Migration from GFE_BUG_V2 (and friends) to GFE_BUG

Per go/gfe-bug-improvements GFE_BUGs are getting stable IDs to allow for monitoring and alerting. To achieve that, a temporary set of V2 macros was added and the codebase was migrated to using the V2 macros. Now that migration is complete, the old-style (sans _V2) macros were changed to also take bug_id parameter, which makes the V2 set obsolete. To complete the transition, the codebase is being migrated back to GFE_BUG macros. Once done, V2 macros will be removed.

PiperOrigin-RevId: 363326543
Change-Id: I180133ca17d00d39a14175210004feccbd4eadc0
diff --git a/quic/core/quic_packet_creator.cc b/quic/core/quic_packet_creator.cc
index 9b476b1..42aebe5 100644
--- a/quic/core/quic_packet_creator.cc
+++ b/quic/core/quic_packet_creator.cc
@@ -46,12 +46,12 @@
     case ENCRYPTION_ZERO_RTT:
       return ZERO_RTT_PROTECTED;
     case ENCRYPTION_FORWARD_SECURE:
-      QUIC_BUG_V2(quic_bug_12398_1)
+      QUIC_BUG(quic_bug_12398_1)
           << "Try to derive long header type for packet with encryption level: "
           << level;
       return INVALID_PACKET_TYPE;
     default:
-      QUIC_BUG_V2(quic_bug_10752_1) << level;
+      QUIC_BUG(quic_bug_10752_1) << level;
       return INVALID_PACKET_TYPE;
   }
 }
@@ -171,9 +171,8 @@
 
   max_packet_length_ = length;
   max_plaintext_size_ = framer_->GetMaxPlaintextSize(max_packet_length_);
-  QUIC_BUG_IF_V2(quic_bug_12398_2,
-                 max_plaintext_size_ - PacketHeaderSize() <
-                     MinPlaintextPacketSize(framer_->version()))
+  QUIC_BUG_IF(quic_bug_12398_2, max_plaintext_size_ - PacketHeaderSize() <
+                                    MinPlaintextPacketSize(framer_->version()))
       << "Attempted to set max packet length too small";
 }
 
@@ -195,7 +194,7 @@
 void QuicPacketCreator::SetSoftMaxPacketLength(QuicByteCount length) {
   QUICHE_DCHECK(CanSetMaxPacketLength());
   if (length > max_packet_length_) {
-    QUIC_BUG_V2(quic_bug_10752_2)
+    QUIC_BUG(quic_bug_10752_2)
         << ENDPOINT
         << "Try to increase max_packet_length_ in "
            "SetSoftMaxPacketLength, use SetMaxPacketLength instead.";
@@ -240,7 +239,7 @@
     QuicPacketCount max_packets_in_flight) {
   if (!queued_frames_.empty()) {
     // Don't change creator state if there are frames queued.
-    QUIC_BUG_V2(quic_bug_10752_3)
+    QUIC_BUG(quic_bug_10752_3)
         << "Called UpdatePacketNumberLength with " << queued_frames_.size()
         << " queued_frames.  First frame type:" << queued_frames_.front().type
         << " last frame type:" << queued_frames_.back().type;
@@ -273,7 +272,7 @@
     QuicPacketCount max_packets_in_flight) {
   if (!queued_frames_.empty()) {
     // Don't change creator state if there are frames queued.
-    QUIC_BUG_V2(quic_bug_10752_4)
+    QUIC_BUG(quic_bug_10752_4)
         << "Called SkipNPacketNumbers with " << queued_frames_.size()
         << " queued_frames.  First frame type:" << queued_frames_.front().type
         << " last frame type:" << queued_frames_.back().type;
@@ -338,7 +337,7 @@
       frame->stream_frame.data_length < data_size) {
     const std::string error_details =
         "Client hello won't fit in a single packet.";
-    QUIC_BUG_V2(quic_bug_10752_5)
+    QUIC_BUG(quic_bug_10752_5)
         << error_details << " Constructed stream frame length: "
         << frame->stream_frame.data_length << " CHLO length: " << data_size;
     delegate_->OnUnrecoverableError(QUIC_CRYPTO_CHLO_TOO_LARGE, error_details);
@@ -425,14 +424,13 @@
               GetRetryTokenLengthLength(), GetLengthLength(), offset) ||
       latched_hard_max_packet_length_ > 0);
 
