-----------------------------------------------------------------

[*] Emulating binary name: cryptsetup
[*] Emulator used: qemu-mipsel-static
[*] Using root directory: /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract (1/2)
[*] Using CPU config: 
[*] Emulating binary: /usr/sbin/cryptsetup

[*] Change permissions +x to /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/./usr/sbin/cryptsetup.
[*] Emulating binary ./usr/sbin/cryptsetup with parameter NONE
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter -v
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter -V
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter -h
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter -help
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter --help
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter --version
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/sbin/cryptsetup with parameter version
qemu: uncaught target signal 4 (Illegal instruction) - core dumped

-----------------------------------------------------------------


-----------------------------------------------------------------

[*] Emulating binary name: cryptsetup
[*] Emulator used: qemu-mipsel-static
[*] Using root directory: /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr (2/2)
[*] Using CPU config: 24KEc
[*] Emulating binary: /sbin/cryptsetup

[*] Emulating binary ./sbin/cryptsetup with parameter NONE and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
        [--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
        [-y|--verify-passphrase] [-d|--key-file=STRING]
        [--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
        [-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
        [--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
        [-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
        [-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
        [-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
        [-T|--tries=INT] [--align-payload=SECTORS]
        [--header-backup-file=STRING] [--use-random] [--use-urandom]
        [--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
        [--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
        [--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
        [--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
        [--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
        [--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
        [--pbkdf=STRING] [--pbkdf-memory=kilobytes]
        [--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
        [--priority=STRING] [--disable-locks] [--disable-keyring]
        [-I|--integrity=STRING] [--integrity-no-journal]
        [--integrity-no-wipe] [--token-only] [--token-id=INT]
        [--key-description=STRING] [--sector-size=INT] [--persistent]
        [--label=STRING] [--subsystem=STRING] [--unbound]
        [--json-file=STRING] [--luks2-metadata-size=bytes]
        [--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
        [--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
        [--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
        [--resilience=STRING] [--resilience-hash=STRING]
        [--active-name=STRING] [OPTION...] <action> <action-specific>
./sbin/cryptsetup: Unknown action.
[*] Emulating binary ./sbin/cryptsetup with parameter -v and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
        [--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
        [-y|--verify-passphrase] [-d|--key-file=STRING]
        [--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
        [-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
        [--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
        [-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
        [-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
        [-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
        [-T|--tries=INT] [--align-payload=SECTORS]
        [--header-backup-file=STRING] [--use-random] [--use-urandom]
        [--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
        [--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
        [--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
        [--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
        [--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
        [--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
        [--pbkdf=STRING] [--pbkdf-memory=kilobytes]
        [--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
        [--priority=STRING] [--disable-locks] [--disable-keyring]
        [-I|--integrity=STRING] [--integrity-no-journal]
        [--integrity-no-wipe] [--token-only] [--token-id=INT]
        [--key-description=STRING] [--sector-size=INT] [--persistent]
        [--label=STRING] [--subsystem=STRING] [--unbound]
        [--json-file=STRING] [--luks2-metadata-size=bytes]
        [--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
        [--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
        [--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
        [--resilience=STRING] [--resilience-hash=STRING]
        [--active-name=STRING] [OPTION...] <action> <action-specific>
./sbin/cryptsetup: Argument <action> missing.
[*] Emulating binary ./sbin/cryptsetup with parameter -V and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
        [--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
        [-y|--verify-passphrase] [-d|--key-file=STRING]
        [--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
        [-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
        [--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
        [-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
        [-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
        [-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
        [-T|--tries=INT] [--align-payload=SECTORS]
        [--header-backup-file=STRING] [--use-random] [--use-urandom]
        [--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
        [--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
        [--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
        [--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
        [--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
        [--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
        [--pbkdf=STRING] [--pbkdf-memory=kilobytes]
        [--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
        [--priority=STRING] [--disable-locks] [--disable-keyring]
        [-I|--integrity=STRING] [--integrity-no-journal]
        [--integrity-no-wipe] [--token-only] [--token-id=INT]
        [--key-description=STRING] [--sector-size=INT] [--persistent]
        [--label=STRING] [--subsystem=STRING] [--unbound]
        [--json-file=STRING] [--luks2-metadata-size=bytes]
        [--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
        [--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
        [--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
        [--resilience=STRING] [--resilience-hash=STRING]
        [--active-name=STRING] [OPTION...] <action> <action-specific>
-V: unknown option
[*] Emulating binary ./sbin/cryptsetup with parameter -h and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
        [--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
        [-y|--verify-passphrase] [-d|--key-file=STRING]
        [--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
        [-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
        [--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
        [-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
        [-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
        [-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
        [-T|--tries=INT] [--align-payload=SECTORS]
        [--header-backup-file=STRING] [--use-random] [--use-urandom]
        [--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
        [--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
        [--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
        [--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
        [--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
        [--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
        [--pbkdf=STRING] [--pbkdf-memory=kilobytes]
        [--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
        [--priority=STRING] [--disable-locks] [--disable-keyring]
        [-I|--integrity=STRING] [--integrity-no-journal]
        [--integrity-no-wipe] [--token-only] [--token-id=INT]
        [--key-description=STRING] [--sector-size=INT] [--persistent]
        [--label=STRING] [--subsystem=STRING] [--unbound]
        [--json-file=STRING] [--luks2-metadata-size=bytes]
        [--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
        [--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
        [--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
        [--resilience=STRING] [--resilience-hash=STRING]
        [--active-name=STRING] [OPTION...] <action> <action-specific>
-h: missing argument
[*] Emulating binary ./sbin/cryptsetup with parameter -help and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
        [--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
        [-y|--verify-passphrase] [-d|--key-file=STRING]
        [--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
        [-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
        [--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
        [-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
        [-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
        [-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
        [-T|--tries=INT] [--align-payload=SECTORS]
        [--header-backup-file=STRING] [--use-random] [--use-urandom]
        [--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
