I don't think there's a safe in-process way to safely detect the patch, so unfortunately disabling features depending on it after fork on older kernels or simply not activating them at all seems like the only viable option. Can't work around it since the patch may be backported.