-  QUIC_BUG_IF_V2(quic_bug_12398_3,
-                 !HasRoomForStreamFrame(id, offset, data_size))
+  QUIC_BUG_IF(quic_bug_12398_3, !HasRoomForStreamFrame(id, offset, data_size))
       << "No room for Stream frame, BytesFree: " << BytesFree()
       << " MinStreamFrameSize: "
       << QuicFramer::GetMinStreamFrameSize(framer_->transport_version(), id,
                                            offset, true, data_size);
 
-  QUIC_BUG_IF_V2(quic_bug_12398_4, data_size == 0 && !fin)
+  QUIC_BUG_IF(quic_bug_12398_4, data_size == 0 && !fin)
       << "Creating a stream frame for stream ID:" << id
       << " with no data or fin.";
   size_t min_frame_size = QuicFramer::GetMinStreamFrameSize(
@@ -482,7 +480,7 @@
 }
 
 void QuicPacketCreator::OnSerializedPacket() {
-  QUIC_BUG_IF_V2(quic_bug_12398_5, packet_.encrypted_buffer == nullptr);
+  QUIC_BUG_IF(quic_bug_12398_5, packet_.encrypted_buffer == nullptr);
 
   SerializedPacket packet(std::move(packet_));
   ClearPacket();
@@ -500,7 +498,7 @@
   packet_.has_ack_frequency = false;
   packet_.has_message = false;
   packet_.fate = SEND_TO_WRITER;
-  QUIC_BUG_IF_V2(quic_bug_12398_6, packet_.release_encrypted_buffer != nullptr)
+  QUIC_BUG_IF(quic_bug_12398_6, packet_.release_encrypted_buffer != nullptr)
       << "packet_.release_encrypted_buffer should be empty";
   packet_.release_encrypted_buffer = nullptr;
   QUICHE_DCHECK(packet_.retransmittable_frames.empty());
@@ -514,10 +512,9 @@
     size_t padding_size,
     char* buffer,
     size_t buffer_len) {
-  QUIC_BUG_IF_V2(quic_bug_12398_7,
-                 packet.encryption_level != ENCRYPTION_INITIAL);
-  QUIC_BUG_IF_V2(quic_bug_12398_8, packet.nonretransmittable_frames.empty() &&
-                                       packet.retransmittable_frames.empty())
+  QUIC_BUG_IF(quic_bug_12398_7, packet.encryption_level != ENCRYPTION_INITIAL);
+  QUIC_BUG_IF(quic_bug_12398_8, packet.nonretransmittable_frames.empty() &&
+                                    packet.retransmittable_frames.empty())
       << "Attempt to serialize empty ENCRYPTION_INITIAL packet in coalesced "
          "packet";
   ScopedPacketContextSwitcher switcher(
@@ -526,13 +523,13 @@
       packet.packet_number_length, packet.encryption_level, &packet_);
   for (const QuicFrame& frame : packet.nonretransmittable_frames) {
     if (!AddFrame(frame, packet.transmission_type)) {
-      QUIC_BUG_V2(quic_bug_10752_6) << "Failed to serialize frame: " << frame;
+      QUIC_BUG(quic_bug_10752_6) << "Failed to serialize frame: " << frame;
       return 0;
     }
   }
   for (const QuicFrame& frame : packet.retransmittable_frames) {
     if (!AddFrame(frame, packet.transmission_type)) {
-      QUIC_BUG_V2(quic_bug_10752_7) << "Failed to serialize frame: " << frame;
+      QUIC_BUG(quic_bug_10752_7) << "Failed to serialize frame: " << frame;
       return 0;
     }
   }
@@ -541,7 +538,7 @@
     QUIC_DVLOG(2) << ENDPOINT << "Add padding of size: " << padding_size;
     if (!AddFrame(QuicFrame(QuicPaddingFrame(padding_size)),
                   packet.transmission_type)) {
-      QUIC_BUG_V2(quic_bug_10752_8)
+      QUIC_BUG(quic_bug_10752_8)
           << "Failed to add padding of size " << padding_size
           << " when serializing ENCRYPTION_INITIAL "
              "packet in coalesced packet";
@@ -593,12 +590,12 @@
   QuicDataWriter writer(kMaxOutgoingPacketSize, encrypted_buffer);
   size_t length_field_offset = 0;
   if (!framer_->AppendPacketHeader(header, &writer, &length_field_offset)) {
-    QUIC_BUG_V2(quic_bug_10752_9) << "AppendPacketHeader failed";
+    QUIC_BUG(quic_bug_10752_9) << "AppendPacketHeader failed";
     return;
   }
 
