Samsung Note 2 rooting Problem?

droiddoesdo

Member
May 27, 2011
20
0
0
Visit site
I tried to root my NOTE 2 using the Casual software, here is my error code and now my phone is blinking "samsung Gallaxy Note" in the beginining of boot?? any help please?

this is where the start of error began??




Driver Installed Successfully...
Continuing...
Target Device Found:"Modem" Found at:( 04E8:685D )
Preparing Driver...
Driver Prepared...
Installing Driver...
Installing Driver...
cadi:debug [installer process] got parameter cadi.inf
cadi:debug [installer process] got device_id: 'USB\VID_04E8&PID_685D&MODEM\6&22935F60&0&0000'
cadi:debug [installer process] got hardware_id: 'USB\VID_04E8&PID_685D&REV_021;&Modem'
cadi:debug [installer process] got user_sid: 'S-1-5-21-2783966815-1835829030-412175627-637584'
cadi:debug [installer process] using syslog 'C:\Windows\inf\setupapi.dev.log'
cadi:debug [installer process] sylog reader thread started
cadi:debug [installer process] successfully disabled the system restore point creation setting
cadi:debug [installer process] Installing driver for USB\VID_04E8&PID_685D&REV_021;&Modem - please wait...
cadi:debug [installer process] device not detected (copying driver files for next time device is plugged in)
cadi:debug [installer process] Copying inf file (for the next time device is plugged) - please wait...
cadi:debug [installer process] copied inf to C:\Windows\INF\oem174.inf
cadi:debug [installer process] re-enumerating driver node USB\VID_04E8&PID_685D&MODEM\6&22935F60&0&0000...
cadi:debug [installer process] failed to locate device_id USB\VID_04E8&PID_685D&MODEM\6&22935F60&0&0000: d

cadi:debug [installer process] successfully restored the system restore point creation setting
cadi:debug [syslog] ERROR: Unable to convert log entry to UTF-8
cadi:debug [syslog] >>> [Device Install (UpdateDriverForPlugAndPlayDevices) - USB\VID_04E8&PID_685D&REV_021;&Modem]
cadi:debug [syslog] >>> Section start 2013/11/15 08:28:29.641
cadi:debug [syslog] cmd: C:\Users\JLPALL~1\AppData\Local\Temp\\installer_x64.exe cadi.inf
cadi:debug [syslog] <<< Section end 2013/11/15 08:28:29.672
cadi:debug [syslog] <<< [Exit status: SUCCESS]
cadi:debug [syslog] >>> [SetupCopyOEMInf - C:\Users\JLPALL~1\AppData\Local\Temp\cadi.inf]
cadi:debug [syslog] >>> Section start 2013/11/15 08:28:29.687
cadi:debug [syslog] cmd: C:\Users\JLPALL~1\AppData\Local\Temp\\installer_x64.exe cadi.inf
cadi:debug [syslog] ! inf: Package was already in store: skipping Driver Store add
cadi:debug [syslog] inf: Driver Store location: C:\Windows\System32\DriverStore\FileRepository\cadi.inf_amd64_neutral_5e145ebf3c7e43fc\cadi.inf
cadi:debug [syslog] inf: Published Inf Path: C:\Windows\INF\oem174.inf
cadi:debug [syslog] <<< Section end 2013/11/15 08:28:29.703
cadi:debug [syslog] <<< [Exit status: SUCCESS]
Driver Installed Successfully...
Continuing...
2 Devices Install Successfully...
Quiting...

cadi:info [CADI] Success



[Heimdall Error Report] Detected:
'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
[/Heimdall Error Report]


Heimdall v1.4 RC2

Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
Glass Echidna - Software down under.

This software is provided free of charge. Copying and redistribution is
encouraged.

If you appreciate this software and you would like to support future
development please consider donating:
Donate – Glass Echidna

Initialising connection...
Detecting device...
Claiming interface...
Setting up interface...

Checking if protocol is initialised...
Protocol is not initialised.

Initialising protocol...
Protocol initialisation successful.

Beginning session...

This device may take up to 2 minutes to respond.
Please be patient!

Session begun.

Downloading device's PIT file...
PIT file download successful.

Uploading BOOT
100%
BOOT upload successful

Ending session...
Rebooting device...
Releasing device interface...


[Heimdall Success]


Your device should be rebooting into Android now.
waiting for ADB device connection...
mkdir failed for /data/local/tmp, File existsPushing dependencies
Pushing su binary...
2878 KB/s (91980 bytes in 0.031s)
Pushing SuperSU app...
5199 KB/s (996704 bytes in 0.187s)
Pushing Exynos-Abuse exploit
4029 KB/s (64373 bytes in 0.015s)
Pushing root script
0 KB/s (361 bytes in 1.000s)
Pushing Busybox
4330 KB/s (1867568 bytes in 0.421s)
Pushing viewmem
5 KB/s (5417 bytes in 1.000s)
Pushing pit
8 KB/s (8192 bytes in 1.000s)
Setting Permissions....
Executing Root Exploit.
[*] s_show->seq_printf format string found at: 0xC086C348[*] sys_setresuid found at 0xC00967C4[*] patching sys_setresuid at 0xC0096808remounting system rw....moving su into positionmoving Superuser.apk into position[x]Ready for exploit
Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012[x]Found rooted device[x]Device Verification Checks Complete
[x]Ready for exploit
Injecting Code
16+0 records in16+0 records out8192 bytes transferred in 0.002 secs (4096000 bytes/sec)[x]Exploit Injection Done.
your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: Dev-Host - OfficeSuite Pro 7 (PDF & HD) v7.3.1513.apk - The Ultimate Free File Hosting / File Sharing Service. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
Waiting for Downoad Mode device.......Executing Heimdall command.
Heimdall v1.4 RC2

Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
Glass Echidna - Software down under.

This software is provided free of charge. Copying and redistribution is
encouraged.

If you appreciate this software and you would like to support future
development please consider donating:
Donate – Glass Echidna

Initialising connection...
Detecting device...
Claiming interface...
Setting up interface...

Checking if protocol is initialised...
Protocol is not initialised.

Initialising protocol...
Protocol initialisation successful.

Beginning session...

This device may take up to 2 minutes to respond.
Please be patient!

Session begun.

Downloading device's PIT file...
PIT file download successful.

Uploading recovery
100%
ERROR: Failed to confirm end of file transfer sequence!
ERROR: recovery upload failed!

Ending session...
ERROR: Failed to send end session packet!
Releasing device interface...


[Heimdall Error Report] Detected:
Heimdall uncontinuable error; Script halted
[/Heimdall Error Report]


Connection timed out: connect
[CRITICAL]null
null
java.lang.NullPointerException

java.lang.NullPointerException
at CASUAL.Pastebin$API.checkResponse(Pastebin.java:107)
at CASUAL.Pastebin$API.login(Pastebin.java:122)
at CASUAL.Pastebin.doPosting(Pastebin.java:61)
at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:198)
at CASUAL.CASUALScriptParser.executeOneShotCommand(CASUALScriptParser.java:85)
at CASUAL.HeimdallTools.doHeimdallShellCommand(HeimdallTools.java:105)
at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:494)
at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:121)
at java.lang.Thread.run(Unknown Source)

A critical error was encoutered. Please copy the log from About>Show Log and report this issue
[CRITICAL]CASUAL scripting error
$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
CASUAL scripting error
$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
java.lang.RuntimeException: CASUAL scripting error
$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"

java.lang.RuntimeException: CASUAL scripting error
$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:73)
at CASUAL.CASUALScriptParser$1.run(CASUALScriptParser.java:121)
at java.lang.Thread.run(Unknown Source)
Caused by: java.lang.NullPointerException
at CASUAL.Pastebin$API.checkResponse(Pastebin.java:107)
at CASUAL.Pastebin$API.login(Pastebin.java:122)
at CASUAL.Pastebin.doPosting(Pastebin.java:61)
at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:198)
at CASUAL.CASUALScriptParser.executeOneShotCommand(CASUALScriptParser.java:85)
at CASUAL.HeimdallTools.doHeimdallShellCommand(HeimdallTools.java:105)
at CASUAL.CASUALLanguage.commandHandler(CASUALLanguage.java:494)
at CASUAL.CASUALLanguage.beginScriptingHandler(CASUALLanguage.java:66)
... 2 more

A critical error was encoutered. Please copy the log from About>Show Log and report this issue
CASUAL experienced an error while parsing command:
$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
please report the above exception.
 

jdub1981

Well-known member
Nov 26, 2012
1,382
0
0
Visit site
Flatout you should cfautoroot only because it uses the same software needed for troubleshooting or restoring. I thought the exynos abuse hole was closed maybe that is why this method has failed.

Sent from my Galaxy Note 2
 

Forum statistics

Threads
943,143
Messages
6,917,487
Members
3,158,838
Latest member
akbarramadhani12