Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x8260d000 PsLoadedModuleList = 0x827575b0
Debug session time: Tue May  5 16:34:21.081 2015 (UTC + 2:00)
System Uptime: 0 days 0:00:52.044
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {ff668000, 1, 9431a50d, 0}


Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!itrp_IUP+317 )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ff668000, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 9431a50d, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8277784c
Unable to read MiSystemVaType memory at 82756f00
 ff668000 

FAULTING_IP: 
win32k!itrp_IUP+317
9431a50d 0114b0          add     dword ptr [eax+esi*4],edx

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 9431bc79 to 9431a50d

STACK_TEXT:  
9152647c 9431bc79 ff64e260 9431f088 ff64e2f4 win32k!itrp_IUP+0x317
91526484 9431f088 ff64e2f4 ff64e2bc ff64e7a4 win32k!itrp_InnerExecute+0x38
91526504 94323234 008c8492 008c84a5 ff64e260 win32k!itrp_Execute+0x2b2
9152652c 943229dc 008c8492 008c84a5 ff64e260 win32k!itrp_ExecuteGlyphPgm+0x4a
91526560 94321e5e ff64c570 00000001 00000000 win32k!fsg_SimpleInnerGridFit+0x102
915265f8 9432238c ff64c250 ff64d6f8 ff64e260 win32k!fsg_ExecuteGlyph+0x1ce
91526654 94322202 ff64c250 ff64e260 ff64d670 win32k!fsg_CreateGlyphData+0xea
91526694 9431f419 ff64c250 ff64e260 ff64c2c4 win32k!fsg_GridFit+0x4d
9152670c 9432906c 00000001 91526728 94328fc3 win32k!fs__Contour+0x287
91526718 94328fc3 ff64c010 ff64c07c 91526744 win32k!fs_ContourGridFit+0x12
91526728 9432991f ff64c010 ff64c07c 00000024 win32k!fs_NewContourGridFit+0x10
91526744 94329960 fbbfee78 00000024 91526780 win32k!bGetGlyphOutline+0xd7
9152676c 94329b59 fbbfee78 00000024 00000001 win32k!bGetGlyphMetrics+0x20
915268b0 9431ec63 fbbfee78 00000024 9152699c win32k!lGetGlyphBitmap+0x2b
915268d4 9431eab6 00000000 00000001 00000024 win32k!ttfdQueryFontData+0x158
91526924 9431dce2 ff7af010 fc0d8cf0 00000001 win32k!ttfdSemQueryFontData+0x45
9152696c 943067bb ff7af010 fc0d8cf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
915269e0 943314d7 ffa7a130 fbbdeaac 00000024 win32k!xInsertMetricsRFONTOBJ+0x9c
91526a14 943335b9 00000020 91526a7c 91526c7c win32k!RFONTOBJ::bGetGlyphMetrics+0x131
91526cb8 94346644 0501010c 00000040 00000020 win32k!GreGetCharABCWidthsW+0x147
91526d14 8264a896 0501010c 00000000 00000040 win32k!NtGdiGetCharABCWidthsW+0xf8
91526d14 777670f4 0501010c 00000000 00000040 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0014eff8 00000000 00000000 00000000 00000000 0x777670f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!itrp_IUP+317
9431a50d 0114b0          add     dword ptr [eax+esi*4],edx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!itrp_IUP+317

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

FAILURE_BUCKET_ID:  0x50_win32k!itrp_IUP+317

BUCKET_ID:  0x50_win32k!itrp_IUP+317

Followup: MachineOwner
---------
