[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[   25.227566][   T24] audit: type=1800 audit(1559791715.577:33): pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0
[   25.250225][   T24] audit: type=1800 audit(1559791715.577:34): pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0
[....] startpar: service(s) returned failure: rsyslog cron ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed!

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   31.493406][   T24] audit: type=1400 audit(1559791721.847:35): avc:  denied  { map } for  pid=7010 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.15.211' (ECDSA) to the list of known hosts.
[   73.434863][   T24] audit: type=1400 audit(1559791763.787:36): avc:  denied  { map } for  pid=7025 comm="syz-executor129" path="/root/syz-executor129529772" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
executing program
[   80.317475][ T7026] IPVS: ftp: loaded support on port[0] = 21
[   86.259385][ T7025] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff888123c28c80 (size 128):
  comm "syz-executor129", pid 7026, jiffies 4294945306 (age 7.980s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<00000000abb5f38e>] kmem_cache_alloc_trace+0x13d/0x280
    [<000000002a6c4c59>] packet_setsockopt+0xcad/0x1160
    [<00000000f5cc782c>] __sys_setsockopt+0x98/0x120
    [<00000000978d7f74>] __x64_sys_setsockopt+0x26/0x30
    [<0000000049e36312>] do_syscall_64+0x76/0x1a0
    [<00000000a9a266c9>] entry_SYSCALL_64_after_hwframe+0x44/0xa9