asciilifeform: 0x800000 - if it wasn't obvious - is where uboot parks the kernel prior to jumping in
asciilifeform: incidentally it is possible to write the eeprom from uboot (you gotta pump in the new payloads via tftp in that case, but you save time by not needing to wait for an os - such as the terrifying bloat of systemdized-archlinux - to load)
asciilifeform: (the value is simply the sum of the lengths of mtd0..3, naturally, and these numbers are available in the uboot console if that's all you've got)
asciilifeform: if you monkeyed with your pogo's mtd mappings, you will have to recalculate
asciilifeform: the 0x1000000 is the offset of the default mtd4 eeprom partition
asciilifeform: i possibly ought to discuss the constants
asciilifeform: will post patch set once i can be bothered to crap one out
asciilifeform: any single usg employee's security, in all respects, continues at the MERCY of unidentified party. in no sense and in no manner does it flow from usg-anything << to be fair, the very reason why 'identity theft' is a real problem for anybody is usg
asciilifeform: not same principle. snippets of synthetic nucleic acid are used, it goes (or more often, doesn't..) to a specific place, there is a (usually bad) protein model to predict effect, etc.