You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

lauum_U_single.c 7.7 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268
  1. /*********************************************************************/
  2. /* Copyright 2009, 2010 The University of Texas at Austin. */
  3. /* All rights reserved. */
  4. /* */
  5. /* Redistribution and use in source and binary forms, with or */
  6. /* without modification, are permitted provided that the following */
  7. /* conditions are met: */
  8. /* */
  9. /* 1. Redistributions of source code must retain the above */
  10. /* copyright notice, this list of conditions and the following */
  11. /* disclaimer. */
  12. /* */
  13. /* 2. Redistributions in binary form must reproduce the above */
  14. /* copyright notice, this list of conditions and the following */
  15. /* disclaimer in the documentation and/or other materials */
  16. /* provided with the distribution. */
  17. /* */
  18. /* THIS SOFTWARE IS PROVIDED BY THE UNIVERSITY OF TEXAS AT */
  19. /* AUSTIN ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, */
  20. /* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF */
  21. /* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE */
  22. /* DISCLAIMED. IN NO EVENT SHALL THE UNIVERSITY OF TEXAS AT */
  23. /* AUSTIN OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, */
  24. /* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES */
  25. /* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE */
  26. /* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR */
  27. /* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF */
  28. /* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */
  29. /* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT */
  30. /* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE */
  31. /* POSSIBILITY OF SUCH DAMAGE. */
  32. /* */
  33. /* The views and conclusions contained in the software and */
  34. /* documentation are those of the authors and should not be */
  35. /* interpreted as representing official policies, either expressed */
  36. /* or implied, of The University of Texas at Austin. */
  37. /*********************************************************************/
  38. #include <stdio.h>
  39. #include "common.h"
  40. static FLOAT dp1 = 1.;
  41. #ifndef COMPLEX
  42. #define TRMM_KERNEL TRMM_KERNEL_RT
  43. #define SYRK_KERNEL SYRK_KERNEL_U
  44. #else
  45. #define TRMM_KERNEL TRMM_KERNEL_RC
  46. #ifdef XDOUBLE
  47. #define SYRK_KERNEL xherk_kernel_UN
  48. #elif defined(DOUBLE)
  49. #define SYRK_KERNEL zherk_kernel_UN
  50. #else
  51. #define SYRK_KERNEL cherk_kernel_UN
  52. #endif
  53. #endif
  54. #if 0
  55. #undef GEMM_P
  56. #undef GEMM_Q
  57. #undef GEMM_R
  58. #define GEMM_P 8
  59. #define GEMM_Q 20
  60. #define GEMM_R 24
  61. #endif
  62. #define GEMM_PQ MAX(GEMM_P, GEMM_Q)
  63. #define REAL_GEMM_R (GEMM_R - GEMM_PQ)
  64. blasint CNAME(blas_arg_t *args, BLASLONG *range_m, BLASLONG *range_n, FLOAT *sa, FLOAT *sb, BLASLONG myid) {
  65. BLASLONG n, lda;
  66. FLOAT *a;
  67. BLASLONG j, bk, blocking;
  68. BLASLONG is, ls, ks;
  69. BLASLONG jjs, min_jj;
  70. BLASLONG min_i, min_l, min_k;
  71. BLASLONG range_N[2];
  72. FLOAT *sb2 = (FLOAT *)((((BLASLONG)sb
  73. + GEMM_PQ * GEMM_Q * COMPSIZE * SIZE + GEMM_ALIGN) & ~GEMM_ALIGN)
  74. + GEMM_OFFSET_B);
  75. #if 0
  76. FLOAT *aa;
  77. #endif
  78. n = args -> n;
  79. a = (FLOAT *)args -> a;
  80. lda = args -> lda;
  81. if (range_n) {
  82. n = range_n[1] - range_n[0];
  83. a += range_n[0] * (lda + 1) * COMPSIZE;
  84. }
  85. if (n <= DTB_ENTRIES) {
  86. LAUU2_U(args, NULL, range_n, sa, sb, 0);
  87. return 0;
  88. }
  89. blocking = GEMM_Q;
  90. if (n <= 4 * GEMM_Q) blocking = (n + 3) / 4;
  91. for (j = 0; j < n; j += blocking) {
  92. bk = n - j;
  93. if (bk > blocking) bk = blocking;
  94. if (j > 0) {
