- 19 8月, 2022 1 次提交
-
-
由 Annie Tallund 提交于
We need to differentiate between the compiler used in the two CI tests Cortex-M and Cortex-M on Arm Virtual Hardware, which is what this fix does. Cortex-M uses gcc and AVH is for armclang. Related to BUG=#1305
-
- 18 8月, 2022 3 次提交
-
-
由 TANMAY DAS 提交于
BUG=b/199442906
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
由 dependabot[bot] 提交于
Bumps [tensorflow](https://github.com/tensorflow/tensorflow) from 2.5.3 to 2.7.2. BUG=dependabot <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/releases">tensorflow's releases</a>.</em></p> <blockquote> <h2>TensorFlow 2.7.2</h2> <h1>Release 2.7.2</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>QuantizedConv2D</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29201">CVE-2022-29201</a>)</li> <li>Fixes an integer overflow in <code>SpaceToBatchND</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29203">CVE-2022-29203</a>)</li> <li>Fixes a segfault and OOB write due to incomplete validation in <code>EditDistance</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29208">CVE-2022-29208</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29204">CVE-2022-29204</a>)</li> <li>Fixes a denial of service in <code>tf.ragged.constant</code> due to lack of validation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29202">CVE-2022-29202</a>)</li> <li>Fixes a segfault when <code>tf.histogram_fixed_width</code> is called with NaN values (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29211">CVE-2022-29211</a>)</li> <li>Fixes a core dump when loading TFLite models with quantization (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29212">CVE-2022-29212</a>)</li> <li>Fixes crashes stemming from incomplete validation in signal ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29213">CVE-2022-29213</a>)</li> <li>Fixes a type confusion leading to <code>CHECK</code>-failure based denial of service (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29209">CVE-2022-29209</a>)</li> <li>Updates <code>curl</code> to <code>7.83.1</code> to handle (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-22576">CVE-2022-22576</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27774">CVE-2022-27774</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27775">CVE-2022-27775</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27776">CVE-2022-27776</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27778">CVE-2022-27778</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27779">CVE-2022-27779</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27780">CVE-2022-27780</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27781">CVE-2022-27781</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27782">CVE-2022-27782</a> and (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-30115">CVE-2022-30115</a></li> <li>Updates <code>zlib</code> to <code>1.2.12</code> after <code>1.2.11</code> was pulled due to <a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">security issue</a></li> </ul> <h2>TensorFlow 2.7.1</h2> <h1>Release 2.7.1</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a floating point division by 0 when executing convolution operators (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21725">CVE-2022-21725</a>)</li> <li>Fixes a heap OOB read in shape inference for <code>ReverseSequence</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21728">CVE-2022-21728</a>)</li> <li>Fixes a heap OOB access in <code>Dequantize</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21726">CVE-2022-21726</a>)</li> <li>Fixes an integer overflow in shape inference for <code>Dequantize</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21727">CVE-2022-21727</a>)</li> <li>Fixes a heap OOB access in <code>FractionalAvgPoolGrad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21730">CVE-2022-21730</a>)</li> <li>Fixes an overflow and divide by zero in <code>UnravelIndex</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21729">CVE-2022-21729</a>)</li> <li>Fixes a type confusion in shape inference for <code>ConcatV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21731">CVE-2022-21731</a>)</li> <li>Fixes an OOM in <code>ThreadPoolHandle</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21732">CVE-2022-21732</a>)</li> <li>Fixes an OOM due to integer overflow in <code>StringNGrams</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21733">CVE-2022-21733</a>)</li> <li>Fixes more issues caused by incomplete validation in boosted trees code (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41208">CVE-2021-41208</a>)</li> <li>Fixes an integer overflows in most sparse component-wise ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23567">CVE-2022-23567</a>)</li> <li>Fixes an integer overflows in <code>AddManySparseToTensorsMap</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23568">CVE-2022-23568</a>)</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/blob/master/RELEASE.md">tensorflow's changelog</a>.