kernel/syscalls/pipe/pipe15.c b/testcases/kernel/syscalls/pipe/pipe15.c
> index ebdb195b36..94b0cb1010 100644
> --- a/testcases/kernel/syscalls/pipe/pipe15.c
> +++ b/testcases/kernel/syscalls/pipe/pipe15.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a regression test for hangup on pipe operations. See
> * https://www.spinics.net/lists/linux-api/msg49762.html for
> * additional context. It tests that pipe operations do not block
> diff --git a/testcases/kernel/syscalls/pkeys/pkey01.c b/testcases/kernel/syscalls/pkeys/pkey01.c
> index 444799670e..8cbe2d6b5a 100644
> --- a/testcases/kernel/syscalls/pkeys/pkey01.c
> +++ b/testcases/kernel/syscalls/pkeys/pkey01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Memory Protection Keys for Userspace (PKU aka PKEYs) is a Skylake-SP
> * server feature that provides a mechanism for enforcing page-based
> * protections, but without requiring modification of the page tables
> diff --git a/testcases/kernel/syscalls/prctl/prctl01.c b/testcases/kernel/syscalls/prctl/prctl01.c
> index 939ca38c09..ca3f39a6b1 100644
> --- a/testcases/kernel/syscalls/prctl/prctl01.c
> +++ b/testcases/kernel/syscalls/prctl/prctl01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for PR_SET_PDEATHSIG/PR_GET_PDEATHSIG
> *
> * Use PR_SET_PDEATHSIG to set SIGUSR2 signal and PR_GET_PDEATHSIG should
> diff --git a/testcases/kernel/syscalls/prctl/prctl02.c b/testcases/kernel/syscalls/prctl/prctl02.c
> index 1cd33f88ca..8d865fb067 100644
> --- a/testcases/kernel/syscalls/prctl/prctl02.c
> +++ b/testcases/kernel/syscalls/prctl/prctl02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * - EINVAL when an invalid value is given for option
> * - EINVAL when option is PR_SET_PDEATHSIG & arg2 is not zero or a valid
> * signal number
> diff --git a/testcases/kernel/syscalls/prctl/prctl03.c b/testcases/kernel/syscalls/prctl/prctl03.c
> index bac918e890..cd70c39a43 100644
> --- a/testcases/kernel/syscalls/prctl/prctl03.c
> +++ b/testcases/kernel/syscalls/prctl/prctl03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test PR_SET_CHILD_SUBREAPER and PR_GET_CHILD_SUBREAPER of prctl(2).
> *
> * - If PR_SET_CHILD_SUBREAPER marks a process as a child subreaper, it
> diff --git a/testcases/kernel/syscalls/prctl/prctl05.c b/testcases/kernel/syscalls/prctl/prctl05.c
> index dd596630e5..a014ba89e9 100644
> --- a/testcases/kernel/syscalls/prctl/prctl05.c
> +++ b/testcases/kernel/syscalls/prctl/prctl05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test PR_GET_NAME and PR_SET_NAME of prctl(2).
> *
> * - Set the name of the calling thread, the name can be up to 16 bytes
> diff --git a/testcases/kernel/syscalls/prctl/prctl06.c b/testcases/kernel/syscalls/prctl/prctl06.c
> index a9b35b2464..087b2935ee 100644
> --- a/testcases/kernel/syscalls/prctl/prctl06.c
> +++ b/testcases/kernel/syscalls/prctl/prctl06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test PR_GET_NO_NEW_PRIVS and PR_SET_NO_NEW_PRIVS of prctl(2).
> *
> * - Return the value of the no_new_privs bit for the calling thread.
> diff --git a/testcases/kernel/syscalls/prctl/prctl07.c b/testcases/kernel/syscalls/prctl/prctl07.c
> index dd1d2c0641..e7f3f94815 100644
> --- a/testcases/kernel/syscalls/prctl/prctl07.c
> +++ b/testcases/kernel/syscalls/prctl/prctl07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test the PR_CAP_AMBIENT of prctl(2).
> *
> * Reads or changes the ambient capability set of the calling thread,
> diff --git a/testcases/kernel/syscalls/prctl/prctl08.c b/testcases/kernel/syscalls/prctl/prctl08.c
> index f090623b21..8c27df3894 100644
> --- a/testcases/kernel/syscalls/prctl/prctl08.c
> +++ b/testcases/kernel/syscalls/prctl/prctl08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test PR_GET_TIMERSLACK and PR_SET_TIMERSLACK of prctl(2).
> *
> * - Each thread has two associated timer slack values: a "default"
> diff --git a/testcases/kernel/syscalls/prctl/prctl09.c b/testcases/kernel/syscalls/prctl/prctl09.c
> index c0696fcd81..5c962318f7 100644
> --- a/testcases/kernel/syscalls/prctl/prctl09.c
> +++ b/testcases/kernel/syscalls/prctl/prctl09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is a timer sample test that timer slack is 200us.
> */
>
> diff --git a/testcases/kernel/syscalls/prctl/prctl10.c b/testcases/kernel/syscalls/prctl/prctl10.c
> index b77268c02a..d7868f13ae 100644
> --- a/testcases/kernel/syscalls/prctl/prctl10.c
> +++ b/testcases/kernel/syscalls/prctl/prctl10.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test to test behaviour of PR_GET_TSC and PR_SET_TSC.
> *
> * Set the state of the flag determining whether the timestamp counter can
> diff --git a/testcases/kernel/syscalls/pread/pread01.c b/testcases/kernel/syscalls/pread/pread01.c
> index d11ca58f83..36a93a3f99 100644
> --- a/testcases/kernel/syscalls/pread/pread01.c
> +++ b/testcases/kernel/syscalls/pread/pread01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the functionality of pread() by writing known data using pwrite()
> * to the file at various specified offsets and later read from the file from
> * various specified offsets, comparing the data read against the data written.
> diff --git a/testcases/kernel/syscalls/pread/pread02.c b/testcases/kernel/syscalls/pread/pread02.c
> index 04c7d0371a..d38daa4c87 100644
> --- a/testcases/kernel/syscalls/pread/pread02.c
> +++ b/testcases/kernel/syscalls/pread/pread02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the pread syscall.
> *
> * - ESPIPE when attempted to read from an unnamed pipe
> diff --git a/testcases/kernel/syscalls/preadv/preadv01.c b/testcases/kernel/syscalls/preadv/preadv01.c
> index d5e5bd95f1..68e8d28c39 100644
> --- a/testcases/kernel/syscalls/preadv/preadv01.c
> +++ b/testcases/kernel/syscalls/preadv/preadv01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the basic functionality of the preadv(2).
> *
> * Preadv(2) should succeed to read the expected content of data
> diff --git a/testcases/kernel/syscalls/preadv/preadv02.c b/testcases/kernel/syscalls/preadv/preadv02.c
> index 19b194314b..0dc16f4a84 100644
> --- a/testcases/kernel/syscalls/preadv/preadv02.c
> +++ b/testcases/kernel/syscalls/preadv/preadv02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * - EINVAL when iov_len is invalid.
> * - EINVAL when the vector count iovcnt is less than zero.
> * - EINVAL when offset is negative.
> diff --git a/testcases/kernel/syscalls/preadv/preadv03.c b/testcases/kernel/syscalls/preadv/preadv03.c
> index 997e7a07c2..b6ec0a6080 100644
> --- a/testcases/kernel/syscalls/preadv/preadv03.c
> +++ b/testcases/kernel/syscalls/preadv/preadv03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the preadv(2) for the file
> * opened with O_DIRECT in all filesystem.
> *
> diff --git a/testcases/kernel/syscalls/preadv2/preadv201.c b/testcases/kernel/syscalls/preadv2/preadv201.c
> index 32ed7862a2..6065112833 100644
> --- a/testcases/kernel/syscalls/preadv2/preadv201.c
> +++ b/testcases/kernel/syscalls/preadv2/preadv201.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the basic functionality of the preadv2(2):
> *
> * 1. If the file offset argument is not -1, preadv2() should succeed
> diff --git a/testcases/kernel/syscalls/preadv2/preadv202.c b/testcases/kernel/syscalls/preadv2/preadv202.c
> index f7279e0adf..c0e3f13a50 100644
> --- a/testcases/kernel/syscalls/preadv2/preadv202.c
> +++ b/testcases/kernel/syscalls/preadv2/preadv202.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, preadv2(2) fails and sets errno to
> *
> * 1. EINVAL if iov_len is invalid.
> diff --git a/testcases/kernel/syscalls/process_madvise/process_madvise01.c b/testcases/kernel/syscalls/process_madvise/process_madvise01.c
> index ca314c4da4..14ab1d8332 100644
> --- a/testcases/kernel/syscalls/process_madvise/process_madvise01.c
> +++ b/testcases/kernel/syscalls/process_madvise/process_madvise01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Allocate anonymous memory pages inside child and reclaim it with
> * MADV_PAGEOUT. Then check if memory pages have been swapped out by looking
> * at smaps information.
> diff --git a/testcases/kernel/syscalls/pselect/pselect02.c b/testcases/kernel/syscalls/pselect/pselect02.c
> index 391a31bb17..e5396077d8 100644
> --- a/testcases/kernel/syscalls/pselect/pselect02.c
> +++ b/testcases/kernel/syscalls/pselect/pselect02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that pselect() fails with:
> *
> * - EBADF if a file descriptor that was already closed
> diff --git a/testcases/kernel/syscalls/ptrace/ptrace05.c b/testcases/kernel/syscalls/ptrace/ptrace05.c
> index 276faa77be..a44eb417c8 100644
> --- a/testcases/kernel/syscalls/ptrace/ptrace05.c
> +++ b/testcases/kernel/syscalls/ptrace/ptrace05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test ptraces itself as per arbitrarily specified signals,
> * over 0 to SIGRTMAX range.
> */
> diff --git a/testcases/kernel/syscalls/ptrace/ptrace06.c b/testcases/kernel/syscalls/ptrace/ptrace06.c
> index fa3f07fa10..573a957992 100644
> --- a/testcases/kernel/syscalls/ptrace/ptrace06.c
> +++ b/testcases/kernel/syscalls/ptrace/ptrace06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check out-of-bound/unaligned addresses given to
> *
> * - {PEEK,POKE}{DATA,TEXT,USER}
> diff --git a/testcases/kernel/syscalls/ptrace/ptrace11.c b/testcases/kernel/syscalls/ptrace/ptrace11.c
> index 90154852f8..7f08aa996a 100644
> --- a/testcases/kernel/syscalls/ptrace/ptrace11.c
> +++ b/testcases/kernel/syscalls/ptrace/ptrace11.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Before kernel 2.6.26 we could not trace init(1) process and ptrace() would
> * fail with EPERM. This case just checks whether we can trace init(1) process
> * successfully.
> diff --git a/testcases/kernel/syscalls/pwrite/pwrite01.c b/testcases/kernel/syscalls/pwrite/pwrite01.c
> index 8f7ad2fb84..0c3689ce0e 100644
> --- a/testcases/kernel/syscalls/pwrite/pwrite01.c
> +++ b/testcases/kernel/syscalls/pwrite/pwrite01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the functionality of pwrite() by writing known data using pwrite()
> * to the file at various specified offsets and later read from the file from
> * various specified offsets, comparing the data written aganist the data
> diff --git a/testcases/kernel/syscalls/pwrite/pwrite02.c b/testcases/kernel/syscalls/pwrite/pwrite02.c
> index 9a40eddc87..d9ffac4886 100644
> --- a/testcases/kernel/syscalls/pwrite/pwrite02.c
> +++ b/testcases/kernel/syscalls/pwrite/pwrite02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test basic error handling of the pwrite syscall.
> *
> * - ESPIPE when attempted to write to an unnamed pipe
> diff --git a/testcases/kernel/syscalls/pwrite/pwrite03.c b/testcases/kernel/syscalls/pwrite/pwrite03.c
> index ae572c1e9e..406c59d2c6 100644
> --- a/testcases/kernel/syscalls/pwrite/pwrite03.c
> +++ b/testcases/kernel/syscalls/pwrite/pwrite03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests for a special case NULL buffer with size 0 is expected to return 0.
> */
>
> diff --git a/testcases/kernel/syscalls/pwrite/pwrite04.c b/testcases/kernel/syscalls/pwrite/pwrite04.c
> index 859955394b..c22e444f7d 100644
> --- a/testcases/kernel/syscalls/pwrite/pwrite04.c
> +++ b/testcases/kernel/syscalls/pwrite/pwrite04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test the pwrite() system call with O_APPEND.
> *
> * Writing 2k data to the file, close it and reopen it with O_APPEND.
> diff --git a/testcases/kernel/syscalls/pwritev/pwritev01.c b/testcases/kernel/syscalls/pwritev/pwritev01.c
> index 1a4f672bf9..0aa5cb47a2 100644
> --- a/testcases/kernel/syscalls/pwritev/pwritev01.c
> +++ b/testcases/kernel/syscalls/pwritev/pwritev01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the basic functionality of the pwritev(2).
> *
> * pwritev(2) should succeed to write the expected content of data
> diff --git a/testcases/kernel/syscalls/pwritev/pwritev02.c b/testcases/kernel/syscalls/pwritev/pwritev02.c
> index 25eb242f53..b1ba423505 100644
> --- a/testcases/kernel/syscalls/pwritev/pwritev02.c
> +++ b/testcases/kernel/syscalls/pwritev/pwritev02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * - EINVAL when iov_len is invalid.
> * - EINVAL when the vector count iovcnt is less than zero.
> * - EINVAL when offset is negative.
> diff --git a/testcases/kernel/syscalls/pwritev/pwritev03.c b/testcases/kernel/syscalls/pwritev/pwritev03.c
> index 81ccee9be2..2655697dd4 100644
> --- a/testcases/kernel/syscalls/pwritev/pwritev03.c
> +++ b/testcases/kernel/syscalls/pwritev/pwritev03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the pwritev(2) for the file
> * opened with O_DIRECT in all filesystem.
> *
> diff --git a/testcases/kernel/syscalls/pwritev2/pwritev201.c b/testcases/kernel/syscalls/pwritev2/pwritev201.c
> index ae9047cdd7..b74bf9186a 100644
> --- a/testcases/kernel/syscalls/pwritev2/pwritev201.c
> +++ b/testcases/kernel/syscalls/pwritev2/pwritev201.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the basic functionality of the pwritev2(2).
> *
> * - If the file offset argument is not -1, pwritev2() should succeed
> diff --git a/testcases/kernel/syscalls/pwritev2/pwritev202.c b/testcases/kernel/syscalls/pwritev2/pwritev202.c
> index e4d80070d2..b17d840676 100644
> --- a/testcases/kernel/syscalls/pwritev2/pwritev202.c
> +++ b/testcases/kernel/syscalls/pwritev2/pwritev202.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check various errnos for pwritev2(2).
> *
> * - pwritev2() fails and sets errno to EINVAL if iov_len is invalid.
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl01.c b/testcases/kernel/syscalls/quotactl/quotactl01.c
> index 7b7fb63604..9dcf74ceb2 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl01.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl01.c
> @@ -7,7 +7,6 @@
> */
>
> /*\
> - * [Description]
> * This testcases checks that quotactl(2) on ext4 filesystem succeeds to:
> *
> * - turn on quota with Q_QUOTAON flag for user
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl02.c b/testcases/kernel/syscalls/quotactl/quotactl02.c
> index f837165568..d6f54708b3 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl02.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This testcases checks that quotactl(2) on xfs filesystem succeeds to:
> *
> * - turn off xfs quota and get xfs quota off status for user
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl03.c b/testcases/kernel/syscalls/quotactl/quotactl03.c
> index 78d9a5458e..3ee15289c6 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl03.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * quotactl(2) with XGETNEXTQUOTA looks for the next active quota for an user
> * equal or higher to a given ID, in this test the ID is specified to a value
> * close to UINT_MAX(max value of unsigned int). When reaching the upper limit
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl04.c b/testcases/kernel/syscalls/quotactl/quotactl04.c
> index 91f15eb5dd..d2d7b3f3e4 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl04.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This testcase checks that quotactl(2) on ext4 filesystem succeeds to:
> *
> * - turn on quota with Q_QUOTAON flag for project
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl05.c b/testcases/kernel/syscalls/quotactl/quotactl05.c
> index d19c729f85..e9f99d96f3 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl05.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This testcases checks that quotactl(2) on xfs filesystem succeeds to:
> *
> * - turn off xfs quota and get xfs quota off status for project
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl06.c b/testcases/kernel/syscalls/quotactl/quotactl06.c
> index 86b0d95d2e..110a3aa9bf 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl06.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the quotactl syscall with visible quota files
> * (cover two formats, vfsv0 and vfsv1):
> *
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl07.c b/testcases/kernel/syscalls/quotactl/quotactl07.c
> index c6e44b0a71..66505a308f 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl07.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This is not only a functional test but also a error test for Q_XQUOTARM.
