Open potsogold opened 5 months ago
The device uses a/b partitions, see https://source.android.com/docs/core/ota/ab for an explanation.
Try fastboot flash system_a system.bin
(or system_b
instead of system_a
). Obviously replace system.bin
with the actual path to your system image.
Also you can try using ultraflash to greatly speed up the flashing process:
fastboot oem ultraflash_en 1
,
fastboot oem ultraflash:<partition>
, and finally fastboot flash <partition> <image>
.
If the first command doesn't work ('Error: Unknown command'), try rerunning it a second time.
Hope this helps :)
Same here...
DeviceClass - Warning ! Port - Device detected :) Port - Handshake successful. Preloader - CPU: MT6765/MT8768t(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: F25AB4489C69AAE1DA164D6C03EE2373 Preloader - SOC_ID: 3FDE811A80AD6AF5C07B17749A4EBC7F486D6C9965893ABC8FFA0D9F5107C614 DA_handler - Device is unprotected. DA_handler - Device is in Preloader-Mode. DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... xflashext - DA version anti-rollback patched DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: DV6DAB DAXFlash - EMMC CID: 15010044563644414202d67c6a534991 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x1000000 DAXFlash - EMMC USER Size: 0x1d1ec00000 DAXFlash - HW-CODE : 0x766 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCA00 DAXFlash - SW-VERSION : 0x0 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Extensions were accepted. Jumping to extensions... DAXFlash - DA Extensions successfully added DA_handler - Requesting available partitions .... DA_handler - Dumping partition "frp" Progress: |██████████████████████████████████████████████████| 100.0% Read (Sector 0x800 of 0x800, ) 0.51 MB/s51 MB/s DA_handler - Dumped sector 44096 with sector count 2048 as frp.bin. [*] Unplug the device, press ENTER, and then plug the device in:
MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023
Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.
........DeviceClass - Warning ! Port - Device detected :) Port - Handshake successful. Preloader - CPU: MT6765/MT8768t(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: F25AB4489C69AAE1DA164D6C03EE2373 Preloader - SOC_ID: 3FDE811A80AD6AF5C07B17749A4EBC7F486D6C9965893ABC8FFA0D9F5107C614 DA_handler - Device is unprotected. DA_handler - Device is in Preloader-Mode. DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... xflashext - DA version anti-rollback patched DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: DV6DAB DAXFlash - EMMC CID: 15010044563644414202d67c6a534991 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x1000000 DAXFlash - EMMC USER Size: 0x1d1ec00000 DAXFlash - HW-CODE : 0x766 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCA00 DAXFlash - SW-VERSION : 0x0 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Extensions were accepted. Jumping to extensions... DAXFlash - DA Extensions successfully added Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 0.09 MB/s Wrote frp.bin to sector 44096 with sector count 2048. [*] Unplug the device, press ENTER, and then plug the device in:
[*] Waiting for fastboot... (bootloader) Start unlock flow
OKAY [ 3.034s] Finished. Total time: 3.034s Erasing 'userdata' OKAY [ 0.317s] CreateProcess failed: El sistema no puede encontrar el archivo especificado. (2) fastboot: error: Cannot generate image for userdata Rewriting vbmeta struct at offset: 0 Sending 'vbmeta_a' (4 KB) OKAY [ 0.005s] Writing 'vbmeta_a' OKAY [ 0.002s] Finished. Total time: 0.011s Rebooting into fastboot OKAY [ 0.001s] < waiting for any device > Finished. Total time: 19.023s Sending sparse 'system' 1/13 (262112 KB) OKAY [ 9.234s] Writing 'system' FAILED (remote: 'No such file or directory') fastboot: error: Command failed Rebooting OKAY [ 0.000s] Finished. Total time: 0.001s (venv) PS C:\Users\Alber\Desktop\R1\r1_escape>
i feel like im so close to getting android on this thing. i even try to run system.img after this was done, in usb transfer mode to no avail. i even tried reinstalling stock firmware (before the ota i think) and then redoing everything and still ends up in usb transfer mode. i tried many things while in this mode but im not sure what i should do. any tips?
