Brick (electronics)

Last updated
A soft bricked Fire TV Stick, booting in emergency recovery and telling the user that the /data partition got corrupted, and requiring a factory reset in order to make it usable again. Amazon Fire TV Stick Lite in Emergency Recovery mode.JPG
A soft bricked Fire TV Stick, booting in emergency recovery and telling the user that the /data partition got corrupted, and requiring a factory reset in order to make it usable again.
A soft bricked iPod Touch, displaying only error messages as BSD root. Bricked iPod (2324879931).jpg
A soft bricked iPod Touch, displaying only error messages as BSD root.

A brick (or bricked device) is a mobile device, game console, router, computer or other electronic device that is no longer functional due to corrupted firmware, a hardware problem, or other damage. [1] The term analogizes the device to a brick's modern technological usefulness. [2]

Contents

Cause and prevention

Bricking a device is most often a result of interrupting an attempt to update the device. Many devices have an update procedure which must not be interrupted before completion; if interrupted by a power failure, user intervention, or any other reason, the existing firmware may be partially overwritten and unusable. The risk of corruption can be minimized by taking all possible precautions against interruption.

Installing firmware with errors, or for a different revision of the hardware, or installing firmware incompetently patched such as DVD firmware which only plays DVDs sold in a particular region, can also cause bricking.

Devices can also be bricked by malware (malicious software) and sometimes by running software not intentionally harmful but with errors that cause damage.

Some devices include a backup copy of their firmware, stored in fixed ROM or writable non-volatile memory, which is not normally accessible to processes that could corrupt it. Should the firmware become corrupted, the device can copy from the backup memory to its main memory, restoring the firmware.

Types

Bricking is classified into two types, hard and soft, depending on the device's ability to function. [2]

Soft brick

A "soft bricked" device may show signs of life, but fails to boot or may display an error screen. Soft bricked devices can usually be fixed relatively easily; for example, a soft bricked iOS device may display a screen instructing the user to plug it into a computer to perform an operating system recovery using iTunes computer software. [3] In some cases, soft bricked devices are unable to be repaired without physical repairs being carried out; an example of this would be an iOS device locked with iCloud Activation Lock, of which the only solution is to contact the owner of the iCloud account the device is locked to, or to replace the entire logicboard with a non-locked board.[ citation needed ]

Hard brick

Hard bricked devices generally show few or no signs of life. A hard bricked device does not power on or show any vendor logo; the screen remains turned off or blank. Some of the major reasons for hard bricking include installing firmware not intended for the device, severe physical damage, interrupting a firmware flashing procedure, or following a flashing procedure incorrectly.

In the case of Android devices, some kernel bugs have been known that affect the /data partition in the eMMC chip, which becomes corrupted during certain operations such as wiping and flashing.

Recovering from a hard brick is generally considered difficult and requires the use of a more direct programming interface to the device; such an interface often exists, as there must be a way to program the initial firmware during the manufacturing process. However, additional tools or connections may be needed, such as low-level programming devices. Hardware hard brick recoveries are also considered difficult and require electrical knowledge to find and fix hardware issues. For example, an overloaded capacitor in a circuit may explode, thus stopping the flow of electricity and bricking the device. More complex examples involve permanent damage to integrated circuits and processors. Fixing such hardware bricks involve replacing these components entirely or fixing them by either bypassing if the circuit allows or other methods.

Most devices can be hard bricked in a variety of ways. Resolution generally follows a process of analyzing the boot process, determining the sub-type of hard brick, and making changes with the help of external (non-bricked) devices. [4]

Un-bricking

Some devices that become "bricked" because the contents of their nonvolatile memory are incorrect can be "un-bricked" using separate hardware (a debug board) that accesses this memory directly. [5] [ better source needed ] This is similar to the procedure for loading firmware into a new device when the memory is still empty. This kind of "bricking" and "un-bricking" occasionally happens during firmware testing and development. In other cases software and hardware procedures, often complex, have been developed that have a good chance of un-bricking the device. There is no general method; each device is different. There are also user-created modifier programs to use on bricked or partially bricked devices to make them functional. Examples include the Wiibrew program BootMii used to fix semi-bricked Wiis, the Odin program used to flash firmware on Samsung Android devices, [6] or the fastboot Android protocol which is capable of re-flashing a device with no software installed. [6]

A soft bricked rooted Kindle Fire can be un-bricked by using unrooting tools.

