Lenovo XiaoXin 15are 2020 (简体中文)

From ArchWiki
Component Functioning
Microcode
AMDGPU Partial
Wireless Partial
Bluetooth
Webcam
Screen Brightness Partial
Keyboard backlight
Touchpad Partial
Audio
Suspend
Fingerprint reader

Tango-preferences-desktop-locale-modified.png这篇文章或章节的翻译不反映原文。Tango-preferences-desktop-locale-modified.png

原因:Not updated for a while, the English page is in much better shape.(在 Talk:Lenovo XiaoXin 15are 2020 (简体中文)# 中讨论)

Tango-edit-clear.pngThis article or section does not follow the Laptop page guidelines.Tango-edit-clear.png

翻译状态:本文是 Lenovo_XiaoXin_15are_2020翻译。上次翻译日期:2021-03-21。如果英文版本有所更改,则您可以帮助同步翻译。

小新-15 2020(AMD 平台:ARE 版) 是联想发布的基于 AMD Renoir 的笔记本电脑。该款电脑主要在中国大陆销售,最相似的国际版型号为 IdeaPad 5 15ARE。

UEFI

在安装 Arch Linux 之前,请关闭 BIOS 中的 Secure Boot。在开机第一屏按 F2 就能够进入 BIOS,按 F12 能够进入启动菜单。

您可以在这里找到 BIOS 的更新:小新-15 2020(AMD平台:ARE版) 驱动列表 的 BIOS 栏目下,提供了一个 Windows 安装程序。 使用 innoextract (1.8 版本经过测试) 来提取下载的 BIOS-E7CN39WW.exe 中的 E7CN39WW.exe,这是 Phoneix 的 BIOS 安装器,但是它不能用 innoextract 再次提取。

Noto Button

您也可以使用 "Noto Boot Menu", 它相比于 BIOS 和 启动菜单提供了更多的选项。在开机状态下,按 Fn + <电源键>来启动它。详细信息参见官方用户手册 小新-15ARE用户指南

F2 和 F12 keys 无法使用

Windows 20H2 安装器(消费者版本,更新于2021年2月)经测试会删除这些按键进入 BIOS 设置和启动菜单的功能。这是微软有意为之还是只是 Windows 的一个 bug 仍然不明。目前 (2021年3月3日),这个型号的笔记本仍然在保修期内,您可以找官方售后恢复主板的 BIOS 信息。

目前的建议是:如果您想要安装 Windows, 请使用低版本,如 1903。 我没有测试过 Windows 中的大版本更新,请小心更新。如果可能的话,不要多重引导 Windows。

详细信息参见 UEFI#Windows changes boot order

处理器

小新-15 2020(AMD 平台:ARE 版) 包含一个 AMD Ryzen APU。您可以按如下方式提取精确型号:

$ lscpu | awk -F ": *" '/Model name/{print $NF}'
AMD Ryzen 7 4800U with Radeon Graphics
$ lspci | awk -F ": *" '/VGA compatible controller/{print $NF}'
Advanced Micro Devices, Inc. [AMD/ATI] Renoir (rev c1)

CPU

强烈推荐启用专有微码更新,详细信息参见 RyzenMicrocode。可通过如下方式验证已经成功启用了微码更新:

# dmesg | grep microcode
[    1.512299] microcode: CPU0: patch_level=0x08600102
[    1.512320] microcode: CPU1: patch_level=0x08600102
[    1.512345] microcode: CPU2: patch_level=0x08600102
[    1.512361] microcode: CPU3: patch_level=0x08600102
[    1.512388] microcode: CPU4: patch_level=0x08600102
[    1.512404] microcode: CPU5: patch_level=0x08600102
[    1.512435] microcode: CPU6: patch_level=0x08600102
[    1.512453] microcode: CPU7: patch_level=0x08600102
[    1.512477] microcode: CPU8: patch_level=0x08600102
[    1.512498] microcode: CPU9: patch_level=0x08600102
[    1.512521] microcode: CPU10: patch_level=0x08600102
[    1.512535] microcode: CPU11: patch_level=0x08600102
[    1.512558] microcode: CPU12: patch_level=0x08600102
[    1.512572] microcode: CPU13: patch_level=0x08600102
[    1.512575] microcode: CPU14: patch_level=0x08600102
[    1.512593] microcode: CPU15: patch_level=0x08600102
[    1.512689] microcode: Microcode Update Driver: v2.2.

