HL_CPUCP_SEC_ATTEST_INFO_TINEOUT_USEC);
 }
 
+int hl_fw_get_dev_info_signed(struct hl_device *hdev,
+                             struct cpucp_dev_info_signed *dev_info_signed, u32 nonce)
+{
+       return hl_fw_get_sec_attest_data(hdev, CPUCP_PACKET_INFO_SIGNED_GET, dev_info_signed,
+                                        sizeof(struct cpucp_dev_info_signed), nonce,
+                                        HL_CPUCP_SEC_ATTEST_INFO_TINEOUT_USEC);
+}
+
 int hl_fw_send_generic_request(struct hl_device *hdev, enum hl_passthrough_type sub_opcode,
                                                dma_addr_t buff, u32 *size)
 {
 
 void hl_fw_set_max_power(struct hl_device *hdev);
 int hl_fw_get_sec_attest_info(struct hl_device *hdev, struct cpucp_sec_attest_info *sec_attest_info,
                                u32 nonce);
+int hl_fw_get_dev_info_signed(struct hl_device *hdev,
+                             struct cpucp_dev_info_signed *dev_info_signed, u32 nonce);
 int hl_set_voltage(struct hl_device *hdev, int sensor_index, u32 attr, long value);
 int hl_set_current(struct hl_device *hdev, int sensor_index, u32 attr, long value);
 int hl_set_power(struct hl_device *hdev, int sensor_index, u32 attr, long value);
 
 
 #include <asm/msr.h>
 
+/* make sure there is space for all the signed info */
+static_assert(sizeof(struct cpucp_info) <= SEC_DEV_INFO_BUF_SZ);
+
 static u32 hl_debug_struct_size[HL_DEBUG_OP_TIMESTAMP + 1] = {
        [HL_DEBUG_OP_ETR] = sizeof(struct hl_debug_params_etr),
        [HL_DEBUG_OP_ETF] = sizeof(struct hl_debug_params_etf),
        return rc;
 }
 
+static int dev_info_signed(struct hl_fpriv *hpriv, struct hl_info_args *args)
+{
+       void __user *out = (void __user *) (uintptr_t) args->return_pointer;
+       struct cpucp_dev_info_signed *dev_info_signed;
+       struct hl_info_signed *info;
+       u32 max_size = args->return_size;
+       int rc;
+
+       if ((!max_size) || (!out))
+               return -EINVAL;
+
+       dev_info_signed = kzalloc(sizeof(*dev_info_signed), GFP_KERNEL);
+       if (!dev_info_signed)
+               return -ENOMEM;
+
+       info = kzalloc(sizeof(*info), GFP_KERNEL);
+       if (!info) {
+               rc = -ENOMEM;
+               goto free_dev_info_signed;
+       }
+
+       rc = hl_fw_get_dev_info_signed(hpriv->hdev,
+                                       dev_info_signed, args->sec_attest_nonce);
+       if (rc)
+               goto free_info;
+
+       info->nonce = le32_to_cpu(dev_info_signed->nonce);
+       info->info_sig_len = dev_info_signed->info_sig_len;
+       info->pub_data_len = le16_to_cpu(dev_info_signed->pub_data_len);
+       info->certificate_len = le16_to_cpu(dev_info_signed->certificate_len);
+       info->dev_info_len = sizeof(struct cpucp_info);
+       memcpy(&info->info_sig, &dev_info_signed->info_sig, sizeof(info->info_sig));
+       memcpy(&info->public_data, &dev_info_signed->public_data, sizeof(info->public_data));
+       memcpy(&info->certificate, &dev_info_signed->certificate, sizeof(info->certificate));
+       memcpy(&info->dev_info, &dev_info_signed->info, info->dev_info_len);
+
+       rc = copy_to_user(out, info, min_t(size_t, max_size, sizeof(*info))) ? -EFAULT : 0;
+
+free_info:
+       kfree(info);
+free_dev_info_signed:
+       kfree(dev_info_signed);
+
+       return rc;
+}
+
+
 static int eventfd_register(struct hl_fpriv *hpriv, struct hl_info_args *args)
 {
        int rc;
        case HL_INFO_FW_GENERIC_REQ:
                return send_fw_generic_request(hdev, args);
 
+       case HL_INFO_DEV_SIGNED:
+               return dev_info_signed(hpriv, args);
+
        default:
                dev_err(dev, "Invalid request %d\n", args->op);
                rc = -EINVAL;
 
  *       number (nonce) provided by the host to prevent replay attacks.
  *       public key and certificate also provided as part of the FW response.
  *
+ * CPUCP_PACKET_INFO_SIGNED_GET -
+ *       Get the device information signed by the Trusted Platform device.
+ *       device info data is also hashed with some unique number (nonce) provided
+ *       by the host to prevent replay attacks. public key and certificate also
+ *       provided as part of the FW response.
+ *
  * CPUCP_PACKET_MONITOR_DUMP_GET -
  *       Get monitors registers dump from the CpuCP kernel.
  *       The CPU will put the registers dump in the a buffer allocated by the driver
        CPUCP_PACKET_ENGINE_CORE_ASID_SET,      /* internal */
        CPUCP_PACKET_RESERVED2,                 /* not used */
        CPUCP_PACKET_SEC_ATTEST_GET,            /* internal */
-       CPUCP_PACKET_RESERVED3,                 /* not used */
+       CPUCP_PACKET_INFO_SIGNED_GET,           /* internal */
        CPUCP_PACKET_RESERVED4,                 /* not used */
        CPUCP_PACKET_MONITOR_DUMP_GET,          /* debugfs */
        CPUCP_PACKET_RESERVED5,                 /* not used */
 
 #define HL_INFO_HW_ERR_EVENT                   36
 #define HL_INFO_FW_ERR_EVENT                   37
 #define HL_INFO_USER_ENGINE_ERR_EVENT          38
+#define HL_INFO_DEV_SIGNED                     40
 
 #define HL_INFO_VERSION_MAX_LEN                        128
 #define HL_INFO_CARD_NAME_MAX_LEN              16
 #define SEC_SIGNATURE_BUF_SZ   255     /* (256 - 1) 1 byte used for size */
 #define SEC_PUB_DATA_BUF_SZ    510     /* (512 - 2) 2 bytes used for size */
 #define SEC_CERTIFICATE_BUF_SZ 2046    /* (2048 - 2) 2 bytes used for size */
+#define SEC_DEV_INFO_BUF_SZ    5120
 
 /*
  * struct hl_info_sec_attest - attestation report of the boot
        __u8 pad0[2];
 };
 
+/*
+ * struct hl_info_signed - device information signed by a secured device.
+ * @nonce: number only used once. random number provided by host. this also passed to the quote
+ *         command as a qualifying data.
+ * @pub_data_len: length of the public data (bytes)
+ * @certificate_len: length of the certificate (bytes)
+ * @info_sig_len: length of the attestation signature (bytes)
+ * @public_data: public key info signed info data (outPublic + name + qualifiedName)
+ * @certificate: certificate for the signing key
+ * @info_sig: signature of the info + nonce data.
+ * @dev_info_len: length of device info (bytes)
+ * @dev_info: device info as byte array.
+ */
+struct hl_info_signed {
+       __u32 nonce;
+       __u16 pub_data_len;
+       __u16 certificate_len;
+       __u8 info_sig_len;
+       __u8 public_data[SEC_PUB_DATA_BUF_SZ];
+       __u8 certificate[SEC_CERTIFICATE_BUF_SZ];
+       __u8 info_sig[SEC_SIGNATURE_BUF_SZ];
+       __u16 dev_info_len;
+       __u8 dev_info[SEC_DEV_INFO_BUF_SZ];
+       __u8 pad[2];
+};
+
 /**
  * struct hl_page_fault_info - page fault information.
  * @timestamp: timestamp of page fault.