| Index: LayoutTests/http/tests/security/contentSecurityPolicy/inline-event-handler-blocked-after-injecting-meta-expected.txt
 | 
| diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/inline-event-handler-blocked-after-injecting-meta-expected.txt b/LayoutTests/http/tests/security/contentSecurityPolicy/inline-event-handler-blocked-after-injecting-meta-expected.txt
 | 
| index cf140958f45eb3a9beeacdc60e5bc47205c97626..7b83ab800af11b5a991615de787e0aa62934aaa3 100644
 | 
| --- a/LayoutTests/http/tests/security/contentSecurityPolicy/inline-event-handler-blocked-after-injecting-meta-expected.txt
 | 
| +++ b/LayoutTests/http/tests/security/contentSecurityPolicy/inline-event-handler-blocked-after-injecting-meta-expected.txt
 | 
| @@ -2,6 +2,6 @@ CONSOLE MESSAGE: line 8: Clicking a link, pre-policy:
 | 
|  CONSOLE MESSAGE: line 21: PASS: Event handler triggered pre-policy.
 | 
|  CONSOLE MESSAGE: line 14: Injecting Content-Security-Policy.
 | 
|  CONSOLE MESSAGE: line 19: Clicking a link, post-policy:
 | 
| -CONSOLE MESSAGE: line 21: Refused to execute inline event handler because it violates the following Content Security Policy directive: "default-src 'self'". Note that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
 | 
| +CONSOLE ERROR: line 21: Refused to execute inline event handler because it violates the following Content Security Policy directive: "default-src 'self'". Note that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
 | 
|  
 | 
|  This test checks that CSP is evaluated on each call to an inline event handler, even if it's been executed pre-policy. It passes if one 'PASS' and no 'FAIL' messages appear.
 | 
| 
 |