        [--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
        [--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
        [--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
        [--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
        [--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
        [--pbkdf=STRING] [--pbkdf-memory=kilobytes]
        [--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
        [--priority=STRING] [--disable-locks] [--disable-keyring]
        [-I|--integrity=STRING] [--integrity-no-journal]
        [--integrity-no-wipe] [--token-only] [--token-id=INT]
        [--key-description=STRING] [--sector-size=INT] [--persistent]
        [--label=STRING] [--subsystem=STRING] [--unbound]
        [--json-file=STRING] [--luks2-metadata-size=bytes]
        [--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
        [--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
        [--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
        [--resilience=STRING] [--resilience-hash=STRING]
        [--active-name=STRING] [OPTION...] <action> <action-specific>
./sbin/cryptsetup: Argument <action> missing.
[*] Emulating binary ./sbin/cryptsetup with parameter --help and cpu configuration 24KEc
cryptsetup 2.2.1
Usage: cryptsetup [OPTION...] <action> <action-specific>
      --version                         Print package version
  -v, --verbose                         Shows more detailed error messages
      --debug                           Show debug messages
      --debug-json                      Show debug messages including JSON
                                        metadata
  -c, --cipher=STRING                   The cipher used to encrypt the disk
                                        (see /proc/crypto)
  -h, --hash=STRING                     The hash used to create the encryption
                                        key from the passphrase
  -y, --verify-passphrase               Verifies the passphrase by asking for
                                        it twice
  -d, --key-file=STRING                 Read the key from a file
      --master-key-file=STRING          Read the volume (master) key from file.
      --dump-master-key                 Dump volume (master) key instead of
                                        keyslots info
  -s, --key-size=BITS                   The size of the encryption key
  -l, --keyfile-size=bytes              Limits the read from keyfile
      --keyfile-offset=bytes            Number of bytes to skip in keyfile
      --new-keyfile-size=bytes          Limits the read from newly added
                                        keyfile
      --new-keyfile-offset=bytes        Number of bytes to skip in newly added
                                        keyfile
  -S, --key-slot=INT                    Slot number for new key (default is
                                        first free)
  -b, --size=SECTORS                    The size of the device
      --device-size=bytes               Use only specified device size (ignore
                                        rest of device). DANGEROUS!
  -o, --offset=SECTORS                  The start offset in the backend device
  -p, --skip=SECTORS                    How many sectors of the encrypted data
                                        to skip at the beginning
  -r, --readonly                        Create a readonly mapping
  -q, --batch-mode                      Do not ask for confirmation
  -t, --timeout=secs                    Timeout for interactive passphrase
                                        prompt (in seconds)
      --progress-frequency=secs         Progress line update (in seconds)
  -T, --tries=INT                       How often the input of the passphrase
                                        can be retried
      --align-payload=SECTORS           Align payload at <n> sector boundaries
                                        - for luksFormat
      --header-backup-file=STRING       File with LUKS header and keyslots
                                        backup
      --use-random                      Use /dev/random for generating volume
                                        key
      --use-urandom                     Use /dev/urandom for generating volume
                                        key
      --shared                          Share device with another
                                        non-overlapping crypt segment
      --uuid=STRING                     UUID for device to use
      --allow-discards                  Allow discards (aka TRIM) requests for
                                        device
      --header=STRING                   Device or file with separated LUKS
                                        header
      --test-passphrase                 Do not activate device, just check
                                        passphrase
      --tcrypt-hidden                   Use hidden header (hidden TCRYPT
                                        device)
      --tcrypt-system                   Device is system TCRYPT drive (with
                                        bootloader)
      --tcrypt-backup                   Use backup (secondary) TCRYPT header
      --veracrypt                       Scan also for VeraCrypt compatible
                                        device
      --veracrypt-pim=INT               Personal Iteration Multiplier for
                                        VeraCrypt compatible device
      --veracrypt-query-pim             Query Personal Iteration Multiplier
                                        for VeraCrypt compatible device
  -M, --type=STRING                     Type of device metadata: luks, luks1,
                                        luks2, plain, loopaes, tcrypt
      --force-password                  Disable password quality check (if
                                        enabled)
      --perf-same_cpu_crypt             Use dm-crypt same_cpu_crypt
                                        performance compatibility option
      --perf-submit_from_crypt_cpus     Use dm-crypt submit_from_crypt_cpus
                                        performance compatibility option
      --deferred                        Device removal is deferred until the
                                        last user closes it
      --serialize-memory-hard-pbkdf     Use global lock to serialize memory
                                        hard PBKDF (OOM workaround)
  -i, --iter-time=msecs                 PBKDF iteration time for LUKS (in ms)
      --pbkdf=STRING                    PBKDF algorithm (for LUKS2): argon2i,
                                        argon2id, pbkdf2
      --pbkdf-memory=kilobytes          PBKDF memory cost limit
      --pbkdf-parallel=threads          PBKDF parallel cost
      --pbkdf-force-iterations=LONG     PBKDF iterations cost (forced,
                                        disables benchmark)
      --priority=STRING                 Keyslot priority: ignore, normal,
                                        prefer
      --disable-locks                   Disable locking of on-disk metadata
      --disable-keyring                 Disable loading volume keys via kernel
                                        keyring
  -I, --integrity=STRING                Data integrity algorithm (LUKS2 only)
      --integrity-no-journal            Disable journal for integrity device
      --integrity-no-wipe               Do not wipe device after format
      --token-only                      Do not ask for passphrase if
                                        activation by token fails
      --token-id=INT                    Token number (default: any)
      --key-description=STRING          Key description
      --sector-size=INT                 Encryption sector size (default: 512
                                        bytes)
      --persistent                      Set activation flags persistent for
                                        device
      --label=STRING                    Set label for the LUKS2 device
      --subsystem=STRING                Set subsystem label for the LUKS2
                                        device
      --unbound                         Create unbound (no assigned data
                                        segment) LUKS2 keyslot
      --json-file=STRING                Read or write the json from or to a
                                        file
      --luks2-metadata-size=bytes       LUKS2 header metadata area size
      --luks2-keyslots-size=bytes       LUKS2 header keyslots area size
      --refresh                         Refresh (reactivate) device with new
                                        parameters
      --keyslot-key-size=BITS           LUKS2 keyslot: The size of the
                                        encryption key
      --keyslot-cipher=STRING           LUKS2 keyslot: The cipher used for
                                        keyslot encryption
      --encrypt                         Encrypt LUKS2 device (in-place
                                        encryption).
      --decrypt                         Decrypt LUKS2 device (remove
                                        encryption).
      --init-only                       Initialize LUKS2 reencryption in
                                        metadata only.
      --resume-only                     Resume initialized LUKS2 reencryption
                                        only.
      --reduce-device-size=bytes        Reduce data device size (move data
                                        offset). DANGEROUS!
      --hotzone-size=bytes              Maximal reencryption hotzone size.
      --resilience=STRING               Reencryption hotzone resilience type
                                        (checksum,journal,none)
      --resilience-hash=STRING          Reencryption hotzone checksums hash
      --active-name=STRING              Override device autodetection of dm
                                        device to be reencrypted

