analyze-oops — PowerPC emulation analyze-oops, pearpc, sebastianbiallas, community, PowerPC emulation, ai agent skill, ide skills, agent automation, AI agent skill, kernel oops debugging, memdump.py script, disasm_ppc.py script

v1.0.0
GitHub

About this Skill

Perfect for Debugging Agents needing advanced kernel oops analysis capabilities in PowerPC architecture emulators analyze-oops is a debugging skill for PowerPC architecture emulators, extracting and analyzing kernel oops using memdump.py and disasm_ppc.py scripts.

Features

Extracts kernel oops using scripts/debug/memdump.py
Decodes pt_regs using memdump.py and REGS address
Disassembles around NIP and LR using disasm_ppc.py
Converts virtual addresses to physical addresses (PA = VA - 0xC0000000)
Supports debugging of PowerPC architecture emulators like PearPC

# Core Topics

sebastianbiallas sebastianbiallas
[429]
[74]
Updated: 3/23/2026

Quality Score

Top 5%
43
Excellent
Based on code quality & docs
Installation
SYS Universal Install (Auto-Detect)
> npx killer-skills add sebastianbiallas/pearpc/analyze-oops
Supports 19+ Platforms
Cursor
Windsurf
VS Code
Trae
Claude
OpenClaw
+12 more

Agent Capability Analysis

The analyze-oops skill by sebastianbiallas is an open-source community AI agent skill for Claude Code and other IDE workflows, helping agents execute tasks with better context, repeatability, and domain-specific guidance. Optimized for AI agent skill, PowerPC emulation, kernel oops debugging.

Ideal Agent Persona

Perfect for Debugging Agents needing advanced kernel oops analysis capabilities in PowerPC architecture emulators

Core Value

Empowers agents to decode and disassemble kernel oops using scripts like memdump.py and disasm_ppc.py, providing in-depth analysis of Oops output and pt_regs, and enabling them to work seamlessly with AI coding assistants like Claude Code and Cursor

Capabilities Granted for analyze-oops

Debugging kernel oops in PowerPC architecture emulators like PearPC
Extracting and analyzing Oops using memdump.py
Disassembling around NIP and LR using disasm_ppc.py

! Prerequisites & Limits

  • Requires Python 3
  • Limited to PowerPC architecture emulators
  • Needs scripts like memdump.py and disasm_ppc.py
Project
SKILL.md
1017 B
.cursorrules
1.2 KB
package.json
240 B
Ready
UTF-8

# Tags

[No tags]
SKILL.md
Readonly

Analyze Kernel Oops

Use scripts/debug/memdump.py to extract and analyze the Oops.

Steps

  1. Extract the Oops:

    python3 scripts/debug/memdump.py oops ${ARGUMENTS:-memdump_jit.bin}
    
  2. Decode pt_regs (use the REGS address from the Oops output):

    python3 scripts/debug/memdump.py regs DUMP_FILE REGS_ADDRESS
    
  3. Disassemble around NIP and LR (convert VA to PA: PA = VA - 0xC0000000):

    python3 scripts/debug/disasm_ppc.py DUMP_FILE PA_OF_NIP 16
    python3 scripts/debug/disasm_ppc.py DUMP_FILE PA_OF_LR 16
    
  4. Search for the NIP value in both dumps:

    python3 scripts/debug/memdump.py find memdump_generic.bin NIP_VALUE
    python3 scripts/debug/memdump.py find memdump_jit.bin NIP_VALUE
    
  5. Check if NIP is a valid address:

    • 0xC0xxxxxx = kernel code
    • 0xBFxxxxxx = PROM virtual address (prom_mem_phys_to_virt)
    • 0xFDxxxxxx = PCI I/O space (not executable)

Report: exception type, faulting address, caller, what the code was trying to do.

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is analyze-oops?

Perfect for Debugging Agents needing advanced kernel oops analysis capabilities in PowerPC architecture emulators analyze-oops is a debugging skill for PowerPC architecture emulators, extracting and analyzing kernel oops using memdump.py and disasm_ppc.py scripts.

How do I install analyze-oops?

Run the command: npx killer-skills add sebastianbiallas/pearpc/analyze-oops. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for analyze-oops?

Key use cases include: Debugging kernel oops in PowerPC architecture emulators like PearPC, Extracting and analyzing Oops using memdump.py, Disassembling around NIP and LR using disasm_ppc.py.

Which IDEs are compatible with analyze-oops?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for analyze-oops?

Requires Python 3. Limited to PowerPC architecture emulators. Needs scripts like memdump.py and disasm_ppc.py.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add sebastianbiallas/pearpc/analyze-oops. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use analyze-oops immediately in the current project.

Related Skills

Looking for an alternative to analyze-oops or another community skill for your workflow? Explore these related open-source skills.

View All

widget-generator

Logo of f
f

Generate customizable widget plugins for the prompts.chat feed system

149.6k
0
Design

flags

Logo of vercel
vercel

The React Framework

138.4k
0
Browser

pr-review

Logo of pytorch
pytorch

Tensors and Dynamic neural networks in Python with strong GPU acceleration

98.6k
0
AI

antd-commit-msg

Logo of ant-design
ant-design

Generate a single-line commit message for ant-design by reading the projects git staged area and recent commit style. Use when the user asks for a commit message, says msg, commit msg, 写提交信息, or wants

97.8k
0
Design