> *
> * It is a regresstion test for kernel commit 3dd4d40b4208
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl08.c b/testcases/kernel/syscalls/quotactl/quotactl08.c
> index 85a2f47316..63087345fe 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl08.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl08.c
> @@ -5,7 +5,6 @@
> */
>
> /*\
> - * [Description]
> * This testcases checks that quotactl(2) on ext4 filesystem succeeds to:
> *
> * - turn on quota with Q_QUOTAON flag for user
> diff --git a/testcases/kernel/syscalls/quotactl/quotactl09.c b/testcases/kernel/syscalls/quotactl/quotactl09.c
> index 4ddcbd659f..673666347a 100644
> --- a/testcases/kernel/syscalls/quotactl/quotactl09.c
> +++ b/testcases/kernel/syscalls/quotactl/quotactl09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic error handling of the quotactl syscall without visible quota files
> * (use quotactl and quotactl_fd syscall):
> *
> diff --git a/testcases/kernel/syscalls/read/read03.c b/testcases/kernel/syscalls/read/read03.c
> index ee92a329e6..bb2fc5223c 100644
> --- a/testcases/kernel/syscalls/read/read03.c
> +++ b/testcases/kernel/syscalls/read/read03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check if read() successfully sets errno to EAGAIN when read from
> * a pipe (fifo, opened in O_NONBLOCK mode) without writing to it.
> */
> diff --git a/testcases/kernel/syscalls/read/read04.c b/testcases/kernel/syscalls/read/read04.c
> index 154cbf47df..f7d9a65daa 100644
> --- a/testcases/kernel/syscalls/read/read04.c
> +++ b/testcases/kernel/syscalls/read/read04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check if read() returns the number of bytes read correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/readahead/readahead01.c b/testcases/kernel/syscalls/readahead/readahead01.c
> index aed8e7f310..fdf1bb0440 100644
> --- a/testcases/kernel/syscalls/readahead/readahead01.c
> +++ b/testcases/kernel/syscalls/readahead/readahead01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that readahead() syscall fails with:
> *
> * - EBADF when fd is not a valid file descriptor or is not open for reading.
> diff --git a/testcases/kernel/syscalls/readdir/readdir01.c b/testcases/kernel/syscalls/readdir/readdir01.c
> index 2dc8f916d3..96db689923 100644
> --- a/testcases/kernel/syscalls/readdir/readdir01.c
> +++ b/testcases/kernel/syscalls/readdir/readdir01.c
> @@ -14,8 +14,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * The test for the readdir(2) system call.
> * Create n files and check that readdir() finds n files
> */
> diff --git a/testcases/kernel/syscalls/readdir/readdir21.c b/testcases/kernel/syscalls/readdir/readdir21.c
> index 7b747dbd3b..bb508a4b0a 100644
> --- a/testcases/kernel/syscalls/readdir/readdir21.c
> +++ b/testcases/kernel/syscalls/readdir/readdir21.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that readdir will fail with:
> *
> * - ENOENT when passed a fd to a deleted directory
> diff --git a/testcases/kernel/syscalls/readlink/readlink01.c b/testcases/kernel/syscalls/readlink/readlink01.c
> index 8165547d49..a721436e2c 100644
> --- a/testcases/kernel/syscalls/readlink/readlink01.c
> +++ b/testcases/kernel/syscalls/readlink/readlink01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests basic functionality of readlink(2).
> *
> * - readlink() will succeed to read the contents of the symbolic link
> diff --git a/testcases/kernel/syscalls/readlink/readlink03.c b/testcases/kernel/syscalls/readlink/readlink03.c
> index dce6366643..8348387378 100644
> --- a/testcases/kernel/syscalls/readlink/readlink03.c
> +++ b/testcases/kernel/syscalls/readlink/readlink03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, readlink(2) returns -1 and sets errno to
> *
> * 1. EACCES if search/write permission is denied in the directory where the
> diff --git a/testcases/kernel/syscalls/readlinkat/readlinkat01.c b/testcases/kernel/syscalls/readlinkat/readlinkat01.c
> index 9f238ff0ac..c3ff8f9b6b 100644
> --- a/testcases/kernel/syscalls/readlinkat/readlinkat01.c
> +++ b/testcases/kernel/syscalls/readlinkat/readlinkat01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the readlinkat() system call.
> *
> * - readlinkat() passes if dirfd is directory file descriptor
> diff --git a/testcases/kernel/syscalls/readlinkat/readlinkat02.c b/testcases/kernel/syscalls/readlinkat/readlinkat02.c
> index 64afb898f3..e2eaaed7be 100644
> --- a/testcases/kernel/syscalls/readlinkat/readlinkat02.c
> +++ b/testcases/kernel/syscalls/readlinkat/readlinkat02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * - readlinkat() fails with EINVAL if the bufsiz is 0.
> *
> * - readlinkat() fails with EINVAL if the named file is not a symbolic link.
> diff --git a/testcases/kernel/syscalls/readv/readv02.c b/testcases/kernel/syscalls/readv/readv02.c
> index c09e69bc8e..2ba23d4c60 100644
> --- a/testcases/kernel/syscalls/readv/readv02.c
> +++ b/testcases/kernel/syscalls/readv/readv02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests readv() failures:
> *
> * - EINVAL the sum of the iov_len values overflows an ssize_t value
> diff --git a/testcases/kernel/syscalls/realpath/realpath01.c b/testcases/kernel/syscalls/realpath/realpath01.c
> index e65debd58e..9c8e85a906 100644
> --- a/testcases/kernel/syscalls/realpath/realpath01.c
> +++ b/testcases/kernel/syscalls/realpath/realpath01.c
> @@ -9,8 +9,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2018-1000001 realpath buffer underflow.
> *
> * Based on glibc test io/tst-getcwd-abspath.c:
> diff --git a/testcases/kernel/syscalls/reboot/reboot01.c b/testcases/kernel/syscalls/reboot/reboot01.c
> index 098b287b6a..28fae8bb0c 100644
> --- a/testcases/kernel/syscalls/reboot/reboot01.c
> +++ b/testcases/kernel/syscalls/reboot/reboot01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test of libc wrapper of reboot(2) system call.
> *
> * Test LINUX_REBOOT_CMD_CAD_ON, LINUX_REBOOT_CMD_CAD_OFF commands,
> diff --git a/testcases/kernel/syscalls/reboot/reboot02.c b/testcases/kernel/syscalls/reboot/reboot02.c
> index 2e95fd0635..5682b78e06 100644
> --- a/testcases/kernel/syscalls/reboot/reboot02.c
> +++ b/testcases/kernel/syscalls/reboot/reboot02.c
> @@ -6,7 +6,6 @@
> */
>
> /*\
> - * [Description]
> * Test whether libc wrapper of reboot(2) system call returns appropriate
> * error number for invalid cmd parameter or invalid user.
> */
> diff --git a/testcases/kernel/syscalls/recvmsg/recvmsg01.c b/testcases/kernel/syscalls/recvmsg/recvmsg01.c
> index a265bc3bd7..378be8ca21 100644
> --- a/testcases/kernel/syscalls/recvmsg/recvmsg01.c
> +++ b/testcases/kernel/syscalls/recvmsg/recvmsg01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that recvmsg() returns the proper errno for various failure cases.
> */
>
> diff --git a/testcases/kernel/syscalls/rename/rename01.c b/testcases/kernel/syscalls/rename/rename01.c
> index 159341d095..2bbb70b2cc 100644
> --- a/testcases/kernel/syscalls/rename/rename01.c
> +++ b/testcases/kernel/syscalls/rename/rename01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify rename() when the newpath file or directory does not exist.
> */
>
> diff --git a/testcases/kernel/syscalls/rename/rename03.c b/testcases/kernel/syscalls/rename/rename03.c
> index 652fa3bdb3..f0c277cbe2 100644
> --- a/testcases/kernel/syscalls/rename/rename03.c
> +++ b/testcases/kernel/syscalls/rename/rename03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify rename(2) functions correctly when the newpath
> * file or directory (empty) exists.
> */
> diff --git a/testcases/kernel/syscalls/rename/rename04.c b/testcases/kernel/syscalls/rename/rename04.c
> index 598ecd6fe2..44b4d37d24 100644
> --- a/testcases/kernel/syscalls/rename/rename04.c
> +++ b/testcases/kernel/syscalls/rename/rename04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that rename() fails with EEXIST or ENOTEMPTY when
> * newpath is a non-empty directory.
> */
> diff --git a/testcases/kernel/syscalls/rename/rename05.c b/testcases/kernel/syscalls/rename/rename05.c
> index 7894a92147..2567a52524 100644
> --- a/testcases/kernel/syscalls/rename/rename05.c
> +++ b/testcases/kernel/syscalls/rename/rename05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that rename(2) fails with EISDIR when
> * oldpath is not a directory and newpath is an existing directory.
> */
> diff --git a/testcases/kernel/syscalls/rename/rename06.c b/testcases/kernel/syscalls/rename/rename06.c
> index 82665d1c2d..06ca8bf127 100644
> --- a/testcases/kernel/syscalls/rename/rename06.c
> +++ b/testcases/kernel/syscalls/rename/rename06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that rename(2) fails with EINVAL when
> * an attempt is made to make a directory a subdirectory of itself.
> */
> diff --git a/testcases/kernel/syscalls/rename/rename07.c b/testcases/kernel/syscalls/rename/rename07.c
> index 51338dbf42..dabba77f9b 100644
> --- a/testcases/kernel/syscalls/rename/rename07.c
> +++ b/testcases/kernel/syscalls/rename/rename07.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that rename(2) fails with ENOTDIR, when
> * oldpath is a directory and newpath exists but is not a directory.
> *
> diff --git a/testcases/kernel/syscalls/rename/rename08.c b/testcases/kernel/syscalls/rename/rename08.c
> index 8a9a9b344c..c4cd3f48ea 100644
> --- a/testcases/kernel/syscalls/rename/rename08.c
> +++ b/testcases/kernel/syscalls/rename/rename08.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that rename(2) fails with EFAULT, when
> * oldpath or newpath points outside of accessible address space.
> */
> diff --git a/testcases/kernel/syscalls/rename/rename09.c b/testcases/kernel/syscalls/rename/rename09.c
> index 927b36f271..202efa1d67 100644
> --- a/testcases/kernel/syscalls/rename/rename09.c
> +++ b/testcases/kernel/syscalls/rename/rename09.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that renaming/moving a file from directory where the current user does
> * not have write permissions fails with EACCES.
> */
> diff --git a/testcases/kernel/syscalls/rename/rename10.c b/testcases/kernel/syscalls/rename/rename10.c
> index 5b5f79073e..129cecf46b 100644
> --- a/testcases/kernel/syscalls/rename/rename10.c
> +++ b/testcases/kernel/syscalls/rename/rename10.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that rename(2) fails with ENAMETOOLONG, when
> * oldpath or newpath is too long.
> */
> diff --git a/testcases/kernel/syscalls/rename/rename12.c b/testcases/kernel/syscalls/rename/rename12.c
> index d6e1ccbe93..3e717f2494 100644
> --- a/testcases/kernel/syscalls/rename/rename12.c
> +++ b/testcases/kernel/syscalls/rename/rename12.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that rename() fails with EPERM or EACCES when the directory
> * containing oldpath has the sticky bit (S_ISVTX) set and the caller
> * is not privileged.
> diff --git a/testcases/kernel/syscalls/rename/rename13.c b/testcases/kernel/syscalls/rename/rename13.c
> index 51490db75b..069971d1b9 100644
> --- a/testcases/kernel/syscalls/rename/rename13.c
> +++ b/testcases/kernel/syscalls/rename/rename13.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that rename() does nothing and returns a success status when
> * oldpath and newpath are existing hard links referring to the same file.
> */
> diff --git a/testcases/kernel/syscalls/rename/rename15.c b/testcases/kernel/syscalls/rename/rename15.c
> index d08b1e67f0..1ef5807353 100644
> --- a/testcases/kernel/syscalls/rename/rename15.c
> +++ b/testcases/kernel/syscalls/rename/rename15.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test suite validates the behavior of the `rename()` system call on
> * symbolic links under three scenarios:
> *
> diff --git a/testcases/kernel/syscalls/request_key/request_key01.c b/testcases/kernel/syscalls/request_key/request_key01.c
> index f349cd50dd..97121533da 100644
> --- a/testcases/kernel/syscalls/request_key/request_key01.c
> +++ b/testcases/kernel/syscalls/request_key/request_key01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test basic functionality of the request_key(2).
> *
> * request_key(2) asks the kernel to find a key which matches the
> diff --git a/testcases/kernel/syscalls/request_key/request_key02.c b/testcases/kernel/syscalls/request_key/request_key02.c
> index 48bb978dda..2d35aceeee 100644
> --- a/testcases/kernel/syscalls/request_key/request_key02.c
> +++ b/testcases/kernel/syscalls/request_key/request_key02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic request_key(2) failure checking. request_key(2) should return -1 and
> * set expected errno:
> *
> diff --git a/testcases/kernel/syscalls/request_key/request_key03.c b/testcases/kernel/syscalls/request_key/request_key03.c
> index 3837993efa..bacfbe9888 100644
> --- a/testcases/kernel/syscalls/request_key/request_key03.c
> +++ b/testcases/kernel/syscalls/request_key/request_key03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for two related bugs:
> *
> * 1. CVE-2017-15299, fixed by commit 60ff5b2f547a ("KEYS: don't let add_key()
> diff --git a/testcases/kernel/syscalls/request_key/request_key04.c b/testcases/kernel/syscalls/request_key/request_key04.c
> index 4a454731aa..404233ad58 100644
> --- a/testcases/kernel/syscalls/request_key/request_key04.c
> +++ b/testcases/kernel/syscalls/request_key/request_key04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for commit 4dca6ea1d943 ("KEYS: add missing permission check
> * for request_key() destination"), or CVE-2017-17807. This bug allowed adding
> * a key to a keyring given only Search permission to that keyring, rather than
> diff --git a/testcases/kernel/syscalls/request_key/request_key05.c b/testcases/kernel/syscalls/request_key/request_key05.c
> index 35f326f505..8c20bab30a 100644
> --- a/testcases/kernel/syscalls/request_key/request_key05.c
> +++ b/testcases/kernel/syscalls/request_key/request_key05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-6951, original reproducer:
> * http://www.spinics.net/lists/keyrings/msg01845.html
> *
> diff --git a/testcases/kernel/syscalls/request_key/request_key06.c b/testcases/kernel/syscalls/request_key/request_key06.c
> index bd872867bf..34cc31fa05 100644
> --- a/testcases/kernel/syscalls/request_key/request_key06.c
> +++ b/testcases/kernel/syscalls/request_key/request_key06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that request_key(2) fails with
> *
> * - EFAULT when type points outside the process's accessible address space
> diff --git a/testcases/kernel/syscalls/rmdir/rmdir02.c b/testcases/kernel/syscalls/rmdir/rmdir02.c
> index b545e9cd2d..308f864447 100644
> --- a/testcases/kernel/syscalls/rmdir/rmdir02.c
> +++ b/testcases/kernel/syscalls/rmdir/rmdir02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, rmdir(2) returns -1 and sets errno to
> *
> * 1. ENOTEMPTY when removing a non-empty directory
> diff --git a/testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c b/testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c
> index ab30c2abdc..ee12bbb879 100644
> --- a/testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c
> +++ b/testcases/kernel/syscalls/rt_sigqueueinfo/rt_sigqueueinfo02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, rt_sigqueueinfo(2) sets errno to
> *
> * - EINVAL if sig is invalid
> diff --git a/testcases/kernel/syscalls/sbrk/sbrk01.c b/testcases/kernel/syscalls/sbrk/sbrk01.c
> index 39e92094bd..b6a34d0fd6 100644
> --- a/testcases/kernel/syscalls/sbrk/sbrk01.c
> +++ b/testcases/kernel/syscalls/sbrk/sbrk01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that sbrk() successfully increments or decrements the program's
> * data break.
> */
> diff --git a/testcases/kernel/syscalls/sbrk/sbrk02.c b/testcases/kernel/syscalls/sbrk/sbrk02.c
> index 08cbdf367c..7990196ed2 100644
> --- a/testcases/kernel/syscalls/sbrk/sbrk02.c
> +++ b/testcases/kernel/syscalls/sbrk/sbrk02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that sbrk() on failure sets errno to ENOMEM.
> */
>
> diff --git a/testcases/kernel/syscalls/sbrk/sbrk03.c b/testcases/kernel/syscalls/sbrk/sbrk03.c
> index 00536c757c..5c22a39984 100644
> --- a/testcases/kernel/syscalls/sbrk/sbrk03.c
> +++ b/testcases/kernel/syscalls/sbrk/sbrk03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Total s390 2^31 addr space is 0x80000000.
> *
> * 0x80000000 - 0x10000000 = 0x70000000
> diff --git a/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max01.c b/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max01.c
> index 9d0ebc2848..c0b2f5eada 100644
> --- a/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max01.c
> +++ b/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for the sched_get_priority_max(2) system call.