**PS C:\Users\mattg\OneDrive\Desktop\r1_escape-main> ./r1.ps1
Security warning Run only scripts that you trust. While scripts from the internet can be useful, this script can potentially harm your computer. If you trust this script, use the Unblock-File cmdlet to allow the script to run without this warning message. Do you want to run C:\Users\mattg\OneDrive\Desktop\r1_escape-main\r1.ps1? [D] Do not run [R] Run once [S] Suspend [?] Help (default is "D"): r WARNING: 'choco' was found at 'C:\ProgramData\chocoportable\bin\choco.exe'. WARNING: An existing Chocolatey installation was detected. Installation will not continue. This script will not overwrite existing installations. If there is no Chocolatey installation at 'C:\ProgramData\chocoportable', delete the folder and attempt the installation again.
Please use choco upgrade chocolatey to handle upgrades of Chocolatey itself. If the existing installation is not functional or a prior installation did not complete, follow these steps:
Once installation is completed, the backup folder is no longer needed and can be deleted. Installing python... Chocolatey v2.3.0 Installing the following packages: python By installing, you accept licenses for the packages. python v3.12.4 already installed. Use --force to reinstall, specify a version to install, or try upgrade.
Chocolatey installed 0/1 packages. See the log for details (C:\ProgramData\chocoportable\logs\chocolatey.log).
Warnings:
Enjoy using Chocolatey? Explore more amazing features to take your experience to the next level at https://chocolatey.org/compare fatal: destination path 'mtkclient' already exists and is not an empty directory. Requirement already satisfied: wheel>=0.37.1 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 1)) (0.43.0) Requirement already satisfied: pyusb>=1.2.1 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 2)) (1.2.1) Requirement already satisfied: pycryptodome>=3.15.0 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 3)) (3.20.0) Requirement already satisfied: pycryptodomex in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 4)) (3.20.0) Requirement already satisfied: colorama>=0.4.4 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 5)) (0.4.6) Requirement already satisfied: shiboken6>=6.4.0.1 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 6)) (6.7.2) Requirement already satisfied: pyside6>=6.4.0.1 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 7)) (6.7.2) Requirement already satisfied: mock>=4.0.3 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 8)) (5.1.0) Requirement already satisfied: pyserial>=3.5 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 9)) (3.5) Requirement already satisfied: flake8 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 10)) (7.1.0) Requirement already satisfied: keystone-engine in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 11)) (0.9.2) Requirement already satisfied: capstone in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 12)) (5.0.1) Requirement already satisfied: unicorn in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 13)) (2.0.1.post1) Requirement already satisfied: fusepy in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from -r requirements.txt (line 14)) (3.0.1) Requirement already satisfied: PySide6-Essentials==6.7.2 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from pyside6>=6.4.0.1->-r requirements.txt (line 7)) (6.7.2) Requirement already satisfied: PySide6-Addons==6.7.2 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from pyside6>=6.4.0.1->-r requirements.txt (line 7)) (6.7.2) Requirement already satisfied: mccabe<0.8.0,>=0.7.0 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from flake8->-r requirements.txt (line 10)) (0.7.0) Requirement already satisfied: pycodestyle<2.13.0,>=2.12.0 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from flake8->-r requirements.txt (line 10)) (2.12.0) Requirement already satisfied: pyflakes<3.3.0,>=3.2.0 in c:\users\mattg\onedrive\desktop\r1_escape-main\venv\lib\site-packages (from flake8->-r requirements.txt (line 10)) (3.2.0)
[notice] A new release of pip is available: 24.0 -> 24.1 [notice] To update, run: python.exe -m pip install --upgrade pip [*] Power off the device, press ENTER, and then plug the device in:
MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023
Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.
