Or in other words: when enabled the service will run as PID 1 in its own process namespace.
Up to this point we avoided exposing PID namespacing as part of service namespacing, following the thinking that service management should make stuff invisible and inaccessible, but not open "a new world", but unlike the other namespacing types PID namespacing is really about opening "a new world", with its own PID 1 and so on.
Or in even other words: we thought that PID namespacing is a concept…
…appropriate for systemd-nspawn with its goal of running a full init system inside a container environment, but inappropriate for system services, that should be integrated into the host even if they run at a lower security level, with sandboxing applied.
So, what changed? We realized over time that the logic systemd-nspawn implements is to a large degree the same as the one service management implements, and we basically have two implementations of some non-trivial code in place.
Moreover, …