![]() | This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages) (Learn how and when to remove this message)
|
Abrick (orbricked device) is amobile device,game console,router,computer or other electronic device that is no longer functional due to corruptedfirmware, ahardware problem, or other damage.[1] The termanalogizes the device to abrick's modern technological usefulness.[2]Brick is also used as a verb to describe a device entering such a state.
Bricking a device is most often a result of interrupting an attempt toupdate the device. Many devices have an update procedure which must not be interrupted before completion; if interrupted by a power failure, user intervention, or any other reason, the existing firmware may be partially overwritten and unusable. The risk of corruption can be minimized by taking all possible precautions against interruption. Bricking a device may also be done intentionally as punishment for severe transgressions involving its use, but this is exceptionally rare and typically only done as a last resort.
Installingfirmware with errors, or for a different revision of the hardware, or installing firmware incompetentlypatched such asDVD firmware which only plays DVDssold in a particular region, can also cause bricking.
Devices can also be bricked bymalware (malicious software) and sometimes by running software not intentionally harmful but with errors that cause damage.
Some devices include a backup copy of their firmware, stored in fixedROM or writablenon-volatile memory, which is not normally accessible to processes that could corrupt it. Should the firmware become corrupted, the device can copy from the backup memory to its main memory, restoring the firmware.
Bricking is classified into two types, hard and soft, depending on the device's ability to function.[2]
A "soft bricked" device may show signs of life, but fails to boot or may display anerror screen. Soft bricked devices can usually be fixed relatively easily; for example, a soft brickediOS device may display a screen instructing the user to plug it into a computer to perform an operating system recovery usingiTunes computer software.[3] In some cases, soft bricked devices are unable to be repaired without physical repairs being carried out; an example of this would be an iOS device locked withiCloud Activation Lock, of which the only solution is to contact the owner of the iCloud account the device is locked to, or to replace the entirelogicboard with a non-locked board[citation needed] (or swap someintegrated circuits from a donor board which is usually not economical).
Hard bricked devices generally show few or no signs of life. A bricked device may not power on at all, or it may power on, but never boot to the OS or firmware, the closest getting to a warning screen.
Somekernelbugs[ambiguous] have been known that affect the/data partition in theeMMC chip, which becomes corrupted during certain operations such as wiping and flashing.[citation needed] Another example of a hard brick was related to a EFI firmware bug which could allow users to runrm on the EFI system variables mounted to the filesystem from within the operating system, resulting in a bricked bootloader that would require ROM soldering tools to repair. This bug was addressed by Linux developers in 2016.[4]
Recovering from a hard brick is generally considered difficult or impossible and requires the use of a more direct programming interface to the device; such an interface often exists, as there must be a way to program the initial firmware during the manufacturing process. However, additional tools or connections may be needed, such as low-level programming devices. Hardware hard brick recoveries are also considered difficult and require electrical knowledge to find and fix hardware issues. For example, an overloadedcapacitor in a circuit may explode, thus stopping the flow of electricity and bricking the device. More complex examples involve permanent damage tointegrated circuits andprocessors. Fixing such hardware bricks involve replacing these components entirely or fixing them by either bypassing if the circuit allows or other methods.
Most devices can be hard bricked in a variety of ways. Resolution generally follows a process of analyzing the boot process, determining the sub-type of hard brick, and making changes with the help of external (non-bricked) devices.[5]
Some devices that become "bricked" because the contents of their nonvolatile memory are incorrect can be "un-bricked" using separate hardware (a debug board) that accesses this memory directly.[6][better source needed] This is similar to the procedure for loading firmware into a new device when the memory is still empty. This kind of "bricking" and "un-bricking" occasionally happens during firmware testing and development. In other cases software and hardware procedures, often complex, have been developed that have a good chance of un-bricking the device. There is no general method; each device is different. There are also user-created modifier programs to use on bricked or partially bricked devices to make them functional. Examples include theWiibrew programBootMii used to fix semi-bricked Wiis, the Odin program used to flash firmware on Samsung Android devices,[7] or thefastboot Android protocol which is capable of re-flashing a device with no software installed.[7]
A soft-brickedrootedKindle Fire can be un-bricked by using unrooting tools.
A personal computer may be un-bricked by using various means of restoring techniques, from internal ones through the "Backup and Reset" feature, or external one using an external OS image.
In principle any device with rewritable firmware, or certain crucial settings stored intoflash orEEPROM memory, can be bricked. Many, but not all, devices with user-updatable firmware have protection against bricking; devices intended to be updated only by official service personnel generally do not.
Amongst devices known to have bricking issues are: older PCs (more recent models often have dualBIOSes or some other form of protection), manymobile phones,handheld game consoles like thePlayStation Portable andNintendo DS,video game consoles like theWii,Xbox 360,PlayStation 4, andXbox One, manySCSI devices and some lines ofhard disk drives androuters.[citation needed]
Electric cars such as theTesla Roadster (first generation) can brick if the battery is completely discharged.[8]
Sometimes an interrupted flash upgrade of a PC motherboard will brick the board, for example, due to a power outage (or user impatience) during the upgrade process. It is sometimes possible to un-brick such a motherboard, by scavenging a similar but otherwise broken board for a BIOS chip in the hopes that the BIOS will work even halfway, far enough to boot from floppy. Then it will be possible to retry the flash process. Sometimes it is possible to boot from a floppy, then swap the old presumably dead BIOS chip in and re-flash it.[9][better source needed] On some Gigabyte boards, it can also be possible to re-flash the bricked main BIOS using a backup BIOS.[10] Some vendors put the BIOS chip in sockets, allowing the corrupted BIOS chip to be removed and reprogrammed using an external tool, like auniversal programmer or anArduino.
Mobile phones have a fixed identification code, theIMEI. A telephone reported stolen can have its IMEI blocked bynetworks, preventing them from being used as mobile devices.[11]iOS offers a similar "Activation Lock" feature via the "Find My iPhone" security software, where a device can be remotely prevented from operating (even after it has been erased), protected by the owner'sApple ID.[12]Devices that have a strong dependency on online services in order to function may be bricked after services are discontinued by the manufacturer, or some other technological factor (such as expiredsecurity certificates or other services quietly becoming unavailable) effectively prevents them from operating. This can happen if the product has been succeeded by a newer model and the manufacturer no longer wishes to maintain services for the previous version, or if a company has been acquired by another or otherwise ceases operations, and chooses not to, or is no longer able to maintain its previous products. For example, Apple dropped support forOS X El Capitan in October 2018, and on 30 September 2021 the built-in security certificate expired, rendering users unable to connect to or use any iCloud services.[13][14][15] The security certificate issued with the final updates ofOS X Sierra andHigh Sierra have expired as of 20 May 2022. The practice has especially been scrutinized within theInternet of things andsmart home markets.[16][17][18][19] Bricking in these cases have been declared a means to enforceplanned obsolescence.[20][21]