   // Create a Stream frame with the remaining space.
-  QUIC_BUG_IF_V2(quic_bug_12398_9, iov_offset == write_length && !fin)
+  QUIC_BUG_IF(quic_bug_12398_9, iov_offset == write_length && !fin)
       << "Creating a stream frame with no data or fin.";
   const size_t remaining_data_size = write_length - iov_offset;
   size_t min_frame_size = QuicFramer::GetMinStreamFrameSize(
@@ -634,18 +631,18 @@
   // into one method that takes a QuicStreamFrame, if warranted.
   bool omit_frame_length = !needs_padding;
   if (!framer_->AppendTypeByte(QuicFrame(frame), omit_frame_length, &writer)) {
-    QUIC_BUG_V2(quic_bug_10752_10) << "AppendTypeByte failed";
+    QUIC_BUG(quic_bug_10752_10) << "AppendTypeByte failed";
     return;
   }
   if (!framer_->AppendStreamFrame(frame, omit_frame_length, &writer)) {
-    QUIC_BUG_V2(quic_bug_10752_11) << "AppendStreamFrame failed";
+    QUIC_BUG(quic_bug_10752_11) << "AppendStreamFrame failed";
     return;
   }
   if (needs_padding &&
       plaintext_bytes_written < MinPlaintextPacketSize(framer_->version()) &&
       !writer.WritePaddingBytes(MinPlaintextPacketSize(framer_->version()) -
                                 plaintext_bytes_written)) {
-    QUIC_BUG_V2(quic_bug_10752_12) << "Unable to add padding bytes";
+    QUIC_BUG(quic_bug_10752_12) << "Unable to add padding bytes";
     return;
   }
 
@@ -664,7 +661,7 @@
       GetStartOfEncryptedData(framer_->transport_version(), header),
       writer.length(), kMaxOutgoingPacketSize, encrypted_buffer);
   if (encrypted_length == 0) {
-    QUIC_BUG_V2(quic_bug_10752_13)
+    QUIC_BUG(quic_bug_10752_13)
         << "Failed to encrypt packet number " << header.packet_number;
     return;
   }
@@ -751,7 +748,7 @@
   if (packet_.encrypted_buffer != nullptr) {
     const std::string error_details =
         "Packet's encrypted buffer is not empty before serialization";
-    QUIC_BUG_V2(quic_bug_10752_14) << error_details;
+    QUIC_BUG(quic_bug_10752_14) << error_details;
     delegate_->OnUnrecoverableError(QUIC_FAILED_TO_SERIALIZE_PACKET,
                                     error_details);
     return false;
@@ -759,8 +756,8 @@
   ScopedSerializationFailureHandler handler(this);
 
