Hi,
I've a similar problem. I'm able to boot Linux as non-secure guest until it waits for interrupts. I've marked all interrupts as non-secure. The only interrupt that is secure is EPIT1, which is used by my test kernel. Linux uses GPT for scheduling, so there is no conflict. After that I configured the CSU to allow also the non-secure world to access the peripherals (using the CSL registers). Everythings works as expected, but the non-secure interrupts are delivered as fast-interrupts, which is not the intended behaviour following my understanding of Armv7 TrustZone, and the TZIC. The oddity is: obviously the non-secure guest can unmask the interrupts configured as non-secure. But they are delivered as secure ones.
What I'm missing? Is there another device on the SoC, or some configuration in the CSU, which undermines my attempts?
@ab: Did you find any solution to the problem?