commit | a120d03c139837c965d9afc411e72a09cdced567 | [log] [tgz] |
---|---|---|
author | Vadim Yanitskiy <vyanitskiy@sysmocom.de> | Wed Nov 22 02:37:39 2023 +0700 |
committer | Vadim Yanitskiy <vyanitskiy@sysmocom.de> | Wed Nov 22 02:37:43 2023 +0700 |
tree | f511aca386d7bbf60dbe6dcd1429873e0da181cd | |
parent | e0666ea5bc3f7ed70c841c45ba4875c46522a471 [diff] |
RSL_Emulation: allow RSL_DchanHdlr sandbox escape for both roles This feature was initially added in 1470fc668 for the RSL_Emulation_CT operating in the BTS role. In a subsequent patch I also need to escape the sandbox, but in my case the RSL_Emulation_CT is playing the BSC role. Change-Id: I42557f85d3e5e7ef7147a87293f5dd1716884534 Related: 1470fc668 "allow ASP_RSL_UD on MSC_ConnHdlr RSL" Related: SYS#6655