Symptoms:
2025-xx-xx xx:21:15,889.889Z vmafd-patch:Patch WARNING vmafd-patch.utils Broken symbolic link detected /etc/ssl/certs/0bf05006.02025-xx-xx xx:21:15,890.890Z vmafd-patch:Patch WARNING vmafd-patch.utils Broken symbolic link detected /etc/ssl/certs/68dd7389.02025-xx-xx xx:21:15,891.891Z vmafd-patch:Patch ERROR vmware_b2b.patching.executor.hook_executor Patch hook 'vmafd-patch:Patch' failed.Traceback (most recent call last): File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/py/vmware_b2b/patching/executor/hook_executor.py", line 74, in executeHook executionResult = systemExtension(args) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/libs/sdk/extensions.py", line 106, in __call__ result = self.extension(*args) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/libs/sdk/extensions.py", line 123, in _func return func(*args) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/payload/components-script/vmafd-patch/__init__.py", line 463, in patchmtch:Patch ERROR vmware_b2b.patching.executor.hook_executor Patch hook 'vmafd-patch:Patch' failed.Traceback (most recent call last): File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/py/vmware_b2b/patching/executor/hook_executor.py", line 74, in executeHook executionResult = systemExtension(args) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/libs/sdk/extensions.py", line 106, in __call__ result = self.extension(*args) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/libs/sdk/extensions.py", line 123, in _func return func(*args) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/payload/components-script/vmafd-patch/__init__.py", line 463, in patch utils.update_path_ownership() File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/payload/components-script/vmafd-patch/utils.py", line 529, in update_path_ownership self.recursive_ownership(etc_ssl_certs_path, etc_ssl_certs_path_mode, root_uid, vmafd_gid) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/payload/components-script/vmafd-patch/utils.py", line 499, in recursive_ownership os.chmod(os.path.join(dirpath, filename), mode)OSError: [Errno 40] Too many levels of symbolic links: '/etc/ssl/certs/ls'2025-05-15T06:21:15.894Z ERROR vmware_b2b.patching.phases.patcher Patch hook Patch got ComponentWrapperError.Traceback (most recent call last): File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/py/vmware_b2b/patching/phases/patcher.py", line 203, in patch _patchComponents(ctx, userData, statusAggregator.reportingQueue) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/py/vmware_b2b/patching/phases/patcher.py", line 85, in _patchComponents executeComponentHook(Hook.Patch, ctx, c, userData, reportingQueue) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/py/vmware_b2b/patching/executor/execution_facade.py", line 98, in executeComponentHook reportQueue, identifier, expectedResultType) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/py/vmware_b2b/patching/executor/execution_facade.py", line 53, in executeHook result = executor.executeHook(scriptFile, hook, args, reportQueue, reportIdentifier) File "/storage/updatemgr/software-updateyguoahd6/stage/scripts/patches/py/vmware_b2b/patching/executor/hook_executor_process.py", line 119, in executeHook raise expatch_errors.ComponentError2025-xx-xxTxx:21:16.896Z WARNING root stopping status aggregation...2025-xx-xxTxx:21:16.897Z ERROR __main__ Patch vCSA failed
VMware Cloud foundation 4.x
VMware vCenter Server 7.x
To resolve this problem, apply the following steps:
find /etc/ssl/certs -maxdepth 1 -type l -exec bash -c 'for link; do [[ -e "$link" ]] || echo "Broken link: $link"; done' bash {} + mkdir symb_linkfind /etc/ssl/certs -maxdepth 1 -type l ! -exec test -e {} \; -exec mv -v {} /symb_link/ \;service-control --stop --all && service-control --start--all