Control printing of key checkpoints upon a proof's failure
See set-checkpoint-summary-limit for a discussion of the checkpoint-summary-limit. Evaluation of the form (checkpoint-summary-limit) produces the current checkpoint-summary-limit, and can be invoked with the keyword hack (see keyword-commands). For example:
ACL2 !>:checkpoint-summary-limit (NIL . 3) ACL2 !>