The X1 Carbon G1 is the first model in the X1 Carbon series and, together with the T430u, was Lenovo’s first Ultrabook. It inherited the X1 and was manufactured between June 2012 and August 2014 - it was also the last ThinkPad designed by Richard Sapper. A variant equipped with a touchscreen (X1 Carbon Touch) was released later.

It is a particularly thin and light, yet high-quality device. The trade press criticised the omission of previously essential ports (such as Ethernet, HDMI or the docking port) - the X1 Carbon only has USB ports and a Mini DisplayPort that has been reduced in size. Despite its thinness, it has a high-quality keyboard with a good feel.

The built-in SSD is visually similar to the M.2 standard of common NVMe SSDs - however, this connection did not exist at the time. The connection is therefore proprietary, which makes it difficult to procure replacement storage. There are adapters, but only for the short 2230 and 2242 designs and the much rarer B-key format.

Technical data

Component Feature
Type 3460-1H0
CPU Intel Core i5-3427U (2.8 GHz, 3 MB cache)
RAM 4 GB DDR3 (PC3-10600)
Graphics card Intel HD Graphics 4000
Display 14"-TFT (1600x900, 300 nits)
Hard drive 180 GB SATA (SFF)
Operating system Microsoft Windows 7 SP1, Ubuntu 14. 04
Sound Intel HD Audio
USB 3.0
Modem -
LAN Intel 82567LM (Gigabit)
WLAN Intel 6205 (2.4/5 GHz, 300 Mbit/s)
Bluetooth 4. 0 (BDC-4)
Floppy disk -
CD/DVD -
Card reader MMC/SD/SDHC/SDXC
Expansion cards -
Interfaces USB, Mini DisplayPort, Headphones/Microphone
Battery 45 Wh, 3100 mAh, 14.8 Volt
Size 331x226x18.9 mm (WxHxD)
Weight 1.36kg

Special features:

  • Status LEDs on the outside

Diagnostic outputs

# lspci
00:00.0 Host bridge: Intel Corporation 3rd Gen Core processor DRAM Controller (rev 09)
00:02.0 VGA compatible controller: Intel Corporation 3rd Gen Core processor Graphics Controller (rev 09)
00:14.0 USB controller: Intel Corporation 7 Series/C210 Series Chipset Family USB xHCI Host Controller (rev 04)
00:16.0 Communication controller: Intel Corporation 7 Series/C216 Chipset Family MEI Controller #1 (rev 04)
00:16.3 Serial controller: Intel Corporation 7 Series/C210 Series Chipset Family KT Controller (rev 04)
00:1a.0 USB controller: Intel Corporation 7 Series/C216 Chipset Family USB Enhanced Host Controller #2 (rev 04)
00:1b.0 Audio device: Intel Corporation 7 Series/C216 Chipset Family High Definition Audio Controller (rev 04)
00:1c.0 PCI bridge: Intel Corporation 7 Series/C216 Chipset Family PCI Express Root Port 1 (rev c4)
00:1c.1 PCI bridge: Intel Corporation 7 Series/C210 Series Chipset Family PCI Express Root Port 2 (rev c4)
00:1d.0 USB controller: Intel Corporation 7 Series/C216 Chipset Family USB Enhanced Host Controller #1 (rev 04)
00:1f.0 ISA bridge: Intel Corporation QS77 Express Chipset LPC Controller (rev 04)
00:1f.2 SATA controller: Intel Corporation 7 Series Chipset Family 6-port SATA Controller [AHCI mode] (rev 04)
00:1f.3 SMBus: Intel Corporation 7 Series/C216 Chipset Family SMBus Controller (rev 04)
02:00.0 System peripheral: Ricoh Co Ltd PCIe SDXC/MMC Host Controller (rev 04)
03:00.0 Network controller: Intel Corporation Centrino Advanced-N 6205 [Taylor Peak] (rev 96)
# lsusb
Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 006: ID 5986:0266 Bison Electronics Inc. Integrated Camera
Bus 001 Device 005: ID 0a5c:21e6 Broadcom Corp. BCM20702 Bluetooth 4.0 [ThinkPad]
Bus 001 Device 004: ID 147e:2020 Upek TouchChip Fingerprint Coprocessor (WBF advanced mode)
Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
# lscpu
Architecture:                       x86_64
CPU op-mode(s):                     32-bit, 64-bit
Address sizes:                      36 bits physical, 48 bits virtual
Byte Order:                         Little Endian
CPU(s):                             4
On-line CPU(s) list:                0-3
Vendor ID:                          GenuineIntel
Model name:                         Intel(R) Core(TM) i5-3427U CPU @ 1.80GHz
CPU family:                         6
Model:                              58
Thread(s) per core:                 2
Core(s) per socket:                 2
Socket(s):                          1
Stepping:                           9
CPU(s) scaling MHz:                 93%
CPU max MHz:                        2800.0000
CPU min MHz:                        800.0000
BogoMIPS:                           4589.74
Flags:                              fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm cpuid_fault epb pti tpr_shadow vnmi flexpriority ept vpid fsgsbase smep erms xsaveopt dtherm ida arat pln pts
Virtualization:                     VT-x
L1d cache:                          64 KiB (2 instances)
L1i cache:                          64 KiB (2 instances)
L2 cache:                           512 KiB (2 instances)
L3 cache:                           3 MiB (1 instance)
NUMA node(s):                       1
NUMA node0 CPU(s):                  0-3
Vulnerability Gather data sampling: Not affected
Vulnerability Itlb multihit:        KVM: Mitigation: VMX disabled
Vulnerability L1tf:                 Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Vulnerability Mds:                  Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
Vulnerability Meltdown:             Mitigation; PTI
Vulnerability Mmio stale data:      Unknown: No mitigations
Vulnerability Retbleed:             Not affected
Vulnerability Spec rstack overflow: Not affected
Vulnerability Spec store bypass:    Vulnerable
Vulnerability Spectre v1:           Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:           Mitigation; Retpolines, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
Vulnerability Srbds:                Vulnerable: No microcode
Vulnerability Tsx async abort:      Not affected

Links