403Webshell
Server IP : 103.119.228.120  /  Your IP : 18.119.120.59
Web Server : Apache
System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64
User : nobody ( 99)
PHP Version : 5.6.40
Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime
MySQL : ON |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /usr/local/ssl/local/ssl/local/ssl/share/doc/postgresql-9.2.24/html/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /usr/local/ssl/local/ssl/local/ssl/share/doc/postgresql-9.2.24/html/pageinspect.html
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML
><HEAD
><TITLE
>pageinspect</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.79"><LINK
REV="MADE"
HREF="mailto:pgsql-docs@postgresql.org"><LINK
REL="HOME"
TITLE="PostgreSQL 9.2.24 Documentation"
HREF="index.html"><LINK
REL="UP"
TITLE="Additional Supplied Modules"
HREF="contrib.html"><LINK
REL="PREVIOUS"
TITLE="ltree"
HREF="ltree.html"><LINK
REL="NEXT"
TITLE="passwordcheck"
HREF="passwordcheck.html"><LINK
REL="STYLESHEET"
TYPE="text/css"
HREF="stylesheet.css"><META
HTTP-EQUIV="Content-Type"
CONTENT="text/html; charset=ISO-8859-1"><META
NAME="creation"
CONTENT="2017-11-06T22:43:11"></HEAD
><BODY
CLASS="SECT1"
><DIV
CLASS="NAVHEADER"
><TABLE
SUMMARY="Header navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TH
COLSPAN="5"
ALIGN="center"
VALIGN="bottom"
><A
HREF="index.html"
>PostgreSQL 9.2.24 Documentation</A
></TH
></TR
><TR
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="top"
><A
TITLE="ltree"
HREF="ltree.html"
ACCESSKEY="P"
>Prev</A
></TD
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="top"
><A
HREF="contrib.html"
ACCESSKEY="U"
>Up</A
></TD
><TD
WIDTH="60%"
ALIGN="center"
VALIGN="bottom"
>Appendix F. Additional Supplied Modules</TD
><TD
WIDTH="20%"
ALIGN="right"
VALIGN="top"
><A
TITLE="passwordcheck"
HREF="passwordcheck.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
></TABLE
><HR
ALIGN="LEFT"
WIDTH="100%"></DIV
><DIV
CLASS="SECT1"
><H1
CLASS="SECT1"
><A
NAME="PAGEINSPECT"
>F.22. pageinspect</A
></H1
><P
>  The <TT
CLASS="FILENAME"
>pageinspect</TT
> module provides functions that allow you to
  inspect the contents of database pages at a low level, which is useful for
  debugging purposes.  All of these functions may be used only by superusers.
 </P
><DIV
CLASS="SECT2"
><H2
CLASS="SECT2"
><A
NAME="AEN149969"
>F.22.1. Functions</A
></H2
><P
></P
><DIV
CLASS="VARIABLELIST"
><DL
><DT
><CODE
CLASS="FUNCTION"
>get_raw_page(relname text, fork text, blkno int) returns bytea</CODE
></DT
><DD
><P
>      <CODE
CLASS="FUNCTION"
>get_raw_page</CODE
> reads the specified block of the named
      relation and returns a copy as a <TT
CLASS="TYPE"
>bytea</TT
> value.  This allows a
      single time-consistent copy of the block to be obtained.
      <TT
CLASS="REPLACEABLE"
><I
>fork</I
></TT
> should be <TT
CLASS="LITERAL"
>'main'</TT
> for
      the main data fork, <TT
CLASS="LITERAL"
>'fsm'</TT
> for the free space map,
      <TT
CLASS="LITERAL"
>'vm'</TT
> for the visibility map, or <TT
CLASS="LITERAL"
>'init'</TT
>
      for the initialization fork.
     </P
></DD
><DT
><CODE
CLASS="FUNCTION"
>get_raw_page(relname text, blkno int) returns bytea</CODE
></DT
><DD
><P
>      A shorthand version of <CODE
CLASS="FUNCTION"
>get_raw_page</CODE
>, for reading
      from the main fork.  Equivalent to
      <TT
CLASS="LITERAL"
>get_raw_page(relname, 'main', blkno)</TT
>
     </P
></DD
><DT
><CODE
CLASS="FUNCTION"
>page_header(page bytea) returns record</CODE
></DT
><DD
><P
>      <CODE
CLASS="FUNCTION"
>page_header</CODE
> shows fields that are common to all
      <SPAN
CLASS="PRODUCTNAME"
>PostgreSQL</SPAN
> heap and index pages.
     </P
><P
>      A page image obtained with <CODE
CLASS="FUNCTION"
>get_raw_page</CODE
> should be
      passed as argument.  For example:
</P><PRE
CLASS="SCREEN"
>test=# SELECT * FROM page_header(get_raw_page('pg_class', 0));
    lsn    | tli | flags | lower | upper | special | pagesize | version | prune_xid
-----------+-----+-------+-------+-------+---------+----------+---------+-----------
 0/24A1B50 |   1 |     1 |   232 |   368 |    8192 |     8192 |       4 |         0</PRE
><P>
      The returned columns correspond to the fields in the
      <TT
CLASS="STRUCTNAME"
>PageHeaderData</TT
> struct.
