Part 1: What are barriers, and why do we need them?
In this first part of the course we'll be exploring Arm's weakly-ordered memory model, in which memory accesses satisfying certain conditions are permitted to be freely reordered with respect to one another.
You'll learn:
Why Arm defines a weakly-ordered memory model.
The rules dictating whether two memory accesses are permitted to be reordered.
How to use barriers to manually enforce ordering between reorderable accesses.
How to descope barriers to mitigate any potential impacts on system performance.
Total runtime: 3 hours 14 mins.
11 Lessons