Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FromTheMarket: Exception class java.lang.IllegalStateException Source method Parcel.readException() #43

Closed
n8fr8 opened this issue Jun 14, 2011 · 3 comments
Assignees
Labels

Comments

@n8fr8
Copy link
Member

n8fr8 commented Jun 14, 2011

IllegalStateException in org.witness.sscphase1
Crash
Exception class java.lang.IllegalStateException
Source method Parcel.readException()
Show user messages

Mark as old
Platforms
OTHER
1 reports/week
1 reports
Stack traces
v1.0.2
Jun 10, 2011 11:20:04 PM
1 reports/week
1 reports
java.lang.IllegalStateException: Unable to create new file: dcim/Camera/1307762483988.jpg
at android.os.Parcel.readException(Parcel.java:1268)
at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:160)
at android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:114)
at android.content.ContentProviderProxy.insert(ContentProviderNative.java:408)
at android.content.ContentResolver.insert(ContentResolver.java:587)
at org.witness.sscphase1.CameraObscuraMainMenu.onClick(CameraObscuraMainMenu.java:53)
at android.view.View.performClick(View.java:2408)
at android.view.View$PerformClick.run(View.java:8818)
at android.os.Handler.handleCallback(Handler.java:587)
at android.os.Handler.dispatchMessage(Handler.java:92)
at android.os.Looper.loop(Looper.java:123)
at android.app.ActivityThread.main(ActivityThread.java:4627)
at java.lang.reflect.Method.invokeNative(Native Method)
at java.lang.reflect.Method.invoke(Method.java:521)
at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:868)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:626)
at dalvik.system.NativeStart.main(Native Method)
For applications that include obfuscated code, stack traces contain obfuscated symbol names. If the application was obfuscated using ProGuard, you can unobfuscate the stack trace using the "retrace" tool, included in the Android SDK Tools r8 and later. For more information, see the ProGuard document.

@ghost ghost assigned vanevery Jun 14, 2011
@vanevery
Copy link
Contributor

My guess on this one is that the user didn't have an SD card inserted. Maybe we should check that on launch of the app.

@ghost ghost assigned n8fr8 and harlo Aug 9, 2011
@n8fr8
Copy link
Member Author

n8fr8 commented Aug 9, 2011

there is no SD card or available external path of some sort, and we need to handle this case

@n8fr8
Copy link
Member Author

n8fr8 commented Aug 23, 2011

related to issue #57 and fixed by ef624e0

@n8fr8 n8fr8 closed this as completed Aug 23, 2011
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants