You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

syr2k_kernel.c 6.1 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217
  1. /*********************************************************************/
  2. /* Copyright 2009, 2010 The University of Texas at Austin. */
  3. /* All rights reserved. */
  4. /* */
  5. /* Redistribution and use in source and binary forms, with or */
  6. /* without modification, are permitted provided that the following */
  7. /* conditions are met: */
  8. /* */
  9. /* 1. Redistributions of source code must retain the above */
  10. /* copyright notice, this list of conditions and the following */
  11. /* disclaimer. */
  12. /* */
  13. /* 2. Redistributions in binary form must reproduce the above */
  14. /* copyright notice, this list of conditions and the following */
  15. /* disclaimer in the documentation and/or other materials */
  16. /* provided with the distribution. */
  17. /* */
  18. /* THIS SOFTWARE IS PROVIDED BY THE UNIVERSITY OF TEXAS AT */
  19. /* AUSTIN ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, */
  20. /* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF */
  21. /* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE */
  22. /* DISCLAIMED. IN NO EVENT SHALL THE UNIVERSITY OF TEXAS AT */
  23. /* AUSTIN OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, */
  24. /* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES */
  25. /* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE */
  26. /* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR */
  27. /* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF */
  28. /* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */
  29. /* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT */
  30. /* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE */
  31. /* POSSIBILITY OF SUCH DAMAGE. */
  32. /* */
  33. /* The views and conclusions contained in the software and */
  34. /* documentation are those of the authors and should not be */
  35. /* interpreted as representing official policies, either expressed */
  36. /* or implied, of The University of Texas at Austin. */
  37. /*********************************************************************/
  38. #include <stdio.h>
  39. #include "common.h"
  40. int CNAME(BLASLONG m, BLASLONG n, BLASLONG k, FLOAT alpha_r,
  41. #ifdef COMPLEX
  42. FLOAT alpha_i,
  43. #endif
  44. FLOAT *a, FLOAT *b, FLOAT *c, BLASLONG ldc, BLASLONG offset, int flag){
  45. BLASLONG i, j;
  46. BLASLONG loop;
  47. FLOAT subbuffer[GEMM_UNROLL_MN * GEMM_UNROLL_MN * COMPSIZE];
  48. if (m + offset < 0) {
  49. #ifndef LOWER
  50. GEMM_KERNEL_N(m, n, k,
  51. alpha_r,
  52. #ifdef COMPLEX
  53. alpha_i,
  54. #endif
  55. a, b, c, ldc);
  56. #endif
  57. return 0;
  58. }
  59. if (n < offset) {
  60. #ifdef LOWER
  61. GEMM_KERNEL_N(m, n, k,
  62. alpha_r,
  63. #ifdef COMPLEX
  64. alpha_i,
  65. #endif
  66. a, b, c, ldc);
  67. #endif
  68. return 0;
  69. }
  70. if (offset > 0) {
  71. #ifdef LOWER
  72. GEMM_KERNEL_N(m, offset, k,
  73. alpha_r,
  74. #ifdef COMPLEX
  75. alpha_i,
  76. #endif
  77. a, b, c, ldc);
