They are different algorithms, so I don't see how their security can be provably related.
1. The best known attacks against SHA-256 have a cost of 2^i for some value of i.
2. The best known attacks against BLAKE2 have a cost of 2^j for some value of j.
3. j >= i
They are different algorithms, so I don't see how their security can be provably related.