With your binary, I am getting different output from GDB:
(gdb) r
Starting program: /tmp/sample.elf.bad
During startup program terminated with signal SIGKILL, Killed.
Looking at the binary:
readelf -l sample.elf
Elf file type is EXEC (Executable file)
Entry point 0x8048080
There are 1 program headers, starting at offset 52
Program Headers:
  Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align
  LOAD           0x000054 0x08048080 0x00000000 0x0000c 0x0000c R E 0x1000
Here you are asking the kernel to mmap a segment with file offset 0x54 at virtual address 0x08048080.
Since these two numbers do not equal each other modulo page size, the kernel refuses:
strace ./sample.elf
execve("./sample.elf", ["./sample.elf"], [/* 42 vars */] <unfinished ...>
+++ killed by SIGKILL +++
Killed
Above strace means that the kernel tried to create the process, didn't like what it saw, and terminated it with prejudice. Not a single instruction of your binary was executed.
Fixing the LOAD virtual address and the entry point to be 0x08048054 produces desired working executable:
strace ./sample.elf
execve("./sample.elf", ["./sample.elf"], [/* 42 vars */]) = 0
[ Process PID=23172 runs in 32 bit mode. ]
_exit(0)                                = ?
+++ exited with 0 +++
Here is the hexdump for it:
hd ./sample.elf
00000000  7f 45 4c 46 01 01 01 00  00 00 00 00 00 00 00 10  |.ELF............|
00000010  02 00 03 00 01 00 00 00  54 80 04 08 34 00 00 00  |........T...4...|
00000020  00 00 00 00 00 00 00 00  34 00 20 00 01 00 28 00  |........4. ...(.|
00000030  00 00 00 00 01 00 00 00  54 00 00 00 54 80 04 08  |........T...T...|
00000040  00 00 00 00 0c 00 00 00  0c 00 00 00 05 00 00 00  |................|
00000050  00 10 00 00 b8 01 00 00  00 bb 00 00 00 00 cd 80  |................|
00000060