You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

ztrmv_U.c 5.3 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155
  1. /*********************************************************************/
  2. /* Copyright 2009, 2010 The University of Texas at Austin. */
  3. /* All rights reserved. */
  4. /* */
  5. /* Redistribution and use in source and binary forms, with or */
  6. /* without modification, are permitted provided that the following */
  7. /* conditions are met: */
  8. /* */
  9. /* 1. Redistributions of source code must retain the above */
  10. /* copyright notice, this list of conditions and the following */
  11. /* disclaimer. */
  12. /* */
  13. /* 2. Redistributions in binary form must reproduce the above */
  14. /* copyright notice, this list of conditions and the following */
  15. /* disclaimer in the documentation and/or other materials */
  16. /* provided with the distribution. */
  17. /* */
  18. /* THIS SOFTWARE IS PROVIDED BY THE UNIVERSITY OF TEXAS AT */
  19. /* AUSTIN ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, */
  20. /* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF */
  21. /* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE */
  22. /* DISCLAIMED. IN NO EVENT SHALL THE UNIVERSITY OF TEXAS AT */
  23. /* AUSTIN OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, */
  24. /* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES */
  25. /* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE */
  26. /* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR */
  27. /* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF */
  28. /* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */
  29. /* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT */
  30. /* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE */
  31. /* POSSIBILITY OF SUCH DAMAGE. */
  32. /* */
  33. /* The views and conclusions contained in the software and */
  34. /* documentation are those of the authors and should not be */
  35. /* interpreted as representing official policies, either expressed */
  36. /* or implied, of The University of Texas at Austin. */
  37. /*********************************************************************/
  38. #include <stdio.h>
  39. #include <ctype.h>
  40. #include "common.h"
  41. static FLOAT dp1 = 1.;
  42. int CNAME(BLASLONG m, FLOAT *a, BLASLONG lda, FLOAT *b, BLASLONG incb, FLOAT *buffer){
  43. BLASLONG i, is, min_i;
  44. #if (TRANSA == 2) || (TRANSA == 4)
  45. OPENBLAS_COMPLEX_FLOAT temp;
  46. #endif
  47. #ifndef UNIT
  48. FLOAT atemp1, atemp2, btemp1, btemp2;
  49. #endif
  50. FLOAT *gemvbuffer = (FLOAT *)buffer;
  51. FLOAT *B = b;
  52. if (incb != 1) {
  53. B = buffer;
  54. gemvbuffer = (FLOAT *)(((BLASLONG)buffer + m * sizeof(FLOAT) * 2 + 15) & ~15);
  55. COPY_K(m, b, incb, buffer, 1);
  56. }
  57. for (is =0; is < m; is += DTB_ENTRIES){
  58. min_i = MIN(m - is, DTB_ENTRIES);
  59. #if (TRANSA) == 1 || (TRANSA == 3)
  60. if (is > 0){
  61. #if TRANSA == 1
  62. GEMV_N(is, min_i, 0, dp1, ZERO,
  63. a + is * lda * 2, lda,
  64. B + is * 2, 1,
  65. B, 1, gemvbuffer);
  66. #else
  67. GEMV_R(is, min_i, 0, dp1, ZERO,
  68. a + is * lda * 2, lda,
  69. B + is * 2, 1,
  70. B, 1, gemvbuffer);
  71. #endif
  72. }
  73. #endif
  74. for (i = 0; i < min_i; i++) {
  75. FLOAT *AA = a + (is + (i + is) * lda) * 2;
  76. FLOAT *BB = B + is * 2;
  77. #if (TRANSA == 1) || (TRANSA == 3)
  78. #if TRANSA == 1
  79. if (i > 0) AXPYU_K (i, 0, 0, BB[i * 2 + 0], BB[i * 2 + 1],
  80. AA, 1, BB, 1, NULL, 0);
  81. #else
  82. if (i > 0) AXPYC_K(i, 0, 0, BB[i * 2 + 0], BB[i * 2 + 1],
  83. AA, 1, BB, 1, NULL, 0);
  84. #endif
  85. #endif
  86. #ifndef UNIT
  87. atemp1 = AA[i * 2 + 0];
  88. atemp2 = AA[i * 2 + 1];
  89. btemp1 = BB[i * 2 + 0];
  90. btemp2 = BB[i * 2 + 1];
  91. #if (TRANSA == 1) || (TRANSA == 2)
  92. BB[i * 2 + 0] = atemp1 * btemp1 - atemp2 * btemp2;
  93. BB[i * 2 + 1] = atemp1 * btemp2 + atemp2 * btemp1;
  94. #else
  95. BB[i * 2 + 0] = atemp1 * btemp1 + atemp2 * btemp2;
  96. BB[i * 2 + 1] = atemp1 * btemp2 - atemp2 * btemp1;
  97. #endif
  98. #endif
  99. #if (TRANSA == 2) || (TRANSA == 4)
  100. if (i < min_i - 1) {
  101. #if TRANSA == 2
  102. temp = DOTU_K(min_i - i - 1,
  103. AA + (i + 1) * 2, 1,
  104. BB + (i + 1) * 2, 1);
  105. #else
  106. temp = DOTC_K(min_i - i - 1,
  107. AA + (i + 1) * 2, 1,
  108. BB + (i + 1) * 2, 1);
  109. #endif
  110. BB[i * 2 + 0] += CREAL(temp);
  111. BB[i * 2 + 1] += CIMAG(temp);
  112. }
  113. #endif
  114. }
  115. #if (TRANSA) == 2 || (TRANSA == 4)
  116. if (m - is > min_i){
  117. #if TRANSA == 2
  118. GEMV_T(m - is - min_i, min_i, 0, dp1, ZERO,
  119. a + (is + min_i + is * lda) * 2, lda,
  120. B + (is + min_i) * 2, 1,
  121. B + is * 2, 1, gemvbuffer);
  122. #else
  123. GEMV_C(m - is - min_i, min_i, 0, dp1, ZERO,
  124. a + (is + min_i + is * lda) * 2, lda,
  125. B + (is + min_i) * 2, 1,
  126. B + is * 2, 1, gemvbuffer);
  127. #endif
  128. }
  129. #endif
  130. }
  131. if (incb != 1) {
  132. COPY_K(m, buffer, 1, b, incb);
  133. }
  134. return 0;
  135. }