I didn't see any warnings with GCC or clang. This is used other places in the kernel as well. gcc version 13.2.1 20230918 (Red Hat 13.2.1-3) (GCC) clang version 17.0.6 (Fedora 17.0.6-2.fc39)
I think Paolo is suggesting this[1][2], guard will mess with the sparse check and cause a warning:
[1] https://patchwork.kernel.org/project/netdevbpf/patch/20240416193039.272997-4-danielj@xxxxxxxxxx/ [2] https://patchwork.kernel.org/project/netdevbpf/patch/20240416193039.272997-6-danielj@xxxxxxxxxx/