A personal computer may be un-bricked by using various means of restoring techniques, from internal ones through the "Backup and Reset" feature, or external one using an external OS image.

Systems

In principle any device with rewritable firmware, or certain crucial settings stored into flash or EEPROM memory, can be bricked. Many, but not all, devices with user-updatable firmware have protection against bricking; devices intended to be updated only by official service personnel generally do not.

Amongst devices known to have bricking issues are: older PCs (more recent models often have dual BIOSes or some other form of protection), many mobile phones, handheld game consoles like the PlayStation Portable and Nintendo DS, video game consoles like the Wii, Xbox 360, PlayStation 4, and Xbox One, many SCSI devices and some lines of hard disk drives and routers.[ citation needed ]

At least some older consumer market router models[ which? ] can become unresponsive when the user tries to define a subnet mask that does not contain one contiguous run of 1s and then 0s. If even a single bit is set so that it breaks one of the runs, the router may become bricked, unresponsive to any standard troubleshooting or resolving procedures listed in the manual. Un-bricking the router may require opening the case, shorting some jumper pins on the board, then connecting the router by the USB cable to an old PC with USB 1.1 hardware, running a special DOS level program supplied by the manufacturer, and powering the router up. This procedure will flash the router to factory settings and original firmware.[ citation needed ]

Electric cars such as the Tesla Roadster (first generation) can brick if the battery is completely discharged. [7]

Sometimes an interrupted flash upgrade of a PC motherboard will brick the board, for example, due to a power outage (or user impatience) during the upgrade process. It is sometimes possible to un-brick such a motherboard, by scavenging a similar but otherwise broken board for a BIOS chip in the hopes that the BIOS will work even halfway, far enough to boot from floppy. Then it will be possible to retry the flash process. Sometimes it is possible to boot from a floppy, then swap the old presumably dead BIOS chip in and re-flash it. [8] [ better source needed ] On some Gigabyte boards, it can also be possible to re-flash the bricked main BIOS using a backup BIOS. [9] Some vendors put the BIOS chip in sockets, allowing the corrupted BIOS chip to be removed and reprogrammed using an external tool, like a universal programmer or an Arduino.

Online and mobile services

Mobile phones have a fixed identification code, the IMEI. A telephone reported stolen can have its IMEI blocked by networks, preventing them from being used as mobile devices. [10] iOS offers a similar "Activation Lock" feature via the "Find My iPhone" security software, where a device can be remotely prevented from operating (even after it has been erased), protected by the owner's Apple ID. [11] Devices that have a strong dependency on online services in order to function may be bricked after services are discontinued by the manufacturer, or some other technological factor (such as expired security certificates or other services quietly becoming unavailable) effectively prevents them from operating. This can happen if the product has been succeeded by a newer model and the manufacturer no longer wishes to maintain services for the previous version, or if a company has been acquired by another or otherwise ceases operations, and chooses not to, or is no longer able to maintain its previous products. For example, Apple dropped support for OS X El Capitan in October 2018, and on 30 September 2021 the built-in security certificate expired, rendering users unable to connect to or use any iCloud services. [12] [13] [14] The security certificate issued with the final updates of OS X Sierra and High Sierra have expired as of 20 May 2022. The practice has especially been scrutinized within the Internet of things and smart home markets. [15] [16] [17] [18] Bricking in these cases have been declared a means to enforce planned obsolescence. [19] [20]

Related Research Articles

<span class="mw-page-title-main">BIOS</span> Firmware for hardware initialization and OS runtime services

In computing, BIOS is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process. The BIOS firmware comes pre-installed on an IBM PC or IBM PC compatible's system board and exists in some UEFI-based systems to maintain compatibility with operating systems that do not support UEFI native operation. The name originates from the Basic Input/Output System used in the CP/M operating system in 1975. The BIOS originally proprietary to the IBM PC has been reverse engineered by some companies looking to create compatible systems. The interface of that original system serves as a de facto standard.

<span class="mw-page-title-main">Motherboard</span> Main printed circuit board (PCB) used for a computing device

A motherboard is the main printed circuit board (PCB) in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit (CPU) and memory, and provides connectors for other peripherals. Unlike a backplane, a motherboard usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use.

<span class="mw-page-title-main">Booting</span> Process of starting a computer

In computing, booting is the process of starting a computer as initiated via hardware such as a button on the computer or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.

