
*** Fatal System Error: 0x000000d5
                       (0xFEF10E34,0x00000000,0x91505733,0x00000000)

Driver at fault: 
***    win32k.sys - Address 91505733 base at 91440000, DateStamp 56422bfd
.
Break instruction exception - code 80000003 (first chance)

A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.

A fatal system error has occurred.

Connected to Windows 7 7601 x86 compatible target at (Fri Dec 11 09:26:10.932 2015 (UTC - 8:00)), ptr64 FALSE
Loading Kernel Symbols
...............................................................
............................

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

....................................
.......
Loading User Symbols
.....................
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D5, {fef10e34, 0, 91505733, 0}

Probably caused by : win32k.sys ( win32k!SURFACE::bRedirectionBitmap+3 )

Followup: MachineOwner
---------

nt!RtlpBreakWithStatusInstruction:
82cc2308 cc              int     3
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5)
Memory was referenced after it was freed.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fef10e34, memory referenced
Arg2: 00000000, value 0 = read operation, 1 = write operation
Arg3: 91505733, if non-zero, the address which referenced memory.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


READ_ADDRESS:  fef10e34 Special pool

FAULTING_IP: 
win32k!SURFACE::bRedirectionBitmap+3
91505733 83b98c00000000  cmp     dword ptr [ecx+8Ch],0

MM_INTERNAL_CODE:  0

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  56422bfd

MODULE_NAME: win32k

FAULTING_MODULE: 91440000 win32k

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD5

PROCESS_NAME:  conhost.exe

CURRENT_IRQL:  2

TRAP_FRAME:  93bffadc -- (.trap 0xffffffff93bffadc)
ErrCode = 00000000
eax=00000001 ebx=93bffbf8 ecx=fef10da8 edx=00008229 esi=fef10da8 edi=fef10da8
eip=91505733 esp=93bffb50 ebp=93bffb6c iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
win32k!SURFACE::bRedirectionBitmap+0x3:
91505733 83b98c00000000  cmp     dword ptr [ecx+8Ch],0 ds:0023:fef10e34=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82d26ce7 to 82cc2308

STACK_TEXT:  
93bff62c 82d26ce7 00000003 c25f0f38 00000065 nt!RtlpBreakWithStatusInstruction
93bff67c 82d277e5 00000003 00000000 000fb15a nt!KiBugCheckDebugBreak+0x1c
93bffa40 82cd53c1 00000050 fef10e34 00000000 nt!KeBugCheck2+0x68b
93bffac4 82c87be8 00000000 fef10e34 00000000 nt!MmAccessFault+0x104
93bffac4 91505733 00000000 fef10e34 00000000 nt!KiTrap0E+0xdc
93bffb4c 9150575f fef10da8 93bffbe8 93bffbf8 win32k!SURFACE::bRedirectionBitmap+0x3
93bffb6c 915079c2 93bffbe8 fae5e728 93bffbf8 win32k!SURFACE::Map+0x16
93bffb8c 915059d1 fc12add0 93bffbe8 93bffcfc win32k!DEVLOCKOBJ::bMapTrgSurfaceView+0x30
93bffba0 91506702 93bffcfc 00000000 7ffdf000 win32k!DEVLOCKOBJ::bPrepareTrgDco+0x79
93bffbb8 914feeba fef78130 00000001 02daac34 win32k!DEVLOCKOBJ::bLock+0x332
93bffd24 82c8499c 000000c9 017fef4c 017fef5c win32k!NtGdiFlushUserBatch+0xbc
93bffd34 774171b3 badb0d00 017fef4c 00000000 nt!KiSystemServiceAccessTeb+0x10
93bffd38 badb0d00 017fef4c 00000000 00000000 ntdll!KiFastSystemCall+0x3
WARNING: Frame IP not in any known module. Following frames may be wrong.
93bffd3c 017fef4c 00000000 00000000 00000000 0xbadb0d00
93bffd40 00000000 00000000 00000000 00000000 0x17fef4c


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!SURFACE::bRedirectionBitmap+3
91505733 83b98c00000000  cmp     dword ptr [ecx+8Ch],0

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  win32k!SURFACE::bRedirectionBitmap+3

FOLLOWUP_NAME:  MachineOwner

FAILURE_BUCKET_ID:  0xD5_VRF_win32k!SURFACE::bRedirectionBitmap+3

BUCKET_ID:  0xD5_VRF_win32k!SURFACE::bRedirectionBitmap+3

Followup: MachineOwner
---------
