You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

ztrsv_L.c 5.7 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. /*********************************************************************/
  2. /* Copyright 2009, 2010 The University of Texas at Austin. */
  3. /* All rights reserved. */
  4. /* */
  5. /* Redistribution and use in source and binary forms, with or */
  6. /* without modification, are permitted provided that the following */
  7. /* conditions are met: */
  8. /* */
  9. /* 1. Redistributions of source code must retain the above */
  10. /* copyright notice, this list of conditions and the following */
  11. /* disclaimer. */
  12. /* */
  13. /* 2. Redistributions in binary form must reproduce the above */
  14. /* copyright notice, this list of conditions and the following */
  15. /* disclaimer in the documentation and/or other materials */
  16. /* provided with the distribution. */
  17. /* */
  18. /* THIS SOFTWARE IS PROVIDED BY THE UNIVERSITY OF TEXAS AT */
  19. /* AUSTIN ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, */
  20. /* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF */
  21. /* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE */
  22. /* DISCLAIMED. IN NO EVENT SHALL THE UNIVERSITY OF TEXAS AT */
  23. /* AUSTIN OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, */
  24. /* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES */
  25. /* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE */
  26. /* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR */
  27. /* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF */
  28. /* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */
  29. /* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT */
  30. /* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE */
  31. /* POSSIBILITY OF SUCH DAMAGE. */
  32. /* */
  33. /* The views and conclusions contained in the software and */
  34. /* documentation are those of the authors and should not be */
  35. /* interpreted as representing official policies, either expressed */
  36. /* or implied, of The University of Texas at Austin. */
  37. /*********************************************************************/
  38. #include <stdio.h>
  39. #include <ctype.h>
  40. #include "common.h"
  41. const static FLOAT dm1 = -1.;
  42. int CNAME(BLASLONG m, FLOAT *a, BLASLONG lda, FLOAT *b, BLASLONG incb, void *buffer){
  43. BLASLONG i, is, min_i;
  44. #if (TRANSA == 2) || (TRANSA == 4)
  45. OPENBLAS_COMPLEX_FLOAT result;
  46. #endif
  47. #ifndef UNIT
  48. FLOAT ar, ai, br, bi, ratio, den;
  49. #endif
  50. FLOAT *gemvbuffer = (FLOAT *)buffer;
  51. FLOAT *B = b;
  52. if (incb != 1) {
  53. B = buffer;
  54. gemvbuffer = (FLOAT *)(((BLASLONG)buffer + m * sizeof(FLOAT) * 2 + 4095) & ~4095);
  55. COPY_K(m, b, incb, buffer, 1);
  56. }
  57. for (is =0; is < m; is += DTB_ENTRIES){
  58. min_i = MIN(m - is, DTB_ENTRIES);
  59. #if (TRANSA == 2) || (TRANSA == 4)
  60. if (is > 0){
  61. #if TRANSA == 2
  62. GEMV_T(is, min_i, 0, dm1, ZERO,
  63. a + is * lda * COMPSIZE, lda,
  64. B, 1,
  65. B + is * COMPSIZE, 1, gemvbuffer);
  66. #else
  67. GEMV_C(is, min_i, 0, dm1, ZERO,
  68. a + is * lda * COMPSIZE, lda,
  69. B, 1,
  70. B + is * COMPSIZE, 1, gemvbuffer);
  71. #endif
  72. }
  73. #endif
  74. for (i = 0; i < min_i; i++) {
  75. FLOAT *AA = a + (is + (i + is) * lda) * COMPSIZE;
  76. FLOAT *BB = B + is * COMPSIZE;
  77. #if (TRANSA == 2) || (TRANSA == 4)
  78. if (i > 0) {
  79. #if TRANSA == 2
  80. result = DOTU_K(i, AA, 1, BB, 1);
  81. #else
  82. result = DOTC_K(i, AA, 1, BB, 1);
  83. #endif
  84. BB[i * COMPSIZE + 0] -= CREAL(result);
  85. BB[i * COMPSIZE + 1] -= CIMAG(result);
  86. }
  87. #endif
  88. #ifndef UNIT
  89. ar = AA[i * COMPSIZE + 0];
  90. ai = AA[i * COMPSIZE + 1];
  91. if (fabs(ar) >= fabs(ai)){
  92. ratio = ai / ar;
  93. den = 1./(ar * ( 1 + ratio * ratio));
  94. ar = den;
  95. #if TRANSA < 3
  96. ai = -ratio * den;
  97. #else
  98. ai = ratio * den;
  99. #endif
  100. } else {
  101. ratio = ar / ai;
  102. den = 1./(ai * ( 1 + ratio * ratio));
  103. ar = ratio * den;
  104. #if TRANSA < 3
  105. ai = -den;
  106. #else
  107. ai = den;
  108. #endif
  109. }
  110. br = BB[i * COMPSIZE + 0];
  111. bi = BB[i * COMPSIZE + 1];
  112. BB[i * COMPSIZE + 0] = ar*br - ai*bi;
  113. BB[i * COMPSIZE + 1] = ar*bi + ai*br;
  114. #endif
  115. #if (TRANSA == 1) || (TRANSA == 3)
  116. if (i < min_i - 1) {
  117. #if TRANSA == 1
  118. AXPYU_K(min_i - i - 1 , 0, 0,
  119. - BB[i * COMPSIZE + 0], - BB[i * COMPSIZE + 1],
  120. AA + (i + 1) * COMPSIZE, 1, BB + (i + 1) * COMPSIZE, 1, NULL, 0);
  121. #else
  122. AXPYC_K(min_i - i - 1 , 0, 0,
  123. - BB[i * COMPSIZE + 0], - BB[i * COMPSIZE + 1],
  124. AA + (i + 1) * COMPSIZE, 1, BB + (i + 1) * COMPSIZE, 1, NULL, 0);
  125. #endif
  126. }
  127. #endif
  128. }
  129. #if (TRANSA == 1) || (TRANSA == 3)
  130. if (m - is > min_i){
  131. #if TRANSA == 1
  132. GEMV_N(m - is - min_i, min_i, 0, dm1, ZERO,
  133. a + (is + min_i + is * lda) * COMPSIZE, lda,
  134. B + is * COMPSIZE, 1,
  135. B + (is + min_i) * COMPSIZE, 1, gemvbuffer);
  136. #else
  137. GEMV_R(m - is - min_i, min_i, 0, dm1, ZERO,
  138. a + (is + min_i + is * lda) * COMPSIZE, lda,
  139. B + is * COMPSIZE, 1,
  140. B + (is + min_i) * COMPSIZE, 1, gemvbuffer);
  141. #endif
  142. }
  143. #endif
  144. }
  145. if (incb != 1) {
  146. COPY_K(m, buffer, 1, b, incb);
  147. }
  148. return 0;
  149. }