In this first part of the course we'll be exploring Arm's weakly-ordered memory model, in which memory accesses satisfying certain conditions are permitted to be freely reordered with respect to one another.

You'll learn:

  • Why Arm defines a weakly-ordered memory model.

  • The rules dictating whether two memory accesses are permitted to be reordered.

  • How to use barriers to manually enforce ordering between reorderable accesses.

  • How to descope barriers to mitigate any potential impacts on system performance.

Total runtime: 3 hours 14 mins.