I hadn't checked in a while, but there seem to be lots of mod_mbox
cores on ajax again. Here's one backtrace:
#0 mbox_cte_escape_html (p=0x6000000000343ca8,
s=0x60000000002f5a68
"------_=_NextPart_001_01C3C08D.F854E1E0\nContent-Type:
text/html;Content-Transfer-Encoding: quoted-printable\n\n<html
xmlns:o=3D\"urn:schemas-microsoft-com:office:office\"
=\nxmlns:w=3D\"urn:schemas-microsof"...,
len=18446744073709551614, body=0x60000000006f0f88) at mod_mbox_cte.c:82
#1 0x2000000001025620 in mbox_mime_get_body (p=0x6000000000343ca8,
m=0x60000000006f0f88) at mod_mbox_mime.c:331
#2 0x2000000001021520 in mbox_static_message (r=0x6000000000343d18,
f=0x60000000003590a8) at mod_mbox_out.c:1186
#3 0x200000000101cbc0 in mbox_file_handler (r=0x6000000000343d18)
at mod_mbox_file.c:241
#4 0x400000000004cff0 in ap_run_handler (r=0x6000000000343d18) at config.c:158