Revert of Prevent stack overflow in the serializer/deserializer. (patchset #6 id...
authormachenbach <machenbach@chromium.org>
Thu, 14 May 2015 14:59:30 +0000 (07:59 -0700)
committerCommit bot <commit-bot@chromium.org>
Thu, 14 May 2015 14:59:23 +0000 (14:59 +0000)
commite1b5db6c8d118f2e015cff7724e9125163e9bca1
treea5a41693ad3d141a5f89de5e71794d7c9d9de074
parent2a6a87d71a1ae280c9a47ec65c75b0cfcf898377
Revert of Prevent stack overflow in the serializer/deserializer. (patchset #6 id:100001 of https://codereview.chromium.org/1125073004/)

Reason for revert:
[Sheriff] Breaks msan:
http://build.chromium.org/p/client.v8/builders/V8%20Linux%20-%20arm64%20-%20sim%20-%20MSAN/builds/2266

Original issue's description:
> Prevent stack overflow in the serializer/deserializer.
>
> We keep an eye on the recursion depth. Once it exceeds a limit, we serialize
> only the object header and size, but defer serializing the object body for
> after we have unwound the stack.
>
> R=mvstanton@chromium.org
>
> Committed: https://crrev.com/36b4a498d6614243454d5a182e4946b0dad24f0a
> Cr-Commit-Position: refs/heads/master@{#28385}

TBR=mvstanton@chromium.org,yangguo@chromium.org
NOPRESUBMIT=true
NOTREECHECKS=true
NOTRY=true

Review URL: https://codereview.chromium.org/1139113002

Cr-Commit-Position: refs/heads/master@{#28403}
src/api.cc
src/bootstrapper.cc
src/objects.cc
src/snapshot/serialize.cc
src/snapshot/serialize.h
test/cctest/test-serialize.cc