lscpu:的原始输出样例:

$ lscpu
Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Byte Order:                      Little Endian
Address sizes:                   44 bits physical, 48 bits virtual
CPU(s):                          16
On-line CPU(s) list:             0-15
Thread(s) per core:              2
Core(s) per socket:              8
Socket(s):                       1
NUMA node(s):                    1
Vendor ID:                       AuthenticAMD
CPU family:                      23
Model:                           96
Model name:                      AMD Ryzen 7 4800U with Radeon Graphics
Stepping:                        1
Frequency boost:                 enabled
CPU MHz:                         1922.650
CPU max MHz:                     1800.0000
CPU min MHz:                     1400.0000
BogoMIPS:                        3594.08
Virtualization:                  AMD-V
L1d cache:                       256 KiB
L1i cache:                       256 KiB
L2 cache:                        4 MiB
L3 cache:                        8 MiB
NUMA node0 CPU(s):               0-15
Vulnerability Itlb multihit:     Not affected
Vulnerability L1tf:              Not affected
Vulnerability Mds:               Not affected
Vulnerability Meltdown:          Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full AMD retpoline, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling
Vulnerability Tsx async abort:   Not affected
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht sy
                                 scall nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid ape
                                 rfmperf pni pclmulqdq monitor ssse3 fma cx16 sse4_1 sse4_2 movbe popcnt aes xsave avx f16c rdrand lahf_
                                 lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs skinit wdt tce topoex
                                 t perfctr_core perfctr_nb bpext perfctr_llc mwaitx cpb cat_l3 cdp_l3 hw_pstate sme ssbd mba sev ibrs ib
                                 pb stibp vmmcall fsgsbase bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap clflushopt clwb sha_ni xsaveopt
                                  xsavec xgetbv1 xsaves cqm_llc cqm_occup_llc cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr rdpru
                                  wbnoinvd arat npt lbrv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter p
                                 fthreshold avic v_vmsave_vmload vgif umip rdpid overflow_recov succor smca

GPU

Xorg 可与当前的 linuxxf86-video-amdgpu一起正常运行。

声音

声音与 Linux 中的 PulseAudio 兼容,开箱即用。

网络连接

无线控制器

无线控制器开箱即用,详细信息参见Network configuration/Wireless

$ lspci | awk -F ": *" '/Network controller/{print $NF}'
Realtek Semiconductor Co., Ltd. RTL8822CE 802.11ac PCIe Wireless Network Adapter

蓝牙控制器

开箱即用,详细信息参见蓝牙

$ lsusb
...
Bus 001 Device 003: ID 0bda:c123 Realtek Semiconductor Corp. Bluetooth Radio 
...

音频

开箱即用, 详细信息参见 Sound system

$ lspci | grep Audio | awk -F ": *" '{$1=$2="";print $0}'
Advanced Micro Devices, Inc. [AMD/ATI] Device 1637
Advanced Micro Devices, Inc. [AMD] Raven/Raven2/FireFlight/Renoir Audio Processor (rev 01)
Advanced Micro Devices, Inc. [AMD] Family 17h (Models 10h-1fh) HD Audio Controller

触控板

触控板在大多数时候开箱不可用。 您需要先将其从 elants_i2c 解绑,然后再将其绑定到 i2c_hid

提示: 切换到 root 用户运行如下命令 (sudo su), 因为普通用户即使用 sudo 也没有权限
$ modprobe i2c_hid
# echo "i2c-ELAN0001:00" > /sys/bus/i2c/drivers/elants_i2c/unbind
# echo "i2c-ELAN0001:00" > /sys/bus/i2c/drivers/i2c_hid/bind

