Installing Debian Etch on a ThinkPad Z60m

From ThinkWiki
Revision as of 13:40, 20 March 2007 by Samoht (Talk | contribs) (Wireless Networking)
Jump to: navigation, search
NOTE!
This article is not finished yet!

Wireless Networking

The module for this chip is in kernel mainline (ipw2200). The only showstopper is the missing firmware.

Get it here: firmware v3.0

Extract it:

# tar zxvf ipw2200-fw-3.0.tgz

Move the *.fw files to /lib/firmware/

# mv *.fw /lib/firmware/

Reload the module:

# rmmod ipw2200 && modprobe ipw2200

CPU Throttling

Load the kernelmodule:

# modprobe speedstep_centrino

Add line "speedstep_centrino" to /etc/modules to load the module on boot.

Install the throttling-daemon:

# apt-get install powernowd

Done.


Active Protection System

Preparing the kernel

To get the headdisk-parking working you have to build your own kernel with the hdaps_protect-patch applied:


Install the prerequisites that we need to compile the new kernel:

# apt-get install kernel-package ncurses-dev fakeroot wget bzip2

Get the recent debian-etch-kernel (2.6.18):

# apt-get install linux-tree-2.6.18

Go to the sources and unpack them:

# cd /usr/src # tar jxvf linux-source-2.6.18.tar.bz2

As etchs kernel is 2.6.18-4 its propably a good idea to get the hdaps_protect patch for 2.6.18-3:

# wget http://www.dresco.co.uk/hdaps/hdaps_protect-2.6.18.3-2.patch

Apply the patch:

# cd linux-source-2.6.18/ # patch -p1 < ../hdaps_protect-2.6.18.3-2.patch

Copy the default-config to the sourcetree:

# cp /boot/config-2.6.18-4-486 ./.config

Build the kernel & packages:

# make-kpkg clean # {{{1}}}

Install the new kernel. Grub-menu should be updated automatically.

# dpkg -i linux-image-2.6.18_thinkpad.1.0_i386.deb

Reboot and select the new kernel. Verify with 'uname -a'. If all things work you can set the new kernel default in /boot/grub/menu.lst with default $entry-number (0..1..2..)

Preparing userspace

Installing the daemon:

# apt-get install hdapsd

To set your harddrive, edit /etc/default/hdapsd:

# start hdapsd at boottime?
START=yes
#
# the name of the disk device that hdapsd should monitor.
#
# usually this is 'hda' the primary master or 'sda'
# on SATA ThinkPads.
DISK=sda
#
# other options to pass to hdapsd.
# the -d and -b options are always passed.
OPTIONS=

Restart hdapsd:

# /etc/init.d/hdapsd restart

You should get something like that in /var/log/syslog when throwing your thinkpad off the table: (No, seriously, shaking it carefully should be sufficient :-) )

Mar 20 12:25:37 localhost kernel: ata_scsi_issue_protect_fn(): unload support reported by drive..
Mar 20 12:25:37 localhost kernel: scsi_protect_queue(): head parked..
Mar 20 12:25:38 localhost kernel: scsi_unprotect_queue(): No pending I/O, re-enabling power management..
Mar 20 12:25:38 localhost hdapsd[12522]: Tue Mar 20 12:25:38 2007: un-parking


Fingerprint-Reader

Install userspace-tools

I got the fingerprint reader working with the new ThinkFinger-drivers (opensource). They are working much better than the closed-source UPEK drivers and don't have this ugly QT-dialog.

Get some debian-packages from here and install them with:

# dpkg -i *.deb

Enroll your fingers

Enroll your fingers with:

# tf-tool --add-user <login>

# tf-tool --add-user name
ThinkFinger 0.2.2 (http://thinkfinger.sourceforge.net/)
Copyright (C) 2006, 2007 Timo Hoenig <thoenig@suse.de>
Initializing... done.
Please swipe your finger (successful swipes 3/3, failed swipes: 0)... done.
Storing data (/etc/pam_thinkfinger/name.bir)... done.

Configuring PAM to use ThinkFinger

Now you can configure pam to use ThinkFinger:

Open /etc/pam.d/common-auth:

# /etc/pam.d/common-auth - authentication settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authentication modules that define
# the central authentication scheme for use on the system
# (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the
# traditional Unix authentication mechanisms.
#
auth     sufficient     pam_thinkfinger.so
auth     required     pam_unix.so try_first_pass

Ready! Works flawlessly with gdm for instance! Enroll user 'root' to use your fingerprint for 'sudo'.