      See <TT
CLASS="FILENAME"
>src/include/storage/bufpage.h</TT
> for details.
    </P
></DD
><DT
><CODE
CLASS="FUNCTION"
>heap_page_items(page bytea) returns setof record</CODE
></DT
><DD
><P
>      <CODE
CLASS="FUNCTION"
>heap_page_items</CODE
> shows all line pointers on a heap
      page.  For those line pointers that are in use, tuple headers are also
      shown. All tuples are shown, whether or not the tuples were visible to
      an MVCC snapshot at the time the raw page was copied.
     </P
><P
>      A heap page image obtained with <CODE
CLASS="FUNCTION"
>get_raw_page</CODE
> should
      be passed as argument.  For example:
</P><PRE
CLASS="SCREEN"
>test=# SELECT * FROM heap_page_items(get_raw_page('pg_class', 0));</PRE
><P>
      See <TT
CLASS="FILENAME"
>src/include/storage/itemid.h</TT
> and
      <TT
CLASS="FILENAME"
>src/include/access/htup.h</TT
> for explanations of the fields
      returned.
     </P
></DD
><DT
><CODE
CLASS="FUNCTION"
>bt_metap(relname text) returns record</CODE
></DT
><DD
><P
>      <CODE
CLASS="FUNCTION"
>bt_metap</CODE
> returns information about a B-tree
      index's metapage.  For example:
</P><PRE
CLASS="SCREEN"
>test=# SELECT * FROM bt_metap('pg_cast_oid_index');
-[ RECORD 1 ]-----
magic     | 340322
version   | 2
root      | 1
level     | 0
fastroot  | 1
fastlevel | 0</PRE
><P>
     </P
></DD
><DT
><CODE
CLASS="FUNCTION"
>bt_page_stats(relname text, blkno int) returns record</CODE
></DT
><DD
><P
>      <CODE
CLASS="FUNCTION"
>bt_page_stats</CODE
> returns summary information about
      single pages of B-tree indexes.  For example:
</P><PRE
CLASS="SCREEN"
>test=# SELECT * FROM bt_page_stats('pg_cast_oid_index', 1);
-[ RECORD 1 ]-+-----
blkno         | 1
type          | l
live_items    | 256
dead_items    | 0
avg_item_size | 12
page_size     | 8192
free_size     | 4056
btpo_prev     | 0
btpo_next     | 0
btpo          | 0
btpo_flags    | 3</PRE
><P>
     </P
></DD
><DT
><CODE
CLASS="FUNCTION"
>bt_page_items(relname text, blkno int) returns setof record</CODE
></DT
><DD
><P
>      <CODE
CLASS="FUNCTION"
>bt_page_items</CODE
> returns detailed information about
      all of the items on a B-tree index page.  For example:
</P><PRE
CLASS="SCREEN"
>test=# SELECT * FROM bt_page_items('pg_cast_oid_index', 1);
 itemoffset |  ctid   | itemlen | nulls | vars |    data
------------+---------+---------+-------+------+-------------
          1 | (0,1)   |      12 | f     | f    | 23 27 00 00
          2 | (0,2)   |      12 | f     | f    | 24 27 00 00
          3 | (0,3)   |      12 | f     | f    | 25 27 00 00
          4 | (0,4)   |      12 | f     | f    | 26 27 00 00
          5 | (0,5)   |      12 | f     | f    | 27 27 00 00
          6 | (0,6)   |      12 | f     | f    | 28 27 00 00
          7 | (0,7)   |      12 | f     | f    | 29 27 00 00
          8 | (0,8)   |      12 | f     | f    | 2a 27 00 00</PRE
><P>
     </P
></DD
><DT
><CODE
CLASS="FUNCTION"
>fsm_page_contents(page bytea) returns text</CODE
></DT
><DD
><P
>      <CODE
CLASS="FUNCTION"
>fsm_page_contents</CODE
> shows the internal node structure
      of a FSM page. The output is a multiline string, with one line per
      node in the binary tree within the page. Only those nodes that are not
      zero are printed. The so-called "next" pointer, which points to the
      next slot to be returned from the page, is also printed.
     </P
><P
>      See <TT
CLASS="FILENAME"
>src/backend/storage/freespace/README</TT
> for more
      information on the structure of an FSM page.
     </P
></DD
></DL
></DIV
></DIV
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
SUMMARY="Footer navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
><A
HREF="ltree.html"
ACCESSKEY="P"
>Prev</A
></TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="index.html"
ACCESSKEY="H"
>Home</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="passwordcheck.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>ltree</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="contrib.html"
ACCESSKEY="U"
>Up</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>passwordcheck</TD
></TR
></TABLE
></DIV
></BODY
></HTML
>

Youez - 2016 - github.com/yon3zu
LinuXploit