Difference between revisions of "Installing Debian Etch on a ThinkPad Z60m"

From ThinkWiki
Jump to: navigation, search
m
m (Wireless Networking)
Line 13: Line 13:
 
Move the *.fw files to {{path|/lib/firmware/}
 
Move the *.fw files to {{path|/lib/firmware/}
  
{{cmdroot|mv *.fw /lib/firmware/}
+
{{cmdroot|mv *.fw /lib/firmware/}}
  
 
Reload the module:
 
Reload the module:
  
 
{{cmdroot|rmmod ipw2200 && modprobe ipw2200}}
 
{{cmdroot|rmmod ipw2200 && modprobe ipw2200}}
 
  
 
== CPU Throttling ==
 
== CPU Throttling ==

Revision as of 13:39, 20 March 2007

NOTE!
This article is not finished yet!

Wireless Networking

The module for this chip is in kernel mainline (ipw2200). The only showstopper is the missing firmware.

Get it here: firmware v3.0

Extract it:

# tar zxvf ipw2200-fw-3.0.tgz

Move the *.fw files to {{path|/lib/firmware/}

# mv *.fw /lib/firmware/

Reload the module:

# rmmod ipw2200 && modprobe ipw2200

CPU Throttling

Load the kernelmodule:

# modprobe speedstep_centrino

Add line "speedstep_centrino" to /etc/modules to load the module on boot.

Install the throttling-daemon:

# apt-get install powernowd

Done.


Active Protection System

Preparing the kernel

To get the headdisk-parking working you have to build your own kernel with the hdaps_protect-patch applied:


Install the prerequisites that we need to compile the new kernel:

# apt-get install kernel-package ncurses-dev fakeroot wget bzip2

Get the recent debian-etch-kernel (2.6.18):

# apt-get install linux-tree-2.6.18

Go to the sources and unpack them:

# cd /usr/src # tar jxvf linux-source-2.6.18.tar.bz2

As etchs kernel is 2.6.18-4 its propably a good idea to get the hdaps_protect patch for 2.6.18-3:

# wget http://www.dresco.co.uk/hdaps/hdaps_protect-2.6.18.3-2.patch

Apply the patch:

# cd linux-source-2.6.18/ # patch -p1 < ../hdaps_protect-2.6.18.3-2.patch

Copy the default-config to the sourcetree:

# cp /boot/config-2.6.18-4-486 ./.config

Build the kernel & packages:

# make-kpkg clean # {{{1}}}

Install the new kernel. Grub-menu should be updated automatically.

# dpkg -i linux-image-2.6.18_thinkpad.1.0_i386.deb

Reboot and select the new kernel. Verify with 'uname -a'. If all things work you can set the new kernel default in /boot/grub/menu.lst with default $entry-number (0..1..2..)

Preparing userspace

Installing the daemon:

# apt-get install hdapsd

To set your harddrive, edit /etc/default/hdapsd:

# start hdapsd at boottime?
START=yes
#
# the name of the disk device that hdapsd should monitor.
#
# usually this is 'hda' the primary master or 'sda'
# on SATA ThinkPads.
DISK=sda
#
# other options to pass to hdapsd.
# the -d and -b options are always passed.
OPTIONS=

Restart hdapsd:

# /etc/init.d/hdapsd restart

You should get something like that in /var/log/syslog when throwing your thinkpad off the table: (No, seriously, shaking it carefully should be sufficient :-) )

Mar 20 12:25:37 localhost kernel: ata_scsi_issue_protect_fn(): unload support reported by drive..
Mar 20 12:25:37 localhost kernel: scsi_protect_queue(): head parked..
Mar 20 12:25:38 localhost kernel: scsi_unprotect_queue(): No pending I/O, re-enabling power management..
Mar 20 12:25:38 localhost hdapsd[12522]: Tue Mar 20 12:25:38 2007: un-parking


Fingerprint-Reader

Install userspace-tools

I got the fingerprint reader working with the new ThinkFinger-drivers (opensource). They are working much better than the closed-source UPEK drivers and don't have this ugly QT-dialog.

Get some debian-packages from here and install them with:

# dpkg -i *.deb

Enroll your fingers

Enroll your fingers with:

# tf-tool --add-user <login>

# tf-tool --add-user name
ThinkFinger 0.2.2 (http://thinkfinger.sourceforge.net/)
Copyright (C) 2006, 2007 Timo Hoenig <thoenig@suse.de>
Initializing... done.
Please swipe your finger (successful swipes 3/3, failed swipes: 0)... done.
Storing data (/etc/pam_thinkfinger/name.bir)... done.

Configuring PAM to use ThinkFinger

Now you can configure pam to use ThinkFinger:

Open /etc/pam.d/common-auth:

# /etc/pam.d/common-auth - authentication settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authentication modules that define
# the central authentication scheme for use on the system
# (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the
# traditional Unix authentication mechanisms.
#
auth     sufficient     pam_thinkfinger.so
auth     required     pam_unix.so try_first_pass

Ready! Works flawlessly with gdm for instance! Enroll user 'root' to use your fingerprint for 'sudo'.