This 'trail of breadcrumbs' is documented in the datasheet, Appendix A-10 (Alternate Instruction Execution)
"...For example, in the alternate instruction set, privileged functions can be used from any protection level, memory descriptor checking can be bypassed, and many x86 exceptions such as...