Don't even need that. Just use the loads:
Weird and ineffcient, very much so, but computationally complete!
Incidentally, anything that is Turing-complete, i.e., computationally useful, is recursively complete. That is, consider: even if we had an OS that was "perfectly" secure, we must still allow useful programs to run on top of it; which therefore are themselves capable of running anything. We might move the vulnerability off the OS, but the programs are still perfectly vulnerable, and subject to, say, DDoSing or worms or other misbehavior.
With such a scheme, you're also implicitly forcing all the useful functions into user-land, where either the developer must write it anew every time (forcing myriad awful variations of standard solved problems), or more likely, a small number of very frequently used libraries of middling mediocrity (take wx for example, or so I've heard). Either way, it's worse for the customer, and more vulnerable for everyone (because remember, it's not just your computer, or router or IoT gimmick, but potentially everyone else connected to the thing, too).
Tim