You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

ztrsv_U.c 5.6 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168
  1. /*********************************************************************/
  2. /* Copyright 2009, 2010 The University of Texas at Austin. */
  3. /* All rights reserved. */
  4. /* */
  5. /* Redistribution and use in source and binary forms, with or */
  6. /* without modification, are permitted provided that the following */
  7. /* conditions are met: */
  8. /* */
  9. /* 1. Redistributions of source code must retain the above */
  10. /* copyright notice, this list of conditions and the following */
  11. /* disclaimer. */
  12. /* */
  13. /* 2. Redistributions in binary form must reproduce the above */
  14. /* copyright notice, this list of conditions and the following */
  15. /* disclaimer in the documentation and/or other materials */
  16. /* provided with the distribution. */
  17. /* */
  18. /* THIS SOFTWARE IS PROVIDED BY THE UNIVERSITY OF TEXAS AT */
  19. /* AUSTIN ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, */
  20. /* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF */
  21. /* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE */
  22. /* DISCLAIMED. IN NO EVENT SHALL THE UNIVERSITY OF TEXAS AT */
  23. /* AUSTIN OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, */
  24. /* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES */
  25. /* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE */
  26. /* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR */
  27. /* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF */
  28. /* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */
  29. /* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT */
  30. /* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE */
  31. /* POSSIBILITY OF SUCH DAMAGE. */
  32. /* */
  33. /* The views and conclusions contained in the software and */
  34. /* documentation are those of the authors and should not be */
  35. /* interpreted as representing official policies, either expressed */
  36. /* or implied, of The University of Texas at Austin. */
  37. /*********************************************************************/
  38. #include <stdio.h>
  39. #include <ctype.h>
  40. #include "common.h"
  41. const static FLOAT dm1 = -1.;
  42. int CNAME(BLASLONG m, FLOAT *a, BLASLONG lda, FLOAT *b, BLASLONG incb, void *buffer){
  43. BLASLONG i, is, min_i;
  44. #if (TRANSA == 2) || (TRANSA == 4)
  45. OPENBLAS_COMPLEX_FLOAT result;
  46. #endif
  47. #ifndef UNIT
  48. FLOAT ar, ai, br, bi, ratio, den;
  49. #endif
  50. FLOAT *gemvbuffer = (FLOAT *)buffer;
  51. FLOAT *B = b;
  52. if (incb != 1) {
  53. B = buffer;
  54. gemvbuffer = (FLOAT *)(((BLASLONG)buffer + m * sizeof(FLOAT) * 2 + 4095) & ~4095);
  55. COPY_K(m, b, incb, buffer, 1);
  56. }
  57. for (is = m; is > 0; is -= DTB_ENTRIES){
  58. min_i = MIN(is, DTB_ENTRIES);
  59. #if (TRANSA == 2) || (TRANSA == 4)
  60. if (m - is > 0){
  61. #if TRANSA == 2
  62. GEMV_T(m - is, min_i, 0, dm1, ZERO,
  63. a + (is + (is - min_i) * lda) * COMPSIZE, lda,
  64. B + is * COMPSIZE, 1,
  65. B + (is - min_i) * COMPSIZE, 1, gemvbuffer);
  66. #else
  67. GEMV_C(m - is, min_i, 0, dm1, ZERO,
  68. a + (is + (is - min_i) * lda) * COMPSIZE, lda,
  69. B + is * COMPSIZE, 1,
  70. B + (is - min_i) * COMPSIZE, 1, gemvbuffer);
  71. #endif
  72. }
  73. #endif
  74. for (i = 0; i < min_i; i++) {
  75. FLOAT *AA = a + ((is - i - 1) + (is - i - 1) * lda) * COMPSIZE;
  76. FLOAT *BB = B + (is - i - 1) * COMPSIZE;
  77. #if (TRANSA == 2) || (TRANSA == 4)
  78. if (i > 0) {
  79. #if TRANSA == 2
  80. result = DOTU_K(i, AA + 2, 1, BB + 2, 1);
  81. #else
  82. result = DOTC_K(i, AA + 2, 1, BB + 2, 1);
  83. #endif
  84. BB[0] -= CREAL(result);
  85. BB[1] -= CIMAG(result);
  86. }
  87. #endif
  88. #ifndef UNIT
  89. ar = AA[0];
  90. ai = AA[1];
  91. if (fabs(ar) >= fabs(ai)){
  92. ratio = ai / ar;
  93. den = 1./(ar * ( 1 + ratio * ratio));
  94. ar = den;
  95. #if TRANSA < 3
  96. ai = -ratio * den;
  97. #else
  98. ai = ratio * den;
  99. #endif
  100. } else {
  101. ratio = ar / ai;
  102. den = 1./(ai * ( 1 + ratio * ratio));
  103. ar = ratio * den;
  104. #if TRANSA < 3
  105. ai = -den;
  106. #else
  107. ai = den;
  108. #endif
  109. }
  110. br = BB[0];
  111. bi = BB[1];
  112. BB[0] = ar*br - ai*bi;
  113. BB[1] = ar*bi + ai*br;
  114. #endif
  115. #if (TRANSA == 1) || (TRANSA == 3)
  116. if (i < min_i - 1) {
  117. #if TRANSA == 1
  118. AXPYU_K (min_i - i - 1, 0, 0, - BB[0], -BB[1],
  119. AA - (min_i - i - 1) * COMPSIZE, 1, BB - (min_i - i - 1) * COMPSIZE, 1, NULL, 0);
  120. #else
  121. AXPYC_K(min_i - i - 1, 0, 0, - BB[0], -BB[1],
  122. AA - (min_i - i - 1) * COMPSIZE, 1, BB - (min_i - i - 1) * COMPSIZE, 1, NULL, 0);
  123. #endif
  124. }
  125. #endif
  126. }
  127. #if (TRANSA == 1) || (TRANSA == 3)
  128. if (is - min_i > 0){
  129. #if TRANSA == 1
  130. GEMV_N(is - min_i, min_i, 0, dm1, ZERO,
  131. a + (is - min_i) * lda * COMPSIZE, lda,
  132. B + (is - min_i) * COMPSIZE, 1,
  133. B, 1, gemvbuffer);
  134. #else
  135. GEMV_R(is - min_i, min_i, 0, dm1, ZERO,
  136. a + (is - min_i) * lda * COMPSIZE, lda,
  137. B + (is - min_i) * COMPSIZE, 1,
  138. B, 1, gemvbuffer);
  139. #endif
  140. }
  141. #endif
  142. }
  143. if (incb != 1) {
  144. COPY_K(m, buffer, 1, b, incb);
  145. }
  146. return 0;
  147. }