Rev 33 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
| Rev | Author | Line No. | Line |
|---|---|---|---|
| 33 | pmbaty | 1 | #include "chess.h" |
| 2 | #include "data.h" |
||
| 108 | pmbaty | 3 | /* last modified 09/16/14 */ |
| 33 | pmbaty | 4 | /* |
| 5 | ******************************************************************************* |
||
| 6 | * * |
||
| 7 | * HashProbe() is used to retrieve entries from the transposition table so * |
||
| 8 | * this sub-tree won't have to be searched again if we reach a position that * |
||
| 9 | * has been searched previously. A transposition table position contains * |
||
| 10 | * the following data packed into 128 bits with each item taking the number * |
||
| 11 | * of bits given in the table below: * |
||
| 12 | * * |
||
| 108 | pmbaty | 13 | * shr bits name description * |
| 14 | * 55 9 age search id to identify old trans/ref entries. * |
||
| 15 | * 53 2 type 0->value is worthless; 1-> value represents a * |
||
| 33 | pmbaty | 16 | * fail-low bound; 2-> value represents a fail-high * |
| 17 | * bound; 3-> value is an exact score. * |
||
| 108 | pmbaty | 18 | * 32 21 move best move from the current position, according to * |
| 33 | pmbaty | 19 | * the search at the time this position was stored. * |
| 108 | pmbaty | 20 | * 17 15 draft the depth of the search below this position, which * |
| 33 | pmbaty | 21 | * is used to see if we can use this entry at the * |
| 22 | * current position. * |
||
| 108 | pmbaty | 23 | * 0 17 value unsigned integer value of this position + 65536. * |
| 33 | pmbaty | 24 | * this might be a good score or search bound. * |
| 108 | pmbaty | 25 | * 0 64 key 64 bit hash signature, used to verify that this * |
| 33 | pmbaty | 26 | * entry goes with the current board position. * |
| 27 | * * |
||
| 28 | * The underlying scheme here is that we use a "bucket" of N entries. In * |
||
| 29 | * HashProbe() we simply compare against each of the four entries for a * |
||
| 30 | * match. Each "bucket" is carefully aligned to a 64-byte boundary so that * |
||
| 31 | * the bucket fits into a single cache line for efficiency. The bucket size * |
||
| 32 | * (N) is currently set to 4. * |
||
| 33 | * * |
||
| 34 | * Crafty uses the lockless hashing approach to avoid lock overhead in the * |
||
| 35 | * hash table accessing (reading or writing). What we do is store the key * |
||
| 36 | * and the information in two successive writes to memory. But since there * |
||
| 37 | * is nothing that prevents another CPU from interlacing its writes with * |
||
| 38 | * ours, we want to make sure that the bound/draft/etc really goes with the * |
||
| 39 | * key. Consider thread 1 trying to store A1 and A2 in two successive 64 * |
||
| 40 | * words, while thread 2 is trying to store B1 and B2. Since the two cpus * |
||
| 41 | * are fully independent, we could end up with {A1,A2}, {A1,B2}, {B1,A2} or * |
||
| 42 | * {B1,B2}. The two cases with one word of entry A and one word of entry B * |
||
| 43 | * are problematic since the information part does not belong with the * |
||
| 44 | * signature part, and a hash hit (signature match) will retrieve data that * |
||
| 45 | * does not match the position. Let's assume that the first word is the * |
||
| 46 | * signature (A1 or B1) and the second word is the data (A2 or B2). What we * |
||
| 47 | * do is store A1^A2 (exclusive-or the two parts) in the 1 (key) slot of the * |
||
| 48 | * entry, and store A2 in the data part. Now, before we try to compare the * |
||
| 49 | * signatures, we have to "un-corrupt" the stored signature by again using * |
||
| 50 | * xor, since A1^A2^A2 gives us the original A1 signature again. But if we * |
||
| 51 | * store A1^A2, and the data part gets replaced by B2, then we try to match * |
||
| 52 | * against A1^A2^B2 and that won't match unless we are lucky and A2 == B2 * |
||
| 53 | * which means the match is OK anyway. This eliminates the need to lock the * |
||
| 54 | * hash table while storing the two values, which would be a big performance * |
||
| 55 | * hit since hash entries are probed/stored in almost every node of the tree * |
||
| 56 | * except for the quiescence search. * |
||
| 57 | * * |
||
| 58 | ******************************************************************************* |
||
| 59 | */ |
||
| 60 | int HashProbe(TREE * RESTRICT tree, int ply, int depth, int side, int alpha, |
||
| 61 | int beta, int *value) { |
||
| 62 | HASH_ENTRY *htable; |
||
| 63 | HPATH_ENTRY *ptable; |
||
| 64 | uint64_t word1, word2, temp_hashkey; |
||
| 108 | pmbaty | 65 | int type, draft, avoid_null = 0, val, entry, i; |
| 33 | pmbaty | 66 | |
| 67 | /* |
||
| 68 | ************************************************************ |
||
| 69 | * * |
||
| 70 | * All we have to do is loop through four entries to see * |
||
| 71 | * if there is a signature match. There can only be one * |
||
| 72 | * instance of any single signature, so the first match is * |
||
| 73 | * all we need. * |
||
| 74 | * * |
||
| 75 | ************************************************************ |
||
| 76 | */ |
||
| 77 | tree->hash_move[ply] = 0; |
||
| 78 | temp_hashkey = (side) ? HashKey : ~HashKey; |
||
| 108 | pmbaty | 79 | htable = hash_table + (temp_hashkey & hash_mask); |
| 80 | for (entry = 0; entry < 4; entry++) { |
||
| 81 | word1 = htable[entry].word1; |
||
| 82 | word2 = htable[entry].word2 ^ word1; |
||
| 33 | pmbaty | 83 | if (word2 == temp_hashkey) |
| 84 | break; |
||
| 85 | } |
||
| 86 | /* |
||
| 87 | ************************************************************ |
||
| 88 | * * |
||
| 89 | * If we found a match, we have to verify that the draft * |
||
| 90 | * is at least equal to the current depth, if not higher, * |
||
| 91 | * and that the bound/score will let us terminate the * |
||
| 92 | * search early. * |
||
| 93 | * * |
||
| 94 | * We also return an "avoid_null" status if the matched * |
||
| 95 | * entry does not have enough draft to terminate the * |
||
| 96 | * current search but does have enough draft to prove that * |
||
| 97 | * a null-move search would not fail high. This avoids * |
||
| 98 | * the null-move search overhead in positions where it is * |
||
| 99 | * simply a waste of time to try it. * |
||
| 100 | * * |
||
| 101 | * If this is an EXACT entry, we are going to store the PV * |
||
| 102 | * in a safe place so that if we get a hit on this entry, * |
||
| 103 | * we can recover the PV and see the complete path rather * |
||
| 104 | * rather than one that is incomplete. * |
||
| 105 | * * |
||
| 106 | * One other issue is to update the age field if we get a * |
||
| 107 | * hit on an old position, so that it won't be replaced * |
||
| 108 | * just because it came from a previous search. * |
||
| 109 | * * |
||
| 110 | ************************************************************ |
||
| 111 | */ |
||
| 112 | if (entry < 4) { |
||
| 113 | if (word1 >> 55 != transposition_age) { |
||
| 114 | word1 = |
||
| 115 | (word1 & 0x007fffffffffffffull) | ((uint64_t) transposition_age << |
||
| 116 | 55); |
||
| 108 | pmbaty | 117 | htable[entry].word1 = word1; |
| 118 | htable[entry].word2 = word1 ^ word2; |
||
| 33 | pmbaty | 119 | } |
| 120 | val = (word1 & 0x1ffff) - 65536; |
||
| 121 | draft = (word1 >> 17) & 0x7fff; |
||
| 122 | tree->hash_move[ply] = (word1 >> 32) & 0x1fffff; |
||
| 123 | type = (word1 >> 53) & 3; |
||
| 108 | pmbaty | 124 | if ((type & UPPER) && |
| 125 | depth - null_depth - depth / null_divisor - 1 <= draft && val < beta) |
||
| 33 | pmbaty | 126 | avoid_null = AVOID_NULL_MOVE; |
| 127 | if (depth <= draft) { |
||
| 128 | if (val > 32000) |
||
| 129 | val -= ply - 1; |
||
| 130 | else if (val < -32000) |
||
| 131 | val += ply - 1; |
||
| 132 | *value = val; |
||
| 133 | /* |
||
| 134 | ************************************************************ |
||
| 135 | * * |
||
| 136 | * We have three types of results. An EXACT entry was * |
||
| 137 | * stored when val > alpha and val < beta, and represents * |
||
| 138 | * an exact score. An UPPER entry was stored when val < * |
||
| 139 | * alpha, which represents an upper bound with the score * |
||
| 140 | * likely being even lower. A LOWER entry was stored when * |
||
| 141 | * val > beta, which represents alower bound with the * |
||
| 142 | * score likely being even higher. * |
||
| 143 | * * |
||
| 144 | * For EXACT entries, we save the path from the position * |
||
| 145 | * to the terminal node that produced the backed-up score * |
||
| 146 | * so that we can complete the PV if we get a hash hit on * |
||
| 147 | * this entry. * |
||
| 148 | * * |
||
| 149 | ************************************************************ |
||
| 150 | */ |
||
| 151 | switch (type) { |
||
| 152 | case EXACT: |
||
| 153 | if (val > alpha && val < beta) { |
||
| 108 | pmbaty | 154 | SavePV(tree, ply, 1); |
| 33 | pmbaty | 155 | ptable = hash_path + (temp_hashkey & hash_path_mask); |
| 108 | pmbaty | 156 | for (entry = 0; entry < 16; entry++) |
| 157 | if (ptable[entry].path_sig == temp_hashkey) { |
||
| 158 | for (i = ply; |
||
| 159 | i < Min(MAXPLY - 1, ptable[entry].hash_pathl + ply); i++) |
||
| 160 | tree->pv[ply - 1].path[i] = |
||
| 161 | ptable[entry].hash_path_moves[i - ply]; |
||
| 162 | if (ptable[entry].hash_pathl + ply < MAXPLY - 1) |
||
| 33 | pmbaty | 163 | tree->pv[ply - 1].pathh = 0; |
| 164 | tree->pv[ply - 1].pathl = |
||
| 108 | pmbaty | 165 | Min(MAXPLY - 1, ply + ptable[entry].hash_pathl); |
| 166 | ptable[entry].hash_path_age = transposition_age; |
||
| 33 | pmbaty | 167 | break; |
| 168 | } |
||
| 169 | } |
||
| 170 | return HASH_HIT; |
||
| 171 | case UPPER: |
||
| 172 | if (val <= alpha) |
||
| 173 | return HASH_HIT; |
||
| 174 | break; |
||
| 175 | case LOWER: |
||
| 176 | if (val >= beta) |
||
| 177 | return HASH_HIT; |
||
| 178 | break; |
||
| 179 | } |
||
| 180 | } |
||
| 181 | return avoid_null; |
||
| 182 | } |
||
| 183 | return HASH_MISS; |
||
| 184 | } |
||
| 185 | |||
| 108 | pmbaty | 186 | /* last modified 09/16/14 */ |
| 33 | pmbaty | 187 | /* |
| 188 | ******************************************************************************* |
||
| 189 | * * |
||
| 190 | * HashStore() is used to store entries into the transposition table so that * |
||
| 191 | * this sub-tree won't have to be searched again if the same position is * |
||
| 192 | * reached. We basically store three types of entries: * |
||
| 193 | * * |
||
| 194 | * (1) EXACT. This entry is stored when we complete a search at some ply * |
||
| 108 | pmbaty | 195 | * and end up with a score that is greater than alpha and less than * |
| 196 | * beta, which is an exact score, which also has a best move to try * |
||
| 197 | * if we encounter this position again. * |
||
| 33 | pmbaty | 198 | * * |
| 199 | * (2) LOWER. This entry is stored when we complete a search at some ply * |
||
| 108 | pmbaty | 200 | * and end up with a score that is greater than or equal to beta. We * |
| 201 | * know know that this score should be at least equal to beta and may * |
||
| 202 | * well be even higher. So this entry represents a lower bound on * |
||
| 203 | * the score for this node, and we also have a good move to try since * |
||
| 204 | * it caused the cutoff, although we do not know if it is the best * |
||
| 205 | * move or not since not all moves were search. * |
||
| 33 | pmbaty | 206 | * * |
| 207 | * (3) UPPER. This entry is stored when we complete a search at some ply * |
||
| 108 | pmbaty | 208 | * and end up with a score that is less than or equal to alpha. We * |
| 209 | * know know that this score should be at least equal to alpha and * |
||
| 210 | * may well be even lower. So this entry represents an upper bound * |
||
| 211 | * on the score for this node. We have no idea about which move is * |
||
| 212 | * best in this position since they all failed low, so we store a * |
||
| 213 | * best move of zero. * |
||
| 33 | pmbaty | 214 | * * |
| 215 | * For storing, we may require three passes. We make our first pass looking * |
||
| 216 | * for an entry that matches the current hash signature. If we find a match * |
||
| 217 | * then we are constrained to overwrite that entry regardless of any other * |
||
| 218 | * considerations. The second pass looks for entries stored in previous * |
||
| 219 | * searches (not iterations) and chooses the one with the shallowest draft, * |
||
| 220 | * if one is found; Otherwise we make a final pass over the bucket and * |
||
| 221 | * choose the entry with the shallowest draft, period. * |
||
| 222 | * * |
||
| 223 | ******************************************************************************* |
||
| 224 | */ |
||
| 225 | void HashStore(TREE * RESTRICT tree, int ply, int depth, int side, int type, |
||
| 226 | int value, int bestmove) { |
||
| 227 | HASH_ENTRY *htable, *replace = 0; |
||
| 228 | HPATH_ENTRY *ptable; |
||
| 229 | uint64_t word1, temp_hashkey; |
||
| 230 | int entry, draft, age, replace_draft, i, j; |
||
| 231 | |||
| 232 | /* |
||
| 233 | ************************************************************ |
||
| 234 | * * |
||
| 235 | * "Fill in the blank" and build a table entry from * |
||
| 236 | * current search information. * |
||
| 237 | * * |
||
| 238 | ************************************************************ |
||
| 239 | */ |
||
| 240 | word1 = transposition_age; |
||
| 241 | word1 = (word1 << 2) | type; |
||
| 242 | if (value > 32000) |
||
| 243 | value += ply - 1; |
||
| 244 | else if (value < -32000) |
||
| 245 | value -= ply - 1; |
||
| 246 | word1 = (word1 << 21) | bestmove; |
||
| 247 | word1 = (word1 << 15) | depth; |
||
| 248 | word1 = (word1 << 17) | (value + 65536); |
||
| 249 | temp_hashkey = (side) ? HashKey : ~HashKey; |
||
| 250 | /* |
||
| 251 | ************************************************************ |
||
| 252 | * * |
||
| 253 | * Now we search for an entry to overwrite in three * |
||
| 254 | * passes. * |
||
| 255 | * * |
||
| 256 | * Pass 1: If any signature in the table matches the * |
||
| 257 | * current signature, we are going to overwrite this * |
||
| 258 | * entry, period. It might seem worthwhile to check the * |
||
| 259 | * draft and not overwrite if the table draft is greater * |
||
| 260 | * than the current remaining depth, but after you think * |
||
| 261 | * about it, this is a bad idea. If the draft is * |
||
| 262 | * greater than or equal the current remaining depth, * |
||
| 263 | * then we should never get here unless the stored bound * |
||
| 264 | * or score is unusable because of the current alpha/ * |
||
| 265 | * beta window. So we are overwriting to avoid losing * |
||
| 266 | * the current result. * |
||
| 267 | * * |
||
| 268 | * Pass 2: If any of the entries come from a previous * |
||
| 269 | * search (not iteration) then we choose the entry from * |
||
| 270 | * this set that has the smallest draft, since it is the * |
||
| 271 | * least potentially usable result. * |
||
| 272 | * * |
||
| 273 | * Pass 3: If neither of the above two found an entry to * |
||
| 274 | * overwrite, we simply choose the entry from the bucket * |