  78. #endif
  79. b += offset * k * COMPSIZE;
  80. c += offset * ldc * COMPSIZE;
  81. n -= offset;
  82. offset = 0;
  83. if (n <= 0) return 0;
  84. }
  85. if (n > m + offset) {
  86. #ifndef LOWER
  87. GEMM_KERNEL_N(m, n - m - offset, k,
  88. alpha_r,
  89. #ifdef COMPLEX
  90. alpha_i,
  91. #endif
  92. a,
  93. b + (m + offset) * k * COMPSIZE,
  94. c + (m + offset) * ldc * COMPSIZE, ldc);
  95. #endif
  96. n = m + offset;
  97. if (n <= 0) return 0;
  98. }
  99. if (offset < 0) {
  100. #ifndef LOWER
  101. GEMM_KERNEL_N(-offset, n, k,
  102. alpha_r,
  103. #ifdef COMPLEX
  104. alpha_i,
  105. #endif
  106. a, b, c, ldc);
  107. #endif
  108. a -= offset * k * COMPSIZE;
  109. c -= offset * COMPSIZE;
  110. m += offset;
  111. offset = 0;
  112. if (m <= 0) return 0;
  113. }
  114. if (m > n - offset) {
  115. #ifdef LOWER
  116. GEMM_KERNEL_N(m - n + offset, n, k,
  117. alpha_r,
  118. #ifdef COMPLEX
  119. alpha_i,
  120. #endif
  121. a + (n - offset) * k * COMPSIZE,
  122. b,
  123. c + (n - offset) * COMPSIZE, ldc);
  124. #endif
  125. m = n + offset;
  126. if (m <= 0) return 0;
  127. }
  128. for (loop = 0; loop < n; loop += GEMM_UNROLL_MN) {
  129. int mm, nn;
  130. mm = (loop & ~(GEMM_UNROLL_MN - 1));
  131. nn = MIN(GEMM_UNROLL_MN, n - loop);
  132. #ifndef LOWER
  133. GEMM_KERNEL_N(mm, nn, k,
  134. alpha_r,
  135. #ifdef COMPLEX
  136. alpha_i,
  137. #endif
  138. a, b + loop * k * COMPSIZE, c + loop * ldc * COMPSIZE, ldc);
  139. #endif
  140. if (flag) {
  141. GEMM_BETA(nn, nn, 0, ZERO,
  142. #ifdef COMPLEX
  143. ZERO,
  144. #endif
  145. NULL, 0, NULL, 0, subbuffer, nn);
  146. GEMM_KERNEL_N(nn, nn, k,
  147. alpha_r,
  148. #ifdef COMPLEX
  149. alpha_i,
  150. #endif
  151. a + loop * k * COMPSIZE, b + loop * k * COMPSIZE, subbuffer, nn);
  152. #ifndef LOWER
  153. for (j = 0; j < nn; j ++) {
  154. for (i = 0; i <= j; i ++) {
  155. #ifndef COMPLEX
  156. c[i + loop + (j + loop) * ldc] +=
  157. subbuffer[i + j * nn] + subbuffer[j + i * nn];
  158. #else
  159. c[(i + loop + (j + loop) * ldc) * 2 + 0] +=
  160. subbuffer[(i + j * nn) * 2 + 0] + subbuffer[(j + i * nn) * 2 + 0];
  161. c[(i + loop + (j + loop) * ldc) * 2 + 1] +=
  162. subbuffer[(i + j * nn) * 2 + 1] + subbuffer[(j + i * nn) * 2 + 1];
  163. #endif
  164. }
  165. }
  166. #else
  167. for (j = 0; j < nn; j ++) {
  168. for (i = j; i < nn; i ++) {
  169. #ifndef COMPLEX
  170. c[i + loop + (j + loop) * ldc] +=
  171. subbuffer[i + j * nn] + subbuffer[j + i * nn];
  172. #else
  173. c[(i + loop + (j + loop) * ldc) * 2 + 0] +=
  174. subbuffer[(i + j * nn) * 2 + 0] + subbuffer[(j + i * nn) * 2 + 0];
  175. c[(i + loop + (j + loop) * ldc) * 2 + 1] +=
  176. subbuffer[(i + j * nn) * 2 + 1] + subbuffer[(j + i * nn) * 2 + 1];
  177. #endif
  178. }
  179. }
  180. #endif
  181. }
  182. #ifdef LOWER
  183. GEMM_KERNEL_N(m - mm - nn, nn, k,
  184. alpha_r,
  185. #ifdef COMPLEX
  186. alpha_i,
  187. #endif
  188. a + (mm + nn) * k * COMPSIZE, b + loop * k * COMPSIZE,
  189. c + (mm + nn + loop * ldc) * COMPSIZE, ldc);
  190. #endif
  191. }
  192. return 0;
  193. }