Hello TheSlowKnife,
Interesting. OTA is octogon trust account which is related to security. UMEventRecorder is related to UserManagement.
Do you actually have Auto Updates disabled in settings? I don't know if it is typical but apfsd on my device has a permission key 'com.apple.private.apfs.revert-to-snapshot'.
Given that your update has been rolled back, I would suggest you have a look at your other logs. Out of interest, after updating did you have any other logs show up?
The following will likely be in the log titled with an app name than a process event log. If you do find any of these indicators, take a screenshot and post it in a reply, or copy and paste the log into the log attachment icon on the reply toolbar, it looks like a notepad and is next to the image upload button.
First, you are looking for an app log that has '.diskwrites' or '.wakeups' in the log name.
Next, open it up and you are looking in the header for the following, where the X's are will be a unique UUID number.
Beta Identifier: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
Here is a better example:
{"app_name":"MobileSafari","timestamp":"2023-07-05 18:54:03.00 +1000","app_version":"16.5.1","slice_uuid":"XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX","build_version":"8615.2.9.10.4","bundleID":"com.apple.mobilesafari","duration_ms":"74144793","share_with_app_devs":0,"is_first_party":1,"bug_type":"145","os_version":"iPhone OS 16.5.1 (20F75)","roots_installed":0,"incident_id":"XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX","name":"MobileSafari"}
Date/Time: 2023-07-04 22:18:16.417 +1000
End time: 2023-07-05 18:54:01.210 +1000
OS Version: iPhone OS 16.5.1 (Build 20F75)
Architecture: arm64e
Report Version: 40
Incident Identifier: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
Data Source: Microstackshots
Shared Cache: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX slid base address 0x1******00, slide 0x7****00
Command: MobileSafari
Path: /Applications/MobileSafari.app/MobileSafari
Identifier: com.apple.mobilesafari
Version: 16.5.1 (8615.2.9.10.4)
Is First Party: Yes
Beta Identifier: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
Resource Coalition ID: 447
Architecture: arm64
PID: 1405
Next, you are looking in other app logs which simply have the app name and log date.
This is an example of what you are looking for, it will be not far from the start of the log:
"coalitionName" : "com.spotify.client",
"crashReporterKey" : "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
"throttleTimeout" : 2147483647,
"codeSigningID" : "com.spotify.client",
"codeSigningTeamID" : "2FNC3A47ZF",
"codeSigningFlags" : 570450689,
"codeSigningValidationCategory" : 4,
"codeSigningTrustLevel" : 0,
Finally, in the same log, scroll all the way to the bottom and look for anything similar to the following that mentions trialInfo, rollouts, deploymentId, or treatmentId.
},
"legacyInfo" : {
"threadTriggered" : {
"queue" : "com.apple.root.utility-qos"
}
},
"logWritingSignature" : "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
"trialInfo" : {
"rollouts" : [
{
"rolloutId" : "xxxxxxxxxxxxxxxxxxxxxxxx",
"factorPackIds" : {
"SIRI_FIND_MY_CONFIGURATION_FILES" : "xxxxxxxxxxxxxxxxxxxxxxxx"
},
"deploymentId" : xxxxxxxxx
},
{
"rolloutId" : "xxxxxxxxxxxxxxxxxxxxxxxx",
"factorPackIds" : {
"BIFROST_DEV_2" : "xxxxxxxxxxxxxxxxxxxxxxxx"
},
"deploymentId" : xxxxxxxxx
}
],
"experiments" : [
{
"treatmentId" : "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"experimentId" : "xxxxxxxxxxxxxxxxxxxxxxxx",
"deploymentId" : xxxxxxxxx
},
{
"treatmentId" : "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"experimentId" : "xxxxxxxxxxxxxxxxxxxxxxxx",
"deploymentId" : xxxxxxxxx
}
]
}