"Steve Wolfe" <nw@codon.com> writes:
> Again, if there's any more information I can offer, let me know.
I think the next step is to dig into it with a debugger. Can you do
that, or offer access to your machine to someone who can?
The fact that it's reproducible once triggered should make it easier
to attack with a debugger...
regards, tom lane