StgCRun skips guard page on Windows
@Phyx noticed that the x86-64 StgCRun
implementation can break Windows' stack protection (possibly leading to #18548 and other bugs). Specifically, StgCRun
reserves 8kBytes of stack, without touching an address every 4kB. This means that we could jump over the guard page, causing the process to crash.