Hi,Thanks for your quick reply.
I've read the Chapter 13 AHB to IP Bridge (AIPSTZ) carefully, and I printed the value of registers belonging to AIPSTZ, just before DMA transmission between secure memory and secure peripheral in Secure World.
The result is that:
1.for all masters:①they are trusted for write&read accesses ②accesses from them are not forced to user-mode ③write accesses from them are not bufferable by AIPSTZ.
2.for all Off-platform Peripheral:①they allow write accesses and don't need supervisor privilege level for accesses ②accesses from an untrusted master are allowed ③write accesses to them are not bufferable AIPSTZ.
Also, sect.13.4 Access Protections mention that “IP bus peripherals are subject to access control policies set in both CSU registers and AIPSTZ registers. An access is blocked if it is denied by either policy.”
The information printed shows that the AIPSTZ is not the crux of the matter. Finally I solved it by setting the registers of CSU.
Thanks again.
Best regards.