   QUICHE_DCHECK_LT(0u, encrypted_buffer_len);
-  QUIC_BUG_IF_V2(quic_bug_12398_10,
-                 queued_frames_.empty() && pending_padding_bytes_ == 0)
+  QUIC_BUG_IF(quic_bug_12398_10,
+              queued_frames_.empty() && pending_padding_bytes_ == 0)
       << "Attempt to serialize empty packet";
   QuicPacketHeader header;
   // FillPacketHeader increments packet_number_.
@@ -785,7 +782,7 @@
   if (!framer_->HasEncrypterOfEncryptionLevel(packet_.encryption_level)) {
     // TODO(fayang): Use QUIC_MISSING_WRITE_KEYS for serialization failures due
     // to missing keys.
-    QUIC_BUG_V2(quic_bug_10752_15)
+    QUIC_BUG(quic_bug_10752_15)
         << ENDPOINT << "Attempting to serialize " << header
         << QuicFramesToString(queued_frames_) << " at missing encryption_level "
         << packet_.encryption_level << " using " << framer_->version();
@@ -799,7 +796,7 @@
       framer_->BuildDataPacket(header, queued_frames_, encrypted_buffer.buffer,
                                packet_size_, packet_.encryption_level);
   if (length == 0) {
-    QUIC_BUG_V2(quic_bug_10752_16)
+    QUIC_BUG(quic_bug_10752_16)
         << "Failed to serialize " << QuicFramesToString(queued_frames_)
         << " at encryption_level: " << packet_.encryption_level
         << ", needs_full_padding_: " << needs_full_padding_
@@ -828,7 +825,7 @@
       GetStartOfEncryptedData(framer_->transport_version(), header), length,
       encrypted_buffer_len, encrypted_buffer.buffer);
   if (encrypted_length == 0) {
-    QUIC_BUG_V2(quic_bug_10752_17)
+    QUIC_BUG(quic_bug_10752_17)
         << "Failed to encrypt packet number " << packet_.packet_number;
     return false;
   }
@@ -844,8 +841,8 @@
 
 std::unique_ptr<SerializedPacket>
 QuicPacketCreator::SerializeConnectivityProbingPacket() {
-  QUIC_BUG_IF_V2(quic_bug_12398_11,
-                 VersionHasIetfQuicFrames(framer_->transport_version()))
+  QUIC_BUG_IF(quic_bug_12398_11,
+              VersionHasIetfQuicFrames(framer_->transport_version()))
       << "Must not be version 99 to serialize padded ping connectivity probe";
   RemoveSoftMaxPacketLength();
   QuicPacketHeader header;
@@ -883,8 +880,8 @@
 std::unique_ptr<SerializedPacket>
 QuicPacketCreator::SerializePathChallengeConnectivityProbingPacket(
     const QuicPathFrameBuffer& payload) {
-  QUIC_BUG_IF_V2(quic_bug_12398_12,
-                 !VersionHasIetfQuicFrames(framer_->transport_version()))
+  QUIC_BUG_IF(quic_bug_12398_12,
+              !VersionHasIetfQuicFrames(framer_->transport_version()))
       << "Must be version 99 to serialize path challenge connectivity probe, "
          "is version "
       << framer_->transport_version();
@@ -926,8 +923,8 @@
 QuicPacketCreator::SerializePathResponseConnectivityProbingPacket(
     const QuicCircularDeque<QuicPathFrameBuffer>& payloads,
     const bool is_padded) {
-  QUIC_BUG_IF_V2(quic_bug_12398_13,
-                 !VersionHasIetfQuicFrames(framer_->transport_version()))
+  QUIC_BUG_IF(quic_bug_12398_13,
+              !VersionHasIetfQuicFrames(framer_->transport_version()))
       << "Must be version 99 to serialize path response connectivity probe, is "
          "version "
       << framer_->transport_version();
@@ -998,7 +995,7 @@
     const bool is_padded,
     EncryptionLevel level) {
   if (payloads.empty()) {
-    QUIC_BUG_V2(quic_bug_12398_14)
+    QUIC_BUG(quic_bug_12398_14)
         << "Attempt to generate connectivity response with no request payloads";
     return 0;
   }
@@ -1054,12 +1051,12 @@
     char* buffer,
     size_t buffer_len) {
   if (HasPendingFrames()) {
-    QUIC_BUG_V2(quic_bug_10752_18)
+    QUIC_BUG(quic_bug_10752_18)
         << "Try to serialize coalesced packet with pending frames";
     return 0;
   }
   RemoveSoftMaxPacketLength();
-  QUIC_BUG_IF_V2(quic_bug_12398_15, coalesced.length() == 0)
+  QUIC_BUG_IF(quic_bug_12398_15, coalesced.length() == 0)
       << "Attempt to serialize empty coalesced packet";
   size_t packet_length = 0;
   if (coalesced.initial_packet() != nullptr) {
@@ -1075,7 +1072,7 @@
     size_t initial_length = ReserializeInitialPacketInCoalescedPacket(
         *coalesced.initial_packet(), padding_size, buffer, buffer_len);
     if (initial_length == 0) {
-      QUIC_BUG_V2(quic_bug_10752_19)
+      QUIC_BUG(quic_bug_10752_19)
           << "Failed to reserialize ENCRYPTION_INITIAL packet in "
              "coalesced packet";
       return 0;
@@ -1201,9 +1198,9 @@
 
