diff --git a/man/system-only.xml b/man/system-only.xml
index c59e05cdd1..944be559f5 100644
--- a/man/system-only.xml
+++ b/man/system-only.xml
@@ -8,10 +8,10 @@
-This option is only available for system services and is not supported for services
-running in per-user instances of the service manager.
+ This option is only available for system services and is not supported for services
+ running in per-user instances of the service manager.
-These options are only available for system services and are not supported for services
-running in per-user instances of the service manager.
+ These options are only available for system services and are not supported for services
+ running in per-user instances of the service manager.
diff --git a/man/system-or-user-ns.xml b/man/system-or-user-ns.xml
index a36cee7889..b0f4247cac 100644
--- a/man/system-or-user-ns.xml
+++ b/man/system-or-user-ns.xml
@@ -8,14 +8,14 @@
-This option is only available for system services, or for services running in per-user
- instances of the service manager in which case PrivateUsers= is implicitly enabled
- (requires unprivileged user namespaces support to be enabled in the kernel via the
- kernel.unprivileged_userns_clone= sysctl).
+ This option is only available for system services, or for services running in per-user
+ instances of the service manager in which case PrivateUsers= is implicitly enabled
+ (requires unprivileged user namespaces support to be enabled in the kernel via the
+ kernel.unprivileged_userns_clone= sysctl).
-These options are only available for system services, or for services running in per-user
- instances of the service manager in which case PrivateUsers= is implicitly enabled
- (requires unprivileged user namespaces support to be enabled in the kernel via the
- kernel.unprivileged_userns_clone= sysctl).
+ These options are only available for system services, or for services running in per-user
+ instances of the service manager in which case PrivateUsers= is implicitly enabled
+ (requires unprivileged user namespaces support to be enabled in the kernel via the
+ kernel.unprivileged_userns_clone= sysctl).