Team Win strives to provide a quality product. However, it is your decision to install our software on your device. Team Win takes no responsibility for any damage that may occur from installing or using TWRP.
Support Status: Current
Code Name: d2x
If you intend to root your (d2x) device, be advised that Magisk will be installed to the recovery partition, not the usual boot partition. Both TWRP and Magisk-rooted Android boot using the recovery kernel, with the device's hardware keys used to choose between TWRP and Android at boot time.
You are therefore strongly advised to first root your device with Magisk and then pre-root a TWRP image before flashing it to recovery. The usual path of installing TWRP prior to rooting is problematic on this device, because the Magisk installer does not support installation to recovery from TWRP. Furthermore, prior rooting of the device with Magisk carries the significant advantage of disabling various device protection mechanisms that you will otherwise need to take care of manually.
If you wish to install TWRP without rooting, there are numerous pitfalls to consider. For example, a stock device is protected by Android Verified Boot. This is implemented as a vbmeta partition that contains cryptographic digests for verifying the integrity of boot.img, recovery.img and other partitions/images. Flashing TWRP without first flashing a vbmeta image with verity disabled will render your device unable to boot.
Please bear all of the above in mind when considering the installation methods listed below, and refer to the device's TWRP support thread on XDA for detailed information about installation and the associated hazards. Details of the firmware version(s) with which the current TWRP image's kernel is compatible can be found in the TWRP changelog for this device.
Download the Official TWRP App (root required):
Install the app and open it. Agree to the Terms. Select TWRP Flash. Select your device from the device list (d2x) and choose a version. The file will download to your Downloads folder. Browse to and select the file. Tap on Flash to Recovery. Find out more about the app here.
Current and past versions of TWRP can be found at one of the mirrors below:
Download the latest TWRP image file (.img) from the download link and boot TWRP. Go to install and find and select the Images... button. Browse to the image that you downloaded and select it. Choose recovery and swipe to flash.
You will need to download and install Odin on your PC. Once you have Odin installed, download the proper .tar file for your device from the download link above. Power off your device. Turn on your device using the proper key combo to get into download mode and attach the device to your computer via a USB cable. Use the PDA tab or button to browse to and select the tar file that you downloaded and flash the device.
Note many devices will replace your custom recovery automatically during first boot. To prevent this, use Google to find the proper key combo to enter recovery. After typing fastboot reboot, hold the key combo and boot to TWRP. Once TWRP is booted, TWRP will patch the stock ROM to prevent the stock ROM from replacing TWRP. If you don't follow this step, you will have to repeat the install.
Download the latest image file (.img) from the download link above. Place it in the root of your /sdcard folder and rename it to twrp.img. Run the following commands via adb shell or a terminal emulator app:
dd if=/sdcard/twrp.img of=/dev/block/platform/13d60000.ufs/by-name/recovery
Merge "treewide: update for OneUI 3.0 - prebuilts from https://github.com/corsicanu/android_kernel_samsung_universal9820/releases/tag/20210108060811 - set PLATFORM_VERSION to 11" into android-9.0
treewide: update for OneUI 3.0 - prebuilts from https://github.com/corsicanu/android_kernel_samsung_universal9820/releases/tag/20210108060811 - set PLATFORM_VERSION to 11 Change-Id: I08d446bad83cca4cba96565332ad63a336157371
Merge "treewide: update for 12/20 - set PLATFORM_SECURITY_PATCH to 2020-12-01" into android-9.0
treewide: update for 12/20 - set PLATFORM_SECURITY_PATCH to 2020-12-01 Change-Id: I19c8e74a3b294fe483bdd4fa69ad9b9018002381
fstab: add 5G baseband Change-Id: I2f279a645b9c2f58251b0f2a245e984058f58c1f