Index: content/common/sandbox_win.cc |
diff --git a/content/common/sandbox_win.cc b/content/common/sandbox_win.cc |
index 0041fda24207929229da9c225dfe3ecc9012324b..6f063d7d8384610e714dc3721e6bb4031ddcf34c 100644 |
--- a/content/common/sandbox_win.cc |
+++ b/content/common/sandbox_win.cc |
@@ -654,10 +654,6 @@ base::ProcessHandle StartSandboxedProcess( |
true, |
sandbox::TargetPolicy::FILES_ALLOW_READONLY, |
policy); |
- // We do not automatically propagate this from the browser command line, |
- // and instead only add it when we're actually setting up the sandbox to |
- // work with DirectWrite. |
- cmd_line->AppendSwitch(switches::kEnableDirectWrite); |
} |
} else { |
// Hack for Google Desktop crash. Trick GD into not injecting its DLL into |