> *
> * Obtain different maximum priority for different schedulling policies and
> diff --git a/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max02.c b/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max02.c
> index bf1db294e0..d3a93a591e 100644
> --- a/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max02.c
> +++ b/testcases/kernel/syscalls/sched_get_priority_max/sched_get_priority_max02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that given an invalid scheduling policy, sched_get_priority_max(2)
> * returns -1 with errno EINVAL.
> */
> diff --git a/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min01.c b/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min01.c
> index 05cb9d1d5c..26e16a9408 100644
> --- a/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min01.c
> +++ b/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for the sched_get_priority_min(2) system call.
> *
> * Obtain different minimum priority for different schedulling policies and
> diff --git a/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min02.c b/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min02.c
> index 57e49ffd4a..077beb7f96 100644
> --- a/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min02.c
> +++ b/testcases/kernel/syscalls/sched_get_priority_min/sched_get_priority_min02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that given an invalid scheduling policy, sched_get_priority_min(2)
> * returns -1 with errno EINVAL.
> */
> diff --git a/testcases/kernel/syscalls/sched_getattr/sched_getattr02.c b/testcases/kernel/syscalls/sched_getattr/sched_getattr02.c
> index 4b99cdb66d..e2c0bf43be 100644
> --- a/testcases/kernel/syscalls/sched_getattr/sched_getattr02.c
> +++ b/testcases/kernel/syscalls/sched_getattr/sched_getattr02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, sched_getattr(2) returns -1 and sets errno to:
> *
> * 1. ESRCH if pid is unused.
> diff --git a/testcases/kernel/syscalls/sched_getparam/sched_getparam01.c b/testcases/kernel/syscalls/sched_getparam/sched_getparam01.c
> index a357264870..2c56286d67 100644
> --- a/testcases/kernel/syscalls/sched_getparam/sched_getparam01.c
> +++ b/testcases/kernel/syscalls/sched_getparam/sched_getparam01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * sched_getparam(2) gets correct scheduling parameters for
> diff --git a/testcases/kernel/syscalls/sched_getparam/sched_getparam03.c b/testcases/kernel/syscalls/sched_getparam/sched_getparam03.c
> index f1c635edf1..7192b0170d 100644
> --- a/testcases/kernel/syscalls/sched_getparam/sched_getparam03.c
> +++ b/testcases/kernel/syscalls/sched_getparam/sched_getparam03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * - sched_getparam(2) returns -1 and sets errno to ESRCH if the
> diff --git a/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler01.c b/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler01.c
> index 4191f09c0d..7edb594816 100644
> --- a/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler01.c
> +++ b/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check sched_getscheduler() returns correct return value.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler02.c b/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler02.c
> index 98818ff480..fbd5d66e50 100644
> --- a/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler02.c
> +++ b/testcases/kernel/syscalls/sched_getscheduler/sched_getscheduler02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Pass an unused pid to sched_getscheduler() and test for ESRCH.
> */
>
> diff --git a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval01.c b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval01.c
> index 40ff6e988d..b4d75bdcca 100644
> --- a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval01.c
> +++ b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval01.c
> @@ -4,8 +4,6 @@
> * AUTHOR : Saji Kumar.V.R <saji.kumar@wipro.com>
> */
> /*\
> - * [Description]
> - *
> * Gets round-robin time quantum by calling sched_rr_get_interval() and
> * checks that the value is sane.
> *
> diff --git a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval02.c b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval02.c
> index a61e2969b5..789e5ff10f 100644
> --- a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval02.c
> +++ b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval02.c
> @@ -4,8 +4,6 @@
> * AUTHOR : Saji Kumar.V.R <saji.kumar@wipro.com>
> */
> /*\
> - * [Description]
> - *
> * Verify that for a process with scheduling policy SCHED_FIFO,
> * sched_rr_get_interval() writes zero into timespec structure
> * for tv_sec & tv_nsec.
> diff --git a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval03.c b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval03.c
> index 731c500823..5e2f4ed7ea 100644
> --- a/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval03.c
> +++ b/testcases/kernel/syscalls/sched_rr_get_interval/sched_rr_get_interval03.c
> @@ -4,8 +4,6 @@
> * AUTHOR : Saji Kumar.V.R <saji.kumar@wipro.com>
> */
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * - sched_rr_get_interval() fails with errno set to EINVAL for an
> diff --git a/testcases/kernel/syscalls/sched_setaffinity/sched_setaffinity01.c b/testcases/kernel/syscalls/sched_setaffinity/sched_setaffinity01.c
> index acd9b77bef..22fef40203 100644
> --- a/testcases/kernel/syscalls/sched_setaffinity/sched_setaffinity01.c
> +++ b/testcases/kernel/syscalls/sched_setaffinity/sched_setaffinity01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check various errnos for sched_setaffinity():
> *
> * 1. EFAULT, if the supplied memory address is invalid.
> diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam01.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam01.c
> index df789e93dc..6222b0f8ee 100644
> --- a/testcases/kernel/syscalls/sched_setparam/sched_setparam01.c
> +++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for sched_setparam(2)
> *
> * Call sched_setparam(2) with pid=0 so that it will
> diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam02.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam02.c
> index b71c51c6ae..d71e2c6d69 100644
> --- a/testcases/kernel/syscalls/sched_setparam/sched_setparam02.c
> +++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Checks functionality for sched_setparam(2)
> *
> * This test changes the scheduling priority for current process
> diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam03.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam03.c
> index ffa92a3bf9..a8effcadb9 100644
> --- a/testcases/kernel/syscalls/sched_setparam/sched_setparam03.c
> +++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Checks functionality for sched_setparam(2) for pid != 0
> *
> * This test forks a child and changes its parent's scheduling priority.
> diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam04.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam04.c
> index 26477e4556..aa47a8610d 100644
> --- a/testcases/kernel/syscalls/sched_setparam/sched_setparam04.c
> +++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * 1. sched_setparam(2) returns -1 and sets errno to ESRCH if the
> diff --git a/testcases/kernel/syscalls/sched_setparam/sched_setparam05.c b/testcases/kernel/syscalls/sched_setparam/sched_setparam05.c
> index 0a49ecc4d0..e5fc8b04d7 100644
> --- a/testcases/kernel/syscalls/sched_setparam/sched_setparam05.c
> +++ b/testcases/kernel/syscalls/sched_setparam/sched_setparam05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that sched_setparam() fails if the user does not have proper
> * privileges.
> */
> diff --git a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler01.c b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler01.c
> index 4e48de8890..32a1a37acb 100644
> --- a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler01.c
> +++ b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to test whether sched_setscheduler(2) sets the errnos
> * correctly.
> *
> diff --git a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler02.c b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler02.c
> index 66f7270bd7..425c0ce267 100644
> --- a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler02.c
> +++ b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to test whether sched_setscheduler(2) sets the errnos
> * correctly.
> *
> diff --git a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler04.c b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler04.c
> index 828d1ec09e..abdd4c6dcb 100644
> --- a/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler04.c
> +++ b/testcases/kernel/syscalls/sched_setscheduler/sched_setscheduler04.c
> @@ -4,8 +4,6 @@
> */
>
> /*
> - * [Description]
> - *
> * Testcases that test if sched_setscheduler with flag
> * SCHED_RESET_ON_FORK restores children policy to
> * SCHED_NORMAL.
> diff --git a/testcases/kernel/syscalls/seccomp/seccomp01.c b/testcases/kernel/syscalls/seccomp/seccomp01.c
> index 16abca78fa..88f2fbef89 100644
> --- a/testcases/kernel/syscalls/seccomp/seccomp01.c
> +++ b/testcases/kernel/syscalls/seccomp/seccomp01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test PR_GET_SECCOMP and PR_SET_SECCOMP with both prctl(2) and seccomp(2).
> * The second one is called via __NR_seccomp using tst_syscall().
> *
> diff --git a/testcases/kernel/syscalls/select/select04.c b/testcases/kernel/syscalls/select/select04.c
> index f7a463ee1b..4706901b59 100644
> --- a/testcases/kernel/syscalls/select/select04.c
> +++ b/testcases/kernel/syscalls/select/select04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test to check if fd set bits are cleared by select().
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/send/send02.c b/testcases/kernel/syscalls/send/send02.c
> index 3a735d3be4..25d841bfae 100644
> --- a/testcases/kernel/syscalls/send/send02.c
> +++ b/testcases/kernel/syscalls/send/send02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that the kernel correctly handles send()/sendto()/sendmsg() calls
> * with MSG_MORE flag.
> */
> diff --git a/testcases/kernel/syscalls/sendfile/sendfile02.c b/testcases/kernel/syscalls/sendfile/sendfile02.c
> index 8e88dec20f..c88b93b121 100644
> --- a/testcases/kernel/syscalls/sendfile/sendfile02.c
> +++ b/testcases/kernel/syscalls/sendfile/sendfile02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test the basic functionality of the sendfile() system call:
> *
> * 1. Call sendfile() with offset = 0.
> diff --git a/testcases/kernel/syscalls/sendfile/sendfile03.c b/testcases/kernel/syscalls/sendfile/sendfile03.c
> index 85a3b0f357..bd6e9a8f42 100644
> --- a/testcases/kernel/syscalls/sendfile/sendfile03.c
> +++ b/testcases/kernel/syscalls/sendfile/sendfile03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to test that sendfile(2) system call returns EBADF when passing
> * wrong out_fd or in_fd.
> *
> diff --git a/testcases/kernel/syscalls/sendfile/sendfile04.c b/testcases/kernel/syscalls/sendfile/sendfile04.c
> index 4fa7481377..f74db177af 100644
> --- a/testcases/kernel/syscalls/sendfile/sendfile04.c
> +++ b/testcases/kernel/syscalls/sendfile/sendfile04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to test that sendfile(2) system call returns EFAULT when passing
> * wrong offset pointer.
> *
> diff --git a/testcases/kernel/syscalls/sendfile/sendfile05.c b/testcases/kernel/syscalls/sendfile/sendfile05.c
> index 691ed9730a..865d83c370 100644
> --- a/testcases/kernel/syscalls/sendfile/sendfile05.c
> +++ b/testcases/kernel/syscalls/sendfile/sendfile05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to test that sendfile(2) system call returns EINVAL when passing
> * negative offset.
> *
> diff --git a/testcases/kernel/syscalls/sendfile/sendfile06.c b/testcases/kernel/syscalls/sendfile/sendfile06.c
> index 2168da7279..9b2d8ff561 100644
> --- a/testcases/kernel/syscalls/sendfile/sendfile06.c
> +++ b/testcases/kernel/syscalls/sendfile/sendfile06.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that sendfile() system call updates file position of in_fd correctly
> * when passing NULL as offset.
> */
> diff --git a/testcases/kernel/syscalls/sendfile/sendfile07.c b/testcases/kernel/syscalls/sendfile/sendfile07.c
> index f9cbb7b85b..47d312a3b9 100644
> --- a/testcases/kernel/syscalls/sendfile/sendfile07.c
> +++ b/testcases/kernel/syscalls/sendfile/sendfile07.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to test that sendfile(2) system call returns EAGAIN
> * when passing full out_fd opened with O_NONBLOCK.
> */
> diff --git a/testcases/kernel/syscalls/sendfile/sendfile08.c b/testcases/kernel/syscalls/sendfile/sendfile08.c
> index 66fd40cae8..1efff97c2c 100644
> --- a/testcases/kernel/syscalls/sendfile/sendfile08.c
> +++ b/testcases/kernel/syscalls/sendfile/sendfile08.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Bug in the splice code has caused the file position on the write side
> * of the sendfile system call to be incorrectly set to the read side file
> * position. This can result in the data being written to an incorrect offset.
> diff --git a/testcases/kernel/syscalls/sendfile/sendfile09.c b/testcases/kernel/syscalls/sendfile/sendfile09.c
> index eeef44519c..82feaeba03 100644
> --- a/testcases/kernel/syscalls/sendfile/sendfile09.c
> +++ b/testcases/kernel/syscalls/sendfile/sendfile09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase copied from sendfile02.c to test the basic functionality of
> * the sendfile() system call on large file. There is a kernel bug which
> * introduced by commit 8f9c0119d7ba9 and fixed by commit 5d73320a96fcc.
> diff --git a/testcases/kernel/syscalls/sendmsg/sendmsg03.c b/testcases/kernel/syscalls/sendmsg/sendmsg03.c
> index 2edccb8d97..4a9943a3bc 100644
> --- a/testcases/kernel/syscalls/sendmsg/sendmsg03.c
> +++ b/testcases/kernel/syscalls/sendmsg/sendmsg03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2017-17712
> *
> * Test for race condition vulnerability in sendmsg() on SOCK_RAW sockets.
> diff --git a/testcases/kernel/syscalls/sendto/sendto02.c b/testcases/kernel/syscalls/sendto/sendto02.c
> index a24a696dd6..0acbb97469 100644
> --- a/testcases/kernel/syscalls/sendto/sendto02.c
> +++ b/testcases/kernel/syscalls/sendto/sendto02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * When SCTP protocol created wih socket(2) and buffer is invalid,
> * sendto(2) should fail and set errno to EFAULT, but it sets errno
> * to ENOMEM.
> diff --git a/testcases/kernel/syscalls/sendto/sendto03.c b/testcases/kernel/syscalls/sendto/sendto03.c
> index 59caffb9aa..622de64747 100644
> --- a/testcases/kernel/syscalls/sendto/sendto03.c
> +++ b/testcases/kernel/syscalls/sendto/sendto03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2020-14386
> *
> * Check for vulnerability in tpacket_rcv() which allows an unprivileged user
> diff --git a/testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c b/testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c
> index 9cc83e6422..65061bf3d8 100644
> --- a/testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c
> +++ b/testcases/kernel/syscalls/set_mempolicy/set_mempolicy05.c
> @@ -3,8 +3,6 @@
> * Copyright (C) 2021 SUSE LLC <rpalethorpe@suse.com>
> */
> /*\
> - *
> - * [Description]
> *
> * This will reproduce an information leak in the set_mempolicy 32-bit
> * compat syscall. The catch is that the 32-bit compat syscall is not
> diff --git a/testcases/kernel/syscalls/set_tid_address/set_tid_address01.c b/testcases/kernel/syscalls/set_tid_address/set_tid_address01.c
> index 0b68f70f32..1234e7f540 100644
> --- a/testcases/kernel/syscalls/set_tid_address/set_tid_address01.c
> +++ b/testcases/kernel/syscalls/set_tid_address/set_tid_address01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the basic functionality of set_tid_address() syscall.
> */
>
> diff --git a/testcases/kernel/syscalls/setegid/setegid01.c b/testcases/kernel/syscalls/setegid/setegid01.c
> index eef66311ba..871b4172bf 100644
> --- a/testcases/kernel/syscalls/setegid/setegid01.c
> +++ b/testcases/kernel/syscalls/setegid/setegid01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setegid() sets the effective UID of the calling process
> * correctly, and does not modify the saved GID and real GID.
> */
> diff --git a/testcases/kernel/syscalls/setegid/setegid02.c b/testcases/kernel/syscalls/setegid/setegid02.c
> index 66a8a07fb3..825809fcf4 100644
> --- a/testcases/kernel/syscalls/setegid/setegid02.c
> +++ b/testcases/kernel/syscalls/setegid/setegid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setegid() fails with EPERM when the calling process is not
> * privileged and egid does not match the current real group ID,
> * current effective group ID, or current saved set-group-ID.
> diff --git a/testcases/kernel/syscalls/setfsgid/setfsgid01.c b/testcases/kernel/syscalls/setfsgid/setfsgid01.c
> index 5b594b2d47..4724b5be58 100644
> --- a/testcases/kernel/syscalls/setfsgid/setfsgid01.c
> +++ b/testcases/kernel/syscalls/setfsgid/setfsgid01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setfsgid() correctly updates the filesystem group ID
> * to the value given in fsgid argument.
> */
> diff --git a/testcases/kernel/syscalls/setfsgid/setfsgid02.c b/testcases/kernel/syscalls/setfsgid/setfsgid02.c
> index 2a0b0c5593..c1930edbcf 100644
> --- a/testcases/kernel/syscalls/setfsgid/setfsgid02.c
> +++ b/testcases/kernel/syscalls/setfsgid/setfsgid02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase for setfsgid() syscall to check that
> *
> * - privileged user can change a filesystem group ID different from saved
> diff --git a/testcases/kernel/syscalls/setfsuid/setfsuid01.c b/testcases/kernel/syscalls/setfsuid/setfsuid01.c
> index 9805e38b6c..b23300f4a3 100644
> --- a/testcases/kernel/syscalls/setfsuid/setfsuid01.c
> +++ b/testcases/kernel/syscalls/setfsuid/setfsuid01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setfsuid() correctly updates the filesystem user ID
> * to the value given in fsuid argument.
> */
> diff --git a/testcases/kernel/syscalls/setfsuid/setfsuid02.c b/testcases/kernel/syscalls/setfsuid/setfsuid02.c
> index b81f307f7e..6f46a98215 100644
> --- a/testcases/kernel/syscalls/setfsuid/setfsuid02.c
> +++ b/testcases/kernel/syscalls/setfsuid/setfsuid02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setfsuid() syscall fails if an invalid fsuid is given.
