dumpsys is a great tool if you’re interested in finding out more about the system services running on your Android device. For example, you can get data about the accounts on the device, network configurations, memory, sensors, etc.
First, use adb to list the devices and then start a shell:
adb devices
adb shell
Next, all we need to do is run dumpsys | grep -i "dump of service" | cut -d " " -f 4 | cut -d ":" -f 1
and we’ll have a list of all the services on the device.
DisplayOffloadService
DockObserver
HealthService
ModeManager
SurfaceFlinger
SurfaceFlingerAIDL
ThermalObserver
WearConnectivityService
WearPowerService
accessibility
account
activity
activity_task
adb
alarm
android.frameworks.location.altitude.IAltitudeService/default
android.frameworks.stats.IStats/default
android.hardware.bluetooth.audio.IBluetoothAudioProviderFactory/default
android.hardware.contexthub.IContextHub/default
android.hardware.gnss.IGnss/default
android.hardware.health.IHealth/default
android.hardware.nfc.INfc/default
android.hardware.power.IPower/default
android.hardware.power.stats.IPowerStats/default
android.hardware.security.keymint.IKeyMintDevice/default
android.hardware.security.keymint.IRemotelyProvisionedComponent/default
android.hardware.security.keymint.IRemotelyProvisionedComponent/strongbox
android.hardware.security.secureclock.ISecureClock/default
android.hardware.security.sharedsecret.ISharedSecret/default
android.hardware.security.sharedsecret.ISharedSecret/strongbox
android.hardware.vibrator.IVibrator/default
android.hardware.wifi.supplicant.ISupplicant/default
android.os.UpdateEngineStableService
android.se.omapi.ISecureElementService/default
android.security.apc
android.security.authorization
android.security.identity
android.security.legacykeystore
android.security.maintenance
android.security.metrics
android.security.remoteprovisioning
android.security.remoteprovisioning.IRemotelyProvisionedKeyPool
android.system.keystore2.IKeystoreService/default
android.system.suspend.ISystemSuspend/default
app_binding
app_hibernation
app_integrity
app_search
appops
attestation_verification
audio
auth
backup
battery
batteryproperties
batterystats
binder_calls_stats
biometric
blob_store
bluetooth_manager
bugreport
cacheinfo
clipboard
color_display
companiondevice
connectivity
connectivity_native
connmetrics
content
contexthub
country_detector
cpuinfo
crossprofileapps
dataloader_manager
dbinfo
device_config
device_identifiers
device_policy
device_state
deviceidle
devicestoragemonitor
diskstats
display
domain_verification
dreams
dropbox
dynamic_system
emergency_affordance
external_vibrator_service
file_integrity
font
game
gfxinfo
gpu
graphicsstats
gsiservice
hardware_properties
incidentcompanion
incremental
input
input_method
inputflinger
ipsec
jobscheduler
launcherapps
legacy_permission
lights
locale
location
lock_settings
logcat
looper_stats
media.aaudio
media.audio_flinger
media.audio_policy
media.extractor
media.metrics
media.player
media.resource_manager
media.resource_observer
media_communication
media_metrics
media_projection
media_router
media_session
meminfo
memtrack.proxy
midi
mount
nearby
netd_listener
netpolicy
netstats
network_management
network_score
network_stack
network_watchlist
nfc
notification
oem_lock
otadexopt
overlay
pac_proxy
package
package_native
people
performance_hint
permission
permission_checker
permissionmgr
persistent_data_block
pinner
platform_compat
platform_compat_native
power
powerstats
processinfo
procstats
reboot_readiness
recovery
resources
restrictions
role
rollback
runtime
safety_center
scheduling_policy
sdk_sandbox
sec_key_att_app_id_provider
secure_element
sensor_privacy
sensorservice
servicediscovery
settings
shortcut
soundtrigger
soundtrigger_middleware
speech_recognition
stats
statscompanion
statsmanager
statusbar
storaged
storaged_pri
storagestats
system_config
system_server_dumper
system_update
tare
telecom
telephony.registry
testharness
tethering
textclassification
textservices
texttospeech
thermalservice
time_detector
time_zone_detector
tracing.proxy
trust
uimode
updatelock
uri_grants
usagestats
usb
user
vcn_management
vendor.google_clockwork.healthservices.IHealthServices/default
vendor.nxp.nxpnfc_aidl.INxpNfc/default
vendor.qti.gnss.ILocAidlGnss/default
vibrator_manager
virtualdevice
voiceinteraction
vpn_management
wallpaper
wear_service
wifi
wifinl80211
wifiscanner
window
To find out more information about a specific service, all you need to do is type dumpsys <service_name>
. For example, let’s see how the output of dumpsys battery
looks like:
If you want to unlock the bootloader, then you have to do the following three steps:
- Select OEM unlock from the Developer Mode settings
- Execute
adb reboot bootloader
- Execute
fastboot oem unlock
as the phone reboots. If that command throws an error, like FAILED (remote: ‘unknown command’), executefastboot flashing unlock
.
Enjoy your unlocked bootloeader.