To follow up on this: it looks like we would need to deploy our Android app with the 'debuggable' flag so that the crash handler sub-process can attach to it. But this is a major security concern for us, since it means that any Android process could attach as well.
Is there any way around this? How has Chrome/Chromium dealt with this? We're looking at PR_SET_PTRACER, which seems like it would solve the problem on Linux, but we're not clear if Android uses the same Yama security modules and if this technique would work.
thanks,
chris