| Index: net/proxy/proxy_bypass_rules.cc
 | 
| diff --git a/net/proxy/proxy_bypass_rules.cc b/net/proxy/proxy_bypass_rules.cc
 | 
| index 67b147abeb1b5ade4f5a59c1806ae9d031beaab1..d80e6f177c8ab8198fc4910d6aad4e61f06b9c75 100644
 | 
| --- a/net/proxy/proxy_bypass_rules.cc
 | 
| +++ b/net/proxy/proxy_bypass_rules.cc
 | 
| @@ -171,14 +171,14 @@ bool ProxyBypassRules::AddRuleForHostname(const std::string& optional_scheme,
 | 
|    if (hostname_pattern.empty())
 | 
|      return false;
 | 
|  
 | 
| -  rules_.push_back(new HostnamePatternRule(optional_scheme,
 | 
| -                                           hostname_pattern,
 | 
| -                                           optional_port));
 | 
| +  rules_.push_back(make_scoped_refptr(new HostnamePatternRule(optional_scheme,
 | 
| +                                                              hostname_pattern,
 | 
| +                                                              optional_port)));
 | 
|    return true;
 | 
|  }
 | 
|  
 | 
|  void ProxyBypassRules::AddRuleToBypassLocal() {
 | 
| -  rules_.push_back(new BypassLocalRule);
 | 
| +  rules_.push_back(make_scoped_refptr(new BypassLocalRule));
 | 
|  }
 | 
|  
 | 
|  bool ProxyBypassRules::AddRuleFromString(const std::string& raw) {
 | 
| @@ -241,8 +241,8 @@ bool ProxyBypassRules::AddRuleFromStringInternal(
 | 
|      if (!ParseCIDRBlock(raw, &ip_prefix, &prefix_length_in_bits))
 | 
|        return false;
 | 
|  
 | 
| -    rules_.push_back(
 | 
| -        new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits));
 | 
| +    rules_.push_back(make_scoped_refptr(
 | 
| +        new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits)));
 | 
|  
 | 
|      return true;
 | 
|    }
 | 
| 
 |