We're experimenting with 5% on stable with everything but cache partitioning enabled (which is at 100%, I believe), and have had no reports of any breakages.
The only issue we've seen from our metrics is performance loss, particularly with cross-site iframes, since we key on top frame site and frame site. shivanisha@ and jkarlin@ would be more familiar with the effects of enabling cache partitioning, but with enabling everything else on top of cache partitioning, frame load times in general are within the margin of error (say, a percent or so), while cross-site iframes are typically within ~5% of where they are without partitioning, with more of the regression seen, proportionally, below the 75th percentile of load times.
Wanting to get a better handle on the performance regressions is the sole reason we're not at 100%.
One thing to be aware of is that while enabling kSplitCacheByNetworkIsolationKey independently of the others works totally fine, a lot of the other features are interdependent in unexpected and confusing ways, and don't really work quite right alone, though keeping them separate was useful while implementing them. For example, kPartitionExpectCTStateByNetworkIsolationKey affects an Expect-CT cache used both above and below the socket pool layer, so enabling it without also partitioning the socket pools doesn't quite work right, despite things apparently working fine with that combination of flags, unless you dig into the specific cases where it matters. I'd recommend enabling them all together, if you plan to do so.
There are still a couple areas in the network service that still aren't partitioned (cert verifier, auth cache, HSTS, off the top of my head) that we need to figure out, but they should all work fine with the partitioning features enabled.