u8                      dst_len;
        u8                      src_len;
        dscp_t                  dscp;
+       u8                      dscp_full:1;    /* DSCP or TOS selector */
        __be32                  src;
        __be32                  srcmask;
        __be32                  dst;
            ((daddr ^ r->dst) & r->dstmask))
                return 0;
 
-       if (r->dscp && !fib_dscp_masked_match(r->dscp, fl4))
+       /* When DSCP selector is used we need to match on the entire DSCP field
+        * in the flow information structure. When TOS selector is used we need
+        * to mask the upper three DSCP bits prior to matching to maintain
+        * legacy behavior.
+        */
+       if (r->dscp_full && r->dscp != inet_dsfield_to_dscp(fl4->flowi4_tos))
+               return 0;
+       else if (!r->dscp_full && r->dscp &&
+                !fib_dscp_masked_match(r->dscp, fl4))
                return 0;
 
        if (rule->ip_proto && (rule->ip_proto != fl4->flowi4_proto))
        return NULL;
 }
 
+static int fib4_nl2rule_dscp(const struct nlattr *nla, struct fib4_rule *rule4,
+                            struct netlink_ext_ack *extack)
+{
+       if (rule4->dscp) {
+               NL_SET_ERR_MSG(extack, "Cannot specify both TOS and DSCP");
+               return -EINVAL;
+       }
+
+       rule4->dscp = inet_dsfield_to_dscp(nla_get_u8(nla) << 2);
+       rule4->dscp_full = true;
+
+       return 0;
+}
+
 static int fib4_rule_configure(struct fib_rule *rule, struct sk_buff *skb,
                               struct fib_rule_hdr *frh,
                               struct nlattr **tb,
        }
        rule4->dscp = inet_dsfield_to_dscp(frh->tos);
 
+       if (tb[FRA_DSCP] &&
+           fib4_nl2rule_dscp(tb[FRA_DSCP], rule4, extack) < 0)
+               goto errout;
+
        /* split local/main if they are not already split */
        err = fib_unmerge(net);
        if (err)
        if (frh->dst_len && (rule4->dst_len != frh->dst_len))
                return 0;
 
-       if (frh->tos && inet_dscp_to_dsfield(rule4->dscp) != frh->tos)
+       if (frh->tos &&
+           (rule4->dscp_full ||
+            inet_dscp_to_dsfield(rule4->dscp) != frh->tos))
                return 0;
 
+       if (tb[FRA_DSCP]) {
+               dscp_t dscp;
+
+               dscp = inet_dsfield_to_dscp(nla_get_u8(tb[FRA_DSCP]) << 2);
+               if (!rule4->dscp_full || rule4->dscp != dscp)
+                       return 0;
+       }
+
 #ifdef CONFIG_IP_ROUTE_CLASSID
        if (tb[FRA_FLOW] && (rule4->tclassid != nla_get_u32(tb[FRA_FLOW])))
                return 0;
 
        frh->dst_len = rule4->dst_len;
        frh->src_len = rule4->src_len;
-       frh->tos = inet_dscp_to_dsfield(rule4->dscp);
+
+       if (rule4->dscp_full) {
+               frh->tos = 0;
+               if (nla_put_u8(skb, FRA_DSCP,
+                              inet_dscp_to_dsfield(rule4->dscp) >> 2))
+                       goto nla_put_failure;
+       } else {
+               frh->tos = inet_dscp_to_dsfield(rule4->dscp);
+       }
 
        if ((rule4->dst_len &&
             nla_put_in_addr(skb, FRA_DST, rule4->dst)) ||
 {
        return nla_total_size(4) /* dst */
               + nla_total_size(4) /* src */
-              + nla_total_size(4); /* flow */
+              + nla_total_size(4) /* flow */
+              + nla_total_size(1); /* dscp */
 }
 
 static void fib4_rule_flush_cache(struct fib_rules_ops *ops)