> */
>
> diff --git a/testcases/kernel/syscalls/setfsuid/setfsuid03.c b/testcases/kernel/syscalls/setfsuid/setfsuid03.c
> index ee06e9376a..b7f941bb17 100644
> --- a/testcases/kernel/syscalls/setfsuid/setfsuid03.c
> +++ b/testcases/kernel/syscalls/setfsuid/setfsuid03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setfsuid() correctly updates the filesystem uid
> * when caller is a non-root user and provided fsuid matches
> * caller's real user ID.
> diff --git a/testcases/kernel/syscalls/setgid/setgid01.c b/testcases/kernel/syscalls/setgid/setgid01.c
> index 4e225b13e1..65c1622867 100644
> --- a/testcases/kernel/syscalls/setgid/setgid01.c
> +++ b/testcases/kernel/syscalls/setgid/setgid01.c
> @@ -6,8 +6,6 @@
> * CO-PILOT : Dave Fenner
> */
> /*\
> - * [Description]
> - *
> * Calls setgid() with current gid and expects success.
> */
>
> diff --git a/testcases/kernel/syscalls/setgid/setgid02.c b/testcases/kernel/syscalls/setgid/setgid02.c
> index ff6791a1a3..93684ef8e8 100644
> --- a/testcases/kernel/syscalls/setgid/setgid02.c
> +++ b/testcases/kernel/syscalls/setgid/setgid02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if setgid() system call sets errno to EPERM correctly.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/setgroups/setgroups01.c b/testcases/kernel/syscalls/setgroups/setgroups01.c
> index 9a5b77e936..f8e7d301ad 100644
> --- a/testcases/kernel/syscalls/setgroups/setgroups01.c
> +++ b/testcases/kernel/syscalls/setgroups/setgroups01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the setgroups() system call.
> */
>
> diff --git a/testcases/kernel/syscalls/setgroups/setgroups02.c b/testcases/kernel/syscalls/setgroups/setgroups02.c
> index 2b7f95c870..e636442ea9 100644
> --- a/testcases/kernel/syscalls/setgroups/setgroups02.c
> +++ b/testcases/kernel/syscalls/setgroups/setgroups02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that root process can setgroups() supplementary group ID and verify
> * that getgroups() returns the previously set ID.
> */
> diff --git a/testcases/kernel/syscalls/setgroups/setgroups03.c b/testcases/kernel/syscalls/setgroups/setgroups03.c
> index fbf8de0bb2..8d17f5ba42 100644
> --- a/testcases/kernel/syscalls/setgroups/setgroups03.c
> +++ b/testcases/kernel/syscalls/setgroups/setgroups03.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for EINVAL, EPERM, EFAULT errors.
> *
> * - setgroups() fails with EINVAL if the size argument value is > NGROUPS.
> diff --git a/testcases/kernel/syscalls/setitimer/setitimer01.c b/testcases/kernel/syscalls/setitimer/setitimer01.c
> index 94ee51c6a6..22b89e4712 100644
> --- a/testcases/kernel/syscalls/setitimer/setitimer01.c
> +++ b/testcases/kernel/syscalls/setitimer/setitimer01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Spawn a child, verify that setitimer() syscall passes and it ends up
> * counting inside expected boundaries. Then verify from the parent that
> * the syscall sent the correct signal to the child.
> diff --git a/testcases/kernel/syscalls/setitimer/setitimer02.c b/testcases/kernel/syscalls/setitimer/setitimer02.c
> index c545f6288b..7c38ad9f65 100644
> --- a/testcases/kernel/syscalls/setitimer/setitimer02.c
> +++ b/testcases/kernel/syscalls/setitimer/setitimer02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that setitimer() call fails:
> *
> * 1. EFAULT with invalid itimerval pointer
> diff --git a/testcases/kernel/syscalls/setpgid/setpgid01.c b/testcases/kernel/syscalls/setpgid/setpgid01.c
> index c976c3a513..59ec372aa5 100644
> --- a/testcases/kernel/syscalls/setpgid/setpgid01.c
> +++ b/testcases/kernel/syscalls/setpgid/setpgid01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify basic setpgid() functionality, re-setting group ID inside both parent
> * and child. In the first case, we obtain getpgrp() and set it. In the second
> * case, we use setpgid(0, 0).
> diff --git a/testcases/kernel/syscalls/setpgid/setpgid02.c b/testcases/kernel/syscalls/setpgid/setpgid02.c
> index b380d7df48..fac8836daa 100644
> --- a/testcases/kernel/syscalls/setpgid/setpgid02.c
> +++ b/testcases/kernel/syscalls/setpgid/setpgid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setpgid(2) syscall fails with:
> *
> * - EINVAL when given pgid is less than 0.
> diff --git a/testcases/kernel/syscalls/setpgid/setpgid03.c b/testcases/kernel/syscalls/setpgid/setpgid03.c
> index 9ce2603d8a..7f360f6320 100644
> --- a/testcases/kernel/syscalls/setpgid/setpgid03.c
> +++ b/testcases/kernel/syscalls/setpgid/setpgid03.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests setpgid(2) errors:
> *
> * - EPERM The process specified by pid must not be a session leader.
> diff --git a/testcases/kernel/syscalls/setpgrp/setpgrp02.c b/testcases/kernel/syscalls/setpgrp/setpgrp02.c
> index f58f494e73..732364e601 100644
> --- a/testcases/kernel/syscalls/setpgrp/setpgrp02.c
> +++ b/testcases/kernel/syscalls/setpgrp/setpgrp02.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Testcase to check the basic functionality of the setpgrp(2) syscall.
> */
>
> diff --git a/testcases/kernel/syscalls/setregid/setregid01.c b/testcases/kernel/syscalls/setregid/setregid01.c
> index 2750208d44..58f874953e 100644
> --- a/testcases/kernel/syscalls/setregid/setregid01.c
> +++ b/testcases/kernel/syscalls/setregid/setregid01.c
> @@ -16,8 +16,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the basic functionality of setregid(2) system call.
> */
>
> diff --git a/testcases/kernel/syscalls/setresgid/setresgid01.c b/testcases/kernel/syscalls/setresgid/setresgid01.c
> index 2301a6771e..facb918cc7 100644
> --- a/testcases/kernel/syscalls/setresgid/setresgid01.c
> +++ b/testcases/kernel/syscalls/setresgid/setresgid01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setresgid() syscall correctly sets real user ID, effective user
> * ID and the saved set-user ID in the calling process.
> */
> diff --git a/testcases/kernel/syscalls/setresgid/setresgid02.c b/testcases/kernel/syscalls/setresgid/setresgid02.c
> index 2893aa5422..cca4c46b6b 100644
> --- a/testcases/kernel/syscalls/setresgid/setresgid02.c
> +++ b/testcases/kernel/syscalls/setresgid/setresgid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setresgid() will successfully set the expected GID when called
> * by root with the following combinations of arguments:
> *
> diff --git a/testcases/kernel/syscalls/setresgid/setresgid03.c b/testcases/kernel/syscalls/setresgid/setresgid03.c
> index 4f6bc6aafe..8d827d17b1 100644
> --- a/testcases/kernel/syscalls/setresgid/setresgid03.c
> +++ b/testcases/kernel/syscalls/setresgid/setresgid03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setresgid() fails with EPERM if unprivileged user tries to set
> * process group ID which requires higher permissions.
> */
> diff --git a/testcases/kernel/syscalls/setresgid/setresgid04.c b/testcases/kernel/syscalls/setresgid/setresgid04.c
> index 1eedb883ae..9ba013eb63 100644
> --- a/testcases/kernel/syscalls/setresgid/setresgid04.c
> +++ b/testcases/kernel/syscalls/setresgid/setresgid04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setresgid() syscall always sets the file system GID to the same
> * value as the new effective GID.
> */
> diff --git a/testcases/kernel/syscalls/setresuid/setresuid01.c b/testcases/kernel/syscalls/setresuid/setresuid01.c
> index 196e03766d..b3cebcbd8c 100644
> --- a/testcases/kernel/syscalls/setresuid/setresuid01.c
> +++ b/testcases/kernel/syscalls/setresuid/setresuid01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test setresuid() when executed by root.
> */
>
> diff --git a/testcases/kernel/syscalls/setresuid/setresuid02.c b/testcases/kernel/syscalls/setresuid/setresuid02.c
> index 0931d2a24c..6bd7a22dbc 100644
> --- a/testcases/kernel/syscalls/setresuid/setresuid02.c
> +++ b/testcases/kernel/syscalls/setresuid/setresuid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that a non-root user can change the real, effective and saved uid
> * values through the setresuid system call.
> */
> diff --git a/testcases/kernel/syscalls/setresuid/setresuid03.c b/testcases/kernel/syscalls/setresuid/setresuid03.c
> index f1518c75c9..f2ff0b7a22 100644
> --- a/testcases/kernel/syscalls/setresuid/setresuid03.c
> +++ b/testcases/kernel/syscalls/setresuid/setresuid03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that the setresuid system call sets the proper errno values when
> * a non-root user attempts to change the real, effective or saved uid
> * to a value other than one of the current uid, the current effective uid
> diff --git a/testcases/kernel/syscalls/setresuid/setresuid04.c b/testcases/kernel/syscalls/setresuid/setresuid04.c
> index 57b290f378..cf10bad4b3 100644
> --- a/testcases/kernel/syscalls/setresuid/setresuid04.c
> +++ b/testcases/kernel/syscalls/setresuid/setresuid04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setresuid() behaves correctly with file permissions.
> * The test creates a file as ROOT with permissions 0644, does a setresuid
> * to change euid to a non-root user and tries to open the file with RDWR
> diff --git a/testcases/kernel/syscalls/setresuid/setresuid05.c b/testcases/kernel/syscalls/setresuid/setresuid05.c
> index 3a0eb47083..4193afdc4d 100644
> --- a/testcases/kernel/syscalls/setresuid/setresuid05.c
> +++ b/testcases/kernel/syscalls/setresuid/setresuid05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that after updating euid with setresuid(), any file creation
> * also gets the new euid as its owner user ID.
> */
> diff --git a/testcases/kernel/syscalls/setreuid/setreuid01.c b/testcases/kernel/syscalls/setreuid/setreuid01.c
> index 5398246a61..9442e7c501 100644
> --- a/testcases/kernel/syscalls/setreuid/setreuid01.c
> +++ b/testcases/kernel/syscalls/setreuid/setreuid01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the basic functionality of setreuid(2) system call when executed
> * as non-root user.
> */
> diff --git a/testcases/kernel/syscalls/setreuid/setreuid02.c b/testcases/kernel/syscalls/setreuid/setreuid02.c
> index 2fa4cbc800..8f110ef727 100644
> --- a/testcases/kernel/syscalls/setreuid/setreuid02.c
> +++ b/testcases/kernel/syscalls/setreuid/setreuid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test setreuid() when executed by root.
> */
>
> diff --git a/testcases/kernel/syscalls/setreuid/setreuid03.c b/testcases/kernel/syscalls/setreuid/setreuid03.c
> index e83a3586a5..f21a141d63 100644
> --- a/testcases/kernel/syscalls/setreuid/setreuid03.c
> +++ b/testcases/kernel/syscalls/setreuid/setreuid03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test setreuid() when executed by an unpriviledged user.
> */
>
> diff --git a/testcases/kernel/syscalls/setreuid/setreuid04.c b/testcases/kernel/syscalls/setreuid/setreuid04.c
> index 06ffa32b0b..7407fa0176 100644
> --- a/testcases/kernel/syscalls/setreuid/setreuid04.c
> +++ b/testcases/kernel/syscalls/setreuid/setreuid04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that root user can change the real and effective uid to an
> * unprivileged user.
> */
> diff --git a/testcases/kernel/syscalls/setreuid/setreuid05.c b/testcases/kernel/syscalls/setreuid/setreuid05.c
> index 4c1c94ee8b..9ab1f21de2 100644
> --- a/testcases/kernel/syscalls/setreuid/setreuid05.c
> +++ b/testcases/kernel/syscalls/setreuid/setreuid05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test the setreuid() feature, verifying the role of the saved-set-uid
> * and setreuid's effect on it.
> */
> diff --git a/testcases/kernel/syscalls/setreuid/setreuid06.c b/testcases/kernel/syscalls/setreuid/setreuid06.c
> index 0a094fdc9b..5566357001 100644
> --- a/testcases/kernel/syscalls/setreuid/setreuid06.c
> +++ b/testcases/kernel/syscalls/setreuid/setreuid06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setreuid(2) syscall fails with EPERM errno when the calling
> * process is not privileged and a change other than
> * (i) swapping the effective user ID with the real user ID, or
> diff --git a/testcases/kernel/syscalls/setreuid/setreuid07.c b/testcases/kernel/syscalls/setreuid/setreuid07.c
> index 62b9ec4cdc..1bb2d8428d 100644
> --- a/testcases/kernel/syscalls/setreuid/setreuid07.c
> +++ b/testcases/kernel/syscalls/setreuid/setreuid07.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check if setreuid behaves correctly with file permissions.
> * The test creates a file as ROOT with permissions 0644, does a setreuid
> * and then tries to open the file with RDWR permissions.
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt01.c b/testcases/kernel/syscalls/setsockopt/setsockopt01.c
> index d8c70cbc5d..1ded0cda5a 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt01.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setsockopt() fails and set errno:
> *
> * - EBADF on invalid file descriptor
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt02.c b/testcases/kernel/syscalls/setsockopt/setsockopt02.c
> index 23e56ee7e0..15d86ae178 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt02.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2017-7308 on a raw socket's ring buffer
> *
> * Try to set tpacket_req3.tp_sizeof_priv to a value with the high bit set. So
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt03.c b/testcases/kernel/syscalls/setsockopt/setsockopt03.c
> index 82d5aebf1d..90d5466115 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt03.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for CVE-2016-4997
> *
> * For a full explanation of how the vulnerability works see:
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt04.c b/testcases/kernel/syscalls/setsockopt/setsockopt04.c
> index a4c0a371e0..7916314c75 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt04.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt04.c
> @@ -4,8 +4,6 @@
> * Author: Christian Amann <camann@suse.com>
> */
> /*\
> - * [Description]
> - *
> * CVE-2016-9793
> *
> * With kernels between version 3.11 and 4.8 missing commit b98b0bc8 it
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt05.c b/testcases/kernel/syscalls/setsockopt/setsockopt05.c
> index 68a093694c..35a3d1bd3d 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt05.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2017-1000112
> *
> * Check that UDP fragmentation offload doesn't cause memory corruption
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt06.c b/testcases/kernel/syscalls/setsockopt/setsockopt06.c
> index 1c2421fe92..3f266123fb 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt06.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2016-8655
> *
> * Check for race condition between packet_set_ring() and tp_version. On some
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt07.c b/testcases/kernel/syscalls/setsockopt/setsockopt07.c
> index ed80d2c503..ea3dead0fb 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt07.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt07.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2017-1000111
> *
> * Check for race condition between packet_set_ring() and tp_reserve.
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt08.c b/testcases/kernel/syscalls/setsockopt/setsockopt08.c
> index a246cfdddf..1d50bd6cbb 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt08.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This will reproduce the bug on x86_64 in 32bit compatibility
> * mode. It is most reliable with KASAN enabled. Otherwise it relies
> * on the out-of-bounds write corrupting something which leads to a
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt09.c b/testcases/kernel/syscalls/setsockopt/setsockopt09.c
> index 9ed80e46b1..a4b6b9315f 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt09.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt09.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check for possible double free of rx_owner_map after switching packet
> * interface versions aka CVE-2021-22600.
> *
> diff --git a/testcases/kernel/syscalls/setsockopt/setsockopt10.c b/testcases/kernel/syscalls/setsockopt/setsockopt10.c
> index 4e7e449383..e52c6cd933 100644
> --- a/testcases/kernel/syscalls/setsockopt/setsockopt10.c
> +++ b/testcases/kernel/syscalls/setsockopt/setsockopt10.c
> @@ -3,8 +3,6 @@
> * Copyright (C) 2023 SUSE LLC Richard Palethorpe <rpalethorpe@suse.com>
> */
> /*\
> - * [Description]
> - *
> * Reproducer for CVE-2023-0461 which is an exploitable use-after-free
> * in a TLS socket. In fact it is exploitable in any User Level
> * Protocol (ULP) which does not clone its context when accepting a
> diff --git a/testcases/kernel/syscalls/settimeofday/settimeofday01.c b/testcases/kernel/syscalls/settimeofday/settimeofday01.c
> index e523b5b979..e403fe4030 100644
> --- a/testcases/kernel/syscalls/settimeofday/settimeofday01.c
> +++ b/testcases/kernel/syscalls/settimeofday/settimeofday01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of settimeofday().
> */
>
> diff --git a/testcases/kernel/syscalls/settimeofday/settimeofday02.c b/testcases/kernel/syscalls/settimeofday/settimeofday02.c
> index 06021b9536..4be44df720 100644
> --- a/testcases/kernel/syscalls/settimeofday/settimeofday02.c
> +++ b/testcases/kernel/syscalls/settimeofday/settimeofday02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that settimeofday() sets errnos correctly.
