Awesome
ExecEval
A distributed, extensible, secure solution for evaluating machine generated code with unit tests in multiple programming languages.
This repository is a part of our ongoing effort to build large scale execution based evaluation benchmark published as xCodeEval: A Large Scale Multilingual Multitask Benchmark for Code Understanding, Generation, Translation and Retrieval. If you are using this tool, plesae consider citing the paper.
@misc{khan2023xcodeeval,
title={xCodeEval: A Large Scale Multilingual Multitask Benchmark for Code Understanding, Generation, Translation and Retrieval},
author={Mohammad Abdullah Matin Khan and M Saiful Bari and Xuan Long Do and Weishi Wang and Md Rizwan Parvez and Shafiq Joty},
year={2023},
eprint={2303.03004},
archivePrefix={arXiv},
primaryClass={cs.CL}
}
Part of this work was submitted as a requirement for the Master of Science degree in Computer Science and Applications at the Islamic University of Technology by Muhammad Abdullah Matin Khan. (The thesis or project report will be added upon publication).
@misc{khan2024xcodeeval,
title={Development of a Code Search Engine Using Natural Language Processing Techniques},
author={Mohammad Abdullah Matin Khan},
year={2024},
publication={Journal of Engineering and Technology (JET)}
url=TBA
}
Dependencies:
Steps (Assuming dependencies satisfied):
- Clone this ExecEval repository.
cd ExecEval
docker build . -t exec-eval:1.0
docker run -it -p x:y -e NUM_WORKERS=67 exec-eval:1.0
. This will expose porty
(default5000
) ashttp://localhost:y
on the local machine whereas portx
is used within the docker container which can be set by environment variableGUNICORN_PORT
. TheNUM_WORKERS
is an environment variable representing the number of parallel execution engine workers. It is recommended to not use all cpus, as if cpu goes into 100% load it might affect execution speed of the codes uncontrollably, and keeping some cpus free for evaluation script. A valid example assuming less cpus available:docker run -it -p 5000:5000 -e NUM_WORKERS=5 exec-eval:1.0
Expected outcome:
A http server should be running on $PORT=y
(default 5000
) which can parallely execute codes and return their output.
Some helpful definitions:
Definition of ExtendedUnittest:
# dataclass
class ExtendedUnittest:
input: str
output: list[str] = field(default_factory=list)
result: str | None = None
exec_outcome: ExecOutcome | None = None
Definition of ExecOutcome:
class ExecOutcome(Enum):
PASSED = "PASSED" # code executes and output matches expected output
WRONG_ANSWER = "WRONG_ANSWER" # code executes and output does NOT matches expected output
TIME_LIMIT_EXCEEDED = "TIME_LIMIT_EXCEEDED" # code executes and didn't exit in time, output is ignored in this case
RUNTIME_ERROR = "RUNTIME_ERROR" # code failed to execute (crashed)
COMPILATION_ERROR = "COMPILATION_ERROR" # code failed to compile
MEMORY_LIMIT_EXCEEDED = "MEMORY_LIMIT_EXCEEDED" # code exceeded memory limit during execution
Definition of ResourceLimits:
For detailed description of each attributes go to man page of getrlimit.
class ResourceLimits:
core: int = 0 # RLIMIT_CORE
data: int = -1 # RLIMIT_DATA
# nice: int = 20 # RLIMIT_NICE
fsize: int = 0 # RLIMIT_FSIZE
sigpending: int = 0 # RLIMIT_SIGPENDING
# memlock: int = -1 # RLIMIT_MEMLOCK
rss: int = -1 # RLIMIT_RSS
nofile: int = 4 # RLIMIT_NOFILE
msgqueue: int = 0 # RLIMIT_MSGQUEUE
rtprio: int = 0 # RLIMIT_RTPRIO
stack: int = -1 # RLIMIT_STACK
cpu: int = 2 # RLIMIT_CPU, CPU time, in seconds.
