The official Mbed 2 C/C++ SDK provides the software platform and libraries to build your applications.

Dependents:   hello SerialTestv11 SerialTestv12 Sierpinski ... more

mbed 2

This is the mbed 2 library. If you'd like to learn about Mbed OS please see the mbed-os docs.

Committer:
Kojto
Date:
Tue Feb 14 11:24:20 2017 +0000
Revision:
136:ef9c61f8c49f
Parent:
116:c0f6e94411f5
Release 136 of the mbed library

Ports for Upcoming Targets


Fixes and Changes

3432: Target STM USBHOST support https://github.com/ARMmbed/mbed-os/pull/3432
3181: NUCLEO_F207ZG extending PeripheralPins.c: all available alternate functions can be used now https://github.com/ARMmbed/mbed-os/pull/3181
3626: NUCLEO_F412ZG : Add USB Device +Host https://github.com/ARMmbed/mbed-os/pull/3626
3628: Fix warnings https://github.com/ARMmbed/mbed-os/pull/3628
3629: STM32: L0 LL layer https://github.com/ARMmbed/mbed-os/pull/3629
3632: IDE Export support for platform VK_RZ_A1H https://github.com/ARMmbed/mbed-os/pull/3632
3642: Missing IRQ pin fix for platform VK_RZ_A1H https://github.com/ARMmbed/mbed-os/pull/3642
3664: Fix ncs36510 sleep definitions https://github.com/ARMmbed/mbed-os/pull/3664
3655: [STM32F4] Modify folder structure https://github.com/ARMmbed/mbed-os/pull/3655
3657: [STM32L4] Modify folder structure https://github.com/ARMmbed/mbed-os/pull/3657
3658: [STM32F3] Modify folder structure https://github.com/ARMmbed/mbed-os/pull/3658
3685: STM32: I2C: reset state machine https://github.com/ARMmbed/mbed-os/pull/3685
3692: uVisor: Standardize available legacy heap and stack https://github.com/ARMmbed/mbed-os/pull/3692
3621: Fix for #2884, LPC824: export to LPCXpresso, target running with wron https://github.com/ARMmbed/mbed-os/pull/3621
3649: [STM32F7] Modify folder structure https://github.com/ARMmbed/mbed-os/pull/3649
3695: Enforce device_name is valid in targets.json https://github.com/ARMmbed/mbed-os/pull/3695
3723: NCS36510: spi_format function bug fix https://github.com/ARMmbed/mbed-os/pull/3723

Who changed what in which revision?

UserRevisionLine numberNew contents of line
Kojto 108:34e6b704fe68 1 /**************************************************************************//**
Kojto 108:34e6b704fe68 2 * @file core_cm4_simd.h
Kojto 108:34e6b704fe68 3 * @brief CMSIS Cortex-M4 SIMD Header File
Kojto 108:34e6b704fe68 4 * @version V3.20
Kojto 108:34e6b704fe68 5 * @date 25. February 2013
Kojto 108:34e6b704fe68 6 *
Kojto 108:34e6b704fe68 7 * @note
Kojto 108:34e6b704fe68 8 *
Kojto 108:34e6b704fe68 9 ******************************************************************************/
Kojto 108:34e6b704fe68 10 /* Copyright (c) 2009 - 2013 ARM LIMITED
Kojto 108:34e6b704fe68 11
Kojto 108:34e6b704fe68 12 All rights reserved.
Kojto 108:34e6b704fe68 13 Redistribution and use in source and binary forms, with or without
Kojto 108:34e6b704fe68 14 modification, are permitted provided that the following conditions are met:
Kojto 108:34e6b704fe68 15 - Redistributions of source code must retain the above copyright
Kojto 108:34e6b704fe68 16 notice, this list of conditions and the following disclaimer.
Kojto 108:34e6b704fe68 17 - Redistributions in binary form must reproduce the above copyright
Kojto 108:34e6b704fe68 18 notice, this list of conditions and the following disclaimer in the
Kojto 108:34e6b704fe68 19 documentation and/or other materials provided with the distribution.
Kojto 108:34e6b704fe68 20 - Neither the name of ARM nor the names of its contributors may be used
Kojto 108:34e6b704fe68 21 to endorse or promote products derived from this software without
Kojto 108:34e6b704fe68 22 specific prior written permission.
Kojto 108:34e6b704fe68 23 *
Kojto 108:34e6b704fe68 24 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
Kojto 108:34e6b704fe68 25 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
Kojto 108:34e6b704fe68 26 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
Kojto 108:34e6b704fe68 27 ARE DISCLAIMED. IN NO EVENT SHALL COPYRIGHT HOLDERS AND CONTRIBUTORS BE
Kojto 108:34e6b704fe68 28 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
Kojto 108:34e6b704fe68 29 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
Kojto 108:34e6b704fe68 30 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
Kojto 108:34e6b704fe68 31 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
Kojto 108:34e6b704fe68 32 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
Kojto 108:34e6b704fe68 33 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
Kojto 108:34e6b704fe68 34 POSSIBILITY OF SUCH DAMAGE.