......DeviceClass - Warning ! Port - Device detected :) Port - Handshake successful. Preloader - CPU: MT6765/MT8768t(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: 630C7C0BA3E2FF29C91C0245A3959B49 Preloader - SOC_ID: F5B175ACC27F8784CA6F5349A42D9FBF9800FB1B6E5810094E50B3A8D2EEC056 DA_handler - Device is unprotected. DA_handler - Device is in Preloader-Mode. DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: Error on patching da1 version check... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... xflashext - DA version anti-rollback patched DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: DV6DAB DAXFlash - EMMC CID: 150100445636444142028df9d36339b7 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x1000000 DAXFlash - EMMC USER Size: 0x1d1ec00000 DAXFlash - HW-CODE : 0x766 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCA00 DAXFlash - SW-VERSION : 0x0 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Extensions were accepted. Jumping to extensions... DAXFlash - DA Extensions successfully added DA_handler - Requesting available partitions .... DA_handler - Dumping partition "frp" Progress: |██████████████████████████████████████████████████| 100.0% Read (Sector 0x800 of 0x800, ) 0.51 MB/s51 MB/s DA_handler - Dumped sector 44096 with sector count 2048 as frp.bin. [*] Unplug the device, press ENTER, and then plug the device in:
MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023
Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.
..........DeviceClass - Warning ! Port - Device detected :) Port - Handshake successful. Preloader - CPU: MT6765/MT8768t(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: 630C7C0BA3E2FF29C91C0245A3959B49 Preloader - SOC_ID: F5B175ACC27F8784CA6F5349A42D9FBF9800FB1B6E5810094E50B3A8D2EEC056 DA_handler - Device is unprotected. DA_handler - Device is in Preloader-Mode. DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: Error on patching da1 version check... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... xflashext - DA version anti-rollback patched DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: DV6DAB DAXFlash - EMMC CID: 150100445636444142028df9d36339b7 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x1000000 DAXFlash - EMMC USER Size: 0x1d1ec00000 DAXFlash - HW-CODE : 0x766 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCA00 DAXFlash - SW-VERSION : 0x0 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Extensions were accepted. Jumping to extensions... DAXFlash - DA Extensions successfully added Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 0.09 MB/s Wrote frp.bin to sector 44096 with sector count 2048. [*] Unplug the device, press ENTER, and then plug the device in:
[*] Waiting for fastboot... (bootloader) Start unlock flow
OKAY [ 3.084s] Finished. Total time: 3.084s Erasing 'userdata' OKAY [ 1.398s] mke2fs 1.46.6 (1-Feb-2023) Creating filesystem with 28164344 4k blocks and 7045120 inodes Filesystem UUID: 522950be-36f8-11ef-9c22-231c50e3635c Superblock backups stored on blocks: 32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632, 2654208, 4096000, 7962624, 11239424, 20480000, 23887872
Allocating group tables: done Writing inode tables: done Creating journal (131072 blocks): done Writing superblocks and filesystem accounting information: done
Warning: skip copying userdata image avb footer due to sparse image. Sending 'userdata' (544 KB) OKAY [ 0.017s] Writing 'userdata' OKAY [ 0.052s] wipe task partition not found: cache Erasing 'metadata' OKAY [ 0.009s] Erase successful, but not automatically formatting. File system type raw data not supported. Finished. Total time: 1.660s Rewriting vbmeta struct at offset: 0 Sending 'vbmeta_b' (4 KB) OKAY [ 0.005s] Writing 'vbmeta_b' OKAY [ 0.003s] Finished. Total time: 0.013s (venv) PS C:\Users\mattg\OneDrive\Desktop\r1_escape-main> fastboot flash system system.img Sending sparse 'system' 1/25 (131060 KB) OKAY [ 3.040s] Writing 'system' FAILED (remote: 'This partition doesn't exist') fastboot: error: Command failed**