现在需要将 elants_i2c 模块加入黑名单,因此你不必每次都解绑、绑定。

# echo "blacklist elants_i2c" | tee /etc/modprobe.d/touchpad.conf

注意,触控板可能仍无法正常运行并伴随如下的错误信息:

Mar 03 21:50:14 localhost.localdomain kernel: i2c_hid i2c-ELAN0001:00: HID over i2c has not been provided an Int IRQ
Mar 03 21:50:14 localhost.localdomain kernel: i2c_hid: probe of i2c-ELAN0001:00 failed with error -22

这种情况下,移除 i2c_hid 并重新加载它:

# rmmod i2c_hid
# modprobe i2c_hid

硬件组件原始列表

$ lspci
00:00.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Root Complex
00:00.2 IOMMU: Advanced Micro Devices, Inc. [AMD] Renoir IOMMU
00:01.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir PCIe Dummy Host Bridge
00:02.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir PCIe Dummy Host Bridge
00:02.2 PCI bridge: Advanced Micro Devices, Inc. [AMD] Renoir PCIe GPP Bridge
00:02.4 PCI bridge: Advanced Micro Devices, Inc. [AMD] Renoir PCIe GPP Bridge
00:08.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir PCIe Dummy Host Bridge
00:08.1 PCI bridge: Advanced Micro Devices, Inc. [AMD] Renoir Internal PCIe GPP Bridge to Bus
00:08.2 PCI bridge: Advanced Micro Devices, Inc. [AMD] Renoir Internal PCIe GPP Bridge to Bus
00:14.0 SMBus: Advanced Micro Devices, Inc. [AMD] FCH SMBus Controller (rev 51)
00:14.3 ISA bridge: Advanced Micro Devices, Inc. [AMD] FCH LPC Bridge (rev 51)
00:18.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Device 24: Function 0
00:18.1 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Device 24: Function 1
00:18.2 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Device 24: Function 2
00:18.3 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Device 24: Function 3
00:18.4 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Device 24: Function 4
00:18.5 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Device 24: Function 5
00:18.6 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Device 24: Function 6
00:18.7 Host bridge: Advanced Micro Devices, Inc. [AMD] Renoir Device 24: Function 7
01:00.0 Network controller: Realtek Semiconductor Co., Ltd. RTL8822CE 802.11ac PCIe Wireless Network Adapter
02:00.0 Non-Volatile memory controller: Micron/Crucial Technology P1 NVMe PCIe SSD (rev 03)
03:00.0 VGA compatible controller: Advanced Micro Devices, Inc. [AMD/ATI] Renoir (rev c1)
03:00.1 Audio device: Advanced Micro Devices, Inc. [AMD/ATI] Device 1637
03:00.2 Encryption controller: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 10h-1fh) Platform Security Processor
03:00.3 USB controller: Advanced Micro Devices, Inc. [AMD] Renoir USB 3.1
03:00.4 USB controller: Advanced Micro Devices, Inc. [AMD] Renoir USB 3.1
03:00.5 Multimedia controller: Advanced Micro Devices, Inc. [AMD] Raven/Raven2/FireFlight/Renoir Audio Processor (rev 01)
03:00.6 Audio device: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 10h-1fh) HD Audio Controller
04:00.0 SATA controller: Advanced Micro Devices, Inc. [AMD] FCH SATA Controller [AHCI mode] (rev 81)
04:00.1 SATA controller: Advanced Micro Devices, Inc. [AMD] FCH SATA Controller [AHCI mode] (rev 81)
$ lsusb
Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 003 Device 003: ID 27c6:55a2 Shenzhen Goodix Technology Co.,Ltd. Goodix FingerPrint Device
Bus 003 Device 002: ID 0bda:c123 Realtek Semiconductor Corp. Bluetooth Radio
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 003: ID 13d3:56ff IMC Networks Integrated Camera
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub