Repurpose bits 1 and 2 of the lockword for encoding the hash state of
an object.  Invert the meaning of the shape bit to match the encoding
scheme described in Bacon's paper.  Consequently, monitor pointers
must have the lower 3 bits stripped before they may be dereferenced.
7 files changed