[qca-nss-drv] 64 bits support
1. Set message/data buffer opaque size based on 32/64 bits platform
2. Support NET_SKBUFF_DATA_USES_OFFSET
3. Use __iomem type for system io address
Change-Id: Idc2278a2174513658046303a8e9b72d868ac97b2
Signed-off-by: Stephen Wang <wstephen@codeaurora.org>
diff --git a/nss_crypto.c b/nss_crypto.c
index 7697414..75ad1e0 100644
--- a/nss_crypto.c
+++ b/nss_crypto.c
@@ -87,8 +87,8 @@
}
if (ncm->response == NSS_CMM_RESPONSE_NOTIFY) {
- ncm->cb = (uint32_t)nss_crypto_get_msg_callback(nss_ctx, &crypto_ctx);
- ncm->app_data = (uint32_t)crypto_ctx;
+ ncm->cb = (nss_ptr_t)nss_crypto_get_msg_callback(nss_ctx, &crypto_ctx);
+ ncm->app_data = (nss_ptr_t)crypto_ctx;
}
@@ -132,7 +132,7 @@
if (NSS_NBUF_PAYLOAD_SIZE < sizeof(struct nss_crypto_msg)) {
nss_warning("%p: tx message request is too large: %d (desired), %d (requested)", nss_ctx,
- NSS_NBUF_PAYLOAD_SIZE, sizeof(struct nss_crypto_msg));
+ NSS_NBUF_PAYLOAD_SIZE, (int)sizeof(struct nss_crypto_msg));
return NSS_TX_FAILURE_TOO_LARGE;
}
@@ -157,8 +157,8 @@
return NSS_TX_FAILURE;
}
- nss_info("msg params version:%d, interface:%d, type:%d, cb:%d, app_data:%d, len:%d\n",
- ncm->version, ncm->interface, ncm->type, ncm->cb, ncm->app_data, ncm->len);
+ nss_info("msg params version:%d, interface:%d, type:%d, cb:%p, app_data:%p, len:%d\n",
+ ncm->version, ncm->interface, ncm->type, (void *)ncm->cb, (void *)ncm->app_data, ncm->len);
nim = (struct nss_crypto_msg *)skb_put(nbuf, sizeof(struct nss_crypto_msg));
memcpy(nim, msg, sizeof(struct nss_crypto_msg));