Kojto 108:34e6b704fe68 35 ---------------------------------------------------------------------------*/
Kojto 108:34e6b704fe68 36
Kojto 108:34e6b704fe68 37
Kojto 108:34e6b704fe68 38 #ifdef __cplusplus
Kojto 108:34e6b704fe68 39 extern "C" {
Kojto 108:34e6b704fe68 40 #endif
Kojto 108:34e6b704fe68 41
Kojto 108:34e6b704fe68 42 #ifndef __CORE_CM4_SIMD_H
Kojto 108:34e6b704fe68 43 #define __CORE_CM4_SIMD_H
Kojto 108:34e6b704fe68 44
Kojto 108:34e6b704fe68 45
Kojto 108:34e6b704fe68 46 /*******************************************************************************
Kojto 108:34e6b704fe68 47 * Hardware Abstraction Layer
Kojto 108:34e6b704fe68 48 ******************************************************************************/
Kojto 108:34e6b704fe68 49
Kojto 108:34e6b704fe68 50
Kojto 108:34e6b704fe68 51 /* ################### Compiler specific Intrinsics ########################### */
Kojto 108:34e6b704fe68 52 /** \defgroup CMSIS_SIMD_intrinsics CMSIS SIMD Intrinsics
Kojto 108:34e6b704fe68 53 Access to dedicated SIMD instructions
Kojto 108:34e6b704fe68 54 @{
Kojto 108:34e6b704fe68 55 */
Kojto 108:34e6b704fe68 56
Kojto 108:34e6b704fe68 57 #if defined ( __CC_ARM ) /*------------------RealView Compiler -----------------*/
Kojto 108:34e6b704fe68 58 /* ARM armcc specific functions */
Kojto 108:34e6b704fe68 59
Kojto 108:34e6b704fe68 60 /*------ CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 61 #define __SADD8 __sadd8
Kojto 108:34e6b704fe68 62 #define __QADD8 __qadd8
Kojto 108:34e6b704fe68 63 #define __SHADD8 __shadd8
Kojto 108:34e6b704fe68 64 #define __UADD8 __uadd8
Kojto 108:34e6b704fe68 65 #define __UQADD8 __uqadd8
Kojto 108:34e6b704fe68 66 #define __UHADD8 __uhadd8
Kojto 108:34e6b704fe68 67 #define __SSUB8 __ssub8
Kojto 108:34e6b704fe68 68 #define __QSUB8 __qsub8
Kojto 108:34e6b704fe68 69 #define __SHSUB8 __shsub8
Kojto 108:34e6b704fe68 70 #define __USUB8 __usub8
Kojto 108:34e6b704fe68 71 #define __UQSUB8 __uqsub8
Kojto 108:34e6b704fe68 72 #define __UHSUB8 __uhsub8
Kojto 108:34e6b704fe68 73 #define __SADD16 __sadd16
Kojto 108:34e6b704fe68 74 #define __QADD16 __qadd16
Kojto 108:34e6b704fe68 75 #define __SHADD16 __shadd16
Kojto 108:34e6b704fe68 76 #define __UADD16 __uadd16
Kojto 108:34e6b704fe68 77 #define __UQADD16 __uqadd16
Kojto 108:34e6b704fe68 78 #define __UHADD16 __uhadd16
Kojto 108:34e6b704fe68 79 #define __SSUB16 __ssub16
Kojto 108:34e6b704fe68 80 #define __QSUB16 __qsub16
Kojto 108:34e6b704fe68 81 #define __SHSUB16 __shsub16
Kojto 108:34e6b704fe68 82 #define __USUB16 __usub16
Kojto 108:34e6b704fe68 83 #define __UQSUB16 __uqsub16
Kojto 108:34e6b704fe68 84 #define __UHSUB16 __uhsub16
Kojto 108:34e6b704fe68 85 #define __SASX __sasx
Kojto 108:34e6b704fe68 86 #define __QASX __qasx
Kojto 108:34e6b704fe68 87 #define __SHASX __shasx
Kojto 108:34e6b704fe68 88 #define __UASX __uasx
Kojto 108:34e6b704fe68 89 #define __UQASX __uqasx
Kojto 108:34e6b704fe68 90 #define __UHASX __uhasx
Kojto 108:34e6b704fe68 91 #define __SSAX __ssax
Kojto 108:34e6b704fe68 92 #define __QSAX __qsax
Kojto 108:34e6b704fe68 93 #define __SHSAX __shsax
Kojto 108:34e6b704fe68 94 #define __USAX __usax
Kojto 108:34e6b704fe68 95 #define __UQSAX __uqsax
Kojto 108:34e6b704fe68 96 #define __UHSAX __uhsax
Kojto 108:34e6b704fe68 97 #define __USAD8 __usad8
Kojto 108:34e6b704fe68 98 #define __USADA8 __usada8
Kojto 108:34e6b704fe68 99 #define __SSAT16 __ssat16
Kojto 108:34e6b704fe68 100 #define __USAT16 __usat16
Kojto 108:34e6b704fe68 101 #define __UXTB16 __uxtb16
Kojto 108:34e6b704fe68 102 #define __UXTAB16 __uxtab16
Kojto 108:34e6b704fe68 103 #define __SXTB16 __sxtb16
Kojto 108:34e6b704fe68 104 #define __SXTAB16 __sxtab16
Kojto 108:34e6b704fe68 105 #define __SMUAD __smuad
Kojto 108:34e6b704fe68 106 #define __SMUADX __smuadx
Kojto 108:34e6b704fe68 107 #define __SMLAD __smlad
Kojto 108:34e6b704fe68 108 #define __SMLADX __smladx
Kojto 108:34e6b704fe68 109 #define __SMLALD __smlald
Kojto 108:34e6b704fe68 110 #define __SMLALDX __smlaldx
Kojto 108:34e6b704fe68 111 #define __SMUSD __smusd
Kojto 108:34e6b704fe68 112 #define __SMUSDX __smusdx
Kojto 108:34e6b704fe68 113 #define __SMLSD __smlsd
Kojto 108:34e6b704fe68 114 #define __SMLSDX __smlsdx
Kojto 108:34e6b704fe68 115 #define __SMLSLD __smlsld
Kojto 108:34e6b704fe68 116 #define __SMLSLDX __smlsldx
Kojto 108:34e6b704fe68 117 #define __SEL __sel
Kojto 108:34e6b704fe68 118 #define __QADD __qadd
Kojto 108:34e6b704fe68 119 #define __QSUB __qsub
Kojto 108:34e6b704fe68 120
Kojto 108:34e6b704fe68 121 #define __PKHBT(ARG1,ARG2,ARG3) ( ((((uint32_t)(ARG1)) ) & 0x0000FFFFUL) | \
Kojto 108:34e6b704fe68 122 ((((uint32_t)(ARG2)) << (ARG3)) & 0xFFFF0000UL) )
Kojto 108:34e6b704fe68 123
Kojto 108:34e6b704fe68 124 #define __PKHTB(ARG1,ARG2,ARG3) ( ((((uint32_t)(ARG1)) ) & 0xFFFF0000UL) | \
