Processors (Intel® Core™, Intel® Xeon®, etc); processor utilities and programs (Intel® Processor Identification Utility, Intel® Extreme Tuning Utility, Intel® Easy Streaming Wizard, etc.)
This community is designed for sharing of public information. Please do not share Intel or third-party confidential information here.
12368 Discussions

Microcode for CPUID 206C2 (Westmere EP) not found in latest Microcode data files (4/25/2018)


As the title says:

Microcode for CPUID 206C2 (Westmere EP) not found in latest Microcode data files (4/25/2018)

Maybe this is a slip-up, as the Microcode Update Guidance says that there are two changes:

1) CPUID 206C2 (Westmere EP) Status: Production

2) CPUID 206C2 (Gulftown) Status: Stopped

Microcode Update Guidance (April 2 2018):

Microcode Data Files (4/25/2018):

CPU in question:

cpu family : 6

microcode : 0x15

model : 44

model name : Intel(R) Xeon(R) CPU E5645 @ 2.40GHz

stepping : 2

iucode_tool: system has processor(s) with signature 0x000206c2

So is this a problem on your end, or something different?

0 Kudos
5 Replies
Community Manager

Hello, toffee. Thank you very much for sharing your issue with the Intel Communities Team. I will be more than glad to assist you.



In this case, the only information we have available about this issue is the one provided on the following link:


This site is constantly being updated so any release about this will be shared on it.




Antony S.


Community Manager

Hi Toffee,



The Westmere EP family does not support OS loading of microcode updates. You will need to check for a BIOS update for your system or motherboard.

I wrote and tested my microcode update tool cpupdate using a workstation with Westmere EP processors, so I can confirm that the statement that Westmere EP does not support OS loading of microcode updates is utter nonsense, if not an outright lie.

My personal guess the reason why Intel refuses to release the memory sinkhole fix MCU to the public is this:

To have the microcode update fix the memory sinkhole bug fully, it appears necessary to turn off part or all of the Westmere's version of the IME backdoor.

And so I guess they hand out the microcode only to big players that are willing to sign NDAs, because imagine everybody would deactivate the IME backdoor... spy agencies and organized crime won't be happy.

Obviously problems with syncing the IME backdoor with the first wave of Meltdown/Spectre microcode updates (these released on January 8) were responsible for the reboot issues.

This seems a logical conclusion, as it is well-known that mistakes when tampering with the IME backdoor can cause reboots after 30 minutes.

Anyway, I have done a lot of analysing and researching, because almost 50% of the microcode updates listed in the "Microcode Revision Guidance" are missing in the April 25 microcode download.

Please read the document with my findings.

I would appreciate if Intel now would finally release the microcode updates to the public.

Otherwise I'd find appropriate that Intel explains why they refuse to release 45% of the production quality microcode updates to the public.

Because, the public deserves to know the reasons why Intel knowingly and apparently intentionally keeps their customers vulnerable to the Meltdown/Spectre exploits.

Community Manager

Hi Toffee and Snurg,



We've reviewed our internal documentation concerning Westmere EP's ability to support microcode loading by the OS and you are correct, Westmere EP does support OS loadable microcode. Thanks for pointing out the error.



We are also looking at the microcode download to make sure we are providing everything we can. I'll let you know when I have an update on that.



Thanks again for helping us uncover these issues in our documentation and the download.

Thank you.

If by any chance you could do the same for the other processors whose microcodes are missing (listed by Snurg), it would be fantastic.