//The thread that bugchecked the system
ffffd000`2431e6b8 fffff801`b3616991 : 00000000`0000004c 00000000`c000021a ffffd000`5a9b43f8 ffffe000`473e26d0 : nt!KeBugCheckEx
ffffd000`2431e6c0 fffff801`b36104ea : ffffe000`46985600 ffffd000`2431e7d9 00000000`00000000 00000000`00000002 : nt!PopGracefulShutdown+0x2c9
ffffd000`2431e700 fffff801`b33e71b3 : ffffe000`46985340 00000000`00000000 00000000`c0000004 00000000`00000000 : nt!NtSetSystemPowerState+0x269a
ffffd000`2431e840 fffff801`b33df600 : fffff801`b382c1b3 00000000`00000001 ffffd000`2431ea58 00000000`c0000004 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`2431e840)
ffffd000`2431e9d8 fffff801`b382c1b3 : 00000000`00000001 ffffd000`2431ea58 00000000`c0000004 ffffd000`5f5d2180 : nt!KiServiceLinkage
ffffd000`2431e9e0 fffff801`b375fa27 : 00000000`00000000 00000000`00000000 ffffd000`5f5d2180 ffffe000`46985480 : nt!PopIssueActionRequest+0x73f43
ffffd000`2431eaa0 fffff801`b3338b8e : fffff801`b3338ad4 00000000`00000000 00000000`00000002 fffff801`b353d300 : nt!PopPolicyWorkerAction+0x63
ffffd000`2431eb10 fffff801`b33363ac : fffff801`00000002 fffff801`b354ad40 ffffe000`46985340 fffff801`b353d300 : nt!PopPolicyWorkerThread+0xba
ffffd000`2431eb50 fffff801`b3363280 : ffffe000`458cf920 ffffe000`46985340 00000000`00000080 ffffe000`46985340 : nt!ExpWorkerThread+0x28c
ffffd000`2431ec00 fffff801`b33e1fc6 : ffffd000`5f4f9180 ffffe000`46985340 ffffd000`5f5053c0 ffffc000`ef1e2a50 : nt!PspSystemThreadStartup+0x58
ffffd000`2431ec60 00000000`00000000 : ffffd000`2431f000 ffffd000`24319000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
//Here's the thread that actually caused the crash
ffffd000`5a9b3d80 fffff801`b33254fe : ffffd000`5ac88180 ffffe000`461f8080 ffffe000`fffffffe ffffd000`fffffffe : nt!KiSwapContext+0x76 //Swap the thread context
ffffd000`5a9b3ec0 fffff801`b3324f79 : ffffe000`461f8080 fffff801`b330ca78 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x14e //Change thread execution
ffffd000`5a9b3f60 fffff801`b32f7340 : 00000000`00000000 00000000`00000000 ffffd000`000000aa 00000000`00000004 : nt!KiCommitThreadWait+0x129 //Place thread in a wait state
ffffd000`5a9b3fe0 fffff801`b375f188 : ffffe000`453c8a90 ffffd000`00000005 00000000`00000000 fffff801`00000002 : nt!KeWaitForSingleObject+0x2c0 //Wait for conditions
ffffd000`5a9b4070 fffff801`b33e71b3 : ffffe000`461f8080 ffffd000`5a9b43f8 00000000`00000000 fffff801`b33e5d57 : nt!NtInitiatePowerAction+0x170 //Initiate the power action policy
ffffd000`5a9b4100 fffff801`b33df600 : fffff801`b389c0b8 00000000`00000100 00000000`00000801 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`5a9b4100) //Kernel mdoe transition
ffffd000`5a9b4298 fffff801`b389c0b8 : 00000000`00000100 00000000`00000801 00000000`00000001 ffffd000`5a9b43d8 : nt!KiServiceLinkage //User mode transition
ffffd000`5a9b42a0 fffff801`b3619376 : ffffe000`446a5490 ffffe000`473e26d0 ffffe000`476d8900 00000000`00000100 : nt!PoShutdownBugCheck+0xd4 //Initiate bugcheck
ffffd000`5a9b4340 fffff801`b33e3c32 : 00000000`00000000 00000000`00000354 00000001`00000001 00000000`00000013 : nt!ExpSystemErrorHandler2+0x64e
ffffd000`5a9b4590 fffff801`b38d8c30 : 00000000`c000021a 00000000`00000001 00000000`00000001 ffffd000`5a9b49c8 : nt!ExpSystemErrorHandler+0xd2 //Error handler
ffffd000`5a9b45d0 fffff801`b38d902d : 00000000`00000300 fffff801`b363b715 ffffd9f0`e775cb18 ffffd000`00000800 : nt!ExpRaiseHardError+0x12c
ffffd000`5a9b4950 fffff801`b33e71b3 : fffff6fb`7dbed7f8 fffff6fb`7daffed8 fffff6fb`5ffdb4f8 fffff6bf`fb69f428 : nt!NtRaiseHardError+0x1b9
ffffd000`5a9b4a90 00007ffa`2c2d225a : 00007ff6`d3e7143e 0000009a`aba997c0 00007ff6`d3e843a8 0000009a`ab70f5c0 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd000`5a9b4b00)
0000009a`ab70f558 00007ff6`d3e7143e : 0000009a`aba997c0 00007ff6`d3e843a8 0000009a`ab70f5c0 0000009a`aba997c0 : ntdll!NtRaiseHardError+0xa //Hard error, looks like a disk fault
0000009a`ab70f560 00007ffa`2c259b9b : 00007ff6`d3e3b930 00007ff6`d3e3b930 0000009a`ab1e5000 0000009a`ab1be800 : services!CRebootContext::Perform+0x1be //Undocumented function. Possibly switch switch the context?
0000009a`ab70f9e0 00007ffa`2c25daca : 00007ffa`2c259b00 0000009a`ab1e5000 0000009a`ab70fbf8 0000009a`00000102 : ntdll!RtlpTpWaitCallback+0x9b //Wait for the callback routine
0000009a`ab70fa40 00007ffa`2c274a5d : 0000009a`abacce80 0000009a`ab1dd1d0 00000000`00000000 0000009a`ab1b3868 : ntdll!TppExecuteWaitCallback+0x92
0000009a`ab70fa80 00007ffa`2bed13d2 : 00000000`00000000 00007ffa`2c2745e0 0000009a`ab1b7cc0 00000000`00000000 : ntdll!TppWorkerThread+0x47d
0000009a`ab70fe60 00007ffa`2c2aeb64 : 00007ffa`2bed13b0 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x22
0000009a`ab70fe90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x34
4: kd> .trap ffffd000`5a9b4b00
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=00007ffa2c2d225a rsp=0000009aab70f558 rbp=0000000000000102
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ntdll!NtRaiseHardError+0xa:
0033:00007ffa`2c2d225a c3 ret
4: kd> u @rip
ntdll!NtRaiseHardError+0xa:
00007ffa`2c2d225a c3 ret
00007ffa`2c2d225b 0f1f440000 nop dword ptr [rax+rax]
ntdll!NtReadOnlyEnlistment:
00007ffa`2c2d2260 4c8bd1 mov r10,rcx
00007ffa`2c2d2263 b848010000 mov eax,148h
00007ffa`2c2d2268 0f05 syscall
00007ffa`2c2d226a c3 ret
00007ffa`2c2d226b 0f1f440000 nop dword ptr [rax+rax]
ntdll!NtRecoverEnlistment:
00007ffa`2c2d2270 4c8bd1 mov r10,rcx