Help with Popcorn

Hey guys, so I have gotten user but when I download the local privilege escalation, everytime I try and use GCC with it, im getting errors. Any ideas why? I have tried searchsploit -x copy and paste. Searchsploit -m. Google, copy raw data and vi into a file. Not working for anything I have tried.

half-nelson.c: In function ‘get_kstack’:
half-nelson.c:265: warning: integer constant is too large for ‘long’ type
half-nelson.c:265: warning: integer constant is too large for ‘long’ type
half-nelson.c: In function ‘do_child_upper’:
half-nelson.c:475: warning: integer constant is too large for ‘long’ type
half-nelson.c: In function ‘get_kstack’:
half-nelson.c:231: error: unknown register name ‘r8’ in ‘asm’

and

15704.c: In function ‘trigger’:
15704.c:200:9: warning: implicit declaration of function ‘splice’; did you mean ‘nice’? [-Wimplicit-function-declaration]
splice(fildes[3], NULL, fildes[1], NULL, 128, 0);
^~~~~~
nice
15704.c: In function ‘main’:
15704.c:261:9: warning: implicit declaration of function ‘clone’; did you mean ‘close’? [-Wimplicit-function-declaration]
clone((int (*)(void *))trigger,
^~~~~
close
15704.c:263:15: error: ‘CLONE_VM’ undeclared (first use in this function); did you mean ‘CLNEXT’?
CLONE_VM | CLONE_CHILD_CLEARTID | SIGCHLD,
^~~~~~~~
CLNEXT
15704.c:263:15: note: each undeclared identifier is reported only once for each function it appears in
15704.c:263:26: error: ‘CLONE_CHILD_CLEARTID’ undeclared (first use in this function)
CLONE_VM | CLONE_CHILD_CLEARTID | SIGCHLD,
^~~~~~~~~~~~~~~~~~~~

Sorry if this is a noob question but this is the first time I have attempted to use GCC and don’t really know what to search in order to figure this out.

TIA.

try using dirtyc0w and wait until it responds ull get the priv esc

if still dosent work pm me

All good, I ended up using MOTD exploit to get priv esc. I haven’t used dirtyc0w before but ive been told to only use it as a last resort and not to rely on it or else you don’t learn how to priv esc yourself.

I followed g0tm1lk and found an exploit straight away.