> */
>
> diff --git a/testcases/kernel/syscalls/setuid/setuid01.c b/testcases/kernel/syscalls/setuid/setuid01.c
> index c136444c73..d7b44d790e 100644
> --- a/testcases/kernel/syscalls/setuid/setuid01.c
> +++ b/testcases/kernel/syscalls/setuid/setuid01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that setuid(2) returns 0 and effective uid has
> * been set successfully as a normal or super user.
> */
> diff --git a/testcases/kernel/syscalls/setuid/setuid03.c b/testcases/kernel/syscalls/setuid/setuid03.c
> index 06934f142d..1f96e04f99 100644
> --- a/testcases/kernel/syscalls/setuid/setuid03.c
> +++ b/testcases/kernel/syscalls/setuid/setuid03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test will switch to nobody user for correct error code collection.
> * Verify setuid returns errno EPERM when it switches to root_user.
> */
> diff --git a/testcases/kernel/syscalls/setxattr/setxattr01.c b/testcases/kernel/syscalls/setxattr/setxattr01.c
> index de3ea67ec4..a405bf42ee 100644
> --- a/testcases/kernel/syscalls/setxattr/setxattr01.c
> +++ b/testcases/kernel/syscalls/setxattr/setxattr01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests for setxattr(2) and make sure setxattr(2) handles error
> * conditions correctly.
> *
> diff --git a/testcases/kernel/syscalls/setxattr/setxattr02.c b/testcases/kernel/syscalls/setxattr/setxattr02.c
> index 18afc031b4..9f5f998da9 100644
> --- a/testcases/kernel/syscalls/setxattr/setxattr02.c
> +++ b/testcases/kernel/syscalls/setxattr/setxattr02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * In the user.* namespace, only regular files and directories can
> * have extended attributes. Otherwise setxattr(2) will return -1
> * and set errno to EPERM.
> diff --git a/testcases/kernel/syscalls/setxattr/setxattr03.c b/testcases/kernel/syscalls/setxattr/setxattr03.c
> index 52cec07887..0b5b48a55e 100644
> --- a/testcases/kernel/syscalls/setxattr/setxattr03.c
> +++ b/testcases/kernel/syscalls/setxattr/setxattr03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * setxattr(2) to immutable and append-only files should get EPERM
> *
> * - Set attribute to a immutable file
> diff --git a/testcases/kernel/syscalls/shutdown/shutdown01.c b/testcases/kernel/syscalls/shutdown/shutdown01.c
> index 91e4378059..48b1a22566 100644
> --- a/testcases/kernel/syscalls/shutdown/shutdown01.c
> +++ b/testcases/kernel/syscalls/shutdown/shutdown01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies the following shutdown() functionalities:
> *
> * - SHUT_RD should enable send() ops but disable recv() ops
> diff --git a/testcases/kernel/syscalls/shutdown/shutdown02.c b/testcases/kernel/syscalls/shutdown/shutdown02.c
> index 33f7488147..2c488416d2 100644
> --- a/testcases/kernel/syscalls/shutdown/shutdown02.c
> +++ b/testcases/kernel/syscalls/shutdown/shutdown02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies the following shutdown() errors:
> *
> * - EBADF sockfd is not a valid file descriptor
> diff --git a/testcases/kernel/syscalls/sigaltstack/sigaltstack02.c b/testcases/kernel/syscalls/sigaltstack/sigaltstack02.c
> index 5a34851c01..e5412b2dac 100644
> --- a/testcases/kernel/syscalls/sigaltstack/sigaltstack02.c
> +++ b/testcases/kernel/syscalls/sigaltstack/sigaltstack02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that sigaltstack() fails with return value -1 and set expected errno:
> *
> * - EINVAL on invalid value.
> diff --git a/testcases/kernel/syscalls/sighold/sighold02.c b/testcases/kernel/syscalls/sighold/sighold02.c
> index 2807bf67e0..11515558d6 100644
> --- a/testcases/kernel/syscalls/sighold/sighold02.c
> +++ b/testcases/kernel/syscalls/sighold/sighold02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test checks following conditions:
> *
> * 1. sighold action to turn off the receipt of all signals was done without error.
> diff --git a/testcases/kernel/syscalls/signal/signal01.c b/testcases/kernel/syscalls/signal/signal01.c
> index 277661597a..20031af311 100644
> --- a/testcases/kernel/syscalls/signal/signal01.c
> +++ b/testcases/kernel/syscalls/signal/signal01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test SIGKILL for these items:
> * 1. SIGKILL can not be set to be ignored, errno:EINVAL (POSIX).
> * 2. SIGKILL can not be reset to default, errno:EINVAL (POSIX).
> diff --git a/testcases/kernel/syscalls/signal/signal02.c b/testcases/kernel/syscalls/signal/signal02.c
> index 54948646ff..187e6301c2 100644
> --- a/testcases/kernel/syscalls/signal/signal02.c
> +++ b/testcases/kernel/syscalls/signal/signal02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that we get an error using illegal signals.
> */
>
> diff --git a/testcases/kernel/syscalls/signal/signal03.c b/testcases/kernel/syscalls/signal/signal03.c
> index 8118af4b4f..339fbbbf13 100644
> --- a/testcases/kernel/syscalls/signal/signal03.c
> +++ b/testcases/kernel/syscalls/signal/signal03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Set signals to be ignored.
> */
>
> diff --git a/testcases/kernel/syscalls/signal/signal04.c b/testcases/kernel/syscalls/signal/signal04.c
> index 27826ad483..598666c3c5 100644
> --- a/testcases/kernel/syscalls/signal/signal04.c
> +++ b/testcases/kernel/syscalls/signal/signal04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Restore signals to default behavior.
> */
>
> diff --git a/testcases/kernel/syscalls/signal/signal05.c b/testcases/kernel/syscalls/signal/signal05.c
> index f3480f0ab0..b64f17b502 100644
> --- a/testcases/kernel/syscalls/signal/signal05.c
> +++ b/testcases/kernel/syscalls/signal/signal05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Set the signal handler to our own function.
> */
>
> diff --git a/testcases/kernel/syscalls/signalfd/signalfd01.c b/testcases/kernel/syscalls/signalfd/signalfd01.c
> index e54d4a6069..47f5eed758 100644
> --- a/testcases/kernel/syscalls/signalfd/signalfd01.c
> +++ b/testcases/kernel/syscalls/signalfd/signalfd01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that signalfd() works as expected.
> *
> * - signalfd() can create fd, and fd can receive signal.
> diff --git a/testcases/kernel/syscalls/signalfd/signalfd02.c b/testcases/kernel/syscalls/signalfd/signalfd02.c
> index fdd15781cd..332b5f5964 100644
> --- a/testcases/kernel/syscalls/signalfd/signalfd02.c
> +++ b/testcases/kernel/syscalls/signalfd/signalfd02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that signalfd(2) fails with:
> *
> * - EBADF when fd is invalid
> diff --git a/testcases/kernel/syscalls/sigsuspend/sigsuspend01.c b/testcases/kernel/syscalls/sigsuspend/sigsuspend01.c
> index 4d9edcbed2..66307f8011 100644
> --- a/testcases/kernel/syscalls/sigsuspend/sigsuspend01.c
> +++ b/testcases/kernel/syscalls/sigsuspend/sigsuspend01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify the basic sigsuspend(2) syscall functionality:
> *
> * - sigsuspend(2) can replace process's current signal mask by the specified
> diff --git a/testcases/kernel/syscalls/sigsuspend/sigsuspend02.c b/testcases/kernel/syscalls/sigsuspend/sigsuspend02.c
> index cfe95393f9..d809bacc86 100644
> --- a/testcases/kernel/syscalls/sigsuspend/sigsuspend02.c
> +++ b/testcases/kernel/syscalls/sigsuspend/sigsuspend02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that sigsuspend(2) fails with
> *
> * - EFAULT mask points to memory which is not a valid part of the
> diff --git a/testcases/kernel/syscalls/socket/socket01.c b/testcases/kernel/syscalls/socket/socket01.c
> index ca47315638..9563e19f92 100644
> --- a/testcases/kernel/syscalls/socket/socket01.c
> +++ b/testcases/kernel/syscalls/socket/socket01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test creating TCP, UDP, and Unix doman dgram sockets with socket() syscall.
> *
> * Also verify that socket() fails and set proper errno
> diff --git a/testcases/kernel/syscalls/socket/socket02.c b/testcases/kernel/syscalls/socket/socket02.c
> index 957a257019..30f7690899 100644
> --- a/testcases/kernel/syscalls/socket/socket02.c
> +++ b/testcases/kernel/syscalls/socket/socket02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test socket() with SOCK_CLOEXEC and SOCK_NONBLOCK flags.
> */
>
> diff --git a/testcases/kernel/syscalls/socketcall/socketcall01.c b/testcases/kernel/syscalls/socketcall/socketcall01.c
> index 85ffd9d1e6..55d1e165d0 100644
> --- a/testcases/kernel/syscalls/socketcall/socketcall01.c
> +++ b/testcases/kernel/syscalls/socketcall/socketcall01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for the socketcall(2) raw syscall.
> *
> * Test creating TCP, UDP, raw socket and unix domain dgram.
> diff --git a/testcases/kernel/syscalls/socketpair/socketpair01.c b/testcases/kernel/syscalls/socketpair/socketpair01.c
> index b1e140a55a..6463485310 100644
> --- a/testcases/kernel/syscalls/socketpair/socketpair01.c
> +++ b/testcases/kernel/syscalls/socketpair/socketpair01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that socketpair(2) fails and set proper errno
> *
> * - EAFNOSUPPORT on invalid domain
> diff --git a/testcases/kernel/syscalls/socketpair/socketpair02.c b/testcases/kernel/syscalls/socketpair/socketpair02.c
> index b43cf7295e..1a6f13317b 100644
> --- a/testcases/kernel/syscalls/socketpair/socketpair02.c
> +++ b/testcases/kernel/syscalls/socketpair/socketpair02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test socket() with SOCK_CLOEXEC and SOCK_NONBLOCK flags.
> */
>
> diff --git a/testcases/kernel/syscalls/splice/splice02.c b/testcases/kernel/syscalls/splice/splice02.c
> index 1da1186b2a..e9aba47cce 100644
> --- a/testcases/kernel/syscalls/splice/splice02.c
> +++ b/testcases/kernel/syscalls/splice/splice02.c
> @@ -5,7 +5,6 @@
> */
>
> /*\
> - * [Description]
> * Original reproducer for kernel fix
> * bf40d3435caf NFS: add support for splice writes
> * from v2.6.31-rc1.
> diff --git a/testcases/kernel/syscalls/splice/splice03.c b/testcases/kernel/syscalls/splice/splice03.c
> index 26beb562a7..32a683dc3a 100644
> --- a/testcases/kernel/syscalls/splice/splice03.c
> +++ b/testcases/kernel/syscalls/splice/splice03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, splice(2) returns -1 and sets errno to
> *
> * 1. EBADF if the file descriptor fd_in is not valid
> diff --git a/testcases/kernel/syscalls/splice/splice06.c b/testcases/kernel/syscalls/splice/splice06.c
> index 0cb5dec291..e64d32deda 100644
> --- a/testcases/kernel/syscalls/splice/splice06.c
> +++ b/testcases/kernel/syscalls/splice/splice06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is cover splice() on proc files.
> *
> */
> diff --git a/testcases/kernel/syscalls/splice/splice07.c b/testcases/kernel/syscalls/splice/splice07.c
> index d3b527a4ff..2228e2f269 100644
> --- a/testcases/kernel/syscalls/splice/splice07.c
> +++ b/testcases/kernel/syscalls/splice/splice07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Iterate over all kinds of file descriptors and feed splice() with all possible
> * combinations where at least one file descriptor is invalid. We do expect the
> * syscall to fail either with EINVAL or EBADF.
> diff --git a/testcases/kernel/syscalls/splice/splice08.c b/testcases/kernel/syscalls/splice/splice08.c
> index 6f22094681..3f9a070b7d 100644
> --- a/testcases/kernel/syscalls/splice/splice08.c
> +++ b/testcases/kernel/syscalls/splice/splice08.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for splicing from /dev/zero and /dev/full.
> *
> * The support for splicing from /dev/zero and /dev/full was removed in:
> diff --git a/testcases/kernel/syscalls/splice/splice09.c b/testcases/kernel/syscalls/splice/splice09.c
> index 9c63fb03cf..8863a01342 100644
> --- a/testcases/kernel/syscalls/splice/splice09.c
> +++ b/testcases/kernel/syscalls/splice/splice09.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for splicing to /dev/zero and /dev/null these two devices discard all
> * data written to them.
> *
> diff --git a/testcases/kernel/syscalls/stat/stat01.c b/testcases/kernel/syscalls/stat/stat01.c
> index 365cdac8a6..86aaa253c5 100644
> --- a/testcases/kernel/syscalls/stat/stat01.c
> +++ b/testcases/kernel/syscalls/stat/stat01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, stat(2) succeeds to get the status of a file and fills the
> * stat structure elements regardless of whether process has or doesn't
> * have read access to the file.
> diff --git a/testcases/kernel/syscalls/stat/stat03.c b/testcases/kernel/syscalls/stat/stat03.c
> index 369e6d79f1..6e08f507e3 100644
> --- a/testcases/kernel/syscalls/stat/stat03.c
> +++ b/testcases/kernel/syscalls/stat/stat03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * check stat() with various error conditions that should produce
> * EACCES, EFAULT, ENAMETOOLONG, ENOENT, ENOTDIR, ELOOP
> */
> diff --git a/testcases/kernel/syscalls/stat/stat04.c b/testcases/kernel/syscalls/stat/stat04.c
> index 05ace606ad..09a9a68231 100644
> --- a/testcases/kernel/syscalls/stat/stat04.c
> +++ b/testcases/kernel/syscalls/stat/stat04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test checks that stat() executed on file provide the same information
> * of symlink linking to it.
> */
> diff --git a/testcases/kernel/syscalls/statfs/statfs01.c b/testcases/kernel/syscalls/statfs/statfs01.c
> index 62e1d00edf..e88d5a3034 100644
> --- a/testcases/kernel/syscalls/statfs/statfs01.c
> +++ b/testcases/kernel/syscalls/statfs/statfs01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that statfs() syscall executes successfully on all
> * available filesystems.
> */
> diff --git a/testcases/kernel/syscalls/statfs/statfs02.c b/testcases/kernel/syscalls/statfs/statfs02.c
> index ee9dba0cdc..c0444d7599 100644
> --- a/testcases/kernel/syscalls/statfs/statfs02.c
> +++ b/testcases/kernel/syscalls/statfs/statfs02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests for failures:
> *
> * - ENOTDIR A component of the pathname, which is not a directory.
> diff --git a/testcases/kernel/syscalls/statfs/statfs03.c b/testcases/kernel/syscalls/statfs/statfs03.c
> index 2afdbbf044..62b8044c09 100644
> --- a/testcases/kernel/syscalls/statfs/statfs03.c
> +++ b/testcases/kernel/syscalls/statfs/statfs03.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that statfs(2) fails with errno EACCES when search permission
> * is denied for a component of the path prefix of path.
> */
> diff --git a/testcases/kernel/syscalls/statmount/statmount01.c b/testcases/kernel/syscalls/statmount/statmount01.c
> index 73b9a59b01..fcf73e6ae4 100644
> --- a/testcases/kernel/syscalls/statmount/statmount01.c
> +++ b/testcases/kernel/syscalls/statmount/statmount01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that statmount() is working with no mask flags.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/statmount/statmount02.c b/testcases/kernel/syscalls/statmount/statmount02.c
> index 4e23c69797..504c558a11 100644
> --- a/testcases/kernel/syscalls/statmount/statmount02.c
> +++ b/testcases/kernel/syscalls/statmount/statmount02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that statmount() is correctly reading basic filesystem
> * info using STATMOUNT_SB_BASIC.
> * The btrfs validation is currently skipped due to the lack of support for VFS.
> diff --git a/testcases/kernel/syscalls/statmount/statmount03.c b/testcases/kernel/syscalls/statmount/statmount03.c
> index dface528f6..36250c1c0d 100644
> --- a/testcases/kernel/syscalls/statmount/statmount03.c
> +++ b/testcases/kernel/syscalls/statmount/statmount03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that statmount() is correctly reading mount information
> * (mount id, parent mount id, mount attributes etc.) using STATMOUNT_MNT_BASIC.
> *
> diff --git a/testcases/kernel/syscalls/statmount/statmount04.c b/testcases/kernel/syscalls/statmount/statmount04.c
> index 509fdf6a17..7fd4fe8c5e 100644
> --- a/testcases/kernel/syscalls/statmount/statmount04.c
> +++ b/testcases/kernel/syscalls/statmount/statmount04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that statmount() is correctly reading propagation from
> * what mount in current namespace using STATMOUNT_PROPAGATE_FROM.