Help options:
  -?, --help                            Show this help message
      --usage                           Display brief usage

<action> is one of:
	open <device> [--type <type>] [<name>] - open device as <name>
	close <name> - close device (remove mapping)
	resize <name> - resize active device
	status <name> - show device status
	benchmark [--cipher <cipher>] - benchmark cipher
	repair <device> - try to repair on-disk metadata
	reencrypt <device> - reencrypt LUKS2 device
	erase <device> - erase all keyslots (remove encryption key)
	convert <device> - convert LUKS from/to LUKS2 format
	config <device> - set permanent configuration options for LUKS2
	luksFormat <device> [<new key file>] - formats a LUKS device
	luksAddKey <device> [<new key file>] - add key to LUKS device
	luksRemoveKey <device> [<key file>] - removes supplied key or key file from LUKS device
	luksChangeKey <device> [<key file>] - changes supplied key or key file of LUKS device
	luksConvertKey <device> [<key file>] - converts a key to new pbkdf parameters
	luksKillSlot <device> <key slot> - wipes key with number <key slot> from LUKS device
	luksUUID <device> - print UUID of LUKS device
	isLuks <device> - tests <device> for LUKS partition header
	luksDump <device> - dump LUKS partition information
	tcryptDump <device> - dump TCRYPT device information
	luksSuspend <device> - Suspend LUKS device and wipe key (all IOs are frozen)
	luksResume <device> - Resume suspended LUKS device
	luksHeaderBackup <device> - Backup LUKS device header and keyslots
	luksHeaderRestore <device> - Restore LUKS device header and keyslots
	token <add|remove|import|export> <device> - Manipulate LUKS2 tokens