||
| 275 | * with the smallest draft and overwrite that. * |
||
| 276 | * * |
||
| 277 | ************************************************************ |
||
| 278 | */ |
||
| 108 | pmbaty | 279 | htable = hash_table + (temp_hashkey & hash_mask); |
| 280 | for (entry = 0; entry < 4; entry++) { |
||
| 281 | if (temp_hashkey == (htable[entry].word1 ^ htable[entry].word2)) { |
||
| 282 | replace = htable + entry; |
||
| 33 | pmbaty | 283 | break; |
| 284 | } |
||
| 285 | } |
||
| 286 | if (!replace) { |
||
| 287 | replace_draft = 99999; |
||
| 108 | pmbaty | 288 | for (entry = 0; entry < 4; entry++) { |
| 289 | age = htable[entry].word1 >> 55; |
||
| 290 | draft = (htable[entry].word1 >> 17) & 0x7fff; |
||
| 33 | pmbaty | 291 | if (age != transposition_age && replace_draft > draft) { |
| 108 | pmbaty | 292 | replace = htable + entry; |
| 33 | pmbaty | 293 | replace_draft = draft; |
| 294 | } |
||
| 295 | } |
||
| 296 | if (!replace) { |
||
| 108 | pmbaty | 297 | for (entry = 0; entry < 4; entry++) { |
| 298 | draft = (htable[entry].word1 >> 17) & 0x7fff; |
||
| 33 | pmbaty | 299 | if (replace_draft > draft) { |
| 108 | pmbaty | 300 | replace = htable + entry; |
| 33 | pmbaty | 301 | replace_draft = draft; |
| 302 | } |
||
| 303 | } |
||
| 304 | } |
||
| 305 | } |
||
| 306 | /* |
||
| 307 | ************************************************************ |
||
| 308 | * * |
||
| 309 | * Now that we know which entry to replace, we simply * |
||
| 310 | * stuff the values and exit. Note that the two 64 bit * |
||
| 311 | * words are xor'ed together and stored as the signature * |
||
| 312 | * for the "lockless-hash" approach. * |
||
| 313 | * * |
||
| 314 | ************************************************************ |
||
| 315 | */ |
||
| 316 | replace->word1 = word1; |
||
| 317 | replace->word2 = temp_hashkey ^ word1; |
||
| 318 | /* |
||
| 319 | ************************************************************ |
||
| 320 | * * |
||
| 321 | * If this is an EXACT entry, we are going to store the PV * |
||
| 322 | * in a safe place so that if we get a hit on this entry, * |
||
| 323 | * we can recover the PV and see the complete path rather * |
||
| 324 | * rather than one that is incomplete. * |
||
| 325 | * * |
||
| 326 | ************************************************************ |
||
| 327 | */ |
||
| 328 | if (type == EXACT) { |
||
| 329 | ptable = hash_path + (temp_hashkey & hash_path_mask); |
||
| 330 | for (i = 0; i < 16; i++, ptable++) { |
||
| 331 | if (ptable->path_sig == temp_hashkey || |
||
| 332 | ((transposition_age - ptable->hash_path_age) > 1)) { |
||
| 333 | for (j = ply; j < tree->pv[ply - 1].pathl; j++) |
||
| 334 | ptable->hash_path_moves[j - ply] = tree->pv[ply - 1].path[j]; |
||
| 335 | ptable->hash_pathl = tree->pv[ply - 1].pathl - ply; |
||
| 336 | ptable->path_sig = temp_hashkey; |
||
| 337 | ptable->hash_path_age = transposition_age; |
||
| 338 | break; |
||
| 339 | } |
||
| 340 | } |
||
| 341 | } |
||
| 342 | } |
||
| 343 | |||
| 108 | pmbaty | 344 | /* last modified 09/16/14 */ |
| 33 | pmbaty | 345 | /* |
| 346 | ******************************************************************************* |
||
| 347 | * * |
||
| 348 | * HashStorePV() is called by Iterate() to insert the PV moves so they will * |
||
| 349 | * be searched before any other moves. Normally the PV moves would be in * |
||
| 350 | * the table, but on occasion they can be overwritten, particularly the ones * |
||
| 351 | * that are a significant distance from the root since those table entries * |
||
| 352 | * will have a low draft. * |
||
| 353 | * * |
||
| 354 | ******************************************************************************* |
||
| 355 | */ |
||
| 356 | void HashStorePV(TREE * RESTRICT tree, int side, int ply) { |
