"Steve Wolfe" <nw(at)codon(dot)com> writes:
> Again, if there's any more information I can offer, let me know.
I think the next step is to dig into it with a debugger. Can you do
that, or offer access to your machine to someone who can?
The fact that it's reproducible once triggered should make it easier
to attack with a debugger...
regards, tom lane