StgCRun skips guard page on Windows
@Phyx noticed that the x86-64 StgCRun implementation can break Windows' stack protection (possibly leading to #18548 and other bugs). Specifically, StgCRun reserves 8kBytes of stack, without touching an address every 4kB. This means that we could jump over the guard page, causing the process to crash.