- 01 9月, 2022 6 次提交
-
-
-
由 rewu93 提交于
Some models such as LSTM are stateful, which requires state reset after each inference. This PR adds the model reset function, which has already been implemented in C++, into the TFLM python interpreter. BUG=http://b/244330968
-
由 Boyd Kane 提交于
This colab still had the old tensorflow/tensorflow github link for the tflite-micro examples. This PR fixes that link to the new (and working) tensorflow/tflite-micro github link. BUG=doc cleanup
-
由 David Davis 提交于
@tensorflow/micro Fix for project_generation TARGET_ARCH missing from cortex_m_generic makefile. This should resolve the current issue with the arduino-examples repo not syncing from the tflite-micro repo. bug=#1382
-
由 Advait Jain 提交于
BUG=244457206
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
- 31 8月, 2022 1 次提交
-
-
由 rewu93 提交于
BUG=http://b/242765271 # Train/save/convert LSTM model on MNIST dataset Using bazel: `bazel build tensorflow/lite/micro/examples/mnist_lstm:train` `bazel-bin/tensorflow/lite/micro/examples/mnist_lstm/train` ## Terminal arguments: * `--epoch` : number of epochs for model training, default 1 for fast trainning * `--save_dir`: the directory to save the trained model, default to `/tmp/trained_model`. * `--save_tf_model`: if specified, save the intermediate tensorflow model (debug usage) ## Example: `bazel build tensorflow/lite/micro/examples/mnist_lstm:train` `bazel-bin/tensorflow/lite/micro/examples/mnist_lstm/train --epoch=10 --save_dir=trained_model` Code above will train a simple LSTM model for MNIST digits recognition with 10 epochs. The trained model is converted to tflite flatbuffer format, and the .tflite file is saved to the trained_model folder in the source directory. Note the intermediate tensorflow model is not saved in this case (pass --save_tf_model=True to enable it).
-
- 30 8月, 2022 4 次提交
-
-
由 David Davis 提交于
@tensorflow/micro Fix TF model size reporting in train_hello_world_model.py script. Minor formatting fixes. bug=#1384
-
由 imcgraw 提交于
BUG=b/238904420
-
由 Steven Toribio 提交于
-
由 suleshahid 提交于
-
- 26 8月, 2022 3 次提交
-
-
由 suleshahid 提交于
This is to cleanup some code after the latest flatbuffer version update PR. * Update build targets in schema files to only have the original builds, :schema_fbs and :schema_py. * Fix checking in of schema in nightly sync. * Remove unneeded lines (of a deleted file) in copyright and license checks. Bugs: BUG= [243587789](https://buganizer.corp.google.com/issues/243587789) BUG= [243588297](https://buganizer.corp.google.com/issues/243588297) BUG= [243716132](https://buganizer.corp.google.com/issues/243716132)
-
由 Tom Bannink 提交于
This fixes two bugs in the recording micro allocator and one in the regular micro allocator, all related to models with multiple subgraphs. BUG=http://b/243820068
-
由 suleshahid 提交于
-
- 24 8月, 2022 1 次提交
-
-
由 jwithers 提交于
New issue creation and updating mechanism for action error trapping. On error creates a new issue with the tag ci:bot_issue if one doesn't exist. Places information about the script failing and run in the body. If an issue with the script name in the body and the ci:bot_issue tag exists and is open, will update with a comment about the current failure. Error trapping implemented for testing in generate_integration_tests.yml BUG=https://issuetracker.google.com/issues/229828377
-
- 23 8月, 2022 1 次提交
-
-
Use environment variables instead of secrets. The vars are not secret and from now on we can change it on the pipeline itself. FYI: @MatthiasHertel80 BUG=Virtual Hardware workflow cleanup
-
- 20 8月, 2022 1 次提交
-
-
由 Ryan Kuester 提交于
Add the forum as the first option, avoid linking to a specific upstream issue template, and copy-edit for consistency. BUG=improve docs.
