Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x8260c000 PsLoadedModuleList = 0x827565b0
Debug session time: Tue May  5 16:51:01.479 2015 (UTC + 2:00)
System Uptime: 0 days 0:00:20.659
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {ff6fd000, 0, 9469a4bf, 0}


Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!itrp_IUP+2c9 )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ff6fd000, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9469a4bf, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 8277684c
Unable to read MiSystemVaType memory at 82755f00
 ff6fd000 

FAULTING_IP: 
win32k!itrp_IUP+2c9
9469a4bf 8b04b0          mov     eax,dword ptr [eax+esi*4]

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 9469bc79 to 9469a4bf

STACK_TEXT:  
8ad99524 9469bc79 ff6d7cb5 94768aeb ff6d861d win32k!itrp_IUP+0x2c9
8ad9952c 94768aeb ff6d861d ff6d72cc 00000000 win32k!itrp_InnerExecute+0x38
8ad99550 9469bc79 ff6d72cc 9469f088 ff6d7360 win32k!itrp_LOOPCALL+0x120
8ad99558 9469f088 ff6d7360 ff6d7328 ff6d8698 win32k!itrp_InnerExecute+0x38
8ad995d8 9469cbd8 ff6d8571 ff6d861d ff6d72cc win32k!itrp_Execute+0x2b2
8ad9960c 946a59db ff6d72cc 00000000 ff6d5298 win32k!itrp_ExecutePrePgm+0x5d
8ad99628 9469f32c ff6d5250 ff6d71dc ff6d52c4 win32k!fsg_RunPreProgram+0x78
8ad99688 946a906c 00000001 8ad996a4 946a8fc3 win32k!fs__Contour+0x19a
8ad99694 946a8fc3 ff6d5010 ff6d507c 8ad996c0 win32k!fs_ContourGridFit+0x12
8ad996a4 946a991f ff6d5010 ff6d507c 0000000a win32k!fs_NewContourGridFit+0x10
8ad996c0 946a9960 fc5cee78 0000000a 8ad996fc win32k!bGetGlyphOutline+0xd7
8ad996e8 946a9b59 fc5cee78 0000000a 00000001 win32k!bGetGlyphMetrics+0x20
8ad9982c 9469ec63 fc5cee78 0000000a 8ad99918 win32k!lGetGlyphBitmap+0x2b
8ad99850 9469eab6 00000000 00000001 0000000a win32k!ttfdQueryFontData+0x158
8ad998a0 9469dce2 ff7af010 fd254cf0 00000001 win32k!ttfdSemQueryFontData+0x45
8ad998e8 946a3774 ff7af010 fd254cf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
8ad99960 9471bc8d 8ad99c3c fd252998 ff689204 win32k!xInsertMetricsPlusRFONTOBJ+0x120
8ad99990 9469594d 00000003 ff7bf000 8ad99cd0 win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x179
8ad999c8 9471b78b 8ad99c1c 8ad99c3c 00000008 win32k!ESTROBJ::vCharPos_H3+0xf0
8ad99a0c 946955d0 8ad99cd0 00000003 8ad99c1c win32k!ESTROBJ::vInit+0x268
8ad99c2c 94695793 00000000 8ad99cd0 fd254cf0 win32k!GreGetTextExtentExW+0x12a
8ad99d0c 82649896 0601017d 011d0bb8 00000003 win32k!NtGdiGetTextExtentExW+0x141
8ad99d0c 76e870f4 0601017d 011d0bb8 00000003 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0023f424 00000000 00000000 00000000 00000000 0x76e870f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!itrp_IUP+2c9
9469a4bf 8b04b0          mov     eax,dword ptr [eax+esi*4]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!itrp_IUP+2c9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

FAILURE_BUCKET_ID:  0x50_win32k!itrp_IUP+2c9

BUCKET_ID:  0x50_win32k!itrp_IUP+2c9

Followup: MachineOwner
---------