You can also use old <action> syntax aliases:
	open: create (plainOpen), luksOpen, loopaesOpen, tcryptOpen
	close: remove (plainClose), luksClose, loopaesClose, tcryptClose

<name> is the device to create under /dev/mapper
<device> is the encrypted device
<key slot> is the LUKS key slot number to modify
<key file> optional key file for the new key for luksAddKey action

Default compiled-in metadata format is LUKS1 (for luksFormat action).

Default compiled-in key and passphrase parameters:
	Maximum keyfile size: 8192kB, Maximum interactive passphrase length 512 (characters)
Default PBKDF for LUKS1: pbkdf2, iteration time: 2000 (ms)
Default PBKDF for LUKS2: argon2i
	Iteration time: 2000, Memory required: 1048576kB, Parallel threads: 4

Default compiled-in device cipher parameters:
	loop-AES: aes, Key 256 bits
	plain: aes-cbc-essiv:sha256, Key: 256 bits, Password hashing: ripemd160
	LUKS: aes-xts-plain64, Key: 256 bits, LUKS header hashing: sha256, RNG: /dev/urandom
	LUKS: Default keysize with XTS mode (two internal keys) will be doubled.
[*] Emulating binary ./sbin/cryptsetup with parameter --version and cpu configuration 24KEc
cryptsetup 2.2.1
[*] Emulating binary ./sbin/cryptsetup with parameter version and cpu configuration 24KEc
Usage: cryptsetup [-?vyrq] [-?|--help] [--usage] [--version] [-v|--verbose]
        [--debug] [--debug-json] [-c|--cipher=STRING] [-h|--hash=STRING]
        [-y|--verify-passphrase] [-d|--key-file=STRING]
        [--master-key-file=STRING] [--dump-master-key] [-s|--key-size=BITS]
        [-l|--keyfile-size=bytes] [--keyfile-offset=bytes]
        [--new-keyfile-size=bytes] [--new-keyfile-offset=bytes]
        [-S|--key-slot=INT] [-b|--size=SECTORS] [--device-size=bytes]
        [-o|--offset=SECTORS] [-p|--skip=SECTORS] [-r|--readonly]
        [-q|--batch-mode] [-t|--timeout=secs] [--progress-frequency=secs]
        [-T|--tries=INT] [--align-payload=SECTORS]
        [--header-backup-file=STRING] [--use-random] [--use-urandom]
        [--shared] [--uuid=STRING] [--allow-discards] [--header=STRING]
        [--test-passphrase] [--tcrypt-hidden] [--tcrypt-system]
        [--tcrypt-backup] [--veracrypt] [--veracrypt-pim=INT]
        [--veracrypt-query-pim] [-M|--type=STRING] [--force-password]
        [--perf-same_cpu_crypt] [--perf-submit_from_crypt_cpus] [--deferred]
        [--serialize-memory-hard-pbkdf] [-i|--iter-time=msecs]
        [--pbkdf=STRING] [--pbkdf-memory=kilobytes]
        [--pbkdf-parallel=threads] [--pbkdf-force-iterations=LONG]
        [--priority=STRING] [--disable-locks] [--disable-keyring]
        [-I|--integrity=STRING] [--integrity-no-journal]
        [--integrity-no-wipe] [--token-only] [--token-id=INT]
        [--key-description=STRING] [--sector-size=INT] [--persistent]
        [--label=STRING] [--subsystem=STRING] [--unbound]
        [--json-file=STRING] [--luks2-metadata-size=bytes]
        [--luks2-keyslots-size=bytes] [--refresh] [--keyslot-key-size=BITS]
        [--keyslot-cipher=STRING] [--encrypt] [--decrypt] [--init-only]
        [--resume-only] [--reduce-device-size=bytes] [--hotzone-size=bytes]
        [--resilience=STRING] [--resilience-hash=STRING]
        [--active-name=STRING] [OPTION...] <action> <action-specific>
./sbin/cryptsetup: Unknown action.

-----------------------------------------------------------------