(by the way how can i sure my regex match my entry, are the usefull regex tool for check this.)
i chenged my regex with dn.regex=".*,jvd=([^,]+),o=hosting,dc=myhosting,dc=example"
-----------------------------------------------------------------------------------------------------------------------------
conn=1000 op=1 PASSMOD old new
bdb_dn2entry("mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example")
=> bdb_entry_get: ndn: "mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example"
=> bdb_entry_get: oc: "(null)", at: "userPassword"
bdb_dn2entry("mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example")
=> bdb_entry_get: found entry: "mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example"
bdb_entry_get: rc=0
=> access_allowed: result not in cache (userPassword)
=> access_allowed: auth access to "mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example" "userPassword" requested
=> slap_access_allowed: backend default auth access granted to "mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example"
=> access_allowed: auth access granted by read(=rscxd)
=> bdb_entry_get: ndn: "mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example"
=> bdb_entry_get: oc: "(null)", at: "(null)"
bdb_dn2entry("mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example")
=> bdb_entry_get: found entry: "mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example"
bdb_entry_get: rc=0
=> bdb_entry_get: ndn: "cn=default,ou=policies,dc=myhosting,dc=example"
=> bdb_entry_get: oc: "(null)", at: "(null)"
bdb_dn2entry("cn=default,ou=policies,dc=myhosting,dc=example")
=> bdb_entry_get: found entry: "cn=default,ou=policies,dc=myhosting,dc=example"
bdb_entry_get: rc=0
bdb_modify: mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example
slap_queue_csn: queing 0x7f31f34201d0 20111220095453.284620Z#000000#000#000000
bdb_dn2entry("mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example")
bdb_modify_internal: 0x00000015: mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example
=> access_allowed: backend default write access denied to "mail=edergi@.......mail.........
edu.tr,ou=SOME_UNIT,jvd=.......mail.........
edu.tr,o=hosting,dc=myhosting,dc=example"
bdb_modify: modify failed (50)
send_ldap_result: conn=1000 op=1 p=3
------------------------------------------------------------END ---------------------------------