RabbitHoleEscapeR1/r1_escape

device stuck on USB TRANSFERRING...

Opened this issue · 2 comments

i feel like im so close to getting android on this thing. i even try to run system.img after this was done, in usb transfer mode to no avail. i even tried reinstalling stock firmware (before the ota i think) and then redoing everything and still ends up in usb transfer mode. i tried many things while in this mode but im not sure what i should do. any tips?

**PS C:\Users\mattg\OneDrive\Desktop\r1_escape-main> ./r1.ps1
Security warning
Run only scripts that you trust. While scripts from the internet can be useful, this script can potentially harm your
computer. If you trust this script, use the Unblock-File cmdlet to allow the script to run without this warning
message. Do you want to run C:\Users\mattg\OneDrive\Desktop\r1_escape-main\r1.ps1?
[D] Do not run [R] Run once [S] Suspend [?] Help (default is "D"): r
WARNING: 'choco' was found at 'C:\ProgramData\chocoportable\bin\choco.exe'.
WARNING: An existing Chocolatey installation was detected. Installation will not continue. This script will not
overwrite existing installations.
If there is no Chocolatey installation at 'C:\ProgramData\chocoportable', delete the folder and attempt the
installation again.

Please use choco upgrade chocolatey to handle upgrades of Chocolatey itself.
If the existing installation is not functional or a prior installation did not complete, follow these steps:

  • Backup the files at the path listed above so you can restore your previous installation if needed.
  • Remove the existing installation manually.
  • Rerun this installation script.
  • Reinstall any packages previously installed, if needed (refer to the lib folder in the backup).

Once installation is completed, the backup folder is no longer needed and can be deleted.
Installing python...
Chocolatey v2.3.0
Installing the following packages:
python
By installing, you accept licenses for the packages.
python v3.12.4 already installed.
Use --force to reinstall, specify a version to install, or try upgrade.

Chocolatey installed 0/1 packages.
See the log for details (C:\ProgramData\chocoportable\logs\chocolatey.log).

Warnings:

  • python - python v3.12.4 already installed.
    Use --force to reinstall, specify a version to install, or try upgrade.

Enjoy using Chocolatey? Explore more amazing features to take your
experience to the next level at
https://chocolatey.org/compare
fatal: destination path 'mtkclient' already exists and is not an empty directory.
Requirement already satisfied: wheel>=0.37.1 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 1)) (0.43.0)
Requirement already satisfied: pyusb>=1.2.1 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 2)) (1.2.1)
Requirement already satisfied: pycryptodome>=3.15.0 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 3)) (3.20.0)
Requirement already satisfied: pycryptodomex in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 4)) (3.20.0)
Requirement already satisfied: colorama>=0.4.4 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 5)) (0.4.6)
Requirement already satisfied: shiboken6>=6.4.0.1 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 6)) (6.7.2)
Requirement already satisfied: pyside6>=6.4.0.1 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 7)) (6.7.2)
Requirement already satisfied: mock>=4.0.3 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 8)) (5.1.0)
Requirement already satisfied: pyserial>=3.5 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 9)) (3.5)
Requirement already satisfied: flake8 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 10)) (7.1.0)
Requirement already satisfied: keystone-engine in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 11)) (0.9.2)
Requirement already satisfied: capstone in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 12)) (5.0.1)
Requirement already satisfied: unicorn in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 13)) (2.0.1.post1)
Requirement already satisfied: fusepy in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 14)) (3.0.1)
Requirement already satisfied: PySide6-Essentials==6.7.2 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from pyside6>=6.4.0.1->-r requirements.txt (line 7)) (6.7.2)
Requirement already satisfied: PySide6-Addons==6.7.2 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from pyside6>=6.4.0.1->-r requirements.txt (line 7)) (6.7.2)
Requirement already satisfied: mccabe<0.8.0,>=0.7.0 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from flake8->-r requirements.txt (line 10)) (0.7.0)
Requirement already satisfied: pycodestyle<2.13.0,>=2.12.0 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from flake8->-r requirements.txt (line 10)) (2.12.0)
Requirement already satisfied: pyflakes<3.3.0,>=3.2.0 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from flake8->-r requirements.txt (line 10)) (3.2.0)

[notice] A new release of pip is available: 24.0 -> 24.1
[notice] To update, run: python.exe -m pip install --upgrade pip
[*] Power off the device, press ENTER, and then plug the device in:

MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.

