bgpd: XMALLOC usage causes borken assumption in route_match_peer_free
### Pre-submission Checklist
-* Format code (see [Coding style requirements](#coding-style-requirements))
+* Format code (see [Developer's Guidelines](#developers-guidelines))
* Verify and acknowledge license (see [License for contributions](#license-for-contributions))
* Ensure you have properly signed off (see [Signing Off](#signing-off))
* Test building with various configurations:
DEFUN (no_router_isis,
no_router_isis_cmd,
"no router isis WORD",
- "no\n" ROUTER_STR "ISO IS-IS\n" "ISO Routing area tag")
+ "no\n" ROUTER_STR "ISO IS-IS\n" "ISO Routing area tag\n")
{
int idx_word = 3;
return isis_area_destroy(vty, argv[idx_word]->arg);
return ZEBRA_LLT_IEEE802_TR;
case ARPHRD_IEEE80211:
return ZEBRA_LLT_IEEE80211;
+#ifdef ARPHRD_IEEE802154
case ARPHRD_IEEE802154:
return ZEBRA_LLT_IEEE802154;
+#endif
#ifdef ARPHRD_IP6GRE
case ARPHRD_IP6GRE:
return ZEBRA_LLT_IP6GRE;