nproc: int = 1 # RLIMIT_NPROC
_as: int = 2 * 1024 ** 3 # RLIMIT_AS set to 2GB by default
locks: int = 0 # RLIMIT_LOCKS
# rttime: int = 2 # RLIMIT_RTTIME, Timeout for real-time tasks.
API endpoints:
API to execute code:
- End point: /api/execute_code
- Method: POST
- Content-type: application/json
- Post request json format:
# json of dict of this dataclass
class JobData:
language: str # language of the code to be executed, usually found in sample["lang"] field
source_code: str #source_code, usually found in sample["source_code"] field
unittests: list[ExtendedUnittest] # unittests, usually found in unittest_db[sample["src_uid"]] field which do contain more key value pairs than input, output; so skip them
compile_cmd: str | None = None # compiler program e.g. gcc, g++, clang++, go, rustc, javac
compile_flags: str | None = None # flags passed during compilation e.g. "-std=c++11 -lm -static ...
execute_cmd: str | None = None # executor program (mainly interpreter for interpreted languages) e.g. python2, pypy2, ruby, php
execute_flags: str | None = None # flags to executor program e.g. "-o -nologo", "-W ignore
limits: ResourceLimits = field(default_factory=ResourceLimits) # Resource limits
block_network: bool = True # block network access for codes executed by ExecEval (True is safer)
stop_on_first_fail: bool = True # stops executing a code if a unit test fails (True for faster execution)
use_sanitizer: bool = False # This kept to allow some codes of xCodeEval (e.g. MS C++) to execute on linux during testing ExecEval with xCodeEval test data. (False should be ok)
- Response json format: ExtendedUnittest
API to get list of runtimes available:
- End point: /api/all_runtimes
- Method: GET
- Content-type: application/json
- Response format:
[
{
"compile_cmd": "gcc", // program to compile with
"compile_flags": "-fno-optimize-sibling-calls -w -fno-strict-aliasing -DONLINE_JUDGE -include limits.h -fno-asm -s -O2 -DONLINE_JUDGE -include math.h -static -lm", // default compiler flags
"execute_cmd": "",
"execute_flags": "",
"has_sanitizer": true,
"is_compiled": true,
"runtime_name": "GNU C",
"timelimit_factor": 1
},
{
"compile_cmd": "python3",
"compile_flags": "-W ignore -m py_compile",
"execute_cmd": "python3", // program to execute with
"execute_flags": "-W ignore -OO -s -S", // flags to execute with
"has_sanitizer": false, // is a sanitizer implemented in execution_engine/settings.py
"is_compiled": true, // true if there is a compile cmd
"runtime_name": "Python 3", // name which needs to match with the language passed in api for execute code
"timelimit_factor": 3 // a multiplier for time allowed to execute as some languages are slower than others
}
// etc.
]
Evaluation
pass@k
Check the eval_scripts
directory. The dependencies are mentioned in requirements.txt
. Run pip install -r eval_scripts/requirements.txt
. The entry point is through eval_passk.py
. Run python eval_scripts/eval_passk.py --help
for description of arguments.
Example of most typical usage:
python eval_scripts/eval_passk.py $path_to_samples_to_evaluate --k "1,2,5,10" --n_workers 129 --limits_by_lang_cfg_file eval_scripts/limits_by_lang.yaml --unittest_file $path_to_unittest_db_file --execeval_url "http://localhost:5000" --use_sanitizer 0
IMPORTANT
- pip dependencies to run evaluation script is listed in
eval_scripts/requirements.txt
. - Sanitize functions are available in
execution_engine/settings.py
. - Default compiler or execution flags are available in
execution_engine/config.yaml
. - Default resource limits for all supported languages are available in
eval_scripts/limits_by_lang.yaml
. - The machine generated codes to be executed should be a list of json with following key value pairs present to work properly:
- source_code: the code to be executed.
- lang: the language/runtime to use to execute in
ExecEval
. - src_uid: the unique id to retrieve unittests from unittest_db.
- task_id: an unique id assigned by machine/model trainer to represent the task they are solving. For example, program synthesis should have
task_id
same assrc_uid
whereas Code translation can havetask_id
same as the index of the test sample for which the code is generated.
- Be extra careful with the files used to run the scripts, for most parts following the files i.e.
unittest_db
by xCodeEval and other files by ExecEval should be okay except for the file with machine generated codes.
Security measures:
- Use seperate unpreviledged user for each worker to limit access to different resources.
- Use
prlimit
to limit resources allowed for the execution. - Use
seccomp
to limit socket syscalls (can be easily extended to arbitrary syscall blocker with the caveat that some syscalls are required by some languages to execute code). - Thus arbitrary resource usage is restricted.
- Compilation is not so secure as execution with the assumption that the code needs to find vulnerability in the compiler to exploit this point. (This part not tested)