1 # iank: copied from /a/opt/bitcoin/contrib/init/bitcoind.service
2 # for sources as of 2024-04-22
4 # It is not recommended to modify this file in-place, because it will
5 # be overwritten during package upgrades. If you want to add further
6 # options or overwrite existing ones then use
7 # $ systemctl edit bitcoind.service
8 # See "man systemd.service" for details.
10 # Note that almost all daemon options could be specified in
11 # /etc/bitcoin/bitcoin.conf, but keep in mind those explicitly
12 # specified as arguments in ExecStart= will override those in the
16 Description=Bitcoin daemon
17 Documentation=https://github.com/bitcoin/bitcoin/blob/master/doc/init.md
19 # https://www.freedesktop.org/wiki/Software/systemd/NetworkTarget/
20 After=network-online.target
21 Wants=network-online.target
24 # iank: on a laptop, when it is doing its catchup, it tends to jump
25 # between 100% and 180% cpu and makes the fan spin annoyingly.
26 # 50% still had annoying fan spin. trying out 20%
28 ExecStart=/usr/bin/bitcoind -pid=/run/bitcoind/bitcoind.pid \
29 -conf=/etc/bitcoin/bitcoin.conf \
30 -datadir=/var/lib/bitcoind \
31 -startupnotify='systemd-notify --ready' \
32 -shutdownnotify='systemd-notify --stopping'
34 # Make sure the config directory is readable by the service user
35 PermissionsStartOnly=true
36 ExecStartPre=/bin/chgrp bitcoin /etc/bitcoin
43 PIDFile=/run/bitcoind/bitcoind.pid
46 TimeoutStartSec=infinity
49 # Directory creation and permissions
50 ####################################
52 # Run as bitcoin:bitcoin
57 RuntimeDirectory=bitcoind
58 RuntimeDirectoryMode=0710
61 ConfigurationDirectory=bitcoin
62 ConfigurationDirectoryMode=0710
65 StateDirectory=bitcoind
66 StateDirectoryMode=0710
71 # Provide a private /tmp and /var/tmp.
74 # Mount /usr, /boot/ and /etc read-only for the process.
77 # Deny access to /home, /root and /run/user
80 # Disallow the process and all of its children to gain
81 # new privileges through execve().
84 # Use a new /dev namespace only populated with API pseudo devices
85 # such as /dev/null, /dev/zero and /dev/random.
88 # Deny the creation of writable and executable memory mappings.
89 MemoryDenyWriteExecute=true
91 # Restrict ABIs to help ensure MemoryDenyWriteExecute is enforced
92 SystemCallArchitectures=native
95 WantedBy=multi-user.target