The T520 is the third model in the T5xx series and was manufactured from February 2011 to December 2012. It is a large, but by no means clunky device.

I rescued my T520 from being scrapped. It was considered defective - but only the keyboard, RAM and a battery were missing. It has one of the much more powerful quad-core CPUs and an additional graphics card. The RAM has been upgraded to the unofficial maximum.

However, the fingerprint reader seems to be faulty, at least under Linux. It is recognized as a new device every few seconds and thus also slows down the system:

[  295.570980] usb 1-1.3: new full-speed USB device number 51 using ehci-pci
[  295.680796] usb 1-1.3: New USB device found, idVendor=147e, idProduct=2016, bcdDevice= 0.02
[  295.680820] usb 1-1.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[  295.680828] usb 1-1.3: Product: Biometric Coprocessor
[  295.680833] usb 1-1.3: Manufacturer: UPEK
[  295.681408] usb 1-1.3: Device is not authorized for usage
[  295.823581] usb 1-1.3: USB disconnect, device number 51
[  295.570980] usb 1-1.3: new full-speed USB device number 52 using ehci-pci
...

Technical data

Component Feature
Type 4243-5GG
CPU Intel Core i7-2670QM (2.2 GHz, 6 MB cache)
RAM 16 GB DDR3 (PC3-10600)
graphics card NVIDIA NVS 4200M (1 GB memory)
Display 15.6" TFT (1920x1080, 270 nits)
Hard disk 256 GB SATA (2.5")
Operating system Microsoft Windows 7, Pop!_OS 22.04
Sound Intel HD Audio
USB 2.0
Modem -
LAN Intel 82579LM (Gigabit)
WLAN Intel 6300 (2.4/5 GHz, 450 Mbit/s)
Bluetooth 3.0 (BDC-3)
Floppy -
CD/DVD DVD-RW
Card reader -
Expansion cards ExpressCard/34
Interfaces Firewire, USB/eSATA, USB, VGA, DisplayPort, USB, LAN, headphones
Battery -
Size 373x245x35 mm (WxHxD)
Weight 2.5 kg

Special features:

  • eSATA
  • Webcam
  • Fingerprint reader

Diagnostic output

# lspci
00:00.0 Host bridge: Intel Corporation 2nd Generation Core Processor Family DRAM Controller (rev 09)
00:01.0 PCI bridge: Intel Corporation Xeon E3-1200/2nd Generation Core Processor Family PCI Express Root Port (rev 09)
00:02.0 VGA compatible controller: Intel Corporation 2nd Generation Core Processor Family Integrated Graphics Controller (rev 09)
00:16.0 Communication controller: Intel Corporation 6 Series/C200 Series Chipset Family MEI Controller #1 (rev 04)
00:19.0 Ethernet controller: Intel Corporation 82579LM Gigabit Network Connection (Lewisville) (rev 04)
00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #2 (rev 04)
00:1b.0 Audio device: Intel Corporation 6 Series/C200 Series Chipset Family High Definition Audio Controller (rev 04)
00:1c.0 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 1 (rev b4)
00:1c.1 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 2 (rev b4)
00:1c.3 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 4 (rev b4)
00:1c.4 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 5 (rev b4)
00:1d.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #1 (rev 04)
00:1f.0 ISA bridge: Intel Corporation QM67 Express Chipset LPC Controller (rev 04)
00:1f.2 SATA controller: Intel Corporation 6 Series/C200 Series Chipset Family 6 port Mobile SATA AHCI Controller (rev 04)
00:1f.3 SMBus: Intel Corporation 6 Series/C200 Series Chipset Family SMBus Controller (rev 04)
03:00.0 Network controller: Intel Corporation Centrino Ultimate-N 6300 (rev 3e)
0d:00.0 System peripheral: Ricoh Co Ltd PCIe SDXC/MMC Host Controller (rev 08)
0d:00.3 FireWire (IEEE 1394): Ricoh Co Ltd R5C832 PCIe IEEE 1394 Controller (rev 04)
# lsusb
Bus 002 Device 003: ID 0bdb:1911 Ericsson Business Mobile Networks BV F5521gw
Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 006: ID 04f2:b217 Chicony Electronics Co., Ltd Lenovo Integrated Camera (0.3MP)
Bus 001 Device 005: ID 0a5c:217f Broadcom Corp. BCM2045B (BDC-2.1)
Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
# lsusb
Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Address sizes:                   36 bits physical, 48 bits virtual
Byte Order:                      Little Endian
CPU(s):                          8
On-line CPU(s) list:             0-7
Vendor ID:                       GenuineIntel
Model name:                      Intel(R) Core(TM) i7-2670QM CPU @ 2.20GHz
CPU family:                      6
Model:                           42
Thread(s) per core:              2
Core(s) per socket:              4
Socket(s):                       1
Stepping:                        7
CPU max MHz:                     3100.0000
CPU min MHz:                     800.0000
BogoMIPS:                        4385.96
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer aes xsave avx lahf_lm epb pti ssbd ibrs ibpb stibp tpr_shadow flexpriority ept vpid xsaveopt dtherm ida arat pln pts vnmi md_clear flush_l1d
Virtualization:                  VT-x
L1d cache:                       128 KiB (4 instances)
L1i cache:                       128 KiB (4 instances)
L2 cache:                        1 MiB (4 instances)
L3 cache:                        6 MiB (1 instance)
NUMA node(s):                    1
NUMA node0 CPU(s):               0-7
Vulnerability Itlb multihit:     KVM: Mitigation: VMX disabled
Vulnerability L1tf:              Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Vulnerability Mds:               Mitigation; Clear CPU buffers; SMT vulnerable
Vulnerability Meltdown:          Mitigation; PTI
Vulnerability Mmio stale data:   Unknown: No mitigations
Vulnerability Retbleed:          Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling, PBRSB-eIBRS Not affected
Vulnerability Srbds:             Not affected
Vulnerability Tsx async abort:   Not affected

Links