Index: /trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp
===================================================================
--- /trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp	(revision 79697)
+++ /trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp	(revision 79698)
@@ -10633,8 +10633,10 @@
      *
      *   - We would need to perform VMREADs with interrupts disabled and is orders of
-     *     magnitude worse with nested virtualization.
+     *     magnitude worse when we run as a guest hypervisor without VMCS shadowing
+     *     supported by the host hypervisor.
      *
      *   - It affects the common VM-exit scenario and keeps interrupts disabled for a
-     *     longer period of time just for handling an edge case like host NMIs.
+     *     longer period of time just for handling an edge case like host NMIs which do
+     *     not occur nearly as frequently as other VM-exits.
      *
      * Let's cover the most likely scenario first. Check if we are on the target CPU
@@ -10820,5 +10822,5 @@
      *
      * If the outer guest is not intercepting #PFs, we can use the nested-guest #PF filters.
-     * If the outer guest is intercepting #PFs we must intercept all #PFs.
+     * If the outer guest is intercepting #PFs, we must intercept all #PFs.
      */
     uint32_t u32XcptPFMask;
