Solved

UBUNTU, PERVASIVE  Database and WINE

Posted on 2007-03-26
11
1,758 Views
Last Modified: 2013-12-25
Hello All,

I am relatively new to Linux. I am trying to get it to run a Windows app using WINE. I have wine installed. I have my network shares created and mounted. I have used WINECFG to mape I: to a network share.

I have my ODBC drivers loaded and they connect to the DB successfully. The only problem is that when I actually run the windows app it states it cannot open the DB file. The windows apps expects to find the data and config files on the mapped I: drive.

Do mounted shares act the same as the mapped network drives in windows? If not how do I achieve that functionality. When I try to install Pervasive and it wants to test the network connection, it states the mapped I: drive is a local drive and not a network drive; normally under Windows it is looked at as a NETWORKED drive. I would like to get this working because the alternative, VMWARE defeats the purpose of my goal of moving away from WINDOWS.
0
Comment
Question by:jwhiteman1967
  • 6
  • 5
11 Comments
 
LVL 18

Expert Comment

by:mirtheil
ID: 18794347
You can always skip the Network test but if the OS APIs that the Pervasive client calls don't work the same under WINE as they do on WIndows, there's not a lot that can be done.  

Do any of the Pervasive tools work to access the data on the I: drive?  
0
 

Author Comment

by:jwhiteman1967
ID: 18794490
Pervasive is actually trying to use the data that is on I:.  All the data files, etc reside on I:
0
 
LVL 18

Expert Comment

by:mirtheil
ID: 18794656
Do any of the Pervasive tools work to access the data on the I: drive?
If not, what error is returned?  
0
 

Author Comment

by:jwhiteman1967
ID: 18795139
I get the error message:

SP2 error:
open-file failed - abort?

Looks like it cannot find or open a file.

my ODBC connects just fine.  
0
 
LVL 18

Expert Comment

by:mirtheil
ID: 18797466
Which tool generated that error?  Was there a number?  
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 

Author Comment

by:jwhiteman1967
ID: 18800042
There wasn't an error number and I am not sure if a 'tool' generated the error. It may be generated by the program I am trying to get running.  This machine is just a data collection machine and thus, does not need much other than the pervasive client software installed.
0
 
LVL 18

Expert Comment

by:mirtheil
ID: 18800132
Without knowing the underlying Btrieve error that's being returned, diagnosing is going to be very difficult.  
If you try to open an application data file (that's on drive I:) using the Pervasive Function Executor (WBEXEC32.EXE in PVSW\BIN), does it work or does it give an error? If it gives an error, what is it.  
0
 

Author Comment

by:jwhiteman1967
ID: 18801086
Win I run WBEXEC32.EXE in PVSW\BIN it opens and appears to run, but I cannot do anything.  I have to "break" out of it to stop it.
0
 

Author Comment

by:jwhiteman1967
ID: 18819884
No other help received.
0
 
LVL 18

Accepted Solution

by:
mirtheil earned 500 total points
ID: 18821426
>>Win I run WBEXEC32.EXE in PVSW\BIN it opens and appears to run, but I cannot do anything.  I have to >>"break" out of it to stop it.
 What do you mean that it "appears to run"?  When it starts, it's waiting on a command.  If you go to "File" and then "Open" and select a Btrieve file on the I: drive, what exactly happens?  

Considering I've never tried to run PSQL under WINE, I'm not sure what else I can offer.  If you've got a working Windows machine with the same PSQL install, then the problem is in WINE.  PSQL only uses standard Windows networking calls.
0
 

Author Comment

by:jwhiteman1967
ID: 18823272
Did not know if there was any solution, will award points for a good try.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This article describes some very basic things about SQL Server filegroups.
Entering a date in Microsoft Access can be tricky. A typo can cause month and day to be shuffled, entering the day only causes an error, as does entering, say, day 31 in June. This article shows how an inputmask supported by code can help the user a…
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now