Starting mcstransd: 
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[   26.222624][   T24] audit: type=1800 audit(1559886235.323:33): pid=6844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0
[....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed!

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   41.277124][   T24] kauditd_printk_skb: 1 callbacks suppressed
[   41.277131][   T24] audit: type=1400 audit(1559886250.383:35): avc:  denied  { map } for  pid=7040 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.0.221' (ECDSA) to the list of known hosts.
[   47.230590][   T24] audit: type=1400 audit(1559886256.333:36): avc:  denied  { map } for  pid=7052 comm="syz-executor633" path="/root/syz-executor633686180" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
executing program
[   54.202887][ T7053] IPVS: ftp: loaded support on port[0] = 21
[   60.092481][ T7052] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff8881154fc400 (size 128):
  comm "syz-executor633", pid 7053, jiffies 4294942670 (age 7.960s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<00000000f75a746c>] kmem_cache_alloc_trace+0x13d/0x280
    [<00000000c8c2cfee>] packet_setsockopt+0xcad/0x1160
    [<00000000378a346c>] __sys_setsockopt+0x98/0x120
    [<000000000f9ca17f>] __x64_sys_setsockopt+0x26/0x30
    [<000000003debe27f>] do_syscall_64+0x76/0x1a0
    [<0000000020f89c0b>] entry_SYSCALL_64_after_hwframe+0x44/0xa9