</em></p> <blockquote> <h1>Release 2.7.2</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>QuantizedConv2D</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29201">CVE-2022-29201</a>)</li> <li>Fixes an integer overflow in <code>SpaceToBatchND</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29203">CVE-2022-29203</a>)</li> <li>Fixes a segfault and OOB write due to incomplete validation in <code>EditDistance</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29208">CVE-2022-29208</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29204">CVE-2022-29204</a>)</li> <li>Fixes a denial of service in <code>tf.ragged.constant</code> due to lack of validation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29202">CVE-2022-29202</a>)</li> <li>Fixes a segfault when <code>tf.histogram_fixed_width</code> is called with NaN values (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29211">CVE-2022-29211</a>)</li> <li>Fixes a core dump when loading TFLite models with quantization (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29212">CVE-2022-29212</a>)</li> <li>Fixes crashes stemming from incomplete validation in signal ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29213">CVE-2022-29213</a>)</li> <li>Fixes a type confusion leading to <code>CHECK</code>-failure based denial of service (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29209">CVE-2022-29209</a>)</li> <li>Updates <code>curl</code> to <code>7.83.1</code> to handle (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-22576">CVE-2022-22576</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27774">CVE-2022-27774</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27775">CVE-2022-27775</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27776">CVE-2022-27776</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27778">CVE-2022-27778</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27779">CVE-2022-27779</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27780">CVE-2022-27780</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27781">CVE-2022-27781</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27782">CVE-2022-27782</a> and (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-30115">CVE-2022-30115</a></li> <li>Updates <code>zlib</code> to <code>1.2.12</code> after <code>1.2.11</code> was pulled due to <a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">security issue</a></li> </ul> <h1>Release 2.6.4</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/tensorflow/tensorflow/commit/dd7b8a3c1714d0052ce4b4a2fd8dcef927439a24"><code>dd7b8a3</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56034">#56034</a> from tensorflow-jenkins/relnotes-2.7.2-15779</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/1e7d6ea26dec19c8be5a67bdb4fa574a69f3da86"><code>1e7d6ea</code></a> Update RELEASE.md</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/50851350cbafeb82d8edc91cc9974b20db257bab"><code>5085135</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56069">#56069</a> from tensorflow/mm-cp-52488e5072f6fe44411d70c6af09e...</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/adafb45c7812dac1e84d4f23524106ba45d441c2"><code>adafb45</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56060">#56060</a> from yongtang:curl-7.83.1</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/01cb1b8bb061c40a7b7b0f632235439ac7ba981e"><code>01cb1b8</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56038">#56038</a> from tensorflow-jenkins/version-numbers-2.7.2-4733</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/8c90c2fa07e4376f032a425d863ef11ce357e3c5"><code>8c90c2f</code></a> Update version numbers to 2.7.2</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/43f3cdc95f4dc6ea9f6979cdb82005b79103f591"><code>43f3cdc</code></a> Update RELEASE.md</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/98b0a48e852364f17f5f3b4b6525d8c3efd0e73d"><code>98b0a48</code></a> Insert release notes place-fill</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/dfa5cf382323f0d3ffb4d96477d9d2fbd7d48abb"><code>dfa5cf3</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56028">#56028</a> from tensorflow/disable-tests-on-r2.7</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/501a65c3469bfeafb508c97db0654ad694460167"><code>501a65c</code></a> Disable timing out tests</li> <li>Additional commits viewable in <a href="https://github.com/tensorflow/tensorflow/compare/v2.5.3...v2.7.2">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=tensorflow&package-manager=pip&previous-version=2.5.3&new-version=2.7.2)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/tensorflow/tflite-micro/network/alerts). </details>
-
- 17 8月, 2022 3 次提交
-
-
由 imcgraw 提交于
BUG=http://b/238904420
-
由 Måns Nilsson 提交于
BUG=fixes https://github.com/tensorflow/tflite-micro/issues/1356
-
-
- 16 8月, 2022 2 次提交
-
-
由 Advait Jain 提交于
BUG=http://b/238904420 NO_CHECK_TFLITE_FILES=manual sync after updating file list.
-
由 Rajeshwar Reddy T 提交于
Remove label: stat:awaiting response for TFML repo , we will default to empty labels while we search for stale issues. BUG=cleanup
-
- 15 8月, 2022 1 次提交
-
-
由 Nat Jeffries 提交于
Hopefully takes something off the fixit list. I guess the GH test failure notifications did their job :) BUG=fixes https://github.com/tensorflow/tflite-micro/issues/1352
-
- 13 8月, 2022 13 次提交
-
-
由 cad-audio 提交于
Updated the xtensa download script to use the latest HiFi Neural Network Libraries. BUG=http://b/239852051
-
由 lukmanr-cadence 提交于
LUT based reference_integer_ops implementation for sigmoid and tanh are called instead of gemmlowp implementation. BUG= #1148
-
由 Måns Nilsson 提交于
DWT counters are not available for Arm Cortex-M0 CPU. BUG=Fixes https://github.com/tensorflow/tflite-micro/issues/1346
-
由 Måns Nilsson 提交于
BUG=Fixes https://github.com/tensorflow/tflite-micro/issues/1337
-
由 hmogensen-arm 提交于
BUG=updated gcc version.
