On Wed, Feb 25, 2015 at 7:52 AM, Hick Gunter <hick at scigames.at> wrote:

> And the "explain" output will contain virtual table opcodes
>

I use this technique to discover which tables and virtual tables a view
accesses (instead of trying to parse the query.)

I execute "explain select rowid from $viewname", and look for TableLock and
VOpen "opcode"s, and look at the "p4" column for table names and for
virtual tables, p4 contains vtab:module-hex-address:vtable-hex-address,
where module-hex-address is your sqlite3_module* in hexadecimal, and
vtable-address your sqlite3_vtab*, which typically you code can translate
to the vtable names. --DD

Reply via email to