Kojto 108:34e6b704fe68 125 ((((uint32_t)(ARG2)) >> (ARG3)) & 0x0000FFFFUL) )
Kojto 108:34e6b704fe68 126
Kojto 108:34e6b704fe68 127 #define __SMMLA(ARG1,ARG2,ARG3) ( (int32_t)((((int64_t)(ARG1) * (ARG2)) + \
Kojto 108:34e6b704fe68 128 ((int64_t)(ARG3) << 32) ) >> 32))
Kojto 108:34e6b704fe68 129
Kojto 108:34e6b704fe68 130 /*-- End CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 131
Kojto 108:34e6b704fe68 132
Kojto 108:34e6b704fe68 133
Kojto 108:34e6b704fe68 134 #elif defined ( __ICCARM__ ) /*------------------ ICC Compiler -------------------*/
Kojto 108:34e6b704fe68 135 /* IAR iccarm specific functions */
Kojto 108:34e6b704fe68 136
Kojto 108:34e6b704fe68 137 /*------ CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 138 #include <cmsis_iar.h>
Kojto 108:34e6b704fe68 139
Kojto 108:34e6b704fe68 140 /*-- End CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 141
Kojto 108:34e6b704fe68 142
Kojto 108:34e6b704fe68 143
Kojto 108:34e6b704fe68 144 #elif defined ( __TMS470__ ) /*---------------- TI CCS Compiler ------------------*/
Kojto 108:34e6b704fe68 145 /* TI CCS specific functions */
Kojto 108:34e6b704fe68 146
Kojto 108:34e6b704fe68 147 /*------ CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 148 #include <cmsis_ccs.h>
Kojto 108:34e6b704fe68 149
Kojto 108:34e6b704fe68 150 /*-- End CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 151
Kojto 108:34e6b704fe68 152
Kojto 108:34e6b704fe68 153
Kojto 108:34e6b704fe68 154 #elif defined ( __GNUC__ ) /*------------------ GNU Compiler ---------------------*/
Kojto 108:34e6b704fe68 155 /* GNU gcc specific functions */
Kojto 108:34e6b704fe68 156
Kojto 108:34e6b704fe68 157 /*------ CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 158 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SADD8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 159 {
Kojto 108:34e6b704fe68 160 uint32_t result;
Kojto 108:34e6b704fe68 161
Kojto 108:34e6b704fe68 162 __ASM volatile ("sadd8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 163 return(result);
Kojto 108:34e6b704fe68 164 }
Kojto 108:34e6b704fe68 165
Kojto 108:34e6b704fe68 166 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __QADD8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 167 {
Kojto 108:34e6b704fe68 168 uint32_t result;
Kojto 108:34e6b704fe68 169
Kojto 108:34e6b704fe68 170 __ASM volatile ("qadd8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 171 return(result);
Kojto 108:34e6b704fe68 172 }
Kojto 108:34e6b704fe68 173
Kojto 108:34e6b704fe68 174 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SHADD8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 175 {
Kojto 108:34e6b704fe68 176 uint32_t result;
Kojto 108:34e6b704fe68 177
Kojto 108:34e6b704fe68 178 __ASM volatile ("shadd8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 179 return(result);
Kojto 108:34e6b704fe68 180 }
Kojto 108:34e6b704fe68 181
Kojto 108:34e6b704fe68 182 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UADD8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 183 {
Kojto 108:34e6b704fe68 184 uint32_t result;
Kojto 108:34e6b704fe68 185
Kojto 108:34e6b704fe68 186 __ASM volatile ("uadd8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 187 return(result);
Kojto 108:34e6b704fe68 188 }
Kojto 108:34e6b704fe68 189
Kojto 108:34e6b704fe68 190 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UQADD8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 191 {
Kojto 108:34e6b704fe68 192 uint32_t result;
Kojto 108:34e6b704fe68 193
Kojto 108:34e6b704fe68 194 __ASM volatile ("uqadd8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 195 return(result);
Kojto 108:34e6b704fe68 196 }
Kojto 108:34e6b704fe68 197
Kojto 108:34e6b704fe68 198 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UHADD8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 199 {
Kojto 108:34e6b704fe68 200 uint32_t result;
Kojto 108:34e6b704fe68 201
Kojto 108:34e6b704fe68 202 __ASM volatile ("uhadd8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 203 return(result);
Kojto 108:34e6b704fe68 204 }
Kojto 108:34e6b704fe68 205
Kojto 108:34e6b704fe68 206
Kojto 108:34e6b704fe68 207 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SSUB8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 208 {
Kojto 108:34e6b704fe68 209 uint32_t result;
Kojto 108:34e6b704fe68 210
Kojto 108:34e6b704fe68 211 __ASM volatile ("ssub8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 212 return(result);
Kojto 108:34e6b704fe68 213 }
Kojto 108:34e6b704fe68 214
Kojto 108:34e6b704fe68 215 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __QSUB8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 216 {
Kojto 108:34e6b704fe68 217 uint32_t result;
Kojto 108:34e6b704fe68 218
