lbc The short answer is: if a data set is feasible to collect and worth the money to sell or exploit, then assume it's being done.
The passport number thing is like this (and obviously just one of many deanonymization routes):
You started using your GrapheneOS phone in Argentina. Let's say for sake of argument that you connect to a 5G tower down there with a base station provided by Huawei. At bare minimum, I would expect your IMEI to be relayed over the internet to some servers in China. Using triangulation, we could even get your location, but it's enough just to know you're hanging out in Buenos Aires. Now you decide it's time to go on that safari trip you've been dreaming about. So you book your tickets, and a month later, you pop out in Kenya. You're not an idiot, so you never turn on your WAN anywhere near the airport or the connected taxis, let alone while passing through immigration. You might have connected to the airport wifi, but with MAC randomization that should be OK. (As in, you're immune to trivial deanonymization, and instead an attacker would need to apply costly traffic timing and sizing analysis to "see" you through your VPN or whatever). But...
How many people from Argentina do you think left the country on September 1 and arrived in Kenya on September 2? I dunno but probably just YOU! Now if the telco infrastructure in Kenya is also Huawei, or any other company which connects to those same servers in China, then you can see where this is going. "Ah ha! The guy with IMEI number X must have been someone one the plane that left Argentina on September 1." Now all you need to do is eventually fly back home, and it's checkmate! Why? Well, a simple logical-and function of the passenger manifests will reveal you. If you happen to have backdoor access to Kenya's immigration servers (not that you would find any reporting of that online) then it's game over right there. Otherwise they might have to wait til you check in to a hotel or make the unforgivable error of registering a SIM card in your own name, in order for your passport number to get ejected to some endpoint which is a bit more accessible.
But why would "they" care? The Chinese don't, so long as you're not a bother to them, and hey, you're just a guy going on a safari. But imagine if they could then go to either government involved, and say, "Here's a pile of location data tagged with IMEI. For a small price per IMEI, we'll show you all the places they've been, and when, to the extent that they've connected to our poisoned telco equipment. Then it's all up to you how you want to exploit the people attached to them."
It all starts with exfiltrating all the intel that your "cheap and efficient" security devices capture, including all your telco equipment. Then do a bunch of correlation analysis. But...
Modern intelligence fusion over there already makes a mockery of my scenario here. This is really trivial shit. And obviously Huawei isn't the only busybody around, but rather just the most infamous one.