ntdll: Don't use a real guard page at the bottom of the stack.
A no-access page is enough, we can't properly raise an overflow
exception anyway.
diff --git a/dlls/kernel/process.c b/dlls/kernel/process.c
index 42c4033..e75fccb 100644
--- a/dlls/kernel/process.c
+++ b/dlls/kernel/process.c
@@ -994,7 +994,7 @@
     NtCurrentTeb()->Tib.StackLimit    = (char *)base + page_size;
 
     /* setup guard page */
-    VirtualProtect( base, 1, PAGE_READWRITE | PAGE_GUARD, NULL );
+    VirtualProtect( base, page_size, PAGE_NOACCESS, NULL );
     return NtCurrentTeb()->Tib.StackBase;
 }