Difference between revisions of "Installing Debian Etch on a ThinkPad Z60m"
m |
m (→Wireless Networking) |
||
Line 13: | Line 13: | ||
Move the *.fw files to {{path|/lib/firmware/} | Move the *.fw files to {{path|/lib/firmware/} | ||
− | {{cmdroot|mv *.fw /lib/firmware/} | + | {{cmdroot|mv *.fw /lib/firmware/}} |
Reload the module: | Reload the module: | ||
{{cmdroot|rmmod ipw2200 && modprobe ipw2200}} | {{cmdroot|rmmod ipw2200 && modprobe ipw2200}} | ||
− | |||
== CPU Throttling == | == CPU Throttling == |
Revision as of 13:39, 20 March 2007
Contents
Wireless Networking
The module for this chip is in kernel mainline (ipw2200). The only showstopper is the missing firmware.
Get it here: firmware v3.0
Extract it:
# tar zxvf ipw2200-fw-3.0.tgz
Move the *.fw files to {{path|/lib/firmware/}
# mv *.fw /lib/firmware/
Reload the module:
# rmmod ipw2200 && modprobe ipw2200
CPU Throttling
Load the kernelmodule:
# modprobe speedstep_centrino
Add line "speedstep_centrino" to /etc/modules to load the module on boot.
Install the throttling-daemon:
# apt-get install powernowd
Done.
Active Protection System
Preparing the kernel
To get the headdisk-parking working you have to build your own kernel with the hdaps_protect-patch applied:
Install the prerequisites that we need to compile the new kernel:
# apt-get install kernel-package ncurses-dev fakeroot wget bzip2
Get the recent debian-etch-kernel (2.6.18):
# apt-get install linux-tree-2.6.18
Go to the sources and unpack them:
# cd /usr/src
# tar jxvf linux-source-2.6.18.tar.bz2
As etchs kernel is 2.6.18-4 its propably a good idea to get the hdaps_protect patch for 2.6.18-3:
# wget http://www.dresco.co.uk/hdaps/hdaps_protect-2.6.18.3-2.patch
Apply the patch:
# cd linux-source-2.6.18/
# patch -p1 < ../hdaps_protect-2.6.18.3-2.patch
Copy the default-config to the sourcetree:
# cp /boot/config-2.6.18-4-486 ./.config
Build the kernel & packages:
# make-kpkg clean
# {{{1}}}
Install the new kernel. Grub-menu should be updated automatically.
# dpkg -i linux-image-2.6.18_thinkpad.1.0_i386.deb
Reboot and select the new kernel. Verify with 'uname -a'. If all things work you can set the new kernel default in /boot/grub/menu.lst with default $entry-number (0..1..2..)
Preparing userspace
Installing the daemon:
# apt-get install hdapsd
To set your harddrive, edit /etc/default/hdapsd:
# start hdapsd at boottime? START=yes # # the name of the disk device that hdapsd should monitor. # # usually this is 'hda' the primary master or 'sda' # on SATA ThinkPads. DISK=sda # # other options to pass to hdapsd. # the -d and -b options are always passed. OPTIONS=
Restart hdapsd:
# /etc/init.d/hdapsd restart
You should get something like that in /var/log/syslog when throwing your thinkpad off the table: (No, seriously, shaking it carefully should be sufficient :-) )
Mar 20 12:25:37 localhost kernel: ata_scsi_issue_protect_fn(): unload support reported by drive.. Mar 20 12:25:37 localhost kernel: scsi_protect_queue(): head parked.. Mar 20 12:25:38 localhost kernel: scsi_unprotect_queue(): No pending I/O, re-enabling power management.. Mar 20 12:25:38 localhost hdapsd[12522]: Tue Mar 20 12:25:38 2007: un-parking
Fingerprint-Reader
Install userspace-tools
I got the fingerprint reader working with the new ThinkFinger-drivers (opensource). They are working much better than the closed-source UPEK drivers and don't have this ugly QT-dialog.
Get some debian-packages from here and install them with:
# dpkg -i *.deb
Enroll your fingers
Enroll your fingers with:
# tf-tool --add-user <login>
# tf-tool --add-user name ThinkFinger 0.2.2 (http://thinkfinger.sourceforge.net/) Copyright (C) 2006, 2007 Timo Hoenig <thoenig@suse.de> Initializing... done. Please swipe your finger (successful swipes 3/3, failed swipes: 0)... done. Storing data (/etc/pam_thinkfinger/name.bir)... done.
Configuring PAM to use ThinkFinger
Now you can configure pam to use ThinkFinger:
Open /etc/pam.d/common-auth:
# /etc/pam.d/common-auth - authentication settings common to all services # # This file is included from other service-specific PAM config files, # and should contain a list of the authentication modules that define # the central authentication scheme for use on the system # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the # traditional Unix authentication mechanisms. # auth sufficient pam_thinkfinger.so auth required pam_unix.so try_first_pass
Ready! Works flawlessly with gdm for instance! Enroll user 'root' to use your fingerprint for 'sudo'.