You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

sbmv_k.c 3.9 kB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. /*********************************************************************/
  2. /* Copyright 2009, 2010 The University of Texas at Austin. */
  3. /* All rights reserved. */
  4. /* */
  5. /* Redistribution and use in source and binary forms, with or */
  6. /* without modification, are permitted provided that the following */
  7. /* conditions are met: */
  8. /* */
  9. /* 1. Redistributions of source code must retain the above */
  10. /* copyright notice, this list of conditions and the following */
  11. /* disclaimer. */
  12. /* */
  13. /* 2. Redistributions in binary form must reproduce the above */
  14. /* copyright notice, this list of conditions and the following */
  15. /* disclaimer in the documentation and/or other materials */
  16. /* provided with the distribution. */
  17. /* */
  18. /* THIS SOFTWARE IS PROVIDED BY THE UNIVERSITY OF TEXAS AT */
  19. /* AUSTIN ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, */
  20. /* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF */
  21. /* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE */
  22. /* DISCLAIMED. IN NO EVENT SHALL THE UNIVERSITY OF TEXAS AT */
  23. /* AUSTIN OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, */
  24. /* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES */
  25. /* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE */
  26. /* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR */
  27. /* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF */
  28. /* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */
  29. /* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT */
  30. /* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE */
  31. /* POSSIBILITY OF SUCH DAMAGE. */
  32. /* */
  33. /* The views and conclusions contained in the software and */
  34. /* documentation are those of the authors and should not be */
  35. /* interpreted as representing official policies, either expressed */
  36. /* or implied, of The University of Texas at Austin. */
  37. /*********************************************************************/
  38. #include <stdio.h>
  39. #include <ctype.h>
  40. #include "common.h"
  41. int CNAME(BLASLONG n, BLASLONG k, FLOAT alpha,
  42. FLOAT *a, BLASLONG lda,
  43. FLOAT *x, BLASLONG incx, FLOAT *y, BLASLONG incy, void *buffer){
  44. BLASLONG i, length;
  45. FLOAT *X = x;
  46. FLOAT *Y = y;
  47. FLOAT *sbmvbuffer = (FLOAT *)buffer;
  48. FLOAT *bufferY = sbmvbuffer;
  49. FLOAT *bufferX = sbmvbuffer;
  50. if (incy != 1) {
  51. Y = bufferY;
  52. bufferX = (FLOAT *)(((BLASLONG)bufferY + n * sizeof(FLOAT) + 4095) & ~4095);
  53. // sbmvbuffer = bufferX;
  54. COPY_K(n, y, incy, Y, 1);
  55. }
  56. if (incx != 1) {
  57. X = bufferX;
  58. // sbmvbuffer = (FLOAT *)(((BLASLONG)bufferX + n * sizeof(FLOAT) + 4095) & ~4095);
  59. COPY_K(n, x, incx, X, 1);
  60. }
  61. for (i = 0; i < n; i++) {
  62. #ifndef LOWER
  63. length = i;
  64. if (length > k) length = k;
  65. AXPYU_K(length + 1, 0, 0,
  66. alpha * X[i],
  67. a + k - length, 1, Y + i - length, 1, NULL, 0);
  68. Y[i] += alpha * DOTU_K(length, a + k - length, 1, X + i - length, 1);
  69. #else
  70. length = k;
  71. if (n - i - 1 < k) length = n - i - 1;
  72. AXPYU_K(length + 1, 0, 0,
  73. alpha * X[i],
  74. a, 1, Y + i, 1, NULL, 0);
  75. Y[i] += alpha * DOTU_K(length, a + 1, 1, X + i + 1, 1);
  76. #endif
  77. a += lda;
  78. }
  79. if (incy != 1) {
  80. COPY_K(n, Y, 1, y, incy);
  81. }
  82. return 0;
  83. }