 bool QuicPacketCreator::ConsumeRetransmittableControlFrame(
     const QuicFrame& frame) {
-  QUIC_BUG_IF_V2(quic_bug_12398_16, IsControlFrame(frame.type) &&
-                                        !GetControlFrameId(frame) &&
-                                        frame.type != PING_FRAME)
+  QUIC_BUG_IF(quic_bug_12398_16, IsControlFrame(frame.type) &&
+                                     !GetControlFrameId(frame) &&
+                                     frame.type != PING_FRAME)
       << "Adding a control frame with no control frame id: " << frame;
   QUICHE_DCHECK(QuicUtils::IsRetransmittableFrame(frame.type)) << frame;
   MaybeBundleAckOpportunistically();
@@ -1221,7 +1218,7 @@
     return false;
   }
   const bool success = AddFrame(frame, next_transmission_type_);
-  QUIC_BUG_IF_V2(quic_bug_10752_20, !success)
+  QUIC_BUG_IF(quic_bug_10752_20, !success)
       << "Failed to add frame:" << frame
       << " transmission_type:" << next_transmission_type_;
   return success;
@@ -1231,13 +1228,13 @@
                                                 size_t write_length,
                                                 QuicStreamOffset offset,
                                                 StreamSendingState state) {
-  QUIC_BUG_IF_V2(quic_bug_10752_21, !flusher_attached_)
+  QUIC_BUG_IF(quic_bug_10752_21, !flusher_attached_)
       << "Packet flusher is not attached when "
          "generator tries to write stream data.";
   bool has_handshake = QuicUtils::IsCryptoStreamId(transport_version(), id);
   MaybeBundleAckOpportunistically();
   bool fin = state != NO_FIN;
-  QUIC_BUG_IF_V2(quic_bug_12398_17, has_handshake && fin)
+  QUIC_BUG_IF(quic_bug_12398_17, has_handshake && fin)
       << "Handshake packets should never send a fin";
   // To make reasoning about crypto frames easier, we don't combine them with
   // other retransmittable frames in a single packet.
@@ -1253,8 +1250,7 @@
   }
 
   if (!fin && (write_length == 0)) {
-    QUIC_BUG_V2(quic_bug_10752_22)
-        << "Attempt to consume empty data without FIN.";
+    QUIC_BUG(quic_bug_10752_22) << "Attempt to consume empty data without FIN.";
     return QuicConsumedData(0, false);
   }
   // We determine if we can enter the fast path before executing
@@ -1277,7 +1273,7 @@
                                         next_transmission_type_, &frame)) {
       // The creator is always flushed if there's not enough room for a new
       // stream frame before ConsumeData, so ConsumeData should always succeed.
-      QUIC_BUG_V2(quic_bug_10752_23) << "Failed to ConsumeData, stream:" << id;
+      QUIC_BUG(quic_bug_10752_23) << "Failed to ConsumeData, stream:" << id;
       return QuicConsumedData(0, false);
     }
 
