Linux desktop debugging toolkit — targeted journal/boot/log inspection skills plus proactive logging instrumentation (persistent journald, kdump, sysstat, OOM protection) so AI agents can analyze hard crashes, freezes, and runtime issues. Targets Ubuntu + Wayland; forkable for other distros.
npx claudepluginhub danielrosehill/claude-code-plugins --plugin linux-debuggingInspect boot health on a systemd Linux system — failed units, slow services, kernel boot messages, and boot-to-boot comparison. Use when the user reports slow boot, services not starting, or wants to check post-reboot health. Targets Ubuntu/Debian + Wayland desktops but works on any systemd host.
Find past out-of-memory kill events in the journal — both kernel OOM killer invocations and userspace systemd-oomd / earlyoom kills — and reconstruct what was running at the time. Use when the user reports an unexplained freeze, lost work, or a process disappearing.
Collaboratively debug a misbehaving Linux desktop app or service in real time with the user. Two modes — live (tail logs while the user reproduces) and retrospective (something just happened, capture evidence before it gets buried). Produces a diagnosis and optionally a written-up bug report with attached log excerpts. Use when the user says "something won't launch", "let's debug this together", "X just crashed", "a bug just happened", or describes an issue they want to reproduce.
Open a forensic investigation into the most recent Linux crash, freeze, or unexpected reboot. Collects kernel dumps, previous-boot journal, userspace core dumps, and sar metrics, correlates them around the crash timestamp, and writes a findings report. Use when the user says "investigate the crash", "why did my system reboot", "open a crash investigation", or similar.
Run targeted journalctl queries to surface only the relevant log lines for a debugging task — by unit, time window, priority, boot, or kernel/user scope. Emits structured output (JSON or short-form) suited for AI analysis. Use when the user reports a problem and you need to inspect logs without dumping everything. Assumes systemd + journald (Ubuntu, Debian, Fedora, Arch, etc.).
Inspect non-journal log sources on a Linux desktop — Xorg/Wayland session logs, application logs in ~/.cache and ~/.local/state, /var/log/* leftovers, and dmesg — using AI-friendly tools (ripgrep, jq, structured queries) that produce focused, parseable output instead of raw log dumps. Use when journald doesn't have what you need or when an app writes its own log files.
Inspect /sys/fs/pstore for kernel oops and panic messages captured in firmware-backed storage (EFI vars, ACPI ERST, or ramoops) that survive a reboot. Use when the user says "check pstore", "any firmware-saved crash logs", or after a hard freeze on a system where kdump may not have worked.
Configure netconsole to stream kernel oops and panic messages over UDP to another host on the LAN, for capturing crashes on systems that hang before writing to disk. Use when the user says "set up netconsole", "stream kernel logs over the network", or is dealing with crashes that leave no local log trail.
Install and configure userspace OOM protection (systemd-oomd or earlyoom) so a desktop running out of memory kills the offending process before the kernel hard-locks the machine. Use when the user reports freezes under memory pressure, or proactively when setting up a new desktop. Ubuntu 22.04+ ships systemd-oomd by default; this skill verifies its config and falls back to earlyoom on older systems.
Verify that systemd-journald is configured for persistent storage so logs survive reboot — essential for diagnosing hard crashes and unexpected reboots. Configures it if not. Use proactively on any new desktop, and as a precondition before any post-crash investigation skill.
A Claude Code plugin for debugging Linux desktops — targeted journal/boot/log inspection skills, plus an idempotent installer that instruments the system with the proactive logging tools needed to catch hard crashes and analyze them after the fact.
Targets Ubuntu + Wayland desktops. Most skills work on any systemd Linux; the install script assumes apt. Forkable for other distros.
Run scripts/install-debugging-stack.sh once to set up:
| Tool | Purpose |
|---|---|
| Persistent journald | journalctl -b -1 survives reboot — logs available after a hard crash |
linux-crashdump (kdump-tools) | Full kernel core dumps on panic via kexec, written to /var/crash/ |
sysstat | Records CPU / memory / I/O / network every 10 min — sar lets you look back at system state before a freeze |
systemd-coredump | Captures userspace segfault core dumps |
pstore check | Verifies firmware-backed crash storage as a belt-and-braces fallback |
Userspace OOM protection (systemd-oomd / earlyoom) is handled separately by the setup-oom-protection skill.
journal-inspect — Targeted journalctl queries by unit, time, priority, kernel scope, with structured/JSON output for AI analysis. The default replacement for journalctl -xe.boot-inspect — Failed units, systemd-analyze blame/critical-chain, kernel boot messages, boot-to-boot diff. Wayland session services included.log-inspect — Non-journal log sources: app state dirs (~/.cache, ~/.local/state), /var/log/*, dpkg/apt history, snap/flatpak. Uses ripgrep + jq for AI-friendly output.setup-oom-protection — Configure systemd-oomd (Ubuntu 22.04+) or earlyoom so the desktop kills runaway processes before the kernel hard-locks under memory pressure.inspect-oom-events — Find past OOM kills (kernel + oomd + earlyoom) in the journal and reconstruct what was running, correlated with sar memory/swap data.validate-persistent-journal — Verify /var/log/journal is active so logs survive reboot. Configure if not. Precondition for any post-crash investigation.investigate-last-crash — Systematic post-mortem after a hard crash: enumerate boots, identify the crash window, collect kernel + userspace evidence, correlate with sar metrics, write a findings report.setup-netconsole — Stream kernel oops messages over UDP to another LAN host, for capturing freezes that leave no local log trail.review-pstore — Inspect /sys/fs/pstore for firmware-saved panic logs that survive reboots.From the Claude Code marketplace:
claude plugins install linux-debugging@danielrosehill
Then, optionally, run the proactive instrumentation installer:
git clone https://github.com/danielrosehill/Linux-Debugging-Plugin
cd Linux-Debugging-Plugin
bash scripts/install-debugging-stack.sh
A reboot is required for kdump to become active.
Invoke skills naturally in a Claude Code session:
"Inspect the journal for errors in the last hour" "Why is boot taking 45 seconds?" "Set up OOM protection on this machine" "Investigate the last crash"
Ubuntu (tested on Ubuntu 25.10 with KDE Plasma on Wayland). Most skills are systemd-portable; the install script is apt-only. Fork and adapt the installer for other distros.
MIT
Share bugs, ideas, or general feedback.
Windows system diagnostics and troubleshooting. Analyzes Event Viewer, disk health, memory, hardware errors, system stability, and performance to diagnose crashes, freezes, and reboots.
Assist with security incident response
DevsForge Enterprise Debugging Architect delivering comprehensive debugging methodologies, error resolution frameworks, and system optimization strategies that transform debugging from troubleshooting function into strategic business value creation and system reliability catalyst
Ultra-compressed communication mode. Cuts ~75% of tokens while keeping full technical accuracy by speaking like a caveman.
Comprehensive UI/UX design plugin for mobile (iOS, Android, React Native) and web applications with design systems, accessibility, and modern patterns
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim