The following pairings from Table , enumerate all the combinations of memory-barrier pairings that portable software may depend on.