> *
> diff --git a/testcases/kernel/syscalls/statmount/statmount05.c b/testcases/kernel/syscalls/statmount/statmount05.c
> index 95e674c069..a517f82123 100644
> --- a/testcases/kernel/syscalls/statmount/statmount05.c
> +++ b/testcases/kernel/syscalls/statmount/statmount05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies STATMOUNT_MNT_ROOT and STATMOUNT_MNT_POINT functionalities
> * of statmount(). In particular, STATMOUNT_MNT_ROOT will give the mount root
> * (i.e. mount --bind /mnt /bla -> /mnt) and STATMOUNT_MNT_POINT will
> diff --git a/testcases/kernel/syscalls/statmount/statmount06.c b/testcases/kernel/syscalls/statmount/statmount06.c
> index 73740407ea..fe41d5b87e 100644
> --- a/testcases/kernel/syscalls/statmount/statmount06.c
> +++ b/testcases/kernel/syscalls/statmount/statmount06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that statmount() is correctly reading name of the
> * filesystem type using STATMOUNT_FS_TYPE.
> *
> diff --git a/testcases/kernel/syscalls/statmount/statmount07.c b/testcases/kernel/syscalls/statmount/statmount07.c
> index fc4f204795..2053dcc6e4 100644
> --- a/testcases/kernel/syscalls/statmount/statmount07.c
> +++ b/testcases/kernel/syscalls/statmount/statmount07.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that statmount() is raising the correct errors according
> * with invalid input values.
> */
> diff --git a/testcases/kernel/syscalls/statmount/statmount08.c b/testcases/kernel/syscalls/statmount/statmount08.c
> index 21b8b73420..b77116f058 100644
> --- a/testcases/kernel/syscalls/statmount/statmount08.c
> +++ b/testcases/kernel/syscalls/statmount/statmount08.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that statmount() raises EPERM when mount point is not accessible.
> */
>
> diff --git a/testcases/kernel/syscalls/statvfs/statvfs01.c b/testcases/kernel/syscalls/statvfs/statvfs01.c
> index 1aafe5e4b2..4e901a0a20 100644
> --- a/testcases/kernel/syscalls/statvfs/statvfs01.c
> +++ b/testcases/kernel/syscalls/statvfs/statvfs01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that statvfs() executes successfully for all
> * available filesystems. Verify statvfs.f_namemax field
> * by trying to create files of valid and invalid length names.
> diff --git a/testcases/kernel/syscalls/statvfs/statvfs02.c b/testcases/kernel/syscalls/statvfs/statvfs02.c
> index 506a35fea7..5ed30d31d9 100644
> --- a/testcases/kernel/syscalls/statvfs/statvfs02.c
> +++ b/testcases/kernel/syscalls/statvfs/statvfs02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that statvfs() fails with:
> *
> * - EFAULT when path points to an invalid address.
> diff --git a/testcases/kernel/syscalls/statx/statx01.c b/testcases/kernel/syscalls/statx/statx01.c
> index f9c2748d23..dc63659cbd 100644
> --- a/testcases/kernel/syscalls/statx/statx01.c
> +++ b/testcases/kernel/syscalls/statx/statx01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This code tests the functionality of statx system call.
> *
> * The metadata for normal file are tested against expected values:
> diff --git a/testcases/kernel/syscalls/statx/statx02.c b/testcases/kernel/syscalls/statx/statx02.c
> index 5ed80894d5..c8cb8987a5 100644
> --- a/testcases/kernel/syscalls/statx/statx02.c
> +++ b/testcases/kernel/syscalls/statx/statx02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This code tests the following flags with statx syscall:
> *
> * - AT_EMPTY_PATH
> diff --git a/testcases/kernel/syscalls/statx/statx03.c b/testcases/kernel/syscalls/statx/statx03.c
> index 2465d87730..4877a3e49f 100644
> --- a/testcases/kernel/syscalls/statx/statx03.c
> +++ b/testcases/kernel/syscalls/statx/statx03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test basic error handling of statx syscall:
> *
> * - EBADF - Bad file descriptor
> diff --git a/testcases/kernel/syscalls/statx/statx04.c b/testcases/kernel/syscalls/statx/statx04.c
> index c2ed52deb2..af30a200ef 100644
> --- a/testcases/kernel/syscalls/statx/statx04.c
> +++ b/testcases/kernel/syscalls/statx/statx04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test whether the kernel properly advertises support for statx() attributes:
> *
> * - STATX_ATTR_COMPRESSED: The file is compressed by the filesystem.
> diff --git a/testcases/kernel/syscalls/statx/statx05.c b/testcases/kernel/syscalls/statx/statx05.c
> index 2411f3f9fe..2a46032260 100644
> --- a/testcases/kernel/syscalls/statx/statx05.c
> +++ b/testcases/kernel/syscalls/statx/statx05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test statx syscall with STATX_ATTR_ENCRYPTED flag, setting a key is required
> * for the file to be encrypted by the filesystem.
> *
> diff --git a/testcases/kernel/syscalls/statx/statx06.c b/testcases/kernel/syscalls/statx/statx06.c
> index d3dd9b9cf7..9795740c45 100644
> --- a/testcases/kernel/syscalls/statx/statx06.c
> +++ b/testcases/kernel/syscalls/statx/statx06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test the following file timestamps of statx syscall:
> *
> * - btime - The time before and after the execution of the create system call is noted.
> diff --git a/testcases/kernel/syscalls/statx/statx07.c b/testcases/kernel/syscalls/statx/statx07.c
> index 9681743307..770a55ea2a 100644
> --- a/testcases/kernel/syscalls/statx/statx07.c
> +++ b/testcases/kernel/syscalls/statx/statx07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This code tests the following flags:
> *
> * - AT_STATX_FORCE_SYNC
> diff --git a/testcases/kernel/syscalls/statx/statx08.c b/testcases/kernel/syscalls/statx/statx08.c
> index 64b36986d2..caced5d3d7 100644
> --- a/testcases/kernel/syscalls/statx/statx08.c
> +++ b/testcases/kernel/syscalls/statx/statx08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This case tests whether the attributes field of statx received expected value
> * by using flags in the stx_attributes_mask field of statx.
> * File set with following flags by using SAFE_IOCTL:
> diff --git a/testcases/kernel/syscalls/statx/statx09.c b/testcases/kernel/syscalls/statx/statx09.c
> index 864e35c7d1..ee4be42507 100644
> --- a/testcases/kernel/syscalls/statx/statx09.c
> +++ b/testcases/kernel/syscalls/statx/statx09.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This code tests if STATX_ATTR_VERITY flag in the statx attributes is set correctly.
> *
> * The statx() system call sets STATX_ATTR_VERITY if the file has fs-verity
> diff --git a/testcases/kernel/syscalls/statx/statx10.c b/testcases/kernel/syscalls/statx/statx10.c
> index 42106285e5..079fb67a67 100644
> --- a/testcases/kernel/syscalls/statx/statx10.c
> +++ b/testcases/kernel/syscalls/statx/statx10.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It is a basic test for STATX_DIOALIGN mask on ext4 and xfs filesystem.
> *
> * - STATX_DIOALIGN Want stx_dio_mem_align and stx_dio_offset_align value
> diff --git a/testcases/kernel/syscalls/statx/statx11.c b/testcases/kernel/syscalls/statx/statx11.c
> index 653050855f..5465c265bb 100644
> --- a/testcases/kernel/syscalls/statx/statx11.c
> +++ b/testcases/kernel/syscalls/statx/statx11.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It is a basic test for STATX_DIOALIGN mask on block device.
> *
> * - STATX_DIOALIGN Want stx_dio_mem_align and stx_dio_offset_align value
> diff --git a/testcases/kernel/syscalls/statx/statx12.c b/testcases/kernel/syscalls/statx/statx12.c
> index 432f1cb771..8b5393aab9 100644
> --- a/testcases/kernel/syscalls/statx/statx12.c
> +++ b/testcases/kernel/syscalls/statx/statx12.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * It is a basic test for STATX_ATTR_MOUNT_ROOT flag.
> *
> * This flag indicates whether the path or fd refers to the root of a mount
> diff --git a/testcases/kernel/syscalls/swapoff/swapoff01.c b/testcases/kernel/syscalls/swapoff/swapoff01.c
> index e97ff2c626..bf097ac1aa 100644
> --- a/testcases/kernel/syscalls/swapoff/swapoff01.c
> +++ b/testcases/kernel/syscalls/swapoff/swapoff01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that swapoff() succeeds.
> */
>
> diff --git a/testcases/kernel/syscalls/swapoff/swapoff02.c b/testcases/kernel/syscalls/swapoff/swapoff02.c
> index 0ab8338c51..b6c4289891 100644
> --- a/testcases/kernel/syscalls/swapoff/swapoff02.c
> +++ b/testcases/kernel/syscalls/swapoff/swapoff02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test case checks whether swapoff(2) system call returns
> * 1. EINVAL when the path does not exist
> * 2. ENOENT when the path exists but is invalid
> diff --git a/testcases/kernel/syscalls/swapon/swapon01.c b/testcases/kernel/syscalls/swapon/swapon01.c
> index 7d1ec70702..a214bc9dbf 100644
> --- a/testcases/kernel/syscalls/swapon/swapon01.c
> +++ b/testcases/kernel/syscalls/swapon/swapon01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Checks that swapon() succeds with swapfile.
> * Testing on all filesystems which support swap file.
> */
> diff --git a/testcases/kernel/syscalls/swapon/swapon02.c b/testcases/kernel/syscalls/swapon/swapon02.c
> index 73cc3bb44f..625d463f72 100644
> --- a/testcases/kernel/syscalls/swapon/swapon02.c
> +++ b/testcases/kernel/syscalls/swapon/swapon02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test case checks whether swapon(2) system call returns:
> *
> * - ENOENT when the path does not exist
> diff --git a/testcases/kernel/syscalls/swapon/swapon03.c b/testcases/kernel/syscalls/swapon/swapon03.c
> index 436f864eba..0068560fea 100644
> --- a/testcases/kernel/syscalls/swapon/swapon03.c
> +++ b/testcases/kernel/syscalls/swapon/swapon03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test case checks whether swapon(2) system call returns:
> *
> * - EPERM when there are more than MAX_SWAPFILES already in use.
> diff --git a/testcases/kernel/syscalls/symlink/symlink02.c b/testcases/kernel/syscalls/symlink/symlink02.c
> index d2226501e0..e5cf1c8ac6 100644
> --- a/testcases/kernel/syscalls/symlink/symlink02.c
> +++ b/testcases/kernel/syscalls/symlink/symlink02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the symlink() system call.
> */
>
> diff --git a/testcases/kernel/syscalls/symlink/symlink04.c b/testcases/kernel/syscalls/symlink/symlink04.c
> index c43a03a264..b8aca24126 100644
> --- a/testcases/kernel/syscalls/symlink/symlink04.c
> +++ b/testcases/kernel/syscalls/symlink/symlink04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that a symbolic link may point to an existing file or
> * to a nonexistent one.
> */
> diff --git a/testcases/kernel/syscalls/sync_file_range/sync_file_range01.c b/testcases/kernel/syscalls/sync_file_range/sync_file_range01.c
> index 47188aa487..ead4314a66 100644
> --- a/testcases/kernel/syscalls/sync_file_range/sync_file_range01.c
> +++ b/testcases/kernel/syscalls/sync_file_range/sync_file_range01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic error conditions test for sync_file_range() system call, tests for:
> *
> * - EBADFD Wrong filedescriptor
> diff --git a/testcases/kernel/syscalls/sync_file_range/sync_file_range02.c b/testcases/kernel/syscalls/sync_file_range/sync_file_range02.c
> index 28a8156c8f..761a396feb 100644
> --- a/testcases/kernel/syscalls/sync_file_range/sync_file_range02.c
> +++ b/testcases/kernel/syscalls/sync_file_range/sync_file_range02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests if sync_file_range() does sync a test file range with a many dirty pages
> * to a block device. Also, it tests all supported filesystems on a test block
> * device.
> diff --git a/testcases/kernel/syscalls/syscall/syscall01.c b/testcases/kernel/syscalls/syscall/syscall01.c
> index 356eb8f0d4..deb8a4e5dc 100644
> --- a/testcases/kernel/syscalls/syscall/syscall01.c
> +++ b/testcases/kernel/syscalls/syscall/syscall01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for syscall().
> *
> * Compare raw get{g,p,u}id results with their glibc wrappers.
> diff --git a/testcases/kernel/syscalls/sysfs/sysfs01.c b/testcases/kernel/syscalls/sysfs/sysfs01.c
> index 3a91fcb0b4..a83053df88 100644
> --- a/testcases/kernel/syscalls/sysfs/sysfs01.c
> +++ b/testcases/kernel/syscalls/sysfs/sysfs01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is run for option 1 for sysfs(2).
> * Translate the filesystem identifier string fsname into a filesystem type index.
> */
> diff --git a/testcases/kernel/syscalls/sysfs/sysfs02.c b/testcases/kernel/syscalls/sysfs/sysfs02.c
> index b6d8103649..4bca516163 100644
> --- a/testcases/kernel/syscalls/sysfs/sysfs02.c
> +++ b/testcases/kernel/syscalls/sysfs/sysfs02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is run for option 2 for sysfs(2).
> * Translate the filesystem type index fs_index into a null-terminated filesystem
> * identifier string. This string will be written to the buffer pointed to by buf.
> diff --git a/testcases/kernel/syscalls/sysfs/sysfs03.c b/testcases/kernel/syscalls/sysfs/sysfs03.c
> index b679d78097..aae962f8eb 100644
> --- a/testcases/kernel/syscalls/sysfs/sysfs03.c
> +++ b/testcases/kernel/syscalls/sysfs/sysfs03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is run for option 3 for sysfs(2).
> * Return the total number of filesystem types currently present in the kernel.
> */
> diff --git a/testcases/kernel/syscalls/sysfs/sysfs04.c b/testcases/kernel/syscalls/sysfs/sysfs04.c
> index ffda51bf38..ef504b9320 100644
> --- a/testcases/kernel/syscalls/sysfs/sysfs04.c
> +++ b/testcases/kernel/syscalls/sysfs/sysfs04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test case checks whether sysfs(2) system call returns
> * appropriate error number for invalid option.
> */
> diff --git a/testcases/kernel/syscalls/sysfs/sysfs05.c b/testcases/kernel/syscalls/sysfs/sysfs05.c
> index bfcead7dbe..922c4630d3 100644
> --- a/testcases/kernel/syscalls/sysfs/sysfs05.c
> +++ b/testcases/kernel/syscalls/sysfs/sysfs05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test case checks whether sysfs(2) system call returns appropriate
> * error number for invalid option and for invalid filesystem name and fs index out of bounds.
> */
> diff --git a/testcases/kernel/syscalls/syslog/syslog11.c b/testcases/kernel/syscalls/syslog/syslog11.c
> index 733da5f963..28a6fdf494 100644
> --- a/testcases/kernel/syscalls/syslog/syslog11.c
> +++ b/testcases/kernel/syscalls/syslog/syslog11.c
> @@ -5,8 +5,6 @@
> */
>
> /*
> - * [Description]
> - *
> * Verify that, syslog(2) is successful for type ranging from 1 to 8
> */
>
> diff --git a/testcases/kernel/syscalls/syslog/syslog12.c b/testcases/kernel/syscalls/syslog/syslog12.c
> index e8b39a1150..9d519b548d 100644
> --- a/testcases/kernel/syscalls/syslog/syslog12.c
> +++ b/testcases/kernel/syscalls/syslog/syslog12.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that syslog(2) system call fails with appropriate error number:
> *
> * 1. EINVAL -- invalid type/command
> diff --git a/testcases/kernel/syscalls/tee/tee02.c b/testcases/kernel/syscalls/tee/tee02.c
> index 945261223b..0ee94000d3 100644
> --- a/testcases/kernel/syscalls/tee/tee02.c
> +++ b/testcases/kernel/syscalls/tee/tee02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, tee(2) returns -1 and sets errno to:
> *
> * 1. EINVAL if fd_in does not refer to a pipe.
> diff --git a/testcases/kernel/syscalls/time/time01.c b/testcases/kernel/syscalls/time/time01.c
> index d8625c04d0..7085f19896 100644
> --- a/testcases/kernel/syscalls/time/time01.c
> +++ b/testcases/kernel/syscalls/time/time01.c
> @@ -4,7 +4,6 @@
> */
>
> /*\
> - * [Description]
> * - Basic test for the time(2) system call. It is intended to provide a
> * limited exposure of the system call.
> * - Verify that time(2) returns the value of time in seconds since the Epoch
> diff --git a/testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c b/testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c
> index 57c2147bf4..a015cbe4c4 100644
> --- a/testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c
> +++ b/testcases/kernel/syscalls/timer_getoverrun/timer_getoverrun01.c
> @@ -10,8 +10,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test checks base timer_getoverrun() functionality.
