If the TPM 'breaks' or becomes otherwise inaccessible, all cryptography dependent on keys stored by the TPM also breaks. This is the most concise and inclusive way I could think to put it.
I say 'cryptography' because the TPM does more than just encryption. Encryption is just one use of cryptography, as are signatures, authentication, etc.
The TPM stores keys, it doesn't actually do the drive encryption. It acts as the key-ring for the software that actually does the encryption.
Think of losing your physical keys: if you asked "what happens when I lose my keys", we can't answer that for you. We don't know what keys you have, or what they are for. All we can say is "well, whatever you had keys for on your key-ring, now you can't access those things."
What exactly happens is not a general question about keys at all. If you had keys to your house, a car and a boat on your key ring, and you lost it, but you have a backup house key somewhere, then the answer is you lose access to your car and your boat, but you can still get in your house.
So back to your encrypted hard disk: What exactly happens is not a TPM question at all, it's a question about the software you are using. If you are using BitLocker, for example, to encrypt your hark disk, you might know everything there is to know about the TPM, but if you don't know exactly how BitLocker works, and how/if it even uses the TPM, then you cannot answer the question of what 'exactly' happens. Does it migrate/backup keys? Does it save clear-text data to the cloud somewhere for retrieval? These are questions for the BitLocker software, and not about the TPM at all.
So in short, if the TPM 'breaks':
- Any data you encrypted with a key that only exists in the TPM, which isn't backed up, is lost (i.e. your encrypted hard disk)
- Any cryptographic identity based on the TPM (i.e. Identity Keys) is now lost
- Any trust in the platform (i.e. during remote attestation) is now lost
IOW, any cryptography based on the TPM is now hosed.
NOTE: As in another answer "broken" here means "inaccessible", not "hacked" or broken in that it becomes insecure, that is another question.