Not really it is something I believe many people have considered simply because RFC6979 is "overkill" however the advantage of a widely adopted standard is it tends to become more widely adopted providing a defacto "universal solution".
k = sha256(privkey|mdigest)
as this is trivial to implement (just hash over the 64-bytes found by concatenating the privkey with the message digest). I'm not a cryptographer, but I don't understand how this could not be an improvement from using a pseudo-random k value from a potentially-flawed PRNG.
It is better. No doubt about it. Pretty much anything is better than a random k. Random k is fragile solution. It is easy to implement but also very easy to get wrong.
In general however HMACs are preferable over raw hashes because they have been proven to be cryptographically resilient to various attacks even when the underlying hash is weakened. It also the more logical tool. Someone who uses HMAC in other fields would immediately recognize how/why the HMAC is being used. A HMAC is a keyed hash. HMAC(message + secret) = keyed_digest.
Look familiar. A transaction is a message and a private key is a secret. The system is being used exactly as it was intended, not some clever hack or workaround. The right tool for the job means attack vectors are likely to be better researched. You can bet that right not cryptographers are researching attacks and weaknesses which may lead to a HMAC "leaking" the secret. That isn't necessarily the case of a H(secret + known_non_secret).
You could but like your humorous cartoon indicates it may not stop at that. While RFC6979 may be "excessive" nobody has shown it is insecure. In time it is very likely that it could end up in general purpose cryptographic libraries (much like pbkdf2 and HMAC-SHA256 are).
While k = sha256(privkey|mdigest) works so does k = sha256(magic|privkey|mdigest) or k = sha256(mdigest|privkey) or k = sha256(XOR(mdigest,privkey)), or k = sha256(privkey), or even k = sha256(message|nonce) or k = sha(message) XOR nonce or k = left32(message) XOR nonce. The last three aren't deterministic but it would avoid a situaiton where a repeat nonce compromises the key
So if your choices are using algorithm above OR use random k well I would say use your algorithm. If you can implement RFC6979 then I would say use that over another potentially good but incompatible solution.
As a side note even the simplest solution k = XOR(privkey, known_constant) works.