Filter bootarg for non-debuggable VMs

The condition should have been the opposite:

* debuggable VM: no filtering is required
* non-debuggable VM: filtering is done, while some of args can survive
  if enabled by debug policy.

Bug: 283035363
Bug: 281998898
Test: run testTombstonesAreGeneratedUponKernelCrashOnPvm on a device
where debug policy is not provisioned

Merged-In: Id0f4f5d1777356e78ad995fa16bd3e8c0ff6c7ec
Change-Id: Id0f4f5d1777356e78ad995fa16bd3e8c0ff6c7ec
(cherry picked from commit 32f37ef4e62f45e715a682569300bad585380263)
diff --git a/pvmfw/src/fdt.rs b/pvmfw/src/fdt.rs
index c009971..a1377c4 100644
--- a/pvmfw/src/fdt.rs
+++ b/pvmfw/src/fdt.rs
@@ -742,7 +742,7 @@
     set_or_clear_chosen_flag(fdt, cstr!("avf,strict-boot"), strict_boot)?;
     set_or_clear_chosen_flag(fdt, cstr!("avf,new-instance"), new_instance)?;
 
-    if debuggable {
+    if !debuggable {
         if let Some(bootargs) = read_bootargs_from(fdt)? {
             filter_out_dangerous_bootargs(fdt, &bootargs)?;
         }