> */
>
> diff --git a/testcases/kernel/syscalls/timerfd/timerfd02.c b/testcases/kernel/syscalls/timerfd/timerfd02.c
> index 3dabfb5c06..f89d41502e 100644
> --- a/testcases/kernel/syscalls/timerfd/timerfd02.c
> +++ b/testcases/kernel/syscalls/timerfd/timerfd02.c
> @@ -5,8 +5,6 @@
> * Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
> */
> /*\
> - * [Description]
> - *
> * This test verifies that:
> * - TFD_CLOEXEC sets the close-on-exec file status flag on the new open file
> * - TFD_NONBLOCK sets the O_NONBLOCK file status flag on the new open file
> diff --git a/testcases/kernel/syscalls/timerfd/timerfd_create01.c b/testcases/kernel/syscalls/timerfd/timerfd_create01.c
> index 18a2335867..2a658f0674 100644
> --- a/testcases/kernel/syscalls/timerfd/timerfd_create01.c
> +++ b/testcases/kernel/syscalls/timerfd/timerfd_create01.c
> @@ -5,8 +5,6 @@
> * Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
> */
> /*\
> - * [Description]
> - *
> * This test verifies that:
> * - clockid argument is neither CLOCK_MONOTONIC nor CLOCK_REALTIME,
> * EINVAL would return.
> diff --git a/testcases/kernel/syscalls/times/times01.c b/testcases/kernel/syscalls/times/times01.c
> index 408b91c9c8..4c809aa625 100644
> --- a/testcases/kernel/syscalls/times/times01.c
> +++ b/testcases/kernel/syscalls/times/times01.c
> @@ -3,8 +3,6 @@
> * Copyright (c) 2000 Silicon Graphics, Inc. All Rights Reserved.
> */
> /*\
> - * [Description]
> - *
> * This is a Phase I test for the times(2) system call. It is intended to
> * provide a limited exposure of the system call.
> */
> diff --git a/testcases/kernel/syscalls/tkill/tkill01.c b/testcases/kernel/syscalls/tkill/tkill01.c
> index 15f2dfb3e9..d97ed0b941 100644
> --- a/testcases/kernel/syscalls/tkill/tkill01.c
> +++ b/testcases/kernel/syscalls/tkill/tkill01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic tests for the tkill syscall.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/tkill/tkill02.c b/testcases/kernel/syscalls/tkill/tkill02.c
> index 6cd60923bd..30823f61b2 100644
> --- a/testcases/kernel/syscalls/tkill/tkill02.c
> +++ b/testcases/kernel/syscalls/tkill/tkill02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic tests for the tkill() errors.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/truncate/truncate02.c b/testcases/kernel/syscalls/truncate/truncate02.c
> index 8d7f9a6fab..2ed6f18e6c 100644
> --- a/testcases/kernel/syscalls/truncate/truncate02.c
> +++ b/testcases/kernel/syscalls/truncate/truncate02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * - truncate(2) truncates a file to a specified length successfully.
> diff --git a/testcases/kernel/syscalls/truncate/truncate03.c b/testcases/kernel/syscalls/truncate/truncate03.c
> index 2607e7d63e..a017ee4b62 100644
> --- a/testcases/kernel/syscalls/truncate/truncate03.c
> +++ b/testcases/kernel/syscalls/truncate/truncate03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that:
> *
> * - truncate(2) returns -1 and sets errno to EACCES if search/write
> diff --git a/testcases/kernel/syscalls/umount/umount01.c b/testcases/kernel/syscalls/umount/umount01.c
> index 264c8f7d7e..a8f34e7a15 100644
> --- a/testcases/kernel/syscalls/umount/umount01.c
> +++ b/testcases/kernel/syscalls/umount/umount01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the umount(2) system call.
> */
>
> diff --git a/testcases/kernel/syscalls/umount/umount02.c b/testcases/kernel/syscalls/umount/umount02.c
> index acc35e8a4f..e7fe246eb9 100644
> --- a/testcases/kernel/syscalls/umount/umount02.c
> +++ b/testcases/kernel/syscalls/umount/umount02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check for basic errors returned by umount(2) system call.
> *
> * Verify that umount(2) returns -1 and sets errno to
> diff --git a/testcases/kernel/syscalls/umount/umount03.c b/testcases/kernel/syscalls/umount/umount03.c
> index 3260312f7f..c181e63d92 100644
> --- a/testcases/kernel/syscalls/umount/umount03.c
> +++ b/testcases/kernel/syscalls/umount/umount03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that umount(2) returns -1 and sets errno to EPERM if the user
> * is not the super-user.
> */
> diff --git a/testcases/kernel/syscalls/umount2/umount2_02.c b/testcases/kernel/syscalls/umount2/umount2_02.c
> index f4b228f975..ff0bdf911a 100644
> --- a/testcases/kernel/syscalls/umount2/umount2_02.c
> +++ b/testcases/kernel/syscalls/umount2/umount2_02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test for feature MNT_EXPIRE of umount2():
> *
> * - EINVAL when flag is specified with either MNT_FORCE or MNT_DETACH
> diff --git a/testcases/kernel/syscalls/unlink/unlink05.c b/testcases/kernel/syscalls/unlink/unlink05.c
> index 81afeebf52..b270269601 100644
> --- a/testcases/kernel/syscalls/unlink/unlink05.c
> +++ b/testcases/kernel/syscalls/unlink/unlink05.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the basic functionality of the unlink(2):
> *
> * - unlink(2) can delete regular file successfully.
> diff --git a/testcases/kernel/syscalls/unlink/unlink07.c b/testcases/kernel/syscalls/unlink/unlink07.c
> index b7bbd8d19b..ea99392d28 100644
> --- a/testcases/kernel/syscalls/unlink/unlink07.c
> +++ b/testcases/kernel/syscalls/unlink/unlink07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that unlink(2) fails with
> *
> * - ENOENT when file does not exist
> diff --git a/testcases/kernel/syscalls/unlink/unlink08.c b/testcases/kernel/syscalls/unlink/unlink08.c
> index 1fe6e89f71..6d3ab261f8 100644
> --- a/testcases/kernel/syscalls/unlink/unlink08.c
> +++ b/testcases/kernel/syscalls/unlink/unlink08.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that unlink(2) fails with
> *
> * - EACCES when no write access to the directory containing pathname
> diff --git a/testcases/kernel/syscalls/unlink/unlink09.c b/testcases/kernel/syscalls/unlink/unlink09.c
> index 55bc4ab27c..e2ee062cb9 100644
> --- a/testcases/kernel/syscalls/unlink/unlink09.c
> +++ b/testcases/kernel/syscalls/unlink/unlink09.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that unlink(2) fails with EPERM when target file is marked as
> * immutable or append-only.
> */
> diff --git a/testcases/kernel/syscalls/unlink/unlink10.c b/testcases/kernel/syscalls/unlink/unlink10.c
> index 861f24a50e..453dd5c754 100644
> --- a/testcases/kernel/syscalls/unlink/unlink10.c
> +++ b/testcases/kernel/syscalls/unlink/unlink10.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that unlink(2) fails with EROFS when target file is on a read-only
> * filesystem.
> */
> diff --git a/testcases/kernel/syscalls/unlinkat/unlinkat01.c b/testcases/kernel/syscalls/unlinkat/unlinkat01.c
> index 7dba1d6414..9374466f5f 100644
> --- a/testcases/kernel/syscalls/unlinkat/unlinkat01.c
> +++ b/testcases/kernel/syscalls/unlinkat/unlinkat01.c
> @@ -7,7 +7,6 @@
> */
>
> /*\
> - * [Description]
> * Basic unlinkat() test.
> */
>
> diff --git a/testcases/kernel/syscalls/unshare/unshare01.c b/testcases/kernel/syscalls/unshare/unshare01.c
> index ad26a908d9..6e6315b114 100644
> --- a/testcases/kernel/syscalls/unshare/unshare01.c
> +++ b/testcases/kernel/syscalls/unshare/unshare01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic tests for the unshare() syscall.
> *
> * [Algorithm]
> diff --git a/testcases/kernel/syscalls/unshare/unshare02.c b/testcases/kernel/syscalls/unshare/unshare02.c
> index 3783e8e9ad..436b0c3b50 100644
> --- a/testcases/kernel/syscalls/unshare/unshare02.c
> +++ b/testcases/kernel/syscalls/unshare/unshare02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic tests for the unshare(2) errors.
> *
> * - EINVAL on invalid flags
> diff --git a/testcases/kernel/syscalls/utime/utime01.c b/testcases/kernel/syscalls/utime/utime01.c
> index 0cc9822e71..2a74f8952d 100644
> --- a/testcases/kernel/syscalls/utime/utime01.c
> +++ b/testcases/kernel/syscalls/utime/utime01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the system call utime() successfully changes the last
> * access and modification times of a file to the current time if the
> * times argument is NULL and the user ID of the process is "root".
> diff --git a/testcases/kernel/syscalls/utime/utime02.c b/testcases/kernel/syscalls/utime/utime02.c
> index fdcd40f660..52185d839e 100644
> --- a/testcases/kernel/syscalls/utime/utime02.c
> +++ b/testcases/kernel/syscalls/utime/utime02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the system call utime() successfully changes the last
> * access and modification times of a file to the current time,
> * under the following constraints:
> diff --git a/testcases/kernel/syscalls/utime/utime03.c b/testcases/kernel/syscalls/utime/utime03.c
> index 734f4897b7..564e1de3dd 100644
> --- a/testcases/kernel/syscalls/utime/utime03.c
> +++ b/testcases/kernel/syscalls/utime/utime03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the system call utime() successfully sets the modification
> * and access times of a file to the current time, under the following
> * constraints:
> diff --git a/testcases/kernel/syscalls/utime/utime04.c b/testcases/kernel/syscalls/utime/utime04.c
> index 7b820ab061..0728454bbb 100644
> --- a/testcases/kernel/syscalls/utime/utime04.c
> +++ b/testcases/kernel/syscalls/utime/utime04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the system call utime() successfully changes the last
> * access and modification times of a file to the values specified by
> * times argument, under the following constraints:
> diff --git a/testcases/kernel/syscalls/utime/utime05.c b/testcases/kernel/syscalls/utime/utime05.c
> index 941a3ccee8..045e275b9b 100644
> --- a/testcases/kernel/syscalls/utime/utime05.c
> +++ b/testcases/kernel/syscalls/utime/utime05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that the system call utime() successfully changes the last
> * access and modification times of a file to the values specified by
> * times argument, under the following constraints:
> diff --git a/testcases/kernel/syscalls/utime/utime06.c b/testcases/kernel/syscalls/utime/utime06.c
> index 3ba62a3162..c03b1d8527 100644
> --- a/testcases/kernel/syscalls/utime/utime06.c
> +++ b/testcases/kernel/syscalls/utime/utime06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that system call utime() fails with
> *
> * - EACCES when times argument is NULL and user does not have rights to modify
> diff --git a/testcases/kernel/syscalls/utime/utime07.c b/testcases/kernel/syscalls/utime/utime07.c
> index 8889b3a6d1..e44b246dcd 100644
> --- a/testcases/kernel/syscalls/utime/utime07.c
> +++ b/testcases/kernel/syscalls/utime/utime07.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test verifies that utime() is working correctly on symlink()
> * generated files.
> *
> diff --git a/testcases/kernel/syscalls/utimensat/utimensat01.c b/testcases/kernel/syscalls/utimensat/utimensat01.c
> index f9f5d7f6cd..c113279622 100644
> --- a/testcases/kernel/syscalls/utimensat/utimensat01.c
> +++ b/testcases/kernel/syscalls/utimensat/utimensat01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic utimnsat() test.
> */
>
> diff --git a/testcases/kernel/syscalls/utimes/utimes01.c b/testcases/kernel/syscalls/utimes/utimes01.c
> index 3c97c40532..b66f39b654 100644
> --- a/testcases/kernel/syscalls/utimes/utimes01.c
> +++ b/testcases/kernel/syscalls/utimes/utimes01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, utimes(2) returns -1 and sets errno to
> *
> * 1. EACCES if times is NULL, the caller's effective user ID does not match
> diff --git a/testcases/kernel/syscalls/vmsplice/vmsplice02.c b/testcases/kernel/syscalls/vmsplice/vmsplice02.c
> index 24ff3c0f85..94c98fb13b 100644
> --- a/testcases/kernel/syscalls/vmsplice/vmsplice02.c
> +++ b/testcases/kernel/syscalls/vmsplice/vmsplice02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that, vmsplice(2) returns -1 and sets errno to:
> *
> * - EBADF if fd is not valid.
> diff --git a/testcases/kernel/syscalls/wait/wait01.c b/testcases/kernel/syscalls/wait/wait01.c
> index 8245898dd2..685da14bc3 100644
> --- a/testcases/kernel/syscalls/wait/wait01.c
> +++ b/testcases/kernel/syscalls/wait/wait01.c
> @@ -4,8 +4,6 @@
> * Author: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
> */
> /*\
> - * [Description]
> - *
> * Check that if the calling process does not have any unwaited-for children
> * wait() will return ECHILD.
> */
> diff --git a/testcases/kernel/syscalls/wait/wait02.c b/testcases/kernel/syscalls/wait/wait02.c
> index 806557c1ba..d5d721f68c 100644
> --- a/testcases/kernel/syscalls/wait/wait02.c
> +++ b/testcases/kernel/syscalls/wait/wait02.c
> @@ -5,8 +5,6 @@
> * CO-PILOT : Dave Fenner
> */
> /*\
> - * [Description]
> - *
> * For a terminated child, test whether wait(2) can get its pid
> * and exit status correctly.
> */
> diff --git a/testcases/kernel/syscalls/wait4/wait402.c b/testcases/kernel/syscalls/wait4/wait402.c
> index 36fba73784..18ed0814f4 100644
> --- a/testcases/kernel/syscalls/wait4/wait402.c
> +++ b/testcases/kernel/syscalls/wait4/wait402.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check for ECHILD errno when call wait4(2) with an invalid pid value.
> */
>
> diff --git a/testcases/kernel/syscalls/wait4/wait403.c b/testcases/kernel/syscalls/wait4/wait403.c
> index 8746794e5a..c610a9fa1d 100644
> --- a/testcases/kernel/syscalls/wait4/wait403.c
> +++ b/testcases/kernel/syscalls/wait4/wait403.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check wait4(INT_MIN, ...) is not allowed. The pid is negated before
> * searching for a group with that pid. Negating INT_MIN is not
> * defined so UBSAN will be triggered if enabled. Also see kill13.
> diff --git a/testcases/kernel/syscalls/waitid/waitid01.c b/testcases/kernel/syscalls/waitid/waitid01.c
> index 136eec8a69..cb444d19a8 100644
> --- a/testcases/kernel/syscalls/waitid/waitid01.c
> +++ b/testcases/kernel/syscalls/waitid/waitid01.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is checking if waitid() syscall does wait for WEXITED and check for
> * the return value.
> */
> diff --git a/testcases/kernel/syscalls/waitid/waitid02.c b/testcases/kernel/syscalls/waitid/waitid02.c
> index f13a4ed00f..ea0d261277 100644
> --- a/testcases/kernel/syscalls/waitid/waitid02.c
> +++ b/testcases/kernel/syscalls/waitid/waitid02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests if waitid() returns EINVAL when passed invalid options flag value.
> */
>
> diff --git a/testcases/kernel/syscalls/waitid/waitid03.c b/testcases/kernel/syscalls/waitid/waitid03.c
> index ef3fd73763..4e70c401fb 100644
> --- a/testcases/kernel/syscalls/waitid/waitid03.c
> +++ b/testcases/kernel/syscalls/waitid/waitid03.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests if waitid() syscall returns ECHILD when the calling process has no
> * child processes.
> */
> diff --git a/testcases/kernel/syscalls/waitid/waitid04.c b/testcases/kernel/syscalls/waitid/waitid04.c
> index 96c1cf8b19..0d4b16118f 100644
> --- a/testcases/kernel/syscalls/waitid/waitid04.c
> +++ b/testcases/kernel/syscalls/waitid/waitid04.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test if waitid() syscall leaves the si_pid set to 0 with WNOHANG flag
> * when no child was waited for.
> */
> diff --git a/testcases/kernel/syscalls/waitid/waitid05.c b/testcases/kernel/syscalls/waitid/waitid05.c
> index 1b9186dc13..db9d3b22d7 100644
> --- a/testcases/kernel/syscalls/waitid/waitid05.c
> +++ b/testcases/kernel/syscalls/waitid/waitid05.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests if waitid() filters children correctly by the group ID.
> *
> * - waitid() with GID + 1 returns ECHILD
> diff --git a/testcases/kernel/syscalls/waitid/waitid06.c b/testcases/kernel/syscalls/waitid/waitid06.c
> index 5f51c81c81..ed6404bf67 100644
> --- a/testcases/kernel/syscalls/waitid/waitid06.c
> +++ b/testcases/kernel/syscalls/waitid/waitid06.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests if waitid() filters children correctly by the PID.
