К сожалению нет. Если добавить в Additional pppd options:
Code:
ip-up-script /usr/local/sbin/ppp0-ip-up ip-down-script /usr/local/sbin/ppp0-ip-down
pppd погибает с собщением
Code:
Jan 1 03:11:50 pppd[147]: Sent 74 bytes, received 190 bytes.
Jan 1 03:11:50 kernel: Unable to handle kernel paging request at virtual address 000000e8, epc == 800d2ba8, ra == 800d2b80
Jan 1 03:11:50 kernel: Oops in fault.c::do_page_fault, line 192:
Jan 1 03:11:50 kernel: $0 : 00000000 80201844 00000001 00000007 81af9f50 00000000 00000000 00000008
Jan 1 03:11:50 kernel: $8 : 00000007 00000004 00000010 6c760794 00005000 00000000 00000000 00000000
Jan 1 03:11:50 kernel: $16: 802117e8 81848e60 81af9f20 00000000 8179be98 7fff78d0 00000000 7fff79a0
Jan 1 03:11:50 kernel: $24: 00000010 2abd8790 8179a000 8179be58 7fff7a4a 800d2b80
Jan 1 03:11:50 kernel: Hi : 00000000
Jan 1 03:11:50 kernel: Lo : 00000003
Jan 1 03:11:50 kernel: epc : 800d2ba8 Tainted: P
Jan 1 03:11:50 kernel: Status: 10009c03
Jan 1 03:11:50 kernel: Cause : 00000008
Jan 1 03:11:50 kernel: Process pppd (pid: 147, stackpage=8179a000)
Jan 1 03:11:50 kernel: Stack: 0002a700 00000000 8179a000 81c0bf60 7fff7e08 8179d738 0000001e
Jan 1 03:11:50 kernel: 00000003 7fff7ed4 7fff78d0 800f7284 800f7240 81bde3b0 800c6940 800c6698
Jan 1 03:11:50 kernel: 00030002 00000018 00000000 8a483000 6c760794 00316e61 8c282ac5 60002ac9
Jan 1 03:11:50 kernel: 800c1001 81af9de0 4004745a 8181a240 802432e0 8188bba0 80037ae4 818d4ee0
Jan 1 03:11:50 kernel: 80042db8 815c9000 818d4ee0 8181a240 810f9380 00000000 00000003 80035f5c
Jan 1 03:11:50 kernel: 80035f48 ...
Jan 1 03:11:50 kernel: Call Trace: [<800f7284>] [<800f7240>] [<800c6940>] [<800c6698>] [<800c1001>]
Jan 1 03:11:50 kernel: [<80037ae4>] [<80042db8>] [<80035f5c>] [<80035f48>] [<800483a0>] [<800085c4>]
Jan 1 03:11:50 kernel:
Jan 1 03:11:50 kernel: Code: 00000000 8e450024 24020001 <c0a400e8> 00821823 e0a300e8 1060fffc 00821823 0000000f
В связи с этим вопрос - как отследить переподключение?