IXGBRWSE returns via the buffer keyword the exact area that the exploiter 
requested to be written to the logstream.
Thus, it is that exploiter that knows the mapping.

I conclude, by the fact that SMF apparently documents only the SMF record 
itself (and that an SMF record is only part of the logstream record), that 
ether 
- SMF does not want you to be reading these records 
   and dealing with them on your own; or
- it's an oversight; or
- it was thought about but was not thought worthwhile.

Is there a business need for reading the logstream that such a program as 
IFASMFDL does not accommodate? 

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to