<span class="mw-page-title-main">Firmware</span> Low-level computer software

In computing, firmware is software that provides low-level control of computing device hardware. For a relatively simple device, firmware may perform all control, monitoring and data manipulation functionality. For a more complex device, firmware may provide relatively low-level control as well as hardware abstraction services to higher-level software such as an operating system.

Hardware abstractions are sets of routines in software that provide programs with access to hardware resources through programming interfaces. The programming interface allows all devices in a particular class C of hardware devices to be accessed through identical interfaces even though C may contain different subclasses of devices that each provide a different hardware interface.

<span class="mw-page-title-main">UEFI</span> Operating system and firmware specification

Unified Extensible Firmware Interface is a specification that defines the architecture of the platform firmware used for booting the computer hardware and its interface for interaction with the operating system. Examples of firmware that implement the specification are AMI Aptio, Phoenix SecureCore, TianoCore EDK II, InsydeH2O. UEFI replaces the BIOS which was present in the boot ROM of all personal computers that are IBM PC compatible, although it can provide backwards compatibility with the BIOS using CSM booting. Intel developed the original Extensible Firmware Interface (EFI) specification. Some of the EFI's practices and data formats mirror those of Microsoft Windows. In 2005, UEFI deprecated EFI 1.10.

A softmod is a method of using software to modify the intended behavior of hardware, such as video cards, sound cards, or game consoles in a way that can overcome restrictions of the firmware, or install custom firmware.

<span class="mw-page-title-main">American Megatrends</span> International hardware and software company

American Megatrends International, LLC, doing business as AMI, is an international hardware and software company, specializing in PC hardware and firmware. The company was founded in 1985 by Pat Sarma and Subramonian Shankar. It is headquartered in Building 800 at 3095 Satellite Boulevard in unincorporated Gwinnett County, Georgia, United States, near the city of Duluth, and in the Atlanta metropolitan area.

<span class="mw-page-title-main">Rockbox</span> Firmware replacement for various devices

Rockbox is a free and open-source software replacement for the OEM firmware in various forms of digital audio players (DAPs) with an original kernel. It offers an alternative to the player's operating system, in many cases without removing the original firmware, which provides a plug-in architecture for adding various enhancements and functions. Enhancements include personal digital assistant (PDA) functions, applications, utilities, and games. Rockbox can also retrofit video playback functions on players first released in mid-2000. Rockbox includes a voice-driven user-interface suitable for operation by visually impaired users.

coreboot Open-source computer firmware

coreboot, formerly known as LinuxBIOS, is a software project aimed at replacing proprietary firmware found in most computers with a lightweight firmware designed to perform only the minimum number of tasks necessary to load and run a modern 32-bit or 64-bit operating system.

<span class="mw-page-title-main">Power-on self-test</span> Process performed by firmware or software routines

A power-on self-test (POST) is a process performed by firmware or software routines immediately after a computer or other digital electronic device is powered on.

In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

In embedded systems, a board support package (BSP) is the layer of software containing hardware-specific boot firmware and device drivers and other routines that allow a given embedded operating system, for example a real-time operating system (RTOS), to function in a given hardware environment, integrated with the embedded operating system.

The Linux booting process involves multiple stages and is in many ways similar to the BSD and other Unix-style boot processes, from which it derives. Although the Linux booting process depends very much on the computer architecture, those architectures share similar stages and software components, including system startup, bootloader execution, loading and startup of a Linux kernel image, and execution of various startup scripts and daemons. Those are grouped into 4 steps: system startup, bootloader stage, kernel stage, and init process. When a Linux system is powered up or reset, its processor will execute a specific firmware/program for system initialization, such as Power-on self-test, invoking the reset vector to start a program at a known address in flash/ROM, then load the bootloader into RAM for later execution. In personal computer (PC), not only limited to Linux-distro PC, this firmware/program is called BIOS, which is stored in the mainboard. In embedded Linux system, this firmware/program is called boot ROM. After being loaded into RAM, bootloader will execute to load the second-stage bootloader. The second-stage bootloader will load the kernel image into memory, decompress and initialize it then pass control to this kernel image. Second-stage bootloader also performs several operation on the system such as system hardware check, mounting the root device, loading the necessary kernel modules, etc. Finally, the very first user-space process starts, and other high-level system initializations are performed.

