Difference between revisions of "Installing Debian Etch on a ThinkPad Z60m"

From ThinkWiki
Jump to: navigation, search
m (Wireless Networking)
Line 13: Line 13:
Move the *.fw files to {{path|/lib/firmware/}
Move the *.fw files to {{path|/lib/firmware/}
{{cmdroot|mv *.fw /lib/firmware/}
{{cmdroot|mv *.fw /lib/firmware/}}
Reload the module:
Reload the module:
{{cmdroot|rmmod ipw2200 && modprobe ipw2200}}
{{cmdroot|rmmod ipw2200 && modprobe ipw2200}}
== CPU Throttling ==
== CPU Throttling ==

Revision as of 13:39, 20 March 2007

This article is not finished yet!

Wireless Networking

The module for this chip is in kernel mainline (ipw2200). The only showstopper is the missing firmware.

Get it here: firmware v3.0

Extract it:

# tar zxvf ipw2200-fw-3.0.tgz

Move the *.fw files to {{path|/lib/firmware/}

# mv *.fw /lib/firmware/

Reload the module:

# rmmod ipw2200 && modprobe ipw2200

CPU Throttling

Load the kernelmodule:

# modprobe speedstep_centrino

Add line "speedstep_centrino" to /etc/modules to load the module on boot.

Install the throttling-daemon:

# apt-get install powernowd


Active Protection System

Preparing the kernel

To get the headdisk-parking working you have to build your own kernel with the hdaps_protect-patch applied:

Install the prerequisites that we need to compile the new kernel:

# apt-get install kernel-package ncurses-dev fakeroot wget bzip2

Get the recent debian-etch-kernel (2.6.18):

# apt-get install linux-tree-2.6.18

Go to the sources and unpack them:

# cd /usr/src # tar jxvf linux-source-2.6.18.tar.bz2

As etchs kernel is 2.6.18-4 its propably a good idea to get the hdaps_protect patch for 2.6.18-3:

# wget http://www.dresco.co.uk/hdaps/hdaps_protect-

Apply the patch:

# cd linux-source-2.6.18/ # patch -p1 < ../hdaps_protect-

Copy the default-config to the sourcetree:

# cp /boot/config-2.6.18-4-486 ./.config

Build the kernel & packages:

# make-kpkg clean # {{{1}}}

Install the new kernel. Grub-menu should be updated automatically.

# dpkg -i linux-image-2.6.18_thinkpad.1.0_i386.deb

Reboot and select the new kernel. Verify with 'uname -a'. If all things work you can set the new kernel default in /boot/grub/menu.lst with default $entry-number (0..1..2..)

Preparing userspace

Installing the daemon:

# apt-get install hdapsd

To set your harddrive, edit /etc/default/hdapsd:

# start hdapsd at boottime?
# the name of the disk device that hdapsd should monitor.
# usually this is 'hda' the primary master or 'sda'
# on SATA ThinkPads.
# other options to pass to hdapsd.
# the -d and -b options are always passed.

Restart hdapsd:

# /etc/init.d/hdapsd restart

You should get something like that in /var/log/syslog when throwing your thinkpad off the table: (No, seriously, shaking it carefully should be sufficient :-) )

Mar 20 12:25:37 localhost kernel: ata_scsi_issue_protect_fn(): unload support reported by drive..
Mar 20 12:25:37 localhost kernel: scsi_protect_queue(): head parked..
Mar 20 12:25:38 localhost kernel: scsi_unprotect_queue(): No pending I/O, re-enabling power management..
Mar 20 12:25:38 localhost hdapsd[12522]: Tue Mar 20 12:25:38 2007: un-parking


Install userspace-tools

I got the fingerprint reader working with the new ThinkFinger-drivers (opensource). They are working much better than the closed-source UPEK drivers and don't have this ugly QT-dialog.

Get some debian-packages from here and install them with:

# dpkg -i *.deb

Enroll your fingers

Enroll your fingers with:

# tf-tool --add-user <login>

# tf-tool --add-user name
ThinkFinger 0.2.2 (http://thinkfinger.sourceforge.net/)
Copyright (C) 2006, 2007 Timo Hoenig <thoenig@suse.de>
Initializing... done.
Please swipe your finger (successful swipes 3/3, failed swipes: 0)... done.
Storing data (/etc/pam_thinkfinger/name.bir)... done.

Configuring PAM to use ThinkFinger

Now you can configure pam to use ThinkFinger:

Open /etc/pam.d/common-auth:

# /etc/pam.d/common-auth - authentication settings common to all services
# This file is included from other service-specific PAM config files,
# and should contain a list of the authentication modules that define
# the central authentication scheme for use on the system
# (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the
# traditional Unix authentication mechanisms.
auth     sufficient     pam_thinkfinger.so
auth     required     pam_unix.so try_first_pass

Ready! Works flawlessly with gdm for instance! Enroll user 'root' to use your fingerprint for 'sudo'.