Forget about which version of the kernel is in use for a few minutes - Google linux kernel bug xbf4-xfff and see what shows up.
I got exactly nine hits - all pointing back to the same source - have you tried to find any further details on this alleged bug?
Further searches on linux kernel bug and different variations of 76 bytes, zero fill, 4k page turned up nothing of any significance.
Have you tried testing
your data?
Personally I don't put a lot of faith in many of those reviews, especially the ones on Amazon which often come from inexperienced end users - this reviewer does not mention (does he even know) which version of the kernel has the bug or which version of the kernel is in use on the DNS-321, and suggestions such as ...
This review is specifically about the DNS-321 as that was the only one I tested, however the DNS-323 is VERY similar to this box (just basically added a print server), so I can't say if that one is any better or does the same corruption as this one does (it's quite possible).
don't exactly inspire my confidence.
For what it's worth - the DNS-323 is a precursor to the DNS-321, so it's really that the print server was removed, rather than added, and although the units are similar, they are also quite different - among other things, they use different processors. I use the DNS-323 and I verify my backups and have never had a verification error that could not be tracked to the data on the client being changed between the backup and the verify (this happens when I forget to close my email client before backing up).
I've also, on rare ocassion, had the need to restore from those backups, which can be considered the unltimate verification, and again, never had an issue.
Oh - the DNS-323 with firmware 1.06, runs kernel version 2.6.12.6, and I believe, so does the DNS-321.