I solved my problem , follow required steps for this:
1. Return mode SELinux to "enforcing".
2. Recheck if my error message in ABAP still shows.
3. Then, first of all check /var/log/audit/audit.log - should be messages of denied access to uuidd.
4. Then check /var/log/messages.log - should there be also this same type messages, for example:
If you believe that uuidd should be allowed write access on the sock_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep uuidd /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
I have done recommended commands in this log, and now everything working with SELinux=enforcing mode.
In addition this link refer to documentation https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security-Enhanced_Linux/sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow.html
Regards