Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82635000 PsLoadedModuleList = 0x8277f5b0
Debug session time: Tue May  5 18:34:46.887 2015 (UTC + 2:00)
System Uptime: 0 days 0:01:41.115
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {ef0bee0b, 8, ef0bee0b, 2}


Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!scl_CalcComponentOffset+21 )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ef0bee0b, memory referenced.
Arg2: 00000008, value 0 = read operation, 1 = write operation.
Arg3: ef0bee0b, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8279f84c
Unable to read MiSystemVaType memory at 8277ef00
 ef0bee0b 

FAULTING_IP: 
+0
ef0bee0b ??              ???

MM_INTERNAL_CODE:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 93d5a9cc to ef0bee0b

STACK_TEXT:  
WARNING: Frame IP not in any known module. Following frames may be wrong.
89e914b4 93d5a9cc 89e91504 ff667efc ff667e94 0xef0bee0b
89e914c8 93d54483 00000000 00000001 00000001 win32k!scl_CalcComponentOffset+0x21
89e91538 93d71ef8 00000800 ff667e94 ff667e94 win32k!fsg_MergeGlyphData+0x12a
89e91574 93d7238c ff667250 ff667f1c ff66848c win32k!fsg_ExecuteGlyph+0x268
89e915d0 93d72202 ff667250 ff66848c ff667ddc win32k!fsg_CreateGlyphData+0xea
89e91610 93d6f419 ff667250 ff66848c ff6672c4 win32k!fsg_GridFit+0x4d
89e91688 93d7906c 00000000 89e916a4 93d78fc3 win32k!fs__Contour+0x287
89e91694 93d78fc3 ff667010 ff66707c 89e916c0 win32k!fs_ContourGridFit+0x12
89e916a4 93d7991f ff667010 ff66707c 0000007f win32k!fs_NewContourGridFit+0x10
89e916c0 93d79960 fbc4ce78 0000007f 89e916fc win32k!bGetGlyphOutline+0xd7
89e916e8 93d79b59 fbc4ce78 0000007f 00000001 win32k!bGetGlyphMetrics+0x20
89e9182c 93d6ec63 fbc4ce78 0000007f 89e91918 win32k!lGetGlyphBitmap+0x2b
89e91850 93d6eab6 00000000 00000001 0000007f win32k!ttfdQueryFontData+0x158
89e918a0 93d6dce2 ff7af010 fe398cf0 00000001 win32k!ttfdSemQueryFontData+0x45
89e918e8 93d73774 ff7af010 fe398cf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
89e91960 93debc8d 89e91c3c fd57ebd4 ff64c7e8 win32k!xInsertMetricsPlusRFONTOBJ+0x120
89e91990 93d6594d 00000008 ff7bf030 89e91cd6 win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x179
89e919c8 93deb78b 89e91c1c 89e91c3c 00000008 win32k!ESTROBJ::vCharPos_H3+0xf0
89e91a0c 93d655d0 89e91cd0 00000008 89e91c1c win32k!ESTROBJ::vInit+0x268
89e91c2c 93d65793 00000000 89e91cd0 fe398cf0 win32k!GreGetTextExtentExW+0x12a
89e91d0c 82672896 040102bf 006c0bb0 00000008 win32k!NtGdiGetTextExtentExW+0x141
89e91d0c 77ba70f4 040102bf 006c0bb0 00000008 nt!KiSystemServicePostCall
0025f834 00000000 00000000 00000000 00000000 0x77ba70f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!scl_CalcComponentOffset+21
93d5a9cc 8b7d40          mov     edi,dword ptr [ebp+40h]

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  win32k!scl_CalcComponentOffset+21

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

FAILURE_BUCKET_ID:  0x50_win32k!scl_CalcComponentOffset+21

BUCKET_ID:  0x50_win32k!scl_CalcComponentOffset+21

Followup: MachineOwner
---------
