diff --git a/public/hal_boot.te b/public/hal_boot.te
index 327fbf98fdff65002b9d85301485ae319192e8cc..3cbbb2916329f2d9cd93acca4dd0c9ce3fe0278a 100644
--- a/public/hal_boot.te
+++ b/public/hal_boot.te
@@ -1,5 +1,5 @@
 # boot_control subsystem
-type hal_boot, domain;
+type hal_boot, domain, boot_control_hal;
 type hal_boot_exec, exec_type, file_type;
 
 # hwbinder access
diff --git a/public/update_engine.te b/public/update_engine.te
index a3dee0db74c9e6adf65831769f2c88388adff2b9..f4096279c01704a068fb507c40a803f1df376515 100644
--- a/public/update_engine.te
+++ b/public/update_engine.te
@@ -1,6 +1,5 @@
 # Domain for update_engine daemon.
-# update_engine uses the boot_control_hal.
-type update_engine, domain, domain_deprecated, update_engine_common, boot_control_hal;
+type update_engine, domain, domain_deprecated, update_engine_common;
 type update_engine_exec, exec_type, file_type;
 type update_engine_data_file, file_type, data_file_type;
 
@@ -33,3 +32,7 @@ binder_call(update_engine, priv_app)
 # Read OTA zip file at /data/ota_package/.
 allow update_engine ota_package_file:file r_file_perms;
 allow update_engine ota_package_file:dir r_dir_perms;
+
+# Use binderized boot HAL.
+hwbinder_use(update_engine)
+binder_call(update_engine, hal_boot)
diff --git a/public/update_verifier.te b/public/update_verifier.te
index 550cf659f82b4b8507bde8e984fc9724edc37aad..45761e20b0cf11b49cf069ca752a755c889d216e 100644
--- a/public/update_verifier.te
+++ b/public/update_verifier.te
@@ -1,6 +1,5 @@
 # update_verifier
-# update_verifier uses the boot_control_hal.
-type update_verifier, domain, boot_control_hal;
+type update_verifier, domain;
 type update_verifier_exec, exec_type, file_type;
 
 # Allow update_verifier to reach block devices in /dev/block.
@@ -13,8 +12,7 @@ allow update_verifier ota_package_file:file r_file_perms;
 # Read all blocks in system partition.
 allow update_verifier system_block_device:blk_file r_file_perms;
 
-# Use binderized HAL
+# Use binderized boot HAL.
 hwbinder_use(update_verifier)
 binder_call(update_verifier, hal_boot)
 
-allow update_verifier system_file:dir r_dir_perms;