[qca-nss-drv] 64 bits support

1. Set message/data buffer opaque size based on 32/64 bits platform
2. Support NET_SKBUFF_DATA_USES_OFFSET
3. Use __iomem type for system io address

Change-Id: Idc2278a2174513658046303a8e9b72d868ac97b2
Signed-off-by: Stephen Wang <wstephen@codeaurora.org>
diff --git a/nss_crypto.c b/nss_crypto.c
index 7697414..75ad1e0 100644
--- a/nss_crypto.c
+++ b/nss_crypto.c
@@ -87,8 +87,8 @@
 	}
 
 	if (ncm->response == NSS_CMM_RESPONSE_NOTIFY) {
-		ncm->cb = (uint32_t)nss_crypto_get_msg_callback(nss_ctx, &crypto_ctx);
-		ncm->app_data = (uint32_t)crypto_ctx;
+		ncm->cb = (nss_ptr_t)nss_crypto_get_msg_callback(nss_ctx, &crypto_ctx);
+		ncm->app_data = (nss_ptr_t)crypto_ctx;
 	}
 
 
@@ -132,7 +132,7 @@
 
 	if (NSS_NBUF_PAYLOAD_SIZE < sizeof(struct nss_crypto_msg)) {
 		nss_warning("%p: tx message request is too large: %d (desired), %d (requested)", nss_ctx,
-				NSS_NBUF_PAYLOAD_SIZE, sizeof(struct nss_crypto_msg));
+				NSS_NBUF_PAYLOAD_SIZE, (int)sizeof(struct nss_crypto_msg));
 		return NSS_TX_FAILURE_TOO_LARGE;
 	}
 
@@ -157,8 +157,8 @@
 		return NSS_TX_FAILURE;
 	}
 
-	nss_info("msg params version:%d, interface:%d, type:%d, cb:%d, app_data:%d, len:%d\n",
-			ncm->version, ncm->interface, ncm->type, ncm->cb, ncm->app_data, ncm->len);
+	nss_info("msg params version:%d, interface:%d, type:%d, cb:%p, app_data:%p, len:%d\n",
+			ncm->version, ncm->interface, ncm->type, (void *)ncm->cb, (void *)ncm->app_data, ncm->len);
 
 	nim = (struct nss_crypto_msg *)skb_put(nbuf, sizeof(struct nss_crypto_msg));
 	memcpy(nim, msg, sizeof(struct nss_crypto_msg));