> *
> * - waitid() with PID + 1 returns ECHILD
> diff --git a/testcases/kernel/syscalls/waitid/waitid07.c b/testcases/kernel/syscalls/waitid/waitid07.c
> index d607dbd8f3..e5df1cc426 100644
> --- a/testcases/kernel/syscalls/waitid/waitid07.c
> +++ b/testcases/kernel/syscalls/waitid/waitid07.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if waitid() filters children killed with SIGSTOP.
> */
>
> diff --git a/testcases/kernel/syscalls/waitid/waitid08.c b/testcases/kernel/syscalls/waitid/waitid08.c
> index 2da680e640..519ccf7801 100644
> --- a/testcases/kernel/syscalls/waitid/waitid08.c
> +++ b/testcases/kernel/syscalls/waitid/waitid08.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if waitid() filters children killed with SIGCONT.
> */
>
> diff --git a/testcases/kernel/syscalls/waitid/waitid09.c b/testcases/kernel/syscalls/waitid/waitid09.c
> index 115c2e672d..3a3080bc45 100644
> --- a/testcases/kernel/syscalls/waitid/waitid09.c
> +++ b/testcases/kernel/syscalls/waitid/waitid09.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test that waitid() fails with ECHILD with process that is not child of the
> * current process. We fork() one child just to be sure that there are unwaited
> * for children available while the test runs.
> diff --git a/testcases/kernel/syscalls/waitid/waitid10.c b/testcases/kernel/syscalls/waitid/waitid10.c
> index 9100cc2d7a..14d4ba76bf 100644
> --- a/testcases/kernel/syscalls/waitid/waitid10.c
> +++ b/testcases/kernel/syscalls/waitid/waitid10.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is checking if waitid() syscall recognizes a process that ended
> * with division by zero error.
> */
> diff --git a/testcases/kernel/syscalls/waitid/waitid11.c b/testcases/kernel/syscalls/waitid/waitid11.c
> index e3754bb1d6..63d011e6d5 100644
> --- a/testcases/kernel/syscalls/waitid/waitid11.c
> +++ b/testcases/kernel/syscalls/waitid/waitid11.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * This test is checking if waitid() syscall recognizes a process that has been
> * killed with SIGKILL.
> */
> diff --git a/testcases/kernel/syscalls/waitpid/waitpid01.c b/testcases/kernel/syscalls/waitpid/waitpid01.c
> index 1e38863e6c..cb65d1e20f 100644
> --- a/testcases/kernel/syscalls/waitpid/waitpid01.c
> +++ b/testcases/kernel/syscalls/waitpid/waitpid01.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that when a child kills itself with one of the standard signals,
> * the waiting parent is correctly notified.
> *
> diff --git a/testcases/kernel/syscalls/waitpid/waitpid03.c b/testcases/kernel/syscalls/waitpid/waitpid03.c
> index b2ee0549c5..12a2a214d8 100644
> --- a/testcases/kernel/syscalls/waitpid/waitpid03.c
> +++ b/testcases/kernel/syscalls/waitpid/waitpid03.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check that waitpid() returns the exit status of a specific child process
> * and repeated call on the same process will fail with ECHILD.
> */
> diff --git a/testcases/kernel/syscalls/waitpid/waitpid04.c b/testcases/kernel/syscalls/waitpid/waitpid04.c
> index 7e60ef6ab3..ee8e8daad3 100644
> --- a/testcases/kernel/syscalls/waitpid/waitpid04.c
> +++ b/testcases/kernel/syscalls/waitpid/waitpid04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test to check the error conditions in waitpid() syscall.
> */
>
> diff --git a/testcases/kernel/syscalls/write/write02.c b/testcases/kernel/syscalls/write/write02.c
> index ab38dce77e..a5855c8d6a 100644
> --- a/testcases/kernel/syscalls/write/write02.c
> +++ b/testcases/kernel/syscalls/write/write02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tests for a special case NULL buffer with size 0 is expected to return 0.
> */
>
> diff --git a/testcases/kernel/syscalls/write/write04.c b/testcases/kernel/syscalls/write/write04.c
> index a5d62e0f54..41bd35a101 100644
> --- a/testcases/kernel/syscalls/write/write04.c
> +++ b/testcases/kernel/syscalls/write/write04.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that write(2) fails with errno EAGAIN when attempt to write to fifo
> * opened in O_NONBLOCK mode.
> */
> diff --git a/testcases/kernel/syscalls/write/write05.c b/testcases/kernel/syscalls/write/write05.c
> index b907624a8e..96988b0d0b 100644
> --- a/testcases/kernel/syscalls/write/write05.c
> +++ b/testcases/kernel/syscalls/write/write05.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check the return value, and errnos of write(2)
> *
> * - when the file descriptor is invalid - EBADF
> diff --git a/testcases/kernel/syscalls/write/write06.c b/testcases/kernel/syscalls/write/write06.c
> index aac1e6f7c9..068aaa584f 100644
> --- a/testcases/kernel/syscalls/write/write06.c
> +++ b/testcases/kernel/syscalls/write/write06.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test the write() system call with O_APPEND.
> *
> * The full description of O_APPEND is in open(2) man-pages:
> diff --git a/testcases/kernel/syscalls/writev/writev03.c b/testcases/kernel/syscalls/writev/writev03.c
> index 7074a418a9..f2326095ec 100644
> --- a/testcases/kernel/syscalls/writev/writev03.c
> +++ b/testcases/kernel/syscalls/writev/writev03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Check for potential issues in writev() if the first iovec entry is NULL
> * and the next one is not present in RAM. This can result in a brief window
> * where writev() first writes uninitialized data into the file (possibly
> diff --git a/testcases/kernel/syscalls/writev/writev07.c b/testcases/kernel/syscalls/writev/writev07.c
> index 3dda1caa4e..0798296a72 100644
> --- a/testcases/kernel/syscalls/writev/writev07.c
> +++ b/testcases/kernel/syscalls/writev/writev07.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify writev() behaviour with partially valid iovec list.
> * Kernel <4.8 used to shorten write up to first bad invalid
> * iovec. Starting with 4.8, a writev with short data (under
> diff --git a/testcases/kernel/uevents/uevent01.c b/testcases/kernel/uevents/uevent01.c
> index a1f9941509..09ef424128 100644
> --- a/testcases/kernel/uevents/uevent01.c
> +++ b/testcases/kernel/uevents/uevent01.c
> @@ -5,7 +5,6 @@
> */
>
> /*\
> - * [Description]
> * Very simple uevent netlink socket test.
> *
> * We fork a child that listens for a kernel events while parents attaches and
> diff --git a/testcases/kernel/uevents/uevent02.c b/testcases/kernel/uevents/uevent02.c
> index daa1b4f12c..abae4f88ed 100644
> --- a/testcases/kernel/uevents/uevent02.c
> +++ b/testcases/kernel/uevents/uevent02.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Very simple uevent netlink socket test.
> *
> * We fork a child that listens for a kernel events while parents creates and
> diff --git a/testcases/kernel/uevents/uevent03.c b/testcases/kernel/uevents/uevent03.c
> index f7072db1c5..126c924f18 100644
> --- a/testcases/kernel/uevents/uevent03.c
> +++ b/testcases/kernel/uevents/uevent03.c
> @@ -5,7 +5,6 @@
> */
>
> /*\
> - * [Description]
> * Very simple uevent netlink socket test.
> *
> * We fork a child that listens for a kernel events while parents creates and
> diff --git a/testcases/kernel/watchqueue/wqueue01.c b/testcases/kernel/watchqueue/wqueue01.c
> index 904e512af1..2f621ebc1a 100644
> --- a/testcases/kernel/watchqueue/wqueue01.c
> +++ b/testcases/kernel/watchqueue/wqueue01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if keyctl update is correctly recognized by watch queue.
> */
>
> diff --git a/testcases/kernel/watchqueue/wqueue02.c b/testcases/kernel/watchqueue/wqueue02.c
> index 0c3e947d15..943a62674f 100644
> --- a/testcases/kernel/watchqueue/wqueue02.c
> +++ b/testcases/kernel/watchqueue/wqueue02.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if keyctl unlink is correctly recognized by watch queue.
> */
>
> diff --git a/testcases/kernel/watchqueue/wqueue03.c b/testcases/kernel/watchqueue/wqueue03.c
> index c17fc14525..d36a201e21 100644
> --- a/testcases/kernel/watchqueue/wqueue03.c
> +++ b/testcases/kernel/watchqueue/wqueue03.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if keyctl revoke is correctly recognized by watch queue.
> */
>
> diff --git a/testcases/kernel/watchqueue/wqueue04.c b/testcases/kernel/watchqueue/wqueue04.c
> index fc880064bf..5cb28eb1d6 100644
> --- a/testcases/kernel/watchqueue/wqueue04.c
> +++ b/testcases/kernel/watchqueue/wqueue04.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if keyctl link is correctly recognized by watch queue.
> */
>
> diff --git a/testcases/kernel/watchqueue/wqueue05.c b/testcases/kernel/watchqueue/wqueue05.c
> index 78a4c702ec..9ef1b58142 100644
> --- a/testcases/kernel/watchqueue/wqueue05.c
> +++ b/testcases/kernel/watchqueue/wqueue05.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if keyctl invalidate is correctly recognized by watch queue.
> */
>
> diff --git a/testcases/kernel/watchqueue/wqueue06.c b/testcases/kernel/watchqueue/wqueue06.c
> index 2cb6a966d7..524ba9960d 100644
> --- a/testcases/kernel/watchqueue/wqueue06.c
> +++ b/testcases/kernel/watchqueue/wqueue06.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if keyctl clear is correctly recognized by watch queue.
> */
>
> diff --git a/testcases/kernel/watchqueue/wqueue07.c b/testcases/kernel/watchqueue/wqueue07.c
> index 6c4d1e92ad..4189600ba9 100644
> --- a/testcases/kernel/watchqueue/wqueue07.c
> +++ b/testcases/kernel/watchqueue/wqueue07.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if keyctl setperm is correctly recognized by watch queue.
> */
>
> diff --git a/testcases/kernel/watchqueue/wqueue08.c b/testcases/kernel/watchqueue/wqueue08.c
> index 4ed9522da2..21fbd246b9 100644
> --- a/testcases/kernel/watchqueue/wqueue08.c
> +++ b/testcases/kernel/watchqueue/wqueue08.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Test if key watch removal is correctly recognized by watch queue.
> */
>
> diff --git a/testcases/kernel/watchqueue/wqueue09.c b/testcases/kernel/watchqueue/wqueue09.c
> index 9f077b35be..dfda0cc6f3 100644
> --- a/testcases/kernel/watchqueue/wqueue09.c
> +++ b/testcases/kernel/watchqueue/wqueue09.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Fill the watch queue and wait for a notification loss.
> */
>
> diff --git a/testcases/lib/tst_ns_create.c b/testcases/lib/tst_ns_create.c
> index bd7633b0bc..90862d9dee 100644
> --- a/testcases/lib/tst_ns_create.c
> +++ b/testcases/lib/tst_ns_create.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Creates a child process in the new specified namespace(s), child is then
> * daemonized and is running in the background. PID of the daemonized child
> * process is printed on the stdout. As the new namespace(s) is(are) maintained
> diff --git a/testcases/lib/tst_ns_exec.c b/testcases/lib/tst_ns_exec.c
> index 5d34e9ad5d..d5011231e5 100644
> --- a/testcases/lib/tst_ns_exec.c
> +++ b/testcases/lib/tst_ns_exec.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Enters the namespace(s) of a process specified by a PID and then executes
> * the indicated program inside that namespace(s).
> */
> diff --git a/testcases/lib/tst_ns_ifmove.c b/testcases/lib/tst_ns_ifmove.c
> index 03531fc9bb..ba1d23400f 100644
> --- a/testcases/lib/tst_ns_ifmove.c
> +++ b/testcases/lib/tst_ns_ifmove.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Moves a network interface to the namespace of a process specified by a PID.
> */
>
> diff --git a/testcases/network/can/cve/can_bcm01.c b/testcases/network/can/cve/can_bcm01.c
> index 30d85ad62e..e316a8deb5 100644
> --- a/testcases/network/can/cve/can_bcm01.c
> +++ b/testcases/network/can/cve/can_bcm01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2021-3609
> *
> * Test for race condition vulnerability in CAN BCM. Fixed in:
> diff --git a/testcases/network/iptables/nft02.c b/testcases/network/iptables/nft02.c
> index 8b7248c69b..5f0671c5d3 100644
> --- a/testcases/network/iptables/nft02.c
> +++ b/testcases/network/iptables/nft02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * CVE-2023-31248
> *
> * Test for use-after-free when adding a new rule to a chain deleted
> diff --git a/testcases/network/lib6/asapi_02.c b/testcases/network/lib6/asapi_02.c
> index 7808b2c3a7..55588c3310 100644
> --- a/testcases/network/lib6/asapi_02.c
> +++ b/testcases/network/lib6/asapi_02.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic test for ICMP6_FILTER.
> *
> * For ICMP6_FILTER usage, refer to: https://man.openbsd.org/icmp6.
> diff --git a/testcases/network/lib6/getaddrinfo_01.c b/testcases/network/lib6/getaddrinfo_01.c
> index 1974021413..61a4aad508 100644
> --- a/testcases/network/lib6/getaddrinfo_01.c
> +++ b/testcases/network/lib6/getaddrinfo_01.c
> @@ -8,8 +8,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Basic getaddrinfo() tests.
> *
> * The test adds LTP specific addresses and names to /etc/hosts to avoid
> diff --git a/testcases/network/lib6/in6_01.c b/testcases/network/lib6/in6_01.c
> index 823d3cac7a..b5066a5847 100644
> --- a/testcases/network/lib6/in6_01.c
> +++ b/testcases/network/lib6/in6_01.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Verify that in6 and sockaddr fields are present.
> */
>
> diff --git a/testcases/network/lib6/in6_02.c b/testcases/network/lib6/in6_02.c
> index e9630d7049..71bfe71886 100644
> --- a/testcases/network/lib6/in6_02.c
> +++ b/testcases/network/lib6/in6_02.c
> @@ -7,8 +7,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * IPv6 name to index and index to name function tests.
> */
>
> diff --git a/testcases/network/nfs/nfslock01/nfs_flock.c b/testcases/network/nfs/nfslock01/nfs_flock.c
> index 02f105b22c..dbe5ffe31e 100644
> --- a/testcases/network/nfs/nfslock01/nfs_flock.c
> +++ b/testcases/network/nfs/nfslock01/nfs_flock.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Program for testing file locking. The original data file consists of
> * characters from 'A' to 'Z'. The data file after running this program
> * would consist of lines with 1's in even lines and 0's in odd lines.
> diff --git a/testcases/network/nfs/nfslock01/nfs_flock_dgen.c b/testcases/network/nfs/nfslock01/nfs_flock_dgen.c
> index 6ecdcdc4fe..d050e5e581 100644
> --- a/testcases/network/nfs/nfslock01/nfs_flock_dgen.c
> +++ b/testcases/network/nfs/nfslock01/nfs_flock_dgen.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Tool to generate data for testing file locking.
> * Used in nfslock01.sh.
> */
> diff --git a/testcases/network/sctp/sctp_big_chunk.c b/testcases/network/sctp/sctp_big_chunk.c
> index 4674868467..6e2d6f2fff 100644
> --- a/testcases/network/sctp/sctp_big_chunk.c
> +++ b/testcases/network/sctp/sctp_big_chunk.c
> @@ -5,8 +5,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Regression test for the crash caused by over-sized SCTP chunk,
> * fixed by upstream commit 07f2c7ab6f8d ("sctp: verify size of a new
> * chunk in _sctp_make_chunk()").
> diff --git a/testcases/network/sockets/vsock01.c b/testcases/network/sockets/vsock01.c
> index 7eecebdfcb..416bd65d0e 100644
> --- a/testcases/network/sockets/vsock01.c
> +++ b/testcases/network/sockets/vsock01.c
> @@ -4,8 +4,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Reproducer of CVE-2021-26708
> *
> * Based on POC https://github.com/jordan9001/vsock_poc.
> diff --git a/testcases/realtime/func/matrix_mult/matrix_mult.c b/testcases/realtime/func/matrix_mult/matrix_mult.c
> index e028952be8..dfee3827a0 100644
> --- a/testcases/realtime/func/matrix_mult/matrix_mult.c
> +++ b/testcases/realtime/func/matrix_mult/matrix_mult.c
> @@ -6,8 +6,6 @@
> * Dinakar Guniguntala <dino@in.ibm.com>
> */
> /*\
> - * [Description]
> - *
> * Compare running sequential matrix multiplication routines
> * to running them in parallel to judge multiprocessor
> * performance
> diff --git a/testcases/realtime/func/sched_football/sched_football.c b/testcases/realtime/func/sched_football/sched_football.c
> index 5ffc1ff461..b89970542a 100644
> --- a/testcases/realtime/func/sched_football/sched_football.c
> +++ b/testcases/realtime/func/sched_football/sched_football.c
> @@ -6,8 +6,6 @@
> */
>
> /*\
> - * [Description]
> - *
> * Scheduler test that uses a football analogy.
> *
> * The premise is that we want to make sure that lower priority threads
More information about the ltp
mailing list