@@ -1341,7 +1337,7 @@
     if (bytes_consumed == 0) {
       const std::string error_details =
           "Failed in CreateAndSerializeStreamFrame.";
-      QUIC_BUG_V2(quic_bug_10752_24) << error_details;
+      QUIC_BUG(quic_bug_10752_24) << error_details;
       delegate_->OnUnrecoverableError(QUIC_FAILED_TO_SERIALIZE_PACKET,
                                       error_details);
       break;
@@ -1358,7 +1354,7 @@
                                             QuicStreamOffset offset) {
   QUIC_DVLOG(2) << "ConsumeCryptoData " << level << " write_length "
                 << write_length << " offset " << offset;
-  QUIC_BUG_IF_V2(quic_bug_10752_25, !flusher_attached_)
+  QUIC_BUG_IF(quic_bug_10752_25, !flusher_attached_)
       << "Packet flusher is not attached when "
          "generator tries to write crypto data.";
   MaybeBundleAckOpportunistically();
@@ -1384,7 +1380,7 @@
       // The only pending data in the packet is non-retransmittable frames. I'm
       // assuming here that they won't occupy so much of the packet that a
       // CRYPTO frame won't fit.
-      QUIC_BUG_V2(quic_bug_10752_26)
+      QUIC_BUG(quic_bug_10752_26)
           << "Failed to ConsumeCryptoData at level " << level;
       return 0;
     }
@@ -1401,7 +1397,7 @@
 void QuicPacketCreator::GenerateMtuDiscoveryPacket(QuicByteCount target_mtu) {
   // MTU discovery frames must be sent by themselves.
   if (!CanSetMaxPacketLength()) {
-    QUIC_BUG_V2(quic_bug_10752_27)
+    QUIC_BUG(quic_bug_10752_27)
         << "MTU discovery packets should only be sent when no other "
         << "frames needs to be sent.";
     return;
@@ -1419,7 +1415,7 @@
   FlushCurrentPacket();
   // The only reason AddFrame can fail is that the packet is too full to fit in
   // a ping.  This is not possible for any sane MTU.
-  QUIC_BUG_IF_V2(quic_bug_10752_28, !success)
+  QUIC_BUG_IF(quic_bug_10752_28, !success)
       << "Failed to send path MTU target_mtu:" << target_mtu
       << " transmission_type:" << next_transmission_type_;
 
@@ -1438,20 +1434,20 @@
   }
   const bool flushed =
       FlushAckFrame(delegate_->MaybeBundleAckOpportunistically());
-  QUIC_BUG_IF_V2(quic_bug_10752_29, !flushed)
+  QUIC_BUG_IF(quic_bug_10752_29, !flushed)
       << "Failed to flush ACK frame. encryption_level:"
       << packet_.encryption_level;
 }
 
 bool QuicPacketCreator::FlushAckFrame(const QuicFrames& frames) {
-  QUIC_BUG_IF_V2(quic_bug_10752_30, !flusher_attached_)
+  QUIC_BUG_IF(quic_bug_10752_30, !flusher_attached_)
       << "Packet flusher is not attached when "
          "generator tries to send ACK frame.";
   // MaybeBundleAckOpportunistically could be called nestedly when sending a
   // control frame causing another control frame to be sent.
-  QUIC_BUG_IF_V2(quic_bug_12398_18,
-                 GetQuicReloadableFlag(quic_single_ack_in_packet2) &&
-                     !frames.empty() && has_ack())
+  QUIC_BUG_IF(quic_bug_12398_18,
+              GetQuicReloadableFlag(quic_single_ack_in_packet2) &&
+                  !frames.empty() && has_ack())
       << "Trying to flush " << frames << " when there is ACK queued";
   for (const auto& frame : frames) {
     QUICHE_DCHECK(frame.type == ACK_FRAME || frame.type == STOP_WAITING_FRAME);
@@ -1469,7 +1465,7 @@
       return false;
     }
     const bool success = AddFrame(frame, next_transmission_type_);
-    QUIC_BUG_IF_V2(quic_bug_10752_31, !success) << "Failed to flush " << frame;
+    QUIC_BUG_IF(quic_bug_10752_31, !success) << "Failed to flush " << frame;
   }
   return true;
 }
@@ -1491,7 +1487,7 @@
   flusher_attached_ = false;
   if (GetQuicFlag(FLAGS_quic_export_write_path_stats_at_server)) {
     if (!write_start_packet_number_.IsInitialized()) {
-      QUIC_BUG_V2(quic_bug_10752_32)
+      QUIC_BUG(quic_bug_10752_32)
           << "write_start_packet_number is not initialized";
       return;
     }
@@ -1525,7 +1521,7 @@
 
