In processing the application's resources, it is important that
you understand the environment in which the
unauthorized resource processor operates.
Note the following restrictions:
- Because the unauthorized resource processor receives
control from within the unauthorized control layer of the TSO/E TMP
where ISPF is not active, ISPF services are not available within the
resource processor.
- Because the unauthorized control layer fetches the resource processor,
task libraries such as ISPLLIB are not available at that time. For
more information concerning the search order for resource processors,
refer to Installing Resource Processors.
- In an environment where an application is using its own I/O environment,
that is, an environment created by the STACK ENVIRON=CREATE service,
it is the application's responsibility to pass this ECT between the
application invoking the IKJURPS service and the resource processor.
- If you prompt for input at the terminal, that is, invoke the GETLINE
or PUTGET services, you must do so from within the unauthorized commands
and subtasks, not from within the unauthorized resource processor.
The unauthorized control layer defers attention processing until
the resource processor completes. Therefore, if the resource processor
prompts for input at the terminal and the user presses the attention
key, the user has no means to interrupt or break out of the prompt.
Note that the attention interrupt is not processed until the IKJURPS
service is returning control to the application. Such processing
can provide unexpected results for an interactive user.