gfe-relnote: (n/a) Always handle MSG_TOO_BIG when sending buffered packets. Protected by existing --gfe2_reloadable_flag_quic_treat_queued_packets_as_sent.

Currently this code is protected by both 'treat_queued_packets_as_sent' and 'mtu_discovery_v2', removing the latter is fine because the former will not be verified until the week after the next.

PiperOrigin-RevId: 275084849
Change-Id: Id460685b2beef5bb77c8a3d98047e4725f249ed7
diff --git a/quic/core/quic_connection.cc b/quic/core/quic_connection.cc
index 545d46b..0b4c05f 100644
--- a/quic/core/quic_connection.cc
+++ b/quic/core/quic_connection.cc
@@ -2054,7 +2054,7 @@
         packet.encrypted_buffer.data(), packet.encrypted_buffer.length(),
         packet.self_address.host(), packet.peer_address, per_packet_options_);
     QUIC_DVLOG(1) << ENDPOINT << "Sending buffered packet, result: " << result;
-    if (mtu_discovery_v2_ && IsMsgTooBig(result) &&
+    if (IsMsgTooBig(result) &&
         packet.encrypted_buffer.length() > long_term_mtu_) {
       // When MSG_TOO_BIG is returned, the system typically knows what the
       // actual MTU is, so there is no need to probe further.