@@ -53,15 +53,14 @@ def program_big_binary(self, actions, overflow=False):
53
53
# we need to read written flash and compare data manually
54
54
_ , fname2 = tempfile .mkstemp ()
55
55
os .truncate (fname1 , size - truncate_size )
56
- self .gdb .monitor_run ('flash read_bank 0 %s 0x%x %d' % (dbg .fixup_path (fname2 ), offset , size - truncate_size ), tmo = 120 )
56
+ self .gdb .monitor_run ('flash read_bank 0 %s 0x%x %d' % (dbg .fixup_path (fname2 ), offset , size - truncate_size ), tmo = 180 )
57
57
58
58
# restore flash contents with test app as it was overwritten by test
59
59
# what can lead to the failures when preparing for the next tests
60
60
self .gdb .target_program_bins (self .test_app_cfg .build_bins_dir ())
61
61
62
62
self .assertTrue (filecmp .cmp (fname1 , fname2 ))
63
63
64
- @skip_for_chip (['esp32p4' ], 'skipped - OCD-1097' )
65
64
def test_big_binary (self ):
66
65
"""
67
66
This test checks flashing big binaries works.
@@ -73,7 +72,6 @@ def test_big_binary(self):
73
72
"""
74
73
self .program_big_binary ('encrypt verify' if self .ENCRYPTED else 'verify' )
75
74
76
- @skip_for_chip (['esp32p4' ], 'skipped - OCD-1097' )
77
75
def test_big_binary_compressed (self ):
78
76
"""
79
77
This test checks flashing big compressed binaries works.
0 commit comments