ALLOC
ALLOC(r.u.ntlmInitReply.targetinfo);
ALLOC(et.starttime);
ALLOC(b->rtime);
ALLOC(et.renew_till);
ALLOC(et.caddr);
ALLOC(ek.key_expiration);
ALLOC(ek.starttime);
ALLOC(ek.renew_till);
ALLOC(ek.caddr);
ALLOC(*t);
ALLOC(ent->salttype);
ALLOC(ent->salttype);
ALLOC(ent->salt);
ALLOC(ent->s2kparams);
ALLOC(ent->s2kparams);
ALLOC(rep.padata);
ALLOC(*auth_data);
ALLOC(ref.referred_realm);
ALLOC(ref.true_principal_name);
ALLOC(ref.requested_principal_name);
ALLOC(et->renew_till);
ALLOC(et.starttime);
ALLOC(et.renew_till);
ALLOC(rep.certificate);
ALLOC(rep.hash);
ALLOC(nt.u.negTokenInit.negHints, 1);
ALLOC(nt.u.negTokenInit.negHints->hintName, 1);
ALLOC(nt.u.negTokenResp.negResult, 1);
ALLOC(nt.u.negTokenResp.supportedMech, 1);
ALLOC(nt.u.negTokenResp.responseToken, 1);
ALLOC(nt.u.negTokenResp.mechListMIC, 1);
ALLOC(nt.u.negTokenResp.negResult, 1);
ALLOC(nt.u.negTokenResp.negResult, 1);
ALLOC(nt.u.negTokenResp.responseToken, 1);
ALLOC(nt.u.negTokenResp.mechListMIC, 1);
ALLOC(ni.mechToken, 1);
ALLOC(signer_info->signedAttrs, 1);
ALLOC(sigctx.sd.encapContentInfo.eContent, 1);
ALLOC(sigctx.sd.certificates, 1);
#define ALLOC_SEQ(X, N) do { (X)->len = (N); ALLOC((X)->val, (N)); } while(0)
ALLOC(enc_alg->parameters, 1);
ALLOC(ci.content, 1);
ALLOC(auth_context->keyblock, 1);
ALLOC(p, 1);
ALLOC(p->authenticator, 1);
ALLOC(auth.seq_number, 1);
ALLOC(auth.cksum, 1);
ALLOC(*auth_data, 1);
ALLOC(p, n);
ALLOC(key->schedule, 1);
ALLOC(result->kvno, 1);
ALLOC(*crypto, 1);
ALLOC(*outdata, 1);
ALLOC(ntlm->init.hostname, 1);
ALLOC(ntlm->init.domain, 1);
ALLOC(*subkey, 1);
ALLOC(req_body->enc_authorization_data, 1);
ALLOC(t->req_body.sname, 1);
ALLOC(t->req_body.till, 1);
ALLOC(t->req_body.additional_tickets, 1);
ALLOC(t->padata, 1);
ALLOC(enc_krb_cred_part.timestamp, 1);
ALLOC(enc_krb_cred_part.usec, 1);
ALLOC(enc_krb_cred_part.r_address, 1);
ALLOC(krb_cred_info->prealm, 1);
ALLOC(krb_cred_info->pname, 1);
ALLOC(krb_cred_info->flags, 1);
ALLOC(krb_cred_info->authtime, 1);
ALLOC(krb_cred_info->starttime, 1);
ALLOC(krb_cred_info->endtime, 1);
ALLOC(krb_cred_info->renew_till, 1);
ALLOC(krb_cred_info->srealm, 1);
ALLOC(krb_cred_info->sname, 1);
ALLOC(krb_cred_info->caddr, 1);
ALLOC(a->req_body.till, 1);
ALLOC(a->padata, 1);
ALLOC(a->padata, 1);
ALLOC(*out_md, 1);
ALLOC(a->req_body.till, 1);
ALLOC(p, 1);
#define ALLOC_SEQ(X, N) do { (X)->len = (N); ALLOC((X)->val, (N)); } while(0)
ALLOC(m, 1);
ALLOC(body.seq_number, 1);
ALLOC(a->pkAuthenticator.paChecksum, 1);
ALLOC(a->clientDHNonce, 1);
ALLOC(a->clientPublicValue, 1);
ALLOC(a->clientPublicValue->algorithm.parameters, 1);
ALLOC(content_info->content, 1);
ALLOC(kd.key, 1);
ALLOC(kd.key, 1);
ALLOC(s, 1);
ALLOC(adr->val, adr->len);
uc = ALLOC(struct udp_cache, 1);
uc->uc_entries = ALLOC(cache_ptr, size * SPARSENESS);
uc->uc_fifo = ALLOC(cache_ptr, size);
