You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

zhemv_k.c 5.7 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. /*********************************************************************/
  2. /* Copyright 2009, 2010 The University of Texas at Austin. */
  3. /* All rights reserved. */
  4. /* */
  5. /* Redistribution and use in source and binary forms, with or */
  6. /* without modification, are permitted provided that the following */
  7. /* conditions are met: */
  8. /* */
  9. /* 1. Redistributions of source code must retain the above */
  10. /* copyright notice, this list of conditions and the following */
  11. /* disclaimer. */
  12. /* */
  13. /* 2. Redistributions in binary form must reproduce the above */
  14. /* copyright notice, this list of conditions and the following */
  15. /* disclaimer in the documentation and/or other materials */
  16. /* provided with the distribution. */
  17. /* */
  18. /* THIS SOFTWARE IS PROVIDED BY THE UNIVERSITY OF TEXAS AT */
  19. /* AUSTIN ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, */
  20. /* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF */
  21. /* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE */
  22. /* DISCLAIMED. IN NO EVENT SHALL THE UNIVERSITY OF TEXAS AT */
  23. /* AUSTIN OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, */
  24. /* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES */
  25. /* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE */
  26. /* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR */
  27. /* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF */
  28. /* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */
  29. /* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT */
  30. /* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE */
  31. /* POSSIBILITY OF SUCH DAMAGE. */
  32. /* */
  33. /* The views and conclusions contained in the software and */
  34. /* documentation are those of the authors and should not be */
  35. /* interpreted as representing official policies, either expressed */
  36. /* or implied, of The University of Texas at Austin. */
  37. /*********************************************************************/
  38. #include <stdio.h>
  39. #include <ctype.h>
  40. #include "common.h"
  41. #include "symcopy.h"
  42. int CNAME(BLASLONG m, BLASLONG offset, FLOAT alpha_r, FLOAT alpha_i,
  43. FLOAT *a, BLASLONG lda, FLOAT *x, BLASLONG incx, FLOAT *y, BLASLONG incy, FLOAT *buffer){
  44. BLASLONG is, min_i;
  45. FLOAT *X = x;
  46. FLOAT *Y = y;
  47. FLOAT *symbuffer = buffer;
  48. FLOAT *gemvbuffer = (FLOAT *)(((BLASLONG)buffer + SYMV_P * SYMV_P * sizeof(FLOAT) * 2 + 4095) & ~4095);
  49. FLOAT *bufferY = gemvbuffer;
  50. FLOAT *bufferX = gemvbuffer;
  51. if (incy != 1) {
  52. Y = bufferY;
  53. bufferX = (FLOAT *)(((BLASLONG)bufferY + m * sizeof(FLOAT) * 2 + 4095) & ~4095);
  54. gemvbuffer = bufferX;
  55. COPY_K(m, y, incy, Y, 1);
  56. }
  57. if (incx != 1) {
  58. X = bufferX;
  59. gemvbuffer = (FLOAT *)(((BLASLONG)bufferX + m * sizeof(FLOAT) * 2 + 4095) & ~4095);
  60. COPY_K(m, x, incx, X, 1);
  61. }
  62. #ifndef LOWER
  63. for(is = m - offset; is < m; is += SYMV_P){
  64. min_i = MIN(m - is, SYMV_P);
  65. #else
  66. for(is = 0; is < offset; is += SYMV_P){
  67. min_i = MIN(offset - is, SYMV_P);
  68. #endif
  69. #ifndef LOWER
  70. if (is > 0){
  71. #ifndef HEMVREV
  72. GEMV_C(is, min_i, 0, alpha_r, alpha_i,
  73. a + is * lda * 2, lda,
  74. X, 1,
  75. Y + is * 2, 1, gemvbuffer);
  76. GEMV_N(is, min_i, 0, alpha_r, alpha_i,
  77. a + is * lda * 2, lda,
  78. X + is * 2, 1,
  79. Y, 1, gemvbuffer);
  80. #else
  81. GEMV_T(is, min_i, 0, alpha_r, alpha_i,
  82. a + is * lda * 2, lda,
  83. X, 1,
  84. Y + is * 2, 1, gemvbuffer);
  85. GEMV_R(is, min_i, 0, alpha_r, alpha_i,
  86. a + is * lda * 2, lda,
  87. X + is * 2, 1,
  88. Y, 1, gemvbuffer);
  89. #endif
  90. }
  91. #endif
  92. #ifndef HEMVREV
  93. #ifdef LOWER
  94. ZHEMCOPY_L(min_i, a + (is + is * lda) * 2, lda, symbuffer);
  95. #else
  96. ZHEMCOPY_U(min_i, a + (is + is * lda) * 2, lda, symbuffer);
  97. #endif
  98. #else
  99. #ifdef LOWER
  100. ZHEMCOPY_M(min_i, a + (is + is * lda) * 2, lda, symbuffer);
  101. #else
  102. ZHEMCOPY_V(min_i, a + (is + is * lda) * 2, lda, symbuffer);
  103. #endif
  104. #endif
  105. GEMV_N(min_i, min_i, 0, alpha_r, alpha_i,
  106. symbuffer, min_i,
  107. X + is * 2, 1,
  108. Y + is * 2, 1, gemvbuffer);
  109. #ifdef LOWER
  110. if (m - is - min_i > 0){
  111. #ifndef HEMVREV
  112. GEMV_C(m - is - min_i, min_i, 0, alpha_r, alpha_i,
  113. a + ((is + min_i) + is * lda) * 2, lda,
  114. X + (is + min_i) * 2, 1,
  115. Y + is * 2, 1, gemvbuffer);
  116. GEMV_N(m - is - min_i, min_i, 0, alpha_r, alpha_i,
  117. a + ((is + min_i) + is * lda) * 2, lda,
  118. X + is * 2, 1,
  119. Y + (is + min_i) * 2, 1, gemvbuffer);
  120. #else
  121. GEMV_T(m - is - min_i, min_i, 0, alpha_r, alpha_i,
  122. a + ((is + min_i) + is * lda) * 2, lda,
  123. X + (is + min_i) * 2, 1,
  124. Y + is * 2, 1, gemvbuffer);
  125. GEMV_R(m - is - min_i, min_i, 0, alpha_r, alpha_i,
  126. a + ((is + min_i) + is * lda) * 2, lda,
  127. X + is * 2, 1,
  128. Y + (is + min_i) * 2, 1, gemvbuffer);
  129. #endif
  130. }
  131. #endif
  132. } /* end of is */
  133. if (incy != 1) {
  134. COPY_K(m, Y, 1, y, incy);
  135. }
  136. return 0;
  137. }