ntdll: Don't use a real guard page at the bottom of the stack.
A no-access page is enough, we can't properly raise an overflow
exception anyway.
diff --git a/dlls/kernel/process.c b/dlls/kernel/process.c
index 42c4033..e75fccb 100644
--- a/dlls/kernel/process.c
+++ b/dlls/kernel/process.c
@@ -994,7 +994,7 @@
NtCurrentTeb()->Tib.StackLimit = (char *)base + page_size;
/* setup guard page */
- VirtualProtect( base, 1, PAGE_READWRITE | PAGE_GUARD, NULL );
+ VirtualProtect( base, page_size, PAGE_NOACCESS, NULL );
return NtCurrentTeb()->Tib.StackBase;
}