landlock: Optimize stack usage when !CONFIG_AUDIT

Until now, each landlock_request struct were allocated on the stack, even
if not really used, because is_access_to_paths_allowed() unconditionally
modified the passed references. Even if the changed landlock_request
variables are not used, the compiler is not smart enough to detect this
case.

To avoid this issue, explicitly disable the related code when
CONFIG_AUDIT is not set, which enables elision of log_request_parent*
and associated caller's stack variables thanks to dead code elimination.
This makes it possible to reduce the stack frame by 32 bytes for the
path_link and path_rename hooks, and by 20 bytes for most other
filesystem hooks.

Here is a summary of scripts/stackdelta before and after this change
when CONFIG_AUDIT is disabled:

current_check_refer_path 560 320 -240
current_check_access_path 328 184 -144
hook_file_open 328 184 -144
is_access_to_paths_allowed 376 360 -16

Also, add extra pointer checks to be more future-proof.

Cc: Günther Noack <gnoack@google.com>
Reported-by: Tingmao Wang <m@maowtm.org>
Closes: https://lore.kernel.org/r/eb86863b-53b0-460b-b223-84dd31d765b9@maowtm.org
Fixes: 2fc80c69df82 ("landlock: Log file-related denials")
Link: https://lore.kernel.org/r/20251219142302.744917-2-mic@digikod.net
Reviewed-by: Günther Noack <gnoack3000@gmail.com>
[mic: Improve stack usage measurement accuracy with scripts/stackdelta]
Signed-off-by: Mickaël Salaün <mic@digikod.net>

+9 -2
+9 -2
security/landlock/fs.c
··· 939 939 } 940 940 path_put(&walker_path); 941 941 942 - if (!allowed_parent1) { 942 + /* 943 + * Check CONFIG_AUDIT to enable elision of log_request_parent* and 944 + * associated caller's stack variables thanks to dead code elimination. 945 + */ 946 + #ifdef CONFIG_AUDIT 947 + if (!allowed_parent1 && log_request_parent1) { 943 948 log_request_parent1->type = LANDLOCK_REQUEST_FS_ACCESS; 944 949 log_request_parent1->audit.type = LSM_AUDIT_DATA_PATH; 945 950 log_request_parent1->audit.u.path = *path; ··· 954 949 ARRAY_SIZE(*layer_masks_parent1); 955 950 } 956 951 957 - if (!allowed_parent2) { 952 + if (!allowed_parent2 && log_request_parent2) { 958 953 log_request_parent2->type = LANDLOCK_REQUEST_FS_ACCESS; 959 954 log_request_parent2->audit.type = LSM_AUDIT_DATA_PATH; 960 955 log_request_parent2->audit.u.path = *path; ··· 963 958 log_request_parent2->layer_masks_size = 964 959 ARRAY_SIZE(*layer_masks_parent2); 965 960 } 961 + #endif /* CONFIG_AUDIT */ 962 + 966 963 return allowed_parent1 && allowed_parent2; 967 964 } 968 965