victim = ALLOC(struct cache_node, 1);
auth = ALLOC(AUTH);
ad = ALLOC(struct ad_private);
uc = ALLOC(struct cl_cache, 1);
uc->uc_entries = ALLOC(cache_ptr, size * SPARSENESS);
uc->uc_fifo = ALLOC(cache_ptr, size);
victim = ALLOC(struct cache_node, 1);
victim->cache_addr.buf = ALLOC(char, xprt->xp_rtaddr.len);
TARFS_DPF(ALLOC, "%s: resized zio index\n", __func__);
TARFS_DPF(ALLOC, "%s: allocated zio\n", __func__);
TARFS_DPF(ALLOC, "%s: allocated zio index\n", __func__);
TARFS_DPF(ALLOC, "%s: failed to lock znode", __func__);
TARFS_DPF(ALLOC, "%s: freeing zstd state\n", __func__);
TARFS_DPF(ALLOC, "%s: freeing index\n", __func__);
TARFS_DPF(ALLOC, "%s: freeing zio\n", __func__);
TARFS_DPF(ALLOC, "%s(%.*s)\n", __func__, (int)namelen, name);
TARFS_DPF(ALLOC, "%s: %.*s = 0x%06x\n", __func__,
TARFS_DPF(ALLOC, "%s: %.*s = 0x??????\n",
TARFS_DPF(ALLOC, "%s: creating %.*s\n", __func__,
TARFS_DPF(ALLOC, "%s: Freeing mount structure %p\n", __func__, tmp);
TARFS_DPF(ALLOC, "%s: freeing tarfs_node structures\n", __func__);
TARFS_DPF(ALLOC, "%s: deleting unr header\n", __func__);
TARFS_DPF(ALLOC, "%s: freeing structure\n", __func__);
TARFS_DPF(ALLOC, "%s: GNU tar format at %zu\n", __func__,
TARFS_DPF(ALLOC, "%s: unsupported TAR format at %zu\n",
TARFS_DPF(ALLOC, "%s: header checksum failed at %zu\n",
TARFS_DPF(ALLOC, "%s: invalid file mode at %zu\n",
TARFS_DPF(ALLOC, "%s: invalid UID at %zu\n",
TARFS_DPF(ALLOC, "%s: invalid GID at %zu\n",
TARFS_DPF(ALLOC, "%s: invalid size at %zu\n",
TARFS_DPF(ALLOC, "%s: invalid modification time at %zu\n",
TARFS_DPF(ALLOC, "%s: [%c] %zu @%jd %o %d:%d\n", __func__,
TARFS_DPF(ALLOC, "%s: %zu-byte global extended header at %zu\n",
TARFS_DPF(ALLOC, "%s: %zu-byte extended header at %zu\n",
TARFS_DPF(ALLOC, "%s: exthdr overflow\n",
TARFS_DPF(ALLOC, "%s: exthdr %s=%s\n", __func__,
TARFS_DPF(ALLOC, "%s: %s: sparse %ld.%ld (%zu bytes)\n", __func__,
TARFS_DPF(ALLOC, "%s: invalid sparse format\n", __func__);
TARFS_DPF(ALLOC, "%s: failed to look up %.*s\n", __func__,
TARFS_DPF(ALLOC, "%s: duplicate file %.*s\n", __func__,
TARFS_DPF(ALLOC, "%s: %.*s: link without target\n",
TARFS_DPF(ALLOC, "%s: %.*s: invalid link to %.*s\n",
TARFS_DPF(ALLOC, "%s: %.*s: link without target\n",
TARFS_DPF(ALLOC, "%s: %.*s: invalid device major\n",
TARFS_DPF(ALLOC, "%s: %.*s: invalid device minor\n",
TARFS_DPF(ALLOC, "%s: %.*s: invalid device major\n",
TARFS_DPF(ALLOC, "%s: %.*s: invalid device minor\n",
TARFS_DPF(ALLOC, "%s: unsupported type %c for %.*s\n",
TARFS_DPF(ALLOC, "%s: exthdr syntax error\n", __func__);
TARFS_DPF(ALLOC, "%s: Allocating tarfs mount structure for vp %p\n",
TARFS_DPF(ALLOC, "%s: Allocated mount structure\n", __func__);
TARFS_DPF(ALLOC, "%s: pfsmnt_root %p\n", __func__, tmp->root);
ALLOC(Firstch, Num_pts);
ALLOC(Seekpts, Num_pts + 1);
ALLOC(&f->obuf, f->obufsize);
ALLOC(&f->ibuf, f->ibufsize);