| Index: chrome/browser/ssl/ssl_browser_tests.cc | 
| diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc | 
| index 09273e0a0e753fe3449932756fc7ebbca482a349..c8f6bdd7a6174eb59040ea0923482f50176f3ed6 100644 | 
| --- a/chrome/browser/ssl/ssl_browser_tests.cc | 
| +++ b/chrome/browser/ssl/ssl_browser_tests.cc | 
| @@ -360,6 +360,10 @@ class SSLUITest : public InProcessBrowserTest { | 
| command_line->AppendSwitch(switches::kProcessPerSite); | 
| } | 
|  | 
| +  void SetUpOnMainThread() override { | 
| +    host_resolver()->AddRule("*", "127.0.0.1"); | 
| +  } | 
| + | 
| void CheckAuthenticatedState(WebContents* tab, | 
| int expected_authentication_state) { | 
| CheckSecurityState(tab, CertError::NONE, security_state::SECURE, | 
| @@ -1749,9 +1753,6 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, | 
| ASSERT_TRUE(embedded_test_server()->Start()); | 
| ASSERT_TRUE(https_server_.Start()); | 
|  | 
| -  host_resolver()->AddRule("example.test", | 
| -                           https_server_.GetURL("/title1.html").host()); | 
| - | 
| net::HostPortPair replacement_pair = embedded_test_server()->host_port_pair(); | 
| replacement_pair.set_host("example.test"); | 
|  | 
| @@ -2151,6 +2152,7 @@ class SSLUITestWaitForDOMNotification : public SSLUITestIgnoreCertErrors, | 
| ~SSLUITestWaitForDOMNotification() override { registrar_.RemoveAll(); }; | 
|  | 
| void SetUpOnMainThread() override { | 
| +    SSLUITestIgnoreCertErrors::SetUpOnMainThread(); | 
| registrar_.Add(this, content::NOTIFICATION_DOM_OPERATION_RESPONSE, | 
| content::NotificationService::AllSources()); | 
| } | 
| @@ -2189,8 +2191,6 @@ IN_PROC_BROWSER_TEST_F(SSLUITestWaitForDOMNotification, | 
| ASSERT_TRUE(embedded_test_server()->Start()); | 
| ASSERT_TRUE(https_server_.Start()); | 
|  | 
| -  host_resolver()->AddRule("*", embedded_test_server()->GetURL("/").host()); | 
| - | 
| ui_test_utils::NavigateToURL(browser(), | 
| https_server_.GetURL("/ssl/blank_page.html")); | 
| WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); | 
| @@ -2270,14 +2270,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) { | 
| ASSERT_TRUE(https_server_.Start()); | 
| ASSERT_TRUE(https_server_expired_.Start()); | 
|  | 
| -  // Make sure to add this hostname to the resolver so that it's not blocked | 
| -  // (browser_test_base.cc has a resolver that blocks all non-local hostnames | 
| -  // by default to ensure tests don't hit the network). This is critical to do | 
| -  // because for PlzNavigate the request would otherwise get cancelled in the | 
| -  // browser before the renderer sees it. | 
| -  host_resolver()->AddRule( | 
| -      "example.test", | 
| -      embedded_test_server()->GetURL("/title1.html").host()); | 
| +  // SetUpOnMainThread adds this hostname to the resolver so that it's not | 
| +  // blocked (browser_test_base.cc has a resolver that blocks all non-local | 
| +  // hostnames by default to ensure tests don't hit the network). This is | 
| +  // critical to do because for PlzNavigate the request would otherwise get | 
| +  // cancelled in the browser before the renderer sees it. | 
|  | 
| std::string top_frame_path; | 
| GetTopFramePath(*embedded_test_server(), https_server_, https_server_expired_, | 
| @@ -3087,7 +3084,10 @@ class SSLNetworkTimeBrowserTest : public SSLUITest { | 
| "on-demand-only"); | 
| } | 
|  | 
| -  void SetUpOnMainThread() override { SetUpNetworkTimeServer(); } | 