 MessageStatus QuicPacketCreator::AddMessageFrame(QuicMessageId message_id,
                                                  QuicMemSliceSpan message) {
-  QUIC_BUG_IF_V2(quic_bug_10752_33, !flusher_attached_)
+  QUIC_BUG_IF(quic_bug_10752_33, !flusher_attached_)
       << "Packet flusher is not attached when "
          "generator tries to add message frame.";
   MaybeBundleAckOpportunistically();
@@ -1539,7 +1535,7 @@
   QuicMessageFrame* frame = new QuicMessageFrame(message_id, message);
   const bool success = AddFrame(QuicFrame(frame), next_transmission_type_);
   if (!success) {
-    QUIC_BUG_V2(quic_bug_10752_34) << "Failed to send message " << message_id;
+    QUIC_BUG(quic_bug_10752_34) << "Failed to send message " << message_id;
     delete frame;
     return MESSAGE_STATUS_INTERNAL_ERROR;
   }
@@ -1603,8 +1599,7 @@
     return serialized_frame_length;
   }
   if (BytesFree() < serialized_frame_length) {
-    QUIC_BUG_V2(quic_bug_10752_35)
-        << ENDPOINT << "Frame does not fit: " << frame;
+    QUIC_BUG(quic_bug_10752_35) << ENDPOINT << "Frame does not fit: " << frame;
     return 0;
   }
   // Please note bytes_free does not take |frame|'s expansion into account.
@@ -1818,7 +1813,7 @@
 
   bool success = AddFrame(QuicFrame(QuicPaddingFrame(padding_bytes)),
                           packet_.transmission_type);
-  QUIC_BUG_IF_V2(quic_bug_10752_36, !success)
+  QUIC_BUG_IF(quic_bug_10752_36, !success)
       << "Failed to add padding_bytes: " << padding_bytes
       << " transmission_type: " << packet_.transmission_type;
 }
@@ -1945,7 +1940,7 @@
   const std::string error_details =
       absl::StrCat("Cannot send stream data with level: ",
                    EncryptionLevelToString(packet_.encryption_level));
-  QUIC_BUG_V2(quic_bug_10752_37) << error_details;
+  QUIC_BUG(quic_bug_10752_37) << error_details;
   delegate_->OnUnrecoverableError(QUIC_ATTEMPT_TO_SEND_UNENCRYPTED_STREAM_DATA,
                                   error_details);
   return true;
@@ -2014,8 +2009,8 @@
     QuicPacketCreator* creator,
     QuicSocketAddress address)
     : creator_(creator), old_peer_address_(creator_->packet_.peer_address) {
-  QUIC_BUG_IF_V2(quic_bug_12398_19,
-                 !creator_->packet_.peer_address.IsInitialized())
+  QUIC_BUG_IF(quic_bug_12398_19,
+              !creator_->packet_.peer_address.IsInitialized())
       << "Context is used before seralized packet's peer address is "
          "initialized.";
   creator_->SetDefaultPeerAddress(address);
@@ -2039,7 +2034,7 @@
 
   if (creator_->packet_.encrypted_buffer == nullptr) {
     const std::string error_details = "Failed to SerializePacket.";
-    QUIC_BUG_V2(quic_bug_10752_38) << error_details;
+    QUIC_BUG(quic_bug_10752_38) << error_details;
     creator_->delegate_->OnUnrecoverableError(QUIC_FAILED_TO_SERIALIZE_PACKET,
                                               error_details);
   }
@@ -2058,7 +2053,7 @@
   // TODO(danzh) Unify similar checks at several entry points into one in
   // AddFrame(). Sort out test helper functions and peer class that don't
   // enforce this check.
-  QUIC_BUG_IF_V2(quic_bug_10752_39, !flusher_attached_)
+  QUIC_BUG_IF(quic_bug_10752_39, !flusher_attached_)
       << "Packet flusher is not attached when "
          "generator tries to write stream data.";
   // Write a PATH_CHALLENGE frame, which has a random 8-byte payload.
@@ -2105,7 +2100,7 @@
     return false;
   }
   bool success = AddPaddedSavedFrame(frame, NOT_RETRANSMISSION);
-  QUIC_BUG_IF_V2(quic_bug_12398_20, !success);
+  QUIC_BUG_IF(quic_bug_12398_20, !success);
   return true;
 }