Starting mcstransd: 
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[   26.910255][   T26] kauditd_printk_skb: 18 callbacks suppressed
[   26.910261][   T26] audit: type=1800 audit(1578807680.968:39): pid=6934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0
[   26.939758][   T26] audit: type=1800 audit(1578807680.968:40): pid=6934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   29.206736][   T26] audit: type=1400 audit(1578807683.268:41): avc:  denied  { map } for  pid=7103 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.1.50' (ECDSA) to the list of known hosts.
[   35.175914][   T26] audit: type=1400 audit(1578807689.238:42): avc:  denied  { map } for  pid=7117 comm="syz-executor951" path="/root/syz-executor951555593" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
executing program
[   41.928838][ T7120] IPVS: ftp: loaded support on port[0] = 21
[   41.940421][   T26] audit: type=1400 audit(1578807695.998:43): avc:  denied  { create } for  pid=7120 comm="syz-executor951" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   41.957592][ T7120] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0
[   41.972901][   T26] audit: type=1400 audit(1578807695.998:44): avc:  denied  { write } for  pid=7120 comm="syz-executor951" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   42.000812][   T26] audit: type=1400 audit(1578807695.998:45): avc:  denied  { read } for  pid=7120 comm="syz-executor951" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   42.860515][   T47] tipc: TX() has been purged, node left!
[   47.871812][ T7117] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff888120efc760 (size 32):
  comm "syz-executor951", pid 7120, jiffies 4294941466 (age 7.930s)
  hex dump (first 32 bytes):
    2e 67 0c 97 9d ed 90 60 a1 19 60 c9 b4 1d 8b 00  .g.....`..`.....
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<0000000024d4ca08>] __kmalloc_track_caller+0x165/0x300
    [<000000008b0ced93>] kstrdup+0x3a/0x70
    [<00000000c4b01931>] reiserfs_fill_super+0x500/0x1120
    [<00000000b5502d09>] mount_bdev+0x1ce/0x210
    [<0000000000918f45>] get_super_block+0x35/0x40
    [<000000003fe11538>] legacy_get_tree+0x27/0x80
    [<00000000194b3c52>] vfs_get_tree+0x2d/0xe0
    [<00000000c4baac9d>] do_mount+0x97c/0xc80
    [<00000000708b3a73>] __x64_sys_mount+0xc0/0x140
    [<000000005e86d00d>] do_syscall_64+0x73/0x220
    [<000000000572ecd7>] entry_SYSCALL_64_after_hwframe+0x44/0xa9