Figure 11 — Safe Turing Abstractions
Church is the armor (interface, security). Turing is the sword inside (implementation, hidden and atomic). Callers see only the Church interface: CALL to enter, RETURN to exit. The internal Turing instructions (DREAD, DWRITE, IADD, etc.) are invisible, non-interruptible, and impossible to reach without a valid Golden Token.
Abstraction Structure: Armor + Sword
Caller
holds GT with E permission
CALL
Church Interface (The Armor)
Visible Church Operations
CALL
RETURN
LOAD
SAVE
LAMBDA
TPERM
+ mLoad/mSave gate on every access
E perm validated
Turing Implementation (The Sword — Hidden, Atomic)
Minimal Turing ISA — 11 integer-only instructions, no FP
DREAD
data read (R)
DWRITE
data write (W)
IADD
integer add
ISUB
integer sub
BFEXT
bitfield extract
BFINS
bitfield insert
MCMP
multi compare
BRANCH
conditional
SHL
shift left
SHR
shift right
RETURN
exit (shared)
DATA Objects: accessed via DREAD (R perm) / DWRITE (W perm) with bounds validation
DR0-DR15 (Data Registers)
Condition Flags (N, Z, C, V)
RETURN
RETURN to caller
What the Caller Sees vs. What's Inside
Caller's View (Church Only)
CALL Abacus.add(DR1=5, DR2=3)
... abstraction executes (opaque) ...
RETURN → DR1 = 8 (result)
Caller cannot inspect, modify, or bypass the implementation
No DREAD, IADD, BRANCH visible — domain purity enforced
Inside the Abstraction (Turing)
DREAD DR2, [data_ptr] ; load operand
IADD DR1, DR1, DR2 ; compute sum
DWRITE [result_ptr], DR1 ; store
RETURN ; exit to Church
Atomic: cannot be interrupted, preempted, or observed
Security Guarantees
1
Entry Only via CALL
Requires GT with E permission, validated by mLoad
2
Exit Only via RETURN
No other path out; no longjmp, no exception bypass
3
Turing Is Hidden
Caller in Church domain cannot issue Turing instructions
4
Atomic Execution
No preemption, no interleaving inside abstraction
5
DATA Objects Gated
DREAD/DWRITE pass through mLoad with R/W checks
6
Domain Purity
Church ↔ Turing crossing only at CALL/RETURN boundary
Church is the armor (interface, security, unforgeable GT gate). Turing is the sword (implementation, raw power, hidden inside).
Built-in Safe Turing Abstractions
Abstraction
Church Interface
Hidden Turing Implementation
GC (PP250)
CALL GC → RETURN
Scan/Identify/Clear/Flip (DREAD, DWRITE, BRANCH)
Abacus
CALL Abacus.add → RETURN
IADD, ISUB, SHL, SHR on DR0-DR15
SlideRule
CALL SlideRule.multiply → RETURN
BFEXT, BFINS, IADD (fixed-point math)
Threads
CALL Threads.yield → RETURN
DREAD/DWRITE thread control blocks, BRANCH
CapabilityMgr
CALL CapMgr.mint → RETURN
DWRITE new GT, MCMP version, BFINS perms
Church interface (the armor)
Turing implementation (the sword)
DATA objects (bridge domain)
Domain purity enforcement