Kojto 108:34e6b704fe68 219 __ASM volatile ("qsub8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 220 return(result);
Kojto 108:34e6b704fe68 221 }
Kojto 108:34e6b704fe68 222
Kojto 108:34e6b704fe68 223 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SHSUB8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 224 {
Kojto 108:34e6b704fe68 225 uint32_t result;
Kojto 108:34e6b704fe68 226
Kojto 108:34e6b704fe68 227 __ASM volatile ("shsub8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 228 return(result);
Kojto 108:34e6b704fe68 229 }
Kojto 108:34e6b704fe68 230
Kojto 108:34e6b704fe68 231 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __USUB8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 232 {
Kojto 108:34e6b704fe68 233 uint32_t result;
Kojto 108:34e6b704fe68 234
Kojto 108:34e6b704fe68 235 __ASM volatile ("usub8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 236 return(result);
Kojto 108:34e6b704fe68 237 }
Kojto 108:34e6b704fe68 238
Kojto 108:34e6b704fe68 239 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UQSUB8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 240 {
Kojto 108:34e6b704fe68 241 uint32_t result;
Kojto 108:34e6b704fe68 242
Kojto 108:34e6b704fe68 243 __ASM volatile ("uqsub8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 244 return(result);
Kojto 108:34e6b704fe68 245 }
Kojto 108:34e6b704fe68 246
Kojto 108:34e6b704fe68 247 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UHSUB8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 248 {
Kojto 108:34e6b704fe68 249 uint32_t result;
Kojto 108:34e6b704fe68 250
Kojto 108:34e6b704fe68 251 __ASM volatile ("uhsub8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 252 return(result);
Kojto 108:34e6b704fe68 253 }
Kojto 108:34e6b704fe68 254
Kojto 108:34e6b704fe68 255
Kojto 108:34e6b704fe68 256 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SADD16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 257 {
Kojto 108:34e6b704fe68 258 uint32_t result;
Kojto 108:34e6b704fe68 259
Kojto 108:34e6b704fe68 260 __ASM volatile ("sadd16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 261 return(result);
Kojto 108:34e6b704fe68 262 }
Kojto 108:34e6b704fe68 263
Kojto 108:34e6b704fe68 264 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __QADD16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 265 {
Kojto 108:34e6b704fe68 266 uint32_t result;
Kojto 108:34e6b704fe68 267
Kojto 108:34e6b704fe68 268 __ASM volatile ("qadd16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 269 return(result);
Kojto 108:34e6b704fe68 270 }
Kojto 108:34e6b704fe68 271
Kojto 108:34e6b704fe68 272 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SHADD16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 273 {
Kojto 108:34e6b704fe68 274 uint32_t result;
Kojto 108:34e6b704fe68 275
Kojto 108:34e6b704fe68 276 __ASM volatile ("shadd16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 277 return(result);
Kojto 108:34e6b704fe68 278 }
Kojto 108:34e6b704fe68 279
Kojto 108:34e6b704fe68 280 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UADD16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 281 {
Kojto 108:34e6b704fe68 282 uint32_t result;
Kojto 108:34e6b704fe68 283
Kojto 108:34e6b704fe68 284 __ASM volatile ("uadd16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 285 return(result);
Kojto 108:34e6b704fe68 286 }
Kojto 108:34e6b704fe68 287
Kojto 108:34e6b704fe68 288 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UQADD16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 289 {
Kojto 108:34e6b704fe68 290 uint32_t result;
Kojto 108:34e6b704fe68 291
Kojto 108:34e6b704fe68 292 __ASM volatile ("uqadd16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 293 return(result);
Kojto 108:34e6b704fe68 294 }
Kojto 108:34e6b704fe68 295
Kojto 108:34e6b704fe68 296 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UHADD16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 297 {
Kojto 108:34e6b704fe68 298 uint32_t result;
Kojto 108:34e6b704fe68 299
Kojto 108:34e6b704fe68 300 __ASM volatile ("uhadd16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 301 return(result);
Kojto 108:34e6b704fe68 302 }
Kojto 108:34e6b704fe68 303
Kojto 108:34e6b704fe68 304 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SSUB16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 305 {
Kojto 108:34e6b704fe68 306 uint32_t result;
Kojto 108:34e6b704fe68 307
Kojto 108:34e6b704fe68 308 __ASM volatile ("ssub16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 309 return(result);
Kojto 108:34e6b704fe68 310 }
Kojto 108:34e6b704fe68 311
Kojto 108:34e6b704fe68 312 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __QSUB16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 313 {
Kojto 108:34e6b704fe68 314 uint32_t result;
