Chapter 14. Limiting LVM device visibility and usage