We're currently quite diving into kubevirt and came upon an issue with block volumes that have been cloned using datavolume.
The datavolume looks like this
This creates a new PVC that will be attached. As we're running a recent version of kubevirt the virtlauncher pod runs as qemu user (= no root permissions).
The issue now is that the blockdevice is owned by root and gid 6 which result in the fact that qemu cannot attach the blockdevice to the VM.
Why blockdev We're using block volumes because this leverages benefits of ceph and eases many processes around the lifecycle.
As a result, the issue shows as following in the logs
After all - the permission mismatch results in the error that kubevirt can't map the blockdevice into the VM.
The solution is to adjust the containerd settings in such a way that block devices are mounted using the securityContext of the pod as owner.