  95. TRMM_OUTCOPY(bk, bk, a + (j + j * lda) * COMPSIZE, lda, 0, 0, sb);
  96. for (ls = 0; ls < j; ls += REAL_GEMM_R) {
  97. min_l = j - ls;
  98. #if 0
  99. if (min_l > REAL_GEMM_R) min_l = REAL_GEMM_R;
  100. min_i = ls + min_l;
  101. if (min_i > GEMM_P) min_i = GEMM_P;
  102. if (ls > 0) {
  103. GEMM_ITCOPY(bk, min_i, a + (j * lda) * COMPSIZE, lda, sa);
  104. aa = sa;
  105. } else {
  106. aa = sb2;
  107. }
  108. for (jjs = ls; jjs < ls + min_l; jjs += GEMM_P){
  109. min_jj = ls + min_l - jjs;
  110. if (min_jj > GEMM_P) min_jj = GEMM_P;
  111. GEMM_OTCOPY(bk, min_jj, a + (jjs + j * lda) * COMPSIZE, lda, sb2 + (jjs - ls) * bk * COMPSIZE);
  112. SYRK_KERNEL(min_i, min_jj, bk, dp1,
  113. aa,
  114. sb2 + (jjs - ls) * bk * COMPSIZE,
  115. a + (jjs * lda) * COMPSIZE, lda, - jjs);
  116. }
  117. if (ls + REAL_GEMM_R >= j ) {
  118. for (ks = 0; ks < bk; ks += GEMM_P) {
  119. min_k = bk - ks;
  120. if (min_k > GEMM_P) min_k = GEMM_P;
  121. TRMM_KERNEL(min_i, min_k, bk, dp1,
  122. #ifdef COMPLEX
  123. ZERO,
  124. #endif
  125. aa,
  126. sb + ks * bk * COMPSIZE,
  127. a + ((ks + j) * lda) * COMPSIZE, lda, -ks);
  128. }
  129. }
  130. for(is = min_i; is < ls + min_l ; is += GEMM_P){
  131. min_i = ls + min_l - is;
  132. if (min_i > GEMM_P) min_i = GEMM_P;
  133. if (is < ls) {
  134. GEMM_ITCOPY(bk, min_i, a + (is + j * lda) * COMPSIZE, lda, sa);
  135. aa = sa;
  136. } else {
  137. aa = sb2 + (is - ls) * bk * COMPSIZE;
  138. }
  139. SYRK_KERNEL(min_i, min_l, bk, dp1,
  140. aa,
  141. sb2,
  142. a + (is + ls * lda) * COMPSIZE, lda, is - ls);
  143. if (ls + REAL_GEMM_R >= j ) {
  144. for (ks = 0; ks < bk; ks += GEMM_P) {
  145. min_k = bk - ks;
  146. if (min_k > GEMM_P) min_k = GEMM_P;
  147. TRMM_KERNEL(min_i, min_k, bk, dp1,
  148. #ifdef COMPLEX
  149. ZERO,
  150. #endif
  151. aa,
  152. sb + ks * bk * COMPSIZE,
  153. a + (is + (ks + j) * lda) * COMPSIZE, lda, -ks);
  154. }
  155. }
  156. }
  157. #else
  158. if (min_l > REAL_GEMM_R) min_l = REAL_GEMM_R;
  159. min_i = ls + min_l;
  160. if (min_i > GEMM_P) min_i = GEMM_P;
  161. GEMM_ITCOPY(bk, min_i, a + (j * lda) * COMPSIZE, lda, sa);
  162. for (jjs = ls; jjs < ls + min_l; jjs += GEMM_P){
  163. min_jj = ls + min_l - jjs;
  164. if (min_jj > GEMM_P) min_jj = GEMM_P;
  165. GEMM_OTCOPY(bk, min_jj, a + (jjs + j * lda) * COMPSIZE, lda, sb2 + (jjs - ls) * bk * COMPSIZE);
  166. SYRK_KERNEL(min_i, min_jj, bk, dp1,
  167. sa,
  168. sb2 + (jjs - ls) * bk * COMPSIZE,
  169. a + (jjs * lda) * COMPSIZE, lda, - jjs);
  170. }
  171. if (ls + REAL_GEMM_R >= j ) {
  172. for (ks = 0; ks < bk; ks += GEMM_P) {
  173. min_k = bk - ks;
  174. if (min_k > GEMM_P) min_k = GEMM_P;
  175. TRMM_KERNEL(min_i, min_k, bk, dp1,
  176. #ifdef COMPLEX
  177. ZERO,
  178. #endif
  179. sa,
  180. sb + ks * bk * COMPSIZE,
  181. a + ((ks + j) * lda) * COMPSIZE, lda, -ks);
  182. }
  183. }
  184. for(is = min_i; is < ls + min_l ; is += GEMM_P){
  185. min_i = ls + min_l - is;
  186. if (min_i > GEMM_P) min_i = GEMM_P;
  187. GEMM_ITCOPY(bk, min_i, a + (is + j * lda) * COMPSIZE, lda, sa);
  188. SYRK_KERNEL(min_i, min_l, bk, dp1,
  189. sa,
  190. sb2,
  191. a + (is + ls * lda) * COMPSIZE, lda, is - ls);
  192. if (ls + REAL_GEMM_R >= j ) {
  193. for (ks = 0; ks < bk; ks += GEMM_P) {
  194. min_k = bk - ks;
  195. if (min_k > GEMM_P) min_k = GEMM_P;
  196. TRMM_KERNEL(min_i, min_k, bk, dp1,
  197. #ifdef COMPLEX
  198. ZERO,
  199. #endif
  200. sa,
  201. sb + ks * bk * COMPSIZE,
  202. a + (is + (ks + j) * lda) * COMPSIZE, lda, -ks);
  203. }
  204. }
  205. }
  206. #endif
  207. } /* end of ls */
  208. }
  209. if (!range_n) {
  210. range_N[0] = j;
  211. range_N[1] = j + bk;
  212. } else {
  213. range_N[0] = range_n[0] + j;
  214. range_N[1] = range_n[0] + j + bk;
  215. }
  216. CNAME(args, NULL, range_N, sa, sb, 0);
  217. }
  218. return 0;
  219. }