Das T520 ist das dritte Modell der T5xx-Serie und wurde von Februar 2011 bis Dezember 2012 hergestellt. Es ist ein großes, aber keineswegs klobiges Gerät.

Ich hab mein T520 vor der Verschrottung gerettet. Es galt als defekt - allerdings fehlten lediglich Tastatur, RAM und ein Akku. Es verfügt über eine der deutlich stärkeren Quad-Core-CPUs und eine weitere Grafikkarte. Der Arbeitsspeicher wurde auf das inoffizielle Maximum aufgerüstet.

Allerdings scheint der Fingerprint-Reader, zumindest unter Linux, fehlerhaft zu sein. Er wird alle paar Sekunden als neues Gerät erkannt und bremst so auch das System aus:

[  295.570980] usb 1-1.3: new full-speed USB device number 51 using ehci-pci
[  295.680796] usb 1-1.3: New USB device found, idVendor=147e, idProduct=2016, bcdDevice= 0.02
[  295.680820] usb 1-1.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[  295.680828] usb 1-1.3: Product: Biometric Coprocessor
[  295.680833] usb 1-1.3: Manufacturer: UPEK
[  295.681408] usb 1-1.3: Device is not authorized for usage
[  295.823581] usb 1-1.3: USB disconnect, device number 51
[  295.570980] usb 1-1.3: new full-speed USB device number 52 using ehci-pci
...

Technische Daten

Komponente Eigenschaft
Typ 4243-5GG
CPU Intel Core i7-2670QM (2.2 GHz, 6 MB Cache)
RAM 16 GB DDR3 (PC3-10600)
Grafikkarte NVIDIA NVS 4200M (1 GB Speicher)
Display 15.6"-TFT (1920x1080, 270 nits)
Festplatte 256 GB SATA (2.5")
Betriebsystem Microsoft Windows 7, Pop!_OS 22.04
Sound Intel HD Audio
USB 2.0
Modem -
LAN Intel 82579LM (Gigabit)
WLAN Intel 6300 (2.4/5 GHz, 450 Mbit/s)
Bluetooth 3.0 (BDC-3)
Diskette -
CD/DVD DVD-RW
Kartenleser -
Erweiterungskarten ExpressCard/34
Schnittstellen Firewire, USB/eSATA, USB, VGA, DisplayPort, USB, LAN, Kopfhörer
Akku -
Größe 373x245x35 mm (BxHxT)
Gewicht 2,5 kg

Besonderheiten:

  • eSATA
  • Webcam
  • Fingerprint-Reader

Diagnose-Ausgaben

# lspci
00:00.0 Host bridge: Intel Corporation 2nd Generation Core Processor Family DRAM Controller (rev 09)
00:01.0 PCI bridge: Intel Corporation Xeon E3-1200/2nd Generation Core Processor Family PCI Express Root Port (rev 09)
00:02.0 VGA compatible controller: Intel Corporation 2nd Generation Core Processor Family Integrated Graphics Controller (rev 09)
00:16.0 Communication controller: Intel Corporation 6 Series/C200 Series Chipset Family MEI Controller #1 (rev 04)
00:19.0 Ethernet controller: Intel Corporation 82579LM Gigabit Network Connection (Lewisville) (rev 04)
00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #2 (rev 04)
00:1b.0 Audio device: Intel Corporation 6 Series/C200 Series Chipset Family High Definition Audio Controller (rev 04)
00:1c.0 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 1 (rev b4)
00:1c.1 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 2 (rev b4)
00:1c.3 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 4 (rev b4)
00:1c.4 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 5 (rev b4)
00:1d.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #1 (rev 04)
00:1f.0 ISA bridge: Intel Corporation QM67 Express Chipset LPC Controller (rev 04)
00:1f.2 SATA controller: Intel Corporation 6 Series/C200 Series Chipset Family 6 port Mobile SATA AHCI Controller (rev 04)
00:1f.3 SMBus: Intel Corporation 6 Series/C200 Series Chipset Family SMBus Controller (rev 04)
03:00.0 Network controller: Intel Corporation Centrino Ultimate-N 6300 (rev 3e)
0d:00.0 System peripheral: Ricoh Co Ltd PCIe SDXC/MMC Host Controller (rev 08)
0d:00.3 FireWire (IEEE 1394): Ricoh Co Ltd R5C832 PCIe IEEE 1394 Controller (rev 04)
# lsusb
Bus 002 Device 003: ID 0bdb:1911 Ericsson Business Mobile Networks BV F5521gw
Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 006: ID 04f2:b217 Chicony Electronics Co., Ltd Lenovo Integrated Camera (0.3MP)
Bus 001 Device 005: ID 0a5c:217f Broadcom Corp. BCM2045B (BDC-2.1)
Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
# lsusb
Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Address sizes:                   36 bits physical, 48 bits virtual
Byte Order:                      Little Endian
CPU(s):                          8
On-line CPU(s) list:             0-7
Vendor ID:                       GenuineIntel
Model name:                      Intel(R) Core(TM) i7-2670QM CPU @ 2.20GHz
CPU family:                      6
Model:                           42
Thread(s) per core:              2
Core(s) per socket:              4
Socket(s):                       1
Stepping:                        7
CPU max MHz:                     3100.0000
CPU min MHz:                     800.0000
BogoMIPS:                        4385.96
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer aes xsave avx lahf_lm epb pti ssbd ibrs ibpb stibp tpr_shadow flexpriority ept vpid xsaveopt dtherm ida arat pln pts vnmi md_clear flush_l1d
Virtualization:                  VT-x
L1d cache:                       128 KiB (4 instances)
L1i cache:                       128 KiB (4 instances)
L2 cache:                        1 MiB (4 instances)
L3 cache:                        6 MiB (1 instance)
NUMA node(s):                    1
NUMA node0 CPU(s):               0-7
Vulnerability Itlb multihit:     KVM: Mitigation: VMX disabled
Vulnerability L1tf:              Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Vulnerability Mds:               Mitigation; Clear CPU buffers; SMT vulnerable
Vulnerability Meltdown:          Mitigation; PTI
Vulnerability Mmio stale data:   Unknown: No mitigations
Vulnerability Retbleed:          Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling, PBRSB-eIBRS Not affected
Vulnerability Srbds:             Not affected
Vulnerability Tsx async abort:   Not affected

Links