IXGBRWSE returns via the buffer keyword the exact area that the exploiter requested to be written to the logstream. Thus, it is that exploiter that knows the mapping.
I conclude, by the fact that SMF apparently documents only the SMF record itself (and that an SMF record is only part of the logstream record), that ether - SMF does not want you to be reading these records and dealing with them on your own; or - it's an oversight; or - it was thought about but was not thought worthwhile. Is there a business need for reading the logstream that such a program as IFASMFDL does not accommodate? Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
