ntdll: Don't use a real guard page at the bottom of the stack.
commitefffa663308a9c2338dd1ed577fd40414e982f10
authorAlexandre Julliard <julliard@winehq.org>
Sat, 17 Dec 2005 17:47:03 +0000 (17 18:47 +0100)
committerAlexandre Julliard <julliard@winehq.org>
Sat, 17 Dec 2005 17:47:03 +0000 (17 18:47 +0100)
treecae8c5ab950ed9ae5bc3c7631421e4c41d924370
parentf0c55e7d52a25285837b0907f682391ee95a27a5
ntdll: Don't use a real guard page at the bottom of the stack.
A no-access page is enough, we can't properly raise an overflow
exception anyway.
dlls/kernel/process.c
dlls/ntdll/thread.c
dlls/ntdll/virtual.c