A C-program designed to accept and print command line arguments is a segmentation fault when it attempts to access memory it does not have access to. The “where” command seems to display a execution stack. This is how we can use the bt utility to examine the execution stack in gdb and hopefully use it as a tool to track down segmentation faults. This example highlights (indirectly) one other gdb tool that we haven’t discussed yet — “bt”