Kojto 108:34e6b704fe68 315
Kojto 108:34e6b704fe68 316 __ASM volatile ("qsub16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 317 return(result);
Kojto 108:34e6b704fe68 318 }
Kojto 108:34e6b704fe68 319
Kojto 108:34e6b704fe68 320 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SHSUB16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 321 {
Kojto 108:34e6b704fe68 322 uint32_t result;
Kojto 108:34e6b704fe68 323
Kojto 108:34e6b704fe68 324 __ASM volatile ("shsub16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 325 return(result);
Kojto 108:34e6b704fe68 326 }
Kojto 108:34e6b704fe68 327
Kojto 108:34e6b704fe68 328 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __USUB16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 329 {
Kojto 108:34e6b704fe68 330 uint32_t result;
Kojto 108:34e6b704fe68 331
Kojto 108:34e6b704fe68 332 __ASM volatile ("usub16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 333 return(result);
Kojto 108:34e6b704fe68 334 }
Kojto 108:34e6b704fe68 335
Kojto 108:34e6b704fe68 336 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UQSUB16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 337 {
Kojto 108:34e6b704fe68 338 uint32_t result;
Kojto 108:34e6b704fe68 339
Kojto 108:34e6b704fe68 340 __ASM volatile ("uqsub16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 341 return(result);
Kojto 108:34e6b704fe68 342 }
Kojto 108:34e6b704fe68 343
Kojto 108:34e6b704fe68 344 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UHSUB16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 345 {
Kojto 108:34e6b704fe68 346 uint32_t result;
Kojto 108:34e6b704fe68 347
Kojto 108:34e6b704fe68 348 __ASM volatile ("uhsub16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 349 return(result);
Kojto 108:34e6b704fe68 350 }
Kojto 108:34e6b704fe68 351
Kojto 108:34e6b704fe68 352 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SASX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 353 {
Kojto 108:34e6b704fe68 354 uint32_t result;
Kojto 108:34e6b704fe68 355
Kojto 108:34e6b704fe68 356 __ASM volatile ("sasx %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 357 return(result);
Kojto 108:34e6b704fe68 358 }
Kojto 108:34e6b704fe68 359
Kojto 108:34e6b704fe68 360 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __QASX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 361 {
Kojto 108:34e6b704fe68 362 uint32_t result;
Kojto 108:34e6b704fe68 363
Kojto 108:34e6b704fe68 364 __ASM volatile ("qasx %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 365 return(result);
Kojto 108:34e6b704fe68 366 }
Kojto 108:34e6b704fe68 367
Kojto 108:34e6b704fe68 368 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SHASX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 369 {
Kojto 108:34e6b704fe68 370 uint32_t result;
Kojto 108:34e6b704fe68 371
Kojto 108:34e6b704fe68 372 __ASM volatile ("shasx %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 373 return(result);
Kojto 108:34e6b704fe68 374 }
Kojto 108:34e6b704fe68 375
Kojto 108:34e6b704fe68 376 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UASX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 377 {
Kojto 108:34e6b704fe68 378 uint32_t result;
Kojto 108:34e6b704fe68 379
Kojto 108:34e6b704fe68 380 __ASM volatile ("uasx %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 381 return(result);
Kojto 108:34e6b704fe68 382 }
Kojto 108:34e6b704fe68 383
Kojto 108:34e6b704fe68 384 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UQASX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 385 {
Kojto 108:34e6b704fe68 386 uint32_t result;
Kojto 108:34e6b704fe68 387
Kojto 108:34e6b704fe68 388 __ASM volatile ("uqasx %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 389 return(result);
Kojto 108:34e6b704fe68 390 }
Kojto 108:34e6b704fe68 391
Kojto 108:34e6b704fe68 392 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UHASX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 393 {
Kojto 108:34e6b704fe68 394 uint32_t result;
Kojto 108:34e6b704fe68 395
Kojto 108:34e6b704fe68 396 __ASM volatile ("uhasx %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 397 return(result);
Kojto 108:34e6b704fe68 398 }
Kojto 108:34e6b704fe68 399
Kojto 108:34e6b704fe68 400 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SSAX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 401 {
Kojto 108:34e6b704fe68 402 uint32_t result;
Kojto 108:34e6b704fe68 403
Kojto 108:34e6b704fe68 404 __ASM volatile ("ssax %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 405 return(result);
Kojto 108:34e6b704fe68 406 }
Kojto 108:34e6b704fe68 407
Kojto 108:34e6b704fe68 408 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __QSAX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 409 {
Kojto 108:34e6b704fe68 410 uint32_t result;
Kojto 108:34e6b704fe68 411
Kojto 108:34e6b704fe68 412 __ASM volatile ("qsax %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 413 return(result);
Kojto 108:34e6b704fe68 414 }
Kojto 108:34e6b704fe68 415
Kojto 108:34e6b704fe68 416 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SHSAX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 417 {
Kojto 108:34e6b704fe68 418 uint32_t result;
Kojto 108:34e6b704fe68 419
Kojto 108:34e6b704fe68 420 __ASM volatile ("shsax %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 421 return(result);
Kojto 108:34e6b704fe68 422 }
Kojto 108:34e6b704fe68 423
Kojto 108:34e6b704fe68 424 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __USAX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 425 {
Kojto 108:34e6b704fe68 426 uint32_t result;
Kojto 108:34e6b704fe68 427
Kojto 108:34e6b704fe68 428 __ASM volatile ("usax %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 429 return(result);
Kojto 108:34e6b704fe68 430 }
Kojto 108:34e6b704fe68 431
Kojto 108:34e6b704fe68 432 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UQSAX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 433 {
Kojto 108:34e6b704fe68 434 uint32_t result;
Kojto 108:34e6b704fe68 435
Kojto 108:34e6b704fe68 436 __ASM volatile ("uqsax %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 437 return(result);
Kojto 108:34e6b704fe68 438 }
Kojto 108:34e6b704fe68 439
Kojto 108:34e6b704fe68 440 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UHSAX(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 441 {
Kojto 108:34e6b704fe68 442 uint32_t result;
Kojto 108:34e6b704fe68 443
Kojto 108:34e6b704fe68 444 __ASM volatile ("uhsax %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 445 return(result);
Kojto 108:34e6b704fe68 446 }
Kojto 108:34e6b704fe68 447
Kojto 108:34e6b704fe68 448 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __USAD8(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 449 {
Kojto 108:34e6b704fe68 450 uint32_t result;
Kojto 108:34e6b704fe68 451
Kojto 108:34e6b704fe68 452 __ASM volatile ("usad8 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 453 return(result);
Kojto 108:34e6b704fe68 454 }
Kojto 108:34e6b704fe68 455
Kojto 108:34e6b704fe68 456 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __USADA8(uint32_t op1, uint32_t op2, uint32_t op3)
Kojto 108:34e6b704fe68 457 {
Kojto 108:34e6b704fe68 458 uint32_t result;
Kojto 108:34e6b704fe68 459
Kojto 108:34e6b704fe68 460 __ASM volatile ("usada8 %0, %1, %2, %3" : "=r" (result) : "r" (op1), "r" (op2), "r" (op3) );
Kojto 108:34e6b704fe68 461 return(result);
Kojto 108:34e6b704fe68 462 }
Kojto 108:34e6b704fe68 463
Kojto 108:34e6b704fe68 464 #define __SSAT16(ARG1,ARG2) \
Kojto 108:34e6b704fe68 465 ({ \
Kojto 108:34e6b704fe68 466 uint32_t __RES, __ARG1 = (ARG1); \
Kojto 108:34e6b704fe68 467 __ASM ("ssat16 %0, %1, %2" : "=r" (__RES) : "I" (ARG2), "r" (__ARG1) ); \
Kojto 108:34e6b704fe68 468 __RES; \
Kojto 108:34e6b704fe68 469 })
Kojto 108:34e6b704fe68 470
Kojto 108:34e6b704fe68 471 #define __USAT16(ARG1,ARG2) \
Kojto 108:34e6b704fe68 472 ({ \
Kojto 108:34e6b704fe68 473 uint32_t __RES, __ARG1 = (ARG1); \
Kojto 108:34e6b704fe68 474 __ASM ("usat16 %0, %1, %2" : "=r" (__RES) : "I" (ARG2), "r" (__ARG1) ); \
Kojto 108:34e6b704fe68 475 __RES; \
Kojto 108:34e6b704fe68 476 })
Kojto 108:34e6b704fe68 477
Kojto 108:34e6b704fe68 478 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UXTB16(uint32_t op1)
Kojto 108:34e6b704fe68 479 {
Kojto 108:34e6b704fe68 480 uint32_t result;
Kojto 108:34e6b704fe68 481
Kojto 108:34e6b704fe68 482 __ASM volatile ("uxtb16 %0, %1" : "=r" (result) : "r" (op1));
Kojto 108:34e6b704fe68 483 return(result);
Kojto 108:34e6b704fe68 484 }
Kojto 108:34e6b704fe68 485
Kojto 108:34e6b704fe68 486 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __UXTAB16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 487 {
Kojto 108:34e6b704fe68 488 uint32_t result;
Kojto 108:34e6b704fe68 489
Kojto 108:34e6b704fe68 490 __ASM volatile ("uxtab16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 491 return(result);
Kojto 108:34e6b704fe68 492 }
Kojto 108:34e6b704fe68 493
Kojto 108:34e6b704fe68 494 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SXTB16(uint32_t op1)
Kojto 108:34e6b704fe68 495 {
Kojto 108:34e6b704fe68 496 uint32_t result;
Kojto 108:34e6b704fe68 497
Kojto 108:34e6b704fe68 498 __ASM volatile ("sxtb16 %0, %1" : "=r" (result) : "r" (op1));
Kojto 108:34e6b704fe68 499 return(result);
Kojto 108:34e6b704fe68 500 }
Kojto 108:34e6b704fe68 501
Kojto 108:34e6b704fe68 502 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SXTAB16(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 503 {
Kojto 108:34e6b704fe68 504 uint32_t result;
Kojto 108:34e6b704fe68 505