<span class="mw-page-title-main">Computer hardware</span> Physical components of a computer

Computer hardware includes the physical parts of a computer, such as the central processing unit (CPU), random access memory (RAM), motherboard, computer data storage, graphics card, sound card, and computer case. It includes external devices such as a monitor, mouse, keyboard, and speakers.

Rooting is the process by which users of Android devices can attain privileged control over various subsystems of the device, usually smartphones and tablets. Because Android is based on a modified version of the Linux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or macOS.

<span class="mw-page-title-main">Hacking of consumer electronics</span>

The hacking of consumer electronics is a common practice that users perform to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer, programming, and electronics hobbyists.

A hardware reset or hard reset of a computer system is a hardware operation that re-initializes the core hardware components of the system, thus ending all current software operations in the system. This is typically, but not always, followed by booting of the system into firmware that re-initializes the rest of the system, and restarts the operating system.

Custom firmware, also known as aftermarket firmware, is an unofficial new or modified version of firmware created by third parties on devices such as video game consoles, mobile phones, and various embedded device types to provide new features or to unlock hidden functionality. In the video game console community, the term is often written as custom firmware or simply CFW, referring to an altered version of the original system software inside a video game console such as the PlayStation Portable, PlayStation 3, PlayStation Vita/PlayStation TV, PlayStation 4, Nintendo 3DS and Nintendo Switch. Installing custom firmware on some devices requires bootloader unlocking.

The Qualcomm Emergency Download mode, commonly known as Qualcomm EDL mode and officially known as Qualcomm HS-USB QD-Loader 9008 is a feature implemented in the boot ROM of a system on a chip by Qualcomm which can be used to recover bricked smartphones. On Google's Pixel 3, the feature was accidentally shown to users after the phone was bricked.

References

  1. "brick". www.catb.org.
  2. 1 2 "The Big Android Dictionary: A Glossary of Terms You Should Know". WonderHowTo. Retrieved 2017-05-06.
  3. "If you can't update or restore your iPhone, iPad, or iPod Touch". Apple Support. Retrieved 2017-05-06.
  4. "Unbricking a Hard Bricked Android Device". Dot Android. Archived from the original on 2017-04-24. Retrieved 2017-04-24.
  5. "Neo1973 Debug Board v2/Unbricking - Openmoko". wiki.openmoko.org.
  6. 1 2 Unbrick Android phones and tablets
  7. Degusta, Michael (February 22, 2012). "Tesla Motors' Devastating Design Problem". Jalopnik.
  8. "[motherboard] Bricked motherboard after bios update - Computer Hardware Help | DSLReports Forums". DSL Reports. Retrieved 2017-05-06.
  9. "--GIGABYTE--DUAL BIOS WEB". www.gigabyte.com. Retrieved 2017-05-06.
  10. Burke, David. "Thieves frustrated by stolen phone blacklist, hunt for ways around it". CBC News. Retrieved 2019-03-11.
  11. Singleton, Micah (2017-01-30). "Apple gets rid of tool that let you check whether iPhones were stolen". The Verge. Retrieved 2019-03-11.
  12. hoakley (2021-09-21). "El Capitan and older Mac OS X are about to have a security certificate problem". The Eclectic Light Company. Retrieved 2022-05-27.
  13. Helme, Scott (20 September 2021). "Let's Encrypt's Root Certificate is expiring!". Scott Helme. Retrieved 27 May 2021.
  14. "Let's Encrypt's root certificate has expired, and it might break your devices". TechCrunch. Retrieved 2022-05-27.
  15. Hern, Alex (2016-04-05). "Revolv owners furious as Google shuts down smart home company". The Guardian. ISSN   0261-3077 . Retrieved 2019-03-11.
  16. Welch, Chris (2017-11-08). "Logitech will brick its Harmony Link hub for all owners in March". The Verge. Retrieved 2019-03-11.
  17. Gewirtz, David. "Revolv is dead. Google killed it. Long live innovation". ZDNet. Retrieved 2019-03-11.
  18. Diaz, Jesus (2019-03-06). "One of the decade's most hyped robots sends its farewell message". Fast Company. Retrieved 2019-03-11.
  19. Walsh, Kit (2016-04-05). "Nest Reminds Customers That Ownership Isn't What It Used to Be". Electronic Frontier Foundation. Retrieved 2019-03-11.
  20. Chung, Emily (April 6, 2016). "Nest's move to stop supporting Revolv smart hub leaves customers with costly 'brick'". CBC News. Retrieved 2019-03-11.