| Index: LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
 | 
| diff --git a/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt b/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
 | 
| index f34dbddf39419e2c87d207a243b367bb168efade..47a81a181eb8c0228a5409103fd6ab4a2c12cddf 100644
 | 
| --- a/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
 | 
| +++ b/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
 | 
| @@ -1,6 +1,5 @@
 | 
|  CONSOLE MESSAGE: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match.
 | 
| -CONSOLE MESSAGE: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match.
 | 
| -CONSOLE MESSAGE: line 1: Uncaught TypeError: Cannot read property 'body' of undefined
 | 
| +CONSOLE MESSAGE: line 1: Uncaught SecurityError: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match.
 | 
|  This page opens a window to "", injects malicious code, and then uses window.open.call to set its opener to the victim. The opened window then tries to scripts its opener.
 | 
|  Code injected into window:
 | 
|  <script>function write(target, message) { target.document.body.innerHTML = message; }
 | 
| 
 |