...........

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.

......DeviceClass - Warning !
Port - Device detected :)
Port - Handshake successful.
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 630C7C0BA3E2FF29C91C0245A3959B49
Preloader - SOC_ID: F5B175ACC27F8784CA6F5349A42D9FBF9800FB1B6E5810094E50B3A8D2EEC056
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode.
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
xflashext - DA version anti-rollback patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: DV6DAB
DAXFlash - EMMC CID: 150100445636444142028df9d36339b7
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x1000000
DAXFlash - EMMC USER Size: 0x1d1ec00000
DAXFlash - HW-CODE : 0x766
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA00
DAXFlash - SW-VERSION : 0x0
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Extensions were accepted. Jumping to extensions...
DAXFlash - DA Extensions successfully added
DA_handler - Requesting available partitions ....
DA_handler - Dumping partition "frp"
Progress: |██████████████████████████████████████████████████| 100.0% Read (Sector 0x800 of 0x800, ) 0.51 MB/s51 MB/s
DA_handler - Dumped sector 44096 with sector count 2048 as frp.bin.
[*] Unplug the device, press ENTER, and then plug the device in:

MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.

...........

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.

..........DeviceClass - Warning !
Port - Device detected :)
Port - Handshake successful.
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 630C7C0BA3E2FF29C91C0245A3959B49
Preloader - SOC_ID: F5B175ACC27F8784CA6F5349A42D9FBF9800FB1B6E5810094E50B3A8D2EEC056
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode.
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
xflashext - DA version anti-rollback patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: DV6DAB
DAXFlash - EMMC CID: 150100445636444142028df9d36339b7
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x1000000
DAXFlash - EMMC USER Size: 0x1d1ec00000
DAXFlash - HW-CODE : 0x766
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA00
DAXFlash - SW-VERSION : 0x0
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Extensions were accepted. Jumping to extensions...
DAXFlash - DA Extensions successfully added
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 0.09 MB/s
Wrote frp.bin to sector 44096 with sector count 2048.
[*] Unplug the device, press ENTER, and then plug the device in:

[*] Waiting for fastboot...
(bootloader) Start unlock flow

OKAY [ 3.084s]
Finished. Total time: 3.084s
Erasing 'userdata' OKAY [ 1.398s]
mke2fs 1.46.6 (1-Feb-2023)
Creating filesystem with 28164344 4k blocks and 7045120 inodes
Filesystem UUID: 522950be-36f8-11ef-9c22-231c50e3635c
Superblock backups stored on blocks:
32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632, 2654208,
4096000, 7962624, 11239424, 20480000, 23887872

Allocating group tables: done
Writing inode tables: done
Creating journal (131072 blocks): done
Writing superblocks and filesystem accounting information: done

Warning: skip copying userdata image avb footer due to sparse image.
Sending 'userdata' (544 KB) OKAY [ 0.017s]
Writing 'userdata' OKAY [ 0.052s]
wipe task partition not found: cache
Erasing 'metadata' OKAY [ 0.009s]
Erase successful, but not automatically formatting.
File system type raw data not supported.
Finished. Total time: 1.660s
Rewriting vbmeta struct at offset: 0
Sending 'vbmeta_b' (4 KB) OKAY [ 0.005s]
Writing 'vbmeta_b' OKAY [ 0.003s]
Finished. Total time: 0.013s
(venv) PS C:\Users\mattg\OneDrive\Desktop\r1_escape-main> fastboot flash system system.img
Sending sparse 'system' 1/25 (131060 KB) OKAY [ 3.040s]
Writing 'system' FAILED (remote: 'This partition doesn't exist')
fastboot: error: Command failed**

The device uses a/b partitions, see https://source.android.com/docs/core/ota/ab for an explanation.
Try fastboot flash system_a system.bin (or system_b instead of system_a). Obviously replace system.bin with the actual path to your system image.

