diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml
index d6e5d646ee4..207de9b1259 100644
--- a/doc/src/sgml/ddl.sgml
+++ b/doc/src/sgml/ddl.sgml
@@ -1735,7 +1735,7 @@ CREATE TABLE public.products ( ... );
- search_path
+ search_path configuration parameter
diff --git a/doc/src/sgml/func.sgml b/doc/src/sgml/func.sgml
index c8a2a149fa8..e184d99626e 100644
--- a/doc/src/sgml/func.sgml
+++ b/doc/src/sgml/func.sgml
@@ -13507,6 +13507,11 @@ SELECT relname FROM pg_class WHERE pg_table_is_visible(oid);
+
+ search path
+ object visibility
+
+
Schema Visibility Inquiry Functions
diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml
index fee6f53ba24..4ac5bdaf65f 100644
--- a/doc/src/sgml/ref/create_function.sgml
+++ b/doc/src/sgml/ref/create_function.sgml
@@ -673,6 +673,11 @@ SELECT * FROM dup(42);
Writing SECURITY DEFINER Functions Safely
+
+ search_path configuration parameter>
+ use in securing functions>
+
+
Because a SECURITY DEFINER function is executed
with the privileges of the user that created it, care is needed to