1. Now we know where the eeprom is in the memory map of a G1 phone, its size and as well at
least one of its elements.
2. I've know a few embedded developers who try to write an IOCTL-driven character device to
access the most trivial one-off hardware. Here, we can see the Android developers are at least
pragmatic about embedded development. Maybe some embedded developer will finally slap his
head and say 'of course - why was I going to all that trouble with /dev/eeprom when /dev/mem
was just as useful'
3. This code obviously has to run as root - somebody can audit the code now for security