Also you can try using ultraflash to greatly speed up the flashing process:
fastboot oem ultraflash_en 1,
fastboot oem ultraflash:<partition>, and finally fastboot flash <partition> <image>.
If the first command doesn't work ('Error: Unknown command'), try rerunning it a second time.

Hope this helps :)

Same here...

DeviceClass - Warning !
Port - Device detected :)
Port - Handshake successful.
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F25AB4489C69AAE1DA164D6C03EE2373
Preloader - SOC_ID: 3FDE811A80AD6AF5C07B17749A4EBC7F486D6C9965893ABC8FFA0D9F5107C614
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode.
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
xflashext
xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
xflashext - DA version anti-rollback patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: DV6DAB
DAXFlash - EMMC CID: 15010044563644414202d67c6a534991
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x1000000
DAXFlash - EMMC USER Size: 0x1d1ec00000
DAXFlash - HW-CODE : 0x766
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA00
DAXFlash - SW-VERSION : 0x0
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Extensions were accepted. Jumping to extensions...
DAXFlash - DA Extensions successfully added
DA_handler - Requesting available partitions ....
DA_handler - Dumping partition "frp"
Progress: |██████████████████████████████████████████████████| 100.0% Read (Sector 0x800 of 0x800, ) 0.51 MB/s51 MB/s
DA_handler - Dumped sector 44096 with sector count 2048 as frp.bin.
[*] Unplug the device, press ENTER, and then plug the device in:

MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.

...........

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.

........DeviceClass - Warning !
Port - Device detected :)
Port - Handshake successful.
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F25AB4489C69AAE1DA164D6C03EE2373
Preloader - SOC_ID: 3FDE811A80AD6AF5C07B17749A4EBC7F486D6C9965893ABC8FFA0D9F5107C614
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode.
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
xflashext
xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
xflashext - DA version anti-rollback patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: DV6DAB
DAXFlash - EMMC CID: 15010044563644414202d67c6a534991
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x1000000
DAXFlash - EMMC USER Size: 0x1d1ec00000
DAXFlash - HW-CODE : 0x766
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA00
DAXFlash - SW-VERSION : 0x0
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Extensions were accepted. Jumping to extensions...
DAXFlash - DA Extensions successfully added
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 0.09 MB/s
Wrote frp.bin to sector 44096 with sector count 2048.
[*] Unplug the device, press ENTER, and then plug the device in:

[*] Waiting for fastboot...
(bootloader) Start unlock flow

OKAY [ 3.034s]
Finished. Total time: 3.034s
Erasing 'userdata' OKAY [ 0.317s]
CreateProcess failed: El sistema no puede encontrar el archivo especificado. (2)
fastboot: error: Cannot generate image for userdata
Rewriting vbmeta struct at offset: 0
Sending 'vbmeta_a' (4 KB) OKAY [ 0.005s]
Writing 'vbmeta_a' OKAY [ 0.002s]
Finished. Total time: 0.011s
Rebooting into fastboot OKAY [ 0.001s]
< waiting for any device >
Finished. Total time: 19.023s
Sending sparse 'system' 1/13 (262112 KB) OKAY [ 9.234s]
Writing 'system' FAILED (remote: 'No such file or directory')
fastboot: error: Command failed
Rebooting OKAY [ 0.000s]
Finished. Total time: 0.001s
(venv) PS C:\Users\Alber\Desktop\R1\r1_escape>