restrictions on namespace creation and switching are made. If true, access to any kind of namespacing is
prohibited. Otherwise, a space-separated list of namespace type identifiers must be specified, consisting of
any combination of: <constant>cgroup</constant>, <constant>ipc</constant>, <constant>net</constant>,
- <constant>mnt</constant>, <constant>pid</constant>, <constant>user</constant> and <constant>uts</constant>. Any
- namespace type listed is made accessible to the unit's processes, access to namespace types not listed is
- prohibited (allow-listing). By prepending the list with a single tilde character (<literal>~</literal>) the
- effect may be inverted: only the listed namespace types will be made inaccessible, all unlisted ones are
- permitted (deny-listing). If the empty string is assigned, the default namespace restrictions are applied,
- which is equivalent to false. This option may appear more than once, in which case the namespace types are
- merged by <constant>OR</constant>, or by <constant>AND</constant> if the lines are prefixed with
- <literal>~</literal> (see examples below). Internally, this setting limits access to the
- <citerefentry><refentrytitle>unshare</refentrytitle><manvolnum>2</manvolnum></citerefentry>,
+ <constant>mnt</constant>, <constant>pid</constant>, <constant>user</constant>, <constant>uts</constant>, and
+ <constant>time</constant>. Any namespace type listed is made accessible to the unit's processes, access to
+ namespace types not listed is prohibited (allow-listing). By prepending the list with a single tilde
+ character (<literal>~</literal>) the effect may be inverted: only the listed namespace types will be made
+ inaccessible, all unlisted ones are permitted (deny-listing). If the empty string is assigned, the default
+ namespace restrictions are applied, which is equivalent to false. This option may appear more than once, in
+ which case the namespace types are merged by <constant>OR</constant>, or by <constant>AND</constant> if the
+ lines are prefixed with <literal>~</literal> (see examples below). Internally, this setting limits access to
+ the <citerefentry><refentrytitle>unshare</refentrytitle><manvolnum>2</manvolnum></citerefentry>,
<citerefentry><refentrytitle>clone</refentrytitle><manvolnum>2</manvolnum></citerefentry> and
<citerefentry><refentrytitle>setns</refentrytitle><manvolnum>2</manvolnum></citerefentry> system calls, taking
the specified flags parameters into account. Note that — if this option is used — in addition to restricting