| +  void SetUpOnMainThread() override { | 
| +    SSLUITest::SetUpOnMainThread(); | 
| +    SetUpNetworkTimeServer(); | 
| +  } | 
|  | 
| void TearDownOnMainThread() override { | 
| content::BrowserThread::PostTask(content::BrowserThread::IO, FROM_HERE, | 
| @@ -3405,6 +3405,11 @@ class CommonNameMismatchBrowserTest : public CertVerifierBrowserTest { | 
| command_line->AppendSwitchASCII(switches::kForceFieldTrials, | 
| "SSLCommonNameMismatchHandling/Enabled/"); | 
| } | 
| + | 
| +  void SetUpOnMainThread() override { | 
| +    CertVerifierBrowserTest::SetUpOnMainThread(); | 
| +    host_resolver()->AddRule("*", "127.0.0.1"); | 
| +  } | 
| }; | 
|  | 
| // Visit the URL www.mail.example.com on a server that presents a valid | 
| @@ -3418,12 +3423,6 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 
| base::FilePath(kDocRoot)); | 
| ASSERT_TRUE(https_server_example_domain_.Start()); | 
|  | 
| -  host_resolver()->AddRule( | 
| -      "mail.example.com", https_server_example_domain_.host_port_pair().host()); | 
| -  host_resolver()->AddRule( | 
| -      "www.mail.example.com", | 
| -      https_server_example_domain_.host_port_pair().host()); | 
| - | 
| scoped_refptr<net::X509Certificate> cert = | 
| https_server_example_domain_.GetCertificate(); | 
|  | 
| @@ -3484,11 +3483,6 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 
| base::FilePath(kDocRoot)); | 
| ASSERT_TRUE(https_server_example_domain_.Start()); | 
|  | 
| -  host_resolver()->AddRule( | 
| -      "www.example.org", https_server_example_domain_.host_port_pair().host()); | 
| -  host_resolver()->AddRule( | 
| -      "example.org", https_server_example_domain_.host_port_pair().host()); | 
| - | 
| scoped_refptr<net::X509Certificate> cert = | 
| https_server_example_domain_.GetCertificate(); | 
|  | 
| @@ -3543,12 +3537,6 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 
| base::FilePath(kDocRoot)); | 
| ASSERT_TRUE(https_server_example_domain_.Start()); | 
|  | 
| -  host_resolver()->AddRule( | 
| -      "mail.example.com", https_server_example_domain_.host_port_pair().host()); | 
| -  host_resolver()->AddRule( | 
| -      "www.mail.example.com", | 
| -      https_server_example_domain_.host_port_pair().host()); | 
| - | 
| scoped_refptr<net::X509Certificate> cert = | 
| https_server_example_domain_.GetCertificate(); | 
|  | 
| @@ -3612,12 +3600,6 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 
| base::FilePath(kDocRoot)); | 
| ASSERT_TRUE(https_server_example_domain_.Start()); | 
|  | 
| -  host_resolver()->AddRule( | 
| -      "mail.example.com", https_server_example_domain_.host_port_pair().host()); | 
| -  host_resolver()->AddRule( | 
| -      "www.mail.example.com", | 
| -      https_server_example_domain_.host_port_pair().host()); | 
| - | 
| scoped_refptr<net::X509Certificate> cert = | 
| https_server_example_domain_.GetCertificate(); | 
|  | 
| @@ -3679,12 +3661,6 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 
| base::FilePath(kDocRoot)); | 
| ASSERT_TRUE(https_server_example_domain_.Start()); | 
|  | 
| -  host_resolver()->AddRule( | 
| -      "mail.example.com", https_server_example_domain_.host_port_pair().host()); | 
| -  host_resolver()->AddRule( | 
| -      "www.mail.example.com", | 
| -      https_server_example_domain_.host_port_pair().host()); | 
| - | 
| scoped_refptr<net::X509Certificate> cert = | 
| https_server_example_domain_.GetCertificate(); | 
|  | 
|  |