z/OS TSO/E Programming Services
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Process the Application's Resources

z/OS TSO/E Programming Services
SA32-0973-00

In processing the application's resources, it is important that you understand the environment in which the unauthorized resource processor operates. Note the following restrictions:
  • Because the unauthorized resource processor receives control from within the unauthorized control layer of the TSO/E TMP where ISPF is not active, ISPF services are not available within the resource processor.
  • Because the unauthorized control layer fetches the resource processor, task libraries such as ISPLLIB are not available at that time. For more information concerning the search order for resource processors, refer to Installing Resource Processors.
  • In an environment where an application is using its own I/O environment, that is, an environment created by the STACK ENVIRON=CREATE service, it is the application's responsibility to pass this ECT between the application invoking the IKJURPS service and the resource processor.
  • If you prompt for input at the terminal, that is, invoke the GETLINE or PUTGET services, you must do so from within the unauthorized commands and subtasks, not from within the unauthorized resource processor. The unauthorized control layer defers attention processing until the resource processor completes. Therefore, if the resource processor prompts for input at the terminal and the user presses the attention key, the user has no means to interrupt or break out of the prompt. Note that the attention interrupt is not processed until the IKJURPS service is returning control to the application. Such processing can provide unexpected results for an interactive user.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014