mjblackhorse
mjblackhorse
I reran the app many times, each time I found one instance of DownloaderTabFragment reported as leaked per each .hprof file. I'll try manually run the app targeting at the...
The reference is indirectly created when the StudyActivity instance containing the CardFragment instance is destroyed:   So if I repeat rotating screen when the StudyActivity is on top, there...
.hprof file(in .rar format) [heap_3.txt](https://github.com/helloworld1/AnyMemo/files/633579/heap_3.txt)
At the same time, instances of "org.liberty.android.fantastischmemo.downloader.google.SpreadsheetListScreen" also leaked with, maybe, the same reason:  The .hprof file (zipped with WinRAR, please change ".txt" to ".rar") is attached: [heap_2.txt](https://github.com/helloworld1/AnyMemo/files/633557/heap_2.txt)
Similar situations happen to org.liberty.android.fantastischmemo.downloader.quizlet.QuizletSearchByTitleActivity 
I start openwhisk via the following cmd: ``` shell $ sudo /gradlew core:standalone:bootRun ``` instead of running it without `sudo` ``` shell $ /gradlew core:standalone:bootRun ``` The later would fail...