Kojto 108:34e6b704fe68 506 __ASM volatile ("sxtab16 %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 507 return(result);
Kojto 108:34e6b704fe68 508 }
Kojto 108:34e6b704fe68 509
Kojto 108:34e6b704fe68 510 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMUAD (uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 511 {
Kojto 108:34e6b704fe68 512 uint32_t result;
Kojto 108:34e6b704fe68 513
Kojto 108:34e6b704fe68 514 __ASM volatile ("smuad %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 515 return(result);
Kojto 108:34e6b704fe68 516 }
Kojto 108:34e6b704fe68 517
Kojto 108:34e6b704fe68 518 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMUADX (uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 519 {
Kojto 108:34e6b704fe68 520 uint32_t result;
Kojto 108:34e6b704fe68 521
Kojto 108:34e6b704fe68 522 __ASM volatile ("smuadx %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 523 return(result);
Kojto 108:34e6b704fe68 524 }
Kojto 108:34e6b704fe68 525
Kojto 108:34e6b704fe68 526 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMLAD (uint32_t op1, uint32_t op2, uint32_t op3)
Kojto 108:34e6b704fe68 527 {
Kojto 108:34e6b704fe68 528 uint32_t result;
Kojto 108:34e6b704fe68 529
Kojto 108:34e6b704fe68 530 __ASM volatile ("smlad %0, %1, %2, %3" : "=r" (result) : "r" (op1), "r" (op2), "r" (op3) );
Kojto 108:34e6b704fe68 531 return(result);
Kojto 108:34e6b704fe68 532 }
Kojto 108:34e6b704fe68 533
Kojto 108:34e6b704fe68 534 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMLADX (uint32_t op1, uint32_t op2, uint32_t op3)
Kojto 108:34e6b704fe68 535 {
Kojto 108:34e6b704fe68 536 uint32_t result;
Kojto 108:34e6b704fe68 537
Kojto 108:34e6b704fe68 538 __ASM volatile ("smladx %0, %1, %2, %3" : "=r" (result) : "r" (op1), "r" (op2), "r" (op3) );
Kojto 108:34e6b704fe68 539 return(result);
Kojto 108:34e6b704fe68 540 }
Kojto 108:34e6b704fe68 541
Kojto 108:34e6b704fe68 542 #define __SMLALD(ARG1,ARG2,ARG3) \
Kojto 108:34e6b704fe68 543 ({ \
Kojto 108:34e6b704fe68 544 uint32_t __ARG1 = (ARG1), __ARG2 = (ARG2), __ARG3_H = (uint32_t)((uint64_t)(ARG3) >> 32), __ARG3_L = (uint32_t)((uint64_t)(ARG3) & 0xFFFFFFFFUL); \
Kojto 108:34e6b704fe68 545 __ASM volatile ("smlald %0, %1, %2, %3" : "=r" (__ARG3_L), "=r" (__ARG3_H) : "r" (__ARG1), "r" (__ARG2), "0" (__ARG3_L), "1" (__ARG3_H) ); \
Kojto 108:34e6b704fe68 546 (uint64_t)(((uint64_t)__ARG3_H << 32) | __ARG3_L); \
Kojto 108:34e6b704fe68 547 })
Kojto 108:34e6b704fe68 548
Kojto 108:34e6b704fe68 549 #define __SMLALDX(ARG1,ARG2,ARG3) \
Kojto 108:34e6b704fe68 550 ({ \
Kojto 108:34e6b704fe68 551 uint32_t __ARG1 = (ARG1), __ARG2 = (ARG2), __ARG3_H = (uint32_t)((uint64_t)(ARG3) >> 32), __ARG3_L = (uint32_t)((uint64_t)(ARG3) & 0xFFFFFFFFUL); \
Kojto 108:34e6b704fe68 552 __ASM volatile ("smlaldx %0, %1, %2, %3" : "=r" (__ARG3_L), "=r" (__ARG3_H) : "r" (__ARG1), "r" (__ARG2), "0" (__ARG3_L), "1" (__ARG3_H) ); \
Kojto 108:34e6b704fe68 553 (uint64_t)(((uint64_t)__ARG3_H << 32) | __ARG3_L); \
Kojto 108:34e6b704fe68 554 })
Kojto 108:34e6b704fe68 555
Kojto 108:34e6b704fe68 556 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMUSD (uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 557 {
Kojto 108:34e6b704fe68 558 uint32_t result;
Kojto 108:34e6b704fe68 559
Kojto 108:34e6b704fe68 560 __ASM volatile ("smusd %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 561 return(result);
Kojto 108:34e6b704fe68 562 }
Kojto 108:34e6b704fe68 563
Kojto 108:34e6b704fe68 564 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMUSDX (uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 565 {
Kojto 108:34e6b704fe68 566 uint32_t result;
Kojto 108:34e6b704fe68 567
Kojto 108:34e6b704fe68 568 __ASM volatile ("smusdx %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 569 return(result);
Kojto 108:34e6b704fe68 570 }
Kojto 108:34e6b704fe68 571
Kojto 108:34e6b704fe68 572 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMLSD (uint32_t op1, uint32_t op2, uint32_t op3)
Kojto 108:34e6b704fe68 573 {
Kojto 108:34e6b704fe68 574 uint32_t result;
Kojto 108:34e6b704fe68 575
Kojto 108:34e6b704fe68 576 __ASM volatile ("smlsd %0, %1, %2, %3" : "=r" (result) : "r" (op1), "r" (op2), "r" (op3) );
Kojto 108:34e6b704fe68 577 return(result);
Kojto 108:34e6b704fe68 578 }
Kojto 108:34e6b704fe68 579
Kojto 108:34e6b704fe68 580 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMLSDX (uint32_t op1, uint32_t op2, uint32_t op3)
Kojto 108:34e6b704fe68 581 {
Kojto 108:34e6b704fe68 582 uint32_t result;
Kojto 108:34e6b704fe68 583
Kojto 108:34e6b704fe68 584 __ASM volatile ("smlsdx %0, %1, %2, %3" : "=r" (result) : "r" (op1), "r" (op2), "r" (op3) );
Kojto 108:34e6b704fe68 585 return(result);
Kojto 108:34e6b704fe68 586 }
Kojto 108:34e6b704fe68 587