-
由 felix-johnny 提交于
int8 input data type registration is split into its own function. The PR is a work towards RFC https://github.com/tensorflow/tflite-micro/blob/main/tensorflow/lite/micro/docs/rfc/002_16x8_quantization_port.md BUG=quantization specific registration for MUL to reduce library size
-
由 felix-johnny 提交于
int8 input data type registration is split into its own function. The PR is a work towards RFC https://github.com/tensorflow/tflite-micro/blob/main/tensorflow/lite/micro/docs/rfc/002_16x8_quantization_port.md BUG=quantization specific registration for SVDF to reduce library size Change-Id: I0a77d98cd3fa643b530386a6ca59e41fdf2b3ce9
-
* Replace AWS IAM User credentials with OIDC IAM Role. * Use avhclient v0.1.x instead pinned v.0.1.1 BUG=collaboration between TFLM and ARM.
-
由 felix-johnny 提交于
int8 input data type registration is split into its own function. The PR is a work towards RFC https://github.com/tensorflow/tflite-micro/blob/main/tensorflow/lite/micro/docs/rfc/002_16x8_quantization_port.md BUG=quantization specific registration for add to reduce library size
-
由 felix-johnny 提交于
Max and Average Pooling get quantization specific registration. The PR is a work towards RFC https://github.com/tensorflow/tflite-micro/blob/main/tensorflow/lite/micro/docs/rfc/002_16x8_quantization_port.md BUG=quantization specific registration for pooling to reduce library size
-
由 Måns Nilsson 提交于
Armclang need to use -ffp-mode=full because quantization unit test is using NaN and without this use of NaN is undefined behavior. Because of a compiler defect which only occurs with -ffp-mode=full a workaround is done in the lstm unit test. The workaround prevents implicit conversion from double to float. Since many of those conversions would be inexact, the compiler would not consider those conversions as constant expressions with -ffp-mode=full. BUG=https://github.com/tensorflow/tflite-micro/issues/1305
-
由 imcgraw 提交于
BUG=http://b/238904420
-
由 imcgraw 提交于
BUG=http://b/238904420
-
- 11 8月, 2022 3 次提交
-
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
-
由 Rajeshwar Reddy T 提交于
Adding stale.yml file for nagging bot. BUG=improving github process.
-
- 10 8月, 2022 1 次提交
-
-
由 imcgraw 提交于
Conformers may use the SUM op with 5-dimensional axis. BUG=#1331
-
- 09 8月, 2022 2 次提交
-
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
由 jwithers 提交于
Modifying the commit message template to use body_raw instead of the body attribute. This might repair the commit messages having only the PR title and not the description if the description is being mangled by the html/markdown filtering of the body attribute. BUG=issuetracker.google.com/issues/241138579
-
- 06 8月, 2022 4 次提交
-
-
由 TANMAY DAS 提交于
BUG=240626703
-
由 Mikael Johansson 提交于
Add support for the SQUARED_DIFFERENCE op in the ops resolvers BUG=b/238912370
-
由 suleshahid 提交于
-
由 suleshahid 提交于
Changed all instances of data.uint8 to use GetTensorData<int8_t>, since all tensors are int8 quantized. BUG=[b/207417110](https://buganizer.corp.google.com/issues/207417110)
-
- 04 8月, 2022 4 次提交
-
-
由 Steven Toribio 提交于
Co-authored-by: Nmergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
-
由 Steven Toribio 提交于
-
由 jwithers 提交于
Co-authored-by: NAdvait Jain <advaitjain@users.noreply.github.com>
-
由 Steven Toribio 提交于
-
- 03 8月, 2022 3 次提交
-
-
由 TFLM-bot 提交于
Co-authored-by: Nmergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
-
由 Pauline Sho 提交于
* Support custom ops on TFLM Python interpreter BUG=b/236154921 * code style
-
由 Steven Toribio 提交于
* quick code style change to comments for previous commit * more code style presubmit issues
-