to obtain information about existing privileges, for example:
 <programlisting>
 => \z mytable
-                  Access privileges for database "lusitania"
- Schema |  Name   | Type  |                 Access privileges                 
---------+---------+-------+---------------------------------------------------
- public | mytable | table | {miriam=arwdxt/miriam,=r/miriam,admin=arw/miriam}
+   Access privileges for database "lusitania"
+ Schema |  Name   | Type  |  Access privileges   
+--------+---------+-------+----------------------
+ public | mytable | table | miriam=arwdxt/miriam
+                          : =r/miriam
+                          : admin=arw/miriam
 (1 row)
 </programlisting>
     The entries shown by <command>\z</command> are interpreted thus:
 
                                          "SELECT n.nspname as \"%s\",\n"
                                          "  c.relname as \"%s\",\n"
                                          "  CASE c.relkind WHEN 'r' THEN '%s' WHEN 'v' THEN '%s' WHEN 'S' THEN '%s' END as \"%s\",\n"
-                                         "  c.relacl as \"%s\"\n"
+                                         "  pg_catalog.array_to_string(c.relacl, E'\\n') as \"%s\"\n"
                                          "FROM pg_catalog.pg_class c\n"
           "     LEFT JOIN pg_catalog.pg_namespace n ON n.oid = c.relnamespace\n"
                                          "WHERE c.relkind IN ('r', 'v', 'S')\n",
 
 GRANT ALL ON deptest1 TO regression_user2;
 RESET SESSION AUTHORIZATION;
 \z deptest1
-                                                          Access privileges for database "regression"
- Schema |   Name   | Type  |                                                         Access privileges                                                          
---------+----------+-------+------------------------------------------------------------------------------------------------------------------------------------
- public | deptest1 | table | {regression_user0=arwdxt/regression_user0,regression_user1=a*r*w*d*x*t*/regression_user0,regression_user2=arwdxt/regression_user1}
+                Access privileges for database "regression"
+ Schema |   Name   | Type  |               Access privileges                
+--------+----------+-------+------------------------------------------------
+ public | deptest1 | table | regression_user0=arwdxt/regression_user0
+                           : regression_user1=a*r*w*d*x*t*/regression_user0
+                           : regression_user2=arwdxt/regression_user1
 (1 row)
 
 DROP OWNED BY regression_user1;
 -- all grants revoked
 \z deptest1
-              Access privileges for database "regression"
- Schema |   Name   | Type  |             Access privileges              
---------+----------+-------+--------------------------------------------
- public | deptest1 | table | {regression_user0=arwdxt/regression_user0}
+             Access privileges for database "regression"
+ Schema |   Name   | Type  |            Access privileges             
+--------+----------+-------+------------------------------------------
+ public | deptest1 | table | regression_user0=arwdxt/regression_user0
 (1 row)
 
 -- table was dropped