Figure 11 — Safe Turing Abstractions

Church is the armor (interface, security). Turing is the sword inside (implementation, hidden and atomic). Callers see only the Church interface: CALL to enter, RETURN to exit. The internal Turing instructions (DREAD, DWRITE, IADD, etc.) are invisible, non-interruptible, and impossible to reach without a valid Golden Token.

Abstraction Structure: Armor + Sword Caller holds GT with E permission CALL Church Interface (The Armor) Visible Church Operations CALL RETURN LOAD SAVE LAMBDA TPERM + mLoad/mSave gate on every access E perm validated Turing Implementation (The Sword — Hidden, Atomic) Minimal Turing ISA — 11 integer-only instructions, no FP DREAD data read (R) DWRITE data write (W) IADD integer add ISUB integer sub BFEXT bitfield extract BFINS bitfield insert MCMP multi compare BRANCH conditional SHL shift left SHR shift right RETURN exit (shared) DATA Objects: accessed via DREAD (R perm) / DWRITE (W perm) with bounds validation DR0-DR15 (Data Registers) Condition Flags (N, Z, C, V) RETURN RETURN to caller What the Caller Sees vs. What's Inside Caller's View (Church Only) CALL Abacus.add(DR1=5, DR2=3) ... abstraction executes (opaque) ... RETURN → DR1 = 8 (result) Caller cannot inspect, modify, or bypass the implementation No DREAD, IADD, BRANCH visible — domain purity enforced Inside the Abstraction (Turing) DREAD DR2, [data_ptr] ; load operand IADD DR1, DR1, DR2 ; compute sum DWRITE [result_ptr], DR1 ; store RETURN ; exit to Church Atomic: cannot be interrupted, preempted, or observed Security Guarantees 1 Entry Only via CALL Requires GT with E permission, validated by mLoad 2 Exit Only via RETURN No other path out; no longjmp, no exception bypass 3 Turing Is Hidden Caller in Church domain cannot issue Turing instructions 4 Atomic Execution No preemption, no interleaving inside abstraction 5 DATA Objects Gated DREAD/DWRITE pass through mLoad with R/W checks 6 Domain Purity Church ↔ Turing crossing only at CALL/RETURN boundary Church is the armor (interface, security, unforgeable GT gate). Turing is the sword (implementation, raw power, hidden inside). Built-in Safe Turing Abstractions Abstraction Church Interface Hidden Turing Implementation GC (PP250) CALL GC → RETURN Scan/Identify/Clear/Flip (DREAD, DWRITE, BRANCH) Abacus CALL Abacus.add → RETURN IADD, ISUB, SHL, SHR on DR0-DR15 SlideRule CALL SlideRule.multiply → RETURN BFEXT, BFINS, IADD (fixed-point math) Threads CALL Threads.yield → RETURN DREAD/DWRITE thread control blocks, BRANCH CapabilityMgr CALL CapMgr.mint → RETURN DWRITE new GT, MCMP version, BFINS perms
Church interface (the armor)
Turing implementation (the sword)
DATA objects (bridge domain)
Domain purity enforcement