Index: /trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp
===================================================================
--- /trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp	(revision 82532)
+++ /trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp	(revision 82533)
@@ -9938,5 +9938,5 @@
      * nested-guest using hardware-assisted VMX.
      *
-     * Note! If the nested-guest is not using an MSR bitmap, ever MSR must cause a
+     * Note! If the nested-guest is not using an MSR bitmap, every MSR must cause a
      *       nested-guest VM-exit even if the outer guest is not intercepting some
      *       MSRs. We cannot assume the caller has initialized the nested-guest
@@ -9944,6 +9944,6 @@
      *
      *       The nested hypervisor may also switch whether it uses MSR bitmaps for
-     *       each VM-entry, hence initializing it once per-VM while setting up the
-     *       nested-guest VMCS is not sufficient.
+     *       each of its VM-entry, hence initializing it once per-VM while setting
+     *       up the nested-guest VMCS is not sufficient.
      */
     PCVMXVVMCS pVmcsNstGst = pVCpu->cpum.GstCtx.hwvirt.vmx.CTX_SUFF(pVmcs);
@@ -14640,6 +14640,6 @@
     HMVMX_VALIDATE_EXIT_HANDLER_PARAMS(pVCpu, pVmxTransient);
 
+    /** @todo Enable the new code after finding a reliably guest test-case. */
 #if 1
-    /** @todo Use VM-exit instruction information. */
     return VERR_EM_INTERPRETER;
 #else