-
- 19 8月, 2022 2 次提交
-
-
由 suleshahid 提交于
-
由 Annie Tallund 提交于
We need to differentiate between the compiler used in the two CI tests Cortex-M and Cortex-M on Arm Virtual Hardware, which is what this fix does. Cortex-M uses gcc and AVH is for armclang. Related to BUG=#1305
-
- 18 8月, 2022 3 次提交
-
-
由 TANMAY DAS 提交于
BUG=b/199442906
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
由 dependabot[bot] 提交于
Bumps [tensorflow](https://github.com/tensorflow/tensorflow) from 2.5.3 to 2.7.2. BUG=dependabot <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/releases">tensorflow's releases</a>.</em></p> <blockquote> <h2>TensorFlow 2.7.2</h2> <h1>Release 2.7.2</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>QuantizedConv2D</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29201">CVE-2022-29201</a>)</li> <li>Fixes an integer overflow in <code>SpaceToBatchND</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29203">CVE-2022-29203</a>)</li> <li>Fixes a segfault and OOB write due to incomplete validation in <code>EditDistance</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29208">CVE-2022-29208</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29204">CVE-2022-29204</a>)</li> <li>Fixes a denial of service in <code>tf.ragged.constant</code> due to lack of validation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29202">CVE-2022-29202</a>)</li> <li>Fixes a segfault when <code>tf.histogram_fixed_width</code> is called with NaN values (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29211">CVE-2022-29211</a>)</li> <li>Fixes a core dump when loading TFLite models with quantization (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29212">CVE-2022-29212</a>)</li> <li>Fixes crashes stemming from incomplete validation in signal ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29213">CVE-2022-29213</a>)</li> <li>Fixes a type confusion leading to <code>CHECK</code>-failure based denial of service (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29209">CVE-2022-29209</a>)</li> <li>Updates <code>curl</code> to <code>7.83.1</code> to handle (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-22576">CVE-2022-22576</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27774">CVE-2022-27774</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27775">CVE-2022-27775</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27776">CVE-2022-27776</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27778">CVE-2022-27778</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27779">CVE-2022-27779</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27780">CVE-2022-27780</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27781">CVE-2022-27781</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27782">CVE-2022-27782</a> and (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-30115">CVE-2022-30115</a></li> <li>Updates <code>zlib</code> to <code>1.2.12</code> after <code>1.2.11</code> was pulled due to <a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">security issue</a></li> </ul> <h2>TensorFlow 2.7.1</h2> <h1>Release 2.7.1</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a floating point division by 0 when executing convolution operators (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21725">CVE-2022-21725</a>)</li> <li>Fixes a heap OOB read in shape inference for <code>ReverseSequence</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21728">CVE-2022-21728</a>)</li> <li>Fixes a heap OOB access in <code>Dequantize</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21726">CVE-2022-21726</a>)</li> <li>Fixes an integer overflow in shape inference for <code>Dequantize</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21727">CVE-2022-21727</a>)</li> <li>Fixes a heap OOB access in <code>FractionalAvgPoolGrad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21730">CVE-2022-21730</a>)</li> <li>Fixes an overflow and divide by zero in <code>UnravelIndex</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21729">CVE-2022-21729</a>)</li> <li>Fixes a type confusion in shape inference for <code>ConcatV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21731">CVE-2022-21731</a>)</li> <li>Fixes an OOM in <code>ThreadPoolHandle</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21732">CVE-2022-21732</a>)</li> <li>Fixes an OOM due to integer overflow in <code>StringNGrams</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21733">CVE-2022-21733</a>)</li> <li>Fixes more issues caused by incomplete validation in boosted trees code (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41208">CVE-2021-41208</a>)</li> <li>Fixes an integer overflows in most sparse component-wise ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23567">CVE-2022-23567</a>)</li> <li>Fixes an integer overflows in <code>AddManySparseToTensorsMap</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23568">CVE-2022-23568</a>)</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/blob/master/RELEASE.md">tensorflow's changelog</a>.</em></p> <blockquote> <h1>Release 2.7.2</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>QuantizedConv2D</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29201">CVE-2022-29201</a>)</li> <li>Fixes an integer overflow in <code>SpaceToBatchND</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29203">CVE-2022-29203</a>)</li> <li>Fixes a segfault and OOB write due to incomplete validation in <code>EditDistance</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29208">CVE-2022-29208</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29204">CVE-2022-29204</a>)</li> <li>Fixes a denial of service in <code>tf.ragged.constant</code> due to lack of validation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29202">CVE-2022-29202</a>)</li> <li>Fixes a segfault when <code>tf.histogram_fixed_width</code> is called with NaN values (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29211">CVE-2022-29211</a>)</li> <li>Fixes a core dump when loading TFLite models with quantization (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29212">CVE-2022-29212</a>)</li> <li>Fixes crashes stemming from incomplete validation in signal ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29213">CVE-2022-29213</a>)</li> <li>Fixes a type confusion leading to <code>CHECK</code>-failure based denial of service (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29209">CVE-2022-29209</a>)</li> <li>Updates <code>curl</code> to <code>7.83.1</code> to handle (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-22576">CVE-2022-22576</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27774">CVE-2022-27774</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27775">CVE-2022-27775</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27776">CVE-2022-27776</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27778">CVE-2022-27778</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27779">CVE-2022-27779</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27780">CVE-2022-27780</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27781">CVE-2022-27781</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27782">CVE-2022-27782</a> and (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-30115">CVE-2022-30115</a></li> <li>Updates <code>zlib</code> to <code>1.2.12</code> after <code>1.2.11</code> was pulled due to <a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">security issue</a></li> </ul> <h1>Release 2.6.4</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/tensorflow/tensorflow/commit/dd7b8a3c1714d0052ce4b4a2fd8dcef927439a24"><code>dd7b8a3</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56034">#56034</a> from tensorflow-jenkins/relnotes-2.7.2-15779</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/1e7d6ea26dec19c8be5a67bdb4fa574a69f3da86"><code>1e7d6ea</code></a> Update RELEASE.md</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/50851350cbafeb82d8edc91cc9974b20db257bab"><code>5085135</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56069">#56069</a> from tensorflow/mm-cp-52488e5072f6fe44411d70c6af09e...</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/adafb45c7812dac1e84d4f23524106ba45d441c2"><code>adafb45</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56060">#56060</a> from yongtang:curl-7.83.1</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/01cb1b8bb061c40a7b7b0f632235439ac7ba981e"><code>01cb1b8</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56038">#56038</a> from tensorflow-jenkins/version-numbers-2.7.2-4733</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/8c90c2fa07e4376f032a425d863ef11ce357e3c5"><code>8c90c2f</code></a> Update version numbers to 2.7.2</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/43f3cdc95f4dc6ea9f6979cdb82005b79103f591"><code>43f3cdc</code></a> Update RELEASE.md</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/98b0a48e852364f17f5f3b4b6525d8c3efd0e73d"><code>98b0a48</code></a> Insert release notes place-fill</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/dfa5cf382323f0d3ffb4d96477d9d2fbd7d48abb"><code>dfa5cf3</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56028">#56028</a> from tensorflow/disable-tests-on-r2.7</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/501a65c3469bfeafb508c97db0654ad694460167"><code>501a65c</code></a> Disable timing out tests</li> <li>Additional commits viewable in <a href="https://github.com/tensorflow/tensorflow/compare/v2.5.3...v2.7.2">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=tensorflow&package-manager=pip&previous-version=2.5.3&new-version=2.7.2)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/tensorflow/tflite-micro/network/alerts). </details>
-
- 17 8月, 2022 3 次提交
-
-
由 imcgraw 提交于
BUG=http://b/238904420
-
由 Måns Nilsson 提交于
BUG=fixes https://github.com/tensorflow/tflite-micro/issues/1356
-
-
- 16 8月, 2022 2 次提交
-
-
由 Advait Jain 提交于
BUG=http://b/238904420 NO_CHECK_TFLITE_FILES=manual sync after updating file list.
-
由 Rajeshwar Reddy T 提交于
Remove label: stat:awaiting response for TFML repo , we will default to empty labels while we search for stale issues. BUG=cleanup
-
- 15 8月, 2022 1 次提交
-
-
由 Nat Jeffries 提交于
Hopefully takes something off the fixit list. I guess the GH test failure notifications did their job :) BUG=fixes https://github.com/tensorflow/tflite-micro/issues/1352
-
- 13 8月, 2022 12 次提交
-
-
由 cad-audio 提交于
Updated the xtensa download script to use the latest HiFi Neural Network Libraries. BUG=http://b/239852051
-
由 lukmanr-cadence 提交于
LUT based reference_integer_ops implementation for sigmoid and tanh are called instead of gemmlowp implementation. BUG= #1148
-
由 Måns Nilsson 提交于
DWT counters are not available for Arm Cortex-M0 CPU. BUG=Fixes https://github.com/tensorflow/tflite-micro/issues/1346
-
由 Måns Nilsson 提交于
BUG=Fixes https://github.com/tensorflow/tflite-micro/issues/1337
-
由 hmogensen-arm 提交于
BUG=updated gcc version.
-
由 felix-johnny 提交于
int8 input data type registration is split into its own function. The PR is a work towards RFC https://github.com/tensorflow/tflite-micro/blob/main/tensorflow/lite/micro/docs/rfc/002_16x8_quantization_port.md BUG=quantization specific registration for MUL to reduce library size
-
由 felix-johnny 提交于
int8 input data type registration is split into its own function. The PR is a work towards RFC https://github.com/tensorflow/tflite-micro/blob/main/tensorflow/lite/micro/docs/rfc/002_16x8_quantization_port.md BUG=quantization specific registration for SVDF to reduce library size Change-Id: I0a77d98cd3fa643b530386a6ca59e41fdf2b3ce9
-
* Replace AWS IAM User credentials with OIDC IAM Role. * Use avhclient v0.1.x instead pinned v.0.1.1 BUG=collaboration between TFLM and ARM.
-
由 felix-johnny 提交于
int8 input data type registration is split into its own function. The PR is a work towards RFC https://github.com/tensorflow/tflite-micro/blob/main/tensorflow/lite/micro/docs/rfc/002_16x8_quantization_port.md BUG=quantization specific registration for add to reduce library size
-
由 felix-johnny 提交于
Max and Average Pooling get quantization specific registration. The PR is a work towards RFC https://github.com/tensorflow/tflite-micro/blob/main/tensorflow/lite/micro/docs/rfc/002_16x8_quantization_port.md BUG=quantization specific registration for pooling to reduce library size
-
由 Måns Nilsson 提交于
Armclang need to use -ffp-mode=full because quantization unit test is using NaN and without this use of NaN is undefined behavior. Because of a compiler defect which only occurs with -ffp-mode=full a workaround is done in the lstm unit test. The workaround prevents implicit conversion from double to float. Since many of those conversions would be inexact, the compiler would not consider those conversions as constant expressions with -ffp-mode=full. BUG=https://github.com/tensorflow/tflite-micro/issues/1305
-
由 imcgraw 提交于
BUG=http://b/238904420
-