Das X201 ist das zweite Gerät der X2xx-Serie und wurde zwischen März 2010 und August 2011 produziert.

Mein Gerät war früher offensichtlich ein üppig ausgestattetes Businessgerät, da es über die optionale UMTS-Karte sowie die maximale Arbeitsspeichergröße verfügt. Die aufpreispflichtige Webcam sowie ein Fingerprint-Reader sind ebenfalls an Board. Neben dem passenden UltraBase X200 lag auch ein modulares Reisenetzteil bei. Die ursprünglich verbaute Festplatte wurde durch eine SSD ersetzt, das Gerät wurde ohne Microsoft Windows-Lizenz ausgeliefert.

Technische Daten

Komponente Eigenschaft
Typ 3626-W15
CPU Intel Core i5-540M (2.53 GHz, 3 MB Cache)
RAM 8 GB DDR3 (PC3-8500)
Grafikkarte Intel Graphics Media Accelerator 5700MHD
Display 12.1"-TFT (1280x800)
Festplatte 32 GB SATA SSD (2.5")
Betriebsystem Bunsenlabs Boron
Sound Intel HD Audio (CX20585)
USB 2.0
Modem 56k (MDC-3.0)
LAN Intel 82577LM (Gigabit)
WLAN Intel 6300 (2.4/5 GHz, 450 Mbit/s)
Bluetooth 2.1
Diskette -
CD/DVD -
Kartenleser MMC/SD/SDHC/SDXC/MS/MS Pro
Erweiterungskarten ExpressCard/54
Schnittstellen USB, LAN, VGA, USB, Modem, Mikrofon, Kopfhörer, USB
Akku 94 Wh, 7690 mAh, 10.8 Volt
Größe 295x210x20.7 mm (BxHxT)
Gewicht 1,2 kg

Besonderheiten:

  • optionale UMTS-Karte, Webcam und Fingerprint-Reader
  • erstes X-Gerät mit Intel Core i-Prozessor

Diagnose-Ausgaben

# lspci
00:00.0 Host bridge: Intel Corporation Core Processor DRAM Controller (rev 02)
00:02.0 VGA compatible controller: Intel Corporation Core Processor Integrated Graphics Controller (rev 02)
00:16.0 Communication controller: Intel Corporation 5 Series/3400 Series Chipset HECI Controller (rev 06)
00:16.3 Serial controller: Intel Corporation 5 Series/3400 Series Chipset KT Controller (rev 06)
00:19.0 Ethernet controller: Intel Corporation 82577LM Gigabit Network Connection (rev 06)
00:1a.0 USB controller: Intel Corporation 5 Series/3400 Series Chipset USB2 Enhanced Host Controller (rev 06)
00:1b.0 Audio device: Intel Corporation 5 Series/3400 Series Chipset High Definition Audio (rev 06)
00:1c.0 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 1 (rev 06)
00:1c.3 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 4 (rev 06)
00:1c.4 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 5 (rev 06)
00:1d.0 USB controller: Intel Corporation 5 Series/3400 Series Chipset USB2 Enhanced Host Controller (rev 06)
00:1e.0 PCI bridge: Intel Corporation 82801 Mobile PCI Bridge (rev a6)
00:1f.0 ISA bridge: Intel Corporation QM57 Chipset LPC Interface Controller (rev 06)
00:1f.2 SATA controller: Intel Corporation 5 Series/3400 Series Chipset 6 port SATA AHCI Controller (rev 06)
00:1f.3 SMBus: Intel Corporation 5 Series/3400 Series Chipset SMBus Controller (rev 06)
00:1f.6 Signal processing controller: Intel Corporation 5 Series/3400 Series Chipset Thermal Subsystem (rev 06)
02:00.0 Network controller: Intel Corporation Centrino Ultimate-N 6300 (rev 35)
ff:00.0 Host bridge: Intel Corporation Core Processor QuickPath Architecture Generic Non-core Registers (rev 02)
ff:00.1 Host bridge: Intel Corporation Core Processor QuickPath Architecture System Address Decoder (rev 02)
ff:02.0 Host bridge: Intel Corporation Core Processor QPI Link 0 (rev 02)
ff:02.1 Host bridge: Intel Corporation 1st Generation Core i3/5/7 Processor QPI Physical 0 (rev 02)
ff:02.2 Host bridge: Intel Corporation 1st Generation Core i3/5/7 Processor Reserved (rev 02)
ff:02.3 Host bridge: Intel Corporation 1st Generation Core i3/5/7 Processor Reserved (rev 02)
# lsusb
Bus 002 Device 003: ID 05c6:9204 Qualcomm, Inc. Qualcomm Gobi 2000
Bus 002 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 006: ID 17ef:4816 Lenovo Integrated Webcam
Bus 001 Device 005: ID 0a5c:217f Broadcom Corp. BCM2045B (BDC-2.1)
Bus 001 Device 004: ID 147e:2016 Upek Biometric Touchchip/Touchstrip Fingerprint Sensor
Bus 001 Device 002: ID 8087:0020 Intel Corp. Integrated Rate Matching Hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
# lscpu
Architecture:                       x86_64
CPU op-mode(s):                     32-bit, 64-bit
Address sizes:                      36 bits physical, 48 bits virtual
Byte Order:                         Little Endian
CPU(s):                             4
On-line CPU(s) list:                0-3
Vendor ID:                          GenuineIntel
Model name:                         Intel(R) Core(TM) i5 CPU       M 540  @ 2.53GHz
CPU family:                         6
Model:                              37
Thread(s) per core:                 2
Core(s) per socket:                 2
Socket(s):                          1
Stepping:                           5
Frequency boost:                    enabled
CPU(s) scaling MHz:                 56%
CPU max MHz:                        2534,0000
CPU min MHz:                        1199,0000
BogoMIPS:                           5054,25
Flags:                              fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 popcnt aes lahf_lm pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid dtherm ida arat flush_l1d
Virtualization:                     VT-x
L1d cache:                          64 KiB (2 instances)
L1i cache:                          64 KiB (2 instances)
L2 cache:                           512 KiB (2 instances)
L3 cache:                           3 MiB (1 instance)
NUMA node(s):                       1
NUMA node0 CPU(s):                  0-3
Vulnerability Gather data sampling: Not affected
Vulnerability Itlb multihit:        KVM: Mitigation: VMX disabled
Vulnerability L1tf:                 Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Vulnerability Mds:                  Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
Vulnerability Meltdown:             Mitigation; PTI
Vulnerability Mmio stale data:      Unknown: No mitigations
Vulnerability Retbleed:             Not affected
Vulnerability Spec rstack overflow: Not affected
Vulnerability Spec store bypass:    Mitigation; Speculative Store Bypass disabled via prctl
Vulnerability Spectre v1:           Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:           Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling, PBRSB-eIBRS Not affected
Vulnerability Srbds:                Not affected
Vulnerability Tsx async abort:      Not affected

Links