analyze-oops — AI 코드 어시스턴트 analyze-oops, pearpc, community, AI 코드 어시스턴트, ide skills, analyze-oops 스킬, PearPC 커널 Oops, 커널 디버깅, AI 도구, 코드 분석, Claude Code

v1.0.0

이 스킬 정보

PowerPC 아키텍처 에뮬레이터에서 고급 커널 oops 분석 기능이 필요한 디버깅 에이전트에 적합 analyze-oops는 PearPC 커널 Oops를 분석하는 AI 코드 어시스턴트 스킬

기능

스크립트 scripts/debug/memdump.py를 사용하여 Oops 추출
pt_regs 디코딩
NIP 및 LR 디어셈블
PearPC 커널 Oops 분석 지원

# Core Topics

sebastianbiallas sebastianbiallas
[429]
[74]
Updated: 3/23/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 8/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution
Review Score
8/11
Quality Score
43
Canonical Locale
en
Detected Body Locale
en

PowerPC 아키텍처 에뮬레이터에서 고급 커널 oops 분석 기능이 필요한 디버깅 에이전트에 적합 analyze-oops는 PearPC 커널 Oops를 분석하는 AI 코드 어시스턴트 스킬

이 스킬을 사용하는 이유

에이전트가 memdump.py와 disasm_ppc.pyなどの 스크립트를 사용하여 커널 oops를 디코딩하고 디어셈블링하여 Oops 출력과 pt_regs에 대한 심층 분석을 제공하고 Claude Code와 Cursorなどの AI 코딩 어시스턴트와 원활하게 협업할 수 있도록 합니다

최적의 용도

PowerPC 아키텍처 에뮬레이터에서 고급 커널 oops 분석 기능이 필요한 디버깅 에이전트에 적합

실행 가능한 사용 사례 for analyze-oops

PowerPC 아키텍처 에뮬레이터(PearPC 등)에서 커널 oops 디버깅
memdump.py를 사용하여 Oops 추출 및 분석
disasm_ppc.py를 사용하여 NIP 및 LR 주변 디어셈블링

! 보안 및 제한 사항

  • Python 3 필요
  • PowerPC 아키텍처 에뮬레이터만 해당
  • memdump.py 및 disasm_ppc.py 등의 스크립트 필요

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.
  • - The underlying skill quality score is below the review floor.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is analyze-oops?

PowerPC 아키텍처 에뮬레이터에서 고급 커널 oops 분석 기능이 필요한 디버깅 에이전트에 적합 analyze-oops는 PearPC 커널 Oops를 분석하는 AI 코드 어시스턴트 스킬

How do I install analyze-oops?

Run the command: npx killer-skills add sebastianbiallas/pearpc/analyze-oops. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for analyze-oops?

Key use cases include: PowerPC 아키텍처 에뮬레이터(PearPC 등)에서 커널 oops 디버깅, memdump.py를 사용하여 Oops 추출 및 분석, disasm_ppc.py를 사용하여 NIP 및 LR 주변 디어셈블링.

Which IDEs are compatible with analyze-oops?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for analyze-oops?

Python 3 필요. PowerPC 아키텍처 에뮬레이터만 해당. memdump.py 및 disasm_ppc.py 등의 스크립트 필요.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add sebastianbiallas/pearpc/analyze-oops. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use analyze-oops immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

analyze-oops

Install analyze-oops, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command setup.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Analyze Kernel Oops

Use scripts/debug/memdump.py to extract and analyze the Oops.

Steps

  1. Extract the Oops:

    python3 scripts/debug/memdump.py oops ${ARGUMENTS:-memdump_jit.bin}
    
  2. Decode pt_regs (use the REGS address from the Oops output):

    python3 scripts/debug/memdump.py regs DUMP_FILE REGS_ADDRESS
    
  3. Disassemble around NIP and LR (convert VA to PA: PA = VA - 0xC0000000):

    python3 scripts/debug/disasm_ppc.py DUMP_FILE PA_OF_NIP 16
    python3 scripts/debug/disasm_ppc.py DUMP_FILE PA_OF_LR 16
    
  4. Search for the NIP value in both dumps:

    python3 scripts/debug/memdump.py find memdump_generic.bin NIP_VALUE
    python3 scripts/debug/memdump.py find memdump_jit.bin NIP_VALUE
    
  5. Check if NIP is a valid address:

    • 0xC0xxxxxx = kernel code
    • 0xBFxxxxxx = PROM virtual address (prom_mem_phys_to_virt)
    • 0xFDxxxxxx = PCI I/O space (not executable)

Report: exception type, faulting address, caller, what the code was trying to do.

관련 스킬

Looking for an alternative to analyze-oops or another community skill for your workflow? Explore these related open-source skills.

모두 보기

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
인공지능

widget-generator

Logo of f
f

prompts.chat 피드 시스템을 위한 사용자 지정 가능한 위젯 플러그인을 생성합니다

149.6k
0
인공지능

flags

Logo of vercel
vercel

리액트 프레임워크

138.4k
0
브라우저

pr-review

Logo of pytorch
pytorch

파이썬에서 텐서와 동적 신경망 구현 및 강력한 GPU 가속 지원

98.6k
0
개발자