Kojto 108:34e6b704fe68 588 #define __SMLSLD(ARG1,ARG2,ARG3) \
Kojto 108:34e6b704fe68 589 ({ \
Kojto 108:34e6b704fe68 590 uint32_t __ARG1 = (ARG1), __ARG2 = (ARG2), __ARG3_H = (uint32_t)((ARG3) >> 32), __ARG3_L = (uint32_t)((ARG3) & 0xFFFFFFFFUL); \
Kojto 108:34e6b704fe68 591 __ASM volatile ("smlsld %0, %1, %2, %3" : "=r" (__ARG3_L), "=r" (__ARG3_H) : "r" (__ARG1), "r" (__ARG2), "0" (__ARG3_L), "1" (__ARG3_H) ); \
Kojto 108:34e6b704fe68 592 (uint64_t)(((uint64_t)__ARG3_H << 32) | __ARG3_L); \
Kojto 108:34e6b704fe68 593 })
Kojto 108:34e6b704fe68 594
Kojto 108:34e6b704fe68 595 #define __SMLSLDX(ARG1,ARG2,ARG3) \
Kojto 108:34e6b704fe68 596 ({ \
Kojto 108:34e6b704fe68 597 uint32_t __ARG1 = (ARG1), __ARG2 = (ARG2), __ARG3_H = (uint32_t)((ARG3) >> 32), __ARG3_L = (uint32_t)((ARG3) & 0xFFFFFFFFUL); \
Kojto 108:34e6b704fe68 598 __ASM volatile ("smlsldx %0, %1, %2, %3" : "=r" (__ARG3_L), "=r" (__ARG3_H) : "r" (__ARG1), "r" (__ARG2), "0" (__ARG3_L), "1" (__ARG3_H) ); \
Kojto 108:34e6b704fe68 599 (uint64_t)(((uint64_t)__ARG3_H << 32) | __ARG3_L); \
Kojto 108:34e6b704fe68 600 })
Kojto 108:34e6b704fe68 601
Kojto 108:34e6b704fe68 602 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SEL (uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 603 {
Kojto 108:34e6b704fe68 604 uint32_t result;
Kojto 108:34e6b704fe68 605
Kojto 108:34e6b704fe68 606 __ASM volatile ("sel %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 607 return(result);
Kojto 108:34e6b704fe68 608 }
Kojto 108:34e6b704fe68 609
Kojto 108:34e6b704fe68 610 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __QADD(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 611 {
Kojto 108:34e6b704fe68 612 uint32_t result;
Kojto 108:34e6b704fe68 613
Kojto 108:34e6b704fe68 614 __ASM volatile ("qadd %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 615 return(result);
Kojto 108:34e6b704fe68 616 }
Kojto 108:34e6b704fe68 617
Kojto 108:34e6b704fe68 618 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __QSUB(uint32_t op1, uint32_t op2)
Kojto 108:34e6b704fe68 619 {
Kojto 108:34e6b704fe68 620 uint32_t result;
Kojto 108:34e6b704fe68 621
Kojto 108:34e6b704fe68 622 __ASM volatile ("qsub %0, %1, %2" : "=r" (result) : "r" (op1), "r" (op2) );
Kojto 108:34e6b704fe68 623 return(result);
Kojto 108:34e6b704fe68 624 }
Kojto 108:34e6b704fe68 625
Kojto 108:34e6b704fe68 626 #define __PKHBT(ARG1,ARG2,ARG3) \
Kojto 108:34e6b704fe68 627 ({ \
Kojto 108:34e6b704fe68 628 uint32_t __RES, __ARG1 = (ARG1), __ARG2 = (ARG2); \
Kojto 108:34e6b704fe68 629 __ASM ("pkhbt %0, %1, %2, lsl %3" : "=r" (__RES) : "r" (__ARG1), "r" (__ARG2), "I" (ARG3) ); \
Kojto 108:34e6b704fe68 630 __RES; \
Kojto 108:34e6b704fe68 631 })
Kojto 108:34e6b704fe68 632
Kojto 108:34e6b704fe68 633 #define __PKHTB(ARG1,ARG2,ARG3) \
Kojto 108:34e6b704fe68 634 ({ \
Kojto 108:34e6b704fe68 635 uint32_t __RES, __ARG1 = (ARG1), __ARG2 = (ARG2); \
Kojto 108:34e6b704fe68 636 if (ARG3 == 0) \
Kojto 108:34e6b704fe68 637 __ASM ("pkhtb %0, %1, %2" : "=r" (__RES) : "r" (__ARG1), "r" (__ARG2) ); \
Kojto 108:34e6b704fe68 638 else \
Kojto 108:34e6b704fe68 639 __ASM ("pkhtb %0, %1, %2, asr %3" : "=r" (__RES) : "r" (__ARG1), "r" (__ARG2), "I" (ARG3) ); \
Kojto 108:34e6b704fe68 640 __RES; \
Kojto 108:34e6b704fe68 641 })
Kojto 108:34e6b704fe68 642
Kojto 108:34e6b704fe68 643 __attribute__( ( always_inline ) ) __STATIC_INLINE uint32_t __SMMLA (int32_t op1, int32_t op2, int32_t op3)
Kojto 108:34e6b704fe68 644 {
Kojto 108:34e6b704fe68 645 int32_t result;
Kojto 108:34e6b704fe68 646
Kojto 108:34e6b704fe68 647 __ASM volatile ("smmla %0, %1, %2, %3" : "=r" (result): "r" (op1), "r" (op2), "r" (op3) );
Kojto 108:34e6b704fe68 648 return(result);
Kojto 108:34e6b704fe68 649 }
Kojto 108:34e6b704fe68 650
Kojto 108:34e6b704fe68 651 /*-- End CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 652
Kojto 108:34e6b704fe68 653
Kojto 108:34e6b704fe68 654
Kojto 108:34e6b704fe68 655 #elif defined ( __TASKING__ ) /*------------------ TASKING Compiler --------------*/
Kojto 108:34e6b704fe68 656 /* TASKING carm specific functions */
Kojto 108:34e6b704fe68 657
Kojto 108:34e6b704fe68 658
Kojto 108:34e6b704fe68 659 /*------ CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 660 /* not yet supported */
Kojto 108:34e6b704fe68 661 /*-- End CM4 SIMD Intrinsics -----------------------------------------------------*/
Kojto 108:34e6b704fe68 662
Kojto 108:34e6b704fe68 663
Kojto 108:34e6b704fe68 664 #endif
Kojto 108:34e6b704fe68 665
Kojto 108:34e6b704fe68 666 /*@} end of group CMSIS_SIMD_intrinsics */
Kojto 108:34e6b704fe68 667
Kojto 108:34e6b704fe68 668
Kojto 108:34e6b704fe68 669 #endif /* __CORE_CM4_SIMD_H */
Kojto 108:34e6b704fe68 670
Kojto 108:34e6b704fe68 671 #ifdef __cplusplus
Kojto 108:34e6b704fe68 672 }
Kojto 108:34e6b704fe68 673 #endif