||
| 357 | HASH_ENTRY *htable, *replace; |
||
| 358 | uint64_t temp_hashkey, word1; |
||
| 359 | int entry, draft, replace_draft, age; |
||
| 360 | |||
| 361 | /* |
||
| 362 | ************************************************************ |
||
| 363 | * * |
||
| 364 | * First, compute the initial hash address and the fake * |
||
| 365 | * entry we will store if we don't find a valid match * |
||
| 366 | * already in the table. * |
||
| 367 | * * |
||
| 368 | ************************************************************ |
||
| 369 | */ |
||
| 370 | temp_hashkey = (side) ? HashKey : ~HashKey; |
||
| 371 | word1 = transposition_age; |
||
| 372 | word1 = (word1 << 2) | WORTHLESS; |
||
| 373 | word1 = (word1 << 21) | tree->pv[0].path[ply]; |
||
| 374 | word1 = (word1 << 32) | 65536; |
||
| 375 | /* |
||
| 376 | ************************************************************ |
||
| 377 | * * |
||
| 378 | * Now we search for an entry to overwrite in three * |
||
| 379 | * passes. * |
||
| 380 | * * |
||
| 381 | * Pass 1: If any signature in the table matches the * |
||
| 382 | * current signature, we are going to overwrite this * |
||
| 383 | * entry, period. It might seem worthwhile to check the * |
||
| 384 | * draft and not overwrite if the table draft is greater * |
||
| 385 | * than the current remaining depth, but after you think * |
||
| 386 | * about it, this is a bad idea. If the draft is * |
||
| 387 | * greater than or equal the current remaining depth, * |
||
| 388 | * then we should never get here unless the stored bound * |
||
| 389 | * or score is unusable because of the current alpha/ * |
||
| 390 | * beta window. So we are overwriting to avoid losing * |
||
| 391 | * the current result. * |
||
| 392 | * * |
||
| 393 | * Pass 2: If any of the entries come from a previous * |
||
| 394 | * search (not iteration) then we choose the entry from * |
||
| 395 | * this set that has the smallest draft, since it is the * |
||
| 396 | * least potentially usable result. * |
||
| 397 | * * |
||
| 398 | * Pass 3: If neither of the above two found an entry to * |
||
| 399 | * overwrite, we simply choose the entry from the bucket * |
||
| 400 | * with the smallest draft and overwrite that. * |
||
| 401 | * * |
||
| 402 | ************************************************************ |
||
| 403 | */ |
||
| 108 | pmbaty | 404 | htable = hash_table + (temp_hashkey & hash_mask); |
| 405 | for (entry = 0; entry < 4; entry++) { |
||
| 406 | if ((htable[entry].word2 ^ htable[entry].word1) == temp_hashkey) { |
||
| 407 | htable[entry].word1 &= ~((uint64_t) 0x1fffff << 32); |
||
| 408 | htable[entry].word1 |= (uint64_t) tree->pv[0].path[ply] << 32; |
||
| 409 | htable[entry].word2 = temp_hashkey ^ htable[entry].word1; |
||
| 33 | pmbaty | 410 | break; |
| 411 | } |
||
| 412 | } |
||
| 413 | if (entry == 4) { |
||
| 414 | replace = 0; |
||
| 415 | replace_draft = 99999; |
||
| 108 | pmbaty | 416 | for (entry = 0; entry < 4; entry++) { |
| 417 | age = htable[entry].word1 >> 55; |
||
| 418 | draft = (htable[entry].word1 >> 17) & 0x7fff; |
||
| 33 | pmbaty | 419 | if (age != transposition_age && replace_draft > draft) { |
| 108 | pmbaty | 420 | replace = htable + entry; |
| 33 | pmbaty | 421 | replace_draft = draft; |
| 422 | } |
||
| 423 | } |
||
| 424 | if (!replace) { |
||
| 108 | pmbaty | 425 | for (entry = 0; entry < 4; entry++) { |
| 426 | draft = (htable[entry].word1 >> 17) & 0x7fff; |
||
| 33 | pmbaty | 427 | if (replace_draft > draft) { |
| 108 | pmbaty | 428 | replace = htable + entry; |
| 33 | pmbaty | 429 | replace_draft = draft; |
| 430 | } |
||
| 431 | } |
||
| 432 | } |
||
| 433 | replace->word1 = word1; |
||
| 434 | replace->word2 = temp_hashkey ^ word1; |
||
| 435 | } |
||
| 436 | } |