dmesg -h
[12/03/2022 20:10:08] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.
[12/03/2022 21:10:10] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.
logread
Sat Mar 12 21:10:23 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 32:5e:16:b1:62:26
Sat Mar 12 21:10:23 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Mar 12 21:10:25 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 32:5e:16:b1:62:26
Sat Mar 12 21:10:25 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 RADIUS: starting accounting session C154820B3CDCFF47
Sat Mar 12 21:10:25 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Sat Mar 12 21:10:25 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 WPA: pairwise key handshake completed (RSN)
Sat Mar 12 21:10:25 2022 kern.warn kernel: [541174.635253] Rekeying PTK for STA 9a:eb:36:19:45:9f but driver can't safely do that.
Sat Mar 12 21:46:15 2022 kern.warn kernel: [542626.258567] Rekeying PTK for STA 32:5e:16:b1:62:26 but driver can't safely do that.
Sat Mar 12 21:49:22 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.11: disconnected due to excessive missing ACKs
Sat Mar 12 21:49:22 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 32:5e:16:b1:62:26
Sat Mar 12 21:49:24 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.11: authenticated
Sat Mar 12 21:49:24 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.11: associated (aid 1)
Sat Mar 12 21:49:24 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-STARTED 32:5e:16:b1:62:26
Sat Mar 12 21:49:24 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
Sat Mar 12 21:49:27 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-RETRANSMIT2 32:5e:16:b1:62:26
Sat Mar 12 21:49:27 2022 daemon.notice hostapd: wlan1: CTRL-EVENT-EAP-SUCCESS2 32:5e:16:b1:62:26
Sat Mar 12 21:49:27 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 WPA: pairwise key handshake completed (RSN)
Sat Mar 12 21:49:27 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 32:5e:16:b1:62:26
Sat Mar 12 21:49:27 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 RADIUS: starting accounting session C154820B3CDCFF47
Sat Mar 12 21:49:27 2022 daemon.info hostapd: wlan1: STA 32:5e:16:b1:62:26 IEEE 802.1X: authenticated - EAP type: 25 (PEAP)
Sat Mar 12 21:49:27 2022 daemon.warn dnsmasq-dhcp[4602]: no address range available for DHCP request via br-lan.4
The "can't safely rekey PTK" message is because you've checked the "Protect against KRACK attack" box. It's not enabled by default because it can cause problems for some clients. If you are having a problem with actual data loss and not just messages in the log, try turning that setting off.
Also it's normal for many battery-powered clients to abruptly turn their wifi radio off (without formally disconnecting, which requires transmitting packets, a waste of battery power on their end) when they go to sleep. This causes the router to drop them due to missing ACKs. The connection re-establishes from scratch when the device wakes up. The missing ACK disconnect is also going to happen whenever a portable client is moved out of radio range.