I hadn't checked in a while, but there seem to be lots of mod_mbox
cores on ajax again.  Here's one backtrace:

#0  mbox_cte_escape_html (p=0x6000000000343ca8,
    s=0x60000000002f5a68
"------_=_NextPart_001_01C3C08D.F854E1E0\nContent-Type:
text/html;Content-Transfer-Encoding: quoted-printable\n\n<html
xmlns:o=3D\"urn:schemas-microsoft-com:office:office\"
=\nxmlns:w=3D\"urn:schemas-microsof"...,
    len=18446744073709551614, body=0x60000000006f0f88) at mod_mbox_cte.c:82
#1  0x2000000001025620 in mbox_mime_get_body (p=0x6000000000343ca8,
    m=0x60000000006f0f88) at mod_mbox_mime.c:331
#2  0x2000000001021520 in mbox_static_message (r=0x6000000000343d18,
    f=0x60000000003590a8) at mod_mbox_out.c:1186
#3  0x200000000101cbc0 in mbox_file_handler (r=0x6000000000343d18)
    at mod_mbox_file.c:241
#4  0x400000000004cff0 in ap_run_handler (r=0x6000000000343d18) at config.c:158

Reply via email to