Hi Lordbyte, other guys on the forum have rooted F-series TV with fw 1111.0, so probably ("probably"... because we've a different model) the problem is not ?the fw version.
So, I don't know who is the root method developer (you, bugficks or juuso, or others) so I've tried to understand how it works, in order to debug what happens on my TV: I hope that this very short and incomplete analysis doesn't create any problem to the developer!
1) during the installation of the SamyGO widget the run.sh and data.zi p files are copied into the widget directory on the TV
2) at the execution time, the widget copies AutoStart and modified libSkype.so from the USB pen to the Skype directory on the TV
3) at the TV boot time, libSkype.so is executed by the autostart process and the modified library executes the run.sh (I think with root user's rights)
4) run.sh expands data.zip, installs in /tmp/bin the busibox, makes something about ftp (I don't understand what!
), runs your remshd executable program -probably the heart of your hack-, and it ends by killing the run'sh's child processes and system UEP's child processes (i don't know these...)
So, my idea to debug the tool installation has been to modify the run.sh script, in order to write some log files to the USB pen (e.g. /dvt/usb/sd1/log folder) to verify if the script starts at the boot time and what does it do!
Do you think that this script is capable to write these log files? If it runs as root user it doesn't have any problem...
I'll inform you about this test, obviously I'll be very grateful for any suggestion!